caliptra-api |
|
|
|
|
|
|
|
|
|
|
|
|
checksum::tests::test_calc_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
checksum::tests::test_checksum_overflow |
0.4s |
0.4s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
checksum::tests::test_round_trip |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
checksum::tests::test_verify_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_populate_checksum_capabilities |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_populate_checksum_resp_header |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-api-types |
|
|
|
|
|
|
|
|
|
|
|
|
test::test_security_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-auth-man-gen |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-auth-man-types |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-auth-manifest-app::bin/caliptra-auth-manifest-app |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-builder |
|
|
|
|
|
|
|
|
|
|
|
|
elf_symbols::test::test_elf_symbols |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::cargo_invocations_from_fwid::test_duplicate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::cargo_invocations_from_fwid::test_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_build_firmware |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_build_firmware_not_registered |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_elf2rom_golden |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_elf_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_fwid_elf_filename |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_image_revision_from_str |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-builder::bin/image |
|
|
|
|
|
|
|
|
|
|
|
|
test_binaries_are_identical |
107.0s |
106.1s |
102.6s |
104.9s |
59.3s |
59.2s |
61.1s |
58.6s |
62.2s |
59.0s |
58.5s |
59.4s |
test_image_options_imports_correctly |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
caliptra-cfi-derive::proc-macro/caliptra-cfi-derive |
|
|
|
|
|
|
|
|
|
|
|
|
cfi_asm_test::test::test_launder |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
caliptra-cfi-lib |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-cfi-lib::test_asm |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-cfi-lib::test_derive |
|
|
|
|
|
|
|
|
|
|
|
|
test_rand |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rand_stress |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_with_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_with_not_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
test_coverage_map_creation_data_files |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_coverage_map_creation_no_data_files_found |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_parse_trace_file |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-coverage::bin/caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-drivers |
|
|
|
|
|
|
|
|
|
|
|
|
array::tests::test_array_4x4_from_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array::tests::test_array_4x4_to_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_result_too_large |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_result_too_small |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_u16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_u8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bounded_address::tests::test_rom_address_validate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fuse_bank::tests::test_first_set_msbit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_dv_nonsticky_384bit_set |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_fht_is_valid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_fmc_priv_key_store |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_estack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_persistent_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_stack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
okref::tests::test_okref_err |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
okref::tests::test_okref_ok |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
persistent::tests::test_layout |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-drivers-test-bin |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-drivers::drivers_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
test_csrng |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_csrng2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_csrng_adaptive_proportion |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_csrng_repetition_count |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_doe_when_debug_locked |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_doe_when_debug_not_locked |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_ecc384 |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_ecc384_sign_validation_failure |
0.1s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_error_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_generate_doe_vectors_when_debug_locked |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_generate_doe_vectors_when_debug_not_locked |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_hmac384 |
0.5s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
test_keyvault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_lms_24 |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_lms_32 |
0.2s |
0.2s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_mailbox_soc_to_uc |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_mailbox_txn_drop |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_mailbox_uc_to_soc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_negative_lms |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
0.2s |
0.2s |
0.2s |
test_pcrbank |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_persistent |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_sha1 |
2.5s |
2.4s |
2.5s |
2.6s |
3.0s |
2.7s |
2.8s |
3.4s |
3.4s |
3.0s |
3.0s |
3.0s |
test_sha256 |
4.4s |
4.2s |
4.2s |
6.6s |
4.8s |
4.7s |
4.5s |
4.9s |
4.7s |
4.4s |
4.5s |
4.8s |
test_sha2_512_384acc |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_sha384 |
3.5s |
3.5s |
3.5s |
3.6s |
3.8s |
3.6s |
3.8s |
4.3s |
4.0s |
3.7s |
3.6s |
4.2s |
test_status_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_trng_in_etrng_mode |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_trng_in_itrng_mode |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uart |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uc_to_soc_error_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-bus |
|
|
|
|
|
|
|
|
|
|
|
|
clock::tests::test_clock |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_increment_and_poll |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_increment_too_far |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_mixup_timer_actions_on_cancel |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_schedule_too_far_in_future |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_clock_searchback_wraparound |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_clock_wraparound |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_with_clock_at_0 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_with_clock_at_12327834 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_attach_dev |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_poll |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_byte |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_half_word |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_word |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_byte |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_half_word |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_word |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_byte |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_half_word |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_word |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_byte |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_half_word |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_word |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mmio::tests::test_bus_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_read_error |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_write_error |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_read_only_mem |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_read_write_mem |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_read_write_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_readonly_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_writeonly_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_read_write_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_readonly_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_writeonly_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_read_write_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_readonly_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_writeonly_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_write_only_mem |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_bus_faults |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_bus_faults_16bit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_read_and_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_read_and_write_16bit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_mmap_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_read_error |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::fake_bus::tests::test_fake_bus |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::log::tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::log::tests::test_clone |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-cpu |
|
|
|
|
|
|
|
|
|
|
|
|
cpu::tests::test_bus_poll |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_coverage |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_pc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_xreg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_only_csr |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_write_csr |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_write_masked_csr |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::auipc::tests::test_auipc_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::auipc::tests::test_auipc_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jal::tests::test_jal_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jalr::tests::test_jalr_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jalr::tests::test_jalr_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_18 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_19 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_35 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_36 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_37 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_38 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_25 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_26 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_27 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_26 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_27 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_28 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_29 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_30 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_31 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_32 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_33 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_34 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_35 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_36 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_37 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_26 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_27 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_28 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_29 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_30 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_31 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_32 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_33 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_34 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_35 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_26 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_27 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_28 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_29 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_30 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_31 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_32 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_33 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_34 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_35 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_26 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_27 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_28 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_29 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_30 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_31 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_32 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_33 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_34 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_35 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_25 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_26 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_27 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_18 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_19 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_20 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_22 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_23 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_40 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_41 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_42 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_43 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_18 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_19 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_35 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_36 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_37 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_38 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_18 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_19 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_35 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_36 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_37 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_38 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_18 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_19 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_20 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_21 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_22 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_23 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_40 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_41 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_42 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_43 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_18 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_19 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_20 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_21 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_22 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_23 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_40 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_41 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_42 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_43 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_18 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_34 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_35 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_36 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_37 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_25 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_26 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_27 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_25 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_25 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_25 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_25 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_25 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_12 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_15 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_17 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_24 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_25 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_13 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_14 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_10 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_11 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_7 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_9 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrci |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrs |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrsi |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrw |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrwi |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_ebreak |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_ecall |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_unknown_csr |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
pic::tests::test_interrupt_priority_order |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_read_invalid_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_reset |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_write_invalid_reg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_x0 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
aes256cbc::tests::test_decrypt_1024bit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
aes256cbc::tests::test_decrypt_256bit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
aes256cbc::tests::test_decrypt_384bit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_gen_key_pair |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_sign |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_verify |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_verify_fail |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
helpers::test::test_change_endianness_u32 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::test::test_change_endianness_u64 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::test::test_change_endianness_u8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_0 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha256::tests::test_sha256_224 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha256::tests::test_sha256_256 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha384 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512_224 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512_256 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-derive::derive_bus_test |
|
|
|
|
|
|
|
|
|
|
|
|
test_poll |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_read_dispatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_write_dispatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-derive::proc-macro/caliptra-emu-derive |
|
|
|
|
|
|
|
|
|
|
|
|
bus::tests::test_derive_bus |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_derive_empty_bus |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_mask_lsbs_contiguous |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_organize_fields_by_mask |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_parse_peripheral_fields |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_parse_peripheral_fields_duplicate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_hex_literal_u32 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_usize |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::sort::tests::test_sorted_by_key |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group_panic1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group_panic2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_panic1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_literal |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_literal_panic1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_punct_of |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_punct_of_panic1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_attribute_or_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_field_with_attributes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_group |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_group_panic1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_struct |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-periph |
|
|
|
|
|
|
|
|
|
|
|
|
asym_ecc384::tests::test_control |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_gen_key |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_gen_key_kv_privkey |
0.6s |
0.4s |
0.5s |
0.5s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
asym_ecc384::tests::test_gen_key_kv_seed |
0.4s |
0.5s |
0.4s |
0.6s |
0.3s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
asym_ecc384::tests::test_name |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_sign |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_sign_kv_privkey |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.1s |
asym_ecc384::tests::test_sign_kv_privkey_not_allowed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_status |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_verify |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_version |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_max |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_max_first_byte |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_non_zero_first_byte |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_zero |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_nist_test_vector |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_single_word |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_two_words |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_zero_words |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_clear_secrets |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_deobfuscate_fe |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_deobfuscate_uds |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_block_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_control_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_hash_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_name_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_224 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_256 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_multi_block |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_status_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_version_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_error_if_w_is_not_valid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_is_enabled |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_mode_disabled_by_default |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_params |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_block_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_control_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_hash_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_name_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read_fail |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read_hash_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_hash_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_hash_write_fail |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_pcr_hash_extend_single_block |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_224 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_256 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_multi_block |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_status_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_version_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_from_words_be |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_from_words_le |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_swap_word_endian |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_words_from_bytes_be |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_words_from_bytes_le |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_block |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_control |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_exact_single_block |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_block_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_small_block_read |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_tag_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_multi_block |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_key |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_name |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_status |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_tag |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_version |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_byte_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_locked_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_unlocked_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_dv_entry_ctrl_reset_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_dv_entry_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_clear |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_clear_with_debug_values |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_ctrl_reset_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_blocked |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_write_small |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_write_blocked |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_lockable_scratch_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_nonsticky_generic_scratch_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_pcr_lock_clear |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_pcr_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_dv_entry_ctrl_reset_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_dv_entry_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_lockable_scratch_read_write |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_send_receive |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_send_receive_max_limit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_arc_rdyforcmd_unlock |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_arc_rdyfordata_unlock |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_init |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_lock |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_soc_to_caliptra_lock |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
root_bus::tests::test_keyvault_init_val_in_debug_locked_mode |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_mailbox_max_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_no_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_1 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_2 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_3 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_4 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_5 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_mailbox_max_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_no_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_sha_acc_check_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_sm_lock |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_idev_id_csr_download |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_ldev_id_cert_download |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_secrets_when_debug_locked |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_secrets_when_debug_not_locked |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_tb_services_cb |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_wdt |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-types |
|
|
|
|
|
|
|
|
|
|
|
|
exception::tests::test_breakpoint |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_environment_call |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_illegal_instr |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_illegal_register |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_instr_access_fault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_instr_addr_misaligned |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_load_access_fault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_load_addr_misaligned |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_store_access_fault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_store_addr_misaligned |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu::bin/caliptra-emu |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-error |
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_try_from |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-file-header-fix::bin/caliptra-file-header-fix |
|
|
|
|
|
|
|
|
|
|
|
|
test::test_check_failures |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_check_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-file-header-fix::integration_test |
|
|
|
|
|
|
|
|
|
|
|
|
test_check_only_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_check_only_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_fix |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_usage |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-fmc::bin/caliptra-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-fmc::fmc_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
test_hand_off::test_hand_off |
1.4s |
1.5s |
1.6s |
1.3s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
0.8s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rtalias::test_boot_status_reporting |
1.4s |
1.4s |
1.4s |
1.4s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.8s |
0.9s |
0.9s |
test_rtalias::test_fht_info |
1.7s |
1.8s |
1.6s |
1.6s |
0.9s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
test_rtalias::test_pcr_log |
2.1s |
2.6s |
2.2s |
2.3s |
1.8s |
1.7s |
1.8s |
1.7s |
1.8s |
1.7s |
1.8s |
1.7s |
caliptra-gen-linker-scripts |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-hw-model |
|
|
|
|
|
|
|
|
|
|
|
|
mmio::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::test_pretty_u64 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_failed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_passed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_peek |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_search |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_take |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_unknown_generic_load |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rv32_builder::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_apb |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_execution |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_execute |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_execute_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_receive |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mbox |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mbox_negative |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_negative_soc_mgr_mbox_users |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_output_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_sha512_acc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_soc_mgr_exec_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_soc_mgr_mbox_api |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-hw-model-c-binding |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-hw-model-types |
|
|
|
|
|
|
|
|
|
|
|
|
test::test_hex_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_hex_slice |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-hw-model::model_tests |
|
|
|
|
|
|
|
|
|
|
|
|
test_dccm_double_bit_ecc_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_byte_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_double_bit_ecc_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_unaligned_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_write_locked_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_invalid_instruction_exception_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_pcr_extend |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uninitialized_dccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_uninitialized_iccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_uninitialized_mbox_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_write_to_rom |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-app::bin/caliptra-image-app |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_lms |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
tests::test_lms_sig |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
tests::test_lms_sig_h15 |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_print_lms_private_pub_key |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
caliptra-image-elf |
|
|
|
|
|
|
|
|
|
|
|
|
test::test_load_into_image |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_load_into_image_bad_address |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-fake-keys |
|
|
|
|
|
|
|
|
|
|
|
|
test_write_lms_keys |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
caliptra-image-gen |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-serde |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-types |
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_image_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-verify |
|
|
|
|
|
|
|
|
|
|
|
|
verifier::tests::test_fmc_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_rt_load_address_range_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_incorrect_lms_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_incorrect_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_owner_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_owner_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_lms_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_manifest_marker |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_owner_pk_digest_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_owner_verify_preamble_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_owner_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_vendor_pubkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_vendor_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_size_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_size_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_fmc_rt_order |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_fmc_rt_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_incorrect_length |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_vendor_ecc_pk_idx_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_verify_fmc_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_verify_fmc_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-lms-types |
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_bytes_to_words_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_bytes_to_words_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-registers |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-registers-1_0 |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-registers-latest |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom-test-fmc::bin/caliptra-rom-test-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom-test-rt::bin/caliptra-rom-test-rt |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::bin/asm_tests |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::bin/caliptra-rom |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::rom_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
helpers::tests::test_get_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_get_data_not_found |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rv32_unit_tests::test_asm |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_capabilities::test_capabilities |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_cfi::test_memcpy_not_called_before_cfi_init |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_cpu_fault::test_cpu_fault |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.1s |
0.1s |
0.1s |
0.0s |
test_dice_derivations::test_cold_reset_no_rng |
0.8s |
1.5s |
1.1s |
1.1s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.8s |
test_dice_derivations::test_cold_reset_status_reporting |
1.1s |
1.9s |
1.5s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
test_dice_derivations::test_cold_reset_success |
1.0s |
1.2s |
1.1s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
test_fake_rom::test_fake_rom_fw_load |
0.6s |
0.8s |
0.8s |
0.5s |
0.5s |
0.4s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
test_fake_rom::test_fake_rom_production_enabled |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
test_fake_rom::test_fake_rom_production_error |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.1s |
test_fake_rom::test_fake_rom_update_reset |
1.2s |
1.3s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_fake_rom::test_fake_rom_version |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
test_fake_rom::test_image_verify |
0.3s |
0.3s |
0.2s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_fake_rom::test_skip_kats |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
test_fips_hooks::test_fips_hook_exit |
0.9s |
1.1s |
1.0s |
1.1s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable |
1.5s |
1.4s |
1.3s |
1.4s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
test_fmcalias_derivation::test_check_rom_cold_boot_status_reg |
1.2s |
1.5s |
1.3s |
1.3s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
test_fmcalias_derivation::test_fht_info |
1.4s |
1.3s |
1.3s |
1.4s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
1.0s |
test_fmcalias_derivation::test_firmware_gt_max_size |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_fmcalias_derivation::test_fuse_log |
1.7s |
1.2s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
test_fmcalias_derivation::test_pcr_log |
1.7s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
test_fmcalias_derivation::test_pcr_log_across_update_reset |
1.9s |
2.0s |
2.3s |
2.2s |
1.7s |
1.6s |
1.7s |
1.7s |
1.8s |
1.7s |
1.7s |
1.7s |
test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn |
1.1s |
1.4s |
1.5s |
1.4s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse |
1.4s |
1.8s |
1.5s |
1.9s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
test_fmcalias_derivation::test_upload_measurement_limit |
1.3s |
1.3s |
1.2s |
1.4s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
test_fmcalias_derivation::test_upload_measurement_limit_plus_one |
0.9s |
0.5s |
0.5s |
0.6s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
test_fmcalias_derivation::test_upload_no_measurement |
1.2s |
1.1s |
1.2s |
1.3s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
test_fmcalias_derivation::test_upload_single_measurement |
1.3s |
1.1s |
1.2s |
1.4s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
0.9s |
1.0s |
1.0s |
test_fmcalias_derivation::test_zero_firmware_size |
0.7s |
0.7s |
0.7s |
0.8s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
0.5s |
0.5s |
test_idevid_derivation::test_generate_csr |
1.6s |
1.3s |
1.5s |
1.5s |
1.3s |
1.2s |
1.3s |
1.5s |
1.3s |
1.2s |
1.3s |
1.2s |
test_idevid_derivation::test_generate_csr_stress |
931.7s |
893.3s |
909.2s |
874.6s |
887.9s |
859.2s |
893.2s |
853.3s |
910.9s |
867.3s |
901.6s |
863.0s |
test_idevid_derivation::test_idev_subj_key_id_algo |
5.4s |
5.2s |
5.5s |
5.4s |
4.9s |
5.4s |
5.5s |
5.4s |
5.1s |
4.8s |
5.6s |
4.7s |
test_image_validation::cert_test |
1.3s |
1.5s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.1s |
1.4s |
1.1s |
test_image_validation::cert_test_with_custom_dates |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.1s |
1.2s |
1.1s |
1.3s |
1.1s |
test_image_validation::cert_test_with_ueid |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.3s |
1.0s |
1.1s |
1.4s |
1.2s |
1.0s |
test_image_validation::test_fmc_digest_mismatch |
0.7s |
0.8s |
0.7s |
0.6s |
0.6s |
0.6s |
0.8s |
0.6s |
0.7s |
0.9s |
0.6s |
0.6s |
test_image_validation::test_fmc_entry_point_unaligned |
0.8s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.9s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_entry_point_after_iccm |
0.6s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.9s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_entry_point_before_iccm |
0.8s |
1.0s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
test_image_validation::test_fmc_invalid_load_addr_after_iccm |
1.0s |
0.8s |
1.0s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_load_addr_before_iccm |
0.8s |
0.8s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_load_addr_unaligned |
0.9s |
0.9s |
1.1s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_not_contained_in_iccm |
0.9s |
1.0s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_rt_load_address_range_overlap |
1.8s |
1.4s |
1.7s |
1.4s |
1.1s |
1.3s |
1.4s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_image_validation::test_fmc_svn_greater_than_32 |
0.9s |
0.9s |
1.1s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_svn_less_than_fuse_svn |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.5s |
test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_r |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_s |
0.8s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.5s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_x |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.5s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_y |
0.6s |
0.6s |
0.8s |
0.6s |
0.6s |
0.5s |
0.6s |
0.6s |
0.7s |
0.5s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_r |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.7s |
0.5s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_lms_optional_no_sig_mismatch_check |
2.1s |
2.0s |
2.2s |
2.3s |
2.4s |
1.9s |
2.0s |
1.9s |
2.5s |
1.9s |
2.1s |
2.0s |
test_image_validation::test_header_verify_owner_lms_sig_mismatch |
1.5s |
1.6s |
1.6s |
1.7s |
1.8s |
1.4s |
1.4s |
1.4s |
2.0s |
1.3s |
1.5s |
1.7s |
test_image_validation::test_header_verify_owner_sig_zero_fuses |
1.1s |
1.1s |
0.9s |
0.9s |
1.1s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
0.9s |
1.1s |
test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header |
0.7s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.8s |
test_image_validation::test_header_verify_vendor_ecc_sig_mismatch |
1.3s |
1.1s |
1.2s |
1.1s |
1.3s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.5s |
test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check |
1.3s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.2s |
test_image_validation::test_header_verify_vendor_lms_optional_no_sig_mismatch_check |
2.0s |
2.0s |
2.1s |
1.9s |
2.0s |
1.9s |
2.0s |
1.9s |
2.1s |
1.9s |
2.0s |
1.9s |
test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_header_verify_vendor_lms_sig_mismatch |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_image_validation::test_header_verify_vendor_sig_zero_ecc_pubkey |
1.1s |
1.1s |
1.4s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
test_image_validation::test_header_verify_vendor_sig_zero_ecc_signature |
1.1s |
1.1s |
1.4s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
test_image_validation::test_invalid_manifest_marker |
0.6s |
0.5s |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_invalid_manifest_size |
0.6s |
0.5s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_max_fw_image |
1.3s |
1.3s |
1.1s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
test_image_validation::test_preamble_owner_pubkey_digest_mismatch |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds |
0.8s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_ecc_pubkey_revocation |
2.8s |
2.7s |
2.7s |
2.6s |
2.6s |
2.5s |
2.6s |
2.5s |
2.7s |
2.5s |
2.6s |
2.5s |
test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check |
1.2s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check |
33.3s |
32.0s |
32.8s |
31.7s |
30.6s |
29.7s |
31.1s |
29.9s |
31.8s |
29.4s |
31.0s |
30.0s |
test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_lms_pubkey_revocation |
19.4s |
18.1s |
18.9s |
17.8s |
17.5s |
16.5s |
17.6s |
16.7s |
18.0s |
16.4s |
17.6s |
16.7s |
test_image_validation::test_preamble_vendor_pubkey_digest_mismatch |
0.6s |
0.6s |
0.7s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_zero_vendor_pubkey_digest |
0.6s |
0.5s |
0.7s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_runtime_digest_mismatch |
0.9s |
0.9s |
0.9s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
test_image_validation::test_runtime_entry_point_unaligned |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_entry_point_after_iccm |
1.1s |
1.0s |
1.0s |
1.2s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_entry_point_before_iccm |
1.0s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_load_addr_after_iccm |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_load_addr_before_iccm |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_load_addr_unaligned |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_not_contained_in_iccm |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_svn_greater_than_max |
1.0s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_svn_less_than_fuse_svn |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_toc_fmc_range_incorrect_order |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_fmc_range_overlap |
2.0s |
1.9s |
2.0s |
1.9s |
2.0s |
1.9s |
1.9s |
1.9s |
2.0s |
1.8s |
1.9s |
1.9s |
test_image_validation::test_toc_fmc_size_zero |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_invalid_entry_count |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_invalid_toc_digest |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_toc_rt_size_zero |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_checksum |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_large |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_small |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_zero |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_unknown_command_is_fatal |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rom_integrity::test_read_rom_info_from_fmc |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
test_rom_integrity::test_rom_integrity_failure |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_symbols::test_linker_symbols_match_memory_layout |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_update_reset::test_check_rom_update_reset_status_reg |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
test_update_reset::test_fmc_is_16k |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
test_update_reset::test_update_reset_boot_status |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
test_update_reset::test_update_reset_max_fw_image |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
test_update_reset::test_update_reset_no_mailbox_cmd |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
test_update_reset::test_update_reset_non_fw_load_cmd |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
test_update_reset::test_update_reset_success |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
test_update_reset::test_update_reset_verify_image_failure |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
test_version::test_version |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_warm_reset::test_warm_reset_during_update_reset |
2.1s |
2.0s |
2.1s |
2.1s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
test_warm_reset::test_warm_reset_success |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
test_wdt_activation_and_stoppage::test_rom_wdt_timeout |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.4s |
test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
tests_get_idev_csr::test_get_csr |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
set_auth_manifest::tests::test_sort_and_duplicate_dupe |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
set_auth_manifest::tests::test_sort_and_duplicate_empty |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
set_auth_manifest::tests::test_sort_and_duplicate_sort |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-runtime::bin/caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-runtime::runtime_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
test_authorize_and_stash::test_authorize_and_stash_after_update_reset |
2.3s |
2.2s |
2.4s |
2.2s |
2.2s |
2.2s |
2.3s |
2.2s |
2.2s |
2.2s |
2.3s |
2.3s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest |
2.6s |
2.6s |
2.6s |
2.6s |
2.5s |
2.4s |
2.5s |
2.6s |
2.5s |
2.4s |
2.5s |
2.5s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth |
2.3s |
2.2s |
2.3s |
2.5s |
2.2s |
2.2s |
2.2s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id |
2.3s |
2.2s |
2.4s |
2.5s |
2.2s |
2.1s |
2.2s |
2.2s |
2.6s |
2.1s |
2.4s |
2.2s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization |
1.9s |
1.8s |
1.9s |
2.5s |
1.8s |
1.8s |
1.9s |
1.9s |
2.3s |
1.8s |
1.8s |
1.8s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id |
1.3s |
1.3s |
1.3s |
1.5s |
1.2s |
1.3s |
1.3s |
1.2s |
1.9s |
1.3s |
1.3s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash |
1.3s |
1.3s |
1.3s |
1.6s |
1.3s |
1.2s |
1.3s |
1.3s |
1.5s |
1.2s |
1.3s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.2s |
1.3s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash |
2.7s |
2.6s |
2.6s |
2.6s |
2.5s |
2.5s |
2.5s |
2.9s |
3.0s |
2.5s |
2.6s |
2.8s |
test_authorize_and_stash::test_authorize_and_stash_cmd_success |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.0s |
2.1s |
2.7s |
2.4s |
2.0s |
2.2s |
2.3s |
test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.5s |
1.6s |
1.2s |
1.3s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_fwid_0 |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.8s |
1.5s |
1.2s |
1.3s |
1.4s |
test_authorize_and_stash::test_authorize_and_stash_fwid_127 |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.5s |
1.3s |
1.3s |
1.3s |
1.6s |
test_boot::test_boot |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
test_boot::test_boot_tci_data |
1.0s |
1.0s |
1.0s |
0.9s |
0.9s |
0.9s |
1.0s |
1.3s |
1.0s |
0.9s |
1.0s |
1.3s |
test_boot::test_fw_version |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
1.0s |
1.0s |
1.0s |
1.2s |
test_boot::test_measurement_in_measurement_log_added_to_dpe |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.3s |
1.1s |
1.1s |
1.1s |
1.5s |
test_boot::test_persistent_data |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.1s |
0.8s |
0.8s |
0.8s |
0.9s |
test_boot::test_standard |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
test_boot::test_stress_update |
342.9s |
332.1s |
342.3s |
330.4s |
318.4s |
306.5s |
324.4s |
315.2s |
320.1s |
311.4s |
325.6s |
317.4s |
test_boot::test_update |
2.0s |
2.0s |
2.1s |
2.0s |
1.9s |
1.9s |
2.0s |
1.9s |
2.0s |
1.8s |
1.9s |
2.3s |
test_certify_key_extended::test_dmtf_other_name_extension_not_present |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.6s |
test_certify_key_extended::test_dmtf_other_name_extension_present |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_certify_key_extended::test_dmtf_other_name_validation_fail |
1.2s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_certs::test_all_measurement_apis |
4.7s |
4.6s |
4.6s |
3.9s |
3.9s |
3.8s |
4.1s |
3.8s |
3.8s |
3.7s |
4.2s |
3.8s |
test_certs::test_dpe_leaf_cert |
1.4s |
1.5s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
test_certs::test_fmc_alias_cert |
1.3s |
1.1s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
test_certs::test_full_cert_chain |
1.4s |
1.2s |
1.2s |
1.0s |
1.1s |
1.0s |
1.2s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
test_certs::test_idev_id_cert |
1.2s |
1.3s |
1.2s |
1.0s |
1.2s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.2s |
1.0s |
test_certs::test_idev_id_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_certs::test_ldev_cert |
1.3s |
1.4s |
1.3s |
1.0s |
1.1s |
1.0s |
1.2s |
1.0s |
1.0s |
1.0s |
1.4s |
1.0s |
test_certs::test_rt_alias_cert |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.3s |
1.0s |
1.0s |
1.0s |
1.5s |
1.0s |
test_certs::test_rt_cert_with_custom_dates |
1.0s |
1.0s |
1.2s |
1.0s |
1.1s |
1.0s |
1.3s |
1.0s |
1.0s |
1.0s |
1.3s |
1.0s |
test_disable::test_attestation_disabled_flag_after_update_reset |
2.3s |
2.2s |
2.5s |
2.2s |
2.6s |
2.3s |
2.8s |
2.2s |
2.2s |
2.2s |
2.6s |
2.1s |
test_disable::test_disable_attestation_cmd |
1.3s |
1.3s |
1.5s |
1.3s |
1.5s |
1.5s |
1.7s |
1.2s |
1.3s |
1.3s |
1.6s |
1.3s |
test_ecdsa::ecdsa_cmd_run_wycheproof |
4.5s |
4.6s |
4.5s |
4.5s |
4.7s |
5.2s |
4.7s |
4.5s |
4.5s |
5.6s |
4.7s |
4.5s |
test_ecdsa::test_ecdsa_verify_bad_chksum |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.2s |
1.2s |
1.0s |
test_ecdsa::test_ecdsa_verify_cmd |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.1s |
1.1s |
1.0s |
1.1s |
1.2s |
1.0s |
1.0s |
test_fips::test_fips_shutdown |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.3s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
test_fips::test_fips_version |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.2s |
1.0s |
1.0s |
test_get_fmc_alias_csr::test_get_fmc_alias_csr |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
1.0s |
1.0s |
test_get_idev_csr::test_get_csr |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
test_get_idev_csr::test_missing_csr |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_info::test_capabilities |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_info::test_fw_info |
3.9s |
3.9s |
3.9s |
3.7s |
3.7s |
3.5s |
3.7s |
3.6s |
3.7s |
3.5s |
3.7s |
3.7s |
test_info::test_idev_id_info |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
test_invoke_dpe::test_dpe_header_error_code |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_invoke_dpe::test_invoke_dpe_asymmetric_sign |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_invoke_dpe::test_invoke_dpe_certify_key_csr |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_invoke_dpe_get_profile_cmd |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_invoke_dpe::test_invoke_dpe_rotate_context |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_invoke_dpe::test_invoke_dpe_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_lms::test_lms_verify_cmd |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
test_lms::test_lms_verify_failure |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_lms::test_lms_verify_invalid_key_lms_type |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
test_lms::test_lms_verify_invalid_lmots_type |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
test_lms::test_lms_verify_invalid_sig_lms_type |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
test_mailbox::test_error_cleared |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_mailbox::test_unimplemented_cmds |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_change_locality |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
test_pauser_privilege_levels::test_measurement_log_pl_context_threshold |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds |
1.3s |
1.2s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_pl0_unset_in_header |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_user_not_pl0 |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_pcr::test_extend_pcr_cmd_invalid_pcr_index |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_pcr::test_extend_pcr_cmd_multiple_extensions |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
test_pcr::test_extend_pcr_cmd_reserved_range |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
test_pcr::test_pcr_quote |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_populate_idev::test_populate_idev_cert_cmd |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
test_populate_idev::test_populate_idev_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_revoke_exported_cdi_handle::test_export_cdi_after_revoke |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle |
1.3s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_set_auth_manifest::test_set_auth_manifest_cmd |
1.8s |
1.8s |
1.8s |
1.7s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig |
1.7s |
1.6s |
1.7s |
1.6s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len |
1.3s |
1.4s |
1.3s |
1.4s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit |
1.6s |
1.6s |
1.6s |
1.6s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry |
1.6s |
1.6s |
1.6s |
1.5s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_fw_info_digest |
1.8s |
1.9s |
1.8s |
1.8s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count |
1.6s |
1.6s |
1.6s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig |
1.5s |
1.5s |
1.5s |
1.4s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig |
1.6s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig |
1.7s |
1.7s |
1.7s |
1.6s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig |
1.7s |
1.7s |
1.8s |
1.6s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.4s |
1.6s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker |
1.4s |
1.5s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size |
1.5s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig |
1.4s |
1.4s |
1.5s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig |
1.5s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig |
1.6s |
1.6s |
1.6s |
1.6s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig |
1.6s |
1.6s |
1.7s |
1.6s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi |
1.4s |
1.3s |
1.4s |
1.4s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_sign_with_export_ecdsa::test_sign_with_exported_never_derived |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
test_stash_measurement::test_pcr31_extended_upon_stash_measurement |
3.8s |
3.6s |
3.8s |
3.6s |
3.5s |
3.4s |
3.6s |
3.5s |
3.5s |
3.4s |
3.7s |
3.6s |
test_stash_measurement::test_stash_measurement |
1.9s |
1.8s |
1.9s |
1.9s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.8s |
1.8s |
1.8s |
test_tagging::test_duplicate_tag |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_get_tagged_tci_on_non_existent_tag |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_tagging::test_tagging_a_tagged_context |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_default_context |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_tagging::test_tagging_destroyed_context |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_inactive_context |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_tagging::test_tagging_retired_context |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
test_update_reset::test_context_has_tag_validation |
1.9s |
1.9s |
1.9s |
2.0s |
1.8s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
2.0s |
1.8s |
test_update_reset::test_context_tags_validation |
2.0s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
test_update_reset::test_dpe_validation_deformed_structure |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
1.9s |
2.0s |
1.9s |
1.9s |
1.9s |
2.0s |
1.9s |
test_update_reset::test_dpe_validation_illegal_state |
2.0s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
test_update_reset::test_dpe_validation_used_context_threshold_exceeded |
2.0s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
1.9s |
test_update_reset::test_pcr_reset_counter_persistence |
2.8s |
2.7s |
2.9s |
2.8s |
2.7s |
2.5s |
2.7s |
2.6s |
2.7s |
2.5s |
2.7s |
2.6s |
test_update_reset::test_rt_journey_pcr_updated_in_dpe |
1.9s |
1.9s |
1.9s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.8s |
test_update_reset::test_tags_persistence |
2.9s |
2.7s |
2.9s |
2.7s |
2.7s |
2.5s |
2.7s |
2.6s |
2.7s |
2.5s |
2.7s |
2.6s |
test_warm_reset::test_mbox_busy_during_warm_reset |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
test_warm_reset::test_mbox_idle_during_warm_reset |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
test_warm_reset::test_rt_journey_pcr_validation |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
caliptra-size-history::bin/caliptra-size-history |
|
|
|
|
|
|
|
|
|
|
|
|
git::tests::test_commit_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
bits::tests::test_from_str |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bits::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
lexer::test::test_foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_scope_def |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_stuff |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_type_instantiation |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
string_arena::test::foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-systemrdl::bin/parse |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test |
|
|
|
|
|
|
|
|
|
|
|
|
crypto::test_derive_ecdsa_key |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_derive_ecdsa_keypair |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_drbg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_drbg_keygen |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_kdf |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_is_valid_privkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_pubkey_ecdsa_der |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_cert_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_derive_fmc_alias_key |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_derive_pcr0 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_doe_output |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_idevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_issuer_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_key_id |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_ldevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
redact::test_redact |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_none |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_single |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_two |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_get_cert_extension |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_replace_sig |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_tcb_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-test-harness |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test-harness-types |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test::caliptra_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
fake_collateral_boot_test::fake_boot_test |
0.4s |
0.4s |
0.4s |
0.3s |
0.4s |
0.4s |
0.4s |
0.4s |
0.3s |
0.4s |
0.4s |
0.3s |
jtag_test::gdb_test |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
smoke_test::retrieve_csr_test |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
smoke_test::smoke_test |
2.7s |
2.9s |
2.9s |
2.9s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
smoke_test::test_fmc_wdt_timeout |
1.9s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
2.0s |
1.9s |
1.9s |
1.9s |
2.0s |
1.8s |
smoke_test::test_golden_idevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
smoke_test::test_golden_ldevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
smoke_test::test_rt_wdt_timeout |
2.3s |
2.3s |
2.3s |
2.9s |
2.2s |
2.2s |
2.4s |
2.2s |
2.3s |
2.2s |
2.3s |
2.3s |
test_code_coverage::test_emu_coverage |
7.9s |
7.0s |
7.9s |
7.4s |
7.4s |
7.0s |
8.3s |
6.8s |
8.2s |
6.7s |
7.5s |
7.4s |
warm_reset::warm_reset_basic |
2.0s |
1.5s |
1.6s |
1.6s |
1.5s |
1.4s |
1.8s |
1.5s |
1.6s |
1.5s |
1.5s |
1.6s |
warm_reset::warm_reset_during_fw_load |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.8s |
caliptra-test::fips_test_suite |
|
|
|
|
|
|
|
|
|
|
|
|
fw_load::corrupted_fw_load_version |
1.1s |
1.1s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
1.0s |
0.9s |
0.9s |
1.2s |
fw_load::fw_load_bad_owner_ecc_pub_key |
0.7s |
0.9s |
1.2s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.8s |
0.7s |
0.7s |
0.9s |
fw_load::fw_load_bad_owner_lms_pub_key |
0.7s |
0.9s |
0.8s |
0.7s |
0.7s |
0.8s |
0.6s |
0.6s |
1.0s |
0.9s |
0.7s |
0.6s |
fw_load::fw_load_bad_vendor_ecc_pub_key |
0.7s |
0.9s |
1.0s |
0.6s |
0.7s |
0.9s |
0.7s |
0.6s |
0.8s |
0.8s |
0.7s |
0.6s |
fw_load::fw_load_bad_vendor_lms_pub_key |
0.7s |
0.9s |
0.9s |
0.6s |
0.6s |
0.9s |
0.6s |
0.6s |
0.9s |
0.9s |
0.6s |
0.6s |
fw_load::fw_load_blank_pub_key_hashes |
0.6s |
0.6s |
0.7s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
0.7s |
0.7s |
0.6s |
0.5s |
fw_load::fw_load_blank_pub_keys |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
1.0s |
0.6s |
0.6s |
0.7s |
1.0s |
0.7s |
0.6s |
fw_load::fw_load_error_fmc_digest_failure |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.9s |
1.5s |
1.5s |
fw_load::fw_load_error_fmc_digest_mismatch |
1.7s |
1.7s |
1.7s |
1.6s |
1.6s |
1.7s |
1.7s |
1.6s |
1.7s |
1.8s |
1.6s |
1.6s |
fw_load::fw_load_error_fmc_entry_point_invalid |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.7s |
1.7s |
1.6s |
1.8s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_entry_point_unaligned |
1.8s |
1.7s |
1.7s |
1.7s |
1.8s |
1.6s |
1.7s |
1.7s |
1.7s |
1.6s |
1.7s |
1.7s |
fw_load::fw_load_error_fmc_load_addr_invalid |
1.8s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.7s |
1.8s |
1.7s |
1.6s |
1.7s |
1.7s |
fw_load::fw_load_error_fmc_load_addr_unaligned |
1.8s |
1.7s |
1.7s |
1.8s |
1.7s |
1.6s |
1.7s |
2.0s |
1.7s |
1.6s |
1.7s |
1.7s |
fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.6s |
1.7s |
2.0s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_fmc_runtime_incorrect_order |
1.9s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.6s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_fmc_runtime_load_addr_overlap |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_fmc_runtime_overlap |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_fmc_size_zero |
1.8s |
1.7s |
1.7s |
1.7s |
1.6s |
1.6s |
1.7s |
1.5s |
1.7s |
1.6s |
1.6s |
1.8s |
fw_load::fw_load_error_fmc_svn_greater_than_max_supported |
1.8s |
1.7s |
1.7s |
1.7s |
1.6s |
1.6s |
1.7s |
1.5s |
1.7s |
1.6s |
1.6s |
1.9s |
fw_load::fw_load_error_fmc_svn_less_than_fuse |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.7s |
1.5s |
1.7s |
1.6s |
1.6s |
2.1s |
fw_load::fw_load_error_header_digest_failure |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.4s |
1.6s |
fw_load::fw_load_error_image_len_more_than_bundle_size |
1.8s |
1.7s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.5s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_manifest_marker_mismatch |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.4s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_manifest_size_mismatch |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.4s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.4s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_ecc_signature_invalid |
1.6s |
1.6s |
1.6s |
1.8s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
fw_load::fw_load_error_owner_ecc_signature_invalid_arg |
1.6s |
1.6s |
1.6s |
2.0s |
1.6s |
1.5s |
1.6s |
1.4s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_ecc_verify_failure |
1.5s |
1.5s |
1.5s |
1.7s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
fw_load::fw_load_error_owner_lms_signature_invalid |
2.1s |
2.1s |
2.1s |
2.2s |
1.7s |
1.6s |
1.7s |
1.6s |
1.8s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_owner_lms_verify_failure |
1.6s |
1.6s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_pub_key_digest_failure |
1.7s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
fw_load::fw_load_error_owner_pub_key_digest_mismatch |
1.7s |
1.8s |
1.5s |
1.4s |
1.5s |
1.3s |
1.5s |
1.3s |
1.5s |
1.4s |
1.5s |
1.4s |
fw_load::fw_load_error_runtime_digest_failure |
1.6s |
2.0s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_runtime_digest_mismatch |
2.0s |
2.3s |
1.9s |
1.8s |
1.9s |
1.7s |
1.9s |
1.8s |
1.9s |
1.8s |
2.0s |
1.8s |
fw_load::fw_load_error_runtime_entry_point_invalid |
2.0s |
2.4s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.8s |
2.0s |
1.8s |
1.9s |
1.8s |
fw_load::fw_load_error_runtime_entry_point_unaligned |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.8s |
2.0s |
1.8s |
1.9s |
1.9s |
fw_load::fw_load_error_runtime_load_addr_invalid |
2.0s |
1.9s |
2.0s |
1.9s |
2.0s |
1.8s |
1.9s |
1.8s |
2.0s |
1.9s |
1.9s |
1.9s |
fw_load::fw_load_error_runtime_load_addr_unaligned |
2.1s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
2.0s |
1.8s |
1.9s |
1.9s |
fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_runtime_size_zero |
1.7s |
1.7s |
1.8s |
2.0s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_runtime_svn_greater_than_max_supported |
1.9s |
1.9s |
2.0s |
1.9s |
1.9s |
1.7s |
1.9s |
1.8s |
2.0s |
1.8s |
1.9s |
1.9s |
fw_load::fw_load_error_runtime_svn_less_than_fuse |
2.0s |
1.9s |
2.0s |
1.9s |
1.9s |
1.7s |
1.9s |
1.8s |
2.1s |
1.8s |
1.9s |
1.8s |
fw_load::fw_load_error_toc_digest_failure |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
2.0s |
1.4s |
1.5s |
1.5s |
fw_load::fw_load_error_toc_digest_mismatch |
1.7s |
1.7s |
1.8s |
1.7s |
1.6s |
1.5s |
1.9s |
1.6s |
2.1s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_toc_entry_count_invalid |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.5s |
1.9s |
1.6s |
1.8s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_toc_entry_range_arithmetic_overflow |
1.8s |
1.7s |
1.8s |
1.7s |
1.7s |
1.5s |
1.6s |
1.6s |
1.9s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_update_reset_fmc_digest_mismatch |
2.8s |
2.9s |
3.0s |
2.8s |
2.7s |
2.5s |
2.6s |
2.6s |
2.9s |
2.5s |
2.7s |
2.5s |
fw_load::fw_load_error_update_reset_owner_digest_failure |
2.7s |
2.6s |
2.9s |
2.7s |
2.6s |
2.4s |
2.5s |
2.5s |
2.6s |
2.4s |
2.5s |
2.4s |
fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch |
2.8s |
2.7s |
2.9s |
2.8s |
2.7s |
2.7s |
2.6s |
2.6s |
2.7s |
2.5s |
2.6s |
2.5s |
fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch |
3.8s |
3.6s |
3.8s |
3.8s |
2.8s |
2.9s |
2.7s |
2.8s |
2.9s |
2.6s |
2.8s |
2.6s |
fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch |
1.7s |
1.7s |
1.7s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds |
1.7s |
1.6s |
1.7s |
1.6s |
1.8s |
1.4s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_ecc_pub_key_revoked |
1.7s |
1.6s |
1.7s |
1.6s |
1.8s |
1.4s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_ecc_signature_invalid |
1.7s |
1.6s |
1.6s |
1.7s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_ecc_signature_invalid_arg |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.4s |
1.5s |
1.4s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_ecc_verify_failure |
1.6s |
1.5s |
1.4s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch |
2.0s |
1.9s |
1.9s |
1.9s |
1.7s |
1.6s |
1.6s |
1.8s |
1.8s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_lms_pub_key_revoked |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_lms_signature_invalid |
1.9s |
1.8s |
1.9s |
1.8s |
1.6s |
1.6s |
1.6s |
1.5s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_vendor_lms_verify_failure |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
fw_load::fw_load_error_vendor_pub_key_digest_failure |
1.5s |
1.5s |
1.6s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
fw_load::fw_load_error_vendor_pub_key_digest_invalid |
1.6s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg |
1.7s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.4s |
1.6s |
1.5s |
1.6s |
1.4s |
fw_load::fw_load_error_vendor_pub_key_digest_mismatch |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.3s |
1.5s |
1.4s |
1.5s |
1.4s |
security_parameters::attempt_ssp_access_fw_load |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
security_parameters::attempt_ssp_access_rom |
0.4s |
0.3s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.4s |
0.3s |
0.3s |
security_parameters::attempt_ssp_access_rt |
1.0s |
0.9s |
1.0s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.2s |
0.9s |
0.9s |
self_tests::fw_load_halt_check_no_output |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
self_tests::integrity_check_failure_rom |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.5s |
self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt |
2.2s |
2.1s |
2.3s |
2.2s |
2.1s |
1.9s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
2.3s |
self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt |
2.2s |
2.3s |
2.2s |
2.3s |
2.1s |
2.0s |
2.0s |
2.1s |
2.2s |
2.1s |
2.2s |
2.1s |
self_tests::kat_ecc384_signature_generate_failure_rom |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
self_tests::kat_ecc384_signature_generate_failure_rt |
2.2s |
2.1s |
2.1s |
2.2s |
2.0s |
1.9s |
2.0s |
2.0s |
2.2s |
2.1s |
2.1s |
2.1s |
self_tests::kat_ecc384_signature_verify_failure_rom |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
self_tests::kat_ecc384_signature_verify_failure_rt |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.0s |
2.0s |
2.0s |
2.3s |
2.0s |
2.1s |
2.1s |
self_tests::kat_halt_check_no_output |
9.0s |
9.1s |
8.8s |
9.6s |
9.0s |
8.7s |
8.7s |
9.5s |
9.5s |
9.2s |
9.8s |
10.1s |
self_tests::kat_hmac384_failure_rom |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
self_tests::kat_hmac384_failure_rt |
2.2s |
2.2s |
2.1s |
2.2s |
2.0s |
2.1s |
2.0s |
2.1s |
2.2s |
2.0s |
2.6s |
2.1s |
self_tests::kat_hmac384_tag_mismatch_rom |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
1.4s |
1.2s |
self_tests::kat_hmac384_tag_mismatch_rt |
2.1s |
2.2s |
2.1s |
2.2s |
2.2s |
2.0s |
2.0s |
2.1s |
2.1s |
2.5s |
2.1s |
2.1s |
self_tests::kat_lms_digest_mismatch_rom |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.4s |
1.2s |
1.2s |
self_tests::kat_lms_digest_mismatch_rt |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.0s |
2.1s |
2.1s |
2.2s |
2.3s |
2.3s |
2.2s |
self_tests::kat_sha1_digest_failure_rom |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha1_digest_failure_rt |
2.2s |
2.1s |
2.1s |
2.2s |
2.1s |
1.9s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
2.1s |
self_tests::kat_sha1_digest_mismatch_rom |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha1_digest_mismatch_rt |
2.2s |
2.1s |
2.1s |
2.1s |
2.1s |
1.9s |
2.0s |
2.0s |
2.1s |
2.0s |
2.2s |
2.0s |
self_tests::kat_sha256_digest_failure_rom |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.0s |
1.0s |
self_tests::kat_sha256_digest_failure_rt |
2.2s |
2.1s |
2.1s |
2.2s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
self_tests::kat_sha256_digest_mismatch_rom |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
1.0s |
self_tests::kat_sha256_digest_mismatch_rt |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
2.0s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
2.1s |
self_tests::kat_sha2_512_384acc_digest_failure_rom |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha2_512_384acc_digest_failure_rt |
2.2s |
2.1s |
2.1s |
2.2s |
2.0s |
2.0s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
self_tests::kat_sha2_512_384acc_digest_mismatch_rom |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha2_512_384acc_digest_mismatch_rt |
2.2s |
2.1s |
2.1s |
2.2s |
2.0s |
2.0s |
2.0s |
2.0s |
2.2s |
2.1s |
2.1s |
2.0s |
self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt |
2.2s |
2.1s |
2.1s |
2.2s |
2.1s |
2.1s |
2.0s |
2.0s |
2.1s |
2.1s |
2.1s |
2.0s |
self_tests::kat_sha384_digest_failure_rom |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
self_tests::kat_sha384_digest_failure_rt |
2.2s |
2.1s |
2.1s |
2.2s |
2.1s |
2.0s |
2.0s |
2.0s |
2.2s |
2.1s |
2.2s |
2.1s |
self_tests::kat_sha384_digest_mismatch_rom |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha384_digest_mismatch_rt |
2.2s |
2.1s |
2.1s |
2.2s |
2.1s |
2.0s |
2.0s |
2.0s |
2.2s |
2.0s |
2.1s |
2.0s |
services::check_version_rom |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.4s |
0.4s |
0.5s |
0.5s |
0.5s |
0.4s |
services::check_version_rt |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.3s |
services::execute_all_services_rom |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.8s |
services::execute_all_services_rt |
2.3s |
2.3s |
2.3s |
2.4s |
2.3s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
services::fips_self_test_rom |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
services::fips_self_test_rt |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
services::version_info_update |
1.3s |
1.2s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.3s |
services::zeroize_halt_check_no_output |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
caliptra-verilated |
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_tracing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-x509 |
|
|
|
|
|
|
|
|
|
|
|
|
fmc_alias_cert::tests::test_cert_signing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_csr::tests::test_csr_signing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
idevid_csr::tests::test_csr_signing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
idevid_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ldevid_cert::tests::test_cert_signing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ldevid_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rt_alias_cert::tests::test_cert_signing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-zeros::bin/caliptra-zeros |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-zeros::test_zeros |
|
|
|
|
|
|
|
|
|
|
|
|
test_zeros |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
caliptra_common |
|
|
|
|
|
|
|
|
|
|
|
|
caliptra_registers_generator::bin/caliptra_registers_generator |
|
|
|
|
|
|
|
|
|
|
|
|
compliance-test::bin/compliance-test |
|
|
|
|
|
|
|
|
|
|
|
|
exec::tests::test_exec_process_not_found |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exec::tests::test_exec_process_returned_nonzero |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exec::tests::test_exec_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_create_dir_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_create_dir_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_read_and_write_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_read_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempdir_delete_error |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempdir_deleted |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempfile |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempfile_drop_on_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_write_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_check_reference_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg |
|
|
|
|
|
|
|
|
|
|
|
|
tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_of_arrays |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_of_arrays_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_truncate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_truncate_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-codegen |
|
|
|
|
|
|
|
|
|
|
|
|
camel_ident_tests::test_camel_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
generate_enums_test::test_generate_enums |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
snake_ident_tests::test_snake_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-schema |
|
|
|
|
|
|
|
|
|
|
|
|
registerfield_tests::test_mask |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
validate::compute_reg_type_name_tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
vector_gen::bin/vector_gen |
|
|
|
|
|
|
|
|
|
|
|
|
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.39s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.39s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.45s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.46s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.44s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.40s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 107.00s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 106.14s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 102.58s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 104.88s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 59.33s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 59.21s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 61.05s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.60s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 62.22s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 59.00s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.54s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 59.43s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.20s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.16s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.21s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.20s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,367 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,277 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,341 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,817 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
45,553 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,073 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,381 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,277 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,339 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,609 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,109 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,539 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,569 UART: ecc384::test_gen_key_pair...[ok]
26,107 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,423 UART: ecc384::test_sign...[ok]
43,385 UART: ecc384::test_verify...[ok]
52,331 UART: ecc384::test_verify_r...[ok]
61,188 UART: ecc384::test_verify_failure...[ok]
69,754 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,010 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,619 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,407 UART: ecc384::test_gen_key_pair...[ok]
25,547 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,831 UART: ecc384::test_sign...[ok]
43,025 UART: ecc384::test_verify...[ok]
52,359 UART: ecc384::test_verify_r...[ok]
61,022 UART: ecc384::test_verify_failure...[ok]
69,410 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,504 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,019 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,819 UART: ecc384::test_gen_key_pair...[ok]
26,095 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,261 UART: ecc384::test_sign...[ok]
43,199 UART: ecc384::test_verify...[ok]
52,027 UART: ecc384::test_verify_r...[ok]
60,182 UART: ecc384::test_verify_failure...[ok]
69,024 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,308 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,037 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,217 UART: ecc384::test_gen_key_pair...[ok]
26,507 UART: ecc384::test_gen_key_pair_with_iv...[ok]
37,207 UART: ecc384::test_sign...[ok]
44,263 UART: ecc384::test_verify...[ok]
53,169 UART: ecc384::test_verify_r...[ok]
61,986 UART: ecc384::test_verify_failure...[ok]
70,944 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,742 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,553 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,521 UART: ecc384::test_gen_key_pair...[ok]
25,461 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,949 UART: ecc384::test_sign...[ok]
42,349 UART: ecc384::test_verify...[ok]
51,393 UART: ecc384::test_verify_r...[ok]
59,540 UART: ecc384::test_verify_failure...[ok]
68,288 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
86,792 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
114,383 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
13,875 UART: ecc384::test_gen_key_pair...[ok]
24,999 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,221 UART: ecc384::test_sign...[ok]
41,977 UART: ecc384::test_verify...[ok]
50,915 UART: ecc384::test_verify_r...[ok]
59,766 UART: ecc384::test_verify_failure...[ok]
68,916 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,152 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
114,653 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,935 UART: ecc384::test_gen_key_pair...[ok]
25,863 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,505 UART: ecc384::test_sign...[ok]
43,301 UART: ecc384::test_verify...[ok]
52,487 UART: ecc384::test_verify_r...[ok]
61,188 UART: ecc384::test_verify_failure...[ok]
69,888 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,680 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,597 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,827 UART: ecc384::test_gen_key_pair...[ok]
26,277 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,757 UART: ecc384::test_sign...[ok]
43,557 UART: ecc384::test_verify...[ok]
52,457 UART: ecc384::test_verify_r...[ok]
61,080 UART: ecc384::test_verify_failure...[ok]
69,518 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,918 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,267 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,797 UART: ecc384::test_gen_key_pair...[ok]
25,763 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,099 UART: ecc384::test_sign...[ok]
42,751 UART: ecc384::test_verify...[ok]
52,005 UART: ecc384::test_verify_r...[ok]
60,410 UART: ecc384::test_verify_failure...[ok]
69,118 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,484 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
114,715 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,489 UART: ecc384::test_gen_key_pair...[ok]
25,617 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,123 UART: ecc384::test_sign...[ok]
43,033 UART: ecc384::test_verify...[ok]
52,209 UART: ecc384::test_verify_r...[ok]
60,678 UART: ecc384::test_verify_failure...[ok]
69,670 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,486 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,131 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,085 UART: ecc384::test_gen_key_pair...[ok]
26,215 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,571 UART: ecc384::test_sign...[ok]
43,033 UART: ecc384::test_verify...[ok]
51,911 UART: ecc384::test_verify_r...[ok]
60,780 UART: ecc384::test_verify_failure...[ok]
69,870 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,056 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,373 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,791 UART: ecc384::test_gen_key_pair...[ok]
25,863 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,423 UART: ecc384::test_sign...[ok]
43,555 UART: ecc384::test_verify...[ok]
52,809 UART: ecc384::test_verify_r...[ok]
61,084 UART: ecc384::test_verify_failure...[ok]
70,276 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,332 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,707 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,684 UART: hmac384::test_hmac0...[ok]
13,843 UART: hmac384::test_hmac1...[ok]
17,860 UART: hmac384::test_hmac2...[ok]
37,685 UART: hmac384::test_hmac3...[ok]
57,433 UART: hmac384::test_hmac4...[ok]
77,626 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,859 UART: hmac384::test_hmac5...[ok]
121,215 UART: hmac384::test_kdf0...[ok]
137,947 UART: hmac384::test_kdf1...[ok]
153,667 UART: hmac384::test_kdf2...[ok]
159,350 UART: hmac384::test_hmac_multi_block...[ok]
165,415 UART: hmac384::test_hmac_exact_single_block...[ok]
171,385 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,504 UART: hmac384::test_hmac0...[ok]
13,497 UART: hmac384::test_hmac1...[ok]
17,514 UART: hmac384::test_hmac2...[ok]
37,547 UART: hmac384::test_hmac3...[ok]
57,781 UART: hmac384::test_hmac4...[ok]
77,362 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,095 UART: hmac384::test_hmac5...[ok]
120,737 UART: hmac384::test_kdf0...[ok]
137,213 UART: hmac384::test_kdf1...[ok]
152,397 UART: hmac384::test_kdf2...[ok]
158,078 UART: hmac384::test_hmac_multi_block...[ok]
163,751 UART: hmac384::test_hmac_exact_single_block...[ok]
169,757 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,876 UART: hmac384::test_hmac0...[ok]
14,065 UART: hmac384::test_hmac1...[ok]
18,346 UART: hmac384::test_hmac2...[ok]
38,419 UART: hmac384::test_hmac3...[ok]
59,445 UART: hmac384::test_hmac4...[ok]
79,294 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,973 UART: hmac384::test_hmac5...[ok]
122,933 UART: hmac384::test_kdf0...[ok]
139,573 UART: hmac384::test_kdf1...[ok]
155,235 UART: hmac384::test_kdf2...[ok]
160,950 UART: hmac384::test_hmac_multi_block...[ok]
166,995 UART: hmac384::test_hmac_exact_single_block...[ok]
173,075 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,942 UART: hmac384::test_hmac0...[ok]
14,159 UART: hmac384::test_hmac1...[ok]
18,542 UART: hmac384::test_hmac2...[ok]
38,095 UART: hmac384::test_hmac3...[ok]
58,603 UART: hmac384::test_hmac4...[ok]
78,176 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,415 UART: hmac384::test_hmac5...[ok]
122,559 UART: hmac384::test_kdf0...[ok]
139,723 UART: hmac384::test_kdf1...[ok]
155,541 UART: hmac384::test_kdf2...[ok]
161,254 UART: hmac384::test_hmac_multi_block...[ok]
167,327 UART: hmac384::test_hmac_exact_single_block...[ok]
173,513 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,530 UART: hmac384::test_hmac0...[ok]
13,527 UART: hmac384::test_hmac1...[ok]
17,612 UART: hmac384::test_hmac2...[ok]
37,049 UART: hmac384::test_hmac3...[ok]
56,865 UART: hmac384::test_hmac4...[ok]
76,892 UART: hmac384::test_hmac_kv_multiblock...[ok]
100,621 UART: hmac384::test_hmac5...[ok]
120,759 UART: hmac384::test_kdf0...[ok]
137,549 UART: hmac384::test_kdf1...[ok]
152,555 UART: hmac384::test_kdf2...[ok]
158,046 UART: hmac384::test_hmac_multi_block...[ok]
163,921 UART: hmac384::test_hmac_exact_single_block...[ok]
169,849 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,660 UART: hmac384::test_hmac0...[ok]
13,589 UART: hmac384::test_hmac1...[ok]
17,674 UART: hmac384::test_hmac2...[ok]
37,455 UART: hmac384::test_hmac3...[ok]
56,971 UART: hmac384::test_hmac4...[ok]
77,366 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,121 UART: hmac384::test_hmac5...[ok]
120,861 UART: hmac384::test_kdf0...[ok]
137,285 UART: hmac384::test_kdf1...[ok]
152,909 UART: hmac384::test_kdf2...[ok]
158,438 UART: hmac384::test_hmac_multi_block...[ok]
164,193 UART: hmac384::test_hmac_exact_single_block...[ok]
170,171 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,830 UART: hmac384::test_hmac0...[ok]
14,121 UART: hmac384::test_hmac1...[ok]
18,292 UART: hmac384::test_hmac2...[ok]
38,279 UART: hmac384::test_hmac3...[ok]
58,501 UART: hmac384::test_hmac4...[ok]
78,042 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,861 UART: hmac384::test_hmac5...[ok]
121,759 UART: hmac384::test_kdf0...[ok]
138,023 UART: hmac384::test_kdf1...[ok]
153,975 UART: hmac384::test_kdf2...[ok]
159,686 UART: hmac384::test_hmac_multi_block...[ok]
165,713 UART: hmac384::test_hmac_exact_single_block...[ok]
171,791 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
10,014 UART: hmac384::test_hmac0...[ok]
14,177 UART: hmac384::test_hmac1...[ok]
18,406 UART: hmac384::test_hmac2...[ok]
38,475 UART: hmac384::test_hmac3...[ok]
58,445 UART: hmac384::test_hmac4...[ok]
78,432 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,429 UART: hmac384::test_hmac5...[ok]
122,099 UART: hmac384::test_kdf0...[ok]
138,601 UART: hmac384::test_kdf1...[ok]
154,189 UART: hmac384::test_kdf2...[ok]
159,988 UART: hmac384::test_hmac_multi_block...[ok]
165,797 UART: hmac384::test_hmac_exact_single_block...[ok]
171,819 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,640 UART: hmac384::test_hmac0...[ok]
13,629 UART: hmac384::test_hmac1...[ok]
17,582 UART: hmac384::test_hmac2...[ok]
37,471 UART: hmac384::test_hmac3...[ok]
56,835 UART: hmac384::test_hmac4...[ok]
77,250 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,235 UART: hmac384::test_hmac5...[ok]
120,275 UART: hmac384::test_kdf0...[ok]
136,591 UART: hmac384::test_kdf1...[ok]
152,355 UART: hmac384::test_kdf2...[ok]
157,910 UART: hmac384::test_hmac_multi_block...[ok]
163,715 UART: hmac384::test_hmac_exact_single_block...[ok]
169,611 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,462 UART: hmac384::test_hmac0...[ok]
13,399 UART: hmac384::test_hmac1...[ok]
17,566 UART: hmac384::test_hmac2...[ok]
37,017 UART: hmac384::test_hmac3...[ok]
57,155 UART: hmac384::test_hmac4...[ok]
77,780 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,019 UART: hmac384::test_hmac5...[ok]
121,419 UART: hmac384::test_kdf0...[ok]
137,753 UART: hmac384::test_kdf1...[ok]
152,987 UART: hmac384::test_kdf2...[ok]
158,700 UART: hmac384::test_hmac_multi_block...[ok]
164,579 UART: hmac384::test_hmac_exact_single_block...[ok]
170,553 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,906 UART: hmac384::test_hmac0...[ok]
14,089 UART: hmac384::test_hmac1...[ok]
18,496 UART: hmac384::test_hmac2...[ok]
38,539 UART: hmac384::test_hmac3...[ok]
58,467 UART: hmac384::test_hmac4...[ok]
78,336 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,839 UART: hmac384::test_hmac5...[ok]
122,717 UART: hmac384::test_kdf0...[ok]
140,061 UART: hmac384::test_kdf1...[ok]
155,699 UART: hmac384::test_kdf2...[ok]
161,496 UART: hmac384::test_hmac_multi_block...[ok]
167,667 UART: hmac384::test_hmac_exact_single_block...[ok]
173,789 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,990 UART: hmac384::test_hmac0...[ok]
14,241 UART: hmac384::test_hmac1...[ok]
18,526 UART: hmac384::test_hmac2...[ok]
38,175 UART: hmac384::test_hmac3...[ok]
58,619 UART: hmac384::test_hmac4...[ok]
79,288 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,361 UART: hmac384::test_hmac5...[ok]
123,205 UART: hmac384::test_kdf0...[ok]
139,665 UART: hmac384::test_kdf1...[ok]
155,081 UART: hmac384::test_kdf2...[ok]
160,866 UART: hmac384::test_hmac_multi_block...[ok]
166,891 UART: hmac384::test_hmac_exact_single_block...[ok]
173,017 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 6.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f57c4000ed0`,
right: `0x7f57c4000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f9c9c000ed0`,
right: `0x7f9c9c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f5c48000ed0`,
right: `0x7f5c48000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f9654000ed0`,
right: `0x7f9654000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f829c000ed0`,
right: `0x7f829c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7faf9c000ed0`,
right: `0x7faf9c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f2970000ed0`,
right: `0x7f2970000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f7594000ed0`,
right: `0x7f7594000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f7dc8000ed0`,
right: `0x7f7dc8000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fe188000ed0`,
right: `0x7fe188000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f25c8000ed0`,
right: `0x7f25c8000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f336c000ed0`,
right: `0x7f336c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.06s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.06s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.08s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.01s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.01s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.03s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.54s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.39s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.50s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.47s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.32s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.35s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.51s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.42s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.55s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.38s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.32s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.26s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.24s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.17s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.20s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.20s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.15s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.19s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Unprovisioned
85,541 UART: [state] DebugLocked = No
86,269 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,933 UART: [kat] SHA2-256
881,864 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,979 UART: [kat] ++
886,131 UART: [kat] sha1
890,371 UART: [kat] SHA2-256
892,309 UART: [kat] SHA2-384
894,932 UART: [kat] SHA2-512-ACC
896,833 UART: [kat] ECC-384
902,536 UART: [kat] HMAC-384Kdf
906,936 UART: [kat] LMS
1,475,132 UART: [kat] --
1,476,011 UART: [cold-reset] ++
1,476,553 UART: [fht] Storing FHT @ 0x50003400
1,479,278 UART: [idev] ++
1,479,446 UART: [idev] CDI.KEYID = 6
1,479,806 UART: [idev] SUBJECT.KEYID = 7
1,480,230 UART: [idev] UDS.KEYID = 0
1,480,575 ready_for_fw is high
1,480,575 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,064 UART: [idev] Erasing UDS.KEYID = 0
1,504,914 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,720 UART: [idev] --
1,514,945 UART: [ldev] ++
1,515,113 UART: [ldev] CDI.KEYID = 6
1,515,476 UART: [ldev] SUBJECT.KEYID = 5
1,515,902 UART: [ldev] AUTHORITY.KEYID = 7
1,516,365 UART: [ldev] FE.KEYID = 1
1,521,329 UART: [ldev] Erasing FE.KEYID = 1
1,546,854 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,280 UART: [ldev] --
1,585,637 UART: [fwproc] Waiting for Commands...
1,586,252 UART: [fwproc] Received command 0x46574c44
1,587,043 UART: [fwproc] Received Image of size 31656 bytes
1,937,448 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,964,980 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,994,332 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,006,179 >>> mbox cmd response: success
2,007,405 UART: [afmc] ++
2,007,573 UART: [afmc] CDI.KEYID = 6
2,007,935 UART: [afmc] SUBJECT.KEYID = 7
2,008,360 UART: [afmc] AUTHORITY.KEYID = 5
2,043,315 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,059,699 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,060,479 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,066,207 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,072,092 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,077,782 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,085,673 UART: [afmc] --
2,086,659 UART: [cold-reset] --
2,087,245 UART: [state] Locking Datavault
2,088,640 UART: [state] Locking PCR0, PCR1 and PCR31
2,089,244 UART: [state] Locking ICCM
2,089,754 UART: [exit] Launching FMC @ 0x40000130
2,095,083 UART:
2,095,099 UART: Running Caliptra FMC ...
2,095,507 UART:
2,095,561 UART: [state] CFI Enabled
2,106,270 UART: [fht] FMC Alias Private Key: 7
2,214,709 UART: [art] Extend RT PCRs Done
2,215,137 UART: [art] Lock RT PCRs Done
2,216,917 UART: [art] Populate DV Done
2,225,328 UART: [fht] FMC Alias Private Key: 7
2,226,510 UART: [art] Derive CDI
2,226,790 UART: [art] Store in in slot 0x4
2,312,783 UART: [art] Derive Key Pair
2,313,143 UART: [art] Store priv key in slot 0x5
2,327,027 UART: [art] Derive Key Pair - Done
2,341,962 UART: [art] Signing Cert with AUTHO
2,342,442 UART: RITY.KEYID = 7
2,357,578 UART: [art] Erasing AUTHORITY.KEYID = 7
2,358,343 UART: [art] PUB.X = 77B77E2508C847E53F8E2E554B630C3E1D106BCB350AA3852E6BE6240624C6C35359B1EF8F4FD4043425424444218E58
2,365,092 UART: [art] PUB.Y = 4C77D4093DFE58D549F49E77FE250CB9ED1C6D22EC627F386C8DE42E02B5EE0966F5A439AE848C41F441A05260E8C11A
2,372,040 UART: [art] SIG.R = 3D791B8AE2234E177125B3D544E50BCE308229899AF659C738313DA9FDFFB71B21316A984A9823034BF62B1F8806D45A
2,378,799 UART: [art] SIG.S = 8C2DD6CF11E3906949F189B4A1DF470C7F1A0BF65A6E220533D2677F564B1EBD9BB51606DDF4F7CA3645F63B9857C601
2,402,412 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,387 ready_for_fw is high
1,362,387 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,855,391 >>> mbox cmd response: success
1,915,559 UART:
1,915,575 UART: Running Caliptra FMC ...
1,915,983 UART:
1,916,037 UART: [state] CFI Enabled
1,926,250 UART: [fht] FMC Alias Private Key: 7
2,034,177 UART: [art] Extend RT PCRs Done
2,034,605 UART: [art] Lock RT PCRs Done
2,036,299 UART: [art] Populate DV Done
2,044,472 UART: [fht] FMC Alias Private Key: 7
2,045,486 UART: [art] Derive CDI
2,045,766 UART: [art] Store in in slot 0x4
2,131,695 UART: [art] Derive Key Pair
2,132,055 UART: [art] Store priv key in slot 0x5
2,145,245 UART: [art] Derive Key Pair - Done
2,160,051 UART: [art] Signing Cert with AUTHO
2,160,531 UART: RITY.KEYID = 7
2,175,611 UART: [art] Erasing AUTHORITY.KEYID = 7
2,176,376 UART: [art] PUB.X = 715D264C94D10DE8F13CFA555B8C62D83B978916BFA6062C462291792A0839993A8DC2AC971BA985CE8D4D9AB7C930B1
2,183,141 UART: [art] PUB.Y = D4E07CB342BA9AD77C53818F0A304519D601690FA7052AA7E9BA1905D7A86B9DACD86392AE8FC82E1A5EDA50AEF77040
2,190,090 UART: [art] SIG.R = 52BBCC089DDC8C6E4796DF9031B21122231A0132D8AEBD8D896004DC039840DF10DC5813B72C9BB1EB6E4C5C5FBC8CBB
2,196,866 UART: [art] SIG.S = EFCCD5BCBD929390CEE15753C0E99FF84394204D264C97C4E5AF2B84986FBD16258A680EA432CF518BBA679ADA7973C3
2,220,589 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,408 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,936 UART: [kat] SHA2-256
881,867 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,982 UART: [kat] ++
886,134 UART: [kat] sha1
890,372 UART: [kat] SHA2-256
892,310 UART: [kat] SHA2-384
895,089 UART: [kat] SHA2-512-ACC
896,990 UART: [kat] ECC-384
902,579 UART: [kat] HMAC-384Kdf
907,185 UART: [kat] LMS
1,475,381 UART: [kat] --
1,476,336 UART: [cold-reset] ++
1,476,734 UART: [fht] Storing FHT @ 0x50003400
1,479,675 UART: [idev] ++
1,479,843 UART: [idev] CDI.KEYID = 6
1,480,203 UART: [idev] SUBJECT.KEYID = 7
1,480,627 UART: [idev] UDS.KEYID = 0
1,480,972 ready_for_fw is high
1,480,972 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,257 UART: [idev] Erasing UDS.KEYID = 0
1,505,153 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,667 UART: [idev] --
1,514,734 UART: [ldev] ++
1,514,902 UART: [ldev] CDI.KEYID = 6
1,515,265 UART: [ldev] SUBJECT.KEYID = 5
1,515,691 UART: [ldev] AUTHORITY.KEYID = 7
1,516,154 UART: [ldev] FE.KEYID = 1
1,521,584 UART: [ldev] Erasing FE.KEYID = 1
1,546,789 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,975 UART: [ldev] --
1,586,474 UART: [fwproc] Waiting for Commands...
1,587,219 UART: [fwproc] Received command 0x46574c44
1,588,010 UART: [fwproc] Received Image of size 31656 bytes
1,937,429 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,964,091 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,993,443 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,005,176 >>> mbox cmd response: success
2,006,280 UART: [afmc] ++
2,006,448 UART: [afmc] CDI.KEYID = 6
2,006,810 UART: [afmc] SUBJECT.KEYID = 7
2,007,235 UART: [afmc] AUTHORITY.KEYID = 5
2,042,844 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,059,188 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,059,968 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,065,696 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,071,581 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,077,271 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,085,174 UART: [afmc] --
2,086,136 UART: [cold-reset] --
2,086,862 UART: [state] Locking Datavault
2,087,851 UART: [state] Locking PCR0, PCR1 and PCR31
2,088,455 UART: [state] Locking ICCM
2,089,115 UART: [exit] Launching FMC @ 0x40000130
2,094,444 UART:
2,094,460 UART: Running Caliptra FMC ...
2,094,868 UART:
2,095,011 UART: [state] CFI Enabled
2,105,298 UART: [fht] FMC Alias Private Key: 7
2,213,325 UART: [art] Extend RT PCRs Done
2,213,753 UART: [art] Lock RT PCRs Done
2,215,081 UART: [art] Populate DV Done
2,223,220 UART: [fht] FMC Alias Private Key: 7
2,224,224 UART: [art] Derive CDI
2,224,504 UART: [art] Store in in slot 0x4
2,310,287 UART: [art] Derive Key Pair
2,310,647 UART: [art] Store priv key in slot 0x5
2,323,979 UART: [art] Derive Key Pair - Done
2,338,857 UART: [art] Signing Cert with AUTHO
2,339,337 UART: RITY.KEYID = 7
2,354,757 UART: [art] Erasing AUTHORITY.KEYID = 7
2,355,522 UART: [art] PUB.X = 14FFA65FA4D531D4178AFA7715BBE9EA77ED6998052382210C59CC131F35BD8CB64313C019BB647978BD42580CA21585
2,362,285 UART: [art] PUB.Y = 93D5D72991757CE80A86040AC32A0C73D9ABD21A256821923C0E0E412319E001CEFA82DC0747EAD504601355388DC38A
2,369,206 UART: [art] SIG.R = 3501C798385C571C06A0E9B44EB960B8C90489974E8BA2C98E9A86213B69BEE6BDB52CEFE0F0A11805DE80541A21079A
2,375,965 UART: [art] SIG.S = 4081A6DBC78FDA0FF57FF9C0B26A58FAF357A1D6C07ED0F648035A5ED40599C2A90992BDD22DBC7005D99856DBA30BBC
2,400,103 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,356 ready_for_fw is high
1,363,356 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,857,864 >>> mbox cmd response: success
1,919,490 UART:
1,919,506 UART: Running Caliptra FMC ...
1,919,914 UART:
1,920,057 UART: [state] CFI Enabled
1,930,786 UART: [fht] FMC Alias Private Key: 7
2,038,311 UART: [art] Extend RT PCRs Done
2,038,739 UART: [art] Lock RT PCRs Done
2,040,291 UART: [art] Populate DV Done
2,048,780 UART: [fht] FMC Alias Private Key: 7
2,049,842 UART: [art] Derive CDI
2,050,122 UART: [art] Store in in slot 0x4
2,135,693 UART: [art] Derive Key Pair
2,136,053 UART: [art] Store priv key in slot 0x5
2,149,885 UART: [art] Derive Key Pair - Done
2,164,559 UART: [art] Signing Cert with AUTHO
2,165,039 UART: RITY.KEYID = 7
2,180,111 UART: [art] Erasing AUTHORITY.KEYID = 7
2,180,876 UART: [art] PUB.X = A0541E52BABDA0ED2FFD320B823DE30DA49C24AB3C9A5E848060653186FFA3AE04E0EF63C4CCF9C8563420C968DFE84B
2,187,657 UART: [art] PUB.Y = E5563330A4926B65DD4300C291460F662F3C4AEF5D8244DADB945573B785CB1AFC004DE753EA20B0651C341A55E98BFC
2,194,566 UART: [art] SIG.R = B8DF7E50D151076F2FD5E3F25801D6FBA870D83C97E83A611C54929A7FA3BC4F3BB68655EF25B68354AD425A96A7A039
2,201,338 UART: [art] SIG.S = E6E5499893235B9BAC1364D877F2C2906EBC47AC3260FF253816118BC9CE068E1A7B6A4FC782E79805D427C1F21F9BAB
2,224,880 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
893,206 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,331 UART: [kat] ++
897,483 UART: [kat] sha1
901,729 UART: [kat] SHA2-256
903,669 UART: [kat] SHA2-384
906,530 UART: [kat] SHA2-512-ACC
908,431 UART: [kat] ECC-384
918,208 UART: [kat] HMAC-384Kdf
922,770 UART: [kat] LMS
1,171,098 UART: [kat] --
1,171,871 UART: [cold-reset] ++
1,172,283 UART: [fht] FHT @ 0x50003400
1,175,008 UART: [idev] ++
1,175,176 UART: [idev] CDI.KEYID = 6
1,175,536 UART: [idev] SUBJECT.KEYID = 7
1,175,960 UART: [idev] UDS.KEYID = 0
1,176,305 ready_for_fw is high
1,176,305 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,000 UART: [idev] Erasing UDS.KEYID = 0
1,200,569 UART: [idev] Sha1 KeyId Algorithm
1,208,977 UART: [idev] --
1,209,993 UART: [ldev] ++
1,210,161 UART: [ldev] CDI.KEYID = 6
1,210,524 UART: [ldev] SUBJECT.KEYID = 5
1,210,950 UART: [ldev] AUTHORITY.KEYID = 7
1,211,413 UART: [ldev] FE.KEYID = 1
1,216,733 UART: [ldev] Erasing FE.KEYID = 1
1,243,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,427 UART: [ldev] --
1,282,910 UART: [fwproc] Wait for Commands...
1,283,662 UART: [fwproc] Recv command 0x46574c44
1,284,390 UART: [fwproc] Recv'd Img size: 31656 bytes
1,635,096 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,171 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,475 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,703,204 >>> mbox cmd response: success
1,704,346 UART: [afmc] ++
1,704,514 UART: [afmc] CDI.KEYID = 6
1,704,876 UART: [afmc] SUBJECT.KEYID = 7
1,705,301 UART: [afmc] AUTHORITY.KEYID = 5
1,740,314 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,279 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,164 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,883 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,643 UART: [afmc] --
1,783,523 UART: [cold-reset] --
1,784,351 UART: [state] Locking Datavault
1,785,500 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,104 UART: [state] Locking ICCM
1,786,646 UART: [exit] Launching FMC @ 0x40000130
1,791,975 UART:
1,791,991 UART: Running Caliptra FMC ...
1,792,399 UART:
1,792,453 UART: [state] CFI Enabled
1,802,758 UART: [fht] FMC Alias Private Key: 7
1,910,507 UART: [art] Extend RT PCRs Done
1,910,935 UART: [art] Lock RT PCRs Done
1,912,291 UART: [art] Populate DV Done
1,920,496 UART: [fht] FMC Alias Private Key: 7
1,921,526 UART: [art] Derive CDI
1,921,806 UART: [art] Store in in slot 0x4
2,007,565 UART: [art] Derive Key Pair
2,007,925 UART: [art] Store priv key in slot 0x5
2,021,229 UART: [art] Derive Key Pair - Done
2,035,850 UART: [art] Signing Cert with AUTHO
2,036,330 UART: RITY.KEYID = 7
2,051,426 UART: [art] Erasing AUTHORITY.KEYID = 7
2,052,191 UART: [art] PUB.X = FDB6A09DB16E0DDC126692FC4508E8D07E807213DF942ADB0C96BA98C9C317882E492AE326963C8E7F1A2AFEAA1B9381
2,058,966 UART: [art] PUB.Y = B0E56124EB5ECB1A7C40E3ABE33F703CBF16E69CA5A4FF45B85C02F985F2A0DA0DF392EB65E69F7F780051DC8F0A2249
2,065,905 UART: [art] SIG.R = 10301EFF73F92B8A9900D2E333CA80B1C8F68580C980487BCDB5645E384F41D0C21E677DD19B14713EA6E4BEE66F738D
2,072,659 UART: [art] SIG.S = B840CDC51C60AA8AB4574C9056548D7BCDF58D3F8F2310E1CDEB2B5E50694791F3C301FE335CFD05DD8D8E3F9428D036
2,096,581 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,091 ready_for_fw is high
1,060,091 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,555,393 >>> mbox cmd response: success
1,617,701 UART:
1,617,717 UART: Running Caliptra FMC ...
1,618,125 UART:
1,618,179 UART: [state] CFI Enabled
1,628,834 UART: [fht] FMC Alias Private Key: 7
1,736,801 UART: [art] Extend RT PCRs Done
1,737,229 UART: [art] Lock RT PCRs Done
1,738,809 UART: [art] Populate DV Done
1,746,802 UART: [fht] FMC Alias Private Key: 7
1,747,984 UART: [art] Derive CDI
1,748,264 UART: [art] Store in in slot 0x4
1,833,679 UART: [art] Derive Key Pair
1,834,039 UART: [art] Store priv key in slot 0x5
1,847,109 UART: [art] Derive Key Pair - Done
1,862,226 UART: [art] Signing Cert with AUTHO
1,862,706 UART: RITY.KEYID = 7
1,877,558 UART: [art] Erasing AUTHORITY.KEYID = 7
1,878,323 UART: [art] PUB.X = B07E3E6A8358E9276369F74F5C0DB897B1769096B29AEBE26DEC97B90243D844FDDF7594CC7D567E910650108E61FE7D
1,885,088 UART: [art] PUB.Y = 074B0BABDB1F09F871910398CAAC9F429E8AB07F5C0B4584AC5C22B79D2304BFDDDAE36B9B8CFFF90B6AD26239523F99
1,892,037 UART: [art] SIG.R = E809A6DA56CF5EC7E39014045388CDF0FB8EE8D059CDD6CE6CF396BC55FDC763F3D97E157E52D4159001B7AC4A73FEB7
1,898,818 UART: [art] SIG.S = 936C8A421BD6663044F4AA1F2B8A0D4D1A2F31C2B2773F32CB6F9CA607E557804F07D88E0FEA2D13F3B24CA02EDDC571
1,922,282 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
87,028 UART: [state] WD Timer not started. Device not locked for debugging
88,345 UART: [kat] SHA2-256
893,995 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,120 UART: [kat] ++
898,272 UART: [kat] sha1
902,394 UART: [kat] SHA2-256
904,334 UART: [kat] SHA2-384
906,949 UART: [kat] SHA2-512-ACC
908,850 UART: [kat] ECC-384
918,579 UART: [kat] HMAC-384Kdf
923,343 UART: [kat] LMS
1,171,671 UART: [kat] --
1,172,474 UART: [cold-reset] ++
1,172,964 UART: [fht] FHT @ 0x50003400
1,175,653 UART: [idev] ++
1,175,821 UART: [idev] CDI.KEYID = 6
1,176,181 UART: [idev] SUBJECT.KEYID = 7
1,176,605 UART: [idev] UDS.KEYID = 0
1,176,950 ready_for_fw is high
1,176,950 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,647 UART: [idev] Erasing UDS.KEYID = 0
1,201,750 UART: [idev] Sha1 KeyId Algorithm
1,210,264 UART: [idev] --
1,211,486 UART: [ldev] ++
1,211,654 UART: [ldev] CDI.KEYID = 6
1,212,017 UART: [ldev] SUBJECT.KEYID = 5
1,212,443 UART: [ldev] AUTHORITY.KEYID = 7
1,212,906 UART: [ldev] FE.KEYID = 1
1,218,234 UART: [ldev] Erasing FE.KEYID = 1
1,244,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,732 UART: [ldev] --
1,284,079 UART: [fwproc] Wait for Commands...
1,284,829 UART: [fwproc] Recv command 0x46574c44
1,285,557 UART: [fwproc] Recv'd Img size: 31656 bytes
1,636,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,663,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,378 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,704,171 >>> mbox cmd response: success
1,705,407 UART: [afmc] ++
1,705,575 UART: [afmc] CDI.KEYID = 6
1,705,937 UART: [afmc] SUBJECT.KEYID = 7
1,706,362 UART: [afmc] AUTHORITY.KEYID = 5
1,741,819 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,158 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,906 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,764,634 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,519 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,238 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,784,188 UART: [afmc] --
1,785,144 UART: [cold-reset] --
1,786,072 UART: [state] Locking Datavault
1,787,011 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,615 UART: [state] Locking ICCM
1,788,131 UART: [exit] Launching FMC @ 0x40000130
1,793,460 UART:
1,793,476 UART: Running Caliptra FMC ...
1,793,884 UART:
1,794,027 UART: [state] CFI Enabled
1,804,182 UART: [fht] FMC Alias Private Key: 7
1,911,889 UART: [art] Extend RT PCRs Done
1,912,317 UART: [art] Lock RT PCRs Done
1,913,585 UART: [art] Populate DV Done
1,921,868 UART: [fht] FMC Alias Private Key: 7
1,922,854 UART: [art] Derive CDI
1,923,134 UART: [art] Store in in slot 0x4
2,008,859 UART: [art] Derive Key Pair
2,009,219 UART: [art] Store priv key in slot 0x5
2,022,741 UART: [art] Derive Key Pair - Done
2,037,346 UART: [art] Signing Cert with AUTHO
2,037,826 UART: RITY.KEYID = 7
2,052,902 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,667 UART: [art] PUB.X = 0AEF31296156928F264D891ED368AB404352C0581547B74B4818402B683BDE167DCB9B3A5B41235199810ACE6603F7F9
2,060,420 UART: [art] PUB.Y = 31EDCD9E3FCF858DF0A6E3DCA95DCBA099C3383ED1801513871CA37508801256E99C20337CC42487334DFFF6D8B7260B
2,067,372 UART: [art] SIG.R = 59421EA666EBCF937608F01E8E2314EED44D83405C69E3D414855932C53372305BEF223047B93453912B8429746DBA7C
2,074,129 UART: [art] SIG.S = EFBA624EBB34AEC48841612B4A440761033CFC3DB6774A44A568D57C6C0C95B501FF36EEBEAE13F8C848BC77EC7F0B44
2,098,218 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,196 ready_for_fw is high
1,061,196 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,554,340 >>> mbox cmd response: success
1,616,108 UART:
1,616,124 UART: Running Caliptra FMC ...
1,616,532 UART:
1,616,675 UART: [state] CFI Enabled
1,627,402 UART: [fht] FMC Alias Private Key: 7
1,734,827 UART: [art] Extend RT PCRs Done
1,735,255 UART: [art] Lock RT PCRs Done
1,736,527 UART: [art] Populate DV Done
1,744,686 UART: [fht] FMC Alias Private Key: 7
1,745,754 UART: [art] Derive CDI
1,746,034 UART: [art] Store in in slot 0x4
1,831,819 UART: [art] Derive Key Pair
1,832,179 UART: [art] Store priv key in slot 0x5
1,845,715 UART: [art] Derive Key Pair - Done
1,860,258 UART: [art] Signing Cert with AUTHO
1,860,738 UART: RITY.KEYID = 7
1,876,054 UART: [art] Erasing AUTHORITY.KEYID = 7
1,876,819 UART: [art] PUB.X = 7777FBA2ECA39A90A52A00D244226EEDD1B8C353F8FB235115AB226E756CFF37DE6F7CA36B4064E6422FA6BCC05C3841
1,883,581 UART: [art] PUB.Y = CFECDED68C9B6102B49FEBF4ECF9819CF01A64F41CE1917C80C408ABE72E74639E7DF59BEA039C6D2E7A4338B1381507
1,890,537 UART: [art] SIG.R = 932172EE0406764BC6F93107B2B35F08C3BC299FFE2C210CEC2775309A7DAB040A1D024C34DDF111240C5D67DB68B3B2
1,897,286 UART: [art] SIG.S = F0CF558D5E3F37D95007550D85AD8D6D4351225A907E78029F8C5AFAC083024626D6BDA739C70C1FA5E2CBDEB71AB4B1
1,920,995 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
891,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,473 UART: [kat] ++
895,625 UART: [kat] sha1
899,959 UART: [kat] SHA2-256
901,899 UART: [kat] SHA2-384
904,596 UART: [kat] SHA2-512-ACC
906,497 UART: [kat] ECC-384
916,194 UART: [kat] HMAC-384Kdf
920,974 UART: [kat] LMS
1,169,286 UART: [kat] --
1,169,781 UART: [cold-reset] ++
1,170,283 UART: [fht] FHT @ 0x50003400
1,172,719 UART: [idev] ++
1,172,887 UART: [idev] CDI.KEYID = 6
1,173,248 UART: [idev] SUBJECT.KEYID = 7
1,173,673 UART: [idev] UDS.KEYID = 0
1,174,019 ready_for_fw is high
1,174,019 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,499 UART: [idev] Erasing UDS.KEYID = 0
1,198,645 UART: [idev] Sha1 KeyId Algorithm
1,207,517 UART: [idev] --
1,208,644 UART: [ldev] ++
1,208,812 UART: [ldev] CDI.KEYID = 6
1,209,176 UART: [ldev] SUBJECT.KEYID = 5
1,209,603 UART: [ldev] AUTHORITY.KEYID = 7
1,210,066 UART: [ldev] FE.KEYID = 1
1,215,412 UART: [ldev] Erasing FE.KEYID = 1
1,241,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,316 UART: [ldev] --
1,280,734 UART: [fwproc] Wait for Commands...
1,281,323 UART: [fwproc] Recv command 0x46574c44
1,282,056 UART: [fwproc] Recv'd Img size: 31656 bytes
1,632,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,659,759 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,068 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,700,746 >>> mbox cmd response: success
1,701,791 UART: [afmc] ++
1,701,959 UART: [afmc] CDI.KEYID = 6
1,702,322 UART: [afmc] SUBJECT.KEYID = 7
1,702,748 UART: [afmc] AUTHORITY.KEYID = 5
1,737,849 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,754,345 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,755,096 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,760,825 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,766,708 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,772,427 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,780,224 UART: [afmc] --
1,781,354 UART: [cold-reset] --
1,782,080 UART: [state] Locking Datavault
1,783,395 UART: [state] Locking PCR0, PCR1 and PCR31
1,783,999 UART: [state] Locking ICCM
1,784,647 UART: [exit] Launching FMC @ 0x40000130
1,789,976 UART:
1,789,992 UART: Running Caliptra FMC ...
1,790,400 UART:
1,790,454 UART: [state] CFI Enabled
1,801,095 UART: [fht] FMC Alias Private Key: 7
1,908,730 UART: [art] Extend RT PCRs Done
1,909,158 UART: [art] Lock RT PCRs Done
1,910,762 UART: [art] Populate DV Done
1,918,795 UART: [fht] FMC Alias Private Key: 7
1,919,965 UART: [art] Derive CDI
1,920,245 UART: [art] Store in in slot 0x4
2,005,888 UART: [art] Derive Key Pair
2,006,248 UART: [art] Store priv key in slot 0x5
2,019,396 UART: [art] Derive Key Pair - Done
2,033,904 UART: [art] Signing Cert with AUTHO
2,034,384 UART: RITY.KEYID = 7
2,049,760 UART: [art] Erasing AUTHORITY.KEYID = 7
2,050,525 UART: [art] PUB.X = ECAF8BADEECA654D7F8DE172FE6980412D77C849708986ABBA7A6A33A0830C892B72ADD4D74CB6ADA143A6A77800BF3B
2,057,292 UART: [art] PUB.Y = C8FFC7EC4AA6022A8CBAE0C437116940D2E57E1C38F45DBDD19160B36C0C4890E647EA6CF2DA0E1A6D9C6D7725223421
2,064,247 UART: [art] SIG.R = CF779CFB15B9341DBF55BC5FADC227252E5D23CF9A9DC162BD3BCA43B7289FAB3F36D32E081FB4D2DF8574A7037C02E0
2,071,030 UART: [art] SIG.S = 97578226541BDA12D51BA109E64BD3B0CCE14C666E9649CDA420EDB9035D06E8AD7BB6067DEA43CA0CE3E0528C6621D4
2,094,341 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,624 ready_for_fw is high
1,055,624 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,549,552 >>> mbox cmd response: success
1,611,108 UART:
1,611,124 UART: Running Caliptra FMC ...
1,611,532 UART:
1,611,586 UART: [state] CFI Enabled
1,621,805 UART: [fht] FMC Alias Private Key: 7
1,730,006 UART: [art] Extend RT PCRs Done
1,730,434 UART: [art] Lock RT PCRs Done
1,732,068 UART: [art] Populate DV Done
1,740,155 UART: [fht] FMC Alias Private Key: 7
1,741,103 UART: [art] Derive CDI
1,741,383 UART: [art] Store in in slot 0x4
1,827,128 UART: [art] Derive Key Pair
1,827,488 UART: [art] Store priv key in slot 0x5
1,840,384 UART: [art] Derive Key Pair - Done
1,854,928 UART: [art] Signing Cert with AUTHO
1,855,408 UART: RITY.KEYID = 7
1,870,336 UART: [art] Erasing AUTHORITY.KEYID = 7
1,871,101 UART: [art] PUB.X = 1B38D28FD75692A643C58D33FE7F830AE4241E902CAEADE6F875000D4F59CE48177CE5DB29E82CB84BC70E4A52EB6BD0
1,877,856 UART: [art] PUB.Y = 0311A74BEEB0D48A88ACFE6105ABB56F1E2C5E7F5A7ABEE3C1E359645488273CCC83BDE63C12745D35873D67A239461D
1,884,812 UART: [art] SIG.R = B1FCD411A2B320455C41E39E98E6F7B2D1C100B42CA2CE26C61CBCF41D66446DF31F3A4301FE3AA0423D4A336B0A532A
1,891,568 UART: [art] SIG.S = BACBA7118CB9FD4CED67F2F753595B5C58A4C7DA4BF7C4A774DC3F1CB3EFEF733DBDA83A236028E0DAFF8FB00AC170C2
1,915,439 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
891,377 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,506 UART: [kat] ++
895,658 UART: [kat] sha1
900,008 UART: [kat] SHA2-256
901,948 UART: [kat] SHA2-384
904,701 UART: [kat] SHA2-512-ACC
906,602 UART: [kat] ECC-384
916,387 UART: [kat] HMAC-384Kdf
920,981 UART: [kat] LMS
1,169,293 UART: [kat] --
1,170,082 UART: [cold-reset] ++
1,170,646 UART: [fht] FHT @ 0x50003400
1,173,370 UART: [idev] ++
1,173,538 UART: [idev] CDI.KEYID = 6
1,173,899 UART: [idev] SUBJECT.KEYID = 7
1,174,324 UART: [idev] UDS.KEYID = 0
1,174,670 ready_for_fw is high
1,174,670 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,182,352 UART: [idev] Erasing UDS.KEYID = 0
1,199,574 UART: [idev] Sha1 KeyId Algorithm
1,208,628 UART: [idev] --
1,209,575 UART: [ldev] ++
1,209,743 UART: [ldev] CDI.KEYID = 6
1,210,107 UART: [ldev] SUBJECT.KEYID = 5
1,210,534 UART: [ldev] AUTHORITY.KEYID = 7
1,210,997 UART: [ldev] FE.KEYID = 1
1,216,447 UART: [ldev] Erasing FE.KEYID = 1
1,242,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,685 UART: [ldev] --
1,282,181 UART: [fwproc] Wait for Commands...
1,282,884 UART: [fwproc] Recv command 0x46574c44
1,283,617 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,078 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,690,387 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,702,191 >>> mbox cmd response: success
1,703,418 UART: [afmc] ++
1,703,586 UART: [afmc] CDI.KEYID = 6
1,703,949 UART: [afmc] SUBJECT.KEYID = 7
1,704,375 UART: [afmc] AUTHORITY.KEYID = 5
1,740,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,576 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,327 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,056 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,768,939 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,658 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,461 UART: [afmc] --
1,783,517 UART: [cold-reset] --
1,784,205 UART: [state] Locking Datavault
1,785,366 UART: [state] Locking PCR0, PCR1 and PCR31
1,785,970 UART: [state] Locking ICCM
1,786,556 UART: [exit] Launching FMC @ 0x40000130
1,791,885 UART:
1,791,901 UART: Running Caliptra FMC ...
1,792,309 UART:
1,792,452 UART: [state] CFI Enabled
1,803,165 UART: [fht] FMC Alias Private Key: 7
1,911,224 UART: [art] Extend RT PCRs Done
1,911,652 UART: [art] Lock RT PCRs Done
1,913,186 UART: [art] Populate DV Done
1,921,427 UART: [fht] FMC Alias Private Key: 7
1,922,503 UART: [art] Derive CDI
1,922,783 UART: [art] Store in in slot 0x4
2,008,444 UART: [art] Derive Key Pair
2,008,804 UART: [art] Store priv key in slot 0x5
2,022,168 UART: [art] Derive Key Pair - Done
2,036,888 UART: [art] Signing Cert with AUTHO
2,037,368 UART: RITY.KEYID = 7
2,052,412 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,177 UART: [art] PUB.X = E15E9FFA2732090ACF5A4CF6AB35DE292C7BCF7862781A009D0B2C91413385A8B4E7AD0D3806DE9B00E4E4E688C96447
2,059,898 UART: [art] PUB.Y = E6853D4AC2271965F01FB7793429597ECBA2F4B78FB84A3CECA9E4025D5C8897CEAE1042A2BFC84A543F5E626FD5A281
2,066,857 UART: [art] SIG.R = 6F28B67550A38CA6FCCADBF8EAB05A66F92CA7C4C268ADD6081C53446713A9E4C9FC12AFF81A1E7192744FD962F8049F
2,073,637 UART: [art] SIG.S = 89EB44DAC8B88E18D66B206F61F7435EBC291D04458F531C3A03F84CE8E08DE505DE8B368E532EE1FEA3761E1FA33AB2
2,097,086 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,273 ready_for_fw is high
1,056,273 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,552,561 >>> mbox cmd response: success
1,614,481 UART:
1,614,497 UART: Running Caliptra FMC ...
1,614,905 UART:
1,615,048 UART: [state] CFI Enabled
1,625,773 UART: [fht] FMC Alias Private Key: 7
1,733,818 UART: [art] Extend RT PCRs Done
1,734,246 UART: [art] Lock RT PCRs Done
1,735,740 UART: [art] Populate DV Done
1,743,961 UART: [fht] FMC Alias Private Key: 7
1,744,895 UART: [art] Derive CDI
1,745,175 UART: [art] Store in in slot 0x4
1,830,742 UART: [art] Derive Key Pair
1,831,102 UART: [art] Store priv key in slot 0x5
1,844,028 UART: [art] Derive Key Pair - Done
1,858,702 UART: [art] Signing Cert with AUTHO
1,859,182 UART: RITY.KEYID = 7
1,874,490 UART: [art] Erasing AUTHORITY.KEYID = 7
1,875,255 UART: [art] PUB.X = 431087956CFD018EAFADDE9AF9724048B28A99FA2ACC7A89E17B07A47752EC02B96CFA7C8CF88815EB66A8626D05206C
1,882,025 UART: [art] PUB.Y = 6791BD8D60AB9C73E619C8ABBF8754597890032CA6BE566C7E62C0E536924B980A4B061F66C1C9AE002DF85AD3958E40
1,888,948 UART: [art] SIG.R = 7170324BE04C368530BC058B1E29BB46F1CCDB29D516F9F0CE904C957AC07D6F3805AEE98C43137C28F47BFCD0B639D8
1,895,722 UART: [art] SIG.S = CEF3F471B1344BA1E6229A9D7CA8E233B004E295CCCCEF53C8C719BC3CA218049E26C0A0A2701D4B95B8792E978275C3
1,919,288 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.81s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,719 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,247 UART: [kat] SHA2-256
882,178 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,293 UART: [kat] ++
886,445 UART: [kat] sha1
890,689 UART: [kat] SHA2-256
892,627 UART: [kat] SHA2-384
895,318 UART: [kat] SHA2-512-ACC
897,219 UART: [kat] ECC-384
903,064 UART: [kat] HMAC-384Kdf
907,552 UART: [kat] LMS
1,475,748 UART: [kat] --
1,476,423 UART: [cold-reset] ++
1,476,781 UART: [fht] Storing FHT @ 0x50003400
1,479,554 UART: [idev] ++
1,479,722 UART: [idev] CDI.KEYID = 6
1,480,082 UART: [idev] SUBJECT.KEYID = 7
1,480,506 UART: [idev] UDS.KEYID = 0
1,480,851 ready_for_fw is high
1,480,851 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,358 UART: [idev] Erasing UDS.KEYID = 0
1,505,370 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,888 UART: [idev] --
1,514,773 UART: [ldev] ++
1,514,941 UART: [ldev] CDI.KEYID = 6
1,515,304 UART: [ldev] SUBJECT.KEYID = 5
1,515,730 UART: [ldev] AUTHORITY.KEYID = 7
1,516,193 UART: [ldev] FE.KEYID = 1
1,521,403 UART: [ldev] Erasing FE.KEYID = 1
1,546,436 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,502 UART: [ldev] --
1,585,959 UART: [fwproc] Waiting for Commands...
1,586,780 UART: [fwproc] Received command 0x46574c44
1,587,571 UART: [fwproc] Received Image of size 31656 bytes
1,939,462 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,966,520 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,995,872 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,007,603 >>> mbox cmd response: success
2,008,657 UART: [afmc] ++
2,008,825 UART: [afmc] CDI.KEYID = 6
2,009,187 UART: [afmc] SUBJECT.KEYID = 7
2,009,612 UART: [afmc] AUTHORITY.KEYID = 5
2,045,113 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,061,289 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,062,069 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,067,797 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,073,682 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,079,372 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,087,095 UART: [afmc] --
2,088,221 UART: [cold-reset] --
2,089,107 UART: [state] Locking Datavault
2,090,048 UART: [state] Locking PCR0, PCR1 and PCR31
2,090,652 UART: [state] Locking ICCM
2,091,178 UART: [exit] Launching FMC @ 0x40000130
2,096,507 UART:
2,096,523 UART: Running Caliptra FMC ...
2,096,931 UART:
2,096,985 UART: [state] CFI Enabled
2,107,376 UART: [fht] FMC Alias Private Key: 7
2,215,311 UART: [art] Extend RT PCRs Done
2,215,739 UART: [art] Lock RT PCRs Done
2,217,211 UART: [art] Populate DV Done
2,225,318 UART: [fht] FMC Alias Private Key: 7
2,226,480 UART: [art] Derive CDI
2,226,760 UART: [art] Store in in slot 0x4
2,312,377 UART: [art] Derive Key Pair
2,312,737 UART: [art] Store priv key in slot 0x5
2,325,821 UART: [art] Derive Key Pair - Done
2,340,254 UART: [art] Signing Cert with AUTHO
2,340,734 UART: RITY.KEYID = 7
2,356,244 UART: [art] Erasing AUTHORITY.KEYID = 7
2,357,009 UART: [art] PUB.X = C8F71683B2F94DF17E8D29040D4BC91D19B7B8FA04ABB6EF6740AA3BE7E0D912B620CF21A727A95C12C63D28D122D278
2,363,782 UART: [art] PUB.Y = DC9598E8C15AB930EAE5ED72D411419A0A3E3FE20EEA539A468511A2C9E1E230909F5763FE9903138E19CB25FE85A26F
2,370,731 UART: [art] SIG.R = FF512AF120B263DFED3EF3F9B7666936ACA79790A108626F929F4C40823F2DC418E01B61252F66C3705168235D7E4392
2,377,494 UART: [art] SIG.S = 137D0B446AA0496AB9CE48EE8ACAD9274B48FFC476F94B32EBDC6AC5906DD03EA87951F30DC60150743417B4125783DD
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,475 ready_for_fw is high
1,362,475 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,858,389 >>> mbox cmd response: success
1,920,499 UART:
1,920,515 UART: Running Caliptra FMC ...
1,920,923 UART:
1,920,977 UART: [state] CFI Enabled
1,931,542 UART: [fht] FMC Alias Private Key: 7
2,039,469 UART: [art] Extend RT PCRs Done
2,039,897 UART: [art] Lock RT PCRs Done
2,041,397 UART: [art] Populate DV Done
2,049,472 UART: [fht] FMC Alias Private Key: 7
2,050,640 UART: [art] Derive CDI
2,050,920 UART: [art] Store in in slot 0x4
2,136,589 UART: [art] Derive Key Pair
2,136,949 UART: [art] Store priv key in slot 0x5
2,149,993 UART: [art] Derive Key Pair - Done
2,165,173 UART: [art] Signing Cert with AUTHO
2,165,653 UART: RITY.KEYID = 7
2,180,805 UART: [art] Erasing AUTHORITY.KEYID = 7
2,181,570 UART: [art] PUB.X = A4E736E7F7F6CB6274CADCF63DFAC8000C19ADBCB2AB47CFEAB160B9E894072D868B58189E0B2B7BA5A39634A64A915B
2,188,331 UART: [art] PUB.Y = 09B85743C8C397988C06B8FC317D37AA5228FB79195C4EA8E4DEB1BD61D3A20C7D494F0641910DA1CC71810AFE365039
2,195,267 UART: [art] SIG.R = 24FFC30D834AA06CCC8CAD63814B0A491F2B9E3B4816E240D2706E5D357FE7F877C084C0CD9CBF03354727EE121B6C58
2,202,038 UART: [art] SIG.S = 2B12D7D15640AE885B00E11179CF762759A88F56BA5433C5BCA2ADEBAE9ECD25B6D20D1D0149D1C199DBE5F49B2FEA45
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,031 UART: [state] LifecycleState = Unprovisioned
86,686 UART: [state] DebugLocked = No
87,406 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,088 UART: [kat] SHA2-256
883,019 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,134 UART: [kat] ++
887,286 UART: [kat] sha1
891,610 UART: [kat] SHA2-256
893,548 UART: [kat] SHA2-384
896,163 UART: [kat] SHA2-512-ACC
898,064 UART: [kat] ECC-384
903,549 UART: [kat] HMAC-384Kdf
908,039 UART: [kat] LMS
1,476,235 UART: [kat] --
1,476,938 UART: [cold-reset] ++
1,477,336 UART: [fht] Storing FHT @ 0x50003400
1,480,289 UART: [idev] ++
1,480,457 UART: [idev] CDI.KEYID = 6
1,480,817 UART: [idev] SUBJECT.KEYID = 7
1,481,241 UART: [idev] UDS.KEYID = 0
1,481,586 ready_for_fw is high
1,481,586 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,489,035 UART: [idev] Erasing UDS.KEYID = 0
1,505,943 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,695 UART: [idev] --
1,515,590 UART: [ldev] ++
1,515,758 UART: [ldev] CDI.KEYID = 6
1,516,121 UART: [ldev] SUBJECT.KEYID = 5
1,516,547 UART: [ldev] AUTHORITY.KEYID = 7
1,517,010 UART: [ldev] FE.KEYID = 1
1,522,472 UART: [ldev] Erasing FE.KEYID = 1
1,547,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,507 UART: [ldev] --
1,586,944 UART: [fwproc] Waiting for Commands...
1,587,581 UART: [fwproc] Received command 0x46574c44
1,588,372 UART: [fwproc] Received Image of size 31656 bytes
1,938,533 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,965,739 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,995,091 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,006,954 >>> mbox cmd response: success
2,008,142 UART: [afmc] ++
2,008,310 UART: [afmc] CDI.KEYID = 6
2,008,672 UART: [afmc] SUBJECT.KEYID = 7
2,009,097 UART: [afmc] AUTHORITY.KEYID = 5
2,043,572 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,059,924 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,060,704 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,066,432 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,072,317 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,078,007 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,085,840 UART: [afmc] --
2,086,848 UART: [cold-reset] --
2,087,722 UART: [state] Locking Datavault
2,088,805 UART: [state] Locking PCR0, PCR1 and PCR31
2,089,409 UART: [state] Locking ICCM
2,089,885 UART: [exit] Launching FMC @ 0x40000130
2,095,214 UART:
2,095,230 UART: Running Caliptra FMC ...
2,095,638 UART:
2,095,781 UART: [state] CFI Enabled
2,106,592 UART: [fht] FMC Alias Private Key: 7
2,214,541 UART: [art] Extend RT PCRs Done
2,214,969 UART: [art] Lock RT PCRs Done
2,216,365 UART: [art] Populate DV Done
2,224,630 UART: [fht] FMC Alias Private Key: 7
2,225,634 UART: [art] Derive CDI
2,225,914 UART: [art] Store in in slot 0x4
2,311,847 UART: [art] Derive Key Pair
2,312,207 UART: [art] Store priv key in slot 0x5
2,325,505 UART: [art] Derive Key Pair - Done
2,340,141 UART: [art] Signing Cert with AUTHO
2,340,621 UART: RITY.KEYID = 7
2,355,787 UART: [art] Erasing AUTHORITY.KEYID = 7
2,356,552 UART: [art] PUB.X = 52C03EE2C92601342B2B3479B9B6C04663AC91C273255CC3E56FF2E0FC1586EDBC7E67387B992D4E007DD52FBFFCB89E
2,363,309 UART: [art] PUB.Y = 62226EC41A6C6D69141487AAAF5EA8846CD750AD2241BB7D62C4174EA393BDD9A0BBC2982CF624DE85EB3BA11C7182C3
2,370,273 UART: [art] SIG.R = D24D45E2C9BE057D0D530983CE636364C367222439B930B48C13B01575B922A55EB1D78A4B96A45F5B0641FFD93CD092
2,377,029 UART: [art] SIG.S = 1CCBA55A31ABDB3A90A5A1B6F2657CDE47A7C87FD8631186CC480134A989CB141B39B0010D1CE8E6306845FEE2DD9921
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,970 ready_for_fw is high
1,362,970 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,858,428 >>> mbox cmd response: success
1,919,902 UART:
1,919,918 UART: Running Caliptra FMC ...
1,920,326 UART:
1,920,469 UART: [state] CFI Enabled
1,931,064 UART: [fht] FMC Alias Private Key: 7
2,040,007 UART: [art] Extend RT PCRs Done
2,040,435 UART: [art] Lock RT PCRs Done
2,041,573 UART: [art] Populate DV Done
2,049,818 UART: [fht] FMC Alias Private Key: 7
2,050,874 UART: [art] Derive CDI
2,051,154 UART: [art] Store in in slot 0x4
2,137,009 UART: [art] Derive Key Pair
2,137,369 UART: [art] Store priv key in slot 0x5
2,151,299 UART: [art] Derive Key Pair - Done
2,165,850 UART: [art] Signing Cert with AUTHO
2,166,330 UART: RITY.KEYID = 7
2,181,554 UART: [art] Erasing AUTHORITY.KEYID = 7
2,182,319 UART: [art] PUB.X = BA816BA7B8CE905F6056E5110A719D06AD942DA79FE3F7ED02BD0705226E706F409B6EC24BD4B470E221EF3952D2A6B5
2,189,084 UART: [art] PUB.Y = 4FC6B9247D783E0316D554E4BFA6531C01FD2615728178B4DB50166889D5AC974C7601B23658D884BC50AABDB97C00AB
2,196,005 UART: [art] SIG.R = 5ADE6043604EAD1D6FA0AF8799B11A8C651D518B117DADF4D0CC37965C5C99D34FA845210DEFA37093739DAA04D18915
2,202,779 UART: [art] SIG.S = 0199C5B51472A1F71375BD8BE4E795E68B2AFB3278C948E0C57AF6D95939B3E5EE8AD7984C39501F2B609E21D5A7A237
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,594 UART: [state] LifecycleState = Unprovisioned
85,249 UART: [state] DebugLocked = No
85,923 UART: [state] WD Timer not started. Device not locked for debugging
87,250 UART: [kat] SHA2-256
892,900 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,025 UART: [kat] ++
897,177 UART: [kat] sha1
901,367 UART: [kat] SHA2-256
903,307 UART: [kat] SHA2-384
905,946 UART: [kat] SHA2-512-ACC
907,847 UART: [kat] ECC-384
917,676 UART: [kat] HMAC-384Kdf
922,164 UART: [kat] LMS
1,170,492 UART: [kat] --
1,171,413 UART: [cold-reset] ++
1,171,745 UART: [fht] FHT @ 0x50003400
1,174,452 UART: [idev] ++
1,174,620 UART: [idev] CDI.KEYID = 6
1,174,980 UART: [idev] SUBJECT.KEYID = 7
1,175,404 UART: [idev] UDS.KEYID = 0
1,175,749 ready_for_fw is high
1,175,749 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,183,510 UART: [idev] Erasing UDS.KEYID = 0
1,199,839 UART: [idev] Sha1 KeyId Algorithm
1,208,301 UART: [idev] --
1,209,119 UART: [ldev] ++
1,209,287 UART: [ldev] CDI.KEYID = 6
1,209,650 UART: [ldev] SUBJECT.KEYID = 5
1,210,076 UART: [ldev] AUTHORITY.KEYID = 7
1,210,539 UART: [ldev] FE.KEYID = 1
1,215,761 UART: [ldev] Erasing FE.KEYID = 1
1,241,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,713 UART: [ldev] --
1,281,132 UART: [fwproc] Wait for Commands...
1,281,900 UART: [fwproc] Recv command 0x46574c44
1,282,628 UART: [fwproc] Recv'd Img size: 31656 bytes
1,632,810 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,027 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,331 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,070 >>> mbox cmd response: success
1,702,328 UART: [afmc] ++
1,702,496 UART: [afmc] CDI.KEYID = 6
1,702,858 UART: [afmc] SUBJECT.KEYID = 7
1,703,283 UART: [afmc] AUTHORITY.KEYID = 5
1,739,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,755,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,756,353 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,081 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,767,966 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,773,685 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,781,579 UART: [afmc] --
1,782,673 UART: [cold-reset] --
1,783,259 UART: [state] Locking Datavault
1,784,448 UART: [state] Locking PCR0, PCR1 and PCR31
1,785,052 UART: [state] Locking ICCM
1,785,708 UART: [exit] Launching FMC @ 0x40000130
1,791,037 UART:
1,791,053 UART: Running Caliptra FMC ...
1,791,461 UART:
1,791,515 UART: [state] CFI Enabled
1,801,922 UART: [fht] FMC Alias Private Key: 7
1,910,507 UART: [art] Extend RT PCRs Done
1,910,935 UART: [art] Lock RT PCRs Done
1,912,395 UART: [art] Populate DV Done
1,920,626 UART: [fht] FMC Alias Private Key: 7
1,921,792 UART: [art] Derive CDI
1,922,072 UART: [art] Store in in slot 0x4
2,007,765 UART: [art] Derive Key Pair
2,008,125 UART: [art] Store priv key in slot 0x5
2,021,007 UART: [art] Derive Key Pair - Done
2,035,848 UART: [art] Signing Cert with AUTHO
2,036,328 UART: RITY.KEYID = 7
2,051,704 UART: [art] Erasing AUTHORITY.KEYID = 7
2,052,469 UART: [art] PUB.X = 8AEEC4C536B0E696D9A7531FDED2109742B164A7AC91EC223AE52C2D6A065007188F22DF347F44FB767F55111A0EAB5D
2,059,240 UART: [art] PUB.Y = D091852A5822328ABD9C8CFA7DCA2C711DAD23CB64F9349D2F05E362DFA24FD7CC9CD348E60491EB30F0B61F39A5A9B0
2,066,202 UART: [art] SIG.R = E72C3ACBF67C402DC295C43BF04A51E1CA65C7E7F211EE1D0DC7A52CE9EFA871D921ACE541B1775BEE3113027D38A82F
2,072,986 UART: [art] SIG.S = E7A227573313A0303F19C1A4B8177F561F6F5BF2BC6960A2A559EC3EA4DB08A302338978D9944A676EE9906DF28B6099
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,561 ready_for_fw is high
1,060,561 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,556,900 >>> mbox cmd response: success
1,619,458 UART:
1,619,474 UART: Running Caliptra FMC ...
1,619,882 UART:
1,619,936 UART: [state] CFI Enabled
1,630,089 UART: [fht] FMC Alias Private Key: 7
1,738,238 UART: [art] Extend RT PCRs Done
1,738,666 UART: [art] Lock RT PCRs Done
1,740,128 UART: [art] Populate DV Done
1,748,613 UART: [fht] FMC Alias Private Key: 7
1,749,681 UART: [art] Derive CDI
1,749,961 UART: [art] Store in in slot 0x4
1,835,254 UART: [art] Derive Key Pair
1,835,614 UART: [art] Store priv key in slot 0x5
1,848,628 UART: [art] Derive Key Pair - Done
1,863,772 UART: [art] Signing Cert with AUTHO
1,864,252 UART: RITY.KEYID = 7
1,879,004 UART: [art] Erasing AUTHORITY.KEYID = 7
1,879,769 UART: [art] PUB.X = C7A8ED42AD4794655D5FE45FF52EA08E3AE3B628C7C54BAAC33487A96F32F5A9407005B81CC23D90109EE2AE444F73BC
1,886,550 UART: [art] PUB.Y = 82C630FA5837AA532185AFE9A393FAD3A4C11430F53CAC9F427C5B88380E635718F53CFED9D0DA66B06FC09A030917DF
1,893,501 UART: [art] SIG.R = 2BC0EC707E55EB7FF767824CD322E0779C4856E81DEE9644B1FE8E045BC8A95FB3C7FDD11A45BD42C87333F9A129BB41
1,900,282 UART: [art] SIG.S = E99A1D80AA700A32B3DFD0678AAA7F4FFC5EA3D27E0A3DC11EF9A6FD3FE2B2B79FB014EDAC61A35BE88047E1F482CAD1
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Unprovisioned
85,726 UART: [state] DebugLocked = No
86,444 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
893,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,564 UART: [kat] ++
897,716 UART: [kat] sha1
901,730 UART: [kat] SHA2-256
903,670 UART: [kat] SHA2-384
906,587 UART: [kat] SHA2-512-ACC
908,488 UART: [kat] ECC-384
918,071 UART: [kat] HMAC-384Kdf
922,743 UART: [kat] LMS
1,171,071 UART: [kat] --
1,172,046 UART: [cold-reset] ++
1,172,496 UART: [fht] FHT @ 0x50003400
1,174,947 UART: [idev] ++
1,175,115 UART: [idev] CDI.KEYID = 6
1,175,475 UART: [idev] SUBJECT.KEYID = 7
1,175,899 UART: [idev] UDS.KEYID = 0
1,176,244 ready_for_fw is high
1,176,244 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,105 UART: [idev] Erasing UDS.KEYID = 0
1,201,272 UART: [idev] Sha1 KeyId Algorithm
1,209,646 UART: [idev] --
1,210,818 UART: [ldev] ++
1,210,986 UART: [ldev] CDI.KEYID = 6
1,211,349 UART: [ldev] SUBJECT.KEYID = 5
1,211,775 UART: [ldev] AUTHORITY.KEYID = 7
1,212,238 UART: [ldev] FE.KEYID = 1
1,217,446 UART: [ldev] Erasing FE.KEYID = 1
1,243,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,714 UART: [ldev] --
1,283,171 UART: [fwproc] Wait for Commands...
1,283,985 UART: [fwproc] Recv command 0x46574c44
1,284,713 UART: [fwproc] Recv'd Img size: 31656 bytes
1,636,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,788 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,092 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,703,749 >>> mbox cmd response: success
1,704,955 UART: [afmc] ++
1,705,123 UART: [afmc] CDI.KEYID = 6
1,705,485 UART: [afmc] SUBJECT.KEYID = 7
1,705,910 UART: [afmc] AUTHORITY.KEYID = 5
1,741,605 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,022 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,770 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,764,498 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,383 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,102 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,784,028 UART: [afmc] --
1,784,912 UART: [cold-reset] --
1,785,970 UART: [state] Locking Datavault
1,787,163 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,767 UART: [state] Locking ICCM
1,788,347 UART: [exit] Launching FMC @ 0x40000130
1,793,676 UART:
1,793,692 UART: Running Caliptra FMC ...
1,794,100 UART:
1,794,243 UART: [state] CFI Enabled
1,805,002 UART: [fht] FMC Alias Private Key: 7
1,912,803 UART: [art] Extend RT PCRs Done
1,913,231 UART: [art] Lock RT PCRs Done
1,914,909 UART: [art] Populate DV Done
1,923,134 UART: [fht] FMC Alias Private Key: 7
1,924,298 UART: [art] Derive CDI
1,924,578 UART: [art] Store in in slot 0x4
2,010,423 UART: [art] Derive Key Pair
2,010,783 UART: [art] Store priv key in slot 0x5
2,024,815 UART: [art] Derive Key Pair - Done
2,039,613 UART: [art] Signing Cert with AUTHO
2,040,093 UART: RITY.KEYID = 7
2,055,465 UART: [art] Erasing AUTHORITY.KEYID = 7
2,056,230 UART: [art] PUB.X = E990933514F7BFD4C1773BCDD39EDB741188259088D4047A7315B7C21D88030324120B1E1D87E4AB83D1A31E3D378B5E
2,062,986 UART: [art] PUB.Y = 3C9F4E1687DA19A7269EAB64578851A895A8C25716B022B513E217064BEE9650CF431E028D22FE64EBACC34CB09C84C5
2,069,934 UART: [art] SIG.R = F0D34AF28FD2C3498BA85C555EA645B259D33D3FC421C0CE51074EB64C3C9889700CA123435191EE1DD43E3EC9F1A4EA
2,076,710 UART: [art] SIG.S = C8A44FAC1205B07EB30CEE86CF80D945E72161670D0BEA25314823E3BE9DFC69CC1615C20963A16F584A608476F6BA6E
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,478 ready_for_fw is high
1,060,478 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,556,400 >>> mbox cmd response: success
1,620,362 UART:
1,620,378 UART: Running Caliptra FMC ...
1,620,786 UART:
1,620,929 UART: [state] CFI Enabled
1,631,260 UART: [fht] FMC Alias Private Key: 7
1,739,047 UART: [art] Extend RT PCRs Done
1,739,475 UART: [art] Lock RT PCRs Done
1,741,387 UART: [art] Populate DV Done
1,749,856 UART: [fht] FMC Alias Private Key: 7
1,750,900 UART: [art] Derive CDI
1,751,180 UART: [art] Store in in slot 0x4
1,836,849 UART: [art] Derive Key Pair
1,837,209 UART: [art] Store priv key in slot 0x5
1,850,777 UART: [art] Derive Key Pair - Done
1,865,800 UART: [art] Signing Cert with AUTHO
1,866,280 UART: RITY.KEYID = 7
1,881,052 UART: [art] Erasing AUTHORITY.KEYID = 7
1,881,817 UART: [art] PUB.X = 579455CF35592DB449512B7AF0DF9BBDAF770532F341CA006C3611BEC73E983A881117444402717CE8655807FE10F65E
1,888,552 UART: [art] PUB.Y = C170AF43CE0270C0978EFA3AB6BABEB8AA868EE01409D46A441441AA582913AFDEF968AFD210B363820756B26B706ADE
1,895,507 UART: [art] SIG.R = 17520DAA45B9A9B17E1F05D62CB4AD83E9281E99B7A925856DF7847AD70D3F57095996C4A1964B1E7EDB39F669E89255
1,902,267 UART: [art] SIG.S = EF0FB197656D74A89AD05FD51EE9760C4814E71D4B7793E0F13E84FBD0E3CDA621546B231202BC558066666B9FB3F47B
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,584 UART: [state] LifecycleState = Unprovisioned
86,239 UART: [state] DebugLocked = No
86,771 UART: [state] WD Timer not started. Device not locked for debugging
88,074 UART: [kat] SHA2-256
891,624 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,753 UART: [kat] ++
895,905 UART: [kat] sha1
900,057 UART: [kat] SHA2-256
901,997 UART: [kat] SHA2-384
904,764 UART: [kat] SHA2-512-ACC
906,665 UART: [kat] ECC-384
916,094 UART: [kat] HMAC-384Kdf
920,692 UART: [kat] LMS
1,169,004 UART: [kat] --
1,170,009 UART: [cold-reset] ++
1,170,431 UART: [fht] FHT @ 0x50003400
1,173,027 UART: [idev] ++
1,173,195 UART: [idev] CDI.KEYID = 6
1,173,556 UART: [idev] SUBJECT.KEYID = 7
1,173,981 UART: [idev] UDS.KEYID = 0
1,174,327 ready_for_fw is high
1,174,327 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,887 UART: [idev] Erasing UDS.KEYID = 0
1,198,691 UART: [idev] Sha1 KeyId Algorithm
1,207,421 UART: [idev] --
1,208,232 UART: [ldev] ++
1,208,400 UART: [ldev] CDI.KEYID = 6
1,208,764 UART: [ldev] SUBJECT.KEYID = 5
1,209,191 UART: [ldev] AUTHORITY.KEYID = 7
1,209,654 UART: [ldev] FE.KEYID = 1
1,214,704 UART: [ldev] Erasing FE.KEYID = 1
1,241,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,980 UART: [ldev] --
1,280,344 UART: [fwproc] Wait for Commands...
1,281,017 UART: [fwproc] Recv command 0x46574c44
1,281,750 UART: [fwproc] Recv'd Img size: 31656 bytes
1,631,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,659,993 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,302 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,202 >>> mbox cmd response: success
1,702,329 UART: [afmc] ++
1,702,497 UART: [afmc] CDI.KEYID = 6
1,702,860 UART: [afmc] SUBJECT.KEYID = 7
1,703,286 UART: [afmc] AUTHORITY.KEYID = 5
1,738,849 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,755,359 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,756,110 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,761,839 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,767,722 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,773,441 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,781,058 UART: [afmc] --
1,782,044 UART: [cold-reset] --
1,783,030 UART: [state] Locking Datavault
1,784,453 UART: [state] Locking PCR0, PCR1 and PCR31
1,785,057 UART: [state] Locking ICCM
1,785,671 UART: [exit] Launching FMC @ 0x40000130
1,791,000 UART:
1,791,016 UART: Running Caliptra FMC ...
1,791,424 UART:
1,791,478 UART: [state] CFI Enabled
1,802,229 UART: [fht] FMC Alias Private Key: 7
1,909,694 UART: [art] Extend RT PCRs Done
1,910,122 UART: [art] Lock RT PCRs Done
1,911,778 UART: [art] Populate DV Done
1,919,911 UART: [fht] FMC Alias Private Key: 7
1,920,899 UART: [art] Derive CDI
1,921,179 UART: [art] Store in in slot 0x4
2,007,044 UART: [art] Derive Key Pair
2,007,404 UART: [art] Store priv key in slot 0x5
2,020,734 UART: [art] Derive Key Pair - Done
2,035,504 UART: [art] Signing Cert with AUTHO
2,035,984 UART: RITY.KEYID = 7
2,051,124 UART: [art] Erasing AUTHORITY.KEYID = 7
2,051,889 UART: [art] PUB.X = 3B82DCD0B22724F08141D87FA86C27F943CFBFEFF56F3BC465440B499B8D40C214AA38211F21CA7B315D2D00D48A03E2
2,058,641 UART: [art] PUB.Y = 476C8BA8457DAD566F248272BD5A201A913BEAAD3AC1E62CE23E2A6C3F2BC9C9E6A24E2DB6F01E92498A786D589559EE
2,065,607 UART: [art] SIG.R = 8C7411CD27074D5A0EDBBDA2F47B8AC594514C246922E310DAD5EC9C77EB0FC013EFD6C0FD2B0E37DEEC091B95A7EADB
2,072,390 UART: [art] SIG.S = D79D0E78ECEE9236F1B3509374EEC05AE9C8EEA8F4C902EC03597E7E6DDCE4DF3BE37BC4D2B07B61C8C5718739DADC88
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,880 ready_for_fw is high
1,055,880 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,549,682 >>> mbox cmd response: success
1,612,726 UART:
1,612,742 UART: Running Caliptra FMC ...
1,613,150 UART:
1,613,204 UART: [state] CFI Enabled
1,623,595 UART: [fht] FMC Alias Private Key: 7
1,731,694 UART: [art] Extend RT PCRs Done
1,732,122 UART: [art] Lock RT PCRs Done
1,733,580 UART: [art] Populate DV Done
1,741,667 UART: [fht] FMC Alias Private Key: 7
1,742,637 UART: [art] Derive CDI
1,742,917 UART: [art] Store in in slot 0x4
1,828,226 UART: [art] Derive Key Pair
1,828,586 UART: [art] Store priv key in slot 0x5
1,841,666 UART: [art] Derive Key Pair - Done
1,856,760 UART: [art] Signing Cert with AUTHO
1,857,240 UART: RITY.KEYID = 7
1,871,976 UART: [art] Erasing AUTHORITY.KEYID = 7
1,872,741 UART: [art] PUB.X = 202DC2B6E7CE2DF034D25E62CDB6EB15D98E7FA29C70E14DC61B81166912EA2729471D2F3537F3A19C83FF844F14D35D
1,879,521 UART: [art] PUB.Y = E2EB4E48EB2ECB0170B310BDFEAB0543B97AF1214B63D3A4795CDCD490825770641279C09D1D3A74E84464913BCFEC47
1,886,475 UART: [art] SIG.R = 52D59DEBE606458031CB9E1014B87DECF1840AAB0CA4414BDE03AB1B1B18DAED766673051E5E92A659926B514250C035
1,893,236 UART: [art] SIG.S = 2794536A5F7FB13E45635354808BE347DCE01F6B2B7CBD2E0F4DCA6F89620A37CF92E4A22C89C9AA1B1D6F0CBE8C1052
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,610 UART: [kat] ++
895,762 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,651 UART: [kat] SHA2-512-ACC
906,552 UART: [kat] ECC-384
916,453 UART: [kat] HMAC-384Kdf
921,193 UART: [kat] LMS
1,169,505 UART: [kat] --
1,170,394 UART: [cold-reset] ++
1,170,966 UART: [fht] FHT @ 0x50003400
1,173,476 UART: [idev] ++
1,173,644 UART: [idev] CDI.KEYID = 6
1,174,005 UART: [idev] SUBJECT.KEYID = 7
1,174,430 UART: [idev] UDS.KEYID = 0
1,174,776 ready_for_fw is high
1,174,776 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,182,536 UART: [idev] Erasing UDS.KEYID = 0
1,199,616 UART: [idev] Sha1 KeyId Algorithm
1,208,360 UART: [idev] --
1,209,509 UART: [ldev] ++
1,209,677 UART: [ldev] CDI.KEYID = 6
1,210,041 UART: [ldev] SUBJECT.KEYID = 5
1,210,468 UART: [ldev] AUTHORITY.KEYID = 7
1,210,931 UART: [ldev] FE.KEYID = 1
1,216,175 UART: [ldev] Erasing FE.KEYID = 1
1,242,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,461 UART: [ldev] --
1,281,765 UART: [fwproc] Wait for Commands...
1,282,336 UART: [fwproc] Recv command 0x46574c44
1,283,069 UART: [fwproc] Recv'd Img size: 31656 bytes
1,633,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,172 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,481 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,291 >>> mbox cmd response: success
1,702,556 UART: [afmc] ++
1,702,724 UART: [afmc] CDI.KEYID = 6
1,703,087 UART: [afmc] SUBJECT.KEYID = 7
1,703,513 UART: [afmc] AUTHORITY.KEYID = 5
1,738,814 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,755,062 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,755,813 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,761,542 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,767,425 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,773,144 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,781,039 UART: [afmc] --
1,781,945 UART: [cold-reset] --
1,782,999 UART: [state] Locking Datavault
1,784,250 UART: [state] Locking PCR0, PCR1 and PCR31
1,784,854 UART: [state] Locking ICCM
1,785,308 UART: [exit] Launching FMC @ 0x40000130
1,790,637 UART:
1,790,653 UART: Running Caliptra FMC ...
1,791,061 UART:
1,791,204 UART: [state] CFI Enabled
1,801,623 UART: [fht] FMC Alias Private Key: 7
1,908,916 UART: [art] Extend RT PCRs Done
1,909,344 UART: [art] Lock RT PCRs Done
1,910,984 UART: [art] Populate DV Done
1,919,261 UART: [fht] FMC Alias Private Key: 7
1,920,239 UART: [art] Derive CDI
1,920,519 UART: [art] Store in in slot 0x4
2,006,146 UART: [art] Derive Key Pair
2,006,506 UART: [art] Store priv key in slot 0x5
2,019,920 UART: [art] Derive Key Pair - Done
2,034,978 UART: [art] Signing Cert with AUTHO
2,035,458 UART: RITY.KEYID = 7
2,050,610 UART: [art] Erasing AUTHORITY.KEYID = 7
2,051,375 UART: [art] PUB.X = 40E68488D05A269569F33C37E2D00CBF3C7C734407C44DD9D446D995C38FF951F749EDE37484C04A10663AF5206488B5
2,058,135 UART: [art] PUB.Y = 9D48732F737DB7FCC462370FE1B72D943C960092697F2D1E31D4555BB39AE7F205F68C49032A303AEFF3154D5EF92FB2
2,065,058 UART: [art] SIG.R = 5A5162E89D12286FDD36342C7CD1FC6C621D48FA28223A565C2C3F973FA9E7D82C8FCAC7F53BF4E05BBEBD806A107DF9
2,071,846 UART: [art] SIG.S = 74285727F6903EDBFBBB67A06332DE350CB57AF97CB0BC29F173BE6824C46033C94CCC68FD13C6ABF1E64A64A1148599
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,449 ready_for_fw is high
1,056,449 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,551,289 >>> mbox cmd response: success
1,613,843 UART:
1,613,859 UART: Running Caliptra FMC ...
1,614,267 UART:
1,614,410 UART: [state] CFI Enabled
1,624,873 UART: [fht] FMC Alias Private Key: 7
1,732,824 UART: [art] Extend RT PCRs Done
1,733,252 UART: [art] Lock RT PCRs Done
1,734,630 UART: [art] Populate DV Done
1,742,795 UART: [fht] FMC Alias Private Key: 7
1,743,811 UART: [art] Derive CDI
1,744,091 UART: [art] Store in in slot 0x4
1,829,494 UART: [art] Derive Key Pair
1,829,854 UART: [art] Store priv key in slot 0x5
1,842,942 UART: [art] Derive Key Pair - Done
1,857,918 UART: [art] Signing Cert with AUTHO
1,858,398 UART: RITY.KEYID = 7
1,873,158 UART: [art] Erasing AUTHORITY.KEYID = 7
1,873,923 UART: [art] PUB.X = 52C43EEBA5223EF7120399714948AD27B1318E9654E8F3B619A5548F5A0E102BFFF5756E5CFF3E5124FEC84909318FC6
1,880,686 UART: [art] PUB.Y = 724263F10D87D84286F66A4B0965C0B2993685F57092A9D336AD765D7920C47A0B4C4C8779954E8F8C7DC08C8915FA9F
1,887,621 UART: [art] SIG.R = 663B5FB8CB32CC8B5D1565A48719915464BFFF022EA1DD516E37212ED92DD9B77D05A588A8F0F8B304B334E40FA169A1
1,894,387 UART: [art] SIG.S = 1373FE6FC0005D672AFE28C4A5E93D20E13EE6AD37FCE5C456EA3EC6BE6F2E1A8B99C00E4DE5FE4DEC4C9F07AE6E4FCD
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,571 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,169 UART: [kat] SHA2-256
882,100 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,215 UART: [kat] ++
886,367 UART: [kat] sha1
890,761 UART: [kat] SHA2-256
892,699 UART: [kat] SHA2-384
895,390 UART: [kat] SHA2-512-ACC
897,291 UART: [kat] ECC-384
903,370 UART: [kat] HMAC-384Kdf
908,162 UART: [kat] LMS
1,476,358 UART: [kat] --
1,477,417 UART: [cold-reset] ++
1,477,923 UART: [fht] Storing FHT @ 0x50003400
1,480,766 UART: [idev] ++
1,480,934 UART: [idev] CDI.KEYID = 6
1,481,294 UART: [idev] SUBJECT.KEYID = 7
1,481,718 UART: [idev] UDS.KEYID = 0
1,482,063 ready_for_fw is high
1,482,063 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,490,218 UART: [idev] Erasing UDS.KEYID = 0
1,506,582 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,124 UART: [idev] --
1,516,183 UART: [ldev] ++
1,516,351 UART: [ldev] CDI.KEYID = 6
1,516,714 UART: [ldev] SUBJECT.KEYID = 5
1,517,140 UART: [ldev] AUTHORITY.KEYID = 7
1,517,603 UART: [ldev] FE.KEYID = 1
1,522,819 UART: [ldev] Erasing FE.KEYID = 1
1,547,900 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,940 UART: [ldev] --
1,587,347 UART: [fwproc] Waiting for Commands...
1,588,208 UART: [fwproc] Received command 0x46574c44
1,588,999 UART: [fwproc] Received Image of size 75384 bytes
2,441,027 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,468,665 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,498,017 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,575,456 >>> mbox cmd response: success
2,575,456 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,576,482 UART: [afmc] ++
2,576,650 UART: [afmc] CDI.KEYID = 6
2,577,012 UART: [afmc] SUBJECT.KEYID = 7
2,577,437 UART: [afmc] AUTHORITY.KEYID = 5
2,612,222 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,628,248 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,629,028 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,634,756 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,640,641 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,646,331 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,654,026 UART: [afmc] --
2,655,006 UART: [cold-reset] --
2,655,778 UART: [state] Locking Datavault
2,656,801 UART: [state] Locking PCR0, PCR1 and PCR31
2,657,405 UART: [state] Locking ICCM
2,658,009 UART: [exit] Launching FMC @ 0x40000130
2,663,338 UART:
2,663,354 UART: Running Caliptra FMC ...
2,663,762 UART:
2,663,816 UART: [state] CFI Enabled
2,673,967 UART: [fht] FMC Alias Private Key: 7
2,782,162 UART: [art] Extend RT PCRs Done
2,782,590 UART: [art] Lock RT PCRs Done
2,783,900 UART: [art] Populate DV Done
2,792,227 UART: [fht] FMC Alias Private Key: 7
2,793,161 UART: [art] Derive CDI
2,793,441 UART: [art] Store in in slot 0x4
2,878,800 UART: [art] Derive Key Pair
2,879,160 UART: [art] Store priv key in slot 0x5
2,892,344 UART: [art] Derive Key Pair - Done
2,906,786 UART: [art] Signing Cert with AUTHO
2,907,266 UART: RITY.KEYID = 7
2,922,664 UART: [art] Erasing AUTHORITY.KEYID = 7
2,923,429 UART: [art] PUB.X = 7BC94859F52C9EFAFD11A554D270A1B12D32ABDEE158064D8D77E6234B6EF0CEAF938D7A0ED89C0E86E36EE533A8B31F
2,930,210 UART: [art] PUB.Y = 19C8B42FCA6C733AD0C0E8612169E49E1AA99CC3B015DA6A7ADC8EAE6230B7EC645A17D4716386B00E95DC145FE01AFC
2,937,175 UART: [art] SIG.R = 8270AFEF2B239EDEDA932CB09ADB23ED28E91740DE3B5968F4BD6346BA417941E79F486B1DD4F8B41BED68124FC5A5BA
2,943,965 UART: [art] SIG.S = 6D32AE6B6695BF3A0E68D287938319AC01EFBDF2CE0641D9DDA5748D8DC3AD962CFE4B7C504EEAFC12D810B5A4317F79
2,968,101 UART: mock_rt_interact::rt_entry...FMC Tester
3,076,117 UART: [rt] Runtime listening for mailbox commands...
3,079,507 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,359 ready_for_fw is high
1,362,359 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,423,090 >>> mbox cmd response: success
2,423,090 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,483,896 UART:
2,483,912 UART: Running Caliptra FMC ...
2,484,320 UART:
2,484,374 UART: [state] CFI Enabled
2,494,755 UART: [fht] FMC Alias Private Key: 7
2,602,712 UART: [art] Extend RT PCRs Done
2,603,140 UART: [art] Lock RT PCRs Done
2,604,852 UART: [art] Populate DV Done
2,612,895 UART: [fht] FMC Alias Private Key: 7
2,613,965 UART: [art] Derive CDI
2,614,245 UART: [art] Store in in slot 0x4
2,700,164 UART: [art] Derive Key Pair
2,700,524 UART: [art] Store priv key in slot 0x5
2,714,264 UART: [art] Derive Key Pair - Done
2,728,579 UART: [art] Signing Cert with AUTHO
2,729,059 UART: RITY.KEYID = 7
2,743,931 UART: [art] Erasing AUTHORITY.KEYID = 7
2,744,696 UART: [art] PUB.X = 9F705EA5F8B9333235051FAB8B2698494F031C076945DEB6594DAD1FB1B012FBCE17105F0DD25FF59B6607B74876DBB5
2,751,457 UART: [art] PUB.Y = 18CEA02BB0A03AD71EF8D453A07D05D97341E5921833852C1A1ED3165F39D8DDC5AE2F68CC11C7D21C5A28D17F02D340
2,758,411 UART: [art] SIG.R = B55DF1C0EA8711F600383480D593A97F79382A96DCC7DD846F1C3A97D0ED23558C1927A8275AE468887F7389377BE098
2,765,155 UART: [art] SIG.S = B966D29A7A8378BD5AAB66A9BBCD9DFAEF29DCF00889B252706951F40C0CA713B533191FC3A7AC6DECE419E7DB3ED9E0
2,789,189 UART: mock_rt_interact::rt_entry...FMC Tester
2,897,710 UART: [rt] Runtime listening for mailbox commands...
2,901,100 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Unprovisioned
86,376 UART: [state] DebugLocked = No
86,992 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,622 UART: [kat] SHA2-256
882,553 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,668 UART: [kat] ++
886,820 UART: [kat] sha1
891,144 UART: [kat] SHA2-256
893,082 UART: [kat] SHA2-384
895,847 UART: [kat] SHA2-512-ACC
897,748 UART: [kat] ECC-384
903,215 UART: [kat] HMAC-384Kdf
907,813 UART: [kat] LMS
1,476,009 UART: [kat] --
1,477,164 UART: [cold-reset] ++
1,477,696 UART: [fht] Storing FHT @ 0x50003400
1,480,643 UART: [idev] ++
1,480,811 UART: [idev] CDI.KEYID = 6
1,481,171 UART: [idev] SUBJECT.KEYID = 7
1,481,595 UART: [idev] UDS.KEYID = 0
1,481,940 ready_for_fw is high
1,481,940 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,489,739 UART: [idev] Erasing UDS.KEYID = 0
1,506,483 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,139 UART: [idev] --
1,516,218 UART: [ldev] ++
1,516,386 UART: [ldev] CDI.KEYID = 6
1,516,749 UART: [ldev] SUBJECT.KEYID = 5
1,517,175 UART: [ldev] AUTHORITY.KEYID = 7
1,517,638 UART: [ldev] FE.KEYID = 1
1,522,890 UART: [ldev] Erasing FE.KEYID = 1
1,549,167 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,371 UART: [ldev] --
1,588,802 UART: [fwproc] Waiting for Commands...
1,589,543 UART: [fwproc] Received command 0x46574c44
1,590,334 UART: [fwproc] Received Image of size 75384 bytes
2,442,862 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,470,278 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,499,630 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,577,117 >>> mbox cmd response: success
2,577,117 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,578,143 UART: [afmc] ++
2,578,311 UART: [afmc] CDI.KEYID = 6
2,578,673 UART: [afmc] SUBJECT.KEYID = 7
2,579,098 UART: [afmc] AUTHORITY.KEYID = 5
2,614,233 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,630,413 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,631,193 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,636,921 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,642,806 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,648,496 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,656,291 UART: [afmc] --
2,657,383 UART: [cold-reset] --
2,658,191 UART: [state] Locking Datavault
2,659,510 UART: [state] Locking PCR0, PCR1 and PCR31
2,660,114 UART: [state] Locking ICCM
2,660,780 UART: [exit] Launching FMC @ 0x40000130
2,666,109 UART:
2,666,125 UART: Running Caliptra FMC ...
2,666,533 UART:
2,666,676 UART: [state] CFI Enabled
2,677,275 UART: [fht] FMC Alias Private Key: 7
2,785,360 UART: [art] Extend RT PCRs Done
2,785,788 UART: [art] Lock RT PCRs Done
2,787,476 UART: [art] Populate DV Done
2,795,511 UART: [fht] FMC Alias Private Key: 7
2,796,577 UART: [art] Derive CDI
2,796,857 UART: [art] Store in in slot 0x4
2,881,976 UART: [art] Derive Key Pair
2,882,336 UART: [art] Store priv key in slot 0x5
2,895,812 UART: [art] Derive Key Pair - Done
2,910,737 UART: [art] Signing Cert with AUTHO
2,911,217 UART: RITY.KEYID = 7
2,926,493 UART: [art] Erasing AUTHORITY.KEYID = 7
2,927,258 UART: [art] PUB.X = 1F5990F5DA59C0844879FD96D5013767E903A2901563C15F595FDA58163E3B04CDFC0F531AD538518267D7DB2A782295
2,934,010 UART: [art] PUB.Y = 83A25ED921675C1C5F3EE93A803186A0269BEEC6280931542B95362302CE899176D93C12ACF24FE5213E822189A6B7DF
2,940,950 UART: [art] SIG.R = FEE2DC6C8F796DDF6D0F8C9F08CA88EFE00C8C384F72F4C6E2EDC21B5277B19AC68E07DE2CFBBAFB13D7F0F842A0F8CE
2,947,744 UART: [art] SIG.S = E4388A66DCA955CB6765EDE721F72218EB1D3EF4B64C923A34CD1E09260B190A69A34E9C8F509B86BFC0DA604A0FE02F
2,971,191 UART: mock_rt_interact::rt_entry...FMC Tester
3,079,334 UART: [rt] Runtime listening for mailbox commands...
3,082,724 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,418 ready_for_fw is high
1,363,418 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,425,371 >>> mbox cmd response: success
2,425,371 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,486,825 UART:
2,486,841 UART: Running Caliptra FMC ...
2,487,249 UART:
2,487,392 UART: [state] CFI Enabled
2,498,077 UART: [fht] FMC Alias Private Key: 7
2,606,614 UART: [art] Extend RT PCRs Done
2,607,042 UART: [art] Lock RT PCRs Done
2,608,536 UART: [art] Populate DV Done
2,616,657 UART: [fht] FMC Alias Private Key: 7
2,617,663 UART: [art] Derive CDI
2,617,943 UART: [art] Store in in slot 0x4
2,703,972 UART: [art] Derive Key Pair
2,704,332 UART: [art] Store priv key in slot 0x5
2,717,860 UART: [art] Derive Key Pair - Done
2,732,680 UART: [art] Signing Cert with AUTHO
2,733,160 UART: RITY.KEYID = 7
2,748,814 UART: [art] Erasing AUTHORITY.KEYID = 7
2,749,579 UART: [art] PUB.X = 2A4F6EB30FE29ECA29A0693B1082068AE71AACDD5DD3872A2194BA43EA66E48EB2E7303B8EEE232D3F7A8725AE1526FB
2,756,361 UART: [art] PUB.Y = FB26D1E28CFD974BC1B5315618616B1C24FC784269646D9404863D4A20BA145C16E22B61BA542F809B7ADBF84EC843FD
2,763,314 UART: [art] SIG.R = B8D835A512C12859C2C860C709B6A0346572A5BF4B3C1079B9E3EFEDD28F8F69D5012CF17F16EF23102615DB336D11BD
2,770,084 UART: [art] SIG.S = AAEDBEC013590548499CC35F4675A50A89D13D2C26138E342903DA537DABA9A0FAF5112561699D7E3634ACA02CB118DD
2,794,046 UART: mock_rt_interact::rt_entry...FMC Tester
2,901,199 UART: [rt] Runtime listening for mailbox commands...
2,904,589 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
893,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,353 UART: [kat] ++
897,505 UART: [kat] sha1
901,651 UART: [kat] SHA2-256
903,591 UART: [kat] SHA2-384
906,454 UART: [kat] SHA2-512-ACC
908,355 UART: [kat] ECC-384
917,854 UART: [kat] HMAC-384Kdf
922,498 UART: [kat] LMS
1,170,826 UART: [kat] --
1,171,705 UART: [cold-reset] ++
1,172,037 UART: [fht] FHT @ 0x50003400
1,174,650 UART: [idev] ++
1,174,818 UART: [idev] CDI.KEYID = 6
1,175,178 UART: [idev] SUBJECT.KEYID = 7
1,175,602 UART: [idev] UDS.KEYID = 0
1,175,947 ready_for_fw is high
1,175,947 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,183,774 UART: [idev] Erasing UDS.KEYID = 0
1,200,959 UART: [idev] Sha1 KeyId Algorithm
1,209,431 UART: [idev] --
1,210,431 UART: [ldev] ++
1,210,599 UART: [ldev] CDI.KEYID = 6
1,210,962 UART: [ldev] SUBJECT.KEYID = 5
1,211,388 UART: [ldev] AUTHORITY.KEYID = 7
1,211,851 UART: [ldev] FE.KEYID = 1
1,216,827 UART: [ldev] Erasing FE.KEYID = 1
1,243,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,281 UART: [ldev] --
1,282,784 UART: [fwproc] Wait for Commands...
1,283,558 UART: [fwproc] Recv command 0x46574c44
1,284,286 UART: [fwproc] Recv'd Img size: 75384 bytes
2,137,513 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,165,616 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,194,920 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,272,195 >>> mbox cmd response: success
2,272,195 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,273,343 UART: [afmc] ++
2,273,511 UART: [afmc] CDI.KEYID = 6
2,273,873 UART: [afmc] SUBJECT.KEYID = 7
2,274,298 UART: [afmc] AUTHORITY.KEYID = 5
2,309,351 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,326,446 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,327,194 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,332,922 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,338,807 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,344,526 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,352,264 UART: [afmc] --
2,353,286 UART: [cold-reset] --
2,354,184 UART: [state] Locking Datavault
2,355,193 UART: [state] Locking PCR0, PCR1 and PCR31
2,355,797 UART: [state] Locking ICCM
2,356,367 UART: [exit] Launching FMC @ 0x40000130
2,361,696 UART:
2,361,712 UART: Running Caliptra FMC ...
2,362,120 UART:
2,362,174 UART: [state] CFI Enabled
2,372,419 UART: [fht] FMC Alias Private Key: 7
2,480,536 UART: [art] Extend RT PCRs Done
2,480,964 UART: [art] Lock RT PCRs Done
2,482,584 UART: [art] Populate DV Done
2,490,577 UART: [fht] FMC Alias Private Key: 7
2,491,667 UART: [art] Derive CDI
2,491,947 UART: [art] Store in in slot 0x4
2,577,032 UART: [art] Derive Key Pair
2,577,392 UART: [art] Store priv key in slot 0x5
2,590,890 UART: [art] Derive Key Pair - Done
2,605,580 UART: [art] Signing Cert with AUTHO
2,606,060 UART: RITY.KEYID = 7
2,621,846 UART: [art] Erasing AUTHORITY.KEYID = 7
2,622,611 UART: [art] PUB.X = 5237199153E36C9690E486D6E1C7B0DDE791801FF4162DE72BE66902B5ADB5CF9735295B748272FA291E00EFF83F2105
2,629,351 UART: [art] PUB.Y = 690B17FDF07E5E0A0E154543E923C9F5DD4848751119B6D6B194AEBCBF8BDF362154C8E208456375B23F40BEAF82B70B
2,636,294 UART: [art] SIG.R = DE702B5976A6845ABDB49651DCD5DC7A5C7D7652111262E00A5CB2D02C7942C256ACC56DFC74048AD764AAB461810402
2,643,058 UART: [art] SIG.S = D53DF961C469C4078F25EEFD7B382FAF7E4A1462FBD6E1985DF7EB5528043DA383E0B7A9512C64AF536810D7A6D3A2D6
2,667,133 UART: mock_rt_interact::rt_entry...FMC Tester
2,774,026 UART: [rt] Runtime listening for mailbox commands...
2,777,416 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,343 ready_for_fw is high
1,060,343 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,121,782 >>> mbox cmd response: success
2,121,782 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,184,302 UART:
2,184,318 UART: Running Caliptra FMC ...
2,184,726 UART:
2,184,780 UART: [state] CFI Enabled
2,195,649 UART: [fht] FMC Alias Private Key: 7
2,303,546 UART: [art] Extend RT PCRs Done
2,303,974 UART: [art] Lock RT PCRs Done
2,305,530 UART: [art] Populate DV Done
2,313,671 UART: [fht] FMC Alias Private Key: 7
2,314,713 UART: [art] Derive CDI
2,314,993 UART: [art] Store in in slot 0x4
2,400,412 UART: [art] Derive Key Pair
2,400,772 UART: [art] Store priv key in slot 0x5
2,413,314 UART: [art] Derive Key Pair - Done
2,427,825 UART: [art] Signing Cert with AUTHO
2,428,305 UART: RITY.KEYID = 7
2,443,477 UART: [art] Erasing AUTHORITY.KEYID = 7
2,444,242 UART: [art] PUB.X = 2E79A903E42E862B100C56E0DF0C0EE41AC28F653188000ED9B68457AF6F22DAF4D4E36A31EBBACBC80DCC49729E846B
2,450,988 UART: [art] PUB.Y = 21C1A98618238E4C6F557FEF49C1431AA7F2C6EFB808E945CE3BE5CE9A75BA4A06D0BC09C5E6424E5B1C74733BBC6538
2,457,943 UART: [art] SIG.R = C4F28571184E56343FCEAC7FF7EFF8775FAA973900BC257BD6DD3DC2CFEF28630AF4DCEC3FC59A32DFB0CAF40D38BD2E
2,464,717 UART: [art] SIG.S = 203735ECDD2A37514625291CF41F454743DA88E4EB39552CEB095A95A13FE900B461927601535CB9AE63342E00951862
2,488,364 UART: mock_rt_interact::rt_entry...FMC Tester
2,594,844 UART: [rt] Runtime listening for mailbox commands...
2,598,234 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,625 UART: [kat] SHA2-256
893,275 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,400 UART: [kat] ++
897,552 UART: [kat] sha1
901,734 UART: [kat] SHA2-256
903,674 UART: [kat] SHA2-384
906,265 UART: [kat] SHA2-512-ACC
908,166 UART: [kat] ECC-384
917,929 UART: [kat] HMAC-384Kdf
922,505 UART: [kat] LMS
1,170,833 UART: [kat] --
1,171,802 UART: [cold-reset] ++
1,172,168 UART: [fht] FHT @ 0x50003400
1,174,917 UART: [idev] ++
1,175,085 UART: [idev] CDI.KEYID = 6
1,175,445 UART: [idev] SUBJECT.KEYID = 7
1,175,869 UART: [idev] UDS.KEYID = 0
1,176,214 ready_for_fw is high
1,176,214 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,183,911 UART: [idev] Erasing UDS.KEYID = 0
1,200,944 UART: [idev] Sha1 KeyId Algorithm
1,209,452 UART: [idev] --
1,210,632 UART: [ldev] ++
1,210,800 UART: [ldev] CDI.KEYID = 6
1,211,163 UART: [ldev] SUBJECT.KEYID = 5
1,211,589 UART: [ldev] AUTHORITY.KEYID = 7
1,212,052 UART: [ldev] FE.KEYID = 1
1,217,254 UART: [ldev] Erasing FE.KEYID = 1
1,244,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,902 UART: [ldev] --
1,283,283 UART: [fwproc] Wait for Commands...
1,283,873 UART: [fwproc] Recv command 0x46574c44
1,284,601 UART: [fwproc] Recv'd Img size: 75384 bytes
2,136,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,164,435 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,193,739 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,271,024 >>> mbox cmd response: success
2,271,024 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,272,286 UART: [afmc] ++
2,272,454 UART: [afmc] CDI.KEYID = 6
2,272,816 UART: [afmc] SUBJECT.KEYID = 7
2,273,241 UART: [afmc] AUTHORITY.KEYID = 5
2,308,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,324,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,325,497 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,331,225 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,337,110 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,342,829 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,350,737 UART: [afmc] --
2,351,817 UART: [cold-reset] --
2,352,635 UART: [state] Locking Datavault
2,353,796 UART: [state] Locking PCR0, PCR1 and PCR31
2,354,400 UART: [state] Locking ICCM
2,354,978 UART: [exit] Launching FMC @ 0x40000130
2,360,307 UART:
2,360,323 UART: Running Caliptra FMC ...
2,360,731 UART:
2,360,874 UART: [state] CFI Enabled
2,371,319 UART: [fht] FMC Alias Private Key: 7
2,479,600 UART: [art] Extend RT PCRs Done
2,480,028 UART: [art] Lock RT PCRs Done
2,481,632 UART: [art] Populate DV Done
2,489,829 UART: [fht] FMC Alias Private Key: 7
2,490,871 UART: [art] Derive CDI
2,491,151 UART: [art] Store in in slot 0x4
2,576,630 UART: [art] Derive Key Pair
2,576,990 UART: [art] Store priv key in slot 0x5
2,590,416 UART: [art] Derive Key Pair - Done
2,605,460 UART: [art] Signing Cert with AUTHO
2,605,940 UART: RITY.KEYID = 7
2,621,694 UART: [art] Erasing AUTHORITY.KEYID = 7
2,622,459 UART: [art] PUB.X = 5DD645DB1A84EA60CF74243A04E852A816D38AA318CB7655755795761ADC877B13671118F9FA3BF701B0C1048815CC79
2,629,218 UART: [art] PUB.Y = A793CE16D43CE4595BE1545F461A76D710C1BB1F0B8FD7F67FE901E6751DD6399216A6C81C1605C74558403349ADA242
2,636,159 UART: [art] SIG.R = 38EBBDDEBE0BD7DC624E607C551533610560EFB97DF59BB9597887B44CCF7613A7ACF4D33F00DC911CADA9D3CCF5C117
2,642,923 UART: [art] SIG.S = 5D1E59B4D42D181DBB523D36B73C0C575F05D18D5C7D742BDC7543D4813DA72CC2881A2733C2BCD9C2298CF2F00C6954
2,666,675 UART: mock_rt_interact::rt_entry...FMC Tester
2,773,249 UART: [rt] Runtime listening for mailbox commands...
2,776,639 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,428 ready_for_fw is high
1,060,428 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,124,813 >>> mbox cmd response: success
2,124,813 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,186,553 UART:
2,186,569 UART: Running Caliptra FMC ...
2,186,977 UART:
2,187,120 UART: [state] CFI Enabled
2,197,445 UART: [fht] FMC Alias Private Key: 7
2,306,198 UART: [art] Extend RT PCRs Done
2,306,626 UART: [art] Lock RT PCRs Done
2,308,270 UART: [art] Populate DV Done
2,316,679 UART: [fht] FMC Alias Private Key: 7
2,317,613 UART: [art] Derive CDI
2,317,893 UART: [art] Store in in slot 0x4
2,403,688 UART: [art] Derive Key Pair
2,404,048 UART: [art] Store priv key in slot 0x5
2,417,460 UART: [art] Derive Key Pair - Done
2,432,179 UART: [art] Signing Cert with AUTHO
2,432,659 UART: RITY.KEYID = 7
2,447,821 UART: [art] Erasing AUTHORITY.KEYID = 7
2,448,586 UART: [art] PUB.X = 17032301B14D8CFE30164FD3589A5C3987D22355BB92C0C27C043872957C30DECA5D19B937915B6CBE2644BF7A33BA2B
2,455,349 UART: [art] PUB.Y = 0C1CE756F072E80E3A8D6BC944E52087546F49C246AF8A11CDA64A68C2C0922F6F2D72276B36357A77109BCC12FB06B8
2,462,294 UART: [art] SIG.R = 9253C9D8834C39862ACBAE8BD0BC59393F886389EDF70587D51A3034868573CFFF1AC9BCC04FF24F131A8B85503C113B
2,469,067 UART: [art] SIG.S = B4BE15AFCD9CDC442CE3AE93E45D0B4D5FFA0AED1730125BAE4B9C7A20B56A1491EB8B39B9AD52801B6E71586164A1FB
2,493,340 UART: mock_rt_interact::rt_entry...FMC Tester
2,600,363 UART: [rt] Runtime listening for mailbox commands...
2,603,753 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,319 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
890,994 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,123 UART: [kat] ++
895,275 UART: [kat] sha1
899,431 UART: [kat] SHA2-256
901,371 UART: [kat] SHA2-384
904,034 UART: [kat] SHA2-512-ACC
905,935 UART: [kat] ECC-384
915,410 UART: [kat] HMAC-384Kdf
919,972 UART: [kat] LMS
1,168,284 UART: [kat] --
1,169,199 UART: [cold-reset] ++
1,169,663 UART: [fht] FHT @ 0x50003400
1,172,363 UART: [idev] ++
1,172,531 UART: [idev] CDI.KEYID = 6
1,172,892 UART: [idev] SUBJECT.KEYID = 7
1,173,317 UART: [idev] UDS.KEYID = 0
1,173,663 ready_for_fw is high
1,173,663 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,181,031 UART: [idev] Erasing UDS.KEYID = 0
1,197,749 UART: [idev] Sha1 KeyId Algorithm
1,206,601 UART: [idev] --
1,207,700 UART: [ldev] ++
1,207,868 UART: [ldev] CDI.KEYID = 6
1,208,232 UART: [ldev] SUBJECT.KEYID = 5
1,208,659 UART: [ldev] AUTHORITY.KEYID = 7
1,209,122 UART: [ldev] FE.KEYID = 1
1,214,430 UART: [ldev] Erasing FE.KEYID = 1
1,240,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,700 UART: [ldev] --
1,280,180 UART: [fwproc] Wait for Commands...
1,280,917 UART: [fwproc] Recv command 0x46574c44
1,281,650 UART: [fwproc] Recv'd Img size: 75384 bytes
2,133,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,160,952 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,190,261 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,267,711 >>> mbox cmd response: success
2,267,711 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,268,914 UART: [afmc] ++
2,269,082 UART: [afmc] CDI.KEYID = 6
2,269,445 UART: [afmc] SUBJECT.KEYID = 7
2,269,871 UART: [afmc] AUTHORITY.KEYID = 5
2,305,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,322,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,323,045 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,328,774 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,334,657 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,340,376 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,348,383 UART: [afmc] --
2,349,491 UART: [cold-reset] --
2,350,529 UART: [state] Locking Datavault
2,351,678 UART: [state] Locking PCR0, PCR1 and PCR31
2,352,282 UART: [state] Locking ICCM
2,352,810 UART: [exit] Launching FMC @ 0x40000130
2,358,139 UART:
2,358,155 UART: Running Caliptra FMC ...
2,358,563 UART:
2,358,617 UART: [state] CFI Enabled
2,368,608 UART: [fht] FMC Alias Private Key: 7
2,477,365 UART: [art] Extend RT PCRs Done
2,477,793 UART: [art] Lock RT PCRs Done
2,479,173 UART: [art] Populate DV Done
2,487,466 UART: [fht] FMC Alias Private Key: 7
2,488,602 UART: [art] Derive CDI
2,488,882 UART: [art] Store in in slot 0x4
2,573,913 UART: [art] Derive Key Pair
2,574,273 UART: [art] Store priv key in slot 0x5
2,587,373 UART: [art] Derive Key Pair - Done
2,602,166 UART: [art] Signing Cert with AUTHO
2,602,646 UART: RITY.KEYID = 7
2,617,872 UART: [art] Erasing AUTHORITY.KEYID = 7
2,618,637 UART: [art] PUB.X = 1FE17A57948EE0A742C332698A1FDCDE8DF7412FD86ED3CBB4C4EB7B1627647981C488F14D7E8DCC9B320C797E5CD6E5
2,625,420 UART: [art] PUB.Y = B1ED69007EB5F55ED0D15FFA2770033C4EE4A3D557912B79ECD213E64C655161EED0F32ED7CB7B4A32BCBCC3C51EA2A2
2,632,367 UART: [art] SIG.R = 7D40E963C303B1F18365D4E07EFBE3D45E0BF008ED5B172CC07C7F92236A0053C3DEB0EE13F14C112A10D074A4D5B916
2,639,116 UART: [art] SIG.S = 604D0C0517DFC8B465FC5B49ED2EB11C04289C8B7C7067081BA688222B624FD918A4953679DD7DD0DF62BCE10DBDC20A
2,662,989 UART: mock_rt_interact::rt_entry...FMC Tester
2,769,645 UART: [rt] Runtime listening for mailbox commands...
2,773,035 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,370 ready_for_fw is high
1,055,370 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,118,961 >>> mbox cmd response: success
2,118,961 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,180,977 UART:
2,180,993 UART: Running Caliptra FMC ...
2,181,401 UART:
2,181,455 UART: [state] CFI Enabled
2,192,020 UART: [fht] FMC Alias Private Key: 7
2,299,937 UART: [art] Extend RT PCRs Done
2,300,365 UART: [art] Lock RT PCRs Done
2,301,845 UART: [art] Populate DV Done
2,309,908 UART: [fht] FMC Alias Private Key: 7
2,310,868 UART: [art] Derive CDI
2,311,148 UART: [art] Store in in slot 0x4
2,396,731 UART: [art] Derive Key Pair
2,397,091 UART: [art] Store priv key in slot 0x5
2,410,459 UART: [art] Derive Key Pair - Done
2,425,572 UART: [art] Signing Cert with AUTHO
2,426,052 UART: RITY.KEYID = 7
2,441,098 UART: [art] Erasing AUTHORITY.KEYID = 7
2,441,863 UART: [art] PUB.X = 2F4A91427D4BCE534173242E5BB59630396C38BF8595EBCC7A2AB81FFA046F8924D30892452881BB325135EF4AB91E9C
2,448,629 UART: [art] PUB.Y = 54EC753907D2589F3C06DDE9B2A9DCB8310FD902EB55262A0B166F96ED2A593E798849200723C595ADA87CCF3A09421B
2,455,562 UART: [art] SIG.R = 543282C5E4454E6130CF1BB5FF6A60969921DFB719F51F74CA988D5EC18CF69A0A12C969837899E6B92D527ACA496A16
2,462,331 UART: [art] SIG.S = D6DB74DDD57000D33510809E9923482F03F6D4C42354DD42CC64F659AD1D1B8FA1983D520FDC374E0AFE842835699C03
2,485,432 UART: mock_rt_interact::rt_entry...FMC Tester
2,593,286 UART: [rt] Runtime listening for mailbox commands...
2,596,676 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
891,629 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,758 UART: [kat] ++
895,910 UART: [kat] sha1
900,072 UART: [kat] SHA2-256
902,012 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
916,529 UART: [kat] HMAC-384Kdf
921,301 UART: [kat] LMS
1,169,613 UART: [kat] --
1,170,770 UART: [cold-reset] ++
1,171,234 UART: [fht] FHT @ 0x50003400
1,174,094 UART: [idev] ++
1,174,262 UART: [idev] CDI.KEYID = 6
1,174,623 UART: [idev] SUBJECT.KEYID = 7
1,175,048 UART: [idev] UDS.KEYID = 0
1,175,394 ready_for_fw is high
1,175,394 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,183,224 UART: [idev] Erasing UDS.KEYID = 0
1,200,086 UART: [idev] Sha1 KeyId Algorithm
1,209,048 UART: [idev] --
1,209,943 UART: [ldev] ++
1,210,111 UART: [ldev] CDI.KEYID = 6
1,210,475 UART: [ldev] SUBJECT.KEYID = 5
1,210,902 UART: [ldev] AUTHORITY.KEYID = 7
1,211,365 UART: [ldev] FE.KEYID = 1
1,216,449 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,511 UART: [ldev] --
1,281,991 UART: [fwproc] Wait for Commands...
1,282,730 UART: [fwproc] Recv command 0x46574c44
1,283,463 UART: [fwproc] Recv'd Img size: 75384 bytes
2,135,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,162,697 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,192,006 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,269,478 >>> mbox cmd response: success
2,269,478 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,270,579 UART: [afmc] ++
2,270,747 UART: [afmc] CDI.KEYID = 6
2,271,110 UART: [afmc] SUBJECT.KEYID = 7
2,271,536 UART: [afmc] AUTHORITY.KEYID = 5
2,306,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,323,583 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,324,334 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,330,063 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,335,946 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,341,665 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,349,496 UART: [afmc] --
2,350,454 UART: [cold-reset] --
2,351,180 UART: [state] Locking Datavault
2,352,265 UART: [state] Locking PCR0, PCR1 and PCR31
2,352,869 UART: [state] Locking ICCM
2,353,299 UART: [exit] Launching FMC @ 0x40000130
2,358,628 UART:
2,358,644 UART: Running Caliptra FMC ...
2,359,052 UART:
2,359,195 UART: [state] CFI Enabled
2,369,920 UART: [fht] FMC Alias Private Key: 7
2,477,839 UART: [art] Extend RT PCRs Done
2,478,267 UART: [art] Lock RT PCRs Done
2,479,675 UART: [art] Populate DV Done
2,487,658 UART: [fht] FMC Alias Private Key: 7
2,488,800 UART: [art] Derive CDI
2,489,080 UART: [art] Store in in slot 0x4
2,574,753 UART: [art] Derive Key Pair
2,575,113 UART: [art] Store priv key in slot 0x5
2,588,103 UART: [art] Derive Key Pair - Done
2,603,038 UART: [art] Signing Cert with AUTHO
2,603,518 UART: RITY.KEYID = 7
2,618,562 UART: [art] Erasing AUTHORITY.KEYID = 7
2,619,327 UART: [art] PUB.X = C02DD524CE27BB628F34BA81A76FBFA41AF7DC7E298D423DC737BA8670283E2373E2F558DF487DC165514B934C2D3BCB
2,626,111 UART: [art] PUB.Y = E8A1E5FBF50EB55A2F7165603FBE42A26D210B920BFA92C3C2BB5AE928D99D1A9A5843A01B9D496BA398AEE852A382A0
2,633,068 UART: [art] SIG.R = EC219C7FD600E87FF3C6067220B49CFABD6DF022F3B7EA726194A53E6B5B28F174E16C24CDFDFE53B2BECF9799E14F6A
2,639,835 UART: [art] SIG.S = 371781E2ADF645671CA00756E350C51277BEFEB543E89396AEB91A14362365FE68246827F5A2C115C57DD2416C54D60C
2,663,396 UART: mock_rt_interact::rt_entry...FMC Tester
2,770,796 UART: [rt] Runtime listening for mailbox commands...
2,774,186 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,261 ready_for_fw is high
1,056,261 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,117,150 >>> mbox cmd response: success
2,117,150 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,178,628 UART:
2,178,644 UART: Running Caliptra FMC ...
2,179,052 UART:
2,179,195 UART: [state] CFI Enabled
2,190,142 UART: [fht] FMC Alias Private Key: 7
2,298,425 UART: [art] Extend RT PCRs Done
2,298,853 UART: [art] Lock RT PCRs Done
2,300,417 UART: [art] Populate DV Done
2,308,696 UART: [fht] FMC Alias Private Key: 7
2,309,816 UART: [art] Derive CDI
2,310,096 UART: [art] Store in in slot 0x4
2,395,703 UART: [art] Derive Key Pair
2,396,063 UART: [art] Store priv key in slot 0x5
2,409,105 UART: [art] Derive Key Pair - Done
2,423,797 UART: [art] Signing Cert with AUTHO
2,424,277 UART: RITY.KEYID = 7
2,439,161 UART: [art] Erasing AUTHORITY.KEYID = 7
2,439,926 UART: [art] PUB.X = EC23B2BCF84F06A4E6C4EB23C622F5638B2A7F601EFC5E86B4082324E25873BFD1783788E8379920E285B5E2E74800F0
2,446,670 UART: [art] PUB.Y = 6CA6A1D75AA8F1B51800FBC7B9B5EECA026B826119DCD88D385A308DEB6374B5D6035BBA79297673588481073C7C3279
2,453,593 UART: [art] SIG.R = B3CCEFD0814DEE3491EFF5D4AAE18CE382130388CB21C1048725E1FB71840FFEF9C2B89045D72F4C782223FA12BEFD2F
2,460,372 UART: [art] SIG.S = 6DB1B02D3B256B8247C77F8AAC9BFABA8979938B2AE009061FE3EDF7EA54C5873E2927BFD66B6B4A96B451EC790A5243
2,484,228 UART: mock_rt_interact::rt_entry...FMC Tester
2,591,792 UART: [rt] Runtime listening for mailbox commands...
2,595,182 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,486 UART: [state] LifecycleState = Unprovisioned
86,141 UART: [state] DebugLocked = No
86,743 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,411 UART: [kat] SHA2-256
882,342 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,457 UART: [kat] ++
886,609 UART: [kat] sha1
890,923 UART: [kat] SHA2-256
892,861 UART: [kat] SHA2-384
895,696 UART: [kat] SHA2-512-ACC
897,597 UART: [kat] ECC-384
903,400 UART: [kat] HMAC-384Kdf
908,124 UART: [kat] LMS
1,476,320 UART: [kat] --
1,477,197 UART: [cold-reset] ++
1,477,603 UART: [fht] Storing FHT @ 0x50003400
1,480,392 UART: [idev] ++
1,480,560 UART: [idev] CDI.KEYID = 6
1,480,920 UART: [idev] SUBJECT.KEYID = 7
1,481,344 UART: [idev] UDS.KEYID = 0
1,481,689 ready_for_fw is high
1,481,689 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,489,206 UART: [idev] Erasing UDS.KEYID = 0
1,505,980 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,616 UART: [idev] --
1,515,679 UART: [ldev] ++
1,515,847 UART: [ldev] CDI.KEYID = 6
1,516,210 UART: [ldev] SUBJECT.KEYID = 5
1,516,636 UART: [ldev] AUTHORITY.KEYID = 7
1,517,099 UART: [ldev] FE.KEYID = 1
1,522,285 UART: [ldev] Erasing FE.KEYID = 1
1,547,722 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,856 UART: [ldev] --
1,587,341 UART: [fwproc] Waiting for Commands...
1,588,016 UART: [fwproc] Received command 0x46574c44
1,588,807 UART: [fwproc] Received Image of size 75384 bytes
2,441,019 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,468,809 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,498,161 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,575,586 >>> mbox cmd response: success
2,575,586 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,576,718 UART: [afmc] ++
2,576,886 UART: [afmc] CDI.KEYID = 6
2,577,248 UART: [afmc] SUBJECT.KEYID = 7
2,577,673 UART: [afmc] AUTHORITY.KEYID = 5
2,612,468 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,628,674 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,629,454 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,635,182 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,641,067 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,646,757 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,654,776 UART: [afmc] --
2,655,664 UART: [cold-reset] --
2,656,628 UART: [state] Locking Datavault
2,657,635 UART: [state] Locking PCR0, PCR1 and PCR31
2,658,239 UART: [state] Locking ICCM
2,658,891 UART: [exit] Launching FMC @ 0x40000130
2,664,220 UART:
2,664,236 UART: Running Caliptra FMC ...
2,664,644 UART:
2,664,698 UART: [state] CFI Enabled
2,675,345 UART: [fht] FMC Alias Private Key: 7
2,783,934 UART: [art] Extend RT PCRs Done
2,784,362 UART: [art] Lock RT PCRs Done
2,785,786 UART: [art] Populate DV Done
2,794,063 UART: [fht] FMC Alias Private Key: 7
2,795,145 UART: [art] Derive CDI
2,795,425 UART: [art] Store in in slot 0x4
2,880,854 UART: [art] Derive Key Pair
2,881,214 UART: [art] Store priv key in slot 0x5
2,894,778 UART: [art] Derive Key Pair - Done
2,909,650 UART: [art] Signing Cert with AUTHO
2,910,130 UART: RITY.KEYID = 7
2,924,998 UART: [art] Erasing AUTHORITY.KEYID = 7
2,925,763 UART: [art] PUB.X = 62292D2273F845B397671DCF430C7D9881259E94FADF4D8A0B9AD225C433E9BF8B364E1DE9E4857B7EE8D0AFB883A430
2,932,535 UART: [art] PUB.Y = 9817FF9BDAAA34720C54030B8C1BE8BA9D028C876CD2FC985D25B4CEEDD8AC113CAAC19925E63B7C683A384ED8B4CB67
2,939,495 UART: [art] SIG.R = 7D269EE5B9525876E83FB7661B1E3C1A00B0EBD16EB90546AA24312FDEE117223D8566F874B20B590F07E314FBCFA4C2
2,946,239 UART: [art] SIG.S = 5B229A2598DBD5456267C2EE61522388A27EC17AE15DC63CEBE7538856CE553F3BCAAB68E2370B872D8DF7D73D0227F7
2,969,828 UART: mock_rt_interact::rt_entry...FMC Tester
3,077,703 UART: [rt] Runtime listening for mailbox commands...
3,081,093 >>> mbox cmd response data (2048 bytes)
3,081,094 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,082,326 >>> mbox cmd response data (336 bytes)
3,082,327 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,094,918 >>> mbox cmd response data (1536 bytes)
3,094,919 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,095,025 UART:
3,095,041 UART: Running Caliptra ROM ...
3,095,449 UART:
3,095,503 UART: [state] CFI Enabled
3,098,299 UART: [state] LifecycleState = Unprovisioned
3,098,954 UART: [state] DebugLocked = No
3,099,558 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,101,245 UART: [kat] SHA2-256
3,895,176 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,899,291 UART: [kat] ++
3,899,443 UART: [kat] sha1
3,903,803 UART: [kat] SHA2-256
3,905,741 UART: [kat] SHA2-384
3,908,362 UART: [kat] SHA2-512-ACC
3,910,262 UART: [kat] ECC-384
3,915,613 UART: [kat] HMAC-384Kdf
3,920,217 UART: [kat] LMS
4,488,413 UART: [kat] --
4,489,280 UART: [update-reset] ++
5,378,284 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,379,444 UART: [update-reset] Loading Runtime at address 0x40005000 len 50700
5,470,898 >>> mbox cmd response: success
5,471,055 UART: [update-reset] Copying MAN_2 To MAN_1
5,479,069 UART: [update-reset Success] --
5,480,130 UART: [state] Locking Datavault
5,480,996 UART: [state] Locking PCR0, PCR1 and PCR31
5,481,600 UART: [state] Locking ICCM
5,482,102 UART: [exit] Launching FMC @ 0x40000130
5,487,431 UART:
5,487,447 UART: Running Caliptra FMC ...
5,487,855 UART:
5,487,909 UART: [state] CFI Enabled
5,576,960 UART: [art] Extend RT PCRs Done
5,577,388 UART: [art] Lock RT PCRs Done
5,578,427 UART: [art] Populate DV Done
5,586,628 UART: [fht] FMC Alias Private Key: 7
5,587,582 UART: [art] Derive CDI
5,587,862 UART: [art] Store in in slot 0x4
5,672,957 UART: [art] Derive Key Pair
5,673,317 UART: [art] Store priv key in slot 0x5
5,685,917 UART: [art] Derive Key Pair - Done
5,700,917 UART: [art] Signing Cert with AUTHO
5,701,397 UART: RITY.KEYID = 7
5,716,681 UART: [art] Erasing AUTHORITY.KEYID = 7
5,717,446 UART: [art] PUB.X = 3273003BCA65E0466B6E3F191A3D1664C2B5FBAE95CCEE11AA8D46AD4CE7B8D6D98BB9700681E9C29BB3A0715F2B2071
5,724,205 UART: [art] PUB.Y = 2D19DB971D30D83C0BB26FFB06C1AD20099C43C4028DF649F4414A45E73C79FF92125A9F02A7899CE3BE3FFE16A87B87
5,731,150 UART: [art] SIG.R = 4373C4C65063303859AB658A39186D9AB39934BA341D5B55A679DC2ED03B782CC7EB0742C7B40946DA8FD87262012FB8
5,737,909 UART: [art] SIG.S = 2B9CF1E8C93EC38991E3FFBB3381DD65994A4BED0CB3A9FE13858DAD850200357EFA8F407EA0128162C91969C00F9E19
5,760,616 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,761,603 UART: mock_rt_interact::rt_entry...FMC Tester
6,042,822 UART: [rt] Runtime listening for mailbox commands...
6,044,857 >>> mbox cmd response data (336 bytes)
6,044,858 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,057,449 >>> mbox cmd response data (1536 bytes)
6,057,450 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,057,467 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,775 ready_for_fw is high
1,362,775 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,423,198 >>> mbox cmd response: success
2,423,198 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,483,444 UART:
2,483,460 UART: Running Caliptra FMC ...
2,483,868 UART:
2,483,922 UART: [state] CFI Enabled
2,494,231 UART: [fht] FMC Alias Private Key: 7
2,602,670 UART: [art] Extend RT PCRs Done
2,603,098 UART: [art] Lock RT PCRs Done
2,604,768 UART: [art] Populate DV Done
2,612,995 UART: [fht] FMC Alias Private Key: 7
2,614,033 UART: [art] Derive CDI
2,614,313 UART: [art] Store in in slot 0x4
2,699,848 UART: [art] Derive Key Pair
2,700,208 UART: [art] Store priv key in slot 0x5
2,713,534 UART: [art] Derive Key Pair - Done
2,728,193 UART: [art] Signing Cert with AUTHO
2,728,673 UART: RITY.KEYID = 7
2,743,561 UART: [art] Erasing AUTHORITY.KEYID = 7
2,744,326 UART: [art] PUB.X = A9CC52E1022E0ED8C2505C6B3129748DB1E9348249076A66DD61027FB847F9937013B7D9314688FCF872DCC8E4FF2A89
2,751,084 UART: [art] PUB.Y = A408B198FE239FA2B1712124522B2EA5D5DAC866958FED640C6C9FE9392B995688C2DABAB04B4F4713392FCC2E465B26
2,758,036 UART: [art] SIG.R = 3EF12EBF3D13930A6E07008DF87BDB40AAE63E85813F5C940AE710D882007642F901B6014FA0791523872524D31327E6
2,764,741 UART: [art] SIG.S = 942FC32CB100F632138BACE64D137B3DB53D32C216D444CB8FA48406E4363B2EC4FCE73A35D6EE7278FB3D7CC2F783C3
2,788,729 UART: mock_rt_interact::rt_entry...FMC Tester
2,896,259 UART: [rt] Runtime listening for mailbox commands...
2,899,649 >>> mbox cmd response data (2048 bytes)
2,899,650 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,900,882 >>> mbox cmd response data (336 bytes)
2,900,883 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,913,474 >>> mbox cmd response data (1536 bytes)
2,913,475 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
5,170,622 >>> mbox cmd response: success
5,183,863 UART:
5,183,879 UART: Running Caliptra FMC ...
5,184,287 UART:
5,184,341 UART: [state] CFI Enabled
5,273,538 UART: [art] Extend RT PCRs Done
5,273,966 UART: [art] Lock RT PCRs Done
5,275,349 UART: [art] Populate DV Done
5,283,326 UART: [fht] FMC Alias Private Key: 7
5,284,400 UART: [art] Derive CDI
5,284,680 UART: [art] Store in in slot 0x4
5,370,297 UART: [art] Derive Key Pair
5,370,657 UART: [art] Store priv key in slot 0x5
5,383,791 UART: [art] Derive Key Pair - Done
5,398,805 UART: [art] Signing Cert with AUTHO
5,399,285 UART: RITY.KEYID = 7
5,414,825 UART: [art] Erasing AUTHORITY.KEYID = 7
5,415,590 UART: [art] PUB.X = 4CE50EFE8E6A8D7A4F4459C3CB0FBD11F46720F4DBFBE69565B7822D19DC278F94A44C26A018E452DB8777E290E8D0D6
5,422,368 UART: [art] PUB.Y = 35625CD070F5CD5BF9FCE11DEBDE5FC4F9BBFA3EC805CB58A96AFEEB480333D1B691F337C4D63417AA24838D96F7CAAF
5,429,340 UART: [art] SIG.R = B654EF042507636415B0760F84C99D577C2BF9188DBAEAB768F33E1AD87072F34BAF8CBBB8A7B6DFAB90F500E67D6618
5,436,091 UART: [art] SIG.S = 39F66F6E4E1EA396897E058803EA0710D7658D97DE8B9868C992C2D0AA778FBE25FF87AFA61ADE9E4BCB17ED47519BB3
5,458,982 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,459,921 UART: mock_rt_interact::rt_entry...FMC Tester
5,741,951 UART: [rt] Runtime listening for mailbox commands...
5,743,986 >>> mbox cmd response data (336 bytes)
5,743,987 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,756,578 >>> mbox cmd response data (1536 bytes)
5,756,579 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,756,596 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,793 UART: [state] LifecycleState = Unprovisioned
86,448 UART: [state] DebugLocked = No
86,948 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,552 UART: [kat] SHA2-256
882,483 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,598 UART: [kat] ++
886,750 UART: [kat] sha1
891,080 UART: [kat] SHA2-256
893,018 UART: [kat] SHA2-384
895,585 UART: [kat] SHA2-512-ACC
897,486 UART: [kat] ECC-384
903,291 UART: [kat] HMAC-384Kdf
907,739 UART: [kat] LMS
1,475,935 UART: [kat] --
1,476,764 UART: [cold-reset] ++
1,477,194 UART: [fht] Storing FHT @ 0x50003400
1,480,043 UART: [idev] ++
1,480,211 UART: [idev] CDI.KEYID = 6
1,480,571 UART: [idev] SUBJECT.KEYID = 7
1,480,995 UART: [idev] UDS.KEYID = 0
1,481,340 ready_for_fw is high
1,481,340 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,488,793 UART: [idev] Erasing UDS.KEYID = 0
1,505,327 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,105 UART: [idev] --
1,514,942 UART: [ldev] ++
1,515,110 UART: [ldev] CDI.KEYID = 6
1,515,473 UART: [ldev] SUBJECT.KEYID = 5
1,515,899 UART: [ldev] AUTHORITY.KEYID = 7
1,516,362 UART: [ldev] FE.KEYID = 1
1,521,474 UART: [ldev] Erasing FE.KEYID = 1
1,547,709 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,153 UART: [ldev] --
1,586,532 UART: [fwproc] Waiting for Commands...
1,587,195 UART: [fwproc] Received command 0x46574c44
1,587,986 UART: [fwproc] Received Image of size 75384 bytes
2,440,076 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,467,522 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,496,874 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,574,263 >>> mbox cmd response: success
2,574,263 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,575,321 UART: [afmc] ++
2,575,489 UART: [afmc] CDI.KEYID = 6
2,575,851 UART: [afmc] SUBJECT.KEYID = 7
2,576,276 UART: [afmc] AUTHORITY.KEYID = 5
2,611,657 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,627,781 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,628,561 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,634,289 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,640,174 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,645,864 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,653,813 UART: [afmc] --
2,654,803 UART: [cold-reset] --
2,655,687 UART: [state] Locking Datavault
2,656,696 UART: [state] Locking PCR0, PCR1 and PCR31
2,657,300 UART: [state] Locking ICCM
2,657,880 UART: [exit] Launching FMC @ 0x40000130
2,663,209 UART:
2,663,225 UART: Running Caliptra FMC ...
2,663,633 UART:
2,663,776 UART: [state] CFI Enabled
2,674,603 UART: [fht] FMC Alias Private Key: 7
2,782,328 UART: [art] Extend RT PCRs Done
2,782,756 UART: [art] Lock RT PCRs Done
2,784,304 UART: [art] Populate DV Done
2,792,759 UART: [fht] FMC Alias Private Key: 7
2,793,885 UART: [art] Derive CDI
2,794,165 UART: [art] Store in in slot 0x4
2,879,736 UART: [art] Derive Key Pair
2,880,096 UART: [art] Store priv key in slot 0x5
2,893,104 UART: [art] Derive Key Pair - Done
2,908,279 UART: [art] Signing Cert with AUTHO
2,908,759 UART: RITY.KEYID = 7
2,924,205 UART: [art] Erasing AUTHORITY.KEYID = 7
2,924,970 UART: [art] PUB.X = 184BA772A0AF1E040FF8C044A7F89F64EFE096B409F0564C3C9D8EB4B12B6AD55FFBBCBFD46370CCDB0E92C4F11FE5FF
2,931,756 UART: [art] PUB.Y = 68B773D5ACB284D03E066E4D9B4AF863F2806A1188D245928C5CD20FD1F20A06968F990544D8F35206ED90A1C94A9B50
2,938,688 UART: [art] SIG.R = C314559A792E8B3DD829D93B5FA6AA894325B879962870678F11862EA38AA3EF7497098DD454FC9F5524AB14C8095AFD
2,945,452 UART: [art] SIG.S = 0D414CC7E16E7CC04717665D8B103416DA4693CD379C8E7FB9DB1064E92C4CE3674A4F705FD57B8C96D78749254928AC
2,969,360 UART: mock_rt_interact::rt_entry...FMC Tester
3,077,908 UART: [rt] Runtime listening for mailbox commands...
3,081,298 >>> mbox cmd response data (2048 bytes)
3,081,299 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,082,531 >>> mbox cmd response data (336 bytes)
3,082,532 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,095,123 >>> mbox cmd response data (1536 bytes)
3,095,124 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,095,230 UART:
3,095,246 UART: Running Caliptra ROM ...
3,095,654 UART:
3,095,795 UART: [state] CFI Enabled
3,098,183 UART: [state] LifecycleState = Unprovisioned
3,098,838 UART: [state] DebugLocked = No
3,099,326 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,100,995 UART: [kat] SHA2-256
3,894,926 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,899,041 UART: [kat] ++
3,899,193 UART: [kat] sha1
3,903,479 UART: [kat] SHA2-256
3,905,417 UART: [kat] SHA2-384
3,908,026 UART: [kat] SHA2-512-ACC
3,909,926 UART: [kat] ECC-384
3,915,639 UART: [kat] HMAC-384Kdf
3,920,473 UART: [kat] LMS
4,488,669 UART: [kat] --
4,489,674 UART: [update-reset] ++
5,377,992 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,379,102 UART: [update-reset] Loading Runtime at address 0x40005000 len 50700
5,470,556 >>> mbox cmd response: success
5,470,903 UART: [update-reset] Copying MAN_2 To MAN_1
5,478,917 UART: [update-reset Success] --
5,479,798 UART: [state] Locking Datavault
5,480,604 UART: [state] Locking PCR0, PCR1 and PCR31
5,481,208 UART: [state] Locking ICCM
5,481,766 UART: [exit] Launching FMC @ 0x40000130
5,487,095 UART:
5,487,111 UART: Running Caliptra FMC ...
5,487,519 UART:
5,487,662 UART: [state] CFI Enabled
5,576,453 UART: [art] Extend RT PCRs Done
5,576,881 UART: [art] Lock RT PCRs Done
5,578,172 UART: [art] Populate DV Done
5,586,247 UART: [fht] FMC Alias Private Key: 7
5,587,345 UART: [art] Derive CDI
5,587,625 UART: [art] Store in in slot 0x4
5,673,282 UART: [art] Derive Key Pair
5,673,642 UART: [art] Store priv key in slot 0x5
5,686,712 UART: [art] Derive Key Pair - Done
5,701,473 UART: [art] Signing Cert with AUTHO
5,701,953 UART: RITY.KEYID = 7
5,717,347 UART: [art] Erasing AUTHORITY.KEYID = 7
5,718,112 UART: [art] PUB.X = 73CB58A3557E544A6D608B89D43A0C3A746F7A621C82C6EC3EE87F45545FE4D99A65FF6981E438CDAEB8CFE7A8184C38
5,724,891 UART: [art] PUB.Y = 37F9131BB8B6057017AC8A54B40363895269C882F98824C4771E5D641D09A2067A7F5ADC18CF387CB1015DD681BE0BFA
5,731,823 UART: [art] SIG.R = 6F5818F1E89A69E5911DD46FF760B87F728FBC3F95244E7D530769948C4F77B07588A9F028644297D1132A524E053CED
5,738,581 UART: [art] SIG.S = 503BFFBA8FA964A63FE86F5A7B69FBDCDD50A41DCF0E2410CAF3A9FD4C0576BE3075F083E74D2BD8A8F1455216D820A9
5,761,331 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,762,316 UART: mock_rt_interact::rt_entry...FMC Tester
6,047,233 UART: [rt] Runtime listening for mailbox commands...
6,049,268 >>> mbox cmd response data (336 bytes)
6,049,269 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,061,860 >>> mbox cmd response data (1536 bytes)
6,061,861 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,061,878 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,932 ready_for_fw is high
1,362,932 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,424,339 >>> mbox cmd response: success
2,424,339 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,486,405 UART:
2,486,421 UART: Running Caliptra FMC ...
2,486,829 UART:
2,486,972 UART: [state] CFI Enabled
2,498,031 UART: [fht] FMC Alias Private Key: 7
2,606,724 UART: [art] Extend RT PCRs Done
2,607,152 UART: [art] Lock RT PCRs Done
2,608,532 UART: [art] Populate DV Done
2,616,887 UART: [fht] FMC Alias Private Key: 7
2,617,987 UART: [art] Derive CDI
2,618,267 UART: [art] Store in in slot 0x4
2,703,756 UART: [art] Derive Key Pair
2,704,116 UART: [art] Store priv key in slot 0x5
2,718,340 UART: [art] Derive Key Pair - Done
2,733,251 UART: [art] Signing Cert with AUTHO
2,733,731 UART: RITY.KEYID = 7
2,749,101 UART: [art] Erasing AUTHORITY.KEYID = 7
2,749,866 UART: [art] PUB.X = 7FD9F4D0B9E864B912427894ED8BA215E14EBD33AD95534C8C27E25D74E2A58887DAD503EF56E1CBF2CFD465F8EEF1B4
2,756,651 UART: [art] PUB.Y = B666B6E50032FA147745C6455BADC30A97E6044BEDB9641261055E440CA977C0A360A182531DB03DDED31118213B8013
2,763,563 UART: [art] SIG.R = D1934143C18A1FBE1F7920FAD62CB19180F3CE248D5F1792A9FC2FCCEF70A6DFD8B239CBF60FEE04CFFA7CF9D77D050E
2,770,349 UART: [art] SIG.S = 5CA35DF2A5741E592772C94748B610C3FCD0DE5C667B642915660004FC0853A6434447BE42851A962CEC90AEBBA7EF1C
2,794,302 UART: mock_rt_interact::rt_entry...FMC Tester
2,902,332 UART: [rt] Runtime listening for mailbox commands...
2,905,722 >>> mbox cmd response data (2048 bytes)
2,905,723 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,906,955 >>> mbox cmd response data (336 bytes)
2,906,956 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,919,547 >>> mbox cmd response data (1536 bytes)
2,919,548 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
5,175,546 >>> mbox cmd response: success
5,189,007 UART:
5,189,023 UART: Running Caliptra FMC ...
5,189,431 UART:
5,189,574 UART: [state] CFI Enabled
5,278,693 UART: [art] Extend RT PCRs Done
5,279,121 UART: [art] Lock RT PCRs Done
5,280,372 UART: [art] Populate DV Done
5,288,599 UART: [fht] FMC Alias Private Key: 7
5,289,765 UART: [art] Derive CDI
5,290,045 UART: [art] Store in in slot 0x4
5,375,948 UART: [art] Derive Key Pair
5,376,308 UART: [art] Store priv key in slot 0x5
5,389,876 UART: [art] Derive Key Pair - Done
5,404,634 UART: [art] Signing Cert with AUTHO
5,405,114 UART: RITY.KEYID = 7
5,420,368 UART: [art] Erasing AUTHORITY.KEYID = 7
5,421,133 UART: [art] PUB.X = 4F5C00693975F41911BBCB06A88CD73F67F29F01F3EBB66AED8E0FB462E45944E2541EF3F11318D28F0C86C6531B10EE
5,427,877 UART: [art] PUB.Y = 69BAF96FE557DD672519D8723397CA715A9E01F47696E7A81C9682685B5CEA8A69A570D7CAE34651485B8777EC92E690
5,434,822 UART: [art] SIG.R = 02153A5F33038AD5B0B304D1B95C13CD696B4A8DFF08B161A706542503F24BCF68AED02DFE3F8A3A2773E4B9F305E261
5,441,579 UART: [art] SIG.S = 89D7FA844930BF05CB4D890A7578A6FA7F7E90B72687296B48CDEBEAA03745562766C1D4C4819287961A176030F98100
5,463,833 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,464,942 UART: mock_rt_interact::rt_entry...FMC Tester
5,746,598 UART: [rt] Runtime listening for mailbox commands...
5,748,633 >>> mbox cmd response data (336 bytes)
5,748,634 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,761,225 >>> mbox cmd response data (1536 bytes)
5,761,226 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,761,243 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,776 UART: [state] LifecycleState = Unprovisioned
85,431 UART: [state] DebugLocked = No
85,947 UART: [state] WD Timer not started. Device not locked for debugging
87,086 UART: [kat] SHA2-256
892,736 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,861 UART: [kat] ++
897,013 UART: [kat] sha1
901,269 UART: [kat] SHA2-256
903,209 UART: [kat] SHA2-384
905,908 UART: [kat] SHA2-512-ACC
907,809 UART: [kat] ECC-384
917,614 UART: [kat] HMAC-384Kdf
922,086 UART: [kat] LMS
1,170,414 UART: [kat] --
1,171,437 UART: [cold-reset] ++
1,171,811 UART: [fht] FHT @ 0x50003400
1,174,520 UART: [idev] ++
1,174,688 UART: [idev] CDI.KEYID = 6
1,175,048 UART: [idev] SUBJECT.KEYID = 7
1,175,472 UART: [idev] UDS.KEYID = 0
1,175,817 ready_for_fw is high
1,175,817 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,183,390 UART: [idev] Erasing UDS.KEYID = 0
1,200,761 UART: [idev] Sha1 KeyId Algorithm
1,209,323 UART: [idev] --
1,210,529 UART: [ldev] ++
1,210,697 UART: [ldev] CDI.KEYID = 6
1,211,060 UART: [ldev] SUBJECT.KEYID = 5
1,211,486 UART: [ldev] AUTHORITY.KEYID = 7
1,211,949 UART: [ldev] FE.KEYID = 1
1,217,131 UART: [ldev] Erasing FE.KEYID = 1
1,243,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,619 UART: [ldev] --
1,283,110 UART: [fwproc] Wait for Commands...
1,283,812 UART: [fwproc] Recv command 0x46574c44
1,284,540 UART: [fwproc] Recv'd Img size: 75384 bytes
2,137,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,164,526 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,193,830 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,271,245 >>> mbox cmd response: success
2,271,245 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,272,321 UART: [afmc] ++
2,272,489 UART: [afmc] CDI.KEYID = 6
2,272,851 UART: [afmc] SUBJECT.KEYID = 7
2,273,276 UART: [afmc] AUTHORITY.KEYID = 5
2,309,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,325,760 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,326,508 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,332,236 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,338,121 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,343,840 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,351,434 UART: [afmc] --
2,352,520 UART: [cold-reset] --
2,353,596 UART: [state] Locking Datavault
2,354,627 UART: [state] Locking PCR0, PCR1 and PCR31
2,355,231 UART: [state] Locking ICCM
2,355,817 UART: [exit] Launching FMC @ 0x40000130
2,361,146 UART:
2,361,162 UART: Running Caliptra FMC ...
2,361,570 UART:
2,361,624 UART: [state] CFI Enabled
2,371,845 UART: [fht] FMC Alias Private Key: 7
2,479,908 UART: [art] Extend RT PCRs Done
2,480,336 UART: [art] Lock RT PCRs Done
2,482,108 UART: [art] Populate DV Done
2,490,357 UART: [fht] FMC Alias Private Key: 7
2,491,303 UART: [art] Derive CDI
2,491,583 UART: [art] Store in in slot 0x4
2,577,258 UART: [art] Derive Key Pair
2,577,618 UART: [art] Store priv key in slot 0x5
2,590,968 UART: [art] Derive Key Pair - Done
2,605,434 UART: [art] Signing Cert with AUTHO
2,605,914 UART: RITY.KEYID = 7
2,621,086 UART: [art] Erasing AUTHORITY.KEYID = 7
2,621,851 UART: [art] PUB.X = E0CA2F08C1FCD42816CDD5BD91D8F835712891E43C9CFD0DFDB505553F9D6C066E76F700D5678C07B76C944C55707848
2,628,590 UART: [art] PUB.Y = 9CE9DB03158A97F655E32AA1AC61339BFCD118B4DF7C4BFE9EA0B1A838E4388611AFD86F427B5AEF64FA36503ED765DA
2,635,557 UART: [art] SIG.R = 2802D41AD61907036FAED89E320DC58688B2FB616D3946C6AC28A35C839379E4C4887E15B537D0ED3F2261EA0BFDB54F
2,642,318 UART: [art] SIG.S = 249E24D4494BB2A435DB0E185FE11A0C19575449A4346BA699B40F252DCAE9C6C30B4C927708D7DBB3DFD2B7257FA7C8
2,666,294 UART: mock_rt_interact::rt_entry...FMC Tester
2,773,484 UART: [rt] Runtime listening for mailbox commands...
2,776,874 >>> mbox cmd response data (2048 bytes)
2,776,875 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,778,107 >>> mbox cmd response data (336 bytes)
2,778,108 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,790,699 >>> mbox cmd response data (1536 bytes)
2,790,700 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,790,803 UART:
2,790,819 UART: Running Caliptra ROM ...
2,791,227 UART:
2,791,282 UART: [state] CFI Enabled
2,793,772 UART: [state] LifecycleState = Unprovisioned
2,794,427 UART: [state] DebugLocked = No
2,795,011 UART: [state] WD Timer not started. Device not locked for debugging
2,796,339 UART: [kat] SHA2-256
3,601,989 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,606,114 UART: [kat] ++
3,606,266 UART: [kat] sha1
3,610,556 UART: [kat] SHA2-256
3,612,496 UART: [kat] SHA2-384
3,615,135 UART: [kat] SHA2-512-ACC
3,617,035 UART: [kat] ECC-384
3,626,750 UART: [kat] HMAC-384Kdf
3,631,270 UART: [kat] LMS
3,879,598 UART: [kat] --
3,880,340 UART: [update-reset] ++
4,746,808 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,747,903 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,839,305 >>> mbox cmd response: success
4,839,434 UART: [update-reset] Copying MAN_2 To MAN_1
4,847,448 UART: [update-reset Success] --
4,848,693 UART: [state] Locking Datavault
4,849,691 UART: [state] Locking PCR0, PCR1 and PCR31
4,850,295 UART: [state] Locking ICCM
4,850,839 UART: [exit] Launching FMC @ 0x40000130
4,856,168 UART:
4,856,184 UART: Running Caliptra FMC ...
4,856,592 UART:
4,856,646 UART: [state] CFI Enabled
4,946,463 UART: [art] Extend RT PCRs Done
4,946,891 UART: [art] Lock RT PCRs Done
4,948,174 UART: [art] Populate DV Done
4,956,275 UART: [fht] FMC Alias Private Key: 7
4,957,389 UART: [art] Derive CDI
4,957,669 UART: [art] Store in in slot 0x4
5,043,266 UART: [art] Derive Key Pair
5,043,626 UART: [art] Store priv key in slot 0x5
5,056,178 UART: [art] Derive Key Pair - Done
5,070,993 UART: [art] Signing Cert with AUTHO
5,071,473 UART: RITY.KEYID = 7
5,087,099 UART: [art] Erasing AUTHORITY.KEYID = 7
5,087,864 UART: [art] PUB.X = B0A0606C98C2D1EB5466801F0B798442AB33227F3B608F9364837DFAE046C5386988FBC6F6CFE1D2B22953BB19272492
5,094,629 UART: [art] PUB.Y = 20FCFB32ED1ED4C38A40D5AA8E5E72BACA41EF0F8C2CF2EB4A01C58CA80090142A4082799423FCA0D5CE6AA3F348E88E
5,101,575 UART: [art] SIG.R = A95B9A2932E0B0F35F52D0C5B636AFF6EE1345426CF1A360BA8455B4F7A1E8E9F2E98ACC55BB69180BF64B060EFFF956
5,108,352 UART: [art] SIG.S = BB8762114182CE2738255CCB1B6DE8CCA12D4E39370E976EEA7BCF4D09965CE32EEF2584ECABF25155056565581962CA
5,130,957 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,131,818 UART: mock_rt_interact::rt_entry...FMC Tester
5,408,537 UART: [rt] Runtime listening for mailbox commands...
5,410,572 >>> mbox cmd response data (336 bytes)
5,410,573 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,423,164 >>> mbox cmd response data (1536 bytes)
5,423,165 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,423,182 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,531 ready_for_fw is high
1,059,531 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,121,392 >>> mbox cmd response: success
2,121,392 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,183,760 UART:
2,183,776 UART: Running Caliptra FMC ...
2,184,184 UART:
2,184,238 UART: [state] CFI Enabled
2,194,803 UART: [fht] FMC Alias Private Key: 7
2,302,878 UART: [art] Extend RT PCRs Done
2,303,306 UART: [art] Lock RT PCRs Done
2,304,926 UART: [art] Populate DV Done
2,313,279 UART: [fht] FMC Alias Private Key: 7
2,314,373 UART: [art] Derive CDI
2,314,653 UART: [art] Store in in slot 0x4
2,400,068 UART: [art] Derive Key Pair
2,400,428 UART: [art] Store priv key in slot 0x5
2,413,744 UART: [art] Derive Key Pair - Done
2,428,521 UART: [art] Signing Cert with AUTHO
2,429,001 UART: RITY.KEYID = 7
2,444,337 UART: [art] Erasing AUTHORITY.KEYID = 7
2,445,102 UART: [art] PUB.X = 2036D91108C32D59DB93CA8BD02CE6E9DDFE138C3F10E32E513008B3E35681F7EA2D7EBD8749F726A6B32898CBBB7202
2,451,873 UART: [art] PUB.Y = 09952B44A29F0D7A2CCD550508D5119DD95A9C1D9E094ED8D80A481040CD1FA095ADC896DF16FEB569CF3950CFF06C4E
2,458,819 UART: [art] SIG.R = 75B5481FF43E96CD7C3D7DACAEE612E54EBDD08AE1AF57351C436DFD4A9DB3FF8CB337D4B1C5C5A3217779DF0AE9F5DB
2,465,616 UART: [art] SIG.S = FE2D9EC9C9D8726D124F91916248387C23B21EDDCC92BCFFCB27F11576BB0C43E99C2A8C267F0E05278C8C6C353BBCBA
2,489,282 UART: mock_rt_interact::rt_entry...FMC Tester
2,596,364 UART: [rt] Runtime listening for mailbox commands...
2,599,754 >>> mbox cmd response data (2048 bytes)
2,599,755 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,600,987 >>> mbox cmd response data (336 bytes)
2,600,988 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,613,579 >>> mbox cmd response data (1536 bytes)
2,613,580 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,547,694 >>> mbox cmd response: success
4,561,388 UART:
4,561,404 UART: Running Caliptra FMC ...
4,561,812 UART:
4,561,866 UART: [state] CFI Enabled
4,650,845 UART: [art] Extend RT PCRs Done
4,651,273 UART: [art] Lock RT PCRs Done
4,652,604 UART: [art] Populate DV Done
4,660,893 UART: [fht] FMC Alias Private Key: 7
4,661,875 UART: [art] Derive CDI
4,662,155 UART: [art] Store in in slot 0x4
4,747,904 UART: [art] Derive Key Pair
4,748,264 UART: [art] Store priv key in slot 0x5
4,761,640 UART: [art] Derive Key Pair - Done
4,776,572 UART: [art] Signing Cert with AUTHO
4,777,052 UART: RITY.KEYID = 7
4,792,280 UART: [art] Erasing AUTHORITY.KEYID = 7
4,793,045 UART: [art] PUB.X = 6DF55A19115AF12B754BAB1D30E5F1B564628AD191B9E85DAB4BD610B722DFC32602D4E9E1B8AFB460A8A8C2DE315ACA
4,799,832 UART: [art] PUB.Y = B26E1C1852D0713600B56A60FC1B8BB3AA706E2BA52799ABECF21569578955EFA2A7A5890C9A608412EA127EECC34451
4,806,763 UART: [art] SIG.R = 5189174A66BA4EC6AF80A151704F14EDC5AE14F66CD4C995F25DB9A8A2FC07A13D5C6D3368C04B4B8845B1500566066B
4,813,530 UART: [art] SIG.S = 24147A0A4C274ACF69BC52922CBCFC2FA504E63453FB6EFC3065CD4171EC718978642AF2EB94903FE1408D7E0B5F2148
4,836,415 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,837,322 UART: mock_rt_interact::rt_entry...FMC Tester
5,117,458 UART: [rt] Runtime listening for mailbox commands...
5,119,493 >>> mbox cmd response data (336 bytes)
5,119,494 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,132,085 >>> mbox cmd response data (1536 bytes)
5,132,086 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,132,103 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
893,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,698 UART: [kat] ++
897,850 UART: [kat] sha1
902,170 UART: [kat] SHA2-256
904,110 UART: [kat] SHA2-384
906,959 UART: [kat] SHA2-512-ACC
908,860 UART: [kat] ECC-384
918,679 UART: [kat] HMAC-384Kdf
923,329 UART: [kat] LMS
1,171,657 UART: [kat] --
1,172,356 UART: [cold-reset] ++
1,172,758 UART: [fht] FHT @ 0x50003400
1,175,553 UART: [idev] ++
1,175,721 UART: [idev] CDI.KEYID = 6
1,176,081 UART: [idev] SUBJECT.KEYID = 7
1,176,505 UART: [idev] UDS.KEYID = 0
1,176,850 ready_for_fw is high
1,176,850 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,184,469 UART: [idev] Erasing UDS.KEYID = 0
1,201,374 UART: [idev] Sha1 KeyId Algorithm
1,210,040 UART: [idev] --
1,211,168 UART: [ldev] ++
1,211,336 UART: [ldev] CDI.KEYID = 6
1,211,699 UART: [ldev] SUBJECT.KEYID = 5
1,212,125 UART: [ldev] AUTHORITY.KEYID = 7
1,212,588 UART: [ldev] FE.KEYID = 1
1,217,942 UART: [ldev] Erasing FE.KEYID = 1
1,244,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,492 UART: [ldev] --
1,283,905 UART: [fwproc] Wait for Commands...
1,284,531 UART: [fwproc] Recv command 0x46574c44
1,285,259 UART: [fwproc] Recv'd Img size: 75384 bytes
2,137,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,164,153 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,193,457 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,270,800 >>> mbox cmd response: success
2,270,800 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,271,850 UART: [afmc] ++
2,272,018 UART: [afmc] CDI.KEYID = 6
2,272,380 UART: [afmc] SUBJECT.KEYID = 7
2,272,805 UART: [afmc] AUTHORITY.KEYID = 5
2,308,236 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,324,587 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,325,335 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,331,063 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,336,948 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,342,667 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,350,527 UART: [afmc] --
2,351,595 UART: [cold-reset] --
2,352,179 UART: [state] Locking Datavault
2,353,270 UART: [state] Locking PCR0, PCR1 and PCR31
2,353,874 UART: [state] Locking ICCM
2,354,530 UART: [exit] Launching FMC @ 0x40000130
2,359,859 UART:
2,359,875 UART: Running Caliptra FMC ...
2,360,283 UART:
2,360,426 UART: [state] CFI Enabled
2,370,863 UART: [fht] FMC Alias Private Key: 7
2,478,938 UART: [art] Extend RT PCRs Done
2,479,366 UART: [art] Lock RT PCRs Done
2,480,610 UART: [art] Populate DV Done
2,488,959 UART: [fht] FMC Alias Private Key: 7
2,489,991 UART: [art] Derive CDI
2,490,271 UART: [art] Store in in slot 0x4
2,576,216 UART: [art] Derive Key Pair
2,576,576 UART: [art] Store priv key in slot 0x5
2,589,312 UART: [art] Derive Key Pair - Done
2,603,950 UART: [art] Signing Cert with AUTHO
2,604,430 UART: RITY.KEYID = 7
2,619,200 UART: [art] Erasing AUTHORITY.KEYID = 7
2,619,965 UART: [art] PUB.X = 696E22EBB2180CE10222A81EBA99DA08ED4FB8275E0B756DB4DD5600707C9933E83D365D2AD5B2C4CD7DBE5E5B7B6F89
2,626,717 UART: [art] PUB.Y = 32BF9B0425C3D017E8F7E48D5EC8F0301C3FEE53312A2D88016E3EF77EEAC1802341B5CF3D5A8C38998367173FE8A67F
2,633,669 UART: [art] SIG.R = B5038A69BE9B0E9679009D5B90E0DC71CB18650C486680469881A9F221FCD7AD714CCFDCDFD5CC4DE3DED074DFDD8B24
2,640,428 UART: [art] SIG.S = 455EAC865529C9DDD496C14A54819741B9118B5175E2C14FE453B847443569DC02BC83E365017502B1488625AAB0FFF2
2,664,022 UART: mock_rt_interact::rt_entry...FMC Tester
2,771,304 UART: [rt] Runtime listening for mailbox commands...
2,774,694 >>> mbox cmd response data (2048 bytes)
2,774,695 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,775,927 >>> mbox cmd response data (336 bytes)
2,775,928 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,788,519 >>> mbox cmd response data (1536 bytes)
2,788,520 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,788,623 UART:
2,788,639 UART: Running Caliptra ROM ...
2,789,047 UART:
2,789,189 UART: [state] CFI Enabled
2,791,861 UART: [state] LifecycleState = Unprovisioned
2,792,516 UART: [state] DebugLocked = No
2,793,054 UART: [state] WD Timer not started. Device not locked for debugging
2,794,364 UART: [kat] SHA2-256
3,600,014 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,604,139 UART: [kat] ++
3,604,291 UART: [kat] sha1
3,608,349 UART: [kat] SHA2-256
3,610,289 UART: [kat] SHA2-384
3,612,960 UART: [kat] SHA2-512-ACC
3,614,860 UART: [kat] ECC-384
3,624,527 UART: [kat] HMAC-384Kdf
3,629,137 UART: [kat] LMS
3,877,465 UART: [kat] --
3,878,103 UART: [update-reset] ++
4,744,829 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,745,856 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,837,258 >>> mbox cmd response: success
4,837,605 UART: [update-reset] Copying MAN_2 To MAN_1
4,845,619 UART: [update-reset Success] --
4,846,784 UART: [state] Locking Datavault
4,847,688 UART: [state] Locking PCR0, PCR1 and PCR31
4,848,292 UART: [state] Locking ICCM
4,848,886 UART: [exit] Launching FMC @ 0x40000130
4,854,215 UART:
4,854,231 UART: Running Caliptra FMC ...
4,854,639 UART:
4,854,782 UART: [state] CFI Enabled
4,944,087 UART: [art] Extend RT PCRs Done
4,944,515 UART: [art] Lock RT PCRs Done
4,945,948 UART: [art] Populate DV Done
4,954,211 UART: [fht] FMC Alias Private Key: 7
4,955,343 UART: [art] Derive CDI
4,955,623 UART: [art] Store in in slot 0x4
5,041,566 UART: [art] Derive Key Pair
5,041,926 UART: [art] Store priv key in slot 0x5
5,055,730 UART: [art] Derive Key Pair - Done
5,070,477 UART: [art] Signing Cert with AUTHO
5,070,957 UART: RITY.KEYID = 7
5,086,159 UART: [art] Erasing AUTHORITY.KEYID = 7
5,086,924 UART: [art] PUB.X = 38BF91913C5F4729BF776A29265A19677792B53C09DB20D6D45CF4D610EA7EAECC728C957C63A449E94EB7D6E58F9BAC
5,093,701 UART: [art] PUB.Y = A8BEA50662146BFD87E19245BAF15A95962DB0A855B9EF8AC5A334600A7778279CFD6B0760F8E71238F40AA6B2B53851
5,100,643 UART: [art] SIG.R = DA8E0A384A31AA6AB0BDDED573DDCF92778FD3CBC2364CBFA20635EB4C02BB9B588EB88C408171D2715B1314E5E0ECF3
5,107,428 UART: [art] SIG.S = 700F5EE5BE4086182D6510032687D6DC87746E04634ECCF1BC9AF4269F3F686249514467ABBCCF13101CEFFCBBB18831
5,130,387 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,131,414 UART: mock_rt_interact::rt_entry...FMC Tester
5,415,100 UART: [rt] Runtime listening for mailbox commands...
5,417,135 >>> mbox cmd response data (336 bytes)
5,417,136 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,429,727 >>> mbox cmd response data (1536 bytes)
5,429,728 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,429,745 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,574 ready_for_fw is high
1,061,574 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,124,777 >>> mbox cmd response: success
2,124,777 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,186,397 UART:
2,186,413 UART: Running Caliptra FMC ...
2,186,821 UART:
2,186,964 UART: [state] CFI Enabled
2,197,591 UART: [fht] FMC Alias Private Key: 7
2,305,976 UART: [art] Extend RT PCRs Done
2,306,404 UART: [art] Lock RT PCRs Done
2,307,996 UART: [art] Populate DV Done
2,316,321 UART: [fht] FMC Alias Private Key: 7
2,317,487 UART: [art] Derive CDI
2,317,767 UART: [art] Store in in slot 0x4
2,403,138 UART: [art] Derive Key Pair
2,403,498 UART: [art] Store priv key in slot 0x5
2,416,654 UART: [art] Derive Key Pair - Done
2,431,461 UART: [art] Signing Cert with AUTHO
2,431,941 UART: RITY.KEYID = 7
2,447,375 UART: [art] Erasing AUTHORITY.KEYID = 7
2,448,140 UART: [art] PUB.X = 325E1B3927C43BC7FBE2FB1E76701DB3C758BF03E370ABD5F8EE351482FB9883FD8DCB86DBABD1AB59C72E9FF4A5ECEC
2,454,937 UART: [art] PUB.Y = 004C529392FE0329F21CEDC71220CA20E1D525C8E741AD983110965F7A0389F9E802175C2BB2E4D670655344EC658091
2,461,848 UART: [art] SIG.R = 97B5634AF665E9306878B250D21D2BD88D9B3B23E2560E2176EA11C1FEE018DFE1093C1049E31E0EE09948E869AB94E8
2,468,611 UART: [art] SIG.S = 25BEA68568E2E09EBE8F650ECFD4A640766C1B30289773A660C8B35575ADF0C91D2F4712F13FE39F92CC943A6D34CDCE
2,492,055 UART: mock_rt_interact::rt_entry...FMC Tester
2,598,647 UART: [rt] Runtime listening for mailbox commands...
2,602,037 >>> mbox cmd response data (2048 bytes)
2,602,038 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,603,270 >>> mbox cmd response data (336 bytes)
2,603,271 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,615,862 >>> mbox cmd response data (1536 bytes)
2,615,863 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,548,856 >>> mbox cmd response: success
4,562,462 UART:
4,562,478 UART: Running Caliptra FMC ...
4,562,886 UART:
4,563,029 UART: [state] CFI Enabled
4,651,814 UART: [art] Extend RT PCRs Done
4,652,242 UART: [art] Lock RT PCRs Done
4,653,533 UART: [art] Populate DV Done
4,661,886 UART: [fht] FMC Alias Private Key: 7
4,662,816 UART: [art] Derive CDI
4,663,096 UART: [art] Store in in slot 0x4
4,748,639 UART: [art] Derive Key Pair
4,748,999 UART: [art] Store priv key in slot 0x5
4,762,513 UART: [art] Derive Key Pair - Done
4,777,447 UART: [art] Signing Cert with AUTHO
4,777,927 UART: RITY.KEYID = 7
4,793,101 UART: [art] Erasing AUTHORITY.KEYID = 7
4,793,866 UART: [art] PUB.X = 80750EC23EC4DC42663A40E676CED53E6130EDA3ED50B709A8BFCE14F4E7163C7EAF6E63A860ADFFEE8A96FBB6C2686A
4,800,654 UART: [art] PUB.Y = D027D03FF586E19FC503100B7319418FD29E4F9F0F2B819ED3434D712B2EEB18DA53BA2D9FE8067CC4319F16FF9BB599
4,807,602 UART: [art] SIG.R = 3F1C7ACC4F060DC8C181C795F2DF8C1474C9991164B317D48A1E4EDEE7652FD1170FF83503C1930366A3CF26A1BE6780
4,814,363 UART: [art] SIG.S = 0E5F6868FC758E5762676FEF90EB420EF35ABEE53AD24A3BD38BDBA99E3016405B6F9F2E898C4BB74BF3B2E0E186F5D4
4,837,805 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,839,034 UART: mock_rt_interact::rt_entry...FMC Tester
5,118,938 UART: [rt] Runtime listening for mailbox commands...
5,120,973 >>> mbox cmd response data (336 bytes)
5,120,974 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,133,565 >>> mbox cmd response data (1536 bytes)
5,133,566 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,133,583 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,764 UART: [state] LifecycleState = Unprovisioned
85,419 UART: [state] DebugLocked = No
85,943 UART: [state] WD Timer not started. Device not locked for debugging
87,254 UART: [kat] SHA2-256
890,804 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,933 UART: [kat] ++
895,085 UART: [kat] sha1
899,455 UART: [kat] SHA2-256
901,395 UART: [kat] SHA2-384
904,136 UART: [kat] SHA2-512-ACC
906,037 UART: [kat] ECC-384
915,686 UART: [kat] HMAC-384Kdf
920,428 UART: [kat] LMS
1,168,740 UART: [kat] --
1,169,977 UART: [cold-reset] ++
1,170,517 UART: [fht] FHT @ 0x50003400
1,173,321 UART: [idev] ++
1,173,489 UART: [idev] CDI.KEYID = 6
1,173,850 UART: [idev] SUBJECT.KEYID = 7
1,174,275 UART: [idev] UDS.KEYID = 0
1,174,621 ready_for_fw is high
1,174,621 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,182,319 UART: [idev] Erasing UDS.KEYID = 0
1,199,201 UART: [idev] Sha1 KeyId Algorithm
1,208,183 UART: [idev] --
1,209,234 UART: [ldev] ++
1,209,402 UART: [ldev] CDI.KEYID = 6
1,209,766 UART: [ldev] SUBJECT.KEYID = 5
1,210,193 UART: [ldev] AUTHORITY.KEYID = 7
1,210,656 UART: [ldev] FE.KEYID = 1
1,215,978 UART: [ldev] Erasing FE.KEYID = 1
1,242,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,998 UART: [ldev] --
1,281,506 UART: [fwproc] Wait for Commands...
1,282,079 UART: [fwproc] Recv command 0x46574c44
1,282,812 UART: [fwproc] Recv'd Img size: 75384 bytes
2,134,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,161,018 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,190,327 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,267,733 >>> mbox cmd response: success
2,267,733 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,268,768 UART: [afmc] ++
2,268,936 UART: [afmc] CDI.KEYID = 6
2,269,299 UART: [afmc] SUBJECT.KEYID = 7
2,269,725 UART: [afmc] AUTHORITY.KEYID = 5
2,304,890 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,320,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,321,733 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,327,462 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,333,345 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,339,064 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,346,893 UART: [afmc] --
2,347,845 UART: [cold-reset] --
2,348,535 UART: [state] Locking Datavault
2,349,726 UART: [state] Locking PCR0, PCR1 and PCR31
2,350,330 UART: [state] Locking ICCM
2,350,928 UART: [exit] Launching FMC @ 0x40000130
2,356,257 UART:
2,356,273 UART: Running Caliptra FMC ...
2,356,681 UART:
2,356,735 UART: [state] CFI Enabled
2,367,250 UART: [fht] FMC Alias Private Key: 7
2,475,389 UART: [art] Extend RT PCRs Done
2,475,817 UART: [art] Lock RT PCRs Done
2,477,137 UART: [art] Populate DV Done
2,485,190 UART: [fht] FMC Alias Private Key: 7
2,486,206 UART: [art] Derive CDI
2,486,486 UART: [art] Store in in slot 0x4
2,572,327 UART: [art] Derive Key Pair
2,572,687 UART: [art] Store priv key in slot 0x5
2,586,575 UART: [art] Derive Key Pair - Done
2,601,637 UART: [art] Signing Cert with AUTHO
2,602,117 UART: RITY.KEYID = 7
2,617,179 UART: [art] Erasing AUTHORITY.KEYID = 7
2,617,944 UART: [art] PUB.X = 69217BD769F4770E710915EBBE3B9539A467D61F90A37F0CB5545ACA012B8FDD78408708F344378C94ACE8D4EF2DA1A4
2,624,705 UART: [art] PUB.Y = 5C53BF5D609635B131CDED0B7D66CA81CBF15D993471D5221D47160CEFA20408504F5834B3E76D685F76A136322DBAF8
2,631,647 UART: [art] SIG.R = 072A4BB0C09BF510D9850BD324C8739D5A716E39C5AF7B7FFCA29A92FBFF2411F627023E8BDD31396241C220D7C37523
2,638,414 UART: [art] SIG.S = EDE82939C1AC15BA27B8853194AB920D743FDDF01608EE8722A0E1702A4DADA9FFA6683A2C30EDC1E7356F781AEB2A9D
2,662,375 UART: mock_rt_interact::rt_entry...FMC Tester
2,769,975 UART: [rt] Runtime listening for mailbox commands...
2,773,365 >>> mbox cmd response data (2048 bytes)
2,773,366 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,774,598 >>> mbox cmd response data (336 bytes)
2,774,599 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,787,190 >>> mbox cmd response data (1536 bytes)
2,787,191 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,787,294 UART:
2,787,310 UART: Running Caliptra ROM ...
2,787,718 UART:
2,787,773 UART: [state] CFI Enabled
2,790,321 UART: [state] LifecycleState = Unprovisioned
2,790,976 UART: [state] DebugLocked = No
2,791,470 UART: [state] WD Timer not started. Device not locked for debugging
2,792,700 UART: [kat] SHA2-256
3,596,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,600,379 UART: [kat] ++
3,600,531 UART: [kat] sha1
3,604,795 UART: [kat] SHA2-256
3,606,735 UART: [kat] SHA2-384
3,609,454 UART: [kat] SHA2-512-ACC
3,611,354 UART: [kat] ECC-384
3,621,213 UART: [kat] HMAC-384Kdf
3,625,721 UART: [kat] LMS
3,874,033 UART: [kat] --
3,875,127 UART: [update-reset] ++
4,741,178 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,742,193 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,833,595 >>> mbox cmd response: success
4,833,910 UART: [update-reset] Copying MAN_2 To MAN_1
4,841,924 UART: [update-reset Success] --
4,842,903 UART: [state] Locking Datavault
4,843,717 UART: [state] Locking PCR0, PCR1 and PCR31
4,844,321 UART: [state] Locking ICCM
4,844,913 UART: [exit] Launching FMC @ 0x40000130
4,850,242 UART:
4,850,258 UART: Running Caliptra FMC ...
4,850,666 UART:
4,850,720 UART: [state] CFI Enabled
4,939,833 UART: [art] Extend RT PCRs Done
4,940,261 UART: [art] Lock RT PCRs Done
4,941,458 UART: [art] Populate DV Done
4,949,503 UART: [fht] FMC Alias Private Key: 7
4,950,685 UART: [art] Derive CDI
4,950,965 UART: [art] Store in in slot 0x4
5,036,810 UART: [art] Derive Key Pair
5,037,170 UART: [art] Store priv key in slot 0x5
5,050,302 UART: [art] Derive Key Pair - Done
5,065,141 UART: [art] Signing Cert with AUTHO
5,065,621 UART: RITY.KEYID = 7
5,080,811 UART: [art] Erasing AUTHORITY.KEYID = 7
5,081,576 UART: [art] PUB.X = F3B81664A25488405D2BB906718832DDD1AE9D7EA7D088ABB300369195CF0EDF4E212D9E15C5E5FA6A3E1729C1036F82
5,088,321 UART: [art] PUB.Y = E03DE7F5B2CAF5DA8FE11A8BFDD28E46DC72D9C7F44557FFC7931473941DD8CEF92F39945311A6EF6266FFC6D38C671F
5,095,291 UART: [art] SIG.R = C7513D428ECA9DEC88D50B808A8D5AEDF1A648547F272EA760B0F37BCE24BDA17CE84DBF35FFC608249788BAB5A1289A
5,102,075 UART: [art] SIG.S = 28FB70222089D5F6C79E579756BF14BF2E5BFE920C3BDB5B17693017D902BB0695015AC66F3EE3750AD3243F7B7D9ED3
5,125,392 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,126,463 UART: mock_rt_interact::rt_entry...FMC Tester
5,411,645 UART: [rt] Runtime listening for mailbox commands...
5,413,680 >>> mbox cmd response data (336 bytes)
5,413,681 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,426,272 >>> mbox cmd response data (1536 bytes)
5,426,273 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,426,290 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,696 ready_for_fw is high
1,054,696 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,116,611 >>> mbox cmd response: success
2,116,611 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,179,491 UART:
2,179,507 UART: Running Caliptra FMC ...
2,179,915 UART:
2,179,969 UART: [state] CFI Enabled
2,190,270 UART: [fht] FMC Alias Private Key: 7
2,297,993 UART: [art] Extend RT PCRs Done
2,298,421 UART: [art] Lock RT PCRs Done
2,300,237 UART: [art] Populate DV Done
2,308,756 UART: [fht] FMC Alias Private Key: 7
2,309,938 UART: [art] Derive CDI
2,310,218 UART: [art] Store in in slot 0x4
2,396,141 UART: [art] Derive Key Pair
2,396,501 UART: [art] Store priv key in slot 0x5
2,409,331 UART: [art] Derive Key Pair - Done
2,424,407 UART: [art] Signing Cert with AUTHO
2,424,887 UART: RITY.KEYID = 7
2,439,835 UART: [art] Erasing AUTHORITY.KEYID = 7
2,440,600 UART: [art] PUB.X = A56079D02454CF1703D0767231CB7CB375C2FE0E4EF7350AC7C953B3E12783AE5EA30183DD23B930722EE96E3A39F409
2,447,357 UART: [art] PUB.Y = B2895C1E855ADCF510866C66F252E5CCF9D0D74D777AA058DE4A33DE22F381C7E8E34B38BCEA88E97D41E06EE9E4B30A
2,454,322 UART: [art] SIG.R = 9E1FAFA2A96DC86C01826195CCAB4232DA40EE5AEE4660A750A97F19AA87F80BAFD1EB87FC5126A24AB4D4DDD8622D21
2,461,108 UART: [art] SIG.S = 82BEAFCE9A54044AD4611652614C1A5D8B6F5534F1400B52CE92437996A52719F14FA92B233B9552A9D9FE9A7BEB94DE
2,484,773 UART: mock_rt_interact::rt_entry...FMC Tester
2,591,854 UART: [rt] Runtime listening for mailbox commands...
2,595,244 >>> mbox cmd response data (2048 bytes)
2,595,245 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,596,477 >>> mbox cmd response data (336 bytes)
2,596,478 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,609,069 >>> mbox cmd response data (1536 bytes)
2,609,070 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,537,805 >>> mbox cmd response: success
4,551,007 UART:
4,551,023 UART: Running Caliptra FMC ...
4,551,431 UART:
4,551,485 UART: [state] CFI Enabled
4,640,666 UART: [art] Extend RT PCRs Done
4,641,094 UART: [art] Lock RT PCRs Done
4,642,481 UART: [art] Populate DV Done
4,650,486 UART: [fht] FMC Alias Private Key: 7
4,651,640 UART: [art] Derive CDI
4,651,920 UART: [art] Store in in slot 0x4
4,737,535 UART: [art] Derive Key Pair
4,737,895 UART: [art] Store priv key in slot 0x5
4,750,561 UART: [art] Derive Key Pair - Done
4,765,482 UART: [art] Signing Cert with AUTHO
4,765,962 UART: RITY.KEYID = 7
4,780,956 UART: [art] Erasing AUTHORITY.KEYID = 7
4,781,721 UART: [art] PUB.X = E1B85A3CB074FCB4984E64CC32EE410C7B6700F3DEFC8F01744646C40F41FB34C73B3D3FDA37F3A921A580E555937F11
4,788,470 UART: [art] PUB.Y = F7D862EA2E0489327CF34D02891BE03EBD4E9844C136AD50A7A6362226B8D3466974968CC02158029929B00A940F7B0C
4,795,396 UART: [art] SIG.R = 6DCAD39F0698E7A21EED89567DBC226873CA7A67AE2A766F2317A8F25D1020098626C688720849B93FCA011D21BF5109
4,802,151 UART: [art] SIG.S = BC594CECB74465622504D2996A0E4ECF86CBD70B1116A160EE081D2E984E917D0F6FFF1639B4CA707957E91D748C6496
4,824,984 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,825,837 UART: mock_rt_interact::rt_entry...FMC Tester
5,106,759 UART: [rt] Runtime listening for mailbox commands...
5,108,794 >>> mbox cmd response data (336 bytes)
5,108,795 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,121,386 >>> mbox cmd response data (1536 bytes)
5,121,387 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,121,404 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,874 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
891,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,754 UART: [kat] ++
895,906 UART: [kat] sha1
900,116 UART: [kat] SHA2-256
902,056 UART: [kat] SHA2-384
904,847 UART: [kat] SHA2-512-ACC
906,748 UART: [kat] ECC-384
916,797 UART: [kat] HMAC-384Kdf
921,439 UART: [kat] LMS
1,169,751 UART: [kat] --
1,170,798 UART: [cold-reset] ++
1,171,128 UART: [fht] FHT @ 0x50003400
1,173,922 UART: [idev] ++
1,174,090 UART: [idev] CDI.KEYID = 6
1,174,451 UART: [idev] SUBJECT.KEYID = 7
1,174,876 UART: [idev] UDS.KEYID = 0
1,175,222 ready_for_fw is high
1,175,222 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,182,854 UART: [idev] Erasing UDS.KEYID = 0
1,200,060 UART: [idev] Sha1 KeyId Algorithm
1,209,032 UART: [idev] --
1,210,147 UART: [ldev] ++
1,210,315 UART: [ldev] CDI.KEYID = 6
1,210,679 UART: [ldev] SUBJECT.KEYID = 5
1,211,106 UART: [ldev] AUTHORITY.KEYID = 7
1,211,569 UART: [ldev] FE.KEYID = 1
1,216,755 UART: [ldev] Erasing FE.KEYID = 1
1,243,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,531 UART: [ldev] --
1,282,987 UART: [fwproc] Wait for Commands...
1,283,812 UART: [fwproc] Recv command 0x46574c44
1,284,545 UART: [fwproc] Recv'd Img size: 75384 bytes
2,137,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,164,835 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,194,144 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,271,624 >>> mbox cmd response: success
2,271,624 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,272,773 UART: [afmc] ++
2,272,941 UART: [afmc] CDI.KEYID = 6
2,273,304 UART: [afmc] SUBJECT.KEYID = 7
2,273,730 UART: [afmc] AUTHORITY.KEYID = 5
2,308,645 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,325,391 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,326,142 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,331,871 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,337,754 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,343,473 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,351,248 UART: [afmc] --
2,352,178 UART: [cold-reset] --
2,352,832 UART: [state] Locking Datavault
2,354,007 UART: [state] Locking PCR0, PCR1 and PCR31
2,354,611 UART: [state] Locking ICCM
2,355,117 UART: [exit] Launching FMC @ 0x40000130
2,360,446 UART:
2,360,462 UART: Running Caliptra FMC ...
2,360,870 UART:
2,361,013 UART: [state] CFI Enabled
2,371,592 UART: [fht] FMC Alias Private Key: 7
2,480,335 UART: [art] Extend RT PCRs Done
2,480,763 UART: [art] Lock RT PCRs Done
2,482,295 UART: [art] Populate DV Done
2,490,396 UART: [fht] FMC Alias Private Key: 7
2,491,442 UART: [art] Derive CDI
2,491,722 UART: [art] Store in in slot 0x4
2,577,365 UART: [art] Derive Key Pair
2,577,725 UART: [art] Store priv key in slot 0x5
2,591,321 UART: [art] Derive Key Pair - Done
2,606,039 UART: [art] Signing Cert with AUTHO
2,606,519 UART: RITY.KEYID = 7
2,621,149 UART: [art] Erasing AUTHORITY.KEYID = 7
2,621,914 UART: [art] PUB.X = 304E81ECEDFA0181B7D178B78C3DDD2FEB79D1FACEDD6B672084C45AF9D6525F984915F8D3C6E8A2CA65F14DBC7E837A
2,628,705 UART: [art] PUB.Y = 54EE391CF673BF858D4FC64FC4A792A2C46F053391E62258CD5BB8B79BE229D54DF694C540C701DCAF1BA48CBDECDEB8
2,635,671 UART: [art] SIG.R = C59244FFFBAC2109067D4E1136622C309E0F15613312B880825E233102691C2114B6397F3EB89CA19C0695FC2860A452
2,642,414 UART: [art] SIG.S = 232180CBBC2E0C7BF00BA8BA733F180D3FD2FAE097FBCED684B052E8C1207A62A0B4ABB9BEE30C99228F98BFC0A2B415
2,665,719 UART: mock_rt_interact::rt_entry...FMC Tester
2,773,045 UART: [rt] Runtime listening for mailbox commands...
2,776,435 >>> mbox cmd response data (2048 bytes)
2,776,436 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,777,668 >>> mbox cmd response data (336 bytes)
2,777,669 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,790,260 >>> mbox cmd response data (1536 bytes)
2,790,261 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,790,364 UART:
2,790,380 UART: Running Caliptra ROM ...
2,790,788 UART:
2,790,930 UART: [state] CFI Enabled
2,793,324 UART: [state] LifecycleState = Unprovisioned
2,793,979 UART: [state] DebugLocked = No
2,794,487 UART: [state] WD Timer not started. Device not locked for debugging
2,795,597 UART: [kat] SHA2-256
3,599,147 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,603,276 UART: [kat] ++
3,603,428 UART: [kat] sha1
3,607,486 UART: [kat] SHA2-256
3,609,426 UART: [kat] SHA2-384
3,612,179 UART: [kat] SHA2-512-ACC
3,614,079 UART: [kat] ECC-384
3,623,944 UART: [kat] HMAC-384Kdf
3,628,430 UART: [kat] LMS
3,876,742 UART: [kat] --
3,877,674 UART: [update-reset] ++
4,742,869 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,743,972 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,835,374 >>> mbox cmd response: success
4,835,559 UART: [update-reset] Copying MAN_2 To MAN_1
4,843,573 UART: [update-reset Success] --
4,844,516 UART: [state] Locking Datavault
4,845,430 UART: [state] Locking PCR0, PCR1 and PCR31
4,846,034 UART: [state] Locking ICCM
4,846,472 UART: [exit] Launching FMC @ 0x40000130
4,851,801 UART:
4,851,817 UART: Running Caliptra FMC ...
4,852,225 UART:
4,852,368 UART: [state] CFI Enabled
4,941,349 UART: [art] Extend RT PCRs Done
4,941,777 UART: [art] Lock RT PCRs Done
4,942,800 UART: [art] Populate DV Done
4,950,967 UART: [fht] FMC Alias Private Key: 7
4,952,041 UART: [art] Derive CDI
4,952,321 UART: [art] Store in in slot 0x4
5,038,206 UART: [art] Derive Key Pair
5,038,566 UART: [art] Store priv key in slot 0x5
5,051,110 UART: [art] Derive Key Pair - Done
5,066,265 UART: [art] Signing Cert with AUTHO
5,066,745 UART: RITY.KEYID = 7
5,082,533 UART: [art] Erasing AUTHORITY.KEYID = 7
5,083,298 UART: [art] PUB.X = 62388024FE68887E6F6EE31AE7FF130B5DB1167486A29510AC309BD7A17CB863365CB812BC59C15B20F8B3EF614755E0
5,090,067 UART: [art] PUB.Y = 40E7514A72B29F0CFD9B282C08D1624AFF19AD07D56E6C906FC745EDC5E96CE29A449A48734DEEFFDEFA357B56898A70
5,097,024 UART: [art] SIG.R = CCE996E25FE8D73E39DB67E2DA0BEBAE9852D29279E76CE356213512853027D9310875E8B0F70178A5757BBDF390619E
5,103,787 UART: [art] SIG.S = 04757D51B064A120749192FB6602B55339D586E265DC8239A9A3AD0DB5671FC71DD7C9995D5A3E8245E97DEF9F283134
5,126,110 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,127,199 UART: mock_rt_interact::rt_entry...FMC Tester
5,407,937 UART: [rt] Runtime listening for mailbox commands...
5,409,972 >>> mbox cmd response data (336 bytes)
5,409,973 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,422,564 >>> mbox cmd response data (1536 bytes)
5,422,565 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,422,582 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,721 ready_for_fw is high
1,056,721 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,116,368 >>> mbox cmd response: success
2,116,368 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,178,790 UART:
2,178,806 UART: Running Caliptra FMC ...
2,179,214 UART:
2,179,357 UART: [state] CFI Enabled
2,190,166 UART: [fht] FMC Alias Private Key: 7
2,298,111 UART: [art] Extend RT PCRs Done
2,298,539 UART: [art] Lock RT PCRs Done
2,300,141 UART: [art] Populate DV Done
2,308,294 UART: [fht] FMC Alias Private Key: 7
2,309,234 UART: [art] Derive CDI
2,309,514 UART: [art] Store in in slot 0x4
2,394,787 UART: [art] Derive Key Pair
2,395,147 UART: [art] Store priv key in slot 0x5
2,408,435 UART: [art] Derive Key Pair - Done
2,422,919 UART: [art] Signing Cert with AUTHO
2,423,399 UART: RITY.KEYID = 7
2,438,533 UART: [art] Erasing AUTHORITY.KEYID = 7
2,439,298 UART: [art] PUB.X = 2A423FCD2F52F07D60121762BC3BFEF3AB4679F8CF087D8B566287E7561E6E074FF6B99B22FB8C268D8FA17FC480C2A6
2,446,074 UART: [art] PUB.Y = E49209BE7EC0EC1B696FBCD5655B7626CDBA8A31D4A35C90EAC43BDD9F0CE2AC3C8CA480FCA6818F0BBEC29CBDA68BBD
2,453,053 UART: [art] SIG.R = 81531F85E46A286ED94D7F9E3891D44D2C06E1DE5E3B3E5B307B3732CF7319372792E9A087C6207F96139681C84203E0
2,459,809 UART: [art] SIG.S = 0D21B7A02822C3CD68EF0ED55CCA31C1A070118CDF740D696D11F08F7927EA3BFC61CB02867DE64E00E24AC0B1DCE5A0
2,483,590 UART: mock_rt_interact::rt_entry...FMC Tester
2,590,192 UART: [rt] Runtime listening for mailbox commands...
2,593,582 >>> mbox cmd response data (2048 bytes)
2,593,583 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,594,815 >>> mbox cmd response data (336 bytes)
2,594,816 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,607,407 >>> mbox cmd response data (1536 bytes)
2,607,408 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,535,516 >>> mbox cmd response: success
4,549,024 UART:
4,549,040 UART: Running Caliptra FMC ...
4,549,448 UART:
4,549,591 UART: [state] CFI Enabled
4,638,520 UART: [art] Extend RT PCRs Done
4,638,948 UART: [art] Lock RT PCRs Done
4,640,237 UART: [art] Populate DV Done
4,648,578 UART: [fht] FMC Alias Private Key: 7
4,649,610 UART: [art] Derive CDI
4,649,890 UART: [art] Store in in slot 0x4
4,735,907 UART: [art] Derive Key Pair
4,736,267 UART: [art] Store priv key in slot 0x5
4,749,879 UART: [art] Derive Key Pair - Done
4,765,043 UART: [art] Signing Cert with AUTHO
4,765,523 UART: RITY.KEYID = 7
4,780,373 UART: [art] Erasing AUTHORITY.KEYID = 7
4,781,138 UART: [art] PUB.X = A4D5E176A21AB6A5C7CD8FF3038AF5F4E6A0418E20060576ED33E4C61F9720B73383285919DC1B6C09DEF23E3DAAB6C1
4,787,908 UART: [art] PUB.Y = 22167516474D3F83AFDBB168313AA30A342157A99D896EC39CE2D4A174407723E632AAD25419B4368C08E456CF322577
4,794,844 UART: [art] SIG.R = 1A7E5F73F954C6BA4923FB95171CB187DA59F4334011146A9412F4A7449A5EB217689D29DC800AF16166869000798F4E
4,801,581 UART: [art] SIG.S = CDE55FF2ABCF0D989E2497640D4C9A9ABD4CFCFCE0259130251C097B2D94A90225E9ED178DFE64FCA4F728E527AD446B
4,824,935 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,826,138 UART: mock_rt_interact::rt_entry...FMC Tester
5,107,222 UART: [rt] Runtime listening for mailbox commands...
5,109,257 >>> mbox cmd response data (336 bytes)
5,109,258 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,121,849 >>> mbox cmd response data (1536 bytes)
5,121,850 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,121,867 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.09s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.11s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.08s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c0ec6e5050523e0c2a27c06e49d5acfaf81eae844b1215e6006ceb6fd47130b65b95ab174284360638bc93169f754d4a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,996 UART: [kat] SHA2-256
891,546 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,675 UART: [kat] ++
895,827 UART: [kat] sha1
899,969 UART: [kat] SHA2-256
901,909 UART: [kat] SHA2-384
904,522 UART: [kat] SHA2-512-ACC
906,423 UART: [kat] ECC-384
916,220 UART: [kat] HMAC-384Kdf
920,888 UART: [kat] LMS
1,169,200 UART: [kat] --
1,169,953 UART: [cold-reset] ++
1,170,469 UART: [fht] FHT @ 0x50003400
1,173,013 UART: [idev] ++
1,173,181 UART: [idev] CDI.KEYID = 6
1,173,542 UART: [idev] SUBJECT.KEYID = 7
1,173,967 UART: [idev] UDS.KEYID = 0
1,182,123 UART: [idev] Erasing UDS.KEYID = 0
1,198,651 UART: [idev] Sha1 KeyId Algorithm
1,207,577 UART: [idev] --
1,208,418 UART: [ldev] ++
1,208,586 UART: [ldev] CDI.KEYID = 6
1,208,950 UART: [ldev] SUBJECT.KEYID = 5
1,209,377 UART: [ldev] AUTHORITY.KEYID = 7
1,209,840 UART: [ldev] FE.KEYID = 1
1,215,324 UART: [ldev] Erasing FE.KEYID = 1
1,241,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,886 UART: [ldev] --
1,281,362 UART: [fwproc] Wait for Commands...
1,282,013 UART: [fwproc] Recv command 0x43415053
1,283,008 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,135,485 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
87,048 UART: [state] WD Timer not started. Device not locked for debugging
88,209 UART: [kat] SHA2-256
891,759 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,888 UART: [kat] ++
896,040 UART: [kat] sha1
900,250 UART: [kat] SHA2-256
902,190 UART: [kat] SHA2-384
904,815 UART: [kat] SHA2-512-ACC
906,716 UART: [kat] ECC-384
917,031 UART: [kat] HMAC-384Kdf
921,647 UART: [kat] LMS
1,169,959 UART: [kat] --
1,171,026 UART: [cold-reset] ++
1,171,558 UART: [fht] FHT @ 0x50003400
1,174,312 UART: [idev] ++
1,174,480 UART: [idev] CDI.KEYID = 6
1,174,841 UART: [idev] SUBJECT.KEYID = 7
1,175,266 UART: [idev] UDS.KEYID = 0
1,183,282 UART: [idev] Erasing UDS.KEYID = 0
1,200,276 UART: [idev] Sha1 KeyId Algorithm
1,209,072 UART: [idev] --
1,210,107 UART: [ldev] ++
1,210,275 UART: [ldev] CDI.KEYID = 6
1,210,639 UART: [ldev] SUBJECT.KEYID = 5
1,211,066 UART: [ldev] AUTHORITY.KEYID = 7
1,211,529 UART: [ldev] FE.KEYID = 1
1,216,473 UART: [ldev] Erasing FE.KEYID = 1
1,242,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,539 UART: [ldev] --
1,281,955 UART: [fwproc] Wait for Commands...
1,282,594 UART: [fwproc] Recv command 0x43415053
1,283,589 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,135,834 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,620 UART: [kat] SHA2-256
891,170 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,299 UART: [kat] ++
895,451 UART: [kat] sha1
899,785 UART: [kat] SHA2-256
901,725 UART: [kat] SHA2-384
904,488 UART: [kat] SHA2-512-ACC
906,389 UART: [kat] ECC-384
915,918 UART: [kat] HMAC-384Kdf
920,518 UART: [kat] LMS
1,168,830 UART: [kat] --
1,169,935 UART: [cold-reset] ++
1,170,509 UART: [fht] FHT @ 0x50003400
1,173,121 UART: [idev] ++
1,173,289 UART: [idev] CDI.KEYID = 6
1,173,650 UART: [idev] SUBJECT.KEYID = 7
1,174,075 UART: [idev] UDS.KEYID = 0
1,181,907 UART: [idev] Erasing UDS.KEYID = 0
1,198,967 UART: [idev] Sha1 KeyId Algorithm
1,207,887 UART: [idev] --
1,208,812 UART: [ldev] ++
1,208,980 UART: [ldev] CDI.KEYID = 6
1,209,344 UART: [ldev] SUBJECT.KEYID = 5
1,209,771 UART: [ldev] AUTHORITY.KEYID = 7
1,210,234 UART: [ldev] FE.KEYID = 1
1,215,088 UART: [ldev] Erasing FE.KEYID = 1
1,241,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,446 UART: [ldev] --
1,280,710 UART: [fwproc] Wait for Commands...
1,281,523 UART: [fwproc] Recv command 0x43415053
1,282,518 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,136,701 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,420 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
891,319 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,448 UART: [kat] ++
895,600 UART: [kat] sha1
899,838 UART: [kat] SHA2-256
901,778 UART: [kat] SHA2-384
904,519 UART: [kat] SHA2-512-ACC
906,420 UART: [kat] ECC-384
916,153 UART: [kat] HMAC-384Kdf
920,765 UART: [kat] LMS
1,169,077 UART: [kat] --
1,169,922 UART: [cold-reset] ++
1,170,418 UART: [fht] FHT @ 0x50003400
1,173,104 UART: [idev] ++
1,173,272 UART: [idev] CDI.KEYID = 6
1,173,633 UART: [idev] SUBJECT.KEYID = 7
1,174,058 UART: [idev] UDS.KEYID = 0
1,182,246 UART: [idev] Erasing UDS.KEYID = 0
1,199,250 UART: [idev] Sha1 KeyId Algorithm
1,208,310 UART: [idev] --
1,209,355 UART: [ldev] ++
1,209,523 UART: [ldev] CDI.KEYID = 6
1,209,887 UART: [ldev] SUBJECT.KEYID = 5
1,210,314 UART: [ldev] AUTHORITY.KEYID = 7
1,210,777 UART: [ldev] FE.KEYID = 1
1,216,045 UART: [ldev] Erasing FE.KEYID = 1
1,242,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,405 UART: [ldev] --
1,281,861 UART: [fwproc] Wait for Commands...
1,282,606 UART: [fwproc] Recv command 0x43415053
1,283,601 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,136,758 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,414 UART: [state] LifecycleState = Unprovisioned
86,069 UART: [state] DebugLocked = No
86,783 UART: [state] WD Timer not started. Device not locked for debugging
87,956 UART: [kat] SHA2-256
891,506 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,635 UART: [kat] ++
895,787 UART: [kat] sha1
900,117 UART: [kat] SHA2-256
902,057 UART: [kat] SHA2-384
904,728 UART: [kat] SHA2-512-ACC
906,629 UART: [kat] ECC-384
916,718 UART: [kat] HMAC-384Kdf
921,362 UART: [kat] LMS
1,169,674 UART: [kat] --
1,170,421 UART: [cold-reset] ++
1,170,795 UART: [fht] FHT @ 0x50003400
1,173,495 UART: [idev] ++
1,173,663 UART: [idev] CDI.KEYID = 6
1,174,024 UART: [idev] SUBJECT.KEYID = 7
1,174,449 UART: [idev] UDS.KEYID = 0
1,182,275 UART: [idev] Erasing UDS.KEYID = 0
1,199,163 UART: [idev] Sha1 KeyId Algorithm
1,208,017 UART: [idev] --
1,209,194 UART: [ldev] ++
1,209,362 UART: [ldev] CDI.KEYID = 6
1,209,726 UART: [ldev] SUBJECT.KEYID = 5
1,210,153 UART: [ldev] AUTHORITY.KEYID = 7
1,210,616 UART: [ldev] FE.KEYID = 1
1,215,864 UART: [ldev] Erasing FE.KEYID = 1
1,242,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,902 UART: [ldev] --
1,281,296 UART: [fwproc] Wait for Commands...
1,282,083 UART: [fwproc] Recv command 0x43415053
1,283,078 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,135,827 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,554 UART: [kat] ++
895,706 UART: [kat] sha1
900,126 UART: [kat] SHA2-256
902,066 UART: [kat] SHA2-384
904,867 UART: [kat] SHA2-512-ACC
906,768 UART: [kat] ECC-384
916,615 UART: [kat] HMAC-384Kdf
921,303 UART: [kat] LMS
1,169,615 UART: [kat] --
1,170,700 UART: [cold-reset] ++
1,171,042 UART: [fht] FHT @ 0x50003400
1,173,650 UART: [idev] ++
1,173,818 UART: [idev] CDI.KEYID = 6
1,174,179 UART: [idev] SUBJECT.KEYID = 7
1,174,604 UART: [idev] UDS.KEYID = 0
1,182,772 UART: [idev] Erasing UDS.KEYID = 0
1,199,930 UART: [idev] Sha1 KeyId Algorithm
1,208,868 UART: [idev] --
1,209,855 UART: [ldev] ++
1,210,023 UART: [ldev] CDI.KEYID = 6
1,210,387 UART: [ldev] SUBJECT.KEYID = 5
1,210,814 UART: [ldev] AUTHORITY.KEYID = 7
1,211,277 UART: [ldev] FE.KEYID = 1
1,216,595 UART: [ldev] Erasing FE.KEYID = 1
1,243,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,047 UART: [ldev] --
1,282,487 UART: [fwproc] Wait for Commands...
1,283,208 UART: [fwproc] Recv command 0x43415053
1,284,203 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,135,476 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.12s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8914cf8d41580f0b4c771ee856f9813ef9d0b6b3f6480adbe9c3cb3a6af528b1e359e5039250b3601bbdff589cc1ae93",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2e0ecceba2d37eff40550e84336b1c6ef0d78c7c67e8f109c1933c26571900b985bb7475999ca6b5b4280f88e3472612",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8914cf8d41580f0b4c771ee856f9813ef9d0b6b3f6480adbe9c3cb3a6af528b1e359e5039250b3601bbdff589cc1ae93",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2e0ecceba2d37eff40550e84336b1c6ef0d78c7c67e8f109c1933c26571900b985bb7475999ca6b5b4280f88e3472612",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8914cf8d41580f0b4c771ee856f9813ef9d0b6b3f6480adbe9c3cb3a6af528b1e359e5039250b3601bbdff589cc1ae93",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2e0ecceba2d37eff40550e84336b1c6ef0d78c7c67e8f109c1933c26571900b985bb7475999ca6b5b4280f88e3472612",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8914cf8d41580f0b4c771ee856f9813ef9d0b6b3f6480adbe9c3cb3a6af528b1e359e5039250b3601bbdff589cc1ae93",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2e0ecceba2d37eff40550e84336b1c6ef0d78c7c67e8f109c1933c26571900b985bb7475999ca6b5b4280f88e3472612",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8914cf8d41580f0b4c771ee856f9813ef9d0b6b3f6480adbe9c3cb3a6af528b1e359e5039250b3601bbdff589cc1ae93",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2e0ecceba2d37eff40550e84336b1c6ef0d78c7c67e8f109c1933c26571900b985bb7475999ca6b5b4280f88e3472612",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8914cf8d41580f0b4c771ee856f9813ef9d0b6b3f6480adbe9c3cb3a6af528b1e359e5039250b3601bbdff589cc1ae93",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2e0ecceba2d37eff40550e84336b1c6ef0d78c7c67e8f109c1933c26571900b985bb7475999ca6b5b4280f88e3472612",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106848 bytes
2,495,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,661 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,677,608 >>> mbox cmd response: success
2,678,629 UART: [afmc] ++
2,678,797 UART: [afmc] CDI.KEYID = 6
2,679,160 UART: [afmc] SUBJECT.KEYID = 7
2,679,586 UART: [afmc] AUTHORITY.KEYID = 5
2,715,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,768 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,488 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,381 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,074 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,877 UART: [afmc] --
2,758,789 UART: [cold-reset] --
2,759,727 UART: [state] Locking Datavault
2,760,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,572 UART: [state] Locking ICCM
2,762,112 UART: [exit] Launching FMC @ 0x40000000
2,767,409 UART:
2,767,425 UART: Running Caliptra FMC ...
2,767,833 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,527,474 >>> mbox cmd response: success
2,589,942 UART:
2,589,958 UART: Running Caliptra FMC ...
2,590,366 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106848 bytes
2,495,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,661 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,677,608 >>> mbox cmd response: success
2,678,629 UART: [afmc] ++
2,678,797 UART: [afmc] CDI.KEYID = 6
2,679,160 UART: [afmc] SUBJECT.KEYID = 7
2,679,586 UART: [afmc] AUTHORITY.KEYID = 5
2,715,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,768 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,488 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,381 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,074 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,877 UART: [afmc] --
2,758,789 UART: [cold-reset] --
2,759,727 UART: [state] Locking Datavault
2,760,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,572 UART: [state] Locking ICCM
2,762,112 UART: [exit] Launching FMC @ 0x40000000
2,767,409 UART:
2,767,425 UART: Running Caliptra FMC ...
2,767,833 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,527,474 >>> mbox cmd response: success
2,589,942 UART:
2,589,958 UART: Running Caliptra FMC ...
2,590,366 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106848 bytes
2,495,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,661 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,677,608 >>> mbox cmd response: success
2,678,629 UART: [afmc] ++
2,678,797 UART: [afmc] CDI.KEYID = 6
2,679,160 UART: [afmc] SUBJECT.KEYID = 7
2,679,586 UART: [afmc] AUTHORITY.KEYID = 5
2,715,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,768 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,488 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,381 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,074 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,877 UART: [afmc] --
2,758,789 UART: [cold-reset] --
2,759,727 UART: [state] Locking Datavault
2,760,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,572 UART: [state] Locking ICCM
2,762,112 UART: [exit] Launching FMC @ 0x40000000
2,767,409 UART:
2,767,425 UART: Running Caliptra FMC ...
2,767,833 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,527,474 >>> mbox cmd response: success
2,589,942 UART:
2,589,958 UART: Running Caliptra FMC ...
2,590,366 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106848 bytes
2,495,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,661 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,677,608 >>> mbox cmd response: success
2,678,629 UART: [afmc] ++
2,678,797 UART: [afmc] CDI.KEYID = 6
2,679,160 UART: [afmc] SUBJECT.KEYID = 7
2,679,586 UART: [afmc] AUTHORITY.KEYID = 5
2,715,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,768 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,488 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,381 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,074 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,877 UART: [afmc] --
2,758,789 UART: [cold-reset] --
2,759,727 UART: [state] Locking Datavault
2,760,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,572 UART: [state] Locking ICCM
2,762,112 UART: [exit] Launching FMC @ 0x40000000
2,767,409 UART:
2,767,425 UART: Running Caliptra FMC ...
2,767,833 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,527,474 >>> mbox cmd response: success
2,589,942 UART:
2,589,958 UART: Running Caliptra FMC ...
2,590,366 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106848 bytes
2,495,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,661 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,677,608 >>> mbox cmd response: success
2,678,629 UART: [afmc] ++
2,678,797 UART: [afmc] CDI.KEYID = 6
2,679,160 UART: [afmc] SUBJECT.KEYID = 7
2,679,586 UART: [afmc] AUTHORITY.KEYID = 5
2,715,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,768 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,488 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,381 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,074 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,877 UART: [afmc] --
2,758,789 UART: [cold-reset] --
2,759,727 UART: [state] Locking Datavault
2,760,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,572 UART: [state] Locking ICCM
2,762,112 UART: [exit] Launching FMC @ 0x40000000
2,767,409 UART:
2,767,425 UART: Running Caliptra FMC ...
2,767,833 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,527,474 >>> mbox cmd response: success
2,589,942 UART:
2,589,958 UART: Running Caliptra FMC ...
2,590,366 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106848 bytes
2,495,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,661 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,677,608 >>> mbox cmd response: success
2,678,629 UART: [afmc] ++
2,678,797 UART: [afmc] CDI.KEYID = 6
2,679,160 UART: [afmc] SUBJECT.KEYID = 7
2,679,586 UART: [afmc] AUTHORITY.KEYID = 5
2,715,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,768 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,488 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,381 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,074 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,877 UART: [afmc] --
2,758,789 UART: [cold-reset] --
2,759,727 UART: [state] Locking Datavault
2,760,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,572 UART: [state] Locking ICCM
2,762,112 UART: [exit] Launching FMC @ 0x40000000
2,767,409 UART:
2,767,425 UART: Running Caliptra FMC ...
2,767,833 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,527,474 >>> mbox cmd response: success
2,589,942 UART:
2,589,958 UART: Running Caliptra FMC ...
2,590,366 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,692 UART: [state] LifecycleState = Unprovisioned
85,347 UART: [state] DebugLocked = No
86,033 UART: [state] WD Timer not started. Device not locked for debugging
87,378 UART: [kat] SHA2-256
890,928 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,057 UART: [kat] ++
895,209 UART: [kat] sha1
899,545 UART: [kat] SHA2-256
901,485 UART: [kat] SHA2-384
904,116 UART: [kat] SHA2-512-ACC
906,017 UART: [kat] ECC-384
915,798 UART: [kat] HMAC-384Kdf
920,292 UART: [kat] LMS
1,168,604 UART: [kat] --
1,169,493 UART: [cold-reset] ++
1,169,949 UART: [fht] FHT @ 0x50003400
1,172,669 UART: [idev] ++
1,172,837 UART: [idev] CDI.KEYID = 6
1,173,198 UART: [idev] SUBJECT.KEYID = 7
1,173,623 UART: [idev] UDS.KEYID = 0
1,181,579 UART: [idev] Erasing UDS.KEYID = 0
1,198,337 UART: [idev] Sha1 KeyId Algorithm
1,207,165 UART: [idev] --
1,208,228 UART: [ldev] ++
1,208,396 UART: [ldev] CDI.KEYID = 6
1,208,760 UART: [ldev] SUBJECT.KEYID = 5
1,209,187 UART: [ldev] AUTHORITY.KEYID = 7
1,209,650 UART: [ldev] FE.KEYID = 1
1,215,036 UART: [ldev] Erasing FE.KEYID = 1
1,241,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,580 UART: [ldev] --
1,280,098 UART: [fwproc] Wait for Commands...
1,280,889 UART: [fwproc] Recv command 0x46574c44
1,281,622 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,806 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,414 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,723 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,820 UART: [afmc] ++
2,773,988 UART: [afmc] CDI.KEYID = 6
2,774,351 UART: [afmc] SUBJECT.KEYID = 7
2,774,777 UART: [afmc] AUTHORITY.KEYID = 5
2,810,340 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,868 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,619 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,348 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,231 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,950 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,703 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,371 UART: [kat] SHA2-256
891,921 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,050 UART: [kat] ++
896,202 UART: [kat] sha1
900,274 UART: [kat] SHA2-256
902,214 UART: [kat] SHA2-384
904,929 UART: [kat] SHA2-512-ACC
906,830 UART: [kat] ECC-384
916,691 UART: [kat] HMAC-384Kdf
921,227 UART: [kat] LMS
1,169,539 UART: [kat] --
1,170,396 UART: [cold-reset] ++
1,170,744 UART: [fht] FHT @ 0x50003400
1,173,230 UART: [idev] ++
1,173,398 UART: [idev] CDI.KEYID = 6
1,173,759 UART: [idev] SUBJECT.KEYID = 7
1,174,184 UART: [idev] UDS.KEYID = 0
1,182,520 UART: [idev] Erasing UDS.KEYID = 0
1,199,896 UART: [idev] Sha1 KeyId Algorithm
1,208,808 UART: [idev] --
1,209,983 UART: [ldev] ++
1,210,151 UART: [ldev] CDI.KEYID = 6
1,210,515 UART: [ldev] SUBJECT.KEYID = 5
1,210,942 UART: [ldev] AUTHORITY.KEYID = 7
1,211,405 UART: [ldev] FE.KEYID = 1
1,216,565 UART: [ldev] Erasing FE.KEYID = 1
1,243,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,227 UART: [ldev] --
1,282,579 UART: [fwproc] Wait for Commands...
1,283,270 UART: [fwproc] Recv command 0x46574c44
1,284,003 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,727 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,036 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,191 UART: [afmc] ++
2,775,359 UART: [afmc] CDI.KEYID = 6
2,775,722 UART: [afmc] SUBJECT.KEYID = 7
2,776,148 UART: [afmc] AUTHORITY.KEYID = 5
2,811,791 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,046 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,775 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,658 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,377 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,112 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,550 UART: [state] LifecycleState = Unprovisioned
85,205 UART: [state] DebugLocked = No
85,757 UART: [state] WD Timer not started. Device not locked for debugging
87,074 UART: [kat] SHA2-256
890,624 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,753 UART: [kat] ++
894,905 UART: [kat] sha1
899,167 UART: [kat] SHA2-256
901,107 UART: [kat] SHA2-384
903,854 UART: [kat] SHA2-512-ACC
905,755 UART: [kat] ECC-384
915,198 UART: [kat] HMAC-384Kdf
919,852 UART: [kat] LMS
1,168,164 UART: [kat] --
1,168,945 UART: [cold-reset] ++
1,169,345 UART: [fht] FHT @ 0x50003400
1,172,075 UART: [idev] ++
1,172,243 UART: [idev] CDI.KEYID = 6
1,172,604 UART: [idev] SUBJECT.KEYID = 7
1,173,029 UART: [idev] UDS.KEYID = 0
1,181,085 UART: [idev] Erasing UDS.KEYID = 0
1,197,847 UART: [idev] Sha1 KeyId Algorithm
1,206,691 UART: [idev] --
1,207,876 UART: [ldev] ++
1,208,044 UART: [ldev] CDI.KEYID = 6
1,208,408 UART: [ldev] SUBJECT.KEYID = 5
1,208,835 UART: [ldev] AUTHORITY.KEYID = 7
1,209,298 UART: [ldev] FE.KEYID = 1
1,214,218 UART: [ldev] Erasing FE.KEYID = 1
1,240,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,974 UART: [ldev] --
1,279,330 UART: [fwproc] Wait for Commands...
1,279,945 UART: [fwproc] Recv command 0x46574c44
1,280,678 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,468 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,777 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,814 UART: [afmc] ++
2,771,982 UART: [afmc] CDI.KEYID = 6
2,772,345 UART: [afmc] SUBJECT.KEYID = 7
2,772,771 UART: [afmc] AUTHORITY.KEYID = 5
2,807,642 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,947 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,676 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,559 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,278 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,179 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [kat] SHA2-256
891,593 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,722 UART: [kat] ++
895,874 UART: [kat] sha1
900,114 UART: [kat] SHA2-256
902,054 UART: [kat] SHA2-384
904,763 UART: [kat] SHA2-512-ACC
906,664 UART: [kat] ECC-384
916,385 UART: [kat] HMAC-384Kdf
921,175 UART: [kat] LMS
1,169,487 UART: [kat] --
1,170,278 UART: [cold-reset] ++
1,170,684 UART: [fht] FHT @ 0x50003400
1,173,534 UART: [idev] ++
1,173,702 UART: [idev] CDI.KEYID = 6
1,174,063 UART: [idev] SUBJECT.KEYID = 7
1,174,488 UART: [idev] UDS.KEYID = 0
1,182,284 UART: [idev] Erasing UDS.KEYID = 0
1,199,210 UART: [idev] Sha1 KeyId Algorithm
1,208,018 UART: [idev] --
1,209,239 UART: [ldev] ++
1,209,407 UART: [ldev] CDI.KEYID = 6
1,209,771 UART: [ldev] SUBJECT.KEYID = 5
1,210,198 UART: [ldev] AUTHORITY.KEYID = 7
1,210,661 UART: [ldev] FE.KEYID = 1
1,216,139 UART: [ldev] Erasing FE.KEYID = 1
1,242,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,455 UART: [ldev] --
1,281,815 UART: [fwproc] Wait for Commands...
1,282,538 UART: [fwproc] Recv command 0x46574c44
1,283,271 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,931 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,240 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,395 UART: [afmc] ++
2,775,563 UART: [afmc] CDI.KEYID = 6
2,775,926 UART: [afmc] SUBJECT.KEYID = 7
2,776,352 UART: [afmc] AUTHORITY.KEYID = 5
2,811,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,298 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,027 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,910 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,629 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,518 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,884 UART: [state] LifecycleState = Unprovisioned
85,539 UART: [state] DebugLocked = No
86,069 UART: [state] WD Timer not started. Device not locked for debugging
87,242 UART: [kat] SHA2-256
890,792 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,921 UART: [kat] ++
895,073 UART: [kat] sha1
899,187 UART: [kat] SHA2-256
901,127 UART: [kat] SHA2-384
903,710 UART: [kat] SHA2-512-ACC
905,611 UART: [kat] ECC-384
915,366 UART: [kat] HMAC-384Kdf
919,914 UART: [kat] LMS
1,168,226 UART: [kat] --
1,169,397 UART: [cold-reset] ++
1,169,897 UART: [fht] FHT @ 0x50003400
1,172,733 UART: [idev] ++
1,172,901 UART: [idev] CDI.KEYID = 6
1,173,262 UART: [idev] SUBJECT.KEYID = 7
1,173,687 UART: [idev] UDS.KEYID = 0
1,181,493 UART: [idev] Erasing UDS.KEYID = 0
1,198,499 UART: [idev] Sha1 KeyId Algorithm
1,207,509 UART: [idev] --
1,208,460 UART: [ldev] ++
1,208,628 UART: [ldev] CDI.KEYID = 6
1,208,992 UART: [ldev] SUBJECT.KEYID = 5
1,209,419 UART: [ldev] AUTHORITY.KEYID = 7
1,209,882 UART: [ldev] FE.KEYID = 1
1,215,084 UART: [ldev] Erasing FE.KEYID = 1
1,241,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,982 UART: [ldev] --
1,280,400 UART: [fwproc] Wait for Commands...
1,281,029 UART: [fwproc] Recv command 0x46574c44
1,281,762 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,250 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,559 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,488 UART: [afmc] ++
2,772,656 UART: [afmc] CDI.KEYID = 6
2,773,019 UART: [afmc] SUBJECT.KEYID = 7
2,773,445 UART: [afmc] AUTHORITY.KEYID = 5
2,809,194 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,451 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,180 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,063 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,782 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,611 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
891,277 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,406 UART: [kat] ++
895,558 UART: [kat] sha1
899,790 UART: [kat] SHA2-256
901,730 UART: [kat] SHA2-384
904,619 UART: [kat] SHA2-512-ACC
906,520 UART: [kat] ECC-384
916,153 UART: [kat] HMAC-384Kdf
920,727 UART: [kat] LMS
1,169,039 UART: [kat] --
1,169,996 UART: [cold-reset] ++
1,170,412 UART: [fht] FHT @ 0x50003400
1,173,002 UART: [idev] ++
1,173,170 UART: [idev] CDI.KEYID = 6
1,173,531 UART: [idev] SUBJECT.KEYID = 7
1,173,956 UART: [idev] UDS.KEYID = 0
1,182,206 UART: [idev] Erasing UDS.KEYID = 0
1,199,430 UART: [idev] Sha1 KeyId Algorithm
1,208,556 UART: [idev] --
1,209,433 UART: [ldev] ++
1,209,601 UART: [ldev] CDI.KEYID = 6
1,209,965 UART: [ldev] SUBJECT.KEYID = 5
1,210,392 UART: [ldev] AUTHORITY.KEYID = 7
1,210,855 UART: [ldev] FE.KEYID = 1
1,216,369 UART: [ldev] Erasing FE.KEYID = 1
1,242,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,667 UART: [ldev] --
1,282,051 UART: [fwproc] Wait for Commands...
1,282,668 UART: [fwproc] Recv command 0x46574c44
1,283,401 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,393 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,702 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,699 UART: [afmc] ++
2,775,867 UART: [afmc] CDI.KEYID = 6
2,776,230 UART: [afmc] SUBJECT.KEYID = 7
2,776,656 UART: [afmc] AUTHORITY.KEYID = 5
2,813,023 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,351 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,102 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,831 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,714 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,433 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,202 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
891,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,183 UART: [kat] ++
895,335 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,526 UART: [kat] SHA2-512-ACC
906,427 UART: [kat] ECC-384
916,596 UART: [kat] HMAC-384Kdf
921,274 UART: [kat] LMS
1,169,586 UART: [kat] --
1,170,683 UART: [cold-reset] ++
1,171,113 UART: [fht] FHT @ 0x50003400
1,173,801 UART: [idev] ++
1,173,969 UART: [idev] CDI.KEYID = 6
1,174,330 UART: [idev] SUBJECT.KEYID = 7
1,174,755 UART: [idev] UDS.KEYID = 0
1,175,101 ready_for_fw is high
1,175,101 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,541 UART: [idev] Erasing UDS.KEYID = 0
1,199,295 UART: [idev] Sha1 KeyId Algorithm
1,208,185 UART: [idev] --
1,209,216 UART: [ldev] ++
1,209,384 UART: [ldev] CDI.KEYID = 6
1,209,748 UART: [ldev] SUBJECT.KEYID = 5
1,210,175 UART: [ldev] AUTHORITY.KEYID = 7
1,210,638 UART: [ldev] FE.KEYID = 1
1,215,696 UART: [ldev] Erasing FE.KEYID = 1
1,241,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,760 UART: [ldev] --
1,281,086 UART: [fwproc] Wait for Commands...
1,281,771 UART: [fwproc] Recv command 0x46574c44
1,282,504 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,749 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,832 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,730 >>> mbox cmd response: success
2,675,871 UART: [afmc] ++
2,676,039 UART: [afmc] CDI.KEYID = 6
2,676,402 UART: [afmc] SUBJECT.KEYID = 7
2,676,828 UART: [afmc] AUTHORITY.KEYID = 5
2,712,776 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,053 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,773 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,666 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,359 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,124 UART: [afmc] --
2,756,082 UART: [cold-reset] --
2,756,850 UART: [state] Locking Datavault
2,757,859 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,463 UART: [state] Locking ICCM
2,759,041 UART: [exit] Launching FMC @ 0x40000000
2,764,338 UART:
2,764,354 UART: Running Caliptra FMC ...
2,764,762 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,876 ready_for_fw is high
1,055,876 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,716 >>> mbox cmd response: success
2,588,199 UART:
2,588,215 UART: Running Caliptra FMC ...
2,588,623 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,508 UART: [kat] ++
895,660 UART: [kat] sha1
899,714 UART: [kat] SHA2-256
901,654 UART: [kat] SHA2-384
904,309 UART: [kat] SHA2-512-ACC
906,210 UART: [kat] ECC-384
916,333 UART: [kat] HMAC-384Kdf
921,145 UART: [kat] LMS
1,169,457 UART: [kat] --
1,170,398 UART: [cold-reset] ++
1,170,740 UART: [fht] FHT @ 0x50003400
1,173,374 UART: [idev] ++
1,173,542 UART: [idev] CDI.KEYID = 6
1,173,903 UART: [idev] SUBJECT.KEYID = 7
1,174,328 UART: [idev] UDS.KEYID = 0
1,174,674 ready_for_fw is high
1,174,674 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,284 UART: [idev] Erasing UDS.KEYID = 0
1,200,000 UART: [idev] Sha1 KeyId Algorithm
1,208,794 UART: [idev] --
1,209,879 UART: [ldev] ++
1,210,047 UART: [ldev] CDI.KEYID = 6
1,210,411 UART: [ldev] SUBJECT.KEYID = 5
1,210,838 UART: [ldev] AUTHORITY.KEYID = 7
1,211,301 UART: [ldev] FE.KEYID = 1
1,216,617 UART: [ldev] Erasing FE.KEYID = 1
1,242,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,597 UART: [ldev] --
1,282,103 UART: [fwproc] Wait for Commands...
1,282,836 UART: [fwproc] Recv command 0x46574c44
1,283,569 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,356 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,439 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,327 >>> mbox cmd response: success
2,675,552 UART: [afmc] ++
2,675,720 UART: [afmc] CDI.KEYID = 6
2,676,083 UART: [afmc] SUBJECT.KEYID = 7
2,676,509 UART: [afmc] AUTHORITY.KEYID = 5
2,711,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,797 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,548 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,268 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,161 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,854 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,559 UART: [afmc] --
2,754,685 UART: [cold-reset] --
2,755,591 UART: [state] Locking Datavault
2,756,948 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,552 UART: [state] Locking ICCM
2,758,110 UART: [exit] Launching FMC @ 0x40000000
2,763,407 UART:
2,763,423 UART: Running Caliptra FMC ...
2,763,831 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,635 ready_for_fw is high
1,056,635 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,937 >>> mbox cmd response: success
2,587,686 UART:
2,587,702 UART: Running Caliptra FMC ...
2,588,110 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,497 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
891,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,285 UART: [kat] ++
895,437 UART: [kat] sha1
899,581 UART: [kat] SHA2-256
901,521 UART: [kat] SHA2-384
904,172 UART: [kat] SHA2-512-ACC
906,073 UART: [kat] ECC-384
915,420 UART: [kat] HMAC-384Kdf
919,890 UART: [kat] LMS
1,168,202 UART: [kat] --
1,168,841 UART: [cold-reset] ++
1,169,375 UART: [fht] FHT @ 0x50003400
1,171,941 UART: [idev] ++
1,172,109 UART: [idev] CDI.KEYID = 6
1,172,470 UART: [idev] SUBJECT.KEYID = 7
1,172,895 UART: [idev] UDS.KEYID = 0
1,173,241 ready_for_fw is high
1,173,241 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,180,815 UART: [idev] Erasing UDS.KEYID = 0
1,197,513 UART: [idev] Sha1 KeyId Algorithm
1,206,571 UART: [idev] --
1,207,598 UART: [ldev] ++
1,207,766 UART: [ldev] CDI.KEYID = 6
1,208,130 UART: [ldev] SUBJECT.KEYID = 5
1,208,557 UART: [ldev] AUTHORITY.KEYID = 7
1,209,020 UART: [ldev] FE.KEYID = 1
1,214,320 UART: [ldev] Erasing FE.KEYID = 1
1,240,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,422 UART: [ldev] --
1,279,772 UART: [fwproc] Wait for Commands...
1,280,469 UART: [fwproc] Recv command 0x46574c44
1,281,202 UART: [fwproc] Recv'd Img size: 106848 bytes
2,491,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,311 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,394 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,672,312 >>> mbox cmd response: success
2,673,511 UART: [afmc] ++
2,673,679 UART: [afmc] CDI.KEYID = 6
2,674,042 UART: [afmc] SUBJECT.KEYID = 7
2,674,468 UART: [afmc] AUTHORITY.KEYID = 5
2,710,458 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,897 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,617 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,510 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,203 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,154 UART: [afmc] --
2,754,172 UART: [cold-reset] --
2,754,798 UART: [state] Locking Datavault
2,755,957 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,561 UART: [state] Locking ICCM
2,757,163 UART: [exit] Launching FMC @ 0x40000000
2,762,460 UART:
2,762,476 UART: Running Caliptra FMC ...
2,762,884 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,654 ready_for_fw is high
1,055,654 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,523,766 >>> mbox cmd response: success
2,585,825 UART:
2,585,841 UART: Running Caliptra FMC ...
2,586,249 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
88,039 UART: [kat] SHA2-256
891,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,718 UART: [kat] ++
895,870 UART: [kat] sha1
900,204 UART: [kat] SHA2-256
902,144 UART: [kat] SHA2-384
904,813 UART: [kat] SHA2-512-ACC
906,714 UART: [kat] ECC-384
916,275 UART: [kat] HMAC-384Kdf
920,911 UART: [kat] LMS
1,169,223 UART: [kat] --
1,170,198 UART: [cold-reset] ++
1,170,670 UART: [fht] FHT @ 0x50003400
1,173,318 UART: [idev] ++
1,173,486 UART: [idev] CDI.KEYID = 6
1,173,847 UART: [idev] SUBJECT.KEYID = 7
1,174,272 UART: [idev] UDS.KEYID = 0
1,174,618 ready_for_fw is high
1,174,618 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,358 UART: [idev] Erasing UDS.KEYID = 0
1,199,738 UART: [idev] Sha1 KeyId Algorithm
1,208,744 UART: [idev] --
1,209,603 UART: [ldev] ++
1,209,771 UART: [ldev] CDI.KEYID = 6
1,210,135 UART: [ldev] SUBJECT.KEYID = 5
1,210,562 UART: [ldev] AUTHORITY.KEYID = 7
1,211,025 UART: [ldev] FE.KEYID = 1
1,216,223 UART: [ldev] Erasing FE.KEYID = 1
1,242,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,615 UART: [ldev] --
1,281,997 UART: [fwproc] Wait for Commands...
1,282,724 UART: [fwproc] Recv command 0x46574c44
1,283,457 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,502 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,585 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,391 >>> mbox cmd response: success
2,675,554 UART: [afmc] ++
2,675,722 UART: [afmc] CDI.KEYID = 6
2,676,085 UART: [afmc] SUBJECT.KEYID = 7
2,676,511 UART: [afmc] AUTHORITY.KEYID = 5
2,712,841 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,429 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,180 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,900 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,793 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,486 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,357 UART: [afmc] --
2,756,415 UART: [cold-reset] --
2,757,367 UART: [state] Locking Datavault
2,758,504 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,108 UART: [state] Locking ICCM
2,759,688 UART: [exit] Launching FMC @ 0x40000000
2,764,985 UART:
2,765,001 UART: Running Caliptra FMC ...
2,765,409 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,379 ready_for_fw is high
1,056,379 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,181 >>> mbox cmd response: success
2,587,336 UART:
2,587,352 UART: Running Caliptra FMC ...
2,587,760 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,878 UART: [state] LifecycleState = Unprovisioned
85,533 UART: [state] DebugLocked = No
86,237 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,143 UART: [kat] ++
895,295 UART: [kat] sha1
899,489 UART: [kat] SHA2-256
901,429 UART: [kat] SHA2-384
904,158 UART: [kat] SHA2-512-ACC
906,059 UART: [kat] ECC-384
916,146 UART: [kat] HMAC-384Kdf
920,702 UART: [kat] LMS
1,169,014 UART: [kat] --
1,169,625 UART: [cold-reset] ++
1,170,059 UART: [fht] FHT @ 0x50003400
1,172,617 UART: [idev] ++
1,172,785 UART: [idev] CDI.KEYID = 6
1,173,146 UART: [idev] SUBJECT.KEYID = 7
1,173,571 UART: [idev] UDS.KEYID = 0
1,173,917 ready_for_fw is high
1,173,917 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,627 UART: [idev] Erasing UDS.KEYID = 0
1,198,457 UART: [idev] Sha1 KeyId Algorithm
1,207,179 UART: [idev] --
1,208,414 UART: [ldev] ++
1,208,582 UART: [ldev] CDI.KEYID = 6
1,208,946 UART: [ldev] SUBJECT.KEYID = 5
1,209,373 UART: [ldev] AUTHORITY.KEYID = 7
1,209,836 UART: [ldev] FE.KEYID = 1
1,214,890 UART: [ldev] Erasing FE.KEYID = 1
1,240,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,338 UART: [ldev] --
1,279,790 UART: [fwproc] Wait for Commands...
1,280,373 UART: [fwproc] Recv command 0x46574c44
1,281,106 UART: [fwproc] Recv'd Img size: 106848 bytes
2,491,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,623 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,706 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,673,474 >>> mbox cmd response: success
2,674,595 UART: [afmc] ++
2,674,763 UART: [afmc] CDI.KEYID = 6
2,675,126 UART: [afmc] SUBJECT.KEYID = 7
2,675,552 UART: [afmc] AUTHORITY.KEYID = 5
2,711,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,010 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,761 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,481 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,374 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,067 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,878 UART: [afmc] --
2,754,910 UART: [cold-reset] --
2,755,606 UART: [state] Locking Datavault
2,756,907 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,511 UART: [state] Locking ICCM
2,758,159 UART: [exit] Launching FMC @ 0x40000000
2,763,456 UART:
2,763,472 UART: Running Caliptra FMC ...
2,763,880 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,382 ready_for_fw is high
1,056,382 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,523,762 >>> mbox cmd response: success
2,585,193 UART:
2,585,209 UART: Running Caliptra FMC ...
2,585,617 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,949 UART: [state] LifecycleState = Unprovisioned
85,604 UART: [state] DebugLocked = No
86,264 UART: [state] WD Timer not started. Device not locked for debugging
87,411 UART: [kat] SHA2-256
890,961 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,090 UART: [kat] ++
895,242 UART: [kat] sha1
899,514 UART: [kat] SHA2-256
901,454 UART: [kat] SHA2-384
904,149 UART: [kat] SHA2-512-ACC
906,050 UART: [kat] ECC-384
915,919 UART: [kat] HMAC-384Kdf
920,479 UART: [kat] LMS
1,168,791 UART: [kat] --
1,169,720 UART: [cold-reset] ++
1,170,220 UART: [fht] FHT @ 0x50003400
1,172,952 UART: [idev] ++
1,173,120 UART: [idev] CDI.KEYID = 6
1,173,481 UART: [idev] SUBJECT.KEYID = 7
1,173,906 UART: [idev] UDS.KEYID = 0
1,174,252 ready_for_fw is high
1,174,252 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,960 UART: [idev] Erasing UDS.KEYID = 0
1,198,870 UART: [idev] Sha1 KeyId Algorithm
1,207,656 UART: [idev] --
1,208,767 UART: [ldev] ++
1,208,935 UART: [ldev] CDI.KEYID = 6
1,209,299 UART: [ldev] SUBJECT.KEYID = 5
1,209,726 UART: [ldev] AUTHORITY.KEYID = 7
1,210,189 UART: [ldev] FE.KEYID = 1
1,215,333 UART: [ldev] Erasing FE.KEYID = 1
1,242,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,523 UART: [ldev] --
1,281,831 UART: [fwproc] Wait for Commands...
1,282,524 UART: [fwproc] Recv command 0x46574c44
1,283,257 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,738 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,821 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,601 >>> mbox cmd response: success
2,676,798 UART: [afmc] ++
2,676,966 UART: [afmc] CDI.KEYID = 6
2,677,329 UART: [afmc] SUBJECT.KEYID = 7
2,677,755 UART: [afmc] AUTHORITY.KEYID = 5
2,713,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,878 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,598 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,491 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,184 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,063 UART: [afmc] --
2,757,149 UART: [cold-reset] --
2,758,005 UART: [state] Locking Datavault
2,759,326 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,930 UART: [state] Locking ICCM
2,760,472 UART: [exit] Launching FMC @ 0x40000000
2,765,769 UART:
2,765,785 UART: Running Caliptra FMC ...
2,766,193 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,835 ready_for_fw is high
1,056,835 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,526,285 >>> mbox cmd response: success
2,589,368 UART:
2,589,384 UART: Running Caliptra FMC ...
2,589,792 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,488 UART: [state] WD Timer not started. Device not locked for debugging
87,902 UART: [fake-rom-cold-reset] ++
88,830 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,042 UART: [fht] FHT @ 0x50003400
92,307 UART: [fwproc] Wait for Commands...
93,114 UART: [fwproc] Recv command 0x46574c44
93,842 UART: [fwproc] Recv'd Img size: 111916 bytes
1,359,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,836 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,518 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,548,362 >>> mbox cmd response: success
1,549,520 UART: [fake-rom-cold-reset] --
1,550,458 UART: [state] Locking Datavault
1,551,395 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,999 UART: [state] Locking ICCM
1,552,617 UART: [exit] Launching FMC @ 0x40000000
1,557,914 UART:
1,557,930 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,489 UART: [state] DebugLocked = No
86,180 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [fake-rom-cold-reset] ++
88,524 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,742 UART: [fht] FHT @ 0x50003400
92,009 UART: [fwproc] Wait for Commands...
92,658 UART: [fwproc] Recv command 0x46574c44
93,386 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,428 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,110 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,546,988 >>> mbox cmd response: success
1,548,146 UART: [fake-rom-cold-reset] --
1,548,872 UART: [state] Locking Datavault
1,549,989 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,593 UART: [state] Locking ICCM
1,551,135 UART: [exit] Launching FMC @ 0x40000000
1,556,432 UART:
1,556,448 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [fake-rom-cold-reset] ++
89,091 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,247 UART: [fht] FHT @ 0x50003400
92,548 UART: [fwproc] Wait for Commands...
93,369 UART: [fwproc] Recv command 0x46574c44
94,097 UART: [fwproc] Recv'd Img size: 111916 bytes
1,359,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,455 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,137 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,548,037 >>> mbox cmd response: success
1,549,195 UART: [fake-rom-cold-reset] --
1,549,859 UART: [state] Locking Datavault
1,550,890 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,494 UART: [state] Locking ICCM
1,552,022 UART: [exit] Launching FMC @ 0x40000000
1,557,319 UART:
1,557,335 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,827 UART: [state] WD Timer not started. Device not locked for debugging
88,231 UART: [fake-rom-cold-reset] ++
89,159 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,435 UART: [fht] FHT @ 0x50003400
92,894 UART: [fwproc] Wait for Commands...
93,563 UART: [fwproc] Recv command 0x46574c44
94,291 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,575 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,257 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,027 >>> mbox cmd response: success
1,548,185 UART: [fake-rom-cold-reset] --
1,548,845 UART: [state] Locking Datavault
1,550,244 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,848 UART: [state] Locking ICCM
1,551,388 UART: [exit] Launching FMC @ 0x40000000
1,556,685 UART:
1,556,701 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,982 UART: [fake-rom-cold-reset] ++
88,910 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,062 UART: [fht] FHT @ 0x50003400
92,291 UART: [fwproc] Wait for Commands...
92,996 UART: [fwproc] Recv command 0x46574c44
93,724 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,049 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,026 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,708 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,546,568 >>> mbox cmd response: success
1,547,726 UART: [fake-rom-cold-reset] --
1,548,408 UART: [state] Locking Datavault
1,549,369 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,973 UART: [state] Locking ICCM
1,550,465 UART: [exit] Launching FMC @ 0x40000000
1,555,762 UART:
1,555,778 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [fake-rom-cold-reset] ++
88,676 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,874 UART: [fht] FHT @ 0x50003400
92,297 UART: [fwproc] Wait for Commands...
93,038 UART: [fwproc] Recv command 0x46574c44
93,766 UART: [fwproc] Recv'd Img size: 111916 bytes
1,357,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,842 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,524 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,546,458 >>> mbox cmd response: success
1,547,616 UART: [fake-rom-cold-reset] --
1,548,334 UART: [state] Locking Datavault
1,549,685 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,289 UART: [state] Locking ICCM
1,550,923 UART: [exit] Launching FMC @ 0x40000000
1,556,220 UART:
1,556,236 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,716 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [fake-rom-cold-reset] ++
88,677 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,803 UART: [fht] FHT @ 0x50003400
92,206 UART: [fwproc] Wait for Commands...
92,815 UART: [fwproc] Recv command 0x46574c44
93,543 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,327 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,009 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,781 >>> mbox cmd response: success
1,548,939 UART: [fake-rom-cold-reset] --
1,549,701 UART: [state] Locking Datavault
1,550,998 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,602 UART: [state] Locking ICCM
1,552,122 UART: [exit] Launching FMC @ 0x40000000
1,557,419 UART:
1,557,435 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,779 UART: [state] WD Timer not started. Device not locked for debugging
88,121 UART: [fake-rom-cold-reset] ++
89,049 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,249 UART: [fht] FHT @ 0x50003400
92,526 UART: [fwproc] Wait for Commands...
93,337 UART: [fwproc] Recv command 0x46574c44
94,065 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,479 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,161 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,027 >>> mbox cmd response: success
1,548,185 UART: [fake-rom-cold-reset] --
1,549,145 UART: [state] Locking Datavault
1,550,410 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,014 UART: [state] Locking ICCM
1,551,504 UART: [exit] Launching FMC @ 0x40000000
1,556,801 UART:
1,556,817 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,422 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [fake-rom-cold-reset] ++
88,632 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,734 UART: [fht] FHT @ 0x50003400
92,089 UART: [fwproc] Wait for Commands...
92,874 UART: [fwproc] Recv command 0x46574c44
93,602 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,942 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,624 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,546,412 >>> mbox cmd response: success
1,547,570 UART: [fake-rom-cold-reset] --
1,548,350 UART: [state] Locking Datavault
1,549,381 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,985 UART: [state] Locking ICCM
1,550,459 UART: [exit] Launching FMC @ 0x40000000
1,555,756 UART:
1,555,772 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,296 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [fake-rom-cold-reset] ++
88,696 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,770 UART: [fht] FHT @ 0x50003400
92,025 UART: [fwproc] Wait for Commands...
92,794 UART: [fwproc] Recv command 0x46574c44
93,522 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,928 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,610 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,546,318 >>> mbox cmd response: success
1,547,476 UART: [fake-rom-cold-reset] --
1,548,396 UART: [state] Locking Datavault
1,549,615 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,219 UART: [state] Locking ICCM
1,550,663 UART: [exit] Launching FMC @ 0x40000000
1,555,960 UART:
1,555,976 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [fake-rom-cold-reset] ++
88,587 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,831 UART: [fht] FHT @ 0x50003400
92,228 UART: [fwproc] Wait for Commands...
93,007 UART: [fwproc] Recv command 0x46574c44
93,735 UART: [fwproc] Recv'd Img size: 111916 bytes
1,359,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,177 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,859 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,573 >>> mbox cmd response: success
1,548,731 UART: [fake-rom-cold-reset] --
1,549,457 UART: [state] Locking Datavault
1,550,592 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,196 UART: [state] Locking ICCM
1,551,616 UART: [exit] Launching FMC @ 0x40000000
1,556,913 UART:
1,556,929 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [fake-rom-cold-reset] ++
88,933 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,081 UART: [fht] FHT @ 0x50003400
92,448 UART: [fwproc] Wait for Commands...
93,067 UART: [fwproc] Recv command 0x46574c44
93,795 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,707 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,389 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,546,235 >>> mbox cmd response: success
1,547,393 UART: [fake-rom-cold-reset] --
1,547,981 UART: [state] Locking Datavault
1,549,276 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,880 UART: [state] Locking ICCM
1,550,398 UART: [exit] Launching FMC @ 0x40000000
1,555,695 UART:
1,555,711 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Production
85,681 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Production
85,813 UART: [state] DebugLocked = No
86,328 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Production
85,808 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Production
85,768 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
88,000 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Production
85,699 UART: [state] DebugLocked = No
86,284 UART: [state] WD Timer not started. Device not locked for debugging
87,581 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Production
85,795 UART: [state] DebugLocked = No
86,420 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Production
85,932 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,961 UART: [state] LifecycleState = Production
85,576 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Production
85,815 UART: [state] DebugLocked = No
86,504 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Production
85,651 UART: [state] DebugLocked = No
86,158 UART: [state] WD Timer not started. Device not locked for debugging
87,597 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Production
86,066 UART: [state] DebugLocked = No
86,655 UART: [state] WD Timer not started. Device not locked for debugging
88,012 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Production
86,158 UART: [state] DebugLocked = No
86,851 UART: [state] WD Timer not started. Device not locked for debugging
88,196 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Production
85,506 UART: Fake ROM in Prod lifecycle disabled
86,100 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Production
85,802 UART: Fake ROM in Prod lifecycle disabled
86,396 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Production
86,031 UART: Fake ROM in Prod lifecycle disabled
86,625 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Production
86,007 UART: Fake ROM in Prod lifecycle disabled
86,601 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Production
85,816 UART: Fake ROM in Prod lifecycle disabled
86,410 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Production
85,720 UART: Fake ROM in Prod lifecycle disabled
86,314 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,921 UART: [state] LifecycleState = Production
86,529 UART: Fake ROM in Prod lifecycle disabled
87,123 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Production
86,023 UART: Fake ROM in Prod lifecycle disabled
86,617 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Production
85,934 UART: Fake ROM in Prod lifecycle disabled
86,528 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Production
85,764 UART: Fake ROM in Prod lifecycle disabled
86,358 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Production
85,901 UART: Fake ROM in Prod lifecycle disabled
86,495 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Production
86,221 UART: Fake ROM in Prod lifecycle disabled
86,815 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,884 UART: [state] LifecycleState = Unprovisioned
85,543 UART: [state] DebugLocked = No
86,142 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [fake-rom-cold-reset] ++
88,538 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,708 UART: [fht] FHT @ 0x50003400
91,977 UART: [fwproc] Wait for Commands...
92,634 UART: [fwproc] Recv command 0x46574c44
93,362 UART: [fwproc] Recv'd Img size: 111916 bytes
1,357,449 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,383,998 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,409,680 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,545,386 >>> mbox cmd response: success
1,546,544 UART: [fake-rom-cold-reset] --
1,546,939 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,547,310 UART: [state] Locking Datavault
1,548,307 UART: [state] Locking PCR0, PCR1 and PCR31
1,548,911 UART: [state] Locking ICCM
1,549,473 UART: [exit] Launching FMC @ 0x40000000
1,554,770 UART:
1,554,786 UART: Running Caliptra FMC ...
1,555,194 UART:
1,555,335 UART: [fmc] Received command: 0x46574C44
1,556,159 UART:
1,556,175 UART: Running Caliptra ROM ...
1,556,583 UART:
1,556,638 UART: [state] CFI Enabled
1,558,956 UART: [state] LifecycleState = Unprovisioned
1,559,615 UART: [state] DebugLocked = No
1,560,290 UART: [state] WD Timer not started. Device not locked for debugging
1,561,892 UART: [update-reset] ++
2,841,485 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,842,611 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,990,902 UART: [update-reset] Copying MAN_2 To MAN_1
2,998,916 UART: [update-reset Success] --
2,999,325 >>> mbox cmd response: success
2,999,325 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,999,978 UART: [state] Locking Datavault
3,000,634 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,238 UART: [state] Locking ICCM
3,001,734 UART: [exit] Launching FMC @ 0x40000000
3,007,031 UART:
3,007,047 UART: Running Caliptra FMC ...
3,007,455 UART:
3,007,596 UART: [fmc] Received command: 0x1000000C
3,008,331 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,936 UART: [fake-rom-cold-reset] ++
88,864 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,060 UART: [fht] FHT @ 0x50003400
92,367 UART: [fwproc] Wait for Commands...
93,094 UART: [fwproc] Recv command 0x46574c44
93,822 UART: [fwproc] Recv'd Img size: 111916 bytes
1,359,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,794 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,476 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,254 >>> mbox cmd response: success
1,548,412 UART: [fake-rom-cold-reset] --
1,548,807 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,549,082 UART: [state] Locking Datavault
1,550,373 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,977 UART: [state] Locking ICCM
1,551,455 UART: [exit] Launching FMC @ 0x40000000
1,556,752 UART:
1,556,768 UART: Running Caliptra FMC ...
1,557,176 UART:
1,557,317 UART: [fmc] Received command: 0x46574C44
1,558,141 UART:
1,558,157 UART: Running Caliptra ROM ...
1,558,565 UART:
1,558,620 UART: [state] CFI Enabled
1,561,398 UART: [state] LifecycleState = Unprovisioned
1,562,057 UART: [state] DebugLocked = No
1,562,676 UART: [state] WD Timer not started. Device not locked for debugging
1,564,256 UART: [update-reset] ++
2,844,053 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,845,081 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,993,400 UART: [update-reset] Copying MAN_2 To MAN_1
3,001,414 UART: [update-reset Success] --
3,001,823 >>> mbox cmd response: success
3,001,823 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,002,374 UART: [state] Locking Datavault
3,002,972 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,576 UART: [state] Locking ICCM
3,004,156 UART: [exit] Launching FMC @ 0x40000000
3,009,453 UART:
3,009,469 UART: Running Caliptra FMC ...
3,009,877 UART:
3,010,018 UART: [fmc] Received command: 0x1000000C
3,010,753 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Unprovisioned
86,464 UART: [state] DebugLocked = No
87,003 UART: [state] WD Timer not started. Device not locked for debugging
88,479 UART: [fake-rom-cold-reset] ++
89,407 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,565 UART: [fht] FHT @ 0x50003400
92,826 UART: [fwproc] Wait for Commands...
93,437 UART: [fwproc] Recv command 0x46574c44
94,165 UART: [fwproc] Recv'd Img size: 111916 bytes
1,359,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,787 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,469 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,307 >>> mbox cmd response: success
1,548,465 UART: [fake-rom-cold-reset] --
1,548,860 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,549,411 UART: [state] Locking Datavault
1,550,630 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,234 UART: [state] Locking ICCM
1,551,776 UART: [exit] Launching FMC @ 0x40000000
1,557,073 UART:
1,557,089 UART: Running Caliptra FMC ...
1,557,497 UART:
1,557,638 UART: [fmc] Received command: 0x46574C44
1,558,462 UART:
1,558,478 UART: Running Caliptra ROM ...
1,558,886 UART:
1,559,028 UART: [state] CFI Enabled
1,561,694 UART: [state] LifecycleState = Unprovisioned
1,562,353 UART: [state] DebugLocked = No
1,562,986 UART: [state] WD Timer not started. Device not locked for debugging
1,564,614 UART: [update-reset] ++
2,843,811 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,844,877 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,993,070 UART: [update-reset] Copying MAN_2 To MAN_1
3,001,084 UART: [update-reset Success] --
3,001,493 >>> mbox cmd response: success
3,001,493 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,002,064 UART: [state] Locking Datavault
3,002,760 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,364 UART: [state] Locking ICCM
3,004,010 UART: [exit] Launching FMC @ 0x40000000
3,009,307 UART:
3,009,323 UART: Running Caliptra FMC ...
3,009,731 UART:
3,009,872 UART: [fmc] Received command: 0x1000000C
3,010,607 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,829 UART: [state] WD Timer not started. Device not locked for debugging
88,263 UART: [fake-rom-cold-reset] ++
89,191 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,323 UART: [fht] FHT @ 0x50003400
92,556 UART: [fwproc] Wait for Commands...
93,223 UART: [fwproc] Recv command 0x46574c44
93,951 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,845 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,527 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,465 >>> mbox cmd response: success
1,548,623 UART: [fake-rom-cold-reset] --
1,549,018 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,549,349 UART: [state] Locking Datavault
1,550,548 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,152 UART: [state] Locking ICCM
1,551,728 UART: [exit] Launching FMC @ 0x40000000
1,557,025 UART:
1,557,041 UART: Running Caliptra FMC ...
1,557,449 UART:
1,557,590 UART: [fmc] Received command: 0x46574C44
1,558,414 UART:
1,558,430 UART: Running Caliptra ROM ...
1,558,838 UART:
1,558,980 UART: [state] CFI Enabled
1,561,530 UART: [state] LifecycleState = Unprovisioned
1,562,189 UART: [state] DebugLocked = No
1,562,882 UART: [state] WD Timer not started. Device not locked for debugging
1,564,410 UART: [update-reset] ++
2,842,023 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,843,061 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,991,284 UART: [update-reset] Copying MAN_2 To MAN_1
2,999,298 UART: [update-reset Success] --
2,999,707 >>> mbox cmd response: success
2,999,707 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,000,466 UART: [state] Locking Datavault
3,001,296 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,900 UART: [state] Locking ICCM
3,002,536 UART: [exit] Launching FMC @ 0x40000000
3,007,833 UART:
3,007,849 UART: Running Caliptra FMC ...
3,008,257 UART:
3,008,398 UART: [fmc] Received command: 0x1000000C
3,009,133 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,168 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [fake-rom-cold-reset] ++
88,292 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,596 UART: [fht] FHT @ 0x50003400
91,881 UART: [fwproc] Wait for Commands...
92,570 UART: [fwproc] Recv command 0x46574c44
93,298 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,116 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,798 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,548 >>> mbox cmd response: success
1,548,706 UART: [fake-rom-cold-reset] --
1,549,101 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,549,526 UART: [state] Locking Datavault
1,550,897 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,501 UART: [state] Locking ICCM
1,551,955 UART: [exit] Launching FMC @ 0x40000000
1,557,252 UART:
1,557,268 UART: Running Caliptra FMC ...
1,557,676 UART:
1,557,817 UART: [fmc] Received command: 0x46574C44
1,558,641 UART:
1,558,657 UART: Running Caliptra ROM ...
1,559,065 UART:
1,559,120 UART: [state] CFI Enabled
1,562,092 UART: [state] LifecycleState = Unprovisioned
1,562,751 UART: [state] DebugLocked = No
1,563,466 UART: [state] WD Timer not started. Device not locked for debugging
1,564,954 UART: [update-reset] ++
2,843,929 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,844,897 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,993,248 UART: [update-reset] Copying MAN_2 To MAN_1
3,001,262 UART: [update-reset Success] --
3,001,671 >>> mbox cmd response: success
3,001,671 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,002,128 UART: [state] Locking Datavault
3,002,750 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,354 UART: [state] Locking ICCM
3,003,956 UART: [exit] Launching FMC @ 0x40000000
3,009,253 UART:
3,009,269 UART: Running Caliptra FMC ...
3,009,677 UART:
3,009,818 UART: [fmc] Received command: 0x1000000C
3,010,553 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,974 UART: [fake-rom-cold-reset] ++
88,902 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,164 UART: [fht] FHT @ 0x50003400
92,449 UART: [fwproc] Wait for Commands...
93,178 UART: [fwproc] Recv command 0x46574c44
93,906 UART: [fwproc] Recv'd Img size: 111916 bytes
1,359,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,100 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,782 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,584 >>> mbox cmd response: success
1,548,742 UART: [fake-rom-cold-reset] --
1,549,137 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,549,560 UART: [state] Locking Datavault
1,550,693 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,297 UART: [state] Locking ICCM
1,551,955 UART: [exit] Launching FMC @ 0x40000000
1,557,252 UART:
1,557,268 UART: Running Caliptra FMC ...
1,557,676 UART:
1,557,817 UART: [fmc] Received command: 0x46574C44
1,558,641 UART:
1,558,657 UART: Running Caliptra ROM ...
1,559,065 UART:
1,559,120 UART: [state] CFI Enabled
1,561,940 UART: [state] LifecycleState = Unprovisioned
1,562,599 UART: [state] DebugLocked = No
1,563,194 UART: [state] WD Timer not started. Device not locked for debugging
1,564,826 UART: [update-reset] ++
2,844,395 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,845,459 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,993,802 UART: [update-reset] Copying MAN_2 To MAN_1
3,001,816 UART: [update-reset Success] --
3,002,225 >>> mbox cmd response: success
3,002,225 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,002,604 UART: [state] Locking Datavault
3,003,402 UART: [state] Locking PCR0, PCR1 and PCR31
3,004,006 UART: [state] Locking ICCM
3,004,584 UART: [exit] Launching FMC @ 0x40000000
3,009,881 UART:
3,009,897 UART: Running Caliptra FMC ...
3,010,305 UART:
3,010,446 UART: [fmc] Received command: 0x1000000C
3,011,181 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,716 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [fake-rom-cold-reset] ++
88,675 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,873 UART: [fht] FHT @ 0x50003400
92,114 UART: [fwproc] Wait for Commands...
92,715 UART: [fwproc] Recv command 0x46574c44
93,443 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,664 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,131 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,813 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,546,699 >>> mbox cmd response: success
1,547,857 UART: [fake-rom-cold-reset] --
1,548,252 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,548,795 UART: [state] Locking Datavault
1,550,062 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,666 UART: [state] Locking ICCM
1,551,196 UART: [exit] Launching FMC @ 0x40000000
1,556,493 UART:
1,556,509 UART: Running Caliptra FMC ...
1,556,917 UART:
1,557,058 UART: [fmc] Received command: 0x46574C44
1,557,882 UART:
1,557,898 UART: Running Caliptra ROM ...
1,558,306 UART:
1,558,448 UART: [state] CFI Enabled
1,561,290 UART: [state] LifecycleState = Unprovisioned
1,561,949 UART: [state] DebugLocked = No
1,562,466 UART: [state] WD Timer not started. Device not locked for debugging
1,563,986 UART: [update-reset] ++
2,842,135 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,843,171 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,991,516 UART: [update-reset] Copying MAN_2 To MAN_1
2,999,530 UART: [update-reset Success] --
2,999,939 >>> mbox cmd response: success
2,999,939 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,000,490 UART: [state] Locking Datavault
3,001,178 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,782 UART: [state] Locking ICCM
3,002,346 UART: [exit] Launching FMC @ 0x40000000
3,007,643 UART:
3,007,659 UART: Running Caliptra FMC ...
3,008,067 UART:
3,008,208 UART: [fmc] Received command: 0x1000000C
3,008,943 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Unprovisioned
86,360 UART: [state] DebugLocked = No
86,889 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [fake-rom-cold-reset] ++
89,165 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,477 UART: [fht] FHT @ 0x50003400
92,790 UART: [fwproc] Wait for Commands...
93,601 UART: [fwproc] Recv command 0x46574c44
94,329 UART: [fwproc] Recv'd Img size: 111916 bytes
1,359,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,663 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,345 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,547,069 >>> mbox cmd response: success
1,548,227 UART: [fake-rom-cold-reset] --
1,548,622 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,549,163 UART: [state] Locking Datavault
1,550,272 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,876 UART: [state] Locking ICCM
1,551,512 UART: [exit] Launching FMC @ 0x40000000
1,556,809 UART:
1,556,825 UART: Running Caliptra FMC ...
1,557,233 UART:
1,557,374 UART: [fmc] Received command: 0x46574C44
1,558,198 UART:
1,558,214 UART: Running Caliptra ROM ...
1,558,622 UART:
1,558,764 UART: [state] CFI Enabled
1,561,942 UART: [state] LifecycleState = Unprovisioned
1,562,601 UART: [state] DebugLocked = No
1,563,210 UART: [state] WD Timer not started. Device not locked for debugging
1,564,958 UART: [update-reset] ++
2,843,277 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,844,277 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,992,440 UART: [update-reset] Copying MAN_2 To MAN_1
3,000,454 UART: [update-reset Success] --
3,000,863 >>> mbox cmd response: success
3,000,863 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,001,416 UART: [state] Locking Datavault
3,002,256 UART: [state] Locking PCR0, PCR1 and PCR31
3,002,860 UART: [state] Locking ICCM
3,003,422 UART: [exit] Launching FMC @ 0x40000000
3,008,719 UART:
3,008,735 UART: Running Caliptra FMC ...
3,009,143 UART:
3,009,284 UART: [fmc] Received command: 0x1000000C
3,010,019 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
88,124 UART: [fake-rom-cold-reset] ++
89,052 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,158 UART: [fht] FHT @ 0x50003400
92,373 UART: [fwproc] Wait for Commands...
93,054 UART: [fwproc] Recv command 0x46574c44
93,782 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,914 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,596 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,546,424 >>> mbox cmd response: success
1,547,582 UART: [fake-rom-cold-reset] --
1,547,977 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,548,230 UART: [state] Locking Datavault
1,549,355 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,959 UART: [state] Locking ICCM
1,550,429 UART: [exit] Launching FMC @ 0x40000000
1,555,726 UART:
1,555,742 UART: Running Caliptra FMC ...
1,556,150 UART:
1,556,291 UART: [fmc] Received command: 0x46574C44
1,557,115 UART:
1,557,131 UART: Running Caliptra ROM ...
1,557,539 UART:
1,557,594 UART: [state] CFI Enabled
1,560,038 UART: [state] LifecycleState = Unprovisioned
1,560,697 UART: [state] DebugLocked = No
1,561,218 UART: [state] WD Timer not started. Device not locked for debugging
1,562,656 UART: [update-reset] ++
2,841,629 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,842,619 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,990,814 UART: [update-reset] Copying MAN_2 To MAN_1
2,998,828 UART: [update-reset Success] --
2,999,237 >>> mbox cmd response: success
2,999,237 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,999,692 UART: [state] Locking Datavault
3,000,520 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,124 UART: [state] Locking ICCM
3,001,598 UART: [exit] Launching FMC @ 0x40000000
3,006,895 UART:
3,006,911 UART: Running Caliptra FMC ...
3,007,319 UART:
3,007,460 UART: [fmc] Received command: 0x1000000C
3,008,195 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,622 UART: [state] WD Timer not started. Device not locked for debugging
87,948 UART: [fake-rom-cold-reset] ++
88,876 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
89,134 UART: [fht] FHT @ 0x50003400
92,575 UART: [fwproc] Wait for Commands...
93,324 UART: [fwproc] Recv command 0x46574c44
94,052 UART: [fwproc] Recv'd Img size: 111916 bytes
1,359,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,460 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,413,142 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,548,942 >>> mbox cmd response: success
1,550,100 UART: [fake-rom-cold-reset] --
1,550,495 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,551,108 UART: [state] Locking Datavault
1,552,275 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,879 UART: [state] Locking ICCM
1,553,513 UART: [exit] Launching FMC @ 0x40000000
1,558,810 UART:
1,558,826 UART: Running Caliptra FMC ...
1,559,234 UART:
1,559,375 UART: [fmc] Received command: 0x46574C44
1,560,199 UART:
1,560,215 UART: Running Caliptra ROM ...
1,560,623 UART:
1,560,678 UART: [state] CFI Enabled
1,563,378 UART: [state] LifecycleState = Unprovisioned
1,564,037 UART: [state] DebugLocked = No
1,564,648 UART: [state] WD Timer not started. Device not locked for debugging
1,566,352 UART: [update-reset] ++
2,845,213 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,846,413 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,994,752 UART: [update-reset] Copying MAN_2 To MAN_1
3,002,766 UART: [update-reset Success] --
3,003,175 >>> mbox cmd response: success
3,003,175 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,003,674 UART: [state] Locking Datavault
3,004,246 UART: [state] Locking PCR0, PCR1 and PCR31
3,004,850 UART: [state] Locking ICCM
3,005,454 UART: [exit] Launching FMC @ 0x40000000
3,010,751 UART:
3,010,767 UART: Running Caliptra FMC ...
3,011,175 UART:
3,011,316 UART: [fmc] Received command: 0x1000000C
3,012,051 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,753 UART: [state] LifecycleState = Unprovisioned
85,412 UART: [state] DebugLocked = No
86,103 UART: [state] WD Timer not started. Device not locked for debugging
87,447 UART: [fake-rom-cold-reset] ++
88,375 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,569 UART: [fht] FHT @ 0x50003400
91,950 UART: [fwproc] Wait for Commands...
92,655 UART: [fwproc] Recv command 0x46574c44
93,383 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,179 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,861 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,546,575 >>> mbox cmd response: success
1,547,733 UART: [fake-rom-cold-reset] --
1,548,128 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,548,581 UART: [state] Locking Datavault
1,549,780 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,384 UART: [state] Locking ICCM
1,550,994 UART: [exit] Launching FMC @ 0x40000000
1,556,291 UART:
1,556,307 UART: Running Caliptra FMC ...
1,556,715 UART:
1,556,856 UART: [fmc] Received command: 0x46574C44
1,557,680 UART:
1,557,696 UART: Running Caliptra ROM ...
1,558,104 UART:
1,558,246 UART: [state] CFI Enabled
1,560,804 UART: [state] LifecycleState = Unprovisioned
1,561,463 UART: [state] DebugLocked = No
1,561,948 UART: [state] WD Timer not started. Device not locked for debugging
1,563,670 UART: [update-reset] ++
2,844,013 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,844,995 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,993,168 UART: [update-reset] Copying MAN_2 To MAN_1
3,001,182 UART: [update-reset Success] --
3,001,591 >>> mbox cmd response: success
3,001,591 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,002,190 UART: [state] Locking Datavault
3,003,136 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,740 UART: [state] Locking ICCM
3,004,280 UART: [exit] Launching FMC @ 0x40000000
3,009,577 UART:
3,009,593 UART: Running Caliptra FMC ...
3,010,001 UART:
3,010,142 UART: [fmc] Received command: 0x1000000C
3,010,877 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,115 UART: [state] LifecycleState = Unprovisioned
85,774 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,741 UART: [fake-rom-cold-reset] ++
88,669 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
88,973 UART: [fht] FHT @ 0x50003400
92,370 UART: [fwproc] Wait for Commands...
93,161 UART: [fwproc] Recv command 0x46574c44
93,889 UART: [fwproc] Recv'd Img size: 111916 bytes
1,358,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,359 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,041 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,546,973 >>> mbox cmd response: success
1,548,131 UART: [fake-rom-cold-reset] --
1,548,526 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,548,947 UART: [state] Locking Datavault
1,550,172 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,776 UART: [state] Locking ICCM
1,551,204 UART: [exit] Launching FMC @ 0x40000000
1,556,501 UART:
1,556,517 UART: Running Caliptra FMC ...
1,556,925 UART:
1,557,066 UART: [fmc] Received command: 0x46574C44
1,557,890 UART:
1,557,906 UART: Running Caliptra ROM ...
1,558,314 UART:
1,558,456 UART: [state] CFI Enabled
1,561,348 UART: [state] LifecycleState = Unprovisioned
1,562,007 UART: [state] DebugLocked = No
1,562,712 UART: [state] WD Timer not started. Device not locked for debugging
1,564,208 UART: [update-reset] ++
2,842,927 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,843,997 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
2,992,136 UART: [update-reset] Copying MAN_2 To MAN_1
3,000,150 UART: [update-reset Success] --
3,000,559 >>> mbox cmd response: success
3,000,559 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,001,242 UART: [state] Locking Datavault
3,001,874 UART: [state] Locking PCR0, PCR1 and PCR31
3,002,478 UART: [state] Locking ICCM
3,003,000 UART: [exit] Launching FMC @ 0x40000000
3,008,297 UART:
3,008,313 UART: Running Caliptra FMC ...
3,008,721 UART:
3,008,862 UART: [fmc] Received command: 0x1000000C
3,009,597 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,822 UART: [state] LifecycleState = Unprovisioned
85,481 UART: [state] DebugLocked = No
86,156 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,080 UART: [state] WD Timer not started. Device not locked for debugging
87,334 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,877 UART: [state] LifecycleState = Unprovisioned
85,536 UART: [state] DebugLocked = No
86,219 UART: [state] WD Timer not started. Device not locked for debugging
87,585 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,635 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,905 UART: [state] WD Timer not started. Device not locked for debugging
88,131 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,218 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,938 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Unprovisioned
86,380 UART: [state] DebugLocked = No
87,093 UART: [state] WD Timer not started. Device not locked for debugging
88,499 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,859 UART: [state] LifecycleState = Unprovisioned
86,518 UART: [state] DebugLocked = No
87,003 UART: [state] WD Timer not started. Device not locked for debugging
88,431 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,970 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
88,004 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,767 UART: [state] LifecycleState = Unprovisioned
86,426 UART: [state] DebugLocked = No
86,977 UART: [state] WD Timer not started. Device not locked for debugging
88,411 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,697 UART: [state] LifecycleState = Unprovisioned
86,356 UART: [state] DebugLocked = No
86,899 UART: [state] WD Timer not started. Device not locked for debugging
88,513 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [fake-rom-cold-reset] ++
88,924 UART: [fht] FHT @ 0x50003400
92,237 UART: [fwproc] Wait for Commands...
92,956 UART: [fwproc] Recv command 0x46574c44
93,684 UART: [fwproc] Recv'd Img size: 111916 bytes
130,159 UART: ROM Fatal Error: 0x000B000C
131,328 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,480 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
88,124 UART: [fake-rom-cold-reset] ++
89,316 UART: [fht] FHT @ 0x50003400
92,771 UART: [fwproc] Wait for Commands...
93,388 UART: [fwproc] Recv command 0x46574c44
94,116 UART: [fwproc] Recv'd Img size: 111916 bytes
131,083 UART: ROM Fatal Error: 0x000B000C
132,252 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [fake-rom-cold-reset] ++
89,105 UART: [fht] FHT @ 0x50003400
92,486 UART: [fwproc] Wait for Commands...
93,263 UART: [fwproc] Recv command 0x46574c44
93,991 UART: [fwproc] Recv'd Img size: 111916 bytes
129,540 UART: ROM Fatal Error: 0x000B000C
130,709 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,844 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [fake-rom-cold-reset] ++
88,903 UART: [fht] FHT @ 0x50003400
92,170 UART: [fwproc] Wait for Commands...
92,873 UART: [fwproc] Recv command 0x46574c44
93,601 UART: [fwproc] Recv'd Img size: 111916 bytes
130,910 UART: ROM Fatal Error: 0x000B000C
132,079 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,469 UART: [state] DebugLocked = No
86,142 UART: [state] WD Timer not started. Device not locked for debugging
87,492 UART: [fake-rom-cold-reset] ++
88,594 UART: [fht] FHT @ 0x50003400
92,005 UART: [fwproc] Wait for Commands...
92,772 UART: [fwproc] Recv command 0x46574c44
93,500 UART: [fwproc] Recv'd Img size: 111916 bytes
130,835 UART: ROM Fatal Error: 0x000B000C
132,004 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,634 UART: [state] LifecycleState = Unprovisioned
85,293 UART: [state] DebugLocked = No
85,892 UART: [state] WD Timer not started. Device not locked for debugging
87,326 UART: [fake-rom-cold-reset] ++
88,352 UART: [fht] FHT @ 0x50003400
91,607 UART: [fwproc] Wait for Commands...
92,348 UART: [fwproc] Recv command 0x46574c44
93,076 UART: [fwproc] Recv'd Img size: 111916 bytes
129,281 UART: ROM Fatal Error: 0x000B000C
130,450 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
86,887 UART: [state] WD Timer not started. Device not locked for debugging
88,113 UART: [fake-rom-cold-reset] ++
89,227 UART: [fht] FHT @ 0x50003400
92,454 UART: [fwproc] Wait for Commands...
93,095 UART: [fwproc] Recv command 0x46574c44
93,823 UART: [fwproc] Recv'd Img size: 111916 bytes
130,288 UART: ROM Fatal Error: 0x000B000C
131,457 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [fake-rom-cold-reset] ++
89,025 UART: [fht] FHT @ 0x50003400
92,482 UART: [fwproc] Wait for Commands...
93,171 UART: [fwproc] Recv command 0x46574c44
93,899 UART: [fwproc] Recv'd Img size: 111916 bytes
131,026 UART: ROM Fatal Error: 0x000B000C
132,195 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
88,030 UART: [fake-rom-cold-reset] ++
89,262 UART: [fht] FHT @ 0x50003400
92,521 UART: [fwproc] Wait for Commands...
93,140 UART: [fwproc] Recv command 0x46574c44
93,868 UART: [fwproc] Recv'd Img size: 111916 bytes
130,897 UART: ROM Fatal Error: 0x000B000C
132,066 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,166 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [fake-rom-cold-reset] ++
88,686 UART: [fht] FHT @ 0x50003400
92,013 UART: [fwproc] Wait for Commands...
92,648 UART: [fwproc] Recv command 0x46574c44
93,376 UART: [fwproc] Recv'd Img size: 111916 bytes
130,521 UART: ROM Fatal Error: 0x000B000C
131,690 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,719 UART: [state] WD Timer not started. Device not locked for debugging
88,307 UART: [fake-rom-cold-reset] ++
89,479 UART: [fht] FHT @ 0x50003400
92,694 UART: [fwproc] Wait for Commands...
93,399 UART: [fwproc] Recv command 0x46574c44
94,127 UART: [fwproc] Recv'd Img size: 111916 bytes
131,436 UART: ROM Fatal Error: 0x000B000C
132,605 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,923 UART: [state] LifecycleState = Unprovisioned
86,582 UART: [state] DebugLocked = No
87,141 UART: [state] WD Timer not started. Device not locked for debugging
88,569 UART: [fake-rom-cold-reset] ++
89,571 UART: [fht] FHT @ 0x50003400
92,850 UART: [fwproc] Wait for Commands...
93,609 UART: [fwproc] Recv command 0x46574c44
94,337 UART: [fwproc] Recv'd Img size: 111916 bytes
132,138 UART: ROM Fatal Error: 0x000B000C
133,307 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,172 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
88,135 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
86,961 UART: [state] WD Timer not started. Device not locked for debugging
88,435 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,422 UART: [state] WD Timer not started. Device not locked for debugging
87,844 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
88,116 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,829 UART: [state] WD Timer not started. Device not locked for debugging
88,257 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,942 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,947 UART: [state] WD Timer not started. Device not locked for debugging
88,359 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,333 ready_for_fw is high
1,077,333 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,293 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,413 ready_for_fw is high
1,078,413 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,491 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,582 ready_for_fw is high
1,078,582 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,228 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,260 ready_for_fw is high
1,078,260 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,476 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,747 ready_for_fw is high
1,077,747 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,123 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,869 ready_for_fw is high
1,077,869 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,777 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,542 ready_for_fw is high
1,078,542 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,600 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,840 ready_for_fw is high
1,077,840 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,436 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,905 ready_for_fw is high
1,077,905 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,651 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,007 ready_for_fw is high
1,078,007 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,607 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,140 ready_for_fw is high
1,078,140 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,917 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,862 ready_for_fw is high
1,078,862 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,872 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
890,964 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,093 UART: [kat] ++
895,245 UART: [kat] sha1
899,493 UART: [kat] SHA2-256
901,433 UART: [kat] SHA2-384
904,304 UART: [kat] SHA2-512-ACC
906,205 UART: [kat] ECC-384
916,396 UART: [kat] HMAC-384Kdf
920,744 UART: [kat] LMS
1,169,056 UART: [kat] --
1,169,719 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,172,891 UART: [idev] ++
1,173,059 UART: [idev] CDI.KEYID = 6
1,173,420 UART: [idev] SUBJECT.KEYID = 7
1,173,845 UART: [idev] UDS.KEYID = 0
1,181,937 UART: [idev] Erasing UDS.KEYID = 0
1,198,681 UART: [idev] Sha1 KeyId Algorithm
1,207,383 UART: [idev] --
1,208,330 UART: [ldev] ++
1,208,498 UART: [ldev] CDI.KEYID = 6
1,208,862 UART: [ldev] SUBJECT.KEYID = 5
1,209,289 UART: [ldev] AUTHORITY.KEYID = 7
1,209,752 UART: [ldev] FE.KEYID = 1
1,214,796 UART: [ldev] Erasing FE.KEYID = 1
1,241,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,248 UART: [ldev] --
1,280,764 UART: [fwproc] Wait for Commands...
1,281,425 UART: [fwproc] Recv command 0x46574c44
1,282,158 UART: [fwproc] Recv'd Img size: 106848 bytes
2,492,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,069 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,152 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,092 >>> mbox cmd response: success
2,675,293 UART: [afmc] ++
2,675,461 UART: [afmc] CDI.KEYID = 6
2,675,824 UART: [afmc] SUBJECT.KEYID = 7
2,676,250 UART: [afmc] AUTHORITY.KEYID = 5
2,712,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,046 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,797 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,517 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,410 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,103 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,100 UART: [afmc] --
2,755,066 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,088 UART: [cold-reset] --
2,755,796 UART: [state] Locking Datavault
2,756,807 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,411 UART: [state] Locking ICCM
2,757,885 UART: [exit] Launching FMC @ 0x40000000
2,763,182 UART:
2,763,198 UART: Running Caliptra FMC ...
2,763,606 UART:
2,763,744 UART: [fmc] Received command: 0x10000005
2,764,845 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,523,594 >>> mbox cmd response: success
2,579,368 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,585,745 UART:
2,585,761 UART: Running Caliptra FMC ...
2,586,169 UART:
2,586,307 UART: [fmc] Received command: 0x10000005
2,587,408 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
891,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,544 UART: [kat] ++
895,696 UART: [kat] sha1
899,884 UART: [kat] SHA2-256
901,824 UART: [kat] SHA2-384
904,455 UART: [kat] SHA2-512-ACC
906,356 UART: [kat] ECC-384
915,911 UART: [kat] HMAC-384Kdf
920,525 UART: [kat] LMS
1,168,837 UART: [kat] --
1,169,748 UART: [cold-reset] ++
1,170,264 UART: [fht] FHT @ 0x50003400
1,172,824 UART: [idev] ++
1,172,992 UART: [idev] CDI.KEYID = 6
1,173,353 UART: [idev] SUBJECT.KEYID = 7
1,173,778 UART: [idev] UDS.KEYID = 0
1,182,248 UART: [idev] Erasing UDS.KEYID = 0
1,199,280 UART: [idev] Sha1 KeyId Algorithm
1,208,230 UART: [idev] --
1,209,173 UART: [ldev] ++
1,209,341 UART: [ldev] CDI.KEYID = 6
1,209,705 UART: [ldev] SUBJECT.KEYID = 5
1,210,132 UART: [ldev] AUTHORITY.KEYID = 7
1,210,595 UART: [ldev] FE.KEYID = 1
1,215,719 UART: [ldev] Erasing FE.KEYID = 1
1,242,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,011 UART: [ldev] --
1,281,417 UART: [fwproc] Wait for Commands...
1,282,194 UART: [fwproc] Recv command 0x46574c44
1,282,927 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,620 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,703 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,615 >>> mbox cmd response: success
2,676,832 UART: [afmc] ++
2,677,000 UART: [afmc] CDI.KEYID = 6
2,677,363 UART: [afmc] SUBJECT.KEYID = 7
2,677,789 UART: [afmc] AUTHORITY.KEYID = 5
2,713,067 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,448 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,168 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,061 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,754 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,713 UART: [afmc] --
2,756,723 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,756,745 UART: [cold-reset] --
2,757,787 UART: [state] Locking Datavault
2,758,880 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,484 UART: [state] Locking ICCM
2,759,994 UART: [exit] Launching FMC @ 0x40000000
2,765,291 UART:
2,765,307 UART: Running Caliptra FMC ...
2,765,715 UART:
2,765,853 UART: [fmc] Received command: 0x10000005
2,766,954 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,745 >>> mbox cmd response: success
2,580,591 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,586,784 UART:
2,586,800 UART: Running Caliptra FMC ...
2,587,208 UART:
2,587,346 UART: [fmc] Received command: 0x10000005
2,588,447 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,460 UART: [state] LifecycleState = Unprovisioned
86,115 UART: [state] DebugLocked = No
86,799 UART: [state] WD Timer not started. Device not locked for debugging
88,128 UART: [kat] SHA2-256
891,678 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,807 UART: [kat] ++
895,959 UART: [kat] sha1
900,267 UART: [kat] SHA2-256
902,207 UART: [kat] SHA2-384
904,834 UART: [kat] SHA2-512-ACC
906,735 UART: [kat] ECC-384
916,672 UART: [kat] HMAC-384Kdf
921,210 UART: [kat] LMS
1,169,522 UART: [kat] --
1,170,327 UART: [cold-reset] ++
1,170,721 UART: [fht] FHT @ 0x50003400
1,173,453 UART: [idev] ++
1,173,621 UART: [idev] CDI.KEYID = 6
1,173,982 UART: [idev] SUBJECT.KEYID = 7
1,174,407 UART: [idev] UDS.KEYID = 0
1,182,801 UART: [idev] Erasing UDS.KEYID = 0
1,199,175 UART: [idev] Sha1 KeyId Algorithm
1,208,133 UART: [idev] --
1,209,048 UART: [ldev] ++
1,209,216 UART: [ldev] CDI.KEYID = 6
1,209,580 UART: [ldev] SUBJECT.KEYID = 5
1,210,007 UART: [ldev] AUTHORITY.KEYID = 7
1,210,470 UART: [ldev] FE.KEYID = 1
1,215,624 UART: [ldev] Erasing FE.KEYID = 1
1,242,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,614 UART: [ldev] --
1,281,982 UART: [fwproc] Wait for Commands...
1,282,743 UART: [fwproc] Recv command 0x46574c44
1,283,476 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,155 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,238 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,673,986 >>> mbox cmd response: success
2,675,103 UART: [afmc] ++
2,675,271 UART: [afmc] CDI.KEYID = 6
2,675,634 UART: [afmc] SUBJECT.KEYID = 7
2,676,060 UART: [afmc] AUTHORITY.KEYID = 5
2,711,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,972 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,723 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,443 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,336 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,029 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,892 UART: [afmc] --
2,754,812 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,754,834 UART: [cold-reset] --
2,755,524 UART: [state] Locking Datavault
2,756,743 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,347 UART: [state] Locking ICCM
2,758,013 UART: [exit] Launching FMC @ 0x40000000
2,763,310 UART:
2,763,326 UART: Running Caliptra FMC ...
2,763,734 UART:
2,763,872 UART: [fmc] Received command: 0x10000005
2,764,973 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,522,242 >>> mbox cmd response: success
2,577,880 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,584,041 UART:
2,584,057 UART: Running Caliptra FMC ...
2,584,465 UART:
2,584,603 UART: [fmc] Received command: 0x10000005
2,585,704 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
86,846 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
900,018 UART: [kat] SHA2-256
901,958 UART: [kat] SHA2-384
904,763 UART: [kat] SHA2-512-ACC
906,664 UART: [kat] ECC-384
916,277 UART: [kat] HMAC-384Kdf
920,937 UART: [kat] LMS
1,169,249 UART: [kat] --
1,170,344 UART: [cold-reset] ++
1,170,748 UART: [fht] FHT @ 0x50003400
1,173,564 UART: [idev] ++
1,173,732 UART: [idev] CDI.KEYID = 6
1,174,093 UART: [idev] SUBJECT.KEYID = 7
1,174,518 UART: [idev] UDS.KEYID = 0
1,182,612 UART: [idev] Erasing UDS.KEYID = 0
1,199,432 UART: [idev] Sha1 KeyId Algorithm
1,208,318 UART: [idev] --
1,209,423 UART: [ldev] ++
1,209,591 UART: [ldev] CDI.KEYID = 6
1,209,955 UART: [ldev] SUBJECT.KEYID = 5
1,210,382 UART: [ldev] AUTHORITY.KEYID = 7
1,210,845 UART: [ldev] FE.KEYID = 1
1,216,083 UART: [ldev] Erasing FE.KEYID = 1
1,242,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,967 UART: [ldev] --
1,282,275 UART: [fwproc] Wait for Commands...
1,282,990 UART: [fwproc] Recv command 0x46574c44
1,283,723 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,728 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,811 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,523 >>> mbox cmd response: success
2,675,628 UART: [afmc] ++
2,675,796 UART: [afmc] CDI.KEYID = 6
2,676,159 UART: [afmc] SUBJECT.KEYID = 7
2,676,585 UART: [afmc] AUTHORITY.KEYID = 5
2,712,633 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,660 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,380 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,273 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,966 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,769 UART: [afmc] --
2,755,811 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,833 UART: [cold-reset] --
2,756,829 UART: [state] Locking Datavault
2,757,574 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,178 UART: [state] Locking ICCM
2,758,802 UART: [exit] Launching FMC @ 0x40000000
2,764,099 UART:
2,764,115 UART: Running Caliptra FMC ...
2,764,523 UART:
2,764,661 UART: [fmc] Received command: 0x10000005
2,765,762 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,347 >>> mbox cmd response: success
2,580,007 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,586,662 UART:
2,586,678 UART: Running Caliptra FMC ...
2,587,086 UART:
2,587,224 UART: [fmc] Received command: 0x10000005
2,588,325 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
891,066 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,195 UART: [kat] ++
895,347 UART: [kat] sha1
899,709 UART: [kat] SHA2-256
901,649 UART: [kat] SHA2-384
904,512 UART: [kat] SHA2-512-ACC
906,413 UART: [kat] ECC-384
916,060 UART: [kat] HMAC-384Kdf
920,584 UART: [kat] LMS
1,168,896 UART: [kat] --
1,170,069 UART: [cold-reset] ++
1,170,513 UART: [fht] FHT @ 0x50003400
1,173,199 UART: [idev] ++
1,173,367 UART: [idev] CDI.KEYID = 6
1,173,728 UART: [idev] SUBJECT.KEYID = 7
1,174,153 UART: [idev] UDS.KEYID = 0
1,182,049 UART: [idev] Erasing UDS.KEYID = 0
1,198,545 UART: [idev] Sha1 KeyId Algorithm
1,207,445 UART: [idev] --
1,208,514 UART: [ldev] ++
1,208,682 UART: [ldev] CDI.KEYID = 6
1,209,046 UART: [ldev] SUBJECT.KEYID = 5
1,209,473 UART: [ldev] AUTHORITY.KEYID = 7
1,209,936 UART: [ldev] FE.KEYID = 1
1,215,168 UART: [ldev] Erasing FE.KEYID = 1
1,241,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,936 UART: [ldev] --
1,280,306 UART: [fwproc] Wait for Commands...
1,281,023 UART: [fwproc] Recv command 0x46574c44
1,281,756 UART: [fwproc] Recv'd Img size: 106848 bytes
2,492,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,455 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,538 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,673,276 >>> mbox cmd response: success
2,674,405 UART: [afmc] ++
2,674,573 UART: [afmc] CDI.KEYID = 6
2,674,936 UART: [afmc] SUBJECT.KEYID = 7
2,675,362 UART: [afmc] AUTHORITY.KEYID = 5
2,710,500 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,131 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,851 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,744 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,437 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,330 UART: [afmc] --
2,753,292 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,753,314 UART: [cold-reset] --
2,754,084 UART: [state] Locking Datavault
2,755,333 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,937 UART: [state] Locking ICCM
2,756,411 UART: [exit] Launching FMC @ 0x40000000
2,761,708 UART:
2,761,724 UART: Running Caliptra FMC ...
2,762,132 UART:
2,762,270 UART: [fmc] Received command: 0x10000005
2,763,371 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,522,652 >>> mbox cmd response: success
2,579,420 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,585,103 UART:
2,585,119 UART: Running Caliptra FMC ...
2,585,527 UART:
2,585,665 UART: [fmc] Received command: 0x10000005
2,586,766 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,741 UART: [state] LifecycleState = Unprovisioned
85,396 UART: [state] DebugLocked = No
85,884 UART: [state] WD Timer not started. Device not locked for debugging
87,225 UART: [kat] SHA2-256
890,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,904 UART: [kat] ++
895,056 UART: [kat] sha1
899,384 UART: [kat] SHA2-256
901,324 UART: [kat] SHA2-384
904,067 UART: [kat] SHA2-512-ACC
905,968 UART: [kat] ECC-384
915,377 UART: [kat] HMAC-384Kdf
919,883 UART: [kat] LMS
1,168,195 UART: [kat] --
1,169,192 UART: [cold-reset] ++
1,169,714 UART: [fht] FHT @ 0x50003400
1,172,452 UART: [idev] ++
1,172,620 UART: [idev] CDI.KEYID = 6
1,172,981 UART: [idev] SUBJECT.KEYID = 7
1,173,406 UART: [idev] UDS.KEYID = 0
1,181,288 UART: [idev] Erasing UDS.KEYID = 0
1,198,162 UART: [idev] Sha1 KeyId Algorithm
1,206,918 UART: [idev] --
1,207,911 UART: [ldev] ++
1,208,079 UART: [ldev] CDI.KEYID = 6
1,208,443 UART: [ldev] SUBJECT.KEYID = 5
1,208,870 UART: [ldev] AUTHORITY.KEYID = 7
1,209,333 UART: [ldev] FE.KEYID = 1
1,214,677 UART: [ldev] Erasing FE.KEYID = 1
1,241,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,801 UART: [ldev] --
1,280,069 UART: [fwproc] Wait for Commands...
1,280,798 UART: [fwproc] Recv command 0x46574c44
1,281,531 UART: [fwproc] Recv'd Img size: 106848 bytes
2,492,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,834 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,917 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,673,703 >>> mbox cmd response: success
2,674,804 UART: [afmc] ++
2,674,972 UART: [afmc] CDI.KEYID = 6
2,675,335 UART: [afmc] SUBJECT.KEYID = 7
2,675,761 UART: [afmc] AUTHORITY.KEYID = 5
2,712,237 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,474 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,194 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,087 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,780 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,653 UART: [afmc] --
2,755,763 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,785 UART: [cold-reset] --
2,756,683 UART: [state] Locking Datavault
2,757,946 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,550 UART: [state] Locking ICCM
2,758,990 UART: [exit] Launching FMC @ 0x40000000
2,764,287 UART:
2,764,303 UART: Running Caliptra FMC ...
2,764,711 UART:
2,764,849 UART: [fmc] Received command: 0x10000005
2,765,950 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,307 >>> mbox cmd response: success
2,581,093 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,587,240 UART:
2,587,256 UART: Running Caliptra FMC ...
2,587,664 UART:
2,587,802 UART: [fmc] Received command: 0x10000005
2,588,903 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,621 UART: [state] WD Timer not started. Device not locked for debugging
87,952 UART: [kat] SHA2-256
891,502 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,631 UART: [kat] ++
895,783 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,562 UART: [kat] SHA2-512-ACC
906,463 UART: [kat] ECC-384
916,062 UART: [kat] HMAC-384Kdf
920,482 UART: [kat] LMS
1,168,794 UART: [kat] --
1,169,673 UART: [cold-reset] ++
1,170,039 UART: [fht] FHT @ 0x50003400
1,172,875 UART: [idev] ++
1,173,043 UART: [idev] CDI.KEYID = 6
1,173,404 UART: [idev] SUBJECT.KEYID = 7
1,173,829 UART: [idev] UDS.KEYID = 0
1,181,415 UART: [idev] Erasing UDS.KEYID = 0
1,198,467 UART: [idev] Sha1 KeyId Algorithm
1,207,253 UART: [idev] --
1,208,418 UART: [ldev] ++
1,208,586 UART: [ldev] CDI.KEYID = 6
1,208,950 UART: [ldev] SUBJECT.KEYID = 5
1,209,377 UART: [ldev] AUTHORITY.KEYID = 7
1,209,840 UART: [ldev] FE.KEYID = 1
1,214,974 UART: [ldev] Erasing FE.KEYID = 1
1,241,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,378 UART: [ldev] --
1,280,688 UART: [fwproc] Wait for Commands...
1,281,509 UART: [fwproc] Recv command 0x46574c44
1,282,242 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,421 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,609 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,692 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,556 >>> mbox cmd response: success
2,675,675 UART: [afmc] ++
2,675,843 UART: [afmc] CDI.KEYID = 6
2,676,206 UART: [afmc] SUBJECT.KEYID = 7
2,676,632 UART: [afmc] AUTHORITY.KEYID = 5
2,712,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,398 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,149 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,869 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,762 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,455 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,432 UART: [afmc] --
2,756,322 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,756,344 UART: [cold-reset] --
2,757,166 UART: [state] Locking Datavault
2,758,337 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,941 UART: [state] Locking ICCM
2,759,501 UART: [exit] Launching FMC @ 0x40000000
2,764,798 UART:
2,764,814 UART: Running Caliptra FMC ...
2,765,222 UART:
2,765,360 UART: [fmc] Received command: 0x10000005
2,766,461 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,818 >>> mbox cmd response: success
2,580,366 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,586,425 UART:
2,586,441 UART: Running Caliptra FMC ...
2,586,849 UART:
2,586,987 UART: [fmc] Received command: 0x10000005
2,588,088 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,536 UART: [kat] ++
895,688 UART: [kat] sha1
899,888 UART: [kat] SHA2-256
901,828 UART: [kat] SHA2-384
904,735 UART: [kat] SHA2-512-ACC
906,636 UART: [kat] ECC-384
916,773 UART: [kat] HMAC-384Kdf
921,461 UART: [kat] LMS
1,169,773 UART: [kat] --
1,170,658 UART: [cold-reset] ++
1,171,184 UART: [fht] FHT @ 0x50003400
1,173,996 UART: [idev] ++
1,174,164 UART: [idev] CDI.KEYID = 6
1,174,525 UART: [idev] SUBJECT.KEYID = 7
1,174,950 UART: [idev] UDS.KEYID = 0
1,182,892 UART: [idev] Erasing UDS.KEYID = 0
1,200,028 UART: [idev] Sha1 KeyId Algorithm
1,208,868 UART: [idev] --
1,210,053 UART: [ldev] ++
1,210,221 UART: [ldev] CDI.KEYID = 6
1,210,585 UART: [ldev] SUBJECT.KEYID = 5
1,211,012 UART: [ldev] AUTHORITY.KEYID = 7
1,211,475 UART: [ldev] FE.KEYID = 1
1,216,703 UART: [ldev] Erasing FE.KEYID = 1
1,242,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,721 UART: [ldev] --
1,282,237 UART: [fwproc] Wait for Commands...
1,283,028 UART: [fwproc] Recv command 0x46574c44
1,283,761 UART: [fwproc] Recv'd Img size: 106848 bytes
2,495,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,436 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,519 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,676,341 >>> mbox cmd response: success
2,677,550 UART: [afmc] ++
2,677,718 UART: [afmc] CDI.KEYID = 6
2,678,081 UART: [afmc] SUBJECT.KEYID = 7
2,678,507 UART: [afmc] AUTHORITY.KEYID = 5
2,714,355 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,714 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,434 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,327 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,020 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,915 UART: [afmc] --
2,757,959 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,757,981 UART: [cold-reset] --
2,758,999 UART: [state] Locking Datavault
2,759,928 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,532 UART: [state] Locking ICCM
2,761,148 UART: [exit] Launching FMC @ 0x40000000
2,766,445 UART:
2,766,461 UART: Running Caliptra FMC ...
2,766,869 UART:
2,767,007 UART: [fmc] Received command: 0x10000005
2,768,108 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,783 >>> mbox cmd response: success
2,582,289 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,588,488 UART:
2,588,504 UART: Running Caliptra FMC ...
2,588,912 UART:
2,589,050 UART: [fmc] Received command: 0x10000005
2,590,151 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,796 UART: [kat] SHA2-256
891,346 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,475 UART: [kat] ++
895,627 UART: [kat] sha1
899,963 UART: [kat] SHA2-256
901,903 UART: [kat] SHA2-384
904,780 UART: [kat] SHA2-512-ACC
906,681 UART: [kat] ECC-384
916,430 UART: [kat] HMAC-384Kdf
921,136 UART: [kat] LMS
1,169,448 UART: [kat] --
1,170,469 UART: [cold-reset] ++
1,170,963 UART: [fht] FHT @ 0x50003400
1,173,665 UART: [idev] ++
1,173,833 UART: [idev] CDI.KEYID = 6
1,174,194 UART: [idev] SUBJECT.KEYID = 7
1,174,619 UART: [idev] UDS.KEYID = 0
1,182,733 UART: [idev] Erasing UDS.KEYID = 0
1,199,699 UART: [idev] Sha1 KeyId Algorithm
1,208,369 UART: [idev] --
1,209,264 UART: [ldev] ++
1,209,432 UART: [ldev] CDI.KEYID = 6
1,209,796 UART: [ldev] SUBJECT.KEYID = 5
1,210,223 UART: [ldev] AUTHORITY.KEYID = 7
1,210,686 UART: [ldev] FE.KEYID = 1
1,215,824 UART: [ldev] Erasing FE.KEYID = 1
1,241,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,230 UART: [ldev] --
1,280,586 UART: [fwproc] Wait for Commands...
1,281,231 UART: [fwproc] Recv command 0x46574c44
1,281,964 UART: [fwproc] Recv'd Img size: 106848 bytes
2,492,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,261 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,344 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,088 >>> mbox cmd response: success
2,675,297 UART: [afmc] ++
2,675,465 UART: [afmc] CDI.KEYID = 6
2,675,828 UART: [afmc] SUBJECT.KEYID = 7
2,676,254 UART: [afmc] AUTHORITY.KEYID = 5
2,711,838 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,045 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,765 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,658 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,351 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,214 UART: [afmc] --
2,755,092 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,114 UART: [cold-reset] --
2,755,978 UART: [state] Locking Datavault
2,756,999 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,603 UART: [state] Locking ICCM
2,758,243 UART: [exit] Launching FMC @ 0x40000000
2,763,540 UART:
2,763,556 UART: Running Caliptra FMC ...
2,763,964 UART:
2,764,102 UART: [fmc] Received command: 0x10000005
2,765,203 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,912 >>> mbox cmd response: success
2,581,668 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,587,995 UART:
2,588,011 UART: Running Caliptra FMC ...
2,588,419 UART:
2,588,557 UART: [fmc] Received command: 0x10000005
2,589,658 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,724 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
891,551 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,680 UART: [kat] ++
895,832 UART: [kat] sha1
900,094 UART: [kat] SHA2-256
902,034 UART: [kat] SHA2-384
904,605 UART: [kat] SHA2-512-ACC
906,506 UART: [kat] ECC-384
916,177 UART: [kat] HMAC-384Kdf
921,023 UART: [kat] LMS
1,169,335 UART: [kat] --
1,170,036 UART: [cold-reset] ++
1,170,496 UART: [fht] FHT @ 0x50003400
1,173,126 UART: [idev] ++
1,173,294 UART: [idev] CDI.KEYID = 6
1,173,655 UART: [idev] SUBJECT.KEYID = 7
1,174,080 UART: [idev] UDS.KEYID = 0
1,182,086 UART: [idev] Erasing UDS.KEYID = 0
1,199,994 UART: [idev] Sha1 KeyId Algorithm
1,208,732 UART: [idev] --
1,209,705 UART: [ldev] ++
1,209,873 UART: [ldev] CDI.KEYID = 6
1,210,237 UART: [ldev] SUBJECT.KEYID = 5
1,210,664 UART: [ldev] AUTHORITY.KEYID = 7
1,211,127 UART: [ldev] FE.KEYID = 1
1,216,603 UART: [ldev] Erasing FE.KEYID = 1
1,242,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,013 UART: [ldev] --
1,281,513 UART: [fwproc] Wait for Commands...
1,282,260 UART: [fwproc] Recv command 0x46574c44
1,282,993 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,344 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,427 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,333 >>> mbox cmd response: success
2,675,452 UART: [afmc] ++
2,675,620 UART: [afmc] CDI.KEYID = 6
2,675,983 UART: [afmc] SUBJECT.KEYID = 7
2,676,409 UART: [afmc] AUTHORITY.KEYID = 5
2,711,529 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,998 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,718 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,611 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,304 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,207 UART: [afmc] --
2,755,111 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,133 UART: [cold-reset] --
2,756,051 UART: [state] Locking Datavault
2,757,096 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,700 UART: [state] Locking ICCM
2,758,276 UART: [exit] Launching FMC @ 0x40000000
2,763,573 UART:
2,763,589 UART: Running Caliptra FMC ...
2,763,997 UART:
2,764,135 UART: [fmc] Received command: 0x10000005
2,765,236 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,523,845 >>> mbox cmd response: success
2,579,343 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,585,516 UART:
2,585,532 UART: Running Caliptra FMC ...
2,585,940 UART:
2,586,078 UART: [fmc] Received command: 0x10000005
2,587,179 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
891,354 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,483 UART: [kat] ++
895,635 UART: [kat] sha1
899,999 UART: [kat] SHA2-256
901,939 UART: [kat] SHA2-384
904,686 UART: [kat] SHA2-512-ACC
906,587 UART: [kat] ECC-384
915,966 UART: [kat] HMAC-384Kdf
920,570 UART: [kat] LMS
1,168,882 UART: [kat] --
1,169,733 UART: [cold-reset] ++
1,170,089 UART: [fht] FHT @ 0x50003400
1,172,713 UART: [idev] ++
1,172,881 UART: [idev] CDI.KEYID = 6
1,173,242 UART: [idev] SUBJECT.KEYID = 7
1,173,667 UART: [idev] UDS.KEYID = 0
1,181,503 UART: [idev] Erasing UDS.KEYID = 0
1,197,735 UART: [idev] Sha1 KeyId Algorithm
1,206,581 UART: [idev] --
1,207,504 UART: [ldev] ++
1,207,672 UART: [ldev] CDI.KEYID = 6
1,208,036 UART: [ldev] SUBJECT.KEYID = 5
1,208,463 UART: [ldev] AUTHORITY.KEYID = 7
1,208,926 UART: [ldev] FE.KEYID = 1
1,214,090 UART: [ldev] Erasing FE.KEYID = 1
1,240,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,512 UART: [ldev] --
1,279,896 UART: [fwproc] Wait for Commands...
1,280,571 UART: [fwproc] Recv command 0x46574c44
1,281,304 UART: [fwproc] Recv'd Img size: 106848 bytes
2,491,975 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,909 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,992 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,672,688 >>> mbox cmd response: success
2,673,717 UART: [afmc] ++
2,673,885 UART: [afmc] CDI.KEYID = 6
2,674,248 UART: [afmc] SUBJECT.KEYID = 7
2,674,674 UART: [afmc] AUTHORITY.KEYID = 5
2,710,556 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,741 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,461 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,354 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,047 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,760 UART: [afmc] --
2,753,758 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,753,780 UART: [cold-reset] --
2,754,852 UART: [state] Locking Datavault
2,756,011 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,615 UART: [state] Locking ICCM
2,757,153 UART: [exit] Launching FMC @ 0x40000000
2,762,450 UART:
2,762,466 UART: Running Caliptra FMC ...
2,762,874 UART:
2,763,012 UART: [fmc] Received command: 0x10000005
2,764,113 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,523,774 >>> mbox cmd response: success
2,579,124 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,585,045 UART:
2,585,061 UART: Running Caliptra FMC ...
2,585,469 UART:
2,585,607 UART: [fmc] Received command: 0x10000005
2,586,708 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
891,569 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,698 UART: [kat] ++
895,850 UART: [kat] sha1
899,974 UART: [kat] SHA2-256
901,914 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
916,073 UART: [kat] HMAC-384Kdf
920,537 UART: [kat] LMS
1,168,849 UART: [kat] --
1,169,704 UART: [cold-reset] ++
1,170,064 UART: [fht] FHT @ 0x50003400
1,172,832 UART: [idev] ++
1,173,000 UART: [idev] CDI.KEYID = 6
1,173,361 UART: [idev] SUBJECT.KEYID = 7
1,173,786 UART: [idev] UDS.KEYID = 0
1,181,924 UART: [idev] Erasing UDS.KEYID = 0
1,198,724 UART: [idev] Sha1 KeyId Algorithm
1,207,644 UART: [idev] --
1,208,539 UART: [ldev] ++
1,208,707 UART: [ldev] CDI.KEYID = 6
1,209,071 UART: [ldev] SUBJECT.KEYID = 5
1,209,498 UART: [ldev] AUTHORITY.KEYID = 7
1,209,961 UART: [ldev] FE.KEYID = 1
1,215,091 UART: [ldev] Erasing FE.KEYID = 1
1,241,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,319 UART: [ldev] --
1,280,701 UART: [fwproc] Wait for Commands...
1,281,400 UART: [fwproc] Recv command 0x46574c44
1,282,133 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,144 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,227 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,963 >>> mbox cmd response: success
2,676,148 UART: [afmc] ++
2,676,316 UART: [afmc] CDI.KEYID = 6
2,676,679 UART: [afmc] SUBJECT.KEYID = 7
2,677,105 UART: [afmc] AUTHORITY.KEYID = 5
2,712,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,297 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,048 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,768 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,661 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,354 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,213 UART: [afmc] --
2,756,143 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,756,165 UART: [cold-reset] --
2,757,159 UART: [state] Locking Datavault
2,758,406 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,010 UART: [state] Locking ICCM
2,759,466 UART: [exit] Launching FMC @ 0x40000000
2,764,763 UART:
2,764,779 UART: Running Caliptra FMC ...
2,765,187 UART:
2,765,325 UART: [fmc] Received command: 0x10000005
2,766,426 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,725 >>> mbox cmd response: success
2,579,869 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,586,588 UART:
2,586,604 UART: Running Caliptra FMC ...
2,587,012 UART:
2,587,150 UART: [fmc] Received command: 0x10000005
2,588,251 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
891,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,219 UART: [kat] ++
895,371 UART: [kat] sha1
899,747 UART: [kat] SHA2-256
901,687 UART: [kat] SHA2-384
904,602 UART: [kat] SHA2-512-ACC
906,503 UART: [kat] ECC-384
915,950 UART: [kat] HMAC-384Kdf
920,388 UART: [kat] LMS
1,168,700 UART: [kat] --
1,169,801 UART: [cold-reset] ++
1,170,167 UART: [fht] FHT @ 0x50003400
1,172,763 UART: [idev] ++
1,172,931 UART: [idev] CDI.KEYID = 6
1,173,292 UART: [idev] SUBJECT.KEYID = 7
1,173,717 UART: [idev] UDS.KEYID = 0
1,181,893 UART: [idev] Erasing UDS.KEYID = 0
1,198,613 UART: [idev] Sha1 KeyId Algorithm
1,207,537 UART: [idev] --
1,208,686 UART: [ldev] ++
1,208,854 UART: [ldev] CDI.KEYID = 6
1,209,218 UART: [ldev] SUBJECT.KEYID = 5
1,209,645 UART: [ldev] AUTHORITY.KEYID = 7
1,210,108 UART: [ldev] FE.KEYID = 1
1,215,040 UART: [ldev] Erasing FE.KEYID = 1
1,241,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,026 UART: [ldev] --
1,280,398 UART: [fwproc] Wait for Commands...
1,281,081 UART: [fwproc] Recv command 0x46574c44
1,281,814 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,553 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,075 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,158 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,673,912 >>> mbox cmd response: success
2,675,075 UART: [afmc] ++
2,675,243 UART: [afmc] CDI.KEYID = 6
2,675,606 UART: [afmc] SUBJECT.KEYID = 7
2,676,032 UART: [afmc] AUTHORITY.KEYID = 5
2,711,500 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,665 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,385 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,278 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,971 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,830 UART: [afmc] --
2,754,886 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,754,908 UART: [cold-reset] --
2,756,040 UART: [state] Locking Datavault
2,757,047 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,651 UART: [state] Locking ICCM
2,758,213 UART: [exit] Launching FMC @ 0x40000000
2,763,510 UART:
2,763,526 UART: Running Caliptra FMC ...
2,763,934 UART:
2,764,072 UART: [fmc] Received command: 0x10000003
2,773,548 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,522,254 >>> mbox cmd response: success
2,578,450 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,584,169 UART:
2,584,185 UART: Running Caliptra FMC ...
2,584,593 UART:
2,584,731 UART: [fmc] Received command: 0x10000003
2,594,207 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,917 UART: [state] LifecycleState = Unprovisioned
85,572 UART: [state] DebugLocked = No
86,204 UART: [state] WD Timer not started. Device not locked for debugging
87,455 UART: [kat] SHA2-256
891,005 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,134 UART: [kat] ++
895,286 UART: [kat] sha1
899,406 UART: [kat] SHA2-256
901,346 UART: [kat] SHA2-384
904,325 UART: [kat] SHA2-512-ACC
906,226 UART: [kat] ECC-384
916,145 UART: [kat] HMAC-384Kdf
920,751 UART: [kat] LMS
1,169,063 UART: [kat] --
1,169,896 UART: [cold-reset] ++
1,170,348 UART: [fht] FHT @ 0x50003400
1,172,908 UART: [idev] ++
1,173,076 UART: [idev] CDI.KEYID = 6
1,173,437 UART: [idev] SUBJECT.KEYID = 7
1,173,862 UART: [idev] UDS.KEYID = 0
1,181,784 UART: [idev] Erasing UDS.KEYID = 0
1,199,370 UART: [idev] Sha1 KeyId Algorithm
1,208,284 UART: [idev] --
1,209,219 UART: [ldev] ++
1,209,387 UART: [ldev] CDI.KEYID = 6
1,209,751 UART: [ldev] SUBJECT.KEYID = 5
1,210,178 UART: [ldev] AUTHORITY.KEYID = 7
1,210,641 UART: [ldev] FE.KEYID = 1
1,216,215 UART: [ldev] Erasing FE.KEYID = 1
1,242,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,121 UART: [ldev] --
1,281,577 UART: [fwproc] Wait for Commands...
1,282,386 UART: [fwproc] Recv command 0x46574c44
1,283,119 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,080 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,163 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,059 >>> mbox cmd response: success
2,675,298 UART: [afmc] ++
2,675,466 UART: [afmc] CDI.KEYID = 6
2,675,829 UART: [afmc] SUBJECT.KEYID = 7
2,676,255 UART: [afmc] AUTHORITY.KEYID = 5
2,711,921 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,579 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,330 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,050 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,943 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,636 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,435 UART: [afmc] --
2,755,505 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,755,527 UART: [cold-reset] --
2,756,523 UART: [state] Locking Datavault
2,757,680 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,284 UART: [state] Locking ICCM
2,758,758 UART: [exit] Launching FMC @ 0x40000000
2,764,055 UART:
2,764,071 UART: Running Caliptra FMC ...
2,764,479 UART:
2,764,617 UART: [fmc] Received command: 0x10000003
2,774,093 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,526,117 >>> mbox cmd response: success
2,581,639 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,587,424 UART:
2,587,440 UART: Running Caliptra FMC ...
2,587,848 UART:
2,587,986 UART: [fmc] Received command: 0x10000003
2,597,462 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,601 UART: [state] WD Timer not started. Device not locked for debugging
87,946 UART: [kat] SHA2-256
891,496 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
900,069 UART: [kat] SHA2-256
902,009 UART: [kat] SHA2-384
904,900 UART: [kat] SHA2-512-ACC
906,801 UART: [kat] ECC-384
916,626 UART: [kat] HMAC-384Kdf
921,394 UART: [kat] LMS
1,169,706 UART: [kat] --
1,170,675 UART: [cold-reset] ++
1,171,229 UART: [fht] FHT @ 0x50003400
1,173,709 UART: [idev] ++
1,173,877 UART: [idev] CDI.KEYID = 6
1,174,238 UART: [idev] SUBJECT.KEYID = 7
1,174,663 UART: [idev] UDS.KEYID = 0
1,182,673 UART: [idev] Erasing UDS.KEYID = 0
1,199,821 UART: [idev] Sha1 KeyId Algorithm
1,208,757 UART: [idev] --
1,209,722 UART: [ldev] ++
1,209,890 UART: [ldev] CDI.KEYID = 6
1,210,254 UART: [ldev] SUBJECT.KEYID = 5
1,210,681 UART: [ldev] AUTHORITY.KEYID = 7
1,211,144 UART: [ldev] FE.KEYID = 1
1,216,410 UART: [ldev] Erasing FE.KEYID = 1
1,242,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,632 UART: [ldev] --
1,281,900 UART: [fwproc] Wait for Commands...
1,282,475 UART: [fwproc] Recv command 0x46574c44
1,283,208 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,867 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,950 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,798 >>> mbox cmd response: success
2,675,975 UART: [afmc] ++
2,676,143 UART: [afmc] CDI.KEYID = 6
2,676,506 UART: [afmc] SUBJECT.KEYID = 7
2,676,932 UART: [afmc] AUTHORITY.KEYID = 5
2,712,592 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,118 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,869 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,589 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,482 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,175 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,172 UART: [afmc] --
2,756,272 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,756,294 UART: [cold-reset] --
2,756,932 UART: [state] Locking Datavault
2,758,229 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,833 UART: [state] Locking ICCM
2,759,411 UART: [exit] Launching FMC @ 0x40000000
2,764,708 UART:
2,764,724 UART: Running Caliptra FMC ...
2,765,132 UART:
2,765,270 UART: [fmc] Received command: 0x10000003
2,774,746 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,523,156 >>> mbox cmd response: success
2,578,938 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,585,099 UART:
2,585,115 UART: Running Caliptra FMC ...
2,585,523 UART:
2,585,661 UART: [fmc] Received command: 0x10000003
2,595,137 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
88,033 UART: [kat] SHA2-256
891,583 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,712 UART: [kat] ++
895,864 UART: [kat] sha1
900,032 UART: [kat] SHA2-256
901,972 UART: [kat] SHA2-384
904,791 UART: [kat] SHA2-512-ACC
906,692 UART: [kat] ECC-384
916,293 UART: [kat] HMAC-384Kdf
921,073 UART: [kat] LMS
1,169,385 UART: [kat] --
1,170,108 UART: [cold-reset] ++
1,170,636 UART: [fht] FHT @ 0x50003400
1,173,364 UART: [idev] ++
1,173,532 UART: [idev] CDI.KEYID = 6
1,173,893 UART: [idev] SUBJECT.KEYID = 7
1,174,318 UART: [idev] UDS.KEYID = 0
1,182,358 UART: [idev] Erasing UDS.KEYID = 0
1,199,658 UART: [idev] Sha1 KeyId Algorithm
1,208,562 UART: [idev] --
1,209,523 UART: [ldev] ++
1,209,691 UART: [ldev] CDI.KEYID = 6
1,210,055 UART: [ldev] SUBJECT.KEYID = 5
1,210,482 UART: [ldev] AUTHORITY.KEYID = 7
1,210,945 UART: [ldev] FE.KEYID = 1
1,216,241 UART: [ldev] Erasing FE.KEYID = 1
1,242,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,319 UART: [ldev] --
1,281,723 UART: [fwproc] Wait for Commands...
1,282,480 UART: [fwproc] Recv command 0x46574c44
1,283,213 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,698 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,781 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,687 >>> mbox cmd response: success
2,675,710 UART: [afmc] ++
2,675,878 UART: [afmc] CDI.KEYID = 6
2,676,241 UART: [afmc] SUBJECT.KEYID = 7
2,676,667 UART: [afmc] AUTHORITY.KEYID = 5
2,711,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,926 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,646 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,539 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,232 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,143 UART: [afmc] --
2,755,087 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,755,109 UART: [cold-reset] --
2,755,971 UART: [state] Locking Datavault
2,756,810 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,414 UART: [state] Locking ICCM
2,758,084 UART: [exit] Launching FMC @ 0x40000000
2,763,381 UART:
2,763,397 UART: Running Caliptra FMC ...
2,763,805 UART:
2,763,943 UART: [fmc] Received command: 0x10000003
2,773,419 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,027 >>> mbox cmd response: success
2,579,975 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,586,032 UART:
2,586,048 UART: Running Caliptra FMC ...
2,586,456 UART:
2,586,594 UART: [fmc] Received command: 0x10000003
2,596,070 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,093 UART: [state] WD Timer not started. Device not locked for debugging
87,228 UART: [kat] SHA2-256
890,778 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,907 UART: [kat] ++
895,059 UART: [kat] sha1
899,437 UART: [kat] SHA2-256
901,377 UART: [kat] SHA2-384
904,002 UART: [kat] SHA2-512-ACC
905,903 UART: [kat] ECC-384
916,066 UART: [kat] HMAC-384Kdf
920,702 UART: [kat] LMS
1,169,014 UART: [kat] --
1,169,985 UART: [cold-reset] ++
1,170,475 UART: [fht] FHT @ 0x50003400
1,173,265 UART: [idev] ++
1,173,433 UART: [idev] CDI.KEYID = 6
1,173,794 UART: [idev] SUBJECT.KEYID = 7
1,174,219 UART: [idev] UDS.KEYID = 0
1,182,279 UART: [idev] Erasing UDS.KEYID = 0
1,199,421 UART: [idev] Sha1 KeyId Algorithm
1,208,307 UART: [idev] --
1,209,218 UART: [ldev] ++
1,209,386 UART: [ldev] CDI.KEYID = 6
1,209,750 UART: [ldev] SUBJECT.KEYID = 5
1,210,177 UART: [ldev] AUTHORITY.KEYID = 7
1,210,640 UART: [ldev] FE.KEYID = 1
1,215,850 UART: [ldev] Erasing FE.KEYID = 1
1,241,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,814 UART: [ldev] --
1,281,322 UART: [fwproc] Wait for Commands...
1,282,049 UART: [fwproc] Recv command 0x46574c44
1,282,782 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,171 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,254 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,094 >>> mbox cmd response: success
2,676,301 UART: [afmc] ++
2,676,469 UART: [afmc] CDI.KEYID = 6
2,676,832 UART: [afmc] SUBJECT.KEYID = 7
2,677,258 UART: [afmc] AUTHORITY.KEYID = 5
2,712,712 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,185 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,905 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,798 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,491 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,236 UART: [afmc] --
2,756,246 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,756,268 UART: [cold-reset] --
2,757,230 UART: [state] Locking Datavault
2,758,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,197 UART: [state] Locking ICCM
2,759,697 UART: [exit] Launching FMC @ 0x40000000
2,764,994 UART:
2,765,010 UART: Running Caliptra FMC ...
2,765,418 UART:
2,765,556 UART: [fmc] Received command: 0x10000003
2,775,032 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,034 >>> mbox cmd response: success
2,580,132 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,586,249 UART:
2,586,265 UART: Running Caliptra FMC ...
2,586,673 UART:
2,586,811 UART: [fmc] Received command: 0x10000003
2,596,287 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
891,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,846 UART: [kat] ++
895,998 UART: [kat] sha1
900,372 UART: [kat] SHA2-256
902,312 UART: [kat] SHA2-384
905,027 UART: [kat] SHA2-512-ACC
906,928 UART: [kat] ECC-384
916,785 UART: [kat] HMAC-384Kdf
921,649 UART: [kat] LMS
1,169,961 UART: [kat] --
1,171,120 UART: [cold-reset] ++
1,171,576 UART: [fht] FHT @ 0x50003400
1,174,314 UART: [idev] ++
1,174,482 UART: [idev] CDI.KEYID = 6
1,174,843 UART: [idev] SUBJECT.KEYID = 7
1,175,268 UART: [idev] UDS.KEYID = 0
1,182,968 UART: [idev] Erasing UDS.KEYID = 0
1,200,154 UART: [idev] Sha1 KeyId Algorithm
1,209,050 UART: [idev] --
1,209,993 UART: [ldev] ++
1,210,161 UART: [ldev] CDI.KEYID = 6
1,210,525 UART: [ldev] SUBJECT.KEYID = 5
1,210,952 UART: [ldev] AUTHORITY.KEYID = 7
1,211,415 UART: [ldev] FE.KEYID = 1
1,216,657 UART: [ldev] Erasing FE.KEYID = 1
1,243,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,789 UART: [ldev] --
1,282,131 UART: [fwproc] Wait for Commands...
1,282,942 UART: [fwproc] Recv command 0x46574c44
1,283,675 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,838 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,716 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,799 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,559 >>> mbox cmd response: success
2,675,612 UART: [afmc] ++
2,675,780 UART: [afmc] CDI.KEYID = 6
2,676,143 UART: [afmc] SUBJECT.KEYID = 7
2,676,569 UART: [afmc] AUTHORITY.KEYID = 5
2,711,843 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,269 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,020 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,740 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,633 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,326 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,203 UART: [afmc] --
2,755,133 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,755,155 UART: [cold-reset] --
2,755,937 UART: [state] Locking Datavault
2,757,118 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,722 UART: [state] Locking ICCM
2,758,340 UART: [exit] Launching FMC @ 0x40000000
2,763,637 UART:
2,763,653 UART: Running Caliptra FMC ...
2,764,061 UART:
2,764,199 UART: [fmc] Received command: 0x10000003
2,773,675 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,526,389 >>> mbox cmd response: success
2,582,657 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,588,978 UART:
2,588,994 UART: Running Caliptra FMC ...
2,589,402 UART:
2,589,540 UART: [fmc] Received command: 0x10000003
2,599,016 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,225 UART: [state] WD Timer not started. Device not locked for debugging
87,398 UART: [kat] SHA2-256
890,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,077 UART: [kat] ++
895,229 UART: [kat] sha1
899,621 UART: [kat] SHA2-256
901,561 UART: [kat] SHA2-384
904,354 UART: [kat] SHA2-512-ACC
906,255 UART: [kat] ECC-384
915,662 UART: [kat] HMAC-384Kdf
920,230 UART: [kat] LMS
1,168,542 UART: [kat] --
1,169,815 UART: [cold-reset] ++
1,170,269 UART: [fht] FHT @ 0x50003400
1,172,947 UART: [idev] ++
1,173,115 UART: [idev] CDI.KEYID = 6
1,173,476 UART: [idev] SUBJECT.KEYID = 7
1,173,901 UART: [idev] UDS.KEYID = 0
1,181,969 UART: [idev] Erasing UDS.KEYID = 0
1,199,173 UART: [idev] Sha1 KeyId Algorithm
1,208,143 UART: [idev] --
1,209,080 UART: [ldev] ++
1,209,248 UART: [ldev] CDI.KEYID = 6
1,209,612 UART: [ldev] SUBJECT.KEYID = 5
1,210,039 UART: [ldev] AUTHORITY.KEYID = 7
1,210,502 UART: [ldev] FE.KEYID = 1
1,215,534 UART: [ldev] Erasing FE.KEYID = 1
1,242,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,204 UART: [ldev] --
1,281,476 UART: [fwproc] Wait for Commands...
1,282,275 UART: [fwproc] Recv command 0x46574c44
1,283,009 UART: Invalid Img size: 131073 bytes
1,283,995 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
88,041 UART: [kat] SHA2-256
891,591 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,720 UART: [kat] ++
895,872 UART: [kat] sha1
900,052 UART: [kat] SHA2-256
901,992 UART: [kat] SHA2-384
904,589 UART: [kat] SHA2-512-ACC
906,490 UART: [kat] ECC-384
916,389 UART: [kat] HMAC-384Kdf
921,131 UART: [kat] LMS
1,169,443 UART: [kat] --
1,170,368 UART: [cold-reset] ++
1,170,756 UART: [fht] FHT @ 0x50003400
1,173,312 UART: [idev] ++
1,173,480 UART: [idev] CDI.KEYID = 6
1,173,841 UART: [idev] SUBJECT.KEYID = 7
1,174,266 UART: [idev] UDS.KEYID = 0
1,182,318 UART: [idev] Erasing UDS.KEYID = 0
1,199,186 UART: [idev] Sha1 KeyId Algorithm
1,208,074 UART: [idev] --
1,209,039 UART: [ldev] ++
1,209,207 UART: [ldev] CDI.KEYID = 6
1,209,571 UART: [ldev] SUBJECT.KEYID = 5
1,209,998 UART: [ldev] AUTHORITY.KEYID = 7
1,210,461 UART: [ldev] FE.KEYID = 1
1,215,863 UART: [ldev] Erasing FE.KEYID = 1
1,241,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,009 UART: [ldev] --
1,281,431 UART: [fwproc] Wait for Commands...
1,282,244 UART: [fwproc] Recv command 0x46574c44
1,282,978 UART: Invalid Img size: 131073 bytes
1,283,916 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,962 UART: [kat] SHA2-256
891,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,641 UART: [kat] ++
895,793 UART: [kat] sha1
899,905 UART: [kat] SHA2-256
901,845 UART: [kat] SHA2-384
904,668 UART: [kat] SHA2-512-ACC
906,569 UART: [kat] ECC-384
916,246 UART: [kat] HMAC-384Kdf
920,856 UART: [kat] LMS
1,169,168 UART: [kat] --
1,170,173 UART: [cold-reset] ++
1,170,513 UART: [fht] FHT @ 0x50003400
1,173,165 UART: [idev] ++
1,173,333 UART: [idev] CDI.KEYID = 6
1,173,694 UART: [idev] SUBJECT.KEYID = 7
1,174,119 UART: [idev] UDS.KEYID = 0
1,182,105 UART: [idev] Erasing UDS.KEYID = 0
1,199,131 UART: [idev] Sha1 KeyId Algorithm
1,207,941 UART: [idev] --
1,209,202 UART: [ldev] ++
1,209,370 UART: [ldev] CDI.KEYID = 6
1,209,734 UART: [ldev] SUBJECT.KEYID = 5
1,210,161 UART: [ldev] AUTHORITY.KEYID = 7
1,210,624 UART: [ldev] FE.KEYID = 1
1,215,408 UART: [ldev] Erasing FE.KEYID = 1
1,241,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,546 UART: [ldev] --
1,281,064 UART: [fwproc] Wait for Commands...
1,281,767 UART: [fwproc] Recv command 0x46574c44
1,282,501 UART: Invalid Img size: 131073 bytes
1,283,525 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Unprovisioned
86,356 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
891,563 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,692 UART: [kat] ++
895,844 UART: [kat] sha1
900,168 UART: [kat] SHA2-256
902,108 UART: [kat] SHA2-384
904,839 UART: [kat] SHA2-512-ACC
906,740 UART: [kat] ECC-384
916,747 UART: [kat] HMAC-384Kdf
921,577 UART: [kat] LMS
1,169,889 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,476 UART: [fht] FHT @ 0x50003400
1,174,214 UART: [idev] ++
1,174,382 UART: [idev] CDI.KEYID = 6
1,174,743 UART: [idev] SUBJECT.KEYID = 7
1,175,168 UART: [idev] UDS.KEYID = 0
1,183,370 UART: [idev] Erasing UDS.KEYID = 0
1,200,514 UART: [idev] Sha1 KeyId Algorithm
1,209,322 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,813 UART: [ldev] SUBJECT.KEYID = 5
1,211,240 UART: [ldev] AUTHORITY.KEYID = 7
1,211,703 UART: [ldev] FE.KEYID = 1
1,217,145 UART: [ldev] Erasing FE.KEYID = 1
1,243,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,073 UART: [ldev] --
1,283,457 UART: [fwproc] Wait for Commands...
1,284,040 UART: [fwproc] Recv command 0x46574c44
1,284,774 UART: Invalid Img size: 131073 bytes
1,285,894 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,239 UART: [state] WD Timer not started. Device not locked for debugging
87,422 UART: [kat] SHA2-256
890,972 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,101 UART: [kat] ++
895,253 UART: [kat] sha1
899,539 UART: [kat] SHA2-256
901,479 UART: [kat] SHA2-384
904,238 UART: [kat] SHA2-512-ACC
906,139 UART: [kat] ECC-384
916,032 UART: [kat] HMAC-384Kdf
920,568 UART: [kat] LMS
1,168,880 UART: [kat] --
1,169,837 UART: [cold-reset] ++
1,170,369 UART: [fht] FHT @ 0x50003400
1,173,109 UART: [idev] ++
1,173,277 UART: [idev] CDI.KEYID = 6
1,173,638 UART: [idev] SUBJECT.KEYID = 7
1,174,063 UART: [idev] UDS.KEYID = 0
1,182,087 UART: [idev] Erasing UDS.KEYID = 0
1,198,793 UART: [idev] Sha1 KeyId Algorithm
1,207,521 UART: [idev] --
1,208,706 UART: [ldev] ++
1,208,874 UART: [ldev] CDI.KEYID = 6
1,209,238 UART: [ldev] SUBJECT.KEYID = 5
1,209,665 UART: [ldev] AUTHORITY.KEYID = 7
1,210,128 UART: [ldev] FE.KEYID = 1
1,215,330 UART: [ldev] Erasing FE.KEYID = 1
1,241,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,662 UART: [ldev] --
1,281,138 UART: [fwproc] Wait for Commands...
1,281,759 UART: [fwproc] Recv command 0x46574c44
1,282,493 UART: Invalid Img size: 131073 bytes
1,283,499 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,764 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
891,477 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,606 UART: [kat] ++
895,758 UART: [kat] sha1
899,782 UART: [kat] SHA2-256
901,722 UART: [kat] SHA2-384
904,597 UART: [kat] SHA2-512-ACC
906,498 UART: [kat] ECC-384
916,505 UART: [kat] HMAC-384Kdf
921,257 UART: [kat] LMS
1,169,569 UART: [kat] --
1,170,318 UART: [cold-reset] ++
1,170,754 UART: [fht] FHT @ 0x50003400
1,173,310 UART: [idev] ++
1,173,478 UART: [idev] CDI.KEYID = 6
1,173,839 UART: [idev] SUBJECT.KEYID = 7
1,174,264 UART: [idev] UDS.KEYID = 0
1,182,314 UART: [idev] Erasing UDS.KEYID = 0
1,199,330 UART: [idev] Sha1 KeyId Algorithm
1,208,300 UART: [idev] --
1,209,201 UART: [ldev] ++
1,209,369 UART: [ldev] CDI.KEYID = 6
1,209,733 UART: [ldev] SUBJECT.KEYID = 5
1,210,160 UART: [ldev] AUTHORITY.KEYID = 7
1,210,623 UART: [ldev] FE.KEYID = 1
1,216,001 UART: [ldev] Erasing FE.KEYID = 1
1,242,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,621 UART: [ldev] --
1,282,079 UART: [fwproc] Wait for Commands...
1,282,792 UART: [fwproc] Recv command 0x46574c44
1,283,526 UART: Invalid Img size: 131073 bytes
1,284,658 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,514 UART: [state] LifecycleState = Unprovisioned
86,169 UART: [state] DebugLocked = No
86,671 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
891,458 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,587 UART: [kat] ++
895,739 UART: [kat] sha1
899,795 UART: [kat] SHA2-256
901,735 UART: [kat] SHA2-384
904,620 UART: [kat] SHA2-512-ACC
906,521 UART: [kat] ECC-384
916,132 UART: [kat] HMAC-384Kdf
920,538 UART: [kat] LMS
1,168,850 UART: [kat] --
1,169,723 UART: [cold-reset] ++
1,170,295 UART: [fht] FHT @ 0x50003400
1,173,115 UART: [idev] ++
1,173,283 UART: [idev] CDI.KEYID = 6
1,173,644 UART: [idev] SUBJECT.KEYID = 7
1,174,069 UART: [idev] UDS.KEYID = 0
1,182,183 UART: [idev] Erasing UDS.KEYID = 0
1,199,109 UART: [idev] Sha1 KeyId Algorithm
1,208,173 UART: [idev] --
1,209,216 UART: [ldev] ++
1,209,384 UART: [ldev] CDI.KEYID = 6
1,209,748 UART: [ldev] SUBJECT.KEYID = 5
1,210,175 UART: [ldev] AUTHORITY.KEYID = 7
1,210,638 UART: [ldev] FE.KEYID = 1
1,215,570 UART: [ldev] Erasing FE.KEYID = 1
1,241,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,368 UART: [ldev] --
1,280,774 UART: [fwproc] Wait for Commands...
1,281,371 UART: [fwproc] Recv command 0x46574c44
1,282,104 UART: [fwproc] Recv'd Img size: 106848 bytes
3,032,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,060,888 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,078,971 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,214,715 >>> mbox cmd response: success
3,215,858 UART: [afmc] ++
3,216,026 UART: [afmc] CDI.KEYID = 6
3,216,389 UART: [afmc] SUBJECT.KEYID = 7
3,216,815 UART: [afmc] AUTHORITY.KEYID = 5
3,252,317 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,268,753 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,269,504 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,275,181 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,281,074 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,286,784 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,294,622 UART: [afmc] --
3,295,678 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,295,700 UART: [cold-reset] --
3,296,700 UART: [state] Locking Datavault
3,297,801 UART: [state] Locking PCR0, PCR1 and PCR31
3,298,405 UART: [state] Locking ICCM
3,298,905 UART: [exit] Launching FMC @ 0x40000000
3,304,202 UART:
3,304,218 UART: Running Caliptra FMC ...
3,304,626 UART:
3,304,764 UART: [fmc] Received command: 0x10000002
3,306,508 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
3,069,965 >>> mbox cmd response: success
3,126,047 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,132,558 UART:
3,132,574 UART: Running Caliptra FMC ...
3,132,982 UART:
3,133,120 UART: [fmc] Received command: 0x10000002
3,134,864 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
899,946 UART: [kat] SHA2-256
901,886 UART: [kat] SHA2-384
904,725 UART: [kat] SHA2-512-ACC
906,626 UART: [kat] ECC-384
916,049 UART: [kat] HMAC-384Kdf
920,527 UART: [kat] LMS
1,168,839 UART: [kat] --
1,169,702 UART: [cold-reset] ++
1,170,122 UART: [fht] FHT @ 0x50003400
1,172,702 UART: [idev] ++
1,172,870 UART: [idev] CDI.KEYID = 6
1,173,231 UART: [idev] SUBJECT.KEYID = 7
1,173,656 UART: [idev] UDS.KEYID = 0
1,182,068 UART: [idev] Erasing UDS.KEYID = 0
1,199,512 UART: [idev] Sha1 KeyId Algorithm
1,208,300 UART: [idev] --
1,209,407 UART: [ldev] ++
1,209,575 UART: [ldev] CDI.KEYID = 6
1,209,939 UART: [ldev] SUBJECT.KEYID = 5
1,210,366 UART: [ldev] AUTHORITY.KEYID = 7
1,210,829 UART: [ldev] FE.KEYID = 1
1,215,973 UART: [ldev] Erasing FE.KEYID = 1
1,242,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,247 UART: [ldev] --
1,281,587 UART: [fwproc] Wait for Commands...
1,282,254 UART: [fwproc] Recv command 0x46574c44
1,282,987 UART: [fwproc] Recv'd Img size: 106848 bytes
3,044,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,072,172 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,090,255 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,226,161 >>> mbox cmd response: success
3,227,410 UART: [afmc] ++
3,227,578 UART: [afmc] CDI.KEYID = 6
3,227,941 UART: [afmc] SUBJECT.KEYID = 7
3,228,367 UART: [afmc] AUTHORITY.KEYID = 5
3,263,303 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,279,629 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,280,380 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,286,057 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,291,950 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,297,660 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,305,588 UART: [afmc] --
3,306,452 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,306,474 UART: [cold-reset] --
3,307,228 UART: [state] Locking Datavault
3,308,327 UART: [state] Locking PCR0, PCR1 and PCR31
3,308,931 UART: [state] Locking ICCM
3,309,439 UART: [exit] Launching FMC @ 0x40000000
3,314,736 UART:
3,314,752 UART: Running Caliptra FMC ...
3,315,160 UART:
3,315,298 UART: [fmc] Received command: 0x10000002
3,317,042 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
3,082,709 >>> mbox cmd response: success
3,139,215 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,145,512 UART:
3,145,528 UART: Running Caliptra FMC ...
3,145,936 UART:
3,146,074 UART: [fmc] Received command: 0x10000002
3,147,818 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,812 UART: [state] LifecycleState = Unprovisioned
85,467 UART: [state] DebugLocked = No
86,087 UART: [state] WD Timer not started. Device not locked for debugging
87,280 UART: [kat] SHA2-256
890,830 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,959 UART: [kat] ++
895,111 UART: [kat] sha1
899,505 UART: [kat] SHA2-256
901,445 UART: [kat] SHA2-384
904,200 UART: [kat] SHA2-512-ACC
906,101 UART: [kat] ECC-384
916,310 UART: [kat] HMAC-384Kdf
920,958 UART: [kat] LMS
1,169,270 UART: [kat] --
1,170,131 UART: [cold-reset] ++
1,170,567 UART: [fht] FHT @ 0x50003400
1,173,243 UART: [idev] ++
1,173,411 UART: [idev] CDI.KEYID = 6
1,173,772 UART: [idev] SUBJECT.KEYID = 7
1,174,197 UART: [idev] UDS.KEYID = 0
1,182,673 UART: [idev] Erasing UDS.KEYID = 0
1,199,149 UART: [idev] Sha1 KeyId Algorithm
1,208,009 UART: [idev] --
1,209,160 UART: [ldev] ++
1,209,328 UART: [ldev] CDI.KEYID = 6
1,209,692 UART: [ldev] SUBJECT.KEYID = 5
1,210,119 UART: [ldev] AUTHORITY.KEYID = 7
1,210,582 UART: [ldev] FE.KEYID = 1
1,215,730 UART: [ldev] Erasing FE.KEYID = 1
1,241,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,544 UART: [ldev] --
1,281,026 UART: [fwproc] Wait for Commands...
1,281,805 UART: [fwproc] Recv command 0x46574c44
1,282,538 UART: [fwproc] Recv'd Img size: 106848 bytes
3,044,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,072,211 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,090,294 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,226,074 >>> mbox cmd response: success
3,227,297 UART: [afmc] ++
3,227,465 UART: [afmc] CDI.KEYID = 6
3,227,828 UART: [afmc] SUBJECT.KEYID = 7
3,228,254 UART: [afmc] AUTHORITY.KEYID = 5
3,264,232 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,280,478 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,281,229 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,286,906 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,292,799 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,298,509 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,306,287 UART: [afmc] --
3,307,181 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,307,203 UART: [cold-reset] --
3,307,937 UART: [state] Locking Datavault
3,309,316 UART: [state] Locking PCR0, PCR1 and PCR31
3,309,920 UART: [state] Locking ICCM
3,310,426 UART: [exit] Launching FMC @ 0x40000000
3,315,723 UART:
3,315,739 UART: Running Caliptra FMC ...
3,316,147 UART:
3,316,285 UART: [fmc] Received command: 0x10000002
3,318,029 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
3,075,280 >>> mbox cmd response: success
3,131,110 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,137,435 UART:
3,137,451 UART: Running Caliptra FMC ...
3,137,859 UART:
3,137,997 UART: [fmc] Received command: 0x10000002
3,139,741 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [kat] SHA2-256
891,519 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,648 UART: [kat] ++
895,800 UART: [kat] sha1
899,934 UART: [kat] SHA2-256
901,874 UART: [kat] SHA2-384
904,683 UART: [kat] SHA2-512-ACC
906,584 UART: [kat] ECC-384
916,405 UART: [kat] HMAC-384Kdf
920,969 UART: [kat] LMS
1,169,281 UART: [kat] --
1,170,042 UART: [cold-reset] ++
1,170,468 UART: [fht] FHT @ 0x50003400
1,173,258 UART: [idev] ++
1,173,426 UART: [idev] CDI.KEYID = 6
1,173,787 UART: [idev] SUBJECT.KEYID = 7
1,174,212 UART: [idev] UDS.KEYID = 0
1,182,052 UART: [idev] Erasing UDS.KEYID = 0
1,199,540 UART: [idev] Sha1 KeyId Algorithm
1,208,582 UART: [idev] --
1,209,565 UART: [ldev] ++
1,209,733 UART: [ldev] CDI.KEYID = 6
1,210,097 UART: [ldev] SUBJECT.KEYID = 5
1,210,524 UART: [ldev] AUTHORITY.KEYID = 7
1,210,987 UART: [ldev] FE.KEYID = 1
1,216,079 UART: [ldev] Erasing FE.KEYID = 1
1,242,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,467 UART: [ldev] --
1,281,877 UART: [fwproc] Wait for Commands...
1,282,508 UART: [fwproc] Recv command 0x46574c44
1,283,241 UART: [fwproc] Recv'd Img size: 106848 bytes
3,029,699 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,058,371 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,076,454 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,212,394 >>> mbox cmd response: success
3,213,429 UART: [afmc] ++
3,213,597 UART: [afmc] CDI.KEYID = 6
3,213,960 UART: [afmc] SUBJECT.KEYID = 7
3,214,386 UART: [afmc] AUTHORITY.KEYID = 5
3,250,180 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,266,886 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,267,637 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,273,314 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,279,207 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,284,917 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,292,569 UART: [afmc] --
3,293,471 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,293,493 UART: [cold-reset] --
3,294,323 UART: [state] Locking Datavault
3,295,602 UART: [state] Locking PCR0, PCR1 and PCR31
3,296,206 UART: [state] Locking ICCM
3,296,834 UART: [exit] Launching FMC @ 0x40000000
3,302,131 UART:
3,302,147 UART: Running Caliptra FMC ...
3,302,555 UART:
3,302,693 UART: [fmc] Received command: 0x10000002
3,304,437 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
3,070,564 >>> mbox cmd response: success
3,126,908 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,133,033 UART:
3,133,049 UART: Running Caliptra FMC ...
3,133,457 UART:
3,133,595 UART: [fmc] Received command: 0x10000002
3,135,339 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
891,274 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,403 UART: [kat] ++
895,555 UART: [kat] sha1
899,973 UART: [kat] SHA2-256
901,913 UART: [kat] SHA2-384
904,626 UART: [kat] SHA2-512-ACC
906,527 UART: [kat] ECC-384
916,082 UART: [kat] HMAC-384Kdf
920,854 UART: [kat] LMS
1,169,166 UART: [kat] --
1,169,985 UART: [cold-reset] ++
1,170,343 UART: [fht] FHT @ 0x50003400
1,173,039 UART: [idev] ++
1,173,207 UART: [idev] CDI.KEYID = 6
1,173,568 UART: [idev] SUBJECT.KEYID = 7
1,173,993 UART: [idev] UDS.KEYID = 0
1,182,205 UART: [idev] Erasing UDS.KEYID = 0
1,199,013 UART: [idev] Sha1 KeyId Algorithm
1,207,923 UART: [idev] --
1,209,012 UART: [ldev] ++
1,209,180 UART: [ldev] CDI.KEYID = 6
1,209,544 UART: [ldev] SUBJECT.KEYID = 5
1,209,971 UART: [ldev] AUTHORITY.KEYID = 7
1,210,434 UART: [ldev] FE.KEYID = 1
1,215,914 UART: [ldev] Erasing FE.KEYID = 1
1,242,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,266 UART: [ldev] --
1,281,626 UART: [fwproc] Wait for Commands...
1,282,389 UART: [fwproc] Recv command 0x46574c44
1,283,122 UART: [fwproc] Recv'd Img size: 106848 bytes
3,040,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,068,213 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,086,296 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,222,244 >>> mbox cmd response: success
3,223,379 UART: [afmc] ++
3,223,547 UART: [afmc] CDI.KEYID = 6
3,223,910 UART: [afmc] SUBJECT.KEYID = 7
3,224,336 UART: [afmc] AUTHORITY.KEYID = 5
3,259,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,276,092 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,276,843 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,282,520 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,288,413 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,294,123 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,302,179 UART: [afmc] --
3,303,037 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,303,059 UART: [cold-reset] --
3,303,981 UART: [state] Locking Datavault
3,305,120 UART: [state] Locking PCR0, PCR1 and PCR31
3,305,724 UART: [state] Locking ICCM
3,306,362 UART: [exit] Launching FMC @ 0x40000000
3,311,659 UART:
3,311,675 UART: Running Caliptra FMC ...
3,312,083 UART:
3,312,221 UART: [fmc] Received command: 0x10000002
3,313,965 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
3,071,328 >>> mbox cmd response: success
3,126,972 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,132,993 UART:
3,133,009 UART: Running Caliptra FMC ...
3,133,417 UART:
3,133,555 UART: [fmc] Received command: 0x10000002
3,135,299 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
891,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,660 UART: [kat] ++
895,812 UART: [kat] sha1
900,038 UART: [kat] SHA2-256
901,978 UART: [kat] SHA2-384
904,965 UART: [kat] SHA2-512-ACC
906,866 UART: [kat] ECC-384
916,677 UART: [kat] HMAC-384Kdf
921,291 UART: [kat] LMS
1,169,603 UART: [kat] --
1,170,324 UART: [cold-reset] ++
1,170,678 UART: [fht] FHT @ 0x50003400
1,173,316 UART: [idev] ++
1,173,484 UART: [idev] CDI.KEYID = 6
1,173,845 UART: [idev] SUBJECT.KEYID = 7
1,174,270 UART: [idev] UDS.KEYID = 0
1,182,122 UART: [idev] Erasing UDS.KEYID = 0
1,198,780 UART: [idev] Sha1 KeyId Algorithm
1,207,700 UART: [idev] --
1,208,867 UART: [ldev] ++
1,209,035 UART: [ldev] CDI.KEYID = 6
1,209,399 UART: [ldev] SUBJECT.KEYID = 5
1,209,826 UART: [ldev] AUTHORITY.KEYID = 7
1,210,289 UART: [ldev] FE.KEYID = 1
1,215,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,099 UART: [ldev] --
1,282,479 UART: [fwproc] Wait for Commands...
1,283,234 UART: [fwproc] Recv command 0x46574c44
1,283,967 UART: [fwproc] Recv'd Img size: 106848 bytes
3,046,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,074,608 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,092,691 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,228,591 >>> mbox cmd response: success
3,229,776 UART: [afmc] ++
3,229,944 UART: [afmc] CDI.KEYID = 6
3,230,307 UART: [afmc] SUBJECT.KEYID = 7
3,230,733 UART: [afmc] AUTHORITY.KEYID = 5
3,266,577 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,283,311 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,284,062 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,289,739 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,295,632 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,301,342 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,309,142 UART: [afmc] --
3,310,232 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,310,254 UART: [cold-reset] --
3,311,056 UART: [state] Locking Datavault
3,312,061 UART: [state] Locking PCR0, PCR1 and PCR31
3,312,665 UART: [state] Locking ICCM
3,313,327 UART: [exit] Launching FMC @ 0x40000000
3,318,624 UART:
3,318,640 UART: Running Caliptra FMC ...
3,319,048 UART:
3,319,186 UART: [fmc] Received command: 0x10000002
3,320,930 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
3,064,404 >>> mbox cmd response: success
3,121,180 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,127,529 UART:
3,127,545 UART: Running Caliptra FMC ...
3,127,953 UART:
3,128,091 UART: [fmc] Received command: 0x10000002
3,129,835 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
891,292 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,421 UART: [kat] ++
895,573 UART: [kat] sha1
899,779 UART: [kat] SHA2-256
901,719 UART: [kat] SHA2-384
904,498 UART: [kat] SHA2-512-ACC
906,399 UART: [kat] ECC-384
916,036 UART: [kat] HMAC-384Kdf
920,646 UART: [kat] LMS
1,168,958 UART: [kat] --
1,169,961 UART: [cold-reset] ++
1,170,377 UART: [fht] FHT @ 0x50003400
1,173,073 UART: [idev] ++
1,173,241 UART: [idev] CDI.KEYID = 6
1,173,602 UART: [idev] SUBJECT.KEYID = 7
1,174,027 UART: [idev] UDS.KEYID = 0
1,181,809 UART: [idev] Erasing UDS.KEYID = 0
1,198,209 UART: [idev] Sha1 KeyId Algorithm
1,207,185 UART: [idev] --
1,208,268 UART: [ldev] ++
1,208,436 UART: [ldev] CDI.KEYID = 6
1,208,800 UART: [ldev] SUBJECT.KEYID = 5
1,209,227 UART: [ldev] AUTHORITY.KEYID = 7
1,209,690 UART: [ldev] FE.KEYID = 1
1,214,798 UART: [ldev] Erasing FE.KEYID = 1
1,241,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,592 UART: [ldev] --
1,280,950 UART: [fwproc] Wait for Commands...
1,281,549 UART: [fwproc] Recv command 0x46574c44
1,282,282 UART: [fwproc] Recv'd Img size: 111916 bytes
3,090,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,119,290 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,144,975 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,280,723 >>> mbox cmd response: success
3,281,842 UART: [afmc] ++
3,282,010 UART: [afmc] CDI.KEYID = 6
3,282,373 UART: [afmc] SUBJECT.KEYID = 7
3,282,799 UART: [afmc] AUTHORITY.KEYID = 5
3,318,120 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,334,338 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,335,089 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,340,783 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,346,683 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,352,392 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,360,258 UART: [afmc] --
3,361,294 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,361,316 UART: [cold-reset] --
3,362,228 UART: [state] Locking Datavault
3,363,541 UART: [state] Locking PCR0, PCR1 and PCR31
3,364,145 UART: [state] Locking ICCM
3,364,817 UART: [exit] Launching FMC @ 0x40000000
3,370,114 UART:
3,370,130 UART: Running Caliptra FMC ...
3,370,538 UART:
3,370,768 UART: [fmc] Received command: 0x10000000
3,372,937 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,121,484 >>> mbox cmd response: success
3,177,205 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,183,402 UART:
3,183,418 UART: Running Caliptra FMC ...
3,183,826 UART:
3,184,056 UART: [fmc] Received command: 0x10000000
3,186,225 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
891,327 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,456 UART: [kat] ++
895,608 UART: [kat] sha1
899,976 UART: [kat] SHA2-256
901,916 UART: [kat] SHA2-384
904,667 UART: [kat] SHA2-512-ACC
906,568 UART: [kat] ECC-384
916,049 UART: [kat] HMAC-384Kdf
920,699 UART: [kat] LMS
1,169,011 UART: [kat] --
1,169,750 UART: [cold-reset] ++
1,170,124 UART: [fht] FHT @ 0x50003400
1,172,640 UART: [idev] ++
1,172,808 UART: [idev] CDI.KEYID = 6
1,173,169 UART: [idev] SUBJECT.KEYID = 7
1,173,594 UART: [idev] UDS.KEYID = 0
1,181,576 UART: [idev] Erasing UDS.KEYID = 0
1,198,598 UART: [idev] Sha1 KeyId Algorithm
1,207,656 UART: [idev] --
1,208,671 UART: [ldev] ++
1,208,839 UART: [ldev] CDI.KEYID = 6
1,209,203 UART: [ldev] SUBJECT.KEYID = 5
1,209,630 UART: [ldev] AUTHORITY.KEYID = 7
1,210,093 UART: [ldev] FE.KEYID = 1
1,215,665 UART: [ldev] Erasing FE.KEYID = 1
1,242,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,075 UART: [ldev] --
1,282,581 UART: [fwproc] Wait for Commands...
1,283,314 UART: [fwproc] Recv command 0x46574c44
1,284,047 UART: [fwproc] Recv'd Img size: 111916 bytes
3,097,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,125,255 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,150,940 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,286,878 >>> mbox cmd response: success
3,288,093 UART: [afmc] ++
3,288,261 UART: [afmc] CDI.KEYID = 6
3,288,624 UART: [afmc] SUBJECT.KEYID = 7
3,289,050 UART: [afmc] AUTHORITY.KEYID = 5
3,324,757 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,341,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,341,936 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,347,630 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,353,530 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,359,239 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,367,111 UART: [afmc] --
3,368,097 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,368,119 UART: [cold-reset] --
3,368,747 UART: [state] Locking Datavault
3,369,798 UART: [state] Locking PCR0, PCR1 and PCR31
3,370,402 UART: [state] Locking ICCM
3,370,954 UART: [exit] Launching FMC @ 0x40000000
3,376,251 UART:
3,376,267 UART: Running Caliptra FMC ...
3,376,675 UART:
3,376,905 UART: [fmc] Received command: 0x10000000
3,379,074 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,131,312 >>> mbox cmd response: success
3,187,569 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,193,960 UART:
3,193,976 UART: Running Caliptra FMC ...
3,194,384 UART:
3,194,614 UART: [fmc] Received command: 0x10000000
3,196,783 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,115 UART: [state] WD Timer not started. Device not locked for debugging
87,242 UART: [kat] SHA2-256
890,792 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,921 UART: [kat] ++
895,073 UART: [kat] sha1
899,381 UART: [kat] SHA2-256
901,321 UART: [kat] SHA2-384
903,976 UART: [kat] SHA2-512-ACC
905,877 UART: [kat] ECC-384
915,140 UART: [kat] HMAC-384Kdf
919,656 UART: [kat] LMS
1,167,968 UART: [kat] --
1,168,949 UART: [cold-reset] ++
1,169,369 UART: [fht] FHT @ 0x50003400
1,171,869 UART: [idev] ++
1,172,037 UART: [idev] CDI.KEYID = 6
1,172,398 UART: [idev] SUBJECT.KEYID = 7
1,172,823 UART: [idev] UDS.KEYID = 0
1,180,703 UART: [idev] Erasing UDS.KEYID = 0
1,197,609 UART: [idev] Sha1 KeyId Algorithm
1,206,673 UART: [idev] --
1,207,864 UART: [ldev] ++
1,208,032 UART: [ldev] CDI.KEYID = 6
1,208,396 UART: [ldev] SUBJECT.KEYID = 5
1,208,823 UART: [ldev] AUTHORITY.KEYID = 7
1,209,286 UART: [ldev] FE.KEYID = 1
1,214,446 UART: [ldev] Erasing FE.KEYID = 1
1,241,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,328 UART: [ldev] --
1,279,820 UART: [fwproc] Wait for Commands...
1,280,563 UART: [fwproc] Recv command 0x46574c44
1,281,296 UART: [fwproc] Recv'd Img size: 111916 bytes
3,089,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,117,726 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,143,411 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,279,135 >>> mbox cmd response: success
3,280,312 UART: [afmc] ++
3,280,480 UART: [afmc] CDI.KEYID = 6
3,280,843 UART: [afmc] SUBJECT.KEYID = 7
3,281,269 UART: [afmc] AUTHORITY.KEYID = 5
3,317,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,333,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,334,277 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,339,971 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,345,871 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,351,580 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,359,316 UART: [afmc] --
3,360,354 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,360,376 UART: [cold-reset] --
3,361,148 UART: [state] Locking Datavault
3,362,183 UART: [state] Locking PCR0, PCR1 and PCR31
3,362,787 UART: [state] Locking ICCM
3,363,371 UART: [exit] Launching FMC @ 0x40000000
3,368,668 UART:
3,368,684 UART: Running Caliptra FMC ...
3,369,092 UART:
3,369,322 UART: [fmc] Received command: 0x10000000
3,371,491 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,142,046 >>> mbox cmd response: success
3,197,945 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,203,988 UART:
3,204,004 UART: Running Caliptra FMC ...
3,204,412 UART:
3,204,642 UART: [fmc] Received command: 0x10000000
3,206,811 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,711 UART: [state] LifecycleState = Unprovisioned
86,366 UART: [state] DebugLocked = No
87,054 UART: [state] WD Timer not started. Device not locked for debugging
88,225 UART: [kat] SHA2-256
891,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,904 UART: [kat] ++
896,056 UART: [kat] sha1
900,402 UART: [kat] SHA2-256
902,342 UART: [kat] SHA2-384
905,159 UART: [kat] SHA2-512-ACC
907,060 UART: [kat] ECC-384
916,695 UART: [kat] HMAC-384Kdf
921,481 UART: [kat] LMS
1,169,793 UART: [kat] --
1,170,794 UART: [cold-reset] ++
1,171,360 UART: [fht] FHT @ 0x50003400
1,174,124 UART: [idev] ++
1,174,292 UART: [idev] CDI.KEYID = 6
1,174,653 UART: [idev] SUBJECT.KEYID = 7
1,175,078 UART: [idev] UDS.KEYID = 0
1,182,914 UART: [idev] Erasing UDS.KEYID = 0
1,199,664 UART: [idev] Sha1 KeyId Algorithm
1,208,462 UART: [idev] --
1,209,453 UART: [ldev] ++
1,209,621 UART: [ldev] CDI.KEYID = 6
1,209,985 UART: [ldev] SUBJECT.KEYID = 5
1,210,412 UART: [ldev] AUTHORITY.KEYID = 7
1,210,875 UART: [ldev] FE.KEYID = 1
1,215,999 UART: [ldev] Erasing FE.KEYID = 1
1,242,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,431 UART: [ldev] --
1,281,901 UART: [fwproc] Wait for Commands...
1,282,512 UART: [fwproc] Recv command 0x46574c44
1,283,245 UART: [fwproc] Recv'd Img size: 111916 bytes
3,098,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,127,676 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,153,361 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,289,197 >>> mbox cmd response: success
3,290,298 UART: [afmc] ++
3,290,466 UART: [afmc] CDI.KEYID = 6
3,290,829 UART: [afmc] SUBJECT.KEYID = 7
3,291,255 UART: [afmc] AUTHORITY.KEYID = 5
3,327,444 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,344,058 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,344,809 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,350,503 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,356,403 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,362,112 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,369,932 UART: [afmc] --
3,370,946 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,370,968 UART: [cold-reset] --
3,371,856 UART: [state] Locking Datavault
3,373,317 UART: [state] Locking PCR0, PCR1 and PCR31
3,373,921 UART: [state] Locking ICCM
3,374,457 UART: [exit] Launching FMC @ 0x40000000
3,379,754 UART:
3,379,770 UART: Running Caliptra FMC ...
3,380,178 UART:
3,380,408 UART: [fmc] Received command: 0x10000000
3,382,577 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,130,496 >>> mbox cmd response: success
3,186,837 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,193,204 UART:
3,193,220 UART: Running Caliptra FMC ...
3,193,628 UART:
3,193,858 UART: [fmc] Received command: 0x10000000
3,196,027 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [kat] SHA2-256
891,342 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,471 UART: [kat] ++
895,623 UART: [kat] sha1
899,815 UART: [kat] SHA2-256
901,755 UART: [kat] SHA2-384
904,568 UART: [kat] SHA2-512-ACC
906,469 UART: [kat] ECC-384
916,190 UART: [kat] HMAC-384Kdf
920,950 UART: [kat] LMS
1,169,262 UART: [kat] --
1,170,051 UART: [cold-reset] ++
1,170,487 UART: [fht] FHT @ 0x50003400
1,173,145 UART: [idev] ++
1,173,313 UART: [idev] CDI.KEYID = 6
1,173,674 UART: [idev] SUBJECT.KEYID = 7
1,174,099 UART: [idev] UDS.KEYID = 0
1,181,903 UART: [idev] Erasing UDS.KEYID = 0
1,198,491 UART: [idev] Sha1 KeyId Algorithm
1,207,309 UART: [idev] --
1,208,270 UART: [ldev] ++
1,208,438 UART: [ldev] CDI.KEYID = 6
1,208,802 UART: [ldev] SUBJECT.KEYID = 5
1,209,229 UART: [ldev] AUTHORITY.KEYID = 7
1,209,692 UART: [ldev] FE.KEYID = 1
1,215,164 UART: [ldev] Erasing FE.KEYID = 1
1,241,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,874 UART: [ldev] --
1,281,198 UART: [fwproc] Wait for Commands...
1,281,943 UART: [fwproc] Recv command 0x46574c44
1,282,676 UART: [fwproc] Recv'd Img size: 111916 bytes
3,095,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,124,120 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,149,805 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,285,665 >>> mbox cmd response: success
3,286,888 UART: [afmc] ++
3,287,056 UART: [afmc] CDI.KEYID = 6
3,287,419 UART: [afmc] SUBJECT.KEYID = 7
3,287,845 UART: [afmc] AUTHORITY.KEYID = 5
3,323,122 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,339,766 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,340,517 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,346,211 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,352,111 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,357,820 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,365,700 UART: [afmc] --
3,366,798 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,366,820 UART: [cold-reset] --
3,367,704 UART: [state] Locking Datavault
3,368,815 UART: [state] Locking PCR0, PCR1 and PCR31
3,369,419 UART: [state] Locking ICCM
3,370,067 UART: [exit] Launching FMC @ 0x40000000
3,375,364 UART:
3,375,380 UART: Running Caliptra FMC ...
3,375,788 UART:
3,376,018 UART: [fmc] Received command: 0x10000000
3,378,187 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,136,947 >>> mbox cmd response: success
3,192,872 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,199,119 UART:
3,199,135 UART: Running Caliptra FMC ...
3,199,543 UART:
3,199,773 UART: [fmc] Received command: 0x10000000
3,201,942 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
891,549 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,678 UART: [kat] ++
895,830 UART: [kat] sha1
900,210 UART: [kat] SHA2-256
902,150 UART: [kat] SHA2-384
904,881 UART: [kat] SHA2-512-ACC
906,782 UART: [kat] ECC-384
916,639 UART: [kat] HMAC-384Kdf
921,189 UART: [kat] LMS
1,169,501 UART: [kat] --
1,170,208 UART: [cold-reset] ++
1,170,570 UART: [fht] FHT @ 0x50003400
1,173,282 UART: [idev] ++
1,173,450 UART: [idev] CDI.KEYID = 6
1,173,811 UART: [idev] SUBJECT.KEYID = 7
1,174,236 UART: [idev] UDS.KEYID = 0
1,182,304 UART: [idev] Erasing UDS.KEYID = 0
1,199,552 UART: [idev] Sha1 KeyId Algorithm
1,208,544 UART: [idev] --
1,209,547 UART: [ldev] ++
1,209,715 UART: [ldev] CDI.KEYID = 6
1,210,079 UART: [ldev] SUBJECT.KEYID = 5
1,210,506 UART: [ldev] AUTHORITY.KEYID = 7
1,210,969 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,243,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,329 UART: [ldev] --
1,282,657 UART: [fwproc] Wait for Commands...
1,283,392 UART: [fwproc] Recv command 0x46574c44
1,284,125 UART: [fwproc] Recv'd Img size: 111916 bytes
3,098,881 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,126,763 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,152,448 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,288,344 >>> mbox cmd response: success
3,289,425 UART: [afmc] ++
3,289,593 UART: [afmc] CDI.KEYID = 6
3,289,956 UART: [afmc] SUBJECT.KEYID = 7
3,290,382 UART: [afmc] AUTHORITY.KEYID = 5
3,325,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,341,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,342,580 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,348,274 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,354,174 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,359,883 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,367,619 UART: [afmc] --
3,368,729 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,368,751 UART: [cold-reset] --
3,369,681 UART: [state] Locking Datavault
3,370,692 UART: [state] Locking PCR0, PCR1 and PCR31
3,371,296 UART: [state] Locking ICCM
3,371,790 UART: [exit] Launching FMC @ 0x40000000
3,377,087 UART:
3,377,103 UART: Running Caliptra FMC ...
3,377,511 UART:
3,377,741 UART: [fmc] Received command: 0x10000000
3,379,910 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,121,420 >>> mbox cmd response: success
3,178,001 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,183,960 UART:
3,183,976 UART: Running Caliptra FMC ...
3,184,384 UART:
3,184,614 UART: [fmc] Received command: 0x10000000
3,186,783 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,633 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
891,358 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,487 UART: [kat] ++
895,639 UART: [kat] sha1
899,681 UART: [kat] SHA2-256
901,621 UART: [kat] SHA2-384
904,226 UART: [kat] SHA2-512-ACC
906,127 UART: [kat] ECC-384
915,952 UART: [kat] HMAC-384Kdf
920,724 UART: [kat] LMS
1,169,036 UART: [kat] --
1,169,929 UART: [cold-reset] ++
1,170,361 UART: [fht] FHT @ 0x50003400
1,172,931 UART: [idev] ++
1,173,099 UART: [idev] CDI.KEYID = 6
1,173,460 UART: [idev] SUBJECT.KEYID = 7
1,173,885 UART: [idev] UDS.KEYID = 0
1,181,699 UART: [idev] Erasing UDS.KEYID = 0
1,199,163 UART: [idev] Sha1 KeyId Algorithm
1,208,161 UART: [idev] --
1,209,188 UART: [ldev] ++
1,209,356 UART: [ldev] CDI.KEYID = 6
1,209,720 UART: [ldev] SUBJECT.KEYID = 5
1,210,147 UART: [ldev] AUTHORITY.KEYID = 7
1,210,610 UART: [ldev] FE.KEYID = 1
1,215,836 UART: [ldev] Erasing FE.KEYID = 1
1,242,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,224 UART: [ldev] --
1,281,544 UART: [fwproc] Wait for Commands...
1,282,329 UART: [fwproc] Recv command 0x46574c44
1,283,062 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,578,849 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,534 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,406 >>> mbox cmd response: success
2,741,501 UART: [afmc] ++
2,741,669 UART: [afmc] CDI.KEYID = 6
2,742,032 UART: [afmc] SUBJECT.KEYID = 7
2,742,458 UART: [afmc] AUTHORITY.KEYID = 5
2,778,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,886 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,637 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,801,357 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,807,249 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,812,943 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,820,862 UART: [afmc] --
2,821,752 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,821,774 UART: [cold-reset] --
2,822,598 UART: [state] Locking Datavault
2,823,767 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,371 UART: [state] Locking ICCM
2,824,885 UART: [exit] Launching FMC @ 0x40000000
2,830,182 UART:
2,830,198 UART: Running Caliptra FMC ...
2,830,606 UART:
2,830,836 UART: [fmc] Received command: 0x10000000
2,833,005 >>> mbox cmd response data (224 bytes)
2,833,006 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,833,035 UART: [fmc] Received command: 0x10000006
2,851,052 >>> mbox cmd response data (1536 bytes)
2,851,053 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,851,081 UART: [fmc] Received command: 0x46574C44
2,851,907 UART:
2,851,923 UART: Running Caliptra ROM ...
2,852,331 UART:
2,852,386 UART: [state] CFI Enabled
2,855,074 UART: [state] LifecycleState = Unprovisioned
2,855,729 UART: [state] DebugLocked = No
2,856,269 UART: [state] WD Timer not started. Device not locked for debugging
2,857,609 UART: [kat] SHA2-256
3,661,159 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,288 UART: [kat] ++
3,665,440 UART: [kat] sha1
3,669,784 UART: [kat] SHA2-256
3,671,724 UART: [kat] SHA2-384
3,674,635 UART: [kat] SHA2-512-ACC
3,676,535 UART: [kat] ECC-384
3,685,910 UART: [kat] HMAC-384Kdf
3,690,374 UART: [kat] LMS
3,938,686 UART: [kat] --
3,939,342 UART: [update-reset] ++
5,222,378 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,223,555 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,371,567 >>> mbox cmd response: success
5,371,808 UART: [update-reset] Copying MAN_2 To MAN_1
5,379,822 UART: [update-reset Success] --
5,380,231 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,380,759 UART: [state] Locking Datavault
5,381,597 UART: [state] Locking PCR0, PCR1 and PCR31
5,382,201 UART: [state] Locking ICCM
5,382,625 UART: [exit] Launching FMC @ 0x40000000
5,387,922 UART:
5,387,938 UART: Running Caliptra FMC ...
5,388,346 UART:
5,388,568 UART: [fmc] Received command: 0x10000000
5,390,737 >>> mbox cmd response data (224 bytes)
5,390,738 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,390,767 UART: [fmc] Received command: 0x10000006
5,408,784 >>> mbox cmd response data (1536 bytes)
5,408,785 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,408,813 UART: [fmc] Received command: 0x10000007
5,409,605 >>> mbox cmd response data (4 bytes)
5,409,606 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,409,634 UART: [fmc] Received command: 0x10000006
5,427,651 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,326 >>> mbox cmd response: success
2,645,402 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,651,571 UART:
2,651,587 UART: Running Caliptra FMC ...
2,651,995 UART:
2,652,225 UART: [fmc] Received command: 0x10000000
2,654,394 >>> mbox cmd response data (224 bytes)
2,654,395 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,654,424 UART: [fmc] Received command: 0x10000006
2,672,441 >>> mbox cmd response data (1536 bytes)
2,672,442 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,672,470 UART: [fmc] Received command: 0x46574C44
5,075,655 >>> mbox cmd response: success
5,083,285 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,089,111 UART:
5,089,127 UART: Running Caliptra FMC ...
5,089,535 UART:
5,089,757 UART: [fmc] Received command: 0x10000000
5,091,926 >>> mbox cmd response data (224 bytes)
5,091,927 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,091,956 UART: [fmc] Received command: 0x10000006
5,109,973 >>> mbox cmd response data (1536 bytes)
5,109,974 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,110,002 UART: [fmc] Received command: 0x10000007
5,110,794 >>> mbox cmd response data (4 bytes)
5,110,795 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,110,823 UART: [fmc] Received command: 0x10000006
5,128,840 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
891,471 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,600 UART: [kat] ++
895,752 UART: [kat] sha1
899,834 UART: [kat] SHA2-256
901,774 UART: [kat] SHA2-384
904,351 UART: [kat] SHA2-512-ACC
906,252 UART: [kat] ECC-384
915,965 UART: [kat] HMAC-384Kdf
920,601 UART: [kat] LMS
1,168,913 UART: [kat] --
1,169,558 UART: [cold-reset] ++
1,170,132 UART: [fht] FHT @ 0x50003400
1,172,596 UART: [idev] ++
1,172,764 UART: [idev] CDI.KEYID = 6
1,173,125 UART: [idev] SUBJECT.KEYID = 7
1,173,550 UART: [idev] UDS.KEYID = 0
1,181,596 UART: [idev] Erasing UDS.KEYID = 0
1,198,940 UART: [idev] Sha1 KeyId Algorithm
1,207,692 UART: [idev] --
1,208,879 UART: [ldev] ++
1,209,047 UART: [ldev] CDI.KEYID = 6
1,209,411 UART: [ldev] SUBJECT.KEYID = 5
1,209,838 UART: [ldev] AUTHORITY.KEYID = 7
1,210,301 UART: [ldev] FE.KEYID = 1
1,215,353 UART: [ldev] Erasing FE.KEYID = 1
1,242,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,849 UART: [ldev] --
1,281,141 UART: [fwproc] Wait for Commands...
1,281,840 UART: [fwproc] Recv command 0x46574c44
1,282,573 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,115 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,578,257 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,942 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,739,678 >>> mbox cmd response: success
2,740,739 UART: [afmc] ++
2,740,907 UART: [afmc] CDI.KEYID = 6
2,741,270 UART: [afmc] SUBJECT.KEYID = 7
2,741,696 UART: [afmc] AUTHORITY.KEYID = 5
2,777,796 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,968 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,719 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,800,439 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,806,331 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,812,025 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,819,824 UART: [afmc] --
2,820,738 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,820,760 UART: [cold-reset] --
2,821,814 UART: [state] Locking Datavault
2,823,123 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,727 UART: [state] Locking ICCM
2,824,377 UART: [exit] Launching FMC @ 0x40000000
2,829,674 UART:
2,829,690 UART: Running Caliptra FMC ...
2,830,098 UART:
2,830,328 UART: [fmc] Received command: 0x10000000
2,832,497 >>> mbox cmd response data (224 bytes)
2,832,498 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,832,527 UART: [fmc] Received command: 0x10000006
2,850,544 >>> mbox cmd response data (1536 bytes)
2,850,545 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,850,573 UART: [fmc] Received command: 0x46574C44
2,851,399 UART:
2,851,415 UART: Running Caliptra ROM ...
2,851,823 UART:
2,851,965 UART: [state] CFI Enabled
2,854,475 UART: [state] LifecycleState = Unprovisioned
2,855,130 UART: [state] DebugLocked = No
2,855,774 UART: [state] WD Timer not started. Device not locked for debugging
2,857,040 UART: [kat] SHA2-256
3,660,590 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,664,719 UART: [kat] ++
3,664,871 UART: [kat] sha1
3,668,991 UART: [kat] SHA2-256
3,670,931 UART: [kat] SHA2-384
3,673,814 UART: [kat] SHA2-512-ACC
3,675,714 UART: [kat] ECC-384
3,685,459 UART: [kat] HMAC-384Kdf
3,690,197 UART: [kat] LMS
3,938,509 UART: [kat] --
3,939,243 UART: [update-reset] ++
5,223,098 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,224,167 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,372,179 >>> mbox cmd response: success
5,372,336 UART: [update-reset] Copying MAN_2 To MAN_1
5,380,350 UART: [update-reset Success] --
5,380,759 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,381,309 UART: [state] Locking Datavault
5,382,181 UART: [state] Locking PCR0, PCR1 and PCR31
5,382,785 UART: [state] Locking ICCM
5,383,223 UART: [exit] Launching FMC @ 0x40000000
5,388,520 UART:
5,388,536 UART: Running Caliptra FMC ...
5,388,944 UART:
5,389,166 UART: [fmc] Received command: 0x10000000
5,391,335 >>> mbox cmd response data (224 bytes)
5,391,336 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,391,365 UART: [fmc] Received command: 0x10000006
5,409,382 >>> mbox cmd response data (1536 bytes)
5,409,383 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,409,411 UART: [fmc] Received command: 0x10000007
5,410,203 >>> mbox cmd response data (4 bytes)
5,410,204 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,410,232 UART: [fmc] Received command: 0x10000006
5,428,249 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,225 >>> mbox cmd response: success
2,645,637 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,651,636 UART:
2,651,652 UART: Running Caliptra FMC ...
2,652,060 UART:
2,652,290 UART: [fmc] Received command: 0x10000000
2,654,459 >>> mbox cmd response data (224 bytes)
2,654,460 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,654,489 UART: [fmc] Received command: 0x10000006
2,672,506 >>> mbox cmd response data (1536 bytes)
2,672,507 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,672,535 UART: [fmc] Received command: 0x46574C44
5,074,999 >>> mbox cmd response: success
5,082,619 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,087,987 UART:
5,088,003 UART: Running Caliptra FMC ...
5,088,411 UART:
5,088,633 UART: [fmc] Received command: 0x10000000
5,090,802 >>> mbox cmd response data (224 bytes)
5,090,803 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,090,832 UART: [fmc] Received command: 0x10000006
5,108,849 >>> mbox cmd response data (1536 bytes)
5,108,850 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,108,878 UART: [fmc] Received command: 0x10000007
5,109,670 >>> mbox cmd response data (4 bytes)
5,109,671 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,109,699 UART: [fmc] Received command: 0x10000006
5,127,716 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,406 UART: [kat] SHA2-256
890,956 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,085 UART: [kat] ++
895,237 UART: [kat] sha1
899,551 UART: [kat] SHA2-256
901,491 UART: [kat] SHA2-384
904,408 UART: [kat] SHA2-512-ACC
906,309 UART: [kat] ECC-384
916,054 UART: [kat] HMAC-384Kdf
920,682 UART: [kat] LMS
1,168,994 UART: [kat] --
1,169,843 UART: [cold-reset] ++
1,170,339 UART: [fht] FHT @ 0x50003400
1,173,183 UART: [idev] ++
1,173,351 UART: [idev] CDI.KEYID = 6
1,173,712 UART: [idev] SUBJECT.KEYID = 7
1,174,137 UART: [idev] UDS.KEYID = 0
1,182,515 UART: [idev] Erasing UDS.KEYID = 0
1,199,679 UART: [idev] Sha1 KeyId Algorithm
1,208,639 UART: [idev] --
1,209,652 UART: [ldev] ++
1,209,820 UART: [ldev] CDI.KEYID = 6
1,210,184 UART: [ldev] SUBJECT.KEYID = 5
1,210,611 UART: [ldev] AUTHORITY.KEYID = 7
1,211,074 UART: [ldev] FE.KEYID = 1
1,216,650 UART: [ldev] Erasing FE.KEYID = 1
1,243,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,226 UART: [ldev] --
1,282,616 UART: [fwproc] Wait for Commands...
1,283,397 UART: [fwproc] Recv command 0x46574c44
1,284,130 UART: [fwproc] Recv'd Img size: 111916 bytes
2,554,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,581,177 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,862 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,742,580 >>> mbox cmd response: success
2,743,657 UART: [afmc] ++
2,743,825 UART: [afmc] CDI.KEYID = 6
2,744,188 UART: [afmc] SUBJECT.KEYID = 7
2,744,614 UART: [afmc] AUTHORITY.KEYID = 5
2,779,926 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,947 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,802,667 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,808,559 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,814,253 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,821,992 UART: [afmc] --
2,822,880 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,822,902 UART: [cold-reset] --
2,823,674 UART: [state] Locking Datavault
2,824,733 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,337 UART: [state] Locking ICCM
2,825,903 UART: [exit] Launching FMC @ 0x40000000
2,831,200 UART:
2,831,216 UART: Running Caliptra FMC ...
2,831,624 UART:
2,831,854 UART: [fmc] Received command: 0x10000000
2,834,023 >>> mbox cmd response data (224 bytes)
2,834,024 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,834,053 UART: [fmc] Received command: 0x10000006
2,852,070 >>> mbox cmd response data (1536 bytes)
2,852,071 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,852,099 UART: [fmc] Received command: 0x46574C44
2,852,925 UART:
2,852,941 UART: Running Caliptra ROM ...
2,853,349 UART:
2,853,404 UART: [state] CFI Enabled
2,855,636 UART: [state] LifecycleState = Unprovisioned
2,856,291 UART: [state] DebugLocked = No
2,856,971 UART: [state] WD Timer not started. Device not locked for debugging
2,858,153 UART: [kat] SHA2-256
3,661,703 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,832 UART: [kat] ++
3,665,984 UART: [kat] sha1
3,670,154 UART: [kat] SHA2-256
3,672,094 UART: [kat] SHA2-384
3,674,819 UART: [kat] SHA2-512-ACC
3,676,719 UART: [kat] ECC-384
3,686,262 UART: [kat] HMAC-384Kdf
3,690,786 UART: [kat] LMS
3,939,098 UART: [kat] --
3,940,014 UART: [update-reset] ++
5,223,590 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,224,559 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,372,571 >>> mbox cmd response: success
5,372,918 UART: [update-reset] Copying MAN_2 To MAN_1
5,380,932 UART: [update-reset Success] --
5,381,341 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,381,845 UART: [state] Locking Datavault
5,382,651 UART: [state] Locking PCR0, PCR1 and PCR31
5,383,255 UART: [state] Locking ICCM
5,383,719 UART: [exit] Launching FMC @ 0x40000000
5,389,016 UART:
5,389,032 UART: Running Caliptra FMC ...
5,389,440 UART:
5,389,662 UART: [fmc] Received command: 0x10000000
5,391,831 >>> mbox cmd response data (224 bytes)
5,391,832 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,391,861 UART: [fmc] Received command: 0x10000006
5,409,878 >>> mbox cmd response data (1536 bytes)
5,409,879 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,409,907 UART: [fmc] Received command: 0x10000007
5,410,699 >>> mbox cmd response data (4 bytes)
5,410,700 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,410,728 UART: [fmc] Received command: 0x10000006
5,428,745 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,940 >>> mbox cmd response: success
2,646,034 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,652,447 UART:
2,652,463 UART: Running Caliptra FMC ...
2,652,871 UART:
2,653,101 UART: [fmc] Received command: 0x10000000
2,655,270 >>> mbox cmd response data (224 bytes)
2,655,271 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,655,300 UART: [fmc] Received command: 0x10000006
2,673,317 >>> mbox cmd response data (1536 bytes)
2,673,318 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,673,346 UART: [fmc] Received command: 0x46574C44
5,075,759 >>> mbox cmd response: success
5,083,309 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,089,185 UART:
5,089,201 UART: Running Caliptra FMC ...
5,089,609 UART:
5,089,831 UART: [fmc] Received command: 0x10000000
5,092,000 >>> mbox cmd response data (224 bytes)
5,092,001 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,092,030 UART: [fmc] Received command: 0x10000006
5,110,047 >>> mbox cmd response data (1536 bytes)
5,110,048 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,110,076 UART: [fmc] Received command: 0x10000007
5,110,868 >>> mbox cmd response data (4 bytes)
5,110,869 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,110,897 UART: [fmc] Received command: 0x10000006
5,128,914 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,984 UART: [state] WD Timer not started. Device not locked for debugging
88,327 UART: [kat] SHA2-256
891,877 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,006 UART: [kat] ++
896,158 UART: [kat] sha1
900,336 UART: [kat] SHA2-256
902,276 UART: [kat] SHA2-384
905,069 UART: [kat] SHA2-512-ACC
906,970 UART: [kat] ECC-384
916,785 UART: [kat] HMAC-384Kdf
921,459 UART: [kat] LMS
1,169,771 UART: [kat] --
1,170,890 UART: [cold-reset] ++
1,171,452 UART: [fht] FHT @ 0x50003400
1,174,120 UART: [idev] ++
1,174,288 UART: [idev] CDI.KEYID = 6
1,174,649 UART: [idev] SUBJECT.KEYID = 7
1,175,074 UART: [idev] UDS.KEYID = 0
1,183,350 UART: [idev] Erasing UDS.KEYID = 0
1,200,004 UART: [idev] Sha1 KeyId Algorithm
1,208,840 UART: [idev] --
1,210,085 UART: [ldev] ++
1,210,253 UART: [ldev] CDI.KEYID = 6
1,210,617 UART: [ldev] SUBJECT.KEYID = 5
1,211,044 UART: [ldev] AUTHORITY.KEYID = 7
1,211,507 UART: [ldev] FE.KEYID = 1
1,216,655 UART: [ldev] Erasing FE.KEYID = 1
1,242,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,793 UART: [ldev] --
1,282,095 UART: [fwproc] Wait for Commands...
1,282,686 UART: [fwproc] Recv command 0x46574c44
1,283,419 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,579,904 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,589 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,445 >>> mbox cmd response: success
2,742,596 UART: [afmc] ++
2,742,764 UART: [afmc] CDI.KEYID = 6
2,743,127 UART: [afmc] SUBJECT.KEYID = 7
2,743,553 UART: [afmc] AUTHORITY.KEYID = 5
2,779,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,045 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,796 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,802,516 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,808,408 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,814,102 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,821,923 UART: [afmc] --
2,822,935 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,822,957 UART: [cold-reset] --
2,823,907 UART: [state] Locking Datavault
2,825,016 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,620 UART: [state] Locking ICCM
2,826,150 UART: [exit] Launching FMC @ 0x40000000
2,831,447 UART:
2,831,463 UART: Running Caliptra FMC ...
2,831,871 UART:
2,832,101 UART: [fmc] Received command: 0x10000000
2,834,270 >>> mbox cmd response data (224 bytes)
2,834,271 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,834,300 UART: [fmc] Received command: 0x10000006
2,852,317 >>> mbox cmd response data (1536 bytes)
2,852,318 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,852,346 UART: [fmc] Received command: 0x46574C44
2,853,172 UART:
2,853,188 UART: Running Caliptra ROM ...
2,853,596 UART:
2,853,738 UART: [state] CFI Enabled
2,856,338 UART: [state] LifecycleState = Unprovisioned
2,856,993 UART: [state] DebugLocked = No
2,857,527 UART: [state] WD Timer not started. Device not locked for debugging
2,858,883 UART: [kat] SHA2-256
3,662,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,666,562 UART: [kat] ++
3,666,714 UART: [kat] sha1
3,670,996 UART: [kat] SHA2-256
3,672,936 UART: [kat] SHA2-384
3,675,797 UART: [kat] SHA2-512-ACC
3,677,697 UART: [kat] ECC-384
3,687,756 UART: [kat] HMAC-384Kdf
3,692,570 UART: [kat] LMS
3,940,882 UART: [kat] --
3,942,044 UART: [update-reset] ++
5,225,706 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,226,793 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,374,805 >>> mbox cmd response: success
5,375,162 UART: [update-reset] Copying MAN_2 To MAN_1
5,383,176 UART: [update-reset Success] --
5,383,585 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,384,251 UART: [state] Locking Datavault
5,384,973 UART: [state] Locking PCR0, PCR1 and PCR31
5,385,577 UART: [state] Locking ICCM
5,386,055 UART: [exit] Launching FMC @ 0x40000000
5,391,352 UART:
5,391,368 UART: Running Caliptra FMC ...
5,391,776 UART:
5,391,998 UART: [fmc] Received command: 0x10000000
5,394,167 >>> mbox cmd response data (224 bytes)
5,394,168 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,394,197 UART: [fmc] Received command: 0x10000006
5,412,214 >>> mbox cmd response data (1536 bytes)
5,412,215 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,412,243 UART: [fmc] Received command: 0x10000007
5,413,035 >>> mbox cmd response data (4 bytes)
5,413,036 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,413,064 UART: [fmc] Received command: 0x10000006
5,431,081 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,588,955 >>> mbox cmd response: success
2,644,317 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,650,106 UART:
2,650,122 UART: Running Caliptra FMC ...
2,650,530 UART:
2,650,760 UART: [fmc] Received command: 0x10000000
2,652,929 >>> mbox cmd response data (224 bytes)
2,652,930 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,652,959 UART: [fmc] Received command: 0x10000006
2,670,976 >>> mbox cmd response data (1536 bytes)
2,670,977 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,671,005 UART: [fmc] Received command: 0x46574C44
5,073,349 >>> mbox cmd response: success
5,081,051 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,086,851 UART:
5,086,867 UART: Running Caliptra FMC ...
5,087,275 UART:
5,087,497 UART: [fmc] Received command: 0x10000000
5,089,666 >>> mbox cmd response data (224 bytes)
5,089,667 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,089,696 UART: [fmc] Received command: 0x10000006
5,107,713 >>> mbox cmd response data (1536 bytes)
5,107,714 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,107,742 UART: [fmc] Received command: 0x10000007
5,108,534 >>> mbox cmd response data (4 bytes)
5,108,535 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,108,563 UART: [fmc] Received command: 0x10000006
5,126,580 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
891,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,925 UART: [kat] SHA2-256
901,865 UART: [kat] SHA2-384
904,592 UART: [kat] SHA2-512-ACC
906,493 UART: [kat] ECC-384
915,978 UART: [kat] HMAC-384Kdf
920,670 UART: [kat] LMS
1,168,982 UART: [kat] --
1,169,705 UART: [cold-reset] ++
1,170,143 UART: [fht] FHT @ 0x50003400
1,172,635 UART: [idev] ++
1,172,803 UART: [idev] CDI.KEYID = 6
1,173,164 UART: [idev] SUBJECT.KEYID = 7
1,173,589 UART: [idev] UDS.KEYID = 0
1,182,211 UART: [idev] Erasing UDS.KEYID = 0
1,199,395 UART: [idev] Sha1 KeyId Algorithm
1,208,367 UART: [idev] --
1,209,362 UART: [ldev] ++
1,209,530 UART: [ldev] CDI.KEYID = 6
1,209,894 UART: [ldev] SUBJECT.KEYID = 5
1,210,321 UART: [ldev] AUTHORITY.KEYID = 7
1,210,784 UART: [ldev] FE.KEYID = 1
1,215,934 UART: [ldev] Erasing FE.KEYID = 1
1,242,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,114 UART: [ldev] --
1,281,488 UART: [fwproc] Wait for Commands...
1,282,225 UART: [fwproc] Recv command 0x46574c44
1,282,958 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,631 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,578,375 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,060 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,739,974 >>> mbox cmd response: success
2,741,019 UART: [afmc] ++
2,741,187 UART: [afmc] CDI.KEYID = 6
2,741,550 UART: [afmc] SUBJECT.KEYID = 7
2,741,976 UART: [afmc] AUTHORITY.KEYID = 5
2,777,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,522 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,273 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,800,993 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,806,885 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,812,579 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,820,312 UART: [afmc] --
2,821,168 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,821,190 UART: [cold-reset] --
2,821,848 UART: [state] Locking Datavault
2,822,897 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,501 UART: [state] Locking ICCM
2,824,153 UART: [exit] Launching FMC @ 0x40000000
2,829,450 UART:
2,829,466 UART: Running Caliptra FMC ...
2,829,874 UART:
2,830,104 UART: [fmc] Received command: 0x10000000
2,832,273 >>> mbox cmd response data (224 bytes)
2,832,274 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,832,303 UART: [fmc] Received command: 0x10000006
2,850,320 >>> mbox cmd response data (1536 bytes)
2,850,321 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,850,349 UART: [fmc] Received command: 0x46574C44
2,851,175 UART:
2,851,191 UART: Running Caliptra ROM ...
2,851,599 UART:
2,851,654 UART: [state] CFI Enabled
2,854,418 UART: [state] LifecycleState = Unprovisioned
2,855,073 UART: [state] DebugLocked = No
2,855,717 UART: [state] WD Timer not started. Device not locked for debugging
2,856,865 UART: [kat] SHA2-256
3,660,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,664,544 UART: [kat] ++
3,664,696 UART: [kat] sha1
3,668,844 UART: [kat] SHA2-256
3,670,784 UART: [kat] SHA2-384
3,673,541 UART: [kat] SHA2-512-ACC
3,675,441 UART: [kat] ECC-384
3,684,922 UART: [kat] HMAC-384Kdf
3,689,432 UART: [kat] LMS
3,937,744 UART: [kat] --
3,938,386 UART: [update-reset] ++
5,221,974 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,223,173 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,371,185 >>> mbox cmd response: success
5,371,318 UART: [update-reset] Copying MAN_2 To MAN_1
5,379,332 UART: [update-reset Success] --
5,379,741 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,380,417 UART: [state] Locking Datavault
5,381,295 UART: [state] Locking PCR0, PCR1 and PCR31
5,381,899 UART: [state] Locking ICCM
5,382,463 UART: [exit] Launching FMC @ 0x40000000
5,387,760 UART:
5,387,776 UART: Running Caliptra FMC ...
5,388,184 UART:
5,388,406 UART: [fmc] Received command: 0x10000000
5,390,575 >>> mbox cmd response data (224 bytes)
5,390,576 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,390,605 UART: [fmc] Received command: 0x10000006
5,408,622 >>> mbox cmd response data (1536 bytes)
5,408,623 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,408,651 UART: [fmc] Received command: 0x10000007
5,409,443 >>> mbox cmd response data (4 bytes)
5,409,444 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,409,472 UART: [fmc] Received command: 0x10000006
5,427,489 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,472 >>> mbox cmd response: success
2,645,778 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,651,989 UART:
2,652,005 UART: Running Caliptra FMC ...
2,652,413 UART:
2,652,643 UART: [fmc] Received command: 0x10000000
2,654,812 >>> mbox cmd response data (224 bytes)
2,654,813 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,654,842 UART: [fmc] Received command: 0x10000006
2,672,859 >>> mbox cmd response data (1536 bytes)
2,672,860 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,672,888 UART: [fmc] Received command: 0x46574C44
5,075,941 >>> mbox cmd response: success
5,083,435 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,088,995 UART:
5,089,011 UART: Running Caliptra FMC ...
5,089,419 UART:
5,089,641 UART: [fmc] Received command: 0x10000000
5,091,810 >>> mbox cmd response data (224 bytes)
5,091,811 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,091,840 UART: [fmc] Received command: 0x10000006
5,109,857 >>> mbox cmd response data (1536 bytes)
5,109,858 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,109,886 UART: [fmc] Received command: 0x10000007
5,110,678 >>> mbox cmd response data (4 bytes)
5,110,679 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,110,707 UART: [fmc] Received command: 0x10000006
5,128,724 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Unprovisioned
86,418 UART: [state] DebugLocked = No
87,002 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,826 UART: [kat] ++
895,978 UART: [kat] sha1
900,242 UART: [kat] SHA2-256
902,182 UART: [kat] SHA2-384
904,819 UART: [kat] SHA2-512-ACC
906,720 UART: [kat] ECC-384
916,523 UART: [kat] HMAC-384Kdf
921,169 UART: [kat] LMS
1,169,481 UART: [kat] --
1,170,392 UART: [cold-reset] ++
1,170,834 UART: [fht] FHT @ 0x50003400
1,173,340 UART: [idev] ++
1,173,508 UART: [idev] CDI.KEYID = 6
1,173,869 UART: [idev] SUBJECT.KEYID = 7
1,174,294 UART: [idev] UDS.KEYID = 0
1,182,296 UART: [idev] Erasing UDS.KEYID = 0
1,199,158 UART: [idev] Sha1 KeyId Algorithm
1,207,970 UART: [idev] --
1,209,169 UART: [ldev] ++
1,209,337 UART: [ldev] CDI.KEYID = 6
1,209,701 UART: [ldev] SUBJECT.KEYID = 5
1,210,128 UART: [ldev] AUTHORITY.KEYID = 7
1,210,591 UART: [ldev] FE.KEYID = 1
1,215,783 UART: [ldev] Erasing FE.KEYID = 1
1,241,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,911 UART: [ldev] --
1,281,227 UART: [fwproc] Wait for Commands...
1,281,878 UART: [fwproc] Recv command 0x46574c44
1,282,611 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,446 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,579,648 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,333 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,125 >>> mbox cmd response: success
2,742,366 UART: [afmc] ++
2,742,534 UART: [afmc] CDI.KEYID = 6
2,742,897 UART: [afmc] SUBJECT.KEYID = 7
2,743,323 UART: [afmc] AUTHORITY.KEYID = 5
2,778,293 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,853 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,604 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,801,324 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,807,216 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,812,910 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,820,765 UART: [afmc] --
2,821,859 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,821,881 UART: [cold-reset] --
2,822,875 UART: [state] Locking Datavault
2,823,764 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,368 UART: [state] Locking ICCM
2,824,954 UART: [exit] Launching FMC @ 0x40000000
2,830,251 UART:
2,830,267 UART: Running Caliptra FMC ...
2,830,675 UART:
2,830,905 UART: [fmc] Received command: 0x10000000
2,833,074 >>> mbox cmd response data (224 bytes)
2,833,075 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,833,104 UART: [fmc] Received command: 0x10000006
2,851,121 >>> mbox cmd response data (1536 bytes)
2,851,122 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,851,150 UART: [fmc] Received command: 0x46574C44
2,851,976 UART:
2,851,992 UART: Running Caliptra ROM ...
2,852,400 UART:
2,852,542 UART: [state] CFI Enabled
2,855,332 UART: [state] LifecycleState = Unprovisioned
2,855,987 UART: [state] DebugLocked = No
2,856,713 UART: [state] WD Timer not started. Device not locked for debugging
2,857,935 UART: [kat] SHA2-256
3,661,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,614 UART: [kat] ++
3,665,766 UART: [kat] sha1
3,669,930 UART: [kat] SHA2-256
3,671,870 UART: [kat] SHA2-384
3,674,629 UART: [kat] SHA2-512-ACC
3,676,529 UART: [kat] ECC-384
3,686,370 UART: [kat] HMAC-384Kdf
3,690,970 UART: [kat] LMS
3,939,282 UART: [kat] --
3,940,234 UART: [update-reset] ++
5,223,814 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,224,899 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,372,911 >>> mbox cmd response: success
5,373,264 UART: [update-reset] Copying MAN_2 To MAN_1
5,381,278 UART: [update-reset Success] --
5,381,687 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,382,403 UART: [state] Locking Datavault
5,383,359 UART: [state] Locking PCR0, PCR1 and PCR31
5,383,963 UART: [state] Locking ICCM
5,384,629 UART: [exit] Launching FMC @ 0x40000000
5,389,926 UART:
5,389,942 UART: Running Caliptra FMC ...
5,390,350 UART:
5,390,572 UART: [fmc] Received command: 0x10000000
5,392,741 >>> mbox cmd response data (224 bytes)
5,392,742 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,392,771 UART: [fmc] Received command: 0x10000006
5,410,788 >>> mbox cmd response data (1536 bytes)
5,410,789 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,410,817 UART: [fmc] Received command: 0x10000007
5,411,609 >>> mbox cmd response data (4 bytes)
5,411,610 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,411,638 UART: [fmc] Received command: 0x10000006
5,429,655 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,592,179 >>> mbox cmd response: success
2,648,927 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,654,890 UART:
2,654,906 UART: Running Caliptra FMC ...
2,655,314 UART:
2,655,544 UART: [fmc] Received command: 0x10000000
2,657,713 >>> mbox cmd response data (224 bytes)
2,657,714 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,657,743 UART: [fmc] Received command: 0x10000006
2,675,760 >>> mbox cmd response data (1536 bytes)
2,675,761 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,675,789 UART: [fmc] Received command: 0x46574C44
5,079,115 >>> mbox cmd response: success
5,086,695 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,092,523 UART:
5,092,539 UART: Running Caliptra FMC ...
5,092,947 UART:
5,093,169 UART: [fmc] Received command: 0x10000000
5,095,338 >>> mbox cmd response data (224 bytes)
5,095,339 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,095,368 UART: [fmc] Received command: 0x10000006
5,113,385 >>> mbox cmd response data (1536 bytes)
5,113,386 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,113,414 UART: [fmc] Received command: 0x10000007
5,114,206 >>> mbox cmd response data (4 bytes)
5,114,207 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,114,235 UART: [fmc] Received command: 0x10000006
5,132,252 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,566 UART: [kat] SHA2-256
891,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,245 UART: [kat] ++
895,397 UART: [kat] sha1
899,533 UART: [kat] SHA2-256
901,473 UART: [kat] SHA2-384
904,274 UART: [kat] SHA2-512-ACC
906,175 UART: [kat] ECC-384
915,754 UART: [kat] HMAC-384Kdf
920,460 UART: [kat] LMS
1,168,772 UART: [kat] --
1,169,533 UART: [cold-reset] ++
1,169,917 UART: [fht] FHT @ 0x50003400
1,172,607 UART: [idev] ++
1,172,775 UART: [idev] CDI.KEYID = 6
1,173,136 UART: [idev] SUBJECT.KEYID = 7
1,173,561 UART: [idev] UDS.KEYID = 0
1,181,919 UART: [idev] Erasing UDS.KEYID = 0
1,198,841 UART: [idev] Sha1 KeyId Algorithm
1,207,905 UART: [idev] --
1,209,158 UART: [ldev] ++
1,209,326 UART: [ldev] CDI.KEYID = 6
1,209,690 UART: [ldev] SUBJECT.KEYID = 5
1,210,117 UART: [ldev] AUTHORITY.KEYID = 7
1,210,580 UART: [ldev] FE.KEYID = 1
1,215,918 UART: [ldev] Erasing FE.KEYID = 1
1,242,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,268 UART: [ldev] --
1,281,732 UART: [fwproc] Wait for Commands...
1,282,543 UART: [fwproc] Recv command 0x46574c44
1,283,276 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,579,449 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,134 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,996 >>> mbox cmd response: success
2,742,253 UART: [afmc] ++
2,742,421 UART: [afmc] CDI.KEYID = 6
2,742,784 UART: [afmc] SUBJECT.KEYID = 7
2,743,210 UART: [afmc] AUTHORITY.KEYID = 5
2,778,307 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,023 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,774 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,801,480 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,807,367 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,813,086 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,821,038 UART: [afmc] --
2,822,138 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,822,160 UART: [cold-reset] --
2,822,808 UART: [state] Locking Datavault
2,823,839 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,443 UART: [state] Locking ICCM
2,825,107 UART: [exit] Launching FMC @ 0x40000000
2,830,404 UART:
2,830,420 UART: Running Caliptra FMC ...
2,830,828 UART:
2,831,058 UART: [fmc] Received command: 0x10000000
2,833,227 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,588,196 >>> mbox cmd response: success
2,643,319 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,649,568 UART:
2,649,584 UART: Running Caliptra FMC ...
2,649,992 UART:
2,650,222 UART: [fmc] Received command: 0x10000000
2,652,391 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,071 UART: [state] LifecycleState = Unprovisioned
86,726 UART: [state] DebugLocked = No
87,396 UART: [state] WD Timer not started. Device not locked for debugging
88,553 UART: [kat] SHA2-256
892,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,232 UART: [kat] ++
896,384 UART: [kat] sha1
900,694 UART: [kat] SHA2-256
902,634 UART: [kat] SHA2-384
905,635 UART: [kat] SHA2-512-ACC
907,536 UART: [kat] ECC-384
917,593 UART: [kat] HMAC-384Kdf
922,321 UART: [kat] LMS
1,170,633 UART: [kat] --
1,171,410 UART: [cold-reset] ++
1,171,850 UART: [fht] FHT @ 0x50003400
1,174,414 UART: [idev] ++
1,174,582 UART: [idev] CDI.KEYID = 6
1,174,943 UART: [idev] SUBJECT.KEYID = 7
1,175,368 UART: [idev] UDS.KEYID = 0
1,183,556 UART: [idev] Erasing UDS.KEYID = 0
1,201,060 UART: [idev] Sha1 KeyId Algorithm
1,210,002 UART: [idev] --
1,210,929 UART: [ldev] ++
1,211,097 UART: [ldev] CDI.KEYID = 6
1,211,461 UART: [ldev] SUBJECT.KEYID = 5
1,211,888 UART: [ldev] AUTHORITY.KEYID = 7
1,212,351 UART: [ldev] FE.KEYID = 1
1,217,723 UART: [ldev] Erasing FE.KEYID = 1
1,243,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,017 UART: [ldev] --
1,283,431 UART: [fwproc] Wait for Commands...
1,284,208 UART: [fwproc] Recv command 0x46574c44
1,284,941 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,580,992 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,677 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,742,377 >>> mbox cmd response: success
2,743,534 UART: [afmc] ++
2,743,702 UART: [afmc] CDI.KEYID = 6
2,744,065 UART: [afmc] SUBJECT.KEYID = 7
2,744,491 UART: [afmc] AUTHORITY.KEYID = 5
2,780,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,790 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,541 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,803,247 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,809,134 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,814,853 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,822,577 UART: [afmc] --
2,823,595 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,823,617 UART: [cold-reset] --
2,824,373 UART: [state] Locking Datavault
2,825,536 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,140 UART: [state] Locking ICCM
2,826,730 UART: [exit] Launching FMC @ 0x40000000
2,832,027 UART:
2,832,043 UART: Running Caliptra FMC ...
2,832,451 UART:
2,832,681 UART: [fmc] Received command: 0x10000000
2,834,850 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,179 >>> mbox cmd response: success
2,646,786 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,653,109 UART:
2,653,125 UART: Running Caliptra FMC ...
2,653,533 UART:
2,653,763 UART: [fmc] Received command: 0x10000000
2,655,932 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
891,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,183 UART: [kat] ++
895,335 UART: [kat] sha1
899,357 UART: [kat] SHA2-256
901,297 UART: [kat] SHA2-384
903,940 UART: [kat] SHA2-512-ACC
905,841 UART: [kat] ECC-384
915,428 UART: [kat] HMAC-384Kdf
920,072 UART: [kat] LMS
1,168,384 UART: [kat] --
1,168,879 UART: [cold-reset] ++
1,169,361 UART: [fht] FHT @ 0x50003400
1,171,945 UART: [idev] ++
1,172,113 UART: [idev] CDI.KEYID = 6
1,172,474 UART: [idev] SUBJECT.KEYID = 7
1,172,899 UART: [idev] UDS.KEYID = 0
1,180,379 UART: [idev] Erasing UDS.KEYID = 0
1,197,223 UART: [idev] Sha1 KeyId Algorithm
1,206,149 UART: [idev] --
1,207,392 UART: [ldev] ++
1,207,560 UART: [ldev] CDI.KEYID = 6
1,207,924 UART: [ldev] SUBJECT.KEYID = 5
1,208,351 UART: [ldev] AUTHORITY.KEYID = 7
1,208,814 UART: [ldev] FE.KEYID = 1
1,213,870 UART: [ldev] Erasing FE.KEYID = 1
1,240,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,774 UART: [ldev] --
1,279,050 UART: [fwproc] Wait for Commands...
1,279,833 UART: [fwproc] Recv command 0x46574c44
1,280,566 UART: [fwproc] Recv'd Img size: 111916 bytes
2,549,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,576,599 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,284 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,738,046 >>> mbox cmd response: success
2,739,283 UART: [afmc] ++
2,739,451 UART: [afmc] CDI.KEYID = 6
2,739,814 UART: [afmc] SUBJECT.KEYID = 7
2,740,240 UART: [afmc] AUTHORITY.KEYID = 5
2,775,399 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,791,463 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,792,214 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,797,920 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,803,807 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,809,526 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,817,568 UART: [afmc] --
2,818,528 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,818,550 UART: [cold-reset] --
2,819,192 UART: [state] Locking Datavault
2,820,187 UART: [state] Locking PCR0, PCR1 and PCR31
2,820,791 UART: [state] Locking ICCM
2,821,219 UART: [exit] Launching FMC @ 0x40000000
2,826,516 UART:
2,826,532 UART: Running Caliptra FMC ...
2,826,940 UART:
2,827,170 UART: [fmc] Received command: 0x10000000
2,829,339 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,666 >>> mbox cmd response: success
2,645,843 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,651,934 UART:
2,651,950 UART: Running Caliptra FMC ...
2,652,358 UART:
2,652,588 UART: [fmc] Received command: 0x10000000
2,654,757 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,848 UART: [state] DebugLocked = No
86,408 UART: [state] WD Timer not started. Device not locked for debugging
87,571 UART: [kat] SHA2-256
891,121 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,250 UART: [kat] ++
895,402 UART: [kat] sha1
899,596 UART: [kat] SHA2-256
901,536 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
916,461 UART: [kat] HMAC-384Kdf
920,973 UART: [kat] LMS
1,169,285 UART: [kat] --
1,170,092 UART: [cold-reset] ++
1,170,456 UART: [fht] FHT @ 0x50003400
1,173,196 UART: [idev] ++
1,173,364 UART: [idev] CDI.KEYID = 6
1,173,725 UART: [idev] SUBJECT.KEYID = 7
1,174,150 UART: [idev] UDS.KEYID = 0
1,182,312 UART: [idev] Erasing UDS.KEYID = 0
1,199,576 UART: [idev] Sha1 KeyId Algorithm
1,208,634 UART: [idev] --
1,209,709 UART: [ldev] ++
1,209,877 UART: [ldev] CDI.KEYID = 6
1,210,241 UART: [ldev] SUBJECT.KEYID = 5
1,210,668 UART: [ldev] AUTHORITY.KEYID = 7
1,211,131 UART: [ldev] FE.KEYID = 1
1,216,621 UART: [ldev] Erasing FE.KEYID = 1
1,242,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,573 UART: [ldev] --
1,282,055 UART: [fwproc] Wait for Commands...
1,282,850 UART: [fwproc] Recv command 0x46574c44
1,283,583 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,084 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,579,504 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,189 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,983 >>> mbox cmd response: success
2,742,126 UART: [afmc] ++
2,742,294 UART: [afmc] CDI.KEYID = 6
2,742,657 UART: [afmc] SUBJECT.KEYID = 7
2,743,083 UART: [afmc] AUTHORITY.KEYID = 5
2,778,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,016 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,767 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,801,473 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,807,360 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,813,079 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,821,003 UART: [afmc] --
2,821,937 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,821,959 UART: [cold-reset] --
2,822,791 UART: [state] Locking Datavault
2,823,938 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,542 UART: [state] Locking ICCM
2,825,100 UART: [exit] Launching FMC @ 0x40000000
2,830,397 UART:
2,830,413 UART: Running Caliptra FMC ...
2,830,821 UART:
2,831,051 UART: [fmc] Received command: 0x10000000
2,833,220 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,593,015 >>> mbox cmd response: success
2,648,498 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,654,819 UART:
2,654,835 UART: Running Caliptra FMC ...
2,655,243 UART:
2,655,473 UART: [fmc] Received command: 0x10000000
2,657,642 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,621 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [kat] SHA2-256
891,380 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,509 UART: [kat] ++
895,661 UART: [kat] sha1
899,937 UART: [kat] SHA2-256
901,877 UART: [kat] SHA2-384
904,734 UART: [kat] SHA2-512-ACC
906,635 UART: [kat] ECC-384
916,374 UART: [kat] HMAC-384Kdf
920,972 UART: [kat] LMS
1,169,284 UART: [kat] --
1,170,363 UART: [cold-reset] ++
1,170,919 UART: [fht] FHT @ 0x50003400
1,173,697 UART: [idev] ++
1,173,865 UART: [idev] CDI.KEYID = 6
1,174,226 UART: [idev] SUBJECT.KEYID = 7
1,174,651 UART: [idev] UDS.KEYID = 0
1,182,615 UART: [idev] Erasing UDS.KEYID = 0
1,199,473 UART: [idev] Sha1 KeyId Algorithm
1,208,351 UART: [idev] --
1,209,418 UART: [ldev] ++
1,209,586 UART: [ldev] CDI.KEYID = 6
1,209,950 UART: [ldev] SUBJECT.KEYID = 5
1,210,377 UART: [ldev] AUTHORITY.KEYID = 7
1,210,840 UART: [ldev] FE.KEYID = 1
1,215,820 UART: [ldev] Erasing FE.KEYID = 1
1,242,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,592 UART: [ldev] --
1,281,910 UART: [fwproc] Wait for Commands...
1,282,689 UART: [fwproc] Recv command 0x46574c44
1,283,422 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,580,111 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,796 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,640 >>> mbox cmd response: success
2,742,837 UART: [afmc] ++
2,743,005 UART: [afmc] CDI.KEYID = 6
2,743,368 UART: [afmc] SUBJECT.KEYID = 7
2,743,794 UART: [afmc] AUTHORITY.KEYID = 5
2,779,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,003 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,754 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,802,460 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,808,347 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,814,066 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,821,938 UART: [afmc] --
2,822,896 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,822,918 UART: [cold-reset] --
2,823,574 UART: [state] Locking Datavault
2,824,507 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,111 UART: [state] Locking ICCM
2,825,729 UART: [exit] Launching FMC @ 0x40000000
2,831,026 UART:
2,831,042 UART: Running Caliptra FMC ...
2,831,450 UART:
2,831,680 UART: [fmc] Received command: 0x10000000
2,833,849 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,936 >>> mbox cmd response: success
2,647,681 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,653,828 UART:
2,653,844 UART: Running Caliptra FMC ...
2,654,252 UART:
2,654,482 UART: [fmc] Received command: 0x10000000
2,656,651 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
891,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,428 UART: [kat] ++
895,580 UART: [kat] sha1
899,824 UART: [kat] SHA2-256
901,764 UART: [kat] SHA2-384
904,497 UART: [kat] SHA2-512-ACC
906,398 UART: [kat] ECC-384
916,397 UART: [kat] HMAC-384Kdf
921,147 UART: [kat] LMS
1,169,459 UART: [kat] --
1,170,284 UART: [cold-reset] ++
1,170,740 UART: [fht] FHT @ 0x50003400
1,173,458 UART: [idev] ++
1,173,626 UART: [idev] CDI.KEYID = 6
1,173,987 UART: [idev] SUBJECT.KEYID = 7
1,174,412 UART: [idev] UDS.KEYID = 0
1,182,386 UART: [idev] Erasing UDS.KEYID = 0
1,199,508 UART: [idev] Sha1 KeyId Algorithm
1,208,298 UART: [idev] --
1,209,161 UART: [ldev] ++
1,209,329 UART: [ldev] CDI.KEYID = 6
1,209,693 UART: [ldev] SUBJECT.KEYID = 5
1,210,120 UART: [ldev] AUTHORITY.KEYID = 7
1,210,583 UART: [ldev] FE.KEYID = 1
1,216,063 UART: [ldev] Erasing FE.KEYID = 1
1,243,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,703 UART: [ldev] --
1,282,111 UART: [fwproc] Wait for Commands...
1,282,764 UART: [fwproc] Recv command 0x46574c44
1,283,497 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,874 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,579,148 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,833 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,709 >>> mbox cmd response: success
2,741,782 UART: [afmc] ++
2,741,950 UART: [afmc] CDI.KEYID = 6
2,742,313 UART: [afmc] SUBJECT.KEYID = 7
2,742,739 UART: [afmc] AUTHORITY.KEYID = 5
2,778,754 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,116 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,867 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,801,573 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,807,460 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,813,179 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,821,027 UART: [afmc] --
2,822,095 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,822,117 UART: [cold-reset] --
2,822,801 UART: [state] Locking Datavault
2,823,894 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,498 UART: [state] Locking ICCM
2,824,966 UART: [exit] Launching FMC @ 0x40000000
2,830,263 UART:
2,830,279 UART: Running Caliptra FMC ...
2,830,687 UART:
2,830,917 UART: [fmc] Received command: 0x10000000
2,833,086 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,587,845 >>> mbox cmd response: success
2,644,080 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,650,215 UART:
2,650,231 UART: Running Caliptra FMC ...
2,650,639 UART:
2,650,869 UART: [fmc] Received command: 0x10000000
2,653,038 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
891,068 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,197 UART: [kat] ++
895,349 UART: [kat] sha1
899,479 UART: [kat] SHA2-256
901,419 UART: [kat] SHA2-384
904,176 UART: [kat] SHA2-512-ACC
906,077 UART: [kat] ECC-384
915,446 UART: [kat] HMAC-384Kdf
920,028 UART: [kat] LMS
1,168,340 UART: [kat] --
1,169,287 UART: [cold-reset] ++
1,169,763 UART: [fht] FHT @ 0x50003400
1,172,431 UART: [idev] ++
1,172,599 UART: [idev] CDI.KEYID = 6
1,172,960 UART: [idev] SUBJECT.KEYID = 7
1,173,385 UART: [idev] UDS.KEYID = 0
1,181,341 UART: [idev] Erasing UDS.KEYID = 0
1,198,165 UART: [idev] Sha1 KeyId Algorithm
1,206,971 UART: [idev] --
1,208,012 UART: [ldev] ++
1,208,180 UART: [ldev] CDI.KEYID = 6
1,208,544 UART: [ldev] SUBJECT.KEYID = 5
1,208,971 UART: [ldev] AUTHORITY.KEYID = 7
1,209,434 UART: [ldev] FE.KEYID = 1
1,214,628 UART: [ldev] Erasing FE.KEYID = 1
1,241,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,168 UART: [ldev] --
1,280,518 UART: [fwproc] Wait for Commands...
1,281,091 UART: [fwproc] Recv command 0x46574c44
1,281,824 UART: [fwproc] Recv'd Img size: 111916 bytes
3,101,523 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,130,033 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,155,718 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,291,578 >>> mbox cmd response: success
3,292,837 UART: [afmc] ++
3,293,005 UART: [afmc] CDI.KEYID = 6
3,293,368 UART: [afmc] SUBJECT.KEYID = 7
3,293,794 UART: [afmc] AUTHORITY.KEYID = 5
3,329,871 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,346,461 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,347,212 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,352,915 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,358,797 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,364,503 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,372,225 UART: [afmc] --
3,373,153 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,373,175 UART: [cold-reset] --
3,374,155 UART: [state] Locking Datavault
3,375,274 UART: [state] Locking PCR0, PCR1 and PCR31
3,375,878 UART: [state] Locking ICCM
3,376,444 UART: [exit] Launching FMC @ 0x40000000
3,381,741 UART:
3,381,757 UART: Running Caliptra FMC ...
3,382,165 UART:
3,382,395 UART: [fmc] Received command: 0x10000000
3,384,564 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,121,529 >>> mbox cmd response: success
3,177,840 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,184,199 UART:
3,184,215 UART: Running Caliptra FMC ...
3,184,623 UART:
3,184,853 UART: [fmc] Received command: 0x10000000
3,187,022 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
891,351 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,480 UART: [kat] ++
895,632 UART: [kat] sha1
899,866 UART: [kat] SHA2-256
901,806 UART: [kat] SHA2-384
904,593 UART: [kat] SHA2-512-ACC
906,494 UART: [kat] ECC-384
916,133 UART: [kat] HMAC-384Kdf
920,825 UART: [kat] LMS
1,169,137 UART: [kat] --
1,170,156 UART: [cold-reset] ++
1,170,552 UART: [fht] FHT @ 0x50003400
1,173,082 UART: [idev] ++
1,173,250 UART: [idev] CDI.KEYID = 6
1,173,611 UART: [idev] SUBJECT.KEYID = 7
1,174,036 UART: [idev] UDS.KEYID = 0
1,181,968 UART: [idev] Erasing UDS.KEYID = 0
1,199,472 UART: [idev] Sha1 KeyId Algorithm
1,208,270 UART: [idev] --
1,209,347 UART: [ldev] ++
1,209,515 UART: [ldev] CDI.KEYID = 6
1,209,879 UART: [ldev] SUBJECT.KEYID = 5
1,210,306 UART: [ldev] AUTHORITY.KEYID = 7
1,210,769 UART: [ldev] FE.KEYID = 1
1,216,391 UART: [ldev] Erasing FE.KEYID = 1
1,242,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,429 UART: [ldev] --
1,281,941 UART: [fwproc] Wait for Commands...
1,282,754 UART: [fwproc] Recv command 0x46574c44
1,283,487 UART: [fwproc] Recv'd Img size: 111916 bytes
3,084,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,112,863 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,138,548 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,274,354 >>> mbox cmd response: success
3,275,623 UART: [afmc] ++
3,275,791 UART: [afmc] CDI.KEYID = 6
3,276,154 UART: [afmc] SUBJECT.KEYID = 7
3,276,580 UART: [afmc] AUTHORITY.KEYID = 5
3,311,741 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,327,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,328,636 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,334,339 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,340,221 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,345,927 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,353,875 UART: [afmc] --
3,354,945 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,354,967 UART: [cold-reset] --
3,355,905 UART: [state] Locking Datavault
3,357,024 UART: [state] Locking PCR0, PCR1 and PCR31
3,357,628 UART: [state] Locking ICCM
3,358,274 UART: [exit] Launching FMC @ 0x40000000
3,363,571 UART:
3,363,587 UART: Running Caliptra FMC ...
3,363,995 UART:
3,364,225 UART: [fmc] Received command: 0x10000000
3,366,394 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,131,133 >>> mbox cmd response: success
3,187,746 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,193,869 UART:
3,193,885 UART: Running Caliptra FMC ...
3,194,293 UART:
3,194,523 UART: [fmc] Received command: 0x10000000
3,196,692 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,079 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
890,930 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,059 UART: [kat] ++
895,211 UART: [kat] sha1
899,607 UART: [kat] SHA2-256
901,547 UART: [kat] SHA2-384
904,390 UART: [kat] SHA2-512-ACC
906,291 UART: [kat] ECC-384
915,872 UART: [kat] HMAC-384Kdf
920,580 UART: [kat] LMS
1,168,892 UART: [kat] --
1,170,007 UART: [cold-reset] ++
1,170,445 UART: [fht] FHT @ 0x50003400
1,172,995 UART: [idev] ++
1,173,163 UART: [idev] CDI.KEYID = 6
1,173,524 UART: [idev] SUBJECT.KEYID = 7
1,173,949 UART: [idev] UDS.KEYID = 0
1,182,071 UART: [idev] Erasing UDS.KEYID = 0
1,199,483 UART: [idev] Sha1 KeyId Algorithm
1,208,435 UART: [idev] --
1,209,450 UART: [ldev] ++
1,209,618 UART: [ldev] CDI.KEYID = 6
1,209,982 UART: [ldev] SUBJECT.KEYID = 5
1,210,409 UART: [ldev] AUTHORITY.KEYID = 7
1,210,872 UART: [ldev] FE.KEYID = 1
1,216,192 UART: [ldev] Erasing FE.KEYID = 1
1,241,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,594 UART: [ldev] --
1,281,090 UART: [fwproc] Wait for Commands...
1,281,725 UART: [fwproc] Recv command 0x46574c44
1,282,458 UART: [fwproc] Recv'd Img size: 111916 bytes
3,103,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,132,328 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,158,013 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,293,879 >>> mbox cmd response: success
3,295,072 UART: [afmc] ++
3,295,240 UART: [afmc] CDI.KEYID = 6
3,295,603 UART: [afmc] SUBJECT.KEYID = 7
3,296,029 UART: [afmc] AUTHORITY.KEYID = 5
3,331,952 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,347,924 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,348,675 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,354,378 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,360,260 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,365,966 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,373,694 UART: [afmc] --
3,374,622 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,374,644 UART: [cold-reset] --
3,375,562 UART: [state] Locking Datavault
3,377,007 UART: [state] Locking PCR0, PCR1 and PCR31
3,377,611 UART: [state] Locking ICCM
3,378,215 UART: [exit] Launching FMC @ 0x40000000
3,383,512 UART:
3,383,528 UART: Running Caliptra FMC ...
3,383,936 UART:
3,384,166 UART: [fmc] Received command: 0x10000000
3,386,335 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,134,640 >>> mbox cmd response: success
3,191,435 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,196,950 UART:
3,196,966 UART: Running Caliptra FMC ...
3,197,374 UART:
3,197,604 UART: [fmc] Received command: 0x10000000
3,199,773 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
891,643 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,772 UART: [kat] ++
895,924 UART: [kat] sha1
900,262 UART: [kat] SHA2-256
902,202 UART: [kat] SHA2-384
905,017 UART: [kat] SHA2-512-ACC
906,918 UART: [kat] ECC-384
916,869 UART: [kat] HMAC-384Kdf
921,539 UART: [kat] LMS
1,169,851 UART: [kat] --
1,170,898 UART: [cold-reset] ++
1,171,370 UART: [fht] FHT @ 0x50003400
1,174,040 UART: [idev] ++
1,174,208 UART: [idev] CDI.KEYID = 6
1,174,569 UART: [idev] SUBJECT.KEYID = 7
1,174,994 UART: [idev] UDS.KEYID = 0
1,182,986 UART: [idev] Erasing UDS.KEYID = 0
1,199,978 UART: [idev] Sha1 KeyId Algorithm
1,208,802 UART: [idev] --
1,209,821 UART: [ldev] ++
1,209,989 UART: [ldev] CDI.KEYID = 6
1,210,353 UART: [ldev] SUBJECT.KEYID = 5
1,210,780 UART: [ldev] AUTHORITY.KEYID = 7
1,211,243 UART: [ldev] FE.KEYID = 1
1,216,281 UART: [ldev] Erasing FE.KEYID = 1
1,243,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,007 UART: [ldev] --
1,282,337 UART: [fwproc] Wait for Commands...
1,282,986 UART: [fwproc] Recv command 0x46574c44
1,283,719 UART: [fwproc] Recv'd Img size: 111916 bytes
3,102,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,130,418 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,156,103 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,291,975 >>> mbox cmd response: success
3,293,200 UART: [afmc] ++
3,293,368 UART: [afmc] CDI.KEYID = 6
3,293,731 UART: [afmc] SUBJECT.KEYID = 7
3,294,157 UART: [afmc] AUTHORITY.KEYID = 5
3,330,088 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,346,492 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,347,243 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,352,946 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,358,828 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,364,534 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,372,562 UART: [afmc] --
3,373,632 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,373,654 UART: [cold-reset] --
3,374,378 UART: [state] Locking Datavault
3,375,437 UART: [state] Locking PCR0, PCR1 and PCR31
3,376,041 UART: [state] Locking ICCM
3,376,593 UART: [exit] Launching FMC @ 0x40000000
3,381,890 UART:
3,381,906 UART: Running Caliptra FMC ...
3,382,314 UART:
3,382,544 UART: [fmc] Received command: 0x10000000
3,384,713 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,133,194 >>> mbox cmd response: success
3,189,699 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,195,904 UART:
3,195,920 UART: Running Caliptra FMC ...
3,196,328 UART:
3,196,558 UART: [fmc] Received command: 0x10000000
3,198,727 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
891,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,659 UART: [kat] SHA2-256
901,599 UART: [kat] SHA2-384
904,412 UART: [kat] SHA2-512-ACC
906,313 UART: [kat] ECC-384
915,856 UART: [kat] HMAC-384Kdf
920,272 UART: [kat] LMS
1,168,584 UART: [kat] --
1,169,477 UART: [cold-reset] ++
1,169,863 UART: [fht] FHT @ 0x50003400
1,172,351 UART: [idev] ++
1,172,519 UART: [idev] CDI.KEYID = 6
1,172,880 UART: [idev] SUBJECT.KEYID = 7
1,173,305 UART: [idev] UDS.KEYID = 0
1,181,211 UART: [idev] Erasing UDS.KEYID = 0
1,197,983 UART: [idev] Sha1 KeyId Algorithm
1,206,771 UART: [idev] --
1,207,820 UART: [ldev] ++
1,207,988 UART: [ldev] CDI.KEYID = 6
1,208,352 UART: [ldev] SUBJECT.KEYID = 5
1,208,779 UART: [ldev] AUTHORITY.KEYID = 7
1,209,242 UART: [ldev] FE.KEYID = 1
1,214,298 UART: [ldev] Erasing FE.KEYID = 1
1,241,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,162 UART: [ldev] --
1,280,576 UART: [fwproc] Wait for Commands...
1,281,217 UART: [fwproc] Recv command 0x46574c44
1,281,950 UART: [fwproc] Recv'd Img size: 111916 bytes
3,102,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,130,526 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,156,211 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,292,141 >>> mbox cmd response: success
3,293,304 UART: [afmc] ++
3,293,472 UART: [afmc] CDI.KEYID = 6
3,293,835 UART: [afmc] SUBJECT.KEYID = 7
3,294,261 UART: [afmc] AUTHORITY.KEYID = 5
3,329,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,345,716 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,346,467 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,352,170 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,358,052 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,363,758 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,371,558 UART: [afmc] --
3,372,618 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,372,640 UART: [cold-reset] --
3,373,354 UART: [state] Locking Datavault
3,374,241 UART: [state] Locking PCR0, PCR1 and PCR31
3,374,845 UART: [state] Locking ICCM
3,375,497 UART: [exit] Launching FMC @ 0x40000000
3,380,794 UART:
3,380,810 UART: Running Caliptra FMC ...
3,381,218 UART:
3,381,448 UART: [fmc] Received command: 0x10000000
3,383,617 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,146,324 >>> mbox cmd response: success
3,202,071 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,208,388 UART:
3,208,404 UART: Running Caliptra FMC ...
3,208,812 UART:
3,209,042 UART: [fmc] Received command: 0x10000000
3,211,211 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,986 UART: [state] WD Timer not started. Device not locked for debugging
88,303 UART: [kat] SHA2-256
891,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,982 UART: [kat] ++
896,134 UART: [kat] sha1
900,342 UART: [kat] SHA2-256
902,282 UART: [kat] SHA2-384
905,147 UART: [kat] SHA2-512-ACC
907,048 UART: [kat] ECC-384
917,107 UART: [kat] HMAC-384Kdf
921,865 UART: [kat] LMS
1,170,177 UART: [kat] --
1,171,382 UART: [cold-reset] ++
1,171,736 UART: [fht] FHT @ 0x50003400
1,174,294 UART: [idev] ++
1,174,462 UART: [idev] CDI.KEYID = 6
1,174,823 UART: [idev] SUBJECT.KEYID = 7
1,175,248 UART: [idev] UDS.KEYID = 0
1,183,336 UART: [idev] Erasing UDS.KEYID = 0
1,200,398 UART: [idev] Sha1 KeyId Algorithm
1,209,078 UART: [idev] --
1,210,039 UART: [ldev] ++
1,210,207 UART: [ldev] CDI.KEYID = 6
1,210,571 UART: [ldev] SUBJECT.KEYID = 5
1,210,998 UART: [ldev] AUTHORITY.KEYID = 7
1,211,461 UART: [ldev] FE.KEYID = 1
1,216,423 UART: [ldev] Erasing FE.KEYID = 1
1,243,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,433 UART: [ldev] --
1,282,787 UART: [fwproc] Wait for Commands...
1,283,452 UART: [fwproc] Recv command 0x46574c44
1,284,185 UART: [fwproc] Recv'd Img size: 111916 bytes
3,086,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,113,731 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,139,416 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,275,252 >>> mbox cmd response: success
3,276,365 UART: [afmc] ++
3,276,533 UART: [afmc] CDI.KEYID = 6
3,276,896 UART: [afmc] SUBJECT.KEYID = 7
3,277,322 UART: [afmc] AUTHORITY.KEYID = 5
3,313,273 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,329,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,330,274 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,335,977 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,341,859 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,347,565 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,355,379 UART: [afmc] --
3,356,369 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,356,391 UART: [cold-reset] --
3,357,115 UART: [state] Locking Datavault
3,358,402 UART: [state] Locking PCR0, PCR1 and PCR31
3,359,006 UART: [state] Locking ICCM
3,359,434 UART: [exit] Launching FMC @ 0x40000000
3,364,731 UART:
3,364,747 UART: Running Caliptra FMC ...
3,365,155 UART:
3,365,385 UART: [fmc] Received command: 0x10000000
3,367,554 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,123,198 >>> mbox cmd response: success
3,180,101 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,186,360 UART:
3,186,376 UART: Running Caliptra FMC ...
3,186,784 UART:
3,187,014 UART: [fmc] Received command: 0x10000000
3,189,183 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,575 UART: [kat] SHA2-256
901,515 UART: [kat] SHA2-384
904,324 UART: [kat] SHA2-512-ACC
906,225 UART: [kat] ECC-384
915,446 UART: [kat] HMAC-384Kdf
920,032 UART: [kat] LMS
1,168,344 UART: [kat] --
1,169,165 UART: [cold-reset] ++
1,169,499 UART: [fht] FHT @ 0x50003400
1,172,213 UART: [idev] ++
1,172,381 UART: [idev] CDI.KEYID = 6
1,172,742 UART: [idev] SUBJECT.KEYID = 7
1,173,167 UART: [idev] UDS.KEYID = 0
1,180,885 UART: [idev] Erasing UDS.KEYID = 0
1,198,115 UART: [idev] Sha1 KeyId Algorithm
1,206,933 UART: [idev] --
1,208,020 UART: [ldev] ++
1,208,188 UART: [ldev] CDI.KEYID = 6
1,208,552 UART: [ldev] SUBJECT.KEYID = 5
1,208,979 UART: [ldev] AUTHORITY.KEYID = 7
1,209,442 UART: [ldev] FE.KEYID = 1
1,214,682 UART: [ldev] Erasing FE.KEYID = 1
1,241,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,136 UART: [ldev] --
1,280,562 UART: [fwproc] Wait for Commands...
1,281,147 UART: [fwproc] Recv command 0x4d454153
1,285,174 >>> mbox cmd response data (12 bytes)
1,285,175 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,242 UART: [fwproc] Recv command 0x4d454153
1,289,269 >>> mbox cmd response data (12 bytes)
1,289,270 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,517 UART: [fwproc] Recv command 0x4d454153
1,293,544 >>> mbox cmd response data (12 bytes)
1,293,545 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,606 UART: [fwproc] Recv command 0x4d454153
1,297,633 >>> mbox cmd response data (12 bytes)
1,297,634 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,701 UART: [fwproc] Recv command 0x4d454153
1,301,728 >>> mbox cmd response data (12 bytes)
1,301,729 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,301,860 UART: [fwproc] Recv command 0x4d454153
1,305,887 >>> mbox cmd response data (12 bytes)
1,305,888 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,183 UART: [fwproc] Recv command 0x4d454153
1,310,210 >>> mbox cmd response data (12 bytes)
1,310,211 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,338 UART: [fwproc] Recv command 0x4d454153
1,314,365 >>> mbox cmd response data (12 bytes)
1,314,366 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,314,563 UART: [fwproc] Recv command 0x46574c44
1,315,296 UART: [fwproc] Recv'd Img size: 111916 bytes
2,584,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,090 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,775 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,671 >>> mbox cmd response: success
2,773,696 UART: [afmc] ++
2,773,864 UART: [afmc] CDI.KEYID = 6
2,774,227 UART: [afmc] SUBJECT.KEYID = 7
2,774,653 UART: [afmc] AUTHORITY.KEYID = 5
2,810,236 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,665 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,833,361 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,839,260 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,844,953 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,852,899 UART: [afmc] --
2,853,885 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,853,907 UART: [cold-reset] --
2,854,873 UART: [state] Locking Datavault
2,855,896 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,500 UART: [state] Locking ICCM
2,857,104 UART: [exit] Launching FMC @ 0x40000000
2,862,401 UART:
2,862,417 UART: Running Caliptra FMC ...
2,862,825 UART:
2,863,055 UART: [fmc] Received command: 0x1000000A
2,869,286 >>> mbox cmd response data (928 bytes)
2,869,287 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,869,316 UART: [fmc] Received command: 0x10000009
2,870,514 >>> mbox cmd response data (48 bytes)
2,870,515 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,870,544 UART: [fmc] Received command: 0x10000003
2,880,000 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,022 >>> mbox cmd response data (12 bytes)
1,139,023 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,482 >>> mbox cmd response data (12 bytes)
1,142,483 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,010 >>> mbox cmd response data (12 bytes)
1,146,011 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,402 >>> mbox cmd response data (12 bytes)
1,149,403 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,958 >>> mbox cmd response data (12 bytes)
1,152,959 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,356 >>> mbox cmd response data (12 bytes)
1,156,357 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,862 >>> mbox cmd response data (12 bytes)
1,159,863 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,320 >>> mbox cmd response data (12 bytes)
1,163,321 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,617,133 >>> mbox cmd response: success
2,673,226 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,679,277 UART:
2,679,293 UART: Running Caliptra FMC ...
2,679,701 UART:
2,679,931 UART: [fmc] Received command: 0x1000000A
2,686,162 >>> mbox cmd response data (928 bytes)
2,686,163 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,686,192 UART: [fmc] Received command: 0x10000009
2,687,390 >>> mbox cmd response data (48 bytes)
2,687,391 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,687,420 UART: [fmc] Received command: 0x10000003
2,696,876 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,821 UART: [state] LifecycleState = Unprovisioned
86,476 UART: [state] DebugLocked = No
87,174 UART: [state] WD Timer not started. Device not locked for debugging
88,363 UART: [kat] SHA2-256
891,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,042 UART: [kat] ++
896,194 UART: [kat] sha1
900,446 UART: [kat] SHA2-256
902,386 UART: [kat] SHA2-384
905,131 UART: [kat] SHA2-512-ACC
907,032 UART: [kat] ECC-384
916,923 UART: [kat] HMAC-384Kdf
921,667 UART: [kat] LMS
1,169,979 UART: [kat] --
1,171,052 UART: [cold-reset] ++
1,171,492 UART: [fht] FHT @ 0x50003400
1,174,098 UART: [idev] ++
1,174,266 UART: [idev] CDI.KEYID = 6
1,174,627 UART: [idev] SUBJECT.KEYID = 7
1,175,052 UART: [idev] UDS.KEYID = 0
1,183,294 UART: [idev] Erasing UDS.KEYID = 0
1,200,698 UART: [idev] Sha1 KeyId Algorithm
1,209,724 UART: [idev] --
1,210,789 UART: [ldev] ++
1,210,957 UART: [ldev] CDI.KEYID = 6
1,211,321 UART: [ldev] SUBJECT.KEYID = 5
1,211,748 UART: [ldev] AUTHORITY.KEYID = 7
1,212,211 UART: [ldev] FE.KEYID = 1
1,217,409 UART: [ldev] Erasing FE.KEYID = 1
1,244,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,189 UART: [ldev] --
1,283,525 UART: [fwproc] Wait for Commands...
1,284,208 UART: [fwproc] Recv command 0x4d454153
1,288,235 >>> mbox cmd response data (12 bytes)
1,288,236 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,288,417 UART: [fwproc] Recv command 0x4d454153
1,292,444 >>> mbox cmd response data (12 bytes)
1,292,445 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,292,538 UART: [fwproc] Recv command 0x4d454153
1,296,565 >>> mbox cmd response data (12 bytes)
1,296,566 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,296,759 UART: [fwproc] Recv command 0x4d454153
1,300,786 >>> mbox cmd response data (12 bytes)
1,300,787 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,301,098 UART: [fwproc] Recv command 0x4d454153
1,305,125 >>> mbox cmd response data (12 bytes)
1,305,126 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,305,211 UART: [fwproc] Recv command 0x4d454153
1,309,238 >>> mbox cmd response data (12 bytes)
1,309,239 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,309,338 UART: [fwproc] Recv command 0x4d454153
1,313,365 >>> mbox cmd response data (12 bytes)
1,313,366 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,313,577 UART: [fwproc] Recv command 0x4d454153
1,317,604 >>> mbox cmd response data (12 bytes)
1,317,605 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,317,802 UART: [fwproc] Recv command 0x46574c44
1,318,535 UART: [fwproc] Recv'd Img size: 111916 bytes
2,588,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,651 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,641,336 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,777,236 >>> mbox cmd response: success
2,778,329 UART: [afmc] ++
2,778,497 UART: [afmc] CDI.KEYID = 6
2,778,860 UART: [afmc] SUBJECT.KEYID = 7
2,779,286 UART: [afmc] AUTHORITY.KEYID = 5
2,814,739 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,341 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,092 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,788 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,687 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,849,380 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,394 UART: [afmc] --
2,858,414 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,858,436 UART: [cold-reset] --
2,859,550 UART: [state] Locking Datavault
2,860,831 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,435 UART: [state] Locking ICCM
2,862,039 UART: [exit] Launching FMC @ 0x40000000
2,867,336 UART:
2,867,352 UART: Running Caliptra FMC ...
2,867,760 UART:
2,867,990 UART: [fmc] Received command: 0x1000000A
2,874,221 >>> mbox cmd response data (928 bytes)
2,874,222 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,874,251 UART: [fmc] Received command: 0x10000009
2,875,449 >>> mbox cmd response data (48 bytes)
2,875,450 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,875,479 UART: [fmc] Received command: 0x10000003
2,884,935 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,455 >>> mbox cmd response data (12 bytes)
1,139,456 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,001 >>> mbox cmd response data (12 bytes)
1,143,002 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,419 >>> mbox cmd response data (12 bytes)
1,146,420 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,945 >>> mbox cmd response data (12 bytes)
1,149,946 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,363 >>> mbox cmd response data (12 bytes)
1,153,364 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,969 >>> mbox cmd response data (12 bytes)
1,156,970 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,463 >>> mbox cmd response data (12 bytes)
1,160,464 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,877 >>> mbox cmd response data (12 bytes)
1,163,878 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,620,072 >>> mbox cmd response: success
2,676,819 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,682,464 UART:
2,682,480 UART: Running Caliptra FMC ...
2,682,888 UART:
2,683,118 UART: [fmc] Received command: 0x1000000A
2,689,349 >>> mbox cmd response data (928 bytes)
2,689,350 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,689,379 UART: [fmc] Received command: 0x10000009
2,690,577 >>> mbox cmd response data (48 bytes)
2,690,578 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,690,607 UART: [fmc] Received command: 0x10000003
2,700,063 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,498 UART: [state] LifecycleState = Unprovisioned
86,153 UART: [state] DebugLocked = No
86,709 UART: [state] WD Timer not started. Device not locked for debugging
88,002 UART: [kat] SHA2-256
891,552 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,681 UART: [kat] ++
895,833 UART: [kat] sha1
900,069 UART: [kat] SHA2-256
902,009 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
920,882 UART: [kat] LMS
1,169,194 UART: [kat] --
1,170,001 UART: [cold-reset] ++
1,170,367 UART: [fht] FHT @ 0x50003400
1,172,871 UART: [idev] ++
1,173,039 UART: [idev] CDI.KEYID = 6
1,173,400 UART: [idev] SUBJECT.KEYID = 7
1,173,825 UART: [idev] UDS.KEYID = 0
1,181,853 UART: [idev] Erasing UDS.KEYID = 0
1,198,405 UART: [idev] Sha1 KeyId Algorithm
1,207,173 UART: [idev] --
1,208,302 UART: [ldev] ++
1,208,470 UART: [ldev] CDI.KEYID = 6
1,208,834 UART: [ldev] SUBJECT.KEYID = 5
1,209,261 UART: [ldev] AUTHORITY.KEYID = 7
1,209,724 UART: [ldev] FE.KEYID = 1
1,215,236 UART: [ldev] Erasing FE.KEYID = 1
1,241,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,088 UART: [ldev] --
1,280,540 UART: [fwproc] Wait for Commands...
1,281,327 UART: [fwproc] Recv command 0x4d454153
1,285,354 >>> mbox cmd response data (12 bytes)
1,285,355 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,518 UART: [fwproc] Recv command 0x4d454153
1,289,545 >>> mbox cmd response data (12 bytes)
1,289,546 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,645 UART: [fwproc] Recv command 0x4d454153
1,293,672 >>> mbox cmd response data (12 bytes)
1,293,673 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,982 UART: [fwproc] Recv command 0x4d454153
1,298,009 >>> mbox cmd response data (12 bytes)
1,298,010 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,085 UART: [fwproc] Recv command 0x4d454153
1,302,112 >>> mbox cmd response data (12 bytes)
1,302,113 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,246 UART: [fwproc] Recv command 0x4d454153
1,306,273 >>> mbox cmd response data (12 bytes)
1,306,274 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,449 UART: [fwproc] Recv command 0x4d454153
1,310,476 >>> mbox cmd response data (12 bytes)
1,310,477 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,760 UART: [fwproc] Recv command 0x4d454153
1,314,787 >>> mbox cmd response data (12 bytes)
1,314,788 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,314,907 UART: [fwproc] Recv command 0x46574c44
1,315,640 UART: [fwproc] Recv'd Img size: 111916 bytes
2,585,156 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,592 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,277 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,211 >>> mbox cmd response: success
2,775,462 UART: [afmc] ++
2,775,630 UART: [afmc] CDI.KEYID = 6
2,775,993 UART: [afmc] SUBJECT.KEYID = 7
2,776,419 UART: [afmc] AUTHORITY.KEYID = 5
2,811,688 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,314 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,065 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,834,761 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,840,660 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,846,353 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,854,301 UART: [afmc] --
2,855,373 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,855,395 UART: [cold-reset] --
2,856,377 UART: [state] Locking Datavault
2,857,632 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,236 UART: [state] Locking ICCM
2,858,720 UART: [exit] Launching FMC @ 0x40000000
2,864,017 UART:
2,864,033 UART: Running Caliptra FMC ...
2,864,441 UART:
2,864,671 UART: [fmc] Received command: 0x1000000A
2,870,902 >>> mbox cmd response data (928 bytes)
2,870,903 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,870,932 UART: [fmc] Received command: 0x10000009
2,872,130 >>> mbox cmd response data (48 bytes)
2,872,131 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,872,160 UART: [fmc] Received command: 0x10000003
2,881,616 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,590 >>> mbox cmd response data (12 bytes)
1,138,591 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,088 >>> mbox cmd response data (12 bytes)
1,142,089 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,546 >>> mbox cmd response data (12 bytes)
1,145,547 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,166 >>> mbox cmd response data (12 bytes)
1,149,167 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,646 >>> mbox cmd response data (12 bytes)
1,152,647 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,234 >>> mbox cmd response data (12 bytes)
1,156,235 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,772 >>> mbox cmd response data (12 bytes)
1,159,773 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,234 >>> mbox cmd response data (12 bytes)
1,163,235 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,618,117 >>> mbox cmd response: success
2,674,574 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,680,639 UART:
2,680,655 UART: Running Caliptra FMC ...
2,681,063 UART:
2,681,293 UART: [fmc] Received command: 0x1000000A
2,687,524 >>> mbox cmd response data (928 bytes)
2,687,525 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,687,554 UART: [fmc] Received command: 0x10000009
2,688,752 >>> mbox cmd response data (48 bytes)
2,688,753 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,688,782 UART: [fmc] Received command: 0x10000003
2,698,238 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,620 UART: [kat] ++
895,772 UART: [kat] sha1
900,002 UART: [kat] SHA2-256
901,942 UART: [kat] SHA2-384
904,879 UART: [kat] SHA2-512-ACC
906,780 UART: [kat] ECC-384
916,829 UART: [kat] HMAC-384Kdf
921,383 UART: [kat] LMS
1,169,695 UART: [kat] --
1,170,744 UART: [cold-reset] ++
1,171,078 UART: [fht] FHT @ 0x50003400
1,173,806 UART: [idev] ++
1,173,974 UART: [idev] CDI.KEYID = 6
1,174,335 UART: [idev] SUBJECT.KEYID = 7
1,174,760 UART: [idev] UDS.KEYID = 0
1,183,086 UART: [idev] Erasing UDS.KEYID = 0
1,200,056 UART: [idev] Sha1 KeyId Algorithm
1,208,868 UART: [idev] --
1,209,887 UART: [ldev] ++
1,210,055 UART: [ldev] CDI.KEYID = 6
1,210,419 UART: [ldev] SUBJECT.KEYID = 5
1,210,846 UART: [ldev] AUTHORITY.KEYID = 7
1,211,309 UART: [ldev] FE.KEYID = 1
1,216,943 UART: [ldev] Erasing FE.KEYID = 1
1,242,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,815 UART: [ldev] --
1,282,167 UART: [fwproc] Wait for Commands...
1,282,764 UART: [fwproc] Recv command 0x4d454153
1,286,791 >>> mbox cmd response data (12 bytes)
1,286,792 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,975 UART: [fwproc] Recv command 0x4d454153
1,291,002 >>> mbox cmd response data (12 bytes)
1,291,003 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,098 UART: [fwproc] Recv command 0x4d454153
1,295,125 >>> mbox cmd response data (12 bytes)
1,295,126 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,349 UART: [fwproc] Recv command 0x4d454153
1,299,376 >>> mbox cmd response data (12 bytes)
1,299,377 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,684 UART: [fwproc] Recv command 0x4d454153
1,303,711 >>> mbox cmd response data (12 bytes)
1,303,712 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,889 UART: [fwproc] Recv command 0x4d454153
1,307,916 >>> mbox cmd response data (12 bytes)
1,307,917 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,170 UART: [fwproc] Recv command 0x4d454153
1,312,197 >>> mbox cmd response data (12 bytes)
1,312,198 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,473 UART: [fwproc] Recv command 0x4d454153
1,316,500 >>> mbox cmd response data (12 bytes)
1,316,501 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,316,732 UART: [fwproc] Recv command 0x46574c44
1,317,465 UART: [fwproc] Recv'd Img size: 111916 bytes
2,587,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,729 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,641,414 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,777,156 >>> mbox cmd response: success
2,778,199 UART: [afmc] ++
2,778,367 UART: [afmc] CDI.KEYID = 6
2,778,730 UART: [afmc] SUBJECT.KEYID = 7
2,779,156 UART: [afmc] AUTHORITY.KEYID = 5
2,814,451 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,086 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,782 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,681 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,849,374 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,030 UART: [afmc] --
2,857,938 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,857,960 UART: [cold-reset] --
2,858,822 UART: [state] Locking Datavault
2,859,981 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,585 UART: [state] Locking ICCM
2,861,161 UART: [exit] Launching FMC @ 0x40000000
2,866,458 UART:
2,866,474 UART: Running Caliptra FMC ...
2,866,882 UART:
2,867,112 UART: [fmc] Received command: 0x1000000A
2,873,343 >>> mbox cmd response data (928 bytes)
2,873,344 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,873,373 UART: [fmc] Received command: 0x10000009
2,874,571 >>> mbox cmd response data (48 bytes)
2,874,572 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,874,601 UART: [fmc] Received command: 0x10000003
2,884,057 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,547 >>> mbox cmd response data (12 bytes)
1,138,548 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,169 >>> mbox cmd response data (12 bytes)
1,142,170 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,779 >>> mbox cmd response data (12 bytes)
1,145,780 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,149 >>> mbox cmd response data (12 bytes)
1,149,150 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,643 >>> mbox cmd response data (12 bytes)
1,152,644 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,069 >>> mbox cmd response data (12 bytes)
1,156,070 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,547 >>> mbox cmd response data (12 bytes)
1,159,548 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,127 >>> mbox cmd response data (12 bytes)
1,163,128 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,618,214 >>> mbox cmd response: success
2,674,681 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,680,726 UART:
2,680,742 UART: Running Caliptra FMC ...
2,681,150 UART:
2,681,380 UART: [fmc] Received command: 0x1000000A
2,687,611 >>> mbox cmd response data (928 bytes)
2,687,612 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,687,641 UART: [fmc] Received command: 0x10000009
2,688,839 >>> mbox cmd response data (48 bytes)
2,688,840 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,688,869 UART: [fmc] Received command: 0x10000003
2,698,325 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,550 UART: [kat] SHA2-256
891,100 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,229 UART: [kat] ++
895,381 UART: [kat] sha1
899,601 UART: [kat] SHA2-256
901,541 UART: [kat] SHA2-384
904,128 UART: [kat] SHA2-512-ACC
906,029 UART: [kat] ECC-384
915,908 UART: [kat] HMAC-384Kdf
920,668 UART: [kat] LMS
1,168,980 UART: [kat] --
1,170,101 UART: [cold-reset] ++
1,170,567 UART: [fht] FHT @ 0x50003400
1,173,375 UART: [idev] ++
1,173,543 UART: [idev] CDI.KEYID = 6
1,173,904 UART: [idev] SUBJECT.KEYID = 7
1,174,329 UART: [idev] UDS.KEYID = 0
1,182,355 UART: [idev] Erasing UDS.KEYID = 0
1,199,835 UART: [idev] Sha1 KeyId Algorithm
1,208,713 UART: [idev] --
1,209,538 UART: [ldev] ++
1,209,706 UART: [ldev] CDI.KEYID = 6
1,210,070 UART: [ldev] SUBJECT.KEYID = 5
1,210,497 UART: [ldev] AUTHORITY.KEYID = 7
1,210,960 UART: [ldev] FE.KEYID = 1
1,215,988 UART: [ldev] Erasing FE.KEYID = 1
1,242,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,712 UART: [ldev] --
1,282,110 UART: [fwproc] Wait for Commands...
1,282,779 UART: [fwproc] Recv command 0x4d454153
1,286,806 >>> mbox cmd response data (12 bytes)
1,286,807 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,090 UART: [fwproc] Recv command 0x4d454153
1,291,117 >>> mbox cmd response data (12 bytes)
1,291,118 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,311 UART: [fwproc] Recv command 0x4d454153
1,295,338 >>> mbox cmd response data (12 bytes)
1,295,339 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,422 UART: [fwproc] Recv command 0x4d454153
1,299,449 >>> mbox cmd response data (12 bytes)
1,299,450 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,553 UART: [fwproc] Recv command 0x4d454153
1,303,580 >>> mbox cmd response data (12 bytes)
1,303,581 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,870 UART: [fwproc] Recv command 0x4d454153
1,307,897 >>> mbox cmd response data (12 bytes)
1,307,898 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,045 UART: [fwproc] Recv command 0x4d454153
1,312,072 >>> mbox cmd response data (12 bytes)
1,312,073 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,260 UART: [fwproc] Recv command 0x4d454153
1,316,287 >>> mbox cmd response data (12 bytes)
1,316,288 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,316,587 UART: [fwproc] Recv command 0x46574c44
1,317,320 UART: [fwproc] Recv'd Img size: 111916 bytes
2,585,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,758 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,443 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,291 >>> mbox cmd response: success
2,776,520 UART: [afmc] ++
2,776,688 UART: [afmc] CDI.KEYID = 6
2,777,051 UART: [afmc] SUBJECT.KEYID = 7
2,777,477 UART: [afmc] AUTHORITY.KEYID = 5
2,813,636 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,088 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,839 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,836,535 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,842,434 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,848,127 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,856,089 UART: [afmc] --
2,857,031 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,857,053 UART: [cold-reset] --
2,857,947 UART: [state] Locking Datavault
2,859,266 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,870 UART: [state] Locking ICCM
2,860,412 UART: [exit] Launching FMC @ 0x40000000
2,865,709 UART:
2,865,725 UART: Running Caliptra FMC ...
2,866,133 UART:
2,866,363 UART: [fmc] Received command: 0x1000000A
2,872,594 >>> mbox cmd response data (928 bytes)
2,872,595 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,872,624 UART: [fmc] Received command: 0x10000009
2,873,822 >>> mbox cmd response data (48 bytes)
2,873,823 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,873,852 UART: [fmc] Received command: 0x10000003
2,883,308 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,274 >>> mbox cmd response data (12 bytes)
1,139,275 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,862 >>> mbox cmd response data (12 bytes)
1,142,863 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,440 >>> mbox cmd response data (12 bytes)
1,146,441 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,880 >>> mbox cmd response data (12 bytes)
1,149,881 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,474 >>> mbox cmd response data (12 bytes)
1,153,475 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,864 >>> mbox cmd response data (12 bytes)
1,156,865 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,354 >>> mbox cmd response data (12 bytes)
1,160,355 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,770 >>> mbox cmd response data (12 bytes)
1,163,771 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,618,535 >>> mbox cmd response: success
2,674,578 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,680,489 UART:
2,680,505 UART: Running Caliptra FMC ...
2,680,913 UART:
2,681,143 UART: [fmc] Received command: 0x1000000A
2,687,374 >>> mbox cmd response data (928 bytes)
2,687,375 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,687,404 UART: [fmc] Received command: 0x10000009
2,688,602 >>> mbox cmd response data (48 bytes)
2,688,603 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,688,632 UART: [fmc] Received command: 0x10000003
2,698,088 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Unprovisioned
85,730 UART: [state] DebugLocked = No
86,230 UART: [state] WD Timer not started. Device not locked for debugging
87,345 UART: [kat] SHA2-256
890,895 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,024 UART: [kat] ++
895,176 UART: [kat] sha1
899,414 UART: [kat] SHA2-256
901,354 UART: [kat] SHA2-384
904,101 UART: [kat] SHA2-512-ACC
906,002 UART: [kat] ECC-384
915,845 UART: [kat] HMAC-384Kdf
920,257 UART: [kat] LMS
1,168,569 UART: [kat] --
1,169,580 UART: [cold-reset] ++
1,170,078 UART: [fht] FHT @ 0x50003400
1,172,784 UART: [idev] ++
1,172,952 UART: [idev] CDI.KEYID = 6
1,173,313 UART: [idev] SUBJECT.KEYID = 7
1,173,738 UART: [idev] UDS.KEYID = 0
1,181,874 UART: [idev] Erasing UDS.KEYID = 0
1,198,758 UART: [idev] Sha1 KeyId Algorithm
1,207,704 UART: [idev] --
1,208,711 UART: [ldev] ++
1,208,879 UART: [ldev] CDI.KEYID = 6
1,209,243 UART: [ldev] SUBJECT.KEYID = 5
1,209,670 UART: [ldev] AUTHORITY.KEYID = 7
1,210,133 UART: [ldev] FE.KEYID = 1
1,214,917 UART: [ldev] Erasing FE.KEYID = 1
1,241,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,673 UART: [ldev] --
1,281,023 UART: [fwproc] Wait for Commands...
1,281,722 UART: [fwproc] Recv command 0x4d454153
1,285,749 >>> mbox cmd response data (12 bytes)
1,285,750 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,009 UART: [fwproc] Recv command 0x4d454153
1,290,036 >>> mbox cmd response data (12 bytes)
1,290,037 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,228 UART: [fwproc] Recv command 0x4d454153
1,294,255 >>> mbox cmd response data (12 bytes)
1,294,256 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,381 UART: [fwproc] Recv command 0x4d454153
1,298,408 >>> mbox cmd response data (12 bytes)
1,298,409 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,716 UART: [fwproc] Recv command 0x4d454153
1,302,743 >>> mbox cmd response data (12 bytes)
1,302,744 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,979 UART: [fwproc] Recv command 0x4d454153
1,307,006 >>> mbox cmd response data (12 bytes)
1,307,007 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,280 UART: [fwproc] Recv command 0x4d454153
1,311,307 >>> mbox cmd response data (12 bytes)
1,311,308 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,565 UART: [fwproc] Recv command 0x4d454153
1,315,592 >>> mbox cmd response data (12 bytes)
1,315,593 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,315,884 UART: [fwproc] Recv command 0x46574c44
1,316,617 UART: [fwproc] Recv'd Img size: 111916 bytes
2,586,349 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,953 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,638 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,478 >>> mbox cmd response: success
2,775,665 UART: [afmc] ++
2,775,833 UART: [afmc] CDI.KEYID = 6
2,776,196 UART: [afmc] SUBJECT.KEYID = 7
2,776,622 UART: [afmc] AUTHORITY.KEYID = 5
2,812,181 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,705 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,456 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,835,152 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,841,051 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,846,744 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,854,560 UART: [afmc] --
2,855,476 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,855,498 UART: [cold-reset] --
2,856,244 UART: [state] Locking Datavault
2,857,613 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,217 UART: [state] Locking ICCM
2,858,699 UART: [exit] Launching FMC @ 0x40000000
2,863,996 UART:
2,864,012 UART: Running Caliptra FMC ...
2,864,420 UART:
2,864,650 UART: [fmc] Received command: 0x1000000A
2,870,881 >>> mbox cmd response data (928 bytes)
2,870,882 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,870,911 UART: [fmc] Received command: 0x10000009
2,872,109 >>> mbox cmd response data (48 bytes)
2,872,110 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,872,139 UART: [fmc] Received command: 0x10000003
2,881,595 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,509 >>> mbox cmd response data (12 bytes)
1,140,510 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,069 >>> mbox cmd response data (12 bytes)
1,144,070 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,575 >>> mbox cmd response data (12 bytes)
1,147,576 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,141 >>> mbox cmd response data (12 bytes)
1,151,142 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,649 >>> mbox cmd response data (12 bytes)
1,154,650 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,023 >>> mbox cmd response data (12 bytes)
1,158,024 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,631 >>> mbox cmd response data (12 bytes)
1,161,632 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,135 >>> mbox cmd response data (12 bytes)
1,165,136 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,619,614 >>> mbox cmd response: success
2,675,195 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,681,366 UART:
2,681,382 UART: Running Caliptra FMC ...
2,681,790 UART:
2,682,020 UART: [fmc] Received command: 0x1000000A
2,688,251 >>> mbox cmd response data (928 bytes)
2,688,252 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,688,281 UART: [fmc] Received command: 0x10000009
2,689,479 >>> mbox cmd response data (48 bytes)
2,689,480 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,689,509 UART: [fmc] Received command: 0x10000003
2,698,965 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
891,274 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,403 UART: [kat] ++
895,555 UART: [kat] sha1
899,839 UART: [kat] SHA2-256
901,779 UART: [kat] SHA2-384
904,500 UART: [kat] SHA2-512-ACC
906,401 UART: [kat] ECC-384
916,076 UART: [kat] HMAC-384Kdf
920,494 UART: [kat] LMS
1,168,806 UART: [kat] --
1,169,729 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,172,829 UART: [idev] ++
1,172,997 UART: [idev] CDI.KEYID = 6
1,173,358 UART: [idev] SUBJECT.KEYID = 7
1,173,783 UART: [idev] UDS.KEYID = 0
1,181,677 UART: [idev] Erasing UDS.KEYID = 0
1,198,745 UART: [idev] Sha1 KeyId Algorithm
1,207,651 UART: [idev] --
1,208,702 UART: [ldev] ++
1,208,870 UART: [ldev] CDI.KEYID = 6
1,209,234 UART: [ldev] SUBJECT.KEYID = 5
1,209,661 UART: [ldev] AUTHORITY.KEYID = 7
1,210,124 UART: [ldev] FE.KEYID = 1
1,215,400 UART: [ldev] Erasing FE.KEYID = 1
1,241,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,116 UART: [ldev] --
1,280,572 UART: [fwproc] Wait for Commands...
1,281,215 UART: [fwproc] Recv command 0x4d454153
1,285,242 >>> mbox cmd response data (12 bytes)
1,285,243 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,356 UART: [fwproc] Recv command 0x4d454153
1,289,383 >>> mbox cmd response data (12 bytes)
1,289,384 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,605 UART: [fwproc] Recv command 0x4d454153
1,293,632 >>> mbox cmd response data (12 bytes)
1,293,633 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,792 UART: [fwproc] Recv command 0x4d454153
1,297,819 >>> mbox cmd response data (12 bytes)
1,297,820 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,041 UART: [fwproc] Recv command 0x4d454153
1,302,068 >>> mbox cmd response data (12 bytes)
1,302,069 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,280 UART: [fwproc] Recv command 0x4d454153
1,306,307 >>> mbox cmd response data (12 bytes)
1,306,308 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,387 UART: [fwproc] Recv command 0x4d454153
1,310,414 >>> mbox cmd response data (12 bytes)
1,310,415 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,664 UART: [fwproc] Recv command 0x4d454153
1,314,691 >>> mbox cmd response data (12 bytes)
1,314,692 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,314,897 UART: [fwproc] Recv command 0x4d454153
1,315,640 UART: [fwproc] Max # of measurements received.
1,316,285 >>> mbox cmd response: failed
1,316,583 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,494 >>> mbox cmd response data (12 bytes)
1,138,495 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,958 >>> mbox cmd response data (12 bytes)
1,141,959 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,576 >>> mbox cmd response data (12 bytes)
1,145,577 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,038 >>> mbox cmd response data (12 bytes)
1,149,039 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,556 >>> mbox cmd response data (12 bytes)
1,152,557 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,984 >>> mbox cmd response data (12 bytes)
1,155,985 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,544 >>> mbox cmd response data (12 bytes)
1,159,545 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,968 >>> mbox cmd response data (12 bytes)
1,162,969 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,284 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,508 UART: [kat] ++
895,660 UART: [kat] sha1
899,808 UART: [kat] SHA2-256
901,748 UART: [kat] SHA2-384
904,515 UART: [kat] SHA2-512-ACC
906,416 UART: [kat] ECC-384
916,253 UART: [kat] HMAC-384Kdf
920,815 UART: [kat] LMS
1,169,127 UART: [kat] --
1,170,028 UART: [cold-reset] ++
1,170,374 UART: [fht] FHT @ 0x50003400
1,172,920 UART: [idev] ++
1,173,088 UART: [idev] CDI.KEYID = 6
1,173,449 UART: [idev] SUBJECT.KEYID = 7
1,173,874 UART: [idev] UDS.KEYID = 0
1,181,946 UART: [idev] Erasing UDS.KEYID = 0
1,199,158 UART: [idev] Sha1 KeyId Algorithm
1,207,828 UART: [idev] --
1,208,897 UART: [ldev] ++
1,209,065 UART: [ldev] CDI.KEYID = 6
1,209,429 UART: [ldev] SUBJECT.KEYID = 5
1,209,856 UART: [ldev] AUTHORITY.KEYID = 7
1,210,319 UART: [ldev] FE.KEYID = 1
1,215,273 UART: [ldev] Erasing FE.KEYID = 1
1,241,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,287 UART: [ldev] --
1,280,795 UART: [fwproc] Wait for Commands...
1,281,542 UART: [fwproc] Recv command 0x4d454153
1,285,569 >>> mbox cmd response data (12 bytes)
1,285,570 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,783 UART: [fwproc] Recv command 0x4d454153
1,289,810 >>> mbox cmd response data (12 bytes)
1,289,811 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,968 UART: [fwproc] Recv command 0x4d454153
1,293,995 >>> mbox cmd response data (12 bytes)
1,293,996 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,149 UART: [fwproc] Recv command 0x4d454153
1,298,176 >>> mbox cmd response data (12 bytes)
1,298,177 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,408 UART: [fwproc] Recv command 0x4d454153
1,302,435 >>> mbox cmd response data (12 bytes)
1,302,436 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,615 UART: [fwproc] Recv command 0x4d454153
1,306,642 >>> mbox cmd response data (12 bytes)
1,306,643 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,716 UART: [fwproc] Recv command 0x4d454153
1,310,743 >>> mbox cmd response data (12 bytes)
1,310,744 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,025 UART: [fwproc] Recv command 0x4d454153
1,315,052 >>> mbox cmd response data (12 bytes)
1,315,053 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,315,236 UART: [fwproc] Recv command 0x4d454153
1,315,979 UART: [fwproc] Max # of measurements received.
1,316,624 >>> mbox cmd response: failed
1,317,128 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,637 >>> mbox cmd response data (12 bytes)
1,140,638 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,157 >>> mbox cmd response data (12 bytes)
1,144,158 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,759 >>> mbox cmd response data (12 bytes)
1,147,760 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,369 >>> mbox cmd response data (12 bytes)
1,151,370 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,901 >>> mbox cmd response data (12 bytes)
1,154,902 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,309 >>> mbox cmd response data (12 bytes)
1,158,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,807 >>> mbox cmd response data (12 bytes)
1,161,808 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,223 >>> mbox cmd response data (12 bytes)
1,165,224 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,319 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Unprovisioned
86,099 UART: [state] DebugLocked = No
86,619 UART: [state] WD Timer not started. Device not locked for debugging
87,966 UART: [kat] SHA2-256
891,516 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,645 UART: [kat] ++
895,797 UART: [kat] sha1
900,005 UART: [kat] SHA2-256
901,945 UART: [kat] SHA2-384
904,508 UART: [kat] SHA2-512-ACC
906,409 UART: [kat] ECC-384
915,892 UART: [kat] HMAC-384Kdf
920,586 UART: [kat] LMS
1,168,898 UART: [kat] --
1,169,457 UART: [cold-reset] ++
1,169,797 UART: [fht] FHT @ 0x50003400
1,172,443 UART: [idev] ++
1,172,611 UART: [idev] CDI.KEYID = 6
1,172,972 UART: [idev] SUBJECT.KEYID = 7
1,173,397 UART: [idev] UDS.KEYID = 0
1,181,769 UART: [idev] Erasing UDS.KEYID = 0
1,198,371 UART: [idev] Sha1 KeyId Algorithm
1,207,191 UART: [idev] --
1,208,332 UART: [ldev] ++
1,208,500 UART: [ldev] CDI.KEYID = 6
1,208,864 UART: [ldev] SUBJECT.KEYID = 5
1,209,291 UART: [ldev] AUTHORITY.KEYID = 7
1,209,754 UART: [ldev] FE.KEYID = 1
1,214,918 UART: [ldev] Erasing FE.KEYID = 1
1,241,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,538 UART: [ldev] --
1,280,986 UART: [fwproc] Wait for Commands...
1,281,683 UART: [fwproc] Recv command 0x4d454153
1,285,710 >>> mbox cmd response data (12 bytes)
1,285,711 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,808 UART: [fwproc] Recv command 0x4d454153
1,289,835 >>> mbox cmd response data (12 bytes)
1,289,836 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,007 UART: [fwproc] Recv command 0x4d454153
1,294,034 >>> mbox cmd response data (12 bytes)
1,294,035 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,252 UART: [fwproc] Recv command 0x4d454153
1,298,279 >>> mbox cmd response data (12 bytes)
1,298,280 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,507 UART: [fwproc] Recv command 0x4d454153
1,302,534 >>> mbox cmd response data (12 bytes)
1,302,535 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,806 UART: [fwproc] Recv command 0x4d454153
1,306,833 >>> mbox cmd response data (12 bytes)
1,306,834 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,897 UART: [fwproc] Recv command 0x4d454153
1,310,924 >>> mbox cmd response data (12 bytes)
1,310,925 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,116 UART: [fwproc] Recv command 0x4d454153
1,315,143 >>> mbox cmd response data (12 bytes)
1,315,144 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,315,265 UART: [fwproc] Recv command 0x4d454153
1,316,008 UART: [fwproc] Max # of measurements received.
1,316,653 >>> mbox cmd response: failed
1,317,025 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,636 >>> mbox cmd response data (12 bytes)
1,140,637 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,194 >>> mbox cmd response data (12 bytes)
1,144,195 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,782 >>> mbox cmd response data (12 bytes)
1,147,783 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,396 >>> mbox cmd response data (12 bytes)
1,151,397 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,774 >>> mbox cmd response data (12 bytes)
1,154,775 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,312 >>> mbox cmd response data (12 bytes)
1,158,313 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,808 >>> mbox cmd response data (12 bytes)
1,161,809 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,296 >>> mbox cmd response data (12 bytes)
1,165,297 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,416 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,843 UART: [state] LifecycleState = Unprovisioned
86,498 UART: [state] DebugLocked = No
87,000 UART: [state] WD Timer not started. Device not locked for debugging
88,331 UART: [kat] SHA2-256
891,881 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,010 UART: [kat] ++
896,162 UART: [kat] sha1
900,354 UART: [kat] SHA2-256
902,294 UART: [kat] SHA2-384
905,057 UART: [kat] SHA2-512-ACC
906,958 UART: [kat] ECC-384
916,615 UART: [kat] HMAC-384Kdf
921,195 UART: [kat] LMS
1,169,507 UART: [kat] --
1,170,494 UART: [cold-reset] ++
1,170,952 UART: [fht] FHT @ 0x50003400
1,173,562 UART: [idev] ++
1,173,730 UART: [idev] CDI.KEYID = 6
1,174,091 UART: [idev] SUBJECT.KEYID = 7
1,174,516 UART: [idev] UDS.KEYID = 0
1,182,386 UART: [idev] Erasing UDS.KEYID = 0
1,199,316 UART: [idev] Sha1 KeyId Algorithm
1,208,126 UART: [idev] --
1,209,111 UART: [ldev] ++
1,209,279 UART: [ldev] CDI.KEYID = 6
1,209,643 UART: [ldev] SUBJECT.KEYID = 5
1,210,070 UART: [ldev] AUTHORITY.KEYID = 7
1,210,533 UART: [ldev] FE.KEYID = 1
1,215,773 UART: [ldev] Erasing FE.KEYID = 1
1,242,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,559 UART: [ldev] --
1,281,841 UART: [fwproc] Wait for Commands...
1,282,502 UART: [fwproc] Recv command 0x4d454153
1,286,529 >>> mbox cmd response data (12 bytes)
1,286,530 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,745 UART: [fwproc] Recv command 0x4d454153
1,290,772 >>> mbox cmd response data (12 bytes)
1,290,773 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,042 UART: [fwproc] Recv command 0x4d454153
1,295,069 >>> mbox cmd response data (12 bytes)
1,295,070 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,155 UART: [fwproc] Recv command 0x4d454153
1,299,182 >>> mbox cmd response data (12 bytes)
1,299,183 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,386 UART: [fwproc] Recv command 0x4d454153
1,303,413 >>> mbox cmd response data (12 bytes)
1,303,414 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,723 UART: [fwproc] Recv command 0x4d454153
1,307,750 >>> mbox cmd response data (12 bytes)
1,307,751 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,006 UART: [fwproc] Recv command 0x4d454153
1,312,033 >>> mbox cmd response data (12 bytes)
1,312,034 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,159 UART: [fwproc] Recv command 0x4d454153
1,316,186 >>> mbox cmd response data (12 bytes)
1,316,187 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,440 UART: [fwproc] Recv command 0x4d454153
1,317,183 UART: [fwproc] Max # of measurements received.
1,317,828 >>> mbox cmd response: failed
1,318,158 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,487 >>> mbox cmd response data (12 bytes)
1,141,488 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,897 >>> mbox cmd response data (12 bytes)
1,144,898 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,301 >>> mbox cmd response data (12 bytes)
1,148,302 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,781 >>> mbox cmd response data (12 bytes)
1,151,782 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,225 >>> mbox cmd response data (12 bytes)
1,155,226 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,685 >>> mbox cmd response data (12 bytes)
1,158,686 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,057 >>> mbox cmd response data (12 bytes)
1,162,058 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,625 >>> mbox cmd response data (12 bytes)
1,165,626 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,893 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,329 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
891,058 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,187 UART: [kat] ++
895,339 UART: [kat] sha1
899,579 UART: [kat] SHA2-256
901,519 UART: [kat] SHA2-384
904,168 UART: [kat] SHA2-512-ACC
906,069 UART: [kat] ECC-384
915,914 UART: [kat] HMAC-384Kdf
920,432 UART: [kat] LMS
1,168,744 UART: [kat] --
1,169,601 UART: [cold-reset] ++
1,169,937 UART: [fht] FHT @ 0x50003400
1,172,691 UART: [idev] ++
1,172,859 UART: [idev] CDI.KEYID = 6
1,173,220 UART: [idev] SUBJECT.KEYID = 7
1,173,645 UART: [idev] UDS.KEYID = 0
1,181,575 UART: [idev] Erasing UDS.KEYID = 0
1,198,473 UART: [idev] Sha1 KeyId Algorithm
1,207,339 UART: [idev] --
1,208,370 UART: [ldev] ++
1,208,538 UART: [ldev] CDI.KEYID = 6
1,208,902 UART: [ldev] SUBJECT.KEYID = 5
1,209,329 UART: [ldev] AUTHORITY.KEYID = 7
1,209,792 UART: [ldev] FE.KEYID = 1
1,214,686 UART: [ldev] Erasing FE.KEYID = 1
1,240,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,596 UART: [ldev] --
1,280,022 UART: [fwproc] Wait for Commands...
1,280,829 UART: [fwproc] Recv command 0x4d454153
1,284,856 >>> mbox cmd response data (12 bytes)
1,284,857 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,120 UART: [fwproc] Recv command 0x4d454153
1,289,147 >>> mbox cmd response data (12 bytes)
1,289,148 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,297 UART: [fwproc] Recv command 0x4d454153
1,293,324 >>> mbox cmd response data (12 bytes)
1,293,325 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,502 UART: [fwproc] Recv command 0x4d454153
1,297,529 >>> mbox cmd response data (12 bytes)
1,297,530 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,767 UART: [fwproc] Recv command 0x4d454153
1,301,794 >>> mbox cmd response data (12 bytes)
1,301,795 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,301,998 UART: [fwproc] Recv command 0x4d454153
1,306,025 >>> mbox cmd response data (12 bytes)
1,306,026 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,241 UART: [fwproc] Recv command 0x4d454153
1,310,268 >>> mbox cmd response data (12 bytes)
1,310,269 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,362 UART: [fwproc] Recv command 0x4d454153
1,314,389 >>> mbox cmd response data (12 bytes)
1,314,390 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,314,703 UART: [fwproc] Recv command 0x4d454153
1,315,446 UART: [fwproc] Max # of measurements received.
1,316,091 >>> mbox cmd response: failed
1,316,555 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,672 >>> mbox cmd response data (12 bytes)
1,138,673 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,084 >>> mbox cmd response data (12 bytes)
1,142,085 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,568 >>> mbox cmd response data (12 bytes)
1,145,569 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,180 >>> mbox cmd response data (12 bytes)
1,149,181 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,710 >>> mbox cmd response data (12 bytes)
1,152,711 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,126 >>> mbox cmd response data (12 bytes)
1,156,127 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,610 >>> mbox cmd response data (12 bytes)
1,159,611 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,142 >>> mbox cmd response data (12 bytes)
1,163,143 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,296 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
891,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,590 UART: [kat] ++
895,742 UART: [kat] sha1
900,128 UART: [kat] SHA2-256
902,068 UART: [kat] SHA2-384
904,827 UART: [kat] SHA2-512-ACC
906,728 UART: [kat] ECC-384
916,871 UART: [kat] HMAC-384Kdf
921,557 UART: [kat] LMS
1,169,869 UART: [kat] --
1,170,682 UART: [cold-reset] ++
1,171,184 UART: [fht] FHT @ 0x50003400
1,173,648 UART: [idev] ++
1,173,816 UART: [idev] CDI.KEYID = 6
1,174,177 UART: [idev] SUBJECT.KEYID = 7
1,174,602 UART: [idev] UDS.KEYID = 0
1,182,412 UART: [idev] Erasing UDS.KEYID = 0
1,199,872 UART: [idev] Sha1 KeyId Algorithm
1,208,904 UART: [idev] --
1,209,727 UART: [ldev] ++
1,209,895 UART: [ldev] CDI.KEYID = 6
1,210,259 UART: [ldev] SUBJECT.KEYID = 5
1,210,686 UART: [ldev] AUTHORITY.KEYID = 7
1,211,149 UART: [ldev] FE.KEYID = 1
1,216,179 UART: [ldev] Erasing FE.KEYID = 1
1,242,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,661 UART: [ldev] --
1,282,039 UART: [fwproc] Wait for Commands...
1,282,664 UART: [fwproc] Recv command 0x4d454153
1,286,691 >>> mbox cmd response data (12 bytes)
1,286,692 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,999 UART: [fwproc] Recv command 0x4d454153
1,291,026 >>> mbox cmd response data (12 bytes)
1,291,027 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,140 UART: [fwproc] Recv command 0x4d454153
1,295,167 >>> mbox cmd response data (12 bytes)
1,295,168 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,317 UART: [fwproc] Recv command 0x4d454153
1,299,344 >>> mbox cmd response data (12 bytes)
1,299,345 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,510 UART: [fwproc] Recv command 0x4d454153
1,303,537 >>> mbox cmd response data (12 bytes)
1,303,538 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,767 UART: [fwproc] Recv command 0x4d454153
1,307,794 >>> mbox cmd response data (12 bytes)
1,307,795 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,104 UART: [fwproc] Recv command 0x4d454153
1,312,131 >>> mbox cmd response data (12 bytes)
1,312,132 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,391 UART: [fwproc] Recv command 0x4d454153
1,316,418 >>> mbox cmd response data (12 bytes)
1,316,419 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,516 UART: [fwproc] Recv command 0x4d454153
1,317,259 UART: [fwproc] Max # of measurements received.
1,317,904 >>> mbox cmd response: failed
1,318,266 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,179 >>> mbox cmd response data (12 bytes)
1,140,180 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,681 >>> mbox cmd response data (12 bytes)
1,143,682 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,073 >>> mbox cmd response data (12 bytes)
1,147,074 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,601 >>> mbox cmd response data (12 bytes)
1,150,602 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,149 >>> mbox cmd response data (12 bytes)
1,154,150 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,701 >>> mbox cmd response data (12 bytes)
1,157,702 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,309 >>> mbox cmd response data (12 bytes)
1,161,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,923 >>> mbox cmd response data (12 bytes)
1,164,924 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,053 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,325 UART: [kat] ++
895,477 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,386 UART: [kat] SHA2-512-ACC
906,287 UART: [kat] ECC-384
916,194 UART: [kat] HMAC-384Kdf
920,774 UART: [kat] LMS
1,169,086 UART: [kat] --
1,170,133 UART: [cold-reset] ++
1,170,555 UART: [fht] FHT @ 0x50003400
1,173,103 UART: [idev] ++
1,173,271 UART: [idev] CDI.KEYID = 6
1,173,632 UART: [idev] SUBJECT.KEYID = 7
1,174,057 UART: [idev] UDS.KEYID = 0
1,181,717 UART: [idev] Erasing UDS.KEYID = 0
1,198,609 UART: [idev] Sha1 KeyId Algorithm
1,207,671 UART: [idev] --
1,208,784 UART: [ldev] ++
1,208,952 UART: [ldev] CDI.KEYID = 6
1,209,316 UART: [ldev] SUBJECT.KEYID = 5
1,209,743 UART: [ldev] AUTHORITY.KEYID = 7
1,210,206 UART: [ldev] FE.KEYID = 1
1,215,192 UART: [ldev] Erasing FE.KEYID = 1
1,242,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,880 UART: [ldev] --
1,281,322 UART: [fwproc] Wait for Commands...
1,281,997 UART: [fwproc] Recv command 0x46574c44
1,282,730 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,212 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,897 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,593 >>> mbox cmd response: success
2,741,636 UART: [afmc] ++
2,741,804 UART: [afmc] CDI.KEYID = 6
2,742,167 UART: [afmc] SUBJECT.KEYID = 7
2,742,593 UART: [afmc] AUTHORITY.KEYID = 5
2,778,444 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,236 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,987 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,683 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,582 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,275 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,235 UART: [afmc] --
2,822,301 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,822,323 UART: [cold-reset] --
2,823,155 UART: [state] Locking Datavault
2,824,208 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,812 UART: [state] Locking ICCM
2,825,282 UART: [exit] Launching FMC @ 0x40000000
2,830,579 UART:
2,830,595 UART: Running Caliptra FMC ...
2,831,003 UART:
2,831,233 UART: [fmc] Received command: 0x10000009
2,832,431 >>> mbox cmd response data (48 bytes)
2,832,432 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,832,461 UART: [fmc] Received command: 0x1000000A
2,833,201 >>> mbox cmd response data (0 bytes)
2,833,202 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,833,231 UART: [fmc] Received command: 0x10000003
2,842,687 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,631 >>> mbox cmd response: success
2,647,852 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,653,745 UART:
2,653,761 UART: Running Caliptra FMC ...
2,654,169 UART:
2,654,399 UART: [fmc] Received command: 0x10000009
2,655,597 >>> mbox cmd response data (48 bytes)
2,655,598 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,627 UART: [fmc] Received command: 0x1000000A
2,656,367 >>> mbox cmd response data (0 bytes)
2,656,368 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,656,397 UART: [fmc] Received command: 0x10000003
2,665,853 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,139 UART: [kat] SHA2-256
891,689 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,818 UART: [kat] ++
895,970 UART: [kat] sha1
900,364 UART: [kat] SHA2-256
902,304 UART: [kat] SHA2-384
905,191 UART: [kat] SHA2-512-ACC
907,092 UART: [kat] ECC-384
917,267 UART: [kat] HMAC-384Kdf
921,963 UART: [kat] LMS
1,170,275 UART: [kat] --
1,171,110 UART: [cold-reset] ++
1,171,612 UART: [fht] FHT @ 0x50003400
1,174,384 UART: [idev] ++
1,174,552 UART: [idev] CDI.KEYID = 6
1,174,913 UART: [idev] SUBJECT.KEYID = 7
1,175,338 UART: [idev] UDS.KEYID = 0
1,183,464 UART: [idev] Erasing UDS.KEYID = 0
1,200,678 UART: [idev] Sha1 KeyId Algorithm
1,209,704 UART: [idev] --
1,210,789 UART: [ldev] ++
1,210,957 UART: [ldev] CDI.KEYID = 6
1,211,321 UART: [ldev] SUBJECT.KEYID = 5
1,211,748 UART: [ldev] AUTHORITY.KEYID = 7
1,212,211 UART: [ldev] FE.KEYID = 1
1,217,621 UART: [ldev] Erasing FE.KEYID = 1
1,243,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,221 UART: [ldev] --
1,283,585 UART: [fwproc] Wait for Commands...
1,284,254 UART: [fwproc] Recv command 0x46574c44
1,284,987 UART: [fwproc] Recv'd Img size: 111916 bytes
2,555,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,582,885 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,744,402 >>> mbox cmd response: success
2,745,571 UART: [afmc] ++
2,745,739 UART: [afmc] CDI.KEYID = 6
2,746,102 UART: [afmc] SUBJECT.KEYID = 7
2,746,528 UART: [afmc] AUTHORITY.KEYID = 5
2,782,717 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,799,209 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,799,960 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,805,656 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,811,555 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,817,248 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,825,106 UART: [afmc] --
2,826,098 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,826,120 UART: [cold-reset] --
2,826,978 UART: [state] Locking Datavault
2,828,385 UART: [state] Locking PCR0, PCR1 and PCR31
2,828,989 UART: [state] Locking ICCM
2,829,653 UART: [exit] Launching FMC @ 0x40000000
2,834,950 UART:
2,834,966 UART: Running Caliptra FMC ...
2,835,374 UART:
2,835,604 UART: [fmc] Received command: 0x10000009
2,836,802 >>> mbox cmd response data (48 bytes)
2,836,803 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,836,832 UART: [fmc] Received command: 0x1000000A
2,837,572 >>> mbox cmd response data (0 bytes)
2,837,573 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,837,602 UART: [fmc] Received command: 0x10000003
2,847,058 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,592,196 >>> mbox cmd response: success
2,648,021 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,654,294 UART:
2,654,310 UART: Running Caliptra FMC ...
2,654,718 UART:
2,654,948 UART: [fmc] Received command: 0x10000009
2,656,146 >>> mbox cmd response data (48 bytes)
2,656,147 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,656,176 UART: [fmc] Received command: 0x1000000A
2,656,916 >>> mbox cmd response data (0 bytes)
2,656,917 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,656,946 UART: [fmc] Received command: 0x10000003
2,666,402 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,542 UART: [kat] SHA2-256
891,092 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,221 UART: [kat] ++
895,373 UART: [kat] sha1
899,503 UART: [kat] SHA2-256
901,443 UART: [kat] SHA2-384
904,298 UART: [kat] SHA2-512-ACC
906,199 UART: [kat] ECC-384
915,804 UART: [kat] HMAC-384Kdf
920,304 UART: [kat] LMS
1,168,616 UART: [kat] --
1,169,461 UART: [cold-reset] ++
1,169,799 UART: [fht] FHT @ 0x50003400
1,172,537 UART: [idev] ++
1,172,705 UART: [idev] CDI.KEYID = 6
1,173,066 UART: [idev] SUBJECT.KEYID = 7
1,173,491 UART: [idev] UDS.KEYID = 0
1,181,609 UART: [idev] Erasing UDS.KEYID = 0
1,199,655 UART: [idev] Sha1 KeyId Algorithm
1,208,543 UART: [idev] --
1,209,662 UART: [ldev] ++
1,209,830 UART: [ldev] CDI.KEYID = 6
1,210,194 UART: [ldev] SUBJECT.KEYID = 5
1,210,621 UART: [ldev] AUTHORITY.KEYID = 7
1,211,084 UART: [ldev] FE.KEYID = 1
1,216,390 UART: [ldev] Erasing FE.KEYID = 1
1,242,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,020 UART: [ldev] --
1,282,494 UART: [fwproc] Wait for Commands...
1,283,319 UART: [fwproc] Recv command 0x46574c44
1,284,052 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,308 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,993 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,742,789 >>> mbox cmd response: success
2,743,904 UART: [afmc] ++
2,744,072 UART: [afmc] CDI.KEYID = 6
2,744,435 UART: [afmc] SUBJECT.KEYID = 7
2,744,861 UART: [afmc] AUTHORITY.KEYID = 5
2,780,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,068 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,819 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,515 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,414 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,107 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,873 UART: [afmc] --
2,823,919 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,823,941 UART: [cold-reset] --
2,824,873 UART: [state] Locking Datavault
2,825,940 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,544 UART: [state] Locking ICCM
2,827,174 UART: [exit] Launching FMC @ 0x40000000
2,832,471 UART:
2,832,487 UART: Running Caliptra FMC ...
2,832,895 UART:
2,833,125 UART: [fmc] Received command: 0x10000009
2,834,323 >>> mbox cmd response data (48 bytes)
2,834,324 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,834,353 UART: [fmc] Received command: 0x1000000A
2,835,093 >>> mbox cmd response data (0 bytes)
2,835,094 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,835,123 UART: [fmc] Received command: 0x10000003
2,844,579 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,989 >>> mbox cmd response: success
2,647,024 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,653,369 UART:
2,653,385 UART: Running Caliptra FMC ...
2,653,793 UART:
2,654,023 UART: [fmc] Received command: 0x10000009
2,655,221 >>> mbox cmd response data (48 bytes)
2,655,222 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,251 UART: [fmc] Received command: 0x1000000A
2,655,991 >>> mbox cmd response data (0 bytes)
2,655,992 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,656,021 UART: [fmc] Received command: 0x10000003
2,665,477 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
87,018 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [kat] SHA2-256
891,757 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,886 UART: [kat] ++
896,038 UART: [kat] sha1
900,230 UART: [kat] SHA2-256
902,170 UART: [kat] SHA2-384
904,941 UART: [kat] SHA2-512-ACC
906,842 UART: [kat] ECC-384
916,647 UART: [kat] HMAC-384Kdf
921,293 UART: [kat] LMS
1,169,605 UART: [kat] --
1,170,194 UART: [cold-reset] ++
1,170,588 UART: [fht] FHT @ 0x50003400
1,173,328 UART: [idev] ++
1,173,496 UART: [idev] CDI.KEYID = 6
1,173,857 UART: [idev] SUBJECT.KEYID = 7
1,174,282 UART: [idev] UDS.KEYID = 0
1,182,146 UART: [idev] Erasing UDS.KEYID = 0
1,199,020 UART: [idev] Sha1 KeyId Algorithm
1,207,792 UART: [idev] --
1,208,969 UART: [ldev] ++
1,209,137 UART: [ldev] CDI.KEYID = 6
1,209,501 UART: [ldev] SUBJECT.KEYID = 5
1,209,928 UART: [ldev] AUTHORITY.KEYID = 7
1,210,391 UART: [ldev] FE.KEYID = 1
1,215,931 UART: [ldev] Erasing FE.KEYID = 1
1,243,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,093 UART: [ldev] --
1,282,591 UART: [fwproc] Wait for Commands...
1,283,402 UART: [fwproc] Recv command 0x46574c44
1,284,135 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,393 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,078 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,842 >>> mbox cmd response: success
2,742,909 UART: [afmc] ++
2,743,077 UART: [afmc] CDI.KEYID = 6
2,743,440 UART: [afmc] SUBJECT.KEYID = 7
2,743,866 UART: [afmc] AUTHORITY.KEYID = 5
2,779,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,464 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,160 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,059 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,752 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,686 UART: [afmc] --
2,822,612 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,822,634 UART: [cold-reset] --
2,823,548 UART: [state] Locking Datavault
2,824,695 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,299 UART: [state] Locking ICCM
2,825,969 UART: [exit] Launching FMC @ 0x40000000
2,831,266 UART:
2,831,282 UART: Running Caliptra FMC ...
2,831,690 UART:
2,831,920 UART: [fmc] Received command: 0x10000009
2,833,118 >>> mbox cmd response data (48 bytes)
2,833,119 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,833,148 UART: [fmc] Received command: 0x1000000A
2,833,888 >>> mbox cmd response data (0 bytes)
2,833,889 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,833,918 UART: [fmc] Received command: 0x10000003
2,843,374 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,592,394 >>> mbox cmd response: success
2,649,187 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,655,416 UART:
2,655,432 UART: Running Caliptra FMC ...
2,655,840 UART:
2,656,070 UART: [fmc] Received command: 0x10000009
2,657,268 >>> mbox cmd response data (48 bytes)
2,657,269 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,657,298 UART: [fmc] Received command: 0x1000000A
2,658,038 >>> mbox cmd response data (0 bytes)
2,658,039 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,658,068 UART: [fmc] Received command: 0x10000003
2,667,524 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,456 UART: [state] LifecycleState = Unprovisioned
85,111 UART: [state] DebugLocked = No
85,821 UART: [state] WD Timer not started. Device not locked for debugging
86,936 UART: [kat] SHA2-256
890,486 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,615 UART: [kat] ++
894,767 UART: [kat] sha1
899,159 UART: [kat] SHA2-256
901,099 UART: [kat] SHA2-384
903,956 UART: [kat] SHA2-512-ACC
905,857 UART: [kat] ECC-384
915,320 UART: [kat] HMAC-384Kdf
919,900 UART: [kat] LMS
1,168,212 UART: [kat] --
1,169,015 UART: [cold-reset] ++
1,169,583 UART: [fht] FHT @ 0x50003400
1,172,305 UART: [idev] ++
1,172,473 UART: [idev] CDI.KEYID = 6
1,172,834 UART: [idev] SUBJECT.KEYID = 7
1,173,259 UART: [idev] UDS.KEYID = 0
1,181,339 UART: [idev] Erasing UDS.KEYID = 0
1,198,935 UART: [idev] Sha1 KeyId Algorithm
1,207,803 UART: [idev] --
1,208,822 UART: [ldev] ++
1,208,990 UART: [ldev] CDI.KEYID = 6
1,209,354 UART: [ldev] SUBJECT.KEYID = 5
1,209,781 UART: [ldev] AUTHORITY.KEYID = 7
1,210,244 UART: [ldev] FE.KEYID = 1
1,215,392 UART: [ldev] Erasing FE.KEYID = 1
1,241,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,534 UART: [ldev] --
1,281,028 UART: [fwproc] Wait for Commands...
1,281,619 UART: [fwproc] Recv command 0x46574c44
1,282,352 UART: [fwproc] Recv'd Img size: 111916 bytes
2,550,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,338 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,023 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,739,919 >>> mbox cmd response: success
2,741,036 UART: [afmc] ++
2,741,204 UART: [afmc] CDI.KEYID = 6
2,741,567 UART: [afmc] SUBJECT.KEYID = 7
2,741,993 UART: [afmc] AUTHORITY.KEYID = 5
2,776,924 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,440 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,191 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,887 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,786 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,479 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,345 UART: [afmc] --
2,820,441 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,820,463 UART: [cold-reset] --
2,821,257 UART: [state] Locking Datavault
2,822,466 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,070 UART: [state] Locking ICCM
2,823,502 UART: [exit] Launching FMC @ 0x40000000
2,828,799 UART:
2,828,815 UART: Running Caliptra FMC ...
2,829,223 UART:
2,829,453 UART: [fmc] Received command: 0x10000009
2,830,651 >>> mbox cmd response data (48 bytes)
2,830,652 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,830,681 UART: [fmc] Received command: 0x1000000A
2,831,421 >>> mbox cmd response data (0 bytes)
2,831,422 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,831,451 UART: [fmc] Received command: 0x10000003
2,840,907 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,588,725 >>> mbox cmd response: success
2,644,550 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,650,697 UART:
2,650,713 UART: Running Caliptra FMC ...
2,651,121 UART:
2,651,351 UART: [fmc] Received command: 0x10000009
2,652,549 >>> mbox cmd response data (48 bytes)
2,652,550 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,652,579 UART: [fmc] Received command: 0x1000000A
2,653,319 >>> mbox cmd response data (0 bytes)
2,653,320 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,653,349 UART: [fmc] Received command: 0x10000003
2,662,805 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
891,395 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,524 UART: [kat] ++
895,676 UART: [kat] sha1
900,040 UART: [kat] SHA2-256
901,980 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
916,217 UART: [kat] HMAC-384Kdf
920,925 UART: [kat] LMS
1,169,237 UART: [kat] --
1,170,272 UART: [cold-reset] ++
1,170,724 UART: [fht] FHT @ 0x50003400
1,173,300 UART: [idev] ++
1,173,468 UART: [idev] CDI.KEYID = 6
1,173,829 UART: [idev] SUBJECT.KEYID = 7
1,174,254 UART: [idev] UDS.KEYID = 0
1,182,330 UART: [idev] Erasing UDS.KEYID = 0
1,199,686 UART: [idev] Sha1 KeyId Algorithm
1,208,534 UART: [idev] --
1,209,521 UART: [ldev] ++
1,209,689 UART: [ldev] CDI.KEYID = 6
1,210,053 UART: [ldev] SUBJECT.KEYID = 5
1,210,480 UART: [ldev] AUTHORITY.KEYID = 7
1,210,943 UART: [ldev] FE.KEYID = 1
1,216,409 UART: [ldev] Erasing FE.KEYID = 1
1,243,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,299 UART: [ldev] --
1,282,615 UART: [fwproc] Wait for Commands...
1,283,364 UART: [fwproc] Recv command 0x46574c44
1,284,097 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,715 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,951 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,636 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,743,466 >>> mbox cmd response: success
2,744,481 UART: [afmc] ++
2,744,649 UART: [afmc] CDI.KEYID = 6
2,745,012 UART: [afmc] SUBJECT.KEYID = 7
2,745,438 UART: [afmc] AUTHORITY.KEYID = 5
2,781,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,529 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,280 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,976 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,875 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,568 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,588 UART: [afmc] --
2,824,694 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,824,716 UART: [cold-reset] --
2,825,824 UART: [state] Locking Datavault
2,827,011 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,615 UART: [state] Locking ICCM
2,828,167 UART: [exit] Launching FMC @ 0x40000000
2,833,464 UART:
2,833,480 UART: Running Caliptra FMC ...
2,833,888 UART:
2,834,118 UART: [fmc] Received command: 0x10000009
2,835,316 >>> mbox cmd response data (48 bytes)
2,835,317 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,835,346 UART: [fmc] Received command: 0x1000000A
2,836,086 >>> mbox cmd response data (0 bytes)
2,836,087 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,836,116 UART: [fmc] Received command: 0x10000003
2,845,572 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,302 >>> mbox cmd response: success
2,647,843 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,653,780 UART:
2,653,796 UART: Running Caliptra FMC ...
2,654,204 UART:
2,654,434 UART: [fmc] Received command: 0x10000009
2,655,632 >>> mbox cmd response data (48 bytes)
2,655,633 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,662 UART: [fmc] Received command: 0x1000000A
2,656,402 >>> mbox cmd response data (0 bytes)
2,656,403 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,656,432 UART: [fmc] Received command: 0x10000003
2,665,888 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,601 UART: [state] WD Timer not started. Device not locked for debugging
87,780 UART: [kat] SHA2-256
891,330 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,459 UART: [kat] ++
895,611 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,420 UART: [kat] SHA2-512-ACC
906,321 UART: [kat] ECC-384
915,814 UART: [kat] HMAC-384Kdf
920,500 UART: [kat] LMS
1,168,812 UART: [kat] --
1,169,745 UART: [cold-reset] ++
1,170,081 UART: [fht] FHT @ 0x50003400
1,172,723 UART: [idev] ++
1,172,891 UART: [idev] CDI.KEYID = 6
1,173,252 UART: [idev] SUBJECT.KEYID = 7
1,173,677 UART: [idev] UDS.KEYID = 0
1,181,603 UART: [idev] Erasing UDS.KEYID = 0
1,198,805 UART: [idev] Sha1 KeyId Algorithm
1,207,749 UART: [idev] --
1,208,982 UART: [ldev] ++
1,209,150 UART: [ldev] CDI.KEYID = 6
1,209,514 UART: [ldev] SUBJECT.KEYID = 5
1,209,941 UART: [ldev] AUTHORITY.KEYID = 7
1,210,404 UART: [ldev] FE.KEYID = 1
1,215,660 UART: [ldev] Erasing FE.KEYID = 1
1,242,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,910 UART: [ldev] --
1,281,410 UART: [fwproc] Wait for Commands...
1,282,201 UART: [fwproc] Recv command 0x4d454153
1,286,228 >>> mbox cmd response data (12 bytes)
1,286,229 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,286,364 UART: [fwproc] Recv command 0x46574c44
1,287,097 UART: [fwproc] Recv'd Img size: 111916 bytes
2,556,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,582,835 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,520 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,744,308 >>> mbox cmd response: success
2,745,413 UART: [afmc] ++
2,745,581 UART: [afmc] CDI.KEYID = 6
2,745,944 UART: [afmc] SUBJECT.KEYID = 7
2,746,370 UART: [afmc] AUTHORITY.KEYID = 5
2,782,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,798,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,799,190 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,804,886 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,810,785 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,816,478 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,824,326 UART: [afmc] --
2,825,224 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,825,246 UART: [cold-reset] --
2,826,010 UART: [state] Locking Datavault
2,827,163 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,767 UART: [state] Locking ICCM
2,828,319 UART: [exit] Launching FMC @ 0x40000000
2,833,616 UART:
2,833,632 UART: Running Caliptra FMC ...
2,834,040 UART:
2,834,270 UART: [fmc] Received command: 0x1000000A
2,835,699 >>> mbox cmd response data (116 bytes)
2,835,700 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,835,729 UART: [fmc] Received command: 0x10000009
2,836,927 >>> mbox cmd response data (48 bytes)
2,836,928 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,836,957 UART: [fmc] Received command: 0x10000003
2,846,413 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,354 >>> mbox cmd response data (12 bytes)
1,140,355 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,594,457 >>> mbox cmd response: success
2,650,684 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,656,599 UART:
2,656,615 UART: Running Caliptra FMC ...
2,657,023 UART:
2,657,253 UART: [fmc] Received command: 0x1000000A
2,658,682 >>> mbox cmd response data (116 bytes)
2,658,683 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,658,712 UART: [fmc] Received command: 0x10000009
2,659,910 >>> mbox cmd response data (48 bytes)
2,659,911 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,659,940 UART: [fmc] Received command: 0x10000003
2,669,396 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,565 UART: [kat] SHA2-256
891,115 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,244 UART: [kat] ++
895,396 UART: [kat] sha1
899,814 UART: [kat] SHA2-256
901,754 UART: [kat] SHA2-384
904,309 UART: [kat] SHA2-512-ACC
906,210 UART: [kat] ECC-384
916,439 UART: [kat] HMAC-384Kdf
920,933 UART: [kat] LMS
1,169,245 UART: [kat] --
1,170,306 UART: [cold-reset] ++
1,170,746 UART: [fht] FHT @ 0x50003400
1,173,416 UART: [idev] ++
1,173,584 UART: [idev] CDI.KEYID = 6
1,173,945 UART: [idev] SUBJECT.KEYID = 7
1,174,370 UART: [idev] UDS.KEYID = 0
1,182,184 UART: [idev] Erasing UDS.KEYID = 0
1,199,456 UART: [idev] Sha1 KeyId Algorithm
1,208,504 UART: [idev] --
1,209,471 UART: [ldev] ++
1,209,639 UART: [ldev] CDI.KEYID = 6
1,210,003 UART: [ldev] SUBJECT.KEYID = 5
1,210,430 UART: [ldev] AUTHORITY.KEYID = 7
1,210,893 UART: [ldev] FE.KEYID = 1
1,216,169 UART: [ldev] Erasing FE.KEYID = 1
1,242,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,395 UART: [ldev] --
1,281,797 UART: [fwproc] Wait for Commands...
1,282,548 UART: [fwproc] Recv command 0x4d454153
1,286,575 >>> mbox cmd response data (12 bytes)
1,286,576 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,286,839 UART: [fwproc] Recv command 0x46574c44
1,287,572 UART: [fwproc] Recv'd Img size: 111916 bytes
2,556,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,584,140 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,609,825 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,745,531 >>> mbox cmd response: success
2,746,670 UART: [afmc] ++
2,746,838 UART: [afmc] CDI.KEYID = 6
2,747,201 UART: [afmc] SUBJECT.KEYID = 7
2,747,627 UART: [afmc] AUTHORITY.KEYID = 5
2,783,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,800,482 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,801,233 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,806,929 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,812,828 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,818,521 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,826,347 UART: [afmc] --
2,827,397 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,827,419 UART: [cold-reset] --
2,828,229 UART: [state] Locking Datavault
2,829,222 UART: [state] Locking PCR0, PCR1 and PCR31
2,829,826 UART: [state] Locking ICCM
2,830,496 UART: [exit] Launching FMC @ 0x40000000
2,835,793 UART:
2,835,809 UART: Running Caliptra FMC ...
2,836,217 UART:
2,836,447 UART: [fmc] Received command: 0x1000000A
2,837,876 >>> mbox cmd response data (116 bytes)
2,837,877 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,837,906 UART: [fmc] Received command: 0x10000009
2,839,104 >>> mbox cmd response data (48 bytes)
2,839,105 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,839,134 UART: [fmc] Received command: 0x10000003
2,848,590 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,225 >>> mbox cmd response data (12 bytes)
1,140,226 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,595,584 >>> mbox cmd response: success
2,651,905 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,657,794 UART:
2,657,810 UART: Running Caliptra FMC ...
2,658,218 UART:
2,658,448 UART: [fmc] Received command: 0x1000000A
2,659,877 >>> mbox cmd response data (116 bytes)
2,659,878 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,659,907 UART: [fmc] Received command: 0x10000009
2,661,105 >>> mbox cmd response data (48 bytes)
2,661,106 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,661,135 UART: [fmc] Received command: 0x10000003
2,670,591 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,788 UART: [kat] SHA2-256
891,338 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,467 UART: [kat] ++
895,619 UART: [kat] sha1
899,801 UART: [kat] SHA2-256
901,741 UART: [kat] SHA2-384
904,456 UART: [kat] SHA2-512-ACC
906,357 UART: [kat] ECC-384
916,688 UART: [kat] HMAC-384Kdf
921,282 UART: [kat] LMS
1,169,594 UART: [kat] --
1,170,427 UART: [cold-reset] ++
1,170,981 UART: [fht] FHT @ 0x50003400
1,173,815 UART: [idev] ++
1,173,983 UART: [idev] CDI.KEYID = 6
1,174,344 UART: [idev] SUBJECT.KEYID = 7
1,174,769 UART: [idev] UDS.KEYID = 0
1,182,391 UART: [idev] Erasing UDS.KEYID = 0
1,199,363 UART: [idev] Sha1 KeyId Algorithm
1,208,321 UART: [idev] --
1,209,368 UART: [ldev] ++
1,209,536 UART: [ldev] CDI.KEYID = 6
1,209,900 UART: [ldev] SUBJECT.KEYID = 5
1,210,327 UART: [ldev] AUTHORITY.KEYID = 7
1,210,790 UART: [ldev] FE.KEYID = 1
1,216,002 UART: [ldev] Erasing FE.KEYID = 1
1,242,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,510 UART: [ldev] --
1,281,938 UART: [fwproc] Wait for Commands...
1,282,583 UART: [fwproc] Recv command 0x4d454153
1,286,610 >>> mbox cmd response data (12 bytes)
1,286,611 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,286,856 UART: [fwproc] Recv command 0x46574c44
1,287,589 UART: [fwproc] Recv'd Img size: 111916 bytes
2,556,757 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,584,193 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,609,878 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,745,668 >>> mbox cmd response: success
2,746,911 UART: [afmc] ++
2,747,079 UART: [afmc] CDI.KEYID = 6
2,747,442 UART: [afmc] SUBJECT.KEYID = 7
2,747,868 UART: [afmc] AUTHORITY.KEYID = 5
2,783,583 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,800,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,801,002 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,806,698 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,812,597 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,818,290 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,826,064 UART: [afmc] --
2,827,162 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,827,184 UART: [cold-reset] --
2,828,036 UART: [state] Locking Datavault
2,829,261 UART: [state] Locking PCR0, PCR1 and PCR31
2,829,865 UART: [state] Locking ICCM
2,830,367 UART: [exit] Launching FMC @ 0x40000000
2,835,664 UART:
2,835,680 UART: Running Caliptra FMC ...
2,836,088 UART:
2,836,318 UART: [fmc] Received command: 0x1000000A
2,837,747 >>> mbox cmd response data (116 bytes)
2,837,748 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,837,777 UART: [fmc] Received command: 0x10000009
2,838,975 >>> mbox cmd response data (48 bytes)
2,838,976 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,839,005 UART: [fmc] Received command: 0x10000003
2,848,461 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,882 >>> mbox cmd response data (12 bytes)
1,138,883 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,593,705 >>> mbox cmd response: success
2,649,582 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,727 UART:
2,655,743 UART: Running Caliptra FMC ...
2,656,151 UART:
2,656,381 UART: [fmc] Received command: 0x1000000A
2,657,810 >>> mbox cmd response data (116 bytes)
2,657,811 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,657,840 UART: [fmc] Received command: 0x10000009
2,659,038 >>> mbox cmd response data (48 bytes)
2,659,039 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,659,068 UART: [fmc] Received command: 0x10000003
2,668,524 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,750 UART: [kat] SHA2-256
901,690 UART: [kat] SHA2-384
904,447 UART: [kat] SHA2-512-ACC
906,348 UART: [kat] ECC-384
916,369 UART: [kat] HMAC-384Kdf
921,121 UART: [kat] LMS
1,169,433 UART: [kat] --
1,170,196 UART: [cold-reset] ++
1,170,774 UART: [fht] FHT @ 0x50003400
1,173,512 UART: [idev] ++
1,173,680 UART: [idev] CDI.KEYID = 6
1,174,041 UART: [idev] SUBJECT.KEYID = 7
1,174,466 UART: [idev] UDS.KEYID = 0
1,182,258 UART: [idev] Erasing UDS.KEYID = 0
1,199,434 UART: [idev] Sha1 KeyId Algorithm
1,208,256 UART: [idev] --
1,209,269 UART: [ldev] ++
1,209,437 UART: [ldev] CDI.KEYID = 6
1,209,801 UART: [ldev] SUBJECT.KEYID = 5
1,210,228 UART: [ldev] AUTHORITY.KEYID = 7
1,210,691 UART: [ldev] FE.KEYID = 1
1,215,943 UART: [ldev] Erasing FE.KEYID = 1
1,242,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,779 UART: [ldev] --
1,281,225 UART: [fwproc] Wait for Commands...
1,281,938 UART: [fwproc] Recv command 0x4d454153
1,285,965 >>> mbox cmd response data (12 bytes)
1,285,966 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,286,137 UART: [fwproc] Recv command 0x46574c44
1,286,870 UART: [fwproc] Recv'd Img size: 111916 bytes
2,556,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,583,602 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,609,287 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,745,213 >>> mbox cmd response: success
2,746,438 UART: [afmc] ++
2,746,606 UART: [afmc] CDI.KEYID = 6
2,746,969 UART: [afmc] SUBJECT.KEYID = 7
2,747,395 UART: [afmc] AUTHORITY.KEYID = 5
2,783,232 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,799,610 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,800,361 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,806,057 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,811,956 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,817,649 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,825,433 UART: [afmc] --
2,826,507 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,826,529 UART: [cold-reset] --
2,827,333 UART: [state] Locking Datavault
2,828,308 UART: [state] Locking PCR0, PCR1 and PCR31
2,828,912 UART: [state] Locking ICCM
2,829,534 UART: [exit] Launching FMC @ 0x40000000
2,834,831 UART:
2,834,847 UART: Running Caliptra FMC ...
2,835,255 UART:
2,835,485 UART: [fmc] Received command: 0x1000000A
2,836,914 >>> mbox cmd response data (116 bytes)
2,836,915 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,836,944 UART: [fmc] Received command: 0x10000009
2,838,142 >>> mbox cmd response data (48 bytes)
2,838,143 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,838,172 UART: [fmc] Received command: 0x10000003
2,847,628 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,543 >>> mbox cmd response data (12 bytes)
1,139,544 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,593,526 >>> mbox cmd response: success
2,649,851 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,656,236 UART:
2,656,252 UART: Running Caliptra FMC ...
2,656,660 UART:
2,656,890 UART: [fmc] Received command: 0x1000000A
2,658,319 >>> mbox cmd response data (116 bytes)
2,658,320 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,658,349 UART: [fmc] Received command: 0x10000009
2,659,547 >>> mbox cmd response data (48 bytes)
2,659,548 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,659,577 UART: [fmc] Received command: 0x10000003
2,669,033 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,614 UART: [state] LifecycleState = Unprovisioned
86,269 UART: [state] DebugLocked = No
86,967 UART: [state] WD Timer not started. Device not locked for debugging
88,200 UART: [kat] SHA2-256
891,750 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,879 UART: [kat] ++
896,031 UART: [kat] sha1
900,327 UART: [kat] SHA2-256
902,267 UART: [kat] SHA2-384
905,072 UART: [kat] SHA2-512-ACC
906,973 UART: [kat] ECC-384
916,574 UART: [kat] HMAC-384Kdf
921,052 UART: [kat] LMS
1,169,364 UART: [kat] --
1,170,163 UART: [cold-reset] ++
1,170,657 UART: [fht] FHT @ 0x50003400
1,173,457 UART: [idev] ++
1,173,625 UART: [idev] CDI.KEYID = 6
1,173,986 UART: [idev] SUBJECT.KEYID = 7
1,174,411 UART: [idev] UDS.KEYID = 0
1,182,087 UART: [idev] Erasing UDS.KEYID = 0
1,199,065 UART: [idev] Sha1 KeyId Algorithm
1,208,095 UART: [idev] --
1,209,282 UART: [ldev] ++
1,209,450 UART: [ldev] CDI.KEYID = 6
1,209,814 UART: [ldev] SUBJECT.KEYID = 5
1,210,241 UART: [ldev] AUTHORITY.KEYID = 7
1,210,704 UART: [ldev] FE.KEYID = 1
1,215,876 UART: [ldev] Erasing FE.KEYID = 1
1,242,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,268 UART: [ldev] --
1,281,608 UART: [fwproc] Wait for Commands...
1,282,349 UART: [fwproc] Recv command 0x4d454153
1,286,376 >>> mbox cmd response data (12 bytes)
1,286,377 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,286,578 UART: [fwproc] Recv command 0x46574c44
1,287,311 UART: [fwproc] Recv'd Img size: 111916 bytes
2,557,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,583,325 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,609,010 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,744,910 >>> mbox cmd response: success
2,745,983 UART: [afmc] ++
2,746,151 UART: [afmc] CDI.KEYID = 6
2,746,514 UART: [afmc] SUBJECT.KEYID = 7
2,746,940 UART: [afmc] AUTHORITY.KEYID = 5
2,781,943 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,798,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,980 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,804,676 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,810,575 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,816,268 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,824,138 UART: [afmc] --
2,825,180 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,825,202 UART: [cold-reset] --
2,826,040 UART: [state] Locking Datavault
2,827,243 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,847 UART: [state] Locking ICCM
2,828,293 UART: [exit] Launching FMC @ 0x40000000
2,833,590 UART:
2,833,606 UART: Running Caliptra FMC ...
2,834,014 UART:
2,834,244 UART: [fmc] Received command: 0x1000000A
2,835,673 >>> mbox cmd response data (116 bytes)
2,835,674 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,835,703 UART: [fmc] Received command: 0x10000009
2,836,901 >>> mbox cmd response data (48 bytes)
2,836,902 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,836,931 UART: [fmc] Received command: 0x10000003
2,846,387 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,328 >>> mbox cmd response data (12 bytes)
1,139,329 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,593,759 >>> mbox cmd response: success
2,650,008 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,656,101 UART:
2,656,117 UART: Running Caliptra FMC ...
2,656,525 UART:
2,656,755 UART: [fmc] Received command: 0x1000000A
2,658,184 >>> mbox cmd response data (116 bytes)
2,658,185 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,658,214 UART: [fmc] Received command: 0x10000009
2,659,412 >>> mbox cmd response data (48 bytes)
2,659,413 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,659,442 UART: [fmc] Received command: 0x10000003
2,668,898 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,794 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,687 UART: [kat] SHA2-256
891,237 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,366 UART: [kat] ++
895,518 UART: [kat] sha1
899,744 UART: [kat] SHA2-256
901,684 UART: [kat] SHA2-384
904,443 UART: [kat] SHA2-512-ACC
906,344 UART: [kat] ECC-384
916,235 UART: [kat] HMAC-384Kdf
920,741 UART: [kat] LMS
1,169,053 UART: [kat] --
1,169,740 UART: [cold-reset] ++
1,170,078 UART: [fht] FHT @ 0x50003400
1,172,734 UART: [idev] ++
1,172,902 UART: [idev] CDI.KEYID = 6
1,173,263 UART: [idev] SUBJECT.KEYID = 7
1,173,688 UART: [idev] UDS.KEYID = 0
1,181,368 UART: [idev] Erasing UDS.KEYID = 0
1,198,248 UART: [idev] Sha1 KeyId Algorithm
1,207,056 UART: [idev] --
1,208,053 UART: [ldev] ++
1,208,221 UART: [ldev] CDI.KEYID = 6
1,208,585 UART: [ldev] SUBJECT.KEYID = 5
1,209,012 UART: [ldev] AUTHORITY.KEYID = 7
1,209,475 UART: [ldev] FE.KEYID = 1
1,215,119 UART: [ldev] Erasing FE.KEYID = 1
1,241,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,923 UART: [ldev] --
1,281,331 UART: [fwproc] Wait for Commands...
1,282,036 UART: [fwproc] Recv command 0x4d454153
1,286,063 >>> mbox cmd response data (12 bytes)
1,286,064 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,286,147 UART: [fwproc] Recv command 0x46574c44
1,286,880 UART: [fwproc] Recv'd Img size: 111916 bytes
2,556,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,583,408 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,609,093 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,745,005 >>> mbox cmd response: success
2,746,232 UART: [afmc] ++
2,746,400 UART: [afmc] CDI.KEYID = 6
2,746,763 UART: [afmc] SUBJECT.KEYID = 7
2,747,189 UART: [afmc] AUTHORITY.KEYID = 5
2,782,866 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,799,360 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,800,111 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,805,807 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,811,706 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,817,399 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,825,135 UART: [afmc] --
2,826,047 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,826,069 UART: [cold-reset] --
2,826,855 UART: [state] Locking Datavault
2,828,106 UART: [state] Locking PCR0, PCR1 and PCR31
2,828,710 UART: [state] Locking ICCM
2,829,234 UART: [exit] Launching FMC @ 0x40000000
2,834,531 UART:
2,834,547 UART: Running Caliptra FMC ...
2,834,955 UART:
2,835,185 UART: [fmc] Received command: 0x1000000A
2,836,614 >>> mbox cmd response data (116 bytes)
2,836,615 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,836,644 UART: [fmc] Received command: 0x10000009
2,837,842 >>> mbox cmd response data (48 bytes)
2,837,843 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,837,872 UART: [fmc] Received command: 0x10000003
2,847,328 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,781 >>> mbox cmd response data (12 bytes)
1,139,782 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,594,034 >>> mbox cmd response: success
2,650,859 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,657,242 UART:
2,657,258 UART: Running Caliptra FMC ...
2,657,666 UART:
2,657,896 UART: [fmc] Received command: 0x1000000A
2,659,325 >>> mbox cmd response data (116 bytes)
2,659,326 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,659,355 UART: [fmc] Received command: 0x10000009
2,660,553 >>> mbox cmd response data (48 bytes)
2,660,554 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,660,583 UART: [fmc] Received command: 0x10000003
2,670,039 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,582 UART: [state] LifecycleState = Unprovisioned
86,237 UART: [state] DebugLocked = No
86,957 UART: [state] WD Timer not started. Device not locked for debugging
88,106 UART: [kat] SHA2-256
891,656 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,785 UART: [kat] ++
895,937 UART: [kat] sha1
900,141 UART: [kat] SHA2-256
902,081 UART: [kat] SHA2-384
904,756 UART: [kat] SHA2-512-ACC
906,657 UART: [kat] ECC-384
916,646 UART: [kat] HMAC-384Kdf
921,244 UART: [kat] LMS
1,169,556 UART: [kat] --
1,170,377 UART: [cold-reset] ++
1,170,787 UART: [fht] FHT @ 0x50003400
1,173,659 UART: [idev] ++
1,173,827 UART: [idev] CDI.KEYID = 6
1,174,188 UART: [idev] SUBJECT.KEYID = 7
1,174,613 UART: [idev] UDS.KEYID = 0
1,183,103 UART: [idev] Erasing UDS.KEYID = 0
1,199,827 UART: [idev] Sha1 KeyId Algorithm
1,208,721 UART: [idev] --
1,209,756 UART: [ldev] ++
1,209,924 UART: [ldev] CDI.KEYID = 6
1,210,288 UART: [ldev] SUBJECT.KEYID = 5
1,210,715 UART: [ldev] AUTHORITY.KEYID = 7
1,211,178 UART: [ldev] FE.KEYID = 1
1,216,280 UART: [ldev] Erasing FE.KEYID = 1
1,242,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,650 UART: [ldev] --
1,282,142 UART: [fwproc] Wait for Commands...
1,282,957 UART: [fwproc] Recv command 0x46574c44
1,283,686 UART: Invalid Img size: 0 bytes
1,284,526 UART: ROM Fatal Error: 0x01020002
1,285,685 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,655 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,095 UART: [state] LifecycleState = Unprovisioned
85,750 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
891,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,426 UART: [kat] ++
895,578 UART: [kat] sha1
899,792 UART: [kat] SHA2-256
901,732 UART: [kat] SHA2-384
904,531 UART: [kat] SHA2-512-ACC
906,432 UART: [kat] ECC-384
916,195 UART: [kat] HMAC-384Kdf
920,847 UART: [kat] LMS
1,169,159 UART: [kat] --
1,170,022 UART: [cold-reset] ++
1,170,594 UART: [fht] FHT @ 0x50003400
1,173,146 UART: [idev] ++
1,173,314 UART: [idev] CDI.KEYID = 6
1,173,675 UART: [idev] SUBJECT.KEYID = 7
1,174,100 UART: [idev] UDS.KEYID = 0
1,182,534 UART: [idev] Erasing UDS.KEYID = 0
1,199,698 UART: [idev] Sha1 KeyId Algorithm
1,208,582 UART: [idev] --
1,209,615 UART: [ldev] ++
1,209,783 UART: [ldev] CDI.KEYID = 6
1,210,147 UART: [ldev] SUBJECT.KEYID = 5
1,210,574 UART: [ldev] AUTHORITY.KEYID = 7
1,211,037 UART: [ldev] FE.KEYID = 1
1,216,307 UART: [ldev] Erasing FE.KEYID = 1
1,242,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,505 UART: [ldev] --
1,281,953 UART: [fwproc] Wait for Commands...
1,282,744 UART: [fwproc] Recv command 0x46574c44
1,283,473 UART: Invalid Img size: 0 bytes
1,284,343 UART: ROM Fatal Error: 0x01020002
1,285,502 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,904 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
891,194 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,745 UART: [kat] SHA2-256
901,685 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
915,682 UART: [kat] HMAC-384Kdf
920,266 UART: [kat] LMS
1,168,578 UART: [kat] --
1,169,681 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,172,745 UART: [idev] ++
1,172,913 UART: [idev] CDI.KEYID = 6
1,173,274 UART: [idev] SUBJECT.KEYID = 7
1,173,699 UART: [idev] UDS.KEYID = 0
1,181,595 UART: [idev] Erasing UDS.KEYID = 0
1,198,583 UART: [idev] Sha1 KeyId Algorithm
1,207,593 UART: [idev] --
1,208,740 UART: [ldev] ++
1,208,908 UART: [ldev] CDI.KEYID = 6
1,209,272 UART: [ldev] SUBJECT.KEYID = 5
1,209,699 UART: [ldev] AUTHORITY.KEYID = 7
1,210,162 UART: [ldev] FE.KEYID = 1
1,215,198 UART: [ldev] Erasing FE.KEYID = 1
1,240,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,208 UART: [ldev] --
1,280,704 UART: [fwproc] Wait for Commands...
1,281,287 UART: [fwproc] Recv command 0x46574c44
1,282,016 UART: Invalid Img size: 0 bytes
1,283,106 UART: ROM Fatal Error: 0x01020002
1,284,265 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,051 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Unprovisioned
86,388 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,199 UART: [kat] SHA2-256
891,749 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,878 UART: [kat] ++
896,030 UART: [kat] sha1
900,208 UART: [kat] SHA2-256
902,148 UART: [kat] SHA2-384
904,849 UART: [kat] SHA2-512-ACC
906,750 UART: [kat] ECC-384
916,761 UART: [kat] HMAC-384Kdf
921,479 UART: [kat] LMS
1,169,791 UART: [kat] --
1,170,688 UART: [cold-reset] ++
1,171,100 UART: [fht] FHT @ 0x50003400
1,173,746 UART: [idev] ++
1,173,914 UART: [idev] CDI.KEYID = 6
1,174,275 UART: [idev] SUBJECT.KEYID = 7
1,174,700 UART: [idev] UDS.KEYID = 0
1,182,516 UART: [idev] Erasing UDS.KEYID = 0
1,199,146 UART: [idev] Sha1 KeyId Algorithm
1,208,138 UART: [idev] --
1,209,145 UART: [ldev] ++
1,209,313 UART: [ldev] CDI.KEYID = 6
1,209,677 UART: [ldev] SUBJECT.KEYID = 5
1,210,104 UART: [ldev] AUTHORITY.KEYID = 7
1,210,567 UART: [ldev] FE.KEYID = 1
1,215,667 UART: [ldev] Erasing FE.KEYID = 1
1,242,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,081 UART: [ldev] --
1,281,497 UART: [fwproc] Wait for Commands...
1,282,322 UART: [fwproc] Recv command 0x46574c44
1,283,051 UART: Invalid Img size: 0 bytes
1,283,947 UART: ROM Fatal Error: 0x01020002
1,285,106 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,298 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,233 UART: [kat] ++
895,385 UART: [kat] sha1
899,691 UART: [kat] SHA2-256
901,631 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
916,198 UART: [kat] HMAC-384Kdf
920,800 UART: [kat] LMS
1,169,112 UART: [kat] --
1,170,065 UART: [cold-reset] ++
1,170,607 UART: [fht] FHT @ 0x50003400
1,173,089 UART: [idev] ++
1,173,257 UART: [idev] CDI.KEYID = 6
1,173,618 UART: [idev] SUBJECT.KEYID = 7
1,174,043 UART: [idev] UDS.KEYID = 0
1,182,001 UART: [idev] Erasing UDS.KEYID = 0
1,199,463 UART: [idev] Sha1 KeyId Algorithm
1,208,361 UART: [idev] --
1,209,532 UART: [ldev] ++
1,209,700 UART: [ldev] CDI.KEYID = 6
1,210,064 UART: [ldev] SUBJECT.KEYID = 5
1,210,491 UART: [ldev] AUTHORITY.KEYID = 7
1,210,954 UART: [ldev] FE.KEYID = 1
1,216,304 UART: [ldev] Erasing FE.KEYID = 1
1,241,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,544 UART: [ldev] --
1,280,948 UART: [fwproc] Wait for Commands...
1,281,645 UART: [fwproc] Recv command 0x46574c44
1,282,374 UART: Invalid Img size: 0 bytes
1,283,380 UART: ROM Fatal Error: 0x01020002
1,284,539 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,343 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
88,159 UART: [kat] SHA2-256
891,709 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,838 UART: [kat] ++
895,990 UART: [kat] sha1
900,182 UART: [kat] SHA2-256
902,122 UART: [kat] SHA2-384
904,843 UART: [kat] SHA2-512-ACC
906,744 UART: [kat] ECC-384
916,525 UART: [kat] HMAC-384Kdf
920,971 UART: [kat] LMS
1,169,283 UART: [kat] --
1,170,340 UART: [cold-reset] ++
1,170,738 UART: [fht] FHT @ 0x50003400
1,173,244 UART: [idev] ++
1,173,412 UART: [idev] CDI.KEYID = 6
1,173,773 UART: [idev] SUBJECT.KEYID = 7
1,174,198 UART: [idev] UDS.KEYID = 0
1,182,236 UART: [idev] Erasing UDS.KEYID = 0
1,199,310 UART: [idev] Sha1 KeyId Algorithm
1,208,152 UART: [idev] --
1,209,103 UART: [ldev] ++
1,209,271 UART: [ldev] CDI.KEYID = 6
1,209,635 UART: [ldev] SUBJECT.KEYID = 5
1,210,062 UART: [ldev] AUTHORITY.KEYID = 7
1,210,525 UART: [ldev] FE.KEYID = 1
1,216,157 UART: [ldev] Erasing FE.KEYID = 1
1,242,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,387 UART: [ldev] --
1,281,889 UART: [fwproc] Wait for Commands...
1,282,682 UART: [fwproc] Recv command 0x46574c44
1,283,411 UART: Invalid Img size: 0 bytes
1,284,325 UART: ROM Fatal Error: 0x01020002
1,285,484 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,480 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,774 UART: [state] LifecycleState = Unprovisioned
85,429 UART: [state] DebugLocked = No
85,941 UART: [state] WD Timer not started. Device not locked for debugging
87,106 UART: [kat] SHA2-256
890,656 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,785 UART: [kat] ++
894,937 UART: [kat] sha1
899,319 UART: [kat] SHA2-256
901,259 UART: [kat] SHA2-384
903,804 UART: [kat] SHA2-512-ACC
905,705 UART: [kat] ECC-384
915,710 UART: [kat] HMAC-384Kdf
920,464 UART: [kat] LMS
1,168,776 UART: [kat] --
1,169,469 UART: [cold-reset] ++
1,169,957 UART: [fht] FHT @ 0x50003400
1,172,703 UART: [idev] ++
1,172,871 UART: [idev] CDI.KEYID = 6
1,173,232 UART: [idev] SUBJECT.KEYID = 7
1,173,657 UART: [idev] UDS.KEYID = 0
1,181,699 UART: [idev] Erasing UDS.KEYID = 0
1,199,021 UART: [idev] Sha1 KeyId Algorithm
1,207,229 UART: [idev] CSR upload begun
1,209,008 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,975 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,683 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,568 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,274 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,703 UART: [idev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
1,297,200 UART: [idev] CSR uploaded
1,300,245 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,414 UART: [idev] --
1,301,433 UART: [ldev] ++
1,301,601 UART: [ldev] CDI.KEYID = 6
1,301,965 UART: [ldev] SUBJECT.KEYID = 5
1,302,392 UART: [ldev] AUTHORITY.KEYID = 7
1,302,855 UART: [ldev] FE.KEYID = 1
1,308,063 UART: [ldev] Erasing FE.KEYID = 1
1,334,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,111 UART: [ldev] --
1,373,613 UART: [fwproc] Wait for Commands...
1,374,304 UART: [fwproc] Recv command 0x46574c44
1,375,037 UART: [fwproc] Recv'd Img size: 114332 bytes
2,672,925 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,919 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,228 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,865,966 >>> mbox cmd response: success
2,867,063 UART: [afmc] ++
2,867,231 UART: [afmc] CDI.KEYID = 6
2,867,594 UART: [afmc] SUBJECT.KEYID = 7
2,868,020 UART: [afmc] AUTHORITY.KEYID = 5
2,903,329 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,936 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,665 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,548 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,267 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,994 UART: [afmc] --
2,946,972 UART: [cold-reset] --
2,947,634 UART: [state] Locking Datavault
2,949,121 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,725 UART: [state] Locking ICCM
2,950,221 UART: [exit] Launching FMC @ 0x40000130
2,955,550 UART:
2,955,566 UART: Running Caliptra FMC ...
2,955,974 UART:
2,956,028 UART: [state] CFI Enabled
2,966,233 UART: [fht] FMC Alias Private Key: 7
3,074,692 UART: [art] Extend RT PCRs Done
3,075,120 UART: [art] Lock RT PCRs Done
3,076,920 UART: [art] Populate DV Done
3,085,055 UART: [fht] FMC Alias Private Key: 7
3,086,201 UART: [art] Derive CDI
3,086,481 UART: [art] Store in in slot 0x4
3,172,030 UART: [art] Derive Key Pair
3,172,390 UART: [art] Store priv key in slot 0x5
3,185,698 UART: [art] Derive Key Pair - Done
3,200,321 UART: [art] Signing Cert with AUTHO
3,200,801 UART: RITY.KEYID = 7
3,216,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,786 UART: [art] PUB.X = 79229C07C5ED6D33E324D1EA94CE944F25597319A7BCF4EAC4D155F50C7E80A7F1EE0954662A06F9F9D7899ABD794B7D
3,223,554 UART: [art] PUB.Y = 95F0AC2ADA459AD71128DCA3618ECD4989359D1CBBFFAF96CDD10CE06D94869D6547830782A278CE7AA771B0387D4601
3,230,505 UART: [art] SIG.R = 752137DC374AC1FB151ABB40E9675E44B4C54E760F9A19F2A861E1F3961A2D4B2056EFFB9150853CE4C397B96FDB3CC8
3,237,282 UART: [art] SIG.S = A19E40FB2E3CD7617D932CDE5D9D3A43A172599EE4CD6E92825932E26E3F278D8BB7116EDA1D622C59FC80F3C6B1CC4F
3,261,019 UART: Caliptra RT
3,261,272 UART: [state] CFI Enabled
3,370,317 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,880 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,709 >>> mbox cmd response: success
2,703,631 UART:
2,703,647 UART: Running Caliptra FMC ...
2,704,055 UART:
2,704,109 UART: [state] CFI Enabled
2,714,314 UART: [fht] FMC Alias Private Key: 7
2,823,175 UART: [art] Extend RT PCRs Done
2,823,603 UART: [art] Lock RT PCRs Done
2,825,347 UART: [art] Populate DV Done
2,833,492 UART: [fht] FMC Alias Private Key: 7
2,834,666 UART: [art] Derive CDI
2,834,946 UART: [art] Store in in slot 0x4
2,920,297 UART: [art] Derive Key Pair
2,920,657 UART: [art] Store priv key in slot 0x5
2,933,879 UART: [art] Derive Key Pair - Done
2,948,930 UART: [art] Signing Cert with AUTHO
2,949,410 UART: RITY.KEYID = 7
2,964,564 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,329 UART: [art] PUB.X = 4AA2194642BD606BD2F76299F323D343957EC2833385903EC9C975F9DAFC7AF9D42B1EF6872F95435545135432A122DC
2,972,095 UART: [art] PUB.Y = F090C97D2B82EDC0E8B2DE704118242FEDAF9D85D57D7CFA720D5D7CFCFD2D51EE640E06DDF90D459631403B106C2D4E
2,979,053 UART: [art] SIG.R = 7A17694D5908303236E075ABF15937A93CF7C8392822E3D42441C9EFA93F6552EEF97A23FFB7571349DF348A101DE797
2,985,816 UART: [art] SIG.S = 43F463E9E940C0318505E65A269A71679C58880B980C64AA718F14CEC4020105D021EBB2B1766BD534873E23EE8A0EFD
3,009,806 UART: Caliptra RT
3,010,059 UART: [state] CFI Enabled
3,118,118 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,059 UART: [state] LifecycleState = Unprovisioned
85,714 UART: [state] DebugLocked = No
86,260 UART: [state] WD Timer not started. Device not locked for debugging
87,487 UART: [kat] SHA2-256
891,037 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,166 UART: [kat] ++
895,318 UART: [kat] sha1
899,618 UART: [kat] SHA2-256
901,558 UART: [kat] SHA2-384
904,335 UART: [kat] SHA2-512-ACC
906,236 UART: [kat] ECC-384
915,887 UART: [kat] HMAC-384Kdf
920,473 UART: [kat] LMS
1,168,785 UART: [kat] --
1,169,668 UART: [cold-reset] ++
1,170,110 UART: [fht] FHT @ 0x50003400
1,172,800 UART: [idev] ++
1,172,968 UART: [idev] CDI.KEYID = 6
1,173,329 UART: [idev] SUBJECT.KEYID = 7
1,173,754 UART: [idev] UDS.KEYID = 0
1,182,150 UART: [idev] Erasing UDS.KEYID = 0
1,199,732 UART: [idev] Sha1 KeyId Algorithm
1,208,082 UART: [idev] CSR upload begun
1,209,861 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,566 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,274 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,159 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,865 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,294 UART: [idev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
1,297,791 UART: [idev] CSR uploaded
1,300,836 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,301,005 UART: [idev] --
1,301,954 UART: [ldev] ++
1,302,122 UART: [ldev] CDI.KEYID = 6
1,302,486 UART: [ldev] SUBJECT.KEYID = 5
1,302,913 UART: [ldev] AUTHORITY.KEYID = 7
1,303,376 UART: [ldev] FE.KEYID = 1
1,308,656 UART: [ldev] Erasing FE.KEYID = 1
1,335,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,934 UART: [ldev] --
1,374,302 UART: [fwproc] Wait for Commands...
1,375,085 UART: [fwproc] Recv command 0x46574c44
1,375,818 UART: [fwproc] Recv'd Img size: 114332 bytes
2,672,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,804 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,113 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,864,987 >>> mbox cmd response: success
2,866,170 UART: [afmc] ++
2,866,338 UART: [afmc] CDI.KEYID = 6
2,866,701 UART: [afmc] SUBJECT.KEYID = 7
2,867,127 UART: [afmc] AUTHORITY.KEYID = 5
2,902,774 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,574 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,325 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,054 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,937 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,656 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,541 UART: [afmc] --
2,946,611 UART: [cold-reset] --
2,947,485 UART: [state] Locking Datavault
2,948,442 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,046 UART: [state] Locking ICCM
2,949,628 UART: [exit] Launching FMC @ 0x40000130
2,954,957 UART:
2,954,973 UART: Running Caliptra FMC ...
2,955,381 UART:
2,955,524 UART: [state] CFI Enabled
2,966,445 UART: [fht] FMC Alias Private Key: 7
3,074,332 UART: [art] Extend RT PCRs Done
3,074,760 UART: [art] Lock RT PCRs Done
3,076,014 UART: [art] Populate DV Done
3,084,321 UART: [fht] FMC Alias Private Key: 7
3,085,501 UART: [art] Derive CDI
3,085,781 UART: [art] Store in in slot 0x4
3,171,644 UART: [art] Derive Key Pair
3,172,004 UART: [art] Store priv key in slot 0x5
3,185,398 UART: [art] Derive Key Pair - Done
3,200,635 UART: [art] Signing Cert with AUTHO
3,201,115 UART: RITY.KEYID = 7
3,216,515 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,280 UART: [art] PUB.X = CD325BBA7A275386A613A368CFBCCC49DD67C985F52EA524715A15BB40AF28428775A342722D90D503266561E0386DC0
3,224,047 UART: [art] PUB.Y = 469959E57D31592121697D17C33CE63B19FA91DCC71B1A5A1EC4049CC0B4D2B3FFABCE493A4DD70BF30C10CCC1E9E3C4
3,231,006 UART: [art] SIG.R = 1476C6CCDD4184F7E94B7F1179BF22D796AB3FA5533C22C22E4655AD0BA3ADB99E78938059424F9904260B70E9ECC628
3,237,771 UART: [art] SIG.S = 684277AE420DAFC25B6D2CEFB29569144646E0E49749F81F9B1BABBB2515F3F2B4573595A6099818E847A12DE40227D0
3,261,565 UART: Caliptra RT
3,261,910 UART: [state] CFI Enabled
3,369,845 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,307 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,684 >>> mbox cmd response: success
2,703,610 UART:
2,703,626 UART: Running Caliptra FMC ...
2,704,034 UART:
2,704,177 UART: [state] CFI Enabled
2,715,046 UART: [fht] FMC Alias Private Key: 7
2,822,631 UART: [art] Extend RT PCRs Done
2,823,059 UART: [art] Lock RT PCRs Done
2,824,201 UART: [art] Populate DV Done
2,832,604 UART: [fht] FMC Alias Private Key: 7
2,833,616 UART: [art] Derive CDI
2,833,896 UART: [art] Store in in slot 0x4
2,919,447 UART: [art] Derive Key Pair
2,919,807 UART: [art] Store priv key in slot 0x5
2,932,389 UART: [art] Derive Key Pair - Done
2,946,915 UART: [art] Signing Cert with AUTHO
2,947,395 UART: RITY.KEYID = 7
2,962,457 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,222 UART: [art] PUB.X = 0D94E9C1566FF34BABBD462C1B51AF083AF78C59DFA79FB7145AEA1B28178609136E869C333338E1F6254ED172FFABB2
2,969,995 UART: [art] PUB.Y = 3010D1C3C2D2F9045B6CF18D178E8BBA076C2ED4EF35DFE8BFE3CEB3D07C081C35ADEB66BAC17A242D6FC70B41B553E4
2,976,959 UART: [art] SIG.R = CF3C70FFB0625AACEF07A13ED9B418735C925D7AF8649A0385E1C4E49FC9A372949971AF40A61567FEEFF4C5BABA29C3
2,983,741 UART: [art] SIG.S = 17FE49C325342EDDB7A5EBC0E47A94D9EB43EBB628139E35D8151ECA1E0FBFBB581118660A3A2EAAAB191F5EDAD4AB0F
3,008,087 UART: Caliptra RT
3,008,432 UART: [state] CFI Enabled
3,116,221 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,143 UART: [state] WD Timer not started. Device not locked for debugging
87,262 UART: [kat] SHA2-256
890,812 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,941 UART: [kat] ++
895,093 UART: [kat] sha1
899,169 UART: [kat] SHA2-256
901,109 UART: [kat] SHA2-384
903,882 UART: [kat] SHA2-512-ACC
905,783 UART: [kat] ECC-384
915,730 UART: [kat] HMAC-384Kdf
920,382 UART: [kat] LMS
1,168,694 UART: [kat] --
1,169,543 UART: [cold-reset] ++
1,169,963 UART: [fht] FHT @ 0x50003400
1,172,657 UART: [idev] ++
1,172,825 UART: [idev] CDI.KEYID = 6
1,173,186 UART: [idev] SUBJECT.KEYID = 7
1,173,611 UART: [idev] UDS.KEYID = 0
1,181,415 UART: [idev] Erasing UDS.KEYID = 0
1,198,953 UART: [idev] Sha1 KeyId Algorithm
1,207,353 UART: [idev] CSR upload begun
1,209,132 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,039 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,747 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,632 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,338 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,767 UART: [idev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
1,297,264 UART: [idev] CSR uploaded
1,300,309 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,478 UART: [idev] --
1,301,625 UART: [ldev] ++
1,301,793 UART: [ldev] CDI.KEYID = 6
1,302,157 UART: [ldev] SUBJECT.KEYID = 5
1,302,584 UART: [ldev] AUTHORITY.KEYID = 7
1,303,047 UART: [ldev] FE.KEYID = 1
1,308,225 UART: [ldev] Erasing FE.KEYID = 1
1,334,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,541 UART: [ldev] --
1,374,049 UART: [fwproc] Wait for Commands...
1,374,664 UART: [fwproc] Recv command 0x46574c44
1,375,397 UART: [fwproc] Recv'd Img size: 114332 bytes
2,673,043 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,905 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,214 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,865,018 >>> mbox cmd response: success
2,866,075 UART: [afmc] ++
2,866,243 UART: [afmc] CDI.KEYID = 6
2,866,606 UART: [afmc] SUBJECT.KEYID = 7
2,867,032 UART: [afmc] AUTHORITY.KEYID = 5
2,902,429 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,506 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,235 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,118 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,837 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,634 UART: [afmc] --
2,945,514 UART: [cold-reset] --
2,946,340 UART: [state] Locking Datavault
2,947,569 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,173 UART: [state] Locking ICCM
2,948,707 UART: [exit] Launching FMC @ 0x40000130
2,954,036 UART:
2,954,052 UART: Running Caliptra FMC ...
2,954,460 UART:
2,954,514 UART: [state] CFI Enabled
2,965,057 UART: [fht] FMC Alias Private Key: 7
3,071,838 UART: [art] Extend RT PCRs Done
3,072,266 UART: [art] Lock RT PCRs Done
3,073,648 UART: [art] Populate DV Done
3,081,887 UART: [fht] FMC Alias Private Key: 7
3,082,827 UART: [art] Derive CDI
3,083,107 UART: [art] Store in in slot 0x4
3,168,294 UART: [art] Derive Key Pair
3,168,654 UART: [art] Store priv key in slot 0x5
3,182,524 UART: [art] Derive Key Pair - Done
3,197,354 UART: [art] Signing Cert with AUTHO
3,197,834 UART: RITY.KEYID = 7
3,212,908 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,673 UART: [art] PUB.X = 247EC292792E9FA5DB07DB3387B1985810914BFF795ACD3ADF1004B5B4B7D9677DE78A4820BA5071A6089A0E2C6D3711
3,220,435 UART: [art] PUB.Y = 3F530E4BB2316617AAC66BB885F19CB35C95AB42038DA56E761A6180039B16AB3E011BC6431556164ECB4197B80C0A7B
3,227,369 UART: [art] SIG.R = BBCA3B0D599737E206B0E0BBBDBEBFD3EBA9E590FCC6B79E52ADA278D6A0F74C6E16C6AA10A24406B2C4252E4C244FCE
3,234,160 UART: [art] SIG.S = 5C566052721FA0AD0CF6AE6880E725D17AA06B036AA147730B1F36A11C66662FFD23A97EF56418AB6121238AA1A79CA2
3,257,610 UART: Caliptra RT
3,257,863 UART: [state] CFI Enabled
3,365,812 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,024 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,640,831 >>> mbox cmd response: success
2,702,963 UART:
2,702,979 UART: Running Caliptra FMC ...
2,703,387 UART:
2,703,441 UART: [state] CFI Enabled
2,713,684 UART: [fht] FMC Alias Private Key: 7
2,821,931 UART: [art] Extend RT PCRs Done
2,822,359 UART: [art] Lock RT PCRs Done
2,823,893 UART: [art] Populate DV Done
2,831,990 UART: [fht] FMC Alias Private Key: 7
2,833,012 UART: [art] Derive CDI
2,833,292 UART: [art] Store in in slot 0x4
2,918,877 UART: [art] Derive Key Pair
2,919,237 UART: [art] Store priv key in slot 0x5
2,932,959 UART: [art] Derive Key Pair - Done
2,947,664 UART: [art] Signing Cert with AUTHO
2,948,144 UART: RITY.KEYID = 7
2,963,204 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,969 UART: [art] PUB.X = 977A56E2CAD1202B8F140154D1F8DD4AC4FB8501DB9FB4CDFFDEE23042E2E30D06D892AD34240D65C9F972FD69BB9183
2,970,740 UART: [art] PUB.Y = 72174BC2E00F9D3DBD9578FAD2D60476C1CA162D8221F38D37A0FE9CA57D458A3FCFA2CAEDE0BBF6B7F99DB715DB6E8D
2,977,712 UART: [art] SIG.R = DFF817B500521BF4764841B5EF2748DE3C7C671D3F5362D2B85DF773A31A2FE2B51DB152FCB699299B3BDC84D692E464
2,984,468 UART: [art] SIG.S = D4EA27DED7433FEA7DF1EDDF2DF0A4C8550D055CE8542167243CBF57F9E2CB1842C10EC3BB2D6D1DF330F238FE3BD395
3,007,700 UART: Caliptra RT
3,007,953 UART: [state] CFI Enabled
3,115,179 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
891,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,710 UART: [kat] ++
895,862 UART: [kat] sha1
899,990 UART: [kat] SHA2-256
901,930 UART: [kat] SHA2-384
904,717 UART: [kat] SHA2-512-ACC
906,618 UART: [kat] ECC-384
916,505 UART: [kat] HMAC-384Kdf
921,005 UART: [kat] LMS
1,169,317 UART: [kat] --
1,170,158 UART: [cold-reset] ++
1,170,638 UART: [fht] FHT @ 0x50003400
1,173,126 UART: [idev] ++
1,173,294 UART: [idev] CDI.KEYID = 6
1,173,655 UART: [idev] SUBJECT.KEYID = 7
1,174,080 UART: [idev] UDS.KEYID = 0
1,182,582 UART: [idev] Erasing UDS.KEYID = 0
1,199,718 UART: [idev] Sha1 KeyId Algorithm
1,208,186 UART: [idev] CSR upload begun
1,209,965 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,752 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,460 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,345 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,051 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,480 UART: [idev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
1,297,977 UART: [idev] CSR uploaded
1,301,022 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,301,191 UART: [idev] --
1,302,368 UART: [ldev] ++
1,302,536 UART: [ldev] CDI.KEYID = 6
1,302,900 UART: [ldev] SUBJECT.KEYID = 5
1,303,327 UART: [ldev] AUTHORITY.KEYID = 7
1,303,790 UART: [ldev] FE.KEYID = 1
1,308,826 UART: [ldev] Erasing FE.KEYID = 1
1,335,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,958 UART: [ldev] --
1,374,456 UART: [fwproc] Wait for Commands...
1,375,117 UART: [fwproc] Recv command 0x46574c44
1,375,850 UART: [fwproc] Recv'd Img size: 114332 bytes
2,674,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,140 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,449 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,866,351 >>> mbox cmd response: success
2,867,548 UART: [afmc] ++
2,867,716 UART: [afmc] CDI.KEYID = 6
2,868,079 UART: [afmc] SUBJECT.KEYID = 7
2,868,505 UART: [afmc] AUTHORITY.KEYID = 5
2,903,982 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,211 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,940 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,823 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,542 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,627 UART: [afmc] --
2,947,637 UART: [cold-reset] --
2,948,377 UART: [state] Locking Datavault
2,949,610 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,214 UART: [state] Locking ICCM
2,950,634 UART: [exit] Launching FMC @ 0x40000130
2,955,963 UART:
2,955,979 UART: Running Caliptra FMC ...
2,956,387 UART:
2,956,530 UART: [state] CFI Enabled
2,966,815 UART: [fht] FMC Alias Private Key: 7
3,074,040 UART: [art] Extend RT PCRs Done
3,074,468 UART: [art] Lock RT PCRs Done
3,075,940 UART: [art] Populate DV Done
3,084,325 UART: [fht] FMC Alias Private Key: 7
3,085,271 UART: [art] Derive CDI
3,085,551 UART: [art] Store in in slot 0x4
3,170,952 UART: [art] Derive Key Pair
3,171,312 UART: [art] Store priv key in slot 0x5
3,184,348 UART: [art] Derive Key Pair - Done
3,199,206 UART: [art] Signing Cert with AUTHO
3,199,686 UART: RITY.KEYID = 7
3,214,642 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,407 UART: [art] PUB.X = 2211D126C37A2EEC5C7E39B75F29DDA9B34EF24AC7247E76608E4867F1910730840F800A3DC467B631D428184C7C2487
3,222,164 UART: [art] PUB.Y = 027453140B926F1BA22CE0248F95A408F79185B0A6C32BC658D752EE706937AD79AEE07CFEA3348F1F0CE73050451637
3,229,100 UART: [art] SIG.R = 7BD41FC53870C6206A88C29F92D5F6F65CDEA2709FB58C9232CDE7E888AB392F3AE71A208ED15A35F1FE6C9AD6FF857F
3,235,888 UART: [art] SIG.S = C441E36B6707A3988E38B41651809858EC4E57B4B273F5967B144CC5C87A8F9C2E8F101EEF02EA54D779F0FBFC79C378
3,259,859 UART: Caliptra RT
3,260,204 UART: [state] CFI Enabled
3,369,253 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,329 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,096 >>> mbox cmd response: success
2,703,484 UART:
2,703,500 UART: Running Caliptra FMC ...
2,703,908 UART:
2,704,051 UART: [state] CFI Enabled
2,714,302 UART: [fht] FMC Alias Private Key: 7
2,821,789 UART: [art] Extend RT PCRs Done
2,822,217 UART: [art] Lock RT PCRs Done
2,823,635 UART: [art] Populate DV Done
2,832,086 UART: [fht] FMC Alias Private Key: 7
2,833,222 UART: [art] Derive CDI
2,833,502 UART: [art] Store in in slot 0x4
2,919,225 UART: [art] Derive Key Pair
2,919,585 UART: [art] Store priv key in slot 0x5
2,933,295 UART: [art] Derive Key Pair - Done
2,948,272 UART: [art] Signing Cert with AUTHO
2,948,752 UART: RITY.KEYID = 7
2,963,858 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,623 UART: [art] PUB.X = AE971096B7F67556F022A47B6BC9816C84FBC03F399D83BF7C018D43854F117108BE6760500C869FAF33E141197D65BC
2,971,382 UART: [art] PUB.Y = 9E10A9FD1EC1325DF8DB1DF502557A2AFA04F6445247BAE6CE6F512D4CD0BAEED3D1608686FA7C685633BA8EC82FEC33
2,978,348 UART: [art] SIG.R = F32C85C4552CD54D746FE7A361A929D6B6A62ED42318E43FD1763C771D5D48120DFE1E0FF073C9739E6377F4DEFE0C6A
2,985,119 UART: [art] SIG.S = CAF8E60CED92F54E16C7D1AE56279F4421EC99AF755CCFC9D1B5044DD1FAC7133842C016D8B7B85CAAD2FA75BBA1EDAE
3,009,144 UART: Caliptra RT
3,009,489 UART: [state] CFI Enabled
3,118,223 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,452 UART: [kat] SHA2-256
891,002 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,131 UART: [kat] ++
895,283 UART: [kat] sha1
899,751 UART: [kat] SHA2-256
901,691 UART: [kat] SHA2-384
904,410 UART: [kat] SHA2-512-ACC
906,311 UART: [kat] ECC-384
916,052 UART: [kat] HMAC-384Kdf
920,534 UART: [kat] LMS
1,168,846 UART: [kat] --
1,170,189 UART: [cold-reset] ++
1,170,721 UART: [fht] FHT @ 0x50003400
1,173,407 UART: [idev] ++
1,173,575 UART: [idev] CDI.KEYID = 6
1,173,936 UART: [idev] SUBJECT.KEYID = 7
1,174,361 UART: [idev] UDS.KEYID = 0
1,182,283 UART: [idev] Erasing UDS.KEYID = 0
1,199,559 UART: [idev] Sha1 KeyId Algorithm
1,207,995 UART: [idev] CSR upload begun
1,209,774 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,455 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,163 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,048 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,754 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,183 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,680 UART: [idev] CSR uploaded
1,300,725 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,894 UART: [idev] --
1,301,863 UART: [ldev] ++
1,302,031 UART: [ldev] CDI.KEYID = 6
1,302,395 UART: [ldev] SUBJECT.KEYID = 5
1,302,822 UART: [ldev] AUTHORITY.KEYID = 7
1,303,285 UART: [ldev] FE.KEYID = 1
1,308,495 UART: [ldev] Erasing FE.KEYID = 1
1,335,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,685 UART: [ldev] --
1,374,039 UART: [fwproc] Wait for Commands...
1,374,756 UART: [fwproc] Recv command 0x46574c44
1,375,489 UART: [fwproc] Recv'd Img size: 114332 bytes
2,673,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,855 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,164 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,864,924 >>> mbox cmd response: success
2,866,085 UART: [afmc] ++
2,866,253 UART: [afmc] CDI.KEYID = 6
2,866,616 UART: [afmc] SUBJECT.KEYID = 7
2,867,042 UART: [afmc] AUTHORITY.KEYID = 5
2,902,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,038 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,767 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,650 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,369 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,160 UART: [afmc] --
2,946,112 UART: [cold-reset] --
2,947,088 UART: [state] Locking Datavault
2,948,337 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,941 UART: [state] Locking ICCM
2,949,527 UART: [exit] Launching FMC @ 0x40000130
2,954,856 UART:
2,954,872 UART: Running Caliptra FMC ...
2,955,280 UART:
2,955,334 UART: [state] CFI Enabled
2,965,929 UART: [fht] FMC Alias Private Key: 7
3,073,636 UART: [art] Extend RT PCRs Done
3,074,064 UART: [art] Lock RT PCRs Done
3,075,462 UART: [art] Populate DV Done
3,083,689 UART: [fht] FMC Alias Private Key: 7
3,084,825 UART: [art] Derive CDI
3,085,105 UART: [art] Store in in slot 0x4
3,170,770 UART: [art] Derive Key Pair
3,171,130 UART: [art] Store priv key in slot 0x5
3,183,296 UART: [art] Derive Key Pair - Done
3,198,116 UART: [art] Signing Cert with AUTHO
3,198,596 UART: RITY.KEYID = 7
3,213,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,949 UART: [art] PUB.X = 884F8156E3973154F5709643EE0359416797420055EFDC03FBAC407ACB807713A55887FDA1EA416DF3DA4FD122D1FF9F
3,220,693 UART: [art] PUB.Y = 5C808FB91299E83304E6AADB1DF25F87966C2FC48741753EA5FFC47CBFA200ACF56C8876B8A11C4534E0911E04818A40
3,227,621 UART: [art] SIG.R = E96118BE26804E34FCB9E11AD03F58ED10B8130B1BF198741CE8CC2091ED4252D366C22E8C97A51234F151A46CB5F842
3,234,392 UART: [art] SIG.S = 58B12D179D824E62A4E9933807F0B00B73F2AA2466D75D8C82111EEF984A4F3D26AB6765A174EEA394F886F91D582707
3,258,130 UART: Caliptra RT
3,258,383 UART: [state] CFI Enabled
3,366,086 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,176 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,639,797 >>> mbox cmd response: success
2,701,369 UART:
2,701,385 UART: Running Caliptra FMC ...
2,701,793 UART:
2,701,847 UART: [state] CFI Enabled
2,712,218 UART: [fht] FMC Alias Private Key: 7
2,819,977 UART: [art] Extend RT PCRs Done
2,820,405 UART: [art] Lock RT PCRs Done
2,822,023 UART: [art] Populate DV Done
2,830,402 UART: [fht] FMC Alias Private Key: 7
2,831,382 UART: [art] Derive CDI
2,831,662 UART: [art] Store in in slot 0x4
2,917,637 UART: [art] Derive Key Pair
2,917,997 UART: [art] Store priv key in slot 0x5
2,931,659 UART: [art] Derive Key Pair - Done
2,946,116 UART: [art] Signing Cert with AUTHO
2,946,596 UART: RITY.KEYID = 7
2,961,184 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,949 UART: [art] PUB.X = C87FCD8E1498BB02CECAA422821151922237B3D680DCDC79AC0DCA220AE8D56C054FEEC3CF589BC0579988F5A9D51DDA
2,968,727 UART: [art] PUB.Y = 61CFC8682721C0C0315290ECCBAD98B039F7D6EE37255FD16F745272C0D20942D04998DEA0BB50A4755C032811A3276A
2,975,671 UART: [art] SIG.R = E6085A9D7D4F3510A97F1AC398ABFC50C0951292CBCBF9FF9A724B06C9134339AFCD569A883A6786913C172733989106
2,982,432 UART: [art] SIG.S = FBA43D9179DBF7AD9EA381F19CBAD144F82F9D3D7BDCEF3EB06A66B0AECD6FAFF07DB12783C1F58D5A07B4F9555EC876
3,005,570 UART: Caliptra RT
3,005,823 UART: [state] CFI Enabled
3,112,747 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,623 UART: [kat] SHA2-256
891,173 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,302 UART: [kat] ++
895,454 UART: [kat] sha1
899,652 UART: [kat] SHA2-256
901,592 UART: [kat] SHA2-384
904,469 UART: [kat] SHA2-512-ACC
906,370 UART: [kat] ECC-384
916,435 UART: [kat] HMAC-384Kdf
921,299 UART: [kat] LMS
1,169,611 UART: [kat] --
1,170,584 UART: [cold-reset] ++
1,171,074 UART: [fht] FHT @ 0x50003400
1,173,716 UART: [idev] ++
1,173,884 UART: [idev] CDI.KEYID = 6
1,174,245 UART: [idev] SUBJECT.KEYID = 7
1,174,670 UART: [idev] UDS.KEYID = 0
1,182,730 UART: [idev] Erasing UDS.KEYID = 0
1,199,532 UART: [idev] Sha1 KeyId Algorithm
1,207,656 UART: [idev] CSR upload begun
1,209,435 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,824 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,532 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,417 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,123 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,552 UART: [idev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
1,297,049 UART: [idev] CSR uploaded
1,300,094 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,263 UART: [idev] --
1,301,452 UART: [ldev] ++
1,301,620 UART: [ldev] CDI.KEYID = 6
1,301,984 UART: [ldev] SUBJECT.KEYID = 5
1,302,411 UART: [ldev] AUTHORITY.KEYID = 7
1,302,874 UART: [ldev] FE.KEYID = 1
1,308,270 UART: [ldev] Erasing FE.KEYID = 1
1,334,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,766 UART: [ldev] --
1,374,036 UART: [fwproc] Wait for Commands...
1,374,651 UART: [fwproc] Recv command 0x46574c44
1,375,384 UART: [fwproc] Recv'd Img size: 114332 bytes
2,673,662 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,516 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,825 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,865,611 >>> mbox cmd response: success
2,866,634 UART: [afmc] ++
2,866,802 UART: [afmc] CDI.KEYID = 6
2,867,165 UART: [afmc] SUBJECT.KEYID = 7
2,867,591 UART: [afmc] AUTHORITY.KEYID = 5
2,903,894 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,262 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,013 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,742 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,625 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,344 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,111 UART: [afmc] --
2,947,135 UART: [cold-reset] --
2,948,001 UART: [state] Locking Datavault
2,949,058 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,662 UART: [state] Locking ICCM
2,950,110 UART: [exit] Launching FMC @ 0x40000130
2,955,439 UART:
2,955,455 UART: Running Caliptra FMC ...
2,955,863 UART:
2,956,006 UART: [state] CFI Enabled
2,966,769 UART: [fht] FMC Alias Private Key: 7
3,075,014 UART: [art] Extend RT PCRs Done
3,075,442 UART: [art] Lock RT PCRs Done
3,077,330 UART: [art] Populate DV Done
3,085,609 UART: [fht] FMC Alias Private Key: 7
3,086,713 UART: [art] Derive CDI
3,086,993 UART: [art] Store in in slot 0x4
3,172,990 UART: [art] Derive Key Pair
3,173,350 UART: [art] Store priv key in slot 0x5
3,186,340 UART: [art] Derive Key Pair - Done
3,201,375 UART: [art] Signing Cert with AUTHO
3,201,855 UART: RITY.KEYID = 7
3,217,919 UART: [art] Erasing AUTHORITY.KEYID = 7
3,218,684 UART: [art] PUB.X = B719D3567092E957643E94ACC1A433C8FFEA2BA1CA83108AB73A91234E59A51D101C439EA318B65386C39A03D126D8CC
3,225,455 UART: [art] PUB.Y = 785075AB8ED45C8584AE44EF67AFE2A04737220C35DEFD3F02C0533B4B8C12A8FF89392EB3FB1A5F70DBF19BEF5BFC3C
3,232,421 UART: [art] SIG.R = 6310914C755512427165C3DC4CF1DF48902BFEC2517CA4BF2D1D3326D472128DCFB5A8B8047E4861E7D808C70E0A73FA
3,239,183 UART: [art] SIG.S = CCB911E8AEB5A9D7F4DF6E0CDC22B22687D9EF345F8454C03B9F7B37C5FBAD749BCFE4EC81BA912E4E2EA6E4933FF097
3,263,439 UART: Caliptra RT
3,263,784 UART: [state] CFI Enabled
3,372,577 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,461 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,642,834 >>> mbox cmd response: success
2,705,332 UART:
2,705,348 UART: Running Caliptra FMC ...
2,705,756 UART:
2,705,899 UART: [state] CFI Enabled
2,716,816 UART: [fht] FMC Alias Private Key: 7
2,825,215 UART: [art] Extend RT PCRs Done
2,825,643 UART: [art] Lock RT PCRs Done
2,827,063 UART: [art] Populate DV Done
2,835,412 UART: [fht] FMC Alias Private Key: 7
2,836,474 UART: [art] Derive CDI
2,836,754 UART: [art] Store in in slot 0x4
2,922,807 UART: [art] Derive Key Pair
2,923,167 UART: [art] Store priv key in slot 0x5
2,936,445 UART: [art] Derive Key Pair - Done
2,951,186 UART: [art] Signing Cert with AUTHO
2,951,666 UART: RITY.KEYID = 7
2,966,778 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,543 UART: [art] PUB.X = 9CE3F724D6DB85EBDC5D4E5D300DC2875412B08AF568A38B3E9516C34903655C07669400D1EFD52215FCCEAA7BC73B37
2,974,292 UART: [art] PUB.Y = C8AA445F06DCE587E8E0D4A169A710D9A220F5CF0CD955E73134CD9687464C5622807275D15BDC40B8155A08E009DC01
2,981,229 UART: [art] SIG.R = 6F2AB1FC1FAB04DA14B280B785CAB81DC3F4038557EE54AA0C1CBE9510B65E4157E9BAA2EB9012B58050D3C155B8E924
2,988,006 UART: [art] SIG.S = C8886AADCE9F1942686E8BCF818FAF0CCBBEFD4185995D2A16DDA0CDA83EC9384C7B125EB94220F0D8D2A747B9513E5E
3,012,004 UART: Caliptra RT
3,012,349 UART: [state] CFI Enabled
3,120,812 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,266 UART: [idev] CSR uploaded
1,299,311 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,299,480 UART: [idev] --
1,300,305 UART: [ldev] ++
1,300,473 UART: [ldev] CDI.KEYID = 6
1,300,837 UART: [ldev] SUBJECT.KEYID = 5
1,301,264 UART: [ldev] AUTHORITY.KEYID = 7
1,301,727 UART: [ldev] FE.KEYID = 1
1,307,047 UART: [ldev] Erasing FE.KEYID = 1
1,333,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,789 UART: [ldev] --
1,373,239 UART: [fwproc] Wait for Commands...
1,374,006 UART: [fwproc] Recv command 0x46574c44
1,374,739 UART: [fwproc] Recv'd Img size: 114332 bytes
2,671,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,223 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,532 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,864,408 >>> mbox cmd response: success
2,865,629 UART: [afmc] ++
2,865,797 UART: [afmc] CDI.KEYID = 6
2,866,160 UART: [afmc] SUBJECT.KEYID = 7
2,866,586 UART: [afmc] AUTHORITY.KEYID = 5
2,902,473 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,448 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,177 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,060 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,779 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,664 UART: [afmc] --
2,945,650 UART: [cold-reset] --
2,946,438 UART: [state] Locking Datavault
2,947,837 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,441 UART: [state] Locking ICCM
2,949,001 UART: [exit] Launching FMC @ 0x40000130
2,954,330 UART:
2,954,346 UART: Running Caliptra FMC ...
2,954,754 UART:
2,954,808 UART: [state] CFI Enabled
2,965,007 UART: [fht] FMC Alias Private Key: 7
3,072,706 UART: [art] Extend RT PCRs Done
3,073,134 UART: [art] Lock RT PCRs Done
3,074,458 UART: [art] Populate DV Done
3,082,677 UART: [fht] FMC Alias Private Key: 7
3,083,637 UART: [art] Derive CDI
3,083,917 UART: [art] Store in in slot 0x4
3,169,750 UART: [art] Derive Key Pair
3,170,110 UART: [art] Store priv key in slot 0x5
3,183,074 UART: [art] Derive Key Pair - Done
3,197,853 UART: [art] Signing Cert with AUTHO
3,198,333 UART: RITY.KEYID = 7
3,213,997 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,762 UART: [art] PUB.X = 9427862A4248AF0FF9FFCA5DC1DC8405435973611D7664DB7030BD80178D57C33D4679E4A00F22DF026934EFC52CE78F
3,221,522 UART: [art] PUB.Y = B285D6AE95C034A1AAA2ECCAFF31D504F7926D5F702E81E1AADA125DDCABFED9FECC8061A62A8D59C17D18D319ACE37B
3,228,501 UART: [art] SIG.R = 6AFAA4780C275CB6310F7C439A68E040B16967C6D4A493AFDA875977181AA7D0D1C192320752614310626CE8D6428011
3,235,254 UART: [art] SIG.S = 02B2B2FEAF937807EF4440F9353CC64447EE9D0F0D1CF5F138272E026933412BCCFE9903AD4E9935B3DD2B5B2BC6BC1A
3,259,495 UART: Caliptra RT
3,259,748 UART: [state] CFI Enabled
3,367,937 UART: [rt] RT listening for mailbox commands...
3,368,607 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,223 UART: [rt]cmd =0x4c444556, len=4
3,408,584 >>> mbox cmd response data (687 bytes)
3,408,585 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,856 UART: [rt]cmd =0x43455246, len=4
3,449,901 >>> mbox cmd response data (887 bytes)
3,449,902 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,325 UART: [rt]cmd =0x43455252, len=4
3,490,277 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,442 UART: [state] LifecycleState = Unprovisioned
86,097 UART: [state] DebugLocked = No
86,681 UART: [state] WD Timer not started. Device not locked for debugging
88,040 UART: [kat] SHA2-256
891,590 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,719 UART: [kat] ++
895,871 UART: [kat] sha1
900,089 UART: [kat] SHA2-256
902,029 UART: [kat] SHA2-384
904,774 UART: [kat] SHA2-512-ACC
906,675 UART: [kat] ECC-384
916,400 UART: [kat] HMAC-384Kdf
921,156 UART: [kat] LMS
1,169,468 UART: [kat] --
1,170,549 UART: [cold-reset] ++
1,170,987 UART: [fht] FHT @ 0x50003400
1,173,649 UART: [idev] ++
1,173,817 UART: [idev] CDI.KEYID = 6
1,174,178 UART: [idev] SUBJECT.KEYID = 7
1,174,603 UART: [idev] UDS.KEYID = 0
1,182,629 UART: [idev] Erasing UDS.KEYID = 0
1,199,541 UART: [idev] Sha1 KeyId Algorithm
1,207,929 UART: [idev] CSR upload begun
1,209,708 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,123 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,831 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,716 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,422 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,851 UART: [idev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
1,297,348 UART: [idev] CSR uploaded
1,300,393 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,562 UART: [idev] --
1,301,447 UART: [ldev] ++
1,301,615 UART: [ldev] CDI.KEYID = 6
1,301,979 UART: [ldev] SUBJECT.KEYID = 5
1,302,406 UART: [ldev] AUTHORITY.KEYID = 7
1,302,869 UART: [ldev] FE.KEYID = 1
1,308,271 UART: [ldev] Erasing FE.KEYID = 1
1,334,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,953 UART: [ldev] --
1,373,385 UART: [fwproc] Wait for Commands...
1,373,984 UART: [fwproc] Recv command 0x46574c44
1,374,717 UART: [fwproc] Recv'd Img size: 114332 bytes
2,671,885 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,357 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,666 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,864,444 >>> mbox cmd response: success
2,865,659 UART: [afmc] ++
2,865,827 UART: [afmc] CDI.KEYID = 6
2,866,190 UART: [afmc] SUBJECT.KEYID = 7
2,866,616 UART: [afmc] AUTHORITY.KEYID = 5
2,901,439 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,917,871 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,918,622 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,351 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,234 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,935,953 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,943,918 UART: [afmc] --
2,944,868 UART: [cold-reset] --
2,945,718 UART: [state] Locking Datavault
2,946,803 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,407 UART: [state] Locking ICCM
2,947,997 UART: [exit] Launching FMC @ 0x40000130
2,953,326 UART:
2,953,342 UART: Running Caliptra FMC ...
2,953,750 UART:
2,953,804 UART: [state] CFI Enabled
2,964,129 UART: [fht] FMC Alias Private Key: 7
3,071,546 UART: [art] Extend RT PCRs Done
3,071,974 UART: [art] Lock RT PCRs Done
3,073,172 UART: [art] Populate DV Done
3,081,399 UART: [fht] FMC Alias Private Key: 7
3,082,543 UART: [art] Derive CDI
3,082,823 UART: [art] Store in in slot 0x4
3,168,704 UART: [art] Derive Key Pair
3,169,064 UART: [art] Store priv key in slot 0x5
3,182,260 UART: [art] Derive Key Pair - Done
3,196,661 UART: [art] Signing Cert with AUTHO
3,197,141 UART: RITY.KEYID = 7
3,213,037 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,802 UART: [art] PUB.X = 822C69624627ABCA6709EF49FB8EE548C6EC70209820F96110911A044EF34FB8DA0A74A4E7EDF1673641F77171F48F80
3,220,563 UART: [art] PUB.Y = CEE9EE1A834E7F85312BD72F8222BF0186180F57D65116BBF370A26A9B48F089F84BA2CCD4413CE140661E3F5BDB0453
3,227,512 UART: [art] SIG.R = 1D9A0C3B022945C4817FFBCB27A53804A50C7402A2A6C8C00C39524F2F10E5E6EFBA0F35E938B6E1975DDF0F874FFC22
3,234,270 UART: [art] SIG.S = 5C3267C3CDFBA625A7CA3FF33CC60EF6B9F670F640629842A8C29AA44DCD9E7CA85EF6CC11075A3FD18970F404479A5D
3,257,780 UART: Caliptra RT
3,258,033 UART: [state] CFI Enabled
3,365,300 UART: [rt] RT listening for mailbox commands...
3,365,970 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,704 UART: [rt]cmd =0x4c444556, len=4
3,406,191 >>> mbox cmd response data (687 bytes)
3,406,192 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,557 UART: [rt]cmd =0x43455246, len=4
3,447,442 >>> mbox cmd response data (887 bytes)
3,447,443 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,732 UART: [rt]cmd =0x43455252, len=4
3,487,486 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 931.69s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,824,197 UART: [art] Lock RT PCRs Done
2,825,493 UART: [art] Populate DV Done
2,833,472 UART: [fht] FMC Alias Private Key: 7
2,834,520 UART: [art] Derive CDI
2,834,800 UART: [art] Store in in slot 0x4
2,920,183 UART: [art] Derive Key Pair
2,920,543 UART: [art] Store priv key in slot 0x5
2,933,953 UART: [art] Derive Key Pair - Done
2,948,357 UART: [art] Signing Cert with AUTHO
2,948,837 UART: RITY.KEYID = 7
2,963,983 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,748 UART: [art] PUB.X = 9EAF7D2A40A0D2D802EAF732162082F82E675572BADB2A6E7F2164C49485B0710D77A5899A37743C5BF78459A004AA33
2,971,509 UART: [art] PUB.Y = A17A21793441E288BE1369BDE580280917CF5390E9CE2F10427053AD652C0E3FFC3CED00E7344E3537510683311D537C
2,978,422 UART: [art] SIG.R = AA93DE252433CBD8B74C22DAE60F7735DCF9CB1D886E262C4D8FA9459D5371904E478BBA5CA555D4F80EAFBA485249C3
2,985,202 UART: [art] SIG.S = 16DC6821C2BD9BC4D541B21035100E7EF532578694EDD3C782ADE4A25B6F62287D73711F60AD0223BB865FB93CAE2FFF
3,009,423 UART: Caliptra RT
3,009,676 UART: [state] CFI Enabled
3,117,011 UART: [rt] RT listening for mailbox commands...
3,117,681 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,531 UART: [rt]cmd =0x4c444556, len=4
3,158,028 >>> mbox cmd response data (687 bytes)
3,158,029 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,336 UART: [rt]cmd =0x43455246, len=4
3,199,343 >>> mbox cmd response data (887 bytes)
3,199,344 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,813 UART: [rt]cmd =0x43455252, len=4
3,239,579 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,904 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,640,083 >>> mbox cmd response: success
2,701,685 UART:
2,701,701 UART: Running Caliptra FMC ...
2,702,109 UART:
2,702,163 UART: [state] CFI Enabled
2,712,194 UART: [fht] FMC Alias Private Key: 7
2,820,391 UART: [art] Extend RT PCRs Done
2,820,819 UART: [art] Lock RT PCRs Done
2,822,525 UART: [art] Populate DV Done
2,830,458 UART: [fht] FMC Alias Private Key: 7
2,831,468 UART: [art] Derive CDI
2,831,748 UART: [art] Store in in slot 0x4
2,917,519 UART: [art] Derive Key Pair
2,917,879 UART: [art] Store priv key in slot 0x5
2,930,857 UART: [art] Derive Key Pair - Done
2,945,521 UART: [art] Signing Cert with AUTHO
2,946,001 UART: RITY.KEYID = 7
2,961,169 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,934 UART: [art] PUB.X = 3473978A0F386218FD6B97F4C71407146EE849AA6B2CA2D5F5AF6C36E9217950F1567CE0C4E3454172B00AEA5635797D
2,968,693 UART: [art] PUB.Y = 3819F5444CDD5EA974C1CF5DCE777BDA691E9225EF8F91565677162D0E58B666E00F1D01248EED0696CA023F118E19C9
2,975,632 UART: [art] SIG.R = EE1A9F29EB924E2B232F2178ADA8822874E42FC8082118467C5C4255189A7FC58388CF912A45DFD99DD18363BDB358D1
2,982,401 UART: [art] SIG.S = A5F6764B0757547E5FD80DCBEABA181C04EE2B6634C2BA30FFDBB88022FB48B26B5A98BF7322CF4F0F5FCCBB15AB96A4
3,006,206 UART: Caliptra RT
3,006,459 UART: [state] CFI Enabled
3,114,795 UART: [rt] RT listening for mailbox commands...
3,115,465 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,045 UART: [rt]cmd =0x4c444556, len=4
3,155,644 >>> mbox cmd response data (687 bytes)
3,155,645 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,172 UART: [rt]cmd =0x43455246, len=4
3,197,177 >>> mbox cmd response data (887 bytes)
3,197,178 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,553 UART: [rt]cmd =0x43455252, len=4
3,237,460 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,354 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,683 >>> mbox cmd response: success
2,703,891 UART:
2,703,907 UART: Running Caliptra FMC ...
2,704,315 UART:
2,704,369 UART: [state] CFI Enabled
2,715,196 UART: [fht] FMC Alias Private Key: 7
2,823,245 UART: [art] Extend RT PCRs Done
2,823,673 UART: [art] Lock RT PCRs Done
2,824,985 UART: [art] Populate DV Done
2,833,110 UART: [fht] FMC Alias Private Key: 7
2,834,222 UART: [art] Derive CDI
2,834,502 UART: [art] Store in in slot 0x4
2,919,753 UART: [art] Derive Key Pair
2,920,113 UART: [art] Store priv key in slot 0x5
2,933,377 UART: [art] Derive Key Pair - Done
2,948,210 UART: [art] Signing Cert with AUTHO
2,948,690 UART: RITY.KEYID = 7
2,963,916 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,681 UART: [art] PUB.X = 42C1BD40789934156E2CB0B8E89D7021C38E437091FF7A18E4FC9617AC04D5669A450B474C4AA8B98606EF4E4F66C3C4
2,971,444 UART: [art] PUB.Y = E163127522128FA690474187250A20E2CE9BF52A279700402B19D578D1002DAABDA75198B0493A5DDC834BDEDD246B0B
2,978,344 UART: [art] SIG.R = 0CC17386A3C07CC343E22C501DF5C9F368732EB4B9D065222B726ED8A68417344C8BBDD3FF317AD168F2A2D260989E1A
2,985,117 UART: [art] SIG.S = FBB57F128484DF4EE2966D4BBE60AF088A34C3D3C9226B5CD97E735B189458055319D5A0E5F4CC5644C4EA0F4ED90FE9
3,008,926 UART: Caliptra RT
3,009,179 UART: [state] CFI Enabled
3,117,400 UART: [rt] RT listening for mailbox commands...
3,118,070 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,180 UART: [rt]cmd =0x4c444556, len=4
3,158,553 >>> mbox cmd response data (687 bytes)
3,158,554 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,927 UART: [rt]cmd =0x43455246, len=4
3,199,948 >>> mbox cmd response data (887 bytes)
3,199,949 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,336 UART: [rt]cmd =0x43455252, len=4
3,240,094 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,274 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,113 >>> mbox cmd response: success
2,703,177 UART:
2,703,193 UART: Running Caliptra FMC ...
2,703,601 UART:
2,703,655 UART: [state] CFI Enabled
2,714,468 UART: [fht] FMC Alias Private Key: 7
2,822,919 UART: [art] Extend RT PCRs Done
2,823,347 UART: [art] Lock RT PCRs Done
2,824,911 UART: [art] Populate DV Done
2,832,948 UART: [fht] FMC Alias Private Key: 7
2,833,986 UART: [art] Derive CDI
2,834,266 UART: [art] Store in in slot 0x4
2,920,117 UART: [art] Derive Key Pair
2,920,477 UART: [art] Store priv key in slot 0x5
2,933,931 UART: [art] Derive Key Pair - Done
2,948,716 UART: [art] Signing Cert with AUTHO
2,949,196 UART: RITY.KEYID = 7
2,964,562 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,327 UART: [art] PUB.X = 9437BB2E8305CF6C0D8D3CEC34F25E231D85ED00BF901CC2C55F70338D82347CF413582A8BAE8B859C7281E6FCB4CD67
2,972,081 UART: [art] PUB.Y = EEE2740805DB459BC645AD414D8B230DE00583610B953D7133B93A886EB02F2B0EE26A35D5422EC8335ED1255F394CD3
2,979,015 UART: [art] SIG.R = C839C62BDFE5F019CD8DA8335BA0E6160140F28DEBEA0D83FF64D2825A4C99B42DD1463E3B707E2D52ECCF6AAB687CED
2,985,803 UART: [art] SIG.S = D8381D1324AD0E2C129DA96001B52F84279B3FA6D45AB0078241C061E5333755145412287823690E3EB3079865145A86
3,009,241 UART: Caliptra RT
3,009,494 UART: [state] CFI Enabled
3,117,214 UART: [rt] RT listening for mailbox commands...
3,117,884 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,644 UART: [rt]cmd =0x4c444556, len=4
3,158,109 >>> mbox cmd response data (687 bytes)
3,158,110 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,417 UART: [rt]cmd =0x43455246, len=4
3,199,474 >>> mbox cmd response data (887 bytes)
3,199,475 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,820 UART: [rt]cmd =0x43455252, len=4
3,239,557 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,808 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,640,855 >>> mbox cmd response: success
2,702,317 UART:
2,702,333 UART: Running Caliptra FMC ...
2,702,741 UART:
2,702,795 UART: [state] CFI Enabled
2,713,428 UART: [fht] FMC Alias Private Key: 7
2,821,871 UART: [art] Extend RT PCRs Done
2,822,299 UART: [art] Lock RT PCRs Done
2,823,941 UART: [art] Populate DV Done
2,832,104 UART: [fht] FMC Alias Private Key: 7
2,833,088 UART: [art] Derive CDI
2,833,368 UART: [art] Store in in slot 0x4
2,918,795 UART: [art] Derive Key Pair
2,919,155 UART: [art] Store priv key in slot 0x5
2,931,961 UART: [art] Derive Key Pair - Done
2,947,042 UART: [art] Signing Cert with AUTHO
2,947,522 UART: RITY.KEYID = 7
2,962,394 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,159 UART: [art] PUB.X = 5416929DAC8771A0D0A91FE8289D537787EFAF642DCC1BFF08905A1A7BC264EF2DED59D46B3025042DAF425D6310D238
2,969,931 UART: [art] PUB.Y = D6A67464B4AD93BD167E1367F4A0CB58DC36ADE6B47D1D201546537212E1CBFD67E988E2DEDE09CF97C6D2A500FD12B6
2,976,872 UART: [art] SIG.R = 0CAB0BF18B1C2DBB5967649548BB6E07966A18E24D138D7223368A745B82A798E96CABFFEA713514D195F2B3D53F4B30
2,983,639 UART: [art] SIG.S = 835987EBE06EDBDEA351C08BE34D1ED1AE4575FB1E423BBE0D4DC9ED8DEEB1B8838D368472351D20467DF0644B3B481B
3,008,131 UART: Caliptra RT
3,008,384 UART: [state] CFI Enabled
3,116,523 UART: [rt] RT listening for mailbox commands...
3,117,193 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,077 UART: [rt]cmd =0x4c444556, len=4
3,157,576 >>> mbox cmd response data (687 bytes)
3,157,577 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,058 UART: [rt]cmd =0x43455246, len=4
3,198,935 >>> mbox cmd response data (887 bytes)
3,198,936 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,139 UART: [rt]cmd =0x43455252, len=4
3,239,039 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 893.34s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,295,937 UART: [idev] CSR uploaded
1,298,982 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,299,151 UART: [idev] --
1,300,378 UART: [ldev] ++
1,300,546 UART: [ldev] CDI.KEYID = 6
1,300,910 UART: [ldev] SUBJECT.KEYID = 5
1,301,337 UART: [ldev] AUTHORITY.KEYID = 7
1,301,800 UART: [ldev] FE.KEYID = 1
1,307,270 UART: [ldev] Erasing FE.KEYID = 1
1,333,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,366 UART: [ldev] --
1,372,702 UART: [fwproc] Wait for Commands...
1,373,279 UART: [fwproc] Recv command 0x46574c44
1,374,012 UART: [fwproc] Recv'd Img size: 114332 bytes
2,671,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,698,736 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,045 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,863,841 >>> mbox cmd response: success
2,865,080 UART: [afmc] ++
2,865,248 UART: [afmc] CDI.KEYID = 6
2,865,611 UART: [afmc] SUBJECT.KEYID = 7
2,866,037 UART: [afmc] AUTHORITY.KEYID = 5
2,902,332 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,861 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,590 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,473 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,192 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,847 UART: [afmc] --
2,945,751 UART: [cold-reset] --
2,946,571 UART: [state] Locking Datavault
2,947,812 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,416 UART: [state] Locking ICCM
2,948,860 UART: [exit] Launching FMC @ 0x40000130
2,954,189 UART:
2,954,205 UART: Running Caliptra FMC ...
2,954,613 UART:
2,954,756 UART: [state] CFI Enabled
2,965,747 UART: [fht] FMC Alias Private Key: 7
3,074,022 UART: [art] Extend RT PCRs Done
3,074,450 UART: [art] Lock RT PCRs Done
3,076,054 UART: [art] Populate DV Done
3,084,139 UART: [fht] FMC Alias Private Key: 7
3,085,317 UART: [art] Derive CDI
3,085,597 UART: [art] Store in in slot 0x4
3,171,116 UART: [art] Derive Key Pair
3,171,476 UART: [art] Store priv key in slot 0x5
3,185,122 UART: [art] Derive Key Pair - Done
3,200,044 UART: [art] Signing Cert with AUTHO
3,200,524 UART: RITY.KEYID = 7
3,215,860 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,625 UART: [art] PUB.X = 66495CAA4414C2FCED4C1B1CB3FDFB682A9770885121C3B60F05D8D4C858DA03B4D33D13DB187073367E3B31812E52EA
3,223,394 UART: [art] PUB.Y = 267DEA03C770C6FFEC0FCEF1BE0F02AEAF05B73BDFA831C731475D93E8A31F76B3FD1E2DE77C71E9E6466F4146F7B661
3,230,351 UART: [art] SIG.R = 993B7462A0489BC8C303B318B9C9D243D98E9EFA373AB224295F47300087E2034710DE833657390AE97A9DDB1E20D359
3,237,084 UART: [art] SIG.S = 224437DF09CCC6B2F8A3BF50EFCCA14F1ADEBC364FF0D672D1DB1F13187FF4B9DD5CD999636623724FF0455EBB9D1E81
3,261,058 UART: Caliptra RT
3,261,403 UART: [state] CFI Enabled
3,369,132 UART: [rt] RT listening for mailbox commands...
3,369,802 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,824 UART: [rt]cmd =0x4c444556, len=4
3,410,487 >>> mbox cmd response data (687 bytes)
3,410,488 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,065 UART: [rt]cmd =0x43455246, len=4
3,452,078 >>> mbox cmd response data (887 bytes)
3,452,079 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,481,284 UART: [rt]cmd =0x43455252, len=4
3,492,128 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
891,349 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,478 UART: [kat] ++
895,630 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,473 UART: [kat] SHA2-512-ACC
906,374 UART: [kat] ECC-384
915,753 UART: [kat] HMAC-384Kdf
920,273 UART: [kat] LMS
1,168,585 UART: [kat] --
1,169,518 UART: [cold-reset] ++
1,169,922 UART: [fht] FHT @ 0x50003400
1,172,474 UART: [idev] ++
1,172,642 UART: [idev] CDI.KEYID = 6
1,173,003 UART: [idev] SUBJECT.KEYID = 7
1,173,428 UART: [idev] UDS.KEYID = 0
1,181,362 UART: [idev] Erasing UDS.KEYID = 0
1,198,218 UART: [idev] Sha1 KeyId Algorithm
1,206,538 UART: [idev] CSR upload begun
1,208,317 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,362 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,070 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,955 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,661 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,090 UART: [idev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
1,296,587 UART: [idev] CSR uploaded
1,299,632 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,299,801 UART: [idev] --
1,300,884 UART: [ldev] ++
1,301,052 UART: [ldev] CDI.KEYID = 6
1,301,416 UART: [ldev] SUBJECT.KEYID = 5
1,301,843 UART: [ldev] AUTHORITY.KEYID = 7
1,302,306 UART: [ldev] FE.KEYID = 1
1,307,932 UART: [ldev] Erasing FE.KEYID = 1
1,334,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,888 UART: [ldev] --
1,373,162 UART: [fwproc] Wait for Commands...
1,373,803 UART: [fwproc] Recv command 0x46574c44
1,374,536 UART: [fwproc] Recv'd Img size: 114332 bytes
2,672,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,698,620 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,929 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,863,855 >>> mbox cmd response: success
2,865,014 UART: [afmc] ++
2,865,182 UART: [afmc] CDI.KEYID = 6
2,865,545 UART: [afmc] SUBJECT.KEYID = 7
2,865,971 UART: [afmc] AUTHORITY.KEYID = 5
2,901,780 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,696 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,447 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,176 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,059 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,778 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,443 UART: [afmc] --
2,945,477 UART: [cold-reset] --
2,946,327 UART: [state] Locking Datavault
2,947,506 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,110 UART: [state] Locking ICCM
2,948,626 UART: [exit] Launching FMC @ 0x40000130
2,953,955 UART:
2,953,971 UART: Running Caliptra FMC ...
2,954,379 UART:
2,954,522 UART: [state] CFI Enabled
2,965,467 UART: [fht] FMC Alias Private Key: 7
3,073,170 UART: [art] Extend RT PCRs Done
3,073,598 UART: [art] Lock RT PCRs Done
3,075,472 UART: [art] Populate DV Done
3,083,467 UART: [fht] FMC Alias Private Key: 7
3,084,403 UART: [art] Derive CDI
3,084,683 UART: [art] Store in in slot 0x4
3,170,186 UART: [art] Derive Key Pair
3,170,546 UART: [art] Store priv key in slot 0x5
3,183,692 UART: [art] Derive Key Pair - Done
3,198,535 UART: [art] Signing Cert with AUTHO
3,199,015 UART: RITY.KEYID = 7
3,214,475 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,240 UART: [art] PUB.X = C7CA575C837F9AE638553F3F2C0685D63834C180A7596D116AA5E3989A479F15E7876E612176BD26988F85E72F7892CF
3,222,001 UART: [art] PUB.Y = D720C4F5F9708B1157352EC90C4738C1DB28DD4E1866CDE392EE2D9569D1173AF1B30DC5770A6CCBDD83B78E53347588
3,228,948 UART: [art] SIG.R = E6A8C7467D9CAF259DC0DF0123A81656D00E655DDD58377997F03FE618243A08DCC64A2AA093884144349EE3CFEABE68
3,235,717 UART: [art] SIG.S = 5184715F151C5D63A153B90F4B5FC535C9AB62BB362C93A762898CFBA9FB3FC04B8B7A1340BB3BDCAB2D00424FFFC64E
3,259,559 UART: Caliptra RT
3,259,904 UART: [state] CFI Enabled
3,367,375 UART: [rt] RT listening for mailbox commands...
3,368,045 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,871 UART: [rt]cmd =0x4c444556, len=4
3,408,446 >>> mbox cmd response data (687 bytes)
3,408,447 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,708 UART: [rt]cmd =0x43455246, len=4
3,449,811 >>> mbox cmd response data (887 bytes)
3,449,812 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,319 UART: [rt]cmd =0x43455252, len=4
3,490,165 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 909.21s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,823,825 UART: [art] Lock RT PCRs Done
2,825,243 UART: [art] Populate DV Done
2,833,088 UART: [fht] FMC Alias Private Key: 7
2,834,164 UART: [art] Derive CDI
2,834,444 UART: [art] Store in in slot 0x4
2,920,219 UART: [art] Derive Key Pair
2,920,579 UART: [art] Store priv key in slot 0x5
2,933,471 UART: [art] Derive Key Pair - Done
2,948,168 UART: [art] Signing Cert with AUTHO
2,948,648 UART: RITY.KEYID = 7
2,964,170 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,935 UART: [art] PUB.X = ACA5C4C08054A3158E02C3E53BAFBF263E68979AD56AF506C6B7775CD6006C9306A4538BF6FB135DC76564BDC137183D
2,971,682 UART: [art] PUB.Y = D75F1920BE7DEABB49E8B13D2F5EE0DE0551B52A396FAC4692E9C23A481D2B63822FBF22481CD46E96782604D5A394D0
2,978,636 UART: [art] SIG.R = 2857348E5A4E57E648FF444EEBC9C69A29588D8C23254B93FBEC8AA7AE1CD6F436C46CBA2D0FA73804BAA559E7504316
2,985,412 UART: [art] SIG.S = C7ED80C248159082B690575AA0627EB7D402F8FEF91BBB470F2D4A28E165E066380E389BA851A1321A6BBDEB244C095B
3,008,657 UART: Caliptra RT
3,009,002 UART: [state] CFI Enabled
3,116,533 UART: [rt] RT listening for mailbox commands...
3,117,203 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,995 UART: [rt]cmd =0x4c444556, len=4
3,157,320 >>> mbox cmd response data (687 bytes)
3,157,321 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,680 UART: [rt]cmd =0x43455246, len=4
3,198,575 >>> mbox cmd response data (887 bytes)
3,198,576 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,153 UART: [rt]cmd =0x43455252, len=4
3,239,053 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,555 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,628 >>> mbox cmd response: success
2,705,096 UART:
2,705,112 UART: Running Caliptra FMC ...
2,705,520 UART:
2,705,663 UART: [state] CFI Enabled
2,716,328 UART: [fht] FMC Alias Private Key: 7
2,823,769 UART: [art] Extend RT PCRs Done
2,824,197 UART: [art] Lock RT PCRs Done
2,825,571 UART: [art] Populate DV Done
2,833,678 UART: [fht] FMC Alias Private Key: 7
2,834,694 UART: [art] Derive CDI
2,834,974 UART: [art] Store in in slot 0x4
2,920,671 UART: [art] Derive Key Pair
2,921,031 UART: [art] Store priv key in slot 0x5
2,934,165 UART: [art] Derive Key Pair - Done
2,948,869 UART: [art] Signing Cert with AUTHO
2,949,349 UART: RITY.KEYID = 7
2,964,765 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,530 UART: [art] PUB.X = B8F55D0DA9F6DF13124110AFE718959AEB3E761F3AC41BDFEFE3F3EEC155F7ABE9BE616C06D932BCDF086D0D298D64C6
2,972,314 UART: [art] PUB.Y = C55CF032FB06E28D9FFFA82CEF10082FEB0F4AF97C822C5F008EBB18C829E0504F87146E4B67F5A720DA4C416ED86F59
2,979,249 UART: [art] SIG.R = ED615F3CB42D3AFB0D9D7BACC5ED0BE85095972CA5084D68DE71D513B41FAE8BC480D1D0CD1F17D15CCD7ABE72AEA0D3
2,986,042 UART: [art] SIG.S = 04DAB300B33CB18DF30DBAF607D2C97011CEC38DE0720E330E290B7AD86A1E1DA8A6DFC0BC101A89E83E2DFFA0304733
3,010,315 UART: Caliptra RT
3,010,660 UART: [state] CFI Enabled
3,118,143 UART: [rt] RT listening for mailbox commands...
3,118,813 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,681 UART: [rt]cmd =0x4c444556, len=4
3,159,052 >>> mbox cmd response data (687 bytes)
3,159,053 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,468 UART: [rt]cmd =0x43455246, len=4
3,200,527 >>> mbox cmd response data (887 bytes)
3,200,528 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,819 UART: [rt]cmd =0x43455252, len=4
3,240,495 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,393 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,642,910 >>> mbox cmd response: success
2,705,030 UART:
2,705,046 UART: Running Caliptra FMC ...
2,705,454 UART:
2,705,597 UART: [state] CFI Enabled
2,716,124 UART: [fht] FMC Alias Private Key: 7
2,823,861 UART: [art] Extend RT PCRs Done
2,824,289 UART: [art] Lock RT PCRs Done
2,825,837 UART: [art] Populate DV Done
2,833,976 UART: [fht] FMC Alias Private Key: 7
2,835,032 UART: [art] Derive CDI
2,835,312 UART: [art] Store in in slot 0x4
2,921,435 UART: [art] Derive Key Pair
2,921,795 UART: [art] Store priv key in slot 0x5
2,935,267 UART: [art] Derive Key Pair - Done
2,950,129 UART: [art] Signing Cert with AUTHO
2,950,609 UART: RITY.KEYID = 7
2,965,587 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,352 UART: [art] PUB.X = 6B89E3A2DF5059C4C672FC37E9A66918FA959A59ED69139E7DB92DAFCBC1C455A5A93459603F01ED887BBF21E8B2B8BD
2,973,135 UART: [art] PUB.Y = 14B8B045DE7C635014B1FDC0AB81ECA423EC571FD7F3DBE300F4F65E062D0B46C60C68A7D7ECBD5C2130C6F0BFC0F6C4
2,980,078 UART: [art] SIG.R = 905E54F0224AD46FF9EF372EBD888E910C1A022DF29D4E891A948BF08BF1AB952665F75E04479D92C80AE7179C4ADE72
2,986,844 UART: [art] SIG.S = 0471ADDADAD65F18AE62EE0A9F6365DFF7988288281CB2683D2FDEC6650917F1E85F1BC425D17D4962B36DA1B33BA1CA
3,010,774 UART: Caliptra RT
3,011,119 UART: [state] CFI Enabled
3,118,678 UART: [rt] RT listening for mailbox commands...
3,119,348 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,124 UART: [rt]cmd =0x4c444556, len=4
3,159,675 >>> mbox cmd response data (687 bytes)
3,159,676 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,979 UART: [rt]cmd =0x43455246, len=4
3,200,854 >>> mbox cmd response data (887 bytes)
3,200,855 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,308 UART: [rt]cmd =0x43455252, len=4
3,240,992 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,393 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,640,884 >>> mbox cmd response: success
2,703,400 UART:
2,703,416 UART: Running Caliptra FMC ...
2,703,824 UART:
2,703,967 UART: [state] CFI Enabled
2,714,860 UART: [fht] FMC Alias Private Key: 7
2,822,617 UART: [art] Extend RT PCRs Done
2,823,045 UART: [art] Lock RT PCRs Done
2,824,099 UART: [art] Populate DV Done
2,832,532 UART: [fht] FMC Alias Private Key: 7
2,833,556 UART: [art] Derive CDI
2,833,836 UART: [art] Store in in slot 0x4
2,919,243 UART: [art] Derive Key Pair
2,919,603 UART: [art] Store priv key in slot 0x5
2,933,639 UART: [art] Derive Key Pair - Done
2,948,081 UART: [art] Signing Cert with AUTHO
2,948,561 UART: RITY.KEYID = 7
2,963,553 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,318 UART: [art] PUB.X = 55F001D68A8040960733ADA50F34C30F9D3B0065D275123C809AEAE79A46FAFC955C787DFE1E3CC79BBCFC5F04AAF366
2,971,065 UART: [art] PUB.Y = 9CB94F425A7529E39FE5837E5ED033B398E74DA706007066E2A7CFE95FE895BA4D651216A7C1D49D61359B19C34861C3
2,977,990 UART: [art] SIG.R = 5E6D0612375F9F6A8448DFB46BD5913D904D781FD92CDF1BBF7AD3F32CE19B26002CF0B6E8B39FC9EAA5A9F108C9F934
2,984,750 UART: [art] SIG.S = 79A39B0EC1F85E8B82D7545EA82FAF03E3867F9B556DC8E522102C9117FEC36649D05270518F9901C51FE13FA60A934D
3,008,541 UART: Caliptra RT
3,008,886 UART: [state] CFI Enabled
3,117,107 UART: [rt] RT listening for mailbox commands...
3,117,777 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,507 UART: [rt]cmd =0x4c444556, len=4
3,157,950 >>> mbox cmd response data (687 bytes)
3,157,951 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,338 UART: [rt]cmd =0x43455246, len=4
3,199,349 >>> mbox cmd response data (887 bytes)
3,199,350 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,839 UART: [rt]cmd =0x43455252, len=4
3,239,563 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,315 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,162 >>> mbox cmd response: success
2,703,342 UART:
2,703,358 UART: Running Caliptra FMC ...
2,703,766 UART:
2,703,909 UART: [state] CFI Enabled
2,714,780 UART: [fht] FMC Alias Private Key: 7
2,822,183 UART: [art] Extend RT PCRs Done
2,822,611 UART: [art] Lock RT PCRs Done
2,824,159 UART: [art] Populate DV Done
2,832,592 UART: [fht] FMC Alias Private Key: 7
2,833,588 UART: [art] Derive CDI
2,833,868 UART: [art] Store in in slot 0x4
2,919,655 UART: [art] Derive Key Pair
2,920,015 UART: [art] Store priv key in slot 0x5
2,933,517 UART: [art] Derive Key Pair - Done
2,948,628 UART: [art] Signing Cert with AUTHO
2,949,108 UART: RITY.KEYID = 7
2,964,310 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,075 UART: [art] PUB.X = A498D0176651577DE58CBBEDB73E39B6F83B9FD8C22A3851AF75E4D04FC159D4758E7673E4883F1FB4364B4F06A0C20D
2,971,847 UART: [art] PUB.Y = EA57CD6AAA707475C9F059B0422C57E3409226A01F545CD7BC683DFF891023F21DBCAB6691A0E408F84D8B7BDBB14106
2,978,801 UART: [art] SIG.R = 1E59A122F510DA6D06025749733497EFD4D44ADE4DA008E76E02618DAD3582A639A6D749D092E19B1E4CEAC68A104A33
2,985,563 UART: [art] SIG.S = 55A47EE77864E60ACB949E544A17CACBE1966299D53D77AF13587114990017BDFE084AADF12C615292D67F6B5984C510
3,009,272 UART: Caliptra RT
3,009,617 UART: [state] CFI Enabled
3,117,632 UART: [rt] RT listening for mailbox commands...
3,118,302 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,162 UART: [rt]cmd =0x4c444556, len=4
3,158,653 >>> mbox cmd response data (687 bytes)
3,158,654 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,109 UART: [rt]cmd =0x43455246, len=4
3,200,228 >>> mbox cmd response data (887 bytes)
3,200,229 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,468 UART: [rt]cmd =0x43455252, len=4
3,240,412 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 874.55s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,252 UART: [idev] CSR uploaded
1,299,297 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,299,466 UART: [idev] --
1,300,595 UART: [ldev] ++
1,300,763 UART: [ldev] CDI.KEYID = 6
1,301,127 UART: [ldev] SUBJECT.KEYID = 5
1,301,554 UART: [ldev] AUTHORITY.KEYID = 7
1,302,017 UART: [ldev] FE.KEYID = 1
1,307,331 UART: [ldev] Erasing FE.KEYID = 1
1,333,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,921 UART: [ldev] --
1,372,339 UART: [fwproc] Wait for Commands...
1,372,912 UART: [fwproc] Recv command 0x46574c44
1,373,645 UART: [fwproc] Recv'd Img size: 114332 bytes
2,671,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,697,983 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,292 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,863,154 >>> mbox cmd response: success
2,864,203 UART: [afmc] ++
2,864,371 UART: [afmc] CDI.KEYID = 6
2,864,734 UART: [afmc] SUBJECT.KEYID = 7
2,865,160 UART: [afmc] AUTHORITY.KEYID = 5
2,900,343 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,916,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,917,564 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,923,293 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,929,176 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,934,895 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,942,706 UART: [afmc] --
2,943,820 UART: [cold-reset] --
2,944,638 UART: [state] Locking Datavault
2,945,779 UART: [state] Locking PCR0, PCR1 and PCR31
2,946,383 UART: [state] Locking ICCM
2,946,841 UART: [exit] Launching FMC @ 0x40000130
2,952,170 UART:
2,952,186 UART: Running Caliptra FMC ...
2,952,594 UART:
2,952,648 UART: [state] CFI Enabled
2,963,041 UART: [fht] FMC Alias Private Key: 7
3,071,372 UART: [art] Extend RT PCRs Done
3,071,800 UART: [art] Lock RT PCRs Done
3,073,026 UART: [art] Populate DV Done
3,081,531 UART: [fht] FMC Alias Private Key: 7
3,082,621 UART: [art] Derive CDI
3,082,901 UART: [art] Store in in slot 0x4
3,168,190 UART: [art] Derive Key Pair
3,168,550 UART: [art] Store priv key in slot 0x5
3,181,242 UART: [art] Derive Key Pair - Done
3,196,214 UART: [art] Signing Cert with AUTHO
3,196,694 UART: RITY.KEYID = 7
3,211,958 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,723 UART: [art] PUB.X = 60788D60B56F8520D90F198DCE1C7A8A5265DE32B342D9819C7CE6A2CBD82825A79E9CDE17205A3BE75828F54A8CEBB6
3,219,500 UART: [art] PUB.Y = BC574BE11B471FF19B7B77A2513E5F34C50F20FAEA22448259C0EBC7D25535E9E2DB07A4A9BFC1750B175D987DB446F7
3,226,453 UART: [art] SIG.R = 06307977DE2C7ED67BBA7FAEC8493E5292549B6B3F728EC0F9DF82E0E763B6D6D8EC0B9C94370A07203B648072D91555
3,233,215 UART: [art] SIG.S = D4528AB451F3D3CC08F3E4E1A7D7177C60A0830939C533AEE6CD050857206C48C46FE87287735E26FB3C23C21F7514F8
3,256,886 UART: Caliptra RT
3,257,139 UART: [state] CFI Enabled
3,364,786 UART: [rt] RT listening for mailbox commands...
3,365,456 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,302 UART: [rt]cmd =0x4c444556, len=4
3,405,829 >>> mbox cmd response data (687 bytes)
3,405,830 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,129 UART: [rt]cmd =0x43455246, len=4
3,447,236 >>> mbox cmd response data (887 bytes)
3,447,237 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,710 UART: [rt]cmd =0x43455252, len=4
3,487,458 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,792 UART: [state] LifecycleState = Unprovisioned
85,447 UART: [state] DebugLocked = No
86,047 UART: [state] WD Timer not started. Device not locked for debugging
87,366 UART: [kat] SHA2-256
890,916 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,045 UART: [kat] ++
895,197 UART: [kat] sha1
899,467 UART: [kat] SHA2-256
901,407 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
916,084 UART: [kat] HMAC-384Kdf
920,620 UART: [kat] LMS
1,168,932 UART: [kat] --
1,169,819 UART: [cold-reset] ++
1,170,175 UART: [fht] FHT @ 0x50003400
1,172,909 UART: [idev] ++
1,173,077 UART: [idev] CDI.KEYID = 6
1,173,438 UART: [idev] SUBJECT.KEYID = 7
1,173,863 UART: [idev] UDS.KEYID = 0
1,181,715 UART: [idev] Erasing UDS.KEYID = 0
1,198,543 UART: [idev] Sha1 KeyId Algorithm
1,206,961 UART: [idev] CSR upload begun
1,208,740 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,329 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,037 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,922 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,628 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,057 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,554 UART: [idev] CSR uploaded
1,299,599 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,299,768 UART: [idev] --
1,300,679 UART: [ldev] ++
1,300,847 UART: [ldev] CDI.KEYID = 6
1,301,211 UART: [ldev] SUBJECT.KEYID = 5
1,301,638 UART: [ldev] AUTHORITY.KEYID = 7
1,302,101 UART: [ldev] FE.KEYID = 1
1,307,651 UART: [ldev] Erasing FE.KEYID = 1
1,334,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,109 UART: [ldev] --
1,373,583 UART: [fwproc] Wait for Commands...
1,374,266 UART: [fwproc] Recv command 0x46574c44
1,374,999 UART: [fwproc] Recv'd Img size: 114332 bytes
2,672,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,509 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,818 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,864,744 >>> mbox cmd response: success
2,865,835 UART: [afmc] ++
2,866,003 UART: [afmc] CDI.KEYID = 6
2,866,366 UART: [afmc] SUBJECT.KEYID = 7
2,866,792 UART: [afmc] AUTHORITY.KEYID = 5
2,901,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,240 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,969 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,852 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,571 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,398 UART: [afmc] --
2,945,296 UART: [cold-reset] --
2,946,010 UART: [state] Locking Datavault
2,947,279 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,883 UART: [state] Locking ICCM
2,948,541 UART: [exit] Launching FMC @ 0x40000130
2,953,870 UART:
2,953,886 UART: Running Caliptra FMC ...
2,954,294 UART:
2,954,348 UART: [state] CFI Enabled
2,964,633 UART: [fht] FMC Alias Private Key: 7
3,072,750 UART: [art] Extend RT PCRs Done
3,073,178 UART: [art] Lock RT PCRs Done
3,074,744 UART: [art] Populate DV Done
3,082,833 UART: [fht] FMC Alias Private Key: 7
3,083,925 UART: [art] Derive CDI
3,084,205 UART: [art] Store in in slot 0x4
3,170,214 UART: [art] Derive Key Pair
3,170,574 UART: [art] Store priv key in slot 0x5
3,183,308 UART: [art] Derive Key Pair - Done
3,198,146 UART: [art] Signing Cert with AUTHO
3,198,626 UART: RITY.KEYID = 7
3,213,608 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,373 UART: [art] PUB.X = 30E8E733C800D49C3909E92C73694FA4EA7D4893233EA80AA82E6681B275D476FB768C50A25F52767C683B5E1171BF07
3,221,108 UART: [art] PUB.Y = 3A68D02808FF281FACE3F3EFF737B2112DE053BE578C8468BCAEEF826331BE2CEB8D3FBFE33D7E7EF4FA2D94043BF34E
3,228,078 UART: [art] SIG.R = 78CE5A42CE82077A69523C73DE2F9A197F9D233F8741B8175C546FAB1724578288548C21524E2E59431AACC448052982
3,234,832 UART: [art] SIG.S = 49AEC804B2629517B55D1C8D5291B462BE739F7BEB8982F67D8FB4D2A20528DFF0402F2086347734E2DA33F4D9C434A8
3,259,587 UART: Caliptra RT
3,259,840 UART: [state] CFI Enabled
3,367,425 UART: [rt] RT listening for mailbox commands...
3,368,095 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,117 UART: [rt]cmd =0x4c444556, len=4
3,408,692 >>> mbox cmd response data (687 bytes)
3,408,693 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,218 UART: [rt]cmd =0x43455246, len=4
3,450,403 >>> mbox cmd response data (887 bytes)
3,450,404 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,729 UART: [rt]cmd =0x43455252, len=4
3,490,667 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 887.94s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,820,439 UART: [art] Lock RT PCRs Done
2,821,851 UART: [art] Populate DV Done
2,830,134 UART: [fht] FMC Alias Private Key: 7
2,831,178 UART: [art] Derive CDI
2,831,458 UART: [art] Store in in slot 0x4
2,917,007 UART: [art] Derive Key Pair
2,917,367 UART: [art] Store priv key in slot 0x5
2,930,223 UART: [art] Derive Key Pair - Done
2,945,447 UART: [art] Signing Cert with AUTHO
2,945,927 UART: RITY.KEYID = 7
2,961,503 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,268 UART: [art] PUB.X = BD6ADAB2E82B339E26E37F9EE40372E1F53F7D55EF4D80C5077E780C7F05A654E6C9033FB8B0DA6129398013784FC3BE
2,969,033 UART: [art] PUB.Y = 9E0F319FBEEF47D9F5FC125899E84105A389A32AA969B8AFEB48C7C7F84D22A88E203EADFA4039908CFDDF9BB4A4296C
2,975,997 UART: [art] SIG.R = A027DE48B0887820445691709DA3CA8271EC7BFF0E44085DD13F4D31243618D387B0239605411FE5133596785C2D6A6E
2,982,748 UART: [art] SIG.S = ADD4E62B3300F9496D8B48C88D5912F9068466DF6F2000BD7235DD7B0112E858979C8691B94794AAEC2035664BA88FA5
3,006,035 UART: Caliptra RT
3,006,288 UART: [state] CFI Enabled
3,113,760 UART: [rt] RT listening for mailbox commands...
3,114,430 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,114 UART: [rt]cmd =0x4c444556, len=4
3,154,579 >>> mbox cmd response data (687 bytes)
3,154,580 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,087 UART: [rt]cmd =0x43455246, len=4
3,196,150 >>> mbox cmd response data (887 bytes)
3,196,151 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,432 UART: [rt]cmd =0x43455252, len=4
3,236,257 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,432 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,639,711 >>> mbox cmd response: success
2,701,613 UART:
2,701,629 UART: Running Caliptra FMC ...
2,702,037 UART:
2,702,091 UART: [state] CFI Enabled
2,712,150 UART: [fht] FMC Alias Private Key: 7
2,820,763 UART: [art] Extend RT PCRs Done
2,821,191 UART: [art] Lock RT PCRs Done
2,822,665 UART: [art] Populate DV Done
2,830,712 UART: [fht] FMC Alias Private Key: 7
2,831,800 UART: [art] Derive CDI
2,832,080 UART: [art] Store in in slot 0x4
2,917,975 UART: [art] Derive Key Pair
2,918,335 UART: [art] Store priv key in slot 0x5
2,931,361 UART: [art] Derive Key Pair - Done
2,946,455 UART: [art] Signing Cert with AUTHO
2,946,935 UART: RITY.KEYID = 7
2,962,147 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,912 UART: [art] PUB.X = ADC5E6204878E8DD88299A755D14FE8C3EB6773015083E6AE84D9DBE41A3BAE83B1AA1B0288AA3AFF9552C6AD1345169
2,969,691 UART: [art] PUB.Y = A11612491CCDFC01EF9D97CDEBCA7F780769071D970E9CBBF22BAE9D6422374007F03CCFA6BD143F87EE259F87B45CC2
2,976,644 UART: [art] SIG.R = 43651DC663EBF3BBF040E230182C73707182DCDADA1718CB5A91F0276F475DF533D403B58625D3FD18E8EE934140B147
2,983,413 UART: [art] SIG.S = ED3A91CAEF7F6BE6FD5762D292999245887B1F41EE193ACB994C6793432914E988A7F58556B7957125D117A7A6CE6EE7
3,007,368 UART: Caliptra RT
3,007,621 UART: [state] CFI Enabled
3,116,186 UART: [rt] RT listening for mailbox commands...
3,116,856 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,474 UART: [rt]cmd =0x4c444556, len=4
3,156,673 >>> mbox cmd response data (687 bytes)
3,156,674 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,021 UART: [rt]cmd =0x43455246, len=4
3,198,212 >>> mbox cmd response data (887 bytes)
3,198,213 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,778 UART: [rt]cmd =0x43455252, len=4
3,238,566 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,570 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,335 >>> mbox cmd response: success
2,702,653 UART:
2,702,669 UART: Running Caliptra FMC ...
2,703,077 UART:
2,703,131 UART: [state] CFI Enabled
2,713,678 UART: [fht] FMC Alias Private Key: 7
2,821,985 UART: [art] Extend RT PCRs Done
2,822,413 UART: [art] Lock RT PCRs Done
2,824,169 UART: [art] Populate DV Done
2,832,568 UART: [fht] FMC Alias Private Key: 7
2,833,652 UART: [art] Derive CDI
2,833,932 UART: [art] Store in in slot 0x4
2,919,465 UART: [art] Derive Key Pair
2,919,825 UART: [art] Store priv key in slot 0x5
2,932,913 UART: [art] Derive Key Pair - Done
2,948,101 UART: [art] Signing Cert with AUTHO
2,948,581 UART: RITY.KEYID = 7
2,964,123 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,888 UART: [art] PUB.X = 31F7BE69C4428A741B587AAEF1B5078CAFC91CB5E79E9835BBA47356C431E3E101DB02A878B6201092DAC79997D31206
2,971,650 UART: [art] PUB.Y = 3ACAC4406E48A50B509674BAD43CE64087225F2AB9120E4D12F7E380592E12E48C3666FE59F3C51A9A74AB51D6DA6665
2,978,598 UART: [art] SIG.R = EB0C098DB06391BE16F2702615EEFBD6AD014AE031AE3DFF4A3D8DECF691FFD6CF1467FA4C7DC3F7AB32DB6EB0F936C3
2,985,391 UART: [art] SIG.S = D8961517E240FA9D74B3932A7C0322C3C9C7B42993F53B6E4072F5C664676869653984CAA106939411B6229ABC247158
3,009,558 UART: Caliptra RT
3,009,811 UART: [state] CFI Enabled
3,116,511 UART: [rt] RT listening for mailbox commands...
3,117,181 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,979 UART: [rt]cmd =0x4c444556, len=4
3,157,246 >>> mbox cmd response data (687 bytes)
3,157,247 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,716 UART: [rt]cmd =0x43455246, len=4
3,198,899 >>> mbox cmd response data (887 bytes)
3,198,900 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,407 UART: [rt]cmd =0x43455252, len=4
3,239,166 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,550 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,639,993 >>> mbox cmd response: success
2,701,717 UART:
2,701,733 UART: Running Caliptra FMC ...
2,702,141 UART:
2,702,195 UART: [state] CFI Enabled
2,712,698 UART: [fht] FMC Alias Private Key: 7
2,820,777 UART: [art] Extend RT PCRs Done
2,821,205 UART: [art] Lock RT PCRs Done
2,822,519 UART: [art] Populate DV Done
2,830,750 UART: [fht] FMC Alias Private Key: 7
2,831,888 UART: [art] Derive CDI
2,832,168 UART: [art] Store in in slot 0x4
2,918,053 UART: [art] Derive Key Pair
2,918,413 UART: [art] Store priv key in slot 0x5
2,931,907 UART: [art] Derive Key Pair - Done
2,946,748 UART: [art] Signing Cert with AUTHO
2,947,228 UART: RITY.KEYID = 7
2,962,572 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,337 UART: [art] PUB.X = B0D45B7105097C11AF52E789698222B26F71969877CCB75AF271FDE81D65769D697E9279D045CDF399C752A415ACE6F1
2,970,099 UART: [art] PUB.Y = 40655541778207652B4D24FBFEA819EFD5AFEBC0B7D5CF580E92C32198456B4A3AEB17E03CD5491011DCA26251BA5632
2,977,049 UART: [art] SIG.R = 4E0A13870BB0E3394980759F4433798CB366D1588CF10C7E4DECF105101A803B18902E22BF110A126C499AF043E66D26
2,983,798 UART: [art] SIG.S = 1A9B12E19ED8E41183F7494A3ECDA8EC3B45DE56F28BCD9D03218E9A375D9668D799C697EDB25DEE85260535EE6D2651
3,007,337 UART: Caliptra RT
3,007,590 UART: [state] CFI Enabled
3,115,765 UART: [rt] RT listening for mailbox commands...
3,116,435 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,287 UART: [rt]cmd =0x4c444556, len=4
3,156,856 >>> mbox cmd response data (687 bytes)
3,156,857 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,310 UART: [rt]cmd =0x43455246, len=4
3,198,405 >>> mbox cmd response data (887 bytes)
3,198,406 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,729 UART: [rt]cmd =0x43455252, len=4
3,238,739 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,710 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,640,619 >>> mbox cmd response: success
2,703,743 UART:
2,703,759 UART: Running Caliptra FMC ...
2,704,167 UART:
2,704,221 UART: [state] CFI Enabled
2,714,554 UART: [fht] FMC Alias Private Key: 7
2,821,875 UART: [art] Extend RT PCRs Done
2,822,303 UART: [art] Lock RT PCRs Done
2,823,719 UART: [art] Populate DV Done
2,831,926 UART: [fht] FMC Alias Private Key: 7
2,833,030 UART: [art] Derive CDI
2,833,310 UART: [art] Store in in slot 0x4
2,918,849 UART: [art] Derive Key Pair
2,919,209 UART: [art] Store priv key in slot 0x5
2,932,681 UART: [art] Derive Key Pair - Done
2,947,264 UART: [art] Signing Cert with AUTHO
2,947,744 UART: RITY.KEYID = 7
2,962,488 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,253 UART: [art] PUB.X = B73C880887E7EEC6642753FD8403FBFCD1C8B2049F0553EE68D83C5C0F0FC45AC9FC961D44B1F8FA178E1A50C194A0A4
2,970,019 UART: [art] PUB.Y = 07DCC5ADDF3E93504E60C675873BC4A48C8587B485DB13E9D0EAEC875ECFEBF2E59872A5E8F8F267C0487B0364ED3B05
2,976,976 UART: [art] SIG.R = 309E1CEFA89DD0CB0D47EE1C0FC6F414BF0EBBDFF34DD890C7E2B8C90E825220DEF02AF7ECC48C3745690AA5C07E012F
2,983,756 UART: [art] SIG.S = 67DBF12C915819CF7AFEDE842F553DC778AF7A635185A4E1C11AAFE8C38012C7B14FD4471737A5C25859DD169BEBF6D8
3,008,717 UART: Caliptra RT
3,008,970 UART: [state] CFI Enabled
3,115,559 UART: [rt] RT listening for mailbox commands...
3,116,229 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,875 UART: [rt]cmd =0x4c444556, len=4
3,156,328 >>> mbox cmd response data (687 bytes)
3,156,329 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,618 UART: [rt]cmd =0x43455246, len=4
3,197,491 >>> mbox cmd response data (887 bytes)
3,197,492 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,905 UART: [rt]cmd =0x43455252, len=4
3,237,835 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 859.17s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,509 UART: [idev] CSR uploaded
1,300,554 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,723 UART: [idev] --
1,301,722 UART: [ldev] ++
1,301,890 UART: [ldev] CDI.KEYID = 6
1,302,254 UART: [ldev] SUBJECT.KEYID = 5
1,302,681 UART: [ldev] AUTHORITY.KEYID = 7
1,303,144 UART: [ldev] FE.KEYID = 1
1,308,412 UART: [ldev] Erasing FE.KEYID = 1
1,335,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,184 UART: [ldev] --
1,374,536 UART: [fwproc] Wait for Commands...
1,375,261 UART: [fwproc] Recv command 0x46574c44
1,375,994 UART: [fwproc] Recv'd Img size: 114332 bytes
2,673,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,600 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,909 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,864,777 >>> mbox cmd response: success
2,865,822 UART: [afmc] ++
2,865,990 UART: [afmc] CDI.KEYID = 6
2,866,353 UART: [afmc] SUBJECT.KEYID = 7
2,866,779 UART: [afmc] AUTHORITY.KEYID = 5
2,902,352 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,907 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,636 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,519 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,238 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,283 UART: [afmc] --
2,946,161 UART: [cold-reset] --
2,947,025 UART: [state] Locking Datavault
2,948,402 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,006 UART: [state] Locking ICCM
2,949,504 UART: [exit] Launching FMC @ 0x40000130
2,954,833 UART:
2,954,849 UART: Running Caliptra FMC ...
2,955,257 UART:
2,955,400 UART: [state] CFI Enabled
2,965,887 UART: [fht] FMC Alias Private Key: 7
3,073,152 UART: [art] Extend RT PCRs Done
3,073,580 UART: [art] Lock RT PCRs Done
3,075,002 UART: [art] Populate DV Done
3,083,215 UART: [fht] FMC Alias Private Key: 7
3,084,373 UART: [art] Derive CDI
3,084,653 UART: [art] Store in in slot 0x4
3,170,546 UART: [art] Derive Key Pair
3,170,906 UART: [art] Store priv key in slot 0x5
3,184,294 UART: [art] Derive Key Pair - Done
3,198,802 UART: [art] Signing Cert with AUTHO
3,199,282 UART: RITY.KEYID = 7
3,214,440 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,205 UART: [art] PUB.X = B51C53E1049A6B7B048CB321525997EF4F043E7E1F1DF69DA903D443EE4F2063420D1BC4302C9E78AFD266B651A0D8EC
3,221,968 UART: [art] PUB.Y = D0BB72F34825710C94C5D5A686F8326413AC6D0026426EE1B85625C8744151D91A1C8D7436D3436A17D5A7DCAD13AC31
3,228,891 UART: [art] SIG.R = A0AA07E23FCADD34309148827332B41689BB644546D7532574D1572907FE828F461E4C79AD8D744BAA3249A8B79FB8FA
3,235,655 UART: [art] SIG.S = EC0710CEE05B4484F0A67CF08C689EF1CC9100F7764F538248C5BF9DA35236A2934102C800ECB48B15509B53C747E65B
3,259,444 UART: Caliptra RT
3,259,789 UART: [state] CFI Enabled
3,367,361 UART: [rt] RT listening for mailbox commands...
3,368,031 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,039 UART: [rt]cmd =0x4c444556, len=4
3,408,524 >>> mbox cmd response data (687 bytes)
3,408,525 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,034 UART: [rt]cmd =0x43455246, len=4
3,450,133 >>> mbox cmd response data (887 bytes)
3,450,134 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,519 UART: [rt]cmd =0x43455252, len=4
3,490,286 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,642 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
891,463 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,592 UART: [kat] ++
895,744 UART: [kat] sha1
899,862 UART: [kat] SHA2-256
901,802 UART: [kat] SHA2-384
904,681 UART: [kat] SHA2-512-ACC
906,582 UART: [kat] ECC-384
916,033 UART: [kat] HMAC-384Kdf
920,645 UART: [kat] LMS
1,168,957 UART: [kat] --
1,170,018 UART: [cold-reset] ++
1,170,512 UART: [fht] FHT @ 0x50003400
1,173,170 UART: [idev] ++
1,173,338 UART: [idev] CDI.KEYID = 6
1,173,699 UART: [idev] SUBJECT.KEYID = 7
1,174,124 UART: [idev] UDS.KEYID = 0
1,181,864 UART: [idev] Erasing UDS.KEYID = 0
1,198,920 UART: [idev] Sha1 KeyId Algorithm
1,207,044 UART: [idev] CSR upload begun
1,208,823 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,166 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,874 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,759 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,465 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,894 UART: [idev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
1,296,391 UART: [idev] CSR uploaded
1,299,436 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,299,605 UART: [idev] --
1,300,734 UART: [ldev] ++
1,300,902 UART: [ldev] CDI.KEYID = 6
1,301,266 UART: [ldev] SUBJECT.KEYID = 5
1,301,693 UART: [ldev] AUTHORITY.KEYID = 7
1,302,156 UART: [ldev] FE.KEYID = 1
1,307,386 UART: [ldev] Erasing FE.KEYID = 1
1,334,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,436 UART: [ldev] --
1,373,752 UART: [fwproc] Wait for Commands...
1,374,565 UART: [fwproc] Recv command 0x46574c44
1,375,298 UART: [fwproc] Recv'd Img size: 114332 bytes
2,673,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,842 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,151 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,865,853 >>> mbox cmd response: success
2,866,964 UART: [afmc] ++
2,867,132 UART: [afmc] CDI.KEYID = 6
2,867,495 UART: [afmc] SUBJECT.KEYID = 7
2,867,921 UART: [afmc] AUTHORITY.KEYID = 5
2,904,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,720 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,471 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,200 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,083 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,802 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,759 UART: [afmc] --
2,947,773 UART: [cold-reset] --
2,948,627 UART: [state] Locking Datavault
2,949,936 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,540 UART: [state] Locking ICCM
2,951,138 UART: [exit] Launching FMC @ 0x40000130
2,956,467 UART:
2,956,483 UART: Running Caliptra FMC ...
2,956,891 UART:
2,957,034 UART: [state] CFI Enabled
2,967,723 UART: [fht] FMC Alias Private Key: 7
3,075,450 UART: [art] Extend RT PCRs Done
3,075,878 UART: [art] Lock RT PCRs Done
3,077,184 UART: [art] Populate DV Done
3,085,491 UART: [fht] FMC Alias Private Key: 7
3,086,671 UART: [art] Derive CDI
3,086,951 UART: [art] Store in in slot 0x4
3,172,898 UART: [art] Derive Key Pair
3,173,258 UART: [art] Store priv key in slot 0x5
3,186,518 UART: [art] Derive Key Pair - Done
3,201,113 UART: [art] Signing Cert with AUTHO
3,201,593 UART: RITY.KEYID = 7
3,216,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,550 UART: [art] PUB.X = 604B696BD4334CDF49E96089889D70BC32568FE6385ED57942D4D27690AC90949CAD592CE8977D92F7C6DB1139CCF6E9
3,224,322 UART: [art] PUB.Y = 32070BEFA429E2E4FEC0B8A7FFC326DB10280AE259B321D79FBFF664FD3CE8B12DCBBEE1ED2AA9DB48C482EF498128D5
3,231,291 UART: [art] SIG.R = A81F586AD95A1363E7BCD77361795B8DC61C429D15DE698D6C4DA20CA920186A5E0A68F3DFF53C33DDF342DBD3ED2079
3,238,069 UART: [art] SIG.S = A4A8E3C9376078820B671C9019F170DCE14AAD7902AD67603BC81299D48C0FEE07B97682DA50D000BB63D8EECE25BB99
3,261,740 UART: Caliptra RT
3,262,085 UART: [state] CFI Enabled
3,369,533 UART: [rt] RT listening for mailbox commands...
3,370,203 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,219 UART: [rt]cmd =0x4c444556, len=4
3,410,830 >>> mbox cmd response data (687 bytes)
3,410,831 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,110 UART: [rt]cmd =0x43455246, len=4
3,452,223 >>> mbox cmd response data (887 bytes)
3,452,224 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,481,687 UART: [rt]cmd =0x43455252, len=4
3,492,432 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 893.22s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,827,045 UART: [art] Lock RT PCRs Done
2,828,475 UART: [art] Populate DV Done
2,836,514 UART: [fht] FMC Alias Private Key: 7
2,837,530 UART: [art] Derive CDI
2,837,810 UART: [art] Store in in slot 0x4
2,923,255 UART: [art] Derive Key Pair
2,923,615 UART: [art] Store priv key in slot 0x5
2,937,337 UART: [art] Derive Key Pair - Done
2,952,080 UART: [art] Signing Cert with AUTHO
2,952,560 UART: RITY.KEYID = 7
2,967,776 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,541 UART: [art] PUB.X = 915CE27D688CC0E7AE5B2C5A45DA98B89DC7E61FC911C96C55240BD792138DFDA5EDD2849AB765542A412A7274383954
2,975,314 UART: [art] PUB.Y = CDA6E2388A68F796FF3E0D5E33C8A24BB890293E00A1C195990DD025A7422AFDF8BC75B7D2A2BC0D3727AC9CB2E09184
2,982,247 UART: [art] SIG.R = 46B761908D2FFD8AA1E571977142E65D4D5B6912A719799DFB0B63C3CB8E437C79FABB9F86D63462A5156D6A3CAA0C8A
2,989,021 UART: [art] SIG.S = 2932AF6C00FB0E94A90DB84515291A8C8D0B50D1C887922BDED856D99F1F1DB7C26B54E80E0B7E636F0A82627544A2E0
3,012,708 UART: Caliptra RT
3,013,053 UART: [state] CFI Enabled
3,120,624 UART: [rt] RT listening for mailbox commands...
3,121,294 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,151,292 UART: [rt]cmd =0x4c444556, len=4
3,161,831 >>> mbox cmd response data (687 bytes)
3,161,832 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,289 UART: [rt]cmd =0x43455246, len=4
3,203,276 >>> mbox cmd response data (887 bytes)
3,203,277 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,816 UART: [rt]cmd =0x43455252, len=4
3,243,714 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,119 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,643,404 >>> mbox cmd response: success
2,705,302 UART:
2,705,318 UART: Running Caliptra FMC ...
2,705,726 UART:
2,705,869 UART: [state] CFI Enabled
2,716,220 UART: [fht] FMC Alias Private Key: 7
2,824,129 UART: [art] Extend RT PCRs Done
2,824,557 UART: [art] Lock RT PCRs Done
2,826,045 UART: [art] Populate DV Done
2,834,110 UART: [fht] FMC Alias Private Key: 7
2,835,280 UART: [art] Derive CDI
2,835,560 UART: [art] Store in in slot 0x4
2,921,355 UART: [art] Derive Key Pair
2,921,715 UART: [art] Store priv key in slot 0x5
2,934,539 UART: [art] Derive Key Pair - Done
2,949,200 UART: [art] Signing Cert with AUTHO
2,949,680 UART: RITY.KEYID = 7
2,965,084 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,849 UART: [art] PUB.X = AF2CA15B5A3009C1BB324C60774004796A2B323180F576AF7639081D2DD7E12561547675E635F9FC80879C966E2BF3BC
2,972,606 UART: [art] PUB.Y = 98BAB1691112619D8803E02F9B78027856123E82B13EFFB132D618C9980E766126BD63EBB1E622A22CEA1A2C9F4D4769
2,979,545 UART: [art] SIG.R = F71A71E9FB779AD2D59062AF3F3E1314D71E010BF9255A72F6C7D143026243A5E9BB10CF25EFB2E1EA0D1FFDCEC93C39
2,986,321 UART: [art] SIG.S = 6B70D061E088C75F2DA932609120A7932DB47388961C16DF671B5E6F30A18FB0AB0031446A7240600B29E3EF2C9B229A
3,010,125 UART: Caliptra RT
3,010,470 UART: [state] CFI Enabled
3,117,151 UART: [rt] RT listening for mailbox commands...
3,117,821 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,713 UART: [rt]cmd =0x4c444556, len=4
3,158,104 >>> mbox cmd response data (687 bytes)
3,158,105 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,250 UART: [rt]cmd =0x43455246, len=4
3,199,349 >>> mbox cmd response data (887 bytes)
3,199,350 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,765 UART: [rt]cmd =0x43455252, len=4
3,239,495 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,953 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,436 >>> mbox cmd response: success
2,703,038 UART:
2,703,054 UART: Running Caliptra FMC ...
2,703,462 UART:
2,703,605 UART: [state] CFI Enabled
2,714,172 UART: [fht] FMC Alias Private Key: 7
2,822,425 UART: [art] Extend RT PCRs Done
2,822,853 UART: [art] Lock RT PCRs Done
2,824,331 UART: [art] Populate DV Done
2,832,686 UART: [fht] FMC Alias Private Key: 7
2,833,786 UART: [art] Derive CDI
2,834,066 UART: [art] Store in in slot 0x4
2,920,131 UART: [art] Derive Key Pair
2,920,491 UART: [art] Store priv key in slot 0x5
2,933,929 UART: [art] Derive Key Pair - Done
2,948,422 UART: [art] Signing Cert with AUTHO
2,948,902 UART: RITY.KEYID = 7
2,964,340 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,105 UART: [art] PUB.X = 49C10FADF2E08D96B1C02DFB82E6FA09F4CD15BCFA1216C45BFBC3078C32095214F154EF48D4A116E59B1FF661DA38A6
2,971,881 UART: [art] PUB.Y = 48D683A7C6522883C6AA8C8A75DAC9C5A54CD70EF386629F6332C2A78B3C48D08A36F9D16F29AF4695842A27BADF7D01
2,978,833 UART: [art] SIG.R = 820E48F4F5F09DF65195B8CC58EEC1597C02F3089F9442860014E020031057B774E67D2C1C19FD9E6365F50EA46DD4BE
2,985,566 UART: [art] SIG.S = 78C1736CC43149CF07D9EEC3F770990688A114A19096C2FAD6D7F50D007DE7D9BE00F0442401D69FEA2457DF58E2D37B
3,009,235 UART: Caliptra RT
3,009,580 UART: [state] CFI Enabled
3,117,297 UART: [rt] RT listening for mailbox commands...
3,117,967 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,573 UART: [rt]cmd =0x4c444556, len=4
3,157,942 >>> mbox cmd response data (687 bytes)
3,157,943 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,342 UART: [rt]cmd =0x43455246, len=4
3,199,531 >>> mbox cmd response data (887 bytes)
3,199,532 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,829 UART: [rt]cmd =0x43455252, len=4
3,239,647 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,179 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,640,382 >>> mbox cmd response: success
2,702,562 UART:
2,702,578 UART: Running Caliptra FMC ...
2,702,986 UART:
2,703,129 UART: [state] CFI Enabled
2,713,680 UART: [fht] FMC Alias Private Key: 7
2,821,643 UART: [art] Extend RT PCRs Done
2,822,071 UART: [art] Lock RT PCRs Done
2,823,811 UART: [art] Populate DV Done
2,831,932 UART: [fht] FMC Alias Private Key: 7
2,832,950 UART: [art] Derive CDI
2,833,230 UART: [art] Store in in slot 0x4
2,919,273 UART: [art] Derive Key Pair
2,919,633 UART: [art] Store priv key in slot 0x5
2,932,799 UART: [art] Derive Key Pair - Done
2,947,670 UART: [art] Signing Cert with AUTHO
2,948,150 UART: RITY.KEYID = 7
2,963,632 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,397 UART: [art] PUB.X = 454F5EE06699FF6DC25E350B9CABDF332EDFCC2222CAE0185BB771E8CB9179D098C9CEA373D52B901300C713EE380BCF
2,971,157 UART: [art] PUB.Y = 3C1FD73C95626255B17225C8DD46F042419B5357F1B6F59A0E82481647DC41608AE1A2AB969C6511D516667F764B8D95
2,978,096 UART: [art] SIG.R = 31F0D3A9F44A1BD4A8B424B8B58C052242F8643AB25A34A2FB4E1788E5F1E7A10C533168AFE30B8116F967B2FB662AB1
2,984,865 UART: [art] SIG.S = 322B7A186D53DFECF87AA42A791F5C0177B694A10DD77CD9F521D8C72BCCE75F38E5C5B37631462AAC87E9BD43692399
3,008,300 UART: Caliptra RT
3,008,645 UART: [state] CFI Enabled
3,117,168 UART: [rt] RT listening for mailbox commands...
3,117,838 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,788 UART: [rt]cmd =0x4c444556, len=4
3,158,241 >>> mbox cmd response data (687 bytes)
3,158,242 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,619 UART: [rt]cmd =0x43455246, len=4
3,199,690 >>> mbox cmd response data (887 bytes)
3,199,691 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,046 UART: [rt]cmd =0x43455252, len=4
3,239,942 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,129 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,160 >>> mbox cmd response: success
2,703,756 UART:
2,703,772 UART: Running Caliptra FMC ...
2,704,180 UART:
2,704,323 UART: [state] CFI Enabled
2,715,168 UART: [fht] FMC Alias Private Key: 7
2,823,281 UART: [art] Extend RT PCRs Done
2,823,709 UART: [art] Lock RT PCRs Done
2,825,253 UART: [art] Populate DV Done
2,833,356 UART: [fht] FMC Alias Private Key: 7
2,834,370 UART: [art] Derive CDI
2,834,650 UART: [art] Store in in slot 0x4
2,920,295 UART: [art] Derive Key Pair
2,920,655 UART: [art] Store priv key in slot 0x5
2,934,459 UART: [art] Derive Key Pair - Done
2,949,317 UART: [art] Signing Cert with AUTHO
2,949,797 UART: RITY.KEYID = 7
2,964,763 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,528 UART: [art] PUB.X = 2AF57D4CAF87A91D04F85C79A97285FD4BE37AB37D1D505CBA0D465A9A305E4D3BDB0427A848C6CB715D4E816BB605DD
2,972,304 UART: [art] PUB.Y = EA176ED8889F58B722C60E8878FDD83B3565F88E4C8F58CB374C6EBA471C8F11AA860B0A491A0FA893D467BD1FB9D7E2
2,979,256 UART: [art] SIG.R = 1C31ACAFEAD5902D66AEABD14E7DB4DC8590A1A9998FF2A8399F925429D9974AAD6DF9021BEB33FC04B466C4D8BF78E2
2,986,042 UART: [art] SIG.S = 450A2C203BCA5D055B5ECF1807BAEEFE7443A0F3CF85088DE17A0287AFF8632043CC12609CD781B2BA18584F9320C050
3,010,082 UART: Caliptra RT
3,010,427 UART: [state] CFI Enabled
3,117,706 UART: [rt] RT listening for mailbox commands...
3,118,376 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,260 UART: [rt]cmd =0x4c444556, len=4
3,158,741 >>> mbox cmd response data (687 bytes)
3,158,742 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,127 UART: [rt]cmd =0x43455246, len=4
3,200,048 >>> mbox cmd response data (887 bytes)
3,200,049 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,518 UART: [rt]cmd =0x43455252, len=4
3,240,482 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 853.27s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,194 UART: [idev] CSR uploaded
1,299,239 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,299,408 UART: [idev] --
1,300,629 UART: [ldev] ++
1,300,797 UART: [ldev] CDI.KEYID = 6
1,301,161 UART: [ldev] SUBJECT.KEYID = 5
1,301,588 UART: [ldev] AUTHORITY.KEYID = 7
1,302,051 UART: [ldev] FE.KEYID = 1
1,307,233 UART: [ldev] Erasing FE.KEYID = 1
1,333,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,187 UART: [ldev] --
1,372,519 UART: [fwproc] Wait for Commands...
1,373,308 UART: [fwproc] Recv command 0x46574c44
1,374,041 UART: [fwproc] Recv'd Img size: 114332 bytes
2,671,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,697,825 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,134 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,863,038 >>> mbox cmd response: success
2,864,159 UART: [afmc] ++
2,864,327 UART: [afmc] CDI.KEYID = 6
2,864,690 UART: [afmc] SUBJECT.KEYID = 7
2,865,116 UART: [afmc] AUTHORITY.KEYID = 5
2,900,633 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,917,407 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,918,158 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,923,887 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,929,770 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,935,489 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,943,452 UART: [afmc] --
2,944,448 UART: [cold-reset] --
2,945,266 UART: [state] Locking Datavault
2,946,525 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,129 UART: [state] Locking ICCM
2,947,723 UART: [exit] Launching FMC @ 0x40000130
2,953,052 UART:
2,953,068 UART: Running Caliptra FMC ...
2,953,476 UART:
2,953,530 UART: [state] CFI Enabled
2,964,091 UART: [fht] FMC Alias Private Key: 7
3,072,064 UART: [art] Extend RT PCRs Done
3,072,492 UART: [art] Lock RT PCRs Done
3,074,162 UART: [art] Populate DV Done
3,082,341 UART: [fht] FMC Alias Private Key: 7
3,083,479 UART: [art] Derive CDI
3,083,759 UART: [art] Store in in slot 0x4
3,169,822 UART: [art] Derive Key Pair
3,170,182 UART: [art] Store priv key in slot 0x5
3,182,896 UART: [art] Derive Key Pair - Done
3,197,442 UART: [art] Signing Cert with AUTHO
3,197,922 UART: RITY.KEYID = 7
3,213,322 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,087 UART: [art] PUB.X = 5BC36E9C395CA8E0B5EB67FB8EF813B187BABDB241DEA144DF404C36A8273595E2F86C4FEE512D2AF38A3BF64BC86F10
3,220,879 UART: [art] PUB.Y = 412D1F15A16A680EB4EB139F0DD1AAEFD5BF1DBFB569EB8236F083F2A3F9336DF80D358CC52BE96D2E15C5388AAA3A3D
3,227,844 UART: [art] SIG.R = 99D3E82F1A3D706942B70E8FDB858EBD02BEF5EDBACFF329BA15806C5337EB9B83DAA79ED5ADBEBA34917E9981D24B90
3,234,632 UART: [art] SIG.S = 780A9C7337E9840C11CF1506A3971DA938F0CC63C6378DCE0C9103B40D1F9E597F1AFCDBAA40D6AC26FD4BB7B6173401
3,258,436 UART: Caliptra RT
3,258,689 UART: [state] CFI Enabled
3,365,820 UART: [rt] RT listening for mailbox commands...
3,366,490 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,406 UART: [rt]cmd =0x4c444556, len=4
3,406,839 >>> mbox cmd response data (687 bytes)
3,406,840 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,165 UART: [rt]cmd =0x43455246, len=4
3,448,258 >>> mbox cmd response data (887 bytes)
3,448,259 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,477,478 UART: [rt]cmd =0x43455252, len=4
3,488,276 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,762 UART: [state] LifecycleState = Unprovisioned
85,417 UART: [state] DebugLocked = No
85,997 UART: [state] WD Timer not started. Device not locked for debugging
87,164 UART: [kat] SHA2-256
890,714 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,843 UART: [kat] ++
894,995 UART: [kat] sha1
899,267 UART: [kat] SHA2-256
901,207 UART: [kat] SHA2-384
904,170 UART: [kat] SHA2-512-ACC
906,071 UART: [kat] ECC-384
915,758 UART: [kat] HMAC-384Kdf
920,168 UART: [kat] LMS
1,168,480 UART: [kat] --
1,169,265 UART: [cold-reset] ++
1,169,797 UART: [fht] FHT @ 0x50003400
1,172,245 UART: [idev] ++
1,172,413 UART: [idev] CDI.KEYID = 6
1,172,774 UART: [idev] SUBJECT.KEYID = 7
1,173,199 UART: [idev] UDS.KEYID = 0
1,181,307 UART: [idev] Erasing UDS.KEYID = 0
1,198,453 UART: [idev] Sha1 KeyId Algorithm
1,206,815 UART: [idev] CSR upload begun
1,208,594 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,175 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,883 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,768 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,474 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,903 UART: [idev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
1,296,400 UART: [idev] CSR uploaded
1,299,445 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,299,614 UART: [idev] --
1,300,521 UART: [ldev] ++
1,300,689 UART: [ldev] CDI.KEYID = 6
1,301,053 UART: [ldev] SUBJECT.KEYID = 5
1,301,480 UART: [ldev] AUTHORITY.KEYID = 7
1,301,943 UART: [ldev] FE.KEYID = 1
1,306,951 UART: [ldev] Erasing FE.KEYID = 1
1,333,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,179 UART: [ldev] --
1,372,487 UART: [fwproc] Wait for Commands...
1,373,140 UART: [fwproc] Recv command 0x46574c44
1,373,873 UART: [fwproc] Recv'd Img size: 114332 bytes
2,671,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,698,771 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,080 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,863,850 >>> mbox cmd response: success
2,865,053 UART: [afmc] ++
2,865,221 UART: [afmc] CDI.KEYID = 6
2,865,584 UART: [afmc] SUBJECT.KEYID = 7
2,866,010 UART: [afmc] AUTHORITY.KEYID = 5
2,901,511 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,917,779 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,918,530 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,259 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,142 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,935,861 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,943,694 UART: [afmc] --
2,944,588 UART: [cold-reset] --
2,945,404 UART: [state] Locking Datavault
2,946,659 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,263 UART: [state] Locking ICCM
2,947,765 UART: [exit] Launching FMC @ 0x40000130
2,953,094 UART:
2,953,110 UART: Running Caliptra FMC ...
2,953,518 UART:
2,953,572 UART: [state] CFI Enabled
2,963,789 UART: [fht] FMC Alias Private Key: 7
3,071,374 UART: [art] Extend RT PCRs Done
3,071,802 UART: [art] Lock RT PCRs Done
3,073,346 UART: [art] Populate DV Done
3,081,471 UART: [fht] FMC Alias Private Key: 7
3,082,573 UART: [art] Derive CDI
3,082,853 UART: [art] Store in in slot 0x4
3,168,644 UART: [art] Derive Key Pair
3,169,004 UART: [art] Store priv key in slot 0x5
3,181,680 UART: [art] Derive Key Pair - Done
3,196,492 UART: [art] Signing Cert with AUTHO
3,196,972 UART: RITY.KEYID = 7
3,211,996 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,761 UART: [art] PUB.X = 8B34D892AE702A05ABDAA6054BC3426616C5B98A32B4C52CBD360D9B78747CD5F6CAB6FD51B7E2DACCA94BFF82325EA3
3,219,544 UART: [art] PUB.Y = 37FAD335FF0236B7076772438AFF2F7935CFFFD7C15C9FAE651AD3E41BEDCE2FA63BC7149F19005C54B6C090C10D07F2
3,226,476 UART: [art] SIG.R = B95EDE4B41D226F24E6A34F3F38A976BC8A684C63B0FD8BD8CC4D43AE98F1B8257C1CA094D0D46CF25A5F2E7F5A5A389
3,233,257 UART: [art] SIG.S = C055D43F51C2B825882EE1470319D73C5D281035AB4CAC8595132FD29A332713486E7917FEC9F7309A43B371A133D241
3,256,493 UART: Caliptra RT
3,256,746 UART: [state] CFI Enabled
3,364,572 UART: [rt] RT listening for mailbox commands...
3,365,242 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,938 UART: [rt]cmd =0x4c444556, len=4
3,405,191 >>> mbox cmd response data (687 bytes)
3,405,192 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,619 UART: [rt]cmd =0x43455246, len=4
3,446,712 >>> mbox cmd response data (887 bytes)
3,446,713 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,475,966 UART: [rt]cmd =0x43455252, len=4
3,486,741 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 910.91s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,822,315 UART: [art] Lock RT PCRs Done
2,823,955 UART: [art] Populate DV Done
2,832,076 UART: [fht] FMC Alias Private Key: 7
2,833,242 UART: [art] Derive CDI
2,833,522 UART: [art] Store in in slot 0x4
2,919,133 UART: [art] Derive Key Pair
2,919,493 UART: [art] Store priv key in slot 0x5
2,932,925 UART: [art] Derive Key Pair - Done
2,947,896 UART: [art] Signing Cert with AUTHO
2,948,376 UART: RITY.KEYID = 7
2,963,532 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,297 UART: [art] PUB.X = 4FF0EC127CC16A9C8C7B7323F552C011F0C984E7D716F3A47403578AB063296F23AB1A6256B6869787365863E9448CF7
2,971,058 UART: [art] PUB.Y = B03E2636A8177BA57B2A92E1D114D6C9B3AB44AA007D0FB56C9CF2E19FBA838A35424833528F3C4CFC3422A27E8ABD10
2,977,995 UART: [art] SIG.R = 2CDCBC72A74E7AF20ED2A682793E21732AF2665334C1E6CE20A3024C7126C70F31FB7977C44D080A73F8BC442CC29584
2,984,754 UART: [art] SIG.S = E0093D7E1C69284AF40D6877D98953D5FD72715A23E920C1DD16859A16A9871CE00EE873C13768D1E4ED61204C7F02D4
3,008,177 UART: Caliptra RT
3,008,430 UART: [state] CFI Enabled
3,115,681 UART: [rt] RT listening for mailbox commands...
3,116,351 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,937 UART: [rt]cmd =0x4c444556, len=4
3,156,422 >>> mbox cmd response data (687 bytes)
3,156,423 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,548 UART: [rt]cmd =0x43455246, len=4
3,197,647 >>> mbox cmd response data (887 bytes)
3,197,648 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,037 UART: [rt]cmd =0x43455252, len=4
3,237,899 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,496 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,991 >>> mbox cmd response: success
2,703,341 UART:
2,703,357 UART: Running Caliptra FMC ...
2,703,765 UART:
2,703,819 UART: [state] CFI Enabled
2,714,550 UART: [fht] FMC Alias Private Key: 7
2,823,399 UART: [art] Extend RT PCRs Done
2,823,827 UART: [art] Lock RT PCRs Done
2,825,317 UART: [art] Populate DV Done
2,833,932 UART: [fht] FMC Alias Private Key: 7
2,835,000 UART: [art] Derive CDI
2,835,280 UART: [art] Store in in slot 0x4
2,921,023 UART: [art] Derive Key Pair
2,921,383 UART: [art] Store priv key in slot 0x5
2,934,609 UART: [art] Derive Key Pair - Done
2,949,305 UART: [art] Signing Cert with AUTHO
2,949,785 UART: RITY.KEYID = 7
2,965,325 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,090 UART: [art] PUB.X = 6FED71D75AA2B97FAA8D3275E20A9A27722A447EECAA422611C084FD8B0331FA9CFB7CB5F50CCEA9969CAEB1C26F80F0
2,972,875 UART: [art] PUB.Y = B5FB31F44A28A6736F2DDCC781A541D6D1EF01C9EC772C83EA2C09B1CC746390AE182762F077354F8C58662B37F7844B
2,979,825 UART: [art] SIG.R = 211F770A0808BA96CA4EB764651ADB042ACBD5DF8787DB2D89789CB593B91FF287C99C886A1C731A829743545855FA06
2,986,582 UART: [art] SIG.S = BFA6E08A25785AC2ABAC6C01E47C3F05E8A81089335DE77183F3D8500F69175AAF6314F0E5522679F836CC6C641D4545
3,010,194 UART: Caliptra RT
3,010,447 UART: [state] CFI Enabled
3,118,302 UART: [rt] RT listening for mailbox commands...
3,118,972 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,166 UART: [rt]cmd =0x4c444556, len=4
3,159,419 >>> mbox cmd response data (687 bytes)
3,159,420 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,859 UART: [rt]cmd =0x43455246, len=4
3,201,038 >>> mbox cmd response data (887 bytes)
3,201,039 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,420 UART: [rt]cmd =0x43455252, len=4
3,241,344 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,384 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,639,157 >>> mbox cmd response: success
2,700,729 UART:
2,700,745 UART: Running Caliptra FMC ...
2,701,153 UART:
2,701,207 UART: [state] CFI Enabled
2,711,674 UART: [fht] FMC Alias Private Key: 7
2,819,791 UART: [art] Extend RT PCRs Done
2,820,219 UART: [art] Lock RT PCRs Done
2,821,763 UART: [art] Populate DV Done
2,830,198 UART: [fht] FMC Alias Private Key: 7
2,831,334 UART: [art] Derive CDI
2,831,614 UART: [art] Store in in slot 0x4
2,917,131 UART: [art] Derive Key Pair
2,917,491 UART: [art] Store priv key in slot 0x5
2,930,255 UART: [art] Derive Key Pair - Done
2,944,982 UART: [art] Signing Cert with AUTHO
2,945,462 UART: RITY.KEYID = 7
2,960,438 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,203 UART: [art] PUB.X = 85B4A475F88202F02AA8017F371A5CE617BBB103FB2BE1E4EC327F573B078EC03ABA5D4F2E583DEFFC6DE86772033877
2,967,970 UART: [art] PUB.Y = 1105AF61946B5C8A942A21E327AA8390C3B5BD2ACFFD664B0EA20AAE9926B80599ECDBE6AC81C85DAE13615B25A92613
2,974,922 UART: [art] SIG.R = 396532B1E9089196D5F1F13A2B48AE94FC4BAB6A07C54BD8E0DCA571831D10C6463871C538F1C2E7F2E1BE57C4FC65B8
2,981,696 UART: [art] SIG.S = B1B7D09C3AE0ECF3601211D71F601E746C6A2A8623A00527E3D1D066BE8EBC8069F092287D578F23DA51D3B6B2F998F1
3,005,066 UART: Caliptra RT
3,005,319 UART: [state] CFI Enabled
3,112,830 UART: [rt] RT listening for mailbox commands...
3,113,500 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,980 UART: [rt]cmd =0x4c444556, len=4
3,153,485 >>> mbox cmd response data (687 bytes)
3,153,486 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,707 UART: [rt]cmd =0x43455246, len=4
3,194,638 >>> mbox cmd response data (887 bytes)
3,194,639 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,058 UART: [rt]cmd =0x43455252, len=4
3,234,932 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,105,618 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,638,917 >>> mbox cmd response: success
2,700,975 UART:
2,700,991 UART: Running Caliptra FMC ...
2,701,399 UART:
2,701,453 UART: [state] CFI Enabled
2,711,784 UART: [fht] FMC Alias Private Key: 7
2,820,191 UART: [art] Extend RT PCRs Done
2,820,619 UART: [art] Lock RT PCRs Done
2,822,367 UART: [art] Populate DV Done
2,830,334 UART: [fht] FMC Alias Private Key: 7
2,831,456 UART: [art] Derive CDI
2,831,736 UART: [art] Store in in slot 0x4
2,917,199 UART: [art] Derive Key Pair
2,917,559 UART: [art] Store priv key in slot 0x5
2,931,043 UART: [art] Derive Key Pair - Done
2,945,883 UART: [art] Signing Cert with AUTHO
2,946,363 UART: RITY.KEYID = 7
2,962,063 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,828 UART: [art] PUB.X = B60771CB9B4E0334B6E74BE01C6D7756CACC2508171E72AC831461E74148C161D73B8269E4EBE519E12C0990C57DFD80
2,969,588 UART: [art] PUB.Y = 1DA82E5FC0BB786A77EF0FD3912D899458D131D8A56B4BEFD37E52AB9F573C29B47909014E9048087D1221ECDDC17DE4
2,976,536 UART: [art] SIG.R = 3F4F5CEA47D4894CBDEA59D87357907BEAFA2670F58E2DD5B60CB6B3CC552CCB573B2224ABF6DA55BAEAB4EF8B6B1154
2,983,331 UART: [art] SIG.S = 893821C2D357C0F29BEAE22C4C88149BF26C0B914788C8E8CA3363D944006B3203BAE2FDAB90BEBE8A8B3767C525CB66
3,006,978 UART: Caliptra RT
3,007,231 UART: [state] CFI Enabled
3,115,738 UART: [rt] RT listening for mailbox commands...
3,116,408 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,370 UART: [rt]cmd =0x4c444556, len=4
3,156,657 >>> mbox cmd response data (687 bytes)
3,156,658 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,089 UART: [rt]cmd =0x43455246, len=4
3,198,224 >>> mbox cmd response data (887 bytes)
3,198,225 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,552 UART: [rt]cmd =0x43455252, len=4
3,238,612 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,440 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,743 >>> mbox cmd response: success
2,703,941 UART:
2,703,957 UART: Running Caliptra FMC ...
2,704,365 UART:
2,704,419 UART: [state] CFI Enabled
2,715,096 UART: [fht] FMC Alias Private Key: 7
2,823,433 UART: [art] Extend RT PCRs Done
2,823,861 UART: [art] Lock RT PCRs Done
2,825,463 UART: [art] Populate DV Done
2,833,678 UART: [fht] FMC Alias Private Key: 7
2,834,670 UART: [art] Derive CDI
2,834,950 UART: [art] Store in in slot 0x4
2,920,663 UART: [art] Derive Key Pair
2,921,023 UART: [art] Store priv key in slot 0x5
2,934,277 UART: [art] Derive Key Pair - Done
2,949,233 UART: [art] Signing Cert with AUTHO
2,949,713 UART: RITY.KEYID = 7
2,965,041 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,806 UART: [art] PUB.X = 2003C1B1EF928319A5325FC0C1D2B34AD77DF664EFF0112348AC3C0043CB846626C0F4805DB077E9988B76F3D0949BD3
2,972,553 UART: [art] PUB.Y = E812F5A7680D421D479567AC5CDD86FF11909EA0599195A6FC7C09515366DE52190B6BE9F6FA4EC35197201E2D3DCBFC
2,979,502 UART: [art] SIG.R = 80B5F480F1D18CF08033BC6A7CF6B2AD1CCEE8F8F666E21882257F3A195AF4964B0DCC4EA6867B4BC891F4533995B4CB
2,986,283 UART: [art] SIG.S = 867EA89FF35FADA85AF1EAE5973FBC2093FBA556E1063A89DDAA2AD2FB4A7857AE0A6918DDFAFB1454DAD8BBCF8C7BC9
3,010,476 UART: Caliptra RT
3,010,729 UART: [state] CFI Enabled
3,118,069 UART: [rt] RT listening for mailbox commands...
3,118,739 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,567 UART: [rt]cmd =0x4c444556, len=4
3,159,090 >>> mbox cmd response data (687 bytes)
3,159,091 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,500 UART: [rt]cmd =0x43455246, len=4
3,200,521 >>> mbox cmd response data (887 bytes)
3,200,522 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,739 UART: [rt]cmd =0x43455252, len=4
3,240,356 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 867.34s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,699 UART: [idev] CSR uploaded
1,300,744 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,913 UART: [idev] --
1,301,942 UART: [ldev] ++
1,302,110 UART: [ldev] CDI.KEYID = 6
1,302,474 UART: [ldev] SUBJECT.KEYID = 5
1,302,901 UART: [ldev] AUTHORITY.KEYID = 7
1,303,364 UART: [ldev] FE.KEYID = 1
1,308,546 UART: [ldev] Erasing FE.KEYID = 1
1,335,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,556 UART: [ldev] --
1,374,864 UART: [fwproc] Wait for Commands...
1,375,441 UART: [fwproc] Recv command 0x46574c44
1,376,174 UART: [fwproc] Recv'd Img size: 114332 bytes
2,673,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,362 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,671 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,865,405 >>> mbox cmd response: success
2,866,420 UART: [afmc] ++
2,866,588 UART: [afmc] CDI.KEYID = 6
2,866,951 UART: [afmc] SUBJECT.KEYID = 7
2,867,377 UART: [afmc] AUTHORITY.KEYID = 5
2,902,654 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,907 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,636 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,519 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,238 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,159 UART: [afmc] --
2,946,099 UART: [cold-reset] --
2,946,951 UART: [state] Locking Datavault
2,948,342 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,946 UART: [state] Locking ICCM
2,949,418 UART: [exit] Launching FMC @ 0x40000130
2,954,747 UART:
2,954,763 UART: Running Caliptra FMC ...
2,955,171 UART:
2,955,314 UART: [state] CFI Enabled
2,965,885 UART: [fht] FMC Alias Private Key: 7
3,073,520 UART: [art] Extend RT PCRs Done
3,073,948 UART: [art] Lock RT PCRs Done
3,075,304 UART: [art] Populate DV Done
3,083,433 UART: [fht] FMC Alias Private Key: 7
3,084,421 UART: [art] Derive CDI
3,084,701 UART: [art] Store in in slot 0x4
3,171,002 UART: [art] Derive Key Pair
3,171,362 UART: [art] Store priv key in slot 0x5
3,184,506 UART: [art] Derive Key Pair - Done
3,199,040 UART: [art] Signing Cert with AUTHO
3,199,520 UART: RITY.KEYID = 7
3,214,588 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,353 UART: [art] PUB.X = 1ECB75392F8872B2C3B0866DBF5FDC982F04F23A9A7F131F94ABA5EA871E20D535EF771E68BBF78A4B0B0DB8A5234AA5
3,222,132 UART: [art] PUB.Y = C8E6622EC284F169E9EE2EEC33394B7A07FE65FF9F95BDDF0AB1DD6D62A8190D76126931B1535973821C37E8172BB67E
3,229,081 UART: [art] SIG.R = 241DBAB781BB202BCD2ECF5CF4707E3604B4C9AF49A6BAF8AAED75C4031CB0A75A11B57C2A21B5D539C0F99E2BDDBAAB
3,235,877 UART: [art] SIG.S = CDD4C8541C41DDC60F28ECCC16E168F604062A0248DC6A1E4D44F35E56B3063364A5961F404FD14E7132FA4025A6F5CC
3,259,649 UART: Caliptra RT
3,259,994 UART: [state] CFI Enabled
3,367,749 UART: [rt] RT listening for mailbox commands...
3,368,419 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,205 UART: [rt]cmd =0x4c444556, len=4
3,408,682 >>> mbox cmd response data (687 bytes)
3,408,683 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,984 UART: [rt]cmd =0x43455246, len=4
3,449,991 >>> mbox cmd response data (887 bytes)
3,449,992 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,515 UART: [rt]cmd =0x43455252, len=4
3,490,309 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [kat] SHA2-256
891,513 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,642 UART: [kat] ++
895,794 UART: [kat] sha1
900,176 UART: [kat] SHA2-256
902,116 UART: [kat] SHA2-384
904,955 UART: [kat] SHA2-512-ACC
906,856 UART: [kat] ECC-384
916,761 UART: [kat] HMAC-384Kdf
921,299 UART: [kat] LMS
1,169,611 UART: [kat] --
1,170,426 UART: [cold-reset] ++
1,170,914 UART: [fht] FHT @ 0x50003400
1,173,706 UART: [idev] ++
1,173,874 UART: [idev] CDI.KEYID = 6
1,174,235 UART: [idev] SUBJECT.KEYID = 7
1,174,660 UART: [idev] UDS.KEYID = 0
1,182,598 UART: [idev] Erasing UDS.KEYID = 0
1,199,980 UART: [idev] Sha1 KeyId Algorithm
1,208,258 UART: [idev] CSR upload begun
1,210,037 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,964 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,672 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,557 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,263 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,692 UART: [idev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
1,298,189 UART: [idev] CSR uploaded
1,301,234 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,301,403 UART: [idev] --
1,302,572 UART: [ldev] ++
1,302,740 UART: [ldev] CDI.KEYID = 6
1,303,104 UART: [ldev] SUBJECT.KEYID = 5
1,303,531 UART: [ldev] AUTHORITY.KEYID = 7
1,303,994 UART: [ldev] FE.KEYID = 1
1,309,108 UART: [ldev] Erasing FE.KEYID = 1
1,335,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,350,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,355,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,361,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,367,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,374,536 UART: [ldev] --
1,375,914 UART: [fwproc] Wait for Commands...
1,376,587 UART: [fwproc] Recv command 0x46574c44
1,377,320 UART: [fwproc] Recv'd Img size: 114332 bytes
2,674,752 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,990 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,731,299 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,867,163 >>> mbox cmd response: success
2,868,368 UART: [afmc] ++
2,868,536 UART: [afmc] CDI.KEYID = 6
2,868,899 UART: [afmc] SUBJECT.KEYID = 7
2,869,325 UART: [afmc] AUTHORITY.KEYID = 5
2,905,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,921,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,779 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,508 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,391 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,939,110 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,995 UART: [afmc] --
2,948,049 UART: [cold-reset] --
2,949,027 UART: [state] Locking Datavault
2,950,314 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,918 UART: [state] Locking ICCM
2,951,472 UART: [exit] Launching FMC @ 0x40000130
2,956,801 UART:
2,956,817 UART: Running Caliptra FMC ...
2,957,225 UART:
2,957,368 UART: [state] CFI Enabled
2,967,719 UART: [fht] FMC Alias Private Key: 7
3,076,112 UART: [art] Extend RT PCRs Done
3,076,540 UART: [art] Lock RT PCRs Done
3,078,020 UART: [art] Populate DV Done
3,086,209 UART: [fht] FMC Alias Private Key: 7
3,087,161 UART: [art] Derive CDI
3,087,441 UART: [art] Store in in slot 0x4
3,172,996 UART: [art] Derive Key Pair
3,173,356 UART: [art] Store priv key in slot 0x5
3,186,796 UART: [art] Derive Key Pair - Done
3,201,682 UART: [art] Signing Cert with AUTHO
3,202,162 UART: RITY.KEYID = 7
3,217,354 UART: [art] Erasing AUTHORITY.KEYID = 7
3,218,119 UART: [art] PUB.X = D6B44A173EB451C8D634D687B4BED87DB8058ABF84EE82E5FCD90EA8DE62810DB4415F19072A1684A3ED91ABCECBB3C7
3,224,899 UART: [art] PUB.Y = D578343259D9BD82A7EC73BE1AFF7AFC202F36FC070CF8C123736791512ED83282DF4A6BFCB63C7C1BB3EBC9BA0B61E8
3,231,860 UART: [art] SIG.R = 413A2AECC14488162C8572D939483326A7AB88556F94B692A156037EFAC3A1CDDC7034E29F56D73F5FDF03B8970E7F8E
3,238,625 UART: [art] SIG.S = 872F603BE356D1BC4A8F51C18A1AD0EF4D0EEEE4327426812740917FC04C66B1F6E956827BEFED5E9278885AE4C38C24
3,262,273 UART: Caliptra RT
3,262,618 UART: [state] CFI Enabled
3,370,509 UART: [rt] RT listening for mailbox commands...
3,371,179 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,287 UART: [rt]cmd =0x4c444556, len=4
3,411,810 >>> mbox cmd response data (687 bytes)
3,411,811 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,382 UART: [rt]cmd =0x43455246, len=4
3,453,603 >>> mbox cmd response data (887 bytes)
3,453,604 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,051 UART: [rt]cmd =0x43455252, len=4
3,494,011 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 901.57s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,824,233 UART: [art] Lock RT PCRs Done
2,825,525 UART: [art] Populate DV Done
2,833,574 UART: [fht] FMC Alias Private Key: 7
2,834,658 UART: [art] Derive CDI
2,834,938 UART: [art] Store in in slot 0x4
2,920,471 UART: [art] Derive Key Pair
2,920,831 UART: [art] Store priv key in slot 0x5
2,934,191 UART: [art] Derive Key Pair - Done
2,948,822 UART: [art] Signing Cert with AUTHO
2,949,302 UART: RITY.KEYID = 7
2,964,182 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,947 UART: [art] PUB.X = 7F437D8584B3967A06EF2082419F1E54B2A6763102FA0D4643F51442182630159636C1809BF267DD274A6732B9874BE0
2,971,692 UART: [art] PUB.Y = D432926BEED28EF7A5632FC37CD5A056E063450E95EFACD39475718A2CF701C3AF79E0E80D510BF8258F491870A1BF00
2,978,616 UART: [art] SIG.R = 79570AF5183B4BDD2D7805774B36B5329DA294DCEB5AAFD8F2777D7A0F7F497697C013A03FEA9F0DB8E117815DAEA8EA
2,985,390 UART: [art] SIG.S = BF48756F20736EC50A5715425C04EA0F0A6B79B3DB876E7D4C29DE37F1F4DE67AD2172E67068E1377BFB9DC149FF1139
3,009,823 UART: Caliptra RT
3,010,168 UART: [state] CFI Enabled
3,118,091 UART: [rt] RT listening for mailbox commands...
3,118,761 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,357 UART: [rt]cmd =0x4c444556, len=4
3,158,918 >>> mbox cmd response data (687 bytes)
3,158,919 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,070 UART: [rt]cmd =0x43455246, len=4
3,200,079 >>> mbox cmd response data (887 bytes)
3,200,080 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,307 UART: [rt]cmd =0x43455252, len=4
3,240,241 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,081 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,642,206 >>> mbox cmd response: success
2,704,912 UART:
2,704,928 UART: Running Caliptra FMC ...
2,705,336 UART:
2,705,479 UART: [state] CFI Enabled
2,715,866 UART: [fht] FMC Alias Private Key: 7
2,824,101 UART: [art] Extend RT PCRs Done
2,824,529 UART: [art] Lock RT PCRs Done
2,826,241 UART: [art] Populate DV Done
2,834,224 UART: [fht] FMC Alias Private Key: 7
2,835,316 UART: [art] Derive CDI
2,835,596 UART: [art] Store in in slot 0x4
2,920,923 UART: [art] Derive Key Pair
2,921,283 UART: [art] Store priv key in slot 0x5
2,934,485 UART: [art] Derive Key Pair - Done
2,949,350 UART: [art] Signing Cert with AUTHO
2,949,830 UART: RITY.KEYID = 7
2,964,966 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,731 UART: [art] PUB.X = D3C981048EA6C228131C0FA14B42C927DF3BF68DD7C5405BED2B84A14A89D8725C661C2AB0EA2B1045EC7EA3CACEA909
2,972,510 UART: [art] PUB.Y = 95276F0B3E076CA269D29224A35CDF1F3B289F0BC96274FA3A7FE97CAEAE4383C061F5C32D0635D91AE7EB05A098B817
2,979,455 UART: [art] SIG.R = A218B3AD2738D50E39985CD46922286AA2775ADA3CCE867EFE5E7B0ABAFE5A62C3203873C60AA92983C2207AD0C97E6F
2,986,228 UART: [art] SIG.S = AD9EE50D2085F2DE70012D65F086960DE4032BB00292D10FA2430573C86A77DDF3B7BCCD02421901AD9769264DD7EB88
3,010,584 UART: Caliptra RT
3,010,929 UART: [state] CFI Enabled
3,118,655 UART: [rt] RT listening for mailbox commands...
3,119,325 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,813 UART: [rt]cmd =0x4c444556, len=4
3,159,174 >>> mbox cmd response data (687 bytes)
3,159,175 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,274 UART: [rt]cmd =0x43455246, len=4
3,200,347 >>> mbox cmd response data (887 bytes)
3,200,348 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,667 UART: [rt]cmd =0x43455252, len=4
3,240,396 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,821 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,642,036 >>> mbox cmd response: success
2,704,032 UART:
2,704,048 UART: Running Caliptra FMC ...
2,704,456 UART:
2,704,599 UART: [state] CFI Enabled
2,715,014 UART: [fht] FMC Alias Private Key: 7
2,823,565 UART: [art] Extend RT PCRs Done
2,823,993 UART: [art] Lock RT PCRs Done
2,825,783 UART: [art] Populate DV Done
2,833,866 UART: [fht] FMC Alias Private Key: 7
2,835,048 UART: [art] Derive CDI
2,835,328 UART: [art] Store in in slot 0x4
2,920,887 UART: [art] Derive Key Pair
2,921,247 UART: [art] Store priv key in slot 0x5
2,935,079 UART: [art] Derive Key Pair - Done
2,949,844 UART: [art] Signing Cert with AUTHO
2,950,324 UART: RITY.KEYID = 7
2,965,454 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,219 UART: [art] PUB.X = F2758704C306973D1E93000CC579CDEC837DAE8F615D8386DF5A5B0C14C41C3BB944BEDBA1B367FF6F77F4D33B104C82
2,972,967 UART: [art] PUB.Y = 1FACFEE8B4DA0139B3A6746FDDC6E28A34151ABF5A3850859122BE165DA18DA4FC43B9C2FADE9EDE3C078BB8FF2A2900
2,979,915 UART: [art] SIG.R = 771F8488A72E7FAB569046FE777320D7BAC4656D2C8847E89B40CEAE83776BFEA087F8B24ADB3CBE6587D27E2483E949
2,986,693 UART: [art] SIG.S = 1ED5C09BAF4B87761ED8494992FA6A602930673FCD8809C354DE749C014D3E01A6842C518947C77703A41DD41ECFE44B
3,010,892 UART: Caliptra RT
3,011,237 UART: [state] CFI Enabled
3,119,072 UART: [rt] RT listening for mailbox commands...
3,119,742 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,576 UART: [rt]cmd =0x4c444556, len=4
3,159,873 >>> mbox cmd response data (687 bytes)
3,159,874 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,155 UART: [rt]cmd =0x43455246, len=4
3,201,136 >>> mbox cmd response data (887 bytes)
3,201,137 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,496 UART: [rt]cmd =0x43455252, len=4
3,241,252 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,157 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,570 >>> mbox cmd response: success
2,703,434 UART:
2,703,450 UART: Running Caliptra FMC ...
2,703,858 UART:
2,704,001 UART: [state] CFI Enabled
2,714,864 UART: [fht] FMC Alias Private Key: 7
2,822,963 UART: [art] Extend RT PCRs Done
2,823,391 UART: [art] Lock RT PCRs Done
2,824,689 UART: [art] Populate DV Done
2,832,952 UART: [fht] FMC Alias Private Key: 7
2,833,912 UART: [art] Derive CDI
2,834,192 UART: [art] Store in in slot 0x4
2,919,825 UART: [art] Derive Key Pair
2,920,185 UART: [art] Store priv key in slot 0x5
2,933,627 UART: [art] Derive Key Pair - Done
2,948,246 UART: [art] Signing Cert with AUTHO
2,948,726 UART: RITY.KEYID = 7
2,963,776 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,541 UART: [art] PUB.X = 5A75E2B73DF5ECEBAF10752DDCB4C23DA4E5D197AB551728137A6E2B4928CC6B4E3980DF28C57ECD1D25B0CA89E346C6
2,971,331 UART: [art] PUB.Y = C11CF83EFFD316AFCB56A01945D9E5A78BC239C29F856035444CF7435EBF8B177018602054606C4ECCA5879C93E3CF89
2,978,287 UART: [art] SIG.R = FB55309A157506EF77832F4F7CC29FC388A70631F2824A6AEA3486A6D5D45F40C232871DF6069A819412D52A6128BB1A
2,985,046 UART: [art] SIG.S = 27C2BDB357821BE699D1A7766CE5CE3FFF2D5D6AA29D7604F6BF9D288E53D665CB08F5C7C22DE055F716FBABA1DCEBE4
3,008,605 UART: Caliptra RT
3,008,950 UART: [state] CFI Enabled
3,117,383 UART: [rt] RT listening for mailbox commands...
3,118,053 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,821 UART: [rt]cmd =0x4c444556, len=4
3,158,336 >>> mbox cmd response data (687 bytes)
3,158,337 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,728 UART: [rt]cmd =0x43455246, len=4
3,199,891 >>> mbox cmd response data (887 bytes)
3,199,892 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,277 UART: [rt]cmd =0x43455252, len=4
3,240,113 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,783 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,640,452 >>> mbox cmd response: success
2,704,348 UART:
2,704,364 UART: Running Caliptra FMC ...
2,704,772 UART:
2,704,915 UART: [state] CFI Enabled
2,715,614 UART: [fht] FMC Alias Private Key: 7
2,823,221 UART: [art] Extend RT PCRs Done
2,823,649 UART: [art] Lock RT PCRs Done
2,825,389 UART: [art] Populate DV Done
2,833,448 UART: [fht] FMC Alias Private Key: 7
2,834,554 UART: [art] Derive CDI
2,834,834 UART: [art] Store in in slot 0x4
2,920,475 UART: [art] Derive Key Pair
2,920,835 UART: [art] Store priv key in slot 0x5
2,934,371 UART: [art] Derive Key Pair - Done
2,948,983 UART: [art] Signing Cert with AUTHO
2,949,463 UART: RITY.KEYID = 7
2,964,701 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,466 UART: [art] PUB.X = 419DC112A4A73CB4D386CF4E47F51926EA3ADCF8E2A24F85E2384F7B2802FE2D43DFC026FC9B7A29C0AB33CC34B2C37B
2,972,253 UART: [art] PUB.Y = D53853F351B1CEA5CA2FE1FA3FD22F86CE6F9615A8265E5B9BE3F53F639E10C6FE70B783314AC62F6FFA61F8AAC5A65B
2,979,225 UART: [art] SIG.R = 3D18A7F7C227FEFF9B06FAF26B430108814A149BDBABAAB8399AB314AB3B1BBC6BFFCBF8A63CE06A4B7043E5441D49AB
2,986,014 UART: [art] SIG.S = C91537202F24F5D79FD8D510FC52BBF5B75A5F105F2F72E03F926FE2CBE10E55927E77833F8C617569A1E34733EC5BE7
3,009,842 UART: Caliptra RT
3,010,187 UART: [state] CFI Enabled
3,117,776 UART: [rt] RT listening for mailbox commands...
3,118,446 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,108 UART: [rt]cmd =0x4c444556, len=4
3,158,605 >>> mbox cmd response data (687 bytes)
3,158,606 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,059 UART: [rt]cmd =0x43455246, len=4
3,200,054 >>> mbox cmd response data (887 bytes)
3,200,055 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,516 UART: [rt]cmd =0x43455252, len=4
3,240,388 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 862.99s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,913 UART: [afmc] --
2,848,921 UART: [cold-reset] --
2,849,533 UART: [state] Locking Datavault
2,850,484 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,088 UART: [state] Locking ICCM
2,851,722 UART: [exit] Launching FMC @ 0x40000130
2,857,051 UART:
2,857,067 UART: Running Caliptra FMC ...
2,857,475 UART:
2,857,529 UART: [state] CFI Enabled
2,868,182 UART: [fht] FMC Alias Private Key: 7
2,975,895 UART: [art] Extend RT PCRs Done
2,976,323 UART: [art] Lock RT PCRs Done
2,977,609 UART: [art] Populate DV Done
2,985,892 UART: [fht] FMC Alias Private Key: 7
2,986,926 UART: [art] Derive CDI
2,987,206 UART: [art] Store in in slot 0x4
3,072,783 UART: [art] Derive Key Pair
3,073,143 UART: [art] Store priv key in slot 0x5
3,086,603 UART: [art] Derive Key Pair - Done
3,101,369 UART: [art] Signing Cert with AUTHO
3,101,849 UART: RITY.KEYID = 7
3,116,897 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,662 UART: [art] PUB.X = 274C3E50738D54864457B11850BBC9DA7E544996E17857FD5AFE5EBA8DD4C2C0C89621744E0F738598FFE983BC850657
3,124,426 UART: [art] PUB.Y = ACE4DC4802E797FA7E7CEED3C793B72D54EA4FD2C73E62298276B256392DB2E051B33A4B5F8C5C6044A324C1CA028FE7
3,131,384 UART: [art] SIG.R = 1237EE97203D1D6097F9A750EBC0C33144D7C043FC4F70BFA9C28B06DC9688F21B0B93932C8C30BF5A3152D2608D97CE
3,138,154 UART: [art] SIG.S = AEF4155FA69340669BA71F6240154FA21A98621A582F0F6596841E3900AB079C62B67EB4E5EAF6FF6E9E226955DFE8F5
3,161,979 UART: Caliptra RT
3,162,232 UART: [state] CFI Enabled
3,269,808 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,575 UART: [kat] SHA2-256
901,515 UART: [kat] SHA2-384
904,242 UART: [kat] SHA2-512-ACC
906,143 UART: [kat] ECC-384
915,766 UART: [kat] HMAC-384Kdf
920,288 UART: [kat] LMS
1,168,600 UART: [kat] --
1,169,187 UART: [cold-reset] ++
1,169,561 UART: [fht] FHT @ 0x50003400
1,172,393 UART: [idev] ++
1,172,561 UART: [idev] CDI.KEYID = 6
1,172,922 UART: [idev] SUBJECT.KEYID = 7
1,173,347 UART: [idev] UDS.KEYID = 0
1,181,879 UART: [idev] Erasing UDS.KEYID = 0
1,198,858 UART: [idev] Sha384 KeyId Algorithm
1,202,603 UART: [idev] --
1,203,744 UART: [ldev] ++
1,203,912 UART: [ldev] CDI.KEYID = 6
1,204,276 UART: [ldev] SUBJECT.KEYID = 5
1,204,703 UART: [ldev] AUTHORITY.KEYID = 7
1,205,166 UART: [ldev] FE.KEYID = 1
1,210,298 UART: [ldev] Erasing FE.KEYID = 1
1,235,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,960 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,266,682 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,273,738 UART: [ldev] --
1,275,210 UART: [fwproc] Wait for Commands...
1,275,835 UART: [fwproc] Recv command 0x46574c44
1,276,568 UART: [fwproc] Recv'd Img size: 114332 bytes
2,574,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,601,778 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,087 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,766,959 >>> mbox cmd response: success
2,768,214 UART: [afmc] ++
2,768,382 UART: [afmc] CDI.KEYID = 6
2,768,745 UART: [afmc] SUBJECT.KEYID = 7
2,769,171 UART: [afmc] AUTHORITY.KEYID = 5
2,805,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,217 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,946 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,829 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,548 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,391 UART: [afmc] --
2,848,343 UART: [cold-reset] --
2,849,095 UART: [state] Locking Datavault
2,850,256 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,860 UART: [state] Locking ICCM
2,851,404 UART: [exit] Launching FMC @ 0x40000130
2,856,733 UART:
2,856,749 UART: Running Caliptra FMC ...
2,857,157 UART:
2,857,211 UART: [state] CFI Enabled
2,867,668 UART: [fht] FMC Alias Private Key: 7
2,976,187 UART: [art] Extend RT PCRs Done
2,976,615 UART: [art] Lock RT PCRs Done
2,978,231 UART: [art] Populate DV Done
2,986,254 UART: [fht] FMC Alias Private Key: 7
2,987,390 UART: [art] Derive CDI
2,987,670 UART: [art] Store in in slot 0x4
3,073,461 UART: [art] Derive Key Pair
3,073,821 UART: [art] Store priv key in slot 0x5
3,086,959 UART: [art] Derive Key Pair - Done
3,101,730 UART: [art] Signing Cert with AUTHO
3,102,210 UART: RITY.KEYID = 7
3,116,992 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,757 UART: [art] PUB.X = CB961A6E3E023A0D5193F9A18C3A745C95F3F16D01D69273A2EFFA50AE54C69C82EDEDBB9C940177011FBD92D8201CD6
3,124,526 UART: [art] PUB.Y = 45853BBE37EC25DE02033D151D87CA7CDACE80278A2A90E358F0BE3558BE2AFE1FC111854FE3C185074E547343BEEC52
3,131,479 UART: [art] SIG.R = AF8BD812F8578D6A1DB036B758BF2725DE24DA87D27C83821F7B6B15E139DA14D0C504D198BDADFE3326FC6BAD3F88FA
3,138,266 UART: [art] SIG.S = C06C1B743310852F2C1C7D136B81564D4E0AC5D928FC33014B292491ADD02762E57FE846F8AB4C723C9BD713F9C44340
3,162,097 UART: Caliptra RT
3,162,350 UART: [state] CFI Enabled
3,270,557 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,237 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,653 UART: [kat] SHA2-256
901,593 UART: [kat] SHA2-384
904,212 UART: [kat] SHA2-512-ACC
906,113 UART: [kat] ECC-384
916,156 UART: [kat] HMAC-384Kdf
920,606 UART: [kat] LMS
1,168,918 UART: [kat] --
1,169,651 UART: [cold-reset] ++
1,170,125 UART: [fht] FHT @ 0x50003400
1,172,719 UART: [idev] ++
1,172,887 UART: [idev] CDI.KEYID = 6
1,173,248 UART: [idev] SUBJECT.KEYID = 7
1,173,673 UART: [idev] UDS.KEYID = 0
1,181,965 UART: [idev] Erasing UDS.KEYID = 0
1,198,684 UART: [idev] Fuse KeyId
1,199,906 UART: [idev] --
1,201,033 UART: [ldev] ++
1,201,201 UART: [ldev] CDI.KEYID = 6
1,201,565 UART: [ldev] SUBJECT.KEYID = 5
1,201,992 UART: [ldev] AUTHORITY.KEYID = 7
1,202,455 UART: [ldev] FE.KEYID = 1
1,207,477 UART: [ldev] Erasing FE.KEYID = 1
1,233,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,247,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,252,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,258,821 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,264,503 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,271,452 UART: [ldev] --
1,272,718 UART: [fwproc] Wait for Commands...
1,273,473 UART: [fwproc] Recv command 0x46574c44
1,274,206 UART: [fwproc] Recv'd Img size: 114332 bytes
2,572,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,599,724 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,629,033 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,764,739 >>> mbox cmd response: success
2,765,862 UART: [afmc] ++
2,766,030 UART: [afmc] CDI.KEYID = 6
2,766,393 UART: [afmc] SUBJECT.KEYID = 7
2,766,819 UART: [afmc] AUTHORITY.KEYID = 5
2,802,302 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,818,276 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,819,027 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,824,756 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,830,639 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,836,358 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,844,217 UART: [afmc] --
2,845,257 UART: [cold-reset] --
2,846,251 UART: [state] Locking Datavault
2,847,276 UART: [state] Locking PCR0, PCR1 and PCR31
2,847,880 UART: [state] Locking ICCM
2,848,344 UART: [exit] Launching FMC @ 0x40000130
2,853,673 UART:
2,853,689 UART: Running Caliptra FMC ...
2,854,097 UART:
2,854,151 UART: [state] CFI Enabled
2,864,408 UART: [fht] FMC Alias Private Key: 7
2,973,081 UART: [art] Extend RT PCRs Done
2,973,509 UART: [art] Lock RT PCRs Done
2,975,291 UART: [art] Populate DV Done
2,983,608 UART: [fht] FMC Alias Private Key: 7
2,984,754 UART: [art] Derive CDI
2,985,034 UART: [art] Store in in slot 0x4
3,070,901 UART: [art] Derive Key Pair
3,071,261 UART: [art] Store priv key in slot 0x5
3,084,573 UART: [art] Derive Key Pair - Done
3,099,127 UART: [art] Signing Cert with AUTHO
3,099,607 UART: RITY.KEYID = 7
3,114,599 UART: [art] Erasing AUTHORITY.KEYID = 7
3,115,364 UART: [art] PUB.X = 9FE46C628B9F79F628E35D4305728616E915AFE9388704584E1BDF512091F3D508AB76E9FEE1AC17014ADACBF6F3EFF1
3,122,132 UART: [art] PUB.Y = AE43B3935477CD70DB6CCC8C07EB289AFF85E17D279BD7E9A54209616CD05E999B70A58020FADE5B00D37333200DAA4A
3,129,063 UART: [art] SIG.R = 0B7FE651052499356BC4391DE8792840A78A804388768DCE54B903B79D7467D994A43C4535D0440CE63C7D36D99D1E84
3,135,811 UART: [art] SIG.S = 2C64BA7B5402DF8EC8B7AAD1A9EED67F0C66E6FE1232828F769522868C6E7BC205D1FF675513FA07C66F2CDFF47E067E
3,159,359 UART: Caliptra RT
3,159,612 UART: [state] CFI Enabled
3,267,849 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,491 >>> mbox cmd response: success
2,685,269 UART:
2,685,285 UART: Running Caliptra FMC ...
2,685,693 UART:
2,685,747 UART: [state] CFI Enabled
2,696,320 UART: [fht] FMC Alias Private Key: 7
2,804,295 UART: [art] Extend RT PCRs Done
2,804,723 UART: [art] Lock RT PCRs Done
2,806,149 UART: [art] Populate DV Done
2,814,224 UART: [fht] FMC Alias Private Key: 7
2,815,270 UART: [art] Derive CDI
2,815,550 UART: [art] Store in in slot 0x4
2,900,985 UART: [art] Derive Key Pair
2,901,345 UART: [art] Store priv key in slot 0x5
2,914,195 UART: [art] Derive Key Pair - Done
2,929,096 UART: [art] Signing Cert with AUTHO
2,929,576 UART: RITY.KEYID = 7
2,944,494 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,259 UART: [art] PUB.X = 1E131AE9803F043611DCEEB38757890BE203F5DC29096CE95638F181F5C58EE5E8F6031CBAC676F0B6534F35ED31DC6F
2,952,022 UART: [art] PUB.Y = 1D6B5F6E3D6EA3B4C75330408BDA281FC202A47BC944ABB616DB31669AA6958882BC662BD247AD9299982E4394E3E2C2
2,958,975 UART: [art] SIG.R = 346781D978D0C62474154D553B0F3D7EB35AC37B26ACC36B95DB5B31655A408ED690A64F37BAED947609A413D88C83B6
2,965,741 UART: [art] SIG.S = C71A2DD6A5A6CD05C7AA1821B2C709E9FB4992A6BFCCFF3C9B85583C27F5751EB91BA97A0254A415557EDF7A45EB894D
2,989,153 UART: Caliptra RT
2,989,406 UART: [state] CFI Enabled
3,097,305 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,617,739 >>> mbox cmd response: success
2,680,119 UART:
2,680,135 UART: Running Caliptra FMC ...
2,680,543 UART:
2,680,597 UART: [state] CFI Enabled
2,691,336 UART: [fht] FMC Alias Private Key: 7
2,799,919 UART: [art] Extend RT PCRs Done
2,800,347 UART: [art] Lock RT PCRs Done
2,802,039 UART: [art] Populate DV Done
2,810,336 UART: [fht] FMC Alias Private Key: 7
2,811,454 UART: [art] Derive CDI
2,811,734 UART: [art] Store in in slot 0x4
2,897,409 UART: [art] Derive Key Pair
2,897,769 UART: [art] Store priv key in slot 0x5
2,910,571 UART: [art] Derive Key Pair - Done
2,925,414 UART: [art] Signing Cert with AUTHO
2,925,894 UART: RITY.KEYID = 7
2,941,218 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,983 UART: [art] PUB.X = 5636C504CC4CAFB2CA800135E472FEC5955B7CBF52AD26EED20A6A24FCD9F34FBBD29D91D1E74D69FEE1E01AF3A23AAC
2,948,774 UART: [art] PUB.Y = 62E4DCA156EC70FE3337CFE6A630A5FA8D57B25857343A1E9C2E7F78632F5D0A536650BB607C466C1EDD4A43C80D3FFF
2,955,732 UART: [art] SIG.R = 48B22DF916FD4EA292809652AFB891C6C5142735EF30B619C1E3345594E8491FA2579E1BDDB07891885E2CD7ACE3C0C6
2,962,506 UART: [art] SIG.S = 31CA91C890AA537B135BBF31EC20339181E8873A3E55AC43B8349E1ADF988211751581EFF6583F3E59BF831B4B4E52B7
2,987,015 UART: Caliptra RT
2,987,268 UART: [state] CFI Enabled
3,093,525 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,616,017 >>> mbox cmd response: success
2,677,823 UART:
2,677,839 UART: Running Caliptra FMC ...
2,678,247 UART:
2,678,301 UART: [state] CFI Enabled
2,688,864 UART: [fht] FMC Alias Private Key: 7
2,796,673 UART: [art] Extend RT PCRs Done
2,797,101 UART: [art] Lock RT PCRs Done
2,798,665 UART: [art] Populate DV Done
2,806,756 UART: [fht] FMC Alias Private Key: 7
2,807,918 UART: [art] Derive CDI
2,808,198 UART: [art] Store in in slot 0x4
2,893,851 UART: [art] Derive Key Pair
2,894,211 UART: [art] Store priv key in slot 0x5
2,908,085 UART: [art] Derive Key Pair - Done
2,922,956 UART: [art] Signing Cert with AUTHO
2,923,436 UART: RITY.KEYID = 7
2,938,556 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,321 UART: [art] PUB.X = 4EC53EC49FF5BD7D41E2E01C60548F640605C2DC5810006AE1E7407C19BFC064AF23EB171BC539A46A2A5E395A0030E7
2,946,049 UART: [art] PUB.Y = E8754B2E1BA09AEB29810F5561E8FF3FABFD279BD1BD69F0447AF4E9727D2AE9B9C2395AAD067870E8BC2E6CEE170BCC
2,953,014 UART: [art] SIG.R = 9EA16F7F2972040CEDD6F907F70D1A614E2CBE39484BE1E73FC4DB707F1B2B50CF1C7A278EB1585FCEBFC3ED61EFDB3B
2,959,800 UART: [art] SIG.S = 619A6782593B773C759A6F8296E774DF57C02B38DD550F1C9002C8904E1660DEACB6149C6C35D606E0F2892DAB349AA8
2,983,598 UART: Caliptra RT
2,983,851 UART: [state] CFI Enabled
3,091,013 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,613,761 >>> mbox cmd response: success
2,677,013 UART:
2,677,029 UART: Running Caliptra FMC ...
2,677,437 UART:
2,677,491 UART: [state] CFI Enabled
2,687,794 UART: [fht] FMC Alias Private Key: 7
2,795,335 UART: [art] Extend RT PCRs Done
2,795,763 UART: [art] Lock RT PCRs Done
2,797,367 UART: [art] Populate DV Done
2,805,532 UART: [fht] FMC Alias Private Key: 7
2,806,594 UART: [art] Derive CDI
2,806,874 UART: [art] Store in in slot 0x4
2,892,465 UART: [art] Derive Key Pair
2,892,825 UART: [art] Store priv key in slot 0x5
2,905,767 UART: [art] Derive Key Pair - Done
2,920,541 UART: [art] Signing Cert with AUTHO
2,921,021 UART: RITY.KEYID = 7
2,936,137 UART: [art] Erasing AUTHORITY.KEYID = 7
2,936,902 UART: [art] PUB.X = B012EC729F3BE66E31704DEB7ACB89CE24D7E6B40A3E4E1D89CAB89F3069012D56AB70BA8F081083488E46ABB812323A
2,943,675 UART: [art] PUB.Y = 32160109D91444F1898A15B65CA8BCCA81DB4AE2D0C91F62DC7FC5102EC3B95FF98492D3CECA7FD24AB3AFC8E54761E7
2,950,637 UART: [art] SIG.R = 602FE8003BEA61868C55FF11EFA180D1BFEEFC351F5CD91A38D1B1B22BF9C47DC603E39AA16DFF90E92DE215F1F857CF
2,957,406 UART: [art] SIG.S = 322DB3E98A9ADABA250D55D650EA7D0A05E7491383954EA8D4C7E840E9D4DDB9C980388A559C72F591F029FFE377DF23
2,981,650 UART: Caliptra RT
2,981,903 UART: [state] CFI Enabled
3,088,750 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.22s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,490 UART: [afmc] --
2,850,608 UART: [cold-reset] --
2,851,248 UART: [state] Locking Datavault
2,852,373 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,977 UART: [state] Locking ICCM
2,853,489 UART: [exit] Launching FMC @ 0x40000130
2,858,818 UART:
2,858,834 UART: Running Caliptra FMC ...
2,859,242 UART:
2,859,385 UART: [state] CFI Enabled
2,869,994 UART: [fht] FMC Alias Private Key: 7
2,978,337 UART: [art] Extend RT PCRs Done
2,978,765 UART: [art] Lock RT PCRs Done
2,980,361 UART: [art] Populate DV Done
2,988,800 UART: [fht] FMC Alias Private Key: 7
2,989,854 UART: [art] Derive CDI
2,990,134 UART: [art] Store in in slot 0x4
3,075,999 UART: [art] Derive Key Pair
3,076,359 UART: [art] Store priv key in slot 0x5
3,089,761 UART: [art] Derive Key Pair - Done
3,104,765 UART: [art] Signing Cert with AUTHO
3,105,245 UART: RITY.KEYID = 7
3,120,199 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,964 UART: [art] PUB.X = CA23300A7F26F7FE37FB8D86DF32548F14307B383179A4142F20A9DB5A9386FD5F189F2043C73AAFCFC9F77A26EC43AF
3,127,743 UART: [art] PUB.Y = FE3B0F12F4108E2285B913BA2925F3D93AF7E16C0D508BC303B99DCC7A2B15E7ADBCD5E148E6F1CCF1CC5000AC64B5F3
3,134,684 UART: [art] SIG.R = FEAF0C2251748E5F661181017E78C5554E5E36060FAA6E9A07610C76C2A4648FFCEA9DD1E1EC71947E5AE8DA04A50CBA
3,141,444 UART: [art] SIG.S = 843B7B53A75ABF2EAA553A4F09FB27ABBE421928C1A8103E77F51B8E0FED0D35091664172929801BED537D94E17179D8
3,165,313 UART: Caliptra RT
3,165,658 UART: [state] CFI Enabled
3,274,115 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,444 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
891,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,852 UART: [kat] SHA2-256
901,792 UART: [kat] SHA2-384
904,303 UART: [kat] SHA2-512-ACC
906,204 UART: [kat] ECC-384
915,967 UART: [kat] HMAC-384Kdf
920,755 UART: [kat] LMS
1,169,067 UART: [kat] --
1,169,938 UART: [cold-reset] ++
1,170,464 UART: [fht] FHT @ 0x50003400
1,173,118 UART: [idev] ++
1,173,286 UART: [idev] CDI.KEYID = 6
1,173,647 UART: [idev] SUBJECT.KEYID = 7
1,174,072 UART: [idev] UDS.KEYID = 0
1,181,886 UART: [idev] Erasing UDS.KEYID = 0
1,199,019 UART: [idev] Sha384 KeyId Algorithm
1,202,804 UART: [idev] --
1,203,749 UART: [ldev] ++
1,203,917 UART: [ldev] CDI.KEYID = 6
1,204,281 UART: [ldev] SUBJECT.KEYID = 5
1,204,708 UART: [ldev] AUTHORITY.KEYID = 7
1,205,171 UART: [ldev] FE.KEYID = 1
1,210,131 UART: [ldev] Erasing FE.KEYID = 1
1,236,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,487 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,209 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,415 UART: [ldev] --
1,275,761 UART: [fwproc] Wait for Commands...
1,276,400 UART: [fwproc] Recv command 0x46574c44
1,277,133 UART: [fwproc] Recv'd Img size: 114332 bytes
2,575,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,635 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,944 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,767,692 >>> mbox cmd response: success
2,768,961 UART: [afmc] ++
2,769,129 UART: [afmc] CDI.KEYID = 6
2,769,492 UART: [afmc] SUBJECT.KEYID = 7
2,769,918 UART: [afmc] AUTHORITY.KEYID = 5
2,806,359 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,659 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,410 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,139 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,022 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,741 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,630 UART: [afmc] --
2,849,542 UART: [cold-reset] --
2,850,258 UART: [state] Locking Datavault
2,851,469 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,073 UART: [state] Locking ICCM
2,852,673 UART: [exit] Launching FMC @ 0x40000130
2,858,002 UART:
2,858,018 UART: Running Caliptra FMC ...
2,858,426 UART:
2,858,569 UART: [state] CFI Enabled
2,869,004 UART: [fht] FMC Alias Private Key: 7
2,977,017 UART: [art] Extend RT PCRs Done
2,977,445 UART: [art] Lock RT PCRs Done
2,979,053 UART: [art] Populate DV Done
2,987,340 UART: [fht] FMC Alias Private Key: 7
2,988,428 UART: [art] Derive CDI
2,988,708 UART: [art] Store in in slot 0x4
3,074,539 UART: [art] Derive Key Pair
3,074,899 UART: [art] Store priv key in slot 0x5
3,088,171 UART: [art] Derive Key Pair - Done
3,103,169 UART: [art] Signing Cert with AUTHO
3,103,649 UART: RITY.KEYID = 7
3,119,229 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,994 UART: [art] PUB.X = 2D2C81CCC09EEC85771B9A93424CA11E8FEB9C7AA5951F9111233D691C01666EB57B4ECCD9DC4686448423E9313D8B6C
3,126,769 UART: [art] PUB.Y = 812E2C33B3C3F30E071D118970B1AF6EB9C095D23EA250E0BBAC633A13776A0C711CAA6B1281AA58906172BBAE5CE6C9
3,133,722 UART: [art] SIG.R = 50894853104937D8817C6F1B87A5F09E93A3718AFCA3058B9BCB3BB95B6F5F0F1392A54711F15FCE145A206BC932D68A
3,140,488 UART: [art] SIG.S = BFDBDDB9A29B6AC0B6A6BBD4ABD338B1584729922671D03A8FEBBEBFF32D30AA50AD80C3A35AA42D8AA10E9AAC0DD362
3,164,511 UART: Caliptra RT
3,164,856 UART: [state] CFI Enabled
3,272,270 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,165 UART: [kat] SHA2-256
891,715 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,844 UART: [kat] ++
895,996 UART: [kat] sha1
900,230 UART: [kat] SHA2-256
902,170 UART: [kat] SHA2-384
904,925 UART: [kat] SHA2-512-ACC
906,826 UART: [kat] ECC-384
916,361 UART: [kat] HMAC-384Kdf
921,135 UART: [kat] LMS
1,169,447 UART: [kat] --
1,170,324 UART: [cold-reset] ++
1,170,748 UART: [fht] FHT @ 0x50003400
1,173,358 UART: [idev] ++
1,173,526 UART: [idev] CDI.KEYID = 6
1,173,887 UART: [idev] SUBJECT.KEYID = 7
1,174,312 UART: [idev] UDS.KEYID = 0
1,182,408 UART: [idev] Erasing UDS.KEYID = 0
1,199,727 UART: [idev] Fuse KeyId
1,200,949 UART: [idev] --
1,202,124 UART: [ldev] ++
1,202,292 UART: [ldev] CDI.KEYID = 6
1,202,656 UART: [ldev] SUBJECT.KEYID = 5
1,203,083 UART: [ldev] AUTHORITY.KEYID = 7
1,203,546 UART: [ldev] FE.KEYID = 1
1,208,642 UART: [ldev] Erasing FE.KEYID = 1
1,234,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,253,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,259,666 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,348 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,387 UART: [ldev] --
1,273,841 UART: [fwproc] Wait for Commands...
1,274,552 UART: [fwproc] Recv command 0x46574c44
1,275,285 UART: [fwproc] Recv'd Img size: 114332 bytes
2,574,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,601,369 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,630,678 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,766,464 >>> mbox cmd response: success
2,767,681 UART: [afmc] ++
2,767,849 UART: [afmc] CDI.KEYID = 6
2,768,212 UART: [afmc] SUBJECT.KEYID = 7
2,768,638 UART: [afmc] AUTHORITY.KEYID = 5
2,804,305 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,672 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,401 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,284 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,003 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,836 UART: [afmc] --
2,847,760 UART: [cold-reset] --
2,848,572 UART: [state] Locking Datavault
2,849,541 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,145 UART: [state] Locking ICCM
2,850,667 UART: [exit] Launching FMC @ 0x40000130
2,855,996 UART:
2,856,012 UART: Running Caliptra FMC ...
2,856,420 UART:
2,856,563 UART: [state] CFI Enabled
2,867,304 UART: [fht] FMC Alias Private Key: 7
2,975,085 UART: [art] Extend RT PCRs Done
2,975,513 UART: [art] Lock RT PCRs Done
2,976,917 UART: [art] Populate DV Done
2,985,032 UART: [fht] FMC Alias Private Key: 7
2,986,108 UART: [art] Derive CDI
2,986,388 UART: [art] Store in in slot 0x4
3,071,805 UART: [art] Derive Key Pair
3,072,165 UART: [art] Store priv key in slot 0x5
3,085,753 UART: [art] Derive Key Pair - Done
3,100,302 UART: [art] Signing Cert with AUTHO
3,100,782 UART: RITY.KEYID = 7
3,116,176 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,941 UART: [art] PUB.X = 68C22F04E1AA87CC97B239774DE9917C2A21CAD81619B82C6FFEE6E6CCB7F7DCCCBE1784C0BF849E204D884EFCDEB16E
3,123,734 UART: [art] PUB.Y = D36CAFE850CF156D30C256A1183CCA3B5E4B3310AEBAAD4B46ADE5C413CDC72BB85193EF48C58A2EE3EB5FB9A56D375E
3,130,712 UART: [art] SIG.R = 0F114156B7A0D42214B8759DD2FE0EEECC9A14AA815BB37256331AF8BDC9DFAF882576D6D9EC2493B799ACDA75171040
3,137,488 UART: [art] SIG.S = 03201B3D8D1158A48E53E776872680174620F942FDBF23665688F0BBAD46DE4F5267F3906A39BCAE5DF05FF2D2075200
3,161,313 UART: Caliptra RT
3,161,658 UART: [state] CFI Enabled
3,268,969 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,866 >>> mbox cmd response: success
2,684,810 UART:
2,684,826 UART: Running Caliptra FMC ...
2,685,234 UART:
2,685,377 UART: [state] CFI Enabled
2,696,082 UART: [fht] FMC Alias Private Key: 7
2,804,431 UART: [art] Extend RT PCRs Done
2,804,859 UART: [art] Lock RT PCRs Done
2,806,363 UART: [art] Populate DV Done
2,814,430 UART: [fht] FMC Alias Private Key: 7
2,815,402 UART: [art] Derive CDI
2,815,682 UART: [art] Store in in slot 0x4
2,901,337 UART: [art] Derive Key Pair
2,901,697 UART: [art] Store priv key in slot 0x5
2,915,403 UART: [art] Derive Key Pair - Done
2,930,077 UART: [art] Signing Cert with AUTHO
2,930,557 UART: RITY.KEYID = 7
2,946,141 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,906 UART: [art] PUB.X = C2EED91375C5E5B5A273C4CFC5D0AF39D0533C10DD165BD0E1FAFA4C3658EE0B51E21CD2B95BCDD418F3219D49F2F0C6
2,953,697 UART: [art] PUB.Y = 4FC3F339B107A48A61FE655D08D8084E4EE110E1BFCFF9B72128DE528E1464FAC3DEC0440997D0E7595C76AB6EC3B6C4
2,960,649 UART: [art] SIG.R = D755613329B1FA87048CCADED776F6B1E90CED18409070B82C23C30ED25C50A57D0DEECBD120553D3F6FC22548333DF6
2,967,417 UART: [art] SIG.S = 37F6E545A80EA55D304CABFBFEECEC3A9425B0DB82A2902B0F8C0AA37103057996A624D001A84B337161BA5BAC20C35D
2,990,798 UART: Caliptra RT
2,991,143 UART: [state] CFI Enabled
3,100,538 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,617,672 >>> mbox cmd response: success
2,680,044 UART:
2,680,060 UART: Running Caliptra FMC ...
2,680,468 UART:
2,680,611 UART: [state] CFI Enabled
2,690,824 UART: [fht] FMC Alias Private Key: 7
2,797,883 UART: [art] Extend RT PCRs Done
2,798,311 UART: [art] Lock RT PCRs Done
2,800,197 UART: [art] Populate DV Done
2,808,548 UART: [fht] FMC Alias Private Key: 7
2,809,626 UART: [art] Derive CDI
2,809,906 UART: [art] Store in in slot 0x4
2,895,653 UART: [art] Derive Key Pair
2,896,013 UART: [art] Store priv key in slot 0x5
2,908,339 UART: [art] Derive Key Pair - Done
2,923,131 UART: [art] Signing Cert with AUTHO
2,923,611 UART: RITY.KEYID = 7
2,938,433 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,198 UART: [art] PUB.X = AEB103705A1BA80EA11D91DBDE05FD7EB243708694F8BEC2C78CBF25A609C8683E8FB52BACCBC85CD6FF335AC93DAFD6
2,945,986 UART: [art] PUB.Y = 3E1B5F03BA2CF9A94F4741E6BD5D906B99D1F7CE608F4EE99E208644E8068F8A678EDB103A51CA620F9548B7CA1ACD4B
2,952,943 UART: [art] SIG.R = 4D99BE6310AD7246299DD296CC78B54867F4946D5F0E484D4FD67ED40D972A3B20396F4C230394EA80DF2A4B7E939A4D
2,959,708 UART: [art] SIG.S = CF177FA3D58EFCF75B166C48C55FAD3D3ACCF4BF2349C1D76B07BC1677BFFF81EC61DE4272E18E2581AEA03F49338DFD
2,983,602 UART: Caliptra RT
2,983,947 UART: [state] CFI Enabled
3,091,551 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,618,474 >>> mbox cmd response: success
2,680,856 UART:
2,680,872 UART: Running Caliptra FMC ...
2,681,280 UART:
2,681,423 UART: [state] CFI Enabled
2,691,846 UART: [fht] FMC Alias Private Key: 7
2,799,277 UART: [art] Extend RT PCRs Done
2,799,705 UART: [art] Lock RT PCRs Done
2,801,321 UART: [art] Populate DV Done
2,809,386 UART: [fht] FMC Alias Private Key: 7
2,810,530 UART: [art] Derive CDI
2,810,810 UART: [art] Store in in slot 0x4
2,896,499 UART: [art] Derive Key Pair
2,896,859 UART: [art] Store priv key in slot 0x5
2,909,827 UART: [art] Derive Key Pair - Done
2,924,496 UART: [art] Signing Cert with AUTHO
2,924,976 UART: RITY.KEYID = 7
2,940,512 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,277 UART: [art] PUB.X = 7F13E97827E10C2BA0581A0B7477EEC1E0B92F3A69B7F6BBCA86078D0DB98439C4C338EB3E1153685B89A577DF689437
2,948,039 UART: [art] PUB.Y = F9CA11436BB851D3D6CC17FE12B5BFC1C2311854E8982F6117F8F023EDBDA207D42AC7176EB323227C86623096C1B4AD
2,954,994 UART: [art] SIG.R = 5497F3CDA2641314B90FAFE3A0BFF07E52DA798631E4A17DB6013C106BCB3727E5C7CFD23E3518BE3F75D006D5BEF371
2,961,769 UART: [art] SIG.S = 20A892661BD571D294DE8AC2D0FAC0FE20A8F5BE8E51F6190BDA2B94BBF2C42C1BAAB1E9359B1DFD6EFF823F5564B20C
2,985,628 UART: Caliptra RT
2,985,973 UART: [state] CFI Enabled
3,093,444 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,616,410 >>> mbox cmd response: success
2,679,386 UART:
2,679,402 UART: Running Caliptra FMC ...
2,679,810 UART:
2,679,953 UART: [state] CFI Enabled
2,690,996 UART: [fht] FMC Alias Private Key: 7
2,798,777 UART: [art] Extend RT PCRs Done
2,799,205 UART: [art] Lock RT PCRs Done
2,800,827 UART: [art] Populate DV Done
2,809,232 UART: [fht] FMC Alias Private Key: 7
2,810,410 UART: [art] Derive CDI
2,810,690 UART: [art] Store in in slot 0x4
2,896,723 UART: [art] Derive Key Pair
2,897,083 UART: [art] Store priv key in slot 0x5
2,910,209 UART: [art] Derive Key Pair - Done
2,925,134 UART: [art] Signing Cert with AUTHO
2,925,614 UART: RITY.KEYID = 7
2,940,772 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,537 UART: [art] PUB.X = 3C8C4FC73CD7DD0A785863D5EFADD90841EECD88D5286F735F39283CFFD7B9BE792493F1AABF3762E507583F853ACAB9
2,948,316 UART: [art] PUB.Y = 6ED436D8E58797E6B7315155132ADC48DC6CC6ACC7C13FEE5740EAFF760F9579DD0CB814F5C93A42FB6EBFB13F867D0C
2,955,277 UART: [art] SIG.R = 44C5546DC102FE4E481DE39FE684C8B8FBD8EC9E5C9B9185D34870B6AA7B355EC1BF8A913F6180AD3A966A15C3D85A79
2,962,058 UART: [art] SIG.S = 77963F1D65C29FC9198761216A54DE035A68A6CF2C69E91942310764476B4F3FF2955C0DC69D38FFDFCD72F5764318BA
2,985,366 UART: Caliptra RT
2,985,711 UART: [state] CFI Enabled
3,092,874 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.39s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,939 UART: [afmc] --
2,849,871 UART: [cold-reset] --
2,850,747 UART: [state] Locking Datavault
2,851,910 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,514 UART: [state] Locking ICCM
2,853,070 UART: [exit] Launching FMC @ 0x40000130
2,858,399 UART:
2,858,415 UART: Running Caliptra FMC ...
2,858,823 UART:
2,858,877 UART: [state] CFI Enabled
2,869,436 UART: [fht] FMC Alias Private Key: 7
2,976,499 UART: [art] Extend RT PCRs Done
2,976,927 UART: [art] Lock RT PCRs Done
2,978,709 UART: [art] Populate DV Done
2,986,894 UART: [fht] FMC Alias Private Key: 7
2,987,964 UART: [art] Derive CDI
2,988,244 UART: [art] Store in in slot 0x4
3,073,869 UART: [art] Derive Key Pair
3,074,229 UART: [art] Store priv key in slot 0x5
3,087,621 UART: [art] Derive Key Pair - Done
3,102,495 UART: [art] Signing Cert with AUTHO
3,102,975 UART: RITY.KEYID = 7
3,118,149 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,914 UART: [art] PUB.X = 6AFBB7E22A8E41A693904DD10FF5D4DD37A853C4C642541033ADF40AED6ED69E767035E66B2E96105A56918F3959D1F8
3,125,684 UART: [art] PUB.Y = C6AA3F1CBF5E241C4E67F33A1C0B1D3A16B25BC1A9C2CE8CF7E9B74A910D77506FE98BECA7EB2F21572E60C5CBB38856
3,132,652 UART: [art] SIG.R = C874A126B8A31EF2FFBB63A27A9D095A619A237BCF1ADC668C9E36495E427DFEFAD268000F98B622269778E3ADA969CE
3,139,408 UART: [art] SIG.S = 57A13017AC5B179AA12DAB2FDF3561F80E0B4B35DD6837E8C74CE5B180EE484E6B4E2012924EA75CD2EF8732E28D78B0
3,163,159 UART: Caliptra RT
3,163,412 UART: [state] CFI Enabled
3,269,792 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,185 UART: [kat] ++
895,337 UART: [kat] sha1
899,681 UART: [kat] SHA2-256
901,621 UART: [kat] SHA2-384
904,382 UART: [kat] SHA2-512-ACC
906,283 UART: [kat] ECC-384
915,864 UART: [kat] HMAC-384Kdf
920,502 UART: [kat] LMS
1,168,814 UART: [kat] --
1,169,609 UART: [cold-reset] ++
1,170,143 UART: [fht] FHT @ 0x50003400
1,172,931 UART: [idev] ++
1,173,099 UART: [idev] CDI.KEYID = 6
1,173,460 UART: [idev] SUBJECT.KEYID = 7
1,173,885 UART: [idev] UDS.KEYID = 0
1,181,501 UART: [idev] Erasing UDS.KEYID = 0
1,198,314 UART: [idev] Sha384 KeyId Algorithm
1,202,165 UART: [idev] --
1,203,206 UART: [ldev] ++
1,203,374 UART: [ldev] CDI.KEYID = 6
1,203,738 UART: [ldev] SUBJECT.KEYID = 5
1,204,165 UART: [ldev] AUTHORITY.KEYID = 7
1,204,628 UART: [ldev] FE.KEYID = 1
1,209,952 UART: [ldev] Erasing FE.KEYID = 1
1,237,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,256,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,980 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,702 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,586 UART: [ldev] --
1,275,916 UART: [fwproc] Wait for Commands...
1,276,599 UART: [fwproc] Recv command 0x46574c44
1,277,332 UART: [fwproc] Recv'd Img size: 114332 bytes
2,574,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,601,296 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,630,605 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,766,417 >>> mbox cmd response: success
2,767,512 UART: [afmc] ++
2,767,680 UART: [afmc] CDI.KEYID = 6
2,768,043 UART: [afmc] SUBJECT.KEYID = 7
2,768,469 UART: [afmc] AUTHORITY.KEYID = 5
2,803,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,448 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,199 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,826,928 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,832,811 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,838,530 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,469 UART: [afmc] --
2,847,443 UART: [cold-reset] --
2,848,477 UART: [state] Locking Datavault
2,849,806 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,410 UART: [state] Locking ICCM
2,850,926 UART: [exit] Launching FMC @ 0x40000130
2,856,255 UART:
2,856,271 UART: Running Caliptra FMC ...
2,856,679 UART:
2,856,733 UART: [state] CFI Enabled
2,867,306 UART: [fht] FMC Alias Private Key: 7
2,975,631 UART: [art] Extend RT PCRs Done
2,976,059 UART: [art] Lock RT PCRs Done
2,977,497 UART: [art] Populate DV Done
2,985,728 UART: [fht] FMC Alias Private Key: 7
2,986,852 UART: [art] Derive CDI
2,987,132 UART: [art] Store in in slot 0x4
3,072,807 UART: [art] Derive Key Pair
3,073,167 UART: [art] Store priv key in slot 0x5
3,085,723 UART: [art] Derive Key Pair - Done
3,100,712 UART: [art] Signing Cert with AUTHO
3,101,192 UART: RITY.KEYID = 7
3,116,572 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,337 UART: [art] PUB.X = BE5C5BCA77A89B95290D7A64372F87F1EEB73E07B6883A91452257D03240A5FFE061CE6710801AE91FE1F0FEADC30D84
3,124,108 UART: [art] PUB.Y = 3B21EA574624FF8CD4AECD7944EDCE494411866E19D29ABC588020AA2367CD3734F6C04780638DDE85E99D8C8F2B9C01
3,131,063 UART: [art] SIG.R = CBE10A275F22F46650C313DEFB4E550C71C43A02DA2CF7065D2E77936745CB326BB2698D73225CB7AB20E09912EE0DA6
3,137,826 UART: [art] SIG.S = FE9A605EE4CD26DA4CA788190EBAFD4287447D48DCEAB254518E893B7EDE9CE2309D24BE0E7D4B5E5152DE16A9A6C87A
3,161,751 UART: Caliptra RT
3,162,004 UART: [state] CFI Enabled
3,269,013 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
891,186 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,315 UART: [kat] ++
895,467 UART: [kat] sha1
899,587 UART: [kat] SHA2-256
901,527 UART: [kat] SHA2-384
904,302 UART: [kat] SHA2-512-ACC
906,203 UART: [kat] ECC-384
915,472 UART: [kat] HMAC-384Kdf
920,054 UART: [kat] LMS
1,168,366 UART: [kat] --
1,169,241 UART: [cold-reset] ++
1,169,739 UART: [fht] FHT @ 0x50003400
1,172,403 UART: [idev] ++
1,172,571 UART: [idev] CDI.KEYID = 6
1,172,932 UART: [idev] SUBJECT.KEYID = 7
1,173,357 UART: [idev] UDS.KEYID = 0
1,180,981 UART: [idev] Erasing UDS.KEYID = 0
1,197,978 UART: [idev] Fuse KeyId
1,199,200 UART: [idev] --
1,200,167 UART: [ldev] ++
1,200,335 UART: [ldev] CDI.KEYID = 6
1,200,699 UART: [ldev] SUBJECT.KEYID = 5
1,201,126 UART: [ldev] AUTHORITY.KEYID = 7
1,201,589 UART: [ldev] FE.KEYID = 1
1,206,921 UART: [ldev] Erasing FE.KEYID = 1
1,232,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,246,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,251,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,257,677 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,263,359 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,270,264 UART: [ldev] --
1,271,782 UART: [fwproc] Wait for Commands...
1,272,409 UART: [fwproc] Recv command 0x46574c44
1,273,142 UART: [fwproc] Recv'd Img size: 114332 bytes
2,570,058 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,597,044 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,626,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,762,249 >>> mbox cmd response: success
2,763,516 UART: [afmc] ++
2,763,684 UART: [afmc] CDI.KEYID = 6
2,764,047 UART: [afmc] SUBJECT.KEYID = 7
2,764,473 UART: [afmc] AUTHORITY.KEYID = 5
2,800,144 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,816,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,817,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,823,280 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,829,163 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,834,882 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,842,663 UART: [afmc] --
2,843,795 UART: [cold-reset] --
2,844,385 UART: [state] Locking Datavault
2,845,666 UART: [state] Locking PCR0, PCR1 and PCR31
2,846,270 UART: [state] Locking ICCM
2,846,716 UART: [exit] Launching FMC @ 0x40000130
2,852,045 UART:
2,852,061 UART: Running Caliptra FMC ...
2,852,469 UART:
2,852,523 UART: [state] CFI Enabled
2,863,034 UART: [fht] FMC Alias Private Key: 7
2,971,459 UART: [art] Extend RT PCRs Done
2,971,887 UART: [art] Lock RT PCRs Done
2,973,755 UART: [art] Populate DV Done
2,981,946 UART: [fht] FMC Alias Private Key: 7
2,983,084 UART: [art] Derive CDI
2,983,364 UART: [art] Store in in slot 0x4
3,069,281 UART: [art] Derive Key Pair
3,069,641 UART: [art] Store priv key in slot 0x5
3,082,727 UART: [art] Derive Key Pair - Done
3,097,691 UART: [art] Signing Cert with AUTHO
3,098,171 UART: RITY.KEYID = 7
3,113,611 UART: [art] Erasing AUTHORITY.KEYID = 7
3,114,376 UART: [art] PUB.X = 127558FA7A7F7CBA777B8BF32B57066B387BFBA4C601D0E74672036A48D9BE6BC77A1F88AEDA672BE1265827C8BD575C
3,121,149 UART: [art] PUB.Y = D6EC21749D0A686A0949E7788F1582900E8187B81EE40697CA3D12852C56F8CB80AB611367284973E1B58181C3E7794B
3,128,077 UART: [art] SIG.R = D2DDB7022227AAFA488B0C3D0F628139526CDBEE2D093ABB6911FEA40068DD6895E579B203086F83DB551295FEAD4B08
3,134,814 UART: [art] SIG.S = 7C43D8A326580526E380193352F118E691A535DE55E27949A858583429BC11DC5ED51CC20B96DE643DEB7F9CDAC9A735
3,158,875 UART: Caliptra RT
3,159,128 UART: [state] CFI Enabled
3,267,017 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,777 >>> mbox cmd response: success
2,685,453 UART:
2,685,469 UART: Running Caliptra FMC ...
2,685,877 UART:
2,685,931 UART: [state] CFI Enabled
2,696,242 UART: [fht] FMC Alias Private Key: 7
2,804,467 UART: [art] Extend RT PCRs Done
2,804,895 UART: [art] Lock RT PCRs Done
2,806,497 UART: [art] Populate DV Done
2,814,822 UART: [fht] FMC Alias Private Key: 7
2,815,976 UART: [art] Derive CDI
2,816,256 UART: [art] Store in in slot 0x4
2,902,427 UART: [art] Derive Key Pair
2,902,787 UART: [art] Store priv key in slot 0x5
2,915,845 UART: [art] Derive Key Pair - Done
2,930,877 UART: [art] Signing Cert with AUTHO
2,931,357 UART: RITY.KEYID = 7
2,946,353 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,118 UART: [art] PUB.X = 161F99A0665801B456BF25906CA6FA17F278F82A9156B04B5338AA3E0812F66A40A5777486DAE6C340FD9D83A3B42887
2,953,878 UART: [art] PUB.Y = 19D9420F0281D15D7319CF7125DC726CD4DDCC4AFB529D4FA3981A61FC98F70AA0638DA323D6A44709788A4D8EC13760
2,960,822 UART: [art] SIG.R = 0ECC9B81E6327F9AF898433C60804912EA93AAD1EDCFB0FFE3FEB0A4DDC020FF220D5B5B8CDCD4FECA2F328249948F74
2,967,612 UART: [art] SIG.S = BD6D06351A7066E96B3845BFB3C6AD1F402D172BE7B221D0EF3561B69D9D91B7A5DFBF22EF41D30E5498A2426F61D970
2,991,213 UART: Caliptra RT
2,991,466 UART: [state] CFI Enabled
3,098,675 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,617,543 >>> mbox cmd response: success
2,679,847 UART:
2,679,863 UART: Running Caliptra FMC ...
2,680,271 UART:
2,680,325 UART: [state] CFI Enabled
2,690,456 UART: [fht] FMC Alias Private Key: 7
2,798,503 UART: [art] Extend RT PCRs Done
2,798,931 UART: [art] Lock RT PCRs Done
2,800,499 UART: [art] Populate DV Done
2,808,646 UART: [fht] FMC Alias Private Key: 7
2,809,814 UART: [art] Derive CDI
2,810,094 UART: [art] Store in in slot 0x4
2,895,833 UART: [art] Derive Key Pair
2,896,193 UART: [art] Store priv key in slot 0x5
2,909,749 UART: [art] Derive Key Pair - Done
2,924,767 UART: [art] Signing Cert with AUTHO
2,925,247 UART: RITY.KEYID = 7
2,939,847 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,612 UART: [art] PUB.X = 1BE576553E6547203C61657C0849E2EA8A64071BA74F042DB566AB0F6B6BCE275759EA3394A38D326E6E04CF78D99FCC
2,947,371 UART: [art] PUB.Y = A4C46D8068C96EB057239F44B74313742705D7B966685B62B9DC2A507A4D8C95E076FD84686BA2A2D05524849077B012
2,954,308 UART: [art] SIG.R = 4DD449DB684099DC76AA637CAB40341559D0DEE294747913D610E2003B599AC25AED2F6AB5E077F462122ABABF333974
2,961,060 UART: [art] SIG.S = C02F1AC3DDADD55FE6BDB3D3A7292F1C3BDBB49061411DEB89E930547C08B2946BF10F9EED3CCF8F2959D6319C79A859
2,984,669 UART: Caliptra RT
2,984,922 UART: [state] CFI Enabled
3,092,938 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,619,027 >>> mbox cmd response: success
2,680,475 UART:
2,680,491 UART: Running Caliptra FMC ...
2,680,899 UART:
2,680,953 UART: [state] CFI Enabled
2,691,198 UART: [fht] FMC Alias Private Key: 7
2,798,875 UART: [art] Extend RT PCRs Done
2,799,303 UART: [art] Lock RT PCRs Done
2,800,871 UART: [art] Populate DV Done
2,809,084 UART: [fht] FMC Alias Private Key: 7
2,810,188 UART: [art] Derive CDI
2,810,468 UART: [art] Store in in slot 0x4
2,896,155 UART: [art] Derive Key Pair
2,896,515 UART: [art] Store priv key in slot 0x5
2,909,223 UART: [art] Derive Key Pair - Done
2,924,239 UART: [art] Signing Cert with AUTHO
2,924,719 UART: RITY.KEYID = 7
2,939,809 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,574 UART: [art] PUB.X = 8C27F97DE28C18B0DA101D94601A8D3CB9F62FCF70BC121740E28F4BB80FC44AF90051B0E9E017E8756BA6609F087BE9
2,947,326 UART: [art] PUB.Y = 1E1C3D63F3259DBED9CDD42A7831A4DCC2951BD1582C104E090840D58C41175D31914594D8FA42165F120DE6C8213386
2,954,265 UART: [art] SIG.R = CC913BD1133EEDBB04A427E51EFB70827F6690C42F3D2EEE8F0247D29EAF4158ECBA15DD6D22DEB22BFF15178D9DF2FC
2,961,055 UART: [art] SIG.S = 0B1B470A0B37F2CF6C3DD13EE8B2B8FFB1AB6ECC24CA341C3071CFDB83212CB06A78A8A2701D31FDD19916DB8C8C82D9
2,984,723 UART: Caliptra RT
2,984,976 UART: [state] CFI Enabled
3,091,858 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,613,413 >>> mbox cmd response: success
2,674,207 UART:
2,674,223 UART: Running Caliptra FMC ...
2,674,631 UART:
2,674,685 UART: [state] CFI Enabled
2,685,426 UART: [fht] FMC Alias Private Key: 7
2,793,625 UART: [art] Extend RT PCRs Done
2,794,053 UART: [art] Lock RT PCRs Done
2,795,493 UART: [art] Populate DV Done
2,803,410 UART: [fht] FMC Alias Private Key: 7
2,804,400 UART: [art] Derive CDI
2,804,680 UART: [art] Store in in slot 0x4
2,890,081 UART: [art] Derive Key Pair
2,890,441 UART: [art] Store priv key in slot 0x5
2,903,639 UART: [art] Derive Key Pair - Done
2,918,522 UART: [art] Signing Cert with AUTHO
2,919,002 UART: RITY.KEYID = 7
2,934,364 UART: [art] Erasing AUTHORITY.KEYID = 7
2,935,129 UART: [art] PUB.X = 7741E4D4139401E1222C49DB47EA102406F46030B361AB2888C2565B3C89B1887915767ACAACC61E73B062936843D238
2,941,881 UART: [art] PUB.Y = ED9BCC90549859D499D9AA60DE4A1A61D7075483B18212A4739D40EBE6B649F77964171025DFDA7E409F804BE131D0C6
2,948,830 UART: [art] SIG.R = DD3C6DE718741CB0C8D2101446C46B961C5D2A70A4BA40E8A9EB96B1294E0063AB9B5797929455CF3B0842954BA8FAC3
2,955,581 UART: [art] SIG.S = 343195351CD6A5C229375BFD2361D1E06700CBFBB7AAC7C0B0BBD9C464DFF1AAB1294FA990E9374A5AEAF9ACCFEF6417
2,979,792 UART: Caliptra RT
2,980,045 UART: [state] CFI Enabled
3,088,134 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.39s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,398 UART: [afmc] --
2,850,474 UART: [cold-reset] --
2,851,398 UART: [state] Locking Datavault
2,852,575 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,179 UART: [state] Locking ICCM
2,853,709 UART: [exit] Launching FMC @ 0x40000130
2,859,038 UART:
2,859,054 UART: Running Caliptra FMC ...
2,859,462 UART:
2,859,605 UART: [state] CFI Enabled
2,869,986 UART: [fht] FMC Alias Private Key: 7
2,977,777 UART: [art] Extend RT PCRs Done
2,978,205 UART: [art] Lock RT PCRs Done
2,979,711 UART: [art] Populate DV Done
2,987,822 UART: [fht] FMC Alias Private Key: 7
2,989,002 UART: [art] Derive CDI
2,989,282 UART: [art] Store in in slot 0x4
3,075,039 UART: [art] Derive Key Pair
3,075,399 UART: [art] Store priv key in slot 0x5
3,089,285 UART: [art] Derive Key Pair - Done
3,104,099 UART: [art] Signing Cert with AUTHO
3,104,579 UART: RITY.KEYID = 7
3,119,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,530 UART: [art] PUB.X = C4A4CA2E6059D3C3A54583D31D47B8ED611E7C20F465214C5F2AAE1B3041BA37AC4AECDA9EABDC9284FF794BBF587A90
3,127,322 UART: [art] PUB.Y = 943E1436A13A5EFCFB920992C580A6610531E3F5525971FDD1048BAC67D1E16997935D940BFA93571BBCAC3C6B00FF61
3,134,242 UART: [art] SIG.R = F3E17436138FC270A0BBDEDA35DB987442A2E3EC85F294BEFC89A1887B2F28C9777BD16BA67AA3FC7BC3EE2687B65645
3,141,028 UART: [art] SIG.S = 39D99D768CB9528B6B17A3EC4F540806E56B7A3DB70CD68F47379A8C052E20026C9E4D66C94AB245A50C24939F46A582
3,163,649 UART: Caliptra RT
3,163,994 UART: [state] CFI Enabled
3,270,574 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
899,628 UART: [kat] SHA2-256
901,568 UART: [kat] SHA2-384
904,429 UART: [kat] SHA2-512-ACC
906,330 UART: [kat] ECC-384
916,177 UART: [kat] HMAC-384Kdf
920,873 UART: [kat] LMS
1,169,185 UART: [kat] --
1,170,056 UART: [cold-reset] ++
1,170,444 UART: [fht] FHT @ 0x50003400
1,173,290 UART: [idev] ++
1,173,458 UART: [idev] CDI.KEYID = 6
1,173,819 UART: [idev] SUBJECT.KEYID = 7
1,174,244 UART: [idev] UDS.KEYID = 0
1,182,664 UART: [idev] Erasing UDS.KEYID = 0
1,199,631 UART: [idev] Sha384 KeyId Algorithm
1,203,290 UART: [idev] --
1,204,455 UART: [ldev] ++
1,204,623 UART: [ldev] CDI.KEYID = 6
1,204,987 UART: [ldev] SUBJECT.KEYID = 5
1,205,414 UART: [ldev] AUTHORITY.KEYID = 7
1,205,877 UART: [ldev] FE.KEYID = 1
1,211,323 UART: [ldev] Erasing FE.KEYID = 1
1,238,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,251,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,257,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,263,445 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,269,167 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,276,289 UART: [ldev] --
1,277,627 UART: [fwproc] Wait for Commands...
1,278,372 UART: [fwproc] Recv command 0x46574c44
1,279,105 UART: [fwproc] Recv'd Img size: 114332 bytes
2,576,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,595 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,904 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,767,638 >>> mbox cmd response: success
2,768,803 UART: [afmc] ++
2,768,971 UART: [afmc] CDI.KEYID = 6
2,769,334 UART: [afmc] SUBJECT.KEYID = 7
2,769,760 UART: [afmc] AUTHORITY.KEYID = 5
2,804,833 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,691 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,442 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,171 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,054 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,773 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,416 UART: [afmc] --
2,848,428 UART: [cold-reset] --
2,849,310 UART: [state] Locking Datavault
2,850,443 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,047 UART: [state] Locking ICCM
2,851,607 UART: [exit] Launching FMC @ 0x40000130
2,856,936 UART:
2,856,952 UART: Running Caliptra FMC ...
2,857,360 UART:
2,857,503 UART: [state] CFI Enabled
2,868,350 UART: [fht] FMC Alias Private Key: 7
2,976,743 UART: [art] Extend RT PCRs Done
2,977,171 UART: [art] Lock RT PCRs Done
2,978,893 UART: [art] Populate DV Done
2,987,272 UART: [fht] FMC Alias Private Key: 7
2,988,378 UART: [art] Derive CDI
2,988,658 UART: [art] Store in in slot 0x4
3,074,275 UART: [art] Derive Key Pair
3,074,635 UART: [art] Store priv key in slot 0x5
3,087,289 UART: [art] Derive Key Pair - Done
3,101,785 UART: [art] Signing Cert with AUTHO
3,102,265 UART: RITY.KEYID = 7
3,117,383 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,148 UART: [art] PUB.X = 9DF902BE7FE2C2003EB34B6E8067559D51836F74816404AE8CE215FB36E0A6645A6063317AC0B1D44ADF1E51A9BF6FBC
3,124,900 UART: [art] PUB.Y = 0C00523B242F5BF0874F638214BF02EAD487A609773A854DBB5DAF4C386FC9E62F53BD1F815256E7F71DBAD935AE6682
3,131,827 UART: [art] SIG.R = FEF96542F4E089AD9E77751E2AF8023D4819A971F2A63375EEF019D59B82269627E3F4AA4D4A34078F1689FF05D8CBE8
3,138,592 UART: [art] SIG.S = BA737480991ADF39164E5BBD20B20E1879306F3067BB059A30EDA7D0B05FD93AC8E6BBD8FA38CD61159B6B8C29BD74AC
3,162,243 UART: Caliptra RT
3,162,588 UART: [state] CFI Enabled
3,270,319 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,917 UART: [state] LifecycleState = Unprovisioned
86,572 UART: [state] DebugLocked = No
87,112 UART: [state] WD Timer not started. Device not locked for debugging
88,321 UART: [kat] SHA2-256
891,871 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,000 UART: [kat] ++
896,152 UART: [kat] sha1
900,358 UART: [kat] SHA2-256
902,298 UART: [kat] SHA2-384
905,227 UART: [kat] SHA2-512-ACC
907,128 UART: [kat] ECC-384
916,681 UART: [kat] HMAC-384Kdf
921,339 UART: [kat] LMS
1,169,651 UART: [kat] --
1,170,224 UART: [cold-reset] ++
1,170,768 UART: [fht] FHT @ 0x50003400
1,173,344 UART: [idev] ++
1,173,512 UART: [idev] CDI.KEYID = 6
1,173,873 UART: [idev] SUBJECT.KEYID = 7
1,174,298 UART: [idev] UDS.KEYID = 0
1,182,188 UART: [idev] Erasing UDS.KEYID = 0
1,199,161 UART: [idev] Fuse KeyId
1,200,383 UART: [idev] --
1,201,280 UART: [ldev] ++
1,201,448 UART: [ldev] CDI.KEYID = 6
1,201,812 UART: [ldev] SUBJECT.KEYID = 5
1,202,239 UART: [ldev] AUTHORITY.KEYID = 7
1,202,702 UART: [ldev] FE.KEYID = 1
1,207,788 UART: [ldev] Erasing FE.KEYID = 1
1,234,609 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,253,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,259,660 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,342 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,453 UART: [ldev] --
1,273,857 UART: [fwproc] Wait for Commands...
1,274,656 UART: [fwproc] Recv command 0x46574c44
1,275,389 UART: [fwproc] Recv'd Img size: 114332 bytes
2,573,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,600,667 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,629,976 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,765,678 >>> mbox cmd response: success
2,766,833 UART: [afmc] ++
2,767,001 UART: [afmc] CDI.KEYID = 6
2,767,364 UART: [afmc] SUBJECT.KEYID = 7
2,767,790 UART: [afmc] AUTHORITY.KEYID = 5
2,804,253 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,400 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,129 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,012 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,838,731 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,466 UART: [afmc] --
2,847,404 UART: [cold-reset] --
2,848,012 UART: [state] Locking Datavault
2,848,821 UART: [state] Locking PCR0, PCR1 and PCR31
2,849,425 UART: [state] Locking ICCM
2,849,849 UART: [exit] Launching FMC @ 0x40000130
2,855,178 UART:
2,855,194 UART: Running Caliptra FMC ...
2,855,602 UART:
2,855,745 UART: [state] CFI Enabled
2,866,184 UART: [fht] FMC Alias Private Key: 7
2,973,283 UART: [art] Extend RT PCRs Done
2,973,711 UART: [art] Lock RT PCRs Done
2,975,311 UART: [art] Populate DV Done
2,983,568 UART: [fht] FMC Alias Private Key: 7
2,984,536 UART: [art] Derive CDI
2,984,816 UART: [art] Store in in slot 0x4
3,070,563 UART: [art] Derive Key Pair
3,070,923 UART: [art] Store priv key in slot 0x5
3,084,445 UART: [art] Derive Key Pair - Done
3,099,347 UART: [art] Signing Cert with AUTHO
3,099,827 UART: RITY.KEYID = 7
3,114,999 UART: [art] Erasing AUTHORITY.KEYID = 7
3,115,764 UART: [art] PUB.X = 1ABC4424361449C368115994C4BB01D649E074D8E928F7244EC5C666EE509302EBA413837412017C01035049187956D8
3,122,501 UART: [art] PUB.Y = 4754BC14772EBA88FBFD0961E58C1EB82058E03D7DC86646A72DA73B258EF048E2A1690D2605C7005F2989EF9E23AF52
3,129,424 UART: [art] SIG.R = 42F47A1373B6A60D9813CB65719AFE665167B94CBF77AB2BD242E5BC148B46BCDC63AF729C6A004E30A7475DBE3054F5
3,136,179 UART: [art] SIG.S = B87B4025BBF3CC458D64E2E61250F7A6C00AB86BD2141C7D5D87F3CE84F8EC547BD9F2EA0B13C68FF4CFD61CB1D246B0
3,159,816 UART: Caliptra RT
3,160,161 UART: [state] CFI Enabled
3,268,080 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,208 >>> mbox cmd response: success
2,685,292 UART:
2,685,308 UART: Running Caliptra FMC ...
2,685,716 UART:
2,685,859 UART: [state] CFI Enabled
2,696,232 UART: [fht] FMC Alias Private Key: 7
2,804,751 UART: [art] Extend RT PCRs Done
2,805,179 UART: [art] Lock RT PCRs Done
2,806,725 UART: [art] Populate DV Done
2,814,928 UART: [fht] FMC Alias Private Key: 7
2,816,060 UART: [art] Derive CDI
2,816,340 UART: [art] Store in in slot 0x4
2,902,165 UART: [art] Derive Key Pair
2,902,525 UART: [art] Store priv key in slot 0x5
2,915,463 UART: [art] Derive Key Pair - Done
2,930,539 UART: [art] Signing Cert with AUTHO
2,931,019 UART: RITY.KEYID = 7
2,946,461 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,226 UART: [art] PUB.X = 7358EBC78323734763C8218AC73C6F377A942465222F119435D48EB5D036ACBE768D9AA9DF618FF04D7BE65B285407E0
2,953,991 UART: [art] PUB.Y = 99677B2C05ABFC7AE8116732A083184A83A03A22F74A1843C145157962A6A2FAB0CA1DFC41B20AED921163BAEC40202D
2,960,941 UART: [art] SIG.R = 9BE19F047C9E45915F0381C351DCBBD71281C9B1D540DE69F042FA789BC5F9FFA2B309DC90555CE69BE8A539DDC23C18
2,967,716 UART: [art] SIG.S = 86274AE26980B827EA56BE990262686DB22AD2845C66878F7A3196DB05663145C331C67F88D4597EA46C862D69919DB6
2,991,357 UART: Caliptra RT
2,991,702 UART: [state] CFI Enabled
3,099,452 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,500 >>> mbox cmd response: success
2,682,760 UART:
2,682,776 UART: Running Caliptra FMC ...
2,683,184 UART:
2,683,327 UART: [state] CFI Enabled
2,694,168 UART: [fht] FMC Alias Private Key: 7
2,802,263 UART: [art] Extend RT PCRs Done
2,802,691 UART: [art] Lock RT PCRs Done
2,804,167 UART: [art] Populate DV Done
2,812,234 UART: [fht] FMC Alias Private Key: 7
2,813,198 UART: [art] Derive CDI
2,813,478 UART: [art] Store in in slot 0x4
2,899,235 UART: [art] Derive Key Pair
2,899,595 UART: [art] Store priv key in slot 0x5
2,912,929 UART: [art] Derive Key Pair - Done
2,927,714 UART: [art] Signing Cert with AUTHO
2,928,194 UART: RITY.KEYID = 7
2,943,498 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,263 UART: [art] PUB.X = BD30E5F10F76057548823B5198B5366BE33409136A1CB2A692F020C0DC621EC4CAD539066CB0E7E28D55B7F8CCD7BEBE
2,951,031 UART: [art] PUB.Y = A5564C3B6820A8333AF8E3E594FAF0DE17280C54BE91FB58E4EF7B7BCE61DC70BF222A63FB0C36BCEC83733B53628E8D
2,957,993 UART: [art] SIG.R = 7EE5F4BBEB77D619C91973276DF91D2EF95A5998F82DFE386B174E2280DBC88285D0798D0CEE7510C1A66E464B117C58
2,964,766 UART: [art] SIG.S = DA0F35B794C73098EC6C99383925493BA6448EBDCA2530FF3CAFA914F8F7BD1148B7D6797CAAC074EBD1930A18A47E14
2,989,257 UART: Caliptra RT
2,989,602 UART: [state] CFI Enabled
3,097,746 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,617,866 >>> mbox cmd response: success
2,679,926 UART:
2,679,942 UART: Running Caliptra FMC ...
2,680,350 UART:
2,680,493 UART: [state] CFI Enabled
2,690,962 UART: [fht] FMC Alias Private Key: 7
2,799,511 UART: [art] Extend RT PCRs Done
2,799,939 UART: [art] Lock RT PCRs Done
2,801,323 UART: [art] Populate DV Done
2,809,532 UART: [fht] FMC Alias Private Key: 7
2,810,588 UART: [art] Derive CDI
2,810,868 UART: [art] Store in in slot 0x4
2,896,349 UART: [art] Derive Key Pair
2,896,709 UART: [art] Store priv key in slot 0x5
2,910,651 UART: [art] Derive Key Pair - Done
2,925,392 UART: [art] Signing Cert with AUTHO
2,925,872 UART: RITY.KEYID = 7
2,941,304 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,069 UART: [art] PUB.X = A5EF5DA5DC12C7B0A9BBDB9361DFB84369F53AC2686A492883C0C15E23A18D66485525173137C2FF52DFCF3B0845A22B
2,948,846 UART: [art] PUB.Y = 003FA97F5061CFCEAD0319B081F0349BD974F23115A5B5F65D1B58A384F236D1602B68804A18BC9A1D6EB02C2DD4BE0D
2,955,778 UART: [art] SIG.R = BDAD15CB919565949173D952F61C297EA93166005170198EC2DDDE19C1F635166858A56F3B54B1C823D97C60ED640977
2,962,517 UART: [art] SIG.S = 0ED378D0E7A5644F554F48DBA05B93CFC6AFD40344D7E494C1977F2BB11487ED746DFE35F5D65D1CE933BA2857569640
2,985,852 UART: Caliptra RT
2,986,197 UART: [state] CFI Enabled
3,092,691 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,616,944 >>> mbox cmd response: success
2,678,714 UART:
2,678,730 UART: Running Caliptra FMC ...
2,679,138 UART:
2,679,281 UART: [state] CFI Enabled
2,689,594 UART: [fht] FMC Alias Private Key: 7
2,797,499 UART: [art] Extend RT PCRs Done
2,797,927 UART: [art] Lock RT PCRs Done
2,799,661 UART: [art] Populate DV Done
2,807,778 UART: [fht] FMC Alias Private Key: 7
2,808,884 UART: [art] Derive CDI
2,809,164 UART: [art] Store in in slot 0x4
2,894,987 UART: [art] Derive Key Pair
2,895,347 UART: [art] Store priv key in slot 0x5
2,908,689 UART: [art] Derive Key Pair - Done
2,923,335 UART: [art] Signing Cert with AUTHO
2,923,815 UART: RITY.KEYID = 7
2,939,375 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,140 UART: [art] PUB.X = 83258F67E14FECA8770BA478AEE0F6466EE3725C8C0EFCE7FE0B3A2A896057581B38663C1CD8EB71D0D22ABC8ECEEEEE
2,946,925 UART: [art] PUB.Y = 11134F2B698FD9BB9C626BC11A06CC270349762059D809DEC29B91A983306FF5A32FB2A2CCD7A9DADD01278D5012D093
2,953,869 UART: [art] SIG.R = 2E878C98C0C9ECCD61545B766158970B38232A21E3FD14D56332207B3CA40803404BE8A18FA420D404A7ECF489A391F4
2,960,625 UART: [art] SIG.S = 35ED9B34A9A9BC5A94091DF544C2EBE7FEB36FF26E60FA01CD680342E237224911F018B740F8928166CFB1993177F41C
2,984,253 UART: Caliptra RT
2,984,598 UART: [state] CFI Enabled
3,091,909 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.42s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,365 UART: [afmc] --
2,848,423 UART: [cold-reset] --
2,849,159 UART: [state] Locking Datavault
2,850,370 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,974 UART: [state] Locking ICCM
2,851,450 UART: [exit] Launching FMC @ 0x40000130
2,856,779 UART:
2,856,795 UART: Running Caliptra FMC ...
2,857,203 UART:
2,857,257 UART: [state] CFI Enabled
2,868,012 UART: [fht] FMC Alias Private Key: 7
2,975,465 UART: [art] Extend RT PCRs Done
2,975,893 UART: [art] Lock RT PCRs Done
2,977,427 UART: [art] Populate DV Done
2,985,382 UART: [fht] FMC Alias Private Key: 7
2,986,354 UART: [art] Derive CDI
2,986,634 UART: [art] Store in in slot 0x4
3,072,155 UART: [art] Derive Key Pair
3,072,515 UART: [art] Store priv key in slot 0x5
3,085,887 UART: [art] Derive Key Pair - Done
3,100,472 UART: [art] Signing Cert with AUTHO
3,100,952 UART: RITY.KEYID = 7
3,116,248 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,013 UART: [art] PUB.X = 926E027E850D685391D4D7811DD80039658BB04E42A1FF633382AA004F313CCC1DF738CD232E418CD00398FD882DD436
3,123,728 UART: [art] PUB.Y = 1C4B5966B02A55F3E761341496087AEDD24CDD46D901DF66C991EC37B11ED07AEE9CD6A7375961D17C01EEFF08C66AC1
3,130,678 UART: [art] SIG.R = 7C948FF672841E48707B2B93E94E5A2F5BE06D8093F8112E2277604ECAC86CA35A4C68042C0D0B54DF214BF229E812EC
3,137,443 UART: [art] SIG.S = E7CFE78D0859FEA513B378CBD2AFEE663E95B886B7F98588484F67519B4018C3539FA2E1DF29986F88062383F7D8DFBA
3,161,414 UART: Caliptra RT
3,161,667 UART: [state] CFI Enabled
3,268,657 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,231 UART: [kat] ++
895,383 UART: [kat] sha1
899,681 UART: [kat] SHA2-256
901,621 UART: [kat] SHA2-384
904,536 UART: [kat] SHA2-512-ACC
906,437 UART: [kat] ECC-384
916,306 UART: [kat] HMAC-384Kdf
920,944 UART: [kat] LMS
1,169,256 UART: [kat] --
1,170,287 UART: [cold-reset] ++
1,170,743 UART: [fht] FHT @ 0x50003400
1,173,327 UART: [idev] ++
1,173,495 UART: [idev] CDI.KEYID = 6
1,173,856 UART: [idev] SUBJECT.KEYID = 7
1,174,281 UART: [idev] UDS.KEYID = 0
1,182,659 UART: [idev] Erasing UDS.KEYID = 0
1,199,614 UART: [idev] Sha384 KeyId Algorithm
1,203,321 UART: [idev] --
1,204,272 UART: [ldev] ++
1,204,440 UART: [ldev] CDI.KEYID = 6
1,204,804 UART: [ldev] SUBJECT.KEYID = 5
1,205,231 UART: [ldev] AUTHORITY.KEYID = 7
1,205,694 UART: [ldev] FE.KEYID = 1
1,210,872 UART: [ldev] Erasing FE.KEYID = 1
1,236,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,532 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,254 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,324 UART: [ldev] --
1,275,836 UART: [fwproc] Wait for Commands...
1,276,409 UART: [fwproc] Recv command 0x46574c44
1,277,142 UART: [fwproc] Recv'd Img size: 114332 bytes
2,574,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,390 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,699 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,767,519 >>> mbox cmd response: success
2,768,734 UART: [afmc] ++
2,768,902 UART: [afmc] CDI.KEYID = 6
2,769,265 UART: [afmc] SUBJECT.KEYID = 7
2,769,691 UART: [afmc] AUTHORITY.KEYID = 5
2,805,524 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,956 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,707 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,436 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,319 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,038 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,843 UART: [afmc] --
2,848,785 UART: [cold-reset] --
2,849,625 UART: [state] Locking Datavault
2,850,974 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,578 UART: [state] Locking ICCM
2,852,174 UART: [exit] Launching FMC @ 0x40000130
2,857,503 UART:
2,857,519 UART: Running Caliptra FMC ...
2,857,927 UART:
2,857,981 UART: [state] CFI Enabled
2,868,446 UART: [fht] FMC Alias Private Key: 7
2,976,179 UART: [art] Extend RT PCRs Done
2,976,607 UART: [art] Lock RT PCRs Done
2,978,317 UART: [art] Populate DV Done
2,986,686 UART: [fht] FMC Alias Private Key: 7
2,987,734 UART: [art] Derive CDI
2,988,014 UART: [art] Store in in slot 0x4
3,073,281 UART: [art] Derive Key Pair
3,073,641 UART: [art] Store priv key in slot 0x5
3,086,433 UART: [art] Derive Key Pair - Done
3,101,011 UART: [art] Signing Cert with AUTHO
3,101,491 UART: RITY.KEYID = 7
3,116,849 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,614 UART: [art] PUB.X = E08B68C422385A61437F119F078110F1D602A7BBCFF292341BF67605168A094D1B3F8D673FF3B1AA35C45BE9DD89038C
3,124,371 UART: [art] PUB.Y = A0FB2F825C0DD39CD170D28D71CCC3C34F50BFFB6C556B0F30DF9A8A79613DB672C35852BE94EC52AF09B54A6215F8D8
3,131,330 UART: [art] SIG.R = 006027A8F6786FB7F8FF3F8374D40E9ED933418D8490A40D83728D841F215D0BD03FDFA5F35E572C69AF9D57F20FE809
3,138,067 UART: [art] SIG.S = 658C300D1BCB79DB4125E734A3FB7F20BD5B8A3D8FBFC9A9608D00F9FDF5845D3ACBE28DFBEC57564A3A9BBF005D966A
3,161,371 UART: Caliptra RT
3,161,624 UART: [state] CFI Enabled
3,268,813 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,711 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
891,426 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,555 UART: [kat] ++
895,707 UART: [kat] sha1
899,753 UART: [kat] SHA2-256
901,693 UART: [kat] SHA2-384
904,598 UART: [kat] SHA2-512-ACC
906,499 UART: [kat] ECC-384
916,262 UART: [kat] HMAC-384Kdf
920,936 UART: [kat] LMS
1,169,248 UART: [kat] --
1,170,221 UART: [cold-reset] ++
1,170,715 UART: [fht] FHT @ 0x50003400
1,173,245 UART: [idev] ++
1,173,413 UART: [idev] CDI.KEYID = 6
1,173,774 UART: [idev] SUBJECT.KEYID = 7
1,174,199 UART: [idev] UDS.KEYID = 0
1,182,441 UART: [idev] Erasing UDS.KEYID = 0
1,199,260 UART: [idev] Fuse KeyId
1,200,482 UART: [idev] --
1,201,611 UART: [ldev] ++
1,201,779 UART: [ldev] CDI.KEYID = 6
1,202,143 UART: [ldev] SUBJECT.KEYID = 5
1,202,570 UART: [ldev] AUTHORITY.KEYID = 7
1,203,033 UART: [ldev] FE.KEYID = 1
1,208,063 UART: [ldev] Erasing FE.KEYID = 1
1,234,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,253,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,259,745 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,427 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,594 UART: [ldev] --
1,273,994 UART: [fwproc] Wait for Commands...
1,274,585 UART: [fwproc] Recv command 0x46574c44
1,275,318 UART: [fwproc] Recv'd Img size: 114332 bytes
2,573,354 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,600,002 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,629,311 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,765,259 >>> mbox cmd response: success
2,766,406 UART: [afmc] ++
2,766,574 UART: [afmc] CDI.KEYID = 6
2,766,937 UART: [afmc] SUBJECT.KEYID = 7
2,767,363 UART: [afmc] AUTHORITY.KEYID = 5
2,802,726 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,819,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,819,857 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,825,586 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,831,469 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,837,188 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,844,803 UART: [afmc] --
2,845,699 UART: [cold-reset] --
2,846,585 UART: [state] Locking Datavault
2,847,566 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,170 UART: [state] Locking ICCM
2,848,792 UART: [exit] Launching FMC @ 0x40000130
2,854,121 UART:
2,854,137 UART: Running Caliptra FMC ...
2,854,545 UART:
2,854,599 UART: [state] CFI Enabled
2,865,072 UART: [fht] FMC Alias Private Key: 7
2,972,919 UART: [art] Extend RT PCRs Done
2,973,347 UART: [art] Lock RT PCRs Done
2,975,235 UART: [art] Populate DV Done
2,983,416 UART: [fht] FMC Alias Private Key: 7
2,984,500 UART: [art] Derive CDI
2,984,780 UART: [art] Store in in slot 0x4
3,070,197 UART: [art] Derive Key Pair
3,070,557 UART: [art] Store priv key in slot 0x5
3,083,987 UART: [art] Derive Key Pair - Done
3,098,635 UART: [art] Signing Cert with AUTHO
3,099,115 UART: RITY.KEYID = 7
3,114,437 UART: [art] Erasing AUTHORITY.KEYID = 7
3,115,202 UART: [art] PUB.X = F875019E351645044756A6AD8A11B86596EFCEDD4B6BCE4EBCB14EAB93A153FB3507E7C57D8A90FC99132CD5B78A7D5C
3,121,979 UART: [art] PUB.Y = 35F8CA2C1C3FE3C9E0FD0145BAF8FE14130066C4EEA99666A98E7628079CFC2B341E165AB4641702B86A6B333B78D687
3,128,904 UART: [art] SIG.R = 2E40DC5268C160E6A2C78C037F99F1FA03735CCE5F1DC93246DAE40EF5CB91BC31A6F17CD084A59AEE10F7637A8E9BE9
3,135,683 UART: [art] SIG.S = DEF3E6198BA6C413B43B6821FA48816CB169E09A570EDC8EB478A4F4B59ED540FD5CE00D156B38FA12CDD117380F986D
3,159,455 UART: Caliptra RT
3,159,708 UART: [state] CFI Enabled
3,266,921 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,663 >>> mbox cmd response: success
2,684,513 UART:
2,684,529 UART: Running Caliptra FMC ...
2,684,937 UART:
2,684,991 UART: [state] CFI Enabled
2,695,412 UART: [fht] FMC Alias Private Key: 7
2,804,471 UART: [art] Extend RT PCRs Done
2,804,899 UART: [art] Lock RT PCRs Done
2,806,609 UART: [art] Populate DV Done
2,815,050 UART: [fht] FMC Alias Private Key: 7
2,816,204 UART: [art] Derive CDI
2,816,484 UART: [art] Store in in slot 0x4
2,902,135 UART: [art] Derive Key Pair
2,902,495 UART: [art] Store priv key in slot 0x5
2,914,951 UART: [art] Derive Key Pair - Done
2,929,469 UART: [art] Signing Cert with AUTHO
2,929,949 UART: RITY.KEYID = 7
2,945,097 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,862 UART: [art] PUB.X = 04BCC72D5768BA378E7DB9165D7B338C52D1FAEB674661B93B4FA0415C3033D3C4D3A3AAC3DB734AB7ABB90D07AFBCCE
2,952,647 UART: [art] PUB.Y = 6F8B849CE8D7D613091FE45E97352ABAF5A4F1E5738EFC141B944D5CC26DB8216C99D7FC0ECAF543DF7A04E257C922B5
2,959,604 UART: [art] SIG.R = D633B81E92CBBBDE91CAB41C5ECFF29EA29F4F1DA07E3E9617F450117B460E667DA53D8181839FD0CCD5B05BA97708D7
2,966,386 UART: [art] SIG.S = D98EA39C45EE38EC0E5764229E1E56F7D0A3CF884CFF5ECF82D0E5F04D1360396ABCC5780851EF775DF0FD57F7EB0009
2,989,502 UART: Caliptra RT
2,989,755 UART: [state] CFI Enabled
3,097,207 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,619,017 >>> mbox cmd response: success
2,680,497 UART:
2,680,513 UART: Running Caliptra FMC ...
2,680,921 UART:
2,680,975 UART: [state] CFI Enabled
2,691,310 UART: [fht] FMC Alias Private Key: 7
2,799,623 UART: [art] Extend RT PCRs Done
2,800,051 UART: [art] Lock RT PCRs Done
2,801,559 UART: [art] Populate DV Done
2,809,856 UART: [fht] FMC Alias Private Key: 7
2,811,038 UART: [art] Derive CDI
2,811,318 UART: [art] Store in in slot 0x4
2,896,987 UART: [art] Derive Key Pair
2,897,347 UART: [art] Store priv key in slot 0x5
2,910,421 UART: [art] Derive Key Pair - Done
2,925,358 UART: [art] Signing Cert with AUTHO
2,925,838 UART: RITY.KEYID = 7
2,940,554 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,319 UART: [art] PUB.X = 0A681DF1E3F7FFE6A9CE87B60762E1CB70B3A297EDC841665FD630E54233206C49163250594C36CC2AAAD0E2C56F684D
2,948,091 UART: [art] PUB.Y = D3CD36895169F1CE3245EA266072BE93464D67D732D27F5D87A0B0F70DD973090E6A67FC5D5E2C93954D0ED921C78A21
2,955,031 UART: [art] SIG.R = E1EAB4B76116F887A8384DE2C574BA7ABF4348EB830A491D7B24ADACDC226BEA1BFAE931BB57B7DAC153DB18F7345F55
2,961,822 UART: [art] SIG.S = DB691F203A517FAD22E3DFEA4C8A2B76F4F92DE3ACCCCAD59FC46BF1F41417C4FFEECB67AC2BFA910E4B3D1228FD13B0
2,985,446 UART: Caliptra RT
2,985,699 UART: [state] CFI Enabled
3,092,912 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,616,463 >>> mbox cmd response: success
2,679,189 UART:
2,679,205 UART: Running Caliptra FMC ...
2,679,613 UART:
2,679,667 UART: [state] CFI Enabled
2,690,336 UART: [fht] FMC Alias Private Key: 7
2,798,065 UART: [art] Extend RT PCRs Done
2,798,493 UART: [art] Lock RT PCRs Done
2,799,583 UART: [art] Populate DV Done
2,808,050 UART: [fht] FMC Alias Private Key: 7
2,809,032 UART: [art] Derive CDI
2,809,312 UART: [art] Store in in slot 0x4
2,894,667 UART: [art] Derive Key Pair
2,895,027 UART: [art] Store priv key in slot 0x5
2,908,413 UART: [art] Derive Key Pair - Done
2,923,250 UART: [art] Signing Cert with AUTHO
2,923,730 UART: RITY.KEYID = 7
2,939,228 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,993 UART: [art] PUB.X = FCFADBDD0CFF319FBBE50BDFFD96E8E6523059F04EAD8391297D2D0C8882CF6B7AF87146C9A7FED74B3B776BB616ED64
2,946,782 UART: [art] PUB.Y = 777948B3B5740A554470F3E8B9CC119ACF2D53997E0C4A1B4766D0677B283302CAE0DE4059570EC034BA43B23004C79D
2,953,715 UART: [art] SIG.R = EFADD2F5CBE915AC53BEA12D0CB8A475269787D1ABDE2BCAA28D1366949FD76ADD11DEE77D0D03B29BE08234801885ED
2,960,500 UART: [art] SIG.S = 283C5282382A0DBF853E66E14BF51D36B6021A5D8EC66937630E5A286D487AD293CF3CFB2C90277715A5BE3D4E92B22D
2,983,940 UART: Caliptra RT
2,984,193 UART: [state] CFI Enabled
3,091,225 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,614,233 >>> mbox cmd response: success
2,675,541 UART:
2,675,557 UART: Running Caliptra FMC ...
2,675,965 UART:
2,676,019 UART: [state] CFI Enabled
2,686,736 UART: [fht] FMC Alias Private Key: 7
2,794,587 UART: [art] Extend RT PCRs Done
2,795,015 UART: [art] Lock RT PCRs Done
2,796,685 UART: [art] Populate DV Done
2,804,680 UART: [fht] FMC Alias Private Key: 7
2,805,766 UART: [art] Derive CDI
2,806,046 UART: [art] Store in in slot 0x4
2,891,549 UART: [art] Derive Key Pair
2,891,909 UART: [art] Store priv key in slot 0x5
2,905,171 UART: [art] Derive Key Pair - Done
2,919,967 UART: [art] Signing Cert with AUTHO
2,920,447 UART: RITY.KEYID = 7
2,935,647 UART: [art] Erasing AUTHORITY.KEYID = 7
2,936,412 UART: [art] PUB.X = 07322A5B4B12C65BF823CC24797EC2B83040F503455275399BE93962F2CD3FA569E2D8615DBB80F3F1C2397FE1B27E26
2,943,176 UART: [art] PUB.Y = 17A60656B716B1382815AECA8CB02CCC090CE288C81ADEF7B71F2750933295A4AB8A1235D1B22B860AA72BC1F8FF74C4
2,950,124 UART: [art] SIG.R = 5B23078FDC3CA082E2682DCC95C4624066C3D58BFB6112BECB4552A1F140D4A690508110012A7C46E75B2773AE1219A5
2,956,888 UART: [art] SIG.S = 5DFA6FBFE6F6DB834476360302DDB2308F8199CD2F480B026CD9ED61679DDB1091849FBE8CC0471C46681276E9FA16EE
2,980,289 UART: Caliptra RT
2,980,542 UART: [state] CFI Enabled
3,088,153 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.82s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,102 UART: [afmc] --
2,849,106 UART: [cold-reset] --
2,849,978 UART: [state] Locking Datavault
2,851,373 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,977 UART: [state] Locking ICCM
2,852,447 UART: [exit] Launching FMC @ 0x40000130
2,857,776 UART:
2,857,792 UART: Running Caliptra FMC ...
2,858,200 UART:
2,858,343 UART: [state] CFI Enabled
2,868,988 UART: [fht] FMC Alias Private Key: 7
2,976,555 UART: [art] Extend RT PCRs Done
2,976,983 UART: [art] Lock RT PCRs Done
2,978,423 UART: [art] Populate DV Done
2,986,544 UART: [fht] FMC Alias Private Key: 7
2,987,636 UART: [art] Derive CDI
2,987,916 UART: [art] Store in in slot 0x4
3,073,579 UART: [art] Derive Key Pair
3,073,939 UART: [art] Store priv key in slot 0x5
3,087,419 UART: [art] Derive Key Pair - Done
3,102,465 UART: [art] Signing Cert with AUTHO
3,102,945 UART: RITY.KEYID = 7
3,118,359 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,124 UART: [art] PUB.X = E596FFF700D9CCD135E02F4E8C0F6B872AEE0A2F2C1EFA9E1BA2606882D1AEE221B6FCFE161BFF0C53152DAA8EBA598D
3,125,893 UART: [art] PUB.Y = 0BC183FFE2A029A3E6CBDAE9BD36FAEF51EAA301940338A616B839BD7111B7A203DC2B2EEDFAE729A7DFB08AAE041125
3,132,854 UART: [art] SIG.R = 724049A7728E9B5E7EC81F504CB638E072D6C74566E3F613AFE35E3C888690D467A8CAF48ED5402A919E413F8C2DAD8C
3,139,630 UART: [art] SIG.S = BB647559DC714519294CC506F8AF2CBD2E9841C0E82FA8E5B2D6D3069EA2691E753FB0D8D182BDB7A08AE73E90EB2E8E
3,163,101 UART: Caliptra RT
3,163,446 UART: [state] CFI Enabled
3,270,064 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,201 UART: [kat] SHA2-256
891,751 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,880 UART: [kat] ++
896,032 UART: [kat] sha1
900,200 UART: [kat] SHA2-256
902,140 UART: [kat] SHA2-384
905,053 UART: [kat] SHA2-512-ACC
906,954 UART: [kat] ECC-384
916,757 UART: [kat] HMAC-384Kdf
921,257 UART: [kat] LMS
1,169,569 UART: [kat] --
1,170,266 UART: [cold-reset] ++
1,170,752 UART: [fht] FHT @ 0x50003400
1,173,378 UART: [idev] ++
1,173,546 UART: [idev] CDI.KEYID = 6
1,173,907 UART: [idev] SUBJECT.KEYID = 7
1,174,332 UART: [idev] UDS.KEYID = 0
1,182,262 UART: [idev] Erasing UDS.KEYID = 0
1,198,985 UART: [idev] Sha384 KeyId Algorithm
1,202,788 UART: [idev] --
1,203,975 UART: [ldev] ++
1,204,143 UART: [ldev] CDI.KEYID = 6
1,204,507 UART: [ldev] SUBJECT.KEYID = 5
1,204,934 UART: [ldev] AUTHORITY.KEYID = 7
1,205,397 UART: [ldev] FE.KEYID = 1
1,210,601 UART: [ldev] Erasing FE.KEYID = 1
1,236,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,669 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,391 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,361 UART: [ldev] --
1,275,789 UART: [fwproc] Wait for Commands...
1,276,406 UART: [fwproc] Recv command 0x46574c44
1,277,139 UART: [fwproc] Recv'd Img size: 114332 bytes
2,575,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,719 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,028 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,767,854 >>> mbox cmd response: success
2,768,929 UART: [afmc] ++
2,769,097 UART: [afmc] CDI.KEYID = 6
2,769,460 UART: [afmc] SUBJECT.KEYID = 7
2,769,886 UART: [afmc] AUTHORITY.KEYID = 5
2,805,843 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,453 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,204 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,933 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,816 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,535 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,408 UART: [afmc] --
2,849,498 UART: [cold-reset] --
2,850,282 UART: [state] Locking Datavault
2,851,587 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,191 UART: [state] Locking ICCM
2,852,675 UART: [exit] Launching FMC @ 0x40000130
2,858,004 UART:
2,858,020 UART: Running Caliptra FMC ...
2,858,428 UART:
2,858,571 UART: [state] CFI Enabled
2,869,116 UART: [fht] FMC Alias Private Key: 7
2,977,157 UART: [art] Extend RT PCRs Done
2,977,585 UART: [art] Lock RT PCRs Done
2,978,707 UART: [art] Populate DV Done
2,986,948 UART: [fht] FMC Alias Private Key: 7
2,988,000 UART: [art] Derive CDI
2,988,280 UART: [art] Store in in slot 0x4
3,073,695 UART: [art] Derive Key Pair
3,074,055 UART: [art] Store priv key in slot 0x5
3,087,745 UART: [art] Derive Key Pair - Done
3,102,609 UART: [art] Signing Cert with AUTHO
3,103,089 UART: RITY.KEYID = 7
3,117,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,530 UART: [art] PUB.X = B9DEB9A658DD9F3F6DD01E689DD00CB47FFDA56ED3E2ED7488CFA002F1A9664B00540375485561B93F5304FFAA2B5FE6
3,125,284 UART: [art] PUB.Y = F32A3874C88A452F7B084BACB5A0FB83170616FC457C1132997D1344250EBB021DAFF862027F6B8484CA05EB5F2EB497
3,132,220 UART: [art] SIG.R = 410A8A5A9E84B3736E535BAFC412EEBB922B4F2FEEAD64E7B74FF7CA0B434FD9B848AB63EAB6735F900B94CDAB995034
3,139,003 UART: [art] SIG.S = 79B6090C1502EBAD2A16D5BC71A1B74CEB67C22BBAF58288E7E7EABD3D17885A5A7AEEA9C3FBAB454146A116DAE59C8B
3,163,377 UART: Caliptra RT
3,163,722 UART: [state] CFI Enabled
3,270,211 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
891,549 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,678 UART: [kat] ++
895,830 UART: [kat] sha1
899,934 UART: [kat] SHA2-256
901,874 UART: [kat] SHA2-384
904,627 UART: [kat] SHA2-512-ACC
906,528 UART: [kat] ECC-384
916,725 UART: [kat] HMAC-384Kdf
921,333 UART: [kat] LMS
1,169,645 UART: [kat] --
1,170,572 UART: [cold-reset] ++
1,171,028 UART: [fht] FHT @ 0x50003400
1,173,712 UART: [idev] ++
1,173,880 UART: [idev] CDI.KEYID = 6
1,174,241 UART: [idev] SUBJECT.KEYID = 7
1,174,666 UART: [idev] UDS.KEYID = 0
1,182,666 UART: [idev] Erasing UDS.KEYID = 0
1,200,319 UART: [idev] Fuse KeyId
1,201,541 UART: [idev] --
1,202,502 UART: [ldev] ++
1,202,670 UART: [ldev] CDI.KEYID = 6
1,203,034 UART: [ldev] SUBJECT.KEYID = 5
1,203,461 UART: [ldev] AUTHORITY.KEYID = 7
1,203,924 UART: [ldev] FE.KEYID = 1
1,209,194 UART: [ldev] Erasing FE.KEYID = 1
1,235,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,508 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,266,190 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,273,335 UART: [ldev] --
1,274,663 UART: [fwproc] Wait for Commands...
1,275,292 UART: [fwproc] Recv command 0x46574c44
1,276,025 UART: [fwproc] Recv'd Img size: 114332 bytes
2,573,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,600,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,629,674 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,765,408 >>> mbox cmd response: success
2,766,647 UART: [afmc] ++
2,766,815 UART: [afmc] CDI.KEYID = 6
2,767,178 UART: [afmc] SUBJECT.KEYID = 7
2,767,604 UART: [afmc] AUTHORITY.KEYID = 5
2,803,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,819,427 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,820,178 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,825,907 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,831,790 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,837,509 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,845,398 UART: [afmc] --
2,846,434 UART: [cold-reset] --
2,847,082 UART: [state] Locking Datavault
2,848,207 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,811 UART: [state] Locking ICCM
2,849,271 UART: [exit] Launching FMC @ 0x40000130
2,854,600 UART:
2,854,616 UART: Running Caliptra FMC ...
2,855,024 UART:
2,855,167 UART: [state] CFI Enabled
2,865,690 UART: [fht] FMC Alias Private Key: 7
2,974,181 UART: [art] Extend RT PCRs Done
2,974,609 UART: [art] Lock RT PCRs Done
2,976,499 UART: [art] Populate DV Done
2,984,598 UART: [fht] FMC Alias Private Key: 7
2,985,758 UART: [art] Derive CDI
2,986,038 UART: [art] Store in in slot 0x4
3,071,453 UART: [art] Derive Key Pair
3,071,813 UART: [art] Store priv key in slot 0x5
3,085,161 UART: [art] Derive Key Pair - Done
3,099,911 UART: [art] Signing Cert with AUTHO
3,100,391 UART: RITY.KEYID = 7
3,115,917 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,682 UART: [art] PUB.X = E088CD99397A0343B4D3F2BE79C8470C0C5830AF4D40E422CAD044801BF5B9DE9433377B8D5D503C052B60E6BBD4F453
3,123,446 UART: [art] PUB.Y = 46EB419FD3F1C10ECF81E6C5282FD5D093401158022F09E8F74572571617706DDE87ECF055D45B83468CA00E64FA0AE6
3,130,383 UART: [art] SIG.R = BFC6340C5CDAD36D715D864D7EB54FFDBB028F96415E95A06FDE1A10C1020779101E66BBE13915644AE88C200E921814
3,137,144 UART: [art] SIG.S = FB981DBBC50BCDA00B7A80D7942818E6D37181FBBE955ED7B600FCBCE02EFAE01E5227805012E97FBF2F6947B815A9EA
3,161,139 UART: Caliptra RT
3,161,484 UART: [state] CFI Enabled
3,269,206 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,220 >>> mbox cmd response: success
2,686,798 UART:
2,686,814 UART: Running Caliptra FMC ...
2,687,222 UART:
2,687,365 UART: [state] CFI Enabled
2,697,994 UART: [fht] FMC Alias Private Key: 7
2,806,085 UART: [art] Extend RT PCRs Done
2,806,513 UART: [art] Lock RT PCRs Done
2,807,929 UART: [art] Populate DV Done
2,816,242 UART: [fht] FMC Alias Private Key: 7
2,817,178 UART: [art] Derive CDI
2,817,458 UART: [art] Store in in slot 0x4
2,903,177 UART: [art] Derive Key Pair
2,903,537 UART: [art] Store priv key in slot 0x5
2,916,855 UART: [art] Derive Key Pair - Done
2,931,798 UART: [art] Signing Cert with AUTHO
2,932,278 UART: RITY.KEYID = 7
2,947,396 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,161 UART: [art] PUB.X = BA5C93FD487D6A150ADA959A41B5D33577F982B15AC905D88664FC2F1CBB021A78BAFC95F2528A50F90B3DCFE270B208
2,954,930 UART: [art] PUB.Y = 8711E208C11915B50A18E717D2FE4DBEEF5044D63A8C946A9B3930351C1B0FB709061D4EFBAB35D2F707B4F9155C2A6A
2,961,870 UART: [art] SIG.R = 59BC2063BE2F930274366CCD4017782D98E599400F27A048987DD712C8BEF5C21B11B580377959FA579C771037A67DFB
2,968,628 UART: [art] SIG.S = E0803147C7C164AD9F310E202772797F4D006EFB15DD5EBC701FF27EB3D79F3234FC3E1BAC99D39BF098643F220D3702
2,991,564 UART: Caliptra RT
2,991,909 UART: [state] CFI Enabled
3,099,504 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,450 >>> mbox cmd response: success
2,683,146 UART:
2,683,162 UART: Running Caliptra FMC ...
2,683,570 UART:
2,683,713 UART: [state] CFI Enabled
2,694,228 UART: [fht] FMC Alias Private Key: 7
2,802,271 UART: [art] Extend RT PCRs Done
2,802,699 UART: [art] Lock RT PCRs Done
2,804,281 UART: [art] Populate DV Done
2,812,482 UART: [fht] FMC Alias Private Key: 7
2,813,422 UART: [art] Derive CDI
2,813,702 UART: [art] Store in in slot 0x4
2,899,131 UART: [art] Derive Key Pair
2,899,491 UART: [art] Store priv key in slot 0x5
2,912,971 UART: [art] Derive Key Pair - Done
2,927,816 UART: [art] Signing Cert with AUTHO
2,928,296 UART: RITY.KEYID = 7
2,943,938 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,703 UART: [art] PUB.X = CD2E64517ABB72725F908D8C1C5FFC3C5E1CE60FDFF089DB246E7BF49AFD2155A32E166BA6FD87F7B6554EF5EAEA089C
2,951,493 UART: [art] PUB.Y = 0DB562915B2A721509E9AD0CD03CD6182BF4C4170B282F38DAED794E813DEF65082848AE8E39A648C38B9E80562DF906
2,958,429 UART: [art] SIG.R = FBAC91AFB0CE8B4E2E08C1C57E353EDC55CD3B4D90F253E191424310A207CB3B333B714E43934138C5FD94858194ECDC
2,965,205 UART: [art] SIG.S = DF087ECB6A8A84A88C5D4F648631D237D1968073FBFD82831CC1D04D20A0B635C894C53C2A5AB96D28344F96E4E1A60C
2,989,024 UART: Caliptra RT
2,989,369 UART: [state] CFI Enabled
3,098,014 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,618,208 >>> mbox cmd response: success
2,680,548 UART:
2,680,564 UART: Running Caliptra FMC ...
2,680,972 UART:
2,681,115 UART: [state] CFI Enabled
2,691,678 UART: [fht] FMC Alias Private Key: 7
2,799,913 UART: [art] Extend RT PCRs Done
2,800,341 UART: [art] Lock RT PCRs Done
2,802,013 UART: [art] Populate DV Done
2,810,420 UART: [fht] FMC Alias Private Key: 7
2,811,526 UART: [art] Derive CDI
2,811,806 UART: [art] Store in in slot 0x4
2,897,675 UART: [art] Derive Key Pair
2,898,035 UART: [art] Store priv key in slot 0x5
2,910,719 UART: [art] Derive Key Pair - Done
2,925,580 UART: [art] Signing Cert with AUTHO
2,926,060 UART: RITY.KEYID = 7
2,941,194 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,959 UART: [art] PUB.X = C830D4C4ECB2CCD9F6E9E7A2455BB86CDF0002D25010031A20EAD51C2FF6F06DD41EDA61E242DEFB63E3F0E6AE9C4BEF
2,948,731 UART: [art] PUB.Y = 8643C48CDC4896C53220A5141410128DF32A85840A15DD3B95D4D6E025B7C4677417809A0E9809CC9B90768233E003C5
2,955,657 UART: [art] SIG.R = 8FC659DD2C1E363B338E30A4BBAA30EDF11C11F511F997B39264561C596FBDCBC65830FC14F6425900CE5DCD1CBD8DF4
2,962,423 UART: [art] SIG.S = 64F7230386E8CD52E2F2C6C6DB36BEE63831F6C5DEC9B8C75773CD6A1D8EF73C8D12D49264CA7344582D0822A449E6FF
2,986,198 UART: Caliptra RT
2,986,543 UART: [state] CFI Enabled
3,092,191 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,616,814 >>> mbox cmd response: success
2,679,016 UART:
2,679,032 UART: Running Caliptra FMC ...
2,679,440 UART:
2,679,583 UART: [state] CFI Enabled
2,689,976 UART: [fht] FMC Alias Private Key: 7
2,797,747 UART: [art] Extend RT PCRs Done
2,798,175 UART: [art] Lock RT PCRs Done
2,800,013 UART: [art] Populate DV Done
2,808,078 UART: [fht] FMC Alias Private Key: 7
2,809,012 UART: [art] Derive CDI
2,809,292 UART: [art] Store in in slot 0x4
2,894,419 UART: [art] Derive Key Pair
2,894,779 UART: [art] Store priv key in slot 0x5
2,907,625 UART: [art] Derive Key Pair - Done
2,922,291 UART: [art] Signing Cert with AUTHO
2,922,771 UART: RITY.KEYID = 7
2,937,627 UART: [art] Erasing AUTHORITY.KEYID = 7
2,938,392 UART: [art] PUB.X = 50219EEBDFB603E3BBFB677EE9B72E3DF2DFF647CBB8A2644E7A28DA33F29538C4B58DA8E14D1267043E3484540B3DF1
2,945,169 UART: [art] PUB.Y = 9D0149BF1CFEECECC2CE526405A7D440FED3D82C9AF7D6FA09849D537253E45F12B06F6E1A619702B06103D97097A2EA
2,952,116 UART: [art] SIG.R = 21437A93A87943691B1530E488D034FA792E6C8F86EED3134800D9BCDF6A4BB11E267163A68CAFF2421511EB02229C1E
2,958,861 UART: [art] SIG.S = 9694E3E28F9521A50741307AE48319D278D2673B1BBBF055BFD08CCAFCC0C2DCB2A1AE8E0684F58971C5E78C12E064C7
2,982,040 UART: Caliptra RT
2,982,385 UART: [state] CFI Enabled
3,090,666 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.68s
Truncated 7935 bytes from beginning
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
3,105,813 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:28 2025 GMT
Not After : Jun 27 10:25:28 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ad:b4:85:9e:5f:5e:03:ad:14:49:19:2a:e3:ce:
7e:95:f7:cd:99:f5:91:87:6e:92:59:5c:cd:3f:53:
19:7d:67:0e:c2:f0:ef:79:1d:8b:88:37:97:5c:21:
89:a8:7f:a9:4c:18:59:03:f6:b6:ca:ff:a8:98:fc:
f1:79:2e:ea:0b:1b:1f:39:51:56:73:6e:f0:68:3e:
41:a8:af:0a:f0:02:c0:11:51:fe:1d:00:99:62:7a:
29:d8:05:9f:cd:66:51:1e:18:f8:91:0b:19:d3:91:
d0:93:c9:0f:92:be:75:ae:fc:55:88:ed:32:4f:a5:
3c:03:17:be:2b:30:98:6e:7c:cf:44:6c:ac:53:87:
ae:f2:d3:3a:7b:7c:42:2a:64:76:9f:1e:26:e8:b8:
cf:90:1b:4c:81:bf:d9:ed:54:eb:2f:22:99:47:b0:
f2:2e:0b:f3:75:bc:ee:6c:50:4a:42:13:f0:d3:c2:
61:02:7c:ab:f1:46:af:30:ec:95:6a:cf:d1:40:51:
d0:a2:a6:51:a1:68:13:c4:0a:39:0d:6a:c3:9d:79:
8f:9d:8e:b9:7f:22:64:27:68:ed:e8:a0:cc:22:01:
ba:35:cf:06:2c:66:74:e3:92:5a:86:7b:86:3e:6f:
29:11:1c:e0:77:bc:72:86:ac:c5:cf:79:45:77:47:
78:b1
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a3:42:2d:22:d4:1e:c8:b6:5f:55:3f:59:43:df:da:e9:50:4e:
6e:9d:68:59:b3:42:75:d8:83:4b:22:b8:78:11:fb:a2:87:f7:
3d:da:7f:9c:ca:23:d7:61:e1:6c:80:b3:93:10:c4:08:80:73:
5e:66:0b:e0:da:74:e2:c6:3a:79:77:d3:3a:13:42:69:22:16:
a2:10:80:05:3d:dc:c1:17:d6:8a:e9:1e:91:ee:a0:d8:cc:3b:
de:86:a2:8c:db:fa:39:37:1b:14:42:55:2c:ec:ae:eb:79:73:
ec:28:99:2d:40:32:4f:d9:ee:40:12:a0:ff:c4:78:4f:56:84:
35:d5:8b:94:1e:52:0c:ac:26:fb:78:78:78:0b:05:d5:91:a3:
56:80:9f:ea:30:71:bf:cd:99:5e:cd:30:c8:1e:9d:e2:f8:b8:
83:0d:06:7d:0a:57:64:66:9d:71:c1:bd:8e:42:2d:98:9e:a4:
84:86:4b:49:06:e4:ed:a5:b9:aa:7d:c3:8b:80:5b:d7:72:16:
c8:63:fc:f0:e2:65:ef:01:a7:be:58:1d:b7:b2:e3:bc:8a:8d:
f5:36:da:e4:61:a7:db:78:df:8d:37:a7:29:2d:d3:df:5e:81:
02:70:63:2c:58:44:3f:c1:1c:71:3b:1e:7e:48:cd:e4:02:d6:
8a:79:c3:33
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:28 2025 GMT
Not After : May 29 10:25:28 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
9b:90:4f:5f:11:59:19:ef:2d:08:8c:b4:2c:07:64:97:d7:96:
e4:16:51:ad:95:24:d2:20:93:5c:df:21:08:d5:60:6e:49:70:
0b:e3:9a:c1:bd:3d:e4:76:2a:84:b1:76:0f:39:2b:e6:f3:22:
a0:7e:b2:7c:80:31:13:e8:0c:88:df:28:2f:11:38:27:40:28:
33:04:f0:e2:da:ba:90:8f:38:3d:1a:9f:b2:85:f3:7d:ef:5d:
65:9a:26:e4:0c:96:46:1e:24:d5:79:e0:d8:6c:43:02:8b:89:
95:db:04:b3:e6:2e:38:bf:07:da:3d:be:79:b7:28:81:fb:b6:
32:ab:d1:7b:10:79:0a:03:91:19:79:c3:8f:2b:a4:8d:6e:1c:
21:f0:21:ee:fd:8f:71:20:e0:25:eb:2d:07:15:0d:d8:cf:56:
8f:24:66:dc:83:c6:c0:60:75:ca:52:c9:12:80:a7:37:9e:e9:
c4:23:98:d7:65:87:c3:67:20:38:0e:ff:bc:fb:7a:7b:92:f3:
5d:70:60:00:7d:c4:67:15:42:fd:bc:bc:4e:bc:45:a7:73:cb:
67:7d:8d:a4:23:32:8f:ad:5b:cb:27:7f:32:3d:b1:92:b0:94:
d6:43:d6:81:24:17:27:8b:40:ce:2c:29:95:b9:5f:71:a4:02:
58:60:8a:3c
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
Truncated 3059 bytes from beginning
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
2,851,835 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:27 2025 GMT
Not After : Jun 27 10:25:27 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:99:d9:b4:25:7c:53:d9:c5:0a:9b:ec:02:e2:21:
72:3f:1b:ef:c1:c5:b8:9a:3b:98:d6:20:fe:3f:10:
69:32:a1:10:b7:c2:c5:9f:90:39:0e:0d:33:fc:e3:
2a:de:6f:5d:26:d6:0f:08:76:b5:31:d6:7f:42:49:
d9:02:d8:6a:f8:d2:2e:f6:c7:ce:c3:68:76:f9:36:
85:41:c2:cd:b4:d2:90:e2:96:8c:eb:89:76:ea:32:
9c:0b:61:9f:ea:7a:45:d5:26:9e:44:08:b7:90:e2:
8e:90:f8:50:9d:2f:48:68:e6:31:c6:9c:bf:9e:ce:
53:76:b6:00:75:e4:4d:12:5f:ba:72:dd:e7:cf:53:
3e:37:a6:d9:d5:01:1f:da:11:49:09:74:dd:01:3a:
57:07:9e:32:74:8b:b4:42:58:b7:63:82:41:86:cc:
c0:0a:d3:5f:b0:61:aa:99:7a:f4:0a:01:f0:86:ea:
80:70:cf:20:a9:e9:ef:38:45:8e:43:6c:55:93:67:
9b:92:58:5c:12:6b:ac:1c:b5:9f:67:32:31:14:bd:
6d:ac:96:1e:f6:3d:f6:4a:d1:e0:08:52:ef:1f:0c:
0b:ca:99:eb:66:e2:64:9a:83:be:62:25:c4:98:36:
90:73:ae:d5:66:2d:26:4d:b0:bb:21:ae:c8:af:8c:
57:2b
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0a:fc:89:0f:2b:b0:85:df:aa:23:73:f3:bc:4b:27:c8:cd:3f:
cd:4a:09:17:f7:65:00:c6:08:b8:c7:4e:c8:70:05:33:aa:13:
22:d5:e4:d0:6a:f9:e5:1b:34:27:ca:7b:c2:b1:50:1b:21:f5:
45:2e:8b:cf:09:9f:b2:f5:e4:e8:c2:35:49:25:21:ce:7e:fc:
71:ab:99:e4:ca:e5:c2:20:8e:fe:db:35:40:86:9f:ce:40:a8:
0e:ad:dc:03:6e:45:cb:af:80:71:ca:7a:db:1f:5c:8d:1c:47:
4d:e0:6b:3f:a6:75:ff:14:72:0d:11:63:88:3f:a2:9c:91:df:
4e:39:6b:d7:e3:77:4d:f4:70:db:88:03:9f:83:20:0d:c4:10:
b6:bc:d6:28:0c:15:f9:56:36:0a:20:a7:58:00:c8:09:4d:a9:
5a:01:dc:27:5b:49:c1:53:67:57:2d:53:69:98:6b:8f:a3:7d:
93:5a:f9:40:37:93:b2:be:30:58:19:bd:53:b9:05:e1:a1:e1:
41:c7:a0:ee:4a:46:90:23:21:ef:cd:e2:e9:32:0e:66:7f:ce:
be:51:47:dd:ac:19:4e:cc:a1:a0:43:81:4a:20:69:14:d7:c9:
a0:bf:12:94:0b:8d:d2:14:15:99:68:8b:6f:7d:83:b5:09:ec:
1c:76:cc:42
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:27 2025 GMT
Not After : May 29 10:25:27 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
93:7d:3d:65:ae:28:59:4a:2a:6d:a9:aa:74:02:25:4f:d5:28:
e0:6a:93:a9:18:d5:69:4c:28:5e:24:bd:7b:46:b8:35:cd:c6:
de:75:f9:b6:8a:ce:f5:88:39:a5:dc:ec:2a:74:30:99:a1:28:
92:1a:da:c8:02:44:5e:d6:f2:e9:d7:2b:41:19:96:ff:62:81:
c0:17:7f:bd:11:fb:cb:08:1b:7c:16:ba:82:8d:d8:6f:19:5b:
f4:53:27:71:9a:39:34:0d:ea:a8:c7:db:7e:06:67:63:d9:67:
53:69:b7:22:11:51:90:3c:9a:cc:3e:dc:6b:ce:c7:6d:2a:3a:
12:67:c5:cd:b6:f9:f0:9e:76:42:9b:54:4f:f9:b5:0b:75:79:
40:72:f6:95:b2:29:29:56:44:ed:f4:b9:50:53:5f:51:04:78:
8f:af:d1:10:80:d8:19:b4:6f:3e:86:d5:16:c7:e5:6a:8d:c6:
73:40:5a:eb:38:61:bf:6c:32:35:1e:d6:0e:e9:6b:72:13:fa:
72:79:20:c0:35:be:a1:a1:de:48:3c:94:f3:db:83:8d:bb:d3:
31:2e:c9:97:b2:3f:05:4a:d1:d8:2d:16:57:50:d7:e2:f5:43:
24:7d:f4:30:8b:90:99:17:09:b9:86:75:72:25:57:92:94:eb:
0a:3a:c5:bf
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.49s
Truncated 7935 bytes from beginning
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
3,106,130 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:18 2025 GMT
Not After : Jun 27 10:25:18 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d3:8b:51:6a:a7:0e:a5:5a:8a:76:2f:24:e1:d1:
2a:2f:4b:b5:f6:81:ef:c5:d2:2b:e9:de:f3:fa:c6:
db:f9:f7:f9:78:4e:99:32:9e:02:7b:7f:40:23:b3:
48:e7:7c:94:8b:ed:ec:e8:9a:77:34:70:29:e4:55:
97:5b:c6:51:87:03:04:9b:ea:17:20:63:3d:c5:77:
2b:7e:8a:98:c8:ce:4e:b4:2b:da:00:22:ff:55:05:
f9:d4:8a:9e:45:3e:fe:ca:8c:f4:da:17:17:5a:c2:
94:1f:d2:5a:9f:74:86:29:05:35:9d:a7:1d:2c:03:
33:13:ce:ca:43:4b:3c:04:1d:b6:41:62:97:6a:82:
96:87:97:ea:38:e9:ab:5e:81:44:62:75:9a:26:69:
ea:03:eb:32:2f:42:f0:65:fc:a7:b6:a3:8b:1b:1e:
dc:4e:7d:f3:e3:d1:d3:eb:72:3b:82:e4:5b:11:5c:
34:c3:55:48:a8:4e:33:d7:94:09:a8:bf:bb:de:be:
86:dd:f6:b7:95:9e:97:d0:8c:33:0d:0e:0a:1c:e3:
94:6f:96:0e:6c:81:a0:40:fe:97:52:aa:b0:7d:d9:
75:b8:cd:0a:51:63:e3:22:20:eb:16:6e:42:2b:9c:
83:20:50:09:d5:71:7c:6d:b0:ac:2c:17:03:07:23:
90:f9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
ab:ff:ae:11:79:2f:d7:c5:6d:88:ec:11:e6:4a:e2:0f:0d:01:
f8:a3:fe:33:e0:31:f0:3f:a6:bc:2c:ae:00:d1:f3:1f:6e:a6:
fe:1f:11:e5:bc:ca:2a:1b:8d:64:9b:cb:4d:f1:a3:cb:3c:62:
75:a2:ed:04:ce:1f:72:5f:89:04:ba:c1:bf:77:f3:7b:20:ca:
88:c5:1f:8d:13:6e:d4:3f:7c:ec:f6:62:15:64:5c:96:be:3f:
31:3b:10:ac:38:f1:31:25:79:8f:17:ef:e8:2a:b9:1d:61:fa:
3a:00:3e:41:91:95:21:de:38:11:b8:5f:99:88:c7:a9:c2:e3:
7d:cb:07:4c:01:95:09:de:81:5f:1b:0b:8b:2b:6e:cf:0f:2d:
4a:26:8f:5d:9e:89:91:23:0e:96:ee:5d:01:42:bf:3d:9c:24:
cb:cd:43:df:b0:2b:20:4b:00:fc:fb:08:98:a3:29:7c:f0:9e:
f0:19:53:c0:30:cb:b3:4d:e8:1e:d5:6f:05:e0:15:10:5b:77:
61:cc:e0:e9:2f:0e:c1:57:1b:76:c0:89:64:37:e3:68:c1:1e:
29:be:ed:13:bf:88:2a:ef:70:3f:9f:39:6a:fd:ca:1d:46:b3:
64:c1:1b:ce:ad:50:a7:b7:1e:3b:07:f5:e5:c2:bb:f3:93:ed:
c6:4d:ff:f6
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:18 2025 GMT
Not After : May 29 10:25:18 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
2c:c9:d5:3b:65:0b:06:2c:8a:b4:ba:48:7d:ed:63:41:79:68:
40:fd:c7:8f:a4:48:38:49:87:66:c1:06:c5:55:79:1f:7a:dd:
47:a7:bf:ed:aa:0b:57:23:23:44:8e:ea:51:43:e9:b0:d4:e0:
fc:75:c0:54:be:dd:52:3a:f0:5a:b2:de:a9:c9:9a:87:34:60:
0a:b6:dd:4e:06:cf:e1:2d:14:5b:bc:a2:02:71:2f:96:71:ff:
bd:f6:0c:53:ba:0c:c0:86:d4:63:11:df:1e:52:ba:4e:0d:0e:
03:6a:c1:74:fa:4b:26:b4:e6:b3:29:a0:50:85:32:08:da:64:
1f:4c:17:17:89:73:d2:83:be:1e:11:12:01:83:b6:bb:f2:77:
97:7b:68:0d:52:de:89:4f:7d:24:42:6a:af:2a:62:34:2c:a0:
39:eb:d5:6c:40:be:4a:20:25:d9:86:da:2a:65:68:27:17:61:
3b:98:8c:a5:8f:32:9b:b9:6f:2a:4d:6f:76:69:3b:ae:20:c5:
15:15:91:88:0e:56:98:6e:76:7f:1b:58:39:b3:9b:8f:36:7f:
45:1d:fc:ef:33:23:ed:59:fc:f2:ea:01:35:81:48:13:11:00:
28:ba:7e:77:d1:57:fc:f9:17:f6:e5:5e:85:3a:ee:26:e9:ce:
de:82:e4:20
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
Truncated 3059 bytes from beginning
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
2,856,214 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:32 2025 GMT
Not After : Jun 27 10:25:32 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:da:c6:fd:6a:15:12:d9:b2:48:e4:ec:35:56:be:
9b:64:09:24:8c:3f:82:c2:db:f4:ae:96:a0:96:28:
24:19:3e:fe:c9:3e:ba:2e:8f:56:a5:af:04:5d:cc:
31:0f:2d:d1:4d:5d:9f:38:3d:2f:ce:23:75:e6:d7:
8a:27:fe:dd:31:59:b4:f7:b9:48:09:6d:49:9c:6c:
6a:bf:69:a2:c4:5c:75:89:65:98:28:3a:16:69:47:
3d:1b:f8:7c:7f:e7:75:62:63:f6:3e:8f:83:78:27:
86:e6:81:87:99:7e:e8:22:b4:02:0e:ec:21:b6:cf:
fd:0b:ff:7a:7f:0b:71:61:f4:40:2c:0f:95:53:8a:
1e:ad:6b:1a:a0:bc:ce:c3:e4:ca:90:5a:2a:80:45:
84:2e:62:0c:9c:f9:46:aa:e8:40:97:5c:a7:55:fb:
a6:d4:cf:50:56:7c:14:45:ed:9e:cd:c7:63:4b:ea:
aa:b6:12:bc:8e:1a:10:16:5d:24:83:1b:0b:11:92:
fd:6c:85:ce:32:ba:b7:57:ce:b2:f9:4c:67:74:26:
85:e9:b9:78:00:b8:e0:c1:19:72:b0:58:78:62:92:
a8:f7:91:01:8c:10:ef:80:a1:15:00:4e:35:8a:4c:
e7:d5:45:cc:35:b6:b9:bb:ac:f1:91:75:99:00:1c:
cf:6b
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
56:d5:0f:64:e7:3c:10:6e:c4:b2:4f:18:9e:47:18:c9:8f:09:
a2:c0:52:4b:00:20:73:86:78:1b:09:26:b4:40:a1:fb:d0:64:
95:4e:0a:e0:7c:56:e7:d5:53:3b:93:87:84:3e:70:47:08:c1:
88:1b:cf:43:79:ee:e6:1d:18:b5:9a:96:df:72:47:c3:33:c3:
b3:2b:bf:4c:ae:09:de:f4:81:0e:76:db:7f:ed:3a:cc:48:36:
cd:c7:e3:75:61:b7:e9:a2:6c:34:a3:b1:73:14:ac:21:06:23:
c4:13:ef:1c:c4:90:e1:9d:d1:f7:85:a5:a2:f5:1d:ec:95:5c:
19:3f:e9:18:27:29:6f:d5:3d:2a:91:2e:50:3b:1e:95:06:d8:
02:85:f8:7e:a6:6d:87:31:b8:15:50:9d:17:f0:a1:99:bb:4f:
c8:6f:9e:4c:3f:65:08:4d:47:d5:44:bc:34:4e:39:ed:d5:88:
8f:79:db:ed:01:75:ae:eb:4a:05:68:a4:0c:f0:cb:9c:20:e9:
b3:57:72:9a:27:4a:81:ca:9c:c1:ec:aa:d1:ad:40:0c:90:09:
d1:d7:ea:18:70:04:ef:39:a6:75:d9:56:57:77:34:8d:0b:40:
14:e5:00:98:2d:75:02:d2:81:bb:2e:75:0b:77:d8:01:0e:01:
35:a0:76:cf
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:32 2025 GMT
Not After : May 29 10:25:32 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
bf:b7:6b:2b:1c:98:cb:53:bc:a0:ba:48:b1:91:c9:ba:e7:9a:
bc:8d:91:dc:d7:48:86:b9:a8:18:5c:29:2d:a0:6e:65:c7:f7:
b8:6e:a7:7b:6f:fc:4f:76:de:7a:a2:35:0b:04:f9:74:e5:6d:
09:63:ea:22:1c:32:7c:0f:b3:ec:e2:d1:d1:b7:d1:ee:60:ec:
7a:91:d0:53:09:a7:59:80:11:c7:37:a6:44:2d:fb:55:8b:21:
1c:09:1e:92:0e:2f:51:c3:7a:17:70:68:2d:8c:12:87:1f:44:
56:65:d3:b9:c6:99:a3:72:52:9c:4c:68:9b:de:11:cb:b5:dc:
51:c6:b7:a5:04:1e:07:f5:09:9a:5e:3f:e8:b9:9f:df:e8:0d:
c2:7a:0c:44:08:17:34:b5:04:f0:cf:58:30:4e:d7:99:3d:53:
98:c8:68:ec:d0:16:2c:e2:60:67:c9:8e:13:7f:58:69:ab:ef:
fb:6c:27:f0:1f:8f:67:15:82:ee:2a:e8:66:c4:29:95:fd:9f:
48:9b:60:87:09:9c:86:61:d9:44:45:d0:30:7b:00:95:17:6d:
7c:e0:fe:2f:45:5f:b7:3d:fc:c3:db:ac:3f:e1:a0:1f:2b:03:
31:e1:b7:14:b5:b2:93:d0:30:f1:ab:31:ad:66:2e:a4:6f:cb:
32:9b:b6:ef
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
Truncated 7935 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
3,101,669 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:24 2025 GMT
Not After : Jun 27 10:25:24 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9d:f8:e8:38:82:17:1f:3f:9e:6f:8f:b3:b4:de:
ad:42:37:92:18:25:c9:7f:18:1d:df:4d:86:3d:33:
eb:46:25:89:36:81:ea:ea:01:11:4c:cc:3f:ee:a7:
a5:c5:dc:50:71:f6:65:81:fc:6e:ad:fe:bc:ee:4a:
6a:26:17:e5:e6:7d:b5:ca:37:26:9b:9d:79:80:46:
0f:76:d0:0b:52:f4:9c:42:df:28:64:0a:fc:fe:f5:
3b:56:49:1c:38:89:8a:a1:bb:5c:da:c3:86:11:6c:
26:36:5a:d9:a4:83:de:5c:9c:70:72:bd:ab:7e:3d:
b9:57:e3:e0:62:55:c2:5e:cd:f7:c6:35:04:4a:9a:
94:6a:39:f7:49:5b:f7:c2:56:da:cf:d6:3f:eb:2f:
14:13:b7:2b:37:32:a3:a1:72:13:56:8f:e9:09:49:
2e:0e:72:97:af:7c:9f:e8:c3:62:ca:44:08:87:80:
df:a0:a2:b8:08:ce:b9:4d:d1:90:95:a2:40:dd:db:
55:1d:3a:da:b2:28:a8:6c:f6:72:71:7d:d5:20:3c:
14:14:0b:53:ab:42:63:1e:26:d9:db:e8:64:c6:ef:
39:ba:6c:80:c3:9b:bd:0a:fb:27:5c:4a:9d:03:87:
7f:ea:33:1e:7f:45:8c:f1:06:cf:37:31:e3:05:e0:
92:bf
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
68:7d:dd:72:42:73:e1:13:8e:14:7e:b6:4b:c6:0f:a0:94:e9:
88:c3:70:53:26:b8:d3:92:6d:7a:f1:a7:17:42:e5:39:fc:55:
4d:f5:07:6d:a3:ba:11:53:be:63:dc:c8:7f:13:c5:6d:60:27:
59:b0:da:d3:f0:12:94:1d:fb:4a:36:25:70:32:14:1f:76:b9:
d8:26:0e:c8:f0:a6:b1:d2:90:29:78:21:19:20:3a:ed:e7:05:
41:1a:ab:b0:cd:6f:03:45:db:8a:a2:1b:51:e7:57:69:16:30:
25:99:6d:13:a2:d3:88:02:79:bd:23:85:5e:e5:ce:65:f7:81:
f3:85:e9:fb:84:13:ce:29:16:57:3f:be:61:96:49:a2:9c:57:
c3:50:9c:47:60:08:c4:53:48:70:63:b2:3e:a2:10:a7:d8:e7:
19:4a:55:28:ae:cb:94:73:19:60:58:cc:5b:06:1f:37:72:ef:
31:13:0f:fd:58:67:fb:0d:3e:33:95:04:98:5a:64:d9:bd:75:
9c:46:b5:d0:c8:13:ec:95:70:55:7f:e0:3b:6c:01:17:f7:c1:
d1:c5:ec:ba:af:e3:cc:40:05:aa:01:dc:fa:6e:d6:2c:54:a5:
f8:9b:d7:d6:dc:db:49:1c:aa:bc:15:1a:59:de:f9:a9:e7:38:
1d:41:65:64
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:24 2025 GMT
Not After : May 29 10:25:24 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
80:5e:af:71:ed:d0:8b:1b:59:0d:30:33:ab:29:15:3f:44:b3:
eb:7e:dc:cf:92:9c:03:b0:3d:f9:33:70:30:3d:79:e3:66:63:
6d:66:ed:4a:0f:ac:bf:0c:34:35:45:66:aa:bc:96:b7:00:0e:
78:73:fd:e9:40:ff:86:c8:a9:95:b8:28:f0:4c:6b:1c:ef:b6:
d7:76:30:91:f3:84:ef:17:93:d6:62:8d:2d:d8:f7:3b:eb:49:
57:f4:97:ca:71:41:c4:dd:98:52:e0:18:b9:f8:f4:05:6c:b7:
99:d3:65:db:b9:79:5a:6c:65:21:e0:14:f7:46:75:5f:57:a2:
7e:1f:e5:99:3a:9a:48:03:f9:97:ae:c8:cd:8f:87:ae:15:81:
ba:59:b6:c3:2b:6a:84:66:e2:12:72:9d:a0:07:7c:56:9f:15:
bb:20:8e:87:9a:1c:f1:76:bb:69:45:db:33:16:bb:9a:f6:1f:
47:a6:57:00:d6:13:d0:9e:d5:14:ee:d6:fb:65:98:a4:1d:6f:
3b:e2:ad:3e:1e:d6:93:36:1f:ab:ca:b5:4d:e1:03:bb:f8:33:
39:b8:f2:5d:3c:f5:6f:fd:60:5f:46:43:92:f0:f5:f0:e5:7e:
82:cb:4f:40:9b:d0:5a:18:4f:5e:fe:d2:22:a6:b8:8c:37:2b:
e6:76:28:c8
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
Truncated 3059 bytes from beginning
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
2,854,467 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:18 2025 GMT
Not After : Jun 27 10:25:18 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c8:af:39:12:f8:32:ea:90:d1:35:4f:7d:4d:e3:
8d:33:55:93:10:92:32:7d:72:c5:6e:5d:11:86:f6:
bd:db:38:4b:be:67:54:a8:51:d5:38:61:0c:3c:ea:
b5:79:3b:22:a9:e1:b0:95:1e:0e:0f:6f:de:52:55:
84:ca:4a:69:5b:5a:1b:e2:49:46:40:23:67:f0:34:
bf:6d:fe:ca:69:94:a2:22:f3:13:67:bc:4b:cc:df:
09:3f:f3:50:c6:42:27:ca:3f:3b:76:64:88:0e:01:
c8:c6:fc:2b:d5:dd:d1:88:ce:f0:9f:09:13:ed:db:
78:f8:9a:82:7f:21:f8:a4:07:b4:bc:e1:88:b0:b6:
c9:67:cb:94:d7:21:7d:5e:3e:60:7e:57:04:7b:60:
b5:b3:ad:f1:5f:c2:92:3f:28:31:ee:09:df:f9:a4:
c7:55:5f:1c:29:fe:1a:3d:ca:fb:c7:5a:cf:0c:61:
63:5b:34:23:da:a5:c8:28:34:4a:b1:6e:f2:4d:cc:
1a:da:60:de:04:29:f4:64:57:71:2f:24:91:45:d4:
fc:34:c7:43:e9:ac:c1:4e:89:f9:b0:0b:7b:00:c4:
29:69:c9:c7:90:1f:e8:8d:31:6e:cc:63:2f:28:0a:
fc:76:e1:1d:8a:85:85:31:42:93:97:ee:d8:02:5e:
95:41
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
13:e7:2b:bf:1a:f4:c2:dd:c4:44:17:87:46:36:e5:21:59:a8:
ed:9f:ef:5c:5e:07:db:2d:43:9a:b7:39:fe:14:43:da:57:7a:
2d:08:b1:3d:20:0a:d8:5b:45:fe:0c:a0:5a:23:53:d1:10:e3:
77:1f:a4:81:ff:bb:f6:53:71:86:cc:ab:cd:e5:3a:b1:6b:8f:
7e:96:0a:e2:70:49:21:1a:30:47:6b:16:72:6e:3c:b6:18:1a:
ae:2b:c2:c4:22:cb:08:15:e4:23:46:46:f3:1e:5c:14:fc:f8:
00:37:99:3a:af:7a:46:d9:dd:94:1f:18:52:ff:67:22:72:70:
32:cb:ff:1f:76:a8:6c:61:22:1e:75:4f:33:51:d7:32:c5:c4:
d2:2d:ab:b0:3e:17:89:7f:51:91:cb:fa:42:4f:52:5b:fa:63:
e1:1b:cb:38:14:82:8a:c5:91:f5:54:e0:2a:c9:80:5b:71:67:
1f:62:0b:cd:95:a1:c7:ad:b1:9f:9d:d7:5c:ed:91:58:61:31:
ea:31:ac:58:ed:65:8e:ad:19:ea:cc:42:27:0b:b6:7e:86:84:
3b:76:02:ef:ed:60:52:34:4e:07:e5:83:41:b7:87:9d:43:53:
c7:1b:a6:ac:29:94:b1:19:32:f5:e7:ee:08:8e:ed:d6:a5:14:
e1:23:d5:35
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:18 2025 GMT
Not After : May 29 10:25:18 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
01:25:31:34:bc:5b:3d:32:29:c8:52:99:3e:b1:51:97:e4:5e:
e0:0f:60:ef:96:35:b9:88:21:6f:46:67:b3:0b:90:a7:f3:60:
60:2a:d1:09:f0:3b:d0:75:63:a2:11:f4:15:ea:dc:b8:0c:f9:
39:c2:dd:9d:6d:23:b4:3c:fd:13:8a:b5:90:af:71:70:17:ff:
03:2d:97:77:05:ae:8b:ec:5a:1e:60:42:83:4a:97:a9:76:48:
db:f5:5f:f4:53:e8:c8:aa:e1:8b:cb:af:01:74:01:bd:9a:6d:
5b:87:7b:22:32:32:09:59:d9:8d:dc:46:55:25:e8:82:cd:1d:
f2:15:f8:e1:eb:58:b8:52:c2:3f:07:27:b1:b6:81:f7:71:5a:
45:06:3b:bc:89:e7:6d:65:29:ed:ee:a7:44:32:df:d3:9e:3c:
84:4d:59:32:fc:30:18:ce:da:41:b1:e4:18:5b:b2:11:94:4b:
73:5e:15:c0:0f:8c:45:bd:d0:f8:24:f7:fa:50:a3:a0:7d:15:
6f:8f:2d:58:63:c7:a2:d2:f8:21:cb:fd:83:c7:61:7f:d9:12:
2c:1c:d0:20:6e:69:08:1c:ca:32:4e:74:1b:4c:b0:12:aa:de:
a0:24:ee:e9:b7:28:12:4f:9d:2e:cb:15:19:0c:9f:47:3e:39:
ec:89:94:09
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
Truncated 7935 bytes from beginning
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
3,104,350 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:41 2025 GMT
Not After : Jun 27 10:25:41 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:f2:89:90:b7:66:aa:c5:e5:7a:61:9d:71:d5:1e:
29:60:52:e9:9b:84:11:6c:ca:0f:5d:0d:c1:c0:d0:
91:46:93:9c:9b:36:a8:de:ed:0e:5a:49:3a:c9:b0:
f2:c0:46:8b:8e:cf:76:a3:90:18:b2:6b:76:d7:7f:
32:d5:4f:1d:54:a5:03:30:38:28:74:f3:f7:aa:70:
7d:cd:dc:7d:73:a8:0f:ae:1a:45:6a:1d:68:d3:f1:
35:ab:99:04:3b:b3:cd:67:51:aa:7e:1f:d4:5f:55:
df:ea:12:87:b3:c6:99:4c:07:bd:c3:14:c3:0b:90:
37:5f:8b:8c:c1:6d:be:93:66:dc:3c:c7:da:c9:ee:
3e:4a:e0:fb:53:1e:6f:4d:dd:e1:3a:d5:e2:81:10:
d2:46:c1:9e:dc:d2:75:da:f4:3d:b3:13:87:93:44:
c3:d0:c8:e5:37:78:27:32:10:0d:1a:bf:87:e6:ca:
cf:f9:4b:1a:72:38:dd:de:a6:23:81:24:7d:5a:00:
7f:3d:1d:b9:b0:ad:a3:01:f2:85:b1:1a:23:60:ce:
0f:c3:58:2b:66:e1:6d:0e:8c:b3:64:a4:9f:e2:4e:
ee:43:13:d7:b4:dc:34:68:81:68:e1:a2:09:c1:c7:
fd:5c:d8:79:c6:67:d6:82:30:75:f3:79:6a:50:ee:
e7:a7
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b6:59:69:54:13:fa:c8:3f:e5:72:93:63:86:f4:48:5d:de:dc:
fc:d1:96:5d:8f:1d:fc:3e:d8:55:85:5b:fb:ce:b7:26:4d:be:
8a:98:03:2f:28:9f:97:62:fa:95:d9:21:5d:e4:10:b3:6f:91:
2b:79:54:34:1d:1a:8b:88:dd:1d:e3:70:0c:b6:a9:18:7c:b2:
5f:34:f6:7a:9a:b3:96:17:66:4a:b3:de:ed:79:e9:a9:6a:6f:
41:3d:76:1b:ed:1d:23:8e:68:4b:48:7b:88:bc:13:0b:6a:da:
ee:68:48:c3:5a:67:d8:6c:f9:5a:7d:b5:ae:44:5d:aa:b5:19:
e5:cd:a1:71:9f:55:c3:0c:74:28:52:bc:24:32:dd:c8:4e:54:
d9:38:ec:98:e5:32:d3:e2:5f:3d:70:2d:75:9f:99:12:48:ab:
e3:e1:da:cf:a7:ca:49:65:63:63:46:a8:25:ea:6f:dd:da:a7:
eb:ba:ad:92:c4:a0:ee:e7:f0:81:d6:39:ff:93:fa:b3:0d:49:
0a:84:6a:ba:d5:be:c9:29:fa:cf:7b:af:1a:f3:bb:1f:67:63:
cc:35:4f:62:5c:76:80:64:d6:27:4c:a5:6a:de:19:4a:97:fb:
4a:79:cb:55:8b:b0:01:c8:d3:c6:9b:a4:da:91:24:ed:20:a1:
21:d6:e5:db
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:41 2025 GMT
Not After : May 29 10:25:41 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
36:4f:b9:ba:b9:d5:40:ae:e0:c3:1d:f6:53:2d:24:5b:b8:a4:
5b:0f:c7:6f:ef:df:52:69:41:36:87:4d:f8:bf:0c:d8:ef:3d:
0a:be:51:9b:7f:f9:11:b4:2e:dc:8a:e8:e7:92:f0:77:36:f8:
94:e9:11:f8:90:de:81:f8:55:aa:0e:3e:94:ce:74:23:d8:ba:
74:8d:82:ba:dd:e4:96:86:33:4a:18:ef:5a:d2:f9:d4:18:c5:
40:0b:9b:dc:41:02:5d:c1:81:77:72:19:64:a9:ae:72:83:4a:
16:e4:4a:d8:be:16:7f:a6:46:e5:28:9c:15:ff:c0:12:32:5c:
40:1e:81:bd:c4:07:66:28:cb:ad:18:48:c1:7e:61:ce:78:c6:
ee:63:19:3b:12:02:a3:5f:ef:78:0c:2e:29:22:7d:1c:69:c9:
32:8a:c3:c5:c0:21:25:67:a2:6e:07:58:c7:78:22:19:fd:b3:
6d:c0:47:7d:94:b3:aa:c5:44:d3:8f:25:f7:49:e1:a8:46:e9:
73:74:0c:f4:15:50:69:6d:e1:93:d8:8d:04:94:2f:96:ea:a1:
9b:f4:cb:a4:d1:a5:eb:ce:94:6b:f4:f7:d6:b0:31:ab:41:00:
c5:2d:2b:1b:ab:a7:71:9f:b8:a6:86:4d:92:23:e7:b6:95:c8:
74:61:e7:0a
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
Truncated 3059 bytes from beginning
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
2,852,920 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:16 2025 GMT
Not After : Jun 27 10:25:16 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ac:6b:f0:4e:ca:6d:cc:65:59:93:fd:3d:aa:36:
5c:94:bd:42:94:5c:d6:30:d6:3b:3d:d3:b2:f8:12:
10:9f:fc:85:da:4b:dd:54:b9:b2:16:eb:07:5e:23:
2a:1d:96:47:63:4a:b5:a2:6f:22:57:96:aa:2f:6b:
45:7b:04:6f:27:96:c1:72:ad:c4:f1:9f:0c:b0:67:
99:12:4d:86:6f:72:71:6f:de:6f:a7:e2:8f:7b:06:
77:6c:b1:b3:17:40:0d:9b:1a:88:47:d0:6c:ab:9a:
a9:c3:8e:bc:1e:d8:7e:32:b2:be:3f:94:19:df:5d:
18:59:28:78:ae:de:1c:b7:f2:15:eb:ea:b9:8c:6c:
91:37:90:19:28:a7:8a:6b:68:8b:b3:ab:83:40:e8:
c5:27:44:c9:66:54:3c:fe:41:08:dd:e9:93:d2:e8:
fc:18:57:8b:d5:4f:f9:70:e7:22:ee:45:87:9a:d5:
bc:8e:53:85:31:e5:ac:28:3d:ad:3f:4f:9d:aa:2f:
df:23:62:5e:e5:28:ae:31:f0:95:b5:0f:ca:d5:b0:
c9:a9:b2:be:7b:e1:45:9e:a9:00:14:35:7d:9c:20:
46:c1:67:97:54:e2:49:c6:b9:e9:f5:af:f3:4c:bf:
70:8a:56:5e:f1:2a:30:c6:a7:fe:92:4f:16:49:68:
b7:a7
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
63:52:ad:84:f4:aa:00:48:dc:39:41:2e:f6:9a:ab:17:b0:47:
45:da:01:4f:ad:09:5a:1c:bc:8f:38:6f:c2:92:f4:c4:b2:90:
84:0e:15:03:f2:03:d2:a2:0a:94:a4:49:cc:5f:38:52:65:d5:
65:10:4d:e0:17:6f:d0:15:2b:fa:b7:17:bf:37:5a:26:d4:16:
df:df:7b:dc:06:63:86:29:a1:97:c7:cc:00:9d:d7:fe:87:95:
89:aa:f4:56:52:8e:0b:15:19:eb:3f:f1:64:7f:4f:41:d6:78:
39:1f:1f:1a:46:3e:95:1e:3c:a0:d4:de:ec:e2:58:a1:bf:bb:
bf:6f:19:bd:4f:a5:3d:4c:e1:03:e3:52:c9:e9:b9:27:22:ff:
bd:a6:35:c2:c8:b3:32:22:a0:2d:2d:30:8a:2c:09:3b:90:d6:
9b:ff:08:cb:09:fd:3f:40:41:39:f4:6c:b4:fe:3b:a8:a3:c9:
0d:96:fb:e8:a3:a2:d0:85:5f:18:81:d4:eb:24:82:db:de:f8:
09:39:46:24:40:78:6e:dc:f1:ca:2e:0e:4a:56:09:5c:50:7b:
39:20:fb:ea:64:3d:52:72:7c:f5:12:f2:b7:76:d2:6e:4d:e6:
78:7a:bd:35:55:e7:33:1a:6b:1d:b7:44:75:71:33:c9:81:81:
9a:75:f4:7e
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:16 2025 GMT
Not After : May 29 10:25:16 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
38:8d:92:c3:5c:0f:32:e5:ff:4c:28:35:b7:b9:7e:76:76:1d:
47:7e:28:ed:97:4d:2d:68:ac:cb:55:a9:59:fd:aa:30:91:80:
22:e8:45:fe:eb:91:bb:57:b8:4f:19:2f:16:a1:85:97:68:45:
ec:20:ed:bb:52:2c:90:93:4d:f8:10:d9:60:d5:f1:05:44:b9:
5b:ac:f0:a9:a3:b1:e8:28:63:4d:e9:44:fb:3a:58:ec:8a:6c:
2b:be:f4:95:4a:12:5d:b0:cf:c1:f6:67:f7:b2:c7:a7:27:68:
b4:de:22:7b:5e:c2:48:99:50:12:26:69:f1:a7:64:52:68:5f:
24:b4:8a:d9:56:32:fd:0b:90:30:de:a1:b2:0c:db:b1:ea:54:
4d:4f:d4:75:0c:27:51:58:ce:84:e3:9f:a9:c2:02:05:4a:d2:
8f:a1:35:23:ff:57:2c:77:0a:b3:a5:3d:26:4f:49:98:e3:61:
87:6a:4c:e6:04:1d:3f:79:e6:08:85:7c:34:ba:84:0f:51:59:
4f:c9:cc:fb:3a:a3:6f:48:a2:1a:87:1f:44:76:69:bb:eb:01:
c5:19:d3:fb:9e:f0:e7:33:d7:ef:29:43:d7:82:97:9b:4c:0c:
32:70:df:c2:61:cb:25:d9:b5:c2:56:c4:d4:75:25:04:5f:e0:
1c:8e:ca:10
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
Truncated 7935 bytes from beginning
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
3,105,241 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:34 2025 GMT
Not After : Jun 27 10:25:34 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d7:58:85:25:6c:1d:77:d8:37:ee:77:51:35:46:
2a:83:19:f6:5d:0a:43:cc:30:45:8c:99:eb:83:08:
e3:ca:82:4a:a9:12:4a:16:ae:80:f3:cd:d3:ea:90:
6e:11:12:8e:dc:34:b8:2a:71:b8:14:53:bf:b5:29:
8d:41:a5:bf:f0:87:66:5b:19:9e:90:c7:4f:a6:be:
3e:a1:33:5a:f8:5a:aa:a0:69:76:c9:19:35:14:65:
b1:01:2d:09:73:27:a6:08:60:c6:bf:7b:e0:f7:7f:
ec:98:ec:b2:dd:95:99:30:81:02:5a:dd:dd:07:5a:
73:64:83:67:28:a7:cd:a4:cc:4a:00:92:fb:6d:bd:
b1:c6:91:d8:31:42:a1:35:f5:ff:0e:0a:56:6a:6e:
3c:c7:ad:ff:c1:5d:66:22:7c:01:48:88:1f:2a:46:
92:39:97:a1:c7:81:90:6a:93:65:15:87:e0:25:a0:
e5:82:63:d4:ed:b5:fc:f2:c0:10:7f:0e:87:57:49:
8e:9a:ca:d3:0a:31:f6:6d:bf:4f:45:c6:63:c0:c6:
4a:8d:8f:ff:c3:27:5f:7b:0a:c9:83:5a:90:d3:28:
c8:10:78:a2:d4:a0:7e:8d:9f:ff:8c:e3:93:50:d5:
0f:46:e3:05:38:c7:fb:3f:22:05:7c:9e:e6:3f:0b:
6b:91
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4e:e3:f5:82:0b:c8:b7:86:e2:bf:73:32:cd:ac:7f:51:3c:84:
9f:de:77:94:22:4b:c9:7e:eb:8c:9d:ef:95:3a:b6:58:7d:e3:
b2:61:83:2f:3b:47:6a:c8:e2:2a:ab:5c:67:0b:99:d1:4a:16:
e7:ef:72:49:4c:2e:c6:ca:46:d9:36:39:18:57:e5:6f:77:83:
17:ce:99:7a:af:17:71:17:94:c3:05:5a:f1:6b:6c:9e:f3:13:
18:5e:25:18:ec:e0:76:97:a6:c1:f2:11:1f:66:a3:7c:bf:49:
a0:a6:c5:70:5d:3a:d0:75:36:87:e1:07:ab:7e:0c:39:d2:b4:
08:20:16:7c:ac:52:63:f1:fb:91:8d:91:00:ee:f3:0c:fa:5a:
cc:dd:3b:c3:6a:12:42:72:47:12:18:b7:e0:2d:8f:8e:85:4c:
d7:9e:5d:3c:1e:0d:48:00:8f:2e:08:87:6e:70:7c:43:c5:3a:
c2:35:16:34:0d:ed:82:b2:20:d1:9e:b7:54:7d:41:15:61:26:
52:69:87:65:0b:19:67:9a:9a:49:80:e9:87:d5:77:cc:dd:47:
cc:b0:d5:5c:e9:0e:9c:e3:9a:ae:f3:3b:20:2f:09:e9:f3:78:
8f:b2:be:e9:8e:d0:65:d5:69:0a:6f:36:ee:8f:35:61:2f:97:
23:cc:24:f9
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:34 2025 GMT
Not After : May 29 10:25:34 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
bc:ed:7e:7e:6a:9c:2e:2c:d1:da:66:80:3b:2c:9f:05:60:be:
13:bc:cd:ab:77:04:d6:9c:15:0e:17:90:8b:fe:ee:9b:e9:fd:
c0:0e:11:ff:ec:b8:32:cf:01:c9:37:cc:61:b8:b5:b2:d3:bf:
8a:2a:a0:51:f0:86:22:47:93:6b:f5:22:ac:ab:37:d8:b1:5e:
f2:02:d2:fd:ff:7e:01:34:d5:ae:8f:ca:25:be:f3:b0:92:aa:
81:2f:75:99:21:6a:b2:87:7f:8c:02:9c:2b:a7:56:69:c3:a2:
b1:33:5e:40:d5:5e:e9:16:a1:dc:0f:3e:2d:c2:a1:70:d5:94:
e3:e5:10:e3:0f:67:28:3a:80:d3:99:2b:f3:19:a1:b7:73:c9:
d1:a7:67:62:ce:04:51:5b:4c:f2:ac:f5:6a:ae:26:82:48:0e:
25:e7:fe:ce:6f:00:ec:6c:bc:08:0a:c8:ff:60:91:11:b6:a6:
5d:c8:72:38:d4:04:5f:95:5d:5e:a7:31:ea:ed:1c:17:d4:40:
11:e1:71:2e:8c:ab:57:67:8d:2b:4d:02:4e:01:c9:ba:2e:7f:
1b:22:ad:b8:f6:24:23:06:51:7d:d7:98:f4:4a:11:07:c3:7c:
f5:8b:ca:0b:dc:f0:b0:68:07:32:59:81:32:8d:db:19:85:fc:
9b:bd:d4:fc
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
Truncated 3059 bytes from beginning
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
2,855,171 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:23 2025 GMT
Not After : Jun 27 10:25:23 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a7:fa:f4:f9:1c:47:54:f4:4a:b8:8e:92:b8:d7:
fe:0f:27:96:0c:6a:88:cd:00:31:43:a7:ed:39:31:
f2:2d:17:6a:5d:88:01:71:d5:6b:5f:3e:83:e8:1c:
ee:a0:40:03:7a:c3:bd:06:7d:9d:20:a3:2a:4a:02:
6d:b6:a0:03:32:88:3a:a9:42:e3:b5:14:1c:62:0b:
9d:3e:4a:27:00:d0:25:a3:c8:12:1c:31:7b:e0:dd:
91:cf:46:53:f6:05:56:1d:1d:df:a8:41:a4:30:f9:
fb:63:62:53:f3:7d:7e:d9:b8:0b:13:9b:c1:b9:97:
58:0b:7c:19:14:34:70:f1:14:27:a0:49:09:af:9d:
98:25:ce:dd:9b:bf:c4:05:9a:27:14:17:32:a0:20:
91:bf:3c:75:3d:92:1f:43:47:0c:8c:03:24:3b:62:
7b:48:86:dd:47:9f:f9:23:15:72:25:26:7e:86:bb:
bf:3f:3e:68:15:cb:ab:a2:f0:0c:83:e5:64:a7:cd:
a9:2c:a9:12:4e:60:51:ac:dc:96:d1:72:ed:c4:d4:
5d:e0:a6:51:c9:7f:4f:51:52:fe:dc:f4:a8:c0:be:
83:fa:ca:0b:6e:88:03:1b:ac:6f:9c:89:cd:6f:55:
a6:04:72:3a:ad:71:7a:1f:1a:4b:ae:b2:ff:58:c3:
b0:ef
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
00:c5:07:00:b8:b2:f2:67:1b:30:74:cf:2f:13:45:91:0a:e9:
0b:c1:cf:2a:dd:ec:82:78:4b:3e:f6:7a:2b:c6:57:f1:09:e0:
63:b8:47:88:c0:86:34:af:02:49:b6:de:e0:f9:db:e0:7b:69:
5a:de:b4:23:76:8d:31:0f:7f:9a:20:29:a2:0a:24:7e:46:97:
a8:42:6d:2e:80:14:11:3a:7d:5d:78:4f:64:8c:f6:2d:6e:41:
24:a1:19:dd:fb:fb:88:de:db:ae:85:03:c3:d9:0c:35:83:31:
b5:13:56:c0:67:0b:60:4f:fd:e9:11:cc:67:1b:11:30:d7:1b:
bd:22:a0:cc:e8:83:48:bb:55:3c:ff:8b:4c:b3:e7:67:26:91:
c4:2f:bc:9e:53:ff:a0:c5:a7:6b:09:db:58:fa:db:a6:66:c0:
71:fd:6e:8d:89:94:e5:cc:af:34:ab:c5:47:27:07:52:a8:3b:
58:1a:14:87:19:15:fa:41:4d:e3:e2:be:a9:9a:99:f0:90:e5:
34:98:7d:b5:31:ee:49:d3:7d:b3:74:f4:0b:4f:62:37:7a:89:
53:fa:47:8b:ea:b0:48:64:f9:19:1d:76:01:4c:6b:8d:de:ed:
c7:0f:fb:1e:e9:d4:fc:9b:9a:b2:0c:6d:af:7a:75:87:7b:c3:
46:07:c7:09
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:23 2025 GMT
Not After : May 29 10:25:23 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5e:b6:cb:55:b2:bb:2d:c0:ee:ea:fa:39:b5:af:fa:43:24:a8:
46:60:fd:01:18:ce:4d:95:4a:44:81:bc:43:c7:09:6f:2d:a9:
5d:1e:84:13:ef:80:7d:3b:6f:c9:71:cd:51:03:22:d0:46:3c:
6c:8f:d6:db:f2:5b:35:da:49:71:d2:e7:94:56:95:ee:22:1f:
85:fa:34:bf:48:1d:98:bf:8c:d0:d5:51:0e:36:dc:2c:c7:61:
93:2c:f6:07:dc:cd:1c:d0:57:e7:df:c3:a7:03:0d:44:f7:9b:
19:d6:7d:09:4d:d7:9e:fb:52:99:25:e6:0c:0c:83:65:10:a6:
ce:d8:19:f7:2b:5e:ec:0d:c8:1d:38:b1:d6:10:6f:0c:8d:a3:
2a:45:4f:55:c7:39:97:13:2e:bc:ee:68:5f:58:a2:6b:f0:97:
dd:4e:42:87:4c:61:90:1e:ba:09:38:78:19:e1:85:49:23:4b:
d6:f5:48:2c:d9:3a:91:10:03:2d:f2:49:ca:1f:5e:29:31:68:
86:f0:1f:4f:e4:dc:51:75:3a:07:74:37:db:bd:b5:b9:56:a7:
af:6c:8e:71:53:48:4f:f5:61:d2:93:c3:42:de:e4:d4:1d:2e:
48:64:28:82:44:6f:87:6e:47:9a:d7:ef:cd:68:cf:5d:2c:09:
0a:6e:9c:f8
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
Truncated 7935 bytes from beginning
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
3,106,682 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:18 2025 GMT
Not After : Jun 27 10:25:18 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:90:23:4d:af:50:2d:78:33:6b:4d:60:9d:e1:23:
57:8a:a8:ae:da:21:a0:04:bb:d3:99:39:14:cf:9f:
ab:e1:b6:db:7c:1f:b3:dd:91:f2:29:78:3c:2a:cd:
1a:1b:19:93:a0:ad:97:1e:b6:fb:1e:e9:2c:5d:b7:
5c:dd:31:1b:9f:fc:ce:2f:f1:c9:a7:7c:3d:54:c5:
7d:66:f0:d7:c6:d7:f1:b1:21:ff:f8:a8:90:c0:9b:
02:7d:82:60:85:43:45:75:d6:51:85:0d:7f:ea:7a:
e6:55:35:9b:e7:87:68:90:69:ce:3c:ba:84:c3:48:
0c:1d:cc:45:df:f9:c4:60:09:da:29:ae:e6:15:69:
0d:12:e2:a6:4b:1a:e2:1e:da:97:d9:08:2a:b5:1c:
ce:03:68:4d:cd:d2:35:24:d1:04:5c:b1:47:2a:b0:
52:73:b7:2d:7c:ff:64:e8:20:6c:aa:f5:4b:5f:1b:
80:49:92:86:6f:ec:37:cd:e3:b9:f3:3d:be:71:05:
b5:e9:e4:0d:9f:75:fc:a7:52:41:71:ad:52:51:f5:
44:90:74:4a:e4:a2:cb:ca:95:3b:09:df:66:fe:92:
81:93:62:a0:31:c6:f9:7c:2d:1e:98:a0:7e:66:29:
30:d7:2d:60:e5:df:68:7a:2a:bd:d3:f7:4c:f7:10:
e6:fd
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
50:88:b1:dc:a9:37:b3:06:18:10:f4:ad:1a:7c:53:c8:5f:cd:
a9:58:f1:ba:e1:00:ad:ab:03:bf:d5:32:5a:6a:9b:f0:76:8f:
8e:ea:49:c8:fa:4e:f5:ac:af:01:0f:5a:5f:06:b6:4f:d5:f2:
92:fb:73:3a:e2:5a:9d:87:15:ac:3e:81:e7:32:c6:4c:c2:61:
f1:6e:ae:c9:e3:ce:82:46:73:d7:7f:1b:9e:ae:5d:3a:1b:d9:
37:35:cb:9b:f8:d9:b8:6b:1d:b9:6a:c5:59:d2:75:47:e3:8f:
87:35:e0:46:6a:76:45:7b:f5:d3:b2:bd:60:44:33:2a:c9:ff:
59:9b:fd:f3:f3:b1:84:a0:e2:ad:74:9a:41:37:9a:c2:74:36:
5e:40:50:96:fc:ef:52:04:60:61:9a:b9:58:fc:c2:15:0a:0d:
9d:95:3e:e9:bb:c1:56:cc:aa:56:4a:c6:a4:fa:cf:6c:50:9c:
5e:8a:d6:e7:28:5e:b4:a4:c0:c8:b8:b0:b9:cf:6a:69:89:76:
b4:88:08:28:3f:12:0f:7e:68:4e:1c:41:b8:b3:d0:fd:ff:39:
66:c6:06:db:b1:9a:cf:bc:dd:4f:d4:36:da:c9:f1:5b:43:9a:
b9:6d:95:d4:7e:94:30:ce:8c:93:3f:c2:39:dc:ce:c2:06:f3:
f6:38:15:47
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:19 2025 GMT
Not After : May 29 10:25:19 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
44:0c:bf:f4:fe:d3:93:1d:14:5e:01:75:24:80:3f:11:66:a0:
67:6f:37:f4:8d:ff:e1:da:6e:7e:4e:6a:37:a0:54:1b:69:ef:
89:21:bc:e6:42:3f:bb:71:15:43:39:05:19:e3:3a:80:8c:e3:
98:7b:4c:10:46:e1:58:a6:a1:ae:7f:56:b9:c9:35:6b:c1:72:
8c:a1:54:95:0e:c5:aa:80:54:c7:06:5f:fe:30:5e:0f:90:f2:
3b:76:ba:48:0e:58:1f:e5:9b:51:a0:c8:1f:8f:9a:08:e7:67:
34:71:42:a8:75:dd:2b:2e:c5:63:6d:1a:4a:ef:70:41:08:e5:
be:92:97:74:3a:b6:ee:86:6a:1c:43:71:69:61:d0:b1:83:dc:
a8:3b:72:1d:c0:b2:e2:b9:26:ee:e6:f7:94:7c:c1:e0:73:6d:
98:fc:e1:29:db:81:19:8e:31:53:81:d3:49:8e:82:62:f6:b9:
74:a6:e1:b5:b3:50:14:0e:4c:88:73:e5:17:59:db:b0:e1:27:
10:3a:df:8f:be:ed:05:3c:c1:da:e8:97:74:af:a7:ad:33:38:
b9:7c:9a:03:a5:f0:16:00:2b:be:40:3d:51:61:58:94:fb:74:
c6:51:31:60:20:35:8b:b4:fb:88:c8:f5:e9:c3:67:8f:86:02:
1c:a4:20:f1
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
Truncated 3059 bytes from beginning
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
2,854,150 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:20 2025 GMT
Not After : Jun 27 10:25:20 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b9:d9:e6:35:72:87:82:c2:bb:74:88:b2:85:aa:
e3:ff:2b:8d:87:f3:4b:42:56:f7:cf:f9:e4:7d:1b:
de:e9:3f:63:b4:9a:3b:18:71:08:f8:11:f2:02:77:
f1:36:c6:dd:53:4b:05:1c:cc:34:0c:5c:18:83:7f:
b9:b4:c0:49:4a:56:6d:31:2c:2b:d1:d7:64:a6:04:
57:a6:87:07:cc:5c:1c:a4:8b:76:31:de:fc:e2:07:
f3:3d:53:92:0b:9e:6e:0d:9a:a9:1b:13:15:a8:6c:
f4:f7:f3:43:d3:f0:9a:9b:b2:33:1c:26:80:a8:14:
5c:c4:a9:23:4d:86:f1:ab:85:fa:4f:cd:90:1b:b3:
be:88:aa:6f:89:26:2b:e8:a7:5f:4c:09:d8:98:8b:
d3:b8:0e:03:4c:b7:be:25:0c:2d:a8:b7:98:74:47:
59:64:73:ff:7a:d8:e3:43:e6:b3:64:a9:ef:7c:a8:
b6:0a:d8:0d:ef:89:1a:f5:be:67:40:f2:8a:01:ec:
dc:6e:d4:ea:66:ea:9b:aa:e7:03:dd:70:33:95:35:
41:58:f4:f4:d1:9a:69:a3:dc:71:9e:58:52:1d:32:
43:6a:ae:b7:18:a8:ed:76:fd:b1:e2:74:fb:2c:ec:
36:ae:54:28:d5:67:2d:32:80:5b:db:e5:aa:20:85:
a3:05
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3f:c1:02:67:5f:05:bf:5d:c2:c4:60:03:ff:29:10:1f:30:48:
66:ae:91:1a:c9:91:8e:58:22:1d:6c:93:d2:1c:23:5f:e2:d8:
dc:45:c9:49:bf:6c:60:72:3a:6b:69:bd:f2:ac:56:b0:14:0a:
30:58:7e:61:94:5b:86:e9:32:1f:8e:e8:72:0c:4b:1a:fc:39:
ef:ee:1d:c0:67:0d:9b:3a:92:ab:11:dc:c5:74:3c:50:4c:c9:
c7:6a:04:81:df:3c:67:80:6e:f3:25:7e:7c:a7:7c:e0:58:b8:
00:14:49:0b:30:b7:70:fb:ea:c7:b4:cf:4e:66:87:b2:f9:d7:
a9:03:aa:f3:a2:55:56:10:fe:45:17:82:8c:50:a3:c5:73:30:
21:9a:38:f5:7e:48:71:61:3f:07:5d:43:cc:57:b2:d1:1e:c4:
51:58:f2:74:e0:25:0c:97:e9:2c:3c:0a:10:bb:05:9a:cc:74:
5f:9b:06:77:f0:d3:5e:25:b8:45:0f:45:5d:ac:12:0a:e9:98:
ae:24:8e:97:9a:d2:e9:2e:d3:4e:2a:fc:bc:38:4a:12:93:f5:
94:a1:67:7f:40:a4:e2:a1:74:74:ed:48:e6:45:48:2b:09:7a:
88:64:db:e7:de:f6:58:b6:16:5e:44:94:27:3b:8c:66:d5:cb:
16:ba:ad:14
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:20 2025 GMT
Not After : May 29 10:25:20 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
68:df:b5:8e:56:2a:e6:66:f1:1c:1c:67:de:4d:70:95:19:d9:
33:dd:40:ba:cd:c1:52:f0:2b:40:32:d0:ca:90:37:2a:79:4b:
ab:6c:f5:2a:25:41:5f:cd:ac:75:66:41:92:47:5e:6c:67:b9:
46:63:76:2c:4b:1a:6b:de:d8:fe:b0:c7:8c:ac:eb:d4:93:0b:
b2:bd:88:7f:87:f3:d6:b2:57:99:bb:fa:ff:a4:a3:8d:8e:f6:
0d:43:da:0c:8a:65:98:db:74:94:8e:71:bb:e6:be:d3:b1:3f:
64:91:4e:1e:14:c5:9a:db:62:7e:4f:73:aa:f7:51:2e:e3:42:
17:b4:b9:1c:3c:31:c6:dd:77:53:82:57:90:b2:f3:3f:1f:99:
d2:c3:5b:96:6a:46:b5:47:38:7f:61:e7:89:4f:5b:b4:bf:99:
1b:2e:d7:19:ea:ca:98:21:48:8f:53:68:dd:07:c9:4a:58:f9:
de:e4:4d:ff:a6:09:25:6e:bf:4b:e4:8b:c5:08:51:12:91:79:
2a:59:6a:e3:1e:5c:7e:ce:72:db:49:bc:ef:95:7d:f8:d6:e9:
f8:ad:34:80:ec:4f:f5:99:c6:df:a0:3c:91:7e:33:44:24:e4:
9f:41:b6:ba:3e:fe:cc:a9:70:cd:5b:99:96:9c:97:f9:d8:da:
6e:84:59:2a
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
Truncated 7958 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
3,105,105 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:30 2025 GMT
Not After : Jun 27 10:25:30 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:aa:fe:4d:92:10:a2:20:0a:c9:1d:be:61:b7:05:
e4:a2:47:12:2e:99:b0:e9:da:b5:4b:18:04:37:40:
16:55:6c:64:97:d6:f6:4e:a0:99:8b:2a:1b:dd:0c:
ec:2d:bc:3a:31:1d:a6:89:8e:54:9e:b4:b2:6d:6f:
0e:b3:17:39:09:50:de:f0:bc:4f:c4:a9:91:9e:b2:
8e:e5:04:c8:38:1e:cf:4b:be:56:6d:37:5d:10:de:
e4:f6:8d:01:7f:01:7c:67:cb:a5:df:6a:ae:b2:6e:
24:bc:9a:be:b6:2c:36:bc:c0:a7:8e:26:50:af:32:
14:52:31:77:5d:0b:98:94:2d:e1:6f:e7:49:80:0b:
fb:42:62:92:25:c3:22:dd:4b:16:36:6f:10:8a:e5:
f9:b0:07:77:09:ea:32:7d:78:9f:f9:d0:69:98:5c:
3a:de:b2:a2:ed:70:76:05:f6:34:5a:c2:d6:e9:99:
82:4d:07:f5:b3:9a:9a:ae:b2:37:72:5c:68:45:bc:
3e:d6:a1:a9:e6:13:8b:96:be:f4:8b:3f:54:61:74:
b3:15:ba:ad:ce:d3:1d:1f:5e:ad:0e:3d:ad:6e:3e:
f6:18:60:fa:fb:1b:cc:61:29:97:4e:fa:47:c4:19:
e2:50:ba:eb:7f:2c:b7:e6:df:6f:f8:de:ff:a5:b7:
79:89
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
03:8b:00:6f:26:f6:b0:a2:10:0a:fa:0a:b7:11:5c:25:8d:d8:
39:99:74:fd:a7:16:4c:1b:ab:94:e1:01:aa:95:35:e3:44:f2:
1b:fd:f8:6a:7e:06:75:cb:33:a7:1d:50:da:fe:dd:10:c3:57:
17:63:a1:0a:8c:5e:52:9a:98:9f:2c:2a:e5:11:19:c4:92:33:
7d:8f:42:78:a8:e0:e1:ac:77:47:39:73:4f:87:ed:1f:14:11:
93:24:46:43:11:f8:2c:74:84:3a:d3:0f:ae:76:cb:2f:f4:b8:
db:b2:a6:eb:ea:e9:cc:df:52:3a:0e:cb:82:9d:57:ff:16:c5:
06:3f:ff:ab:a7:c3:5d:7f:e8:75:75:e9:f1:ac:3a:d8:ef:28:
cb:e9:b1:86:1c:95:08:44:5f:8b:4b:4e:4c:99:d5:ef:82:be:
18:80:5f:2f:81:ce:fe:02:bd:97:5b:bb:39:26:fb:a2:55:60:
c3:57:33:ed:a0:38:08:3d:4a:63:09:16:fa:2d:43:70:69:0e:
ff:00:5d:ad:53:cf:bd:9c:57:8c:ef:91:c2:2e:73:c4:b3:77:
15:15:d3:34:13:d6:31:1c:57:62:d0:f9:2b:91:0d:ac:1b:1e:
8c:0b:7a:57:71:33:86:0f:e8:c4:ea:35:12:ec:a9:ea:ab:32:
94:0f:ad:e6
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:30 2025 GMT
Not After : May 29 10:25:30 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
64:22:36:a7:cd:b1:32:47:53:5f:c3:e8:92:6e:af:87:f4:10:
13:bb:ee:d4:12:10:c1:54:bc:3b:e0:80:29:62:bf:69:af:a5:
3c:3c:a0:fc:80:42:6b:7e:37:5b:24:61:28:54:9d:8e:2c:5d:
8d:41:ad:b8:8b:e2:69:d9:cd:13:75:61:f3:de:a9:84:e9:8b:
d9:1a:0c:48:85:bd:be:de:a3:dd:08:6f:ac:6f:44:64:43:3d:
fd:2d:67:60:85:e0:cb:f2:61:20:b6:68:9b:f6:6a:0e:5c:ff:
c7:f4:1f:f1:42:3c:2d:c5:f4:40:8c:cd:e3:41:bc:5c:a5:c4:
ea:3a:b0:91:a7:b2:eb:b0:70:93:55:10:a2:97:0f:72:4b:7b:
51:df:0a:dc:cc:22:4d:d3:4b:5f:f1:67:3a:f9:bc:0d:f7:75:
56:89:16:8b:af:29:05:ae:ae:9f:15:0b:9b:60:ad:71:a6:9f:
6e:5a:1a:66:45:4e:71:6d:06:a4:f9:ec:70:ef:b6:5a:d5:e9:
05:09:7c:48:02:4a:32:ee:4e:ee:6a:97:e4:68:08:0e:5d:20:
22:ae:f5:66:1c:b5:b1:cc:fe:3c:54:6c:f6:c7:49:16:42:f1:
8b:21:8b:d5:ae:a5:37:34:5e:28:11:df:ad:a7:97:36:1f:a0:
84:1d:66:1e
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
Truncated 3082 bytes from beginning
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
2,854,054 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:28 2025 GMT
Not After : Jun 27 10:25:28 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:94:22:89:dc:ad:44:65:dd:f7:8b:59:b1:46:62:
35:96:03:f2:95:e6:d6:f7:20:1a:64:2b:f6:bb:68:
48:45:00:d2:d5:70:73:db:e4:fe:fa:a3:3d:e2:40:
34:7c:37:86:80:1e:b3:68:ac:b0:2a:66:31:a5:87:
2a:f9:28:5a:2d:5a:47:9d:3e:a4:04:67:39:db:f8:
b6:9e:65:4e:21:f8:45:dd:ca:4b:7a:89:34:9a:4b:
cf:05:68:e5:4e:b9:ac:76:dc:4d:b5:83:36:70:31:
a5:20:c2:54:05:6b:18:b8:0d:5c:e1:99:23:94:30:
de:71:28:bc:52:03:c5:82:b3:98:5f:90:63:47:bb:
0a:b9:61:76:c8:ba:dc:f1:20:d0:e6:f2:88:cb:9a:
8d:0f:49:c5:44:3f:1d:84:d5:9a:25:15:6e:d5:b4:
89:4b:ce:ab:35:11:b6:21:f5:d6:cd:29:10:b6:b1:
c5:c1:43:0f:e7:a3:0a:65:44:70:af:0d:72:f9:40:
e8:37:a1:0c:52:88:3f:76:17:a3:c0:7c:3d:bd:c2:
f6:db:13:82:86:e1:a0:09:1d:b8:ad:c7:7c:71:78:
ac:44:2b:45:49:00:0b:cd:e9:79:ab:6b:23:7d:cf:
ea:0f:cc:dc:9d:1e:f1:b2:41:57:d0:c4:2f:75:41:
33:57
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
13:bd:dd:18:c6:cf:19:8f:8d:da:0a:ed:16:8b:22:c2:df:d1:
6d:98:b9:34:f9:ef:f2:48:97:4b:05:61:46:e1:40:86:ed:ed:
4a:31:62:7a:e8:02:6e:4c:aa:13:65:12:b9:ea:4e:e0:c4:73:
dc:9b:46:d0:57:f6:15:7c:ee:59:8c:4b:1a:75:58:95:d7:8f:
a2:f3:cc:1c:2c:59:36:8e:9b:57:59:b4:9e:a1:24:d9:ff:49:
65:70:cf:71:54:2b:c6:ba:2d:c8:f7:f4:7c:bb:c4:da:09:68:
65:7c:5a:74:32:f9:fd:a2:c4:85:75:63:31:20:db:89:e0:7b:
0b:a8:18:fb:df:26:39:e2:a5:1a:02:92:8b:53:4a:b8:3c:bb:
12:f8:b3:03:f4:71:95:55:aa:6a:b3:b5:f2:eb:c2:1f:b6:02:
67:ff:94:af:62:ac:a6:2e:5b:b1:fa:af:4f:fc:23:17:c0:7d:
16:9b:81:b7:94:05:59:93:62:bb:4b:99:07:37:49:fc:6a:45:
35:6d:1c:17:04:76:30:0e:a1:34:e0:98:fa:75:a3:da:f0:1c:
25:13:18:4b:d9:5c:0f:79:34:17:26:91:81:62:ee:a7:5d:22:
05:2c:46:90:01:9d:30:fa:3f:be:ea:48:88:16:88:ef:fc:d3:
85:a2:f7:82
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:28 2025 GMT
Not After : May 29 10:25:28 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
29:7d:bd:81:94:24:8b:cf:5e:84:2c:98:0f:2c:a5:88:c1:c9:
93:6a:76:0d:73:bf:88:78:b5:b5:3d:9e:5b:97:4d:05:4b:8e:
43:55:88:ff:20:36:51:0a:1b:50:29:c7:a8:68:b8:d9:45:d1:
25:0c:e4:24:2c:18:e6:b6:86:e7:9f:a3:05:a7:7c:11:fc:bf:
a1:83:ab:e8:0d:df:9d:b0:ab:be:1a:ed:4c:d8:cd:2a:3f:0d:
12:86:a3:be:db:39:60:ef:31:8f:b8:17:7d:dc:0e:86:2d:81:
4d:ca:37:fc:0c:11:7c:d0:89:32:04:30:88:13:8e:0c:cb:c1:
8e:b5:ae:bb:64:10:85:09:f2:1f:71:3f:8e:ee:ec:5c:ba:75:
03:fc:57:72:cb:d1:a1:82:88:a5:34:2f:12:0d:ba:3c:89:b2:
34:b4:52:12:71:68:f1:93:1a:80:11:9a:ae:a5:4e:8b:51:90:
56:43:be:11:23:a5:65:73:67:43:ed:80:6d:39:f6:cf:18:3e:
8f:f7:8d:bb:22:fe:0c:45:82:e7:00:31:67:66:33:e2:3b:57:
36:15:69:90:e4:82:ff:6e:4e:1e:aa:43:c6:21:69:77:fc:c8:
44:e0:c6:d8:25:3b:10:82:2d:e9:09:77:c4:aa:20:4f:8f:e3:
8a:7a:26:14
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
Truncated 7958 bytes from beginning
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
3,105,996 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:19 2025 GMT
Not After : Jun 27 10:25:19 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ca:30:b1:14:6b:dd:91:ee:3b:37:15:ea:ff:43:
63:3c:f7:4b:59:0e:5f:e6:85:cf:1a:c3:da:15:d3:
97:1e:0e:f2:20:3e:05:87:61:6f:de:f4:c6:ce:41:
90:07:7d:25:56:2e:1a:8d:30:82:17:da:a2:f8:f5:
1b:8e:64:d9:ab:64:bd:3c:84:2c:59:35:40:43:01:
75:f3:48:79:c1:5b:01:08:7b:e7:6c:5a:92:c1:6e:
8b:91:0d:37:8c:a3:aa:91:2a:b9:71:b9:db:e9:c5:
9e:3a:6f:b2:1f:cd:35:85:29:fc:32:9b:bb:7d:95:
93:68:cf:b5:b1:d5:59:ed:3f:08:77:cd:65:23:01:
0a:c6:9c:46:24:c5:02:68:b2:1b:45:a5:23:dd:b3:
85:29:a7:e9:6d:34:ea:1d:d3:6f:2a:c4:1c:72:ff:
fa:4a:e3:0f:ea:0a:dd:c8:83:97:19:66:38:06:59:
2d:bf:f1:66:05:f6:99:e6:43:8e:0a:26:7f:4e:72:
02:de:d8:bc:c3:92:27:b8:0e:fa:24:17:9a:6c:6d:
1c:04:57:d8:7d:74:80:aa:54:c2:10:d3:a4:1e:a9:
55:8d:36:91:df:90:ba:2a:b0:b1:13:07:2b:6d:8f:
c9:92:f0:af:52:92:fd:87:a9:94:26:ed:ae:86:b7:
50:85
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
22:cb:9f:26:15:68:35:12:ea:a7:2a:fe:3b:04:02:e0:17:7c:
f8:e3:76:8d:69:1f:b9:16:f4:23:61:c6:0c:b7:4f:37:b1:76:
c7:ac:4d:3e:b5:49:5d:a4:d8:9c:e8:16:c0:53:18:32:f7:db:
ec:38:c9:9a:bb:68:98:b9:27:ef:3d:f3:56:14:a7:52:e9:c5:
25:c4:81:89:f2:e9:b4:df:1d:76:3e:3f:fe:9b:85:ff:2e:19:
05:33:57:c8:42:f2:1f:cc:19:c9:b5:a7:ec:6d:a3:76:41:08:
8c:e8:b8:2e:e2:a5:7c:70:f1:1a:1e:6e:36:e7:4e:4a:a8:7b:
8e:81:59:d4:db:61:ab:b2:4d:d4:ba:c2:31:00:53:fb:91:6d:
f6:81:42:79:12:b2:7e:61:2c:37:cb:11:f8:d3:0c:6e:7c:d0:
12:1b:24:5c:f7:70:d2:cc:12:15:58:0e:94:9a:b8:de:fe:5e:
73:af:72:d9:ec:27:3e:4a:83:b5:62:64:fb:74:ad:45:25:3a:
be:8e:67:44:15:6f:d6:fd:bc:0a:3e:b9:b0:bb:12:40:cb:2c:
87:a6:8a:0a:0f:d0:9b:0a:22:f6:63:a7:ee:17:f7:12:96:eb:
8d:ad:67:0b:d2:87:63:64:63:5b:82:2d:31:a6:e9:61:19:f4:
2f:c5:b9:c7
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:19 2025 GMT
Not After : May 29 10:25:19 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
23:01:9c:7b:b6:4f:31:3b:d0:9e:35:e2:a0:e2:1f:bf:2d:f2:
66:10:c0:ae:d6:2a:da:64:47:35:db:0f:1a:3e:de:54:63:08:
ba:58:ae:5e:e9:c3:fb:2c:b1:9f:19:d7:d5:97:d6:c0:ad:46:
d0:a4:f0:59:4d:57:35:bf:89:91:ac:f5:12:0a:9c:9e:43:e1:
1b:d8:29:82:3f:5c:a1:86:a2:95:15:da:a6:58:10:f9:47:1d:
57:55:81:84:d7:c0:78:18:5f:8f:d5:4a:9c:db:ab:1e:f2:43:
4d:e4:06:74:55:27:27:56:f0:d6:88:88:cf:12:02:65:63:d6:
5a:6b:4e:52:1e:50:1c:a8:45:35:2b:3c:7a:eb:57:8a:01:55:
7f:d4:08:c4:5a:61:69:92:e9:79:67:eb:a3:df:4d:68:4c:07:
a2:d0:40:1d:80:a4:df:39:91:18:50:c4:42:60:51:cb:90:24:
56:e9:03:d7:0f:27:08:19:e4:a4:1e:3c:30:85:1f:8d:4b:a2:
2a:2b:00:c8:90:fd:6f:e8:4e:77:dd:92:e0:39:d1:18:50:ec:
3f:17:57:df:1b:05:e8:43:4d:de:99:a6:61:c4:50:55:ef:5f:
a5:9e:65:53:10:c9:cf:09:00:45:46:54:60:2e:d0:60:5e:f5:
ce:b3:90:75
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
Truncated 3082 bytes from beginning
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
2,856,231 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:33 2025 GMT
Not After : Jun 27 10:25:33 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c5:f5:66:03:0d:33:d4:a1:78:31:57:b4:35:67:
e2:d0:f1:75:64:d1:1a:99:f7:12:9c:be:ed:52:82:
ed:0c:d0:7f:33:4f:4a:ef:f5:c0:6c:ba:e3:6f:54:
d6:9c:b4:49:8d:d1:94:c0:cd:91:28:0a:0b:4a:a8:
0f:3a:88:6f:47:33:1f:94:3a:bb:7f:2c:53:54:ba:
21:e8:9c:1b:2b:bb:d1:e8:db:ae:81:5f:57:8f:7b:
44:1a:77:42:33:43:63:ab:32:f3:32:51:71:17:93:
b3:bd:18:be:1e:66:3b:44:7a:76:0b:9d:d4:c9:5f:
21:bc:4a:9c:f8:70:e7:44:eb:24:ed:74:c2:a4:49:
43:ae:25:f1:49:ad:14:c1:08:80:cf:ff:a6:01:2a:
9e:25:b5:f2:9e:3b:da:59:85:57:58:b2:f1:e4:66:
64:ad:c2:20:e4:fa:8a:17:39:f2:e9:d9:9b:54:29:
bb:3e:ac:1e:3f:36:3f:7b:75:d8:3d:76:f4:91:1b:
9a:3a:c6:3a:6d:6d:00:47:43:a7:83:2a:55:8d:0d:
54:83:ea:f4:70:a8:5f:8c:bd:a2:a2:e0:df:cb:76:
0a:a6:5c:25:ad:e2:84:cb:1f:45:e2:8d:fd:fa:6b:
57:a7:eb:df:ca:aa:24:45:d8:5d:99:47:27:97:1e:
a7:61
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
14:8a:d1:87:64:20:1c:f1:1c:2c:08:96:05:61:e8:a0:e6:8e:
71:62:ce:b2:46:d9:2f:dc:0c:e4:c2:1c:5c:cf:54:e8:0f:34:
25:a7:79:72:1f:34:ce:71:97:0d:80:7c:ef:d7:de:24:e0:9f:
e8:d7:eb:16:84:96:13:bc:ee:a6:61:f1:f2:f3:01:dc:37:f7:
45:45:e9:96:ce:46:e4:19:58:99:8f:ac:06:a1:8f:b6:16:89:
4a:16:1d:91:51:d2:fe:7f:d2:b2:8d:7c:0b:2b:f5:58:8e:a1:
70:6f:3a:de:b1:df:04:78:79:70:ea:12:9b:7a:3e:ac:30:c3:
77:f6:ab:f4:f9:58:22:23:fa:a3:b8:28:3c:e1:f9:59:83:04:
64:9f:b0:d0:27:3a:07:15:b4:f7:02:aa:62:6b:3f:49:7d:1a:
ca:25:bb:4d:33:0a:7d:23:77:7c:30:19:4b:99:fd:60:88:d6:
2b:4e:97:70:dc:a0:55:ae:ec:f9:74:93:68:e2:92:50:32:c2:
f9:32:89:0c:62:a0:33:88:49:81:87:7a:10:09:94:03:4e:c0:
3c:03:90:f7:26:f9:b1:f1:7e:ea:8d:0b:46:fd:bf:b9:d0:08:
ba:6d:43:55:9f:16:38:72:d3:59:e5:df:b1:98:8e:20:1e:e6:
34:f8:f0:cb
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:33 2025 GMT
Not After : May 29 10:25:33 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0c:a6:9a:df:61:ec:31:3c:40:65:ed:10:f7:4b:de:29:8e:12:
28:12:73:fc:f3:e8:a9:2a:54:9d:68:6e:1d:45:b6:59:98:1f:
0f:8f:b1:b0:6c:fb:c0:a5:7c:6f:10:ef:1e:ae:12:aa:21:6c:
42:80:45:41:f8:65:36:25:c3:f2:8d:74:7b:2c:34:5d:92:fa:
c3:61:70:db:61:41:1d:c4:b4:23:a5:51:ce:43:41:3a:c8:8c:
f0:1f:a4:05:74:1f:58:ca:a8:c7:99:7b:df:bf:dd:c7:ac:0a:
80:a1:0e:de:41:81:df:65:1a:17:0f:92:e1:dc:e7:1e:c1:e7:
3c:e5:41:44:28:91:29:6f:e5:3a:0d:54:78:9b:82:d9:50:5b:
cc:12:04:cd:6a:a8:22:ef:f8:74:19:90:4f:25:2f:a9:3c:f8:
c3:68:5e:8d:2c:bd:b9:29:6f:cc:96:6f:29:70:19:1a:53:9a:
38:a3:c8:d1:03:0c:03:e2:48:89:5b:c3:70:a2:41:7a:a0:96:
73:83:1d:34:73:70:56:e2:91:fd:a3:83:79:e9:3e:66:12:74:
09:3b:50:ad:45:8e:c0:db:3b:76:c8:7c:aa:2d:5b:a3:67:39:
26:dd:6e:76:20:ee:f1:64:fe:27:d5:a9:57:6a:82:f1:d3:14:
fe:fa:fc:c2
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
Truncated 7958 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
3,109,051 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:25 2025 GMT
Not After : Jun 27 10:25:25 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a2:7a:a5:aa:18:56:6c:0a:72:67:c2:70:47:39:
d3:fc:2e:e4:f2:61:b9:fc:2d:f1:60:61:d7:81:f1:
37:46:7e:75:f9:e9:18:2a:db:3b:65:9a:7e:58:30:
84:7b:d0:03:1a:30:d1:19:07:cb:4c:b2:df:af:e9:
c0:87:d2:f5:ce:15:e3:3e:a2:97:bf:51:7b:ee:d7:
f3:69:98:b1:4d:51:43:c4:ef:7a:6a:27:40:9f:2a:
43:8d:7e:af:57:f9:99:21:25:32:b6:a1:26:f0:05:
39:af:49:68:0c:04:81:73:26:a5:27:da:ac:30:37:
3a:15:79:a8:2f:ca:72:c4:84:c6:04:6f:87:c9:d2:
64:4b:3b:d2:0c:88:61:6e:84:13:97:05:5f:ee:29:
cb:c0:70:01:d2:d6:bc:35:3c:93:45:67:ae:fc:a8:
86:96:bd:1d:df:22:6f:83:72:8f:e4:25:06:fb:2d:
f2:9e:d7:b8:83:29:c3:a9:b0:e9:8e:50:86:59:46:
b9:58:04:01:27:d0:6e:cb:62:a3:a7:eb:1b:41:85:
21:e9:c4:97:37:20:6c:8a:c8:f9:59:a0:18:5d:c0:
ee:df:b8:e0:46:19:5b:e3:b7:3b:44:32:9d:d9:b2:
a3:4e:28:64:83:99:7a:ff:b0:f7:72:06:67:a2:dd:
70:ab
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
02:67:59:ae:87:aa:c1:0d:67:73:8c:b6:dc:44:a9:78:b0:2c:
56:42:c1:5d:eb:5e:d2:d2:99:96:36:cf:cf:3c:18:2c:a0:15:
3a:7d:2e:15:c0:38:52:5c:ac:22:95:db:71:ee:f9:7c:c8:a7:
6e:70:9d:c0:bd:6c:18:86:b8:6f:0f:11:10:0a:73:01:87:42:
af:ef:7e:cc:99:1c:41:5f:a7:c3:99:58:2b:60:9d:5b:af:34:
aa:49:43:a5:19:76:a8:da:75:14:38:f4:05:93:89:4f:5c:f3:
0b:e7:37:dd:9a:ec:ad:54:86:7a:30:dc:d6:34:fd:d2:90:81:
ff:f9:19:10:0e:93:75:c3:e5:96:5a:96:e7:60:d2:8c:f1:d1:
8e:63:e3:e6:ba:a9:cd:11:65:7a:39:45:54:8c:4e:d7:ef:05:
90:c5:d0:dc:0a:3c:9a:9c:5e:f1:f0:66:19:ed:b8:d2:9c:7e:
76:fd:ff:89:c9:c5:02:95:d4:1d:67:d1:16:8c:84:84:bf:9e:
47:50:81:ce:db:fe:01:9e:e6:ae:3b:20:1b:a2:5a:63:c7:d9:
f9:44:ab:cf:56:46:b7:9c:85:df:58:6d:aa:46:6b:79:d1:3d:
2f:f0:29:7a:19:ac:83:b8:bb:a0:d6:91:f2:f3:49:86:bc:02:
7a:ec:6c:64
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:25 2025 GMT
Not After : May 29 10:25:25 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3d:77:73:6e:57:b4:e5:5f:b6:57:94:91:5a:cc:39:7f:ad:96:
e5:38:2c:ec:c1:cf:ab:f5:28:3c:31:4f:74:6d:a2:85:e4:f3:
c0:5f:8a:84:7b:5a:ca:2e:b7:17:6c:b1:f4:5c:55:d3:43:c7:
b4:83:b4:e9:06:21:8e:36:7a:d3:b4:a4:49:bb:b3:92:69:e0:
42:8e:6e:3e:f4:3c:a2:ae:13:8e:5e:60:19:ec:8b:9f:70:90:
bf:2a:17:3b:fa:89:9a:bb:12:9a:1b:b6:62:ab:12:ea:bf:81:
a6:1a:a6:fb:74:65:41:14:73:9e:d0:7e:b0:4f:89:c6:b0:10:
c9:ce:84:56:0c:76:1c:52:e3:6a:36:2f:38:5f:81:86:68:ff:
3b:c3:df:93:5f:26:e2:45:af:6d:1d:13:b2:52:f5:9e:bd:3b:
79:6b:a5:a9:11:c8:21:32:35:02:c8:01:53:e1:13:35:74:bb:
4f:4e:d5:5c:2a:98:c5:34:db:22:2c:98:a2:54:92:db:cb:97:
3c:67:d7:c4:6e:2a:7e:d0:ce:f1:30:d2:30:0a:67:c8:e1:54:
08:a8:e2:2e:46:e8:dd:db:52:f8:81:cf:19:31:f9:91:0c:90:
95:f8:bf:7c:74:b8:64:ab:c1:bb:d5:de:ab:ce:b2:f8:d6:42:
9b:40:34:0b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
Truncated 3082 bytes from beginning
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
2,852,966 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:20 2025 GMT
Not After : Jun 27 10:25:20 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c6:fc:3c:59:b8:64:a6:fa:0b:28:83:64:05:b5:
9d:25:a3:74:2b:46:5a:86:a4:a8:02:19:a9:fc:41:
16:f3:d3:33:a1:16:84:a2:51:76:e6:16:00:83:0b:
e8:37:bc:f5:e4:8b:49:9b:ff:58:ad:5f:d4:ba:43:
85:fd:9b:35:9b:aa:a8:df:0b:62:c4:ac:d0:dc:73:
77:58:42:d7:f5:57:96:44:6a:7a:29:d4:5c:6b:38:
9d:93:41:fc:e7:64:c5:78:36:13:a1:46:2b:bd:74:
26:be:67:09:d0:16:ff:67:cb:9b:c5:8a:0e:78:1c:
fe:74:45:95:fe:26:4a:5f:8d:40:92:7c:85:58:a1:
66:c5:9f:8e:f2:7d:63:19:7c:6a:80:6d:c1:4f:fc:
9b:05:2e:4c:72:fd:fb:95:6f:30:b2:2a:ff:a0:8a:
29:7c:c4:ee:43:82:af:8b:72:83:9e:eb:8a:35:c0:
86:85:63:16:83:f5:ca:fe:1c:fe:28:f9:02:1a:8d:
f4:3b:df:18:1a:12:89:3e:b8:37:d4:f8:5d:30:48:
89:27:3d:19:af:0e:27:ea:2b:fd:7b:f9:a3:f2:53:
97:a9:77:2d:86:34:38:b3:d5:04:16:84:22:cf:ab:
80:22:f2:99:5a:27:c2:e0:62:dc:6a:03:c2:3a:32:
d5:81
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4b:29:8b:47:5e:0f:bb:72:42:ae:31:14:03:f3:a4:93:8c:d0:
d5:77:17:19:bf:80:33:db:a2:a1:b6:3f:d9:c9:8e:38:3b:29:
ed:3a:b8:02:6c:c8:bf:c5:b1:6f:e6:e0:5e:93:44:44:d9:5b:
bc:3a:78:5e:fc:32:d6:a4:eb:1c:f7:58:9c:d1:7a:eb:ef:cc:
b9:be:a5:bf:6b:30:f5:53:16:f8:23:c5:3f:d1:d1:fc:ec:4f:
27:ee:8e:10:02:43:aa:ec:b7:0f:8d:5b:e9:67:06:54:88:ee:
1b:31:f4:1f:79:fb:ce:90:d3:f7:b2:ef:57:42:d5:ab:b3:4f:
53:a3:d5:bc:80:ae:15:59:71:5f:a7:77:ab:1e:4c:9f:5d:59:
7a:1f:61:2a:cc:91:2e:63:fa:f8:b0:ce:ff:8a:16:f4:f9:e0:
9f:3d:a0:80:17:9e:4b:c6:0d:48:8d:a7:61:35:63:ae:f2:81:
86:57:2f:5f:86:f8:da:85:ba:36:81:d7:41:fa:64:09:02:04:
7d:55:ac:9b:71:09:d8:25:33:bc:6c:6d:31:18:c6:d0:62:91:
3c:29:4c:9c:cf:6d:49:62:f1:57:6f:44:70:86:4e:63:e4:a3:
a6:d6:ef:30:f7:60:95:fd:02:ae:0e:72:b2:7b:d0:37:32:21:
e1:87:06:62
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:20 2025 GMT
Not After : May 29 10:25:20 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
aa:b1:61:0a:e4:93:cc:83:c2:f0:6e:00:20:8a:6d:1e:e0:4d:
60:36:e3:cb:4e:1f:ab:87:ce:e0:82:22:11:6d:f3:60:61:c7:
c4:44:ea:66:1a:80:db:73:ff:a3:a6:d8:25:76:60:1d:ec:f3:
fe:8d:bf:79:35:56:f3:f0:e6:02:8a:34:25:9b:70:6e:0f:55:
a5:dc:10:7b:94:78:9a:65:04:bd:71:bd:ce:b4:2b:5b:9a:2a:
24:4f:02:3b:c2:13:01:02:0f:c1:f7:5a:14:b2:6a:39:47:9b:
a8:42:0c:d0:b5:9f:13:d8:c2:b0:f8:41:d3:b7:2e:15:04:ab:
bc:c0:b1:60:09:42:a1:2b:8d:f9:51:91:6f:c6:66:81:31:a3:
de:44:e2:7b:74:31:d1:c7:69:00:a6:6e:c5:27:35:81:c5:ea:
3c:95:e0:a8:0f:24:d2:c2:fb:d0:d8:b7:32:ee:d3:65:a6:08:
7c:4d:be:07:ff:48:e0:c1:ec:1c:2d:16:64:0d:b1:e3:d5:36:
39:ad:b0:54:93:40:7a:89:de:d1:83:8f:78:ee:00:d6:78:0d:
1d:df:2f:70:24:fc:06:0e:e3:a4:f8:f1:13:55:20:57:33:ef:
c9:5e:53:fe:10:2a:28:8a:d7:b1:1c:7e:2c:68:c8:ff:15:3f:
ba:21:a4:ad
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
Truncated 7958 bytes from beginning
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
3,106,108 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:42 2025 GMT
Not After : Jun 27 10:25:42 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b3:2b:3d:0b:dd:26:ac:5b:8e:ee:84:a3:a5:c0:
16:1f:93:14:90:26:8c:02:0d:14:e5:a7:53:12:1b:
1f:75:6e:c6:ac:00:75:e8:27:37:2a:22:fd:6b:56:
33:76:7b:c4:7a:13:a2:f7:b9:73:a5:ad:74:44:f9:
06:cf:71:54:9f:b4:b0:9d:f2:1c:2f:80:0a:6c:79:
46:0c:99:32:e8:dd:1a:90:e8:2d:97:ad:8d:c4:e0:
e4:3c:74:6f:94:55:8e:98:c0:31:33:97:d1:3d:b1:
e6:9c:08:bd:60:1a:32:cb:87:62:b6:6b:74:8b:19:
e1:e1:89:b4:73:54:b1:f4:e6:9e:ed:ac:f7:d2:5b:
e1:6f:b4:1a:e9:54:e3:e0:e2:fb:17:1d:c9:3e:05:
29:8a:b2:20:0a:02:06:0e:01:84:d7:59:96:7b:44:
b7:7d:ab:7f:a7:25:9d:6a:2c:9d:63:85:8d:28:d6:
98:50:f9:50:69:b6:bd:a4:b4:03:5f:27:78:d7:24:
0f:f9:dc:b9:47:f8:1e:d1:cc:2b:80:ca:c9:92:18:
a6:e0:8a:22:87:c2:66:0a:73:64:51:3f:79:27:80:
52:bb:8c:03:d5:90:9f:91:1d:29:1f:06:b4:c9:46:
fd:ef:68:6b:71:e6:3f:70:02:f1:e8:ae:b0:91:f8:
f1:9f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3a:96:c1:68:ab:a1:e5:47:a7:67:37:4a:62:9c:86:0e:59:07:
2c:96:ca:38:f2:b0:2a:5b:58:c8:8a:f5:38:d9:a1:aa:26:b1:
e3:96:20:02:91:8f:2f:71:35:bf:e2:ff:05:68:aa:a4:02:ec:
00:bc:5f:ff:dc:8a:95:17:4b:8d:e5:a6:6d:da:80:9b:ab:bf:
f3:98:ec:b1:8a:9d:99:4b:fe:2f:17:7f:c6:83:3b:91:4c:72:
46:1f:19:11:9e:52:0e:9a:06:a1:b3:e1:36:69:80:6a:d5:5b:
b0:ec:0c:15:ef:b9:52:9d:62:d7:40:f2:ce:e0:c4:34:20:aa:
6a:e6:0f:08:7c:88:40:14:a9:82:a8:ba:e9:38:a2:9f:7f:54:
ae:e4:07:f9:fe:c7:68:77:09:d8:46:2f:92:58:e9:68:1c:f9:
dc:d1:f2:16:a4:57:a9:6c:9f:8f:c1:41:63:f9:5b:85:ef:b2:
18:22:64:a1:08:0e:23:1a:09:3b:90:f1:86:2f:6b:4f:fd:7b:
8f:d1:1d:a6:df:a5:80:f5:74:a8:30:04:cf:bd:7d:b7:9b:34:
2e:56:7a:0f:4f:ac:2f:ff:ed:5b:39:5d:3e:da:4e:a2:06:c7:
cd:dd:ae:47:42:56:dc:42:61:88:6a:ab:42:53:35:12:73:e6:
e9:ac:b3:3b
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:42 2025 GMT
Not After : May 29 10:25:42 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
85:ef:cd:a5:58:97:68:8f:b9:85:a1:1a:aa:d1:ec:a5:bb:18:
02:48:6f:b4:b0:e4:c1:17:0a:e7:0f:36:57:74:f5:cf:85:7c:
bd:f7:80:55:84:e6:2b:5d:1c:37:91:2e:33:98:d6:5f:19:af:
88:f6:0c:42:9b:a4:e0:4f:e3:19:3c:0c:86:3d:ee:81:f2:d0:
e2:26:2f:5e:2b:67:f5:3b:84:0e:b2:b8:ff:31:87:75:0f:e9:
67:06:5a:50:9c:92:4b:92:6d:5d:d3:34:0c:d4:eb:f1:54:02:
9c:85:69:68:2b:dd:a5:52:59:2a:6b:b9:48:0f:72:72:6a:e3:
8e:ad:68:fe:4f:5d:87:69:f3:99:30:af:09:9b:8e:53:19:01:
df:09:70:2b:54:ae:49:54:99:69:4e:b8:f5:c7:37:c9:5d:99:
89:ca:33:26:90:b6:89:38:15:c9:51:72:e8:88:99:a6:fc:5f:
5a:7e:de:e2:54:56:8b:8a:fb:4a:38:0b:67:de:4e:d7:04:7c:
70:41:c4:c7:48:c5:77:77:22:f6:0f:61:d6:89:76:a5:a8:49:
8d:04:fd:9d:6b:36:66:49:b8:5f:da:75:ff:67:44:57:94:3b:
88:53:70:a6:3a:64:8c:c6:e2:0a:74:69:6b:a6:ad:dc:fe:e3:
88:88:fe:5f
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
Truncated 3082 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
2,854,153 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:17 2025 GMT
Not After : Jun 27 10:25:17 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:bc:1c:00:7b:25:84:31:29:99:d5:59:cb:7b:e4:
76:e0:99:43:5b:64:cf:3f:9f:86:1d:0a:50:d4:18:
85:60:76:7e:85:ce:d6:90:fd:43:03:dc:c2:18:f2:
53:01:73:50:bb:50:4a:8e:df:71:8a:08:0c:4c:3e:
91:70:cb:7a:80:fc:00:2b:4f:4a:bb:e5:66:4f:66:
bb:ea:a6:a1:5b:2a:66:f9:15:86:2f:0a:ee:11:19:
79:a3:6f:a6:93:ee:68:77:9f:17:a9:17:08:74:1d:
af:64:91:9f:b9:01:0c:ff:a9:e6:b7:86:6e:56:e9:
6a:7c:e5:3b:32:d3:12:0c:e4:f5:62:a7:5a:78:2f:
06:fa:5c:52:a5:75:35:66:37:f9:5e:de:e0:1f:4a:
83:98:74:52:30:3b:24:e0:07:8b:ea:8d:a8:67:18:
85:73:52:73:70:08:e6:5b:c3:eb:1e:b2:d3:81:33:
e4:22:d2:e4:a3:44:1d:6f:04:6e:c1:a8:2c:d6:a6:
e6:aa:5f:83:10:5f:05:5c:0a:95:c1:ee:da:98:6c:
f4:aa:23:83:e5:98:4b:c7:b1:09:73:f5:96:9d:69:
38:9a:9e:7c:74:af:ab:b5:27:c1:28:15:15:b2:db:
cb:14:56:ff:19:b1:55:51:e0:4a:1b:4e:9d:fa:fa:
82:97
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
9f:73:3f:77:aa:99:c3:a6:9b:d6:82:29:ff:04:43:f0:4c:65:
5a:0f:5e:76:02:3f:6d:df:4c:4f:31:11:dd:a9:c5:2d:78:02:
91:35:9c:b1:77:7c:62:32:9a:fd:0c:8a:23:66:70:95:61:54:
a5:35:d6:1c:3b:67:e4:5f:31:ae:67:f7:91:8a:d9:57:d9:e4:
7d:62:47:74:5f:90:5c:2a:df:1e:e3:3e:48:dd:53:6c:94:75:
00:fd:ad:f1:90:cb:09:c5:b0:e7:7f:e8:5c:08:ef:45:3a:72:
cd:0d:0e:86:1b:01:c4:d2:a7:67:b8:9e:aa:a9:1c:68:5d:02:
70:34:50:06:f2:6a:d8:46:ca:18:53:1b:6a:75:84:40:c1:1f:
cb:5d:52:2c:49:f7:a9:99:a5:4f:b5:46:4e:76:3a:04:ac:1c:
b8:9c:8f:7c:88:eb:a4:12:ee:b5:3e:f6:4e:79:07:ce:c8:84:
d5:6d:d6:43:ec:76:1d:d9:7f:ef:ce:4b:59:3d:b9:7a:8c:1e:
b8:38:5e:c3:5d:1a:58:36:37:bd:6e:e1:4b:95:26:a7:ac:1d:
3d:2d:9e:27:1b:8f:28:68:b1:c6:34:12:1c:65:72:79:b1:11:
7e:10:94:c4:39:35:3b:79:20:cd:98:9c:c7:a3:e6:91:8f:46:
99:64:ef:fb
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:17 2025 GMT
Not After : May 29 10:25:17 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
09:9d:1c:0d:a7:ed:f1:49:5e:fa:fa:26:69:17:db:c1:63:40:
e2:7b:3b:2f:5b:c7:3e:17:32:ba:ea:00:09:13:f1:8c:f8:25:
4b:5a:e0:b9:1c:26:f3:92:a4:6b:0b:98:a4:ba:de:2e:99:40:
d8:b8:9b:91:7d:e0:ee:a6:05:23:c6:c7:e0:33:59:f9:d9:30:
ad:4a:e6:fb:f5:19:c3:05:81:9d:d1:5e:96:2a:7e:f8:f3:08:
ca:3b:87:8c:f8:9f:c0:99:6e:8d:7a:69:c8:10:e6:88:69:fa:
57:e8:aa:19:4f:81:80:24:b1:bb:24:b5:7d:16:4a:48:04:e6:
18:38:c9:2c:98:b0:33:b7:9f:0a:c4:3f:dc:bb:53:76:a7:be:
1d:8f:87:f1:74:f7:01:aa:fe:51:57:75:84:ad:f8:97:9c:4d:
28:fd:cf:42:f8:3a:d1:fd:b4:0e:56:5d:70:b9:57:bf:4b:4a:
f2:03:6d:9a:20:9a:62:c5:03:15:35:49:de:27:e1:0e:b7:46:
cd:c3:99:59:0e:37:fe:55:31:8a:b4:9a:28:4a:11:83:3e:d5:
5c:a5:fb:74:0d:3c:40:5b:23:0b:46:7c:1e:be:bf:b1:1e:37:
a4:8b:bf:c1:fa:fc:de:fb:46:63:92:e0:05:77:35:05:66:1d:
ab:0f:b6:5e
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
Truncated 7958 bytes from beginning
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
3,105,459 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:36 2025 GMT
Not After : Jun 27 10:25:36 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ad:24:90:19:38:06:bd:62:7f:ec:3d:3e:fa:59:
47:59:95:d5:68:c1:45:80:84:eb:db:d5:3b:66:7c:
eb:e0:55:94:60:70:9e:d0:c5:ee:61:58:19:cb:4f:
8d:c4:72:2c:32:7a:19:a5:84:4c:40:5c:7a:01:d0:
5d:54:b3:c2:92:07:a4:2a:dd:58:7f:9f:0d:5c:f0:
af:58:1b:cb:1a:3a:2d:0c:cd:9f:90:21:a1:58:9b:
fb:1e:c8:bb:bd:ff:6d:68:e9:c7:3e:23:03:98:53:
ee:f3:b8:20:b3:f9:57:74:c9:8d:00:56:69:7a:19:
00:89:4f:4c:42:67:d9:8c:76:4f:c7:99:80:eb:8c:
6a:36:0d:42:16:96:51:83:03:24:45:f0:5d:c3:04:
5a:ae:7c:9f:98:1c:67:58:b3:00:17:5f:1e:45:2e:
71:0d:41:9a:f1:28:d0:e1:fc:18:63:c1:08:80:6c:
d2:14:ff:6e:64:7c:18:74:d1:7b:f6:6e:ad:10:28:
5d:60:5a:35:f8:e5:91:15:41:2a:a6:6c:49:94:f5:
15:9f:17:a0:c7:c2:74:a8:cd:b0:cb:42:ca:85:c1:
90:4a:18:5f:25:fe:dc:d0:3f:06:e7:9d:5f:31:16:
10:4a:7c:b8:02:05:b6:b6:b1:9d:91:f8:d5:3a:5d:
eb:67
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
2d:a1:67:80:4b:42:fa:9a:8f:dc:dd:35:97:f0:5b:09:8f:20:
10:d9:59:2b:1e:81:12:34:92:eb:74:16:e5:07:9c:d8:d6:2b:
af:1b:c9:76:c1:2d:d7:04:41:5e:79:3d:d1:b2:13:bc:1a:7e:
8c:76:77:f0:c8:4a:d7:30:f6:72:f0:70:3f:de:43:4e:84:ff:
1b:4d:7b:a0:df:b0:79:59:66:18:a5:50:4c:b1:c5:82:a8:91:
dc:e1:3a:d1:67:ab:a9:19:6a:a5:82:5c:9b:5d:8a:d8:d6:2b:
23:f9:7e:94:18:21:79:cd:39:b1:cb:5d:0e:d8:16:55:4e:d6:
4d:40:eb:f4:75:ae:37:37:2a:c7:70:67:cb:74:8a:13:f6:ab:
8d:37:2a:1d:14:7b:46:65:17:f8:50:31:c8:f7:71:70:50:a8:
3f:36:a9:77:7a:36:29:cb:ca:6e:a9:19:f2:43:6f:5e:51:ad:
c3:90:e3:29:5b:32:dd:89:c8:a9:63:32:06:46:ee:3e:dc:8f:
b8:e6:75:f2:27:85:09:48:2c:99:9a:5b:33:97:e6:34:d6:ef:
7b:68:28:dc:00:50:0e:43:eb:45:94:1f:94:b7:34:ab:22:0b:
97:3f:4e:17:fc:99:bf:c8:c8:0f:25:13:f0:11:cf:45:c9:bc:
c2:dd:ed:e5
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:36 2025 GMT
Not After : May 29 10:25:36 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1a:6c:d5:56:a2:06:b0:9e:e1:11:be:74:67:ce:78:53:0a:1c:
83:3f:c1:fa:b7:81:24:f6:90:be:69:fc:d8:d9:cd:70:ab:07:
ba:4f:8a:db:3d:cd:98:97:0d:13:84:af:06:07:ca:01:e6:5d:
16:a8:bb:d8:5f:4a:dc:8a:95:d3:b2:86:14:05:d7:7b:8e:0e:
69:ec:db:d8:ec:91:a5:7e:6a:87:84:1c:a4:f4:49:6b:c2:99:
e5:c7:8b:92:d8:48:08:7b:5b:97:c1:92:04:22:89:00:c9:43:
4a:4b:b7:35:02:31:b6:80:08:da:37:d8:07:a6:72:79:ea:44:
59:10:a0:17:77:33:8a:02:9e:9d:11:f2:24:c8:e6:9f:68:3d:
b2:f5:da:39:86:c9:33:e8:95:82:3a:60:4a:fe:24:cf:de:24:
49:da:13:fd:e4:43:38:08:c3:5a:f5:28:3b:5c:65:49:f0:28:
f9:1c:7b:1d:cd:79:e6:53:1f:3a:7b:29:39:75:04:ab:10:2d:
c7:8a:6f:b0:fb:2b:61:13:36:2e:cd:72:e4:a3:17:d9:6d:f4:
fa:4e:c0:23:9c:d4:3b:02:f9:a7:64:b3:9e:8f:ae:e6:aa:4d:
7d:8a:80:94:d9:8a:79:c4:f8:89:b6:d6:6d:6d:e6:9c:93:5a:
ab:30:d9:c2
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
Truncated 3082 bytes from beginning
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
2,855,770 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:24 2025 GMT
Not After : Jun 27 10:25:24 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:98:aa:76:26:62:50:60:7a:5d:6e:33:ef:23:0e:
10:49:9a:b7:03:ec:7f:8a:c8:75:de:a4:d3:33:bc:
ee:19:da:0a:2a:2a:ac:ff:97:b3:93:56:f6:0b:73:
4d:83:3f:8e:d2:79:a7:da:00:ff:e0:3e:df:65:4f:
3c:85:52:2a:91:9d:b2:c2:69:62:1b:72:90:8b:48:
76:9a:c2:df:8a:a1:db:a6:03:e7:ed:af:4a:97:b6:
fd:bd:3e:82:32:13:2e:86:45:06:c2:f7:85:17:e2:
eb:8d:cd:18:df:cf:b5:2c:36:d1:0a:52:50:73:e9:
66:71:0c:f6:5b:da:0a:53:11:13:52:29:ff:ec:1e:
91:47:e2:f0:64:be:de:45:3b:99:21:35:74:f8:90:
76:4f:52:e2:94:8e:e2:d0:99:b6:83:86:07:55:25:
1f:74:f7:8b:58:88:7d:8e:27:74:24:37:9a:31:a4:
43:ad:47:ad:50:08:3c:f8:82:4b:77:cb:14:7d:7a:
22:b6:ab:d5:ba:8d:1f:2d:65:96:8d:ae:ad:01:55:
a6:24:0c:67:13:1e:fe:5d:8b:a8:52:67:5e:f7:80:
3f:8f:16:98:15:c8:53:bb:26:3a:d7:2e:9f:8a:26:
68:1b:fb:fa:26:a3:10:f5:ed:5a:3e:99:20:e3:d0:
5a:13
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4e:fd:bf:cc:dd:2a:e3:7b:5a:ab:30:1a:56:c0:2a:9d:80:bf:
8b:2f:4b:8f:38:fe:5b:da:3a:aa:39:e6:c9:30:a5:6d:e7:30:
4c:8c:57:9b:04:7b:31:88:4e:84:19:01:0e:90:08:e9:d8:a6:
a7:e9:00:01:48:31:08:33:f1:a4:9b:83:b9:1a:2c:2e:6a:19:
86:f4:8c:76:62:63:24:5d:74:48:b4:0a:41:4c:48:85:bf:94:
4d:32:e8:77:24:4c:99:e7:9f:b1:e7:67:8a:07:88:bc:bb:2b:
b7:4a:24:d0:51:49:8d:a5:cd:8e:b9:2e:4c:aa:57:ef:37:73:
08:dd:22:ed:eb:00:55:19:7c:31:76:99:a0:55:37:8f:54:67:
1e:f6:34:ce:53:36:ac:f4:f8:44:49:f9:17:cf:5a:bc:95:74:
1e:08:af:1d:ec:9e:41:45:83:1a:1f:e9:9a:c4:4c:ea:3d:6a:
3e:3b:71:08:da:79:e0:4e:d6:ca:77:33:1f:f8:d4:6a:3f:69:
c4:64:64:1a:6a:c3:d5:7d:60:29:9b:b4:ce:4e:f8:20:41:6d:
42:00:1e:5b:5e:3e:c3:97:6e:a9:a0:d1:90:c9:75:b6:c8:82:
5a:7e:e6:65:eb:0a:23:c5:47:6b:a3:73:ec:e9:31:d9:a5:19:
70:b3:fe:75
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:24 2025 GMT
Not After : May 29 10:25:24 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
2a:28:9c:53:35:19:d6:1c:ba:b3:95:67:d4:54:0f:c6:6b:9d:
66:da:0e:ad:17:03:19:7c:94:ab:81:06:48:37:60:2d:9c:33:
d8:83:80:e6:d5:4e:f8:5e:7c:c9:d0:0a:d0:38:bb:ce:6a:01:
0d:e5:e3:4c:c6:44:04:7d:8e:58:8b:db:72:02:c9:2e:a1:f7:
cd:0d:fc:c1:01:a1:1e:ba:ef:7f:25:5b:38:6c:b6:a0:5c:8b:
40:6b:f9:c0:59:ef:27:e5:c7:d2:3a:f9:1d:df:cf:46:f4:9c:
1e:8d:88:4b:2f:0f:45:2f:51:99:99:da:ec:2e:a5:40:8e:4b:
ff:c8:67:61:7f:81:31:95:e0:22:6e:96:d7:a3:ff:9b:0c:f7:
dc:55:12:45:3a:eb:6e:31:77:a3:0a:e6:b0:41:8c:57:c2:0c:
08:a8:00:3e:9d:7e:3a:34:54:d2:7e:6f:f9:26:d0:13:a4:66:
5d:fc:4d:92:c1:da:dc:2d:db:25:da:83:9c:b7:3f:3e:38:0a:
0c:a1:b9:ce:2e:ce:6d:78:5f:1f:fd:1b:1c:c5:7e:18:8f:1e:
fa:f2:a1:16:5c:ba:15:6f:f0:f1:bb:d6:ce:e2:dd:ee:6d:5e:
4a:1d:47:e7:ff:71:15:07:a4:4e:ff:00:cd:53:bb:96:3e:c2:
a6:ef:00:b6
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
Truncated 7958 bytes from beginning
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
3,105,916 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:20 2025 GMT
Not After : Jun 27 10:25:20 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b4:aa:9a:1d:80:bc:52:59:a8:9a:d1:5e:17:bb:
f1:d7:0a:35:da:13:b2:92:7e:7a:3e:dd:c2:43:74:
15:d2:98:21:ad:fc:28:3f:41:af:15:3f:dc:99:b3:
9f:49:b2:3d:7f:5c:55:09:24:a6:ed:aa:5e:0c:2f:
b5:ef:a7:4f:bc:d9:4b:dd:db:f5:04:50:24:2e:bb:
71:3d:5a:f6:d5:b8:53:c2:c7:30:91:42:d2:bc:75:
18:c8:3f:9b:e0:56:4c:ba:96:32:dc:1c:a8:ff:ec:
de:fa:5b:e8:b3:af:fa:2f:4c:53:fe:51:d2:1c:04:
10:93:33:37:9d:fe:24:b6:14:e7:e1:cf:60:ec:f3:
00:97:80:c3:97:63:5c:e8:55:a1:76:c2:e9:97:24:
77:f0:6a:3c:43:a3:e5:0e:6c:81:33:5f:13:89:9c:
fc:a9:b0:f5:e4:78:51:1d:f2:e0:ef:3f:b4:0d:a0:
13:89:c4:e3:d4:b8:ac:d5:ac:c8:f3:39:8d:13:d4:
bf:88:44:0d:6c:d2:65:5e:c1:d7:8f:8a:48:1c:d9:
cd:e0:b5:ec:40:a2:94:07:28:60:38:80:ac:ff:ea:
58:a1:83:c8:90:cc:64:0d:71:a3:2d:48:44:7b:b4:
f0:f7:0d:1e:7d:ef:93:e4:94:35:67:f3:f8:1b:f8:
52:91
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
92:83:21:dc:ad:2a:76:4f:86:9a:93:76:40:79:61:4d:36:bf:
9b:eb:28:3a:7c:ce:ce:82:f3:40:d2:0e:75:ce:9a:0f:f9:cc:
d3:ca:63:eb:43:05:98:0f:47:40:36:d7:f0:9a:ff:30:05:fc:
82:8e:b5:ff:15:f2:b4:f4:8f:68:02:a1:24:81:06:fe:b8:20:
29:c5:1a:21:39:01:95:4b:5e:54:9b:12:bc:47:2e:30:46:2d:
2d:2e:02:8f:49:9c:c7:2f:58:24:c0:a3:a2:25:b2:c8:07:5c:
d3:02:72:1d:b5:b7:9a:81:1e:55:f1:af:36:7b:1f:8e:14:a2:
46:de:a6:b3:b2:80:20:75:0e:66:10:95:db:38:98:83:fd:e9:
9e:95:4e:ae:b1:7e:90:93:76:ea:ce:c9:18:a6:d4:0f:ce:4c:
df:7e:25:6f:2e:ec:5e:69:1f:da:36:4f:88:05:88:5a:02:da:
83:f7:0f:33:ce:5c:c1:34:b8:67:de:ba:0a:ac:66:4b:b9:18:
fe:da:1c:23:e5:29:c0:02:2d:78:6c:60:38:65:5d:4e:ea:46:
31:05:63:79:70:ce:82:ea:04:66:75:80:33:07:4f:28:73:d3:
e0:b2:b0:81:85:7f:04:ac:62:68:86:3e:2b:97:a7:83:87:c6:
a2:3d:73:3f
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:20 2025 GMT
Not After : May 29 10:25:20 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
9a:83:4b:e0:af:90:f9:b3:58:d5:a5:14:8c:1d:c1:80:2b:77:
8f:2e:81:76:03:50:df:ef:1f:ab:07:0a:c4:5b:a4:89:55:60:
63:8d:5f:53:d5:0d:69:c0:1d:1c:e1:74:4b:ef:68:d8:a7:43:
00:4d:8c:b6:1e:1d:99:0b:e7:55:ff:77:86:a5:eb:a4:f9:26:
ab:d8:0e:25:fb:a5:dc:e2:83:0d:1b:84:4e:af:04:0f:18:d6:
f2:42:05:2c:f9:dc:d4:25:a4:9b:11:97:10:31:7b:7a:77:78:
51:e6:c8:09:ec:2e:a8:d3:7f:08:c6:58:77:e6:d7:c3:49:01:
27:04:b8:31:c8:d5:41:85:69:59:a6:75:95:57:e7:79:24:30:
d2:93:a8:85:41:83:55:c9:ff:25:50:53:8d:3e:62:ad:ab:96:
fb:a0:5a:0d:73:eb:4b:bd:24:ed:40:50:53:e8:c3:72:c8:ac:
b2:f5:bc:e9:13:d1:e0:1c:e4:50:fc:0b:60:45:59:f1:cc:2a:
7b:1e:06:5f:a4:5a:79:b8:19:93:47:18:1c:5c:61:ff:5f:6e:
c6:90:13:2b:82:cd:39:71:ba:14:8c:9e:7e:69:41:23:92:0e:
aa:de:01:d7:15:38:10:73:f4:d1:53:ce:de:33:b1:16:b9:e9:
70:3e:04:c4
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
Truncated 3082 bytes from beginning
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
2,855,743 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:21 2025 GMT
Not After : Jun 27 10:25:21 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:bb:36:52:1d:12:99:4b:23:28:f0:f9:55:e3:f9:
6d:68:fb:c4:01:e4:c9:a8:f8:a1:6b:b2:2a:ed:a2:
c7:dc:e0:41:b5:ab:90:25:61:83:ce:b9:c5:fc:11:
47:11:5d:45:0a:d8:48:68:77:09:9f:0f:0b:bc:42:
50:b7:ba:43:4d:9b:75:45:c8:ed:f6:5f:6d:b2:19:
e4:23:71:02:1b:17:d1:22:11:5c:e9:49:62:0c:ba:
f3:fa:5a:13:6c:0e:87:33:68:98:ed:1d:b5:10:d6:
43:e9:9b:4c:d7:37:e4:2c:83:b2:33:0d:2a:8d:e3:
26:26:bc:58:15:b3:f2:51:78:09:c4:4a:78:ba:71:
3a:d6:94:ce:8d:53:12:ea:fd:f3:09:0e:65:3f:6d:
d5:95:e3:b5:59:f3:61:51:b7:f0:9a:30:77:6c:46:
c1:8c:67:a5:3a:c3:64:5b:e6:b0:fb:53:c9:92:75:
05:62:d9:e8:91:f3:3f:1c:f8:8a:aa:ce:77:ed:53:
e4:99:a3:d5:e0:2d:1f:70:45:bb:17:2f:29:5b:8b:
c7:7c:34:4f:fc:8e:13:94:aa:62:d5:9f:46:64:a9:
16:5f:78:f9:25:7d:3e:2c:d5:c9:e1:cf:b5:b1:78:
84:54:6f:dc:5f:da:3a:e2:4b:32:ee:92:8a:44:b2:
fd:cb
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5a:8e:6a:1e:2a:25:03:69:dd:bb:51:2e:44:c5:78:cb:bb:4e:
df:61:37:58:c1:81:c7:d7:db:68:89:4a:98:8d:0a:c0:b0:75:
20:97:cc:33:0c:3f:b2:fe:8c:fd:24:06:67:a6:79:f0:98:ac:
17:0a:ae:03:41:58:27:5a:21:62:d7:67:85:67:0f:f3:aa:59:
89:17:e1:10:71:a5:2d:da:57:21:54:d4:1a:2d:81:e8:dc:78:
75:99:66:5f:f5:08:0f:2d:95:9e:de:a7:8f:40:e7:3d:3c:bb:
8b:b6:dc:d8:8d:95:ab:ff:db:f2:70:70:21:39:f9:d4:23:0a:
3f:9e:ac:86:28:ce:e5:33:4d:fc:19:00:40:4d:50:a2:89:7f:
74:b2:ac:4f:a8:8b:d0:72:75:c9:0f:97:6d:90:18:28:d0:f1:
a7:98:7b:e7:84:9e:b7:73:3f:68:65:f0:a3:2c:23:16:7c:cc:
b5:e3:a4:0e:05:52:26:30:9e:3f:f1:c6:85:7f:1a:b5:fc:d4:
41:aa:40:5f:f7:17:3f:72:8e:ff:be:ed:1d:b7:c9:e9:1a:c7:
54:84:7d:91:fe:c0:96:16:aa:ba:46:44:24:a2:56:b7:b5:6e:
82:e3:58:fe:a4:c6:85:a0:2d:fc:62:30:c4:da:f6:00:36:bd:
3c:ff:9f:af
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 28 10:25:21 2025 GMT
Not After : May 29 10:25:21 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
29:51:52:e1:1e:bd:15:2b:6c:87:b1:c9:c7:c1:03:89:c8:59:
ae:00:50:eb:65:4c:4e:c4:47:20:b2:5f:f4:b3:0e:6b:7c:0b:
04:24:d5:db:81:f5:a6:30:90:b6:b6:c1:4e:23:c2:55:76:f5:
2a:01:e6:90:a5:45:ba:49:ba:14:ae:bc:40:78:ac:c1:85:4d:
01:0c:f5:b4:f0:d6:cc:07:5c:aa:0f:97:ca:e9:ee:eb:8f:48:
0b:2c:5e:54:62:9f:9a:58:55:11:d1:4e:9a:bc:c9:01:9b:ec:
ef:ef:f3:72:ef:f0:3e:b0:ba:85:97:2a:06:80:2b:19:1b:8f:
38:f9:42:f1:d6:99:f8:82:89:e4:ab:6e:2f:d0:0e:14:3c:8a:
12:6a:fa:e8:e2:aa:d8:d3:43:0c:af:73:e1:94:d0:c6:07:a9:
34:72:dc:19:2f:14:a0:1f:4c:52:93:93:8f:10:13:99:d4:2b:
60:9d:e0:30:6d:af:d2:f4:67:b0:79:5f:97:8f:3d:5b:16:f0:
b8:a1:8f:47:33:4a:ac:d9:9f:0c:d5:19:de:19:d2:45:91:c3:
44:e9:1a:43:9b:1e:0c:d4:52:3b:ff:30:8f:e3:83:38:be:d6:
f4:77:6c:46:41:59:24:b7:3d:2c:51:49:f4:7c:44:6e:8e:58:
da:cb:3f:e1
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,083 UART: [state] DebugLocked = No
86,809 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [kat] SHA2-256
891,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,713 UART: [kat] ++
895,865 UART: [kat] sha1
899,989 UART: [kat] SHA2-256
901,929 UART: [kat] SHA2-384
904,752 UART: [kat] SHA2-512-ACC
906,653 UART: [kat] ECC-384
917,018 UART: [kat] HMAC-384Kdf
921,768 UART: [kat] LMS
1,170,080 UART: [kat] --
1,170,939 UART: [cold-reset] ++
1,171,337 UART: [fht] FHT @ 0x50003400
1,173,941 UART: [idev] ++
1,174,109 UART: [idev] CDI.KEYID = 6
1,174,470 UART: [idev] SUBJECT.KEYID = 7
1,174,895 UART: [idev] UDS.KEYID = 0
1,182,841 UART: [idev] Erasing UDS.KEYID = 0
1,200,121 UART: [idev] Sha1 KeyId Algorithm
1,208,569 UART: [idev] CSR upload begun
1,210,348 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,813 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,521 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,406 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,238,122 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,587 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,298,377 UART: [idev] CSR uploaded
1,301,422 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,301,591 UART: [idev] --
1,302,672 UART: [ldev] ++
1,302,840 UART: [ldev] CDI.KEYID = 6
1,303,204 UART: [ldev] SUBJECT.KEYID = 5
1,303,631 UART: [ldev] AUTHORITY.KEYID = 7
1,304,094 UART: [ldev] FE.KEYID = 1
1,309,120 UART: [ldev] Erasing FE.KEYID = 1
1,335,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,594 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,366,318 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,373,437 UART: [ldev] --
1,374,857 UART: [fwproc] Wait for Commands...
1,375,446 UART: [fwproc] Recv command 0x46574c44
1,376,179 UART: [fwproc] Recv'd Img size: 106848 bytes
2,587,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,722 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,631,805 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,767,619 >>> mbox cmd response: success
2,767,619 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,768,708 UART: [afmc] ++
2,768,876 UART: [afmc] CDI.KEYID = 6
2,769,239 UART: [afmc] SUBJECT.KEYID = 7
2,769,665 UART: [afmc] AUTHORITY.KEYID = 5
2,805,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,541 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,292 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,828,012 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,833,905 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,839,610 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,847,319 UART: [afmc] --
2,848,291 UART: [cold-reset] --
2,849,347 UART: [state] Locking Datavault
2,850,256 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,860 UART: [state] Locking ICCM
2,851,442 UART: [exit] Launching FMC @ 0x40000000
2,856,739 UART:
2,856,755 UART: Running Caliptra FMC ...
2,857,163 UART:
2,857,301 UART: [fmc] Received command: 0x10000001
2,858,394 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,877,254 UART: [fmc] LDEVID cert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
2,968,231 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,987,822 UART: [fmc] FMCALIAS cert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
3,106,357 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,708 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,541,810 >>> mbox cmd response: success
2,541,810 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,604,827 UART:
2,604,843 UART: Running Caliptra FMC ...
2,605,251 UART:
2,605,389 UART: [fmc] Received command: 0x10000001
2,606,482 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,625,342 UART: [fmc] LDEVID cert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
2,716,319 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,735,910 UART: [fmc] FMCALIAS cert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
2,854,445 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
900,034 UART: [kat] SHA2-256
901,974 UART: [kat] SHA2-384
904,701 UART: [kat] SHA2-512-ACC
906,602 UART: [kat] ECC-384
916,587 UART: [kat] HMAC-384Kdf
921,099 UART: [kat] LMS
1,169,411 UART: [kat] --
1,170,124 UART: [cold-reset] ++
1,170,492 UART: [fht] FHT @ 0x50003400
1,173,290 UART: [idev] ++
1,173,458 UART: [idev] CDI.KEYID = 6
1,173,819 UART: [idev] SUBJECT.KEYID = 7
1,174,244 UART: [idev] UDS.KEYID = 0
1,181,994 UART: [idev] Erasing UDS.KEYID = 0
1,199,424 UART: [idev] Sha1 KeyId Algorithm
1,207,898 UART: [idev] CSR upload begun
1,209,677 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,724 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,432 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,317 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,238,033 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,498 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,298,288 UART: [idev] CSR uploaded
1,301,333 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,301,502 UART: [idev] --
1,302,437 UART: [ldev] ++
1,302,605 UART: [ldev] CDI.KEYID = 6
1,302,969 UART: [ldev] SUBJECT.KEYID = 5
1,303,396 UART: [ldev] AUTHORITY.KEYID = 7
1,303,859 UART: [ldev] FE.KEYID = 1
1,308,887 UART: [ldev] Erasing FE.KEYID = 1
1,335,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,365 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,366,089 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,373,164 UART: [ldev] --
1,374,608 UART: [fwproc] Wait for Commands...
1,375,241 UART: [fwproc] Recv command 0x46574c44
1,375,974 UART: [fwproc] Recv'd Img size: 106848 bytes
2,586,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,305 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,631,388 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,767,186 >>> mbox cmd response: success
2,767,186 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,768,293 UART: [afmc] ++
2,768,461 UART: [afmc] CDI.KEYID = 6
2,768,824 UART: [afmc] SUBJECT.KEYID = 7
2,769,250 UART: [afmc] AUTHORITY.KEYID = 5
2,805,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,183 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,827,903 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,833,796 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,839,501 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,847,350 UART: [afmc] --
2,848,326 UART: [cold-reset] --
2,849,326 UART: [state] Locking Datavault
2,850,777 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,381 UART: [state] Locking ICCM
2,851,887 UART: [exit] Launching FMC @ 0x40000000
2,857,184 UART:
2,857,200 UART: Running Caliptra FMC ...
2,857,608 UART:
2,857,746 UART: [fmc] Received command: 0x10000001
2,858,839 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,877,699 UART: [fmc] LDEVID cert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
2,968,676 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,988,267 UART: [fmc] FMCALIAS cert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
3,106,802 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,957 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,543,873 >>> mbox cmd response: success
2,543,873 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,605,680 UART:
2,605,696 UART: Running Caliptra FMC ...
2,606,104 UART:
2,606,242 UART: [fmc] Received command: 0x10000001
2,607,335 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,626,195 UART: [fmc] LDEVID cert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
2,717,172 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,736,763 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,855,298 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,235 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
891,062 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,191 UART: [kat] ++
895,343 UART: [kat] sha1
899,525 UART: [kat] SHA2-256
901,465 UART: [kat] SHA2-384
904,244 UART: [kat] SHA2-512-ACC
906,145 UART: [kat] ECC-384
915,358 UART: [kat] HMAC-384Kdf
919,924 UART: [kat] LMS
1,168,236 UART: [kat] --
1,169,221 UART: [cold-reset] ++
1,169,657 UART: [fht] FHT @ 0x50003400
1,172,563 UART: [idev] ++
1,172,731 UART: [idev] CDI.KEYID = 6
1,173,092 UART: [idev] SUBJECT.KEYID = 7
1,173,517 UART: [idev] UDS.KEYID = 0
1,181,867 UART: [idev] Erasing UDS.KEYID = 0
1,199,071 UART: [idev] Sha1 KeyId Algorithm
1,207,223 UART: [idev] CSR upload begun
1,209,002 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,863 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,571 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,456 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,172 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,637 UART: [idev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
1,297,427 UART: [idev] CSR uploaded
1,300,472 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,300,641 UART: [idev] --
1,301,688 UART: [ldev] ++
1,301,856 UART: [ldev] CDI.KEYID = 6
1,302,220 UART: [ldev] SUBJECT.KEYID = 5
1,302,647 UART: [ldev] AUTHORITY.KEYID = 7
1,303,110 UART: [ldev] FE.KEYID = 1
1,308,354 UART: [ldev] Erasing FE.KEYID = 1
1,334,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,148 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,364,872 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,371,869 UART: [ldev] --
1,373,153 UART: [fwproc] Wait for Commands...
1,373,802 UART: [fwproc] Recv command 0x46574c44
1,374,535 UART: [fwproc] Recv'd Img size: 106848 bytes
2,585,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,478 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,630,561 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,766,435 >>> mbox cmd response: success
2,766,435 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,767,608 UART: [afmc] ++
2,767,776 UART: [afmc] CDI.KEYID = 6
2,768,139 UART: [afmc] SUBJECT.KEYID = 7
2,768,565 UART: [afmc] AUTHORITY.KEYID = 5
2,804,109 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,855 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,606 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,827,326 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,833,219 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,838,924 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,846,783 UART: [afmc] --
2,847,789 UART: [cold-reset] --
2,848,567 UART: [state] Locking Datavault
2,849,836 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,440 UART: [state] Locking ICCM
2,851,068 UART: [exit] Launching FMC @ 0x40000000
2,856,365 UART:
2,856,381 UART: Running Caliptra FMC ...
2,856,789 UART:
2,856,927 UART: [fmc] Received command: 0x10000001
2,858,020 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,876,880 UART: [fmc] LDEVID cert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
2,967,857 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,987,448 UART: [fmc] FMCALIAS cert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
3,105,983 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,810 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,542,270 >>> mbox cmd response: success
2,542,270 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,603,867 UART:
2,603,883 UART: Running Caliptra FMC ...
2,604,291 UART:
2,604,429 UART: [fmc] Received command: 0x10000001
2,605,522 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,624,382 UART: [fmc] LDEVID cert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
2,715,359 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,734,950 UART: [fmc] FMCALIAS cert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
2,853,485 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
891,605 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,734 UART: [kat] ++
895,886 UART: [kat] sha1
900,230 UART: [kat] SHA2-256
902,170 UART: [kat] SHA2-384
904,783 UART: [kat] SHA2-512-ACC
906,684 UART: [kat] ECC-384
916,135 UART: [kat] HMAC-384Kdf
920,789 UART: [kat] LMS
1,169,101 UART: [kat] --
1,170,008 UART: [cold-reset] ++
1,170,530 UART: [fht] FHT @ 0x50003400
1,173,258 UART: [idev] ++
1,173,426 UART: [idev] CDI.KEYID = 6
1,173,787 UART: [idev] SUBJECT.KEYID = 7
1,174,212 UART: [idev] UDS.KEYID = 0
1,182,222 UART: [idev] Erasing UDS.KEYID = 0
1,198,710 UART: [idev] Sha1 KeyId Algorithm
1,206,942 UART: [idev] CSR upload begun
1,208,721 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,104 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,812 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,697 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,413 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,244,878 UART: [idev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
1,296,668 UART: [idev] CSR uploaded
1,299,713 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,299,882 UART: [idev] --
1,301,037 UART: [ldev] ++
1,301,205 UART: [ldev] CDI.KEYID = 6
1,301,569 UART: [ldev] SUBJECT.KEYID = 5
1,301,996 UART: [ldev] AUTHORITY.KEYID = 7
1,302,459 UART: [ldev] FE.KEYID = 1
1,307,383 UART: [ldev] Erasing FE.KEYID = 1
1,334,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,719 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,443 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,528 UART: [ldev] --
1,373,848 UART: [fwproc] Wait for Commands...
1,374,621 UART: [fwproc] Recv command 0x46574c44
1,375,354 UART: [fwproc] Recv'd Img size: 106848 bytes
2,586,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,593 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,631,676 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,767,464 >>> mbox cmd response: success
2,767,464 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,768,525 UART: [afmc] ++
2,768,693 UART: [afmc] CDI.KEYID = 6
2,769,056 UART: [afmc] SUBJECT.KEYID = 7
2,769,482 UART: [afmc] AUTHORITY.KEYID = 5
2,806,182 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,011 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,828,731 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,834,624 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,840,329 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,848,136 UART: [afmc] --
2,849,042 UART: [cold-reset] --
2,849,828 UART: [state] Locking Datavault
2,851,217 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,821 UART: [state] Locking ICCM
2,852,493 UART: [exit] Launching FMC @ 0x40000000
2,857,790 UART:
2,857,806 UART: Running Caliptra FMC ...
2,858,214 UART:
2,858,352 UART: [fmc] Received command: 0x10000001
2,859,445 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,878,305 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
2,969,282 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,988,873 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
3,107,408 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,743 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,543,893 >>> mbox cmd response: success
2,543,893 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,606,348 UART:
2,606,364 UART: Running Caliptra FMC ...
2,606,772 UART:
2,606,910 UART: [fmc] Received command: 0x10000001
2,608,003 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,626,863 UART: [fmc] LDEVID cert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
2,717,840 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,431 UART: [fmc] FMCALIAS cert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
2,855,966 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,668 UART: [kat] SHA2-256
891,218 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,347 UART: [kat] ++
895,499 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,380 UART: [kat] SHA2-512-ACC
906,281 UART: [kat] ECC-384
916,226 UART: [kat] HMAC-384Kdf
920,776 UART: [kat] LMS
1,169,088 UART: [kat] --
1,169,905 UART: [cold-reset] ++
1,170,285 UART: [fht] FHT @ 0x50003400
1,172,979 UART: [idev] ++
1,173,147 UART: [idev] CDI.KEYID = 6
1,173,508 UART: [idev] SUBJECT.KEYID = 7
1,173,933 UART: [idev] UDS.KEYID = 0
1,182,037 UART: [idev] Erasing UDS.KEYID = 0
1,199,357 UART: [idev] Sha1 KeyId Algorithm
1,207,701 UART: [idev] CSR upload begun
1,209,480 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,089 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,797 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,682 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,398 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,863 UART: [idev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
1,297,653 UART: [idev] CSR uploaded
1,300,698 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,300,867 UART: [idev] --
1,301,936 UART: [ldev] ++
1,302,104 UART: [ldev] CDI.KEYID = 6
1,302,468 UART: [ldev] SUBJECT.KEYID = 5
1,302,895 UART: [ldev] AUTHORITY.KEYID = 7
1,303,358 UART: [ldev] FE.KEYID = 1
1,308,492 UART: [ldev] Erasing FE.KEYID = 1
1,334,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,056 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,364,780 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,371,703 UART: [ldev] --
1,373,091 UART: [fwproc] Wait for Commands...
1,373,756 UART: [fwproc] Recv command 0x46574c44
1,374,489 UART: [fwproc] Recv'd Img size: 106848 bytes
2,585,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,824 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,630,907 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,766,737 >>> mbox cmd response: success
2,766,737 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,767,896 UART: [afmc] ++
2,768,064 UART: [afmc] CDI.KEYID = 6
2,768,427 UART: [afmc] SUBJECT.KEYID = 7
2,768,853 UART: [afmc] AUTHORITY.KEYID = 5
2,804,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,769 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,520 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,827,240 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,833,133 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,838,838 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,846,633 UART: [afmc] --
2,847,609 UART: [cold-reset] --
2,848,535 UART: [state] Locking Datavault
2,849,792 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,396 UART: [state] Locking ICCM
2,851,056 UART: [exit] Launching FMC @ 0x40000000
2,856,353 UART:
2,856,369 UART: Running Caliptra FMC ...
2,856,777 UART:
2,856,915 UART: [fmc] Received command: 0x10000001
2,858,008 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,876,868 UART: [fmc] LDEVID cert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
2,967,845 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,987,436 UART: [fmc] FMCALIAS cert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
3,105,971 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,828 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,542,580 >>> mbox cmd response: success
2,542,580 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,604,699 UART:
2,604,715 UART: Running Caliptra FMC ...
2,605,123 UART:
2,605,261 UART: [fmc] Received command: 0x10000001
2,606,354 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,625,214 UART: [fmc] LDEVID cert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
2,716,191 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,735,782 UART: [fmc] FMCALIAS cert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
2,854,317 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,654 UART: [kat] ++
895,806 UART: [kat] sha1
900,042 UART: [kat] SHA2-256
901,982 UART: [kat] SHA2-384
904,763 UART: [kat] SHA2-512-ACC
906,664 UART: [kat] ECC-384
916,093 UART: [kat] HMAC-384Kdf
920,785 UART: [kat] LMS
1,169,097 UART: [kat] --
1,170,044 UART: [cold-reset] ++
1,170,496 UART: [fht] FHT @ 0x50003400
1,173,346 UART: [idev] ++
1,173,514 UART: [idev] CDI.KEYID = 6
1,173,875 UART: [idev] SUBJECT.KEYID = 7
1,174,300 UART: [idev] UDS.KEYID = 0
1,182,260 UART: [idev] Erasing UDS.KEYID = 0
1,199,464 UART: [idev] Sha1 KeyId Algorithm
1,207,876 UART: [idev] CSR upload begun
1,209,655 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,240 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,948 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,833 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,549 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,014 UART: [idev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
1,297,804 UART: [idev] CSR uploaded
1,300,849 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,301,018 UART: [idev] --
1,302,193 UART: [ldev] ++
1,302,361 UART: [ldev] CDI.KEYID = 6
1,302,725 UART: [ldev] SUBJECT.KEYID = 5
1,303,152 UART: [ldev] AUTHORITY.KEYID = 7
1,303,615 UART: [ldev] FE.KEYID = 1
1,308,975 UART: [ldev] Erasing FE.KEYID = 1
1,335,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,563 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,366,287 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,373,282 UART: [ldev] --
1,374,578 UART: [fwproc] Wait for Commands...
1,375,289 UART: [fwproc] Recv command 0x46574c44
1,376,022 UART: [fwproc] Recv'd Img size: 106848 bytes
2,586,905 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,449 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,632,532 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,768,410 >>> mbox cmd response: success
2,768,410 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,769,611 UART: [afmc] ++
2,769,779 UART: [afmc] CDI.KEYID = 6
2,770,142 UART: [afmc] SUBJECT.KEYID = 7
2,770,568 UART: [afmc] AUTHORITY.KEYID = 5
2,806,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,400 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,151 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,828,871 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,834,764 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,840,469 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,848,324 UART: [afmc] --
2,849,332 UART: [cold-reset] --
2,850,116 UART: [state] Locking Datavault
2,851,601 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,205 UART: [state] Locking ICCM
2,852,749 UART: [exit] Launching FMC @ 0x40000000
2,858,046 UART:
2,858,062 UART: Running Caliptra FMC ...
2,858,470 UART:
2,858,608 UART: [fmc] Received command: 0x10000001
2,859,701 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,878,561 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
2,969,538 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,989,129 UART: [fmc] FMCALIAS cert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
3,107,664 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,303 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,544,439 >>> mbox cmd response: success
2,544,439 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,606,734 UART:
2,606,750 UART: Running Caliptra FMC ...
2,607,158 UART:
2,607,296 UART: [fmc] Received command: 0x10000001
2,608,389 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,627,249 UART: [fmc] LDEVID cert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
2,718,226 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,817 UART: [fmc] FMCALIAS cert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
2,856,352 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Unprovisioned
86,023 UART: [state] DebugLocked = No
86,743 UART: [state] WD Timer not started. Device not locked for debugging
87,884 UART: [kat] SHA2-256
891,434 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,563 UART: [kat] ++
895,715 UART: [kat] sha1
900,083 UART: [kat] SHA2-256
902,023 UART: [kat] SHA2-384
904,804 UART: [kat] SHA2-512-ACC
906,705 UART: [kat] ECC-384
916,058 UART: [kat] HMAC-384Kdf
920,574 UART: [kat] LMS
1,168,886 UART: [kat] --
1,169,609 UART: [cold-reset] ++
1,170,007 UART: [fht] FHT @ 0x50003400
1,172,675 UART: [idev] ++
1,172,843 UART: [idev] CDI.KEYID = 6
1,173,204 UART: [idev] SUBJECT.KEYID = 7
1,173,629 UART: [idev] UDS.KEYID = 0
1,181,297 UART: [idev] Erasing UDS.KEYID = 0
1,198,697 UART: [idev] Sha1 KeyId Algorithm
1,207,667 UART: [idev] --
1,208,620 UART: [ldev] ++
1,208,788 UART: [ldev] CDI.KEYID = 6
1,209,152 UART: [ldev] SUBJECT.KEYID = 5
1,209,579 UART: [ldev] AUTHORITY.KEYID = 7
1,210,042 UART: [ldev] FE.KEYID = 1
1,215,408 UART: [ldev] Erasing FE.KEYID = 1
1,241,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,992 UART: [ldev] --
1,280,328 UART: [fwproc] Wait for Commands...
1,280,989 UART: [fwproc] Recv command 0x46574c44
1,281,722 UART: [fwproc] Recv'd Img size: 114332 bytes
1,547,567 UART: ROM Fatal Error: 0x000B0014
1,548,724 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,399,905 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
891,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,754 UART: [kat] ++
895,906 UART: [kat] sha1
900,136 UART: [kat] SHA2-256
902,076 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
916,363 UART: [kat] HMAC-384Kdf
921,095 UART: [kat] LMS
1,169,407 UART: [kat] --
1,170,588 UART: [cold-reset] ++
1,171,164 UART: [fht] FHT @ 0x50003400
1,173,946 UART: [idev] ++
1,174,114 UART: [idev] CDI.KEYID = 6
1,174,475 UART: [idev] SUBJECT.KEYID = 7
1,174,900 UART: [idev] UDS.KEYID = 0
1,182,766 UART: [idev] Erasing UDS.KEYID = 0
1,199,864 UART: [idev] Sha1 KeyId Algorithm
1,208,736 UART: [idev] --
1,209,631 UART: [ldev] ++
1,209,799 UART: [ldev] CDI.KEYID = 6
1,210,163 UART: [ldev] SUBJECT.KEYID = 5
1,210,590 UART: [ldev] AUTHORITY.KEYID = 7
1,211,053 UART: [ldev] FE.KEYID = 1
1,216,611 UART: [ldev] Erasing FE.KEYID = 1
1,243,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,303 UART: [ldev] --
1,282,787 UART: [fwproc] Wait for Commands...
1,283,576 UART: [fwproc] Recv command 0x46574c44
1,284,309 UART: [fwproc] Recv'd Img size: 114332 bytes
1,551,278 UART: ROM Fatal Error: 0x000B0014
1,552,435 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,836 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
891,444 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,573 UART: [kat] ++
895,725 UART: [kat] sha1
899,815 UART: [kat] SHA2-256
901,755 UART: [kat] SHA2-384
904,426 UART: [kat] SHA2-512-ACC
906,327 UART: [kat] ECC-384
915,814 UART: [kat] HMAC-384Kdf
920,382 UART: [kat] LMS
1,168,694 UART: [kat] --
1,169,413 UART: [cold-reset] ++
1,169,785 UART: [fht] FHT @ 0x50003400
1,172,385 UART: [idev] ++
1,172,553 UART: [idev] CDI.KEYID = 6
1,172,914 UART: [idev] SUBJECT.KEYID = 7
1,173,339 UART: [idev] UDS.KEYID = 0
1,180,843 UART: [idev] Erasing UDS.KEYID = 0
1,198,065 UART: [idev] Sha1 KeyId Algorithm
1,207,043 UART: [idev] --
1,207,840 UART: [ldev] ++
1,208,008 UART: [ldev] CDI.KEYID = 6
1,208,372 UART: [ldev] SUBJECT.KEYID = 5
1,208,799 UART: [ldev] AUTHORITY.KEYID = 7
1,209,262 UART: [ldev] FE.KEYID = 1
1,214,458 UART: [ldev] Erasing FE.KEYID = 1
1,239,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,916 UART: [ldev] --
1,279,368 UART: [fwproc] Wait for Commands...
1,280,145 UART: [fwproc] Recv command 0x46574c44
1,280,878 UART: [fwproc] Recv'd Img size: 114332 bytes
1,546,671 UART: ROM Fatal Error: 0x000B0014
1,547,828 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,233 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,741 UART: [state] LifecycleState = Unprovisioned
86,396 UART: [state] DebugLocked = No
87,006 UART: [state] WD Timer not started. Device not locked for debugging
88,243 UART: [kat] SHA2-256
891,793 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,922 UART: [kat] ++
896,074 UART: [kat] sha1
900,184 UART: [kat] SHA2-256
902,124 UART: [kat] SHA2-384
904,865 UART: [kat] SHA2-512-ACC
906,766 UART: [kat] ECC-384
916,853 UART: [kat] HMAC-384Kdf
921,475 UART: [kat] LMS
1,169,787 UART: [kat] --
1,170,636 UART: [cold-reset] ++
1,170,990 UART: [fht] FHT @ 0x50003400
1,173,584 UART: [idev] ++
1,173,752 UART: [idev] CDI.KEYID = 6
1,174,113 UART: [idev] SUBJECT.KEYID = 7
1,174,538 UART: [idev] UDS.KEYID = 0
1,182,694 UART: [idev] Erasing UDS.KEYID = 0
1,200,154 UART: [idev] Sha1 KeyId Algorithm
1,209,054 UART: [idev] --
1,210,103 UART: [ldev] ++
1,210,271 UART: [ldev] CDI.KEYID = 6
1,210,635 UART: [ldev] SUBJECT.KEYID = 5
1,211,062 UART: [ldev] AUTHORITY.KEYID = 7
1,211,525 UART: [ldev] FE.KEYID = 1
1,217,067 UART: [ldev] Erasing FE.KEYID = 1
1,244,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,043 UART: [ldev] --
1,283,385 UART: [fwproc] Wait for Commands...
1,284,090 UART: [fwproc] Recv command 0x46574c44
1,284,823 UART: [fwproc] Recv'd Img size: 114332 bytes
1,550,480 UART: ROM Fatal Error: 0x000B0014
1,551,637 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,403,246 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
891,296 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,425 UART: [kat] ++
895,577 UART: [kat] sha1
899,757 UART: [kat] SHA2-256
901,697 UART: [kat] SHA2-384
904,550 UART: [kat] SHA2-512-ACC
906,451 UART: [kat] ECC-384
915,874 UART: [kat] HMAC-384Kdf
920,422 UART: [kat] LMS
1,168,734 UART: [kat] --
1,169,623 UART: [cold-reset] ++
1,169,989 UART: [fht] FHT @ 0x50003400
1,172,639 UART: [idev] ++
1,172,807 UART: [idev] CDI.KEYID = 6
1,173,168 UART: [idev] SUBJECT.KEYID = 7
1,173,593 UART: [idev] UDS.KEYID = 0
1,181,563 UART: [idev] Erasing UDS.KEYID = 0
1,198,321 UART: [idev] Sha1 KeyId Algorithm
1,207,203 UART: [idev] --
1,208,278 UART: [ldev] ++
1,208,446 UART: [ldev] CDI.KEYID = 6
1,208,810 UART: [ldev] SUBJECT.KEYID = 5
1,209,237 UART: [ldev] AUTHORITY.KEYID = 7
1,209,700 UART: [ldev] FE.KEYID = 1
1,214,944 UART: [ldev] Erasing FE.KEYID = 1
1,241,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,284 UART: [ldev] --
1,280,714 UART: [fwproc] Wait for Commands...
1,281,493 UART: [fwproc] Recv command 0x46574c44
1,282,226 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,633 UART: ROM Fatal Error: 0x000B0014
1,549,790 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,400,475 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
891,351 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,480 UART: [kat] ++
895,632 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,271 UART: [kat] SHA2-512-ACC
906,172 UART: [kat] ECC-384
915,803 UART: [kat] HMAC-384Kdf
920,525 UART: [kat] LMS
1,168,837 UART: [kat] --
1,169,440 UART: [cold-reset] ++
1,169,788 UART: [fht] FHT @ 0x50003400
1,172,434 UART: [idev] ++
1,172,602 UART: [idev] CDI.KEYID = 6
1,172,963 UART: [idev] SUBJECT.KEYID = 7
1,173,388 UART: [idev] UDS.KEYID = 0
1,181,160 UART: [idev] Erasing UDS.KEYID = 0
1,198,160 UART: [idev] Sha1 KeyId Algorithm
1,207,000 UART: [idev] --
1,208,005 UART: [ldev] ++
1,208,173 UART: [ldev] CDI.KEYID = 6
1,208,537 UART: [ldev] SUBJECT.KEYID = 5
1,208,964 UART: [ldev] AUTHORITY.KEYID = 7
1,209,427 UART: [ldev] FE.KEYID = 1
1,214,215 UART: [ldev] Erasing FE.KEYID = 1
1,240,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,193 UART: [ldev] --
1,279,615 UART: [fwproc] Wait for Commands...
1,280,214 UART: [fwproc] Recv command 0x46574c44
1,280,947 UART: [fwproc] Recv'd Img size: 114332 bytes
1,547,088 UART: ROM Fatal Error: 0x000B0014
1,548,245 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,404,478 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,699 UART: [state] WD Timer not started. Device not locked for debugging
88,032 UART: [kat] SHA2-256
891,582 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,711 UART: [kat] ++
895,863 UART: [kat] sha1
900,009 UART: [kat] SHA2-256
901,949 UART: [kat] SHA2-384
904,890 UART: [kat] SHA2-512-ACC
906,791 UART: [kat] ECC-384
916,546 UART: [kat] HMAC-384Kdf
921,088 UART: [kat] LMS
1,169,400 UART: [kat] --
1,170,115 UART: [cold-reset] ++
1,170,621 UART: [fht] FHT @ 0x50003400
1,173,331 UART: [idev] ++
1,173,499 UART: [idev] CDI.KEYID = 6
1,173,860 UART: [idev] SUBJECT.KEYID = 7
1,174,285 UART: [idev] UDS.KEYID = 0
1,182,139 UART: [idev] Erasing UDS.KEYID = 0
1,199,127 UART: [idev] Sha1 KeyId Algorithm
1,208,129 UART: [idev] --
1,209,138 UART: [ldev] ++
1,209,306 UART: [ldev] CDI.KEYID = 6
1,209,670 UART: [ldev] SUBJECT.KEYID = 5
1,210,097 UART: [ldev] AUTHORITY.KEYID = 7
1,210,560 UART: [ldev] FE.KEYID = 1
1,215,830 UART: [ldev] Erasing FE.KEYID = 1
1,242,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,190 UART: [ldev] --
1,281,682 UART: [fwproc] Wait for Commands...
1,282,349 UART: [fwproc] Recv command 0x46574c44
1,283,082 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,065 UART: ROM Fatal Error: 0x000B0024
1,549,222 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,783 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
891,665 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,794 UART: [kat] ++
895,946 UART: [kat] sha1
900,406 UART: [kat] SHA2-256
902,346 UART: [kat] SHA2-384
904,953 UART: [kat] SHA2-512-ACC
906,854 UART: [kat] ECC-384
916,819 UART: [kat] HMAC-384Kdf
921,321 UART: [kat] LMS
1,169,633 UART: [kat] --
1,170,466 UART: [cold-reset] ++
1,170,810 UART: [fht] FHT @ 0x50003400
1,173,440 UART: [idev] ++
1,173,608 UART: [idev] CDI.KEYID = 6
1,173,969 UART: [idev] SUBJECT.KEYID = 7
1,174,394 UART: [idev] UDS.KEYID = 0
1,182,558 UART: [idev] Erasing UDS.KEYID = 0
1,199,426 UART: [idev] Sha1 KeyId Algorithm
1,208,212 UART: [idev] --
1,209,115 UART: [ldev] ++
1,209,283 UART: [ldev] CDI.KEYID = 6
1,209,647 UART: [ldev] SUBJECT.KEYID = 5
1,210,074 UART: [ldev] AUTHORITY.KEYID = 7
1,210,537 UART: [ldev] FE.KEYID = 1
1,215,887 UART: [ldev] Erasing FE.KEYID = 1
1,242,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,511 UART: [ldev] --
1,281,991 UART: [fwproc] Wait for Commands...
1,282,660 UART: [fwproc] Recv command 0x46574c44
1,283,393 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,450 UART: ROM Fatal Error: 0x000B0024
1,549,607 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,724 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,287 UART: [kat] ++
895,439 UART: [kat] sha1
899,509 UART: [kat] SHA2-256
901,449 UART: [kat] SHA2-384
904,038 UART: [kat] SHA2-512-ACC
905,939 UART: [kat] ECC-384
915,812 UART: [kat] HMAC-384Kdf
920,246 UART: [kat] LMS
1,168,558 UART: [kat] --
1,169,465 UART: [cold-reset] ++
1,169,927 UART: [fht] FHT @ 0x50003400
1,172,459 UART: [idev] ++
1,172,627 UART: [idev] CDI.KEYID = 6
1,172,988 UART: [idev] SUBJECT.KEYID = 7
1,173,413 UART: [idev] UDS.KEYID = 0
1,181,757 UART: [idev] Erasing UDS.KEYID = 0
1,198,617 UART: [idev] Sha1 KeyId Algorithm
1,207,245 UART: [idev] --
1,208,248 UART: [ldev] ++
1,208,416 UART: [ldev] CDI.KEYID = 6
1,208,780 UART: [ldev] SUBJECT.KEYID = 5
1,209,207 UART: [ldev] AUTHORITY.KEYID = 7
1,209,670 UART: [ldev] FE.KEYID = 1
1,214,776 UART: [ldev] Erasing FE.KEYID = 1
1,241,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,862 UART: [ldev] --
1,280,208 UART: [fwproc] Wait for Commands...
1,280,779 UART: [fwproc] Recv command 0x46574c44
1,281,512 UART: [fwproc] Recv'd Img size: 114332 bytes
1,547,733 UART: ROM Fatal Error: 0x000B0024
1,548,890 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,219 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,947 UART: [state] LifecycleState = Unprovisioned
85,602 UART: [state] DebugLocked = No
86,198 UART: [state] WD Timer not started. Device not locked for debugging
87,453 UART: [kat] SHA2-256
891,003 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,132 UART: [kat] ++
895,284 UART: [kat] sha1
899,422 UART: [kat] SHA2-256
901,362 UART: [kat] SHA2-384
904,067 UART: [kat] SHA2-512-ACC
905,968 UART: [kat] ECC-384
915,683 UART: [kat] HMAC-384Kdf
920,233 UART: [kat] LMS
1,168,545 UART: [kat] --
1,169,556 UART: [cold-reset] ++
1,170,116 UART: [fht] FHT @ 0x50003400
1,172,672 UART: [idev] ++
1,172,840 UART: [idev] CDI.KEYID = 6
1,173,201 UART: [idev] SUBJECT.KEYID = 7
1,173,626 UART: [idev] UDS.KEYID = 0
1,182,058 UART: [idev] Erasing UDS.KEYID = 0
1,199,032 UART: [idev] Sha1 KeyId Algorithm
1,208,014 UART: [idev] --
1,208,939 UART: [ldev] ++
1,209,107 UART: [ldev] CDI.KEYID = 6
1,209,471 UART: [ldev] SUBJECT.KEYID = 5
1,209,898 UART: [ldev] AUTHORITY.KEYID = 7
1,210,361 UART: [ldev] FE.KEYID = 1
1,215,411 UART: [ldev] Erasing FE.KEYID = 1
1,241,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,631 UART: [ldev] --
1,280,925 UART: [fwproc] Wait for Commands...
1,281,606 UART: [fwproc] Recv command 0x46574c44
1,282,339 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,634 UART: ROM Fatal Error: 0x000B0024
1,549,791 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,404,640 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,813 UART: [kat] SHA2-256
901,753 UART: [kat] SHA2-384
904,716 UART: [kat] SHA2-512-ACC
906,617 UART: [kat] ECC-384
916,606 UART: [kat] HMAC-384Kdf
921,290 UART: [kat] LMS
1,169,602 UART: [kat] --
1,170,401 UART: [cold-reset] ++
1,170,923 UART: [fht] FHT @ 0x50003400
1,173,463 UART: [idev] ++
1,173,631 UART: [idev] CDI.KEYID = 6
1,173,992 UART: [idev] SUBJECT.KEYID = 7
1,174,417 UART: [idev] UDS.KEYID = 0
1,182,209 UART: [idev] Erasing UDS.KEYID = 0
1,199,599 UART: [idev] Sha1 KeyId Algorithm
1,208,511 UART: [idev] --
1,209,408 UART: [ldev] ++
1,209,576 UART: [ldev] CDI.KEYID = 6
1,209,940 UART: [ldev] SUBJECT.KEYID = 5
1,210,367 UART: [ldev] AUTHORITY.KEYID = 7
1,210,830 UART: [ldev] FE.KEYID = 1
1,215,964 UART: [ldev] Erasing FE.KEYID = 1
1,242,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,198 UART: [ldev] --
1,281,690 UART: [fwproc] Wait for Commands...
1,282,339 UART: [fwproc] Recv command 0x46574c44
1,283,072 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,043 UART: ROM Fatal Error: 0x000B0024
1,550,200 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,193 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,432 UART: [state] WD Timer not started. Device not locked for debugging
87,667 UART: [kat] SHA2-256
891,217 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,346 UART: [kat] ++
895,498 UART: [kat] sha1
899,654 UART: [kat] SHA2-256
901,594 UART: [kat] SHA2-384
904,285 UART: [kat] SHA2-512-ACC
906,186 UART: [kat] ECC-384
915,993 UART: [kat] HMAC-384Kdf
920,495 UART: [kat] LMS
1,168,807 UART: [kat] --
1,169,740 UART: [cold-reset] ++
1,170,202 UART: [fht] FHT @ 0x50003400
1,172,686 UART: [idev] ++
1,172,854 UART: [idev] CDI.KEYID = 6
1,173,215 UART: [idev] SUBJECT.KEYID = 7
1,173,640 UART: [idev] UDS.KEYID = 0
1,181,492 UART: [idev] Erasing UDS.KEYID = 0
1,198,938 UART: [idev] Sha1 KeyId Algorithm
1,207,918 UART: [idev] --
1,208,945 UART: [ldev] ++
1,209,113 UART: [ldev] CDI.KEYID = 6
1,209,477 UART: [ldev] SUBJECT.KEYID = 5
1,209,904 UART: [ldev] AUTHORITY.KEYID = 7
1,210,367 UART: [ldev] FE.KEYID = 1
1,215,835 UART: [ldev] Erasing FE.KEYID = 1
1,242,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,215 UART: [ldev] --
1,281,695 UART: [fwproc] Wait for Commands...
1,282,422 UART: [fwproc] Recv command 0x46574c44
1,283,155 UART: [fwproc] Recv'd Img size: 114332 bytes
1,550,742 UART: ROM Fatal Error: 0x000B0024
1,551,899 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,236 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
891,128 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,257 UART: [kat] ++
895,409 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,300 UART: [kat] SHA2-512-ACC
906,201 UART: [kat] ECC-384
915,896 UART: [kat] HMAC-384Kdf
920,354 UART: [kat] LMS
1,168,666 UART: [kat] --
1,169,731 UART: [cold-reset] ++
1,170,187 UART: [fht] FHT @ 0x50003400
1,172,847 UART: [idev] ++
1,173,015 UART: [idev] CDI.KEYID = 6
1,173,376 UART: [idev] SUBJECT.KEYID = 7
1,173,801 UART: [idev] UDS.KEYID = 0
1,181,979 UART: [idev] Erasing UDS.KEYID = 0
1,198,945 UART: [idev] Sha1 KeyId Algorithm
1,207,897 UART: [idev] --
1,209,018 UART: [ldev] ++
1,209,186 UART: [ldev] CDI.KEYID = 6
1,209,550 UART: [ldev] SUBJECT.KEYID = 5
1,209,977 UART: [ldev] AUTHORITY.KEYID = 7
1,210,440 UART: [ldev] FE.KEYID = 1
1,215,770 UART: [ldev] Erasing FE.KEYID = 1
1,242,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,480 UART: [ldev] --
1,281,882 UART: [fwproc] Wait for Commands...
1,282,549 UART: [fwproc] Recv command 0x46574c44
1,283,282 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,690 UART: ROM Fatal Error: 0x000B0023
1,549,847 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,798 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
891,339 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,468 UART: [kat] ++
895,620 UART: [kat] sha1
899,656 UART: [kat] SHA2-256
901,596 UART: [kat] SHA2-384
904,379 UART: [kat] SHA2-512-ACC
906,280 UART: [kat] ECC-384
916,075 UART: [kat] HMAC-384Kdf
920,539 UART: [kat] LMS
1,168,851 UART: [kat] --
1,169,708 UART: [cold-reset] ++
1,170,262 UART: [fht] FHT @ 0x50003400
1,172,822 UART: [idev] ++
1,172,990 UART: [idev] CDI.KEYID = 6
1,173,351 UART: [idev] SUBJECT.KEYID = 7
1,173,776 UART: [idev] UDS.KEYID = 0
1,181,692 UART: [idev] Erasing UDS.KEYID = 0
1,198,724 UART: [idev] Sha1 KeyId Algorithm
1,207,450 UART: [idev] --
1,208,675 UART: [ldev] ++
1,208,843 UART: [ldev] CDI.KEYID = 6
1,209,207 UART: [ldev] SUBJECT.KEYID = 5
1,209,634 UART: [ldev] AUTHORITY.KEYID = 7
1,210,097 UART: [ldev] FE.KEYID = 1
1,215,373 UART: [ldev] Erasing FE.KEYID = 1
1,242,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,749 UART: [ldev] --
1,281,173 UART: [fwproc] Wait for Commands...
1,281,958 UART: [fwproc] Recv command 0x46574c44
1,282,691 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,025 UART: ROM Fatal Error: 0x000B0023
1,549,182 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,995 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
891,280 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,409 UART: [kat] ++
895,561 UART: [kat] sha1
899,949 UART: [kat] SHA2-256
901,889 UART: [kat] SHA2-384
904,728 UART: [kat] SHA2-512-ACC
906,629 UART: [kat] ECC-384
916,672 UART: [kat] HMAC-384Kdf
921,128 UART: [kat] LMS
1,169,440 UART: [kat] --
1,170,393 UART: [cold-reset] ++
1,170,799 UART: [fht] FHT @ 0x50003400
1,173,433 UART: [idev] ++
1,173,601 UART: [idev] CDI.KEYID = 6
1,173,962 UART: [idev] SUBJECT.KEYID = 7
1,174,387 UART: [idev] UDS.KEYID = 0
1,181,949 UART: [idev] Erasing UDS.KEYID = 0
1,199,305 UART: [idev] Sha1 KeyId Algorithm
1,208,173 UART: [idev] --
1,209,276 UART: [ldev] ++
1,209,444 UART: [ldev] CDI.KEYID = 6
1,209,808 UART: [ldev] SUBJECT.KEYID = 5
1,210,235 UART: [ldev] AUTHORITY.KEYID = 7
1,210,698 UART: [ldev] FE.KEYID = 1
1,215,974 UART: [ldev] Erasing FE.KEYID = 1
1,242,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,880 UART: [ldev] --
1,281,244 UART: [fwproc] Wait for Commands...
1,281,977 UART: [fwproc] Recv command 0x46574c44
1,282,710 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,728 UART: ROM Fatal Error: 0x000B0023
1,549,885 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,528 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,713 UART: [state] LifecycleState = Unprovisioned
86,368 UART: [state] DebugLocked = No
86,914 UART: [state] WD Timer not started. Device not locked for debugging
88,249 UART: [kat] SHA2-256
891,799 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,928 UART: [kat] ++
896,080 UART: [kat] sha1
900,370 UART: [kat] SHA2-256
902,310 UART: [kat] SHA2-384
905,073 UART: [kat] SHA2-512-ACC
906,974 UART: [kat] ECC-384
916,717 UART: [kat] HMAC-384Kdf
921,301 UART: [kat] LMS
1,169,613 UART: [kat] --
1,170,352 UART: [cold-reset] ++
1,170,740 UART: [fht] FHT @ 0x50003400
1,173,508 UART: [idev] ++
1,173,676 UART: [idev] CDI.KEYID = 6
1,174,037 UART: [idev] SUBJECT.KEYID = 7
1,174,462 UART: [idev] UDS.KEYID = 0
1,182,418 UART: [idev] Erasing UDS.KEYID = 0
1,198,898 UART: [idev] Sha1 KeyId Algorithm
1,207,594 UART: [idev] --
1,208,457 UART: [ldev] ++
1,208,625 UART: [ldev] CDI.KEYID = 6
1,208,989 UART: [ldev] SUBJECT.KEYID = 5
1,209,416 UART: [ldev] AUTHORITY.KEYID = 7
1,209,879 UART: [ldev] FE.KEYID = 1
1,215,429 UART: [ldev] Erasing FE.KEYID = 1
1,242,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,319 UART: [ldev] --
1,281,621 UART: [fwproc] Wait for Commands...
1,282,254 UART: [fwproc] Recv command 0x46574c44
1,282,987 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,131 UART: ROM Fatal Error: 0x000B0023
1,550,288 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,957 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,814 UART: [state] LifecycleState = Unprovisioned
85,469 UART: [state] DebugLocked = No
86,175 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
890,978 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,107 UART: [kat] ++
895,259 UART: [kat] sha1
899,529 UART: [kat] SHA2-256
901,469 UART: [kat] SHA2-384
904,354 UART: [kat] SHA2-512-ACC
906,255 UART: [kat] ECC-384
916,302 UART: [kat] HMAC-384Kdf
920,710 UART: [kat] LMS
1,169,022 UART: [kat] --
1,169,933 UART: [cold-reset] ++
1,170,487 UART: [fht] FHT @ 0x50003400
1,173,033 UART: [idev] ++
1,173,201 UART: [idev] CDI.KEYID = 6
1,173,562 UART: [idev] SUBJECT.KEYID = 7
1,173,987 UART: [idev] UDS.KEYID = 0
1,181,869 UART: [idev] Erasing UDS.KEYID = 0
1,199,067 UART: [idev] Sha1 KeyId Algorithm
1,207,991 UART: [idev] --
1,208,934 UART: [ldev] ++
1,209,102 UART: [ldev] CDI.KEYID = 6
1,209,466 UART: [ldev] SUBJECT.KEYID = 5
1,209,893 UART: [ldev] AUTHORITY.KEYID = 7
1,210,356 UART: [ldev] FE.KEYID = 1
1,215,392 UART: [ldev] Erasing FE.KEYID = 1
1,241,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,940 UART: [ldev] --
1,281,254 UART: [fwproc] Wait for Commands...
1,281,847 UART: [fwproc] Recv command 0x46574c44
1,282,580 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,766 UART: ROM Fatal Error: 0x000B0023
1,549,923 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,410 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,125 UART: [state] LifecycleState = Unprovisioned
85,780 UART: [state] DebugLocked = No
86,296 UART: [state] WD Timer not started. Device not locked for debugging
87,539 UART: [kat] SHA2-256
891,089 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,218 UART: [kat] ++
895,370 UART: [kat] sha1
899,690 UART: [kat] SHA2-256
901,630 UART: [kat] SHA2-384
904,253 UART: [kat] SHA2-512-ACC
906,154 UART: [kat] ECC-384
916,185 UART: [kat] HMAC-384Kdf
920,935 UART: [kat] LMS
1,169,247 UART: [kat] --
1,169,848 UART: [cold-reset] ++
1,170,194 UART: [fht] FHT @ 0x50003400
1,172,874 UART: [idev] ++
1,173,042 UART: [idev] CDI.KEYID = 6
1,173,403 UART: [idev] SUBJECT.KEYID = 7
1,173,828 UART: [idev] UDS.KEYID = 0
1,182,482 UART: [idev] Erasing UDS.KEYID = 0
1,199,550 UART: [idev] Sha1 KeyId Algorithm
1,208,408 UART: [idev] --
1,209,557 UART: [ldev] ++
1,209,725 UART: [ldev] CDI.KEYID = 6
1,210,089 UART: [ldev] SUBJECT.KEYID = 5
1,210,516 UART: [ldev] AUTHORITY.KEYID = 7
1,210,979 UART: [ldev] FE.KEYID = 1
1,216,621 UART: [ldev] Erasing FE.KEYID = 1
1,242,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,841 UART: [ldev] --
1,281,185 UART: [fwproc] Wait for Commands...
1,281,872 UART: [fwproc] Recv command 0x46574c44
1,282,605 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,399 UART: ROM Fatal Error: 0x000B0023
1,549,556 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,851 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [kat] SHA2-256
890,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,001 UART: [kat] ++
895,153 UART: [kat] sha1
899,215 UART: [kat] SHA2-256
901,155 UART: [kat] SHA2-384
903,936 UART: [kat] SHA2-512-ACC
905,837 UART: [kat] ECC-384
916,118 UART: [kat] HMAC-384Kdf
920,910 UART: [kat] LMS
1,169,222 UART: [kat] --
1,170,107 UART: [cold-reset] ++
1,170,533 UART: [fht] FHT @ 0x50003400
1,173,175 UART: [idev] ++
1,173,343 UART: [idev] CDI.KEYID = 6
1,173,704 UART: [idev] SUBJECT.KEYID = 7
1,174,129 UART: [idev] UDS.KEYID = 0
1,182,375 UART: [idev] Erasing UDS.KEYID = 0
1,199,335 UART: [idev] Sha1 KeyId Algorithm
1,208,293 UART: [idev] --
1,209,586 UART: [ldev] ++
1,209,754 UART: [ldev] CDI.KEYID = 6
1,210,118 UART: [ldev] SUBJECT.KEYID = 5
1,210,545 UART: [ldev] AUTHORITY.KEYID = 7
1,211,008 UART: [ldev] FE.KEYID = 1
1,216,148 UART: [ldev] Erasing FE.KEYID = 1
1,242,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,470 UART: [ldev] --
1,281,766 UART: [fwproc] Wait for Commands...
1,282,551 UART: [fwproc] Recv command 0x46574c44
1,283,284 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,368 UART: ROM Fatal Error: 0x000B0023
1,549,525 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,894 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
891,477 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,606 UART: [kat] ++
895,758 UART: [kat] sha1
900,002 UART: [kat] SHA2-256
901,942 UART: [kat] SHA2-384
904,741 UART: [kat] SHA2-512-ACC
906,642 UART: [kat] ECC-384
916,553 UART: [kat] HMAC-384Kdf
921,145 UART: [kat] LMS
1,169,457 UART: [kat] --
1,170,394 UART: [cold-reset] ++
1,170,748 UART: [fht] FHT @ 0x50003400
1,173,508 UART: [idev] ++
1,173,676 UART: [idev] CDI.KEYID = 6
1,174,037 UART: [idev] SUBJECT.KEYID = 7
1,174,462 UART: [idev] UDS.KEYID = 0
1,182,284 UART: [idev] Erasing UDS.KEYID = 0
1,199,886 UART: [idev] Sha1 KeyId Algorithm
1,208,744 UART: [idev] --
1,209,611 UART: [ldev] ++
1,209,779 UART: [ldev] CDI.KEYID = 6
1,210,143 UART: [ldev] SUBJECT.KEYID = 5
1,210,570 UART: [ldev] AUTHORITY.KEYID = 7
1,211,033 UART: [ldev] FE.KEYID = 1
1,216,381 UART: [ldev] Erasing FE.KEYID = 1
1,242,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,757 UART: [ldev] --
1,282,063 UART: [fwproc] Wait for Commands...
1,282,726 UART: [fwproc] Recv command 0x46574c44
1,283,459 UART: [fwproc] Recv'd Img size: 114332 bytes
1,550,065 UART: ROM Fatal Error: 0x000B0023
1,551,222 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,243 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,485 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
891,388 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,517 UART: [kat] ++
895,669 UART: [kat] sha1
899,817 UART: [kat] SHA2-256
901,757 UART: [kat] SHA2-384
904,520 UART: [kat] SHA2-512-ACC
906,421 UART: [kat] ECC-384
915,864 UART: [kat] HMAC-384Kdf
920,568 UART: [kat] LMS
1,168,880 UART: [kat] --
1,169,809 UART: [cold-reset] ++
1,170,207 UART: [fht] FHT @ 0x50003400
1,172,849 UART: [idev] ++
1,173,017 UART: [idev] CDI.KEYID = 6
1,173,378 UART: [idev] SUBJECT.KEYID = 7
1,173,803 UART: [idev] UDS.KEYID = 0
1,181,431 UART: [idev] Erasing UDS.KEYID = 0
1,198,377 UART: [idev] Sha1 KeyId Algorithm
1,207,323 UART: [idev] --
1,208,370 UART: [ldev] ++
1,208,538 UART: [ldev] CDI.KEYID = 6
1,208,902 UART: [ldev] SUBJECT.KEYID = 5
1,209,329 UART: [ldev] AUTHORITY.KEYID = 7
1,209,792 UART: [ldev] FE.KEYID = 1
1,214,918 UART: [ldev] Erasing FE.KEYID = 1
1,241,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,878 UART: [ldev] --
1,280,166 UART: [fwproc] Wait for Commands...
1,280,835 UART: [fwproc] Recv command 0x46574c44
1,281,568 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,406 UART: ROM Fatal Error: 0x000B0023
1,549,563 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,400,990 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,975 UART: [state] LifecycleState = Unprovisioned
85,630 UART: [state] DebugLocked = No
86,272 UART: [state] WD Timer not started. Device not locked for debugging
87,629 UART: [kat] SHA2-256
891,179 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,308 UART: [kat] ++
895,460 UART: [kat] sha1
899,714 UART: [kat] SHA2-256
901,654 UART: [kat] SHA2-384
904,515 UART: [kat] SHA2-512-ACC
906,416 UART: [kat] ECC-384
916,145 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,169,818 UART: [cold-reset] ++
1,170,302 UART: [fht] FHT @ 0x50003400
1,173,006 UART: [idev] ++
1,173,174 UART: [idev] CDI.KEYID = 6
1,173,535 UART: [idev] SUBJECT.KEYID = 7
1,173,960 UART: [idev] UDS.KEYID = 0
1,182,168 UART: [idev] Erasing UDS.KEYID = 0
1,199,500 UART: [idev] Sha1 KeyId Algorithm
1,208,306 UART: [idev] --
1,209,229 UART: [ldev] ++
1,209,397 UART: [ldev] CDI.KEYID = 6
1,209,761 UART: [ldev] SUBJECT.KEYID = 5
1,210,188 UART: [ldev] AUTHORITY.KEYID = 7
1,210,651 UART: [ldev] FE.KEYID = 1
1,215,853 UART: [ldev] Erasing FE.KEYID = 1
1,241,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,213 UART: [ldev] --
1,281,625 UART: [fwproc] Wait for Commands...
1,282,266 UART: [fwproc] Recv command 0x46574c44
1,282,999 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,823 UART: ROM Fatal Error: 0x000B0023
1,549,980 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,167 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,538 UART: [state] LifecycleState = Unprovisioned
86,193 UART: [state] DebugLocked = No
86,845 UART: [state] WD Timer not started. Device not locked for debugging
88,084 UART: [kat] SHA2-256
891,634 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,763 UART: [kat] ++
895,915 UART: [kat] sha1
900,183 UART: [kat] SHA2-256
902,123 UART: [kat] SHA2-384
904,774 UART: [kat] SHA2-512-ACC
906,675 UART: [kat] ECC-384
916,464 UART: [kat] HMAC-384Kdf
921,144 UART: [kat] LMS
1,169,456 UART: [kat] --
1,170,351 UART: [cold-reset] ++
1,170,773 UART: [fht] FHT @ 0x50003400
1,173,563 UART: [idev] ++
1,173,731 UART: [idev] CDI.KEYID = 6
1,174,092 UART: [idev] SUBJECT.KEYID = 7
1,174,517 UART: [idev] UDS.KEYID = 0
1,182,619 UART: [idev] Erasing UDS.KEYID = 0
1,199,561 UART: [idev] Sha1 KeyId Algorithm
1,208,493 UART: [idev] --
1,209,696 UART: [ldev] ++
1,209,864 UART: [ldev] CDI.KEYID = 6
1,210,228 UART: [ldev] SUBJECT.KEYID = 5
1,210,655 UART: [ldev] AUTHORITY.KEYID = 7
1,211,118 UART: [ldev] FE.KEYID = 1
1,216,350 UART: [ldev] Erasing FE.KEYID = 1
1,242,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,754 UART: [ldev] --
1,282,054 UART: [fwproc] Wait for Commands...
1,282,811 UART: [fwproc] Recv command 0x46574c44
1,283,544 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,600 UART: ROM Fatal Error: 0x000B0023
1,550,757 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,310 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,848 UART: [state] DebugLocked = No
86,354 UART: [state] WD Timer not started. Device not locked for debugging
87,519 UART: [kat] SHA2-256
891,069 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,198 UART: [kat] ++
895,350 UART: [kat] sha1
899,682 UART: [kat] SHA2-256
901,622 UART: [kat] SHA2-384
904,493 UART: [kat] SHA2-512-ACC
906,394 UART: [kat] ECC-384
915,917 UART: [kat] HMAC-384Kdf
920,707 UART: [kat] LMS
1,169,019 UART: [kat] --
1,170,016 UART: [cold-reset] ++
1,170,470 UART: [fht] FHT @ 0x50003400
1,173,054 UART: [idev] ++
1,173,222 UART: [idev] CDI.KEYID = 6
1,173,583 UART: [idev] SUBJECT.KEYID = 7
1,174,008 UART: [idev] UDS.KEYID = 0
1,182,070 UART: [idev] Erasing UDS.KEYID = 0
1,198,780 UART: [idev] Sha1 KeyId Algorithm
1,207,812 UART: [idev] --
1,208,739 UART: [ldev] ++
1,208,907 UART: [ldev] CDI.KEYID = 6
1,209,271 UART: [ldev] SUBJECT.KEYID = 5
1,209,698 UART: [ldev] AUTHORITY.KEYID = 7
1,210,161 UART: [ldev] FE.KEYID = 1
1,215,385 UART: [ldev] Erasing FE.KEYID = 1
1,241,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,467 UART: [ldev] --
1,280,841 UART: [fwproc] Wait for Commands...
1,281,488 UART: [fwproc] Recv command 0x46574c44
1,282,221 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,053 UART: ROM Fatal Error: 0x000B0023
1,549,210 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,875 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
890,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,103 UART: [kat] ++
895,255 UART: [kat] sha1
899,535 UART: [kat] SHA2-256
901,475 UART: [kat] SHA2-384
904,086 UART: [kat] SHA2-512-ACC
905,987 UART: [kat] ECC-384
915,896 UART: [kat] HMAC-384Kdf
920,462 UART: [kat] LMS
1,168,774 UART: [kat] --
1,169,711 UART: [cold-reset] ++
1,170,041 UART: [fht] FHT @ 0x50003400
1,172,611 UART: [idev] ++
1,172,779 UART: [idev] CDI.KEYID = 6
1,173,140 UART: [idev] SUBJECT.KEYID = 7
1,173,565 UART: [idev] UDS.KEYID = 0
1,181,271 UART: [idev] Erasing UDS.KEYID = 0
1,198,565 UART: [idev] Sha1 KeyId Algorithm
1,207,579 UART: [idev] --
1,208,544 UART: [ldev] ++
1,208,712 UART: [ldev] CDI.KEYID = 6
1,209,076 UART: [ldev] SUBJECT.KEYID = 5
1,209,503 UART: [ldev] AUTHORITY.KEYID = 7
1,209,966 UART: [ldev] FE.KEYID = 1
1,215,302 UART: [ldev] Erasing FE.KEYID = 1
1,241,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,654 UART: [ldev] --
1,281,082 UART: [fwproc] Wait for Commands...
1,281,879 UART: [fwproc] Recv command 0x46574c44
1,282,612 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,173 UART: ROM Fatal Error: 0x000B0021
1,550,330 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,917 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
891,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,808 UART: [kat] ++
895,960 UART: [kat] sha1
900,276 UART: [kat] SHA2-256
902,216 UART: [kat] SHA2-384
904,881 UART: [kat] SHA2-512-ACC
906,782 UART: [kat] ECC-384
916,915 UART: [kat] HMAC-384Kdf
921,597 UART: [kat] LMS
1,169,909 UART: [kat] --
1,170,758 UART: [cold-reset] ++
1,171,150 UART: [fht] FHT @ 0x50003400
1,173,722 UART: [idev] ++
1,173,890 UART: [idev] CDI.KEYID = 6
1,174,251 UART: [idev] SUBJECT.KEYID = 7
1,174,676 UART: [idev] UDS.KEYID = 0
1,182,672 UART: [idev] Erasing UDS.KEYID = 0
1,200,286 UART: [idev] Sha1 KeyId Algorithm
1,209,080 UART: [idev] --
1,210,085 UART: [ldev] ++
1,210,253 UART: [ldev] CDI.KEYID = 6
1,210,617 UART: [ldev] SUBJECT.KEYID = 5
1,211,044 UART: [ldev] AUTHORITY.KEYID = 7
1,211,507 UART: [ldev] FE.KEYID = 1
1,216,817 UART: [ldev] Erasing FE.KEYID = 1
1,242,850 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,341 UART: [ldev] --
1,281,625 UART: [fwproc] Wait for Commands...
1,282,238 UART: [fwproc] Recv command 0x46574c44
1,282,971 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,854 UART: ROM Fatal Error: 0x000B0021
1,550,011 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,400,240 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,713 UART: [state] WD Timer not started. Device not locked for debugging
87,862 UART: [kat] SHA2-256
891,412 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,541 UART: [kat] ++
895,693 UART: [kat] sha1
899,867 UART: [kat] SHA2-256
901,807 UART: [kat] SHA2-384
904,494 UART: [kat] SHA2-512-ACC
906,395 UART: [kat] ECC-384
916,052 UART: [kat] HMAC-384Kdf
920,564 UART: [kat] LMS
1,168,876 UART: [kat] --
1,169,745 UART: [cold-reset] ++
1,170,169 UART: [fht] FHT @ 0x50003400
1,172,925 UART: [idev] ++
1,173,093 UART: [idev] CDI.KEYID = 6
1,173,454 UART: [idev] SUBJECT.KEYID = 7
1,173,879 UART: [idev] UDS.KEYID = 0
1,182,075 UART: [idev] Erasing UDS.KEYID = 0
1,199,319 UART: [idev] Sha1 KeyId Algorithm
1,208,105 UART: [idev] --
1,209,254 UART: [ldev] ++
1,209,422 UART: [ldev] CDI.KEYID = 6
1,209,786 UART: [ldev] SUBJECT.KEYID = 5
1,210,213 UART: [ldev] AUTHORITY.KEYID = 7
1,210,676 UART: [ldev] FE.KEYID = 1
1,215,808 UART: [ldev] Erasing FE.KEYID = 1
1,241,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,228 UART: [ldev] --
1,280,534 UART: [fwproc] Wait for Commands...
1,281,281 UART: [fwproc] Recv command 0x46574c44
1,282,014 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,309 UART: ROM Fatal Error: 0x000B0021
1,549,466 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,587 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,508 UART: [state] WD Timer not started. Device not locked for debugging
87,645 UART: [kat] SHA2-256
891,195 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,324 UART: [kat] ++
895,476 UART: [kat] sha1
899,566 UART: [kat] SHA2-256
901,506 UART: [kat] SHA2-384
904,395 UART: [kat] SHA2-512-ACC
906,296 UART: [kat] ECC-384
915,577 UART: [kat] HMAC-384Kdf
920,223 UART: [kat] LMS
1,168,535 UART: [kat] --
1,169,468 UART: [cold-reset] ++
1,170,006 UART: [fht] FHT @ 0x50003400
1,172,598 UART: [idev] ++
1,172,766 UART: [idev] CDI.KEYID = 6
1,173,127 UART: [idev] SUBJECT.KEYID = 7
1,173,552 UART: [idev] UDS.KEYID = 0
1,181,738 UART: [idev] Erasing UDS.KEYID = 0
1,198,680 UART: [idev] Sha1 KeyId Algorithm
1,207,528 UART: [idev] --
1,208,597 UART: [ldev] ++
1,208,765 UART: [ldev] CDI.KEYID = 6
1,209,129 UART: [ldev] SUBJECT.KEYID = 5
1,209,556 UART: [ldev] AUTHORITY.KEYID = 7
1,210,019 UART: [ldev] FE.KEYID = 1
1,215,393 UART: [ldev] Erasing FE.KEYID = 1
1,241,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,385 UART: [ldev] --
1,280,789 UART: [fwproc] Wait for Commands...
1,281,598 UART: [fwproc] Recv command 0x46574c44
1,282,331 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,264 UART: ROM Fatal Error: 0x000B0021
1,549,421 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,980 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,183 UART: [state] WD Timer not started. Device not locked for debugging
87,320 UART: [kat] SHA2-256
890,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,999 UART: [kat] ++
895,151 UART: [kat] sha1
899,467 UART: [kat] SHA2-256
901,407 UART: [kat] SHA2-384
904,138 UART: [kat] SHA2-512-ACC
906,039 UART: [kat] ECC-384
915,726 UART: [kat] HMAC-384Kdf
920,158 UART: [kat] LMS
1,168,470 UART: [kat] --
1,169,431 UART: [cold-reset] ++
1,169,919 UART: [fht] FHT @ 0x50003400
1,172,557 UART: [idev] ++
1,172,725 UART: [idev] CDI.KEYID = 6
1,173,086 UART: [idev] SUBJECT.KEYID = 7
1,173,511 UART: [idev] UDS.KEYID = 0
1,181,769 UART: [idev] Erasing UDS.KEYID = 0
1,198,555 UART: [idev] Sha1 KeyId Algorithm
1,207,421 UART: [idev] --
1,208,348 UART: [ldev] ++
1,208,516 UART: [ldev] CDI.KEYID = 6
1,208,880 UART: [ldev] SUBJECT.KEYID = 5
1,209,307 UART: [ldev] AUTHORITY.KEYID = 7
1,209,770 UART: [ldev] FE.KEYID = 1
1,214,638 UART: [ldev] Erasing FE.KEYID = 1
1,241,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,058 UART: [ldev] --
1,280,476 UART: [fwproc] Wait for Commands...
1,281,221 UART: [fwproc] Recv command 0x46574c44
1,281,954 UART: [fwproc] Recv'd Img size: 114332 bytes
1,547,971 UART: ROM Fatal Error: 0x000B0021
1,549,128 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,359 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,839 UART: [kat] SHA2-256
891,389 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,518 UART: [kat] ++
895,670 UART: [kat] sha1
899,974 UART: [kat] SHA2-256
901,914 UART: [kat] SHA2-384
904,863 UART: [kat] SHA2-512-ACC
906,764 UART: [kat] ECC-384
916,457 UART: [kat] HMAC-384Kdf
921,105 UART: [kat] LMS
1,169,417 UART: [kat] --
1,170,372 UART: [cold-reset] ++
1,170,740 UART: [fht] FHT @ 0x50003400
1,173,386 UART: [idev] ++
1,173,554 UART: [idev] CDI.KEYID = 6
1,173,915 UART: [idev] SUBJECT.KEYID = 7
1,174,340 UART: [idev] UDS.KEYID = 0
1,182,610 UART: [idev] Erasing UDS.KEYID = 0
1,199,822 UART: [idev] Sha1 KeyId Algorithm
1,208,636 UART: [idev] --
1,209,837 UART: [ldev] ++
1,210,005 UART: [ldev] CDI.KEYID = 6
1,210,369 UART: [ldev] SUBJECT.KEYID = 5
1,210,796 UART: [ldev] AUTHORITY.KEYID = 7
1,211,259 UART: [ldev] FE.KEYID = 1
1,216,163 UART: [ldev] Erasing FE.KEYID = 1
1,242,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,505 UART: [ldev] --
1,281,841 UART: [fwproc] Wait for Commands...
1,282,506 UART: [fwproc] Recv command 0x46574c44
1,283,239 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,426 UART: ROM Fatal Error: 0x000B0021
1,549,583 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,404,652 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
891,148 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,277 UART: [kat] ++
895,429 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,606 UART: [kat] SHA2-512-ACC
906,507 UART: [kat] ECC-384
916,080 UART: [kat] HMAC-384Kdf
920,790 UART: [kat] LMS
1,169,102 UART: [kat] --
1,170,203 UART: [cold-reset] ++
1,170,579 UART: [fht] FHT @ 0x50003400
1,173,173 UART: [idev] ++
1,173,341 UART: [idev] CDI.KEYID = 6
1,173,702 UART: [idev] SUBJECT.KEYID = 7
1,174,127 UART: [idev] UDS.KEYID = 0
1,182,617 UART: [idev] Erasing UDS.KEYID = 0
1,199,541 UART: [idev] Sha1 KeyId Algorithm
1,208,471 UART: [idev] --
1,209,544 UART: [ldev] ++
1,209,712 UART: [ldev] CDI.KEYID = 6
1,210,076 UART: [ldev] SUBJECT.KEYID = 5
1,210,503 UART: [ldev] AUTHORITY.KEYID = 7
1,210,966 UART: [ldev] FE.KEYID = 1
1,215,992 UART: [ldev] Erasing FE.KEYID = 1
1,242,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,954 UART: [ldev] --
1,282,364 UART: [fwproc] Wait for Commands...
1,283,089 UART: [fwproc] Recv command 0x46574c44
1,283,822 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,973 UART: ROM Fatal Error: 0x000B0021
1,551,130 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,297 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,620 UART: [kat] ++
895,772 UART: [kat] sha1
900,072 UART: [kat] SHA2-256
902,012 UART: [kat] SHA2-384
904,761 UART: [kat] SHA2-512-ACC
906,662 UART: [kat] ECC-384
916,589 UART: [kat] HMAC-384Kdf
921,215 UART: [kat] LMS
1,169,527 UART: [kat] --
1,170,264 UART: [cold-reset] ++
1,170,646 UART: [fht] FHT @ 0x50003400
1,173,196 UART: [idev] ++
1,173,364 UART: [idev] CDI.KEYID = 6
1,173,725 UART: [idev] SUBJECT.KEYID = 7
1,174,150 UART: [idev] UDS.KEYID = 0
1,182,278 UART: [idev] Erasing UDS.KEYID = 0
1,199,530 UART: [idev] Sha1 KeyId Algorithm
1,208,216 UART: [idev] --
1,209,273 UART: [ldev] ++
1,209,441 UART: [ldev] CDI.KEYID = 6
1,209,805 UART: [ldev] SUBJECT.KEYID = 5
1,210,232 UART: [ldev] AUTHORITY.KEYID = 7
1,210,695 UART: [ldev] FE.KEYID = 1
1,216,285 UART: [ldev] Erasing FE.KEYID = 1
1,242,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,579 UART: [ldev] --
1,281,915 UART: [fwproc] Wait for Commands...
1,282,524 UART: [fwproc] Recv command 0x46574c44
1,283,257 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,488 UART: ROM Fatal Error: 0x000B0021
1,550,645 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,403,060 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
891,314 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,443 UART: [kat] ++
895,595 UART: [kat] sha1
900,057 UART: [kat] SHA2-256
901,997 UART: [kat] SHA2-384
904,794 UART: [kat] SHA2-512-ACC
906,695 UART: [kat] ECC-384
916,200 UART: [kat] HMAC-384Kdf
920,862 UART: [kat] LMS
1,169,174 UART: [kat] --
1,170,179 UART: [cold-reset] ++
1,170,707 UART: [fht] FHT @ 0x50003400
1,173,491 UART: [idev] ++
1,173,659 UART: [idev] CDI.KEYID = 6
1,174,020 UART: [idev] SUBJECT.KEYID = 7
1,174,445 UART: [idev] UDS.KEYID = 0
1,182,245 UART: [idev] Erasing UDS.KEYID = 0
1,199,079 UART: [idev] Sha1 KeyId Algorithm
1,207,853 UART: [idev] --
1,208,866 UART: [ldev] ++
1,209,034 UART: [ldev] CDI.KEYID = 6
1,209,398 UART: [ldev] SUBJECT.KEYID = 5
1,209,825 UART: [ldev] AUTHORITY.KEYID = 7
1,210,288 UART: [ldev] FE.KEYID = 1
1,215,484 UART: [ldev] Erasing FE.KEYID = 1
1,241,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,538 UART: [ldev] --
1,280,966 UART: [fwproc] Wait for Commands...
1,281,593 UART: [fwproc] Recv command 0x46574c44
1,282,326 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,103 UART: ROM Fatal Error: 0x000B0021
1,549,260 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,015 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
891,605 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,734 UART: [kat] ++
895,886 UART: [kat] sha1
900,082 UART: [kat] SHA2-256
902,022 UART: [kat] SHA2-384
904,699 UART: [kat] SHA2-512-ACC
906,600 UART: [kat] ECC-384
916,279 UART: [kat] HMAC-384Kdf
920,857 UART: [kat] LMS
1,169,169 UART: [kat] --
1,170,088 UART: [cold-reset] ++
1,170,500 UART: [fht] FHT @ 0x50003400
1,173,052 UART: [idev] ++
1,173,220 UART: [idev] CDI.KEYID = 6
1,173,581 UART: [idev] SUBJECT.KEYID = 7
1,174,006 UART: [idev] UDS.KEYID = 0
1,182,286 UART: [idev] Erasing UDS.KEYID = 0
1,198,668 UART: [idev] Sha1 KeyId Algorithm
1,207,528 UART: [idev] --
1,208,643 UART: [ldev] ++
1,208,811 UART: [ldev] CDI.KEYID = 6
1,209,175 UART: [ldev] SUBJECT.KEYID = 5
1,209,602 UART: [ldev] AUTHORITY.KEYID = 7
1,210,065 UART: [ldev] FE.KEYID = 1
1,215,293 UART: [ldev] Erasing FE.KEYID = 1
1,241,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,397 UART: [ldev] --
1,280,793 UART: [fwproc] Wait for Commands...
1,281,584 UART: [fwproc] Recv command 0x46574c44
1,282,317 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,954 UART: ROM Fatal Error: 0x000B0021
1,550,111 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,648 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,314 UART: [kat] SHA2-256
890,864 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,993 UART: [kat] ++
895,145 UART: [kat] sha1
899,565 UART: [kat] SHA2-256
901,505 UART: [kat] SHA2-384
904,256 UART: [kat] SHA2-512-ACC
906,157 UART: [kat] ECC-384
915,730 UART: [kat] HMAC-384Kdf
920,446 UART: [kat] LMS
1,168,758 UART: [kat] --
1,169,559 UART: [cold-reset] ++
1,170,087 UART: [fht] FHT @ 0x50003400
1,172,533 UART: [idev] ++
1,172,701 UART: [idev] CDI.KEYID = 6
1,173,062 UART: [idev] SUBJECT.KEYID = 7
1,173,487 UART: [idev] UDS.KEYID = 0
1,181,209 UART: [idev] Erasing UDS.KEYID = 0
1,198,059 UART: [idev] Sha1 KeyId Algorithm
1,206,903 UART: [idev] --
1,207,784 UART: [ldev] ++
1,207,952 UART: [ldev] CDI.KEYID = 6
1,208,316 UART: [ldev] SUBJECT.KEYID = 5
1,208,743 UART: [ldev] AUTHORITY.KEYID = 7
1,209,206 UART: [ldev] FE.KEYID = 1
1,214,270 UART: [ldev] Erasing FE.KEYID = 1
1,240,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,678 UART: [ldev] --
1,280,010 UART: [fwproc] Wait for Commands...
1,280,725 UART: [fwproc] Recv command 0x46574c44
1,281,458 UART: [fwproc] Recv'd Img size: 114332 bytes
1,547,931 UART: ROM Fatal Error: 0x000B0021
1,549,088 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,400,506 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,650 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
891,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,614 UART: [kat] ++
895,766 UART: [kat] sha1
900,170 UART: [kat] SHA2-256
902,110 UART: [kat] SHA2-384
904,985 UART: [kat] SHA2-512-ACC
906,886 UART: [kat] ECC-384
916,709 UART: [kat] HMAC-384Kdf
921,383 UART: [kat] LMS
1,169,695 UART: [kat] --
1,170,492 UART: [cold-reset] ++
1,170,992 UART: [fht] FHT @ 0x50003400
1,173,730 UART: [idev] ++
1,173,898 UART: [idev] CDI.KEYID = 6
1,174,259 UART: [idev] SUBJECT.KEYID = 7
1,174,684 UART: [idev] UDS.KEYID = 0
1,182,516 UART: [idev] Erasing UDS.KEYID = 0
1,200,236 UART: [idev] Sha1 KeyId Algorithm
1,208,968 UART: [idev] --
1,209,977 UART: [ldev] ++
1,210,145 UART: [ldev] CDI.KEYID = 6
1,210,509 UART: [ldev] SUBJECT.KEYID = 5
1,210,936 UART: [ldev] AUTHORITY.KEYID = 7
1,211,399 UART: [ldev] FE.KEYID = 1
1,216,851 UART: [ldev] Erasing FE.KEYID = 1
1,243,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,753 UART: [ldev] --
1,282,167 UART: [fwproc] Wait for Commands...
1,282,956 UART: [fwproc] Recv command 0x46574c44
1,283,689 UART: [fwproc] Recv'd Img size: 114332 bytes
1,550,304 UART: ROM Fatal Error: 0x000B0021
1,551,461 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,608 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
891,182 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,311 UART: [kat] ++
895,463 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,416 UART: [kat] SHA2-512-ACC
906,317 UART: [kat] ECC-384
916,200 UART: [kat] HMAC-384Kdf
920,724 UART: [kat] LMS
1,169,036 UART: [kat] --
1,169,797 UART: [cold-reset] ++
1,170,325 UART: [fht] FHT @ 0x50003400
1,172,761 UART: [idev] ++
1,172,929 UART: [idev] CDI.KEYID = 6
1,173,290 UART: [idev] SUBJECT.KEYID = 7
1,173,715 UART: [idev] UDS.KEYID = 0
1,181,893 UART: [idev] Erasing UDS.KEYID = 0
1,198,763 UART: [idev] Sha1 KeyId Algorithm
1,207,673 UART: [idev] --
1,208,624 UART: [ldev] ++
1,208,792 UART: [ldev] CDI.KEYID = 6
1,209,156 UART: [ldev] SUBJECT.KEYID = 5
1,209,583 UART: [ldev] AUTHORITY.KEYID = 7
1,210,046 UART: [ldev] FE.KEYID = 1
1,215,210 UART: [ldev] Erasing FE.KEYID = 1
1,241,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,452 UART: [ldev] --
1,280,842 UART: [fwproc] Wait for Commands...
1,281,507 UART: [fwproc] Recv command 0x46574c44
1,282,240 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,849 UART: ROM Fatal Error: 0x000B0022
1,550,006 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,400,059 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
88,099 UART: [kat] SHA2-256
891,649 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,778 UART: [kat] ++
895,930 UART: [kat] sha1
900,046 UART: [kat] SHA2-256
901,986 UART: [kat] SHA2-384
904,723 UART: [kat] SHA2-512-ACC
906,624 UART: [kat] ECC-384
916,447 UART: [kat] HMAC-384Kdf
921,061 UART: [kat] LMS
1,169,373 UART: [kat] --
1,170,396 UART: [cold-reset] ++
1,170,908 UART: [fht] FHT @ 0x50003400
1,173,448 UART: [idev] ++
1,173,616 UART: [idev] CDI.KEYID = 6
1,173,977 UART: [idev] SUBJECT.KEYID = 7
1,174,402 UART: [idev] UDS.KEYID = 0
1,182,470 UART: [idev] Erasing UDS.KEYID = 0
1,199,306 UART: [idev] Sha1 KeyId Algorithm
1,208,318 UART: [idev] --
1,209,465 UART: [ldev] ++
1,209,633 UART: [ldev] CDI.KEYID = 6
1,209,997 UART: [ldev] SUBJECT.KEYID = 5
1,210,424 UART: [ldev] AUTHORITY.KEYID = 7
1,210,887 UART: [ldev] FE.KEYID = 1
1,216,235 UART: [ldev] Erasing FE.KEYID = 1
1,242,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,333 UART: [ldev] --
1,282,843 UART: [fwproc] Wait for Commands...
1,283,540 UART: [fwproc] Recv command 0x46574c44
1,284,273 UART: [fwproc] Recv'd Img size: 114332 bytes
1,551,042 UART: ROM Fatal Error: 0x000B0022
1,552,199 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,403,984 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,338 UART: [kat] SHA2-256
890,888 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,017 UART: [kat] ++
895,169 UART: [kat] sha1
899,329 UART: [kat] SHA2-256
901,269 UART: [kat] SHA2-384
903,930 UART: [kat] SHA2-512-ACC
905,831 UART: [kat] ECC-384
915,370 UART: [kat] HMAC-384Kdf
919,944 UART: [kat] LMS
1,168,256 UART: [kat] --
1,169,261 UART: [cold-reset] ++
1,169,639 UART: [fht] FHT @ 0x50003400
1,172,301 UART: [idev] ++
1,172,469 UART: [idev] CDI.KEYID = 6
1,172,830 UART: [idev] SUBJECT.KEYID = 7
1,173,255 UART: [idev] UDS.KEYID = 0
1,181,007 UART: [idev] Erasing UDS.KEYID = 0
1,198,251 UART: [idev] Sha1 KeyId Algorithm
1,207,041 UART: [idev] --
1,208,116 UART: [ldev] ++
1,208,284 UART: [ldev] CDI.KEYID = 6
1,208,648 UART: [ldev] SUBJECT.KEYID = 5
1,209,075 UART: [ldev] AUTHORITY.KEYID = 7
1,209,538 UART: [ldev] FE.KEYID = 1
1,214,866 UART: [ldev] Erasing FE.KEYID = 1
1,241,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,278 UART: [ldev] --
1,280,704 UART: [fwproc] Wait for Commands...
1,281,517 UART: [fwproc] Recv command 0x46574c44
1,282,250 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,199 UART: ROM Fatal Error: 0x000B0022
1,549,356 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,400,895 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [kat] SHA2-256
891,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,690 UART: [kat] ++
895,842 UART: [kat] sha1
900,082 UART: [kat] SHA2-256
902,022 UART: [kat] SHA2-384
904,827 UART: [kat] SHA2-512-ACC
906,728 UART: [kat] ECC-384
916,753 UART: [kat] HMAC-384Kdf
921,417 UART: [kat] LMS
1,169,729 UART: [kat] --
1,170,552 UART: [cold-reset] ++
1,171,012 UART: [fht] FHT @ 0x50003400
1,173,674 UART: [idev] ++
1,173,842 UART: [idev] CDI.KEYID = 6
1,174,203 UART: [idev] SUBJECT.KEYID = 7
1,174,628 UART: [idev] UDS.KEYID = 0
1,182,540 UART: [idev] Erasing UDS.KEYID = 0
1,199,536 UART: [idev] Sha1 KeyId Algorithm
1,208,264 UART: [idev] --
1,209,193 UART: [ldev] ++
1,209,361 UART: [ldev] CDI.KEYID = 6
1,209,725 UART: [ldev] SUBJECT.KEYID = 5
1,210,152 UART: [ldev] AUTHORITY.KEYID = 7
1,210,615 UART: [ldev] FE.KEYID = 1
1,215,941 UART: [ldev] Erasing FE.KEYID = 1
1,242,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,135 UART: [ldev] --
1,281,577 UART: [fwproc] Wait for Commands...
1,282,340 UART: [fwproc] Recv command 0x46574c44
1,283,073 UART: [fwproc] Recv'd Img size: 114332 bytes
1,550,290 UART: ROM Fatal Error: 0x000B0022
1,551,447 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,156 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,171 UART: [state] WD Timer not started. Device not locked for debugging
87,328 UART: [kat] SHA2-256
890,878 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,007 UART: [kat] ++
895,159 UART: [kat] sha1
899,461 UART: [kat] SHA2-256
901,401 UART: [kat] SHA2-384
904,192 UART: [kat] SHA2-512-ACC
906,093 UART: [kat] ECC-384
915,860 UART: [kat] HMAC-384Kdf
920,452 UART: [kat] LMS
1,168,764 UART: [kat] --
1,169,715 UART: [cold-reset] ++
1,170,047 UART: [fht] FHT @ 0x50003400
1,172,733 UART: [idev] ++
1,172,901 UART: [idev] CDI.KEYID = 6
1,173,262 UART: [idev] SUBJECT.KEYID = 7
1,173,687 UART: [idev] UDS.KEYID = 0
1,181,505 UART: [idev] Erasing UDS.KEYID = 0
1,198,287 UART: [idev] Sha1 KeyId Algorithm
1,207,129 UART: [idev] --
1,208,222 UART: [ldev] ++
1,208,390 UART: [ldev] CDI.KEYID = 6
1,208,754 UART: [ldev] SUBJECT.KEYID = 5
1,209,181 UART: [ldev] AUTHORITY.KEYID = 7
1,209,644 UART: [ldev] FE.KEYID = 1
1,214,732 UART: [ldev] Erasing FE.KEYID = 1
1,241,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,060 UART: [ldev] --
1,280,344 UART: [fwproc] Wait for Commands...
1,280,937 UART: [fwproc] Recv command 0x46574c44
1,281,670 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,575 UART: ROM Fatal Error: 0x000B0022
1,549,732 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,045 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,729 UART: [state] LifecycleState = Unprovisioned
86,384 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,317 UART: [kat] SHA2-256
891,867 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,996 UART: [kat] ++
896,148 UART: [kat] sha1
900,448 UART: [kat] SHA2-256
902,388 UART: [kat] SHA2-384
905,145 UART: [kat] SHA2-512-ACC
907,046 UART: [kat] ECC-384
916,563 UART: [kat] HMAC-384Kdf
921,151 UART: [kat] LMS
1,169,463 UART: [kat] --
1,170,260 UART: [cold-reset] ++
1,170,632 UART: [fht] FHT @ 0x50003400
1,173,070 UART: [idev] ++
1,173,238 UART: [idev] CDI.KEYID = 6
1,173,599 UART: [idev] SUBJECT.KEYID = 7
1,174,024 UART: [idev] UDS.KEYID = 0
1,182,124 UART: [idev] Erasing UDS.KEYID = 0
1,199,352 UART: [idev] Sha1 KeyId Algorithm
1,208,334 UART: [idev] --
1,209,239 UART: [ldev] ++
1,209,407 UART: [ldev] CDI.KEYID = 6
1,209,771 UART: [ldev] SUBJECT.KEYID = 5
1,210,198 UART: [ldev] AUTHORITY.KEYID = 7
1,210,661 UART: [ldev] FE.KEYID = 1
1,215,993 UART: [ldev] Erasing FE.KEYID = 1
1,242,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,035 UART: [ldev] --
1,281,405 UART: [fwproc] Wait for Commands...
1,282,048 UART: [fwproc] Recv command 0x46574c44
1,282,781 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,252 UART: ROM Fatal Error: 0x000B0022
1,549,409 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,738 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
891,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,309 UART: [kat] ++
895,461 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,464 UART: [kat] SHA2-512-ACC
906,365 UART: [kat] ECC-384
916,062 UART: [kat] HMAC-384Kdf
920,792 UART: [kat] LMS
1,169,104 UART: [kat] --
1,170,135 UART: [cold-reset] ++
1,170,499 UART: [fht] FHT @ 0x50003400
1,173,089 UART: [idev] ++
1,173,257 UART: [idev] CDI.KEYID = 6
1,173,618 UART: [idev] SUBJECT.KEYID = 7
1,174,043 UART: [idev] UDS.KEYID = 0
1,182,117 UART: [idev] Erasing UDS.KEYID = 0
1,199,259 UART: [idev] Sha1 KeyId Algorithm
1,207,987 UART: [idev] --
1,209,184 UART: [ldev] ++
1,209,352 UART: [ldev] CDI.KEYID = 6
1,209,716 UART: [ldev] SUBJECT.KEYID = 5
1,210,143 UART: [ldev] AUTHORITY.KEYID = 7
1,210,606 UART: [ldev] FE.KEYID = 1
1,215,844 UART: [ldev] Erasing FE.KEYID = 1
1,242,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,312 UART: [ldev] --
1,281,628 UART: [fwproc] Wait for Commands...
1,282,213 UART: [fwproc] Recv command 0x46574c44
1,282,946 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,627 UART: ROM Fatal Error: 0x000B0021
1,550,784 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,141 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
891,537 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,666 UART: [kat] ++
895,818 UART: [kat] sha1
899,938 UART: [kat] SHA2-256
901,878 UART: [kat] SHA2-384
904,561 UART: [kat] SHA2-512-ACC
906,462 UART: [kat] ECC-384
916,293 UART: [kat] HMAC-384Kdf
920,827 UART: [kat] LMS
1,169,139 UART: [kat] --
1,170,234 UART: [cold-reset] ++
1,170,612 UART: [fht] FHT @ 0x50003400
1,173,218 UART: [idev] ++
1,173,386 UART: [idev] CDI.KEYID = 6
1,173,747 UART: [idev] SUBJECT.KEYID = 7
1,174,172 UART: [idev] UDS.KEYID = 0
1,182,526 UART: [idev] Erasing UDS.KEYID = 0
1,199,512 UART: [idev] Sha1 KeyId Algorithm
1,208,538 UART: [idev] --
1,209,611 UART: [ldev] ++
1,209,779 UART: [ldev] CDI.KEYID = 6
1,210,143 UART: [ldev] SUBJECT.KEYID = 5
1,210,570 UART: [ldev] AUTHORITY.KEYID = 7
1,211,033 UART: [ldev] FE.KEYID = 1
1,216,325 UART: [ldev] Erasing FE.KEYID = 1
1,242,544 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,507 UART: [ldev] --
1,282,007 UART: [fwproc] Wait for Commands...
1,282,738 UART: [fwproc] Recv command 0x46574c44
1,283,471 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,998 UART: ROM Fatal Error: 0x000B0021
1,550,155 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,202 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
891,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,385 UART: [kat] ++
895,537 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,562 UART: [kat] SHA2-512-ACC
906,463 UART: [kat] ECC-384
915,926 UART: [kat] HMAC-384Kdf
920,714 UART: [kat] LMS
1,169,026 UART: [kat] --
1,169,699 UART: [cold-reset] ++
1,170,271 UART: [fht] FHT @ 0x50003400
1,172,955 UART: [idev] ++
1,173,123 UART: [idev] CDI.KEYID = 6
1,173,484 UART: [idev] SUBJECT.KEYID = 7
1,173,909 UART: [idev] UDS.KEYID = 0
1,182,077 UART: [idev] Erasing UDS.KEYID = 0
1,198,883 UART: [idev] Sha1 KeyId Algorithm
1,207,653 UART: [idev] --
1,208,692 UART: [ldev] ++
1,208,860 UART: [ldev] CDI.KEYID = 6
1,209,224 UART: [ldev] SUBJECT.KEYID = 5
1,209,651 UART: [ldev] AUTHORITY.KEYID = 7
1,210,114 UART: [ldev] FE.KEYID = 1
1,214,932 UART: [ldev] Erasing FE.KEYID = 1
1,240,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,500 UART: [ldev] --
1,279,914 UART: [fwproc] Wait for Commands...
1,280,537 UART: [fwproc] Recv command 0x46574c44
1,281,270 UART: [fwproc] Recv'd Img size: 114332 bytes
1,547,901 UART: ROM Fatal Error: 0x000B0021
1,549,058 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,399,949 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,623 UART: [kat] SHA2-256
891,173 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,302 UART: [kat] ++
895,454 UART: [kat] sha1
899,496 UART: [kat] SHA2-256
901,436 UART: [kat] SHA2-384
904,059 UART: [kat] SHA2-512-ACC
905,960 UART: [kat] ECC-384
915,483 UART: [kat] HMAC-384Kdf
920,115 UART: [kat] LMS
1,168,427 UART: [kat] --
1,169,572 UART: [cold-reset] ++
1,170,016 UART: [fht] FHT @ 0x50003400
1,172,710 UART: [idev] ++
1,172,878 UART: [idev] CDI.KEYID = 6
1,173,239 UART: [idev] SUBJECT.KEYID = 7
1,173,664 UART: [idev] UDS.KEYID = 0
1,181,348 UART: [idev] Erasing UDS.KEYID = 0
1,198,246 UART: [idev] Sha1 KeyId Algorithm
1,207,288 UART: [idev] --
1,208,377 UART: [ldev] ++
1,208,545 UART: [ldev] CDI.KEYID = 6
1,208,909 UART: [ldev] SUBJECT.KEYID = 5
1,209,336 UART: [ldev] AUTHORITY.KEYID = 7
1,209,799 UART: [ldev] FE.KEYID = 1
1,215,121 UART: [ldev] Erasing FE.KEYID = 1
1,241,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,387 UART: [ldev] --
1,280,721 UART: [fwproc] Wait for Commands...
1,281,354 UART: [fwproc] Recv command 0x46574c44
1,282,087 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,234 UART: ROM Fatal Error: 0x000B0021
1,549,391 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,404,000 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,286 UART: [kat] SHA2-256
890,836 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,965 UART: [kat] ++
895,117 UART: [kat] sha1
899,353 UART: [kat] SHA2-256
901,293 UART: [kat] SHA2-384
903,880 UART: [kat] SHA2-512-ACC
905,781 UART: [kat] ECC-384
915,242 UART: [kat] HMAC-384Kdf
919,996 UART: [kat] LMS
1,168,308 UART: [kat] --
1,168,891 UART: [cold-reset] ++
1,169,229 UART: [fht] FHT @ 0x50003400
1,171,727 UART: [idev] ++
1,171,895 UART: [idev] CDI.KEYID = 6
1,172,256 UART: [idev] SUBJECT.KEYID = 7
1,172,681 UART: [idev] UDS.KEYID = 0
1,180,791 UART: [idev] Erasing UDS.KEYID = 0
1,197,767 UART: [idev] Sha1 KeyId Algorithm
1,206,715 UART: [idev] --
1,207,692 UART: [ldev] ++
1,207,860 UART: [ldev] CDI.KEYID = 6
1,208,224 UART: [ldev] SUBJECT.KEYID = 5
1,208,651 UART: [ldev] AUTHORITY.KEYID = 7
1,209,114 UART: [ldev] FE.KEYID = 1
1,214,286 UART: [ldev] Erasing FE.KEYID = 1
1,240,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,116 UART: [ldev] --
1,279,540 UART: [fwproc] Wait for Commands...
1,280,287 UART: [fwproc] Recv command 0x46574c44
1,281,020 UART: [fwproc] Recv'd Img size: 114332 bytes
1,547,609 UART: ROM Fatal Error: 0x000B0021
1,548,766 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,841 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
87,905 UART: [kat] SHA2-256
891,455 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,584 UART: [kat] ++
895,736 UART: [kat] sha1
900,034 UART: [kat] SHA2-256
901,974 UART: [kat] SHA2-384
904,629 UART: [kat] SHA2-512-ACC
906,530 UART: [kat] ECC-384
916,233 UART: [kat] HMAC-384Kdf
920,925 UART: [kat] LMS
1,169,237 UART: [kat] --
1,170,228 UART: [cold-reset] ++
1,170,614 UART: [fht] FHT @ 0x50003400
1,173,452 UART: [idev] ++
1,173,620 UART: [idev] CDI.KEYID = 6
1,173,981 UART: [idev] SUBJECT.KEYID = 7
1,174,406 UART: [idev] UDS.KEYID = 0
1,182,342 UART: [idev] Erasing UDS.KEYID = 0
1,199,664 UART: [idev] Sha1 KeyId Algorithm
1,208,650 UART: [idev] --
1,209,587 UART: [ldev] ++
1,209,755 UART: [ldev] CDI.KEYID = 6
1,210,119 UART: [ldev] SUBJECT.KEYID = 5
1,210,546 UART: [ldev] AUTHORITY.KEYID = 7
1,211,009 UART: [ldev] FE.KEYID = 1
1,216,319 UART: [ldev] Erasing FE.KEYID = 1
1,242,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,769 UART: [ldev] --
1,282,211 UART: [fwproc] Wait for Commands...
1,282,854 UART: [fwproc] Recv command 0x46574c44
1,283,587 UART: [fwproc] Recv'd Img size: 114332 bytes
1,550,400 UART: ROM Fatal Error: 0x000B0021
1,551,557 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,124 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
86,171 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,143 UART: [kat] ++
895,295 UART: [kat] sha1
899,619 UART: [kat] SHA2-256
901,559 UART: [kat] SHA2-384
904,350 UART: [kat] SHA2-512-ACC
906,251 UART: [kat] ECC-384
916,024 UART: [kat] HMAC-384Kdf
920,724 UART: [kat] LMS
1,169,036 UART: [kat] --
1,169,953 UART: [cold-reset] ++
1,170,305 UART: [fht] FHT @ 0x50003400
1,173,035 UART: [idev] ++
1,173,203 UART: [idev] CDI.KEYID = 6
1,173,564 UART: [idev] SUBJECT.KEYID = 7
1,173,989 UART: [idev] UDS.KEYID = 0
1,181,723 UART: [idev] Erasing UDS.KEYID = 0
1,198,257 UART: [idev] Sha1 KeyId Algorithm
1,207,173 UART: [idev] --
1,208,088 UART: [ldev] ++
1,208,256 UART: [ldev] CDI.KEYID = 6
1,208,620 UART: [ldev] SUBJECT.KEYID = 5
1,209,047 UART: [ldev] AUTHORITY.KEYID = 7
1,209,510 UART: [ldev] FE.KEYID = 1
1,214,828 UART: [ldev] Erasing FE.KEYID = 1
1,241,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,324 UART: [ldev] --
1,280,616 UART: [fwproc] Wait for Commands...
1,281,267 UART: [fwproc] Recv command 0x46574c44
1,282,000 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,158 UART: ROM Fatal Error: 0x000B0034
1,329,315 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,753 UART: [kat] SHA2-256
901,693 UART: [kat] SHA2-384
904,444 UART: [kat] SHA2-512-ACC
906,345 UART: [kat] ECC-384
916,174 UART: [kat] HMAC-384Kdf
920,780 UART: [kat] LMS
1,169,092 UART: [kat] --
1,169,843 UART: [cold-reset] ++
1,170,387 UART: [fht] FHT @ 0x50003400
1,173,217 UART: [idev] ++
1,173,385 UART: [idev] CDI.KEYID = 6
1,173,746 UART: [idev] SUBJECT.KEYID = 7
1,174,171 UART: [idev] UDS.KEYID = 0
1,182,375 UART: [idev] Erasing UDS.KEYID = 0
1,199,507 UART: [idev] Sha1 KeyId Algorithm
1,208,203 UART: [idev] --
1,209,160 UART: [ldev] ++
1,209,328 UART: [ldev] CDI.KEYID = 6
1,209,692 UART: [ldev] SUBJECT.KEYID = 5
1,210,119 UART: [ldev] AUTHORITY.KEYID = 7
1,210,582 UART: [ldev] FE.KEYID = 1
1,215,936 UART: [ldev] Erasing FE.KEYID = 1
1,242,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,160 UART: [ldev] --
1,281,440 UART: [fwproc] Wait for Commands...
1,282,233 UART: [fwproc] Recv command 0x46574c44
1,282,966 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,548 UART: ROM Fatal Error: 0x000B0034
1,330,705 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,914 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,728 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,725 UART: [state] LifecycleState = Unprovisioned
86,380 UART: [state] DebugLocked = No
86,940 UART: [state] WD Timer not started. Device not locked for debugging
88,169 UART: [kat] SHA2-256
891,719 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,848 UART: [kat] ++
896,000 UART: [kat] sha1
900,102 UART: [kat] SHA2-256
902,042 UART: [kat] SHA2-384
904,791 UART: [kat] SHA2-512-ACC
906,692 UART: [kat] ECC-384
916,359 UART: [kat] HMAC-384Kdf
920,967 UART: [kat] LMS
1,169,279 UART: [kat] --
1,169,914 UART: [cold-reset] ++
1,170,350 UART: [fht] FHT @ 0x50003400
1,172,890 UART: [idev] ++
1,173,058 UART: [idev] CDI.KEYID = 6
1,173,419 UART: [idev] SUBJECT.KEYID = 7
1,173,844 UART: [idev] UDS.KEYID = 0
1,181,872 UART: [idev] Erasing UDS.KEYID = 0
1,198,990 UART: [idev] Sha1 KeyId Algorithm
1,207,820 UART: [idev] --
1,208,687 UART: [ldev] ++
1,208,855 UART: [ldev] CDI.KEYID = 6
1,209,219 UART: [ldev] SUBJECT.KEYID = 5
1,209,646 UART: [ldev] AUTHORITY.KEYID = 7
1,210,109 UART: [ldev] FE.KEYID = 1
1,215,601 UART: [ldev] Erasing FE.KEYID = 1
1,241,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,065 UART: [ldev] --
1,281,467 UART: [fwproc] Wait for Commands...
1,282,102 UART: [fwproc] Recv command 0x46574c44
1,282,835 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,185 UART: ROM Fatal Error: 0x000B0034
1,330,342 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,063 UART: [state] LifecycleState = Unprovisioned
85,718 UART: [state] DebugLocked = No
86,396 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,888 UART: [kat] SHA2-256
901,828 UART: [kat] SHA2-384
904,549 UART: [kat] SHA2-512-ACC
906,450 UART: [kat] ECC-384
916,007 UART: [kat] HMAC-384Kdf
920,481 UART: [kat] LMS
1,168,793 UART: [kat] --
1,169,680 UART: [cold-reset] ++
1,170,198 UART: [fht] FHT @ 0x50003400
1,172,770 UART: [idev] ++
1,172,938 UART: [idev] CDI.KEYID = 6
1,173,299 UART: [idev] SUBJECT.KEYID = 7
1,173,724 UART: [idev] UDS.KEYID = 0
1,181,662 UART: [idev] Erasing UDS.KEYID = 0
1,198,708 UART: [idev] Sha1 KeyId Algorithm
1,207,576 UART: [idev] --
1,208,591 UART: [ldev] ++
1,208,759 UART: [ldev] CDI.KEYID = 6
1,209,123 UART: [ldev] SUBJECT.KEYID = 5
1,209,550 UART: [ldev] AUTHORITY.KEYID = 7
1,210,013 UART: [ldev] FE.KEYID = 1
1,215,361 UART: [ldev] Erasing FE.KEYID = 1
1,242,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,987 UART: [ldev] --
1,281,387 UART: [fwproc] Wait for Commands...
1,282,130 UART: [fwproc] Recv command 0x46574c44
1,282,863 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,749 UART: ROM Fatal Error: 0x000B0034
1,330,906 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,895 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,257 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
891,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,249 UART: [kat] ++
895,401 UART: [kat] sha1
899,751 UART: [kat] SHA2-256
901,691 UART: [kat] SHA2-384
904,338 UART: [kat] SHA2-512-ACC
906,239 UART: [kat] ECC-384
915,650 UART: [kat] HMAC-384Kdf
920,172 UART: [kat] LMS
1,168,484 UART: [kat] --
1,169,187 UART: [cold-reset] ++
1,169,521 UART: [fht] FHT @ 0x50003400
1,172,231 UART: [idev] ++
1,172,399 UART: [idev] CDI.KEYID = 6
1,172,760 UART: [idev] SUBJECT.KEYID = 7
1,173,185 UART: [idev] UDS.KEYID = 0
1,181,113 UART: [idev] Erasing UDS.KEYID = 0
1,197,723 UART: [idev] Sha1 KeyId Algorithm
1,206,685 UART: [idev] --
1,207,900 UART: [ldev] ++
1,208,068 UART: [ldev] CDI.KEYID = 6
1,208,432 UART: [ldev] SUBJECT.KEYID = 5
1,208,859 UART: [ldev] AUTHORITY.KEYID = 7
1,209,322 UART: [ldev] FE.KEYID = 1
1,214,492 UART: [ldev] Erasing FE.KEYID = 1
1,241,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,108 UART: [ldev] --
1,280,444 UART: [fwproc] Wait for Commands...
1,281,027 UART: [fwproc] Recv command 0x46574c44
1,281,760 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,058 UART: ROM Fatal Error: 0x000B0034
1,330,215 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,215 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
891,078 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,207 UART: [kat] ++
895,359 UART: [kat] sha1
899,665 UART: [kat] SHA2-256
901,605 UART: [kat] SHA2-384
904,240 UART: [kat] SHA2-512-ACC
906,141 UART: [kat] ECC-384
916,138 UART: [kat] HMAC-384Kdf
920,732 UART: [kat] LMS
1,169,044 UART: [kat] --
1,170,153 UART: [cold-reset] ++
1,170,679 UART: [fht] FHT @ 0x50003400
1,173,351 UART: [idev] ++
1,173,519 UART: [idev] CDI.KEYID = 6
1,173,880 UART: [idev] SUBJECT.KEYID = 7
1,174,305 UART: [idev] UDS.KEYID = 0
1,182,483 UART: [idev] Erasing UDS.KEYID = 0
1,199,591 UART: [idev] Sha1 KeyId Algorithm
1,208,459 UART: [idev] --
1,209,594 UART: [ldev] ++
1,209,762 UART: [ldev] CDI.KEYID = 6
1,210,126 UART: [ldev] SUBJECT.KEYID = 5
1,210,553 UART: [ldev] AUTHORITY.KEYID = 7
1,211,016 UART: [ldev] FE.KEYID = 1
1,216,364 UART: [ldev] Erasing FE.KEYID = 1
1,242,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,868 UART: [ldev] --
1,281,238 UART: [fwproc] Wait for Commands...
1,281,869 UART: [fwproc] Recv command 0x46574c44
1,282,602 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,104 UART: ROM Fatal Error: 0x000B0034
1,330,261 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,592 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,764 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,771 UART: [kat] SHA2-256
891,321 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,450 UART: [kat] ++
895,602 UART: [kat] sha1
899,846 UART: [kat] SHA2-256
901,786 UART: [kat] SHA2-384
904,561 UART: [kat] SHA2-512-ACC
906,462 UART: [kat] ECC-384
916,139 UART: [kat] HMAC-384Kdf
920,771 UART: [kat] LMS
1,169,083 UART: [kat] --
1,170,124 UART: [cold-reset] ++
1,170,522 UART: [fht] FHT @ 0x50003400
1,173,254 UART: [idev] ++
1,173,422 UART: [idev] CDI.KEYID = 6
1,173,783 UART: [idev] SUBJECT.KEYID = 7
1,174,208 UART: [idev] UDS.KEYID = 0
1,182,094 UART: [idev] Erasing UDS.KEYID = 0
1,200,024 UART: [idev] Sha1 KeyId Algorithm
1,208,746 UART: [idev] --
1,209,829 UART: [ldev] ++
1,209,997 UART: [ldev] CDI.KEYID = 6
1,210,361 UART: [ldev] SUBJECT.KEYID = 5
1,210,788 UART: [ldev] AUTHORITY.KEYID = 7
1,211,251 UART: [ldev] FE.KEYID = 1
1,216,599 UART: [ldev] Erasing FE.KEYID = 1
1,242,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,439 UART: [ldev] --
1,281,747 UART: [fwproc] Wait for Commands...
1,282,354 UART: [fwproc] Recv command 0x46574c44
1,283,087 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,823 UART: ROM Fatal Error: 0x000B0034
1,330,980 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,630 UART: [kat] ++
895,782 UART: [kat] sha1
900,024 UART: [kat] SHA2-256
901,964 UART: [kat] SHA2-384
904,727 UART: [kat] SHA2-512-ACC
906,628 UART: [kat] ECC-384
916,657 UART: [kat] HMAC-384Kdf
921,239 UART: [kat] LMS
1,169,551 UART: [kat] --
1,170,374 UART: [cold-reset] ++
1,170,746 UART: [fht] FHT @ 0x50003400
1,173,286 UART: [idev] ++
1,173,454 UART: [idev] CDI.KEYID = 6
1,173,815 UART: [idev] SUBJECT.KEYID = 7
1,174,240 UART: [idev] UDS.KEYID = 0
1,181,896 UART: [idev] Erasing UDS.KEYID = 0
1,199,570 UART: [idev] Sha1 KeyId Algorithm
1,208,386 UART: [idev] --
1,209,617 UART: [ldev] ++
1,209,785 UART: [ldev] CDI.KEYID = 6
1,210,149 UART: [ldev] SUBJECT.KEYID = 5
1,210,576 UART: [ldev] AUTHORITY.KEYID = 7
1,211,039 UART: [ldev] FE.KEYID = 1
1,216,373 UART: [ldev] Erasing FE.KEYID = 1
1,243,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,399 UART: [ldev] --
1,282,667 UART: [fwproc] Wait for Commands...
1,283,310 UART: [fwproc] Recv command 0x46574c44
1,284,043 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,781 UART: ROM Fatal Error: 0x000B0034
1,331,938 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,175 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,443 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,494 UART: [state] LifecycleState = Unprovisioned
86,149 UART: [state] DebugLocked = No
86,785 UART: [state] WD Timer not started. Device not locked for debugging
88,032 UART: [kat] SHA2-256
891,582 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,711 UART: [kat] ++
895,863 UART: [kat] sha1
900,241 UART: [kat] SHA2-256
902,181 UART: [kat] SHA2-384
904,888 UART: [kat] SHA2-512-ACC
906,789 UART: [kat] ECC-384
916,692 UART: [kat] HMAC-384Kdf
921,264 UART: [kat] LMS
1,169,576 UART: [kat] --
1,170,811 UART: [cold-reset] ++
1,171,247 UART: [fht] FHT @ 0x50003400
1,174,087 UART: [idev] ++
1,174,255 UART: [idev] CDI.KEYID = 6
1,174,616 UART: [idev] SUBJECT.KEYID = 7
1,175,041 UART: [idev] UDS.KEYID = 0
1,182,733 UART: [idev] Erasing UDS.KEYID = 0
1,199,575 UART: [idev] Sha1 KeyId Algorithm
1,208,553 UART: [idev] --
1,209,658 UART: [ldev] ++
1,209,826 UART: [ldev] CDI.KEYID = 6
1,210,190 UART: [ldev] SUBJECT.KEYID = 5
1,210,617 UART: [ldev] AUTHORITY.KEYID = 7
1,211,080 UART: [ldev] FE.KEYID = 1
1,216,434 UART: [ldev] Erasing FE.KEYID = 1
1,242,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,066 UART: [ldev] --
1,281,402 UART: [fwproc] Wait for Commands...
1,282,213 UART: [fwproc] Recv command 0x46574c44
1,282,946 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,944 UART: ROM Fatal Error: 0x000B0034
1,331,101 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,522 UART: [state] LifecycleState = Unprovisioned
86,177 UART: [state] DebugLocked = No
86,681 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
891,358 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,487 UART: [kat] ++
895,639 UART: [kat] sha1
899,927 UART: [kat] SHA2-256
901,867 UART: [kat] SHA2-384
904,634 UART: [kat] SHA2-512-ACC
906,535 UART: [kat] ECC-384
916,180 UART: [kat] HMAC-384Kdf
920,638 UART: [kat] LMS
1,168,950 UART: [kat] --
1,169,993 UART: [cold-reset] ++
1,170,509 UART: [fht] FHT @ 0x50003400
1,173,075 UART: [idev] ++
1,173,243 UART: [idev] CDI.KEYID = 6
1,173,604 UART: [idev] SUBJECT.KEYID = 7
1,174,029 UART: [idev] UDS.KEYID = 0
1,181,467 UART: [idev] Erasing UDS.KEYID = 0
1,198,749 UART: [idev] Sha1 KeyId Algorithm
1,207,695 UART: [idev] --
1,208,736 UART: [ldev] ++
1,208,904 UART: [ldev] CDI.KEYID = 6
1,209,268 UART: [ldev] SUBJECT.KEYID = 5
1,209,695 UART: [ldev] AUTHORITY.KEYID = 7
1,210,158 UART: [ldev] FE.KEYID = 1
1,215,286 UART: [ldev] Erasing FE.KEYID = 1
1,241,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,976 UART: [ldev] --
1,280,466 UART: [fwproc] Wait for Commands...
1,281,171 UART: [fwproc] Recv command 0x46574c44
1,281,904 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,480 UART: ROM Fatal Error: 0x000B0034
1,330,637 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,134 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,258 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,213 UART: [state] LifecycleState = Unprovisioned
86,868 UART: [state] DebugLocked = No
87,596 UART: [state] WD Timer not started. Device not locked for debugging
88,881 UART: [kat] SHA2-256
892,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,560 UART: [kat] ++
896,712 UART: [kat] sha1
900,814 UART: [kat] SHA2-256
902,754 UART: [kat] SHA2-384
905,305 UART: [kat] SHA2-512-ACC
907,206 UART: [kat] ECC-384
916,635 UART: [kat] HMAC-384Kdf
921,401 UART: [kat] LMS
1,169,713 UART: [kat] --
1,170,546 UART: [cold-reset] ++
1,171,042 UART: [fht] FHT @ 0x50003400
1,173,778 UART: [idev] ++
1,173,946 UART: [idev] CDI.KEYID = 6
1,174,307 UART: [idev] SUBJECT.KEYID = 7
1,174,732 UART: [idev] UDS.KEYID = 0
1,183,130 UART: [idev] Erasing UDS.KEYID = 0
1,200,588 UART: [idev] Sha1 KeyId Algorithm
1,209,454 UART: [idev] --
1,210,513 UART: [ldev] ++
1,210,681 UART: [ldev] CDI.KEYID = 6
1,211,045 UART: [ldev] SUBJECT.KEYID = 5
1,211,472 UART: [ldev] AUTHORITY.KEYID = 7
1,211,935 UART: [ldev] FE.KEYID = 1
1,217,283 UART: [ldev] Erasing FE.KEYID = 1
1,243,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,501 UART: [ldev] --
1,282,973 UART: [fwproc] Wait for Commands...
1,283,726 UART: [fwproc] Recv command 0x46574c44
1,284,459 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,321 UART: ROM Fatal Error: 0x000B0034
1,331,478 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,803 UART: [state] LifecycleState = Unprovisioned
86,458 UART: [state] DebugLocked = No
87,080 UART: [state] WD Timer not started. Device not locked for debugging
88,387 UART: [kat] SHA2-256
891,937 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,066 UART: [kat] ++
896,218 UART: [kat] sha1
900,446 UART: [kat] SHA2-256
902,386 UART: [kat] SHA2-384
905,325 UART: [kat] SHA2-512-ACC
907,226 UART: [kat] ECC-384
917,243 UART: [kat] HMAC-384Kdf
921,903 UART: [kat] LMS
1,170,215 UART: [kat] --
1,171,280 UART: [cold-reset] ++
1,171,656 UART: [fht] FHT @ 0x50003400
1,174,330 UART: [idev] ++
1,174,498 UART: [idev] CDI.KEYID = 6
1,174,859 UART: [idev] SUBJECT.KEYID = 7
1,175,284 UART: [idev] UDS.KEYID = 0
1,183,766 UART: [idev] Erasing UDS.KEYID = 0
1,200,908 UART: [idev] Sha1 KeyId Algorithm
1,209,626 UART: [idev] --
1,210,691 UART: [ldev] ++
1,210,859 UART: [ldev] CDI.KEYID = 6
1,211,223 UART: [ldev] SUBJECT.KEYID = 5
1,211,650 UART: [ldev] AUTHORITY.KEYID = 7
1,212,113 UART: [ldev] FE.KEYID = 1
1,217,339 UART: [ldev] Erasing FE.KEYID = 1
1,243,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,647 UART: [ldev] --
1,282,919 UART: [fwproc] Wait for Commands...
1,283,536 UART: [fwproc] Recv command 0x46574c44
1,284,269 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,861 UART: ROM Fatal Error: 0x000B0034
1,332,018 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,903 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,233 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,732 UART: [state] LifecycleState = Manufacturing
85,387 UART: [state] DebugLocked = No
85,883 UART: [state] WD Timer not started. Device not locked for debugging
87,012 UART: [kat] SHA2-256
890,562 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,691 UART: [kat] ++
894,843 UART: [kat] sha1
899,021 UART: [kat] SHA2-256
900,961 UART: [kat] SHA2-384
903,526 UART: [kat] SHA2-512-ACC
905,427 UART: [kat] ECC-384
914,872 UART: [kat] HMAC-384Kdf
919,564 UART: [kat] LMS
1,167,876 UART: [kat] --
1,168,571 UART: [cold-reset] ++
1,169,075 UART: [fht] FHT @ 0x50003400
1,171,627 UART: [idev] ++
1,171,795 UART: [idev] CDI.KEYID = 6
1,172,156 UART: [idev] SUBJECT.KEYID = 7
1,172,581 UART: [idev] UDS.KEYID = 0
1,180,437 UART: [idev] Erasing UDS.KEYID = 0
1,197,277 UART: [idev] Sha1 KeyId Algorithm
1,206,289 UART: [idev] --
1,207,246 UART: [ldev] ++
1,207,414 UART: [ldev] CDI.KEYID = 6
1,207,778 UART: [ldev] SUBJECT.KEYID = 5
1,208,205 UART: [ldev] AUTHORITY.KEYID = 7
1,208,668 UART: [ldev] FE.KEYID = 1
1,214,178 UART: [ldev] Erasing FE.KEYID = 1
1,240,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,286 UART: [ldev] --
1,279,630 UART: [fwproc] Wait for Commands...
1,280,347 UART: [fwproc] Recv command 0x46574c44
1,281,080 UART: [fwproc] Recv'd Img size: 114332 bytes
1,572,227 UART: ROM Fatal Error: 0x000B0025
1,573,384 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,426,761 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Manufacturing
86,244 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
891,463 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,592 UART: [kat] ++
895,744 UART: [kat] sha1
900,146 UART: [kat] SHA2-256
902,086 UART: [kat] SHA2-384
904,703 UART: [kat] SHA2-512-ACC
906,604 UART: [kat] ECC-384
916,759 UART: [kat] HMAC-384Kdf
921,463 UART: [kat] LMS
1,169,775 UART: [kat] --
1,170,742 UART: [cold-reset] ++
1,171,314 UART: [fht] FHT @ 0x50003400
1,174,162 UART: [idev] ++
1,174,330 UART: [idev] CDI.KEYID = 6
1,174,691 UART: [idev] SUBJECT.KEYID = 7
1,175,116 UART: [idev] UDS.KEYID = 0
1,183,118 UART: [idev] Erasing UDS.KEYID = 0
1,200,608 UART: [idev] Sha1 KeyId Algorithm
1,209,474 UART: [idev] --
1,210,481 UART: [ldev] ++
1,210,649 UART: [ldev] CDI.KEYID = 6
1,211,013 UART: [ldev] SUBJECT.KEYID = 5
1,211,440 UART: [ldev] AUTHORITY.KEYID = 7
1,211,903 UART: [ldev] FE.KEYID = 1
1,217,181 UART: [ldev] Erasing FE.KEYID = 1
1,244,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,883 UART: [ldev] --
1,283,377 UART: [fwproc] Wait for Commands...
1,284,026 UART: [fwproc] Recv command 0x46574c44
1,284,759 UART: [fwproc] Recv'd Img size: 114332 bytes
1,575,848 UART: ROM Fatal Error: 0x000B0025
1,577,005 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,427,804 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Manufacturing
85,827 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
891,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,439 UART: [kat] ++
895,591 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,340 UART: [kat] SHA2-512-ACC
906,241 UART: [kat] ECC-384
916,124 UART: [kat] HMAC-384Kdf
920,776 UART: [kat] LMS
1,169,088 UART: [kat] --
1,170,171 UART: [cold-reset] ++
1,170,699 UART: [fht] FHT @ 0x50003400
1,173,373 UART: [idev] ++
1,173,541 UART: [idev] CDI.KEYID = 6
1,173,902 UART: [idev] SUBJECT.KEYID = 7
1,174,327 UART: [idev] UDS.KEYID = 0
1,182,491 UART: [idev] Erasing UDS.KEYID = 0
1,199,101 UART: [idev] Sha1 KeyId Algorithm
1,207,975 UART: [idev] --
1,209,032 UART: [ldev] ++
1,209,200 UART: [ldev] CDI.KEYID = 6
1,209,564 UART: [ldev] SUBJECT.KEYID = 5
1,209,991 UART: [ldev] AUTHORITY.KEYID = 7
1,210,454 UART: [ldev] FE.KEYID = 1
1,215,900 UART: [ldev] Erasing FE.KEYID = 1
1,241,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,950 UART: [ldev] --
1,281,340 UART: [fwproc] Wait for Commands...
1,281,957 UART: [fwproc] Recv command 0x46574c44
1,282,690 UART: [fwproc] Recv'd Img size: 114332 bytes
1,573,885 UART: ROM Fatal Error: 0x000B0025
1,575,042 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,426,093 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Manufacturing
86,212 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,105 UART: [kat] SHA2-256
891,655 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,784 UART: [kat] ++
895,936 UART: [kat] sha1
900,182 UART: [kat] SHA2-256
902,122 UART: [kat] SHA2-384
904,881 UART: [kat] SHA2-512-ACC
906,782 UART: [kat] ECC-384
916,791 UART: [kat] HMAC-384Kdf
921,505 UART: [kat] LMS
1,169,817 UART: [kat] --
1,170,440 UART: [cold-reset] ++
1,170,834 UART: [fht] FHT @ 0x50003400
1,173,412 UART: [idev] ++
1,173,580 UART: [idev] CDI.KEYID = 6
1,173,941 UART: [idev] SUBJECT.KEYID = 7
1,174,366 UART: [idev] UDS.KEYID = 0
1,182,518 UART: [idev] Erasing UDS.KEYID = 0
1,200,138 UART: [idev] Sha1 KeyId Algorithm
1,208,972 UART: [idev] --
1,209,947 UART: [ldev] ++
1,210,115 UART: [ldev] CDI.KEYID = 6
1,210,479 UART: [ldev] SUBJECT.KEYID = 5
1,210,906 UART: [ldev] AUTHORITY.KEYID = 7
1,211,369 UART: [ldev] FE.KEYID = 1
1,216,499 UART: [ldev] Erasing FE.KEYID = 1
1,243,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,017 UART: [ldev] --
1,282,435 UART: [fwproc] Wait for Commands...
1,283,134 UART: [fwproc] Recv command 0x46574c44
1,283,867 UART: [fwproc] Recv'd Img size: 114332 bytes
1,575,488 UART: ROM Fatal Error: 0x000B0025
1,576,645 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,427,552 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Manufacturing
86,005 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,886 UART: [kat] SHA2-256
891,436 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,565 UART: [kat] ++
895,717 UART: [kat] sha1
900,139 UART: [kat] SHA2-256
902,079 UART: [kat] SHA2-384
904,888 UART: [kat] SHA2-512-ACC
906,789 UART: [kat] ECC-384
916,368 UART: [kat] HMAC-384Kdf
921,120 UART: [kat] LMS
1,169,432 UART: [kat] --
1,170,449 UART: [cold-reset] ++
1,171,011 UART: [fht] FHT @ 0x50003400
1,173,753 UART: [idev] ++
1,173,921 UART: [idev] CDI.KEYID = 6
1,174,282 UART: [idev] SUBJECT.KEYID = 7
1,174,707 UART: [idev] UDS.KEYID = 0
1,182,751 UART: [idev] Erasing UDS.KEYID = 0
1,199,347 UART: [idev] Sha1 KeyId Algorithm
1,208,201 UART: [idev] --
1,209,380 UART: [ldev] ++
1,209,548 UART: [ldev] CDI.KEYID = 6
1,209,912 UART: [ldev] SUBJECT.KEYID = 5
1,210,339 UART: [ldev] AUTHORITY.KEYID = 7
1,210,802 UART: [ldev] FE.KEYID = 1
1,216,096 UART: [ldev] Erasing FE.KEYID = 1
1,243,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,430 UART: [ldev] --
1,282,882 UART: [fwproc] Wait for Commands...
1,283,617 UART: [fwproc] Recv command 0x46574c44
1,284,350 UART: [fwproc] Recv'd Img size: 114332 bytes
1,575,873 UART: ROM Fatal Error: 0x000B0025
1,577,030 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,425,089 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Manufacturing
86,334 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
891,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,874 UART: [kat] ++
896,026 UART: [kat] sha1
900,350 UART: [kat] SHA2-256
902,290 UART: [kat] SHA2-384
905,009 UART: [kat] SHA2-512-ACC
906,910 UART: [kat] ECC-384
916,427 UART: [kat] HMAC-384Kdf
921,153 UART: [kat] LMS
1,169,465 UART: [kat] --
1,170,168 UART: [cold-reset] ++
1,170,512 UART: [fht] FHT @ 0x50003400
1,173,098 UART: [idev] ++
1,173,266 UART: [idev] CDI.KEYID = 6
1,173,627 UART: [idev] SUBJECT.KEYID = 7
1,174,052 UART: [idev] UDS.KEYID = 0
1,181,872 UART: [idev] Erasing UDS.KEYID = 0
1,198,754 UART: [idev] Sha1 KeyId Algorithm
1,207,634 UART: [idev] --
1,208,549 UART: [ldev] ++
1,208,717 UART: [ldev] CDI.KEYID = 6
1,209,081 UART: [ldev] SUBJECT.KEYID = 5
1,209,508 UART: [ldev] AUTHORITY.KEYID = 7
1,209,971 UART: [ldev] FE.KEYID = 1
1,215,065 UART: [ldev] Erasing FE.KEYID = 1
1,242,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,951 UART: [ldev] --
1,281,249 UART: [fwproc] Wait for Commands...
1,281,842 UART: [fwproc] Recv command 0x46574c44
1,282,575 UART: [fwproc] Recv'd Img size: 114332 bytes
1,574,730 UART: ROM Fatal Error: 0x000B0025
1,575,887 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,427,466 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,474 UART: [state] LifecycleState = Manufacturing
86,129 UART: [state] DebugLocked = No
86,711 UART: [state] WD Timer not started. Device not locked for debugging
87,892 UART: [kat] SHA2-256
891,442 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,571 UART: [kat] ++
895,723 UART: [kat] sha1
899,963 UART: [kat] SHA2-256
901,903 UART: [kat] SHA2-384
904,688 UART: [kat] SHA2-512-ACC
906,589 UART: [kat] ECC-384
916,186 UART: [kat] HMAC-384Kdf
920,744 UART: [kat] LMS
1,169,056 UART: [kat] --
1,169,891 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,172,821 UART: [idev] ++
1,172,989 UART: [idev] CDI.KEYID = 6
1,173,350 UART: [idev] SUBJECT.KEYID = 7
1,173,775 UART: [idev] UDS.KEYID = 0
1,181,699 UART: [idev] Erasing UDS.KEYID = 0
1,198,809 UART: [idev] Sha1 KeyId Algorithm
1,207,591 UART: [idev] --
1,208,642 UART: [ldev] ++
1,208,810 UART: [ldev] CDI.KEYID = 6
1,209,174 UART: [ldev] SUBJECT.KEYID = 5
1,209,601 UART: [ldev] AUTHORITY.KEYID = 7
1,210,064 UART: [ldev] FE.KEYID = 1
1,214,966 UART: [ldev] Erasing FE.KEYID = 1
1,240,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,764 UART: [ldev] --
1,280,086 UART: [fwproc] Wait for Commands...
1,280,885 UART: [fwproc] Recv command 0x46574c44
1,281,618 UART: [fwproc] Recv'd Img size: 114332 bytes
1,572,547 UART: ROM Fatal Error: 0x000B0027
1,573,704 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,426,823 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Manufacturing
86,260 UART: [state] DebugLocked = No
86,934 UART: [state] WD Timer not started. Device not locked for debugging
88,257 UART: [kat] SHA2-256
891,807 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,936 UART: [kat] ++
896,088 UART: [kat] sha1
900,236 UART: [kat] SHA2-256
902,176 UART: [kat] SHA2-384
904,921 UART: [kat] SHA2-512-ACC
906,822 UART: [kat] ECC-384
916,321 UART: [kat] HMAC-384Kdf
920,947 UART: [kat] LMS
1,169,259 UART: [kat] --
1,170,144 UART: [cold-reset] ++
1,170,616 UART: [fht] FHT @ 0x50003400
1,173,276 UART: [idev] ++
1,173,444 UART: [idev] CDI.KEYID = 6
1,173,805 UART: [idev] SUBJECT.KEYID = 7
1,174,230 UART: [idev] UDS.KEYID = 0
1,182,418 UART: [idev] Erasing UDS.KEYID = 0
1,199,402 UART: [idev] Sha1 KeyId Algorithm
1,208,328 UART: [idev] --
1,209,425 UART: [ldev] ++
1,209,593 UART: [ldev] CDI.KEYID = 6
1,209,957 UART: [ldev] SUBJECT.KEYID = 5
1,210,384 UART: [ldev] AUTHORITY.KEYID = 7
1,210,847 UART: [ldev] FE.KEYID = 1
1,215,875 UART: [ldev] Erasing FE.KEYID = 1
1,242,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,157 UART: [ldev] --
1,281,641 UART: [fwproc] Wait for Commands...
1,282,242 UART: [fwproc] Recv command 0x46574c44
1,282,975 UART: [fwproc] Recv'd Img size: 114332 bytes
1,574,148 UART: ROM Fatal Error: 0x000B0027
1,575,305 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,427,395 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,652 UART: [state] LifecycleState = Manufacturing
86,307 UART: [state] DebugLocked = No
86,807 UART: [state] WD Timer not started. Device not locked for debugging
88,060 UART: [kat] SHA2-256
891,610 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,739 UART: [kat] ++
895,891 UART: [kat] sha1
900,031 UART: [kat] SHA2-256
901,971 UART: [kat] SHA2-384
904,742 UART: [kat] SHA2-512-ACC
906,643 UART: [kat] ECC-384
916,380 UART: [kat] HMAC-384Kdf
921,114 UART: [kat] LMS
1,169,426 UART: [kat] --
1,170,495 UART: [cold-reset] ++
1,171,021 UART: [fht] FHT @ 0x50003400
1,173,739 UART: [idev] ++
1,173,907 UART: [idev] CDI.KEYID = 6
1,174,268 UART: [idev] SUBJECT.KEYID = 7
1,174,693 UART: [idev] UDS.KEYID = 0
1,182,387 UART: [idev] Erasing UDS.KEYID = 0
1,199,569 UART: [idev] Sha1 KeyId Algorithm
1,208,571 UART: [idev] --
1,209,560 UART: [ldev] ++
1,209,728 UART: [ldev] CDI.KEYID = 6
1,210,092 UART: [ldev] SUBJECT.KEYID = 5
1,210,519 UART: [ldev] AUTHORITY.KEYID = 7
1,210,982 UART: [ldev] FE.KEYID = 1
1,215,758 UART: [ldev] Erasing FE.KEYID = 1
1,242,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,258 UART: [ldev] --
1,281,644 UART: [fwproc] Wait for Commands...
1,282,307 UART: [fwproc] Recv command 0x46574c44
1,283,040 UART: [fwproc] Recv'd Img size: 114332 bytes
1,573,733 UART: ROM Fatal Error: 0x000B0027
1,574,890 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,428,297 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,949 UART: [state] LifecycleState = Manufacturing
86,604 UART: [state] DebugLocked = No
87,284 UART: [state] WD Timer not started. Device not locked for debugging
88,519 UART: [kat] SHA2-256
892,069 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,198 UART: [kat] ++
896,350 UART: [kat] sha1
900,680 UART: [kat] SHA2-256
902,620 UART: [kat] SHA2-384
905,563 UART: [kat] SHA2-512-ACC
907,464 UART: [kat] ECC-384
917,295 UART: [kat] HMAC-384Kdf
921,939 UART: [kat] LMS
1,170,251 UART: [kat] --
1,170,998 UART: [cold-reset] ++
1,171,324 UART: [fht] FHT @ 0x50003400
1,173,994 UART: [idev] ++
1,174,162 UART: [idev] CDI.KEYID = 6
1,174,523 UART: [idev] SUBJECT.KEYID = 7
1,174,948 UART: [idev] UDS.KEYID = 0
1,182,860 UART: [idev] Erasing UDS.KEYID = 0
1,199,980 UART: [idev] Sha1 KeyId Algorithm
1,208,836 UART: [idev] --
1,209,819 UART: [ldev] ++
1,209,987 UART: [ldev] CDI.KEYID = 6
1,210,351 UART: [ldev] SUBJECT.KEYID = 5
1,210,778 UART: [ldev] AUTHORITY.KEYID = 7
1,211,241 UART: [ldev] FE.KEYID = 1
1,216,311 UART: [ldev] Erasing FE.KEYID = 1
1,242,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,647 UART: [ldev] --
1,282,163 UART: [fwproc] Wait for Commands...
1,282,946 UART: [fwproc] Recv command 0x46574c44
1,283,679 UART: [fwproc] Recv'd Img size: 114332 bytes
1,575,484 UART: ROM Fatal Error: 0x000B0027
1,576,641 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,427,430 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Manufacturing
85,917 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
891,094 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,223 UART: [kat] ++
895,375 UART: [kat] sha1
899,745 UART: [kat] SHA2-256
901,685 UART: [kat] SHA2-384
904,346 UART: [kat] SHA2-512-ACC
906,247 UART: [kat] ECC-384
915,992 UART: [kat] HMAC-384Kdf
920,380 UART: [kat] LMS
1,168,692 UART: [kat] --
1,169,435 UART: [cold-reset] ++
1,169,933 UART: [fht] FHT @ 0x50003400
1,172,459 UART: [idev] ++
1,172,627 UART: [idev] CDI.KEYID = 6
1,172,988 UART: [idev] SUBJECT.KEYID = 7
1,173,413 UART: [idev] UDS.KEYID = 0
1,181,047 UART: [idev] Erasing UDS.KEYID = 0
1,198,127 UART: [idev] Sha1 KeyId Algorithm
1,207,005 UART: [idev] --
1,208,188 UART: [ldev] ++
1,208,356 UART: [ldev] CDI.KEYID = 6
1,208,720 UART: [ldev] SUBJECT.KEYID = 5
1,209,147 UART: [ldev] AUTHORITY.KEYID = 7
1,209,610 UART: [ldev] FE.KEYID = 1
1,214,552 UART: [ldev] Erasing FE.KEYID = 1
1,240,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,346 UART: [ldev] --
1,279,718 UART: [fwproc] Wait for Commands...
1,280,303 UART: [fwproc] Recv command 0x46574c44
1,281,036 UART: [fwproc] Recv'd Img size: 114332 bytes
1,572,107 UART: ROM Fatal Error: 0x000B0027
1,573,264 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,426,191 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Manufacturing
86,340 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,175 UART: [kat] SHA2-256
891,725 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,854 UART: [kat] ++
896,006 UART: [kat] sha1
900,156 UART: [kat] SHA2-256
902,096 UART: [kat] SHA2-384
904,983 UART: [kat] SHA2-512-ACC
906,884 UART: [kat] ECC-384
916,491 UART: [kat] HMAC-384Kdf
920,925 UART: [kat] LMS
1,169,237 UART: [kat] --
1,170,280 UART: [cold-reset] ++
1,170,848 UART: [fht] FHT @ 0x50003400
1,173,596 UART: [idev] ++
1,173,764 UART: [idev] CDI.KEYID = 6
1,174,125 UART: [idev] SUBJECT.KEYID = 7
1,174,550 UART: [idev] UDS.KEYID = 0
1,182,854 UART: [idev] Erasing UDS.KEYID = 0
1,200,646 UART: [idev] Sha1 KeyId Algorithm
1,209,668 UART: [idev] --
1,210,689 UART: [ldev] ++
1,210,857 UART: [ldev] CDI.KEYID = 6
1,211,221 UART: [ldev] SUBJECT.KEYID = 5
1,211,648 UART: [ldev] AUTHORITY.KEYID = 7
1,212,111 UART: [ldev] FE.KEYID = 1
1,217,169 UART: [ldev] Erasing FE.KEYID = 1
1,244,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,741 UART: [ldev] --
1,283,241 UART: [fwproc] Wait for Commands...
1,283,824 UART: [fwproc] Recv command 0x46574c44
1,284,557 UART: [fwproc] Recv'd Img size: 114332 bytes
1,576,094 UART: ROM Fatal Error: 0x000B0027
1,577,251 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,426,208 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,450 UART: [state] LifecycleState = Unprovisioned
86,105 UART: [state] DebugLocked = No
86,751 UART: [state] WD Timer not started. Device not locked for debugging
88,018 UART: [kat] SHA2-256
891,568 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,697 UART: [kat] ++
895,849 UART: [kat] sha1
899,967 UART: [kat] SHA2-256
901,907 UART: [kat] SHA2-384
904,822 UART: [kat] SHA2-512-ACC
906,723 UART: [kat] ECC-384
916,784 UART: [kat] HMAC-384Kdf
921,388 UART: [kat] LMS
1,169,700 UART: [kat] --
1,170,589 UART: [cold-reset] ++
1,171,019 UART: [fht] FHT @ 0x50003400
1,173,675 UART: [idev] ++
1,173,843 UART: [idev] CDI.KEYID = 6
1,174,204 UART: [idev] SUBJECT.KEYID = 7
1,174,629 UART: [idev] UDS.KEYID = 0
1,182,647 UART: [idev] Erasing UDS.KEYID = 0
1,199,791 UART: [idev] Sha1 KeyId Algorithm
1,208,645 UART: [idev] --
1,209,704 UART: [ldev] ++
1,209,872 UART: [ldev] CDI.KEYID = 6
1,210,236 UART: [ldev] SUBJECT.KEYID = 5
1,210,663 UART: [ldev] AUTHORITY.KEYID = 7
1,211,126 UART: [ldev] FE.KEYID = 1
1,216,240 UART: [ldev] Erasing FE.KEYID = 1
1,243,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,046 UART: [ldev] --
1,282,528 UART: [fwproc] Wait for Commands...
1,283,299 UART: [fwproc] Recv command 0x46574c44
1,284,032 UART: [fwproc] Recv'd Img size: 114332 bytes
1,322,329 UART: ROM Fatal Error: 0x000B000D
1,323,488 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,172,087 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
891,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,708 UART: [kat] ++
895,860 UART: [kat] sha1
900,256 UART: [kat] SHA2-256
902,196 UART: [kat] SHA2-384
904,823 UART: [kat] SHA2-512-ACC
906,724 UART: [kat] ECC-384
916,559 UART: [kat] HMAC-384Kdf
921,023 UART: [kat] LMS
1,169,335 UART: [kat] --
1,170,224 UART: [cold-reset] ++
1,170,610 UART: [fht] FHT @ 0x50003400
1,173,166 UART: [idev] ++
1,173,334 UART: [idev] CDI.KEYID = 6
1,173,695 UART: [idev] SUBJECT.KEYID = 7
1,174,120 UART: [idev] UDS.KEYID = 0
1,182,076 UART: [idev] Erasing UDS.KEYID = 0
1,198,448 UART: [idev] Sha1 KeyId Algorithm
1,207,342 UART: [idev] --
1,208,265 UART: [ldev] ++
1,208,433 UART: [ldev] CDI.KEYID = 6
1,208,797 UART: [ldev] SUBJECT.KEYID = 5
1,209,224 UART: [ldev] AUTHORITY.KEYID = 7
1,209,687 UART: [ldev] FE.KEYID = 1
1,215,085 UART: [ldev] Erasing FE.KEYID = 1
1,241,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,283 UART: [ldev] --
1,280,569 UART: [fwproc] Wait for Commands...
1,281,320 UART: [fwproc] Recv command 0x46574c44
1,282,053 UART: [fwproc] Recv'd Img size: 114332 bytes
1,320,198 UART: ROM Fatal Error: 0x000B000D
1,321,357 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,174,730 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,305 UART: [kat] ++
895,457 UART: [kat] sha1
899,777 UART: [kat] SHA2-256
901,717 UART: [kat] SHA2-384
904,336 UART: [kat] SHA2-512-ACC
906,237 UART: [kat] ECC-384
916,200 UART: [kat] HMAC-384Kdf
920,796 UART: [kat] LMS
1,169,108 UART: [kat] --
1,169,665 UART: [cold-reset] ++
1,170,229 UART: [fht] FHT @ 0x50003400
1,172,965 UART: [idev] ++
1,173,133 UART: [idev] CDI.KEYID = 6
1,173,494 UART: [idev] SUBJECT.KEYID = 7
1,173,919 UART: [idev] UDS.KEYID = 0
1,181,511 UART: [idev] Erasing UDS.KEYID = 0
1,198,547 UART: [idev] Sha1 KeyId Algorithm
1,207,393 UART: [idev] --
1,208,486 UART: [ldev] ++
1,208,654 UART: [ldev] CDI.KEYID = 6
1,209,018 UART: [ldev] SUBJECT.KEYID = 5
1,209,445 UART: [ldev] AUTHORITY.KEYID = 7
1,209,908 UART: [ldev] FE.KEYID = 1
1,215,170 UART: [ldev] Erasing FE.KEYID = 1
1,241,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,522 UART: [ldev] --
1,281,008 UART: [fwproc] Wait for Commands...
1,281,605 UART: [fwproc] Recv command 0x46574c44
1,282,338 UART: [fwproc] Recv'd Img size: 114332 bytes
1,320,809 UART: ROM Fatal Error: 0x000B000D
1,321,968 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,173,599 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
891,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,636 UART: [kat] ++
895,788 UART: [kat] sha1
900,020 UART: [kat] SHA2-256
901,960 UART: [kat] SHA2-384
904,645 UART: [kat] SHA2-512-ACC
906,546 UART: [kat] ECC-384
916,567 UART: [kat] HMAC-384Kdf
921,413 UART: [kat] LMS
1,169,725 UART: [kat] --
1,170,758 UART: [cold-reset] ++
1,171,148 UART: [fht] FHT @ 0x50003400
1,173,838 UART: [idev] ++
1,174,006 UART: [idev] CDI.KEYID = 6
1,174,367 UART: [idev] SUBJECT.KEYID = 7
1,174,792 UART: [idev] UDS.KEYID = 0
1,182,958 UART: [idev] Erasing UDS.KEYID = 0
1,199,976 UART: [idev] Sha1 KeyId Algorithm
1,209,042 UART: [idev] --
1,209,947 UART: [ldev] ++
1,210,115 UART: [ldev] CDI.KEYID = 6
1,210,479 UART: [ldev] SUBJECT.KEYID = 5
1,210,906 UART: [ldev] AUTHORITY.KEYID = 7
1,211,369 UART: [ldev] FE.KEYID = 1
1,216,737 UART: [ldev] Erasing FE.KEYID = 1
1,243,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,393 UART: [ldev] --
1,282,709 UART: [fwproc] Wait for Commands...
1,283,284 UART: [fwproc] Recv command 0x46574c44
1,284,017 UART: [fwproc] Recv'd Img size: 114332 bytes
1,321,538 UART: ROM Fatal Error: 0x000B000D
1,322,697 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,173,396 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,834 UART: [state] LifecycleState = Unprovisioned
85,489 UART: [state] DebugLocked = No
86,131 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
890,930 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,059 UART: [kat] ++
895,211 UART: [kat] sha1
899,397 UART: [kat] SHA2-256
901,337 UART: [kat] SHA2-384
904,152 UART: [kat] SHA2-512-ACC
906,053 UART: [kat] ECC-384
915,904 UART: [kat] HMAC-384Kdf
920,344 UART: [kat] LMS
1,168,656 UART: [kat] --
1,169,691 UART: [cold-reset] ++
1,170,053 UART: [fht] FHT @ 0x50003400
1,172,633 UART: [idev] ++
1,172,801 UART: [idev] CDI.KEYID = 6
1,173,162 UART: [idev] SUBJECT.KEYID = 7
1,173,587 UART: [idev] UDS.KEYID = 0
1,181,737 UART: [idev] Erasing UDS.KEYID = 0
1,198,715 UART: [idev] Sha1 KeyId Algorithm
1,207,665 UART: [idev] --
1,208,466 UART: [ldev] ++
1,208,634 UART: [ldev] CDI.KEYID = 6
1,208,998 UART: [ldev] SUBJECT.KEYID = 5
1,209,425 UART: [ldev] AUTHORITY.KEYID = 7
1,209,888 UART: [ldev] FE.KEYID = 1
1,215,028 UART: [ldev] Erasing FE.KEYID = 1
1,240,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,858 UART: [ldev] --
1,280,368 UART: [fwproc] Wait for Commands...
1,280,971 UART: [fwproc] Recv command 0x46574c44
1,281,704 UART: [fwproc] Recv'd Img size: 114332 bytes
1,319,173 UART: ROM Fatal Error: 0x000B000D
1,320,332 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,174,363 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,801 UART: [state] LifecycleState = Unprovisioned
86,456 UART: [state] DebugLocked = No
86,986 UART: [state] WD Timer not started. Device not locked for debugging
88,329 UART: [kat] SHA2-256
891,879 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,008 UART: [kat] ++
896,160 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,071 UART: [kat] SHA2-512-ACC
906,972 UART: [kat] ECC-384
916,639 UART: [kat] HMAC-384Kdf
921,235 UART: [kat] LMS
1,169,547 UART: [kat] --
1,170,540 UART: [cold-reset] ++
1,171,098 UART: [fht] FHT @ 0x50003400
1,173,754 UART: [idev] ++
1,173,922 UART: [idev] CDI.KEYID = 6
1,174,283 UART: [idev] SUBJECT.KEYID = 7
1,174,708 UART: [idev] UDS.KEYID = 0
1,182,882 UART: [idev] Erasing UDS.KEYID = 0
1,199,960 UART: [idev] Sha1 KeyId Algorithm
1,208,816 UART: [idev] --
1,209,631 UART: [ldev] ++
1,209,799 UART: [ldev] CDI.KEYID = 6
1,210,163 UART: [ldev] SUBJECT.KEYID = 5
1,210,590 UART: [ldev] AUTHORITY.KEYID = 7
1,211,053 UART: [ldev] FE.KEYID = 1
1,216,473 UART: [ldev] Erasing FE.KEYID = 1
1,243,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,599 UART: [ldev] --
1,282,981 UART: [fwproc] Wait for Commands...
1,283,710 UART: [fwproc] Recv command 0x46574c44
1,284,443 UART: [fwproc] Recv'd Img size: 114332 bytes
1,323,168 UART: ROM Fatal Error: 0x000B000D
1,324,327 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,174,752 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,448 UART: [state] LifecycleState = Unprovisioned
86,103 UART: [state] DebugLocked = No
86,755 UART: [state] WD Timer not started. Device not locked for debugging
87,874 UART: [kat] SHA2-256
891,424 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,553 UART: [kat] ++
895,705 UART: [kat] sha1
900,073 UART: [kat] SHA2-256
902,013 UART: [kat] SHA2-384
904,960 UART: [kat] SHA2-512-ACC
906,861 UART: [kat] ECC-384
916,724 UART: [kat] HMAC-384Kdf
921,414 UART: [kat] LMS
1,169,726 UART: [kat] --
1,170,807 UART: [cold-reset] ++
1,171,345 UART: [fht] FHT @ 0x50003400
1,173,811 UART: [idev] ++
1,173,979 UART: [idev] CDI.KEYID = 6
1,174,340 UART: [idev] SUBJECT.KEYID = 7
1,174,765 UART: [idev] UDS.KEYID = 0
1,183,131 UART: [idev] Erasing UDS.KEYID = 0
1,200,155 UART: [idev] Sha1 KeyId Algorithm
1,208,975 UART: [idev] --
1,209,942 UART: [ldev] ++
1,210,110 UART: [ldev] CDI.KEYID = 6
1,210,474 UART: [ldev] SUBJECT.KEYID = 5
1,210,901 UART: [ldev] AUTHORITY.KEYID = 7
1,211,364 UART: [ldev] FE.KEYID = 1
1,216,348 UART: [ldev] Erasing FE.KEYID = 1
1,242,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,524 UART: [ldev] --
1,281,934 UART: [fwproc] Wait for Commands...
1,282,661 UART: [fwproc] Recv command 0x46574c44
1,283,394 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,610 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,919 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,635 >>> mbox cmd response: success
2,774,882 UART: [afmc] ++
2,775,050 UART: [afmc] CDI.KEYID = 6
2,775,413 UART: [afmc] SUBJECT.KEYID = 7
2,775,839 UART: [afmc] AUTHORITY.KEYID = 5
2,810,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,058 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,809 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,538 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,421 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,140 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,021 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,183 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,402 UART: [state] WD Timer not started. Device not locked for debugging
87,621 UART: [kat] SHA2-256
891,171 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,300 UART: [kat] ++
895,452 UART: [kat] sha1
899,832 UART: [kat] SHA2-256
901,772 UART: [kat] SHA2-384
904,531 UART: [kat] SHA2-512-ACC
906,432 UART: [kat] ECC-384
916,107 UART: [kat] HMAC-384Kdf
920,745 UART: [kat] LMS
1,169,057 UART: [kat] --
1,169,696 UART: [cold-reset] ++
1,170,226 UART: [fht] FHT @ 0x50003400
1,172,870 UART: [idev] ++
1,173,038 UART: [idev] CDI.KEYID = 6
1,173,399 UART: [idev] SUBJECT.KEYID = 7
1,173,824 UART: [idev] UDS.KEYID = 0
1,181,876 UART: [idev] Erasing UDS.KEYID = 0
1,198,478 UART: [idev] Sha1 KeyId Algorithm
1,207,420 UART: [idev] --
1,208,253 UART: [ldev] ++
1,208,421 UART: [ldev] CDI.KEYID = 6
1,208,785 UART: [ldev] SUBJECT.KEYID = 5
1,209,212 UART: [ldev] AUTHORITY.KEYID = 7
1,209,675 UART: [ldev] FE.KEYID = 1
1,214,875 UART: [ldev] Erasing FE.KEYID = 1
1,241,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,383 UART: [ldev] --
1,280,657 UART: [fwproc] Wait for Commands...
1,281,356 UART: [fwproc] Recv command 0x46574c44
1,282,089 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,929 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,238 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,066 >>> mbox cmd response: success
2,773,143 UART: [afmc] ++
2,773,311 UART: [afmc] CDI.KEYID = 6
2,773,674 UART: [afmc] SUBJECT.KEYID = 7
2,774,100 UART: [afmc] AUTHORITY.KEYID = 5
2,810,337 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,871 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,622 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,351 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,234 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,953 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,778 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,072 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
891,110 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,239 UART: [kat] ++
895,391 UART: [kat] sha1
899,583 UART: [kat] SHA2-256
901,523 UART: [kat] SHA2-384
904,330 UART: [kat] SHA2-512-ACC
906,231 UART: [kat] ECC-384
915,928 UART: [kat] HMAC-384Kdf
920,604 UART: [kat] LMS
1,168,916 UART: [kat] --
1,169,949 UART: [cold-reset] ++
1,170,475 UART: [fht] FHT @ 0x50003400
1,173,085 UART: [idev] ++
1,173,253 UART: [idev] CDI.KEYID = 6
1,173,614 UART: [idev] SUBJECT.KEYID = 7
1,174,039 UART: [idev] UDS.KEYID = 0
1,182,477 UART: [idev] Erasing UDS.KEYID = 0
1,199,675 UART: [idev] Sha1 KeyId Algorithm
1,208,555 UART: [idev] --
1,209,484 UART: [ldev] ++
1,209,652 UART: [ldev] CDI.KEYID = 6
1,210,016 UART: [ldev] SUBJECT.KEYID = 5
1,210,443 UART: [ldev] AUTHORITY.KEYID = 7
1,210,906 UART: [ldev] FE.KEYID = 1
1,216,312 UART: [ldev] Erasing FE.KEYID = 1
1,242,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,534 UART: [ldev] --
1,282,040 UART: [fwproc] Wait for Commands...
1,282,745 UART: [fwproc] Recv command 0x46574c44
1,283,478 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,780 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,089 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,821 >>> mbox cmd response: success
2,774,860 UART: [afmc] ++
2,775,028 UART: [afmc] CDI.KEYID = 6
2,775,391 UART: [afmc] SUBJECT.KEYID = 7
2,775,817 UART: [afmc] AUTHORITY.KEYID = 5
2,811,964 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,568 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,319 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,048 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,931 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,650 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,387 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,493 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,470 UART: [kat] ++
895,622 UART: [kat] sha1
900,036 UART: [kat] SHA2-256
901,976 UART: [kat] SHA2-384
904,643 UART: [kat] SHA2-512-ACC
906,544 UART: [kat] ECC-384
916,277 UART: [kat] HMAC-384Kdf
920,959 UART: [kat] LMS
1,169,271 UART: [kat] --
1,170,140 UART: [cold-reset] ++
1,170,674 UART: [fht] FHT @ 0x50003400
1,173,106 UART: [idev] ++
1,173,274 UART: [idev] CDI.KEYID = 6
1,173,635 UART: [idev] SUBJECT.KEYID = 7
1,174,060 UART: [idev] UDS.KEYID = 0
1,182,198 UART: [idev] Erasing UDS.KEYID = 0
1,199,120 UART: [idev] Sha1 KeyId Algorithm
1,207,958 UART: [idev] --
1,209,091 UART: [ldev] ++
1,209,259 UART: [ldev] CDI.KEYID = 6
1,209,623 UART: [ldev] SUBJECT.KEYID = 5
1,210,050 UART: [ldev] AUTHORITY.KEYID = 7
1,210,513 UART: [ldev] FE.KEYID = 1
1,215,933 UART: [ldev] Erasing FE.KEYID = 1
1,242,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,321 UART: [ldev] --
1,281,707 UART: [fwproc] Wait for Commands...
1,282,504 UART: [fwproc] Recv command 0x46574c44
1,283,237 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,239 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,548 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,324 >>> mbox cmd response: success
2,774,563 UART: [afmc] ++
2,774,731 UART: [afmc] CDI.KEYID = 6
2,775,094 UART: [afmc] SUBJECT.KEYID = 7
2,775,520 UART: [afmc] AUTHORITY.KEYID = 5
2,811,027 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,298 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,027 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,910 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,629 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,526 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,342 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
891,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,439 UART: [kat] ++
895,591 UART: [kat] sha1
899,857 UART: [kat] SHA2-256
901,797 UART: [kat] SHA2-384
904,738 UART: [kat] SHA2-512-ACC
906,639 UART: [kat] ECC-384
916,162 UART: [kat] HMAC-384Kdf
920,752 UART: [kat] LMS
1,169,064 UART: [kat] --
1,169,911 UART: [cold-reset] ++
1,170,425 UART: [fht] FHT @ 0x50003400
1,173,069 UART: [idev] ++
1,173,237 UART: [idev] CDI.KEYID = 6
1,173,598 UART: [idev] SUBJECT.KEYID = 7
1,174,023 UART: [idev] UDS.KEYID = 0
1,181,645 UART: [idev] Erasing UDS.KEYID = 0
1,198,525 UART: [idev] Sha1 KeyId Algorithm
1,207,585 UART: [idev] --
1,208,408 UART: [ldev] ++
1,208,576 UART: [ldev] CDI.KEYID = 6
1,208,940 UART: [ldev] SUBJECT.KEYID = 5
1,209,367 UART: [ldev] AUTHORITY.KEYID = 7
1,209,830 UART: [ldev] FE.KEYID = 1
1,214,996 UART: [ldev] Erasing FE.KEYID = 1
1,241,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,496 UART: [ldev] --
1,279,934 UART: [fwproc] Wait for Commands...
1,280,759 UART: [fwproc] Recv command 0x46574c44
1,281,492 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,706 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,015 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,811 >>> mbox cmd response: success
2,771,984 UART: [afmc] ++
2,772,152 UART: [afmc] CDI.KEYID = 6
2,772,515 UART: [afmc] SUBJECT.KEYID = 7
2,772,941 UART: [afmc] AUTHORITY.KEYID = 5
2,808,358 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,694 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,445 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,174 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,057 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,776 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,677 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,945 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
891,315 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,444 UART: [kat] ++
895,596 UART: [kat] sha1
899,624 UART: [kat] SHA2-256
901,564 UART: [kat] SHA2-384
904,371 UART: [kat] SHA2-512-ACC
906,272 UART: [kat] ECC-384
915,731 UART: [kat] HMAC-384Kdf
920,407 UART: [kat] LMS
1,168,719 UART: [kat] --
1,169,622 UART: [cold-reset] ++
1,170,136 UART: [fht] FHT @ 0x50003400
1,172,634 UART: [idev] ++
1,172,802 UART: [idev] CDI.KEYID = 6
1,173,163 UART: [idev] SUBJECT.KEYID = 7
1,173,588 UART: [idev] UDS.KEYID = 0
1,181,616 UART: [idev] Erasing UDS.KEYID = 0
1,199,212 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,441 UART: [ldev] ++
1,209,609 UART: [ldev] CDI.KEYID = 6
1,209,973 UART: [ldev] SUBJECT.KEYID = 5
1,210,400 UART: [ldev] AUTHORITY.KEYID = 7
1,210,863 UART: [ldev] FE.KEYID = 1
1,216,027 UART: [ldev] Erasing FE.KEYID = 1
1,243,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,975 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,283,014 UART: [fwproc] Recv command 0x46574c44
1,283,747 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,133 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,442 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,152 >>> mbox cmd response: success
2,774,275 UART: [afmc] ++
2,774,443 UART: [afmc] CDI.KEYID = 6
2,774,806 UART: [afmc] SUBJECT.KEYID = 7
2,775,232 UART: [afmc] AUTHORITY.KEYID = 5
2,810,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,376 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,105 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,988 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,707 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,634 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,540 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
891,214 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,343 UART: [kat] ++
895,495 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,432 UART: [kat] SHA2-512-ACC
906,333 UART: [kat] ECC-384
916,142 UART: [kat] HMAC-384Kdf
920,718 UART: [kat] LMS
1,169,030 UART: [kat] --
1,169,885 UART: [cold-reset] ++
1,170,219 UART: [fht] FHT @ 0x50003400
1,172,735 UART: [idev] ++
1,172,903 UART: [idev] CDI.KEYID = 6
1,173,264 UART: [idev] SUBJECT.KEYID = 7
1,173,689 UART: [idev] UDS.KEYID = 0
1,181,577 UART: [idev] Erasing UDS.KEYID = 0
1,198,459 UART: [idev] Sha1 KeyId Algorithm
1,207,309 UART: [idev] --
1,208,302 UART: [ldev] ++
1,208,470 UART: [ldev] CDI.KEYID = 6
1,208,834 UART: [ldev] SUBJECT.KEYID = 5
1,209,261 UART: [ldev] AUTHORITY.KEYID = 7
1,209,724 UART: [ldev] FE.KEYID = 1
1,214,534 UART: [ldev] Erasing FE.KEYID = 1
1,240,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,234 UART: [ldev] --
1,279,670 UART: [fwproc] Wait for Commands...
1,280,269 UART: [fwproc] Recv command 0x46574c44
1,281,002 UART: [fwproc] Recv'd Img size: 114332 bytes
1,595,188 UART: ROM Fatal Error: 0x000B0030
1,596,345 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,451,011 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,905 UART: [state] LifecycleState = Unprovisioned
85,560 UART: [state] DebugLocked = No
86,256 UART: [state] WD Timer not started. Device not locked for debugging
87,511 UART: [kat] SHA2-256
891,061 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,190 UART: [kat] ++
895,342 UART: [kat] sha1
899,526 UART: [kat] SHA2-256
901,466 UART: [kat] SHA2-384
904,309 UART: [kat] SHA2-512-ACC
906,210 UART: [kat] ECC-384
916,111 UART: [kat] HMAC-384Kdf
920,805 UART: [kat] LMS
1,169,117 UART: [kat] --
1,170,236 UART: [cold-reset] ++
1,170,574 UART: [fht] FHT @ 0x50003400
1,173,130 UART: [idev] ++
1,173,298 UART: [idev] CDI.KEYID = 6
1,173,659 UART: [idev] SUBJECT.KEYID = 7
1,174,084 UART: [idev] UDS.KEYID = 0
1,182,082 UART: [idev] Erasing UDS.KEYID = 0
1,199,438 UART: [idev] Sha1 KeyId Algorithm
1,208,312 UART: [idev] --
1,209,481 UART: [ldev] ++
1,209,649 UART: [ldev] CDI.KEYID = 6
1,210,013 UART: [ldev] SUBJECT.KEYID = 5
1,210,440 UART: [ldev] AUTHORITY.KEYID = 7
1,210,903 UART: [ldev] FE.KEYID = 1
1,216,227 UART: [ldev] Erasing FE.KEYID = 1
1,242,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,519 UART: [ldev] --
1,281,987 UART: [fwproc] Wait for Commands...
1,282,626 UART: [fwproc] Recv command 0x46574c44
1,283,359 UART: [fwproc] Recv'd Img size: 114332 bytes
1,593,944 UART: ROM Fatal Error: 0x000B0030
1,595,101 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,442,668 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,566 UART: [state] LifecycleState = Unprovisioned
86,221 UART: [state] DebugLocked = No
86,857 UART: [state] WD Timer not started. Device not locked for debugging
88,108 UART: [kat] SHA2-256
891,658 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,787 UART: [kat] ++
895,939 UART: [kat] sha1
899,985 UART: [kat] SHA2-256
901,925 UART: [kat] SHA2-384
904,796 UART: [kat] SHA2-512-ACC
906,697 UART: [kat] ECC-384
916,440 UART: [kat] HMAC-384Kdf
921,160 UART: [kat] LMS
1,169,472 UART: [kat] --
1,170,205 UART: [cold-reset] ++
1,170,645 UART: [fht] FHT @ 0x50003400
1,173,269 UART: [idev] ++
1,173,437 UART: [idev] CDI.KEYID = 6
1,173,798 UART: [idev] SUBJECT.KEYID = 7
1,174,223 UART: [idev] UDS.KEYID = 0
1,182,473 UART: [idev] Erasing UDS.KEYID = 0
1,199,107 UART: [idev] Sha1 KeyId Algorithm
1,208,045 UART: [idev] --
1,209,008 UART: [ldev] ++
1,209,176 UART: [ldev] CDI.KEYID = 6
1,209,540 UART: [ldev] SUBJECT.KEYID = 5
1,209,967 UART: [ldev] AUTHORITY.KEYID = 7
1,210,430 UART: [ldev] FE.KEYID = 1
1,215,644 UART: [ldev] Erasing FE.KEYID = 1
1,241,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,104 UART: [ldev] --
1,280,506 UART: [fwproc] Wait for Commands...
1,281,217 UART: [fwproc] Recv command 0x46574c44
1,281,950 UART: [fwproc] Recv'd Img size: 114332 bytes
1,593,095 UART: ROM Fatal Error: 0x000B0030
1,594,252 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,440,923 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
891,355 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,484 UART: [kat] ++
895,636 UART: [kat] sha1
900,064 UART: [kat] SHA2-256
902,004 UART: [kat] SHA2-384
904,817 UART: [kat] SHA2-512-ACC
906,718 UART: [kat] ECC-384
916,317 UART: [kat] HMAC-384Kdf
921,041 UART: [kat] LMS
1,169,353 UART: [kat] --
1,170,456 UART: [cold-reset] ++
1,171,002 UART: [fht] FHT @ 0x50003400
1,173,604 UART: [idev] ++
1,173,772 UART: [idev] CDI.KEYID = 6
1,174,133 UART: [idev] SUBJECT.KEYID = 7
1,174,558 UART: [idev] UDS.KEYID = 0
1,182,832 UART: [idev] Erasing UDS.KEYID = 0
1,199,542 UART: [idev] Sha1 KeyId Algorithm
1,208,278 UART: [idev] --
1,209,213 UART: [ldev] ++
1,209,381 UART: [ldev] CDI.KEYID = 6
1,209,745 UART: [ldev] SUBJECT.KEYID = 5
1,210,172 UART: [ldev] AUTHORITY.KEYID = 7
1,210,635 UART: [ldev] FE.KEYID = 1
1,215,923 UART: [ldev] Erasing FE.KEYID = 1
1,242,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,691 UART: [ldev] --
1,281,097 UART: [fwproc] Wait for Commands...
1,281,710 UART: [fwproc] Recv command 0x46574c44
1,282,443 UART: [fwproc] Recv'd Img size: 114332 bytes
1,590,627 UART: ROM Fatal Error: 0x000B0030
1,591,784 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,454,144 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,269 UART: [kat] ++
895,421 UART: [kat] sha1
899,671 UART: [kat] SHA2-256
901,611 UART: [kat] SHA2-384
904,194 UART: [kat] SHA2-512-ACC
906,095 UART: [kat] ECC-384
915,678 UART: [kat] HMAC-384Kdf
920,454 UART: [kat] LMS
1,168,766 UART: [kat] --
1,169,603 UART: [cold-reset] ++
1,170,103 UART: [fht] FHT @ 0x50003400
1,172,849 UART: [idev] ++
1,173,017 UART: [idev] CDI.KEYID = 6
1,173,378 UART: [idev] SUBJECT.KEYID = 7
1,173,803 UART: [idev] UDS.KEYID = 0
1,182,319 UART: [idev] Erasing UDS.KEYID = 0
1,199,433 UART: [idev] Sha1 KeyId Algorithm
1,208,299 UART: [idev] --
1,209,360 UART: [ldev] ++
1,209,528 UART: [ldev] CDI.KEYID = 6
1,209,892 UART: [ldev] SUBJECT.KEYID = 5
1,210,319 UART: [ldev] AUTHORITY.KEYID = 7
1,210,782 UART: [ldev] FE.KEYID = 1
1,216,052 UART: [ldev] Erasing FE.KEYID = 1
1,242,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,322 UART: [ldev] --
1,281,770 UART: [fwproc] Wait for Commands...
1,282,379 UART: [fwproc] Recv command 0x46574c44
1,283,112 UART: [fwproc] Recv'd Img size: 114332 bytes
1,591,248 UART: ROM Fatal Error: 0x000B0030
1,592,405 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,446,405 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
891,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,644 UART: [kat] ++
895,796 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,569 UART: [kat] SHA2-512-ACC
906,470 UART: [kat] ECC-384
916,465 UART: [kat] HMAC-384Kdf
921,043 UART: [kat] LMS
1,169,355 UART: [kat] --
1,170,134 UART: [cold-reset] ++
1,170,546 UART: [fht] FHT @ 0x50003400
1,173,348 UART: [idev] ++
1,173,516 UART: [idev] CDI.KEYID = 6
1,173,877 UART: [idev] SUBJECT.KEYID = 7
1,174,302 UART: [idev] UDS.KEYID = 0
1,182,506 UART: [idev] Erasing UDS.KEYID = 0
1,199,602 UART: [idev] Sha1 KeyId Algorithm
1,208,408 UART: [idev] --
1,209,289 UART: [ldev] ++
1,209,457 UART: [ldev] CDI.KEYID = 6
1,209,821 UART: [ldev] SUBJECT.KEYID = 5
1,210,248 UART: [ldev] AUTHORITY.KEYID = 7
1,210,711 UART: [ldev] FE.KEYID = 1
1,216,073 UART: [ldev] Erasing FE.KEYID = 1
1,242,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,647 UART: [ldev] --
1,281,969 UART: [fwproc] Wait for Commands...
1,282,556 UART: [fwproc] Recv command 0x46574c44
1,283,289 UART: [fwproc] Recv'd Img size: 114332 bytes
1,596,905 UART: ROM Fatal Error: 0x000B0030
1,598,062 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,444,969 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,659 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
891,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,577 UART: [kat] ++
895,729 UART: [kat] sha1
899,785 UART: [kat] SHA2-256
901,725 UART: [kat] SHA2-384
904,688 UART: [kat] SHA2-512-ACC
906,589 UART: [kat] ECC-384
916,044 UART: [kat] HMAC-384Kdf
920,588 UART: [kat] LMS
1,168,900 UART: [kat] --
1,169,695 UART: [cold-reset] ++
1,170,197 UART: [fht] FHT @ 0x50003400
1,172,823 UART: [idev] ++
1,172,991 UART: [idev] CDI.KEYID = 6
1,173,352 UART: [idev] SUBJECT.KEYID = 7
1,173,777 UART: [idev] UDS.KEYID = 0
1,181,743 UART: [idev] Erasing UDS.KEYID = 0
1,198,907 UART: [idev] Sha1 KeyId Algorithm
1,207,833 UART: [idev] --
1,208,676 UART: [ldev] ++
1,208,844 UART: [ldev] CDI.KEYID = 6
1,209,208 UART: [ldev] SUBJECT.KEYID = 5
1,209,635 UART: [ldev] AUTHORITY.KEYID = 7
1,210,098 UART: [ldev] FE.KEYID = 1
1,215,158 UART: [ldev] Erasing FE.KEYID = 1
1,240,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,326 UART: [ldev] --
1,280,716 UART: [fwproc] Wait for Commands...
1,281,377 UART: [fwproc] Recv command 0x46574c44
1,282,110 UART: [fwproc] Recv'd Img size: 114332 bytes
1,301,363 UART: ROM Fatal Error: 0x000B0001
1,302,520 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,154,403 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
891,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,560 UART: [kat] ++
895,712 UART: [kat] sha1
899,904 UART: [kat] SHA2-256
901,844 UART: [kat] SHA2-384
904,515 UART: [kat] SHA2-512-ACC
906,416 UART: [kat] ECC-384
916,801 UART: [kat] HMAC-384Kdf
921,683 UART: [kat] LMS
1,169,995 UART: [kat] --
1,170,746 UART: [cold-reset] ++
1,171,144 UART: [fht] FHT @ 0x50003400
1,173,890 UART: [idev] ++
1,174,058 UART: [idev] CDI.KEYID = 6
1,174,419 UART: [idev] SUBJECT.KEYID = 7
1,174,844 UART: [idev] UDS.KEYID = 0
1,183,086 UART: [idev] Erasing UDS.KEYID = 0
1,199,970 UART: [idev] Sha1 KeyId Algorithm
1,208,928 UART: [idev] --
1,209,997 UART: [ldev] ++
1,210,165 UART: [ldev] CDI.KEYID = 6
1,210,529 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,769 UART: [ldev] Erasing FE.KEYID = 1
1,243,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,103 UART: [ldev] --
1,282,459 UART: [fwproc] Wait for Commands...
1,283,278 UART: [fwproc] Recv command 0x46574c44
1,284,011 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,244 UART: ROM Fatal Error: 0x000B0001
1,304,401 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,156,622 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
891,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,687 UART: [kat] SHA2-256
901,627 UART: [kat] SHA2-384
904,336 UART: [kat] SHA2-512-ACC
906,237 UART: [kat] ECC-384
916,024 UART: [kat] HMAC-384Kdf
920,682 UART: [kat] LMS
1,168,994 UART: [kat] --
1,169,699 UART: [cold-reset] ++
1,170,191 UART: [fht] FHT @ 0x50003400
1,172,927 UART: [idev] ++
1,173,095 UART: [idev] CDI.KEYID = 6
1,173,456 UART: [idev] SUBJECT.KEYID = 7
1,173,881 UART: [idev] UDS.KEYID = 0
1,182,549 UART: [idev] Erasing UDS.KEYID = 0
1,198,777 UART: [idev] Sha1 KeyId Algorithm
1,207,431 UART: [idev] --
1,208,476 UART: [ldev] ++
1,208,644 UART: [ldev] CDI.KEYID = 6
1,209,008 UART: [ldev] SUBJECT.KEYID = 5
1,209,435 UART: [ldev] AUTHORITY.KEYID = 7
1,209,898 UART: [ldev] FE.KEYID = 1
1,215,098 UART: [ldev] Erasing FE.KEYID = 1
1,241,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,110 UART: [ldev] --
1,280,566 UART: [fwproc] Wait for Commands...
1,281,231 UART: [fwproc] Recv command 0x46574c44
1,281,964 UART: [fwproc] Recv'd Img size: 114332 bytes
1,301,239 UART: ROM Fatal Error: 0x000B0001
1,302,396 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,154,521 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,773 UART: [state] LifecycleState = Unprovisioned
86,428 UART: [state] DebugLocked = No
87,146 UART: [state] WD Timer not started. Device not locked for debugging
88,329 UART: [kat] SHA2-256
891,879 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,008 UART: [kat] ++
896,160 UART: [kat] sha1
900,436 UART: [kat] SHA2-256
902,376 UART: [kat] SHA2-384
905,129 UART: [kat] SHA2-512-ACC
907,030 UART: [kat] ECC-384
916,735 UART: [kat] HMAC-384Kdf
921,355 UART: [kat] LMS
1,169,667 UART: [kat] --
1,170,748 UART: [cold-reset] ++
1,171,156 UART: [fht] FHT @ 0x50003400
1,173,680 UART: [idev] ++
1,173,848 UART: [idev] CDI.KEYID = 6
1,174,209 UART: [idev] SUBJECT.KEYID = 7
1,174,634 UART: [idev] UDS.KEYID = 0
1,182,178 UART: [idev] Erasing UDS.KEYID = 0
1,199,086 UART: [idev] Sha1 KeyId Algorithm
1,208,152 UART: [idev] --
1,208,991 UART: [ldev] ++
1,209,159 UART: [ldev] CDI.KEYID = 6
1,209,523 UART: [ldev] SUBJECT.KEYID = 5
1,209,950 UART: [ldev] AUTHORITY.KEYID = 7
1,210,413 UART: [ldev] FE.KEYID = 1
1,215,745 UART: [ldev] Erasing FE.KEYID = 1
1,242,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,503 UART: [ldev] --
1,281,963 UART: [fwproc] Wait for Commands...
1,282,698 UART: [fwproc] Recv command 0x46574c44
1,283,431 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,282 UART: ROM Fatal Error: 0x000B0001
1,303,439 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,156,684 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
891,266 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,395 UART: [kat] ++
895,547 UART: [kat] sha1
899,801 UART: [kat] SHA2-256
901,741 UART: [kat] SHA2-384
904,564 UART: [kat] SHA2-512-ACC
906,465 UART: [kat] ECC-384
916,032 UART: [kat] HMAC-384Kdf
920,454 UART: [kat] LMS
1,168,766 UART: [kat] --
1,169,741 UART: [cold-reset] ++
1,170,089 UART: [fht] FHT @ 0x50003400
1,172,797 UART: [idev] ++
1,172,965 UART: [idev] CDI.KEYID = 6
1,173,326 UART: [idev] SUBJECT.KEYID = 7
1,173,751 UART: [idev] UDS.KEYID = 0
1,181,991 UART: [idev] Erasing UDS.KEYID = 0
1,198,761 UART: [idev] Sha1 KeyId Algorithm
1,207,541 UART: [idev] --
1,208,646 UART: [ldev] ++
1,208,814 UART: [ldev] CDI.KEYID = 6
1,209,178 UART: [ldev] SUBJECT.KEYID = 5
1,209,605 UART: [ldev] AUTHORITY.KEYID = 7
1,210,068 UART: [ldev] FE.KEYID = 1
1,215,340 UART: [ldev] Erasing FE.KEYID = 1
1,241,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,662 UART: [ldev] --
1,281,078 UART: [fwproc] Wait for Commands...
1,281,739 UART: [fwproc] Recv command 0x46574c44
1,282,472 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,075 UART: ROM Fatal Error: 0x000B0001
1,303,232 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,154,951 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,845 UART: [state] LifecycleState = Unprovisioned
86,500 UART: [state] DebugLocked = No
87,130 UART: [state] WD Timer not started. Device not locked for debugging
88,427 UART: [kat] SHA2-256
891,977 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,106 UART: [kat] ++
896,258 UART: [kat] sha1
900,536 UART: [kat] SHA2-256
902,476 UART: [kat] SHA2-384
905,237 UART: [kat] SHA2-512-ACC
907,138 UART: [kat] ECC-384
917,389 UART: [kat] HMAC-384Kdf
921,915 UART: [kat] LMS
1,170,227 UART: [kat] --
1,171,124 UART: [cold-reset] ++
1,171,618 UART: [fht] FHT @ 0x50003400
1,174,276 UART: [idev] ++
1,174,444 UART: [idev] CDI.KEYID = 6
1,174,805 UART: [idev] SUBJECT.KEYID = 7
1,175,230 UART: [idev] UDS.KEYID = 0
1,183,168 UART: [idev] Erasing UDS.KEYID = 0
1,200,082 UART: [idev] Sha1 KeyId Algorithm
1,209,088 UART: [idev] --
1,210,005 UART: [ldev] ++
1,210,173 UART: [ldev] CDI.KEYID = 6
1,210,537 UART: [ldev] SUBJECT.KEYID = 5
1,210,964 UART: [ldev] AUTHORITY.KEYID = 7
1,211,427 UART: [ldev] FE.KEYID = 1
1,217,031 UART: [ldev] Erasing FE.KEYID = 1
1,243,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,195 UART: [ldev] --
1,282,587 UART: [fwproc] Wait for Commands...
1,283,170 UART: [fwproc] Recv command 0x46574c44
1,283,903 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,188 UART: ROM Fatal Error: 0x000B0001
1,304,345 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,155,052 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
891,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,237 UART: [kat] ++
895,389 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,294 UART: [kat] SHA2-512-ACC
906,195 UART: [kat] ECC-384
915,962 UART: [kat] HMAC-384Kdf
920,520 UART: [kat] LMS
1,168,832 UART: [kat] --
1,169,987 UART: [cold-reset] ++
1,170,415 UART: [fht] FHT @ 0x50003400
1,173,107 UART: [idev] ++
1,173,275 UART: [idev] CDI.KEYID = 6
1,173,636 UART: [idev] SUBJECT.KEYID = 7
1,174,061 UART: [idev] UDS.KEYID = 0
1,181,469 UART: [idev] Erasing UDS.KEYID = 0
1,198,373 UART: [idev] Sha1 KeyId Algorithm
1,207,235 UART: [idev] --
1,208,410 UART: [ldev] ++
1,208,578 UART: [ldev] CDI.KEYID = 6
1,208,942 UART: [ldev] SUBJECT.KEYID = 5
1,209,369 UART: [ldev] AUTHORITY.KEYID = 7
1,209,832 UART: [ldev] FE.KEYID = 1
1,214,862 UART: [ldev] Erasing FE.KEYID = 1
1,241,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,014 UART: [ldev] --
1,280,300 UART: [fwproc] Wait for Commands...
1,281,117 UART: [fwproc] Recv command 0x46574c44
1,281,850 UART: [fwproc] Recv'd Img size: 114332 bytes
1,301,088 UART: ROM Fatal Error: 0x000B0002
1,302,245 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,155,768 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
891,435 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,564 UART: [kat] ++
895,716 UART: [kat] sha1
899,822 UART: [kat] SHA2-256
901,762 UART: [kat] SHA2-384
904,487 UART: [kat] SHA2-512-ACC
906,388 UART: [kat] ECC-384
915,951 UART: [kat] HMAC-384Kdf
920,567 UART: [kat] LMS
1,168,879 UART: [kat] --
1,169,706 UART: [cold-reset] ++
1,170,270 UART: [fht] FHT @ 0x50003400
1,172,934 UART: [idev] ++
1,173,102 UART: [idev] CDI.KEYID = 6
1,173,463 UART: [idev] SUBJECT.KEYID = 7
1,173,888 UART: [idev] UDS.KEYID = 0
1,181,938 UART: [idev] Erasing UDS.KEYID = 0
1,199,170 UART: [idev] Sha1 KeyId Algorithm
1,208,044 UART: [idev] --
1,208,939 UART: [ldev] ++
1,209,107 UART: [ldev] CDI.KEYID = 6
1,209,471 UART: [ldev] SUBJECT.KEYID = 5
1,209,898 UART: [ldev] AUTHORITY.KEYID = 7
1,210,361 UART: [ldev] FE.KEYID = 1
1,215,583 UART: [ldev] Erasing FE.KEYID = 1
1,242,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,269 UART: [ldev] --
1,281,665 UART: [fwproc] Wait for Commands...
1,282,426 UART: [fwproc] Recv command 0x46574c44
1,283,159 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,225 UART: ROM Fatal Error: 0x000B0002
1,303,382 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,155,179 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
891,194 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,787 UART: [kat] SHA2-256
901,727 UART: [kat] SHA2-384
904,350 UART: [kat] SHA2-512-ACC
906,251 UART: [kat] ECC-384
915,898 UART: [kat] HMAC-384Kdf
920,436 UART: [kat] LMS
1,168,748 UART: [kat] --
1,169,913 UART: [cold-reset] ++
1,170,469 UART: [fht] FHT @ 0x50003400
1,173,193 UART: [idev] ++
1,173,361 UART: [idev] CDI.KEYID = 6
1,173,722 UART: [idev] SUBJECT.KEYID = 7
1,174,147 UART: [idev] UDS.KEYID = 0
1,182,213 UART: [idev] Erasing UDS.KEYID = 0
1,198,601 UART: [idev] Sha1 KeyId Algorithm
1,207,471 UART: [idev] --
1,208,384 UART: [ldev] ++
1,208,552 UART: [ldev] CDI.KEYID = 6
1,208,916 UART: [ldev] SUBJECT.KEYID = 5
1,209,343 UART: [ldev] AUTHORITY.KEYID = 7
1,209,806 UART: [ldev] FE.KEYID = 1
1,215,090 UART: [ldev] Erasing FE.KEYID = 1
1,241,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,212 UART: [ldev] --
1,280,714 UART: [fwproc] Wait for Commands...
1,281,415 UART: [fwproc] Recv command 0x46574c44
1,282,148 UART: [fwproc] Recv'd Img size: 114332 bytes
1,301,154 UART: ROM Fatal Error: 0x000B0002
1,302,311 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,154,328 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
891,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,668 UART: [kat] ++
895,820 UART: [kat] sha1
899,830 UART: [kat] SHA2-256
901,770 UART: [kat] SHA2-384
904,305 UART: [kat] SHA2-512-ACC
906,206 UART: [kat] ECC-384
916,009 UART: [kat] HMAC-384Kdf
920,737 UART: [kat] LMS
1,169,049 UART: [kat] --
1,170,156 UART: [cold-reset] ++
1,170,570 UART: [fht] FHT @ 0x50003400
1,173,172 UART: [idev] ++
1,173,340 UART: [idev] CDI.KEYID = 6
1,173,701 UART: [idev] SUBJECT.KEYID = 7
1,174,126 UART: [idev] UDS.KEYID = 0
1,182,190 UART: [idev] Erasing UDS.KEYID = 0
1,199,146 UART: [idev] Sha1 KeyId Algorithm
1,208,050 UART: [idev] --
1,208,903 UART: [ldev] ++
1,209,071 UART: [ldev] CDI.KEYID = 6
1,209,435 UART: [ldev] SUBJECT.KEYID = 5
1,209,862 UART: [ldev] AUTHORITY.KEYID = 7
1,210,325 UART: [ldev] FE.KEYID = 1
1,215,669 UART: [ldev] Erasing FE.KEYID = 1
1,242,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,239 UART: [ldev] --
1,281,555 UART: [fwproc] Wait for Commands...
1,282,374 UART: [fwproc] Recv command 0x46574c44
1,283,107 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,119 UART: ROM Fatal Error: 0x000B0002
1,303,276 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,155,009 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,211 UART: [state] WD Timer not started. Device not locked for debugging
87,394 UART: [kat] SHA2-256
890,944 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,073 UART: [kat] ++
895,225 UART: [kat] sha1
899,327 UART: [kat] SHA2-256
901,267 UART: [kat] SHA2-384
903,832 UART: [kat] SHA2-512-ACC
905,733 UART: [kat] ECC-384
915,502 UART: [kat] HMAC-384Kdf
920,156 UART: [kat] LMS
1,168,468 UART: [kat] --
1,169,231 UART: [cold-reset] ++
1,169,653 UART: [fht] FHT @ 0x50003400
1,172,435 UART: [idev] ++
1,172,603 UART: [idev] CDI.KEYID = 6
1,172,964 UART: [idev] SUBJECT.KEYID = 7
1,173,389 UART: [idev] UDS.KEYID = 0
1,181,365 UART: [idev] Erasing UDS.KEYID = 0
1,197,685 UART: [idev] Sha1 KeyId Algorithm
1,206,577 UART: [idev] --
1,207,494 UART: [ldev] ++
1,207,662 UART: [ldev] CDI.KEYID = 6
1,208,026 UART: [ldev] SUBJECT.KEYID = 5
1,208,453 UART: [ldev] AUTHORITY.KEYID = 7
1,208,916 UART: [ldev] FE.KEYID = 1
1,214,150 UART: [ldev] Erasing FE.KEYID = 1
1,240,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,614 UART: [ldev] --
1,279,902 UART: [fwproc] Wait for Commands...
1,280,689 UART: [fwproc] Recv command 0x46574c44
1,281,422 UART: [fwproc] Recv'd Img size: 114332 bytes
1,300,672 UART: ROM Fatal Error: 0x000B0002
1,301,829 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,154,026 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,215 UART: [state] LifecycleState = Unprovisioned
85,870 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
891,413 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,542 UART: [kat] ++
895,694 UART: [kat] sha1
899,956 UART: [kat] SHA2-256
901,896 UART: [kat] SHA2-384
904,439 UART: [kat] SHA2-512-ACC
906,340 UART: [kat] ECC-384
916,523 UART: [kat] HMAC-384Kdf
921,151 UART: [kat] LMS
1,169,463 UART: [kat] --
1,170,144 UART: [cold-reset] ++
1,170,570 UART: [fht] FHT @ 0x50003400
1,173,206 UART: [idev] ++
1,173,374 UART: [idev] CDI.KEYID = 6
1,173,735 UART: [idev] SUBJECT.KEYID = 7
1,174,160 UART: [idev] UDS.KEYID = 0
1,181,884 UART: [idev] Erasing UDS.KEYID = 0
1,198,836 UART: [idev] Sha1 KeyId Algorithm
1,207,750 UART: [idev] --
1,208,833 UART: [ldev] ++
1,209,001 UART: [ldev] CDI.KEYID = 6
1,209,365 UART: [ldev] SUBJECT.KEYID = 5
1,209,792 UART: [ldev] AUTHORITY.KEYID = 7
1,210,255 UART: [ldev] FE.KEYID = 1
1,215,497 UART: [ldev] Erasing FE.KEYID = 1
1,242,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,079 UART: [ldev] --
1,281,471 UART: [fwproc] Wait for Commands...
1,282,186 UART: [fwproc] Recv command 0x46574c44
1,282,919 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,203 UART: ROM Fatal Error: 0x000B0002
1,303,360 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,154,263 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,655 UART: [kat] SHA2-256
901,595 UART: [kat] SHA2-384
904,436 UART: [kat] SHA2-512-ACC
906,337 UART: [kat] ECC-384
915,892 UART: [kat] HMAC-384Kdf
920,444 UART: [kat] LMS
1,168,756 UART: [kat] --
1,169,659 UART: [cold-reset] ++
1,169,997 UART: [fht] FHT @ 0x50003400
1,172,579 UART: [idev] ++
1,172,747 UART: [idev] CDI.KEYID = 6
1,173,108 UART: [idev] SUBJECT.KEYID = 7
1,173,533 UART: [idev] UDS.KEYID = 0
1,181,677 UART: [idev] Erasing UDS.KEYID = 0
1,198,719 UART: [idev] Sha1 KeyId Algorithm
1,207,673 UART: [idev] --
1,208,752 UART: [ldev] ++
1,208,920 UART: [ldev] CDI.KEYID = 6
1,209,284 UART: [ldev] SUBJECT.KEYID = 5
1,209,711 UART: [ldev] AUTHORITY.KEYID = 7
1,210,174 UART: [ldev] FE.KEYID = 1
1,215,444 UART: [ldev] Erasing FE.KEYID = 1
1,241,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,614 UART: [ldev] --
1,280,950 UART: [fwproc] Wait for Commands...
1,281,565 UART: [fwproc] Recv command 0x46574c44
1,282,298 UART: [fwproc] Recv'd Img size: 131072 bytes
2,771,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,750 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,824,435 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,989,143 >>> mbox cmd response: success
2,990,318 UART: [afmc] ++
2,990,486 UART: [afmc] CDI.KEYID = 6
2,990,849 UART: [afmc] SUBJECT.KEYID = 7
2,991,275 UART: [afmc] AUTHORITY.KEYID = 5
3,026,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,043,126 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,043,877 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,049,573 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,055,472 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,061,165 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,069,041 UART: [afmc] --
3,070,051 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,070,073 UART: [cold-reset] --
3,070,781 UART: [state] Locking Datavault
3,072,004 UART: [state] Locking PCR0, PCR1 and PCR31
3,072,608 UART: [state] Locking ICCM
3,073,206 UART: [exit] Launching FMC @ 0x40000000
3,078,503 UART:
3,078,519 UART: Running Caliptra FMC ...
3,078,927 UART:
3,079,157 UART: [fmc] Received command: 0x1000000E
3,424,211 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,837,873 >>> mbox cmd response: success
2,893,986 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,900,377 UART:
2,900,393 UART: Running Caliptra FMC ...
2,900,801 UART:
2,901,031 UART: [fmc] Received command: 0x1000000E
3,246,085 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,001 UART: [state] LifecycleState = Unprovisioned
85,656 UART: [state] DebugLocked = No
86,166 UART: [state] WD Timer not started. Device not locked for debugging
87,495 UART: [kat] SHA2-256
891,045 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,174 UART: [kat] ++
895,326 UART: [kat] sha1
899,694 UART: [kat] SHA2-256
901,634 UART: [kat] SHA2-384
904,397 UART: [kat] SHA2-512-ACC
906,298 UART: [kat] ECC-384
915,905 UART: [kat] HMAC-384Kdf
920,623 UART: [kat] LMS
1,168,935 UART: [kat] --
1,169,968 UART: [cold-reset] ++
1,170,520 UART: [fht] FHT @ 0x50003400
1,173,176 UART: [idev] ++
1,173,344 UART: [idev] CDI.KEYID = 6
1,173,705 UART: [idev] SUBJECT.KEYID = 7
1,174,130 UART: [idev] UDS.KEYID = 0
1,182,102 UART: [idev] Erasing UDS.KEYID = 0
1,198,938 UART: [idev] Sha1 KeyId Algorithm
1,208,012 UART: [idev] --
1,209,193 UART: [ldev] ++
1,209,361 UART: [ldev] CDI.KEYID = 6
1,209,725 UART: [ldev] SUBJECT.KEYID = 5
1,210,152 UART: [ldev] AUTHORITY.KEYID = 7
1,210,615 UART: [ldev] FE.KEYID = 1
1,216,115 UART: [ldev] Erasing FE.KEYID = 1
1,242,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,975 UART: [ldev] --
1,282,417 UART: [fwproc] Wait for Commands...
1,283,054 UART: [fwproc] Recv command 0x46574c44
1,283,787 UART: [fwproc] Recv'd Img size: 131072 bytes
2,773,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,800,443 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,826,128 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,990,628 >>> mbox cmd response: success
2,991,803 UART: [afmc] ++
2,991,971 UART: [afmc] CDI.KEYID = 6
2,992,334 UART: [afmc] SUBJECT.KEYID = 7
2,992,760 UART: [afmc] AUTHORITY.KEYID = 5
3,028,169 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,402 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,051,098 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,056,997 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,690 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,388 UART: [afmc] --
3,071,246 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,268 UART: [cold-reset] --
3,072,042 UART: [state] Locking Datavault
3,073,383 UART: [state] Locking PCR0, PCR1 and PCR31
3,073,987 UART: [state] Locking ICCM
3,074,623 UART: [exit] Launching FMC @ 0x40000000
3,079,920 UART:
3,079,936 UART: Running Caliptra FMC ...
3,080,344 UART:
3,080,574 UART: [fmc] Received command: 0x1000000E
3,425,628 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,838,624 >>> mbox cmd response: success
2,894,809 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,901,402 UART:
2,901,418 UART: Running Caliptra FMC ...
2,901,826 UART:
2,902,056 UART: [fmc] Received command: 0x1000000E
3,247,110 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,712 UART: [state] LifecycleState = Unprovisioned
85,367 UART: [state] DebugLocked = No
85,941 UART: [state] WD Timer not started. Device not locked for debugging
87,048 UART: [kat] SHA2-256
890,598 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,727 UART: [kat] ++
894,879 UART: [kat] sha1
899,311 UART: [kat] SHA2-256
901,251 UART: [kat] SHA2-384
904,140 UART: [kat] SHA2-512-ACC
906,041 UART: [kat] ECC-384
915,612 UART: [kat] HMAC-384Kdf
920,112 UART: [kat] LMS
1,168,424 UART: [kat] --
1,169,291 UART: [cold-reset] ++
1,169,679 UART: [fht] FHT @ 0x50003400
1,172,385 UART: [idev] ++
1,172,553 UART: [idev] CDI.KEYID = 6
1,172,914 UART: [idev] SUBJECT.KEYID = 7
1,173,339 UART: [idev] UDS.KEYID = 0
1,181,427 UART: [idev] Erasing UDS.KEYID = 0
1,198,123 UART: [idev] Sha1 KeyId Algorithm
1,206,851 UART: [idev] --
1,207,822 UART: [ldev] ++
1,207,990 UART: [ldev] CDI.KEYID = 6
1,208,354 UART: [ldev] SUBJECT.KEYID = 5
1,208,781 UART: [ldev] AUTHORITY.KEYID = 7
1,209,244 UART: [ldev] FE.KEYID = 1
1,214,320 UART: [ldev] Erasing FE.KEYID = 1
1,241,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,164 UART: [ldev] --
1,280,514 UART: [fwproc] Wait for Commands...
1,281,331 UART: [fwproc] Recv command 0x46574c44
1,282,064 UART: [fwproc] Recv'd Img size: 131072 bytes
2,771,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,799,382 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,067 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,989,545 >>> mbox cmd response: success
2,990,582 UART: [afmc] ++
2,990,750 UART: [afmc] CDI.KEYID = 6
2,991,113 UART: [afmc] SUBJECT.KEYID = 7
2,991,539 UART: [afmc] AUTHORITY.KEYID = 5
3,026,536 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,042,810 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,043,561 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,049,257 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,055,156 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,060,849 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,068,689 UART: [afmc] --
3,069,749 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,069,771 UART: [cold-reset] --
3,070,589 UART: [state] Locking Datavault
3,071,866 UART: [state] Locking PCR0, PCR1 and PCR31
3,072,470 UART: [state] Locking ICCM
3,073,082 UART: [exit] Launching FMC @ 0x40000000
3,078,379 UART:
3,078,395 UART: Running Caliptra FMC ...
3,078,803 UART:
3,079,033 UART: [fmc] Received command: 0x1000000E
3,424,087 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,839,977 >>> mbox cmd response: success
2,896,610 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,902,761 UART:
2,902,777 UART: Running Caliptra FMC ...
2,903,185 UART:
2,903,415 UART: [fmc] Received command: 0x1000000E
3,248,469 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,121 UART: [state] LifecycleState = Unprovisioned
86,776 UART: [state] DebugLocked = No
87,414 UART: [state] WD Timer not started. Device not locked for debugging
88,631 UART: [kat] SHA2-256
892,181 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,310 UART: [kat] ++
896,462 UART: [kat] sha1
900,660 UART: [kat] SHA2-256
902,600 UART: [kat] SHA2-384
905,169 UART: [kat] SHA2-512-ACC
907,070 UART: [kat] ECC-384
916,981 UART: [kat] HMAC-384Kdf
921,697 UART: [kat] LMS
1,170,009 UART: [kat] --
1,170,940 UART: [cold-reset] ++
1,171,382 UART: [fht] FHT @ 0x50003400
1,174,022 UART: [idev] ++
1,174,190 UART: [idev] CDI.KEYID = 6
1,174,551 UART: [idev] SUBJECT.KEYID = 7
1,174,976 UART: [idev] UDS.KEYID = 0
1,182,908 UART: [idev] Erasing UDS.KEYID = 0
1,199,958 UART: [idev] Sha1 KeyId Algorithm
1,209,036 UART: [idev] --
1,209,957 UART: [ldev] ++
1,210,125 UART: [ldev] CDI.KEYID = 6
1,210,489 UART: [ldev] SUBJECT.KEYID = 5
1,210,916 UART: [ldev] AUTHORITY.KEYID = 7
1,211,379 UART: [ldev] FE.KEYID = 1
1,216,673 UART: [ldev] Erasing FE.KEYID = 1
1,242,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,513 UART: [ldev] --
1,282,019 UART: [fwproc] Wait for Commands...
1,282,798 UART: [fwproc] Recv command 0x46574c44
1,283,531 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,799,451 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,136 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,989,686 >>> mbox cmd response: success
2,990,861 UART: [afmc] ++
2,991,029 UART: [afmc] CDI.KEYID = 6
2,991,392 UART: [afmc] SUBJECT.KEYID = 7
2,991,818 UART: [afmc] AUTHORITY.KEYID = 5
3,027,469 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,043,811 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,044,562 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,050,258 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,056,157 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,061,850 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,069,544 UART: [afmc] --
3,070,564 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,070,586 UART: [cold-reset] --
3,071,498 UART: [state] Locking Datavault
3,072,827 UART: [state] Locking PCR0, PCR1 and PCR31
3,073,431 UART: [state] Locking ICCM
3,074,063 UART: [exit] Launching FMC @ 0x40000000
3,079,360 UART:
3,079,376 UART: Running Caliptra FMC ...
3,079,784 UART:
3,080,014 UART: [fmc] Received command: 0x1000000E
3,425,068 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,839,124 >>> mbox cmd response: success
2,895,071 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,901,448 UART:
2,901,464 UART: Running Caliptra FMC ...
2,901,872 UART:
2,902,102 UART: [fmc] Received command: 0x1000000E
3,247,156 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,167 UART: [state] WD Timer not started. Device not locked for debugging
87,440 UART: [kat] SHA2-256
890,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,119 UART: [kat] ++
895,271 UART: [kat] sha1
899,425 UART: [kat] SHA2-256
901,365 UART: [kat] SHA2-384
904,270 UART: [kat] SHA2-512-ACC
906,171 UART: [kat] ECC-384
915,724 UART: [kat] HMAC-384Kdf
920,162 UART: [kat] LMS
1,168,474 UART: [kat] --
1,169,431 UART: [cold-reset] ++
1,169,849 UART: [fht] FHT @ 0x50003400
1,172,525 UART: [idev] ++
1,172,693 UART: [idev] CDI.KEYID = 6
1,173,054 UART: [idev] SUBJECT.KEYID = 7
1,173,479 UART: [idev] UDS.KEYID = 0
1,181,405 UART: [idev] Erasing UDS.KEYID = 0
1,198,271 UART: [idev] Sha1 KeyId Algorithm
1,207,333 UART: [idev] --
1,208,378 UART: [ldev] ++
1,208,546 UART: [ldev] CDI.KEYID = 6
1,208,910 UART: [ldev] SUBJECT.KEYID = 5
1,209,337 UART: [ldev] AUTHORITY.KEYID = 7
1,209,800 UART: [ldev] FE.KEYID = 1
1,214,892 UART: [ldev] Erasing FE.KEYID = 1
1,240,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,006 UART: [ldev] --
1,280,410 UART: [fwproc] Wait for Commands...
1,281,099 UART: [fwproc] Recv command 0x46574c44
1,281,832 UART: [fwproc] Recv'd Img size: 131072 bytes
2,770,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,232 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,823,917 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,988,529 >>> mbox cmd response: success
2,989,668 UART: [afmc] ++
2,989,836 UART: [afmc] CDI.KEYID = 6
2,990,199 UART: [afmc] SUBJECT.KEYID = 7
2,990,625 UART: [afmc] AUTHORITY.KEYID = 5
3,025,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,042,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,043,209 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,048,905 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,054,804 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,060,497 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,068,205 UART: [afmc] --
3,069,143 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,069,165 UART: [cold-reset] --
3,069,831 UART: [state] Locking Datavault
3,071,186 UART: [state] Locking PCR0, PCR1 and PCR31
3,071,790 UART: [state] Locking ICCM
3,072,452 UART: [exit] Launching FMC @ 0x40000000
3,077,749 UART:
3,077,765 UART: Running Caliptra FMC ...
3,078,173 UART:
3,078,403 UART: [fmc] Received command: 0x1000000E
3,423,457 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,836,703 >>> mbox cmd response: success
2,892,894 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,898,953 UART:
2,898,969 UART: Running Caliptra FMC ...
2,899,377 UART:
2,899,607 UART: [fmc] Received command: 0x1000000E
3,244,661 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
891,219 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,348 UART: [kat] ++
895,500 UART: [kat] sha1
899,742 UART: [kat] SHA2-256
901,682 UART: [kat] SHA2-384
904,517 UART: [kat] SHA2-512-ACC
906,418 UART: [kat] ECC-384
916,139 UART: [kat] HMAC-384Kdf
920,945 UART: [kat] LMS
1,169,257 UART: [kat] --
1,170,122 UART: [cold-reset] ++
1,170,646 UART: [fht] FHT @ 0x50003400
1,173,256 UART: [idev] ++
1,173,424 UART: [idev] CDI.KEYID = 6
1,173,785 UART: [idev] SUBJECT.KEYID = 7
1,174,210 UART: [idev] UDS.KEYID = 0
1,182,484 UART: [idev] Erasing UDS.KEYID = 0
1,199,638 UART: [idev] Sha1 KeyId Algorithm
1,208,522 UART: [idev] --
1,209,541 UART: [ldev] ++
1,209,709 UART: [ldev] CDI.KEYID = 6
1,210,073 UART: [ldev] SUBJECT.KEYID = 5
1,210,500 UART: [ldev] AUTHORITY.KEYID = 7
1,210,963 UART: [ldev] FE.KEYID = 1
1,216,209 UART: [ldev] Erasing FE.KEYID = 1
1,242,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,353 UART: [ldev] --
1,281,803 UART: [fwproc] Wait for Commands...
1,282,492 UART: [fwproc] Recv command 0x46574c44
1,283,225 UART: [fwproc] Recv'd Img size: 131072 bytes
2,771,981 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,885 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,824,570 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,989,272 >>> mbox cmd response: success
2,990,343 UART: [afmc] ++
2,990,511 UART: [afmc] CDI.KEYID = 6
2,990,874 UART: [afmc] SUBJECT.KEYID = 7
2,991,300 UART: [afmc] AUTHORITY.KEYID = 5
3,026,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,043,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,044,160 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,049,856 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,055,755 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,061,448 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,069,150 UART: [afmc] --
3,070,042 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,070,064 UART: [cold-reset] --
3,070,846 UART: [state] Locking Datavault
3,072,171 UART: [state] Locking PCR0, PCR1 and PCR31
3,072,775 UART: [state] Locking ICCM
3,073,449 UART: [exit] Launching FMC @ 0x40000000
3,078,746 UART:
3,078,762 UART: Running Caliptra FMC ...
3,079,170 UART:
3,079,400 UART: [fmc] Received command: 0x1000000E
3,424,454 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,838,572 >>> mbox cmd response: success
2,894,485 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,900,860 UART:
2,900,876 UART: Running Caliptra FMC ...
2,901,284 UART:
2,901,514 UART: [fmc] Received command: 0x1000000E
3,246,568 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,352 UART: [kat] SHA2-512-ACC
906,253 UART: [kat] ECC-384
915,776 UART: [kat] HMAC-384Kdf
920,344 UART: [kat] LMS
1,168,656 UART: [kat] --
1,169,449 UART: [cold-reset] ++
1,169,907 UART: [fht] FHT @ 0x50003400
1,172,445 UART: [idev] ++
1,172,613 UART: [idev] CDI.KEYID = 6
1,172,974 UART: [idev] SUBJECT.KEYID = 7
1,173,399 UART: [idev] UDS.KEYID = 0
1,181,539 UART: [idev] Erasing UDS.KEYID = 0
1,197,675 UART: [idev] Sha1 KeyId Algorithm
1,206,741 UART: [idev] --
1,207,806 UART: [ldev] ++
1,207,974 UART: [ldev] CDI.KEYID = 6
1,208,338 UART: [ldev] SUBJECT.KEYID = 5
1,208,765 UART: [ldev] AUTHORITY.KEYID = 7
1,209,228 UART: [ldev] FE.KEYID = 1
1,214,334 UART: [ldev] Erasing FE.KEYID = 1
1,240,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,372 UART: [ldev] --
1,279,754 UART: [fwproc] Wait for Commands...
1,280,471 UART: [fwproc] Recv command 0x46574c44
1,281,204 UART: [fwproc] Recv'd Img size: 114332 bytes
1,304,629 UART: ROM Fatal Error: 0x000B0007
1,305,786 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,158,843 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,875 UART: [state] LifecycleState = Unprovisioned
86,530 UART: [state] DebugLocked = No
87,176 UART: [state] WD Timer not started. Device not locked for debugging
88,303 UART: [kat] SHA2-256
891,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,982 UART: [kat] ++
896,134 UART: [kat] sha1
900,472 UART: [kat] SHA2-256
902,412 UART: [kat] SHA2-384
905,327 UART: [kat] SHA2-512-ACC
907,228 UART: [kat] ECC-384
917,047 UART: [kat] HMAC-384Kdf
921,721 UART: [kat] LMS
1,170,033 UART: [kat] --
1,171,054 UART: [cold-reset] ++
1,171,510 UART: [fht] FHT @ 0x50003400
1,174,244 UART: [idev] ++
1,174,412 UART: [idev] CDI.KEYID = 6
1,174,773 UART: [idev] SUBJECT.KEYID = 7
1,175,198 UART: [idev] UDS.KEYID = 0
1,183,268 UART: [idev] Erasing UDS.KEYID = 0
1,200,070 UART: [idev] Sha1 KeyId Algorithm
1,208,920 UART: [idev] --
1,210,067 UART: [ldev] ++
1,210,235 UART: [ldev] CDI.KEYID = 6
1,210,599 UART: [ldev] SUBJECT.KEYID = 5
1,211,026 UART: [ldev] AUTHORITY.KEYID = 7
1,211,489 UART: [ldev] FE.KEYID = 1
1,216,817 UART: [ldev] Erasing FE.KEYID = 1
1,243,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,053 UART: [ldev] --
1,282,425 UART: [fwproc] Wait for Commands...
1,283,118 UART: [fwproc] Recv command 0x46574c44
1,283,851 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,930 UART: ROM Fatal Error: 0x000B0007
1,309,087 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,232 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,314 UART: [kat] SHA2-256
890,864 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,993 UART: [kat] ++
895,145 UART: [kat] sha1
899,231 UART: [kat] SHA2-256
901,171 UART: [kat] SHA2-384
903,912 UART: [kat] SHA2-512-ACC
905,813 UART: [kat] ECC-384
915,546 UART: [kat] HMAC-384Kdf
919,976 UART: [kat] LMS
1,168,288 UART: [kat] --
1,169,277 UART: [cold-reset] ++
1,169,759 UART: [fht] FHT @ 0x50003400
1,172,583 UART: [idev] ++
1,172,751 UART: [idev] CDI.KEYID = 6
1,173,112 UART: [idev] SUBJECT.KEYID = 7
1,173,537 UART: [idev] UDS.KEYID = 0
1,181,243 UART: [idev] Erasing UDS.KEYID = 0
1,197,731 UART: [idev] Sha1 KeyId Algorithm
1,206,455 UART: [idev] --
1,207,504 UART: [ldev] ++
1,207,672 UART: [ldev] CDI.KEYID = 6
1,208,036 UART: [ldev] SUBJECT.KEYID = 5
1,208,463 UART: [ldev] AUTHORITY.KEYID = 7
1,208,926 UART: [ldev] FE.KEYID = 1
1,214,222 UART: [ldev] Erasing FE.KEYID = 1
1,240,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,782 UART: [ldev] --
1,280,296 UART: [fwproc] Wait for Commands...
1,281,039 UART: [fwproc] Recv command 0x46574c44
1,281,772 UART: [fwproc] Recv'd Img size: 114332 bytes
1,305,475 UART: ROM Fatal Error: 0x000B0007
1,306,632 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,109 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,981 UART: [state] LifecycleState = Unprovisioned
85,636 UART: [state] DebugLocked = No
86,180 UART: [state] WD Timer not started. Device not locked for debugging
87,439 UART: [kat] SHA2-256
890,989 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,118 UART: [kat] ++
895,270 UART: [kat] sha1
899,314 UART: [kat] SHA2-256
901,254 UART: [kat] SHA2-384
903,815 UART: [kat] SHA2-512-ACC
905,716 UART: [kat] ECC-384
915,717 UART: [kat] HMAC-384Kdf
920,505 UART: [kat] LMS
1,168,817 UART: [kat] --
1,169,652 UART: [cold-reset] ++
1,170,126 UART: [fht] FHT @ 0x50003400
1,172,874 UART: [idev] ++
1,173,042 UART: [idev] CDI.KEYID = 6
1,173,403 UART: [idev] SUBJECT.KEYID = 7
1,173,828 UART: [idev] UDS.KEYID = 0
1,181,768 UART: [idev] Erasing UDS.KEYID = 0
1,198,234 UART: [idev] Sha1 KeyId Algorithm
1,207,130 UART: [idev] --
1,208,045 UART: [ldev] ++
1,208,213 UART: [ldev] CDI.KEYID = 6
1,208,577 UART: [ldev] SUBJECT.KEYID = 5
1,209,004 UART: [ldev] AUTHORITY.KEYID = 7
1,209,467 UART: [ldev] FE.KEYID = 1
1,214,753 UART: [ldev] Erasing FE.KEYID = 1
1,241,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,201 UART: [ldev] --
1,280,583 UART: [fwproc] Wait for Commands...
1,281,170 UART: [fwproc] Recv command 0x46574c44
1,281,903 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,064 UART: ROM Fatal Error: 0x000B0007
1,307,221 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,780 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
891,352 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,481 UART: [kat] ++
895,633 UART: [kat] sha1
899,923 UART: [kat] SHA2-256
901,863 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,210 UART: [kat] HMAC-384Kdf
920,846 UART: [kat] LMS
1,169,158 UART: [kat] --
1,170,001 UART: [cold-reset] ++
1,170,515 UART: [fht] FHT @ 0x50003400
1,173,201 UART: [idev] ++
1,173,369 UART: [idev] CDI.KEYID = 6
1,173,730 UART: [idev] SUBJECT.KEYID = 7
1,174,155 UART: [idev] UDS.KEYID = 0
1,182,349 UART: [idev] Erasing UDS.KEYID = 0
1,198,977 UART: [idev] Sha1 KeyId Algorithm
1,207,715 UART: [idev] --
1,208,666 UART: [ldev] ++
1,208,834 UART: [ldev] CDI.KEYID = 6
1,209,198 UART: [ldev] SUBJECT.KEYID = 5
1,209,625 UART: [ldev] AUTHORITY.KEYID = 7
1,210,088 UART: [ldev] FE.KEYID = 1
1,215,394 UART: [ldev] Erasing FE.KEYID = 1
1,241,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,092 UART: [ldev] --
1,280,564 UART: [fwproc] Wait for Commands...
1,281,255 UART: [fwproc] Recv command 0x46574c44
1,281,988 UART: [fwproc] Recv'd Img size: 114332 bytes
1,305,951 UART: ROM Fatal Error: 0x000B0007
1,307,108 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,669 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
87,078 UART: [state] WD Timer not started. Device not locked for debugging
88,307 UART: [kat] SHA2-256
891,857 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,986 UART: [kat] ++
896,138 UART: [kat] sha1
900,158 UART: [kat] SHA2-256
902,098 UART: [kat] SHA2-384
904,901 UART: [kat] SHA2-512-ACC
906,802 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
920,905 UART: [kat] LMS
1,169,217 UART: [kat] --
1,170,268 UART: [cold-reset] ++
1,170,684 UART: [fht] FHT @ 0x50003400
1,173,326 UART: [idev] ++
1,173,494 UART: [idev] CDI.KEYID = 6
1,173,855 UART: [idev] SUBJECT.KEYID = 7
1,174,280 UART: [idev] UDS.KEYID = 0
1,182,482 UART: [idev] Erasing UDS.KEYID = 0
1,199,482 UART: [idev] Sha1 KeyId Algorithm
1,208,358 UART: [idev] --
1,209,517 UART: [ldev] ++
1,209,685 UART: [ldev] CDI.KEYID = 6
1,210,049 UART: [ldev] SUBJECT.KEYID = 5
1,210,476 UART: [ldev] AUTHORITY.KEYID = 7
1,210,939 UART: [ldev] FE.KEYID = 1
1,216,241 UART: [ldev] Erasing FE.KEYID = 1
1,242,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,157 UART: [ldev] --
1,281,519 UART: [fwproc] Wait for Commands...
1,282,344 UART: [fwproc] Recv command 0x46574c44
1,283,077 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,510 UART: ROM Fatal Error: 0x000B0007
1,307,667 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,368 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,676 UART: [state] LifecycleState = Unprovisioned
85,331 UART: [state] DebugLocked = No
85,937 UART: [state] WD Timer not started. Device not locked for debugging
87,058 UART: [kat] SHA2-256
890,608 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,737 UART: [kat] ++
894,889 UART: [kat] sha1
898,969 UART: [kat] SHA2-256
900,909 UART: [kat] SHA2-384
903,688 UART: [kat] SHA2-512-ACC
905,589 UART: [kat] ECC-384
915,442 UART: [kat] HMAC-384Kdf
919,976 UART: [kat] LMS
1,168,288 UART: [kat] --
1,169,263 UART: [cold-reset] ++
1,169,717 UART: [fht] FHT @ 0x50003400
1,172,609 UART: [idev] ++
1,172,777 UART: [idev] CDI.KEYID = 6
1,173,138 UART: [idev] SUBJECT.KEYID = 7
1,173,563 UART: [idev] UDS.KEYID = 0
1,181,545 UART: [idev] Erasing UDS.KEYID = 0
1,198,353 UART: [idev] Sha1 KeyId Algorithm
1,207,207 UART: [idev] --
1,208,256 UART: [ldev] ++
1,208,424 UART: [ldev] CDI.KEYID = 6
1,208,788 UART: [ldev] SUBJECT.KEYID = 5
1,209,215 UART: [ldev] AUTHORITY.KEYID = 7
1,209,678 UART: [ldev] FE.KEYID = 1
1,214,900 UART: [ldev] Erasing FE.KEYID = 1
1,241,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,368 UART: [ldev] --
1,280,878 UART: [fwproc] Wait for Commands...
1,281,473 UART: [fwproc] Recv command 0x46574c44
1,282,206 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,978 UART: ROM Fatal Error: 0x000B0008
1,309,135 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,568 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
891,587 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,716 UART: [kat] ++
895,868 UART: [kat] sha1
900,178 UART: [kat] SHA2-256
902,118 UART: [kat] SHA2-384
904,995 UART: [kat] SHA2-512-ACC
906,896 UART: [kat] ECC-384
917,091 UART: [kat] HMAC-384Kdf
921,763 UART: [kat] LMS
1,170,075 UART: [kat] --
1,171,046 UART: [cold-reset] ++
1,171,456 UART: [fht] FHT @ 0x50003400
1,174,294 UART: [idev] ++
1,174,462 UART: [idev] CDI.KEYID = 6
1,174,823 UART: [idev] SUBJECT.KEYID = 7
1,175,248 UART: [idev] UDS.KEYID = 0
1,183,356 UART: [idev] Erasing UDS.KEYID = 0
1,200,220 UART: [idev] Sha1 KeyId Algorithm
1,208,998 UART: [idev] --
1,209,971 UART: [ldev] ++
1,210,139 UART: [ldev] CDI.KEYID = 6
1,210,503 UART: [ldev] SUBJECT.KEYID = 5
1,210,930 UART: [ldev] AUTHORITY.KEYID = 7
1,211,393 UART: [ldev] FE.KEYID = 1
1,216,731 UART: [ldev] Erasing FE.KEYID = 1
1,243,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,669 UART: [ldev] --
1,283,049 UART: [fwproc] Wait for Commands...
1,283,746 UART: [fwproc] Recv command 0x46574c44
1,284,479 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,481 UART: ROM Fatal Error: 0x000B0008
1,310,638 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,929 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,350 UART: [kat] SHA2-256
890,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,029 UART: [kat] ++
895,181 UART: [kat] sha1
899,409 UART: [kat] SHA2-256
901,349 UART: [kat] SHA2-384
904,204 UART: [kat] SHA2-512-ACC
906,105 UART: [kat] ECC-384
915,906 UART: [kat] HMAC-384Kdf
920,422 UART: [kat] LMS
1,168,734 UART: [kat] --
1,169,673 UART: [cold-reset] ++
1,170,083 UART: [fht] FHT @ 0x50003400
1,172,799 UART: [idev] ++
1,172,967 UART: [idev] CDI.KEYID = 6
1,173,328 UART: [idev] SUBJECT.KEYID = 7
1,173,753 UART: [idev] UDS.KEYID = 0
1,181,693 UART: [idev] Erasing UDS.KEYID = 0
1,199,177 UART: [idev] Sha1 KeyId Algorithm
1,208,279 UART: [idev] --
1,209,254 UART: [ldev] ++
1,209,422 UART: [ldev] CDI.KEYID = 6
1,209,786 UART: [ldev] SUBJECT.KEYID = 5
1,210,213 UART: [ldev] AUTHORITY.KEYID = 7
1,210,676 UART: [ldev] FE.KEYID = 1
1,215,774 UART: [ldev] Erasing FE.KEYID = 1
1,242,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,662 UART: [ldev] --
1,282,072 UART: [fwproc] Wait for Commands...
1,282,673 UART: [fwproc] Recv command 0x46574c44
1,283,406 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,342 UART: ROM Fatal Error: 0x000B0008
1,309,499 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,144 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,470 UART: [kat] ++
895,622 UART: [kat] sha1
899,748 UART: [kat] SHA2-256
901,688 UART: [kat] SHA2-384
904,557 UART: [kat] SHA2-512-ACC
906,458 UART: [kat] ECC-384
916,095 UART: [kat] HMAC-384Kdf
920,525 UART: [kat] LMS
1,168,837 UART: [kat] --
1,169,656 UART: [cold-reset] ++
1,170,110 UART: [fht] FHT @ 0x50003400
1,172,904 UART: [idev] ++
1,173,072 UART: [idev] CDI.KEYID = 6
1,173,433 UART: [idev] SUBJECT.KEYID = 7
1,173,858 UART: [idev] UDS.KEYID = 0
1,182,294 UART: [idev] Erasing UDS.KEYID = 0
1,199,504 UART: [idev] Sha1 KeyId Algorithm
1,208,312 UART: [idev] --
1,209,511 UART: [ldev] ++
1,209,679 UART: [ldev] CDI.KEYID = 6
1,210,043 UART: [ldev] SUBJECT.KEYID = 5
1,210,470 UART: [ldev] AUTHORITY.KEYID = 7
1,210,933 UART: [ldev] FE.KEYID = 1
1,216,305 UART: [ldev] Erasing FE.KEYID = 1
1,243,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,017 UART: [ldev] --
1,282,451 UART: [fwproc] Wait for Commands...
1,283,058 UART: [fwproc] Recv command 0x46574c44
1,283,791 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,963 UART: ROM Fatal Error: 0x000B0008
1,310,120 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,243 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
891,312 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,441 UART: [kat] ++
895,593 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,686 UART: [kat] SHA2-512-ACC
906,587 UART: [kat] ECC-384
916,260 UART: [kat] HMAC-384Kdf
920,928 UART: [kat] LMS
1,169,240 UART: [kat] --
1,169,793 UART: [cold-reset] ++
1,170,183 UART: [fht] FHT @ 0x50003400
1,172,821 UART: [idev] ++
1,172,989 UART: [idev] CDI.KEYID = 6
1,173,350 UART: [idev] SUBJECT.KEYID = 7
1,173,775 UART: [idev] UDS.KEYID = 0
1,181,649 UART: [idev] Erasing UDS.KEYID = 0
1,198,569 UART: [idev] Sha1 KeyId Algorithm
1,207,445 UART: [idev] --
1,208,654 UART: [ldev] ++
1,208,822 UART: [ldev] CDI.KEYID = 6
1,209,186 UART: [ldev] SUBJECT.KEYID = 5
1,209,613 UART: [ldev] AUTHORITY.KEYID = 7
1,210,076 UART: [ldev] FE.KEYID = 1
1,215,258 UART: [ldev] Erasing FE.KEYID = 1
1,242,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,260 UART: [ldev] --
1,281,624 UART: [fwproc] Wait for Commands...
1,282,275 UART: [fwproc] Recv command 0x46574c44
1,283,008 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,966 UART: ROM Fatal Error: 0x000B0008
1,309,123 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,394 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
891,329 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,458 UART: [kat] ++
895,610 UART: [kat] sha1
899,846 UART: [kat] SHA2-256
901,786 UART: [kat] SHA2-384
904,425 UART: [kat] SHA2-512-ACC
906,326 UART: [kat] ECC-384
916,203 UART: [kat] HMAC-384Kdf
920,841 UART: [kat] LMS
1,169,153 UART: [kat] --
1,169,730 UART: [cold-reset] ++
1,170,072 UART: [fht] FHT @ 0x50003400
1,172,604 UART: [idev] ++
1,172,772 UART: [idev] CDI.KEYID = 6
1,173,133 UART: [idev] SUBJECT.KEYID = 7
1,173,558 UART: [idev] UDS.KEYID = 0
1,181,552 UART: [idev] Erasing UDS.KEYID = 0
1,198,482 UART: [idev] Sha1 KeyId Algorithm
1,207,186 UART: [idev] --
1,208,135 UART: [ldev] ++
1,208,303 UART: [ldev] CDI.KEYID = 6
1,208,667 UART: [ldev] SUBJECT.KEYID = 5
1,209,094 UART: [ldev] AUTHORITY.KEYID = 7
1,209,557 UART: [ldev] FE.KEYID = 1
1,214,929 UART: [ldev] Erasing FE.KEYID = 1
1,241,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,691 UART: [ldev] --
1,281,061 UART: [fwproc] Wait for Commands...
1,281,836 UART: [fwproc] Recv command 0x46574c44
1,282,569 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,183 UART: ROM Fatal Error: 0x000B0008
1,308,340 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,013 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
891,192 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,321 UART: [kat] ++
895,473 UART: [kat] sha1
899,613 UART: [kat] SHA2-256
901,553 UART: [kat] SHA2-384
904,416 UART: [kat] SHA2-512-ACC
906,317 UART: [kat] ECC-384
916,144 UART: [kat] HMAC-384Kdf
920,702 UART: [kat] LMS
1,169,014 UART: [kat] --
1,169,951 UART: [cold-reset] ++
1,170,367 UART: [fht] FHT @ 0x50003400
1,173,101 UART: [idev] ++
1,173,269 UART: [idev] CDI.KEYID = 6
1,173,630 UART: [idev] SUBJECT.KEYID = 7
1,174,055 UART: [idev] UDS.KEYID = 0
1,182,019 UART: [idev] Erasing UDS.KEYID = 0
1,199,179 UART: [idev] Sha1 KeyId Algorithm
1,207,891 UART: [idev] --
1,208,748 UART: [ldev] ++
1,208,916 UART: [ldev] CDI.KEYID = 6
1,209,280 UART: [ldev] SUBJECT.KEYID = 5
1,209,707 UART: [ldev] AUTHORITY.KEYID = 7
1,210,170 UART: [ldev] FE.KEYID = 1
1,215,322 UART: [ldev] Erasing FE.KEYID = 1
1,241,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,416 UART: [ldev] --
1,280,754 UART: [fwproc] Wait for Commands...
1,281,573 UART: [fwproc] Recv command 0x46574c44
1,282,306 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,554 UART: ROM Fatal Error: 0x000B0009
1,308,711 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
891,462 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,591 UART: [kat] ++
895,743 UART: [kat] sha1
899,949 UART: [kat] SHA2-256
901,889 UART: [kat] SHA2-384
904,678 UART: [kat] SHA2-512-ACC
906,579 UART: [kat] ECC-384
915,978 UART: [kat] HMAC-384Kdf
920,402 UART: [kat] LMS
1,168,714 UART: [kat] --
1,169,469 UART: [cold-reset] ++
1,169,899 UART: [fht] FHT @ 0x50003400
1,172,471 UART: [idev] ++
1,172,639 UART: [idev] CDI.KEYID = 6
1,173,000 UART: [idev] SUBJECT.KEYID = 7
1,173,425 UART: [idev] UDS.KEYID = 0
1,181,543 UART: [idev] Erasing UDS.KEYID = 0
1,198,569 UART: [idev] Sha1 KeyId Algorithm
1,207,515 UART: [idev] --
1,208,564 UART: [ldev] ++
1,208,732 UART: [ldev] CDI.KEYID = 6
1,209,096 UART: [ldev] SUBJECT.KEYID = 5
1,209,523 UART: [ldev] AUTHORITY.KEYID = 7
1,209,986 UART: [ldev] FE.KEYID = 1
1,214,890 UART: [ldev] Erasing FE.KEYID = 1
1,240,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,880 UART: [ldev] --
1,280,150 UART: [fwproc] Wait for Commands...
1,280,947 UART: [fwproc] Recv command 0x46574c44
1,281,680 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,998 UART: ROM Fatal Error: 0x000B0009
1,308,155 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,342 UART: [state] LifecycleState = Unprovisioned
85,997 UART: [state] DebugLocked = No
86,583 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
891,280 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,409 UART: [kat] ++
895,561 UART: [kat] sha1
899,743 UART: [kat] SHA2-256
901,683 UART: [kat] SHA2-384
904,628 UART: [kat] SHA2-512-ACC
906,529 UART: [kat] ECC-384
916,326 UART: [kat] HMAC-384Kdf
920,876 UART: [kat] LMS
1,169,188 UART: [kat] --
1,170,105 UART: [cold-reset] ++
1,170,447 UART: [fht] FHT @ 0x50003400
1,173,099 UART: [idev] ++
1,173,267 UART: [idev] CDI.KEYID = 6
1,173,628 UART: [idev] SUBJECT.KEYID = 7
1,174,053 UART: [idev] UDS.KEYID = 0
1,181,879 UART: [idev] Erasing UDS.KEYID = 0
1,198,809 UART: [idev] Sha1 KeyId Algorithm
1,207,797 UART: [idev] --
1,208,798 UART: [ldev] ++
1,208,966 UART: [ldev] CDI.KEYID = 6
1,209,330 UART: [ldev] SUBJECT.KEYID = 5
1,209,757 UART: [ldev] AUTHORITY.KEYID = 7
1,210,220 UART: [ldev] FE.KEYID = 1
1,215,532 UART: [ldev] Erasing FE.KEYID = 1
1,241,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,814 UART: [ldev] --
1,281,144 UART: [fwproc] Wait for Commands...
1,281,753 UART: [fwproc] Recv command 0x46574c44
1,282,486 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,548 UART: ROM Fatal Error: 0x000B0009
1,308,705 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,770 UART: [state] LifecycleState = Unprovisioned
85,425 UART: [state] DebugLocked = No
86,141 UART: [state] WD Timer not started. Device not locked for debugging
87,254 UART: [kat] SHA2-256
890,804 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,933 UART: [kat] ++
895,085 UART: [kat] sha1
899,293 UART: [kat] SHA2-256
901,233 UART: [kat] SHA2-384
903,880 UART: [kat] SHA2-512-ACC
905,781 UART: [kat] ECC-384
915,332 UART: [kat] HMAC-384Kdf
919,722 UART: [kat] LMS
1,168,034 UART: [kat] --
1,168,993 UART: [cold-reset] ++
1,169,437 UART: [fht] FHT @ 0x50003400
1,172,001 UART: [idev] ++
1,172,169 UART: [idev] CDI.KEYID = 6
1,172,530 UART: [idev] SUBJECT.KEYID = 7
1,172,955 UART: [idev] UDS.KEYID = 0
1,180,863 UART: [idev] Erasing UDS.KEYID = 0
1,198,301 UART: [idev] Sha1 KeyId Algorithm
1,207,061 UART: [idev] --
1,208,112 UART: [ldev] ++
1,208,280 UART: [ldev] CDI.KEYID = 6
1,208,644 UART: [ldev] SUBJECT.KEYID = 5
1,209,071 UART: [ldev] AUTHORITY.KEYID = 7
1,209,534 UART: [ldev] FE.KEYID = 1
1,214,448 UART: [ldev] Erasing FE.KEYID = 1
1,240,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,538 UART: [ldev] --
1,279,830 UART: [fwproc] Wait for Commands...
1,280,501 UART: [fwproc] Recv command 0x46574c44
1,281,234 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,683 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,992 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,688 >>> mbox cmd response: success
2,771,757 UART: [afmc] ++
2,771,925 UART: [afmc] CDI.KEYID = 6
2,772,288 UART: [afmc] SUBJECT.KEYID = 7
2,772,714 UART: [afmc] AUTHORITY.KEYID = 5
2,808,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,474 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,187 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,096 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,810 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,751 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,710 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,502 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,570 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,432 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
891,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,556 UART: [kat] ++
895,708 UART: [kat] sha1
899,860 UART: [kat] SHA2-256
901,800 UART: [kat] SHA2-384
904,371 UART: [kat] SHA2-512-ACC
906,272 UART: [kat] ECC-384
916,173 UART: [kat] HMAC-384Kdf
920,909 UART: [kat] LMS
1,169,221 UART: [kat] --
1,170,320 UART: [cold-reset] ++
1,170,854 UART: [fht] FHT @ 0x50003400
1,173,594 UART: [idev] ++
1,173,762 UART: [idev] CDI.KEYID = 6
1,174,123 UART: [idev] SUBJECT.KEYID = 7
1,174,548 UART: [idev] UDS.KEYID = 0
1,182,646 UART: [idev] Erasing UDS.KEYID = 0
1,200,636 UART: [idev] Sha1 KeyId Algorithm
1,209,504 UART: [idev] --
1,210,439 UART: [ldev] ++
1,210,607 UART: [ldev] CDI.KEYID = 6
1,210,971 UART: [ldev] SUBJECT.KEYID = 5
1,211,398 UART: [ldev] AUTHORITY.KEYID = 7
1,211,861 UART: [ldev] FE.KEYID = 1
1,216,873 UART: [ldev] Erasing FE.KEYID = 1
1,243,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,995 UART: [ldev] --
1,283,267 UART: [fwproc] Wait for Commands...
1,283,970 UART: [fwproc] Recv command 0x46574c44
1,284,703 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,705 UART: ROM Fatal Error: 0x000B0009
1,310,862 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
891,673 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,802 UART: [kat] ++
895,954 UART: [kat] sha1
900,176 UART: [kat] SHA2-256
902,116 UART: [kat] SHA2-384
904,729 UART: [kat] SHA2-512-ACC
906,630 UART: [kat] ECC-384
916,477 UART: [kat] HMAC-384Kdf
920,993 UART: [kat] LMS
1,169,305 UART: [kat] --
1,170,532 UART: [cold-reset] ++
1,170,978 UART: [fht] FHT @ 0x50003400
1,173,832 UART: [idev] ++
1,174,000 UART: [idev] CDI.KEYID = 6
1,174,361 UART: [idev] SUBJECT.KEYID = 7
1,174,786 UART: [idev] UDS.KEYID = 0
1,182,674 UART: [idev] Erasing UDS.KEYID = 0
1,200,122 UART: [idev] Sha1 KeyId Algorithm
1,209,008 UART: [idev] --
1,210,009 UART: [ldev] ++
1,210,177 UART: [ldev] CDI.KEYID = 6
1,210,541 UART: [ldev] SUBJECT.KEYID = 5
1,210,968 UART: [ldev] AUTHORITY.KEYID = 7
1,211,431 UART: [ldev] FE.KEYID = 1
1,216,455 UART: [ldev] Erasing FE.KEYID = 1
1,242,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,923 UART: [ldev] --
1,282,273 UART: [fwproc] Wait for Commands...
1,283,084 UART: [fwproc] Recv command 0x46574c44
1,283,817 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,765 UART: ROM Fatal Error: 0x000B0009
1,310,922 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,063 UART: [state] LifecycleState = Unprovisioned
85,718 UART: [state] DebugLocked = No
86,348 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
891,251 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,380 UART: [kat] ++
895,532 UART: [kat] sha1
899,604 UART: [kat] SHA2-256
901,544 UART: [kat] SHA2-384
904,341 UART: [kat] SHA2-512-ACC
906,242 UART: [kat] ECC-384
916,203 UART: [kat] HMAC-384Kdf
920,841 UART: [kat] LMS
1,169,153 UART: [kat] --
1,170,030 UART: [cold-reset] ++
1,170,504 UART: [fht] FHT @ 0x50003400
1,173,288 UART: [idev] ++
1,173,456 UART: [idev] CDI.KEYID = 6
1,173,817 UART: [idev] SUBJECT.KEYID = 7
1,174,242 UART: [idev] UDS.KEYID = 0
1,182,426 UART: [idev] Erasing UDS.KEYID = 0
1,199,462 UART: [idev] Sha1 KeyId Algorithm
1,208,480 UART: [idev] --
1,209,633 UART: [ldev] ++
1,209,801 UART: [ldev] CDI.KEYID = 6
1,210,165 UART: [ldev] SUBJECT.KEYID = 5
1,210,592 UART: [ldev] AUTHORITY.KEYID = 7
1,211,055 UART: [ldev] FE.KEYID = 1
1,216,393 UART: [ldev] Erasing FE.KEYID = 1
1,243,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,147 UART: [ldev] --
1,282,643 UART: [fwproc] Wait for Commands...
1,283,220 UART: [fwproc] Recv command 0x46574c44
1,283,953 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,905 UART: ROM Fatal Error: 0x000B0009
1,310,062 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
891,537 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,666 UART: [kat] ++
895,818 UART: [kat] sha1
900,006 UART: [kat] SHA2-256
901,946 UART: [kat] SHA2-384
904,745 UART: [kat] SHA2-512-ACC
906,646 UART: [kat] ECC-384
916,619 UART: [kat] HMAC-384Kdf
921,311 UART: [kat] LMS
1,169,623 UART: [kat] --
1,170,416 UART: [cold-reset] ++
1,170,830 UART: [fht] FHT @ 0x50003400
1,173,416 UART: [idev] ++
1,173,584 UART: [idev] CDI.KEYID = 6
1,173,945 UART: [idev] SUBJECT.KEYID = 7
1,174,370 UART: [idev] UDS.KEYID = 0
1,182,340 UART: [idev] Erasing UDS.KEYID = 0
1,199,432 UART: [idev] Sha1 KeyId Algorithm
1,208,268 UART: [idev] --
1,209,143 UART: [ldev] ++
1,209,311 UART: [ldev] CDI.KEYID = 6
1,209,675 UART: [ldev] SUBJECT.KEYID = 5
1,210,102 UART: [ldev] AUTHORITY.KEYID = 7
1,210,565 UART: [ldev] FE.KEYID = 1
1,215,731 UART: [ldev] Erasing FE.KEYID = 1
1,242,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,105 UART: [ldev] --
1,281,421 UART: [fwproc] Wait for Commands...
1,282,138 UART: [fwproc] Recv command 0x46574c44
1,282,871 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,570 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,879 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,695 >>> mbox cmd response: success
2,772,720 UART: [afmc] ++
2,772,888 UART: [afmc] CDI.KEYID = 6
2,773,251 UART: [afmc] SUBJECT.KEYID = 7
2,773,677 UART: [afmc] AUTHORITY.KEYID = 5
2,809,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,926 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,677 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,390 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,299 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,013 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,788 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,469 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,079 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,713 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,485 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,856 UART: [state] LifecycleState = Unprovisioned
85,511 UART: [state] DebugLocked = No
86,237 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,269 UART: [kat] ++
895,421 UART: [kat] sha1
899,637 UART: [kat] SHA2-256
901,577 UART: [kat] SHA2-384
904,284 UART: [kat] SHA2-512-ACC
906,185 UART: [kat] ECC-384
915,950 UART: [kat] HMAC-384Kdf
920,624 UART: [kat] LMS
1,168,936 UART: [kat] --
1,169,975 UART: [cold-reset] ++
1,170,351 UART: [fht] FHT @ 0x50003400
1,173,145 UART: [idev] ++
1,173,313 UART: [idev] CDI.KEYID = 6
1,173,674 UART: [idev] SUBJECT.KEYID = 7
1,174,099 UART: [idev] UDS.KEYID = 0
1,182,037 UART: [idev] Erasing UDS.KEYID = 0
1,199,235 UART: [idev] Sha1 KeyId Algorithm
1,208,083 UART: [idev] --
1,209,314 UART: [ldev] ++
1,209,482 UART: [ldev] CDI.KEYID = 6
1,209,846 UART: [ldev] SUBJECT.KEYID = 5
1,210,273 UART: [ldev] AUTHORITY.KEYID = 7
1,210,736 UART: [ldev] FE.KEYID = 1
1,215,926 UART: [ldev] Erasing FE.KEYID = 1
1,241,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,562 UART: [ldev] --
1,280,940 UART: [fwproc] Wait for Commands...
1,281,679 UART: [fwproc] Recv command 0x46574c44
1,282,412 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,540 UART: ROM Fatal Error: 0x000B0009
1,308,697 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,585 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
891,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
899,933 UART: [kat] SHA2-256
901,873 UART: [kat] SHA2-384
904,714 UART: [kat] SHA2-512-ACC
906,615 UART: [kat] ECC-384
916,738 UART: [kat] HMAC-384Kdf
921,290 UART: [kat] LMS
1,169,602 UART: [kat] --
1,170,459 UART: [cold-reset] ++
1,170,871 UART: [fht] FHT @ 0x50003400
1,173,481 UART: [idev] ++
1,173,649 UART: [idev] CDI.KEYID = 6
1,174,010 UART: [idev] SUBJECT.KEYID = 7
1,174,435 UART: [idev] UDS.KEYID = 0
1,181,987 UART: [idev] Erasing UDS.KEYID = 0
1,198,579 UART: [idev] Sha1 KeyId Algorithm
1,207,455 UART: [idev] --
1,208,424 UART: [ldev] ++
1,208,592 UART: [ldev] CDI.KEYID = 6
1,208,956 UART: [ldev] SUBJECT.KEYID = 5
1,209,383 UART: [ldev] AUTHORITY.KEYID = 7
1,209,846 UART: [ldev] FE.KEYID = 1
1,215,068 UART: [ldev] Erasing FE.KEYID = 1
1,241,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,496 UART: [ldev] --
1,279,894 UART: [fwproc] Wait for Commands...
1,280,611 UART: [fwproc] Recv command 0x46574c44
1,281,344 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,606 UART: ROM Fatal Error: 0x000B0009
1,307,763 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,804 UART: [state] LifecycleState = Unprovisioned
85,459 UART: [state] DebugLocked = No
86,001 UART: [state] WD Timer not started. Device not locked for debugging
87,172 UART: [kat] SHA2-256
890,722 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,851 UART: [kat] ++
895,003 UART: [kat] sha1
899,177 UART: [kat] SHA2-256
901,117 UART: [kat] SHA2-384
904,058 UART: [kat] SHA2-512-ACC
905,959 UART: [kat] ECC-384
915,688 UART: [kat] HMAC-384Kdf
920,496 UART: [kat] LMS
1,168,808 UART: [kat] --
1,169,739 UART: [cold-reset] ++
1,170,229 UART: [fht] FHT @ 0x50003400
1,172,763 UART: [idev] ++
1,172,931 UART: [idev] CDI.KEYID = 6
1,173,292 UART: [idev] SUBJECT.KEYID = 7
1,173,717 UART: [idev] UDS.KEYID = 0
1,181,417 UART: [idev] Erasing UDS.KEYID = 0
1,198,473 UART: [idev] Sha1 KeyId Algorithm
1,207,397 UART: [idev] --
1,208,510 UART: [ldev] ++
1,208,678 UART: [ldev] CDI.KEYID = 6
1,209,042 UART: [ldev] SUBJECT.KEYID = 5
1,209,469 UART: [ldev] AUTHORITY.KEYID = 7
1,209,932 UART: [ldev] FE.KEYID = 1
1,214,990 UART: [ldev] Erasing FE.KEYID = 1
1,240,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,914 UART: [ldev] --
1,280,244 UART: [fwproc] Wait for Commands...
1,280,955 UART: [fwproc] Recv command 0x46574c44
1,281,688 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,256 UART: ROM Fatal Error: 0x000B0009
1,308,413 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
891,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,911 UART: [kat] SHA2-256
901,851 UART: [kat] SHA2-384
904,504 UART: [kat] SHA2-512-ACC
906,405 UART: [kat] ECC-384
916,330 UART: [kat] HMAC-384Kdf
920,948 UART: [kat] LMS
1,169,260 UART: [kat] --
1,170,013 UART: [cold-reset] ++
1,170,567 UART: [fht] FHT @ 0x50003400
1,173,321 UART: [idev] ++
1,173,489 UART: [idev] CDI.KEYID = 6
1,173,850 UART: [idev] SUBJECT.KEYID = 7
1,174,275 UART: [idev] UDS.KEYID = 0
1,181,937 UART: [idev] Erasing UDS.KEYID = 0
1,199,435 UART: [idev] Sha1 KeyId Algorithm
1,208,451 UART: [idev] --
1,209,606 UART: [ldev] ++
1,209,774 UART: [ldev] CDI.KEYID = 6
1,210,138 UART: [ldev] SUBJECT.KEYID = 5
1,210,565 UART: [ldev] AUTHORITY.KEYID = 7
1,211,028 UART: [ldev] FE.KEYID = 1
1,216,338 UART: [ldev] Erasing FE.KEYID = 1
1,242,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,560 UART: [ldev] --
1,282,000 UART: [fwproc] Wait for Commands...
1,282,803 UART: [fwproc] Recv command 0x46574c44
1,283,536 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,023 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,332 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,218 >>> mbox cmd response: success
2,774,385 UART: [afmc] ++
2,774,553 UART: [afmc] CDI.KEYID = 6
2,774,916 UART: [afmc] SUBJECT.KEYID = 7
2,775,342 UART: [afmc] AUTHORITY.KEYID = 5
2,810,561 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,747 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,498 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,211 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,120 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,834 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,683 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,376 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,564 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,920 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,098 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,987 UART: [state] LifecycleState = Unprovisioned
85,642 UART: [state] DebugLocked = No
86,352 UART: [state] WD Timer not started. Device not locked for debugging
87,633 UART: [kat] SHA2-256
891,183 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,312 UART: [kat] ++
895,464 UART: [kat] sha1
899,764 UART: [kat] SHA2-256
901,704 UART: [kat] SHA2-384
904,587 UART: [kat] SHA2-512-ACC
906,488 UART: [kat] ECC-384
916,087 UART: [kat] HMAC-384Kdf
920,839 UART: [kat] LMS
1,169,151 UART: [kat] --
1,170,204 UART: [cold-reset] ++
1,170,780 UART: [fht] FHT @ 0x50003400
1,173,504 UART: [idev] ++
1,173,672 UART: [idev] CDI.KEYID = 6
1,174,033 UART: [idev] SUBJECT.KEYID = 7
1,174,458 UART: [idev] UDS.KEYID = 0
1,182,620 UART: [idev] Erasing UDS.KEYID = 0
1,199,588 UART: [idev] Sha1 KeyId Algorithm
1,208,574 UART: [idev] --
1,209,609 UART: [ldev] ++
1,209,777 UART: [ldev] CDI.KEYID = 6
1,210,141 UART: [ldev] SUBJECT.KEYID = 5
1,210,568 UART: [ldev] AUTHORITY.KEYID = 7
1,211,031 UART: [ldev] FE.KEYID = 1
1,216,177 UART: [ldev] Erasing FE.KEYID = 1
1,243,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,421 UART: [ldev] --
1,282,859 UART: [fwproc] Wait for Commands...
1,283,432 UART: [fwproc] Recv command 0x46574c44
1,284,165 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,155 UART: ROM Fatal Error: 0x000B0009
1,310,312 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
891,637 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,766 UART: [kat] ++
895,918 UART: [kat] sha1
899,990 UART: [kat] SHA2-256
901,930 UART: [kat] SHA2-384
904,791 UART: [kat] SHA2-512-ACC
906,692 UART: [kat] ECC-384
916,297 UART: [kat] HMAC-384Kdf
920,953 UART: [kat] LMS
1,169,265 UART: [kat] --
1,170,126 UART: [cold-reset] ++
1,170,508 UART: [fht] FHT @ 0x50003400
1,173,254 UART: [idev] ++
1,173,422 UART: [idev] CDI.KEYID = 6
1,173,783 UART: [idev] SUBJECT.KEYID = 7
1,174,208 UART: [idev] UDS.KEYID = 0
1,182,034 UART: [idev] Erasing UDS.KEYID = 0
1,198,592 UART: [idev] Sha1 KeyId Algorithm
1,207,536 UART: [idev] --
1,208,535 UART: [ldev] ++
1,208,703 UART: [ldev] CDI.KEYID = 6
1,209,067 UART: [ldev] SUBJECT.KEYID = 5
1,209,494 UART: [ldev] AUTHORITY.KEYID = 7
1,209,957 UART: [ldev] FE.KEYID = 1
1,215,075 UART: [ldev] Erasing FE.KEYID = 1
1,241,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,225 UART: [ldev] --
1,280,505 UART: [fwproc] Wait for Commands...
1,281,166 UART: [fwproc] Recv command 0x46574c44
1,281,899 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,565 UART: ROM Fatal Error: 0x000B0009
1,307,722 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [kat] SHA2-256
891,601 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,730 UART: [kat] ++
895,882 UART: [kat] sha1
900,040 UART: [kat] SHA2-256
901,980 UART: [kat] SHA2-384
904,727 UART: [kat] SHA2-512-ACC
906,628 UART: [kat] ECC-384
916,189 UART: [kat] HMAC-384Kdf
920,859 UART: [kat] LMS
1,169,171 UART: [kat] --
1,169,900 UART: [cold-reset] ++
1,170,258 UART: [fht] FHT @ 0x50003400
1,172,894 UART: [idev] ++
1,173,062 UART: [idev] CDI.KEYID = 6
1,173,423 UART: [idev] SUBJECT.KEYID = 7
1,173,848 UART: [idev] UDS.KEYID = 0
1,181,826 UART: [idev] Erasing UDS.KEYID = 0
1,199,768 UART: [idev] Sha1 KeyId Algorithm
1,208,780 UART: [idev] --
1,210,069 UART: [ldev] ++
1,210,237 UART: [ldev] CDI.KEYID = 6
1,210,601 UART: [ldev] SUBJECT.KEYID = 5
1,211,028 UART: [ldev] AUTHORITY.KEYID = 7
1,211,491 UART: [ldev] FE.KEYID = 1
1,216,735 UART: [ldev] Erasing FE.KEYID = 1
1,243,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,921 UART: [ldev] --
1,282,397 UART: [fwproc] Wait for Commands...
1,283,064 UART: [fwproc] Recv command 0x46574c44
1,283,797 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,223 UART: ROM Fatal Error: 0x000B0009
1,310,380 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,793 UART: [state] LifecycleState = Unprovisioned
86,448 UART: [state] DebugLocked = No
86,984 UART: [state] WD Timer not started. Device not locked for debugging
88,219 UART: [kat] SHA2-256
891,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,898 UART: [kat] ++
896,050 UART: [kat] sha1
900,286 UART: [kat] SHA2-256
902,226 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
916,915 UART: [kat] HMAC-384Kdf
921,695 UART: [kat] LMS
1,170,007 UART: [kat] --
1,170,956 UART: [cold-reset] ++
1,171,536 UART: [fht] FHT @ 0x50003400
1,174,198 UART: [idev] ++
1,174,366 UART: [idev] CDI.KEYID = 6
1,174,727 UART: [idev] SUBJECT.KEYID = 7
1,175,152 UART: [idev] UDS.KEYID = 0
1,183,244 UART: [idev] Erasing UDS.KEYID = 0
1,200,370 UART: [idev] Sha1 KeyId Algorithm
1,209,420 UART: [idev] --
1,210,283 UART: [ldev] ++
1,210,451 UART: [ldev] CDI.KEYID = 6
1,210,815 UART: [ldev] SUBJECT.KEYID = 5
1,211,242 UART: [ldev] AUTHORITY.KEYID = 7
1,211,705 UART: [ldev] FE.KEYID = 1
1,216,603 UART: [ldev] Erasing FE.KEYID = 1
1,243,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,783 UART: [ldev] --
1,283,207 UART: [fwproc] Wait for Commands...
1,284,004 UART: [fwproc] Recv command 0x46574c44
1,284,737 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,492 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,801 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,495 >>> mbox cmd response: success
2,775,716 UART: [afmc] ++
2,775,884 UART: [afmc] CDI.KEYID = 6
2,776,247 UART: [afmc] SUBJECT.KEYID = 7
2,776,673 UART: [afmc] AUTHORITY.KEYID = 5
2,812,040 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,756 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,507 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,835,220 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,841,129 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,843 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,616 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,497 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,713 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,483 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,679 UART: [state] WD Timer not started. Device not locked for debugging
87,888 UART: [kat] SHA2-256
891,438 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,567 UART: [kat] ++
895,719 UART: [kat] sha1
900,139 UART: [kat] SHA2-256
902,079 UART: [kat] SHA2-384
904,742 UART: [kat] SHA2-512-ACC
906,643 UART: [kat] ECC-384
916,616 UART: [kat] HMAC-384Kdf
921,160 UART: [kat] LMS
1,169,472 UART: [kat] --
1,170,431 UART: [cold-reset] ++
1,171,009 UART: [fht] FHT @ 0x50003400
1,173,645 UART: [idev] ++
1,173,813 UART: [idev] CDI.KEYID = 6
1,174,174 UART: [idev] SUBJECT.KEYID = 7
1,174,599 UART: [idev] UDS.KEYID = 0
1,182,437 UART: [idev] Erasing UDS.KEYID = 0
1,199,419 UART: [idev] Sha1 KeyId Algorithm
1,208,059 UART: [idev] --
1,208,948 UART: [ldev] ++
1,209,116 UART: [ldev] CDI.KEYID = 6
1,209,480 UART: [ldev] SUBJECT.KEYID = 5
1,209,907 UART: [ldev] AUTHORITY.KEYID = 7
1,210,370 UART: [ldev] FE.KEYID = 1
1,215,532 UART: [ldev] Erasing FE.KEYID = 1
1,241,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,642 UART: [ldev] --
1,280,962 UART: [fwproc] Wait for Commands...
1,281,561 UART: [fwproc] Recv command 0x46574c44
1,282,294 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,582 UART: ROM Fatal Error: 0x000B0009
1,308,739 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,881 UART: [kat] SHA2-256
901,821 UART: [kat] SHA2-384
904,688 UART: [kat] SHA2-512-ACC
906,589 UART: [kat] ECC-384
916,362 UART: [kat] HMAC-384Kdf
920,820 UART: [kat] LMS
1,169,132 UART: [kat] --
1,169,961 UART: [cold-reset] ++
1,170,433 UART: [fht] FHT @ 0x50003400
1,173,173 UART: [idev] ++
1,173,341 UART: [idev] CDI.KEYID = 6
1,173,702 UART: [idev] SUBJECT.KEYID = 7
1,174,127 UART: [idev] UDS.KEYID = 0
1,182,363 UART: [idev] Erasing UDS.KEYID = 0
1,198,947 UART: [idev] Sha1 KeyId Algorithm
1,207,623 UART: [idev] --
1,208,622 UART: [ldev] ++
1,208,790 UART: [ldev] CDI.KEYID = 6
1,209,154 UART: [ldev] SUBJECT.KEYID = 5
1,209,581 UART: [ldev] AUTHORITY.KEYID = 7
1,210,044 UART: [ldev] FE.KEYID = 1
1,215,016 UART: [ldev] Erasing FE.KEYID = 1
1,241,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,782 UART: [ldev] --
1,280,208 UART: [fwproc] Wait for Commands...
1,280,983 UART: [fwproc] Recv command 0x46574c44
1,281,716 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,506 UART: ROM Fatal Error: 0x000B0009
1,307,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,661 UART: [state] WD Timer not started. Device not locked for debugging
87,982 UART: [kat] SHA2-256
891,532 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,661 UART: [kat] ++
895,813 UART: [kat] sha1
900,175 UART: [kat] SHA2-256
902,115 UART: [kat] SHA2-384
904,980 UART: [kat] SHA2-512-ACC
906,881 UART: [kat] ECC-384
916,374 UART: [kat] HMAC-384Kdf
921,040 UART: [kat] LMS
1,169,352 UART: [kat] --
1,170,337 UART: [cold-reset] ++
1,170,823 UART: [fht] FHT @ 0x50003400
1,173,509 UART: [idev] ++
1,173,677 UART: [idev] CDI.KEYID = 6
1,174,038 UART: [idev] SUBJECT.KEYID = 7
1,174,463 UART: [idev] UDS.KEYID = 0
1,182,743 UART: [idev] Erasing UDS.KEYID = 0
1,199,473 UART: [idev] Sha1 KeyId Algorithm
1,208,501 UART: [idev] --
1,209,536 UART: [ldev] ++
1,209,704 UART: [ldev] CDI.KEYID = 6
1,210,068 UART: [ldev] SUBJECT.KEYID = 5
1,210,495 UART: [ldev] AUTHORITY.KEYID = 7
1,210,958 UART: [ldev] FE.KEYID = 1
1,216,306 UART: [ldev] Erasing FE.KEYID = 1
1,243,055 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,000 UART: [ldev] --
1,282,500 UART: [fwproc] Wait for Commands...
1,283,213 UART: [fwproc] Recv command 0x46574c44
1,283,946 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,284 UART: ROM Fatal Error: 0x000B0009
1,310,441 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
891,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,303 UART: [kat] ++
895,455 UART: [kat] sha1
899,585 UART: [kat] SHA2-256
901,525 UART: [kat] SHA2-384
904,358 UART: [kat] SHA2-512-ACC
906,259 UART: [kat] ECC-384
915,484 UART: [kat] HMAC-384Kdf
920,200 UART: [kat] LMS
1,168,512 UART: [kat] --
1,169,381 UART: [cold-reset] ++
1,169,723 UART: [fht] FHT @ 0x50003400
1,172,449 UART: [idev] ++
1,172,617 UART: [idev] CDI.KEYID = 6
1,172,978 UART: [idev] SUBJECT.KEYID = 7
1,173,403 UART: [idev] UDS.KEYID = 0
1,181,695 UART: [idev] Erasing UDS.KEYID = 0
1,198,663 UART: [idev] Sha1 KeyId Algorithm
1,207,639 UART: [idev] --
1,208,636 UART: [ldev] ++
1,208,804 UART: [ldev] CDI.KEYID = 6
1,209,168 UART: [ldev] SUBJECT.KEYID = 5
1,209,595 UART: [ldev] AUTHORITY.KEYID = 7
1,210,058 UART: [ldev] FE.KEYID = 1
1,215,212 UART: [ldev] Erasing FE.KEYID = 1
1,241,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,416 UART: [ldev] --
1,280,876 UART: [fwproc] Wait for Commands...
1,281,629 UART: [fwproc] Recv command 0x46574c44
1,282,362 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,217 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,526 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,262 >>> mbox cmd response: success
2,772,393 UART: [afmc] ++
2,772,561 UART: [afmc] CDI.KEYID = 6
2,772,924 UART: [afmc] SUBJECT.KEYID = 7
2,773,350 UART: [afmc] AUTHORITY.KEYID = 5
2,809,861 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,437 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,188 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,901 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,810 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,524 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,519 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,996 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,776 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,424 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,694 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,574 UART: [kat] ++
895,726 UART: [kat] sha1
899,814 UART: [kat] SHA2-256
901,754 UART: [kat] SHA2-384
904,537 UART: [kat] SHA2-512-ACC
906,438 UART: [kat] ECC-384
915,921 UART: [kat] HMAC-384Kdf
920,569 UART: [kat] LMS
1,168,881 UART: [kat] --
1,169,894 UART: [cold-reset] ++
1,170,342 UART: [fht] FHT @ 0x50003400
1,172,836 UART: [idev] ++
1,173,004 UART: [idev] CDI.KEYID = 6
1,173,365 UART: [idev] SUBJECT.KEYID = 7
1,173,790 UART: [idev] UDS.KEYID = 0
1,182,126 UART: [idev] Erasing UDS.KEYID = 0
1,199,034 UART: [idev] Sha1 KeyId Algorithm
1,207,890 UART: [idev] --
1,208,867 UART: [ldev] ++
1,209,035 UART: [ldev] CDI.KEYID = 6
1,209,399 UART: [ldev] SUBJECT.KEYID = 5
1,209,826 UART: [ldev] AUTHORITY.KEYID = 7
1,210,289 UART: [ldev] FE.KEYID = 1
1,215,603 UART: [ldev] Erasing FE.KEYID = 1
1,241,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,913 UART: [ldev] --
1,281,399 UART: [fwproc] Wait for Commands...
1,282,152 UART: [fwproc] Recv command 0x46574c44
1,282,885 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,243 UART: ROM Fatal Error: 0x000B0009
1,309,400 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
891,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,322 UART: [kat] ++
895,474 UART: [kat] sha1
899,562 UART: [kat] SHA2-256
901,502 UART: [kat] SHA2-384
904,417 UART: [kat] SHA2-512-ACC
906,318 UART: [kat] ECC-384
915,737 UART: [kat] HMAC-384Kdf
920,379 UART: [kat] LMS
1,168,691 UART: [kat] --
1,169,668 UART: [cold-reset] ++
1,170,144 UART: [fht] FHT @ 0x50003400
1,172,724 UART: [idev] ++
1,172,892 UART: [idev] CDI.KEYID = 6
1,173,253 UART: [idev] SUBJECT.KEYID = 7
1,173,678 UART: [idev] UDS.KEYID = 0
1,181,774 UART: [idev] Erasing UDS.KEYID = 0
1,199,204 UART: [idev] Sha1 KeyId Algorithm
1,208,076 UART: [idev] --
1,209,077 UART: [ldev] ++
1,209,245 UART: [ldev] CDI.KEYID = 6
1,209,609 UART: [ldev] SUBJECT.KEYID = 5
1,210,036 UART: [ldev] AUTHORITY.KEYID = 7
1,210,499 UART: [ldev] FE.KEYID = 1
1,215,639 UART: [ldev] Erasing FE.KEYID = 1
1,241,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,865 UART: [ldev] --
1,281,323 UART: [fwproc] Wait for Commands...
1,282,146 UART: [fwproc] Recv command 0x46574c44
1,282,879 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,387 UART: ROM Fatal Error: 0x000B0009
1,309,544 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
891,443 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,572 UART: [kat] ++
895,724 UART: [kat] sha1
900,176 UART: [kat] SHA2-256
902,116 UART: [kat] SHA2-384
904,969 UART: [kat] SHA2-512-ACC
906,870 UART: [kat] ECC-384
916,837 UART: [kat] HMAC-384Kdf
921,467 UART: [kat] LMS
1,169,779 UART: [kat] --
1,170,550 UART: [cold-reset] ++
1,170,884 UART: [fht] FHT @ 0x50003400
1,173,440 UART: [idev] ++
1,173,608 UART: [idev] CDI.KEYID = 6
1,173,969 UART: [idev] SUBJECT.KEYID = 7
1,174,394 UART: [idev] UDS.KEYID = 0
1,182,428 UART: [idev] Erasing UDS.KEYID = 0
1,199,314 UART: [idev] Sha1 KeyId Algorithm
1,208,064 UART: [idev] --
1,209,031 UART: [ldev] ++
1,209,199 UART: [ldev] CDI.KEYID = 6
1,209,563 UART: [ldev] SUBJECT.KEYID = 5
1,209,990 UART: [ldev] AUTHORITY.KEYID = 7
1,210,453 UART: [ldev] FE.KEYID = 1
1,215,819 UART: [ldev] Erasing FE.KEYID = 1
1,242,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,119 UART: [ldev] --
1,281,471 UART: [fwproc] Wait for Commands...
1,282,276 UART: [fwproc] Recv command 0x46574c44
1,283,009 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,309 UART: ROM Fatal Error: 0x000B0009
1,309,466 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,751 UART: [state] LifecycleState = Unprovisioned
86,406 UART: [state] DebugLocked = No
87,084 UART: [state] WD Timer not started. Device not locked for debugging
88,263 UART: [kat] SHA2-256
891,813 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,942 UART: [kat] ++
896,094 UART: [kat] sha1
900,282 UART: [kat] SHA2-256
902,222 UART: [kat] SHA2-384
905,115 UART: [kat] SHA2-512-ACC
907,016 UART: [kat] ECC-384
916,849 UART: [kat] HMAC-384Kdf
921,435 UART: [kat] LMS
1,169,747 UART: [kat] --
1,170,724 UART: [cold-reset] ++
1,171,298 UART: [fht] FHT @ 0x50003400
1,174,160 UART: [idev] ++
1,174,328 UART: [idev] CDI.KEYID = 6
1,174,689 UART: [idev] SUBJECT.KEYID = 7
1,175,114 UART: [idev] UDS.KEYID = 0
1,182,780 UART: [idev] Erasing UDS.KEYID = 0
1,200,142 UART: [idev] Sha1 KeyId Algorithm
1,208,906 UART: [idev] --
1,209,763 UART: [ldev] ++
1,209,931 UART: [ldev] CDI.KEYID = 6
1,210,295 UART: [ldev] SUBJECT.KEYID = 5
1,210,722 UART: [ldev] AUTHORITY.KEYID = 7
1,211,185 UART: [ldev] FE.KEYID = 1
1,216,639 UART: [ldev] Erasing FE.KEYID = 1
1,243,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,673 UART: [ldev] --
1,282,029 UART: [fwproc] Wait for Commands...
1,282,788 UART: [fwproc] Recv command 0x46574c44
1,283,521 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,588 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,897 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,717 >>> mbox cmd response: success
2,774,918 UART: [afmc] ++
2,775,086 UART: [afmc] CDI.KEYID = 6
2,775,449 UART: [afmc] SUBJECT.KEYID = 7
2,775,875 UART: [afmc] AUTHORITY.KEYID = 5
2,811,902 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,269 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,982 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,891 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,605 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,280 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,769 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,505 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,463 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,193 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,522 UART: [state] LifecycleState = Unprovisioned
85,177 UART: [state] DebugLocked = No
85,815 UART: [state] WD Timer not started. Device not locked for debugging
86,990 UART: [kat] SHA2-256
890,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,669 UART: [kat] ++
894,821 UART: [kat] sha1
898,971 UART: [kat] SHA2-256
900,911 UART: [kat] SHA2-384
903,494 UART: [kat] SHA2-512-ACC
905,395 UART: [kat] ECC-384
915,622 UART: [kat] HMAC-384Kdf
920,012 UART: [kat] LMS
1,168,324 UART: [kat] --
1,169,553 UART: [cold-reset] ++
1,169,935 UART: [fht] FHT @ 0x50003400
1,172,599 UART: [idev] ++
1,172,767 UART: [idev] CDI.KEYID = 6
1,173,128 UART: [idev] SUBJECT.KEYID = 7
1,173,553 UART: [idev] UDS.KEYID = 0
1,181,613 UART: [idev] Erasing UDS.KEYID = 0
1,198,525 UART: [idev] Sha1 KeyId Algorithm
1,207,359 UART: [idev] --
1,208,348 UART: [ldev] ++
1,208,516 UART: [ldev] CDI.KEYID = 6
1,208,880 UART: [ldev] SUBJECT.KEYID = 5
1,209,307 UART: [ldev] AUTHORITY.KEYID = 7
1,209,770 UART: [ldev] FE.KEYID = 1
1,215,140 UART: [ldev] Erasing FE.KEYID = 1
1,241,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,954 UART: [ldev] --
1,280,252 UART: [fwproc] Wait for Commands...
1,280,893 UART: [fwproc] Recv command 0x46574c44
1,281,626 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,298 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,998 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,307 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,121 >>> mbox cmd response: success
2,772,136 UART: [afmc] ++
2,772,304 UART: [afmc] CDI.KEYID = 6
2,772,667 UART: [afmc] SUBJECT.KEYID = 7
2,773,093 UART: [afmc] AUTHORITY.KEYID = 5
2,808,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,716 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,467 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,196 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,079 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,798 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,439 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,605 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
891,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,644 UART: [kat] ++
895,796 UART: [kat] sha1
900,148 UART: [kat] SHA2-256
902,088 UART: [kat] SHA2-384
904,987 UART: [kat] SHA2-512-ACC
906,888 UART: [kat] ECC-384
916,637 UART: [kat] HMAC-384Kdf
921,419 UART: [kat] LMS
1,169,731 UART: [kat] --
1,170,616 UART: [cold-reset] ++
1,171,070 UART: [fht] FHT @ 0x50003400
1,173,766 UART: [idev] ++
1,173,934 UART: [idev] CDI.KEYID = 6
1,174,295 UART: [idev] SUBJECT.KEYID = 7
1,174,720 UART: [idev] UDS.KEYID = 0
1,182,884 UART: [idev] Erasing UDS.KEYID = 0
1,200,306 UART: [idev] Sha1 KeyId Algorithm
1,209,148 UART: [idev] --
1,210,209 UART: [ldev] ++
1,210,377 UART: [ldev] CDI.KEYID = 6
1,210,741 UART: [ldev] SUBJECT.KEYID = 5
1,211,168 UART: [ldev] AUTHORITY.KEYID = 7
1,211,631 UART: [ldev] FE.KEYID = 1
1,217,031 UART: [ldev] Erasing FE.KEYID = 1
1,242,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,847 UART: [ldev] --
1,282,213 UART: [fwproc] Wait for Commands...
1,282,968 UART: [fwproc] Recv command 0x46574c44
1,283,701 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,759 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,068 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,884 >>> mbox cmd response: success
2,775,023 UART: [afmc] ++
2,775,191 UART: [afmc] CDI.KEYID = 6
2,775,554 UART: [afmc] SUBJECT.KEYID = 7
2,775,980 UART: [afmc] AUTHORITY.KEYID = 5
2,811,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,091 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,842 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,571 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,454 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,173 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,058 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,794 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,894 UART: [state] LifecycleState = Unprovisioned
85,549 UART: [state] DebugLocked = No
86,073 UART: [state] WD Timer not started. Device not locked for debugging
87,256 UART: [kat] SHA2-256
890,806 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,935 UART: [kat] ++
895,087 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,040 UART: [kat] SHA2-512-ACC
905,941 UART: [kat] ECC-384
915,460 UART: [kat] HMAC-384Kdf
919,964 UART: [kat] LMS
1,168,276 UART: [kat] --
1,169,217 UART: [cold-reset] ++
1,169,675 UART: [fht] FHT @ 0x50003400
1,172,269 UART: [idev] ++
1,172,437 UART: [idev] CDI.KEYID = 6
1,172,798 UART: [idev] SUBJECT.KEYID = 7
1,173,223 UART: [idev] UDS.KEYID = 0
1,181,575 UART: [idev] Erasing UDS.KEYID = 0
1,198,943 UART: [idev] Sha1 KeyId Algorithm
1,207,907 UART: [idev] --
1,209,084 UART: [ldev] ++
1,209,252 UART: [ldev] CDI.KEYID = 6
1,209,616 UART: [ldev] SUBJECT.KEYID = 5
1,210,043 UART: [ldev] AUTHORITY.KEYID = 7
1,210,506 UART: [ldev] FE.KEYID = 1
1,215,902 UART: [ldev] Erasing FE.KEYID = 1
1,242,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,816 UART: [ldev] --
1,281,214 UART: [fwproc] Wait for Commands...
1,281,897 UART: [fwproc] Recv command 0x46574c44
1,282,630 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,974 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,283 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,113 >>> mbox cmd response: success
2,773,338 UART: [afmc] ++
2,773,506 UART: [afmc] CDI.KEYID = 6
2,773,869 UART: [afmc] SUBJECT.KEYID = 7
2,774,295 UART: [afmc] AUTHORITY.KEYID = 5
2,809,994 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,724 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,475 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,204 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,087 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,806 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,599 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,655 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,815 UART: [kat] SHA2-256
891,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,494 UART: [kat] ++
895,646 UART: [kat] sha1
899,800 UART: [kat] SHA2-256
901,740 UART: [kat] SHA2-384
904,465 UART: [kat] SHA2-512-ACC
906,366 UART: [kat] ECC-384
916,433 UART: [kat] HMAC-384Kdf
921,089 UART: [kat] LMS
1,169,401 UART: [kat] --
1,170,144 UART: [cold-reset] ++
1,170,670 UART: [fht] FHT @ 0x50003400
1,173,396 UART: [idev] ++
1,173,564 UART: [idev] CDI.KEYID = 6
1,173,925 UART: [idev] SUBJECT.KEYID = 7
1,174,350 UART: [idev] UDS.KEYID = 0
1,182,476 UART: [idev] Erasing UDS.KEYID = 0
1,199,230 UART: [idev] Sha1 KeyId Algorithm
1,208,198 UART: [idev] --
1,209,375 UART: [ldev] ++
1,209,543 UART: [ldev] CDI.KEYID = 6
1,209,907 UART: [ldev] SUBJECT.KEYID = 5
1,210,334 UART: [ldev] AUTHORITY.KEYID = 7
1,210,797 UART: [ldev] FE.KEYID = 1
1,216,139 UART: [ldev] Erasing FE.KEYID = 1
1,242,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,049 UART: [ldev] --
1,282,547 UART: [fwproc] Wait for Commands...
1,283,286 UART: [fwproc] Recv command 0x46574c44
1,284,019 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,937 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,246 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,014 >>> mbox cmd response: success
2,776,187 UART: [afmc] ++
2,776,355 UART: [afmc] CDI.KEYID = 6
2,776,718 UART: [afmc] SUBJECT.KEYID = 7
2,777,144 UART: [afmc] AUTHORITY.KEYID = 5
2,812,527 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,450 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,179 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,062 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,781 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,640 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,984 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,826 UART: [state] LifecycleState = Unprovisioned
86,481 UART: [state] DebugLocked = No
87,023 UART: [state] WD Timer not started. Device not locked for debugging
88,158 UART: [kat] SHA2-256
891,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,837 UART: [kat] ++
895,989 UART: [kat] sha1
900,217 UART: [kat] SHA2-256
902,157 UART: [kat] SHA2-384
904,776 UART: [kat] SHA2-512-ACC
906,677 UART: [kat] ECC-384
916,534 UART: [kat] HMAC-384Kdf
921,202 UART: [kat] LMS
1,169,514 UART: [kat] --
1,170,327 UART: [cold-reset] ++
1,170,817 UART: [fht] FHT @ 0x50003400
1,173,371 UART: [idev] ++
1,173,539 UART: [idev] CDI.KEYID = 6
1,173,900 UART: [idev] SUBJECT.KEYID = 7
1,174,325 UART: [idev] UDS.KEYID = 0
1,182,297 UART: [idev] Erasing UDS.KEYID = 0
1,198,513 UART: [idev] Sha1 KeyId Algorithm
1,207,409 UART: [idev] --
1,208,308 UART: [ldev] ++
1,208,476 UART: [ldev] CDI.KEYID = 6
1,208,840 UART: [ldev] SUBJECT.KEYID = 5
1,209,267 UART: [ldev] AUTHORITY.KEYID = 7
1,209,730 UART: [ldev] FE.KEYID = 1
1,214,990 UART: [ldev] Erasing FE.KEYID = 1
1,241,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,532 UART: [ldev] --
1,280,978 UART: [fwproc] Wait for Commands...
1,281,675 UART: [fwproc] Recv command 0x46574c44
1,282,408 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,912 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,221 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,025 >>> mbox cmd response: success
2,774,252 UART: [afmc] ++
2,774,420 UART: [afmc] CDI.KEYID = 6
2,774,783 UART: [afmc] SUBJECT.KEYID = 7
2,775,209 UART: [afmc] AUTHORITY.KEYID = 5
2,810,508 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,901 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,630 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,513 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,232 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,909 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,291 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,835 UART: [kat] SHA2-256
891,385 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,514 UART: [kat] ++
895,666 UART: [kat] sha1
900,116 UART: [kat] SHA2-256
902,056 UART: [kat] SHA2-384
904,585 UART: [kat] SHA2-512-ACC
906,486 UART: [kat] ECC-384
916,203 UART: [kat] HMAC-384Kdf
920,885 UART: [kat] LMS
1,169,197 UART: [kat] --
1,170,076 UART: [cold-reset] ++
1,170,564 UART: [fht] FHT @ 0x50003400
1,173,162 UART: [idev] ++
1,173,330 UART: [idev] CDI.KEYID = 6
1,173,691 UART: [idev] SUBJECT.KEYID = 7
1,174,116 UART: [idev] UDS.KEYID = 0
1,182,156 UART: [idev] Erasing UDS.KEYID = 0
1,198,890 UART: [idev] Sha1 KeyId Algorithm
1,207,556 UART: [idev] --
1,208,371 UART: [ldev] ++
1,208,539 UART: [ldev] CDI.KEYID = 6
1,208,903 UART: [ldev] SUBJECT.KEYID = 5
1,209,330 UART: [ldev] AUTHORITY.KEYID = 7
1,209,793 UART: [ldev] FE.KEYID = 1
1,215,153 UART: [ldev] Erasing FE.KEYID = 1
1,241,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,387 UART: [ldev] --
1,280,799 UART: [fwproc] Wait for Commands...
1,281,562 UART: [fwproc] Recv command 0x46574c44
1,282,295 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,639 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,948 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,652 >>> mbox cmd response: success
2,772,789 UART: [afmc] ++
2,772,957 UART: [afmc] CDI.KEYID = 6
2,773,320 UART: [afmc] SUBJECT.KEYID = 7
2,773,746 UART: [afmc] AUTHORITY.KEYID = 5
2,809,401 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,925 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,676 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,405 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,288 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,007 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,876 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,572 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
Truncated 104976 bytes from beginning
4
1,282,906 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,339 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,999 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,308 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,054 >>> mbox cmd response: success
2,774,319 UART: [afmc] ++
2,774,487 UART: [afmc] CDI.KEYID = 6
2,774,850 UART: [afmc] SUBJECT.KEYID = 7
2,775,276 UART: [afmc] AUTHORITY.KEYID = 5
2,810,811 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,397 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,148 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,861 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,770 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,484 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,235 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,414 UART: [state] LifecycleState = Unprovisioned
86,069 UART: [state] DebugLocked = No
86,805 UART: [state] WD Timer not started. Device not locked for debugging
87,980 UART: [kat] SHA2-256
891,530 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,659 UART: [kat] ++
895,811 UART: [kat] sha1
899,915 UART: [kat] SHA2-256
901,855 UART: [kat] SHA2-384
904,712 UART: [kat] SHA2-512-ACC
906,613 UART: [kat] ECC-384
916,094 UART: [kat] HMAC-384Kdf
920,572 UART: [kat] LMS
1,168,884 UART: [kat] --
1,169,867 UART: [cold-reset] ++
1,170,293 UART: [fht] FHT @ 0x50003400
1,173,041 UART: [idev] ++
1,173,209 UART: [idev] CDI.KEYID = 6
1,173,570 UART: [idev] SUBJECT.KEYID = 7
1,173,995 UART: [idev] UDS.KEYID = 0
1,181,897 UART: [idev] Erasing UDS.KEYID = 0
1,198,847 UART: [idev] Sha1 KeyId Algorithm
1,207,653 UART: [idev] --
1,208,540 UART: [ldev] ++
1,208,708 UART: [ldev] CDI.KEYID = 6
1,209,072 UART: [ldev] SUBJECT.KEYID = 5
1,209,499 UART: [ldev] AUTHORITY.KEYID = 7
1,209,962 UART: [ldev] FE.KEYID = 1
1,215,292 UART: [ldev] Erasing FE.KEYID = 1
1,241,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,850 UART: [ldev] --
1,281,240 UART: [fwproc] Wait for Commands...
1,281,815 UART: [fwproc] Recv command 0x46574c44
1,282,548 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,017 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,326 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,188 >>> mbox cmd response: success
2,774,367 UART: [afmc] ++
2,774,535 UART: [afmc] CDI.KEYID = 6
2,774,898 UART: [afmc] SUBJECT.KEYID = 7
2,775,324 UART: [afmc] AUTHORITY.KEYID = 5
2,810,027 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,567 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,318 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,031 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,940 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,654 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,383 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
891,246 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,375 UART: [kat] ++
895,527 UART: [kat] sha1
899,835 UART: [kat] SHA2-256
901,775 UART: [kat] SHA2-384
904,488 UART: [kat] SHA2-512-ACC
906,389 UART: [kat] ECC-384
916,012 UART: [kat] HMAC-384Kdf
920,496 UART: [kat] LMS
1,168,808 UART: [kat] --
1,169,745 UART: [cold-reset] ++
1,170,289 UART: [fht] FHT @ 0x50003400
1,172,819 UART: [idev] ++
1,172,987 UART: [idev] CDI.KEYID = 6
1,173,348 UART: [idev] SUBJECT.KEYID = 7
1,173,773 UART: [idev] UDS.KEYID = 0
1,181,339 UART: [idev] Erasing UDS.KEYID = 0
1,198,049 UART: [idev] Sha1 KeyId Algorithm
1,207,027 UART: [idev] --
1,207,998 UART: [ldev] ++
1,208,166 UART: [ldev] CDI.KEYID = 6
1,208,530 UART: [ldev] SUBJECT.KEYID = 5
1,208,957 UART: [ldev] AUTHORITY.KEYID = 7
1,209,420 UART: [ldev] FE.KEYID = 1
1,214,826 UART: [ldev] Erasing FE.KEYID = 1
1,240,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,316 UART: [ldev] --
1,279,752 UART: [fwproc] Wait for Commands...
1,280,377 UART: [fwproc] Recv command 0x46574c44
1,281,110 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,787 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,096 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,880 >>> mbox cmd response: success
2,772,017 UART: [afmc] ++
2,772,185 UART: [afmc] CDI.KEYID = 6
2,772,548 UART: [afmc] SUBJECT.KEYID = 7
2,772,974 UART: [afmc] AUTHORITY.KEYID = 5
2,808,963 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,064 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,777 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,686 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,400 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,249 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
891,058 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,187 UART: [kat] ++
895,339 UART: [kat] sha1
899,433 UART: [kat] SHA2-256
901,373 UART: [kat] SHA2-384
903,970 UART: [kat] SHA2-512-ACC
905,871 UART: [kat] ECC-384
915,656 UART: [kat] HMAC-384Kdf
920,304 UART: [kat] LMS
1,168,616 UART: [kat] --
1,169,621 UART: [cold-reset] ++
1,170,065 UART: [fht] FHT @ 0x50003400
1,172,745 UART: [idev] ++
1,172,913 UART: [idev] CDI.KEYID = 6
1,173,274 UART: [idev] SUBJECT.KEYID = 7
1,173,699 UART: [idev] UDS.KEYID = 0
1,181,417 UART: [idev] Erasing UDS.KEYID = 0
1,198,311 UART: [idev] Sha1 KeyId Algorithm
1,207,143 UART: [idev] --
1,208,372 UART: [ldev] ++
1,208,540 UART: [ldev] CDI.KEYID = 6
1,208,904 UART: [ldev] SUBJECT.KEYID = 5
1,209,331 UART: [ldev] AUTHORITY.KEYID = 7
1,209,794 UART: [ldev] FE.KEYID = 1
1,215,078 UART: [ldev] Erasing FE.KEYID = 1
1,240,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,852 UART: [ldev] --
1,279,126 UART: [fwproc] Wait for Commands...
1,279,929 UART: [fwproc] Recv command 0x46574c44
1,280,662 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,165 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,474 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,202 >>> mbox cmd response: success
2,771,241 UART: [afmc] ++
2,771,409 UART: [afmc] CDI.KEYID = 6
2,771,772 UART: [afmc] SUBJECT.KEYID = 7
2,772,198 UART: [afmc] AUTHORITY.KEYID = 5
2,807,547 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,945 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,696 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,409 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,318 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,032 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,849,969 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 33.30s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,948 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,619,968 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,046 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,482 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,266 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,916 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,454 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,558 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,618,738 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,086 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,650 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,082 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,114 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,962 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,032 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,028 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,996 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,912 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,619,258 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,448 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,508 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 31.95s
Truncated 104976 bytes from beginning
4
1,282,677 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,374 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,683 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,427 >>> mbox cmd response: success
2,772,464 UART: [afmc] ++
2,772,632 UART: [afmc] CDI.KEYID = 6
2,772,995 UART: [afmc] SUBJECT.KEYID = 7
2,773,421 UART: [afmc] AUTHORITY.KEYID = 5
2,808,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,372 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,123 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,836 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,745 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,459 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,392 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
891,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,706 UART: [kat] ++
895,858 UART: [kat] sha1
900,078 UART: [kat] SHA2-256
902,018 UART: [kat] SHA2-384
904,797 UART: [kat] SHA2-512-ACC
906,698 UART: [kat] ECC-384
916,393 UART: [kat] HMAC-384Kdf
921,003 UART: [kat] LMS
1,169,315 UART: [kat] --
1,170,346 UART: [cold-reset] ++
1,170,704 UART: [fht] FHT @ 0x50003400
1,173,184 UART: [idev] ++
1,173,352 UART: [idev] CDI.KEYID = 6
1,173,713 UART: [idev] SUBJECT.KEYID = 7
1,174,138 UART: [idev] UDS.KEYID = 0
1,181,858 UART: [idev] Erasing UDS.KEYID = 0
1,199,434 UART: [idev] Sha1 KeyId Algorithm
1,208,350 UART: [idev] --
1,209,515 UART: [ldev] ++
1,209,683 UART: [ldev] CDI.KEYID = 6
1,210,047 UART: [ldev] SUBJECT.KEYID = 5
1,210,474 UART: [ldev] AUTHORITY.KEYID = 7
1,210,937 UART: [ldev] FE.KEYID = 1
1,216,357 UART: [ldev] Erasing FE.KEYID = 1
1,243,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,585 UART: [ldev] --
1,283,005 UART: [fwproc] Wait for Commands...
1,283,786 UART: [fwproc] Recv command 0x46574c44
1,284,519 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,940 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,249 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,953 >>> mbox cmd response: success
2,775,060 UART: [afmc] ++
2,775,228 UART: [afmc] CDI.KEYID = 6
2,775,591 UART: [afmc] SUBJECT.KEYID = 7
2,776,017 UART: [afmc] AUTHORITY.KEYID = 5
2,811,074 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,720 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,471 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,184 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,093 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,807 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,574 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
88,015 UART: [kat] SHA2-256
891,565 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,694 UART: [kat] ++
895,846 UART: [kat] sha1
900,150 UART: [kat] SHA2-256
902,090 UART: [kat] SHA2-384
904,867 UART: [kat] SHA2-512-ACC
906,768 UART: [kat] ECC-384
916,653 UART: [kat] HMAC-384Kdf
921,205 UART: [kat] LMS
1,169,517 UART: [kat] --
1,170,458 UART: [cold-reset] ++
1,170,956 UART: [fht] FHT @ 0x50003400
1,173,470 UART: [idev] ++
1,173,638 UART: [idev] CDI.KEYID = 6
1,173,999 UART: [idev] SUBJECT.KEYID = 7
1,174,424 UART: [idev] UDS.KEYID = 0
1,182,654 UART: [idev] Erasing UDS.KEYID = 0
1,199,724 UART: [idev] Sha1 KeyId Algorithm
1,208,398 UART: [idev] --
1,209,375 UART: [ldev] ++
1,209,543 UART: [ldev] CDI.KEYID = 6
1,209,907 UART: [ldev] SUBJECT.KEYID = 5
1,210,334 UART: [ldev] AUTHORITY.KEYID = 7
1,210,797 UART: [ldev] FE.KEYID = 1
1,215,933 UART: [ldev] Erasing FE.KEYID = 1
1,242,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,043 UART: [ldev] --
1,281,509 UART: [fwproc] Wait for Commands...
1,282,266 UART: [fwproc] Recv command 0x46574c44
1,282,999 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,728 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,037 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,943 >>> mbox cmd response: success
2,774,098 UART: [afmc] ++
2,774,266 UART: [afmc] CDI.KEYID = 6
2,774,629 UART: [afmc] SUBJECT.KEYID = 7
2,775,055 UART: [afmc] AUTHORITY.KEYID = 5
2,810,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,168 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,919 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,632 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,541 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,255 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,968 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
891,357 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,486 UART: [kat] ++
895,638 UART: [kat] sha1
899,840 UART: [kat] SHA2-256
901,780 UART: [kat] SHA2-384
904,547 UART: [kat] SHA2-512-ACC
906,448 UART: [kat] ECC-384
916,491 UART: [kat] HMAC-384Kdf
921,239 UART: [kat] LMS
1,169,551 UART: [kat] --
1,170,244 UART: [cold-reset] ++
1,170,576 UART: [fht] FHT @ 0x50003400
1,173,238 UART: [idev] ++
1,173,406 UART: [idev] CDI.KEYID = 6
1,173,767 UART: [idev] SUBJECT.KEYID = 7
1,174,192 UART: [idev] UDS.KEYID = 0
1,182,484 UART: [idev] Erasing UDS.KEYID = 0
1,199,636 UART: [idev] Sha1 KeyId Algorithm
1,208,536 UART: [idev] --
1,209,423 UART: [ldev] ++
1,209,591 UART: [ldev] CDI.KEYID = 6
1,209,955 UART: [ldev] SUBJECT.KEYID = 5
1,210,382 UART: [ldev] AUTHORITY.KEYID = 7
1,210,845 UART: [ldev] FE.KEYID = 1
1,216,293 UART: [ldev] Erasing FE.KEYID = 1
1,242,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,715 UART: [ldev] --
1,282,121 UART: [fwproc] Wait for Commands...
1,282,784 UART: [fwproc] Recv command 0x46574c44
1,283,517 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,046 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,674 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,983 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,811 >>> mbox cmd response: success
2,774,920 UART: [afmc] ++
2,775,088 UART: [afmc] CDI.KEYID = 6
2,775,451 UART: [afmc] SUBJECT.KEYID = 7
2,775,877 UART: [afmc] AUTHORITY.KEYID = 5
2,812,558 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,742 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,493 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,835,206 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,841,115 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,829 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,710 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 32.77s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,841 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,767 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,673 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,595 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,807 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,667 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,249 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,137 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,663 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,055 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,517 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,531 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,281 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,275 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,837 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,889 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,143 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,619,723 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,779 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,899 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,499 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 31.72s
Truncated 104976 bytes from beginning
4
1,282,832 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,825 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,134 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,936 >>> mbox cmd response: success
2,772,029 UART: [afmc] ++
2,772,197 UART: [afmc] CDI.KEYID = 6
2,772,560 UART: [afmc] SUBJECT.KEYID = 7
2,772,986 UART: [afmc] AUTHORITY.KEYID = 5
2,808,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,629 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,380 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,093 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,002 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,716 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,743 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
891,210 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,339 UART: [kat] ++
895,491 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,486 UART: [kat] SHA2-512-ACC
906,387 UART: [kat] ECC-384
915,846 UART: [kat] HMAC-384Kdf
920,452 UART: [kat] LMS
1,168,764 UART: [kat] --
1,169,391 UART: [cold-reset] ++
1,169,899 UART: [fht] FHT @ 0x50003400
1,172,691 UART: [idev] ++
1,172,859 UART: [idev] CDI.KEYID = 6
1,173,220 UART: [idev] SUBJECT.KEYID = 7
1,173,645 UART: [idev] UDS.KEYID = 0
1,181,949 UART: [idev] Erasing UDS.KEYID = 0
1,198,581 UART: [idev] Sha1 KeyId Algorithm
1,207,399 UART: [idev] --
1,208,306 UART: [ldev] ++
1,208,474 UART: [ldev] CDI.KEYID = 6
1,208,838 UART: [ldev] SUBJECT.KEYID = 5
1,209,265 UART: [ldev] AUTHORITY.KEYID = 7
1,209,728 UART: [ldev] FE.KEYID = 1
1,214,562 UART: [ldev] Erasing FE.KEYID = 1
1,240,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,270 UART: [ldev] --
1,279,686 UART: [fwproc] Wait for Commands...
1,280,379 UART: [fwproc] Recv command 0x46574c44
1,281,112 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,769,452 >>> mbox cmd response: success
2,770,477 UART: [afmc] ++
2,770,645 UART: [afmc] CDI.KEYID = 6
2,771,008 UART: [afmc] SUBJECT.KEYID = 7
2,771,434 UART: [afmc] AUTHORITY.KEYID = 5
2,806,861 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,239 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,990 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,829,703 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,835,612 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,841,326 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,849,303 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,978 UART: [kat] SHA2-256
891,528 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,657 UART: [kat] ++
895,809 UART: [kat] sha1
900,023 UART: [kat] SHA2-256
901,963 UART: [kat] SHA2-384
904,716 UART: [kat] SHA2-512-ACC
906,617 UART: [kat] ECC-384
916,358 UART: [kat] HMAC-384Kdf
920,990 UART: [kat] LMS
1,169,302 UART: [kat] --
1,170,321 UART: [cold-reset] ++
1,170,867 UART: [fht] FHT @ 0x50003400
1,173,511 UART: [idev] ++
1,173,679 UART: [idev] CDI.KEYID = 6
1,174,040 UART: [idev] SUBJECT.KEYID = 7
1,174,465 UART: [idev] UDS.KEYID = 0
1,182,525 UART: [idev] Erasing UDS.KEYID = 0
1,199,359 UART: [idev] Sha1 KeyId Algorithm
1,208,187 UART: [idev] --
1,209,246 UART: [ldev] ++
1,209,414 UART: [ldev] CDI.KEYID = 6
1,209,778 UART: [ldev] SUBJECT.KEYID = 5
1,210,205 UART: [ldev] AUTHORITY.KEYID = 7
1,210,668 UART: [ldev] FE.KEYID = 1
1,215,598 UART: [ldev] Erasing FE.KEYID = 1
1,241,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,312 UART: [ldev] --
1,280,814 UART: [fwproc] Wait for Commands...
1,281,445 UART: [fwproc] Recv command 0x46574c44
1,282,178 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,271 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,580 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,484 >>> mbox cmd response: success
2,772,629 UART: [afmc] ++
2,772,797 UART: [afmc] CDI.KEYID = 6
2,773,160 UART: [afmc] SUBJECT.KEYID = 7
2,773,586 UART: [afmc] AUTHORITY.KEYID = 5
2,808,877 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,846 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,559 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,468 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,182 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,897 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,492 UART: [kat] SHA2-256
891,042 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,171 UART: [kat] ++
895,323 UART: [kat] sha1
899,387 UART: [kat] SHA2-256
901,327 UART: [kat] SHA2-384
904,076 UART: [kat] SHA2-512-ACC
905,977 UART: [kat] ECC-384
915,534 UART: [kat] HMAC-384Kdf
920,082 UART: [kat] LMS
1,168,394 UART: [kat] --
1,169,495 UART: [cold-reset] ++
1,169,851 UART: [fht] FHT @ 0x50003400
1,172,487 UART: [idev] ++
1,172,655 UART: [idev] CDI.KEYID = 6
1,173,016 UART: [idev] SUBJECT.KEYID = 7
1,173,441 UART: [idev] UDS.KEYID = 0
1,181,299 UART: [idev] Erasing UDS.KEYID = 0
1,197,669 UART: [idev] Sha1 KeyId Algorithm
1,206,685 UART: [idev] --
1,207,760 UART: [ldev] ++
1,207,928 UART: [ldev] CDI.KEYID = 6
1,208,292 UART: [ldev] SUBJECT.KEYID = 5
1,208,719 UART: [ldev] AUTHORITY.KEYID = 7
1,209,182 UART: [ldev] FE.KEYID = 1
1,214,296 UART: [ldev] Erasing FE.KEYID = 1
1,240,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,990 UART: [ldev] --
1,279,400 UART: [fwproc] Wait for Commands...
1,280,191 UART: [fwproc] Recv command 0x46574c44
1,280,924 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,897 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,206 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,769,908 >>> mbox cmd response: success
2,771,023 UART: [afmc] ++
2,771,191 UART: [afmc] CDI.KEYID = 6
2,771,554 UART: [afmc] SUBJECT.KEYID = 7
2,771,980 UART: [afmc] AUTHORITY.KEYID = 5
2,807,293 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,500 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,213 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,122 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,841,836 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,849,717 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.57s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,298 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,328 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,408 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,662 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,619,944 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,704 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,606 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,778 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,544 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,786 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,516 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,944 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,578 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,294 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,464 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,720 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,370 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,546 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,684 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,084 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,480 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.70s
Truncated 104976 bytes from beginning
4
1,283,439 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,254 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,520 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,829 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,659 >>> mbox cmd response: success
2,774,880 UART: [afmc] ++
2,775,048 UART: [afmc] CDI.KEYID = 6
2,775,411 UART: [afmc] SUBJECT.KEYID = 7
2,775,837 UART: [afmc] AUTHORITY.KEYID = 5
2,811,258 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,882 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,633 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,346 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,255 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,969 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,828 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,189 UART: [state] LifecycleState = Unprovisioned
85,844 UART: [state] DebugLocked = No
86,354 UART: [state] WD Timer not started. Device not locked for debugging
87,509 UART: [kat] SHA2-256
891,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,188 UART: [kat] ++
895,340 UART: [kat] sha1
899,670 UART: [kat] SHA2-256
901,610 UART: [kat] SHA2-384
904,473 UART: [kat] SHA2-512-ACC
906,374 UART: [kat] ECC-384
916,041 UART: [kat] HMAC-384Kdf
920,613 UART: [kat] LMS
1,168,925 UART: [kat] --
1,169,728 UART: [cold-reset] ++
1,170,248 UART: [fht] FHT @ 0x50003400
1,172,812 UART: [idev] ++
1,172,980 UART: [idev] CDI.KEYID = 6
1,173,341 UART: [idev] SUBJECT.KEYID = 7
1,173,766 UART: [idev] UDS.KEYID = 0
1,181,512 UART: [idev] Erasing UDS.KEYID = 0
1,198,190 UART: [idev] Sha1 KeyId Algorithm
1,207,018 UART: [idev] --
1,208,245 UART: [ldev] ++
1,208,413 UART: [ldev] CDI.KEYID = 6
1,208,777 UART: [ldev] SUBJECT.KEYID = 5
1,209,204 UART: [ldev] AUTHORITY.KEYID = 7
1,209,667 UART: [ldev] FE.KEYID = 1
1,214,765 UART: [ldev] Erasing FE.KEYID = 1
1,240,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,791 UART: [ldev] --
1,280,269 UART: [fwproc] Wait for Commands...
1,280,992 UART: [fwproc] Recv command 0x46574c44
1,281,725 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,576 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,806 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,115 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,045 >>> mbox cmd response: success
2,772,240 UART: [afmc] ++
2,772,408 UART: [afmc] CDI.KEYID = 6
2,772,771 UART: [afmc] SUBJECT.KEYID = 7
2,773,197 UART: [afmc] AUTHORITY.KEYID = 5
2,808,506 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,824 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,575 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,288 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,197 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,911 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,588 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,458 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
891,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,322 UART: [kat] ++
895,474 UART: [kat] sha1
899,712 UART: [kat] SHA2-256
901,652 UART: [kat] SHA2-384
904,421 UART: [kat] SHA2-512-ACC
906,322 UART: [kat] ECC-384
916,485 UART: [kat] HMAC-384Kdf
921,101 UART: [kat] LMS
1,169,413 UART: [kat] --
1,170,236 UART: [cold-reset] ++
1,170,748 UART: [fht] FHT @ 0x50003400
1,173,340 UART: [idev] ++
1,173,508 UART: [idev] CDI.KEYID = 6
1,173,869 UART: [idev] SUBJECT.KEYID = 7
1,174,294 UART: [idev] UDS.KEYID = 0
1,182,814 UART: [idev] Erasing UDS.KEYID = 0
1,199,684 UART: [idev] Sha1 KeyId Algorithm
1,208,570 UART: [idev] --
1,209,461 UART: [ldev] ++
1,209,629 UART: [ldev] CDI.KEYID = 6
1,209,993 UART: [ldev] SUBJECT.KEYID = 5
1,210,420 UART: [ldev] AUTHORITY.KEYID = 7
1,210,883 UART: [ldev] FE.KEYID = 1
1,216,217 UART: [ldev] Erasing FE.KEYID = 1
1,242,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,249 UART: [ldev] --
1,281,689 UART: [fwproc] Wait for Commands...
1,282,386 UART: [fwproc] Recv command 0x46574c44
1,283,119 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,408 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,717 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,585 >>> mbox cmd response: success
2,773,642 UART: [afmc] ++
2,773,810 UART: [afmc] CDI.KEYID = 6
2,774,173 UART: [afmc] SUBJECT.KEYID = 7
2,774,599 UART: [afmc] AUTHORITY.KEYID = 5
2,809,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,568 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,319 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,032 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,941 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,655 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,432 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Unprovisioned
85,708 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,318 UART: [kat] ++
895,470 UART: [kat] sha1
899,530 UART: [kat] SHA2-256
901,470 UART: [kat] SHA2-384
904,183 UART: [kat] SHA2-512-ACC
906,084 UART: [kat] ECC-384
915,993 UART: [kat] HMAC-384Kdf
920,655 UART: [kat] LMS
1,168,967 UART: [kat] --
1,169,678 UART: [cold-reset] ++
1,170,256 UART: [fht] FHT @ 0x50003400
1,173,020 UART: [idev] ++
1,173,188 UART: [idev] CDI.KEYID = 6
1,173,549 UART: [idev] SUBJECT.KEYID = 7
1,173,974 UART: [idev] UDS.KEYID = 0
1,182,016 UART: [idev] Erasing UDS.KEYID = 0
1,199,090 UART: [idev] Sha1 KeyId Algorithm
1,207,884 UART: [idev] --
1,209,103 UART: [ldev] ++
1,209,271 UART: [ldev] CDI.KEYID = 6
1,209,635 UART: [ldev] SUBJECT.KEYID = 5
1,210,062 UART: [ldev] AUTHORITY.KEYID = 7
1,210,525 UART: [ldev] FE.KEYID = 1
1,215,467 UART: [ldev] Erasing FE.KEYID = 1
1,241,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,629 UART: [ldev] --
1,280,989 UART: [fwproc] Wait for Commands...
1,281,676 UART: [fwproc] Recv command 0x46574c44
1,282,409 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,976 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,285 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,043 >>> mbox cmd response: success
2,773,168 UART: [afmc] ++
2,773,336 UART: [afmc] CDI.KEYID = 6
2,773,699 UART: [afmc] SUBJECT.KEYID = 7
2,774,125 UART: [afmc] AUTHORITY.KEYID = 5
2,810,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,694 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,445 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,158 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,067 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,781 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,462 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 31.07s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,581 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,129 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,103 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,487 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,961 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,263 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,169 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,547 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,459 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,195 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,899 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,125 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,503 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,445 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,575 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,245 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,355 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,495 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,925 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,305 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,449 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.90s
Truncated 104976 bytes from beginning
4
1,282,316 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,571 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,019 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,328 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,044 >>> mbox cmd response: success
2,774,169 UART: [afmc] ++
2,774,337 UART: [afmc] CDI.KEYID = 6
2,774,700 UART: [afmc] SUBJECT.KEYID = 7
2,775,126 UART: [afmc] AUTHORITY.KEYID = 5
2,810,911 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,688 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,401 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,310 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,024 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,005 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
891,318 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,447 UART: [kat] ++
895,599 UART: [kat] sha1
899,803 UART: [kat] SHA2-256
901,743 UART: [kat] SHA2-384
904,336 UART: [kat] SHA2-512-ACC
906,237 UART: [kat] ECC-384
915,842 UART: [kat] HMAC-384Kdf
920,388 UART: [kat] LMS
1,168,700 UART: [kat] --
1,169,539 UART: [cold-reset] ++
1,170,027 UART: [fht] FHT @ 0x50003400
1,172,693 UART: [idev] ++
1,172,861 UART: [idev] CDI.KEYID = 6
1,173,222 UART: [idev] SUBJECT.KEYID = 7
1,173,647 UART: [idev] UDS.KEYID = 0
1,181,317 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,125 UART: [idev] --
1,208,136 UART: [ldev] ++
1,208,304 UART: [ldev] CDI.KEYID = 6
1,208,668 UART: [ldev] SUBJECT.KEYID = 5
1,209,095 UART: [ldev] AUTHORITY.KEYID = 7
1,209,558 UART: [ldev] FE.KEYID = 1
1,215,090 UART: [ldev] Erasing FE.KEYID = 1
1,241,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,680 UART: [ldev] --
1,279,992 UART: [fwproc] Wait for Commands...
1,280,691 UART: [fwproc] Recv command 0x46574c44
1,281,424 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,629 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,938 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,866 >>> mbox cmd response: success
2,772,069 UART: [afmc] ++
2,772,237 UART: [afmc] CDI.KEYID = 6
2,772,600 UART: [afmc] SUBJECT.KEYID = 7
2,773,026 UART: [afmc] AUTHORITY.KEYID = 5
2,807,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,079 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,830 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,543 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,452 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,166 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,089 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,141 UART: [kat] ++
895,293 UART: [kat] sha1
899,367 UART: [kat] SHA2-256
901,307 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
915,936 UART: [kat] HMAC-384Kdf
920,570 UART: [kat] LMS
1,168,882 UART: [kat] --
1,169,755 UART: [cold-reset] ++
1,170,111 UART: [fht] FHT @ 0x50003400
1,172,781 UART: [idev] ++
1,172,949 UART: [idev] CDI.KEYID = 6
1,173,310 UART: [idev] SUBJECT.KEYID = 7
1,173,735 UART: [idev] UDS.KEYID = 0
1,181,763 UART: [idev] Erasing UDS.KEYID = 0
1,198,901 UART: [idev] Sha1 KeyId Algorithm
1,207,761 UART: [idev] --
1,208,762 UART: [ldev] ++
1,208,930 UART: [ldev] CDI.KEYID = 6
1,209,294 UART: [ldev] SUBJECT.KEYID = 5
1,209,721 UART: [ldev] AUTHORITY.KEYID = 7
1,210,184 UART: [ldev] FE.KEYID = 1
1,215,466 UART: [ldev] Erasing FE.KEYID = 1
1,241,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,072 UART: [ldev] --
1,280,468 UART: [fwproc] Wait for Commands...
1,281,259 UART: [fwproc] Recv command 0x46574c44
1,281,992 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,289 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,598 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,530 >>> mbox cmd response: success
2,771,791 UART: [afmc] ++
2,771,959 UART: [afmc] CDI.KEYID = 6
2,772,322 UART: [afmc] SUBJECT.KEYID = 7
2,772,748 UART: [afmc] AUTHORITY.KEYID = 5
2,808,105 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,521 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,272 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,985 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,894 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,608 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,345 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,856 UART: [state] LifecycleState = Unprovisioned
85,511 UART: [state] DebugLocked = No
86,009 UART: [state] WD Timer not started. Device not locked for debugging
87,166 UART: [kat] SHA2-256
890,716 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,845 UART: [kat] ++
894,997 UART: [kat] sha1
899,315 UART: [kat] SHA2-256
901,255 UART: [kat] SHA2-384
904,000 UART: [kat] SHA2-512-ACC
905,901 UART: [kat] ECC-384
915,648 UART: [kat] HMAC-384Kdf
920,300 UART: [kat] LMS
1,168,612 UART: [kat] --
1,169,223 UART: [cold-reset] ++
1,169,607 UART: [fht] FHT @ 0x50003400
1,172,167 UART: [idev] ++
1,172,335 UART: [idev] CDI.KEYID = 6
1,172,696 UART: [idev] SUBJECT.KEYID = 7
1,173,121 UART: [idev] UDS.KEYID = 0
1,181,311 UART: [idev] Erasing UDS.KEYID = 0
1,197,569 UART: [idev] Sha1 KeyId Algorithm
1,206,657 UART: [idev] --
1,207,740 UART: [ldev] ++
1,207,908 UART: [ldev] CDI.KEYID = 6
1,208,272 UART: [ldev] SUBJECT.KEYID = 5
1,208,699 UART: [ldev] AUTHORITY.KEYID = 7
1,209,162 UART: [ldev] FE.KEYID = 1
1,214,422 UART: [ldev] Erasing FE.KEYID = 1
1,241,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,528 UART: [ldev] --
1,280,906 UART: [fwproc] Wait for Commands...
1,281,559 UART: [fwproc] Recv command 0x46574c44
1,282,292 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,375 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,684 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,580 >>> mbox cmd response: success
2,773,831 UART: [afmc] ++
2,773,999 UART: [afmc] CDI.KEYID = 6
2,774,362 UART: [afmc] SUBJECT.KEYID = 7
2,774,788 UART: [afmc] AUTHORITY.KEYID = 5
2,810,533 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,163 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,914 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,627 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,536 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,250 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,971 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 31.81s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,130 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,812 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,302 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,980 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,452 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,619,852 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,044 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,056 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,860 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,878 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,402 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,272 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,166 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,688 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,869 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,674 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,636 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,696 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,804 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,298 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,936 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.40s
Truncated 104976 bytes from beginning
4
1,284,445 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,754 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,063 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,905 >>> mbox cmd response: success
2,776,054 UART: [afmc] ++
2,776,222 UART: [afmc] CDI.KEYID = 6
2,776,585 UART: [afmc] SUBJECT.KEYID = 7
2,777,011 UART: [afmc] AUTHORITY.KEYID = 5
2,812,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,382 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,133 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,835,846 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,841,755 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,847,469 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,855,452 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,983 UART: [state] LifecycleState = Unprovisioned
85,638 UART: [state] DebugLocked = No
86,176 UART: [state] WD Timer not started. Device not locked for debugging
87,519 UART: [kat] SHA2-256
891,069 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,198 UART: [kat] ++
895,350 UART: [kat] sha1
899,766 UART: [kat] SHA2-256
901,706 UART: [kat] SHA2-384
904,591 UART: [kat] SHA2-512-ACC
906,492 UART: [kat] ECC-384
916,685 UART: [kat] HMAC-384Kdf
921,241 UART: [kat] LMS
1,169,553 UART: [kat] --
1,170,284 UART: [cold-reset] ++
1,170,862 UART: [fht] FHT @ 0x50003400
1,173,670 UART: [idev] ++
1,173,838 UART: [idev] CDI.KEYID = 6
1,174,199 UART: [idev] SUBJECT.KEYID = 7
1,174,624 UART: [idev] UDS.KEYID = 0
1,182,752 UART: [idev] Erasing UDS.KEYID = 0
1,199,758 UART: [idev] Sha1 KeyId Algorithm
1,208,804 UART: [idev] --
1,210,013 UART: [ldev] ++
1,210,181 UART: [ldev] CDI.KEYID = 6
1,210,545 UART: [ldev] SUBJECT.KEYID = 5
1,210,972 UART: [ldev] AUTHORITY.KEYID = 7
1,211,435 UART: [ldev] FE.KEYID = 1
1,216,609 UART: [ldev] Erasing FE.KEYID = 1
1,242,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,941 UART: [ldev] --
1,282,247 UART: [fwproc] Wait for Commands...
1,282,886 UART: [fwproc] Recv command 0x46574c44
1,283,619 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,458 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,384 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,693 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,447 >>> mbox cmd response: success
2,775,662 UART: [afmc] ++
2,775,830 UART: [afmc] CDI.KEYID = 6
2,776,193 UART: [afmc] SUBJECT.KEYID = 7
2,776,619 UART: [afmc] AUTHORITY.KEYID = 5
2,812,048 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,744 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,495 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,835,208 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,841,117 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,831 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,682 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
87,997 UART: [kat] SHA2-256
891,547 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,676 UART: [kat] ++
895,828 UART: [kat] sha1
900,056 UART: [kat] SHA2-256
901,996 UART: [kat] SHA2-384
904,743 UART: [kat] SHA2-512-ACC
906,644 UART: [kat] ECC-384
916,329 UART: [kat] HMAC-384Kdf
920,823 UART: [kat] LMS
1,169,135 UART: [kat] --
1,170,004 UART: [cold-reset] ++
1,170,444 UART: [fht] FHT @ 0x50003400
1,173,164 UART: [idev] ++
1,173,332 UART: [idev] CDI.KEYID = 6
1,173,693 UART: [idev] SUBJECT.KEYID = 7
1,174,118 UART: [idev] UDS.KEYID = 0
1,182,252 UART: [idev] Erasing UDS.KEYID = 0
1,199,390 UART: [idev] Sha1 KeyId Algorithm
1,208,258 UART: [idev] --
1,209,531 UART: [ldev] ++
1,209,699 UART: [ldev] CDI.KEYID = 6
1,210,063 UART: [ldev] SUBJECT.KEYID = 5
1,210,490 UART: [ldev] AUTHORITY.KEYID = 7
1,210,953 UART: [ldev] FE.KEYID = 1
1,216,255 UART: [ldev] Erasing FE.KEYID = 1
1,242,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,883 UART: [ldev] --
1,282,311 UART: [fwproc] Wait for Commands...
1,283,066 UART: [fwproc] Recv command 0x46574c44
1,283,799 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,358 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,667 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,369 >>> mbox cmd response: success
2,774,624 UART: [afmc] ++
2,774,792 UART: [afmc] CDI.KEYID = 6
2,775,155 UART: [afmc] SUBJECT.KEYID = 7
2,775,581 UART: [afmc] AUTHORITY.KEYID = 5
2,811,400 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,277 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,990 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,899 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,613 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,454 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
891,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,544 UART: [kat] ++
895,696 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,563 UART: [kat] SHA2-512-ACC
906,464 UART: [kat] ECC-384
916,405 UART: [kat] HMAC-384Kdf
921,011 UART: [kat] LMS
1,169,323 UART: [kat] --
1,170,008 UART: [cold-reset] ++
1,170,588 UART: [fht] FHT @ 0x50003400
1,173,434 UART: [idev] ++
1,173,602 UART: [idev] CDI.KEYID = 6
1,173,963 UART: [idev] SUBJECT.KEYID = 7
1,174,388 UART: [idev] UDS.KEYID = 0
1,182,436 UART: [idev] Erasing UDS.KEYID = 0
1,199,844 UART: [idev] Sha1 KeyId Algorithm
1,208,576 UART: [idev] --
1,209,607 UART: [ldev] ++
1,209,775 UART: [ldev] CDI.KEYID = 6
1,210,139 UART: [ldev] SUBJECT.KEYID = 5
1,210,566 UART: [ldev] AUTHORITY.KEYID = 7
1,211,029 UART: [ldev] FE.KEYID = 1
1,216,181 UART: [ldev] Erasing FE.KEYID = 1
1,242,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,351 UART: [ldev] --
1,281,833 UART: [fwproc] Wait for Commands...
1,282,608 UART: [fwproc] Recv command 0x46574c44
1,283,341 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,872 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,181 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,967 >>> mbox cmd response: success
2,773,184 UART: [afmc] ++
2,773,352 UART: [afmc] CDI.KEYID = 6
2,773,715 UART: [afmc] SUBJECT.KEYID = 7
2,774,141 UART: [afmc] AUTHORITY.KEYID = 5
2,809,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,060 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,811 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,524 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,433 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,147 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,856 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.95s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,281 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,073 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,037 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,923 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,855 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,571 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,037 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,299 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,403 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,855 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,801 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,933 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,167 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,777 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,087 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,209 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,843 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,941 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,351 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,391 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,577 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,845 UART: [kat] SHA2-256
901,785 UART: [kat] SHA2-384
904,566 UART: [kat] SHA2-512-ACC
906,467 UART: [kat] ECC-384
915,854 UART: [kat] HMAC-384Kdf
920,398 UART: [kat] LMS
1,168,710 UART: [kat] --
1,169,705 UART: [cold-reset] ++
1,170,147 UART: [fht] FHT @ 0x50003400
1,172,721 UART: [idev] ++
1,172,889 UART: [idev] CDI.KEYID = 6
1,173,250 UART: [idev] SUBJECT.KEYID = 7
1,173,675 UART: [idev] UDS.KEYID = 0
1,181,539 UART: [idev] Erasing UDS.KEYID = 0
1,198,647 UART: [idev] Sha1 KeyId Algorithm
1,207,705 UART: [idev] --
1,208,770 UART: [ldev] ++
1,208,938 UART: [ldev] CDI.KEYID = 6
1,209,302 UART: [ldev] SUBJECT.KEYID = 5
1,209,729 UART: [ldev] AUTHORITY.KEYID = 7
1,210,192 UART: [ldev] FE.KEYID = 1
1,215,456 UART: [ldev] Erasing FE.KEYID = 1
1,241,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,940 UART: [ldev] --
1,281,358 UART: [fwproc] Wait for Commands...
1,281,965 UART: [fwproc] Recv command 0x46574c44
1,282,698 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,782 UART: ROM Fatal Error: 0x000B0032
1,309,939 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,034 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
891,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
900,004 UART: [kat] SHA2-256
901,944 UART: [kat] SHA2-384
904,741 UART: [kat] SHA2-512-ACC
906,642 UART: [kat] ECC-384
916,155 UART: [kat] HMAC-384Kdf
920,703 UART: [kat] LMS
1,169,015 UART: [kat] --
1,169,788 UART: [cold-reset] ++
1,170,222 UART: [fht] FHT @ 0x50003400
1,173,054 UART: [idev] ++
1,173,222 UART: [idev] CDI.KEYID = 6
1,173,583 UART: [idev] SUBJECT.KEYID = 7
1,174,008 UART: [idev] UDS.KEYID = 0
1,181,590 UART: [idev] Erasing UDS.KEYID = 0
1,198,618 UART: [idev] Sha1 KeyId Algorithm
1,207,406 UART: [idev] --
1,208,565 UART: [ldev] ++
1,208,733 UART: [ldev] CDI.KEYID = 6
1,209,097 UART: [ldev] SUBJECT.KEYID = 5
1,209,524 UART: [ldev] AUTHORITY.KEYID = 7
1,209,987 UART: [ldev] FE.KEYID = 1
1,215,129 UART: [ldev] Erasing FE.KEYID = 1
1,241,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,873 UART: [ldev] --
1,280,371 UART: [fwproc] Wait for Commands...
1,281,110 UART: [fwproc] Recv command 0x46574c44
1,281,843 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,707 UART: ROM Fatal Error: 0x000B0032
1,308,864 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,579 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
891,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,293 UART: [kat] ++
895,445 UART: [kat] sha1
899,615 UART: [kat] SHA2-256
901,555 UART: [kat] SHA2-384
904,346 UART: [kat] SHA2-512-ACC
906,247 UART: [kat] ECC-384
916,166 UART: [kat] HMAC-384Kdf
920,726 UART: [kat] LMS
1,169,038 UART: [kat] --
1,170,067 UART: [cold-reset] ++
1,170,409 UART: [fht] FHT @ 0x50003400
1,173,081 UART: [idev] ++
1,173,249 UART: [idev] CDI.KEYID = 6
1,173,610 UART: [idev] SUBJECT.KEYID = 7
1,174,035 UART: [idev] UDS.KEYID = 0
1,181,965 UART: [idev] Erasing UDS.KEYID = 0
1,198,871 UART: [idev] Sha1 KeyId Algorithm
1,207,645 UART: [idev] --
1,208,780 UART: [ldev] ++
1,208,948 UART: [ldev] CDI.KEYID = 6
1,209,312 UART: [ldev] SUBJECT.KEYID = 5
1,209,739 UART: [ldev] AUTHORITY.KEYID = 7
1,210,202 UART: [ldev] FE.KEYID = 1
1,215,424 UART: [ldev] Erasing FE.KEYID = 1
1,241,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,652 UART: [ldev] --
1,281,014 UART: [fwproc] Wait for Commands...
1,281,615 UART: [fwproc] Recv command 0x46574c44
1,282,348 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,284 UART: ROM Fatal Error: 0x000B0032
1,309,441 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,178 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
87,635 UART: [kat] SHA2-256
891,185 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,314 UART: [kat] ++
895,466 UART: [kat] sha1
899,540 UART: [kat] SHA2-256
901,480 UART: [kat] SHA2-384
904,239 UART: [kat] SHA2-512-ACC
906,140 UART: [kat] ECC-384
915,989 UART: [kat] HMAC-384Kdf
920,635 UART: [kat] LMS
1,168,947 UART: [kat] --
1,169,566 UART: [cold-reset] ++
1,170,026 UART: [fht] FHT @ 0x50003400
1,172,572 UART: [idev] ++
1,172,740 UART: [idev] CDI.KEYID = 6
1,173,101 UART: [idev] SUBJECT.KEYID = 7
1,173,526 UART: [idev] UDS.KEYID = 0
1,181,790 UART: [idev] Erasing UDS.KEYID = 0
1,198,544 UART: [idev] Sha1 KeyId Algorithm
1,207,414 UART: [idev] --
1,208,347 UART: [ldev] ++
1,208,515 UART: [ldev] CDI.KEYID = 6
1,208,879 UART: [ldev] SUBJECT.KEYID = 5
1,209,306 UART: [ldev] AUTHORITY.KEYID = 7
1,209,769 UART: [ldev] FE.KEYID = 1
1,215,269 UART: [ldev] Erasing FE.KEYID = 1
1,241,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,113 UART: [ldev] --
1,281,409 UART: [fwproc] Wait for Commands...
1,281,994 UART: [fwproc] Recv command 0x46574c44
1,282,727 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,303 UART: ROM Fatal Error: 0x000B0032
1,309,460 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,555 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
891,068 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,197 UART: [kat] ++
895,349 UART: [kat] sha1
899,547 UART: [kat] SHA2-256
901,487 UART: [kat] SHA2-384
904,452 UART: [kat] SHA2-512-ACC
906,353 UART: [kat] ECC-384
915,952 UART: [kat] HMAC-384Kdf
920,596 UART: [kat] LMS
1,168,908 UART: [kat] --
1,170,115 UART: [cold-reset] ++
1,170,489 UART: [fht] FHT @ 0x50003400
1,173,123 UART: [idev] ++
1,173,291 UART: [idev] CDI.KEYID = 6
1,173,652 UART: [idev] SUBJECT.KEYID = 7
1,174,077 UART: [idev] UDS.KEYID = 0
1,182,001 UART: [idev] Erasing UDS.KEYID = 0
1,198,201 UART: [idev] Sha1 KeyId Algorithm
1,206,901 UART: [idev] --
1,207,960 UART: [ldev] ++
1,208,128 UART: [ldev] CDI.KEYID = 6
1,208,492 UART: [ldev] SUBJECT.KEYID = 5
1,208,919 UART: [ldev] AUTHORITY.KEYID = 7
1,209,382 UART: [ldev] FE.KEYID = 1
1,214,640 UART: [ldev] Erasing FE.KEYID = 1
1,240,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,526 UART: [ldev] --
1,280,014 UART: [fwproc] Wait for Commands...
1,280,641 UART: [fwproc] Recv command 0x46574c44
1,281,374 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,644 UART: ROM Fatal Error: 0x000B0032
1,307,801 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,642 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,332 UART: [state] WD Timer not started. Device not locked for debugging
87,471 UART: [kat] SHA2-256
891,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,150 UART: [kat] ++
895,302 UART: [kat] sha1
899,598 UART: [kat] SHA2-256
901,538 UART: [kat] SHA2-384
904,475 UART: [kat] SHA2-512-ACC
906,376 UART: [kat] ECC-384
916,373 UART: [kat] HMAC-384Kdf
921,249 UART: [kat] LMS
1,169,561 UART: [kat] --
1,170,324 UART: [cold-reset] ++
1,170,718 UART: [fht] FHT @ 0x50003400
1,173,174 UART: [idev] ++
1,173,342 UART: [idev] CDI.KEYID = 6
1,173,703 UART: [idev] SUBJECT.KEYID = 7
1,174,128 UART: [idev] UDS.KEYID = 0
1,182,210 UART: [idev] Erasing UDS.KEYID = 0
1,199,360 UART: [idev] Sha1 KeyId Algorithm
1,208,204 UART: [idev] --
1,209,121 UART: [ldev] ++
1,209,289 UART: [ldev] CDI.KEYID = 6
1,209,653 UART: [ldev] SUBJECT.KEYID = 5
1,210,080 UART: [ldev] AUTHORITY.KEYID = 7
1,210,543 UART: [ldev] FE.KEYID = 1
1,215,693 UART: [ldev] Erasing FE.KEYID = 1
1,242,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,819 UART: [ldev] --
1,281,221 UART: [fwproc] Wait for Commands...
1,281,900 UART: [fwproc] Recv command 0x46574c44
1,282,633 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,417 UART: ROM Fatal Error: 0x000B0032
1,309,574 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,863 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
Truncated 74764 bytes from beginning
1,271,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,000 UART: [ldev] --
1,280,436 UART: [fwproc] Wait for Commands...
1,281,031 UART: [fwproc] Recv command 0x46574c44
1,281,764 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,658 UART: ROM Fatal Error: 0x00B0003A
1,308,819 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,609 UART: [state] WD Timer not started. Device not locked for debugging
87,926 UART: [kat] SHA2-256
891,476 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,605 UART: [kat] ++
895,757 UART: [kat] sha1
900,147 UART: [kat] SHA2-256
902,087 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,498 UART: [kat] HMAC-384Kdf
921,076 UART: [kat] LMS
1,169,388 UART: [kat] --
1,170,089 UART: [cold-reset] ++
1,170,455 UART: [fht] FHT @ 0x50003400
1,172,993 UART: [idev] ++
1,173,161 UART: [idev] CDI.KEYID = 6
1,173,522 UART: [idev] SUBJECT.KEYID = 7
1,173,947 UART: [idev] UDS.KEYID = 0
1,182,027 UART: [idev] Erasing UDS.KEYID = 0
1,198,743 UART: [idev] Sha1 KeyId Algorithm
1,207,483 UART: [idev] --
1,208,502 UART: [ldev] ++
1,208,670 UART: [ldev] CDI.KEYID = 6
1,209,034 UART: [ldev] SUBJECT.KEYID = 5
1,209,461 UART: [ldev] AUTHORITY.KEYID = 7
1,209,924 UART: [ldev] FE.KEYID = 1
1,215,152 UART: [ldev] Erasing FE.KEYID = 1
1,241,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,862 UART: [ldev] --
1,280,210 UART: [fwproc] Wait for Commands...
1,280,953 UART: [fwproc] Recv command 0x46574c44
1,281,686 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,278 UART: ROM Fatal Error: 0x00B0003A
1,308,439 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
891,284 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,413 UART: [kat] ++
895,565 UART: [kat] sha1
899,651 UART: [kat] SHA2-256
901,591 UART: [kat] SHA2-384
904,288 UART: [kat] SHA2-512-ACC
906,189 UART: [kat] ECC-384
915,636 UART: [kat] HMAC-384Kdf
920,410 UART: [kat] LMS
1,168,722 UART: [kat] --
1,169,339 UART: [cold-reset] ++
1,169,747 UART: [fht] FHT @ 0x50003400
1,172,325 UART: [idev] ++
1,172,493 UART: [idev] CDI.KEYID = 6
1,172,854 UART: [idev] SUBJECT.KEYID = 7
1,173,279 UART: [idev] UDS.KEYID = 0
1,181,049 UART: [idev] Erasing UDS.KEYID = 0
1,198,425 UART: [idev] Sha1 KeyId Algorithm
1,207,345 UART: [idev] --
1,208,518 UART: [ldev] ++
1,208,686 UART: [ldev] CDI.KEYID = 6
1,209,050 UART: [ldev] SUBJECT.KEYID = 5
1,209,477 UART: [ldev] AUTHORITY.KEYID = 7
1,209,940 UART: [ldev] FE.KEYID = 1
1,215,050 UART: [ldev] Erasing FE.KEYID = 1
1,241,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,624 UART: [ldev] --
1,281,134 UART: [fwproc] Wait for Commands...
1,281,819 UART: [fwproc] Recv command 0x46574c44
1,282,552 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,576 UART: ROM Fatal Error: 0x00B0003A
1,309,737 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,892 UART: [kat] SHA2-256
891,442 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,571 UART: [kat] ++
895,723 UART: [kat] sha1
900,005 UART: [kat] SHA2-256
901,945 UART: [kat] SHA2-384
904,688 UART: [kat] SHA2-512-ACC
906,589 UART: [kat] ECC-384
916,480 UART: [kat] HMAC-384Kdf
921,106 UART: [kat] LMS
1,169,418 UART: [kat] --
1,170,351 UART: [cold-reset] ++
1,170,801 UART: [fht] FHT @ 0x50003400
1,173,631 UART: [idev] ++
1,173,799 UART: [idev] CDI.KEYID = 6
1,174,160 UART: [idev] SUBJECT.KEYID = 7
1,174,585 UART: [idev] UDS.KEYID = 0
1,182,617 UART: [idev] Erasing UDS.KEYID = 0
1,199,619 UART: [idev] Sha1 KeyId Algorithm
1,208,539 UART: [idev] --
1,209,582 UART: [ldev] ++
1,209,750 UART: [ldev] CDI.KEYID = 6
1,210,114 UART: [ldev] SUBJECT.KEYID = 5
1,210,541 UART: [ldev] AUTHORITY.KEYID = 7
1,211,004 UART: [ldev] FE.KEYID = 1
1,216,234 UART: [ldev] Erasing FE.KEYID = 1
1,242,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,620 UART: [ldev] --
1,281,904 UART: [fwproc] Wait for Commands...
1,282,703 UART: [fwproc] Recv command 0x46574c44
1,283,436 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,616 UART: ROM Fatal Error: 0x00B0003A
1,309,777 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,623 UART: [state] WD Timer not started. Device not locked for debugging
87,958 UART: [kat] SHA2-256
891,508 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,637 UART: [kat] ++
895,789 UART: [kat] sha1
899,975 UART: [kat] SHA2-256
901,915 UART: [kat] SHA2-384
904,694 UART: [kat] SHA2-512-ACC
906,595 UART: [kat] ECC-384
916,676 UART: [kat] HMAC-384Kdf
921,302 UART: [kat] LMS
1,169,614 UART: [kat] --
1,170,657 UART: [cold-reset] ++
1,171,055 UART: [fht] FHT @ 0x50003400
1,173,611 UART: [idev] ++
1,173,779 UART: [idev] CDI.KEYID = 6
1,174,140 UART: [idev] SUBJECT.KEYID = 7
1,174,565 UART: [idev] UDS.KEYID = 0
1,182,361 UART: [idev] Erasing UDS.KEYID = 0
1,199,371 UART: [idev] Sha1 KeyId Algorithm
1,208,297 UART: [idev] --
1,209,338 UART: [ldev] ++
1,209,506 UART: [ldev] CDI.KEYID = 6
1,209,870 UART: [ldev] SUBJECT.KEYID = 5
1,210,297 UART: [ldev] AUTHORITY.KEYID = 7
1,210,760 UART: [ldev] FE.KEYID = 1
1,216,008 UART: [ldev] Erasing FE.KEYID = 1
1,242,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,300 UART: [ldev] --
1,281,648 UART: [fwproc] Wait for Commands...
1,282,261 UART: [fwproc] Recv command 0x46574c44
1,282,994 UART: [fwproc] Recv'd Img size: 114332 bytes
3,118,968 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,148,110 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,419 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,313,121 >>> mbox cmd response: success
3,314,224 UART: [afmc] ++
3,314,392 UART: [afmc] CDI.KEYID = 6
3,314,755 UART: [afmc] SUBJECT.KEYID = 7
3,315,181 UART: [afmc] AUTHORITY.KEYID = 5
3,350,737 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,187 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,938 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,373,646 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,379,531 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,385,233 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,392,917 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 19.35s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,256 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,270 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,896 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,146 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,536 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,688 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,642 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,652 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,560 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,404 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,556 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,872 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,860 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,174 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,272 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,042 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,760 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,504 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,171,350 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 18.12s
Truncated 74764 bytes from beginning
1,274,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,541 UART: [ldev] --
1,282,837 UART: [fwproc] Wait for Commands...
1,283,434 UART: [fwproc] Recv command 0x46574c44
1,284,167 UART: [fwproc] Recv'd Img size: 114332 bytes
1,310,037 UART: ROM Fatal Error: 0x00B0003A
1,311,198 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,630 UART: [kat] ++
895,782 UART: [kat] sha1
899,946 UART: [kat] SHA2-256
901,886 UART: [kat] SHA2-384
904,853 UART: [kat] SHA2-512-ACC
906,754 UART: [kat] ECC-384
916,779 UART: [kat] HMAC-384Kdf
921,407 UART: [kat] LMS
1,169,719 UART: [kat] --
1,170,702 UART: [cold-reset] ++
1,171,214 UART: [fht] FHT @ 0x50003400
1,174,050 UART: [idev] ++
1,174,218 UART: [idev] CDI.KEYID = 6
1,174,579 UART: [idev] SUBJECT.KEYID = 7
1,175,004 UART: [idev] UDS.KEYID = 0
1,182,882 UART: [idev] Erasing UDS.KEYID = 0
1,199,818 UART: [idev] Sha1 KeyId Algorithm
1,208,740 UART: [idev] --
1,209,815 UART: [ldev] ++
1,209,983 UART: [ldev] CDI.KEYID = 6
1,210,347 UART: [ldev] SUBJECT.KEYID = 5
1,210,774 UART: [ldev] AUTHORITY.KEYID = 7
1,211,237 UART: [ldev] FE.KEYID = 1
1,216,559 UART: [ldev] Erasing FE.KEYID = 1
1,243,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,435 UART: [ldev] --
1,282,771 UART: [fwproc] Wait for Commands...
1,283,470 UART: [fwproc] Recv command 0x46574c44
1,284,203 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,365 UART: ROM Fatal Error: 0x00B0003A
1,310,526 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
891,571 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,700 UART: [kat] ++
895,852 UART: [kat] sha1
900,234 UART: [kat] SHA2-256
902,174 UART: [kat] SHA2-384
904,931 UART: [kat] SHA2-512-ACC
906,832 UART: [kat] ECC-384
916,733 UART: [kat] HMAC-384Kdf
921,379 UART: [kat] LMS
1,169,691 UART: [kat] --
1,170,638 UART: [cold-reset] ++
1,171,182 UART: [fht] FHT @ 0x50003400
1,173,814 UART: [idev] ++
1,173,982 UART: [idev] CDI.KEYID = 6
1,174,343 UART: [idev] SUBJECT.KEYID = 7
1,174,768 UART: [idev] UDS.KEYID = 0
1,182,728 UART: [idev] Erasing UDS.KEYID = 0
1,199,586 UART: [idev] Sha1 KeyId Algorithm
1,208,452 UART: [idev] --
1,209,617 UART: [ldev] ++
1,209,785 UART: [ldev] CDI.KEYID = 6
1,210,149 UART: [ldev] SUBJECT.KEYID = 5
1,210,576 UART: [ldev] AUTHORITY.KEYID = 7
1,211,039 UART: [ldev] FE.KEYID = 1
1,216,371 UART: [ldev] Erasing FE.KEYID = 1
1,242,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,231 UART: [ldev] --
1,282,737 UART: [fwproc] Wait for Commands...
1,283,438 UART: [fwproc] Recv command 0x46574c44
1,284,171 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,779 UART: ROM Fatal Error: 0x00B0003A
1,310,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
891,265 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,796 UART: [kat] SHA2-256
901,736 UART: [kat] SHA2-384
904,255 UART: [kat] SHA2-512-ACC
906,156 UART: [kat] ECC-384
916,035 UART: [kat] HMAC-384Kdf
920,753 UART: [kat] LMS
1,169,065 UART: [kat] --
1,170,068 UART: [cold-reset] ++
1,170,522 UART: [fht] FHT @ 0x50003400
1,173,084 UART: [idev] ++
1,173,252 UART: [idev] CDI.KEYID = 6
1,173,613 UART: [idev] SUBJECT.KEYID = 7
1,174,038 UART: [idev] UDS.KEYID = 0
1,182,314 UART: [idev] Erasing UDS.KEYID = 0
1,199,754 UART: [idev] Sha1 KeyId Algorithm
1,208,460 UART: [idev] --
1,209,649 UART: [ldev] ++
1,209,817 UART: [ldev] CDI.KEYID = 6
1,210,181 UART: [ldev] SUBJECT.KEYID = 5
1,210,608 UART: [ldev] AUTHORITY.KEYID = 7
1,211,071 UART: [ldev] FE.KEYID = 1
1,216,373 UART: [ldev] Erasing FE.KEYID = 1
1,243,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,999 UART: [ldev] --
1,282,339 UART: [fwproc] Wait for Commands...
1,283,082 UART: [fwproc] Recv command 0x46574c44
1,283,815 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,221 UART: ROM Fatal Error: 0x00B0003A
1,310,382 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,160 UART: [state] WD Timer not started. Device not locked for debugging
88,389 UART: [kat] SHA2-256
891,939 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,068 UART: [kat] ++
896,220 UART: [kat] sha1
900,430 UART: [kat] SHA2-256
902,370 UART: [kat] SHA2-384
905,097 UART: [kat] SHA2-512-ACC
906,998 UART: [kat] ECC-384
916,609 UART: [kat] HMAC-384Kdf
921,155 UART: [kat] LMS
1,169,467 UART: [kat] --
1,170,304 UART: [cold-reset] ++
1,170,830 UART: [fht] FHT @ 0x50003400
1,173,404 UART: [idev] ++
1,173,572 UART: [idev] CDI.KEYID = 6
1,173,933 UART: [idev] SUBJECT.KEYID = 7
1,174,358 UART: [idev] UDS.KEYID = 0
1,182,486 UART: [idev] Erasing UDS.KEYID = 0
1,199,192 UART: [idev] Sha1 KeyId Algorithm
1,208,228 UART: [idev] --
1,209,245 UART: [ldev] ++
1,209,413 UART: [ldev] CDI.KEYID = 6
1,209,777 UART: [ldev] SUBJECT.KEYID = 5
1,210,204 UART: [ldev] AUTHORITY.KEYID = 7
1,210,667 UART: [ldev] FE.KEYID = 1
1,216,273 UART: [ldev] Erasing FE.KEYID = 1
1,242,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,295 UART: [ldev] --
1,282,715 UART: [fwproc] Wait for Commands...
1,283,296 UART: [fwproc] Recv command 0x46574c44
1,284,029 UART: [fwproc] Recv'd Img size: 114332 bytes
3,129,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,157,141 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,450 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,322,310 >>> mbox cmd response: success
3,323,455 UART: [afmc] ++
3,323,623 UART: [afmc] CDI.KEYID = 6
3,323,986 UART: [afmc] SUBJECT.KEYID = 7
3,324,412 UART: [afmc] AUTHORITY.KEYID = 5
3,360,250 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,842 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,593 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,383,301 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,389,186 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,394,888 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,402,668 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 18.87s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,269 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,209 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,601 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,257 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,353 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,771 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,141 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,751 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,011 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,737 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,055 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,153 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,563 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,669 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,863 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,149 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,417 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,471 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,451 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,501 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,168,042 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.82s
Truncated 74764 bytes from beginning
1,272,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,504 UART: [ldev] --
1,280,988 UART: [fwproc] Wait for Commands...
1,281,685 UART: [fwproc] Recv command 0x46574c44
1,282,418 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,658 UART: ROM Fatal Error: 0x00B0003A
1,309,819 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,550 UART: [state] LifecycleState = Unprovisioned
86,205 UART: [state] DebugLocked = No
86,841 UART: [state] WD Timer not started. Device not locked for debugging
88,068 UART: [kat] SHA2-256
891,618 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,747 UART: [kat] ++
895,899 UART: [kat] sha1
900,179 UART: [kat] SHA2-256
902,119 UART: [kat] SHA2-384
905,070 UART: [kat] SHA2-512-ACC
906,971 UART: [kat] ECC-384
916,574 UART: [kat] HMAC-384Kdf
921,028 UART: [kat] LMS
1,169,340 UART: [kat] --
1,170,279 UART: [cold-reset] ++
1,170,631 UART: [fht] FHT @ 0x50003400
1,173,265 UART: [idev] ++
1,173,433 UART: [idev] CDI.KEYID = 6
1,173,794 UART: [idev] SUBJECT.KEYID = 7
1,174,219 UART: [idev] UDS.KEYID = 0
1,182,061 UART: [idev] Erasing UDS.KEYID = 0
1,199,481 UART: [idev] Sha1 KeyId Algorithm
1,208,271 UART: [idev] --
1,209,216 UART: [ldev] ++
1,209,384 UART: [ldev] CDI.KEYID = 6
1,209,748 UART: [ldev] SUBJECT.KEYID = 5
1,210,175 UART: [ldev] AUTHORITY.KEYID = 7
1,210,638 UART: [ldev] FE.KEYID = 1
1,215,770 UART: [ldev] Erasing FE.KEYID = 1
1,241,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,880 UART: [ldev] --
1,281,314 UART: [fwproc] Wait for Commands...
1,282,059 UART: [fwproc] Recv command 0x46574c44
1,282,792 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,884 UART: ROM Fatal Error: 0x00B0003A
1,310,045 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
891,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,213 UART: [kat] ++
895,365 UART: [kat] sha1
899,561 UART: [kat] SHA2-256
901,501 UART: [kat] SHA2-384
904,192 UART: [kat] SHA2-512-ACC
906,093 UART: [kat] ECC-384
915,784 UART: [kat] HMAC-384Kdf
920,428 UART: [kat] LMS
1,168,740 UART: [kat] --
1,169,727 UART: [cold-reset] ++
1,170,293 UART: [fht] FHT @ 0x50003400
1,173,191 UART: [idev] ++
1,173,359 UART: [idev] CDI.KEYID = 6
1,173,720 UART: [idev] SUBJECT.KEYID = 7
1,174,145 UART: [idev] UDS.KEYID = 0
1,182,329 UART: [idev] Erasing UDS.KEYID = 0
1,199,105 UART: [idev] Sha1 KeyId Algorithm
1,208,011 UART: [idev] --
1,208,966 UART: [ldev] ++
1,209,134 UART: [ldev] CDI.KEYID = 6
1,209,498 UART: [ldev] SUBJECT.KEYID = 5
1,209,925 UART: [ldev] AUTHORITY.KEYID = 7
1,210,388 UART: [ldev] FE.KEYID = 1
1,215,670 UART: [ldev] Erasing FE.KEYID = 1
1,241,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,556 UART: [ldev] --
1,280,938 UART: [fwproc] Wait for Commands...
1,281,669 UART: [fwproc] Recv command 0x46574c44
1,282,402 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,580 UART: ROM Fatal Error: 0x00B0003A
1,309,741 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,706 UART: [state] LifecycleState = Unprovisioned
86,361 UART: [state] DebugLocked = No
87,027 UART: [state] WD Timer not started. Device not locked for debugging
88,170 UART: [kat] SHA2-256
891,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,849 UART: [kat] ++
896,001 UART: [kat] sha1
900,259 UART: [kat] SHA2-256
902,199 UART: [kat] SHA2-384
905,192 UART: [kat] SHA2-512-ACC
907,093 UART: [kat] ECC-384
916,872 UART: [kat] HMAC-384Kdf
921,546 UART: [kat] LMS
1,169,858 UART: [kat] --
1,170,627 UART: [cold-reset] ++
1,171,111 UART: [fht] FHT @ 0x50003400
1,173,745 UART: [idev] ++
1,173,913 UART: [idev] CDI.KEYID = 6
1,174,274 UART: [idev] SUBJECT.KEYID = 7
1,174,699 UART: [idev] UDS.KEYID = 0
1,182,673 UART: [idev] Erasing UDS.KEYID = 0
1,199,353 UART: [idev] Sha1 KeyId Algorithm
1,208,107 UART: [idev] --
1,209,060 UART: [ldev] ++
1,209,228 UART: [ldev] CDI.KEYID = 6
1,209,592 UART: [ldev] SUBJECT.KEYID = 5
1,210,019 UART: [ldev] AUTHORITY.KEYID = 7
1,210,482 UART: [ldev] FE.KEYID = 1
1,215,882 UART: [ldev] Erasing FE.KEYID = 1
1,241,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,378 UART: [ldev] --
1,280,648 UART: [fwproc] Wait for Commands...
1,281,247 UART: [fwproc] Recv command 0x46574c44
1,281,980 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,286 UART: ROM Fatal Error: 0x00B0003A
1,308,447 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,609 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
891,298 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,427 UART: [kat] ++
895,579 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,070 UART: [kat] SHA2-512-ACC
905,971 UART: [kat] ECC-384
915,298 UART: [kat] HMAC-384Kdf
920,010 UART: [kat] LMS
1,168,322 UART: [kat] --
1,168,885 UART: [cold-reset] ++
1,169,329 UART: [fht] FHT @ 0x50003400
1,172,171 UART: [idev] ++
1,172,339 UART: [idev] CDI.KEYID = 6
1,172,700 UART: [idev] SUBJECT.KEYID = 7
1,173,125 UART: [idev] UDS.KEYID = 0
1,181,159 UART: [idev] Erasing UDS.KEYID = 0
1,197,751 UART: [idev] Sha1 KeyId Algorithm
1,206,715 UART: [idev] --
1,207,670 UART: [ldev] ++
1,207,838 UART: [ldev] CDI.KEYID = 6
1,208,202 UART: [ldev] SUBJECT.KEYID = 5
1,208,629 UART: [ldev] AUTHORITY.KEYID = 7
1,209,092 UART: [ldev] FE.KEYID = 1
1,214,288 UART: [ldev] Erasing FE.KEYID = 1
1,240,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,102 UART: [ldev] --
1,279,448 UART: [fwproc] Wait for Commands...
1,280,209 UART: [fwproc] Recv command 0x46574c44
1,280,942 UART: [fwproc] Recv'd Img size: 114332 bytes
3,127,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,156,664 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,973 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,321,831 >>> mbox cmd response: success
3,322,936 UART: [afmc] ++
3,323,104 UART: [afmc] CDI.KEYID = 6
3,323,467 UART: [afmc] SUBJECT.KEYID = 7
3,323,893 UART: [afmc] AUTHORITY.KEYID = 5
3,358,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,461 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,212 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,381,920 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,387,805 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,393,507 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,401,159 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.49s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,424 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,486 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,632 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,104 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,462 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,792 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,604 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,630 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,024 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,344 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,872 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,644 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,974 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,498 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,470 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,672 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,734 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,296 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,694 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,166,972 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.46s
Truncated 74764 bytes from beginning
1,272,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,053 UART: [ldev] --
1,281,419 UART: [fwproc] Wait for Commands...
1,282,172 UART: [fwproc] Recv command 0x46574c44
1,282,905 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,681 UART: ROM Fatal Error: 0x00B0003A
1,308,842 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
900,132 UART: [kat] SHA2-256
902,072 UART: [kat] SHA2-384
904,723 UART: [kat] SHA2-512-ACC
906,624 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
921,011 UART: [kat] LMS
1,169,323 UART: [kat] --
1,170,456 UART: [cold-reset] ++
1,171,022 UART: [fht] FHT @ 0x50003400
1,173,840 UART: [idev] ++
1,174,008 UART: [idev] CDI.KEYID = 6
1,174,369 UART: [idev] SUBJECT.KEYID = 7
1,174,794 UART: [idev] UDS.KEYID = 0
1,183,000 UART: [idev] Erasing UDS.KEYID = 0
1,200,144 UART: [idev] Sha1 KeyId Algorithm
1,209,068 UART: [idev] --
1,210,079 UART: [ldev] ++
1,210,247 UART: [ldev] CDI.KEYID = 6
1,210,611 UART: [ldev] SUBJECT.KEYID = 5
1,211,038 UART: [ldev] AUTHORITY.KEYID = 7
1,211,501 UART: [ldev] FE.KEYID = 1
1,216,841 UART: [ldev] Erasing FE.KEYID = 1
1,243,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,389 UART: [ldev] --
1,282,777 UART: [fwproc] Wait for Commands...
1,283,354 UART: [fwproc] Recv command 0x46574c44
1,284,087 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,375 UART: ROM Fatal Error: 0x00B0003A
1,310,536 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
891,595 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,724 UART: [kat] ++
895,876 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,629 UART: [kat] SHA2-512-ACC
906,530 UART: [kat] ECC-384
916,537 UART: [kat] HMAC-384Kdf
921,227 UART: [kat] LMS
1,169,539 UART: [kat] --
1,170,636 UART: [cold-reset] ++
1,171,094 UART: [fht] FHT @ 0x50003400
1,173,808 UART: [idev] ++
1,173,976 UART: [idev] CDI.KEYID = 6
1,174,337 UART: [idev] SUBJECT.KEYID = 7
1,174,762 UART: [idev] UDS.KEYID = 0
1,182,958 UART: [idev] Erasing UDS.KEYID = 0
1,200,082 UART: [idev] Sha1 KeyId Algorithm
1,208,866 UART: [idev] --
1,209,741 UART: [ldev] ++
1,209,909 UART: [ldev] CDI.KEYID = 6
1,210,273 UART: [ldev] SUBJECT.KEYID = 5
1,210,700 UART: [ldev] AUTHORITY.KEYID = 7
1,211,163 UART: [ldev] FE.KEYID = 1
1,216,059 UART: [ldev] Erasing FE.KEYID = 1
1,242,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,395 UART: [ldev] --
1,281,875 UART: [fwproc] Wait for Commands...
1,282,596 UART: [fwproc] Recv command 0x46574c44
1,283,329 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,965 UART: ROM Fatal Error: 0x00B0003A
1,310,126 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,897 UART: [state] LifecycleState = Unprovisioned
86,552 UART: [state] DebugLocked = No
87,080 UART: [state] WD Timer not started. Device not locked for debugging
88,391 UART: [kat] SHA2-256
891,941 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,070 UART: [kat] ++
896,222 UART: [kat] sha1
900,602 UART: [kat] SHA2-256
902,542 UART: [kat] SHA2-384
905,353 UART: [kat] SHA2-512-ACC
907,254 UART: [kat] ECC-384
917,313 UART: [kat] HMAC-384Kdf
921,859 UART: [kat] LMS
1,170,171 UART: [kat] --
1,171,170 UART: [cold-reset] ++
1,171,536 UART: [fht] FHT @ 0x50003400
1,174,392 UART: [idev] ++
1,174,560 UART: [idev] CDI.KEYID = 6
1,174,921 UART: [idev] SUBJECT.KEYID = 7
1,175,346 UART: [idev] UDS.KEYID = 0
1,183,466 UART: [idev] Erasing UDS.KEYID = 0
1,200,678 UART: [idev] Sha1 KeyId Algorithm
1,209,774 UART: [idev] --
1,210,927 UART: [ldev] ++
1,211,095 UART: [ldev] CDI.KEYID = 6
1,211,459 UART: [ldev] SUBJECT.KEYID = 5
1,211,886 UART: [ldev] AUTHORITY.KEYID = 7
1,212,349 UART: [ldev] FE.KEYID = 1
1,217,529 UART: [ldev] Erasing FE.KEYID = 1
1,244,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,049 UART: [ldev] --
1,283,401 UART: [fwproc] Wait for Commands...
1,284,010 UART: [fwproc] Recv command 0x46574c44
1,284,743 UART: [fwproc] Recv'd Img size: 114332 bytes
1,310,579 UART: ROM Fatal Error: 0x00B0003A
1,311,740 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
88,035 UART: [kat] SHA2-256
891,585 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,714 UART: [kat] ++
895,866 UART: [kat] sha1
900,058 UART: [kat] SHA2-256
901,998 UART: [kat] SHA2-384
904,651 UART: [kat] SHA2-512-ACC
906,552 UART: [kat] ECC-384
916,017 UART: [kat] HMAC-384Kdf
920,539 UART: [kat] LMS
1,168,851 UART: [kat] --
1,169,654 UART: [cold-reset] ++
1,170,226 UART: [fht] FHT @ 0x50003400
1,172,840 UART: [idev] ++
1,173,008 UART: [idev] CDI.KEYID = 6
1,173,369 UART: [idev] SUBJECT.KEYID = 7
1,173,794 UART: [idev] UDS.KEYID = 0
1,181,690 UART: [idev] Erasing UDS.KEYID = 0
1,199,104 UART: [idev] Sha1 KeyId Algorithm
1,208,066 UART: [idev] --
1,208,947 UART: [ldev] ++
1,209,115 UART: [ldev] CDI.KEYID = 6
1,209,479 UART: [ldev] SUBJECT.KEYID = 5
1,209,906 UART: [ldev] AUTHORITY.KEYID = 7
1,210,369 UART: [ldev] FE.KEYID = 1
1,215,529 UART: [ldev] Erasing FE.KEYID = 1
1,242,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,575 UART: [ldev] --
1,281,949 UART: [fwproc] Wait for Commands...
1,282,674 UART: [fwproc] Recv command 0x46574c44
1,283,407 UART: [fwproc] Recv'd Img size: 114332 bytes
3,127,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,155,702 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,011 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,320,941 >>> mbox cmd response: success
3,322,122 UART: [afmc] ++
3,322,290 UART: [afmc] CDI.KEYID = 6
3,322,653 UART: [afmc] SUBJECT.KEYID = 7
3,323,079 UART: [afmc] AUTHORITY.KEYID = 5
3,358,173 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,863 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,614 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,381,322 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,387,207 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,392,909 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,400,769 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.61s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,813 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,521 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,965 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,321 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,259 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,189 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,625 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,579 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,495 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,519 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,155 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,723 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,427 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,533 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,149 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,373 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,203 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,164,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,055 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,625 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,168,421 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.72s
Truncated 74764 bytes from beginning
1,272,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,996 UART: [ldev] --
1,280,468 UART: [fwproc] Wait for Commands...
1,281,041 UART: [fwproc] Recv command 0x46574c44
1,281,774 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,498 UART: ROM Fatal Error: 0x00B0003A
1,308,659 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,497 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
891,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,383 UART: [kat] ++
895,535 UART: [kat] sha1
899,971 UART: [kat] SHA2-256
901,911 UART: [kat] SHA2-384
904,650 UART: [kat] SHA2-512-ACC
906,551 UART: [kat] ECC-384
915,876 UART: [kat] HMAC-384Kdf
920,480 UART: [kat] LMS
1,168,792 UART: [kat] --
1,169,751 UART: [cold-reset] ++
1,170,325 UART: [fht] FHT @ 0x50003400
1,172,985 UART: [idev] ++
1,173,153 UART: [idev] CDI.KEYID = 6
1,173,514 UART: [idev] SUBJECT.KEYID = 7
1,173,939 UART: [idev] UDS.KEYID = 0
1,181,793 UART: [idev] Erasing UDS.KEYID = 0
1,198,555 UART: [idev] Sha1 KeyId Algorithm
1,207,483 UART: [idev] --
1,208,514 UART: [ldev] ++
1,208,682 UART: [ldev] CDI.KEYID = 6
1,209,046 UART: [ldev] SUBJECT.KEYID = 5
1,209,473 UART: [ldev] AUTHORITY.KEYID = 7
1,209,936 UART: [ldev] FE.KEYID = 1
1,215,308 UART: [ldev] Erasing FE.KEYID = 1
1,241,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,126 UART: [ldev] --
1,280,426 UART: [fwproc] Wait for Commands...
1,281,221 UART: [fwproc] Recv command 0x46574c44
1,281,954 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,858 UART: ROM Fatal Error: 0x00B0003A
1,309,019 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
891,186 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,315 UART: [kat] ++
895,467 UART: [kat] sha1
899,881 UART: [kat] SHA2-256
901,821 UART: [kat] SHA2-384
904,810 UART: [kat] SHA2-512-ACC
906,711 UART: [kat] ECC-384
916,480 UART: [kat] HMAC-384Kdf
921,074 UART: [kat] LMS
1,169,386 UART: [kat] --
1,170,347 UART: [cold-reset] ++
1,170,851 UART: [fht] FHT @ 0x50003400
1,173,467 UART: [idev] ++
1,173,635 UART: [idev] CDI.KEYID = 6
1,173,996 UART: [idev] SUBJECT.KEYID = 7
1,174,421 UART: [idev] UDS.KEYID = 0
1,182,589 UART: [idev] Erasing UDS.KEYID = 0
1,199,529 UART: [idev] Sha1 KeyId Algorithm
1,208,409 UART: [idev] --
1,209,352 UART: [ldev] ++
1,209,520 UART: [ldev] CDI.KEYID = 6
1,209,884 UART: [ldev] SUBJECT.KEYID = 5
1,210,311 UART: [ldev] AUTHORITY.KEYID = 7
1,210,774 UART: [ldev] FE.KEYID = 1
1,215,714 UART: [ldev] Erasing FE.KEYID = 1
1,241,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,774 UART: [ldev] --
1,281,214 UART: [fwproc] Wait for Commands...
1,281,821 UART: [fwproc] Recv command 0x46574c44
1,282,554 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,410 UART: ROM Fatal Error: 0x00B0003A
1,309,571 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Unprovisioned
86,075 UART: [state] DebugLocked = No
86,811 UART: [state] WD Timer not started. Device not locked for debugging
88,096 UART: [kat] SHA2-256
891,646 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,775 UART: [kat] ++
895,927 UART: [kat] sha1
900,215 UART: [kat] SHA2-256
902,155 UART: [kat] SHA2-384
904,740 UART: [kat] SHA2-512-ACC
906,641 UART: [kat] ECC-384
916,460 UART: [kat] HMAC-384Kdf
921,134 UART: [kat] LMS
1,169,446 UART: [kat] --
1,170,219 UART: [cold-reset] ++
1,170,787 UART: [fht] FHT @ 0x50003400
1,173,467 UART: [idev] ++
1,173,635 UART: [idev] CDI.KEYID = 6
1,173,996 UART: [idev] SUBJECT.KEYID = 7
1,174,421 UART: [idev] UDS.KEYID = 0
1,182,349 UART: [idev] Erasing UDS.KEYID = 0
1,198,261 UART: [idev] Sha1 KeyId Algorithm
1,207,135 UART: [idev] --
1,208,236 UART: [ldev] ++
1,208,404 UART: [ldev] CDI.KEYID = 6
1,208,768 UART: [ldev] SUBJECT.KEYID = 5
1,209,195 UART: [ldev] AUTHORITY.KEYID = 7
1,209,658 UART: [ldev] FE.KEYID = 1
1,215,016 UART: [ldev] Erasing FE.KEYID = 1
1,241,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,682 UART: [ldev] --
1,281,198 UART: [fwproc] Wait for Commands...
1,282,015 UART: [fwproc] Recv command 0x46574c44
1,282,748 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,786 UART: ROM Fatal Error: 0x00B0003A
1,309,947 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,811 UART: [state] WD Timer not started. Device not locked for debugging
88,100 UART: [kat] SHA2-256
891,650 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,779 UART: [kat] ++
895,931 UART: [kat] sha1
900,283 UART: [kat] SHA2-256
902,223 UART: [kat] SHA2-384
905,038 UART: [kat] SHA2-512-ACC
906,939 UART: [kat] ECC-384
916,728 UART: [kat] HMAC-384Kdf
921,218 UART: [kat] LMS
1,169,530 UART: [kat] --
1,170,185 UART: [cold-reset] ++
1,170,575 UART: [fht] FHT @ 0x50003400
1,173,021 UART: [idev] ++
1,173,189 UART: [idev] CDI.KEYID = 6
1,173,550 UART: [idev] SUBJECT.KEYID = 7
1,173,975 UART: [idev] UDS.KEYID = 0
1,181,847 UART: [idev] Erasing UDS.KEYID = 0
1,199,293 UART: [idev] Sha1 KeyId Algorithm
1,208,131 UART: [idev] --
1,209,036 UART: [ldev] ++
1,209,204 UART: [ldev] CDI.KEYID = 6
1,209,568 UART: [ldev] SUBJECT.KEYID = 5
1,209,995 UART: [ldev] AUTHORITY.KEYID = 7
1,210,458 UART: [ldev] FE.KEYID = 1
1,215,810 UART: [ldev] Erasing FE.KEYID = 1
1,242,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,842 UART: [ldev] --
1,281,204 UART: [fwproc] Wait for Commands...
1,281,969 UART: [fwproc] Recv command 0x46574c44
1,282,702 UART: [fwproc] Recv'd Img size: 114332 bytes
3,123,966 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,151,664 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,973 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,316,757 >>> mbox cmd response: success
3,317,846 UART: [afmc] ++
3,318,014 UART: [afmc] CDI.KEYID = 6
3,318,377 UART: [afmc] SUBJECT.KEYID = 7
3,318,803 UART: [afmc] AUTHORITY.KEYID = 5
3,353,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,580 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,376,288 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,382,173 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,387,875 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,395,657 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 18.04s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,022 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,408 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,678 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,992 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,090 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,408 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,838 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,336 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,370 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,240 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,762 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,352 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,636 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,712 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,700 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,372 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,060 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,664 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,496 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,836 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,160,568 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.43s
Truncated 74764 bytes from beginning
1,273,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,935 UART: [ldev] --
1,282,451 UART: [fwproc] Wait for Commands...
1,283,152 UART: [fwproc] Recv command 0x46574c44
1,283,885 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,427 UART: ROM Fatal Error: 0x00B0003A
1,310,588 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,849 UART: [state] LifecycleState = Unprovisioned
86,504 UART: [state] DebugLocked = No
87,004 UART: [state] WD Timer not started. Device not locked for debugging
88,239 UART: [kat] SHA2-256
891,789 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,918 UART: [kat] ++
896,070 UART: [kat] sha1
900,268 UART: [kat] SHA2-256
902,208 UART: [kat] SHA2-384
904,891 UART: [kat] SHA2-512-ACC
906,792 UART: [kat] ECC-384
916,939 UART: [kat] HMAC-384Kdf
921,671 UART: [kat] LMS
1,169,983 UART: [kat] --
1,170,952 UART: [cold-reset] ++
1,171,402 UART: [fht] FHT @ 0x50003400
1,174,238 UART: [idev] ++
1,174,406 UART: [idev] CDI.KEYID = 6
1,174,767 UART: [idev] SUBJECT.KEYID = 7
1,175,192 UART: [idev] UDS.KEYID = 0
1,183,346 UART: [idev] Erasing UDS.KEYID = 0
1,200,936 UART: [idev] Sha1 KeyId Algorithm
1,209,758 UART: [idev] --
1,210,837 UART: [ldev] ++
1,211,005 UART: [ldev] CDI.KEYID = 6
1,211,369 UART: [ldev] SUBJECT.KEYID = 5
1,211,796 UART: [ldev] AUTHORITY.KEYID = 7
1,212,259 UART: [ldev] FE.KEYID = 1
1,217,607 UART: [ldev] Erasing FE.KEYID = 1
1,244,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,805 UART: [ldev] --
1,284,093 UART: [fwproc] Wait for Commands...
1,284,774 UART: [fwproc] Recv command 0x46574c44
1,285,507 UART: [fwproc] Recv'd Img size: 114332 bytes
1,311,553 UART: ROM Fatal Error: 0x00B0003A
1,312,714 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,845 UART: [state] LifecycleState = Unprovisioned
86,500 UART: [state] DebugLocked = No
87,012 UART: [state] WD Timer not started. Device not locked for debugging
88,197 UART: [kat] SHA2-256
891,747 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,876 UART: [kat] ++
896,028 UART: [kat] sha1
900,312 UART: [kat] SHA2-256
902,252 UART: [kat] SHA2-384
904,983 UART: [kat] SHA2-512-ACC
906,884 UART: [kat] ECC-384
916,687 UART: [kat] HMAC-384Kdf
921,343 UART: [kat] LMS
1,169,655 UART: [kat] --
1,170,462 UART: [cold-reset] ++
1,170,802 UART: [fht] FHT @ 0x50003400
1,173,432 UART: [idev] ++
1,173,600 UART: [idev] CDI.KEYID = 6
1,173,961 UART: [idev] SUBJECT.KEYID = 7
1,174,386 UART: [idev] UDS.KEYID = 0
1,182,626 UART: [idev] Erasing UDS.KEYID = 0
1,200,022 UART: [idev] Sha1 KeyId Algorithm
1,209,008 UART: [idev] --
1,209,879 UART: [ldev] ++
1,210,047 UART: [ldev] CDI.KEYID = 6
1,210,411 UART: [ldev] SUBJECT.KEYID = 5
1,210,838 UART: [ldev] AUTHORITY.KEYID = 7
1,211,301 UART: [ldev] FE.KEYID = 1
1,216,449 UART: [ldev] Erasing FE.KEYID = 1
1,242,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,329 UART: [ldev] --
1,281,753 UART: [fwproc] Wait for Commands...
1,282,414 UART: [fwproc] Recv command 0x46574c44
1,283,147 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,863 UART: ROM Fatal Error: 0x00B0003A
1,310,024 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,910 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
891,595 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,724 UART: [kat] ++
895,876 UART: [kat] sha1
900,232 UART: [kat] SHA2-256
902,172 UART: [kat] SHA2-384
905,043 UART: [kat] SHA2-512-ACC
906,944 UART: [kat] ECC-384
916,811 UART: [kat] HMAC-384Kdf
921,373 UART: [kat] LMS
1,169,685 UART: [kat] --
1,170,826 UART: [cold-reset] ++
1,171,304 UART: [fht] FHT @ 0x50003400
1,173,850 UART: [idev] ++
1,174,018 UART: [idev] CDI.KEYID = 6
1,174,379 UART: [idev] SUBJECT.KEYID = 7
1,174,804 UART: [idev] UDS.KEYID = 0
1,182,890 UART: [idev] Erasing UDS.KEYID = 0
1,200,026 UART: [idev] Sha1 KeyId Algorithm
1,208,918 UART: [idev] --
1,209,775 UART: [ldev] ++
1,209,943 UART: [ldev] CDI.KEYID = 6
1,210,307 UART: [ldev] SUBJECT.KEYID = 5
1,210,734 UART: [ldev] AUTHORITY.KEYID = 7
1,211,197 UART: [ldev] FE.KEYID = 1
1,216,597 UART: [ldev] Erasing FE.KEYID = 1
1,242,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,949 UART: [ldev] --
1,282,393 UART: [fwproc] Wait for Commands...
1,283,010 UART: [fwproc] Recv command 0x46574c44
1,283,743 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,945 UART: ROM Fatal Error: 0x00B0003A
1,311,106 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,827 UART: [state] LifecycleState = Unprovisioned
85,482 UART: [state] DebugLocked = No
86,110 UART: [state] WD Timer not started. Device not locked for debugging
87,255 UART: [kat] SHA2-256
890,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,934 UART: [kat] ++
895,086 UART: [kat] sha1
899,258 UART: [kat] SHA2-256
901,198 UART: [kat] SHA2-384
904,077 UART: [kat] SHA2-512-ACC
905,978 UART: [kat] ECC-384
916,183 UART: [kat] HMAC-384Kdf
920,565 UART: [kat] LMS
1,168,877 UART: [kat] --
1,169,778 UART: [cold-reset] ++
1,170,290 UART: [fht] FHT @ 0x50003400
1,173,160 UART: [idev] ++
1,173,328 UART: [idev] CDI.KEYID = 6
1,173,689 UART: [idev] SUBJECT.KEYID = 7
1,174,114 UART: [idev] UDS.KEYID = 0
1,182,434 UART: [idev] Erasing UDS.KEYID = 0
1,199,410 UART: [idev] Sha1 KeyId Algorithm
1,208,186 UART: [idev] --
1,209,281 UART: [ldev] ++
1,209,449 UART: [ldev] CDI.KEYID = 6
1,209,813 UART: [ldev] SUBJECT.KEYID = 5
1,210,240 UART: [ldev] AUTHORITY.KEYID = 7
1,210,703 UART: [ldev] FE.KEYID = 1
1,215,781 UART: [ldev] Erasing FE.KEYID = 1
1,242,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,195 UART: [ldev] --
1,281,671 UART: [fwproc] Wait for Commands...
1,282,416 UART: [fwproc] Recv command 0x46574c44
1,283,149 UART: [fwproc] Recv'd Img size: 114332 bytes
3,134,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,162,173 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,191,482 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,327,236 >>> mbox cmd response: success
3,328,503 UART: [afmc] ++
3,328,671 UART: [afmc] CDI.KEYID = 6
3,329,034 UART: [afmc] SUBJECT.KEYID = 7
3,329,460 UART: [afmc] AUTHORITY.KEYID = 5
3,365,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,382,128 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,382,879 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,388,587 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,394,472 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,400,174 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,408,002 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.55s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,869 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,957 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,253 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,773 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,045 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,877 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,187 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,043 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,099 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,105 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,305 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,263 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,445 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,255 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,315 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,259 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,341 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,085 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,447 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,311 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,167,876 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Manufacturing
85,837 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,797 UART: [kat] SHA2-256
901,737 UART: [kat] SHA2-384
904,604 UART: [kat] SHA2-512-ACC
906,505 UART: [kat] ECC-384
916,272 UART: [kat] HMAC-384Kdf
920,992 UART: [kat] LMS
1,169,304 UART: [kat] --
1,170,309 UART: [cold-reset] ++
1,170,651 UART: [fht] FHT @ 0x50003400
1,173,227 UART: [idev] ++
1,173,395 UART: [idev] CDI.KEYID = 6
1,173,756 UART: [idev] SUBJECT.KEYID = 7
1,174,181 UART: [idev] UDS.KEYID = 0
1,182,273 UART: [idev] Erasing UDS.KEYID = 0
1,199,409 UART: [idev] Sha1 KeyId Algorithm
1,208,159 UART: [idev] --
1,209,152 UART: [ldev] ++
1,209,320 UART: [ldev] CDI.KEYID = 6
1,209,684 UART: [ldev] SUBJECT.KEYID = 5
1,210,111 UART: [ldev] AUTHORITY.KEYID = 7
1,210,574 UART: [ldev] FE.KEYID = 1
1,215,536 UART: [ldev] Erasing FE.KEYID = 1
1,242,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,514 UART: [ldev] --
1,282,012 UART: [fwproc] Wait for Commands...
1,282,657 UART: [fwproc] Recv command 0x46574c44
1,283,390 UART: [fwproc] Recv'd Img size: 114332 bytes
1,327,541 UART: ROM Fatal Error: 0x000B0005
1,328,698 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,291 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Manufacturing
86,276 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
891,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,590 UART: [kat] ++
895,742 UART: [kat] sha1
899,804 UART: [kat] SHA2-256
901,744 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
916,661 UART: [kat] HMAC-384Kdf
921,161 UART: [kat] LMS
1,169,473 UART: [kat] --
1,170,492 UART: [cold-reset] ++
1,170,926 UART: [fht] FHT @ 0x50003400
1,173,740 UART: [idev] ++
1,173,908 UART: [idev] CDI.KEYID = 6
1,174,269 UART: [idev] SUBJECT.KEYID = 7
1,174,694 UART: [idev] UDS.KEYID = 0
1,182,752 UART: [idev] Erasing UDS.KEYID = 0
1,199,694 UART: [idev] Sha1 KeyId Algorithm
1,208,520 UART: [idev] --
1,209,603 UART: [ldev] ++
1,209,771 UART: [ldev] CDI.KEYID = 6
1,210,135 UART: [ldev] SUBJECT.KEYID = 5
1,210,562 UART: [ldev] AUTHORITY.KEYID = 7
1,211,025 UART: [ldev] FE.KEYID = 1
1,216,173 UART: [ldev] Erasing FE.KEYID = 1
1,242,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,805 UART: [ldev] --
1,282,103 UART: [fwproc] Wait for Commands...
1,282,802 UART: [fwproc] Recv command 0x46574c44
1,283,535 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,582 UART: ROM Fatal Error: 0x000B0005
1,329,739 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,686 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Manufacturing
86,015 UART: [state] DebugLocked = No
86,559 UART: [state] WD Timer not started. Device not locked for debugging
87,892 UART: [kat] SHA2-256
891,442 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,571 UART: [kat] ++
895,723 UART: [kat] sha1
900,015 UART: [kat] SHA2-256
901,955 UART: [kat] SHA2-384
904,844 UART: [kat] SHA2-512-ACC
906,745 UART: [kat] ECC-384
916,316 UART: [kat] HMAC-384Kdf
920,922 UART: [kat] LMS
1,169,234 UART: [kat] --
1,170,145 UART: [cold-reset] ++
1,170,611 UART: [fht] FHT @ 0x50003400
1,173,251 UART: [idev] ++
1,173,419 UART: [idev] CDI.KEYID = 6
1,173,780 UART: [idev] SUBJECT.KEYID = 7
1,174,205 UART: [idev] UDS.KEYID = 0
1,182,141 UART: [idev] Erasing UDS.KEYID = 0
1,198,845 UART: [idev] Sha1 KeyId Algorithm
1,207,537 UART: [idev] --
1,208,488 UART: [ldev] ++
1,208,656 UART: [ldev] CDI.KEYID = 6
1,209,020 UART: [ldev] SUBJECT.KEYID = 5
1,209,447 UART: [ldev] AUTHORITY.KEYID = 7
1,209,910 UART: [ldev] FE.KEYID = 1
1,214,892 UART: [ldev] Erasing FE.KEYID = 1
1,241,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,400 UART: [ldev] --
1,280,756 UART: [fwproc] Wait for Commands...
1,281,551 UART: [fwproc] Recv command 0x46574c44
1,282,284 UART: [fwproc] Recv'd Img size: 114332 bytes
1,326,737 UART: ROM Fatal Error: 0x000B0005
1,327,894 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,757 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Manufacturing
85,832 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
891,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,530 UART: [kat] ++
895,682 UART: [kat] sha1
899,816 UART: [kat] SHA2-256
901,756 UART: [kat] SHA2-384
904,617 UART: [kat] SHA2-512-ACC
906,518 UART: [kat] ECC-384
916,443 UART: [kat] HMAC-384Kdf
921,225 UART: [kat] LMS
1,169,537 UART: [kat] --
1,170,628 UART: [cold-reset] ++
1,171,160 UART: [fht] FHT @ 0x50003400
1,174,014 UART: [idev] ++
1,174,182 UART: [idev] CDI.KEYID = 6
1,174,543 UART: [idev] SUBJECT.KEYID = 7
1,174,968 UART: [idev] UDS.KEYID = 0
1,183,512 UART: [idev] Erasing UDS.KEYID = 0
1,200,740 UART: [idev] Sha1 KeyId Algorithm
1,209,670 UART: [idev] --
1,210,515 UART: [ldev] ++
1,210,683 UART: [ldev] CDI.KEYID = 6
1,211,047 UART: [ldev] SUBJECT.KEYID = 5
1,211,474 UART: [ldev] AUTHORITY.KEYID = 7
1,211,937 UART: [ldev] FE.KEYID = 1
1,217,127 UART: [ldev] Erasing FE.KEYID = 1
1,243,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,431 UART: [ldev] --
1,282,821 UART: [fwproc] Wait for Commands...
1,283,618 UART: [fwproc] Recv command 0x46574c44
1,284,351 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,750 UART: ROM Fatal Error: 0x000B0005
1,329,907 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,678 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,600 UART: [state] LifecycleState = Manufacturing
86,255 UART: [state] DebugLocked = No
86,809 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
891,480 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,609 UART: [kat] ++
895,761 UART: [kat] sha1
900,067 UART: [kat] SHA2-256
902,007 UART: [kat] SHA2-384
904,642 UART: [kat] SHA2-512-ACC
906,543 UART: [kat] ECC-384
916,708 UART: [kat] HMAC-384Kdf
921,446 UART: [kat] LMS
1,169,758 UART: [kat] --
1,170,797 UART: [cold-reset] ++
1,171,207 UART: [fht] FHT @ 0x50003400
1,173,861 UART: [idev] ++
1,174,029 UART: [idev] CDI.KEYID = 6
1,174,390 UART: [idev] SUBJECT.KEYID = 7
1,174,815 UART: [idev] UDS.KEYID = 0
1,182,983 UART: [idev] Erasing UDS.KEYID = 0
1,199,907 UART: [idev] Sha1 KeyId Algorithm
1,208,937 UART: [idev] --
1,210,090 UART: [ldev] ++
1,210,258 UART: [ldev] CDI.KEYID = 6
1,210,622 UART: [ldev] SUBJECT.KEYID = 5
1,211,049 UART: [ldev] AUTHORITY.KEYID = 7
1,211,512 UART: [ldev] FE.KEYID = 1
1,216,892 UART: [ldev] Erasing FE.KEYID = 1
1,242,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,518 UART: [ldev] --
1,281,846 UART: [fwproc] Wait for Commands...
1,282,561 UART: [fwproc] Recv command 0x46574c44
1,283,294 UART: [fwproc] Recv'd Img size: 114332 bytes
1,327,925 UART: ROM Fatal Error: 0x000B0005
1,329,082 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,941 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Manufacturing
86,036 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
891,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,488 UART: [kat] ++
895,640 UART: [kat] sha1
899,776 UART: [kat] SHA2-256
901,716 UART: [kat] SHA2-384
904,413 UART: [kat] SHA2-512-ACC
906,314 UART: [kat] ECC-384
916,121 UART: [kat] HMAC-384Kdf
920,773 UART: [kat] LMS
1,169,085 UART: [kat] --
1,169,700 UART: [cold-reset] ++
1,170,036 UART: [fht] FHT @ 0x50003400
1,172,860 UART: [idev] ++
1,173,028 UART: [idev] CDI.KEYID = 6
1,173,389 UART: [idev] SUBJECT.KEYID = 7
1,173,814 UART: [idev] UDS.KEYID = 0
1,181,846 UART: [idev] Erasing UDS.KEYID = 0
1,199,256 UART: [idev] Sha1 KeyId Algorithm
1,207,954 UART: [idev] --
1,209,039 UART: [ldev] ++
1,209,207 UART: [ldev] CDI.KEYID = 6
1,209,571 UART: [ldev] SUBJECT.KEYID = 5
1,209,998 UART: [ldev] AUTHORITY.KEYID = 7
1,210,461 UART: [ldev] FE.KEYID = 1
1,215,789 UART: [ldev] Erasing FE.KEYID = 1
1,242,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,861 UART: [ldev] --
1,281,373 UART: [fwproc] Wait for Commands...
1,282,128 UART: [fwproc] Recv command 0x46574c44
1,282,861 UART: [fwproc] Recv'd Img size: 114332 bytes
1,327,256 UART: ROM Fatal Error: 0x000B0005
1,328,413 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,814 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Manufacturing
85,899 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,789 UART: [kat] SHA2-256
901,729 UART: [kat] SHA2-384
904,374 UART: [kat] SHA2-512-ACC
906,275 UART: [kat] ECC-384
915,714 UART: [kat] HMAC-384Kdf
920,282 UART: [kat] LMS
1,168,594 UART: [kat] --
1,169,233 UART: [cold-reset] ++
1,169,653 UART: [fht] FHT @ 0x50003400
1,172,379 UART: [idev] ++
1,172,547 UART: [idev] CDI.KEYID = 6
1,172,908 UART: [idev] SUBJECT.KEYID = 7
1,173,333 UART: [idev] UDS.KEYID = 0
1,181,525 UART: [idev] Erasing UDS.KEYID = 0
1,197,893 UART: [idev] Sha1 KeyId Algorithm
1,206,889 UART: [idev] --
1,207,956 UART: [ldev] ++
1,208,124 UART: [ldev] CDI.KEYID = 6
1,208,488 UART: [ldev] SUBJECT.KEYID = 5
1,208,915 UART: [ldev] AUTHORITY.KEYID = 7
1,209,378 UART: [ldev] FE.KEYID = 1
1,214,732 UART: [ldev] Erasing FE.KEYID = 1
1,241,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,206 UART: [ldev] --
1,280,644 UART: [fwproc] Wait for Commands...
1,281,225 UART: [fwproc] Recv command 0x46574c44
1,281,958 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,417 UART: ROM Fatal Error: 0x000B0003
1,303,574 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,156,157 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Manufacturing
85,974 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
891,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,322 UART: [kat] ++
895,474 UART: [kat] sha1
899,622 UART: [kat] SHA2-256
901,562 UART: [kat] SHA2-384
904,187 UART: [kat] SHA2-512-ACC
906,088 UART: [kat] ECC-384
915,953 UART: [kat] HMAC-384Kdf
920,741 UART: [kat] LMS
1,169,053 UART: [kat] --
1,169,978 UART: [cold-reset] ++
1,170,382 UART: [fht] FHT @ 0x50003400
1,172,956 UART: [idev] ++
1,173,124 UART: [idev] CDI.KEYID = 6
1,173,485 UART: [idev] SUBJECT.KEYID = 7
1,173,910 UART: [idev] UDS.KEYID = 0
1,182,290 UART: [idev] Erasing UDS.KEYID = 0
1,199,210 UART: [idev] Sha1 KeyId Algorithm
1,207,958 UART: [idev] --
1,208,997 UART: [ldev] ++
1,209,165 UART: [ldev] CDI.KEYID = 6
1,209,529 UART: [ldev] SUBJECT.KEYID = 5
1,209,956 UART: [ldev] AUTHORITY.KEYID = 7
1,210,419 UART: [ldev] FE.KEYID = 1
1,215,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,229 UART: [ldev] --
1,281,551 UART: [fwproc] Wait for Commands...
1,282,322 UART: [fwproc] Recv command 0x46574c44
1,283,055 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,428 UART: ROM Fatal Error: 0x000B0003
1,304,585 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,156,586 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Manufacturing
86,023 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
891,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,397 UART: [kat] ++
895,549 UART: [kat] sha1
899,651 UART: [kat] SHA2-256
901,591 UART: [kat] SHA2-384
904,408 UART: [kat] SHA2-512-ACC
906,309 UART: [kat] ECC-384
915,992 UART: [kat] HMAC-384Kdf
920,558 UART: [kat] LMS
1,168,870 UART: [kat] --
1,169,759 UART: [cold-reset] ++
1,170,195 UART: [fht] FHT @ 0x50003400
1,172,877 UART: [idev] ++
1,173,045 UART: [idev] CDI.KEYID = 6
1,173,406 UART: [idev] SUBJECT.KEYID = 7
1,173,831 UART: [idev] UDS.KEYID = 0
1,181,953 UART: [idev] Erasing UDS.KEYID = 0
1,198,963 UART: [idev] Sha1 KeyId Algorithm
1,207,747 UART: [idev] --
1,208,704 UART: [ldev] ++
1,208,872 UART: [ldev] CDI.KEYID = 6
1,209,236 UART: [ldev] SUBJECT.KEYID = 5
1,209,663 UART: [ldev] AUTHORITY.KEYID = 7
1,210,126 UART: [ldev] FE.KEYID = 1
1,215,526 UART: [ldev] Erasing FE.KEYID = 1
1,242,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,166 UART: [ldev] --
1,281,582 UART: [fwproc] Wait for Commands...
1,282,171 UART: [fwproc] Recv command 0x46574c44
1,282,904 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,205 UART: ROM Fatal Error: 0x000B0003
1,304,362 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,154,515 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Manufacturing
86,176 UART: [state] DebugLocked = No
86,882 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
891,651 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,780 UART: [kat] ++
895,932 UART: [kat] sha1
899,998 UART: [kat] SHA2-256
901,938 UART: [kat] SHA2-384
904,739 UART: [kat] SHA2-512-ACC
906,640 UART: [kat] ECC-384
916,237 UART: [kat] HMAC-384Kdf
920,825 UART: [kat] LMS
1,169,137 UART: [kat] --
1,170,196 UART: [cold-reset] ++
1,170,554 UART: [fht] FHT @ 0x50003400
1,173,050 UART: [idev] ++
1,173,218 UART: [idev] CDI.KEYID = 6
1,173,579 UART: [idev] SUBJECT.KEYID = 7
1,174,004 UART: [idev] UDS.KEYID = 0
1,182,076 UART: [idev] Erasing UDS.KEYID = 0
1,198,942 UART: [idev] Sha1 KeyId Algorithm
1,207,764 UART: [idev] --
1,208,623 UART: [ldev] ++
1,208,791 UART: [ldev] CDI.KEYID = 6
1,209,155 UART: [ldev] SUBJECT.KEYID = 5
1,209,582 UART: [ldev] AUTHORITY.KEYID = 7
1,210,045 UART: [ldev] FE.KEYID = 1
1,215,595 UART: [ldev] Erasing FE.KEYID = 1
1,242,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,521 UART: [ldev] --
1,281,797 UART: [fwproc] Wait for Commands...
1,282,396 UART: [fwproc] Recv command 0x46574c44
1,283,129 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,170 UART: ROM Fatal Error: 0x000B0003
1,304,327 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,156,794 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,442 UART: [state] LifecycleState = Manufacturing
86,097 UART: [state] DebugLocked = No
86,607 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
891,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,577 UART: [kat] ++
895,729 UART: [kat] sha1
899,923 UART: [kat] SHA2-256
901,863 UART: [kat] SHA2-384
904,682 UART: [kat] SHA2-512-ACC
906,583 UART: [kat] ECC-384
916,180 UART: [kat] HMAC-384Kdf
920,788 UART: [kat] LMS
1,169,100 UART: [kat] --
1,169,763 UART: [cold-reset] ++
1,170,251 UART: [fht] FHT @ 0x50003400
1,172,895 UART: [idev] ++
1,173,063 UART: [idev] CDI.KEYID = 6
1,173,424 UART: [idev] SUBJECT.KEYID = 7
1,173,849 UART: [idev] UDS.KEYID = 0
1,182,065 UART: [idev] Erasing UDS.KEYID = 0
1,199,047 UART: [idev] Sha1 KeyId Algorithm
1,207,741 UART: [idev] --
1,209,020 UART: [ldev] ++
1,209,188 UART: [ldev] CDI.KEYID = 6
1,209,552 UART: [ldev] SUBJECT.KEYID = 5
1,209,979 UART: [ldev] AUTHORITY.KEYID = 7
1,210,442 UART: [ldev] FE.KEYID = 1
1,215,960 UART: [ldev] Erasing FE.KEYID = 1
1,242,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,190 UART: [ldev] --
1,281,608 UART: [fwproc] Wait for Commands...
1,282,183 UART: [fwproc] Recv command 0x46574c44
1,282,916 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,667 UART: ROM Fatal Error: 0x000B0003
1,304,824 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,155,073 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Manufacturing
86,138 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
900,056 UART: [kat] SHA2-256
901,996 UART: [kat] SHA2-384
904,679 UART: [kat] SHA2-512-ACC
906,580 UART: [kat] ECC-384
916,281 UART: [kat] HMAC-384Kdf
920,823 UART: [kat] LMS
1,169,135 UART: [kat] --
1,170,130 UART: [cold-reset] ++
1,170,622 UART: [fht] FHT @ 0x50003400
1,173,226 UART: [idev] ++
1,173,394 UART: [idev] CDI.KEYID = 6
1,173,755 UART: [idev] SUBJECT.KEYID = 7
1,174,180 UART: [idev] UDS.KEYID = 0
1,182,208 UART: [idev] Erasing UDS.KEYID = 0
1,199,296 UART: [idev] Sha1 KeyId Algorithm
1,208,202 UART: [idev] --
1,209,305 UART: [ldev] ++
1,209,473 UART: [ldev] CDI.KEYID = 6
1,209,837 UART: [ldev] SUBJECT.KEYID = 5
1,210,264 UART: [ldev] AUTHORITY.KEYID = 7
1,210,727 UART: [ldev] FE.KEYID = 1
1,216,095 UART: [ldev] Erasing FE.KEYID = 1
1,243,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,173 UART: [ldev] --
1,282,483 UART: [fwproc] Wait for Commands...
1,283,188 UART: [fwproc] Recv command 0x46574c44
1,283,921 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,942 UART: ROM Fatal Error: 0x000B0003
1,305,099 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,157,682 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,402 UART: [kat] SHA2-256
890,952 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,081 UART: [kat] ++
895,233 UART: [kat] sha1
899,497 UART: [kat] SHA2-256
901,437 UART: [kat] SHA2-384
904,302 UART: [kat] SHA2-512-ACC
906,203 UART: [kat] ECC-384
915,802 UART: [kat] HMAC-384Kdf
920,434 UART: [kat] LMS
1,168,746 UART: [kat] --
1,169,459 UART: [cold-reset] ++
1,169,809 UART: [fht] FHT @ 0x50003400
1,172,527 UART: [idev] ++
1,172,695 UART: [idev] CDI.KEYID = 6
1,173,056 UART: [idev] SUBJECT.KEYID = 7
1,173,481 UART: [idev] UDS.KEYID = 0
1,181,207 UART: [idev] Erasing UDS.KEYID = 0
1,197,699 UART: [idev] Sha1 KeyId Algorithm
1,206,631 UART: [idev] --
1,207,796 UART: [ldev] ++
1,207,964 UART: [ldev] CDI.KEYID = 6
1,208,328 UART: [ldev] SUBJECT.KEYID = 5
1,208,755 UART: [ldev] AUTHORITY.KEYID = 7
1,209,218 UART: [ldev] FE.KEYID = 1
1,214,346 UART: [ldev] Erasing FE.KEYID = 1
1,240,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,490 UART: [ldev] --
1,279,968 UART: [fwproc] Wait for Commands...
1,280,659 UART: [fwproc] Recv command 0x46574c44
1,281,392 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,304 UART: ROM Fatal Error: 0x000B0016
2,579,461 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,486 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
891,505 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,634 UART: [kat] ++
895,786 UART: [kat] sha1
900,014 UART: [kat] SHA2-256
901,954 UART: [kat] SHA2-384
904,743 UART: [kat] SHA2-512-ACC
906,644 UART: [kat] ECC-384
916,515 UART: [kat] HMAC-384Kdf
921,005 UART: [kat] LMS
1,169,317 UART: [kat] --
1,170,236 UART: [cold-reset] ++
1,170,674 UART: [fht] FHT @ 0x50003400
1,173,412 UART: [idev] ++
1,173,580 UART: [idev] CDI.KEYID = 6
1,173,941 UART: [idev] SUBJECT.KEYID = 7
1,174,366 UART: [idev] UDS.KEYID = 0
1,182,512 UART: [idev] Erasing UDS.KEYID = 0
1,199,346 UART: [idev] Sha1 KeyId Algorithm
1,208,180 UART: [idev] --
1,209,385 UART: [ldev] ++
1,209,553 UART: [ldev] CDI.KEYID = 6
1,209,917 UART: [ldev] SUBJECT.KEYID = 5
1,210,344 UART: [ldev] AUTHORITY.KEYID = 7
1,210,807 UART: [ldev] FE.KEYID = 1
1,216,257 UART: [ldev] Erasing FE.KEYID = 1
1,242,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,269 UART: [ldev] --
1,281,647 UART: [fwproc] Wait for Commands...
1,282,270 UART: [fwproc] Recv command 0x46574c44
1,283,003 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,663 UART: ROM Fatal Error: 0x000B0016
2,580,820 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,151 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,211 UART: [state] WD Timer not started. Device not locked for debugging
87,486 UART: [kat] SHA2-256
891,036 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,165 UART: [kat] ++
895,317 UART: [kat] sha1
899,509 UART: [kat] SHA2-256
901,449 UART: [kat] SHA2-384
904,386 UART: [kat] SHA2-512-ACC
906,287 UART: [kat] ECC-384
916,048 UART: [kat] HMAC-384Kdf
920,648 UART: [kat] LMS
1,168,960 UART: [kat] --
1,169,673 UART: [cold-reset] ++
1,170,019 UART: [fht] FHT @ 0x50003400
1,172,603 UART: [idev] ++
1,172,771 UART: [idev] CDI.KEYID = 6
1,173,132 UART: [idev] SUBJECT.KEYID = 7
1,173,557 UART: [idev] UDS.KEYID = 0
1,181,439 UART: [idev] Erasing UDS.KEYID = 0
1,198,539 UART: [idev] Sha1 KeyId Algorithm
1,207,335 UART: [idev] --
1,208,452 UART: [ldev] ++
1,208,620 UART: [ldev] CDI.KEYID = 6
1,208,984 UART: [ldev] SUBJECT.KEYID = 5
1,209,411 UART: [ldev] AUTHORITY.KEYID = 7
1,209,874 UART: [ldev] FE.KEYID = 1
1,214,762 UART: [ldev] Erasing FE.KEYID = 1
1,241,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,018 UART: [ldev] --
1,280,456 UART: [fwproc] Wait for Commands...
1,281,263 UART: [fwproc] Recv command 0x46574c44
1,281,996 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,174 UART: ROM Fatal Error: 0x000B0016
2,580,331 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,478 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,508 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,318 UART: [kat] ++
895,470 UART: [kat] sha1
899,818 UART: [kat] SHA2-256
901,758 UART: [kat] SHA2-384
904,515 UART: [kat] SHA2-512-ACC
906,416 UART: [kat] ECC-384
916,657 UART: [kat] HMAC-384Kdf
921,161 UART: [kat] LMS
1,169,473 UART: [kat] --
1,170,422 UART: [cold-reset] ++
1,171,000 UART: [fht] FHT @ 0x50003400
1,173,540 UART: [idev] ++
1,173,708 UART: [idev] CDI.KEYID = 6
1,174,069 UART: [idev] SUBJECT.KEYID = 7
1,174,494 UART: [idev] UDS.KEYID = 0
1,182,486 UART: [idev] Erasing UDS.KEYID = 0
1,199,384 UART: [idev] Sha1 KeyId Algorithm
1,208,414 UART: [idev] --
1,209,387 UART: [ldev] ++
1,209,555 UART: [ldev] CDI.KEYID = 6
1,209,919 UART: [ldev] SUBJECT.KEYID = 5
1,210,346 UART: [ldev] AUTHORITY.KEYID = 7
1,210,809 UART: [ldev] FE.KEYID = 1
1,215,887 UART: [ldev] Erasing FE.KEYID = 1
1,242,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,139 UART: [ldev] --
1,281,587 UART: [fwproc] Wait for Commands...
1,282,170 UART: [fwproc] Recv command 0x46574c44
1,282,903 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,757 UART: ROM Fatal Error: 0x000B0016
2,579,914 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,507 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,844 UART: [kat] SHA2-256
891,394 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,523 UART: [kat] ++
895,675 UART: [kat] sha1
900,109 UART: [kat] SHA2-256
902,049 UART: [kat] SHA2-384
904,596 UART: [kat] SHA2-512-ACC
906,497 UART: [kat] ECC-384
916,052 UART: [kat] HMAC-384Kdf
920,564 UART: [kat] LMS
1,168,876 UART: [kat] --
1,169,889 UART: [cold-reset] ++
1,170,445 UART: [fht] FHT @ 0x50003400
1,173,201 UART: [idev] ++
1,173,369 UART: [idev] CDI.KEYID = 6
1,173,730 UART: [idev] SUBJECT.KEYID = 7
1,174,155 UART: [idev] UDS.KEYID = 0
1,182,165 UART: [idev] Erasing UDS.KEYID = 0
1,199,453 UART: [idev] Sha1 KeyId Algorithm
1,208,305 UART: [idev] --
1,209,248 UART: [ldev] ++
1,209,416 UART: [ldev] CDI.KEYID = 6
1,209,780 UART: [ldev] SUBJECT.KEYID = 5
1,210,207 UART: [ldev] AUTHORITY.KEYID = 7
1,210,670 UART: [ldev] FE.KEYID = 1
1,215,700 UART: [ldev] Erasing FE.KEYID = 1
1,241,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,286 UART: [ldev] --
1,280,666 UART: [fwproc] Wait for Commands...
1,281,369 UART: [fwproc] Recv command 0x46574c44
1,282,102 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,324 UART: ROM Fatal Error: 0x000B0016
2,579,481 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,482 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,720 UART: [state] DebugLocked = No
86,294 UART: [state] WD Timer not started. Device not locked for debugging
87,515 UART: [kat] SHA2-256
891,065 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,194 UART: [kat] ++
895,346 UART: [kat] sha1
899,494 UART: [kat] SHA2-256
901,434 UART: [kat] SHA2-384
904,265 UART: [kat] SHA2-512-ACC
906,166 UART: [kat] ECC-384
915,893 UART: [kat] HMAC-384Kdf
920,393 UART: [kat] LMS
1,168,705 UART: [kat] --
1,169,616 UART: [cold-reset] ++
1,170,022 UART: [fht] FHT @ 0x50003400
1,172,832 UART: [idev] ++
1,173,000 UART: [idev] CDI.KEYID = 6
1,173,361 UART: [idev] SUBJECT.KEYID = 7
1,173,786 UART: [idev] UDS.KEYID = 0
1,181,634 UART: [idev] Erasing UDS.KEYID = 0
1,199,006 UART: [idev] Sha1 KeyId Algorithm
1,207,880 UART: [idev] --
1,208,789 UART: [ldev] ++
1,208,957 UART: [ldev] CDI.KEYID = 6
1,209,321 UART: [ldev] SUBJECT.KEYID = 5
1,209,748 UART: [ldev] AUTHORITY.KEYID = 7
1,210,211 UART: [ldev] FE.KEYID = 1
1,215,483 UART: [ldev] Erasing FE.KEYID = 1
1,241,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,879 UART: [ldev] --
1,281,397 UART: [fwproc] Wait for Commands...
1,281,972 UART: [fwproc] Recv command 0x46574c44
1,282,705 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,248 UART: ROM Fatal Error: 0x000B0016
2,579,405 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,789 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,915 UART: [kat] SHA2-256
901,855 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,390 UART: [kat] HMAC-384Kdf
920,842 UART: [kat] LMS
1,169,154 UART: [kat] --
1,170,075 UART: [cold-reset] ++
1,170,647 UART: [fht] FHT @ 0x50003400
1,173,155 UART: [idev] ++
1,173,323 UART: [idev] CDI.KEYID = 6
1,173,684 UART: [idev] SUBJECT.KEYID = 7
1,174,109 UART: [idev] UDS.KEYID = 0
1,182,015 UART: [idev] Erasing UDS.KEYID = 0
1,199,017 UART: [idev] Sha1 KeyId Algorithm
1,207,769 UART: [idev] --
1,208,662 UART: [ldev] ++
1,208,830 UART: [ldev] CDI.KEYID = 6
1,209,194 UART: [ldev] SUBJECT.KEYID = 5
1,209,621 UART: [ldev] AUTHORITY.KEYID = 7
1,210,084 UART: [ldev] FE.KEYID = 1
1,215,308 UART: [ldev] Erasing FE.KEYID = 1
1,241,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,314 UART: [ldev] --
1,280,624 UART: [fwproc] Wait for Commands...
1,281,387 UART: [fwproc] Recv command 0x46574c44
1,282,120 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,861 UART: ROM Fatal Error: 0x000B002B
2,581,020 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,229 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,896 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
891,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,744 UART: [kat] ++
895,896 UART: [kat] sha1
899,986 UART: [kat] SHA2-256
901,926 UART: [kat] SHA2-384
904,637 UART: [kat] SHA2-512-ACC
906,538 UART: [kat] ECC-384
916,111 UART: [kat] HMAC-384Kdf
920,709 UART: [kat] LMS
1,169,021 UART: [kat] --
1,170,144 UART: [cold-reset] ++
1,170,538 UART: [fht] FHT @ 0x50003400
1,173,166 UART: [idev] ++
1,173,334 UART: [idev] CDI.KEYID = 6
1,173,695 UART: [idev] SUBJECT.KEYID = 7
1,174,120 UART: [idev] UDS.KEYID = 0
1,182,246 UART: [idev] Erasing UDS.KEYID = 0
1,199,092 UART: [idev] Sha1 KeyId Algorithm
1,208,058 UART: [idev] --
1,209,011 UART: [ldev] ++
1,209,179 UART: [ldev] CDI.KEYID = 6
1,209,543 UART: [ldev] SUBJECT.KEYID = 5
1,209,970 UART: [ldev] AUTHORITY.KEYID = 7
1,210,433 UART: [ldev] FE.KEYID = 1
1,215,719 UART: [ldev] Erasing FE.KEYID = 1
1,241,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,915 UART: [ldev] --
1,281,343 UART: [fwproc] Wait for Commands...
1,281,998 UART: [fwproc] Recv command 0x46574c44
1,282,731 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,632 UART: ROM Fatal Error: 0x000B002B
2,580,791 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,030 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,055 UART: [state] WD Timer not started. Device not locked for debugging
87,390 UART: [kat] SHA2-256
890,940 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,069 UART: [kat] ++
895,221 UART: [kat] sha1
899,359 UART: [kat] SHA2-256
901,299 UART: [kat] SHA2-384
904,028 UART: [kat] SHA2-512-ACC
905,929 UART: [kat] ECC-384
915,666 UART: [kat] HMAC-384Kdf
920,238 UART: [kat] LMS
1,168,550 UART: [kat] --
1,169,297 UART: [cold-reset] ++
1,169,869 UART: [fht] FHT @ 0x50003400
1,172,523 UART: [idev] ++
1,172,691 UART: [idev] CDI.KEYID = 6
1,173,052 UART: [idev] SUBJECT.KEYID = 7
1,173,477 UART: [idev] UDS.KEYID = 0
1,181,819 UART: [idev] Erasing UDS.KEYID = 0
1,199,323 UART: [idev] Sha1 KeyId Algorithm
1,208,381 UART: [idev] --
1,209,468 UART: [ldev] ++
1,209,636 UART: [ldev] CDI.KEYID = 6
1,210,000 UART: [ldev] SUBJECT.KEYID = 5
1,210,427 UART: [ldev] AUTHORITY.KEYID = 7
1,210,890 UART: [ldev] FE.KEYID = 1
1,215,994 UART: [ldev] Erasing FE.KEYID = 1
1,241,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,424 UART: [ldev] --
1,280,802 UART: [fwproc] Wait for Commands...
1,281,375 UART: [fwproc] Recv command 0x46574c44
1,282,108 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,879 UART: ROM Fatal Error: 0x000B002B
2,579,038 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,801 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,915 UART: [state] LifecycleState = Unprovisioned
85,570 UART: [state] DebugLocked = No
86,198 UART: [state] WD Timer not started. Device not locked for debugging
87,539 UART: [kat] SHA2-256
891,089 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,218 UART: [kat] ++
895,370 UART: [kat] sha1
899,660 UART: [kat] SHA2-256
901,600 UART: [kat] SHA2-384
904,433 UART: [kat] SHA2-512-ACC
906,334 UART: [kat] ECC-384
916,155 UART: [kat] HMAC-384Kdf
920,893 UART: [kat] LMS
1,169,205 UART: [kat] --
1,170,048 UART: [cold-reset] ++
1,170,438 UART: [fht] FHT @ 0x50003400
1,173,052 UART: [idev] ++
1,173,220 UART: [idev] CDI.KEYID = 6
1,173,581 UART: [idev] SUBJECT.KEYID = 7
1,174,006 UART: [idev] UDS.KEYID = 0
1,182,146 UART: [idev] Erasing UDS.KEYID = 0
1,199,544 UART: [idev] Sha1 KeyId Algorithm
1,208,436 UART: [idev] --
1,209,645 UART: [ldev] ++
1,209,813 UART: [ldev] CDI.KEYID = 6
1,210,177 UART: [ldev] SUBJECT.KEYID = 5
1,210,604 UART: [ldev] AUTHORITY.KEYID = 7
1,211,067 UART: [ldev] FE.KEYID = 1
1,216,341 UART: [ldev] Erasing FE.KEYID = 1
1,242,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,901 UART: [ldev] --
1,282,227 UART: [fwproc] Wait for Commands...
1,282,870 UART: [fwproc] Recv command 0x46574c44
1,283,603 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,702 UART: ROM Fatal Error: 0x000B002B
2,580,861 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,384 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,700 UART: [state] LifecycleState = Unprovisioned
85,355 UART: [state] DebugLocked = No
85,967 UART: [state] WD Timer not started. Device not locked for debugging
87,282 UART: [kat] SHA2-256
890,832 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,961 UART: [kat] ++
895,113 UART: [kat] sha1
899,319 UART: [kat] SHA2-256
901,259 UART: [kat] SHA2-384
903,900 UART: [kat] SHA2-512-ACC
905,801 UART: [kat] ECC-384
915,284 UART: [kat] HMAC-384Kdf
919,994 UART: [kat] LMS
1,168,306 UART: [kat] --
1,169,267 UART: [cold-reset] ++
1,169,825 UART: [fht] FHT @ 0x50003400
1,172,667 UART: [idev] ++
1,172,835 UART: [idev] CDI.KEYID = 6
1,173,196 UART: [idev] SUBJECT.KEYID = 7
1,173,621 UART: [idev] UDS.KEYID = 0
1,181,829 UART: [idev] Erasing UDS.KEYID = 0
1,198,645 UART: [idev] Sha1 KeyId Algorithm
1,207,597 UART: [idev] --
1,208,646 UART: [ldev] ++
1,208,814 UART: [ldev] CDI.KEYID = 6
1,209,178 UART: [ldev] SUBJECT.KEYID = 5
1,209,605 UART: [ldev] AUTHORITY.KEYID = 7
1,210,068 UART: [ldev] FE.KEYID = 1
1,215,268 UART: [ldev] Erasing FE.KEYID = 1
1,241,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,398 UART: [ldev] --
1,280,790 UART: [fwproc] Wait for Commands...
1,281,397 UART: [fwproc] Recv command 0x46574c44
1,282,130 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,519 UART: ROM Fatal Error: 0x000B002B
2,580,678 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,851 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,724 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
899,826 UART: [kat] SHA2-256
901,766 UART: [kat] SHA2-384
904,467 UART: [kat] SHA2-512-ACC
906,368 UART: [kat] ECC-384
916,363 UART: [kat] HMAC-384Kdf
921,063 UART: [kat] LMS
1,169,375 UART: [kat] --
1,170,414 UART: [cold-reset] ++
1,170,964 UART: [fht] FHT @ 0x50003400
1,173,708 UART: [idev] ++
1,173,876 UART: [idev] CDI.KEYID = 6
1,174,237 UART: [idev] SUBJECT.KEYID = 7
1,174,662 UART: [idev] UDS.KEYID = 0
1,182,676 UART: [idev] Erasing UDS.KEYID = 0
1,199,660 UART: [idev] Sha1 KeyId Algorithm
1,208,410 UART: [idev] --
1,209,429 UART: [ldev] ++
1,209,597 UART: [ldev] CDI.KEYID = 6
1,209,961 UART: [ldev] SUBJECT.KEYID = 5
1,210,388 UART: [ldev] AUTHORITY.KEYID = 7
1,210,851 UART: [ldev] FE.KEYID = 1
1,215,911 UART: [ldev] Erasing FE.KEYID = 1
1,242,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,541 UART: [ldev] --
1,281,959 UART: [fwproc] Wait for Commands...
1,282,694 UART: [fwproc] Recv command 0x46574c44
1,283,427 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,496 UART: ROM Fatal Error: 0x000B002B
2,580,655 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,786 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,139 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [kat] SHA2-256
890,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,001 UART: [kat] ++
895,153 UART: [kat] sha1
899,579 UART: [kat] SHA2-256
901,519 UART: [kat] SHA2-384
904,142 UART: [kat] SHA2-512-ACC
906,043 UART: [kat] ECC-384
916,042 UART: [kat] HMAC-384Kdf
920,680 UART: [kat] LMS
1,168,992 UART: [kat] --
1,169,871 UART: [cold-reset] ++
1,170,449 UART: [fht] FHT @ 0x50003400
1,173,149 UART: [idev] ++
1,173,317 UART: [idev] CDI.KEYID = 6
1,173,678 UART: [idev] SUBJECT.KEYID = 7
1,174,103 UART: [idev] UDS.KEYID = 0
1,182,473 UART: [idev] Erasing UDS.KEYID = 0
1,199,071 UART: [idev] Sha1 KeyId Algorithm
1,207,789 UART: [idev] --
1,208,894 UART: [ldev] ++
1,209,062 UART: [ldev] CDI.KEYID = 6
1,209,426 UART: [ldev] SUBJECT.KEYID = 5
1,209,853 UART: [ldev] AUTHORITY.KEYID = 7
1,210,316 UART: [ldev] FE.KEYID = 1
1,215,498 UART: [ldev] Erasing FE.KEYID = 1
1,241,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,930 UART: [ldev] --
1,281,198 UART: [fwproc] Wait for Commands...
1,282,003 UART: [fwproc] Recv command 0x46574c44
1,282,736 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,117 UART: ROM Fatal Error: 0x000B002A
2,580,276 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,434,773 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
891,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,534 UART: [kat] ++
895,686 UART: [kat] sha1
899,832 UART: [kat] SHA2-256
901,772 UART: [kat] SHA2-384
904,509 UART: [kat] SHA2-512-ACC
906,410 UART: [kat] ECC-384
915,897 UART: [kat] HMAC-384Kdf
920,517 UART: [kat] LMS
1,168,829 UART: [kat] --
1,169,798 UART: [cold-reset] ++
1,170,366 UART: [fht] FHT @ 0x50003400
1,173,110 UART: [idev] ++
1,173,278 UART: [idev] CDI.KEYID = 6
1,173,639 UART: [idev] SUBJECT.KEYID = 7
1,174,064 UART: [idev] UDS.KEYID = 0
1,181,998 UART: [idev] Erasing UDS.KEYID = 0
1,199,462 UART: [idev] Sha1 KeyId Algorithm
1,208,296 UART: [idev] --
1,209,235 UART: [ldev] ++
1,209,403 UART: [ldev] CDI.KEYID = 6
1,209,767 UART: [ldev] SUBJECT.KEYID = 5
1,210,194 UART: [ldev] AUTHORITY.KEYID = 7
1,210,657 UART: [ldev] FE.KEYID = 1
1,215,863 UART: [ldev] Erasing FE.KEYID = 1
1,242,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,585 UART: [ldev] --
1,281,961 UART: [fwproc] Wait for Commands...
1,282,722 UART: [fwproc] Recv command 0x46574c44
1,283,455 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,544 UART: ROM Fatal Error: 0x000B002A
2,580,703 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,345 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,812 UART: [state] LifecycleState = Unprovisioned
85,467 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
890,968 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,097 UART: [kat] ++
895,249 UART: [kat] sha1
899,507 UART: [kat] SHA2-256
901,447 UART: [kat] SHA2-384
904,048 UART: [kat] SHA2-512-ACC
905,949 UART: [kat] ECC-384
915,790 UART: [kat] HMAC-384Kdf
920,218 UART: [kat] LMS
1,168,530 UART: [kat] --
1,169,319 UART: [cold-reset] ++
1,169,763 UART: [fht] FHT @ 0x50003400
1,172,401 UART: [idev] ++
1,172,569 UART: [idev] CDI.KEYID = 6
1,172,930 UART: [idev] SUBJECT.KEYID = 7
1,173,355 UART: [idev] UDS.KEYID = 0
1,181,745 UART: [idev] Erasing UDS.KEYID = 0
1,198,421 UART: [idev] Sha1 KeyId Algorithm
1,207,173 UART: [idev] --
1,208,110 UART: [ldev] ++
1,208,278 UART: [ldev] CDI.KEYID = 6
1,208,642 UART: [ldev] SUBJECT.KEYID = 5
1,209,069 UART: [ldev] AUTHORITY.KEYID = 7
1,209,532 UART: [ldev] FE.KEYID = 1
1,214,826 UART: [ldev] Erasing FE.KEYID = 1
1,241,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,092 UART: [ldev] --
1,280,480 UART: [fwproc] Wait for Commands...
1,281,097 UART: [fwproc] Recv command 0x46574c44
1,281,830 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,345 UART: ROM Fatal Error: 0x000B002A
2,579,504 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,085 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,980 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
891,721 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,850 UART: [kat] ++
896,002 UART: [kat] sha1
900,254 UART: [kat] SHA2-256
902,194 UART: [kat] SHA2-384
904,943 UART: [kat] SHA2-512-ACC
906,844 UART: [kat] ECC-384
916,585 UART: [kat] HMAC-384Kdf
921,301 UART: [kat] LMS
1,169,613 UART: [kat] --
1,170,672 UART: [cold-reset] ++
1,171,218 UART: [fht] FHT @ 0x50003400
1,173,700 UART: [idev] ++
1,173,868 UART: [idev] CDI.KEYID = 6
1,174,229 UART: [idev] SUBJECT.KEYID = 7
1,174,654 UART: [idev] UDS.KEYID = 0
1,182,738 UART: [idev] Erasing UDS.KEYID = 0
1,199,498 UART: [idev] Sha1 KeyId Algorithm
1,208,344 UART: [idev] --
1,209,405 UART: [ldev] ++
1,209,573 UART: [ldev] CDI.KEYID = 6
1,209,937 UART: [ldev] SUBJECT.KEYID = 5
1,210,364 UART: [ldev] AUTHORITY.KEYID = 7
1,210,827 UART: [ldev] FE.KEYID = 1
1,215,993 UART: [ldev] Erasing FE.KEYID = 1
1,242,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,547 UART: [ldev] --
1,282,009 UART: [fwproc] Wait for Commands...
1,282,658 UART: [fwproc] Recv command 0x46574c44
1,283,391 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,356 UART: ROM Fatal Error: 0x000B002A
2,580,515 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,022 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,526 UART: [state] LifecycleState = Unprovisioned
85,181 UART: [state] DebugLocked = No
85,771 UART: [state] WD Timer not started. Device not locked for debugging
86,900 UART: [kat] SHA2-256
890,450 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,579 UART: [kat] ++
894,731 UART: [kat] sha1
899,083 UART: [kat] SHA2-256
901,023 UART: [kat] SHA2-384
903,824 UART: [kat] SHA2-512-ACC
905,725 UART: [kat] ECC-384
915,312 UART: [kat] HMAC-384Kdf
919,722 UART: [kat] LMS
1,168,034 UART: [kat] --
1,169,085 UART: [cold-reset] ++
1,169,437 UART: [fht] FHT @ 0x50003400
1,172,101 UART: [idev] ++
1,172,269 UART: [idev] CDI.KEYID = 6
1,172,630 UART: [idev] SUBJECT.KEYID = 7
1,173,055 UART: [idev] UDS.KEYID = 0
1,180,693 UART: [idev] Erasing UDS.KEYID = 0
1,197,367 UART: [idev] Sha1 KeyId Algorithm
1,206,267 UART: [idev] --
1,207,364 UART: [ldev] ++
1,207,532 UART: [ldev] CDI.KEYID = 6
1,207,896 UART: [ldev] SUBJECT.KEYID = 5
1,208,323 UART: [ldev] AUTHORITY.KEYID = 7
1,208,786 UART: [ldev] FE.KEYID = 1
1,214,098 UART: [ldev] Erasing FE.KEYID = 1
1,239,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,452 UART: [ldev] --
1,278,798 UART: [fwproc] Wait for Commands...
1,279,485 UART: [fwproc] Recv command 0x46574c44
1,280,218 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,073 UART: ROM Fatal Error: 0x000B002A
2,578,232 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,430,289 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,500 UART: [kat] ++
895,652 UART: [kat] sha1
899,952 UART: [kat] SHA2-256
901,892 UART: [kat] SHA2-384
904,611 UART: [kat] SHA2-512-ACC
906,512 UART: [kat] ECC-384
916,563 UART: [kat] HMAC-384Kdf
921,069 UART: [kat] LMS
1,169,381 UART: [kat] --
1,170,168 UART: [cold-reset] ++
1,170,516 UART: [fht] FHT @ 0x50003400
1,173,012 UART: [idev] ++
1,173,180 UART: [idev] CDI.KEYID = 6
1,173,541 UART: [idev] SUBJECT.KEYID = 7
1,173,966 UART: [idev] UDS.KEYID = 0
1,182,190 UART: [idev] Erasing UDS.KEYID = 0
1,199,242 UART: [idev] Sha1 KeyId Algorithm
1,208,092 UART: [idev] --
1,209,141 UART: [ldev] ++
1,209,309 UART: [ldev] CDI.KEYID = 6
1,209,673 UART: [ldev] SUBJECT.KEYID = 5
1,210,100 UART: [ldev] AUTHORITY.KEYID = 7
1,210,563 UART: [ldev] FE.KEYID = 1
1,215,809 UART: [ldev] Erasing FE.KEYID = 1
1,242,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,337 UART: [ldev] --
1,281,687 UART: [fwproc] Wait for Commands...
1,282,344 UART: [fwproc] Recv command 0x46574c44
1,283,077 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,502 UART: ROM Fatal Error: 0x000B002A
2,581,661 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,906 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,825 UART: [state] WD Timer not started. Device not locked for debugging
88,018 UART: [kat] SHA2-256
891,568 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,697 UART: [kat] ++
895,849 UART: [kat] sha1
900,045 UART: [kat] SHA2-256
901,985 UART: [kat] SHA2-384
904,778 UART: [kat] SHA2-512-ACC
906,679 UART: [kat] ECC-384
916,542 UART: [kat] HMAC-384Kdf
921,214 UART: [kat] LMS
1,169,526 UART: [kat] --
1,170,509 UART: [cold-reset] ++
1,170,969 UART: [fht] FHT @ 0x50003400
1,173,507 UART: [idev] ++
1,173,675 UART: [idev] CDI.KEYID = 6
1,174,036 UART: [idev] SUBJECT.KEYID = 7
1,174,461 UART: [idev] UDS.KEYID = 0
1,182,699 UART: [idev] Erasing UDS.KEYID = 0
1,199,465 UART: [idev] Sha1 KeyId Algorithm
1,208,463 UART: [idev] --
1,209,618 UART: [ldev] ++
1,209,786 UART: [ldev] CDI.KEYID = 6
1,210,150 UART: [ldev] SUBJECT.KEYID = 5
1,210,577 UART: [ldev] AUTHORITY.KEYID = 7
1,211,040 UART: [ldev] FE.KEYID = 1
1,216,328 UART: [ldev] Erasing FE.KEYID = 1
1,241,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,720 UART: [ldev] --
1,281,062 UART: [fwproc] Wait for Commands...
1,281,765 UART: [fwproc] Recv command 0x46574c44
1,282,498 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,007 UART: ROM Fatal Error: 0x000B002A
2,580,166 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,269 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,913 UART: [state] LifecycleState = Unprovisioned
86,568 UART: [state] DebugLocked = No
87,200 UART: [state] WD Timer not started. Device not locked for debugging
88,451 UART: [kat] SHA2-256
892,001 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,130 UART: [kat] ++
896,282 UART: [kat] sha1
900,470 UART: [kat] SHA2-256
902,410 UART: [kat] SHA2-384
905,045 UART: [kat] SHA2-512-ACC
906,946 UART: [kat] ECC-384
916,551 UART: [kat] HMAC-384Kdf
921,201 UART: [kat] LMS
1,169,513 UART: [kat] --
1,170,452 UART: [cold-reset] ++
1,170,936 UART: [fht] FHT @ 0x50003400
1,173,654 UART: [idev] ++
1,173,822 UART: [idev] CDI.KEYID = 6
1,174,183 UART: [idev] SUBJECT.KEYID = 7
1,174,608 UART: [idev] UDS.KEYID = 0
1,182,694 UART: [idev] Erasing UDS.KEYID = 0
1,199,744 UART: [idev] Sha1 KeyId Algorithm
1,208,478 UART: [idev] --
1,209,559 UART: [ldev] ++
1,209,727 UART: [ldev] CDI.KEYID = 6
1,210,091 UART: [ldev] SUBJECT.KEYID = 5
1,210,518 UART: [ldev] AUTHORITY.KEYID = 7
1,210,981 UART: [ldev] FE.KEYID = 1
1,216,505 UART: [ldev] Erasing FE.KEYID = 1
1,243,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,963 UART: [ldev] --
1,282,249 UART: [fwproc] Wait for Commands...
1,282,838 UART: [fwproc] Recv command 0x46574c44
1,283,571 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,526 UART: ROM Fatal Error: 0x000B002A
2,581,685 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,006 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Unprovisioned
86,137 UART: [state] DebugLocked = No
86,851 UART: [state] WD Timer not started. Device not locked for debugging
88,008 UART: [kat] SHA2-256
891,558 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,687 UART: [kat] ++
895,839 UART: [kat] sha1
900,013 UART: [kat] SHA2-256
901,953 UART: [kat] SHA2-384
904,586 UART: [kat] SHA2-512-ACC
906,487 UART: [kat] ECC-384
916,124 UART: [kat] HMAC-384Kdf
920,878 UART: [kat] LMS
1,169,190 UART: [kat] --
1,169,871 UART: [cold-reset] ++
1,170,213 UART: [fht] FHT @ 0x50003400
1,172,735 UART: [idev] ++
1,172,903 UART: [idev] CDI.KEYID = 6
1,173,264 UART: [idev] SUBJECT.KEYID = 7
1,173,689 UART: [idev] UDS.KEYID = 0
1,181,203 UART: [idev] Erasing UDS.KEYID = 0
1,198,079 UART: [idev] Sha1 KeyId Algorithm
1,206,961 UART: [idev] --
1,208,020 UART: [ldev] ++
1,208,188 UART: [ldev] CDI.KEYID = 6
1,208,552 UART: [ldev] SUBJECT.KEYID = 5
1,208,979 UART: [ldev] AUTHORITY.KEYID = 7
1,209,442 UART: [ldev] FE.KEYID = 1
1,214,614 UART: [ldev] Erasing FE.KEYID = 1
1,240,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,424 UART: [ldev] --
1,279,818 UART: [fwproc] Wait for Commands...
1,280,571 UART: [fwproc] Recv command 0x46574c44
1,281,304 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,685 UART: ROM Fatal Error: 0x000B002A
2,579,844 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,947 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
891,265 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
916,065 UART: [kat] HMAC-384Kdf
920,533 UART: [kat] LMS
1,168,845 UART: [kat] --
1,169,580 UART: [cold-reset] ++
1,170,010 UART: [fht] FHT @ 0x50003400
1,172,652 UART: [idev] ++
1,172,820 UART: [idev] CDI.KEYID = 6
1,173,181 UART: [idev] SUBJECT.KEYID = 7
1,173,606 UART: [idev] UDS.KEYID = 0
1,181,882 UART: [idev] Erasing UDS.KEYID = 0
1,199,232 UART: [idev] Sha1 KeyId Algorithm
1,208,206 UART: [idev] --
1,209,047 UART: [ldev] ++
1,209,215 UART: [ldev] CDI.KEYID = 6
1,209,579 UART: [ldev] SUBJECT.KEYID = 5
1,210,006 UART: [ldev] AUTHORITY.KEYID = 7
1,210,469 UART: [ldev] FE.KEYID = 1
1,215,613 UART: [ldev] Erasing FE.KEYID = 1
1,242,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,577 UART: [ldev] --
1,281,993 UART: [fwproc] Wait for Commands...
1,282,722 UART: [fwproc] Recv command 0x46574c44
1,283,455 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,606 UART: ROM Fatal Error: 0x000B002A
2,580,765 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,434,112 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,570 UART: [state] LifecycleState = Unprovisioned
86,225 UART: [state] DebugLocked = No
86,827 UART: [state] WD Timer not started. Device not locked for debugging
87,952 UART: [kat] SHA2-256
891,502 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,631 UART: [kat] ++
895,783 UART: [kat] sha1
899,813 UART: [kat] SHA2-256
901,753 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
915,360 UART: [kat] HMAC-384Kdf
919,858 UART: [kat] LMS
1,168,170 UART: [kat] --
1,169,203 UART: [cold-reset] ++
1,169,773 UART: [fht] FHT @ 0x50003400
1,172,459 UART: [idev] ++
1,172,627 UART: [idev] CDI.KEYID = 6
1,172,988 UART: [idev] SUBJECT.KEYID = 7
1,173,413 UART: [idev] UDS.KEYID = 0
1,181,147 UART: [idev] Erasing UDS.KEYID = 0
1,197,951 UART: [idev] Sha1 KeyId Algorithm
1,206,839 UART: [idev] --
1,207,888 UART: [ldev] ++
1,208,056 UART: [ldev] CDI.KEYID = 6
1,208,420 UART: [ldev] SUBJECT.KEYID = 5
1,208,847 UART: [ldev] AUTHORITY.KEYID = 7
1,209,310 UART: [ldev] FE.KEYID = 1
1,214,484 UART: [ldev] Erasing FE.KEYID = 1
1,241,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,914 UART: [ldev] --
1,280,218 UART: [fwproc] Wait for Commands...
1,280,905 UART: [fwproc] Recv command 0x46574c44
1,281,638 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,263 UART: ROM Fatal Error: 0x000B002A
2,579,422 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,415 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,775 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = No
87,100 UART: [state] WD Timer not started. Device not locked for debugging
88,355 UART: [kat] SHA2-256
891,905 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,034 UART: [kat] ++
896,186 UART: [kat] sha1
900,484 UART: [kat] SHA2-256
902,424 UART: [kat] SHA2-384
905,087 UART: [kat] SHA2-512-ACC
906,988 UART: [kat] ECC-384
916,487 UART: [kat] HMAC-384Kdf
921,185 UART: [kat] LMS
1,169,497 UART: [kat] --
1,170,358 UART: [cold-reset] ++
1,170,706 UART: [fht] FHT @ 0x50003400
1,173,404 UART: [idev] ++
1,173,572 UART: [idev] CDI.KEYID = 6
1,173,933 UART: [idev] SUBJECT.KEYID = 7
1,174,358 UART: [idev] UDS.KEYID = 0
1,182,532 UART: [idev] Erasing UDS.KEYID = 0
1,199,042 UART: [idev] Sha1 KeyId Algorithm
1,207,922 UART: [idev] --
1,209,099 UART: [ldev] ++
1,209,267 UART: [ldev] CDI.KEYID = 6
1,209,631 UART: [ldev] SUBJECT.KEYID = 5
1,210,058 UART: [ldev] AUTHORITY.KEYID = 7
1,210,521 UART: [ldev] FE.KEYID = 1
1,216,007 UART: [ldev] Erasing FE.KEYID = 1
1,242,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,049 UART: [ldev] --
1,281,565 UART: [fwproc] Wait for Commands...
1,282,290 UART: [fwproc] Recv command 0x46574c44
1,283,023 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,506 UART: ROM Fatal Error: 0x000B002A
2,580,665 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,658 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
891,358 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,487 UART: [kat] ++
895,639 UART: [kat] sha1
899,993 UART: [kat] SHA2-256
901,933 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,118 UART: [kat] HMAC-384Kdf
920,610 UART: [kat] LMS
1,168,922 UART: [kat] --
1,169,831 UART: [cold-reset] ++
1,170,385 UART: [fht] FHT @ 0x50003400
1,173,005 UART: [idev] ++
1,173,173 UART: [idev] CDI.KEYID = 6
1,173,534 UART: [idev] SUBJECT.KEYID = 7
1,173,959 UART: [idev] UDS.KEYID = 0
1,181,425 UART: [idev] Erasing UDS.KEYID = 0
1,199,019 UART: [idev] Sha1 KeyId Algorithm
1,208,049 UART: [idev] --
1,209,034 UART: [ldev] ++
1,209,202 UART: [ldev] CDI.KEYID = 6
1,209,566 UART: [ldev] SUBJECT.KEYID = 5
1,209,993 UART: [ldev] AUTHORITY.KEYID = 7
1,210,456 UART: [ldev] FE.KEYID = 1
1,215,644 UART: [ldev] Erasing FE.KEYID = 1
1,242,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,996 UART: [ldev] --
1,281,364 UART: [fwproc] Wait for Commands...
1,282,091 UART: [fwproc] Recv command 0x46574c44
1,282,824 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,778 UART: ROM Fatal Error: 0x000B0028
2,580,935 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,192 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
891,351 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,480 UART: [kat] ++
895,632 UART: [kat] sha1
899,688 UART: [kat] SHA2-256
901,628 UART: [kat] SHA2-384
904,483 UART: [kat] SHA2-512-ACC
906,384 UART: [kat] ECC-384
916,133 UART: [kat] HMAC-384Kdf
920,753 UART: [kat] LMS
1,169,065 UART: [kat] --
1,169,848 UART: [cold-reset] ++
1,170,284 UART: [fht] FHT @ 0x50003400
1,172,972 UART: [idev] ++
1,173,140 UART: [idev] CDI.KEYID = 6
1,173,501 UART: [idev] SUBJECT.KEYID = 7
1,173,926 UART: [idev] UDS.KEYID = 0
1,181,764 UART: [idev] Erasing UDS.KEYID = 0
1,198,710 UART: [idev] Sha1 KeyId Algorithm
1,207,736 UART: [idev] --
1,208,647 UART: [ldev] ++
1,208,815 UART: [ldev] CDI.KEYID = 6
1,209,179 UART: [ldev] SUBJECT.KEYID = 5
1,209,606 UART: [ldev] AUTHORITY.KEYID = 7
1,210,069 UART: [ldev] FE.KEYID = 1
1,215,097 UART: [ldev] Erasing FE.KEYID = 1
1,241,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,187 UART: [ldev] --
1,280,459 UART: [fwproc] Wait for Commands...
1,281,056 UART: [fwproc] Recv command 0x46574c44
1,281,789 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,075 UART: ROM Fatal Error: 0x000B0028
2,579,232 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,977 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,754 UART: [kat] SHA2-256
891,304 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,433 UART: [kat] ++
895,585 UART: [kat] sha1
899,839 UART: [kat] SHA2-256
901,779 UART: [kat] SHA2-384
904,554 UART: [kat] SHA2-512-ACC
906,455 UART: [kat] ECC-384
916,386 UART: [kat] HMAC-384Kdf
920,746 UART: [kat] LMS
1,169,058 UART: [kat] --
1,170,095 UART: [cold-reset] ++
1,170,517 UART: [fht] FHT @ 0x50003400
1,173,111 UART: [idev] ++
1,173,279 UART: [idev] CDI.KEYID = 6
1,173,640 UART: [idev] SUBJECT.KEYID = 7
1,174,065 UART: [idev] UDS.KEYID = 0
1,181,949 UART: [idev] Erasing UDS.KEYID = 0
1,198,957 UART: [idev] Sha1 KeyId Algorithm
1,208,007 UART: [idev] --
1,208,918 UART: [ldev] ++
1,209,086 UART: [ldev] CDI.KEYID = 6
1,209,450 UART: [ldev] SUBJECT.KEYID = 5
1,209,877 UART: [ldev] AUTHORITY.KEYID = 7
1,210,340 UART: [ldev] FE.KEYID = 1
1,215,504 UART: [ldev] Erasing FE.KEYID = 1
1,241,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,024 UART: [ldev] --
1,280,360 UART: [fwproc] Wait for Commands...
1,280,999 UART: [fwproc] Recv command 0x46574c44
1,281,732 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,016 UART: ROM Fatal Error: 0x000B0028
2,580,173 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,296 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,959 UART: [state] LifecycleState = Unprovisioned
85,614 UART: [state] DebugLocked = No
86,218 UART: [state] WD Timer not started. Device not locked for debugging
87,335 UART: [kat] SHA2-256
890,885 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,014 UART: [kat] ++
895,166 UART: [kat] sha1
899,274 UART: [kat] SHA2-256
901,214 UART: [kat] SHA2-384
904,109 UART: [kat] SHA2-512-ACC
906,010 UART: [kat] ECC-384
915,983 UART: [kat] HMAC-384Kdf
920,583 UART: [kat] LMS
1,168,895 UART: [kat] --
1,169,888 UART: [cold-reset] ++
1,170,226 UART: [fht] FHT @ 0x50003400
1,172,940 UART: [idev] ++
1,173,108 UART: [idev] CDI.KEYID = 6
1,173,469 UART: [idev] SUBJECT.KEYID = 7
1,173,894 UART: [idev] UDS.KEYID = 0
1,182,000 UART: [idev] Erasing UDS.KEYID = 0
1,199,218 UART: [idev] Sha1 KeyId Algorithm
1,208,028 UART: [idev] --
1,208,853 UART: [ldev] ++
1,209,021 UART: [ldev] CDI.KEYID = 6
1,209,385 UART: [ldev] SUBJECT.KEYID = 5
1,209,812 UART: [ldev] AUTHORITY.KEYID = 7
1,210,275 UART: [ldev] FE.KEYID = 1
1,215,621 UART: [ldev] Erasing FE.KEYID = 1
1,242,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,169 UART: [ldev] --
1,281,573 UART: [fwproc] Wait for Commands...
1,282,284 UART: [fwproc] Recv command 0x46574c44
1,283,017 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,361 UART: ROM Fatal Error: 0x000B0028
2,579,518 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,291 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,757 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
891,458 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,587 UART: [kat] ++
895,739 UART: [kat] sha1
899,835 UART: [kat] SHA2-256
901,775 UART: [kat] SHA2-384
904,564 UART: [kat] SHA2-512-ACC
906,465 UART: [kat] ECC-384
915,906 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,169,563 UART: [cold-reset] ++
1,170,003 UART: [fht] FHT @ 0x50003400
1,172,747 UART: [idev] ++
1,172,915 UART: [idev] CDI.KEYID = 6
1,173,276 UART: [idev] SUBJECT.KEYID = 7
1,173,701 UART: [idev] UDS.KEYID = 0
1,181,817 UART: [idev] Erasing UDS.KEYID = 0
1,198,531 UART: [idev] Sha1 KeyId Algorithm
1,207,613 UART: [idev] --
1,208,578 UART: [ldev] ++
1,208,746 UART: [ldev] CDI.KEYID = 6
1,209,110 UART: [ldev] SUBJECT.KEYID = 5
1,209,537 UART: [ldev] AUTHORITY.KEYID = 7
1,210,000 UART: [ldev] FE.KEYID = 1
1,215,130 UART: [ldev] Erasing FE.KEYID = 1
1,241,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,720 UART: [ldev] --
1,281,222 UART: [fwproc] Wait for Commands...
1,282,033 UART: [fwproc] Recv command 0x46574c44
1,282,766 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,556 UART: ROM Fatal Error: 0x000B0028
2,580,713 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,350 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
891,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,646 UART: [kat] ++
895,798 UART: [kat] sha1
899,864 UART: [kat] SHA2-256
901,804 UART: [kat] SHA2-384
904,563 UART: [kat] SHA2-512-ACC
906,464 UART: [kat] ECC-384
916,621 UART: [kat] HMAC-384Kdf
921,181 UART: [kat] LMS
1,169,493 UART: [kat] --
1,170,612 UART: [cold-reset] ++
1,171,028 UART: [fht] FHT @ 0x50003400
1,173,678 UART: [idev] ++
1,173,846 UART: [idev] CDI.KEYID = 6
1,174,207 UART: [idev] SUBJECT.KEYID = 7
1,174,632 UART: [idev] UDS.KEYID = 0
1,182,722 UART: [idev] Erasing UDS.KEYID = 0
1,199,806 UART: [idev] Sha1 KeyId Algorithm
1,208,560 UART: [idev] --
1,209,529 UART: [ldev] ++
1,209,697 UART: [ldev] CDI.KEYID = 6
1,210,061 UART: [ldev] SUBJECT.KEYID = 5
1,210,488 UART: [ldev] AUTHORITY.KEYID = 7
1,210,951 UART: [ldev] FE.KEYID = 1
1,216,233 UART: [ldev] Erasing FE.KEYID = 1
1,242,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,187 UART: [ldev] --
1,281,623 UART: [fwproc] Wait for Commands...
1,282,266 UART: [fwproc] Recv command 0x46574c44
1,282,999 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,391 UART: ROM Fatal Error: 0x000B0028
2,580,548 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,267 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,800 UART: [kat] SHA2-256
891,350 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,479 UART: [kat] ++
895,631 UART: [kat] sha1
899,897 UART: [kat] SHA2-256
901,837 UART: [kat] SHA2-384
904,772 UART: [kat] SHA2-512-ACC
906,673 UART: [kat] ECC-384
916,396 UART: [kat] HMAC-384Kdf
920,940 UART: [kat] LMS
1,169,252 UART: [kat] --
1,170,179 UART: [cold-reset] ++
1,170,541 UART: [fht] FHT @ 0x50003400
1,173,263 UART: [idev] ++
1,173,431 UART: [idev] CDI.KEYID = 6
1,173,792 UART: [idev] SUBJECT.KEYID = 7
1,174,217 UART: [idev] UDS.KEYID = 0
1,182,397 UART: [idev] Erasing UDS.KEYID = 0
1,199,115 UART: [idev] Sha1 KeyId Algorithm
1,207,873 UART: [idev] --
1,208,992 UART: [ldev] ++
1,209,160 UART: [ldev] CDI.KEYID = 6
1,209,524 UART: [ldev] SUBJECT.KEYID = 5
1,209,951 UART: [ldev] AUTHORITY.KEYID = 7
1,210,414 UART: [ldev] FE.KEYID = 1
1,215,788 UART: [ldev] Erasing FE.KEYID = 1
1,242,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,846 UART: [ldev] --
1,281,348 UART: [fwproc] Wait for Commands...
1,282,085 UART: [fwproc] Recv command 0x46574c44
1,282,818 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,710 UART: ROM Fatal Error: 0x000B0028
2,580,867 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,896 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
891,349 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,478 UART: [kat] ++
895,630 UART: [kat] sha1
900,012 UART: [kat] SHA2-256
901,952 UART: [kat] SHA2-384
904,607 UART: [kat] SHA2-512-ACC
906,508 UART: [kat] ECC-384
916,509 UART: [kat] HMAC-384Kdf
921,083 UART: [kat] LMS
1,169,395 UART: [kat] --
1,170,266 UART: [cold-reset] ++
1,170,696 UART: [fht] FHT @ 0x50003400
1,173,574 UART: [idev] ++
1,173,742 UART: [idev] CDI.KEYID = 6
1,174,103 UART: [idev] SUBJECT.KEYID = 7
1,174,528 UART: [idev] UDS.KEYID = 0
1,182,968 UART: [idev] Erasing UDS.KEYID = 0
1,199,610 UART: [idev] Sha1 KeyId Algorithm
1,208,256 UART: [idev] --
1,209,301 UART: [ldev] ++
1,209,469 UART: [ldev] CDI.KEYID = 6
1,209,833 UART: [ldev] SUBJECT.KEYID = 5
1,210,260 UART: [ldev] AUTHORITY.KEYID = 7
1,210,723 UART: [ldev] FE.KEYID = 1
1,216,095 UART: [ldev] Erasing FE.KEYID = 1
1,242,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,103 UART: [ldev] --
1,281,513 UART: [fwproc] Wait for Commands...
1,282,338 UART: [fwproc] Recv command 0x46574c44
1,283,071 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,397 UART: ROM Fatal Error: 0x000B0028
2,580,554 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,659 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
891,098 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,227 UART: [kat] ++
895,379 UART: [kat] sha1
899,499 UART: [kat] SHA2-256
901,439 UART: [kat] SHA2-384
904,108 UART: [kat] SHA2-512-ACC
906,009 UART: [kat] ECC-384
916,020 UART: [kat] HMAC-384Kdf
920,724 UART: [kat] LMS
1,169,036 UART: [kat] --
1,170,015 UART: [cold-reset] ++
1,170,581 UART: [fht] FHT @ 0x50003400
1,173,173 UART: [idev] ++
1,173,341 UART: [idev] CDI.KEYID = 6
1,173,702 UART: [idev] SUBJECT.KEYID = 7
1,174,127 UART: [idev] UDS.KEYID = 0
1,182,001 UART: [idev] Erasing UDS.KEYID = 0
1,199,017 UART: [idev] Sha1 KeyId Algorithm
1,207,925 UART: [idev] --
1,208,890 UART: [ldev] ++
1,209,058 UART: [ldev] CDI.KEYID = 6
1,209,422 UART: [ldev] SUBJECT.KEYID = 5
1,209,849 UART: [ldev] AUTHORITY.KEYID = 7
1,210,312 UART: [ldev] FE.KEYID = 1
1,215,426 UART: [ldev] Erasing FE.KEYID = 1
1,242,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,224 UART: [ldev] --
1,281,690 UART: [fwproc] Wait for Commands...
1,282,453 UART: [fwproc] Recv command 0x46574c44
1,283,186 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,916 UART: ROM Fatal Error: 0x000B0028
2,581,073 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,376 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,722 UART: [state] DebugLocked = No
86,430 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
891,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,464 UART: [kat] ++
895,616 UART: [kat] sha1
899,684 UART: [kat] SHA2-256
901,624 UART: [kat] SHA2-384
904,483 UART: [kat] SHA2-512-ACC
906,384 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
921,111 UART: [kat] LMS
1,169,423 UART: [kat] --
1,170,376 UART: [cold-reset] ++
1,170,732 UART: [fht] FHT @ 0x50003400
1,173,432 UART: [idev] ++
1,173,600 UART: [idev] CDI.KEYID = 6
1,173,961 UART: [idev] SUBJECT.KEYID = 7
1,174,386 UART: [idev] UDS.KEYID = 0
1,182,154 UART: [idev] Erasing UDS.KEYID = 0
1,199,162 UART: [idev] Sha1 KeyId Algorithm
1,207,966 UART: [idev] --
1,209,225 UART: [ldev] ++
1,209,393 UART: [ldev] CDI.KEYID = 6
1,209,757 UART: [ldev] SUBJECT.KEYID = 5
1,210,184 UART: [ldev] AUTHORITY.KEYID = 7
1,210,647 UART: [ldev] FE.KEYID = 1
1,215,533 UART: [ldev] Erasing FE.KEYID = 1
1,242,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,505 UART: [ldev] --
1,281,859 UART: [fwproc] Wait for Commands...
1,282,582 UART: [fwproc] Recv command 0x46574c44
1,283,315 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,305 UART: ROM Fatal Error: 0x000B0028
2,580,462 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,811 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,880 UART: [kat] SHA2-256
891,430 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,559 UART: [kat] ++
895,711 UART: [kat] sha1
900,091 UART: [kat] SHA2-256
902,031 UART: [kat] SHA2-384
904,836 UART: [kat] SHA2-512-ACC
906,737 UART: [kat] ECC-384
916,182 UART: [kat] HMAC-384Kdf
920,612 UART: [kat] LMS
1,168,924 UART: [kat] --
1,169,863 UART: [cold-reset] ++
1,170,359 UART: [fht] FHT @ 0x50003400
1,173,127 UART: [idev] ++
1,173,295 UART: [idev] CDI.KEYID = 6
1,173,656 UART: [idev] SUBJECT.KEYID = 7
1,174,081 UART: [idev] UDS.KEYID = 0
1,182,045 UART: [idev] Erasing UDS.KEYID = 0
1,199,539 UART: [idev] Sha1 KeyId Algorithm
1,208,461 UART: [idev] --
1,209,492 UART: [ldev] ++
1,209,660 UART: [ldev] CDI.KEYID = 6
1,210,024 UART: [ldev] SUBJECT.KEYID = 5
1,210,451 UART: [ldev] AUTHORITY.KEYID = 7
1,210,914 UART: [ldev] FE.KEYID = 1
1,216,400 UART: [ldev] Erasing FE.KEYID = 1
1,242,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,298 UART: [ldev] --
1,281,682 UART: [fwproc] Wait for Commands...
1,282,487 UART: [fwproc] Recv command 0x46574c44
1,283,220 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,032 UART: ROM Fatal Error: 0x000B0028
2,582,189 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,476 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
891,665 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,794 UART: [kat] ++
895,946 UART: [kat] sha1
900,128 UART: [kat] SHA2-256
902,068 UART: [kat] SHA2-384
904,917 UART: [kat] SHA2-512-ACC
906,818 UART: [kat] ECC-384
916,527 UART: [kat] HMAC-384Kdf
921,203 UART: [kat] LMS
1,169,515 UART: [kat] --
1,170,260 UART: [cold-reset] ++
1,170,710 UART: [fht] FHT @ 0x50003400
1,173,406 UART: [idev] ++
1,173,574 UART: [idev] CDI.KEYID = 6
1,173,935 UART: [idev] SUBJECT.KEYID = 7
1,174,360 UART: [idev] UDS.KEYID = 0
1,182,206 UART: [idev] Erasing UDS.KEYID = 0
1,199,810 UART: [idev] Sha1 KeyId Algorithm
1,208,658 UART: [idev] --
1,209,771 UART: [ldev] ++
1,209,939 UART: [ldev] CDI.KEYID = 6
1,210,303 UART: [ldev] SUBJECT.KEYID = 5
1,210,730 UART: [ldev] AUTHORITY.KEYID = 7
1,211,193 UART: [ldev] FE.KEYID = 1
1,216,511 UART: [ldev] Erasing FE.KEYID = 1
1,242,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,937 UART: [ldev] --
1,282,391 UART: [fwproc] Wait for Commands...
1,282,962 UART: [fwproc] Recv command 0x46574c44
1,283,695 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,760 UART: ROM Fatal Error: 0x000B0028
2,581,917 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,435,395 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,831 UART: [state] WD Timer not started. Device not locked for debugging
88,168 UART: [kat] SHA2-256
891,718 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,847 UART: [kat] ++
895,999 UART: [kat] sha1
899,999 UART: [kat] SHA2-256
901,939 UART: [kat] SHA2-384
904,770 UART: [kat] SHA2-512-ACC
906,671 UART: [kat] ECC-384
915,932 UART: [kat] HMAC-384Kdf
920,564 UART: [kat] LMS
1,168,876 UART: [kat] --
1,169,721 UART: [cold-reset] ++
1,170,147 UART: [fht] FHT @ 0x50003400
1,172,849 UART: [idev] ++
1,173,017 UART: [idev] CDI.KEYID = 6
1,173,378 UART: [idev] SUBJECT.KEYID = 7
1,173,803 UART: [idev] UDS.KEYID = 0
1,181,907 UART: [idev] Erasing UDS.KEYID = 0
1,198,899 UART: [idev] Sha1 KeyId Algorithm
1,207,923 UART: [idev] --
1,208,894 UART: [ldev] ++
1,209,062 UART: [ldev] CDI.KEYID = 6
1,209,426 UART: [ldev] SUBJECT.KEYID = 5
1,209,853 UART: [ldev] AUTHORITY.KEYID = 7
1,210,316 UART: [ldev] FE.KEYID = 1
1,215,408 UART: [ldev] Erasing FE.KEYID = 1
1,241,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,800 UART: [ldev] --
1,281,070 UART: [fwproc] Wait for Commands...
1,281,721 UART: [fwproc] Recv command 0x46574c44
1,282,454 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,192 UART: ROM Fatal Error: 0x000B0029
2,580,349 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,886 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,941 UART: [state] LifecycleState = Unprovisioned
86,596 UART: [state] DebugLocked = No
87,152 UART: [state] WD Timer not started. Device not locked for debugging
88,259 UART: [kat] SHA2-256
891,809 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,938 UART: [kat] ++
896,090 UART: [kat] sha1
900,458 UART: [kat] SHA2-256
902,398 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,515 UART: [kat] HMAC-384Kdf
921,087 UART: [kat] LMS
1,169,399 UART: [kat] --
1,170,278 UART: [cold-reset] ++
1,170,806 UART: [fht] FHT @ 0x50003400
1,173,432 UART: [idev] ++
1,173,600 UART: [idev] CDI.KEYID = 6
1,173,961 UART: [idev] SUBJECT.KEYID = 7
1,174,386 UART: [idev] UDS.KEYID = 0
1,182,358 UART: [idev] Erasing UDS.KEYID = 0
1,199,190 UART: [idev] Sha1 KeyId Algorithm
1,208,030 UART: [idev] --
1,209,043 UART: [ldev] ++
1,209,211 UART: [ldev] CDI.KEYID = 6
1,209,575 UART: [ldev] SUBJECT.KEYID = 5
1,210,002 UART: [ldev] AUTHORITY.KEYID = 7
1,210,465 UART: [ldev] FE.KEYID = 1
1,215,761 UART: [ldev] Erasing FE.KEYID = 1
1,242,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,557 UART: [ldev] --
1,281,973 UART: [fwproc] Wait for Commands...
1,282,680 UART: [fwproc] Recv command 0x46574c44
1,283,413 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,985 UART: ROM Fatal Error: 0x000B0029
2,581,142 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,577 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,497 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,817 UART: [kat] SHA2-256
901,757 UART: [kat] SHA2-384
904,354 UART: [kat] SHA2-512-ACC
906,255 UART: [kat] ECC-384
916,412 UART: [kat] HMAC-384Kdf
920,870 UART: [kat] LMS
1,169,182 UART: [kat] --
1,170,223 UART: [cold-reset] ++
1,170,757 UART: [fht] FHT @ 0x50003400
1,173,611 UART: [idev] ++
1,173,779 UART: [idev] CDI.KEYID = 6
1,174,140 UART: [idev] SUBJECT.KEYID = 7
1,174,565 UART: [idev] UDS.KEYID = 0
1,182,249 UART: [idev] Erasing UDS.KEYID = 0
1,199,407 UART: [idev] Sha1 KeyId Algorithm
1,208,297 UART: [idev] --
1,209,548 UART: [ldev] ++
1,209,716 UART: [ldev] CDI.KEYID = 6
1,210,080 UART: [ldev] SUBJECT.KEYID = 5
1,210,507 UART: [ldev] AUTHORITY.KEYID = 7
1,210,970 UART: [ldev] FE.KEYID = 1
1,216,160 UART: [ldev] Erasing FE.KEYID = 1
1,242,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,754 UART: [ldev] --
1,281,266 UART: [fwproc] Wait for Commands...
1,281,867 UART: [fwproc] Recv command 0x46574c44
1,282,600 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,124 UART: ROM Fatal Error: 0x000B0029
2,581,281 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,542 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,848 UART: [state] DebugLocked = No
86,502 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
891,247 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,376 UART: [kat] ++
895,528 UART: [kat] sha1
899,584 UART: [kat] SHA2-256
901,524 UART: [kat] SHA2-384
904,383 UART: [kat] SHA2-512-ACC
906,284 UART: [kat] ECC-384
916,555 UART: [kat] HMAC-384Kdf
921,103 UART: [kat] LMS
1,169,415 UART: [kat] --
1,170,432 UART: [cold-reset] ++
1,170,822 UART: [fht] FHT @ 0x50003400
1,173,688 UART: [idev] ++
1,173,856 UART: [idev] CDI.KEYID = 6
1,174,217 UART: [idev] SUBJECT.KEYID = 7
1,174,642 UART: [idev] UDS.KEYID = 0
1,182,568 UART: [idev] Erasing UDS.KEYID = 0
1,199,566 UART: [idev] Sha1 KeyId Algorithm
1,208,374 UART: [idev] --
1,209,547 UART: [ldev] ++
1,209,715 UART: [ldev] CDI.KEYID = 6
1,210,079 UART: [ldev] SUBJECT.KEYID = 5
1,210,506 UART: [ldev] AUTHORITY.KEYID = 7
1,210,969 UART: [ldev] FE.KEYID = 1
1,215,959 UART: [ldev] Erasing FE.KEYID = 1
1,242,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,073 UART: [ldev] --
1,281,375 UART: [fwproc] Wait for Commands...
1,282,106 UART: [fwproc] Recv command 0x46574c44
1,282,839 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,779 UART: ROM Fatal Error: 0x000B0029
2,579,936 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,357 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,542 UART: [state] LifecycleState = Unprovisioned
86,197 UART: [state] DebugLocked = No
86,777 UART: [state] WD Timer not started. Device not locked for debugging
88,078 UART: [kat] SHA2-256
891,628 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,757 UART: [kat] ++
895,909 UART: [kat] sha1
900,181 UART: [kat] SHA2-256
902,121 UART: [kat] SHA2-384
904,954 UART: [kat] SHA2-512-ACC
906,855 UART: [kat] ECC-384
916,076 UART: [kat] HMAC-384Kdf
920,642 UART: [kat] LMS
1,168,954 UART: [kat] --
1,169,865 UART: [cold-reset] ++
1,170,425 UART: [fht] FHT @ 0x50003400
1,172,911 UART: [idev] ++
1,173,079 UART: [idev] CDI.KEYID = 6
1,173,440 UART: [idev] SUBJECT.KEYID = 7
1,173,865 UART: [idev] UDS.KEYID = 0
1,181,899 UART: [idev] Erasing UDS.KEYID = 0
1,199,721 UART: [idev] Sha1 KeyId Algorithm
1,208,661 UART: [idev] --
1,209,642 UART: [ldev] ++
1,209,810 UART: [ldev] CDI.KEYID = 6
1,210,174 UART: [ldev] SUBJECT.KEYID = 5
1,210,601 UART: [ldev] AUTHORITY.KEYID = 7
1,211,064 UART: [ldev] FE.KEYID = 1
1,216,380 UART: [ldev] Erasing FE.KEYID = 1
1,242,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,908 UART: [ldev] --
1,281,340 UART: [fwproc] Wait for Commands...
1,281,923 UART: [fwproc] Recv command 0x46574c44
1,282,656 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,074 UART: ROM Fatal Error: 0x000B0029
2,580,231 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,588 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
891,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,558 UART: [kat] ++
895,710 UART: [kat] sha1
900,032 UART: [kat] SHA2-256
901,972 UART: [kat] SHA2-384
904,761 UART: [kat] SHA2-512-ACC
906,662 UART: [kat] ECC-384
916,069 UART: [kat] HMAC-384Kdf
920,547 UART: [kat] LMS
1,168,859 UART: [kat] --
1,169,838 UART: [cold-reset] ++
1,170,368 UART: [fht] FHT @ 0x50003400
1,172,926 UART: [idev] ++
1,173,094 UART: [idev] CDI.KEYID = 6
1,173,455 UART: [idev] SUBJECT.KEYID = 7
1,173,880 UART: [idev] UDS.KEYID = 0
1,181,994 UART: [idev] Erasing UDS.KEYID = 0
1,199,672 UART: [idev] Sha1 KeyId Algorithm
1,208,522 UART: [idev] --
1,209,553 UART: [ldev] ++
1,209,721 UART: [ldev] CDI.KEYID = 6
1,210,085 UART: [ldev] SUBJECT.KEYID = 5
1,210,512 UART: [ldev] AUTHORITY.KEYID = 7
1,210,975 UART: [ldev] FE.KEYID = 1
1,216,277 UART: [ldev] Erasing FE.KEYID = 1
1,242,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,143 UART: [ldev] --
1,281,509 UART: [fwproc] Wait for Commands...
1,282,094 UART: [fwproc] Recv command 0x46574c44
1,282,827 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,271 UART: ROM Fatal Error: 0x000B0029
2,580,428 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,051 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,528 UART: [state] LifecycleState = Unprovisioned
86,183 UART: [state] DebugLocked = No
86,779 UART: [state] WD Timer not started. Device not locked for debugging
88,030 UART: [kat] SHA2-256
891,580 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,709 UART: [kat] ++
895,861 UART: [kat] sha1
900,259 UART: [kat] SHA2-256
902,199 UART: [kat] SHA2-384
904,726 UART: [kat] SHA2-512-ACC
906,627 UART: [kat] ECC-384
916,788 UART: [kat] HMAC-384Kdf
921,256 UART: [kat] LMS
1,169,568 UART: [kat] --
1,170,589 UART: [cold-reset] ++
1,170,985 UART: [fht] FHT @ 0x50003400
1,173,423 UART: [idev] ++
1,173,591 UART: [idev] CDI.KEYID = 6
1,173,952 UART: [idev] SUBJECT.KEYID = 7
1,174,377 UART: [idev] UDS.KEYID = 0
1,182,717 UART: [idev] Erasing UDS.KEYID = 0
1,199,443 UART: [idev] Sha1 KeyId Algorithm
1,208,277 UART: [idev] --
1,209,460 UART: [ldev] ++
1,209,628 UART: [ldev] CDI.KEYID = 6
1,209,992 UART: [ldev] SUBJECT.KEYID = 5
1,210,419 UART: [ldev] AUTHORITY.KEYID = 7
1,210,882 UART: [ldev] FE.KEYID = 1
1,216,096 UART: [ldev] Erasing FE.KEYID = 1
1,242,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,442 UART: [ldev] --
1,281,916 UART: [fwproc] Wait for Commands...
1,282,709 UART: [fwproc] Recv command 0x46574c44
1,283,442 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,904 UART: ROM Fatal Error: 0x000B0028
2,582,061 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,854 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,581 UART: [kat] SHA2-256
891,131 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,260 UART: [kat] ++
895,412 UART: [kat] sha1
899,800 UART: [kat] SHA2-256
901,740 UART: [kat] SHA2-384
904,331 UART: [kat] SHA2-512-ACC
906,232 UART: [kat] ECC-384
915,807 UART: [kat] HMAC-384Kdf
920,639 UART: [kat] LMS
1,168,951 UART: [kat] --
1,169,878 UART: [cold-reset] ++
1,170,270 UART: [fht] FHT @ 0x50003400
1,172,878 UART: [idev] ++
1,173,046 UART: [idev] CDI.KEYID = 6
1,173,407 UART: [idev] SUBJECT.KEYID = 7
1,173,832 UART: [idev] UDS.KEYID = 0
1,182,014 UART: [idev] Erasing UDS.KEYID = 0
1,199,360 UART: [idev] Sha1 KeyId Algorithm
1,208,234 UART: [idev] --
1,209,141 UART: [ldev] ++
1,209,309 UART: [ldev] CDI.KEYID = 6
1,209,673 UART: [ldev] SUBJECT.KEYID = 5
1,210,100 UART: [ldev] AUTHORITY.KEYID = 7
1,210,563 UART: [ldev] FE.KEYID = 1
1,215,913 UART: [ldev] Erasing FE.KEYID = 1
1,242,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,701 UART: [ldev] --
1,282,129 UART: [fwproc] Wait for Commands...
1,282,840 UART: [fwproc] Recv command 0x46574c44
1,283,573 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,389 UART: ROM Fatal Error: 0x000B0028
2,581,546 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,435,113 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,222 UART: [kat] SHA2-256
890,772 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,901 UART: [kat] ++
895,053 UART: [kat] sha1
899,325 UART: [kat] SHA2-256
901,265 UART: [kat] SHA2-384
904,164 UART: [kat] SHA2-512-ACC
906,065 UART: [kat] ECC-384
916,122 UART: [kat] HMAC-384Kdf
920,580 UART: [kat] LMS
1,168,892 UART: [kat] --
1,169,815 UART: [cold-reset] ++
1,170,355 UART: [fht] FHT @ 0x50003400
1,173,135 UART: [idev] ++
1,173,303 UART: [idev] CDI.KEYID = 6
1,173,664 UART: [idev] SUBJECT.KEYID = 7
1,174,089 UART: [idev] UDS.KEYID = 0
1,181,655 UART: [idev] Erasing UDS.KEYID = 0
1,198,661 UART: [idev] Sha1 KeyId Algorithm
1,207,607 UART: [idev] --
1,208,826 UART: [ldev] ++
1,208,994 UART: [ldev] CDI.KEYID = 6
1,209,358 UART: [ldev] SUBJECT.KEYID = 5
1,209,785 UART: [ldev] AUTHORITY.KEYID = 7
1,210,248 UART: [ldev] FE.KEYID = 1
1,215,222 UART: [ldev] Erasing FE.KEYID = 1
1,241,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,736 UART: [ldev] --
1,281,094 UART: [fwproc] Wait for Commands...
1,281,749 UART: [fwproc] Recv command 0x46574c44
1,282,482 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,018 UART: ROM Fatal Error: 0x000B0028
2,580,175 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,430,956 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
891,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,686 UART: [kat] ++
895,838 UART: [kat] sha1
900,022 UART: [kat] SHA2-256
901,962 UART: [kat] SHA2-384
904,593 UART: [kat] SHA2-512-ACC
906,494 UART: [kat] ECC-384
916,615 UART: [kat] HMAC-384Kdf
921,225 UART: [kat] LMS
1,169,537 UART: [kat] --
1,170,526 UART: [cold-reset] ++
1,171,032 UART: [fht] FHT @ 0x50003400
1,173,684 UART: [idev] ++
1,173,852 UART: [idev] CDI.KEYID = 6
1,174,213 UART: [idev] SUBJECT.KEYID = 7
1,174,638 UART: [idev] UDS.KEYID = 0
1,182,658 UART: [idev] Erasing UDS.KEYID = 0
1,199,548 UART: [idev] Sha1 KeyId Algorithm
1,208,490 UART: [idev] --
1,209,583 UART: [ldev] ++
1,209,751 UART: [ldev] CDI.KEYID = 6
1,210,115 UART: [ldev] SUBJECT.KEYID = 5
1,210,542 UART: [ldev] AUTHORITY.KEYID = 7
1,211,005 UART: [ldev] FE.KEYID = 1
1,216,195 UART: [ldev] Erasing FE.KEYID = 1
1,242,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,147 UART: [ldev] --
1,281,421 UART: [fwproc] Wait for Commands...
1,282,190 UART: [fwproc] Recv command 0x46574c44
1,282,923 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,766 UART: ROM Fatal Error: 0x000B0028
2,580,923 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,549 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,644 UART: [state] LifecycleState = Unprovisioned
86,299 UART: [state] DebugLocked = No
86,873 UART: [state] WD Timer not started. Device not locked for debugging
88,076 UART: [kat] SHA2-256
891,626 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,755 UART: [kat] ++
895,907 UART: [kat] sha1
900,213 UART: [kat] SHA2-256
902,153 UART: [kat] SHA2-384
904,762 UART: [kat] SHA2-512-ACC
906,663 UART: [kat] ECC-384
916,394 UART: [kat] HMAC-384Kdf
920,986 UART: [kat] LMS
1,169,298 UART: [kat] --
1,170,257 UART: [cold-reset] ++
1,170,605 UART: [fht] FHT @ 0x50003400
1,173,341 UART: [idev] ++
1,173,509 UART: [idev] CDI.KEYID = 6
1,173,870 UART: [idev] SUBJECT.KEYID = 7
1,174,295 UART: [idev] UDS.KEYID = 0
1,182,375 UART: [idev] Erasing UDS.KEYID = 0
1,199,393 UART: [idev] Sha1 KeyId Algorithm
1,208,261 UART: [idev] --
1,209,102 UART: [ldev] ++
1,209,270 UART: [ldev] CDI.KEYID = 6
1,209,634 UART: [ldev] SUBJECT.KEYID = 5
1,210,061 UART: [ldev] AUTHORITY.KEYID = 7
1,210,524 UART: [ldev] FE.KEYID = 1
1,215,492 UART: [ldev] Erasing FE.KEYID = 1
1,241,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,284 UART: [ldev] --
1,280,778 UART: [fwproc] Wait for Commands...
1,281,487 UART: [fwproc] Recv command 0x46574c44
1,282,220 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,830 UART: ROM Fatal Error: 0x000B0028
2,580,987 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,429,776 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,318 UART: [kat] ++
895,470 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,361 UART: [kat] SHA2-512-ACC
906,262 UART: [kat] ECC-384
915,701 UART: [kat] HMAC-384Kdf
920,159 UART: [kat] LMS
1,168,471 UART: [kat] --
1,169,186 UART: [cold-reset] ++
1,169,618 UART: [fht] FHT @ 0x50003400
1,172,134 UART: [idev] ++
1,172,302 UART: [idev] CDI.KEYID = 6
1,172,663 UART: [idev] SUBJECT.KEYID = 7
1,173,088 UART: [idev] UDS.KEYID = 0
1,180,938 UART: [idev] Erasing UDS.KEYID = 0
1,198,550 UART: [idev] Sha1 KeyId Algorithm
1,207,322 UART: [idev] --
1,208,479 UART: [ldev] ++
1,208,647 UART: [ldev] CDI.KEYID = 6
1,209,011 UART: [ldev] SUBJECT.KEYID = 5
1,209,438 UART: [ldev] AUTHORITY.KEYID = 7
1,209,901 UART: [ldev] FE.KEYID = 1
1,215,141 UART: [ldev] Erasing FE.KEYID = 1
1,241,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,105 UART: [ldev] --
1,280,575 UART: [fwproc] Wait for Commands...
1,281,358 UART: [fwproc] Recv command 0x46574c44
1,282,091 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,459 UART: ROM Fatal Error: 0x000B0028
2,579,616 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,937 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Manufacturing
85,665 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,470 UART: [kat] SHA2-256
891,020 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,149 UART: [kat] ++
895,301 UART: [kat] sha1
899,521 UART: [kat] SHA2-256
901,461 UART: [kat] SHA2-384
904,050 UART: [kat] SHA2-512-ACC
905,951 UART: [kat] ECC-384
915,648 UART: [kat] HMAC-384Kdf
920,262 UART: [kat] LMS
1,168,574 UART: [kat] --
1,169,557 UART: [cold-reset] ++
1,170,027 UART: [fht] FHT @ 0x50003400
1,172,777 UART: [idev] ++
1,172,945 UART: [idev] CDI.KEYID = 6
1,173,306 UART: [idev] SUBJECT.KEYID = 7
1,173,731 UART: [idev] UDS.KEYID = 0
1,181,847 UART: [idev] Erasing UDS.KEYID = 0
1,199,239 UART: [idev] Sha1 KeyId Algorithm
1,208,161 UART: [idev] --
1,209,206 UART: [ldev] ++
1,209,374 UART: [ldev] CDI.KEYID = 6
1,209,738 UART: [ldev] SUBJECT.KEYID = 5
1,210,165 UART: [ldev] AUTHORITY.KEYID = 7
1,210,628 UART: [ldev] FE.KEYID = 1
1,215,982 UART: [ldev] Erasing FE.KEYID = 1
1,242,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,316 UART: [ldev] --
1,281,616 UART: [fwproc] Wait for Commands...
1,282,317 UART: [fwproc] Recv command 0x46574c44
1,283,050 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,613 UART: ROM Fatal Error: 0x000B002C
2,606,772 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,457,919 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Manufacturing
86,238 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
891,651 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,780 UART: [kat] ++
895,932 UART: [kat] sha1
900,132 UART: [kat] SHA2-256
902,072 UART: [kat] SHA2-384
904,765 UART: [kat] SHA2-512-ACC
906,666 UART: [kat] ECC-384
916,867 UART: [kat] HMAC-384Kdf
921,519 UART: [kat] LMS
1,169,831 UART: [kat] --
1,170,774 UART: [cold-reset] ++
1,171,100 UART: [fht] FHT @ 0x50003400
1,173,632 UART: [idev] ++
1,173,800 UART: [idev] CDI.KEYID = 6
1,174,161 UART: [idev] SUBJECT.KEYID = 7
1,174,586 UART: [idev] UDS.KEYID = 0
1,182,512 UART: [idev] Erasing UDS.KEYID = 0
1,199,594 UART: [idev] Sha1 KeyId Algorithm
1,208,438 UART: [idev] --
1,209,403 UART: [ldev] ++
1,209,571 UART: [ldev] CDI.KEYID = 6
1,209,935 UART: [ldev] SUBJECT.KEYID = 5
1,210,362 UART: [ldev] AUTHORITY.KEYID = 7
1,210,825 UART: [ldev] FE.KEYID = 1
1,216,323 UART: [ldev] Erasing FE.KEYID = 1
1,242,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,577 UART: [ldev] --
1,282,025 UART: [fwproc] Wait for Commands...
1,282,666 UART: [fwproc] Recv command 0x46574c44
1,283,399 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,160 UART: ROM Fatal Error: 0x000B002C
2,606,319 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,457,538 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Manufacturing
85,969 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,840 UART: [kat] SHA2-256
891,390 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,519 UART: [kat] ++
895,671 UART: [kat] sha1
899,793 UART: [kat] SHA2-256
901,733 UART: [kat] SHA2-384
904,404 UART: [kat] SHA2-512-ACC
906,305 UART: [kat] ECC-384
915,938 UART: [kat] HMAC-384Kdf
920,498 UART: [kat] LMS
1,168,810 UART: [kat] --
1,169,655 UART: [cold-reset] ++
1,169,995 UART: [fht] FHT @ 0x50003400
1,172,781 UART: [idev] ++
1,172,949 UART: [idev] CDI.KEYID = 6
1,173,310 UART: [idev] SUBJECT.KEYID = 7
1,173,735 UART: [idev] UDS.KEYID = 0
1,181,803 UART: [idev] Erasing UDS.KEYID = 0
1,199,097 UART: [idev] Sha1 KeyId Algorithm
1,207,819 UART: [idev] --
1,209,020 UART: [ldev] ++
1,209,188 UART: [ldev] CDI.KEYID = 6
1,209,552 UART: [ldev] SUBJECT.KEYID = 5
1,209,979 UART: [ldev] AUTHORITY.KEYID = 7
1,210,442 UART: [ldev] FE.KEYID = 1
1,215,570 UART: [ldev] Erasing FE.KEYID = 1
1,242,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,130 UART: [ldev] --
1,281,492 UART: [fwproc] Wait for Commands...
1,282,273 UART: [fwproc] Recv command 0x46574c44
1,283,006 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,935 UART: ROM Fatal Error: 0x000B002C
2,606,094 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,457,143 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Manufacturing
86,086 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,500 UART: [kat] ++
895,652 UART: [kat] sha1
900,088 UART: [kat] SHA2-256
902,028 UART: [kat] SHA2-384
904,745 UART: [kat] SHA2-512-ACC
906,646 UART: [kat] ECC-384
916,399 UART: [kat] HMAC-384Kdf
921,177 UART: [kat] LMS
1,169,489 UART: [kat] --
1,170,248 UART: [cold-reset] ++
1,170,798 UART: [fht] FHT @ 0x50003400
1,173,660 UART: [idev] ++
1,173,828 UART: [idev] CDI.KEYID = 6
1,174,189 UART: [idev] SUBJECT.KEYID = 7
1,174,614 UART: [idev] UDS.KEYID = 0
1,182,620 UART: [idev] Erasing UDS.KEYID = 0
1,200,410 UART: [idev] Sha1 KeyId Algorithm
1,209,496 UART: [idev] --
1,210,713 UART: [ldev] ++
1,210,881 UART: [ldev] CDI.KEYID = 6
1,211,245 UART: [ldev] SUBJECT.KEYID = 5
1,211,672 UART: [ldev] AUTHORITY.KEYID = 7
1,212,135 UART: [ldev] FE.KEYID = 1
1,217,227 UART: [ldev] Erasing FE.KEYID = 1
1,243,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,227 UART: [ldev] --
1,282,511 UART: [fwproc] Wait for Commands...
1,283,168 UART: [fwproc] Recv command 0x46574c44
1,283,901 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,674 UART: ROM Fatal Error: 0x000B002C
2,606,833 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,458,556 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Manufacturing
85,583 UART: [state] DebugLocked = No
86,227 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
891,018 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,147 UART: [kat] ++
895,299 UART: [kat] sha1
899,643 UART: [kat] SHA2-256
901,583 UART: [kat] SHA2-384
904,134 UART: [kat] SHA2-512-ACC
906,035 UART: [kat] ECC-384
915,606 UART: [kat] HMAC-384Kdf
920,234 UART: [kat] LMS
1,168,546 UART: [kat] --
1,169,437 UART: [cold-reset] ++
1,169,821 UART: [fht] FHT @ 0x50003400
1,172,389 UART: [idev] ++
1,172,557 UART: [idev] CDI.KEYID = 6
1,172,918 UART: [idev] SUBJECT.KEYID = 7
1,173,343 UART: [idev] UDS.KEYID = 0
1,180,927 UART: [idev] Erasing UDS.KEYID = 0
1,197,595 UART: [idev] Sha1 KeyId Algorithm
1,206,595 UART: [idev] --
1,207,712 UART: [ldev] ++
1,207,880 UART: [ldev] CDI.KEYID = 6
1,208,244 UART: [ldev] SUBJECT.KEYID = 5
1,208,671 UART: [ldev] AUTHORITY.KEYID = 7
1,209,134 UART: [ldev] FE.KEYID = 1
1,214,596 UART: [ldev] Erasing FE.KEYID = 1
1,240,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,712 UART: [ldev] --
1,280,120 UART: [fwproc] Wait for Commands...
1,280,875 UART: [fwproc] Recv command 0x46574c44
1,281,608 UART: [fwproc] Recv'd Img size: 114332 bytes
2,603,791 UART: ROM Fatal Error: 0x000B002C
2,604,950 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,456,725 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Manufacturing
86,088 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
891,475 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,604 UART: [kat] ++
895,756 UART: [kat] sha1
900,056 UART: [kat] SHA2-256
901,996 UART: [kat] SHA2-384
904,881 UART: [kat] SHA2-512-ACC
906,782 UART: [kat] ECC-384
916,907 UART: [kat] HMAC-384Kdf
921,433 UART: [kat] LMS
1,169,745 UART: [kat] --
1,170,724 UART: [cold-reset] ++
1,171,236 UART: [fht] FHT @ 0x50003400
1,173,876 UART: [idev] ++
1,174,044 UART: [idev] CDI.KEYID = 6
1,174,405 UART: [idev] SUBJECT.KEYID = 7
1,174,830 UART: [idev] UDS.KEYID = 0
1,182,848 UART: [idev] Erasing UDS.KEYID = 0
1,199,776 UART: [idev] Sha1 KeyId Algorithm
1,208,588 UART: [idev] --
1,209,785 UART: [ldev] ++
1,209,953 UART: [ldev] CDI.KEYID = 6
1,210,317 UART: [ldev] SUBJECT.KEYID = 5
1,210,744 UART: [ldev] AUTHORITY.KEYID = 7
1,211,207 UART: [ldev] FE.KEYID = 1
1,216,377 UART: [ldev] Erasing FE.KEYID = 1
1,242,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,049 UART: [ldev] --
1,281,441 UART: [fwproc] Wait for Commands...
1,282,104 UART: [fwproc] Recv command 0x46574c44
1,282,837 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,208 UART: ROM Fatal Error: 0x000B002C
2,607,367 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,459,734 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Manufacturing
85,483 UART: [state] DebugLocked = No
86,073 UART: [state] WD Timer not started. Device not locked for debugging
87,348 UART: [kat] SHA2-256
890,898 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,027 UART: [kat] ++
895,179 UART: [kat] sha1
899,607 UART: [kat] SHA2-256
901,547 UART: [kat] SHA2-384
904,354 UART: [kat] SHA2-512-ACC
906,255 UART: [kat] ECC-384
916,194 UART: [kat] HMAC-384Kdf
920,780 UART: [kat] LMS
1,169,092 UART: [kat] --
1,169,851 UART: [cold-reset] ++
1,170,191 UART: [fht] FHT @ 0x50003400
1,172,915 UART: [idev] ++
1,173,083 UART: [idev] CDI.KEYID = 6
1,173,444 UART: [idev] SUBJECT.KEYID = 7
1,173,869 UART: [idev] UDS.KEYID = 0
1,182,255 UART: [idev] Erasing UDS.KEYID = 0
1,199,499 UART: [idev] Sha1 KeyId Algorithm
1,208,469 UART: [idev] --
1,209,542 UART: [ldev] ++
1,209,710 UART: [ldev] CDI.KEYID = 6
1,210,074 UART: [ldev] SUBJECT.KEYID = 5
1,210,501 UART: [ldev] AUTHORITY.KEYID = 7
1,210,964 UART: [ldev] FE.KEYID = 1
1,216,160 UART: [ldev] Erasing FE.KEYID = 1
1,242,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,942 UART: [ldev] --
1,281,440 UART: [fwproc] Wait for Commands...
1,282,073 UART: [fwproc] Recv command 0x46574c44
1,282,806 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,027 UART: ROM Fatal Error: 0x000B002E
2,606,186 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,458,179 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,779 UART: [state] LifecycleState = Manufacturing
86,434 UART: [state] DebugLocked = No
86,954 UART: [state] WD Timer not started. Device not locked for debugging
88,205 UART: [kat] SHA2-256
891,755 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,884 UART: [kat] ++
896,036 UART: [kat] sha1
900,258 UART: [kat] SHA2-256
902,198 UART: [kat] SHA2-384
904,797 UART: [kat] SHA2-512-ACC
906,698 UART: [kat] ECC-384
916,489 UART: [kat] HMAC-384Kdf
920,975 UART: [kat] LMS
1,169,287 UART: [kat] --
1,170,156 UART: [cold-reset] ++
1,170,664 UART: [fht] FHT @ 0x50003400
1,173,460 UART: [idev] ++
1,173,628 UART: [idev] CDI.KEYID = 6
1,173,989 UART: [idev] SUBJECT.KEYID = 7
1,174,414 UART: [idev] UDS.KEYID = 0
1,182,338 UART: [idev] Erasing UDS.KEYID = 0
1,199,884 UART: [idev] Sha1 KeyId Algorithm
1,208,754 UART: [idev] --
1,209,819 UART: [ldev] ++
1,209,987 UART: [ldev] CDI.KEYID = 6
1,210,351 UART: [ldev] SUBJECT.KEYID = 5
1,210,778 UART: [ldev] AUTHORITY.KEYID = 7
1,211,241 UART: [ldev] FE.KEYID = 1
1,216,323 UART: [ldev] Erasing FE.KEYID = 1
1,242,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,769 UART: [ldev] --
1,281,127 UART: [fwproc] Wait for Commands...
1,281,766 UART: [fwproc] Recv command 0x46574c44
1,282,499 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,610 UART: ROM Fatal Error: 0x000B002E
2,605,769 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,457,688 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Manufacturing
85,763 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
891,074 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,203 UART: [kat] ++
895,355 UART: [kat] sha1
899,529 UART: [kat] SHA2-256
901,469 UART: [kat] SHA2-384
904,102 UART: [kat] SHA2-512-ACC
906,003 UART: [kat] ECC-384
915,934 UART: [kat] HMAC-384Kdf
920,576 UART: [kat] LMS
1,168,888 UART: [kat] --
1,169,571 UART: [cold-reset] ++
1,170,115 UART: [fht] FHT @ 0x50003400
1,172,721 UART: [idev] ++
1,172,889 UART: [idev] CDI.KEYID = 6
1,173,250 UART: [idev] SUBJECT.KEYID = 7
1,173,675 UART: [idev] UDS.KEYID = 0
1,181,395 UART: [idev] Erasing UDS.KEYID = 0
1,198,553 UART: [idev] Sha1 KeyId Algorithm
1,207,351 UART: [idev] --
1,208,226 UART: [ldev] ++
1,208,394 UART: [ldev] CDI.KEYID = 6
1,208,758 UART: [ldev] SUBJECT.KEYID = 5
1,209,185 UART: [ldev] AUTHORITY.KEYID = 7
1,209,648 UART: [ldev] FE.KEYID = 1
1,215,016 UART: [ldev] Erasing FE.KEYID = 1
1,241,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,454 UART: [ldev] --
1,280,950 UART: [fwproc] Wait for Commands...
1,281,667 UART: [fwproc] Recv command 0x46574c44
1,282,400 UART: [fwproc] Recv'd Img size: 114332 bytes
2,603,353 UART: ROM Fatal Error: 0x000B002E
2,604,512 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,457,853 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Manufacturing
85,932 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
900,018 UART: [kat] SHA2-256
901,958 UART: [kat] SHA2-384
904,645 UART: [kat] SHA2-512-ACC
906,546 UART: [kat] ECC-384
916,531 UART: [kat] HMAC-384Kdf
921,079 UART: [kat] LMS
1,169,391 UART: [kat] --
1,170,284 UART: [cold-reset] ++
1,170,770 UART: [fht] FHT @ 0x50003400
1,173,520 UART: [idev] ++
1,173,688 UART: [idev] CDI.KEYID = 6
1,174,049 UART: [idev] SUBJECT.KEYID = 7
1,174,474 UART: [idev] UDS.KEYID = 0
1,182,472 UART: [idev] Erasing UDS.KEYID = 0
1,198,988 UART: [idev] Sha1 KeyId Algorithm
1,207,852 UART: [idev] --
1,208,863 UART: [ldev] ++
1,209,031 UART: [ldev] CDI.KEYID = 6
1,209,395 UART: [ldev] SUBJECT.KEYID = 5
1,209,822 UART: [ldev] AUTHORITY.KEYID = 7
1,210,285 UART: [ldev] FE.KEYID = 1
1,215,803 UART: [ldev] Erasing FE.KEYID = 1
1,242,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,097 UART: [ldev] --
1,281,371 UART: [fwproc] Wait for Commands...
1,282,054 UART: [fwproc] Recv command 0x46574c44
1,282,787 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,594 UART: ROM Fatal Error: 0x000B002E
2,605,753 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,458,606 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Manufacturing
85,779 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
891,154 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,283 UART: [kat] ++
895,435 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,392 UART: [kat] SHA2-512-ACC
906,293 UART: [kat] ECC-384
915,668 UART: [kat] HMAC-384Kdf
920,284 UART: [kat] LMS
1,168,596 UART: [kat] --
1,169,477 UART: [cold-reset] ++
1,169,867 UART: [fht] FHT @ 0x50003400
1,172,379 UART: [idev] ++
1,172,547 UART: [idev] CDI.KEYID = 6
1,172,908 UART: [idev] SUBJECT.KEYID = 7
1,173,333 UART: [idev] UDS.KEYID = 0
1,180,811 UART: [idev] Erasing UDS.KEYID = 0
1,198,099 UART: [idev] Sha1 KeyId Algorithm
1,206,771 UART: [idev] --
1,207,766 UART: [ldev] ++
1,207,934 UART: [ldev] CDI.KEYID = 6
1,208,298 UART: [ldev] SUBJECT.KEYID = 5
1,208,725 UART: [ldev] AUTHORITY.KEYID = 7
1,209,188 UART: [ldev] FE.KEYID = 1
1,214,250 UART: [ldev] Erasing FE.KEYID = 1
1,239,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,882 UART: [ldev] --
1,279,376 UART: [fwproc] Wait for Commands...
1,280,051 UART: [fwproc] Recv command 0x46574c44
1,280,784 UART: [fwproc] Recv'd Img size: 114332 bytes
2,603,091 UART: ROM Fatal Error: 0x000B002E
2,604,250 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,455,999 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,049 UART: [state] LifecycleState = Manufacturing
85,704 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,541 UART: [kat] SHA2-256
891,091 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,220 UART: [kat] ++
895,372 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,519 UART: [kat] SHA2-512-ACC
906,420 UART: [kat] ECC-384
915,977 UART: [kat] HMAC-384Kdf
920,749 UART: [kat] LMS
1,169,061 UART: [kat] --
1,169,856 UART: [cold-reset] ++
1,170,436 UART: [fht] FHT @ 0x50003400
1,173,172 UART: [idev] ++
1,173,340 UART: [idev] CDI.KEYID = 6
1,173,701 UART: [idev] SUBJECT.KEYID = 7
1,174,126 UART: [idev] UDS.KEYID = 0
1,182,548 UART: [idev] Erasing UDS.KEYID = 0
1,199,690 UART: [idev] Sha1 KeyId Algorithm
1,208,360 UART: [idev] --
1,209,499 UART: [ldev] ++
1,209,667 UART: [ldev] CDI.KEYID = 6
1,210,031 UART: [ldev] SUBJECT.KEYID = 5
1,210,458 UART: [ldev] AUTHORITY.KEYID = 7
1,210,921 UART: [ldev] FE.KEYID = 1
1,215,995 UART: [ldev] Erasing FE.KEYID = 1
1,242,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,229 UART: [ldev] --
1,281,661 UART: [fwproc] Wait for Commands...
1,282,482 UART: [fwproc] Recv command 0x46574c44
1,283,215 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,372 UART: ROM Fatal Error: 0x000B002E
2,606,531 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,456,922 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,495 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
890,968 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,097 UART: [kat] ++
895,249 UART: [kat] sha1
899,441 UART: [kat] SHA2-256
901,381 UART: [kat] SHA2-384
904,182 UART: [kat] SHA2-512-ACC
906,083 UART: [kat] ECC-384
915,642 UART: [kat] HMAC-384Kdf
920,230 UART: [kat] LMS
1,168,542 UART: [kat] --
1,169,085 UART: [cold-reset] ++
1,169,427 UART: [fht] FHT @ 0x50003400
1,172,259 UART: [idev] ++
1,172,427 UART: [idev] CDI.KEYID = 6
1,172,788 UART: [idev] SUBJECT.KEYID = 7
1,173,213 UART: [idev] UDS.KEYID = 0
1,181,179 UART: [idev] Erasing UDS.KEYID = 0
1,197,999 UART: [idev] Sha1 KeyId Algorithm
1,206,867 UART: [idev] --
1,207,782 UART: [ldev] ++
1,207,950 UART: [ldev] CDI.KEYID = 6
1,208,314 UART: [ldev] SUBJECT.KEYID = 5
1,208,741 UART: [ldev] AUTHORITY.KEYID = 7
1,209,204 UART: [ldev] FE.KEYID = 1
1,214,524 UART: [ldev] Erasing FE.KEYID = 1
1,241,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,990 UART: [ldev] --
1,280,382 UART: [fwproc] Wait for Commands...
1,280,971 UART: [fwproc] Recv command 0x46574c44
1,281,704 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,656 UART: ROM Fatal Error: 0x000B0018
1,330,813 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,482 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,554 UART: [kat] ++
895,706 UART: [kat] sha1
899,950 UART: [kat] SHA2-256
901,890 UART: [kat] SHA2-384
904,821 UART: [kat] SHA2-512-ACC
906,722 UART: [kat] ECC-384
916,757 UART: [kat] HMAC-384Kdf
921,399 UART: [kat] LMS
1,169,711 UART: [kat] --
1,170,650 UART: [cold-reset] ++
1,171,018 UART: [fht] FHT @ 0x50003400
1,173,754 UART: [idev] ++
1,173,922 UART: [idev] CDI.KEYID = 6
1,174,283 UART: [idev] SUBJECT.KEYID = 7
1,174,708 UART: [idev] UDS.KEYID = 0
1,182,600 UART: [idev] Erasing UDS.KEYID = 0
1,199,804 UART: [idev] Sha1 KeyId Algorithm
1,208,900 UART: [idev] --
1,209,837 UART: [ldev] ++
1,210,005 UART: [ldev] CDI.KEYID = 6
1,210,369 UART: [ldev] SUBJECT.KEYID = 5
1,210,796 UART: [ldev] AUTHORITY.KEYID = 7
1,211,259 UART: [ldev] FE.KEYID = 1
1,216,727 UART: [ldev] Erasing FE.KEYID = 1
1,243,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,143 UART: [ldev] --
1,282,567 UART: [fwproc] Wait for Commands...
1,283,278 UART: [fwproc] Recv command 0x46574c44
1,284,011 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,405 UART: ROM Fatal Error: 0x000B0018
1,332,562 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,483 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,652 UART: [state] LifecycleState = Unprovisioned
86,307 UART: [state] DebugLocked = No
86,811 UART: [state] WD Timer not started. Device not locked for debugging
88,102 UART: [kat] SHA2-256
891,652 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,781 UART: [kat] ++
895,933 UART: [kat] sha1
900,109 UART: [kat] SHA2-256
902,049 UART: [kat] SHA2-384
904,668 UART: [kat] SHA2-512-ACC
906,569 UART: [kat] ECC-384
915,882 UART: [kat] HMAC-384Kdf
920,458 UART: [kat] LMS
1,168,770 UART: [kat] --
1,169,577 UART: [cold-reset] ++
1,169,971 UART: [fht] FHT @ 0x50003400
1,172,687 UART: [idev] ++
1,172,855 UART: [idev] CDI.KEYID = 6
1,173,216 UART: [idev] SUBJECT.KEYID = 7
1,173,641 UART: [idev] UDS.KEYID = 0
1,181,845 UART: [idev] Erasing UDS.KEYID = 0
1,199,249 UART: [idev] Sha1 KeyId Algorithm
1,208,149 UART: [idev] --
1,209,278 UART: [ldev] ++
1,209,446 UART: [ldev] CDI.KEYID = 6
1,209,810 UART: [ldev] SUBJECT.KEYID = 5
1,210,237 UART: [ldev] AUTHORITY.KEYID = 7
1,210,700 UART: [ldev] FE.KEYID = 1
1,216,054 UART: [ldev] Erasing FE.KEYID = 1
1,242,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,286 UART: [ldev] --
1,281,558 UART: [fwproc] Wait for Commands...
1,282,315 UART: [fwproc] Recv command 0x46574c44
1,283,048 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,400 UART: ROM Fatal Error: 0x000B0018
1,331,557 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,400 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
891,647 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,776 UART: [kat] ++
895,928 UART: [kat] sha1
900,158 UART: [kat] SHA2-256
902,098 UART: [kat] SHA2-384
904,809 UART: [kat] SHA2-512-ACC
906,710 UART: [kat] ECC-384
916,581 UART: [kat] HMAC-384Kdf
921,289 UART: [kat] LMS
1,169,601 UART: [kat] --
1,170,650 UART: [cold-reset] ++
1,171,168 UART: [fht] FHT @ 0x50003400
1,173,868 UART: [idev] ++
1,174,036 UART: [idev] CDI.KEYID = 6
1,174,397 UART: [idev] SUBJECT.KEYID = 7
1,174,822 UART: [idev] UDS.KEYID = 0
1,182,946 UART: [idev] Erasing UDS.KEYID = 0
1,200,104 UART: [idev] Sha1 KeyId Algorithm
1,208,892 UART: [idev] --
1,209,937 UART: [ldev] ++
1,210,105 UART: [ldev] CDI.KEYID = 6
1,210,469 UART: [ldev] SUBJECT.KEYID = 5
1,210,896 UART: [ldev] AUTHORITY.KEYID = 7
1,211,359 UART: [ldev] FE.KEYID = 1
1,216,809 UART: [ldev] Erasing FE.KEYID = 1
1,243,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,317 UART: [ldev] --
1,282,731 UART: [fwproc] Wait for Commands...
1,283,402 UART: [fwproc] Recv command 0x46574c44
1,284,135 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,797 UART: ROM Fatal Error: 0x000B0018
1,332,954 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,261 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
891,388 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,517 UART: [kat] ++
895,669 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,516 UART: [kat] SHA2-512-ACC
906,417 UART: [kat] ECC-384
916,154 UART: [kat] HMAC-384Kdf
920,700 UART: [kat] LMS
1,169,012 UART: [kat] --
1,169,503 UART: [cold-reset] ++
1,170,047 UART: [fht] FHT @ 0x50003400
1,172,835 UART: [idev] ++
1,173,003 UART: [idev] CDI.KEYID = 6
1,173,364 UART: [idev] SUBJECT.KEYID = 7
1,173,789 UART: [idev] UDS.KEYID = 0
1,181,629 UART: [idev] Erasing UDS.KEYID = 0
1,198,541 UART: [idev] Sha1 KeyId Algorithm
1,207,563 UART: [idev] --
1,208,660 UART: [ldev] ++
1,208,828 UART: [ldev] CDI.KEYID = 6
1,209,192 UART: [ldev] SUBJECT.KEYID = 5
1,209,619 UART: [ldev] AUTHORITY.KEYID = 7
1,210,082 UART: [ldev] FE.KEYID = 1
1,215,200 UART: [ldev] Erasing FE.KEYID = 1
1,241,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,180 UART: [ldev] --
1,280,590 UART: [fwproc] Wait for Commands...
1,281,179 UART: [fwproc] Recv command 0x46574c44
1,281,912 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,144 UART: ROM Fatal Error: 0x000B0018
1,330,301 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,676 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,011 UART: [state] LifecycleState = Unprovisioned
85,666 UART: [state] DebugLocked = No
86,188 UART: [state] WD Timer not started. Device not locked for debugging
87,489 UART: [kat] SHA2-256
891,039 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,168 UART: [kat] ++
895,320 UART: [kat] sha1
899,764 UART: [kat] SHA2-256
901,704 UART: [kat] SHA2-384
904,561 UART: [kat] SHA2-512-ACC
906,462 UART: [kat] ECC-384
916,015 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,169,762 UART: [cold-reset] ++
1,170,182 UART: [fht] FHT @ 0x50003400
1,172,700 UART: [idev] ++
1,172,868 UART: [idev] CDI.KEYID = 6
1,173,229 UART: [idev] SUBJECT.KEYID = 7
1,173,654 UART: [idev] UDS.KEYID = 0
1,181,364 UART: [idev] Erasing UDS.KEYID = 0
1,198,478 UART: [idev] Sha1 KeyId Algorithm
1,207,364 UART: [idev] --
1,208,393 UART: [ldev] ++
1,208,561 UART: [ldev] CDI.KEYID = 6
1,208,925 UART: [ldev] SUBJECT.KEYID = 5
1,209,352 UART: [ldev] AUTHORITY.KEYID = 7
1,209,815 UART: [ldev] FE.KEYID = 1
1,214,933 UART: [ldev] Erasing FE.KEYID = 1
1,241,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,939 UART: [ldev] --
1,281,453 UART: [fwproc] Wait for Commands...
1,282,168 UART: [fwproc] Recv command 0x46574c44
1,282,901 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,467 UART: ROM Fatal Error: 0x000B0018
1,331,624 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,223 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
891,188 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,317 UART: [kat] ++
895,469 UART: [kat] sha1
899,615 UART: [kat] SHA2-256
901,555 UART: [kat] SHA2-384
904,248 UART: [kat] SHA2-512-ACC
906,149 UART: [kat] ECC-384
915,670 UART: [kat] HMAC-384Kdf
920,258 UART: [kat] LMS
1,168,570 UART: [kat] --
1,169,535 UART: [cold-reset] ++
1,169,873 UART: [fht] FHT @ 0x50003400
1,172,443 UART: [idev] ++
1,172,611 UART: [idev] CDI.KEYID = 6
1,172,972 UART: [idev] SUBJECT.KEYID = 7
1,173,397 UART: [idev] UDS.KEYID = 0
1,181,299 UART: [idev] Erasing UDS.KEYID = 0
1,197,997 UART: [idev] Sha1 KeyId Algorithm
1,206,881 UART: [idev] --
1,207,972 UART: [ldev] ++
1,208,140 UART: [ldev] CDI.KEYID = 6
1,208,504 UART: [ldev] SUBJECT.KEYID = 5
1,208,931 UART: [ldev] AUTHORITY.KEYID = 7
1,209,394 UART: [ldev] FE.KEYID = 1
1,214,764 UART: [ldev] Erasing FE.KEYID = 1
1,240,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,886 UART: [ldev] --
1,280,258 UART: [fwproc] Wait for Commands...
1,280,853 UART: [fwproc] Recv command 0x46574c44
1,281,586 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,192 UART: ROM Fatal Error: 0x000B0017
1,330,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,109 UART: [state] WD Timer not started. Device not locked for debugging
87,284 UART: [kat] SHA2-256
890,834 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,963 UART: [kat] ++
895,115 UART: [kat] sha1
899,461 UART: [kat] SHA2-256
901,401 UART: [kat] SHA2-384
904,176 UART: [kat] SHA2-512-ACC
906,077 UART: [kat] ECC-384
915,454 UART: [kat] HMAC-384Kdf
919,896 UART: [kat] LMS
1,168,208 UART: [kat] --
1,169,413 UART: [cold-reset] ++
1,169,761 UART: [fht] FHT @ 0x50003400
1,172,587 UART: [idev] ++
1,172,755 UART: [idev] CDI.KEYID = 6
1,173,116 UART: [idev] SUBJECT.KEYID = 7
1,173,541 UART: [idev] UDS.KEYID = 0
1,181,447 UART: [idev] Erasing UDS.KEYID = 0
1,198,029 UART: [idev] Sha1 KeyId Algorithm
1,206,945 UART: [idev] --
1,208,036 UART: [ldev] ++
1,208,204 UART: [ldev] CDI.KEYID = 6
1,208,568 UART: [ldev] SUBJECT.KEYID = 5
1,208,995 UART: [ldev] AUTHORITY.KEYID = 7
1,209,458 UART: [ldev] FE.KEYID = 1
1,214,534 UART: [ldev] Erasing FE.KEYID = 1
1,240,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,336 UART: [ldev] --
1,279,696 UART: [fwproc] Wait for Commands...
1,280,399 UART: [fwproc] Recv command 0x46574c44
1,281,132 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,904 UART: ROM Fatal Error: 0x000B0017
1,330,061 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
87,816 UART: [kat] SHA2-256
891,366 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,495 UART: [kat] ++
895,647 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
915,760 UART: [kat] HMAC-384Kdf
920,362 UART: [kat] LMS
1,168,674 UART: [kat] --
1,169,557 UART: [cold-reset] ++
1,170,133 UART: [fht] FHT @ 0x50003400
1,172,777 UART: [idev] ++
1,172,945 UART: [idev] CDI.KEYID = 6
1,173,306 UART: [idev] SUBJECT.KEYID = 7
1,173,731 UART: [idev] UDS.KEYID = 0
1,181,525 UART: [idev] Erasing UDS.KEYID = 0
1,198,995 UART: [idev] Sha1 KeyId Algorithm
1,207,891 UART: [idev] --
1,209,176 UART: [ldev] ++
1,209,344 UART: [ldev] CDI.KEYID = 6
1,209,708 UART: [ldev] SUBJECT.KEYID = 5
1,210,135 UART: [ldev] AUTHORITY.KEYID = 7
1,210,598 UART: [ldev] FE.KEYID = 1
1,215,650 UART: [ldev] Erasing FE.KEYID = 1
1,241,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,750 UART: [ldev] --
1,281,198 UART: [fwproc] Wait for Commands...
1,281,797 UART: [fwproc] Recv command 0x46574c44
1,282,530 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,982 UART: ROM Fatal Error: 0x000B0017
1,332,139 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,336 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,038 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,006 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
899,948 UART: [kat] SHA2-256
901,888 UART: [kat] SHA2-384
904,673 UART: [kat] SHA2-512-ACC
906,574 UART: [kat] ECC-384
916,107 UART: [kat] HMAC-384Kdf
920,897 UART: [kat] LMS
1,169,209 UART: [kat] --
1,170,122 UART: [cold-reset] ++
1,170,626 UART: [fht] FHT @ 0x50003400
1,173,278 UART: [idev] ++
1,173,446 UART: [idev] CDI.KEYID = 6
1,173,807 UART: [idev] SUBJECT.KEYID = 7
1,174,232 UART: [idev] UDS.KEYID = 0
1,182,212 UART: [idev] Erasing UDS.KEYID = 0
1,199,300 UART: [idev] Sha1 KeyId Algorithm
1,207,984 UART: [idev] --
1,208,989 UART: [ldev] ++
1,209,157 UART: [ldev] CDI.KEYID = 6
1,209,521 UART: [ldev] SUBJECT.KEYID = 5
1,209,948 UART: [ldev] AUTHORITY.KEYID = 7
1,210,411 UART: [ldev] FE.KEYID = 1
1,215,759 UART: [ldev] Erasing FE.KEYID = 1
1,242,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,307 UART: [ldev] --
1,281,705 UART: [fwproc] Wait for Commands...
1,282,520 UART: [fwproc] Recv command 0x46574c44
1,283,253 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,215 UART: ROM Fatal Error: 0x000B0017
1,332,372 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,914 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,704 UART: [kat] ++
895,856 UART: [kat] sha1
900,116 UART: [kat] SHA2-256
902,056 UART: [kat] SHA2-384
904,807 UART: [kat] SHA2-512-ACC
906,708 UART: [kat] ECC-384
916,427 UART: [kat] HMAC-384Kdf
921,193 UART: [kat] LMS
1,169,505 UART: [kat] --
1,170,624 UART: [cold-reset] ++
1,170,964 UART: [fht] FHT @ 0x50003400
1,173,630 UART: [idev] ++
1,173,798 UART: [idev] CDI.KEYID = 6
1,174,159 UART: [idev] SUBJECT.KEYID = 7
1,174,584 UART: [idev] UDS.KEYID = 0
1,182,238 UART: [idev] Erasing UDS.KEYID = 0
1,199,214 UART: [idev] Sha1 KeyId Algorithm
1,207,860 UART: [idev] --
1,208,909 UART: [ldev] ++
1,209,077 UART: [ldev] CDI.KEYID = 6
1,209,441 UART: [ldev] SUBJECT.KEYID = 5
1,209,868 UART: [ldev] AUTHORITY.KEYID = 7
1,210,331 UART: [ldev] FE.KEYID = 1
1,215,327 UART: [ldev] Erasing FE.KEYID = 1
1,241,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,683 UART: [ldev] --
1,280,967 UART: [fwproc] Wait for Commands...
1,281,640 UART: [fwproc] Recv command 0x46574c44
1,282,373 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,209 UART: ROM Fatal Error: 0x000B0017
1,330,366 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Unprovisioned
85,776 UART: [state] DebugLocked = No
86,346 UART: [state] WD Timer not started. Device not locked for debugging
87,587 UART: [kat] SHA2-256
891,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,266 UART: [kat] ++
895,418 UART: [kat] sha1
899,712 UART: [kat] SHA2-256
901,652 UART: [kat] SHA2-384
904,333 UART: [kat] SHA2-512-ACC
906,234 UART: [kat] ECC-384
916,301 UART: [kat] HMAC-384Kdf
920,947 UART: [kat] LMS
1,169,259 UART: [kat] --
1,170,058 UART: [cold-reset] ++
1,170,450 UART: [fht] FHT @ 0x50003400
1,173,014 UART: [idev] ++
1,173,182 UART: [idev] CDI.KEYID = 6
1,173,543 UART: [idev] SUBJECT.KEYID = 7
1,173,968 UART: [idev] UDS.KEYID = 0
1,182,370 UART: [idev] Erasing UDS.KEYID = 0
1,199,840 UART: [idev] Sha1 KeyId Algorithm
1,208,566 UART: [idev] --
1,209,623 UART: [ldev] ++
1,209,791 UART: [ldev] CDI.KEYID = 6
1,210,155 UART: [ldev] SUBJECT.KEYID = 5
1,210,582 UART: [ldev] AUTHORITY.KEYID = 7
1,211,045 UART: [ldev] FE.KEYID = 1
1,216,175 UART: [ldev] Erasing FE.KEYID = 1
1,242,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,625 UART: [ldev] --
1,281,963 UART: [fwproc] Wait for Commands...
1,282,696 UART: [fwproc] Recv command 0x46574c44
1,283,429 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,985 UART: ROM Fatal Error: 0x000B0017
1,332,142 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,241 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,251 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,033 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,710 UART: [state] LifecycleState = Unprovisioned
85,365 UART: [state] DebugLocked = No
85,923 UART: [state] WD Timer not started. Device not locked for debugging
87,150 UART: [kat] SHA2-256
890,700 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,829 UART: [kat] ++
894,981 UART: [kat] sha1
899,209 UART: [kat] SHA2-256
901,149 UART: [kat] SHA2-384
903,772 UART: [kat] SHA2-512-ACC
905,673 UART: [kat] ECC-384
915,764 UART: [kat] HMAC-384Kdf
920,538 UART: [kat] LMS
1,168,850 UART: [kat] --
1,169,765 UART: [cold-reset] ++
1,170,153 UART: [fht] FHT @ 0x50003400
1,172,907 UART: [idev] ++
1,173,075 UART: [idev] CDI.KEYID = 6
1,173,436 UART: [idev] SUBJECT.KEYID = 7
1,173,861 UART: [idev] UDS.KEYID = 0
1,182,123 UART: [idev] Erasing UDS.KEYID = 0
1,199,253 UART: [idev] Sha1 KeyId Algorithm
1,208,039 UART: [idev] --
1,209,094 UART: [ldev] ++
1,209,262 UART: [ldev] CDI.KEYID = 6
1,209,626 UART: [ldev] SUBJECT.KEYID = 5
1,210,053 UART: [ldev] AUTHORITY.KEYID = 7
1,210,516 UART: [ldev] FE.KEYID = 1
1,215,858 UART: [ldev] Erasing FE.KEYID = 1
1,242,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,620 UART: [ldev] --
1,281,052 UART: [fwproc] Wait for Commands...
1,281,677 UART: [fwproc] Recv command 0x46574c44
1,282,410 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,014 UART: ROM Fatal Error: 0x000B0017
1,331,171 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
891,168 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,297 UART: [kat] ++
895,449 UART: [kat] sha1
899,683 UART: [kat] SHA2-256
901,623 UART: [kat] SHA2-384
904,424 UART: [kat] SHA2-512-ACC
906,325 UART: [kat] ECC-384
916,134 UART: [kat] HMAC-384Kdf
920,768 UART: [kat] LMS
1,169,080 UART: [kat] --
1,170,059 UART: [cold-reset] ++
1,170,455 UART: [fht] FHT @ 0x50003400
1,173,111 UART: [idev] ++
1,173,279 UART: [idev] CDI.KEYID = 6
1,173,640 UART: [idev] SUBJECT.KEYID = 7
1,174,065 UART: [idev] UDS.KEYID = 0
1,182,247 UART: [idev] Erasing UDS.KEYID = 0
1,199,265 UART: [idev] Sha1 KeyId Algorithm
1,208,051 UART: [idev] --
1,209,218 UART: [ldev] ++
1,209,386 UART: [ldev] CDI.KEYID = 6
1,209,750 UART: [ldev] SUBJECT.KEYID = 5
1,210,177 UART: [ldev] AUTHORITY.KEYID = 7
1,210,640 UART: [ldev] FE.KEYID = 1
1,215,746 UART: [ldev] Erasing FE.KEYID = 1
1,241,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,150 UART: [ldev] --
1,280,638 UART: [fwproc] Wait for Commands...
1,281,393 UART: [fwproc] Recv command 0x46574c44
1,282,126 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,856 UART: ROM Fatal Error: 0x000B0017
1,330,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,753 UART: [kat] SHA2-256
901,693 UART: [kat] SHA2-384
904,526 UART: [kat] SHA2-512-ACC
906,427 UART: [kat] ECC-384
915,832 UART: [kat] HMAC-384Kdf
920,464 UART: [kat] LMS
1,168,776 UART: [kat] --
1,169,749 UART: [cold-reset] ++
1,170,121 UART: [fht] FHT @ 0x50003400
1,172,603 UART: [idev] ++
1,172,771 UART: [idev] CDI.KEYID = 6
1,173,132 UART: [idev] SUBJECT.KEYID = 7
1,173,557 UART: [idev] UDS.KEYID = 0
1,181,515 UART: [idev] Erasing UDS.KEYID = 0
1,198,185 UART: [idev] Sha1 KeyId Algorithm
1,207,279 UART: [idev] --
1,208,300 UART: [ldev] ++
1,208,468 UART: [ldev] CDI.KEYID = 6
1,208,832 UART: [ldev] SUBJECT.KEYID = 5
1,209,259 UART: [ldev] AUTHORITY.KEYID = 7
1,209,722 UART: [ldev] FE.KEYID = 1
1,215,060 UART: [ldev] Erasing FE.KEYID = 1
1,241,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,806 UART: [ldev] --
1,280,280 UART: [fwproc] Wait for Commands...
1,280,873 UART: [fwproc] Recv command 0x46574c44
1,281,606 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,080 UART: ROM Fatal Error: 0x000B0017
1,331,237 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,510 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,806 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,578 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [kat] SHA2-256
891,333 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,462 UART: [kat] ++
895,614 UART: [kat] sha1
900,008 UART: [kat] SHA2-256
901,948 UART: [kat] SHA2-384
904,563 UART: [kat] SHA2-512-ACC
906,464 UART: [kat] ECC-384
916,531 UART: [kat] HMAC-384Kdf
921,181 UART: [kat] LMS
1,169,493 UART: [kat] --
1,170,278 UART: [cold-reset] ++
1,170,836 UART: [fht] FHT @ 0x50003400
1,173,606 UART: [idev] ++
1,173,774 UART: [idev] CDI.KEYID = 6
1,174,135 UART: [idev] SUBJECT.KEYID = 7
1,174,560 UART: [idev] UDS.KEYID = 0
1,182,624 UART: [idev] Erasing UDS.KEYID = 0
1,199,754 UART: [idev] Sha1 KeyId Algorithm
1,208,674 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,075 UART: [ldev] SUBJECT.KEYID = 5
1,210,502 UART: [ldev] AUTHORITY.KEYID = 7
1,210,965 UART: [ldev] FE.KEYID = 1
1,216,297 UART: [ldev] Erasing FE.KEYID = 1
1,243,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,117 UART: [ldev] --
1,282,607 UART: [fwproc] Wait for Commands...
1,283,430 UART: [fwproc] Recv command 0x46574c44
1,284,163 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,943 UART: ROM Fatal Error: 0x000B0017
1,332,100 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,999 UART: [state] LifecycleState = Unprovisioned
85,654 UART: [state] DebugLocked = No
86,172 UART: [state] WD Timer not started. Device not locked for debugging
87,279 UART: [kat] SHA2-256
890,829 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,958 UART: [kat] ++
895,110 UART: [kat] sha1
899,532 UART: [kat] SHA2-256
901,472 UART: [kat] SHA2-384
904,363 UART: [kat] SHA2-512-ACC
906,264 UART: [kat] ECC-384
916,059 UART: [kat] HMAC-384Kdf
920,759 UART: [kat] LMS
1,169,071 UART: [kat] --
1,170,090 UART: [cold-reset] ++
1,170,464 UART: [fht] FHT @ 0x50003400
1,173,198 UART: [idev] ++
1,173,366 UART: [idev] CDI.KEYID = 6
1,173,727 UART: [idev] SUBJECT.KEYID = 7
1,174,152 UART: [idev] UDS.KEYID = 0
1,182,100 UART: [idev] Erasing UDS.KEYID = 0
1,199,070 UART: [idev] Sha1 KeyId Algorithm
1,207,852 UART: [idev] --
1,208,747 UART: [ldev] ++
1,208,915 UART: [ldev] CDI.KEYID = 6
1,209,279 UART: [ldev] SUBJECT.KEYID = 5
1,209,706 UART: [ldev] AUTHORITY.KEYID = 7
1,210,169 UART: [ldev] FE.KEYID = 1
1,215,247 UART: [ldev] Erasing FE.KEYID = 1
1,242,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,009 UART: [ldev] --
1,281,347 UART: [fwproc] Wait for Commands...
1,282,096 UART: [fwproc] Recv command 0x46574c44
1,282,829 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,255 UART: ROM Fatal Error: 0x000B0017
1,330,412 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,063 UART: [state] LifecycleState = Unprovisioned
85,718 UART: [state] DebugLocked = No
86,206 UART: [state] WD Timer not started. Device not locked for debugging
87,435 UART: [kat] SHA2-256
890,985 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,114 UART: [kat] ++
895,266 UART: [kat] sha1
899,612 UART: [kat] SHA2-256
901,552 UART: [kat] SHA2-384
904,145 UART: [kat] SHA2-512-ACC
906,046 UART: [kat] ECC-384
915,919 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,169,620 UART: [cold-reset] ++
1,170,128 UART: [fht] FHT @ 0x50003400
1,172,764 UART: [idev] ++
1,172,932 UART: [idev] CDI.KEYID = 6
1,173,293 UART: [idev] SUBJECT.KEYID = 7
1,173,718 UART: [idev] UDS.KEYID = 0
1,182,014 UART: [idev] Erasing UDS.KEYID = 0
1,198,908 UART: [idev] Sha1 KeyId Algorithm
1,207,894 UART: [idev] --
1,208,847 UART: [ldev] ++
1,209,015 UART: [ldev] CDI.KEYID = 6
1,209,379 UART: [ldev] SUBJECT.KEYID = 5
1,209,806 UART: [ldev] AUTHORITY.KEYID = 7
1,210,269 UART: [ldev] FE.KEYID = 1
1,215,289 UART: [ldev] Erasing FE.KEYID = 1
1,241,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,999 UART: [ldev] --
1,281,331 UART: [fwproc] Wait for Commands...
1,281,972 UART: [fwproc] Recv command 0x46574c44
1,282,705 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,307 UART: ROM Fatal Error: 0x000B0017
1,330,464 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,985 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,293 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,747 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,643 UART: [state] WD Timer not started. Device not locked for debugging
87,956 UART: [kat] SHA2-256
891,506 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,635 UART: [kat] ++
895,787 UART: [kat] sha1
899,919 UART: [kat] SHA2-256
901,859 UART: [kat] SHA2-384
904,812 UART: [kat] SHA2-512-ACC
906,713 UART: [kat] ECC-384
916,346 UART: [kat] HMAC-384Kdf
920,936 UART: [kat] LMS
1,169,248 UART: [kat] --
1,170,321 UART: [cold-reset] ++
1,170,847 UART: [fht] FHT @ 0x50003400
1,173,547 UART: [idev] ++
1,173,715 UART: [idev] CDI.KEYID = 6
1,174,076 UART: [idev] SUBJECT.KEYID = 7
1,174,501 UART: [idev] UDS.KEYID = 0
1,182,513 UART: [idev] Erasing UDS.KEYID = 0
1,199,309 UART: [idev] Sha1 KeyId Algorithm
1,208,179 UART: [idev] --
1,209,028 UART: [ldev] ++
1,209,196 UART: [ldev] CDI.KEYID = 6
1,209,560 UART: [ldev] SUBJECT.KEYID = 5
1,209,987 UART: [ldev] AUTHORITY.KEYID = 7
1,210,450 UART: [ldev] FE.KEYID = 1
1,215,710 UART: [ldev] Erasing FE.KEYID = 1
1,241,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,512 UART: [ldev] --
1,280,970 UART: [fwproc] Wait for Commands...
1,281,727 UART: [fwproc] Recv command 0x46574c44
1,282,460 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,622 UART: ROM Fatal Error: 0x000B0017
1,330,779 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,912 UART: [state] LifecycleState = Unprovisioned
85,567 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
891,078 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,207 UART: [kat] ++
895,359 UART: [kat] sha1
899,455 UART: [kat] SHA2-256
901,395 UART: [kat] SHA2-384
904,086 UART: [kat] SHA2-512-ACC
905,987 UART: [kat] ECC-384
916,086 UART: [kat] HMAC-384Kdf
920,732 UART: [kat] LMS
1,169,044 UART: [kat] --
1,169,835 UART: [cold-reset] ++
1,170,357 UART: [fht] FHT @ 0x50003400
1,172,963 UART: [idev] ++
1,173,131 UART: [idev] CDI.KEYID = 6
1,173,492 UART: [idev] SUBJECT.KEYID = 7
1,173,917 UART: [idev] UDS.KEYID = 0
1,181,915 UART: [idev] Erasing UDS.KEYID = 0
1,198,663 UART: [idev] Sha1 KeyId Algorithm
1,207,657 UART: [idev] --
1,208,656 UART: [ldev] ++
1,208,824 UART: [ldev] CDI.KEYID = 6
1,209,188 UART: [ldev] SUBJECT.KEYID = 5
1,209,615 UART: [ldev] AUTHORITY.KEYID = 7
1,210,078 UART: [ldev] FE.KEYID = 1
1,215,112 UART: [ldev] Erasing FE.KEYID = 1
1,241,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,168 UART: [ldev] --
1,280,664 UART: [fwproc] Wait for Commands...
1,281,337 UART: [fwproc] Recv command 0x46574c44
1,282,070 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,426 UART: ROM Fatal Error: 0x000B0017
1,329,583 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
891,004 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,133 UART: [kat] ++
895,285 UART: [kat] sha1
899,583 UART: [kat] SHA2-256
901,523 UART: [kat] SHA2-384
904,336 UART: [kat] SHA2-512-ACC
906,237 UART: [kat] ECC-384
915,958 UART: [kat] HMAC-384Kdf
920,438 UART: [kat] LMS
1,168,750 UART: [kat] --
1,169,487 UART: [cold-reset] ++
1,169,953 UART: [fht] FHT @ 0x50003400
1,172,513 UART: [idev] ++
1,172,681 UART: [idev] CDI.KEYID = 6
1,173,042 UART: [idev] SUBJECT.KEYID = 7
1,173,467 UART: [idev] UDS.KEYID = 0
1,181,369 UART: [idev] Erasing UDS.KEYID = 0
1,198,153 UART: [idev] Sha1 KeyId Algorithm
1,207,001 UART: [idev] --
1,207,910 UART: [ldev] ++
1,208,078 UART: [ldev] CDI.KEYID = 6
1,208,442 UART: [ldev] SUBJECT.KEYID = 5
1,208,869 UART: [ldev] AUTHORITY.KEYID = 7
1,209,332 UART: [ldev] FE.KEYID = 1
1,214,212 UART: [ldev] Erasing FE.KEYID = 1
1,240,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,852 UART: [ldev] --
1,279,318 UART: [fwproc] Wait for Commands...
1,280,031 UART: [fwproc] Recv command 0x46574c44
1,280,764 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,132 UART: ROM Fatal Error: 0x000B0017
1,329,289 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,094 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,236 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,380 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
891,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,706 UART: [kat] ++
895,858 UART: [kat] sha1
900,142 UART: [kat] SHA2-256
902,082 UART: [kat] SHA2-384
904,867 UART: [kat] SHA2-512-ACC
906,768 UART: [kat] ECC-384
916,719 UART: [kat] HMAC-384Kdf
921,195 UART: [kat] LMS
1,169,507 UART: [kat] --
1,170,384 UART: [cold-reset] ++
1,170,954 UART: [fht] FHT @ 0x50003400
1,173,510 UART: [idev] ++
1,173,678 UART: [idev] CDI.KEYID = 6
1,174,039 UART: [idev] SUBJECT.KEYID = 7
1,174,464 UART: [idev] UDS.KEYID = 0
1,183,082 UART: [idev] Erasing UDS.KEYID = 0
1,200,406 UART: [idev] Sha1 KeyId Algorithm
1,209,232 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,813 UART: [ldev] SUBJECT.KEYID = 5
1,211,240 UART: [ldev] AUTHORITY.KEYID = 7
1,211,703 UART: [ldev] FE.KEYID = 1
1,216,871 UART: [ldev] Erasing FE.KEYID = 1
1,243,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,927 UART: [ldev] --
1,282,421 UART: [fwproc] Wait for Commands...
1,283,164 UART: [fwproc] Recv command 0x46574c44
1,283,897 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,641 UART: ROM Fatal Error: 0x000B0017
1,331,798 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
891,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,544 UART: [kat] ++
895,696 UART: [kat] sha1
899,750 UART: [kat] SHA2-256
901,690 UART: [kat] SHA2-384
904,463 UART: [kat] SHA2-512-ACC
906,364 UART: [kat] ECC-384
916,397 UART: [kat] HMAC-384Kdf
920,837 UART: [kat] LMS
1,169,149 UART: [kat] --
1,169,930 UART: [cold-reset] ++
1,170,366 UART: [fht] FHT @ 0x50003400
1,173,120 UART: [idev] ++
1,173,288 UART: [idev] CDI.KEYID = 6
1,173,649 UART: [idev] SUBJECT.KEYID = 7
1,174,074 UART: [idev] UDS.KEYID = 0
1,182,320 UART: [idev] Erasing UDS.KEYID = 0
1,199,204 UART: [idev] Sha1 KeyId Algorithm
1,208,070 UART: [idev] --
1,208,981 UART: [ldev] ++
1,209,149 UART: [ldev] CDI.KEYID = 6
1,209,513 UART: [ldev] SUBJECT.KEYID = 5
1,209,940 UART: [ldev] AUTHORITY.KEYID = 7
1,210,403 UART: [ldev] FE.KEYID = 1
1,215,553 UART: [ldev] Erasing FE.KEYID = 1
1,241,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,337 UART: [ldev] --
1,280,649 UART: [fwproc] Wait for Commands...
1,281,294 UART: [fwproc] Recv command 0x46574c44
1,282,027 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,115 UART: ROM Fatal Error: 0x000B0017
1,330,272 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,826 UART: [kat] ++
895,978 UART: [kat] sha1
900,250 UART: [kat] SHA2-256
902,190 UART: [kat] SHA2-384
904,849 UART: [kat] SHA2-512-ACC
906,750 UART: [kat] ECC-384
916,257 UART: [kat] HMAC-384Kdf
920,775 UART: [kat] LMS
1,169,087 UART: [kat] --
1,170,046 UART: [cold-reset] ++
1,170,562 UART: [fht] FHT @ 0x50003400
1,173,072 UART: [idev] ++
1,173,240 UART: [idev] CDI.KEYID = 6
1,173,601 UART: [idev] SUBJECT.KEYID = 7
1,174,026 UART: [idev] UDS.KEYID = 0
1,181,704 UART: [idev] Erasing UDS.KEYID = 0
1,198,756 UART: [idev] Sha1 KeyId Algorithm
1,207,750 UART: [idev] --
1,208,571 UART: [ldev] ++
1,208,739 UART: [ldev] CDI.KEYID = 6
1,209,103 UART: [ldev] SUBJECT.KEYID = 5
1,209,530 UART: [ldev] AUTHORITY.KEYID = 7
1,209,993 UART: [ldev] FE.KEYID = 1
1,215,411 UART: [ldev] Erasing FE.KEYID = 1
1,242,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,795 UART: [ldev] --
1,281,119 UART: [fwproc] Wait for Commands...
1,281,812 UART: [fwproc] Recv command 0x46574c44
1,282,545 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,855 UART: ROM Fatal Error: 0x000B0017
1,332,012 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,381 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,615 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,063 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Unprovisioned
86,089 UART: [state] DebugLocked = No
86,749 UART: [state] WD Timer not started. Device not locked for debugging
88,110 UART: [kat] SHA2-256
891,660 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,789 UART: [kat] ++
895,941 UART: [kat] sha1
900,123 UART: [kat] SHA2-256
902,063 UART: [kat] SHA2-384
904,780 UART: [kat] SHA2-512-ACC
906,681 UART: [kat] ECC-384
916,470 UART: [kat] HMAC-384Kdf
921,070 UART: [kat] LMS
1,169,382 UART: [kat] --
1,170,307 UART: [cold-reset] ++
1,170,755 UART: [fht] FHT @ 0x50003400
1,173,539 UART: [idev] ++
1,173,707 UART: [idev] CDI.KEYID = 6
1,174,068 UART: [idev] SUBJECT.KEYID = 7
1,174,493 UART: [idev] UDS.KEYID = 0
1,182,765 UART: [idev] Erasing UDS.KEYID = 0
1,199,555 UART: [idev] Sha1 KeyId Algorithm
1,208,425 UART: [idev] --
1,209,460 UART: [ldev] ++
1,209,628 UART: [ldev] CDI.KEYID = 6
1,209,992 UART: [ldev] SUBJECT.KEYID = 5
1,210,419 UART: [ldev] AUTHORITY.KEYID = 7
1,210,882 UART: [ldev] FE.KEYID = 1
1,216,096 UART: [ldev] Erasing FE.KEYID = 1
1,242,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,910 UART: [ldev] --
1,281,410 UART: [fwproc] Wait for Commands...
1,282,085 UART: [fwproc] Recv command 0x46574c44
1,282,818 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,666 UART: ROM Fatal Error: 0x000B003B
1,330,825 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,450 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
899,872 UART: [kat] SHA2-256
901,812 UART: [kat] SHA2-384
904,631 UART: [kat] SHA2-512-ACC
906,532 UART: [kat] ECC-384
916,185 UART: [kat] HMAC-384Kdf
921,003 UART: [kat] LMS
1,169,315 UART: [kat] --
1,170,180 UART: [cold-reset] ++
1,170,678 UART: [fht] FHT @ 0x50003400
1,173,450 UART: [idev] ++
1,173,618 UART: [idev] CDI.KEYID = 6
1,173,979 UART: [idev] SUBJECT.KEYID = 7
1,174,404 UART: [idev] UDS.KEYID = 0
1,182,780 UART: [idev] Erasing UDS.KEYID = 0
1,200,242 UART: [idev] Sha1 KeyId Algorithm
1,209,050 UART: [idev] --
1,209,893 UART: [ldev] ++
1,210,061 UART: [ldev] CDI.KEYID = 6
1,210,425 UART: [ldev] SUBJECT.KEYID = 5
1,210,852 UART: [ldev] AUTHORITY.KEYID = 7
1,211,315 UART: [ldev] FE.KEYID = 1
1,216,501 UART: [ldev] Erasing FE.KEYID = 1
1,243,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,357 UART: [ldev] --
1,282,837 UART: [fwproc] Wait for Commands...
1,283,450 UART: [fwproc] Recv command 0x46574c44
1,284,183 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,477 UART: ROM Fatal Error: 0x000B003B
1,332,636 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,327 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,607 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
891,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,491 UART: [kat] ++
895,643 UART: [kat] sha1
899,909 UART: [kat] SHA2-256
901,849 UART: [kat] SHA2-384
904,540 UART: [kat] SHA2-512-ACC
906,441 UART: [kat] ECC-384
915,766 UART: [kat] HMAC-384Kdf
920,464 UART: [kat] LMS
1,168,776 UART: [kat] --
1,169,479 UART: [cold-reset] ++
1,169,925 UART: [fht] FHT @ 0x50003400
1,172,481 UART: [idev] ++
1,172,649 UART: [idev] CDI.KEYID = 6
1,173,010 UART: [idev] SUBJECT.KEYID = 7
1,173,435 UART: [idev] UDS.KEYID = 0
1,181,399 UART: [idev] Erasing UDS.KEYID = 0
1,198,767 UART: [idev] Sha1 KeyId Algorithm
1,207,535 UART: [idev] --
1,208,528 UART: [ldev] ++
1,208,696 UART: [ldev] CDI.KEYID = 6
1,209,060 UART: [ldev] SUBJECT.KEYID = 5
1,209,487 UART: [ldev] AUTHORITY.KEYID = 7
1,209,950 UART: [ldev] FE.KEYID = 1
1,215,220 UART: [ldev] Erasing FE.KEYID = 1
1,241,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,614 UART: [ldev] --
1,280,058 UART: [fwproc] Wait for Commands...
1,280,635 UART: [fwproc] Recv command 0x46574c44
1,281,368 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,264 UART: ROM Fatal Error: 0x000B003B
1,330,423 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,368 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,053 UART: [state] LifecycleState = Unprovisioned
86,708 UART: [state] DebugLocked = No
87,274 UART: [state] WD Timer not started. Device not locked for debugging
88,411 UART: [kat] SHA2-256
891,961 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,090 UART: [kat] ++
896,242 UART: [kat] sha1
900,406 UART: [kat] SHA2-256
902,346 UART: [kat] SHA2-384
905,179 UART: [kat] SHA2-512-ACC
907,080 UART: [kat] ECC-384
917,093 UART: [kat] HMAC-384Kdf
921,871 UART: [kat] LMS
1,170,183 UART: [kat] --
1,171,088 UART: [cold-reset] ++
1,171,420 UART: [fht] FHT @ 0x50003400
1,174,228 UART: [idev] ++
1,174,396 UART: [idev] CDI.KEYID = 6
1,174,757 UART: [idev] SUBJECT.KEYID = 7
1,175,182 UART: [idev] UDS.KEYID = 0
1,183,316 UART: [idev] Erasing UDS.KEYID = 0
1,200,052 UART: [idev] Sha1 KeyId Algorithm
1,208,956 UART: [idev] --
1,209,893 UART: [ldev] ++
1,210,061 UART: [ldev] CDI.KEYID = 6
1,210,425 UART: [ldev] SUBJECT.KEYID = 5
1,210,852 UART: [ldev] AUTHORITY.KEYID = 7
1,211,315 UART: [ldev] FE.KEYID = 1
1,216,589 UART: [ldev] Erasing FE.KEYID = 1
1,242,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,583 UART: [ldev] --
1,282,027 UART: [fwproc] Wait for Commands...
1,282,646 UART: [fwproc] Recv command 0x46574c44
1,283,379 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,085 UART: ROM Fatal Error: 0x000B003B
1,331,244 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,803 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,255 UART: [kat] ++
895,407 UART: [kat] sha1
899,647 UART: [kat] SHA2-256
901,587 UART: [kat] SHA2-384
904,272 UART: [kat] SHA2-512-ACC
906,173 UART: [kat] ECC-384
916,212 UART: [kat] HMAC-384Kdf
920,642 UART: [kat] LMS
1,168,954 UART: [kat] --
1,169,903 UART: [cold-reset] ++
1,170,481 UART: [fht] FHT @ 0x50003400
1,173,091 UART: [idev] ++
1,173,259 UART: [idev] CDI.KEYID = 6
1,173,620 UART: [idev] SUBJECT.KEYID = 7
1,174,045 UART: [idev] UDS.KEYID = 0
1,182,181 UART: [idev] Erasing UDS.KEYID = 0
1,199,225 UART: [idev] Sha1 KeyId Algorithm
1,207,999 UART: [idev] --
1,209,260 UART: [ldev] ++
1,209,428 UART: [ldev] CDI.KEYID = 6
1,209,792 UART: [ldev] SUBJECT.KEYID = 5
1,210,219 UART: [ldev] AUTHORITY.KEYID = 7
1,210,682 UART: [ldev] FE.KEYID = 1
1,215,970 UART: [ldev] Erasing FE.KEYID = 1
1,242,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,050 UART: [ldev] --
1,281,406 UART: [fwproc] Wait for Commands...
1,282,165 UART: [fwproc] Recv command 0x46574c44
1,282,898 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,798 UART: ROM Fatal Error: 0x000B003B
1,330,957 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,320 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
891,497 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,626 UART: [kat] ++
895,778 UART: [kat] sha1
900,004 UART: [kat] SHA2-256
901,944 UART: [kat] SHA2-384
904,683 UART: [kat] SHA2-512-ACC
906,584 UART: [kat] ECC-384
916,143 UART: [kat] HMAC-384Kdf
920,861 UART: [kat] LMS
1,169,173 UART: [kat] --
1,170,102 UART: [cold-reset] ++
1,170,480 UART: [fht] FHT @ 0x50003400
1,173,090 UART: [idev] ++
1,173,258 UART: [idev] CDI.KEYID = 6
1,173,619 UART: [idev] SUBJECT.KEYID = 7
1,174,044 UART: [idev] UDS.KEYID = 0
1,182,012 UART: [idev] Erasing UDS.KEYID = 0
1,199,360 UART: [idev] Sha1 KeyId Algorithm
1,208,320 UART: [idev] --
1,209,505 UART: [ldev] ++
1,209,673 UART: [ldev] CDI.KEYID = 6
1,210,037 UART: [ldev] SUBJECT.KEYID = 5
1,210,464 UART: [ldev] AUTHORITY.KEYID = 7
1,210,927 UART: [ldev] FE.KEYID = 1
1,216,423 UART: [ldev] Erasing FE.KEYID = 1
1,242,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,089 UART: [ldev] --
1,282,499 UART: [fwproc] Wait for Commands...
1,283,300 UART: [fwproc] Recv command 0x46574c44
1,284,033 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,947 UART: ROM Fatal Error: 0x000B003B
1,332,106 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,677 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,412 UART: [kat] SHA2-256
890,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,091 UART: [kat] ++
895,243 UART: [kat] sha1
899,473 UART: [kat] SHA2-256
901,413 UART: [kat] SHA2-384
904,184 UART: [kat] SHA2-512-ACC
906,085 UART: [kat] ECC-384
915,962 UART: [kat] HMAC-384Kdf
920,402 UART: [kat] LMS
1,168,714 UART: [kat] --
1,169,577 UART: [cold-reset] ++
1,170,135 UART: [fht] FHT @ 0x50003400
1,172,901 UART: [idev] ++
1,173,069 UART: [idev] CDI.KEYID = 6
1,173,430 UART: [idev] SUBJECT.KEYID = 7
1,173,855 UART: [idev] UDS.KEYID = 0
1,181,511 UART: [idev] Erasing UDS.KEYID = 0
1,197,973 UART: [idev] Sha1 KeyId Algorithm
1,206,897 UART: [idev] --
1,207,940 UART: [ldev] ++
1,208,108 UART: [ldev] CDI.KEYID = 6
1,208,472 UART: [ldev] SUBJECT.KEYID = 5
1,208,899 UART: [ldev] AUTHORITY.KEYID = 7
1,209,362 UART: [ldev] FE.KEYID = 1
1,214,704 UART: [ldev] Erasing FE.KEYID = 1
1,240,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,722 UART: [ldev] --
1,280,070 UART: [fwproc] Wait for Commands...
1,280,825 UART: [fwproc] Recv command 0x46574c44
1,281,558 UART: [fwproc] Recv'd Img size: 114332 bytes
1,324,013 UART: ROM Fatal Error: 0x000B0010
1,325,170 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,177,999 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
891,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,596 UART: [kat] ++
895,748 UART: [kat] sha1
900,112 UART: [kat] SHA2-256
902,052 UART: [kat] SHA2-384
904,685 UART: [kat] SHA2-512-ACC
906,586 UART: [kat] ECC-384
916,117 UART: [kat] HMAC-384Kdf
920,675 UART: [kat] LMS
1,168,987 UART: [kat] --
1,170,098 UART: [cold-reset] ++
1,170,630 UART: [fht] FHT @ 0x50003400
1,173,352 UART: [idev] ++
1,173,520 UART: [idev] CDI.KEYID = 6
1,173,881 UART: [idev] SUBJECT.KEYID = 7
1,174,306 UART: [idev] UDS.KEYID = 0
1,182,724 UART: [idev] Erasing UDS.KEYID = 0
1,199,736 UART: [idev] Sha1 KeyId Algorithm
1,208,574 UART: [idev] --
1,209,707 UART: [ldev] ++
1,209,875 UART: [ldev] CDI.KEYID = 6
1,210,239 UART: [ldev] SUBJECT.KEYID = 5
1,210,666 UART: [ldev] AUTHORITY.KEYID = 7
1,211,129 UART: [ldev] FE.KEYID = 1
1,216,501 UART: [ldev] Erasing FE.KEYID = 1
1,242,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,697 UART: [ldev] --
1,282,153 UART: [fwproc] Wait for Commands...
1,282,834 UART: [fwproc] Recv command 0x46574c44
1,283,567 UART: [fwproc] Recv'd Img size: 114332 bytes
1,325,604 UART: ROM Fatal Error: 0x000B0010
1,326,761 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,650 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,845 UART: [kat] SHA2-256
901,785 UART: [kat] SHA2-384
904,378 UART: [kat] SHA2-512-ACC
906,279 UART: [kat] ECC-384
916,370 UART: [kat] HMAC-384Kdf
920,972 UART: [kat] LMS
1,169,284 UART: [kat] --
1,169,989 UART: [cold-reset] ++
1,170,529 UART: [fht] FHT @ 0x50003400
1,173,353 UART: [idev] ++
1,173,521 UART: [idev] CDI.KEYID = 6
1,173,882 UART: [idev] SUBJECT.KEYID = 7
1,174,307 UART: [idev] UDS.KEYID = 0
1,182,741 UART: [idev] Erasing UDS.KEYID = 0
1,199,329 UART: [idev] Sha1 KeyId Algorithm
1,208,193 UART: [idev] --
1,209,284 UART: [ldev] ++
1,209,452 UART: [ldev] CDI.KEYID = 6
1,209,816 UART: [ldev] SUBJECT.KEYID = 5
1,210,243 UART: [ldev] AUTHORITY.KEYID = 7
1,210,706 UART: [ldev] FE.KEYID = 1
1,215,686 UART: [ldev] Erasing FE.KEYID = 1
1,242,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,382 UART: [ldev] --
1,281,832 UART: [fwproc] Wait for Commands...
1,282,603 UART: [fwproc] Recv command 0x46574c44
1,283,336 UART: [fwproc] Recv'd Img size: 114332 bytes
1,325,905 UART: ROM Fatal Error: 0x000B0010
1,327,062 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,027 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,941 UART: [state] LifecycleState = Unprovisioned
86,596 UART: [state] DebugLocked = No
87,256 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,270 UART: [kat] SHA2-256
902,210 UART: [kat] SHA2-384
905,107 UART: [kat] SHA2-512-ACC
907,008 UART: [kat] ECC-384
916,743 UART: [kat] HMAC-384Kdf
921,379 UART: [kat] LMS
1,169,691 UART: [kat] --
1,170,554 UART: [cold-reset] ++
1,170,982 UART: [fht] FHT @ 0x50003400
1,173,646 UART: [idev] ++
1,173,814 UART: [idev] CDI.KEYID = 6
1,174,175 UART: [idev] SUBJECT.KEYID = 7
1,174,600 UART: [idev] UDS.KEYID = 0
1,182,852 UART: [idev] Erasing UDS.KEYID = 0
1,199,812 UART: [idev] Sha1 KeyId Algorithm
1,208,654 UART: [idev] --
1,209,581 UART: [ldev] ++
1,209,749 UART: [ldev] CDI.KEYID = 6
1,210,113 UART: [ldev] SUBJECT.KEYID = 5
1,210,540 UART: [ldev] AUTHORITY.KEYID = 7
1,211,003 UART: [ldev] FE.KEYID = 1
1,216,267 UART: [ldev] Erasing FE.KEYID = 1
1,242,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,145 UART: [ldev] --
1,281,501 UART: [fwproc] Wait for Commands...
1,282,310 UART: [fwproc] Recv command 0x46574c44
1,283,043 UART: [fwproc] Recv'd Img size: 114332 bytes
1,325,248 UART: ROM Fatal Error: 0x000B0010
1,326,405 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,598 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,770 UART: [state] LifecycleState = Unprovisioned
85,425 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,224 UART: [kat] SHA2-256
890,774 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,903 UART: [kat] ++
895,055 UART: [kat] sha1
899,223 UART: [kat] SHA2-256
901,163 UART: [kat] SHA2-384
904,008 UART: [kat] SHA2-512-ACC
905,909 UART: [kat] ECC-384
915,592 UART: [kat] HMAC-384Kdf
920,174 UART: [kat] LMS
1,168,486 UART: [kat] --
1,169,767 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,172,749 UART: [idev] ++
1,172,917 UART: [idev] CDI.KEYID = 6
1,173,278 UART: [idev] SUBJECT.KEYID = 7
1,173,703 UART: [idev] UDS.KEYID = 0
1,181,271 UART: [idev] Erasing UDS.KEYID = 0
1,198,277 UART: [idev] Sha1 KeyId Algorithm
1,207,015 UART: [idev] --
1,207,980 UART: [ldev] ++
1,208,148 UART: [ldev] CDI.KEYID = 6
1,208,512 UART: [ldev] SUBJECT.KEYID = 5
1,208,939 UART: [ldev] AUTHORITY.KEYID = 7
1,209,402 UART: [ldev] FE.KEYID = 1
1,214,620 UART: [ldev] Erasing FE.KEYID = 1
1,241,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,324 UART: [ldev] --
1,280,838 UART: [fwproc] Wait for Commands...
1,281,619 UART: [fwproc] Recv command 0x46574c44
1,282,352 UART: [fwproc] Recv'd Img size: 114332 bytes
1,324,315 UART: ROM Fatal Error: 0x000B0010
1,325,472 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,199 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,953 UART: [state] LifecycleState = Unprovisioned
85,608 UART: [state] DebugLocked = No
86,208 UART: [state] WD Timer not started. Device not locked for debugging
87,515 UART: [kat] SHA2-256
891,065 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,194 UART: [kat] ++
895,346 UART: [kat] sha1
899,668 UART: [kat] SHA2-256
901,608 UART: [kat] SHA2-384
904,259 UART: [kat] SHA2-512-ACC
906,160 UART: [kat] ECC-384
916,193 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,169,670 UART: [cold-reset] ++
1,170,056 UART: [fht] FHT @ 0x50003400
1,172,612 UART: [idev] ++
1,172,780 UART: [idev] CDI.KEYID = 6
1,173,141 UART: [idev] SUBJECT.KEYID = 7
1,173,566 UART: [idev] UDS.KEYID = 0
1,181,338 UART: [idev] Erasing UDS.KEYID = 0
1,198,222 UART: [idev] Sha1 KeyId Algorithm
1,207,116 UART: [idev] --
1,208,257 UART: [ldev] ++
1,208,425 UART: [ldev] CDI.KEYID = 6
1,208,789 UART: [ldev] SUBJECT.KEYID = 5
1,209,216 UART: [ldev] AUTHORITY.KEYID = 7
1,209,679 UART: [ldev] FE.KEYID = 1
1,214,857 UART: [ldev] Erasing FE.KEYID = 1
1,241,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,847 UART: [ldev] --
1,281,283 UART: [fwproc] Wait for Commands...
1,281,920 UART: [fwproc] Recv command 0x46574c44
1,282,653 UART: [fwproc] Recv'd Img size: 114332 bytes
1,324,462 UART: ROM Fatal Error: 0x000B0010
1,325,619 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,916 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,656 UART: [state] LifecycleState = Unprovisioned
86,311 UART: [state] DebugLocked = No
86,839 UART: [state] WD Timer not started. Device not locked for debugging
87,948 UART: [kat] SHA2-256
891,498 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,627 UART: [kat] ++
895,779 UART: [kat] sha1
900,185 UART: [kat] SHA2-256
902,125 UART: [kat] SHA2-384
904,926 UART: [kat] SHA2-512-ACC
906,827 UART: [kat] ECC-384
916,540 UART: [kat] HMAC-384Kdf
921,084 UART: [kat] LMS
1,169,396 UART: [kat] --
1,170,349 UART: [cold-reset] ++
1,170,781 UART: [fht] FHT @ 0x50003400
1,173,569 UART: [idev] ++
1,173,737 UART: [idev] CDI.KEYID = 6
1,174,098 UART: [idev] SUBJECT.KEYID = 7
1,174,523 UART: [idev] UDS.KEYID = 0
1,182,393 UART: [idev] Erasing UDS.KEYID = 0
1,199,619 UART: [idev] Sha1 KeyId Algorithm
1,208,561 UART: [idev] --
1,209,670 UART: [ldev] ++
1,209,838 UART: [ldev] CDI.KEYID = 6
1,210,202 UART: [ldev] SUBJECT.KEYID = 5
1,210,629 UART: [ldev] AUTHORITY.KEYID = 7
1,211,092 UART: [ldev] FE.KEYID = 1
1,216,456 UART: [ldev] Erasing FE.KEYID = 1
1,242,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,860 UART: [ldev] --
1,282,236 UART: [fwproc] Wait for Commands...
1,282,839 UART: [fwproc] Recv command 0x46574c44
1,283,572 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,267 UART: ROM Fatal Error: 0x000B0012
1,331,424 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,017 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,960 UART: [state] WD Timer not started. Device not locked for debugging
88,205 UART: [kat] SHA2-256
891,755 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,884 UART: [kat] ++
896,036 UART: [kat] sha1
900,366 UART: [kat] SHA2-256
902,306 UART: [kat] SHA2-384
905,055 UART: [kat] SHA2-512-ACC
906,956 UART: [kat] ECC-384
916,865 UART: [kat] HMAC-384Kdf
921,471 UART: [kat] LMS
1,169,783 UART: [kat] --
1,170,660 UART: [cold-reset] ++
1,171,018 UART: [fht] FHT @ 0x50003400
1,173,636 UART: [idev] ++
1,173,804 UART: [idev] CDI.KEYID = 6
1,174,165 UART: [idev] SUBJECT.KEYID = 7
1,174,590 UART: [idev] UDS.KEYID = 0
1,182,576 UART: [idev] Erasing UDS.KEYID = 0
1,199,646 UART: [idev] Sha1 KeyId Algorithm
1,208,606 UART: [idev] --
1,209,667 UART: [ldev] ++
1,209,835 UART: [ldev] CDI.KEYID = 6
1,210,199 UART: [ldev] SUBJECT.KEYID = 5
1,210,626 UART: [ldev] AUTHORITY.KEYID = 7
1,211,089 UART: [ldev] FE.KEYID = 1
1,216,205 UART: [ldev] Erasing FE.KEYID = 1
1,242,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,367 UART: [ldev] --
1,281,647 UART: [fwproc] Wait for Commands...
1,282,372 UART: [fwproc] Recv command 0x46574c44
1,283,105 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,890 UART: ROM Fatal Error: 0x000B0012
1,331,047 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,196 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [kat] SHA2-256
891,342 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,471 UART: [kat] ++
895,623 UART: [kat] sha1
899,787 UART: [kat] SHA2-256
901,727 UART: [kat] SHA2-384
904,538 UART: [kat] SHA2-512-ACC
906,439 UART: [kat] ECC-384
915,892 UART: [kat] HMAC-384Kdf
920,464 UART: [kat] LMS
1,168,776 UART: [kat] --
1,169,779 UART: [cold-reset] ++
1,170,271 UART: [fht] FHT @ 0x50003400
1,172,911 UART: [idev] ++
1,173,079 UART: [idev] CDI.KEYID = 6
1,173,440 UART: [idev] SUBJECT.KEYID = 7
1,173,865 UART: [idev] UDS.KEYID = 0
1,181,627 UART: [idev] Erasing UDS.KEYID = 0
1,198,241 UART: [idev] Sha1 KeyId Algorithm
1,207,187 UART: [idev] --
1,208,308 UART: [ldev] ++
1,208,476 UART: [ldev] CDI.KEYID = 6
1,208,840 UART: [ldev] SUBJECT.KEYID = 5
1,209,267 UART: [ldev] AUTHORITY.KEYID = 7
1,209,730 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,508 UART: [ldev] --
1,281,014 UART: [fwproc] Wait for Commands...
1,281,811 UART: [fwproc] Recv command 0x46574c44
1,282,544 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,044 UART: ROM Fatal Error: 0x000B0012
1,331,201 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,541 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,799 UART: [state] LifecycleState = Unprovisioned
86,454 UART: [state] DebugLocked = No
87,174 UART: [state] WD Timer not started. Device not locked for debugging
88,397 UART: [kat] SHA2-256
891,947 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,076 UART: [kat] ++
896,228 UART: [kat] sha1
900,398 UART: [kat] SHA2-256
902,338 UART: [kat] SHA2-384
904,959 UART: [kat] SHA2-512-ACC
906,860 UART: [kat] ECC-384
916,135 UART: [kat] HMAC-384Kdf
920,727 UART: [kat] LMS
1,169,039 UART: [kat] --
1,170,108 UART: [cold-reset] ++
1,170,596 UART: [fht] FHT @ 0x50003400
1,173,434 UART: [idev] ++
1,173,602 UART: [idev] CDI.KEYID = 6
1,173,963 UART: [idev] SUBJECT.KEYID = 7
1,174,388 UART: [idev] UDS.KEYID = 0
1,182,572 UART: [idev] Erasing UDS.KEYID = 0
1,199,550 UART: [idev] Sha1 KeyId Algorithm
1,208,322 UART: [idev] --
1,209,353 UART: [ldev] ++
1,209,521 UART: [ldev] CDI.KEYID = 6
1,209,885 UART: [ldev] SUBJECT.KEYID = 5
1,210,312 UART: [ldev] AUTHORITY.KEYID = 7
1,210,775 UART: [ldev] FE.KEYID = 1
1,216,085 UART: [ldev] Erasing FE.KEYID = 1
1,242,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,463 UART: [ldev] --
1,281,849 UART: [fwproc] Wait for Commands...
1,282,614 UART: [fwproc] Recv command 0x46574c44
1,283,347 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,454 UART: ROM Fatal Error: 0x000B0012
1,331,611 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,888 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,313 UART: [kat] ++
895,465 UART: [kat] sha1
899,571 UART: [kat] SHA2-256
901,511 UART: [kat] SHA2-384
904,194 UART: [kat] SHA2-512-ACC
906,095 UART: [kat] ECC-384
916,240 UART: [kat] HMAC-384Kdf
920,736 UART: [kat] LMS
1,169,048 UART: [kat] --
1,169,807 UART: [cold-reset] ++
1,170,291 UART: [fht] FHT @ 0x50003400
1,172,919 UART: [idev] ++
1,173,087 UART: [idev] CDI.KEYID = 6
1,173,448 UART: [idev] SUBJECT.KEYID = 7
1,173,873 UART: [idev] UDS.KEYID = 0
1,181,585 UART: [idev] Erasing UDS.KEYID = 0
1,198,421 UART: [idev] Sha1 KeyId Algorithm
1,207,271 UART: [idev] --
1,208,232 UART: [ldev] ++
1,208,400 UART: [ldev] CDI.KEYID = 6
1,208,764 UART: [ldev] SUBJECT.KEYID = 5
1,209,191 UART: [ldev] AUTHORITY.KEYID = 7
1,209,654 UART: [ldev] FE.KEYID = 1
1,214,552 UART: [ldev] Erasing FE.KEYID = 1
1,241,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,018 UART: [ldev] --
1,280,340 UART: [fwproc] Wait for Commands...
1,281,083 UART: [fwproc] Recv command 0x46574c44
1,281,816 UART: [fwproc] Recv'd Img size: 114332 bytes
1,327,501 UART: ROM Fatal Error: 0x000B0012
1,328,658 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,785 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,364 UART: [state] WD Timer not started. Device not locked for debugging
87,657 UART: [kat] SHA2-256
891,207 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,336 UART: [kat] ++
895,488 UART: [kat] sha1
899,820 UART: [kat] SHA2-256
901,760 UART: [kat] SHA2-384
904,459 UART: [kat] SHA2-512-ACC
906,360 UART: [kat] ECC-384
916,313 UART: [kat] HMAC-384Kdf
920,749 UART: [kat] LMS
1,169,061 UART: [kat] --
1,169,562 UART: [cold-reset] ++
1,169,992 UART: [fht] FHT @ 0x50003400
1,172,546 UART: [idev] ++
1,172,714 UART: [idev] CDI.KEYID = 6
1,173,075 UART: [idev] SUBJECT.KEYID = 7
1,173,500 UART: [idev] UDS.KEYID = 0
1,181,768 UART: [idev] Erasing UDS.KEYID = 0
1,198,466 UART: [idev] Sha1 KeyId Algorithm
1,207,338 UART: [idev] --
1,208,375 UART: [ldev] ++
1,208,543 UART: [ldev] CDI.KEYID = 6
1,208,907 UART: [ldev] SUBJECT.KEYID = 5
1,209,334 UART: [ldev] AUTHORITY.KEYID = 7
1,209,797 UART: [ldev] FE.KEYID = 1
1,214,957 UART: [ldev] Erasing FE.KEYID = 1
1,241,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,243 UART: [ldev] --
1,280,593 UART: [fwproc] Wait for Commands...
1,281,204 UART: [fwproc] Recv command 0x46574c44
1,281,937 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,374 UART: ROM Fatal Error: 0x000B0012
1,330,531 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,750 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,780 UART: [kat] SHA2-256
891,330 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,459 UART: [kat] ++
895,611 UART: [kat] sha1
900,037 UART: [kat] SHA2-256
901,977 UART: [kat] SHA2-384
904,634 UART: [kat] SHA2-512-ACC
906,535 UART: [kat] ECC-384
916,420 UART: [kat] HMAC-384Kdf
921,018 UART: [kat] LMS
1,169,330 UART: [kat] --
1,170,359 UART: [cold-reset] ++
1,170,791 UART: [fht] FHT @ 0x50003400
1,173,525 UART: [idev] ++
1,173,693 UART: [idev] CDI.KEYID = 6
1,174,054 UART: [idev] SUBJECT.KEYID = 7
1,174,479 UART: [idev] UDS.KEYID = 0
1,182,683 UART: [idev] Erasing UDS.KEYID = 0
1,200,261 UART: [idev] Sha1 KeyId Algorithm
1,209,151 UART: [idev] --
1,210,160 UART: [ldev] ++
1,210,328 UART: [ldev] CDI.KEYID = 6
1,210,692 UART: [ldev] SUBJECT.KEYID = 5
1,211,119 UART: [ldev] AUTHORITY.KEYID = 7
1,211,582 UART: [ldev] FE.KEYID = 1
1,216,578 UART: [ldev] Erasing FE.KEYID = 1
1,243,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,600 UART: [ldev] --
1,282,982 UART: [fwproc] Wait for Commands...
1,283,553 UART: [fwproc] Recv command 0x46574c44
1,284,286 UART: [fwproc] Recv'd Img size: 114332 bytes
1,332,737 UART: ROM Fatal Error: 0x000B003C
1,333,896 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,013 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,320 UART: [state] WD Timer not started. Device not locked for debugging
87,499 UART: [kat] SHA2-256
891,049 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,178 UART: [kat] ++
895,330 UART: [kat] sha1
899,768 UART: [kat] SHA2-256
901,708 UART: [kat] SHA2-384
904,323 UART: [kat] SHA2-512-ACC
906,224 UART: [kat] ECC-384
915,911 UART: [kat] HMAC-384Kdf
920,523 UART: [kat] LMS
1,168,835 UART: [kat] --
1,169,846 UART: [cold-reset] ++
1,170,362 UART: [fht] FHT @ 0x50003400
1,173,208 UART: [idev] ++
1,173,376 UART: [idev] CDI.KEYID = 6
1,173,737 UART: [idev] SUBJECT.KEYID = 7
1,174,162 UART: [idev] UDS.KEYID = 0
1,182,124 UART: [idev] Erasing UDS.KEYID = 0
1,199,506 UART: [idev] Sha1 KeyId Algorithm
1,208,472 UART: [idev] --
1,209,377 UART: [ldev] ++
1,209,545 UART: [ldev] CDI.KEYID = 6
1,209,909 UART: [ldev] SUBJECT.KEYID = 5
1,210,336 UART: [ldev] AUTHORITY.KEYID = 7
1,210,799 UART: [ldev] FE.KEYID = 1
1,216,169 UART: [ldev] Erasing FE.KEYID = 1
1,241,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,757 UART: [ldev] --
1,281,179 UART: [fwproc] Wait for Commands...
1,281,760 UART: [fwproc] Recv command 0x46574c44
1,282,493 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,300 UART: ROM Fatal Error: 0x000B003C
1,331,459 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,084 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
891,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,385 UART: [kat] ++
895,537 UART: [kat] sha1
899,839 UART: [kat] SHA2-256
901,779 UART: [kat] SHA2-384
904,408 UART: [kat] SHA2-512-ACC
906,309 UART: [kat] ECC-384
916,682 UART: [kat] HMAC-384Kdf
921,294 UART: [kat] LMS
1,169,606 UART: [kat] --
1,170,403 UART: [cold-reset] ++
1,170,799 UART: [fht] FHT @ 0x50003400
1,173,385 UART: [idev] ++
1,173,553 UART: [idev] CDI.KEYID = 6
1,173,914 UART: [idev] SUBJECT.KEYID = 7
1,174,339 UART: [idev] UDS.KEYID = 0
1,181,715 UART: [idev] Erasing UDS.KEYID = 0
1,198,789 UART: [idev] Sha1 KeyId Algorithm
1,207,663 UART: [idev] --
1,208,644 UART: [ldev] ++
1,208,812 UART: [ldev] CDI.KEYID = 6
1,209,176 UART: [ldev] SUBJECT.KEYID = 5
1,209,603 UART: [ldev] AUTHORITY.KEYID = 7
1,210,066 UART: [ldev] FE.KEYID = 1
1,215,332 UART: [ldev] Erasing FE.KEYID = 1
1,241,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,646 UART: [ldev] --
1,281,046 UART: [fwproc] Wait for Commands...
1,281,871 UART: [fwproc] Recv command 0x46574c44
1,282,604 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,247 UART: ROM Fatal Error: 0x000B003C
1,331,406 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,157 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,003 UART: [state] LifecycleState = Unprovisioned
85,658 UART: [state] DebugLocked = No
86,292 UART: [state] WD Timer not started. Device not locked for debugging
87,495 UART: [kat] SHA2-256
891,045 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,174 UART: [kat] ++
895,326 UART: [kat] sha1
899,384 UART: [kat] SHA2-256
901,324 UART: [kat] SHA2-384
904,137 UART: [kat] SHA2-512-ACC
906,038 UART: [kat] ECC-384
915,543 UART: [kat] HMAC-384Kdf
920,133 UART: [kat] LMS
1,168,445 UART: [kat] --
1,169,280 UART: [cold-reset] ++
1,169,684 UART: [fht] FHT @ 0x50003400
1,172,236 UART: [idev] ++
1,172,404 UART: [idev] CDI.KEYID = 6
1,172,765 UART: [idev] SUBJECT.KEYID = 7
1,173,190 UART: [idev] UDS.KEYID = 0
1,181,338 UART: [idev] Erasing UDS.KEYID = 0
1,198,912 UART: [idev] Sha1 KeyId Algorithm
1,207,816 UART: [idev] --
1,208,855 UART: [ldev] ++
1,209,023 UART: [ldev] CDI.KEYID = 6
1,209,387 UART: [ldev] SUBJECT.KEYID = 5
1,209,814 UART: [ldev] AUTHORITY.KEYID = 7
1,210,277 UART: [ldev] FE.KEYID = 1
1,215,319 UART: [ldev] Erasing FE.KEYID = 1
1,241,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,551 UART: [ldev] --
1,280,857 UART: [fwproc] Wait for Commands...
1,281,552 UART: [fwproc] Recv command 0x46574c44
1,282,285 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,758 UART: ROM Fatal Error: 0x000B003C
1,330,917 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,718 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
891,074 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,203 UART: [kat] ++
895,355 UART: [kat] sha1
899,805 UART: [kat] SHA2-256
901,745 UART: [kat] SHA2-384
904,590 UART: [kat] SHA2-512-ACC
906,491 UART: [kat] ECC-384
916,486 UART: [kat] HMAC-384Kdf
921,118 UART: [kat] LMS
1,169,430 UART: [kat] --
1,170,327 UART: [cold-reset] ++
1,170,669 UART: [fht] FHT @ 0x50003400
1,173,401 UART: [idev] ++
1,173,569 UART: [idev] CDI.KEYID = 6
1,173,930 UART: [idev] SUBJECT.KEYID = 7
1,174,355 UART: [idev] UDS.KEYID = 0
1,182,405 UART: [idev] Erasing UDS.KEYID = 0
1,199,441 UART: [idev] Sha1 KeyId Algorithm
1,208,341 UART: [idev] --
1,209,334 UART: [ldev] ++
1,209,502 UART: [ldev] CDI.KEYID = 6
1,209,866 UART: [ldev] SUBJECT.KEYID = 5
1,210,293 UART: [ldev] AUTHORITY.KEYID = 7
1,210,756 UART: [ldev] FE.KEYID = 1
1,215,876 UART: [ldev] Erasing FE.KEYID = 1
1,242,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,194 UART: [ldev] --
1,281,642 UART: [fwproc] Wait for Commands...
1,282,393 UART: [fwproc] Recv command 0x46574c44
1,283,126 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,213 UART: ROM Fatal Error: 0x000B003C
1,331,372 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,213 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
900,008 UART: [kat] SHA2-256
901,948 UART: [kat] SHA2-384
904,777 UART: [kat] SHA2-512-ACC
906,678 UART: [kat] ECC-384
916,551 UART: [kat] HMAC-384Kdf
921,273 UART: [kat] LMS
1,169,585 UART: [kat] --
1,170,598 UART: [cold-reset] ++
1,170,982 UART: [fht] FHT @ 0x50003400
1,173,624 UART: [idev] ++
1,173,792 UART: [idev] CDI.KEYID = 6
1,174,153 UART: [idev] SUBJECT.KEYID = 7
1,174,578 UART: [idev] UDS.KEYID = 0
1,182,276 UART: [idev] Erasing UDS.KEYID = 0
1,199,722 UART: [idev] Sha1 KeyId Algorithm
1,208,608 UART: [idev] --
1,209,603 UART: [ldev] ++
1,209,771 UART: [ldev] CDI.KEYID = 6
1,210,135 UART: [ldev] SUBJECT.KEYID = 5
1,210,562 UART: [ldev] AUTHORITY.KEYID = 7
1,211,025 UART: [ldev] FE.KEYID = 1
1,215,979 UART: [ldev] Erasing FE.KEYID = 1
1,242,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,345 UART: [ldev] --
1,281,693 UART: [fwproc] Wait for Commands...
1,282,444 UART: [fwproc] Recv command 0x46574c44
1,283,177 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,528 UART: ROM Fatal Error: 0x000B003C
1,331,687 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,590 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Unprovisioned
86,089 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
891,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,507 UART: [kat] ++
895,659 UART: [kat] sha1
899,913 UART: [kat] SHA2-256
901,853 UART: [kat] SHA2-384
904,670 UART: [kat] SHA2-512-ACC
906,571 UART: [kat] ECC-384
916,740 UART: [kat] HMAC-384Kdf
921,298 UART: [kat] LMS
1,169,610 UART: [kat] --
1,170,607 UART: [cold-reset] ++
1,171,009 UART: [fht] FHT @ 0x50003400
1,173,825 UART: [idev] ++
1,173,993 UART: [idev] CDI.KEYID = 6
1,174,354 UART: [idev] SUBJECT.KEYID = 7
1,174,779 UART: [idev] UDS.KEYID = 0
1,183,123 UART: [idev] Erasing UDS.KEYID = 0
1,200,565 UART: [idev] Sha1 KeyId Algorithm
1,209,487 UART: [idev] --
1,210,598 UART: [ldev] ++
1,210,766 UART: [ldev] CDI.KEYID = 6
1,211,130 UART: [ldev] SUBJECT.KEYID = 5
1,211,557 UART: [ldev] AUTHORITY.KEYID = 7
1,212,020 UART: [ldev] FE.KEYID = 1
1,217,442 UART: [ldev] Erasing FE.KEYID = 1
1,243,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,658 UART: [ldev] --
1,282,954 UART: [fwproc] Wait for Commands...
1,283,703 UART: [fwproc] Recv command 0x46574c44
1,284,432 UART: Invalid Img size: 0 bytes
1,285,252 UART: ROM Fatal Error: 0x01020002
1,286,411 >>> mbox cmd response: failed
1,286,411 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,286,417 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,311 >>> mbox cmd response: failed
1,138,311 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,138,317 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,388 UART: [kat] ++
895,540 UART: [kat] sha1
899,892 UART: [kat] SHA2-256
901,832 UART: [kat] SHA2-384
904,543 UART: [kat] SHA2-512-ACC
906,444 UART: [kat] ECC-384
915,817 UART: [kat] HMAC-384Kdf
920,445 UART: [kat] LMS
1,168,757 UART: [kat] --
1,169,708 UART: [cold-reset] ++
1,170,258 UART: [fht] FHT @ 0x50003400
1,172,908 UART: [idev] ++
1,173,076 UART: [idev] CDI.KEYID = 6
1,173,437 UART: [idev] SUBJECT.KEYID = 7
1,173,862 UART: [idev] UDS.KEYID = 0
1,182,322 UART: [idev] Erasing UDS.KEYID = 0
1,199,302 UART: [idev] Sha1 KeyId Algorithm
1,208,170 UART: [idev] --
1,209,217 UART: [ldev] ++
1,209,385 UART: [ldev] CDI.KEYID = 6
1,209,749 UART: [ldev] SUBJECT.KEYID = 5
1,210,176 UART: [ldev] AUTHORITY.KEYID = 7
1,210,639 UART: [ldev] FE.KEYID = 1
1,215,959 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,483 UART: [ldev] --
1,281,943 UART: [fwproc] Wait for Commands...
1,282,702 UART: [fwproc] Recv command 0x46574c44
1,283,431 UART: Invalid Img size: 0 bytes
1,284,361 UART: ROM Fatal Error: 0x01020002
1,285,520 >>> mbox cmd response: failed
1,285,520 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,285,526 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,594 >>> mbox cmd response: failed
1,137,594 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,137,600 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,639 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
891,298 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,427 UART: [kat] ++
895,579 UART: [kat] sha1
899,685 UART: [kat] SHA2-256
901,625 UART: [kat] SHA2-384
904,454 UART: [kat] SHA2-512-ACC
906,355 UART: [kat] ECC-384
916,080 UART: [kat] HMAC-384Kdf
920,578 UART: [kat] LMS
1,168,890 UART: [kat] --
1,169,579 UART: [cold-reset] ++
1,169,953 UART: [fht] FHT @ 0x50003400
1,172,733 UART: [idev] ++
1,172,901 UART: [idev] CDI.KEYID = 6
1,173,262 UART: [idev] SUBJECT.KEYID = 7
1,173,687 UART: [idev] UDS.KEYID = 0
1,181,645 UART: [idev] Erasing UDS.KEYID = 0
1,198,637 UART: [idev] Sha1 KeyId Algorithm
1,207,445 UART: [idev] --
1,208,464 UART: [ldev] ++
1,208,632 UART: [ldev] CDI.KEYID = 6
1,208,996 UART: [ldev] SUBJECT.KEYID = 5
1,209,423 UART: [ldev] AUTHORITY.KEYID = 7
1,209,886 UART: [ldev] FE.KEYID = 1
1,215,262 UART: [ldev] Erasing FE.KEYID = 1
1,241,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,686 UART: [ldev] --
1,281,040 UART: [fwproc] Wait for Commands...
1,281,639 UART: [fwproc] Recv command 0x46574c44
1,282,368 UART: Invalid Img size: 0 bytes
1,283,100 UART: ROM Fatal Error: 0x01020002
1,284,259 >>> mbox cmd response: failed
1,284,259 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,284,265 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,701 >>> mbox cmd response: failed
1,136,701 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,136,707 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
891,381 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,510 UART: [kat] ++
895,662 UART: [kat] sha1
899,786 UART: [kat] SHA2-256
901,726 UART: [kat] SHA2-384
904,445 UART: [kat] SHA2-512-ACC
906,346 UART: [kat] ECC-384
916,393 UART: [kat] HMAC-384Kdf
920,847 UART: [kat] LMS
1,169,159 UART: [kat] --
1,170,438 UART: [cold-reset] ++
1,170,854 UART: [fht] FHT @ 0x50003400
1,173,454 UART: [idev] ++
1,173,622 UART: [idev] CDI.KEYID = 6
1,173,983 UART: [idev] SUBJECT.KEYID = 7
1,174,408 UART: [idev] UDS.KEYID = 0
1,182,076 UART: [idev] Erasing UDS.KEYID = 0
1,199,364 UART: [idev] Sha1 KeyId Algorithm
1,208,288 UART: [idev] --
1,209,417 UART: [ldev] ++
1,209,585 UART: [ldev] CDI.KEYID = 6
1,209,949 UART: [ldev] SUBJECT.KEYID = 5
1,210,376 UART: [ldev] AUTHORITY.KEYID = 7
1,210,839 UART: [ldev] FE.KEYID = 1
1,216,193 UART: [ldev] Erasing FE.KEYID = 1
1,242,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,955 UART: [ldev] --
1,282,347 UART: [fwproc] Wait for Commands...
1,282,948 UART: [fwproc] Recv command 0x46574c44
1,283,677 UART: Invalid Img size: 0 bytes
1,284,747 UART: ROM Fatal Error: 0x01020002
1,285,906 >>> mbox cmd response: failed
1,285,906 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,285,912 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,642 >>> mbox cmd response: failed
1,138,642 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,138,648 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,436 UART: [kat] SHA2-256
890,986 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,115 UART: [kat] ++
895,267 UART: [kat] sha1
899,357 UART: [kat] SHA2-256
901,297 UART: [kat] SHA2-384
903,986 UART: [kat] SHA2-512-ACC
905,887 UART: [kat] ECC-384
915,958 UART: [kat] HMAC-384Kdf
920,514 UART: [kat] LMS
1,168,826 UART: [kat] --
1,169,883 UART: [cold-reset] ++
1,170,297 UART: [fht] FHT @ 0x50003400
1,173,075 UART: [idev] ++
1,173,243 UART: [idev] CDI.KEYID = 6
1,173,604 UART: [idev] SUBJECT.KEYID = 7
1,174,029 UART: [idev] UDS.KEYID = 0
1,181,915 UART: [idev] Erasing UDS.KEYID = 0
1,198,975 UART: [idev] Sha1 KeyId Algorithm
1,207,713 UART: [idev] --
1,208,790 UART: [ldev] ++
1,208,958 UART: [ldev] CDI.KEYID = 6
1,209,322 UART: [ldev] SUBJECT.KEYID = 5
1,209,749 UART: [ldev] AUTHORITY.KEYID = 7
1,210,212 UART: [ldev] FE.KEYID = 1
1,215,276 UART: [ldev] Erasing FE.KEYID = 1
1,241,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,740 UART: [ldev] --
1,281,246 UART: [fwproc] Wait for Commands...
1,281,907 UART: [fwproc] Recv command 0x46574c44
1,282,636 UART: Invalid Img size: 0 bytes
1,283,330 UART: ROM Fatal Error: 0x01020002
1,284,489 >>> mbox cmd response: failed
1,284,489 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,284,495 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,339 >>> mbox cmd response: failed
1,137,339 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,137,345 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
891,477 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,606 UART: [kat] ++
895,758 UART: [kat] sha1
899,906 UART: [kat] SHA2-256
901,846 UART: [kat] SHA2-384
904,631 UART: [kat] SHA2-512-ACC
906,532 UART: [kat] ECC-384
916,019 UART: [kat] HMAC-384Kdf
920,573 UART: [kat] LMS
1,168,885 UART: [kat] --
1,169,676 UART: [cold-reset] ++
1,170,174 UART: [fht] FHT @ 0x50003400
1,172,736 UART: [idev] ++
1,172,904 UART: [idev] CDI.KEYID = 6
1,173,265 UART: [idev] SUBJECT.KEYID = 7
1,173,690 UART: [idev] UDS.KEYID = 0
1,181,918 UART: [idev] Erasing UDS.KEYID = 0
1,199,074 UART: [idev] Sha1 KeyId Algorithm
1,208,018 UART: [idev] --
1,208,881 UART: [ldev] ++
1,209,049 UART: [ldev] CDI.KEYID = 6
1,209,413 UART: [ldev] SUBJECT.KEYID = 5
1,209,840 UART: [ldev] AUTHORITY.KEYID = 7
1,210,303 UART: [ldev] FE.KEYID = 1
1,215,615 UART: [ldev] Erasing FE.KEYID = 1
1,242,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,705 UART: [ldev] --
1,280,985 UART: [fwproc] Wait for Commands...
1,281,734 UART: [fwproc] Recv command 0x46574c44
1,282,463 UART: Invalid Img size: 0 bytes
1,283,365 UART: ROM Fatal Error: 0x01020002
1,284,524 >>> mbox cmd response: failed
1,284,524 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,284,530 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,038 >>> mbox cmd response: failed
1,138,038 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,138,044 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
891,298 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,427 UART: [kat] ++
895,579 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,302 UART: [kat] SHA2-512-ACC
906,203 UART: [kat] ECC-384
915,838 UART: [kat] HMAC-384Kdf
920,478 UART: [kat] LMS
1,168,790 UART: [kat] --
1,169,931 UART: [cold-reset] ++
1,170,359 UART: [fht] FHT @ 0x50003400
1,172,919 UART: [idev] ++
1,173,087 UART: [idev] CDI.KEYID = 6
1,173,448 UART: [idev] SUBJECT.KEYID = 7
1,173,873 UART: [idev] UDS.KEYID = 0
1,182,053 UART: [idev] Erasing UDS.KEYID = 0
1,198,999 UART: [idev] Sha1 KeyId Algorithm
1,207,969 UART: [idev] --
1,209,006 UART: [ldev] ++
1,209,174 UART: [ldev] CDI.KEYID = 6
1,209,538 UART: [ldev] SUBJECT.KEYID = 5
1,209,965 UART: [ldev] AUTHORITY.KEYID = 7
1,210,428 UART: [ldev] FE.KEYID = 1
1,215,536 UART: [ldev] Erasing FE.KEYID = 1
1,241,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,868 UART: [ldev] --
1,281,378 UART: [fwproc] Wait for Commands...
1,281,971 UART: [fwproc] Recv command 0x4d454153
1,283,824 UART: ROM Fatal Error: 0x01020005
1,284,983 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,811 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,885 UART: [state] LifecycleState = Unprovisioned
86,540 UART: [state] DebugLocked = No
87,272 UART: [state] WD Timer not started. Device not locked for debugging
88,587 UART: [kat] SHA2-256
892,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,266 UART: [kat] ++
896,418 UART: [kat] sha1
900,590 UART: [kat] SHA2-256
902,530 UART: [kat] SHA2-384
905,251 UART: [kat] SHA2-512-ACC
907,152 UART: [kat] ECC-384
916,703 UART: [kat] HMAC-384Kdf
921,391 UART: [kat] LMS
1,169,703 UART: [kat] --
1,170,534 UART: [cold-reset] ++
1,171,054 UART: [fht] FHT @ 0x50003400
1,173,724 UART: [idev] ++
1,173,892 UART: [idev] CDI.KEYID = 6
1,174,253 UART: [idev] SUBJECT.KEYID = 7
1,174,678 UART: [idev] UDS.KEYID = 0
1,182,950 UART: [idev] Erasing UDS.KEYID = 0
1,200,522 UART: [idev] Sha1 KeyId Algorithm
1,209,618 UART: [idev] --
1,210,695 UART: [ldev] ++
1,210,863 UART: [ldev] CDI.KEYID = 6
1,211,227 UART: [ldev] SUBJECT.KEYID = 5
1,211,654 UART: [ldev] AUTHORITY.KEYID = 7
1,212,117 UART: [ldev] FE.KEYID = 1
1,217,397 UART: [ldev] Erasing FE.KEYID = 1
1,243,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,651 UART: [ldev] --
1,283,167 UART: [fwproc] Wait for Commands...
1,283,952 UART: [fwproc] Recv command 0x4d454153
1,286,059 UART: ROM Fatal Error: 0x01020005
1,287,218 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,540 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,401 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
891,136 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,265 UART: [kat] ++
895,417 UART: [kat] sha1
899,777 UART: [kat] SHA2-256
901,717 UART: [kat] SHA2-384
904,544 UART: [kat] SHA2-512-ACC
906,445 UART: [kat] ECC-384
915,984 UART: [kat] HMAC-384Kdf
920,762 UART: [kat] LMS
1,169,074 UART: [kat] --
1,170,235 UART: [cold-reset] ++
1,170,569 UART: [fht] FHT @ 0x50003400
1,173,153 UART: [idev] ++
1,173,321 UART: [idev] CDI.KEYID = 6
1,173,682 UART: [idev] SUBJECT.KEYID = 7
1,174,107 UART: [idev] UDS.KEYID = 0
1,182,377 UART: [idev] Erasing UDS.KEYID = 0
1,199,415 UART: [idev] Sha1 KeyId Algorithm
1,208,383 UART: [idev] --
1,209,384 UART: [ldev] ++
1,209,552 UART: [ldev] CDI.KEYID = 6
1,209,916 UART: [ldev] SUBJECT.KEYID = 5
1,210,343 UART: [ldev] AUTHORITY.KEYID = 7
1,210,806 UART: [ldev] FE.KEYID = 1
1,216,118 UART: [ldev] Erasing FE.KEYID = 1
1,242,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,544 UART: [ldev] --
1,282,062 UART: [fwproc] Wait for Commands...
1,282,697 UART: [fwproc] Recv command 0x4d454153
1,284,694 UART: ROM Fatal Error: 0x01020005
1,285,853 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,703 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Unprovisioned
86,460 UART: [state] DebugLocked = No
87,094 UART: [state] WD Timer not started. Device not locked for debugging
88,341 UART: [kat] SHA2-256
891,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,020 UART: [kat] ++
896,172 UART: [kat] sha1
900,312 UART: [kat] SHA2-256
902,252 UART: [kat] SHA2-384
905,027 UART: [kat] SHA2-512-ACC
906,928 UART: [kat] ECC-384
916,431 UART: [kat] HMAC-384Kdf
920,933 UART: [kat] LMS
1,169,245 UART: [kat] --
1,170,172 UART: [cold-reset] ++
1,170,508 UART: [fht] FHT @ 0x50003400
1,173,132 UART: [idev] ++
1,173,300 UART: [idev] CDI.KEYID = 6
1,173,661 UART: [idev] SUBJECT.KEYID = 7
1,174,086 UART: [idev] UDS.KEYID = 0
1,181,694 UART: [idev] Erasing UDS.KEYID = 0
1,199,202 UART: [idev] Sha1 KeyId Algorithm
1,208,144 UART: [idev] --
1,208,967 UART: [ldev] ++
1,209,135 UART: [ldev] CDI.KEYID = 6
1,209,499 UART: [ldev] SUBJECT.KEYID = 5
1,209,926 UART: [ldev] AUTHORITY.KEYID = 7
1,210,389 UART: [ldev] FE.KEYID = 1
1,215,647 UART: [ldev] Erasing FE.KEYID = 1
1,242,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,975 UART: [ldev] --
1,281,361 UART: [fwproc] Wait for Commands...
1,282,096 UART: [fwproc] Recv command 0x4d454153
1,284,107 UART: ROM Fatal Error: 0x01020005
1,285,266 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,578 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
891,192 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,321 UART: [kat] ++
895,473 UART: [kat] sha1
899,811 UART: [kat] SHA2-256
901,751 UART: [kat] SHA2-384
904,584 UART: [kat] SHA2-512-ACC
906,485 UART: [kat] ECC-384
916,142 UART: [kat] HMAC-384Kdf
920,824 UART: [kat] LMS
1,169,136 UART: [kat] --
1,169,935 UART: [cold-reset] ++
1,170,327 UART: [fht] FHT @ 0x50003400
1,173,187 UART: [idev] ++
1,173,355 UART: [idev] CDI.KEYID = 6
1,173,716 UART: [idev] SUBJECT.KEYID = 7
1,174,141 UART: [idev] UDS.KEYID = 0
1,181,749 UART: [idev] Erasing UDS.KEYID = 0
1,198,807 UART: [idev] Sha1 KeyId Algorithm
1,207,561 UART: [idev] --
1,208,648 UART: [ldev] ++
1,208,816 UART: [ldev] CDI.KEYID = 6
1,209,180 UART: [ldev] SUBJECT.KEYID = 5
1,209,607 UART: [ldev] AUTHORITY.KEYID = 7
1,210,070 UART: [ldev] FE.KEYID = 1
1,215,106 UART: [ldev] Erasing FE.KEYID = 1
1,241,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,208 UART: [ldev] --
1,280,606 UART: [fwproc] Wait for Commands...
1,281,215 UART: [fwproc] Recv command 0x4d454153
1,283,438 UART: ROM Fatal Error: 0x01020005
1,284,597 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,137 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
891,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,568 UART: [kat] ++
895,720 UART: [kat] sha1
900,048 UART: [kat] SHA2-256
901,988 UART: [kat] SHA2-384
904,651 UART: [kat] SHA2-512-ACC
906,552 UART: [kat] ECC-384
916,359 UART: [kat] HMAC-384Kdf
920,949 UART: [kat] LMS
1,169,261 UART: [kat] --
1,170,412 UART: [cold-reset] ++
1,170,824 UART: [fht] FHT @ 0x50003400
1,173,480 UART: [idev] ++
1,173,648 UART: [idev] CDI.KEYID = 6
1,174,009 UART: [idev] SUBJECT.KEYID = 7
1,174,434 UART: [idev] UDS.KEYID = 0
1,182,694 UART: [idev] Erasing UDS.KEYID = 0
1,199,474 UART: [idev] Sha1 KeyId Algorithm
1,208,430 UART: [idev] --
1,209,485 UART: [ldev] ++
1,209,653 UART: [ldev] CDI.KEYID = 6
1,210,017 UART: [ldev] SUBJECT.KEYID = 5
1,210,444 UART: [ldev] AUTHORITY.KEYID = 7
1,210,907 UART: [ldev] FE.KEYID = 1
1,216,271 UART: [ldev] Erasing FE.KEYID = 1
1,242,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,247 UART: [ldev] --
1,281,639 UART: [fwproc] Wait for Commands...
1,282,330 UART: [fwproc] Recv command 0x4d454153
1,284,417 UART: ROM Fatal Error: 0x01020005
1,285,576 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,640 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Unprovisioned
86,121 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,902 UART: [kat] SHA2-256
891,452 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,581 UART: [kat] ++
895,733 UART: [kat] sha1
899,987 UART: [kat] SHA2-256
901,927 UART: [kat] SHA2-384
904,776 UART: [kat] SHA2-512-ACC
906,677 UART: [kat] ECC-384
916,482 UART: [kat] HMAC-384Kdf
920,998 UART: [kat] LMS
1,169,310 UART: [kat] --
1,170,339 UART: [cold-reset] ++
1,170,785 UART: [fht] FHT @ 0x50003400
1,173,421 UART: [idev] ++
1,173,589 UART: [idev] CDI.KEYID = 6
1,173,950 UART: [idev] SUBJECT.KEYID = 7
1,174,375 UART: [idev] UDS.KEYID = 0
1,182,159 UART: [idev] Erasing UDS.KEYID = 0
1,198,895 UART: [idev] Sha1 KeyId Algorithm
1,207,853 UART: [idev] --
1,209,034 UART: [ldev] ++
1,209,202 UART: [ldev] CDI.KEYID = 6
1,209,566 UART: [ldev] SUBJECT.KEYID = 5
1,209,993 UART: [ldev] AUTHORITY.KEYID = 7
1,210,456 UART: [ldev] FE.KEYID = 1
1,215,530 UART: [ldev] Erasing FE.KEYID = 1
1,241,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,038 UART: [ldev] --
1,281,428 UART: [fwproc] Wait for Commands...
1,282,221 UART: [fwproc] Recv command 0x43415053
1,283,454 UART: ROM Fatal Error: 0x01020006
1,284,613 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,136,643 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
891,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,874 UART: [kat] ++
896,026 UART: [kat] sha1
900,280 UART: [kat] SHA2-256
902,220 UART: [kat] SHA2-384
904,863 UART: [kat] SHA2-512-ACC
906,764 UART: [kat] ECC-384
916,571 UART: [kat] HMAC-384Kdf
921,249 UART: [kat] LMS
1,169,561 UART: [kat] --
1,170,474 UART: [cold-reset] ++
1,170,996 UART: [fht] FHT @ 0x50003400
1,173,716 UART: [idev] ++
1,173,884 UART: [idev] CDI.KEYID = 6
1,174,245 UART: [idev] SUBJECT.KEYID = 7
1,174,670 UART: [idev] UDS.KEYID = 0
1,182,722 UART: [idev] Erasing UDS.KEYID = 0
1,199,740 UART: [idev] Sha1 KeyId Algorithm
1,208,784 UART: [idev] --
1,209,853 UART: [ldev] ++
1,210,021 UART: [ldev] CDI.KEYID = 6
1,210,385 UART: [ldev] SUBJECT.KEYID = 5
1,210,812 UART: [ldev] AUTHORITY.KEYID = 7
1,211,275 UART: [ldev] FE.KEYID = 1
1,216,313 UART: [ldev] Erasing FE.KEYID = 1
1,242,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,889 UART: [ldev] --
1,282,309 UART: [fwproc] Wait for Commands...
1,282,964 UART: [fwproc] Recv command 0x43415053
1,283,987 UART: ROM Fatal Error: 0x01020006
1,285,146 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,138,706 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,781 UART: [state] WD Timer not started. Device not locked for debugging
87,902 UART: [kat] SHA2-256
891,452 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,581 UART: [kat] ++
895,733 UART: [kat] sha1
899,949 UART: [kat] SHA2-256
901,889 UART: [kat] SHA2-384
904,864 UART: [kat] SHA2-512-ACC
906,765 UART: [kat] ECC-384
916,582 UART: [kat] HMAC-384Kdf
921,362 UART: [kat] LMS
1,169,674 UART: [kat] --
1,170,459 UART: [cold-reset] ++
1,170,865 UART: [fht] FHT @ 0x50003400
1,173,457 UART: [idev] ++
1,173,625 UART: [idev] CDI.KEYID = 6
1,173,986 UART: [idev] SUBJECT.KEYID = 7
1,174,411 UART: [idev] UDS.KEYID = 0
1,182,381 UART: [idev] Erasing UDS.KEYID = 0
1,199,537 UART: [idev] Sha1 KeyId Algorithm
1,208,401 UART: [idev] --
1,209,438 UART: [ldev] ++
1,209,606 UART: [ldev] CDI.KEYID = 6
1,209,970 UART: [ldev] SUBJECT.KEYID = 5
1,210,397 UART: [ldev] AUTHORITY.KEYID = 7
1,210,860 UART: [ldev] FE.KEYID = 1
1,215,810 UART: [ldev] Erasing FE.KEYID = 1
1,241,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,300 UART: [ldev] --
1,280,682 UART: [fwproc] Wait for Commands...
1,281,377 UART: [fwproc] Recv command 0x43415053
1,282,526 UART: ROM Fatal Error: 0x01020006
1,283,685 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,137,053 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,930 UART: [state] WD Timer not started. Device not locked for debugging
88,289 UART: [kat] SHA2-256
891,839 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,968 UART: [kat] ++
896,120 UART: [kat] sha1
900,382 UART: [kat] SHA2-256
902,322 UART: [kat] SHA2-384
905,119 UART: [kat] SHA2-512-ACC
907,020 UART: [kat] ECC-384
917,071 UART: [kat] HMAC-384Kdf
921,901 UART: [kat] LMS
1,170,213 UART: [kat] --
1,171,514 UART: [cold-reset] ++
1,171,874 UART: [fht] FHT @ 0x50003400
1,174,500 UART: [idev] ++
1,174,668 UART: [idev] CDI.KEYID = 6
1,175,029 UART: [idev] SUBJECT.KEYID = 7
1,175,454 UART: [idev] UDS.KEYID = 0
1,183,322 UART: [idev] Erasing UDS.KEYID = 0
1,200,266 UART: [idev] Sha1 KeyId Algorithm
1,209,048 UART: [idev] --
1,210,023 UART: [ldev] ++
1,210,191 UART: [ldev] CDI.KEYID = 6
1,210,555 UART: [ldev] SUBJECT.KEYID = 5
1,210,982 UART: [ldev] AUTHORITY.KEYID = 7
1,211,445 UART: [ldev] FE.KEYID = 1
1,216,417 UART: [ldev] Erasing FE.KEYID = 1
1,242,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,093 UART: [fwproc] Wait for Commands...
1,282,810 UART: [fwproc] Recv command 0x43415053
1,283,853 UART: ROM Fatal Error: 0x01020006
1,285,012 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,137,830 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,638 UART: [state] LifecycleState = Unprovisioned
86,293 UART: [state] DebugLocked = No
86,941 UART: [state] WD Timer not started. Device not locked for debugging
88,180 UART: [kat] SHA2-256
891,730 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,859 UART: [kat] ++
896,011 UART: [kat] sha1
900,299 UART: [kat] SHA2-256
902,239 UART: [kat] SHA2-384
904,910 UART: [kat] SHA2-512-ACC
906,811 UART: [kat] ECC-384
916,858 UART: [kat] HMAC-384Kdf
921,356 UART: [kat] LMS
1,169,668 UART: [kat] --
1,170,593 UART: [cold-reset] ++
1,171,087 UART: [fht] FHT @ 0x50003400
1,173,567 UART: [idev] ++
1,173,735 UART: [idev] CDI.KEYID = 6
1,174,096 UART: [idev] SUBJECT.KEYID = 7
1,174,521 UART: [idev] UDS.KEYID = 0
1,182,461 UART: [idev] Erasing UDS.KEYID = 0
1,199,733 UART: [idev] Sha1 KeyId Algorithm
1,208,617 UART: [idev] --
1,209,744 UART: [ldev] ++
1,209,912 UART: [ldev] CDI.KEYID = 6
1,210,276 UART: [ldev] SUBJECT.KEYID = 5
1,210,703 UART: [ldev] AUTHORITY.KEYID = 7
1,211,166 UART: [ldev] FE.KEYID = 1
1,216,226 UART: [ldev] Erasing FE.KEYID = 1
1,242,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,248 UART: [ldev] --
1,281,756 UART: [fwproc] Wait for Commands...
1,282,327 UART: [fwproc] Recv command 0x43415053
1,283,432 UART: ROM Fatal Error: 0x01020006
1,284,591 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,138,293 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Unprovisioned
85,730 UART: [state] DebugLocked = No
86,450 UART: [state] WD Timer not started. Device not locked for debugging
87,719 UART: [kat] SHA2-256
891,269 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,398 UART: [kat] ++
895,550 UART: [kat] sha1
899,888 UART: [kat] SHA2-256
901,828 UART: [kat] SHA2-384
904,635 UART: [kat] SHA2-512-ACC
906,536 UART: [kat] ECC-384
916,173 UART: [kat] HMAC-384Kdf
920,801 UART: [kat] LMS
1,169,113 UART: [kat] --
1,169,974 UART: [cold-reset] ++
1,170,356 UART: [fht] FHT @ 0x50003400
1,173,032 UART: [idev] ++
1,173,200 UART: [idev] CDI.KEYID = 6
1,173,561 UART: [idev] SUBJECT.KEYID = 7
1,173,986 UART: [idev] UDS.KEYID = 0
1,181,916 UART: [idev] Erasing UDS.KEYID = 0
1,199,330 UART: [idev] Sha1 KeyId Algorithm
1,208,126 UART: [idev] --
1,209,327 UART: [ldev] ++
1,209,495 UART: [ldev] CDI.KEYID = 6
1,209,859 UART: [ldev] SUBJECT.KEYID = 5
1,210,286 UART: [ldev] AUTHORITY.KEYID = 7
1,210,749 UART: [ldev] FE.KEYID = 1
1,216,097 UART: [ldev] Erasing FE.KEYID = 1
1,242,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,983 UART: [ldev] --
1,281,373 UART: [fwproc] Wait for Commands...
1,282,192 UART: [fwproc] Recv command 0x43415053
1,283,387 UART: ROM Fatal Error: 0x01020006
1,284,546 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,136,668 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,061 UART: [state] WD Timer not started. Device not locked for debugging
87,262 UART: [kat] SHA2-256
890,812 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,941 UART: [kat] ++
895,093 UART: [kat] sha1
899,167 UART: [kat] SHA2-256
901,107 UART: [kat] SHA2-384
903,746 UART: [kat] SHA2-512-ACC
905,647 UART: [kat] ECC-384
915,318 UART: [kat] HMAC-384Kdf
920,074 UART: [kat] LMS
1,168,386 UART: [kat] --
1,169,301 UART: [cold-reset] ++
1,169,699 UART: [fht] FHT @ 0x50003400
1,172,373 UART: [idev] ++
1,172,541 UART: [idev] CDI.KEYID = 6
1,172,902 UART: [idev] SUBJECT.KEYID = 7
1,173,327 UART: [idev] UDS.KEYID = 0
1,181,329 UART: [idev] Erasing UDS.KEYID = 0
1,197,909 UART: [idev] Sha1 KeyId Algorithm
1,206,747 UART: [idev] --
1,207,816 UART: [ldev] ++
1,207,984 UART: [ldev] CDI.KEYID = 6
1,208,348 UART: [ldev] SUBJECT.KEYID = 5
1,208,775 UART: [ldev] AUTHORITY.KEYID = 7
1,209,238 UART: [ldev] FE.KEYID = 1
1,214,224 UART: [ldev] Erasing FE.KEYID = 1
1,240,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,178 UART: [ldev] --
1,279,454 UART: [fwproc] Wait for Commands...
1,280,197 UART: [fwproc] Recv command 0x4d454153
1,281,523 UART: ROM Fatal Error: 0x01020006
1,282,682 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,136,294 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
891,553 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,682 UART: [kat] ++
895,834 UART: [kat] sha1
900,090 UART: [kat] SHA2-256
902,030 UART: [kat] SHA2-384
904,827 UART: [kat] SHA2-512-ACC
906,728 UART: [kat] ECC-384
916,295 UART: [kat] HMAC-384Kdf
920,971 UART: [kat] LMS
1,169,283 UART: [kat] --
1,169,902 UART: [cold-reset] ++
1,170,334 UART: [fht] FHT @ 0x50003400
1,172,894 UART: [idev] ++
1,173,062 UART: [idev] CDI.KEYID = 6
1,173,423 UART: [idev] SUBJECT.KEYID = 7
1,173,848 UART: [idev] UDS.KEYID = 0
1,181,946 UART: [idev] Erasing UDS.KEYID = 0
1,199,046 UART: [idev] Sha1 KeyId Algorithm
1,207,768 UART: [idev] --
1,208,613 UART: [ldev] ++
1,208,781 UART: [ldev] CDI.KEYID = 6
1,209,145 UART: [ldev] SUBJECT.KEYID = 5
1,209,572 UART: [ldev] AUTHORITY.KEYID = 7
1,210,035 UART: [ldev] FE.KEYID = 1
1,215,531 UART: [ldev] Erasing FE.KEYID = 1
1,242,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,897 UART: [ldev] --
1,281,277 UART: [fwproc] Wait for Commands...
1,281,930 UART: [fwproc] Recv command 0x4d454153
1,283,052 UART: ROM Fatal Error: 0x01020006
1,284,211 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,137,127 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,819 UART: [state] WD Timer not started. Device not locked for debugging
88,112 UART: [kat] SHA2-256
891,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,791 UART: [kat] ++
895,943 UART: [kat] sha1
900,049 UART: [kat] SHA2-256
901,989 UART: [kat] SHA2-384
904,700 UART: [kat] SHA2-512-ACC
906,601 UART: [kat] ECC-384
916,446 UART: [kat] HMAC-384Kdf
920,922 UART: [kat] LMS
1,169,234 UART: [kat] --
1,170,165 UART: [cold-reset] ++
1,170,611 UART: [fht] FHT @ 0x50003400
1,173,113 UART: [idev] ++
1,173,281 UART: [idev] CDI.KEYID = 6
1,173,642 UART: [idev] SUBJECT.KEYID = 7
1,174,067 UART: [idev] UDS.KEYID = 0
1,182,161 UART: [idev] Erasing UDS.KEYID = 0
1,199,471 UART: [idev] Sha1 KeyId Algorithm
1,208,295 UART: [idev] --
1,209,344 UART: [ldev] ++
1,209,512 UART: [ldev] CDI.KEYID = 6
1,209,876 UART: [ldev] SUBJECT.KEYID = 5
1,210,303 UART: [ldev] AUTHORITY.KEYID = 7
1,210,766 UART: [ldev] FE.KEYID = 1
1,215,934 UART: [ldev] Erasing FE.KEYID = 1
1,241,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,814 UART: [ldev] --
1,281,286 UART: [fwproc] Wait for Commands...
1,281,913 UART: [fwproc] Recv command 0x4d454153
1,283,125 UART: ROM Fatal Error: 0x01020006
1,284,284 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,135,868 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
899,864 UART: [kat] SHA2-256
901,804 UART: [kat] SHA2-384
904,579 UART: [kat] SHA2-512-ACC
906,480 UART: [kat] ECC-384
916,251 UART: [kat] HMAC-384Kdf
920,833 UART: [kat] LMS
1,169,145 UART: [kat] --
1,169,842 UART: [cold-reset] ++
1,170,412 UART: [fht] FHT @ 0x50003400
1,173,106 UART: [idev] ++
1,173,274 UART: [idev] CDI.KEYID = 6
1,173,635 UART: [idev] SUBJECT.KEYID = 7
1,174,060 UART: [idev] UDS.KEYID = 0
1,182,044 UART: [idev] Erasing UDS.KEYID = 0
1,199,036 UART: [idev] Sha1 KeyId Algorithm
1,207,914 UART: [idev] --
1,208,939 UART: [ldev] ++
1,209,107 UART: [ldev] CDI.KEYID = 6
1,209,471 UART: [ldev] SUBJECT.KEYID = 5
1,209,898 UART: [ldev] AUTHORITY.KEYID = 7
1,210,361 UART: [ldev] FE.KEYID = 1
1,215,391 UART: [ldev] Erasing FE.KEYID = 1
1,242,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,577 UART: [ldev] --
1,282,067 UART: [fwproc] Wait for Commands...
1,282,816 UART: [fwproc] Recv command 0x4d454153
1,284,078 UART: ROM Fatal Error: 0x01020006
1,285,237 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,138,879 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
891,340 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,469 UART: [kat] ++
895,621 UART: [kat] sha1
899,779 UART: [kat] SHA2-256
901,719 UART: [kat] SHA2-384
904,622 UART: [kat] SHA2-512-ACC
906,523 UART: [kat] ECC-384
916,208 UART: [kat] HMAC-384Kdf
920,762 UART: [kat] LMS
1,169,074 UART: [kat] --
1,169,959 UART: [cold-reset] ++
1,170,337 UART: [fht] FHT @ 0x50003400
1,173,231 UART: [idev] ++
1,173,399 UART: [idev] CDI.KEYID = 6
1,173,760 UART: [idev] SUBJECT.KEYID = 7
1,174,185 UART: [idev] UDS.KEYID = 0
1,182,143 UART: [idev] Erasing UDS.KEYID = 0
1,199,423 UART: [idev] Sha1 KeyId Algorithm
1,208,133 UART: [idev] --
1,209,224 UART: [ldev] ++
1,209,392 UART: [ldev] CDI.KEYID = 6
1,209,756 UART: [ldev] SUBJECT.KEYID = 5
1,210,183 UART: [ldev] AUTHORITY.KEYID = 7
1,210,646 UART: [ldev] FE.KEYID = 1
1,215,840 UART: [ldev] Erasing FE.KEYID = 1
1,241,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,158 UART: [ldev] --
1,280,624 UART: [fwproc] Wait for Commands...
1,281,435 UART: [fwproc] Recv command 0x4d454153
1,282,941 UART: ROM Fatal Error: 0x01020006
1,284,100 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,134,590 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,570 UART: [kat] ++
895,722 UART: [kat] sha1
899,984 UART: [kat] SHA2-256
901,924 UART: [kat] SHA2-384
904,731 UART: [kat] SHA2-512-ACC
906,632 UART: [kat] ECC-384
916,599 UART: [kat] HMAC-384Kdf
921,107 UART: [kat] LMS
1,169,419 UART: [kat] --
1,170,066 UART: [cold-reset] ++
1,170,432 UART: [fht] FHT @ 0x50003400
1,173,026 UART: [idev] ++
1,173,194 UART: [idev] CDI.KEYID = 6
1,173,555 UART: [idev] SUBJECT.KEYID = 7
1,173,980 UART: [idev] UDS.KEYID = 0
1,181,634 UART: [idev] Erasing UDS.KEYID = 0
1,198,610 UART: [idev] Sha1 KeyId Algorithm
1,207,510 UART: [idev] --
1,208,487 UART: [ldev] ++
1,208,655 UART: [ldev] CDI.KEYID = 6
1,209,019 UART: [ldev] SUBJECT.KEYID = 5
1,209,446 UART: [ldev] AUTHORITY.KEYID = 7
1,209,909 UART: [ldev] FE.KEYID = 1
1,215,251 UART: [ldev] Erasing FE.KEYID = 1
1,242,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,205 UART: [ldev] --
1,281,473 UART: [fwproc] Wait for Commands...
1,282,282 UART: [fwproc] Recv command 0x4d454153
1,283,728 UART: ROM Fatal Error: 0x01020006
1,284,887 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,139,199 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,785 UART: [kat] SHA2-256
901,725 UART: [kat] SHA2-384
904,378 UART: [kat] SHA2-512-ACC
906,279 UART: [kat] ECC-384
916,064 UART: [kat] HMAC-384Kdf
920,506 UART: [kat] LMS
1,168,818 UART: [kat] --
1,169,649 UART: [cold-reset] ++
1,170,191 UART: [fht] FHT @ 0x50003400
1,172,975 UART: [idev] ++
1,173,143 UART: [idev] CDI.KEYID = 6
1,173,504 UART: [idev] SUBJECT.KEYID = 7
1,173,929 UART: [idev] UDS.KEYID = 0
1,182,225 UART: [idev] Erasing UDS.KEYID = 0
1,199,185 UART: [idev] Sha1 KeyId Algorithm
1,207,973 UART: [idev] --
1,209,030 UART: [ldev] ++
1,209,198 UART: [ldev] CDI.KEYID = 6
1,209,562 UART: [ldev] SUBJECT.KEYID = 5
1,209,989 UART: [ldev] AUTHORITY.KEYID = 7
1,210,452 UART: [ldev] FE.KEYID = 1
1,215,450 UART: [ldev] Erasing FE.KEYID = 1
1,241,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,066 UART: [ldev] --
1,280,446 UART: [fwproc] Wait for Commands...
1,281,203 UART: [fwproc] Recv command 0x43415053
1,282,318 UART: ROM Fatal Error: 0x01020006
1,283,477 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,136,393 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
891,367 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,496 UART: [kat] ++
895,648 UART: [kat] sha1
899,934 UART: [kat] SHA2-256
901,874 UART: [kat] SHA2-384
904,607 UART: [kat] SHA2-512-ACC
906,508 UART: [kat] ECC-384
916,333 UART: [kat] HMAC-384Kdf
920,947 UART: [kat] LMS
1,169,259 UART: [kat] --
1,170,108 UART: [cold-reset] ++
1,170,560 UART: [fht] FHT @ 0x50003400
1,173,226 UART: [idev] ++
1,173,394 UART: [idev] CDI.KEYID = 6
1,173,755 UART: [idev] SUBJECT.KEYID = 7
1,174,180 UART: [idev] UDS.KEYID = 0
1,182,536 UART: [idev] Erasing UDS.KEYID = 0
1,199,740 UART: [idev] Sha1 KeyId Algorithm
1,208,490 UART: [idev] --
1,209,593 UART: [ldev] ++
1,209,761 UART: [ldev] CDI.KEYID = 6
1,210,125 UART: [ldev] SUBJECT.KEYID = 5
1,210,552 UART: [ldev] AUTHORITY.KEYID = 7
1,211,015 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,242,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,507 UART: [ldev] --
1,281,793 UART: [fwproc] Wait for Commands...
1,282,584 UART: [fwproc] Recv command 0x43415053
1,283,719 UART: ROM Fatal Error: 0x01020006
1,284,878 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,138,856 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,702 UART: [state] LifecycleState = Unprovisioned
86,357 UART: [state] DebugLocked = No
86,927 UART: [state] WD Timer not started. Device not locked for debugging
88,188 UART: [kat] SHA2-256
891,738 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,867 UART: [kat] ++
896,019 UART: [kat] sha1
900,175 UART: [kat] SHA2-256
902,115 UART: [kat] SHA2-384
904,910 UART: [kat] SHA2-512-ACC
906,811 UART: [kat] ECC-384
916,646 UART: [kat] HMAC-384Kdf
921,184 UART: [kat] LMS
1,169,496 UART: [kat] --
1,170,371 UART: [cold-reset] ++
1,170,867 UART: [fht] FHT @ 0x50003400
1,173,447 UART: [idev] ++
1,173,615 UART: [idev] CDI.KEYID = 6
1,173,976 UART: [idev] SUBJECT.KEYID = 7
1,174,401 UART: [idev] UDS.KEYID = 0
1,182,495 UART: [idev] Erasing UDS.KEYID = 0
1,199,533 UART: [idev] Sha1 KeyId Algorithm
1,208,405 UART: [idev] --
1,209,408 UART: [ldev] ++
1,209,576 UART: [ldev] CDI.KEYID = 6
1,209,940 UART: [ldev] SUBJECT.KEYID = 5
1,210,367 UART: [ldev] AUTHORITY.KEYID = 7
1,210,830 UART: [ldev] FE.KEYID = 1
1,215,818 UART: [ldev] Erasing FE.KEYID = 1
1,242,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,302 UART: [ldev] --
1,281,714 UART: [fwproc] Wait for Commands...
1,282,395 UART: [fwproc] Recv command 0x43415053
1,283,584 UART: ROM Fatal Error: 0x01020006
1,284,743 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,136,665 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,568 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
891,473 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,602 UART: [kat] ++
895,754 UART: [kat] sha1
900,118 UART: [kat] SHA2-256
902,058 UART: [kat] SHA2-384
904,819 UART: [kat] SHA2-512-ACC
906,720 UART: [kat] ECC-384
916,887 UART: [kat] HMAC-384Kdf
921,501 UART: [kat] LMS
1,169,813 UART: [kat] --
1,170,814 UART: [cold-reset] ++
1,171,158 UART: [fht] FHT @ 0x50003400
1,173,884 UART: [idev] ++
1,174,052 UART: [idev] CDI.KEYID = 6
1,174,413 UART: [idev] SUBJECT.KEYID = 7
1,174,838 UART: [idev] UDS.KEYID = 0
1,182,728 UART: [idev] Erasing UDS.KEYID = 0
1,199,848 UART: [idev] Sha1 KeyId Algorithm
1,208,824 UART: [idev] --
1,209,669 UART: [ldev] ++
1,209,837 UART: [ldev] CDI.KEYID = 6
1,210,201 UART: [ldev] SUBJECT.KEYID = 5
1,210,628 UART: [ldev] AUTHORITY.KEYID = 7
1,211,091 UART: [ldev] FE.KEYID = 1
1,216,399 UART: [ldev] Erasing FE.KEYID = 1
1,243,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,941 UART: [ldev] --
1,282,259 UART: [fwproc] Wait for Commands...
1,283,060 UART: [fwproc] Recv command 0x43415053
1,284,271 UART: ROM Fatal Error: 0x01020006
1,285,430 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,138,524 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,318 UART: [kat] SHA2-256
890,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,997 UART: [kat] ++
895,149 UART: [kat] sha1
899,143 UART: [kat] SHA2-256
901,083 UART: [kat] SHA2-384
903,742 UART: [kat] SHA2-512-ACC
905,643 UART: [kat] ECC-384
915,824 UART: [kat] HMAC-384Kdf
920,582 UART: [kat] LMS
1,168,894 UART: [kat] --
1,170,025 UART: [cold-reset] ++
1,170,383 UART: [fht] FHT @ 0x50003400
1,173,193 UART: [idev] ++
1,173,361 UART: [idev] CDI.KEYID = 6
1,173,722 UART: [idev] SUBJECT.KEYID = 7
1,174,147 UART: [idev] UDS.KEYID = 0
1,182,063 UART: [idev] Erasing UDS.KEYID = 0
1,199,663 UART: [idev] Sha1 KeyId Algorithm
1,208,377 UART: [idev] --
1,209,582 UART: [ldev] ++
1,209,750 UART: [ldev] CDI.KEYID = 6
1,210,114 UART: [ldev] SUBJECT.KEYID = 5
1,210,541 UART: [ldev] AUTHORITY.KEYID = 7
1,211,004 UART: [ldev] FE.KEYID = 1
1,216,300 UART: [ldev] Erasing FE.KEYID = 1
1,242,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,960 UART: [ldev] --
1,282,404 UART: [fwproc] Wait for Commands...
1,283,193 UART: [fwproc] Recv command 0x43415053
1,284,202 UART: ROM Fatal Error: 0x01020006
1,285,361 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,136,639 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
86,902 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
891,699 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,828 UART: [kat] ++
895,980 UART: [kat] sha1
900,032 UART: [kat] SHA2-256
901,972 UART: [kat] SHA2-384
904,949 UART: [kat] SHA2-512-ACC
906,850 UART: [kat] ECC-384
916,847 UART: [kat] HMAC-384Kdf
921,459 UART: [kat] LMS
1,169,771 UART: [kat] --
1,170,554 UART: [cold-reset] ++
1,171,002 UART: [fht] FHT @ 0x50003400
1,173,552 UART: [idev] ++
1,173,720 UART: [idev] CDI.KEYID = 6
1,174,081 UART: [idev] SUBJECT.KEYID = 7
1,174,506 UART: [idev] UDS.KEYID = 0
1,182,714 UART: [idev] Erasing UDS.KEYID = 0
1,199,950 UART: [idev] Sha1 KeyId Algorithm
1,208,636 UART: [idev] --
1,209,811 UART: [ldev] ++
1,209,979 UART: [ldev] CDI.KEYID = 6
1,210,343 UART: [ldev] SUBJECT.KEYID = 5
1,210,770 UART: [ldev] AUTHORITY.KEYID = 7
1,211,233 UART: [ldev] FE.KEYID = 1
1,216,445 UART: [ldev] Erasing FE.KEYID = 1
1,242,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,663 UART: [ldev] --
1,282,167 UART: [fwproc] Wait for Commands...
1,282,906 UART: [fwproc] Recv command 0x43415053
1,284,057 UART: ROM Fatal Error: 0x01020006
1,285,216 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,672 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,486 UART: [kat] SHA2-256
891,036 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,165 UART: [kat] ++
895,317 UART: [kat] sha1
899,519 UART: [kat] SHA2-256
901,459 UART: [kat] SHA2-384
904,052 UART: [kat] SHA2-512-ACC
905,953 UART: [kat] ECC-384
915,372 UART: [kat] HMAC-384Kdf
919,914 UART: [kat] LMS
1,168,226 UART: [kat] --
1,169,173 UART: [cold-reset] ++
1,169,581 UART: [fht] FHT @ 0x50003400
1,172,237 UART: [idev] ++
1,172,405 UART: [idev] CDI.KEYID = 6
1,172,766 UART: [idev] SUBJECT.KEYID = 7
1,173,191 UART: [idev] UDS.KEYID = 0
1,180,759 UART: [idev] Erasing UDS.KEYID = 0
1,197,567 UART: [idev] Sha1 KeyId Algorithm
1,206,479 UART: [idev] --
1,207,354 UART: [ldev] ++
1,207,522 UART: [ldev] CDI.KEYID = 6
1,207,886 UART: [ldev] SUBJECT.KEYID = 5
1,208,313 UART: [ldev] AUTHORITY.KEYID = 7
1,208,776 UART: [ldev] FE.KEYID = 1
1,213,972 UART: [ldev] Erasing FE.KEYID = 1
1,240,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,928 UART: [ldev] --
1,279,258 UART: [fwproc] Wait for Commands...
1,279,941 UART: [fwproc] Recv command 0xabcd1234
1,280,686 UART: [fwproc] Invalid command received
1,281,663 UART: ROM Fatal Error: 0x01020004
1,282,822 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,137,808 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,792 UART: [state] DebugLocked = No
86,274 UART: [state] WD Timer not started. Device not locked for debugging
87,467 UART: [kat] SHA2-256
891,017 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,146 UART: [kat] ++
895,298 UART: [kat] sha1
899,470 UART: [kat] SHA2-256
901,410 UART: [kat] SHA2-384
904,353 UART: [kat] SHA2-512-ACC
906,254 UART: [kat] ECC-384
916,155 UART: [kat] HMAC-384Kdf
920,825 UART: [kat] LMS
1,169,137 UART: [kat] --
1,169,980 UART: [cold-reset] ++
1,170,428 UART: [fht] FHT @ 0x50003400
1,172,996 UART: [idev] ++
1,173,164 UART: [idev] CDI.KEYID = 6
1,173,525 UART: [idev] SUBJECT.KEYID = 7
1,173,950 UART: [idev] UDS.KEYID = 0
1,182,310 UART: [idev] Erasing UDS.KEYID = 0
1,199,798 UART: [idev] Sha1 KeyId Algorithm
1,208,812 UART: [idev] --
1,209,779 UART: [ldev] ++
1,209,947 UART: [ldev] CDI.KEYID = 6
1,210,311 UART: [ldev] SUBJECT.KEYID = 5
1,210,738 UART: [ldev] AUTHORITY.KEYID = 7
1,211,201 UART: [ldev] FE.KEYID = 1
1,216,579 UART: [ldev] Erasing FE.KEYID = 1
1,243,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,517 UART: [ldev] --
1,283,009 UART: [fwproc] Wait for Commands...
1,283,698 UART: [fwproc] Recv command 0xabcd1234
1,284,443 UART: [fwproc] Invalid command received
1,285,396 UART: ROM Fatal Error: 0x01020004
1,286,555 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,136,981 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Unprovisioned
85,633 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
891,098 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,227 UART: [kat] ++
895,379 UART: [kat] sha1
899,705 UART: [kat] SHA2-256
901,645 UART: [kat] SHA2-384
904,222 UART: [kat] SHA2-512-ACC
906,123 UART: [kat] ECC-384
916,184 UART: [kat] HMAC-384Kdf
920,656 UART: [kat] LMS
1,168,968 UART: [kat] --
1,169,709 UART: [cold-reset] ++
1,170,269 UART: [fht] FHT @ 0x50003400
1,172,859 UART: [idev] ++
1,173,027 UART: [idev] CDI.KEYID = 6
1,173,388 UART: [idev] SUBJECT.KEYID = 7
1,173,813 UART: [idev] UDS.KEYID = 0
1,181,787 UART: [idev] Erasing UDS.KEYID = 0
1,198,747 UART: [idev] Sha1 KeyId Algorithm
1,207,599 UART: [idev] --
1,208,448 UART: [ldev] ++
1,208,616 UART: [ldev] CDI.KEYID = 6
1,208,980 UART: [ldev] SUBJECT.KEYID = 5
1,209,407 UART: [ldev] AUTHORITY.KEYID = 7
1,209,870 UART: [ldev] FE.KEYID = 1
1,215,036 UART: [ldev] Erasing FE.KEYID = 1
1,240,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,968 UART: [ldev] --
1,280,326 UART: [fwproc] Wait for Commands...
1,281,091 UART: [fwproc] Recv command 0xabcd1234
1,281,836 UART: [fwproc] Invalid command received
1,282,807 UART: ROM Fatal Error: 0x01020004
1,283,966 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,136,236 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,857 UART: [state] LifecycleState = Unprovisioned
85,512 UART: [state] DebugLocked = No
86,094 UART: [state] WD Timer not started. Device not locked for debugging
87,419 UART: [kat] SHA2-256
890,969 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,098 UART: [kat] ++
895,250 UART: [kat] sha1
899,542 UART: [kat] SHA2-256
901,482 UART: [kat] SHA2-384
904,173 UART: [kat] SHA2-512-ACC
906,074 UART: [kat] ECC-384
915,861 UART: [kat] HMAC-384Kdf
920,605 UART: [kat] LMS
1,168,917 UART: [kat] --
1,169,696 UART: [cold-reset] ++
1,170,150 UART: [fht] FHT @ 0x50003400
1,172,634 UART: [idev] ++
1,172,802 UART: [idev] CDI.KEYID = 6
1,173,163 UART: [idev] SUBJECT.KEYID = 7
1,173,588 UART: [idev] UDS.KEYID = 0
1,181,772 UART: [idev] Erasing UDS.KEYID = 0
1,198,972 UART: [idev] Sha1 KeyId Algorithm
1,207,828 UART: [idev] --
1,209,099 UART: [ldev] ++
1,209,267 UART: [ldev] CDI.KEYID = 6
1,209,631 UART: [ldev] SUBJECT.KEYID = 5
1,210,058 UART: [ldev] AUTHORITY.KEYID = 7
1,210,521 UART: [ldev] FE.KEYID = 1
1,215,535 UART: [ldev] Erasing FE.KEYID = 1
1,241,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,827 UART: [ldev] --
1,281,167 UART: [fwproc] Wait for Commands...
1,281,934 UART: [fwproc] Recv command 0xabcd1234
1,282,679 UART: [fwproc] Invalid command received
1,283,742 UART: ROM Fatal Error: 0x01020004
1,284,901 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,137,487 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,514 UART: [state] LifecycleState = Unprovisioned
86,169 UART: [state] DebugLocked = No
86,875 UART: [state] WD Timer not started. Device not locked for debugging
88,188 UART: [kat] SHA2-256
891,738 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,867 UART: [kat] ++
896,019 UART: [kat] sha1
900,129 UART: [kat] SHA2-256
902,069 UART: [kat] SHA2-384
904,702 UART: [kat] SHA2-512-ACC
906,603 UART: [kat] ECC-384
916,126 UART: [kat] HMAC-384Kdf
920,630 UART: [kat] LMS
1,168,942 UART: [kat] --
1,169,995 UART: [cold-reset] ++
1,170,393 UART: [fht] FHT @ 0x50003400
1,173,217 UART: [idev] ++
1,173,385 UART: [idev] CDI.KEYID = 6
1,173,746 UART: [idev] SUBJECT.KEYID = 7
1,174,171 UART: [idev] UDS.KEYID = 0
1,182,279 UART: [idev] Erasing UDS.KEYID = 0
1,199,315 UART: [idev] Sha1 KeyId Algorithm
1,208,193 UART: [idev] --
1,209,142 UART: [ldev] ++
1,209,310 UART: [ldev] CDI.KEYID = 6
1,209,674 UART: [ldev] SUBJECT.KEYID = 5
1,210,101 UART: [ldev] AUTHORITY.KEYID = 7
1,210,564 UART: [ldev] FE.KEYID = 1
1,215,572 UART: [ldev] Erasing FE.KEYID = 1
1,242,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,762 UART: [ldev] --
1,281,274 UART: [fwproc] Wait for Commands...
1,282,015 UART: [fwproc] Recv command 0xabcd1234
1,282,760 UART: [fwproc] Invalid command received
1,283,735 UART: ROM Fatal Error: 0x01020004
1,284,894 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,137,268 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,783 UART: [state] LifecycleState = Unprovisioned
86,438 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,263 UART: [kat] SHA2-256
891,813 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,942 UART: [kat] ++
896,094 UART: [kat] sha1
900,276 UART: [kat] SHA2-256
902,216 UART: [kat] SHA2-384
904,977 UART: [kat] SHA2-512-ACC
906,878 UART: [kat] ECC-384
916,729 UART: [kat] HMAC-384Kdf
921,199 UART: [kat] LMS
1,169,511 UART: [kat] --
1,170,474 UART: [cold-reset] ++
1,170,884 UART: [fht] FHT @ 0x50003400
1,173,726 UART: [idev] ++
1,173,894 UART: [idev] CDI.KEYID = 6
1,174,255 UART: [idev] SUBJECT.KEYID = 7
1,174,680 UART: [idev] UDS.KEYID = 0
1,182,950 UART: [idev] Erasing UDS.KEYID = 0
1,199,894 UART: [idev] Sha1 KeyId Algorithm
1,208,570 UART: [idev] --
1,209,613 UART: [ldev] ++
1,209,781 UART: [ldev] CDI.KEYID = 6
1,210,145 UART: [ldev] SUBJECT.KEYID = 5
1,210,572 UART: [ldev] AUTHORITY.KEYID = 7
1,211,035 UART: [ldev] FE.KEYID = 1
1,216,677 UART: [ldev] Erasing FE.KEYID = 1
1,242,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,889 UART: [ldev] --
1,282,187 UART: [fwproc] Wait for Commands...
1,283,010 UART: [fwproc] Recv command 0xabcd1234
1,283,755 UART: [fwproc] Invalid command received
1,284,758 UART: ROM Fatal Error: 0x01020004
1,285,917 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,137,885 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,720 UART: [state] LifecycleState = Unprovisioned
85,375 UART: [state] DebugLocked = No
85,881 UART: [state] WD Timer not started. Device not locked for debugging
87,186 UART: [kat] SHA2-256
890,736 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,865 UART: [kat] ++
895,017 UART: [kat] sha1
899,351 UART: [kat] SHA2-256
901,291 UART: [kat] SHA2-384
904,018 UART: [kat] SHA2-512-ACC
905,919 UART: [kat] ECC-384
915,548 UART: [kat] HMAC-384Kdf
920,142 UART: [kat] LMS
1,168,454 UART: [kat] --
1,169,147 UART: [cold-reset] ++
1,169,543 UART: [fht] FHT @ 0x50003400
1,172,143 UART: [idev] ++
1,172,311 UART: [idev] CDI.KEYID = 6
1,172,672 UART: [idev] SUBJECT.KEYID = 7
1,173,097 UART: [idev] UDS.KEYID = 0
1,173,443 ready_for_fw is high
1,173,443 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,239 UART: [idev] Erasing UDS.KEYID = 0
1,198,295 UART: [idev] Sha1 KeyId Algorithm
1,207,057 UART: [idev] --
1,207,960 UART: [ldev] ++
1,208,128 UART: [ldev] CDI.KEYID = 6
1,208,492 UART: [ldev] SUBJECT.KEYID = 5
1,208,919 UART: [ldev] AUTHORITY.KEYID = 7
1,209,382 UART: [ldev] FE.KEYID = 1
1,214,526 UART: [ldev] Erasing FE.KEYID = 1
1,240,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,760 UART: [ldev] --
1,280,220 UART: [fwproc] Wait for Commands...
1,280,951 UART: [fwproc] Recv command 0x46574c44
1,281,684 UART: [fwproc] Recv'd Img size: 106848 bytes
2,492,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,930 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,013 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,672,711 >>> mbox cmd response: success
2,672,711 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,673,764 UART: [afmc] ++
2,673,932 UART: [afmc] CDI.KEYID = 6
2,674,295 UART: [afmc] SUBJECT.KEYID = 7
2,674,721 UART: [afmc] AUTHORITY.KEYID = 5
2,710,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,791 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,542 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,262 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,155 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,848 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,771 UART: [afmc] --
2,753,845 UART: [cold-reset] --
2,754,839 UART: [state] Locking Datavault
2,756,194 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,798 UART: [state] Locking ICCM
2,757,252 UART: [exit] Launching FMC @ 0x40000000
2,762,549 UART:
2,762,565 UART: Running Caliptra FMC ...
2,762,973 UART:
2,763,111 UART: [fmc] Received command: 0x10000008
2,764,143 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,534 ready_for_fw is high
1,056,534 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,074 >>> mbox cmd response: success
2,524,074 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,585,673 UART:
2,585,689 UART: Running Caliptra FMC ...
2,586,097 UART:
2,586,235 UART: [fmc] Received command: 0x10000008
2,587,267 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,647 UART: [kat] SHA2-256
891,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,490 UART: [kat] SHA2-256
901,430 UART: [kat] SHA2-384
904,003 UART: [kat] SHA2-512-ACC
905,904 UART: [kat] ECC-384
915,771 UART: [kat] HMAC-384Kdf
920,335 UART: [kat] LMS
1,168,647 UART: [kat] --
1,169,530 UART: [cold-reset] ++
1,169,886 UART: [fht] FHT @ 0x50003400
1,172,524 UART: [idev] ++
1,172,692 UART: [idev] CDI.KEYID = 6
1,173,053 UART: [idev] SUBJECT.KEYID = 7
1,173,478 UART: [idev] UDS.KEYID = 0
1,173,824 ready_for_fw is high
1,173,824 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,426 UART: [idev] Erasing UDS.KEYID = 0
1,198,216 UART: [idev] Sha1 KeyId Algorithm
1,207,118 UART: [idev] --
1,208,253 UART: [ldev] ++
1,208,421 UART: [ldev] CDI.KEYID = 6
1,208,785 UART: [ldev] SUBJECT.KEYID = 5
1,209,212 UART: [ldev] AUTHORITY.KEYID = 7
1,209,675 UART: [ldev] FE.KEYID = 1
1,215,061 UART: [ldev] Erasing FE.KEYID = 1
1,241,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,341 UART: [ldev] --
1,280,803 UART: [fwproc] Wait for Commands...
1,281,624 UART: [fwproc] Recv command 0x46574c44
1,282,357 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,462 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,504 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,587 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,397 >>> mbox cmd response: success
2,675,397 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,676,496 UART: [afmc] ++
2,676,664 UART: [afmc] CDI.KEYID = 6
2,677,027 UART: [afmc] SUBJECT.KEYID = 7
2,677,453 UART: [afmc] AUTHORITY.KEYID = 5
2,712,981 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,747 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,498 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,218 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,111 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,804 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,709 UART: [afmc] --
2,756,735 UART: [cold-reset] --
2,757,499 UART: [state] Locking Datavault
2,758,650 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,254 UART: [state] Locking ICCM
2,759,700 UART: [exit] Launching FMC @ 0x40000000
2,764,997 UART:
2,765,013 UART: Running Caliptra FMC ...
2,765,421 UART:
2,765,559 UART: [fmc] Received command: 0x10000008
2,766,591 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,539 ready_for_fw is high
1,057,539 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,461 >>> mbox cmd response: success
2,524,461 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,587,482 UART:
2,587,498 UART: Running Caliptra FMC ...
2,587,906 UART:
2,588,044 UART: [fmc] Received command: 0x10000008
2,589,076 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
891,264 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,393 UART: [kat] ++
895,545 UART: [kat] sha1
899,693 UART: [kat] SHA2-256
901,633 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
915,958 UART: [kat] HMAC-384Kdf
920,688 UART: [kat] LMS
1,169,000 UART: [kat] --
1,169,741 UART: [cold-reset] ++
1,170,107 UART: [fht] FHT @ 0x50003400
1,172,879 UART: [idev] ++
1,173,047 UART: [idev] CDI.KEYID = 6
1,173,408 UART: [idev] SUBJECT.KEYID = 7
1,173,833 UART: [idev] UDS.KEYID = 0
1,174,179 ready_for_fw is high
1,174,179 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,327 UART: [idev] Erasing UDS.KEYID = 0
1,198,601 UART: [idev] Sha1 KeyId Algorithm
1,207,493 UART: [idev] --
1,208,640 UART: [ldev] ++
1,208,808 UART: [ldev] CDI.KEYID = 6
1,209,172 UART: [ldev] SUBJECT.KEYID = 5
1,209,599 UART: [ldev] AUTHORITY.KEYID = 7
1,210,062 UART: [ldev] FE.KEYID = 1
1,215,280 UART: [ldev] Erasing FE.KEYID = 1
1,241,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,338 UART: [ldev] --
1,280,820 UART: [fwproc] Wait for Commands...
1,281,545 UART: [fwproc] Recv command 0x46574c44
1,282,278 UART: [fwproc] Recv'd Img size: 106848 bytes
2,492,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,931 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,014 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,673,728 >>> mbox cmd response: success
2,673,728 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,674,867 UART: [afmc] ++
2,675,035 UART: [afmc] CDI.KEYID = 6
2,675,398 UART: [afmc] SUBJECT.KEYID = 7
2,675,824 UART: [afmc] AUTHORITY.KEYID = 5
2,712,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,556 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,307 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,027 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,920 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,613 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,498 UART: [afmc] --
2,755,550 UART: [cold-reset] --
2,756,234 UART: [state] Locking Datavault
2,757,045 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,649 UART: [state] Locking ICCM
2,758,075 UART: [exit] Launching FMC @ 0x40000000
2,763,372 UART:
2,763,388 UART: Running Caliptra FMC ...
2,763,796 UART:
2,763,934 UART: [fmc] Received command: 0x10000008
2,764,966 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,910 ready_for_fw is high
1,055,910 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,276 >>> mbox cmd response: success
2,525,276 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,586,811 UART:
2,586,827 UART: Running Caliptra FMC ...
2,587,235 UART:
2,587,373 UART: [fmc] Received command: 0x10000008
2,588,405 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
891,367 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,496 UART: [kat] ++
895,648 UART: [kat] sha1
900,028 UART: [kat] SHA2-256
901,968 UART: [kat] SHA2-384
904,733 UART: [kat] SHA2-512-ACC
906,634 UART: [kat] ECC-384
916,499 UART: [kat] HMAC-384Kdf
921,217 UART: [kat] LMS
1,169,529 UART: [kat] --
1,170,282 UART: [cold-reset] ++
1,170,784 UART: [fht] FHT @ 0x50003400
1,173,620 UART: [idev] ++
1,173,788 UART: [idev] CDI.KEYID = 6
1,174,149 UART: [idev] SUBJECT.KEYID = 7
1,174,574 UART: [idev] UDS.KEYID = 0
1,174,920 ready_for_fw is high
1,174,920 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,306 UART: [idev] Erasing UDS.KEYID = 0
1,199,436 UART: [idev] Sha1 KeyId Algorithm
1,208,388 UART: [idev] --
1,209,325 UART: [ldev] ++
1,209,493 UART: [ldev] CDI.KEYID = 6
1,209,857 UART: [ldev] SUBJECT.KEYID = 5
1,210,284 UART: [ldev] AUTHORITY.KEYID = 7
1,210,747 UART: [ldev] FE.KEYID = 1
1,215,729 UART: [ldev] Erasing FE.KEYID = 1
1,242,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,233 UART: [ldev] --
1,281,547 UART: [fwproc] Wait for Commands...
1,282,302 UART: [fwproc] Recv command 0x46574c44
1,283,035 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,852 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,758 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,841 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,595 >>> mbox cmd response: success
2,675,595 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,676,772 UART: [afmc] ++
2,676,940 UART: [afmc] CDI.KEYID = 6
2,677,303 UART: [afmc] SUBJECT.KEYID = 7
2,677,729 UART: [afmc] AUTHORITY.KEYID = 5
2,713,935 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,505 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,256 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,976 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,869 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,562 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,475 UART: [afmc] --
2,757,485 UART: [cold-reset] --
2,758,083 UART: [state] Locking Datavault
2,759,394 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,998 UART: [state] Locking ICCM
2,760,476 UART: [exit] Launching FMC @ 0x40000000
2,765,773 UART:
2,765,789 UART: Running Caliptra FMC ...
2,766,197 UART:
2,766,335 UART: [fmc] Received command: 0x10000008
2,767,367 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,901 ready_for_fw is high
1,056,901 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,695 >>> mbox cmd response: success
2,524,695 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,587,824 UART:
2,587,840 UART: Running Caliptra FMC ...
2,588,248 UART:
2,588,386 UART: [fmc] Received command: 0x10000008
2,589,418 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
891,068 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,197 UART: [kat] ++
895,349 UART: [kat] sha1
899,351 UART: [kat] SHA2-256
901,291 UART: [kat] SHA2-384
904,038 UART: [kat] SHA2-512-ACC
905,939 UART: [kat] ECC-384
915,652 UART: [kat] HMAC-384Kdf
920,158 UART: [kat] LMS
1,168,470 UART: [kat] --
1,169,179 UART: [cold-reset] ++
1,169,675 UART: [fht] FHT @ 0x50003400
1,172,251 UART: [idev] ++
1,172,419 UART: [idev] CDI.KEYID = 6
1,172,780 UART: [idev] SUBJECT.KEYID = 7
1,173,205 UART: [idev] UDS.KEYID = 0
1,173,551 ready_for_fw is high
1,173,551 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,347 UART: [idev] Erasing UDS.KEYID = 0
1,198,169 UART: [idev] Sha1 KeyId Algorithm
1,207,161 UART: [idev] --
1,208,434 UART: [ldev] ++
1,208,602 UART: [ldev] CDI.KEYID = 6
1,208,966 UART: [ldev] SUBJECT.KEYID = 5
1,209,393 UART: [ldev] AUTHORITY.KEYID = 7
1,209,856 UART: [ldev] FE.KEYID = 1
1,215,134 UART: [ldev] Erasing FE.KEYID = 1
1,241,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,818 UART: [ldev] --
1,281,314 UART: [fwproc] Wait for Commands...
1,281,909 UART: [fwproc] Recv command 0x46574c44
1,282,642 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,357 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,440 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,252 >>> mbox cmd response: success
2,674,252 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,675,493 UART: [afmc] ++
2,675,661 UART: [afmc] CDI.KEYID = 6
2,676,024 UART: [afmc] SUBJECT.KEYID = 7
2,676,450 UART: [afmc] AUTHORITY.KEYID = 5
2,712,530 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,818 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,569 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,289 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,182 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,875 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,488 UART: [afmc] --
2,755,508 UART: [cold-reset] --
2,756,554 UART: [state] Locking Datavault
2,757,903 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,507 UART: [state] Locking ICCM
2,759,133 UART: [exit] Launching FMC @ 0x40000000
2,764,430 UART:
2,764,446 UART: Running Caliptra FMC ...
2,764,854 UART:
2,764,992 UART: [fmc] Received command: 0x10000008
2,766,024 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,996 ready_for_fw is high
1,055,996 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,522,838 >>> mbox cmd response: success
2,522,838 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,585,505 UART:
2,585,521 UART: Running Caliptra FMC ...
2,585,929 UART:
2,586,067 UART: [fmc] Received command: 0x10000008
2,587,099 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
891,523 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,652 UART: [kat] ++
895,804 UART: [kat] sha1
900,024 UART: [kat] SHA2-256
901,964 UART: [kat] SHA2-384
904,649 UART: [kat] SHA2-512-ACC
906,550 UART: [kat] ECC-384
916,701 UART: [kat] HMAC-384Kdf
921,379 UART: [kat] LMS
1,169,691 UART: [kat] --
1,170,694 UART: [cold-reset] ++
1,171,252 UART: [fht] FHT @ 0x50003400
1,173,772 UART: [idev] ++
1,173,940 UART: [idev] CDI.KEYID = 6
1,174,301 UART: [idev] SUBJECT.KEYID = 7
1,174,726 UART: [idev] UDS.KEYID = 0
1,175,072 ready_for_fw is high
1,175,072 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,636 UART: [idev] Erasing UDS.KEYID = 0
1,200,108 UART: [idev] Sha1 KeyId Algorithm
1,208,936 UART: [idev] --
1,210,089 UART: [ldev] ++
1,210,257 UART: [ldev] CDI.KEYID = 6
1,210,621 UART: [ldev] SUBJECT.KEYID = 5
1,211,048 UART: [ldev] AUTHORITY.KEYID = 7
1,211,511 UART: [ldev] FE.KEYID = 1
1,216,765 UART: [ldev] Erasing FE.KEYID = 1
1,243,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,539 UART: [ldev] --
1,282,831 UART: [fwproc] Wait for Commands...
1,283,602 UART: [fwproc] Recv command 0x46574c44
1,284,335 UART: [fwproc] Recv'd Img size: 106848 bytes
2,495,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,778 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,861 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,676,595 >>> mbox cmd response: success
2,676,595 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,677,838 UART: [afmc] ++
2,678,006 UART: [afmc] CDI.KEYID = 6
2,678,369 UART: [afmc] SUBJECT.KEYID = 7
2,678,795 UART: [afmc] AUTHORITY.KEYID = 5
2,714,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,103 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,854 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,574 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,467 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,160 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,935 UART: [afmc] --
2,758,045 UART: [cold-reset] --
2,758,973 UART: [state] Locking Datavault
2,760,252 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,856 UART: [state] Locking ICCM
2,761,350 UART: [exit] Launching FMC @ 0x40000000
2,766,647 UART:
2,766,663 UART: Running Caliptra FMC ...
2,767,071 UART:
2,767,209 UART: [fmc] Received command: 0x10000008
2,768,241 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,231 ready_for_fw is high
1,056,231 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,526,263 >>> mbox cmd response: success
2,526,263 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,588,556 UART:
2,588,572 UART: Running Caliptra FMC ...
2,588,980 UART:
2,589,118 UART: [fmc] Received command: 0x10000008
2,590,150 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,666 UART: [kat] SHA2-256
891,216 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,187 UART: ROM integrity test failed
895,634 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "98a841c5acbe942b56047a5590eca2bc4a59e5b99e2eef6ea6654be0207a2f5ead6ea8f8adfdf196f5ead99b27b982c4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,001 UART: [state] LifecycleState = Unprovisioned
86,656 UART: [state] DebugLocked = No
87,200 UART: [state] WD Timer not started. Device not locked for debugging
88,451 UART: [kat] SHA2-256
892,001 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,972 UART: ROM integrity test failed
896,419 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "98a841c5acbe942b56047a5590eca2bc4a59e5b99e2eef6ea6654be0207a2f5ead6ea8f8adfdf196f5ead99b27b982c4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.21s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,681 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
891,388 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,359 UART: ROM integrity test failed
895,806 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "98a841c5acbe942b56047a5590eca2bc4a59e5b99e2eef6ea6654be0207a2f5ead6ea8f8adfdf196f5ead99b27b982c4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,585 UART: [kat] SHA2-256
891,135 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,106 UART: ROM integrity test failed
895,553 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "98a841c5acbe942b56047a5590eca2bc4a59e5b99e2eef6ea6654be0207a2f5ead6ea8f8adfdf196f5ead99b27b982c4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
891,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: ROM integrity test failed
895,866 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "98a841c5acbe942b56047a5590eca2bc4a59e5b99e2eef6ea6654be0207a2f5ead6ea8f8adfdf196f5ead99b27b982c4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,029 UART: [state] LifecycleState = Unprovisioned
85,684 UART: [state] DebugLocked = No
86,212 UART: [state] WD Timer not started. Device not locked for debugging
87,397 UART: [kat] SHA2-256
890,947 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,918 UART: ROM integrity test failed
895,365 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "98a841c5acbe942b56047a5590eca2bc4a59e5b99e2eef6ea6654be0207a2f5ead6ea8f8adfdf196f5ead99b27b982c4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.01s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,802 UART: [state] LifecycleState = Unprovisioned
85,457 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,442 UART: [kat] SHA2-256
890,992 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,121 UART: [kat] ++
895,273 UART: [kat] sha1
899,413 UART: [kat] SHA2-256
901,353 UART: [kat] SHA2-384
904,128 UART: [kat] SHA2-512-ACC
906,029 UART: [kat] ECC-384
916,102 UART: [kat] HMAC-384Kdf
920,668 UART: [kat] LMS
1,168,980 UART: [kat] --
1,169,841 UART: [cold-reset] ++
1,170,259 UART: [fht] FHT @ 0x50003400
1,172,855 UART: [idev] ++
1,173,023 UART: [idev] CDI.KEYID = 6
1,173,384 UART: [idev] SUBJECT.KEYID = 7
1,173,809 UART: [idev] UDS.KEYID = 0
1,174,155 ready_for_fw is high
1,174,155 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,965 UART: [idev] Erasing UDS.KEYID = 0
1,198,959 UART: [idev] Sha1 KeyId Algorithm
1,207,861 UART: [idev] --
1,208,914 UART: [ldev] ++
1,209,082 UART: [ldev] CDI.KEYID = 6
1,209,446 UART: [ldev] SUBJECT.KEYID = 5
1,209,873 UART: [ldev] AUTHORITY.KEYID = 7
1,210,336 UART: [ldev] FE.KEYID = 1
1,215,492 UART: [ldev] Erasing FE.KEYID = 1
1,241,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,272 UART: [ldev] --
1,280,714 UART: [fwproc] Wait for Commands...
1,281,347 UART: [fwproc] Recv command 0x46574c44
1,282,080 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,326 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,011 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,903 >>> mbox cmd response: success
2,742,108 UART: [afmc] ++
2,742,276 UART: [afmc] CDI.KEYID = 6
2,742,639 UART: [afmc] SUBJECT.KEYID = 7
2,743,065 UART: [afmc] AUTHORITY.KEYID = 5
2,779,170 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,604 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,355 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,051 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,950 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,643 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,479 UART: [afmc] --
2,822,343 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,822,365 UART: [cold-reset] --
2,823,339 UART: [state] Locking Datavault
2,824,404 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,008 UART: [state] Locking ICCM
2,825,540 UART: [exit] Launching FMC @ 0x40000000
2,830,837 UART:
2,830,853 UART: Running Caliptra FMC ...
2,831,261 UART:
2,831,491 UART: [fmc] Received command: 0x46574C44
2,832,317 UART:
2,832,333 UART: Running Caliptra ROM ...
2,832,741 UART:
2,832,796 UART: [state] CFI Enabled
2,835,644 UART: [state] LifecycleState = Unprovisioned
2,836,299 UART: [state] DebugLocked = No
2,836,817 UART: [state] WD Timer not started. Device not locked for debugging
2,838,027 UART: [kat] SHA2-256
3,641,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,706 UART: [kat] ++
3,645,858 UART: [kat] sha1
3,650,108 UART: [kat] SHA2-256
3,652,048 UART: [kat] SHA2-384
3,654,749 UART: [kat] SHA2-512-ACC
3,656,649 UART: [kat] ECC-384
3,666,010 UART: [kat] HMAC-384Kdf
3,670,790 UART: [kat] LMS
3,919,102 UART: [kat] --
3,920,158 UART: [update-reset] ++
5,204,985 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,205,976 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,353,988 >>> mbox cmd response: success
5,354,211 UART: [update-reset] Copying MAN_2 To MAN_1
5,362,225 UART: [update-reset Success] --
5,362,634 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,363,172 UART: [state] Locking Datavault
5,364,152 UART: [state] Locking PCR0, PCR1 and PCR31
5,364,756 UART: [state] Locking ICCM
5,365,304 UART: [exit] Launching FMC @ 0x40000000
5,370,601 UART:
5,370,617 UART: Running Caliptra FMC ...
5,371,025 UART:
5,371,247 UART: [fmc] Received command: 0x1000000D
5,372,339 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,546 ready_for_fw is high
1,055,546 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,801 >>> mbox cmd response: success
2,646,040 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,651,841 UART:
2,651,857 UART: Running Caliptra FMC ...
2,652,265 UART:
2,652,495 UART: [fmc] Received command: 0x46574C44
5,055,317 >>> mbox cmd response: success
5,062,999 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,068,627 UART:
5,068,643 UART: Running Caliptra FMC ...
5,069,051 UART:
5,069,273 UART: [fmc] Received command: 0x1000000D
5,070,365 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,773 UART: [state] LifecycleState = Unprovisioned
86,428 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
891,675 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,804 UART: [kat] ++
895,956 UART: [kat] sha1
900,358 UART: [kat] SHA2-256
902,298 UART: [kat] SHA2-384
905,071 UART: [kat] SHA2-512-ACC
906,972 UART: [kat] ECC-384
916,349 UART: [kat] HMAC-384Kdf
921,033 UART: [kat] LMS
1,169,345 UART: [kat] --
1,170,504 UART: [cold-reset] ++
1,170,986 UART: [fht] FHT @ 0x50003400
1,173,784 UART: [idev] ++
1,173,952 UART: [idev] CDI.KEYID = 6
1,174,313 UART: [idev] SUBJECT.KEYID = 7
1,174,738 UART: [idev] UDS.KEYID = 0
1,175,084 ready_for_fw is high
1,175,084 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,816 UART: [idev] Erasing UDS.KEYID = 0
1,199,774 UART: [idev] Sha1 KeyId Algorithm
1,208,668 UART: [idev] --
1,209,501 UART: [ldev] ++
1,209,669 UART: [ldev] CDI.KEYID = 6
1,210,033 UART: [ldev] SUBJECT.KEYID = 5
1,210,460 UART: [ldev] AUTHORITY.KEYID = 7
1,210,923 UART: [ldev] FE.KEYID = 1
1,216,259 UART: [ldev] Erasing FE.KEYID = 1
1,243,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,091 UART: [ldev] --
1,282,559 UART: [fwproc] Wait for Commands...
1,283,134 UART: [fwproc] Recv command 0x46574c44
1,283,867 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,887 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,572 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,464 >>> mbox cmd response: success
2,742,729 UART: [afmc] ++
2,742,897 UART: [afmc] CDI.KEYID = 6
2,743,260 UART: [afmc] SUBJECT.KEYID = 7
2,743,686 UART: [afmc] AUTHORITY.KEYID = 5
2,779,439 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,873 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,624 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,320 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,219 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,912 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,700 UART: [afmc] --
2,822,650 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,822,672 UART: [cold-reset] --
2,823,558 UART: [state] Locking Datavault
2,824,887 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,491 UART: [state] Locking ICCM
2,826,125 UART: [exit] Launching FMC @ 0x40000000
2,831,422 UART:
2,831,438 UART: Running Caliptra FMC ...
2,831,846 UART:
2,832,076 UART: [fmc] Received command: 0x46574C44
2,832,902 UART:
2,832,918 UART: Running Caliptra ROM ...
2,833,326 UART:
2,833,468 UART: [state] CFI Enabled
2,836,180 UART: [state] LifecycleState = Unprovisioned
2,836,835 UART: [state] DebugLocked = No
2,837,323 UART: [state] WD Timer not started. Device not locked for debugging
2,838,677 UART: [kat] SHA2-256
3,642,227 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,356 UART: [kat] ++
3,646,508 UART: [kat] sha1
3,650,934 UART: [kat] SHA2-256
3,652,874 UART: [kat] SHA2-384
3,655,663 UART: [kat] SHA2-512-ACC
3,657,563 UART: [kat] ECC-384
3,667,494 UART: [kat] HMAC-384Kdf
3,672,148 UART: [kat] LMS
3,920,460 UART: [kat] --
3,921,388 UART: [update-reset] ++
5,206,077 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,207,060 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,355,072 >>> mbox cmd response: success
5,355,405 UART: [update-reset] Copying MAN_2 To MAN_1
5,363,419 UART: [update-reset Success] --
5,363,828 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,364,476 UART: [state] Locking Datavault
5,365,422 UART: [state] Locking PCR0, PCR1 and PCR31
5,366,026 UART: [state] Locking ICCM
5,366,562 UART: [exit] Launching FMC @ 0x40000000
5,371,859 UART:
5,371,875 UART: Running Caliptra FMC ...
5,372,283 UART:
5,372,505 UART: [fmc] Received command: 0x1000000D
5,373,597 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,337 ready_for_fw is high
1,056,337 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,628 >>> mbox cmd response: success
2,645,661 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,651,766 UART:
2,651,782 UART: Running Caliptra FMC ...
2,652,190 UART:
2,652,420 UART: [fmc] Received command: 0x46574C44
5,057,001 >>> mbox cmd response: success
5,064,517 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,070,251 UART:
5,070,267 UART: Running Caliptra FMC ...
5,070,675 UART:
5,070,897 UART: [fmc] Received command: 0x1000000D
5,071,989 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
85,999 UART: [state] WD Timer not started. Device not locked for debugging
87,312 UART: [kat] SHA2-256
890,862 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,991 UART: [kat] ++
895,143 UART: [kat] sha1
899,469 UART: [kat] SHA2-256
901,409 UART: [kat] SHA2-384
903,980 UART: [kat] SHA2-512-ACC
905,881 UART: [kat] ECC-384
915,668 UART: [kat] HMAC-384Kdf
920,336 UART: [kat] LMS
1,168,648 UART: [kat] --
1,169,643 UART: [cold-reset] ++
1,170,047 UART: [fht] FHT @ 0x50003400
1,172,819 UART: [idev] ++
1,172,987 UART: [idev] CDI.KEYID = 6
1,173,348 UART: [idev] SUBJECT.KEYID = 7
1,173,773 UART: [idev] UDS.KEYID = 0
1,174,119 ready_for_fw is high
1,174,119 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,755 UART: [idev] Erasing UDS.KEYID = 0
1,198,667 UART: [idev] Sha1 KeyId Algorithm
1,207,425 UART: [idev] --
1,208,612 UART: [ldev] ++
1,208,780 UART: [ldev] CDI.KEYID = 6
1,209,144 UART: [ldev] SUBJECT.KEYID = 5
1,209,571 UART: [ldev] AUTHORITY.KEYID = 7
1,210,034 UART: [ldev] FE.KEYID = 1
1,215,044 UART: [ldev] Erasing FE.KEYID = 1
1,240,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,636 UART: [ldev] --
1,280,046 UART: [fwproc] Wait for Commands...
1,280,871 UART: [fwproc] Recv command 0x46574c44
1,281,604 UART: [fwproc] Recv'd Img size: 111916 bytes
2,550,736 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,634 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,319 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,179 >>> mbox cmd response: success
2,741,332 UART: [afmc] ++
2,741,500 UART: [afmc] CDI.KEYID = 6
2,741,863 UART: [afmc] SUBJECT.KEYID = 7
2,742,289 UART: [afmc] AUTHORITY.KEYID = 5
2,777,516 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,148 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,899 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,595 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,494 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,187 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,039 UART: [afmc] --
2,820,931 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,820,953 UART: [cold-reset] --
2,821,695 UART: [state] Locking Datavault
2,823,078 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,682 UART: [state] Locking ICCM
2,824,298 UART: [exit] Launching FMC @ 0x40000000
2,829,595 UART:
2,829,611 UART: Running Caliptra FMC ...
2,830,019 UART:
2,830,249 UART: [fmc] Received command: 0x46574C44
2,831,075 UART:
2,831,091 UART: Running Caliptra ROM ...
2,831,499 UART:
2,831,554 UART: [state] CFI Enabled
2,833,668 UART: [state] LifecycleState = Unprovisioned
2,834,323 UART: [state] DebugLocked = No
2,835,045 UART: [state] WD Timer not started. Device not locked for debugging
2,836,243 UART: [kat] SHA2-256
3,639,793 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,922 UART: [kat] ++
3,644,074 UART: [kat] sha1
3,648,334 UART: [kat] SHA2-256
3,650,274 UART: [kat] SHA2-384
3,653,043 UART: [kat] SHA2-512-ACC
3,654,943 UART: [kat] ECC-384
3,664,820 UART: [kat] HMAC-384Kdf
3,669,436 UART: [kat] LMS
3,917,748 UART: [kat] --
3,918,684 UART: [update-reset] ++
5,203,335 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,204,328 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,352,340 >>> mbox cmd response: success
5,352,519 UART: [update-reset] Copying MAN_2 To MAN_1
5,360,533 UART: [update-reset Success] --
5,360,942 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,361,540 UART: [state] Locking Datavault
5,362,302 UART: [state] Locking PCR0, PCR1 and PCR31
5,362,906 UART: [state] Locking ICCM
5,363,530 UART: [exit] Launching FMC @ 0x40000000
5,368,827 UART:
5,368,843 UART: Running Caliptra FMC ...
5,369,251 UART:
5,369,473 UART: [fmc] Received command: 0x1000000D
5,370,565 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,474 ready_for_fw is high
1,055,474 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,588,567 >>> mbox cmd response: success
2,644,840 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,651,115 UART:
2,651,131 UART: Running Caliptra FMC ...
2,651,539 UART:
2,651,769 UART: [fmc] Received command: 0x46574C44
5,054,545 >>> mbox cmd response: success
5,062,089 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,067,431 UART:
5,067,447 UART: Running Caliptra FMC ...
5,067,855 UART:
5,068,077 UART: [fmc] Received command: 0x1000000D
5,069,169 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,993 UART: [state] LifecycleState = Unprovisioned
85,648 UART: [state] DebugLocked = No
86,294 UART: [state] WD Timer not started. Device not locked for debugging
87,531 UART: [kat] SHA2-256
891,081 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,210 UART: [kat] ++
895,362 UART: [kat] sha1
899,672 UART: [kat] SHA2-256
901,612 UART: [kat] SHA2-384
904,245 UART: [kat] SHA2-512-ACC
906,146 UART: [kat] ECC-384
915,813 UART: [kat] HMAC-384Kdf
920,407 UART: [kat] LMS
1,168,719 UART: [kat] --
1,169,690 UART: [cold-reset] ++
1,170,114 UART: [fht] FHT @ 0x50003400
1,172,710 UART: [idev] ++
1,172,878 UART: [idev] CDI.KEYID = 6
1,173,239 UART: [idev] SUBJECT.KEYID = 7
1,173,664 UART: [idev] UDS.KEYID = 0
1,174,010 ready_for_fw is high
1,174,010 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,476 UART: [idev] Erasing UDS.KEYID = 0
1,198,808 UART: [idev] Sha1 KeyId Algorithm
1,207,480 UART: [idev] --
1,208,519 UART: [ldev] ++
1,208,687 UART: [ldev] CDI.KEYID = 6
1,209,051 UART: [ldev] SUBJECT.KEYID = 5
1,209,478 UART: [ldev] AUTHORITY.KEYID = 7
1,209,941 UART: [ldev] FE.KEYID = 1
1,215,339 UART: [ldev] Erasing FE.KEYID = 1
1,241,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,771 UART: [ldev] --
1,281,145 UART: [fwproc] Wait for Commands...
1,281,742 UART: [fwproc] Recv command 0x46574c44
1,282,475 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,401 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,105 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,790 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,739,588 >>> mbox cmd response: success
2,740,645 UART: [afmc] ++
2,740,813 UART: [afmc] CDI.KEYID = 6
2,741,176 UART: [afmc] SUBJECT.KEYID = 7
2,741,602 UART: [afmc] AUTHORITY.KEYID = 5
2,777,343 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,695 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,446 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,142 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,041 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,734 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,686 UART: [afmc] --
2,820,766 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,820,788 UART: [cold-reset] --
2,821,556 UART: [state] Locking Datavault
2,822,659 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,263 UART: [state] Locking ICCM
2,823,791 UART: [exit] Launching FMC @ 0x40000000
2,829,088 UART:
2,829,104 UART: Running Caliptra FMC ...
2,829,512 UART:
2,829,742 UART: [fmc] Received command: 0x46574C44
2,830,568 UART:
2,830,584 UART: Running Caliptra ROM ...
2,830,992 UART:
2,831,134 UART: [state] CFI Enabled
2,834,150 UART: [state] LifecycleState = Unprovisioned
2,834,805 UART: [state] DebugLocked = No
2,835,445 UART: [state] WD Timer not started. Device not locked for debugging
2,836,675 UART: [kat] SHA2-256
3,640,225 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,354 UART: [kat] ++
3,644,506 UART: [kat] sha1
3,648,824 UART: [kat] SHA2-256
3,650,764 UART: [kat] SHA2-384
3,653,513 UART: [kat] SHA2-512-ACC
3,655,413 UART: [kat] ECC-384
3,664,970 UART: [kat] HMAC-384Kdf
3,669,838 UART: [kat] LMS
3,918,150 UART: [kat] --
3,919,064 UART: [update-reset] ++
5,203,793 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,204,754 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,352,766 >>> mbox cmd response: success
5,352,943 UART: [update-reset] Copying MAN_2 To MAN_1
5,360,957 UART: [update-reset Success] --
5,361,366 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,362,056 UART: [state] Locking Datavault
5,362,644 UART: [state] Locking PCR0, PCR1 and PCR31
5,363,248 UART: [state] Locking ICCM
5,363,792 UART: [exit] Launching FMC @ 0x40000000
5,369,089 UART:
5,369,105 UART: Running Caliptra FMC ...
5,369,513 UART:
5,369,735 UART: [fmc] Received command: 0x1000000D
5,370,827 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,109 ready_for_fw is high
1,056,109 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,588,596 >>> mbox cmd response: success
2,645,327 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,651,362 UART:
2,651,378 UART: Running Caliptra FMC ...
2,651,786 UART:
2,652,016 UART: [fmc] Received command: 0x46574C44
5,056,503 >>> mbox cmd response: success
5,064,211 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,070,063 UART:
5,070,079 UART: Running Caliptra FMC ...
5,070,487 UART:
5,070,709 UART: [fmc] Received command: 0x1000000D
5,071,801 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,556 UART: [state] LifecycleState = Unprovisioned
86,211 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [kat] SHA2-256
891,406 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,535 UART: [kat] ++
895,687 UART: [kat] sha1
899,877 UART: [kat] SHA2-256
901,817 UART: [kat] SHA2-384
904,692 UART: [kat] SHA2-512-ACC
906,593 UART: [kat] ECC-384
916,144 UART: [kat] HMAC-384Kdf
920,764 UART: [kat] LMS
1,169,076 UART: [kat] --
1,169,819 UART: [cold-reset] ++
1,170,285 UART: [fht] FHT @ 0x50003400
1,172,971 UART: [idev] ++
1,173,139 UART: [idev] CDI.KEYID = 6
1,173,500 UART: [idev] SUBJECT.KEYID = 7
1,173,925 UART: [idev] UDS.KEYID = 0
1,174,271 ready_for_fw is high
1,174,271 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,745 UART: [idev] Erasing UDS.KEYID = 0
1,198,627 UART: [idev] Sha1 KeyId Algorithm
1,207,319 UART: [idev] --
1,208,292 UART: [ldev] ++
1,208,460 UART: [ldev] CDI.KEYID = 6
1,208,824 UART: [ldev] SUBJECT.KEYID = 5
1,209,251 UART: [ldev] AUTHORITY.KEYID = 7
1,209,714 UART: [ldev] FE.KEYID = 1
1,214,978 UART: [ldev] Erasing FE.KEYID = 1
1,241,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,068 UART: [ldev] --
1,280,472 UART: [fwproc] Wait for Commands...
1,281,155 UART: [fwproc] Recv command 0x46574c44
1,281,888 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,682 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,367 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,097 >>> mbox cmd response: success
2,741,156 UART: [afmc] ++
2,741,324 UART: [afmc] CDI.KEYID = 6
2,741,687 UART: [afmc] SUBJECT.KEYID = 7
2,742,113 UART: [afmc] AUTHORITY.KEYID = 5
2,777,890 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,450 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,201 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,897 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,796 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,489 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,381 UART: [afmc] --
2,821,473 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,821,495 UART: [cold-reset] --
2,822,419 UART: [state] Locking Datavault
2,823,796 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,400 UART: [state] Locking ICCM
2,825,014 UART: [exit] Launching FMC @ 0x40000000
2,830,311 UART:
2,830,327 UART: Running Caliptra FMC ...
2,830,735 UART:
2,830,965 UART: [fmc] Received command: 0x46574C44
2,831,791 UART:
2,831,807 UART: Running Caliptra ROM ...
2,832,215 UART:
2,832,270 UART: [state] CFI Enabled
2,834,774 UART: [state] LifecycleState = Unprovisioned
2,835,429 UART: [state] DebugLocked = No
2,835,985 UART: [state] WD Timer not started. Device not locked for debugging
2,837,239 UART: [kat] SHA2-256
3,640,789 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,918 UART: [kat] ++
3,645,070 UART: [kat] sha1
3,649,130 UART: [kat] SHA2-256
3,651,070 UART: [kat] SHA2-384
3,653,797 UART: [kat] SHA2-512-ACC
3,655,697 UART: [kat] ECC-384
3,665,338 UART: [kat] HMAC-384Kdf
3,669,902 UART: [kat] LMS
3,918,214 UART: [kat] --
3,918,946 UART: [update-reset] ++
5,203,519 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,204,626 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,352,638 >>> mbox cmd response: success
5,352,775 UART: [update-reset] Copying MAN_2 To MAN_1
5,360,789 UART: [update-reset Success] --
5,361,198 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,361,740 UART: [state] Locking Datavault
5,362,482 UART: [state] Locking PCR0, PCR1 and PCR31
5,363,086 UART: [state] Locking ICCM
5,363,576 UART: [exit] Launching FMC @ 0x40000000
5,368,873 UART:
5,368,889 UART: Running Caliptra FMC ...
5,369,297 UART:
5,369,519 UART: [fmc] Received command: 0x1000000D
5,370,611 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,318 ready_for_fw is high
1,055,318 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,649 >>> mbox cmd response: success
2,646,408 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,652,521 UART:
2,652,537 UART: Running Caliptra FMC ...
2,652,945 UART:
2,653,175 UART: [fmc] Received command: 0x46574C44
5,056,281 >>> mbox cmd response: success
5,063,887 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,069,501 UART:
5,069,517 UART: Running Caliptra FMC ...
5,069,925 UART:
5,070,147 UART: [fmc] Received command: 0x1000000D
5,071,239 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
891,617 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,746 UART: [kat] ++
895,898 UART: [kat] sha1
900,226 UART: [kat] SHA2-256
902,166 UART: [kat] SHA2-384
905,077 UART: [kat] SHA2-512-ACC
906,978 UART: [kat] ECC-384
916,791 UART: [kat] HMAC-384Kdf
921,405 UART: [kat] LMS
1,169,717 UART: [kat] --
1,170,776 UART: [cold-reset] ++
1,171,118 UART: [fht] FHT @ 0x50003400
1,173,820 UART: [idev] ++
1,173,988 UART: [idev] CDI.KEYID = 6
1,174,349 UART: [idev] SUBJECT.KEYID = 7
1,174,774 UART: [idev] UDS.KEYID = 0
1,175,120 ready_for_fw is high
1,175,120 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,183,190 UART: [idev] Erasing UDS.KEYID = 0
1,200,216 UART: [idev] Sha1 KeyId Algorithm
1,209,080 UART: [idev] --
1,209,905 UART: [ldev] ++
1,210,073 UART: [ldev] CDI.KEYID = 6
1,210,437 UART: [ldev] SUBJECT.KEYID = 5
1,210,864 UART: [ldev] AUTHORITY.KEYID = 7
1,211,327 UART: [ldev] FE.KEYID = 1
1,216,651 UART: [ldev] Erasing FE.KEYID = 1
1,243,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,927 UART: [ldev] --
1,283,227 UART: [fwproc] Wait for Commands...
1,283,828 UART: [fwproc] Recv command 0x46574c44
1,284,561 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,421 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,717 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,402 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,742,222 >>> mbox cmd response: success
2,743,305 UART: [afmc] ++
2,743,473 UART: [afmc] CDI.KEYID = 6
2,743,836 UART: [afmc] SUBJECT.KEYID = 7
2,744,262 UART: [afmc] AUTHORITY.KEYID = 5
2,779,977 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,765 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,516 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,212 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,111 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,804 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,714 UART: [afmc] --
2,823,754 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,823,776 UART: [cold-reset] --
2,824,664 UART: [state] Locking Datavault
2,825,621 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,225 UART: [state] Locking ICCM
2,826,745 UART: [exit] Launching FMC @ 0x40000000
2,832,042 UART:
2,832,058 UART: Running Caliptra FMC ...
2,832,466 UART:
2,832,696 UART: [fmc] Received command: 0x46574C44
2,833,522 UART:
2,833,538 UART: Running Caliptra ROM ...
2,833,946 UART:
2,834,088 UART: [state] CFI Enabled
2,837,226 UART: [state] LifecycleState = Unprovisioned
2,837,881 UART: [state] DebugLocked = No
2,838,571 UART: [state] WD Timer not started. Device not locked for debugging
2,839,919 UART: [kat] SHA2-256
3,643,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,598 UART: [kat] ++
3,647,750 UART: [kat] sha1
3,652,080 UART: [kat] SHA2-256
3,654,020 UART: [kat] SHA2-384
3,656,615 UART: [kat] SHA2-512-ACC
3,658,515 UART: [kat] ECC-384
3,668,296 UART: [kat] HMAC-384Kdf
3,673,104 UART: [kat] LMS
3,921,416 UART: [kat] --
3,922,324 UART: [update-reset] ++
5,205,993 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,206,962 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,354,974 >>> mbox cmd response: success
5,355,331 UART: [update-reset] Copying MAN_2 To MAN_1
5,363,345 UART: [update-reset Success] --
5,363,754 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,364,324 UART: [state] Locking Datavault
5,364,938 UART: [state] Locking PCR0, PCR1 and PCR31
5,365,542 UART: [state] Locking ICCM
5,366,014 UART: [exit] Launching FMC @ 0x40000000
5,371,311 UART:
5,371,327 UART: Running Caliptra FMC ...
5,371,735 UART:
5,371,957 UART: [fmc] Received command: 0x1000000D
5,373,049 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,497 ready_for_fw is high
1,057,497 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,744 >>> mbox cmd response: success
2,648,713 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,654,932 UART:
2,654,948 UART: Running Caliptra FMC ...
2,655,356 UART:
2,655,586 UART: [fmc] Received command: 0x46574C44
5,058,937 >>> mbox cmd response: success
5,066,595 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,072,445 UART:
5,072,461 UART: Running Caliptra FMC ...
5,072,869 UART:
5,073,091 UART: [fmc] Received command: 0x1000000D
5,074,183 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.28s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.28s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
891,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,451 UART: [kat] ++
895,603 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,470 UART: [kat] SHA2-512-ACC
906,371 UART: [kat] ECC-384
916,098 UART: [kat] HMAC-384Kdf
920,596 UART: [kat] LMS
1,168,908 UART: [kat] --
1,169,593 UART: [cold-reset] ++
1,169,989 UART: [fht] FHT @ 0x50003400
1,172,707 UART: [idev] ++
1,172,875 UART: [idev] CDI.KEYID = 6
1,173,236 UART: [idev] SUBJECT.KEYID = 7
1,173,661 UART: [idev] UDS.KEYID = 0
1,174,007 ready_for_fw is high
1,174,007 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,581 UART: [idev] Erasing UDS.KEYID = 0
1,198,193 UART: [idev] Sha1 KeyId Algorithm
1,206,867 UART: [idev] --
1,207,970 UART: [ldev] ++
1,208,138 UART: [ldev] CDI.KEYID = 6
1,208,502 UART: [ldev] SUBJECT.KEYID = 5
1,208,929 UART: [ldev] AUTHORITY.KEYID = 7
1,209,392 UART: [ldev] FE.KEYID = 1
1,214,530 UART: [ldev] Erasing FE.KEYID = 1
1,240,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,136 UART: [ldev] --
1,279,510 UART: [fwproc] Wait for Commands...
1,280,165 UART: [fwproc] Recv command 0x46574c44
1,280,898 UART: [fwproc] Recv'd Img size: 111916 bytes
2,549,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,576,700 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,738,213 >>> mbox cmd response: success
2,739,372 UART: [afmc] ++
2,739,540 UART: [afmc] CDI.KEYID = 6
2,739,903 UART: [afmc] SUBJECT.KEYID = 7
2,740,329 UART: [afmc] AUTHORITY.KEYID = 5
2,775,362 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,022 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,792,773 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,798,469 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,804,368 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,061 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,817,927 UART: [afmc] --
2,818,929 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,818,951 UART: [cold-reset] --
2,819,733 UART: [state] Locking Datavault
2,820,664 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,268 UART: [state] Locking ICCM
2,821,858 UART: [exit] Launching FMC @ 0x40000000
2,827,155 UART:
2,827,171 UART: Running Caliptra FMC ...
2,827,579 UART:
2,827,809 UART: [fmc] Received command: 0x46574C44
2,828,635 UART:
2,828,651 UART: Running Caliptra ROM ...
2,829,059 UART:
2,829,114 UART: [state] CFI Enabled
2,831,458 UART: [state] LifecycleState = Unprovisioned
2,832,113 UART: [state] DebugLocked = No
2,832,619 UART: [state] WD Timer not started. Device not locked for debugging
2,833,813 UART: [kat] SHA2-256
3,637,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,641,492 UART: [kat] ++
3,641,644 UART: [kat] sha1
3,645,726 UART: [kat] SHA2-256
3,647,666 UART: [kat] SHA2-384
3,650,457 UART: [kat] SHA2-512-ACC
3,652,357 UART: [kat] ECC-384
3,661,794 UART: [kat] HMAC-384Kdf
3,666,224 UART: [kat] LMS
3,914,536 UART: [kat] --
3,915,404 UART: [update-reset] ++
5,199,411 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,200,590 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,348,793 UART: [update-reset] Copying MAN_2 To MAN_1
5,356,807 UART: [update-reset Success] --
5,357,216 >>> mbox cmd response: success
5,357,216 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,357,888 UART: [state] Locking Datavault
5,358,782 UART: [state] Locking PCR0, PCR1 and PCR31
5,359,386 UART: [state] Locking ICCM
5,359,952 UART: [exit] Launching FMC @ 0x40000000
5,365,249 UART:
5,365,265 UART: Running Caliptra FMC ...
5,365,673 UART:
5,365,895 UART: [fmc] Received command: 0x1000000C
5,366,630 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,128 ready_for_fw is high
1,055,128 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,593 >>> mbox cmd response: success
2,645,802 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,651,847 UART:
2,651,863 UART: Running Caliptra FMC ...
2,652,271 UART:
2,652,501 UART: [fmc] Received command: 0x46574C44
5,064,017 >>> mbox cmd response: success
5,064,017 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,069,541 UART:
5,069,557 UART: Running Caliptra FMC ...
5,069,965 UART:
5,070,187 UART: [fmc] Received command: 0x1000000C
5,070,922 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,733 UART: [kat] SHA2-256
891,283 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,412 UART: [kat] ++
895,564 UART: [kat] sha1
899,892 UART: [kat] SHA2-256
901,832 UART: [kat] SHA2-384
904,623 UART: [kat] SHA2-512-ACC
906,524 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
920,911 UART: [kat] LMS
1,169,223 UART: [kat] --
1,170,100 UART: [cold-reset] ++
1,170,476 UART: [fht] FHT @ 0x50003400
1,173,212 UART: [idev] ++
1,173,380 UART: [idev] CDI.KEYID = 6
1,173,741 UART: [idev] SUBJECT.KEYID = 7
1,174,166 UART: [idev] UDS.KEYID = 0
1,174,512 ready_for_fw is high
1,174,512 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,132 UART: [idev] Erasing UDS.KEYID = 0
1,199,264 UART: [idev] Sha1 KeyId Algorithm
1,208,060 UART: [idev] --
1,209,171 UART: [ldev] ++
1,209,339 UART: [ldev] CDI.KEYID = 6
1,209,703 UART: [ldev] SUBJECT.KEYID = 5
1,210,130 UART: [ldev] AUTHORITY.KEYID = 7
1,210,593 UART: [ldev] FE.KEYID = 1
1,215,785 UART: [ldev] Erasing FE.KEYID = 1
1,242,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,449 UART: [ldev] --
1,281,943 UART: [fwproc] Wait for Commands...
1,282,610 UART: [fwproc] Recv command 0x46574c44
1,283,343 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,941 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,626 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,378 >>> mbox cmd response: success
2,742,395 UART: [afmc] ++
2,742,563 UART: [afmc] CDI.KEYID = 6
2,742,926 UART: [afmc] SUBJECT.KEYID = 7
2,743,352 UART: [afmc] AUTHORITY.KEYID = 5
2,778,795 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,936 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,632 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,531 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,224 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,112 UART: [afmc] --
2,822,008 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,822,030 UART: [cold-reset] --
2,822,878 UART: [state] Locking Datavault
2,823,787 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,391 UART: [state] Locking ICCM
2,825,035 UART: [exit] Launching FMC @ 0x40000000
2,830,332 UART:
2,830,348 UART: Running Caliptra FMC ...
2,830,756 UART:
2,830,986 UART: [fmc] Received command: 0x46574C44
2,831,812 UART:
2,831,828 UART: Running Caliptra ROM ...
2,832,236 UART:
2,832,378 UART: [state] CFI Enabled
2,835,032 UART: [state] LifecycleState = Unprovisioned
2,835,687 UART: [state] DebugLocked = No
2,836,227 UART: [state] WD Timer not started. Device not locked for debugging
2,837,489 UART: [kat] SHA2-256
3,641,039 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,168 UART: [kat] ++
3,645,320 UART: [kat] sha1
3,649,628 UART: [kat] SHA2-256
3,651,568 UART: [kat] SHA2-384
3,654,293 UART: [kat] SHA2-512-ACC
3,656,193 UART: [kat] ECC-384
3,665,984 UART: [kat] HMAC-384Kdf
3,670,592 UART: [kat] LMS
3,918,904 UART: [kat] --
3,919,562 UART: [update-reset] ++
5,202,905 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,203,970 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,352,153 UART: [update-reset] Copying MAN_2 To MAN_1
5,360,167 UART: [update-reset Success] --
5,360,576 >>> mbox cmd response: success
5,360,576 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,361,316 UART: [state] Locking Datavault
5,362,164 UART: [state] Locking PCR0, PCR1 and PCR31
5,362,768 UART: [state] Locking ICCM
5,363,380 UART: [exit] Launching FMC @ 0x40000000
5,368,677 UART:
5,368,693 UART: Running Caliptra FMC ...
5,369,101 UART:
5,369,323 UART: [fmc] Received command: 0x1000000C
5,370,058 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,463 ready_for_fw is high
1,056,463 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,064 >>> mbox cmd response: success
2,647,257 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,653,198 UART:
2,653,214 UART: Running Caliptra FMC ...
2,653,622 UART:
2,653,852 UART: [fmc] Received command: 0x46574C44
5,066,645 >>> mbox cmd response: success
5,066,645 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,072,135 UART:
5,072,151 UART: Running Caliptra FMC ...
5,072,559 UART:
5,072,781 UART: [fmc] Received command: 0x1000000C
5,073,516 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,847 UART: [kat] SHA2-256
901,787 UART: [kat] SHA2-384
904,520 UART: [kat] SHA2-512-ACC
906,421 UART: [kat] ECC-384
916,268 UART: [kat] HMAC-384Kdf
920,892 UART: [kat] LMS
1,169,204 UART: [kat] --
1,169,953 UART: [cold-reset] ++
1,170,313 UART: [fht] FHT @ 0x50003400
1,172,915 UART: [idev] ++
1,173,083 UART: [idev] CDI.KEYID = 6
1,173,444 UART: [idev] SUBJECT.KEYID = 7
1,173,869 UART: [idev] UDS.KEYID = 0
1,174,215 ready_for_fw is high
1,174,215 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,247 UART: [idev] Erasing UDS.KEYID = 0
1,198,627 UART: [idev] Sha1 KeyId Algorithm
1,207,435 UART: [idev] --
1,208,652 UART: [ldev] ++
1,208,820 UART: [ldev] CDI.KEYID = 6
1,209,184 UART: [ldev] SUBJECT.KEYID = 5
1,209,611 UART: [ldev] AUTHORITY.KEYID = 7
1,210,074 UART: [ldev] FE.KEYID = 1
1,215,306 UART: [ldev] Erasing FE.KEYID = 1
1,241,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,942 UART: [ldev] --
1,281,402 UART: [fwproc] Wait for Commands...
1,282,215 UART: [fwproc] Recv command 0x46574c44
1,282,948 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,324 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,009 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,927 >>> mbox cmd response: success
2,741,998 UART: [afmc] ++
2,742,166 UART: [afmc] CDI.KEYID = 6
2,742,529 UART: [afmc] SUBJECT.KEYID = 7
2,742,955 UART: [afmc] AUTHORITY.KEYID = 5
2,778,756 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,083 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,779 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,678 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,371 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,201 UART: [afmc] --
2,822,107 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,822,129 UART: [cold-reset] --
2,822,769 UART: [state] Locking Datavault
2,824,136 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,740 UART: [state] Locking ICCM
2,825,320 UART: [exit] Launching FMC @ 0x40000000
2,830,617 UART:
2,830,633 UART: Running Caliptra FMC ...
2,831,041 UART:
2,831,271 UART: [fmc] Received command: 0x46574C44
2,832,097 UART:
2,832,113 UART: Running Caliptra ROM ...
2,832,521 UART:
2,832,576 UART: [state] CFI Enabled
2,835,184 UART: [state] LifecycleState = Unprovisioned
2,835,839 UART: [state] DebugLocked = No
2,836,369 UART: [state] WD Timer not started. Device not locked for debugging
2,837,535 UART: [kat] SHA2-256
3,641,085 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,214 UART: [kat] ++
3,645,366 UART: [kat] sha1
3,649,748 UART: [kat] SHA2-256
3,651,688 UART: [kat] SHA2-384
3,654,559 UART: [kat] SHA2-512-ACC
3,656,459 UART: [kat] ECC-384
3,666,222 UART: [kat] HMAC-384Kdf
3,670,702 UART: [kat] LMS
3,919,014 UART: [kat] --
3,919,894 UART: [update-reset] ++
5,204,071 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,205,248 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,353,385 UART: [update-reset] Copying MAN_2 To MAN_1
5,361,399 UART: [update-reset Success] --
5,361,808 >>> mbox cmd response: success
5,361,808 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,362,142 UART: [state] Locking Datavault
5,362,894 UART: [state] Locking PCR0, PCR1 and PCR31
5,363,498 UART: [state] Locking ICCM
5,364,132 UART: [exit] Launching FMC @ 0x40000000
5,369,429 UART:
5,369,445 UART: Running Caliptra FMC ...
5,369,853 UART:
5,370,075 UART: [fmc] Received command: 0x1000000C
5,370,810 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,468 ready_for_fw is high
1,056,468 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,569 >>> mbox cmd response: success
2,646,318 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,652,711 UART:
2,652,727 UART: Running Caliptra FMC ...
2,653,135 UART:
2,653,365 UART: [fmc] Received command: 0x46574C44
5,063,579 >>> mbox cmd response: success
5,063,579 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,069,167 UART:
5,069,183 UART: Running Caliptra FMC ...
5,069,591 UART:
5,069,813 UART: [fmc] Received command: 0x1000000C
5,070,548 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,385 UART: [state] LifecycleState = Unprovisioned
86,040 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,741 UART: [kat] SHA2-256
891,291 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,420 UART: [kat] ++
895,572 UART: [kat] sha1
899,848 UART: [kat] SHA2-256
901,788 UART: [kat] SHA2-384
904,517 UART: [kat] SHA2-512-ACC
906,418 UART: [kat] ECC-384
916,233 UART: [kat] HMAC-384Kdf
921,003 UART: [kat] LMS
1,169,315 UART: [kat] --
1,170,286 UART: [cold-reset] ++
1,170,640 UART: [fht] FHT @ 0x50003400
1,173,322 UART: [idev] ++
1,173,490 UART: [idev] CDI.KEYID = 6
1,173,851 UART: [idev] SUBJECT.KEYID = 7
1,174,276 UART: [idev] UDS.KEYID = 0
1,174,622 ready_for_fw is high
1,174,622 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,448 UART: [idev] Erasing UDS.KEYID = 0
1,199,876 UART: [idev] Sha1 KeyId Algorithm
1,208,732 UART: [idev] --
1,209,977 UART: [ldev] ++
1,210,145 UART: [ldev] CDI.KEYID = 6
1,210,509 UART: [ldev] SUBJECT.KEYID = 5
1,210,936 UART: [ldev] AUTHORITY.KEYID = 7
1,211,399 UART: [ldev] FE.KEYID = 1
1,216,569 UART: [ldev] Erasing FE.KEYID = 1
1,243,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,713 UART: [ldev] --
1,283,183 UART: [fwproc] Wait for Commands...
1,283,926 UART: [fwproc] Recv command 0x46574c44
1,284,659 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,091 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,776 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,742,484 >>> mbox cmd response: success
2,743,613 UART: [afmc] ++
2,743,781 UART: [afmc] CDI.KEYID = 6
2,744,144 UART: [afmc] SUBJECT.KEYID = 7
2,744,570 UART: [afmc] AUTHORITY.KEYID = 5
2,779,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,741 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,492 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,188 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,087 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,780 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,666 UART: [afmc] --
2,823,592 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,823,614 UART: [cold-reset] --
2,824,350 UART: [state] Locking Datavault
2,825,671 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,275 UART: [state] Locking ICCM
2,826,887 UART: [exit] Launching FMC @ 0x40000000
2,832,184 UART:
2,832,200 UART: Running Caliptra FMC ...
2,832,608 UART:
2,832,838 UART: [fmc] Received command: 0x46574C44
2,833,664 UART:
2,833,680 UART: Running Caliptra ROM ...
2,834,088 UART:
2,834,230 UART: [state] CFI Enabled
2,836,884 UART: [state] LifecycleState = Unprovisioned
2,837,539 UART: [state] DebugLocked = No
2,838,073 UART: [state] WD Timer not started. Device not locked for debugging
2,839,245 UART: [kat] SHA2-256
3,642,795 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,924 UART: [kat] ++
3,647,076 UART: [kat] sha1
3,651,326 UART: [kat] SHA2-256
3,653,266 UART: [kat] SHA2-384
3,656,123 UART: [kat] SHA2-512-ACC
3,658,023 UART: [kat] ECC-384
3,667,566 UART: [kat] HMAC-384Kdf
3,672,402 UART: [kat] LMS
3,920,714 UART: [kat] --
3,921,696 UART: [update-reset] ++
5,206,527 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,207,556 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,355,795 UART: [update-reset] Copying MAN_2 To MAN_1
5,363,809 UART: [update-reset Success] --
5,364,218 >>> mbox cmd response: success
5,364,218 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,364,882 UART: [state] Locking Datavault
5,365,740 UART: [state] Locking PCR0, PCR1 and PCR31
5,366,344 UART: [state] Locking ICCM
5,366,818 UART: [exit] Launching FMC @ 0x40000000
5,372,115 UART:
5,372,131 UART: Running Caliptra FMC ...
5,372,539 UART:
5,372,761 UART: [fmc] Received command: 0x1000000C
5,373,496 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,269 ready_for_fw is high
1,056,269 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,592,118 >>> mbox cmd response: success
2,648,637 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,654,550 UART:
2,654,566 UART: Running Caliptra FMC ...
2,654,974 UART:
2,655,204 UART: [fmc] Received command: 0x46574C44
5,065,263 >>> mbox cmd response: success
5,065,263 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,070,971 UART:
5,070,987 UART: Running Caliptra FMC ...
5,071,395 UART:
5,071,617 UART: [fmc] Received command: 0x1000000C
5,072,352 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,159 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,159 UART: [kat] ++
895,311 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,498 UART: [kat] SHA2-512-ACC
906,399 UART: [kat] ECC-384
916,132 UART: [kat] HMAC-384Kdf
920,680 UART: [kat] LMS
1,168,992 UART: [kat] --
1,170,103 UART: [cold-reset] ++
1,170,527 UART: [fht] FHT @ 0x50003400
1,172,961 UART: [idev] ++
1,173,129 UART: [idev] CDI.KEYID = 6
1,173,490 UART: [idev] SUBJECT.KEYID = 7
1,173,915 UART: [idev] UDS.KEYID = 0
1,174,261 ready_for_fw is high
1,174,261 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,819 UART: [idev] Erasing UDS.KEYID = 0
1,199,013 UART: [idev] Sha1 KeyId Algorithm
1,207,761 UART: [idev] --
1,208,930 UART: [ldev] ++
1,209,098 UART: [ldev] CDI.KEYID = 6
1,209,462 UART: [ldev] SUBJECT.KEYID = 5
1,209,889 UART: [ldev] AUTHORITY.KEYID = 7
1,210,352 UART: [ldev] FE.KEYID = 1
1,215,416 UART: [ldev] Erasing FE.KEYID = 1
1,241,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,634 UART: [ldev] --
1,280,916 UART: [fwproc] Wait for Commands...
1,281,665 UART: [fwproc] Recv command 0x46574c44
1,282,398 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,740 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,425 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,225 >>> mbox cmd response: success
2,741,486 UART: [afmc] ++
2,741,654 UART: [afmc] CDI.KEYID = 6
2,742,017 UART: [afmc] SUBJECT.KEYID = 7
2,742,443 UART: [afmc] AUTHORITY.KEYID = 5
2,777,566 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,545 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,241 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,140 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,833 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,655 UART: [afmc] --
2,820,709 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,820,731 UART: [cold-reset] --
2,821,711 UART: [state] Locking Datavault
2,822,676 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,280 UART: [state] Locking ICCM
2,823,908 UART: [exit] Launching FMC @ 0x40000000
2,829,205 UART:
2,829,221 UART: Running Caliptra FMC ...
2,829,629 UART:
2,829,859 UART: [fmc] Received command: 0x46574C44
2,830,685 UART:
2,830,701 UART: Running Caliptra ROM ...
2,831,109 UART:
2,831,164 UART: [state] CFI Enabled
2,833,614 UART: [state] LifecycleState = Unprovisioned
2,834,269 UART: [state] DebugLocked = No
2,834,875 UART: [state] WD Timer not started. Device not locked for debugging
2,836,153 UART: [kat] SHA2-256
3,639,703 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,832 UART: [kat] ++
3,643,984 UART: [kat] sha1
3,648,116 UART: [kat] SHA2-256
3,650,056 UART: [kat] SHA2-384
3,652,849 UART: [kat] SHA2-512-ACC
3,654,749 UART: [kat] ECC-384
3,664,500 UART: [kat] HMAC-384Kdf
3,669,304 UART: [kat] LMS
3,917,616 UART: [kat] --
3,918,456 UART: [update-reset] ++
5,202,391 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,203,418 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,351,591 UART: [update-reset] Copying MAN_2 To MAN_1
5,359,605 UART: [update-reset Success] --
5,360,014 >>> mbox cmd response: success
5,360,014 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,360,608 UART: [state] Locking Datavault
5,361,428 UART: [state] Locking PCR0, PCR1 and PCR31
5,362,032 UART: [state] Locking ICCM
5,362,504 UART: [exit] Launching FMC @ 0x40000000
5,367,801 UART:
5,367,817 UART: Running Caliptra FMC ...
5,368,225 UART:
5,368,447 UART: [fmc] Received command: 0x1000000C
5,369,182 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,296 ready_for_fw is high
1,056,296 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,329 >>> mbox cmd response: success
2,644,200 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,650,441 UART:
2,650,457 UART: Running Caliptra FMC ...
2,650,865 UART:
2,651,095 UART: [fmc] Received command: 0x46574C44
5,062,713 >>> mbox cmd response: success
5,062,713 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,068,435 UART:
5,068,451 UART: Running Caliptra FMC ...
5,068,859 UART:
5,069,081 UART: [fmc] Received command: 0x1000000C
5,069,816 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
88,105 UART: [kat] SHA2-256
891,655 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,784 UART: [kat] ++
895,936 UART: [kat] sha1
900,176 UART: [kat] SHA2-256
902,116 UART: [kat] SHA2-384
904,865 UART: [kat] SHA2-512-ACC
906,766 UART: [kat] ECC-384
916,129 UART: [kat] HMAC-384Kdf
920,737 UART: [kat] LMS
1,169,049 UART: [kat] --
1,169,734 UART: [cold-reset] ++
1,170,062 UART: [fht] FHT @ 0x50003400
1,172,864 UART: [idev] ++
1,173,032 UART: [idev] CDI.KEYID = 6
1,173,393 UART: [idev] SUBJECT.KEYID = 7
1,173,818 UART: [idev] UDS.KEYID = 0
1,174,164 ready_for_fw is high
1,174,164 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,898 UART: [idev] Erasing UDS.KEYID = 0
1,199,600 UART: [idev] Sha1 KeyId Algorithm
1,208,314 UART: [idev] --
1,209,361 UART: [ldev] ++
1,209,529 UART: [ldev] CDI.KEYID = 6
1,209,893 UART: [ldev] SUBJECT.KEYID = 5
1,210,320 UART: [ldev] AUTHORITY.KEYID = 7
1,210,783 UART: [ldev] FE.KEYID = 1
1,215,991 UART: [ldev] Erasing FE.KEYID = 1
1,243,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,821 UART: [ldev] --
1,282,135 UART: [fwproc] Wait for Commands...
1,282,914 UART: [fwproc] Recv command 0x46574c44
1,283,647 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,009 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,694 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,530 >>> mbox cmd response: success
2,742,687 UART: [afmc] ++
2,742,855 UART: [afmc] CDI.KEYID = 6
2,743,218 UART: [afmc] SUBJECT.KEYID = 7
2,743,644 UART: [afmc] AUTHORITY.KEYID = 5
2,778,623 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,878 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,574 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,473 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,166 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,094 UART: [afmc] --
2,822,102 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,822,124 UART: [cold-reset] --
2,822,682 UART: [state] Locking Datavault
2,823,797 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,401 UART: [state] Locking ICCM
2,824,993 UART: [exit] Launching FMC @ 0x40000000
2,830,290 UART:
2,830,306 UART: Running Caliptra FMC ...
2,830,714 UART:
2,830,944 UART: [fmc] Received command: 0x46574C44
2,831,770 UART:
2,831,786 UART: Running Caliptra ROM ...
2,832,194 UART:
2,832,336 UART: [state] CFI Enabled
2,834,646 UART: [state] LifecycleState = Unprovisioned
2,835,301 UART: [state] DebugLocked = No
2,835,881 UART: [state] WD Timer not started. Device not locked for debugging
2,837,173 UART: [kat] SHA2-256
3,640,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,852 UART: [kat] ++
3,645,004 UART: [kat] sha1
3,649,250 UART: [kat] SHA2-256
3,651,190 UART: [kat] SHA2-384
3,653,965 UART: [kat] SHA2-512-ACC
3,655,865 UART: [kat] ECC-384
3,665,536 UART: [kat] HMAC-384Kdf
3,670,346 UART: [kat] LMS
3,918,658 UART: [kat] --
3,919,398 UART: [update-reset] ++
5,203,047 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,204,074 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,352,301 UART: [update-reset] Copying MAN_2 To MAN_1
5,360,315 UART: [update-reset Success] --
5,360,724 >>> mbox cmd response: success
5,360,724 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,361,320 UART: [state] Locking Datavault
5,361,988 UART: [state] Locking PCR0, PCR1 and PCR31
5,362,592 UART: [state] Locking ICCM
5,363,256 UART: [exit] Launching FMC @ 0x40000000
5,368,553 UART:
5,368,569 UART: Running Caliptra FMC ...
5,368,977 UART:
5,369,199 UART: [fmc] Received command: 0x1000000C
5,369,934 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,199 ready_for_fw is high
1,056,199 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,588,808 >>> mbox cmd response: success
2,645,747 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,652,068 UART:
2,652,084 UART: Running Caliptra FMC ...
2,652,492 UART:
2,652,722 UART: [fmc] Received command: 0x46574C44
5,064,491 >>> mbox cmd response: success
5,064,491 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,070,311 UART:
5,070,327 UART: Running Caliptra FMC ...
5,070,735 UART:
5,070,957 UART: [fmc] Received command: 0x1000000C
5,071,692 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
87,896 UART: [kat] SHA2-256
891,446 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,575 UART: [kat] ++
895,727 UART: [kat] sha1
899,955 UART: [kat] SHA2-256
901,895 UART: [kat] SHA2-384
904,654 UART: [kat] SHA2-512-ACC
906,555 UART: [kat] ECC-384
916,278 UART: [kat] HMAC-384Kdf
920,842 UART: [kat] LMS
1,169,154 UART: [kat] --
1,169,987 UART: [cold-reset] ++
1,170,361 UART: [fht] FHT @ 0x50003400
1,172,991 UART: [idev] ++
1,173,159 UART: [idev] CDI.KEYID = 6
1,173,520 UART: [idev] SUBJECT.KEYID = 7
1,173,945 UART: [idev] UDS.KEYID = 0
1,174,291 ready_for_fw is high
1,174,291 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,023 UART: [idev] Erasing UDS.KEYID = 0
1,198,791 UART: [idev] Sha1 KeyId Algorithm
1,207,905 UART: [idev] --
1,208,908 UART: [ldev] ++
1,209,076 UART: [ldev] CDI.KEYID = 6
1,209,440 UART: [ldev] SUBJECT.KEYID = 5
1,209,867 UART: [ldev] AUTHORITY.KEYID = 7
1,210,330 UART: [ldev] FE.KEYID = 1
1,215,594 UART: [ldev] Erasing FE.KEYID = 1
1,242,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,024 UART: [ldev] --
1,281,396 UART: [fwproc] Wait for Commands...
1,282,217 UART: [fwproc] Recv command 0x46574c44
1,282,950 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,138 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,438 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,123 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,899 >>> mbox cmd response: success
2,742,078 UART: [afmc] ++
2,742,246 UART: [afmc] CDI.KEYID = 6
2,742,609 UART: [afmc] SUBJECT.KEYID = 7
2,743,035 UART: [afmc] AUTHORITY.KEYID = 5
2,778,602 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,824 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,575 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,271 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,170 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,863 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,729 UART: [afmc] --
2,821,635 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,821,657 UART: [cold-reset] --
2,822,573 UART: [state] Locking Datavault
2,823,698 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,302 UART: [state] Locking ICCM
2,824,814 UART: [exit] Launching FMC @ 0x40000000
2,830,111 UART:
2,830,127 UART: Running Caliptra FMC ...
2,830,535 UART:
2,830,765 UART: [fmc] Received command: 0x46574C44
2,831,591 UART:
2,831,607 UART: Running Caliptra ROM ...
2,832,015 UART:
2,832,070 UART: [state] CFI Enabled
2,833,966 UART: [state] LifecycleState = Unprovisioned
2,834,621 UART: [state] DebugLocked = No
2,835,333 UART: [state] WD Timer not started. Device not locked for debugging
2,836,671 UART: [kat] SHA2-256
3,640,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,350 UART: [kat] ++
3,644,502 UART: [kat] sha1
3,648,688 UART: [kat] SHA2-256
3,650,628 UART: [kat] SHA2-384
3,653,575 UART: [kat] SHA2-512-ACC
3,655,475 UART: [kat] ECC-384
3,665,040 UART: [kat] HMAC-384Kdf
3,669,452 UART: [kat] LMS
3,917,764 UART: [kat] --
3,918,588 UART: [update-reset] ++
5,422,605 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,423,722 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,600,496 >>> mbox cmd response: success
5,600,817 UART: [update-reset] Copying MAN_2 To MAN_1
5,608,831 UART: [update-reset Success] --
5,609,240 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,609,736 UART: [state] Locking Datavault
5,610,414 UART: [state] Locking PCR0, PCR1 and PCR31
5,611,018 UART: [state] Locking ICCM
5,611,650 UART: [exit] Launching FMC @ 0x40000000
5,616,947 UART:
5,616,963 UART: Running Caliptra FMC ...
5,617,371 UART:
5,617,593 UART: [fmc] Received command: 0x1000000E
5,962,647 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,780 ready_for_fw is high
1,055,780 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,743 >>> mbox cmd response: success
2,645,388 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,651,741 UART:
2,651,757 UART: Running Caliptra FMC ...
2,652,165 UART:
2,652,395 UART: [fmc] Received command: 0x46574C44
5,304,859 >>> mbox cmd response: success
5,312,463 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,317,869 UART:
5,317,885 UART: Running Caliptra FMC ...
5,318,293 UART:
5,318,515 UART: [fmc] Received command: 0x1000000E
5,663,569 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,370 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
891,703 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,832 UART: [kat] ++
895,984 UART: [kat] sha1
900,058 UART: [kat] SHA2-256
901,998 UART: [kat] SHA2-384
904,927 UART: [kat] SHA2-512-ACC
906,828 UART: [kat] ECC-384
916,707 UART: [kat] HMAC-384Kdf
921,283 UART: [kat] LMS
1,169,595 UART: [kat] --
1,170,600 UART: [cold-reset] ++
1,171,158 UART: [fht] FHT @ 0x50003400
1,173,766 UART: [idev] ++
1,173,934 UART: [idev] CDI.KEYID = 6
1,174,295 UART: [idev] SUBJECT.KEYID = 7
1,174,720 UART: [idev] UDS.KEYID = 0
1,175,066 ready_for_fw is high
1,175,066 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,752 UART: [idev] Erasing UDS.KEYID = 0
1,200,362 UART: [idev] Sha1 KeyId Algorithm
1,209,278 UART: [idev] --
1,210,319 UART: [ldev] ++
1,210,487 UART: [ldev] CDI.KEYID = 6
1,210,851 UART: [ldev] SUBJECT.KEYID = 5
1,211,278 UART: [ldev] AUTHORITY.KEYID = 7
1,211,741 UART: [ldev] FE.KEYID = 1
1,216,799 UART: [ldev] Erasing FE.KEYID = 1
1,243,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,939 UART: [ldev] --
1,282,345 UART: [fwproc] Wait for Commands...
1,283,066 UART: [fwproc] Recv command 0x46574c44
1,283,799 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,417 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,102 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,812 >>> mbox cmd response: success
2,741,871 UART: [afmc] ++
2,742,039 UART: [afmc] CDI.KEYID = 6
2,742,402 UART: [afmc] SUBJECT.KEYID = 7
2,742,828 UART: [afmc] AUTHORITY.KEYID = 5
2,778,941 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,325 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,076 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,772 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,671 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,364 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,254 UART: [afmc] --
2,822,334 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,822,356 UART: [cold-reset] --
2,823,216 UART: [state] Locking Datavault
2,824,489 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,093 UART: [state] Locking ICCM
2,825,609 UART: [exit] Launching FMC @ 0x40000000
2,830,906 UART:
2,830,922 UART: Running Caliptra FMC ...
2,831,330 UART:
2,831,560 UART: [fmc] Received command: 0x46574C44
2,832,386 UART:
2,832,402 UART: Running Caliptra ROM ...
2,832,810 UART:
2,832,952 UART: [state] CFI Enabled
2,835,630 UART: [state] LifecycleState = Unprovisioned
2,836,285 UART: [state] DebugLocked = No
2,837,011 UART: [state] WD Timer not started. Device not locked for debugging
2,838,253 UART: [kat] SHA2-256
3,641,803 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,932 UART: [kat] ++
3,646,084 UART: [kat] sha1
3,650,402 UART: [kat] SHA2-256
3,652,342 UART: [kat] SHA2-384
3,654,933 UART: [kat] SHA2-512-ACC
3,656,833 UART: [kat] ECC-384
3,666,570 UART: [kat] HMAC-384Kdf
3,671,048 UART: [kat] LMS
3,919,360 UART: [kat] --
3,920,250 UART: [update-reset] ++
5,425,079 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,426,218 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,602,992 >>> mbox cmd response: success
5,603,097 UART: [update-reset] Copying MAN_2 To MAN_1
5,611,111 UART: [update-reset Success] --
5,611,520 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,612,166 UART: [state] Locking Datavault
5,612,978 UART: [state] Locking PCR0, PCR1 and PCR31
5,613,582 UART: [state] Locking ICCM
5,614,206 UART: [exit] Launching FMC @ 0x40000000
5,619,503 UART:
5,619,519 UART: Running Caliptra FMC ...
5,619,927 UART:
5,620,149 UART: [fmc] Received command: 0x1000000E
5,965,203 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,891 ready_for_fw is high
1,056,891 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,900 >>> mbox cmd response: success
2,648,179 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,654,650 UART:
2,654,666 UART: Running Caliptra FMC ...
2,655,074 UART:
2,655,304 UART: [fmc] Received command: 0x46574C44
5,306,895 >>> mbox cmd response: success
5,314,595 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,320,303 UART:
5,320,319 UART: Running Caliptra FMC ...
5,320,727 UART:
5,320,949 UART: [fmc] Received command: 0x1000000E
5,666,003 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,585 UART: [kat] SHA2-256
901,525 UART: [kat] SHA2-384
904,072 UART: [kat] SHA2-512-ACC
905,973 UART: [kat] ECC-384
915,178 UART: [kat] HMAC-384Kdf
919,704 UART: [kat] LMS
1,168,016 UART: [kat] --
1,169,015 UART: [cold-reset] ++
1,169,357 UART: [fht] FHT @ 0x50003400
1,172,055 UART: [idev] ++
1,172,223 UART: [idev] CDI.KEYID = 6
1,172,584 UART: [idev] SUBJECT.KEYID = 7
1,173,009 UART: [idev] UDS.KEYID = 0
1,173,355 ready_for_fw is high
1,173,355 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,180,653 UART: [idev] Erasing UDS.KEYID = 0
1,197,593 UART: [idev] Sha1 KeyId Algorithm
1,206,559 UART: [idev] --
1,207,536 UART: [ldev] ++
1,207,704 UART: [ldev] CDI.KEYID = 6
1,208,068 UART: [ldev] SUBJECT.KEYID = 5
1,208,495 UART: [ldev] AUTHORITY.KEYID = 7
1,208,958 UART: [ldev] FE.KEYID = 1
1,213,996 UART: [ldev] Erasing FE.KEYID = 1
1,240,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,384 UART: [ldev] --
1,279,658 UART: [fwproc] Wait for Commands...
1,280,285 UART: [fwproc] Recv command 0x46574c44
1,281,018 UART: [fwproc] Recv'd Img size: 111916 bytes
2,550,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,818 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,503 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,739,329 >>> mbox cmd response: success
2,740,564 UART: [afmc] ++
2,740,732 UART: [afmc] CDI.KEYID = 6
2,741,095 UART: [afmc] SUBJECT.KEYID = 7
2,741,521 UART: [afmc] AUTHORITY.KEYID = 5
2,776,956 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,338 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,089 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,785 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,684 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,377 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,107 UART: [afmc] --
2,820,135 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,820,157 UART: [cold-reset] --
2,820,785 UART: [state] Locking Datavault
2,821,718 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,322 UART: [state] Locking ICCM
2,822,808 UART: [exit] Launching FMC @ 0x40000000
2,828,105 UART:
2,828,121 UART: Running Caliptra FMC ...
2,828,529 UART:
2,828,759 UART: [fmc] Received command: 0x46574C44
2,829,585 UART:
2,829,601 UART: Running Caliptra ROM ...
2,830,009 UART:
2,830,064 UART: [state] CFI Enabled
2,832,540 UART: [state] LifecycleState = Unprovisioned
2,833,195 UART: [state] DebugLocked = No
2,833,793 UART: [state] WD Timer not started. Device not locked for debugging
2,834,985 UART: [kat] SHA2-256
3,638,535 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,642,664 UART: [kat] ++
3,642,816 UART: [kat] sha1
3,647,050 UART: [kat] SHA2-256
3,648,990 UART: [kat] SHA2-384
3,651,729 UART: [kat] SHA2-512-ACC
3,653,629 UART: [kat] ECC-384
3,663,268 UART: [kat] HMAC-384Kdf
3,667,764 UART: [kat] LMS
3,916,076 UART: [kat] --
3,917,234 UART: [update-reset] ++
5,421,367 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,422,572 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,599,346 >>> mbox cmd response: success
5,599,615 UART: [update-reset] Copying MAN_2 To MAN_1
5,607,629 UART: [update-reset Success] --
5,608,038 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,608,484 UART: [state] Locking Datavault
5,609,342 UART: [state] Locking PCR0, PCR1 and PCR31
5,609,946 UART: [state] Locking ICCM
5,610,552 UART: [exit] Launching FMC @ 0x40000000
5,615,849 UART:
5,615,865 UART: Running Caliptra FMC ...
5,616,273 UART:
5,616,495 UART: [fmc] Received command: 0x1000000E
5,961,549 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,016 ready_for_fw is high
1,056,016 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,707 >>> mbox cmd response: success
2,646,772 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,652,977 UART:
2,652,993 UART: Running Caliptra FMC ...
2,653,401 UART:
2,653,631 UART: [fmc] Received command: 0x46574C44
5,305,583 >>> mbox cmd response: success
5,313,147 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,318,935 UART:
5,318,951 UART: Running Caliptra FMC ...
5,319,359 UART:
5,319,581 UART: [fmc] Received command: 0x1000000E
5,664,635 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,810 UART: [state] WD Timer not started. Device not locked for debugging
88,145 UART: [kat] SHA2-256
891,695 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,824 UART: [kat] ++
895,976 UART: [kat] sha1
900,284 UART: [kat] SHA2-256
902,224 UART: [kat] SHA2-384
905,007 UART: [kat] SHA2-512-ACC
906,908 UART: [kat] ECC-384
916,539 UART: [kat] HMAC-384Kdf
921,045 UART: [kat] LMS
1,169,357 UART: [kat] --
1,170,420 UART: [cold-reset] ++
1,170,930 UART: [fht] FHT @ 0x50003400
1,173,624 UART: [idev] ++
1,173,792 UART: [idev] CDI.KEYID = 6
1,174,153 UART: [idev] SUBJECT.KEYID = 7
1,174,578 UART: [idev] UDS.KEYID = 0
1,174,924 ready_for_fw is high
1,174,924 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,512 UART: [idev] Erasing UDS.KEYID = 0
1,199,622 UART: [idev] Sha1 KeyId Algorithm
1,208,438 UART: [idev] --
1,209,469 UART: [ldev] ++
1,209,637 UART: [ldev] CDI.KEYID = 6
1,210,001 UART: [ldev] SUBJECT.KEYID = 5
1,210,428 UART: [ldev] AUTHORITY.KEYID = 7
1,210,891 UART: [ldev] FE.KEYID = 1
1,216,015 UART: [ldev] Erasing FE.KEYID = 1
1,242,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,945 UART: [ldev] --
1,282,275 UART: [fwproc] Wait for Commands...
1,283,060 UART: [fwproc] Recv command 0x46574c44
1,283,793 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,477 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,827 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,512 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,358 >>> mbox cmd response: success
2,742,531 UART: [afmc] ++
2,742,699 UART: [afmc] CDI.KEYID = 6
2,743,062 UART: [afmc] SUBJECT.KEYID = 7
2,743,488 UART: [afmc] AUTHORITY.KEYID = 5
2,778,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,297 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,048 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,744 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,643 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,336 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,180 UART: [afmc] --
2,822,268 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,822,290 UART: [cold-reset] --
2,823,296 UART: [state] Locking Datavault
2,824,437 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,041 UART: [state] Locking ICCM
2,825,641 UART: [exit] Launching FMC @ 0x40000000
2,830,938 UART:
2,830,954 UART: Running Caliptra FMC ...
2,831,362 UART:
2,831,592 UART: [fmc] Received command: 0x46574C44
2,832,418 UART:
2,832,434 UART: Running Caliptra ROM ...
2,832,842 UART:
2,832,984 UART: [state] CFI Enabled
2,835,588 UART: [state] LifecycleState = Unprovisioned
2,836,243 UART: [state] DebugLocked = No
2,836,769 UART: [state] WD Timer not started. Device not locked for debugging
2,837,945 UART: [kat] SHA2-256
3,641,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,624 UART: [kat] ++
3,645,776 UART: [kat] sha1
3,650,060 UART: [kat] SHA2-256
3,652,000 UART: [kat] SHA2-384
3,654,767 UART: [kat] SHA2-512-ACC
3,656,667 UART: [kat] ECC-384
3,666,554 UART: [kat] HMAC-384Kdf
3,671,322 UART: [kat] LMS
3,919,634 UART: [kat] --
3,920,436 UART: [update-reset] ++
5,423,271 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,424,326 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,601,100 >>> mbox cmd response: success
5,601,385 UART: [update-reset] Copying MAN_2 To MAN_1
5,609,399 UART: [update-reset Success] --
5,609,808 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,610,328 UART: [state] Locking Datavault
5,611,082 UART: [state] Locking PCR0, PCR1 and PCR31
5,611,686 UART: [state] Locking ICCM
5,612,142 UART: [exit] Launching FMC @ 0x40000000
5,617,439 UART:
5,617,455 UART: Running Caliptra FMC ...
5,617,863 UART:
5,618,085 UART: [fmc] Received command: 0x1000000E
5,963,139 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,461 ready_for_fw is high
1,055,461 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,098 >>> mbox cmd response: success
2,647,105 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,653,270 UART:
2,653,286 UART: Running Caliptra FMC ...
2,653,694 UART:
2,653,924 UART: [fmc] Received command: 0x46574C44
5,307,357 >>> mbox cmd response: success
5,315,057 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,320,887 UART:
5,320,903 UART: Running Caliptra FMC ...
5,321,311 UART:
5,321,533 UART: [fmc] Received command: 0x1000000E
5,666,587 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,691 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
891,358 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,487 UART: [kat] ++
895,639 UART: [kat] sha1
899,895 UART: [kat] SHA2-256
901,835 UART: [kat] SHA2-384
904,626 UART: [kat] SHA2-512-ACC
906,527 UART: [kat] ECC-384
916,368 UART: [kat] HMAC-384Kdf
920,814 UART: [kat] LMS
1,169,126 UART: [kat] --
1,169,909 UART: [cold-reset] ++
1,170,345 UART: [fht] FHT @ 0x50003400
1,172,985 UART: [idev] ++
1,173,153 UART: [idev] CDI.KEYID = 6
1,173,514 UART: [idev] SUBJECT.KEYID = 7
1,173,939 UART: [idev] UDS.KEYID = 0
1,174,285 ready_for_fw is high
1,174,285 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,969 UART: [idev] Erasing UDS.KEYID = 0
1,198,833 UART: [idev] Sha1 KeyId Algorithm
1,207,785 UART: [idev] --
1,208,816 UART: [ldev] ++
1,208,984 UART: [ldev] CDI.KEYID = 6
1,209,348 UART: [ldev] SUBJECT.KEYID = 5
1,209,775 UART: [ldev] AUTHORITY.KEYID = 7
1,210,238 UART: [ldev] FE.KEYID = 1
1,215,468 UART: [ldev] Erasing FE.KEYID = 1
1,242,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,064 UART: [ldev] --
1,281,344 UART: [fwproc] Wait for Commands...
1,282,113 UART: [fwproc] Recv command 0x46574c44
1,282,846 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,578 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,263 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,989 >>> mbox cmd response: success
2,742,216 UART: [afmc] ++
2,742,384 UART: [afmc] CDI.KEYID = 6
2,742,747 UART: [afmc] SUBJECT.KEYID = 7
2,743,173 UART: [afmc] AUTHORITY.KEYID = 5
2,778,276 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,184 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,935 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,631 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,530 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,223 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,989 UART: [afmc] --
2,821,057 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,821,079 UART: [cold-reset] --
2,822,101 UART: [state] Locking Datavault
2,823,334 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,938 UART: [state] Locking ICCM
2,824,608 UART: [exit] Launching FMC @ 0x40000000
2,829,905 UART:
2,829,921 UART: Running Caliptra FMC ...
2,830,329 UART:
2,830,559 UART: [fmc] Received command: 0x46574C44
2,831,385 UART:
2,831,401 UART: Running Caliptra ROM ...
2,831,809 UART:
2,831,864 UART: [state] CFI Enabled
2,834,094 UART: [state] LifecycleState = Unprovisioned
2,834,749 UART: [state] DebugLocked = No
2,835,403 UART: [state] WD Timer not started. Device not locked for debugging
2,836,657 UART: [kat] SHA2-256
3,640,207 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,336 UART: [kat] ++
3,644,488 UART: [kat] sha1
3,648,528 UART: [kat] SHA2-256
3,650,468 UART: [kat] SHA2-384
3,653,099 UART: [kat] SHA2-512-ACC
3,654,999 UART: [kat] ECC-384
3,665,018 UART: [kat] HMAC-384Kdf
3,669,728 UART: [kat] LMS
3,918,040 UART: [kat] --
3,918,802 UART: [update-reset] ++
5,422,659 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,423,848 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,600,622 >>> mbox cmd response: success
5,600,851 UART: [update-reset] Copying MAN_2 To MAN_1
5,608,865 UART: [update-reset Success] --
5,609,274 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,609,846 UART: [state] Locking Datavault
5,610,682 UART: [state] Locking PCR0, PCR1 and PCR31
5,611,286 UART: [state] Locking ICCM
5,611,712 UART: [exit] Launching FMC @ 0x40000000
5,617,009 UART:
5,617,025 UART: Running Caliptra FMC ...
5,617,433 UART:
5,617,655 UART: [fmc] Received command: 0x1000000E
5,962,709 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,216 ready_for_fw is high
1,056,216 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,959 >>> mbox cmd response: success
2,647,564 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,653,493 UART:
2,653,509 UART: Running Caliptra FMC ...
2,653,917 UART:
2,654,147 UART: [fmc] Received command: 0x46574C44
5,305,009 >>> mbox cmd response: success
5,312,701 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,318,351 UART:
5,318,367 UART: Running Caliptra FMC ...
5,318,775 UART:
5,318,997 UART: [fmc] Received command: 0x1000000E
5,664,051 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
891,551 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,680 UART: [kat] ++
895,832 UART: [kat] sha1
899,890 UART: [kat] SHA2-256
901,830 UART: [kat] SHA2-384
904,649 UART: [kat] SHA2-512-ACC
906,550 UART: [kat] ECC-384
916,081 UART: [kat] HMAC-384Kdf
920,647 UART: [kat] LMS
1,168,959 UART: [kat] --
1,169,754 UART: [cold-reset] ++
1,170,212 UART: [fht] FHT @ 0x50003400
1,173,036 UART: [idev] ++
1,173,204 UART: [idev] CDI.KEYID = 6
1,173,565 UART: [idev] SUBJECT.KEYID = 7
1,173,990 UART: [idev] UDS.KEYID = 0
1,174,336 ready_for_fw is high
1,174,336 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,154 UART: [idev] Erasing UDS.KEYID = 0
1,199,028 UART: [idev] Sha1 KeyId Algorithm
1,207,732 UART: [idev] --
1,208,733 UART: [ldev] ++
1,208,901 UART: [ldev] CDI.KEYID = 6
1,209,265 UART: [ldev] SUBJECT.KEYID = 5
1,209,692 UART: [ldev] AUTHORITY.KEYID = 7
1,210,155 UART: [ldev] FE.KEYID = 1
1,215,513 UART: [ldev] Erasing FE.KEYID = 1
1,241,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,953 UART: [ldev] --
1,281,315 UART: [fwproc] Wait for Commands...
1,282,050 UART: [fwproc] Recv command 0x46574c44
1,282,783 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,155 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,840 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,588 >>> mbox cmd response: success
2,742,787 UART: [afmc] ++
2,742,955 UART: [afmc] CDI.KEYID = 6
2,743,318 UART: [afmc] SUBJECT.KEYID = 7
2,743,744 UART: [afmc] AUTHORITY.KEYID = 5
2,778,853 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,705 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,456 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,152 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,051 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,744 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,670 UART: [afmc] --
2,822,558 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,822,580 UART: [cold-reset] --
2,823,250 UART: [state] Locking Datavault
2,824,509 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,113 UART: [state] Locking ICCM
2,825,575 UART: [exit] Launching FMC @ 0x40000000
2,830,872 UART:
2,830,888 UART: Running Caliptra FMC ...
2,831,296 UART:
2,831,526 UART: [fmc] Received command: 0x46574C44
2,832,352 UART:
2,832,368 UART: Running Caliptra ROM ...
2,832,776 UART:
2,832,918 UART: [state] CFI Enabled
2,835,554 UART: [state] LifecycleState = Unprovisioned
2,836,209 UART: [state] DebugLocked = No
2,836,877 UART: [state] WD Timer not started. Device not locked for debugging
2,838,011 UART: [kat] SHA2-256
3,641,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,690 UART: [kat] ++
3,645,842 UART: [kat] sha1
3,650,140 UART: [kat] SHA2-256
3,652,080 UART: [kat] SHA2-384
3,654,737 UART: [kat] SHA2-512-ACC
3,656,637 UART: [kat] ECC-384
3,666,214 UART: [kat] HMAC-384Kdf
3,670,760 UART: [kat] LMS
3,919,072 UART: [kat] --
3,919,830 UART: [update-reset] ++
5,424,339 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,425,518 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,602,292 >>> mbox cmd response: success
5,602,493 UART: [update-reset] Copying MAN_2 To MAN_1
5,610,507 UART: [update-reset Success] --
5,610,916 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,611,322 UART: [state] Locking Datavault
5,612,170 UART: [state] Locking PCR0, PCR1 and PCR31
5,612,774 UART: [state] Locking ICCM
5,613,342 UART: [exit] Launching FMC @ 0x40000000
5,618,639 UART:
5,618,655 UART: Running Caliptra FMC ...
5,619,063 UART:
5,619,285 UART: [fmc] Received command: 0x1000000E
5,964,339 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,247 ready_for_fw is high
1,057,247 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,478 >>> mbox cmd response: success
2,648,331 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,654,510 UART:
2,654,526 UART: Running Caliptra FMC ...
2,654,934 UART:
2,655,164 UART: [fmc] Received command: 0x46574C44
5,307,989 >>> mbox cmd response: success
5,315,721 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,321,429 UART:
5,321,445 UART: Running Caliptra FMC ...
5,321,853 UART:
5,322,075 UART: [fmc] Received command: 0x1000000E
5,667,129 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,662 UART: [state] LifecycleState = Unprovisioned
86,317 UART: [state] DebugLocked = No
86,833 UART: [state] WD Timer not started. Device not locked for debugging
88,172 UART: [kat] SHA2-256
891,722 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,851 UART: [kat] ++
896,003 UART: [kat] sha1
900,289 UART: [kat] SHA2-256
902,229 UART: [kat] SHA2-384
905,082 UART: [kat] SHA2-512-ACC
906,983 UART: [kat] ECC-384
916,068 UART: [kat] HMAC-384Kdf
920,530 UART: [kat] LMS
1,168,842 UART: [kat] --
1,169,855 UART: [cold-reset] ++
1,170,407 UART: [fht] FHT @ 0x50003400
1,173,121 UART: [idev] ++
1,173,289 UART: [idev] CDI.KEYID = 6
1,173,650 UART: [idev] SUBJECT.KEYID = 7
1,174,075 UART: [idev] UDS.KEYID = 0
1,174,421 ready_for_fw is high
1,174,421 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,297 UART: [idev] Erasing UDS.KEYID = 0
1,199,127 UART: [idev] Sha1 KeyId Algorithm
1,207,771 UART: [idev] --
1,208,854 UART: [ldev] ++
1,209,022 UART: [ldev] CDI.KEYID = 6
1,209,386 UART: [ldev] SUBJECT.KEYID = 5
1,209,813 UART: [ldev] AUTHORITY.KEYID = 7
1,210,276 UART: [ldev] FE.KEYID = 1
1,215,422 UART: [ldev] Erasing FE.KEYID = 1
1,242,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,230 UART: [ldev] --
1,281,710 UART: [fwproc] Wait for Commands...
1,282,527 UART: [fwproc] Recv command 0x46574c44
1,283,260 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,231 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,314 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,034 >>> mbox cmd response: success
2,676,301 UART: [afmc] ++
2,676,469 UART: [afmc] CDI.KEYID = 6
2,676,832 UART: [afmc] SUBJECT.KEYID = 7
2,677,258 UART: [afmc] AUTHORITY.KEYID = 5
2,713,262 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,138 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,889 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,609 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,502 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,195 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,148 UART: [afmc] --
2,757,028 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,757,050 UART: [cold-reset] --
2,758,068 UART: [state] Locking Datavault
2,759,451 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,055 UART: [state] Locking ICCM
2,760,651 UART: [exit] Launching FMC @ 0x40000000
2,765,948 UART:
2,765,964 UART: Running Caliptra FMC ...
2,766,372 UART:
2,766,510 UART: [fmc] Received command: 0x10000004
2,767,247 >>> mbox cmd response: success
2,767,343 UART:
2,767,359 UART: Running Caliptra ROM ...
2,767,767 UART:
2,767,822 UART: [state] CFI Enabled
2,770,702 UART: [state] LifecycleState = Unprovisioned
2,771,357 UART: [state] DebugLocked = No
2,772,073 UART: [state] WD Timer not started. Device not locked for debugging
2,773,395 UART: [kat] SHA2-256
3,576,945 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,581,074 UART: [kat] ++
3,581,226 UART: [kat] sha1
3,585,240 UART: [kat] SHA2-256
3,587,180 UART: [kat] SHA2-384
3,589,885 UART: [kat] SHA2-512-ACC
3,591,785 UART: [kat] ECC-384
3,601,806 UART: [kat] HMAC-384Kdf
3,606,520 UART: [kat] LMS
3,854,832 UART: [kat] --
3,855,598 UART: [update-reset] ++
3,855,909 UART: Failed To Get Mailbox Txn
3,856,622 UART: ROM Non-Fatal Error: 0x01040004
3,857,297 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,857,402 UART: [state] Locking Datavault
3,858,166 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,770 UART: [state] Locking ICCM
3,859,362 UART: [exit] Launching FMC @ 0x40000000
3,864,659 UART:
3,864,675 UART: Running Caliptra FMC ...
3,865,083 UART:
3,865,213 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,865,989 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,780 ready_for_fw is high
1,055,780 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,052 >>> mbox cmd response: success
2,580,290 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,586,459 UART:
2,586,475 UART: Running Caliptra FMC ...
2,586,883 UART:
2,587,021 UART: [fmc] Received command: 0x10000004
2,587,758 >>> mbox cmd response: success
3,560,720 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,566,011 UART:
3,566,027 UART: Running Caliptra FMC ...
3,566,435 UART:
3,566,565 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,567,341 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
87,711 UART: [kat] SHA2-256
891,261 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,390 UART: [kat] ++
895,542 UART: [kat] sha1
899,612 UART: [kat] SHA2-256
901,552 UART: [kat] SHA2-384
904,215 UART: [kat] SHA2-512-ACC
906,116 UART: [kat] ECC-384
916,055 UART: [kat] HMAC-384Kdf
920,779 UART: [kat] LMS
1,169,091 UART: [kat] --
1,170,042 UART: [cold-reset] ++
1,170,484 UART: [fht] FHT @ 0x50003400
1,172,968 UART: [idev] ++
1,173,136 UART: [idev] CDI.KEYID = 6
1,173,497 UART: [idev] SUBJECT.KEYID = 7
1,173,922 UART: [idev] UDS.KEYID = 0
1,174,268 ready_for_fw is high
1,174,268 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,836 UART: [idev] Erasing UDS.KEYID = 0
1,199,064 UART: [idev] Sha1 KeyId Algorithm
1,207,878 UART: [idev] --
1,208,815 UART: [ldev] ++
1,208,983 UART: [ldev] CDI.KEYID = 6
1,209,347 UART: [ldev] SUBJECT.KEYID = 5
1,209,774 UART: [ldev] AUTHORITY.KEYID = 7
1,210,237 UART: [ldev] FE.KEYID = 1
1,215,329 UART: [ldev] Erasing FE.KEYID = 1
1,241,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,289 UART: [ldev] --
1,280,571 UART: [fwproc] Wait for Commands...
1,281,274 UART: [fwproc] Recv command 0x46574c44
1,282,007 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,074 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,104 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,187 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,673,995 >>> mbox cmd response: success
2,675,228 UART: [afmc] ++
2,675,396 UART: [afmc] CDI.KEYID = 6
2,675,759 UART: [afmc] SUBJECT.KEYID = 7
2,676,185 UART: [afmc] AUTHORITY.KEYID = 5
2,711,861 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,545 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,296 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,016 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,909 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,602 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,605 UART: [afmc] --
2,755,465 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,755,487 UART: [cold-reset] --
2,756,183 UART: [state] Locking Datavault
2,757,376 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,980 UART: [state] Locking ICCM
2,758,538 UART: [exit] Launching FMC @ 0x40000000
2,763,835 UART:
2,763,851 UART: Running Caliptra FMC ...
2,764,259 UART:
2,764,397 UART: [fmc] Received command: 0x10000004
2,765,134 >>> mbox cmd response: success
2,765,230 UART:
2,765,246 UART: Running Caliptra ROM ...
2,765,654 UART:
2,765,796 UART: [state] CFI Enabled
2,768,474 UART: [state] LifecycleState = Unprovisioned
2,769,129 UART: [state] DebugLocked = No
2,769,781 UART: [state] WD Timer not started. Device not locked for debugging
2,771,035 UART: [kat] SHA2-256
3,574,585 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,714 UART: [kat] ++
3,578,866 UART: [kat] sha1
3,583,036 UART: [kat] SHA2-256
3,584,976 UART: [kat] SHA2-384
3,587,815 UART: [kat] SHA2-512-ACC
3,589,715 UART: [kat] ECC-384
3,599,238 UART: [kat] HMAC-384Kdf
3,603,908 UART: [kat] LMS
3,852,220 UART: [kat] --
3,853,138 UART: [update-reset] ++
3,853,449 UART: Failed To Get Mailbox Txn
3,854,114 UART: ROM Non-Fatal Error: 0x01040004
3,854,789 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,854,912 UART: [state] Locking Datavault
3,855,566 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,170 UART: [state] Locking ICCM
3,856,756 UART: [exit] Launching FMC @ 0x40000000
3,862,053 UART:
3,862,069 UART: Running Caliptra FMC ...
3,862,477 UART:
3,862,607 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,863,383 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,733 ready_for_fw is high
1,056,733 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,003 >>> mbox cmd response: success
2,580,655 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,586,630 UART:
2,586,646 UART: Running Caliptra FMC ...
2,587,054 UART:
2,587,192 UART: [fmc] Received command: 0x10000004
2,587,929 >>> mbox cmd response: success
3,560,608 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,565,887 UART:
3,565,903 UART: Running Caliptra FMC ...
3,566,311 UART:
3,566,441 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,567,217 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,806 UART: [state] LifecycleState = Unprovisioned
85,461 UART: [state] DebugLocked = No
86,039 UART: [state] WD Timer not started. Device not locked for debugging
87,384 UART: [kat] SHA2-256
890,934 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,063 UART: [kat] ++
895,215 UART: [kat] sha1
899,431 UART: [kat] SHA2-256
901,371 UART: [kat] SHA2-384
904,322 UART: [kat] SHA2-512-ACC
906,223 UART: [kat] ECC-384
916,228 UART: [kat] HMAC-384Kdf
920,760 UART: [kat] LMS
1,169,072 UART: [kat] --
1,169,779 UART: [cold-reset] ++
1,170,235 UART: [fht] FHT @ 0x50003400
1,172,899 UART: [idev] ++
1,173,067 UART: [idev] CDI.KEYID = 6
1,173,428 UART: [idev] SUBJECT.KEYID = 7
1,173,853 UART: [idev] UDS.KEYID = 0
1,174,199 ready_for_fw is high
1,174,199 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,167 UART: [idev] Erasing UDS.KEYID = 0
1,198,757 UART: [idev] Sha1 KeyId Algorithm
1,207,623 UART: [idev] --
1,208,620 UART: [ldev] ++
1,208,788 UART: [ldev] CDI.KEYID = 6
1,209,152 UART: [ldev] SUBJECT.KEYID = 5
1,209,579 UART: [ldev] AUTHORITY.KEYID = 7
1,210,042 UART: [ldev] FE.KEYID = 1
1,215,124 UART: [ldev] Erasing FE.KEYID = 1
1,241,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,938 UART: [ldev] --
1,280,302 UART: [fwproc] Wait for Commands...
1,280,953 UART: [fwproc] Recv command 0x46574c44
1,281,686 UART: [fwproc] Recv'd Img size: 106848 bytes
2,492,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,729 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,812 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,673,686 >>> mbox cmd response: success
2,674,787 UART: [afmc] ++
2,674,955 UART: [afmc] CDI.KEYID = 6
2,675,318 UART: [afmc] SUBJECT.KEYID = 7
2,675,744 UART: [afmc] AUTHORITY.KEYID = 5
2,710,730 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,414 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,165 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,885 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,778 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,471 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,348 UART: [afmc] --
2,754,302 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,754,324 UART: [cold-reset] --
2,754,918 UART: [state] Locking Datavault
2,756,255 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,859 UART: [state] Locking ICCM
2,757,467 UART: [exit] Launching FMC @ 0x40000000
2,762,764 UART:
2,762,780 UART: Running Caliptra FMC ...
2,763,188 UART:
2,763,326 UART: [fmc] Received command: 0x10000004
2,764,063 >>> mbox cmd response: success
2,764,159 UART:
2,764,175 UART: Running Caliptra ROM ...
2,764,583 UART:
2,764,638 UART: [state] CFI Enabled
2,767,226 UART: [state] LifecycleState = Unprovisioned
2,767,881 UART: [state] DebugLocked = No
2,768,471 UART: [state] WD Timer not started. Device not locked for debugging
2,769,729 UART: [kat] SHA2-256
3,573,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,408 UART: [kat] ++
3,577,560 UART: [kat] sha1
3,581,852 UART: [kat] SHA2-256
3,583,792 UART: [kat] SHA2-384
3,586,561 UART: [kat] SHA2-512-ACC
3,588,461 UART: [kat] ECC-384
3,597,872 UART: [kat] HMAC-384Kdf
3,602,400 UART: [kat] LMS
3,850,712 UART: [kat] --
3,851,678 UART: [update-reset] ++
3,851,989 UART: Failed To Get Mailbox Txn
3,852,614 UART: ROM Non-Fatal Error: 0x01040004
3,853,289 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,853,486 UART: [state] Locking Datavault
3,854,180 UART: [state] Locking PCR0, PCR1 and PCR31
3,854,784 UART: [state] Locking ICCM
3,855,452 UART: [exit] Launching FMC @ 0x40000000
3,860,749 UART:
3,860,765 UART: Running Caliptra FMC ...
3,861,173 UART:
3,861,303 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,862,079 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,660 ready_for_fw is high
1,056,660 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,248 >>> mbox cmd response: success
2,579,564 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,585,407 UART:
2,585,423 UART: Running Caliptra FMC ...
2,585,831 UART:
2,585,969 UART: [fmc] Received command: 0x10000004
2,586,706 >>> mbox cmd response: success
3,558,176 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,563,661 UART:
3,563,677 UART: Running Caliptra FMC ...
3,564,085 UART:
3,564,215 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,564,991 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
891,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,568 UART: [kat] ++
895,720 UART: [kat] sha1
899,814 UART: [kat] SHA2-256
901,754 UART: [kat] SHA2-384
904,513 UART: [kat] SHA2-512-ACC
906,414 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
920,903 UART: [kat] LMS
1,169,215 UART: [kat] --
1,169,876 UART: [cold-reset] ++
1,170,212 UART: [fht] FHT @ 0x50003400
1,173,024 UART: [idev] ++
1,173,192 UART: [idev] CDI.KEYID = 6
1,173,553 UART: [idev] SUBJECT.KEYID = 7
1,173,978 UART: [idev] UDS.KEYID = 0
1,174,324 ready_for_fw is high
1,174,324 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,868 UART: [idev] Erasing UDS.KEYID = 0
1,198,626 UART: [idev] Sha1 KeyId Algorithm
1,207,520 UART: [idev] --
1,208,525 UART: [ldev] ++
1,208,693 UART: [ldev] CDI.KEYID = 6
1,209,057 UART: [ldev] SUBJECT.KEYID = 5
1,209,484 UART: [ldev] AUTHORITY.KEYID = 7
1,209,947 UART: [ldev] FE.KEYID = 1
1,215,089 UART: [ldev] Erasing FE.KEYID = 1
1,241,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,215 UART: [ldev] --
1,280,677 UART: [fwproc] Wait for Commands...
1,281,264 UART: [fwproc] Recv command 0x46574c44
1,281,997 UART: [fwproc] Recv'd Img size: 106848 bytes
2,492,532 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,564 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,647 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,673,593 >>> mbox cmd response: success
2,674,738 UART: [afmc] ++
2,674,906 UART: [afmc] CDI.KEYID = 6
2,675,269 UART: [afmc] SUBJECT.KEYID = 7
2,675,695 UART: [afmc] AUTHORITY.KEYID = 5
2,711,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,619 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,370 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,090 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,983 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,676 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,415 UART: [afmc] --
2,754,407 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,754,429 UART: [cold-reset] --
2,755,279 UART: [state] Locking Datavault
2,756,440 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,044 UART: [state] Locking ICCM
2,757,704 UART: [exit] Launching FMC @ 0x40000000
2,763,001 UART:
2,763,017 UART: Running Caliptra FMC ...
2,763,425 UART:
2,763,563 UART: [fmc] Received command: 0x10000004
2,764,300 >>> mbox cmd response: success
2,764,396 UART:
2,764,412 UART: Running Caliptra ROM ...
2,764,820 UART:
2,764,962 UART: [state] CFI Enabled
2,768,178 UART: [state] LifecycleState = Unprovisioned
2,768,833 UART: [state] DebugLocked = No
2,769,387 UART: [state] WD Timer not started. Device not locked for debugging
2,770,651 UART: [kat] SHA2-256
3,574,201 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,330 UART: [kat] ++
3,578,482 UART: [kat] sha1
3,582,620 UART: [kat] SHA2-256
3,584,560 UART: [kat] SHA2-384
3,587,301 UART: [kat] SHA2-512-ACC
3,589,201 UART: [kat] ECC-384
3,599,194 UART: [kat] HMAC-384Kdf
3,603,692 UART: [kat] LMS
3,852,004 UART: [kat] --
3,852,594 UART: [update-reset] ++
3,852,905 UART: Failed To Get Mailbox Txn
3,853,836 UART: ROM Non-Fatal Error: 0x01040004
3,854,511 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,854,624 UART: [state] Locking Datavault
3,855,442 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,046 UART: [state] Locking ICCM
3,856,656 UART: [exit] Launching FMC @ 0x40000000
3,861,953 UART:
3,861,969 UART: Running Caliptra FMC ...
3,862,377 UART:
3,862,507 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,863,283 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,323 ready_for_fw is high
1,056,323 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,523,325 >>> mbox cmd response: success
2,579,447 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,585,458 UART:
2,585,474 UART: Running Caliptra FMC ...
2,585,882 UART:
2,586,020 UART: [fmc] Received command: 0x10000004
2,586,757 >>> mbox cmd response: success
3,559,370 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,564,777 UART:
3,564,793 UART: Running Caliptra FMC ...
3,565,201 UART:
3,565,331 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,566,107 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
891,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,385 UART: [kat] ++
895,537 UART: [kat] sha1
899,643 UART: [kat] SHA2-256
901,583 UART: [kat] SHA2-384
904,134 UART: [kat] SHA2-512-ACC
906,035 UART: [kat] ECC-384
915,880 UART: [kat] HMAC-384Kdf
920,352 UART: [kat] LMS
1,168,664 UART: [kat] --
1,169,591 UART: [cold-reset] ++
1,170,139 UART: [fht] FHT @ 0x50003400
1,172,871 UART: [idev] ++
1,173,039 UART: [idev] CDI.KEYID = 6
1,173,400 UART: [idev] SUBJECT.KEYID = 7
1,173,825 UART: [idev] UDS.KEYID = 0
1,174,171 ready_for_fw is high
1,174,171 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,663 UART: [idev] Erasing UDS.KEYID = 0
1,199,237 UART: [idev] Sha1 KeyId Algorithm
1,208,045 UART: [idev] --
1,209,090 UART: [ldev] ++
1,209,258 UART: [ldev] CDI.KEYID = 6
1,209,622 UART: [ldev] SUBJECT.KEYID = 5
1,210,049 UART: [ldev] AUTHORITY.KEYID = 7
1,210,512 UART: [ldev] FE.KEYID = 1
1,216,020 UART: [ldev] Erasing FE.KEYID = 1
1,242,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,388 UART: [ldev] --
1,281,896 UART: [fwproc] Wait for Commands...
1,282,661 UART: [fwproc] Recv command 0x46574c44
1,283,394 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,867 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,950 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,776 >>> mbox cmd response: success
2,677,011 UART: [afmc] ++
2,677,179 UART: [afmc] CDI.KEYID = 6
2,677,542 UART: [afmc] SUBJECT.KEYID = 7
2,677,968 UART: [afmc] AUTHORITY.KEYID = 5
2,713,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,096 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,847 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,567 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,460 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,153 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,052 UART: [afmc] --
2,757,090 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,757,112 UART: [cold-reset] --
2,757,882 UART: [state] Locking Datavault
2,758,897 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,501 UART: [state] Locking ICCM
2,760,081 UART: [exit] Launching FMC @ 0x40000000
2,765,378 UART:
2,765,394 UART: Running Caliptra FMC ...
2,765,802 UART:
2,765,940 UART: [fmc] Received command: 0x10000004
2,766,677 >>> mbox cmd response: success
2,766,773 UART:
2,766,789 UART: Running Caliptra ROM ...
2,767,197 UART:
2,767,252 UART: [state] CFI Enabled
2,770,292 UART: [state] LifecycleState = Unprovisioned
2,770,947 UART: [state] DebugLocked = No
2,771,475 UART: [state] WD Timer not started. Device not locked for debugging
2,772,693 UART: [kat] SHA2-256
3,576,243 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,372 UART: [kat] ++
3,580,524 UART: [kat] sha1
3,584,874 UART: [kat] SHA2-256
3,586,814 UART: [kat] SHA2-384
3,589,431 UART: [kat] SHA2-512-ACC
3,591,331 UART: [kat] ECC-384
3,601,050 UART: [kat] HMAC-384Kdf
3,605,650 UART: [kat] LMS
3,853,962 UART: [kat] --
3,855,008 UART: [update-reset] ++
3,855,319 UART: Failed To Get Mailbox Txn
3,856,286 UART: ROM Non-Fatal Error: 0x01040004
3,856,961 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,857,062 UART: [state] Locking Datavault
3,857,744 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,348 UART: [state] Locking ICCM
3,858,934 UART: [exit] Launching FMC @ 0x40000000
3,864,231 UART:
3,864,247 UART: Running Caliptra FMC ...
3,864,655 UART:
3,864,785 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,865,561 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,586 ready_for_fw is high
1,055,586 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,523,368 >>> mbox cmd response: success
2,580,144 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,586,679 UART:
2,586,695 UART: Running Caliptra FMC ...
2,587,103 UART:
2,587,241 UART: [fmc] Received command: 0x10000004
2,587,978 >>> mbox cmd response: success
3,560,520 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,565,893 UART:
3,565,909 UART: Running Caliptra FMC ...
3,566,317 UART:
3,566,447 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,567,223 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,789 UART: [state] LifecycleState = Unprovisioned
86,444 UART: [state] DebugLocked = No
87,098 UART: [state] WD Timer not started. Device not locked for debugging
88,381 UART: [kat] SHA2-256
891,931 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,060 UART: [kat] ++
896,212 UART: [kat] sha1
900,536 UART: [kat] SHA2-256
902,476 UART: [kat] SHA2-384
905,033 UART: [kat] SHA2-512-ACC
906,934 UART: [kat] ECC-384
916,577 UART: [kat] HMAC-384Kdf
921,173 UART: [kat] LMS
1,169,485 UART: [kat] --
1,170,338 UART: [cold-reset] ++
1,170,856 UART: [fht] FHT @ 0x50003400
1,173,406 UART: [idev] ++
1,173,574 UART: [idev] CDI.KEYID = 6
1,173,935 UART: [idev] SUBJECT.KEYID = 7
1,174,360 UART: [idev] UDS.KEYID = 0
1,174,706 ready_for_fw is high
1,174,706 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,250 UART: [idev] Erasing UDS.KEYID = 0
1,199,484 UART: [idev] Sha1 KeyId Algorithm
1,208,512 UART: [idev] --
1,209,415 UART: [ldev] ++
1,209,583 UART: [ldev] CDI.KEYID = 6
1,209,947 UART: [ldev] SUBJECT.KEYID = 5
1,210,374 UART: [ldev] AUTHORITY.KEYID = 7
1,210,837 UART: [ldev] FE.KEYID = 1
1,215,953 UART: [ldev] Erasing FE.KEYID = 1
1,242,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,171 UART: [ldev] --
1,281,609 UART: [fwproc] Wait for Commands...
1,282,258 UART: [fwproc] Recv command 0x46574c44
1,282,991 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,506 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,589 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,475 >>> mbox cmd response: success
2,675,624 UART: [afmc] ++
2,675,792 UART: [afmc] CDI.KEYID = 6
2,676,155 UART: [afmc] SUBJECT.KEYID = 7
2,676,581 UART: [afmc] AUTHORITY.KEYID = 5
2,712,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,825 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,576 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,296 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,189 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,882 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,715 UART: [afmc] --
2,755,799 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,755,821 UART: [cold-reset] --
2,756,555 UART: [state] Locking Datavault
2,757,518 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,122 UART: [state] Locking ICCM
2,758,786 UART: [exit] Launching FMC @ 0x40000000
2,764,083 UART:
2,764,099 UART: Running Caliptra FMC ...
2,764,507 UART:
2,764,645 UART: [fmc] Received command: 0x10000004
2,765,382 >>> mbox cmd response: success
2,765,478 UART:
2,765,494 UART: Running Caliptra ROM ...
2,765,902 UART:
2,766,044 UART: [state] CFI Enabled
2,768,712 UART: [state] LifecycleState = Unprovisioned
2,769,367 UART: [state] DebugLocked = No
2,769,873 UART: [state] WD Timer not started. Device not locked for debugging
2,771,059 UART: [kat] SHA2-256
3,574,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,738 UART: [kat] ++
3,578,890 UART: [kat] sha1
3,583,276 UART: [kat] SHA2-256
3,585,216 UART: [kat] SHA2-384
3,588,085 UART: [kat] SHA2-512-ACC
3,589,985 UART: [kat] ECC-384
3,599,506 UART: [kat] HMAC-384Kdf
3,604,204 UART: [kat] LMS
3,852,516 UART: [kat] --
3,853,536 UART: [update-reset] ++
3,853,847 UART: Failed To Get Mailbox Txn
3,854,736 UART: ROM Non-Fatal Error: 0x01040004
3,855,411 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,855,620 UART: [state] Locking Datavault
3,856,456 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,060 UART: [state] Locking ICCM
3,857,570 UART: [exit] Launching FMC @ 0x40000000
3,862,867 UART:
3,862,883 UART: Running Caliptra FMC ...
3,863,291 UART:
3,863,421 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,864,197 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,979 ready_for_fw is high
1,055,979 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,522,679 >>> mbox cmd response: success
2,579,223 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,584,850 UART:
2,584,866 UART: Running Caliptra FMC ...
2,585,274 UART:
2,585,412 UART: [fmc] Received command: 0x10000004
2,586,149 >>> mbox cmd response: success
3,558,632 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,564,083 UART:
3,564,099 UART: Running Caliptra FMC ...
3,564,507 UART:
3,564,637 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,565,413 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,312 UART: [kat] SHA2-256
890,862 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,991 UART: [kat] ++
895,143 UART: [kat] sha1
899,239 UART: [kat] SHA2-256
901,179 UART: [kat] SHA2-384
903,818 UART: [kat] SHA2-512-ACC
905,719 UART: [kat] ECC-384
915,370 UART: [kat] HMAC-384Kdf
919,996 UART: [kat] LMS
1,168,308 UART: [kat] --
1,168,927 UART: [cold-reset] ++
1,169,411 UART: [fht] FHT @ 0x50003400
1,171,887 UART: [idev] ++
1,172,055 UART: [idev] CDI.KEYID = 6
1,172,416 UART: [idev] SUBJECT.KEYID = 7
1,172,841 UART: [idev] UDS.KEYID = 0
1,173,187 ready_for_fw is high
1,173,187 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,180,559 UART: [idev] Erasing UDS.KEYID = 0
1,197,447 UART: [idev] Sha1 KeyId Algorithm
1,206,335 UART: [idev] --
1,207,498 UART: [ldev] ++
1,207,666 UART: [ldev] CDI.KEYID = 6
1,208,030 UART: [ldev] SUBJECT.KEYID = 5
1,208,457 UART: [ldev] AUTHORITY.KEYID = 7
1,208,920 UART: [ldev] FE.KEYID = 1
1,214,190 UART: [ldev] Erasing FE.KEYID = 1
1,240,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,478 UART: [ldev] --
1,279,926 UART: [fwproc] Wait for Commands...
1,280,681 UART: [fwproc] Recv command 0x46574c44
1,281,414 UART: [fwproc] Recv'd Img size: 106848 bytes
2,491,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,547 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,630 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,673,474 >>> mbox cmd response: success
2,674,515 UART: [afmc] ++
2,674,683 UART: [afmc] CDI.KEYID = 6
2,675,046 UART: [afmc] SUBJECT.KEYID = 7
2,675,472 UART: [afmc] AUTHORITY.KEYID = 5
2,711,074 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,186 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,937 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,657 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,550 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,243 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,112 UART: [afmc] --
2,753,976 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,753,998 UART: [cold-reset] --
2,754,794 UART: [state] Locking Datavault
2,755,739 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,343 UART: [state] Locking ICCM
2,756,791 UART: [exit] Launching FMC @ 0x40000000
2,762,088 UART:
2,762,104 UART: Running Caliptra FMC ...
2,762,512 UART:
2,762,650 UART: [fmc] Received command: 0x1000000B
2,763,482 UART:
2,763,498 UART: Running Caliptra ROM ...
2,763,906 UART:
2,763,961 UART: [state] CFI Enabled
2,766,571 UART: [state] LifecycleState = Unprovisioned
2,767,226 UART: [state] DebugLocked = No
2,767,822 UART: [state] WD Timer not started. Device not locked for debugging
2,768,968 UART: [kat] SHA2-256
3,572,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,576,647 UART: [kat] ++
3,576,799 UART: [kat] sha1
3,581,003 UART: [kat] SHA2-256
3,582,943 UART: [kat] SHA2-384
3,585,716 UART: [kat] SHA2-512-ACC
3,587,616 UART: [kat] ECC-384
3,597,221 UART: [kat] HMAC-384Kdf
3,601,717 UART: [kat] LMS
3,850,029 UART: [kat] --
3,851,205 UART: [update-reset] ++
3,851,522 UART: Invalid command 0x1000000b recv
3,852,788 UART: ROM Non-Fatal Error: 0x01040003
3,853,656 UART: [state] Locking Datavault
3,854,334 UART: [state] Locking PCR0, PCR1 and PCR31
3,854,938 UART: [state] Locking ICCM
3,855,572 UART: [exit] Launching FMC @ 0x40000000
3,860,869 UART:
3,860,885 UART: Running Caliptra FMC ...
3,861,293 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,092 ready_for_fw is high
1,056,092 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,534 >>> mbox cmd response: success
2,581,582 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,587,723 UART:
2,587,739 UART: Running Caliptra FMC ...
2,588,147 UART:
2,588,285 UART: [fmc] Received command: 0x1000000B
3,566,470 UART:
3,566,486 UART: Running Caliptra FMC ...
3,566,894 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [kat] SHA2-256
891,457 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,586 UART: [kat] ++
895,738 UART: [kat] sha1
899,972 UART: [kat] SHA2-256
901,912 UART: [kat] SHA2-384
904,701 UART: [kat] SHA2-512-ACC
906,602 UART: [kat] ECC-384
916,365 UART: [kat] HMAC-384Kdf
920,955 UART: [kat] LMS
1,169,267 UART: [kat] --
1,170,082 UART: [cold-reset] ++
1,170,496 UART: [fht] FHT @ 0x50003400
1,173,048 UART: [idev] ++
1,173,216 UART: [idev] CDI.KEYID = 6
1,173,577 UART: [idev] SUBJECT.KEYID = 7
1,174,002 UART: [idev] UDS.KEYID = 0
1,174,348 ready_for_fw is high
1,174,348 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,080 UART: [idev] Erasing UDS.KEYID = 0
1,198,950 UART: [idev] Sha1 KeyId Algorithm
1,207,860 UART: [idev] --
1,208,897 UART: [ldev] ++
1,209,065 UART: [ldev] CDI.KEYID = 6
1,209,429 UART: [ldev] SUBJECT.KEYID = 5
1,209,856 UART: [ldev] AUTHORITY.KEYID = 7
1,210,319 UART: [ldev] FE.KEYID = 1
1,215,413 UART: [ldev] Erasing FE.KEYID = 1
1,241,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,493 UART: [ldev] --
1,280,823 UART: [fwproc] Wait for Commands...
1,281,464 UART: [fwproc] Recv command 0x46574c44
1,282,197 UART: [fwproc] Recv'd Img size: 106848 bytes
2,492,696 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,478 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,561 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,499 >>> mbox cmd response: success
2,675,766 UART: [afmc] ++
2,675,934 UART: [afmc] CDI.KEYID = 6
2,676,297 UART: [afmc] SUBJECT.KEYID = 7
2,676,723 UART: [afmc] AUTHORITY.KEYID = 5
2,712,197 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,777 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,528 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,248 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,141 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,834 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,663 UART: [afmc] --
2,755,653 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,755,675 UART: [cold-reset] --
2,756,421 UART: [state] Locking Datavault
2,757,548 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,152 UART: [state] Locking ICCM
2,758,782 UART: [exit] Launching FMC @ 0x40000000
2,764,079 UART:
2,764,095 UART: Running Caliptra FMC ...
2,764,503 UART:
2,764,641 UART: [fmc] Received command: 0x1000000B
2,765,473 UART:
2,765,489 UART: Running Caliptra ROM ...
2,765,897 UART:
2,766,039 UART: [state] CFI Enabled
2,768,589 UART: [state] LifecycleState = Unprovisioned
2,769,244 UART: [state] DebugLocked = No
2,769,914 UART: [state] WD Timer not started. Device not locked for debugging
2,771,154 UART: [kat] SHA2-256
3,574,704 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,833 UART: [kat] ++
3,578,985 UART: [kat] sha1
3,583,369 UART: [kat] SHA2-256
3,585,309 UART: [kat] SHA2-384
3,588,114 UART: [kat] SHA2-512-ACC
3,590,014 UART: [kat] ECC-384
3,600,301 UART: [kat] HMAC-384Kdf
3,604,847 UART: [kat] LMS
3,853,159 UART: [kat] --
3,853,949 UART: [update-reset] ++
3,854,266 UART: Invalid command 0x1000000b recv
3,855,392 UART: ROM Non-Fatal Error: 0x01040003
3,856,380 UART: [state] Locking Datavault
3,857,128 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,732 UART: [state] Locking ICCM
3,858,274 UART: [exit] Launching FMC @ 0x40000000
3,863,571 UART:
3,863,587 UART: Running Caliptra FMC ...
3,863,995 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,135 ready_for_fw is high
1,057,135 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,526,503 >>> mbox cmd response: success
2,582,107 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,588,484 UART:
2,588,500 UART: Running Caliptra FMC ...
2,588,908 UART:
2,589,046 UART: [fmc] Received command: 0x1000000B
3,568,318 UART:
3,568,334 UART: Running Caliptra FMC ...
3,568,742 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
891,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,941 UART: [kat] SHA2-256
901,881 UART: [kat] SHA2-384
904,578 UART: [kat] SHA2-512-ACC
906,479 UART: [kat] ECC-384
916,546 UART: [kat] HMAC-384Kdf
921,290 UART: [kat] LMS
1,169,602 UART: [kat] --
1,170,581 UART: [cold-reset] ++
1,171,105 UART: [fht] FHT @ 0x50003400
1,173,551 UART: [idev] ++
1,173,719 UART: [idev] CDI.KEYID = 6
1,174,080 UART: [idev] SUBJECT.KEYID = 7
1,174,505 UART: [idev] UDS.KEYID = 0
1,174,851 ready_for_fw is high
1,174,851 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,379 UART: [idev] Erasing UDS.KEYID = 0
1,199,509 UART: [idev] Sha1 KeyId Algorithm
1,208,191 UART: [idev] --
1,209,400 UART: [ldev] ++
1,209,568 UART: [ldev] CDI.KEYID = 6
1,209,932 UART: [ldev] SUBJECT.KEYID = 5
1,210,359 UART: [ldev] AUTHORITY.KEYID = 7
1,210,822 UART: [ldev] FE.KEYID = 1
1,216,198 UART: [ldev] Erasing FE.KEYID = 1
1,242,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,382 UART: [ldev] --
1,281,898 UART: [fwproc] Wait for Commands...
1,282,625 UART: [fwproc] Recv command 0x46574c44
1,283,358 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,161 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,244 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,998 >>> mbox cmd response: success
2,676,265 UART: [afmc] ++
2,676,433 UART: [afmc] CDI.KEYID = 6
2,676,796 UART: [afmc] SUBJECT.KEYID = 7
2,677,222 UART: [afmc] AUTHORITY.KEYID = 5
2,713,386 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,570 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,321 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,041 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,934 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,627 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,500 UART: [afmc] --
2,756,484 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,756,506 UART: [cold-reset] --
2,757,304 UART: [state] Locking Datavault
2,758,701 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,305 UART: [state] Locking ICCM
2,759,733 UART: [exit] Launching FMC @ 0x40000000
2,765,030 UART:
2,765,046 UART: Running Caliptra FMC ...
2,765,454 UART:
2,765,592 UART: [fmc] Received command: 0x1000000B
2,766,424 UART:
2,766,440 UART: Running Caliptra ROM ...
2,766,848 UART:
2,766,903 UART: [state] CFI Enabled
2,769,313 UART: [state] LifecycleState = Unprovisioned
2,769,968 UART: [state] DebugLocked = No
2,770,690 UART: [state] WD Timer not started. Device not locked for debugging
2,771,816 UART: [kat] SHA2-256
3,575,366 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,495 UART: [kat] ++
3,579,647 UART: [kat] sha1
3,583,923 UART: [kat] SHA2-256
3,585,863 UART: [kat] SHA2-384
3,588,698 UART: [kat] SHA2-512-ACC
3,590,598 UART: [kat] ECC-384
3,600,641 UART: [kat] HMAC-384Kdf
3,605,217 UART: [kat] LMS
3,853,529 UART: [kat] --
3,854,529 UART: [update-reset] ++
3,854,846 UART: Invalid command 0x1000000b recv
3,856,000 UART: ROM Non-Fatal Error: 0x01040003
3,856,970 UART: [state] Locking Datavault
3,857,584 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,188 UART: [state] Locking ICCM
3,858,662 UART: [exit] Launching FMC @ 0x40000000
3,863,959 UART:
3,863,975 UART: Running Caliptra FMC ...
3,864,383 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,542 ready_for_fw is high
1,056,542 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,638 >>> mbox cmd response: success
2,581,854 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,588,135 UART:
2,588,151 UART: Running Caliptra FMC ...
2,588,559 UART:
2,588,697 UART: [fmc] Received command: 0x1000000B
3,567,540 UART:
3,567,556 UART: Running Caliptra FMC ...
3,567,964 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
891,463 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,592 UART: [kat] ++
895,744 UART: [kat] sha1
900,186 UART: [kat] SHA2-256
902,126 UART: [kat] SHA2-384
904,821 UART: [kat] SHA2-512-ACC
906,722 UART: [kat] ECC-384
915,991 UART: [kat] HMAC-384Kdf
920,685 UART: [kat] LMS
1,168,997 UART: [kat] --
1,169,944 UART: [cold-reset] ++
1,170,500 UART: [fht] FHT @ 0x50003400
1,173,190 UART: [idev] ++
1,173,358 UART: [idev] CDI.KEYID = 6
1,173,719 UART: [idev] SUBJECT.KEYID = 7
1,174,144 UART: [idev] UDS.KEYID = 0
1,174,490 ready_for_fw is high
1,174,490 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,028 UART: [idev] Erasing UDS.KEYID = 0
1,199,674 UART: [idev] Sha1 KeyId Algorithm
1,208,574 UART: [idev] --
1,209,523 UART: [ldev] ++
1,209,691 UART: [ldev] CDI.KEYID = 6
1,210,055 UART: [ldev] SUBJECT.KEYID = 5
1,210,482 UART: [ldev] AUTHORITY.KEYID = 7
1,210,945 UART: [ldev] FE.KEYID = 1
1,216,361 UART: [ldev] Erasing FE.KEYID = 1
1,242,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,863 UART: [ldev] --
1,282,341 UART: [fwproc] Wait for Commands...
1,283,098 UART: [fwproc] Recv command 0x46574c44
1,283,831 UART: [fwproc] Recv'd Img size: 106848 bytes
2,495,760 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,350 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,433 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,677,319 >>> mbox cmd response: success
2,678,556 UART: [afmc] ++
2,678,724 UART: [afmc] CDI.KEYID = 6
2,679,087 UART: [afmc] SUBJECT.KEYID = 7
2,679,513 UART: [afmc] AUTHORITY.KEYID = 5
2,715,561 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,714 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,434 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,327 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,020 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,905 UART: [afmc] --
2,759,013 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,759,035 UART: [cold-reset] --
2,759,791 UART: [state] Locking Datavault
2,760,806 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,410 UART: [state] Locking ICCM
2,761,974 UART: [exit] Launching FMC @ 0x40000000
2,767,271 UART:
2,767,287 UART: Running Caliptra FMC ...
2,767,695 UART:
2,767,833 UART: [fmc] Received command: 0x1000000B
2,768,665 UART:
2,768,681 UART: Running Caliptra ROM ...
2,769,089 UART:
2,769,231 UART: [state] CFI Enabled
2,771,747 UART: [state] LifecycleState = Unprovisioned
2,772,402 UART: [state] DebugLocked = No
2,772,934 UART: [state] WD Timer not started. Device not locked for debugging
2,774,082 UART: [kat] SHA2-256
3,577,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,581,761 UART: [kat] ++
3,581,913 UART: [kat] sha1
3,586,045 UART: [kat] SHA2-256
3,587,985 UART: [kat] SHA2-384
3,590,710 UART: [kat] SHA2-512-ACC
3,592,610 UART: [kat] ECC-384
3,602,357 UART: [kat] HMAC-384Kdf
3,606,857 UART: [kat] LMS
3,855,169 UART: [kat] --
3,856,083 UART: [update-reset] ++
3,856,400 UART: Invalid command 0x1000000b recv
3,857,680 UART: ROM Non-Fatal Error: 0x01040003
3,858,454 UART: [state] Locking Datavault
3,859,322 UART: [state] Locking PCR0, PCR1 and PCR31
3,859,926 UART: [state] Locking ICCM
3,860,536 UART: [exit] Launching FMC @ 0x40000000
3,865,833 UART:
3,865,849 UART: Running Caliptra FMC ...
3,866,257 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,761 ready_for_fw is high
1,056,761 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,529 >>> mbox cmd response: success
2,581,021 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,587,236 UART:
2,587,252 UART: Running Caliptra FMC ...
2,587,660 UART:
2,587,798 UART: [fmc] Received command: 0x1000000B
3,566,888 UART:
3,566,904 UART: Running Caliptra FMC ...
3,567,312 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,237 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
891,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,251 UART: [kat] ++
895,403 UART: [kat] sha1
899,533 UART: [kat] SHA2-256
901,473 UART: [kat] SHA2-384
904,064 UART: [kat] SHA2-512-ACC
905,965 UART: [kat] ECC-384
915,768 UART: [kat] HMAC-384Kdf
920,304 UART: [kat] LMS
1,168,616 UART: [kat] --
1,169,467 UART: [cold-reset] ++
1,170,003 UART: [fht] FHT @ 0x50003400
1,172,669 UART: [idev] ++
1,172,837 UART: [idev] CDI.KEYID = 6
1,173,198 UART: [idev] SUBJECT.KEYID = 7
1,173,623 UART: [idev] UDS.KEYID = 0
1,173,969 ready_for_fw is high
1,173,969 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,671 UART: [idev] Erasing UDS.KEYID = 0
1,198,829 UART: [idev] Sha1 KeyId Algorithm
1,207,717 UART: [idev] --
1,208,990 UART: [ldev] ++
1,209,158 UART: [ldev] CDI.KEYID = 6
1,209,522 UART: [ldev] SUBJECT.KEYID = 5
1,209,949 UART: [ldev] AUTHORITY.KEYID = 7
1,210,412 UART: [ldev] FE.KEYID = 1
1,215,350 UART: [ldev] Erasing FE.KEYID = 1
1,241,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,548 UART: [ldev] --
1,280,952 UART: [fwproc] Wait for Commands...
1,281,769 UART: [fwproc] Recv command 0x46574c44
1,282,502 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,311 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,035 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,118 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,954 >>> mbox cmd response: success
2,676,053 UART: [afmc] ++
2,676,221 UART: [afmc] CDI.KEYID = 6
2,676,584 UART: [afmc] SUBJECT.KEYID = 7
2,677,010 UART: [afmc] AUTHORITY.KEYID = 5
2,712,164 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,340 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,091 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,811 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,704 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,397 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,246 UART: [afmc] --
2,755,104 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,755,126 UART: [cold-reset] --
2,755,972 UART: [state] Locking Datavault
2,757,451 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,055 UART: [state] Locking ICCM
2,758,505 UART: [exit] Launching FMC @ 0x40000000
2,763,802 UART:
2,763,818 UART: Running Caliptra FMC ...
2,764,226 UART:
2,764,364 UART: [fmc] Received command: 0x1000000B
2,765,196 UART:
2,765,212 UART: Running Caliptra ROM ...
2,765,620 UART:
2,765,675 UART: [state] CFI Enabled
2,767,905 UART: [state] LifecycleState = Unprovisioned
2,768,560 UART: [state] DebugLocked = No
2,769,148 UART: [state] WD Timer not started. Device not locked for debugging
2,770,466 UART: [kat] SHA2-256
3,574,016 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,145 UART: [kat] ++
3,578,297 UART: [kat] sha1
3,582,627 UART: [kat] SHA2-256
3,584,567 UART: [kat] SHA2-384
3,587,298 UART: [kat] SHA2-512-ACC
3,589,198 UART: [kat] ECC-384
3,599,135 UART: [kat] HMAC-384Kdf
3,603,643 UART: [kat] LMS
3,851,955 UART: [kat] --
3,852,843 UART: [update-reset] ++
3,853,160 UART: Invalid command 0x1000000b recv
3,854,152 UART: ROM Non-Fatal Error: 0x01040003
3,854,986 UART: [state] Locking Datavault
3,855,590 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,194 UART: [state] Locking ICCM
3,856,786 UART: [exit] Launching FMC @ 0x40000000
3,862,083 UART:
3,862,099 UART: Running Caliptra FMC ...
3,862,507 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,104 ready_for_fw is high
1,056,104 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,622 >>> mbox cmd response: success
2,579,692 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,585,807 UART:
2,585,823 UART: Running Caliptra FMC ...
2,586,231 UART:
2,586,369 UART: [fmc] Received command: 0x1000000B
3,565,176 UART:
3,565,192 UART: Running Caliptra FMC ...
3,565,600 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,835 UART: [state] LifecycleState = Unprovisioned
86,490 UART: [state] DebugLocked = No
87,044 UART: [state] WD Timer not started. Device not locked for debugging
88,225 UART: [kat] SHA2-256
891,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,904 UART: [kat] ++
896,056 UART: [kat] sha1
900,298 UART: [kat] SHA2-256
902,238 UART: [kat] SHA2-384
904,961 UART: [kat] SHA2-512-ACC
906,862 UART: [kat] ECC-384
917,101 UART: [kat] HMAC-384Kdf
921,645 UART: [kat] LMS
1,169,957 UART: [kat] --
1,170,810 UART: [cold-reset] ++
1,171,236 UART: [fht] FHT @ 0x50003400
1,173,958 UART: [idev] ++
1,174,126 UART: [idev] CDI.KEYID = 6
1,174,487 UART: [idev] SUBJECT.KEYID = 7
1,174,912 UART: [idev] UDS.KEYID = 0
1,175,258 ready_for_fw is high
1,175,258 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,182,906 UART: [idev] Erasing UDS.KEYID = 0
1,200,026 UART: [idev] Sha1 KeyId Algorithm
1,208,926 UART: [idev] --
1,209,993 UART: [ldev] ++
1,210,161 UART: [ldev] CDI.KEYID = 6
1,210,525 UART: [ldev] SUBJECT.KEYID = 5
1,210,952 UART: [ldev] AUTHORITY.KEYID = 7
1,211,415 UART: [ldev] FE.KEYID = 1
1,216,545 UART: [ldev] Erasing FE.KEYID = 1
1,242,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,729 UART: [ldev] --
1,282,091 UART: [fwproc] Wait for Commands...
1,282,888 UART: [fwproc] Recv command 0x46574c44
1,283,621 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,370 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,340 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,423 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,277 >>> mbox cmd response: success
2,676,308 UART: [afmc] ++
2,676,476 UART: [afmc] CDI.KEYID = 6
2,676,839 UART: [afmc] SUBJECT.KEYID = 7
2,677,265 UART: [afmc] AUTHORITY.KEYID = 5
2,713,031 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,513 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,264 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,984 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,877 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,570 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,465 UART: [afmc] --
2,756,525 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,756,547 UART: [cold-reset] --
2,757,513 UART: [state] Locking Datavault
2,758,576 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,180 UART: [state] Locking ICCM
2,759,740 UART: [exit] Launching FMC @ 0x40000000
2,765,037 UART:
2,765,053 UART: Running Caliptra FMC ...
2,765,461 UART:
2,765,599 UART: [fmc] Received command: 0x1000000B
2,766,431 UART:
2,766,447 UART: Running Caliptra ROM ...
2,766,855 UART:
2,766,997 UART: [state] CFI Enabled
2,769,459 UART: [state] LifecycleState = Unprovisioned
2,770,114 UART: [state] DebugLocked = No
2,770,794 UART: [state] WD Timer not started. Device not locked for debugging
2,772,082 UART: [kat] SHA2-256
3,575,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,761 UART: [kat] ++
3,579,913 UART: [kat] sha1
3,584,131 UART: [kat] SHA2-256
3,586,071 UART: [kat] SHA2-384
3,588,954 UART: [kat] SHA2-512-ACC
3,590,854 UART: [kat] ECC-384
3,600,587 UART: [kat] HMAC-384Kdf
3,605,277 UART: [kat] LMS
3,853,589 UART: [kat] --
3,854,117 UART: [update-reset] ++
3,854,434 UART: Invalid command 0x1000000b recv
3,855,492 UART: ROM Non-Fatal Error: 0x01040003
3,856,248 UART: [state] Locking Datavault
3,857,068 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,672 UART: [state] Locking ICCM
3,858,212 UART: [exit] Launching FMC @ 0x40000000
3,863,509 UART:
3,863,525 UART: Running Caliptra FMC ...
3,863,933 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,743 ready_for_fw is high
1,056,743 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,203 >>> mbox cmd response: success
2,581,349 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,587,666 UART:
2,587,682 UART: Running Caliptra FMC ...
2,588,090 UART:
2,588,228 UART: [fmc] Received command: 0x1000000B
3,566,354 UART:
3,566,370 UART: Running Caliptra FMC ...
3,566,778 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,799 UART: [kat] SHA2-256
901,739 UART: [kat] SHA2-384
904,626 UART: [kat] SHA2-512-ACC
906,527 UART: [kat] ECC-384
916,084 UART: [kat] HMAC-384Kdf
920,674 UART: [kat] LMS
1,168,986 UART: [kat] --
1,170,077 UART: [cold-reset] ++
1,170,447 UART: [fht] FHT @ 0x50003400
1,173,125 UART: [idev] ++
1,173,293 UART: [idev] CDI.KEYID = 6
1,173,654 UART: [idev] SUBJECT.KEYID = 7
1,174,079 UART: [idev] UDS.KEYID = 0
1,174,425 ready_for_fw is high
1,174,425 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,069 UART: [idev] Erasing UDS.KEYID = 0
1,199,411 UART: [idev] Sha1 KeyId Algorithm
1,208,137 UART: [idev] --
1,209,158 UART: [ldev] ++
1,209,326 UART: [ldev] CDI.KEYID = 6
1,209,690 UART: [ldev] SUBJECT.KEYID = 5
1,210,117 UART: [ldev] AUTHORITY.KEYID = 7
1,210,580 UART: [ldev] FE.KEYID = 1
1,215,874 UART: [ldev] Erasing FE.KEYID = 1
1,242,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,716 UART: [ldev] --
1,281,174 UART: [fwproc] Wait for Commands...
1,281,993 UART: [fwproc] Recv command 0x46574c44
1,282,726 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,586 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,914 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,461 >>> mbox cmd response: success
2,741,562 UART: [afmc] ++
2,741,730 UART: [afmc] CDI.KEYID = 6
2,742,093 UART: [afmc] SUBJECT.KEYID = 7
2,742,519 UART: [afmc] AUTHORITY.KEYID = 5
2,777,688 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,074 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,825 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,521 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,420 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,113 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,051 UART: [afmc] --
2,820,913 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,820,935 UART: [cold-reset] --
2,822,005 UART: [state] Locking Datavault
2,823,176 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,780 UART: [state] Locking ICCM
2,824,296 UART: [exit] Launching FMC @ 0x40000000
2,829,593 UART:
2,829,609 UART: Running Caliptra FMC ...
2,830,017 UART:
2,830,247 UART: [fmc] Received command: 0x46574C44
2,831,073 UART:
2,831,089 UART: Running Caliptra ROM ...
2,831,497 UART:
2,831,552 UART: [state] CFI Enabled
2,834,344 UART: [state] LifecycleState = Unprovisioned
2,834,999 UART: [state] DebugLocked = No
2,835,697 UART: [state] WD Timer not started. Device not locked for debugging
2,836,913 UART: [kat] SHA2-256
3,640,463 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,592 UART: [kat] ++
3,644,744 UART: [kat] sha1
3,648,888 UART: [kat] SHA2-256
3,650,828 UART: [kat] SHA2-384
3,653,621 UART: [kat] SHA2-512-ACC
3,655,521 UART: [kat] ECC-384
3,665,150 UART: [kat] HMAC-384Kdf
3,669,858 UART: [kat] LMS
3,918,170 UART: [kat] --
3,919,198 UART: [update-reset] ++
5,202,597 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,203,596 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,351,608 >>> mbox cmd response: success
5,351,937 UART: [update-reset] Copying MAN_2 To MAN_1
5,359,951 UART: [update-reset Success] --
5,360,360 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,361,082 UART: [state] Locking Datavault
5,361,872 UART: [state] Locking PCR0, PCR1 and PCR31
5,362,476 UART: [state] Locking ICCM
5,363,108 UART: [exit] Launching FMC @ 0x40000000
5,368,405 UART:
5,368,421 UART: Running Caliptra FMC ...
5,368,829 UART:
5,369,051 UART: [fmc] Received command: 0x1000000C
5,369,786 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,338 ready_for_fw is high
1,055,338 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,695 >>> mbox cmd response: success
2,645,358 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,651,379 UART:
2,651,395 UART: Running Caliptra FMC ...
2,651,803 UART:
2,652,033 UART: [fmc] Received command: 0x46574C44
5,055,759 >>> mbox cmd response: success
5,063,319 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,069,215 UART:
5,069,231 UART: Running Caliptra FMC ...
5,069,639 UART:
5,069,861 UART: [fmc] Received command: 0x1000000C
5,070,596 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,574 UART: [kat] ++
895,726 UART: [kat] sha1
899,976 UART: [kat] SHA2-256
901,916 UART: [kat] SHA2-384
904,631 UART: [kat] SHA2-512-ACC
906,532 UART: [kat] ECC-384
916,347 UART: [kat] HMAC-384Kdf
921,185 UART: [kat] LMS
1,169,497 UART: [kat] --
1,170,274 UART: [cold-reset] ++
1,170,628 UART: [fht] FHT @ 0x50003400
1,173,264 UART: [idev] ++
1,173,432 UART: [idev] CDI.KEYID = 6
1,173,793 UART: [idev] SUBJECT.KEYID = 7
1,174,218 UART: [idev] UDS.KEYID = 0
1,174,564 ready_for_fw is high
1,174,564 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,378 UART: [idev] Erasing UDS.KEYID = 0
1,199,504 UART: [idev] Sha1 KeyId Algorithm
1,208,398 UART: [idev] --
1,209,301 UART: [ldev] ++
1,209,469 UART: [ldev] CDI.KEYID = 6
1,209,833 UART: [ldev] SUBJECT.KEYID = 5
1,210,260 UART: [ldev] AUTHORITY.KEYID = 7
1,210,723 UART: [ldev] FE.KEYID = 1
1,215,967 UART: [ldev] Erasing FE.KEYID = 1
1,242,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,481 UART: [ldev] --
1,281,907 UART: [fwproc] Wait for Commands...
1,282,566 UART: [fwproc] Recv command 0x46574c44
1,283,299 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,471 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,156 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,852 >>> mbox cmd response: success
2,742,107 UART: [afmc] ++
2,742,275 UART: [afmc] CDI.KEYID = 6
2,742,638 UART: [afmc] SUBJECT.KEYID = 7
2,743,064 UART: [afmc] AUTHORITY.KEYID = 5
2,779,009 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,493 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,244 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,940 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,839 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,532 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,482 UART: [afmc] --
2,822,490 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,822,512 UART: [cold-reset] --
2,823,354 UART: [state] Locking Datavault
2,824,529 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,133 UART: [state] Locking ICCM
2,825,731 UART: [exit] Launching FMC @ 0x40000000
2,831,028 UART:
2,831,044 UART: Running Caliptra FMC ...
2,831,452 UART:
2,831,682 UART: [fmc] Received command: 0x46574C44
2,832,508 UART:
2,832,524 UART: Running Caliptra ROM ...
2,832,932 UART:
2,833,074 UART: [state] CFI Enabled
2,835,582 UART: [state] LifecycleState = Unprovisioned
2,836,237 UART: [state] DebugLocked = No
2,836,825 UART: [state] WD Timer not started. Device not locked for debugging
2,838,021 UART: [kat] SHA2-256
3,641,571 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,700 UART: [kat] ++
3,645,852 UART: [kat] sha1
3,649,996 UART: [kat] SHA2-256
3,651,936 UART: [kat] SHA2-384
3,654,827 UART: [kat] SHA2-512-ACC
3,656,727 UART: [kat] ECC-384
3,666,752 UART: [kat] HMAC-384Kdf
3,671,326 UART: [kat] LMS
3,919,638 UART: [kat] --
3,920,608 UART: [update-reset] ++
5,205,229 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,206,188 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,354,200 >>> mbox cmd response: success
5,354,377 UART: [update-reset] Copying MAN_2 To MAN_1
5,362,391 UART: [update-reset Success] --
5,362,800 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,363,446 UART: [state] Locking Datavault
5,364,296 UART: [state] Locking PCR0, PCR1 and PCR31
5,364,900 UART: [state] Locking ICCM
5,365,348 UART: [exit] Launching FMC @ 0x40000000
5,370,645 UART:
5,370,661 UART: Running Caliptra FMC ...
5,371,069 UART:
5,371,291 UART: [fmc] Received command: 0x1000000C
5,372,026 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,537 ready_for_fw is high
1,056,537 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,558 >>> mbox cmd response: success
2,647,453 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,653,692 UART:
2,653,708 UART: Running Caliptra FMC ...
2,654,116 UART:
2,654,346 UART: [fmc] Received command: 0x46574C44
5,056,975 >>> mbox cmd response: success
5,064,647 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,070,339 UART:
5,070,355 UART: Running Caliptra FMC ...
5,070,763 UART:
5,070,985 UART: [fmc] Received command: 0x1000000C
5,071,720 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,439 UART: [state] WD Timer not started. Device not locked for debugging
87,788 UART: [kat] SHA2-256
891,338 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,467 UART: [kat] ++
895,619 UART: [kat] sha1
899,839 UART: [kat] SHA2-256
901,779 UART: [kat] SHA2-384
904,606 UART: [kat] SHA2-512-ACC
906,507 UART: [kat] ECC-384
916,358 UART: [kat] HMAC-384Kdf
920,974 UART: [kat] LMS
1,169,286 UART: [kat] --
1,170,201 UART: [cold-reset] ++
1,170,779 UART: [fht] FHT @ 0x50003400
1,173,561 UART: [idev] ++
1,173,729 UART: [idev] CDI.KEYID = 6
1,174,090 UART: [idev] SUBJECT.KEYID = 7
1,174,515 UART: [idev] UDS.KEYID = 0
1,174,861 ready_for_fw is high
1,174,861 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,735 UART: [idev] Erasing UDS.KEYID = 0
1,199,555 UART: [idev] Sha1 KeyId Algorithm
1,208,625 UART: [idev] --
1,209,786 UART: [ldev] ++
1,209,954 UART: [ldev] CDI.KEYID = 6
1,210,318 UART: [ldev] SUBJECT.KEYID = 5
1,210,745 UART: [ldev] AUTHORITY.KEYID = 7
1,211,208 UART: [ldev] FE.KEYID = 1
1,216,310 UART: [ldev] Erasing FE.KEYID = 1
1,242,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,146 UART: [ldev] --
1,281,444 UART: [fwproc] Wait for Commands...
1,282,087 UART: [fwproc] Recv command 0x46574c44
1,282,820 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,196 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,881 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,815 >>> mbox cmd response: success
2,742,910 UART: [afmc] ++
2,743,078 UART: [afmc] CDI.KEYID = 6
2,743,441 UART: [afmc] SUBJECT.KEYID = 7
2,743,867 UART: [afmc] AUTHORITY.KEYID = 5
2,778,948 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,428 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,179 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,875 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,774 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,467 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,503 UART: [afmc] --
2,822,465 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,822,487 UART: [cold-reset] --
2,823,455 UART: [state] Locking Datavault
2,824,704 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,308 UART: [state] Locking ICCM
2,825,820 UART: [exit] Launching FMC @ 0x40000000
2,831,117 UART:
2,831,133 UART: Running Caliptra FMC ...
2,831,541 UART:
2,831,771 UART: [fmc] Received command: 0x46574C44
2,832,597 UART:
2,832,613 UART: Running Caliptra ROM ...
2,833,021 UART:
2,833,076 UART: [state] CFI Enabled
2,835,668 UART: [state] LifecycleState = Unprovisioned
2,836,323 UART: [state] DebugLocked = No
2,836,833 UART: [state] WD Timer not started. Device not locked for debugging
2,837,949 UART: [kat] SHA2-256
3,641,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,628 UART: [kat] ++
3,645,780 UART: [kat] sha1
3,649,932 UART: [kat] SHA2-256
3,651,872 UART: [kat] SHA2-384
3,654,457 UART: [kat] SHA2-512-ACC
3,656,357 UART: [kat] ECC-384
3,665,858 UART: [kat] HMAC-384Kdf
3,670,438 UART: [kat] LMS
3,918,750 UART: [kat] --
3,919,808 UART: [update-reset] ++
5,204,613 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,205,722 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,353,734 >>> mbox cmd response: success
5,354,017 UART: [update-reset] Copying MAN_2 To MAN_1
5,362,031 UART: [update-reset Success] --
5,362,440 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,362,830 UART: [state] Locking Datavault
5,363,606 UART: [state] Locking PCR0, PCR1 and PCR31
5,364,210 UART: [state] Locking ICCM
5,364,688 UART: [exit] Launching FMC @ 0x40000000
5,369,985 UART:
5,370,001 UART: Running Caliptra FMC ...
5,370,409 UART:
5,370,631 UART: [fmc] Received command: 0x1000000C
5,371,366 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,466 ready_for_fw is high
1,055,466 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,687 >>> mbox cmd response: success
2,646,780 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,652,593 UART:
2,652,609 UART: Running Caliptra FMC ...
2,653,017 UART:
2,653,247 UART: [fmc] Received command: 0x46574C44
5,055,333 >>> mbox cmd response: success
5,062,975 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,068,817 UART:
5,068,833 UART: Running Caliptra FMC ...
5,069,241 UART:
5,069,463 UART: [fmc] Received command: 0x1000000C
5,070,198 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,508 UART: [kat] ++
895,660 UART: [kat] sha1
899,672 UART: [kat] SHA2-256
901,612 UART: [kat] SHA2-384
904,363 UART: [kat] SHA2-512-ACC
906,264 UART: [kat] ECC-384
915,857 UART: [kat] HMAC-384Kdf
920,525 UART: [kat] LMS
1,168,837 UART: [kat] --
1,169,784 UART: [cold-reset] ++
1,170,320 UART: [fht] FHT @ 0x50003400
1,172,988 UART: [idev] ++
1,173,156 UART: [idev] CDI.KEYID = 6
1,173,517 UART: [idev] SUBJECT.KEYID = 7
1,173,942 UART: [idev] UDS.KEYID = 0
1,174,288 ready_for_fw is high
1,174,288 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,176 UART: [idev] Erasing UDS.KEYID = 0
1,199,154 UART: [idev] Sha1 KeyId Algorithm
1,207,808 UART: [idev] --
1,209,025 UART: [ldev] ++
1,209,193 UART: [ldev] CDI.KEYID = 6
1,209,557 UART: [ldev] SUBJECT.KEYID = 5
1,209,984 UART: [ldev] AUTHORITY.KEYID = 7
1,210,447 UART: [ldev] FE.KEYID = 1
1,215,959 UART: [ldev] Erasing FE.KEYID = 1
1,242,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,525 UART: [ldev] --
1,281,803 UART: [fwproc] Wait for Commands...
1,282,540 UART: [fwproc] Recv command 0x46574c44
1,283,273 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,995 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,680 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,742,448 >>> mbox cmd response: success
2,743,543 UART: [afmc] ++
2,743,711 UART: [afmc] CDI.KEYID = 6
2,744,074 UART: [afmc] SUBJECT.KEYID = 7
2,744,500 UART: [afmc] AUTHORITY.KEYID = 5
2,781,317 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,615 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,366 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,804,062 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,961 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,654 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,478 UART: [afmc] --
2,824,340 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,824,362 UART: [cold-reset] --
2,825,290 UART: [state] Locking Datavault
2,826,591 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,195 UART: [state] Locking ICCM
2,827,659 UART: [exit] Launching FMC @ 0x40000000
2,832,956 UART:
2,832,972 UART: Running Caliptra FMC ...
2,833,380 UART:
2,833,610 UART: [fmc] Received command: 0x46574C44
2,834,436 UART:
2,834,452 UART: Running Caliptra ROM ...
2,834,860 UART:
2,835,002 UART: [state] CFI Enabled
2,837,902 UART: [state] LifecycleState = Unprovisioned
2,838,557 UART: [state] DebugLocked = No
2,839,277 UART: [state] WD Timer not started. Device not locked for debugging
2,840,399 UART: [kat] SHA2-256
3,643,949 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,648,078 UART: [kat] ++
3,648,230 UART: [kat] sha1
3,652,310 UART: [kat] SHA2-256
3,654,250 UART: [kat] SHA2-384
3,656,857 UART: [kat] SHA2-512-ACC
3,658,757 UART: [kat] ECC-384
3,668,888 UART: [kat] HMAC-384Kdf
3,673,636 UART: [kat] LMS
3,921,948 UART: [kat] --
3,923,120 UART: [update-reset] ++
5,207,951 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,208,978 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,356,990 >>> mbox cmd response: success
5,357,163 UART: [update-reset] Copying MAN_2 To MAN_1
5,365,177 UART: [update-reset Success] --
5,365,586 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,366,134 UART: [state] Locking Datavault
5,367,014 UART: [state] Locking PCR0, PCR1 and PCR31
5,367,618 UART: [state] Locking ICCM
5,368,208 UART: [exit] Launching FMC @ 0x40000000
5,373,505 UART:
5,373,521 UART: Running Caliptra FMC ...
5,373,929 UART:
5,374,151 UART: [fmc] Received command: 0x1000000C
5,374,886 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,919 ready_for_fw is high
1,055,919 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,798 >>> mbox cmd response: success
2,645,579 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,651,388 UART:
2,651,404 UART: Running Caliptra FMC ...
2,651,812 UART:
2,652,042 UART: [fmc] Received command: 0x46574C44
5,056,353 >>> mbox cmd response: success
5,063,957 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,069,909 UART:
5,069,925 UART: Running Caliptra FMC ...
5,070,333 UART:
5,070,555 UART: [fmc] Received command: 0x1000000C
5,071,290 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,784 UART: [kat] SHA2-256
891,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,463 UART: [kat] ++
895,615 UART: [kat] sha1
899,727 UART: [kat] SHA2-256
901,667 UART: [kat] SHA2-384
904,544 UART: [kat] SHA2-512-ACC
906,445 UART: [kat] ECC-384
916,176 UART: [kat] HMAC-384Kdf
920,704 UART: [kat] LMS
1,169,016 UART: [kat] --
1,169,759 UART: [cold-reset] ++
1,170,177 UART: [fht] FHT @ 0x50003400
1,172,785 UART: [idev] ++
1,172,953 UART: [idev] CDI.KEYID = 6
1,173,314 UART: [idev] SUBJECT.KEYID = 7
1,173,739 UART: [idev] UDS.KEYID = 0
1,174,085 ready_for_fw is high
1,174,085 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,789 UART: [idev] Erasing UDS.KEYID = 0
1,198,711 UART: [idev] Sha1 KeyId Algorithm
1,207,529 UART: [idev] --
1,208,522 UART: [ldev] ++
1,208,690 UART: [ldev] CDI.KEYID = 6
1,209,054 UART: [ldev] SUBJECT.KEYID = 5
1,209,481 UART: [ldev] AUTHORITY.KEYID = 7
1,209,944 UART: [ldev] FE.KEYID = 1
1,215,114 UART: [ldev] Erasing FE.KEYID = 1
1,241,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,062 UART: [ldev] --
1,280,430 UART: [fwproc] Wait for Commands...
1,281,245 UART: [fwproc] Recv command 0x46574c44
1,281,978 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,916 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,601 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,319 >>> mbox cmd response: success
2,741,554 UART: [afmc] ++
2,741,722 UART: [afmc] CDI.KEYID = 6
2,742,085 UART: [afmc] SUBJECT.KEYID = 7
2,742,511 UART: [afmc] AUTHORITY.KEYID = 5
2,777,490 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,836 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,587 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,283 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,182 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,875 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,721 UART: [afmc] --
2,820,653 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,820,675 UART: [cold-reset] --
2,821,625 UART: [state] Locking Datavault
2,822,856 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,460 UART: [state] Locking ICCM
2,824,082 UART: [exit] Launching FMC @ 0x40000000
2,829,379 UART:
2,829,395 UART: Running Caliptra FMC ...
2,829,803 UART:
2,830,033 UART: [fmc] Received command: 0x46574C44
2,830,859 UART:
2,830,875 UART: Running Caliptra ROM ...
2,831,283 UART:
2,831,338 UART: [state] CFI Enabled
2,834,014 UART: [state] LifecycleState = Unprovisioned
2,834,669 UART: [state] DebugLocked = No
2,835,401 UART: [state] WD Timer not started. Device not locked for debugging
2,836,755 UART: [kat] SHA2-256
3,640,305 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,434 UART: [kat] ++
3,644,586 UART: [kat] sha1
3,648,742 UART: [kat] SHA2-256
3,650,682 UART: [kat] SHA2-384
3,653,507 UART: [kat] SHA2-512-ACC
3,655,407 UART: [kat] ECC-384
3,665,318 UART: [kat] HMAC-384Kdf
3,670,008 UART: [kat] LMS
3,918,320 UART: [kat] --
3,918,902 UART: [update-reset] ++
5,201,909 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,202,898 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,350,910 >>> mbox cmd response: success
5,351,131 UART: [update-reset] Copying MAN_2 To MAN_1
5,359,145 UART: [update-reset Success] --
5,359,554 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,360,420 UART: [state] Locking Datavault
5,361,234 UART: [state] Locking PCR0, PCR1 and PCR31
5,361,838 UART: [state] Locking ICCM
5,362,330 UART: [exit] Launching FMC @ 0x40000000
5,367,627 UART:
5,367,643 UART: Running Caliptra FMC ...
5,368,051 UART:
5,368,273 UART: [fmc] Received command: 0x1000000C
5,369,008 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,528 ready_for_fw is high
1,055,528 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,543 >>> mbox cmd response: success
2,646,912 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,653,013 UART:
2,653,029 UART: Running Caliptra FMC ...
2,653,437 UART:
2,653,667 UART: [fmc] Received command: 0x46574C44
5,056,597 >>> mbox cmd response: success
5,064,283 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,070,217 UART:
5,070,233 UART: Running Caliptra FMC ...
5,070,641 UART:
5,070,863 UART: [fmc] Received command: 0x1000000C
5,071,598 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,508 UART: [kat] ++
895,660 UART: [kat] sha1
899,926 UART: [kat] SHA2-256
901,866 UART: [kat] SHA2-384
904,547 UART: [kat] SHA2-512-ACC
906,448 UART: [kat] ECC-384
916,055 UART: [kat] HMAC-384Kdf
920,703 UART: [kat] LMS
1,169,015 UART: [kat] --
1,169,958 UART: [cold-reset] ++
1,170,308 UART: [fht] FHT @ 0x50003400
1,172,996 UART: [idev] ++
1,173,164 UART: [idev] CDI.KEYID = 6
1,173,525 UART: [idev] SUBJECT.KEYID = 7
1,173,950 UART: [idev] UDS.KEYID = 0
1,174,296 ready_for_fw is high
1,174,296 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,922 UART: [idev] Erasing UDS.KEYID = 0
1,198,402 UART: [idev] Sha1 KeyId Algorithm
1,207,120 UART: [idev] --
1,208,207 UART: [ldev] ++
1,208,375 UART: [ldev] CDI.KEYID = 6
1,208,739 UART: [ldev] SUBJECT.KEYID = 5
1,209,166 UART: [ldev] AUTHORITY.KEYID = 7
1,209,629 UART: [ldev] FE.KEYID = 1
1,215,063 UART: [ldev] Erasing FE.KEYID = 1
1,241,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,713 UART: [ldev] --
1,281,173 UART: [fwproc] Wait for Commands...
1,281,806 UART: [fwproc] Recv command 0x46574c44
1,282,539 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,677 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,362 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,246 >>> mbox cmd response: success
2,742,511 UART: [afmc] ++
2,742,679 UART: [afmc] CDI.KEYID = 6
2,743,042 UART: [afmc] SUBJECT.KEYID = 7
2,743,468 UART: [afmc] AUTHORITY.KEYID = 5
2,779,049 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,383 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,134 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,830 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,729 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,422 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,124 UART: [afmc] --
2,821,998 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,822,020 UART: [cold-reset] --
2,822,688 UART: [state] Locking Datavault
2,823,839 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,443 UART: [state] Locking ICCM
2,824,933 UART: [exit] Launching FMC @ 0x40000000
2,830,230 UART:
2,830,246 UART: Running Caliptra FMC ...
2,830,654 UART:
2,830,884 UART: [fmc] Received command: 0x46574C44
2,831,710 UART:
2,831,726 UART: Running Caliptra ROM ...
2,832,134 UART:
2,832,276 UART: [state] CFI Enabled
2,835,514 UART: [state] LifecycleState = Unprovisioned
2,836,169 UART: [state] DebugLocked = No
2,836,761 UART: [state] WD Timer not started. Device not locked for debugging
2,838,103 UART: [kat] SHA2-256
3,641,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,782 UART: [kat] ++
3,645,934 UART: [kat] sha1
3,650,092 UART: [kat] SHA2-256
3,652,032 UART: [kat] SHA2-384
3,654,605 UART: [kat] SHA2-512-ACC
3,656,505 UART: [kat] ECC-384
3,666,462 UART: [kat] HMAC-384Kdf
3,671,304 UART: [kat] LMS
3,919,616 UART: [kat] --
3,920,332 UART: [update-reset] ++
5,205,505 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,206,630 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,354,642 >>> mbox cmd response: success
5,354,997 UART: [update-reset] Copying MAN_2 To MAN_1
5,363,011 UART: [update-reset Success] --
5,363,420 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,363,924 UART: [state] Locking Datavault
5,364,852 UART: [state] Locking PCR0, PCR1 and PCR31
5,365,456 UART: [state] Locking ICCM
5,366,108 UART: [exit] Launching FMC @ 0x40000000
5,371,405 UART:
5,371,421 UART: Running Caliptra FMC ...
5,371,829 UART:
5,372,051 UART: [fmc] Received command: 0x1000000C
5,372,786 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,767 ready_for_fw is high
1,056,767 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,462 >>> mbox cmd response: success
2,647,337 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,653,906 UART:
2,653,922 UART: Running Caliptra FMC ...
2,654,330 UART:
2,654,560 UART: [fmc] Received command: 0x46574C44
5,059,261 >>> mbox cmd response: success
5,066,871 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,072,693 UART:
5,072,709 UART: Running Caliptra FMC ...
5,073,117 UART:
5,073,339 UART: [fmc] Received command: 0x1000000C
5,074,074 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,771 UART: [state] WD Timer not started. Device not locked for debugging
87,906 UART: [kat] SHA2-256
891,456 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,585 UART: [kat] ++
895,737 UART: [kat] sha1
899,747 UART: [kat] SHA2-256
901,687 UART: [kat] SHA2-384
904,308 UART: [kat] SHA2-512-ACC
906,209 UART: [kat] ECC-384
915,956 UART: [kat] HMAC-384Kdf
920,480 UART: [kat] LMS
1,168,792 UART: [kat] --
1,169,953 UART: [cold-reset] ++
1,170,301 UART: [fht] FHT @ 0x50003400
1,172,969 UART: [idev] ++
1,173,137 UART: [idev] CDI.KEYID = 6
1,173,498 UART: [idev] SUBJECT.KEYID = 7
1,173,923 UART: [idev] UDS.KEYID = 0
1,174,269 ready_for_fw is high
1,174,269 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,869 UART: [idev] Erasing UDS.KEYID = 0
1,199,159 UART: [idev] Sha1 KeyId Algorithm
1,208,207 UART: [idev] --
1,209,284 UART: [ldev] ++
1,209,452 UART: [ldev] CDI.KEYID = 6
1,209,816 UART: [ldev] SUBJECT.KEYID = 5
1,210,243 UART: [ldev] AUTHORITY.KEYID = 7
1,210,706 UART: [ldev] FE.KEYID = 1
1,216,016 UART: [ldev] Erasing FE.KEYID = 1
1,242,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,490 UART: [ldev] --
1,281,964 UART: [fwproc] Wait for Commands...
1,282,677 UART: [fwproc] Recv command 0x46574c44
1,283,410 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,541 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,579,857 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,542 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,320 >>> mbox cmd response: success
2,742,543 UART: [afmc] ++
2,742,711 UART: [afmc] CDI.KEYID = 6
2,743,074 UART: [afmc] SUBJECT.KEYID = 7
2,743,500 UART: [afmc] AUTHORITY.KEYID = 5
2,779,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,378 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,802,093 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,807,985 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,813,697 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,821,542 UART: [afmc] --
2,822,582 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,822,604 UART: [cold-reset] --
2,823,470 UART: [state] Locking Datavault
2,824,507 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,111 UART: [state] Locking ICCM
2,825,681 UART: [exit] Launching FMC @ 0x40000000
2,830,978 UART:
2,830,994 UART: Running Caliptra FMC ...
2,831,402 UART:
2,831,632 UART: [fmc] Received command: 0x46574C44
2,832,458 UART:
2,832,474 UART: Running Caliptra ROM ...
2,832,882 UART:
2,832,937 UART: [state] CFI Enabled
2,835,433 UART: [state] LifecycleState = Unprovisioned
2,836,088 UART: [state] DebugLocked = No
2,836,662 UART: [state] WD Timer not started. Device not locked for debugging
2,837,888 UART: [kat] SHA2-256
3,641,438 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,567 UART: [kat] ++
3,645,719 UART: [kat] sha1
3,650,011 UART: [kat] SHA2-256
3,651,951 UART: [kat] SHA2-384
3,654,902 UART: [kat] SHA2-512-ACC
3,656,802 UART: [kat] ECC-384
3,666,687 UART: [kat] HMAC-384Kdf
3,671,267 UART: [kat] LMS
3,919,579 UART: [kat] --
3,920,779 UART: [update-reset] ++
3,937,557 >>> mbox cmd response: failed
3,937,557 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,938,093 UART: ROM Non-Fatal Error: 0x000B001E
3,938,861 UART: [state] Locking Datavault
3,939,561 UART: [state] Locking PCR0, PCR1 and PCR31
3,940,165 UART: [state] Locking ICCM
3,940,601 UART: [exit] Launching FMC @ 0x40000000
3,945,898 UART:
3,945,914 UART: Running Caliptra FMC ...
3,946,322 UART:
3,946,544 UART: [fmc] Received command: 0x1000000C
3,947,279 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,106 ready_for_fw is high
1,056,106 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,058 >>> mbox cmd response: success
2,645,967 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,652,018 UART:
2,652,034 UART: Running Caliptra FMC ...
2,652,442 UART:
2,652,672 UART: [fmc] Received command: 0x46574C44
3,641,905 >>> mbox cmd response: failed
3,641,905 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,647,892 UART:
3,647,908 UART: Running Caliptra FMC ...
3,648,316 UART:
3,648,538 UART: [fmc] Received command: 0x1000000C
3,649,273 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,638 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
891,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,596 UART: [kat] ++
895,748 UART: [kat] sha1
899,856 UART: [kat] SHA2-256
901,796 UART: [kat] SHA2-384
904,467 UART: [kat] SHA2-512-ACC
906,368 UART: [kat] ECC-384
916,265 UART: [kat] HMAC-384Kdf
920,855 UART: [kat] LMS
1,169,167 UART: [kat] --
1,170,044 UART: [cold-reset] ++
1,170,604 UART: [fht] FHT @ 0x50003400
1,173,210 UART: [idev] ++
1,173,378 UART: [idev] CDI.KEYID = 6
1,173,739 UART: [idev] SUBJECT.KEYID = 7
1,174,164 UART: [idev] UDS.KEYID = 0
1,174,510 ready_for_fw is high
1,174,510 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,226 UART: [idev] Erasing UDS.KEYID = 0
1,198,534 UART: [idev] Sha1 KeyId Algorithm
1,207,336 UART: [idev] --
1,208,479 UART: [ldev] ++
1,208,647 UART: [ldev] CDI.KEYID = 6
1,209,011 UART: [ldev] SUBJECT.KEYID = 5
1,209,438 UART: [ldev] AUTHORITY.KEYID = 7
1,209,901 UART: [ldev] FE.KEYID = 1
1,215,295 UART: [ldev] Erasing FE.KEYID = 1
1,242,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,313 UART: [ldev] --
1,281,625 UART: [fwproc] Wait for Commands...
1,282,372 UART: [fwproc] Recv command 0x46574c44
1,283,105 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,580,720 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,405 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,742,311 >>> mbox cmd response: success
2,743,526 UART: [afmc] ++
2,743,694 UART: [afmc] CDI.KEYID = 6
2,744,057 UART: [afmc] SUBJECT.KEYID = 7
2,744,483 UART: [afmc] AUTHORITY.KEYID = 5
2,779,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,114 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,865 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,802,580 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,808,472 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,814,184 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,822,025 UART: [afmc] --
2,822,947 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,822,969 UART: [cold-reset] --
2,823,511 UART: [state] Locking Datavault
2,824,718 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,322 UART: [state] Locking ICCM
2,825,792 UART: [exit] Launching FMC @ 0x40000000
2,831,089 UART:
2,831,105 UART: Running Caliptra FMC ...
2,831,513 UART:
2,831,743 UART: [fmc] Received command: 0x46574C44
2,832,569 UART:
2,832,585 UART: Running Caliptra ROM ...
2,832,993 UART:
2,833,135 UART: [state] CFI Enabled
2,836,245 UART: [state] LifecycleState = Unprovisioned
2,836,900 UART: [state] DebugLocked = No
2,837,522 UART: [state] WD Timer not started. Device not locked for debugging
2,838,744 UART: [kat] SHA2-256
3,642,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,423 UART: [kat] ++
3,646,575 UART: [kat] sha1
3,650,921 UART: [kat] SHA2-256
3,652,861 UART: [kat] SHA2-384
3,655,668 UART: [kat] SHA2-512-ACC
3,657,568 UART: [kat] ECC-384
3,667,211 UART: [kat] HMAC-384Kdf
3,671,919 UART: [kat] LMS
3,920,231 UART: [kat] --
3,921,189 UART: [update-reset] ++
3,938,293 >>> mbox cmd response: failed
3,938,293 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,938,825 UART: ROM Non-Fatal Error: 0x000B001E
3,939,833 UART: [state] Locking Datavault
3,940,681 UART: [state] Locking PCR0, PCR1 and PCR31
3,941,285 UART: [state] Locking ICCM
3,941,737 UART: [exit] Launching FMC @ 0x40000000
3,947,034 UART:
3,947,050 UART: Running Caliptra FMC ...
3,947,458 UART:
3,947,680 UART: [fmc] Received command: 0x1000000C
3,948,415 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,151 ready_for_fw is high
1,056,151 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,316 >>> mbox cmd response: success
2,646,075 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,652,048 UART:
2,652,064 UART: Running Caliptra FMC ...
2,652,472 UART:
2,652,702 UART: [fmc] Received command: 0x46574C44
3,642,078 >>> mbox cmd response: failed
3,642,078 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,647,615 UART:
3,647,631 UART: Running Caliptra FMC ...
3,648,039 UART:
3,648,261 UART: [fmc] Received command: 0x1000000C
3,648,996 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
891,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,251 UART: [kat] ++
895,403 UART: [kat] sha1
899,599 UART: [kat] SHA2-256
901,539 UART: [kat] SHA2-384
904,152 UART: [kat] SHA2-512-ACC
906,053 UART: [kat] ECC-384
915,998 UART: [kat] HMAC-384Kdf
920,618 UART: [kat] LMS
1,168,930 UART: [kat] --
1,169,887 UART: [cold-reset] ++
1,170,265 UART: [fht] FHT @ 0x50003400
1,172,989 UART: [idev] ++
1,173,157 UART: [idev] CDI.KEYID = 6
1,173,518 UART: [idev] SUBJECT.KEYID = 7
1,173,943 UART: [idev] UDS.KEYID = 0
1,174,289 ready_for_fw is high
1,174,289 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,065 UART: [idev] Erasing UDS.KEYID = 0
1,198,565 UART: [idev] Sha1 KeyId Algorithm
1,207,317 UART: [idev] --
1,208,368 UART: [ldev] ++
1,208,536 UART: [ldev] CDI.KEYID = 6
1,208,900 UART: [ldev] SUBJECT.KEYID = 5
1,209,327 UART: [ldev] AUTHORITY.KEYID = 7
1,209,790 UART: [ldev] FE.KEYID = 1
1,214,984 UART: [ldev] Erasing FE.KEYID = 1
1,240,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,640 UART: [ldev] --
1,280,118 UART: [fwproc] Wait for Commands...
1,280,877 UART: [fwproc] Recv command 0x46574c44
1,281,610 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,578,531 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,216 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,092 >>> mbox cmd response: success
2,741,277 UART: [afmc] ++
2,741,445 UART: [afmc] CDI.KEYID = 6
2,741,808 UART: [afmc] SUBJECT.KEYID = 7
2,742,234 UART: [afmc] AUTHORITY.KEYID = 5
2,778,167 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,666 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,801,381 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,807,273 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,812,985 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,820,958 UART: [afmc] --
2,821,830 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,821,852 UART: [cold-reset] --
2,822,804 UART: [state] Locking Datavault
2,824,061 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,665 UART: [state] Locking ICCM
2,825,217 UART: [exit] Launching FMC @ 0x40000000
2,830,514 UART:
2,830,530 UART: Running Caliptra FMC ...
2,830,938 UART:
2,831,168 UART: [fmc] Received command: 0x46574C44
2,831,994 UART:
2,832,010 UART: Running Caliptra ROM ...
2,832,418 UART:
2,832,473 UART: [state] CFI Enabled
2,835,253 UART: [state] LifecycleState = Unprovisioned
2,835,908 UART: [state] DebugLocked = No
2,836,390 UART: [state] WD Timer not started. Device not locked for debugging
2,837,744 UART: [kat] SHA2-256
3,641,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,423 UART: [kat] ++
3,645,575 UART: [kat] sha1
3,649,887 UART: [kat] SHA2-256
3,651,827 UART: [kat] SHA2-384
3,654,624 UART: [kat] SHA2-512-ACC
3,656,524 UART: [kat] ECC-384
3,666,317 UART: [kat] HMAC-384Kdf
3,670,943 UART: [kat] LMS
3,919,255 UART: [kat] --
3,920,163 UART: [update-reset] ++
3,936,549 >>> mbox cmd response: failed
3,936,549 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,937,099 UART: ROM Non-Fatal Error: 0x000B001E
3,937,993 UART: [state] Locking Datavault
3,938,893 UART: [state] Locking PCR0, PCR1 and PCR31
3,939,497 UART: [state] Locking ICCM
3,939,953 UART: [exit] Launching FMC @ 0x40000000
3,945,250 UART:
3,945,266 UART: Running Caliptra FMC ...
3,945,674 UART:
3,945,896 UART: [fmc] Received command: 0x1000000C
3,946,631 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,668 ready_for_fw is high
1,056,668 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,588,718 >>> mbox cmd response: success
2,645,243 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,651,578 UART:
2,651,594 UART: Running Caliptra FMC ...
2,652,002 UART:
2,652,232 UART: [fmc] Received command: 0x46574C44
3,641,427 >>> mbox cmd response: failed
3,641,427 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,647,030 UART:
3,647,046 UART: Running Caliptra FMC ...
3,647,454 UART:
3,647,676 UART: [fmc] Received command: 0x1000000C
3,648,411 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,773 UART: [state] LifecycleState = Unprovisioned
86,428 UART: [state] DebugLocked = No
87,160 UART: [state] WD Timer not started. Device not locked for debugging
88,329 UART: [kat] SHA2-256
891,879 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,008 UART: [kat] ++
896,160 UART: [kat] sha1
900,380 UART: [kat] SHA2-256
902,320 UART: [kat] SHA2-384
905,005 UART: [kat] SHA2-512-ACC
906,906 UART: [kat] ECC-384
916,737 UART: [kat] HMAC-384Kdf
921,281 UART: [kat] LMS
1,169,593 UART: [kat] --
1,170,582 UART: [cold-reset] ++
1,170,998 UART: [fht] FHT @ 0x50003400
1,173,564 UART: [idev] ++
1,173,732 UART: [idev] CDI.KEYID = 6
1,174,093 UART: [idev] SUBJECT.KEYID = 7
1,174,518 UART: [idev] UDS.KEYID = 0
1,174,864 ready_for_fw is high
1,174,864 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,184 UART: [idev] Erasing UDS.KEYID = 0
1,199,492 UART: [idev] Sha1 KeyId Algorithm
1,208,420 UART: [idev] --
1,209,335 UART: [ldev] ++
1,209,503 UART: [ldev] CDI.KEYID = 6
1,209,867 UART: [ldev] SUBJECT.KEYID = 5
1,210,294 UART: [ldev] AUTHORITY.KEYID = 7
1,210,757 UART: [ldev] FE.KEYID = 1
1,215,999 UART: [ldev] Erasing FE.KEYID = 1
1,242,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,849 UART: [ldev] --
1,281,173 UART: [fwproc] Wait for Commands...
1,281,906 UART: [fwproc] Recv command 0x46574c44
1,282,639 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,579,084 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,769 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,675 >>> mbox cmd response: success
2,741,710 UART: [afmc] ++
2,741,878 UART: [afmc] CDI.KEYID = 6
2,742,241 UART: [afmc] SUBJECT.KEYID = 7
2,742,667 UART: [afmc] AUTHORITY.KEYID = 5
2,778,278 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,501 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,801,216 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,807,108 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,812,820 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,820,619 UART: [afmc] --
2,821,475 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,821,497 UART: [cold-reset] --
2,822,329 UART: [state] Locking Datavault
2,823,660 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,264 UART: [state] Locking ICCM
2,824,914 UART: [exit] Launching FMC @ 0x40000000
2,830,211 UART:
2,830,227 UART: Running Caliptra FMC ...
2,830,635 UART:
2,830,865 UART: [fmc] Received command: 0x46574C44
2,831,691 UART:
2,831,707 UART: Running Caliptra ROM ...
2,832,115 UART:
2,832,257 UART: [state] CFI Enabled
2,834,781 UART: [state] LifecycleState = Unprovisioned
2,835,436 UART: [state] DebugLocked = No
2,836,142 UART: [state] WD Timer not started. Device not locked for debugging
2,837,474 UART: [kat] SHA2-256
3,641,024 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,153 UART: [kat] ++
3,645,305 UART: [kat] sha1
3,649,325 UART: [kat] SHA2-256
3,651,265 UART: [kat] SHA2-384
3,654,098 UART: [kat] SHA2-512-ACC
3,655,998 UART: [kat] ECC-384
3,665,961 UART: [kat] HMAC-384Kdf
3,670,547 UART: [kat] LMS
3,918,859 UART: [kat] --
3,919,337 UART: [update-reset] ++
3,936,039 >>> mbox cmd response: failed
3,936,039 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,936,561 UART: ROM Non-Fatal Error: 0x000B001E
3,937,347 UART: [state] Locking Datavault
3,938,235 UART: [state] Locking PCR0, PCR1 and PCR31
3,938,839 UART: [state] Locking ICCM
3,939,273 UART: [exit] Launching FMC @ 0x40000000
3,944,570 UART:
3,944,586 UART: Running Caliptra FMC ...
3,944,994 UART:
3,945,216 UART: [fmc] Received command: 0x1000000C
3,945,951 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,541 ready_for_fw is high
1,056,541 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,209 >>> mbox cmd response: success
2,645,742 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,651,943 UART:
2,651,959 UART: Running Caliptra FMC ...
2,652,367 UART:
2,652,597 UART: [fmc] Received command: 0x46574C44
3,642,425 >>> mbox cmd response: failed
3,642,425 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,648,064 UART:
3,648,080 UART: Running Caliptra FMC ...
3,648,488 UART:
3,648,710 UART: [fmc] Received command: 0x1000000C
3,649,445 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,688 UART: [state] LifecycleState = Unprovisioned
85,343 UART: [state] DebugLocked = No
85,983 UART: [state] WD Timer not started. Device not locked for debugging
87,326 UART: [kat] SHA2-256
890,876 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,005 UART: [kat] ++
895,157 UART: [kat] sha1
899,475 UART: [kat] SHA2-256
901,415 UART: [kat] SHA2-384
904,186 UART: [kat] SHA2-512-ACC
906,087 UART: [kat] ECC-384
916,024 UART: [kat] HMAC-384Kdf
920,690 UART: [kat] LMS
1,169,002 UART: [kat] --
1,170,137 UART: [cold-reset] ++
1,170,485 UART: [fht] FHT @ 0x50003400
1,173,247 UART: [idev] ++
1,173,415 UART: [idev] CDI.KEYID = 6
1,173,776 UART: [idev] SUBJECT.KEYID = 7
1,174,201 UART: [idev] UDS.KEYID = 0
1,174,547 ready_for_fw is high
1,174,547 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,217 UART: [idev] Erasing UDS.KEYID = 0
1,199,291 UART: [idev] Sha1 KeyId Algorithm
1,208,157 UART: [idev] --
1,209,030 UART: [ldev] ++
1,209,198 UART: [ldev] CDI.KEYID = 6
1,209,562 UART: [ldev] SUBJECT.KEYID = 5
1,209,989 UART: [ldev] AUTHORITY.KEYID = 7
1,210,452 UART: [ldev] FE.KEYID = 1
1,215,820 UART: [ldev] Erasing FE.KEYID = 1
1,242,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,180 UART: [ldev] --
1,281,526 UART: [fwproc] Wait for Commands...
1,282,109 UART: [fwproc] Recv command 0x46574c44
1,282,842 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,767 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,579,325 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,010 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,808 >>> mbox cmd response: success
2,741,837 UART: [afmc] ++
2,742,005 UART: [afmc] CDI.KEYID = 6
2,742,368 UART: [afmc] SUBJECT.KEYID = 7
2,742,794 UART: [afmc] AUTHORITY.KEYID = 5
2,778,331 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,923 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,674 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,801,389 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,807,281 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,812,993 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,820,774 UART: [afmc] --
2,821,760 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,821,782 UART: [cold-reset] --
2,822,636 UART: [state] Locking Datavault
2,823,885 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,489 UART: [state] Locking ICCM
2,824,981 UART: [exit] Launching FMC @ 0x40000000
2,830,278 UART:
2,830,294 UART: Running Caliptra FMC ...
2,830,702 UART:
2,830,932 UART: [fmc] Received command: 0x46574C44
2,831,758 UART:
2,831,774 UART: Running Caliptra ROM ...
2,832,182 UART:
2,832,237 UART: [state] CFI Enabled
2,835,099 UART: [state] LifecycleState = Unprovisioned
2,835,754 UART: [state] DebugLocked = No
2,836,288 UART: [state] WD Timer not started. Device not locked for debugging
2,837,538 UART: [kat] SHA2-256
3,641,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,217 UART: [kat] ++
3,645,369 UART: [kat] sha1
3,649,667 UART: [kat] SHA2-256
3,651,607 UART: [kat] SHA2-384
3,654,386 UART: [kat] SHA2-512-ACC
3,656,286 UART: [kat] ECC-384
3,665,747 UART: [kat] HMAC-384Kdf
3,670,483 UART: [kat] LMS
3,918,795 UART: [kat] --
3,919,653 UART: [update-reset] ++
3,936,503 >>> mbox cmd response: failed
3,936,503 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,937,097 UART: ROM Non-Fatal Error: 0x000B001E
3,938,055 UART: [state] Locking Datavault
3,938,773 UART: [state] Locking PCR0, PCR1 and PCR31
3,939,377 UART: [state] Locking ICCM
3,940,029 UART: [exit] Launching FMC @ 0x40000000
3,945,326 UART:
3,945,342 UART: Running Caliptra FMC ...
3,945,750 UART:
3,945,972 UART: [fmc] Received command: 0x1000000C
3,946,707 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,548 ready_for_fw is high
1,056,548 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,744 >>> mbox cmd response: success
2,646,313 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,652,014 UART:
2,652,030 UART: Running Caliptra FMC ...
2,652,438 UART:
2,652,668 UART: [fmc] Received command: 0x46574C44
3,641,331 >>> mbox cmd response: failed
3,641,331 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,647,148 UART:
3,647,164 UART: Running Caliptra FMC ...
3,647,572 UART:
3,647,794 UART: [fmc] Received command: 0x1000000C
3,648,529 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,931 UART: [state] LifecycleState = Unprovisioned
85,586 UART: [state] DebugLocked = No
86,080 UART: [state] WD Timer not started. Device not locked for debugging
87,261 UART: [kat] SHA2-256
890,811 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,940 UART: [kat] ++
895,092 UART: [kat] sha1
899,442 UART: [kat] SHA2-256
901,382 UART: [kat] SHA2-384
904,149 UART: [kat] SHA2-512-ACC
906,050 UART: [kat] ECC-384
915,771 UART: [kat] HMAC-384Kdf
920,547 UART: [kat] LMS
1,168,859 UART: [kat] --
1,169,640 UART: [cold-reset] ++
1,170,088 UART: [fht] FHT @ 0x50003400
1,172,752 UART: [idev] ++
1,172,920 UART: [idev] CDI.KEYID = 6
1,173,281 UART: [idev] SUBJECT.KEYID = 7
1,173,706 UART: [idev] UDS.KEYID = 0
1,174,052 ready_for_fw is high
1,174,052 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,282 UART: [idev] Erasing UDS.KEYID = 0
1,199,854 UART: [idev] Sha1 KeyId Algorithm
1,208,806 UART: [idev] --
1,210,103 UART: [ldev] ++
1,210,271 UART: [ldev] CDI.KEYID = 6
1,210,635 UART: [ldev] SUBJECT.KEYID = 5
1,211,062 UART: [ldev] AUTHORITY.KEYID = 7
1,211,525 UART: [ldev] FE.KEYID = 1
1,216,935 UART: [ldev] Erasing FE.KEYID = 1
1,243,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,691 UART: [ldev] --
1,282,179 UART: [fwproc] Wait for Commands...
1,282,936 UART: [fwproc] Recv command 0x46574c44
1,283,669 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,558 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,581,194 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,879 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,742,691 >>> mbox cmd response: success
2,743,896 UART: [afmc] ++
2,744,064 UART: [afmc] CDI.KEYID = 6
2,744,427 UART: [afmc] SUBJECT.KEYID = 7
2,744,853 UART: [afmc] AUTHORITY.KEYID = 5
2,780,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,126 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,877 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,803,592 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,809,484 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,815,196 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,823,189 UART: [afmc] --
2,824,229 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,824,251 UART: [cold-reset] --
2,825,059 UART: [state] Locking Datavault
2,826,310 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,914 UART: [state] Locking ICCM
2,827,386 UART: [exit] Launching FMC @ 0x40000000
2,832,683 UART:
2,832,699 UART: Running Caliptra FMC ...
2,833,107 UART:
2,833,337 UART: [fmc] Received command: 0x46574C44
2,834,163 UART:
2,834,179 UART: Running Caliptra ROM ...
2,834,587 UART:
2,834,729 UART: [state] CFI Enabled
2,837,475 UART: [state] LifecycleState = Unprovisioned
2,838,130 UART: [state] DebugLocked = No
2,838,778 UART: [state] WD Timer not started. Device not locked for debugging
2,839,956 UART: [kat] SHA2-256
3,643,506 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,635 UART: [kat] ++
3,647,787 UART: [kat] sha1
3,652,103 UART: [kat] SHA2-256
3,654,043 UART: [kat] SHA2-384
3,656,960 UART: [kat] SHA2-512-ACC
3,658,860 UART: [kat] ECC-384
3,668,581 UART: [kat] HMAC-384Kdf
3,673,457 UART: [kat] LMS
3,921,769 UART: [kat] --
3,922,517 UART: [update-reset] ++
3,939,659 >>> mbox cmd response: failed
3,939,659 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,940,207 UART: ROM Non-Fatal Error: 0x000B001E
3,941,151 UART: [state] Locking Datavault
3,941,951 UART: [state] Locking PCR0, PCR1 and PCR31
3,942,555 UART: [state] Locking ICCM
3,943,167 UART: [exit] Launching FMC @ 0x40000000
3,948,464 UART:
3,948,480 UART: Running Caliptra FMC ...
3,948,888 UART:
3,949,110 UART: [fmc] Received command: 0x1000000C
3,949,845 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,943 ready_for_fw is high
1,056,943 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,592,677 >>> mbox cmd response: success
2,649,650 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,655,919 UART:
2,655,935 UART: Running Caliptra FMC ...
2,656,343 UART:
2,656,573 UART: [fmc] Received command: 0x46574C44
3,645,917 >>> mbox cmd response: failed
3,645,917 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,651,560 UART:
3,651,576 UART: Running Caliptra FMC ...
3,651,984 UART:
3,652,206 UART: [fmc] Received command: 0x1000000C
3,652,941 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,743 UART: [state] WD Timer not started. Device not locked for debugging
87,964 UART: [kat] SHA2-256
891,514 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,643 UART: [kat] ++
895,795 UART: [kat] sha1
900,073 UART: [kat] SHA2-256
902,013 UART: [kat] SHA2-384
904,744 UART: [kat] SHA2-512-ACC
906,645 UART: [kat] ECC-384
916,008 UART: [kat] HMAC-384Kdf
920,422 UART: [kat] LMS
1,168,734 UART: [kat] --
1,169,853 UART: [cold-reset] ++
1,170,389 UART: [fht] FHT @ 0x50003400
1,173,063 UART: [idev] ++
1,173,231 UART: [idev] CDI.KEYID = 6
1,173,592 UART: [idev] SUBJECT.KEYID = 7
1,174,017 UART: [idev] UDS.KEYID = 0
1,174,363 ready_for_fw is high
1,174,363 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,247 UART: [idev] Erasing UDS.KEYID = 0
1,198,885 UART: [idev] Sha1 KeyId Algorithm
1,207,791 UART: [idev] --
1,208,646 UART: [ldev] ++
1,208,814 UART: [ldev] CDI.KEYID = 6
1,209,178 UART: [ldev] SUBJECT.KEYID = 5
1,209,605 UART: [ldev] AUTHORITY.KEYID = 7
1,210,068 UART: [ldev] FE.KEYID = 1
1,215,270 UART: [ldev] Erasing FE.KEYID = 1
1,241,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,466 UART: [ldev] --
1,280,976 UART: [fwproc] Wait for Commands...
1,281,765 UART: [fwproc] Recv command 0x46574c44
1,282,498 UART: [fwproc] Recv'd Img size: 111916 bytes
3,089,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,117,444 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,143,129 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,278,999 >>> mbox cmd response: success
3,280,196 UART: [afmc] ++
3,280,364 UART: [afmc] CDI.KEYID = 6
3,280,727 UART: [afmc] SUBJECT.KEYID = 7
3,281,153 UART: [afmc] AUTHORITY.KEYID = 5
3,316,504 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,332,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,333,741 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,339,452 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,345,339 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,351,037 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,358,632 UART: [afmc] --
3,359,532 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,359,554 UART: [cold-reset] --
3,360,340 UART: [state] Locking Datavault
3,361,235 UART: [state] Locking PCR0, PCR1 and PCR31
3,361,839 UART: [state] Locking ICCM
3,362,299 UART: [exit] Launching FMC @ 0x40000000
3,367,596 UART:
3,367,612 UART: Running Caliptra FMC ...
3,368,020 UART:
3,368,250 UART: [fmc] Received command: 0x46574C44
3,369,076 UART:
3,369,092 UART: Running Caliptra ROM ...
3,369,500 UART:
3,369,555 UART: [state] CFI Enabled
3,372,425 UART: [state] LifecycleState = Unprovisioned
3,373,080 UART: [state] DebugLocked = No
3,373,722 UART: [state] WD Timer not started. Device not locked for debugging
3,375,044 UART: [kat] SHA2-256
4,178,594 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,182,723 UART: [kat] ++
4,182,875 UART: [kat] sha1
4,187,319 UART: [kat] SHA2-256
4,189,259 UART: [kat] SHA2-384
4,191,942 UART: [kat] SHA2-512-ACC
4,193,842 UART: [kat] ECC-384
4,203,731 UART: [kat] HMAC-384Kdf
4,208,393 UART: [kat] LMS
4,456,705 UART: [kat] --
4,457,513 UART: [update-reset] ++
4,475,925 >>> mbox cmd response: failed
4,475,925 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,476,429 UART: ROM Non-Fatal Error: 0x000B003D
4,477,403 UART: [state] Locking Datavault
4,478,329 UART: [state] Locking PCR0, PCR1 and PCR31
4,478,933 UART: [state] Locking ICCM
4,479,471 UART: [exit] Launching FMC @ 0x40000000
4,484,768 UART:
4,484,784 UART: Running Caliptra FMC ...
4,485,192 UART:
4,485,414 UART: [fmc] Received command: 0x1000000C
4,486,149 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,996 ready_for_fw is high
1,056,996 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,129,597 >>> mbox cmd response: success
3,185,456 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,191,667 UART:
3,191,683 UART: Running Caliptra FMC ...
3,192,091 UART:
3,192,321 UART: [fmc] Received command: 0x46574C44
4,181,226 >>> mbox cmd response: failed
4,181,226 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,187,155 UART:
4,187,171 UART: Running Caliptra FMC ...
4,187,579 UART:
4,187,801 UART: [fmc] Received command: 0x1000000C
4,188,536 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Unprovisioned
85,772 UART: [state] DebugLocked = No
86,302 UART: [state] WD Timer not started. Device not locked for debugging
87,473 UART: [kat] SHA2-256
891,023 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,152 UART: [kat] ++
895,304 UART: [kat] sha1
899,416 UART: [kat] SHA2-256
901,356 UART: [kat] SHA2-384
904,193 UART: [kat] SHA2-512-ACC
906,094 UART: [kat] ECC-384
916,007 UART: [kat] HMAC-384Kdf
920,733 UART: [kat] LMS
1,169,045 UART: [kat] --
1,170,176 UART: [cold-reset] ++
1,170,752 UART: [fht] FHT @ 0x50003400
1,173,488 UART: [idev] ++
1,173,656 UART: [idev] CDI.KEYID = 6
1,174,017 UART: [idev] SUBJECT.KEYID = 7
1,174,442 UART: [idev] UDS.KEYID = 0
1,174,788 ready_for_fw is high
1,174,788 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,452 UART: [idev] Erasing UDS.KEYID = 0
1,199,154 UART: [idev] Sha1 KeyId Algorithm
1,207,882 UART: [idev] --
1,208,897 UART: [ldev] ++
1,209,065 UART: [ldev] CDI.KEYID = 6
1,209,429 UART: [ldev] SUBJECT.KEYID = 5
1,209,856 UART: [ldev] AUTHORITY.KEYID = 7
1,210,319 UART: [ldev] FE.KEYID = 1
1,215,705 UART: [ldev] Erasing FE.KEYID = 1
1,242,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,123 UART: [ldev] --
1,281,601 UART: [fwproc] Wait for Commands...
1,282,268 UART: [fwproc] Recv command 0x46574c44
1,283,001 UART: [fwproc] Recv'd Img size: 111916 bytes
3,100,910 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,129,028 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,154,713 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,290,607 >>> mbox cmd response: success
3,291,692 UART: [afmc] ++
3,291,860 UART: [afmc] CDI.KEYID = 6
3,292,223 UART: [afmc] SUBJECT.KEYID = 7
3,292,649 UART: [afmc] AUTHORITY.KEYID = 5
3,328,530 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,345,078 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,345,829 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,351,540 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,357,427 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,363,125 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,371,034 UART: [afmc] --
3,371,970 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,371,992 UART: [cold-reset] --
3,373,028 UART: [state] Locking Datavault
3,374,247 UART: [state] Locking PCR0, PCR1 and PCR31
3,374,851 UART: [state] Locking ICCM
3,375,497 UART: [exit] Launching FMC @ 0x40000000
3,380,794 UART:
3,380,810 UART: Running Caliptra FMC ...
3,381,218 UART:
3,381,448 UART: [fmc] Received command: 0x46574C44
3,382,274 UART:
3,382,290 UART: Running Caliptra ROM ...
3,382,698 UART:
3,382,840 UART: [state] CFI Enabled
3,385,894 UART: [state] LifecycleState = Unprovisioned
3,386,549 UART: [state] DebugLocked = No
3,387,049 UART: [state] WD Timer not started. Device not locked for debugging
3,388,285 UART: [kat] SHA2-256
4,191,835 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,195,964 UART: [kat] ++
4,196,116 UART: [kat] sha1
4,200,408 UART: [kat] SHA2-256
4,202,348 UART: [kat] SHA2-384
4,205,311 UART: [kat] SHA2-512-ACC
4,207,211 UART: [kat] ECC-384
4,217,504 UART: [kat] HMAC-384Kdf
4,222,074 UART: [kat] LMS
4,470,386 UART: [kat] --
4,471,128 UART: [update-reset] ++
4,489,036 >>> mbox cmd response: failed
4,489,036 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,489,578 UART: ROM Non-Fatal Error: 0x000B003D
4,490,338 UART: [state] Locking Datavault
4,491,270 UART: [state] Locking PCR0, PCR1 and PCR31
4,491,874 UART: [state] Locking ICCM
4,492,398 UART: [exit] Launching FMC @ 0x40000000
4,497,695 UART:
4,497,711 UART: Running Caliptra FMC ...
4,498,119 UART:
4,498,341 UART: [fmc] Received command: 0x1000000C
4,499,076 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,253 ready_for_fw is high
1,056,253 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,125,351 >>> mbox cmd response: success
3,181,396 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,187,203 UART:
3,187,219 UART: Running Caliptra FMC ...
3,187,627 UART:
3,187,857 UART: [fmc] Received command: 0x46574C44
4,178,867 >>> mbox cmd response: failed
4,178,867 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,184,742 UART:
4,184,758 UART: Running Caliptra FMC ...
4,185,166 UART:
4,185,388 UART: [fmc] Received command: 0x1000000C
4,186,123 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,720 UART: [state] LifecycleState = Unprovisioned
85,375 UART: [state] DebugLocked = No
86,075 UART: [state] WD Timer not started. Device not locked for debugging
87,378 UART: [kat] SHA2-256
890,928 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,057 UART: [kat] ++
895,209 UART: [kat] sha1
899,389 UART: [kat] SHA2-256
901,329 UART: [kat] SHA2-384
904,230 UART: [kat] SHA2-512-ACC
906,131 UART: [kat] ECC-384
915,636 UART: [kat] HMAC-384Kdf
920,252 UART: [kat] LMS
1,168,564 UART: [kat] --
1,169,413 UART: [cold-reset] ++
1,169,739 UART: [fht] FHT @ 0x50003400
1,172,463 UART: [idev] ++
1,172,631 UART: [idev] CDI.KEYID = 6
1,172,992 UART: [idev] SUBJECT.KEYID = 7
1,173,417 UART: [idev] UDS.KEYID = 0
1,173,763 ready_for_fw is high
1,173,763 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,067 UART: [idev] Erasing UDS.KEYID = 0
1,197,839 UART: [idev] Sha1 KeyId Algorithm
1,206,713 UART: [idev] --
1,207,784 UART: [ldev] ++
1,207,952 UART: [ldev] CDI.KEYID = 6
1,208,316 UART: [ldev] SUBJECT.KEYID = 5
1,208,743 UART: [ldev] AUTHORITY.KEYID = 7
1,209,206 UART: [ldev] FE.KEYID = 1
1,214,436 UART: [ldev] Erasing FE.KEYID = 1
1,240,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,044 UART: [ldev] --
1,279,314 UART: [fwproc] Wait for Commands...
1,280,133 UART: [fwproc] Recv command 0x46574c44
1,280,866 UART: [fwproc] Recv'd Img size: 111916 bytes
3,099,523 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,127,697 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,153,382 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,289,248 >>> mbox cmd response: success
3,290,421 UART: [afmc] ++
3,290,589 UART: [afmc] CDI.KEYID = 6
3,290,952 UART: [afmc] SUBJECT.KEYID = 7
3,291,378 UART: [afmc] AUTHORITY.KEYID = 5
3,326,833 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,343,507 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,344,258 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,349,969 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,355,856 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,361,554 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,369,587 UART: [afmc] --
3,370,595 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,370,617 UART: [cold-reset] --
3,371,455 UART: [state] Locking Datavault
3,372,446 UART: [state] Locking PCR0, PCR1 and PCR31
3,373,050 UART: [state] Locking ICCM
3,373,676 UART: [exit] Launching FMC @ 0x40000000
3,378,973 UART:
3,378,989 UART: Running Caliptra FMC ...
3,379,397 UART:
3,379,627 UART: [fmc] Received command: 0x46574C44
3,380,453 UART:
3,380,469 UART: Running Caliptra ROM ...
3,380,877 UART:
3,380,932 UART: [state] CFI Enabled
3,383,498 UART: [state] LifecycleState = Unprovisioned
3,384,153 UART: [state] DebugLocked = No
3,384,731 UART: [state] WD Timer not started. Device not locked for debugging
3,386,069 UART: [kat] SHA2-256
4,189,619 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,193,748 UART: [kat] ++
4,193,900 UART: [kat] sha1
4,198,098 UART: [kat] SHA2-256
4,200,038 UART: [kat] SHA2-384
4,202,769 UART: [kat] SHA2-512-ACC
4,204,669 UART: [kat] ECC-384
4,213,878 UART: [kat] HMAC-384Kdf
4,218,418 UART: [kat] LMS
4,466,730 UART: [kat] --
4,467,416 UART: [update-reset] ++
4,484,764 >>> mbox cmd response: failed
4,484,764 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,485,290 UART: ROM Non-Fatal Error: 0x000B003D
4,486,092 UART: [state] Locking Datavault
4,486,996 UART: [state] Locking PCR0, PCR1 and PCR31
4,487,600 UART: [state] Locking ICCM
4,488,268 UART: [exit] Launching FMC @ 0x40000000
4,493,565 UART:
4,493,581 UART: Running Caliptra FMC ...
4,493,989 UART:
4,494,211 UART: [fmc] Received command: 0x1000000C
4,494,946 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,338 ready_for_fw is high
1,055,338 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,142,049 >>> mbox cmd response: success
3,197,876 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,203,731 UART:
3,203,747 UART: Running Caliptra FMC ...
3,204,155 UART:
3,204,385 UART: [fmc] Received command: 0x46574C44
4,192,956 >>> mbox cmd response: failed
4,192,956 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,198,799 UART:
4,198,815 UART: Running Caliptra FMC ...
4,199,223 UART:
4,199,445 UART: [fmc] Received command: 0x1000000C
4,200,180 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
891,397 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,526 UART: [kat] ++
895,678 UART: [kat] sha1
899,960 UART: [kat] SHA2-256
901,900 UART: [kat] SHA2-384
904,537 UART: [kat] SHA2-512-ACC
906,438 UART: [kat] ECC-384
916,155 UART: [kat] HMAC-384Kdf
920,765 UART: [kat] LMS
1,169,077 UART: [kat] --
1,169,878 UART: [cold-reset] ++
1,170,318 UART: [fht] FHT @ 0x50003400
1,172,986 UART: [idev] ++
1,173,154 UART: [idev] CDI.KEYID = 6
1,173,515 UART: [idev] SUBJECT.KEYID = 7
1,173,940 UART: [idev] UDS.KEYID = 0
1,174,286 ready_for_fw is high
1,174,286 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,278 UART: [idev] Erasing UDS.KEYID = 0
1,199,570 UART: [idev] Sha1 KeyId Algorithm
1,208,574 UART: [idev] --
1,209,417 UART: [ldev] ++
1,209,585 UART: [ldev] CDI.KEYID = 6
1,209,949 UART: [ldev] SUBJECT.KEYID = 5
1,210,376 UART: [ldev] AUTHORITY.KEYID = 7
1,210,839 UART: [ldev] FE.KEYID = 1
1,216,295 UART: [ldev] Erasing FE.KEYID = 1
1,242,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,119 UART: [ldev] --
1,282,583 UART: [fwproc] Wait for Commands...
1,283,158 UART: [fwproc] Recv command 0x46574c44
1,283,891 UART: [fwproc] Recv'd Img size: 111916 bytes
3,106,292 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,134,328 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,160,013 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,295,863 >>> mbox cmd response: success
3,297,076 UART: [afmc] ++
3,297,244 UART: [afmc] CDI.KEYID = 6
3,297,607 UART: [afmc] SUBJECT.KEYID = 7
3,298,033 UART: [afmc] AUTHORITY.KEYID = 5
3,333,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,349,806 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,350,557 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,356,268 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,362,155 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,367,853 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,375,648 UART: [afmc] --
3,376,622 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,376,644 UART: [cold-reset] --
3,377,554 UART: [state] Locking Datavault
3,378,613 UART: [state] Locking PCR0, PCR1 and PCR31
3,379,217 UART: [state] Locking ICCM
3,379,647 UART: [exit] Launching FMC @ 0x40000000
3,384,944 UART:
3,384,960 UART: Running Caliptra FMC ...
3,385,368 UART:
3,385,598 UART: [fmc] Received command: 0x46574C44
3,386,424 UART:
3,386,440 UART: Running Caliptra ROM ...
3,386,848 UART:
3,386,990 UART: [state] CFI Enabled
3,389,336 UART: [state] LifecycleState = Unprovisioned
3,389,991 UART: [state] DebugLocked = No
3,390,681 UART: [state] WD Timer not started. Device not locked for debugging
3,391,801 UART: [kat] SHA2-256
4,195,351 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,199,480 UART: [kat] ++
4,199,632 UART: [kat] sha1
4,203,932 UART: [kat] SHA2-256
4,205,872 UART: [kat] SHA2-384
4,208,713 UART: [kat] SHA2-512-ACC
4,210,613 UART: [kat] ECC-384
4,220,242 UART: [kat] HMAC-384Kdf
4,225,012 UART: [kat] LMS
4,473,324 UART: [kat] --
4,474,266 UART: [update-reset] ++
4,492,184 >>> mbox cmd response: failed
4,492,184 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,492,586 UART: ROM Non-Fatal Error: 0x000B003D
4,493,454 UART: [state] Locking Datavault
4,494,408 UART: [state] Locking PCR0, PCR1 and PCR31
4,495,012 UART: [state] Locking ICCM
4,495,624 UART: [exit] Launching FMC @ 0x40000000
4,500,921 UART:
4,500,937 UART: Running Caliptra FMC ...
4,501,345 UART:
4,501,567 UART: [fmc] Received command: 0x1000000C
4,502,302 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,397 ready_for_fw is high
1,056,397 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,125,548 >>> mbox cmd response: success
3,181,371 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,187,694 UART:
3,187,710 UART: Running Caliptra FMC ...
3,188,118 UART:
3,188,348 UART: [fmc] Received command: 0x46574C44
4,179,098 >>> mbox cmd response: failed
4,179,098 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,184,771 UART:
4,184,787 UART: Running Caliptra FMC ...
4,185,195 UART:
4,185,417 UART: [fmc] Received command: 0x1000000C
4,186,152 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,091 UART: [state] WD Timer not started. Device not locked for debugging
87,334 UART: [kat] SHA2-256
890,884 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,013 UART: [kat] ++
895,165 UART: [kat] sha1
899,253 UART: [kat] SHA2-256
901,193 UART: [kat] SHA2-384
903,882 UART: [kat] SHA2-512-ACC
905,783 UART: [kat] ECC-384
915,464 UART: [kat] HMAC-384Kdf
920,274 UART: [kat] LMS
1,168,586 UART: [kat] --
1,169,263 UART: [cold-reset] ++
1,169,633 UART: [fht] FHT @ 0x50003400
1,172,321 UART: [idev] ++
1,172,489 UART: [idev] CDI.KEYID = 6
1,172,850 UART: [idev] SUBJECT.KEYID = 7
1,173,275 UART: [idev] UDS.KEYID = 0
1,173,621 ready_for_fw is high
1,173,621 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,181,267 UART: [idev] Erasing UDS.KEYID = 0
1,198,405 UART: [idev] Sha1 KeyId Algorithm
1,207,319 UART: [idev] --
1,208,412 UART: [ldev] ++
1,208,580 UART: [ldev] CDI.KEYID = 6
1,208,944 UART: [ldev] SUBJECT.KEYID = 5
1,209,371 UART: [ldev] AUTHORITY.KEYID = 7
1,209,834 UART: [ldev] FE.KEYID = 1
1,215,250 UART: [ldev] Erasing FE.KEYID = 1
1,241,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,164 UART: [ldev] --
1,280,492 UART: [fwproc] Wait for Commands...
1,281,091 UART: [fwproc] Recv command 0x46574c44
1,281,824 UART: [fwproc] Recv'd Img size: 111916 bytes
3,099,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,126,781 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,152,466 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,288,352 >>> mbox cmd response: success
3,289,531 UART: [afmc] ++
3,289,699 UART: [afmc] CDI.KEYID = 6
3,290,062 UART: [afmc] SUBJECT.KEYID = 7
3,290,488 UART: [afmc] AUTHORITY.KEYID = 5
3,325,957 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,342,361 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,343,112 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,348,823 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,354,710 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,360,408 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,368,391 UART: [afmc] --
3,369,397 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,369,419 UART: [cold-reset] --
3,370,283 UART: [state] Locking Datavault
3,371,520 UART: [state] Locking PCR0, PCR1 and PCR31
3,372,124 UART: [state] Locking ICCM
3,372,732 UART: [exit] Launching FMC @ 0x40000000
3,378,029 UART:
3,378,045 UART: Running Caliptra FMC ...
3,378,453 UART:
3,378,683 UART: [fmc] Received command: 0x46574C44
3,379,509 UART:
3,379,525 UART: Running Caliptra ROM ...
3,379,933 UART:
3,379,988 UART: [state] CFI Enabled
3,382,472 UART: [state] LifecycleState = Unprovisioned
3,383,127 UART: [state] DebugLocked = No
3,383,839 UART: [state] WD Timer not started. Device not locked for debugging
3,385,051 UART: [kat] SHA2-256
4,188,601 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,192,730 UART: [kat] ++
4,192,882 UART: [kat] sha1
4,197,246 UART: [kat] SHA2-256
4,199,186 UART: [kat] SHA2-384
4,201,933 UART: [kat] SHA2-512-ACC
4,203,833 UART: [kat] ECC-384
4,213,400 UART: [kat] HMAC-384Kdf
4,217,860 UART: [kat] LMS
4,466,172 UART: [kat] --
4,467,246 UART: [update-reset] ++
4,484,920 >>> mbox cmd response: failed
4,484,920 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,485,370 UART: ROM Non-Fatal Error: 0x000B003D
4,486,246 UART: [state] Locking Datavault
4,487,048 UART: [state] Locking PCR0, PCR1 and PCR31
4,487,652 UART: [state] Locking ICCM
4,488,156 UART: [exit] Launching FMC @ 0x40000000
4,493,453 UART:
4,493,469 UART: Running Caliptra FMC ...
4,493,877 UART:
4,494,099 UART: [fmc] Received command: 0x1000000C
4,494,834 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,712 ready_for_fw is high
1,055,712 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,139,554 >>> mbox cmd response: success
3,195,011 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,201,028 UART:
3,201,044 UART: Running Caliptra FMC ...
3,201,452 UART:
3,201,682 UART: [fmc] Received command: 0x46574C44
4,190,671 >>> mbox cmd response: failed
4,190,671 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,196,502 UART:
4,196,518 UART: Running Caliptra FMC ...
4,196,926 UART:
4,197,148 UART: [fmc] Received command: 0x1000000C
4,197,883 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,950 UART: [state] WD Timer not started. Device not locked for debugging
88,311 UART: [kat] SHA2-256
891,861 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,990 UART: [kat] ++
896,142 UART: [kat] sha1
900,334 UART: [kat] SHA2-256
902,274 UART: [kat] SHA2-384
905,063 UART: [kat] SHA2-512-ACC
906,964 UART: [kat] ECC-384
917,115 UART: [kat] HMAC-384Kdf
921,657 UART: [kat] LMS
1,169,969 UART: [kat] --
1,170,716 UART: [cold-reset] ++
1,171,220 UART: [fht] FHT @ 0x50003400
1,173,954 UART: [idev] ++
1,174,122 UART: [idev] CDI.KEYID = 6
1,174,483 UART: [idev] SUBJECT.KEYID = 7
1,174,908 UART: [idev] UDS.KEYID = 0
1,175,254 ready_for_fw is high
1,175,254 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,934 UART: [idev] Erasing UDS.KEYID = 0
1,199,836 UART: [idev] Sha1 KeyId Algorithm
1,208,716 UART: [idev] --
1,209,799 UART: [ldev] ++
1,209,967 UART: [ldev] CDI.KEYID = 6
1,210,331 UART: [ldev] SUBJECT.KEYID = 5
1,210,758 UART: [ldev] AUTHORITY.KEYID = 7
1,211,221 UART: [ldev] FE.KEYID = 1
1,216,585 UART: [ldev] Erasing FE.KEYID = 1
1,242,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,525 UART: [ldev] --
1,282,023 UART: [fwproc] Wait for Commands...
1,282,834 UART: [fwproc] Recv command 0x46574c44
1,283,567 UART: [fwproc] Recv'd Img size: 111916 bytes
3,107,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,135,650 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,161,335 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,297,133 >>> mbox cmd response: success
3,298,150 UART: [afmc] ++
3,298,318 UART: [afmc] CDI.KEYID = 6
3,298,681 UART: [afmc] SUBJECT.KEYID = 7
3,299,107 UART: [afmc] AUTHORITY.KEYID = 5
3,335,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,351,852 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,352,603 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,358,314 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,364,201 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,369,899 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,377,848 UART: [afmc] --
3,378,750 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,378,772 UART: [cold-reset] --
3,379,836 UART: [state] Locking Datavault
3,381,127 UART: [state] Locking PCR0, PCR1 and PCR31
3,381,731 UART: [state] Locking ICCM
3,382,215 UART: [exit] Launching FMC @ 0x40000000
3,387,512 UART:
3,387,528 UART: Running Caliptra FMC ...
3,387,936 UART:
3,388,166 UART: [fmc] Received command: 0x46574C44
3,388,992 UART:
3,389,008 UART: Running Caliptra ROM ...
3,389,416 UART:
3,389,558 UART: [state] CFI Enabled
3,392,398 UART: [state] LifecycleState = Unprovisioned
3,393,053 UART: [state] DebugLocked = No
3,393,695 UART: [state] WD Timer not started. Device not locked for debugging
3,394,953 UART: [kat] SHA2-256
4,198,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,202,632 UART: [kat] ++
4,202,784 UART: [kat] sha1
4,207,124 UART: [kat] SHA2-256
4,209,064 UART: [kat] SHA2-384
4,211,647 UART: [kat] SHA2-512-ACC
4,213,547 UART: [kat] ECC-384
4,223,870 UART: [kat] HMAC-384Kdf
4,228,700 UART: [kat] LMS
4,477,012 UART: [kat] --
4,477,760 UART: [update-reset] ++
4,495,318 >>> mbox cmd response: failed
4,495,318 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,495,748 UART: ROM Non-Fatal Error: 0x000B003D
4,496,558 UART: [state] Locking Datavault
4,497,248 UART: [state] Locking PCR0, PCR1 and PCR31
4,497,852 UART: [state] Locking ICCM
4,498,526 UART: [exit] Launching FMC @ 0x40000000
4,503,823 UART:
4,503,839 UART: Running Caliptra FMC ...
4,504,247 UART:
4,504,469 UART: [fmc] Received command: 0x1000000C
4,505,204 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,483 ready_for_fw is high
1,056,483 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,135,487 >>> mbox cmd response: success
3,191,274 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
3,197,185 UART:
3,197,201 UART: Running Caliptra FMC ...
3,197,609 UART:
3,197,839 UART: [fmc] Received command: 0x46574C44
4,187,973 >>> mbox cmd response: failed
4,187,973 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,193,626 UART:
4,193,642 UART: Running Caliptra FMC ...
4,194,050 UART:
4,194,272 UART: [fmc] Received command: 0x1000000C
4,195,007 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,344 UART: [kat] SHA2-256
890,894 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,023 UART: [kat] ++
895,175 UART: [kat] sha1
899,475 UART: [kat] SHA2-256
901,415 UART: [kat] SHA2-384
904,234 UART: [kat] SHA2-512-ACC
906,135 UART: [kat] ECC-384
915,836 UART: [kat] HMAC-384Kdf
920,350 UART: [kat] LMS
1,168,662 UART: [kat] --
1,169,697 UART: [cold-reset] ++
1,170,089 UART: [fht] FHT @ 0x50003400
1,172,809 UART: [idev] ++
1,172,977 UART: [idev] CDI.KEYID = 6
1,173,338 UART: [idev] SUBJECT.KEYID = 7
1,173,763 UART: [idev] UDS.KEYID = 0
1,174,109 ready_for_fw is high
1,174,109 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,797 UART: [idev] Erasing UDS.KEYID = 0
1,198,307 UART: [idev] Sha1 KeyId Algorithm
1,207,067 UART: [idev] --
1,208,126 UART: [ldev] ++
1,208,294 UART: [ldev] CDI.KEYID = 6
1,208,658 UART: [ldev] SUBJECT.KEYID = 5
1,209,085 UART: [ldev] AUTHORITY.KEYID = 7
1,209,548 UART: [ldev] FE.KEYID = 1
1,214,942 UART: [ldev] Erasing FE.KEYID = 1
1,240,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,150 UART: [ldev] --
1,280,536 UART: [fwproc] Wait for Commands...
1,281,177 UART: [fwproc] Recv command 0x46574c44
1,281,910 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,635 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,718 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,630 >>> mbox cmd response: success
2,675,695 UART: [afmc] ++
2,675,863 UART: [afmc] CDI.KEYID = 6
2,676,226 UART: [afmc] SUBJECT.KEYID = 7
2,676,652 UART: [afmc] AUTHORITY.KEYID = 5
2,712,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,474 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,225 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,945 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,838 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,531 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,254 UART: [afmc] --
2,755,146 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,755,168 UART: [cold-reset] --
2,755,928 UART: [state] Locking Datavault
2,757,229 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,833 UART: [state] Locking ICCM
2,758,465 UART: [exit] Launching FMC @ 0x40000000
2,763,762 UART:
2,763,778 UART: Running Caliptra FMC ...
2,764,186 UART:
2,764,324 UART: [fmc] Received command: 0x46574C44
2,765,153 UART:
2,765,169 UART: Running Caliptra ROM ...
2,765,577 UART:
2,765,632 UART: [state] CFI Enabled
2,768,564 UART: [state] LifecycleState = Unprovisioned
2,769,219 UART: [state] DebugLocked = No
2,769,817 UART: [state] WD Timer not started. Device not locked for debugging
2,771,015 UART: [kat] SHA2-256
3,574,565 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,694 UART: [kat] ++
3,578,846 UART: [kat] sha1
3,582,990 UART: [kat] SHA2-256
3,584,930 UART: [kat] SHA2-384
3,587,825 UART: [kat] SHA2-512-ACC
3,589,725 UART: [kat] ECC-384
3,599,720 UART: [kat] HMAC-384Kdf
3,604,384 UART: [kat] LMS
3,852,696 UART: [kat] --
3,853,386 UART: [update-reset] ++
3,854,651 >>> mbox cmd response: failed
3,855,177 UART: ROM Non-Fatal Error: 0x000B0001
3,856,131 UART: [state] Locking Datavault
3,856,855 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,459 UART: [state] Locking ICCM
3,858,039 UART: [exit] Launching FMC @ 0x40000000
3,863,336 UART:
3,863,352 UART: Running Caliptra FMC ...
3,863,760 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,934 ready_for_fw is high
1,055,934 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,523,244 >>> mbox cmd response: success
2,579,024 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,585,157 UART:
2,585,173 UART: Running Caliptra FMC ...
2,585,581 UART:
2,585,719 UART: [fmc] Received command: 0x46574C44
3,559,438 >>> mbox cmd response: failed
3,565,495 UART:
3,565,511 UART: Running Caliptra FMC ...
3,565,919 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
891,325 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,454 UART: [kat] ++
895,606 UART: [kat] sha1
899,688 UART: [kat] SHA2-256
901,628 UART: [kat] SHA2-384
904,519 UART: [kat] SHA2-512-ACC
906,420 UART: [kat] ECC-384
916,275 UART: [kat] HMAC-384Kdf
920,771 UART: [kat] LMS
1,169,083 UART: [kat] --
1,169,840 UART: [cold-reset] ++
1,170,168 UART: [fht] FHT @ 0x50003400
1,172,956 UART: [idev] ++
1,173,124 UART: [idev] CDI.KEYID = 6
1,173,485 UART: [idev] SUBJECT.KEYID = 7
1,173,910 UART: [idev] UDS.KEYID = 0
1,174,256 ready_for_fw is high
1,174,256 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,690 UART: [idev] Erasing UDS.KEYID = 0
1,198,290 UART: [idev] Sha1 KeyId Algorithm
1,207,234 UART: [idev] --
1,208,377 UART: [ldev] ++
1,208,545 UART: [ldev] CDI.KEYID = 6
1,208,909 UART: [ldev] SUBJECT.KEYID = 5
1,209,336 UART: [ldev] AUTHORITY.KEYID = 7
1,209,799 UART: [ldev] FE.KEYID = 1
1,215,173 UART: [ldev] Erasing FE.KEYID = 1
1,241,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,459 UART: [ldev] --
1,280,881 UART: [fwproc] Wait for Commands...
1,281,640 UART: [fwproc] Recv command 0x46574c44
1,282,373 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,522 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,605 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,674,365 >>> mbox cmd response: success
2,675,500 UART: [afmc] ++
2,675,668 UART: [afmc] CDI.KEYID = 6
2,676,031 UART: [afmc] SUBJECT.KEYID = 7
2,676,457 UART: [afmc] AUTHORITY.KEYID = 5
2,712,645 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,638 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,358 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,251 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,944 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,605 UART: [afmc] --
2,755,715 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,755,737 UART: [cold-reset] --
2,756,559 UART: [state] Locking Datavault
2,757,640 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,244 UART: [state] Locking ICCM
2,758,754 UART: [exit] Launching FMC @ 0x40000000
2,764,051 UART:
2,764,067 UART: Running Caliptra FMC ...
2,764,475 UART:
2,764,613 UART: [fmc] Received command: 0x46574C44
2,765,442 UART:
2,765,458 UART: Running Caliptra ROM ...
2,765,866 UART:
2,766,008 UART: [state] CFI Enabled
2,768,734 UART: [state] LifecycleState = Unprovisioned
2,769,389 UART: [state] DebugLocked = No
2,769,999 UART: [state] WD Timer not started. Device not locked for debugging
2,771,175 UART: [kat] SHA2-256
3,574,725 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,854 UART: [kat] ++
3,579,006 UART: [kat] sha1
3,583,416 UART: [kat] SHA2-256
3,585,356 UART: [kat] SHA2-384
3,587,997 UART: [kat] SHA2-512-ACC
3,589,897 UART: [kat] ECC-384
3,599,944 UART: [kat] HMAC-384Kdf
3,604,526 UART: [kat] LMS
3,852,838 UART: [kat] --
3,853,908 UART: [update-reset] ++
3,855,435 >>> mbox cmd response: failed
3,855,897 UART: ROM Non-Fatal Error: 0x000B0001
3,856,881 UART: [state] Locking Datavault
3,857,861 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,465 UART: [state] Locking ICCM
3,859,115 UART: [exit] Launching FMC @ 0x40000000
3,864,412 UART:
3,864,428 UART: Running Caliptra FMC ...
3,864,836 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,081 ready_for_fw is high
1,057,081 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,987 >>> mbox cmd response: success
2,581,115 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,587,520 UART:
2,587,536 UART: Running Caliptra FMC ...
2,587,944 UART:
2,588,082 UART: [fmc] Received command: 0x46574C44
3,563,194 >>> mbox cmd response: failed
3,569,015 UART:
3,569,031 UART: Running Caliptra FMC ...
3,569,439 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
891,296 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,425 UART: [kat] ++
895,577 UART: [kat] sha1
899,915 UART: [kat] SHA2-256
901,855 UART: [kat] SHA2-384
904,670 UART: [kat] SHA2-512-ACC
906,571 UART: [kat] ECC-384
916,086 UART: [kat] HMAC-384Kdf
920,696 UART: [kat] LMS
1,169,008 UART: [kat] --
1,170,105 UART: [cold-reset] ++
1,170,499 UART: [fht] FHT @ 0x50003400
1,173,069 UART: [idev] ++
1,173,237 UART: [idev] CDI.KEYID = 6
1,173,598 UART: [idev] SUBJECT.KEYID = 7
1,174,023 UART: [idev] UDS.KEYID = 0
1,174,369 ready_for_fw is high
1,174,369 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,801 UART: [idev] Erasing UDS.KEYID = 0
1,199,065 UART: [idev] Sha1 KeyId Algorithm
1,207,929 UART: [idev] --
1,209,160 UART: [ldev] ++
1,209,328 UART: [ldev] CDI.KEYID = 6
1,209,692 UART: [ldev] SUBJECT.KEYID = 5
1,210,119 UART: [ldev] AUTHORITY.KEYID = 7
1,210,582 UART: [ldev] FE.KEYID = 1
1,215,950 UART: [ldev] Erasing FE.KEYID = 1
1,242,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,332 UART: [ldev] --
1,281,744 UART: [fwproc] Wait for Commands...
1,282,339 UART: [fwproc] Recv command 0x46574c44
1,283,072 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,586 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,606 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,689 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,573 >>> mbox cmd response: success
2,676,692 UART: [afmc] ++
2,676,860 UART: [afmc] CDI.KEYID = 6
2,677,223 UART: [afmc] SUBJECT.KEYID = 7
2,677,649 UART: [afmc] AUTHORITY.KEYID = 5
2,713,705 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,835 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,586 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,306 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,199 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,892 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,939 UART: [afmc] --
2,756,977 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,756,999 UART: [cold-reset] --
2,757,869 UART: [state] Locking Datavault
2,758,790 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,394 UART: [state] Locking ICCM
2,760,016 UART: [exit] Launching FMC @ 0x40000000
2,765,313 UART:
2,765,329 UART: Running Caliptra FMC ...
2,765,737 UART:
2,765,875 UART: [fmc] Received command: 0x46574C44
2,766,704 UART:
2,766,720 UART: Running Caliptra ROM ...
2,767,128 UART:
2,767,183 UART: [state] CFI Enabled
2,769,687 UART: [state] LifecycleState = Unprovisioned
2,770,342 UART: [state] DebugLocked = No
2,771,068 UART: [state] WD Timer not started. Device not locked for debugging
2,772,326 UART: [kat] SHA2-256
3,575,876 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,005 UART: [kat] ++
3,580,157 UART: [kat] sha1
3,584,359 UART: [kat] SHA2-256
3,586,299 UART: [kat] SHA2-384
3,588,908 UART: [kat] SHA2-512-ACC
3,590,808 UART: [kat] ECC-384
3,600,247 UART: [kat] HMAC-384Kdf
3,604,747 UART: [kat] LMS
3,853,059 UART: [kat] --
3,853,771 UART: [update-reset] ++
3,855,302 >>> mbox cmd response: failed
3,855,640 UART: ROM Non-Fatal Error: 0x000B0001
3,856,642 UART: [state] Locking Datavault
3,857,476 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,080 UART: [state] Locking ICCM
3,858,560 UART: [exit] Launching FMC @ 0x40000000
3,863,857 UART:
3,863,873 UART: Running Caliptra FMC ...
3,864,281 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,758 ready_for_fw is high
1,055,758 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,624 >>> mbox cmd response: success
2,580,968 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,586,661 UART:
2,586,677 UART: Running Caliptra FMC ...
2,587,085 UART:
2,587,223 UART: [fmc] Received command: 0x46574C44
3,560,392 >>> mbox cmd response: failed
3,565,963 UART:
3,565,979 UART: Running Caliptra FMC ...
3,566,387 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
891,511 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,640 UART: [kat] ++
895,792 UART: [kat] sha1
899,994 UART: [kat] SHA2-256
901,934 UART: [kat] SHA2-384
904,781 UART: [kat] SHA2-512-ACC
906,682 UART: [kat] ECC-384
916,223 UART: [kat] HMAC-384Kdf
920,855 UART: [kat] LMS
1,169,167 UART: [kat] --
1,169,974 UART: [cold-reset] ++
1,170,300 UART: [fht] FHT @ 0x50003400
1,172,838 UART: [idev] ++
1,173,006 UART: [idev] CDI.KEYID = 6
1,173,367 UART: [idev] SUBJECT.KEYID = 7
1,173,792 UART: [idev] UDS.KEYID = 0
1,174,138 ready_for_fw is high
1,174,138 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,652 UART: [idev] Erasing UDS.KEYID = 0
1,198,260 UART: [idev] Sha1 KeyId Algorithm
1,207,098 UART: [idev] --
1,208,205 UART: [ldev] ++
1,208,373 UART: [ldev] CDI.KEYID = 6
1,208,737 UART: [ldev] SUBJECT.KEYID = 5
1,209,164 UART: [ldev] AUTHORITY.KEYID = 7
1,209,627 UART: [ldev] FE.KEYID = 1
1,214,905 UART: [ldev] Erasing FE.KEYID = 1
1,241,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,945 UART: [ldev] --
1,280,281 UART: [fwproc] Wait for Commands...
1,280,874 UART: [fwproc] Recv command 0x46574c44
1,281,607 UART: [fwproc] Recv'd Img size: 106848 bytes
2,492,578 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,078 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,161 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,673,061 >>> mbox cmd response: success
2,674,104 UART: [afmc] ++
2,674,272 UART: [afmc] CDI.KEYID = 6
2,674,635 UART: [afmc] SUBJECT.KEYID = 7
2,675,061 UART: [afmc] AUTHORITY.KEYID = 5
2,710,367 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,889 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,640 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,360 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,253 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,946 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,909 UART: [afmc] --
2,753,789 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,753,811 UART: [cold-reset] --
2,754,589 UART: [state] Locking Datavault
2,756,028 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,632 UART: [state] Locking ICCM
2,757,202 UART: [exit] Launching FMC @ 0x40000000
2,762,499 UART:
2,762,515 UART: Running Caliptra FMC ...
2,762,923 UART:
2,763,061 UART: [fmc] Received command: 0x46574C44
2,763,890 UART:
2,763,906 UART: Running Caliptra ROM ...
2,764,314 UART:
2,764,456 UART: [state] CFI Enabled
2,767,298 UART: [state] LifecycleState = Unprovisioned
2,767,953 UART: [state] DebugLocked = No
2,768,499 UART: [state] WD Timer not started. Device not locked for debugging
2,769,675 UART: [kat] SHA2-256
3,573,225 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,354 UART: [kat] ++
3,577,506 UART: [kat] sha1
3,581,646 UART: [kat] SHA2-256
3,583,586 UART: [kat] SHA2-384
3,586,417 UART: [kat] SHA2-512-ACC
3,588,317 UART: [kat] ECC-384
3,598,108 UART: [kat] HMAC-384Kdf
3,602,846 UART: [kat] LMS
3,851,158 UART: [kat] --
3,852,128 UART: [update-reset] ++
3,853,413 >>> mbox cmd response: failed
3,853,741 UART: ROM Non-Fatal Error: 0x000B0001
3,854,715 UART: [state] Locking Datavault
3,855,497 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,101 UART: [state] Locking ICCM
3,856,559 UART: [exit] Launching FMC @ 0x40000000
3,861,856 UART:
3,861,872 UART: Running Caliptra FMC ...
3,862,280 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,937 ready_for_fw is high
1,056,937 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,524,873 >>> mbox cmd response: success
2,580,753 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,587,312 UART:
2,587,328 UART: Running Caliptra FMC ...
2,587,736 UART:
2,587,874 UART: [fmc] Received command: 0x46574C44
3,562,352 >>> mbox cmd response: failed
3,568,099 UART:
3,568,115 UART: Running Caliptra FMC ...
3,568,523 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,472 UART: [state] LifecycleState = Unprovisioned
86,127 UART: [state] DebugLocked = No
86,859 UART: [state] WD Timer not started. Device not locked for debugging
88,012 UART: [kat] SHA2-256
891,562 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,691 UART: [kat] ++
895,843 UART: [kat] sha1
900,151 UART: [kat] SHA2-256
902,091 UART: [kat] SHA2-384
904,816 UART: [kat] SHA2-512-ACC
906,717 UART: [kat] ECC-384
916,556 UART: [kat] HMAC-384Kdf
921,084 UART: [kat] LMS
1,169,396 UART: [kat] --
1,170,311 UART: [cold-reset] ++
1,170,675 UART: [fht] FHT @ 0x50003400
1,173,375 UART: [idev] ++
1,173,543 UART: [idev] CDI.KEYID = 6
1,173,904 UART: [idev] SUBJECT.KEYID = 7
1,174,329 UART: [idev] UDS.KEYID = 0
1,174,675 ready_for_fw is high
1,174,675 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,779 UART: [idev] Erasing UDS.KEYID = 0
1,198,783 UART: [idev] Sha1 KeyId Algorithm
1,207,595 UART: [idev] --
1,208,568 UART: [ldev] ++
1,208,736 UART: [ldev] CDI.KEYID = 6
1,209,100 UART: [ldev] SUBJECT.KEYID = 5
1,209,527 UART: [ldev] AUTHORITY.KEYID = 7
1,209,990 UART: [ldev] FE.KEYID = 1
1,215,276 UART: [ldev] Erasing FE.KEYID = 1
1,241,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,660 UART: [ldev] --
1,281,096 UART: [fwproc] Wait for Commands...
1,281,803 UART: [fwproc] Recv command 0x46574c44
1,282,536 UART: [fwproc] Recv'd Img size: 106848 bytes
2,493,249 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,685 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,768 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,673,574 >>> mbox cmd response: success
2,674,773 UART: [afmc] ++
2,674,941 UART: [afmc] CDI.KEYID = 6
2,675,304 UART: [afmc] SUBJECT.KEYID = 7
2,675,730 UART: [afmc] AUTHORITY.KEYID = 5
2,711,318 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,730 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,481 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,201 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,094 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,787 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,662 UART: [afmc] --
2,754,538 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,754,560 UART: [cold-reset] --
2,755,530 UART: [state] Locking Datavault
2,756,863 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,467 UART: [state] Locking ICCM
2,758,089 UART: [exit] Launching FMC @ 0x40000000
2,763,386 UART:
2,763,402 UART: Running Caliptra FMC ...
2,763,810 UART:
2,763,948 UART: [fmc] Received command: 0x46574C44
2,764,777 UART:
2,764,793 UART: Running Caliptra ROM ...
2,765,201 UART:
2,765,256 UART: [state] CFI Enabled
2,767,776 UART: [state] LifecycleState = Unprovisioned
2,768,431 UART: [state] DebugLocked = No
2,769,115 UART: [state] WD Timer not started. Device not locked for debugging
2,770,435 UART: [kat] SHA2-256
3,573,985 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,114 UART: [kat] ++
3,578,266 UART: [kat] sha1
3,582,342 UART: [kat] SHA2-256
3,584,282 UART: [kat] SHA2-384
3,587,067 UART: [kat] SHA2-512-ACC
3,588,967 UART: [kat] ECC-384
3,598,554 UART: [kat] HMAC-384Kdf
3,603,298 UART: [kat] LMS
3,851,610 UART: [kat] --
3,852,432 UART: [update-reset] ++
3,853,697 >>> mbox cmd response: failed
3,854,079 UART: ROM Non-Fatal Error: 0x000B0001
3,854,847 UART: [state] Locking Datavault
3,855,433 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,037 UART: [state] Locking ICCM
3,856,463 UART: [exit] Launching FMC @ 0x40000000
3,861,760 UART:
3,861,776 UART: Running Caliptra FMC ...
3,862,184 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,722 ready_for_fw is high
1,055,722 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,523,534 >>> mbox cmd response: success
2,579,026 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,585,009 UART:
2,585,025 UART: Running Caliptra FMC ...
2,585,433 UART:
2,585,571 UART: [fmc] Received command: 0x46574C44
3,559,764 >>> mbox cmd response: failed
3,565,849 UART:
3,565,865 UART: Running Caliptra FMC ...
3,566,273 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
891,327 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,456 UART: [kat] ++
895,608 UART: [kat] sha1
899,926 UART: [kat] SHA2-256
901,866 UART: [kat] SHA2-384
904,713 UART: [kat] SHA2-512-ACC
906,614 UART: [kat] ECC-384
916,063 UART: [kat] HMAC-384Kdf
920,595 UART: [kat] LMS
1,168,907 UART: [kat] --
1,170,086 UART: [cold-reset] ++
1,170,622 UART: [fht] FHT @ 0x50003400
1,173,240 UART: [idev] ++
1,173,408 UART: [idev] CDI.KEYID = 6
1,173,769 UART: [idev] SUBJECT.KEYID = 7
1,174,194 UART: [idev] UDS.KEYID = 0
1,174,540 ready_for_fw is high
1,174,540 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
1,181,954 UART: [idev] Erasing UDS.KEYID = 0
1,199,066 UART: [idev] Sha1 KeyId Algorithm
1,208,030 UART: [idev] --
1,209,179 UART: [ldev] ++
1,209,347 UART: [ldev] CDI.KEYID = 6
1,209,711 UART: [ldev] SUBJECT.KEYID = 5
1,210,138 UART: [ldev] AUTHORITY.KEYID = 7
1,210,601 UART: [ldev] FE.KEYID = 1
1,215,975 UART: [ldev] Erasing FE.KEYID = 1
1,242,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,833 UART: [ldev] --
1,282,159 UART: [fwproc] Wait for Commands...
1,282,788 UART: [fwproc] Recv command 0x46574c44
1,283,521 UART: [fwproc] Recv'd Img size: 106848 bytes
2,494,574 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,938 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,021 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,675,881 >>> mbox cmd response: success
2,676,948 UART: [afmc] ++
2,677,116 UART: [afmc] CDI.KEYID = 6
2,677,479 UART: [afmc] SUBJECT.KEYID = 7
2,677,905 UART: [afmc] AUTHORITY.KEYID = 5
2,713,979 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,336 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,056 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,949 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,642 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,437 UART: [afmc] --
2,757,533 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,757,555 UART: [cold-reset] --
2,758,241 UART: [state] Locking Datavault
2,759,422 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,026 UART: [state] Locking ICCM
2,760,540 UART: [exit] Launching FMC @ 0x40000000
2,765,837 UART:
2,765,853 UART: Running Caliptra FMC ...
2,766,261 UART:
2,766,399 UART: [fmc] Received command: 0x46574C44
2,767,228 UART:
2,767,244 UART: Running Caliptra ROM ...
2,767,652 UART:
2,767,794 UART: [state] CFI Enabled
2,770,714 UART: [state] LifecycleState = Unprovisioned
2,771,369 UART: [state] DebugLocked = No
2,772,031 UART: [state] WD Timer not started. Device not locked for debugging
2,773,177 UART: [kat] SHA2-256
3,576,727 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,856 UART: [kat] ++
3,581,008 UART: [kat] sha1
3,585,010 UART: [kat] SHA2-256
3,586,950 UART: [kat] SHA2-384
3,589,849 UART: [kat] SHA2-512-ACC
3,591,749 UART: [kat] ECC-384
3,601,380 UART: [kat] HMAC-384Kdf
3,605,886 UART: [kat] LMS
3,854,198 UART: [kat] --
3,855,032 UART: [update-reset] ++
3,856,545 >>> mbox cmd response: failed
3,856,923 UART: ROM Non-Fatal Error: 0x000B0001
3,857,825 UART: [state] Locking Datavault
3,858,577 UART: [state] Locking PCR0, PCR1 and PCR31
3,859,181 UART: [state] Locking ICCM
3,859,663 UART: [exit] Launching FMC @ 0x40000000
3,864,960 UART:
3,864,976 UART: Running Caliptra FMC ...
3,865,384 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,393 ready_for_fw is high
1,056,393 <<< Executing mbox cmd 0x46574c44 (106848 bytes) from SoC
2,525,015 >>> mbox cmd response: success
2,581,379 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,587,370 UART:
2,587,386 UART: Running Caliptra FMC ...
2,587,794 UART:
2,587,932 UART: [fmc] Received command: 0x46574C44
3,562,176 >>> mbox cmd response: failed
3,568,023 UART:
3,568,039 UART: Running Caliptra FMC ...
3,568,447 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,514 UART: [state] LifecycleState = Unprovisioned
86,169 UART: [state] DebugLocked = No
86,845 UART: [state] WD Timer not started. Device not locked for debugging
88,000 UART: [kat] SHA2-256
891,550 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,679 UART: [kat] ++
895,831 UART: [kat] sha1
900,113 UART: [kat] SHA2-256
902,053 UART: [kat] SHA2-384
904,578 UART: [kat] SHA2-512-ACC
906,479 UART: [kat] ECC-384
916,016 UART: [kat] HMAC-384Kdf
920,512 UART: [kat] LMS
1,168,824 UART: [kat] --
1,169,761 UART: [cold-reset] ++
1,170,275 UART: [fht] FHT @ 0x50003400
1,173,127 UART: [idev] ++
1,173,295 UART: [idev] CDI.KEYID = 6
1,173,656 UART: [idev] SUBJECT.KEYID = 7
1,174,081 UART: [idev] UDS.KEYID = 0
1,182,057 UART: [idev] Erasing UDS.KEYID = 0
1,198,471 UART: [idev] Sha1 KeyId Algorithm
1,207,259 UART: [idev] --
1,208,516 UART: [ldev] ++
1,208,684 UART: [ldev] CDI.KEYID = 6
1,209,048 UART: [ldev] SUBJECT.KEYID = 5
1,209,475 UART: [ldev] AUTHORITY.KEYID = 7
1,209,938 UART: [ldev] FE.KEYID = 1
1,214,884 UART: [ldev] Erasing FE.KEYID = 1
1,240,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,398 UART: [ldev] --
1,279,700 UART: [fwproc] Wait for Commands...
1,280,337 UART: [fwproc] Recv command 0x46505652
1,281,164 UART: [rt] FIPS Version
1,281,725 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,135,498 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,049 UART: [state] LifecycleState = Unprovisioned
85,704 UART: [state] DebugLocked = No
86,330 UART: [state] WD Timer not started. Device not locked for debugging
87,523 UART: [kat] SHA2-256
891,073 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,202 UART: [kat] ++
895,354 UART: [kat] sha1
899,516 UART: [kat] SHA2-256
901,456 UART: [kat] SHA2-384
904,115 UART: [kat] SHA2-512-ACC
906,016 UART: [kat] ECC-384
915,817 UART: [kat] HMAC-384Kdf
920,447 UART: [kat] LMS
1,168,759 UART: [kat] --
1,169,794 UART: [cold-reset] ++
1,170,346 UART: [fht] FHT @ 0x50003400
1,173,060 UART: [idev] ++
1,173,228 UART: [idev] CDI.KEYID = 6
1,173,589 UART: [idev] SUBJECT.KEYID = 7
1,174,014 UART: [idev] UDS.KEYID = 0
1,182,340 UART: [idev] Erasing UDS.KEYID = 0
1,199,394 UART: [idev] Sha1 KeyId Algorithm
1,208,080 UART: [idev] --
1,209,193 UART: [ldev] ++
1,209,361 UART: [ldev] CDI.KEYID = 6
1,209,725 UART: [ldev] SUBJECT.KEYID = 5
1,210,152 UART: [ldev] AUTHORITY.KEYID = 7
1,210,615 UART: [ldev] FE.KEYID = 1
1,215,615 UART: [ldev] Erasing FE.KEYID = 1
1,241,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,305 UART: [ldev] --
1,281,569 UART: [fwproc] Wait for Commands...
1,282,268 UART: [fwproc] Recv command 0x46505652
1,283,095 UART: [rt] FIPS Version
1,283,656 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,241 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,863 UART: [kat] SHA2-256
901,803 UART: [kat] SHA2-384
904,706 UART: [kat] SHA2-512-ACC
906,607 UART: [kat] ECC-384
916,168 UART: [kat] HMAC-384Kdf
920,794 UART: [kat] LMS
1,169,106 UART: [kat] --
1,169,983 UART: [cold-reset] ++
1,170,495 UART: [fht] FHT @ 0x50003400
1,173,157 UART: [idev] ++
1,173,325 UART: [idev] CDI.KEYID = 6
1,173,686 UART: [idev] SUBJECT.KEYID = 7
1,174,111 UART: [idev] UDS.KEYID = 0
1,181,785 UART: [idev] Erasing UDS.KEYID = 0
1,198,587 UART: [idev] Sha1 KeyId Algorithm
1,207,471 UART: [idev] --
1,208,498 UART: [ldev] ++
1,208,666 UART: [ldev] CDI.KEYID = 6
1,209,030 UART: [ldev] SUBJECT.KEYID = 5
1,209,457 UART: [ldev] AUTHORITY.KEYID = 7
1,209,920 UART: [ldev] FE.KEYID = 1
1,215,080 UART: [ldev] Erasing FE.KEYID = 1
1,240,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,698 UART: [ldev] --
1,280,162 UART: [fwproc] Wait for Commands...
1,280,901 UART: [fwproc] Recv command 0x46505652
1,281,728 UART: [rt] FIPS Version
1,282,289 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,135,408 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
891,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,662 UART: [kat] ++
895,814 UART: [kat] sha1
899,944 UART: [kat] SHA2-256
901,884 UART: [kat] SHA2-384
904,719 UART: [kat] SHA2-512-ACC
906,620 UART: [kat] ECC-384
916,329 UART: [kat] HMAC-384Kdf
921,037 UART: [kat] LMS
1,169,349 UART: [kat] --
1,170,122 UART: [cold-reset] ++
1,170,696 UART: [fht] FHT @ 0x50003400
1,173,478 UART: [idev] ++
1,173,646 UART: [idev] CDI.KEYID = 6
1,174,007 UART: [idev] SUBJECT.KEYID = 7
1,174,432 UART: [idev] UDS.KEYID = 0
1,182,810 UART: [idev] Erasing UDS.KEYID = 0
1,199,236 UART: [idev] Sha1 KeyId Algorithm
1,207,974 UART: [idev] --
1,208,965 UART: [ldev] ++
1,209,133 UART: [ldev] CDI.KEYID = 6
1,209,497 UART: [ldev] SUBJECT.KEYID = 5
1,209,924 UART: [ldev] AUTHORITY.KEYID = 7
1,210,387 UART: [ldev] FE.KEYID = 1
1,215,867 UART: [ldev] Erasing FE.KEYID = 1
1,242,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,775 UART: [ldev] --
1,281,125 UART: [fwproc] Wait for Commands...
1,281,700 UART: [fwproc] Recv command 0x46505652
1,282,527 UART: [rt] FIPS Version
1,283,088 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,497 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,325 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,273 UART: [kat] ++
895,425 UART: [kat] sha1
899,701 UART: [kat] SHA2-256
901,641 UART: [kat] SHA2-384
904,564 UART: [kat] SHA2-512-ACC
906,465 UART: [kat] ECC-384
916,386 UART: [kat] HMAC-384Kdf
920,812 UART: [kat] LMS
1,169,124 UART: [kat] --
1,170,201 UART: [cold-reset] ++
1,170,767 UART: [fht] FHT @ 0x50003400
1,173,471 UART: [idev] ++
1,173,639 UART: [idev] CDI.KEYID = 6
1,174,000 UART: [idev] SUBJECT.KEYID = 7
1,174,425 UART: [idev] UDS.KEYID = 0
1,182,447 UART: [idev] Erasing UDS.KEYID = 0
1,199,383 UART: [idev] Sha1 KeyId Algorithm
1,208,127 UART: [idev] --
1,209,066 UART: [ldev] ++
1,209,234 UART: [ldev] CDI.KEYID = 6
1,209,598 UART: [ldev] SUBJECT.KEYID = 5
1,210,025 UART: [ldev] AUTHORITY.KEYID = 7
1,210,488 UART: [ldev] FE.KEYID = 1
1,215,428 UART: [ldev] Erasing FE.KEYID = 1
1,241,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,604 UART: [ldev] --
1,280,894 UART: [fwproc] Wait for Commands...
1,281,621 UART: [fwproc] Recv command 0x46505652
1,282,448 UART: [rt] FIPS Version
1,283,009 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,324 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,448 UART: [state] WD Timer not started. Device not locked for debugging
87,647 UART: [kat] SHA2-256
891,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,810 UART: [kat] SHA2-256
901,750 UART: [kat] SHA2-384
904,435 UART: [kat] SHA2-512-ACC
906,336 UART: [kat] ECC-384
916,095 UART: [kat] HMAC-384Kdf
920,679 UART: [kat] LMS
1,168,991 UART: [kat] --
1,170,022 UART: [cold-reset] ++
1,170,520 UART: [fht] FHT @ 0x50003400
1,173,112 UART: [idev] ++
1,173,280 UART: [idev] CDI.KEYID = 6
1,173,641 UART: [idev] SUBJECT.KEYID = 7
1,174,066 UART: [idev] UDS.KEYID = 0
1,182,344 UART: [idev] Erasing UDS.KEYID = 0
1,199,156 UART: [idev] Sha1 KeyId Algorithm
1,207,920 UART: [idev] --
1,209,077 UART: [ldev] ++
1,209,245 UART: [ldev] CDI.KEYID = 6
1,209,609 UART: [ldev] SUBJECT.KEYID = 5
1,210,036 UART: [ldev] AUTHORITY.KEYID = 7
1,210,499 UART: [ldev] FE.KEYID = 1
1,215,923 UART: [ldev] Erasing FE.KEYID = 1
1,241,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,899 UART: [ldev] --
1,281,307 UART: [fwproc] Wait for Commands...
1,282,028 UART: [fwproc] Recv command 0x46505652
1,282,855 UART: [rt] FIPS Version
1,283,416 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,315 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
890,930 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,059 UART: [kat] ++
895,211 UART: [kat] sha1
899,421 UART: [kat] SHA2-256
901,361 UART: [kat] SHA2-384
904,112 UART: [kat] SHA2-512-ACC
906,013 UART: [kat] ECC-384
915,754 UART: [kat] HMAC-384Kdf
920,300 UART: [kat] LMS
1,168,612 UART: [kat] --
1,169,349 UART: [cold-reset] ++
1,169,711 UART: [fht] FHT @ 0x50003400
1,172,215 UART: [idev] ++
1,172,383 UART: [idev] CDI.KEYID = 6
1,172,744 UART: [idev] SUBJECT.KEYID = 7
1,173,169 UART: [idev] UDS.KEYID = 0
1,180,925 UART: [idev] Erasing UDS.KEYID = 0
1,197,763 UART: [idev] Sha1 KeyId Algorithm
1,206,751 UART: [idev] --
1,207,746 UART: [ldev] ++
1,207,914 UART: [ldev] CDI.KEYID = 6
1,208,278 UART: [ldev] SUBJECT.KEYID = 5
1,208,705 UART: [ldev] AUTHORITY.KEYID = 7
1,209,168 UART: [ldev] FE.KEYID = 1
1,214,124 UART: [ldev] Erasing FE.KEYID = 1
1,240,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,136 UART: [ldev] --
1,279,414 UART: [fwproc] Wait for Commands...
1,280,239 UART: [fwproc] Recv command 0x46574c44
1,280,972 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,460 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,769 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,653 >>> mbox cmd response: success
2,772,796 UART: [afmc] ++
2,772,964 UART: [afmc] CDI.KEYID = 6
2,773,327 UART: [afmc] SUBJECT.KEYID = 7
2,773,753 UART: [afmc] AUTHORITY.KEYID = 5
2,809,390 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,748 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,499 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,228 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,111 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,830 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,851,712 UART:
2,851,728 UART: Running Caliptra ROM ...
2,852,136 UART:
2,852,191 UART: [state] CFI Enabled
2,854,773 UART: [state] LifecycleState = Unprovisioned
2,855,428 UART: [state] DebugLocked = No
2,856,090 UART: [state] WD Timer not started. Device not locked for debugging
2,857,341 UART: [kat] SHA2-256
3,660,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,020 UART: [kat] ++
3,665,172 UART: [kat] sha1
3,669,662 UART: [kat] SHA2-256
3,671,602 UART: [kat] SHA2-384
3,674,373 UART: [kat] SHA2-512-ACC
3,676,274 UART: [kat] ECC-384
3,686,219 UART: [kat] HMAC-384Kdf
3,690,869 UART: [kat] LMS
3,939,181 UART: [kat] --
3,940,037 UART: [warm-reset] ++
3,940,305 UART: [warm-reset] Prev Cold-Reset failed
3,941,456 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,439 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,707 UART: [state] LifecycleState = Unprovisioned
86,362 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,277 UART: [kat] SHA2-256
891,827 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,956 UART: [kat] ++
896,108 UART: [kat] sha1
900,148 UART: [kat] SHA2-256
902,088 UART: [kat] SHA2-384
904,825 UART: [kat] SHA2-512-ACC
906,726 UART: [kat] ECC-384
916,471 UART: [kat] HMAC-384Kdf
921,185 UART: [kat] LMS
1,169,497 UART: [kat] --
1,170,374 UART: [cold-reset] ++
1,170,860 UART: [fht] FHT @ 0x50003400
1,173,516 UART: [idev] ++
1,173,684 UART: [idev] CDI.KEYID = 6
1,174,045 UART: [idev] SUBJECT.KEYID = 7
1,174,470 UART: [idev] UDS.KEYID = 0
1,182,370 UART: [idev] Erasing UDS.KEYID = 0
1,199,832 UART: [idev] Sha1 KeyId Algorithm
1,208,636 UART: [idev] --
1,209,491 UART: [ldev] ++
1,209,659 UART: [ldev] CDI.KEYID = 6
1,210,023 UART: [ldev] SUBJECT.KEYID = 5
1,210,450 UART: [ldev] AUTHORITY.KEYID = 7
1,210,913 UART: [ldev] FE.KEYID = 1
1,216,285 UART: [ldev] Erasing FE.KEYID = 1
1,242,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,559 UART: [ldev] --
1,282,065 UART: [fwproc] Wait for Commands...
1,282,696 UART: [fwproc] Recv command 0x46574c44
1,283,429 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,503 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,812 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,664 >>> mbox cmd response: success
2,773,721 UART: [afmc] ++
2,773,889 UART: [afmc] CDI.KEYID = 6
2,774,252 UART: [afmc] SUBJECT.KEYID = 7
2,774,678 UART: [afmc] AUTHORITY.KEYID = 5
2,810,537 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,659 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,410 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,139 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,022 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,741 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,852,545 UART:
2,852,561 UART: Running Caliptra ROM ...
2,852,969 UART:
2,853,111 UART: [state] CFI Enabled
2,855,947 UART: [state] LifecycleState = Unprovisioned
2,856,602 UART: [state] DebugLocked = No
2,857,104 UART: [state] WD Timer not started. Device not locked for debugging
2,858,255 UART: [kat] SHA2-256
3,661,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,934 UART: [kat] ++
3,666,086 UART: [kat] sha1
3,670,364 UART: [kat] SHA2-256
3,672,304 UART: [kat] SHA2-384
3,675,027 UART: [kat] SHA2-512-ACC
3,676,928 UART: [kat] ECC-384
3,686,437 UART: [kat] HMAC-384Kdf
3,690,935 UART: [kat] LMS
3,939,247 UART: [kat] --
3,939,909 UART: [warm-reset] ++
3,940,177 UART: [warm-reset] Prev Cold-Reset failed
3,940,966 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,296 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,416 UART: [state] LifecycleState = Unprovisioned
86,071 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,379 UART: [kat] ++
895,531 UART: [kat] sha1
899,673 UART: [kat] SHA2-256
901,613 UART: [kat] SHA2-384
904,402 UART: [kat] SHA2-512-ACC
906,303 UART: [kat] ECC-384
915,640 UART: [kat] HMAC-384Kdf
920,344 UART: [kat] LMS
1,168,656 UART: [kat] --
1,169,483 UART: [cold-reset] ++
1,169,845 UART: [fht] FHT @ 0x50003400
1,172,503 UART: [idev] ++
1,172,671 UART: [idev] CDI.KEYID = 6
1,173,032 UART: [idev] SUBJECT.KEYID = 7
1,173,457 UART: [idev] UDS.KEYID = 0
1,181,669 UART: [idev] Erasing UDS.KEYID = 0
1,198,285 UART: [idev] Sha1 KeyId Algorithm
1,207,273 UART: [idev] --
1,208,450 UART: [ldev] ++
1,208,618 UART: [ldev] CDI.KEYID = 6
1,208,982 UART: [ldev] SUBJECT.KEYID = 5
1,209,409 UART: [ldev] AUTHORITY.KEYID = 7
1,209,872 UART: [ldev] FE.KEYID = 1
1,215,270 UART: [ldev] Erasing FE.KEYID = 1
1,241,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,166 UART: [ldev] --
1,281,530 UART: [fwproc] Wait for Commands...
1,282,213 UART: [fwproc] Recv command 0x46574c44
1,282,946 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,576 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,784 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,093 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,791 >>> mbox cmd response: success
2,772,948 UART: [afmc] ++
2,773,116 UART: [afmc] CDI.KEYID = 6
2,773,479 UART: [afmc] SUBJECT.KEYID = 7
2,773,905 UART: [afmc] AUTHORITY.KEYID = 5
2,809,352 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,716 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,467 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,196 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,079 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,798 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,851,874 UART:
2,851,890 UART: Running Caliptra ROM ...
2,852,298 UART:
2,852,353 UART: [state] CFI Enabled
2,855,217 UART: [state] LifecycleState = Unprovisioned
2,855,872 UART: [state] DebugLocked = No
2,856,500 UART: [state] WD Timer not started. Device not locked for debugging
2,857,775 UART: [kat] SHA2-256
3,661,325 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,454 UART: [kat] ++
3,665,606 UART: [kat] sha1
3,669,968 UART: [kat] SHA2-256
3,671,908 UART: [kat] SHA2-384
3,674,729 UART: [kat] SHA2-512-ACC
3,676,630 UART: [kat] ECC-384
3,685,903 UART: [kat] HMAC-384Kdf
3,690,343 UART: [kat] LMS
3,938,655 UART: [kat] --
3,939,563 UART: [warm-reset] ++
3,939,831 UART: [warm-reset] Prev Cold-Reset failed
3,940,912 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,747 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,041 UART: [state] LifecycleState = Unprovisioned
85,696 UART: [state] DebugLocked = No
86,266 UART: [state] WD Timer not started. Device not locked for debugging
87,435 UART: [kat] SHA2-256
890,985 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,114 UART: [kat] ++
895,266 UART: [kat] sha1
899,548 UART: [kat] SHA2-256
901,488 UART: [kat] SHA2-384
904,349 UART: [kat] SHA2-512-ACC
906,250 UART: [kat] ECC-384
916,103 UART: [kat] HMAC-384Kdf
920,707 UART: [kat] LMS
1,169,019 UART: [kat] --
1,169,898 UART: [cold-reset] ++
1,170,276 UART: [fht] FHT @ 0x50003400
1,172,892 UART: [idev] ++
1,173,060 UART: [idev] CDI.KEYID = 6
1,173,421 UART: [idev] SUBJECT.KEYID = 7
1,173,846 UART: [idev] UDS.KEYID = 0
1,181,714 UART: [idev] Erasing UDS.KEYID = 0
1,198,026 UART: [idev] Sha1 KeyId Algorithm
1,206,996 UART: [idev] --
1,207,929 UART: [ldev] ++
1,208,097 UART: [ldev] CDI.KEYID = 6
1,208,461 UART: [ldev] SUBJECT.KEYID = 5
1,208,888 UART: [ldev] AUTHORITY.KEYID = 7
1,209,351 UART: [ldev] FE.KEYID = 1
1,214,397 UART: [ldev] Erasing FE.KEYID = 1
1,241,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,423 UART: [ldev] --
1,280,929 UART: [fwproc] Wait for Commands...
1,281,534 UART: [fwproc] Recv command 0x46574c44
1,282,267 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,403 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,009 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,138 >>> mbox cmd response: success
2,773,321 UART: [afmc] ++
2,773,489 UART: [afmc] CDI.KEYID = 6
2,773,852 UART: [afmc] SUBJECT.KEYID = 7
2,774,278 UART: [afmc] AUTHORITY.KEYID = 5
2,809,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,261 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,012 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,741 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,624 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,343 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,852,425 UART:
2,852,441 UART: Running Caliptra ROM ...
2,852,849 UART:
2,852,991 UART: [state] CFI Enabled
2,855,557 UART: [state] LifecycleState = Unprovisioned
2,856,212 UART: [state] DebugLocked = No
2,856,748 UART: [state] WD Timer not started. Device not locked for debugging
2,858,001 UART: [kat] SHA2-256
3,661,551 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,680 UART: [kat] ++
3,665,832 UART: [kat] sha1
3,670,054 UART: [kat] SHA2-256
3,671,994 UART: [kat] SHA2-384
3,674,935 UART: [kat] SHA2-512-ACC
3,676,836 UART: [kat] ECC-384
3,686,413 UART: [kat] HMAC-384Kdf
3,691,033 UART: [kat] LMS
3,939,345 UART: [kat] --
3,940,221 UART: [warm-reset] ++
3,940,489 UART: [warm-reset] Prev Cold-Reset failed
3,941,486 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,366 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
891,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,365 UART: [kat] ++
895,517 UART: [kat] sha1
899,713 UART: [kat] SHA2-256
901,653 UART: [kat] SHA2-384
904,260 UART: [kat] SHA2-512-ACC
906,161 UART: [kat] ECC-384
915,384 UART: [kat] HMAC-384Kdf
919,850 UART: [kat] LMS
1,168,162 UART: [kat] --
1,168,995 UART: [cold-reset] ++
1,169,353 UART: [fht] FHT @ 0x50003400
1,172,093 UART: [idev] ++
1,172,261 UART: [idev] CDI.KEYID = 6
1,172,622 UART: [idev] SUBJECT.KEYID = 7
1,173,047 UART: [idev] UDS.KEYID = 0
1,180,993 UART: [idev] Erasing UDS.KEYID = 0
1,197,995 UART: [idev] Sha1 KeyId Algorithm
1,206,835 UART: [idev] --
1,207,724 UART: [ldev] ++
1,207,892 UART: [ldev] CDI.KEYID = 6
1,208,256 UART: [ldev] SUBJECT.KEYID = 5
1,208,683 UART: [ldev] AUTHORITY.KEYID = 7
1,209,146 UART: [ldev] FE.KEYID = 1
1,214,490 UART: [ldev] Erasing FE.KEYID = 1
1,240,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,150 UART: [ldev] --
1,279,470 UART: [fwproc] Wait for Commands...
1,280,043 UART: [fwproc] Recv command 0x46574c44
1,280,776 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,850 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,159 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,051 >>> mbox cmd response: success
2,771,070 UART: [afmc] ++
2,771,238 UART: [afmc] CDI.KEYID = 6
2,771,601 UART: [afmc] SUBJECT.KEYID = 7
2,772,027 UART: [afmc] AUTHORITY.KEYID = 5
2,807,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,746 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,497 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,226 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,109 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,828 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,849,670 UART:
2,849,686 UART: Running Caliptra ROM ...
2,850,094 UART:
2,850,149 UART: [state] CFI Enabled
2,852,755 UART: [state] LifecycleState = Unprovisioned
2,853,410 UART: [state] DebugLocked = No
2,854,120 UART: [state] WD Timer not started. Device not locked for debugging
2,855,403 UART: [kat] SHA2-256
3,658,953 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,663,082 UART: [kat] ++
3,663,234 UART: [kat] sha1
3,667,468 UART: [kat] SHA2-256
3,669,408 UART: [kat] SHA2-384
3,672,047 UART: [kat] SHA2-512-ACC
3,673,948 UART: [kat] ECC-384
3,683,751 UART: [kat] HMAC-384Kdf
3,688,267 UART: [kat] LMS
3,936,579 UART: [kat] --
3,937,431 UART: [warm-reset] ++
3,937,699 UART: [warm-reset] Prev Cold-Reset failed
3,938,638 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,561 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,751 UART: [kat] SHA2-256
891,301 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,430 UART: [kat] ++
895,582 UART: [kat] sha1
899,802 UART: [kat] SHA2-256
901,742 UART: [kat] SHA2-384
904,525 UART: [kat] SHA2-512-ACC
906,426 UART: [kat] ECC-384
915,989 UART: [kat] HMAC-384Kdf
920,705 UART: [kat] LMS
1,169,017 UART: [kat] --
1,169,912 UART: [cold-reset] ++
1,170,378 UART: [fht] FHT @ 0x50003400
1,173,078 UART: [idev] ++
1,173,246 UART: [idev] CDI.KEYID = 6
1,173,607 UART: [idev] SUBJECT.KEYID = 7
1,174,032 UART: [idev] UDS.KEYID = 0
1,182,202 UART: [idev] Erasing UDS.KEYID = 0
1,199,828 UART: [idev] Sha1 KeyId Algorithm
1,208,542 UART: [idev] --
1,209,609 UART: [ldev] ++
1,209,777 UART: [ldev] CDI.KEYID = 6
1,210,141 UART: [ldev] SUBJECT.KEYID = 5
1,210,568 UART: [ldev] AUTHORITY.KEYID = 7
1,211,031 UART: [ldev] FE.KEYID = 1
1,216,319 UART: [ldev] Erasing FE.KEYID = 1
1,242,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,791 UART: [ldev] --
1,282,253 UART: [fwproc] Wait for Commands...
1,283,066 UART: [fwproc] Recv command 0x46574c44
1,283,799 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,431 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,740 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,526 >>> mbox cmd response: success
2,774,675 UART: [afmc] ++
2,774,843 UART: [afmc] CDI.KEYID = 6
2,775,206 UART: [afmc] SUBJECT.KEYID = 7
2,775,632 UART: [afmc] AUTHORITY.KEYID = 5
2,811,625 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,363 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,114 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,843 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,726 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,445 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,854,371 UART:
2,854,387 UART: Running Caliptra ROM ...
2,854,795 UART:
2,854,937 UART: [state] CFI Enabled
2,857,877 UART: [state] LifecycleState = Unprovisioned
2,858,532 UART: [state] DebugLocked = No
2,859,236 UART: [state] WD Timer not started. Device not locked for debugging
2,860,381 UART: [kat] SHA2-256
3,663,931 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,668,060 UART: [kat] ++
3,668,212 UART: [kat] sha1
3,672,650 UART: [kat] SHA2-256
3,674,590 UART: [kat] SHA2-384
3,677,207 UART: [kat] SHA2-512-ACC
3,679,108 UART: [kat] ECC-384
3,688,637 UART: [kat] HMAC-384Kdf
3,693,401 UART: [kat] LMS
3,941,713 UART: [kat] --
3,942,421 UART: [warm-reset] ++
3,942,689 UART: [warm-reset] Prev Cold-Reset failed
3,943,692 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,322 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Production
85,749 UART: [state] DebugLocked = No
86,439 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,827 UART: [kat] SHA2-256
901,767 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
915,722 UART: [kat] HMAC-384Kdf
920,154 UART: [kat] LMS
1,168,466 UART: [kat] --
1,169,233 UART: [cold-reset] ++
1,169,663 UART: [fht] FHT @ 0x50003400
1,172,557 UART: [idev] ++
1,172,725 UART: [idev] CDI.KEYID = 6
1,173,086 UART: [idev] SUBJECT.KEYID = 7
1,173,511 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,109 UART:
1,175,125 UART: Running Caliptra ROM ...
1,175,533 UART:
1,175,588 UART: [state] CFI Enabled
1,178,662 UART: [state] LifecycleState = Production
1,179,269 UART: [state] DebugLocked = No
1,179,827 UART: [state] WD Timer not started. Device not locked for debugging
1,181,136 UART: [kat] SHA2-256
1,984,686 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,815 UART: [kat] ++
1,988,967 UART: [kat] sha1
1,993,369 UART: [kat] SHA2-256
1,995,309 UART: [kat] SHA2-384
1,998,144 UART: [kat] SHA2-512-ACC
2,000,045 UART: [kat] ECC-384
2,009,970 UART: [kat] HMAC-384Kdf
2,014,532 UART: [kat] LMS
2,262,844 UART: [kat] --
2,263,924 UART: [warm-reset] ++
2,264,192 UART: [warm-reset] Prev Cold-Reset failed
2,265,105 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Production
86,192 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
891,381 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,510 UART: [kat] ++
895,662 UART: [kat] sha1
899,856 UART: [kat] SHA2-256
901,796 UART: [kat] SHA2-384
904,575 UART: [kat] SHA2-512-ACC
906,476 UART: [kat] ECC-384
916,285 UART: [kat] HMAC-384Kdf
921,061 UART: [kat] LMS
1,169,373 UART: [kat] --
1,170,298 UART: [cold-reset] ++
1,170,700 UART: [fht] FHT @ 0x50003400
1,173,154 UART: [idev] ++
1,173,322 UART: [idev] CDI.KEYID = 6
1,173,683 UART: [idev] SUBJECT.KEYID = 7
1,174,108 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,852 UART:
1,175,868 UART: Running Caliptra ROM ...
1,176,276 UART:
1,176,418 UART: [state] CFI Enabled
1,179,190 UART: [state] LifecycleState = Production
1,179,797 UART: [state] DebugLocked = No
1,180,373 UART: [state] WD Timer not started. Device not locked for debugging
1,181,720 UART: [kat] SHA2-256
1,985,270 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,399 UART: [kat] ++
1,989,551 UART: [kat] sha1
1,993,887 UART: [kat] SHA2-256
1,995,827 UART: [kat] SHA2-384
1,998,692 UART: [kat] SHA2-512-ACC
2,000,593 UART: [kat] ECC-384
2,009,930 UART: [kat] HMAC-384Kdf
2,014,590 UART: [kat] LMS
2,262,902 UART: [kat] --
2,264,000 UART: [warm-reset] ++
2,264,268 UART: [warm-reset] Prev Cold-Reset failed
2,265,125 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Production
85,591 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,492 UART: [kat] SHA2-256
891,042 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,171 UART: [kat] ++
895,323 UART: [kat] sha1
899,631 UART: [kat] SHA2-256
901,571 UART: [kat] SHA2-384
904,448 UART: [kat] SHA2-512-ACC
906,349 UART: [kat] ECC-384
915,942 UART: [kat] HMAC-384Kdf
920,518 UART: [kat] LMS
1,168,830 UART: [kat] --
1,170,017 UART: [cold-reset] ++
1,170,593 UART: [fht] FHT @ 0x50003400
1,173,191 UART: [idev] ++
1,173,359 UART: [idev] CDI.KEYID = 6
1,173,720 UART: [idev] SUBJECT.KEYID = 7
1,174,145 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,745 UART:
1,175,761 UART: Running Caliptra ROM ...
1,176,169 UART:
1,176,224 UART: [state] CFI Enabled
1,178,528 UART: [state] LifecycleState = Production
1,179,135 UART: [state] DebugLocked = No
1,179,725 UART: [state] WD Timer not started. Device not locked for debugging
1,180,858 UART: [kat] SHA2-256
1,984,408 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,537 UART: [kat] ++
1,988,689 UART: [kat] sha1
1,992,873 UART: [kat] SHA2-256
1,994,813 UART: [kat] SHA2-384
1,997,532 UART: [kat] SHA2-512-ACC
1,999,433 UART: [kat] ECC-384
2,008,894 UART: [kat] HMAC-384Kdf
2,013,662 UART: [kat] LMS
2,261,974 UART: [kat] --
2,262,902 UART: [warm-reset] ++
2,263,170 UART: [warm-reset] Prev Cold-Reset failed
2,264,093 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Production
86,186 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
891,541 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,670 UART: [kat] ++
895,822 UART: [kat] sha1
900,226 UART: [kat] SHA2-256
902,166 UART: [kat] SHA2-384
904,997 UART: [kat] SHA2-512-ACC
906,898 UART: [kat] ECC-384
916,935 UART: [kat] HMAC-384Kdf
921,337 UART: [kat] LMS
1,169,649 UART: [kat] --
1,170,554 UART: [cold-reset] ++
1,171,032 UART: [fht] FHT @ 0x50003400
1,173,576 UART: [idev] ++
1,173,744 UART: [idev] CDI.KEYID = 6
1,174,105 UART: [idev] SUBJECT.KEYID = 7
1,174,530 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,176,196 UART:
1,176,212 UART: Running Caliptra ROM ...
1,176,620 UART:
1,176,762 UART: [state] CFI Enabled
1,179,932 UART: [state] LifecycleState = Production
1,180,539 UART: [state] DebugLocked = No
1,181,051 UART: [state] WD Timer not started. Device not locked for debugging
1,182,244 UART: [kat] SHA2-256
1,985,794 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,923 UART: [kat] ++
1,990,075 UART: [kat] sha1
1,994,341 UART: [kat] SHA2-256
1,996,281 UART: [kat] SHA2-384
1,999,006 UART: [kat] SHA2-512-ACC
2,000,907 UART: [kat] ECC-384
2,010,682 UART: [kat] HMAC-384Kdf
2,015,224 UART: [kat] LMS
2,263,536 UART: [kat] --
2,264,468 UART: [warm-reset] ++
2,264,736 UART: [warm-reset] Prev Cold-Reset failed
2,265,649 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Production
85,873 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
891,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,361 UART: [kat] ++
895,513 UART: [kat] sha1
899,845 UART: [kat] SHA2-256
901,785 UART: [kat] SHA2-384
904,576 UART: [kat] SHA2-512-ACC
906,477 UART: [kat] ECC-384
915,780 UART: [kat] HMAC-384Kdf
920,312 UART: [kat] LMS
1,168,624 UART: [kat] --
1,169,543 UART: [cold-reset] ++
1,170,055 UART: [fht] FHT @ 0x50003400
1,172,763 UART: [idev] ++
1,172,931 UART: [idev] CDI.KEYID = 6
1,173,292 UART: [idev] SUBJECT.KEYID = 7
1,173,717 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,273 UART:
1,175,289 UART: Running Caliptra ROM ...
1,175,697 UART:
1,175,752 UART: [state] CFI Enabled
1,178,572 UART: [state] LifecycleState = Production
1,179,179 UART: [state] DebugLocked = No
1,179,779 UART: [state] WD Timer not started. Device not locked for debugging
1,181,104 UART: [kat] SHA2-256
1,984,654 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,783 UART: [kat] ++
1,988,935 UART: [kat] sha1
1,993,185 UART: [kat] SHA2-256
1,995,125 UART: [kat] SHA2-384
1,997,852 UART: [kat] SHA2-512-ACC
1,999,753 UART: [kat] ECC-384
2,009,600 UART: [kat] HMAC-384Kdf
2,014,396 UART: [kat] LMS
2,262,708 UART: [kat] --
2,263,626 UART: [warm-reset] ++
2,263,894 UART: [warm-reset] Prev Cold-Reset failed
2,264,787 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,935 UART: [state] LifecycleState = Production
86,542 UART: [state] DebugLocked = No
87,040 UART: [state] WD Timer not started. Device not locked for debugging
88,277 UART: [kat] SHA2-256
891,827 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,956 UART: [kat] ++
896,108 UART: [kat] sha1
900,314 UART: [kat] SHA2-256
902,254 UART: [kat] SHA2-384
905,127 UART: [kat] SHA2-512-ACC
907,028 UART: [kat] ECC-384
916,547 UART: [kat] HMAC-384Kdf
921,259 UART: [kat] LMS
1,169,571 UART: [kat] --
1,170,392 UART: [cold-reset] ++
1,170,964 UART: [fht] FHT @ 0x50003400
1,173,552 UART: [idev] ++
1,173,720 UART: [idev] CDI.KEYID = 6
1,174,081 UART: [idev] SUBJECT.KEYID = 7
1,174,506 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,176,056 UART:
1,176,072 UART: Running Caliptra ROM ...
1,176,480 UART:
1,176,622 UART: [state] CFI Enabled
1,179,412 UART: [state] LifecycleState = Production
1,180,019 UART: [state] DebugLocked = No
1,180,557 UART: [state] WD Timer not started. Device not locked for debugging
1,181,894 UART: [kat] SHA2-256
1,985,444 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,573 UART: [kat] ++
1,989,725 UART: [kat] sha1
1,993,987 UART: [kat] SHA2-256
1,995,927 UART: [kat] SHA2-384
1,998,672 UART: [kat] SHA2-512-ACC
2,000,573 UART: [kat] ECC-384
2,010,062 UART: [kat] HMAC-384Kdf
2,014,690 UART: [kat] LMS
2,263,002 UART: [kat] --
2,263,462 UART: [warm-reset] ++
2,263,730 UART: [warm-reset] Prev Cold-Reset failed
2,264,881 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,756 UART: [state] LifecycleState = Unprovisioned
85,411 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,452 UART: [kat] SHA2-256
891,002 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,131 UART: [kat] ++
895,283 UART: [kat] sha1
899,331 UART: [kat] SHA2-256
901,271 UART: [kat] SHA2-384
903,904 UART: [kat] SHA2-512-ACC
905,805 UART: [kat] ECC-384
915,714 UART: [kat] HMAC-384Kdf
920,348 UART: [kat] LMS
1,168,660 UART: [kat] --
1,169,603 UART: [cold-reset] ++
1,169,959 UART: [fht] FHT @ 0x50003400
1,172,429 UART: [idev] ++
1,172,597 UART: [idev] CDI.KEYID = 6
1,172,958 UART: [idev] SUBJECT.KEYID = 7
1,173,383 UART: [idev] UDS.KEYID = 0
1,181,507 UART: [idev] Erasing UDS.KEYID = 0
1,198,321 UART: [idev] Sha1 KeyId Algorithm
1,207,273 UART: [idev] --
1,208,464 UART: [ldev] ++
1,208,632 UART: [ldev] CDI.KEYID = 6
1,208,996 UART: [ldev] SUBJECT.KEYID = 5
1,209,423 UART: [ldev] AUTHORITY.KEYID = 7
1,209,886 UART: [ldev] FE.KEYID = 1
1,215,008 UART: [ldev] Erasing FE.KEYID = 1
1,241,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,426 UART: [ldev] --
1,280,882 UART: [fwproc] Wait for Commands...
1,281,519 UART: [fwproc] Recv command 0x46574c44
1,282,252 UART: [fwproc] Recv'd Img size: 114332 bytes
Initializing fuses
1,293,041 UART:
1,293,057 UART: Running Caliptra ROM ...
1,293,465 UART:
1,293,520 UART: [state] CFI Enabled
1,295,990 UART: [state] LifecycleState = Unprovisioned
1,296,645 UART: [state] DebugLocked = No
1,297,261 UART: [state] WD Timer not started. Device not locked for debugging
1,298,432 UART: [kat] SHA2-256
2,101,982 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,106,111 UART: [kat] ++
2,106,263 UART: [kat] sha1
2,110,441 UART: [kat] SHA2-256
2,112,381 UART: [kat] SHA2-384
2,115,132 UART: [kat] SHA2-512-ACC
2,117,033 UART: [kat] ECC-384
2,127,000 UART: [kat] HMAC-384Kdf
2,131,736 UART: [kat] LMS
2,380,048 UART: [kat] --
2,381,014 UART: [warm-reset] ++
2,381,282 UART: [warm-reset] Prev Cold-Reset failed
2,382,239 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,101 UART: [state] LifecycleState = Unprovisioned
85,756 UART: [state] DebugLocked = No
86,426 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,796 UART: [kat] SHA2-256
901,736 UART: [kat] SHA2-384
904,577 UART: [kat] SHA2-512-ACC
906,478 UART: [kat] ECC-384
916,181 UART: [kat] HMAC-384Kdf
920,955 UART: [kat] LMS
1,169,267 UART: [kat] --
1,170,208 UART: [cold-reset] ++
1,170,556 UART: [fht] FHT @ 0x50003400
1,173,224 UART: [idev] ++
1,173,392 UART: [idev] CDI.KEYID = 6
1,173,753 UART: [idev] SUBJECT.KEYID = 7
1,174,178 UART: [idev] UDS.KEYID = 0
1,182,094 UART: [idev] Erasing UDS.KEYID = 0
1,198,946 UART: [idev] Sha1 KeyId Algorithm
1,207,822 UART: [idev] --
1,208,903 UART: [ldev] ++
1,209,071 UART: [ldev] CDI.KEYID = 6
1,209,435 UART: [ldev] SUBJECT.KEYID = 5
1,209,862 UART: [ldev] AUTHORITY.KEYID = 7
1,210,325 UART: [ldev] FE.KEYID = 1
1,215,515 UART: [ldev] Erasing FE.KEYID = 1
1,242,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,415 UART: [ldev] --
1,281,849 UART: [fwproc] Wait for Commands...
1,282,666 UART: [fwproc] Recv command 0x46574c44
1,283,399 UART: [fwproc] Recv'd Img size: 114332 bytes
Initializing fuses
1,294,160 UART:
1,294,176 UART: Running Caliptra ROM ...
1,294,584 UART:
1,294,726 UART: [state] CFI Enabled
1,297,236 UART: [state] LifecycleState = Unprovisioned
1,297,891 UART: [state] DebugLocked = No
1,298,491 UART: [state] WD Timer not started. Device not locked for debugging
1,299,652 UART: [kat] SHA2-256
2,103,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,107,331 UART: [kat] ++
2,107,483 UART: [kat] sha1
2,111,651 UART: [kat] SHA2-256
2,113,591 UART: [kat] SHA2-384
2,116,180 UART: [kat] SHA2-512-ACC
2,118,081 UART: [kat] ECC-384
2,127,482 UART: [kat] HMAC-384Kdf
2,132,180 UART: [kat] LMS
2,380,492 UART: [kat] --
2,381,556 UART: [warm-reset] ++
2,381,824 UART: [warm-reset] Prev Cold-Reset failed
2,382,889 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,542 UART: [kat] SHA2-256
891,092 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,221 UART: [kat] ++
895,373 UART: [kat] sha1
899,629 UART: [kat] SHA2-256
901,569 UART: [kat] SHA2-384
904,298 UART: [kat] SHA2-512-ACC
906,199 UART: [kat] ECC-384
916,248 UART: [kat] HMAC-384Kdf
920,742 UART: [kat] LMS
1,169,054 UART: [kat] --
1,169,837 UART: [cold-reset] ++
1,170,199 UART: [fht] FHT @ 0x50003400
1,172,889 UART: [idev] ++
1,173,057 UART: [idev] CDI.KEYID = 6
1,173,418 UART: [idev] SUBJECT.KEYID = 7
1,173,843 UART: [idev] UDS.KEYID = 0
1,181,863 UART: [idev] Erasing UDS.KEYID = 0
1,199,585 UART: [idev] Sha1 KeyId Algorithm
1,208,595 UART: [idev] --
1,209,776 UART: [ldev] ++
1,209,944 UART: [ldev] CDI.KEYID = 6
1,210,308 UART: [ldev] SUBJECT.KEYID = 5
1,210,735 UART: [ldev] AUTHORITY.KEYID = 7
1,211,198 UART: [ldev] FE.KEYID = 1
1,216,296 UART: [ldev] Erasing FE.KEYID = 1
1,242,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,138 UART: [ldev] --
1,281,434 UART: [fwproc] Wait for Commands...
1,282,147 UART: [fwproc] Recv command 0x46574c44
1,282,880 UART: [fwproc] Recv'd Img size: 114332 bytes
Initializing fuses
1,293,625 UART:
1,293,641 UART: Running Caliptra ROM ...
1,294,049 UART:
1,294,104 UART: [state] CFI Enabled
1,296,814 UART: [state] LifecycleState = Unprovisioned
1,297,469 UART: [state] DebugLocked = No
1,298,157 UART: [state] WD Timer not started. Device not locked for debugging
1,299,508 UART: [kat] SHA2-256
2,103,058 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,107,187 UART: [kat] ++
2,107,339 UART: [kat] sha1
2,111,503 UART: [kat] SHA2-256
2,113,443 UART: [kat] SHA2-384
2,116,120 UART: [kat] SHA2-512-ACC
2,118,021 UART: [kat] ECC-384
2,127,592 UART: [kat] HMAC-384Kdf
2,132,186 UART: [kat] LMS
2,380,498 UART: [kat] --
2,381,646 UART: [warm-reset] ++
2,381,914 UART: [warm-reset] Prev Cold-Reset failed
2,382,771 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,901 UART: [state] LifecycleState = Unprovisioned
86,556 UART: [state] DebugLocked = No
87,234 UART: [state] WD Timer not started. Device not locked for debugging
88,577 UART: [kat] SHA2-256
892,127 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,256 UART: [kat] ++
896,408 UART: [kat] sha1
900,458 UART: [kat] SHA2-256
902,398 UART: [kat] SHA2-384
905,315 UART: [kat] SHA2-512-ACC
907,216 UART: [kat] ECC-384
917,155 UART: [kat] HMAC-384Kdf
921,717 UART: [kat] LMS
1,170,029 UART: [kat] --
1,170,902 UART: [cold-reset] ++
1,171,262 UART: [fht] FHT @ 0x50003400
1,174,110 UART: [idev] ++
1,174,278 UART: [idev] CDI.KEYID = 6
1,174,639 UART: [idev] SUBJECT.KEYID = 7
1,175,064 UART: [idev] UDS.KEYID = 0
1,182,974 UART: [idev] Erasing UDS.KEYID = 0
1,200,038 UART: [idev] Sha1 KeyId Algorithm
1,209,106 UART: [idev] --
1,210,237 UART: [ldev] ++
1,210,405 UART: [ldev] CDI.KEYID = 6
1,210,769 UART: [ldev] SUBJECT.KEYID = 5
1,211,196 UART: [ldev] AUTHORITY.KEYID = 7
1,211,659 UART: [ldev] FE.KEYID = 1
1,217,003 UART: [ldev] Erasing FE.KEYID = 1
1,243,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,859 UART: [ldev] --
1,283,239 UART: [fwproc] Wait for Commands...
1,284,024 UART: [fwproc] Recv command 0x46574c44
1,284,757 UART: [fwproc] Recv'd Img size: 114332 bytes
Initializing fuses
1,295,714 UART:
1,295,730 UART: Running Caliptra ROM ...
1,296,138 UART:
1,296,280 UART: [state] CFI Enabled
1,299,310 UART: [state] LifecycleState = Unprovisioned
1,299,965 UART: [state] DebugLocked = No
1,300,469 UART: [state] WD Timer not started. Device not locked for debugging
1,301,810 UART: [kat] SHA2-256
2,105,360 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,109,489 UART: [kat] ++
2,109,641 UART: [kat] sha1
2,113,891 UART: [kat] SHA2-256
2,115,831 UART: [kat] SHA2-384
2,118,554 UART: [kat] SHA2-512-ACC
2,120,455 UART: [kat] ECC-384
2,130,176 UART: [kat] HMAC-384Kdf
2,134,798 UART: [kat] LMS
2,383,110 UART: [kat] --
2,383,844 UART: [warm-reset] ++
2,384,112 UART: [warm-reset] Prev Cold-Reset failed
2,385,177 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
891,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,365 UART: [kat] ++
895,517 UART: [kat] sha1
899,809 UART: [kat] SHA2-256
901,749 UART: [kat] SHA2-384
904,572 UART: [kat] SHA2-512-ACC
906,473 UART: [kat] ECC-384
915,808 UART: [kat] HMAC-384Kdf
920,394 UART: [kat] LMS
1,168,706 UART: [kat] --
1,169,547 UART: [cold-reset] ++
1,169,983 UART: [fht] FHT @ 0x50003400
1,172,837 UART: [idev] ++
1,173,005 UART: [idev] CDI.KEYID = 6
1,173,366 UART: [idev] SUBJECT.KEYID = 7
1,173,791 UART: [idev] UDS.KEYID = 0
1,181,387 UART: [idev] Erasing UDS.KEYID = 0
1,198,353 UART: [idev] Sha1 KeyId Algorithm
1,207,215 UART: [idev] --
1,208,402 UART: [ldev] ++
1,208,570 UART: [ldev] CDI.KEYID = 6
1,208,934 UART: [ldev] SUBJECT.KEYID = 5
1,209,361 UART: [ldev] AUTHORITY.KEYID = 7
1,209,824 UART: [ldev] FE.KEYID = 1
1,214,852 UART: [ldev] Erasing FE.KEYID = 1
1,240,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,502 UART: [ldev] --
1,279,770 UART: [fwproc] Wait for Commands...
1,280,475 UART: [fwproc] Recv command 0x46574c44
1,281,208 UART: [fwproc] Recv'd Img size: 114332 bytes
Initializing fuses
1,292,003 UART:
1,292,019 UART: Running Caliptra ROM ...
1,292,427 UART:
1,292,482 UART: [state] CFI Enabled
1,295,120 UART: [state] LifecycleState = Unprovisioned
1,295,775 UART: [state] DebugLocked = No
1,296,317 UART: [state] WD Timer not started. Device not locked for debugging
1,297,452 UART: [kat] SHA2-256
2,101,002 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,105,131 UART: [kat] ++
2,105,283 UART: [kat] sha1
2,109,671 UART: [kat] SHA2-256
2,111,611 UART: [kat] SHA2-384
2,114,172 UART: [kat] SHA2-512-ACC
2,116,073 UART: [kat] ECC-384
2,125,404 UART: [kat] HMAC-384Kdf
2,130,058 UART: [kat] LMS
2,378,370 UART: [kat] --
2,379,126 UART: [warm-reset] ++
2,379,394 UART: [warm-reset] Prev Cold-Reset failed
2,380,353 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,322 UART: [state] WD Timer not started. Device not locked for debugging
87,567 UART: [kat] SHA2-256
891,117 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,246 UART: [kat] ++
895,398 UART: [kat] sha1
899,610 UART: [kat] SHA2-256
901,550 UART: [kat] SHA2-384
904,221 UART: [kat] SHA2-512-ACC
906,122 UART: [kat] ECC-384
916,001 UART: [kat] HMAC-384Kdf
920,561 UART: [kat] LMS
1,168,873 UART: [kat] --
1,169,922 UART: [cold-reset] ++
1,170,478 UART: [fht] FHT @ 0x50003400
1,173,112 UART: [idev] ++
1,173,280 UART: [idev] CDI.KEYID = 6
1,173,641 UART: [idev] SUBJECT.KEYID = 7
1,174,066 UART: [idev] UDS.KEYID = 0
1,181,904 UART: [idev] Erasing UDS.KEYID = 0
1,199,142 UART: [idev] Sha1 KeyId Algorithm
1,208,042 UART: [idev] --
1,209,213 UART: [ldev] ++
1,209,381 UART: [ldev] CDI.KEYID = 6
1,209,745 UART: [ldev] SUBJECT.KEYID = 5
1,210,172 UART: [ldev] AUTHORITY.KEYID = 7
1,210,635 UART: [ldev] FE.KEYID = 1
1,216,237 UART: [ldev] Erasing FE.KEYID = 1
1,242,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,549 UART: [ldev] --
1,281,893 UART: [fwproc] Wait for Commands...
1,282,570 UART: [fwproc] Recv command 0x46574c44
1,283,303 UART: [fwproc] Recv'd Img size: 114332 bytes
Initializing fuses
1,294,124 UART:
1,294,140 UART: Running Caliptra ROM ...
1,294,548 UART:
1,294,690 UART: [state] CFI Enabled
1,297,788 UART: [state] LifecycleState = Unprovisioned
1,298,443 UART: [state] DebugLocked = No
1,298,981 UART: [state] WD Timer not started. Device not locked for debugging
1,300,126 UART: [kat] SHA2-256
2,103,676 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,107,805 UART: [kat] ++
2,107,957 UART: [kat] sha1
2,112,111 UART: [kat] SHA2-256
2,114,051 UART: [kat] SHA2-384
2,116,720 UART: [kat] SHA2-512-ACC
2,118,621 UART: [kat] ECC-384
2,128,800 UART: [kat] HMAC-384Kdf
2,133,394 UART: [kat] LMS
2,381,706 UART: [kat] --
2,382,582 UART: [warm-reset] ++
2,382,850 UART: [warm-reset] Prev Cold-Reset failed
2,383,851 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,225 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
890,978 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,107 UART: [kat] ++
895,259 UART: [kat] sha1
899,391 UART: [kat] SHA2-256
901,331 UART: [kat] SHA2-384
904,196 UART: [kat] SHA2-512-ACC
906,097 UART: [kat] ECC-384
916,006 UART: [kat] HMAC-384Kdf
920,634 UART: [kat] LMS
1,168,946 UART: [kat] --
1,169,725 UART: [cold-reset] ++
1,170,301 UART: [fht] FHT @ 0x50003400
1,172,845 UART: [idev] ++
1,173,013 UART: [idev] CDI.KEYID = 6
1,173,374 UART: [idev] SUBJECT.KEYID = 7
1,173,799 UART: [idev] UDS.KEYID = 0
1,181,811 UART: [idev] Erasing UDS.KEYID = 0
1,198,441 UART: [idev] Sha1 KeyId Algorithm
1,207,527 UART: [idev] --
1,208,480 UART: [ldev] ++
1,208,648 UART: [ldev] CDI.KEYID = 6
1,209,012 UART: [ldev] SUBJECT.KEYID = 5
1,209,439 UART: [ldev] AUTHORITY.KEYID = 7
1,209,902 UART: [ldev] FE.KEYID = 1
1,215,188 UART: [ldev] Erasing FE.KEYID = 1
1,240,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,336 UART: [ldev] --
1,279,788 UART: [fwproc] Wait for Commands...
1,280,539 UART: [fwproc] Recv command 0x46574c44
1,281,272 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,110 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,244 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,553 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,461 >>> mbox cmd response: success
2,772,684 UART: [afmc] ++
2,772,852 UART: [afmc] CDI.KEYID = 6
2,773,215 UART: [afmc] SUBJECT.KEYID = 7
2,773,641 UART: [afmc] AUTHORITY.KEYID = 5
2,807,850 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,396 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,147 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,876 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,759 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,478 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,189 UART: [afmc] --
2,851,111 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,851,133 UART: [cold-reset] --
2,852,087 UART: [state] Locking Datavault
2,853,252 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,856 UART: [state] Locking ICCM
2,854,280 UART: [exit] Launching FMC @ 0x40000130
2,859,609 UART:
2,859,625 UART: Running Caliptra FMC ...
2,860,033 UART:
2,860,087 UART: [state] CFI Enabled
2,870,584 UART: [fht] FMC Alias Private Key: 7
2,978,579 UART: [art] Extend RT PCRs Done
2,979,007 UART: [art] Lock RT PCRs Done
2,980,901 UART: [art] Populate DV Done
2,989,014 UART: [fht] FMC Alias Private Key: 7
2,989,948 UART: [art] Derive CDI
2,990,228 UART: [art] Store in in slot 0x4
3,075,801 UART: [art] Derive Key Pair
3,076,161 UART: [art] Store priv key in slot 0x5
3,089,053 UART: [art] Derive Key Pair - Done
3,103,961 UART: [art] Signing Cert with AUTHO
3,104,441 UART: RITY.KEYID = 7
3,119,651 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,416 UART: [art] PUB.X = 6A65A360B8C798DFD7DAA6D26420EF7FDB82D7261EC5914B188B38875E15C0F7CEBFF1778880F6E60E87BE9E033B8917
3,127,190 UART: [art] PUB.Y = E98436BE9E7363C79EAD4EBA10519D58DF45F076B4C38D4FA88947DEAD810214CB2E8F6FBFD3878D919C1856F20C7C4D
3,134,148 UART: [art] SIG.R = C6AA56319DAA48DB2D2C84AF6FA43781BBE49F189336D659722785738DDF2B68F89647596B3B53D51B9E9816C3161CB2
3,140,920 UART: [art] SIG.S = 334702E19CB0AB053CDB6260546297856097961631035E711C03C7482573B4526EEF48E86796A8E51BB1D7FF03E4309F
3,164,898 UART: Caliptra RT
3,165,151 UART: [state] CFI Enabled
3,272,562 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,474 UART:
3,274,490 UART: Running Caliptra ROM ...
3,274,898 UART:
3,274,953 UART: [state] CFI Enabled
3,277,715 UART: [state] LifecycleState = Unprovisioned
3,278,370 UART: [state] DebugLocked = No
3,279,036 UART: [state] WD Timer not started. Device not locked for debugging
3,280,298 UART: [kat] SHA2-256
4,083,848 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,087,977 UART: [kat] ++
4,088,129 UART: [kat] sha1
4,092,479 UART: [kat] SHA2-256
4,094,419 UART: [kat] SHA2-384
4,097,042 UART: [kat] SHA2-512-ACC
4,098,942 UART: [kat] ECC-384
4,108,775 UART: [kat] HMAC-384Kdf
4,113,307 UART: [kat] LMS
4,361,619 UART: [kat] --
4,362,183 UART: [update-reset] ++
5,674,434 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,675,473 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,825,297 >>> mbox cmd response: success
Initializing fuses
5,825,627 UART:
5,825,643 UART: Running Caliptra ROM ...
5,826,051 UART:
5,826,106 UART: [state] CFI Enabled
5,828,666 UART: [state] LifecycleState = Unprovisioned
5,829,321 UART: [state] DebugLocked = No
5,829,873 UART: [state] WD Timer not started. Device not locked for debugging
5,831,218 UART: [kat] SHA2-256
6,634,768 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,638,897 UART: [kat] ++
6,639,049 UART: [kat] sha1
6,643,267 UART: [kat] SHA2-256
6,645,207 UART: [kat] SHA2-384
6,647,900 UART: [kat] SHA2-512-ACC
6,649,801 UART: [kat] ECC-384
6,659,478 UART: [kat] HMAC-384Kdf
6,663,826 UART: [kat] LMS
6,912,138 UART: [kat] --
6,912,942 UART: [warm-reset] ++
6,913,639 UART: [warm-reset] Prev Update Reset failed
6,914,852 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,189 >>> mbox cmd response: success
2,676,540 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,682,425 UART:
2,682,441 UART: Running Caliptra FMC ...
2,682,849 UART:
2,682,903 UART: [state] CFI Enabled
2,693,478 UART: [fht] FMC Alias Private Key: 7
2,801,049 UART: [art] Extend RT PCRs Done
2,801,477 UART: [art] Lock RT PCRs Done
2,802,949 UART: [art] Populate DV Done
2,811,038 UART: [fht] FMC Alias Private Key: 7
2,811,976 UART: [art] Derive CDI
2,812,256 UART: [art] Store in in slot 0x4
2,897,747 UART: [art] Derive Key Pair
2,898,107 UART: [art] Store priv key in slot 0x5
2,911,245 UART: [art] Derive Key Pair - Done
2,925,798 UART: [art] Signing Cert with AUTHO
2,926,278 UART: RITY.KEYID = 7
2,941,768 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,533 UART: [art] PUB.X = D394B5A76BF2B6F2724EC7C863312A07D60326DBEB5ED0FC4897A22E7C0D593643B93CC2C51D8C685BCAEB6F34887DA4
2,949,308 UART: [art] PUB.Y = EA6B42EF617855294B908E60C67246B6BE691D045237619FEF4061F0336891D60B65B19AC64811AA4AD723AE4FDF7B02
2,956,249 UART: [art] SIG.R = 09E837061B7127AF11E4C27AF5F5B707E9642F45ABBD5EA4E19B9501DC9CD51293E72AC273FCAAAB9B9CFE90EA8C746A
2,963,027 UART: [art] SIG.S = E5962BE9F6A677A8C5823DEF23A959E6F5B00D4C4D3EBF1D4668FFB5A2EE898189E6D4B2B83E4FACB0EEE4316B0511FA
2,987,330 UART: Caliptra RT
2,987,583 UART: [state] CFI Enabled
3,094,982 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,529,132 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
891,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,808 UART: [kat] ++
895,960 UART: [kat] sha1
900,162 UART: [kat] SHA2-256
902,102 UART: [kat] SHA2-384
904,901 UART: [kat] SHA2-512-ACC
906,802 UART: [kat] ECC-384
916,509 UART: [kat] HMAC-384Kdf
921,221 UART: [kat] LMS
1,169,533 UART: [kat] --
1,170,548 UART: [cold-reset] ++
1,170,916 UART: [fht] FHT @ 0x50003400
1,173,544 UART: [idev] ++
1,173,712 UART: [idev] CDI.KEYID = 6
1,174,073 UART: [idev] SUBJECT.KEYID = 7
1,174,498 UART: [idev] UDS.KEYID = 0
1,182,698 UART: [idev] Erasing UDS.KEYID = 0
1,200,246 UART: [idev] Sha1 KeyId Algorithm
1,209,238 UART: [idev] --
1,210,259 UART: [ldev] ++
1,210,427 UART: [ldev] CDI.KEYID = 6
1,210,791 UART: [ldev] SUBJECT.KEYID = 5
1,211,218 UART: [ldev] AUTHORITY.KEYID = 7
1,211,681 UART: [ldev] FE.KEYID = 1
1,217,079 UART: [ldev] Erasing FE.KEYID = 1
1,243,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,029 UART: [ldev] --
1,282,431 UART: [fwproc] Wait for Commands...
1,283,126 UART: [fwproc] Recv command 0x46574c44
1,283,859 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,057 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,366 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,198 >>> mbox cmd response: success
2,775,235 UART: [afmc] ++
2,775,403 UART: [afmc] CDI.KEYID = 6
2,775,766 UART: [afmc] SUBJECT.KEYID = 7
2,776,192 UART: [afmc] AUTHORITY.KEYID = 5
2,811,801 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,619 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,370 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,099 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,982 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,701 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,644 UART: [afmc] --
2,855,662 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,855,684 UART: [cold-reset] --
2,856,400 UART: [state] Locking Datavault
2,857,885 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,489 UART: [state] Locking ICCM
2,859,025 UART: [exit] Launching FMC @ 0x40000130
2,864,354 UART:
2,864,370 UART: Running Caliptra FMC ...
2,864,778 UART:
2,864,921 UART: [state] CFI Enabled
2,875,438 UART: [fht] FMC Alias Private Key: 7
2,982,895 UART: [art] Extend RT PCRs Done
2,983,323 UART: [art] Lock RT PCRs Done
2,985,023 UART: [art] Populate DV Done
2,993,214 UART: [fht] FMC Alias Private Key: 7
2,994,364 UART: [art] Derive CDI
2,994,644 UART: [art] Store in in slot 0x4
3,080,237 UART: [art] Derive Key Pair
3,080,597 UART: [art] Store priv key in slot 0x5
3,093,871 UART: [art] Derive Key Pair - Done
3,108,926 UART: [art] Signing Cert with AUTHO
3,109,406 UART: RITY.KEYID = 7
3,124,072 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,837 UART: [art] PUB.X = BEB4FCE633B74841572173865DE37C3282ACEB2AE0630F82813A375C1A54EC06C5E7454C04B81B76B873A25F48E68380
3,131,598 UART: [art] PUB.Y = 99E07DAB52759BA5686C795242D0C8CE77BE86E74BCE7C295CC30DC9E9FB354EFC88339F49BBC8081EA14923913092B4
3,138,550 UART: [art] SIG.R = A04FA67895D828979359AD72D26D50AF40CCD81463E9FA41900CCF90DD4C91A36A2D636B34B23850C0AD810446F8BA96
3,145,318 UART: [art] SIG.S = C788E0D6BB8985CCD00C3BCE389210EB11DAF44E45F9C8E8F3F2A2FC92C7EE99CCDC68F2B0F3040E2DE1475E720887F0
3,168,975 UART: Caliptra RT
3,169,320 UART: [state] CFI Enabled
3,277,978 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,034 UART:
3,280,050 UART: Running Caliptra ROM ...
3,280,458 UART:
3,280,600 UART: [state] CFI Enabled
3,283,352 UART: [state] LifecycleState = Unprovisioned
3,284,007 UART: [state] DebugLocked = No
3,284,571 UART: [state] WD Timer not started. Device not locked for debugging
3,285,747 UART: [kat] SHA2-256
4,089,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,093,426 UART: [kat] ++
4,093,578 UART: [kat] sha1
4,097,862 UART: [kat] SHA2-256
4,099,802 UART: [kat] SHA2-384
4,102,387 UART: [kat] SHA2-512-ACC
4,104,287 UART: [kat] ECC-384
4,113,710 UART: [kat] HMAC-384Kdf
4,118,404 UART: [kat] LMS
4,366,716 UART: [kat] --
4,367,572 UART: [update-reset] ++
5,679,763 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,680,806 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,830,630 >>> mbox cmd response: success
Initializing fuses
5,830,950 UART:
5,830,966 UART: Running Caliptra ROM ...
5,831,374 UART:
5,831,516 UART: [state] CFI Enabled
5,834,744 UART: [state] LifecycleState = Unprovisioned
5,835,399 UART: [state] DebugLocked = No
5,836,061 UART: [state] WD Timer not started. Device not locked for debugging
5,837,192 UART: [kat] SHA2-256
6,640,742 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,644,871 UART: [kat] ++
6,645,023 UART: [kat] sha1
6,649,405 UART: [kat] SHA2-256
6,651,345 UART: [kat] SHA2-384
6,653,994 UART: [kat] SHA2-512-ACC
6,655,895 UART: [kat] ECC-384
6,665,734 UART: [kat] HMAC-384Kdf
6,670,394 UART: [kat] LMS
6,918,706 UART: [kat] --
6,919,528 UART: [warm-reset] ++
6,920,037 UART: [warm-reset] Prev Update Reset failed
6,921,070 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,718 >>> mbox cmd response: success
2,679,741 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,685,954 UART:
2,685,970 UART: Running Caliptra FMC ...
2,686,378 UART:
2,686,521 UART: [state] CFI Enabled
2,697,214 UART: [fht] FMC Alias Private Key: 7
2,804,935 UART: [art] Extend RT PCRs Done
2,805,363 UART: [art] Lock RT PCRs Done
2,806,787 UART: [art] Populate DV Done
2,815,136 UART: [fht] FMC Alias Private Key: 7
2,816,238 UART: [art] Derive CDI
2,816,518 UART: [art] Store in in slot 0x4
2,902,267 UART: [art] Derive Key Pair
2,902,627 UART: [art] Store priv key in slot 0x5
2,915,773 UART: [art] Derive Key Pair - Done
2,930,448 UART: [art] Signing Cert with AUTHO
2,930,928 UART: RITY.KEYID = 7
2,946,250 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,015 UART: [art] PUB.X = 5969F235FA7F191CE56F93A65A1DADC82A5BA806E227B6AFC19977BAEC000ACFEFBFE274C6D7CE4545149B549DDBF1CC
2,953,783 UART: [art] PUB.Y = 3A7A0BAF21488CAE001C2261AF42F91A54DCAB14F89583E9AC37606B1A5F52B1F153C7AE8E3C7731127F5894ABF62263
2,960,716 UART: [art] SIG.R = F8E24CCB8CAB5CB2B731590543190ACF39ECEA5DB3C9CAE5DACD4C6FB123F4C0C5C403D6543CAD888DA07CB6A6C29A6E
2,967,509 UART: [art] SIG.S = F0AA215B668760AD4D8168441274FE3A22B41EC10D8F209FBAAFD4CAFF6BCCBC16E88FD059087A976B585352DA7A28C8
2,991,350 UART: Caliptra RT
2,991,695 UART: [state] CFI Enabled
3,098,341 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,532,284 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
891,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,309 UART: [kat] ++
895,461 UART: [kat] sha1
899,837 UART: [kat] SHA2-256
901,777 UART: [kat] SHA2-384
904,432 UART: [kat] SHA2-512-ACC
906,333 UART: [kat] ECC-384
916,258 UART: [kat] HMAC-384Kdf
920,798 UART: [kat] LMS
1,169,110 UART: [kat] --
1,169,885 UART: [cold-reset] ++
1,170,455 UART: [fht] FHT @ 0x50003400
1,173,175 UART: [idev] ++
1,173,343 UART: [idev] CDI.KEYID = 6
1,173,704 UART: [idev] SUBJECT.KEYID = 7
1,174,129 UART: [idev] UDS.KEYID = 0
1,182,165 UART: [idev] Erasing UDS.KEYID = 0
1,199,233 UART: [idev] Sha1 KeyId Algorithm
1,208,249 UART: [idev] --
1,209,330 UART: [ldev] ++
1,209,498 UART: [ldev] CDI.KEYID = 6
1,209,862 UART: [ldev] SUBJECT.KEYID = 5
1,210,289 UART: [ldev] AUTHORITY.KEYID = 7
1,210,752 UART: [ldev] FE.KEYID = 1
1,215,990 UART: [ldev] Erasing FE.KEYID = 1
1,242,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,296 UART: [ldev] --
1,281,660 UART: [fwproc] Wait for Commands...
1,282,449 UART: [fwproc] Recv command 0x46574c44
1,283,182 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,306 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,615 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,409 >>> mbox cmd response: success
2,774,448 UART: [afmc] ++
2,774,616 UART: [afmc] CDI.KEYID = 6
2,774,979 UART: [afmc] SUBJECT.KEYID = 7
2,775,405 UART: [afmc] AUTHORITY.KEYID = 5
2,810,946 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,230 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,981 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,710 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,593 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,312 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,005 UART: [afmc] --
2,853,919 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,853,941 UART: [cold-reset] --
2,854,907 UART: [state] Locking Datavault
2,856,058 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,662 UART: [state] Locking ICCM
2,857,216 UART: [exit] Launching FMC @ 0x40000130
2,862,545 UART:
2,862,561 UART: Running Caliptra FMC ...
2,862,969 UART:
2,863,023 UART: [state] CFI Enabled
2,873,682 UART: [fht] FMC Alias Private Key: 7
2,981,499 UART: [art] Extend RT PCRs Done
2,981,927 UART: [art] Lock RT PCRs Done
2,983,403 UART: [art] Populate DV Done
2,991,686 UART: [fht] FMC Alias Private Key: 7
2,992,858 UART: [art] Derive CDI
2,993,138 UART: [art] Store in in slot 0x4
3,078,829 UART: [art] Derive Key Pair
3,079,189 UART: [art] Store priv key in slot 0x5
3,091,697 UART: [art] Derive Key Pair - Done
3,106,519 UART: [art] Signing Cert with AUTHO
3,106,999 UART: RITY.KEYID = 7
3,122,047 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,812 UART: [art] PUB.X = 4C20ACB3CA3E8121D34B323AAFA16D77B631D6D39A5AA87E50CDB94DB63AE22348A9653C528B96C0A6B27ED31E322587
3,129,594 UART: [art] PUB.Y = F38B3084CFFA59C46E9B9B7163349F477F93973790884B5EA967BC86894F6BB0C8949569AFF51EB46EA670BE230F7084
3,136,541 UART: [art] SIG.R = CA1EF83F47724DEEAD0BDB3CF1CB96D2882EBBEEA3F7BB6D74871CBCD6C2937B13C6A623BE7BB3B441B080768795AD12
3,143,334 UART: [art] SIG.S = 0E1CF988ADBFD087F609181687D639B2DEB5E685EBDCE0607E63E423063AA81F9BBE947BABC6A2453A72B4611653D7DA
3,167,336 UART: Caliptra RT
3,167,589 UART: [state] CFI Enabled
3,275,252 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,138 UART:
3,277,154 UART: Running Caliptra ROM ...
3,277,562 UART:
3,277,617 UART: [state] CFI Enabled
3,279,739 UART: [state] LifecycleState = Unprovisioned
3,280,394 UART: [state] DebugLocked = No
3,280,918 UART: [state] WD Timer not started. Device not locked for debugging
3,282,142 UART: [kat] SHA2-256
4,085,692 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,089,821 UART: [kat] ++
4,089,973 UART: [kat] sha1
4,094,293 UART: [kat] SHA2-256
4,096,233 UART: [kat] SHA2-384
4,099,046 UART: [kat] SHA2-512-ACC
4,100,946 UART: [kat] ECC-384
4,110,381 UART: [kat] HMAC-384Kdf
4,114,959 UART: [kat] LMS
4,363,271 UART: [kat] --
4,364,069 UART: [update-reset] ++
5,676,684 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,677,797 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,827,621 >>> mbox cmd response: success
Initializing fuses
5,827,819 UART:
5,827,835 UART: Running Caliptra ROM ...
5,828,243 UART:
5,828,298 UART: [state] CFI Enabled
5,830,574 UART: [state] LifecycleState = Unprovisioned
5,831,229 UART: [state] DebugLocked = No
5,831,793 UART: [state] WD Timer not started. Device not locked for debugging
5,832,988 UART: [kat] SHA2-256
6,636,538 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,640,667 UART: [kat] ++
6,640,819 UART: [kat] sha1
6,645,061 UART: [kat] SHA2-256
6,647,001 UART: [kat] SHA2-384
6,649,590 UART: [kat] SHA2-512-ACC
6,651,491 UART: [kat] ECC-384
6,660,856 UART: [kat] HMAC-384Kdf
6,665,374 UART: [kat] LMS
6,913,686 UART: [kat] --
6,914,402 UART: [warm-reset] ++
6,915,121 UART: [warm-reset] Prev Update Reset failed
6,916,002 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,311 >>> mbox cmd response: success
2,679,418 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,685,521 UART:
2,685,537 UART: Running Caliptra FMC ...
2,685,945 UART:
2,685,999 UART: [state] CFI Enabled
2,696,312 UART: [fht] FMC Alias Private Key: 7
2,803,921 UART: [art] Extend RT PCRs Done
2,804,349 UART: [art] Lock RT PCRs Done
2,805,751 UART: [art] Populate DV Done
2,813,894 UART: [fht] FMC Alias Private Key: 7
2,814,996 UART: [art] Derive CDI
2,815,276 UART: [art] Store in in slot 0x4
2,900,795 UART: [art] Derive Key Pair
2,901,155 UART: [art] Store priv key in slot 0x5
2,914,577 UART: [art] Derive Key Pair - Done
2,929,312 UART: [art] Signing Cert with AUTHO
2,929,792 UART: RITY.KEYID = 7
2,944,984 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,749 UART: [art] PUB.X = AAAB7D260E95ACEDFBABA6E96D634CAE5F8416F98A760894EB64E0D7A092FDDFF870A1CAE9AA4202E5F9158E0C5F15C9
2,952,535 UART: [art] PUB.Y = 44E89D34FFD1CB29612E888373EB0150B077878767ED06742E9E7488630AB9656A9D2968AD055F9575FA2E462C21F71F
2,959,467 UART: [art] SIG.R = 0267B798AB3A486A3F7C72978070E9B6101FD50E490BDC978FFBE0B8E3A19F5569A25A9AF45668B759D07543F6656B77
2,966,228 UART: [art] SIG.S = F90B3227A4D3714B20349C5CE41DF28C4E74D8199B8EE13913A3D1E6BC56D75C42847A76272E5D2694D3C09066D1E815
2,989,744 UART: Caliptra RT
2,989,997 UART: [state] CFI Enabled
3,097,970 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,531,760 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,574 UART: [kat] ++
895,726 UART: [kat] sha1
900,036 UART: [kat] SHA2-256
901,976 UART: [kat] SHA2-384
904,657 UART: [kat] SHA2-512-ACC
906,558 UART: [kat] ECC-384
916,121 UART: [kat] HMAC-384Kdf
920,739 UART: [kat] LMS
1,169,051 UART: [kat] --
1,169,846 UART: [cold-reset] ++
1,170,390 UART: [fht] FHT @ 0x50003400
1,173,136 UART: [idev] ++
1,173,304 UART: [idev] CDI.KEYID = 6
1,173,665 UART: [idev] SUBJECT.KEYID = 7
1,174,090 UART: [idev] UDS.KEYID = 0
1,182,204 UART: [idev] Erasing UDS.KEYID = 0
1,199,336 UART: [idev] Sha1 KeyId Algorithm
1,208,224 UART: [idev] --
1,209,123 UART: [ldev] ++
1,209,291 UART: [ldev] CDI.KEYID = 6
1,209,655 UART: [ldev] SUBJECT.KEYID = 5
1,210,082 UART: [ldev] AUTHORITY.KEYID = 7
1,210,545 UART: [ldev] FE.KEYID = 1
1,215,717 UART: [ldev] Erasing FE.KEYID = 1
1,242,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,177 UART: [ldev] --
1,281,599 UART: [fwproc] Wait for Commands...
1,282,184 UART: [fwproc] Recv command 0x46574c44
1,282,917 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,371 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,680 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,394 >>> mbox cmd response: success
2,774,619 UART: [afmc] ++
2,774,787 UART: [afmc] CDI.KEYID = 6
2,775,150 UART: [afmc] SUBJECT.KEYID = 7
2,775,576 UART: [afmc] AUTHORITY.KEYID = 5
2,810,731 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,123 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,874 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,603 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,486 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,205 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,054 UART: [afmc] --
2,854,110 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,854,132 UART: [cold-reset] --
2,854,768 UART: [state] Locking Datavault
2,855,927 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,531 UART: [state] Locking ICCM
2,856,961 UART: [exit] Launching FMC @ 0x40000130
2,862,290 UART:
2,862,306 UART: Running Caliptra FMC ...
2,862,714 UART:
2,862,857 UART: [state] CFI Enabled
2,873,422 UART: [fht] FMC Alias Private Key: 7
2,980,733 UART: [art] Extend RT PCRs Done
2,981,161 UART: [art] Lock RT PCRs Done
2,982,851 UART: [art] Populate DV Done
2,990,888 UART: [fht] FMC Alias Private Key: 7
2,991,856 UART: [art] Derive CDI
2,992,136 UART: [art] Store in in slot 0x4
3,077,847 UART: [art] Derive Key Pair
3,078,207 UART: [art] Store priv key in slot 0x5
3,091,641 UART: [art] Derive Key Pair - Done
3,106,253 UART: [art] Signing Cert with AUTHO
3,106,733 UART: RITY.KEYID = 7
3,122,173 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,938 UART: [art] PUB.X = 9FEE2906AB7A7E9BD433056A0C3D5D664E3D64FB0203462E80014E14AE0BDDF1DDAC343E880D191332907F53F54FA7C6
3,129,694 UART: [art] PUB.Y = 9F38575405A1C1B2201B75ED333DBB9C3508907F96983DDC707F7509F6931D938C495DFE7BA18DE75B079AD3773BE644
3,136,632 UART: [art] SIG.R = E79C90A7D443756BD136D862D3A143524B673756F938158645D726272AB40D2774EC9E0CEAD3A265BA8299A927AF1536
3,143,390 UART: [art] SIG.S = 40FAD0C361C3AF7B869A754CDD80B40F700E3623CF7C4200911E45CF0725C64BB0A535DCCD8BDEDF69C2CE28C6DE1B22
3,167,450 UART: Caliptra RT
3,167,795 UART: [state] CFI Enabled
3,275,774 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,734 UART:
3,277,750 UART: Running Caliptra ROM ...
3,278,158 UART:
3,278,300 UART: [state] CFI Enabled
3,280,882 UART: [state] LifecycleState = Unprovisioned
3,281,537 UART: [state] DebugLocked = No
3,282,099 UART: [state] WD Timer not started. Device not locked for debugging
3,283,399 UART: [kat] SHA2-256
4,086,949 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,078 UART: [kat] ++
4,091,230 UART: [kat] sha1
4,095,410 UART: [kat] SHA2-256
4,097,350 UART: [kat] SHA2-384
4,100,083 UART: [kat] SHA2-512-ACC
4,101,983 UART: [kat] ECC-384
4,111,614 UART: [kat] HMAC-384Kdf
4,116,226 UART: [kat] LMS
4,364,538 UART: [kat] --
4,365,386 UART: [update-reset] ++
5,678,301 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,679,368 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,829,192 >>> mbox cmd response: success
Initializing fuses
5,829,382 UART:
5,829,398 UART: Running Caliptra ROM ...
5,829,806 UART:
5,829,948 UART: [state] CFI Enabled
5,832,474 UART: [state] LifecycleState = Unprovisioned
5,833,129 UART: [state] DebugLocked = No
5,833,683 UART: [state] WD Timer not started. Device not locked for debugging
5,834,982 UART: [kat] SHA2-256
6,638,532 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,642,661 UART: [kat] ++
6,642,813 UART: [kat] sha1
6,647,149 UART: [kat] SHA2-256
6,649,089 UART: [kat] SHA2-384
6,651,688 UART: [kat] SHA2-512-ACC
6,653,589 UART: [kat] ECC-384
6,663,372 UART: [kat] HMAC-384Kdf
6,667,824 UART: [kat] LMS
6,916,136 UART: [kat] --
6,917,188 UART: [warm-reset] ++
6,917,749 UART: [warm-reset] Prev Update Reset failed
6,918,608 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,410 >>> mbox cmd response: success
2,677,305 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,683,606 UART:
2,683,622 UART: Running Caliptra FMC ...
2,684,030 UART:
2,684,173 UART: [state] CFI Enabled
2,694,916 UART: [fht] FMC Alias Private Key: 7
2,802,535 UART: [art] Extend RT PCRs Done
2,802,963 UART: [art] Lock RT PCRs Done
2,804,353 UART: [art] Populate DV Done
2,812,484 UART: [fht] FMC Alias Private Key: 7
2,813,548 UART: [art] Derive CDI
2,813,828 UART: [art] Store in in slot 0x4
2,899,903 UART: [art] Derive Key Pair
2,900,263 UART: [art] Store priv key in slot 0x5
2,913,347 UART: [art] Derive Key Pair - Done
2,928,216 UART: [art] Signing Cert with AUTHO
2,928,696 UART: RITY.KEYID = 7
2,943,924 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,689 UART: [art] PUB.X = E93F21D7A2C328DFF5DC6E55928FE172FEEF2898B7FDBE7B039230497C0DC177C85244167604EBAC88D5AF47C900E6E1
2,951,440 UART: [art] PUB.Y = B3CCEC317FCBC9CF69AFF511BFAA56C4406150D01F96C22C11ABF11B2E4E246814114B43B8E345B18588E20F3ACC954D
2,958,403 UART: [art] SIG.R = 339009F14759EC2BBC3FD1192A82207755DDC5AD94310DED6C3E1035245589BFBF6C43A1C9A063C68E181C2A20E0B048
2,965,171 UART: [art] SIG.S = 985EA1AB39019536AEE9FED0C46B146CCC2FE88E8272E2D2D56363F2B6D078170EBFB9EAC12B03AA967FB147B1308FF0
2,989,149 UART: Caliptra RT
2,989,494 UART: [state] CFI Enabled
3,097,241 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,532,152 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,632 UART: [state] LifecycleState = Unprovisioned
86,287 UART: [state] DebugLocked = No
86,989 UART: [state] WD Timer not started. Device not locked for debugging
88,254 UART: [kat] SHA2-256
891,804 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,933 UART: [kat] ++
896,085 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,140 UART: [kat] SHA2-512-ACC
907,041 UART: [kat] ECC-384
916,892 UART: [kat] HMAC-384Kdf
921,566 UART: [kat] LMS
1,169,878 UART: [kat] --
1,170,633 UART: [cold-reset] ++
1,171,147 UART: [fht] FHT @ 0x50003400
1,173,809 UART: [idev] ++
1,173,977 UART: [idev] CDI.KEYID = 6
1,174,338 UART: [idev] SUBJECT.KEYID = 7
1,174,763 UART: [idev] UDS.KEYID = 0
1,183,071 UART: [idev] Erasing UDS.KEYID = 0
1,200,033 UART: [idev] Sha1 KeyId Algorithm
1,208,869 UART: [idev] --
1,210,004 UART: [ldev] ++
1,210,172 UART: [ldev] CDI.KEYID = 6
1,210,536 UART: [ldev] SUBJECT.KEYID = 5
1,210,963 UART: [ldev] AUTHORITY.KEYID = 7
1,211,426 UART: [ldev] FE.KEYID = 1
1,216,750 UART: [ldev] Erasing FE.KEYID = 1
1,243,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,438 UART: [ldev] --
1,282,922 UART: [fwproc] Wait for Commands...
1,283,645 UART: [fwproc] Recv command 0x46574c44
1,284,378 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,952 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,261 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,079 >>> mbox cmd response: success
2,775,144 UART: [afmc] ++
2,775,312 UART: [afmc] CDI.KEYID = 6
2,775,675 UART: [afmc] SUBJECT.KEYID = 7
2,776,101 UART: [afmc] AUTHORITY.KEYID = 5
2,811,574 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,901 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,630 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,513 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,232 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,099 UART: [afmc] --
2,855,117 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,855,139 UART: [cold-reset] --
2,855,999 UART: [state] Locking Datavault
2,857,096 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,700 UART: [state] Locking ICCM
2,858,298 UART: [exit] Launching FMC @ 0x40000130
2,863,627 UART:
2,863,643 UART: Running Caliptra FMC ...
2,864,051 UART:
2,864,105 UART: [state] CFI Enabled
2,874,478 UART: [fht] FMC Alias Private Key: 7
2,982,275 UART: [art] Extend RT PCRs Done
2,982,703 UART: [art] Lock RT PCRs Done
2,984,329 UART: [art] Populate DV Done
2,992,806 UART: [fht] FMC Alias Private Key: 7
2,993,842 UART: [art] Derive CDI
2,994,122 UART: [art] Store in in slot 0x4
3,079,515 UART: [art] Derive Key Pair
3,079,875 UART: [art] Store priv key in slot 0x5
3,093,139 UART: [art] Derive Key Pair - Done
3,107,553 UART: [art] Signing Cert with AUTHO
3,108,033 UART: RITY.KEYID = 7
3,123,199 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,964 UART: [art] PUB.X = 53AB01358323FEA74A75DFA43DF8BE828EEB75DD62B270818FA4A2C6FAA983A925C71190CB6B4EFDE36E1EBA4A55E223
3,130,751 UART: [art] PUB.Y = 6E844315A81A093F5C257565DAD064CCFC39E6548A20C16CA69366022BE7EF254626757CA271A2E28403932D15DD9FEC
3,137,692 UART: [art] SIG.R = CA963EF5356030E15FAC9CA8D67F9423EE59AA4FFF7ED29F824BD12FFC74C3AE24CADF2B1DF1B8693CF9B5C6E27FCFC6
3,144,494 UART: [art] SIG.S = F5B8909996BD27A325E2F6FC4431BA5EF8C9C54D5393D3965DA46EBAA953A647B93CC11A017274DB24934B8A42E4900A
3,168,491 UART: Caliptra RT
3,168,744 UART: [state] CFI Enabled
3,276,816 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,908 UART:
3,278,924 UART: Running Caliptra ROM ...
3,279,332 UART:
3,279,387 UART: [state] CFI Enabled
3,282,259 UART: [state] LifecycleState = Unprovisioned
3,282,914 UART: [state] DebugLocked = No
3,283,566 UART: [state] WD Timer not started. Device not locked for debugging
3,284,758 UART: [kat] SHA2-256
4,088,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,092,437 UART: [kat] ++
4,092,589 UART: [kat] sha1
4,096,855 UART: [kat] SHA2-256
4,098,795 UART: [kat] SHA2-384
4,101,726 UART: [kat] SHA2-512-ACC
4,103,626 UART: [kat] ECC-384
4,113,195 UART: [kat] HMAC-384Kdf
4,117,855 UART: [kat] LMS
4,366,167 UART: [kat] --
4,366,937 UART: [update-reset] ++
5,679,024 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,680,157 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,829,981 >>> mbox cmd response: success
Initializing fuses
5,830,363 UART:
5,830,379 UART: Running Caliptra ROM ...
5,830,787 UART:
5,830,842 UART: [state] CFI Enabled
5,833,152 UART: [state] LifecycleState = Unprovisioned
5,833,807 UART: [state] DebugLocked = No
5,834,397 UART: [state] WD Timer not started. Device not locked for debugging
5,835,706 UART: [kat] SHA2-256
6,639,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,643,385 UART: [kat] ++
6,643,537 UART: [kat] sha1
6,647,977 UART: [kat] SHA2-256
6,649,917 UART: [kat] SHA2-384
6,652,714 UART: [kat] SHA2-512-ACC
6,654,615 UART: [kat] ECC-384
6,664,230 UART: [kat] HMAC-384Kdf
6,668,796 UART: [kat] LMS
6,917,108 UART: [kat] --
6,918,022 UART: [warm-reset] ++
6,918,545 UART: [warm-reset] Prev Update Reset failed
6,919,400 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,465 >>> mbox cmd response: success
2,678,020 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,684,313 UART:
2,684,329 UART: Running Caliptra FMC ...
2,684,737 UART:
2,684,791 UART: [state] CFI Enabled
2,694,970 UART: [fht] FMC Alias Private Key: 7
2,803,177 UART: [art] Extend RT PCRs Done
2,803,605 UART: [art] Lock RT PCRs Done
2,805,033 UART: [art] Populate DV Done
2,813,078 UART: [fht] FMC Alias Private Key: 7
2,814,040 UART: [art] Derive CDI
2,814,320 UART: [art] Store in in slot 0x4
2,899,787 UART: [art] Derive Key Pair
2,900,147 UART: [art] Store priv key in slot 0x5
2,913,483 UART: [art] Derive Key Pair - Done
2,928,195 UART: [art] Signing Cert with AUTHO
2,928,675 UART: RITY.KEYID = 7
2,943,571 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,336 UART: [art] PUB.X = B1B753966093AB220788F7803883F59012BF5093B4A886ADB42DF242092FAEEA0570ACF030C6180C1DEDDA10C5E26772
2,951,096 UART: [art] PUB.Y = 71F558A3FDB816AB32F3B69DF21258282B981790DE89A2EE85893265C59CB90CCFEB0543D4B4AA8A6DC2FD4C8DC896E7
2,958,054 UART: [art] SIG.R = FA92939FAE502D3648EB4A3D363A4C15FA1575BA7999BBB17FD9F1CF7F72E14D81F3AE33646B219CB9F6F85B3231DCFE
2,964,842 UART: [art] SIG.S = DB3C177EEBF0F8FF071FEC2C56B82F416FD2EDD0884917BE6C669E5FB8A28A90EAEF80A24EA842941FF3F735947C34C1
2,989,028 UART: Caliptra RT
2,989,281 UART: [state] CFI Enabled
3,098,247 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,532,671 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
891,345 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,474 UART: [kat] ++
895,626 UART: [kat] sha1
899,972 UART: [kat] SHA2-256
901,912 UART: [kat] SHA2-384
904,589 UART: [kat] SHA2-512-ACC
906,490 UART: [kat] ECC-384
915,991 UART: [kat] HMAC-384Kdf
920,423 UART: [kat] LMS
1,168,735 UART: [kat] --
1,169,498 UART: [cold-reset] ++
1,169,896 UART: [fht] FHT @ 0x50003400
1,172,542 UART: [idev] ++
1,172,710 UART: [idev] CDI.KEYID = 6
1,173,071 UART: [idev] SUBJECT.KEYID = 7
1,173,496 UART: [idev] UDS.KEYID = 0
1,182,254 UART: [idev] Erasing UDS.KEYID = 0
1,199,052 UART: [idev] Sha1 KeyId Algorithm
1,207,998 UART: [idev] --
1,208,887 UART: [ldev] ++
1,209,055 UART: [ldev] CDI.KEYID = 6
1,209,419 UART: [ldev] SUBJECT.KEYID = 5
1,209,846 UART: [ldev] AUTHORITY.KEYID = 7
1,210,309 UART: [ldev] FE.KEYID = 1
1,215,727 UART: [ldev] Erasing FE.KEYID = 1
1,242,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,711 UART: [ldev] --
1,282,001 UART: [fwproc] Wait for Commands...
1,282,666 UART: [fwproc] Recv command 0x46574c44
1,283,399 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,115 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,415 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,724 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,624 >>> mbox cmd response: success
2,773,721 UART: [afmc] ++
2,773,889 UART: [afmc] CDI.KEYID = 6
2,774,252 UART: [afmc] SUBJECT.KEYID = 7
2,774,678 UART: [afmc] AUTHORITY.KEYID = 5
2,811,025 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,242 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,971 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,854 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,573 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,288 UART: [afmc] --
2,854,308 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,854,330 UART: [cold-reset] --
2,855,348 UART: [state] Locking Datavault
2,856,671 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,275 UART: [state] Locking ICCM
2,857,759 UART: [exit] Launching FMC @ 0x40000130
2,863,088 UART:
2,863,104 UART: Running Caliptra FMC ...
2,863,512 UART:
2,863,655 UART: [state] CFI Enabled
2,874,322 UART: [fht] FMC Alias Private Key: 7
2,982,251 UART: [art] Extend RT PCRs Done
2,982,679 UART: [art] Lock RT PCRs Done
2,984,155 UART: [art] Populate DV Done
2,992,474 UART: [fht] FMC Alias Private Key: 7
2,993,432 UART: [art] Derive CDI
2,993,712 UART: [art] Store in in slot 0x4
3,079,421 UART: [art] Derive Key Pair
3,079,781 UART: [art] Store priv key in slot 0x5
3,093,071 UART: [art] Derive Key Pair - Done
3,107,993 UART: [art] Signing Cert with AUTHO
3,108,473 UART: RITY.KEYID = 7
3,124,077 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,842 UART: [art] PUB.X = E4295290C369D0EA348DF27B1416E0886AB77308EE80077CC55638F04B8AD1F405279E7EE5B3AB601546BD13F31E9F8D
3,131,605 UART: [art] PUB.Y = 0C952EA413F2EFC807439B6387CE4212EEB0222E5EDECAC36EEEAA83B0A6B43544F6F973E3A2EF65589EF2AF5A2D7B63
3,138,569 UART: [art] SIG.R = D3621659E0019F9C177AEBC0E904DBBD6D6C0645FB2110635B5B2AD602960F69F9A25C89BAA6901464A9D0474B366A5A
3,145,328 UART: [art] SIG.S = 10A9A61E6A9568192EAF05EEE952575163D1167EF9889FC6E3764CF77E161992E04AD8E3D342A231908AEB5E3876849F
3,168,992 UART: Caliptra RT
3,169,337 UART: [state] CFI Enabled
3,277,744 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,862 UART:
3,279,878 UART: Running Caliptra ROM ...
3,280,286 UART:
3,280,428 UART: [state] CFI Enabled
3,283,194 UART: [state] LifecycleState = Unprovisioned
3,283,849 UART: [state] DebugLocked = No
3,284,491 UART: [state] WD Timer not started. Device not locked for debugging
3,285,809 UART: [kat] SHA2-256
4,089,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,093,488 UART: [kat] ++
4,093,640 UART: [kat] sha1
4,097,884 UART: [kat] SHA2-256
4,099,824 UART: [kat] SHA2-384
4,102,681 UART: [kat] SHA2-512-ACC
4,104,581 UART: [kat] ECC-384
4,114,200 UART: [kat] HMAC-384Kdf
4,119,028 UART: [kat] LMS
4,367,340 UART: [kat] --
4,367,962 UART: [update-reset] ++
5,679,357 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,680,484 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,830,308 >>> mbox cmd response: success
Initializing fuses
5,830,588 UART:
5,830,604 UART: Running Caliptra ROM ...
5,831,012 UART:
5,831,154 UART: [state] CFI Enabled
5,833,714 UART: [state] LifecycleState = Unprovisioned
5,834,369 UART: [state] DebugLocked = No
5,834,859 UART: [state] WD Timer not started. Device not locked for debugging
5,836,090 UART: [kat] SHA2-256
6,639,640 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,643,769 UART: [kat] ++
6,643,921 UART: [kat] sha1
6,648,239 UART: [kat] SHA2-256
6,650,179 UART: [kat] SHA2-384
6,652,938 UART: [kat] SHA2-512-ACC
6,654,839 UART: [kat] ECC-384
6,664,596 UART: [kat] HMAC-384Kdf
6,669,238 UART: [kat] LMS
6,917,550 UART: [kat] --
6,918,570 UART: [warm-reset] ++
6,919,273 UART: [warm-reset] Prev Update Reset failed
6,920,244 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,076 >>> mbox cmd response: success
2,677,989 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,684,132 UART:
2,684,148 UART: Running Caliptra FMC ...
2,684,556 UART:
2,684,699 UART: [state] CFI Enabled
2,695,412 UART: [fht] FMC Alias Private Key: 7
2,802,965 UART: [art] Extend RT PCRs Done
2,803,393 UART: [art] Lock RT PCRs Done
2,805,017 UART: [art] Populate DV Done
2,813,224 UART: [fht] FMC Alias Private Key: 7
2,814,302 UART: [art] Derive CDI
2,814,582 UART: [art] Store in in slot 0x4
2,900,565 UART: [art] Derive Key Pair
2,900,925 UART: [art] Store priv key in slot 0x5
2,914,263 UART: [art] Derive Key Pair - Done
2,928,704 UART: [art] Signing Cert with AUTHO
2,929,184 UART: RITY.KEYID = 7
2,944,494 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,259 UART: [art] PUB.X = 7048EC2D37502F8B949EAB017737747F4084DAC8E9C8DCB4078017A1F76AA729911703C8E76624F4D5728EB9DE2E4A3E
2,952,022 UART: [art] PUB.Y = 6A25C9D775D89D72E5247471A45BA91B1AF71234434A4FB82FA152F04101A596C2AD0ACD85E2DFBEE6476388010CF65E
2,958,966 UART: [art] SIG.R = C5947DE49BCF882C42A0CAF1911481B5E30E3E7EE3759EC4460D43B50BC48F030FC1ACF5F6349BB297978F712BFAF7D9
2,965,735 UART: [art] SIG.S = 1CA38CE2772468049F3E772B8554E5FFC7504D16B18C835ED8D61283C29296460850DDCC3C64BD34066BCBACB222E368
2,989,457 UART: Caliptra RT
2,989,802 UART: [state] CFI Enabled
3,098,281 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,532,612 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,957 UART: [state] LifecycleState = Production
85,565 UART: [state] DebugLocked = Yes
86,311 UART: [state] Starting the WD Timer 40000000 cycles
87,844 UART: [kat] SHA2-256
891,394 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,523 UART: [kat] ++
895,675 UART: [kat] sha1
900,001 UART: [kat] SHA2-256
901,941 UART: [kat] SHA2-384
904,596 UART: [kat] SHA2-512-ACC
906,497 UART: [kat] ECC-384
916,084 UART: [kat] HMAC-384Kdf
920,634 UART: [kat] LMS
1,168,946 UART: [kat] --
1,169,621 UART: [cold-reset] ++
1,170,026 UART: [fht] FHT @ 0x50003400
1,172,524 UART: [idev] ++
1,172,692 UART: [idev] CDI.KEYID = 6
1,173,053 UART: [idev] SUBJECT.KEYID = 7
1,173,478 UART: [idev] UDS.KEYID = 0
1,173,824 ready_for_fw is high
1,173,824 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,225 UART: [idev] Erasing UDS.KEYID = 0
1,198,142 UART: [idev] Sha1 KeyId Algorithm
1,207,019 UART: [idev] --
1,208,256 UART: [ldev] ++
1,208,424 UART: [ldev] CDI.KEYID = 6
1,208,788 UART: [ldev] SUBJECT.KEYID = 5
1,209,215 UART: [ldev] AUTHORITY.KEYID = 7
1,209,678 UART: [ldev] FE.KEYID = 1
1,214,790 UART: [ldev] Erasing FE.KEYID = 1
1,240,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,935 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,259,629 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,499 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,205 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,079 UART: [ldev] --
1,279,565 UART: [fwproc] Wait for Commands...
1,280,370 UART: [fwproc] Recv command 0x46574c44
1,281,103 UART: [fwproc] Recv'd Img size: 114332 bytes
2,602,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,629,736 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,045 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,794,832 >>> mbox cmd response: success
2,795,982 UART: [afmc] ++
2,796,150 UART: [afmc] CDI.KEYID = 6
2,796,513 UART: [afmc] SUBJECT.KEYID = 7
2,796,939 UART: [afmc] AUTHORITY.KEYID = 5
2,832,418 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,048 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,849,799 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,855,518 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,861,411 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,867,118 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,105 UART: [afmc] --
2,876,158 UART: [cold-reset] --
2,877,016 UART: [state] Locking Datavault
2,878,131 UART: [state] Locking PCR0, PCR1 and PCR31
2,878,735 UART: [state] Locking ICCM
2,879,393 UART: [exit] Launching FMC @ 0x40000130
2,884,722 UART:
2,884,738 UART: Running Caliptra FMC ...
2,885,146 UART:
2,885,200 UART: [state] CFI Enabled
2,895,717 UART: [fht] FMC Alias Private Key: 7
3,004,340 UART: [art] Extend RT PCRs Done
3,004,768 UART: [art] Lock RT PCRs Done
3,006,080 UART: [art] Populate DV Done
3,014,506 UART: [fht] FMC Alias Private Key: 7
3,015,618 UART: [art] Derive CDI
3,015,898 UART: [art] Store in in slot 0x4
3,101,445 UART: [art] Derive Key Pair
3,101,805 UART: [art] Store priv key in slot 0x5
3,115,229 UART: [art] Derive Key Pair - Done
3,130,492 UART: [art] Signing Cert with AUTHO
3,130,972 UART: RITY.KEYID = 7
3,146,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,827 UART: [art] PUB.X = 287EA27DFE6E94AEB5317E2140B36CC06665074F67EE05F5EDDA73F581DF62A45174353C793BA10CF098F805E499AF04
3,153,588 UART: [art] PUB.Y = 2C63F1978ED3436223C887C7F16164118EBD269833B6C586F9E92B9E07CFF8BEC6ABC5B652BBD98C172A2003313CD8B1
3,160,538 UART: [art] SIG.R = 82874A4A95A00ED0946A6B18D60D4BC0D65B8532F548E3E85543AC6C16BCDF5FD544006A01865E850E6F6D3FA36A01BE
3,167,279 UART: [art] SIG.S = F183B7A4EC78087FDEA2057E89F785F0A3250D8EDBB5BA16F39953EB1E9A3CD670B6A3599C6CD9DED79D9AF620977F08
3,191,370 UART: Caliptra RT
3,191,623 UART: [state] CFI Enabled
3,299,498 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,254 UART:
3,300,270 UART: Running Caliptra ROM ...
3,300,678 UART:
3,300,733 UART: [state] CFI Enabled
3,303,484 UART: [state] LifecycleState = Production
3,304,092 UART: [state] DebugLocked = Yes
3,304,612 UART: [state] Starting the WD Timer 40000000 cycles
3,306,309 UART: [kat] SHA2-256
4,109,859 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,988 UART: [kat] ++
4,114,140 UART: [kat] sha1
4,118,526 UART: [kat] SHA2-256
4,120,466 UART: [kat] SHA2-384
4,123,165 UART: [kat] SHA2-512-ACC
4,125,066 UART: [kat] ECC-384
4,134,783 UART: [kat] HMAC-384Kdf
4,139,473 UART: [kat] LMS
4,387,785 UART: [kat] --
4,388,755 UART: [warm-reset] ++
4,389,654 UART: [warm-reset] --
4,390,563 UART: [state] Locking Datavault
4,391,257 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,861 UART: [state] Locking ICCM
4,392,443 UART: [exit] Launching FMC @ 0x40000130
4,397,772 UART:
4,397,788 UART: Running Caliptra FMC ...
4,398,196 UART:
4,398,250 UART: [state] CFI Enabled
4,399,559 UART: [aliasrt :skip pcr extension
4,400,032 UART: [art] Extend RT PCRs Done
4,400,460 UART: [art] Lock RT PCRs Done
4,401,611 UART: [art] Populate DV Done
4,409,857 UART: [fht] FMC Alias Private Key: 7
4,410,903 UART: [art] Derive CDI
4,411,183 UART: [art] Store in in slot 0x4
4,496,782 UART: [art] Derive Key Pair
4,497,142 UART: [art] Store priv key in slot 0x5
4,510,716 UART: [art] Derive Key Pair - Done
4,525,601 UART: [art] Signing Cert with AUTHO
4,526,081 UART: RITY.KEYID = 7
4,541,499 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,264 UART: [art] PUB.X = 287EA27DFE6E94AEB5317E2140B36CC06665074F67EE05F5EDDA73F581DF62A45174353C793BA10CF098F805E499AF04
4,549,025 UART: [art] PUB.Y = 2C63F1978ED3436223C887C7F16164118EBD269833B6C586F9E92B9E07CFF8BEC6ABC5B652BBD98C172A2003313CD8B1
4,555,975 UART: [art] SIG.R = 82874A4A95A00ED0946A6B18D60D4BC0D65B8532F548E3E85543AC6C16BCDF5FD544006A01865E850E6F6D3FA36A01BE
4,562,716 UART: [art] SIG.S = F183B7A4EC78087FDEA2057E89F785F0A3250D8EDBB5BA16F39953EB1E9A3CD670B6A3599C6CD9DED79D9AF620977F08
4,586,083 UART: Caliptra RT
4,586,336 UART: [state] CFI Enabled
4,869,283 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Production
86,025 UART: [state] DebugLocked = Yes
86,699 UART: [state] Starting the WD Timer 40000000 cycles
88,290 UART: [kat] SHA2-256
891,840 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,969 UART: [kat] ++
896,121 UART: [kat] sha1
900,349 UART: [kat] SHA2-256
902,289 UART: [kat] SHA2-384
904,840 UART: [kat] SHA2-512-ACC
906,741 UART: [kat] ECC-384
916,878 UART: [kat] HMAC-384Kdf
921,404 UART: [kat] LMS
1,169,716 UART: [kat] --
1,170,653 UART: [cold-reset] ++
1,171,204 UART: [fht] FHT @ 0x50003400
1,173,618 UART: [idev] ++
1,173,786 UART: [idev] CDI.KEYID = 6
1,174,147 UART: [idev] SUBJECT.KEYID = 7
1,174,572 UART: [idev] UDS.KEYID = 0
1,174,918 ready_for_fw is high
1,174,918 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,535 UART: [idev] Erasing UDS.KEYID = 0
1,200,026 UART: [idev] Sha1 KeyId Algorithm
1,209,063 UART: [idev] --
1,209,948 UART: [ldev] ++
1,210,116 UART: [ldev] CDI.KEYID = 6
1,210,480 UART: [ldev] SUBJECT.KEYID = 5
1,210,907 UART: [ldev] AUTHORITY.KEYID = 7
1,211,370 UART: [ldev] FE.KEYID = 1
1,216,664 UART: [ldev] Erasing FE.KEYID = 1
1,242,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,425 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,119 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,989 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,695 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,781 UART: [ldev] --
1,282,117 UART: [fwproc] Wait for Commands...
1,282,816 UART: [fwproc] Recv command 0x46574c44
1,283,549 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,849 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,372 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,681 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,384 >>> mbox cmd response: success
2,798,592 UART: [afmc] ++
2,798,760 UART: [afmc] CDI.KEYID = 6
2,799,123 UART: [afmc] SUBJECT.KEYID = 7
2,799,549 UART: [afmc] AUTHORITY.KEYID = 5
2,834,806 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,124 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,875 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,594 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,487 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,194 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,095 UART: [afmc] --
2,878,022 UART: [cold-reset] --
2,878,838 UART: [state] Locking Datavault
2,880,235 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,839 UART: [state] Locking ICCM
2,881,289 UART: [exit] Launching FMC @ 0x40000130
2,886,618 UART:
2,886,634 UART: Running Caliptra FMC ...
2,887,042 UART:
2,887,096 UART: [state] CFI Enabled
2,897,911 UART: [fht] FMC Alias Private Key: 7
3,006,022 UART: [art] Extend RT PCRs Done
3,006,450 UART: [art] Lock RT PCRs Done
3,007,890 UART: [art] Populate DV Done
3,015,822 UART: [fht] FMC Alias Private Key: 7
3,016,886 UART: [art] Derive CDI
3,017,166 UART: [art] Store in in slot 0x4
3,102,995 UART: [art] Derive Key Pair
3,103,355 UART: [art] Store priv key in slot 0x5
3,116,247 UART: [art] Derive Key Pair - Done
3,131,101 UART: [art] Signing Cert with AUTHO
3,131,581 UART: RITY.KEYID = 7
3,146,949 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,714 UART: [art] PUB.X = CB9BCE4AE2C47477803FFACB65B3CAA9BFFCED01F61E95B1F1F6A7847B462F1B7CE0CB91BCD5B895B24B4F0ED4F62057
3,154,508 UART: [art] PUB.Y = 4D94AE46EC276968E02D2E4D8FAB3504EDAEFE9A920B33B0280F382A1D93B78AA396AB17EF642DDE9BA7A8D40F67BE6B
3,161,468 UART: [art] SIG.R = BAE557DD5AB38C19B1B02F526E027B55B50AB10DB7692241B6D06319B54746AB32991217D048327E97A97A352F51B30C
3,168,224 UART: [art] SIG.S = 93B0AA87FA2FD92F778D9915F3F31072492B34C22B61CE3040FEA088929C459F7C7452AE6B0A34620C638AA79CF4E97A
3,191,577 UART: Caliptra RT
3,191,830 UART: [state] CFI Enabled
3,299,931 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,687 UART:
3,300,703 UART: Running Caliptra ROM ...
3,301,111 UART:
3,301,166 UART: [state] CFI Enabled
3,303,455 UART: [state] LifecycleState = Production
3,304,063 UART: [state] DebugLocked = Yes
3,304,637 UART: [state] Starting the WD Timer 40000000 cycles
3,306,278 UART: [kat] SHA2-256
4,109,828 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,957 UART: [kat] ++
4,114,109 UART: [kat] sha1
4,118,293 UART: [kat] SHA2-256
4,120,233 UART: [kat] SHA2-384
4,122,976 UART: [kat] SHA2-512-ACC
4,124,877 UART: [kat] ECC-384
4,134,338 UART: [kat] HMAC-384Kdf
4,138,956 UART: [kat] LMS
4,387,268 UART: [kat] --
4,388,356 UART: [warm-reset] ++
4,389,345 UART: [warm-reset] --
4,390,130 UART: [state] Locking Datavault
4,391,022 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,626 UART: [state] Locking ICCM
4,392,158 UART: [exit] Launching FMC @ 0x40000130
4,397,487 UART:
4,397,503 UART: Running Caliptra FMC ...
4,397,911 UART:
4,397,965 UART: [state] CFI Enabled
4,399,010 UART: [aliasrt :skip pcr extension
4,399,483 UART: [art] Extend RT PCRs Done
4,399,911 UART: [art] Lock RT PCRs Done
4,401,126 UART: [art] Populate DV Done
4,409,642 UART: [fht] FMC Alias Private Key: 7
4,410,582 UART: [art] Derive CDI
4,410,862 UART: [art] Store in in slot 0x4
4,495,877 UART: [art] Derive Key Pair
4,496,237 UART: [art] Store priv key in slot 0x5
4,509,181 UART: [art] Derive Key Pair - Done
4,523,795 UART: [art] Signing Cert with AUTHO
4,524,275 UART: RITY.KEYID = 7
4,539,131 UART: [art] Erasing AUTHORITY.KEYID = 7
4,539,896 UART: [art] PUB.X = CB9BCE4AE2C47477803FFACB65B3CAA9BFFCED01F61E95B1F1F6A7847B462F1B7CE0CB91BCD5B895B24B4F0ED4F62057
4,546,690 UART: [art] PUB.Y = 4D94AE46EC276968E02D2E4D8FAB3504EDAEFE9A920B33B0280F382A1D93B78AA396AB17EF642DDE9BA7A8D40F67BE6B
4,553,650 UART: [art] SIG.R = BAE557DD5AB38C19B1B02F526E027B55B50AB10DB7692241B6D06319B54746AB32991217D048327E97A97A352F51B30C
4,560,406 UART: [art] SIG.S = 93B0AA87FA2FD92F778D9915F3F31072492B34C22B61CE3040FEA088929C459F7C7452AE6B0A34620C638AA79CF4E97A
4,584,289 UART: Caliptra RT
4,584,542 UART: [state] CFI Enabled
4,868,433 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,754 UART: [state] LifecycleState = Production
86,362 UART: [state] DebugLocked = Yes
87,028 UART: [state] Starting the WD Timer 40000000 cycles
88,519 UART: [kat] SHA2-256
892,069 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,198 UART: [kat] ++
896,350 UART: [kat] sha1
900,542 UART: [kat] SHA2-256
902,482 UART: [kat] SHA2-384
905,195 UART: [kat] SHA2-512-ACC
907,096 UART: [kat] ECC-384
917,247 UART: [kat] HMAC-384Kdf
921,839 UART: [kat] LMS
1,170,151 UART: [kat] --
1,170,934 UART: [cold-reset] ++
1,171,313 UART: [fht] FHT @ 0x50003400
1,174,089 UART: [idev] ++
1,174,257 UART: [idev] CDI.KEYID = 6
1,174,618 UART: [idev] SUBJECT.KEYID = 7
1,175,043 UART: [idev] UDS.KEYID = 0
1,175,389 ready_for_fw is high
1,175,389 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,886 UART: [idev] Erasing UDS.KEYID = 0
1,199,847 UART: [idev] Sha1 KeyId Algorithm
1,208,860 UART: [idev] --
1,209,837 UART: [ldev] ++
1,210,005 UART: [ldev] CDI.KEYID = 6
1,210,369 UART: [ldev] SUBJECT.KEYID = 5
1,210,796 UART: [ldev] AUTHORITY.KEYID = 7
1,211,259 UART: [ldev] FE.KEYID = 1
1,216,819 UART: [ldev] Erasing FE.KEYID = 1
1,242,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,948 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,642 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,512 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,218 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,188 UART: [ldev] --
1,282,636 UART: [fwproc] Wait for Commands...
1,283,453 UART: [fwproc] Recv command 0x46574c44
1,284,186 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,548 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,609 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,918 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,663 >>> mbox cmd response: success
2,799,873 UART: [afmc] ++
2,800,041 UART: [afmc] CDI.KEYID = 6
2,800,404 UART: [afmc] SUBJECT.KEYID = 7
2,800,830 UART: [afmc] AUTHORITY.KEYID = 5
2,836,907 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,926 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,645 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,538 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,245 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,112 UART: [afmc] --
2,880,231 UART: [cold-reset] --
2,881,157 UART: [state] Locking Datavault
2,882,390 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,994 UART: [state] Locking ICCM
2,883,418 UART: [exit] Launching FMC @ 0x40000130
2,888,747 UART:
2,888,763 UART: Running Caliptra FMC ...
2,889,171 UART:
2,889,314 UART: [state] CFI Enabled
2,899,799 UART: [fht] FMC Alias Private Key: 7
3,008,280 UART: [art] Extend RT PCRs Done
3,008,708 UART: [art] Lock RT PCRs Done
3,010,518 UART: [art] Populate DV Done
3,018,572 UART: [fht] FMC Alias Private Key: 7
3,019,664 UART: [art] Derive CDI
3,019,944 UART: [art] Store in in slot 0x4
3,105,707 UART: [art] Derive Key Pair
3,106,067 UART: [art] Store priv key in slot 0x5
3,119,007 UART: [art] Derive Key Pair - Done
3,133,561 UART: [art] Signing Cert with AUTHO
3,134,041 UART: RITY.KEYID = 7
3,149,015 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,780 UART: [art] PUB.X = 0BBD0E4D9857E081BCC0F449B3745147ECC35B16841AA85CC8CD81608F730B21B1A59B91E8DB823A5EB52F98644E469D
3,156,549 UART: [art] PUB.Y = 409E825C1210F4F4D1C3D33162A7409A90C6465415EFBCA47A93682E414A00220DD6F6A24EEFF49A541EC196E6CEC241
3,163,478 UART: [art] SIG.R = 0EA759A83FB980EC83C07F092EF89CBD6BFF868AF6C6F2790F38BB73E9324CAE18D11B16E7B74BE636283B70B7B800CD
3,170,233 UART: [art] SIG.S = 5F4E09333FA5319EC9B52A84169EC2C4BBA8A1CCB66B627777762FB7BDC8AD922E2EF3684C49DBD411EE82A0D5BE5BF8
3,194,125 UART: Caliptra RT
3,194,470 UART: [state] CFI Enabled
3,301,910 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,666 UART:
3,302,682 UART: Running Caliptra ROM ...
3,303,090 UART:
3,303,232 UART: [state] CFI Enabled
3,305,755 UART: [state] LifecycleState = Production
3,306,363 UART: [state] DebugLocked = Yes
3,306,953 UART: [state] Starting the WD Timer 40000000 cycles
3,308,658 UART: [kat] SHA2-256
4,112,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,337 UART: [kat] ++
4,116,489 UART: [kat] sha1
4,120,761 UART: [kat] SHA2-256
4,122,701 UART: [kat] SHA2-384
4,125,448 UART: [kat] SHA2-512-ACC
4,127,349 UART: [kat] ECC-384
4,137,404 UART: [kat] HMAC-384Kdf
4,141,928 UART: [kat] LMS
4,390,240 UART: [kat] --
4,390,864 UART: [warm-reset] ++
4,391,557 UART: [warm-reset] --
4,392,248 UART: [state] Locking Datavault
4,392,874 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,478 UART: [state] Locking ICCM
4,394,076 UART: [exit] Launching FMC @ 0x40000130
4,399,405 UART:
4,399,421 UART: Running Caliptra FMC ...
4,399,829 UART:
4,399,972 UART: [state] CFI Enabled
4,401,633 UART: [aliasrt :skip pcr extension
4,402,106 UART: [art] Extend RT PCRs Done
4,402,534 UART: [art] Lock RT PCRs Done
4,403,901 UART: [art] Populate DV Done
4,412,117 UART: [fht] FMC Alias Private Key: 7
4,413,111 UART: [art] Derive CDI
4,413,391 UART: [art] Store in in slot 0x4
4,499,214 UART: [art] Derive Key Pair
4,499,574 UART: [art] Store priv key in slot 0x5
4,512,968 UART: [art] Derive Key Pair - Done
4,527,872 UART: [art] Signing Cert with AUTHO
4,528,352 UART: RITY.KEYID = 7
4,544,136 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,901 UART: [art] PUB.X = 0BBD0E4D9857E081BCC0F449B3745147ECC35B16841AA85CC8CD81608F730B21B1A59B91E8DB823A5EB52F98644E469D
4,551,670 UART: [art] PUB.Y = 409E825C1210F4F4D1C3D33162A7409A90C6465415EFBCA47A93682E414A00220DD6F6A24EEFF49A541EC196E6CEC241
4,558,599 UART: [art] SIG.R = 0EA759A83FB980EC83C07F092EF89CBD6BFF868AF6C6F2790F38BB73E9324CAE18D11B16E7B74BE636283B70B7B800CD
4,565,354 UART: [art] SIG.S = 5F4E09333FA5319EC9B52A84169EC2C4BBA8A1CCB66B627777762FB7BDC8AD922E2EF3684C49DBD411EE82A0D5BE5BF8
4,589,098 UART: Caliptra RT
4,589,443 UART: [state] CFI Enabled
4,867,065 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Production
86,060 UART: [state] DebugLocked = Yes
86,644 UART: [state] Starting the WD Timer 40000000 cycles
88,289 UART: [kat] SHA2-256
891,839 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,968 UART: [kat] ++
896,120 UART: [kat] sha1
900,462 UART: [kat] SHA2-256
902,402 UART: [kat] SHA2-384
905,373 UART: [kat] SHA2-512-ACC
907,274 UART: [kat] ECC-384
917,123 UART: [kat] HMAC-384Kdf
921,709 UART: [kat] LMS
1,170,021 UART: [kat] --
1,171,162 UART: [cold-reset] ++
1,171,725 UART: [fht] FHT @ 0x50003400
1,174,399 UART: [idev] ++
1,174,567 UART: [idev] CDI.KEYID = 6
1,174,928 UART: [idev] SUBJECT.KEYID = 7
1,175,353 UART: [idev] UDS.KEYID = 0
1,175,699 ready_for_fw is high
1,175,699 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,326 UART: [idev] Erasing UDS.KEYID = 0
1,200,253 UART: [idev] Sha1 KeyId Algorithm
1,209,018 UART: [idev] --
1,210,013 UART: [ldev] ++
1,210,181 UART: [ldev] CDI.KEYID = 6
1,210,545 UART: [ldev] SUBJECT.KEYID = 5
1,210,972 UART: [ldev] AUTHORITY.KEYID = 7
1,211,435 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,243,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,638 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,332 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,202 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,908 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,928 UART: [ldev] --
1,282,334 UART: [fwproc] Wait for Commands...
1,283,119 UART: [fwproc] Recv command 0x46574c44
1,283,852 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,176 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,109 >>> mbox cmd response: success
2,799,345 UART: [afmc] ++
2,799,513 UART: [afmc] CDI.KEYID = 6
2,799,876 UART: [afmc] SUBJECT.KEYID = 7
2,800,302 UART: [afmc] AUTHORITY.KEYID = 5
2,835,707 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,160 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,879 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,772 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,479 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,478 UART: [afmc] --
2,879,411 UART: [cold-reset] --
2,880,317 UART: [state] Locking Datavault
2,881,510 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,114 UART: [state] Locking ICCM
2,882,624 UART: [exit] Launching FMC @ 0x40000130
2,887,953 UART:
2,887,969 UART: Running Caliptra FMC ...
2,888,377 UART:
2,888,520 UART: [state] CFI Enabled
2,898,945 UART: [fht] FMC Alias Private Key: 7
3,007,436 UART: [art] Extend RT PCRs Done
3,007,864 UART: [art] Lock RT PCRs Done
3,009,134 UART: [art] Populate DV Done
3,017,288 UART: [fht] FMC Alias Private Key: 7
3,018,416 UART: [art] Derive CDI
3,018,696 UART: [art] Store in in slot 0x4
3,104,255 UART: [art] Derive Key Pair
3,104,615 UART: [art] Store priv key in slot 0x5
3,118,315 UART: [art] Derive Key Pair - Done
3,132,903 UART: [art] Signing Cert with AUTHO
3,133,383 UART: RITY.KEYID = 7
3,148,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,322 UART: [art] PUB.X = D436C82D89CD65A47499A85032D4F7FE7A64CAEC58C83EE242A0B0B7A3C5E98ED4A41B84607081EA12BAA5BCCF03D5E5
3,156,107 UART: [art] PUB.Y = B58CCE8C419B00ABA2A44BFBDA468175383CB39A31ABF0624BCED238BD5B5B79EE2FED0C1CA1766C29D3E8E098F862D8
3,163,056 UART: [art] SIG.R = 98E8F19AA84AD8E863E5BFEB5529A21A24224FD0D924893D0AE252C569A42F501CAE18318F6EED8C1525B1AD9F715088
3,169,831 UART: [art] SIG.S = 0669DAA0C774FBBAF572E138203D583EE4FF6B2DBB46077D4B6BB74C970541BA16D5A514206EDE5AB1E23F5163A5FA68
3,193,953 UART: Caliptra RT
3,194,298 UART: [state] CFI Enabled
3,302,213 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,969 UART:
3,302,985 UART: Running Caliptra ROM ...
3,303,393 UART:
3,303,535 UART: [state] CFI Enabled
3,306,028 UART: [state] LifecycleState = Production
3,306,636 UART: [state] DebugLocked = Yes
3,307,282 UART: [state] Starting the WD Timer 40000000 cycles
3,308,929 UART: [kat] SHA2-256
4,112,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,608 UART: [kat] ++
4,116,760 UART: [kat] sha1
4,120,916 UART: [kat] SHA2-256
4,122,856 UART: [kat] SHA2-384
4,125,573 UART: [kat] SHA2-512-ACC
4,127,474 UART: [kat] ECC-384
4,137,181 UART: [kat] HMAC-384Kdf
4,141,779 UART: [kat] LMS
4,390,091 UART: [kat] --
4,390,973 UART: [warm-reset] ++
4,391,856 UART: [warm-reset] --
4,392,939 UART: [state] Locking Datavault
4,393,805 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,409 UART: [state] Locking ICCM
4,394,933 UART: [exit] Launching FMC @ 0x40000130
4,400,262 UART:
4,400,278 UART: Running Caliptra FMC ...
4,400,686 UART:
4,400,829 UART: [state] CFI Enabled
4,402,164 UART: [aliasrt :skip pcr extension
4,402,637 UART: [art] Extend RT PCRs Done
4,403,065 UART: [art] Lock RT PCRs Done
4,404,300 UART: [art] Populate DV Done
4,412,628 UART: [fht] FMC Alias Private Key: 7
4,413,710 UART: [art] Derive CDI
4,413,990 UART: [art] Store in in slot 0x4
4,499,891 UART: [art] Derive Key Pair
4,500,251 UART: [art] Store priv key in slot 0x5
4,513,545 UART: [art] Derive Key Pair - Done
4,528,029 UART: [art] Signing Cert with AUTHO
4,528,509 UART: RITY.KEYID = 7
4,543,345 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,110 UART: [art] PUB.X = D436C82D89CD65A47499A85032D4F7FE7A64CAEC58C83EE242A0B0B7A3C5E98ED4A41B84607081EA12BAA5BCCF03D5E5
4,550,895 UART: [art] PUB.Y = B58CCE8C419B00ABA2A44BFBDA468175383CB39A31ABF0624BCED238BD5B5B79EE2FED0C1CA1766C29D3E8E098F862D8
4,557,844 UART: [art] SIG.R = 98E8F19AA84AD8E863E5BFEB5529A21A24224FD0D924893D0AE252C569A42F501CAE18318F6EED8C1525B1AD9F715088
4,564,619 UART: [art] SIG.S = 0669DAA0C774FBBAF572E138203D583EE4FF6B2DBB46077D4B6BB74C970541BA16D5A514206EDE5AB1E23F5163A5FA68
4,588,509 UART: Caliptra RT
4,588,854 UART: [state] CFI Enabled
4,872,319 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Production
85,809 UART: [state] DebugLocked = Yes
86,319 UART: [state] Starting the WD Timer 40000000 cycles
87,962 UART: [kat] SHA2-256
891,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,641 UART: [kat] ++
895,793 UART: [kat] sha1
900,075 UART: [kat] SHA2-256
902,015 UART: [kat] SHA2-384
904,796 UART: [kat] SHA2-512-ACC
906,697 UART: [kat] ECC-384
916,030 UART: [kat] HMAC-384Kdf
920,688 UART: [kat] LMS
1,169,000 UART: [kat] --
1,169,821 UART: [cold-reset] ++
1,170,386 UART: [fht] FHT @ 0x50003400
1,173,050 UART: [idev] ++
1,173,218 UART: [idev] CDI.KEYID = 6
1,173,579 UART: [idev] SUBJECT.KEYID = 7
1,174,004 UART: [idev] UDS.KEYID = 0
1,174,350 ready_for_fw is high
1,174,350 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,903 UART: [idev] Erasing UDS.KEYID = 0
1,199,554 UART: [idev] Sha1 KeyId Algorithm
1,208,435 UART: [idev] --
1,209,302 UART: [ldev] ++
1,209,470 UART: [ldev] CDI.KEYID = 6
1,209,834 UART: [ldev] SUBJECT.KEYID = 5
1,210,261 UART: [ldev] AUTHORITY.KEYID = 7
1,210,724 UART: [ldev] FE.KEYID = 1
1,215,768 UART: [ldev] Erasing FE.KEYID = 1
1,241,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,503 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,197 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,067 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,773 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,927 UART: [ldev] --
1,281,361 UART: [fwproc] Wait for Commands...
1,282,034 UART: [fwproc] Recv command 0x46574c44
1,282,767 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,195 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,882 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,191 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,924 >>> mbox cmd response: success
2,799,144 UART: [afmc] ++
2,799,312 UART: [afmc] CDI.KEYID = 6
2,799,675 UART: [afmc] SUBJECT.KEYID = 7
2,800,101 UART: [afmc] AUTHORITY.KEYID = 5
2,835,642 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,917 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,636 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,529 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,236 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,955 UART: [afmc] --
2,879,070 UART: [cold-reset] --
2,879,880 UART: [state] Locking Datavault
2,881,039 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,643 UART: [state] Locking ICCM
2,882,199 UART: [exit] Launching FMC @ 0x40000130
2,887,528 UART:
2,887,544 UART: Running Caliptra FMC ...
2,887,952 UART:
2,888,006 UART: [state] CFI Enabled
2,898,679 UART: [fht] FMC Alias Private Key: 7
3,006,644 UART: [art] Extend RT PCRs Done
3,007,072 UART: [art] Lock RT PCRs Done
3,008,560 UART: [art] Populate DV Done
3,017,054 UART: [fht] FMC Alias Private Key: 7
3,018,098 UART: [art] Derive CDI
3,018,378 UART: [art] Store in in slot 0x4
3,103,965 UART: [art] Derive Key Pair
3,104,325 UART: [art] Store priv key in slot 0x5
3,117,003 UART: [art] Derive Key Pair - Done
3,131,728 UART: [art] Signing Cert with AUTHO
3,132,208 UART: RITY.KEYID = 7
3,148,022 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,787 UART: [art] PUB.X = ABFE574B125420FF9B3AB62F09D7A0DC983AE9EB56B0EB8B5B78BEA819A8650D7EE6486BEAD6AD858BEC4B991C737EA8
3,155,577 UART: [art] PUB.Y = B888004473E79B0AB4F555469D3C94E0CA20A588FBB4C9A581764AF9AA43F62EA8B81EB83B8190C8362157564AFBBD61
3,162,508 UART: [art] SIG.R = 976E6FFA93B64520EEE2F9BEAA42899F21D155EB6CD9BD38796350FED975192AB35008F85EED9787A3005FAF9F59F1C1
3,169,265 UART: [art] SIG.S = 3C978A525CCF1A3B74811C2775D29DDBE7199613145CEB93FD4B68C8EBB545318FA1045CD1CA5A17EA11FDD80A3E02E5
3,192,705 UART: Caliptra RT
3,192,958 UART: [state] CFI Enabled
3,300,623 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,379 UART:
3,301,395 UART: Running Caliptra ROM ...
3,301,803 UART:
3,301,858 UART: [state] CFI Enabled
3,304,665 UART: [state] LifecycleState = Production
3,305,273 UART: [state] DebugLocked = Yes
3,305,991 UART: [state] Starting the WD Timer 40000000 cycles
3,307,474 UART: [kat] SHA2-256
4,111,024 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,153 UART: [kat] ++
4,115,305 UART: [kat] sha1
4,119,569 UART: [kat] SHA2-256
4,121,509 UART: [kat] SHA2-384
4,124,218 UART: [kat] SHA2-512-ACC
4,126,119 UART: [kat] ECC-384
4,135,986 UART: [kat] HMAC-384Kdf
4,140,742 UART: [kat] LMS
4,389,054 UART: [kat] --
4,389,702 UART: [warm-reset] ++
4,390,721 UART: [warm-reset] --
4,391,552 UART: [state] Locking Datavault
4,392,252 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,856 UART: [state] Locking ICCM
4,393,480 UART: [exit] Launching FMC @ 0x40000130
4,398,809 UART:
4,398,825 UART: Running Caliptra FMC ...
4,399,233 UART:
4,399,287 UART: [state] CFI Enabled
4,400,488 UART: [aliasrt :skip pcr extension
4,400,961 UART: [art] Extend RT PCRs Done
4,401,389 UART: [art] Lock RT PCRs Done
4,402,528 UART: [art] Populate DV Done
4,410,518 UART: [fht] FMC Alias Private Key: 7
4,411,522 UART: [art] Derive CDI
4,411,802 UART: [art] Store in in slot 0x4
4,497,469 UART: [art] Derive Key Pair
4,497,829 UART: [art] Store priv key in slot 0x5
4,511,095 UART: [art] Derive Key Pair - Done
4,525,662 UART: [art] Signing Cert with AUTHO
4,526,142 UART: RITY.KEYID = 7
4,540,844 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,609 UART: [art] PUB.X = ABFE574B125420FF9B3AB62F09D7A0DC983AE9EB56B0EB8B5B78BEA819A8650D7EE6486BEAD6AD858BEC4B991C737EA8
4,548,399 UART: [art] PUB.Y = B888004473E79B0AB4F555469D3C94E0CA20A588FBB4C9A581764AF9AA43F62EA8B81EB83B8190C8362157564AFBBD61
4,555,330 UART: [art] SIG.R = 976E6FFA93B64520EEE2F9BEAA42899F21D155EB6CD9BD38796350FED975192AB35008F85EED9787A3005FAF9F59F1C1
4,562,087 UART: [art] SIG.S = 3C978A525CCF1A3B74811C2775D29DDBE7199613145CEB93FD4B68C8EBB545318FA1045CD1CA5A17EA11FDD80A3E02E5
4,585,515 UART: Caliptra RT
4,585,768 UART: [state] CFI Enabled
4,866,987 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Production
85,813 UART: [state] DebugLocked = Yes
86,329 UART: [state] Starting the WD Timer 40000000 cycles
87,940 UART: [kat] SHA2-256
891,490 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,619 UART: [kat] ++
895,771 UART: [kat] sha1
900,135 UART: [kat] SHA2-256
902,075 UART: [kat] SHA2-384
904,916 UART: [kat] SHA2-512-ACC
906,817 UART: [kat] ECC-384
916,518 UART: [kat] HMAC-384Kdf
921,022 UART: [kat] LMS
1,169,334 UART: [kat] --
1,170,145 UART: [cold-reset] ++
1,170,550 UART: [fht] FHT @ 0x50003400
1,173,070 UART: [idev] ++
1,173,238 UART: [idev] CDI.KEYID = 6
1,173,599 UART: [idev] SUBJECT.KEYID = 7
1,174,024 UART: [idev] UDS.KEYID = 0
1,174,370 ready_for_fw is high
1,174,370 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,107 UART: [idev] Erasing UDS.KEYID = 0
1,198,820 UART: [idev] Sha1 KeyId Algorithm
1,207,697 UART: [idev] --
1,208,674 UART: [ldev] ++
1,208,842 UART: [ldev] CDI.KEYID = 6
1,209,206 UART: [ldev] SUBJECT.KEYID = 5
1,209,633 UART: [ldev] AUTHORITY.KEYID = 7
1,210,096 UART: [ldev] FE.KEYID = 1
1,215,264 UART: [ldev] Erasing FE.KEYID = 1
1,241,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,301 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,995 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,865 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,571 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,453 UART: [ldev] --
1,280,869 UART: [fwproc] Wait for Commands...
1,281,632 UART: [fwproc] Recv command 0x46574c44
1,282,365 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,908 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,217 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,796,954 >>> mbox cmd response: success
2,798,040 UART: [afmc] ++
2,798,208 UART: [afmc] CDI.KEYID = 6
2,798,571 UART: [afmc] SUBJECT.KEYID = 7
2,798,997 UART: [afmc] AUTHORITY.KEYID = 5
2,834,512 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,186 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,937 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,656 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,549 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,256 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,287 UART: [afmc] --
2,878,402 UART: [cold-reset] --
2,879,178 UART: [state] Locking Datavault
2,880,631 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,235 UART: [state] Locking ICCM
2,881,777 UART: [exit] Launching FMC @ 0x40000130
2,887,106 UART:
2,887,122 UART: Running Caliptra FMC ...
2,887,530 UART:
2,887,584 UART: [state] CFI Enabled
2,898,075 UART: [fht] FMC Alias Private Key: 7
3,005,786 UART: [art] Extend RT PCRs Done
3,006,214 UART: [art] Lock RT PCRs Done
3,007,722 UART: [art] Populate DV Done
3,016,026 UART: [fht] FMC Alias Private Key: 7
3,017,126 UART: [art] Derive CDI
3,017,406 UART: [art] Store in in slot 0x4
3,102,609 UART: [art] Derive Key Pair
3,102,969 UART: [art] Store priv key in slot 0x5
3,116,299 UART: [art] Derive Key Pair - Done
3,131,047 UART: [art] Signing Cert with AUTHO
3,131,527 UART: RITY.KEYID = 7
3,146,125 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,890 UART: [art] PUB.X = 278599491B6CE69C786F91D8582510AD8BA9B409DC99911DDE8952E0068AE58B042D2114515CC6075F4259E73AB129C7
3,153,642 UART: [art] PUB.Y = 68DEBBDF11D0E0FDCB954DF55CDF4237307664CBC8C86066961DF52F27BF9339ED3F0796CC554E21925A350AF4776F88
3,160,596 UART: [art] SIG.R = EE9107D24EDB49AE28AE97EE0D87F52289C54BDF7AC8FF832BFD6D07A03B126EEAF058F7037B1266939C05C155AD84D9
3,167,367 UART: [art] SIG.S = B7906FE9123B637EEA201CB7CF611961AB6F8A10FA1D42D085416BEAEB2D0DF197AB1CDD0A378502119C742A7E7A5B54
3,191,571 UART: Caliptra RT
3,191,824 UART: [state] CFI Enabled
3,299,903 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,659 UART:
3,300,675 UART: Running Caliptra ROM ...
3,301,083 UART:
3,301,138 UART: [state] CFI Enabled
3,303,715 UART: [state] LifecycleState = Production
3,304,323 UART: [state] DebugLocked = Yes
3,304,835 UART: [state] Starting the WD Timer 40000000 cycles
3,306,482 UART: [kat] SHA2-256
4,110,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,161 UART: [kat] ++
4,114,313 UART: [kat] sha1
4,118,595 UART: [kat] SHA2-256
4,120,535 UART: [kat] SHA2-384
4,123,240 UART: [kat] SHA2-512-ACC
4,125,141 UART: [kat] ECC-384
4,135,068 UART: [kat] HMAC-384Kdf
4,139,786 UART: [kat] LMS
4,388,098 UART: [kat] --
4,388,928 UART: [warm-reset] ++
4,389,931 UART: [warm-reset] --
4,390,456 UART: [state] Locking Datavault
4,391,076 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,680 UART: [state] Locking ICCM
4,392,262 UART: [exit] Launching FMC @ 0x40000130
4,397,591 UART:
4,397,607 UART: Running Caliptra FMC ...
4,398,015 UART:
4,398,069 UART: [state] CFI Enabled
4,399,588 UART: [aliasrt :skip pcr extension
4,400,061 UART: [art] Extend RT PCRs Done
4,400,489 UART: [art] Lock RT PCRs Done
4,401,912 UART: [art] Populate DV Done
4,410,044 UART: [fht] FMC Alias Private Key: 7
4,411,154 UART: [art] Derive CDI
4,411,434 UART: [art] Store in in slot 0x4
4,496,759 UART: [art] Derive Key Pair
4,497,119 UART: [art] Store priv key in slot 0x5
4,509,911 UART: [art] Derive Key Pair - Done
4,524,573 UART: [art] Signing Cert with AUTHO
4,525,053 UART: RITY.KEYID = 7
4,540,311 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,076 UART: [art] PUB.X = 278599491B6CE69C786F91D8582510AD8BA9B409DC99911DDE8952E0068AE58B042D2114515CC6075F4259E73AB129C7
4,547,828 UART: [art] PUB.Y = 68DEBBDF11D0E0FDCB954DF55CDF4237307664CBC8C86066961DF52F27BF9339ED3F0796CC554E21925A350AF4776F88
4,554,782 UART: [art] SIG.R = EE9107D24EDB49AE28AE97EE0D87F52289C54BDF7AC8FF832BFD6D07A03B126EEAF058F7037B1266939C05C155AD84D9
4,561,553 UART: [art] SIG.S = B7906FE9123B637EEA201CB7CF611961AB6F8A10FA1D42D085416BEAEB2D0DF197AB1CDD0A378502119C742A7E7A5B54
4,585,169 UART: Caliptra RT
4,585,422 UART: [state] CFI Enabled
4,865,409 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,562 UART: [state] LifecycleState = Production
86,170 UART: [state] DebugLocked = Yes
86,842 UART: [state] Starting the WD Timer 40000000 cycles
88,435 UART: [kat] SHA2-256
891,985 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,114 UART: [kat] ++
896,266 UART: [kat] sha1
900,588 UART: [kat] SHA2-256
902,528 UART: [kat] SHA2-384
905,099 UART: [kat] SHA2-512-ACC
907,000 UART: [kat] ECC-384
916,899 UART: [kat] HMAC-384Kdf
921,439 UART: [kat] LMS
1,169,751 UART: [kat] --
1,170,630 UART: [cold-reset] ++
1,170,991 UART: [fht] FHT @ 0x50003400
1,173,623 UART: [idev] ++
1,173,791 UART: [idev] CDI.KEYID = 6
1,174,152 UART: [idev] SUBJECT.KEYID = 7
1,174,577 UART: [idev] UDS.KEYID = 0
1,174,923 ready_for_fw is high
1,174,923 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,514 UART: [idev] Erasing UDS.KEYID = 0
1,198,907 UART: [idev] Sha1 KeyId Algorithm
1,207,820 UART: [idev] --
1,208,927 UART: [ldev] ++
1,209,095 UART: [ldev] CDI.KEYID = 6
1,209,459 UART: [ldev] SUBJECT.KEYID = 5
1,209,886 UART: [ldev] AUTHORITY.KEYID = 7
1,210,349 UART: [ldev] FE.KEYID = 1
1,215,783 UART: [ldev] Erasing FE.KEYID = 1
1,242,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,430 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,124 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,994 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,700 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,006 UART: [ldev] --
1,282,422 UART: [fwproc] Wait for Commands...
1,283,091 UART: [fwproc] Recv command 0x46574c44
1,283,824 UART: [fwproc] Recv'd Img size: 114332 bytes
2,607,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,209 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,518 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,799,379 >>> mbox cmd response: success
2,800,453 UART: [afmc] ++
2,800,621 UART: [afmc] CDI.KEYID = 6
2,800,984 UART: [afmc] SUBJECT.KEYID = 7
2,801,410 UART: [afmc] AUTHORITY.KEYID = 5
2,837,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,661 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,412 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,860,131 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,024 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,731 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,598 UART: [afmc] --
2,880,613 UART: [cold-reset] --
2,881,409 UART: [state] Locking Datavault
2,882,402 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,006 UART: [state] Locking ICCM
2,883,468 UART: [exit] Launching FMC @ 0x40000130
2,888,797 UART:
2,888,813 UART: Running Caliptra FMC ...
2,889,221 UART:
2,889,364 UART: [state] CFI Enabled
2,899,937 UART: [fht] FMC Alias Private Key: 7
3,008,076 UART: [art] Extend RT PCRs Done
3,008,504 UART: [art] Lock RT PCRs Done
3,009,984 UART: [art] Populate DV Done
3,018,316 UART: [fht] FMC Alias Private Key: 7
3,019,248 UART: [art] Derive CDI
3,019,528 UART: [art] Store in in slot 0x4
3,105,341 UART: [art] Derive Key Pair
3,105,701 UART: [art] Store priv key in slot 0x5
3,119,201 UART: [art] Derive Key Pair - Done
3,133,995 UART: [art] Signing Cert with AUTHO
3,134,475 UART: RITY.KEYID = 7
3,149,835 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,600 UART: [art] PUB.X = D85DB20402CD5103063CC42299B422FC2D637ADBFD3B706AC1B21B07005E2FEA429BBED4A987BF666DB3C0EAB7E44B50
3,157,351 UART: [art] PUB.Y = E38C5E2D3854BC926E6EC8C9B24E7D5BCB8D713D29C70DC583682AE73D6C2A707D569285C593C0B72B003B35166A7870
3,164,280 UART: [art] SIG.R = 4C0370EC5CFD1E0272BFE6FFECC28011BEDAC84C71730646F4C86860F1CCB67515F82CC0C5B14913C7E7249DAECBC8A1
3,171,061 UART: [art] SIG.S = C0F454BBDD84CA7AAFE261CA8FF60126FE85949FC97C7D319EF3F3E8C05254CB4066F5BD359B65C0C9074CA29D52C012
3,195,308 UART: Caliptra RT
3,195,653 UART: [state] CFI Enabled
3,304,414 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,305,170 UART:
3,305,186 UART: Running Caliptra ROM ...
3,305,594 UART:
3,305,736 UART: [state] CFI Enabled
3,308,885 UART: [state] LifecycleState = Production
3,309,493 UART: [state] DebugLocked = Yes
3,310,229 UART: [state] Starting the WD Timer 40000000 cycles
3,311,746 UART: [kat] SHA2-256
4,115,296 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,119,425 UART: [kat] ++
4,119,577 UART: [kat] sha1
4,123,667 UART: [kat] SHA2-256
4,125,607 UART: [kat] SHA2-384
4,128,348 UART: [kat] SHA2-512-ACC
4,130,249 UART: [kat] ECC-384
4,139,992 UART: [kat] HMAC-384Kdf
4,144,646 UART: [kat] LMS
4,392,958 UART: [kat] --
4,394,022 UART: [warm-reset] ++
4,394,793 UART: [warm-reset] --
4,395,566 UART: [state] Locking Datavault
4,396,242 UART: [state] Locking PCR0, PCR1 and PCR31
4,396,846 UART: [state] Locking ICCM
4,397,420 UART: [exit] Launching FMC @ 0x40000130
4,402,749 UART:
4,402,765 UART: Running Caliptra FMC ...
4,403,173 UART:
4,403,316 UART: [state] CFI Enabled
4,404,561 UART: [aliasrt :skip pcr extension
4,405,034 UART: [art] Extend RT PCRs Done
4,405,462 UART: [art] Lock RT PCRs Done
4,406,581 UART: [art] Populate DV Done
4,415,045 UART: [fht] FMC Alias Private Key: 7
4,416,045 UART: [art] Derive CDI
4,416,325 UART: [art] Store in in slot 0x4
4,501,928 UART: [art] Derive Key Pair
4,502,288 UART: [art] Store priv key in slot 0x5
4,515,134 UART: [art] Derive Key Pair - Done
4,529,932 UART: [art] Signing Cert with AUTHO
4,530,412 UART: RITY.KEYID = 7
4,545,616 UART: [art] Erasing AUTHORITY.KEYID = 7
4,546,381 UART: [art] PUB.X = D85DB20402CD5103063CC42299B422FC2D637ADBFD3B706AC1B21B07005E2FEA429BBED4A987BF666DB3C0EAB7E44B50
4,553,132 UART: [art] PUB.Y = E38C5E2D3854BC926E6EC8C9B24E7D5BCB8D713D29C70DC583682AE73D6C2A707D569285C593C0B72B003B35166A7870
4,560,061 UART: [art] SIG.R = 4C0370EC5CFD1E0272BFE6FFECC28011BEDAC84C71730646F4C86860F1CCB67515F82CC0C5B14913C7E7249DAECBC8A1
4,566,842 UART: [art] SIG.S = C0F454BBDD84CA7AAFE261CA8FF60126FE85949FC97C7D319EF3F3E8C05254CB4066F5BD359B65C0C9074CA29D52C012
4,589,979 UART: Caliptra RT
4,590,324 UART: [state] CFI Enabled
4,872,105 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Production
85,978 UART: [state] DebugLocked = Yes
86,646 UART: [state] Starting the WD Timer 40000000 cycles
88,219 UART: [kat] SHA2-256
891,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,898 UART: [kat] ++
896,050 UART: [kat] sha1
900,200 UART: [kat] SHA2-256
902,140 UART: [kat] SHA2-384
905,093 UART: [kat] SHA2-512-ACC
906,994 UART: [kat] ECC-384
916,545 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,508 UART: [cold-reset] ++
1,171,029 UART: [fht] FHT @ 0x50003400
1,173,709 UART: [idev] ++
1,173,877 UART: [idev] CDI.KEYID = 6
1,174,238 UART: [idev] SUBJECT.KEYID = 7
1,174,663 UART: [idev] UDS.KEYID = 0
1,175,009 ready_for_fw is high
1,175,009 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,938 UART: [idev] Erasing UDS.KEYID = 0
1,199,901 UART: [idev] Sha1 KeyId Algorithm
1,208,620 UART: [idev] --
1,209,859 UART: [ldev] ++
1,210,027 UART: [ldev] CDI.KEYID = 6
1,210,391 UART: [ldev] SUBJECT.KEYID = 5
1,210,818 UART: [ldev] AUTHORITY.KEYID = 7
1,211,281 UART: [ldev] FE.KEYID = 1
1,216,335 UART: [ldev] Erasing FE.KEYID = 1
1,243,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,712 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,406 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,276 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,982 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,156 UART: [ldev] --
1,282,622 UART: [fwproc] Wait for Commands...
1,283,251 UART: [fwproc] Recv command 0x46574c44
1,283,984 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,049 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,358 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,287 >>> mbox cmd response: success
2,798,393 UART: [afmc] ++
2,798,561 UART: [afmc] CDI.KEYID = 6
2,798,924 UART: [afmc] SUBJECT.KEYID = 7
2,799,350 UART: [afmc] AUTHORITY.KEYID = 5
2,834,159 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,873 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,624 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,343 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,236 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,943 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,826 UART: [afmc] --
2,877,775 UART: [cold-reset] --
2,878,591 UART: [state] Locking Datavault
2,879,922 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,526 UART: [state] Locking ICCM
2,881,088 UART: [exit] Launching FMC @ 0x40000130
2,886,417 UART:
2,886,433 UART: Running Caliptra FMC ...
2,886,841 UART:
2,886,984 UART: [state] CFI Enabled
2,897,515 UART: [fht] FMC Alias Private Key: 7
3,005,638 UART: [art] Extend RT PCRs Done
3,006,066 UART: [art] Lock RT PCRs Done
3,007,452 UART: [art] Populate DV Done
3,015,422 UART: [fht] FMC Alias Private Key: 7
3,016,428 UART: [art] Derive CDI
3,016,708 UART: [art] Store in in slot 0x4
3,102,679 UART: [art] Derive Key Pair
3,103,039 UART: [art] Store priv key in slot 0x5
3,116,009 UART: [art] Derive Key Pair - Done
3,130,707 UART: [art] Signing Cert with AUTHO
3,131,187 UART: RITY.KEYID = 7
3,146,787 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,552 UART: [art] PUB.X = E13CCF1DEF04F450207D9D1B9BA605714FD6418725A20E670EEEC7A38E89FBB5F4721BF52D5F26A3940EF0E32454834E
3,154,317 UART: [art] PUB.Y = B09A5F50364089100D59BBB914E254F7BA38A0E30BFB54B11E7CA2A167D308E14B785C111482BDD190D979A381A5B3E1
3,161,262 UART: [art] SIG.R = CDF0A1153AC71170B440E54AA3C9DA26448ED5ABD55274187252DEEBAE424B206FFD3471223E85CF5A3CC78AEF26A0EE
3,168,050 UART: [art] SIG.S = EE6C3A5AE1A191AE63154659258A1D10FAB188E8288923EEF344DA64A2F02FCE4B36675B690449A72BDE1166448DDA60
3,191,464 UART: Caliptra RT
3,191,809 UART: [state] CFI Enabled
3,300,150 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,906 UART:
3,300,922 UART: Running Caliptra ROM ...
3,301,330 UART:
3,301,472 UART: [state] CFI Enabled
3,304,285 UART: [state] LifecycleState = Production
3,304,893 UART: [state] DebugLocked = Yes
3,305,549 UART: [state] Starting the WD Timer 40000000 cycles
3,307,136 UART: [kat] SHA2-256
4,110,686 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,815 UART: [kat] ++
4,114,967 UART: [kat] sha1
4,119,063 UART: [kat] SHA2-256
4,121,003 UART: [kat] SHA2-384
4,123,692 UART: [kat] SHA2-512-ACC
4,125,593 UART: [kat] ECC-384
4,135,264 UART: [kat] HMAC-384Kdf
4,139,918 UART: [kat] LMS
4,388,230 UART: [kat] --
4,389,038 UART: [warm-reset] ++
4,389,691 UART: [warm-reset] --
4,390,458 UART: [state] Locking Datavault
4,391,318 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,922 UART: [state] Locking ICCM
4,392,526 UART: [exit] Launching FMC @ 0x40000130
4,397,855 UART:
4,397,871 UART: Running Caliptra FMC ...
4,398,279 UART:
4,398,422 UART: [state] CFI Enabled
4,400,107 UART: [aliasrt :skip pcr extension
4,400,580 UART: [art] Extend RT PCRs Done
4,401,008 UART: [art] Lock RT PCRs Done
4,402,379 UART: [art] Populate DV Done
4,410,557 UART: [fht] FMC Alias Private Key: 7
4,411,721 UART: [art] Derive CDI
4,412,001 UART: [art] Store in in slot 0x4
4,497,486 UART: [art] Derive Key Pair
4,497,846 UART: [art] Store priv key in slot 0x5
4,510,720 UART: [art] Derive Key Pair - Done
4,525,368 UART: [art] Signing Cert with AUTHO
4,525,848 UART: RITY.KEYID = 7
4,541,218 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,983 UART: [art] PUB.X = E13CCF1DEF04F450207D9D1B9BA605714FD6418725A20E670EEEC7A38E89FBB5F4721BF52D5F26A3940EF0E32454834E
4,548,748 UART: [art] PUB.Y = B09A5F50364089100D59BBB914E254F7BA38A0E30BFB54B11E7CA2A167D308E14B785C111482BDD190D979A381A5B3E1
4,555,693 UART: [art] SIG.R = CDF0A1153AC71170B440E54AA3C9DA26448ED5ABD55274187252DEEBAE424B206FFD3471223E85CF5A3CC78AEF26A0EE
4,562,481 UART: [art] SIG.S = EE6C3A5AE1A191AE63154659258A1D10FAB188E8288923EEF344DA64A2F02FCE4B36675B690449A72BDE1166448DDA60
4,586,397 UART: Caliptra RT
4,586,742 UART: [state] CFI Enabled
4,870,873 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Production
85,785 UART: [state] DebugLocked = Yes
86,405 UART: [state] Starting the WD Timer 40000000 cycles
87,946 UART: [kat] SHA2-256
891,496 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
900,029 UART: [kat] SHA2-256
901,969 UART: [kat] SHA2-384
904,724 UART: [kat] SHA2-512-ACC
906,625 UART: [kat] ECC-384
916,456 UART: [kat] HMAC-384Kdf
921,176 UART: [kat] LMS
1,169,488 UART: [kat] --
1,170,429 UART: [cold-reset] ++
1,170,984 UART: [fht] FHT @ 0x50003400
1,173,718 UART: [idev] ++
1,173,886 UART: [idev] CDI.KEYID = 6
1,174,247 UART: [idev] SUBJECT.KEYID = 7
1,174,672 UART: [idev] UDS.KEYID = 0
1,175,018 ready_for_fw is high
1,175,018 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,529 UART: [idev] Erasing UDS.KEYID = 0
1,199,710 UART: [idev] Sha1 KeyId Algorithm
1,208,725 UART: [idev] --
1,209,834 UART: [ldev] ++
1,210,002 UART: [ldev] CDI.KEYID = 6
1,210,366 UART: [ldev] SUBJECT.KEYID = 5
1,210,793 UART: [ldev] AUTHORITY.KEYID = 7
1,211,256 UART: [ldev] FE.KEYID = 1
1,216,506 UART: [ldev] Erasing FE.KEYID = 1
1,242,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,543 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,237 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,107 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,813 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,997 UART: [ldev] --
1,282,339 UART: [fwproc] Wait for Commands...
1,283,066 UART: [fwproc] Recv command 0x46574c44
1,283,799 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,200 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,509 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,212 >>> mbox cmd response: success
2,799,444 UART: [afmc] ++
2,799,612 UART: [afmc] CDI.KEYID = 6
2,799,975 UART: [afmc] SUBJECT.KEYID = 7
2,800,401 UART: [afmc] AUTHORITY.KEYID = 5
2,836,270 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,277 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,996 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,889 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,596 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,585 UART: [afmc] --
2,879,494 UART: [cold-reset] --
2,880,198 UART: [state] Locking Datavault
2,881,249 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,853 UART: [state] Locking ICCM
2,882,385 UART: [exit] Launching FMC @ 0x40000130
2,887,714 UART:
2,887,730 UART: Running Caliptra FMC ...
2,888,138 UART:
2,888,192 UART: [state] CFI Enabled
2,898,875 UART: [fht] FMC Alias Private Key: 7
3,006,810 UART: [art] Extend RT PCRs Done
3,007,238 UART: [art] Lock RT PCRs Done
3,008,734 UART: [art] Populate DV Done
3,016,950 UART: [fht] FMC Alias Private Key: 7
3,018,052 UART: [art] Derive CDI
3,018,332 UART: [art] Store in in slot 0x4
3,103,889 UART: [art] Derive Key Pair
3,104,249 UART: [art] Store priv key in slot 0x5
3,117,541 UART: [art] Derive Key Pair - Done
3,132,173 UART: [art] Signing Cert with AUTHO
3,132,653 UART: RITY.KEYID = 7
3,147,965 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,730 UART: [art] PUB.X = 16132E75FB6C4CC84BBAA0559DDC209B80FFDFB41856B0A3D1959FC4AF7BAD701104C7A969411C6EA86339EC1346A2FE
3,155,513 UART: [art] PUB.Y = 319B0D78A1D694E51A06EA0F4CA50B7145CB9B4B446F61233777189432AFDE12F2EF2DA10D375582E8E09D199A8DA29A
3,162,454 UART: [art] SIG.R = B37FE838A4B7F0C42B2CE9428C285E572C7793023CA4D1645027B1BC42B6EFF545192FC8EC98BFE86EF2C7B5ED4C4722
3,169,233 UART: [art] SIG.S = E751E755CE5D3F3F32CA0CD260DB5565BDDC96405A017DCEFA26C5BF5A7985C6528D57BAB075665C902DE3CD80A7040C
3,193,270 UART: Caliptra RT
3,193,523 UART: [state] CFI Enabled
3,301,260 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,016 UART:
3,302,032 UART: Running Caliptra ROM ...
3,302,440 UART:
3,302,495 UART: [state] CFI Enabled
3,305,426 UART: [state] LifecycleState = Production
3,306,034 UART: [state] DebugLocked = Yes
3,306,646 UART: [state] Starting the WD Timer 40000000 cycles
3,308,181 UART: [kat] SHA2-256
4,111,731 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,860 UART: [kat] ++
4,116,012 UART: [kat] sha1
4,120,242 UART: [kat] SHA2-256
4,122,182 UART: [kat] SHA2-384
4,124,957 UART: [kat] SHA2-512-ACC
4,126,858 UART: [kat] ECC-384
4,136,543 UART: [kat] HMAC-384Kdf
4,141,107 UART: [kat] LMS
4,389,419 UART: [kat] --
4,390,125 UART: [warm-reset] ++
4,391,084 UART: [warm-reset] --
4,391,957 UART: [state] Locking Datavault
4,392,601 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,205 UART: [state] Locking ICCM
4,393,725 UART: [exit] Launching FMC @ 0x40000130
4,399,054 UART:
4,399,070 UART: Running Caliptra FMC ...
4,399,478 UART:
4,399,532 UART: [state] CFI Enabled
4,400,769 UART: [aliasrt :skip pcr extension
4,401,242 UART: [art] Extend RT PCRs Done
4,401,670 UART: [art] Lock RT PCRs Done
4,403,099 UART: [art] Populate DV Done
4,410,923 UART: [fht] FMC Alias Private Key: 7
4,412,019 UART: [art] Derive CDI
4,412,299 UART: [art] Store in in slot 0x4
4,497,882 UART: [art] Derive Key Pair
4,498,242 UART: [art] Store priv key in slot 0x5
4,511,544 UART: [art] Derive Key Pair - Done
4,526,540 UART: [art] Signing Cert with AUTHO
4,527,020 UART: RITY.KEYID = 7
4,542,514 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,279 UART: [art] PUB.X = 16132E75FB6C4CC84BBAA0559DDC209B80FFDFB41856B0A3D1959FC4AF7BAD701104C7A969411C6EA86339EC1346A2FE
4,550,062 UART: [art] PUB.Y = 319B0D78A1D694E51A06EA0F4CA50B7145CB9B4B446F61233777189432AFDE12F2EF2DA10D375582E8E09D199A8DA29A
4,557,003 UART: [art] SIG.R = B37FE838A4B7F0C42B2CE9428C285E572C7793023CA4D1645027B1BC42B6EFF545192FC8EC98BFE86EF2C7B5ED4C4722
4,563,782 UART: [art] SIG.S = E751E755CE5D3F3F32CA0CD260DB5565BDDC96405A017DCEFA26C5BF5A7985C6528D57BAB075665C902DE3CD80A7040C
4,587,993 UART: Caliptra RT
4,588,246 UART: [state] CFI Enabled
4,864,879 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Production
85,857 UART: [state] DebugLocked = Yes
86,619 UART: [state] Starting the WD Timer 40000000 cycles
88,286 UART: [kat] SHA2-256
891,836 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,965 UART: [kat] ++
896,117 UART: [kat] sha1
900,321 UART: [kat] SHA2-256
902,261 UART: [kat] SHA2-384
905,036 UART: [kat] SHA2-512-ACC
906,937 UART: [kat] ECC-384
916,370 UART: [kat] HMAC-384Kdf
920,904 UART: [kat] LMS
1,169,216 UART: [kat] --
1,170,093 UART: [cold-reset] ++
1,170,584 UART: [fht] FHT @ 0x50003400
1,173,108 UART: [idev] ++
1,173,276 UART: [idev] CDI.KEYID = 6
1,173,637 UART: [idev] SUBJECT.KEYID = 7
1,174,062 UART: [idev] UDS.KEYID = 0
1,174,408 ready_for_fw is high
1,174,408 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,191 UART: [idev] Erasing UDS.KEYID = 0
1,198,930 UART: [idev] Sha1 KeyId Algorithm
1,207,921 UART: [idev] --
1,208,966 UART: [ldev] ++
1,209,134 UART: [ldev] CDI.KEYID = 6
1,209,498 UART: [ldev] SUBJECT.KEYID = 5
1,209,925 UART: [ldev] AUTHORITY.KEYID = 7
1,210,388 UART: [ldev] FE.KEYID = 1
1,215,520 UART: [ldev] Erasing FE.KEYID = 1
1,241,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,441 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,135 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,005 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,711 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,781 UART: [ldev] --
1,281,155 UART: [fwproc] Wait for Commands...
1,281,822 UART: [fwproc] Recv command 0x46574c44
1,282,555 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,066 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,375 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,799,158 >>> mbox cmd response: success
2,800,354 UART: [afmc] ++
2,800,522 UART: [afmc] CDI.KEYID = 6
2,800,885 UART: [afmc] SUBJECT.KEYID = 7
2,801,311 UART: [afmc] AUTHORITY.KEYID = 5
2,837,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,257 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,976 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,869 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,576 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,439 UART: [afmc] --
2,880,384 UART: [cold-reset] --
2,881,150 UART: [state] Locking Datavault
2,882,093 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,697 UART: [state] Locking ICCM
2,883,151 UART: [exit] Launching FMC @ 0x40000130
2,888,480 UART:
2,888,496 UART: Running Caliptra FMC ...
2,888,904 UART:
2,888,958 UART: [state] CFI Enabled
2,899,611 UART: [fht] FMC Alias Private Key: 7
3,007,258 UART: [art] Extend RT PCRs Done
3,007,686 UART: [art] Lock RT PCRs Done
3,009,070 UART: [art] Populate DV Done
3,017,342 UART: [fht] FMC Alias Private Key: 7
3,018,302 UART: [art] Derive CDI
3,018,582 UART: [art] Store in in slot 0x4
3,103,861 UART: [art] Derive Key Pair
3,104,221 UART: [art] Store priv key in slot 0x5
3,117,139 UART: [art] Derive Key Pair - Done
3,132,152 UART: [art] Signing Cert with AUTHO
3,132,632 UART: RITY.KEYID = 7
3,147,478 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,243 UART: [art] PUB.X = FD2D172D0224C6290E948F2CAD6B1ACDE1A73390B3E9B2CC7A9036931BF30625D6F01E0CDBC96E3AA49686C921179FEC
3,155,015 UART: [art] PUB.Y = D9F2ABC4FF942E5CCB6C853712C6A1CAD0A2F3A23CE1BAB66FC332CDAA8F8BF4B891C6B6405CB0B9F70C080A3F298703
3,161,979 UART: [art] SIG.R = 14B608A55B4EE3FF01E7CA7C255CD4B84E22ACE54F58B12026FC659BBBF8F32BCC9E6780808CE8C59ED3C58FE2450BB9
3,168,760 UART: [art] SIG.S = 3B24FF0B2EA748DA2363CAFC85BC7F74013981E44D19F67C83D12B79AE9795E351100EB01C4B2D93344359DE2E7BD552
3,193,068 UART: Caliptra RT
3,193,321 UART: [state] CFI Enabled
3,300,585 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,341 UART:
3,301,357 UART: Running Caliptra ROM ...
3,301,765 UART:
3,301,820 UART: [state] CFI Enabled
3,304,495 UART: [state] LifecycleState = Production
3,305,103 UART: [state] DebugLocked = Yes
3,305,855 UART: [state] Starting the WD Timer 40000000 cycles
3,307,322 UART: [kat] SHA2-256
4,110,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,001 UART: [kat] ++
4,115,153 UART: [kat] sha1
4,119,459 UART: [kat] SHA2-256
4,121,399 UART: [kat] SHA2-384
4,124,278 UART: [kat] SHA2-512-ACC
4,126,179 UART: [kat] ECC-384
4,135,836 UART: [kat] HMAC-384Kdf
4,140,420 UART: [kat] LMS
4,388,732 UART: [kat] --
4,389,712 UART: [warm-reset] ++
4,390,715 UART: [warm-reset] --
4,391,280 UART: [state] Locking Datavault
4,391,864 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,468 UART: [state] Locking ICCM
4,392,978 UART: [exit] Launching FMC @ 0x40000130
4,398,307 UART:
4,398,323 UART: Running Caliptra FMC ...
4,398,731 UART:
4,398,785 UART: [state] CFI Enabled
4,399,980 UART: [aliasrt :skip pcr extension
4,400,453 UART: [art] Extend RT PCRs Done
4,400,881 UART: [art] Lock RT PCRs Done
4,402,078 UART: [art] Populate DV Done
4,410,218 UART: [fht] FMC Alias Private Key: 7
4,411,166 UART: [art] Derive CDI
4,411,446 UART: [art] Store in in slot 0x4
4,497,159 UART: [art] Derive Key Pair
4,497,519 UART: [art] Store priv key in slot 0x5
4,510,305 UART: [art] Derive Key Pair - Done
4,525,078 UART: [art] Signing Cert with AUTHO
4,525,558 UART: RITY.KEYID = 7
4,540,936 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,701 UART: [art] PUB.X = FD2D172D0224C6290E948F2CAD6B1ACDE1A73390B3E9B2CC7A9036931BF30625D6F01E0CDBC96E3AA49686C921179FEC
4,548,473 UART: [art] PUB.Y = D9F2ABC4FF942E5CCB6C853712C6A1CAD0A2F3A23CE1BAB66FC332CDAA8F8BF4B891C6B6405CB0B9F70C080A3F298703
4,555,437 UART: [art] SIG.R = 14B608A55B4EE3FF01E7CA7C255CD4B84E22ACE54F58B12026FC659BBBF8F32BCC9E6780808CE8C59ED3C58FE2450BB9
4,562,218 UART: [art] SIG.S = 3B24FF0B2EA748DA2363CAFC85BC7F74013981E44D19F67C83D12B79AE9795E351100EB01C4B2D93344359DE2E7BD552
4,586,570 UART: Caliptra RT
4,586,823 UART: [state] CFI Enabled
4,871,533 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,594 UART: [state] LifecycleState = Production
86,202 UART: [state] DebugLocked = Yes
86,828 UART: [state] Starting the WD Timer 40000000 cycles
88,511 UART: [kat] SHA2-256
892,061 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,190 UART: [kat] ++
896,342 UART: [kat] sha1
900,582 UART: [kat] SHA2-256
902,522 UART: [kat] SHA2-384
905,161 UART: [kat] SHA2-512-ACC
907,062 UART: [kat] ECC-384
916,919 UART: [kat] HMAC-384Kdf
921,515 UART: [kat] LMS
1,169,827 UART: [kat] --
1,170,448 UART: [cold-reset] ++
1,170,983 UART: [fht] FHT @ 0x50003400
1,173,553 UART: [idev] ++
1,173,721 UART: [idev] CDI.KEYID = 6
1,174,082 UART: [idev] SUBJECT.KEYID = 7
1,174,507 UART: [idev] UDS.KEYID = 0
1,174,853 ready_for_fw is high
1,174,853 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,078 UART: [idev] Erasing UDS.KEYID = 0
1,198,603 UART: [idev] Sha1 KeyId Algorithm
1,207,556 UART: [idev] --
1,208,741 UART: [ldev] ++
1,208,909 UART: [ldev] CDI.KEYID = 6
1,209,273 UART: [ldev] SUBJECT.KEYID = 5
1,209,700 UART: [ldev] AUTHORITY.KEYID = 7
1,210,163 UART: [ldev] FE.KEYID = 1
1,215,289 UART: [ldev] Erasing FE.KEYID = 1
1,241,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,312 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,006 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,876 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,582 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,610 UART: [ldev] --
1,281,024 UART: [fwproc] Wait for Commands...
1,281,681 UART: [fwproc] Recv command 0x46574c44
1,282,414 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,511 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,820 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,796,755 >>> mbox cmd response: success
2,797,825 UART: [afmc] ++
2,797,993 UART: [afmc] CDI.KEYID = 6
2,798,356 UART: [afmc] SUBJECT.KEYID = 7
2,798,782 UART: [afmc] AUTHORITY.KEYID = 5
2,834,255 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,791 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,542 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,261 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,154 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,861 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,736 UART: [afmc] --
2,877,743 UART: [cold-reset] --
2,878,669 UART: [state] Locking Datavault
2,879,810 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,414 UART: [state] Locking ICCM
2,880,980 UART: [exit] Launching FMC @ 0x40000130
2,886,309 UART:
2,886,325 UART: Running Caliptra FMC ...
2,886,733 UART:
2,886,876 UART: [state] CFI Enabled
2,897,753 UART: [fht] FMC Alias Private Key: 7
3,005,470 UART: [art] Extend RT PCRs Done
3,005,898 UART: [art] Lock RT PCRs Done
3,007,698 UART: [art] Populate DV Done
3,015,964 UART: [fht] FMC Alias Private Key: 7
3,016,916 UART: [art] Derive CDI
3,017,196 UART: [art] Store in in slot 0x4
3,102,477 UART: [art] Derive Key Pair
3,102,837 UART: [art] Store priv key in slot 0x5
3,116,121 UART: [art] Derive Key Pair - Done
3,130,593 UART: [art] Signing Cert with AUTHO
3,131,073 UART: RITY.KEYID = 7
3,146,055 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,820 UART: [art] PUB.X = 5AE8AD831BCCA74A41DD71F8325BC82DB6036D9220491C1D9E47F41F381A151DD72C24E3461CB0EE903C29EE0B23C636
3,153,594 UART: [art] PUB.Y = D957061E6D23A69E97FDFD1067F91FB42CC7750789B34189156628291B4AEBC5591D03E0087D943914D0CF7C7CE6612E
3,160,530 UART: [art] SIG.R = 25BE797585D620FBC5BC05EDD1DBB95107F3113D3310D3AA3C1D880007A9CF96E9BBDABC4DA1CC77BD11F72D7C82EB7E
3,167,293 UART: [art] SIG.S = 4C07EBDD54988A4AA3BEEEC6808E1D61D6621ED1E2CEAE54305D58FF774DC268BB87ED3B134F8FB9D40F08BF7BEE5C73
3,191,191 UART: Caliptra RT
3,191,536 UART: [state] CFI Enabled
3,298,542 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,298 UART:
3,299,314 UART: Running Caliptra ROM ...
3,299,722 UART:
3,299,864 UART: [state] CFI Enabled
3,302,757 UART: [state] LifecycleState = Production
3,303,365 UART: [state] DebugLocked = Yes
3,304,119 UART: [state] Starting the WD Timer 40000000 cycles
3,305,748 UART: [kat] SHA2-256
4,109,298 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,427 UART: [kat] ++
4,113,579 UART: [kat] sha1
4,117,749 UART: [kat] SHA2-256
4,119,689 UART: [kat] SHA2-384
4,122,602 UART: [kat] SHA2-512-ACC
4,124,503 UART: [kat] ECC-384
4,134,052 UART: [kat] HMAC-384Kdf
4,138,782 UART: [kat] LMS
4,387,094 UART: [kat] --
4,387,940 UART: [warm-reset] ++
4,388,823 UART: [warm-reset] --
4,389,518 UART: [state] Locking Datavault
4,390,348 UART: [state] Locking PCR0, PCR1 and PCR31
4,390,952 UART: [state] Locking ICCM
4,391,540 UART: [exit] Launching FMC @ 0x40000130
4,396,869 UART:
4,396,885 UART: Running Caliptra FMC ...
4,397,293 UART:
4,397,436 UART: [state] CFI Enabled
4,398,891 UART: [aliasrt :skip pcr extension
4,399,364 UART: [art] Extend RT PCRs Done
4,399,792 UART: [art] Lock RT PCRs Done
4,401,235 UART: [art] Populate DV Done
4,409,181 UART: [fht] FMC Alias Private Key: 7
4,410,285 UART: [art] Derive CDI
4,410,565 UART: [art] Store in in slot 0x4
4,496,142 UART: [art] Derive Key Pair
4,496,502 UART: [art] Store priv key in slot 0x5
4,510,020 UART: [art] Derive Key Pair - Done
4,524,992 UART: [art] Signing Cert with AUTHO
4,525,472 UART: RITY.KEYID = 7
4,540,234 UART: [art] Erasing AUTHORITY.KEYID = 7
4,540,999 UART: [art] PUB.X = 5AE8AD831BCCA74A41DD71F8325BC82DB6036D9220491C1D9E47F41F381A151DD72C24E3461CB0EE903C29EE0B23C636
4,547,773 UART: [art] PUB.Y = D957061E6D23A69E97FDFD1067F91FB42CC7750789B34189156628291B4AEBC5591D03E0087D943914D0CF7C7CE6612E
4,554,709 UART: [art] SIG.R = 25BE797585D620FBC5BC05EDD1DBB95107F3113D3310D3AA3C1D880007A9CF96E9BBDABC4DA1CC77BD11F72D7C82EB7E
4,561,472 UART: [art] SIG.S = 4C07EBDD54988A4AA3BEEEC6808E1D61D6621ED1E2CEAE54305D58FF774DC268BB87ED3B134F8FB9D40F08BF7BEE5C73
4,585,344 UART: Caliptra RT
4,585,689 UART: [state] CFI Enabled
4,866,359 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Production
85,830 UART: [state] DebugLocked = Yes
86,528 UART: [state] Starting the WD Timer 40000000 cycles
88,241 UART: [kat] SHA2-256
891,791 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,920 UART: [kat] ++
896,072 UART: [kat] sha1
900,242 UART: [kat] SHA2-256
902,182 UART: [kat] SHA2-384
904,963 UART: [kat] SHA2-512-ACC
906,864 UART: [kat] ECC-384
916,285 UART: [kat] HMAC-384Kdf
921,151 UART: [kat] LMS
1,169,463 UART: [kat] --
1,170,362 UART: [cold-reset] ++
1,170,717 UART: [fht] FHT @ 0x50003400
1,173,303 UART: [idev] ++
1,173,471 UART: [idev] CDI.KEYID = 6
1,173,832 UART: [idev] SUBJECT.KEYID = 7
1,174,257 UART: [idev] UDS.KEYID = 0
1,174,603 ready_for_fw is high
1,174,603 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,710 UART: [idev] Erasing UDS.KEYID = 0
1,199,389 UART: [idev] Sha1 KeyId Algorithm
1,208,318 UART: [idev] --
1,209,213 UART: [ldev] ++
1,209,381 UART: [ldev] CDI.KEYID = 6
1,209,745 UART: [ldev] SUBJECT.KEYID = 5
1,210,172 UART: [ldev] AUTHORITY.KEYID = 7
1,210,635 UART: [ldev] FE.KEYID = 1
1,215,875 UART: [ldev] Erasing FE.KEYID = 1
1,241,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,972 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,666 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,536 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,242 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,354 UART: [ldev] --
1,280,842 UART: [fwproc] Wait for Commands...
1,281,513 UART: [fwproc] Recv command 0x46574c44
1,282,246 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,918 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,973 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,282 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,095 >>> mbox cmd response: success
2,798,241 UART: [afmc] ++
2,798,409 UART: [afmc] CDI.KEYID = 6
2,798,772 UART: [afmc] SUBJECT.KEYID = 7
2,799,198 UART: [afmc] AUTHORITY.KEYID = 5
2,834,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,240 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,959 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,852 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,559 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,590 UART: [afmc] --
2,878,643 UART: [cold-reset] --
2,879,747 UART: [state] Locking Datavault
2,881,094 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,698 UART: [state] Locking ICCM
2,882,198 UART: [exit] Launching FMC @ 0x40000130
2,887,527 UART:
2,887,543 UART: Running Caliptra FMC ...
2,887,951 UART:
2,888,094 UART: [state] CFI Enabled
2,899,075 UART: [fht] FMC Alias Private Key: 7
3,007,442 UART: [art] Extend RT PCRs Done
3,007,870 UART: [art] Lock RT PCRs Done
3,009,412 UART: [art] Populate DV Done
3,017,690 UART: [fht] FMC Alias Private Key: 7
3,018,674 UART: [art] Derive CDI
3,018,954 UART: [art] Store in in slot 0x4
3,104,111 UART: [art] Derive Key Pair
3,104,471 UART: [art] Store priv key in slot 0x5
3,118,137 UART: [art] Derive Key Pair - Done
3,133,008 UART: [art] Signing Cert with AUTHO
3,133,488 UART: RITY.KEYID = 7
3,148,662 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,427 UART: [art] PUB.X = 3E090DBC5D4E9A3C2A7F8BFE443ED707A5BC5715049D9309CEDA00AA7E16D823671F9173DD42F8D0B53BCAA930A89554
3,156,174 UART: [art] PUB.Y = E2ADE4972192DA9E4540511387156F9DC6D464CBF2A9614297FF2D962CE3763C016822131173C355AD8924C496EF4600
3,163,091 UART: [art] SIG.R = D005511CE6EA498AB6BF42E77823BAB8AED3AF14B4B201D4A9461DF9960EDD5BB42D361484C94449EFA0A8369E6C4FEC
3,169,870 UART: [art] SIG.S = 85434334ED70F6EF8AB954B4D137D740F6787A5B6FDE1E74817891CEEBB42B356354A6DCA316CDF55BEE8E8781C9B356
3,193,733 UART: Caliptra RT
3,194,078 UART: [state] CFI Enabled
3,301,319 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,075 UART:
3,302,091 UART: Running Caliptra ROM ...
3,302,499 UART:
3,302,641 UART: [state] CFI Enabled
3,305,348 UART: [state] LifecycleState = Production
3,305,956 UART: [state] DebugLocked = Yes
3,306,698 UART: [state] Starting the WD Timer 40000000 cycles
3,308,251 UART: [kat] SHA2-256
4,111,801 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,930 UART: [kat] ++
4,116,082 UART: [kat] sha1
4,120,378 UART: [kat] SHA2-256
4,122,318 UART: [kat] SHA2-384
4,125,155 UART: [kat] SHA2-512-ACC
4,127,056 UART: [kat] ECC-384
4,136,923 UART: [kat] HMAC-384Kdf
4,141,527 UART: [kat] LMS
4,389,839 UART: [kat] --
4,390,559 UART: [warm-reset] ++
4,391,736 UART: [warm-reset] --
4,392,857 UART: [state] Locking Datavault
4,393,671 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,275 UART: [state] Locking ICCM
4,394,919 UART: [exit] Launching FMC @ 0x40000130
4,400,248 UART:
4,400,264 UART: Running Caliptra FMC ...
4,400,672 UART:
4,400,815 UART: [state] CFI Enabled
4,401,904 UART: [aliasrt :skip pcr extension
4,402,377 UART: [art] Extend RT PCRs Done
4,402,805 UART: [art] Lock RT PCRs Done
4,404,066 UART: [art] Populate DV Done
4,412,414 UART: [fht] FMC Alias Private Key: 7
4,413,402 UART: [art] Derive CDI
4,413,682 UART: [art] Store in in slot 0x4
4,499,531 UART: [art] Derive Key Pair
4,499,891 UART: [art] Store priv key in slot 0x5
4,513,725 UART: [art] Derive Key Pair - Done
4,528,584 UART: [art] Signing Cert with AUTHO
4,529,064 UART: RITY.KEYID = 7
4,544,374 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,139 UART: [art] PUB.X = 3E090DBC5D4E9A3C2A7F8BFE443ED707A5BC5715049D9309CEDA00AA7E16D823671F9173DD42F8D0B53BCAA930A89554
4,551,886 UART: [art] PUB.Y = E2ADE4972192DA9E4540511387156F9DC6D464CBF2A9614297FF2D962CE3763C016822131173C355AD8924C496EF4600
4,558,803 UART: [art] SIG.R = D005511CE6EA498AB6BF42E77823BAB8AED3AF14B4B201D4A9461DF9960EDD5BB42D361484C94449EFA0A8369E6C4FEC
4,565,582 UART: [art] SIG.S = 85434334ED70F6EF8AB954B4D137D740F6787A5B6FDE1E74817891CEEBB42B356354A6DCA316CDF55BEE8E8781C9B356
4,589,389 UART: Caliptra RT
4,589,734 UART: [state] CFI Enabled
4,871,413 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,435 UART: [state] LifecycleState = Unprovisioned
85,091 UART: [state] DebugLocked = Yes
85,843 UART: [state] Starting the WD Timer 1000000 cycles
87,416 UART: [kat] SHA2-256
890,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,095 UART: [kat] ++
895,247 UART: [kat] sha1
899,643 UART: [kat] SHA2-256
901,583 UART: [kat] SHA2-384
904,260 UART: [kat] SHA2-512-ACC
906,161 UART: [kat] ECC-384
916,070 UART: [kat] HMAC-384Kdf
920,558 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,156 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x000079C0 ra=0x00008150 error_internal_intr_r=00000040
1,089,597 UART: WDT Expired
1,089,806 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079C0 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000781A ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = Yes
86,520 UART: [state] Starting the WD Timer 1000000 cycles
88,129 UART: [kat] SHA2-256
891,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,808 UART: [kat] ++
895,960 UART: [kat] sha1
900,162 UART: [kat] SHA2-256
902,102 UART: [kat] SHA2-384
904,849 UART: [kat] SHA2-512-ACC
906,750 UART: [kat] ECC-384
916,315 UART: [kat] HMAC-384Kdf
920,973 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,833 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000797C ra=0x00008150 error_internal_intr_r=00000040
1,090,274 UART: WDT Expired
1,090,483 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000797C ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007806 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,609 UART: [state] LifecycleState = Unprovisioned
85,265 UART: [state] DebugLocked = Yes
86,009 UART: [state] Starting the WD Timer 1000000 cycles
87,624 UART: [kat] SHA2-256
891,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,303 UART: [kat] ++
895,455 UART: [kat] sha1
899,659 UART: [kat] SHA2-256
901,599 UART: [kat] SHA2-384
904,244 UART: [kat] SHA2-512-ACC
906,145 UART: [kat] ECC-384
915,854 UART: [kat] HMAC-384Kdf
920,240 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,322 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000799C ra=0x00008150 error_internal_intr_r=00000040
1,089,763 UART: WDT Expired
1,089,972 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000799C ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000077EA ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,762 UART: [state] LifecycleState = Unprovisioned
86,418 UART: [state] DebugLocked = Yes
86,988 UART: [state] Starting the WD Timer 1000000 cycles
88,527 UART: [kat] SHA2-256
892,077 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,206 UART: [kat] ++
896,358 UART: [kat] sha1
900,630 UART: [kat] SHA2-256
902,570 UART: [kat] SHA2-384
905,261 UART: [kat] SHA2-512-ACC
907,162 UART: [kat] ECC-384
916,569 UART: [kat] HMAC-384Kdf
921,167 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,301 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000797C ra=0x00008150 error_internal_intr_r=00000040
1,090,742 UART: WDT Expired
1,090,951 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000797C ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000090C8 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,995 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = Yes
86,371 UART: [state] Starting the WD Timer 1000000 cycles
87,950 UART: [kat] SHA2-256
891,500 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,629 UART: [kat] ++
895,781 UART: [kat] sha1
899,993 UART: [kat] SHA2-256
901,933 UART: [kat] SHA2-384
904,614 UART: [kat] SHA2-512-ACC
906,515 UART: [kat] ECC-384
916,218 UART: [kat] HMAC-384Kdf
920,570 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,684 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00007940 ra=0x00008150 error_internal_intr_r=00000040
1,090,123 UART: WDT Expired
1,090,332 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007940 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000781E ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,478 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = Yes
86,666 UART: [state] Starting the WD Timer 1000000 cycles
88,111 UART: [kat] SHA2-256
891,661 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,790 UART: [kat] ++
895,942 UART: [kat] sha1
900,218 UART: [kat] SHA2-256
902,158 UART: [kat] SHA2-384
904,851 UART: [kat] SHA2-512-ACC
906,752 UART: [kat] ECC-384
916,585 UART: [kat] HMAC-384Kdf
921,281 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,979 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00007992 ra=0x00008150 error_internal_intr_r=00000040
1,090,418 UART: WDT Expired
1,090,627 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007992 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000090C8 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = Yes
86,443 UART: [state] Starting the WD Timer 40000000 cycles
87,906 UART: [kat] SHA2-256
891,456 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,585 UART: [kat] ++
895,737 UART: [kat] sha1
900,011 UART: [kat] SHA2-256
901,951 UART: [kat] SHA2-384
904,704 UART: [kat] SHA2-512-ACC
906,605 UART: [kat] ECC-384
916,302 UART: [kat] HMAC-384Kdf
920,886 UART: [kat] LMS
1,169,198 UART: [kat] --
1,169,983 UART: [cold-reset] ++
1,170,532 UART: [fht] FHT @ 0x50003400
1,173,090 UART: [idev] ++
1,173,258 UART: [idev] CDI.KEYID = 6
1,173,619 UART: [idev] SUBJECT.KEYID = 7
1,174,044 UART: [idev] UDS.KEYID = 0
1,174,390 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,093 UART: [idev] Erasing UDS.KEYID = 0
1,199,194 UART: [idev] Sha1 KeyId Algorithm
1,207,981 UART: [idev] --
1,208,960 UART: [ldev] ++
1,209,128 UART: [ldev] CDI.KEYID = 6
1,209,492 UART: [ldev] SUBJECT.KEYID = 5
1,209,919 UART: [ldev] AUTHORITY.KEYID = 7
1,210,382 UART: [ldev] FE.KEYID = 1
1,215,378 UART: [ldev] Erasing FE.KEYID = 1
1,241,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,847 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,541 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,411 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,117 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,379 UART: [ldev] --
1,280,857 UART: [fwproc] Wait for Commands...
1,281,544 UART: [fwproc] Recv command 0x46574c44
1,282,277 UART: [fwproc] Recv'd Img size: 111916 bytes
2,551,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,758 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,443 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,378 >>> mbox cmd response: success
2,741,638 UART: [afmc] ++
2,741,806 UART: [afmc] CDI.KEYID = 6
2,742,169 UART: [afmc] SUBJECT.KEYID = 7
2,742,595 UART: [afmc] AUTHORITY.KEYID = 5
2,777,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,907 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,658 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,800,371 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,806,242 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,811,952 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,819,812 UART: [afmc] --
2,820,725 UART: [cold-reset] --
2,821,477 UART: [state] Locking Datavault
2,822,768 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,372 UART: [state] Locking ICCM
2,823,834 UART: [exit] Launching FMC @ 0x40000000
2,829,131 UART:
2,829,147 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,137 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,292 >>> mbox cmd response: success
2,653,390 UART:
2,653,406 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = Yes
86,688 UART: [state] Starting the WD Timer 40000000 cycles
88,231 UART: [kat] SHA2-256
891,781 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,910 UART: [kat] ++
896,062 UART: [kat] sha1
900,374 UART: [kat] SHA2-256
902,314 UART: [kat] SHA2-384
905,153 UART: [kat] SHA2-512-ACC
907,054 UART: [kat] ECC-384
916,833 UART: [kat] HMAC-384Kdf
921,387 UART: [kat] LMS
1,169,699 UART: [kat] --
1,170,444 UART: [cold-reset] ++
1,170,839 UART: [fht] FHT @ 0x50003400
1,173,553 UART: [idev] ++
1,173,721 UART: [idev] CDI.KEYID = 6
1,174,082 UART: [idev] SUBJECT.KEYID = 7
1,174,507 UART: [idev] UDS.KEYID = 0
1,174,853 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,796 UART: [idev] Erasing UDS.KEYID = 0
1,199,677 UART: [idev] Sha1 KeyId Algorithm
1,208,572 UART: [idev] --
1,209,575 UART: [ldev] ++
1,209,743 UART: [ldev] CDI.KEYID = 6
1,210,107 UART: [ldev] SUBJECT.KEYID = 5
1,210,534 UART: [ldev] AUTHORITY.KEYID = 7
1,210,997 UART: [ldev] FE.KEYID = 1
1,216,293 UART: [ldev] Erasing FE.KEYID = 1
1,242,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,614 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,308 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,178 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,884 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,824 UART: [ldev] --
1,282,188 UART: [fwproc] Wait for Commands...
1,282,855 UART: [fwproc] Recv command 0x46574c44
1,283,588 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,245 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,930 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,740,847 >>> mbox cmd response: success
2,742,005 UART: [afmc] ++
2,742,173 UART: [afmc] CDI.KEYID = 6
2,742,536 UART: [afmc] SUBJECT.KEYID = 7
2,742,962 UART: [afmc] AUTHORITY.KEYID = 5
2,778,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,002 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,753 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,801,466 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,807,337 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,813,047 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,820,795 UART: [afmc] --
2,821,874 UART: [cold-reset] --
2,822,646 UART: [state] Locking Datavault
2,823,475 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,079 UART: [state] Locking ICCM
2,824,687 UART: [exit] Launching FMC @ 0x40000000
2,829,984 UART:
2,830,000 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,994 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,594,501 >>> mbox cmd response: success
2,656,127 UART:
2,656,143 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,973 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = Yes
86,381 UART: [state] Starting the WD Timer 40000000 cycles
87,850 UART: [kat] SHA2-256
891,400 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,529 UART: [kat] ++
895,681 UART: [kat] sha1
899,843 UART: [kat] SHA2-256
901,783 UART: [kat] SHA2-384
904,682 UART: [kat] SHA2-512-ACC
906,583 UART: [kat] ECC-384
916,304 UART: [kat] HMAC-384Kdf
920,932 UART: [kat] LMS
1,169,244 UART: [kat] --
1,170,251 UART: [cold-reset] ++
1,170,668 UART: [fht] FHT @ 0x50003400
1,173,420 UART: [idev] ++
1,173,588 UART: [idev] CDI.KEYID = 6
1,173,949 UART: [idev] SUBJECT.KEYID = 7
1,174,374 UART: [idev] UDS.KEYID = 0
1,174,720 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,229 UART: [idev] Erasing UDS.KEYID = 0
1,199,476 UART: [idev] Sha1 KeyId Algorithm
1,208,245 UART: [idev] --
1,209,300 UART: [ldev] ++
1,209,468 UART: [ldev] CDI.KEYID = 6
1,209,832 UART: [ldev] SUBJECT.KEYID = 5
1,210,259 UART: [ldev] AUTHORITY.KEYID = 7
1,210,722 UART: [ldev] FE.KEYID = 1
1,216,208 UART: [ldev] Erasing FE.KEYID = 1
1,242,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,823 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,517 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,387 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,093 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,009 UART: [ldev] --
1,281,305 UART: [fwproc] Wait for Commands...
1,282,034 UART: [fwproc] Recv command 0x46574c44
1,282,767 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,726 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,411 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,120 >>> mbox cmd response: success
2,742,260 UART: [afmc] ++
2,742,428 UART: [afmc] CDI.KEYID = 6
2,742,791 UART: [afmc] SUBJECT.KEYID = 7
2,743,217 UART: [afmc] AUTHORITY.KEYID = 5
2,778,769 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,291 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,042 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,801,755 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,807,626 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,813,336 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,821,380 UART: [afmc] --
2,822,499 UART: [cold-reset] --
2,823,381 UART: [state] Locking Datavault
2,824,712 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,316 UART: [state] Locking ICCM
2,825,866 UART: [exit] Launching FMC @ 0x40000000
2,831,163 UART:
2,831,179 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,983 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,591,610 >>> mbox cmd response: success
2,653,582 UART:
2,653,598 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,640 UART: [state] DebugLocked = Yes
86,310 UART: [state] Starting the WD Timer 40000000 cycles
87,781 UART: [kat] SHA2-256
891,331 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,460 UART: [kat] ++
895,612 UART: [kat] sha1
899,914 UART: [kat] SHA2-256
901,854 UART: [kat] SHA2-384
904,657 UART: [kat] SHA2-512-ACC
906,558 UART: [kat] ECC-384
916,367 UART: [kat] HMAC-384Kdf
921,055 UART: [kat] LMS
1,169,367 UART: [kat] --
1,170,186 UART: [cold-reset] ++
1,170,621 UART: [fht] FHT @ 0x50003400
1,173,157 UART: [idev] ++
1,173,325 UART: [idev] CDI.KEYID = 6
1,173,686 UART: [idev] SUBJECT.KEYID = 7
1,174,111 UART: [idev] UDS.KEYID = 0
1,174,457 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,054 UART: [idev] Erasing UDS.KEYID = 0
1,199,571 UART: [idev] Sha1 KeyId Algorithm
1,208,406 UART: [idev] --
1,209,419 UART: [ldev] ++
1,209,587 UART: [ldev] CDI.KEYID = 6
1,209,951 UART: [ldev] SUBJECT.KEYID = 5
1,210,378 UART: [ldev] AUTHORITY.KEYID = 7
1,210,841 UART: [ldev] FE.KEYID = 1
1,215,967 UART: [ldev] Erasing FE.KEYID = 1
1,242,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,332 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,026 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,896 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,602 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,684 UART: [ldev] --
1,282,054 UART: [fwproc] Wait for Commands...
1,282,671 UART: [fwproc] Recv command 0x46574c44
1,283,404 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,201 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,886 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,741 >>> mbox cmd response: success
2,742,795 UART: [afmc] ++
2,742,963 UART: [afmc] CDI.KEYID = 6
2,743,326 UART: [afmc] SUBJECT.KEYID = 7
2,743,752 UART: [afmc] AUTHORITY.KEYID = 5
2,778,998 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,553 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,802,266 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,808,137 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,813,847 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,821,835 UART: [afmc] --
2,822,804 UART: [cold-reset] --
2,823,808 UART: [state] Locking Datavault
2,824,887 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,491 UART: [state] Locking ICCM
2,825,971 UART: [exit] Launching FMC @ 0x40000000
2,831,268 UART:
2,831,284 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,686 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,592,587 >>> mbox cmd response: success
2,655,023 UART:
2,655,039 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,633 UART: [state] LifecycleState = Unprovisioned
85,289 UART: [state] DebugLocked = Yes
85,947 UART: [state] Starting the WD Timer 40000000 cycles
87,540 UART: [kat] SHA2-256
891,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,219 UART: [kat] ++
895,371 UART: [kat] sha1
899,791 UART: [kat] SHA2-256
901,731 UART: [kat] SHA2-384
904,700 UART: [kat] SHA2-512-ACC
906,601 UART: [kat] ECC-384
916,722 UART: [kat] HMAC-384Kdf
921,240 UART: [kat] LMS
1,169,552 UART: [kat] --
1,170,437 UART: [cold-reset] ++
1,170,986 UART: [fht] FHT @ 0x50003400
1,173,728 UART: [idev] ++
1,173,896 UART: [idev] CDI.KEYID = 6
1,174,257 UART: [idev] SUBJECT.KEYID = 7
1,174,682 UART: [idev] UDS.KEYID = 0
1,175,028 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,182,697 UART: [idev] Erasing UDS.KEYID = 0
1,199,776 UART: [idev] Sha1 KeyId Algorithm
1,208,703 UART: [idev] --
1,209,828 UART: [ldev] ++
1,209,996 UART: [ldev] CDI.KEYID = 6
1,210,360 UART: [ldev] SUBJECT.KEYID = 5
1,210,787 UART: [ldev] AUTHORITY.KEYID = 7
1,211,250 UART: [ldev] FE.KEYID = 1
1,216,408 UART: [ldev] Erasing FE.KEYID = 1
1,242,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,965 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,659 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,529 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,235 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,189 UART: [ldev] --
1,281,671 UART: [fwproc] Wait for Commands...
1,282,476 UART: [fwproc] Recv command 0x46574c44
1,283,209 UART: [fwproc] Recv'd Img size: 111916 bytes
2,552,927 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,310 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,995 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,716 >>> mbox cmd response: success
2,742,972 UART: [afmc] ++
2,743,140 UART: [afmc] CDI.KEYID = 6
2,743,503 UART: [afmc] SUBJECT.KEYID = 7
2,743,929 UART: [afmc] AUTHORITY.KEYID = 5
2,779,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,337 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,088 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,801,801 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,807,672 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,813,382 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,821,336 UART: [afmc] --
2,822,363 UART: [cold-reset] --
2,823,053 UART: [state] Locking Datavault
2,824,376 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,980 UART: [state] Locking ICCM
2,825,458 UART: [exit] Launching FMC @ 0x40000000
2,830,755 UART:
2,830,771 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,923 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,589,804 >>> mbox cmd response: success
2,652,414 UART:
2,652,430 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,964 UART: [state] LifecycleState = Unprovisioned
86,620 UART: [state] DebugLocked = Yes
87,378 UART: [state] Starting the WD Timer 40000000 cycles
89,019 UART: [kat] SHA2-256
892,569 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,698 UART: [kat] ++
896,850 UART: [kat] sha1
901,034 UART: [kat] SHA2-256
902,974 UART: [kat] SHA2-384
905,663 UART: [kat] SHA2-512-ACC
907,564 UART: [kat] ECC-384
917,649 UART: [kat] HMAC-384Kdf
922,181 UART: [kat] LMS
1,170,493 UART: [kat] --
1,171,232 UART: [cold-reset] ++
1,171,769 UART: [fht] FHT @ 0x50003400
1,174,529 UART: [idev] ++
1,174,697 UART: [idev] CDI.KEYID = 6
1,175,058 UART: [idev] SUBJECT.KEYID = 7
1,175,483 UART: [idev] UDS.KEYID = 0
1,175,829 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
1,183,504 UART: [idev] Erasing UDS.KEYID = 0
1,200,423 UART: [idev] Sha1 KeyId Algorithm
1,209,224 UART: [idev] --
1,210,185 UART: [ldev] ++
1,210,353 UART: [ldev] CDI.KEYID = 6
1,210,717 UART: [ldev] SUBJECT.KEYID = 5
1,211,144 UART: [ldev] AUTHORITY.KEYID = 7
1,211,607 UART: [ldev] FE.KEYID = 1
1,216,813 UART: [ldev] Erasing FE.KEYID = 1
1,242,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,580 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,274 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,144 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,850 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,068 UART: [ldev] --
1,282,384 UART: [fwproc] Wait for Commands...
1,283,161 UART: [fwproc] Recv command 0x46574c44
1,283,894 UART: [fwproc] Recv'd Img size: 111916 bytes
2,553,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,167 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,852 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,741,781 >>> mbox cmd response: success
2,743,017 UART: [afmc] ++
2,743,185 UART: [afmc] CDI.KEYID = 6
2,743,548 UART: [afmc] SUBJECT.KEYID = 7
2,743,974 UART: [afmc] AUTHORITY.KEYID = 5
2,779,584 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,268 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,019 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,802,732 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,808,603 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,814,313 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,822,257 UART: [afmc] --
2,823,370 UART: [cold-reset] --
2,824,136 UART: [state] Locking Datavault
2,825,323 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,927 UART: [state] Locking ICCM
2,826,503 UART: [exit] Launching FMC @ 0x40000000
2,831,800 UART:
2,831,816 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,918 <<< Executing mbox cmd 0x46574c44 (111916 bytes) from SoC
2,590,089 >>> mbox cmd response: success
2,653,527 UART:
2,653,543 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Unprovisioned
85,814 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,796 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,692 UART: [state] LifecycleState = Unprovisioned
85,347 UART: [state] DebugLocked = No
85,937 UART: [state] WD Timer not started. Device not locked for debugging
87,262 UART: [kat] SHA2-256
890,812 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,941 UART: [kat] ++
895,093 UART: [kat] sha1
899,319 UART: [kat] SHA2-256
901,259 UART: [kat] SHA2-384
904,114 UART: [kat] SHA2-512-ACC
906,015 UART: [kat] ECC-384
915,596 UART: [kat] HMAC-384Kdf
920,178 UART: [kat] LMS
1,168,490 UART: [kat] --
1,169,297 UART: [cold-reset] ++
1,169,863 UART: [fht] FHT @ 0x50003400
1,172,569 UART: [idev] ++
1,172,737 UART: [idev] CDI.KEYID = 6
1,173,098 UART: [idev] SUBJECT.KEYID = 7
1,173,523 UART: [idev] UDS.KEYID = 0
1,181,853 UART: [idev] Erasing UDS.KEYID = 0
1,198,351 UART: [idev] Sha1 KeyId Algorithm
1,206,725 UART: [idev] CSR upload begun
1,208,504 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,409 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,117 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,002 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,708 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,137 UART: [idev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
1,296,634 UART: [idev] CSR uploaded
1,299,679 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,848 UART: [idev] --
1,300,889 UART: [ldev] ++
1,301,057 UART: [ldev] CDI.KEYID = 6
1,301,421 UART: [ldev] SUBJECT.KEYID = 5
1,301,848 UART: [ldev] AUTHORITY.KEYID = 7
1,302,311 UART: [ldev] FE.KEYID = 1
1,307,587 UART: [ldev] Erasing FE.KEYID = 1
1,333,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,887 UART: [ldev] --
1,373,199 UART: [fwproc] Wait for Commands...
1,373,872 UART: [fwproc] Recv command 0x49444352
1,379,001 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,105,554 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,158,012 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,822 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
891,597 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,726 UART: [kat] ++
895,878 UART: [kat] sha1
900,106 UART: [kat] SHA2-256
902,046 UART: [kat] SHA2-384
904,901 UART: [kat] SHA2-512-ACC
906,802 UART: [kat] ECC-384
916,239 UART: [kat] HMAC-384Kdf
920,989 UART: [kat] LMS
1,169,301 UART: [kat] --
1,170,144 UART: [cold-reset] ++
1,170,676 UART: [fht] FHT @ 0x50003400
1,173,466 UART: [idev] ++
1,173,634 UART: [idev] CDI.KEYID = 6
1,173,995 UART: [idev] SUBJECT.KEYID = 7
1,174,420 UART: [idev] UDS.KEYID = 0
1,182,282 UART: [idev] Erasing UDS.KEYID = 0
1,199,822 UART: [idev] Sha1 KeyId Algorithm
1,208,366 UART: [idev] CSR upload begun
1,210,145 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,988 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,696 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,581 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,287 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,716 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,213 UART: [idev] CSR uploaded
1,301,258 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,301,427 UART: [idev] --
1,302,664 UART: [ldev] ++
1,302,832 UART: [ldev] CDI.KEYID = 6
1,303,196 UART: [ldev] SUBJECT.KEYID = 5
1,303,623 UART: [ldev] AUTHORITY.KEYID = 7
1,304,086 UART: [ldev] FE.KEYID = 1
1,309,422 UART: [ldev] Erasing FE.KEYID = 1
1,335,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,355,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,636 UART: [ldev] --
1,374,960 UART: [fwproc] Wait for Commands...
1,375,667 UART: [fwproc] Recv command 0x49444352
1,380,796 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,359 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,159,495 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,295 UART: [kat] ++
895,447 UART: [kat] sha1
899,765 UART: [kat] SHA2-256
901,705 UART: [kat] SHA2-384
904,242 UART: [kat] SHA2-512-ACC
906,143 UART: [kat] ECC-384
916,158 UART: [kat] HMAC-384Kdf
920,910 UART: [kat] LMS
1,169,222 UART: [kat] --
1,170,341 UART: [cold-reset] ++
1,170,693 UART: [fht] FHT @ 0x50003400
1,173,253 UART: [idev] ++
1,173,421 UART: [idev] CDI.KEYID = 6
1,173,782 UART: [idev] SUBJECT.KEYID = 7
1,174,207 UART: [idev] UDS.KEYID = 0
1,182,427 UART: [idev] Erasing UDS.KEYID = 0
1,199,347 UART: [idev] Sha1 KeyId Algorithm
1,207,705 UART: [idev] CSR upload begun
1,209,484 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,357 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,065 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,950 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,656 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,085 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,582 UART: [idev] CSR uploaded
1,300,627 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,796 UART: [idev] --
1,301,809 UART: [ldev] ++
1,301,977 UART: [ldev] CDI.KEYID = 6
1,302,341 UART: [ldev] SUBJECT.KEYID = 5
1,302,768 UART: [ldev] AUTHORITY.KEYID = 7
1,303,231 UART: [ldev] FE.KEYID = 1
1,308,105 UART: [ldev] Erasing FE.KEYID = 1
1,334,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,139 UART: [ldev] --
1,373,421 UART: [fwproc] Wait for Commands...
1,374,160 UART: [fwproc] Recv command 0x49444352
1,379,289 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,105,598 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,157,414 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
891,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,578 UART: [kat] ++
895,730 UART: [kat] sha1
899,988 UART: [kat] SHA2-256
901,928 UART: [kat] SHA2-384
904,559 UART: [kat] SHA2-512-ACC
906,460 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
920,913 UART: [kat] LMS
1,169,225 UART: [kat] --
1,170,112 UART: [cold-reset] ++
1,170,644 UART: [fht] FHT @ 0x50003400
1,173,330 UART: [idev] ++
1,173,498 UART: [idev] CDI.KEYID = 6
1,173,859 UART: [idev] SUBJECT.KEYID = 7
1,174,284 UART: [idev] UDS.KEYID = 0
1,182,334 UART: [idev] Erasing UDS.KEYID = 0
1,199,596 UART: [idev] Sha1 KeyId Algorithm
1,207,750 UART: [idev] CSR upload begun
1,209,529 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,166 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,874 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,759 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,465 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,894 UART: [idev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
1,297,391 UART: [idev] CSR uploaded
1,300,436 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,605 UART: [idev] --
1,301,712 UART: [ldev] ++
1,301,880 UART: [ldev] CDI.KEYID = 6
1,302,244 UART: [ldev] SUBJECT.KEYID = 5
1,302,671 UART: [ldev] AUTHORITY.KEYID = 7
1,303,134 UART: [ldev] FE.KEYID = 1
1,308,522 UART: [ldev] Erasing FE.KEYID = 1
1,334,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,876 UART: [ldev] --
1,374,382 UART: [fwproc] Wait for Commands...
1,375,009 UART: [fwproc] Recv command 0x49444352
1,380,138 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,319 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,158,831 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,708 UART: [kat] SHA2-256
891,258 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,387 UART: [kat] ++
895,539 UART: [kat] sha1
899,775 UART: [kat] SHA2-256
901,715 UART: [kat] SHA2-384
904,556 UART: [kat] SHA2-512-ACC
906,457 UART: [kat] ECC-384
916,406 UART: [kat] HMAC-384Kdf
920,946 UART: [kat] LMS
1,169,258 UART: [kat] --
1,170,397 UART: [cold-reset] ++
1,170,855 UART: [fht] FHT @ 0x50003400
1,173,445 UART: [idev] ++
1,173,613 UART: [idev] CDI.KEYID = 6
1,173,974 UART: [idev] SUBJECT.KEYID = 7
1,174,399 UART: [idev] UDS.KEYID = 0
1,182,075 UART: [idev] Erasing UDS.KEYID = 0
1,198,833 UART: [idev] Sha1 KeyId Algorithm
1,207,155 UART: [idev] CSR upload begun
1,208,934 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,713 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,421 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,306 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,012 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,441 UART: [idev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
1,296,938 UART: [idev] CSR uploaded
1,299,983 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,152 UART: [idev] --
1,301,083 UART: [ldev] ++
1,301,251 UART: [ldev] CDI.KEYID = 6
1,301,615 UART: [ldev] SUBJECT.KEYID = 5
1,302,042 UART: [ldev] AUTHORITY.KEYID = 7
1,302,505 UART: [ldev] FE.KEYID = 1
1,307,857 UART: [ldev] Erasing FE.KEYID = 1
1,333,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,795 UART: [ldev] --
1,373,171 UART: [fwproc] Wait for Commands...
1,373,778 UART: [fwproc] Recv command 0x49444352
1,378,907 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,250 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,158,090 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,963 UART: [state] LifecycleState = Unprovisioned
85,618 UART: [state] DebugLocked = No
86,234 UART: [state] WD Timer not started. Device not locked for debugging
87,553 UART: [kat] SHA2-256
891,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,232 UART: [kat] ++
895,384 UART: [kat] sha1
899,554 UART: [kat] SHA2-256
901,494 UART: [kat] SHA2-384
904,283 UART: [kat] SHA2-512-ACC
906,184 UART: [kat] ECC-384
916,217 UART: [kat] HMAC-384Kdf
921,007 UART: [kat] LMS
1,169,319 UART: [kat] --
1,170,426 UART: [cold-reset] ++
1,170,912 UART: [fht] FHT @ 0x50003400
1,173,512 UART: [idev] ++
1,173,680 UART: [idev] CDI.KEYID = 6
1,174,041 UART: [idev] SUBJECT.KEYID = 7
1,174,466 UART: [idev] UDS.KEYID = 0
1,182,422 UART: [idev] Erasing UDS.KEYID = 0
1,200,036 UART: [idev] Sha1 KeyId Algorithm
1,208,474 UART: [idev] CSR upload begun
1,210,253 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,736 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,444 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,329 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,035 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,464 UART: [idev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
1,297,961 UART: [idev] CSR uploaded
1,301,006 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,301,175 UART: [idev] --
1,302,280 UART: [ldev] ++
1,302,448 UART: [ldev] CDI.KEYID = 6
1,302,812 UART: [ldev] SUBJECT.KEYID = 5
1,303,239 UART: [ldev] AUTHORITY.KEYID = 7
1,303,702 UART: [ldev] FE.KEYID = 1
1,309,092 UART: [ldev] Erasing FE.KEYID = 1
1,335,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,152 UART: [ldev] --
1,374,424 UART: [fwproc] Wait for Commands...
1,375,133 UART: [fwproc] Recv command 0x49444352
1,380,262 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,893 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,159,329 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,799 UART: [state] WD Timer not started. Device not locked for debugging
88,090 UART: [kat] SHA2-256
891,640 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,769 UART: [kat] ++
895,921 UART: [kat] sha1
900,129 UART: [kat] SHA2-256
902,069 UART: [kat] SHA2-384
904,908 UART: [kat] SHA2-512-ACC
906,809 UART: [kat] ECC-384
916,260 UART: [kat] HMAC-384Kdf
920,846 UART: [kat] LMS
1,169,158 UART: [kat] --
1,170,233 UART: [cold-reset] ++
1,170,723 UART: [fht] FHT @ 0x50003400
1,173,399 UART: [idev] ++
1,173,567 UART: [idev] CDI.KEYID = 6
1,173,928 UART: [idev] SUBJECT.KEYID = 7
1,174,353 UART: [idev] UDS.KEYID = 0
1,174,699 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,097 UART: [idev] Erasing UDS.KEYID = 0
1,198,939 UART: [idev] Sha1 KeyId Algorithm
1,207,601 UART: [idev] --
1,208,818 UART: [ldev] ++
1,208,986 UART: [ldev] CDI.KEYID = 6
1,209,350 UART: [ldev] SUBJECT.KEYID = 5
1,209,777 UART: [ldev] AUTHORITY.KEYID = 7
1,210,240 UART: [ldev] FE.KEYID = 1
1,215,302 UART: [ldev] Erasing FE.KEYID = 1
1,241,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,572 UART: [ldev] --
1,281,008 UART: [fwproc] Wait for Commands...
1,281,797 UART: [fwproc] Recv command 0x49444352
1,283,663 UART: ROM Fatal Error: 0x0102000A
1,284,824 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,068 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,137,940 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
891,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,644 UART: [kat] ++
895,796 UART: [kat] sha1
900,180 UART: [kat] SHA2-256
902,120 UART: [kat] SHA2-384
904,819 UART: [kat] SHA2-512-ACC
906,720 UART: [kat] ECC-384
916,307 UART: [kat] HMAC-384Kdf
920,901 UART: [kat] LMS
1,169,213 UART: [kat] --
1,170,062 UART: [cold-reset] ++
1,170,498 UART: [fht] FHT @ 0x50003400
1,173,172 UART: [idev] ++
1,173,340 UART: [idev] CDI.KEYID = 6
1,173,701 UART: [idev] SUBJECT.KEYID = 7
1,174,126 UART: [idev] UDS.KEYID = 0
1,174,472 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,181,794 UART: [idev] Erasing UDS.KEYID = 0
1,198,924 UART: [idev] Sha1 KeyId Algorithm
1,207,874 UART: [idev] --
1,208,897 UART: [ldev] ++
1,209,065 UART: [ldev] CDI.KEYID = 6
1,209,429 UART: [ldev] SUBJECT.KEYID = 5
1,209,856 UART: [ldev] AUTHORITY.KEYID = 7
1,210,319 UART: [ldev] FE.KEYID = 1
1,215,535 UART: [ldev] Erasing FE.KEYID = 1
1,242,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,573 UART: [ldev] --
1,281,925 UART: [fwproc] Wait for Commands...
1,282,664 UART: [fwproc] Recv command 0x49444352
1,284,364 UART: ROM Fatal Error: 0x0102000A
1,285,525 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,417 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,137,683 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,294 UART: [kat] SHA2-256
890,844 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,973 UART: [kat] ++
895,125 UART: [kat] sha1
899,253 UART: [kat] SHA2-256
901,193 UART: [kat] SHA2-384
904,022 UART: [kat] SHA2-512-ACC
905,923 UART: [kat] ECC-384
915,738 UART: [kat] HMAC-384Kdf
920,390 UART: [kat] LMS
1,168,702 UART: [kat] --
1,169,387 UART: [cold-reset] ++
1,169,787 UART: [fht] FHT @ 0x50003400
1,172,477 UART: [idev] ++
1,172,645 UART: [idev] CDI.KEYID = 6
1,173,006 UART: [idev] SUBJECT.KEYID = 7
1,173,431 UART: [idev] UDS.KEYID = 0
1,173,777 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,181,469 UART: [idev] Erasing UDS.KEYID = 0
1,198,221 UART: [idev] Sha1 KeyId Algorithm
1,207,117 UART: [idev] --
1,208,030 UART: [ldev] ++
1,208,198 UART: [ldev] CDI.KEYID = 6
1,208,562 UART: [ldev] SUBJECT.KEYID = 5
1,208,989 UART: [ldev] AUTHORITY.KEYID = 7
1,209,452 UART: [ldev] FE.KEYID = 1
1,214,414 UART: [ldev] Erasing FE.KEYID = 1
1,241,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,880 UART: [ldev] --
1,280,288 UART: [fwproc] Wait for Commands...
1,280,925 UART: [fwproc] Recv command 0x49444352
1,282,831 UART: ROM Fatal Error: 0x0102000A
1,283,992 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,590 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,135,334 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,001 UART: [state] LifecycleState = Unprovisioned
86,656 UART: [state] DebugLocked = No
87,200 UART: [state] WD Timer not started. Device not locked for debugging
88,541 UART: [kat] SHA2-256
892,091 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,220 UART: [kat] ++
896,372 UART: [kat] sha1
900,666 UART: [kat] SHA2-256
902,606 UART: [kat] SHA2-384
905,477 UART: [kat] SHA2-512-ACC
907,378 UART: [kat] ECC-384
917,183 UART: [kat] HMAC-384Kdf
921,939 UART: [kat] LMS
1,170,251 UART: [kat] --
1,171,194 UART: [cold-reset] ++
1,171,652 UART: [fht] FHT @ 0x50003400
1,174,150 UART: [idev] ++
1,174,318 UART: [idev] CDI.KEYID = 6
1,174,679 UART: [idev] SUBJECT.KEYID = 7
1,175,104 UART: [idev] UDS.KEYID = 0
1,175,450 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,183,334 UART: [idev] Erasing UDS.KEYID = 0
1,200,600 UART: [idev] Sha1 KeyId Algorithm
1,209,484 UART: [idev] --
1,210,581 UART: [ldev] ++
1,210,749 UART: [ldev] CDI.KEYID = 6
1,211,113 UART: [ldev] SUBJECT.KEYID = 5
1,211,540 UART: [ldev] AUTHORITY.KEYID = 7
1,212,003 UART: [ldev] FE.KEYID = 1
1,217,117 UART: [ldev] Erasing FE.KEYID = 1
1,243,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,667 UART: [ldev] --
1,282,981 UART: [fwproc] Wait for Commands...
1,283,616 UART: [fwproc] Recv command 0x49444352
1,285,256 UART: ROM Fatal Error: 0x0102000A
1,286,417 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,533 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,136,843 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,572 UART: [state] LifecycleState = Unprovisioned
86,227 UART: [state] DebugLocked = No
86,903 UART: [state] WD Timer not started. Device not locked for debugging
88,082 UART: [kat] SHA2-256
891,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,761 UART: [kat] ++
895,913 UART: [kat] sha1
900,265 UART: [kat] SHA2-256
902,205 UART: [kat] SHA2-384
904,916 UART: [kat] SHA2-512-ACC
906,817 UART: [kat] ECC-384
916,872 UART: [kat] HMAC-384Kdf
921,482 UART: [kat] LMS
1,169,794 UART: [kat] --
1,170,769 UART: [cold-reset] ++
1,171,115 UART: [fht] FHT @ 0x50003400
1,173,711 UART: [idev] ++
1,173,879 UART: [idev] CDI.KEYID = 6
1,174,240 UART: [idev] SUBJECT.KEYID = 7
1,174,665 UART: [idev] UDS.KEYID = 0
1,175,011 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,159 UART: [idev] Erasing UDS.KEYID = 0
1,198,817 UART: [idev] Sha1 KeyId Algorithm
1,207,663 UART: [idev] --
1,208,602 UART: [ldev] ++
1,208,770 UART: [ldev] CDI.KEYID = 6
1,209,134 UART: [ldev] SUBJECT.KEYID = 5
1,209,561 UART: [ldev] AUTHORITY.KEYID = 7
1,210,024 UART: [ldev] FE.KEYID = 1
1,215,378 UART: [ldev] Erasing FE.KEYID = 1
1,242,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,976 UART: [ldev] --
1,281,466 UART: [fwproc] Wait for Commands...
1,282,059 UART: [fwproc] Recv command 0x49444352
1,283,793 UART: ROM Fatal Error: 0x0102000A
1,284,954 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,358 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,136,956 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,574 UART: [kat] ++
895,726 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,715 UART: [kat] SHA2-512-ACC
906,616 UART: [kat] ECC-384
916,373 UART: [kat] HMAC-384Kdf
921,019 UART: [kat] LMS
1,169,331 UART: [kat] --
1,170,044 UART: [cold-reset] ++
1,170,404 UART: [fht] FHT @ 0x50003400
1,173,154 UART: [idev] ++
1,173,322 UART: [idev] CDI.KEYID = 6
1,173,683 UART: [idev] SUBJECT.KEYID = 7
1,174,108 UART: [idev] UDS.KEYID = 0
1,174,454 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,181,948 UART: [idev] Erasing UDS.KEYID = 0
1,199,034 UART: [idev] Sha1 KeyId Algorithm
1,208,034 UART: [idev] --
1,209,183 UART: [ldev] ++
1,209,351 UART: [ldev] CDI.KEYID = 6
1,209,715 UART: [ldev] SUBJECT.KEYID = 5
1,210,142 UART: [ldev] AUTHORITY.KEYID = 7
1,210,605 UART: [ldev] FE.KEYID = 1
1,216,073 UART: [ldev] Erasing FE.KEYID = 1
1,242,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,887 UART: [ldev] --
1,282,301 UART: [fwproc] Wait for Commands...
1,283,000 UART: [fwproc] Recv command 0x49444352
1,284,540 UART: ROM Fatal Error: 0x0102000A
1,285,701 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,057 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,138,617 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,449 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,161 UART: [kat] SHA2-256
882,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,207 UART: [kat] ++
886,359 UART: [kat] sha1
890,543 UART: [kat] SHA2-256
892,481 UART: [kat] SHA2-384
895,152 UART: [kat] SHA2-512-ACC
897,053 UART: [kat] ECC-384
902,728 UART: [kat] HMAC-384Kdf
907,458 UART: [kat] LMS
1,475,654 UART: [kat] --
1,476,423 UART: [cold-reset] ++
1,476,819 UART: [fht] Storing FHT @ 0x50003400
1,479,574 UART: [idev] ++
1,479,742 UART: [idev] CDI.KEYID = 6
1,480,102 UART: [idev] SUBJECT.KEYID = 7
1,480,526 UART: [idev] UDS.KEYID = 0
1,480,871 ready_for_fw is high
1,480,871 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,812 UART: [idev] Erasing UDS.KEYID = 0
1,505,350 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,904 UART: [idev] --
1,514,819 UART: [ldev] ++
1,514,987 UART: [ldev] CDI.KEYID = 6
1,515,350 UART: [ldev] SUBJECT.KEYID = 5
1,515,776 UART: [ldev] AUTHORITY.KEYID = 7
1,516,239 UART: [ldev] FE.KEYID = 1
1,521,423 UART: [ldev] Erasing FE.KEYID = 1
1,547,216 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,812 UART: [ldev] --
1,586,165 UART: [fwproc] Waiting for Commands...
1,586,792 UART: [fwproc] Received command 0x46574c44
1,587,583 UART: [fwproc] Received Image of size 114332 bytes
2,885,779 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,531 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,883 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,854 >>> mbox cmd response: success
3,078,894 UART: [afmc] ++
3,079,062 UART: [afmc] CDI.KEYID = 6
3,079,424 UART: [afmc] SUBJECT.KEYID = 7
3,079,849 UART: [afmc] AUTHORITY.KEYID = 5
3,114,554 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,954 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,734 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,462 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,347 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,037 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,876 UART: [afmc] --
3,157,982 UART: [cold-reset] --
3,159,048 UART: [state] Locking Datavault
3,159,933 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,537 UART: [state] Locking ICCM
3,160,977 UART: [exit] Launching FMC @ 0x40000130
3,166,306 UART:
3,166,322 UART: Running Caliptra FMC ...
3,166,730 UART:
3,166,784 UART: [state] CFI Enabled
3,177,229 UART: [fht] FMC Alias Private Key: 7
3,284,022 UART: [art] Extend RT PCRs Done
3,284,450 UART: [art] Lock RT PCRs Done
3,285,794 UART: [art] Populate DV Done
3,293,951 UART: [fht] FMC Alias Private Key: 7
3,295,075 UART: [art] Derive CDI
3,295,355 UART: [art] Store in in slot 0x4
3,380,648 UART: [art] Derive Key Pair
3,381,008 UART: [art] Store priv key in slot 0x5
3,394,358 UART: [art] Derive Key Pair - Done
3,409,098 UART: [art] Signing Cert with AUTHO
3,409,578 UART: RITY.KEYID = 7
3,424,920 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,685 UART: [art] PUB.X = 5D7C8D334FE1F3AB7C9AD2C35261896FE11A6015E9ED5CBBC4A6BE761690F5371ED3F7DB94ADF2B1EC87B96A3CBD28F1
3,432,479 UART: [art] PUB.Y = DF9D56B0441D60E6D2D8A345A8F9018F5B95581EACBAEDA5E8C8B32F46568D1B3E922788F767EC9B465D6F420AC3A1E9
3,439,437 UART: [art] SIG.R = EF13B2F3F3A571DCD645AB4DE886CBCE47C309B05E3FAC7E09082F06F903B0B3784D56496F7F550455F9F973BB179EC2
3,446,201 UART: [art] SIG.S = 2A46318821A81D16962B9452444BE65BB1648375C1BD689A56DEE630ACCE071078BB94EE68C47F7473AA870CDBEEB996
3,469,656 UART: Caliptra RT
3,469,909 UART: [state] CFI Enabled
3,578,112 UART: [rt] RT listening for mailbox commands...
3,578,782 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,784 UART: [rt]cmd =0x41544d4e, len=14344
4,011,638 >>> mbox cmd response data (8 bytes)
4,011,639 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,478 UART: [rt]cmd =0x41545348, len=116
4,063,707 >>> mbox cmd response data (12 bytes)
4,063,708 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,064,536 UART:
4,064,552 UART: Running Caliptra ROM ...
4,064,960 UART:
4,065,014 UART: [state] CFI Enabled
4,067,434 UART: [state] LifecycleState = Unprovisioned
4,068,089 UART: [state] DebugLocked = No
4,068,687 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,070,200 UART: [kat] SHA2-256
4,864,131 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,868,246 UART: [kat] ++
4,868,398 UART: [kat] sha1
4,872,596 UART: [kat] SHA2-256
4,874,534 UART: [kat] SHA2-384
4,877,245 UART: [kat] SHA2-512-ACC
4,879,145 UART: [kat] ECC-384
4,884,744 UART: [kat] HMAC-384Kdf
4,889,438 UART: [kat] LMS
5,457,634 UART: [kat] --
5,458,511 UART: [update-reset] ++
6,793,255 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,794,527 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,944,403 >>> mbox cmd response: success
6,944,403 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,944,586 UART: [update-reset] Copying MAN_2 To MAN_1
6,952,600 UART: [update-reset Success] --
6,953,437 UART: [state] Locking Datavault
6,954,079 UART: [state] Locking PCR0, PCR1 and PCR31
6,954,683 UART: [state] Locking ICCM
6,955,285 UART: [exit] Launching FMC @ 0x40000130
6,960,614 UART:
6,960,630 UART: Running Caliptra FMC ...
6,961,038 UART:
6,961,092 UART: [state] CFI Enabled
7,050,113 UART: [art] Extend RT PCRs Done
7,050,541 UART: [art] Lock RT PCRs Done
7,052,054 UART: [art] Populate DV Done
7,059,933 UART: [fht] FMC Alias Private Key: 7
7,060,901 UART: [art] Derive CDI
7,061,181 UART: [art] Store in in slot 0x4
7,146,938 UART: [art] Derive Key Pair
7,147,298 UART: [art] Store priv key in slot 0x5
7,159,940 UART: [art] Derive Key Pair - Done
7,174,619 UART: [art] Signing Cert with AUTHO
7,175,099 UART: RITY.KEYID = 7
7,190,451 UART: [art] Erasing AUTHORITY.KEYID = 7
7,191,216 UART: [art] PUB.X = 5871C2E4A1D0D8569C0C81C3ACF12803A5FABC9BA8269D470F4B532B927AEFBE8D2103FFF0A7BDA6573C86A30AECC672
7,197,991 UART: [art] PUB.Y = E9E0B2E5412D004959A7D1DFE533CD724083D997FCDAEF97BA21CE5A058848500E9760313FB7C9666A58AB8EA824BF9D
7,204,923 UART: [art] SIG.R = 3255C09DB656930741163E5D98B3DB35FC583052E7D6B2F0D9146CA5E7E701A7F2A01E8331B01803A7724F87EF1FA81A
7,211,684 UART: [art] SIG.S = 961610F565E5F5190ED53DE011AFD71FD8874DDC61C9857806D50E2349FDF834B1B467C9D9F135B0389CE27B636D6DF4
7,235,708 UART: Caliptra RT
7,235,961 UART: [state] CFI Enabled
7,520,244 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,551,241 UART: [rt]cmd =0x41545348, len=116
7,573,610 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,733 ready_for_fw is high
1,362,733 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,692 >>> mbox cmd response: success
2,989,276 UART:
2,989,292 UART: Running Caliptra FMC ...
2,989,700 UART:
2,989,754 UART: [state] CFI Enabled
3,000,163 UART: [fht] FMC Alias Private Key: 7
3,108,228 UART: [art] Extend RT PCRs Done
3,108,656 UART: [art] Lock RT PCRs Done
3,110,266 UART: [art] Populate DV Done
3,118,613 UART: [fht] FMC Alias Private Key: 7
3,119,757 UART: [art] Derive CDI
3,120,037 UART: [art] Store in in slot 0x4
3,205,654 UART: [art] Derive Key Pair
3,206,014 UART: [art] Store priv key in slot 0x5
3,219,660 UART: [art] Derive Key Pair - Done
3,234,648 UART: [art] Signing Cert with AUTHO
3,235,128 UART: RITY.KEYID = 7
3,250,254 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,019 UART: [art] PUB.X = 4283F81C275DA1B4047C2794953D0DD27068C7F4BE1C4A95A3FE381A3C4C4893B10918C53A64B51B921E488251C0B4B2
3,257,778 UART: [art] PUB.Y = 6C7473864A773D8128F8CE36AE60E402F1F45F5AB125B190701EF8E0E8BEF029B2F205A98F8685C864C8E7E45E7B9E50
3,264,726 UART: [art] SIG.R = 57B439D1CB898583B014FAE682834ABD3DA278426B7E79EE77D307C3BEA94C706ACC60CA0AD37711E71FA5DB2943F0E1
3,271,502 UART: [art] SIG.S = 0600BBF672CAB47B4A0FD4D19AF2ADE66D4D09BED6DFB2AD67FB20E1034F4B3AB23604D44430B8D10BE4E514E385392F
3,296,205 UART: Caliptra RT
3,296,458 UART: [state] CFI Enabled
3,404,750 UART: [rt] RT listening for mailbox commands...
3,405,420 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,482 UART: [rt]cmd =0x41544d4e, len=14344
3,838,082 >>> mbox cmd response data (8 bytes)
3,838,083 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,868,362 UART: [rt]cmd =0x41545348, len=116
3,890,723 >>> mbox cmd response data (12 bytes)
3,890,724 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,652,291 >>> mbox cmd response: success
6,652,291 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,665,652 UART:
6,665,668 UART: Running Caliptra FMC ...
6,666,076 UART:
6,666,130 UART: [state] CFI Enabled
6,755,409 UART: [art] Extend RT PCRs Done
6,755,837 UART: [art] Lock RT PCRs Done
6,757,002 UART: [art] Populate DV Done
6,765,369 UART: [fht] FMC Alias Private Key: 7
6,766,337 UART: [art] Derive CDI
6,766,617 UART: [art] Store in in slot 0x4
6,852,332 UART: [art] Derive Key Pair
6,852,692 UART: [art] Store priv key in slot 0x5
6,865,636 UART: [art] Derive Key Pair - Done
6,880,505 UART: [art] Signing Cert with AUTHO
6,880,985 UART: RITY.KEYID = 7
6,896,171 UART: [art] Erasing AUTHORITY.KEYID = 7
6,896,936 UART: [art] PUB.X = BDE41D00C99A17BBCEC5D415240DA0E8900C41F1D8796AC8D14317EBC6F39EECE5D669D03F4EDFE4D119405AC00CA6B2
6,903,697 UART: [art] PUB.Y = 152BB6189C4778A539C2C7DC51C27A2F48F6F2F55606A5CD7B31D0249DD3746709BD669B7A39057273D530CA226F127C
6,910,636 UART: [art] SIG.R = 6DE10205ACD409A6F57F07A7BF508896975E2C933487E713F655EC3A0F986FAA9A26D4F246E8492B4579DFA926BC58B5
6,917,395 UART: [art] SIG.S = 930BB4EA651D237DB2EBA07C1EA6C8D02D1C462CCD42EFE5CAD5960586CC980957B176C9E33E8F4FCDF24954D199E4C1
6,941,247 UART: Caliptra RT
6,941,500 UART: [state] CFI Enabled
7,220,017 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,250,952 UART: [rt]cmd =0x41545348, len=116
7,273,609 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,762 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,482 UART: [kat] SHA2-256
882,413 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,528 UART: [kat] ++
886,680 UART: [kat] sha1
890,782 UART: [kat] SHA2-256
892,720 UART: [kat] SHA2-384
895,457 UART: [kat] SHA2-512-ACC
897,358 UART: [kat] ECC-384
903,233 UART: [kat] HMAC-384Kdf
907,867 UART: [kat] LMS
1,476,063 UART: [kat] --
1,476,924 UART: [cold-reset] ++
1,477,362 UART: [fht] Storing FHT @ 0x50003400
1,480,187 UART: [idev] ++
1,480,355 UART: [idev] CDI.KEYID = 6
1,480,715 UART: [idev] SUBJECT.KEYID = 7
1,481,139 UART: [idev] UDS.KEYID = 0
1,481,484 ready_for_fw is high
1,481,484 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,879 UART: [idev] Erasing UDS.KEYID = 0
1,505,117 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,655 UART: [idev] --
1,514,572 UART: [ldev] ++
1,514,740 UART: [ldev] CDI.KEYID = 6
1,515,103 UART: [ldev] SUBJECT.KEYID = 5
1,515,529 UART: [ldev] AUTHORITY.KEYID = 7
1,515,992 UART: [ldev] FE.KEYID = 1
1,521,306 UART: [ldev] Erasing FE.KEYID = 1
1,546,785 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,013 UART: [ldev] --
1,586,462 UART: [fwproc] Waiting for Commands...
1,587,133 UART: [fwproc] Received command 0x46574c44
1,587,924 UART: [fwproc] Received Image of size 114332 bytes
2,886,472 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,138 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,490 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,353 >>> mbox cmd response: success
3,080,463 UART: [afmc] ++
3,080,631 UART: [afmc] CDI.KEYID = 6
3,080,993 UART: [afmc] SUBJECT.KEYID = 7
3,081,418 UART: [afmc] AUTHORITY.KEYID = 5
3,116,633 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,723 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,503 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,231 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,116 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,806 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,761 UART: [afmc] --
3,159,641 UART: [cold-reset] --
3,160,613 UART: [state] Locking Datavault
3,161,594 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,198 UART: [state] Locking ICCM
3,162,806 UART: [exit] Launching FMC @ 0x40000130
3,168,135 UART:
3,168,151 UART: Running Caliptra FMC ...
3,168,559 UART:
3,168,702 UART: [state] CFI Enabled
3,179,571 UART: [fht] FMC Alias Private Key: 7
3,288,202 UART: [art] Extend RT PCRs Done
3,288,630 UART: [art] Lock RT PCRs Done
3,290,168 UART: [art] Populate DV Done
3,298,371 UART: [fht] FMC Alias Private Key: 7
3,299,367 UART: [art] Derive CDI
3,299,647 UART: [art] Store in in slot 0x4
3,385,044 UART: [art] Derive Key Pair
3,385,404 UART: [art] Store priv key in slot 0x5
3,398,454 UART: [art] Derive Key Pair - Done
3,413,067 UART: [art] Signing Cert with AUTHO
3,413,547 UART: RITY.KEYID = 7
3,428,533 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,298 UART: [art] PUB.X = 402D529F99FB235451A162C26660488D7EBFF754397D3277D513905C847CD7BBEC42EA5BDC7AB5DBBFAB58A2F40E3C03
3,436,074 UART: [art] PUB.Y = 229405E425412627FA43721E7C353EB800F6722839BDF7DDCEB6437F0D90F0B89531A980008040F2648DCB665A65CF80
3,442,968 UART: [art] SIG.R = 5B70092DA23196F92495727B54AC2AE9B6EC4E9E7CF6FF639B698C897BD55D36747BAFAB26619B6E3D12184B1735FE99
3,449,741 UART: [art] SIG.S = 60BEE484AA1260BC755622693BCB26BD14D084984DA05A475B262AF45D8D5FBBE1433AC5E95AF5B07628235BD9348073
3,473,840 UART: Caliptra RT
3,474,185 UART: [state] CFI Enabled
3,582,625 UART: [rt] RT listening for mailbox commands...
3,583,295 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,151 UART: [rt]cmd =0x41544d4e, len=14344
4,016,095 >>> mbox cmd response data (8 bytes)
4,016,096 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,259 UART: [rt]cmd =0x41545348, len=116
4,068,158 >>> mbox cmd response data (12 bytes)
4,068,159 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,069,061 UART:
4,069,077 UART: Running Caliptra ROM ...
4,069,485 UART:
4,069,626 UART: [state] CFI Enabled
4,072,598 UART: [state] LifecycleState = Unprovisioned
4,073,253 UART: [state] DebugLocked = No
4,073,847 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,075,502 UART: [kat] SHA2-256
4,869,433 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,873,548 UART: [kat] ++
4,873,700 UART: [kat] sha1
4,877,862 UART: [kat] SHA2-256
4,879,800 UART: [kat] SHA2-384
4,882,471 UART: [kat] SHA2-512-ACC
4,884,371 UART: [kat] ECC-384
4,889,758 UART: [kat] HMAC-384Kdf
4,894,586 UART: [kat] LMS
5,462,782 UART: [kat] --
5,463,761 UART: [update-reset] ++
6,798,457 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,799,549 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,949,425 >>> mbox cmd response: success
6,949,425 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,949,720 UART: [update-reset] Copying MAN_2 To MAN_1
6,957,734 UART: [update-reset Success] --
6,958,699 UART: [state] Locking Datavault
6,959,567 UART: [state] Locking PCR0, PCR1 and PCR31
6,960,171 UART: [state] Locking ICCM
6,960,653 UART: [exit] Launching FMC @ 0x40000130
6,965,982 UART:
6,965,998 UART: Running Caliptra FMC ...
6,966,406 UART:
6,966,549 UART: [state] CFI Enabled
7,055,116 UART: [art] Extend RT PCRs Done
7,055,544 UART: [art] Lock RT PCRs Done
7,056,711 UART: [art] Populate DV Done
7,064,884 UART: [fht] FMC Alias Private Key: 7
7,065,980 UART: [art] Derive CDI
7,066,260 UART: [art] Store in in slot 0x4
7,152,129 UART: [art] Derive Key Pair
7,152,489 UART: [art] Store priv key in slot 0x5
7,165,659 UART: [art] Derive Key Pair - Done
7,179,923 UART: [art] Signing Cert with AUTHO
7,180,403 UART: RITY.KEYID = 7
7,195,191 UART: [art] Erasing AUTHORITY.KEYID = 7
7,195,956 UART: [art] PUB.X = D36DC4BBBDD5897AEC0EE72F630D64B2BB4D3F9E1743AD3F620778D51CB86BBFB72D7F5971B5F992F3C48920E62B3C6E
7,202,737 UART: [art] PUB.Y = 999579A5ADE9B7BA77E223AA28FFE4BE2D29AFC4AA35AFA2E35A0D6CCFDFA8ABB498ECD1A3F7AC9BA2819D33A9663D48
7,209,718 UART: [art] SIG.R = E0D366E2690617613D1604877BD7F5B78BEA370C44DFDF138AE838D4D890F360DD9903D00488A41D400953C4B3C2F912
7,216,468 UART: [art] SIG.S = 8224D0F83CF23996948C6CA22C70036335D052BBDD9F7611F8F0B36F05B4176B562D871A0152E2A3482D7AB8015DC49A
7,240,355 UART: Caliptra RT
7,240,700 UART: [state] CFI Enabled
7,518,584 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,549,455 UART: [rt]cmd =0x41545348, len=116
7,571,616 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,518 ready_for_fw is high
1,362,518 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,241 >>> mbox cmd response: success
2,991,235 UART:
2,991,251 UART: Running Caliptra FMC ...
2,991,659 UART:
2,991,802 UART: [state] CFI Enabled
3,002,633 UART: [fht] FMC Alias Private Key: 7
3,110,506 UART: [art] Extend RT PCRs Done
3,110,934 UART: [art] Lock RT PCRs Done
3,112,458 UART: [art] Populate DV Done
3,120,689 UART: [fht] FMC Alias Private Key: 7
3,121,709 UART: [art] Derive CDI
3,121,989 UART: [art] Store in in slot 0x4
3,207,448 UART: [art] Derive Key Pair
3,207,808 UART: [art] Store priv key in slot 0x5
3,221,524 UART: [art] Derive Key Pair - Done
3,236,386 UART: [art] Signing Cert with AUTHO
3,236,866 UART: RITY.KEYID = 7
3,252,044 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,809 UART: [art] PUB.X = F0FB3306E27D5C73466F0433A8643235826B21F652268A94C1FFA76EEE839A9C0988CB992853718DBBA7676538E6B538
3,259,564 UART: [art] PUB.Y = AD36F6C7B352835C5774ACA85CC3690117E2C0EB09BA015D13A769113AD9A1EC0EBCB0D776D29178E69530C61C6E3AB4
3,266,512 UART: [art] SIG.R = CED029476D8AB68E65CE175038E0C5D9D63ABA8C71D33DBCC16E37242D9A9348DCABFF7929CDC55CB83773259FBF7551
3,273,298 UART: [art] SIG.S = A71CA5013FF2F9C6DB22347179B1410813A128D736DF2AB78E49392264D413699C296DC2F899CC85FAB5F4AC4D4B248D
3,297,159 UART: Caliptra RT
3,297,504 UART: [state] CFI Enabled
3,406,086 UART: [rt] RT listening for mailbox commands...
3,406,756 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,606 UART: [rt]cmd =0x41544d4e, len=14344
3,839,446 >>> mbox cmd response data (8 bytes)
3,839,447 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,869,662 UART: [rt]cmd =0x41545348, len=116
3,892,113 >>> mbox cmd response data (12 bytes)
3,892,114 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,655,694 >>> mbox cmd response: success
6,655,694 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,669,377 UART:
6,669,393 UART: Running Caliptra FMC ...
6,669,801 UART:
6,669,944 UART: [state] CFI Enabled
6,758,369 UART: [art] Extend RT PCRs Done
6,758,797 UART: [art] Lock RT PCRs Done
6,759,790 UART: [art] Populate DV Done
6,767,795 UART: [fht] FMC Alias Private Key: 7
6,768,799 UART: [art] Derive CDI
6,769,079 UART: [art] Store in in slot 0x4
6,855,182 UART: [art] Derive Key Pair
6,855,542 UART: [art] Store priv key in slot 0x5
6,868,868 UART: [art] Derive Key Pair - Done
6,883,608 UART: [art] Signing Cert with AUTHO
6,884,088 UART: RITY.KEYID = 7
6,899,538 UART: [art] Erasing AUTHORITY.KEYID = 7
6,900,303 UART: [art] PUB.X = E65B98FB74A60B850C15BFA5E2E1C65ABA6B18DE9A6AD841C7F3B2E4DD33255E7DEFF3B4BFD5394F2B28252DC6E18D60
6,907,091 UART: [art] PUB.Y = 8C895ADE628F6EB96BF62C09DAEA24E2DE60D286323C49437FF7D517BE9F70D527C68B7ED1EDBC9F23C1F36D5A365E24
6,914,056 UART: [art] SIG.R = 757FF3FB2B4A07CF504C7F0E3F6F8A343C0D5E5B89390D5935E53ECF3610CE9415FFFAC4AFE6991EA771EED112F6E185
6,920,832 UART: [art] SIG.S = E09FB97F2279557413EE9525589B0512DC44907E7AA27EC1FF83F2D7CB85654157AA2DF0E04A866774C3F223D5106E4C
6,944,738 UART: Caliptra RT
6,945,083 UART: [state] CFI Enabled
7,229,074 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,259,981 UART: [rt]cmd =0x41545348, len=116
7,281,282 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
893,232 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,357 UART: [kat] ++
897,509 UART: [kat] sha1
901,543 UART: [kat] SHA2-256
903,483 UART: [kat] SHA2-384
906,334 UART: [kat] SHA2-512-ACC
908,235 UART: [kat] ECC-384
918,336 UART: [kat] HMAC-384Kdf
922,850 UART: [kat] LMS
1,171,178 UART: [kat] --
1,171,813 UART: [cold-reset] ++
1,172,217 UART: [fht] FHT @ 0x50003400
1,174,908 UART: [idev] ++
1,175,076 UART: [idev] CDI.KEYID = 6
1,175,436 UART: [idev] SUBJECT.KEYID = 7
1,175,860 UART: [idev] UDS.KEYID = 0
1,176,205 ready_for_fw is high
1,176,205 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,664 UART: [idev] Erasing UDS.KEYID = 0
1,200,701 UART: [idev] Sha1 KeyId Algorithm
1,209,197 UART: [idev] --
1,210,395 UART: [ldev] ++
1,210,563 UART: [ldev] CDI.KEYID = 6
1,210,926 UART: [ldev] SUBJECT.KEYID = 5
1,211,352 UART: [ldev] AUTHORITY.KEYID = 7
1,211,815 UART: [ldev] FE.KEYID = 1
1,217,167 UART: [ldev] Erasing FE.KEYID = 1
1,243,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,439 UART: [ldev] --
1,282,744 UART: [fwproc] Wait for Commands...
1,283,412 UART: [fwproc] Recv command 0x46574c44
1,284,140 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,540 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,844 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,677 >>> mbox cmd response: success
2,774,725 UART: [afmc] ++
2,774,893 UART: [afmc] CDI.KEYID = 6
2,775,255 UART: [afmc] SUBJECT.KEYID = 7
2,775,680 UART: [afmc] AUTHORITY.KEYID = 5
2,810,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,168 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,896 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,781 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,500 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,528 UART: [afmc] --
2,854,412 UART: [cold-reset] --
2,855,228 UART: [state] Locking Datavault
2,856,357 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,961 UART: [state] Locking ICCM
2,857,429 UART: [exit] Launching FMC @ 0x40000130
2,862,758 UART:
2,862,774 UART: Running Caliptra FMC ...
2,863,182 UART:
2,863,236 UART: [state] CFI Enabled
2,873,847 UART: [fht] FMC Alias Private Key: 7
2,981,184 UART: [art] Extend RT PCRs Done
2,981,612 UART: [art] Lock RT PCRs Done
2,983,382 UART: [art] Populate DV Done
2,991,859 UART: [fht] FMC Alias Private Key: 7
2,992,821 UART: [art] Derive CDI
2,993,101 UART: [art] Store in in slot 0x4
3,078,436 UART: [art] Derive Key Pair
3,078,796 UART: [art] Store priv key in slot 0x5
3,091,738 UART: [art] Derive Key Pair - Done
3,106,480 UART: [art] Signing Cert with AUTHO
3,106,960 UART: RITY.KEYID = 7
3,122,666 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,431 UART: [art] PUB.X = A525E345E13E09889E27260C26FEC4C826CED1270F3E87AE280C3A9B40EF5C3418DF05E71243AD297079BD8B35D84967
3,130,188 UART: [art] PUB.Y = 6D9F7211BBF398E294EC520083DFE6863A5C154239E29490AAFE5DCF0EBA6DA58C45908F6AF2C9EECD5A08DE33EEEFA3
3,137,134 UART: [art] SIG.R = 46BB5E7FC1CDACBAB8754CFCB09A5CA3C47C6BCEB0470CDBE7259C54FFC9832047B2D945B2B6199732E5BA6C9D60E346
3,143,925 UART: [art] SIG.S = 5DFAB94F47EC555A4E8678C9128B6524F92307F4F53B9AC705A285F47C1F7BAA781A413AB72A6D84893448429CE49B5D
3,167,370 UART: Caliptra RT
3,167,623 UART: [state] CFI Enabled
3,274,824 UART: [rt] RT listening for mailbox commands...
3,275,494 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,504 UART: [rt]cmd =0x41544d4e, len=14344
3,708,446 >>> mbox cmd response data (8 bytes)
3,708,447 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,660 UART: [rt]cmd =0x41545348, len=116
3,759,975 >>> mbox cmd response data (12 bytes)
3,759,976 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,765 UART:
3,760,781 UART: Running Caliptra ROM ...
3,761,189 UART:
3,761,244 UART: [state] CFI Enabled
3,763,924 UART: [state] LifecycleState = Unprovisioned
3,764,579 UART: [state] DebugLocked = No
3,765,307 UART: [state] WD Timer not started. Device not locked for debugging
3,766,663 UART: [kat] SHA2-256
4,572,313 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,576,438 UART: [kat] ++
4,576,590 UART: [kat] sha1
4,580,900 UART: [kat] SHA2-256
4,582,840 UART: [kat] SHA2-384
4,585,449 UART: [kat] SHA2-512-ACC
4,587,349 UART: [kat] ECC-384
4,596,460 UART: [kat] HMAC-384Kdf
4,601,072 UART: [kat] LMS
4,849,400 UART: [kat] --
4,850,114 UART: [update-reset] ++
6,163,484 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,164,463 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,314,287 >>> mbox cmd response: success
6,314,287 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,314,526 UART: [update-reset] Copying MAN_2 To MAN_1
6,322,540 UART: [update-reset Success] --
6,323,533 UART: [state] Locking Datavault
6,324,295 UART: [state] Locking PCR0, PCR1 and PCR31
6,324,899 UART: [state] Locking ICCM
6,325,341 UART: [exit] Launching FMC @ 0x40000130
6,330,670 UART:
6,330,686 UART: Running Caliptra FMC ...
6,331,094 UART:
6,331,148 UART: [state] CFI Enabled
6,419,915 UART: [art] Extend RT PCRs Done
6,420,343 UART: [art] Lock RT PCRs Done
6,421,478 UART: [art] Populate DV Done
6,429,603 UART: [fht] FMC Alias Private Key: 7
6,430,755 UART: [art] Derive CDI
6,431,035 UART: [art] Store in in slot 0x4
6,516,596 UART: [art] Derive Key Pair
6,516,956 UART: [art] Store priv key in slot 0x5
6,530,606 UART: [art] Derive Key Pair - Done
6,545,338 UART: [art] Signing Cert with AUTHO
6,545,818 UART: RITY.KEYID = 7
6,561,200 UART: [art] Erasing AUTHORITY.KEYID = 7
6,561,965 UART: [art] PUB.X = 41BEB860AA920BBA9EBCFAEFE889CEEF3DFF7CAD030294CE0F813D41B308B8EE608044489ED2D924730A528CFB5228E2
6,568,739 UART: [art] PUB.Y = F639AA11CA63FE13886552E03A9405163F8282CB660D95B25DA651E83CB3470EFB3CCF2BBD7D9666A775B29FC493FAA8
6,575,690 UART: [art] SIG.R = 549384BFBF7F895C534C2DA2DE5B9DE6B3F600177B5D0EC06596143CA2BEABE220B871445AFC25416935CDB522540AB0
6,582,442 UART: [art] SIG.S = 8C6D23558385DE2ABD1AC6BE3B9EAC943FB532B47AFFB7A8EF83EEDD5DC60BD86EBE77F6404405F5FB5D66432E4BBA68
6,606,299 UART: Caliptra RT
6,606,552 UART: [state] CFI Enabled
6,893,141 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,923,750 UART: [rt]cmd =0x41545348, len=116
6,946,263 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,095 ready_for_fw is high
1,060,095 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,104 >>> mbox cmd response: success
2,687,950 UART:
2,687,966 UART: Running Caliptra FMC ...
2,688,374 UART:
2,688,428 UART: [state] CFI Enabled
2,698,731 UART: [fht] FMC Alias Private Key: 7
2,806,330 UART: [art] Extend RT PCRs Done
2,806,758 UART: [art] Lock RT PCRs Done
2,808,470 UART: [art] Populate DV Done
2,816,871 UART: [fht] FMC Alias Private Key: 7
2,817,949 UART: [art] Derive CDI
2,818,229 UART: [art] Store in in slot 0x4
2,903,800 UART: [art] Derive Key Pair
2,904,160 UART: [art] Store priv key in slot 0x5
2,917,352 UART: [art] Derive Key Pair - Done
2,932,001 UART: [art] Signing Cert with AUTHO
2,932,481 UART: RITY.KEYID = 7
2,947,639 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,404 UART: [art] PUB.X = 52C89DD6DCB2C79BC60290F01C5A961B9E14EF6DC5632305694EEB95BAAEC28958AE548988974C67CD204DAB9FD27336
2,955,178 UART: [art] PUB.Y = 7DCD24148EAF6487705ABE2F78A35EFBB8CCBAB369F11E73445A051AC9143F4FCA369A0F756435236D63383D43723F70
2,962,128 UART: [art] SIG.R = E24FF2F11FCEE44333C137083C50368F7047FC8A052E71B9918943950F9D227B9371D1634E025DBABA698862FD5736D7
2,968,882 UART: [art] SIG.S = B50ED16BD3AE07E90DE25C871E4834EA06EA80A57607BC1889B6054E0059BB949A21E8255BD1F7B0EDF658131207B1CD
2,992,354 UART: Caliptra RT
2,992,607 UART: [state] CFI Enabled
3,099,169 UART: [rt] RT listening for mailbox commands...
3,099,839 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,863 UART: [rt]cmd =0x41544d4e, len=14344
3,532,177 >>> mbox cmd response data (8 bytes)
3,532,178 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,279 UART: [rt]cmd =0x41545348, len=116
3,584,054 >>> mbox cmd response data (12 bytes)
3,584,055 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,021,921 >>> mbox cmd response: success
6,021,921 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,035,169 UART:
6,035,185 UART: Running Caliptra FMC ...
6,035,593 UART:
6,035,647 UART: [state] CFI Enabled
6,124,352 UART: [art] Extend RT PCRs Done
6,124,780 UART: [art] Lock RT PCRs Done
6,125,929 UART: [art] Populate DV Done
6,134,220 UART: [fht] FMC Alias Private Key: 7
6,135,276 UART: [art] Derive CDI
6,135,556 UART: [art] Store in in slot 0x4
6,221,201 UART: [art] Derive Key Pair
6,221,561 UART: [art] Store priv key in slot 0x5
6,235,447 UART: [art] Derive Key Pair - Done
6,250,141 UART: [art] Signing Cert with AUTHO
6,250,621 UART: RITY.KEYID = 7
6,265,785 UART: [art] Erasing AUTHORITY.KEYID = 7
6,266,550 UART: [art] PUB.X = 01DB9A455DDFC1989A328FFCEF9FA9ED209AB7C1A8675A01F645BA2E10EA813B740E89045669336542A4D084C20A4578
6,273,311 UART: [art] PUB.Y = 12CA21EEE5373544879F85010641DCB195CB05D0D8A14998C0C5446805D9D69A7ABCCDB47C8E4D243474EA2E0D787BEB
6,280,254 UART: [art] SIG.R = 59C3567AB9241AC839B551859DEBCDCF19481852F5196BC4B3CC32E29E170168F465EFCC75F7F1A8A750B827517AE92A
6,287,027 UART: [art] SIG.S = 97B396F04D7E1D0C0EC51231B55AD883B88F7456BC1CADD52D6541332CE4D27D0017572FA87A6CAE3F056605F166961D
6,311,546 UART: Caliptra RT
6,311,799 UART: [state] CFI Enabled
6,591,790 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,622,825 UART: [rt]cmd =0x41545348, len=116
6,644,434 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
893,507 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,632 UART: [kat] ++
897,784 UART: [kat] sha1
901,916 UART: [kat] SHA2-256
903,856 UART: [kat] SHA2-384
906,663 UART: [kat] SHA2-512-ACC
908,564 UART: [kat] ECC-384
918,435 UART: [kat] HMAC-384Kdf
923,185 UART: [kat] LMS
1,171,513 UART: [kat] --
1,172,322 UART: [cold-reset] ++
1,172,890 UART: [fht] FHT @ 0x50003400
1,175,611 UART: [idev] ++
1,175,779 UART: [idev] CDI.KEYID = 6
1,176,139 UART: [idev] SUBJECT.KEYID = 7
1,176,563 UART: [idev] UDS.KEYID = 0
1,176,908 ready_for_fw is high
1,176,908 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,479 UART: [idev] Erasing UDS.KEYID = 0
1,201,734 UART: [idev] Sha1 KeyId Algorithm
1,210,184 UART: [idev] --
1,211,148 UART: [ldev] ++
1,211,316 UART: [ldev] CDI.KEYID = 6
1,211,679 UART: [ldev] SUBJECT.KEYID = 5
1,212,105 UART: [ldev] AUTHORITY.KEYID = 7
1,212,568 UART: [ldev] FE.KEYID = 1
1,218,070 UART: [ldev] Erasing FE.KEYID = 1
1,244,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,580 UART: [ldev] --
1,284,041 UART: [fwproc] Wait for Commands...
1,284,639 UART: [fwproc] Recv command 0x46574c44
1,285,367 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,359 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,663 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,392 >>> mbox cmd response: success
2,777,402 UART: [afmc] ++
2,777,570 UART: [afmc] CDI.KEYID = 6
2,777,932 UART: [afmc] SUBJECT.KEYID = 7
2,778,357 UART: [afmc] AUTHORITY.KEYID = 5
2,814,402 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,663 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,391 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,276 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,995 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,871 UART: [afmc] --
2,857,961 UART: [cold-reset] --
2,858,945 UART: [state] Locking Datavault
2,860,060 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,664 UART: [state] Locking ICCM
2,861,092 UART: [exit] Launching FMC @ 0x40000130
2,866,421 UART:
2,866,437 UART: Running Caliptra FMC ...
2,866,845 UART:
2,866,988 UART: [state] CFI Enabled
2,877,585 UART: [fht] FMC Alias Private Key: 7
2,985,942 UART: [art] Extend RT PCRs Done
2,986,370 UART: [art] Lock RT PCRs Done
2,988,322 UART: [art] Populate DV Done
2,996,335 UART: [fht] FMC Alias Private Key: 7
2,997,267 UART: [art] Derive CDI
2,997,547 UART: [art] Store in in slot 0x4
3,083,412 UART: [art] Derive Key Pair
3,083,772 UART: [art] Store priv key in slot 0x5
3,096,446 UART: [art] Derive Key Pair - Done
3,111,585 UART: [art] Signing Cert with AUTHO
3,112,065 UART: RITY.KEYID = 7
3,127,321 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,086 UART: [art] PUB.X = 6138F74B0BBAACB1CF131DB791FC33B7B189319AB901A5F05F88B51A4844E35B35865A067AFFFE8C11E3B8C836E6B5CF
3,134,863 UART: [art] PUB.Y = 4DECE8164B5BF58B6EF0D9C01579961CE752A23BEA59CAB59231E94F79DD82E665D6870503EFD3AF75391B135898D213
3,141,813 UART: [art] SIG.R = 7E35021B86A6A6B33B1C570A83ED0D4ACF758F2FC7FB4CDB02C6F000D2BFE3D55F50DA5DE19C09EA250B4BB9D8608EBD
3,148,569 UART: [art] SIG.S = 167914ACE6D9E45FE05DC9C2EAA58C9D9B99FADBD7DFD34A6C35467CB39482E6408FA8A53B2AE645AEF92F9DB1812017
3,173,304 UART: Caliptra RT
3,173,649 UART: [state] CFI Enabled
3,281,598 UART: [rt] RT listening for mailbox commands...
3,282,268 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,118 UART: [rt]cmd =0x41544d4e, len=14344
3,714,562 >>> mbox cmd response data (8 bytes)
3,714,563 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,744,742 UART: [rt]cmd =0x41545348, len=116
3,767,301 >>> mbox cmd response data (12 bytes)
3,767,302 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,971 UART:
3,767,987 UART: Running Caliptra ROM ...
3,768,395 UART:
3,768,537 UART: [state] CFI Enabled
3,771,499 UART: [state] LifecycleState = Unprovisioned
3,772,154 UART: [state] DebugLocked = No
3,772,698 UART: [state] WD Timer not started. Device not locked for debugging
3,773,830 UART: [kat] SHA2-256
4,579,480 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,583,605 UART: [kat] ++
4,583,757 UART: [kat] sha1
4,588,043 UART: [kat] SHA2-256
4,589,983 UART: [kat] SHA2-384
4,592,748 UART: [kat] SHA2-512-ACC
4,594,648 UART: [kat] ECC-384
4,604,605 UART: [kat] HMAC-384Kdf
4,609,289 UART: [kat] LMS
4,857,617 UART: [kat] --
4,858,493 UART: [update-reset] ++
6,170,943 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,172,134 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,321,958 >>> mbox cmd response: success
6,321,958 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,322,265 UART: [update-reset] Copying MAN_2 To MAN_1
6,330,279 UART: [update-reset Success] --
6,331,470 UART: [state] Locking Datavault
6,332,156 UART: [state] Locking PCR0, PCR1 and PCR31
6,332,760 UART: [state] Locking ICCM
6,333,420 UART: [exit] Launching FMC @ 0x40000130
6,338,749 UART:
6,338,765 UART: Running Caliptra FMC ...
6,339,173 UART:
6,339,316 UART: [state] CFI Enabled
6,428,755 UART: [art] Extend RT PCRs Done
6,429,183 UART: [art] Lock RT PCRs Done
6,430,376 UART: [art] Populate DV Done
6,438,481 UART: [fht] FMC Alias Private Key: 7
6,439,473 UART: [art] Derive CDI
6,439,753 UART: [art] Store in in slot 0x4
6,525,170 UART: [art] Derive Key Pair
6,525,530 UART: [art] Store priv key in slot 0x5
6,538,770 UART: [art] Derive Key Pair - Done
6,553,833 UART: [art] Signing Cert with AUTHO
6,554,313 UART: RITY.KEYID = 7
6,569,085 UART: [art] Erasing AUTHORITY.KEYID = 7
6,569,850 UART: [art] PUB.X = C68B2B224AC986EC6730C7296E947D160B8A021B340AD61E7E3A2568923D779EB5C17FFC22E5F9EDFD240E1D6F2EC1FF
6,576,622 UART: [art] PUB.Y = FB728B7F45147B6216AF104264A79C918A68BACC4F17DAC37FDAAC96C5C703DF26759BB037216E61048F9D3D91316814
6,583,570 UART: [art] SIG.R = 087FB1D9E90CD491F41949B76E010CBE7ECF4C43DCB29A1BF177E61379B6762BD987793B0CF5F902560B34E389EFA1BC
6,590,331 UART: [art] SIG.S = C98685606872A34C83D1D67D477043E0C492F47C0D1688934C9FB98B82A9AA92DA887849533856F013678FE49E818EB0
6,614,223 UART: Caliptra RT
6,614,568 UART: [state] CFI Enabled
6,898,575 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,929,732 UART: [rt]cmd =0x41545348, len=116
6,951,603 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,202 ready_for_fw is high
1,061,202 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,799 >>> mbox cmd response: success
2,690,487 UART:
2,690,503 UART: Running Caliptra FMC ...
2,690,911 UART:
2,691,054 UART: [state] CFI Enabled
2,701,763 UART: [fht] FMC Alias Private Key: 7
2,809,636 UART: [art] Extend RT PCRs Done
2,810,064 UART: [art] Lock RT PCRs Done
2,811,600 UART: [art] Populate DV Done
2,819,805 UART: [fht] FMC Alias Private Key: 7
2,820,753 UART: [art] Derive CDI
2,821,033 UART: [art] Store in in slot 0x4
2,906,686 UART: [art] Derive Key Pair
2,907,046 UART: [art] Store priv key in slot 0x5
2,920,602 UART: [art] Derive Key Pair - Done
2,935,709 UART: [art] Signing Cert with AUTHO
2,936,189 UART: RITY.KEYID = 7
2,951,359 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,124 UART: [art] PUB.X = CFC84E7D0DB65023885FF7C315386DD8AF170B8FF61EA4396C0C55A3A14D8C8D2BC391C0CDBFA8C43225037876DA52B6
2,958,896 UART: [art] PUB.Y = D4D33A28526621A14C0C483CEFE6C5BE4DEEC6FF4CE16A189D18827106E96BBDD2811FBA23E7F629FE9912D7C9AA3FDB
2,965,862 UART: [art] SIG.R = 2052A363CFC3CFB7FECED4E1714A5560372804891149857E2300A2938188AA2C0B3B575B14BB061813AD14F4E04AB957
2,972,599 UART: [art] SIG.S = 5F78373F417878D00CD8A5320982354F107C36D75BCC3415C7FA48FCA9C232F280D8B37E22BE385E8ED5A87DD68CF56E
2,995,952 UART: Caliptra RT
2,996,297 UART: [state] CFI Enabled
3,104,454 UART: [rt] RT listening for mailbox commands...
3,105,124 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,328 UART: [rt]cmd =0x41544d4e, len=14344
3,538,630 >>> mbox cmd response data (8 bytes)
3,538,631 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,568,590 UART: [rt]cmd =0x41545348, len=116
3,590,901 >>> mbox cmd response data (12 bytes)
3,590,902 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,029,757 >>> mbox cmd response: success
6,029,757 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,043,141 UART:
6,043,157 UART: Running Caliptra FMC ...
6,043,565 UART:
6,043,708 UART: [state] CFI Enabled
6,133,161 UART: [art] Extend RT PCRs Done
6,133,589 UART: [art] Lock RT PCRs Done
6,134,930 UART: [art] Populate DV Done
6,143,325 UART: [fht] FMC Alias Private Key: 7
6,144,423 UART: [art] Derive CDI
6,144,703 UART: [art] Store in in slot 0x4
6,230,692 UART: [art] Derive Key Pair
6,231,052 UART: [art] Store priv key in slot 0x5
6,244,118 UART: [art] Derive Key Pair - Done
6,258,808 UART: [art] Signing Cert with AUTHO
6,259,288 UART: RITY.KEYID = 7
6,274,906 UART: [art] Erasing AUTHORITY.KEYID = 7
6,275,671 UART: [art] PUB.X = 2899621C007D03B3F6D270003EA2F7CAF430FDB5830FF4251B83DE78100FEC1A01EE1628D32C5C95B3CA523A5AAAF5CB
6,282,399 UART: [art] PUB.Y = FDF613D9887C52694418FA559BFD5CF126E12150728F2606A45E088C72C28F99C8D01EBB65CCC93508CAA69081434D2C
6,289,342 UART: [art] SIG.R = 7A46E5DC2DC2DAE415D7D7EDCCFD138836CB37A6101D6371DFACF2656657BF291182EEDEC07CFEA6F3F530EE8098EDB6
6,296,138 UART: [art] SIG.S = 9BC2656A8B8B5288F0E3FA7DB3AD65F9D755A24645458CD04AFBAEE5112922E82530B013483A2FE37AEC926F3D456DFC
6,320,037 UART: Caliptra RT
6,320,382 UART: [state] CFI Enabled
6,606,323 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,637,288 UART: [rt]cmd =0x41545348, len=116
6,659,055 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,155 UART: [kat] ++
895,307 UART: [kat] sha1
899,669 UART: [kat] SHA2-256
901,609 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
916,110 UART: [kat] HMAC-384Kdf
920,668 UART: [kat] LMS
1,168,980 UART: [kat] --
1,169,715 UART: [cold-reset] ++
1,170,253 UART: [fht] FHT @ 0x50003400
1,172,865 UART: [idev] ++
1,173,033 UART: [idev] CDI.KEYID = 6
1,173,394 UART: [idev] SUBJECT.KEYID = 7
1,173,819 UART: [idev] UDS.KEYID = 0
1,174,165 ready_for_fw is high
1,174,165 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,945 UART: [idev] Erasing UDS.KEYID = 0
1,198,577 UART: [idev] Sha1 KeyId Algorithm
1,207,671 UART: [idev] --
1,208,650 UART: [ldev] ++
1,208,818 UART: [ldev] CDI.KEYID = 6
1,209,182 UART: [ldev] SUBJECT.KEYID = 5
1,209,609 UART: [ldev] AUTHORITY.KEYID = 7
1,210,072 UART: [ldev] FE.KEYID = 1
1,215,310 UART: [ldev] Erasing FE.KEYID = 1
1,241,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,110 UART: [ldev] --
1,280,612 UART: [fwproc] Wait for Commands...
1,281,361 UART: [fwproc] Recv command 0x46574c44
1,282,094 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,218 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,527 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,407 >>> mbox cmd response: success
2,773,484 UART: [afmc] ++
2,773,652 UART: [afmc] CDI.KEYID = 6
2,774,015 UART: [afmc] SUBJECT.KEYID = 7
2,774,441 UART: [afmc] AUTHORITY.KEYID = 5
2,809,956 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,754 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,505 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,234 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,117 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,836 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,593 UART: [afmc] --
2,853,653 UART: [cold-reset] --
2,854,383 UART: [state] Locking Datavault
2,855,342 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,946 UART: [state] Locking ICCM
2,856,504 UART: [exit] Launching FMC @ 0x40000130
2,861,833 UART:
2,861,849 UART: Running Caliptra FMC ...
2,862,257 UART:
2,862,311 UART: [state] CFI Enabled
2,872,942 UART: [fht] FMC Alias Private Key: 7
2,980,219 UART: [art] Extend RT PCRs Done
2,980,647 UART: [art] Lock RT PCRs Done
2,981,995 UART: [art] Populate DV Done
2,989,952 UART: [fht] FMC Alias Private Key: 7
2,991,008 UART: [art] Derive CDI
2,991,288 UART: [art] Store in in slot 0x4
3,077,077 UART: [art] Derive Key Pair
3,077,437 UART: [art] Store priv key in slot 0x5
3,090,995 UART: [art] Derive Key Pair - Done
3,105,376 UART: [art] Signing Cert with AUTHO
3,105,856 UART: RITY.KEYID = 7
3,120,480 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,245 UART: [art] PUB.X = A8697CB3380EEECBD869A11441C2EDD80CB26F23796CF27F05923DCFF4A508E76106A7CB386B2DE8A58B6D4065B079B2
3,128,012 UART: [art] PUB.Y = 88DB4FFF32751AD9BAA97275433F67B7F1BB00CB110DAE97754FAC20025880ECE9F67B6B1C53EE375B13480D0626EF1B
3,134,940 UART: [art] SIG.R = 1E5C9B87C6914DA14774E5D5B7B2E09278318BFA0738A503B419890E8D148F2883F05684E32B5B2C01ED81FEF44D4B31
3,141,698 UART: [art] SIG.S = FB96D3B6CA48AC1B57AB9C6B4B94C4146B5DB0C2E7213E50E5226C5B130AE06DBD959A6FCBCD39DA0B8205C077698BC5
3,164,946 UART: Caliptra RT
3,165,199 UART: [state] CFI Enabled
3,272,636 UART: [rt] RT listening for mailbox commands...
3,273,306 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,144 UART: [rt]cmd =0x41544d4e, len=14344
3,705,798 >>> mbox cmd response data (8 bytes)
3,705,799 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,164 UART: [rt]cmd =0x41545348, len=116
3,757,327 >>> mbox cmd response data (12 bytes)
3,757,328 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,207 UART:
3,758,223 UART: Running Caliptra ROM ...
3,758,631 UART:
3,758,686 UART: [state] CFI Enabled
3,761,262 UART: [state] LifecycleState = Unprovisioned
3,761,917 UART: [state] DebugLocked = No
3,762,409 UART: [state] WD Timer not started. Device not locked for debugging
3,763,527 UART: [kat] SHA2-256
4,567,077 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,571,206 UART: [kat] ++
4,571,358 UART: [kat] sha1
4,575,670 UART: [kat] SHA2-256
4,577,610 UART: [kat] SHA2-384
4,580,445 UART: [kat] SHA2-512-ACC
4,582,345 UART: [kat] ECC-384
4,591,682 UART: [kat] HMAC-384Kdf
4,596,338 UART: [kat] LMS
4,844,650 UART: [kat] --
4,845,526 UART: [update-reset] ++
6,158,827 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,159,990 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,309,814 >>> mbox cmd response: success
6,309,814 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,310,093 UART: [update-reset] Copying MAN_2 To MAN_1
6,318,107 UART: [update-reset Success] --
6,318,882 UART: [state] Locking Datavault
6,319,578 UART: [state] Locking PCR0, PCR1 and PCR31
6,320,182 UART: [state] Locking ICCM
6,320,782 UART: [exit] Launching FMC @ 0x40000130
6,326,111 UART:
6,326,127 UART: Running Caliptra FMC ...
6,326,535 UART:
6,326,589 UART: [state] CFI Enabled
6,415,128 UART: [art] Extend RT PCRs Done
6,415,556 UART: [art] Lock RT PCRs Done
6,417,017 UART: [art] Populate DV Done
6,425,206 UART: [fht] FMC Alias Private Key: 7
6,426,204 UART: [art] Derive CDI
6,426,484 UART: [art] Store in in slot 0x4
6,512,195 UART: [art] Derive Key Pair
6,512,555 UART: [art] Store priv key in slot 0x5
6,525,365 UART: [art] Derive Key Pair - Done
6,540,045 UART: [art] Signing Cert with AUTHO
6,540,525 UART: RITY.KEYID = 7
6,555,699 UART: [art] Erasing AUTHORITY.KEYID = 7
6,556,464 UART: [art] PUB.X = 05787E5D37F28769A8E8D006D4EB8123E7C65C3C4917C2AC5037B08FF526EA0F16826B3A868A18AAF6F3CBC7DE42D372
6,563,233 UART: [art] PUB.Y = FD53B4EA9D025F0F0EDB36989651D5F73AE5750076671468B8F9A7133E03A343AA1205078C4ABE65354E5A57379CAF6A
6,570,145 UART: [art] SIG.R = F5C840607D45089B26C776771E1032F2778A5407B1EB66A36E2F3FD2B73E9244C4B73043FC8CBC5787B9276B01D37E16
6,576,902 UART: [art] SIG.S = 4CF7573896847416957A916C2C09541495137317B577D7DD79DE4655CA48CF92A8115B8237A171362283CBF825EFA326
6,601,050 UART: Caliptra RT
6,601,303 UART: [state] CFI Enabled
6,882,620 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,913,583 UART: [rt]cmd =0x41545348, len=116
6,936,362 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,636 ready_for_fw is high
1,056,636 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,829 >>> mbox cmd response: success
2,684,615 UART:
2,684,631 UART: Running Caliptra FMC ...
2,685,039 UART:
2,685,093 UART: [state] CFI Enabled
2,695,738 UART: [fht] FMC Alias Private Key: 7
2,804,123 UART: [art] Extend RT PCRs Done
2,804,551 UART: [art] Lock RT PCRs Done
2,806,083 UART: [art] Populate DV Done
2,814,448 UART: [fht] FMC Alias Private Key: 7
2,815,552 UART: [art] Derive CDI
2,815,832 UART: [art] Store in in slot 0x4
2,901,753 UART: [art] Derive Key Pair
2,902,113 UART: [art] Store priv key in slot 0x5
2,914,959 UART: [art] Derive Key Pair - Done
2,929,987 UART: [art] Signing Cert with AUTHO
2,930,467 UART: RITY.KEYID = 7
2,945,633 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,398 UART: [art] PUB.X = 320A2E31123D40B31392255238FCA6DB0CE0C96CABF14E985DB1E209E1230138A90D4A73AF30C271558E89BD44E9E308
2,953,152 UART: [art] PUB.Y = F9B7F92B162AC4E8A7DF55C8F600CCD0C83FCA24D2EEF1760DFACCD09F84925223523BB6EECAEBF6F441CC8ADD9D86E1
2,960,109 UART: [art] SIG.R = 1A880EAC63251C6764A854F488BD1168EAC86B025A3E91EAE3F32375BED806BCF3294396A1FF077EB8C3ED04CE8EA4A9
2,966,878 UART: [art] SIG.S = 8DA1EB7A8F28A674A857755E56E81CE98B5020E2AC17B93999DACF9155B80C582422E19A89A320686711DA092E655ED0
2,990,529 UART: Caliptra RT
2,990,782 UART: [state] CFI Enabled
3,098,389 UART: [rt] RT listening for mailbox commands...
3,099,059 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,833 UART: [rt]cmd =0x41544d4e, len=14344
3,532,385 >>> mbox cmd response data (8 bytes)
3,532,386 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,169 UART: [rt]cmd =0x41545348, len=116
3,584,358 >>> mbox cmd response data (12 bytes)
3,584,359 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,017,184 >>> mbox cmd response: success
6,017,184 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,030,534 UART:
6,030,550 UART: Running Caliptra FMC ...
6,030,958 UART:
6,031,012 UART: [state] CFI Enabled
6,119,673 UART: [art] Extend RT PCRs Done
6,120,101 UART: [art] Lock RT PCRs Done
6,121,170 UART: [art] Populate DV Done
6,129,211 UART: [fht] FMC Alias Private Key: 7
6,130,261 UART: [art] Derive CDI
6,130,541 UART: [art] Store in in slot 0x4
6,216,148 UART: [art] Derive Key Pair
6,216,508 UART: [art] Store priv key in slot 0x5
6,229,492 UART: [art] Derive Key Pair - Done
6,244,405 UART: [art] Signing Cert with AUTHO
6,244,885 UART: RITY.KEYID = 7
6,260,389 UART: [art] Erasing AUTHORITY.KEYID = 7
6,261,154 UART: [art] PUB.X = 9ABEB416068DD26AA6D9FA53971C5094CFEF124A17FB1BEDDBA3FF068D09D51E3BFBA811CC5C8E93071489B57199815A
6,267,930 UART: [art] PUB.Y = 1334506479570502C67BBE79778588D7C333E168EA93C8458DADD6B5D5691D6BCAF92D430A0D8D8ED843DC4A304AA915
6,274,870 UART: [art] SIG.R = A3FBC805E4DF12C5891193EBB2DE38046A12A007103C37C9725C9EF0275DF1CA2FE89A30C463E5CF3E397A563BFA9C99
6,281,643 UART: [art] SIG.S = 5D99DA7FB6E9BA975A55FC2A534CE7336C39095EE34AAEC81224282A1FF466CAE11689EA6FFB65663856FEA067D9FA36
6,305,193 UART: Caliptra RT
6,305,446 UART: [state] CFI Enabled
6,588,119 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,618,984 UART: [rt]cmd =0x41545348, len=116
6,640,607 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,550 UART: [kat] ++
895,702 UART: [kat] sha1
899,840 UART: [kat] SHA2-256
901,780 UART: [kat] SHA2-384
904,449 UART: [kat] SHA2-512-ACC
906,350 UART: [kat] ECC-384
915,971 UART: [kat] HMAC-384Kdf
920,815 UART: [kat] LMS
1,169,127 UART: [kat] --
1,169,940 UART: [cold-reset] ++
1,170,314 UART: [fht] FHT @ 0x50003400
1,172,810 UART: [idev] ++
1,172,978 UART: [idev] CDI.KEYID = 6
1,173,339 UART: [idev] SUBJECT.KEYID = 7
1,173,764 UART: [idev] UDS.KEYID = 0
1,174,110 ready_for_fw is high
1,174,110 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,834 UART: [idev] Erasing UDS.KEYID = 0
1,199,442 UART: [idev] Sha1 KeyId Algorithm
1,208,456 UART: [idev] --
1,209,477 UART: [ldev] ++
1,209,645 UART: [ldev] CDI.KEYID = 6
1,210,009 UART: [ldev] SUBJECT.KEYID = 5
1,210,436 UART: [ldev] AUTHORITY.KEYID = 7
1,210,899 UART: [ldev] FE.KEYID = 1
1,216,051 UART: [ldev] Erasing FE.KEYID = 1
1,242,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,481 UART: [ldev] --
1,281,999 UART: [fwproc] Wait for Commands...
1,282,684 UART: [fwproc] Recv command 0x46574c44
1,283,417 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,437 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,746 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,574 >>> mbox cmd response: success
2,773,627 UART: [afmc] ++
2,773,795 UART: [afmc] CDI.KEYID = 6
2,774,158 UART: [afmc] SUBJECT.KEYID = 7
2,774,584 UART: [afmc] AUTHORITY.KEYID = 5
2,810,523 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,846 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,575 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,458 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,177 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,098 UART: [afmc] --
2,854,192 UART: [cold-reset] --
2,854,916 UART: [state] Locking Datavault
2,856,015 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,619 UART: [state] Locking ICCM
2,857,293 UART: [exit] Launching FMC @ 0x40000130
2,862,622 UART:
2,862,638 UART: Running Caliptra FMC ...
2,863,046 UART:
2,863,189 UART: [state] CFI Enabled
2,874,022 UART: [fht] FMC Alias Private Key: 7
2,982,061 UART: [art] Extend RT PCRs Done
2,982,489 UART: [art] Lock RT PCRs Done
2,984,391 UART: [art] Populate DV Done
2,992,790 UART: [fht] FMC Alias Private Key: 7
2,993,844 UART: [art] Derive CDI
2,994,124 UART: [art] Store in in slot 0x4
3,080,241 UART: [art] Derive Key Pair
3,080,601 UART: [art] Store priv key in slot 0x5
3,093,995 UART: [art] Derive Key Pair - Done
3,108,410 UART: [art] Signing Cert with AUTHO
3,108,890 UART: RITY.KEYID = 7
3,124,262 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,027 UART: [art] PUB.X = 4EDD6C966890C053D5728948E944861660ADFAB920053CC3FABC398394AF55CD55665D5F76856947AD41C404C6948A82
3,131,787 UART: [art] PUB.Y = C78C0A63E3D9958F76DC21E260609FA2070CF6BCEFFC03CF1F1DCA400BE2BFD26E271075A54B3B6DD3565C92378558B0
3,138,736 UART: [art] SIG.R = ED8EC2CF1EB5F7386AC40F3072F2B3F73C78DCA01DDACE93348644907DFCD9D80AD118778B9D8C652E57552D76B2496E
3,145,514 UART: [art] SIG.S = DE538630A2F3C41721AC83723D44FC3E7FDDBE988039110662382F81E35667989D85AE415E8D9063D2F8E3D8B23899B1
3,169,220 UART: Caliptra RT
3,169,565 UART: [state] CFI Enabled
3,277,379 UART: [rt] RT listening for mailbox commands...
3,278,049 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,359 UART: [rt]cmd =0x41544d4e, len=14344
3,711,345 >>> mbox cmd response data (8 bytes)
3,711,346 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,675 UART: [rt]cmd =0x41545348, len=116
3,764,200 >>> mbox cmd response data (12 bytes)
3,764,201 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,332 UART:
3,765,348 UART: Running Caliptra ROM ...
3,765,756 UART:
3,765,898 UART: [state] CFI Enabled
3,768,672 UART: [state] LifecycleState = Unprovisioned
3,769,327 UART: [state] DebugLocked = No
3,769,991 UART: [state] WD Timer not started. Device not locked for debugging
3,771,193 UART: [kat] SHA2-256
4,574,743 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,578,872 UART: [kat] ++
4,579,024 UART: [kat] sha1
4,583,350 UART: [kat] SHA2-256
4,585,290 UART: [kat] SHA2-384
4,588,183 UART: [kat] SHA2-512-ACC
4,590,083 UART: [kat] ECC-384
4,600,292 UART: [kat] HMAC-384Kdf
4,604,866 UART: [kat] LMS
4,853,178 UART: [kat] --
4,854,004 UART: [update-reset] ++
6,166,139 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,167,222 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,317,046 >>> mbox cmd response: success
6,317,046 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,317,171 UART: [update-reset] Copying MAN_2 To MAN_1
6,325,185 UART: [update-reset Success] --
6,326,192 UART: [state] Locking Datavault
6,326,920 UART: [state] Locking PCR0, PCR1 and PCR31
6,327,524 UART: [state] Locking ICCM
6,328,068 UART: [exit] Launching FMC @ 0x40000130
6,333,397 UART:
6,333,413 UART: Running Caliptra FMC ...
6,333,821 UART:
6,333,964 UART: [state] CFI Enabled
6,422,683 UART: [art] Extend RT PCRs Done
6,423,111 UART: [art] Lock RT PCRs Done
6,424,534 UART: [art] Populate DV Done
6,432,823 UART: [fht] FMC Alias Private Key: 7
6,433,965 UART: [art] Derive CDI
6,434,245 UART: [art] Store in in slot 0x4
6,520,144 UART: [art] Derive Key Pair
6,520,504 UART: [art] Store priv key in slot 0x5
6,534,084 UART: [art] Derive Key Pair - Done
6,548,956 UART: [art] Signing Cert with AUTHO
6,549,436 UART: RITY.KEYID = 7
6,564,810 UART: [art] Erasing AUTHORITY.KEYID = 7
6,565,575 UART: [art] PUB.X = DF6EC5F112D8D179926813C577ABB4A2B80D20F3B9E0505CE9481068B389C4005C9A2E40713F11FC04A011DD17BDCD0A
6,572,322 UART: [art] PUB.Y = 898935C673E27C99842A20761222608F4354AFE8D0CBB397772A23124485E72A148C78EF29127BA91A00FC0A9BF2D2A0
6,579,241 UART: [art] SIG.R = 766D74FEDDE4324022234F695A78C67A0B3FB4154E357136D730B678CA5565CD36EA9BCD99416A64D50A89F836A0EBEA
6,586,011 UART: [art] SIG.S = 3E8E8EEC28C7A743368679CD3DA3BDB1D0D4AAFF3F1A12426C42D78D4A86464A1C58C0077AC90310E313AC7AB2AF0EFB
6,609,805 UART: Caliptra RT
6,610,150 UART: [state] CFI Enabled
6,892,765 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,923,526 UART: [rt]cmd =0x41545348, len=116
6,945,565 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,517 ready_for_fw is high
1,056,517 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,302 >>> mbox cmd response: success
2,686,734 UART:
2,686,750 UART: Running Caliptra FMC ...
2,687,158 UART:
2,687,301 UART: [state] CFI Enabled
2,698,024 UART: [fht] FMC Alias Private Key: 7
2,805,947 UART: [art] Extend RT PCRs Done
2,806,375 UART: [art] Lock RT PCRs Done
2,807,799 UART: [art] Populate DV Done
2,816,022 UART: [fht] FMC Alias Private Key: 7
2,816,964 UART: [art] Derive CDI
2,817,244 UART: [art] Store in in slot 0x4
2,902,657 UART: [art] Derive Key Pair
2,903,017 UART: [art] Store priv key in slot 0x5
2,916,761 UART: [art] Derive Key Pair - Done
2,931,566 UART: [art] Signing Cert with AUTHO
2,932,046 UART: RITY.KEYID = 7
2,947,382 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,147 UART: [art] PUB.X = 8B399722E9C48B93FA3DDE4A199207178A7247DFC54693E9A68D3B069DDE75F05A1E039C26C9A2EE185515BBD1B97224
2,954,912 UART: [art] PUB.Y = 7AFBC81C319363FB27C9BA5F7406738CB59019A98CFBC7E31CE8895303B168C659298D63FEE80A3DA6BABCD9BFC210E8
2,961,869 UART: [art] SIG.R = DFE052257546887E816F5D79E2D659049872243605A57B16DDDF5D683E8FE0EBC25418CE60BDBBA1A570D7E2B96485A5
2,968,637 UART: [art] SIG.S = 6A4BFBF56C1012740276867907FDD6FC4A8D360739BEDEFA85CCC8BFC434500EA470E848422F8845E0A487F291C3F1E9
2,992,314 UART: Caliptra RT
2,992,659 UART: [state] CFI Enabled
3,100,666 UART: [rt] RT listening for mailbox commands...
3,101,336 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,388 UART: [rt]cmd =0x41544d4e, len=14344
3,534,432 >>> mbox cmd response data (8 bytes)
3,534,433 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,576 UART: [rt]cmd =0x41545348, len=116
3,585,705 >>> mbox cmd response data (12 bytes)
3,585,706 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,017,552 >>> mbox cmd response: success
6,017,552 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,030,714 UART:
6,030,730 UART: Running Caliptra FMC ...
6,031,138 UART:
6,031,281 UART: [state] CFI Enabled
6,120,242 UART: [art] Extend RT PCRs Done
6,120,670 UART: [art] Lock RT PCRs Done
6,121,967 UART: [art] Populate DV Done
6,130,100 UART: [fht] FMC Alias Private Key: 7
6,131,190 UART: [art] Derive CDI
6,131,470 UART: [art] Store in in slot 0x4
6,216,827 UART: [art] Derive Key Pair
6,217,187 UART: [art] Store priv key in slot 0x5
6,231,131 UART: [art] Derive Key Pair - Done
6,246,072 UART: [art] Signing Cert with AUTHO
6,246,552 UART: RITY.KEYID = 7
6,261,948 UART: [art] Erasing AUTHORITY.KEYID = 7
6,262,713 UART: [art] PUB.X = 1EDBA53671E7EDEA0CA30ECD8AE1C165033A6306303B82BB7D4EBEE99E7A1E8EE5AF0324AB21DDF7B5263345B1DAA907
6,269,489 UART: [art] PUB.Y = 7E7E1BD02F62340529A6B89F0F63B5B698AACFA5B5E69BA540E728EE5B10879B0F6F56F9CA53ADEA3D4DBB746E734198
6,276,446 UART: [art] SIG.R = AE906D550609D9F01C91A3395BE99A97084448CD1E59EE248BDCDB11C9CB88DBFAEE6211BF895764C14A8035DA1485C7
6,283,217 UART: [art] SIG.S = DCFE518F4DFDD3833BF7ED62086439D39B5260C9DB71349CDE17223B19AB945D411405650386BCE9EA60DAD5B10E9588
6,307,330 UART: Caliptra RT
6,307,675 UART: [state] CFI Enabled
6,589,023 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,619,802 UART: [rt]cmd =0x41545348, len=116
6,641,905 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,581 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,211 UART: [kat] SHA2-256
882,142 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,257 UART: [kat] ++
886,409 UART: [kat] sha1
890,735 UART: [kat] SHA2-256
892,673 UART: [kat] SHA2-384
895,378 UART: [kat] SHA2-512-ACC
897,279 UART: [kat] ECC-384
902,814 UART: [kat] HMAC-384Kdf
907,296 UART: [kat] LMS
1,475,492 UART: [kat] --
1,476,259 UART: [cold-reset] ++
1,476,657 UART: [fht] Storing FHT @ 0x50003400
1,479,286 UART: [idev] ++
1,479,454 UART: [idev] CDI.KEYID = 6
1,479,814 UART: [idev] SUBJECT.KEYID = 7
1,480,238 UART: [idev] UDS.KEYID = 0
1,480,583 ready_for_fw is high
1,480,583 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,204 UART: [idev] Erasing UDS.KEYID = 0
1,505,152 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,756 UART: [idev] --
1,514,763 UART: [ldev] ++
1,514,931 UART: [ldev] CDI.KEYID = 6
1,515,294 UART: [ldev] SUBJECT.KEYID = 5
1,515,720 UART: [ldev] AUTHORITY.KEYID = 7
1,516,183 UART: [ldev] FE.KEYID = 1
1,521,179 UART: [ldev] Erasing FE.KEYID = 1
1,547,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,996 UART: [ldev] --
1,586,325 UART: [fwproc] Waiting for Commands...
1,587,140 UART: [fwproc] Received command 0x46574c44
1,587,931 UART: [fwproc] Received Image of size 114332 bytes
2,886,041 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,815 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,167 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,140 >>> mbox cmd response: success
3,080,326 UART: [afmc] ++
3,080,494 UART: [afmc] CDI.KEYID = 6
3,080,856 UART: [afmc] SUBJECT.KEYID = 7
3,081,281 UART: [afmc] AUTHORITY.KEYID = 5
3,115,464 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,478 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,258 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,986 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,871 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,561 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,490 UART: [afmc] --
3,158,594 UART: [cold-reset] --
3,159,424 UART: [state] Locking Datavault
3,160,385 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,989 UART: [state] Locking ICCM
3,161,545 UART: [exit] Launching FMC @ 0x40000130
3,166,874 UART:
3,166,890 UART: Running Caliptra FMC ...
3,167,298 UART:
3,167,352 UART: [state] CFI Enabled
3,177,867 UART: [fht] FMC Alias Private Key: 7
3,286,178 UART: [art] Extend RT PCRs Done
3,286,606 UART: [art] Lock RT PCRs Done
3,288,308 UART: [art] Populate DV Done
3,296,787 UART: [fht] FMC Alias Private Key: 7
3,297,867 UART: [art] Derive CDI
3,298,147 UART: [art] Store in in slot 0x4
3,383,738 UART: [art] Derive Key Pair
3,384,098 UART: [art] Store priv key in slot 0x5
3,397,056 UART: [art] Derive Key Pair - Done
3,411,757 UART: [art] Signing Cert with AUTHO
3,412,237 UART: RITY.KEYID = 7
3,427,399 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,164 UART: [art] PUB.X = 1A719F3B339C02989AD9DCD4724EE693904558DAF565F11EA743695809EB68579AC281A9C0B57B5DDD908B95407B8922
3,434,926 UART: [art] PUB.Y = C764F64A6F5B6C29CB98B0FA87A4A7265BC0FC3D14713B2401CE8A5255B53DD8EA4C3C8F416709EDFFEAB096C4355ABE
3,441,890 UART: [art] SIG.R = D362027D92600E3BA61B2A59BF8313AC55BD87A5EC303E61EA4C38DA01B4086E0BFE33A9E20DC129F6CF0B58A7E357D2
3,448,653 UART: [art] SIG.S = 16C8A30B8610E0431D1607D064C85B844D2A0FBC19FF343E2979D3A874A3A9428D2922190E0E0B84CE0AAE5BB1A2EDA9
3,472,277 UART: Caliptra RT
3,472,530 UART: [state] CFI Enabled
3,581,467 UART: [rt] RT listening for mailbox commands...
3,582,137 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,079 UART: [rt]cmd =0x41544d4e, len=14344
4,015,347 >>> mbox cmd response data (8 bytes)
4,015,348 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,393 UART: [rt]cmd =0x41545348, len=116
4,047,346 >>> mbox cmd response data (12 bytes)
4,047,347 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,048,229 UART:
4,048,245 UART: Running Caliptra ROM ...
4,048,653 UART:
4,048,707 UART: [state] CFI Enabled
4,051,493 UART: [state] LifecycleState = Unprovisioned
4,052,148 UART: [state] DebugLocked = No
4,052,712 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,054,395 UART: [kat] SHA2-256
4,848,326 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,852,441 UART: [kat] ++
4,852,593 UART: [kat] sha1
4,856,833 UART: [kat] SHA2-256
4,858,771 UART: [kat] SHA2-384
4,861,476 UART: [kat] SHA2-512-ACC
4,863,376 UART: [kat] ECC-384
4,868,813 UART: [kat] HMAC-384Kdf
4,873,439 UART: [kat] LMS
5,441,635 UART: [kat] --
5,442,412 UART: [update-reset] ++
6,778,290 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,779,396 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,929,272 >>> mbox cmd response: success
6,929,272 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,929,463 UART: [update-reset] Copying MAN_2 To MAN_1
6,937,477 UART: [update-reset Success] --
6,938,410 UART: [state] Locking Datavault
6,939,296 UART: [state] Locking PCR0, PCR1 and PCR31
6,939,900 UART: [state] Locking ICCM
6,940,558 UART: [exit] Launching FMC @ 0x40000130
6,945,887 UART:
6,945,903 UART: Running Caliptra FMC ...
6,946,311 UART:
6,946,365 UART: [state] CFI Enabled
7,035,158 UART: [art] Extend RT PCRs Done
7,035,586 UART: [art] Lock RT PCRs Done
7,036,877 UART: [art] Populate DV Done
7,045,196 UART: [fht] FMC Alias Private Key: 7
7,046,282 UART: [art] Derive CDI
7,046,562 UART: [art] Store in in slot 0x4
7,132,023 UART: [art] Derive Key Pair
7,132,383 UART: [art] Store priv key in slot 0x5
7,145,331 UART: [art] Derive Key Pair - Done
7,160,003 UART: [art] Signing Cert with AUTHO
7,160,483 UART: RITY.KEYID = 7
7,175,247 UART: [art] Erasing AUTHORITY.KEYID = 7
7,176,012 UART: [art] PUB.X = C9671A51A1B90074DCFFEAD83F9BB08DCBCE2696AB384001B6DF5F33C4D8A0992404777CB954A58522339FF474809FEB
7,182,764 UART: [art] PUB.Y = F8B9E7B235250F476CD5294A7BEB0638E57031F4BE9C2680DB1839FE6F4BC22A4B400CFE121871CDBE4F973FA6D7ED2B
7,189,721 UART: [art] SIG.R = CDE9BE7EC2DA6072150B1647B327648CF00F6F2B7E133D378563FD9FC77ADCCEE912205FEA3C6E95875B68C08241ACD1
7,196,499 UART: [art] SIG.S = 6E3F65402FE8D540D873063FCDACC657920D7BA0FCD34A086FB44A2EA674398D3A919834CFD31CA578494794EB4DD709
7,220,542 UART: Caliptra RT
7,220,795 UART: [state] CFI Enabled
7,503,432 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,534,311 UART: [rt]cmd =0x41545348, len=116
7,536,198 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,347 ready_for_fw is high
1,362,347 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,600 >>> mbox cmd response: success
2,988,438 UART:
2,988,454 UART: Running Caliptra FMC ...
2,988,862 UART:
2,988,916 UART: [state] CFI Enabled
2,999,219 UART: [fht] FMC Alias Private Key: 7
3,107,612 UART: [art] Extend RT PCRs Done
3,108,040 UART: [art] Lock RT PCRs Done
3,109,580 UART: [art] Populate DV Done
3,117,763 UART: [fht] FMC Alias Private Key: 7
3,118,881 UART: [art] Derive CDI
3,119,161 UART: [art] Store in in slot 0x4
3,204,932 UART: [art] Derive Key Pair
3,205,292 UART: [art] Store priv key in slot 0x5
3,218,282 UART: [art] Derive Key Pair - Done
3,233,047 UART: [art] Signing Cert with AUTHO
3,233,527 UART: RITY.KEYID = 7
3,248,325 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,090 UART: [art] PUB.X = AE02B1FBE9A126564611966029901D7F7AC75867AB2B715C88EC2E46C653C42D6F00392CFCB725B12B550F2C2F79274F
3,255,834 UART: [art] PUB.Y = B350C85421E9F557472F5DF0C1152ACAC379CD4F1BBB5009C29985D8A6975F5FD64579FDFC4177F5CB035426FA0CFE8F
3,262,787 UART: [art] SIG.R = 44DF989A6A4A953CC9CE537F248CE761108FD51EC076C0D759ACFB6C9B80E11B4A876DA2A4FA3993BC9ABFA22606B06B
3,269,572 UART: [art] SIG.S = E822FF5B4E71690DB91EFBD4C905ADEBC58C259A5F33E075AAB4CDD777D3D384A13380361BBB3E1CDE6990527BEDCC19
3,293,365 UART: Caliptra RT
3,293,618 UART: [state] CFI Enabled
3,401,739 UART: [rt] RT listening for mailbox commands...
3,402,409 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,665 UART: [rt]cmd =0x41544d4e, len=14344
3,835,477 >>> mbox cmd response data (8 bytes)
3,835,478 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,555 UART: [rt]cmd =0x41545348, len=116
3,867,220 >>> mbox cmd response data (12 bytes)
3,867,221 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,628,400 >>> mbox cmd response: success
6,628,400 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,641,457 UART:
6,641,473 UART: Running Caliptra FMC ...
6,641,881 UART:
6,641,935 UART: [state] CFI Enabled
6,731,382 UART: [art] Extend RT PCRs Done
6,731,810 UART: [art] Lock RT PCRs Done
6,733,181 UART: [art] Populate DV Done
6,741,480 UART: [fht] FMC Alias Private Key: 7
6,742,590 UART: [art] Derive CDI
6,742,870 UART: [art] Store in in slot 0x4
6,828,141 UART: [art] Derive Key Pair
6,828,501 UART: [art] Store priv key in slot 0x5
6,841,257 UART: [art] Derive Key Pair - Done
6,856,345 UART: [art] Signing Cert with AUTHO
6,856,825 UART: RITY.KEYID = 7
6,871,851 UART: [art] Erasing AUTHORITY.KEYID = 7
6,872,616 UART: [art] PUB.X = CC8206072ADA5C8479E3E88C3DC2DB18D16D09FD3D5E00ABA938D35C5D362C521E961F77EA3A9D9654F2D0B5E7D6987C
6,879,369 UART: [art] PUB.Y = EC2F9821ECF9252F0931FD3AFEE5E4B9059D6E681CCFC607E59FE81F72F80772C96E46DC688E58B8F5708075A6FBCBF9
6,886,323 UART: [art] SIG.R = BED24F18BAF237EF53028D9C0F88552EB7D250766F4BB64FCEE7FFDDAFF23601D5FB691EDAF1B2F27284842B60E63289
6,893,102 UART: [art] SIG.S = AC58A988A1DE044DC5EB26A53636B550DB54E75B2EB4169D0572251C5E7B06371C408B037BCC036492093A2CD5FECB79
6,917,147 UART: Caliptra RT
6,917,400 UART: [state] CFI Enabled
7,197,916 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,228,775 UART: [rt]cmd =0x41545348, len=116
7,230,454 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,842 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,362 UART: [kat] SHA2-256
882,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,408 UART: [kat] ++
886,560 UART: [kat] sha1
890,892 UART: [kat] SHA2-256
892,830 UART: [kat] SHA2-384
895,519 UART: [kat] SHA2-512-ACC
897,420 UART: [kat] ECC-384
902,831 UART: [kat] HMAC-384Kdf
907,465 UART: [kat] LMS
1,475,661 UART: [kat] --
1,476,596 UART: [cold-reset] ++
1,476,962 UART: [fht] Storing FHT @ 0x50003400
1,479,741 UART: [idev] ++
1,479,909 UART: [idev] CDI.KEYID = 6
1,480,269 UART: [idev] SUBJECT.KEYID = 7
1,480,693 UART: [idev] UDS.KEYID = 0
1,481,038 ready_for_fw is high
1,481,038 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,859 UART: [idev] Erasing UDS.KEYID = 0
1,505,405 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,023 UART: [idev] --
1,515,140 UART: [ldev] ++
1,515,308 UART: [ldev] CDI.KEYID = 6
1,515,671 UART: [ldev] SUBJECT.KEYID = 5
1,516,097 UART: [ldev] AUTHORITY.KEYID = 7
1,516,560 UART: [ldev] FE.KEYID = 1
1,521,530 UART: [ldev] Erasing FE.KEYID = 1
1,546,911 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,003 UART: [ldev] --
1,586,422 UART: [fwproc] Waiting for Commands...
1,587,193 UART: [fwproc] Received command 0x46574c44
1,587,984 UART: [fwproc] Received Image of size 114332 bytes
2,886,688 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,436 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,788 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,717 >>> mbox cmd response: success
3,079,975 UART: [afmc] ++
3,080,143 UART: [afmc] CDI.KEYID = 6
3,080,505 UART: [afmc] SUBJECT.KEYID = 7
3,080,930 UART: [afmc] AUTHORITY.KEYID = 5
3,115,587 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,847 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,627 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,355 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,240 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,930 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,765 UART: [afmc] --
3,158,791 UART: [cold-reset] --
3,159,513 UART: [state] Locking Datavault
3,160,570 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,174 UART: [state] Locking ICCM
3,161,634 UART: [exit] Launching FMC @ 0x40000130
3,166,963 UART:
3,166,979 UART: Running Caliptra FMC ...
3,167,387 UART:
3,167,530 UART: [state] CFI Enabled
3,178,341 UART: [fht] FMC Alias Private Key: 7
3,286,232 UART: [art] Extend RT PCRs Done
3,286,660 UART: [art] Lock RT PCRs Done
3,288,558 UART: [art] Populate DV Done
3,296,841 UART: [fht] FMC Alias Private Key: 7
3,297,937 UART: [art] Derive CDI
3,298,217 UART: [art] Store in in slot 0x4
3,383,998 UART: [art] Derive Key Pair
3,384,358 UART: [art] Store priv key in slot 0x5
3,397,686 UART: [art] Derive Key Pair - Done
3,412,246 UART: [art] Signing Cert with AUTHO
3,412,726 UART: RITY.KEYID = 7
3,428,150 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,915 UART: [art] PUB.X = E63643BF9BE0EE1F4C75D0CD8D13212E8BC78D4E1926DBCC99772A2BA87CBAD794B533228347E632301B509BADD25D6B
3,435,699 UART: [art] PUB.Y = 932DC3E13C55CBC85717CD4859B7BA3B8563B54690690D61739ADAA68E2200377FAB4AE6FAA79FAB3C11EDC147F2C44A
3,442,638 UART: [art] SIG.R = 5CAC1F545A18551DD4BFF6BC12753747E5437C7FD44CC5AF22A72F02D21F989CC91AFC1923724845AC89B7D0C9CEC2BA
3,449,421 UART: [art] SIG.S = 6B659EAE751C5EFC431E030BFC2E19B80B6904684BC79B08ECB12864C18D6770DDA577090CF2D789A72BDCBD5838D937
3,472,839 UART: Caliptra RT
3,473,184 UART: [state] CFI Enabled
3,582,328 UART: [rt] RT listening for mailbox commands...
3,582,998 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,966 UART: [rt]cmd =0x41544d4e, len=14344
4,016,112 >>> mbox cmd response data (8 bytes)
4,016,113 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,268 UART: [rt]cmd =0x41545348, len=116
4,047,949 >>> mbox cmd response data (12 bytes)
4,047,950 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,048,798 UART:
4,048,814 UART: Running Caliptra ROM ...
4,049,222 UART:
4,049,363 UART: [state] CFI Enabled
4,052,363 UART: [state] LifecycleState = Unprovisioned
4,053,018 UART: [state] DebugLocked = No
4,053,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,055,281 UART: [kat] SHA2-256
4,849,212 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,853,327 UART: [kat] ++
4,853,479 UART: [kat] sha1
4,857,763 UART: [kat] SHA2-256
4,859,701 UART: [kat] SHA2-384
4,862,398 UART: [kat] SHA2-512-ACC
4,864,298 UART: [kat] ECC-384
4,869,999 UART: [kat] HMAC-384Kdf
4,874,689 UART: [kat] LMS
5,442,885 UART: [kat] --
5,443,436 UART: [update-reset] ++
6,778,462 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,779,506 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,929,382 >>> mbox cmd response: success
6,929,382 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,929,711 UART: [update-reset] Copying MAN_2 To MAN_1
6,937,725 UART: [update-reset Success] --
6,938,782 UART: [state] Locking Datavault
6,939,664 UART: [state] Locking PCR0, PCR1 and PCR31
6,940,268 UART: [state] Locking ICCM
6,940,926 UART: [exit] Launching FMC @ 0x40000130
6,946,255 UART:
6,946,271 UART: Running Caliptra FMC ...
6,946,679 UART:
6,946,822 UART: [state] CFI Enabled
7,036,173 UART: [art] Extend RT PCRs Done
7,036,601 UART: [art] Lock RT PCRs Done
7,037,570 UART: [art] Populate DV Done
7,045,957 UART: [fht] FMC Alias Private Key: 7
7,047,023 UART: [art] Derive CDI
7,047,303 UART: [art] Store in in slot 0x4
7,133,356 UART: [art] Derive Key Pair
7,133,716 UART: [art] Store priv key in slot 0x5
7,146,558 UART: [art] Derive Key Pair - Done
7,161,366 UART: [art] Signing Cert with AUTHO
7,161,846 UART: RITY.KEYID = 7
7,177,214 UART: [art] Erasing AUTHORITY.KEYID = 7
7,177,979 UART: [art] PUB.X = 71787C4A55DF683A2F53DD1834DC3DC7E9ED0E3F96777C8BAFA18757A9F8C4326D2BC2EC8E995F01F5351AF2DD7943DF
7,184,759 UART: [art] PUB.Y = 4376D540490322994037A4E9DB1FECC63C277A46638EE26F384AC6DA08E739E79B66267E8D96626F4DA0105A4E8C43BE
7,191,703 UART: [art] SIG.R = BE9391C7078E2C4B05FC1EBDFDC8B859824BBDED615EC56E547E1650DC4A24B7EC929EEFF549BCE5D712DF967DB9650F
7,198,488 UART: [art] SIG.S = 69FF8690B00AB21A51775FA90B8196D92045F85C64E34D7E2BD0D7CA86057F47A96AD5EE4374365CFCF6F074CD954B12
7,222,184 UART: Caliptra RT
7,222,529 UART: [state] CFI Enabled
7,503,806 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,534,743 UART: [rt]cmd =0x41545348, len=116
7,536,556 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,372 ready_for_fw is high
1,362,372 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,039 >>> mbox cmd response: success
2,988,941 UART:
2,988,957 UART: Running Caliptra FMC ...
2,989,365 UART:
2,989,508 UART: [state] CFI Enabled
2,999,879 UART: [fht] FMC Alias Private Key: 7
3,107,136 UART: [art] Extend RT PCRs Done
3,107,564 UART: [art] Lock RT PCRs Done
3,108,988 UART: [art] Populate DV Done
3,117,129 UART: [fht] FMC Alias Private Key: 7
3,118,085 UART: [art] Derive CDI
3,118,365 UART: [art] Store in in slot 0x4
3,204,112 UART: [art] Derive Key Pair
3,204,472 UART: [art] Store priv key in slot 0x5
3,217,746 UART: [art] Derive Key Pair - Done
3,232,319 UART: [art] Signing Cert with AUTHO
3,232,799 UART: RITY.KEYID = 7
3,248,181 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,946 UART: [art] PUB.X = FE8AC62CC5AF161160029FC34BE11C29D0686FD0162FBB656489D5DBBAB7A6C96F279B5EEDC54D6EF873E7DC0B1A798E
3,255,732 UART: [art] PUB.Y = 482FA9AAA6CDDA7589222CE4F04DE24B1ADE18663C883231CC57C3A114A1C0A8EA09ECD63EFC3B42703313F6BEE61939
3,262,695 UART: [art] SIG.R = A05CA404B634254BB99CC3A60F15507E7EBFBD71ACD3801A0EDE7CC99E83B8F19BD29B2257B7862D6C8D0E969BD4FE93
3,269,471 UART: [art] SIG.S = 8FFD397BD53DFEB47586C1D8843278233F7BF500986FF6F6BD6ECC9BD85E253E4AE22DD8BD5BD181E44613D354AA9865
3,293,514 UART: Caliptra RT
3,293,859 UART: [state] CFI Enabled
3,403,051 UART: [rt] RT listening for mailbox commands...
3,403,721 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,825 UART: [rt]cmd =0x41544d4e, len=14344
3,836,265 >>> mbox cmd response data (8 bytes)
3,836,266 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,477 UART: [rt]cmd =0x41545348, len=116
3,868,444 >>> mbox cmd response data (12 bytes)
3,868,445 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,631,533 >>> mbox cmd response: success
6,631,533 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,644,746 UART:
6,644,762 UART: Running Caliptra FMC ...
6,645,170 UART:
6,645,313 UART: [state] CFI Enabled
6,734,830 UART: [art] Extend RT PCRs Done
6,735,258 UART: [art] Lock RT PCRs Done
6,736,569 UART: [art] Populate DV Done
6,744,856 UART: [fht] FMC Alias Private Key: 7
6,745,826 UART: [art] Derive CDI
6,746,106 UART: [art] Store in in slot 0x4
6,832,121 UART: [art] Derive Key Pair
6,832,481 UART: [art] Store priv key in slot 0x5
6,845,355 UART: [art] Derive Key Pair - Done
6,860,429 UART: [art] Signing Cert with AUTHO
6,860,909 UART: RITY.KEYID = 7
6,876,193 UART: [art] Erasing AUTHORITY.KEYID = 7
6,876,958 UART: [art] PUB.X = 397842AD2AA219245BE47F7D37E975E4906353B2C19804D51CA7571C8C552BA2D8D21BA2C6CE2538A3AF245FA2038F19
6,883,724 UART: [art] PUB.Y = 94A892F82818C99C1A8D5D5344B21003C55AAA829AC002323C75F90C8FDDB25220F2558D39B7FEC16BED72E275813F8A
6,890,669 UART: [art] SIG.R = D236F680016C65DEDD806B2EAFC9CA79916C0402C00060034050DC5BEBF27ABDDDCA9BF5732878967ADA71B8FBDC84DD
6,897,425 UART: [art] SIG.S = 59D4BBD98CB6F456D42129F906B3448C4DEBB5956002151B45EB268A7C191DBB2372180D61C75208D7E7D7E2CD945BEF
6,921,258 UART: Caliptra RT
6,921,603 UART: [state] CFI Enabled
7,204,694 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,235,635 UART: [rt]cmd =0x41545348, len=116
7,237,566 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
85,983 UART: [state] WD Timer not started. Device not locked for debugging
87,250 UART: [kat] SHA2-256
892,900 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,025 UART: [kat] ++
897,177 UART: [kat] sha1
901,397 UART: [kat] SHA2-256
903,337 UART: [kat] SHA2-384
906,122 UART: [kat] SHA2-512-ACC
908,023 UART: [kat] ECC-384
918,080 UART: [kat] HMAC-384Kdf
922,640 UART: [kat] LMS
1,170,968 UART: [kat] --
1,171,713 UART: [cold-reset] ++
1,172,293 UART: [fht] FHT @ 0x50003400
1,174,934 UART: [idev] ++
1,175,102 UART: [idev] CDI.KEYID = 6
1,175,462 UART: [idev] SUBJECT.KEYID = 7
1,175,886 UART: [idev] UDS.KEYID = 0
1,176,231 ready_for_fw is high
1,176,231 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,566 UART: [idev] Erasing UDS.KEYID = 0
1,200,495 UART: [idev] Sha1 KeyId Algorithm
1,209,087 UART: [idev] --
1,210,263 UART: [ldev] ++
1,210,431 UART: [ldev] CDI.KEYID = 6
1,210,794 UART: [ldev] SUBJECT.KEYID = 5
1,211,220 UART: [ldev] AUTHORITY.KEYID = 7
1,211,683 UART: [ldev] FE.KEYID = 1
1,217,193 UART: [ldev] Erasing FE.KEYID = 1
1,243,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,077 UART: [ldev] --
1,283,534 UART: [fwproc] Wait for Commands...
1,284,328 UART: [fwproc] Recv command 0x46574c44
1,285,056 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,195 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,292 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,596 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,379 >>> mbox cmd response: success
2,776,527 UART: [afmc] ++
2,776,695 UART: [afmc] CDI.KEYID = 6
2,777,057 UART: [afmc] SUBJECT.KEYID = 7
2,777,482 UART: [afmc] AUTHORITY.KEYID = 5
2,812,273 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,550 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,298 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,026 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,911 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,630 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,514 UART: [afmc] --
2,855,418 UART: [cold-reset] --
2,856,188 UART: [state] Locking Datavault
2,857,457 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,061 UART: [state] Locking ICCM
2,858,497 UART: [exit] Launching FMC @ 0x40000130
2,863,826 UART:
2,863,842 UART: Running Caliptra FMC ...
2,864,250 UART:
2,864,304 UART: [state] CFI Enabled
2,874,651 UART: [fht] FMC Alias Private Key: 7
2,983,144 UART: [art] Extend RT PCRs Done
2,983,572 UART: [art] Lock RT PCRs Done
2,984,802 UART: [art] Populate DV Done
2,992,909 UART: [fht] FMC Alias Private Key: 7
2,993,905 UART: [art] Derive CDI
2,994,185 UART: [art] Store in in slot 0x4
3,080,232 UART: [art] Derive Key Pair
3,080,592 UART: [art] Store priv key in slot 0x5
3,094,026 UART: [art] Derive Key Pair - Done
3,109,117 UART: [art] Signing Cert with AUTHO
3,109,597 UART: RITY.KEYID = 7
3,124,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,590 UART: [art] PUB.X = 50D1C28306408E5634CCBD050D3828E8B17EB152359AFCEE3043974127787CE2B48EFDF5FA7634290488CB3CF46E79D4
3,132,350 UART: [art] PUB.Y = DD2824A9EFDA2863509C9CE85886FBCBEB7550518E5F04E99B5BD8F090A7C06049B1DF873D9B51CE62CF1204F9C6D629
3,139,306 UART: [art] SIG.R = C8E610C536F660327779738E28DCB5558703A599647EAD6613954B09942457FDFCEC35FECAC9395B614EC31F771C5B97
3,146,068 UART: [art] SIG.S = B6C057C2627636C4E6120B1587E2DFCF4489B71A945E0B1B1A848C52000C334C2A5350F04650AD6248B9135A551B9883
3,170,054 UART: Caliptra RT
3,170,307 UART: [state] CFI Enabled
3,277,717 UART: [rt] RT listening for mailbox commands...
3,278,387 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,467 UART: [rt]cmd =0x41544d4e, len=14344
3,710,959 >>> mbox cmd response data (8 bytes)
3,710,960 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,799 UART: [rt]cmd =0x41545348, len=116
3,742,666 >>> mbox cmd response data (12 bytes)
3,742,667 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,246 UART:
3,743,262 UART: Running Caliptra ROM ...
3,743,670 UART:
3,743,725 UART: [state] CFI Enabled
3,746,589 UART: [state] LifecycleState = Unprovisioned
3,747,244 UART: [state] DebugLocked = No
3,747,772 UART: [state] WD Timer not started. Device not locked for debugging
3,748,932 UART: [kat] SHA2-256
4,554,582 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,558,707 UART: [kat] ++
4,558,859 UART: [kat] sha1
4,563,271 UART: [kat] SHA2-256
4,565,211 UART: [kat] SHA2-384
4,568,034 UART: [kat] SHA2-512-ACC
4,569,934 UART: [kat] ECC-384
4,579,789 UART: [kat] HMAC-384Kdf
4,584,359 UART: [kat] LMS
4,832,687 UART: [kat] --
4,833,743 UART: [update-reset] ++
6,146,917 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,147,938 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,297,762 >>> mbox cmd response: success
6,297,762 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,298,111 UART: [update-reset] Copying MAN_2 To MAN_1
6,306,125 UART: [update-reset Success] --
6,307,076 UART: [state] Locking Datavault
6,307,774 UART: [state] Locking PCR0, PCR1 and PCR31
6,308,378 UART: [state] Locking ICCM
6,308,834 UART: [exit] Launching FMC @ 0x40000130
6,314,163 UART:
6,314,179 UART: Running Caliptra FMC ...
6,314,587 UART:
6,314,641 UART: [state] CFI Enabled
6,404,030 UART: [art] Extend RT PCRs Done
6,404,458 UART: [art] Lock RT PCRs Done
6,405,699 UART: [art] Populate DV Done
6,414,206 UART: [fht] FMC Alias Private Key: 7
6,415,252 UART: [art] Derive CDI
6,415,532 UART: [art] Store in in slot 0x4
6,501,007 UART: [art] Derive Key Pair
6,501,367 UART: [art] Store priv key in slot 0x5
6,514,667 UART: [art] Derive Key Pair - Done
6,529,550 UART: [art] Signing Cert with AUTHO
6,530,030 UART: RITY.KEYID = 7
6,545,192 UART: [art] Erasing AUTHORITY.KEYID = 7
6,545,957 UART: [art] PUB.X = BDFCBC4074DE292D72DEBD244628105DD043618CF3DC183B7C33DBC687C55AD95182D74B46B9CF0DC0D9170A5E9292CB
6,552,737 UART: [art] PUB.Y = 813523682D9FD51334C6FE4E8F97E74DB2B019A5501C4DAE2AF3750185E7CD1357B10C7BF716F87EC296674C6F167043
6,559,681 UART: [art] SIG.R = 3AFCA0A8CC9802966275594A409D88D34B7C2BC0DF0D7C56590D1D4BB57D6E1C0F8DB0A8BCDFBA475937DC6C7A6F8F4E
6,566,461 UART: [art] SIG.S = 0F0B88A96D11F1F0F63B9EE30FD30BEDA368C0765AFADE8F083423CDED1B7110C2635395E54E677091C770971F4644E7
6,590,859 UART: Caliptra RT
6,591,112 UART: [state] CFI Enabled
6,873,013 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,903,814 UART: [rt]cmd =0x41545348, len=116
6,905,677 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,177 ready_for_fw is high
1,060,177 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,626 >>> mbox cmd response: success
2,688,160 UART:
2,688,176 UART: Running Caliptra FMC ...
2,688,584 UART:
2,688,638 UART: [state] CFI Enabled
2,699,205 UART: [fht] FMC Alias Private Key: 7
2,807,282 UART: [art] Extend RT PCRs Done
2,807,710 UART: [art] Lock RT PCRs Done
2,809,162 UART: [art] Populate DV Done
2,817,691 UART: [fht] FMC Alias Private Key: 7
2,818,859 UART: [art] Derive CDI
2,819,139 UART: [art] Store in in slot 0x4
2,904,950 UART: [art] Derive Key Pair
2,905,310 UART: [art] Store priv key in slot 0x5
2,918,552 UART: [art] Derive Key Pair - Done
2,933,281 UART: [art] Signing Cert with AUTHO
2,933,761 UART: RITY.KEYID = 7
2,948,529 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,294 UART: [art] PUB.X = 7A66DA7EF015A0B75ED6A1072BBD4448FDD62511CC5A584F32AC4D6F06BA29FFC7BF61D990F027C13777F770C7E140DC
2,956,074 UART: [art] PUB.Y = 2B59D0EE1FBE97D912EA79F4DAF4CF2FD6B7898A03FBAC3EDA0D1F887560CFE82E140FFD07F8C50D6F01D2955492DD0A
2,963,029 UART: [art] SIG.R = C4A2CA63DCEFB1C760B0C767B3223962DCCDCE87C0A4A35C5C0B15E73D95CB21BF0D12606845FA54D9AEBFF844E1A316
2,969,815 UART: [art] SIG.S = 446AAD7C3DFD89857A796DA6136131C3EA7480B9B8383ED79C3B299FF99E67C7F5020FFEF8FFF70FD24572DBD60C2FB2
2,992,998 UART: Caliptra RT
2,993,251 UART: [state] CFI Enabled
3,101,140 UART: [rt] RT listening for mailbox commands...
3,101,810 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,642 UART: [rt]cmd =0x41544d4e, len=14344
3,534,396 >>> mbox cmd response data (8 bytes)
3,534,397 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,494 UART: [rt]cmd =0x41545348, len=116
3,566,375 >>> mbox cmd response data (12 bytes)
3,566,376 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,004,902 >>> mbox cmd response: success
6,004,902 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,018,272 UART:
6,018,288 UART: Running Caliptra FMC ...
6,018,696 UART:
6,018,750 UART: [state] CFI Enabled
6,107,639 UART: [art] Extend RT PCRs Done
6,108,067 UART: [art] Lock RT PCRs Done
6,109,232 UART: [art] Populate DV Done
6,117,511 UART: [fht] FMC Alias Private Key: 7
6,118,621 UART: [art] Derive CDI
6,118,901 UART: [art] Store in in slot 0x4
6,204,290 UART: [art] Derive Key Pair
6,204,650 UART: [art] Store priv key in slot 0x5
6,217,778 UART: [art] Derive Key Pair - Done
6,232,631 UART: [art] Signing Cert with AUTHO
6,233,111 UART: RITY.KEYID = 7
6,248,377 UART: [art] Erasing AUTHORITY.KEYID = 7
6,249,142 UART: [art] PUB.X = FC9AF03404B6ACB19115EBED7FD113918E930FEE57F68B0D2A1C5AD98DCFD47DFC9C002946748A41ED334EAA528529D3
6,255,899 UART: [art] PUB.Y = 0B5CDDD14CB28502893CABEA5F54725C9577538FF9A39113EF8CF69D01D49EEC94380367ED1E0743847440442E3E8F22
6,262,836 UART: [art] SIG.R = 39C8A8B0287F3444527E22B024E63AFDAFE14553B784315082134EA111324888FF7B10140018A2B0AFA30F1B041AAF6D
6,269,576 UART: [art] SIG.S = 4CB8AE6855667350E5681BD5A3B26DA913A7AEE93D4E2AD7A6855BC7AB70884BDBBAAA30491BA72E255E5FCCFB50600A
6,293,370 UART: Caliptra RT
6,293,623 UART: [state] CFI Enabled
6,577,962 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,608,629 UART: [rt]cmd =0x41545348, len=116
6,610,764 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,891 UART: [state] LifecycleState = Unprovisioned
86,546 UART: [state] DebugLocked = No
87,234 UART: [state] WD Timer not started. Device not locked for debugging
88,351 UART: [kat] SHA2-256
894,001 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,126 UART: [kat] ++
898,278 UART: [kat] sha1
902,284 UART: [kat] SHA2-256
904,224 UART: [kat] SHA2-384
906,977 UART: [kat] SHA2-512-ACC
908,878 UART: [kat] ECC-384
918,585 UART: [kat] HMAC-384Kdf
923,025 UART: [kat] LMS
1,171,353 UART: [kat] --
1,172,096 UART: [cold-reset] ++
1,172,480 UART: [fht] FHT @ 0x50003400
1,174,935 UART: [idev] ++
1,175,103 UART: [idev] CDI.KEYID = 6
1,175,463 UART: [idev] SUBJECT.KEYID = 7
1,175,887 UART: [idev] UDS.KEYID = 0
1,176,232 ready_for_fw is high
1,176,232 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,591 UART: [idev] Erasing UDS.KEYID = 0
1,201,132 UART: [idev] Sha1 KeyId Algorithm
1,209,716 UART: [idev] --
1,210,562 UART: [ldev] ++
1,210,730 UART: [ldev] CDI.KEYID = 6
1,211,093 UART: [ldev] SUBJECT.KEYID = 5
1,211,519 UART: [ldev] AUTHORITY.KEYID = 7
1,211,982 UART: [ldev] FE.KEYID = 1
1,217,284 UART: [ldev] Erasing FE.KEYID = 1
1,244,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,732 UART: [ldev] --
1,284,245 UART: [fwproc] Wait for Commands...
1,284,893 UART: [fwproc] Recv command 0x46574c44
1,285,621 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,712 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,963 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,267 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,030 >>> mbox cmd response: success
2,777,250 UART: [afmc] ++
2,777,418 UART: [afmc] CDI.KEYID = 6
2,777,780 UART: [afmc] SUBJECT.KEYID = 7
2,778,205 UART: [afmc] AUTHORITY.KEYID = 5
2,813,598 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,167 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,915 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,643 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,528 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,247 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,961 UART: [afmc] --
2,856,865 UART: [cold-reset] --
2,857,781 UART: [state] Locking Datavault
2,858,922 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,526 UART: [state] Locking ICCM
2,859,986 UART: [exit] Launching FMC @ 0x40000130
2,865,315 UART:
2,865,331 UART: Running Caliptra FMC ...
2,865,739 UART:
2,865,882 UART: [state] CFI Enabled
2,876,655 UART: [fht] FMC Alias Private Key: 7
2,983,980 UART: [art] Extend RT PCRs Done
2,984,408 UART: [art] Lock RT PCRs Done
2,985,792 UART: [art] Populate DV Done
2,993,915 UART: [fht] FMC Alias Private Key: 7
2,994,897 UART: [art] Derive CDI
2,995,177 UART: [art] Store in in slot 0x4
3,080,904 UART: [art] Derive Key Pair
3,081,264 UART: [art] Store priv key in slot 0x5
3,094,578 UART: [art] Derive Key Pair - Done
3,109,715 UART: [art] Signing Cert with AUTHO
3,110,195 UART: RITY.KEYID = 7
3,125,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,658 UART: [art] PUB.X = 99526758CA68CAD93D77406F000F0147EC50C29C3253BA89C41A5E56AE3BF72976CCAE64BC879F8ED879934B7CE4FF54
3,133,408 UART: [art] PUB.Y = 8A3D1FA8385849B2FA0AD161DFFB513DB2369025312315D5D4E58A180253B92E00E99F9A09EB534AA0122345CF6F354C
3,140,329 UART: [art] SIG.R = A9D17CAB78E16CF05B53B5E093ACC2757035CDBE5901FB8D88BA698BBDE4F94488BFD88F89B470A627E1AE713065C0BF
3,147,114 UART: [art] SIG.S = A75CF9FA738A75EDFB8C3BAF5872284F80C19FC4156FA1458A93F7979D7CD71DFFC00C8F4ED2FE74103CF363E003CD08
3,171,124 UART: Caliptra RT
3,171,469 UART: [state] CFI Enabled
3,279,191 UART: [rt] RT listening for mailbox commands...
3,279,861 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,673 UART: [rt]cmd =0x41544d4e, len=14344
3,712,345 >>> mbox cmd response data (8 bytes)
3,712,346 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,495 UART: [rt]cmd =0x41545348, len=116
3,744,280 >>> mbox cmd response data (12 bytes)
3,744,281 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,745,044 UART:
3,745,060 UART: Running Caliptra ROM ...
3,745,468 UART:
3,745,610 UART: [state] CFI Enabled
3,748,814 UART: [state] LifecycleState = Unprovisioned
3,749,469 UART: [state] DebugLocked = No
3,750,027 UART: [state] WD Timer not started. Device not locked for debugging
3,751,303 UART: [kat] SHA2-256
4,556,953 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,561,078 UART: [kat] ++
4,561,230 UART: [kat] sha1
4,565,390 UART: [kat] SHA2-256
4,567,330 UART: [kat] SHA2-384
4,570,211 UART: [kat] SHA2-512-ACC
4,572,111 UART: [kat] ECC-384
4,581,974 UART: [kat] HMAC-384Kdf
4,586,744 UART: [kat] LMS
4,835,072 UART: [kat] --
4,835,804 UART: [update-reset] ++
6,148,810 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,149,779 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,299,603 >>> mbox cmd response: success
6,299,603 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,299,770 UART: [update-reset] Copying MAN_2 To MAN_1
6,307,784 UART: [update-reset Success] --
6,308,835 UART: [state] Locking Datavault
6,309,425 UART: [state] Locking PCR0, PCR1 and PCR31
6,310,029 UART: [state] Locking ICCM
6,310,525 UART: [exit] Launching FMC @ 0x40000130
6,315,854 UART:
6,315,870 UART: Running Caliptra FMC ...
6,316,278 UART:
6,316,421 UART: [state] CFI Enabled
6,405,324 UART: [art] Extend RT PCRs Done
6,405,752 UART: [art] Lock RT PCRs Done
6,406,867 UART: [art] Populate DV Done
6,415,164 UART: [fht] FMC Alias Private Key: 7
6,416,200 UART: [art] Derive CDI
6,416,480 UART: [art] Store in in slot 0x4
6,501,963 UART: [art] Derive Key Pair
6,502,323 UART: [art] Store priv key in slot 0x5
6,515,799 UART: [art] Derive Key Pair - Done
6,530,554 UART: [art] Signing Cert with AUTHO
6,531,034 UART: RITY.KEYID = 7
6,546,136 UART: [art] Erasing AUTHORITY.KEYID = 7
6,546,901 UART: [art] PUB.X = F3D2961744F1B49397934841C2558DFDE90C1F3B75497F6ADC1D00B13ADEBAF25300F19D98B5FA6117D5C856ADD3C1D2
6,553,634 UART: [art] PUB.Y = B5D04C28314E13CE9961B42B8F2F29F03D6E45856FA0DA77C1DAC5F1DD3B731EEC82AD478CFAB7EB5710BBF25E48639E
6,560,604 UART: [art] SIG.R = F28A095147943C42EB5F62AF4E8E1D29FD9BE855DAB6D15EB569223A4CF6A7AF7B8EC2E72518E9263CDFDC662A2777A7
6,567,387 UART: [art] SIG.S = E300523E1A2BE620F71BBB9F8E0D98F6731B5618158BB4F9540FC0EBF1F6576DD274E2E98908D53B8E9A222278B598B3
6,591,435 UART: Caliptra RT
6,591,780 UART: [state] CFI Enabled
6,874,588 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,905,505 UART: [rt]cmd =0x41545348, len=116
6,907,306 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,234 ready_for_fw is high
1,061,234 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,629,725 >>> mbox cmd response: success
2,692,071 UART:
2,692,087 UART: Running Caliptra FMC ...
2,692,495 UART:
2,692,638 UART: [state] CFI Enabled
2,703,015 UART: [fht] FMC Alias Private Key: 7
2,811,390 UART: [art] Extend RT PCRs Done
2,811,818 UART: [art] Lock RT PCRs Done
2,813,612 UART: [art] Populate DV Done
2,821,931 UART: [fht] FMC Alias Private Key: 7
2,822,895 UART: [art] Derive CDI
2,823,175 UART: [art] Store in in slot 0x4
2,908,576 UART: [art] Derive Key Pair
2,908,936 UART: [art] Store priv key in slot 0x5
2,921,682 UART: [art] Derive Key Pair - Done
2,936,410 UART: [art] Signing Cert with AUTHO
2,936,890 UART: RITY.KEYID = 7
2,951,990 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,755 UART: [art] PUB.X = 327E2803E9F4A8E4E33F53ECD826993E6D2BC3A24600BC1E16B2011C2136C4FC3C1BFF6E00FC6A8F07A5645B04D36C0B
2,959,478 UART: [art] PUB.Y = 7C119F8A7BFBEA287F708E9CFAF573B3CFEED94A5C8259A3DDA2CAAE1308A604C451BF6888A7F1935A1C0B55974C51D3
2,966,439 UART: [art] SIG.R = A205EFD6FAAAAC4DC7F0DE0708728185BA88C32A7F0A6FC94577C255FAC496A584482A8508B3F5506683149D0DA41AD5
2,973,201 UART: [art] SIG.S = 871452A402F96D7F8634140417C13155E084A61CCEABE4896724DD767B1B29844E21A1F810B96C2A598EA79D92C5FD8C
2,996,796 UART: Caliptra RT
2,997,141 UART: [state] CFI Enabled
3,105,345 UART: [rt] RT listening for mailbox commands...
3,106,015 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,935 UART: [rt]cmd =0x41544d4e, len=14344
3,538,865 >>> mbox cmd response data (8 bytes)
3,538,866 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,568,761 UART: [rt]cmd =0x41545348, len=116
3,570,630 >>> mbox cmd response data (12 bytes)
3,570,631 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,008,622 >>> mbox cmd response: success
6,008,622 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,022,250 UART:
6,022,266 UART: Running Caliptra FMC ...
6,022,674 UART:
6,022,817 UART: [state] CFI Enabled
6,111,934 UART: [art] Extend RT PCRs Done
6,112,362 UART: [art] Lock RT PCRs Done
6,113,621 UART: [art] Populate DV Done
6,121,596 UART: [fht] FMC Alias Private Key: 7
6,122,718 UART: [art] Derive CDI
6,122,998 UART: [art] Store in in slot 0x4
6,208,449 UART: [art] Derive Key Pair
6,208,809 UART: [art] Store priv key in slot 0x5
6,221,613 UART: [art] Derive Key Pair - Done
6,236,336 UART: [art] Signing Cert with AUTHO
6,236,816 UART: RITY.KEYID = 7
6,251,966 UART: [art] Erasing AUTHORITY.KEYID = 7
6,252,731 UART: [art] PUB.X = D80E98A837FC7D2CCF09583F610ACB5ACABCC6637BBBC4C6C73483898C7CEBAE48DC0A365B599A7986512A180226A0F3
6,259,502 UART: [art] PUB.Y = B74D705D0AA1D213EB859339A3C1B3C700D3FD2320633BE4B1B8E9281F2C9E0B5DB455114125154793157D48AC7B9F3A
6,266,426 UART: [art] SIG.R = 986C434B416228D28BA1FA348349FB3521DAD10669CC662A80CC377C96A7A0EA615FB1777F1CFAEF934A59C9C77222FB
6,273,201 UART: [art] SIG.S = 11750C41010193298B25564A45E2D0CD6FB7ED989AE953D4B38B218EB7923C9B86C05242CE687B01B3B720126563A5B7
6,296,940 UART: Caliptra RT
6,297,285 UART: [state] CFI Enabled
6,574,964 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,605,887 UART: [rt]cmd =0x41545348, len=116
6,607,924 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
891,266 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,395 UART: [kat] ++
895,547 UART: [kat] sha1
899,831 UART: [kat] SHA2-256
901,771 UART: [kat] SHA2-384
904,366 UART: [kat] SHA2-512-ACC
906,267 UART: [kat] ECC-384
915,624 UART: [kat] HMAC-384Kdf
920,108 UART: [kat] LMS
1,168,420 UART: [kat] --
1,169,027 UART: [cold-reset] ++
1,169,463 UART: [fht] FHT @ 0x50003400
1,172,193 UART: [idev] ++
1,172,361 UART: [idev] CDI.KEYID = 6
1,172,722 UART: [idev] SUBJECT.KEYID = 7
1,173,147 UART: [idev] UDS.KEYID = 0
1,173,493 ready_for_fw is high
1,173,493 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,931 UART: [idev] Erasing UDS.KEYID = 0
1,197,915 UART: [idev] Sha1 KeyId Algorithm
1,206,727 UART: [idev] --
1,207,806 UART: [ldev] ++
1,207,974 UART: [ldev] CDI.KEYID = 6
1,208,338 UART: [ldev] SUBJECT.KEYID = 5
1,208,765 UART: [ldev] AUTHORITY.KEYID = 7
1,209,228 UART: [ldev] FE.KEYID = 1
1,214,318 UART: [ldev] Erasing FE.KEYID = 1
1,240,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,988 UART: [ldev] --
1,279,314 UART: [fwproc] Wait for Commands...
1,279,993 UART: [fwproc] Recv command 0x46574c44
1,280,726 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,936 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,404 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,713 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,527 >>> mbox cmd response: success
2,771,784 UART: [afmc] ++
2,771,952 UART: [afmc] CDI.KEYID = 6
2,772,315 UART: [afmc] SUBJECT.KEYID = 7
2,772,741 UART: [afmc] AUTHORITY.KEYID = 5
2,807,806 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,645 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,374 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,257 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,976 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,695 UART: [afmc] --
2,850,709 UART: [cold-reset] --
2,851,753 UART: [state] Locking Datavault
2,853,104 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,708 UART: [state] Locking ICCM
2,854,354 UART: [exit] Launching FMC @ 0x40000130
2,859,683 UART:
2,859,699 UART: Running Caliptra FMC ...
2,860,107 UART:
2,860,161 UART: [state] CFI Enabled
2,870,656 UART: [fht] FMC Alias Private Key: 7
2,978,735 UART: [art] Extend RT PCRs Done
2,979,163 UART: [art] Lock RT PCRs Done
2,980,205 UART: [art] Populate DV Done
2,988,414 UART: [fht] FMC Alias Private Key: 7
2,989,576 UART: [art] Derive CDI
2,989,856 UART: [art] Store in in slot 0x4
3,075,929 UART: [art] Derive Key Pair
3,076,289 UART: [art] Store priv key in slot 0x5
3,089,251 UART: [art] Derive Key Pair - Done
3,103,922 UART: [art] Signing Cert with AUTHO
3,104,402 UART: RITY.KEYID = 7
3,119,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,497 UART: [art] PUB.X = EA5BB73BEA7EC71F3952FD37D03C80E19E9D74723C48B57A5B95C46A2538412493B65125E763D3ECBC3B2943DDE4A512
3,127,275 UART: [art] PUB.Y = BFBC925869E1616B40647819E096306E974B1551E499F49E819B90573DD29568C73B52DD2D8263B1F94149873E3942CF
3,134,213 UART: [art] SIG.R = D4DE36B11D470F6BE527F3A5825F8FD8FC6C21472E80742DA81AD91EA28DC9027DBFE4262CAB8EA8E4395E6EE5383D54
3,140,993 UART: [art] SIG.S = 161E7139730F89937F5F22FECF07CB0DF0924BA643E7D64064AEB2A7FE7C72009B55EBE02FB63BEA1DB0A92FD0D0D2E2
3,164,409 UART: Caliptra RT
3,164,662 UART: [state] CFI Enabled
3,272,365 UART: [rt] RT listening for mailbox commands...
3,273,035 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,107 UART: [rt]cmd =0x41544d4e, len=14344
3,705,947 >>> mbox cmd response data (8 bytes)
3,705,948 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,871 UART: [rt]cmd =0x41545348, len=116
3,737,772 >>> mbox cmd response data (12 bytes)
3,737,773 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,440 UART:
3,738,456 UART: Running Caliptra ROM ...
3,738,864 UART:
3,738,919 UART: [state] CFI Enabled
3,741,983 UART: [state] LifecycleState = Unprovisioned
3,742,638 UART: [state] DebugLocked = No
3,743,196 UART: [state] WD Timer not started. Device not locked for debugging
3,744,318 UART: [kat] SHA2-256
4,547,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,551,997 UART: [kat] ++
4,552,149 UART: [kat] sha1
4,556,363 UART: [kat] SHA2-256
4,558,303 UART: [kat] SHA2-384
4,561,052 UART: [kat] SHA2-512-ACC
4,562,952 UART: [kat] ECC-384
4,572,437 UART: [kat] HMAC-384Kdf
4,577,263 UART: [kat] LMS
4,825,575 UART: [kat] --
4,826,189 UART: [update-reset] ++
6,138,214 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,139,303 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,289,127 >>> mbox cmd response: success
6,289,127 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,289,384 UART: [update-reset] Copying MAN_2 To MAN_1
6,297,398 UART: [update-reset Success] --
6,298,527 UART: [state] Locking Datavault
6,299,355 UART: [state] Locking PCR0, PCR1 and PCR31
6,299,959 UART: [state] Locking ICCM
6,300,517 UART: [exit] Launching FMC @ 0x40000130
6,305,846 UART:
6,305,862 UART: Running Caliptra FMC ...
6,306,270 UART:
6,306,324 UART: [state] CFI Enabled
6,395,859 UART: [art] Extend RT PCRs Done
6,396,287 UART: [art] Lock RT PCRs Done
6,397,570 UART: [art] Populate DV Done
6,405,919 UART: [fht] FMC Alias Private Key: 7
6,406,979 UART: [art] Derive CDI
6,407,259 UART: [art] Store in in slot 0x4
6,493,070 UART: [art] Derive Key Pair
6,493,430 UART: [art] Store priv key in slot 0x5
6,507,396 UART: [art] Derive Key Pair - Done
6,521,904 UART: [art] Signing Cert with AUTHO
6,522,384 UART: RITY.KEYID = 7
6,537,864 UART: [art] Erasing AUTHORITY.KEYID = 7
6,538,629 UART: [art] PUB.X = 1CC3F5E6173E7F2A93407EDC0A0A9F771D82F334FF9E67FA238F42BC7706411A0BCBDA70A6B2E4C7ED0099E8666ADFD0
6,545,383 UART: [art] PUB.Y = 84EE6FFE18E254C7DCC8E8802A9B22647459B2369383C4348120D863BDA49A0BDCACC867073757D627CC62034DAE3896
6,552,326 UART: [art] SIG.R = C0D1AD45D683F71F245DBA29BDA8D8026CE410693A6DABE49546B313B7644DE7AEE866AAD722D8878E8B3A803B469244
6,559,103 UART: [art] SIG.S = 23382F04AF660CFFFB1545DC624CEA9E88BF9B3E11092C8EEC8DE69B0825099B0B126047AE60E585148401CBF8ACDF7E
6,582,749 UART: Caliptra RT
6,583,002 UART: [state] CFI Enabled
6,865,425 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,896,416 UART: [rt]cmd =0x41545348, len=116
6,898,169 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,702 ready_for_fw is high
1,055,702 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,031 >>> mbox cmd response: success
2,683,333 UART:
2,683,349 UART: Running Caliptra FMC ...
2,683,757 UART:
2,683,811 UART: [state] CFI Enabled
2,694,264 UART: [fht] FMC Alias Private Key: 7
2,802,597 UART: [art] Extend RT PCRs Done
2,803,025 UART: [art] Lock RT PCRs Done
2,804,791 UART: [art] Populate DV Done
2,813,182 UART: [fht] FMC Alias Private Key: 7
2,814,320 UART: [art] Derive CDI
2,814,600 UART: [art] Store in in slot 0x4
2,900,115 UART: [art] Derive Key Pair
2,900,475 UART: [art] Store priv key in slot 0x5
2,913,399 UART: [art] Derive Key Pair - Done
2,928,292 UART: [art] Signing Cert with AUTHO
2,928,772 UART: RITY.KEYID = 7
2,943,534 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,299 UART: [art] PUB.X = AE0AA25D331C5795C8BD3914D0B011D7F8DDF88133596F76276BD5E57D82C5FA467855B15C1456EA685557FABB28F995
2,951,070 UART: [art] PUB.Y = 4CF05FA97F1CE1336D65C8952B4EDDC15244BE6F65A8F2F74FE74C3E777B69D4B61586A9A2CA3D92306690272D4B21FB
2,958,030 UART: [art] SIG.R = 93144C831C7F8D60395D30E154F9A00E43E5D232213DB30D53E92F9EB2BD77DFACDD63E990AC5BF0AF0C69EA43A7610E
2,964,802 UART: [art] SIG.S = BFA893EE402C0F5A1B84F94AEEBAE273BF538E4E0F13FAC82B85DC73BC2347A362C7E1E3BB5B9DC70907C8DCC8D19CDD
2,988,101 UART: Caliptra RT
2,988,354 UART: [state] CFI Enabled
3,095,700 UART: [rt] RT listening for mailbox commands...
3,096,370 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,610 UART: [rt]cmd =0x41544d4e, len=14344
3,529,720 >>> mbox cmd response data (8 bytes)
3,529,721 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,682 UART: [rt]cmd =0x41545348, len=116
3,561,519 >>> mbox cmd response data (12 bytes)
3,561,520 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,993,615 >>> mbox cmd response: success
5,993,615 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,007,121 UART:
6,007,137 UART: Running Caliptra FMC ...
6,007,545 UART:
6,007,599 UART: [state] CFI Enabled
6,096,468 UART: [art] Extend RT PCRs Done
6,096,896 UART: [art] Lock RT PCRs Done
6,097,889 UART: [art] Populate DV Done
6,106,266 UART: [fht] FMC Alias Private Key: 7
6,107,432 UART: [art] Derive CDI
6,107,712 UART: [art] Store in in slot 0x4
6,193,297 UART: [art] Derive Key Pair
6,193,657 UART: [art] Store priv key in slot 0x5
6,206,887 UART: [art] Derive Key Pair - Done
6,221,588 UART: [art] Signing Cert with AUTHO
6,222,068 UART: RITY.KEYID = 7
6,237,602 UART: [art] Erasing AUTHORITY.KEYID = 7
6,238,367 UART: [art] PUB.X = 48EA7A2A41244CC7A4CD688EEB7ACA6FB0C732844EF7439A6D7705980E4C5FB04CEE80D976D0646460D1A6C4978DBEF4
6,245,145 UART: [art] PUB.Y = 5361319C08698FCAFDAE6A5CE8E79027B0F3829ABF7605561B567ED6ED1F44BC799CF7BE57679CF79B208EB9A1EB55E0
6,252,103 UART: [art] SIG.R = 794F37DFE1CB80CB4DB3F4C6796B9D57B77D09ED855B0F15293F12BD731847924E0FBDF08F960B0CC3B04FF762CF7922
6,258,870 UART: [art] SIG.S = CAF66B283FE23F8B5012EED0CD0D31A855AC6A750ADDBAA6237B8AA8278C4D103D22BE6B3714CF2A5FEE518AD9A61209
6,282,428 UART: Caliptra RT
6,282,681 UART: [state] CFI Enabled
6,563,024 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,593,787 UART: [rt]cmd =0x41545348, len=116
6,595,788 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,510 UART: [state] WD Timer not started. Device not locked for debugging
87,717 UART: [kat] SHA2-256
891,267 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,396 UART: [kat] ++
895,548 UART: [kat] sha1
899,784 UART: [kat] SHA2-256
901,724 UART: [kat] SHA2-384
904,531 UART: [kat] SHA2-512-ACC
906,432 UART: [kat] ECC-384
915,941 UART: [kat] HMAC-384Kdf
920,723 UART: [kat] LMS
1,169,035 UART: [kat] --
1,170,192 UART: [cold-reset] ++
1,170,626 UART: [fht] FHT @ 0x50003400
1,173,152 UART: [idev] ++
1,173,320 UART: [idev] CDI.KEYID = 6
1,173,681 UART: [idev] SUBJECT.KEYID = 7
1,174,106 UART: [idev] UDS.KEYID = 0
1,174,452 ready_for_fw is high
1,174,452 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,382 UART: [idev] Erasing UDS.KEYID = 0
1,199,720 UART: [idev] Sha1 KeyId Algorithm
1,208,698 UART: [idev] --
1,209,575 UART: [ldev] ++
1,209,743 UART: [ldev] CDI.KEYID = 6
1,210,107 UART: [ldev] SUBJECT.KEYID = 5
1,210,534 UART: [ldev] AUTHORITY.KEYID = 7
1,210,997 UART: [ldev] FE.KEYID = 1
1,216,425 UART: [ldev] Erasing FE.KEYID = 1
1,242,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,847 UART: [ldev] --
1,282,337 UART: [fwproc] Wait for Commands...
1,282,918 UART: [fwproc] Recv command 0x46574c44
1,283,651 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,849 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,065 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,374 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,148 >>> mbox cmd response: success
2,774,205 UART: [afmc] ++
2,774,373 UART: [afmc] CDI.KEYID = 6
2,774,736 UART: [afmc] SUBJECT.KEYID = 7
2,775,162 UART: [afmc] AUTHORITY.KEYID = 5
2,811,305 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,662 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,391 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,274 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,993 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,848 UART: [afmc] --
2,854,920 UART: [cold-reset] --
2,856,106 UART: [state] Locking Datavault
2,857,311 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,915 UART: [state] Locking ICCM
2,858,485 UART: [exit] Launching FMC @ 0x40000130
2,863,814 UART:
2,863,830 UART: Running Caliptra FMC ...
2,864,238 UART:
2,864,381 UART: [state] CFI Enabled
2,875,008 UART: [fht] FMC Alias Private Key: 7
2,983,137 UART: [art] Extend RT PCRs Done
2,983,565 UART: [art] Lock RT PCRs Done
2,985,213 UART: [art] Populate DV Done
2,993,560 UART: [fht] FMC Alias Private Key: 7
2,994,520 UART: [art] Derive CDI
2,994,800 UART: [art] Store in in slot 0x4
3,080,527 UART: [art] Derive Key Pair
3,080,887 UART: [art] Store priv key in slot 0x5
3,094,397 UART: [art] Derive Key Pair - Done
3,109,169 UART: [art] Signing Cert with AUTHO
3,109,649 UART: RITY.KEYID = 7
3,125,073 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,838 UART: [art] PUB.X = 044E0743DF49A42658336457CD15A3CE6697B63C8CCB6ECA3C8E12A1E8F3C0756D24FC39498DE88C8177EBF61142D512
3,132,606 UART: [art] PUB.Y = 70D581FA3E322DDF656E3F073B603419D58A31C560EC75B384D9CAF87711A650121C5A256D33B563A5774B75359224D2
3,139,547 UART: [art] SIG.R = EF5FB2CF4DA674596DCA1B920DF1E9F9A948EA0C8CA216FFFFB5320C9969E79E3EF8A5D06B4C24A7DEBD0B553422FB37
3,146,331 UART: [art] SIG.S = A0DCC52C07CC80DB451AE047040168D82509A34D0B62D18511728340AA5D18544C41123AA763D0F38809D6B6457B4953
3,170,158 UART: Caliptra RT
3,170,503 UART: [state] CFI Enabled
3,277,893 UART: [rt] RT listening for mailbox commands...
3,278,563 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,711 UART: [rt]cmd =0x41544d4e, len=14344
3,711,565 >>> mbox cmd response data (8 bytes)
3,711,566 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,645 UART: [rt]cmd =0x41545348, len=116
3,743,652 >>> mbox cmd response data (12 bytes)
3,743,653 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,744,442 UART:
3,744,458 UART: Running Caliptra ROM ...
3,744,866 UART:
3,745,008 UART: [state] CFI Enabled
3,747,768 UART: [state] LifecycleState = Unprovisioned
3,748,423 UART: [state] DebugLocked = No
3,749,067 UART: [state] WD Timer not started. Device not locked for debugging
3,750,311 UART: [kat] SHA2-256
4,553,861 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,557,990 UART: [kat] ++
4,558,142 UART: [kat] sha1
4,562,306 UART: [kat] SHA2-256
4,564,246 UART: [kat] SHA2-384
4,567,177 UART: [kat] SHA2-512-ACC
4,569,077 UART: [kat] ECC-384
4,579,290 UART: [kat] HMAC-384Kdf
4,583,866 UART: [kat] LMS
4,832,178 UART: [kat] --
4,832,968 UART: [update-reset] ++
6,145,299 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,146,322 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,296,146 >>> mbox cmd response: success
6,296,146 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,296,473 UART: [update-reset] Copying MAN_2 To MAN_1
6,304,487 UART: [update-reset Success] --
6,305,504 UART: [state] Locking Datavault
6,306,474 UART: [state] Locking PCR0, PCR1 and PCR31
6,307,078 UART: [state] Locking ICCM
6,307,674 UART: [exit] Launching FMC @ 0x40000130
6,313,003 UART:
6,313,019 UART: Running Caliptra FMC ...
6,313,427 UART:
6,313,570 UART: [state] CFI Enabled
6,402,757 UART: [art] Extend RT PCRs Done
6,403,185 UART: [art] Lock RT PCRs Done
6,404,388 UART: [art] Populate DV Done
6,412,309 UART: [fht] FMC Alias Private Key: 7
6,413,289 UART: [art] Derive CDI
6,413,569 UART: [art] Store in in slot 0x4
6,499,338 UART: [art] Derive Key Pair
6,499,698 UART: [art] Store priv key in slot 0x5
6,513,804 UART: [art] Derive Key Pair - Done
6,528,249 UART: [art] Signing Cert with AUTHO
6,528,729 UART: RITY.KEYID = 7
6,543,697 UART: [art] Erasing AUTHORITY.KEYID = 7
6,544,462 UART: [art] PUB.X = 2CBA1B04F71910BA60C86E971A348A720236476485F013FE4417EFD0C457EC8E2CDBF439EF31A4EB82FB21D0103FBE14
6,551,236 UART: [art] PUB.Y = 80D7F9C7012269AE2E0655D72515027EB13038A943219E9992BC468BEB09872874A000D8B85921F7BBB83284C05DA14A
6,558,144 UART: [art] SIG.R = F06ECE0D6737B45DB53D8DAC0C22C685356B92B0B359E829BCC5F656785E9E24B1516EEACEA9D3EFBFB3C7A1F8DC5C95
6,564,932 UART: [art] SIG.S = 4F0C7A5CA66C6EED6EFC429CBD9D97BD7912A5ED753F81DB634FD490F62BE3F0D556D10848A3D02ABFE310169A3657C5
6,588,539 UART: Caliptra RT
6,588,884 UART: [state] CFI Enabled
6,868,923 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,899,798 UART: [rt]cmd =0x41545348, len=116
6,901,537 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,281 ready_for_fw is high
1,056,281 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,010 >>> mbox cmd response: success
2,686,182 UART:
2,686,198 UART: Running Caliptra FMC ...
2,686,606 UART:
2,686,749 UART: [state] CFI Enabled
2,697,326 UART: [fht] FMC Alias Private Key: 7
2,805,443 UART: [art] Extend RT PCRs Done
2,805,871 UART: [art] Lock RT PCRs Done
2,807,559 UART: [art] Populate DV Done
2,815,814 UART: [fht] FMC Alias Private Key: 7
2,816,774 UART: [art] Derive CDI
2,817,054 UART: [art] Store in in slot 0x4
2,902,891 UART: [art] Derive Key Pair
2,903,251 UART: [art] Store priv key in slot 0x5
2,916,141 UART: [art] Derive Key Pair - Done
2,930,725 UART: [art] Signing Cert with AUTHO
2,931,205 UART: RITY.KEYID = 7
2,946,255 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,020 UART: [art] PUB.X = 77464EB73B15D5CCB94F9E555094441D08403BFFB8C7341331F612F1A7AEDF9D592558E2176D190C61DEC01C9591FA5F
2,953,788 UART: [art] PUB.Y = 8DFB34787C175C0F9D8580C1D8427A98186C62BFCCFD9779E8E172AF18204FDEA72A8B435E79C4CB6BC48536ABB22477
2,960,745 UART: [art] SIG.R = DE43C22FD5F45ACF7607D68AB96872840CF2F4B8D60FF9A3B5F2202397D23EBB26712FA1ED626D4A04A7367CC66EA3D6
2,967,517 UART: [art] SIG.S = 011ED92BC4332C15C59095C491D25AEC9A08278FEE10A13A729BBEC03BEE1F7CFF101F8B5AF29C1FAB9C6F41B35394E1
2,991,424 UART: Caliptra RT
2,991,769 UART: [state] CFI Enabled
3,098,766 UART: [rt] RT listening for mailbox commands...
3,099,436 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,398 UART: [rt]cmd =0x41544d4e, len=14344
3,531,984 >>> mbox cmd response data (8 bytes)
3,531,985 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,002 UART: [rt]cmd =0x41545348, len=116
3,563,947 >>> mbox cmd response data (12 bytes)
3,563,948 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,996,542 >>> mbox cmd response: success
5,996,542 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,009,462 UART:
6,009,478 UART: Running Caliptra FMC ...
6,009,886 UART:
6,010,029 UART: [state] CFI Enabled
6,099,620 UART: [art] Extend RT PCRs Done
6,100,048 UART: [art] Lock RT PCRs Done
6,101,365 UART: [art] Populate DV Done
6,109,450 UART: [fht] FMC Alias Private Key: 7
6,110,536 UART: [art] Derive CDI
6,110,816 UART: [art] Store in in slot 0x4
6,196,509 UART: [art] Derive Key Pair
6,196,869 UART: [art] Store priv key in slot 0x5
6,210,371 UART: [art] Derive Key Pair - Done
6,224,951 UART: [art] Signing Cert with AUTHO
6,225,431 UART: RITY.KEYID = 7
6,240,425 UART: [art] Erasing AUTHORITY.KEYID = 7
6,241,190 UART: [art] PUB.X = 63FB06A1FE1BE67E863C185872851912B8C142D6A1D15C30851DF5D37FB31FD7B2158810F985E81764FCA3B5565FE4ED
6,247,961 UART: [art] PUB.Y = 2B096AC541CD0DE30FD7EE4922283880B1DEBEE87CE69CB512D2537AFE986B6C35F4DE3A927C02E92F38C052D5AF0CB7
6,254,914 UART: [art] SIG.R = C5E2BA8375A6EDA9A855105B18F6961E26AE9F671EB3BB268D6D611207492AFB9ED9FB11BBCE52B8818C47BEE72487BB
6,261,697 UART: [art] SIG.S = 9ECC5F8855F3A3DEAE1769A4868032AEDBE243DB6D438C30C7A47C9557DED6C94CFBE085D5F709AC7C1DC94859D274FE
6,285,377 UART: Caliptra RT
6,285,722 UART: [state] CFI Enabled
6,566,648 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,597,573 UART: [rt]cmd =0x41545348, len=116
6,599,572 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,501 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,159 UART: [kat] SHA2-256
882,090 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,205 UART: [kat] ++
886,357 UART: [kat] sha1
890,447 UART: [kat] SHA2-256
892,385 UART: [kat] SHA2-384
895,304 UART: [kat] SHA2-512-ACC
897,205 UART: [kat] ECC-384
902,948 UART: [kat] HMAC-384Kdf
907,526 UART: [kat] LMS
1,475,722 UART: [kat] --
1,476,383 UART: [cold-reset] ++
1,476,913 UART: [fht] Storing FHT @ 0x50003400
1,479,636 UART: [idev] ++
1,479,804 UART: [idev] CDI.KEYID = 6
1,480,164 UART: [idev] SUBJECT.KEYID = 7
1,480,588 UART: [idev] UDS.KEYID = 0
1,480,933 ready_for_fw is high
1,480,933 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,756 UART: [idev] Erasing UDS.KEYID = 0
1,505,402 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,136 UART: [idev] --
1,515,399 UART: [ldev] ++
1,515,567 UART: [ldev] CDI.KEYID = 6
1,515,930 UART: [ldev] SUBJECT.KEYID = 5
1,516,356 UART: [ldev] AUTHORITY.KEYID = 7
1,516,819 UART: [ldev] FE.KEYID = 1
1,522,047 UART: [ldev] Erasing FE.KEYID = 1
1,547,582 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,736 UART: [ldev] --
1,587,135 UART: [fwproc] Waiting for Commands...
1,587,996 UART: [fwproc] Received command 0x46574c44
1,588,787 UART: [fwproc] Received Image of size 114332 bytes
2,886,729 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,375 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,727 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,586 >>> mbox cmd response: success
3,079,602 UART: [afmc] ++
3,079,770 UART: [afmc] CDI.KEYID = 6
3,080,132 UART: [afmc] SUBJECT.KEYID = 7
3,080,557 UART: [afmc] AUTHORITY.KEYID = 5
3,115,968 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,600 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,380 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,108 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,993 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,683 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,698 UART: [afmc] --
3,159,672 UART: [cold-reset] --
3,160,472 UART: [state] Locking Datavault
3,161,425 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,029 UART: [state] Locking ICCM
3,162,661 UART: [exit] Launching FMC @ 0x40000130
3,167,990 UART:
3,168,006 UART: Running Caliptra FMC ...
3,168,414 UART:
3,168,468 UART: [state] CFI Enabled
3,178,613 UART: [fht] FMC Alias Private Key: 7
3,286,634 UART: [art] Extend RT PCRs Done
3,287,062 UART: [art] Lock RT PCRs Done
3,288,754 UART: [art] Populate DV Done
3,297,135 UART: [fht] FMC Alias Private Key: 7
3,298,139 UART: [art] Derive CDI
3,298,419 UART: [art] Store in in slot 0x4
3,383,984 UART: [art] Derive Key Pair
3,384,344 UART: [art] Store priv key in slot 0x5
3,397,718 UART: [art] Derive Key Pair - Done
3,412,357 UART: [art] Signing Cert with AUTHO
3,412,837 UART: RITY.KEYID = 7
3,428,207 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,972 UART: [art] PUB.X = B68D3267486259F3ACEEEA713EFE505016578CE576348FF13F09EBD26F491502450D42412CBB7011CC1D86313831FBD5
3,435,733 UART: [art] PUB.Y = 39650552BE6CFD3ABE172538AC03E1A4B40C2DBEC27AC0E97209B2BFB9E5A90AF64E67504C617D9D248CDA61D928FA41
3,442,684 UART: [art] SIG.R = 915C26C4F2D94909F54DD695B6FA7315280F639FD8E3224EF3D4C52F932ADF56BAB182B31BC74500FEAB111530E532E4
3,449,432 UART: [art] SIG.S = E97C89903B996B7E4D045FFFA1EC8A61C8D1B7283708892164AF5DF4BC7C9B8A84F2F9FF646B76FD264BD24F16E41206
3,472,592 UART: Caliptra RT
3,472,845 UART: [state] CFI Enabled
3,581,937 UART: [rt] RT listening for mailbox commands...
3,582,607 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,655 UART: [rt]cmd =0x41544d4e, len=14344
4,015,339 >>> mbox cmd response data (8 bytes)
4,015,340 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,405 UART: [rt]cmd =0x41545348, len=116
4,066,928 >>> mbox cmd response data (12 bytes)
4,066,929 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,097,028 UART: [rt]cmd =0x41545348, len=116
4,098,725 >>> mbox cmd response data (12 bytes)
4,098,726 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,099,428 UART:
4,099,444 UART: Running Caliptra ROM ...
4,099,852 UART:
4,099,906 UART: [state] CFI Enabled
4,102,468 UART: [state] LifecycleState = Unprovisioned
4,103,123 UART: [state] DebugLocked = No
4,103,725 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,105,304 UART: [kat] SHA2-256
4,899,235 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,903,350 UART: [kat] ++
4,903,502 UART: [kat] sha1
4,907,560 UART: [kat] SHA2-256
4,909,498 UART: [kat] SHA2-384
4,912,389 UART: [kat] SHA2-512-ACC
4,914,289 UART: [kat] ECC-384
4,920,026 UART: [kat] HMAC-384Kdf
4,924,578 UART: [kat] LMS
5,492,774 UART: [kat] --
5,493,489 UART: [update-reset] ++
6,828,763 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,829,909 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,979,785 >>> mbox cmd response: success
6,979,785 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,979,910 UART: [update-reset] Copying MAN_2 To MAN_1
6,987,924 UART: [update-reset Success] --
6,988,927 UART: [state] Locking Datavault
6,989,775 UART: [state] Locking PCR0, PCR1 and PCR31
6,990,379 UART: [state] Locking ICCM
6,990,965 UART: [exit] Launching FMC @ 0x40000130
6,996,294 UART:
6,996,310 UART: Running Caliptra FMC ...
6,996,718 UART:
6,996,772 UART: [state] CFI Enabled
7,085,933 UART: [art] Extend RT PCRs Done
7,086,361 UART: [art] Lock RT PCRs Done
7,087,318 UART: [art] Populate DV Done
7,095,545 UART: [fht] FMC Alias Private Key: 7
7,096,569 UART: [art] Derive CDI
7,096,849 UART: [art] Store in in slot 0x4
7,182,386 UART: [art] Derive Key Pair
7,182,746 UART: [art] Store priv key in slot 0x5
7,195,702 UART: [art] Derive Key Pair - Done
7,210,073 UART: [art] Signing Cert with AUTHO
7,210,553 UART: RITY.KEYID = 7
7,225,713 UART: [art] Erasing AUTHORITY.KEYID = 7
7,226,478 UART: [art] PUB.X = CA13FF760053DAA2750A907219444B6958FCAE7C4902AB5C0BEB97AC01A98195C832093FC586845793267F63AB2564A9
7,233,209 UART: [art] PUB.Y = F8801BCA9D1D4F824F4FE7DF848276CD6C0C9CDF148FC46976EC38D275C3EF346B89608442104FAF6483FB3FAC5AD370
7,240,170 UART: [art] SIG.R = F02FAFDAC5A3BF77D6F6E6884B8372612C1A264F9B90232C242CEB7ED2A2A51458514A7E63E277E9B79AE5021592EFA1
7,246,947 UART: [art] SIG.S = 9A3796C081F9AF31981A15C07E5E64E914C39A161C4827EA0BA22D02FDD7BDB79A98D2D13FD9C239781BA34F2CF22F07
7,270,673 UART: Caliptra RT
7,270,926 UART: [state] CFI Enabled
7,555,980 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,586,825 UART: [rt]cmd =0x41545348, len=116
7,608,596 >>> mbox cmd response data (12 bytes)
7,608,597 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,638,462 UART: [rt]cmd =0x41545348, len=116
7,640,213 >>> mbox cmd response data (12 bytes)
7,640,214 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,762,995 UART: [rt]cmd =0x41544d4e, len=14344
8,073,427 >>> mbox cmd response data (8 bytes)
8,073,428 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,103,303 UART: [rt]cmd =0x41545348, len=116
8,124,784 >>> mbox cmd response data (12 bytes)
8,124,785 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,154,854 UART: [rt]cmd =0x41545348, len=116
8,156,710 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,135 ready_for_fw is high
1,362,135 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,202 >>> mbox cmd response: success
2,988,342 UART:
2,988,358 UART: Running Caliptra FMC ...
2,988,766 UART:
2,988,820 UART: [state] CFI Enabled
2,999,233 UART: [fht] FMC Alias Private Key: 7
3,107,816 UART: [art] Extend RT PCRs Done
3,108,244 UART: [art] Lock RT PCRs Done
3,110,020 UART: [art] Populate DV Done
3,118,371 UART: [fht] FMC Alias Private Key: 7
3,119,473 UART: [art] Derive CDI
3,119,753 UART: [art] Store in in slot 0x4
3,205,092 UART: [art] Derive Key Pair
3,205,452 UART: [art] Store priv key in slot 0x5
3,218,638 UART: [art] Derive Key Pair - Done
3,233,706 UART: [art] Signing Cert with AUTHO
3,234,186 UART: RITY.KEYID = 7
3,249,118 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,883 UART: [art] PUB.X = CD96BEFC723D35C3017DA8B075BA7AE47085EF15471BC1BE0E58225C1D08BC745A8D636D516994AFA342587E45C907D3
3,256,649 UART: [art] PUB.Y = 96994D9BFF5CD0420321E6CC79A43D37259E5749AEE716DA2962840641288882D495ECA49C4C8A68764C5AF72E3F381A
3,263,591 UART: [art] SIG.R = AB4E98BDE02DD64C722CE4E6F5B973C552F6F84A0440E027B97FC9AC49033ED4BC292D3139DE515150D4187F228B66EA
3,270,365 UART: [art] SIG.S = 97A97D5521DC9F653521FA3D21A2CF6B5C088D6463A422C9946C82C9B3BE5C6995E9761B392A46A5B19BDED2D898B962
3,294,387 UART: Caliptra RT
3,294,640 UART: [state] CFI Enabled
3,402,056 UART: [rt] RT listening for mailbox commands...
3,402,726 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,806 UART: [rt]cmd =0x41544d4e, len=14344
3,835,406 >>> mbox cmd response data (8 bytes)
3,835,407 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,322 UART: [rt]cmd =0x41545348, len=116
3,887,529 >>> mbox cmd response data (12 bytes)
3,887,530 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,917,531 UART: [rt]cmd =0x41545348, len=116
3,919,056 >>> mbox cmd response data (12 bytes)
3,919,057 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,682,542 >>> mbox cmd response: success
6,682,542 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,696,071 UART:
6,696,087 UART: Running Caliptra FMC ...
6,696,495 UART:
6,696,549 UART: [state] CFI Enabled
6,784,860 UART: [art] Extend RT PCRs Done
6,785,288 UART: [art] Lock RT PCRs Done
6,786,457 UART: [art] Populate DV Done
6,794,562 UART: [fht] FMC Alias Private Key: 7
6,795,582 UART: [art] Derive CDI
6,795,862 UART: [art] Store in in slot 0x4
6,881,219 UART: [art] Derive Key Pair
6,881,579 UART: [art] Store priv key in slot 0x5
6,894,867 UART: [art] Derive Key Pair - Done
6,909,404 UART: [art] Signing Cert with AUTHO
6,909,884 UART: RITY.KEYID = 7
6,924,834 UART: [art] Erasing AUTHORITY.KEYID = 7
6,925,599 UART: [art] PUB.X = A3C18F43D4F9FF5E39F6A54DB96FBF22329F3FD4F9A5D6798986D96D4D50AB2B3F4DD34017B994205E31EAF3D83515A7
6,932,381 UART: [art] PUB.Y = 67C1F724E60E2ED2500D5D67217C7C6C281AC50C9C83F8ED87C258380B29595CCE603BF2BB5E398EC84C82AFEEBFEA99
6,939,335 UART: [art] SIG.R = 4DC160E19161D2796BA1E33C9BDA12BBD6919E1462AB0E7058171A42A5A7F6EE9715614562C878CDDBF14C837BFE6D36
6,946,110 UART: [art] SIG.S = FB0AEE1302561B7E5C357DD454F6C31267E9F8A0920A9FD3A624D031F945545DFC21A139C7B9B590DC574D77B6026EE2
6,969,117 UART: Caliptra RT
6,969,370 UART: [state] CFI Enabled
7,249,811 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,280,752 UART: [rt]cmd =0x41545348, len=116
7,302,705 >>> mbox cmd response data (12 bytes)
7,302,706 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,332,865 UART: [rt]cmd =0x41545348, len=116
7,334,730 >>> mbox cmd response data (12 bytes)
7,334,731 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,457,456 UART: [rt]cmd =0x41544d4e, len=14344
7,766,994 >>> mbox cmd response data (8 bytes)
7,766,995 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,796,976 UART: [rt]cmd =0x41545348, len=116
7,818,861 >>> mbox cmd response data (12 bytes)
7,818,862 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,848,941 UART: [rt]cmd =0x41545348, len=116
7,850,563 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,632 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,262 UART: [kat] SHA2-256
882,193 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,308 UART: [kat] ++
886,460 UART: [kat] sha1
890,536 UART: [kat] SHA2-256
892,474 UART: [kat] SHA2-384
895,035 UART: [kat] SHA2-512-ACC
896,936 UART: [kat] ECC-384
902,421 UART: [kat] HMAC-384Kdf
907,027 UART: [kat] LMS
1,475,223 UART: [kat] --
1,476,158 UART: [cold-reset] ++
1,476,554 UART: [fht] Storing FHT @ 0x50003400
1,479,383 UART: [idev] ++
1,479,551 UART: [idev] CDI.KEYID = 6
1,479,911 UART: [idev] SUBJECT.KEYID = 7
1,480,335 UART: [idev] UDS.KEYID = 0
1,480,680 ready_for_fw is high
1,480,680 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,317 UART: [idev] Erasing UDS.KEYID = 0
1,505,001 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,497 UART: [idev] --
1,514,480 UART: [ldev] ++
1,514,648 UART: [ldev] CDI.KEYID = 6
1,515,011 UART: [ldev] SUBJECT.KEYID = 5
1,515,437 UART: [ldev] AUTHORITY.KEYID = 7
1,515,900 UART: [ldev] FE.KEYID = 1
1,521,372 UART: [ldev] Erasing FE.KEYID = 1
1,546,775 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,781 UART: [ldev] --
1,586,042 UART: [fwproc] Waiting for Commands...
1,586,685 UART: [fwproc] Received command 0x46574c44
1,587,476 UART: [fwproc] Received Image of size 114332 bytes
2,885,062 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,794 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,146 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,135 >>> mbox cmd response: success
3,078,143 UART: [afmc] ++
3,078,311 UART: [afmc] CDI.KEYID = 6
3,078,673 UART: [afmc] SUBJECT.KEYID = 7
3,079,098 UART: [afmc] AUTHORITY.KEYID = 5
3,114,213 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,253 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,033 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,761 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,646 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,336 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,251 UART: [afmc] --
3,157,271 UART: [cold-reset] --
3,158,167 UART: [state] Locking Datavault
3,159,422 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,026 UART: [state] Locking ICCM
3,160,698 UART: [exit] Launching FMC @ 0x40000130
3,166,027 UART:
3,166,043 UART: Running Caliptra FMC ...
3,166,451 UART:
3,166,594 UART: [state] CFI Enabled
3,177,227 UART: [fht] FMC Alias Private Key: 7
3,285,142 UART: [art] Extend RT PCRs Done
3,285,570 UART: [art] Lock RT PCRs Done
3,286,944 UART: [art] Populate DV Done
3,294,925 UART: [fht] FMC Alias Private Key: 7
3,295,853 UART: [art] Derive CDI
3,296,133 UART: [art] Store in in slot 0x4
3,381,760 UART: [art] Derive Key Pair
3,382,120 UART: [art] Store priv key in slot 0x5
3,395,804 UART: [art] Derive Key Pair - Done
3,409,965 UART: [art] Signing Cert with AUTHO
3,410,445 UART: RITY.KEYID = 7
3,426,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,832 UART: [art] PUB.X = B16A41EE9A26FE542747FECA60AD208A6576108AD72DCB70621852C11775D8DC87A57810F64A5BE6B69EA67C247B11B1
3,433,608 UART: [art] PUB.Y = 70AD9C11CAA17F11C0BB633399091D3F52EF7F07D00A0D06C05D685624EA70128735BFCD34FDB90CA3D294B184CFB951
3,440,550 UART: [art] SIG.R = E73BD3035C4B5CCB8B99FDA872DF799AEC16B67EDE6A558A48B6EDBD14ED95CB4395F9A64AD1608963756B3C671289AD
3,447,335 UART: [art] SIG.S = AC780DBDE248BC83EF86819A06B20C611747D60322DD5764BAA896812CEB0AE51CF820CC78E1CD08F6BF6953CBF6C93C
3,471,148 UART: Caliptra RT
3,471,493 UART: [state] CFI Enabled
3,580,715 UART: [rt] RT listening for mailbox commands...
3,581,385 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,199 UART: [rt]cmd =0x41544d4e, len=14344
4,014,139 >>> mbox cmd response data (8 bytes)
4,014,140 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,217 UART: [rt]cmd =0x41545348, len=116
4,066,286 >>> mbox cmd response data (12 bytes)
4,066,287 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,096,384 UART: [rt]cmd =0x41545348, len=116
4,098,201 >>> mbox cmd response data (12 bytes)
4,098,202 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,098,968 UART:
4,098,984 UART: Running Caliptra ROM ...
4,099,392 UART:
4,099,533 UART: [state] CFI Enabled
4,102,185 UART: [state] LifecycleState = Unprovisioned
4,102,840 UART: [state] DebugLocked = No
4,103,504 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,105,141 UART: [kat] SHA2-256
4,899,072 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,903,187 UART: [kat] ++
4,903,339 UART: [kat] sha1
4,907,583 UART: [kat] SHA2-256
4,909,521 UART: [kat] SHA2-384
4,912,414 UART: [kat] SHA2-512-ACC
4,914,314 UART: [kat] ECC-384
4,919,967 UART: [kat] HMAC-384Kdf
4,924,467 UART: [kat] LMS
5,492,663 UART: [kat] --
5,493,694 UART: [update-reset] ++
6,828,548 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,829,760 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,979,636 >>> mbox cmd response: success
6,979,636 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,979,895 UART: [update-reset] Copying MAN_2 To MAN_1
6,987,909 UART: [update-reset Success] --
6,988,654 UART: [state] Locking Datavault
6,989,524 UART: [state] Locking PCR0, PCR1 and PCR31
6,990,128 UART: [state] Locking ICCM
6,990,594 UART: [exit] Launching FMC @ 0x40000130
6,995,923 UART:
6,995,939 UART: Running Caliptra FMC ...
6,996,347 UART:
6,996,490 UART: [state] CFI Enabled
7,085,723 UART: [art] Extend RT PCRs Done
7,086,151 UART: [art] Lock RT PCRs Done
7,087,414 UART: [art] Populate DV Done
7,095,535 UART: [fht] FMC Alias Private Key: 7
7,096,609 UART: [art] Derive CDI
7,096,889 UART: [art] Store in in slot 0x4
7,182,764 UART: [art] Derive Key Pair
7,183,124 UART: [art] Store priv key in slot 0x5
7,196,546 UART: [art] Derive Key Pair - Done
7,211,382 UART: [art] Signing Cert with AUTHO
7,211,862 UART: RITY.KEYID = 7
7,226,754 UART: [art] Erasing AUTHORITY.KEYID = 7
7,227,519 UART: [art] PUB.X = 35952B8BC93A1B920E79158F1B7C0357001045A51FF8DDF887CD4AA42E416EC2F18A34BF69553815877D8C98E0EE8D1A
7,234,265 UART: [art] PUB.Y = 5EBADE608DDA9542C44A585BD6CEE9A090E4FDCB9CAAF632220C4567B3A408C691BD0FB94936561B2175989A4F637CB9
7,241,220 UART: [art] SIG.R = 1D9C40D41BDEDD4D6568B6532BFD12EF2EA11348E99C4960E26CD03678A7E9E7D1020BE4CA0F2C9D9BC4B9B9940DF86C
7,247,996 UART: [art] SIG.S = 2696BECEDFAD57FB10FE5C972B6EE154EB565FA88692CA6154BDC59ACD93A1183F42DDA3EE3B5366A9E38645DE2239F8
7,271,955 UART: Caliptra RT
7,272,300 UART: [state] CFI Enabled
7,553,168 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,583,991 UART: [rt]cmd =0x41545348, len=116
7,605,836 >>> mbox cmd response data (12 bytes)
7,605,837 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,635,838 UART: [rt]cmd =0x41545348, len=116
7,637,875 >>> mbox cmd response data (12 bytes)
7,637,876 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,760,273 UART: [rt]cmd =0x41544d4e, len=14344
8,069,973 >>> mbox cmd response data (8 bytes)
8,069,974 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,099,915 UART: [rt]cmd =0x41545348, len=116
8,121,910 >>> mbox cmd response data (12 bytes)
8,121,911 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,151,932 UART: [rt]cmd =0x41545348, len=116
8,153,570 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,308 ready_for_fw is high
1,363,308 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,443 >>> mbox cmd response: success
2,991,363 UART:
2,991,379 UART: Running Caliptra FMC ...
2,991,787 UART:
2,991,930 UART: [state] CFI Enabled
3,002,859 UART: [fht] FMC Alias Private Key: 7
3,110,556 UART: [art] Extend RT PCRs Done
3,110,984 UART: [art] Lock RT PCRs Done
3,112,598 UART: [art] Populate DV Done
3,120,849 UART: [fht] FMC Alias Private Key: 7
3,121,841 UART: [art] Derive CDI
3,122,121 UART: [art] Store in in slot 0x4
3,208,006 UART: [art] Derive Key Pair
3,208,366 UART: [art] Store priv key in slot 0x5
3,221,582 UART: [art] Derive Key Pair - Done
3,236,201 UART: [art] Signing Cert with AUTHO
3,236,681 UART: RITY.KEYID = 7
3,251,993 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,758 UART: [art] PUB.X = 67546F11D0A7E49E3A87F5066B62CF1F4B2BB5C512625FBFF25C646D37C64F799CDDA9AA541B42C807428610D9D65942
3,259,526 UART: [art] PUB.Y = E21B8FAE6489878BC2E8C1B6594371F91CFC63B1374E681F6CFFCD9FA7B0D163699E4B04734F10314B4061CF8B44BC1B
3,266,483 UART: [art] SIG.R = 307BC89FD76D888AD00E7669690171C12CE4EA92C8CB292652A1F7BA446A192439CDA3CBFB902B1E6B07FD0C720C3710
3,273,246 UART: [art] SIG.S = 5BFC30905A5D89FCDBCA15EDDF7E91BDCA4CEDED4B8619FAD607F83B0353AF3577F36456CF32EFB611BB42D7965F4BB7
3,296,911 UART: Caliptra RT
3,297,256 UART: [state] CFI Enabled
3,405,772 UART: [rt] RT listening for mailbox commands...
3,406,442 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,574 UART: [rt]cmd =0x41544d4e, len=14344
3,839,278 >>> mbox cmd response data (8 bytes)
3,839,279 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,869,676 UART: [rt]cmd =0x41545348, len=116
3,891,415 >>> mbox cmd response data (12 bytes)
3,891,416 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,921,643 UART: [rt]cmd =0x41545348, len=116
3,923,456 >>> mbox cmd response data (12 bytes)
3,923,457 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,686,057 >>> mbox cmd response: success
6,686,057 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,699,620 UART:
6,699,636 UART: Running Caliptra FMC ...
6,700,044 UART:
6,700,187 UART: [state] CFI Enabled
6,789,470 UART: [art] Extend RT PCRs Done
6,789,898 UART: [art] Lock RT PCRs Done
6,790,899 UART: [art] Populate DV Done
6,799,038 UART: [fht] FMC Alias Private Key: 7
6,800,044 UART: [art] Derive CDI
6,800,324 UART: [art] Store in in slot 0x4
6,886,299 UART: [art] Derive Key Pair
6,886,659 UART: [art] Store priv key in slot 0x5
6,900,041 UART: [art] Derive Key Pair - Done
6,914,959 UART: [art] Signing Cert with AUTHO
6,915,439 UART: RITY.KEYID = 7
6,930,695 UART: [art] Erasing AUTHORITY.KEYID = 7
6,931,460 UART: [art] PUB.X = 855CB64E7559053517488C92341D04707C0FA4C9CDE88143897FCF986B1D0D15CC1CFF5FE6EADE589BE4BBC8B6229DD8
6,938,230 UART: [art] PUB.Y = 0326336196ADD138F2271D1CCB30792581A5B06849607F02DBB1FFE4E0DF3E2A8AE1C48BAB9312DD6677A80E27A4D668
6,945,177 UART: [art] SIG.R = 8D7F70BFA4008AC711B65109CAA3882E36E4A4B87D685D02A211B0364E027E70109650CE0341C3C84CDB6D6BBC0384CE
6,951,916 UART: [art] SIG.S = B732613F230E0FF761D24D85D68EB4B12AE0F16E85434B7B0126A65917B39E2F75586CB073DB5F762BE8E7988994C266
6,976,092 UART: Caliptra RT
6,976,437 UART: [state] CFI Enabled
7,253,731 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,284,674 UART: [rt]cmd =0x41545348, len=116
7,306,639 >>> mbox cmd response data (12 bytes)
7,306,640 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,336,781 UART: [rt]cmd =0x41545348, len=116
7,338,782 >>> mbox cmd response data (12 bytes)
7,338,783 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,461,418 UART: [rt]cmd =0x41544d4e, len=14344
7,771,786 >>> mbox cmd response data (8 bytes)
7,771,787 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,801,966 UART: [rt]cmd =0x41545348, len=116
7,823,125 >>> mbox cmd response data (12 bytes)
7,823,126 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,853,213 UART: [rt]cmd =0x41545348, len=116
7,854,961 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
86,031 UART: [state] WD Timer not started. Device not locked for debugging
87,158 UART: [kat] SHA2-256
892,808 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,933 UART: [kat] ++
897,085 UART: [kat] sha1
901,499 UART: [kat] SHA2-256
903,439 UART: [kat] SHA2-384
906,278 UART: [kat] SHA2-512-ACC
908,179 UART: [kat] ECC-384
917,774 UART: [kat] HMAC-384Kdf
922,308 UART: [kat] LMS
1,170,636 UART: [kat] --
1,171,427 UART: [cold-reset] ++
1,171,835 UART: [fht] FHT @ 0x50003400
1,174,508 UART: [idev] ++
1,174,676 UART: [idev] CDI.KEYID = 6
1,175,036 UART: [idev] SUBJECT.KEYID = 7
1,175,460 UART: [idev] UDS.KEYID = 0
1,175,805 ready_for_fw is high
1,175,805 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,338 UART: [idev] Erasing UDS.KEYID = 0
1,200,159 UART: [idev] Sha1 KeyId Algorithm
1,208,665 UART: [idev] --
1,209,607 UART: [ldev] ++
1,209,775 UART: [ldev] CDI.KEYID = 6
1,210,138 UART: [ldev] SUBJECT.KEYID = 5
1,210,564 UART: [ldev] AUTHORITY.KEYID = 7
1,211,027 UART: [ldev] FE.KEYID = 1
1,216,229 UART: [ldev] Erasing FE.KEYID = 1
1,242,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,223 UART: [ldev] --
1,281,596 UART: [fwproc] Wait for Commands...
1,282,286 UART: [fwproc] Recv command 0x46574c44
1,283,014 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,797 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,036 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,340 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,087 >>> mbox cmd response: success
2,773,339 UART: [afmc] ++
2,773,507 UART: [afmc] CDI.KEYID = 6
2,773,869 UART: [afmc] SUBJECT.KEYID = 7
2,774,294 UART: [afmc] AUTHORITY.KEYID = 5
2,809,585 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,154 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,902 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,630 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,515 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,234 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,110 UART: [afmc] --
2,853,090 UART: [cold-reset] --
2,853,842 UART: [state] Locking Datavault
2,855,363 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,967 UART: [state] Locking ICCM
2,856,641 UART: [exit] Launching FMC @ 0x40000130
2,861,970 UART:
2,861,986 UART: Running Caliptra FMC ...
2,862,394 UART:
2,862,448 UART: [state] CFI Enabled
2,872,877 UART: [fht] FMC Alias Private Key: 7
2,980,416 UART: [art] Extend RT PCRs Done
2,980,844 UART: [art] Lock RT PCRs Done
2,982,286 UART: [art] Populate DV Done
2,990,619 UART: [fht] FMC Alias Private Key: 7
2,991,775 UART: [art] Derive CDI
2,992,055 UART: [art] Store in in slot 0x4
3,078,158 UART: [art] Derive Key Pair
3,078,518 UART: [art] Store priv key in slot 0x5
3,091,860 UART: [art] Derive Key Pair - Done
3,106,597 UART: [art] Signing Cert with AUTHO
3,107,077 UART: RITY.KEYID = 7
3,122,201 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,966 UART: [art] PUB.X = AAF8D6DC778C88ABCB9469A74A7C5BA1FE70C4ECC8DA02E55D82607FCFB68825C0674EC8FF7F14C737CA66A9C52DCE91
3,129,759 UART: [art] PUB.Y = CB445233AAA82D4016BE1D8E71B604F1ADC520B3976A9A277E2D48432172CAEFA5943335848F1743A2EDF1FE03C4B271
3,136,709 UART: [art] SIG.R = DEC3941DD966E26FAA8192E355032FEE5C901668DEB023D30A3E26DB3446B3515C5E20435C692B084B4BD89BC28B2D64
3,143,476 UART: [art] SIG.S = 07769DDD95B78AD3CD70FC45F2D14E9887AD62EAA78DD892A008D1EB3E9E85D18626D6B24B4B6BB0A6F1C5F266BC96DB
3,167,457 UART: Caliptra RT
3,167,710 UART: [state] CFI Enabled
3,275,377 UART: [rt] RT listening for mailbox commands...
3,276,047 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,961 UART: [rt]cmd =0x41544d4e, len=14344
3,709,053 >>> mbox cmd response data (8 bytes)
3,709,054 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,101 UART: [rt]cmd =0x41545348, len=116
3,761,056 >>> mbox cmd response data (12 bytes)
3,761,057 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,928 UART: [rt]cmd =0x41545348, len=116
3,792,601 >>> mbox cmd response data (12 bytes)
3,792,602 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,793,285 UART:
3,793,301 UART: Running Caliptra ROM ...
3,793,709 UART:
3,793,764 UART: [state] CFI Enabled
3,796,734 UART: [state] LifecycleState = Unprovisioned
3,797,389 UART: [state] DebugLocked = No
3,797,901 UART: [state] WD Timer not started. Device not locked for debugging
3,799,203 UART: [kat] SHA2-256
4,604,853 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,608,978 UART: [kat] ++
4,609,130 UART: [kat] sha1
4,613,294 UART: [kat] SHA2-256
4,615,234 UART: [kat] SHA2-384
4,618,027 UART: [kat] SHA2-512-ACC
4,619,927 UART: [kat] ECC-384
4,629,594 UART: [kat] HMAC-384Kdf
4,634,320 UART: [kat] LMS
4,882,648 UART: [kat] --
4,883,668 UART: [update-reset] ++
6,196,454 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,197,479 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,347,303 >>> mbox cmd response: success
6,347,303 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,347,488 UART: [update-reset] Copying MAN_2 To MAN_1
6,355,502 UART: [update-reset Success] --
6,356,707 UART: [state] Locking Datavault
6,357,663 UART: [state] Locking PCR0, PCR1 and PCR31
6,358,267 UART: [state] Locking ICCM
6,358,749 UART: [exit] Launching FMC @ 0x40000130
6,364,078 UART:
6,364,094 UART: Running Caliptra FMC ...
6,364,502 UART:
6,364,556 UART: [state] CFI Enabled
6,453,677 UART: [art] Extend RT PCRs Done
6,454,105 UART: [art] Lock RT PCRs Done
6,455,424 UART: [art] Populate DV Done
6,463,795 UART: [fht] FMC Alias Private Key: 7
6,464,961 UART: [art] Derive CDI
6,465,241 UART: [art] Store in in slot 0x4
6,550,372 UART: [art] Derive Key Pair
6,550,732 UART: [art] Store priv key in slot 0x5
6,563,288 UART: [art] Derive Key Pair - Done
6,577,799 UART: [art] Signing Cert with AUTHO
6,578,279 UART: RITY.KEYID = 7
6,593,459 UART: [art] Erasing AUTHORITY.KEYID = 7
6,594,224 UART: [art] PUB.X = 57E2D262810460258F981E745B2444FE70917F1F7AAB7D55E5B0DF198AE1AAF066528BF7AEDDF3676244439DF00C480B
6,600,989 UART: [art] PUB.Y = B5D176091D3C1B44A591F21A722472C298C7739BF5AE7B852008A2D5CC3983A1EC326E710667223F0C72D78E4F838530
6,607,921 UART: [art] SIG.R = F79E78A876D9E60550C1E8533B13F15A47763D9E7F061107E45A7E1459D9FEBFF4F67449C03FBEE8F521988215516C4F
6,614,682 UART: [art] SIG.S = 2D10D531E8FC60EC80B34263A839A74F86919D4A7293B095AC562BBD305BF709030322BAA78535ABD43778F872CFCB75
6,638,880 UART: Caliptra RT
6,639,133 UART: [state] CFI Enabled
6,919,796 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,950,627 UART: [rt]cmd =0x41545348, len=116
6,973,276 >>> mbox cmd response data (12 bytes)
6,973,277 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,003,230 UART: [rt]cmd =0x41545348, len=116
7,005,123 >>> mbox cmd response data (12 bytes)
7,005,124 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,127,683 UART: [rt]cmd =0x41544d4e, len=14344
7,437,743 >>> mbox cmd response data (8 bytes)
7,437,744 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,468,133 UART: [rt]cmd =0x41545348, len=116
7,489,804 >>> mbox cmd response data (12 bytes)
7,489,805 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,520,134 UART: [rt]cmd =0x41545348, len=116
7,521,900 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,789 ready_for_fw is high
1,060,789 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,378 >>> mbox cmd response: success
2,689,918 UART:
2,689,934 UART: Running Caliptra FMC ...
2,690,342 UART:
2,690,396 UART: [state] CFI Enabled
2,700,549 UART: [fht] FMC Alias Private Key: 7
2,808,782 UART: [art] Extend RT PCRs Done
2,809,210 UART: [art] Lock RT PCRs Done
2,810,182 UART: [art] Populate DV Done
2,818,759 UART: [fht] FMC Alias Private Key: 7
2,819,721 UART: [art] Derive CDI
2,820,001 UART: [art] Store in in slot 0x4
2,905,786 UART: [art] Derive Key Pair
2,906,146 UART: [art] Store priv key in slot 0x5
2,919,424 UART: [art] Derive Key Pair - Done
2,933,993 UART: [art] Signing Cert with AUTHO
2,934,473 UART: RITY.KEYID = 7
2,949,489 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,254 UART: [art] PUB.X = 8E742F86EA8D28E2B142B7AF7145836A88587F6ED4B0059AA9BED0B2FCFC11DDB681224279F9F1A06F875FFEB82DE403
2,957,032 UART: [art] PUB.Y = 6D9C6758FECEBE894FA835FDD4FF393C24C20A56221ED698A778014F013656047F4FEED33C3DFF61FAB261429DA9B718
2,963,982 UART: [art] SIG.R = 804C49B8F0FEB3D73D1232C97B04C72D6A5314A6D57732E23EA17AA699E3AA5E5C36792D3129CC9C808B8C11C1FF5963
2,970,755 UART: [art] SIG.S = 46C964FA377639E4A1500D6D9E24B65A3EB38E6D4BC7ABA3F647876E9249059473019BE81AC6C23091D6864A5B73FF68
2,994,575 UART: Caliptra RT
2,994,828 UART: [state] CFI Enabled
3,102,669 UART: [rt] RT listening for mailbox commands...
3,103,339 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,385 UART: [rt]cmd =0x41544d4e, len=14344
3,536,263 >>> mbox cmd response data (8 bytes)
3,536,264 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,566,451 UART: [rt]cmd =0x41545348, len=116
3,588,758 >>> mbox cmd response data (12 bytes)
3,588,759 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,734 UART: [rt]cmd =0x41545348, len=116
3,620,719 >>> mbox cmd response data (12 bytes)
3,620,720 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,058,094 >>> mbox cmd response: success
6,058,094 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,071,344 UART:
6,071,360 UART: Running Caliptra FMC ...
6,071,768 UART:
6,071,822 UART: [state] CFI Enabled
6,160,771 UART: [art] Extend RT PCRs Done
6,161,199 UART: [art] Lock RT PCRs Done
6,162,442 UART: [art] Populate DV Done
6,170,783 UART: [fht] FMC Alias Private Key: 7
6,171,827 UART: [art] Derive CDI
6,172,107 UART: [art] Store in in slot 0x4
6,258,002 UART: [art] Derive Key Pair
6,258,362 UART: [art] Store priv key in slot 0x5
6,271,622 UART: [art] Derive Key Pair - Done
6,285,902 UART: [art] Signing Cert with AUTHO
6,286,382 UART: RITY.KEYID = 7
6,301,434 UART: [art] Erasing AUTHORITY.KEYID = 7
6,302,199 UART: [art] PUB.X = 98A14364113A3A3C6AB081AFC15B6D4DDE180FC8AD9107E4EDC752AD5E3493854B311FCD983546246C3014C77AAC0119
6,308,966 UART: [art] PUB.Y = 5EACB41B870B7B4056B20BFD8408011D6AC9AEC0D7D59854385E5D74489C75803BEDA2AE5B6678CEA6732DBD88B950E2
6,315,916 UART: [art] SIG.R = 188F4AC4E99D09BB43DA3BD670EBAE7F6784ACF8B1E46FED831A6F3283D973289CED19E70C282EF4B3A8372E16965A84
6,322,694 UART: [art] SIG.S = D8419BC0F81B9953AE0AE4CCAE46DE7C2020DDFA87B7C9F5A77F6927C8D5CE7F385DFA673150FE0027F678D3F000290F
6,346,279 UART: Caliptra RT
6,346,532 UART: [state] CFI Enabled
6,626,805 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,657,500 UART: [rt]cmd =0x41545348, len=116
6,680,037 >>> mbox cmd response data (12 bytes)
6,680,038 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,710,049 UART: [rt]cmd =0x41545348, len=116
6,711,696 >>> mbox cmd response data (12 bytes)
6,711,697 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,834,246 UART: [rt]cmd =0x41544d4e, len=14344
7,143,514 >>> mbox cmd response data (8 bytes)
7,143,515 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,173,808 UART: [rt]cmd =0x41545348, len=116
7,196,051 >>> mbox cmd response data (12 bytes)
7,196,052 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,226,165 UART: [rt]cmd =0x41545348, len=116
7,227,797 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Unprovisioned
86,418 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,231 UART: [kat] SHA2-256
893,881 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,006 UART: [kat] ++
898,158 UART: [kat] sha1
902,326 UART: [kat] SHA2-256
904,266 UART: [kat] SHA2-384
906,937 UART: [kat] SHA2-512-ACC
908,838 UART: [kat] ECC-384
918,553 UART: [kat] HMAC-384Kdf
923,055 UART: [kat] LMS
1,171,383 UART: [kat] --
1,172,264 UART: [cold-reset] ++
1,172,732 UART: [fht] FHT @ 0x50003400
1,175,227 UART: [idev] ++
1,175,395 UART: [idev] CDI.KEYID = 6
1,175,755 UART: [idev] SUBJECT.KEYID = 7
1,176,179 UART: [idev] UDS.KEYID = 0
1,176,524 ready_for_fw is high
1,176,524 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,827 UART: [idev] Erasing UDS.KEYID = 0
1,201,444 UART: [idev] Sha1 KeyId Algorithm
1,210,058 UART: [idev] --
1,211,128 UART: [ldev] ++
1,211,296 UART: [ldev] CDI.KEYID = 6
1,211,659 UART: [ldev] SUBJECT.KEYID = 5
1,212,085 UART: [ldev] AUTHORITY.KEYID = 7
1,212,548 UART: [ldev] FE.KEYID = 1
1,217,778 UART: [ldev] Erasing FE.KEYID = 1
1,244,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,396 UART: [ldev] --
1,283,703 UART: [fwproc] Wait for Commands...
1,284,423 UART: [fwproc] Recv command 0x46574c44
1,285,151 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,371 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,675 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,584 >>> mbox cmd response: success
2,775,678 UART: [afmc] ++
2,775,846 UART: [afmc] CDI.KEYID = 6
2,776,208 UART: [afmc] SUBJECT.KEYID = 7
2,776,633 UART: [afmc] AUTHORITY.KEYID = 5
2,812,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,103 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,851 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,579 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,464 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,183 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,061 UART: [afmc] --
2,856,153 UART: [cold-reset] --
2,856,983 UART: [state] Locking Datavault
2,858,006 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,610 UART: [state] Locking ICCM
2,859,254 UART: [exit] Launching FMC @ 0x40000130
2,864,583 UART:
2,864,599 UART: Running Caliptra FMC ...
2,865,007 UART:
2,865,150 UART: [state] CFI Enabled
2,875,583 UART: [fht] FMC Alias Private Key: 7
2,984,152 UART: [art] Extend RT PCRs Done
2,984,580 UART: [art] Lock RT PCRs Done
2,986,214 UART: [art] Populate DV Done
2,994,451 UART: [fht] FMC Alias Private Key: 7
2,995,543 UART: [art] Derive CDI
2,995,823 UART: [art] Store in in slot 0x4
3,081,354 UART: [art] Derive Key Pair
3,081,714 UART: [art] Store priv key in slot 0x5
3,094,864 UART: [art] Derive Key Pair - Done
3,109,861 UART: [art] Signing Cert with AUTHO
3,110,341 UART: RITY.KEYID = 7
3,125,321 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,086 UART: [art] PUB.X = E5A8AA607E63404B92573B0F10CAB275B661714D2DA8CC29821CF4D7CB1CFF9396C3938FF4E963C31C1D25191A619A69
3,132,859 UART: [art] PUB.Y = 5DE99A94555C27966D782AB52F92161501D3EE165A136E6FEBA2B45DEAB7C7582279A37243373C12DCBBAF6F96546526
3,139,808 UART: [art] SIG.R = 0E5D799A6F60CD61B82D4D323FD3D12CC88D6880E3B723CFE04EE4CD9CE663DDEA765A169550F9BBBE0EAE82A83CEF9A
3,146,598 UART: [art] SIG.S = A7AEF65F588481DEC957C79521783D31CB4ACE58C6AABB21DCC1961EC1C77A77AD0056FE79B79DD640AAE0F408445A1A
3,170,132 UART: Caliptra RT
3,170,477 UART: [state] CFI Enabled
3,278,976 UART: [rt] RT listening for mailbox commands...
3,279,646 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,896 UART: [rt]cmd =0x41544d4e, len=14344
3,712,686 >>> mbox cmd response data (8 bytes)
3,712,687 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,752 UART: [rt]cmd =0x41545348, len=116
3,763,979 >>> mbox cmd response data (12 bytes)
3,763,980 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,794,245 UART: [rt]cmd =0x41545348, len=116
3,795,972 >>> mbox cmd response data (12 bytes)
3,795,973 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,796,786 UART:
3,796,802 UART: Running Caliptra ROM ...
3,797,210 UART:
3,797,352 UART: [state] CFI Enabled
3,800,314 UART: [state] LifecycleState = Unprovisioned
3,800,969 UART: [state] DebugLocked = No
3,801,471 UART: [state] WD Timer not started. Device not locked for debugging
3,802,663 UART: [kat] SHA2-256
4,608,313 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,612,438 UART: [kat] ++
4,612,590 UART: [kat] sha1
4,616,618 UART: [kat] SHA2-256
4,618,558 UART: [kat] SHA2-384
4,621,155 UART: [kat] SHA2-512-ACC
4,623,055 UART: [kat] ECC-384
4,632,990 UART: [kat] HMAC-384Kdf
4,637,654 UART: [kat] LMS
4,885,982 UART: [kat] --
4,887,006 UART: [update-reset] ++
6,199,768 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,200,805 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,350,629 >>> mbox cmd response: success
6,350,629 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,350,766 UART: [update-reset] Copying MAN_2 To MAN_1
6,358,780 UART: [update-reset Success] --
6,359,667 UART: [state] Locking Datavault
6,360,411 UART: [state] Locking PCR0, PCR1 and PCR31
6,361,015 UART: [state] Locking ICCM
6,361,485 UART: [exit] Launching FMC @ 0x40000130
6,366,814 UART:
6,366,830 UART: Running Caliptra FMC ...
6,367,238 UART:
6,367,381 UART: [state] CFI Enabled
6,456,684 UART: [art] Extend RT PCRs Done
6,457,112 UART: [art] Lock RT PCRs Done
6,458,391 UART: [art] Populate DV Done
6,466,594 UART: [fht] FMC Alias Private Key: 7
6,467,700 UART: [art] Derive CDI
6,467,980 UART: [art] Store in in slot 0x4
6,553,309 UART: [art] Derive Key Pair
6,553,669 UART: [art] Store priv key in slot 0x5
6,567,155 UART: [art] Derive Key Pair - Done
6,581,531 UART: [art] Signing Cert with AUTHO
6,582,011 UART: RITY.KEYID = 7
6,597,259 UART: [art] Erasing AUTHORITY.KEYID = 7
6,598,024 UART: [art] PUB.X = 739EDD1CEA2CE4B78E27FE24D60BC03DC9561090052E7D5D5854B0EA6ED713DD54CBF18114C7145731CF940EF9162C68
6,604,795 UART: [art] PUB.Y = 5D3B472570F7BD8A008B1C792AD0EA9DD89B5A65788E350C0CCF8842B19E5EAD2CFCB1DFCBE6D48C6B1B036E7E54D3B3
6,611,738 UART: [art] SIG.R = 8A399F3FC62FB3CCCF4ED1C72363B74B53EDD2F06BB753645AF8F24E383FFDBD856ACCFA396AA56EC000EFE84CFB148B
6,618,516 UART: [art] SIG.S = 3FC5C13551F83460691CC537BA2FD4BC36744933CA207E01EDAF081C66FCFFC7DBEAAD59203B4E646ED225295025BE65
6,642,647 UART: Caliptra RT
6,642,992 UART: [state] CFI Enabled
6,925,033 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,956,040 UART: [rt]cmd =0x41545348, len=116
6,978,761 >>> mbox cmd response data (12 bytes)
6,978,762 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,008,707 UART: [rt]cmd =0x41545348, len=116
7,010,196 >>> mbox cmd response data (12 bytes)
7,010,197 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,132,680 UART: [rt]cmd =0x41544d4e, len=14344
7,442,374 >>> mbox cmd response data (8 bytes)
7,442,375 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,472,658 UART: [rt]cmd =0x41545348, len=116
7,494,945 >>> mbox cmd response data (12 bytes)
7,494,946 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,524,757 UART: [rt]cmd =0x41545348, len=116
7,526,255 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,338 ready_for_fw is high
1,060,338 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,231 >>> mbox cmd response: success
2,689,005 UART:
2,689,021 UART: Running Caliptra FMC ...
2,689,429 UART:
2,689,572 UART: [state] CFI Enabled
2,700,059 UART: [fht] FMC Alias Private Key: 7
2,807,784 UART: [art] Extend RT PCRs Done
2,808,212 UART: [art] Lock RT PCRs Done
2,810,180 UART: [art] Populate DV Done
2,818,261 UART: [fht] FMC Alias Private Key: 7
2,819,189 UART: [art] Derive CDI
2,819,469 UART: [art] Store in in slot 0x4
2,905,016 UART: [art] Derive Key Pair
2,905,376 UART: [art] Store priv key in slot 0x5
2,918,446 UART: [art] Derive Key Pair - Done
2,933,372 UART: [art] Signing Cert with AUTHO
2,933,852 UART: RITY.KEYID = 7
2,949,162 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,927 UART: [art] PUB.X = 229BE51BC12C17F54E6779FB7BE21177D64C8DA1E65A667A5F74189B96775181A5BA4F7D93884B2AE531D55F66691705
2,956,692 UART: [art] PUB.Y = F6CDB0823082269A8AEE9AA8248B5E78D2B0D83349CFD161453963105045CFD53E470666702AE7E438817A2ABB4FA945
2,963,639 UART: [art] SIG.R = 4CD4F3221F6F5F1098B8FD244835B27E5B12C432D311628427F7EE85C3900FC421EA8E85EBAAC579574D7C373EDF73AD
2,970,414 UART: [art] SIG.S = 9A92C56E0737BD196B137DB73B1F787E36F77409319EE16A51CD54EC9A7A8CE32C8E63045C3A5982DE1416D9778BBAA9
2,993,860 UART: Caliptra RT
2,994,205 UART: [state] CFI Enabled
3,101,080 UART: [rt] RT listening for mailbox commands...
3,101,750 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,656 UART: [rt]cmd =0x41544d4e, len=14344
3,534,140 >>> mbox cmd response data (8 bytes)
3,534,141 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,390 UART: [rt]cmd =0x41545348, len=116
3,586,475 >>> mbox cmd response data (12 bytes)
3,586,476 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,381 UART: [rt]cmd =0x41545348, len=116
3,617,854 >>> mbox cmd response data (12 bytes)
3,617,855 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,054,472 >>> mbox cmd response: success
6,054,472 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,067,724 UART:
6,067,740 UART: Running Caliptra FMC ...
6,068,148 UART:
6,068,291 UART: [state] CFI Enabled
6,157,674 UART: [art] Extend RT PCRs Done
6,158,102 UART: [art] Lock RT PCRs Done
6,159,555 UART: [art] Populate DV Done
6,167,926 UART: [fht] FMC Alias Private Key: 7
6,168,996 UART: [art] Derive CDI
6,169,276 UART: [art] Store in in slot 0x4
6,254,873 UART: [art] Derive Key Pair
6,255,233 UART: [art] Store priv key in slot 0x5
6,268,097 UART: [art] Derive Key Pair - Done
6,282,886 UART: [art] Signing Cert with AUTHO
6,283,366 UART: RITY.KEYID = 7
6,298,714 UART: [art] Erasing AUTHORITY.KEYID = 7
6,299,479 UART: [art] PUB.X = 3C493CA1FE2A45F2FA9D770E13B7C8E42A88FDD6A1EE84F89F0113932DD03C8E030E454D24731FA396A2A100A5BABF1D
6,306,231 UART: [art] PUB.Y = BEDFECAD4BBB6A9AE52C3428D6737FBBAA5350EC2BE1DDBD0FA631C3DD5AECF687396BF9E42A51D395FDF7C7F621F450
6,313,214 UART: [art] SIG.R = 5C5E025DD4C2DB051A09B1A0F83E4C4DE157FC6A3745098772D987B9B73CD3A5C4455E03DB2F8EF09BF25A8BC8E4A33A
6,319,985 UART: [art] SIG.S = 217E057AB9EC4DD44BA1EC726AD3FED3AF4489DA6F40954B4453544258A9DF650D792FA4D8891EF84E59E62ADDAF399E
6,343,762 UART: Caliptra RT
6,344,107 UART: [state] CFI Enabled
6,624,956 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,655,877 UART: [rt]cmd =0x41545348, len=116
6,677,774 >>> mbox cmd response data (12 bytes)
6,677,775 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,708,102 UART: [rt]cmd =0x41545348, len=116
6,709,727 >>> mbox cmd response data (12 bytes)
6,709,728 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,832,339 UART: [rt]cmd =0x41544d4e, len=14344
7,142,203 >>> mbox cmd response data (8 bytes)
7,142,204 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,172,311 UART: [rt]cmd =0x41545348, len=116
7,193,544 >>> mbox cmd response data (12 bytes)
7,193,545 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,223,542 UART: [rt]cmd =0x41545348, len=116
7,225,354 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,886 UART: [kat] SHA2-256
891,436 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,565 UART: [kat] ++
895,717 UART: [kat] sha1
899,777 UART: [kat] SHA2-256
901,717 UART: [kat] SHA2-384
904,664 UART: [kat] SHA2-512-ACC
906,565 UART: [kat] ECC-384
916,740 UART: [kat] HMAC-384Kdf
921,290 UART: [kat] LMS
1,169,602 UART: [kat] --
1,170,421 UART: [cold-reset] ++
1,170,841 UART: [fht] FHT @ 0x50003400
1,173,561 UART: [idev] ++
1,173,729 UART: [idev] CDI.KEYID = 6
1,174,090 UART: [idev] SUBJECT.KEYID = 7
1,174,515 UART: [idev] UDS.KEYID = 0
1,174,861 ready_for_fw is high
1,174,861 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,753 UART: [idev] Erasing UDS.KEYID = 0
1,200,217 UART: [idev] Sha1 KeyId Algorithm
1,209,145 UART: [idev] --
1,210,222 UART: [ldev] ++
1,210,390 UART: [ldev] CDI.KEYID = 6
1,210,754 UART: [ldev] SUBJECT.KEYID = 5
1,211,181 UART: [ldev] AUTHORITY.KEYID = 7
1,211,644 UART: [ldev] FE.KEYID = 1
1,216,680 UART: [ldev] Erasing FE.KEYID = 1
1,242,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,832 UART: [ldev] --
1,282,096 UART: [fwproc] Wait for Commands...
1,282,829 UART: [fwproc] Recv command 0x46574c44
1,283,562 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,840 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,149 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,959 >>> mbox cmd response: success
2,775,070 UART: [afmc] ++
2,775,238 UART: [afmc] CDI.KEYID = 6
2,775,601 UART: [afmc] SUBJECT.KEYID = 7
2,776,027 UART: [afmc] AUTHORITY.KEYID = 5
2,811,136 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,544 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,295 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,024 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,907 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,626 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,351 UART: [afmc] --
2,854,467 UART: [cold-reset] --
2,855,273 UART: [state] Locking Datavault
2,856,290 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,894 UART: [state] Locking ICCM
2,857,508 UART: [exit] Launching FMC @ 0x40000130
2,862,837 UART:
2,862,853 UART: Running Caliptra FMC ...
2,863,261 UART:
2,863,315 UART: [state] CFI Enabled
2,873,808 UART: [fht] FMC Alias Private Key: 7
2,982,133 UART: [art] Extend RT PCRs Done
2,982,561 UART: [art] Lock RT PCRs Done
2,983,917 UART: [art] Populate DV Done
2,991,820 UART: [fht] FMC Alias Private Key: 7
2,992,760 UART: [art] Derive CDI
2,993,040 UART: [art] Store in in slot 0x4
3,078,513 UART: [art] Derive Key Pair
3,078,873 UART: [art] Store priv key in slot 0x5
3,091,837 UART: [art] Derive Key Pair - Done
3,106,799 UART: [art] Signing Cert with AUTHO
3,107,279 UART: RITY.KEYID = 7
3,122,721 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,486 UART: [art] PUB.X = 2D411124E4755A1ECC6B78F80AAE396324FA44F77C62D9EF65707F849B2C5167D3FA5EF2D313C1299A19C7BDA31BC2D5
3,130,263 UART: [art] PUB.Y = 1990AE0FB7DDF78CECCA8EA31BFCBD20576FD1B52DD7A3BAEDB6C28EF313F51E072E99428163BD5435114EDA8D4AC1F1
3,137,235 UART: [art] SIG.R = ABFC27B4347C3EA19DC115FB44D86F2984127620F8A99273747060E7B54C556F9B27FC202BD035C5B2793227B08617C1
3,144,001 UART: [art] SIG.S = 6FB30533843FD9EB3C616D1C19266EE73F595DF8E031DE8914E63592C0B6FD8E27C1A5C23624A35D175ED0F233872EF1
3,167,479 UART: Caliptra RT
3,167,732 UART: [state] CFI Enabled
3,274,393 UART: [rt] RT listening for mailbox commands...
3,275,063 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,251 UART: [rt]cmd =0x41544d4e, len=14344
3,707,787 >>> mbox cmd response data (8 bytes)
3,707,788 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,747 UART: [rt]cmd =0x41545348, len=116
3,759,892 >>> mbox cmd response data (12 bytes)
3,759,893 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,789,908 UART: [rt]cmd =0x41545348, len=116
3,791,513 >>> mbox cmd response data (12 bytes)
3,791,514 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,791,969 UART:
3,791,985 UART: Running Caliptra ROM ...
3,792,393 UART:
3,792,448 UART: [state] CFI Enabled
3,794,988 UART: [state] LifecycleState = Unprovisioned
3,795,643 UART: [state] DebugLocked = No
3,796,325 UART: [state] WD Timer not started. Device not locked for debugging
3,797,679 UART: [kat] SHA2-256
4,601,229 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,605,358 UART: [kat] ++
4,605,510 UART: [kat] sha1
4,609,832 UART: [kat] SHA2-256
4,611,772 UART: [kat] SHA2-384
4,614,429 UART: [kat] SHA2-512-ACC
4,616,329 UART: [kat] ECC-384
4,626,634 UART: [kat] HMAC-384Kdf
4,631,148 UART: [kat] LMS
4,879,460 UART: [kat] --
4,880,418 UART: [update-reset] ++
6,191,971 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,192,976 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,342,800 >>> mbox cmd response: success
6,342,800 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,342,913 UART: [update-reset] Copying MAN_2 To MAN_1
6,350,927 UART: [update-reset Success] --
6,351,872 UART: [state] Locking Datavault
6,352,908 UART: [state] Locking PCR0, PCR1 and PCR31
6,353,512 UART: [state] Locking ICCM
6,354,038 UART: [exit] Launching FMC @ 0x40000130
6,359,367 UART:
6,359,383 UART: Running Caliptra FMC ...
6,359,791 UART:
6,359,845 UART: [state] CFI Enabled
6,448,762 UART: [art] Extend RT PCRs Done
6,449,190 UART: [art] Lock RT PCRs Done
6,450,621 UART: [art] Populate DV Done
6,458,660 UART: [fht] FMC Alias Private Key: 7
6,459,678 UART: [art] Derive CDI
6,459,958 UART: [art] Store in in slot 0x4
6,545,847 UART: [art] Derive Key Pair
6,546,207 UART: [art] Store priv key in slot 0x5
6,559,773 UART: [art] Derive Key Pair - Done
6,574,683 UART: [art] Signing Cert with AUTHO
6,575,163 UART: RITY.KEYID = 7
6,590,509 UART: [art] Erasing AUTHORITY.KEYID = 7
6,591,274 UART: [art] PUB.X = 1262ED23F490A5E58FB21F38ACAB5A4ACC81A8BDBC14AABEE8C33AC784096F304F89551CF0405769CA479D9A10BEE770
6,598,059 UART: [art] PUB.Y = D33E68F75DB5A054F418142CA3A94267F7E2CE70003F7189FBC1E34EA8C7D85888017613B3E468B71D3A9C52AD05209E
6,604,983 UART: [art] SIG.R = DDAAB7A119161258CE0F0111EE88EA64EC1A86AB648877FB194C59F3EEF29AD1EDC66E4F690772D5DE9AF4A8629E57E8
6,611,762 UART: [art] SIG.S = 56C6C430DE9D95F6CDF9838692E732B08D1E89E91EF5DDF6B636A7444C035EA1764ED42EC095C3B9839539E222B6D728
6,635,310 UART: Caliptra RT
6,635,563 UART: [state] CFI Enabled
6,916,466 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,947,311 UART: [rt]cmd =0x41545348, len=116
6,969,578 >>> mbox cmd response data (12 bytes)
6,969,579 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,999,470 UART: [rt]cmd =0x41545348, len=116
7,001,105 >>> mbox cmd response data (12 bytes)
7,001,106 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,123,617 UART: [rt]cmd =0x41544d4e, len=14344
7,433,007 >>> mbox cmd response data (8 bytes)
7,433,008 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,462,985 UART: [rt]cmd =0x41545348, len=116
7,484,880 >>> mbox cmd response data (12 bytes)
7,484,881 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,515,118 UART: [rt]cmd =0x41545348, len=116
7,517,064 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,430 ready_for_fw is high
1,055,430 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,473 >>> mbox cmd response: success
2,683,003 UART:
2,683,019 UART: Running Caliptra FMC ...
2,683,427 UART:
2,683,481 UART: [state] CFI Enabled
2,693,968 UART: [fht] FMC Alias Private Key: 7
2,802,725 UART: [art] Extend RT PCRs Done
2,803,153 UART: [art] Lock RT PCRs Done
2,804,771 UART: [art] Populate DV Done
2,812,896 UART: [fht] FMC Alias Private Key: 7
2,813,854 UART: [art] Derive CDI
2,814,134 UART: [art] Store in in slot 0x4
2,899,571 UART: [art] Derive Key Pair
2,899,931 UART: [art] Store priv key in slot 0x5
2,914,089 UART: [art] Derive Key Pair - Done
2,929,389 UART: [art] Signing Cert with AUTHO
2,929,869 UART: RITY.KEYID = 7
2,944,991 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,756 UART: [art] PUB.X = 8B009A7CB5345B2ADF8EC7D3885B408E98621F6AE79A8738F8AC0BA46D4906730D40D5805E64E367978CFA1085EFE008
2,952,496 UART: [art] PUB.Y = 0D094595AFB834410F55A2D395D954818A035CD3A9A15370D725685727D15EC56E2B2B6112812F84A75D92B3BFC5A9DC
2,959,432 UART: [art] SIG.R = E171E5EF86895FB5A135C91513DC540818331C418A5944E406D0855A064358AD1FFEBCF05286F24AACEFDE984BDA67C1
2,966,201 UART: [art] SIG.S = 7F858F362153669D4B6BE8503A9233B1C610BEC4CBC41A67664456DBD73028FA8240569B071B4DB8048F23A830B52318
2,989,820 UART: Caliptra RT
2,990,073 UART: [state] CFI Enabled
3,097,812 UART: [rt] RT listening for mailbox commands...
3,098,482 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,320 UART: [rt]cmd =0x41544d4e, len=14344
3,530,836 >>> mbox cmd response data (8 bytes)
3,530,837 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,872 UART: [rt]cmd =0x41545348, len=116
3,583,795 >>> mbox cmd response data (12 bytes)
3,583,796 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,071 UART: [rt]cmd =0x41545348, len=116
3,615,928 >>> mbox cmd response data (12 bytes)
3,615,929 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,050,324 >>> mbox cmd response: success
6,050,324 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,063,834 UART:
6,063,850 UART: Running Caliptra FMC ...
6,064,258 UART:
6,064,312 UART: [state] CFI Enabled
6,153,629 UART: [art] Extend RT PCRs Done
6,154,057 UART: [art] Lock RT PCRs Done
6,155,398 UART: [art] Populate DV Done
6,163,359 UART: [fht] FMC Alias Private Key: 7
6,164,437 UART: [art] Derive CDI
6,164,717 UART: [art] Store in in slot 0x4
6,250,602 UART: [art] Derive Key Pair
6,250,962 UART: [art] Store priv key in slot 0x5
6,264,144 UART: [art] Derive Key Pair - Done
6,279,104 UART: [art] Signing Cert with AUTHO
6,279,584 UART: RITY.KEYID = 7
6,294,596 UART: [art] Erasing AUTHORITY.KEYID = 7
6,295,361 UART: [art] PUB.X = F10CC22F41BD86E333297D4B433E20911DCDC21635E6D2829C23B25B01308809DA51DF420D30D82DC35875A5884CC12C
6,302,119 UART: [art] PUB.Y = 417C58E00C73ADE9DA9205F4E80B1836BE0CAEA2C4AD9C2BDFB759DF82C812B05537EAC7929FE3ACCD8933A680E71173
6,309,075 UART: [art] SIG.R = 0B166DC6825880AF823085F3BC88799443610AEB4579B6B697C19B9F3DA26F9044BEEE87837ACB16685063D5E3399BD1
6,315,837 UART: [art] SIG.S = 41BB270D2D1C4ECECD493A7282F96F5F54D83F09A33E29F38F174A99AA2C37E86869DD3B226F4B3BF9C1C72544211C7E
6,340,216 UART: Caliptra RT
6,340,469 UART: [state] CFI Enabled
6,621,948 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,652,687 UART: [rt]cmd =0x41545348, len=116
6,675,120 >>> mbox cmd response data (12 bytes)
6,675,121 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,705,156 UART: [rt]cmd =0x41545348, len=116
6,707,001 >>> mbox cmd response data (12 bytes)
6,707,002 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,829,699 UART: [rt]cmd =0x41544d4e, len=14344
7,139,717 >>> mbox cmd response data (8 bytes)
7,139,718 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,169,631 UART: [rt]cmd =0x41545348, len=116
7,191,668 >>> mbox cmd response data (12 bytes)
7,191,669 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,221,880 UART: [rt]cmd =0x41545348, len=116
7,223,750 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,015 UART: [state] LifecycleState = Unprovisioned
85,670 UART: [state] DebugLocked = No
86,248 UART: [state] WD Timer not started. Device not locked for debugging
87,597 UART: [kat] SHA2-256
891,147 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,276 UART: [kat] ++
895,428 UART: [kat] sha1
899,914 UART: [kat] SHA2-256
901,854 UART: [kat] SHA2-384
904,479 UART: [kat] SHA2-512-ACC
906,380 UART: [kat] ECC-384
916,429 UART: [kat] HMAC-384Kdf
920,955 UART: [kat] LMS
1,169,267 UART: [kat] --
1,170,182 UART: [cold-reset] ++
1,170,640 UART: [fht] FHT @ 0x50003400
1,173,338 UART: [idev] ++
1,173,506 UART: [idev] CDI.KEYID = 6
1,173,867 UART: [idev] SUBJECT.KEYID = 7
1,174,292 UART: [idev] UDS.KEYID = 0
1,174,638 ready_for_fw is high
1,174,638 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,996 UART: [idev] Erasing UDS.KEYID = 0
1,199,650 UART: [idev] Sha1 KeyId Algorithm
1,208,490 UART: [idev] --
1,209,549 UART: [ldev] ++
1,209,717 UART: [ldev] CDI.KEYID = 6
1,210,081 UART: [ldev] SUBJECT.KEYID = 5
1,210,508 UART: [ldev] AUTHORITY.KEYID = 7
1,210,971 UART: [ldev] FE.KEYID = 1
1,216,017 UART: [ldev] Erasing FE.KEYID = 1
1,242,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,929 UART: [ldev] --
1,282,205 UART: [fwproc] Wait for Commands...
1,282,880 UART: [fwproc] Recv command 0x46574c44
1,283,613 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,257 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,543 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,852 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,658 >>> mbox cmd response: success
2,775,895 UART: [afmc] ++
2,776,063 UART: [afmc] CDI.KEYID = 6
2,776,426 UART: [afmc] SUBJECT.KEYID = 7
2,776,852 UART: [afmc] AUTHORITY.KEYID = 5
2,812,347 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,777 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,528 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,257 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,140 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,859 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,694 UART: [afmc] --
2,855,586 UART: [cold-reset] --
2,856,518 UART: [state] Locking Datavault
2,857,681 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,285 UART: [state] Locking ICCM
2,858,755 UART: [exit] Launching FMC @ 0x40000130
2,864,084 UART:
2,864,100 UART: Running Caliptra FMC ...
2,864,508 UART:
2,864,651 UART: [state] CFI Enabled
2,875,414 UART: [fht] FMC Alias Private Key: 7
2,982,717 UART: [art] Extend RT PCRs Done
2,983,145 UART: [art] Lock RT PCRs Done
2,984,681 UART: [art] Populate DV Done
2,992,896 UART: [fht] FMC Alias Private Key: 7
2,993,954 UART: [art] Derive CDI
2,994,234 UART: [art] Store in in slot 0x4
3,080,093 UART: [art] Derive Key Pair
3,080,453 UART: [art] Store priv key in slot 0x5
3,093,889 UART: [art] Derive Key Pair - Done
3,109,081 UART: [art] Signing Cert with AUTHO
3,109,561 UART: RITY.KEYID = 7
3,124,979 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,744 UART: [art] PUB.X = CA7E562E09E9F4E39B076A73D04B0640E3C81923CDD5EA18698B8A7150523419BA88724990E2533A9784D0FC4C71501F
3,132,501 UART: [art] PUB.Y = 04F75AB4247C24AFC2AA11F81D8628B0960ED1FB39DFE5B0B4F272AE4D4D776A1BB34EE2B253FDC3909E2248FF97DF13
3,139,463 UART: [art] SIG.R = F2292E4D130E14EACC4DB0038B55BA62FEC9DA91A4EDC859BF0BC5C48FA665B3859D2F83AB93F3755E7C50DA3702113D
3,146,239 UART: [art] SIG.S = B2C2BA0A7B926E0F512ACC0C935DC3E32FD8C1466A3A89254F64CAC32085B71F08BE6795F6C80749EDEBDF18B00DCAD0
3,169,480 UART: Caliptra RT
3,169,825 UART: [state] CFI Enabled
3,278,213 UART: [rt] RT listening for mailbox commands...
3,278,883 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,885 UART: [rt]cmd =0x41544d4e, len=14344
3,711,491 >>> mbox cmd response data (8 bytes)
3,711,492 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,591 UART: [rt]cmd =0x41545348, len=116
3,763,050 >>> mbox cmd response data (12 bytes)
3,763,051 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,793,142 UART: [rt]cmd =0x41545348, len=116
3,794,893 >>> mbox cmd response data (12 bytes)
3,794,894 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,795,471 UART:
3,795,487 UART: Running Caliptra ROM ...
3,795,895 UART:
3,796,037 UART: [state] CFI Enabled
3,798,709 UART: [state] LifecycleState = Unprovisioned
3,799,364 UART: [state] DebugLocked = No
3,799,972 UART: [state] WD Timer not started. Device not locked for debugging
3,801,306 UART: [kat] SHA2-256
4,604,856 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,608,985 UART: [kat] ++
4,609,137 UART: [kat] sha1
4,613,517 UART: [kat] SHA2-256
4,615,457 UART: [kat] SHA2-384
4,618,302 UART: [kat] SHA2-512-ACC
4,620,202 UART: [kat] ECC-384
4,629,961 UART: [kat] HMAC-384Kdf
4,634,637 UART: [kat] LMS
4,882,949 UART: [kat] --
4,883,625 UART: [update-reset] ++
6,195,438 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,196,649 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,346,473 >>> mbox cmd response: success
6,346,473 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,346,828 UART: [update-reset] Copying MAN_2 To MAN_1
6,354,842 UART: [update-reset Success] --
6,355,793 UART: [state] Locking Datavault
6,356,439 UART: [state] Locking PCR0, PCR1 and PCR31
6,357,043 UART: [state] Locking ICCM
6,357,487 UART: [exit] Launching FMC @ 0x40000130
6,362,816 UART:
6,362,832 UART: Running Caliptra FMC ...
6,363,240 UART:
6,363,383 UART: [state] CFI Enabled
6,452,286 UART: [art] Extend RT PCRs Done
6,452,714 UART: [art] Lock RT PCRs Done
6,453,891 UART: [art] Populate DV Done
6,462,178 UART: [fht] FMC Alias Private Key: 7
6,463,276 UART: [art] Derive CDI
6,463,556 UART: [art] Store in in slot 0x4
6,548,811 UART: [art] Derive Key Pair
6,549,171 UART: [art] Store priv key in slot 0x5
6,562,145 UART: [art] Derive Key Pair - Done
6,576,827 UART: [art] Signing Cert with AUTHO
6,577,307 UART: RITY.KEYID = 7
6,592,761 UART: [art] Erasing AUTHORITY.KEYID = 7
6,593,526 UART: [art] PUB.X = 096B5CC5A4808E1DF8B611DDD89F47713295FF83FCF81D48DFA74195479D06EEFE0A9BA15E223C17CA79C8C1AE8DA81F
6,600,305 UART: [art] PUB.Y = 7B08A5B6738BE3FCC23AB930C9DBA3F776A6E86D141FD0305C56DC9A3B146277786FAB2F199F4C9DB234BD5BEC526D85
6,607,268 UART: [art] SIG.R = FF2B0E9D10C13466DEE105EDEF0696F5B8CE704C7D740421698005047A8A60849242E843551FF6F882E3A7AABEF8C5E7
6,614,026 UART: [art] SIG.S = 6634ACCAF59F24CFA9161254EDDE3346ED21DB26338FE0044AC4F8FAB42397C190261F5431B6409EF27D1DC9979E9C7B
6,638,232 UART: Caliptra RT
6,638,577 UART: [state] CFI Enabled
6,917,002 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,948,163 UART: [rt]cmd =0x41545348, len=116
6,970,394 >>> mbox cmd response data (12 bytes)
6,970,395 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,000,526 UART: [rt]cmd =0x41545348, len=116
7,002,289 >>> mbox cmd response data (12 bytes)
7,002,290 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,124,701 UART: [rt]cmd =0x41544d4e, len=14344
7,434,519 >>> mbox cmd response data (8 bytes)
7,434,520 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,464,511 UART: [rt]cmd =0x41545348, len=116
7,486,234 >>> mbox cmd response data (12 bytes)
7,486,235 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,516,286 UART: [rt]cmd =0x41545348, len=116
7,518,214 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,145 ready_for_fw is high
1,056,145 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,036 >>> mbox cmd response: success
2,684,214 UART:
2,684,230 UART: Running Caliptra FMC ...
2,684,638 UART:
2,684,781 UART: [state] CFI Enabled
2,695,294 UART: [fht] FMC Alias Private Key: 7
2,803,289 UART: [art] Extend RT PCRs Done
2,803,717 UART: [art] Lock RT PCRs Done
2,805,427 UART: [art] Populate DV Done
2,813,344 UART: [fht] FMC Alias Private Key: 7
2,814,490 UART: [art] Derive CDI
2,814,770 UART: [art] Store in in slot 0x4
2,900,145 UART: [art] Derive Key Pair
2,900,505 UART: [art] Store priv key in slot 0x5
2,914,215 UART: [art] Derive Key Pair - Done
2,928,992 UART: [art] Signing Cert with AUTHO
2,929,472 UART: RITY.KEYID = 7
2,945,044 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,809 UART: [art] PUB.X = 7D28553011C570E9F8AE47608FADCBB20B9BE4254237B8DC93AB391CDB6C0AD935898200D478F7173F13FCD4A8DB4734
2,952,559 UART: [art] PUB.Y = 12D4F4FE8D39BF5DBA30740645E9DB6503BB76C8ED4E4EAA3F3245F96101321A9F5593920AFD278EB188192563DD7853
2,959,501 UART: [art] SIG.R = 50060BBDEA30C3AB06D5CF686CF53E44A87FEC7B4513EDDE3B28F8F334084974D3C700F8E101F8DA73E97F4F8A58ACAD
2,966,254 UART: [art] SIG.S = F9C985B9B9A1E1555F0E5F126A1302AF2DFDC2079585FC241E62ED477AF4E143E5BA80D67FAB24AB0A7B2E0E58D120AB
2,990,218 UART: Caliptra RT
2,990,563 UART: [state] CFI Enabled
3,098,724 UART: [rt] RT listening for mailbox commands...
3,099,394 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,740 UART: [rt]cmd =0x41544d4e, len=14344
3,532,686 >>> mbox cmd response data (8 bytes)
3,532,687 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,634 UART: [rt]cmd =0x41545348, len=116
3,585,283 >>> mbox cmd response data (12 bytes)
3,585,284 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,365 UART: [rt]cmd =0x41545348, len=116
3,617,294 >>> mbox cmd response data (12 bytes)
3,617,295 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,048,923 >>> mbox cmd response: success
6,048,923 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,062,691 UART:
6,062,707 UART: Running Caliptra FMC ...
6,063,115 UART:
6,063,258 UART: [state] CFI Enabled
6,152,249 UART: [art] Extend RT PCRs Done
6,152,677 UART: [art] Lock RT PCRs Done
6,154,102 UART: [art] Populate DV Done
6,162,409 UART: [fht] FMC Alias Private Key: 7
6,163,519 UART: [art] Derive CDI
6,163,799 UART: [art] Store in in slot 0x4
6,249,774 UART: [art] Derive Key Pair
6,250,134 UART: [art] Store priv key in slot 0x5
6,263,528 UART: [art] Derive Key Pair - Done
6,278,078 UART: [art] Signing Cert with AUTHO
6,278,558 UART: RITY.KEYID = 7
6,293,510 UART: [art] Erasing AUTHORITY.KEYID = 7
6,294,275 UART: [art] PUB.X = 5C6A182E701670030330DEFDF4724B809AEAEA1B0E0ABB6308037BD5DBB9386538699678A844C5BA57940E515655DBCA
6,301,028 UART: [art] PUB.Y = 56B00BB3E063453B3C3B2EED92CB3181997E1F962962822122E40ABB68381547368EC705060C3A529AA5F2CF7CDFA1C4
6,307,965 UART: [art] SIG.R = 8E61DF4CFAE2C4BD6BB18B7C3371F6B662DD2D36866ED95ACA0A74AE5CDEF748B1F0ED18ED1E431312C9887FE2659A4D
6,314,756 UART: [art] SIG.S = 523808CC275B2F0D9923F2DB2456468C45DC3C25FC80222726309FF62008B1577E9943904A9577585E18CE8820E6C8F0
6,338,522 UART: Caliptra RT
6,338,867 UART: [state] CFI Enabled
6,620,362 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,651,215 UART: [rt]cmd =0x41545348, len=116
6,672,604 >>> mbox cmd response data (12 bytes)
6,672,605 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,702,808 UART: [rt]cmd =0x41545348, len=116
6,704,709 >>> mbox cmd response data (12 bytes)
6,704,710 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,827,271 UART: [rt]cmd =0x41544d4e, len=14344
7,136,809 >>> mbox cmd response data (8 bytes)
7,136,810 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,166,871 UART: [rt]cmd =0x41545348, len=116
7,188,510 >>> mbox cmd response data (12 bytes)
7,188,511 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,218,876 UART: [rt]cmd =0x41545348, len=116
7,220,440 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,213 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,873 UART: [kat] SHA2-256
881,804 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,919 UART: [kat] ++
886,071 UART: [kat] sha1
890,453 UART: [kat] SHA2-256
892,391 UART: [kat] SHA2-384
895,146 UART: [kat] SHA2-512-ACC
897,047 UART: [kat] ECC-384
902,712 UART: [kat] HMAC-384Kdf
907,082 UART: [kat] LMS
1,475,278 UART: [kat] --
1,476,397 UART: [cold-reset] ++
1,476,759 UART: [fht] Storing FHT @ 0x50003400
1,479,518 UART: [idev] ++
1,479,686 UART: [idev] CDI.KEYID = 6
1,480,046 UART: [idev] SUBJECT.KEYID = 7
1,480,470 UART: [idev] UDS.KEYID = 0
1,480,815 ready_for_fw is high
1,480,815 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,334 UART: [idev] Erasing UDS.KEYID = 0
1,504,924 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,666 UART: [idev] --
1,514,719 UART: [ldev] ++
1,514,887 UART: [ldev] CDI.KEYID = 6
1,515,250 UART: [ldev] SUBJECT.KEYID = 5
1,515,676 UART: [ldev] AUTHORITY.KEYID = 7
1,516,139 UART: [ldev] FE.KEYID = 1
1,521,537 UART: [ldev] Erasing FE.KEYID = 1
1,546,892 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,872 UART: [ldev] --
1,586,237 UART: [fwproc] Waiting for Commands...
1,586,910 UART: [fwproc] Received command 0x46574c44
1,587,701 UART: [fwproc] Received Image of size 114332 bytes
2,885,217 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,183 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,535 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,346 >>> mbox cmd response: success
3,078,466 UART: [afmc] ++
3,078,634 UART: [afmc] CDI.KEYID = 6
3,078,996 UART: [afmc] SUBJECT.KEYID = 7
3,079,421 UART: [afmc] AUTHORITY.KEYID = 5
3,114,282 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,798 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,578 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,306 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,191 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,881 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,910 UART: [afmc] --
3,157,988 UART: [cold-reset] --
3,158,936 UART: [state] Locking Datavault
3,160,383 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,987 UART: [state] Locking ICCM
3,161,491 UART: [exit] Launching FMC @ 0x40000130
3,166,820 UART:
3,166,836 UART: Running Caliptra FMC ...
3,167,244 UART:
3,167,298 UART: [state] CFI Enabled
3,177,747 UART: [fht] FMC Alias Private Key: 7
3,285,766 UART: [art] Extend RT PCRs Done
3,286,194 UART: [art] Lock RT PCRs Done
3,287,760 UART: [art] Populate DV Done
3,295,893 UART: [fht] FMC Alias Private Key: 7
3,297,067 UART: [art] Derive CDI
3,297,347 UART: [art] Store in in slot 0x4
3,383,120 UART: [art] Derive Key Pair
3,383,480 UART: [art] Store priv key in slot 0x5
3,396,882 UART: [art] Derive Key Pair - Done
3,411,719 UART: [art] Signing Cert with AUTHO
3,412,199 UART: RITY.KEYID = 7
3,427,251 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,016 UART: [art] PUB.X = 2D07AA46F1E87D8D9C3A01B3CE34846A063AC671F51C358DFD8B0483ED763969BC92F34ABE1094FB04A9AF598D97CFD5
3,434,785 UART: [art] PUB.Y = 088A5592DC11FC04E278896E4733E8725C21853652555B0C3FC03F2C6F72A16226427C3C747BC09A8F41DC6857A19FD8
3,441,720 UART: [art] SIG.R = E9AA0ED678A7DABAB661E613BED5B44F7EB7B9588C1E64B7B4B4A9335C2480757A7F3E1E5AC8E5D07F2FE1C34FF04BE0
3,448,511 UART: [art] SIG.S = CD08C48DCBF491C59BF4820416A2B952BA55A888BC638BA97F6E1433F245D87CBC2B28ADF25CD6B4E0EDDDC00191A09C
3,471,961 UART: Caliptra RT
3,472,214 UART: [state] CFI Enabled
3,579,594 UART: [rt] RT listening for mailbox commands...
3,580,264 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,332 UART: [rt]cmd =0x41544d4e, len=14344
4,012,957 >>> mbox cmd response data (8 bytes)
4,012,958 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,095 UART: [rt]cmd =0x41545348, len=116
4,063,968 >>> mbox cmd response data (12 bytes)
4,063,969 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,064,841 UART:
4,064,857 UART: Running Caliptra ROM ...
4,065,265 UART:
4,065,319 UART: [state] CFI Enabled
4,068,055 UART: [state] LifecycleState = Unprovisioned
4,068,710 UART: [state] DebugLocked = No
4,069,386 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,071,019 UART: [kat] SHA2-256
4,864,950 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,869,065 UART: [kat] ++
4,869,217 UART: [kat] sha1
4,873,399 UART: [kat] SHA2-256
4,875,337 UART: [kat] SHA2-384
4,878,170 UART: [kat] SHA2-512-ACC
4,880,070 UART: [kat] ECC-384
4,885,543 UART: [kat] HMAC-384Kdf
4,890,217 UART: [kat] LMS
5,458,413 UART: [kat] --
5,459,388 UART: [update-reset] ++
6,794,226 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,795,416 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,945,292 >>> mbox cmd response: success
6,945,292 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,945,615 UART: [update-reset] Copying MAN_2 To MAN_1
6,953,629 UART: [update-reset Success] --
6,954,588 UART: [state] Locking Datavault
6,955,314 UART: [state] Locking PCR0, PCR1 and PCR31
6,955,918 UART: [state] Locking ICCM
6,956,586 UART: [exit] Launching FMC @ 0x40000130
6,961,915 UART:
6,961,931 UART: Running Caliptra FMC ...
6,962,339 UART:
6,962,393 UART: [state] CFI Enabled
7,051,374 UART: [art] Extend RT PCRs Done
7,051,802 UART: [art] Lock RT PCRs Done
7,052,947 UART: [art] Populate DV Done
7,061,072 UART: [fht] FMC Alias Private Key: 7
7,062,020 UART: [art] Derive CDI
7,062,300 UART: [art] Store in in slot 0x4
7,147,925 UART: [art] Derive Key Pair
7,148,285 UART: [art] Store priv key in slot 0x5
7,161,579 UART: [art] Derive Key Pair - Done
7,176,550 UART: [art] Signing Cert with AUTHO
7,177,030 UART: RITY.KEYID = 7
7,192,152 UART: [art] Erasing AUTHORITY.KEYID = 7
7,192,917 UART: [art] PUB.X = A59AC47E8B7F189F3E959B950ACD534480E057DED1A04252E2B9DB4B8CF05FFB68720FF4041A3C317951F6CF0781B0D2
7,199,685 UART: [art] PUB.Y = 9AFB132DCAD1921F3C2A7116D75D9F4993F615809E954797F3B3B90C85070D0E6B84E917281E7B910C31FA5C9BD2CD53
7,206,624 UART: [art] SIG.R = 95A9C83C1DAA61845964A5DB9E132A74F42BBF74BD9316D1102315DC727675E7F67210069A8CE2B1CE69E893C53F027B
7,213,390 UART: [art] SIG.S = 3F7C635292421D3CAD5FD84EF61DE0C6D3DBC7792748AF288603922BA199D5B871DC0FBDC89F4106F25335095A13CD26
7,237,353 UART: Caliptra RT
7,237,606 UART: [state] CFI Enabled
7,519,251 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,550,040 UART: [rt]cmd =0x41545348, len=116
7,571,679 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,685 ready_for_fw is high
1,362,685 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,922 >>> mbox cmd response: success
2,987,650 UART:
2,987,666 UART: Running Caliptra FMC ...
2,988,074 UART:
2,988,128 UART: [state] CFI Enabled
2,998,859 UART: [fht] FMC Alias Private Key: 7
3,106,800 UART: [art] Extend RT PCRs Done
3,107,228 UART: [art] Lock RT PCRs Done
3,109,168 UART: [art] Populate DV Done
3,117,295 UART: [fht] FMC Alias Private Key: 7
3,118,229 UART: [art] Derive CDI
3,118,509 UART: [art] Store in in slot 0x4
3,204,152 UART: [art] Derive Key Pair
3,204,512 UART: [art] Store priv key in slot 0x5
3,217,400 UART: [art] Derive Key Pair - Done
3,232,563 UART: [art] Signing Cert with AUTHO
3,233,043 UART: RITY.KEYID = 7
3,248,303 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,068 UART: [art] PUB.X = 5C2AD2FE59DAE92D4BD5354D8635D6EFD5A77A5F947AEEB7250969689388FF8F6F0223A36AE7DE7C9867D420DBCEB6AA
3,255,852 UART: [art] PUB.Y = 132A91305E14823E047D7EAA4B8374C59B15BC359110DCA7459861DB898383D5022F82F0BBA540BD8A8EA8BC81D439F0
3,262,798 UART: [art] SIG.R = 1A8D78DB094C4D3ED487728C397DF9799BA50D03E72A8998D061480532101B1EA76030776F3195CBB7EF20A4236DB934
3,269,552 UART: [art] SIG.S = 2C85D9016F846A2589A8FD7ACE06922CFE0567D9C140CE96876C465BD7EA14F26EEB22FED3D665FF11B2B93F135282B9
3,293,366 UART: Caliptra RT
3,293,619 UART: [state] CFI Enabled
3,401,705 UART: [rt] RT listening for mailbox commands...
3,402,375 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,149 UART: [rt]cmd =0x41544d4e, len=14344
3,834,982 >>> mbox cmd response data (8 bytes)
3,834,983 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,180 UART: [rt]cmd =0x41545348, len=116
3,886,577 >>> mbox cmd response data (12 bytes)
3,886,578 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,647,805 >>> mbox cmd response: success
6,647,805 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,661,076 UART:
6,661,092 UART: Running Caliptra FMC ...
6,661,500 UART:
6,661,554 UART: [state] CFI Enabled
6,750,827 UART: [art] Extend RT PCRs Done
6,751,255 UART: [art] Lock RT PCRs Done
6,752,556 UART: [art] Populate DV Done
6,760,991 UART: [fht] FMC Alias Private Key: 7
6,762,071 UART: [art] Derive CDI
6,762,351 UART: [art] Store in in slot 0x4
6,848,064 UART: [art] Derive Key Pair
6,848,424 UART: [art] Store priv key in slot 0x5
6,861,448 UART: [art] Derive Key Pair - Done
6,876,038 UART: [art] Signing Cert with AUTHO
6,876,518 UART: RITY.KEYID = 7
6,891,576 UART: [art] Erasing AUTHORITY.KEYID = 7
6,892,341 UART: [art] PUB.X = 13961923CAC3C5BD6E23209DCA7B22DE5105AAEF33ED46F39D1C6295EE74E2FD722820D787BB49CE689E6BB6D171E293
6,899,120 UART: [art] PUB.Y = A5C9F3414E15A4626DB84FF7FC34C974B4A85C0805108E30A04951AA004E8D78515CF6C5CECF9F4EB32CA7287242DAE3
6,906,052 UART: [art] SIG.R = 6BFF931F57266BFC955C7E748685180B46ACB2FA40EF36165A6F2532EFBE19C9FE0EC368596B7428F0A9553D99022459
6,912,815 UART: [art] SIG.S = D36B6ADBD36CDBF0F765984FA36765E0FAD7C017933E54166EE9803825FEC4BF1555B20D91ACAF50EC4F6EFA54B41B81
6,936,727 UART: Caliptra RT
6,936,980 UART: [state] CFI Enabled
7,215,399 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,246,160 UART: [rt]cmd =0x41545348, len=116
7,267,941 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,644 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,232 UART: [kat] SHA2-256
882,163 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,278 UART: [kat] ++
886,430 UART: [kat] sha1
890,534 UART: [kat] SHA2-256
892,472 UART: [kat] SHA2-384
895,193 UART: [kat] SHA2-512-ACC
897,094 UART: [kat] ECC-384
902,447 UART: [kat] HMAC-384Kdf
906,973 UART: [kat] LMS
1,475,169 UART: [kat] --
1,476,066 UART: [cold-reset] ++
1,476,424 UART: [fht] Storing FHT @ 0x50003400
1,479,143 UART: [idev] ++
1,479,311 UART: [idev] CDI.KEYID = 6
1,479,671 UART: [idev] SUBJECT.KEYID = 7
1,480,095 UART: [idev] UDS.KEYID = 0
1,480,440 ready_for_fw is high
1,480,440 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,043 UART: [idev] Erasing UDS.KEYID = 0
1,504,847 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,531 UART: [idev] --
1,514,576 UART: [ldev] ++
1,514,744 UART: [ldev] CDI.KEYID = 6
1,515,107 UART: [ldev] SUBJECT.KEYID = 5
1,515,533 UART: [ldev] AUTHORITY.KEYID = 7
1,515,996 UART: [ldev] FE.KEYID = 1
1,521,348 UART: [ldev] Erasing FE.KEYID = 1
1,546,933 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,981 UART: [ldev] --
1,586,432 UART: [fwproc] Waiting for Commands...
1,587,123 UART: [fwproc] Received command 0x46574c44
1,587,914 UART: [fwproc] Received Image of size 114332 bytes
2,885,920 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,498 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,850 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,835 >>> mbox cmd response: success
3,079,849 UART: [afmc] ++
3,080,017 UART: [afmc] CDI.KEYID = 6
3,080,379 UART: [afmc] SUBJECT.KEYID = 7
3,080,804 UART: [afmc] AUTHORITY.KEYID = 5
3,115,829 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,039 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,819 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,547 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,432 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,122 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,117 UART: [afmc] --
3,159,135 UART: [cold-reset] --
3,160,177 UART: [state] Locking Datavault
3,161,250 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,854 UART: [state] Locking ICCM
3,162,282 UART: [exit] Launching FMC @ 0x40000130
3,167,611 UART:
3,167,627 UART: Running Caliptra FMC ...
3,168,035 UART:
3,168,178 UART: [state] CFI Enabled
3,178,901 UART: [fht] FMC Alias Private Key: 7
3,286,468 UART: [art] Extend RT PCRs Done
3,286,896 UART: [art] Lock RT PCRs Done
3,288,122 UART: [art] Populate DV Done
3,296,307 UART: [fht] FMC Alias Private Key: 7
3,297,387 UART: [art] Derive CDI
3,297,667 UART: [art] Store in in slot 0x4
3,383,348 UART: [art] Derive Key Pair
3,383,708 UART: [art] Store priv key in slot 0x5
3,396,756 UART: [art] Derive Key Pair - Done
3,411,270 UART: [art] Signing Cert with AUTHO
3,411,750 UART: RITY.KEYID = 7
3,426,788 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,553 UART: [art] PUB.X = 253ED38B7FFABC0ABE34B57CEAC671AC0C1DCF0511D35D3623B14C4DB2B78D28CE5D9038152AAB94A240E266F1E62E53
3,434,334 UART: [art] PUB.Y = 1D404D04B84BC30C583C757D5BBEEA010F3C32051919398E62E7B6BB6CFAAC54119696EA235A98876A9764E0CAF41987
3,441,273 UART: [art] SIG.R = E3D473E9590C1123F52C8B9537ACFDDCA497A57E19DAB59FFACC206D9DF86D6F6DBB85B9FC78305F23CB0DDDC05016B8
3,448,061 UART: [art] SIG.S = 1B1D3B5F9350254A807C2848FADB394E981D3ABA254471A37CCCA9CAC34625201A204956C6C553E49CD944F723757583
3,471,984 UART: Caliptra RT
3,472,329 UART: [state] CFI Enabled
3,581,256 UART: [rt] RT listening for mailbox commands...
3,581,926 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,874 UART: [rt]cmd =0x41544d4e, len=14344
4,014,555 >>> mbox cmd response data (8 bytes)
4,014,556 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,519 UART: [rt]cmd =0x41545348, len=116
4,065,424 >>> mbox cmd response data (12 bytes)
4,065,425 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,066,299 UART:
4,066,315 UART: Running Caliptra ROM ...
4,066,723 UART:
4,066,864 UART: [state] CFI Enabled
4,069,794 UART: [state] LifecycleState = Unprovisioned
4,070,449 UART: [state] DebugLocked = No
4,071,087 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,072,750 UART: [kat] SHA2-256
4,866,681 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,870,796 UART: [kat] ++
4,870,948 UART: [kat] sha1
4,875,342 UART: [kat] SHA2-256
4,877,280 UART: [kat] SHA2-384
4,880,071 UART: [kat] SHA2-512-ACC
4,881,971 UART: [kat] ECC-384
4,887,706 UART: [kat] HMAC-384Kdf
4,892,178 UART: [kat] LMS
5,460,374 UART: [kat] --
5,461,435 UART: [update-reset] ++
6,796,071 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,797,311 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,947,187 >>> mbox cmd response: success
6,947,187 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,947,498 UART: [update-reset] Copying MAN_2 To MAN_1
6,955,512 UART: [update-reset Success] --
6,956,381 UART: [state] Locking Datavault
6,957,053 UART: [state] Locking PCR0, PCR1 and PCR31
6,957,657 UART: [state] Locking ICCM
6,958,119 UART: [exit] Launching FMC @ 0x40000130
6,963,448 UART:
6,963,464 UART: Running Caliptra FMC ...
6,963,872 UART:
6,964,015 UART: [state] CFI Enabled
7,053,824 UART: [art] Extend RT PCRs Done
7,054,252 UART: [art] Lock RT PCRs Done
7,055,589 UART: [art] Populate DV Done
7,063,970 UART: [fht] FMC Alias Private Key: 7
7,065,056 UART: [art] Derive CDI
7,065,336 UART: [art] Store in in slot 0x4
7,150,533 UART: [art] Derive Key Pair
7,150,893 UART: [art] Store priv key in slot 0x5
7,163,693 UART: [art] Derive Key Pair - Done
7,178,399 UART: [art] Signing Cert with AUTHO
7,178,879 UART: RITY.KEYID = 7
7,193,771 UART: [art] Erasing AUTHORITY.KEYID = 7
7,194,536 UART: [art] PUB.X = 3BD624E9D015BD1A8A77B3A3744CB213B0EFB71D42CF7D77B2297B3105421E3E86A3D2FEE0E3753C41FAEB1F9C795691
7,201,315 UART: [art] PUB.Y = 0846C704EC63AB695F7F0B5C7A00CB14E5DE2E91FAF74C671F817FAFD35E2E984C503D7525943C704709510300272CFE
7,208,210 UART: [art] SIG.R = 610BA5DDC08F10BCAB90BA626E1EC30901A7568E250EB3F9D7639698EB6C3F4D955DC38C9487A60CF731C7D28FCF5104
7,214,974 UART: [art] SIG.S = 43E97C7E7D02CD06112D6BD7A3C41B3D481A0366EBEF22A88EDC725E8C012BC0FEAB1777494D3AAFE52685E67B0CE152
7,238,910 UART: Caliptra RT
7,239,255 UART: [state] CFI Enabled
7,520,189 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,550,968 UART: [rt]cmd =0x41545348, len=116
7,572,091 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,742 ready_for_fw is high
1,362,742 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,909 >>> mbox cmd response: success
2,990,807 UART:
2,990,823 UART: Running Caliptra FMC ...
2,991,231 UART:
2,991,374 UART: [state] CFI Enabled
3,002,131 UART: [fht] FMC Alias Private Key: 7
3,110,508 UART: [art] Extend RT PCRs Done
3,110,936 UART: [art] Lock RT PCRs Done
3,112,650 UART: [art] Populate DV Done
3,120,987 UART: [fht] FMC Alias Private Key: 7
3,122,101 UART: [art] Derive CDI
3,122,381 UART: [art] Store in in slot 0x4
3,207,756 UART: [art] Derive Key Pair
3,208,116 UART: [art] Store priv key in slot 0x5
3,221,164 UART: [art] Derive Key Pair - Done
3,236,157 UART: [art] Signing Cert with AUTHO
3,236,637 UART: RITY.KEYID = 7
3,251,761 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,526 UART: [art] PUB.X = 6C662A71CAA077C1983E228C0D9CBA5D0523013220C12115287AD1D025CE8DA147D5357DC9CCE53A61BFD00467B7B930
3,259,288 UART: [art] PUB.Y = B30D37BD38A715D87CEEA8074C2B74188CD901342B41967A35B5250346C462D6FDED0AED954C9DF6A5431C19B669B602
3,266,224 UART: [art] SIG.R = 7DE7BE2F45AC7A2DB8AFD4C2C80637488382F3A7129DDBBBCD2EAE7C8A948631C89824A6F8AF185B29C1F060AE52E87B
3,273,011 UART: [art] SIG.S = 4DB7F2E1F4832FD7CE6BA0166AD4F91C1963E2FEDC81D07EEC3B577EF0472521EFA0513F5F33EE81A067EA1517163E10
3,296,922 UART: Caliptra RT
3,297,267 UART: [state] CFI Enabled
3,405,635 UART: [rt] RT listening for mailbox commands...
3,406,305 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,253 UART: [rt]cmd =0x41544d4e, len=14344
3,838,694 >>> mbox cmd response data (8 bytes)
3,838,695 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,868,564 UART: [rt]cmd =0x41545348, len=116
3,889,727 >>> mbox cmd response data (12 bytes)
3,889,728 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,653,666 >>> mbox cmd response: success
6,653,666 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,666,881 UART:
6,666,897 UART: Running Caliptra FMC ...
6,667,305 UART:
6,667,448 UART: [state] CFI Enabled
6,756,981 UART: [art] Extend RT PCRs Done
6,757,409 UART: [art] Lock RT PCRs Done
6,758,552 UART: [art] Populate DV Done
6,766,871 UART: [fht] FMC Alias Private Key: 7
6,767,823 UART: [art] Derive CDI
6,768,103 UART: [art] Store in in slot 0x4
6,854,032 UART: [art] Derive Key Pair
6,854,392 UART: [art] Store priv key in slot 0x5
6,867,518 UART: [art] Derive Key Pair - Done
6,882,352 UART: [art] Signing Cert with AUTHO
6,882,832 UART: RITY.KEYID = 7
6,897,760 UART: [art] Erasing AUTHORITY.KEYID = 7
6,898,525 UART: [art] PUB.X = A2F40E051C7BA3A264FCDFEFF3CC59660E9382665ECE1DFBB05243AEB24728781BDFFCE66C0A52C7AD79EA3185F050BD
6,905,307 UART: [art] PUB.Y = 6B522B9EC08DC6517B0D69E644B09AB688BC20285C73A72357B12854772D8AAD7ECF4EEF8FAA73D0AA6CAE3511D38FB0
6,912,270 UART: [art] SIG.R = F697640FD96F88FDA189B9BF000B31F1C5173FD10CE06B7DF34F7C9CB0C4030CE8A6179BE348114761D3CC37FF8D9A89
6,919,015 UART: [art] SIG.S = 68E9EE53C9F65D0FE7E56289DE9277A489C01651B0028F9382AE3071DEEA8A34828044BBA2E0BCDE25E54618FC803C46
6,943,260 UART: Caliptra RT
6,943,605 UART: [state] CFI Enabled
7,224,996 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,255,769 UART: [rt]cmd =0x41545348, len=116
7,276,938 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
893,294 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,419 UART: [kat] ++
897,571 UART: [kat] sha1
901,809 UART: [kat] SHA2-256
903,749 UART: [kat] SHA2-384
906,518 UART: [kat] SHA2-512-ACC
908,419 UART: [kat] ECC-384
918,184 UART: [kat] HMAC-384Kdf
922,754 UART: [kat] LMS
1,171,082 UART: [kat] --
1,172,119 UART: [cold-reset] ++
1,172,603 UART: [fht] FHT @ 0x50003400
1,175,236 UART: [idev] ++
1,175,404 UART: [idev] CDI.KEYID = 6
1,175,764 UART: [idev] SUBJECT.KEYID = 7
1,176,188 UART: [idev] UDS.KEYID = 0
1,176,533 ready_for_fw is high
1,176,533 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,442 UART: [idev] Erasing UDS.KEYID = 0
1,201,317 UART: [idev] Sha1 KeyId Algorithm
1,209,695 UART: [idev] --
1,210,719 UART: [ldev] ++
1,210,887 UART: [ldev] CDI.KEYID = 6
1,211,250 UART: [ldev] SUBJECT.KEYID = 5
1,211,676 UART: [ldev] AUTHORITY.KEYID = 7
1,212,139 UART: [ldev] FE.KEYID = 1
1,217,059 UART: [ldev] Erasing FE.KEYID = 1
1,243,968 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,801 UART: [ldev] --
1,283,304 UART: [fwproc] Wait for Commands...
1,284,082 UART: [fwproc] Recv command 0x46574c44
1,284,810 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,716 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,020 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,785 >>> mbox cmd response: success
2,775,027 UART: [afmc] ++
2,775,195 UART: [afmc] CDI.KEYID = 6
2,775,557 UART: [afmc] SUBJECT.KEYID = 7
2,775,982 UART: [afmc] AUTHORITY.KEYID = 5
2,810,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,320 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,048 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,933 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,652 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,566 UART: [afmc] --
2,854,480 UART: [cold-reset] --
2,855,206 UART: [state] Locking Datavault
2,856,161 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,765 UART: [state] Locking ICCM
2,857,383 UART: [exit] Launching FMC @ 0x40000130
2,862,712 UART:
2,862,728 UART: Running Caliptra FMC ...
2,863,136 UART:
2,863,190 UART: [state] CFI Enabled
2,873,787 UART: [fht] FMC Alias Private Key: 7
2,981,718 UART: [art] Extend RT PCRs Done
2,982,146 UART: [art] Lock RT PCRs Done
2,984,118 UART: [art] Populate DV Done
2,992,425 UART: [fht] FMC Alias Private Key: 7
2,993,455 UART: [art] Derive CDI
2,993,735 UART: [art] Store in in slot 0x4
3,079,268 UART: [art] Derive Key Pair
3,079,628 UART: [art] Store priv key in slot 0x5
3,092,404 UART: [art] Derive Key Pair - Done
3,107,086 UART: [art] Signing Cert with AUTHO
3,107,566 UART: RITY.KEYID = 7
3,122,770 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,535 UART: [art] PUB.X = 84C15AA559E326355C2FCA2B6D5E24C4E712C08EF7368484EC5AAD41AFAC557DA7BF7A5404AFC12F4C448DDE9A3C9845
3,130,320 UART: [art] PUB.Y = 8FE453A0B694E870B4BF44CD1CBAE102459455D0EF92B9FFDD8B2AAE93E9C34B1CEB1ECE5531B2E6FC3470CB8D47332D
3,137,291 UART: [art] SIG.R = 6977DA80DCC40A8D27CB803815CB556D53DAEF4F238D9C336D3E53A376DC6BDEE8AD6FC5010C87AF16E6CDA1A002A547
3,144,069 UART: [art] SIG.S = 1B9676F201EB3CA883B5C716FAEBDE9B095533F600BEFCA94CA073EFDB242A1EAE3142343E64C9317B8A13DDEE188BEE
3,167,472 UART: Caliptra RT
3,167,725 UART: [state] CFI Enabled
3,275,188 UART: [rt] RT listening for mailbox commands...
3,275,858 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,922 UART: [rt]cmd =0x41544d4e, len=14344
3,708,509 >>> mbox cmd response data (8 bytes)
3,708,510 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,651 UART: [rt]cmd =0x41545348, len=116
3,760,136 >>> mbox cmd response data (12 bytes)
3,760,137 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,726 UART:
3,760,742 UART: Running Caliptra ROM ...
3,761,150 UART:
3,761,205 UART: [state] CFI Enabled
3,763,551 UART: [state] LifecycleState = Unprovisioned
3,764,206 UART: [state] DebugLocked = No
3,764,914 UART: [state] WD Timer not started. Device not locked for debugging
3,766,082 UART: [kat] SHA2-256
4,571,732 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,575,857 UART: [kat] ++
4,576,009 UART: [kat] sha1
4,580,177 UART: [kat] SHA2-256
4,582,117 UART: [kat] SHA2-384
4,584,822 UART: [kat] SHA2-512-ACC
4,586,722 UART: [kat] ECC-384
4,596,429 UART: [kat] HMAC-384Kdf
4,601,105 UART: [kat] LMS
4,849,433 UART: [kat] --
4,850,571 UART: [update-reset] ++
6,162,851 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,163,882 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,313,706 >>> mbox cmd response: success
6,313,706 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,314,063 UART: [update-reset] Copying MAN_2 To MAN_1
6,322,077 UART: [update-reset Success] --
6,322,948 UART: [state] Locking Datavault
6,323,862 UART: [state] Locking PCR0, PCR1 and PCR31
6,324,466 UART: [state] Locking ICCM
6,325,062 UART: [exit] Launching FMC @ 0x40000130
6,330,391 UART:
6,330,407 UART: Running Caliptra FMC ...
6,330,815 UART:
6,330,869 UART: [state] CFI Enabled
6,419,688 UART: [art] Extend RT PCRs Done
6,420,116 UART: [art] Lock RT PCRs Done
6,421,485 UART: [art] Populate DV Done
6,429,668 UART: [fht] FMC Alias Private Key: 7
6,430,808 UART: [art] Derive CDI
6,431,088 UART: [art] Store in in slot 0x4
6,516,445 UART: [art] Derive Key Pair
6,516,805 UART: [art] Store priv key in slot 0x5
6,529,549 UART: [art] Derive Key Pair - Done
6,544,227 UART: [art] Signing Cert with AUTHO
6,544,707 UART: RITY.KEYID = 7
6,559,869 UART: [art] Erasing AUTHORITY.KEYID = 7
6,560,634 UART: [art] PUB.X = 5AFC8254FC42C73BFBAB98E06BEF6838B574D86DDB299FE2F20FD52EE924CA948D6F66C425CBDE0D22C17430596C7E85
6,567,416 UART: [art] PUB.Y = 37D6FC46B947E5266A2A67706629E172ACA453F16BD290209DCC41CF52DFBB9AD57F0422009B85761B30AAA88AB34410
6,574,345 UART: [art] SIG.R = F007883C5313B38BE3F689232A1734A62DA106B0A2047D58E5BBF33F63C9F81E44C99276192DB0273F19A57C16790186
6,581,095 UART: [art] SIG.S = D710AB4775508DAA556A3EB664C75494464C3BB34F4F529DF76C60FBA2440239DE9F5DE4FE15E461A66BDBCCD3F9D45E
6,604,903 UART: Caliptra RT
6,605,156 UART: [state] CFI Enabled
6,883,448 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,914,465 UART: [rt]cmd =0x41545348, len=116
6,935,714 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,629 ready_for_fw is high
1,060,629 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,454 >>> mbox cmd response: success
2,687,848 UART:
2,687,864 UART: Running Caliptra FMC ...
2,688,272 UART:
2,688,326 UART: [state] CFI Enabled
2,698,657 UART: [fht] FMC Alias Private Key: 7
2,807,034 UART: [art] Extend RT PCRs Done
2,807,462 UART: [art] Lock RT PCRs Done
2,808,898 UART: [art] Populate DV Done
2,816,797 UART: [fht] FMC Alias Private Key: 7
2,817,887 UART: [art] Derive CDI
2,818,167 UART: [art] Store in in slot 0x4
2,903,896 UART: [art] Derive Key Pair
2,904,256 UART: [art] Store priv key in slot 0x5
2,917,158 UART: [art] Derive Key Pair - Done
2,931,517 UART: [art] Signing Cert with AUTHO
2,931,997 UART: RITY.KEYID = 7
2,947,111 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,876 UART: [art] PUB.X = 0EA6EAB7A24361A4408ADD137FA0D13063BB7E2CD9D1678C4BDE8D2B845E0D7892D608CB82148FAB8EF910F586A53E9F
2,954,653 UART: [art] PUB.Y = 6673B2D3AF536D3FCA995789250BCABDC3EAB0139A7E4139953AEAA93EB08C5C73A070158097D639F107D4F0A5037670
2,961,598 UART: [art] SIG.R = B116CFA565248D06BFEBA8E707D9481D714D24B16D8A60E3E43FAE4D9F0EAEF9E8CD491EC1EF292C7CDE78F23F754610
2,968,379 UART: [art] SIG.S = CF74AF9CD9F5E33716646B948DF1CA90DC03F2B714480B4DD53A8A589C94D9DE152EBAB3A92DCC5932FB2ED4B14A2082
2,991,624 UART: Caliptra RT
2,991,877 UART: [state] CFI Enabled
3,098,931 UART: [rt] RT listening for mailbox commands...
3,099,601 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,635 UART: [rt]cmd =0x41544d4e, len=14344
3,533,250 >>> mbox cmd response data (8 bytes)
3,533,251 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,538 UART: [rt]cmd =0x41545348, len=116
3,584,889 >>> mbox cmd response data (12 bytes)
3,584,890 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,021,130 >>> mbox cmd response: success
6,021,130 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,034,198 UART:
6,034,214 UART: Running Caliptra FMC ...
6,034,622 UART:
6,034,676 UART: [state] CFI Enabled
6,123,077 UART: [art] Extend RT PCRs Done
6,123,505 UART: [art] Lock RT PCRs Done
6,124,712 UART: [art] Populate DV Done
6,132,673 UART: [fht] FMC Alias Private Key: 7
6,133,845 UART: [art] Derive CDI
6,134,125 UART: [art] Store in in slot 0x4
6,219,922 UART: [art] Derive Key Pair
6,220,282 UART: [art] Store priv key in slot 0x5
6,234,032 UART: [art] Derive Key Pair - Done
6,248,809 UART: [art] Signing Cert with AUTHO
6,249,289 UART: RITY.KEYID = 7
6,264,473 UART: [art] Erasing AUTHORITY.KEYID = 7
6,265,238 UART: [art] PUB.X = F3FE333633D0C603F679CE70A306E3D1D76DCB03C150B024CBF4771F5BA6F053F256E206ED1D07491A6A93235ED8DB33
6,272,001 UART: [art] PUB.Y = 1A1D07482B05B7499F7E1EAD60A0C42B20C76EA9931BF2E2B279694C369BBA977F279840962C26DA767646F85A7BDAD8
6,278,949 UART: [art] SIG.R = 201DCE8AA7D693393C1C3549B38029CFEF7C3F7084D6FC7CB4145E77E320098BBAF684A8CDA45FFE55A11F41292D95CF
6,285,730 UART: [art] SIG.S = 65A298016BDBA8E8D62CA98BF16C89C08649C7A95ECC9425DFAAD902529FF3EF1AACA9EC3B2EA973DBF1159364664377
6,309,625 UART: Caliptra RT
6,309,878 UART: [state] CFI Enabled
6,589,665 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,620,732 UART: [rt]cmd =0x41545348, len=116
6,641,699 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
893,733 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,858 UART: [kat] ++
898,010 UART: [kat] sha1
902,218 UART: [kat] SHA2-256
904,158 UART: [kat] SHA2-384
906,815 UART: [kat] SHA2-512-ACC
908,716 UART: [kat] ECC-384
918,631 UART: [kat] HMAC-384Kdf
923,221 UART: [kat] LMS
1,171,549 UART: [kat] --
1,172,490 UART: [cold-reset] ++
1,173,064 UART: [fht] FHT @ 0x50003400
1,175,797 UART: [idev] ++
1,175,965 UART: [idev] CDI.KEYID = 6
1,176,325 UART: [idev] SUBJECT.KEYID = 7
1,176,749 UART: [idev] UDS.KEYID = 0
1,177,094 ready_for_fw is high
1,177,094 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,717 UART: [idev] Erasing UDS.KEYID = 0
1,202,244 UART: [idev] Sha1 KeyId Algorithm
1,210,702 UART: [idev] --
1,211,762 UART: [ldev] ++
1,211,930 UART: [ldev] CDI.KEYID = 6
1,212,293 UART: [ldev] SUBJECT.KEYID = 5
1,212,719 UART: [ldev] AUTHORITY.KEYID = 7
1,213,182 UART: [ldev] FE.KEYID = 1
1,218,278 UART: [ldev] Erasing FE.KEYID = 1
1,244,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,664 UART: [ldev] --
1,283,941 UART: [fwproc] Wait for Commands...
1,284,731 UART: [fwproc] Recv command 0x46574c44
1,285,459 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,992 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,583 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,887 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,760 >>> mbox cmd response: success
2,775,950 UART: [afmc] ++
2,776,118 UART: [afmc] CDI.KEYID = 6
2,776,480 UART: [afmc] SUBJECT.KEYID = 7
2,776,905 UART: [afmc] AUTHORITY.KEYID = 5
2,812,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,207 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,955 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,683 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,568 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,287 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,221 UART: [afmc] --
2,856,145 UART: [cold-reset] --
2,857,043 UART: [state] Locking Datavault
2,858,366 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,970 UART: [state] Locking ICCM
2,859,494 UART: [exit] Launching FMC @ 0x40000130
2,864,823 UART:
2,864,839 UART: Running Caliptra FMC ...
2,865,247 UART:
2,865,390 UART: [state] CFI Enabled
2,876,107 UART: [fht] FMC Alias Private Key: 7
2,983,804 UART: [art] Extend RT PCRs Done
2,984,232 UART: [art] Lock RT PCRs Done
2,985,698 UART: [art] Populate DV Done
2,993,877 UART: [fht] FMC Alias Private Key: 7
2,994,821 UART: [art] Derive CDI
2,995,101 UART: [art] Store in in slot 0x4
3,080,682 UART: [art] Derive Key Pair
3,081,042 UART: [art] Store priv key in slot 0x5
3,094,470 UART: [art] Derive Key Pair - Done
3,109,385 UART: [art] Signing Cert with AUTHO
3,109,865 UART: RITY.KEYID = 7
3,124,823 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,588 UART: [art] PUB.X = 9A1DF54CD270E561E9E06D828DC85005823A825C4829BF29EC5B6E945DF498D6A9283F2241C62E3B2F4D64543DFBD2B6
3,132,361 UART: [art] PUB.Y = 6F947E089D423C033C7353A574BC421CE1262B94258297CB448F4B0F54BB1EC1CCB9C0BE3A1A032BA8732C22675408BE
3,139,300 UART: [art] SIG.R = 8528448AFFF5A98DC20EAB4A8869CFCD9A5D4FB72E410C52261DF2883480A300162084311BE7DAF8EC61C4DAF6E34A0A
3,146,053 UART: [art] SIG.S = 62F70D9223614B41C83DD1FB9EC2D6BA8A95B7E2C21F27C71CD1A861EE587AB2981B86ED57819539FB034EC4DBBC8742
3,169,856 UART: Caliptra RT
3,170,201 UART: [state] CFI Enabled
3,278,372 UART: [rt] RT listening for mailbox commands...
3,279,042 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,764 UART: [rt]cmd =0x41544d4e, len=14344
3,711,119 >>> mbox cmd response data (8 bytes)
3,711,120 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,279 UART: [rt]cmd =0x41545348, len=116
3,762,994 >>> mbox cmd response data (12 bytes)
3,762,995 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,746 UART:
3,763,762 UART: Running Caliptra ROM ...
3,764,170 UART:
3,764,312 UART: [state] CFI Enabled
3,767,130 UART: [state] LifecycleState = Unprovisioned
3,767,785 UART: [state] DebugLocked = No
3,768,345 UART: [state] WD Timer not started. Device not locked for debugging
3,769,667 UART: [kat] SHA2-256
4,575,317 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,579,442 UART: [kat] ++
4,579,594 UART: [kat] sha1
4,583,660 UART: [kat] SHA2-256
4,585,600 UART: [kat] SHA2-384
4,588,205 UART: [kat] SHA2-512-ACC
4,590,105 UART: [kat] ECC-384
4,599,590 UART: [kat] HMAC-384Kdf
4,604,130 UART: [kat] LMS
4,852,458 UART: [kat] --
4,853,232 UART: [update-reset] ++
6,166,054 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,167,013 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,316,837 >>> mbox cmd response: success
6,316,837 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,317,082 UART: [update-reset] Copying MAN_2 To MAN_1
6,325,096 UART: [update-reset Success] --
6,326,131 UART: [state] Locking Datavault
6,326,853 UART: [state] Locking PCR0, PCR1 and PCR31
6,327,457 UART: [state] Locking ICCM
6,328,131 UART: [exit] Launching FMC @ 0x40000130
6,333,460 UART:
6,333,476 UART: Running Caliptra FMC ...
6,333,884 UART:
6,334,027 UART: [state] CFI Enabled
6,423,320 UART: [art] Extend RT PCRs Done
6,423,748 UART: [art] Lock RT PCRs Done
6,425,175 UART: [art] Populate DV Done
6,433,660 UART: [fht] FMC Alias Private Key: 7
6,434,632 UART: [art] Derive CDI
6,434,912 UART: [art] Store in in slot 0x4
6,520,711 UART: [art] Derive Key Pair
6,521,071 UART: [art] Store priv key in slot 0x5
6,534,645 UART: [art] Derive Key Pair - Done
6,549,363 UART: [art] Signing Cert with AUTHO
6,549,843 UART: RITY.KEYID = 7
6,564,967 UART: [art] Erasing AUTHORITY.KEYID = 7
6,565,732 UART: [art] PUB.X = 07DFD61B73E45FFCD2981D911F8B106482A4DE049E288321145CD102612B4A83D52D14835DEE8C64F372AB5CCF6E021A
6,572,496 UART: [art] PUB.Y = CCA8D82D3715B144BD9D9A92A9141731C8A3B5C403CC45E5C917962C9EF080A2F3FBAB17B4612D9CC840A59B309A9E44
6,579,453 UART: [art] SIG.R = 159B0154C24058055865A6EC3D44E2CD07CF96F8E33CC4A950DEABFCA01DD2A8792D93984EDBC716F72F4544F5C1F702
6,586,221 UART: [art] SIG.S = 9C0CF51B731D12A15995B5F20F35E77802ED654A401910B06F36BBE457CA326A3745F199A8AF27C22C005AE98CC5031B
6,609,978 UART: Caliptra RT
6,610,323 UART: [state] CFI Enabled
6,891,346 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,922,323 UART: [rt]cmd =0x41545348, len=116
6,943,598 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,118 ready_for_fw is high
1,060,118 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,285 >>> mbox cmd response: success
2,687,729 UART:
2,687,745 UART: Running Caliptra FMC ...
2,688,153 UART:
2,688,296 UART: [state] CFI Enabled
2,698,881 UART: [fht] FMC Alias Private Key: 7
2,806,750 UART: [art] Extend RT PCRs Done
2,807,178 UART: [art] Lock RT PCRs Done
2,808,368 UART: [art] Populate DV Done
2,816,411 UART: [fht] FMC Alias Private Key: 7
2,817,585 UART: [art] Derive CDI
2,817,865 UART: [art] Store in in slot 0x4
2,903,970 UART: [art] Derive Key Pair
2,904,330 UART: [art] Store priv key in slot 0x5
2,917,282 UART: [art] Derive Key Pair - Done
2,932,164 UART: [art] Signing Cert with AUTHO
2,932,644 UART: RITY.KEYID = 7
2,947,868 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,633 UART: [art] PUB.X = 38CD5A82D978EEEE40470EC7456181CEC3F9972DC2DB9D7F189C85F662B3EF631689DFF177C607F6AE188F010DAD38D0
2,955,403 UART: [art] PUB.Y = C5F588C3A0A8670A93CA0CA903A4F758B38ECFA454955514C1C131775C2FAB0352C24292DA4332D61C1F4C157F856C72
2,962,343 UART: [art] SIG.R = 1FB4A73BCBC7196955C83E45188AE4D247B41C71CC62CB381B988BB326072F39884324252EC523C6263D1AF7B47533E2
2,969,108 UART: [art] SIG.S = FF704004D84CED793B05C0DD6A602ED4B2EE990D82E227ECD25897A4657E7131841A8DE61E4BB1ABFB85592011B06094
2,992,796 UART: Caliptra RT
2,993,141 UART: [state] CFI Enabled
3,101,032 UART: [rt] RT listening for mailbox commands...
3,101,702 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,868 UART: [rt]cmd =0x41544d4e, len=14344
3,535,275 >>> mbox cmd response data (8 bytes)
3,535,276 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,453 UART: [rt]cmd =0x41545348, len=116
3,586,856 >>> mbox cmd response data (12 bytes)
3,586,857 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,025,070 >>> mbox cmd response: success
6,025,070 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,038,592 UART:
6,038,608 UART: Running Caliptra FMC ...
6,039,016 UART:
6,039,159 UART: [state] CFI Enabled
6,128,470 UART: [art] Extend RT PCRs Done
6,128,898 UART: [art] Lock RT PCRs Done
6,130,077 UART: [art] Populate DV Done
6,138,496 UART: [fht] FMC Alias Private Key: 7
6,139,574 UART: [art] Derive CDI
6,139,854 UART: [art] Store in in slot 0x4
6,225,725 UART: [art] Derive Key Pair
6,226,085 UART: [art] Store priv key in slot 0x5
6,239,301 UART: [art] Derive Key Pair - Done
6,253,754 UART: [art] Signing Cert with AUTHO
6,254,234 UART: RITY.KEYID = 7
6,269,474 UART: [art] Erasing AUTHORITY.KEYID = 7
6,270,239 UART: [art] PUB.X = 20C683914943EBB48ADD8BB5363E3F6953801D3DAB797C83BA9192A2EB884B3C3929B4734B364AB55AE359821380B188
6,277,007 UART: [art] PUB.Y = 8AD7C1B0ADE9C197B354F92D759EA42FF892F23C16D29835939397E1564B81A2FE5EF24FA42027F4900A2B51E9236DE4
6,283,958 UART: [art] SIG.R = B9DF8FB404D38F5B92BE6960F829588EAB9E5783E5F533E9D31BFFE415F43E3FF4CA535D770D4A8B2ED30EC60011F102
6,290,708 UART: [art] SIG.S = F516F6FBAF82D8AA6C8E48B09FA00D5508BF218A61427A7733711F0D123AD42EDC5A8E0D56F8D562C976D7E48D139357
6,314,497 UART: Caliptra RT
6,314,842 UART: [state] CFI Enabled
6,595,400 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,626,499 UART: [rt]cmd =0x41545348, len=116
6,648,850 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,253 UART: [kat] ++
895,405 UART: [kat] sha1
899,611 UART: [kat] SHA2-256
901,551 UART: [kat] SHA2-384
904,172 UART: [kat] SHA2-512-ACC
906,073 UART: [kat] ECC-384
915,772 UART: [kat] HMAC-384Kdf
920,330 UART: [kat] LMS
1,168,642 UART: [kat] --
1,169,363 UART: [cold-reset] ++
1,169,747 UART: [fht] FHT @ 0x50003400
1,172,383 UART: [idev] ++
1,172,551 UART: [idev] CDI.KEYID = 6
1,172,912 UART: [idev] SUBJECT.KEYID = 7
1,173,337 UART: [idev] UDS.KEYID = 0
1,173,683 ready_for_fw is high
1,173,683 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,411 UART: [idev] Erasing UDS.KEYID = 0
1,197,965 UART: [idev] Sha1 KeyId Algorithm
1,206,825 UART: [idev] --
1,207,760 UART: [ldev] ++
1,207,928 UART: [ldev] CDI.KEYID = 6
1,208,292 UART: [ldev] SUBJECT.KEYID = 5
1,208,719 UART: [ldev] AUTHORITY.KEYID = 7
1,209,182 UART: [ldev] FE.KEYID = 1
1,214,634 UART: [ldev] Erasing FE.KEYID = 1
1,240,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,570 UART: [ldev] --
1,279,938 UART: [fwproc] Wait for Commands...
1,280,687 UART: [fwproc] Recv command 0x46574c44
1,281,420 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,918 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,227 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,979 >>> mbox cmd response: success
2,772,052 UART: [afmc] ++
2,772,220 UART: [afmc] CDI.KEYID = 6
2,772,583 UART: [afmc] SUBJECT.KEYID = 7
2,773,009 UART: [afmc] AUTHORITY.KEYID = 5
2,808,394 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,564 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,315 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,044 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,927 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,646 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,315 UART: [afmc] --
2,851,375 UART: [cold-reset] --
2,852,141 UART: [state] Locking Datavault
2,853,494 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,098 UART: [state] Locking ICCM
2,854,528 UART: [exit] Launching FMC @ 0x40000130
2,859,857 UART:
2,859,873 UART: Running Caliptra FMC ...
2,860,281 UART:
2,860,335 UART: [state] CFI Enabled
2,870,662 UART: [fht] FMC Alias Private Key: 7
2,978,251 UART: [art] Extend RT PCRs Done
2,978,679 UART: [art] Lock RT PCRs Done
2,980,175 UART: [art] Populate DV Done
2,988,516 UART: [fht] FMC Alias Private Key: 7
2,989,520 UART: [art] Derive CDI
2,989,800 UART: [art] Store in in slot 0x4
3,075,225 UART: [art] Derive Key Pair
3,075,585 UART: [art] Store priv key in slot 0x5
3,088,689 UART: [art] Derive Key Pair - Done
3,103,497 UART: [art] Signing Cert with AUTHO
3,103,977 UART: RITY.KEYID = 7
3,118,725 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,490 UART: [art] PUB.X = 0D07B265CE58FD5F7C6E8F21EFB000216D5868B0A8DCF9BAD04707DAAA9AE766FA5E2AE851E365A1E02A271AB3AC82FF
3,126,253 UART: [art] PUB.Y = FC9431714CCD28506C768BA25E71485BAC06B2247E7D014C2ADDDFB6AAB829E1F8B5D83037F476CBC9CE934D6E273BC1
3,133,213 UART: [art] SIG.R = 701EF159D64E817D07AA344038BBBD66E37559513AFF0C20B852D77094454ADE47E4D5F92902A9C56EA925359A6F976E
3,139,974 UART: [art] SIG.S = D7135BDE8122AB3E012FEE5A5AD5FEB609A642CA19E88DD7EA7C12DFA3F1E45A2DAAC60A494415DC1E5A034BDCF85D1E
3,163,609 UART: Caliptra RT
3,163,862 UART: [state] CFI Enabled
3,271,503 UART: [rt] RT listening for mailbox commands...
3,272,173 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,135 UART: [rt]cmd =0x41544d4e, len=14344
3,705,844 >>> mbox cmd response data (8 bytes)
3,705,845 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,982 UART: [rt]cmd =0x41545348, len=116
3,756,933 >>> mbox cmd response data (12 bytes)
3,756,934 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,757,661 UART:
3,757,677 UART: Running Caliptra ROM ...
3,758,085 UART:
3,758,140 UART: [state] CFI Enabled
3,761,038 UART: [state] LifecycleState = Unprovisioned
3,761,693 UART: [state] DebugLocked = No
3,762,209 UART: [state] WD Timer not started. Device not locked for debugging
3,763,487 UART: [kat] SHA2-256
4,567,037 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,571,166 UART: [kat] ++
4,571,318 UART: [kat] sha1
4,575,572 UART: [kat] SHA2-256
4,577,512 UART: [kat] SHA2-384
4,580,069 UART: [kat] SHA2-512-ACC
4,581,969 UART: [kat] ECC-384
4,592,076 UART: [kat] HMAC-384Kdf
4,596,752 UART: [kat] LMS
4,845,064 UART: [kat] --
4,846,080 UART: [update-reset] ++
6,158,059 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,159,170 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,308,994 >>> mbox cmd response: success
6,308,994 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,309,217 UART: [update-reset] Copying MAN_2 To MAN_1
6,317,231 UART: [update-reset Success] --
6,318,166 UART: [state] Locking Datavault
6,318,994 UART: [state] Locking PCR0, PCR1 and PCR31
6,319,598 UART: [state] Locking ICCM
6,320,176 UART: [exit] Launching FMC @ 0x40000130
6,325,505 UART:
6,325,521 UART: Running Caliptra FMC ...
6,325,929 UART:
6,325,983 UART: [state] CFI Enabled
6,415,166 UART: [art] Extend RT PCRs Done
6,415,594 UART: [art] Lock RT PCRs Done
6,416,731 UART: [art] Populate DV Done
6,425,096 UART: [fht] FMC Alias Private Key: 7
6,426,084 UART: [art] Derive CDI
6,426,364 UART: [art] Store in in slot 0x4
6,511,983 UART: [art] Derive Key Pair
6,512,343 UART: [art] Store priv key in slot 0x5
6,524,829 UART: [art] Derive Key Pair - Done
6,539,276 UART: [art] Signing Cert with AUTHO
6,539,756 UART: RITY.KEYID = 7
6,555,166 UART: [art] Erasing AUTHORITY.KEYID = 7
6,555,931 UART: [art] PUB.X = 6C6BC45B79D838D86EB0F113EBD048030AB6E2AF8B05C3CE7AA9BAED241BFBEF2ED2DCD1CD4987F223AC2734B21F8D2A
6,562,722 UART: [art] PUB.Y = 5B5B51803625312A27A33C173A0BE5114AE4648F6339671F22B6DD7313BAF62E8A7655B5CF901B92993E8E95524BBE30
6,569,665 UART: [art] SIG.R = C8800381A8B0E8AB6E1F74D1FE621BDC4F769BAE2D8665B9E6569F3D3570C1424BD0A41B48C9322D745613E7C7165719
6,576,434 UART: [art] SIG.S = B97F5454B69D6C0B05933B4A106DACE51D1EFE9CEA0803FC48F46DBFA7AF1588CBBFD185B903373482B25176417B7BDA
6,600,738 UART: Caliptra RT
6,600,991 UART: [state] CFI Enabled
6,880,237 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,911,238 UART: [rt]cmd =0x41545348, len=116
6,932,045 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,754 ready_for_fw is high
1,055,754 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,331 >>> mbox cmd response: success
2,683,535 UART:
2,683,551 UART: Running Caliptra FMC ...
2,683,959 UART:
2,684,013 UART: [state] CFI Enabled
2,694,434 UART: [fht] FMC Alias Private Key: 7
2,801,961 UART: [art] Extend RT PCRs Done
2,802,389 UART: [art] Lock RT PCRs Done
2,803,817 UART: [art] Populate DV Done
2,812,086 UART: [fht] FMC Alias Private Key: 7
2,813,022 UART: [art] Derive CDI
2,813,302 UART: [art] Store in in slot 0x4
2,898,929 UART: [art] Derive Key Pair
2,899,289 UART: [art] Store priv key in slot 0x5
2,912,711 UART: [art] Derive Key Pair - Done
2,927,685 UART: [art] Signing Cert with AUTHO
2,928,165 UART: RITY.KEYID = 7
2,943,405 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,170 UART: [art] PUB.X = 443E755BC7D27BA08EA376938C6C5046A6C97300159458F7F20BD8DCE2642722582C4D50C6DDC534184D11A9A8788042
2,950,909 UART: [art] PUB.Y = 0B4C7A9AC4F27E83A02F7A73D78E66E478D220A68D11912FFC6D1057B0576D14BE28071057FF566021819DDC31F58F4F
2,957,855 UART: [art] SIG.R = 402C3BDAAC230FB5969209DDFAAD916C1962D7609004D5D5677A8372D9D3E8C979A07EB940DA2B5CA90AA2AED7394C83
2,964,625 UART: [art] SIG.S = BB9E908AF4494D320B6EA6AD154F62531657478EBA8F34CC307C1FBB64AD8159C6335409B1CE8C4AE45620EEEE9F2939
2,989,032 UART: Caliptra RT
2,989,285 UART: [state] CFI Enabled
3,096,872 UART: [rt] RT listening for mailbox commands...
3,097,542 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,760 UART: [rt]cmd =0x41544d4e, len=14344
3,530,767 >>> mbox cmd response data (8 bytes)
3,530,768 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,019 UART: [rt]cmd =0x41545348, len=116
3,582,190 >>> mbox cmd response data (12 bytes)
3,582,191 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,014,744 >>> mbox cmd response: success
6,014,744 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,027,954 UART:
6,027,970 UART: Running Caliptra FMC ...
6,028,378 UART:
6,028,432 UART: [state] CFI Enabled
6,117,929 UART: [art] Extend RT PCRs Done
6,118,357 UART: [art] Lock RT PCRs Done
6,119,648 UART: [art] Populate DV Done
6,128,007 UART: [fht] FMC Alias Private Key: 7
6,129,109 UART: [art] Derive CDI
6,129,389 UART: [art] Store in in slot 0x4
6,214,730 UART: [art] Derive Key Pair
6,215,090 UART: [art] Store priv key in slot 0x5
6,228,344 UART: [art] Derive Key Pair - Done
6,242,929 UART: [art] Signing Cert with AUTHO
6,243,409 UART: RITY.KEYID = 7
6,258,467 UART: [art] Erasing AUTHORITY.KEYID = 7
6,259,232 UART: [art] PUB.X = 5E8ACB6E9F85FBA2639AB50CBB77D6D87D1F5CB69F4F65E0B59343AFCA073F7B57D60DD0AAB9B7A6982C375AD4F5FB52
6,266,019 UART: [art] PUB.Y = CBC2437E2FCF6BBFFB06DAA4CD3ADE78EAFE3D53030179E380C6FDB631E84B4D08514D02EFEDBCC0F6253AFB5DD3308B
6,272,988 UART: [art] SIG.R = 586F03243F5378E1A15A28DD70F36E8B6DB490A854DFD47D396BA06949E9C49F7607DE0FC0695FD0885DACA16CA2E557
6,279,757 UART: [art] SIG.S = 636B7B8B8348B59A3901A002DF921C56BCD58D4640C574A0A00FAEEDCF07D2FD122050A627ACAE26E4ACB64550D37BC5
6,303,938 UART: Caliptra RT
6,304,191 UART: [state] CFI Enabled
6,585,084 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,616,053 UART: [rt]cmd =0x41545348, len=116
6,637,568 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
891,483 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,612 UART: [kat] ++
895,764 UART: [kat] sha1
900,148 UART: [kat] SHA2-256
902,088 UART: [kat] SHA2-384
904,721 UART: [kat] SHA2-512-ACC
906,622 UART: [kat] ECC-384
916,441 UART: [kat] HMAC-384Kdf
921,053 UART: [kat] LMS
1,169,365 UART: [kat] --
1,170,394 UART: [cold-reset] ++
1,170,972 UART: [fht] FHT @ 0x50003400
1,173,798 UART: [idev] ++
1,173,966 UART: [idev] CDI.KEYID = 6
1,174,327 UART: [idev] SUBJECT.KEYID = 7
1,174,752 UART: [idev] UDS.KEYID = 0
1,175,098 ready_for_fw is high
1,175,098 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,618 UART: [idev] Erasing UDS.KEYID = 0
1,200,036 UART: [idev] Sha1 KeyId Algorithm
1,208,996 UART: [idev] --
1,209,901 UART: [ldev] ++
1,210,069 UART: [ldev] CDI.KEYID = 6
1,210,433 UART: [ldev] SUBJECT.KEYID = 5
1,210,860 UART: [ldev] AUTHORITY.KEYID = 7
1,211,323 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,243,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,447 UART: [ldev] --
1,282,915 UART: [fwproc] Wait for Commands...
1,283,622 UART: [fwproc] Recv command 0x46574c44
1,284,355 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,043 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,352 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,130 >>> mbox cmd response: success
2,775,151 UART: [afmc] ++
2,775,319 UART: [afmc] CDI.KEYID = 6
2,775,682 UART: [afmc] SUBJECT.KEYID = 7
2,776,108 UART: [afmc] AUTHORITY.KEYID = 5
2,811,931 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,657 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,408 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,137 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,020 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,739 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,456 UART: [afmc] --
2,855,438 UART: [cold-reset] --
2,856,456 UART: [state] Locking Datavault
2,857,699 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,303 UART: [state] Locking ICCM
2,858,749 UART: [exit] Launching FMC @ 0x40000130
2,864,078 UART:
2,864,094 UART: Running Caliptra FMC ...
2,864,502 UART:
2,864,645 UART: [state] CFI Enabled
2,874,844 UART: [fht] FMC Alias Private Key: 7
2,982,835 UART: [art] Extend RT PCRs Done
2,983,263 UART: [art] Lock RT PCRs Done
2,984,809 UART: [art] Populate DV Done
2,992,960 UART: [fht] FMC Alias Private Key: 7
2,994,130 UART: [art] Derive CDI
2,994,410 UART: [art] Store in in slot 0x4
3,079,871 UART: [art] Derive Key Pair
3,080,231 UART: [art] Store priv key in slot 0x5
3,093,531 UART: [art] Derive Key Pair - Done
3,107,883 UART: [art] Signing Cert with AUTHO
3,108,363 UART: RITY.KEYID = 7
3,123,349 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,114 UART: [art] PUB.X = 9F76E153E2C1121334B0B18129DBA26433A9D5B0EEF1477727E42B0883B6E273EC19DB40172CBCD4816D87DCC315FF23
3,130,885 UART: [art] PUB.Y = 15BB4D2C17066CB9222F519D989198BDE3E789315B89F4B0424B20612CAF5A1FC3B91161049D5249CC40A084838F03EA
3,137,824 UART: [art] SIG.R = 8A24376B36EEEDB57821C250A2EB92675AD92FFC944CA7BA055E6460CAD32324B3645FC134C5F7211B7A8B8061C4DABE
3,144,603 UART: [art] SIG.S = BDEFB7B72B4EDB812940418822C4A2A9E288435930874EDF0AC7ABE6AA4A1E4FBF114AABDB4D541D276865FCDB6D67CF
3,168,597 UART: Caliptra RT
3,168,942 UART: [state] CFI Enabled
3,277,212 UART: [rt] RT listening for mailbox commands...
3,277,882 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,964 UART: [rt]cmd =0x41544d4e, len=14344
3,711,107 >>> mbox cmd response data (8 bytes)
3,711,108 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,077 UART: [rt]cmd =0x41545348, len=116
3,761,370 >>> mbox cmd response data (12 bytes)
3,761,371 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,054 UART:
3,762,070 UART: Running Caliptra ROM ...
3,762,478 UART:
3,762,620 UART: [state] CFI Enabled
3,765,400 UART: [state] LifecycleState = Unprovisioned
3,766,055 UART: [state] DebugLocked = No
3,766,647 UART: [state] WD Timer not started. Device not locked for debugging
3,767,847 UART: [kat] SHA2-256
4,571,397 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,575,526 UART: [kat] ++
4,575,678 UART: [kat] sha1
4,579,978 UART: [kat] SHA2-256
4,581,918 UART: [kat] SHA2-384
4,584,665 UART: [kat] SHA2-512-ACC
4,586,565 UART: [kat] ECC-384
4,596,522 UART: [kat] HMAC-384Kdf
4,601,092 UART: [kat] LMS
4,849,404 UART: [kat] --
4,850,140 UART: [update-reset] ++
6,162,461 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,163,662 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,313,486 >>> mbox cmd response: success
6,313,486 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,313,733 UART: [update-reset] Copying MAN_2 To MAN_1
6,321,747 UART: [update-reset Success] --
6,322,546 UART: [state] Locking Datavault
6,323,116 UART: [state] Locking PCR0, PCR1 and PCR31
6,323,720 UART: [state] Locking ICCM
6,324,388 UART: [exit] Launching FMC @ 0x40000130
6,329,717 UART:
6,329,733 UART: Running Caliptra FMC ...
6,330,141 UART:
6,330,284 UART: [state] CFI Enabled
6,419,505 UART: [art] Extend RT PCRs Done
6,419,933 UART: [art] Lock RT PCRs Done
6,421,026 UART: [art] Populate DV Done
6,429,425 UART: [fht] FMC Alias Private Key: 7
6,430,587 UART: [art] Derive CDI
6,430,867 UART: [art] Store in in slot 0x4
6,516,750 UART: [art] Derive Key Pair
6,517,110 UART: [art] Store priv key in slot 0x5
6,530,168 UART: [art] Derive Key Pair - Done
6,544,865 UART: [art] Signing Cert with AUTHO
6,545,345 UART: RITY.KEYID = 7
6,560,927 UART: [art] Erasing AUTHORITY.KEYID = 7
6,561,692 UART: [art] PUB.X = 613CBB6A6957489C5590A438192CD5005FD6D39C3DD34C7060DAD69978AEF802921489CE3AA6A9DDBD656BB354767502
6,568,436 UART: [art] PUB.Y = 1F4236D58D6833B8FB618E8DA22855D8CAF4579E7CC552C0CAC0576188A51B6FB6AB1FE79B2D87F336A8CC12E1500F2D
6,575,395 UART: [art] SIG.R = BD69EC697D28D19D4E438D4DCB39505460E33B526E24FC152E6314254421D457548C3B26837DC0247D0F08830C5A6550
6,582,148 UART: [art] SIG.S = F72BECDDB4F9E7F770E46A027F92C2EC383FDD0553F9D10C63A1966D9AAEBF9B3652C2342F99BA171EF7ADAB82C637D8
6,605,020 UART: Caliptra RT
6,605,365 UART: [state] CFI Enabled
6,883,309 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,913,976 UART: [rt]cmd =0x41545348, len=116
6,934,845 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,321 ready_for_fw is high
1,056,321 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,274 >>> mbox cmd response: success
2,686,774 UART:
2,686,790 UART: Running Caliptra FMC ...
2,687,198 UART:
2,687,341 UART: [state] CFI Enabled
2,698,174 UART: [fht] FMC Alias Private Key: 7
2,805,813 UART: [art] Extend RT PCRs Done
2,806,241 UART: [art] Lock RT PCRs Done
2,808,075 UART: [art] Populate DV Done
2,816,172 UART: [fht] FMC Alias Private Key: 7
2,817,178 UART: [art] Derive CDI
2,817,458 UART: [art] Store in in slot 0x4
2,903,481 UART: [art] Derive Key Pair
2,903,841 UART: [art] Store priv key in slot 0x5
2,916,919 UART: [art] Derive Key Pair - Done
2,931,914 UART: [art] Signing Cert with AUTHO
2,932,394 UART: RITY.KEYID = 7
2,947,346 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,111 UART: [art] PUB.X = EEB26788D1EDB1AB6527BA1B3D10E58F3528DF5EB4C6F7D3E8948034DB9CDF2534E6F1466877B97E86CF5EDE2A4EE457
2,954,899 UART: [art] PUB.Y = BE0CC1A6536CC345A76FD3300A5BA26F09857088139176CC0FAC58763616135BDDB54CD998D721C857FEBEE870D29039
2,961,841 UART: [art] SIG.R = 27D9E940273F9FE4C694934E558F7106AFDD5E6A4D22A6F14958786BD516785C68361BD4378EF9BCF44CFC218B062AAF
2,968,611 UART: [art] SIG.S = 6559E583F3DB92DE610CA59EB0583D96A71E1C5D70901822EFB47442EBE736185C093A69645C87DACBB128DB26E8978F
2,991,988 UART: Caliptra RT
2,992,333 UART: [state] CFI Enabled
3,100,254 UART: [rt] RT listening for mailbox commands...
3,100,924 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,282 UART: [rt]cmd =0x41544d4e, len=14344
3,534,191 >>> mbox cmd response data (8 bytes)
3,534,192 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,401 UART: [rt]cmd =0x41545348, len=116
3,586,210 >>> mbox cmd response data (12 bytes)
3,586,211 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,019,639 >>> mbox cmd response: success
6,019,639 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,033,129 UART:
6,033,145 UART: Running Caliptra FMC ...
6,033,553 UART:
6,033,696 UART: [state] CFI Enabled
6,122,627 UART: [art] Extend RT PCRs Done
6,123,055 UART: [art] Lock RT PCRs Done
6,124,184 UART: [art] Populate DV Done
6,132,269 UART: [fht] FMC Alias Private Key: 7
6,133,323 UART: [art] Derive CDI
6,133,603 UART: [art] Store in in slot 0x4
6,219,812 UART: [art] Derive Key Pair
6,220,172 UART: [art] Store priv key in slot 0x5
6,233,036 UART: [art] Derive Key Pair - Done
6,247,581 UART: [art] Signing Cert with AUTHO
6,248,061 UART: RITY.KEYID = 7
6,262,999 UART: [art] Erasing AUTHORITY.KEYID = 7
6,263,764 UART: [art] PUB.X = CA6BAA4B09671CDD00FB75563747C427DD4D64A6F8017DA2B54B0072281A74FDB2A3AA980941594A9EC0F356C097B4E8
6,270,489 UART: [art] PUB.Y = 6DBBD3E9FED4EFD04262EC939453EF712E2AFD49A5133500E6969850DBD79AD9F8C820056C1EE4AA02D7F44F0DF19FF5
6,277,426 UART: [art] SIG.R = F4413C67BEC1276699C032A5762776B00146F2782F1F9DDC38CE26D0D0A8A757860E67096740CA1195DA1147A9D63879
6,284,179 UART: [art] SIG.S = E3C48323BECB3EB89BAF2EC7067811247A32B71A6C51C6CDA522DE0A07EC1A6BAB18F78D7484820B8A4A1F714E505DF8
6,307,824 UART: Caliptra RT
6,308,169 UART: [state] CFI Enabled
6,593,781 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,624,776 UART: [rt]cmd =0x41545348, len=116
6,646,375 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,589 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,063 UART: [kat] SHA2-256
881,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,109 UART: [kat] ++
886,261 UART: [kat] sha1
890,439 UART: [kat] SHA2-256
892,377 UART: [kat] SHA2-384
894,886 UART: [kat] SHA2-512-ACC
896,787 UART: [kat] ECC-384
902,572 UART: [kat] HMAC-384Kdf
907,166 UART: [kat] LMS
1,475,362 UART: [kat] --
1,476,321 UART: [cold-reset] ++
1,476,899 UART: [fht] Storing FHT @ 0x50003400
1,479,740 UART: [idev] ++
1,479,908 UART: [idev] CDI.KEYID = 6
1,480,268 UART: [idev] SUBJECT.KEYID = 7
1,480,692 UART: [idev] UDS.KEYID = 0
1,481,037 ready_for_fw is high
1,481,037 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,592 UART: [idev] Erasing UDS.KEYID = 0
1,505,148 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,784 UART: [idev] --
1,514,881 UART: [ldev] ++
1,515,049 UART: [ldev] CDI.KEYID = 6
1,515,412 UART: [ldev] SUBJECT.KEYID = 5
1,515,838 UART: [ldev] AUTHORITY.KEYID = 7
1,516,301 UART: [ldev] FE.KEYID = 1
1,521,487 UART: [ldev] Erasing FE.KEYID = 1
1,546,982 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,768 UART: [ldev] --
1,586,145 UART: [fwproc] Waiting for Commands...
1,587,002 UART: [fwproc] Received command 0x46574c44
1,587,793 UART: [fwproc] Received Image of size 114332 bytes
2,886,035 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,027 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,379 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,134 >>> mbox cmd response: success
3,080,238 UART: [afmc] ++
3,080,406 UART: [afmc] CDI.KEYID = 6
3,080,768 UART: [afmc] SUBJECT.KEYID = 7
3,081,193 UART: [afmc] AUTHORITY.KEYID = 5
3,116,078 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,254 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,034 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,762 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,647 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,337 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,264 UART: [afmc] --
3,159,344 UART: [cold-reset] --
3,160,210 UART: [state] Locking Datavault
3,161,465 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,069 UART: [state] Locking ICCM
3,162,605 UART: [exit] Launching FMC @ 0x40000130
3,167,934 UART:
3,167,950 UART: Running Caliptra FMC ...
3,168,358 UART:
3,168,412 UART: [state] CFI Enabled
3,178,955 UART: [fht] FMC Alias Private Key: 7
3,286,558 UART: [art] Extend RT PCRs Done
3,286,986 UART: [art] Lock RT PCRs Done
3,288,566 UART: [art] Populate DV Done
3,296,985 UART: [fht] FMC Alias Private Key: 7
3,298,041 UART: [art] Derive CDI
3,298,321 UART: [art] Store in in slot 0x4
3,383,948 UART: [art] Derive Key Pair
3,384,308 UART: [art] Store priv key in slot 0x5
3,397,152 UART: [art] Derive Key Pair - Done
3,412,324 UART: [art] Signing Cert with AUTHO
3,412,804 UART: RITY.KEYID = 7
3,427,684 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,449 UART: [art] PUB.X = 120BAE6C4CC75B6BB535E20470C7D834A182C7892D77981D31811C46AF64E64FF44F436A43A5FF0BED11AE5642F18A32
3,435,216 UART: [art] PUB.Y = D8E401B064D844B466D1C1906F913FC77ED044E7B0E7DDEAA8B7DBD0230F0433581DD34720B6F1F399F59987352A38FB
3,442,163 UART: [art] SIG.R = ADB64E526F5B647D69E0A3C10EC5943F417E2F223D6A837352A387ED5E9EE88B3CECDA68B6FA1684AEE1849A7D7F72FA
3,448,948 UART: [art] SIG.S = 9A9C65D6C086C4C6F46004175588C19446D47CC4EFD21686712D0C2D04C7172EDA3A412946A452CFBED6FE3C8E74B00B
3,472,421 UART: Caliptra RT
3,472,674 UART: [state] CFI Enabled
3,580,252 UART: [rt] RT listening for mailbox commands...
3,580,922 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,814 UART: [rt]cmd =0x41544d4e, len=14344
4,013,564 >>> mbox cmd response data (8 bytes)
4,013,565 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,806 UART: [rt]cmd =0x41545348, len=116
4,045,267 >>> mbox cmd response data (12 bytes)
4,045,268 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,168 UART:
4,046,184 UART: Running Caliptra ROM ...
4,046,592 UART:
4,046,646 UART: [state] CFI Enabled
4,049,138 UART: [state] LifecycleState = Unprovisioned
4,049,793 UART: [state] DebugLocked = No
4,050,417 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,051,934 UART: [kat] SHA2-256
4,845,865 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,849,980 UART: [kat] ++
4,850,132 UART: [kat] sha1
4,854,356 UART: [kat] SHA2-256
4,856,294 UART: [kat] SHA2-384
4,859,095 UART: [kat] SHA2-512-ACC
4,860,995 UART: [kat] ECC-384
4,866,732 UART: [kat] HMAC-384Kdf
4,871,390 UART: [kat] LMS
5,439,586 UART: [kat] --
5,440,193 UART: [update-reset] ++
6,775,001 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,776,281 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,926,157 >>> mbox cmd response: success
6,926,157 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,926,310 UART: [update-reset] Copying MAN_2 To MAN_1
6,934,324 UART: [update-reset Success] --
6,935,321 UART: [state] Locking Datavault
6,936,073 UART: [state] Locking PCR0, PCR1 and PCR31
6,936,677 UART: [state] Locking ICCM
6,937,301 UART: [exit] Launching FMC @ 0x40000130
6,942,630 UART:
6,942,646 UART: Running Caliptra FMC ...
6,943,054 UART:
6,943,108 UART: [state] CFI Enabled
7,031,829 UART: [art] Extend RT PCRs Done
7,032,257 UART: [art] Lock RT PCRs Done
7,033,500 UART: [art] Populate DV Done
7,041,689 UART: [fht] FMC Alias Private Key: 7
7,042,697 UART: [art] Derive CDI
7,042,977 UART: [art] Store in in slot 0x4
7,128,708 UART: [art] Derive Key Pair
7,129,068 UART: [art] Store priv key in slot 0x5
7,142,328 UART: [art] Derive Key Pair - Done
7,156,708 UART: [art] Signing Cert with AUTHO
7,157,188 UART: RITY.KEYID = 7
7,172,360 UART: [art] Erasing AUTHORITY.KEYID = 7
7,173,125 UART: [art] PUB.X = E6DAD563512B486CFE1590DD5A77408736E0D53DD2FF4F8CF0DB0E0FF0470BA790C78994C6942E1A399D75E709AA1753
7,179,891 UART: [art] PUB.Y = 2DA34CC4ACA8B801A59BDF9B1260160A12F98C5F7F41EEDA24CD91C8DB28F1B7CE7CD1BEF9E0FA9C654FAA82CB5DB5AF
7,186,871 UART: [art] SIG.R = D14A1B86C82ED1407D6CFF5FAEB28698FE74E5F57500FC6223DA6C29D7CB662CA8B6CDFD30B9C1CCCE6E6761D4687E40
7,193,641 UART: [art] SIG.S = A098DA18B8E188A622627F65811D9B9E1DE8DC99F35B6C59D8C43E0C02BF3E7A8476FD160EA14C1C35E8393495CC6787
7,217,337 UART: Caliptra RT
7,217,590 UART: [state] CFI Enabled
7,499,252 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,530,093 UART: [rt]cmd =0x41545348, len=116
7,531,596 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,327 ready_for_fw is high
1,362,327 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,994 >>> mbox cmd response: success
2,987,632 UART:
2,987,648 UART: Running Caliptra FMC ...
2,988,056 UART:
2,988,110 UART: [state] CFI Enabled
2,998,537 UART: [fht] FMC Alias Private Key: 7
3,106,850 UART: [art] Extend RT PCRs Done
3,107,278 UART: [art] Lock RT PCRs Done
3,109,026 UART: [art] Populate DV Done
3,117,249 UART: [fht] FMC Alias Private Key: 7
3,118,369 UART: [art] Derive CDI
3,118,649 UART: [art] Store in in slot 0x4
3,204,246 UART: [art] Derive Key Pair
3,204,606 UART: [art] Store priv key in slot 0x5
3,217,562 UART: [art] Derive Key Pair - Done
3,232,128 UART: [art] Signing Cert with AUTHO
3,232,608 UART: RITY.KEYID = 7
3,247,942 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,707 UART: [art] PUB.X = 6547D16531B0C7869544BB5F554E5F5678FBB5B77B8D8D3BD0E3548C6A08CE10E396433684FDED7E508EB617BF8F9380
3,255,478 UART: [art] PUB.Y = DDE4F068A11CA2016AC75577DEF68556989FA9C900398C350351B6F252013FD9FDA23CA8F3A4AFABC95061436FE8007D
3,262,383 UART: [art] SIG.R = 424E22AED6518CBABC35E249DF12DF87252F6B2A8E9A17A634B98BB8D6048055F55F33421020C92AD4E6CA217D154EE7
3,269,158 UART: [art] SIG.S = CD4D2E4AD1A634B58CDDDAE038D14FA321BCB82FDD377895B7D49947CA5A28F7632F07D5CEF5EA6869DAEB5AFD4F0CB9
3,293,227 UART: Caliptra RT
3,293,480 UART: [state] CFI Enabled
3,401,993 UART: [rt] RT listening for mailbox commands...
3,402,663 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,567 UART: [rt]cmd =0x41544d4e, len=14344
3,835,417 >>> mbox cmd response data (8 bytes)
3,835,418 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,649 UART: [rt]cmd =0x41545348, len=116
3,867,338 >>> mbox cmd response data (12 bytes)
3,867,339 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,630,186 >>> mbox cmd response: success
6,630,186 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,643,587 UART:
6,643,603 UART: Running Caliptra FMC ...
6,644,011 UART:
6,644,065 UART: [state] CFI Enabled
6,732,864 UART: [art] Extend RT PCRs Done
6,733,292 UART: [art] Lock RT PCRs Done
6,734,433 UART: [art] Populate DV Done
6,742,878 UART: [fht] FMC Alias Private Key: 7
6,744,000 UART: [art] Derive CDI
6,744,280 UART: [art] Store in in slot 0x4
6,829,915 UART: [art] Derive Key Pair
6,830,275 UART: [art] Store priv key in slot 0x5
6,843,315 UART: [art] Derive Key Pair - Done
6,857,835 UART: [art] Signing Cert with AUTHO
6,858,315 UART: RITY.KEYID = 7
6,873,751 UART: [art] Erasing AUTHORITY.KEYID = 7
6,874,516 UART: [art] PUB.X = 0584130C2BD1D7D0CD93C5793FBBAA8E01D3243412063C41EC30C0AA6A15668DE6770259A853BB62D05D919A74F99A5B
6,881,275 UART: [art] PUB.Y = 13ABEEAE1A6512732C5A28C430761EDE93C36602D654CC2CA2985503B8E1D8D0FA71A867EC66E8C751A3F3253670BD0F
6,888,224 UART: [art] SIG.R = 8FD8D1D4053B62C5F3B448C1EF3943D6A3B41E5F980037B39BC73BD5FD72DB06147D2C7001178571BE1CC3422E78B0C6
6,894,969 UART: [art] SIG.S = B7D641B4EB2AAE3C60A8037E5F1EED23FBBE57CF9FA092B8AE956D6139A249CF5DD93A29A9C8BB86F69B842E4D2BBEDD
6,918,569 UART: Caliptra RT
6,918,822 UART: [state] CFI Enabled
7,201,982 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,232,959 UART: [rt]cmd =0x41545348, len=116
7,234,484 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,710 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,364 UART: [kat] SHA2-256
882,295 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,410 UART: [kat] ++
886,562 UART: [kat] sha1
890,856 UART: [kat] SHA2-256
892,794 UART: [kat] SHA2-384
895,447 UART: [kat] SHA2-512-ACC
897,348 UART: [kat] ECC-384
902,889 UART: [kat] HMAC-384Kdf
907,661 UART: [kat] LMS
1,475,857 UART: [kat] --
1,476,724 UART: [cold-reset] ++
1,477,228 UART: [fht] Storing FHT @ 0x50003400
1,480,061 UART: [idev] ++
1,480,229 UART: [idev] CDI.KEYID = 6
1,480,589 UART: [idev] SUBJECT.KEYID = 7
1,481,013 UART: [idev] UDS.KEYID = 0
1,481,358 ready_for_fw is high
1,481,358 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,315 UART: [idev] Erasing UDS.KEYID = 0
1,505,773 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,499 UART: [idev] --
1,515,528 UART: [ldev] ++
1,515,696 UART: [ldev] CDI.KEYID = 6
1,516,059 UART: [ldev] SUBJECT.KEYID = 5
1,516,485 UART: [ldev] AUTHORITY.KEYID = 7
1,516,948 UART: [ldev] FE.KEYID = 1
1,522,208 UART: [ldev] Erasing FE.KEYID = 1
1,547,809 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,295 UART: [ldev] --
1,586,734 UART: [fwproc] Waiting for Commands...
1,587,475 UART: [fwproc] Received command 0x46574c44
1,588,266 UART: [fwproc] Received Image of size 114332 bytes
2,886,252 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,972 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,324 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,203 >>> mbox cmd response: success
3,079,449 UART: [afmc] ++
3,079,617 UART: [afmc] CDI.KEYID = 6
3,079,979 UART: [afmc] SUBJECT.KEYID = 7
3,080,404 UART: [afmc] AUTHORITY.KEYID = 5
3,115,611 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,413 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,193 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,921 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,806 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,496 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,581 UART: [afmc] --
3,158,631 UART: [cold-reset] --
3,159,617 UART: [state] Locking Datavault
3,160,790 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,394 UART: [state] Locking ICCM
3,161,838 UART: [exit] Launching FMC @ 0x40000130
3,167,167 UART:
3,167,183 UART: Running Caliptra FMC ...
3,167,591 UART:
3,167,734 UART: [state] CFI Enabled
3,178,099 UART: [fht] FMC Alias Private Key: 7
3,286,704 UART: [art] Extend RT PCRs Done
3,287,132 UART: [art] Lock RT PCRs Done
3,288,458 UART: [art] Populate DV Done
3,296,539 UART: [fht] FMC Alias Private Key: 7
3,297,687 UART: [art] Derive CDI
3,297,967 UART: [art] Store in in slot 0x4
3,383,544 UART: [art] Derive Key Pair
3,383,904 UART: [art] Store priv key in slot 0x5
3,396,982 UART: [art] Derive Key Pair - Done
3,411,847 UART: [art] Signing Cert with AUTHO
3,412,327 UART: RITY.KEYID = 7
3,427,949 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,714 UART: [art] PUB.X = A3D7CA5A7811C9B2175DC5260C4E8A6C28D359D02DB4E12774E1E5D20BD312DBF94F9A0A7523F606A8828C53FB4A3B2C
3,435,484 UART: [art] PUB.Y = B6E0ABBC9A0744F5309AC942BE98EE7309F1E6B2E1CB525281DBAA2EB7C65CDD57484A7CFE6AE02114DC875FB097AEFC
3,442,454 UART: [art] SIG.R = 4E156C0015D803495FF9FC128FB06A0CF241A3ACABAB158FA84B9A72E21B375726A382481E325136C89C0760BB782ECB
3,449,199 UART: [art] SIG.S = C99AEEB41EC620AF8C9F085048D8EE6494845662F48FF0FD416DA53638CA640E663B5877A03F01130B16633C1760C93F
3,472,770 UART: Caliptra RT
3,473,115 UART: [state] CFI Enabled
3,581,634 UART: [rt] RT listening for mailbox commands...
3,582,304 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,342 UART: [rt]cmd =0x41544d4e, len=14344
4,014,632 >>> mbox cmd response data (8 bytes)
4,014,633 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,624 UART: [rt]cmd =0x41545348, len=116
4,046,379 >>> mbox cmd response data (12 bytes)
4,046,380 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,047,188 UART:
4,047,204 UART: Running Caliptra ROM ...
4,047,612 UART:
4,047,753 UART: [state] CFI Enabled
4,050,351 UART: [state] LifecycleState = Unprovisioned
4,051,006 UART: [state] DebugLocked = No
4,051,578 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,053,191 UART: [kat] SHA2-256
4,847,122 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,851,237 UART: [kat] ++
4,851,389 UART: [kat] sha1
4,855,555 UART: [kat] SHA2-256
4,857,493 UART: [kat] SHA2-384
4,860,316 UART: [kat] SHA2-512-ACC
4,862,216 UART: [kat] ECC-384
4,867,695 UART: [kat] HMAC-384Kdf
4,872,485 UART: [kat] LMS
5,440,681 UART: [kat] --
5,441,446 UART: [update-reset] ++
6,776,530 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,777,626 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,927,502 >>> mbox cmd response: success
6,927,502 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,927,717 UART: [update-reset] Copying MAN_2 To MAN_1
6,935,731 UART: [update-reset Success] --
6,936,804 UART: [state] Locking Datavault
6,937,514 UART: [state] Locking PCR0, PCR1 and PCR31
6,938,118 UART: [state] Locking ICCM
6,938,556 UART: [exit] Launching FMC @ 0x40000130
6,943,885 UART:
6,943,901 UART: Running Caliptra FMC ...
6,944,309 UART:
6,944,452 UART: [state] CFI Enabled
7,033,159 UART: [art] Extend RT PCRs Done
7,033,587 UART: [art] Lock RT PCRs Done
7,034,832 UART: [art] Populate DV Done
7,043,003 UART: [fht] FMC Alias Private Key: 7
7,044,099 UART: [art] Derive CDI
7,044,379 UART: [art] Store in in slot 0x4
7,130,220 UART: [art] Derive Key Pair
7,130,580 UART: [art] Store priv key in slot 0x5
7,143,744 UART: [art] Derive Key Pair - Done
7,158,703 UART: [art] Signing Cert with AUTHO
7,159,183 UART: RITY.KEYID = 7
7,174,447 UART: [art] Erasing AUTHORITY.KEYID = 7
7,175,212 UART: [art] PUB.X = 0B6B8FCDA4600AE6854E9D801460FD5DC670413CEB3BA70A3F0AFF3C8FE2D317B0A1D4FC2C7D547E7557B1BA4F5F280C
7,181,989 UART: [art] PUB.Y = B196BB7650D645B674C97605E4663DD38B5FD82353DEC51FE0397750590D1301A2DA5064681C2ED5DF7464DE5AA65B8C
7,188,932 UART: [art] SIG.R = C4A272D0A4E758CDEC60F0C11F2958F98AB1E71B0516C8F99B4B43C65213E527985070D7DB4C88E5D95978551C46B7E3
7,195,701 UART: [art] SIG.S = 925710751C7DE75E71EE2C4AE89B9ADAFEA83CEFAD82ECC18B02D0EB746168C11EEADB0F724AB9013DABCAE1986B525A
7,219,189 UART: Caliptra RT
7,219,534 UART: [state] CFI Enabled
7,507,004 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,537,839 UART: [rt]cmd =0x41545348, len=116
7,539,432 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,034 ready_for_fw is high
1,362,034 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,687 >>> mbox cmd response: success
2,988,925 UART:
2,988,941 UART: Running Caliptra FMC ...
2,989,349 UART:
2,989,492 UART: [state] CFI Enabled
3,000,087 UART: [fht] FMC Alias Private Key: 7
3,108,670 UART: [art] Extend RT PCRs Done
3,109,098 UART: [art] Lock RT PCRs Done
3,110,626 UART: [art] Populate DV Done
3,118,747 UART: [fht] FMC Alias Private Key: 7
3,119,803 UART: [art] Derive CDI
3,120,083 UART: [art] Store in in slot 0x4
3,205,644 UART: [art] Derive Key Pair
3,206,004 UART: [art] Store priv key in slot 0x5
3,218,362 UART: [art] Derive Key Pair - Done
3,232,945 UART: [art] Signing Cert with AUTHO
3,233,425 UART: RITY.KEYID = 7
3,248,763 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,528 UART: [art] PUB.X = 9B450C63C95B5DC2840E99471931A32640C906BA49FDD2F36AF8CE99C95343CB0BE3FAF1C0D63F97DC27BE602628AAB0
3,256,298 UART: [art] PUB.Y = A694A7FF574B3009451B06370D27D5A03423EC835DE94DFB39BD8CEE0C67D1E0A8093BB96B094564728AB42D9958D9C1
3,263,234 UART: [art] SIG.R = 4525AB144C6DB4A4CAE9FF8DB03A4998795BC9FD45205C27F515CA8DB66B007C06CA1DE51D011010FABB46E585EB1DCA
3,269,996 UART: [art] SIG.S = F9F992DF23DCF91A0ECFD08467380DBBC3DA1FDE1DE701B9DF1E48B7E9C5C865B6FF0C099DB689FC9171E2A8AB25753F
3,293,878 UART: Caliptra RT
3,294,223 UART: [state] CFI Enabled
3,402,824 UART: [rt] RT listening for mailbox commands...
3,403,494 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,228 UART: [rt]cmd =0x41544d4e, len=14344
3,836,172 >>> mbox cmd response data (8 bytes)
3,836,173 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,278 UART: [rt]cmd =0x41545348, len=116
3,867,947 >>> mbox cmd response data (12 bytes)
3,867,948 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,630,350 >>> mbox cmd response: success
6,630,350 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,643,725 UART:
6,643,741 UART: Running Caliptra FMC ...
6,644,149 UART:
6,644,292 UART: [state] CFI Enabled
6,733,449 UART: [art] Extend RT PCRs Done
6,733,877 UART: [art] Lock RT PCRs Done
6,735,038 UART: [art] Populate DV Done
6,743,007 UART: [fht] FMC Alias Private Key: 7
6,744,045 UART: [art] Derive CDI
6,744,325 UART: [art] Store in in slot 0x4
6,829,688 UART: [art] Derive Key Pair
6,830,048 UART: [art] Store priv key in slot 0x5
6,843,464 UART: [art] Derive Key Pair - Done
6,858,062 UART: [art] Signing Cert with AUTHO
6,858,542 UART: RITY.KEYID = 7
6,873,894 UART: [art] Erasing AUTHORITY.KEYID = 7
6,874,659 UART: [art] PUB.X = B133491FE5B4D8796E192556D80ECEAED30075B658DB179862824B296AB14237C9931C83A65FD86B2F2DD8E7E706BBD1
6,881,405 UART: [art] PUB.Y = 03B842696FC76C539E64C1E1BD4E822D1CEFE74E4FD02BDB72BB2E2A7CAD5F6EA58F632ACDD713410A35A6BCA4398D86
6,888,371 UART: [art] SIG.R = 09D90899F86E1AA3520A09DEF18E22E185F512D5300A7F958CD162FE6D28DB7A77F6A6D149B00C7CDAF902832884B726
6,895,124 UART: [art] SIG.S = 2AE75E70467BF09CFFCD7660F01F3D20E41AD0BBDFB957F9368A3F5BE40D38EF4059F4562259A872441CA19701249A48
6,918,919 UART: Caliptra RT
6,919,264 UART: [state] CFI Enabled
7,198,814 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,229,723 UART: [rt]cmd =0x41545348, len=116
7,231,302 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,643 UART: [state] WD Timer not started. Device not locked for debugging
87,850 UART: [kat] SHA2-256
893,500 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,625 UART: [kat] ++
897,777 UART: [kat] sha1
902,037 UART: [kat] SHA2-256
903,977 UART: [kat] SHA2-384
906,770 UART: [kat] SHA2-512-ACC
908,671 UART: [kat] ECC-384
918,604 UART: [kat] HMAC-384Kdf
923,298 UART: [kat] LMS
1,171,626 UART: [kat] --
1,172,551 UART: [cold-reset] ++
1,172,983 UART: [fht] FHT @ 0x50003400
1,175,594 UART: [idev] ++
1,175,762 UART: [idev] CDI.KEYID = 6
1,176,122 UART: [idev] SUBJECT.KEYID = 7
1,176,546 UART: [idev] UDS.KEYID = 0
1,176,891 ready_for_fw is high
1,176,891 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,646 UART: [idev] Erasing UDS.KEYID = 0
1,201,667 UART: [idev] Sha1 KeyId Algorithm
1,210,149 UART: [idev] --
1,211,117 UART: [ldev] ++
1,211,285 UART: [ldev] CDI.KEYID = 6
1,211,648 UART: [ldev] SUBJECT.KEYID = 5
1,212,074 UART: [ldev] AUTHORITY.KEYID = 7
1,212,537 UART: [ldev] FE.KEYID = 1
1,217,701 UART: [ldev] Erasing FE.KEYID = 1
1,243,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,531 UART: [ldev] --
1,282,834 UART: [fwproc] Wait for Commands...
1,283,544 UART: [fwproc] Recv command 0x46574c44
1,284,272 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,058 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,362 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,295 >>> mbox cmd response: success
2,775,425 UART: [afmc] ++
2,775,593 UART: [afmc] CDI.KEYID = 6
2,775,955 UART: [afmc] SUBJECT.KEYID = 7
2,776,380 UART: [afmc] AUTHORITY.KEYID = 5
2,811,479 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,608 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,356 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,084 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,969 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,688 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,542 UART: [afmc] --
2,854,564 UART: [cold-reset] --
2,855,484 UART: [state] Locking Datavault
2,856,521 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,125 UART: [state] Locking ICCM
2,857,757 UART: [exit] Launching FMC @ 0x40000130
2,863,086 UART:
2,863,102 UART: Running Caliptra FMC ...
2,863,510 UART:
2,863,564 UART: [state] CFI Enabled
2,874,089 UART: [fht] FMC Alias Private Key: 7
2,982,172 UART: [art] Extend RT PCRs Done
2,982,600 UART: [art] Lock RT PCRs Done
2,984,052 UART: [art] Populate DV Done
2,992,135 UART: [fht] FMC Alias Private Key: 7
2,993,301 UART: [art] Derive CDI
2,993,581 UART: [art] Store in in slot 0x4
3,079,304 UART: [art] Derive Key Pair
3,079,664 UART: [art] Store priv key in slot 0x5
3,092,326 UART: [art] Derive Key Pair - Done
3,106,851 UART: [art] Signing Cert with AUTHO
3,107,331 UART: RITY.KEYID = 7
3,122,171 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,936 UART: [art] PUB.X = 1EC6703D810D52E39ABC6E3CD2F54121EB7B8AD1911A6EFF508B7FA8798A0868C49058309F0DC4799E3FB450CFEC53C4
3,129,709 UART: [art] PUB.Y = D2390CC9D2B49CF4DCD5D82EA46DC58A167A0AA7EA3BC56E950FB138773BF9509D2A317DBDCF8349EAA7AE548332A488
3,136,670 UART: [art] SIG.R = 5C1B906C09E86DE67482D7158261D66C8411A39D3C0FD930713107B9A21DED954CFDA426EF14224109DAAFF1F336F2B0
3,143,432 UART: [art] SIG.S = 060E956C832DA3825E6B76DA476EF3B116911C2242EED19E4D585F92802EE4B14932BB415FF2FEBF7A96F309FADC9EE1
3,167,030 UART: Caliptra RT
3,167,283 UART: [state] CFI Enabled
3,274,780 UART: [rt] RT listening for mailbox commands...
3,275,450 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,934 UART: [rt]cmd =0x41544d4e, len=14344
3,708,922 >>> mbox cmd response data (8 bytes)
3,708,923 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,122 UART: [rt]cmd =0x41545348, len=116
3,741,053 >>> mbox cmd response data (12 bytes)
3,741,054 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,905 UART:
3,741,921 UART: Running Caliptra ROM ...
3,742,329 UART:
3,742,384 UART: [state] CFI Enabled
3,744,812 UART: [state] LifecycleState = Unprovisioned
3,745,467 UART: [state] DebugLocked = No
3,746,041 UART: [state] WD Timer not started. Device not locked for debugging
3,747,363 UART: [kat] SHA2-256
4,553,013 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,557,138 UART: [kat] ++
4,557,290 UART: [kat] sha1
4,561,644 UART: [kat] SHA2-256
4,563,584 UART: [kat] SHA2-384
4,566,325 UART: [kat] SHA2-512-ACC
4,568,225 UART: [kat] ECC-384
4,577,730 UART: [kat] HMAC-384Kdf
4,582,192 UART: [kat] LMS
4,830,520 UART: [kat] --
4,831,332 UART: [update-reset] ++
6,144,292 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,145,323 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,295,147 >>> mbox cmd response: success
6,295,147 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,295,324 UART: [update-reset] Copying MAN_2 To MAN_1
6,303,338 UART: [update-reset Success] --
6,304,411 UART: [state] Locking Datavault
6,305,155 UART: [state] Locking PCR0, PCR1 and PCR31
6,305,759 UART: [state] Locking ICCM
6,306,269 UART: [exit] Launching FMC @ 0x40000130
6,311,598 UART:
6,311,614 UART: Running Caliptra FMC ...
6,312,022 UART:
6,312,076 UART: [state] CFI Enabled
6,400,799 UART: [art] Extend RT PCRs Done
6,401,227 UART: [art] Lock RT PCRs Done
6,402,412 UART: [art] Populate DV Done
6,410,929 UART: [fht] FMC Alias Private Key: 7
6,411,933 UART: [art] Derive CDI
6,412,213 UART: [art] Store in in slot 0x4
6,497,678 UART: [art] Derive Key Pair
6,498,038 UART: [art] Store priv key in slot 0x5
6,511,300 UART: [art] Derive Key Pair - Done
6,526,140 UART: [art] Signing Cert with AUTHO
6,526,620 UART: RITY.KEYID = 7
6,541,748 UART: [art] Erasing AUTHORITY.KEYID = 7
6,542,513 UART: [art] PUB.X = 8AE988F8ECBC07C90E0CE6F89BA76E9A68E093F40A30954F2EB0AF609F02477D040B19B783CDFAA4E38DAF4A46FEEE20
6,549,284 UART: [art] PUB.Y = 9C35020F093526E168DDFAD7D7C28050787A8E50507D7D9FB018D3BE5FA59E68A928DD1F9F9E5168D9BA9CA9465497A7
6,556,231 UART: [art] SIG.R = E47BC6C89D36457EB915E813B66AF4B71976924E29F11097AD22FB517C8A969122A49A70A7DEEE16B94362D0E370EC42
6,563,003 UART: [art] SIG.S = 68DDD47807B5962E5B640B8F327F556F7DA1C2DD46F225FCCC1791CEEA6E302F378C35AFBE7E3D66B74EED0116AC8D12
6,586,757 UART: Caliptra RT
6,587,010 UART: [state] CFI Enabled
6,874,031 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,904,872 UART: [rt]cmd =0x41545348, len=116
6,906,701 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,873 ready_for_fw is high
1,059,873 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,738 >>> mbox cmd response: success
2,686,960 UART:
2,686,976 UART: Running Caliptra FMC ...
2,687,384 UART:
2,687,438 UART: [state] CFI Enabled
2,697,827 UART: [fht] FMC Alias Private Key: 7
2,805,702 UART: [art] Extend RT PCRs Done
2,806,130 UART: [art] Lock RT PCRs Done
2,807,724 UART: [art] Populate DV Done
2,815,925 UART: [fht] FMC Alias Private Key: 7
2,816,935 UART: [art] Derive CDI
2,817,215 UART: [art] Store in in slot 0x4
2,902,992 UART: [art] Derive Key Pair
2,903,352 UART: [art] Store priv key in slot 0x5
2,917,012 UART: [art] Derive Key Pair - Done
2,932,102 UART: [art] Signing Cert with AUTHO
2,932,582 UART: RITY.KEYID = 7
2,948,480 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,245 UART: [art] PUB.X = C4563166F2EFE9DDEDF5C6502FCD94CFB963F3E364BD3591D7E2F160918B22293CFE5887929CC178FC5B99709B9368E6
2,956,023 UART: [art] PUB.Y = AC751D841DD1984B5989AE20F2659A5B178B0934471D1ABE79306F055AE4A9D1BE0642E74E24CE07411F1C00D8B83CD7
2,962,943 UART: [art] SIG.R = 02F278B93C2BEB433A7CF458A11734EBFF6DEAC7553646BC13E72BAF062A6969A57850421D5A543D80C6299DB17D2C97
2,969,713 UART: [art] SIG.S = 5CFAF6CD76F3960E8BE179CA49332E751A50BADAC6E882BDE0BD80945F03B92576BD2B73DAA4A0C5D2174B32733E24D9
2,993,908 UART: Caliptra RT
2,994,161 UART: [state] CFI Enabled
3,101,820 UART: [rt] RT listening for mailbox commands...
3,102,490 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,506 UART: [rt]cmd =0x41544d4e, len=14344
3,535,304 >>> mbox cmd response data (8 bytes)
3,535,305 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,548 UART: [rt]cmd =0x41545348, len=116
3,567,079 >>> mbox cmd response data (12 bytes)
3,567,080 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,006,314 >>> mbox cmd response: success
6,006,314 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,019,552 UART:
6,019,568 UART: Running Caliptra FMC ...
6,019,976 UART:
6,020,030 UART: [state] CFI Enabled
6,109,337 UART: [art] Extend RT PCRs Done
6,109,765 UART: [art] Lock RT PCRs Done
6,111,056 UART: [art] Populate DV Done
6,119,297 UART: [fht] FMC Alias Private Key: 7
6,120,457 UART: [art] Derive CDI
6,120,737 UART: [art] Store in in slot 0x4
6,206,534 UART: [art] Derive Key Pair
6,206,894 UART: [art] Store priv key in slot 0x5
6,219,452 UART: [art] Derive Key Pair - Done
6,234,093 UART: [art] Signing Cert with AUTHO
6,234,573 UART: RITY.KEYID = 7
6,249,583 UART: [art] Erasing AUTHORITY.KEYID = 7
6,250,348 UART: [art] PUB.X = 8DB32B2CB3CAB8A3FD769D56CD28FAA25662F36F39F5C7CCEE5E29180FE85A5A90344C740D8E1F28002F15C985FD1892
6,257,104 UART: [art] PUB.Y = 26ABE66D77537D4C42A1764513EC3EC41AA1E0DD400A436425628C7D4FF26883C730F9FF1D5942BB868975EC6224FF20
6,264,053 UART: [art] SIG.R = B460E206D9E6F9E46E3B16E3C0E1593411A0C0540C144873FD8B39F432C3A983673EC138F77B086DD561E85B75A0F134
6,270,812 UART: [art] SIG.S = 0D056A2D1466FCCE38556B1AA13099DB781156A62C92E78BE13A608C4B96B9337C55D07EA4479C20C85BF72D4B24DC78
6,294,583 UART: Caliptra RT
6,294,836 UART: [state] CFI Enabled
6,573,163 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,603,852 UART: [rt]cmd =0x41545348, len=116
6,605,615 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,524 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
893,345 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,470 UART: [kat] ++
897,622 UART: [kat] sha1
901,814 UART: [kat] SHA2-256
903,754 UART: [kat] SHA2-384
906,655 UART: [kat] SHA2-512-ACC
908,556 UART: [kat] ECC-384
917,965 UART: [kat] HMAC-384Kdf
922,745 UART: [kat] LMS
1,171,073 UART: [kat] --
1,171,782 UART: [cold-reset] ++
1,172,158 UART: [fht] FHT @ 0x50003400
1,174,689 UART: [idev] ++
1,174,857 UART: [idev] CDI.KEYID = 6
1,175,217 UART: [idev] SUBJECT.KEYID = 7
1,175,641 UART: [idev] UDS.KEYID = 0
1,175,986 ready_for_fw is high
1,175,986 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,537 UART: [idev] Erasing UDS.KEYID = 0
1,201,190 UART: [idev] Sha1 KeyId Algorithm
1,209,566 UART: [idev] --
1,210,398 UART: [ldev] ++
1,210,566 UART: [ldev] CDI.KEYID = 6
1,210,929 UART: [ldev] SUBJECT.KEYID = 5
1,211,355 UART: [ldev] AUTHORITY.KEYID = 7
1,211,818 UART: [ldev] FE.KEYID = 1
1,217,064 UART: [ldev] Erasing FE.KEYID = 1
1,243,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,118 UART: [ldev] --
1,282,539 UART: [fwproc] Wait for Commands...
1,283,139 UART: [fwproc] Recv command 0x46574c44
1,283,867 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,731 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,035 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,886 >>> mbox cmd response: success
2,775,032 UART: [afmc] ++
2,775,200 UART: [afmc] CDI.KEYID = 6
2,775,562 UART: [afmc] SUBJECT.KEYID = 7
2,775,987 UART: [afmc] AUTHORITY.KEYID = 5
2,811,686 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,797 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,545 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,273 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,158 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,877 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,717 UART: [afmc] --
2,854,629 UART: [cold-reset] --
2,855,573 UART: [state] Locking Datavault
2,856,736 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,340 UART: [state] Locking ICCM
2,857,914 UART: [exit] Launching FMC @ 0x40000130
2,863,243 UART:
2,863,259 UART: Running Caliptra FMC ...
2,863,667 UART:
2,863,810 UART: [state] CFI Enabled
2,874,363 UART: [fht] FMC Alias Private Key: 7
2,982,504 UART: [art] Extend RT PCRs Done
2,982,932 UART: [art] Lock RT PCRs Done
2,984,410 UART: [art] Populate DV Done
2,992,767 UART: [fht] FMC Alias Private Key: 7
2,993,943 UART: [art] Derive CDI
2,994,223 UART: [art] Store in in slot 0x4
3,079,944 UART: [art] Derive Key Pair
3,080,304 UART: [art] Store priv key in slot 0x5
3,092,944 UART: [art] Derive Key Pair - Done
3,107,576 UART: [art] Signing Cert with AUTHO
3,108,056 UART: RITY.KEYID = 7
3,123,234 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,999 UART: [art] PUB.X = 7C8BD5B57234EB5F47FA966399F323405296AE1CC58B9C9D23E4DEA9B55D7154E04E6FA1069E236B84F60F9C67C65DC7
3,130,771 UART: [art] PUB.Y = 9BE33CDF771A164D6092C89D12A1A2799BEB306354FD4E89252740CEFBF54A4BF56F451C7CF623E71828F6067EA0AFBB
3,137,730 UART: [art] SIG.R = CC94437C8F97E0417BBA9D93A8CD47A503A0C78FEEEE630072373B417E0E80DC49BC4BCC61AB3B4E84ECE8BBAAACD0C5
3,144,500 UART: [art] SIG.S = F5ECC9397E0470C38811DA55EB978B871A077A99877C3246AA2AD3B9142E393B8C2FC35CACB19774976A63251398A337
3,168,005 UART: Caliptra RT
3,168,350 UART: [state] CFI Enabled
3,275,826 UART: [rt] RT listening for mailbox commands...
3,276,496 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,870 UART: [rt]cmd =0x41544d4e, len=14344
3,709,822 >>> mbox cmd response data (8 bytes)
3,709,823 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,758 UART: [rt]cmd =0x41545348, len=116
3,741,455 >>> mbox cmd response data (12 bytes)
3,741,456 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,311 UART:
3,742,327 UART: Running Caliptra ROM ...
3,742,735 UART:
3,742,877 UART: [state] CFI Enabled
3,745,831 UART: [state] LifecycleState = Unprovisioned
3,746,486 UART: [state] DebugLocked = No
3,747,136 UART: [state] WD Timer not started. Device not locked for debugging
3,748,324 UART: [kat] SHA2-256
4,553,974 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,558,099 UART: [kat] ++
4,558,251 UART: [kat] sha1
4,562,711 UART: [kat] SHA2-256
4,564,651 UART: [kat] SHA2-384
4,567,398 UART: [kat] SHA2-512-ACC
4,569,298 UART: [kat] ECC-384
4,578,783 UART: [kat] HMAC-384Kdf
4,583,479 UART: [kat] LMS
4,831,807 UART: [kat] --
4,832,659 UART: [update-reset] ++
6,145,079 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,146,148 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,295,972 >>> mbox cmd response: success
6,295,972 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,296,133 UART: [update-reset] Copying MAN_2 To MAN_1
6,304,147 UART: [update-reset Success] --
6,305,012 UART: [state] Locking Datavault
6,305,886 UART: [state] Locking PCR0, PCR1 and PCR31
6,306,490 UART: [state] Locking ICCM
6,306,912 UART: [exit] Launching FMC @ 0x40000130
6,312,241 UART:
6,312,257 UART: Running Caliptra FMC ...
6,312,665 UART:
6,312,808 UART: [state] CFI Enabled
6,401,913 UART: [art] Extend RT PCRs Done
6,402,341 UART: [art] Lock RT PCRs Done
6,403,390 UART: [art] Populate DV Done
6,411,561 UART: [fht] FMC Alias Private Key: 7
6,412,741 UART: [art] Derive CDI
6,413,021 UART: [art] Store in in slot 0x4
6,498,526 UART: [art] Derive Key Pair
6,498,886 UART: [art] Store priv key in slot 0x5
6,512,532 UART: [art] Derive Key Pair - Done
6,527,002 UART: [art] Signing Cert with AUTHO
6,527,482 UART: RITY.KEYID = 7
6,542,646 UART: [art] Erasing AUTHORITY.KEYID = 7
6,543,411 UART: [art] PUB.X = 376643BCD0C1F826E9728572FD675894336E8D881B79C966BEEAEF89279FF060F721DDAF549D8EA9F4714399C58D79D8
6,550,183 UART: [art] PUB.Y = 3E0FD699DB4DA1A04C176593AED253FCB5DCE9BEFF3000A1985616B934A3DC7F8F87E8E39EABE2CBDFF2E09365B6E3B5
6,557,134 UART: [art] SIG.R = 4873D1C7A30F15EF2FD91E0DEE12A8DBC869BE6FBE667AE38891DB2C3B7735C2197D500BB0523ED3B5E0CE71B4C613A4
6,563,913 UART: [art] SIG.S = 3E5A3E2754697F0979A8451AA65CC90121A0D124153AAFC1F4F7B8894AD438D01C7255A70DF41574DE4E64A13B3C2330
6,588,177 UART: Caliptra RT
6,588,522 UART: [state] CFI Enabled
6,872,261 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,903,340 UART: [rt]cmd =0x41545348, len=116
6,905,273 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,998 ready_for_fw is high
1,060,998 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,569 >>> mbox cmd response: success
2,688,413 UART:
2,688,429 UART: Running Caliptra FMC ...
2,688,837 UART:
2,688,980 UART: [state] CFI Enabled
2,699,737 UART: [fht] FMC Alias Private Key: 7
2,806,712 UART: [art] Extend RT PCRs Done
2,807,140 UART: [art] Lock RT PCRs Done
2,808,446 UART: [art] Populate DV Done
2,816,331 UART: [fht] FMC Alias Private Key: 7
2,817,327 UART: [art] Derive CDI
2,817,607 UART: [art] Store in in slot 0x4
2,903,514 UART: [art] Derive Key Pair
2,903,874 UART: [art] Store priv key in slot 0x5
2,916,970 UART: [art] Derive Key Pair - Done
2,931,824 UART: [art] Signing Cert with AUTHO
2,932,304 UART: RITY.KEYID = 7
2,947,446 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,211 UART: [art] PUB.X = 6F5C344DA60806EE0568563BDB465137A5EB768B3341A4FFBE069FF9F763DBBA5570B6F9C8A142214A92FB15028F615B
2,954,972 UART: [art] PUB.Y = 146368F07148106E49DD78FB9D8140093FDF5FF645458125F0161F68A0F42B4CBAC0C89F6551D545A2276F3BDDF7DBF2
2,961,923 UART: [art] SIG.R = B908F91E23EFC972D940D9E7D8D65BD9195E5671392FF8A5BD8ECA41D85E3BE512E502E792642B9DADCB19549813F36D
2,968,697 UART: [art] SIG.S = 4632443F5BE7968CC44FB8E58CB0D0454AA9939E67C387CA9522CCC2960696A532DF0FD58E60E1C1FE22C4B784E17E63
2,992,630 UART: Caliptra RT
2,992,975 UART: [state] CFI Enabled
3,100,594 UART: [rt] RT listening for mailbox commands...
3,101,264 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,288 UART: [rt]cmd =0x41544d4e, len=14344
3,534,558 >>> mbox cmd response data (8 bytes)
3,534,559 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,682 UART: [rt]cmd =0x41545348, len=116
3,566,433 >>> mbox cmd response data (12 bytes)
3,566,434 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,004,727 >>> mbox cmd response: success
6,004,727 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,018,013 UART:
6,018,029 UART: Running Caliptra FMC ...
6,018,437 UART:
6,018,580 UART: [state] CFI Enabled
6,107,721 UART: [art] Extend RT PCRs Done
6,108,149 UART: [art] Lock RT PCRs Done
6,109,438 UART: [art] Populate DV Done
6,117,695 UART: [fht] FMC Alias Private Key: 7
6,118,763 UART: [art] Derive CDI
6,119,043 UART: [art] Store in in slot 0x4
6,204,840 UART: [art] Derive Key Pair
6,205,200 UART: [art] Store priv key in slot 0x5
6,218,480 UART: [art] Derive Key Pair - Done
6,232,827 UART: [art] Signing Cert with AUTHO
6,233,307 UART: RITY.KEYID = 7
6,248,227 UART: [art] Erasing AUTHORITY.KEYID = 7
6,248,992 UART: [art] PUB.X = EB9077E1947A31F8ABE519F34B88C1438C80C1FB926FD5C4BA9C24B51A4ED98D455A2262D61EAF43DAFE927E1E660BE0
6,255,775 UART: [art] PUB.Y = 7F975DCEF992B0AD773BD24D904293163D79DE83705A8E3D77418F6BD763496B51113DE7531AFFA1CF8685DDE4260439
6,262,724 UART: [art] SIG.R = 28D92891AB2E68294AECCD92F023F0BEA7310D073DCD67D0E1AF1D984F3024B90A6A5F8EFF40537698EB2B43A6D32A7C
6,269,499 UART: [art] SIG.S = 347D8EAB96DD96E30A8015126DF81EE6841CB09008D1E2E628D65D36E4204FD9BB45A07A6B9EE8084E9CC44AAC344B30
6,293,095 UART: Caliptra RT
6,293,440 UART: [state] CFI Enabled
6,579,493 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,610,348 UART: [rt]cmd =0x41545348, len=116
6,612,081 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,713 UART: [kat] SHA2-256
901,653 UART: [kat] SHA2-384
904,318 UART: [kat] SHA2-512-ACC
906,219 UART: [kat] ECC-384
916,160 UART: [kat] HMAC-384Kdf
920,790 UART: [kat] LMS
1,169,102 UART: [kat] --
1,170,181 UART: [cold-reset] ++
1,170,613 UART: [fht] FHT @ 0x50003400
1,173,407 UART: [idev] ++
1,173,575 UART: [idev] CDI.KEYID = 6
1,173,936 UART: [idev] SUBJECT.KEYID = 7
1,174,361 UART: [idev] UDS.KEYID = 0
1,174,707 ready_for_fw is high
1,174,707 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,513 UART: [idev] Erasing UDS.KEYID = 0
1,199,119 UART: [idev] Sha1 KeyId Algorithm
1,207,777 UART: [idev] --
1,208,792 UART: [ldev] ++
1,208,960 UART: [ldev] CDI.KEYID = 6
1,209,324 UART: [ldev] SUBJECT.KEYID = 5
1,209,751 UART: [ldev] AUTHORITY.KEYID = 7
1,210,214 UART: [ldev] FE.KEYID = 1
1,215,548 UART: [ldev] Erasing FE.KEYID = 1
1,242,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,256 UART: [ldev] --
1,281,728 UART: [fwproc] Wait for Commands...
1,282,337 UART: [fwproc] Recv command 0x46574c44
1,283,070 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,598 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,907 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,755 >>> mbox cmd response: success
2,773,812 UART: [afmc] ++
2,773,980 UART: [afmc] CDI.KEYID = 6
2,774,343 UART: [afmc] SUBJECT.KEYID = 7
2,774,769 UART: [afmc] AUTHORITY.KEYID = 5
2,810,450 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,527 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,139 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,858 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,525 UART: [afmc] --
2,853,431 UART: [cold-reset] --
2,854,259 UART: [state] Locking Datavault
2,855,488 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,092 UART: [state] Locking ICCM
2,856,712 UART: [exit] Launching FMC @ 0x40000130
2,862,041 UART:
2,862,057 UART: Running Caliptra FMC ...
2,862,465 UART:
2,862,519 UART: [state] CFI Enabled
2,872,692 UART: [fht] FMC Alias Private Key: 7
2,980,617 UART: [art] Extend RT PCRs Done
2,981,045 UART: [art] Lock RT PCRs Done
2,982,313 UART: [art] Populate DV Done
2,990,792 UART: [fht] FMC Alias Private Key: 7
2,991,834 UART: [art] Derive CDI
2,992,114 UART: [art] Store in in slot 0x4
3,077,899 UART: [art] Derive Key Pair
3,078,259 UART: [art] Store priv key in slot 0x5
3,091,857 UART: [art] Derive Key Pair - Done
3,106,133 UART: [art] Signing Cert with AUTHO
3,106,613 UART: RITY.KEYID = 7
3,121,841 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,606 UART: [art] PUB.X = CBC9A22850AB33A3B7E7D1C5681753E222026F2C935096BB5DCD08316D3F4C51034088917B2E4AC2C8F42B82E4106676
3,129,365 UART: [art] PUB.Y = 3C7BB719D53C746ECBEF2362C91418A25908192415AA615309A9306A1A4AECA33471A64199904D0F7DF292A614FA5D9D
3,136,306 UART: [art] SIG.R = 74FD41F935CCB2881BF8FDC23AD22EF245768985DB168167BAC3EB1521CA2EE44EA1351627545D457C682DAA9272B90F
3,143,081 UART: [art] SIG.S = 25256135918E622E8A6AFABC10CB0AA8DEBF08BB1FAD8752E13189DA99FDAD2E0B97D44EC4AA0873D4774F9AB2A2D1BF
3,167,392 UART: Caliptra RT
3,167,645 UART: [state] CFI Enabled
3,275,338 UART: [rt] RT listening for mailbox commands...
3,276,008 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,230 UART: [rt]cmd =0x41544d4e, len=14344
3,708,964 >>> mbox cmd response data (8 bytes)
3,708,965 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,990 UART: [rt]cmd =0x41545348, len=116
3,740,843 >>> mbox cmd response data (12 bytes)
3,740,844 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,769 UART:
3,741,785 UART: Running Caliptra ROM ...
3,742,193 UART:
3,742,248 UART: [state] CFI Enabled
3,744,466 UART: [state] LifecycleState = Unprovisioned
3,745,121 UART: [state] DebugLocked = No
3,745,853 UART: [state] WD Timer not started. Device not locked for debugging
3,747,159 UART: [kat] SHA2-256
4,550,709 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,554,838 UART: [kat] ++
4,554,990 UART: [kat] sha1
4,559,070 UART: [kat] SHA2-256
4,561,010 UART: [kat] SHA2-384
4,563,859 UART: [kat] SHA2-512-ACC
4,565,759 UART: [kat] ECC-384
4,575,488 UART: [kat] HMAC-384Kdf
4,580,218 UART: [kat] LMS
4,828,530 UART: [kat] --
4,829,402 UART: [update-reset] ++
6,142,319 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,143,446 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,293,270 >>> mbox cmd response: success
6,293,270 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,293,493 UART: [update-reset] Copying MAN_2 To MAN_1
6,301,507 UART: [update-reset Success] --
6,302,362 UART: [state] Locking Datavault
6,303,252 UART: [state] Locking PCR0, PCR1 and PCR31
6,303,856 UART: [state] Locking ICCM
6,304,530 UART: [exit] Launching FMC @ 0x40000130
6,309,859 UART:
6,309,875 UART: Running Caliptra FMC ...
6,310,283 UART:
6,310,337 UART: [state] CFI Enabled
6,399,140 UART: [art] Extend RT PCRs Done
6,399,568 UART: [art] Lock RT PCRs Done
6,401,037 UART: [art] Populate DV Done
6,409,078 UART: [fht] FMC Alias Private Key: 7
6,410,180 UART: [art] Derive CDI
6,410,460 UART: [art] Store in in slot 0x4
6,495,995 UART: [art] Derive Key Pair
6,496,355 UART: [art] Store priv key in slot 0x5
6,509,259 UART: [art] Derive Key Pair - Done
6,524,415 UART: [art] Signing Cert with AUTHO
6,524,895 UART: RITY.KEYID = 7
6,540,175 UART: [art] Erasing AUTHORITY.KEYID = 7
6,540,940 UART: [art] PUB.X = 6D09F08F2162CAF80B3EA42D85D748E01EDFCF502E2065DB065F78DE2D13475D0B72AABA13BAB0C950444ED06CF639DE
6,547,716 UART: [art] PUB.Y = FDD6C347820BB597E393FEEEF0844A4EE70DCBB3749D22BC5025635D3214A53124BACAD04BAE48822099F8C4953C1E13
6,554,670 UART: [art] SIG.R = 87BBEA498413B4530B9CB06773C29312C12F91A0F468FE7024D80DD56957DBF17080867E5D39135BBA8D12ABF1BC7F84
6,561,438 UART: [art] SIG.S = A332FEF1BBF93740D809A2DC345BEFF66BBC1BD6A0781F70FDDCE322C54C6F4691EAEACD78DDDBEF63517BF4F7F5F62F
6,584,836 UART: Caliptra RT
6,585,089 UART: [state] CFI Enabled
6,865,799 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,896,734 UART: [rt]cmd =0x41545348, len=116
6,898,723 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,140 ready_for_fw is high
1,056,140 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,693 >>> mbox cmd response: success
2,685,409 UART:
2,685,425 UART: Running Caliptra FMC ...
2,685,833 UART:
2,685,887 UART: [state] CFI Enabled
2,696,262 UART: [fht] FMC Alias Private Key: 7
2,803,971 UART: [art] Extend RT PCRs Done
2,804,399 UART: [art] Lock RT PCRs Done
2,806,013 UART: [art] Populate DV Done
2,814,000 UART: [fht] FMC Alias Private Key: 7
2,815,086 UART: [art] Derive CDI
2,815,366 UART: [art] Store in in slot 0x4
2,900,987 UART: [art] Derive Key Pair
2,901,347 UART: [art] Store priv key in slot 0x5
2,914,615 UART: [art] Derive Key Pair - Done
2,929,243 UART: [art] Signing Cert with AUTHO
2,929,723 UART: RITY.KEYID = 7
2,945,117 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,882 UART: [art] PUB.X = F6C033156B1D6FD5422A731D284B5202BC97F32F8458FEED81D7D4D1A4456064F7AD58DD4507CC14CB11C7E3B884532C
2,952,652 UART: [art] PUB.Y = 9FC7F7BCD7F7F2D7E34385C6C6DEC1397893484105753149177EDF581BF87052F86782519E1FEAE6F53262CCCBF04D13
2,959,603 UART: [art] SIG.R = 97AEBD3365DAA43CEA3A70FCA953C47C01B1CA83798CB0E63460C4C37BA17BA0270360C26DF6D08A4D6094F6B012F95F
2,966,381 UART: [art] SIG.S = 70B827C76CFBFFFDF250D0E92C6D13ABE1388BA52B8951CE44D726592D6BD7B6B905CB3C8DA40529ABA27AD5B641A81A
2,989,806 UART: Caliptra RT
2,990,059 UART: [state] CFI Enabled
3,097,292 UART: [rt] RT listening for mailbox commands...
3,097,962 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,074 UART: [rt]cmd =0x41544d4e, len=14344
3,531,330 >>> mbox cmd response data (8 bytes)
3,531,331 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,388 UART: [rt]cmd =0x41545348, len=116
3,562,987 >>> mbox cmd response data (12 bytes)
3,562,988 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,995,021 >>> mbox cmd response: success
5,995,021 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,008,791 UART:
6,008,807 UART: Running Caliptra FMC ...
6,009,215 UART:
6,009,269 UART: [state] CFI Enabled
6,098,306 UART: [art] Extend RT PCRs Done
6,098,734 UART: [art] Lock RT PCRs Done
6,100,049 UART: [art] Populate DV Done
6,108,072 UART: [fht] FMC Alias Private Key: 7
6,109,008 UART: [art] Derive CDI
6,109,288 UART: [art] Store in in slot 0x4
6,195,165 UART: [art] Derive Key Pair
6,195,525 UART: [art] Store priv key in slot 0x5
6,208,707 UART: [art] Derive Key Pair - Done
6,223,341 UART: [art] Signing Cert with AUTHO
6,223,821 UART: RITY.KEYID = 7
6,239,579 UART: [art] Erasing AUTHORITY.KEYID = 7
6,240,344 UART: [art] PUB.X = EF8B8C691A8802C0BFFBD78E12AD0D81DC114FB92AFAF7E6F75477A76A4CD1F7F225E8445D461F40BCDD8D067D47DC1C
6,247,129 UART: [art] PUB.Y = 72F2C7A34D307C83EEB8D8ABB6EEFEA18B98F09C8C9EEFFB8166B50010B4C7EFCAAF3C6BA0227EAC4577A93FD57BE3D3
6,254,089 UART: [art] SIG.R = 3CB51FCD8711CE38A2A954C700E9EE763B41FD54D15F6714AAB03AF97E460A5EF3DCD81599D4141CBC615389F5F29504
6,260,841 UART: [art] SIG.S = 83FECA972BFBEB495728230A08C5BF620C1FFEAEEBE4127F5D7F65B01A73713B778908E9632A510F6EC70F6853987D89
6,284,608 UART: Caliptra RT
6,284,861 UART: [state] CFI Enabled
6,567,184 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,597,861 UART: [rt]cmd =0x41545348, len=116
6,599,234 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
87,044 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
891,761 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,890 UART: [kat] ++
896,042 UART: [kat] sha1
900,206 UART: [kat] SHA2-256
902,146 UART: [kat] SHA2-384
904,903 UART: [kat] SHA2-512-ACC
906,804 UART: [kat] ECC-384
916,587 UART: [kat] HMAC-384Kdf
921,171 UART: [kat] LMS
1,169,483 UART: [kat] --
1,170,546 UART: [cold-reset] ++
1,171,104 UART: [fht] FHT @ 0x50003400
1,173,762 UART: [idev] ++
1,173,930 UART: [idev] CDI.KEYID = 6
1,174,291 UART: [idev] SUBJECT.KEYID = 7
1,174,716 UART: [idev] UDS.KEYID = 0
1,175,062 ready_for_fw is high
1,175,062 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,710 UART: [idev] Erasing UDS.KEYID = 0
1,200,234 UART: [idev] Sha1 KeyId Algorithm
1,209,082 UART: [idev] --
1,210,363 UART: [ldev] ++
1,210,531 UART: [ldev] CDI.KEYID = 6
1,210,895 UART: [ldev] SUBJECT.KEYID = 5
1,211,322 UART: [ldev] AUTHORITY.KEYID = 7
1,211,785 UART: [ldev] FE.KEYID = 1
1,216,885 UART: [ldev] Erasing FE.KEYID = 1
1,243,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,239 UART: [ldev] --
1,282,719 UART: [fwproc] Wait for Commands...
1,283,476 UART: [fwproc] Recv command 0x46574c44
1,284,209 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,889 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,198 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,988 >>> mbox cmd response: success
2,774,181 UART: [afmc] ++
2,774,349 UART: [afmc] CDI.KEYID = 6
2,774,712 UART: [afmc] SUBJECT.KEYID = 7
2,775,138 UART: [afmc] AUTHORITY.KEYID = 5
2,810,935 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,527 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,278 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,007 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,890 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,609 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,362 UART: [afmc] --
2,854,364 UART: [cold-reset] --
2,855,274 UART: [state] Locking Datavault
2,856,581 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,185 UART: [state] Locking ICCM
2,857,687 UART: [exit] Launching FMC @ 0x40000130
2,863,016 UART:
2,863,032 UART: Running Caliptra FMC ...
2,863,440 UART:
2,863,583 UART: [state] CFI Enabled
2,874,114 UART: [fht] FMC Alias Private Key: 7
2,982,815 UART: [art] Extend RT PCRs Done
2,983,243 UART: [art] Lock RT PCRs Done
2,984,795 UART: [art] Populate DV Done
2,992,870 UART: [fht] FMC Alias Private Key: 7
2,993,902 UART: [art] Derive CDI
2,994,182 UART: [art] Store in in slot 0x4
3,079,933 UART: [art] Derive Key Pair
3,080,293 UART: [art] Store priv key in slot 0x5
3,092,957 UART: [art] Derive Key Pair - Done
3,107,603 UART: [art] Signing Cert with AUTHO
3,108,083 UART: RITY.KEYID = 7
3,123,075 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,840 UART: [art] PUB.X = 83A2A255134375F13468BA72C0954CACA5D5E115728C70A714A4D108E5F89A7C6A6A26C718AF07C31FEA0B2973855FE0
3,130,603 UART: [art] PUB.Y = AC47560C204F6A9AEDE8A1FF7B1FF698168EBB668412FA1A2B9B6022F4B1587DF15871C964EFA18E3F43B829804B17FA
3,137,562 UART: [art] SIG.R = 00325AA148E777C950A365FAC2A6BA96B5473325D304F0C35C19E10519FE556250AFB880DF45335A168DC88FFF37D925
3,144,304 UART: [art] SIG.S = 6C5DB2763600614CD59EA221703A695B4088688DF188580D982EFBD323710FD9E9F7E50AE5F30E0BFE64E09E09661C55
3,168,333 UART: Caliptra RT
3,168,678 UART: [state] CFI Enabled
3,275,717 UART: [rt] RT listening for mailbox commands...
3,276,387 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,475 UART: [rt]cmd =0x41544d4e, len=14344
3,709,183 >>> mbox cmd response data (8 bytes)
3,709,184 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,093 UART: [rt]cmd =0x41545348, len=116
3,741,106 >>> mbox cmd response data (12 bytes)
3,741,107 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,902 UART:
3,741,918 UART: Running Caliptra ROM ...
3,742,326 UART:
3,742,468 UART: [state] CFI Enabled
3,744,938 UART: [state] LifecycleState = Unprovisioned
3,745,593 UART: [state] DebugLocked = No
3,746,215 UART: [state] WD Timer not started. Device not locked for debugging
3,747,479 UART: [kat] SHA2-256
4,551,029 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,555,158 UART: [kat] ++
4,555,310 UART: [kat] sha1
4,559,438 UART: [kat] SHA2-256
4,561,378 UART: [kat] SHA2-384
4,564,081 UART: [kat] SHA2-512-ACC
4,565,981 UART: [kat] ECC-384
4,575,650 UART: [kat] HMAC-384Kdf
4,580,252 UART: [kat] LMS
4,828,564 UART: [kat] --
4,829,252 UART: [update-reset] ++
6,140,543 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,141,754 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
6,291,578 >>> mbox cmd response: success
6,291,578 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,291,775 UART: [update-reset] Copying MAN_2 To MAN_1
6,299,789 UART: [update-reset Success] --
6,300,492 UART: [state] Locking Datavault
6,301,466 UART: [state] Locking PCR0, PCR1 and PCR31
6,302,070 UART: [state] Locking ICCM
6,302,598 UART: [exit] Launching FMC @ 0x40000130
6,307,927 UART:
6,307,943 UART: Running Caliptra FMC ...
6,308,351 UART:
6,308,494 UART: [state] CFI Enabled
6,397,293 UART: [art] Extend RT PCRs Done
6,397,721 UART: [art] Lock RT PCRs Done
6,398,926 UART: [art] Populate DV Done
6,407,273 UART: [fht] FMC Alias Private Key: 7
6,408,241 UART: [art] Derive CDI
6,408,521 UART: [art] Store in in slot 0x4
6,494,078 UART: [art] Derive Key Pair
6,494,438 UART: [art] Store priv key in slot 0x5
6,508,038 UART: [art] Derive Key Pair - Done
6,522,912 UART: [art] Signing Cert with AUTHO
6,523,392 UART: RITY.KEYID = 7
6,538,700 UART: [art] Erasing AUTHORITY.KEYID = 7
6,539,465 UART: [art] PUB.X = 3F341E480557E44AAB5C78A6ADE458F65B5777415C9D18E9F5EF0D5A7CEA4217D768D94296FEF2E820089BC3D66435F8
6,546,232 UART: [art] PUB.Y = 10BD6C8AC631377362CE99776D7CF2B87E6506F4470E2C1202FD1A8A852FD8A2FA1143E186B753FDFA9720C3DB17C5E5
6,553,181 UART: [art] SIG.R = DC625E9A378FE686D20E00FC595645F60F94C0ED8A634EEC3016F90005973DF99E7E56CFF4C0232E2F99CAA8A7CECE21
6,559,912 UART: [art] SIG.S = ECB82B0C54281836E86F1C3571A4F74C78536E3477FDBA78275FAE4E38A53A9C2B5B53A5611A9966E23F9C193ED7955C
6,583,832 UART: Caliptra RT
6,584,177 UART: [state] CFI Enabled
6,866,877 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,897,800 UART: [rt]cmd =0x41545348, len=116
6,899,437 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,581 ready_for_fw is high
1,055,581 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,318 >>> mbox cmd response: success
2,685,858 UART:
2,685,874 UART: Running Caliptra FMC ...
2,686,282 UART:
2,686,425 UART: [state] CFI Enabled
2,697,110 UART: [fht] FMC Alias Private Key: 7
2,804,613 UART: [art] Extend RT PCRs Done
2,805,041 UART: [art] Lock RT PCRs Done
2,806,437 UART: [art] Populate DV Done
2,814,716 UART: [fht] FMC Alias Private Key: 7
2,815,796 UART: [art] Derive CDI
2,816,076 UART: [art] Store in in slot 0x4
2,901,609 UART: [art] Derive Key Pair
2,901,969 UART: [art] Store priv key in slot 0x5
2,915,363 UART: [art] Derive Key Pair - Done
2,930,056 UART: [art] Signing Cert with AUTHO
2,930,536 UART: RITY.KEYID = 7
2,946,550 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,315 UART: [art] PUB.X = F3CCC121F5E0DD530980B15CF5EA948787AE72FDFC6B2D8FE973C64762FAA050D845A267209D256DAFC228E39196B62D
2,954,094 UART: [art] PUB.Y = 3B62E241C8426365AF5FC87BF99C0CD77E93A5351B98F04DD1B7F0E3E3F9C588624DF926B1E0D3F153164C90849DF1DE
2,961,049 UART: [art] SIG.R = 4A1C0732E76589ECB5E76E5B7ED231EE7C8015343D0B7F75C5C842AF9C3EAC4035CFEA3824FE317D426CAB57279E9678
2,967,823 UART: [art] SIG.S = 59B766C922F94F525C22D57A5C9AC2F812B345464C9BA0E955AC26F5E3A836C7BE395DDA56DFDC5068A2B33EDF9AE8D6
2,991,484 UART: Caliptra RT
2,991,829 UART: [state] CFI Enabled
3,100,038 UART: [rt] RT listening for mailbox commands...
3,100,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,676 UART: [rt]cmd =0x41544d4e, len=14344
3,533,906 >>> mbox cmd response data (8 bytes)
3,533,907 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,106 UART: [rt]cmd =0x41545348, len=116
3,565,801 >>> mbox cmd response data (12 bytes)
3,565,802 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,999,632 >>> mbox cmd response: success
5,999,632 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,013,188 UART:
6,013,204 UART: Running Caliptra FMC ...
6,013,612 UART:
6,013,755 UART: [state] CFI Enabled
6,102,602 UART: [art] Extend RT PCRs Done
6,103,030 UART: [art] Lock RT PCRs Done
6,104,501 UART: [art] Populate DV Done
6,112,722 UART: [fht] FMC Alias Private Key: 7
6,113,822 UART: [art] Derive CDI
6,114,102 UART: [art] Store in in slot 0x4
6,199,789 UART: [art] Derive Key Pair
6,200,149 UART: [art] Store priv key in slot 0x5
6,213,493 UART: [art] Derive Key Pair - Done
6,227,992 UART: [art] Signing Cert with AUTHO
6,228,472 UART: RITY.KEYID = 7
6,243,754 UART: [art] Erasing AUTHORITY.KEYID = 7
6,244,519 UART: [art] PUB.X = 0D70F441DAA84BF6C86FA22DFAEEA0417DE547A646242ECE2C95B09B10ABB5F50D065DE986C8FF813DEF323949FC7986
6,251,298 UART: [art] PUB.Y = 9E1A3343861F639B29E9FF66F6CB2E44F5D32AC2AD5AB9975A767FAE8C972BA1349B13673AFF0BF539AC4F18ED3D304F
6,258,261 UART: [art] SIG.R = F411F09B35808DD43E822E0747D400FAAB0B76EC06C3B98ECB3F353A78C6DACC8EDD27D20A74A1C3C2BB4A7CF1CA66B2
6,265,021 UART: [art] SIG.S = 063DEFFC8EFB1FC03611E0F2CCD0520C3B281546BC9EEB6F4E414D6C1D6139E18A661FDF5E8012356F982DECE93821A6
6,288,972 UART: Caliptra RT
6,289,317 UART: [state] CFI Enabled
6,569,790 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,600,415 UART: [rt]cmd =0x41545348, len=116
6,602,474 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,543 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,185 UART: [kat] SHA2-256
882,116 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,231 UART: [kat] ++
886,383 UART: [kat] sha1
890,717 UART: [kat] SHA2-256
892,655 UART: [kat] SHA2-384
895,388 UART: [kat] SHA2-512-ACC
897,289 UART: [kat] ECC-384
902,714 UART: [kat] HMAC-384Kdf
907,306 UART: [kat] LMS
1,475,502 UART: [kat] --
1,476,377 UART: [cold-reset] ++
1,476,753 UART: [fht] Storing FHT @ 0x50003400
1,479,672 UART: [idev] ++
1,479,840 UART: [idev] CDI.KEYID = 6
1,480,200 UART: [idev] SUBJECT.KEYID = 7
1,480,624 UART: [idev] UDS.KEYID = 0
1,480,969 ready_for_fw is high
1,480,969 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,254 UART: [idev] Erasing UDS.KEYID = 0
1,504,912 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,466 UART: [idev] --
1,514,427 UART: [ldev] ++
1,514,595 UART: [ldev] CDI.KEYID = 6
1,514,958 UART: [ldev] SUBJECT.KEYID = 5
1,515,384 UART: [ldev] AUTHORITY.KEYID = 7
1,515,847 UART: [ldev] FE.KEYID = 1
1,521,251 UART: [ldev] Erasing FE.KEYID = 1
1,546,328 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,158 UART: [ldev] --
1,585,547 UART: [fwproc] Waiting for Commands...
1,586,164 UART: [fwproc] Received command 0x46574c44
1,586,955 UART: [fwproc] Received Image of size 114332 bytes
2,884,373 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,811 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,163 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,042 >>> mbox cmd response: success
3,078,074 UART: [afmc] ++
3,078,242 UART: [afmc] CDI.KEYID = 6
3,078,604 UART: [afmc] SUBJECT.KEYID = 7
3,079,029 UART: [afmc] AUTHORITY.KEYID = 5
3,114,154 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,300 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,080 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,808 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,693 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,383 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,222 UART: [afmc] --
3,157,264 UART: [cold-reset] --
3,158,120 UART: [state] Locking Datavault
3,159,205 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,809 UART: [state] Locking ICCM
3,160,411 UART: [exit] Launching FMC @ 0x40000130
3,165,740 UART:
3,165,756 UART: Running Caliptra FMC ...
3,166,164 UART:
3,166,218 UART: [state] CFI Enabled
3,176,535 UART: [fht] FMC Alias Private Key: 7
3,284,480 UART: [art] Extend RT PCRs Done
3,284,908 UART: [art] Lock RT PCRs Done
3,286,160 UART: [art] Populate DV Done
3,294,101 UART: [fht] FMC Alias Private Key: 7
3,295,041 UART: [art] Derive CDI
3,295,321 UART: [art] Store in in slot 0x4
3,381,140 UART: [art] Derive Key Pair
3,381,500 UART: [art] Store priv key in slot 0x5
3,394,478 UART: [art] Derive Key Pair - Done
3,409,293 UART: [art] Signing Cert with AUTHO
3,409,773 UART: RITY.KEYID = 7
3,424,729 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,494 UART: [art] PUB.X = B535E52249309FBD17F74460A51507FCD752523E09B6A57D6EDA04489A8EB3E8105CD621680CF8A036F3DD3398881547
3,432,248 UART: [art] PUB.Y = F5A045F54DF9791B35992E99BE5A9989A63CB04EFFB8DDABB64770A2695B4AFC8F6DE2A14E0C0C719869FBF6F41C2BD2
3,439,212 UART: [art] SIG.R = EBDAADFF6D611D3A88721D16F301F389922351F5E5E8DDCC1F1BFA78FF438AF95ACDA2C04380EBA67726E947EFB35B69
3,446,001 UART: [art] SIG.S = 95E425B6B157DCD71D36ED6A33DCE80C56ADD999079B79A91072C7AF13052B6014A1D9B4FBE09707F600A254991C3DC4
3,469,836 UART: Caliptra RT
3,470,089 UART: [state] CFI Enabled
3,578,043 UART: [rt] RT listening for mailbox commands...
3,578,713 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,375 UART: [rt]cmd =0x41545348, len=116
3,611,122 >>> mbox cmd response data (12 bytes)
3,611,123 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,795 UART:
3,611,811 UART: Running Caliptra ROM ...
3,612,219 UART:
3,612,273 UART: [state] CFI Enabled
3,615,165 UART: [state] LifecycleState = Unprovisioned
3,615,820 UART: [state] DebugLocked = No
3,616,460 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,618,175 UART: [kat] SHA2-256
4,412,106 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,416,221 UART: [kat] ++
4,416,373 UART: [kat] sha1
4,420,753 UART: [kat] SHA2-256
4,422,691 UART: [kat] SHA2-384
4,425,552 UART: [kat] SHA2-512-ACC
4,427,452 UART: [kat] ECC-384
4,432,839 UART: [kat] HMAC-384Kdf
4,437,349 UART: [kat] LMS
5,005,545 UART: [kat] --
5,006,466 UART: [update-reset] ++
5,932,518 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,933,804 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,030,238 >>> mbox cmd response: success
6,030,238 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,030,413 UART: [update-reset] Copying MAN_2 To MAN_1
6,038,427 UART: [update-reset Success] --
6,039,588 UART: [state] Locking Datavault
6,040,342 UART: [state] Locking PCR0, PCR1 and PCR31
6,040,946 UART: [state] Locking ICCM
6,041,400 UART: [exit] Launching FMC @ 0x40000130
6,046,729 UART:
6,046,745 UART: Running Caliptra FMC ...
6,047,153 UART:
6,047,207 UART: [state] CFI Enabled
6,136,470 UART: [art] Extend RT PCRs Done
6,136,898 UART: [art] Lock RT PCRs Done
6,138,045 UART: [art] Populate DV Done
6,146,408 UART: [fht] FMC Alias Private Key: 7
6,147,410 UART: [art] Derive CDI
6,147,690 UART: [art] Store in in slot 0x4
6,233,321 UART: [art] Derive Key Pair
6,233,681 UART: [art] Store priv key in slot 0x5
6,246,961 UART: [art] Derive Key Pair - Done
6,261,900 UART: [art] Signing Cert with AUTHO
6,262,380 UART: RITY.KEYID = 7
6,277,542 UART: [art] Erasing AUTHORITY.KEYID = 7
6,278,307 UART: [art] PUB.X = E0E29195C0913DC7E7D856384327DFA9ADE1F1D84C81F8B86C9C39F34FB975AC378277A22062CEEE94560AD3DF3113EA
6,285,084 UART: [art] PUB.Y = A84A1C36009158CEA5C66E67074F12CC8EE58AC2FADA92BD20A7219A3F2106324D0EC78DBAB12164642D9F9A992E2B93
6,292,013 UART: [art] SIG.R = B53F2D0AEFACA9FAC506F007D15950B03DB6EA3388EF8C17CE7EB5D18141A98F221DA1F107CF438F5E9B0F18DE53433E
6,298,788 UART: [art] SIG.S = 6DA5C07A438B74104B3C8127C2448AAA7353288EF4C9A636551312C8B2AAB093A2E56938382E917571951D07D4FCB2CF
6,322,952 UART: mbox::rt_entry...
6,323,324 UART: ____ _ _ _ ____ _____
6,324,108 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,324,908 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,325,676 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,326,444 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,327,212 UART: |_|
6,327,524 UART:
6,606,842 UART: [rt] Runtime listening for mailbox commands...
6,608,032 >>> mbox cmd response data (48 bytes)
6,608,033 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,610,816 >>> mbox cmd response data (48 bytes)
6,610,817 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,623,755 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,613 ready_for_fw is high
1,363,613 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,802 >>> mbox cmd response: success
2,990,058 UART:
2,990,074 UART: Running Caliptra FMC ...
2,990,482 UART:
2,990,536 UART: [state] CFI Enabled
3,000,981 UART: [fht] FMC Alias Private Key: 7
3,108,614 UART: [art] Extend RT PCRs Done
3,109,042 UART: [art] Lock RT PCRs Done
3,110,614 UART: [art] Populate DV Done
3,118,951 UART: [fht] FMC Alias Private Key: 7
3,119,943 UART: [art] Derive CDI
3,120,223 UART: [art] Store in in slot 0x4
3,205,440 UART: [art] Derive Key Pair
3,205,800 UART: [art] Store priv key in slot 0x5
3,218,982 UART: [art] Derive Key Pair - Done
3,233,650 UART: [art] Signing Cert with AUTHO
3,234,130 UART: RITY.KEYID = 7
3,249,786 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,551 UART: [art] PUB.X = DFF9A746E8FA373615198685D61EC8FBD1CA1D6F1F1A903B3A171172F97FF3091442CA29EB6AEB134F25DBFE14C481DE
3,257,334 UART: [art] PUB.Y = 570DF324167CCA5B4DF0C9D411FFB89A939E153774DD20494F2B9FDB5D80AA3C6523C9F975363A5825769A3A29ED263D
3,264,287 UART: [art] SIG.R = FC6CB6188943286B6523C232C5283A9BF120F37C881934C043B692CAA56C1A49CEE1B1DD8BC4BDB09715F1F084DBD3C8
3,271,067 UART: [art] SIG.S = 8954884C8FBC6A983F8D90F45AA8D5974FFD17E5DE2997A0FB92A7E12596CA689FA249290BE4F7EBBA3DF0E60FECD317
3,294,230 UART: Caliptra RT
3,294,483 UART: [state] CFI Enabled
3,402,563 UART: [rt] RT listening for mailbox commands...
3,403,233 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,061 UART: [rt]cmd =0x41545348, len=116
3,435,784 >>> mbox cmd response data (12 bytes)
3,435,785 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,735,300 >>> mbox cmd response: success
5,735,300 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,749,015 UART:
5,749,031 UART: Running Caliptra FMC ...
5,749,439 UART:
5,749,493 UART: [state] CFI Enabled
5,838,544 UART: [art] Extend RT PCRs Done
5,838,972 UART: [art] Lock RT PCRs Done
5,840,227 UART: [art] Populate DV Done
5,848,492 UART: [fht] FMC Alias Private Key: 7
5,849,574 UART: [art] Derive CDI
5,849,854 UART: [art] Store in in slot 0x4
5,935,271 UART: [art] Derive Key Pair
5,935,631 UART: [art] Store priv key in slot 0x5
5,948,613 UART: [art] Derive Key Pair - Done
5,963,303 UART: [art] Signing Cert with AUTHO
5,963,783 UART: RITY.KEYID = 7
5,979,017 UART: [art] Erasing AUTHORITY.KEYID = 7
5,979,782 UART: [art] PUB.X = 2F3B1DB3CB7EDE547822BBD15F14465E4EFF51EEECBB0394AF7D438165A9A46ADBCA9670591F4135F21072F30741E1B3
5,986,560 UART: [art] PUB.Y = 638E2DFFC566A0FF11FC83D5942538A593DA8C2F85F9C7C733C227D64DC3D8EA17E6FFC4F9DE2FC62F3745856E2FE0AE
5,993,530 UART: [art] SIG.R = B5504B804AE8B82218B376D55D6DAAB0BEB169C74F648103DF321BEF4B3E31D6F3525ACA934369134FF152A742483CE8
6,000,303 UART: [art] SIG.S = ACE3242E829F74180D148EABA53B29542E73F55D8FAC17756973B77ADBD6EAB2B582E586B79DF565E9A7EE55AFC09A00
6,024,027 UART: mbox::rt_entry...
6,024,399 UART: ____ _ _ _ ____ _____
6,025,183 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,025,983 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,026,751 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,027,519 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,028,287 UART: |_|
6,028,599 UART:
6,309,954 UART: [rt] Runtime listening for mailbox commands...
6,311,144 >>> mbox cmd response data (48 bytes)
6,311,145 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,313,928 >>> mbox cmd response data (48 bytes)
6,313,929 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,326,867 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,244 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,896 UART: [kat] SHA2-256
881,827 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,942 UART: [kat] ++
886,094 UART: [kat] sha1
890,362 UART: [kat] SHA2-256
892,300 UART: [kat] SHA2-384
894,883 UART: [kat] SHA2-512-ACC
896,784 UART: [kat] ECC-384
902,373 UART: [kat] HMAC-384Kdf
906,977 UART: [kat] LMS
1,475,173 UART: [kat] --
1,476,342 UART: [cold-reset] ++
1,476,790 UART: [fht] Storing FHT @ 0x50003400
1,479,573 UART: [idev] ++
1,479,741 UART: [idev] CDI.KEYID = 6
1,480,101 UART: [idev] SUBJECT.KEYID = 7
1,480,525 UART: [idev] UDS.KEYID = 0
1,480,870 ready_for_fw is high
1,480,870 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,227 UART: [idev] Erasing UDS.KEYID = 0
1,505,835 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,661 UART: [idev] --
1,515,712 UART: [ldev] ++
1,515,880 UART: [ldev] CDI.KEYID = 6
1,516,243 UART: [ldev] SUBJECT.KEYID = 5
1,516,669 UART: [ldev] AUTHORITY.KEYID = 7
1,517,132 UART: [ldev] FE.KEYID = 1
1,522,372 UART: [ldev] Erasing FE.KEYID = 1
1,547,433 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,317 UART: [ldev] --
1,586,646 UART: [fwproc] Waiting for Commands...
1,587,373 UART: [fwproc] Received command 0x46574c44
1,588,164 UART: [fwproc] Received Image of size 114332 bytes
2,885,046 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,392 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,744 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,609 >>> mbox cmd response: success
3,078,673 UART: [afmc] ++
3,078,841 UART: [afmc] CDI.KEYID = 6
3,079,203 UART: [afmc] SUBJECT.KEYID = 7
3,079,628 UART: [afmc] AUTHORITY.KEYID = 5
3,114,977 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,273 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,053 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,781 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,666 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,356 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,355 UART: [afmc] --
3,158,387 UART: [cold-reset] --
3,159,169 UART: [state] Locking Datavault
3,160,482 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,086 UART: [state] Locking ICCM
3,161,662 UART: [exit] Launching FMC @ 0x40000130
3,166,991 UART:
3,167,007 UART: Running Caliptra FMC ...
3,167,415 UART:
3,167,558 UART: [state] CFI Enabled
3,178,123 UART: [fht] FMC Alias Private Key: 7
3,286,066 UART: [art] Extend RT PCRs Done
3,286,494 UART: [art] Lock RT PCRs Done
3,287,888 UART: [art] Populate DV Done
3,295,991 UART: [fht] FMC Alias Private Key: 7
3,297,009 UART: [art] Derive CDI
3,297,289 UART: [art] Store in in slot 0x4
3,383,070 UART: [art] Derive Key Pair
3,383,430 UART: [art] Store priv key in slot 0x5
3,396,624 UART: [art] Derive Key Pair - Done
3,411,189 UART: [art] Signing Cert with AUTHO
3,411,669 UART: RITY.KEYID = 7
3,427,393 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,158 UART: [art] PUB.X = CB40ED87A3FCB3EAF14EB323296E85BAEE5F908ED993316D69029C06B42659D332268C16C43D33434E3493961D8EB9C4
3,434,926 UART: [art] PUB.Y = EFC1F8365D9F9665AA0D44DD60BDC82A5823519625B58AF6754331B18310037A8F126BAD3B3A989750DF7D4CECFAFD36
3,441,880 UART: [art] SIG.R = 6BEE69524A5C76CB94E7598865FD0BDA6DED0752E8C247F858CB96FE57C2E5BD86C9D4E182A7C314A3CD06945CC19855
3,448,653 UART: [art] SIG.S = 3C41C47F82C1241BAFC848143E3C34375038DBBADA039112728BBD4912BCA80DF6B9FA125180B9E382CEBA0FB3161C48
3,472,939 UART: Caliptra RT
3,473,284 UART: [state] CFI Enabled
3,581,594 UART: [rt] RT listening for mailbox commands...
3,582,264 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,572 UART: [rt]cmd =0x41545348, len=116
3,614,391 >>> mbox cmd response data (12 bytes)
3,614,392 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,112 UART:
3,615,128 UART: Running Caliptra ROM ...
3,615,536 UART:
3,615,677 UART: [state] CFI Enabled
3,617,871 UART: [state] LifecycleState = Unprovisioned
3,618,526 UART: [state] DebugLocked = No
3,619,076 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,620,603 UART: [kat] SHA2-256
4,414,534 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,418,649 UART: [kat] ++
4,418,801 UART: [kat] sha1
4,422,997 UART: [kat] SHA2-256
4,424,935 UART: [kat] SHA2-384
4,427,658 UART: [kat] SHA2-512-ACC
4,429,558 UART: [kat] ECC-384
4,435,519 UART: [kat] HMAC-384Kdf
4,440,297 UART: [kat] LMS
5,008,493 UART: [kat] --
5,009,362 UART: [update-reset] ++
5,936,546 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,937,746 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,034,180 >>> mbox cmd response: success
6,034,180 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,034,293 UART: [update-reset] Copying MAN_2 To MAN_1
6,042,307 UART: [update-reset Success] --
6,043,322 UART: [state] Locking Datavault
6,044,164 UART: [state] Locking PCR0, PCR1 and PCR31
6,044,768 UART: [state] Locking ICCM
6,045,304 UART: [exit] Launching FMC @ 0x40000130
6,050,633 UART:
6,050,649 UART: Running Caliptra FMC ...
6,051,057 UART:
6,051,200 UART: [state] CFI Enabled
6,140,825 UART: [art] Extend RT PCRs Done
6,141,253 UART: [art] Lock RT PCRs Done
6,142,418 UART: [art] Populate DV Done
6,150,821 UART: [fht] FMC Alias Private Key: 7
6,151,937 UART: [art] Derive CDI
6,152,217 UART: [art] Store in in slot 0x4
6,237,840 UART: [art] Derive Key Pair
6,238,200 UART: [art] Store priv key in slot 0x5
6,251,314 UART: [art] Derive Key Pair - Done
6,265,737 UART: [art] Signing Cert with AUTHO
6,266,217 UART: RITY.KEYID = 7
6,281,415 UART: [art] Erasing AUTHORITY.KEYID = 7
6,282,180 UART: [art] PUB.X = 63B451C0B4A3081923D07EAFAEC6D7B263CB97BE4C980C08822299189984C386DF068E8C036CD958525628A4098015D4
6,288,926 UART: [art] PUB.Y = 6E0D9F63BA9E73E634F09047EC536139089CF84B942C86FCEEE9B05C28A78FCA37294C5EF8CDFCAA5D03C755B5255735
6,295,879 UART: [art] SIG.R = 5D66C5903E3ED1666792D665D1736470C5EA8C762BAC35A14A68E2DA8376DD45361066C1CF94CB85255838B9FCF75AF8
6,302,651 UART: [art] SIG.S = A92C3029D5FB273EDF77B164BE2216563D0785321908140E8FB5034223EE3417DC70C61DE008B400AF93762DAF31D6EB
6,326,511 UART: mbox::rt_entry...
6,326,883 UART: ____ _ _ _ ____ _____
6,327,667 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,328,467 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,329,235 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,330,003 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,330,771 UART: |_|
6,331,083 UART:
6,612,051 UART: [rt] Runtime listening for mailbox commands...
6,613,241 >>> mbox cmd response data (48 bytes)
6,613,242 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,616,025 >>> mbox cmd response data (48 bytes)
6,616,026 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,628,964 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,696 ready_for_fw is high
1,362,696 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,765 >>> mbox cmd response: success
2,990,223 UART:
2,990,239 UART: Running Caliptra FMC ...
2,990,647 UART:
2,990,790 UART: [state] CFI Enabled
3,001,527 UART: [fht] FMC Alias Private Key: 7
3,109,040 UART: [art] Extend RT PCRs Done
3,109,468 UART: [art] Lock RT PCRs Done
3,111,030 UART: [art] Populate DV Done
3,118,977 UART: [fht] FMC Alias Private Key: 7
3,119,925 UART: [art] Derive CDI
3,120,205 UART: [art] Store in in slot 0x4
3,206,070 UART: [art] Derive Key Pair
3,206,430 UART: [art] Store priv key in slot 0x5
3,219,564 UART: [art] Derive Key Pair - Done
3,234,140 UART: [art] Signing Cert with AUTHO
3,234,620 UART: RITY.KEYID = 7
3,249,430 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,195 UART: [art] PUB.X = F53F48C44C7AE41846DC25B2DC1F5D7F2A5A8C314EA1FE8B09736C0E5FC23DC51046852A328D9D11CC191FB2289CD2FA
3,256,975 UART: [art] PUB.Y = 647B6035531FB860BB13152CF73BEA34063A5E9549E32A6691631137CF78D2277EE635641D1FFE57C313F8795F9322E7
3,263,914 UART: [art] SIG.R = 105D4D1345F0D06D4BC906970DC5002A823E6255AFE95883229AAE8CF245BE2D8704AE7E3708E8AEEDB8A4ABD653DBBC
3,270,666 UART: [art] SIG.S = 4E52D49547858984CF977A51945A77BB3FF16D968B0539AA6050212C516304D4271BA075A0E0215A0581FB82C0B16D2B
3,294,826 UART: Caliptra RT
3,295,171 UART: [state] CFI Enabled
3,402,913 UART: [rt] RT listening for mailbox commands...
3,403,583 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,271 UART: [rt]cmd =0x41545348, len=116
3,435,910 >>> mbox cmd response data (12 bytes)
3,435,911 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,738,792 >>> mbox cmd response: success
5,738,792 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,752,085 UART:
5,752,101 UART: Running Caliptra FMC ...
5,752,509 UART:
5,752,652 UART: [state] CFI Enabled
5,842,103 UART: [art] Extend RT PCRs Done
5,842,531 UART: [art] Lock RT PCRs Done
5,843,798 UART: [art] Populate DV Done
5,851,959 UART: [fht] FMC Alias Private Key: 7
5,852,943 UART: [art] Derive CDI
5,853,223 UART: [art] Store in in slot 0x4
5,938,798 UART: [art] Derive Key Pair
5,939,158 UART: [art] Store priv key in slot 0x5
5,952,818 UART: [art] Derive Key Pair - Done
5,967,801 UART: [art] Signing Cert with AUTHO
5,968,281 UART: RITY.KEYID = 7
5,983,545 UART: [art] Erasing AUTHORITY.KEYID = 7
5,984,310 UART: [art] PUB.X = 6758CCFFA4DC25B6EC0DC929F3BD588EA15DD06893B68DFA11E31D941BA9CE6DC85CECFD96DECD5E64E3B3AB73C13F93
5,991,109 UART: [art] PUB.Y = 8869765160F70AB014338115081FFA57B1BF371A56258CCC0E245C05C21A1D864DCF67AB03E807AF3EB3526FD75D829A
5,998,043 UART: [art] SIG.R = D5CDBACDBEEACA97F23D3D1CE2D094799825D2322C8EF7EE990A7CFDB7AE4837C4D107B84B2DA61FEBBAB2271C12DA15
6,004,839 UART: [art] SIG.S = 73678268BA9D71BB2A5D4199B2E554972DF6AD779AF13DEF0A8F50FB1898AD8695909FADB3BA255D809E382A360CF261
6,027,906 UART: mbox::rt_entry...
6,028,278 UART: ____ _ _ _ ____ _____
6,029,062 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,029,862 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,030,630 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,031,398 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,032,166 UART: |_|
6,032,478 UART:
6,315,978 UART: [rt] Runtime listening for mailbox commands...
6,317,168 >>> mbox cmd response data (48 bytes)
6,317,169 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,319,952 >>> mbox cmd response data (48 bytes)
6,319,953 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,332,891 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,564 UART: [state] LifecycleState = Unprovisioned
85,219 UART: [state] DebugLocked = No
85,833 UART: [state] WD Timer not started. Device not locked for debugging
87,046 UART: [kat] SHA2-256
892,696 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,821 UART: [kat] ++
896,973 UART: [kat] sha1
901,089 UART: [kat] SHA2-256
903,029 UART: [kat] SHA2-384
905,780 UART: [kat] SHA2-512-ACC
907,681 UART: [kat] ECC-384
917,432 UART: [kat] HMAC-384Kdf
922,192 UART: [kat] LMS
1,170,520 UART: [kat] --
1,171,537 UART: [cold-reset] ++
1,171,909 UART: [fht] FHT @ 0x50003400
1,174,456 UART: [idev] ++
1,174,624 UART: [idev] CDI.KEYID = 6
1,174,984 UART: [idev] SUBJECT.KEYID = 7
1,175,408 UART: [idev] UDS.KEYID = 0
1,175,753 ready_for_fw is high
1,175,753 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,270 UART: [idev] Erasing UDS.KEYID = 0
1,199,883 UART: [idev] Sha1 KeyId Algorithm
1,208,289 UART: [idev] --
1,209,303 UART: [ldev] ++
1,209,471 UART: [ldev] CDI.KEYID = 6
1,209,834 UART: [ldev] SUBJECT.KEYID = 5
1,210,260 UART: [ldev] AUTHORITY.KEYID = 7
1,210,723 UART: [ldev] FE.KEYID = 1
1,215,591 UART: [ldev] Erasing FE.KEYID = 1
1,241,340 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,105 UART: [ldev] --
1,280,438 UART: [fwproc] Wait for Commands...
1,281,100 UART: [fwproc] Recv command 0x46574c44
1,281,828 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,596 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,900 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,613 >>> mbox cmd response: success
2,774,845 UART: [afmc] ++
2,775,013 UART: [afmc] CDI.KEYID = 6
2,775,375 UART: [afmc] SUBJECT.KEYID = 7
2,775,800 UART: [afmc] AUTHORITY.KEYID = 5
2,811,429 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,952 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,700 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,428 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,313 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,032 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,864 UART: [afmc] --
2,854,970 UART: [cold-reset] --
2,855,894 UART: [state] Locking Datavault
2,857,007 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,611 UART: [state] Locking ICCM
2,858,051 UART: [exit] Launching FMC @ 0x40000130
2,863,380 UART:
2,863,396 UART: Running Caliptra FMC ...
2,863,804 UART:
2,863,858 UART: [state] CFI Enabled
2,874,467 UART: [fht] FMC Alias Private Key: 7
2,982,708 UART: [art] Extend RT PCRs Done
2,983,136 UART: [art] Lock RT PCRs Done
2,985,104 UART: [art] Populate DV Done
2,993,411 UART: [fht] FMC Alias Private Key: 7
2,994,413 UART: [art] Derive CDI
2,994,693 UART: [art] Store in in slot 0x4
3,080,016 UART: [art] Derive Key Pair
3,080,376 UART: [art] Store priv key in slot 0x5
3,093,788 UART: [art] Derive Key Pair - Done
3,108,480 UART: [art] Signing Cert with AUTHO
3,108,960 UART: RITY.KEYID = 7
3,124,476 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,241 UART: [art] PUB.X = 4D78007165908510A0E1FD556443BD024BB01DF16C7F4742F99D7451504BA36E5D70C63AA02EDA0A57479CFB9F5272DF
3,131,985 UART: [art] PUB.Y = C381D65BEFCC002353338C0AA72F7A3E25F3B14B0AC767130579D79BEDC74F16593A3A4D20F5AB63505A032902A9CDA3
3,138,906 UART: [art] SIG.R = 9BE445F1F89289BFE1B487B661BDEB89B16DA612203A39823350F36F804807271F1D8346A4C5C3F071608DA3C6D8F648
3,145,671 UART: [art] SIG.S = 88D88401D7B2FC640CBBFD82EF55AF38743D76276FAD4EE455ABBE6F1A41F9CD7BF64A315DBF36A12EEB6991F345CEB3
3,169,584 UART: Caliptra RT
3,169,837 UART: [state] CFI Enabled
3,277,279 UART: [rt] RT listening for mailbox commands...
3,277,949 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,435 UART: [rt]cmd =0x41545348, len=116
3,310,202 >>> mbox cmd response data (12 bytes)
3,310,203 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,248 UART:
3,311,264 UART: Running Caliptra ROM ...
3,311,672 UART:
3,311,727 UART: [state] CFI Enabled
3,314,285 UART: [state] LifecycleState = Unprovisioned
3,314,940 UART: [state] DebugLocked = No
3,315,484 UART: [state] WD Timer not started. Device not locked for debugging
3,316,670 UART: [kat] SHA2-256
4,122,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,126,445 UART: [kat] ++
4,126,597 UART: [kat] sha1
4,130,767 UART: [kat] SHA2-256
4,132,707 UART: [kat] SHA2-384
4,135,342 UART: [kat] SHA2-512-ACC
4,137,242 UART: [kat] ECC-384
4,147,321 UART: [kat] HMAC-384Kdf
4,151,695 UART: [kat] LMS
4,400,023 UART: [kat] --
4,400,925 UART: [update-reset] ++
5,304,495 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,305,576 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,401,958 >>> mbox cmd response: success
5,401,958 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,402,205 UART: [update-reset] Copying MAN_2 To MAN_1
5,410,219 UART: [update-reset Success] --
5,411,338 UART: [state] Locking Datavault
5,412,198 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,802 UART: [state] Locking ICCM
5,413,324 UART: [exit] Launching FMC @ 0x40000130
5,418,653 UART:
5,418,669 UART: Running Caliptra FMC ...
5,419,077 UART:
5,419,131 UART: [state] CFI Enabled
5,508,420 UART: [art] Extend RT PCRs Done
5,508,848 UART: [art] Lock RT PCRs Done
5,510,103 UART: [art] Populate DV Done
5,518,398 UART: [fht] FMC Alias Private Key: 7
5,519,556 UART: [art] Derive CDI
5,519,836 UART: [art] Store in in slot 0x4
5,605,387 UART: [art] Derive Key Pair
5,605,747 UART: [art] Store priv key in slot 0x5
5,618,665 UART: [art] Derive Key Pair - Done
5,633,195 UART: [art] Signing Cert with AUTHO
5,633,675 UART: RITY.KEYID = 7
5,648,861 UART: [art] Erasing AUTHORITY.KEYID = 7
5,649,626 UART: [art] PUB.X = 50F64AC7A4B0986F53082CB7E2C442553F33460442E12FC50EFF5B3E98D6E2097B3035E9B61C52677E89A94A104DE50D
5,656,381 UART: [art] PUB.Y = 3DC545FBA9E646B37F958FED24FE1BAE702A2A88E5904A08744B0739D620D61D4F24C5A99A36325B2BB76F4915CAAED1
5,663,337 UART: [art] SIG.R = A6696951EE8FFCC7FD7F6FFBEC53A174927DB081A0F59F3843FF71D41CA95F6893178D64EFE5E5F9983A98EE78D358CB
5,670,123 UART: [art] SIG.S = 1ACDC369F969D4CEA52343A92CFF7F107E1D3F52AEA601DCA00D5BCBF6D3AE806D72417C306D18F4C514F9633294A83B
5,694,592 UART: mbox::rt_entry...
5,694,964 UART: ____ _ _ _ ____ _____
5,695,748 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,696,548 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,697,316 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,698,084 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,698,852 UART: |_|
5,699,164 UART:
5,980,576 UART: [rt] Runtime listening for mailbox commands...
5,981,766 >>> mbox cmd response data (48 bytes)
5,981,767 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,984,550 >>> mbox cmd response data (48 bytes)
5,984,551 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,997,489 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,757 ready_for_fw is high
1,059,757 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,472 >>> mbox cmd response: success
2,687,404 UART:
2,687,420 UART: Running Caliptra FMC ...
2,687,828 UART:
2,687,882 UART: [state] CFI Enabled
2,698,359 UART: [fht] FMC Alias Private Key: 7
2,806,084 UART: [art] Extend RT PCRs Done
2,806,512 UART: [art] Lock RT PCRs Done
2,808,162 UART: [art] Populate DV Done
2,816,389 UART: [fht] FMC Alias Private Key: 7
2,817,377 UART: [art] Derive CDI
2,817,657 UART: [art] Store in in slot 0x4
2,903,438 UART: [art] Derive Key Pair
2,903,798 UART: [art] Store priv key in slot 0x5
2,917,108 UART: [art] Derive Key Pair - Done
2,931,809 UART: [art] Signing Cert with AUTHO
2,932,289 UART: RITY.KEYID = 7
2,947,217 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,982 UART: [art] PUB.X = E38F47297EB6D61B38A4ABB672390424275342A968A161A7FEE209EB130258FECB3C05FF7A8296891FF590CCC2BEDBEE
2,954,752 UART: [art] PUB.Y = 32D6AED4D550CF156106079E15AEFEE54A7DDBDDA40A63A24C764977BEC3EA5269246386FB1CCC6BBE3A71526E846FD3
2,961,711 UART: [art] SIG.R = 515C09171B6BE376231AE09E259520CCBB458FAE02586A01DEE2DF88DAA22C98AE0EA1364F401B5C7F6D7FA835282D66
2,968,479 UART: [art] SIG.S = 61EB9A6E12F5C8DBF11368BF78465E66388358BAC1014806DA51D2997EB393B1539E33E464772E3AB99D84B5C9CDB827
2,992,334 UART: Caliptra RT
2,992,587 UART: [state] CFI Enabled
3,100,330 UART: [rt] RT listening for mailbox commands...
3,101,000 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,400 UART: [rt]cmd =0x41545348, len=116
3,132,973 >>> mbox cmd response data (12 bytes)
3,132,974 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,109,387 >>> mbox cmd response: success
5,109,387 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,122,997 UART:
5,123,013 UART: Running Caliptra FMC ...
5,123,421 UART:
5,123,475 UART: [state] CFI Enabled
5,212,154 UART: [art] Extend RT PCRs Done
5,212,582 UART: [art] Lock RT PCRs Done
5,213,717 UART: [art] Populate DV Done
5,222,156 UART: [fht] FMC Alias Private Key: 7
5,223,206 UART: [art] Derive CDI
5,223,486 UART: [art] Store in in slot 0x4
5,309,107 UART: [art] Derive Key Pair
5,309,467 UART: [art] Store priv key in slot 0x5
5,322,729 UART: [art] Derive Key Pair - Done
5,337,640 UART: [art] Signing Cert with AUTHO
5,338,120 UART: RITY.KEYID = 7
5,353,252 UART: [art] Erasing AUTHORITY.KEYID = 7
5,354,017 UART: [art] PUB.X = A49D0F12FD3066CA0759F79421751513BCBAA54D7C346794FAF4DDFA352F4FF12AB6FA2ED74AF2C5A60066980A083207
5,360,760 UART: [art] PUB.Y = 6C1A7AC921AC80853AC7D0FDC15755CB6CD000F8A857988A1A274EE55ACCF02F1F558F9AE2AAA5898DFCFBBEDD54BBF4
5,367,718 UART: [art] SIG.R = 7A5C287ACDB20B5D93013B50D71FDDEFBB0A64A1CF0033DAF13C9C64908F441E2C55FD3CAAD7E386C6DFBB97F3C98166
5,374,481 UART: [art] SIG.S = 0882DC2FDB43B639990C31A7A1410E7E6D6F7A8356CD3F424F05FF62A4F3D94C9B0D1C8C1333717FD27FEDE6D43D916F
5,398,731 UART: mbox::rt_entry...
5,399,103 UART: ____ _ _ _ ____ _____
5,399,887 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,400,687 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,401,455 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,402,223 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,402,991 UART: |_|
5,403,303 UART:
5,684,527 UART: [rt] Runtime listening for mailbox commands...
5,685,717 >>> mbox cmd response data (48 bytes)
5,685,718 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,688,501 >>> mbox cmd response data (48 bytes)
5,688,502 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,701,440 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
893,733 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,858 UART: [kat] ++
898,010 UART: [kat] sha1
902,102 UART: [kat] SHA2-256
904,042 UART: [kat] SHA2-384
907,043 UART: [kat] SHA2-512-ACC
908,944 UART: [kat] ECC-384
918,851 UART: [kat] HMAC-384Kdf
923,377 UART: [kat] LMS
1,171,705 UART: [kat] --
1,172,816 UART: [cold-reset] ++
1,173,348 UART: [fht] FHT @ 0x50003400
1,175,957 UART: [idev] ++
1,176,125 UART: [idev] CDI.KEYID = 6
1,176,485 UART: [idev] SUBJECT.KEYID = 7
1,176,909 UART: [idev] UDS.KEYID = 0
1,177,254 ready_for_fw is high
1,177,254 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,903 UART: [idev] Erasing UDS.KEYID = 0
1,202,198 UART: [idev] Sha1 KeyId Algorithm
1,210,894 UART: [idev] --
1,212,084 UART: [ldev] ++
1,212,252 UART: [ldev] CDI.KEYID = 6
1,212,615 UART: [ldev] SUBJECT.KEYID = 5
1,213,041 UART: [ldev] AUTHORITY.KEYID = 7
1,213,504 UART: [ldev] FE.KEYID = 1
1,218,776 UART: [ldev] Erasing FE.KEYID = 1
1,246,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,277,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,128 UART: [ldev] --
1,285,555 UART: [fwproc] Wait for Commands...
1,286,297 UART: [fwproc] Recv command 0x46574c44
1,287,025 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,941 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,245 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,777,106 >>> mbox cmd response: success
2,778,162 UART: [afmc] ++
2,778,330 UART: [afmc] CDI.KEYID = 6
2,778,692 UART: [afmc] SUBJECT.KEYID = 7
2,779,117 UART: [afmc] AUTHORITY.KEYID = 5
2,815,324 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,647 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,375 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,260 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,979 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,707 UART: [afmc] --
2,858,647 UART: [cold-reset] --
2,859,655 UART: [state] Locking Datavault
2,860,780 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,384 UART: [state] Locking ICCM
2,861,874 UART: [exit] Launching FMC @ 0x40000130
2,867,203 UART:
2,867,219 UART: Running Caliptra FMC ...
2,867,627 UART:
2,867,770 UART: [state] CFI Enabled
2,878,371 UART: [fht] FMC Alias Private Key: 7
2,986,696 UART: [art] Extend RT PCRs Done
2,987,124 UART: [art] Lock RT PCRs Done
2,988,424 UART: [art] Populate DV Done
2,996,639 UART: [fht] FMC Alias Private Key: 7
2,997,799 UART: [art] Derive CDI
2,998,079 UART: [art] Store in in slot 0x4
3,083,736 UART: [art] Derive Key Pair
3,084,096 UART: [art] Store priv key in slot 0x5
3,097,744 UART: [art] Derive Key Pair - Done
3,112,736 UART: [art] Signing Cert with AUTHO
3,113,216 UART: RITY.KEYID = 7
3,128,398 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,163 UART: [art] PUB.X = DA47AD338F79CCD057BEEBCD23BBE8507EC0475514F93C6C7EFDE4B0B39C8B0A802F5166FD0BBB48D1E4C33245B99001
3,135,944 UART: [art] PUB.Y = BB7B125C5263B63D1228DB751A887F05AC18447D9CC2E34CEBFF1F8F53D40271667C87748F18811651A4B74FC3CE7BFF
3,142,896 UART: [art] SIG.R = A7CD15E1514357A4D43C74DA5F836EF52FEB67B9FA625BF266B8C6F1133C800B4FC8E600E7207F91028AD2733119E814
3,149,642 UART: [art] SIG.S = B425A40C946EB07F6F1CE8878282508129E6C0E8A1F045A82E56FC410C593B48F6163F8DA03D68A6E13D0A1E5ECC2BF2
3,173,598 UART: Caliptra RT
3,173,943 UART: [state] CFI Enabled
3,281,975 UART: [rt] RT listening for mailbox commands...
3,282,645 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,013 UART: [rt]cmd =0x41545348, len=116
3,314,998 >>> mbox cmd response data (12 bytes)
3,314,999 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,806 UART:
3,315,822 UART: Running Caliptra ROM ...
3,316,230 UART:
3,316,372 UART: [state] CFI Enabled
3,319,590 UART: [state] LifecycleState = Unprovisioned
3,320,245 UART: [state] DebugLocked = No
3,320,821 UART: [state] WD Timer not started. Device not locked for debugging
3,322,155 UART: [kat] SHA2-256
4,127,805 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,131,930 UART: [kat] ++
4,132,082 UART: [kat] sha1
4,136,282 UART: [kat] SHA2-256
4,138,222 UART: [kat] SHA2-384
4,141,159 UART: [kat] SHA2-512-ACC
4,143,059 UART: [kat] ECC-384
4,152,576 UART: [kat] HMAC-384Kdf
4,157,302 UART: [kat] LMS
4,405,630 UART: [kat] --
4,406,612 UART: [update-reset] ++
5,311,460 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,312,557 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,408,939 >>> mbox cmd response: success
5,408,939 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,409,240 UART: [update-reset] Copying MAN_2 To MAN_1
5,417,254 UART: [update-reset Success] --
5,418,177 UART: [state] Locking Datavault
5,419,127 UART: [state] Locking PCR0, PCR1 and PCR31
5,419,731 UART: [state] Locking ICCM
5,420,343 UART: [exit] Launching FMC @ 0x40000130
5,425,672 UART:
5,425,688 UART: Running Caliptra FMC ...
5,426,096 UART:
5,426,239 UART: [state] CFI Enabled
5,515,622 UART: [art] Extend RT PCRs Done
5,516,050 UART: [art] Lock RT PCRs Done
5,517,545 UART: [art] Populate DV Done
5,525,838 UART: [fht] FMC Alias Private Key: 7
5,526,880 UART: [art] Derive CDI
5,527,160 UART: [art] Store in in slot 0x4
5,612,927 UART: [art] Derive Key Pair
5,613,287 UART: [art] Store priv key in slot 0x5
5,626,703 UART: [art] Derive Key Pair - Done
5,641,322 UART: [art] Signing Cert with AUTHO
5,641,802 UART: RITY.KEYID = 7
5,656,960 UART: [art] Erasing AUTHORITY.KEYID = 7
5,657,725 UART: [art] PUB.X = D9A1D9A15097FBC85A3E42A3057ED022D5CF25DF83586541E71ABA6EE7F8DA43CB116855FFC042ED45E7CA0E3BE90C42
5,664,504 UART: [art] PUB.Y = 6F952E4FD8EC8BA72FBDB376145E0A60F4E757CB0EB3403EE67C269D6517FA4B1A4C80BC5A7362C48F85D2F34E58F7C2
5,671,464 UART: [art] SIG.R = 53B56FA713A5157BEC6E7BE398040E284C59BEDE8AFBC3BD0707AF103DD6F82698BA94BE10DBABF5ACE558E53393CBEF
5,678,248 UART: [art] SIG.S = 240805BC9599F5E182AAEF955FAD7FD04F11FB319B673A069803635FE5224EEC048D7263985DBA886DE015FB3B0F5A35
5,701,813 UART: mbox::rt_entry...
5,702,185 UART: ____ _ _ _ ____ _____
5,702,969 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,703,769 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,704,537 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,705,305 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,706,073 UART: |_|
5,706,385 UART:
5,987,527 UART: [rt] Runtime listening for mailbox commands...
5,988,717 >>> mbox cmd response data (48 bytes)
5,988,718 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,991,501 >>> mbox cmd response data (48 bytes)
5,991,502 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,004,440 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,482 ready_for_fw is high
1,060,482 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,461 >>> mbox cmd response: success
2,687,717 UART:
2,687,733 UART: Running Caliptra FMC ...
2,688,141 UART:
2,688,284 UART: [state] CFI Enabled
2,698,741 UART: [fht] FMC Alias Private Key: 7
2,806,676 UART: [art] Extend RT PCRs Done
2,807,104 UART: [art] Lock RT PCRs Done
2,808,648 UART: [art] Populate DV Done
2,816,801 UART: [fht] FMC Alias Private Key: 7
2,817,905 UART: [art] Derive CDI
2,818,185 UART: [art] Store in in slot 0x4
2,904,142 UART: [art] Derive Key Pair
2,904,502 UART: [art] Store priv key in slot 0x5
2,917,796 UART: [art] Derive Key Pair - Done
2,932,480 UART: [art] Signing Cert with AUTHO
2,932,960 UART: RITY.KEYID = 7
2,948,134 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,899 UART: [art] PUB.X = AF5AA845D36D0CED752CF5D96A65D9141649D26F3E675553B5FC4320DCEE486C90384BB69C9F886894F8979E2829A788
2,955,668 UART: [art] PUB.Y = AC7EDCB87B54880BDE5EAE8BAB4E2EA6DF3EDCFA5BE03CF5A0118D200BE96467E97F4C69F54CC5F719900BE9E6358BE4
2,962,639 UART: [art] SIG.R = B95EC67F1127CB7E755CA2211C890A802C957689ED506D19416D77006664D2DF8A8304D79DAF0506B9F8397C41AE7E23
2,969,373 UART: [art] SIG.S = EA5C1EDE3B016B1351C3DB721D37D3BE7A76CB95D30DFD29E9DE289D2F509689DCC382FA8CF620E3DA566D8797D49ED6
2,992,956 UART: Caliptra RT
2,993,301 UART: [state] CFI Enabled
3,101,247 UART: [rt] RT listening for mailbox commands...
3,101,917 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,321 UART: [rt]cmd =0x41545348, len=116
3,134,056 >>> mbox cmd response data (12 bytes)
3,134,057 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,109,496 >>> mbox cmd response: success
5,109,496 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,123,092 UART:
5,123,108 UART: Running Caliptra FMC ...
5,123,516 UART:
5,123,659 UART: [state] CFI Enabled
5,213,118 UART: [art] Extend RT PCRs Done
5,213,546 UART: [art] Lock RT PCRs Done
5,214,741 UART: [art] Populate DV Done
5,223,020 UART: [fht] FMC Alias Private Key: 7
5,223,982 UART: [art] Derive CDI
5,224,262 UART: [art] Store in in slot 0x4
5,309,905 UART: [art] Derive Key Pair
5,310,265 UART: [art] Store priv key in slot 0x5
5,323,025 UART: [art] Derive Key Pair - Done
5,337,824 UART: [art] Signing Cert with AUTHO
5,338,304 UART: RITY.KEYID = 7
5,353,460 UART: [art] Erasing AUTHORITY.KEYID = 7
5,354,225 UART: [art] PUB.X = 680D44243C7785F843F27363A6CEA6DCE71A8F3C4DFBD460BC38101CC4EF6A071E9FEE3C76019A285ACF241835B58F3F
5,360,998 UART: [art] PUB.Y = F47B11E4A5FABB855C4B164A61F3BDEBDE1837713FB002C17E50071FCC0B5EC2D4DB732AC15892723D3AF1056A764612
5,367,948 UART: [art] SIG.R = 4F9FA6D2DF3C98119BB2D3BF1603B2D08681FBE5BB77C033707131A48C3C414EA42E8BCBBBE784D253A54915EA02D63C
5,374,726 UART: [art] SIG.S = 39D998B7411DAA11A1163FEEBD8133405A5B8BB1692E2A291E5A591733A35B28BE4B24508CB18E3D83A3E229199552DF
5,398,385 UART: mbox::rt_entry...
5,398,757 UART: ____ _ _ _ ____ _____
5,399,541 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,400,341 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,401,109 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,401,877 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,402,645 UART: |_|
5,402,957 UART:
5,684,507 UART: [rt] Runtime listening for mailbox commands...
5,685,697 >>> mbox cmd response data (48 bytes)
5,685,698 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,688,481 >>> mbox cmd response data (48 bytes)
5,688,482 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,701,420 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,715 UART: [kat] SHA2-256
901,655 UART: [kat] SHA2-384
904,426 UART: [kat] SHA2-512-ACC
906,327 UART: [kat] ECC-384
915,974 UART: [kat] HMAC-384Kdf
920,488 UART: [kat] LMS
1,168,800 UART: [kat] --
1,169,907 UART: [cold-reset] ++
1,170,463 UART: [fht] FHT @ 0x50003400
1,173,187 UART: [idev] ++
1,173,355 UART: [idev] CDI.KEYID = 6
1,173,716 UART: [idev] SUBJECT.KEYID = 7
1,174,141 UART: [idev] UDS.KEYID = 0
1,174,487 ready_for_fw is high
1,174,487 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,893 UART: [idev] Erasing UDS.KEYID = 0
1,199,249 UART: [idev] Sha1 KeyId Algorithm
1,207,973 UART: [idev] --
1,209,152 UART: [ldev] ++
1,209,320 UART: [ldev] CDI.KEYID = 6
1,209,684 UART: [ldev] SUBJECT.KEYID = 5
1,210,111 UART: [ldev] AUTHORITY.KEYID = 7
1,210,574 UART: [ldev] FE.KEYID = 1
1,215,696 UART: [ldev] Erasing FE.KEYID = 1
1,242,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,020 UART: [ldev] --
1,281,366 UART: [fwproc] Wait for Commands...
1,282,129 UART: [fwproc] Recv command 0x46574c44
1,282,862 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,858 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,898 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,207 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,995 >>> mbox cmd response: success
2,774,126 UART: [afmc] ++
2,774,294 UART: [afmc] CDI.KEYID = 6
2,774,657 UART: [afmc] SUBJECT.KEYID = 7
2,775,083 UART: [afmc] AUTHORITY.KEYID = 5
2,810,318 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,356 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,107 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,836 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,719 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,438 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,247 UART: [afmc] --
2,853,187 UART: [cold-reset] --
2,854,077 UART: [state] Locking Datavault
2,855,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,734 UART: [state] Locking ICCM
2,856,180 UART: [exit] Launching FMC @ 0x40000130
2,861,509 UART:
2,861,525 UART: Running Caliptra FMC ...
2,861,933 UART:
2,861,987 UART: [state] CFI Enabled
2,872,698 UART: [fht] FMC Alias Private Key: 7
2,980,643 UART: [art] Extend RT PCRs Done
2,981,071 UART: [art] Lock RT PCRs Done
2,982,617 UART: [art] Populate DV Done
2,991,064 UART: [fht] FMC Alias Private Key: 7
2,992,208 UART: [art] Derive CDI
2,992,488 UART: [art] Store in in slot 0x4
3,078,077 UART: [art] Derive Key Pair
3,078,437 UART: [art] Store priv key in slot 0x5
3,091,531 UART: [art] Derive Key Pair - Done
3,106,365 UART: [art] Signing Cert with AUTHO
3,106,845 UART: RITY.KEYID = 7
3,122,437 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,202 UART: [art] PUB.X = 0FAF202D864E212314F7CCD1E5AEAC43B001195883804332500ECBDA66BE4202EE9542F0EA05CDC2B312BF86747B58B1
3,129,965 UART: [art] PUB.Y = 458D58A934E49889A41AACD2201AC8375178E803CD38CCA27AEC35FE5AECE5BE845DDF4903067899A802211F11EE3F9B
3,136,913 UART: [art] SIG.R = 503734A6364215094891B6A14AB3BECD5FAC073EBCBE1C10847CE3008A7C4A07B470A9CFAB01CF8161DB9FBB067E46FC
3,143,662 UART: [art] SIG.S = 812D51F0A0274F6D7E61052FF9D6DADE874FD591980BE940505BA956FC17288CD1A3D5FAA23FA5E2A84B7DB9D6188A24
3,167,453 UART: Caliptra RT
3,167,706 UART: [state] CFI Enabled
3,275,467 UART: [rt] RT listening for mailbox commands...
3,276,137 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,541 UART: [rt]cmd =0x41545348, len=116
3,308,262 >>> mbox cmd response data (12 bytes)
3,308,263 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,078 UART:
3,309,094 UART: Running Caliptra ROM ...
3,309,502 UART:
3,309,557 UART: [state] CFI Enabled
3,311,957 UART: [state] LifecycleState = Unprovisioned
3,312,612 UART: [state] DebugLocked = No
3,313,314 UART: [state] WD Timer not started. Device not locked for debugging
3,314,456 UART: [kat] SHA2-256
4,118,006 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,122,135 UART: [kat] ++
4,122,287 UART: [kat] sha1
4,126,309 UART: [kat] SHA2-256
4,128,249 UART: [kat] SHA2-384
4,130,972 UART: [kat] SHA2-512-ACC
4,132,872 UART: [kat] ECC-384
4,142,733 UART: [kat] HMAC-384Kdf
4,147,213 UART: [kat] LMS
4,395,525 UART: [kat] --
4,396,275 UART: [update-reset] ++
5,300,082 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,301,049 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,397,431 >>> mbox cmd response: success
5,397,431 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,397,622 UART: [update-reset] Copying MAN_2 To MAN_1
5,405,636 UART: [update-reset Success] --
5,406,403 UART: [state] Locking Datavault
5,407,239 UART: [state] Locking PCR0, PCR1 and PCR31
5,407,843 UART: [state] Locking ICCM
5,408,477 UART: [exit] Launching FMC @ 0x40000130
5,413,806 UART:
5,413,822 UART: Running Caliptra FMC ...
5,414,230 UART:
5,414,284 UART: [state] CFI Enabled
5,503,147 UART: [art] Extend RT PCRs Done
5,503,575 UART: [art] Lock RT PCRs Done
5,504,806 UART: [art] Populate DV Done
5,513,043 UART: [fht] FMC Alias Private Key: 7
5,514,067 UART: [art] Derive CDI
5,514,347 UART: [art] Store in in slot 0x4
5,599,978 UART: [art] Derive Key Pair
5,600,338 UART: [art] Store priv key in slot 0x5
5,613,454 UART: [art] Derive Key Pair - Done
5,628,159 UART: [art] Signing Cert with AUTHO
5,628,639 UART: RITY.KEYID = 7
5,644,151 UART: [art] Erasing AUTHORITY.KEYID = 7
5,644,916 UART: [art] PUB.X = 110D5874FF84CF2A4E8EE2ABBD22C57E3D1E41F91186DF3728F93E7FA20F25146FBFBE123ED128BF5D21562F91411512
5,651,690 UART: [art] PUB.Y = 491A0650136810ABF03CEE498A63368736AA7CDEE1C4A3E00D8DD80E5930942D84E930334102101665B4747DE8F2D39D
5,658,624 UART: [art] SIG.R = 4D468FC324D36C2B59BDFFE32199659182CBB2916E4FC58B50ED831B21069A9FF8A3FFA532B09AF91C60C924B229968A
5,665,399 UART: [art] SIG.S = 4573D289CCCCAE35D97C53DE121A9181AD0A20A7A44061EC7E76ABA186F06773D778C753760E3DE017BBCC47FA750D15
5,689,555 UART: mbox::rt_entry...
5,689,927 UART: ____ _ _ _ ____ _____
5,690,711 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,691,511 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,692,279 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,693,047 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,693,815 UART: |_|
5,694,127 UART:
5,980,025 UART: [rt] Runtime listening for mailbox commands...
5,981,215 >>> mbox cmd response data (48 bytes)
5,981,216 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,983,999 >>> mbox cmd response data (48 bytes)
5,984,000 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,996,938 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,732 ready_for_fw is high
1,055,732 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,153 >>> mbox cmd response: success
2,685,905 UART:
2,685,921 UART: Running Caliptra FMC ...
2,686,329 UART:
2,686,383 UART: [state] CFI Enabled
2,696,688 UART: [fht] FMC Alias Private Key: 7
2,804,487 UART: [art] Extend RT PCRs Done
2,804,915 UART: [art] Lock RT PCRs Done
2,806,481 UART: [art] Populate DV Done
2,814,638 UART: [fht] FMC Alias Private Key: 7
2,815,576 UART: [art] Derive CDI
2,815,856 UART: [art] Store in in slot 0x4
2,901,667 UART: [art] Derive Key Pair
2,902,027 UART: [art] Store priv key in slot 0x5
2,914,741 UART: [art] Derive Key Pair - Done
2,929,279 UART: [art] Signing Cert with AUTHO
2,929,759 UART: RITY.KEYID = 7
2,945,367 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,132 UART: [art] PUB.X = B6D8FB2F39A473CDC8D69E749AA5F2048E745481A92FDFAB1E9619FCD9372D274A472CCEF021669EF38245A313CA1638
2,952,909 UART: [art] PUB.Y = 2CCF7957E4E3584848577458F3A7138D0318207161BF377ABBC2A562A21396CFEEAE281CF66D741B0E84C7CE635890A1
2,959,853 UART: [art] SIG.R = 590E65F63DB65B25819485831E82E94011A3B88E061F016889F56286E9A981EB41AAD032BFAD2A4036495ED8DD262216
2,966,608 UART: [art] SIG.S = A7F0E77BCEA9444C5C36D9281BCAF62800E47F13CD1F295E76EFEF7D659D34D7D7F0BD675DC7A3F7E7676CEABBB3B94F
2,989,715 UART: Caliptra RT
2,989,968 UART: [state] CFI Enabled
3,097,459 UART: [rt] RT listening for mailbox commands...
3,098,129 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,575 UART: [rt]cmd =0x41545348, len=116
3,130,220 >>> mbox cmd response data (12 bytes)
3,130,221 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,102,262 >>> mbox cmd response: success
5,102,262 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,115,500 UART:
5,115,516 UART: Running Caliptra FMC ...
5,115,924 UART:
5,115,978 UART: [state] CFI Enabled
5,204,743 UART: [art] Extend RT PCRs Done
5,205,171 UART: [art] Lock RT PCRs Done
5,206,480 UART: [art] Populate DV Done
5,214,627 UART: [fht] FMC Alias Private Key: 7
5,215,797 UART: [art] Derive CDI
5,216,077 UART: [art] Store in in slot 0x4
5,301,620 UART: [art] Derive Key Pair
5,301,980 UART: [art] Store priv key in slot 0x5
5,314,878 UART: [art] Derive Key Pair - Done
5,329,749 UART: [art] Signing Cert with AUTHO
5,330,229 UART: RITY.KEYID = 7
5,345,481 UART: [art] Erasing AUTHORITY.KEYID = 7
5,346,246 UART: [art] PUB.X = AE83D400417457DD7F9E2C03205D0AEEFE37425A67F91B21655D0FAF534A84D87482B64E2E29B7B458F4F4647DFB2C2A
5,352,993 UART: [art] PUB.Y = BA09D0DF9CBFC0543828A68382CAAE80A7D252653B93D1CEA30C9E3FCF8B24333CEED66BEA0440E413279349D5151BA3
5,359,948 UART: [art] SIG.R = 804493718DA3A42224D23D37B0919864779916BF7EDC682E18EE780C16E19ACDBD40796995442CCFE7E17E9AF509B565
5,366,710 UART: [art] SIG.S = 389E72A7569FE41F049839C44BEFCC683AC9B23A7ABFA2DFA3F2379FC905989D036BDA2711612F8BA89471A54BE3C44F
5,390,384 UART: mbox::rt_entry...
5,390,756 UART: ____ _ _ _ ____ _____
5,391,540 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,392,340 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,393,108 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,393,876 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,394,644 UART: |_|
5,394,956 UART:
5,674,672 UART: [rt] Runtime listening for mailbox commands...
5,675,862 >>> mbox cmd response data (48 bytes)
5,675,863 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,678,646 >>> mbox cmd response data (48 bytes)
5,678,647 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,691,585 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,654 UART: [kat] ++
895,806 UART: [kat] sha1
900,106 UART: [kat] SHA2-256
902,046 UART: [kat] SHA2-384
904,893 UART: [kat] SHA2-512-ACC
906,794 UART: [kat] ECC-384
916,363 UART: [kat] HMAC-384Kdf
920,807 UART: [kat] LMS
1,169,119 UART: [kat] --
1,170,020 UART: [cold-reset] ++
1,170,530 UART: [fht] FHT @ 0x50003400
1,173,160 UART: [idev] ++
1,173,328 UART: [idev] CDI.KEYID = 6
1,173,689 UART: [idev] SUBJECT.KEYID = 7
1,174,114 UART: [idev] UDS.KEYID = 0
1,174,460 ready_for_fw is high
1,174,460 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,986 UART: [idev] Erasing UDS.KEYID = 0
1,199,072 UART: [idev] Sha1 KeyId Algorithm
1,207,744 UART: [idev] --
1,208,817 UART: [ldev] ++
1,208,985 UART: [ldev] CDI.KEYID = 6
1,209,349 UART: [ldev] SUBJECT.KEYID = 5
1,209,776 UART: [ldev] AUTHORITY.KEYID = 7
1,210,239 UART: [ldev] FE.KEYID = 1
1,215,421 UART: [ldev] Erasing FE.KEYID = 1
1,241,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,763 UART: [ldev] --
1,281,119 UART: [fwproc] Wait for Commands...
1,281,922 UART: [fwproc] Recv command 0x46574c44
1,282,655 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,275 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,584 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,422 >>> mbox cmd response: success
2,772,675 UART: [afmc] ++
2,772,843 UART: [afmc] CDI.KEYID = 6
2,773,206 UART: [afmc] SUBJECT.KEYID = 7
2,773,632 UART: [afmc] AUTHORITY.KEYID = 5
2,809,475 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,086 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,815 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,698 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,417 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,152 UART: [afmc] --
2,853,160 UART: [cold-reset] --
2,853,796 UART: [state] Locking Datavault
2,854,773 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,377 UART: [state] Locking ICCM
2,856,017 UART: [exit] Launching FMC @ 0x40000130
2,861,346 UART:
2,861,362 UART: Running Caliptra FMC ...
2,861,770 UART:
2,861,913 UART: [state] CFI Enabled
2,872,776 UART: [fht] FMC Alias Private Key: 7
2,980,177 UART: [art] Extend RT PCRs Done
2,980,605 UART: [art] Lock RT PCRs Done
2,982,227 UART: [art] Populate DV Done
2,990,530 UART: [fht] FMC Alias Private Key: 7
2,991,568 UART: [art] Derive CDI
2,991,848 UART: [art] Store in in slot 0x4
3,077,265 UART: [art] Derive Key Pair
3,077,625 UART: [art] Store priv key in slot 0x5
3,090,553 UART: [art] Derive Key Pair - Done
3,104,980 UART: [art] Signing Cert with AUTHO
3,105,460 UART: RITY.KEYID = 7
3,120,698 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,463 UART: [art] PUB.X = 90680DF7649754166076490C7789A2E12D41791FCB7B01C0BA81EBB8B011A9755913177A17DABC8E099D0D1E4CAFEEB0
3,128,222 UART: [art] PUB.Y = F6923B809410DDACF987D13CE538AE61C08F1A3D3E6174A05E64AA1E9335816A30664FD6869BF98779A16177FEF1087E
3,135,171 UART: [art] SIG.R = 148143498DEEB8962585378964B82DAABD2C412C2C2FD0CE17A469C26F081F1A5A46B5FAAB3CA070997792BF3FCB7651
3,141,946 UART: [art] SIG.S = 70C76D0D542ED740287D3FD4B117B3481AEF0C5B8624BD800C1148F556C44A2DA525C8AB4941F01F2E26A24D1C1EE57E
3,166,196 UART: Caliptra RT
3,166,541 UART: [state] CFI Enabled
3,274,422 UART: [rt] RT listening for mailbox commands...
3,275,092 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,542 UART: [rt]cmd =0x41545348, len=116
3,307,109 >>> mbox cmd response data (12 bytes)
3,307,110 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,807 UART:
3,307,823 UART: Running Caliptra ROM ...
3,308,231 UART:
3,308,373 UART: [state] CFI Enabled
3,311,133 UART: [state] LifecycleState = Unprovisioned
3,311,788 UART: [state] DebugLocked = No
3,312,370 UART: [state] WD Timer not started. Device not locked for debugging
3,313,662 UART: [kat] SHA2-256
4,117,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,121,341 UART: [kat] ++
4,121,493 UART: [kat] sha1
4,125,753 UART: [kat] SHA2-256
4,127,693 UART: [kat] SHA2-384
4,130,388 UART: [kat] SHA2-512-ACC
4,132,288 UART: [kat] ECC-384
4,142,353 UART: [kat] HMAC-384Kdf
4,146,817 UART: [kat] LMS
4,395,129 UART: [kat] --
4,396,125 UART: [update-reset] ++
5,299,316 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,300,391 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,396,773 >>> mbox cmd response: success
5,396,773 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,397,042 UART: [update-reset] Copying MAN_2 To MAN_1
5,405,056 UART: [update-reset Success] --
5,406,021 UART: [state] Locking Datavault
5,406,901 UART: [state] Locking PCR0, PCR1 and PCR31
5,407,505 UART: [state] Locking ICCM
5,408,015 UART: [exit] Launching FMC @ 0x40000130
5,413,344 UART:
5,413,360 UART: Running Caliptra FMC ...
5,413,768 UART:
5,413,911 UART: [state] CFI Enabled
5,503,210 UART: [art] Extend RT PCRs Done
5,503,638 UART: [art] Lock RT PCRs Done
5,504,785 UART: [art] Populate DV Done
5,513,116 UART: [fht] FMC Alias Private Key: 7
5,514,070 UART: [art] Derive CDI
5,514,350 UART: [art] Store in in slot 0x4
5,600,261 UART: [art] Derive Key Pair
5,600,621 UART: [art] Store priv key in slot 0x5
5,613,527 UART: [art] Derive Key Pair - Done
5,628,145 UART: [art] Signing Cert with AUTHO
5,628,625 UART: RITY.KEYID = 7
5,643,843 UART: [art] Erasing AUTHORITY.KEYID = 7
5,644,608 UART: [art] PUB.X = CB64AC64885E9E7E4068B034FABC70E31A0B74F3983A0526A4792842C0648ACC8FFDCF927935BE32F9CBF11439F9C4A5
5,651,382 UART: [art] PUB.Y = 56AF9DDBB52FED49B209A24D209811FFF18015B9BBA30CEC524BD106121348B78F36F7199706921426B0C17A4081E743
5,658,320 UART: [art] SIG.R = 99F39DC2255787AED2BBD5C5335086BDC6FC5D0DEEE8A33DEB909C8608F936E94A0787E121F02BC7888D2871F0481879
5,665,087 UART: [art] SIG.S = 592A0979E3679E2C055DB738BA0AA7F022A6695FFFA9190EA91AF53700EF64CB0ECF4E6BCA97491A6CF2D38F56DBD40B
5,688,718 UART: mbox::rt_entry...
5,689,090 UART: ____ _ _ _ ____ _____
5,689,874 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,690,674 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,691,442 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,692,210 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,692,978 UART: |_|
5,693,290 UART:
5,975,170 UART: [rt] Runtime listening for mailbox commands...
5,976,360 >>> mbox cmd response data (48 bytes)
5,976,361 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,979,144 >>> mbox cmd response data (48 bytes)
5,979,145 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,992,083 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,137 ready_for_fw is high
1,056,137 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,084 >>> mbox cmd response: success
2,684,470 UART:
2,684,486 UART: Running Caliptra FMC ...
2,684,894 UART:
2,685,037 UART: [state] CFI Enabled
2,696,100 UART: [fht] FMC Alias Private Key: 7
2,803,731 UART: [art] Extend RT PCRs Done
2,804,159 UART: [art] Lock RT PCRs Done
2,805,653 UART: [art] Populate DV Done
2,813,736 UART: [fht] FMC Alias Private Key: 7
2,814,840 UART: [art] Derive CDI
2,815,120 UART: [art] Store in in slot 0x4
2,900,453 UART: [art] Derive Key Pair
2,900,813 UART: [art] Store priv key in slot 0x5
2,913,725 UART: [art] Derive Key Pair - Done
2,928,548 UART: [art] Signing Cert with AUTHO
2,929,028 UART: RITY.KEYID = 7
2,944,054 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,819 UART: [art] PUB.X = B6728DE59BF62CA56B7D088522127051D6438FBE415F9B2EB77BB8B630905FD2238CD30A159650AD2434C7DACE9DE29B
2,951,591 UART: [art] PUB.Y = 0569C69F6F040FC97EB2C6A4E8F3D6A751B821E5F83E317BED99ECA8063FEE7258A80E4BAF7BFCA473387CBAFBE70D21
2,958,545 UART: [art] SIG.R = 096E8CBFE608B6EDED5007BEA44967C588591AD0D267898A506E6AFC4856B0A8F8BEEAD1E1202489D9447209017ABEFA
2,965,312 UART: [art] SIG.S = 89BEEC304B71CB6B9D9266D9085782F647F2A8F1EAE8D05431A467ED4ABA1791D648F1A3B6CD3805CEC1AB48284C3B52
2,989,211 UART: Caliptra RT
2,989,556 UART: [state] CFI Enabled
3,096,997 UART: [rt] RT listening for mailbox commands...
3,097,667 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,155 UART: [rt]cmd =0x41545348, len=116
3,129,974 >>> mbox cmd response data (12 bytes)
3,129,975 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,102,289 >>> mbox cmd response: success
5,102,289 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,115,729 UART:
5,115,745 UART: Running Caliptra FMC ...
5,116,153 UART:
5,116,296 UART: [state] CFI Enabled
5,205,193 UART: [art] Extend RT PCRs Done
5,205,621 UART: [art] Lock RT PCRs Done
5,206,724 UART: [art] Populate DV Done
5,214,731 UART: [fht] FMC Alias Private Key: 7
5,215,715 UART: [art] Derive CDI
5,215,995 UART: [art] Store in in slot 0x4
5,301,610 UART: [art] Derive Key Pair
5,301,970 UART: [art] Store priv key in slot 0x5
5,315,190 UART: [art] Derive Key Pair - Done
5,329,991 UART: [art] Signing Cert with AUTHO
5,330,471 UART: RITY.KEYID = 7
5,345,421 UART: [art] Erasing AUTHORITY.KEYID = 7
5,346,186 UART: [art] PUB.X = 5266377F9E9F6E2546D2FBCD3FF52D885039FA111EAF1A8DED2EDA3E2F7E40F8E5FB69CDDCB3812D57FAF7C96CE68C6C
5,352,984 UART: [art] PUB.Y = 003D0577B1CF651C414732D673DBC4EF18EDCAC336F17F69974A7F954EDDDF07D8F2D9AD9E0E9307062F0976CE162CBB
5,359,908 UART: [art] SIG.R = 149573FEBD5C40A2AC2EA3DA28AF20E049F0959FD8B2DB72C409176E5FC7619CFD4911F694B9CFD47CA5B1ED71A48F9A
5,366,695 UART: [art] SIG.S = 805D694A68DC67E33CB220297DC9D25BADA033AA04FFFE1481535A4929C1DE6CA38A2FE6887E4A3E24FC5483BD71AAD1
5,390,689 UART: mbox::rt_entry...
5,391,061 UART: ____ _ _ _ ____ _____
5,391,845 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,392,645 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,393,413 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,394,181 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,394,949 UART: |_|
5,395,261 UART:
5,677,283 UART: [rt] Runtime listening for mailbox commands...
5,678,473 >>> mbox cmd response data (48 bytes)
5,678,474 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,681,257 >>> mbox cmd response data (48 bytes)
5,681,258 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,694,196 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,081 UART: [kat] SHA2-256
882,012 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,127 UART: [kat] ++
886,279 UART: [kat] sha1
890,497 UART: [kat] SHA2-256
892,435 UART: [kat] SHA2-384
895,066 UART: [kat] SHA2-512-ACC
896,967 UART: [kat] ECC-384
902,592 UART: [kat] HMAC-384Kdf
907,406 UART: [kat] LMS
1,475,602 UART: [kat] --
1,476,411 UART: [cold-reset] ++
1,476,833 UART: [fht] Storing FHT @ 0x50003400
1,479,624 UART: [idev] ++
1,479,792 UART: [idev] CDI.KEYID = 6
1,480,152 UART: [idev] SUBJECT.KEYID = 7
1,480,576 UART: [idev] UDS.KEYID = 0
1,480,921 ready_for_fw is high
1,480,921 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,774 UART: [idev] Erasing UDS.KEYID = 0
1,505,958 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,776 UART: [idev] --
1,516,003 UART: [ldev] ++
1,516,171 UART: [ldev] CDI.KEYID = 6
1,516,534 UART: [ldev] SUBJECT.KEYID = 5
1,516,960 UART: [ldev] AUTHORITY.KEYID = 7
1,517,423 UART: [ldev] FE.KEYID = 1
1,522,683 UART: [ldev] Erasing FE.KEYID = 1
1,547,970 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,664 UART: [ldev] --
1,587,111 UART: [fwproc] Waiting for Commands...
1,587,824 UART: [fwproc] Received command 0x46574c44
1,588,615 UART: [fwproc] Received Image of size 114332 bytes
2,886,091 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,275 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,627 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,396 >>> mbox cmd response: success
3,079,446 UART: [afmc] ++
3,079,614 UART: [afmc] CDI.KEYID = 6
3,079,976 UART: [afmc] SUBJECT.KEYID = 7
3,080,401 UART: [afmc] AUTHORITY.KEYID = 5
3,116,224 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,618 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,398 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,126 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,011 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,701 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,648 UART: [afmc] --
3,159,558 UART: [cold-reset] --
3,160,278 UART: [state] Locking Datavault
3,161,853 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,457 UART: [state] Locking ICCM
3,162,913 UART: [exit] Launching FMC @ 0x40000130
3,168,242 UART:
3,168,258 UART: Running Caliptra FMC ...
3,168,666 UART:
3,168,720 UART: [state] CFI Enabled
3,179,151 UART: [fht] FMC Alias Private Key: 7
3,286,646 UART: [art] Extend RT PCRs Done
3,287,074 UART: [art] Lock RT PCRs Done
3,288,682 UART: [art] Populate DV Done
3,297,075 UART: [fht] FMC Alias Private Key: 7
3,298,007 UART: [art] Derive CDI
3,298,287 UART: [art] Store in in slot 0x4
3,384,154 UART: [art] Derive Key Pair
3,384,514 UART: [art] Store priv key in slot 0x5
3,397,558 UART: [art] Derive Key Pair - Done
3,412,552 UART: [art] Signing Cert with AUTHO
3,413,032 UART: RITY.KEYID = 7
3,428,226 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,991 UART: [art] PUB.X = 64711CDCDFFE8D0A4E40D955A5B6124C45E5D81E87BCCEB18D96359B12EC2AEF97A71BFB9320B2ACAB7C733CD9E2D85B
3,435,784 UART: [art] PUB.Y = C8440C5828276B20018540F739BA3587C3AF6D8519ECF03416470C2560C7BFD7DAEE884F5F0309E8B07C17944D6C6357
3,442,715 UART: [art] SIG.R = 05ADFC5A9555CBE9C37AACAF49130F910DFAC9768C3F6DACB693467851C851EE9DCDFB22B604EB152C92AC47120EC32B
3,449,492 UART: [art] SIG.S = DA751D005D94ADAED98672055E4F2420FE97065E6C6F6CB0FA8B7C6218D49F54534C4D7DFE2FC783E7FE0B7E11474980
3,472,858 UART: Caliptra RT
3,473,111 UART: [state] CFI Enabled
3,582,266 UART: [rt] RT listening for mailbox commands...
3,582,936 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,006 UART: [rt]cmd =0x41544d4e, len=14344
4,016,007 >>> mbox cmd response data (8 bytes)
4,016,008 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,405 UART: [rt]cmd =0x41545348, len=116
4,048,119 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,029 ready_for_fw is high
1,362,029 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,858 >>> mbox cmd response: success
2,988,852 UART:
2,988,868 UART: Running Caliptra FMC ...
2,989,276 UART:
2,989,330 UART: [state] CFI Enabled
3,000,427 UART: [fht] FMC Alias Private Key: 7
3,108,412 UART: [art] Extend RT PCRs Done
3,108,840 UART: [art] Lock RT PCRs Done
3,110,272 UART: [art] Populate DV Done
3,118,709 UART: [fht] FMC Alias Private Key: 7
3,119,645 UART: [art] Derive CDI
3,119,925 UART: [art] Store in in slot 0x4
3,205,980 UART: [art] Derive Key Pair
3,206,340 UART: [art] Store priv key in slot 0x5
3,219,306 UART: [art] Derive Key Pair - Done
3,234,296 UART: [art] Signing Cert with AUTHO
3,234,776 UART: RITY.KEYID = 7
3,250,186 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,951 UART: [art] PUB.X = 0091F660834990C7E973FF376E860124449E323FE223BCB1F78EBF9B7937182EEFFF28548CCF64574B912F0AD92A4EBD
3,257,697 UART: [art] PUB.Y = B3D4D052693E98BB53E0B915557A16750F3302782C913A7AA09706ECBCB33E2FE24A010E11253FD93CE6E7BBB71BF646
3,264,638 UART: [art] SIG.R = B58FFCE2DE80FCE74759A71A413E9CCB524C4EF395342E199B4B654E27027B7EE90B72BEE16BBB5C53FE55743B3CF7E4
3,271,420 UART: [art] SIG.S = 7254F9559AC52341F2B53917294BC923E594A63BDFFC9574CD84CA25C17ACCC3C9825763E6105733A9F47CE14686E2E0
3,295,493 UART: Caliptra RT
3,295,746 UART: [state] CFI Enabled
3,403,791 UART: [rt] RT listening for mailbox commands...
3,404,461 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,565 UART: [rt]cmd =0x41544d4e, len=14344
3,837,514 >>> mbox cmd response data (8 bytes)
3,837,515 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,638 UART: [rt]cmd =0x41545348, len=116
3,869,304 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,906 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,384 UART: [kat] SHA2-256
882,315 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,430 UART: [kat] ++
886,582 UART: [kat] sha1
890,772 UART: [kat] SHA2-256
892,710 UART: [kat] SHA2-384
895,527 UART: [kat] SHA2-512-ACC
897,428 UART: [kat] ECC-384
902,899 UART: [kat] HMAC-384Kdf
907,765 UART: [kat] LMS
1,475,961 UART: [kat] --
1,476,836 UART: [cold-reset] ++
1,477,402 UART: [fht] Storing FHT @ 0x50003400
1,480,275 UART: [idev] ++
1,480,443 UART: [idev] CDI.KEYID = 6
1,480,803 UART: [idev] SUBJECT.KEYID = 7
1,481,227 UART: [idev] UDS.KEYID = 0
1,481,572 ready_for_fw is high
1,481,572 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,433 UART: [idev] Erasing UDS.KEYID = 0
1,506,681 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,345 UART: [idev] --
1,516,524 UART: [ldev] ++
1,516,692 UART: [ldev] CDI.KEYID = 6
1,517,055 UART: [ldev] SUBJECT.KEYID = 5
1,517,481 UART: [ldev] AUTHORITY.KEYID = 7
1,517,944 UART: [ldev] FE.KEYID = 1
1,523,358 UART: [ldev] Erasing FE.KEYID = 1
1,549,395 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,523 UART: [ldev] --
1,588,970 UART: [fwproc] Waiting for Commands...
1,589,633 UART: [fwproc] Received command 0x46574c44
1,590,424 UART: [fwproc] Received Image of size 114332 bytes
2,888,264 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,698 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,050 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,977 >>> mbox cmd response: success
3,082,035 UART: [afmc] ++
3,082,203 UART: [afmc] CDI.KEYID = 6
3,082,565 UART: [afmc] SUBJECT.KEYID = 7
3,082,990 UART: [afmc] AUTHORITY.KEYID = 5
3,118,659 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,651 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,431 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,159 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,044 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,734 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,651 UART: [afmc] --
3,161,659 UART: [cold-reset] --
3,162,587 UART: [state] Locking Datavault
3,163,712 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,316 UART: [state] Locking ICCM
3,164,894 UART: [exit] Launching FMC @ 0x40000130
3,170,223 UART:
3,170,239 UART: Running Caliptra FMC ...
3,170,647 UART:
3,170,790 UART: [state] CFI Enabled
3,181,181 UART: [fht] FMC Alias Private Key: 7
3,288,832 UART: [art] Extend RT PCRs Done
3,289,260 UART: [art] Lock RT PCRs Done
3,290,640 UART: [art] Populate DV Done
3,299,027 UART: [fht] FMC Alias Private Key: 7
3,299,971 UART: [art] Derive CDI
3,300,251 UART: [art] Store in in slot 0x4
3,386,092 UART: [art] Derive Key Pair
3,386,452 UART: [art] Store priv key in slot 0x5
3,399,432 UART: [art] Derive Key Pair - Done
3,414,191 UART: [art] Signing Cert with AUTHO
3,414,671 UART: RITY.KEYID = 7
3,429,677 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,442 UART: [art] PUB.X = D6C98F8ACC9E14515079D38D3C646D7D60751938DC1B1360EA32119C1F4B972FBBB2F77D0F851650120370525EC38A86
3,437,204 UART: [art] PUB.Y = D259324485D7E4B5BC820ABC2F954AFF123AF7BB4DC3D3425F858FD7E91E5550FF3A0494AF756E37B84038800FCEB9CA
3,444,159 UART: [art] SIG.R = 1BAA6B487B5BDC3A26F1829CE1C9F5A166B26BB2799DDEA280834E9CD62F43AF23A388A2CAFEFD273BEACDEFFFAF0AF1
3,450,962 UART: [art] SIG.S = ED68BC36D78F29729D466A57F4F6CB4F37A7AE594F8470B698EDDD08012EC9D3DC986CED66B9D692188F381A5AA3D9C5
3,473,953 UART: Caliptra RT
3,474,298 UART: [state] CFI Enabled
3,581,841 UART: [rt] RT listening for mailbox commands...
3,582,511 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,533 UART: [rt]cmd =0x41544d4e, len=14344
4,015,986 >>> mbox cmd response data (8 bytes)
4,015,987 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,048 UART: [rt]cmd =0x41545348, len=116
4,047,814 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,880 ready_for_fw is high
1,362,880 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,647 >>> mbox cmd response: success
2,990,705 UART:
2,990,721 UART: Running Caliptra FMC ...
2,991,129 UART:
2,991,272 UART: [state] CFI Enabled
3,001,633 UART: [fht] FMC Alias Private Key: 7
3,109,790 UART: [art] Extend RT PCRs Done
3,110,218 UART: [art] Lock RT PCRs Done
3,111,498 UART: [art] Populate DV Done
3,119,763 UART: [fht] FMC Alias Private Key: 7
3,120,763 UART: [art] Derive CDI
3,121,043 UART: [art] Store in in slot 0x4
3,206,562 UART: [art] Derive Key Pair
3,206,922 UART: [art] Store priv key in slot 0x5
3,220,168 UART: [art] Derive Key Pair - Done
3,235,085 UART: [art] Signing Cert with AUTHO
3,235,565 UART: RITY.KEYID = 7
3,251,145 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,910 UART: [art] PUB.X = 2A101189EEB01CFC0F6362956B0F7B2984B072906A1F16A1C4C6152062FF7CFD7F7CFCD20FA7B678844BFEFE812993B6
3,258,681 UART: [art] PUB.Y = F7045C1F28B7A4764F141B7D45158BEEE4C72BAEBCC8B202D7516D234027C2A68C07518E6787939D6B3F3A41CEC6AB69
3,265,630 UART: [art] SIG.R = 169C614D1F148DDCFE7EAF1B1FFA6D3DCB9F39E2994E9C2AD782D21C17899847629CA3A377609C334AB7359DC8204711
3,272,408 UART: [art] SIG.S = 97156197935BE81B1C9FCD5E00CFD11F5C579CD558FFB62601D6B3A43840180D973AA9A10EF28095FE432F08747ED8A5
3,295,875 UART: Caliptra RT
3,296,220 UART: [state] CFI Enabled
3,404,587 UART: [rt] RT listening for mailbox commands...
3,405,257 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,357 UART: [rt]cmd =0x41544d4e, len=14344
3,837,732 >>> mbox cmd response data (8 bytes)
3,837,733 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,830 UART: [rt]cmd =0x41545348, len=116
3,869,584 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
893,338 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,463 UART: [kat] ++
897,615 UART: [kat] sha1
901,865 UART: [kat] SHA2-256
903,805 UART: [kat] SHA2-384
906,642 UART: [kat] SHA2-512-ACC
908,543 UART: [kat] ECC-384
918,276 UART: [kat] HMAC-384Kdf
922,758 UART: [kat] LMS
1,171,086 UART: [kat] --
1,171,833 UART: [cold-reset] ++
1,172,395 UART: [fht] FHT @ 0x50003400
1,174,980 UART: [idev] ++
1,175,148 UART: [idev] CDI.KEYID = 6
1,175,508 UART: [idev] SUBJECT.KEYID = 7
1,175,932 UART: [idev] UDS.KEYID = 0
1,176,277 ready_for_fw is high
1,176,277 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,228 UART: [idev] Erasing UDS.KEYID = 0
1,200,717 UART: [idev] Sha1 KeyId Algorithm
1,209,325 UART: [idev] --
1,210,447 UART: [ldev] ++
1,210,615 UART: [ldev] CDI.KEYID = 6
1,210,978 UART: [ldev] SUBJECT.KEYID = 5
1,211,404 UART: [ldev] AUTHORITY.KEYID = 7
1,211,867 UART: [ldev] FE.KEYID = 1
1,217,263 UART: [ldev] Erasing FE.KEYID = 1
1,243,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,579 UART: [ldev] --
1,282,900 UART: [fwproc] Wait for Commands...
1,283,516 UART: [fwproc] Recv command 0x46574c44
1,284,244 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,160 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,464 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,263 >>> mbox cmd response: success
2,774,463 UART: [afmc] ++
2,774,631 UART: [afmc] CDI.KEYID = 6
2,774,993 UART: [afmc] SUBJECT.KEYID = 7
2,775,418 UART: [afmc] AUTHORITY.KEYID = 5
2,810,903 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,352 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,100 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,828 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,713 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,432 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,386 UART: [afmc] --
2,854,514 UART: [cold-reset] --
2,855,242 UART: [state] Locking Datavault
2,856,419 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,023 UART: [state] Locking ICCM
2,857,517 UART: [exit] Launching FMC @ 0x40000130
2,862,846 UART:
2,862,862 UART: Running Caliptra FMC ...
2,863,270 UART:
2,863,324 UART: [state] CFI Enabled
2,873,753 UART: [fht] FMC Alias Private Key: 7
2,982,266 UART: [art] Extend RT PCRs Done
2,982,694 UART: [art] Lock RT PCRs Done
2,984,300 UART: [art] Populate DV Done
2,992,535 UART: [fht] FMC Alias Private Key: 7
2,993,559 UART: [art] Derive CDI
2,993,839 UART: [art] Store in in slot 0x4
3,079,648 UART: [art] Derive Key Pair
3,080,008 UART: [art] Store priv key in slot 0x5
3,093,236 UART: [art] Derive Key Pair - Done
3,108,034 UART: [art] Signing Cert with AUTHO
3,108,514 UART: RITY.KEYID = 7
3,123,346 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,111 UART: [art] PUB.X = 820D9CA61F0DB042B8F6DB9FC6C59082FED85D05A0D9B38AC7A5EB4E449F0C36137356A0D22CC86191F6F1925E665C5D
3,130,881 UART: [art] PUB.Y = A44BE831F23F5FC0EB8EE1DED7A062E6AAEC8153984CDD38E5FBC9E4F1C27A61024AF8A30CB73F2AF9CACCB036604EC6
3,137,855 UART: [art] SIG.R = 5E64297688CFF00AE8D5958C1646447974AAFADA9526F9741B653FB48E401E2BDF6A0702A1717CDB36B23F041D2F3BA7
3,144,619 UART: [art] SIG.S = D2FD5E3A8B26CFF1A56AA5D1668B3E701B36FAD8B2F0A95EEC8B0EFA0D7A4A1390AD53D311B37D404D5ABF16837BCB8E
3,168,478 UART: Caliptra RT
3,168,731 UART: [state] CFI Enabled
3,276,584 UART: [rt] RT listening for mailbox commands...
3,277,254 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,320 UART: [rt]cmd =0x41544d4e, len=14344
3,709,619 >>> mbox cmd response data (8 bytes)
3,709,620 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,913 UART: [rt]cmd =0x41545348, len=116
3,741,627 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,833 ready_for_fw is high
1,060,833 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,696 >>> mbox cmd response: success
2,688,532 UART:
2,688,548 UART: Running Caliptra FMC ...
2,688,956 UART:
2,689,010 UART: [state] CFI Enabled
2,699,247 UART: [fht] FMC Alias Private Key: 7
2,807,218 UART: [art] Extend RT PCRs Done
2,807,646 UART: [art] Lock RT PCRs Done
2,809,122 UART: [art] Populate DV Done
2,817,477 UART: [fht] FMC Alias Private Key: 7
2,818,623 UART: [art] Derive CDI
2,818,903 UART: [art] Store in in slot 0x4
2,904,766 UART: [art] Derive Key Pair
2,905,126 UART: [art] Store priv key in slot 0x5
2,917,892 UART: [art] Derive Key Pair - Done
2,932,767 UART: [art] Signing Cert with AUTHO
2,933,247 UART: RITY.KEYID = 7
2,948,359 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,124 UART: [art] PUB.X = AE74D456D9FB852BA9ED2F7ADC83B0326291CB97C3C3C8100987165C7007F2EC89635716C6304185E65917A89A5386FA
2,955,886 UART: [art] PUB.Y = 5FA17AFD32356D51D99F99542C6E4D75901C5C76D1B7FACA54AF06A7E40251503E30FD80162E0364536569FA69FE35F8
2,962,829 UART: [art] SIG.R = C77287B1C56297067BF299A8F7F189469997D5C0DC76897E52344E35F85FC6452BBA0673578AEB2D4C2BB7FB866B5ACB
2,969,597 UART: [art] SIG.S = C61A718B002A532760E8932C34A454F7E41CCAB75C0975412E8CEC0D82EE2A76B2F8F59571B48AF0C3B5B8D6A41E1B6D
2,993,470 UART: Caliptra RT
2,993,723 UART: [state] CFI Enabled
3,100,939 UART: [rt] RT listening for mailbox commands...
3,101,609 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,655 UART: [rt]cmd =0x41544d4e, len=14344
3,534,804 >>> mbox cmd response data (8 bytes)
3,534,805 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,148 UART: [rt]cmd =0x41545348, len=116
3,567,086 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,771 UART: [kat] SHA2-256
893,421 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,546 UART: [kat] ++
897,698 UART: [kat] sha1
901,944 UART: [kat] SHA2-256
903,884 UART: [kat] SHA2-384
906,409 UART: [kat] SHA2-512-ACC
908,310 UART: [kat] ECC-384
918,389 UART: [kat] HMAC-384Kdf
922,829 UART: [kat] LMS
1,171,157 UART: [kat] --
1,172,246 UART: [cold-reset] ++
1,172,612 UART: [fht] FHT @ 0x50003400
1,175,355 UART: [idev] ++
1,175,523 UART: [idev] CDI.KEYID = 6
1,175,883 UART: [idev] SUBJECT.KEYID = 7
1,176,307 UART: [idev] UDS.KEYID = 0
1,176,652 ready_for_fw is high
1,176,652 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,219 UART: [idev] Erasing UDS.KEYID = 0
1,201,750 UART: [idev] Sha1 KeyId Algorithm
1,210,246 UART: [idev] --
1,211,092 UART: [ldev] ++
1,211,260 UART: [ldev] CDI.KEYID = 6
1,211,623 UART: [ldev] SUBJECT.KEYID = 5
1,212,049 UART: [ldev] AUTHORITY.KEYID = 7
1,212,512 UART: [ldev] FE.KEYID = 1
1,217,758 UART: [ldev] Erasing FE.KEYID = 1
1,244,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,932 UART: [ldev] --
1,283,433 UART: [fwproc] Wait for Commands...
1,284,141 UART: [fwproc] Recv command 0x46574c44
1,284,869 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,311 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,615 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,326 >>> mbox cmd response: success
2,775,582 UART: [afmc] ++
2,775,750 UART: [afmc] CDI.KEYID = 6
2,776,112 UART: [afmc] SUBJECT.KEYID = 7
2,776,537 UART: [afmc] AUTHORITY.KEYID = 5
2,812,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,563 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,311 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,039 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,924 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,643 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,325 UART: [afmc] --
2,855,323 UART: [cold-reset] --
2,856,315 UART: [state] Locking Datavault
2,857,346 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,950 UART: [state] Locking ICCM
2,858,376 UART: [exit] Launching FMC @ 0x40000130
2,863,705 UART:
2,863,721 UART: Running Caliptra FMC ...
2,864,129 UART:
2,864,272 UART: [state] CFI Enabled
2,874,865 UART: [fht] FMC Alias Private Key: 7
2,982,868 UART: [art] Extend RT PCRs Done
2,983,296 UART: [art] Lock RT PCRs Done
2,984,926 UART: [art] Populate DV Done
2,992,997 UART: [fht] FMC Alias Private Key: 7
2,994,083 UART: [art] Derive CDI
2,994,363 UART: [art] Store in in slot 0x4
3,079,854 UART: [art] Derive Key Pair
3,080,214 UART: [art] Store priv key in slot 0x5
3,093,322 UART: [art] Derive Key Pair - Done
3,108,264 UART: [art] Signing Cert with AUTHO
3,108,744 UART: RITY.KEYID = 7
3,123,822 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,587 UART: [art] PUB.X = D6325827F83F9F525FF0DBDDAD97CEA6322D32B6D969FAF47EF63ECBF7DD0C874608D578613CC6A2AFED868742821E59
3,131,367 UART: [art] PUB.Y = A87249D9A625DD1B2F15F467649D81E0D23B2CD01807F06DA8C8968442BE56D0A064956D6BECBAFA23809E550FC65CDF
3,138,321 UART: [art] SIG.R = 025584862C004EFE82DB657858C9B7D9411A1855F8FC0561EE23432D3D46EC0760BE0DAB1231B3830E989A5DC8BC5A87
3,145,056 UART: [art] SIG.S = 4F34142561F1F12375D2D8EE339AAA77370E08F57EDF2A4CB3EA2501D9A0D85DE398F783B79209E9F6E47AE9A9728750
3,168,867 UART: Caliptra RT
3,169,212 UART: [state] CFI Enabled
3,277,467 UART: [rt] RT listening for mailbox commands...
3,278,137 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,371 UART: [rt]cmd =0x41544d4e, len=14344
3,711,970 >>> mbox cmd response data (8 bytes)
3,711,971 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,922 UART: [rt]cmd =0x41545348, len=116
3,743,758 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,468 ready_for_fw is high
1,060,468 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,239 >>> mbox cmd response: success
2,689,505 UART:
2,689,521 UART: Running Caliptra FMC ...
2,689,929 UART:
2,690,072 UART: [state] CFI Enabled
2,700,613 UART: [fht] FMC Alias Private Key: 7
2,808,742 UART: [art] Extend RT PCRs Done
2,809,170 UART: [art] Lock RT PCRs Done
2,810,576 UART: [art] Populate DV Done
2,818,621 UART: [fht] FMC Alias Private Key: 7
2,819,697 UART: [art] Derive CDI
2,819,977 UART: [art] Store in in slot 0x4
2,905,294 UART: [art] Derive Key Pair
2,905,654 UART: [art] Store priv key in slot 0x5
2,919,134 UART: [art] Derive Key Pair - Done
2,933,747 UART: [art] Signing Cert with AUTHO
2,934,227 UART: RITY.KEYID = 7
2,949,687 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,452 UART: [art] PUB.X = AFB6FC766DB451BFAF17FE70974CBF9EF9EE50AC8278F8E54049C0CBFBB5B07FA882608A63583A913D908D23D362C492
2,957,238 UART: [art] PUB.Y = 7FA35B636D03E85FE644F233294EB6D783359B45B62198A04E7A8423106FFD75D5537EB9C23A1599F45DA8F8C5F46897
2,964,183 UART: [art] SIG.R = D4986D652FF5D6D809C79FDDF5F8A45A19E0D16A449EE43C1516FDEE38D9EDB396512A377D09CC5D09BEBF1DB8C717BE
2,970,966 UART: [art] SIG.S = 0630E1257A3CCD9BB3C3ACB76C0B55AFCE420C0BF5E36FBDA4E3A91C3E957D43542F2F82EB20C9055EABD57C4DB5C8BE
2,995,070 UART: Caliptra RT
2,995,415 UART: [state] CFI Enabled
3,102,202 UART: [rt] RT listening for mailbox commands...
3,102,872 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,256 UART: [rt]cmd =0x41544d4e, len=14344
3,535,875 >>> mbox cmd response data (8 bytes)
3,535,876 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,566,167 UART: [rt]cmd =0x41545348, len=116
3,567,873 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,422 UART: [kat] SHA2-256
890,972 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,101 UART: [kat] ++
895,253 UART: [kat] sha1
899,413 UART: [kat] SHA2-256
901,353 UART: [kat] SHA2-384
904,048 UART: [kat] SHA2-512-ACC
905,949 UART: [kat] ECC-384
915,448 UART: [kat] HMAC-384Kdf
920,140 UART: [kat] LMS
1,168,452 UART: [kat] --
1,169,309 UART: [cold-reset] ++
1,169,811 UART: [fht] FHT @ 0x50003400
1,172,563 UART: [idev] ++
1,172,731 UART: [idev] CDI.KEYID = 6
1,173,092 UART: [idev] SUBJECT.KEYID = 7
1,173,517 UART: [idev] UDS.KEYID = 0
1,173,863 ready_for_fw is high
1,173,863 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,395 UART: [idev] Erasing UDS.KEYID = 0
1,198,459 UART: [idev] Sha1 KeyId Algorithm
1,207,431 UART: [idev] --
1,208,666 UART: [ldev] ++
1,208,834 UART: [ldev] CDI.KEYID = 6
1,209,198 UART: [ldev] SUBJECT.KEYID = 5
1,209,625 UART: [ldev] AUTHORITY.KEYID = 7
1,210,088 UART: [ldev] FE.KEYID = 1
1,215,410 UART: [ldev] Erasing FE.KEYID = 1
1,242,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,958 UART: [ldev] --
1,281,438 UART: [fwproc] Wait for Commands...
1,282,221 UART: [fwproc] Recv command 0x46574c44
1,282,954 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,876 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,185 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,133 >>> mbox cmd response: success
2,774,400 UART: [afmc] ++
2,774,568 UART: [afmc] CDI.KEYID = 6
2,774,931 UART: [afmc] SUBJECT.KEYID = 7
2,775,357 UART: [afmc] AUTHORITY.KEYID = 5
2,811,006 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,993 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,722 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,605 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,324 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,209 UART: [afmc] --
2,854,093 UART: [cold-reset] --
2,854,903 UART: [state] Locking Datavault
2,855,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,572 UART: [state] Locking ICCM
2,857,120 UART: [exit] Launching FMC @ 0x40000130
2,862,449 UART:
2,862,465 UART: Running Caliptra FMC ...
2,862,873 UART:
2,862,927 UART: [state] CFI Enabled
2,873,480 UART: [fht] FMC Alias Private Key: 7
2,981,757 UART: [art] Extend RT PCRs Done
2,982,185 UART: [art] Lock RT PCRs Done
2,983,637 UART: [art] Populate DV Done
2,991,816 UART: [fht] FMC Alias Private Key: 7
2,992,762 UART: [art] Derive CDI
2,993,042 UART: [art] Store in in slot 0x4
3,078,679 UART: [art] Derive Key Pair
3,079,039 UART: [art] Store priv key in slot 0x5
3,091,901 UART: [art] Derive Key Pair - Done
3,106,457 UART: [art] Signing Cert with AUTHO
3,106,937 UART: RITY.KEYID = 7
3,122,081 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,846 UART: [art] PUB.X = 455DAA002629FC1B078D6AFB88B99D9C1AF09CB14E84BF5DB5FFD38EC92ADE6BFE111B256D640A2D92807E363E6F66F1
3,129,608 UART: [art] PUB.Y = 094030EA9B7329E45943CAD1179F858D4AC092ED047E39816B254A2CFA54AF8502DA2281E997B5841ADF223D31BA435B
3,136,551 UART: [art] SIG.R = DA9DC65FB7CC4657369BE25191663430812C6E0E350F218DEB4E0D1741E7AC17F073206F851E825EF9DAD81B4209C14A
3,143,313 UART: [art] SIG.S = CE47A5970EE8C534ED729761399BE06057D84AE2A4E95C490F64DEDCF622577EA7BDBBF0FC3955E8ADEF5E4D5D191726
3,167,370 UART: Caliptra RT
3,167,623 UART: [state] CFI Enabled
3,275,133 UART: [rt] RT listening for mailbox commands...
3,275,803 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,659 UART: [rt]cmd =0x41544d4e, len=14344
3,708,056 >>> mbox cmd response data (8 bytes)
3,708,057 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,148 UART: [rt]cmd =0x41545348, len=116
3,739,882 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,550 ready_for_fw is high
1,055,550 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,635 >>> mbox cmd response: success
2,685,345 UART:
2,685,361 UART: Running Caliptra FMC ...
2,685,769 UART:
2,685,823 UART: [state] CFI Enabled
2,696,366 UART: [fht] FMC Alias Private Key: 7
2,804,081 UART: [art] Extend RT PCRs Done
2,804,509 UART: [art] Lock RT PCRs Done
2,806,151 UART: [art] Populate DV Done
2,814,442 UART: [fht] FMC Alias Private Key: 7
2,815,592 UART: [art] Derive CDI
2,815,872 UART: [art] Store in in slot 0x4
2,901,447 UART: [art] Derive Key Pair
2,901,807 UART: [art] Store priv key in slot 0x5
2,914,913 UART: [art] Derive Key Pair - Done
2,929,189 UART: [art] Signing Cert with AUTHO
2,929,669 UART: RITY.KEYID = 7
2,945,323 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,088 UART: [art] PUB.X = 02462A1656AEA59DEB7AE8DF197052D5749DA7E8C2FD249305599A1CC2CED00CA6DC682BB57ADA08DB29CC33C927327B
2,952,862 UART: [art] PUB.Y = F25DB314C1426D3D813A9AA3BECEE777189E022A76DD808002EAF241577B6E6294B2AD12BCE6141D74D50D171E733C3B
2,959,811 UART: [art] SIG.R = 69F8EA520FBF1A5977FD4058FC0A81F1213EEDFB002C6A5E2A702AE8401CE638ABC185D5C605C4ABFE6615C9B8CD586D
2,966,570 UART: [art] SIG.S = 400354E4EB24C1BB8535942B5DE81D3EEBE7FF568F6DE1695FECB424D73C5F5CBA8CCD1D54FCBCD2793AE993344F6574
2,990,796 UART: Caliptra RT
2,991,049 UART: [state] CFI Enabled
3,098,764 UART: [rt] RT listening for mailbox commands...
3,099,434 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,500 UART: [rt]cmd =0x41544d4e, len=14344
3,532,583 >>> mbox cmd response data (8 bytes)
3,532,584 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,507 UART: [rt]cmd =0x41545348, len=116
3,564,325 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,382 UART: [state] WD Timer not started. Device not locked for debugging
87,579 UART: [kat] SHA2-256
891,129 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,258 UART: [kat] ++
895,410 UART: [kat] sha1
899,580 UART: [kat] SHA2-256
901,520 UART: [kat] SHA2-384
904,199 UART: [kat] SHA2-512-ACC
906,100 UART: [kat] ECC-384
915,885 UART: [kat] HMAC-384Kdf
920,425 UART: [kat] LMS
1,168,737 UART: [kat] --
1,169,432 UART: [cold-reset] ++
1,169,946 UART: [fht] FHT @ 0x50003400
1,172,800 UART: [idev] ++
1,172,968 UART: [idev] CDI.KEYID = 6
1,173,329 UART: [idev] SUBJECT.KEYID = 7
1,173,754 UART: [idev] UDS.KEYID = 0
1,174,100 ready_for_fw is high
1,174,100 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,862 UART: [idev] Erasing UDS.KEYID = 0
1,198,906 UART: [idev] Sha1 KeyId Algorithm
1,207,614 UART: [idev] --
1,208,655 UART: [ldev] ++
1,208,823 UART: [ldev] CDI.KEYID = 6
1,209,187 UART: [ldev] SUBJECT.KEYID = 5
1,209,614 UART: [ldev] AUTHORITY.KEYID = 7
1,210,077 UART: [ldev] FE.KEYID = 1
1,215,215 UART: [ldev] Erasing FE.KEYID = 1
1,241,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,357 UART: [ldev] --
1,280,837 UART: [fwproc] Wait for Commands...
1,281,662 UART: [fwproc] Recv command 0x46574c44
1,282,395 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,861 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,129 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,438 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,298 >>> mbox cmd response: success
2,774,557 UART: [afmc] ++
2,774,725 UART: [afmc] CDI.KEYID = 6
2,775,088 UART: [afmc] SUBJECT.KEYID = 7
2,775,514 UART: [afmc] AUTHORITY.KEYID = 5
2,811,243 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,939 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,690 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,419 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,302 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,021 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,986 UART: [afmc] --
2,854,976 UART: [cold-reset] --
2,855,698 UART: [state] Locking Datavault
2,856,961 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,565 UART: [state] Locking ICCM
2,858,099 UART: [exit] Launching FMC @ 0x40000130
2,863,428 UART:
2,863,444 UART: Running Caliptra FMC ...
2,863,852 UART:
2,863,995 UART: [state] CFI Enabled
2,875,116 UART: [fht] FMC Alias Private Key: 7
2,982,987 UART: [art] Extend RT PCRs Done
2,983,415 UART: [art] Lock RT PCRs Done
2,985,377 UART: [art] Populate DV Done
2,993,426 UART: [fht] FMC Alias Private Key: 7
2,994,482 UART: [art] Derive CDI
2,994,762 UART: [art] Store in in slot 0x4
3,080,175 UART: [art] Derive Key Pair
3,080,535 UART: [art] Store priv key in slot 0x5
3,093,523 UART: [art] Derive Key Pair - Done
3,108,115 UART: [art] Signing Cert with AUTHO
3,108,595 UART: RITY.KEYID = 7
3,124,289 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,054 UART: [art] PUB.X = 4EAC43AB1305BDC19CD60F1E12FA441B2EF38D21EE780A87A1C00B3C5836A76B862158699F17E1B3DFAA87456A928EA8
3,131,824 UART: [art] PUB.Y = B41803479E9BA418C6367784089C35B83AD5D11E810620D1B6861FAFAD630119D8D84B17E940E376E9A9B675466AACB1
3,138,760 UART: [art] SIG.R = E6BEBD5A6DB40E15D4CEBF017713E1688913CA80950A63609A7D6F374119ADFD4B7AD036DD9531E7B9570CE5A7356CB2
3,145,530 UART: [art] SIG.S = B838C90F23B73A70E2E1C9658DBF97EA0B431EAA2B0ECB06E509D21C944BB137BCC075A3FC495141F6170C131D7B5720
3,168,923 UART: Caliptra RT
3,169,268 UART: [state] CFI Enabled
3,278,016 UART: [rt] RT listening for mailbox commands...
3,278,686 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,012 UART: [rt]cmd =0x41544d4e, len=14344
3,711,601 >>> mbox cmd response data (8 bytes)
3,711,602 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,881 UART: [rt]cmd =0x41545348, len=116
3,743,599 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,395 ready_for_fw is high
1,056,395 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,106 >>> mbox cmd response: success
2,684,796 UART:
2,684,812 UART: Running Caliptra FMC ...
2,685,220 UART:
2,685,363 UART: [state] CFI Enabled
2,696,274 UART: [fht] FMC Alias Private Key: 7
2,804,207 UART: [art] Extend RT PCRs Done
2,804,635 UART: [art] Lock RT PCRs Done
2,806,003 UART: [art] Populate DV Done
2,814,176 UART: [fht] FMC Alias Private Key: 7
2,815,140 UART: [art] Derive CDI
2,815,420 UART: [art] Store in in slot 0x4
2,901,039 UART: [art] Derive Key Pair
2,901,399 UART: [art] Store priv key in slot 0x5
2,914,233 UART: [art] Derive Key Pair - Done
2,928,706 UART: [art] Signing Cert with AUTHO
2,929,186 UART: RITY.KEYID = 7
2,944,616 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,381 UART: [art] PUB.X = 069ADF450DC336305C4A3B8713F9076B33EF24002F807F9BBEDCC9FA730106730CEA5AF3AEE4DC2C9B0F6132B143257A
2,952,120 UART: [art] PUB.Y = C57253CED15A7D3F8C14E9817E58AC1160BAD34C2D54C7FB6B6BD473FB6DC04B071CE76F98ED70ECFB0ABF90B63D5014
2,959,086 UART: [art] SIG.R = 28A278934DBAB71F9E40FACA73980DBA01AAF4742AD8EF5751ECB4D805D1B07DEEC16C9FF9D205A585F47C40E210268F
2,965,862 UART: [art] SIG.S = A91BC85F268DEAD175F316289D03838BF2D890533BEDF385AC1768F4E92DF5D2F8E3EB8B2895254264F00FB820ED200F
2,989,644 UART: Caliptra RT
2,989,989 UART: [state] CFI Enabled
3,097,062 UART: [rt] RT listening for mailbox commands...
3,097,732 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,906 UART: [rt]cmd =0x41544d4e, len=14344
3,530,929 >>> mbox cmd response data (8 bytes)
3,530,930 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,217 UART: [rt]cmd =0x41545348, len=116
3,562,937 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Unprovisioned
85,635 UART: [state] DebugLocked = No
86,327 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,943 UART: [kat] SHA2-256
881,874 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,989 UART: [kat] ++
886,141 UART: [kat] sha1
890,627 UART: [kat] SHA2-256
892,565 UART: [kat] SHA2-384
895,174 UART: [kat] SHA2-512-ACC
897,075 UART: [kat] ECC-384
902,468 UART: [kat] HMAC-384Kdf
907,024 UART: [kat] LMS
1,475,220 UART: [kat] --
1,476,111 UART: [cold-reset] ++
1,476,539 UART: [fht] Storing FHT @ 0x50003400
1,479,370 UART: [idev] ++
1,479,538 UART: [idev] CDI.KEYID = 6
1,479,898 UART: [idev] SUBJECT.KEYID = 7
1,480,322 UART: [idev] UDS.KEYID = 0
1,480,667 ready_for_fw is high
1,480,667 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,836 UART: [idev] Erasing UDS.KEYID = 0
1,504,270 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,088 UART: [idev] --
1,514,025 UART: [ldev] ++
1,514,193 UART: [ldev] CDI.KEYID = 6
1,514,556 UART: [ldev] SUBJECT.KEYID = 5
1,514,982 UART: [ldev] AUTHORITY.KEYID = 7
1,515,445 UART: [ldev] FE.KEYID = 1
1,520,655 UART: [ldev] Erasing FE.KEYID = 1
1,546,292 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,492 UART: [ldev] --
1,585,891 UART: [fwproc] Waiting for Commands...
1,586,558 UART: [fwproc] Received command 0x46574c44
1,587,349 UART: [fwproc] Received Image of size 114332 bytes
2,884,357 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,569 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,921 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,900 >>> mbox cmd response: success
3,078,084 UART: [afmc] ++
3,078,252 UART: [afmc] CDI.KEYID = 6
3,078,614 UART: [afmc] SUBJECT.KEYID = 7
3,079,039 UART: [afmc] AUTHORITY.KEYID = 5
3,113,934 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,938 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,718 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,446 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,331 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,021 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,848 UART: [afmc] --
3,156,742 UART: [cold-reset] --
3,157,862 UART: [state] Locking Datavault
3,158,979 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,583 UART: [state] Locking ICCM
3,160,081 UART: [exit] Launching FMC @ 0x40000130
3,165,410 UART:
3,165,426 UART: Running Caliptra FMC ...
3,165,834 UART:
3,165,888 UART: [state] CFI Enabled
3,176,433 UART: [fht] FMC Alias Private Key: 7
3,284,320 UART: [art] Extend RT PCRs Done
3,284,748 UART: [art] Lock RT PCRs Done
3,286,278 UART: [art] Populate DV Done
3,294,449 UART: [fht] FMC Alias Private Key: 7
3,295,629 UART: [art] Derive CDI
3,295,909 UART: [art] Store in in slot 0x4
3,381,720 UART: [art] Derive Key Pair
3,382,080 UART: [art] Store priv key in slot 0x5
3,394,870 UART: [art] Derive Key Pair - Done
3,409,658 UART: [art] Signing Cert with AUTHO
3,410,138 UART: RITY.KEYID = 7
3,424,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,655 UART: [art] PUB.X = 173084F00F798CD74EAB6443E114E5736CD7A146D0CE826E7A6546984FBE2BE20E83948E97F83E8BBA962D5FDE07CC40
3,432,424 UART: [art] PUB.Y = 29A95296947616F5BAB73B85939CEBF69E3B7FD906D0C85CC15F32C149D33EBBF1E8A6DE50D705612C108B569E1D2F9A
3,439,378 UART: [art] SIG.R = F9BF932C980EBA3B5EBE546826FEFF4CF4D50BADA674CA04710DF9DAF1A94DB43C9D73F0A2E67BABBEB9F57852DD8532
3,446,166 UART: [art] SIG.S = F7F0D1C703E9BE379B0C9989B7EB011F867D0E43640E1808190E2529FFD4B3D3B767066CC2C7B76EE09B4C9B0C543D32
3,469,806 UART: Caliptra RT
3,470,059 UART: [state] CFI Enabled
3,578,483 UART: [rt] RT listening for mailbox commands...
3,579,153 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,235 UART: [rt]cmd =0x41544d4e, len=14344
4,012,254 >>> mbox cmd response data (8 bytes)
4,012,255 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,394 UART: [rt]cmd =0x41545348, len=116
4,044,227 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,889 ready_for_fw is high
1,362,889 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,710 >>> mbox cmd response: success
2,989,400 UART:
2,989,416 UART: Running Caliptra FMC ...
2,989,824 UART:
2,989,878 UART: [state] CFI Enabled
3,000,365 UART: [fht] FMC Alias Private Key: 7
3,108,506 UART: [art] Extend RT PCRs Done
3,108,934 UART: [art] Lock RT PCRs Done
3,110,208 UART: [art] Populate DV Done
3,118,457 UART: [fht] FMC Alias Private Key: 7
3,119,611 UART: [art] Derive CDI
3,119,891 UART: [art] Store in in slot 0x4
3,205,104 UART: [art] Derive Key Pair
3,205,464 UART: [art] Store priv key in slot 0x5
3,218,820 UART: [art] Derive Key Pair - Done
3,233,341 UART: [art] Signing Cert with AUTHO
3,233,821 UART: RITY.KEYID = 7
3,249,009 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,774 UART: [art] PUB.X = F27B5BB8C0F0E78004A1239F61B410909862189B6DDAE34699252E6EC1BE1B7553B4C6385DBFCD078217863FA608A9F9
3,256,537 UART: [art] PUB.Y = 35D5290DE85944BC581CDD738F5A16023EDD8AB3FEC58FD7A32CF11753A03D38A5BFFCB89A9B5B1630B6ADFE2999272A
3,263,499 UART: [art] SIG.R = A25A5D54D9C6149E7D3A2E52BF262005758377E49F87EDA9744E657F2B9847B5F2592BB04AA02F5C504AAEAA3C00C25F
3,270,252 UART: [art] SIG.S = 63026A74DA0235B77BCA06B60AEBEA2F54D584FFBFB3B5B96377F22810DAFBBB139F7CA9B6A500F3F74094B6BBEF13E8
3,294,223 UART: Caliptra RT
3,294,476 UART: [state] CFI Enabled
3,402,825 UART: [rt] RT listening for mailbox commands...
3,403,495 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,443 UART: [rt]cmd =0x41544d4e, len=14344
3,836,012 >>> mbox cmd response data (8 bytes)
3,836,013 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,880 UART: [rt]cmd =0x41545348, len=116
3,867,663 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Unprovisioned
85,748 UART: [state] DebugLocked = No
86,238 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,866 UART: [kat] SHA2-256
881,797 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,912 UART: [kat] ++
886,064 UART: [kat] sha1
890,416 UART: [kat] SHA2-256
892,354 UART: [kat] SHA2-384
895,143 UART: [kat] SHA2-512-ACC
897,044 UART: [kat] ECC-384
902,953 UART: [kat] HMAC-384Kdf
907,397 UART: [kat] LMS
1,475,593 UART: [kat] --
1,476,238 UART: [cold-reset] ++
1,476,782 UART: [fht] Storing FHT @ 0x50003400
1,479,665 UART: [idev] ++
1,479,833 UART: [idev] CDI.KEYID = 6
1,480,193 UART: [idev] SUBJECT.KEYID = 7
1,480,617 UART: [idev] UDS.KEYID = 0
1,480,962 ready_for_fw is high
1,480,962 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,869 UART: [idev] Erasing UDS.KEYID = 0
1,505,863 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,313 UART: [idev] --
1,515,236 UART: [ldev] ++
1,515,404 UART: [ldev] CDI.KEYID = 6
1,515,767 UART: [ldev] SUBJECT.KEYID = 5
1,516,193 UART: [ldev] AUTHORITY.KEYID = 7
1,516,656 UART: [ldev] FE.KEYID = 1
1,521,944 UART: [ldev] Erasing FE.KEYID = 1
1,547,477 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,095 UART: [ldev] --
1,586,608 UART: [fwproc] Waiting for Commands...
1,587,367 UART: [fwproc] Received command 0x46574c44
1,588,158 UART: [fwproc] Received Image of size 114332 bytes
2,885,816 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,550 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,902 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,773 >>> mbox cmd response: success
3,078,809 UART: [afmc] ++
3,078,977 UART: [afmc] CDI.KEYID = 6
3,079,339 UART: [afmc] SUBJECT.KEYID = 7
3,079,764 UART: [afmc] AUTHORITY.KEYID = 5
3,114,621 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,137 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,917 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,645 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,530 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,220 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,059 UART: [afmc] --
3,158,053 UART: [cold-reset] --
3,159,197 UART: [state] Locking Datavault
3,160,176 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,780 UART: [state] Locking ICCM
3,161,360 UART: [exit] Launching FMC @ 0x40000130
3,166,689 UART:
3,166,705 UART: Running Caliptra FMC ...
3,167,113 UART:
3,167,256 UART: [state] CFI Enabled
3,177,771 UART: [fht] FMC Alias Private Key: 7
3,285,990 UART: [art] Extend RT PCRs Done
3,286,418 UART: [art] Lock RT PCRs Done
3,287,818 UART: [art] Populate DV Done
3,295,797 UART: [fht] FMC Alias Private Key: 7
3,296,933 UART: [art] Derive CDI
3,297,213 UART: [art] Store in in slot 0x4
3,382,956 UART: [art] Derive Key Pair
3,383,316 UART: [art] Store priv key in slot 0x5
3,396,974 UART: [art] Derive Key Pair - Done
3,411,447 UART: [art] Signing Cert with AUTHO
3,411,927 UART: RITY.KEYID = 7
3,426,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,574 UART: [art] PUB.X = C4ADCEF235C7DE081B0BC2610C1E13BB7ACC59E6C8598808FC21ECF53BD318DA63471535C19E7B613BD7F9201B149117
3,434,344 UART: [art] PUB.Y = 4F3C006907DDBBD68BB5E2C80EB2636672F217D5DF4B4130719D3A0E7256824AF2118A0AD53DC26E3DF7BBB8E7C66EA2
3,441,274 UART: [art] SIG.R = 0FB805AB03A9460ABCA50C67E4D2981B026B76D21C48B0300DF32DBB628D65CD69513A1FEB0635E9307F9751EB3727B2
3,448,026 UART: [art] SIG.S = E29DCA513409C4C80A89D7CDCB72BDCF5009549A71E9E46BAFA6D5E5041AED8A3AECF4FB4D9496456E62DED22FCD77FE
3,471,561 UART: Caliptra RT
3,471,906 UART: [state] CFI Enabled
3,579,347 UART: [rt] RT listening for mailbox commands...
3,580,017 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,109 UART: [rt]cmd =0x41544d4e, len=14344
4,013,172 >>> mbox cmd response data (8 bytes)
4,013,173 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,396 UART: [rt]cmd =0x41545348, len=116
4,045,167 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,966 ready_for_fw is high
1,362,966 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,471 >>> mbox cmd response: success
2,990,861 UART:
2,990,877 UART: Running Caliptra FMC ...
2,991,285 UART:
2,991,428 UART: [state] CFI Enabled
3,002,027 UART: [fht] FMC Alias Private Key: 7
3,110,554 UART: [art] Extend RT PCRs Done
3,110,982 UART: [art] Lock RT PCRs Done
3,112,440 UART: [art] Populate DV Done
3,120,699 UART: [fht] FMC Alias Private Key: 7
3,121,763 UART: [art] Derive CDI
3,122,043 UART: [art] Store in in slot 0x4
3,207,740 UART: [art] Derive Key Pair
3,208,100 UART: [art] Store priv key in slot 0x5
3,220,998 UART: [art] Derive Key Pair - Done
3,235,892 UART: [art] Signing Cert with AUTHO
3,236,372 UART: RITY.KEYID = 7
3,251,454 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,219 UART: [art] PUB.X = 0C62209ED7C6BF9F9B6ABB1D578E84FBFC84BEDE12A9CCF4E5558D5FA47DF51C1E3405BBDD2412383BA745346F1F99F9
3,259,005 UART: [art] PUB.Y = 38F4B8A2F59DACB0E01873EA65BE52F5FF3B31531F10FA8A37892D418871F583AEAE358FB9752D4AD7764E3816EBAF22
3,265,967 UART: [art] SIG.R = 2CF62A85F2B727F666DE853457338DC61C9D03A0F1F93993D1A6BD5B5BE1A50ECE698C91891644160AAB9CEDBE1C670D
3,272,737 UART: [art] SIG.S = 55FA032ED9C87AB5FA6819F3647CF2C240B55D55D59EE23D41CF0DE2DB48DFF4466C6317752B48E3E7271F2B091DA392
3,296,687 UART: Caliptra RT
3,297,032 UART: [state] CFI Enabled
3,405,000 UART: [rt] RT listening for mailbox commands...
3,405,670 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,854 UART: [rt]cmd =0x41544d4e, len=14344
3,839,191 >>> mbox cmd response data (8 bytes)
3,839,192 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,869,161 UART: [rt]cmd =0x41545348, len=116
3,871,158 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
893,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,353 UART: [kat] ++
897,505 UART: [kat] sha1
901,727 UART: [kat] SHA2-256
903,667 UART: [kat] SHA2-384
906,386 UART: [kat] SHA2-512-ACC
908,287 UART: [kat] ECC-384
918,004 UART: [kat] HMAC-384Kdf
922,688 UART: [kat] LMS
1,171,016 UART: [kat] --
1,172,107 UART: [cold-reset] ++
1,172,597 UART: [fht] FHT @ 0x50003400
1,175,098 UART: [idev] ++
1,175,266 UART: [idev] CDI.KEYID = 6
1,175,626 UART: [idev] SUBJECT.KEYID = 7
1,176,050 UART: [idev] UDS.KEYID = 0
1,176,395 ready_for_fw is high
1,176,395 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,754 UART: [idev] Erasing UDS.KEYID = 0
1,200,747 UART: [idev] Sha1 KeyId Algorithm
1,209,299 UART: [idev] --
1,210,469 UART: [ldev] ++
1,210,637 UART: [ldev] CDI.KEYID = 6
1,211,000 UART: [ldev] SUBJECT.KEYID = 5
1,211,426 UART: [ldev] AUTHORITY.KEYID = 7
1,211,889 UART: [ldev] FE.KEYID = 1
1,216,859 UART: [ldev] Erasing FE.KEYID = 1
1,242,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,265 UART: [ldev] --
1,282,554 UART: [fwproc] Wait for Commands...
1,283,358 UART: [fwproc] Recv command 0x46574c44
1,284,086 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,480 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,784 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,673 >>> mbox cmd response: success
2,774,887 UART: [afmc] ++
2,775,055 UART: [afmc] CDI.KEYID = 6
2,775,417 UART: [afmc] SUBJECT.KEYID = 7
2,775,842 UART: [afmc] AUTHORITY.KEYID = 5
2,811,563 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,550 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,278 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,163 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,882 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,626 UART: [afmc] --
2,854,720 UART: [cold-reset] --
2,855,740 UART: [state] Locking Datavault
2,857,027 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,631 UART: [state] Locking ICCM
2,858,265 UART: [exit] Launching FMC @ 0x40000130
2,863,594 UART:
2,863,610 UART: Running Caliptra FMC ...
2,864,018 UART:
2,864,072 UART: [state] CFI Enabled
2,874,765 UART: [fht] FMC Alias Private Key: 7
2,982,654 UART: [art] Extend RT PCRs Done
2,983,082 UART: [art] Lock RT PCRs Done
2,984,356 UART: [art] Populate DV Done
2,992,469 UART: [fht] FMC Alias Private Key: 7
2,993,409 UART: [art] Derive CDI
2,993,689 UART: [art] Store in in slot 0x4
3,078,866 UART: [art] Derive Key Pair
3,079,226 UART: [art] Store priv key in slot 0x5
3,092,558 UART: [art] Derive Key Pair - Done
3,107,348 UART: [art] Signing Cert with AUTHO
3,107,828 UART: RITY.KEYID = 7
3,122,768 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,533 UART: [art] PUB.X = 9C84AB3A8B6B62EB9965E002C66CB40ADE11523B80DD70C213DB7047067C257F1A35F9847C2D001EB5A8867BD2361F3F
3,130,278 UART: [art] PUB.Y = 2F6558CB65982A9B6FBFAFFE48AFAFFEE10F285F26E5F380716450545A24D60A3854AA13F26129CA9AEB40C01E6EE8A2
3,137,238 UART: [art] SIG.R = B763FA6459F49C8AF1AC120967F84A61CAB93037254E90E84D29CE78C5DD8517DB5A2F0CF2515A393D8E19295A5CD575
3,144,008 UART: [art] SIG.S = F1312AE508F3AD3A4F452AD9DEE044ADB1FBBD9241E5B1D57620FE515D50E87F8D7BF2DAAA8B7987B71F4A05CAEB29AF
3,168,147 UART: Caliptra RT
3,168,400 UART: [state] CFI Enabled
3,275,724 UART: [rt] RT listening for mailbox commands...
3,276,394 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,506 UART: [rt]cmd =0x41544d4e, len=14344
3,709,015 >>> mbox cmd response data (8 bytes)
3,709,016 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,331 UART: [rt]cmd =0x41545348, len=116
3,741,232 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,319 ready_for_fw is high
1,060,319 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,730 >>> mbox cmd response: success
2,689,608 UART:
2,689,624 UART: Running Caliptra FMC ...
2,690,032 UART:
2,690,086 UART: [state] CFI Enabled
2,700,623 UART: [fht] FMC Alias Private Key: 7
2,808,126 UART: [art] Extend RT PCRs Done
2,808,554 UART: [art] Lock RT PCRs Done
2,810,156 UART: [art] Populate DV Done
2,818,469 UART: [fht] FMC Alias Private Key: 7
2,819,483 UART: [art] Derive CDI
2,819,763 UART: [art] Store in in slot 0x4
2,905,764 UART: [art] Derive Key Pair
2,906,124 UART: [art] Store priv key in slot 0x5
2,919,858 UART: [art] Derive Key Pair - Done
2,934,710 UART: [art] Signing Cert with AUTHO
2,935,190 UART: RITY.KEYID = 7
2,950,304 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,069 UART: [art] PUB.X = 9045180E940E6849F6F6CE93471B3279D1C4AB4650D67ADBD2E22AF01B64AF9CD81580C061D6083EBD671DCAFC939493
2,957,836 UART: [art] PUB.Y = 7B0500D7520DC4FC27F800D7DD2C62D2C808C3FE299A590A93A669B8ACF265F0A2F080D629C44990A4B4C3345C68CBA2
2,964,738 UART: [art] SIG.R = B358A2779EC402E500AE6D23450F566539E5CCE916D0BBBF901B3D9CB3D1B2A6A984356907CB81D4FE7CE2A6500E26E9
2,971,484 UART: [art] SIG.S = 1E0276FA3AABB84D2446B21F0CA49F14557D26E72828F3160839D6D04C059FECBF7B81962B01A086192EB16727851614
2,995,452 UART: Caliptra RT
2,995,705 UART: [state] CFI Enabled
3,103,784 UART: [rt] RT listening for mailbox commands...
3,104,454 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,658 UART: [rt]cmd =0x41544d4e, len=14344
3,536,747 >>> mbox cmd response data (8 bytes)
3,536,748 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,566,799 UART: [rt]cmd =0x41545348, len=116
3,568,782 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,592 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
893,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,714 UART: [kat] ++
897,866 UART: [kat] sha1
902,058 UART: [kat] SHA2-256
903,998 UART: [kat] SHA2-384
906,807 UART: [kat] SHA2-512-ACC
908,708 UART: [kat] ECC-384
918,477 UART: [kat] HMAC-384Kdf
923,169 UART: [kat] LMS
1,171,497 UART: [kat] --
1,172,304 UART: [cold-reset] ++
1,172,640 UART: [fht] FHT @ 0x50003400
1,175,149 UART: [idev] ++
1,175,317 UART: [idev] CDI.KEYID = 6
1,175,677 UART: [idev] SUBJECT.KEYID = 7
1,176,101 UART: [idev] UDS.KEYID = 0
1,176,446 ready_for_fw is high
1,176,446 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,335 UART: [idev] Erasing UDS.KEYID = 0
1,201,448 UART: [idev] Sha1 KeyId Algorithm
1,209,974 UART: [idev] --
1,211,158 UART: [ldev] ++
1,211,326 UART: [ldev] CDI.KEYID = 6
1,211,689 UART: [ldev] SUBJECT.KEYID = 5
1,212,115 UART: [ldev] AUTHORITY.KEYID = 7
1,212,578 UART: [ldev] FE.KEYID = 1
1,217,982 UART: [ldev] Erasing FE.KEYID = 1
1,243,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,476 UART: [ldev] --
1,282,817 UART: [fwproc] Wait for Commands...
1,283,431 UART: [fwproc] Recv command 0x46574c44
1,284,159 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,619 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,923 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,658 >>> mbox cmd response: success
2,775,910 UART: [afmc] ++
2,776,078 UART: [afmc] CDI.KEYID = 6
2,776,440 UART: [afmc] SUBJECT.KEYID = 7
2,776,865 UART: [afmc] AUTHORITY.KEYID = 5
2,812,622 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,123 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,871 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,599 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,484 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,203 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,031 UART: [afmc] --
2,855,981 UART: [cold-reset] --
2,856,731 UART: [state] Locking Datavault
2,857,772 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,376 UART: [state] Locking ICCM
2,858,820 UART: [exit] Launching FMC @ 0x40000130
2,864,149 UART:
2,864,165 UART: Running Caliptra FMC ...
2,864,573 UART:
2,864,716 UART: [state] CFI Enabled
2,875,429 UART: [fht] FMC Alias Private Key: 7
2,984,126 UART: [art] Extend RT PCRs Done
2,984,554 UART: [art] Lock RT PCRs Done
2,986,062 UART: [art] Populate DV Done
2,994,449 UART: [fht] FMC Alias Private Key: 7
2,995,439 UART: [art] Derive CDI
2,995,719 UART: [art] Store in in slot 0x4
3,081,386 UART: [art] Derive Key Pair
3,081,746 UART: [art] Store priv key in slot 0x5
3,094,638 UART: [art] Derive Key Pair - Done
3,109,253 UART: [art] Signing Cert with AUTHO
3,109,733 UART: RITY.KEYID = 7
3,124,747 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,512 UART: [art] PUB.X = 0BD273F247D724CA279BA062598F2C0947F1DD18B12CAE154926ABE8FDA17A9BD75907F326211050412B53C321AAE659
3,132,275 UART: [art] PUB.Y = 1CEF3597E01DC39E694997067A36F308C253A9B58464BB84FBC761D7294F8BCAE8029667BE1614AB16FA5D4231A94443
3,139,216 UART: [art] SIG.R = 3E215176F23B4B1D97F7B5C590D8ABAC9EDBC6A9FEA1D6005353AA4A77931EB11B89B9045F29ED3349C875F164C5CCD5
3,145,975 UART: [art] SIG.S = BD0EBD719F439585077622FD174B2FC75C7ED3093E0186EBAD6E7A108A28344602C5740414871F8C75E5B6E03EE7B762
3,169,880 UART: Caliptra RT
3,170,225 UART: [state] CFI Enabled
3,277,850 UART: [rt] RT listening for mailbox commands...
3,278,520 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,478 UART: [rt]cmd =0x41544d4e, len=14344
3,711,163 >>> mbox cmd response data (8 bytes)
3,711,164 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,345 UART: [rt]cmd =0x41545348, len=116
3,743,272 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,014 ready_for_fw is high
1,061,014 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,913 >>> mbox cmd response: success
2,690,551 UART:
2,690,567 UART: Running Caliptra FMC ...
2,690,975 UART:
2,691,118 UART: [state] CFI Enabled
2,701,783 UART: [fht] FMC Alias Private Key: 7
2,809,868 UART: [art] Extend RT PCRs Done
2,810,296 UART: [art] Lock RT PCRs Done
2,811,878 UART: [art] Populate DV Done
2,820,231 UART: [fht] FMC Alias Private Key: 7
2,821,217 UART: [art] Derive CDI
2,821,497 UART: [art] Store in in slot 0x4
2,907,258 UART: [art] Derive Key Pair
2,907,618 UART: [art] Store priv key in slot 0x5
2,921,076 UART: [art] Derive Key Pair - Done
2,935,735 UART: [art] Signing Cert with AUTHO
2,936,215 UART: RITY.KEYID = 7
2,951,175 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,940 UART: [art] PUB.X = 3FF7F9F70E9E814D0B8C18CA41BC13EDA5CB9255A77E3365CA016E8FA132EB07F96A0A50D457B72F5AEC9CDE8BF481A3
2,958,717 UART: [art] PUB.Y = 291713EB8888BB008EF312D36C3D98EAE59995126F37420246893AA7ADBB4141955E0FB71EC3DDF181540759D40617B6
2,965,629 UART: [art] SIG.R = 24887669072A4B8B1E49B6433A8F1F7F38C52F5C8B92ADC6F39051FFC1281B37D729A4CEAE353BDC93EB4E977025FEDF
2,972,408 UART: [art] SIG.S = 6F59AEBEA6C255D1886B9D4FA52CA0FBAB1C620E97221229FBF2842F1337F72884C4C3F03009D37F94313B925709EE9C
2,996,324 UART: Caliptra RT
2,996,669 UART: [state] CFI Enabled
3,104,232 UART: [rt] RT listening for mailbox commands...
3,104,902 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,976 UART: [rt]cmd =0x41544d4e, len=14344
3,537,703 >>> mbox cmd response data (8 bytes)
3,537,704 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,567,847 UART: [rt]cmd =0x41545348, len=116
3,569,912 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,733 UART: [state] WD Timer not started. Device not locked for debugging
87,858 UART: [kat] SHA2-256
891,408 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,537 UART: [kat] ++
895,689 UART: [kat] sha1
899,989 UART: [kat] SHA2-256
901,929 UART: [kat] SHA2-384
904,528 UART: [kat] SHA2-512-ACC
906,429 UART: [kat] ECC-384
916,432 UART: [kat] HMAC-384Kdf
920,856 UART: [kat] LMS
1,169,168 UART: [kat] --
1,170,105 UART: [cold-reset] ++
1,170,455 UART: [fht] FHT @ 0x50003400
1,172,947 UART: [idev] ++
1,173,115 UART: [idev] CDI.KEYID = 6
1,173,476 UART: [idev] SUBJECT.KEYID = 7
1,173,901 UART: [idev] UDS.KEYID = 0
1,174,247 ready_for_fw is high
1,174,247 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,199 UART: [idev] Erasing UDS.KEYID = 0
1,199,029 UART: [idev] Sha1 KeyId Algorithm
1,207,827 UART: [idev] --
1,208,812 UART: [ldev] ++
1,208,980 UART: [ldev] CDI.KEYID = 6
1,209,344 UART: [ldev] SUBJECT.KEYID = 5
1,209,771 UART: [ldev] AUTHORITY.KEYID = 7
1,210,234 UART: [ldev] FE.KEYID = 1
1,215,356 UART: [ldev] Erasing FE.KEYID = 1
1,241,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,570 UART: [ldev] --
1,280,918 UART: [fwproc] Wait for Commands...
1,281,685 UART: [fwproc] Recv command 0x46574c44
1,282,418 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,310 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,619 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,347 >>> mbox cmd response: success
2,772,512 UART: [afmc] ++
2,772,680 UART: [afmc] CDI.KEYID = 6
2,773,043 UART: [afmc] SUBJECT.KEYID = 7
2,773,469 UART: [afmc] AUTHORITY.KEYID = 5
2,809,010 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,083 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,812 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,695 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,414 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,245 UART: [afmc] --
2,852,159 UART: [cold-reset] --
2,853,197 UART: [state] Locking Datavault
2,854,158 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,762 UART: [state] Locking ICCM
2,855,242 UART: [exit] Launching FMC @ 0x40000130
2,860,571 UART:
2,860,587 UART: Running Caliptra FMC ...
2,860,995 UART:
2,861,049 UART: [state] CFI Enabled
2,871,534 UART: [fht] FMC Alias Private Key: 7
2,979,325 UART: [art] Extend RT PCRs Done
2,979,753 UART: [art] Lock RT PCRs Done
2,981,327 UART: [art] Populate DV Done
2,989,496 UART: [fht] FMC Alias Private Key: 7
2,990,486 UART: [art] Derive CDI
2,990,766 UART: [art] Store in in slot 0x4
3,076,141 UART: [art] Derive Key Pair
3,076,501 UART: [art] Store priv key in slot 0x5
3,089,777 UART: [art] Derive Key Pair - Done
3,104,316 UART: [art] Signing Cert with AUTHO
3,104,796 UART: RITY.KEYID = 7
3,120,230 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,995 UART: [art] PUB.X = 611B5EEA4E24022E2FC3634D77931E6323F7281FFD39E13294364C06DF70928991E75C4563689C13AD5E8A84927EF0E7
3,127,753 UART: [art] PUB.Y = 68A90B34023BA0236C532AD81DF0BD2C744384F526ED3016DE3B44712CF1B1F405BD16C01AEA5C0EC7889FE31B7D2A76
3,134,701 UART: [art] SIG.R = 4BF698111F1DDF6BB021DFB3E63F06814D543D692F376B4BF17317302077B3B3274513E7E7295352D51BCB04DE8C3F04
3,141,462 UART: [art] SIG.S = 3300AF466A63F5C398A91599DACF19F9B88F81CE7B1852ED974680B4F1463F266B2D9929F3F06B7CBB3AAFAEFCF2A9C6
3,165,657 UART: Caliptra RT
3,165,910 UART: [state] CFI Enabled
3,273,791 UART: [rt] RT listening for mailbox commands...
3,274,461 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,679 UART: [rt]cmd =0x41544d4e, len=14344
3,708,136 >>> mbox cmd response data (8 bytes)
3,708,137 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,108 UART: [rt]cmd =0x41545348, len=116
3,739,925 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,266 ready_for_fw is high
1,056,266 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,263 >>> mbox cmd response: success
2,683,683 UART:
2,683,699 UART: Running Caliptra FMC ...
2,684,107 UART:
2,684,161 UART: [state] CFI Enabled
2,694,486 UART: [fht] FMC Alias Private Key: 7
2,802,599 UART: [art] Extend RT PCRs Done
2,803,027 UART: [art] Lock RT PCRs Done
2,804,591 UART: [art] Populate DV Done
2,812,896 UART: [fht] FMC Alias Private Key: 7
2,813,928 UART: [art] Derive CDI
2,814,208 UART: [art] Store in in slot 0x4
2,899,489 UART: [art] Derive Key Pair
2,899,849 UART: [art] Store priv key in slot 0x5
2,912,849 UART: [art] Derive Key Pair - Done
2,927,529 UART: [art] Signing Cert with AUTHO
2,928,009 UART: RITY.KEYID = 7
2,943,165 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,930 UART: [art] PUB.X = 352D9995AECBAD0983568CC5663B01ECC7579CE62FD90DDE7C2D0DFD3A7B7E737CB7C07C49982680DB218516A053B2D2
2,950,700 UART: [art] PUB.Y = 440EBC77F54B015B776EE0665ADBC45AD75F03ECDD5E43C2C4B0BF2A9DEF64E8D986AB8535B71AD5598E75233781C0F8
2,957,657 UART: [art] SIG.R = 34C42D55CC5FA8DAC27D961D856CD5321AFE117C8C2D0CC892CE25CAEAFFE25D9ECE94F39F2C7DBFDFCDA83A7C8CBEEC
2,964,466 UART: [art] SIG.S = 7DEC217A16268ED5B914E41E29C46806EE6901B52F581467F4C70D3966B4387BBFB3B3D9720A1007F2C086771291D0A1
2,987,886 UART: Caliptra RT
2,988,139 UART: [state] CFI Enabled
3,095,350 UART: [rt] RT listening for mailbox commands...
3,096,020 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,058 UART: [rt]cmd =0x41544d4e, len=14344
3,529,309 >>> mbox cmd response data (8 bytes)
3,529,310 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,315 UART: [rt]cmd =0x41545348, len=116
3,560,964 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,654 UART: [kat] ++
895,806 UART: [kat] sha1
900,050 UART: [kat] SHA2-256
901,990 UART: [kat] SHA2-384
904,627 UART: [kat] SHA2-512-ACC
906,528 UART: [kat] ECC-384
916,469 UART: [kat] HMAC-384Kdf
920,901 UART: [kat] LMS
1,169,213 UART: [kat] --
1,170,218 UART: [cold-reset] ++
1,170,620 UART: [fht] FHT @ 0x50003400
1,173,412 UART: [idev] ++
1,173,580 UART: [idev] CDI.KEYID = 6
1,173,941 UART: [idev] SUBJECT.KEYID = 7
1,174,366 UART: [idev] UDS.KEYID = 0
1,174,712 ready_for_fw is high
1,174,712 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,186 UART: [idev] Erasing UDS.KEYID = 0
1,199,000 UART: [idev] Sha1 KeyId Algorithm
1,207,870 UART: [idev] --
1,208,901 UART: [ldev] ++
1,209,069 UART: [ldev] CDI.KEYID = 6
1,209,433 UART: [ldev] SUBJECT.KEYID = 5
1,209,860 UART: [ldev] AUTHORITY.KEYID = 7
1,210,323 UART: [ldev] FE.KEYID = 1
1,215,847 UART: [ldev] Erasing FE.KEYID = 1
1,242,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,895 UART: [ldev] --
1,281,383 UART: [fwproc] Wait for Commands...
1,282,204 UART: [fwproc] Recv command 0x46574c44
1,282,937 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,785 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,094 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,918 >>> mbox cmd response: success
2,773,985 UART: [afmc] ++
2,774,153 UART: [afmc] CDI.KEYID = 6
2,774,516 UART: [afmc] SUBJECT.KEYID = 7
2,774,942 UART: [afmc] AUTHORITY.KEYID = 5
2,810,933 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,533 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,284 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,013 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,896 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,615 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,540 UART: [afmc] --
2,854,588 UART: [cold-reset] --
2,855,400 UART: [state] Locking Datavault
2,856,799 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,403 UART: [state] Locking ICCM
2,858,045 UART: [exit] Launching FMC @ 0x40000130
2,863,374 UART:
2,863,390 UART: Running Caliptra FMC ...
2,863,798 UART:
2,863,941 UART: [state] CFI Enabled
2,874,748 UART: [fht] FMC Alias Private Key: 7
2,982,911 UART: [art] Extend RT PCRs Done
2,983,339 UART: [art] Lock RT PCRs Done
2,984,889 UART: [art] Populate DV Done
2,993,202 UART: [fht] FMC Alias Private Key: 7
2,994,262 UART: [art] Derive CDI
2,994,542 UART: [art] Store in in slot 0x4
3,080,533 UART: [art] Derive Key Pair
3,080,893 UART: [art] Store priv key in slot 0x5
3,094,395 UART: [art] Derive Key Pair - Done
3,109,614 UART: [art] Signing Cert with AUTHO
3,110,094 UART: RITY.KEYID = 7
3,125,050 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,815 UART: [art] PUB.X = 76C493FFB38161E26E9F4300F1723221C2AAE3C49FD0111222667DD03F8B8B462A4FA6F8717A17CA0AB86E0A61B7A8B3
3,132,563 UART: [art] PUB.Y = 2BFED02281652AEB9DB51320C3D2E62392F40A1C340CA98AFAB86C03E1FC8A56C22BCE3739A49EEC04B3ED2DAEAAC0B5
3,139,527 UART: [art] SIG.R = 6EACC697AE17C4701755DFBFE14867676B39EA606877F6CF2009FE5FFA310BC6D6A734911867B3CAFE31B3082AA79744
3,146,296 UART: [art] SIG.S = 30905D7EAA115D084F119AF9BA3954343459EA73BA1099FED16CD73C76E91F08C5D65912AD36F4632454DA5FB36F5F10
3,170,175 UART: Caliptra RT
3,170,520 UART: [state] CFI Enabled
3,278,707 UART: [rt] RT listening for mailbox commands...
3,279,377 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,371 UART: [rt]cmd =0x41544d4e, len=14344
3,711,606 >>> mbox cmd response data (8 bytes)
3,711,607 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,708 UART: [rt]cmd =0x41545348, len=116
3,743,585 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,389 ready_for_fw is high
1,056,389 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,524 >>> mbox cmd response: success
2,684,258 UART:
2,684,274 UART: Running Caliptra FMC ...
2,684,682 UART:
2,684,825 UART: [state] CFI Enabled
2,695,536 UART: [fht] FMC Alias Private Key: 7
2,803,529 UART: [art] Extend RT PCRs Done
2,803,957 UART: [art] Lock RT PCRs Done
2,805,541 UART: [art] Populate DV Done
2,813,610 UART: [fht] FMC Alias Private Key: 7
2,814,574 UART: [art] Derive CDI
2,814,854 UART: [art] Store in in slot 0x4
2,900,367 UART: [art] Derive Key Pair
2,900,727 UART: [art] Store priv key in slot 0x5
2,913,963 UART: [art] Derive Key Pair - Done
2,928,683 UART: [art] Signing Cert with AUTHO
2,929,163 UART: RITY.KEYID = 7
2,944,491 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,256 UART: [art] PUB.X = AA398F7139E281703CF3D674A244A59DAD2D3B22EDFEC9859435B9E4FB0FC0CAC59C0E90EFB2F695459154D9C32D1FBF
2,952,038 UART: [art] PUB.Y = 740649C99FEA7214DEE476BE790412BDF23D3C726A6324A9C32E54AD535620428EC5893D64DCECF18BD5289F2EB2FF92
2,958,990 UART: [art] SIG.R = 49F106F7309FF3449ECA901E69ED4EEE8FE7A37B3A8BF02146F4B644598A6B4929D62E331758EA0F404FA238C5D815FC
2,965,762 UART: [art] SIG.S = F45D84D60B53938E4AA0E29684CDB723119019778152224EF12B586A5D8E03722A5D53AF3C7A99C295C1D84BA7CD1F23
2,989,365 UART: Caliptra RT
2,989,710 UART: [state] CFI Enabled
3,097,869 UART: [rt] RT listening for mailbox commands...
3,098,539 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,763 UART: [rt]cmd =0x41544d4e, len=14344
3,532,048 >>> mbox cmd response data (8 bytes)
3,532,049 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,026 UART: [rt]cmd =0x41545348, len=116
3,563,851 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,824 UART: [state] LifecycleState = Unprovisioned
85,479 UART: [state] DebugLocked = No
86,035 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,603 UART: [kat] SHA2-256
881,534 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,649 UART: [kat] ++
885,801 UART: [kat] sha1
889,979 UART: [kat] SHA2-256
891,917 UART: [kat] SHA2-384
894,516 UART: [kat] SHA2-512-ACC
896,417 UART: [kat] ECC-384
902,350 UART: [kat] HMAC-384Kdf
907,034 UART: [kat] LMS
1,475,230 UART: [kat] --
1,475,977 UART: [cold-reset] ++
1,476,421 UART: [fht] Storing FHT @ 0x50003400
1,479,164 UART: [idev] ++
1,479,332 UART: [idev] CDI.KEYID = 6
1,479,692 UART: [idev] SUBJECT.KEYID = 7
1,480,116 UART: [idev] UDS.KEYID = 0
1,480,461 ready_for_fw is high
1,480,461 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,092 UART: [idev] Erasing UDS.KEYID = 0
1,504,538 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,128 UART: [idev] --
1,514,397 UART: [ldev] ++
1,514,565 UART: [ldev] CDI.KEYID = 6
1,514,928 UART: [ldev] SUBJECT.KEYID = 5
1,515,354 UART: [ldev] AUTHORITY.KEYID = 7
1,515,817 UART: [ldev] FE.KEYID = 1
1,521,015 UART: [ldev] Erasing FE.KEYID = 1
1,546,398 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,794 UART: [ldev] --
1,586,131 UART: [fwproc] Waiting for Commands...
1,586,828 UART: [fwproc] Received command 0x46574c44
1,587,619 UART: [fwproc] Received Image of size 114332 bytes
2,885,319 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,839 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,191 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,946 >>> mbox cmd response: success
3,078,962 UART: [afmc] ++
3,079,130 UART: [afmc] CDI.KEYID = 6
3,079,492 UART: [afmc] SUBJECT.KEYID = 7
3,079,917 UART: [afmc] AUTHORITY.KEYID = 5
3,114,424 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,794 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,574 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,302 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,187 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,877 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,712 UART: [afmc] --
3,157,712 UART: [cold-reset] --
3,158,632 UART: [state] Locking Datavault
3,159,889 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,493 UART: [state] Locking ICCM
3,160,997 UART: [exit] Launching FMC @ 0x40000130
3,166,326 UART:
3,166,342 UART: Running Caliptra FMC ...
3,166,750 UART:
3,166,804 UART: [state] CFI Enabled
3,177,515 UART: [fht] FMC Alias Private Key: 7
3,285,890 UART: [art] Extend RT PCRs Done
3,286,318 UART: [art] Lock RT PCRs Done
3,287,814 UART: [art] Populate DV Done
3,295,973 UART: [fht] FMC Alias Private Key: 7
3,296,931 UART: [art] Derive CDI
3,297,211 UART: [art] Store in in slot 0x4
3,383,006 UART: [art] Derive Key Pair
3,383,366 UART: [art] Store priv key in slot 0x5
3,396,642 UART: [art] Derive Key Pair - Done
3,411,296 UART: [art] Signing Cert with AUTHO
3,411,776 UART: RITY.KEYID = 7
3,427,308 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,073 UART: [art] PUB.X = 3CC93333F86BAA81C3CBCB18067C6EDED6F726241E54F6CD7D3203D557E15B34631705F2848CEC7CD8166BAB687F6585
3,434,842 UART: [art] PUB.Y = 1CA85811AFDEF0CADE4BFD3B4EC2E0A313B59E7E439608F6931E73E377F1475513280A013575416F23C08523EEFD9A7B
3,441,791 UART: [art] SIG.R = 165365F55E9EB810A4405DF2436DCD14FDF86E95F90853D5814FED605253632D0D1A890F01A77C3FD996060C0CFA408D
3,448,542 UART: [art] SIG.S = 723F86F11C7BFDF9423F2C79973095A69FB26699DFAA3823AA90ADF2DB9EEAB0792C929CF753E55901E43EEB585B5440
3,472,228 UART: Caliptra RT
3,472,481 UART: [state] CFI Enabled
3,580,875 UART: [rt] RT listening for mailbox commands...
3,581,545 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,327 UART: [rt]cmd =0x41544d4e, len=14344
4,014,194 >>> mbox cmd response data (8 bytes)
4,014,195 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,468 UART: [rt]cmd =0x41545348, len=116
4,046,453 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,593 ready_for_fw is high
1,362,593 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,834 >>> mbox cmd response: success
2,990,624 UART:
2,990,640 UART: Running Caliptra FMC ...
2,991,048 UART:
2,991,102 UART: [state] CFI Enabled
3,001,723 UART: [fht] FMC Alias Private Key: 7
3,109,382 UART: [art] Extend RT PCRs Done
3,109,810 UART: [art] Lock RT PCRs Done
3,111,242 UART: [art] Populate DV Done
3,119,291 UART: [fht] FMC Alias Private Key: 7
3,120,369 UART: [art] Derive CDI
3,120,649 UART: [art] Store in in slot 0x4
3,206,508 UART: [art] Derive Key Pair
3,206,868 UART: [art] Store priv key in slot 0x5
3,219,770 UART: [art] Derive Key Pair - Done
3,234,777 UART: [art] Signing Cert with AUTHO
3,235,257 UART: RITY.KEYID = 7
3,250,521 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,286 UART: [art] PUB.X = 43CDD6DD8AA0311EF22C369543107209F9658D6D3AAC5B407AD95297452ABE3EC05B539D052EC981301697FAA96085B5
3,258,052 UART: [art] PUB.Y = 7295FAA49C551CF93E0281E0E248A33763FD4894EF137DFA5C39DB82DEFFC2E0511230404A130A6E567A6D1F97E09C8C
3,265,004 UART: [art] SIG.R = 29BD2BB6F6029A67D26CACD492E36E04FE56E494A6C6EA811BD2421572F719663725E52C7F4A66E6928E667AB56C8E31
3,271,772 UART: [art] SIG.S = 2A76CFC22487B40071AE237CA7306513FD852F8392B1C689A46F608C206BBD8494D6668E3CFF7C29728EE329EB91F041
3,295,625 UART: Caliptra RT
3,295,878 UART: [state] CFI Enabled
3,404,328 UART: [rt] RT listening for mailbox commands...
3,404,998 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,078 UART: [rt]cmd =0x41544d4e, len=14344
3,838,539 >>> mbox cmd response data (8 bytes)
3,838,540 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,868,635 UART: [rt]cmd =0x41545348, len=116
3,870,436 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,624 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,166 UART: [kat] SHA2-256
882,097 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,212 UART: [kat] ++
886,364 UART: [kat] sha1
890,694 UART: [kat] SHA2-256
892,632 UART: [kat] SHA2-384
895,271 UART: [kat] SHA2-512-ACC
897,172 UART: [kat] ECC-384
902,855 UART: [kat] HMAC-384Kdf
907,407 UART: [kat] LMS
1,475,603 UART: [kat] --
1,476,482 UART: [cold-reset] ++
1,476,814 UART: [fht] Storing FHT @ 0x50003400
1,479,663 UART: [idev] ++
1,479,831 UART: [idev] CDI.KEYID = 6
1,480,191 UART: [idev] SUBJECT.KEYID = 7
1,480,615 UART: [idev] UDS.KEYID = 0
1,480,960 ready_for_fw is high
1,480,960 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,525 UART: [idev] Erasing UDS.KEYID = 0
1,505,285 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,755 UART: [idev] --
1,514,736 UART: [ldev] ++
1,514,904 UART: [ldev] CDI.KEYID = 6
1,515,267 UART: [ldev] SUBJECT.KEYID = 5
1,515,693 UART: [ldev] AUTHORITY.KEYID = 7
1,516,156 UART: [ldev] FE.KEYID = 1
1,521,280 UART: [ldev] Erasing FE.KEYID = 1
1,546,873 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,501 UART: [ldev] --
1,585,824 UART: [fwproc] Waiting for Commands...
1,586,585 UART: [fwproc] Received command 0x46574c44
1,587,376 UART: [fwproc] Received Image of size 114332 bytes
2,884,012 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,550 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,902 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,849 >>> mbox cmd response: success
3,078,105 UART: [afmc] ++
3,078,273 UART: [afmc] CDI.KEYID = 6
3,078,635 UART: [afmc] SUBJECT.KEYID = 7
3,079,060 UART: [afmc] AUTHORITY.KEYID = 5
3,114,675 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,931 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,711 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,439 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,324 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,014 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,933 UART: [afmc] --
3,157,973 UART: [cold-reset] --
3,158,973 UART: [state] Locking Datavault
3,160,044 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,648 UART: [state] Locking ICCM
3,161,164 UART: [exit] Launching FMC @ 0x40000130
3,166,493 UART:
3,166,509 UART: Running Caliptra FMC ...
3,166,917 UART:
3,167,060 UART: [state] CFI Enabled
3,177,929 UART: [fht] FMC Alias Private Key: 7
3,285,996 UART: [art] Extend RT PCRs Done
3,286,424 UART: [art] Lock RT PCRs Done
3,288,204 UART: [art] Populate DV Done
3,296,263 UART: [fht] FMC Alias Private Key: 7
3,297,329 UART: [art] Derive CDI
3,297,609 UART: [art] Store in in slot 0x4
3,383,494 UART: [art] Derive Key Pair
3,383,854 UART: [art] Store priv key in slot 0x5
3,396,940 UART: [art] Derive Key Pair - Done
3,411,798 UART: [art] Signing Cert with AUTHO
3,412,278 UART: RITY.KEYID = 7
3,427,696 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,461 UART: [art] PUB.X = 73AFCEACED349596B6C6633D82F192F0A1C79EC3977A784F3D821CDA8741204E04829D0D167433C5075FD932CA5DAF1F
3,435,230 UART: [art] PUB.Y = 2F4A33E8EC67C9DF529A2355569EC3712A43C3DE213613F931BC0F6591784E63BCAA3AC06989B8EEDF2727051AD8FF28
3,442,182 UART: [art] SIG.R = D65AAFB3936061D5774F1F0A623D2551CCA85ACA5BC4337A4A110C77139AB2E5B4771DDE8A25E7DACA396E18DFDDC47D
3,448,966 UART: [art] SIG.S = E7A5BEA366F65E5073103779811D758E38CB2A7ADFB32BFD7D660EA2590B1632FE49C9DC79A1106DBADD826A6C217B40
3,472,833 UART: Caliptra RT
3,473,178 UART: [state] CFI Enabled
3,580,012 UART: [rt] RT listening for mailbox commands...
3,580,682 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,880 UART: [rt]cmd =0x41544d4e, len=14344
4,013,645 >>> mbox cmd response data (8 bytes)
4,013,646 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,731 UART: [rt]cmd =0x41545348, len=116
4,045,474 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,638 ready_for_fw is high
1,362,638 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,325 >>> mbox cmd response: success
2,990,037 UART:
2,990,053 UART: Running Caliptra FMC ...
2,990,461 UART:
2,990,604 UART: [state] CFI Enabled
3,001,245 UART: [fht] FMC Alias Private Key: 7
3,109,526 UART: [art] Extend RT PCRs Done
3,109,954 UART: [art] Lock RT PCRs Done
3,111,588 UART: [art] Populate DV Done
3,119,689 UART: [fht] FMC Alias Private Key: 7
3,120,803 UART: [art] Derive CDI
3,121,083 UART: [art] Store in in slot 0x4
3,206,922 UART: [art] Derive Key Pair
3,207,282 UART: [art] Store priv key in slot 0x5
3,220,502 UART: [art] Derive Key Pair - Done
3,235,229 UART: [art] Signing Cert with AUTHO
3,235,709 UART: RITY.KEYID = 7
3,250,325 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,090 UART: [art] PUB.X = E65E7F0B85C252C103C74973D586032F1158E2A8B79BC079373D93814B9B112FC748BB98C2DECB029ADBB80F9EF80105
3,257,843 UART: [art] PUB.Y = FD2D8D8AD3AD36C209F6AAB3492688D0B959B2A5394BAEF20B4CC5CF8945CA2B1F74D0360689E719A57CFDAE04F6C958
3,264,799 UART: [art] SIG.R = E19FE4B9E80A2073586DE0D33E56C11A7CEED2AA279CA754F98D5DC3C864A0DA6E51C568D3A29F963792CB8177FF275D
3,271,580 UART: [art] SIG.S = 107F74C66AA34A9E6C4181C2EAB6D2E439A59607346FEF518DC83A9BB16754073DCB19DA5A2A92E644B72148B4818828
3,294,803 UART: Caliptra RT
3,295,148 UART: [state] CFI Enabled
3,403,449 UART: [rt] RT listening for mailbox commands...
3,404,119 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,781 UART: [rt]cmd =0x41544d4e, len=14344
3,836,534 >>> mbox cmd response data (8 bytes)
3,836,535 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,738 UART: [rt]cmd =0x41545348, len=116
3,868,437 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,739 UART: [state] WD Timer not started. Device not locked for debugging
88,076 UART: [kat] SHA2-256
893,726 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,851 UART: [kat] ++
898,003 UART: [kat] sha1
902,289 UART: [kat] SHA2-256
904,229 UART: [kat] SHA2-384
907,108 UART: [kat] SHA2-512-ACC
909,009 UART: [kat] ECC-384
918,844 UART: [kat] HMAC-384Kdf
923,384 UART: [kat] LMS
1,171,712 UART: [kat] --
1,172,555 UART: [cold-reset] ++
1,172,985 UART: [fht] FHT @ 0x50003400
1,175,878 UART: [idev] ++
1,176,046 UART: [idev] CDI.KEYID = 6
1,176,406 UART: [idev] SUBJECT.KEYID = 7
1,176,830 UART: [idev] UDS.KEYID = 0
1,177,175 ready_for_fw is high
1,177,175 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,652 UART: [idev] Erasing UDS.KEYID = 0
1,201,607 UART: [idev] Sha1 KeyId Algorithm
1,210,033 UART: [idev] --
1,211,215 UART: [ldev] ++
1,211,383 UART: [ldev] CDI.KEYID = 6
1,211,746 UART: [ldev] SUBJECT.KEYID = 5
1,212,172 UART: [ldev] AUTHORITY.KEYID = 7
1,212,635 UART: [ldev] FE.KEYID = 1
1,217,735 UART: [ldev] Erasing FE.KEYID = 1
1,244,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,077 UART: [ldev] --
1,283,500 UART: [fwproc] Wait for Commands...
1,284,082 UART: [fwproc] Recv command 0x46574c44
1,284,810 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,382 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,686 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,581 >>> mbox cmd response: success
2,775,655 UART: [afmc] ++
2,775,823 UART: [afmc] CDI.KEYID = 6
2,776,185 UART: [afmc] SUBJECT.KEYID = 7
2,776,610 UART: [afmc] AUTHORITY.KEYID = 5
2,812,351 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,948 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,696 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,424 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,309 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,028 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,864 UART: [afmc] --
2,855,798 UART: [cold-reset] --
2,856,966 UART: [state] Locking Datavault
2,858,225 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,829 UART: [state] Locking ICCM
2,859,279 UART: [exit] Launching FMC @ 0x40000130
2,864,608 UART:
2,864,624 UART: Running Caliptra FMC ...
2,865,032 UART:
2,865,086 UART: [state] CFI Enabled
2,875,573 UART: [fht] FMC Alias Private Key: 7
2,983,544 UART: [art] Extend RT PCRs Done
2,983,972 UART: [art] Lock RT PCRs Done
2,985,532 UART: [art] Populate DV Done
2,993,647 UART: [fht] FMC Alias Private Key: 7
2,994,575 UART: [art] Derive CDI
2,994,855 UART: [art] Store in in slot 0x4
3,080,576 UART: [art] Derive Key Pair
3,080,936 UART: [art] Store priv key in slot 0x5
3,094,534 UART: [art] Derive Key Pair - Done
3,109,078 UART: [art] Signing Cert with AUTHO
3,109,558 UART: RITY.KEYID = 7
3,124,826 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,591 UART: [art] PUB.X = 63F3814DCF5D213A0E7F8A9FC7CA1C1F82FC575F79C9A5C0417835BE9421785A06EC11CA7FCD01670CE8630C8B519CF1
3,132,358 UART: [art] PUB.Y = E22392192451D5A0430A5C8BC0D94334A250A3EBAE70ECEEEEFF8DEEB121E0B6FA76B3E1BDF489D2F7440B3C4B075A52
3,139,319 UART: [art] SIG.R = EBCBB5AD51962F1CD6A7D7013AEF9C8C4B000846CD4D88346F0D4531E84C212A74F270C2F32FE5FA7E10023D599FDF0A
3,146,068 UART: [art] SIG.S = A0A41DDA529DCA7B9FB48BAA7607837B6A963E0B9AB1393D66B1CAAABFD096F60E6EB2C129BADD2A35537DF45C242437
3,169,636 UART: Caliptra RT
3,169,889 UART: [state] CFI Enabled
3,278,251 UART: [rt] RT listening for mailbox commands...
3,278,921 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,933 UART: [rt]cmd =0x41544d4e, len=14344
3,711,918 >>> mbox cmd response data (8 bytes)
3,711,919 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,050 UART: [rt]cmd =0x41545348, len=116
3,743,863 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,815 ready_for_fw is high
1,059,815 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,688 >>> mbox cmd response: success
2,688,454 UART:
2,688,470 UART: Running Caliptra FMC ...
2,688,878 UART:
2,688,932 UART: [state] CFI Enabled
2,699,687 UART: [fht] FMC Alias Private Key: 7
2,807,936 UART: [art] Extend RT PCRs Done
2,808,364 UART: [art] Lock RT PCRs Done
2,810,020 UART: [art] Populate DV Done
2,818,361 UART: [fht] FMC Alias Private Key: 7
2,819,349 UART: [art] Derive CDI
2,819,629 UART: [art] Store in in slot 0x4
2,905,774 UART: [art] Derive Key Pair
2,906,134 UART: [art] Store priv key in slot 0x5
2,919,532 UART: [art] Derive Key Pair - Done
2,934,119 UART: [art] Signing Cert with AUTHO
2,934,599 UART: RITY.KEYID = 7
2,949,773 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,538 UART: [art] PUB.X = 7C3C2D35F70986A43C06BDD20DA211A8EBD5F93A9B98956E180E9882E61163729DF94412D138BDC8970DEA28FDFAE473
2,957,301 UART: [art] PUB.Y = 686EBDB0C3D7AA16C298BABD822181A550A53643D9A4C525CF4DD609D3E887741F3BB288A59869AF83C4936665B442AD
2,964,254 UART: [art] SIG.R = 79805839D4D2BC3D1D0E3BBFD08CB2BCEC2C985CFD6278976C28D9FC3B2AE50D614DD39C0F881B00CCDA0162F21133DB
2,971,010 UART: [art] SIG.S = 423D42C43DDA121BF7DB13D2E6AABA3DA6FD439A47BF17DAC22A332FDAF83FB75BE5B95DCCDC6B358A38CC51B679AC8D
2,994,913 UART: Caliptra RT
2,995,166 UART: [state] CFI Enabled
3,103,003 UART: [rt] RT listening for mailbox commands...
3,103,673 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,791 UART: [rt]cmd =0x41544d4e, len=14344
3,536,486 >>> mbox cmd response data (8 bytes)
3,536,487 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,566,592 UART: [rt]cmd =0x41545348, len=116
3,568,327 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,815 UART: [state] LifecycleState = Unprovisioned
86,470 UART: [state] DebugLocked = No
87,056 UART: [state] WD Timer not started. Device not locked for debugging
88,353 UART: [kat] SHA2-256
894,003 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,128 UART: [kat] ++
898,280 UART: [kat] sha1
902,572 UART: [kat] SHA2-256
904,512 UART: [kat] SHA2-384
907,409 UART: [kat] SHA2-512-ACC
909,310 UART: [kat] ECC-384
919,103 UART: [kat] HMAC-384Kdf
923,705 UART: [kat] LMS
1,172,033 UART: [kat] --
1,173,118 UART: [cold-reset] ++
1,173,628 UART: [fht] FHT @ 0x50003400
1,176,291 UART: [idev] ++
1,176,459 UART: [idev] CDI.KEYID = 6
1,176,819 UART: [idev] SUBJECT.KEYID = 7
1,177,243 UART: [idev] UDS.KEYID = 0
1,177,588 ready_for_fw is high
1,177,588 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,393 UART: [idev] Erasing UDS.KEYID = 0
1,202,332 UART: [idev] Sha1 KeyId Algorithm
1,210,672 UART: [idev] --
1,211,574 UART: [ldev] ++
1,211,742 UART: [ldev] CDI.KEYID = 6
1,212,105 UART: [ldev] SUBJECT.KEYID = 5
1,212,531 UART: [ldev] AUTHORITY.KEYID = 7
1,212,994 UART: [ldev] FE.KEYID = 1
1,218,172 UART: [ldev] Erasing FE.KEYID = 1
1,244,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,798 UART: [ldev] --
1,284,071 UART: [fwproc] Wait for Commands...
1,284,767 UART: [fwproc] Recv command 0x46574c44
1,285,495 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,138 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,641 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,945 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,878 >>> mbox cmd response: success
2,777,134 UART: [afmc] ++
2,777,302 UART: [afmc] CDI.KEYID = 6
2,777,664 UART: [afmc] SUBJECT.KEYID = 7
2,778,089 UART: [afmc] AUTHORITY.KEYID = 5
2,813,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,629 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,357 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,242 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,961 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,789 UART: [afmc] --
2,856,667 UART: [cold-reset] --
2,857,463 UART: [state] Locking Datavault
2,858,230 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,834 UART: [state] Locking ICCM
2,859,442 UART: [exit] Launching FMC @ 0x40000130
2,864,771 UART:
2,864,787 UART: Running Caliptra FMC ...
2,865,195 UART:
2,865,338 UART: [state] CFI Enabled
2,876,317 UART: [fht] FMC Alias Private Key: 7
2,984,208 UART: [art] Extend RT PCRs Done
2,984,636 UART: [art] Lock RT PCRs Done
2,985,928 UART: [art] Populate DV Done
2,994,289 UART: [fht] FMC Alias Private Key: 7
2,995,247 UART: [art] Derive CDI
2,995,527 UART: [art] Store in in slot 0x4
3,081,202 UART: [art] Derive Key Pair
3,081,562 UART: [art] Store priv key in slot 0x5
3,094,924 UART: [art] Derive Key Pair - Done
3,109,609 UART: [art] Signing Cert with AUTHO
3,110,089 UART: RITY.KEYID = 7
3,125,639 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,404 UART: [art] PUB.X = C72103AD2A86349E15125E1D84DA7F6E03D1C054D18BA407CD358818514E3378E2397934545E8F50F28EA36464B1B3A3
3,133,159 UART: [art] PUB.Y = 073F288ADD1334FBC1BB6FB5DF422A5619C002238CF551681F537A3727F7066742972AD77881FE3EB9522226677FA8A8
3,140,096 UART: [art] SIG.R = 89B01DA27B99F7479F79D2BF907659EB395702BD372857E63DE46F08AAE5B760CAFFB0372CC618ABC5F270DC37BDB823
3,146,872 UART: [art] SIG.S = 057D487D0410C908C76B36A0B39D37BC2D64D53299AAE3893465B65492302140C17392732800052CABFE6CFC2AF4906B
3,170,863 UART: Caliptra RT
3,171,208 UART: [state] CFI Enabled
3,278,225 UART: [rt] RT listening for mailbox commands...
3,278,895 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,821 UART: [rt]cmd =0x41544d4e, len=14344
3,711,930 >>> mbox cmd response data (8 bytes)
3,711,931 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,874 UART: [rt]cmd =0x41545348, len=116
3,743,735 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,724 ready_for_fw is high
1,060,724 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,179 >>> mbox cmd response: success
2,690,001 UART:
2,690,017 UART: Running Caliptra FMC ...
2,690,425 UART:
2,690,568 UART: [state] CFI Enabled
2,701,421 UART: [fht] FMC Alias Private Key: 7
2,809,768 UART: [art] Extend RT PCRs Done
2,810,196 UART: [art] Lock RT PCRs Done
2,811,816 UART: [art] Populate DV Done
2,819,859 UART: [fht] FMC Alias Private Key: 7
2,820,819 UART: [art] Derive CDI
2,821,099 UART: [art] Store in in slot 0x4
2,906,880 UART: [art] Derive Key Pair
2,907,240 UART: [art] Store priv key in slot 0x5
2,920,794 UART: [art] Derive Key Pair - Done
2,935,834 UART: [art] Signing Cert with AUTHO
2,936,314 UART: RITY.KEYID = 7
2,951,446 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,211 UART: [art] PUB.X = 49DF70206EDFD6000FB689CA835C83943BFEF76006ABA4CA8027761593F1F3EE8D260D4264446DCE332DCFE1D44089C6
2,958,958 UART: [art] PUB.Y = B969B32991FDE4AC590602ED6BCFB2410815A95E9E97EC9567C1072570646F6034C4C6CA94A8FE1ED22AF24038BEA5F6
2,965,904 UART: [art] SIG.R = 7E847A6EEEBA17FDC422BD5E3045CCC053FA7457DF6FE3A91A6BADFF950AC2D329B6356D591E2900136C52F121CD3C52
2,972,667 UART: [art] SIG.S = 6B7B707F1D84E25104CB73104B03EAF60DA4A6BFC942B120550A87930EEBEEF9E8EE30CF1AADC184FD98356A7106533E
2,997,036 UART: Caliptra RT
2,997,381 UART: [state] CFI Enabled
3,105,968 UART: [rt] RT listening for mailbox commands...
3,106,638 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,586 UART: [rt]cmd =0x41544d4e, len=14344
3,539,079 >>> mbox cmd response data (8 bytes)
3,539,080 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,569,039 UART: [rt]cmd =0x41545348, len=116
3,570,808 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,472 UART: [state] LifecycleState = Unprovisioned
86,127 UART: [state] DebugLocked = No
86,683 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
891,426 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,555 UART: [kat] ++
895,707 UART: [kat] sha1
900,057 UART: [kat] SHA2-256
901,997 UART: [kat] SHA2-384
904,910 UART: [kat] SHA2-512-ACC
906,811 UART: [kat] ECC-384
916,296 UART: [kat] HMAC-384Kdf
920,982 UART: [kat] LMS
1,169,294 UART: [kat] --
1,170,343 UART: [cold-reset] ++
1,170,779 UART: [fht] FHT @ 0x50003400
1,173,389 UART: [idev] ++
1,173,557 UART: [idev] CDI.KEYID = 6
1,173,918 UART: [idev] SUBJECT.KEYID = 7
1,174,343 UART: [idev] UDS.KEYID = 0
1,174,689 ready_for_fw is high
1,174,689 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,969 UART: [idev] Erasing UDS.KEYID = 0
1,199,223 UART: [idev] Sha1 KeyId Algorithm
1,208,083 UART: [idev] --
1,209,080 UART: [ldev] ++
1,209,248 UART: [ldev] CDI.KEYID = 6
1,209,612 UART: [ldev] SUBJECT.KEYID = 5
1,210,039 UART: [ldev] AUTHORITY.KEYID = 7
1,210,502 UART: [ldev] FE.KEYID = 1
1,215,770 UART: [ldev] Erasing FE.KEYID = 1
1,241,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,956 UART: [ldev] --
1,281,370 UART: [fwproc] Wait for Commands...
1,282,159 UART: [fwproc] Recv command 0x46574c44
1,282,892 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,114 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,423 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,285 >>> mbox cmd response: success
2,775,464 UART: [afmc] ++
2,775,632 UART: [afmc] CDI.KEYID = 6
2,775,995 UART: [afmc] SUBJECT.KEYID = 7
2,776,421 UART: [afmc] AUTHORITY.KEYID = 5
2,811,464 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,100 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,851 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,580 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,463 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,182 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,965 UART: [afmc] --
2,855,075 UART: [cold-reset] --
2,856,053 UART: [state] Locking Datavault
2,857,530 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,134 UART: [state] Locking ICCM
2,858,624 UART: [exit] Launching FMC @ 0x40000130
2,863,953 UART:
2,863,969 UART: Running Caliptra FMC ...
2,864,377 UART:
2,864,431 UART: [state] CFI Enabled
2,874,976 UART: [fht] FMC Alias Private Key: 7
2,982,691 UART: [art] Extend RT PCRs Done
2,983,119 UART: [art] Lock RT PCRs Done
2,984,275 UART: [art] Populate DV Done
2,992,686 UART: [fht] FMC Alias Private Key: 7
2,993,712 UART: [art] Derive CDI
2,993,992 UART: [art] Store in in slot 0x4
3,079,815 UART: [art] Derive Key Pair
3,080,175 UART: [art] Store priv key in slot 0x5
3,093,513 UART: [art] Derive Key Pair - Done
3,108,084 UART: [art] Signing Cert with AUTHO
3,108,564 UART: RITY.KEYID = 7
3,124,240 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,005 UART: [art] PUB.X = 021A2E8D169B3BCD120529EA96381B11B0E9832EFF962A219BC99769DF8906729B5A11DBFDAEE4138809F75E0655C7BA
3,131,766 UART: [art] PUB.Y = 6F626B3C219A8673AC96AE2145556097ED26CDBBBD054724C812D5787C4D7E871B61FD57D0FD95A37C5595E124B15E03
3,138,712 UART: [art] SIG.R = D3FC62569F1F75AA71BB0E2307F5C7BC997D265F60878E2F0F55EB746379BA45843955DB9F468A8B37EB81D444C6633E
3,145,477 UART: [art] SIG.S = 6FFD5CE5391B8D9A7054B05A0FABB8A0EA0778AC7900D12AA5686B3C670DBA324D1EF7D5A7A12F15B8A7E7A3C68E535A
3,169,267 UART: Caliptra RT
3,169,520 UART: [state] CFI Enabled
3,275,609 UART: [rt] RT listening for mailbox commands...
3,276,279 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,505 UART: [rt]cmd =0x41544d4e, len=14344
3,709,582 >>> mbox cmd response data (8 bytes)
3,709,583 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,724 UART: [rt]cmd =0x41545348, len=116
3,741,307 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,824 ready_for_fw is high
1,055,824 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,935 >>> mbox cmd response: success
2,683,713 UART:
2,683,729 UART: Running Caliptra FMC ...
2,684,137 UART:
2,684,191 UART: [state] CFI Enabled
2,694,470 UART: [fht] FMC Alias Private Key: 7
2,802,455 UART: [art] Extend RT PCRs Done
2,802,883 UART: [art] Lock RT PCRs Done
2,804,421 UART: [art] Populate DV Done
2,812,610 UART: [fht] FMC Alias Private Key: 7
2,813,642 UART: [art] Derive CDI
2,813,922 UART: [art] Store in in slot 0x4
2,899,493 UART: [art] Derive Key Pair
2,899,853 UART: [art] Store priv key in slot 0x5
2,912,999 UART: [art] Derive Key Pair - Done
2,927,853 UART: [art] Signing Cert with AUTHO
2,928,333 UART: RITY.KEYID = 7
2,943,619 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,384 UART: [art] PUB.X = 9099488D2B0AA3A6F62B418B3D8D499402D449C9C18084D8C13A783443FD9A29A65AF9B0E87DD312D1C4534C98A1B457
2,951,148 UART: [art] PUB.Y = DFFBB129CAC86BD38526C6450A9C4BA714447AA09DEA00284A70C08C6C05D610D9BB8E0D1E018E4F5345BABDB91DA9AE
2,958,086 UART: [art] SIG.R = A08EE149DC02B77368ABAE420EDA181AFC40FE185BB0AFEC93C4910F3AB40403087EA29CBB497B4A734032298C5ACF23
2,964,854 UART: [art] SIG.S = 1C7AA84C76B27D4D68EE28D460C7962CFE8550D25740F94022FCDB9ECE2488857635E996F8D2941C66068B6B1FD9A60E
2,988,231 UART: Caliptra RT
2,988,484 UART: [state] CFI Enabled
3,095,429 UART: [rt] RT listening for mailbox commands...
3,096,099 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,219 UART: [rt]cmd =0x41544d4e, len=14344
3,529,044 >>> mbox cmd response data (8 bytes)
3,529,045 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,106 UART: [rt]cmd =0x41545348, len=116
3,560,989 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,625 UART: [state] LifecycleState = Unprovisioned
86,280 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
891,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,702 UART: [kat] ++
895,854 UART: [kat] sha1
900,240 UART: [kat] SHA2-256
902,180 UART: [kat] SHA2-384
905,111 UART: [kat] SHA2-512-ACC
907,012 UART: [kat] ECC-384
916,649 UART: [kat] HMAC-384Kdf
921,299 UART: [kat] LMS
1,169,611 UART: [kat] --
1,170,596 UART: [cold-reset] ++
1,171,136 UART: [fht] FHT @ 0x50003400
1,173,944 UART: [idev] ++
1,174,112 UART: [idev] CDI.KEYID = 6
1,174,473 UART: [idev] SUBJECT.KEYID = 7
1,174,898 UART: [idev] UDS.KEYID = 0
1,175,244 ready_for_fw is high
1,175,244 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,784 UART: [idev] Erasing UDS.KEYID = 0
1,200,298 UART: [idev] Sha1 KeyId Algorithm
1,209,402 UART: [idev] --
1,210,565 UART: [ldev] ++
1,210,733 UART: [ldev] CDI.KEYID = 6
1,211,097 UART: [ldev] SUBJECT.KEYID = 5
1,211,524 UART: [ldev] AUTHORITY.KEYID = 7
1,211,987 UART: [ldev] FE.KEYID = 1
1,217,121 UART: [ldev] Erasing FE.KEYID = 1
1,244,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,189 UART: [ldev] --
1,283,609 UART: [fwproc] Wait for Commands...
1,284,370 UART: [fwproc] Recv command 0x46574c44
1,285,103 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,869 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,178 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,990 >>> mbox cmd response: success
2,777,171 UART: [afmc] ++
2,777,339 UART: [afmc] CDI.KEYID = 6
2,777,702 UART: [afmc] SUBJECT.KEYID = 7
2,778,128 UART: [afmc] AUTHORITY.KEYID = 5
2,814,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,991 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,742 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,471 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,354 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,073 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,910 UART: [afmc] --
2,857,934 UART: [cold-reset] --
2,859,016 UART: [state] Locking Datavault
2,860,179 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,783 UART: [state] Locking ICCM
2,861,281 UART: [exit] Launching FMC @ 0x40000130
2,866,610 UART:
2,866,626 UART: Running Caliptra FMC ...
2,867,034 UART:
2,867,177 UART: [state] CFI Enabled
2,877,556 UART: [fht] FMC Alias Private Key: 7
2,985,967 UART: [art] Extend RT PCRs Done
2,986,395 UART: [art] Lock RT PCRs Done
2,988,165 UART: [art] Populate DV Done
2,996,498 UART: [fht] FMC Alias Private Key: 7
2,997,558 UART: [art] Derive CDI
2,997,838 UART: [art] Store in in slot 0x4
3,083,469 UART: [art] Derive Key Pair
3,083,829 UART: [art] Store priv key in slot 0x5
3,096,745 UART: [art] Derive Key Pair - Done
3,111,599 UART: [art] Signing Cert with AUTHO
3,112,079 UART: RITY.KEYID = 7
3,127,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,106 UART: [art] PUB.X = 8C8C806CEBA1433C9EAC97B320F41FE7CEDDA8F29D076581AA743C2E50CC0BFA8BC515B20B10BA4484F21C44A6D01668
3,134,885 UART: [art] PUB.Y = 19827861F5B754713A61465BED8F5010789F90EA9DBCAEFC5102D2C023D2EC709452CD65CE446B8AFFEBFD47960627D4
3,141,837 UART: [art] SIG.R = E114768917F68D445EF1ECE137FC585CCA7CA0AEE34BBC3978AB0F2E6D1A29A832C2C73831022996D45530919D22A355
3,148,605 UART: [art] SIG.S = 35996F9471F179ADF066350FC9B9826814969EFA5CF6873CA5B16DE365C65F1505FEB11C007B8DA405CBACF0090D4D26
3,171,967 UART: Caliptra RT
3,172,312 UART: [state] CFI Enabled
3,280,007 UART: [rt] RT listening for mailbox commands...
3,280,677 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,671 UART: [rt]cmd =0x41544d4e, len=14344
3,714,026 >>> mbox cmd response data (8 bytes)
3,714,027 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,934 UART: [rt]cmd =0x41545348, len=116
3,745,693 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,517 ready_for_fw is high
1,056,517 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,956 >>> mbox cmd response: success
2,684,374 UART:
2,684,390 UART: Running Caliptra FMC ...
2,684,798 UART:
2,684,941 UART: [state] CFI Enabled
2,695,480 UART: [fht] FMC Alias Private Key: 7
2,803,611 UART: [art] Extend RT PCRs Done
2,804,039 UART: [art] Lock RT PCRs Done
2,805,669 UART: [art] Populate DV Done
2,813,844 UART: [fht] FMC Alias Private Key: 7
2,814,784 UART: [art] Derive CDI
2,815,064 UART: [art] Store in in slot 0x4
2,900,575 UART: [art] Derive Key Pair
2,900,935 UART: [art] Store priv key in slot 0x5
2,914,441 UART: [art] Derive Key Pair - Done
2,929,194 UART: [art] Signing Cert with AUTHO
2,929,674 UART: RITY.KEYID = 7
2,944,896 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,661 UART: [art] PUB.X = BB53EBE7D540D802F6467844E2EF05167029E37D5820456F09F4C4B712570463B6563D0EB83813A7130204C0DF9E24F0
2,952,402 UART: [art] PUB.Y = AE499BAA8330E6EB43DECE2D372E4E1ABA90CFF275B85DB02736065D2C6EF7CC55B0AB77E1FAB400A41BA54838154255
2,959,345 UART: [art] SIG.R = 2F957E3833734AAA3584500702196AEFD0F64C12E70FB06E3E032BD1866B80FF037EB041C6D226C7562EEBCAA9290189
2,966,099 UART: [art] SIG.S = 6DC0542E79EFBC40910BF2E39C105FC03B7C974551D88605439F0878595289A7D135F9E2080742D022BD630C3BD64DAB
2,989,488 UART: Caliptra RT
2,989,833 UART: [state] CFI Enabled
3,098,648 UART: [rt] RT listening for mailbox commands...
3,099,318 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,340 UART: [rt]cmd =0x41544d4e, len=14344
3,532,937 >>> mbox cmd response data (8 bytes)
3,532,938 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,173 UART: [rt]cmd =0x41545348, len=116
3,565,082 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,409 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,043 UART: [kat] SHA2-256
881,974 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,089 UART: [kat] ++
886,241 UART: [kat] sha1
890,433 UART: [kat] SHA2-256
892,371 UART: [kat] SHA2-384
895,138 UART: [kat] SHA2-512-ACC
897,039 UART: [kat] ECC-384
902,692 UART: [kat] HMAC-384Kdf
907,300 UART: [kat] LMS
1,475,496 UART: [kat] --
1,476,647 UART: [cold-reset] ++
1,477,081 UART: [fht] Storing FHT @ 0x50003400
1,479,778 UART: [idev] ++
1,479,946 UART: [idev] CDI.KEYID = 6
1,480,306 UART: [idev] SUBJECT.KEYID = 7
1,480,730 UART: [idev] UDS.KEYID = 0
1,481,075 ready_for_fw is high
1,481,075 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,806 UART: [idev] Erasing UDS.KEYID = 0
1,505,262 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,922 UART: [idev] --
1,515,005 UART: [ldev] ++
1,515,173 UART: [ldev] CDI.KEYID = 6
1,515,536 UART: [ldev] SUBJECT.KEYID = 5
1,515,962 UART: [ldev] AUTHORITY.KEYID = 7
1,516,425 UART: [ldev] FE.KEYID = 1
1,521,343 UART: [ldev] Erasing FE.KEYID = 1
1,546,060 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,018 UART: [ldev] --
1,585,499 UART: [fwproc] Waiting for Commands...
1,586,142 UART: [fwproc] Received command 0x46574c44
1,586,933 UART: [fwproc] Received Image of size 114332 bytes
2,885,159 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,217 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,569 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,352 >>> mbox cmd response: success
3,077,600 UART: [afmc] ++
3,077,768 UART: [afmc] CDI.KEYID = 6
3,078,130 UART: [afmc] SUBJECT.KEYID = 7
3,078,555 UART: [afmc] AUTHORITY.KEYID = 5
3,113,242 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,586 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,366 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,094 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,979 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,669 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,440 UART: [afmc] --
3,156,480 UART: [cold-reset] --
3,157,564 UART: [state] Locking Datavault
3,158,619 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,223 UART: [state] Locking ICCM
3,159,795 UART: [exit] Launching FMC @ 0x40000130
3,165,124 UART:
3,165,140 UART: Running Caliptra FMC ...
3,165,548 UART:
3,165,602 UART: [state] CFI Enabled
3,175,867 UART: [fht] FMC Alias Private Key: 7
3,284,240 UART: [art] Extend RT PCRs Done
3,284,668 UART: [art] Lock RT PCRs Done
3,285,998 UART: [art] Populate DV Done
3,294,125 UART: [fht] FMC Alias Private Key: 7
3,295,151 UART: [art] Derive CDI
3,295,431 UART: [art] Store in in slot 0x4
3,381,064 UART: [art] Derive Key Pair
3,381,424 UART: [art] Store priv key in slot 0x5
3,394,688 UART: [art] Derive Key Pair - Done
3,409,437 UART: [art] Signing Cert with AUTHO
3,409,917 UART: RITY.KEYID = 7
3,425,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,988 UART: [art] PUB.X = 07AEBF3A6D3F0F13D969A53FA4DC3826A07657933385477CDDD225366446E54FC43963A5E82F47FBA5533BCA7BF891A4
3,432,758 UART: [art] PUB.Y = 733C157DB2BEC9AB66C5A4273FA934CC9976993A984FE768884C5A87768E7D41A197B43158B759F668AB13AE56F8C9E3
3,439,710 UART: [art] SIG.R = 61E634C134D8D272E0B41F4B5F1C309160D3D1B7BB01B704D94CC917EB568CEF6C5B119C125782E69DF2C301C2197444
3,446,473 UART: [art] SIG.S = AF90BE41A601BE13C4F407F8A8BD42056CED6B5389DE5F8C68CA08DACF8C93E551F57339DF1F1FDA7CB39612D87BFD87
3,470,798 UART: Caliptra RT
3,471,051 UART: [state] CFI Enabled
3,578,904 UART: [rt] RT listening for mailbox commands...
3,579,574 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,386 UART: [rt]cmd =0x41544d4e, len=14344
4,012,511 >>> mbox cmd response data (8 bytes)
4,012,512 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,411 UART: [rt]cmd =0x41545348, len=116
4,064,254 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,215 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,749 UART: [kat] SHA2-256
881,680 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,795 UART: [kat] ++
885,947 UART: [kat] sha1
890,323 UART: [kat] SHA2-256
892,261 UART: [kat] SHA2-384
895,022 UART: [kat] SHA2-512-ACC
896,923 UART: [kat] ECC-384
902,700 UART: [kat] HMAC-384Kdf
907,326 UART: [kat] LMS
1,475,522 UART: [kat] --
1,476,091 UART: [cold-reset] ++
1,476,445 UART: [fht] Storing FHT @ 0x50003400
1,479,428 UART: [idev] ++
1,479,596 UART: [idev] CDI.KEYID = 6
1,479,956 UART: [idev] SUBJECT.KEYID = 7
1,480,380 UART: [idev] UDS.KEYID = 0
1,480,725 ready_for_fw is high
1,480,725 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,434 UART: [idev] Erasing UDS.KEYID = 0
1,504,908 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,638 UART: [idev] --
1,514,685 UART: [ldev] ++
1,514,853 UART: [ldev] CDI.KEYID = 6
1,515,216 UART: [ldev] SUBJECT.KEYID = 5
1,515,642 UART: [ldev] AUTHORITY.KEYID = 7
1,516,105 UART: [ldev] FE.KEYID = 1
1,521,645 UART: [ldev] Erasing FE.KEYID = 1
1,547,208 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,140 UART: [ldev] --
1,586,407 UART: [fwproc] Waiting for Commands...
1,587,066 UART: [fwproc] Received command 0x46574c44
1,587,857 UART: [fwproc] Received Image of size 114332 bytes
2,885,423 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,761 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,113 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,090 >>> mbox cmd response: success
3,080,110 UART: [afmc] ++
3,080,278 UART: [afmc] CDI.KEYID = 6
3,080,640 UART: [afmc] SUBJECT.KEYID = 7
3,081,065 UART: [afmc] AUTHORITY.KEYID = 5
3,116,498 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,768 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,548 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,276 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,161 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,851 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,686 UART: [afmc] --
3,159,568 UART: [cold-reset] --
3,160,152 UART: [state] Locking Datavault
3,161,369 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,973 UART: [state] Locking ICCM
3,162,523 UART: [exit] Launching FMC @ 0x40000130
3,167,852 UART:
3,167,868 UART: Running Caliptra FMC ...
3,168,276 UART:
3,168,330 UART: [state] CFI Enabled
3,178,645 UART: [fht] FMC Alias Private Key: 7
3,286,654 UART: [art] Extend RT PCRs Done
3,287,082 UART: [art] Lock RT PCRs Done
3,288,874 UART: [art] Populate DV Done
3,297,127 UART: [fht] FMC Alias Private Key: 7
3,298,215 UART: [art] Derive CDI
3,298,495 UART: [art] Store in in slot 0x4
3,384,336 UART: [art] Derive Key Pair
3,384,696 UART: [art] Store priv key in slot 0x5
3,398,040 UART: [art] Derive Key Pair - Done
3,412,984 UART: [art] Signing Cert with AUTHO
3,413,464 UART: RITY.KEYID = 7
3,428,826 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,591 UART: [art] PUB.X = 83DFA939CA1A147E2DDC0225E381765F223CFBCBF867C1FA44F9DD01969DF864080ED7D15A1878EE071F95C08700F28D
3,436,334 UART: [art] PUB.Y = 76D2911297E0ED58836D15B51CE90FFEDF3E4A2075432AFB2C6ECE65E8DB14DC1095C80E817B6F87592B559C2F5BDD09
3,443,287 UART: [art] SIG.R = 255DCA0DFC2D1F16F01C9E1851C719730C989ECD20916FAB3514362579C8F35C6A160DB08F16BB01EEF75349DCA6EEDE
3,450,059 UART: [art] SIG.S = 938DF4FB45CFE6351A24CB7FCC3EF3B0E1AE0B5337FEC2EA74E408D3B37A61034B95A126DE63EF604A7B362B227A9503
3,473,628 UART: Caliptra RT
3,473,881 UART: [state] CFI Enabled
3,582,410 UART: [rt] RT listening for mailbox commands...
3,583,080 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,178 UART: [rt]cmd =0x41544d4e, len=14344
4,016,240 >>> mbox cmd response data (8 bytes)
4,016,241 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,252 UART: [rt]cmd =0x41545348, len=116
4,048,185 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,675 ready_for_fw is high
1,362,675 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,628 >>> mbox cmd response: success
2,988,896 UART:
2,988,912 UART: Running Caliptra FMC ...
2,989,320 UART:
2,989,374 UART: [state] CFI Enabled
3,000,183 UART: [fht] FMC Alias Private Key: 7
3,107,730 UART: [art] Extend RT PCRs Done
3,108,158 UART: [art] Lock RT PCRs Done
3,109,692 UART: [art] Populate DV Done
3,117,827 UART: [fht] FMC Alias Private Key: 7
3,118,805 UART: [art] Derive CDI
3,119,085 UART: [art] Store in in slot 0x4
3,204,888 UART: [art] Derive Key Pair
3,205,248 UART: [art] Store priv key in slot 0x5
3,218,216 UART: [art] Derive Key Pair - Done
3,233,207 UART: [art] Signing Cert with AUTHO
3,233,687 UART: RITY.KEYID = 7
3,249,329 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,094 UART: [art] PUB.X = D25729496A35249A575DFE06C490F9543FC665FA9702D7393E5F4C561255B5910BA3C4C3023EA37CCFB6A47F6CAEAD86
3,256,858 UART: [art] PUB.Y = 4D7EF71C6AA4BDDDC0FB08D65DD79AC203533B1D03D2F59BFA2A67B88D32E3FC02B514A215847CE2E31C52EF3CA0049A
3,263,815 UART: [art] SIG.R = 6F623E971F86B1574225504D5737DD5C15551D1B4E13E4B91280B5B92C98020E8D285488397B011ABF87E2B56BB8ADB5
3,270,572 UART: [art] SIG.S = EB1A4D46A9C9B45E0F4DE6D90126D4C298C048F110BDA163D4A09E5E8DE81CFD71F3718A33B102B93F03DFE592B750D8
3,294,715 UART: Caliptra RT
3,294,968 UART: [state] CFI Enabled
3,402,719 UART: [rt] RT listening for mailbox commands...
3,403,389 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,201 UART: [rt]cmd =0x41544d4e, len=14344
3,835,958 >>> mbox cmd response data (8 bytes)
3,835,959 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,188 UART: [rt]cmd =0x41545348, len=116
3,888,025 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,767 ready_for_fw is high
1,362,767 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,324 >>> mbox cmd response: success
2,986,298 UART:
2,986,314 UART: Running Caliptra FMC ...
2,986,722 UART:
2,986,776 UART: [state] CFI Enabled
2,997,215 UART: [fht] FMC Alias Private Key: 7
3,105,006 UART: [art] Extend RT PCRs Done
3,105,434 UART: [art] Lock RT PCRs Done
3,107,082 UART: [art] Populate DV Done
3,115,565 UART: [fht] FMC Alias Private Key: 7
3,116,611 UART: [art] Derive CDI
3,116,891 UART: [art] Store in in slot 0x4
3,202,942 UART: [art] Derive Key Pair
3,203,302 UART: [art] Store priv key in slot 0x5
3,216,758 UART: [art] Derive Key Pair - Done
3,231,427 UART: [art] Signing Cert with AUTHO
3,231,907 UART: RITY.KEYID = 7
3,247,151 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,916 UART: [art] PUB.X = 93476EEA904D3769319925801FF2CB80237E461DF6CACF985E875CC8D108106CF1A568D282C85B5CF6238FE5C8AC2189
3,254,685 UART: [art] PUB.Y = D9AB8A4F1A7751FA010A7D0D8162DEFFCE721834339D8DFBB51C93F4BDFE0AF413288EE96B341E76685A47E5C7A4FD0D
3,261,640 UART: [art] SIG.R = 6A99D6DEB931CC36D7E154F005FD3A739E44BA790DA5605978A2E927CFB742F84D993D5152C650027C685B7854833CEF
3,268,403 UART: [art] SIG.S = 97458F2A69A06552423A68A108C003E00382EF209A6A75F61EC30F4312CBF3F959D251B9FBC98738E8C7C7455CEFD4C0
3,292,520 UART: Caliptra RT
3,292,773 UART: [state] CFI Enabled
3,401,406 UART: [rt] RT listening for mailbox commands...
3,402,076 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,110 UART: [rt]cmd =0x41544d4e, len=14344
3,834,938 >>> mbox cmd response data (8 bytes)
3,834,939 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,010 UART: [rt]cmd =0x41545348, len=116
3,866,971 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,790 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,314 UART: [kat] SHA2-256
882,245 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,360 UART: [kat] ++
886,512 UART: [kat] sha1
890,788 UART: [kat] SHA2-256
892,726 UART: [kat] SHA2-384
895,611 UART: [kat] SHA2-512-ACC
897,512 UART: [kat] ECC-384
903,023 UART: [kat] HMAC-384Kdf
907,549 UART: [kat] LMS
1,475,745 UART: [kat] --
1,476,278 UART: [cold-reset] ++
1,476,652 UART: [fht] Storing FHT @ 0x50003400
1,479,491 UART: [idev] ++
1,479,659 UART: [idev] CDI.KEYID = 6
1,480,019 UART: [idev] SUBJECT.KEYID = 7
1,480,443 UART: [idev] UDS.KEYID = 0
1,480,788 ready_for_fw is high
1,480,788 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,843 UART: [idev] Erasing UDS.KEYID = 0
1,505,295 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,929 UART: [idev] --
1,514,858 UART: [ldev] ++
1,515,026 UART: [ldev] CDI.KEYID = 6
1,515,389 UART: [ldev] SUBJECT.KEYID = 5
1,515,815 UART: [ldev] AUTHORITY.KEYID = 7
1,516,278 UART: [ldev] FE.KEYID = 1
1,521,308 UART: [ldev] Erasing FE.KEYID = 1
1,546,753 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,805 UART: [ldev] --
1,586,274 UART: [fwproc] Waiting for Commands...
1,586,907 UART: [fwproc] Received command 0x46574c44
1,587,698 UART: [fwproc] Received Image of size 114332 bytes
2,885,732 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,034 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,386 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,335 >>> mbox cmd response: success
3,078,349 UART: [afmc] ++
3,078,517 UART: [afmc] CDI.KEYID = 6
3,078,879 UART: [afmc] SUBJECT.KEYID = 7
3,079,304 UART: [afmc] AUTHORITY.KEYID = 5
3,114,295 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,383 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,163 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,891 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,776 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,466 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,493 UART: [afmc] --
3,157,443 UART: [cold-reset] --
3,158,383 UART: [state] Locking Datavault
3,159,700 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,304 UART: [state] Locking ICCM
3,160,896 UART: [exit] Launching FMC @ 0x40000130
3,166,225 UART:
3,166,241 UART: Running Caliptra FMC ...
3,166,649 UART:
3,166,792 UART: [state] CFI Enabled
3,177,517 UART: [fht] FMC Alias Private Key: 7
3,285,744 UART: [art] Extend RT PCRs Done
3,286,172 UART: [art] Lock RT PCRs Done
3,288,124 UART: [art] Populate DV Done
3,296,373 UART: [fht] FMC Alias Private Key: 7
3,297,495 UART: [art] Derive CDI
3,297,775 UART: [art] Store in in slot 0x4
3,383,166 UART: [art] Derive Key Pair
3,383,526 UART: [art] Store priv key in slot 0x5
3,397,146 UART: [art] Derive Key Pair - Done
3,411,777 UART: [art] Signing Cert with AUTHO
3,412,257 UART: RITY.KEYID = 7
3,427,789 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,554 UART: [art] PUB.X = 440F8B1C00C678907E90975316FB3CA27DDCA0A35DB207613D8366E02D6BA961AC682CFA6919DB408BB3D439EA6FB2C0
3,435,306 UART: [art] PUB.Y = 65AFC1F6EE639808F928C0166E999B228F9104914CE9B31225482F14F7203BBBBAB1C77730098E8E07107CA1FDDE061E
3,442,243 UART: [art] SIG.R = D5A764A7076E4F06A1BB5512585AB86CBA39397F98579AF50401EA5E0BB3D259B64478D9C55CAF5DCD4622BAA5CF7BFA
3,449,014 UART: [art] SIG.S = 99A3BB6E1ED53095E3063C296C308A76E7FE05A74B0C15CFD2683F36DA2ED6198808DBE056388752064E32A55C12D506
3,473,137 UART: Caliptra RT
3,473,482 UART: [state] CFI Enabled
3,580,368 UART: [rt] RT listening for mailbox commands...
3,581,038 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,964 UART: [rt]cmd =0x41544d4e, len=14344
4,014,315 >>> mbox cmd response data (8 bytes)
4,014,316 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,593 UART: [rt]cmd =0x41545348, len=116
4,066,694 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,928 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,466 UART: [kat] SHA2-256
882,397 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,512 UART: [kat] ++
886,664 UART: [kat] sha1
890,992 UART: [kat] SHA2-256
892,930 UART: [kat] SHA2-384
895,645 UART: [kat] SHA2-512-ACC
897,546 UART: [kat] ECC-384
903,599 UART: [kat] HMAC-384Kdf
908,161 UART: [kat] LMS
1,476,357 UART: [kat] --
1,477,270 UART: [cold-reset] ++
1,477,766 UART: [fht] Storing FHT @ 0x50003400
1,480,615 UART: [idev] ++
1,480,783 UART: [idev] CDI.KEYID = 6
1,481,143 UART: [idev] SUBJECT.KEYID = 7
1,481,567 UART: [idev] UDS.KEYID = 0
1,481,912 ready_for_fw is high
1,481,912 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,489 UART: [idev] Erasing UDS.KEYID = 0
1,506,373 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,107 UART: [idev] --
1,516,182 UART: [ldev] ++
1,516,350 UART: [ldev] CDI.KEYID = 6
1,516,713 UART: [ldev] SUBJECT.KEYID = 5
1,517,139 UART: [ldev] AUTHORITY.KEYID = 7
1,517,602 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,548,007 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,493 UART: [ldev] --
1,587,852 UART: [fwproc] Waiting for Commands...
1,588,487 UART: [fwproc] Received command 0x46574c44
1,589,278 UART: [fwproc] Received Image of size 114332 bytes
2,887,757 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,993 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,345 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,081,264 >>> mbox cmd response: success
3,082,314 UART: [afmc] ++
3,082,482 UART: [afmc] CDI.KEYID = 6
3,082,844 UART: [afmc] SUBJECT.KEYID = 7
3,083,269 UART: [afmc] AUTHORITY.KEYID = 5
3,118,756 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,056 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,836 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,564 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,449 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,139 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,964 UART: [afmc] --
3,161,890 UART: [cold-reset] --
3,162,780 UART: [state] Locking Datavault
3,163,853 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,457 UART: [state] Locking ICCM
3,165,001 UART: [exit] Launching FMC @ 0x40000130
3,170,330 UART:
3,170,346 UART: Running Caliptra FMC ...
3,170,754 UART:
3,170,897 UART: [state] CFI Enabled
3,181,218 UART: [fht] FMC Alias Private Key: 7
3,289,081 UART: [art] Extend RT PCRs Done
3,289,509 UART: [art] Lock RT PCRs Done
3,291,083 UART: [art] Populate DV Done
3,299,570 UART: [fht] FMC Alias Private Key: 7
3,300,538 UART: [art] Derive CDI
3,300,818 UART: [art] Store in in slot 0x4
3,386,383 UART: [art] Derive Key Pair
3,386,743 UART: [art] Store priv key in slot 0x5
3,400,027 UART: [art] Derive Key Pair - Done
3,414,861 UART: [art] Signing Cert with AUTHO
3,415,341 UART: RITY.KEYID = 7
3,430,417 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,182 UART: [art] PUB.X = 6417E9B88ED180CDE9E361D266F75054B9B0C794581CF3CFDEFF362DFEB2C8DB12CA09CE636568F9436832A28B82771C
3,437,959 UART: [art] PUB.Y = 33B27E71768DA525EB559B7B92A9B541BEE2BBDE9497F48641BB2905D0AAF9BEC3C4CE5DF2B674D4ED86514A63ABEE7C
3,444,928 UART: [art] SIG.R = 3D2098C2C3F6B667BF0F14E6AEC49628EE62A5DF6DEACCA4319035E2BF2637D9A533D1E0DCAD6F86EBB16F43B1BE2300
3,451,695 UART: [art] SIG.S = 0900809412A95A6EF01D66E1FFCC587B17A1A74C1902B460190CFB0A7FB99E017400313602E972EE81857820CA617296
3,476,092 UART: Caliptra RT
3,476,437 UART: [state] CFI Enabled
3,584,449 UART: [rt] RT listening for mailbox commands...
3,585,119 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,347 UART: [rt]cmd =0x41544d4e, len=14344
4,017,855 >>> mbox cmd response data (8 bytes)
4,017,856 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,047,821 UART: [rt]cmd =0x41545348, len=116
4,049,786 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,362 ready_for_fw is high
1,362,362 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,801 >>> mbox cmd response: success
2,989,427 UART:
2,989,443 UART: Running Caliptra FMC ...
2,989,851 UART:
2,989,994 UART: [state] CFI Enabled
3,000,281 UART: [fht] FMC Alias Private Key: 7
3,107,658 UART: [art] Extend RT PCRs Done
3,108,086 UART: [art] Lock RT PCRs Done
3,109,720 UART: [art] Populate DV Done
3,117,883 UART: [fht] FMC Alias Private Key: 7
3,118,817 UART: [art] Derive CDI
3,119,097 UART: [art] Store in in slot 0x4
3,205,016 UART: [art] Derive Key Pair
3,205,376 UART: [art] Store priv key in slot 0x5
3,218,954 UART: [art] Derive Key Pair - Done
3,233,632 UART: [art] Signing Cert with AUTHO
3,234,112 UART: RITY.KEYID = 7
3,249,206 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,971 UART: [art] PUB.X = 2EF42AC645F56D958DE669587311BBC421CAAD224A857ADC25AA765EB0C221507C8EF3E76CDE1276E17562DBCE2BCB47
3,256,757 UART: [art] PUB.Y = 370B23BA63E5673092E9886517593A36CD4A0BDAE0F8B0C2A63324F58527D647E3ED46ABB4CDC1024628CFE14DDEEE50
3,263,708 UART: [art] SIG.R = E83659432C242F9DA41B58E7A36E3E41CF7CA90C3FF987D0A891B59460E6080C79BCA12B8CC98351E81E0318CBA37B13
3,270,472 UART: [art] SIG.S = 7DA1F71ECBCC38151D40E13E3D9B0364E2D7CF7D9AF2777770797C92F4D4C6405E8EF9779491007FF63995F95989F470
3,293,902 UART: Caliptra RT
3,294,247 UART: [state] CFI Enabled
3,402,370 UART: [rt] RT listening for mailbox commands...
3,403,040 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,884 UART: [rt]cmd =0x41544d4e, len=14344
3,835,605 >>> mbox cmd response data (8 bytes)
3,835,606 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,667 UART: [rt]cmd =0x41545348, len=116
3,887,334 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,678 ready_for_fw is high
1,362,678 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,857 >>> mbox cmd response: success
2,989,743 UART:
2,989,759 UART: Running Caliptra FMC ...
2,990,167 UART:
2,990,310 UART: [state] CFI Enabled
3,001,059 UART: [fht] FMC Alias Private Key: 7
3,109,124 UART: [art] Extend RT PCRs Done
3,109,552 UART: [art] Lock RT PCRs Done
3,110,988 UART: [art] Populate DV Done
3,119,371 UART: [fht] FMC Alias Private Key: 7
3,120,325 UART: [art] Derive CDI
3,120,605 UART: [art] Store in in slot 0x4
3,206,354 UART: [art] Derive Key Pair
3,206,714 UART: [art] Store priv key in slot 0x5
3,219,794 UART: [art] Derive Key Pair - Done
3,234,550 UART: [art] Signing Cert with AUTHO
3,235,030 UART: RITY.KEYID = 7
3,250,496 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,261 UART: [art] PUB.X = 9A12B13427FB4DE35B350A7A2D20FB516681901BF2C8C5A2D89DF25CFE82F1C7ACF77A1587D07E5C2B32C8B8A23103A7
3,258,037 UART: [art] PUB.Y = 67178AC77AF81732164DDAD37D0FB101C80A748653C7512FFB836DD79C7C6F4068DC7471CAE870D0220E5F18ACB129D2
3,264,981 UART: [art] SIG.R = 471A02F5B3F42C3093A53669D1F9B167EE9D79194C4C35ADCBEA2EBEC6A74922A9CE37832444CCAB3D960CA423B5DF61
3,271,759 UART: [art] SIG.S = 5634D68DE43EE82165DA0FE9992662A3C6570AB2F1EA4367DA04BC407965A38783B5DF54CA9F07A29973B4A6B78F815D
3,295,740 UART: Caliptra RT
3,296,085 UART: [state] CFI Enabled
3,404,071 UART: [rt] RT listening for mailbox commands...
3,404,741 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,065 UART: [rt]cmd =0x41544d4e, len=14344
3,838,113 >>> mbox cmd response data (8 bytes)
3,838,114 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,868,243 UART: [rt]cmd =0x41545348, len=116
3,870,122 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
893,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,353 UART: [kat] ++
897,505 UART: [kat] sha1
901,873 UART: [kat] SHA2-256
903,813 UART: [kat] SHA2-384
906,494 UART: [kat] SHA2-512-ACC
908,395 UART: [kat] ECC-384
918,066 UART: [kat] HMAC-384Kdf
922,704 UART: [kat] LMS
1,171,032 UART: [kat] --
1,172,065 UART: [cold-reset] ++
1,172,557 UART: [fht] FHT @ 0x50003400
1,175,270 UART: [idev] ++
1,175,438 UART: [idev] CDI.KEYID = 6
1,175,798 UART: [idev] SUBJECT.KEYID = 7
1,176,222 UART: [idev] UDS.KEYID = 0
1,176,567 ready_for_fw is high
1,176,567 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,198 UART: [idev] Erasing UDS.KEYID = 0
1,201,477 UART: [idev] Sha1 KeyId Algorithm
1,209,941 UART: [idev] --
1,210,871 UART: [ldev] ++
1,211,039 UART: [ldev] CDI.KEYID = 6
1,211,402 UART: [ldev] SUBJECT.KEYID = 5
1,211,828 UART: [ldev] AUTHORITY.KEYID = 7
1,212,291 UART: [ldev] FE.KEYID = 1
1,217,411 UART: [ldev] Erasing FE.KEYID = 1
1,243,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,645 UART: [ldev] --
1,283,140 UART: [fwproc] Wait for Commands...
1,283,956 UART: [fwproc] Recv command 0x46574c44
1,284,684 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,744 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,048 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,897 >>> mbox cmd response: success
2,777,139 UART: [afmc] ++
2,777,307 UART: [afmc] CDI.KEYID = 6
2,777,669 UART: [afmc] SUBJECT.KEYID = 7
2,778,094 UART: [afmc] AUTHORITY.KEYID = 5
2,813,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,766 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,514 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,242 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,127 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,846 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,716 UART: [afmc] --
2,856,690 UART: [cold-reset] --
2,857,320 UART: [state] Locking Datavault
2,858,355 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,959 UART: [state] Locking ICCM
2,859,489 UART: [exit] Launching FMC @ 0x40000130
2,864,818 UART:
2,864,834 UART: Running Caliptra FMC ...
2,865,242 UART:
2,865,296 UART: [state] CFI Enabled
2,875,561 UART: [fht] FMC Alias Private Key: 7
2,983,936 UART: [art] Extend RT PCRs Done
2,984,364 UART: [art] Lock RT PCRs Done
2,985,912 UART: [art] Populate DV Done
2,994,155 UART: [fht] FMC Alias Private Key: 7
2,995,315 UART: [art] Derive CDI
2,995,595 UART: [art] Store in in slot 0x4
3,081,456 UART: [art] Derive Key Pair
3,081,816 UART: [art] Store priv key in slot 0x5
3,094,760 UART: [art] Derive Key Pair - Done
3,109,451 UART: [art] Signing Cert with AUTHO
3,109,931 UART: RITY.KEYID = 7
3,125,181 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,946 UART: [art] PUB.X = 5474C6F9B859BCB877344FA822C857062DE7F834F7EFF015E4720CEBE01062B77FCE8B86A4D4817A64265CA1D31084C5
3,132,714 UART: [art] PUB.Y = 188966E1454CC77FE66992CFE17964B3F59A9ACE0BE8890333B731C1CBDD6C44E4AA75A67639F4E2ACDBA5FE3B12B0C0
3,139,674 UART: [art] SIG.R = C80A132AF7CEBE5B85E4CB0E84C8113B146A0AF6FA12511452594A8C2357D1E519A5B30DFF4BDEED96611DC383E77FB4
3,146,448 UART: [art] SIG.S = D78D8C664F25EA9B2B4E01AD4E23EB73522ECB882744FC941D848D1F7E69EF751C2B3AFE5F06E698EF2C020632B2B7DE
3,170,551 UART: Caliptra RT
3,170,804 UART: [state] CFI Enabled
3,278,720 UART: [rt] RT listening for mailbox commands...
3,279,390 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,720 UART: [rt]cmd =0x41544d4e, len=14344
3,712,775 >>> mbox cmd response data (8 bytes)
3,712,776 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,941 UART: [rt]cmd =0x41545348, len=116
3,764,882 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,626 UART: [state] LifecycleState = Unprovisioned
86,281 UART: [state] DebugLocked = No
86,775 UART: [state] WD Timer not started. Device not locked for debugging
88,076 UART: [kat] SHA2-256
893,726 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,851 UART: [kat] ++
898,003 UART: [kat] sha1
902,429 UART: [kat] SHA2-256
904,369 UART: [kat] SHA2-384
907,056 UART: [kat] SHA2-512-ACC
908,957 UART: [kat] ECC-384
918,158 UART: [kat] HMAC-384Kdf
922,842 UART: [kat] LMS
1,171,170 UART: [kat] --
1,172,103 UART: [cold-reset] ++
1,172,601 UART: [fht] FHT @ 0x50003400
1,175,298 UART: [idev] ++
1,175,466 UART: [idev] CDI.KEYID = 6
1,175,826 UART: [idev] SUBJECT.KEYID = 7
1,176,250 UART: [idev] UDS.KEYID = 0
1,176,595 ready_for_fw is high
1,176,595 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,342 UART: [idev] Erasing UDS.KEYID = 0
1,201,317 UART: [idev] Sha1 KeyId Algorithm
1,209,763 UART: [idev] --
1,210,765 UART: [ldev] ++
1,210,933 UART: [ldev] CDI.KEYID = 6
1,211,296 UART: [ldev] SUBJECT.KEYID = 5
1,211,722 UART: [ldev] AUTHORITY.KEYID = 7
1,212,185 UART: [ldev] FE.KEYID = 1
1,217,609 UART: [ldev] Erasing FE.KEYID = 1
1,243,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,811 UART: [ldev] --
1,283,234 UART: [fwproc] Wait for Commands...
1,283,918 UART: [fwproc] Recv command 0x46574c44
1,284,646 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,324 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,628 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,343 >>> mbox cmd response: success
2,775,499 UART: [afmc] ++
2,775,667 UART: [afmc] CDI.KEYID = 6
2,776,029 UART: [afmc] SUBJECT.KEYID = 7
2,776,454 UART: [afmc] AUTHORITY.KEYID = 5
2,811,389 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,828 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,576 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,304 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,189 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,908 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,720 UART: [afmc] --
2,854,620 UART: [cold-reset] --
2,855,520 UART: [state] Locking Datavault
2,856,907 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,511 UART: [state] Locking ICCM
2,858,125 UART: [exit] Launching FMC @ 0x40000130
2,863,454 UART:
2,863,470 UART: Running Caliptra FMC ...
2,863,878 UART:
2,863,932 UART: [state] CFI Enabled
2,874,521 UART: [fht] FMC Alias Private Key: 7
2,982,564 UART: [art] Extend RT PCRs Done
2,982,992 UART: [art] Lock RT PCRs Done
2,984,358 UART: [art] Populate DV Done
2,992,571 UART: [fht] FMC Alias Private Key: 7
2,993,539 UART: [art] Derive CDI
2,993,819 UART: [art] Store in in slot 0x4
3,079,778 UART: [art] Derive Key Pair
3,080,138 UART: [art] Store priv key in slot 0x5
3,093,186 UART: [art] Derive Key Pair - Done
3,108,032 UART: [art] Signing Cert with AUTHO
3,108,512 UART: RITY.KEYID = 7
3,123,746 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,511 UART: [art] PUB.X = 566AD75EEDA402C84031C21F7FD88EC26B634E21A2B021CBB39A43781C696E33FC8BE8D39303F2104F328CB3D3174DBB
3,131,285 UART: [art] PUB.Y = A9820180E049E763519B17917612BE8A20AA1619A497CBC50C653FDD0B941A9B0E2BA1827287C546AD9CC32DA00060A0
3,138,201 UART: [art] SIG.R = 87643B92E6986FD4E505D758A3CF49FA16242EFB67C6F821216ED51B748B39CE3EDA6AC75A3E10DA992FE1161112E236
3,144,974 UART: [art] SIG.S = 2111BEE1C6FEB3FC57D2D17449D522917C0631F592D8916061A9628967466906799610C49BD16FE43CA07DF40016EEF6
3,168,959 UART: Caliptra RT
3,169,212 UART: [state] CFI Enabled
3,276,209 UART: [rt] RT listening for mailbox commands...
3,276,879 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,887 UART: [rt]cmd =0x41544d4e, len=14344
3,709,751 >>> mbox cmd response data (8 bytes)
3,709,752 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,819 UART: [rt]cmd =0x41545348, len=116
3,741,788 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,965 ready_for_fw is high
1,059,965 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,532 >>> mbox cmd response: success
2,687,464 UART:
2,687,480 UART: Running Caliptra FMC ...
2,687,888 UART:
2,687,942 UART: [state] CFI Enabled
2,698,761 UART: [fht] FMC Alias Private Key: 7
2,806,886 UART: [art] Extend RT PCRs Done
2,807,314 UART: [art] Lock RT PCRs Done
2,808,920 UART: [art] Populate DV Done
2,817,235 UART: [fht] FMC Alias Private Key: 7
2,818,415 UART: [art] Derive CDI
2,818,695 UART: [art] Store in in slot 0x4
2,904,352 UART: [art] Derive Key Pair
2,904,712 UART: [art] Store priv key in slot 0x5
2,917,662 UART: [art] Derive Key Pair - Done
2,932,221 UART: [art] Signing Cert with AUTHO
2,932,701 UART: RITY.KEYID = 7
2,947,675 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,440 UART: [art] PUB.X = DA7A7319ADB84DB00559CB1E3EC3BDCF8273A523B6480BFDBADCD2DF380071EB5D04FDACFA8BE3C436533D7365D8CBDF
2,955,211 UART: [art] PUB.Y = 29ACB61D72A8D36EC20E6CDCC110A5163FED9153978B491343A4009F04ACC02649A3D49C5D49B6ED33C8AB165DEB66FA
2,962,147 UART: [art] SIG.R = D23B9223E77232930078C5B343D871ECF23D1DDA34AFB2D763591B51FAF91D145657D2D38A55EB4A11D95F48F02CAC52
2,968,901 UART: [art] SIG.S = CC57DEA3D43C35914C6670FC0E1782E4F7B2DAA324A6980C485AB0D7FF035406AC355FFD7FC611CF9D5FE4202290AB61
2,992,148 UART: Caliptra RT
2,992,401 UART: [state] CFI Enabled
3,099,217 UART: [rt] RT listening for mailbox commands...
3,099,887 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,837 UART: [rt]cmd =0x41544d4e, len=14344
3,533,214 >>> mbox cmd response data (8 bytes)
3,533,215 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,308 UART: [rt]cmd =0x41545348, len=116
3,584,267 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,783 ready_for_fw is high
1,059,783 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,860 >>> mbox cmd response: success
2,686,696 UART:
2,686,712 UART: Running Caliptra FMC ...
2,687,120 UART:
2,687,174 UART: [state] CFI Enabled
2,697,755 UART: [fht] FMC Alias Private Key: 7
2,806,024 UART: [art] Extend RT PCRs Done
2,806,452 UART: [art] Lock RT PCRs Done
2,808,118 UART: [art] Populate DV Done
2,816,393 UART: [fht] FMC Alias Private Key: 7
2,817,441 UART: [art] Derive CDI
2,817,721 UART: [art] Store in in slot 0x4
2,903,552 UART: [art] Derive Key Pair
2,903,912 UART: [art] Store priv key in slot 0x5
2,917,166 UART: [art] Derive Key Pair - Done
2,931,688 UART: [art] Signing Cert with AUTHO
2,932,168 UART: RITY.KEYID = 7
2,947,424 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,189 UART: [art] PUB.X = 8BFA5FC9CC4B4CA9D602D53C8E90F5054DD8C714A524D1CE319FEB3C66EE2B8D336FE0BD49E019B7D2AEC22AF866F1B5
2,954,979 UART: [art] PUB.Y = DF67C9B62BF4CC4CB47378621E302A0AF22CFB86ACC9FE60AE392A817D214E52D7CDF30BED52FD4330E8D7C08C290A92
2,961,940 UART: [art] SIG.R = 6F65D52EDEEAD71EC977A6153CB7C900A4A069C35F220DD706BCF70811628984FF6DB216E6A93291EAE1B453054913E0
2,968,682 UART: [art] SIG.S = 5B8AE1FC5C46E860971B9F934245B7500814AE74BD2A618C8048A3C76290A26585001E35DAC6811E7126B27C4764F479
2,992,306 UART: Caliptra RT
2,992,559 UART: [state] CFI Enabled
3,100,994 UART: [rt] RT listening for mailbox commands...
3,101,664 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,568 UART: [rt]cmd =0x41544d4e, len=14344
3,534,544 >>> mbox cmd response data (8 bytes)
3,534,545 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,568 UART: [rt]cmd =0x41545348, len=116
3,566,405 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,706 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
893,563 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,688 UART: [kat] ++
897,840 UART: [kat] sha1
902,188 UART: [kat] SHA2-256
904,128 UART: [kat] SHA2-384
906,675 UART: [kat] SHA2-512-ACC
908,576 UART: [kat] ECC-384
918,167 UART: [kat] HMAC-384Kdf
922,669 UART: [kat] LMS
1,170,997 UART: [kat] --
1,171,902 UART: [cold-reset] ++
1,172,426 UART: [fht] FHT @ 0x50003400
1,174,987 UART: [idev] ++
1,175,155 UART: [idev] CDI.KEYID = 6
1,175,515 UART: [idev] SUBJECT.KEYID = 7
1,175,939 UART: [idev] UDS.KEYID = 0
1,176,284 ready_for_fw is high
1,176,284 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,869 UART: [idev] Erasing UDS.KEYID = 0
1,201,076 UART: [idev] Sha1 KeyId Algorithm
1,209,514 UART: [idev] --
1,210,584 UART: [ldev] ++
1,210,752 UART: [ldev] CDI.KEYID = 6
1,211,115 UART: [ldev] SUBJECT.KEYID = 5
1,211,541 UART: [ldev] AUTHORITY.KEYID = 7
1,212,004 UART: [ldev] FE.KEYID = 1
1,217,008 UART: [ldev] Erasing FE.KEYID = 1
1,243,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,224 UART: [ldev] --
1,282,661 UART: [fwproc] Wait for Commands...
1,283,367 UART: [fwproc] Recv command 0x46574c44
1,284,095 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,576 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,971 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,184 >>> mbox cmd response: success
2,775,312 UART: [afmc] ++
2,775,480 UART: [afmc] CDI.KEYID = 6
2,775,842 UART: [afmc] SUBJECT.KEYID = 7
2,776,267 UART: [afmc] AUTHORITY.KEYID = 5
2,811,984 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,959 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,687 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,572 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,291 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,247 UART: [afmc] --
2,855,275 UART: [cold-reset] --
2,856,183 UART: [state] Locking Datavault
2,857,172 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,776 UART: [state] Locking ICCM
2,858,300 UART: [exit] Launching FMC @ 0x40000130
2,863,629 UART:
2,863,645 UART: Running Caliptra FMC ...
2,864,053 UART:
2,864,196 UART: [state] CFI Enabled
2,874,673 UART: [fht] FMC Alias Private Key: 7
2,982,278 UART: [art] Extend RT PCRs Done
2,982,706 UART: [art] Lock RT PCRs Done
2,984,424 UART: [art] Populate DV Done
2,992,901 UART: [fht] FMC Alias Private Key: 7
2,994,077 UART: [art] Derive CDI
2,994,357 UART: [art] Store in in slot 0x4
3,080,078 UART: [art] Derive Key Pair
3,080,438 UART: [art] Store priv key in slot 0x5
3,094,222 UART: [art] Derive Key Pair - Done
3,108,700 UART: [art] Signing Cert with AUTHO
3,109,180 UART: RITY.KEYID = 7
3,124,512 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,277 UART: [art] PUB.X = 7941D8A9715602627D3E1A5DBB8E13F64F0E217988434748813DA803FB13C31E01A893D6A77AD3FF5B716A594D365A1C
3,132,033 UART: [art] PUB.Y = C1489BD88DCFA3D880E2AF1A0F7F4075D3D833D479C1317337594C8B8B7A80AAF9222071A32C4A6B1AFE715D2F4B97A5
3,138,990 UART: [art] SIG.R = A82919E57BFED918FFD35AD81A83A49166C24043597156A2728A954A185D84A90C7AE753F56282AC9014C450D93EA6F4
3,145,755 UART: [art] SIG.S = 59C38CA7059C8EAD5DA37DCFD2FA6E4F000F0692B749259EDD04CE19A653F0166074949B4E29C3AB4E139D4638F93285
3,170,034 UART: Caliptra RT
3,170,379 UART: [state] CFI Enabled
3,278,814 UART: [rt] RT listening for mailbox commands...
3,279,484 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,536 UART: [rt]cmd =0x41544d4e, len=14344
3,712,579 >>> mbox cmd response data (8 bytes)
3,712,580 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,481 UART: [rt]cmd =0x41545348, len=116
3,764,594 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
893,669 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,794 UART: [kat] ++
897,946 UART: [kat] sha1
902,296 UART: [kat] SHA2-256
904,236 UART: [kat] SHA2-384
907,025 UART: [kat] SHA2-512-ACC
908,926 UART: [kat] ECC-384
918,301 UART: [kat] HMAC-384Kdf
923,003 UART: [kat] LMS
1,171,331 UART: [kat] --
1,171,976 UART: [cold-reset] ++
1,172,360 UART: [fht] FHT @ 0x50003400
1,175,127 UART: [idev] ++
1,175,295 UART: [idev] CDI.KEYID = 6
1,175,655 UART: [idev] SUBJECT.KEYID = 7
1,176,079 UART: [idev] UDS.KEYID = 0
1,176,424 ready_for_fw is high
1,176,424 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,983 UART: [idev] Erasing UDS.KEYID = 0
1,202,138 UART: [idev] Sha1 KeyId Algorithm
1,210,616 UART: [idev] --
1,211,794 UART: [ldev] ++
1,211,962 UART: [ldev] CDI.KEYID = 6
1,212,325 UART: [ldev] SUBJECT.KEYID = 5
1,212,751 UART: [ldev] AUTHORITY.KEYID = 7
1,213,214 UART: [ldev] FE.KEYID = 1
1,218,644 UART: [ldev] Erasing FE.KEYID = 1
1,245,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,154 UART: [ldev] --
1,284,583 UART: [fwproc] Wait for Commands...
1,285,299 UART: [fwproc] Recv command 0x46574c44
1,286,027 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,590 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,917 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,221 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,970 >>> mbox cmd response: success
2,777,138 UART: [afmc] ++
2,777,306 UART: [afmc] CDI.KEYID = 6
2,777,668 UART: [afmc] SUBJECT.KEYID = 7
2,778,093 UART: [afmc] AUTHORITY.KEYID = 5
2,814,006 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,105 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,833 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,718 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,437 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,255 UART: [afmc] --
2,857,343 UART: [cold-reset] --
2,858,435 UART: [state] Locking Datavault
2,859,498 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,102 UART: [state] Locking ICCM
2,860,758 UART: [exit] Launching FMC @ 0x40000130
2,866,087 UART:
2,866,103 UART: Running Caliptra FMC ...
2,866,511 UART:
2,866,654 UART: [state] CFI Enabled
2,877,337 UART: [fht] FMC Alias Private Key: 7
2,985,600 UART: [art] Extend RT PCRs Done
2,986,028 UART: [art] Lock RT PCRs Done
2,987,970 UART: [art] Populate DV Done
2,996,131 UART: [fht] FMC Alias Private Key: 7
2,997,249 UART: [art] Derive CDI
2,997,529 UART: [art] Store in in slot 0x4
3,083,654 UART: [art] Derive Key Pair
3,084,014 UART: [art] Store priv key in slot 0x5
3,097,262 UART: [art] Derive Key Pair - Done
3,112,208 UART: [art] Signing Cert with AUTHO
3,112,688 UART: RITY.KEYID = 7
3,127,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,447 UART: [art] PUB.X = 917A1A7EC85DD7113C20F007B7C4BC97FC50F2A2A1ADEA923F430D0BD85870590C57173ED17A1F79550924987A3AA409
3,135,203 UART: [art] PUB.Y = D3E621860CC246D7CE34FBC322795865EF4644071B1943245107D276F30F8BD25ABE75646B06346F05CDF883EC922AD6
3,142,133 UART: [art] SIG.R = F88210A429E57AB14ED8CFF075A3546D38E2248EB6098AD96763B2A177CFE6C6EEE91546629EB392B19647361E35CE95
3,148,902 UART: [art] SIG.S = 51F4070CC2B170E03AA0579F8636300512D9B3E635F9F418B7C5D800443B2D59A207EF6A1ADEB36D8FF8A13CBAF35862
3,172,575 UART: Caliptra RT
3,172,920 UART: [state] CFI Enabled
3,281,051 UART: [rt] RT listening for mailbox commands...
3,281,721 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,853 UART: [rt]cmd =0x41544d4e, len=14344
3,714,623 >>> mbox cmd response data (8 bytes)
3,714,624 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,744,503 UART: [rt]cmd =0x41545348, len=116
3,746,416 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,334 ready_for_fw is high
1,060,334 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,679 >>> mbox cmd response: success
2,689,037 UART:
2,689,053 UART: Running Caliptra FMC ...
2,689,461 UART:
2,689,604 UART: [state] CFI Enabled
2,700,433 UART: [fht] FMC Alias Private Key: 7
2,808,432 UART: [art] Extend RT PCRs Done
2,808,860 UART: [art] Lock RT PCRs Done
2,810,194 UART: [art] Populate DV Done
2,818,489 UART: [fht] FMC Alias Private Key: 7
2,819,605 UART: [art] Derive CDI
2,819,885 UART: [art] Store in in slot 0x4
2,905,256 UART: [art] Derive Key Pair
2,905,616 UART: [art] Store priv key in slot 0x5
2,919,038 UART: [art] Derive Key Pair - Done
2,933,837 UART: [art] Signing Cert with AUTHO
2,934,317 UART: RITY.KEYID = 7
2,950,143 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,908 UART: [art] PUB.X = A6EADFD689F88B8EC2149B5DDC53CD2CCEECDB168B35CF6B7CED21C4BE4584D58119E7252D56A49B82DEAD996A80B91F
2,957,706 UART: [art] PUB.Y = ED5D6AEDEC9D99D2ACAFE50B072DBB0DA4F2C7E8763914E17C2214662F8F76DF48F08C99C4335AA9A0B0B56E22A9D1D5
2,964,669 UART: [art] SIG.R = 5920AD116063B1C133ABA960698D36D43F009ED54A0D7B96E0A14DFCDF1C45DF27D3BDE5E4DDC90CB0AE1BE927601710
2,971,427 UART: [art] SIG.S = 62EC8556D4C8516F17C2DD6E3514B84D8A306131055A1C5F2B47AB73080081B8FD7E0356116A58FA12A41DC207C20D53
2,995,847 UART: Caliptra RT
2,996,192 UART: [state] CFI Enabled
3,104,079 UART: [rt] RT listening for mailbox commands...
3,104,749 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,773 UART: [rt]cmd =0x41544d4e, len=14344
3,537,432 >>> mbox cmd response data (8 bytes)
3,537,433 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,567,646 UART: [rt]cmd =0x41545348, len=116
3,590,195 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,116 ready_for_fw is high
1,061,116 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,401 >>> mbox cmd response: success
2,689,767 UART:
2,689,783 UART: Running Caliptra FMC ...
2,690,191 UART:
2,690,334 UART: [state] CFI Enabled
2,700,987 UART: [fht] FMC Alias Private Key: 7
2,808,624 UART: [art] Extend RT PCRs Done
2,809,052 UART: [art] Lock RT PCRs Done
2,810,452 UART: [art] Populate DV Done
2,818,911 UART: [fht] FMC Alias Private Key: 7
2,820,017 UART: [art] Derive CDI
2,820,297 UART: [art] Store in in slot 0x4
2,905,744 UART: [art] Derive Key Pair
2,906,104 UART: [art] Store priv key in slot 0x5
2,919,592 UART: [art] Derive Key Pair - Done
2,934,386 UART: [art] Signing Cert with AUTHO
2,934,866 UART: RITY.KEYID = 7
2,950,256 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,021 UART: [art] PUB.X = 62BFA2C27BA1E14A19FD73DBDB4E7FF25E76C4C0C2E93946A0DB66341C3ED51F81FF403A437608AFBA0A2BE83203AB1A
2,957,804 UART: [art] PUB.Y = 66197232BEC2802A3BF17CAC1D147907DC0B2DCEDD7D164CD8E612FEB71E44AF2A391BE350FF5AC6C6AD170866B75B61
2,964,763 UART: [art] SIG.R = BF39FFDBC0813E2D2B9242FD3E084A42502193704BCA5DDB254F75C4382FB153F62493F31775AAEBA1A65921BF8F5649
2,971,538 UART: [art] SIG.S = D8C3A0CE04F8D7EF9A5192B03E1FD74BB8CEE4ADACCF6A0ABE3B70725E39227DE97DE9F9A785AF02A051179CF30470DA
2,995,349 UART: Caliptra RT
2,995,694 UART: [state] CFI Enabled
3,102,414 UART: [rt] RT listening for mailbox commands...
3,103,084 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,336 UART: [rt]cmd =0x41544d4e, len=14344
3,536,174 >>> mbox cmd response data (8 bytes)
3,536,175 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,566,386 UART: [rt]cmd =0x41545348, len=116
3,568,235 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,233 UART: [kat] ++
895,385 UART: [kat] sha1
899,511 UART: [kat] SHA2-256
901,451 UART: [kat] SHA2-384
904,244 UART: [kat] SHA2-512-ACC
906,145 UART: [kat] ECC-384
915,566 UART: [kat] HMAC-384Kdf
920,170 UART: [kat] LMS
1,168,482 UART: [kat] --
1,169,321 UART: [cold-reset] ++
1,169,729 UART: [fht] FHT @ 0x50003400
1,172,215 UART: [idev] ++
1,172,383 UART: [idev] CDI.KEYID = 6
1,172,744 UART: [idev] SUBJECT.KEYID = 7
1,173,169 UART: [idev] UDS.KEYID = 0
1,173,515 ready_for_fw is high
1,173,515 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,203 UART: [idev] Erasing UDS.KEYID = 0
1,198,017 UART: [idev] Sha1 KeyId Algorithm
1,206,897 UART: [idev] --
1,207,916 UART: [ldev] ++
1,208,084 UART: [ldev] CDI.KEYID = 6
1,208,448 UART: [ldev] SUBJECT.KEYID = 5
1,208,875 UART: [ldev] AUTHORITY.KEYID = 7
1,209,338 UART: [ldev] FE.KEYID = 1
1,214,268 UART: [ldev] Erasing FE.KEYID = 1
1,240,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,730 UART: [ldev] --
1,280,118 UART: [fwproc] Wait for Commands...
1,280,837 UART: [fwproc] Recv command 0x46574c44
1,281,570 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,006 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,315 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,203 >>> mbox cmd response: success
2,772,432 UART: [afmc] ++
2,772,600 UART: [afmc] CDI.KEYID = 6
2,772,963 UART: [afmc] SUBJECT.KEYID = 7
2,773,389 UART: [afmc] AUTHORITY.KEYID = 5
2,808,592 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,135 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,864 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,747 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,466 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,345 UART: [afmc] --
2,852,291 UART: [cold-reset] --
2,853,279 UART: [state] Locking Datavault
2,854,452 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,056 UART: [state] Locking ICCM
2,855,700 UART: [exit] Launching FMC @ 0x40000130
2,861,029 UART:
2,861,045 UART: Running Caliptra FMC ...
2,861,453 UART:
2,861,507 UART: [state] CFI Enabled
2,872,012 UART: [fht] FMC Alias Private Key: 7
2,980,123 UART: [art] Extend RT PCRs Done
2,980,551 UART: [art] Lock RT PCRs Done
2,982,337 UART: [art] Populate DV Done
2,990,368 UART: [fht] FMC Alias Private Key: 7
2,991,540 UART: [art] Derive CDI
2,991,820 UART: [art] Store in in slot 0x4
3,077,553 UART: [art] Derive Key Pair
3,077,913 UART: [art] Store priv key in slot 0x5
3,091,333 UART: [art] Derive Key Pair - Done
3,105,994 UART: [art] Signing Cert with AUTHO
3,106,474 UART: RITY.KEYID = 7
3,121,526 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,291 UART: [art] PUB.X = 4A8D85F223DB417DAEC461D0D7EF5331D64E74A0F19A18F4C38B5B22D064BB214DB29F79BD99EAFA090B5B5AD57B82C4
3,129,073 UART: [art] PUB.Y = 66FE284A54C6D9E03A7EBC58D1684F1CFF34F8D1C7277725336FB2B5DA065A9B9CE76C8813215CFC45196663C7132C9E
3,136,026 UART: [art] SIG.R = E42525EAF44297538E5B4D2DC5983051896F810EF73E58B1D66FE2CAB9506544DB52874846E1DBB54C6DC22AE19C783E
3,142,797 UART: [art] SIG.S = 934EBFF096E11A34D43636257E009D76426D4D9882920B780685953CE5E84BF34A85162505F7E38B008DBCB71606A526
3,166,550 UART: Caliptra RT
3,166,803 UART: [state] CFI Enabled
3,273,723 UART: [rt] RT listening for mailbox commands...
3,274,393 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,299 UART: [rt]cmd =0x41544d4e, len=14344
3,707,532 >>> mbox cmd response data (8 bytes)
3,707,533 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,414 UART: [rt]cmd =0x41545348, len=116
3,759,039 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Unprovisioned
86,089 UART: [state] DebugLocked = No
86,641 UART: [state] WD Timer not started. Device not locked for debugging
87,826 UART: [kat] SHA2-256
891,376 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,505 UART: [kat] ++
895,657 UART: [kat] sha1
899,855 UART: [kat] SHA2-256
901,795 UART: [kat] SHA2-384
904,514 UART: [kat] SHA2-512-ACC
906,415 UART: [kat] ECC-384
916,380 UART: [kat] HMAC-384Kdf
920,932 UART: [kat] LMS
1,169,244 UART: [kat] --
1,170,429 UART: [cold-reset] ++
1,170,957 UART: [fht] FHT @ 0x50003400
1,173,517 UART: [idev] ++
1,173,685 UART: [idev] CDI.KEYID = 6
1,174,046 UART: [idev] SUBJECT.KEYID = 7
1,174,471 UART: [idev] UDS.KEYID = 0
1,174,817 ready_for_fw is high
1,174,817 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,287 UART: [idev] Erasing UDS.KEYID = 0
1,199,561 UART: [idev] Sha1 KeyId Algorithm
1,208,523 UART: [idev] --
1,209,612 UART: [ldev] ++
1,209,780 UART: [ldev] CDI.KEYID = 6
1,210,144 UART: [ldev] SUBJECT.KEYID = 5
1,210,571 UART: [ldev] AUTHORITY.KEYID = 7
1,211,034 UART: [ldev] FE.KEYID = 1
1,216,066 UART: [ldev] Erasing FE.KEYID = 1
1,242,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,560 UART: [ldev] --
1,280,982 UART: [fwproc] Wait for Commands...
1,281,599 UART: [fwproc] Recv command 0x46574c44
1,282,332 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,824 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,133 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,947 >>> mbox cmd response: success
2,774,096 UART: [afmc] ++
2,774,264 UART: [afmc] CDI.KEYID = 6
2,774,627 UART: [afmc] SUBJECT.KEYID = 7
2,775,053 UART: [afmc] AUTHORITY.KEYID = 5
2,810,612 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,038 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,789 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,518 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,401 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,120 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,035 UART: [afmc] --
2,854,019 UART: [cold-reset] --
2,854,847 UART: [state] Locking Datavault
2,856,456 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,060 UART: [state] Locking ICCM
2,857,680 UART: [exit] Launching FMC @ 0x40000130
2,863,009 UART:
2,863,025 UART: Running Caliptra FMC ...
2,863,433 UART:
2,863,487 UART: [state] CFI Enabled
2,874,356 UART: [fht] FMC Alias Private Key: 7
2,982,285 UART: [art] Extend RT PCRs Done
2,982,713 UART: [art] Lock RT PCRs Done
2,984,243 UART: [art] Populate DV Done
2,992,400 UART: [fht] FMC Alias Private Key: 7
2,993,340 UART: [art] Derive CDI
2,993,620 UART: [art] Store in in slot 0x4
3,079,047 UART: [art] Derive Key Pair
3,079,407 UART: [art] Store priv key in slot 0x5
3,092,429 UART: [art] Derive Key Pair - Done
3,107,229 UART: [art] Signing Cert with AUTHO
3,107,709 UART: RITY.KEYID = 7
3,123,015 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,780 UART: [art] PUB.X = DACC7C71B8CB32F65D660A75F1593E1EC8DBD88913F06CD5E0A8276FAFBE1A9439249FA16F191DFB75B36A1BC5C591FF
3,130,569 UART: [art] PUB.Y = 4788E23DBE0256921EBF76EDEDD1823BBC9043EB987C75A4BF1C4778919D27FF9729A92E98EE5DC556F2FA7B29D5E8A0
3,137,530 UART: [art] SIG.R = 95CA2EB2A38273DFB9CB0697641E94E5FC387152762B8C6E485CB4F76C8A4C7924F670CC0B828F2A513D4F99A9E71659
3,144,298 UART: [art] SIG.S = 2FA03444090AEB009832AC3E6817124354EA510B6CCEBC8896725AFA47F7313E7273F4E132352F6F9117F0DE6157BDB1
3,168,180 UART: Caliptra RT
3,168,433 UART: [state] CFI Enabled
3,275,596 UART: [rt] RT listening for mailbox commands...
3,276,266 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,214 UART: [rt]cmd =0x41544d4e, len=14344
3,708,920 >>> mbox cmd response data (8 bytes)
3,708,921 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,026 UART: [rt]cmd =0x41545348, len=116
3,740,789 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,682 ready_for_fw is high
1,056,682 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,701 >>> mbox cmd response: success
2,687,157 UART:
2,687,173 UART: Running Caliptra FMC ...
2,687,581 UART:
2,687,635 UART: [state] CFI Enabled
2,698,276 UART: [fht] FMC Alias Private Key: 7
2,806,263 UART: [art] Extend RT PCRs Done
2,806,691 UART: [art] Lock RT PCRs Done
2,808,331 UART: [art] Populate DV Done
2,816,620 UART: [fht] FMC Alias Private Key: 7
2,817,626 UART: [art] Derive CDI
2,817,906 UART: [art] Store in in slot 0x4
2,903,371 UART: [art] Derive Key Pair
2,903,731 UART: [art] Store priv key in slot 0x5
2,916,729 UART: [art] Derive Key Pair - Done
2,931,638 UART: [art] Signing Cert with AUTHO
2,932,118 UART: RITY.KEYID = 7
2,947,198 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,963 UART: [art] PUB.X = D67AE18500DC3A8F388ACD94216764C4B4A060AD1DBB55B896EF45E70BD61259784C0C69CB7DDD7705159FADE3264F0B
2,954,711 UART: [art] PUB.Y = 08CDC1834CF23E9376A4D2A196085D2E2D6E6F9CC926CE3AE4D6AEA47C75F294D1B8AFB5DAE2A7C3EFB8A9912F84EAB8
2,961,681 UART: [art] SIG.R = 47D023EA27DA083DBCBF17D0C8960D863F2117107956E9842CD7791423F2F202253105471251E3BDF338295E063BAB9E
2,968,430 UART: [art] SIG.S = 8F163577F7ADA1D7A5B98FE711B47EA83C1CB9E930E450A2C976FDF2B0811720BDE5605CE99F3009AA994FF3EE9943CD
2,992,144 UART: Caliptra RT
2,992,397 UART: [state] CFI Enabled
3,099,902 UART: [rt] RT listening for mailbox commands...
3,100,572 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,594 UART: [rt]cmd =0x41544d4e, len=14344
3,533,051 >>> mbox cmd response data (8 bytes)
3,533,052 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,161 UART: [rt]cmd =0x41545348, len=116
3,584,812 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,268 ready_for_fw is high
1,056,268 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,935 >>> mbox cmd response: success
2,684,507 UART:
2,684,523 UART: Running Caliptra FMC ...
2,684,931 UART:
2,684,985 UART: [state] CFI Enabled
2,695,562 UART: [fht] FMC Alias Private Key: 7
2,803,409 UART: [art] Extend RT PCRs Done
2,803,837 UART: [art] Lock RT PCRs Done
2,805,377 UART: [art] Populate DV Done
2,813,634 UART: [fht] FMC Alias Private Key: 7
2,814,632 UART: [art] Derive CDI
2,814,912 UART: [art] Store in in slot 0x4
2,900,887 UART: [art] Derive Key Pair
2,901,247 UART: [art] Store priv key in slot 0x5
2,914,913 UART: [art] Derive Key Pair - Done
2,929,651 UART: [art] Signing Cert with AUTHO
2,930,131 UART: RITY.KEYID = 7
2,945,375 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,140 UART: [art] PUB.X = E986AFF532344EA340A5DD2E7B73C43C353F3019CA6DB6C59983EE73E18E2A1FC4427ECC34DD31F4A0E949833D26A166
2,952,920 UART: [art] PUB.Y = B3756CFE513AD1FACBBDD725C138F29F2B32ABDF216E16FFEE283D650C02F0D5E3C932022E15D40EBAEA3B830EA4AAE3
2,959,883 UART: [art] SIG.R = BDAD3AA54A4C6531EB7263ED685D331B3C0310A76643D7A561DD4EA03D4F916818AD34F15FA26C64A3E47F5E1F8236D0
2,966,660 UART: [art] SIG.S = 0E986C361131DF0B7B6B8820A3A2C9B5FCF785B0FB504A44E577BC9CAF947DD86B4A504216F417F8E79EE661AF75504B
2,990,373 UART: Caliptra RT
2,990,626 UART: [state] CFI Enabled
3,098,623 UART: [rt] RT listening for mailbox commands...
3,099,293 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,189 UART: [rt]cmd =0x41544d4e, len=14344
3,531,773 >>> mbox cmd response data (8 bytes)
3,531,774 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,915 UART: [rt]cmd =0x41545348, len=116
3,563,768 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
891,617 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,746 UART: [kat] ++
895,898 UART: [kat] sha1
900,254 UART: [kat] SHA2-256
902,194 UART: [kat] SHA2-384
904,957 UART: [kat] SHA2-512-ACC
906,858 UART: [kat] ECC-384
916,745 UART: [kat] HMAC-384Kdf
921,297 UART: [kat] LMS
1,169,609 UART: [kat] --
1,170,766 UART: [cold-reset] ++
1,171,104 UART: [fht] FHT @ 0x50003400
1,173,726 UART: [idev] ++
1,173,894 UART: [idev] CDI.KEYID = 6
1,174,255 UART: [idev] SUBJECT.KEYID = 7
1,174,680 UART: [idev] UDS.KEYID = 0
1,175,026 ready_for_fw is high
1,175,026 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,606 UART: [idev] Erasing UDS.KEYID = 0
1,199,442 UART: [idev] Sha1 KeyId Algorithm
1,208,464 UART: [idev] --
1,209,635 UART: [ldev] ++
1,209,803 UART: [ldev] CDI.KEYID = 6
1,210,167 UART: [ldev] SUBJECT.KEYID = 5
1,210,594 UART: [ldev] AUTHORITY.KEYID = 7
1,211,057 UART: [ldev] FE.KEYID = 1
1,216,125 UART: [ldev] Erasing FE.KEYID = 1
1,243,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,847 UART: [ldev] --
1,282,169 UART: [fwproc] Wait for Commands...
1,282,832 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,507 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,715 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,024 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,740 >>> mbox cmd response: success
2,774,953 UART: [afmc] ++
2,775,121 UART: [afmc] CDI.KEYID = 6
2,775,484 UART: [afmc] SUBJECT.KEYID = 7
2,775,910 UART: [afmc] AUTHORITY.KEYID = 5
2,811,495 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,061 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,812 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,541 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,424 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,143 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,784 UART: [afmc] --
2,854,832 UART: [cold-reset] --
2,856,002 UART: [state] Locking Datavault
2,857,083 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,687 UART: [state] Locking ICCM
2,858,253 UART: [exit] Launching FMC @ 0x40000130
2,863,582 UART:
2,863,598 UART: Running Caliptra FMC ...
2,864,006 UART:
2,864,149 UART: [state] CFI Enabled
2,874,500 UART: [fht] FMC Alias Private Key: 7
2,982,765 UART: [art] Extend RT PCRs Done
2,983,193 UART: [art] Lock RT PCRs Done
2,984,553 UART: [art] Populate DV Done
2,992,978 UART: [fht] FMC Alias Private Key: 7
2,994,100 UART: [art] Derive CDI
2,994,380 UART: [art] Store in in slot 0x4
3,080,205 UART: [art] Derive Key Pair
3,080,565 UART: [art] Store priv key in slot 0x5
3,094,101 UART: [art] Derive Key Pair - Done
3,108,881 UART: [art] Signing Cert with AUTHO
3,109,361 UART: RITY.KEYID = 7
3,124,797 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,562 UART: [art] PUB.X = F09DA03A519CF8C5D1FC8F56E7D9F31A89BF3696FE20AA98914A67A0593515400F681DE4755ADADDB64672B9ACA16316
3,132,339 UART: [art] PUB.Y = 561121176EE70B766779F290D5C14FC648CA2B163A9BFA4BEC3711E5363BA038AF0F64A051A53A19A17AE7F9296CA1DA
3,139,291 UART: [art] SIG.R = 9AA5FBE604054F25B578CF71B1A5A071EC40A64D74D6BD18EDAAA50C090BEF8E92E89113EC5CEF3683F918CB343D28E4
3,146,064 UART: [art] SIG.S = 9DF693235313A87408ECA559882430B8FA3CB963EA6546D0D64C08EA6AAD6A63AB6578BF371DD007C3C00D20E268056E
3,169,506 UART: Caliptra RT
3,169,851 UART: [state] CFI Enabled
3,277,583 UART: [rt] RT listening for mailbox commands...
3,278,253 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,401 UART: [rt]cmd =0x41544d4e, len=14344
3,711,268 >>> mbox cmd response data (8 bytes)
3,711,269 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,392 UART: [rt]cmd =0x41545348, len=116
3,762,805 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
891,367 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,496 UART: [kat] ++
895,648 UART: [kat] sha1
899,698 UART: [kat] SHA2-256
901,638 UART: [kat] SHA2-384
904,411 UART: [kat] SHA2-512-ACC
906,312 UART: [kat] ECC-384
916,045 UART: [kat] HMAC-384Kdf
920,579 UART: [kat] LMS
1,168,891 UART: [kat] --
1,169,744 UART: [cold-reset] ++
1,170,150 UART: [fht] FHT @ 0x50003400
1,172,666 UART: [idev] ++
1,172,834 UART: [idev] CDI.KEYID = 6
1,173,195 UART: [idev] SUBJECT.KEYID = 7
1,173,620 UART: [idev] UDS.KEYID = 0
1,173,966 ready_for_fw is high
1,173,966 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,914 UART: [idev] Erasing UDS.KEYID = 0
1,198,714 UART: [idev] Sha1 KeyId Algorithm
1,207,670 UART: [idev] --
1,208,571 UART: [ldev] ++
1,208,739 UART: [ldev] CDI.KEYID = 6
1,209,103 UART: [ldev] SUBJECT.KEYID = 5
1,209,530 UART: [ldev] AUTHORITY.KEYID = 7
1,209,993 UART: [ldev] FE.KEYID = 1
1,215,195 UART: [ldev] Erasing FE.KEYID = 1
1,241,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,903 UART: [ldev] --
1,281,215 UART: [fwproc] Wait for Commands...
1,281,892 UART: [fwproc] Recv command 0x46574c44
1,282,625 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,827 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,136 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,858 >>> mbox cmd response: success
2,773,961 UART: [afmc] ++
2,774,129 UART: [afmc] CDI.KEYID = 6
2,774,492 UART: [afmc] SUBJECT.KEYID = 7
2,774,918 UART: [afmc] AUTHORITY.KEYID = 5
2,810,437 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,063 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,814 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,543 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,426 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,145 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,956 UART: [afmc] --
2,853,836 UART: [cold-reset] --
2,854,520 UART: [state] Locking Datavault
2,855,507 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,111 UART: [state] Locking ICCM
2,856,649 UART: [exit] Launching FMC @ 0x40000130
2,861,978 UART:
2,861,994 UART: Running Caliptra FMC ...
2,862,402 UART:
2,862,545 UART: [state] CFI Enabled
2,873,460 UART: [fht] FMC Alias Private Key: 7
2,982,013 UART: [art] Extend RT PCRs Done
2,982,441 UART: [art] Lock RT PCRs Done
2,984,111 UART: [art] Populate DV Done
2,992,428 UART: [fht] FMC Alias Private Key: 7
2,993,544 UART: [art] Derive CDI
2,993,824 UART: [art] Store in in slot 0x4
3,079,659 UART: [art] Derive Key Pair
3,080,019 UART: [art] Store priv key in slot 0x5
3,093,009 UART: [art] Derive Key Pair - Done
3,107,363 UART: [art] Signing Cert with AUTHO
3,107,843 UART: RITY.KEYID = 7
3,123,241 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,006 UART: [art] PUB.X = FFCDD541C31B58EFAC86DC29CFBB0AD6DC1F2F55EF77A56E312A661333E6E4449A937B8D9B29A60619C87B6C8A24AE68
3,130,790 UART: [art] PUB.Y = 0D551854A87176581E3A88FD852711997F26DC8E3067C1116B4CDE2A0D3DA3E5B58AF1AB2DD7A9F5532EA373B3A437E9
3,137,740 UART: [art] SIG.R = C2A1D0F0B14029C5E44872D13EBD678DB11A7519A55E935F0BD3140C7EA5680C368F70EB6E0A9BCE1ECA863049770EE4
3,144,505 UART: [art] SIG.S = 280BA18C3A6B815EAAC53D923335AD500FD360C889E576783635D05BDCFCDBBC737EEE935CD03341F9A323CA4D4BD1BC
3,168,194 UART: Caliptra RT
3,168,539 UART: [state] CFI Enabled
3,276,268 UART: [rt] RT listening for mailbox commands...
3,276,938 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,822 UART: [rt]cmd =0x41544d4e, len=14344
3,709,804 >>> mbox cmd response data (8 bytes)
3,709,805 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,764 UART: [rt]cmd =0x41545348, len=116
3,741,547 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,597 ready_for_fw is high
1,055,597 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,314 >>> mbox cmd response: success
2,684,756 UART:
2,684,772 UART: Running Caliptra FMC ...
2,685,180 UART:
2,685,323 UART: [state] CFI Enabled
2,695,920 UART: [fht] FMC Alias Private Key: 7
2,803,821 UART: [art] Extend RT PCRs Done
2,804,249 UART: [art] Lock RT PCRs Done
2,805,819 UART: [art] Populate DV Done
2,814,040 UART: [fht] FMC Alias Private Key: 7
2,815,186 UART: [art] Derive CDI
2,815,466 UART: [art] Store in in slot 0x4
2,901,179 UART: [art] Derive Key Pair
2,901,539 UART: [art] Store priv key in slot 0x5
2,914,751 UART: [art] Derive Key Pair - Done
2,929,498 UART: [art] Signing Cert with AUTHO
2,929,978 UART: RITY.KEYID = 7
2,945,470 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,235 UART: [art] PUB.X = 97D81479F38A54B0E6F81868FDE9D7CC2D2BEE97CC3A926DC9949CCCFFEC948041268BF7FBF162D06AD4CB9843E296B9
2,953,023 UART: [art] PUB.Y = 1D521580F7400641ADC50978AC87EA540A7D3A4CBA3B2891D7B88AA82A357210950FFF221C66FDE8430F0777C29C54BC
2,959,959 UART: [art] SIG.R = 86F76F6E0CA4631FD479E6BE08E3923A2FD81FB508D60ECCD1D7F875A51E895A14870B99272770523E3759DBED83FB48
2,966,720 UART: [art] SIG.S = 76ED4622E09C799587C5E0BD4E031DEE667D2146AB8F98C348E3617ABC6661C3F9C1D75F31D00EB94437E6611BD4707D
2,990,585 UART: Caliptra RT
2,990,930 UART: [state] CFI Enabled
3,099,041 UART: [rt] RT listening for mailbox commands...
3,099,711 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,931 UART: [rt]cmd =0x41544d4e, len=14344
3,532,696 >>> mbox cmd response data (8 bytes)
3,532,697 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,966 UART: [rt]cmd =0x41545348, len=116
3,584,527 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,569 ready_for_fw is high
1,055,569 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,406 >>> mbox cmd response: success
2,685,576 UART:
2,685,592 UART: Running Caliptra FMC ...
2,686,000 UART:
2,686,143 UART: [state] CFI Enabled
2,696,814 UART: [fht] FMC Alias Private Key: 7
2,805,191 UART: [art] Extend RT PCRs Done
2,805,619 UART: [art] Lock RT PCRs Done
2,807,363 UART: [art] Populate DV Done
2,815,432 UART: [fht] FMC Alias Private Key: 7
2,816,454 UART: [art] Derive CDI
2,816,734 UART: [art] Store in in slot 0x4
2,902,167 UART: [art] Derive Key Pair
2,902,527 UART: [art] Store priv key in slot 0x5
2,915,787 UART: [art] Derive Key Pair - Done
2,930,440 UART: [art] Signing Cert with AUTHO
2,930,920 UART: RITY.KEYID = 7
2,946,108 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,873 UART: [art] PUB.X = 3038C24931907A0957EF1629AAA536D020700587307A9104A4A61F3FEB31D390D3A4DCDE146F537CA0F48B6771AEAC14
2,953,634 UART: [art] PUB.Y = 5678A640B82C0C13E32B0BD221D3AE35C5D3822841519344C7B8A15D5E96286EEA49FF753767E2BBC406F449BEF357F4
2,960,577 UART: [art] SIG.R = 3F548B07C2A266E9AF12C95E1B206D96EA250483D904387D789578FE600B437987B77419206B6E007A80B45248E1F230
2,967,301 UART: [art] SIG.S = 8F0AEA7A298E7C490ECF71F88276CF42B241CFCCEBAC80E8C14082132140D4EC14C62E62D1844E91F6E758083400EFF1
2,991,447 UART: Caliptra RT
2,991,792 UART: [state] CFI Enabled
3,101,313 UART: [rt] RT listening for mailbox commands...
3,101,983 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,997 UART: [rt]cmd =0x41544d4e, len=14344
3,534,497 >>> mbox cmd response data (8 bytes)
3,534,498 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,621 UART: [rt]cmd =0x41545348, len=116
3,566,650 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,677 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,275 UART: [kat] SHA2-256
882,206 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,321 UART: [kat] ++
886,473 UART: [kat] sha1
890,939 UART: [kat] SHA2-256
892,877 UART: [kat] SHA2-384
895,582 UART: [kat] SHA2-512-ACC
897,483 UART: [kat] ECC-384
902,878 UART: [kat] HMAC-384Kdf
907,512 UART: [kat] LMS
1,475,708 UART: [kat] --
1,476,425 UART: [cold-reset] ++
1,476,839 UART: [fht] Storing FHT @ 0x50003400
1,479,506 UART: [idev] ++
1,479,674 UART: [idev] CDI.KEYID = 6
1,480,034 UART: [idev] SUBJECT.KEYID = 7
1,480,458 UART: [idev] UDS.KEYID = 0
1,480,803 ready_for_fw is high
1,480,803 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,374 UART: [idev] Erasing UDS.KEYID = 0
1,505,406 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,160 UART: [idev] --
1,515,141 UART: [ldev] ++
1,515,309 UART: [ldev] CDI.KEYID = 6
1,515,672 UART: [ldev] SUBJECT.KEYID = 5
1,516,098 UART: [ldev] AUTHORITY.KEYID = 7
1,516,561 UART: [ldev] FE.KEYID = 1
1,521,877 UART: [ldev] Erasing FE.KEYID = 1
1,547,644 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,590 UART: [ldev] --
1,587,085 UART: [fwproc] Waiting for Commands...
1,587,720 UART: [fwproc] Received command 0x46574c44
1,588,511 UART: [fwproc] Received Image of size 114332 bytes
2,885,253 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,071 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,423 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,336 >>> mbox cmd response: success
3,079,480 UART: [afmc] ++
3,079,648 UART: [afmc] CDI.KEYID = 6
3,080,010 UART: [afmc] SUBJECT.KEYID = 7
3,080,435 UART: [afmc] AUTHORITY.KEYID = 5
3,115,850 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,122 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,902 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,630 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,515 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,205 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,116 UART: [afmc] --
3,159,160 UART: [cold-reset] --
3,160,146 UART: [state] Locking Datavault
3,161,393 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,997 UART: [state] Locking ICCM
3,162,473 UART: [exit] Launching FMC @ 0x40000130
3,167,802 UART:
3,167,818 UART: Running Caliptra FMC ...
3,168,226 UART:
3,168,280 UART: [state] CFI Enabled
3,178,897 UART: [fht] FMC Alias Private Key: 7
3,286,518 UART: [art] Extend RT PCRs Done
3,286,946 UART: [art] Lock RT PCRs Done
3,288,396 UART: [art] Populate DV Done
3,296,771 UART: [fht] FMC Alias Private Key: 7
3,297,797 UART: [art] Derive CDI
3,298,077 UART: [art] Store in in slot 0x4
3,384,146 UART: [art] Derive Key Pair
3,384,506 UART: [art] Store priv key in slot 0x5
3,397,856 UART: [art] Derive Key Pair - Done
3,412,374 UART: [art] Signing Cert with AUTHO
3,412,854 UART: RITY.KEYID = 7
3,427,712 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,477 UART: [art] PUB.X = 62870A0967473662A05722B6B1935E8CFC49CFA83501B90061F02A780EFC58EEB396D591C6FAC1F8F500E95193302EEE
3,435,191 UART: [art] PUB.Y = 24AC68FC80B86A87D924B584065261E0504442244D74AFBAA8B99A42476AC091B5661497C0052A245E21C80233B3595E
3,442,122 UART: [art] SIG.R = 918B0F2CB3C3833243DFB6A8A5AF4E14638E891EFA59EB54F6C40105C1E629ED350E72BB01EDD98A0B16C014F36CB559
3,448,886 UART: [art] SIG.S = E1D6D85B5AE44D56947F99088E87226C4D4A984DF4C809D4CAAA811CE9A40B7AC388B07DBAF7C4AC2FCCCCE3E17E5F6C
3,472,686 UART: Caliptra RT
3,472,939 UART: [state] CFI Enabled
3,581,829 UART: [rt] RT listening for mailbox commands...
3,582,499 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,431 UART: [rt]cmd =0x41544d4e, len=14344
4,014,838 >>> mbox cmd response data (8 bytes)
4,014,839 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,806 UART: [rt]cmd =0x41545348, len=116
4,066,499 >>> mbox cmd response data (12 bytes)
4,066,500 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,067,492 UART:
4,067,508 UART: Running Caliptra ROM ...
4,067,916 UART:
4,067,970 UART: [state] CFI Enabled
4,070,340 UART: [state] LifecycleState = Unprovisioned
4,070,995 UART: [state] DebugLocked = No
4,071,485 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,073,098 UART: [kat] SHA2-256
4,867,029 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,871,144 UART: [kat] ++
4,871,296 UART: [kat] sha1
4,875,526 UART: [kat] SHA2-256
4,877,464 UART: [kat] SHA2-384
4,880,099 UART: [kat] SHA2-512-ACC
4,881,999 UART: [kat] ECC-384
4,887,222 UART: [kat] HMAC-384Kdf
4,891,794 UART: [kat] LMS
5,459,990 UART: [kat] --
5,461,051 UART: [update-reset] ++
6,388,939 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,390,087 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,486,521 >>> mbox cmd response: success
6,486,521 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,486,796 UART: [update-reset] Copying MAN_2 To MAN_1
6,494,810 UART: [update-reset Success] --
6,495,803 UART: [state] Locking Datavault
6,496,615 UART: [state] Locking PCR0, PCR1 and PCR31
6,497,219 UART: [state] Locking ICCM
6,497,673 UART: [exit] Launching FMC @ 0x40000130
6,503,002 UART:
6,503,018 UART: Running Caliptra FMC ...
6,503,426 UART:
6,503,480 UART: [state] CFI Enabled
6,592,457 UART: [art] Extend RT PCRs Done
6,592,885 UART: [art] Lock RT PCRs Done
6,594,056 UART: [art] Populate DV Done
6,602,375 UART: [fht] FMC Alias Private Key: 7
6,603,503 UART: [art] Derive CDI
6,603,783 UART: [art] Store in in slot 0x4
6,689,312 UART: [art] Derive Key Pair
6,689,672 UART: [art] Store priv key in slot 0x5
6,703,070 UART: [art] Derive Key Pair - Done
6,718,135 UART: [art] Signing Cert with AUTHO
6,718,615 UART: RITY.KEYID = 7
6,734,259 UART: [art] Erasing AUTHORITY.KEYID = 7
6,735,024 UART: [art] PUB.X = 09C4D17128F3E849B69DFC1DA952108CF78F6E04BB046164ECB438C9445F94D73ED0C6D53BAE3DA050EA748306D5F2CF
6,741,794 UART: [art] PUB.Y = 2C8A38CC0B814A5AC1DF64899D9DC61A3623DA6312CEF1C5A1D0289DE90F49D1A56EC6863D1A26F2103546CB52848C14
6,748,746 UART: [art] SIG.R = 813B412DCBBF297F7FF61895CB5920164DC687DC90572BA99CE36087CA43360CCAD7A14AB9DA0FD19502176110A726FB
6,755,515 UART: [art] SIG.S = 825BF5B1F106FADDBCC068797C3C3DA5556C969D858FF19B56FC26AD94A0C8DB74E04C9D56CC56958AD1FA95D636D801
6,779,094 UART: mbox::rt_entry...
6,779,466 UART: ____ _ _ _ ____ _____
6,780,250 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,781,050 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,781,818 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,782,586 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,783,354 UART: |_|
6,783,666 UART:
7,062,769 UART: [rt] Runtime listening for mailbox commands...
7,063,959 >>> mbox cmd response data (48 bytes)
7,063,960 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
7,066,743 >>> mbox cmd response data (48 bytes)
7,066,744 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
7,081,881 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,649 ready_for_fw is high
1,362,649 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,649 >>> mbox cmd response: success
2,988,661 UART:
2,988,677 UART: Running Caliptra FMC ...
2,989,085 UART:
2,989,139 UART: [state] CFI Enabled
2,999,686 UART: [fht] FMC Alias Private Key: 7
3,107,651 UART: [art] Extend RT PCRs Done
3,108,079 UART: [art] Lock RT PCRs Done
3,109,563 UART: [art] Populate DV Done
3,118,006 UART: [fht] FMC Alias Private Key: 7
3,119,144 UART: [art] Derive CDI
3,119,424 UART: [art] Store in in slot 0x4
3,204,931 UART: [art] Derive Key Pair
3,205,291 UART: [art] Store priv key in slot 0x5
3,218,223 UART: [art] Derive Key Pair - Done
3,233,130 UART: [art] Signing Cert with AUTHO
3,233,610 UART: RITY.KEYID = 7
3,248,614 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,379 UART: [art] PUB.X = CCADEC43382BBFD0EDEA113301CA5D9BC104727DC6EF30A1B52A1FC8BA307593EF6A76D711855CE12FDC18DA8BDBB45C
3,256,173 UART: [art] PUB.Y = D8AF63516C349FD2294AD7A2D6CDA49D1A30AED23F16C6F1A7B097EE1E69EBA9701C815C913B3B571A2C58369CBFAA20
3,263,141 UART: [art] SIG.R = AEFD2C51D4B257F7FB0AC3CE959DE70EDE45D6E1BC2C2C26945FD82BC384C15DDC694D285FE6E1EAED2CE70F4ADAC6F5
3,269,938 UART: [art] SIG.S = BB5D6691DA6D0ADC40F003AC00BF708B561D7EF5503F959BD43404BC3B42EC8A5E96C10142397395A712AF9DA9C89B04
3,293,716 UART: Caliptra RT
3,293,969 UART: [state] CFI Enabled
3,401,565 UART: [rt] RT listening for mailbox commands...
3,402,235 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,663 UART: [rt]cmd =0x41544d4e, len=14344
3,836,006 >>> mbox cmd response data (8 bytes)
3,836,007 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,272 UART: [rt]cmd =0x41545348, len=116
3,888,823 >>> mbox cmd response data (12 bytes)
3,888,824 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,190,003 >>> mbox cmd response: success
6,190,003 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,203,552 UART:
6,203,568 UART: Running Caliptra FMC ...
6,203,976 UART:
6,204,030 UART: [state] CFI Enabled
6,293,183 UART: [art] Extend RT PCRs Done
6,293,611 UART: [art] Lock RT PCRs Done
6,294,838 UART: [art] Populate DV Done
6,303,149 UART: [fht] FMC Alias Private Key: 7
6,304,331 UART: [art] Derive CDI
6,304,611 UART: [art] Store in in slot 0x4
6,390,432 UART: [art] Derive Key Pair
6,390,792 UART: [art] Store priv key in slot 0x5
6,404,600 UART: [art] Derive Key Pair - Done
6,419,189 UART: [art] Signing Cert with AUTHO
6,419,669 UART: RITY.KEYID = 7
6,434,761 UART: [art] Erasing AUTHORITY.KEYID = 7
6,435,526 UART: [art] PUB.X = 7B508E8CA51F56B8E7D54F8DCD0F95F3B1D090DA532F58D78E591FC9D0F550AF98AB6471B06170D597CBF430ABB75BF2
6,442,309 UART: [art] PUB.Y = 47A8CB723C624DEB304298886CA1186FEA133EEB83F5FE7552811FDAE399B2842AA2BE3CBD980DD5D6304CEAF4C9BE14
6,449,274 UART: [art] SIG.R = 503E8E6761AB410592D18B48F4A2BFAD28FE0FAD066CCBA6212408ECEFE6D69E5D4DCAD01CFD95AA7B2EA6D05D3D078D
6,456,057 UART: [art] SIG.S = ACAE7BF9645E41DEA54580F28DC37CA3321D6535AA56317F4197CC1253A3EC15B0463BD64FF2E864A690EFDE64D0E167
6,479,228 UART: mbox::rt_entry...
6,479,600 UART: ____ _ _ _ ____ _____
6,480,384 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,481,184 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,481,952 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,482,720 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,483,488 UART: |_|
6,483,800 UART:
6,761,062 UART: [rt] Runtime listening for mailbox commands...
6,762,252 >>> mbox cmd response data (48 bytes)
6,762,253 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,765,036 >>> mbox cmd response data (48 bytes)
6,765,037 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,780,174 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,340 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,996 UART: [kat] SHA2-256
881,927 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,042 UART: [kat] ++
886,194 UART: [kat] sha1
890,508 UART: [kat] SHA2-256
892,446 UART: [kat] SHA2-384
895,417 UART: [kat] SHA2-512-ACC
897,318 UART: [kat] ECC-384
902,809 UART: [kat] HMAC-384Kdf
907,455 UART: [kat] LMS
1,475,651 UART: [kat] --
1,476,476 UART: [cold-reset] ++
1,476,880 UART: [fht] Storing FHT @ 0x50003400
1,479,707 UART: [idev] ++
1,479,875 UART: [idev] CDI.KEYID = 6
1,480,235 UART: [idev] SUBJECT.KEYID = 7
1,480,659 UART: [idev] UDS.KEYID = 0
1,481,004 ready_for_fw is high
1,481,004 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,079 UART: [idev] Erasing UDS.KEYID = 0
1,505,521 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,981 UART: [idev] --
1,515,098 UART: [ldev] ++
1,515,266 UART: [ldev] CDI.KEYID = 6
1,515,629 UART: [ldev] SUBJECT.KEYID = 5
1,516,055 UART: [ldev] AUTHORITY.KEYID = 7
1,516,518 UART: [ldev] FE.KEYID = 1
1,521,882 UART: [ldev] Erasing FE.KEYID = 1
1,547,583 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,355 UART: [ldev] --
1,586,864 UART: [fwproc] Waiting for Commands...
1,587,547 UART: [fwproc] Received command 0x46574c44
1,588,338 UART: [fwproc] Received Image of size 114332 bytes
2,886,658 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,262 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,614 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,427 >>> mbox cmd response: success
3,080,631 UART: [afmc] ++
3,080,799 UART: [afmc] CDI.KEYID = 6
3,081,161 UART: [afmc] SUBJECT.KEYID = 7
3,081,586 UART: [afmc] AUTHORITY.KEYID = 5
3,117,125 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,637 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,417 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,145 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,030 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,720 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,595 UART: [afmc] --
3,160,535 UART: [cold-reset] --
3,161,329 UART: [state] Locking Datavault
3,162,630 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,234 UART: [state] Locking ICCM
3,163,754 UART: [exit] Launching FMC @ 0x40000130
3,169,083 UART:
3,169,099 UART: Running Caliptra FMC ...
3,169,507 UART:
3,169,650 UART: [state] CFI Enabled
3,180,145 UART: [fht] FMC Alias Private Key: 7
3,287,554 UART: [art] Extend RT PCRs Done
3,287,982 UART: [art] Lock RT PCRs Done
3,289,520 UART: [art] Populate DV Done
3,298,013 UART: [fht] FMC Alias Private Key: 7
3,298,981 UART: [art] Derive CDI
3,299,261 UART: [art] Store in in slot 0x4
3,384,986 UART: [art] Derive Key Pair
3,385,346 UART: [art] Store priv key in slot 0x5
3,398,992 UART: [art] Derive Key Pair - Done
3,413,461 UART: [art] Signing Cert with AUTHO
3,413,941 UART: RITY.KEYID = 7
3,428,729 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,494 UART: [art] PUB.X = 5E32C3491D97FEB599544FAF84E8537036EC8D8DDDD7621C23AEED6EE3B97BC49E7F833089A5B3C2D2BE1C3F17656359
3,436,276 UART: [art] PUB.Y = 31BD21F338AB651DCEE28275CE1838F2021F5B333A2B5759D6743D24E301B72E74169ECD74721352A6367282B01C5203
3,443,209 UART: [art] SIG.R = 7A3FDC7FD19BCD7A6AD7E14F326C76E196BDB9302DED619799471874449BCCD034A3394EFAC2694536D2D03FFE7AA04E
3,449,995 UART: [art] SIG.S = C12DF32CC5ADBCFD8F1A72F76D2FD86B846DB3BDB79E412832F24E250630AC274EC35341F00332D4ACA39FC520FB4D04
3,473,281 UART: Caliptra RT
3,473,626 UART: [state] CFI Enabled
3,581,501 UART: [rt] RT listening for mailbox commands...
3,582,171 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,121 UART: [rt]cmd =0x41544d4e, len=14344
4,015,138 >>> mbox cmd response data (8 bytes)
4,015,139 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,078 UART: [rt]cmd =0x41545348, len=116
4,066,255 >>> mbox cmd response data (12 bytes)
4,066,256 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,066,864 UART:
4,066,880 UART: Running Caliptra ROM ...
4,067,288 UART:
4,067,429 UART: [state] CFI Enabled
4,070,049 UART: [state] LifecycleState = Unprovisioned
4,070,704 UART: [state] DebugLocked = No
4,071,238 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,072,931 UART: [kat] SHA2-256
4,866,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,870,977 UART: [kat] ++
4,871,129 UART: [kat] sha1
4,875,463 UART: [kat] SHA2-256
4,877,401 UART: [kat] SHA2-384
4,880,014 UART: [kat] SHA2-512-ACC
4,881,914 UART: [kat] ECC-384
4,887,423 UART: [kat] HMAC-384Kdf
4,891,993 UART: [kat] LMS
5,460,189 UART: [kat] --
5,461,206 UART: [update-reset] ++
6,388,272 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,389,514 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,485,948 >>> mbox cmd response: success
6,485,948 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,486,267 UART: [update-reset] Copying MAN_2 To MAN_1
6,494,281 UART: [update-reset Success] --
6,495,116 UART: [state] Locking Datavault
6,495,872 UART: [state] Locking PCR0, PCR1 and PCR31
6,496,476 UART: [state] Locking ICCM
6,497,124 UART: [exit] Launching FMC @ 0x40000130
6,502,453 UART:
6,502,469 UART: Running Caliptra FMC ...
6,502,877 UART:
6,503,020 UART: [state] CFI Enabled
6,592,751 UART: [art] Extend RT PCRs Done
6,593,179 UART: [art] Lock RT PCRs Done
6,594,198 UART: [art] Populate DV Done
6,602,553 UART: [fht] FMC Alias Private Key: 7
6,603,569 UART: [art] Derive CDI
6,603,849 UART: [art] Store in in slot 0x4
6,689,460 UART: [art] Derive Key Pair
6,689,820 UART: [art] Store priv key in slot 0x5
6,703,320 UART: [art] Derive Key Pair - Done
6,718,404 UART: [art] Signing Cert with AUTHO
6,718,884 UART: RITY.KEYID = 7
6,734,214 UART: [art] Erasing AUTHORITY.KEYID = 7
6,734,979 UART: [art] PUB.X = AF03F1D82AC099DBB3BEECE148F4D437F3BF76A218CE49DC8F1F7C67FB360ED6A21B2184E7FE0B47A50BB6DE1A250B1C
6,741,762 UART: [art] PUB.Y = BAA0D304C9DB3673F23D2E70B88B80DDAED59C75E6C22975564417F9C6CEF40E7C9D0DAA4AB7A8A98D25DDB664031B95
6,748,718 UART: [art] SIG.R = 8B6E89721183D2F70742EDD9B2C9A33245119C9F35FC7DC163863A6E1E65010955B56D6AC6DF849DE9E4393741E996F8
6,755,477 UART: [art] SIG.S = 51A2A9E2ECCF35A29ED3084EC834E1520FD93BC8B27A670AB52EC248F3750C1CD9D19E3E7E442874B4E8901AE7C939B6
6,778,996 UART: mbox::rt_entry...
6,779,368 UART: ____ _ _ _ ____ _____
6,780,152 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,780,952 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,781,720 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,782,488 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,783,256 UART: |_|
6,783,568 UART:
7,066,348 UART: [rt] Runtime listening for mailbox commands...
7,067,538 >>> mbox cmd response data (48 bytes)
7,067,539 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
7,070,322 >>> mbox cmd response data (48 bytes)
7,070,323 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
7,085,460 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,370 ready_for_fw is high
1,362,370 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,307 >>> mbox cmd response: success
2,990,385 UART:
2,990,401 UART: Running Caliptra FMC ...
2,990,809 UART:
2,990,952 UART: [state] CFI Enabled
3,001,639 UART: [fht] FMC Alias Private Key: 7
3,110,164 UART: [art] Extend RT PCRs Done
3,110,592 UART: [art] Lock RT PCRs Done
3,112,216 UART: [art] Populate DV Done
3,120,331 UART: [fht] FMC Alias Private Key: 7
3,121,301 UART: [art] Derive CDI
3,121,581 UART: [art] Store in in slot 0x4
3,207,070 UART: [art] Derive Key Pair
3,207,430 UART: [art] Store priv key in slot 0x5
3,220,576 UART: [art] Derive Key Pair - Done
3,235,509 UART: [art] Signing Cert with AUTHO
3,235,989 UART: RITY.KEYID = 7
3,251,303 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,068 UART: [art] PUB.X = 366366767957C2834D109CCF31FF3991CB5F31F785A42F783DBACAD556542C10742C528B3F482CA7ED4219275A94C4F4
3,258,836 UART: [art] PUB.Y = B51B541C5F0D6B95B468CCF9987461B566896DE91A772E8A224C3B5567AA395BD44FB771F67A0B004BA0CC21DCB78E76
3,265,766 UART: [art] SIG.R = B90DB8CF3FC0C5C3585FC789899A4DF7EF6399BDFCABA988F7EF2394E43838C8F6278146F8BF74CB02D9A28BE93A66E5
3,272,548 UART: [art] SIG.S = 48C749FBE4C2954E4E3C7DED702FA80FE780C422B1257CE5A7292FF9FCBA3FF4264D12CDAD0B02F3FB7F1B3F38FBBD80
3,295,478 UART: Caliptra RT
3,295,823 UART: [state] CFI Enabled
3,403,968 UART: [rt] RT listening for mailbox commands...
3,404,638 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,598 UART: [rt]cmd =0x41544d4e, len=14344
3,837,171 >>> mbox cmd response data (8 bytes)
3,837,172 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,095 UART: [rt]cmd =0x41545348, len=116
3,888,328 >>> mbox cmd response data (12 bytes)
3,888,329 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,188,457 >>> mbox cmd response: success
6,188,457 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,201,846 UART:
6,201,862 UART: Running Caliptra FMC ...
6,202,270 UART:
6,202,413 UART: [state] CFI Enabled
6,291,584 UART: [art] Extend RT PCRs Done
6,292,012 UART: [art] Lock RT PCRs Done
6,293,435 UART: [art] Populate DV Done
6,301,838 UART: [fht] FMC Alias Private Key: 7
6,302,808 UART: [art] Derive CDI
6,303,088 UART: [art] Store in in slot 0x4
6,388,919 UART: [art] Derive Key Pair
6,389,279 UART: [art] Store priv key in slot 0x5
6,402,531 UART: [art] Derive Key Pair - Done
6,417,295 UART: [art] Signing Cert with AUTHO
6,417,775 UART: RITY.KEYID = 7
6,433,111 UART: [art] Erasing AUTHORITY.KEYID = 7
6,433,876 UART: [art] PUB.X = E9E46CFD6744E81EA2D201D99C1D2E35D1CE36A9AB4B30211B5B5A68B8C064CCA976A056EB0EE4EFF1B1888CA8E82A4E
6,440,662 UART: [art] PUB.Y = DE261D11B8E79494E1A23D536F3E9DCE99EF192298C65B93DBA054B80758767A6FFBD3FB5DD3136003C02BD2B6935945
6,447,612 UART: [art] SIG.R = 40DD3017027BEA8722F3B9009482E1D15154CDF0DEE8706196EE9BAF61BDBE1CF3EA113E3DC8FF146AF6546A35648102
6,454,364 UART: [art] SIG.S = AD931203977117DC827C2D862E9EFFCB618DCA4C6568F98C3795EAF07F1C91F4244D2E65444F6617635AFDC4B95E273C
6,478,382 UART: mbox::rt_entry...
6,478,754 UART: ____ _ _ _ ____ _____
6,479,538 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,480,338 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,481,106 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,481,874 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,482,642 UART: |_|
6,482,954 UART:
6,756,942 UART: [rt] Runtime listening for mailbox commands...
6,758,132 >>> mbox cmd response data (48 bytes)
6,758,133 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,760,916 >>> mbox cmd response data (48 bytes)
6,760,917 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,776,054 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,814 UART: [kat] SHA2-256
893,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,589 UART: [kat] ++
897,741 UART: [kat] sha1
902,009 UART: [kat] SHA2-256
903,949 UART: [kat] SHA2-384
906,572 UART: [kat] SHA2-512-ACC
908,473 UART: [kat] ECC-384
918,122 UART: [kat] HMAC-384Kdf
922,830 UART: [kat] LMS
1,171,158 UART: [kat] --
1,171,859 UART: [cold-reset] ++
1,172,385 UART: [fht] FHT @ 0x50003400
1,174,910 UART: [idev] ++
1,175,078 UART: [idev] CDI.KEYID = 6
1,175,438 UART: [idev] SUBJECT.KEYID = 7
1,175,862 UART: [idev] UDS.KEYID = 0
1,176,207 ready_for_fw is high
1,176,207 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,870 UART: [idev] Erasing UDS.KEYID = 0
1,201,001 UART: [idev] Sha1 KeyId Algorithm
1,209,679 UART: [idev] --
1,210,799 UART: [ldev] ++
1,210,967 UART: [ldev] CDI.KEYID = 6
1,211,330 UART: [ldev] SUBJECT.KEYID = 5
1,211,756 UART: [ldev] AUTHORITY.KEYID = 7
1,212,219 UART: [ldev] FE.KEYID = 1
1,217,533 UART: [ldev] Erasing FE.KEYID = 1
1,244,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,321 UART: [ldev] --
1,283,718 UART: [fwproc] Wait for Commands...
1,284,518 UART: [fwproc] Recv command 0x46574c44
1,285,246 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,822 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,849 >>> mbox cmd response: success
2,775,959 UART: [afmc] ++
2,776,127 UART: [afmc] CDI.KEYID = 6
2,776,489 UART: [afmc] SUBJECT.KEYID = 7
2,776,914 UART: [afmc] AUTHORITY.KEYID = 5
2,812,645 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,734 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,462 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,347 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,066 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,018 UART: [afmc] --
2,855,930 UART: [cold-reset] --
2,856,988 UART: [state] Locking Datavault
2,858,297 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,901 UART: [state] Locking ICCM
2,859,363 UART: [exit] Launching FMC @ 0x40000130
2,864,692 UART:
2,864,708 UART: Running Caliptra FMC ...
2,865,116 UART:
2,865,170 UART: [state] CFI Enabled
2,876,015 UART: [fht] FMC Alias Private Key: 7
2,984,096 UART: [art] Extend RT PCRs Done
2,984,524 UART: [art] Lock RT PCRs Done
2,986,218 UART: [art] Populate DV Done
2,994,385 UART: [fht] FMC Alias Private Key: 7
2,995,415 UART: [art] Derive CDI
2,995,695 UART: [art] Store in in slot 0x4
3,081,164 UART: [art] Derive Key Pair
3,081,524 UART: [art] Store priv key in slot 0x5
3,094,130 UART: [art] Derive Key Pair - Done
3,108,772 UART: [art] Signing Cert with AUTHO
3,109,252 UART: RITY.KEYID = 7
3,124,280 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,045 UART: [art] PUB.X = 94985BD973FBA7FBA339D2CFC39DF449EBB27B19FFF0E81CD9C11159C634190CBA945094B6BDE181D3B7A93F2B2FC675
3,131,830 UART: [art] PUB.Y = 677D436C2779E0E19357C7D9CF3F12B6407AB2B5EF93B6D7A5C5CEC0C8A0F8B30E3BD35E7E07C02C90DEC513C4565D79
3,138,788 UART: [art] SIG.R = 4C2EF7F88853007A18F8D6B477CC49AE12893EB36D6801D0108C98C4F1312353882ADDD9CEAC13F2810A17BBFF4A893D
3,145,538 UART: [art] SIG.S = 3CE78F14208D230595DF368E9DDE4CEF0D96C5AB84C31A267655AEF2949499FD3647087A599CD0C47B0F3ED2B15724F3
3,169,459 UART: Caliptra RT
3,169,712 UART: [state] CFI Enabled
3,277,333 UART: [rt] RT listening for mailbox commands...
3,278,003 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,361 UART: [rt]cmd =0x41544d4e, len=14344
3,711,396 >>> mbox cmd response data (8 bytes)
3,711,397 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,332 UART: [rt]cmd =0x41545348, len=116
3,763,535 >>> mbox cmd response data (12 bytes)
3,763,536 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,351 UART:
3,764,367 UART: Running Caliptra ROM ...
3,764,775 UART:
3,764,830 UART: [state] CFI Enabled
3,767,742 UART: [state] LifecycleState = Unprovisioned
3,768,397 UART: [state] DebugLocked = No
3,769,087 UART: [state] WD Timer not started. Device not locked for debugging
3,770,413 UART: [kat] SHA2-256
4,576,063 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,580,188 UART: [kat] ++
4,580,340 UART: [kat] sha1
4,584,694 UART: [kat] SHA2-256
4,586,634 UART: [kat] SHA2-384
4,589,431 UART: [kat] SHA2-512-ACC
4,591,331 UART: [kat] ECC-384
4,600,962 UART: [kat] HMAC-384Kdf
4,605,712 UART: [kat] LMS
4,854,040 UART: [kat] --
4,854,914 UART: [update-reset] ++
5,759,398 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,760,487 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,856,869 >>> mbox cmd response: success
5,856,869 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,857,214 UART: [update-reset] Copying MAN_2 To MAN_1
5,865,228 UART: [update-reset Success] --
5,866,137 UART: [state] Locking Datavault
5,866,965 UART: [state] Locking PCR0, PCR1 and PCR31
5,867,569 UART: [state] Locking ICCM
5,868,097 UART: [exit] Launching FMC @ 0x40000130
5,873,426 UART:
5,873,442 UART: Running Caliptra FMC ...
5,873,850 UART:
5,873,904 UART: [state] CFI Enabled
5,962,999 UART: [art] Extend RT PCRs Done
5,963,427 UART: [art] Lock RT PCRs Done
5,964,884 UART: [art] Populate DV Done
5,972,699 UART: [fht] FMC Alias Private Key: 7
5,973,811 UART: [art] Derive CDI
5,974,091 UART: [art] Store in in slot 0x4
6,059,438 UART: [art] Derive Key Pair
6,059,798 UART: [art] Store priv key in slot 0x5
6,073,018 UART: [art] Derive Key Pair - Done
6,087,714 UART: [art] Signing Cert with AUTHO
6,088,194 UART: RITY.KEYID = 7
6,103,328 UART: [art] Erasing AUTHORITY.KEYID = 7
6,104,093 UART: [art] PUB.X = 6287EDDDBAAEDB727CE6277B8AC3AFADB7D54E39B1DB02FF67E26F777D58D37CBFE9BB3860BC6E9C27F4C797C0105615
6,110,886 UART: [art] PUB.Y = D186E82BABEB658A2BEF371D8F00EA58F9FCBFB9778EAE2610E6B8BE640F555CA298DD7F7371F698310EF88534A4773D
6,117,824 UART: [art] SIG.R = 7D5505136CE0D26E243FBD0D5EFF3E9939605B581E7E0FB618C018DF64A508AD8BE25B6A423B210F0834EB0B1F1A2796
6,124,581 UART: [art] SIG.S = 77BAB67951A73BA07B0822A573F8552097D1F1CD578BC7711F82E8B9C2953AB759A1836111A71B08DD04E4514F4A2E4D
6,148,641 UART: mbox::rt_entry...
6,149,013 UART: ____ _ _ _ ____ _____
6,149,797 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,150,597 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,151,365 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,152,133 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,152,901 UART: |_|
6,153,213 UART:
6,433,709 UART: [rt] Runtime listening for mailbox commands...
6,434,899 >>> mbox cmd response data (48 bytes)
6,434,900 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,437,683 >>> mbox cmd response data (48 bytes)
6,437,684 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,452,821 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,757 ready_for_fw is high
1,060,757 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,800 >>> mbox cmd response: success
2,685,304 UART:
2,685,320 UART: Running Caliptra FMC ...
2,685,728 UART:
2,685,782 UART: [state] CFI Enabled
2,696,339 UART: [fht] FMC Alias Private Key: 7
2,804,218 UART: [art] Extend RT PCRs Done
2,804,646 UART: [art] Lock RT PCRs Done
2,806,594 UART: [art] Populate DV Done
2,815,077 UART: [fht] FMC Alias Private Key: 7
2,816,027 UART: [art] Derive CDI
2,816,307 UART: [art] Store in in slot 0x4
2,901,786 UART: [art] Derive Key Pair
2,902,146 UART: [art] Store priv key in slot 0x5
2,915,398 UART: [art] Derive Key Pair - Done
2,929,892 UART: [art] Signing Cert with AUTHO
2,930,372 UART: RITY.KEYID = 7
2,945,722 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,487 UART: [art] PUB.X = 5A56836D8134C53E37788354B76A2C61806FDDA92EA7EFD43ADDCEC08CA848B4C89D747485A890204D2DD7B308ACBB0B
2,953,263 UART: [art] PUB.Y = 33F2815E1A25B3001BC063D391F024DBD29DC475B993CEC14DFF4DDB9021DEC80D50CDE532B39C25E1EEBB2059ABBB62
2,960,208 UART: [art] SIG.R = 9230EE48C8DB313CA34804CC949D6F9E06E0D7AE6133FF19619F148FC6571AE52E65085543D640EC74D7B6E7B5652F77
2,966,971 UART: [art] SIG.S = DD15EC19026502388F1E8B260C18A9651D60D824A1CF106719EBD74EE20F339402FE2AC497874FF81EA71274CF9BCD71
2,990,659 UART: Caliptra RT
2,990,912 UART: [state] CFI Enabled
3,098,350 UART: [rt] RT listening for mailbox commands...
3,099,020 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,018 UART: [rt]cmd =0x41544d4e, len=14344
3,532,205 >>> mbox cmd response data (8 bytes)
3,532,206 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,253 UART: [rt]cmd =0x41545348, len=116
3,585,088 >>> mbox cmd response data (12 bytes)
3,585,089 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,561,715 >>> mbox cmd response: success
5,561,715 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,574,961 UART:
5,574,977 UART: Running Caliptra FMC ...
5,575,385 UART:
5,575,439 UART: [state] CFI Enabled
5,663,776 UART: [art] Extend RT PCRs Done
5,664,204 UART: [art] Lock RT PCRs Done
5,665,257 UART: [art] Populate DV Done
5,673,408 UART: [fht] FMC Alias Private Key: 7
5,674,566 UART: [art] Derive CDI
5,674,846 UART: [art] Store in in slot 0x4
5,760,881 UART: [art] Derive Key Pair
5,761,241 UART: [art] Store priv key in slot 0x5
5,774,089 UART: [art] Derive Key Pair - Done
5,788,708 UART: [art] Signing Cert with AUTHO
5,789,188 UART: RITY.KEYID = 7
5,804,040 UART: [art] Erasing AUTHORITY.KEYID = 7
5,804,805 UART: [art] PUB.X = 0AEAB8936246C5057AB82DCE84C16657A0AEA9EFA0DE29D3ADE6DAB46C42ED0DAAC23C0B08A9F87D4ACAD11CDFB4F155
5,811,594 UART: [art] PUB.Y = CC4E7A677DD940E10518AEAE738B88A46B095385766125629248649B1471E57ED27EC6FA96963F5D2B17163F00E8B2E8
5,818,512 UART: [art] SIG.R = A0B76F39944EA42BBC95747A1A86B0AC077DD817A4D5538C4074F815A6D0494D2F0F01156DCB49856BA7F17973E4369C
5,825,275 UART: [art] SIG.S = A1D2D6805FC718576FB8A62687D7E177BB492C6010BAAB08CC933A2887A008F8A164B0F264EA8D853AE31DC98EB14BD7
5,849,222 UART: mbox::rt_entry...
5,849,594 UART: ____ _ _ _ ____ _____
5,850,378 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,851,178 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,851,946 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,852,714 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,853,482 UART: |_|
5,853,794 UART:
6,131,681 UART: [rt] Runtime listening for mailbox commands...
6,132,871 >>> mbox cmd response data (48 bytes)
6,132,872 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,135,655 >>> mbox cmd response data (48 bytes)
6,135,656 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,150,793 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [kat] SHA2-256
893,557 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,682 UART: [kat] ++
897,834 UART: [kat] sha1
902,234 UART: [kat] SHA2-256
904,174 UART: [kat] SHA2-384
906,949 UART: [kat] SHA2-512-ACC
908,850 UART: [kat] ECC-384
918,729 UART: [kat] HMAC-384Kdf
923,169 UART: [kat] LMS
1,171,497 UART: [kat] --
1,172,476 UART: [cold-reset] ++
1,173,002 UART: [fht] FHT @ 0x50003400
1,175,549 UART: [idev] ++
1,175,717 UART: [idev] CDI.KEYID = 6
1,176,077 UART: [idev] SUBJECT.KEYID = 7
1,176,501 UART: [idev] UDS.KEYID = 0
1,176,846 ready_for_fw is high
1,176,846 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,871 UART: [idev] Erasing UDS.KEYID = 0
1,202,106 UART: [idev] Sha1 KeyId Algorithm
1,210,606 UART: [idev] --
1,211,582 UART: [ldev] ++
1,211,750 UART: [ldev] CDI.KEYID = 6
1,212,113 UART: [ldev] SUBJECT.KEYID = 5
1,212,539 UART: [ldev] AUTHORITY.KEYID = 7
1,213,002 UART: [ldev] FE.KEYID = 1
1,218,150 UART: [ldev] Erasing FE.KEYID = 1
1,244,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,446 UART: [ldev] --
1,283,765 UART: [fwproc] Wait for Commands...
1,284,367 UART: [fwproc] Recv command 0x46574c44
1,285,095 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,604 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,119 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,423 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,154 >>> mbox cmd response: success
2,777,268 UART: [afmc] ++
2,777,436 UART: [afmc] CDI.KEYID = 6
2,777,798 UART: [afmc] SUBJECT.KEYID = 7
2,778,223 UART: [afmc] AUTHORITY.KEYID = 5
2,813,422 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,663 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,391 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,276 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,995 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,885 UART: [afmc] --
2,856,797 UART: [cold-reset] --
2,857,613 UART: [state] Locking Datavault
2,858,992 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,596 UART: [state] Locking ICCM
2,860,044 UART: [exit] Launching FMC @ 0x40000130
2,865,373 UART:
2,865,389 UART: Running Caliptra FMC ...
2,865,797 UART:
2,865,940 UART: [state] CFI Enabled
2,876,581 UART: [fht] FMC Alias Private Key: 7
2,984,968 UART: [art] Extend RT PCRs Done
2,985,396 UART: [art] Lock RT PCRs Done
2,986,854 UART: [art] Populate DV Done
2,995,019 UART: [fht] FMC Alias Private Key: 7
2,996,025 UART: [art] Derive CDI
2,996,305 UART: [art] Store in in slot 0x4
3,081,920 UART: [art] Derive Key Pair
3,082,280 UART: [art] Store priv key in slot 0x5
3,095,218 UART: [art] Derive Key Pair - Done
3,109,807 UART: [art] Signing Cert with AUTHO
3,110,287 UART: RITY.KEYID = 7
3,125,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,408 UART: [art] PUB.X = C530E032594EBA295233B2257632BBB0ED0785878140F89286F5CD5486FF10CA94B3DB6F3369CBD9C8B07868AEF2ADC6
3,133,181 UART: [art] PUB.Y = 2C36CB9B92A5A5674849F0250C765C9E37284F292724C4DA0EF66ED5DBEA37CF108E020216561A3A984C65335D2C2DB4
3,140,121 UART: [art] SIG.R = 741A75FA3F1B77726399460FA062C600F26C9F310282FC1C0C65DEFAB1662D02DAE02B409787128608A3A62588821BC1
3,146,850 UART: [art] SIG.S = DEDD1B45F21040852C1E26688E904452B9009972170F02FE3B99335B62CEE7558F15315194D0554894B44046CEDB7ED6
3,170,225 UART: Caliptra RT
3,170,570 UART: [state] CFI Enabled
3,277,503 UART: [rt] RT listening for mailbox commands...
3,278,173 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,475 UART: [rt]cmd =0x41544d4e, len=14344
3,711,542 >>> mbox cmd response data (8 bytes)
3,711,543 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,692 UART: [rt]cmd =0x41545348, len=116
3,763,801 >>> mbox cmd response data (12 bytes)
3,763,802 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,671 UART:
3,764,687 UART: Running Caliptra ROM ...
3,765,095 UART:
3,765,237 UART: [state] CFI Enabled
3,768,103 UART: [state] LifecycleState = Unprovisioned
3,768,758 UART: [state] DebugLocked = No
3,769,332 UART: [state] WD Timer not started. Device not locked for debugging
3,770,600 UART: [kat] SHA2-256
4,576,250 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,580,375 UART: [kat] ++
4,580,527 UART: [kat] sha1
4,584,695 UART: [kat] SHA2-256
4,586,635 UART: [kat] SHA2-384
4,589,346 UART: [kat] SHA2-512-ACC
4,591,246 UART: [kat] ECC-384
4,601,057 UART: [kat] HMAC-384Kdf
4,605,701 UART: [kat] LMS
4,854,029 UART: [kat] --
4,854,805 UART: [update-reset] ++
5,759,271 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,760,468 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,856,850 >>> mbox cmd response: success
5,856,850 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,857,129 UART: [update-reset] Copying MAN_2 To MAN_1
5,865,143 UART: [update-reset Success] --
5,866,234 UART: [state] Locking Datavault
5,867,100 UART: [state] Locking PCR0, PCR1 and PCR31
5,867,704 UART: [state] Locking ICCM
5,868,378 UART: [exit] Launching FMC @ 0x40000130
5,873,707 UART:
5,873,723 UART: Running Caliptra FMC ...
5,874,131 UART:
5,874,274 UART: [state] CFI Enabled
5,963,103 UART: [art] Extend RT PCRs Done
5,963,531 UART: [art] Lock RT PCRs Done
5,964,964 UART: [art] Populate DV Done
5,973,209 UART: [fht] FMC Alias Private Key: 7
5,974,209 UART: [art] Derive CDI
5,974,489 UART: [art] Store in in slot 0x4
6,059,990 UART: [art] Derive Key Pair
6,060,350 UART: [art] Store priv key in slot 0x5
6,073,750 UART: [art] Derive Key Pair - Done
6,088,284 UART: [art] Signing Cert with AUTHO
6,088,764 UART: RITY.KEYID = 7
6,103,972 UART: [art] Erasing AUTHORITY.KEYID = 7
6,104,737 UART: [art] PUB.X = 494B6AD2660ED660DC1784F58E2D7301698B38AD7E01EBFF42D87A435170E84137CD434571C55239225B5477D4860020
6,111,466 UART: [art] PUB.Y = E2664B98CB4B2BEE12A5B700376A5ECD9C37A54C805528C9FE86D2E3468A99503AF9915CE6DA178D38E6FF57DA01381D
6,118,401 UART: [art] SIG.R = 2674849905D766BF949E3414B7F2C4D4E00CA4A1EE3B9A308E985B5676175B4E8C52C749B15F7649D82F23F5AC54DD3D
6,125,167 UART: [art] SIG.S = 58DA906DAE87CA91D6BE5974450A1474B9482F7C9A5D4DEB845BE82AA24BD5C3A0862E950CB2CF25282E93DF643C679B
6,148,524 UART: mbox::rt_entry...
6,148,896 UART: ____ _ _ _ ____ _____
6,149,680 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,150,480 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,151,248 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,152,016 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,152,784 UART: |_|
6,153,096 UART:
6,430,824 UART: [rt] Runtime listening for mailbox commands...
6,432,014 >>> mbox cmd response data (48 bytes)
6,432,015 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,434,798 >>> mbox cmd response data (48 bytes)
6,434,799 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,449,936 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,326 ready_for_fw is high
1,060,326 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,282 >>> mbox cmd response: success
2,687,836 UART:
2,687,852 UART: Running Caliptra FMC ...
2,688,260 UART:
2,688,403 UART: [state] CFI Enabled
2,699,036 UART: [fht] FMC Alias Private Key: 7
2,807,353 UART: [art] Extend RT PCRs Done
2,807,781 UART: [art] Lock RT PCRs Done
2,809,409 UART: [art] Populate DV Done
2,817,524 UART: [fht] FMC Alias Private Key: 7
2,818,620 UART: [art] Derive CDI
2,818,900 UART: [art] Store in in slot 0x4
2,904,667 UART: [art] Derive Key Pair
2,905,027 UART: [art] Store priv key in slot 0x5
2,918,415 UART: [art] Derive Key Pair - Done
2,933,107 UART: [art] Signing Cert with AUTHO
2,933,587 UART: RITY.KEYID = 7
2,948,905 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,670 UART: [art] PUB.X = 2C5CB84243446C538C5E3CAE859D2EBCB3F48C74492D42BF59D4D9D53598AFED287CE9533BCFDDF5F208917136C44AB6
2,956,451 UART: [art] PUB.Y = B75CD9405EEEC0912203972B882ACBEA3D0C21B160D4F6EDD6F24A47CD500A61868003439E9B0468E2306644A6281218
2,963,384 UART: [art] SIG.R = DCAA27197A27F02EBFA3B75DA4E11850E700E0A00F4FEEB41CC00222257E4524C5915CBCEE02ABDA826C908BCD1266CC
2,970,143 UART: [art] SIG.S = E258E915DA493767DE0859A5F2A48E39FC02251D2ABDD8E545EA6E284AECB4271D0E1495DCF3237E86D4422CA5BE35E6
2,994,065 UART: Caliptra RT
2,994,410 UART: [state] CFI Enabled
3,102,242 UART: [rt] RT listening for mailbox commands...
3,102,912 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,130 UART: [rt]cmd =0x41544d4e, len=14344
3,535,965 >>> mbox cmd response data (8 bytes)
3,535,966 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,943 UART: [rt]cmd =0x41545348, len=116
3,588,024 >>> mbox cmd response data (12 bytes)
3,588,025 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,565,032 >>> mbox cmd response: success
5,565,032 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,578,372 UART:
5,578,388 UART: Running Caliptra FMC ...
5,578,796 UART:
5,578,939 UART: [state] CFI Enabled
5,667,830 UART: [art] Extend RT PCRs Done
5,668,258 UART: [art] Lock RT PCRs Done
5,669,523 UART: [art] Populate DV Done
5,677,456 UART: [fht] FMC Alias Private Key: 7
5,678,438 UART: [art] Derive CDI
5,678,718 UART: [art] Store in in slot 0x4
5,764,343 UART: [art] Derive Key Pair
5,764,703 UART: [art] Store priv key in slot 0x5
5,778,533 UART: [art] Derive Key Pair - Done
5,793,262 UART: [art] Signing Cert with AUTHO
5,793,742 UART: RITY.KEYID = 7
5,809,210 UART: [art] Erasing AUTHORITY.KEYID = 7
5,809,975 UART: [art] PUB.X = A1E7A9F4D3E30B55BF8B56F7BB07EAD0E5FED77E8F67785873E71235A813CFEF8AE8AC1D410EFFAB13A1B4ABA808BFC1
5,816,763 UART: [art] PUB.Y = E92C12FF0FF0697663EE3DB6B63155C7ECA6017977DDB89D40CB51297582EA6A1D3B3C9B3D9017225E8994491B38C05E
5,823,711 UART: [art] SIG.R = F99734E6AFA8942CD8A0795B08FB38880AD7F43EDC758ACAF03424EC1E0523B5A7C8FA55E47FF0298C39D81B369304FC
5,830,481 UART: [art] SIG.S = 2B84F75334CA462DE4279D47D7D58959B0CE70BB080FE98ADB3DD5CE4987DB00D5726BEACC74A02EC4C8B3A32CFF1742
5,854,262 UART: mbox::rt_entry...
5,854,634 UART: ____ _ _ _ ____ _____
5,855,418 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,856,218 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,856,986 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,857,754 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,858,522 UART: |_|
5,858,834 UART:
6,136,336 UART: [rt] Runtime listening for mailbox commands...
6,137,526 >>> mbox cmd response data (48 bytes)
6,137,527 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,140,310 >>> mbox cmd response data (48 bytes)
6,140,311 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,155,448 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,420 UART: [kat] SHA2-512-ACC
906,321 UART: [kat] ECC-384
915,940 UART: [kat] HMAC-384Kdf
920,622 UART: [kat] LMS
1,168,934 UART: [kat] --
1,169,981 UART: [cold-reset] ++
1,170,409 UART: [fht] FHT @ 0x50003400
1,172,893 UART: [idev] ++
1,173,061 UART: [idev] CDI.KEYID = 6
1,173,422 UART: [idev] SUBJECT.KEYID = 7
1,173,847 UART: [idev] UDS.KEYID = 0
1,174,193 ready_for_fw is high
1,174,193 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,385 UART: [idev] Erasing UDS.KEYID = 0
1,198,641 UART: [idev] Sha1 KeyId Algorithm
1,207,443 UART: [idev] --
1,208,644 UART: [ldev] ++
1,208,812 UART: [ldev] CDI.KEYID = 6
1,209,176 UART: [ldev] SUBJECT.KEYID = 5
1,209,603 UART: [ldev] AUTHORITY.KEYID = 7
1,210,066 UART: [ldev] FE.KEYID = 1
1,215,276 UART: [ldev] Erasing FE.KEYID = 1
1,240,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,832 UART: [ldev] --
1,280,130 UART: [fwproc] Wait for Commands...
1,280,847 UART: [fwproc] Recv command 0x46574c44
1,281,580 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,344 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,653 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,529 >>> mbox cmd response: success
2,771,556 UART: [afmc] ++
2,771,724 UART: [afmc] CDI.KEYID = 6
2,772,087 UART: [afmc] SUBJECT.KEYID = 7
2,772,513 UART: [afmc] AUTHORITY.KEYID = 5
2,808,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,788 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,539 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,268 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,151 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,870 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,671 UART: [afmc] --
2,851,641 UART: [cold-reset] --
2,852,559 UART: [state] Locking Datavault
2,853,548 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,152 UART: [state] Locking ICCM
2,854,662 UART: [exit] Launching FMC @ 0x40000130
2,859,991 UART:
2,860,007 UART: Running Caliptra FMC ...
2,860,415 UART:
2,860,469 UART: [state] CFI Enabled
2,870,764 UART: [fht] FMC Alias Private Key: 7
2,978,631 UART: [art] Extend RT PCRs Done
2,979,059 UART: [art] Lock RT PCRs Done
2,980,671 UART: [art] Populate DV Done
2,988,960 UART: [fht] FMC Alias Private Key: 7
2,990,078 UART: [art] Derive CDI
2,990,358 UART: [art] Store in in slot 0x4
3,075,689 UART: [art] Derive Key Pair
3,076,049 UART: [art] Store priv key in slot 0x5
3,089,319 UART: [art] Derive Key Pair - Done
3,104,133 UART: [art] Signing Cert with AUTHO
3,104,613 UART: RITY.KEYID = 7
3,119,621 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,386 UART: [art] PUB.X = 2B026CFDD64A3342A50CCAE99E734A0E101109C22A54FB15BE1C9066851C28BCDF8EBEC32A0DDA3E2AB7689D4734C994
3,127,157 UART: [art] PUB.Y = 342CECC8F1BFAD172F848BFB295DABDC0B7F1C6B0BD73043E2E027C7EE0B9B23BD0C6E6CF1D407BE8896CC57CCB3E4F7
3,134,124 UART: [art] SIG.R = 1594A2526E67D4D3FC3BC7FF7C5587894F0BD915F92A6CC3457A5CAD87FD5F80FD6B711FA39595CD63E6E461BDF4B9D7
3,140,907 UART: [art] SIG.S = DE913BF7AB88E8C91F71A54C00B1EDF5E47C8AC855A2F2D62AD0814C113A8316B052F41180447C9FAEEC81A875FC63B7
3,164,176 UART: Caliptra RT
3,164,429 UART: [state] CFI Enabled
3,272,108 UART: [rt] RT listening for mailbox commands...
3,272,778 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,688 UART: [rt]cmd =0x41544d4e, len=14344
3,705,093 >>> mbox cmd response data (8 bytes)
3,705,094 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,065 UART: [rt]cmd =0x41545348, len=116
3,756,924 >>> mbox cmd response data (12 bytes)
3,756,925 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,757,620 UART:
3,757,636 UART: Running Caliptra ROM ...
3,758,044 UART:
3,758,099 UART: [state] CFI Enabled
3,760,701 UART: [state] LifecycleState = Unprovisioned
3,761,356 UART: [state] DebugLocked = No
3,762,048 UART: [state] WD Timer not started. Device not locked for debugging
3,763,366 UART: [kat] SHA2-256
4,566,916 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,571,045 UART: [kat] ++
4,571,197 UART: [kat] sha1
4,575,431 UART: [kat] SHA2-256
4,577,371 UART: [kat] SHA2-384
4,580,046 UART: [kat] SHA2-512-ACC
4,581,946 UART: [kat] ECC-384
4,592,095 UART: [kat] HMAC-384Kdf
4,596,683 UART: [kat] LMS
4,844,995 UART: [kat] --
4,845,777 UART: [update-reset] ++
5,750,346 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,751,549 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,847,931 >>> mbox cmd response: success
5,847,931 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,848,080 UART: [update-reset] Copying MAN_2 To MAN_1
5,856,094 UART: [update-reset Success] --
5,856,953 UART: [state] Locking Datavault
5,857,757 UART: [state] Locking PCR0, PCR1 and PCR31
5,858,361 UART: [state] Locking ICCM
5,858,891 UART: [exit] Launching FMC @ 0x40000130
5,864,220 UART:
5,864,236 UART: Running Caliptra FMC ...
5,864,644 UART:
5,864,698 UART: [state] CFI Enabled
5,953,779 UART: [art] Extend RT PCRs Done
5,954,207 UART: [art] Lock RT PCRs Done
5,955,430 UART: [art] Populate DV Done
5,963,907 UART: [fht] FMC Alias Private Key: 7
5,964,881 UART: [art] Derive CDI
5,965,161 UART: [art] Store in in slot 0x4
6,050,732 UART: [art] Derive Key Pair
6,051,092 UART: [art] Store priv key in slot 0x5
6,064,432 UART: [art] Derive Key Pair - Done
6,079,217 UART: [art] Signing Cert with AUTHO
6,079,697 UART: RITY.KEYID = 7
6,094,757 UART: [art] Erasing AUTHORITY.KEYID = 7
6,095,522 UART: [art] PUB.X = 1ECB89AFDBAAFD22381253DFD8515A226F625D0858AC1C1A513B8D941D1CD0554637E50281B7949886C55F921249360F
6,102,283 UART: [art] PUB.Y = 70BC25006B77B231A7B89624D4B12F759C210FFD6B2451CC4C22795B813FFAA09BC1D0CD6BF7C65D754A82C9ED345745
6,109,216 UART: [art] SIG.R = 5A6064F487CD3794C244961AE5430BF2788ABB730F8E84737C1C4D060A6E8C2E00740B4C38C5CD88D3BE7A154956D8F5
6,115,951 UART: [art] SIG.S = 58A8291C6614EBC435B75DBEA135D5B574F0CAD4B3B88452150FADB8C328A26C88BD98887C9F745BB6D1951ADD90E5A2
6,139,997 UART: mbox::rt_entry...
6,140,369 UART: ____ _ _ _ ____ _____
6,141,153 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,141,953 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,142,721 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,143,489 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,144,257 UART: |_|
6,144,569 UART:
6,423,791 UART: [rt] Runtime listening for mailbox commands...
6,424,981 >>> mbox cmd response data (48 bytes)
6,424,982 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,427,765 >>> mbox cmd response data (48 bytes)
6,427,766 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,442,903 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,454 ready_for_fw is high
1,055,454 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,973 >>> mbox cmd response: success
2,683,009 UART:
2,683,025 UART: Running Caliptra FMC ...
2,683,433 UART:
2,683,487 UART: [state] CFI Enabled
2,693,738 UART: [fht] FMC Alias Private Key: 7
2,801,723 UART: [art] Extend RT PCRs Done
2,802,151 UART: [art] Lock RT PCRs Done
2,803,847 UART: [art] Populate DV Done
2,812,166 UART: [fht] FMC Alias Private Key: 7
2,813,160 UART: [art] Derive CDI
2,813,440 UART: [art] Store in in slot 0x4
2,898,951 UART: [art] Derive Key Pair
2,899,311 UART: [art] Store priv key in slot 0x5
2,912,653 UART: [art] Derive Key Pair - Done
2,927,487 UART: [art] Signing Cert with AUTHO
2,927,967 UART: RITY.KEYID = 7
2,943,141 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,906 UART: [art] PUB.X = 10229342ED176EBBE3FDDFB15627A2D6ACB9FF3A20122C292C1A5C86B5A5AC8B884FE9F206399F07B044E3D171FAA6B6
2,950,686 UART: [art] PUB.Y = 23E5B6C3A4EF6B94957D00A75717E493BFC3B3F523060D7F2672BF53D503ACC5DC62B0FD676F0EF025407F5FA6198EFE
2,957,614 UART: [art] SIG.R = 4DBE12F612CD08F88563BBFD44CCDBBD1707892219465B117A0EFB596F2DC9EBF91C660AD57BAF2D2FDAF485EDA21D80
2,964,396 UART: [art] SIG.S = 4E7D77551708C6C5757352D33CF9EF1D9767A12081203B0FB20E342A645A0005582C5B8D61FE3F2D4D9F96D73BED9640
2,988,203 UART: Caliptra RT
2,988,456 UART: [state] CFI Enabled
3,097,147 UART: [rt] RT listening for mailbox commands...
3,097,817 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,879 UART: [rt]cmd =0x41544d4e, len=14344
3,530,608 >>> mbox cmd response data (8 bytes)
3,530,609 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,756 UART: [rt]cmd =0x41545348, len=116
3,582,547 >>> mbox cmd response data (12 bytes)
3,582,548 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,554,605 >>> mbox cmd response: success
5,554,605 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,567,661 UART:
5,567,677 UART: Running Caliptra FMC ...
5,568,085 UART:
5,568,139 UART: [state] CFI Enabled
5,657,360 UART: [art] Extend RT PCRs Done
5,657,788 UART: [art] Lock RT PCRs Done
5,658,853 UART: [art] Populate DV Done
5,667,188 UART: [fht] FMC Alias Private Key: 7
5,668,184 UART: [art] Derive CDI
5,668,464 UART: [art] Store in in slot 0x4
5,754,097 UART: [art] Derive Key Pair
5,754,457 UART: [art] Store priv key in slot 0x5
5,767,899 UART: [art] Derive Key Pair - Done
5,782,506 UART: [art] Signing Cert with AUTHO
5,782,986 UART: RITY.KEYID = 7
5,798,052 UART: [art] Erasing AUTHORITY.KEYID = 7
5,798,817 UART: [art] PUB.X = 9392BCDC80C0D3ACAB3A5327CEDAF523DC77800D14BD4A0F9C8E9A94DDBEF32E05B9345ECAB5A52A6EDF9D917F2531DC
5,805,608 UART: [art] PUB.Y = 1BCF79D8A8E67472EF1678998FF89C2AD369B00C4405CD90F2E0CD16CD0D17BA279C410C191172434B00E56383B41DAB
5,812,530 UART: [art] SIG.R = 9BB7D1F3EEA7C9059919292B6B2A1F8FCA28961E3106278025CCA199286E72DF030E2A1B787C5ABC36385144ACED97FD
5,819,296 UART: [art] SIG.S = 74BC08A836EDE91128A6D0760F9E6C90830C0C249AE78BE60E7B2625D31D5838D311DA00342F4C143BC7C2F6406B4A10
5,843,102 UART: mbox::rt_entry...
5,843,474 UART: ____ _ _ _ ____ _____
5,844,258 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,845,058 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,845,826 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,846,594 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,847,362 UART: |_|
5,847,674 UART:
6,133,406 UART: [rt] Runtime listening for mailbox commands...
6,134,596 >>> mbox cmd response data (48 bytes)
6,134,597 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,137,380 >>> mbox cmd response data (48 bytes)
6,137,381 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,152,518 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,797 UART: [state] LifecycleState = Unprovisioned
86,452 UART: [state] DebugLocked = No
87,042 UART: [state] WD Timer not started. Device not locked for debugging
88,387 UART: [kat] SHA2-256
891,937 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,066 UART: [kat] ++
896,218 UART: [kat] sha1
900,494 UART: [kat] SHA2-256
902,434 UART: [kat] SHA2-384
905,049 UART: [kat] SHA2-512-ACC
906,950 UART: [kat] ECC-384
916,907 UART: [kat] HMAC-384Kdf
921,521 UART: [kat] LMS
1,169,833 UART: [kat] --
1,170,768 UART: [cold-reset] ++
1,171,276 UART: [fht] FHT @ 0x50003400
1,174,036 UART: [idev] ++
1,174,204 UART: [idev] CDI.KEYID = 6
1,174,565 UART: [idev] SUBJECT.KEYID = 7
1,174,990 UART: [idev] UDS.KEYID = 0
1,175,336 ready_for_fw is high
1,175,336 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,848 UART: [idev] Erasing UDS.KEYID = 0
1,199,880 UART: [idev] Sha1 KeyId Algorithm
1,208,648 UART: [idev] --
1,209,717 UART: [ldev] ++
1,209,885 UART: [ldev] CDI.KEYID = 6
1,210,249 UART: [ldev] SUBJECT.KEYID = 5
1,210,676 UART: [ldev] AUTHORITY.KEYID = 7
1,211,139 UART: [ldev] FE.KEYID = 1
1,216,313 UART: [ldev] Erasing FE.KEYID = 1
1,242,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,443 UART: [ldev] --
1,281,739 UART: [fwproc] Wait for Commands...
1,282,542 UART: [fwproc] Recv command 0x46574c44
1,283,275 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,923 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,232 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,954 >>> mbox cmd response: success
2,774,211 UART: [afmc] ++
2,774,379 UART: [afmc] CDI.KEYID = 6
2,774,742 UART: [afmc] SUBJECT.KEYID = 7
2,775,168 UART: [afmc] AUTHORITY.KEYID = 5
2,810,815 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,221 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,972 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,701 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,584 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,303 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,202 UART: [afmc] --
2,854,210 UART: [cold-reset] --
2,855,230 UART: [state] Locking Datavault
2,856,217 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,821 UART: [state] Locking ICCM
2,857,341 UART: [exit] Launching FMC @ 0x40000130
2,862,670 UART:
2,862,686 UART: Running Caliptra FMC ...
2,863,094 UART:
2,863,237 UART: [state] CFI Enabled
2,873,802 UART: [fht] FMC Alias Private Key: 7
2,981,645 UART: [art] Extend RT PCRs Done
2,982,073 UART: [art] Lock RT PCRs Done
2,983,479 UART: [art] Populate DV Done
2,991,524 UART: [fht] FMC Alias Private Key: 7
2,992,628 UART: [art] Derive CDI
2,992,908 UART: [art] Store in in slot 0x4
3,078,583 UART: [art] Derive Key Pair
3,078,943 UART: [art] Store priv key in slot 0x5
3,092,537 UART: [art] Derive Key Pair - Done
3,107,361 UART: [art] Signing Cert with AUTHO
3,107,841 UART: RITY.KEYID = 7
3,123,035 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,800 UART: [art] PUB.X = A96DB13DC482AE1046B6B8DC71F8684E80F13C0D146A62564126B4EAA04BF112F8784F477C0D638C657ADC51025A53E8
3,130,565 UART: [art] PUB.Y = B317A0580E44B96144EB4EEB031CE92DC0463CC3D1A4170BB6AEEF7780B1B9B15732E094D2D0E62729DF8A3B471F2499
3,137,514 UART: [art] SIG.R = 27D17D5BD7EF4E91E8BA0A2847E8FDB997EB058E8396AD9F37A843ED176FCBEF11A605D1A37C25B379ABCDE03575D23F
3,144,295 UART: [art] SIG.S = 5CB9D69019E18E88FB164806E07BD71C530BD19C62793C9F7C20DFA62D3924A2D0AB982D9A515280109D0233DF520C66
3,168,396 UART: Caliptra RT
3,168,741 UART: [state] CFI Enabled
3,277,386 UART: [rt] RT listening for mailbox commands...
3,278,056 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,838 UART: [rt]cmd =0x41544d4e, len=14344
3,710,873 >>> mbox cmd response data (8 bytes)
3,710,874 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,089 UART: [rt]cmd =0x41545348, len=116
3,762,568 >>> mbox cmd response data (12 bytes)
3,762,569 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,538 UART:
3,763,554 UART: Running Caliptra ROM ...
3,763,962 UART:
3,764,104 UART: [state] CFI Enabled
3,767,164 UART: [state] LifecycleState = Unprovisioned
3,767,819 UART: [state] DebugLocked = No
3,768,543 UART: [state] WD Timer not started. Device not locked for debugging
3,769,893 UART: [kat] SHA2-256
4,573,443 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,577,572 UART: [kat] ++
4,577,724 UART: [kat] sha1
4,582,166 UART: [kat] SHA2-256
4,584,106 UART: [kat] SHA2-384
4,586,807 UART: [kat] SHA2-512-ACC
4,588,707 UART: [kat] ECC-384
4,598,696 UART: [kat] HMAC-384Kdf
4,603,404 UART: [kat] LMS
4,851,716 UART: [kat] --
4,852,684 UART: [update-reset] ++
5,755,841 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,757,042 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,853,424 >>> mbox cmd response: success
5,853,424 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,853,781 UART: [update-reset] Copying MAN_2 To MAN_1
5,861,795 UART: [update-reset Success] --
5,862,820 UART: [state] Locking Datavault
5,863,678 UART: [state] Locking PCR0, PCR1 and PCR31
5,864,282 UART: [state] Locking ICCM
5,864,882 UART: [exit] Launching FMC @ 0x40000130
5,870,211 UART:
5,870,227 UART: Running Caliptra FMC ...
5,870,635 UART:
5,870,778 UART: [state] CFI Enabled
5,960,383 UART: [art] Extend RT PCRs Done
5,960,811 UART: [art] Lock RT PCRs Done
5,962,088 UART: [art] Populate DV Done
5,970,353 UART: [fht] FMC Alias Private Key: 7
5,971,347 UART: [art] Derive CDI
5,971,627 UART: [art] Store in in slot 0x4
6,057,182 UART: [art] Derive Key Pair
6,057,542 UART: [art] Store priv key in slot 0x5
6,071,620 UART: [art] Derive Key Pair - Done
6,086,553 UART: [art] Signing Cert with AUTHO
6,087,033 UART: RITY.KEYID = 7
6,102,249 UART: [art] Erasing AUTHORITY.KEYID = 7
6,103,014 UART: [art] PUB.X = C7F4F8815E2268ECA39ECB42B824070B6219C81A83ED92CD597B2D74C0EDD0E3AA2B9FD03D14F14889C7EF26880BF1BA
6,109,791 UART: [art] PUB.Y = 5DB375F93FF81B31B8105DC50B3FCF65C344C16DD8987AA7210991F3115A36DCE9D79AD31399F79425D06103D214E069
6,116,732 UART: [art] SIG.R = 25FBAE400F64CE7A95BCE7C6317C80ED8D99A8F07E0F13BD660D75C8F5FC8DAAF17D5F42505F934943B41B293F941B27
6,123,507 UART: [art] SIG.S = 73CFE2119BF4784EFD6DB268DA061332C9FB612F87DABFA6376F65A8B56FA471EAE67A885D0F973BA5D979D00BA84869
6,147,311 UART: mbox::rt_entry...
6,147,683 UART: ____ _ _ _ ____ _____
6,148,467 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,149,267 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,150,035 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,150,803 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,151,571 UART: |_|
6,151,883 UART:
6,437,237 UART: [rt] Runtime listening for mailbox commands...
6,438,427 >>> mbox cmd response data (48 bytes)
6,438,428 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,441,211 >>> mbox cmd response data (48 bytes)
6,441,212 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,456,349 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,937 ready_for_fw is high
1,056,937 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,292 >>> mbox cmd response: success
2,685,886 UART:
2,685,902 UART: Running Caliptra FMC ...
2,686,310 UART:
2,686,453 UART: [state] CFI Enabled
2,697,000 UART: [fht] FMC Alias Private Key: 7
2,805,055 UART: [art] Extend RT PCRs Done
2,805,483 UART: [art] Lock RT PCRs Done
2,807,043 UART: [art] Populate DV Done
2,815,310 UART: [fht] FMC Alias Private Key: 7
2,816,396 UART: [art] Derive CDI
2,816,676 UART: [art] Store in in slot 0x4
2,902,665 UART: [art] Derive Key Pair
2,903,025 UART: [art] Store priv key in slot 0x5
2,916,659 UART: [art] Derive Key Pair - Done
2,931,350 UART: [art] Signing Cert with AUTHO
2,931,830 UART: RITY.KEYID = 7
2,947,274 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,039 UART: [art] PUB.X = A2EC3EB0AA642CA3BBA68D3872246B92449B251C87E55D99C375193EFD887303CEF3AA536A284E4466B166D4CD9931F1
2,954,812 UART: [art] PUB.Y = C5E23C9599A38045F1C2157B9762F889B1E42D3F8ADBA1052AC3AB15B9D8120A2469009BB4F2C607951A1A703B54E8CB
2,961,735 UART: [art] SIG.R = DBF338F3DD313BF80749DF4A5FF30D7A68FB4CBD2225644EA37F4D4D5B7DA35223DF503463366E98F42F5DFAAA7E8125
2,968,515 UART: [art] SIG.S = 24312DAE16BB7452AA8090FCF5F9BC26FEE0CE2B650B0FF2E692A712B7022E58F85A654CD8DEC58BEDD84ABF8AF6D36B
2,992,559 UART: Caliptra RT
2,992,904 UART: [state] CFI Enabled
3,100,607 UART: [rt] RT listening for mailbox commands...
3,101,277 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,317 UART: [rt]cmd =0x41544d4e, len=14344
3,533,914 >>> mbox cmd response data (8 bytes)
3,533,915 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,828 UART: [rt]cmd =0x41545348, len=116
3,585,685 >>> mbox cmd response data (12 bytes)
3,585,686 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,557,362 >>> mbox cmd response: success
5,557,362 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,570,568 UART:
5,570,584 UART: Running Caliptra FMC ...
5,570,992 UART:
5,571,135 UART: [state] CFI Enabled
5,659,936 UART: [art] Extend RT PCRs Done
5,660,364 UART: [art] Lock RT PCRs Done
5,661,525 UART: [art] Populate DV Done
5,669,944 UART: [fht] FMC Alias Private Key: 7
5,670,968 UART: [art] Derive CDI
5,671,248 UART: [art] Store in in slot 0x4
5,756,751 UART: [art] Derive Key Pair
5,757,111 UART: [art] Store priv key in slot 0x5
5,770,295 UART: [art] Derive Key Pair - Done
5,785,222 UART: [art] Signing Cert with AUTHO
5,785,702 UART: RITY.KEYID = 7
5,800,924 UART: [art] Erasing AUTHORITY.KEYID = 7
5,801,689 UART: [art] PUB.X = 6921B58113CA10E2D71FBBDEA0CEBA9C18BA78EF591F003109F5B3E54B5137EFED64B69FF48F6165712ED786444B4641
5,808,444 UART: [art] PUB.Y = 8AD09D399926DA81A7A8B9CFA5EA2C973E2AA8EED0B31F880A1813EB3ECE18D16C0DCC8E0AE4682A20B0188871004BD8
5,815,381 UART: [art] SIG.R = 53A3CB7CC75E419B74B9F5B5BCA0DE8650CF8CC7B67E417FC83B3A8F749D3B7D3F81828818804A51A445EE6D973CBAEF
5,822,169 UART: [art] SIG.S = 6C7FB890DE41BB080E0C235D065E38B45FCBB74032DBD27F14D5C33AA88CF3087B7BB39814D1F90AD13CB4C09877293F
5,846,564 UART: mbox::rt_entry...
5,846,936 UART: ____ _ _ _ ____ _____
5,847,720 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,848,520 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,849,288 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,850,056 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,850,824 UART: |_|
5,851,136 UART:
6,134,230 UART: [rt] Runtime listening for mailbox commands...
6,135,420 >>> mbox cmd response data (48 bytes)
6,135,421 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,138,204 >>> mbox cmd response data (48 bytes)
6,138,205 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,153,342 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,394 UART: [state] LifecycleState = Unprovisioned
86,049 UART: [state] DebugLocked = No
86,677 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,293 UART: [kat] SHA2-256
882,224 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,339 UART: [kat] ++
886,491 UART: [kat] sha1
890,617 UART: [kat] SHA2-256
892,555 UART: [kat] SHA2-384
895,404 UART: [kat] SHA2-512-ACC
897,305 UART: [kat] ECC-384
902,992 UART: [kat] HMAC-384Kdf
907,578 UART: [kat] LMS
1,475,774 UART: [kat] --
1,476,783 UART: [cold-reset] ++
1,477,313 UART: [fht] Storing FHT @ 0x50003400
1,480,136 UART: [idev] ++
1,480,304 UART: [idev] CDI.KEYID = 6
1,480,664 UART: [idev] SUBJECT.KEYID = 7
1,481,088 UART: [idev] UDS.KEYID = 0
1,481,433 ready_for_fw is high
1,481,433 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,044 UART: [idev] Erasing UDS.KEYID = 0
1,505,606 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,226 UART: [idev] --
1,515,223 UART: [ldev] ++
1,515,391 UART: [ldev] CDI.KEYID = 6
1,515,754 UART: [ldev] SUBJECT.KEYID = 5
1,516,180 UART: [ldev] AUTHORITY.KEYID = 7
1,516,643 UART: [ldev] FE.KEYID = 1
1,521,571 UART: [ldev] Erasing FE.KEYID = 1
1,546,360 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,486 UART: [ldev] --
1,585,853 UART: [fwproc] Waiting for Commands...
1,586,702 UART: [fwproc] Received command 0x46574c44
1,587,493 UART: [fwproc] Received Image of size 114332 bytes
2,886,257 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,887 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,239 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,216 >>> mbox cmd response: success
3,080,422 UART: [afmc] ++
3,080,590 UART: [afmc] CDI.KEYID = 6
3,080,952 UART: [afmc] SUBJECT.KEYID = 7
3,081,377 UART: [afmc] AUTHORITY.KEYID = 5
3,116,278 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,726 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,506 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,234 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,119 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,809 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,570 UART: [afmc] --
3,159,610 UART: [cold-reset] --
3,160,464 UART: [state] Locking Datavault
3,161,575 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,179 UART: [state] Locking ICCM
3,162,627 UART: [exit] Launching FMC @ 0x40000130
3,167,956 UART:
3,167,972 UART: Running Caliptra FMC ...
3,168,380 UART:
3,168,434 UART: [state] CFI Enabled
3,178,855 UART: [fht] FMC Alias Private Key: 7
3,287,130 UART: [art] Extend RT PCRs Done
3,287,558 UART: [art] Lock RT PCRs Done
3,289,092 UART: [art] Populate DV Done
3,297,131 UART: [fht] FMC Alias Private Key: 7
3,298,239 UART: [art] Derive CDI
3,298,519 UART: [art] Store in in slot 0x4
3,384,228 UART: [art] Derive Key Pair
3,384,588 UART: [art] Store priv key in slot 0x5
3,397,904 UART: [art] Derive Key Pair - Done
3,412,710 UART: [art] Signing Cert with AUTHO
3,413,190 UART: RITY.KEYID = 7
3,428,780 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,545 UART: [art] PUB.X = 13A654992AFE1D36C65D6A09C2F3A97BD0A46CC7999CE6F1D0BD776172A3D050B6029F5DE9EDE53CD7F60BD395E188DB
3,436,322 UART: [art] PUB.Y = 8EAC128389883B6140634BA57CE2313602FEE79FB9C572B432491467C0B4E4205F42E563CFE1F7621D77F10352A4E946
3,443,260 UART: [art] SIG.R = 9E8895999B3B18BB3B41BAC74D5A1857DF3521D39240164A3A3C3E9CB18A5DFBD651654CD973EFE74BB75EAC279597D1
3,450,040 UART: [art] SIG.S = 40B344900F0CD1877B03B134FB8E8F2921E13DC3F0EE6BB42375E9770A18E864520FFBB00F02B811329C60A80420588D
3,473,623 UART: Caliptra RT
3,473,876 UART: [state] CFI Enabled
3,582,129 UART: [rt] RT listening for mailbox commands...
3,582,799 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,875 UART: [rt]cmd =0x41544d4e, len=14344
4,015,876 >>> mbox cmd response data (8 bytes)
4,015,877 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,980 UART: [rt]cmd =0x41545348, len=116
4,067,781 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,659 ready_for_fw is high
1,362,659 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,594 >>> mbox cmd response: success
2,987,962 UART:
2,987,978 UART: Running Caliptra FMC ...
2,988,386 UART:
2,988,440 UART: [state] CFI Enabled
2,998,863 UART: [fht] FMC Alias Private Key: 7
3,107,018 UART: [art] Extend RT PCRs Done
3,107,446 UART: [art] Lock RT PCRs Done
3,108,768 UART: [art] Populate DV Done
3,117,057 UART: [fht] FMC Alias Private Key: 7
3,118,109 UART: [art] Derive CDI
3,118,389 UART: [art] Store in in slot 0x4
3,203,752 UART: [art] Derive Key Pair
3,204,112 UART: [art] Store priv key in slot 0x5
3,217,026 UART: [art] Derive Key Pair - Done
3,231,701 UART: [art] Signing Cert with AUTHO
3,232,181 UART: RITY.KEYID = 7
3,247,331 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,096 UART: [art] PUB.X = 3C801EA1E71BC6FA3B010B7A27FC943928535E0DD28EE1732360B1D29D268E748BD4369B661E272BDE333ACA14838FA7
3,254,863 UART: [art] PUB.Y = 42F2A6A81595C8743A4FEBFDE873C3F00EBDB3098C7F5AB8CEE85181EFC83859E58011BA419D252E80F16E5DD4CA84E9
3,261,823 UART: [art] SIG.R = 51E499A7390489E5D1F08C13448D26C2AD6C593BFB2182951AFB95BB91D6370FB4F95D5074A9E4EBB24BF5859438D9DD
3,268,593 UART: [art] SIG.S = 71BD3176446AF6BE3E02B9E1FB6DE9568B2A276994621DEB4F6A7165061747C00AB656FB848122DF9A5DD2002E93FCAA
3,292,353 UART: Caliptra RT
3,292,606 UART: [state] CFI Enabled
3,401,314 UART: [rt] RT listening for mailbox commands...
3,401,984 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,852 UART: [rt]cmd =0x41544d4e, len=14344
3,834,033 >>> mbox cmd response data (8 bytes)
3,834,034 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,931 UART: [rt]cmd =0x41545348, len=116
3,885,096 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,993 UART: [state] LifecycleState = Unprovisioned
85,648 UART: [state] DebugLocked = No
86,274 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,782 UART: [kat] SHA2-256
881,713 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,828 UART: [kat] ++
885,980 UART: [kat] sha1
890,140 UART: [kat] SHA2-256
892,078 UART: [kat] SHA2-384
894,849 UART: [kat] SHA2-512-ACC
896,750 UART: [kat] ECC-384
902,497 UART: [kat] HMAC-384Kdf
907,257 UART: [kat] LMS
1,475,453 UART: [kat] --
1,476,376 UART: [cold-reset] ++
1,476,796 UART: [fht] Storing FHT @ 0x50003400
1,479,743 UART: [idev] ++
1,479,911 UART: [idev] CDI.KEYID = 6
1,480,271 UART: [idev] SUBJECT.KEYID = 7
1,480,695 UART: [idev] UDS.KEYID = 0
1,481,040 ready_for_fw is high
1,481,040 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,679 UART: [idev] Erasing UDS.KEYID = 0
1,505,483 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,085 UART: [idev] --
1,515,114 UART: [ldev] ++
1,515,282 UART: [ldev] CDI.KEYID = 6
1,515,645 UART: [ldev] SUBJECT.KEYID = 5
1,516,071 UART: [ldev] AUTHORITY.KEYID = 7
1,516,534 UART: [ldev] FE.KEYID = 1
1,521,804 UART: [ldev] Erasing FE.KEYID = 1
1,546,941 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,145 UART: [ldev] --
1,586,630 UART: [fwproc] Waiting for Commands...
1,587,477 UART: [fwproc] Received command 0x46574c44
1,588,268 UART: [fwproc] Received Image of size 114332 bytes
2,886,820 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,798 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,150 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,975 >>> mbox cmd response: success
3,081,169 UART: [afmc] ++
3,081,337 UART: [afmc] CDI.KEYID = 6
3,081,699 UART: [afmc] SUBJECT.KEYID = 7
3,082,124 UART: [afmc] AUTHORITY.KEYID = 5
3,117,207 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,363 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,143 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,871 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,756 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,446 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,263 UART: [afmc] --
3,160,325 UART: [cold-reset] --
3,161,281 UART: [state] Locking Datavault
3,162,372 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,976 UART: [state] Locking ICCM
3,163,580 UART: [exit] Launching FMC @ 0x40000130
3,168,909 UART:
3,168,925 UART: Running Caliptra FMC ...
3,169,333 UART:
3,169,476 UART: [state] CFI Enabled
3,180,161 UART: [fht] FMC Alias Private Key: 7
3,287,844 UART: [art] Extend RT PCRs Done
3,288,272 UART: [art] Lock RT PCRs Done
3,290,000 UART: [art] Populate DV Done
3,298,247 UART: [fht] FMC Alias Private Key: 7
3,299,219 UART: [art] Derive CDI
3,299,499 UART: [art] Store in in slot 0x4
3,385,232 UART: [art] Derive Key Pair
3,385,592 UART: [art] Store priv key in slot 0x5
3,399,098 UART: [art] Derive Key Pair - Done
3,413,978 UART: [art] Signing Cert with AUTHO
3,414,458 UART: RITY.KEYID = 7
3,429,830 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,595 UART: [art] PUB.X = 48B43E6382A93D653861F0AA8691FE872DAF4F59F824E98A81F9A1670EE3D04C7A96DBEEACF4EB881FB6C9A84C2C204D
3,437,378 UART: [art] PUB.Y = 195D598B0DF86285C91ECED14A512ADB2AC11C6DCB2EA88D1D9200F7071121AEC796D5B06D9398A15FFF73A5DD4445CA
3,444,316 UART: [art] SIG.R = B9A93C0001F5130500E0EC3A268062C3AD3BFAC8AAAA48A57852A1EA3AFBA6A02BC115258390A6080F82BB41A649D3AE
3,451,044 UART: [art] SIG.S = D163B668B165D4BA25E02CF02CA8FDAF0F9872132BD09C7CE551C0F6BF3328F7AD3CE8B26625DC1553B45B4413F558F9
3,475,278 UART: Caliptra RT
3,475,623 UART: [state] CFI Enabled
3,584,045 UART: [rt] RT listening for mailbox commands...
3,584,715 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,659 UART: [rt]cmd =0x41544d4e, len=14344
4,017,802 >>> mbox cmd response data (8 bytes)
4,017,803 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,047,738 UART: [rt]cmd =0x41545348, len=116
4,069,227 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,650 ready_for_fw is high
1,362,650 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,439 >>> mbox cmd response: success
2,988,743 UART:
2,988,759 UART: Running Caliptra FMC ...
2,989,167 UART:
2,989,310 UART: [state] CFI Enabled
2,999,849 UART: [fht] FMC Alias Private Key: 7
3,107,876 UART: [art] Extend RT PCRs Done
3,108,304 UART: [art] Lock RT PCRs Done
3,109,956 UART: [art] Populate DV Done
3,117,977 UART: [fht] FMC Alias Private Key: 7
3,119,085 UART: [art] Derive CDI
3,119,365 UART: [art] Store in in slot 0x4
3,205,108 UART: [art] Derive Key Pair
3,205,468 UART: [art] Store priv key in slot 0x5
3,218,746 UART: [art] Derive Key Pair - Done
3,233,455 UART: [art] Signing Cert with AUTHO
3,233,935 UART: RITY.KEYID = 7
3,249,191 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,956 UART: [art] PUB.X = 42AE3BA1A5C14D2CC7F6F008B2E9BC027E2E1DA669D9EC49029206D171B8C2B647994BED83D304E34695BA7C7D1CDD09
3,256,722 UART: [art] PUB.Y = 3A5CC73FD39F81819E7AA463C554E630E1364D9481902DBFE383C31DA6139EF6812EC0E39D8ECC2B900CBD712C92A195
3,263,677 UART: [art] SIG.R = 54C6EAA709560AC3C043F6B777C461C1188FF4C94F38077A97E3565DC92F535A8D9D972EF93F3A863EE80AB30BC664D6
3,270,438 UART: [art] SIG.S = B7520920961CF6B66B5D3081C46CB9884B74108872621145048F8E77857EEA9B4496B8B1071BC45A8BC52100E4C9F94A
3,293,990 UART: Caliptra RT
3,294,335 UART: [state] CFI Enabled
3,403,094 UART: [rt] RT listening for mailbox commands...
3,403,764 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,922 UART: [rt]cmd =0x41544d4e, len=14344
3,837,415 >>> mbox cmd response data (8 bytes)
3,837,416 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,471 UART: [rt]cmd =0x41545348, len=116
3,889,194 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
893,290 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,415 UART: [kat] ++
897,567 UART: [kat] sha1
901,923 UART: [kat] SHA2-256
903,863 UART: [kat] SHA2-384
906,572 UART: [kat] SHA2-512-ACC
908,473 UART: [kat] ECC-384
918,308 UART: [kat] HMAC-384Kdf
922,866 UART: [kat] LMS
1,171,194 UART: [kat] --
1,172,233 UART: [cold-reset] ++
1,172,593 UART: [fht] FHT @ 0x50003400
1,175,446 UART: [idev] ++
1,175,614 UART: [idev] CDI.KEYID = 6
1,175,974 UART: [idev] SUBJECT.KEYID = 7
1,176,398 UART: [idev] UDS.KEYID = 0
1,176,743 ready_for_fw is high
1,176,743 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,610 UART: [idev] Erasing UDS.KEYID = 0
1,201,419 UART: [idev] Sha1 KeyId Algorithm
1,209,797 UART: [idev] --
1,210,921 UART: [ldev] ++
1,211,089 UART: [ldev] CDI.KEYID = 6
1,211,452 UART: [ldev] SUBJECT.KEYID = 5
1,211,878 UART: [ldev] AUTHORITY.KEYID = 7
1,212,341 UART: [ldev] FE.KEYID = 1
1,217,769 UART: [ldev] Erasing FE.KEYID = 1
1,244,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,765 UART: [ldev] --
1,283,104 UART: [fwproc] Wait for Commands...
1,283,776 UART: [fwproc] Recv command 0x46574c44
1,284,504 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,780 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,084 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,997 >>> mbox cmd response: success
2,775,107 UART: [afmc] ++
2,775,275 UART: [afmc] CDI.KEYID = 6
2,775,637 UART: [afmc] SUBJECT.KEYID = 7
2,776,062 UART: [afmc] AUTHORITY.KEYID = 5
2,810,929 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,354 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,082 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,967 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,686 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,548 UART: [afmc] --
2,854,470 UART: [cold-reset] --
2,855,306 UART: [state] Locking Datavault
2,856,511 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,115 UART: [state] Locking ICCM
2,857,629 UART: [exit] Launching FMC @ 0x40000130
2,862,958 UART:
2,862,974 UART: Running Caliptra FMC ...
2,863,382 UART:
2,863,436 UART: [state] CFI Enabled
2,873,479 UART: [fht] FMC Alias Private Key: 7
2,981,508 UART: [art] Extend RT PCRs Done
2,981,936 UART: [art] Lock RT PCRs Done
2,983,722 UART: [art] Populate DV Done
2,991,753 UART: [fht] FMC Alias Private Key: 7
2,992,773 UART: [art] Derive CDI
2,993,053 UART: [art] Store in in slot 0x4
3,079,028 UART: [art] Derive Key Pair
3,079,388 UART: [art] Store priv key in slot 0x5
3,092,824 UART: [art] Derive Key Pair - Done
3,107,757 UART: [art] Signing Cert with AUTHO
3,108,237 UART: RITY.KEYID = 7
3,122,951 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,716 UART: [art] PUB.X = 61122FD38178AB449F5EEBC5603069D12FB30213F0A18F1152EB397A8D0AEDE198B09E8359FED241C73964221F5FCA9B
3,130,486 UART: [art] PUB.Y = 220AC092A01C42F7E65C44F9B7522F5317627437B4DD71443FB7A0845B42FE254868342FFC4472D90944B1739F9A089D
3,137,419 UART: [art] SIG.R = D9C2DA661312FBE923D9D6E6782E8409F63164D91B4C6CD644905D95A9C4DA74E5D05CC13BD9663D4801F0C7826F5CDF
3,144,191 UART: [art] SIG.S = B332EFD7134715392A23557E251382C10BF5281ED079115ABA7E81C4F37F7A1645A191E0808DAF7A5A27EA188240DB59
3,168,413 UART: Caliptra RT
3,168,666 UART: [state] CFI Enabled
3,276,338 UART: [rt] RT listening for mailbox commands...
3,277,008 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,930 UART: [rt]cmd =0x41544d4e, len=14344
3,709,655 >>> mbox cmd response data (8 bytes)
3,709,656 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,861 UART: [rt]cmd =0x41545348, len=116
3,761,576 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,809 ready_for_fw is high
1,059,809 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,090 >>> mbox cmd response: success
2,687,666 UART:
2,687,682 UART: Running Caliptra FMC ...
2,688,090 UART:
2,688,144 UART: [state] CFI Enabled
2,698,867 UART: [fht] FMC Alias Private Key: 7
2,807,162 UART: [art] Extend RT PCRs Done
2,807,590 UART: [art] Lock RT PCRs Done
2,809,336 UART: [art] Populate DV Done
2,817,477 UART: [fht] FMC Alias Private Key: 7
2,818,515 UART: [art] Derive CDI
2,818,795 UART: [art] Store in in slot 0x4
2,904,328 UART: [art] Derive Key Pair
2,904,688 UART: [art] Store priv key in slot 0x5
2,917,854 UART: [art] Derive Key Pair - Done
2,932,782 UART: [art] Signing Cert with AUTHO
2,933,262 UART: RITY.KEYID = 7
2,948,686 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,451 UART: [art] PUB.X = 3603954B69B08D177B35B6B9BBBACD6CDF673C433240D303AA8343580F5E6D8FE141EAF78BC2256EA5B4FC9B9B1A7E95
2,956,226 UART: [art] PUB.Y = DA2A36F578B420D92FE026777A0DF5A17D4815D7DDB29925D2CFF112B298C0426476AFBC3AABAD029764044D3DD0C525
2,963,177 UART: [art] SIG.R = CE9E746FD189903B067A1C30FC8E0A5BDA5AA364C7E2893A5CE910D84072BA7A2EC4456CE90C08CEB80B9509F23C0206
2,969,935 UART: [art] SIG.S = 1F0F7C717ED542CC299F8FCD3DBF97FE7792CFD3B155E6480591642FB6E25B44DD9AF36A26587332195179E201AEB282
2,993,639 UART: Caliptra RT
2,993,892 UART: [state] CFI Enabled
3,101,511 UART: [rt] RT listening for mailbox commands...
3,102,181 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,259 UART: [rt]cmd =0x41544d4e, len=14344
3,534,700 >>> mbox cmd response data (8 bytes)
3,534,701 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,762 UART: [rt]cmd =0x41545348, len=116
3,585,565 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
893,445 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,570 UART: [kat] ++
897,722 UART: [kat] sha1
901,980 UART: [kat] SHA2-256
903,920 UART: [kat] SHA2-384
906,781 UART: [kat] SHA2-512-ACC
908,682 UART: [kat] ECC-384
918,449 UART: [kat] HMAC-384Kdf
922,901 UART: [kat] LMS
1,171,229 UART: [kat] --
1,172,006 UART: [cold-reset] ++
1,172,404 UART: [fht] FHT @ 0x50003400
1,174,983 UART: [idev] ++
1,175,151 UART: [idev] CDI.KEYID = 6
1,175,511 UART: [idev] SUBJECT.KEYID = 7
1,175,935 UART: [idev] UDS.KEYID = 0
1,176,280 ready_for_fw is high
1,176,280 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,007 UART: [idev] Erasing UDS.KEYID = 0
1,201,462 UART: [idev] Sha1 KeyId Algorithm
1,209,794 UART: [idev] --
1,210,872 UART: [ldev] ++
1,211,040 UART: [ldev] CDI.KEYID = 6
1,211,403 UART: [ldev] SUBJECT.KEYID = 5
1,211,829 UART: [ldev] AUTHORITY.KEYID = 7
1,212,292 UART: [ldev] FE.KEYID = 1
1,217,442 UART: [ldev] Erasing FE.KEYID = 1
1,243,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,406 UART: [ldev] --
1,282,771 UART: [fwproc] Wait for Commands...
1,283,595 UART: [fwproc] Recv command 0x46574c44
1,284,323 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,335 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,639 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,414 >>> mbox cmd response: success
2,774,646 UART: [afmc] ++
2,774,814 UART: [afmc] CDI.KEYID = 6
2,775,176 UART: [afmc] SUBJECT.KEYID = 7
2,775,601 UART: [afmc] AUTHORITY.KEYID = 5
2,810,818 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,119 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,867 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,595 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,480 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,199 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,039 UART: [afmc] --
2,853,961 UART: [cold-reset] --
2,854,895 UART: [state] Locking Datavault
2,856,162 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,766 UART: [state] Locking ICCM
2,857,330 UART: [exit] Launching FMC @ 0x40000130
2,862,659 UART:
2,862,675 UART: Running Caliptra FMC ...
2,863,083 UART:
2,863,226 UART: [state] CFI Enabled
2,873,695 UART: [fht] FMC Alias Private Key: 7
2,981,672 UART: [art] Extend RT PCRs Done
2,982,100 UART: [art] Lock RT PCRs Done
2,983,686 UART: [art] Populate DV Done
2,992,075 UART: [fht] FMC Alias Private Key: 7
2,993,089 UART: [art] Derive CDI
2,993,369 UART: [art] Store in in slot 0x4
3,078,964 UART: [art] Derive Key Pair
3,079,324 UART: [art] Store priv key in slot 0x5
3,093,124 UART: [art] Derive Key Pair - Done
3,107,697 UART: [art] Signing Cert with AUTHO
3,108,177 UART: RITY.KEYID = 7
3,123,129 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,894 UART: [art] PUB.X = 5E98D1FF5C526F4A35E6E55B955B86D14F6101606C218B3E0B469615ED7EA5FCB2B390384B62BECFAB077924B582C1AD
3,130,665 UART: [art] PUB.Y = E07870568B307D99F18E3F4631F3982440B65F7E4B0FA3674B7A78B68975EF0DE496CD95B94C93BE53A4AE79D4A888AF
3,137,613 UART: [art] SIG.R = EF88CE9A371A707B91908162395C6508456B3C1E7FECB3DB515346C03637F5AA6E7AD743A59DC3DFA348A52138C72043
3,144,382 UART: [art] SIG.S = C4DA83EEC2D539EE4B10E50F5E3A3300D683C8BDCC50966177D1BA8F952F9F0059F57BC8843EC7D126AF086A89C3C6E1
3,168,245 UART: Caliptra RT
3,168,590 UART: [state] CFI Enabled
3,276,258 UART: [rt] RT listening for mailbox commands...
3,276,928 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,934 UART: [rt]cmd =0x41544d4e, len=14344
3,709,751 >>> mbox cmd response data (8 bytes)
3,709,752 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,755 UART: [rt]cmd =0x41545348, len=116
3,761,876 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,804 ready_for_fw is high
1,059,804 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,497 >>> mbox cmd response: success
2,688,677 UART:
2,688,693 UART: Running Caliptra FMC ...
2,689,101 UART:
2,689,244 UART: [state] CFI Enabled
2,699,889 UART: [fht] FMC Alias Private Key: 7
2,807,914 UART: [art] Extend RT PCRs Done
2,808,342 UART: [art] Lock RT PCRs Done
2,809,488 UART: [art] Populate DV Done
2,817,715 UART: [fht] FMC Alias Private Key: 7
2,818,645 UART: [art] Derive CDI
2,818,925 UART: [art] Store in in slot 0x4
2,904,920 UART: [art] Derive Key Pair
2,905,280 UART: [art] Store priv key in slot 0x5
2,918,288 UART: [art] Derive Key Pair - Done
2,932,739 UART: [art] Signing Cert with AUTHO
2,933,219 UART: RITY.KEYID = 7
2,948,513 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,278 UART: [art] PUB.X = 9C000B43A3BCFDC44E2104E0548EF5F5FF0866C110916E7E5B83962206065FC25069CF86C1991AE03FFE680E6AA6BE6D
2,956,016 UART: [art] PUB.Y = 1CC683FAE3A092486CDFD44124F756A6EE386C8DA27746E1C364F07828F830E1CF138462A63F4601ED9516A80F914ADE
2,962,964 UART: [art] SIG.R = 162094BB08E2D43343C0C6754228C87635A8DC1ECB41DC0B96C34B1CD68F2FF1DFD864113404661D5EA25EE61C621137
2,969,727 UART: [art] SIG.S = 111F94AF7276E300F0C95015E53734371A391B67E9D77310F0520300AC569EFC261D69B52E51E49D3597CFD179881F72
2,993,529 UART: Caliptra RT
2,993,874 UART: [state] CFI Enabled
3,101,365 UART: [rt] RT listening for mailbox commands...
3,102,035 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,095 UART: [rt]cmd =0x41544d4e, len=14344
3,535,566 >>> mbox cmd response data (8 bytes)
3,535,567 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,558 UART: [rt]cmd =0x41545348, len=116
3,586,683 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Unprovisioned
86,051 UART: [state] DebugLocked = No
86,761 UART: [state] WD Timer not started. Device not locked for debugging
88,116 UART: [kat] SHA2-256
891,666 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,795 UART: [kat] ++
895,947 UART: [kat] sha1
900,425 UART: [kat] SHA2-256
902,365 UART: [kat] SHA2-384
905,006 UART: [kat] SHA2-512-ACC
906,907 UART: [kat] ECC-384
916,622 UART: [kat] HMAC-384Kdf
921,298 UART: [kat] LMS
1,169,610 UART: [kat] --
1,170,505 UART: [cold-reset] ++
1,170,921 UART: [fht] FHT @ 0x50003400
1,173,395 UART: [idev] ++
1,173,563 UART: [idev] CDI.KEYID = 6
1,173,924 UART: [idev] SUBJECT.KEYID = 7
1,174,349 UART: [idev] UDS.KEYID = 0
1,174,695 ready_for_fw is high
1,174,695 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,513 UART: [idev] Erasing UDS.KEYID = 0
1,199,525 UART: [idev] Sha1 KeyId Algorithm
1,208,397 UART: [idev] --
1,209,482 UART: [ldev] ++
1,209,650 UART: [ldev] CDI.KEYID = 6
1,210,014 UART: [ldev] SUBJECT.KEYID = 5
1,210,441 UART: [ldev] AUTHORITY.KEYID = 7
1,210,904 UART: [ldev] FE.KEYID = 1
1,215,892 UART: [ldev] Erasing FE.KEYID = 1
1,242,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,426 UART: [ldev] --
1,281,744 UART: [fwproc] Wait for Commands...
1,282,365 UART: [fwproc] Recv command 0x46574c44
1,283,098 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,386 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,672 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,981 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,839 >>> mbox cmd response: success
2,774,882 UART: [afmc] ++
2,775,050 UART: [afmc] CDI.KEYID = 6
2,775,413 UART: [afmc] SUBJECT.KEYID = 7
2,775,839 UART: [afmc] AUTHORITY.KEYID = 5
2,811,850 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,755 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,484 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,367 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,086 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,881 UART: [afmc] --
2,854,917 UART: [cold-reset] --
2,855,917 UART: [state] Locking Datavault
2,856,866 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,470 UART: [state] Locking ICCM
2,858,070 UART: [exit] Launching FMC @ 0x40000130
2,863,399 UART:
2,863,415 UART: Running Caliptra FMC ...
2,863,823 UART:
2,863,877 UART: [state] CFI Enabled
2,874,122 UART: [fht] FMC Alias Private Key: 7
2,982,201 UART: [art] Extend RT PCRs Done
2,982,629 UART: [art] Lock RT PCRs Done
2,984,195 UART: [art] Populate DV Done
2,992,364 UART: [fht] FMC Alias Private Key: 7
2,993,404 UART: [art] Derive CDI
2,993,684 UART: [art] Store in in slot 0x4
3,079,323 UART: [art] Derive Key Pair
3,079,683 UART: [art] Store priv key in slot 0x5
3,092,951 UART: [art] Derive Key Pair - Done
3,107,828 UART: [art] Signing Cert with AUTHO
3,108,308 UART: RITY.KEYID = 7
3,123,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,371 UART: [art] PUB.X = E26B621418D7DFC85BE2C15EA208A1FDAFD259998F594E158AB12F95C4CFAF2FB25891D12DBA7BF3AC77D7D79DC5923A
3,131,160 UART: [art] PUB.Y = 73C4C3DC402DD5F3C32F1FE5BF76C606F74620EA881D00E5FD480AFEB39142ACA158EE03320B7B70089C0524CC2D73EC
3,138,084 UART: [art] SIG.R = 2F424CC5D2708048B0915989EA616EA6E1D42479C92774841541D79BC4B0141730BC1DA139F98CC7A54DCE152FFB0B76
3,144,851 UART: [art] SIG.S = 5B4AF2E7B31F5EBA14BBF72C2CC38456F10D8BBCEC474E1EE06D89B2C90973A74709A44B896FE62BB326F1CCDDDB4FDF
3,168,615 UART: Caliptra RT
3,168,868 UART: [state] CFI Enabled
3,276,159 UART: [rt] RT listening for mailbox commands...
3,276,829 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,793 UART: [rt]cmd =0x41544d4e, len=14344
3,709,784 >>> mbox cmd response data (8 bytes)
3,709,785 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,608 UART: [rt]cmd =0x41545348, len=116
3,760,931 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,666 ready_for_fw is high
1,055,666 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,577 >>> mbox cmd response: success
2,683,489 UART:
2,683,505 UART: Running Caliptra FMC ...
2,683,913 UART:
2,683,967 UART: [state] CFI Enabled
2,694,658 UART: [fht] FMC Alias Private Key: 7
2,803,269 UART: [art] Extend RT PCRs Done
2,803,697 UART: [art] Lock RT PCRs Done
2,805,113 UART: [art] Populate DV Done
2,813,488 UART: [fht] FMC Alias Private Key: 7
2,814,580 UART: [art] Derive CDI
2,814,860 UART: [art] Store in in slot 0x4
2,900,499 UART: [art] Derive Key Pair
2,900,859 UART: [art] Store priv key in slot 0x5
2,914,069 UART: [art] Derive Key Pair - Done
2,929,100 UART: [art] Signing Cert with AUTHO
2,929,580 UART: RITY.KEYID = 7
2,945,026 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,791 UART: [art] PUB.X = 3CAB01B9DFE3EB562538FF34B752A4BC46B2AE58EF55AA8B8E51BCC989013082A612F8E32DF15A00C5E968E0A1F2FBB8
2,952,553 UART: [art] PUB.Y = C8BBD27B4009BD7ABBFFE2CD5BE905AF95EF5C01499ECE81DC9D543D65BD822FD365049511E4E2ECFE94241166B3DA86
2,959,513 UART: [art] SIG.R = 20155726B1EF23E8C2CA465EC9E263E3EB518AF2055FA3C44B91BDB44534BE33C57750908396C49068DB039B9B64E85C
2,966,279 UART: [art] SIG.S = 13ED19B70E63BB6C226715ED9945E5BA94618A83B0698C071550675B0FD1E44D35AB274B15A3788EC59D6B0ED84A31AC
2,990,602 UART: Caliptra RT
2,990,855 UART: [state] CFI Enabled
3,098,780 UART: [rt] RT listening for mailbox commands...
3,099,450 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,542 UART: [rt]cmd =0x41544d4e, len=14344
3,532,257 >>> mbox cmd response data (8 bytes)
3,532,258 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,565 UART: [rt]cmd =0x41545348, len=116
3,583,806 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
86,890 UART: [state] WD Timer not started. Device not locked for debugging
88,223 UART: [kat] SHA2-256
891,773 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,902 UART: [kat] ++
896,054 UART: [kat] sha1
900,374 UART: [kat] SHA2-256
902,314 UART: [kat] SHA2-384
904,881 UART: [kat] SHA2-512-ACC
906,782 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
920,981 UART: [kat] LMS
1,169,293 UART: [kat] --
1,170,418 UART: [cold-reset] ++
1,170,916 UART: [fht] FHT @ 0x50003400
1,173,632 UART: [idev] ++
1,173,800 UART: [idev] CDI.KEYID = 6
1,174,161 UART: [idev] SUBJECT.KEYID = 7
1,174,586 UART: [idev] UDS.KEYID = 0
1,174,932 ready_for_fw is high
1,174,932 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,792 UART: [idev] Erasing UDS.KEYID = 0
1,199,766 UART: [idev] Sha1 KeyId Algorithm
1,208,622 UART: [idev] --
1,209,689 UART: [ldev] ++
1,209,857 UART: [ldev] CDI.KEYID = 6
1,210,221 UART: [ldev] SUBJECT.KEYID = 5
1,210,648 UART: [ldev] AUTHORITY.KEYID = 7
1,211,111 UART: [ldev] FE.KEYID = 1
1,216,275 UART: [ldev] Erasing FE.KEYID = 1
1,242,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,243 UART: [ldev] --
1,281,567 UART: [fwproc] Wait for Commands...
1,282,376 UART: [fwproc] Recv command 0x46574c44
1,283,109 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,215 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,524 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,472 >>> mbox cmd response: success
2,774,729 UART: [afmc] ++
2,774,897 UART: [afmc] CDI.KEYID = 6
2,775,260 UART: [afmc] SUBJECT.KEYID = 7
2,775,686 UART: [afmc] AUTHORITY.KEYID = 5
2,811,423 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,249 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,000 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,729 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,612 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,331 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,344 UART: [afmc] --
2,855,318 UART: [cold-reset] --
2,856,214 UART: [state] Locking Datavault
2,857,557 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,161 UART: [state] Locking ICCM
2,858,685 UART: [exit] Launching FMC @ 0x40000130
2,864,014 UART:
2,864,030 UART: Running Caliptra FMC ...
2,864,438 UART:
2,864,581 UART: [state] CFI Enabled
2,875,472 UART: [fht] FMC Alias Private Key: 7
2,983,001 UART: [art] Extend RT PCRs Done
2,983,429 UART: [art] Lock RT PCRs Done
2,984,935 UART: [art] Populate DV Done
2,993,460 UART: [fht] FMC Alias Private Key: 7
2,994,568 UART: [art] Derive CDI
2,994,848 UART: [art] Store in in slot 0x4
3,080,435 UART: [art] Derive Key Pair
3,080,795 UART: [art] Store priv key in slot 0x5
3,094,421 UART: [art] Derive Key Pair - Done
3,108,978 UART: [art] Signing Cert with AUTHO
3,109,458 UART: RITY.KEYID = 7
3,124,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,755 UART: [art] PUB.X = E5CCEFE426B5707F2FCD6D3C82B054118EF9AC18C6B0208E82A53DF6FE44AABA14D92025E56A340BCD88D545D93FFFDA
3,132,546 UART: [art] PUB.Y = F8511E7BEA3D81C05D284DD8089CAC5C6F53DC60E6DBFCC037B01C502F8372A648E7E6D9D7BA5E99338E95DD8C6CBB3D
3,139,515 UART: [art] SIG.R = D6531025C22F6E8D6A1DDF3683FDB5F86FC44AFB004F75B54EDA8151227ACDCCED38D5C551199DA2FEC8AE96DE6A901C
3,146,287 UART: [art] SIG.S = CAE1E5AA2BB3AB1EA823EABEE05D6A8E49814FCACED5DCEF6471F15DE614B524AF3BC73992DF104D540154EC4366DA04
3,169,698 UART: Caliptra RT
3,170,043 UART: [state] CFI Enabled
3,277,719 UART: [rt] RT listening for mailbox commands...
3,278,389 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,533 UART: [rt]cmd =0x41544d4e, len=14344
3,712,092 >>> mbox cmd response data (8 bytes)
3,712,093 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,134 UART: [rt]cmd =0x41545348, len=116
3,763,279 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,331 ready_for_fw is high
1,056,331 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,964 >>> mbox cmd response: success
2,685,640 UART:
2,685,656 UART: Running Caliptra FMC ...
2,686,064 UART:
2,686,207 UART: [state] CFI Enabled
2,696,732 UART: [fht] FMC Alias Private Key: 7
2,804,183 UART: [art] Extend RT PCRs Done
2,804,611 UART: [art] Lock RT PCRs Done
2,806,175 UART: [art] Populate DV Done
2,814,404 UART: [fht] FMC Alias Private Key: 7
2,815,502 UART: [art] Derive CDI
2,815,782 UART: [art] Store in in slot 0x4
2,901,775 UART: [art] Derive Key Pair
2,902,135 UART: [art] Store priv key in slot 0x5
2,914,733 UART: [art] Derive Key Pair - Done
2,929,187 UART: [art] Signing Cert with AUTHO
2,929,667 UART: RITY.KEYID = 7
2,944,917 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,682 UART: [art] PUB.X = 8134EAE123419C182D4F5899239D5B92894C4DC83630AEA29A5091D4F3D11D080980C25363E17125DACCA67D45323CD6
2,952,442 UART: [art] PUB.Y = A7AD27CCF08C952BD212BFBF68BAA73ED18E537B79D06A11C5054BA6A1A42CF26D27CFCD0D4B7E6B8DCFD60E1E8611F0
2,959,411 UART: [art] SIG.R = 31560574A849E997168C534FE10AE6C2C234AA3C7B5D21D41C84F8749018A5BAEEDEE82639D42395977ADD99D12DBA3B
2,966,181 UART: [art] SIG.S = 720426F4F5C253FE91ED82E490AAD1AF169F08F177250485E9D6604423D8B66F81F62AF1DCB4F2366629173D407740D1
2,990,069 UART: Caliptra RT
2,990,414 UART: [state] CFI Enabled
3,098,067 UART: [rt] RT listening for mailbox commands...
3,098,737 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,003 UART: [rt]cmd =0x41544d4e, len=14344
3,531,832 >>> mbox cmd response data (8 bytes)
3,531,833 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,196 UART: [rt]cmd =0x41545348, len=116
3,583,325 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,317 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,919 UART: [kat] SHA2-256
881,850 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,965 UART: [kat] ++
886,117 UART: [kat] sha1
890,347 UART: [kat] SHA2-256
892,285 UART: [kat] SHA2-384
895,056 UART: [kat] SHA2-512-ACC
896,957 UART: [kat] ECC-384
902,440 UART: [kat] HMAC-384Kdf
906,862 UART: [kat] LMS
1,475,058 UART: [kat] --
1,475,659 UART: [cold-reset] ++
1,476,117 UART: [fht] Storing FHT @ 0x50003400
1,478,966 UART: [idev] ++
1,479,134 UART: [idev] CDI.KEYID = 6
1,479,494 UART: [idev] SUBJECT.KEYID = 7
1,479,918 UART: [idev] UDS.KEYID = 0
1,480,263 ready_for_fw is high
1,480,263 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,674 UART: [idev] Erasing UDS.KEYID = 0
1,504,640 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,170 UART: [idev] --
1,514,429 UART: [ldev] ++
1,514,597 UART: [ldev] CDI.KEYID = 6
1,514,960 UART: [ldev] SUBJECT.KEYID = 5
1,515,386 UART: [ldev] AUTHORITY.KEYID = 7
1,515,849 UART: [ldev] FE.KEYID = 1
1,521,271 UART: [ldev] Erasing FE.KEYID = 1
1,547,150 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,002 UART: [ldev] --
1,586,275 UART: [fwproc] Waiting for Commands...
1,586,986 UART: [fwproc] Received command 0x46574c44
1,587,777 UART: [fwproc] Received Image of size 114332 bytes
2,885,735 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,791 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,143 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,986 >>> mbox cmd response: success
3,080,140 UART: [afmc] ++
3,080,308 UART: [afmc] CDI.KEYID = 6
3,080,670 UART: [afmc] SUBJECT.KEYID = 7
3,081,095 UART: [afmc] AUTHORITY.KEYID = 5
3,116,566 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,718 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,498 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,226 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,111 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,801 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,830 UART: [afmc] --
3,159,958 UART: [cold-reset] --
3,160,810 UART: [state] Locking Datavault
3,161,833 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,437 UART: [state] Locking ICCM
3,162,979 UART: [exit] Launching FMC @ 0x40000130
3,168,308 UART:
3,168,324 UART: Running Caliptra FMC ...
3,168,732 UART:
3,168,786 UART: [state] CFI Enabled
3,179,715 UART: [fht] FMC Alias Private Key: 7
3,287,752 UART: [art] Extend RT PCRs Done
3,288,180 UART: [art] Lock RT PCRs Done
3,289,630 UART: [art] Populate DV Done
3,298,173 UART: [fht] FMC Alias Private Key: 7
3,299,189 UART: [art] Derive CDI
3,299,469 UART: [art] Store in in slot 0x4
3,384,822 UART: [art] Derive Key Pair
3,385,182 UART: [art] Store priv key in slot 0x5
3,398,380 UART: [art] Derive Key Pair - Done
3,412,952 UART: [art] Signing Cert with AUTHO
3,413,432 UART: RITY.KEYID = 7
3,428,756 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,521 UART: [art] PUB.X = E7D4F0515928631D92E20A41FC162D177E621B3246F884994D67A8638821EEB5A9B6A59D6A32E885984810B4A24291E7
3,436,278 UART: [art] PUB.Y = AE985C5ED325CA45BEEA1216C3DDBDE09FAFE6E013042110F6680FD9B38A56789FEEB7C60D7DDC2EDD5ADB4CE7E66F90
3,443,249 UART: [art] SIG.R = 1E0C9EC009FCE2750E372B401346F9DFFBF4EA8DCB939D9CFB280C8BEEB2345FC88D40E16883C7512C5CBA798B03442D
3,450,022 UART: [art] SIG.S = E98672D3D0058938C9816B9F6EBD78A93EEA8E9D55BD30ED0691C0F820E19EF25A211D7E1616FC6CD84F4E5F1BCE352E
3,473,565 UART: Caliptra RT
3,473,818 UART: [state] CFI Enabled
3,580,923 UART: [rt] RT listening for mailbox commands...
3,581,593 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,749 UART: [rt]cmd =0x41544d4e, len=14344
4,013,949 >>> mbox cmd response data (8 bytes)
4,013,950 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,781 UART: [rt]cmd =0x41545348, len=116
4,065,846 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,043 ready_for_fw is high
1,362,043 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,140 >>> mbox cmd response: success
2,988,354 UART:
2,988,370 UART: Running Caliptra FMC ...
2,988,778 UART:
2,988,832 UART: [state] CFI Enabled
2,999,193 UART: [fht] FMC Alias Private Key: 7
3,107,120 UART: [art] Extend RT PCRs Done
3,107,548 UART: [art] Lock RT PCRs Done
3,109,124 UART: [art] Populate DV Done
3,117,455 UART: [fht] FMC Alias Private Key: 7
3,118,505 UART: [art] Derive CDI
3,118,785 UART: [art] Store in in slot 0x4
3,204,860 UART: [art] Derive Key Pair
3,205,220 UART: [art] Store priv key in slot 0x5
3,218,842 UART: [art] Derive Key Pair - Done
3,233,559 UART: [art] Signing Cert with AUTHO
3,234,039 UART: RITY.KEYID = 7
3,248,961 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,726 UART: [art] PUB.X = CC24FF49170403238A46844DD30327DEC3D64DF02EBFEE8A7226B78E952DFE962C0536084070BC6605D24102E1667AD5
3,256,475 UART: [art] PUB.Y = 19D4B329CD2A681E1B3E807E4794365147F85C73A5510392354B848C27FAF0ABF5BA915E9AAF24C60FC75788655D8EFE
3,263,423 UART: [art] SIG.R = 5D2623CCDF76DDE7D7D9A5621BFEDDA1E7ACCB7DFF98AAD47054EB9F9A54D03E56CCFF1C14FF5FAF3C653BBF613A6337
3,270,229 UART: [art] SIG.S = 1B7E55F99561D6FA7694CA77D95CCBE431102191CFB9555919889B4F42FB47D5520647FFDF8D6B4EB801033B450E9749
3,294,002 UART: Caliptra RT
3,294,255 UART: [state] CFI Enabled
3,403,129 UART: [rt] RT listening for mailbox commands...
3,403,799 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,693 UART: [rt]cmd =0x41544d4e, len=14344
3,836,575 >>> mbox cmd response data (8 bytes)
3,836,576 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,761 UART: [rt]cmd =0x41545348, len=116
3,887,574 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,696 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,184 UART: [kat] SHA2-256
882,115 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,230 UART: [kat] ++
886,382 UART: [kat] sha1
890,532 UART: [kat] SHA2-256
892,470 UART: [kat] SHA2-384
895,241 UART: [kat] SHA2-512-ACC
897,142 UART: [kat] ECC-384
902,703 UART: [kat] HMAC-384Kdf
907,359 UART: [kat] LMS
1,475,555 UART: [kat] --
1,476,474 UART: [cold-reset] ++
1,476,948 UART: [fht] Storing FHT @ 0x50003400
1,479,543 UART: [idev] ++
1,479,711 UART: [idev] CDI.KEYID = 6
1,480,071 UART: [idev] SUBJECT.KEYID = 7
1,480,495 UART: [idev] UDS.KEYID = 0
1,480,840 ready_for_fw is high
1,480,840 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,949 UART: [idev] Erasing UDS.KEYID = 0
1,505,735 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,453 UART: [idev] --
1,515,518 UART: [ldev] ++
1,515,686 UART: [ldev] CDI.KEYID = 6
1,516,049 UART: [ldev] SUBJECT.KEYID = 5
1,516,475 UART: [ldev] AUTHORITY.KEYID = 7
1,516,938 UART: [ldev] FE.KEYID = 1
1,522,232 UART: [ldev] Erasing FE.KEYID = 1
1,547,581 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,237 UART: [ldev] --
1,586,558 UART: [fwproc] Waiting for Commands...
1,587,231 UART: [fwproc] Received command 0x46574c44
1,588,022 UART: [fwproc] Received Image of size 114332 bytes
2,886,890 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,500 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,852 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,693 >>> mbox cmd response: success
3,080,897 UART: [afmc] ++
3,081,065 UART: [afmc] CDI.KEYID = 6
3,081,427 UART: [afmc] SUBJECT.KEYID = 7
3,081,852 UART: [afmc] AUTHORITY.KEYID = 5
3,117,329 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,489 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,269 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,997 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,882 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,572 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,649 UART: [afmc] --
3,160,687 UART: [cold-reset] --
3,161,681 UART: [state] Locking Datavault
3,162,904 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,508 UART: [state] Locking ICCM
3,163,938 UART: [exit] Launching FMC @ 0x40000130
3,169,267 UART:
3,169,283 UART: Running Caliptra FMC ...
3,169,691 UART:
3,169,834 UART: [state] CFI Enabled
3,180,675 UART: [fht] FMC Alias Private Key: 7
3,288,804 UART: [art] Extend RT PCRs Done
3,289,232 UART: [art] Lock RT PCRs Done
3,290,706 UART: [art] Populate DV Done
3,298,881 UART: [fht] FMC Alias Private Key: 7
3,299,979 UART: [art] Derive CDI
3,300,259 UART: [art] Store in in slot 0x4
3,386,012 UART: [art] Derive Key Pair
3,386,372 UART: [art] Store priv key in slot 0x5
3,399,860 UART: [art] Derive Key Pair - Done
3,414,593 UART: [art] Signing Cert with AUTHO
3,415,073 UART: RITY.KEYID = 7
3,430,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,814 UART: [art] PUB.X = 87279BA204992A6DA7E9E20E9D06D4BAFD9DEB03D3FA40F3F51B62B3870FA8FD63714FF7784513391D29F73AA9AA9894
3,437,579 UART: [art] PUB.Y = 101F6000B8D8051B02B6CB12FC59BA37844DA13E1B48D5D5D14151147ED72B177E5A2E872BF0BB86DC68726C2C4A5380
3,444,505 UART: [art] SIG.R = EF8F486F37B2225279798A30F2E852B94703C8752FE04D6434732C42B0C2A856714E471E5F368709ECEE3D31D07786F2
3,451,261 UART: [art] SIG.S = 849A1764412416E68AB043CF037E113B65261BA11AF9C77D341B3B720FB659CA73A354595BEF6E20C6EB98EFA40BA4CE
3,475,257 UART: Caliptra RT
3,475,602 UART: [state] CFI Enabled
3,584,814 UART: [rt] RT listening for mailbox commands...
3,585,484 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,506 UART: [rt]cmd =0x41544d4e, len=14344
4,018,330 >>> mbox cmd response data (8 bytes)
4,018,331 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,048,646 UART: [rt]cmd =0x41545348, len=116
4,070,561 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,294 ready_for_fw is high
1,363,294 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,591 >>> mbox cmd response: success
2,989,013 UART:
2,989,029 UART: Running Caliptra FMC ...
2,989,437 UART:
2,989,580 UART: [state] CFI Enabled
3,000,051 UART: [fht] FMC Alias Private Key: 7
3,108,360 UART: [art] Extend RT PCRs Done
3,108,788 UART: [art] Lock RT PCRs Done
3,110,432 UART: [art] Populate DV Done
3,118,611 UART: [fht] FMC Alias Private Key: 7
3,119,703 UART: [art] Derive CDI
3,119,983 UART: [art] Store in in slot 0x4
3,205,742 UART: [art] Derive Key Pair
3,206,102 UART: [art] Store priv key in slot 0x5
3,219,560 UART: [art] Derive Key Pair - Done
3,234,180 UART: [art] Signing Cert with AUTHO
3,234,660 UART: RITY.KEYID = 7
3,249,808 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,573 UART: [art] PUB.X = 9913C8FBFFDD4F9DA076C1DD35A61192CD8BE258B74751623AF35D69C1BCA68DAC963AD2E53500C032875DCA4B7D5F50
3,257,337 UART: [art] PUB.Y = E0641D0E191D1403E3A4E21ACA93EE21FE1DCFD8653E2EAC3F2E44672E180FCCDBA6C5CC982137253738AF7C18FAF448
3,264,296 UART: [art] SIG.R = 072A2F1DC769564B7263FDB2259DBCADC782F509B5DE04E38FC717D80B3EE9837AD4474255F9DCD2417DD1256E8DD93A
3,271,066 UART: [art] SIG.S = 6245232D415EEC0D6BA7D44163EED41B9D5F621A88150769E1CFE0F177AAC46E93CF78F7D4078ACD22405E2DCD27EDD0
3,294,638 UART: Caliptra RT
3,294,983 UART: [state] CFI Enabled
3,402,147 UART: [rt] RT listening for mailbox commands...
3,402,817 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,601 UART: [rt]cmd =0x41544d4e, len=14344
3,835,783 >>> mbox cmd response data (8 bytes)
3,835,784 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,939 UART: [rt]cmd =0x41545348, len=116
3,888,376 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
893,426 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,551 UART: [kat] ++
897,703 UART: [kat] sha1
901,919 UART: [kat] SHA2-256
903,859 UART: [kat] SHA2-384
906,540 UART: [kat] SHA2-512-ACC
908,441 UART: [kat] ECC-384
917,986 UART: [kat] HMAC-384Kdf
922,646 UART: [kat] LMS
1,170,974 UART: [kat] --
1,171,895 UART: [cold-reset] ++
1,172,223 UART: [fht] FHT @ 0x50003400
1,175,086 UART: [idev] ++
1,175,254 UART: [idev] CDI.KEYID = 6
1,175,614 UART: [idev] SUBJECT.KEYID = 7
1,176,038 UART: [idev] UDS.KEYID = 0
1,176,383 ready_for_fw is high
1,176,383 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,230 UART: [idev] Erasing UDS.KEYID = 0
1,201,037 UART: [idev] Sha1 KeyId Algorithm
1,209,531 UART: [idev] --
1,210,499 UART: [ldev] ++
1,210,667 UART: [ldev] CDI.KEYID = 6
1,211,030 UART: [ldev] SUBJECT.KEYID = 5
1,211,456 UART: [ldev] AUTHORITY.KEYID = 7
1,211,919 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,243,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,561 UART: [ldev] --
1,282,976 UART: [fwproc] Wait for Commands...
1,283,546 UART: [fwproc] Recv command 0x46574c44
1,284,274 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,836 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,140 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,955 >>> mbox cmd response: success
2,774,989 UART: [afmc] ++
2,775,157 UART: [afmc] CDI.KEYID = 6
2,775,519 UART: [afmc] SUBJECT.KEYID = 7
2,775,944 UART: [afmc] AUTHORITY.KEYID = 5
2,810,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,428 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,176 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,904 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,789 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,508 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,376 UART: [afmc] --
2,854,490 UART: [cold-reset] --
2,855,240 UART: [state] Locking Datavault
2,856,373 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,977 UART: [state] Locking ICCM
2,857,457 UART: [exit] Launching FMC @ 0x40000130
2,862,786 UART:
2,862,802 UART: Running Caliptra FMC ...
2,863,210 UART:
2,863,264 UART: [state] CFI Enabled
2,873,705 UART: [fht] FMC Alias Private Key: 7
2,982,616 UART: [art] Extend RT PCRs Done
2,983,044 UART: [art] Lock RT PCRs Done
2,984,758 UART: [art] Populate DV Done
2,993,051 UART: [fht] FMC Alias Private Key: 7
2,994,005 UART: [art] Derive CDI
2,994,285 UART: [art] Store in in slot 0x4
3,079,798 UART: [art] Derive Key Pair
3,080,158 UART: [art] Store priv key in slot 0x5
3,093,728 UART: [art] Derive Key Pair - Done
3,108,618 UART: [art] Signing Cert with AUTHO
3,109,098 UART: RITY.KEYID = 7
3,124,274 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,039 UART: [art] PUB.X = F69A951CB11A9CD91A211A4E85196E6461754A82586F865CBCA8FC39E02831BCECFEAE6E1C06F7AC09742529408A2A58
3,131,811 UART: [art] PUB.Y = E478793118FCE33A0829FE3195CCA16B21CFE2FC79F8EC97B3604AA1BEC0607E60C61B4F7D7815F401FB4287AE4FF14A
3,138,769 UART: [art] SIG.R = 57C0498568F263240AB5BEEBC7C292C9F7D7EEB57F4E79EFD8555E66B987F7DC8B39E491E2A42F005D0E31C9694DDDC2
3,145,525 UART: [art] SIG.S = 48DBBBCF43DF6843AC9216D244AEA7C0A44EE3C6AF8B5578EDE70EEBD0EFA5AC5792AC76F74F51F26528DB4148AD47F6
3,169,891 UART: Caliptra RT
3,170,144 UART: [state] CFI Enabled
3,277,805 UART: [rt] RT listening for mailbox commands...
3,278,475 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,395 UART: [rt]cmd =0x41544d4e, len=14344
3,710,977 >>> mbox cmd response data (8 bytes)
3,710,978 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,061 UART: [rt]cmd =0x41545348, len=116
3,763,234 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,255 ready_for_fw is high
1,060,255 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,388 >>> mbox cmd response: success
2,688,872 UART:
2,688,888 UART: Running Caliptra FMC ...
2,689,296 UART:
2,689,350 UART: [state] CFI Enabled
2,699,881 UART: [fht] FMC Alias Private Key: 7
2,808,396 UART: [art] Extend RT PCRs Done
2,808,824 UART: [art] Lock RT PCRs Done
2,810,368 UART: [art] Populate DV Done
2,818,611 UART: [fht] FMC Alias Private Key: 7
2,819,771 UART: [art] Derive CDI
2,820,051 UART: [art] Store in in slot 0x4
2,906,180 UART: [art] Derive Key Pair
2,906,540 UART: [art] Store priv key in slot 0x5
2,919,732 UART: [art] Derive Key Pair - Done
2,934,254 UART: [art] Signing Cert with AUTHO
2,934,734 UART: RITY.KEYID = 7
2,949,722 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,487 UART: [art] PUB.X = 20DF63E7780A4A15FCB42D4E847E3838671C997B83E9DFE3F689839501773070A5C5F474EC8B420CB9E04D81BAD67586
2,957,248 UART: [art] PUB.Y = 68118A9E5E029DD6C2A6E524BED58E70B2D1151BF464CCEB7D6907AF2A6675A7125D816FF5244AC979A8CC44127622ED
2,964,200 UART: [art] SIG.R = 4A4D7459FB913D46FA16E22B97560F22001DC08A40E2044597070D26089DDC2E8420FB2044834BFDC36BCE78DB54215D
2,970,933 UART: [art] SIG.S = 4A568F6290814F62BE3D82C2F404A28AEE434D0229D4E38C9D477C4499E8E9DD02CF9ACF6B9C7AA100A6EF82503A689A
2,994,683 UART: Caliptra RT
2,994,936 UART: [state] CFI Enabled
3,102,777 UART: [rt] RT listening for mailbox commands...
3,103,447 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,553 UART: [rt]cmd =0x41544d4e, len=14344
3,536,793 >>> mbox cmd response data (8 bytes)
3,536,794 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,567,109 UART: [rt]cmd =0x41545348, len=116
3,589,156 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,011 UART: [state] LifecycleState = Unprovisioned
85,666 UART: [state] DebugLocked = No
86,184 UART: [state] WD Timer not started. Device not locked for debugging
87,321 UART: [kat] SHA2-256
892,971 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,096 UART: [kat] ++
897,248 UART: [kat] sha1
901,650 UART: [kat] SHA2-256
903,590 UART: [kat] SHA2-384
906,443 UART: [kat] SHA2-512-ACC
908,344 UART: [kat] ECC-384
918,507 UART: [kat] HMAC-384Kdf
923,175 UART: [kat] LMS
1,171,503 UART: [kat] --
1,172,592 UART: [cold-reset] ++
1,173,118 UART: [fht] FHT @ 0x50003400
1,175,957 UART: [idev] ++
1,176,125 UART: [idev] CDI.KEYID = 6
1,176,485 UART: [idev] SUBJECT.KEYID = 7
1,176,909 UART: [idev] UDS.KEYID = 0
1,177,254 ready_for_fw is high
1,177,254 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,729 UART: [idev] Erasing UDS.KEYID = 0
1,202,112 UART: [idev] Sha1 KeyId Algorithm
1,210,762 UART: [idev] --
1,211,696 UART: [ldev] ++
1,211,864 UART: [ldev] CDI.KEYID = 6
1,212,227 UART: [ldev] SUBJECT.KEYID = 5
1,212,653 UART: [ldev] AUTHORITY.KEYID = 7
1,213,116 UART: [ldev] FE.KEYID = 1
1,218,332 UART: [ldev] Erasing FE.KEYID = 1
1,244,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,946 UART: [ldev] --
1,284,245 UART: [fwproc] Wait for Commands...
1,284,941 UART: [fwproc] Recv command 0x46574c44
1,285,669 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,547 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,851 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,582 >>> mbox cmd response: success
2,776,758 UART: [afmc] ++
2,776,926 UART: [afmc] CDI.KEYID = 6
2,777,288 UART: [afmc] SUBJECT.KEYID = 7
2,777,713 UART: [afmc] AUTHORITY.KEYID = 5
2,812,834 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,923 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,671 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,399 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,284 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,003 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,863 UART: [afmc] --
2,855,757 UART: [cold-reset] --
2,856,749 UART: [state] Locking Datavault
2,857,864 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,468 UART: [state] Locking ICCM
2,858,988 UART: [exit] Launching FMC @ 0x40000130
2,864,317 UART:
2,864,333 UART: Running Caliptra FMC ...
2,864,741 UART:
2,864,884 UART: [state] CFI Enabled
2,875,653 UART: [fht] FMC Alias Private Key: 7
2,983,688 UART: [art] Extend RT PCRs Done
2,984,116 UART: [art] Lock RT PCRs Done
2,985,520 UART: [art] Populate DV Done
2,993,725 UART: [fht] FMC Alias Private Key: 7
2,994,725 UART: [art] Derive CDI
2,995,005 UART: [art] Store in in slot 0x4
3,080,490 UART: [art] Derive Key Pair
3,080,850 UART: [art] Store priv key in slot 0x5
3,094,080 UART: [art] Derive Key Pair - Done
3,108,995 UART: [art] Signing Cert with AUTHO
3,109,475 UART: RITY.KEYID = 7
3,125,099 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,864 UART: [art] PUB.X = A8AA9CB97DE1B44527B76DA640A618AEB495F21DCE3BF0FC3412399FC3BCAFA576813FF1E9A1F2ACA9EA35E0E2B9627D
3,132,660 UART: [art] PUB.Y = 8A84A2C5C695A6C0780DC80A46F843E1C5A4FA9D8C817C8BC39A22CE32A2AA4F97F1CBC318B9252DCCC14B0A3CB9ECC4
3,139,625 UART: [art] SIG.R = 285EDDDFC8CA1B9C363127C2868BE84FD6289449D76BD8EDBBE39AC0E0BD4351E3FBB04525E4E0A9479E62351389F5BD
3,146,411 UART: [art] SIG.S = 9D8C67759AA48C17D79AEB8B7349A9F902F6432C18CDE4FC949E868C033D55B1B565D5BCE362DAFF670F2F5F968F3163
3,170,215 UART: Caliptra RT
3,170,560 UART: [state] CFI Enabled
3,278,617 UART: [rt] RT listening for mailbox commands...
3,279,287 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,905 UART: [rt]cmd =0x41544d4e, len=14344
3,711,809 >>> mbox cmd response data (8 bytes)
3,711,810 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,975 UART: [rt]cmd =0x41545348, len=116
3,764,246 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,942 ready_for_fw is high
1,059,942 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,077 >>> mbox cmd response: success
2,689,233 UART:
2,689,249 UART: Running Caliptra FMC ...
2,689,657 UART:
2,689,800 UART: [state] CFI Enabled
2,700,837 UART: [fht] FMC Alias Private Key: 7
2,808,860 UART: [art] Extend RT PCRs Done
2,809,288 UART: [art] Lock RT PCRs Done
2,810,774 UART: [art] Populate DV Done
2,818,957 UART: [fht] FMC Alias Private Key: 7
2,819,961 UART: [art] Derive CDI
2,820,241 UART: [art] Store in in slot 0x4
2,905,854 UART: [art] Derive Key Pair
2,906,214 UART: [art] Store priv key in slot 0x5
2,919,496 UART: [art] Derive Key Pair - Done
2,934,367 UART: [art] Signing Cert with AUTHO
2,934,847 UART: RITY.KEYID = 7
2,950,307 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,072 UART: [art] PUB.X = 16DAF813ABE8153FF3FD8BF283284AE74F5A0A25CB77CFE42094F9D51958FF74373B67A6F092B959C5F50DC16F4308AD
2,957,845 UART: [art] PUB.Y = 7585E19307F828AC126AD622FD03B45F48ECB28D9C75D1D6EC8B6825D35B302B71A85A4A746028EA75D647DF8BE49EC8
2,964,797 UART: [art] SIG.R = 458624CF1F761673181890B7E685D255EEDA7D833860C22BD734ABEE75357509FF48BF76E8F883FAA6651B5F3B1A0909
2,971,558 UART: [art] SIG.S = 33460D5E9A6A6B7A0EA75D854DA18E9E82514819944C8A11A15D8323F7C8AA7B7B087CA321296CABFC4480AD344F1E41
2,995,708 UART: Caliptra RT
2,996,053 UART: [state] CFI Enabled
3,104,170 UART: [rt] RT listening for mailbox commands...
3,104,840 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,754 UART: [rt]cmd =0x41544d4e, len=14344
3,537,168 >>> mbox cmd response data (8 bytes)
3,537,169 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,567,118 UART: [rt]cmd =0x41545348, len=116
3,589,201 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,480 UART: [state] LifecycleState = Unprovisioned
86,135 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
87,866 UART: [kat] SHA2-256
891,416 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,545 UART: [kat] ++
895,697 UART: [kat] sha1
900,125 UART: [kat] SHA2-256
902,065 UART: [kat] SHA2-384
904,788 UART: [kat] SHA2-512-ACC
906,689 UART: [kat] ECC-384
916,562 UART: [kat] HMAC-384Kdf
920,984 UART: [kat] LMS
1,169,296 UART: [kat] --
1,169,997 UART: [cold-reset] ++
1,170,447 UART: [fht] FHT @ 0x50003400
1,172,985 UART: [idev] ++
1,173,153 UART: [idev] CDI.KEYID = 6
1,173,514 UART: [idev] SUBJECT.KEYID = 7
1,173,939 UART: [idev] UDS.KEYID = 0
1,174,285 ready_for_fw is high
1,174,285 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,965 UART: [idev] Erasing UDS.KEYID = 0
1,199,153 UART: [idev] Sha1 KeyId Algorithm
1,208,139 UART: [idev] --
1,209,232 UART: [ldev] ++
1,209,400 UART: [ldev] CDI.KEYID = 6
1,209,764 UART: [ldev] SUBJECT.KEYID = 5
1,210,191 UART: [ldev] AUTHORITY.KEYID = 7
1,210,654 UART: [ldev] FE.KEYID = 1
1,215,764 UART: [ldev] Erasing FE.KEYID = 1
1,241,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,240 UART: [ldev] --
1,281,686 UART: [fwproc] Wait for Commands...
1,282,259 UART: [fwproc] Recv command 0x46574c44
1,282,992 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,242 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,551 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,255 >>> mbox cmd response: success
2,774,314 UART: [afmc] ++
2,774,482 UART: [afmc] CDI.KEYID = 6
2,774,845 UART: [afmc] SUBJECT.KEYID = 7
2,775,271 UART: [afmc] AUTHORITY.KEYID = 5
2,810,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,993 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,722 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,605 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,324 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,037 UART: [afmc] --
2,854,025 UART: [cold-reset] --
2,854,841 UART: [state] Locking Datavault
2,855,918 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,522 UART: [state] Locking ICCM
2,856,994 UART: [exit] Launching FMC @ 0x40000130
2,862,323 UART:
2,862,339 UART: Running Caliptra FMC ...
2,862,747 UART:
2,862,801 UART: [state] CFI Enabled
2,872,960 UART: [fht] FMC Alias Private Key: 7
2,981,233 UART: [art] Extend RT PCRs Done
2,981,661 UART: [art] Lock RT PCRs Done
2,983,047 UART: [art] Populate DV Done
2,991,156 UART: [fht] FMC Alias Private Key: 7
2,992,098 UART: [art] Derive CDI
2,992,378 UART: [art] Store in in slot 0x4
3,078,033 UART: [art] Derive Key Pair
3,078,393 UART: [art] Store priv key in slot 0x5
3,091,017 UART: [art] Derive Key Pair - Done
3,105,935 UART: [art] Signing Cert with AUTHO
3,106,415 UART: RITY.KEYID = 7
3,121,337 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,102 UART: [art] PUB.X = 0AA538C3E3D757490B36F3E318ED64E76669E7CFE9C8A39F5009B787C76434D25C2A353DD3067697CAFC850AF967F3D3
3,128,861 UART: [art] PUB.Y = 3AB043565A33D96F26F2DB57FD549402DEE457E8EB1F80700B00BEF553FF6D15A04FED844D441CFE6388230A08C8C517
3,135,785 UART: [art] SIG.R = 5EE3194C5C2DCCB33639D27C454DDD89903E3E2F3276D1492A8866D269462FFE7093DB997B3FE223F66F0A7CA0955B1C
3,142,558 UART: [art] SIG.S = 9A6B8853BA82AAE5947B17645CDC7DE3ACBD57327217B929F7C5AFACC16D23804AA7716AF735338BF0744AAA3DB4BAF8
3,166,891 UART: Caliptra RT
3,167,144 UART: [state] CFI Enabled
3,274,657 UART: [rt] RT listening for mailbox commands...
3,275,327 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,311 UART: [rt]cmd =0x41544d4e, len=14344
3,708,253 >>> mbox cmd response data (8 bytes)
3,708,254 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,161 UART: [rt]cmd =0x41545348, len=116
3,759,992 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,870 ready_for_fw is high
1,055,870 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,375 >>> mbox cmd response: success
2,684,805 UART:
2,684,821 UART: Running Caliptra FMC ...
2,685,229 UART:
2,685,283 UART: [state] CFI Enabled
2,695,876 UART: [fht] FMC Alias Private Key: 7
2,803,793 UART: [art] Extend RT PCRs Done
2,804,221 UART: [art] Lock RT PCRs Done
2,806,023 UART: [art] Populate DV Done
2,814,400 UART: [fht] FMC Alias Private Key: 7
2,815,378 UART: [art] Derive CDI
2,815,658 UART: [art] Store in in slot 0x4
2,901,499 UART: [art] Derive Key Pair
2,901,859 UART: [art] Store priv key in slot 0x5
2,914,785 UART: [art] Derive Key Pair - Done
2,929,517 UART: [art] Signing Cert with AUTHO
2,929,997 UART: RITY.KEYID = 7
2,944,877 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,642 UART: [art] PUB.X = 054F578E0BFA33AFF50B620C43D5ED0906513F95638951EFF1AA3548A23130D96918D1D5B1533C709033F931A95D01FB
2,952,389 UART: [art] PUB.Y = 498AD8DD3878E725EFE5EFA41A8BC29EE42CB7810B09D3D92E2628BF9CB162406415609F55C127A8C9034007A6903B2F
2,959,331 UART: [art] SIG.R = 0F33D9E656652A35A3BA6BBB978725D450B18A62D6CEDB035AA61E5071481F01866D28B4E0814601AE0EE9074F086095
2,966,078 UART: [art] SIG.S = 223ADE5C3C9E12A52E536A267572C25748452936EED7300E13F45739EBEE31CCE3E98D466D3ED65377DCD9A2AB2D7691
2,990,216 UART: Caliptra RT
2,990,469 UART: [state] CFI Enabled
3,098,092 UART: [rt] RT listening for mailbox commands...
3,098,762 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,760 UART: [rt]cmd =0x41544d4e, len=14344
3,531,484 >>> mbox cmd response data (8 bytes)
3,531,485 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,602 UART: [rt]cmd =0x41545348, len=116
3,583,805 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,444 UART: [state] WD Timer not started. Device not locked for debugging
87,687 UART: [kat] SHA2-256
891,237 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,366 UART: [kat] ++
895,518 UART: [kat] sha1
899,790 UART: [kat] SHA2-256
901,730 UART: [kat] SHA2-384
904,709 UART: [kat] SHA2-512-ACC
906,610 UART: [kat] ECC-384
916,533 UART: [kat] HMAC-384Kdf
921,073 UART: [kat] LMS
1,169,385 UART: [kat] --
1,170,302 UART: [cold-reset] ++
1,170,876 UART: [fht] FHT @ 0x50003400
1,173,446 UART: [idev] ++
1,173,614 UART: [idev] CDI.KEYID = 6
1,173,975 UART: [idev] SUBJECT.KEYID = 7
1,174,400 UART: [idev] UDS.KEYID = 0
1,174,746 ready_for_fw is high
1,174,746 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,404 UART: [idev] Erasing UDS.KEYID = 0
1,199,214 UART: [idev] Sha1 KeyId Algorithm
1,208,126 UART: [idev] --
1,209,099 UART: [ldev] ++
1,209,267 UART: [ldev] CDI.KEYID = 6
1,209,631 UART: [ldev] SUBJECT.KEYID = 5
1,210,058 UART: [ldev] AUTHORITY.KEYID = 7
1,210,521 UART: [ldev] FE.KEYID = 1
1,216,013 UART: [ldev] Erasing FE.KEYID = 1
1,242,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,117 UART: [ldev] --
1,281,453 UART: [fwproc] Wait for Commands...
1,282,274 UART: [fwproc] Recv command 0x46574c44
1,283,007 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,699 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,008 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,882 >>> mbox cmd response: success
2,775,117 UART: [afmc] ++
2,775,285 UART: [afmc] CDI.KEYID = 6
2,775,648 UART: [afmc] SUBJECT.KEYID = 7
2,776,074 UART: [afmc] AUTHORITY.KEYID = 5
2,812,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,733 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,484 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,213 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,096 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,815 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,700 UART: [afmc] --
2,855,798 UART: [cold-reset] --
2,856,538 UART: [state] Locking Datavault
2,857,981 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,585 UART: [state] Locking ICCM
2,859,073 UART: [exit] Launching FMC @ 0x40000130
2,864,402 UART:
2,864,418 UART: Running Caliptra FMC ...
2,864,826 UART:
2,864,969 UART: [state] CFI Enabled
2,875,922 UART: [fht] FMC Alias Private Key: 7
2,983,577 UART: [art] Extend RT PCRs Done
2,984,005 UART: [art] Lock RT PCRs Done
2,985,477 UART: [art] Populate DV Done
2,993,570 UART: [fht] FMC Alias Private Key: 7
2,994,528 UART: [art] Derive CDI
2,994,808 UART: [art] Store in in slot 0x4
3,080,187 UART: [art] Derive Key Pair
3,080,547 UART: [art] Store priv key in slot 0x5
3,094,405 UART: [art] Derive Key Pair - Done
3,109,155 UART: [art] Signing Cert with AUTHO
3,109,635 UART: RITY.KEYID = 7
3,125,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,818 UART: [art] PUB.X = B2A91337A9EC06E64EE5741437CCEECF8C575903D79B8270590D37D972C00A976A79DE0691101129DA5E30439965DFB8
3,132,571 UART: [art] PUB.Y = D9F7583F1B231A5F1BD9477C30A148385D61AA9D226F89FC7A0424EC3CCF3638C3F6C18E312276E76E308A9F7C195D97
3,139,522 UART: [art] SIG.R = 0E681F992BCD430EE88DD453C14507BAC2F40A04EDABE3C6DC5D5FE09C5E38D2D1195626C2624996D53628D4317EDE7E
3,146,289 UART: [art] SIG.S = DB9097D55DFBED49DC12BAB669BF87951F921AB0758F6865644DAA5F13E978BC69C790FF197A4EB23167C0C81BEC2AE6
3,169,472 UART: Caliptra RT
3,169,817 UART: [state] CFI Enabled
3,278,122 UART: [rt] RT listening for mailbox commands...
3,278,792 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,818 UART: [rt]cmd =0x41544d4e, len=14344
3,712,194 >>> mbox cmd response data (8 bytes)
3,712,195 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,112 UART: [rt]cmd =0x41545348, len=116
3,764,755 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,517 ready_for_fw is high
1,056,517 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,528 >>> mbox cmd response: success
2,685,128 UART:
2,685,144 UART: Running Caliptra FMC ...
2,685,552 UART:
2,685,695 UART: [state] CFI Enabled
2,696,646 UART: [fht] FMC Alias Private Key: 7
2,804,837 UART: [art] Extend RT PCRs Done
2,805,265 UART: [art] Lock RT PCRs Done
2,806,561 UART: [art] Populate DV Done
2,814,584 UART: [fht] FMC Alias Private Key: 7
2,815,624 UART: [art] Derive CDI
2,815,904 UART: [art] Store in in slot 0x4
2,901,669 UART: [art] Derive Key Pair
2,902,029 UART: [art] Store priv key in slot 0x5
2,915,669 UART: [art] Derive Key Pair - Done
2,930,491 UART: [art] Signing Cert with AUTHO
2,930,971 UART: RITY.KEYID = 7
2,946,363 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,128 UART: [art] PUB.X = FF5B0A7F35849F12F1C5A0C33F4255171AE1598E790F5D2E60F97AFA5AF55E9BD3678A317E574A12E52B07713DEF597F
2,953,897 UART: [art] PUB.Y = 7D8DB4E03A7A3AA5C5BC2300F17D807D557127A11105176D361F63A5EDA9AD8F641FDE2235E8ED95B48A5DDEE6031D05
2,960,828 UART: [art] SIG.R = 5EF6002C7CC044A3BF66D7AC5F71644FCB4809C46222E348B4CD1056C8E44F3633E949B1A057633E5751A63D482678B4
2,967,571 UART: [art] SIG.S = C9FFC5A4E445E1B17B98B1532833B3568E49EB8A6444D5140C0915CA09235BAEC3A21746C27413BC2A936F64FB1BAB6E
2,991,949 UART: Caliptra RT
2,992,294 UART: [state] CFI Enabled
3,100,319 UART: [rt] RT listening for mailbox commands...
3,100,989 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,105 UART: [rt]cmd =0x41544d4e, len=14344
3,534,307 >>> mbox cmd response data (8 bytes)
3,534,308 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,443 UART: [rt]cmd =0x41545348, len=116
3,586,542 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,263 UART: [kat] SHA2-256
882,194 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,309 UART: [kat] ++
886,461 UART: [kat] sha1
890,589 UART: [kat] SHA2-256
892,527 UART: [kat] SHA2-384
895,278 UART: [kat] SHA2-512-ACC
897,179 UART: [kat] ECC-384
902,736 UART: [kat] HMAC-384Kdf
907,182 UART: [kat] LMS
1,475,378 UART: [kat] --
1,476,239 UART: [cold-reset] ++
1,476,705 UART: [fht] Storing FHT @ 0x50003400
1,479,334 UART: [idev] ++
1,479,502 UART: [idev] CDI.KEYID = 6
1,479,862 UART: [idev] SUBJECT.KEYID = 7
1,480,286 UART: [idev] UDS.KEYID = 0
1,480,631 ready_for_fw is high
1,480,631 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,374 UART: [idev] Erasing UDS.KEYID = 0
1,505,052 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,604 UART: [idev] --
1,514,613 UART: [ldev] ++
1,514,781 UART: [ldev] CDI.KEYID = 6
1,515,144 UART: [ldev] SUBJECT.KEYID = 5
1,515,570 UART: [ldev] AUTHORITY.KEYID = 7
1,516,033 UART: [ldev] FE.KEYID = 1
1,521,115 UART: [ldev] Erasing FE.KEYID = 1
1,546,322 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,966 UART: [ldev] --
1,585,399 UART: [fwproc] Waiting for Commands...
1,586,040 UART: [fwproc] Received command 0x46574c44
1,586,831 UART: [fwproc] Received Image of size 114332 bytes
2,884,779 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,601 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,953 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,928 >>> mbox cmd response: success
3,079,172 UART: [afmc] ++
3,079,340 UART: [afmc] CDI.KEYID = 6
3,079,702 UART: [afmc] SUBJECT.KEYID = 7
3,080,127 UART: [afmc] AUTHORITY.KEYID = 5
3,115,522 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,722 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,502 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,230 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,115 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,805 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,702 UART: [afmc] --
3,158,726 UART: [cold-reset] --
3,159,528 UART: [state] Locking Datavault
3,160,621 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,225 UART: [state] Locking ICCM
3,161,771 UART: [exit] Launching FMC @ 0x40000130
3,167,100 UART:
3,167,116 UART: Running Caliptra FMC ...
3,167,524 UART:
3,167,578 UART: [state] CFI Enabled
3,177,889 UART: [fht] FMC Alias Private Key: 7
3,285,758 UART: [art] Extend RT PCRs Done
3,286,186 UART: [art] Lock RT PCRs Done
3,287,636 UART: [art] Populate DV Done
3,295,629 UART: [fht] FMC Alias Private Key: 7
3,296,761 UART: [art] Derive CDI
3,297,041 UART: [art] Store in in slot 0x4
3,382,252 UART: [art] Derive Key Pair
3,382,612 UART: [art] Store priv key in slot 0x5
3,395,780 UART: [art] Derive Key Pair - Done
3,410,536 UART: [art] Signing Cert with AUTHO
3,411,016 UART: RITY.KEYID = 7
3,426,424 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,189 UART: [art] PUB.X = 925913C49A91FA88F5E57C0892A3FB28673222F995879C2BC9ED7A9F0260FA69101C52DC87E1F983B85E67A9DAC24C20
3,433,955 UART: [art] PUB.Y = 978001323A309E228C5A2797549A8245EEC1B859062D538FAA96C1FBE961526E365BAD9F130BF34E652E17C4852A2902
3,440,887 UART: [art] SIG.R = C93A0D1F2EB17C72FC9BA8D17C03B659E21E57B4D693812E138609669F1991E606DC5F756EC60C6AD8A50A4D5DCC3970
3,447,647 UART: [art] SIG.S = 62895550C2496CAF1134B226D0CC766AF6EA7D9F30141ADFCC405D0066318C60F39095264F39708F35C4E19839B7A364
3,471,034 UART: Caliptra RT
3,471,287 UART: [state] CFI Enabled
3,579,480 UART: [rt] RT listening for mailbox commands...
3,580,150 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,188 UART: [rt]cmd =0x41544d4e, len=14344
4,012,902 >>> mbox cmd response data (8 bytes)
4,012,903 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,924 UART: [rt]cmd =0x41545348, len=116
4,065,067 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,691 ready_for_fw is high
1,362,691 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,448 >>> mbox cmd response: success
2,988,032 UART:
2,988,048 UART: Running Caliptra FMC ...
2,988,456 UART:
2,988,510 UART: [state] CFI Enabled
2,999,261 UART: [fht] FMC Alias Private Key: 7
3,107,026 UART: [art] Extend RT PCRs Done
3,107,454 UART: [art] Lock RT PCRs Done
3,109,080 UART: [art] Populate DV Done
3,117,125 UART: [fht] FMC Alias Private Key: 7
3,118,091 UART: [art] Derive CDI
3,118,371 UART: [art] Store in in slot 0x4
3,204,078 UART: [art] Derive Key Pair
3,204,438 UART: [art] Store priv key in slot 0x5
3,217,736 UART: [art] Derive Key Pair - Done
3,232,814 UART: [art] Signing Cert with AUTHO
3,233,294 UART: RITY.KEYID = 7
3,248,250 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,015 UART: [art] PUB.X = 5B154288DBA4A8B875B437FF9226C99E73BC0DB7CA3BCE8A954A0BF4230D9881CD9B84A7D8326000EB79572C0585D62F
3,255,759 UART: [art] PUB.Y = 0E29FD9E671384B0CB920C6A4CABD1CAF1BFB0284EED079D02E32136F5947C2473F00D499C935859BB34280D1938342F
3,262,695 UART: [art] SIG.R = 1706946CC55B28A345773C2BFD0AB102E02E2F3E378E5E6068C2948FE3B58485B1AA789D8366AB664A2C3D3DA069C1AD
3,269,462 UART: [art] SIG.S = 2DD88ED9A93D84BDDB6742A0DA10F35BCB7A7C9FA7FD386F07274B8BDED75F2B5D44B9A7D714A7C2EB7FEF8D728249F7
3,293,674 UART: Caliptra RT
3,293,927 UART: [state] CFI Enabled
3,402,985 UART: [rt] RT listening for mailbox commands...
3,403,655 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,805 UART: [rt]cmd =0x41544d4e, len=14344
3,836,935 >>> mbox cmd response data (8 bytes)
3,836,936 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,997 UART: [rt]cmd =0x41545348, len=116
3,888,402 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,981 UART: [state] LifecycleState = Unprovisioned
86,636 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,880 UART: [kat] SHA2-256
882,811 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,926 UART: [kat] ++
887,078 UART: [kat] sha1
891,308 UART: [kat] SHA2-256
893,246 UART: [kat] SHA2-384
896,019 UART: [kat] SHA2-512-ACC
897,920 UART: [kat] ECC-384
903,329 UART: [kat] HMAC-384Kdf
907,877 UART: [kat] LMS
1,476,073 UART: [kat] --
1,477,164 UART: [cold-reset] ++
1,477,536 UART: [fht] Storing FHT @ 0x50003400
1,480,301 UART: [idev] ++
1,480,469 UART: [idev] CDI.KEYID = 6
1,480,829 UART: [idev] SUBJECT.KEYID = 7
1,481,253 UART: [idev] UDS.KEYID = 0
1,481,598 ready_for_fw is high
1,481,598 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,451 UART: [idev] Erasing UDS.KEYID = 0
1,505,929 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,669 UART: [idev] --
1,515,860 UART: [ldev] ++
1,516,028 UART: [ldev] CDI.KEYID = 6
1,516,391 UART: [ldev] SUBJECT.KEYID = 5
1,516,817 UART: [ldev] AUTHORITY.KEYID = 7
1,517,280 UART: [ldev] FE.KEYID = 1
1,522,598 UART: [ldev] Erasing FE.KEYID = 1
1,547,641 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,749 UART: [ldev] --
1,587,026 UART: [fwproc] Waiting for Commands...
1,587,743 UART: [fwproc] Received command 0x46574c44
1,588,534 UART: [fwproc] Received Image of size 114332 bytes
2,886,574 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,178 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,530 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,289 >>> mbox cmd response: success
3,079,479 UART: [afmc] ++
3,079,647 UART: [afmc] CDI.KEYID = 6
3,080,009 UART: [afmc] SUBJECT.KEYID = 7
3,080,434 UART: [afmc] AUTHORITY.KEYID = 5
3,115,615 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,759 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,539 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,267 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,152 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,842 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,763 UART: [afmc] --
3,158,875 UART: [cold-reset] --
3,159,831 UART: [state] Locking Datavault
3,160,864 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,468 UART: [state] Locking ICCM
3,161,958 UART: [exit] Launching FMC @ 0x40000130
3,167,287 UART:
3,167,303 UART: Running Caliptra FMC ...
3,167,711 UART:
3,167,854 UART: [state] CFI Enabled
3,178,265 UART: [fht] FMC Alias Private Key: 7
3,287,138 UART: [art] Extend RT PCRs Done
3,287,566 UART: [art] Lock RT PCRs Done
3,289,040 UART: [art] Populate DV Done
3,297,437 UART: [fht] FMC Alias Private Key: 7
3,298,379 UART: [art] Derive CDI
3,298,659 UART: [art] Store in in slot 0x4
3,383,894 UART: [art] Derive Key Pair
3,384,254 UART: [art] Store priv key in slot 0x5
3,397,156 UART: [art] Derive Key Pair - Done
3,412,020 UART: [art] Signing Cert with AUTHO
3,412,500 UART: RITY.KEYID = 7
3,427,096 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,861 UART: [art] PUB.X = 7D505F7A7D1A6860B4EE0B1BA783CF782D5147077733E8BA8B0C5042E3FCF9E5ADF4329B4103A2405DB14C16C9A40113
3,434,622 UART: [art] PUB.Y = E58FD3C4E8C1A72456D76C04E5321DF92682A75CE77F62D9688228B2B1DAC76DD2DFBB3AD4A7012E56E0D9B3055519B6
3,441,573 UART: [art] SIG.R = 06A1DA24610E3CB9DA3F50F5B471683A0F142E830F534B87FADA857BE4612B93EA8C3C910EED8CE826900EDDB8075ECD
3,448,338 UART: [art] SIG.S = 56DAFC753B43F1B3032C17ECBA6F75C93B6707E2A98A855FE83487B4B18622A297BD1E158231518A2C25CAA6B1DCD258
3,472,081 UART: Caliptra RT
3,472,426 UART: [state] CFI Enabled
3,580,798 UART: [rt] RT listening for mailbox commands...
3,581,468 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,262 UART: [rt]cmd =0x41544d4e, len=14344
4,014,372 >>> mbox cmd response data (8 bytes)
4,014,373 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,420 UART: [rt]cmd =0x41545348, len=116
4,065,557 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,104 ready_for_fw is high
1,363,104 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,297 >>> mbox cmd response: success
2,988,321 UART:
2,988,337 UART: Running Caliptra FMC ...
2,988,745 UART:
2,988,888 UART: [state] CFI Enabled
2,999,409 UART: [fht] FMC Alias Private Key: 7
3,108,092 UART: [art] Extend RT PCRs Done
3,108,520 UART: [art] Lock RT PCRs Done
3,109,976 UART: [art] Populate DV Done
3,118,375 UART: [fht] FMC Alias Private Key: 7
3,119,331 UART: [art] Derive CDI
3,119,611 UART: [art] Store in in slot 0x4
3,205,262 UART: [art] Derive Key Pair
3,205,622 UART: [art] Store priv key in slot 0x5
3,218,946 UART: [art] Derive Key Pair - Done
3,233,753 UART: [art] Signing Cert with AUTHO
3,234,233 UART: RITY.KEYID = 7
3,249,399 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,164 UART: [art] PUB.X = B05CDC39C41822B2B724FED38032A02E79061061AF0B7996B43D8B3990CC27137735A2575853E595337249058562042A
3,256,906 UART: [art] PUB.Y = 715BC3AC64B005669370658C7C55B25C660959AC9328EB5F177A92DCE7CDE646D5BC4D7BF2898846F30CF327D522149F
3,263,849 UART: [art] SIG.R = 2055AE6C6E636986C8F68F1696D5DD4BF57C01585A175998F7563E3A73FCF722CE50E77267D9D44E0668F8C44D66CA4E
3,270,615 UART: [art] SIG.S = E283806FAFEFAA397E064F7F6F091C67FBAEAB1B8E8E60980185592EA48FC2289E442E30EE38B4F531CC090FE08E3C15
3,294,447 UART: Caliptra RT
3,294,792 UART: [state] CFI Enabled
3,403,093 UART: [rt] RT listening for mailbox commands...
3,403,763 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,605 UART: [rt]cmd =0x41544d4e, len=14344
3,836,213 >>> mbox cmd response data (8 bytes)
3,836,214 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,251 UART: [rt]cmd =0x41545348, len=116
3,887,606 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,609 UART: [state] WD Timer not started. Device not locked for debugging
87,932 UART: [kat] SHA2-256
893,582 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,707 UART: [kat] ++
897,859 UART: [kat] sha1
902,229 UART: [kat] SHA2-256
904,169 UART: [kat] SHA2-384
906,856 UART: [kat] SHA2-512-ACC
908,757 UART: [kat] ECC-384
918,342 UART: [kat] HMAC-384Kdf
922,824 UART: [kat] LMS
1,171,152 UART: [kat] --
1,172,219 UART: [cold-reset] ++
1,172,741 UART: [fht] FHT @ 0x50003400
1,175,402 UART: [idev] ++
1,175,570 UART: [idev] CDI.KEYID = 6
1,175,930 UART: [idev] SUBJECT.KEYID = 7
1,176,354 UART: [idev] UDS.KEYID = 0
1,176,699 ready_for_fw is high
1,176,699 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,614 UART: [idev] Erasing UDS.KEYID = 0
1,201,173 UART: [idev] Sha1 KeyId Algorithm
1,209,679 UART: [idev] --
1,210,697 UART: [ldev] ++
1,210,865 UART: [ldev] CDI.KEYID = 6
1,211,228 UART: [ldev] SUBJECT.KEYID = 5
1,211,654 UART: [ldev] AUTHORITY.KEYID = 7
1,212,117 UART: [ldev] FE.KEYID = 1
1,217,473 UART: [ldev] Erasing FE.KEYID = 1
1,243,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,415 UART: [ldev] --
1,282,680 UART: [fwproc] Wait for Commands...
1,283,320 UART: [fwproc] Recv command 0x46574c44
1,284,048 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,049 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,484 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,788 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,565 >>> mbox cmd response: success
2,775,785 UART: [afmc] ++
2,775,953 UART: [afmc] CDI.KEYID = 6
2,776,315 UART: [afmc] SUBJECT.KEYID = 7
2,776,740 UART: [afmc] AUTHORITY.KEYID = 5
2,812,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,562 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,290 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,175 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,894 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,662 UART: [afmc] --
2,855,760 UART: [cold-reset] --
2,856,646 UART: [state] Locking Datavault
2,857,779 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,383 UART: [state] Locking ICCM
2,859,005 UART: [exit] Launching FMC @ 0x40000130
2,864,334 UART:
2,864,350 UART: Running Caliptra FMC ...
2,864,758 UART:
2,864,812 UART: [state] CFI Enabled
2,874,909 UART: [fht] FMC Alias Private Key: 7
2,982,776 UART: [art] Extend RT PCRs Done
2,983,204 UART: [art] Lock RT PCRs Done
2,984,752 UART: [art] Populate DV Done
2,992,955 UART: [fht] FMC Alias Private Key: 7
2,994,051 UART: [art] Derive CDI
2,994,331 UART: [art] Store in in slot 0x4
3,080,142 UART: [art] Derive Key Pair
3,080,502 UART: [art] Store priv key in slot 0x5
3,093,070 UART: [art] Derive Key Pair - Done
3,108,084 UART: [art] Signing Cert with AUTHO
3,108,564 UART: RITY.KEYID = 7
3,123,788 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,553 UART: [art] PUB.X = ABB3F46342881605ED6F62A83C4040F4378D83F2A07ECA5D79BCA7A1B0C7C74572C72C4DDC78F30CA0918ADF0A87541A
3,131,326 UART: [art] PUB.Y = 62F7BCACDEF99D652F7958887B77D1E47BE9B6ECBD6FC10AA1A2B2D941F786A823F98343D2F4569496F88096943D1CB0
3,138,283 UART: [art] SIG.R = 887A8D6E06E59F0D0C627227ED2E02113950E8AB7ABB649861C19CD80C6EDFC719BC362C728C5FD9E5401B3E534A64AC
3,145,048 UART: [art] SIG.S = CE00CA6E07F591A4491554470590338B5ABF7FF84E5D0BB51A8AD44B552FD450D33B44E54629634F01DCA7B375B4068D
3,168,864 UART: Caliptra RT
3,169,117 UART: [state] CFI Enabled
3,276,253 UART: [rt] RT listening for mailbox commands...
3,276,923 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,011 UART: [rt]cmd =0x41544d4e, len=14344
3,709,701 >>> mbox cmd response data (8 bytes)
3,709,702 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,933 UART: [rt]cmd =0x41545348, len=116
3,761,632 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,361 ready_for_fw is high
1,060,361 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,890 >>> mbox cmd response: success
2,685,816 UART:
2,685,832 UART: Running Caliptra FMC ...
2,686,240 UART:
2,686,294 UART: [state] CFI Enabled
2,696,387 UART: [fht] FMC Alias Private Key: 7
2,804,276 UART: [art] Extend RT PCRs Done
2,804,704 UART: [art] Lock RT PCRs Done
2,806,378 UART: [art] Populate DV Done
2,814,585 UART: [fht] FMC Alias Private Key: 7
2,815,559 UART: [art] Derive CDI
2,815,839 UART: [art] Store in in slot 0x4
2,901,650 UART: [art] Derive Key Pair
2,902,010 UART: [art] Store priv key in slot 0x5
2,915,504 UART: [art] Derive Key Pair - Done
2,930,573 UART: [art] Signing Cert with AUTHO
2,931,053 UART: RITY.KEYID = 7
2,946,133 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,898 UART: [art] PUB.X = 81F2888EF8F4BF4D3FEF324ED14FE5F985C1B508C9104EBE6822401ACA225299B7D93F233BEE63803F38332143253281
2,953,665 UART: [art] PUB.Y = C8BC5144C2B9420BF24FB2B82DCDFBF1F015E54A383A0F90A67E2D9CF18F0D18153F6CC4DFE2D4ED5D9736B29FBCB5BC
2,960,634 UART: [art] SIG.R = C5CFF1549D245795EC492BE1216C833E218F9F786788E9F2440FE90A9D1D67DE71BB17C53F1C3E61F4CD2E819EF6C0F4
2,967,408 UART: [art] SIG.S = F3B5BF8EF36FBDE3EC46002A003D2BA1A407736BDCD991E4FFB92D93B03C9285BA4159B5F451EA59C26BDD75CA89DE5A
2,991,050 UART: Caliptra RT
2,991,303 UART: [state] CFI Enabled
3,099,115 UART: [rt] RT listening for mailbox commands...
3,099,785 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,561 UART: [rt]cmd =0x41544d4e, len=14344
3,532,185 >>> mbox cmd response data (8 bytes)
3,532,186 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,159 UART: [rt]cmd =0x41545348, len=116
3,584,390 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
893,641 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,766 UART: [kat] ++
897,918 UART: [kat] sha1
902,276 UART: [kat] SHA2-256
904,216 UART: [kat] SHA2-384
907,063 UART: [kat] SHA2-512-ACC
908,964 UART: [kat] ECC-384
918,661 UART: [kat] HMAC-384Kdf
923,187 UART: [kat] LMS
1,171,515 UART: [kat] --
1,172,106 UART: [cold-reset] ++
1,172,652 UART: [fht] FHT @ 0x50003400
1,175,235 UART: [idev] ++
1,175,403 UART: [idev] CDI.KEYID = 6
1,175,763 UART: [idev] SUBJECT.KEYID = 7
1,176,187 UART: [idev] UDS.KEYID = 0
1,176,532 ready_for_fw is high
1,176,532 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,351 UART: [idev] Erasing UDS.KEYID = 0
1,201,602 UART: [idev] Sha1 KeyId Algorithm
1,209,972 UART: [idev] --
1,211,044 UART: [ldev] ++
1,211,212 UART: [ldev] CDI.KEYID = 6
1,211,575 UART: [ldev] SUBJECT.KEYID = 5
1,212,001 UART: [ldev] AUTHORITY.KEYID = 7
1,212,464 UART: [ldev] FE.KEYID = 1
1,217,962 UART: [ldev] Erasing FE.KEYID = 1
1,244,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,024 UART: [ldev] --
1,283,393 UART: [fwproc] Wait for Commands...
1,284,115 UART: [fwproc] Recv command 0x46574c44
1,284,843 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,647 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,951 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,788 >>> mbox cmd response: success
2,776,022 UART: [afmc] ++
2,776,190 UART: [afmc] CDI.KEYID = 6
2,776,552 UART: [afmc] SUBJECT.KEYID = 7
2,776,977 UART: [afmc] AUTHORITY.KEYID = 5
2,812,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,773 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,521 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,249 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,134 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,853 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,673 UART: [afmc] --
2,855,651 UART: [cold-reset] --
2,856,579 UART: [state] Locking Datavault
2,857,546 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,150 UART: [state] Locking ICCM
2,858,804 UART: [exit] Launching FMC @ 0x40000130
2,864,133 UART:
2,864,149 UART: Running Caliptra FMC ...
2,864,557 UART:
2,864,700 UART: [state] CFI Enabled
2,875,477 UART: [fht] FMC Alias Private Key: 7
2,983,676 UART: [art] Extend RT PCRs Done
2,984,104 UART: [art] Lock RT PCRs Done
2,985,714 UART: [art] Populate DV Done
2,994,209 UART: [fht] FMC Alias Private Key: 7
2,995,215 UART: [art] Derive CDI
2,995,495 UART: [art] Store in in slot 0x4
3,080,978 UART: [art] Derive Key Pair
3,081,338 UART: [art] Store priv key in slot 0x5
3,094,766 UART: [art] Derive Key Pair - Done
3,109,909 UART: [art] Signing Cert with AUTHO
3,110,389 UART: RITY.KEYID = 7
3,125,475 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,240 UART: [art] PUB.X = B1CD7E99274EA275A8214C1B432FDC3714FA65501438ACE9D380143BEEE18FE63C4EE4B540C0714215FA25CE8FFD7DE8
3,133,024 UART: [art] PUB.Y = D4BB498F70F8FDDE2AAA13B77BFD85F6376C975745BC3F660DF689629439C02883222D52C2E2D26B4368A8D739C8CFE3
3,139,979 UART: [art] SIG.R = 0E264A46F8D63D63254C40C90B3B0AEC12DE225F790B400E8E5222ABDF57F8B3915178565D98CFAAC2F2D6590AEEBD30
3,146,743 UART: [art] SIG.S = 6EFEB1C5E7D041BDF0EFB4AEC263081819DC8C2E2DC285B7E065840743B2E88A5677F13A104AADF7CEECE54D8A60869A
3,170,464 UART: Caliptra RT
3,170,809 UART: [state] CFI Enabled
3,278,106 UART: [rt] RT listening for mailbox commands...
3,278,776 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,704 UART: [rt]cmd =0x41544d4e, len=14344
3,711,258 >>> mbox cmd response data (8 bytes)
3,711,259 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,182 UART: [rt]cmd =0x41545348, len=116
3,762,875 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,258 ready_for_fw is high
1,060,258 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,701 >>> mbox cmd response: success
2,687,373 UART:
2,687,389 UART: Running Caliptra FMC ...
2,687,797 UART:
2,687,940 UART: [state] CFI Enabled
2,698,489 UART: [fht] FMC Alias Private Key: 7
2,806,188 UART: [art] Extend RT PCRs Done
2,806,616 UART: [art] Lock RT PCRs Done
2,808,206 UART: [art] Populate DV Done
2,816,423 UART: [fht] FMC Alias Private Key: 7
2,817,567 UART: [art] Derive CDI
2,817,847 UART: [art] Store in in slot 0x4
2,904,048 UART: [art] Derive Key Pair
2,904,408 UART: [art] Store priv key in slot 0x5
2,917,548 UART: [art] Derive Key Pair - Done
2,932,058 UART: [art] Signing Cert with AUTHO
2,932,538 UART: RITY.KEYID = 7
2,947,954 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,719 UART: [art] PUB.X = AA2C3FA3494A9DD9FF24AAD1890991F6A910D7134B678D5D720A17C8D537B05D0CF39F4C33FD514F9E115BD8CA809F03
2,955,489 UART: [art] PUB.Y = BD2208E9574E821576E884DD35C36817BF7302838715AD223A7A08041CDB879AAC1CBA572B62E9F5902F991542BD9D02
2,962,422 UART: [art] SIG.R = 1801DE9EBA732A35D56DD93F66D07C0EF693326381A208A4BFF8FB52254299A189423FA1CE5D8200FF5B8C4DDDA3E02F
2,969,173 UART: [art] SIG.S = 479AA0434CBE464CAF85BF9C3932DC4A0BA1187BA9463B0A7FFEC0881BBCD3A612F87A27E989D06B8FC85DD9262A7C9F
2,993,666 UART: Caliptra RT
2,994,011 UART: [state] CFI Enabled
3,101,848 UART: [rt] RT listening for mailbox commands...
3,102,518 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,726 UART: [rt]cmd =0x41544d4e, len=14344
3,535,848 >>> mbox cmd response data (8 bytes)
3,535,849 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,896 UART: [rt]cmd =0x41545348, len=116
3,587,887 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,605 UART: [state] WD Timer not started. Device not locked for debugging
87,846 UART: [kat] SHA2-256
891,396 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,525 UART: [kat] ++
895,677 UART: [kat] sha1
900,119 UART: [kat] SHA2-256
902,059 UART: [kat] SHA2-384
904,756 UART: [kat] SHA2-512-ACC
906,657 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
921,230 UART: [kat] LMS
1,169,542 UART: [kat] --
1,170,165 UART: [cold-reset] ++
1,170,597 UART: [fht] FHT @ 0x50003400
1,173,273 UART: [idev] ++
1,173,441 UART: [idev] CDI.KEYID = 6
1,173,802 UART: [idev] SUBJECT.KEYID = 7
1,174,227 UART: [idev] UDS.KEYID = 0
1,174,573 ready_for_fw is high
1,174,573 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,981 UART: [idev] Erasing UDS.KEYID = 0
1,198,621 UART: [idev] Sha1 KeyId Algorithm
1,207,631 UART: [idev] --
1,208,782 UART: [ldev] ++
1,208,950 UART: [ldev] CDI.KEYID = 6
1,209,314 UART: [ldev] SUBJECT.KEYID = 5
1,209,741 UART: [ldev] AUTHORITY.KEYID = 7
1,210,204 UART: [ldev] FE.KEYID = 1
1,215,072 UART: [ldev] Erasing FE.KEYID = 1
1,240,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,720 UART: [ldev] --
1,279,994 UART: [fwproc] Wait for Commands...
1,280,759 UART: [fwproc] Recv command 0x46574c44
1,281,492 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,096 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,405 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,329 >>> mbox cmd response: success
2,773,442 UART: [afmc] ++
2,773,610 UART: [afmc] CDI.KEYID = 6
2,773,973 UART: [afmc] SUBJECT.KEYID = 7
2,774,399 UART: [afmc] AUTHORITY.KEYID = 5
2,810,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,369 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,098 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,981 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,700 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,357 UART: [afmc] --
2,853,393 UART: [cold-reset] --
2,854,199 UART: [state] Locking Datavault
2,855,372 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,976 UART: [state] Locking ICCM
2,856,528 UART: [exit] Launching FMC @ 0x40000130
2,861,857 UART:
2,861,873 UART: Running Caliptra FMC ...
2,862,281 UART:
2,862,335 UART: [state] CFI Enabled
2,872,750 UART: [fht] FMC Alias Private Key: 7
2,980,429 UART: [art] Extend RT PCRs Done
2,980,857 UART: [art] Lock RT PCRs Done
2,982,389 UART: [art] Populate DV Done
2,990,506 UART: [fht] FMC Alias Private Key: 7
2,991,624 UART: [art] Derive CDI
2,991,904 UART: [art] Store in in slot 0x4
3,077,461 UART: [art] Derive Key Pair
3,077,821 UART: [art] Store priv key in slot 0x5
3,091,295 UART: [art] Derive Key Pair - Done
3,106,097 UART: [art] Signing Cert with AUTHO
3,106,577 UART: RITY.KEYID = 7
3,121,593 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,358 UART: [art] PUB.X = EB642393EA119F37411B37E5BA6044419CFF80E6679D592498926D14FA708E1879CF1FA6E9E8701A4A51305D894CA4CD
3,129,128 UART: [art] PUB.Y = 63BB2BA3885F561B8658DD26684F332B0277F0607EB7BA5CBA5ED95A41EDF17DE0E6D50B839F13676D7DB52C5D634A4E
3,136,084 UART: [art] SIG.R = EA4EA78BE2352CC10E4622382F5E3B1A4E330F43C47D1FE71E6654A53D543F4A34947D61805632A6F12FD7D01FE59687
3,142,850 UART: [art] SIG.S = 3BC205A93B0720684CC1E928E41C442CC7A6020649125A975116B3C4E0CAFD55F8D82D4AAFD06A0E4F4C5BDFDDDF5A58
3,166,438 UART: Caliptra RT
3,166,691 UART: [state] CFI Enabled
3,274,996 UART: [rt] RT listening for mailbox commands...
3,275,666 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,616 UART: [rt]cmd =0x41544d4e, len=14344
3,708,030 >>> mbox cmd response data (8 bytes)
3,708,031 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,120 UART: [rt]cmd =0x41545348, len=116
3,760,489 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,062 ready_for_fw is high
1,055,062 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,381 >>> mbox cmd response: success
2,682,577 UART:
2,682,593 UART: Running Caliptra FMC ...
2,683,001 UART:
2,683,055 UART: [state] CFI Enabled
2,693,974 UART: [fht] FMC Alias Private Key: 7
2,802,203 UART: [art] Extend RT PCRs Done
2,802,631 UART: [art] Lock RT PCRs Done
2,804,273 UART: [art] Populate DV Done
2,812,536 UART: [fht] FMC Alias Private Key: 7
2,813,656 UART: [art] Derive CDI
2,813,936 UART: [art] Store in in slot 0x4
2,899,807 UART: [art] Derive Key Pair
2,900,167 UART: [art] Store priv key in slot 0x5
2,913,449 UART: [art] Derive Key Pair - Done
2,928,047 UART: [art] Signing Cert with AUTHO
2,928,527 UART: RITY.KEYID = 7
2,943,877 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,642 UART: [art] PUB.X = DC01F40523F53C207A39E18CEE7EC3D669B74D9AC85819C89685916B80912903D6BB8FB6AAC9C9F212925E30BE449121
2,951,405 UART: [art] PUB.Y = 106A12C2377064C54F15E18EBB6385F4C300EB7CD761DE58ECA17EF912E09F7F3473874C148628DE0CA7C3706BA45378
2,958,332 UART: [art] SIG.R = 79D02720C9756C33945B16868633DBD4ED32A3262668F7E8ED419D8B4B82A1FF25598E7083822046DEE1736AA76AF03A
2,965,098 UART: [art] SIG.S = 58517F6AAA07B8251BB4D6CDDC0CA3C0667F98631E88909225EFD4F5F4EFDA1687815DF0E78E84E7944D6E1B72D69CBA
2,988,743 UART: Caliptra RT
2,988,996 UART: [state] CFI Enabled
3,096,993 UART: [rt] RT listening for mailbox commands...
3,097,663 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,739 UART: [rt]cmd =0x41544d4e, len=14344
3,530,707 >>> mbox cmd response data (8 bytes)
3,530,708 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,893 UART: [rt]cmd =0x41545348, len=116
3,582,856 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
86,950 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
891,721 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,850 UART: [kat] ++
896,002 UART: [kat] sha1
900,196 UART: [kat] SHA2-256
902,136 UART: [kat] SHA2-384
904,989 UART: [kat] SHA2-512-ACC
906,890 UART: [kat] ECC-384
916,729 UART: [kat] HMAC-384Kdf
921,529 UART: [kat] LMS
1,169,841 UART: [kat] --
1,170,548 UART: [cold-reset] ++
1,170,880 UART: [fht] FHT @ 0x50003400
1,173,690 UART: [idev] ++
1,173,858 UART: [idev] CDI.KEYID = 6
1,174,219 UART: [idev] SUBJECT.KEYID = 7
1,174,644 UART: [idev] UDS.KEYID = 0
1,174,990 ready_for_fw is high
1,174,990 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,532 UART: [idev] Erasing UDS.KEYID = 0
1,199,590 UART: [idev] Sha1 KeyId Algorithm
1,208,328 UART: [idev] --
1,209,391 UART: [ldev] ++
1,209,559 UART: [ldev] CDI.KEYID = 6
1,209,923 UART: [ldev] SUBJECT.KEYID = 5
1,210,350 UART: [ldev] AUTHORITY.KEYID = 7
1,210,813 UART: [ldev] FE.KEYID = 1
1,216,067 UART: [ldev] Erasing FE.KEYID = 1
1,242,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,261 UART: [ldev] --
1,281,677 UART: [fwproc] Wait for Commands...
1,282,284 UART: [fwproc] Recv command 0x46574c44
1,283,017 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,023 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,332 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,178 >>> mbox cmd response: success
2,775,205 UART: [afmc] ++
2,775,373 UART: [afmc] CDI.KEYID = 6
2,775,736 UART: [afmc] SUBJECT.KEYID = 7
2,776,162 UART: [afmc] AUTHORITY.KEYID = 5
2,811,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,081 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,832 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,561 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,444 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,163 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,216 UART: [afmc] --
2,855,222 UART: [cold-reset] --
2,856,124 UART: [state] Locking Datavault
2,857,437 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,041 UART: [state] Locking ICCM
2,858,617 UART: [exit] Launching FMC @ 0x40000130
2,863,946 UART:
2,863,962 UART: Running Caliptra FMC ...
2,864,370 UART:
2,864,513 UART: [state] CFI Enabled
2,875,198 UART: [fht] FMC Alias Private Key: 7
2,983,281 UART: [art] Extend RT PCRs Done
2,983,709 UART: [art] Lock RT PCRs Done
2,985,129 UART: [art] Populate DV Done
2,993,596 UART: [fht] FMC Alias Private Key: 7
2,994,536 UART: [art] Derive CDI
2,994,816 UART: [art] Store in in slot 0x4
3,080,519 UART: [art] Derive Key Pair
3,080,879 UART: [art] Store priv key in slot 0x5
3,093,949 UART: [art] Derive Key Pair - Done
3,108,686 UART: [art] Signing Cert with AUTHO
3,109,166 UART: RITY.KEYID = 7
3,124,590 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,355 UART: [art] PUB.X = 3F2C296F4147285300D8CC16C27254B5F6054B66BE9A18DBA538145DBCB44E5460D4E3670F19853C4C95ABF737A036E6
3,132,097 UART: [art] PUB.Y = 8CDB452AC22040576F8615674F4332C0A0B57218794CAA80CC36D104F8C073A9602874855EB2F4B38F4ABF466C7C85C2
3,139,042 UART: [art] SIG.R = B7168905680DF831E9B910D29E712BCCAACACCDBF15086BDCA57093B2CEC3ABE7DC48FBB9D6CCEAAB252E52F0D932044
3,145,828 UART: [art] SIG.S = 63B6F565EA8C1B91D779FFCB30CBD270AC6ABAB798F43B097AC560733F5222B981092531C579DF38C238CFD2776CB4BF
3,169,195 UART: Caliptra RT
3,169,540 UART: [state] CFI Enabled
3,277,271 UART: [rt] RT listening for mailbox commands...
3,277,941 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,843 UART: [rt]cmd =0x41544d4e, len=14344
3,710,315 >>> mbox cmd response data (8 bytes)
3,710,316 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,187 UART: [rt]cmd =0x41545348, len=116
3,762,170 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,473 ready_for_fw is high
1,056,473 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,404 >>> mbox cmd response: success
2,686,196 UART:
2,686,212 UART: Running Caliptra FMC ...
2,686,620 UART:
2,686,763 UART: [state] CFI Enabled
2,697,408 UART: [fht] FMC Alias Private Key: 7
2,805,291 UART: [art] Extend RT PCRs Done
2,805,719 UART: [art] Lock RT PCRs Done
2,807,361 UART: [art] Populate DV Done
2,815,612 UART: [fht] FMC Alias Private Key: 7
2,816,762 UART: [art] Derive CDI
2,817,042 UART: [art] Store in in slot 0x4
2,902,645 UART: [art] Derive Key Pair
2,903,005 UART: [art] Store priv key in slot 0x5
2,916,639 UART: [art] Derive Key Pair - Done
2,931,549 UART: [art] Signing Cert with AUTHO
2,932,029 UART: RITY.KEYID = 7
2,947,085 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,850 UART: [art] PUB.X = 5AF1EF48E686DCD3E16F810284DB9B4140C3878F2723457945F7B67A73744A3BCE378C06E2A6CB22994E892C4065D309
2,954,609 UART: [art] PUB.Y = 5D7E0E82DCD7B60B8815FD02CB1A34AAD73D0E04C7D6DA81144F88127A773269C493E13B8E4B7A28B9601B9AEBFBCC08
2,961,557 UART: [art] SIG.R = DE63E474FFCB770415B59BCFD53DF3CDAC22B9701AC79193F61BBF58080C0A416C1ABDD90BF106B84EB5F8AC496BD7B2
2,968,333 UART: [art] SIG.S = ECA6375635D03A26AAE4ABC5CD8E93A639F47CD1EF4AB717A9BDF263ABA3FC1254B816612C6D6F82B226CCBD03584F1E
2,992,193 UART: Caliptra RT
2,992,538 UART: [state] CFI Enabled
3,101,402 UART: [rt] RT listening for mailbox commands...
3,102,072 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,890 UART: [rt]cmd =0x41544d4e, len=14344
3,534,780 >>> mbox cmd response data (8 bytes)
3,534,781 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,988 UART: [rt]cmd =0x41545348, len=116
3,587,467 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,674 UART: [state] LifecycleState = Unprovisioned
85,329 UART: [state] DebugLocked = No
85,883 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,557 UART: [kat] SHA2-256
881,488 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,603 UART: [kat] ++
885,755 UART: [kat] sha1
889,993 UART: [kat] SHA2-256
891,931 UART: [kat] SHA2-384
894,578 UART: [kat] SHA2-512-ACC
896,479 UART: [kat] ECC-384
902,190 UART: [kat] HMAC-384Kdf
906,690 UART: [kat] LMS
1,474,886 UART: [kat] --
1,475,559 UART: [cold-reset] ++
1,476,107 UART: [fht] Storing FHT @ 0x50003400
1,478,824 UART: [idev] ++
1,478,992 UART: [idev] CDI.KEYID = 6
1,479,352 UART: [idev] SUBJECT.KEYID = 7
1,479,776 UART: [idev] UDS.KEYID = 0
1,480,121 ready_for_fw is high
1,480,121 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,487,506 UART: [idev] Erasing UDS.KEYID = 0
1,504,090 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,660 UART: [idev] --
1,513,771 UART: [ldev] ++
1,513,939 UART: [ldev] CDI.KEYID = 6
1,514,302 UART: [ldev] SUBJECT.KEYID = 5
1,514,728 UART: [ldev] AUTHORITY.KEYID = 7
1,515,191 UART: [ldev] FE.KEYID = 1
1,520,363 UART: [ldev] Erasing FE.KEYID = 1
1,545,710 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,674 UART: [ldev] --
1,585,187 UART: [fwproc] Waiting for Commands...
1,585,884 UART: [fwproc] Received command 0x46574c44
1,586,675 UART: [fwproc] Received Image of size 31656 bytes
1,937,550 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,964,676 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,994,028 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,005,729 >>> mbox cmd response: success
2,006,821 UART: [afmc] ++
2,006,989 UART: [afmc] CDI.KEYID = 6
2,007,351 UART: [afmc] SUBJECT.KEYID = 7
2,007,776 UART: [afmc] AUTHORITY.KEYID = 5
2,042,359 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,058,699 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,059,479 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,065,207 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,071,092 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,076,782 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,084,673 UART: [afmc] --
2,085,689 UART: [cold-reset] --
2,086,819 UART: [state] Locking Datavault
2,088,144 UART: [state] Locking PCR0, PCR1 and PCR31
2,088,748 UART: [state] Locking ICCM
2,089,234 UART: [exit] Launching FMC @ 0x40000130
2,094,563 UART:
2,094,579 UART: Running Caliptra FMC ...
2,094,987 UART:
2,095,041 UART: [state] CFI Enabled
2,105,436 UART: [fht] FMC Alias Private Key: 7
2,213,727 UART: [art] Extend RT PCRs Done
2,214,155 UART: [art] Lock RT PCRs Done
2,215,561 UART: [art] Populate DV Done
2,224,054 UART: [fht] FMC Alias Private Key: 7
2,225,234 UART: [art] Derive CDI
2,225,514 UART: [art] Store in in slot 0x4
2,311,345 UART: [art] Derive Key Pair
2,311,705 UART: [art] Store priv key in slot 0x5
2,325,213 UART: [art] Derive Key Pair - Done
2,340,016 UART: [art] Signing Cert with AUTHO
2,340,496 UART: RITY.KEYID = 7
2,355,698 UART: [art] Erasing AUTHORITY.KEYID = 7
2,356,463 UART: [art] PUB.X = 1CCF477CD657DFCD3002225D05FAEBE9B07CE7E66F4E565BBD0E0200DF035D9F89E40E4E46A961F1670EEBFD8EC10AC1
2,363,211 UART: [art] PUB.Y = 82DE6AAFBA9B13AB8ACF99E73ED05C50334025356C85FB656CDDC5281C728A2C478BE99C24139B43804CBA6CD494A522
2,370,173 UART: [art] SIG.R = 64B05335C771317B8B2D5F6B71B6DC3B827EB7D119871882AB7FFE435EF6DCEF00989B7C8DC5C8B22AF29E940E7B5467
2,376,928 UART: [art] SIG.S = 41A11873E37BEAB4BEC2D66DDEE131BD07A35DDC6A22E1F70C97CBEE493EFF51774EB32E371EA39F7F7A9DD16899CF8D
2,400,368 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,497 ready_for_fw is high
1,362,497 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,856,203 >>> mbox cmd response: success
1,917,143 UART:
1,917,159 UART: Running Caliptra FMC ...
1,917,567 UART:
1,917,621 UART: [state] CFI Enabled
1,927,852 UART: [fht] FMC Alias Private Key: 7
2,036,493 UART: [art] Extend RT PCRs Done
2,036,921 UART: [art] Lock RT PCRs Done
2,038,821 UART: [art] Populate DV Done
2,046,968 UART: [fht] FMC Alias Private Key: 7
2,048,052 UART: [art] Derive CDI
2,048,332 UART: [art] Store in in slot 0x4
2,133,749 UART: [art] Derive Key Pair
2,134,109 UART: [art] Store priv key in slot 0x5
2,146,807 UART: [art] Derive Key Pair - Done
2,161,489 UART: [art] Signing Cert with AUTHO
2,161,969 UART: RITY.KEYID = 7
2,177,579 UART: [art] Erasing AUTHORITY.KEYID = 7
2,178,344 UART: [art] PUB.X = AC819572E68B1E351969F934625A69E68A270068BE80791947585DBF7176188F68EDD91EA22885D52CEE4C5078C822DC
2,185,086 UART: [art] PUB.Y = 65FAB1E491E29BA3A2D6B016EB6C02D95BD17D939BB6B9534DD6A98130C8951B63185B11B8EBB0AA62106AEB2D4BD544
2,192,047 UART: [art] SIG.R = 739C8E7B48D1C40B533E74B8EE5CCDFD27596369382AF88DB7855734E79821A6473974193AC758BDB23A5337B7730932
2,198,805 UART: [art] SIG.S = C6864DBCF7D06A0421B44627C55AE0CEEB55254150A87E7F55CD8D278875D4C2F47834F37980F97BBA9F04977672347C
2,222,557 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,634 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,358 UART: [kat] SHA2-256
882,289 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,404 UART: [kat] ++
886,556 UART: [kat] sha1
890,938 UART: [kat] SHA2-256
892,876 UART: [kat] SHA2-384
895,577 UART: [kat] SHA2-512-ACC
897,478 UART: [kat] ECC-384
903,231 UART: [kat] HMAC-384Kdf
907,785 UART: [kat] LMS
1,475,981 UART: [kat] --
1,476,946 UART: [cold-reset] ++
1,477,352 UART: [fht] Storing FHT @ 0x50003400
1,480,103 UART: [idev] ++
1,480,271 UART: [idev] CDI.KEYID = 6
1,480,631 UART: [idev] SUBJECT.KEYID = 7
1,481,055 UART: [idev] UDS.KEYID = 0
1,481,400 ready_for_fw is high
1,481,400 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,489,007 UART: [idev] Erasing UDS.KEYID = 0
1,505,633 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,379 UART: [idev] --
1,515,430 UART: [ldev] ++
1,515,598 UART: [ldev] CDI.KEYID = 6
1,515,961 UART: [ldev] SUBJECT.KEYID = 5
1,516,387 UART: [ldev] AUTHORITY.KEYID = 7
1,516,850 UART: [ldev] FE.KEYID = 1
1,522,364 UART: [ldev] Erasing FE.KEYID = 1
1,547,887 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,545 UART: [ldev] --
1,586,950 UART: [fwproc] Waiting for Commands...
1,587,785 UART: [fwproc] Received command 0x46574c44
1,588,576 UART: [fwproc] Received Image of size 31656 bytes
1,940,161 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,967,263 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,996,615 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,008,328 >>> mbox cmd response: success
2,009,550 UART: [afmc] ++
2,009,718 UART: [afmc] CDI.KEYID = 6
2,010,080 UART: [afmc] SUBJECT.KEYID = 7
2,010,505 UART: [afmc] AUTHORITY.KEYID = 5
2,044,852 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,061,284 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,062,064 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,067,792 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,073,677 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,079,367 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,087,492 UART: [afmc] --
2,088,472 UART: [cold-reset] --
2,089,412 UART: [state] Locking Datavault
2,090,597 UART: [state] Locking PCR0, PCR1 and PCR31
2,091,201 UART: [state] Locking ICCM
2,091,727 UART: [exit] Launching FMC @ 0x40000130
2,097,056 UART:
2,097,072 UART: Running Caliptra FMC ...
2,097,480 UART:
2,097,623 UART: [state] CFI Enabled
2,108,258 UART: [fht] FMC Alias Private Key: 7
2,215,721 UART: [art] Extend RT PCRs Done
2,216,149 UART: [art] Lock RT PCRs Done
2,217,823 UART: [art] Populate DV Done
2,225,904 UART: [fht] FMC Alias Private Key: 7
2,227,042 UART: [art] Derive CDI
2,227,322 UART: [art] Store in in slot 0x4
2,313,025 UART: [art] Derive Key Pair
2,313,385 UART: [art] Store priv key in slot 0x5
2,327,021 UART: [art] Derive Key Pair - Done
2,341,943 UART: [art] Signing Cert with AUTHO
2,342,423 UART: RITY.KEYID = 7
2,357,325 UART: [art] Erasing AUTHORITY.KEYID = 7
2,358,090 UART: [art] PUB.X = 894387187981F7BB75F97FEEAA1E4055516D4CBD7354F9973D74C510728C71EB87CC34736A056478BDD9B0F925BF4C60
2,364,857 UART: [art] PUB.Y = B7B33838E94C4BCD921A2F90F8A552FAB86681F5AFCBB5BCA545A4B8DF4255A149E6472504C28E3A5C0B2923325C0185
2,371,806 UART: [art] SIG.R = F0289C395F4236B0B002E8651EF55F762E678D31A506A9BF7FEAD49E5775914405E7237EF8E738D8089CA9792FE1CE5A
2,378,566 UART: [art] SIG.S = D3D57C71C7D9A921760113E6430D0484CC4203A42B7F1CAFAD18A58CF003C5E75C80DBB2961BE123A6DF5C6E32151335
2,402,471 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,178 ready_for_fw is high
1,363,178 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,859,004 >>> mbox cmd response: success
1,921,528 UART:
1,921,544 UART: Running Caliptra FMC ...
1,921,952 UART:
1,922,095 UART: [state] CFI Enabled
1,932,678 UART: [fht] FMC Alias Private Key: 7
2,040,529 UART: [art] Extend RT PCRs Done
2,040,957 UART: [art] Lock RT PCRs Done
2,042,663 UART: [art] Populate DV Done
2,051,020 UART: [fht] FMC Alias Private Key: 7
2,052,026 UART: [art] Derive CDI
2,052,306 UART: [art] Store in in slot 0x4
2,138,309 UART: [art] Derive Key Pair
2,138,669 UART: [art] Store priv key in slot 0x5
2,152,173 UART: [art] Derive Key Pair - Done
2,166,994 UART: [art] Signing Cert with AUTHO
2,167,474 UART: RITY.KEYID = 7
2,182,338 UART: [art] Erasing AUTHORITY.KEYID = 7
2,183,103 UART: [art] PUB.X = D7253D06E2C03D100C0B6BDFAC973348BDB8D8518D23282ED79845DB8176996F11583AFF0A8F3A6ECC98B245744473F2
2,189,865 UART: [art] PUB.Y = 8A05335444A45490B03191C099D2666011C289BB623D04BAF6EC7461D07AD452727F8FEC885BEE5E881D87569ACF5979
2,196,805 UART: [art] SIG.R = 4101A673FAAAFD65838DCD05D0B70B4F03F65B58B5CE665F970BC5130945E84D79AB9ADD2667992437FB89DFE1A536B6
2,203,567 UART: [art] SIG.S = FC7705AEC1DA5261B42F495CF2663ED19C9E9FB50232F1CE597B637B9DB5D8A8BC6B46C8BF244566DDB103B20311A2C2
2,227,223 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,550 UART: [kat] SHA2-256
893,200 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,325 UART: [kat] ++
897,477 UART: [kat] sha1
901,751 UART: [kat] SHA2-256
903,691 UART: [kat] SHA2-384
906,536 UART: [kat] SHA2-512-ACC
908,437 UART: [kat] ECC-384
918,490 UART: [kat] HMAC-384Kdf
922,914 UART: [kat] LMS
1,171,242 UART: [kat] --
1,171,885 UART: [cold-reset] ++
1,172,227 UART: [fht] FHT @ 0x50003400
1,174,904 UART: [idev] ++
1,175,072 UART: [idev] CDI.KEYID = 6
1,175,432 UART: [idev] SUBJECT.KEYID = 7
1,175,856 UART: [idev] UDS.KEYID = 0
1,176,201 ready_for_fw is high
1,176,201 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,420 UART: [idev] Erasing UDS.KEYID = 0
1,201,395 UART: [idev] Sha1 KeyId Algorithm
1,209,731 UART: [idev] --
1,210,755 UART: [ldev] ++
1,210,923 UART: [ldev] CDI.KEYID = 6
1,211,286 UART: [ldev] SUBJECT.KEYID = 5
1,211,712 UART: [ldev] AUTHORITY.KEYID = 7
1,212,175 UART: [ldev] FE.KEYID = 1
1,217,101 UART: [ldev] Erasing FE.KEYID = 1
1,243,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,033 UART: [ldev] --
1,282,460 UART: [fwproc] Wait for Commands...
1,283,222 UART: [fwproc] Recv command 0x46574c44
1,283,950 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,574 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,697 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,001 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,702,856 >>> mbox cmd response: success
1,703,914 UART: [afmc] ++
1,704,082 UART: [afmc] CDI.KEYID = 6
1,704,444 UART: [afmc] SUBJECT.KEYID = 7
1,704,869 UART: [afmc] AUTHORITY.KEYID = 5
1,739,996 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,756,981 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,709 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,768,594 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,313 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,267 UART: [afmc] --
1,783,211 UART: [cold-reset] --
1,783,983 UART: [state] Locking Datavault
1,785,210 UART: [state] Locking PCR0, PCR1 and PCR31
1,785,814 UART: [state] Locking ICCM
1,786,244 UART: [exit] Launching FMC @ 0x40000130
1,791,573 UART:
1,791,589 UART: Running Caliptra FMC ...
1,791,997 UART:
1,792,051 UART: [state] CFI Enabled
1,802,998 UART: [fht] FMC Alias Private Key: 7
1,911,293 UART: [art] Extend RT PCRs Done
1,911,721 UART: [art] Lock RT PCRs Done
1,913,187 UART: [art] Populate DV Done
1,921,252 UART: [fht] FMC Alias Private Key: 7
1,922,208 UART: [art] Derive CDI
1,922,488 UART: [art] Store in in slot 0x4
2,008,247 UART: [art] Derive Key Pair
2,008,607 UART: [art] Store priv key in slot 0x5
2,022,481 UART: [art] Derive Key Pair - Done
2,037,353 UART: [art] Signing Cert with AUTHO
2,037,833 UART: RITY.KEYID = 7
2,053,405 UART: [art] Erasing AUTHORITY.KEYID = 7
2,054,170 UART: [art] PUB.X = 5080F5F946B78002067A0DC28270AC7E8356B44B50811F91818043C8FA53442A9FE4257C9E09B1D0CF31ADCFDCC2D5F5
2,060,932 UART: [art] PUB.Y = 0CAE0EAEC78E3C10064D5243CE79573E2EA6AC4A314D58A3297581920F0E04889C6CBC0F704517E69799BF1DC413FD31
2,067,867 UART: [art] SIG.R = 21B2A88556DF2058DCA273BE3D731D26FDE077D9DBDFD5ACE2188F494C233883B0E6DBB8768F3636F2AC18922046CD81
2,074,647 UART: [art] SIG.S = 47307306AF090A3923FACB7082AAAE4A1754D7E868D3A69BFB0AD917BAEEC474E6F81198B76D034DBDEE49E1B5A6F727
2,099,048 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,365 ready_for_fw is high
1,060,365 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,554,869 >>> mbox cmd response: success
1,616,299 UART:
1,616,315 UART: Running Caliptra FMC ...
1,616,723 UART:
1,616,777 UART: [state] CFI Enabled
1,627,098 UART: [fht] FMC Alias Private Key: 7
1,734,937 UART: [art] Extend RT PCRs Done
1,735,365 UART: [art] Lock RT PCRs Done
1,736,855 UART: [art] Populate DV Done
1,745,026 UART: [fht] FMC Alias Private Key: 7
1,746,064 UART: [art] Derive CDI
1,746,344 UART: [art] Store in in slot 0x4
1,831,777 UART: [art] Derive Key Pair
1,832,137 UART: [art] Store priv key in slot 0x5
1,844,835 UART: [art] Derive Key Pair - Done
1,859,758 UART: [art] Signing Cert with AUTHO
1,860,238 UART: RITY.KEYID = 7
1,874,994 UART: [art] Erasing AUTHORITY.KEYID = 7
1,875,759 UART: [art] PUB.X = 19C9AFECE3D9B74F6DA9E19211E212489CB9CE59CBE23191A95A28650DF8FB809F3EF96A45D7A9D8DF987BF3D7E30F5D
1,882,543 UART: [art] PUB.Y = C1863CE455F9797CFE8503C127333399E4EC4E7AD77004222562E3CD0BF370935FAAFED5AE3E1A9130399BA41C485DA9
1,889,490 UART: [art] SIG.R = F45A5684A7965F57C412A1EADFA78A11A6BCA259D434E9340A5452B43724C8007A5BB8D7264290473BB65E1FCF5F103F
1,896,239 UART: [art] SIG.S = 86D2A0061BD8F85529C4B1505065D6631779BFD32E4516205AF19FDCAF6E1DB2F051A8AD5A2572D1920346A75BA2DEF5
1,919,925 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,215 UART: [state] LifecycleState = Unprovisioned
85,870 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
893,427 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,552 UART: [kat] ++
897,704 UART: [kat] sha1
901,918 UART: [kat] SHA2-256
903,858 UART: [kat] SHA2-384
906,599 UART: [kat] SHA2-512-ACC
908,500 UART: [kat] ECC-384
918,413 UART: [kat] HMAC-384Kdf
923,213 UART: [kat] LMS
1,171,541 UART: [kat] --
1,172,364 UART: [cold-reset] ++
1,172,816 UART: [fht] FHT @ 0x50003400
1,175,367 UART: [idev] ++
1,175,535 UART: [idev] CDI.KEYID = 6
1,175,895 UART: [idev] SUBJECT.KEYID = 7
1,176,319 UART: [idev] UDS.KEYID = 0
1,176,664 ready_for_fw is high
1,176,664 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,503 UART: [idev] Erasing UDS.KEYID = 0
1,201,426 UART: [idev] Sha1 KeyId Algorithm
1,209,872 UART: [idev] --
1,210,914 UART: [ldev] ++
1,211,082 UART: [ldev] CDI.KEYID = 6
1,211,445 UART: [ldev] SUBJECT.KEYID = 5
1,211,871 UART: [ldev] AUTHORITY.KEYID = 7
1,212,334 UART: [ldev] FE.KEYID = 1
1,217,554 UART: [ldev] Erasing FE.KEYID = 1
1,244,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,028 UART: [ldev] --
1,283,519 UART: [fwproc] Wait for Commands...
1,284,131 UART: [fwproc] Recv command 0x46574c44
1,284,859 UART: [fwproc] Recv'd Img size: 31656 bytes
1,635,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,584 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,888 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,703,783 >>> mbox cmd response: success
1,704,949 UART: [afmc] ++
1,705,117 UART: [afmc] CDI.KEYID = 6
1,705,479 UART: [afmc] SUBJECT.KEYID = 7
1,705,904 UART: [afmc] AUTHORITY.KEYID = 5
1,741,825 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,394 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,759,142 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,764,870 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,755 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,474 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,784,312 UART: [afmc] --
1,785,304 UART: [cold-reset] --
1,785,958 UART: [state] Locking Datavault
1,787,223 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,827 UART: [state] Locking ICCM
1,788,303 UART: [exit] Launching FMC @ 0x40000130
1,793,632 UART:
1,793,648 UART: Running Caliptra FMC ...
1,794,056 UART:
1,794,199 UART: [state] CFI Enabled
1,805,070 UART: [fht] FMC Alias Private Key: 7
1,913,841 UART: [art] Extend RT PCRs Done
1,914,269 UART: [art] Lock RT PCRs Done
1,916,031 UART: [art] Populate DV Done
1,924,272 UART: [fht] FMC Alias Private Key: 7
1,925,328 UART: [art] Derive CDI
1,925,608 UART: [art] Store in in slot 0x4
2,010,915 UART: [art] Derive Key Pair
2,011,275 UART: [art] Store priv key in slot 0x5
2,024,161 UART: [art] Derive Key Pair - Done
2,038,806 UART: [art] Signing Cert with AUTHO
2,039,286 UART: RITY.KEYID = 7
2,054,534 UART: [art] Erasing AUTHORITY.KEYID = 7
2,055,299 UART: [art] PUB.X = 89193584C86A1EEEFD87C0E6C73FDB5D071F9C07E8615B7658E4129F3EC29E4BF3657A25BB7FADD8732AE1314FDC1257
2,062,075 UART: [art] PUB.Y = BC68364C19035D9C57497A9D3798EB0635F211AE95BC50DBAD0CBDECB28A42D5659526E6EEC818D2492E5689110C8D08
2,069,016 UART: [art] SIG.R = 7A4FFEE32E1E97081DD29970C9DF91D2388D5442634FA1A4BEAA6D0C9BEBEFE90D7350F74E9F48E75679651969BAC0A6
2,075,791 UART: [art] SIG.S = 1A45311AF9A1506A3283F428C02CCFB8337E3EFDB713C5EB8EBA924B64D10FBA6CB14394B392785412324B53CBACCF84
2,099,634 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,486 ready_for_fw is high
1,061,486 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,555,548 >>> mbox cmd response: success
1,616,978 UART:
1,616,994 UART: Running Caliptra FMC ...
1,617,402 UART:
1,617,545 UART: [state] CFI Enabled
1,628,244 UART: [fht] FMC Alias Private Key: 7
1,736,469 UART: [art] Extend RT PCRs Done
1,736,897 UART: [art] Lock RT PCRs Done
1,738,257 UART: [art] Populate DV Done
1,746,690 UART: [fht] FMC Alias Private Key: 7
1,747,636 UART: [art] Derive CDI
1,747,916 UART: [art] Store in in slot 0x4
1,833,105 UART: [art] Derive Key Pair
1,833,465 UART: [art] Store priv key in slot 0x5
1,846,757 UART: [art] Derive Key Pair - Done
1,861,387 UART: [art] Signing Cert with AUTHO
1,861,867 UART: RITY.KEYID = 7
1,876,977 UART: [art] Erasing AUTHORITY.KEYID = 7
1,877,742 UART: [art] PUB.X = 4CC957A79E76E5B1695C0AF7C85DDB874A1B08379E80401BD57E8ACB0DB31F8E095173D2FF4D7125246055FEDA99B876
1,884,508 UART: [art] PUB.Y = 05FAC1523E92CCD9A0E86C6DBE45B12F19215A9FC8BB1CFBDA8009E17E6457552A079A538DF801F4AA53462837AA2F13
1,891,458 UART: [art] SIG.R = B4751562E6517A424BE92B5CE27813464BF8B38EA75757113745873601EE5073C4CC1E7F6398B016AA44FC1C900E832C
1,898,216 UART: [art] SIG.S = FDC11ABB5D808B18CBE2E42C52C2D3911B9F782CA9855E55F7642C3F94C9373EA33B66FF51F5F95979D482C5756AB756
1,922,398 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
891,098 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,227 UART: [kat] ++
895,379 UART: [kat] sha1
899,543 UART: [kat] SHA2-256
901,483 UART: [kat] SHA2-384
904,244 UART: [kat] SHA2-512-ACC
906,145 UART: [kat] ECC-384
915,638 UART: [kat] HMAC-384Kdf
920,262 UART: [kat] LMS
1,168,574 UART: [kat] --
1,169,385 UART: [cold-reset] ++
1,169,909 UART: [fht] FHT @ 0x50003400
1,172,485 UART: [idev] ++
1,172,653 UART: [idev] CDI.KEYID = 6
1,173,014 UART: [idev] SUBJECT.KEYID = 7
1,173,439 UART: [idev] UDS.KEYID = 0
1,173,785 ready_for_fw is high
1,173,785 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,157 UART: [idev] Erasing UDS.KEYID = 0
1,198,085 UART: [idev] Sha1 KeyId Algorithm
1,207,025 UART: [idev] --
1,207,990 UART: [ldev] ++
1,208,158 UART: [ldev] CDI.KEYID = 6
1,208,522 UART: [ldev] SUBJECT.KEYID = 5
1,208,949 UART: [ldev] AUTHORITY.KEYID = 7
1,209,412 UART: [ldev] FE.KEYID = 1
1,214,738 UART: [ldev] Erasing FE.KEYID = 1
1,241,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,600 UART: [ldev] --
1,280,988 UART: [fwproc] Wait for Commands...
1,281,615 UART: [fwproc] Recv command 0x46574c44
1,282,348 UART: [fwproc] Recv'd Img size: 31656 bytes
1,633,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,401 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,710 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,608 >>> mbox cmd response: success
1,702,861 UART: [afmc] ++
1,703,029 UART: [afmc] CDI.KEYID = 6
1,703,392 UART: [afmc] SUBJECT.KEYID = 7
1,703,818 UART: [afmc] AUTHORITY.KEYID = 5
1,739,523 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,755,953 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,756,704 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,433 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,768,316 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,035 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,102 UART: [afmc] --
1,783,092 UART: [cold-reset] --
1,784,016 UART: [state] Locking Datavault
1,785,039 UART: [state] Locking PCR0, PCR1 and PCR31
1,785,643 UART: [state] Locking ICCM
1,786,193 UART: [exit] Launching FMC @ 0x40000130
1,791,522 UART:
1,791,538 UART: Running Caliptra FMC ...
1,791,946 UART:
1,792,000 UART: [state] CFI Enabled
1,802,671 UART: [fht] FMC Alias Private Key: 7
1,910,478 UART: [art] Extend RT PCRs Done
1,910,906 UART: [art] Lock RT PCRs Done
1,912,588 UART: [art] Populate DV Done
1,920,781 UART: [fht] FMC Alias Private Key: 7
1,921,733 UART: [art] Derive CDI
1,922,013 UART: [art] Store in in slot 0x4
2,007,590 UART: [art] Derive Key Pair
2,007,950 UART: [art] Store priv key in slot 0x5
2,021,050 UART: [art] Derive Key Pair - Done
2,035,893 UART: [art] Signing Cert with AUTHO
2,036,373 UART: RITY.KEYID = 7
2,051,563 UART: [art] Erasing AUTHORITY.KEYID = 7
2,052,328 UART: [art] PUB.X = 116674CB7E5C87B6F6F1DCEF0206DB0E62E0D19620A0AF60BA1D1A90DFEC3D4725A027BDF282590368C822EEB2039BF3
2,059,097 UART: [art] PUB.Y = 32A8008355F4B8F5617EEA248823845B0447CAFC150D296D6735378370DBEC8D779EE17011205A74B9AB0BC78F0A5F9C
2,066,013 UART: [art] SIG.R = C650E58BAA117E72A6090ECA75E708029CF82E1899E1FEE1E2407337439B8C41F84D12CFFB78A55E005C036F4D10D706
2,072,747 UART: [art] SIG.S = 1036754C653734EF19991969018D1C6C9E1CBDFE97EBA6165351D03E4CBCA2FE4C994B97642B5A41955A3FF1AEEC3A5C
2,096,224 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,036 ready_for_fw is high
1,056,036 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,550,890 >>> mbox cmd response: success
1,612,562 UART:
1,612,578 UART: Running Caliptra FMC ...
1,612,986 UART:
1,613,040 UART: [state] CFI Enabled
1,623,847 UART: [fht] FMC Alias Private Key: 7
1,732,224 UART: [art] Extend RT PCRs Done
1,732,652 UART: [art] Lock RT PCRs Done
1,734,168 UART: [art] Populate DV Done
1,742,481 UART: [fht] FMC Alias Private Key: 7
1,743,547 UART: [art] Derive CDI
1,743,827 UART: [art] Store in in slot 0x4
1,829,332 UART: [art] Derive Key Pair
1,829,692 UART: [art] Store priv key in slot 0x5
1,842,908 UART: [art] Derive Key Pair - Done
1,857,828 UART: [art] Signing Cert with AUTHO
1,858,308 UART: RITY.KEYID = 7
1,873,772 UART: [art] Erasing AUTHORITY.KEYID = 7
1,874,537 UART: [art] PUB.X = B43DF74576895F440ABEB7A1EBF74C67E64F24A79DF5A20B553B0BE8A2D65DEBFAC74AECA5A0D40B4F2C5801C0AEA4EB
1,881,322 UART: [art] PUB.Y = ADBFB6CA74399FF66E7AA8009A9D234E4BAB6E692D38F13095A97BBB98ED7B26EA4F296DD74568CE574E85A1034C20AF
1,888,265 UART: [art] SIG.R = 9F52F3AC16C58219E8D438B7D6C5C0231FD2E9C9E56E3575CC8993DC12089FD7AE78E6C0B19D0C5A3899354D926D65C8
1,895,035 UART: [art] SIG.S = C5D8D9477E89D2A94F73114E82DEA84C035DB2EC4F2F15523D99ACFDFF7794E19DFD777A287CB96F8BB13EEC38284C57
1,918,134 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,976 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
891,675 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,804 UART: [kat] ++
895,956 UART: [kat] sha1
900,322 UART: [kat] SHA2-256
902,262 UART: [kat] SHA2-384
905,019 UART: [kat] SHA2-512-ACC
906,920 UART: [kat] ECC-384
916,857 UART: [kat] HMAC-384Kdf
921,427 UART: [kat] LMS
1,169,739 UART: [kat] --
1,170,536 UART: [cold-reset] ++
1,171,066 UART: [fht] FHT @ 0x50003400
1,173,614 UART: [idev] ++
1,173,782 UART: [idev] CDI.KEYID = 6
1,174,143 UART: [idev] SUBJECT.KEYID = 7
1,174,568 UART: [idev] UDS.KEYID = 0
1,174,914 ready_for_fw is high
1,174,914 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,182,324 UART: [idev] Erasing UDS.KEYID = 0
1,199,850 UART: [idev] Sha1 KeyId Algorithm
1,208,702 UART: [idev] --
1,209,841 UART: [ldev] ++
1,210,009 UART: [ldev] CDI.KEYID = 6
1,210,373 UART: [ldev] SUBJECT.KEYID = 5
1,210,800 UART: [ldev] AUTHORITY.KEYID = 7
1,211,263 UART: [ldev] FE.KEYID = 1
1,216,777 UART: [ldev] Erasing FE.KEYID = 1
1,242,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,415 UART: [ldev] --
1,281,725 UART: [fwproc] Wait for Commands...
1,282,298 UART: [fwproc] Recv command 0x46574c44
1,283,031 UART: [fwproc] Recv'd Img size: 31656 bytes
1,633,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,582 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,891 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,761 >>> mbox cmd response: success
1,702,826 UART: [afmc] ++
1,702,994 UART: [afmc] CDI.KEYID = 6
1,703,357 UART: [afmc] SUBJECT.KEYID = 7
1,703,783 UART: [afmc] AUTHORITY.KEYID = 5
1,739,948 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,418 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,169 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,898 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,768,781 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,500 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,451 UART: [afmc] --
1,783,367 UART: [cold-reset] --
1,784,203 UART: [state] Locking Datavault
1,785,552 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,156 UART: [state] Locking ICCM
1,786,578 UART: [exit] Launching FMC @ 0x40000130
1,791,907 UART:
1,791,923 UART: Running Caliptra FMC ...
1,792,331 UART:
1,792,474 UART: [state] CFI Enabled
1,803,179 UART: [fht] FMC Alias Private Key: 7
1,910,868 UART: [art] Extend RT PCRs Done
1,911,296 UART: [art] Lock RT PCRs Done
1,912,742 UART: [art] Populate DV Done
1,920,879 UART: [fht] FMC Alias Private Key: 7
1,921,849 UART: [art] Derive CDI
1,922,129 UART: [art] Store in in slot 0x4
2,007,908 UART: [art] Derive Key Pair
2,008,268 UART: [art] Store priv key in slot 0x5
2,021,530 UART: [art] Derive Key Pair - Done
2,036,148 UART: [art] Signing Cert with AUTHO
2,036,628 UART: RITY.KEYID = 7
2,052,078 UART: [art] Erasing AUTHORITY.KEYID = 7
2,052,843 UART: [art] PUB.X = 2237087A9894A203731C3E4DC0028A710C542CCEB6A80CEBD211F0CECFAE855A047523E85C2A4F948FA90AE0E65F77F3
2,059,602 UART: [art] PUB.Y = 0512F7CECA495B86A5F9888A74EA0C517F5C00F261779916150EEC54F2AACEC5EBE000B60C54B1D3486615A2D7B55582
2,066,502 UART: [art] SIG.R = 1E3A779C771CF9AEF3C707D4B63D95EFA0147B4E55FEEE048761010C69C8972883CE536BFD62036988EBA923F64EC421
2,073,263 UART: [art] SIG.S = 5A2D8FCC116D2D491E162EF013393C0E3CBE1538C586B5D70EAFD2DF8BF7CA7FC4AAA8C49B8EBAC488E61ED948034862
2,096,700 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,381 ready_for_fw is high
1,056,381 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,552,773 >>> mbox cmd response: success
1,614,455 UART:
1,614,471 UART: Running Caliptra FMC ...
1,614,879 UART:
1,615,022 UART: [state] CFI Enabled
1,625,735 UART: [fht] FMC Alias Private Key: 7
1,734,192 UART: [art] Extend RT PCRs Done
1,734,620 UART: [art] Lock RT PCRs Done
1,736,262 UART: [art] Populate DV Done
1,744,213 UART: [fht] FMC Alias Private Key: 7
1,745,355 UART: [art] Derive CDI
1,745,635 UART: [art] Store in in slot 0x4
1,831,434 UART: [art] Derive Key Pair
1,831,794 UART: [art] Store priv key in slot 0x5
1,845,044 UART: [art] Derive Key Pair - Done
1,859,802 UART: [art] Signing Cert with AUTHO
1,860,282 UART: RITY.KEYID = 7
1,875,386 UART: [art] Erasing AUTHORITY.KEYID = 7
1,876,151 UART: [art] PUB.X = 5FC8370558F62D2AA077F45A47EEC4948197311645BC42C05215C1E169B31100D8D7BDBCB69DB4739EFF2916EE5FCFF4
1,882,904 UART: [art] PUB.Y = EF6C0C0671C7429D8C1132EE3711C25F67394F9231A006B7AAF1D122656CBB2930BEA4E49A9E2C4A3E8E203F048002B2
1,889,843 UART: [art] SIG.R = 077F4AF146784CFF9BF4A9B4E4E4D8AE995102CA7C57E4591F68F7623B432C3F5A9A301FF4DCBE79FCEDA191C2ECCCBF
1,896,633 UART: [art] SIG.S = D4F91484A9A56CD70A88B832712B5336D0460C2132DED4EFC3EBF1BEEBB1A126378EF2FE3CC26F9CDF1E24D1D9C379E4
1,920,175 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,333 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,915 UART: [kat] SHA2-256
881,846 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,961 UART: [kat] ++
886,113 UART: [kat] sha1
890,475 UART: [kat] SHA2-256
892,413 UART: [kat] SHA2-384
895,296 UART: [kat] SHA2-512-ACC
897,197 UART: [kat] ECC-384
902,832 UART: [kat] HMAC-384Kdf
907,344 UART: [kat] LMS
1,475,540 UART: [kat] --
1,476,485 UART: [cold-reset] ++
1,477,027 UART: [fht] Storing FHT @ 0x50003400
1,480,000 UART: [idev] ++
1,480,168 UART: [idev] CDI.KEYID = 6
1,480,528 UART: [idev] SUBJECT.KEYID = 7
1,480,952 UART: [idev] UDS.KEYID = 0
1,481,297 ready_for_fw is high
1,481,297 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,656 UART: [idev] Erasing UDS.KEYID = 0
1,505,464 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,002 UART: [idev] --
1,515,119 UART: [ldev] ++
1,515,287 UART: [ldev] CDI.KEYID = 6
1,515,650 UART: [ldev] SUBJECT.KEYID = 5
1,516,076 UART: [ldev] AUTHORITY.KEYID = 7
1,516,539 UART: [ldev] FE.KEYID = 1
1,521,723 UART: [ldev] Erasing FE.KEYID = 1
1,546,412 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,418 UART: [ldev] --
1,585,867 UART: [fwproc] Waiting for Commands...
1,586,650 UART: [fwproc] Received command 0x46574c44
1,587,441 UART: [fwproc] Received Image of size 78704 bytes
2,478,083 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,837 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,535,189 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,638 >>> mbox cmd response: success
2,617,638 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,618,666 UART: [afmc] ++
2,618,834 UART: [afmc] CDI.KEYID = 6
2,619,196 UART: [afmc] SUBJECT.KEYID = 7
2,619,621 UART: [afmc] AUTHORITY.KEYID = 5
2,654,180 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,368 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,148 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,876 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,761 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,451 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,146 UART: [afmc] --
2,697,242 UART: [cold-reset] --
2,698,002 UART: [state] Locking Datavault
2,699,233 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,837 UART: [state] Locking ICCM
2,700,417 UART: [exit] Launching FMC @ 0x40000130
2,705,746 UART:
2,705,762 UART: Running Caliptra FMC ...
2,706,170 UART:
2,706,224 UART: [state] CFI Enabled
2,716,755 UART: [fht] FMC Alias Private Key: 7
2,823,996 UART: [art] Extend RT PCRs Done
2,824,424 UART: [art] Lock RT PCRs Done
2,826,240 UART: [art] Populate DV Done
2,834,349 UART: [fht] FMC Alias Private Key: 7
2,835,379 UART: [art] Derive CDI
2,835,659 UART: [art] Store in in slot 0x4
2,921,488 UART: [art] Derive Key Pair
2,921,848 UART: [art] Store priv key in slot 0x5
2,935,342 UART: [art] Derive Key Pair - Done
2,950,152 UART: [art] Signing Cert with AUTHO
2,950,632 UART: RITY.KEYID = 7
2,965,762 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,527 UART: [art] PUB.X = 26D468626655BF8854850E64906217825F6E582EC3EB3C53B4C97546C22FF0C46890E544824E94CF6B0D34D52C06A76B
2,973,280 UART: [art] PUB.Y = 21F1AACE82AD30A84E27F108D400982452F874E17D06208E1AABDAB30AA9275D0994F299CE227DCAC09364C6B5941D59
2,980,202 UART: [art] SIG.R = 1194323F20D1EBB5745F9BC4F880ACB9709C3EF5A139CC63CB9E3A79F1DC066EC48129C6D03F78F89AD38ABA40F3E295
2,986,983 UART: [art] SIG.S = 28FC5B41F67A76790CD5EC7E3FF3BD3DEF0945E4B8CB24B38706E52ED482B205A6F271F23BE2FF770FC9572E5991F6E1
3,010,965 UART: mbox::rt_entry...
3,011,337 UART: ____ _ _ _ ____ _____
3,012,121 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,921 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,013,689 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,014,457 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,015,225 UART: |_|
3,015,537 UART:
3,122,614 UART: [rt] Runtime listening for mailbox commands...
3,123,795 >>> mbox cmd response data (48 bytes)
3,123,796 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,126,579 >>> mbox cmd response data (48 bytes)
3,126,580 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,139,518 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,107 ready_for_fw is high
1,362,107 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,465,552 >>> mbox cmd response: success
2,465,552 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,526,896 UART:
2,526,912 UART: Running Caliptra FMC ...
2,527,320 UART:
2,527,374 UART: [state] CFI Enabled
2,537,549 UART: [fht] FMC Alias Private Key: 7
2,645,560 UART: [art] Extend RT PCRs Done
2,645,988 UART: [art] Lock RT PCRs Done
2,647,662 UART: [art] Populate DV Done
2,655,823 UART: [fht] FMC Alias Private Key: 7
2,656,843 UART: [art] Derive CDI
2,657,123 UART: [art] Store in in slot 0x4
2,742,566 UART: [art] Derive Key Pair
2,742,926 UART: [art] Store priv key in slot 0x5
2,755,878 UART: [art] Derive Key Pair - Done
2,770,946 UART: [art] Signing Cert with AUTHO
2,771,426 UART: RITY.KEYID = 7
2,786,522 UART: [art] Erasing AUTHORITY.KEYID = 7
2,787,287 UART: [art] PUB.X = 59CE1C84CE1D7B3263B5617DACF10EA940ACA5941297EA19A1588483FBF74549F1D9764A9FEF9533F4D2B2ED7B36B8D3
2,794,066 UART: [art] PUB.Y = 698383402A04289E0F6F4D72647DD34A46B5F0AFFBDBD20A4FCE47826A50A28B6A2B16DADFD012CF30E618D6460DB9DC
2,801,020 UART: [art] SIG.R = DAB6193EB0C93E1CB547108BC9020A62A2A83D7DE1D25DEFEAF136038527C149516621E12B2DF66D4B77754E9C2D54A3
2,807,789 UART: [art] SIG.S = BAA67B8633D77B12F48235DF1C35062A8F47194D5C4EEF55379DB36F8AE2572786EC8C6E4AE34E4665A53D42667E2FD3
2,832,055 UART: mbox::rt_entry...
2,832,427 UART: ____ _ _ _ ____ _____
2,833,211 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,834,011 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,834,779 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,835,547 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,836,315 UART: |_|
2,836,627 UART:
2,943,764 UART: [rt] Runtime listening for mailbox commands...
2,944,945 >>> mbox cmd response data (48 bytes)
2,944,946 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,947,729 >>> mbox cmd response data (48 bytes)
2,947,730 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,960,668 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,492 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,068 UART: [kat] SHA2-256
881,999 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,114 UART: [kat] ++
886,266 UART: [kat] sha1
890,422 UART: [kat] SHA2-256
892,360 UART: [kat] SHA2-384
895,055 UART: [kat] SHA2-512-ACC
896,956 UART: [kat] ECC-384
902,625 UART: [kat] HMAC-384Kdf
907,275 UART: [kat] LMS
1,475,471 UART: [kat] --
1,476,382 UART: [cold-reset] ++
1,476,874 UART: [fht] Storing FHT @ 0x50003400
1,479,839 UART: [idev] ++
1,480,007 UART: [idev] CDI.KEYID = 6
1,480,367 UART: [idev] SUBJECT.KEYID = 7
1,480,791 UART: [idev] UDS.KEYID = 0
1,481,136 ready_for_fw is high
1,481,136 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,867 UART: [idev] Erasing UDS.KEYID = 0
1,505,775 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,285 UART: [idev] --
1,515,520 UART: [ldev] ++
1,515,688 UART: [ldev] CDI.KEYID = 6
1,516,051 UART: [ldev] SUBJECT.KEYID = 5
1,516,477 UART: [ldev] AUTHORITY.KEYID = 7
1,516,940 UART: [ldev] FE.KEYID = 1
1,522,014 UART: [ldev] Erasing FE.KEYID = 1
1,547,545 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,557 UART: [ldev] --
1,587,000 UART: [fwproc] Waiting for Commands...
1,587,777 UART: [fwproc] Received command 0x46574c44
1,588,568 UART: [fwproc] Received Image of size 78704 bytes
2,479,064 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,506,546 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,535,898 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,618,257 >>> mbox cmd response: success
2,618,257 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,619,289 UART: [afmc] ++
2,619,457 UART: [afmc] CDI.KEYID = 6
2,619,819 UART: [afmc] SUBJECT.KEYID = 7
2,620,244 UART: [afmc] AUTHORITY.KEYID = 5
2,654,467 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,625 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,405 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,133 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,683,018 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,708 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,677 UART: [afmc] --
2,697,573 UART: [cold-reset] --
2,698,389 UART: [state] Locking Datavault
2,699,704 UART: [state] Locking PCR0, PCR1 and PCR31
2,700,308 UART: [state] Locking ICCM
2,700,730 UART: [exit] Launching FMC @ 0x40000130
2,706,059 UART:
2,706,075 UART: Running Caliptra FMC ...
2,706,483 UART:
2,706,626 UART: [state] CFI Enabled
2,717,585 UART: [fht] FMC Alias Private Key: 7
2,825,400 UART: [art] Extend RT PCRs Done
2,825,828 UART: [art] Lock RT PCRs Done
2,827,584 UART: [art] Populate DV Done
2,835,597 UART: [fht] FMC Alias Private Key: 7
2,836,675 UART: [art] Derive CDI
2,836,955 UART: [art] Store in in slot 0x4
2,922,792 UART: [art] Derive Key Pair
2,923,152 UART: [art] Store priv key in slot 0x5
2,936,600 UART: [art] Derive Key Pair - Done
2,951,444 UART: [art] Signing Cert with AUTHO
2,951,924 UART: RITY.KEYID = 7
2,967,456 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,221 UART: [art] PUB.X = 2667AF7949BC8C99BD14726A7739069F74F5BD1668CF54BDBB69E608A90F84324D56B5AFD2BD02440F3726548A92BFEB
2,974,982 UART: [art] PUB.Y = E8D39747C139B091DFBA4923DB1DC71B9D7E618103C3C4CC3B5F9BC2339A5DDEA1380033E07C2B89CB2829C7F0E43ECF
2,981,923 UART: [art] SIG.R = 238291F6A9DE1B91A1EC7ACD297C8088821279BF387F62725ED5C3B480ED3404307C7969558AD9692437935000257CB9
2,988,658 UART: [art] SIG.S = 67E5FB697965DBBEFDAD421BBB72BD78E94D8A5E71BACD106658651AF0174C7098F47BFE5ADDE5B8E76CE38A0BE49E4A
3,011,920 UART: mbox::rt_entry...
3,012,292 UART: ____ _ _ _ ____ _____
3,013,076 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,013,876 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,014,644 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,015,412 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,016,180 UART: |_|
3,016,492 UART:
3,123,609 UART: [rt] Runtime listening for mailbox commands...
3,124,790 >>> mbox cmd response data (48 bytes)
3,124,791 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,127,574 >>> mbox cmd response data (48 bytes)
3,127,575 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,140,513 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,486 ready_for_fw is high
1,363,486 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,470,032 >>> mbox cmd response: success
2,470,032 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,531,438 UART:
2,531,454 UART: Running Caliptra FMC ...
2,531,862 UART:
2,532,005 UART: [state] CFI Enabled
2,543,142 UART: [fht] FMC Alias Private Key: 7
2,651,327 UART: [art] Extend RT PCRs Done
2,651,755 UART: [art] Lock RT PCRs Done
2,653,181 UART: [art] Populate DV Done
2,661,550 UART: [fht] FMC Alias Private Key: 7
2,662,696 UART: [art] Derive CDI
2,662,976 UART: [art] Store in in slot 0x4
2,748,609 UART: [art] Derive Key Pair
2,748,969 UART: [art] Store priv key in slot 0x5
2,762,233 UART: [art] Derive Key Pair - Done
2,776,905 UART: [art] Signing Cert with AUTHO
2,777,385 UART: RITY.KEYID = 7
2,792,505 UART: [art] Erasing AUTHORITY.KEYID = 7
2,793,270 UART: [art] PUB.X = 6B9851B0E003AFE3A6DD589796ACB176079FD755644477A83DF8D60B7177A7E4543118521C4E36A5D62FCAE2C605BB42
2,800,030 UART: [art] PUB.Y = 9A5B531DCB4E6D85DDD263877D76B5B695B361D3CB7800CAA0825752CCD9D9A340FAE1ABBAB4DD3617C6DE1FEBC80B4C
2,806,981 UART: [art] SIG.R = 804F5B14C5FF8869C6A49454744355929A9CC327560B608270263DFBB208385670C61A2A5C38F06AD4287B2A39212FC0
2,813,735 UART: [art] SIG.S = 937B0B061126984B2DCDA9C8D09DEBB9DEF2A211D6D6A510E52D75BED7449AEA2A1FF579C6CF522742D79E1A323F2684
2,836,966 UART: mbox::rt_entry...
2,837,338 UART: ____ _ _ _ ____ _____
2,838,122 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,838,922 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,839,690 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,840,458 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,841,226 UART: |_|
2,841,538 UART:
2,948,749 UART: [rt] Runtime listening for mailbox commands...
2,949,930 >>> mbox cmd response data (48 bytes)
2,949,931 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,952,714 >>> mbox cmd response data (48 bytes)
2,952,715 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,965,653 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
893,324 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,449 UART: [kat] ++
897,601 UART: [kat] sha1
901,859 UART: [kat] SHA2-256
903,799 UART: [kat] SHA2-384
906,574 UART: [kat] SHA2-512-ACC
908,475 UART: [kat] ECC-384
917,954 UART: [kat] HMAC-384Kdf
922,500 UART: [kat] LMS
1,170,828 UART: [kat] --
1,171,521 UART: [cold-reset] ++
1,171,921 UART: [fht] FHT @ 0x50003400
1,174,502 UART: [idev] ++
1,174,670 UART: [idev] CDI.KEYID = 6
1,175,030 UART: [idev] SUBJECT.KEYID = 7
1,175,454 UART: [idev] UDS.KEYID = 0
1,175,799 ready_for_fw is high
1,175,799 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,348 UART: [idev] Erasing UDS.KEYID = 0
1,199,661 UART: [idev] Sha1 KeyId Algorithm
1,208,189 UART: [idev] --
1,209,165 UART: [ldev] ++
1,209,333 UART: [ldev] CDI.KEYID = 6
1,209,696 UART: [ldev] SUBJECT.KEYID = 5
1,210,122 UART: [ldev] AUTHORITY.KEYID = 7
1,210,585 UART: [ldev] FE.KEYID = 1
1,215,617 UART: [ldev] Erasing FE.KEYID = 1
1,242,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,321 UART: [ldev] --
1,281,620 UART: [fwproc] Wait for Commands...
1,282,224 UART: [fwproc] Recv command 0x46574c44
1,282,952 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,699 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,388 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,692 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,314,089 >>> mbox cmd response: success
2,314,089 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,315,105 UART: [afmc] ++
2,315,273 UART: [afmc] CDI.KEYID = 6
2,315,635 UART: [afmc] SUBJECT.KEYID = 7
2,316,060 UART: [afmc] AUTHORITY.KEYID = 5
2,351,237 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,822 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,570 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,298 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,183 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,902 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,788 UART: [afmc] --
2,394,764 UART: [cold-reset] --
2,395,714 UART: [state] Locking Datavault
2,396,931 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,535 UART: [state] Locking ICCM
2,398,045 UART: [exit] Launching FMC @ 0x40000130
2,403,374 UART:
2,403,390 UART: Running Caliptra FMC ...
2,403,798 UART:
2,403,852 UART: [state] CFI Enabled
2,414,185 UART: [fht] FMC Alias Private Key: 7
2,522,168 UART: [art] Extend RT PCRs Done
2,522,596 UART: [art] Lock RT PCRs Done
2,524,228 UART: [art] Populate DV Done
2,532,065 UART: [fht] FMC Alias Private Key: 7
2,533,141 UART: [art] Derive CDI
2,533,421 UART: [art] Store in in slot 0x4
2,618,820 UART: [art] Derive Key Pair
2,619,180 UART: [art] Store priv key in slot 0x5
2,633,218 UART: [art] Derive Key Pair - Done
2,647,650 UART: [art] Signing Cert with AUTHO
2,648,130 UART: RITY.KEYID = 7
2,663,172 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,937 UART: [art] PUB.X = 68A5218A1AFE450E6230ED94AAD4CADEBCB518E24291DB5C44193DE427FB98DB2A0DC398627B6D02C2042C62B36DCFC6
2,670,713 UART: [art] PUB.Y = 4FC13BE58092E9DD784D5722618FFE480B3D6BECB0E46BF9D5DE9683B2342984FD1EA1C1570408B3B58B20084F600E09
2,677,651 UART: [art] SIG.R = F5A78FE1C02FD99236A452B3F0C43A9ED99198ECE084B0E3FB0142C9CE114B1E07A7C88B378D546562CF3DFEE6117B8D
2,684,429 UART: [art] SIG.S = 5848194A2E20A46C8BFA4B215DACEF6B8AC832433CDD5A0A597F896BAC1113EB3DA622DD0EE19F09811925208D489E29
2,708,411 UART: mbox::rt_entry...
2,708,783 UART: ____ _ _ _ ____ _____
2,709,567 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,367 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,135 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,903 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,671 UART: |_|
2,712,983 UART:
2,819,993 UART: [rt] Runtime listening for mailbox commands...
2,821,174 >>> mbox cmd response data (48 bytes)
2,821,175 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,823,958 >>> mbox cmd response data (48 bytes)
2,823,959 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,836,897 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,419 ready_for_fw is high
1,060,419 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,163,928 >>> mbox cmd response: success
2,163,928 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,225,952 UART:
2,225,968 UART: Running Caliptra FMC ...
2,226,376 UART:
2,226,430 UART: [state] CFI Enabled
2,236,809 UART: [fht] FMC Alias Private Key: 7
2,344,702 UART: [art] Extend RT PCRs Done
2,345,130 UART: [art] Lock RT PCRs Done
2,346,758 UART: [art] Populate DV Done
2,355,079 UART: [fht] FMC Alias Private Key: 7
2,356,145 UART: [art] Derive CDI
2,356,425 UART: [art] Store in in slot 0x4
2,442,006 UART: [art] Derive Key Pair
2,442,366 UART: [art] Store priv key in slot 0x5
2,455,944 UART: [art] Derive Key Pair - Done
2,470,598 UART: [art] Signing Cert with AUTHO
2,471,078 UART: RITY.KEYID = 7
2,486,222 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,987 UART: [art] PUB.X = 5F45AA1D7BB8808BFC0DDE9D19376E428320E21492A4E34471A56DC057BF5CF94E8BACD29379DCAEDFEFC07325E3AC1F
2,493,776 UART: [art] PUB.Y = 48C48A8934A59417D2E795151914057B186117B447387E9CB6A31E4EC2D2DAB755A5D987AB415BE7BC1338424F639A48
2,500,717 UART: [art] SIG.R = 5F980AA67E39B62695EAC326D54ABAD266ED29AA3100960E28E5725DBA5ECBFB43DB48C21454A2166223B43A73A40EFF
2,507,468 UART: [art] SIG.S = A23141A24FC58295758CEA7E00981E7BAC09A5C7F630AC268306277583192B872F948898DDAF7FBE16E75587237A4653
2,531,099 UART: mbox::rt_entry...
2,531,471 UART: ____ _ _ _ ____ _____
2,532,255 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,055 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,823 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,591 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,359 UART: |_|
2,535,671 UART:
2,641,641 UART: [rt] Runtime listening for mailbox commands...
2,642,822 >>> mbox cmd response data (48 bytes)
2,642,823 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,645,606 >>> mbox cmd response data (48 bytes)
2,645,607 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,658,545 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,751 UART: [kat] SHA2-256
893,401 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,526 UART: [kat] ++
897,678 UART: [kat] sha1
901,992 UART: [kat] SHA2-256
903,932 UART: [kat] SHA2-384
906,569 UART: [kat] SHA2-512-ACC
908,470 UART: [kat] ECC-384
918,041 UART: [kat] HMAC-384Kdf
922,521 UART: [kat] LMS
1,170,849 UART: [kat] --
1,171,882 UART: [cold-reset] ++
1,172,302 UART: [fht] FHT @ 0x50003400
1,175,153 UART: [idev] ++
1,175,321 UART: [idev] CDI.KEYID = 6
1,175,681 UART: [idev] SUBJECT.KEYID = 7
1,176,105 UART: [idev] UDS.KEYID = 0
1,176,450 ready_for_fw is high
1,176,450 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,021 UART: [idev] Erasing UDS.KEYID = 0
1,200,590 UART: [idev] Sha1 KeyId Algorithm
1,208,890 UART: [idev] --
1,210,154 UART: [ldev] ++
1,210,322 UART: [ldev] CDI.KEYID = 6
1,210,685 UART: [ldev] SUBJECT.KEYID = 5
1,211,111 UART: [ldev] AUTHORITY.KEYID = 7
1,211,574 UART: [ldev] FE.KEYID = 1
1,216,740 UART: [ldev] Erasing FE.KEYID = 1
1,243,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,544 UART: [ldev] --
1,282,905 UART: [fwproc] Wait for Commands...
1,283,537 UART: [fwproc] Recv command 0x46574c44
1,284,265 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,657 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,961 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,266 >>> mbox cmd response: success
2,312,266 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,313,360 UART: [afmc] ++
2,313,528 UART: [afmc] CDI.KEYID = 6
2,313,890 UART: [afmc] SUBJECT.KEYID = 7
2,314,315 UART: [afmc] AUTHORITY.KEYID = 5
2,349,256 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,575 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,323 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,051 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,936 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,655 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,423 UART: [afmc] --
2,392,349 UART: [cold-reset] --
2,393,369 UART: [state] Locking Datavault
2,394,616 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,220 UART: [state] Locking ICCM
2,395,882 UART: [exit] Launching FMC @ 0x40000130
2,401,211 UART:
2,401,227 UART: Running Caliptra FMC ...
2,401,635 UART:
2,401,778 UART: [state] CFI Enabled
2,412,425 UART: [fht] FMC Alias Private Key: 7
2,520,004 UART: [art] Extend RT PCRs Done
2,520,432 UART: [art] Lock RT PCRs Done
2,521,822 UART: [art] Populate DV Done
2,530,189 UART: [fht] FMC Alias Private Key: 7
2,531,299 UART: [art] Derive CDI
2,531,579 UART: [art] Store in in slot 0x4
2,617,052 UART: [art] Derive Key Pair
2,617,412 UART: [art] Store priv key in slot 0x5
2,630,976 UART: [art] Derive Key Pair - Done
2,645,846 UART: [art] Signing Cert with AUTHO
2,646,326 UART: RITY.KEYID = 7
2,661,040 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,805 UART: [art] PUB.X = 3CB1A2A9F69E42EA040C16B27E151F8B963FE24AB855DBA352A6D06CDF3C51BEB582314C611D673EEFE37C1CABD92E0F
2,668,588 UART: [art] PUB.Y = BEAF3D896A0228ADED18BA72B1B7FA882641EC4969343A0C30B9915B0BC62752F1F18135C8E7AC84C722A69486FEAE72
2,675,539 UART: [art] SIG.R = F420A083AA65BA08845883AA6740C6BBAACF30B03924255E2669893C7B6AEC87F9F3C9766C3A342F3F785521EFBB0F32
2,682,309 UART: [art] SIG.S = 455BA6774C80796F82D588D3DB972273FB47989DEDD4967F06F54385434D68489F2511725613D6EA171CACFB933436BD
2,706,201 UART: mbox::rt_entry...
2,706,573 UART: ____ _ _ _ ____ _____
2,707,357 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,157 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,925 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,693 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,461 UART: |_|
2,710,773 UART:
2,816,787 UART: [rt] Runtime listening for mailbox commands...
2,817,968 >>> mbox cmd response data (48 bytes)
2,817,969 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,820,752 >>> mbox cmd response data (48 bytes)
2,820,753 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,833,691 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,102 ready_for_fw is high
1,061,102 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,543 >>> mbox cmd response: success
2,165,543 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,227,377 UART:
2,227,393 UART: Running Caliptra FMC ...
2,227,801 UART:
2,227,944 UART: [state] CFI Enabled
2,238,423 UART: [fht] FMC Alias Private Key: 7
2,346,222 UART: [art] Extend RT PCRs Done
2,346,650 UART: [art] Lock RT PCRs Done
2,348,380 UART: [art] Populate DV Done
2,356,695 UART: [fht] FMC Alias Private Key: 7
2,357,715 UART: [art] Derive CDI
2,357,995 UART: [art] Store in in slot 0x4
2,443,912 UART: [art] Derive Key Pair
2,444,272 UART: [art] Store priv key in slot 0x5
2,457,742 UART: [art] Derive Key Pair - Done
2,472,518 UART: [art] Signing Cert with AUTHO
2,472,998 UART: RITY.KEYID = 7
2,487,882 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,647 UART: [art] PUB.X = 2C97D1B41EBFF90B897B2484DF94F15EEEE6BBCC831B4A3EEDDD26D68266004365CFD993197E0B614718DD00C9DB6F95
2,495,383 UART: [art] PUB.Y = 27255D545F1782DB88FD18EECD1FA6FE1F9E42499AE9D7637F4D361FD7CD166DABDAF2945FE3BC35231B27B24B5EB92A
2,502,353 UART: [art] SIG.R = C2F0E38E84D7A72778F8D0B0F3D8CB42BEDAE1FCD97F48FE7FD6A32EF8A1369D24C0EA1FF3E420F05F8E689FE5C895EA
2,509,151 UART: [art] SIG.S = D4B54CE29B58C4BFB362D7CB90EEEBFDA115CFD04D824212374B44731CA58C82482A35E9B9EC51742D7E2E01D70E95B6
2,532,732 UART: mbox::rt_entry...
2,533,104 UART: ____ _ _ _ ____ _____
2,533,888 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,688 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,456 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,224 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,992 UART: |_|
2,537,304 UART:
2,643,121 UART: [rt] Runtime listening for mailbox commands...
2,644,302 >>> mbox cmd response data (48 bytes)
2,644,303 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,647,086 >>> mbox cmd response data (48 bytes)
2,647,087 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,660,025 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
891,278 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,407 UART: [kat] ++
895,559 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,680 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,611 UART: [cold-reset] ++
1,169,997 UART: [fht] FHT @ 0x50003400
1,172,703 UART: [idev] ++
1,172,871 UART: [idev] CDI.KEYID = 6
1,173,232 UART: [idev] SUBJECT.KEYID = 7
1,173,657 UART: [idev] UDS.KEYID = 0
1,174,003 ready_for_fw is high
1,174,003 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,845 UART: [idev] Erasing UDS.KEYID = 0
1,198,611 UART: [idev] Sha1 KeyId Algorithm
1,207,399 UART: [idev] --
1,208,410 UART: [ldev] ++
1,208,578 UART: [ldev] CDI.KEYID = 6
1,208,942 UART: [ldev] SUBJECT.KEYID = 5
1,209,369 UART: [ldev] AUTHORITY.KEYID = 7
1,209,832 UART: [ldev] FE.KEYID = 1
1,215,070 UART: [ldev] Erasing FE.KEYID = 1
1,241,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,552 UART: [ldev] --
1,280,930 UART: [fwproc] Wait for Commands...
1,281,509 UART: [fwproc] Recv command 0x46574c44
1,282,242 UART: [fwproc] Recv'd Img size: 78704 bytes
2,172,174 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,504 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,813 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,203 >>> mbox cmd response: success
2,311,203 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,312,394 UART: [afmc] ++
2,312,562 UART: [afmc] CDI.KEYID = 6
2,312,925 UART: [afmc] SUBJECT.KEYID = 7
2,313,351 UART: [afmc] AUTHORITY.KEYID = 5
2,349,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,838 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,589 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,318 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,201 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,920 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,841 UART: [afmc] --
2,392,799 UART: [cold-reset] --
2,393,771 UART: [state] Locking Datavault
2,394,730 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,334 UART: [state] Locking ICCM
2,395,796 UART: [exit] Launching FMC @ 0x40000130
2,401,125 UART:
2,401,141 UART: Running Caliptra FMC ...
2,401,549 UART:
2,401,603 UART: [state] CFI Enabled
2,411,920 UART: [fht] FMC Alias Private Key: 7
2,520,141 UART: [art] Extend RT PCRs Done
2,520,569 UART: [art] Lock RT PCRs Done
2,522,101 UART: [art] Populate DV Done
2,530,260 UART: [fht] FMC Alias Private Key: 7
2,531,430 UART: [art] Derive CDI
2,531,710 UART: [art] Store in in slot 0x4
2,617,291 UART: [art] Derive Key Pair
2,617,651 UART: [art] Store priv key in slot 0x5
2,630,419 UART: [art] Derive Key Pair - Done
2,644,962 UART: [art] Signing Cert with AUTHO
2,645,442 UART: RITY.KEYID = 7
2,660,626 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,391 UART: [art] PUB.X = 30C7E7D42BCACD8BD5DA27D92DC435B5028B821FB7E6607894977A9F90C862432F29276E05089B8503E93CD56FB27639
2,668,149 UART: [art] PUB.Y = 16B039F1805B41685FF1252560B45E075EEACED9CA0F5EB4095E20179C75B74458F91CB9AFE625412E5175135BEEDF26
2,675,094 UART: [art] SIG.R = D9778B235A6EBEB371C60DA9322DFED9F163D51C023180BEBB18CF6B5BF0B7A0772C1E3C28BD73A9BAFA3AB7C9E61E1F
2,681,884 UART: [art] SIG.S = ADDA55B01937DA8D595EBF1C43F4C8E9761F63F68AA3C00CDA0FB782008DDA1D8C36E9EE4803381E1413C456DB49CA00
2,705,224 UART: mbox::rt_entry...
2,705,596 UART: ____ _ _ _ ____ _____
2,706,380 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,180 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,948 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,716 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,484 UART: |_|
2,709,796 UART:
2,816,867 UART: [rt] Runtime listening for mailbox commands...
2,818,048 >>> mbox cmd response data (48 bytes)
2,818,049 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,820,832 >>> mbox cmd response data (48 bytes)
2,820,833 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,833,771 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,582 ready_for_fw is high
1,056,582 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,162,075 >>> mbox cmd response: success
2,162,075 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,224,711 UART:
2,224,727 UART: Running Caliptra FMC ...
2,225,135 UART:
2,225,189 UART: [state] CFI Enabled
2,235,476 UART: [fht] FMC Alias Private Key: 7
2,343,477 UART: [art] Extend RT PCRs Done
2,343,905 UART: [art] Lock RT PCRs Done
2,345,571 UART: [art] Populate DV Done
2,353,744 UART: [fht] FMC Alias Private Key: 7
2,354,888 UART: [art] Derive CDI
2,355,168 UART: [art] Store in in slot 0x4
2,441,031 UART: [art] Derive Key Pair
2,441,391 UART: [art] Store priv key in slot 0x5
2,454,437 UART: [art] Derive Key Pair - Done
2,468,683 UART: [art] Signing Cert with AUTHO
2,469,163 UART: RITY.KEYID = 7
2,484,359 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,124 UART: [art] PUB.X = 8CC85668FE6F2AA0F4C6C1FD6473FC2326BA80211BE01F042C70E9502B7B61726FC8ADAF5837D5D5D0B5D3303593804F
2,491,899 UART: [art] PUB.Y = 35EBA39BD68A173F94B57560BEC5294191F4FC8DF0E7CE98B71C4C487F1E2C8842A6328BE8EB4EA01D697E5BF3F769CE
2,498,865 UART: [art] SIG.R = 3F79DF2D964C1E6D980654702E3D3ED1F3806563034521F2CEEED06FD26A11EC53F8688A9E56422B9C665F4760FA1E7D
2,505,633 UART: [art] SIG.S = FE9B15C4D45EF64BA550E02842CB3CA6F381197329ED1555C9EAF71EF18E6EE01AB319A4A1864E2D94516EAB1B237CA8
2,529,400 UART: mbox::rt_entry...
2,529,772 UART: ____ _ _ _ ____ _____
2,530,556 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,356 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,124 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,892 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,660 UART: |_|
2,533,972 UART:
2,640,002 UART: [rt] Runtime listening for mailbox commands...
2,641,183 >>> mbox cmd response data (48 bytes)
2,641,184 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,643,967 >>> mbox cmd response data (48 bytes)
2,643,968 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,656,906 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [kat] SHA2-256
891,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,628 UART: [kat] ++
895,780 UART: [kat] sha1
900,006 UART: [kat] SHA2-256
901,946 UART: [kat] SHA2-384
904,663 UART: [kat] SHA2-512-ACC
906,564 UART: [kat] ECC-384
916,101 UART: [kat] HMAC-384Kdf
920,797 UART: [kat] LMS
1,169,109 UART: [kat] --
1,169,878 UART: [cold-reset] ++
1,170,336 UART: [fht] FHT @ 0x50003400
1,173,188 UART: [idev] ++
1,173,356 UART: [idev] CDI.KEYID = 6
1,173,717 UART: [idev] SUBJECT.KEYID = 7
1,174,142 UART: [idev] UDS.KEYID = 0
1,174,488 ready_for_fw is high
1,174,488 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,354 UART: [idev] Erasing UDS.KEYID = 0
1,199,624 UART: [idev] Sha1 KeyId Algorithm
1,208,652 UART: [idev] --
1,209,789 UART: [ldev] ++
1,209,957 UART: [ldev] CDI.KEYID = 6
1,210,321 UART: [ldev] SUBJECT.KEYID = 5
1,210,748 UART: [ldev] AUTHORITY.KEYID = 7
1,211,211 UART: [ldev] FE.KEYID = 1
1,216,709 UART: [ldev] Erasing FE.KEYID = 1
1,243,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,277 UART: [ldev] --
1,282,675 UART: [fwproc] Wait for Commands...
1,283,446 UART: [fwproc] Recv command 0x46574c44
1,284,179 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,849 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,158 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,614 >>> mbox cmd response: success
2,313,614 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,314,797 UART: [afmc] ++
2,314,965 UART: [afmc] CDI.KEYID = 6
2,315,328 UART: [afmc] SUBJECT.KEYID = 7
2,315,754 UART: [afmc] AUTHORITY.KEYID = 5
2,351,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,575 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,326 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,055 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,938 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,657 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,400 UART: [afmc] --
2,394,326 UART: [cold-reset] --
2,394,914 UART: [state] Locking Datavault
2,396,109 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,713 UART: [state] Locking ICCM
2,397,383 UART: [exit] Launching FMC @ 0x40000130
2,402,712 UART:
2,402,728 UART: Running Caliptra FMC ...
2,403,136 UART:
2,403,279 UART: [state] CFI Enabled
2,413,898 UART: [fht] FMC Alias Private Key: 7
2,522,221 UART: [art] Extend RT PCRs Done
2,522,649 UART: [art] Lock RT PCRs Done
2,524,481 UART: [art] Populate DV Done
2,532,956 UART: [fht] FMC Alias Private Key: 7
2,534,082 UART: [art] Derive CDI
2,534,362 UART: [art] Store in in slot 0x4
2,620,437 UART: [art] Derive Key Pair
2,620,797 UART: [art] Store priv key in slot 0x5
2,634,309 UART: [art] Derive Key Pair - Done
2,649,227 UART: [art] Signing Cert with AUTHO
2,649,707 UART: RITY.KEYID = 7
2,664,449 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,214 UART: [art] PUB.X = CB5179D9A91EAB8FBBADD2F144F37B3E75904984B0E7FC9F2DE1A50F12D765009991A74BFB4277A45C1008A001389D68
2,671,961 UART: [art] PUB.Y = BA5D4DB4E2B3FC77BBBDED57B9C59A5631B27C9C0FFE740ECE7599818643A1E86BBB224AE284DC346DD45580F5C5B370
2,678,925 UART: [art] SIG.R = 420CA7201C906757E75E4B6E942E16B647CA104A28AD513A0119E0F962F0B3BC3EFCEA61E04B5F73300934D667605FDB
2,685,690 UART: [art] SIG.S = C132ED9FCF0A9A2FE7592753B871BD232D423631219DCC4CCC509E11375D814FCD6D4B9094AAB8B893994EB20A6DFA59
2,709,007 UART: mbox::rt_entry...
2,709,379 UART: ____ _ _ _ ____ _____
2,710,163 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,963 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,731 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,499 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,267 UART: |_|
2,713,579 UART:
2,820,003 UART: [rt] Runtime listening for mailbox commands...
2,821,184 >>> mbox cmd response data (48 bytes)
2,821,185 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,823,968 >>> mbox cmd response data (48 bytes)
2,823,969 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,836,907 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,957 ready_for_fw is high
1,056,957 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,162,850 >>> mbox cmd response: success
2,162,850 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,224,982 UART:
2,224,998 UART: Running Caliptra FMC ...
2,225,406 UART:
2,225,549 UART: [state] CFI Enabled
2,235,892 UART: [fht] FMC Alias Private Key: 7
2,343,813 UART: [art] Extend RT PCRs Done
2,344,241 UART: [art] Lock RT PCRs Done
2,346,037 UART: [art] Populate DV Done
2,354,378 UART: [fht] FMC Alias Private Key: 7
2,355,516 UART: [art] Derive CDI
2,355,796 UART: [art] Store in in slot 0x4
2,441,697 UART: [art] Derive Key Pair
2,442,057 UART: [art] Store priv key in slot 0x5
2,454,755 UART: [art] Derive Key Pair - Done
2,469,423 UART: [art] Signing Cert with AUTHO
2,469,903 UART: RITY.KEYID = 7
2,485,229 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,994 UART: [art] PUB.X = 370C4ECAABEB790B497504608AA116463EFB77A885E5D879B8A2493B94C67C8F73822566C6CB3578E4FF873344AC6AE4
2,492,759 UART: [art] PUB.Y = A242EABC00D88A715D42A5ECF07381BF11B123F17967279A7E8578EAB81C137FF52126C06051D6DE7BA0ACD6464AB36A
2,499,697 UART: [art] SIG.R = 4C1B07E840BE9C926F1F830817510ABDC17DFF78B0F7D19823F91ECCD4803DAE361151A0814642AA778A99E1241C7356
2,506,460 UART: [art] SIG.S = 406FDDCCA5535E54CEDDDD3A9AF45A388516EC9CC54A9C2566B4A454F82408F3813713B13A274F13B582530C73B251E8
2,530,111 UART: mbox::rt_entry...
2,530,483 UART: ____ _ _ _ ____ _____
2,531,267 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,067 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,835 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,603 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,371 UART: |_|
2,534,683 UART:
2,641,597 UART: [rt] Runtime listening for mailbox commands...
2,642,778 >>> mbox cmd response data (48 bytes)
2,642,779 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,645,562 >>> mbox cmd response data (48 bytes)
2,645,563 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,658,501 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,548 UART: [state] LifecycleState = Unprovisioned
86,203 UART: [state] DebugLocked = No
86,815 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,327 UART: [kat] SHA2-256
882,258 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,373 UART: [kat] ++
886,525 UART: [kat] sha1
890,627 UART: [kat] SHA2-256
892,565 UART: [kat] SHA2-384
895,356 UART: [kat] SHA2-512-ACC
897,257 UART: [kat] ECC-384
902,842 UART: [kat] HMAC-384Kdf
907,328 UART: [kat] LMS
1,475,524 UART: [kat] --
1,476,381 UART: [cold-reset] ++
1,476,781 UART: [fht] Storing FHT @ 0x50003400
1,479,530 UART: [idev] ++
1,479,698 UART: [idev] CDI.KEYID = 6
1,480,058 UART: [idev] SUBJECT.KEYID = 7
1,480,482 UART: [idev] UDS.KEYID = 0
1,480,827 ready_for_fw is high
1,480,827 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,740 UART: [idev] Erasing UDS.KEYID = 0
1,505,132 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,634 UART: [idev] --
1,514,627 UART: [ldev] ++
1,514,795 UART: [ldev] CDI.KEYID = 6
1,515,158 UART: [ldev] SUBJECT.KEYID = 5
1,515,584 UART: [ldev] AUTHORITY.KEYID = 7
1,516,047 UART: [ldev] FE.KEYID = 1
1,521,191 UART: [ldev] Erasing FE.KEYID = 1
1,546,820 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,616 UART: [ldev] --
1,586,015 UART: [fwproc] Waiting for Commands...
1,586,734 UART: [fwproc] Received command 0x46574c44
1,587,525 UART: [fwproc] Received Image of size 114332 bytes
2,885,831 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,821 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,173 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,952 >>> mbox cmd response: success
3,080,072 UART: [afmc] ++
3,080,240 UART: [afmc] CDI.KEYID = 6
3,080,602 UART: [afmc] SUBJECT.KEYID = 7
3,081,027 UART: [afmc] AUTHORITY.KEYID = 5
3,116,302 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,542 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,322 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,050 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,935 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,625 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,538 UART: [afmc] --
3,159,464 UART: [cold-reset] --
3,160,364 UART: [state] Locking Datavault
3,161,869 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,473 UART: [state] Locking ICCM
3,163,097 UART: [exit] Launching FMC @ 0x40000130
3,168,426 UART:
3,168,442 UART: Running Caliptra FMC ...
3,168,850 UART:
3,168,904 UART: [state] CFI Enabled
3,179,177 UART: [fht] FMC Alias Private Key: 7
3,287,088 UART: [art] Extend RT PCRs Done
3,287,516 UART: [art] Lock RT PCRs Done
3,289,080 UART: [art] Populate DV Done
3,297,293 UART: [fht] FMC Alias Private Key: 7
3,298,431 UART: [art] Derive CDI
3,298,711 UART: [art] Store in in slot 0x4
3,384,210 UART: [art] Derive Key Pair
3,384,570 UART: [art] Store priv key in slot 0x5
3,397,964 UART: [art] Derive Key Pair - Done
3,412,868 UART: [art] Signing Cert with AUTHO
3,413,348 UART: RITY.KEYID = 7
3,428,672 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,437 UART: [art] PUB.X = 2F68CB5CEAF13BAD8A86096EAE0D24F071058C5282F8B77D5CB2DCDBE707F3E03CF570920B8D59EFF70C6E985F624E72
3,436,207 UART: [art] PUB.Y = 735E46EB0CDF1DC7C027219228F56105C04C2E469F2840657656EA19272F29207ED316E91D8AA9AAE36F46F1F2A3E377
3,443,151 UART: [art] SIG.R = 10F83D1AFFDFFD9F62CCDF06AE0921159AE964C928CA0730DD9C1D5A39136F5CE9864FFA9CFD72E0F93D1378F1E734CE
3,449,934 UART: [art] SIG.S = 03CD3D76FF8E2D68443075D69AB6E71C119DD64AD2F57DB6A0F796C2ACB33A95FD22E63D11963322C64BD1C074057FE8
3,473,525 UART: Caliptra RT
3,473,778 UART: [state] CFI Enabled
3,582,066 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,637 ready_for_fw is high
1,362,637 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,564 >>> mbox cmd response: success
2,988,202 UART:
2,988,218 UART: Running Caliptra FMC ...
2,988,626 UART:
2,988,680 UART: [state] CFI Enabled
2,999,035 UART: [fht] FMC Alias Private Key: 7
3,106,604 UART: [art] Extend RT PCRs Done
3,107,032 UART: [art] Lock RT PCRs Done
3,108,194 UART: [art] Populate DV Done
3,116,577 UART: [fht] FMC Alias Private Key: 7
3,117,673 UART: [art] Derive CDI
3,117,953 UART: [art] Store in in slot 0x4
3,203,886 UART: [art] Derive Key Pair
3,204,246 UART: [art] Store priv key in slot 0x5
3,217,000 UART: [art] Derive Key Pair - Done
3,231,326 UART: [art] Signing Cert with AUTHO
3,231,806 UART: RITY.KEYID = 7
3,247,346 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,111 UART: [art] PUB.X = 97961F77C2F6CC16C3789CE074BE2B1CE1FE5EBCE3B86C6997FF2D3EFAD66B1C533CFA12DFDE4FD3B23FDBF6A3C1B572
3,254,913 UART: [art] PUB.Y = 3B7C8D565F1990E3338F7AEF81BDD289971D9D855CA715591A0ED3E9ED665F3E600212AC436CFF9B9890979C298E7A69
3,261,861 UART: [art] SIG.R = F251803EBB18D7A39BABC7E5285C1643293589940EB735F2261C153571BB7B1C84DE316EF342F56544ED5FA5C7BE473F
3,268,632 UART: [art] SIG.S = 13361539D18956871479E7C75BA59C7077A2F4BCC0CB326328D38174D843DBCEBDC97BEB26833B6047CFD0474460C527
3,291,943 UART: Caliptra RT
3,292,196 UART: [state] CFI Enabled
3,400,405 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,764 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,446 UART: [kat] SHA2-256
882,377 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,492 UART: [kat] ++
886,644 UART: [kat] sha1
890,866 UART: [kat] SHA2-256
892,804 UART: [kat] SHA2-384
895,601 UART: [kat] SHA2-512-ACC
897,502 UART: [kat] ECC-384
903,059 UART: [kat] HMAC-384Kdf
907,519 UART: [kat] LMS
1,475,715 UART: [kat] --
1,477,004 UART: [cold-reset] ++
1,477,556 UART: [fht] Storing FHT @ 0x50003400
1,480,263 UART: [idev] ++
1,480,431 UART: [idev] CDI.KEYID = 6
1,480,791 UART: [idev] SUBJECT.KEYID = 7
1,481,215 UART: [idev] UDS.KEYID = 0
1,481,560 ready_for_fw is high
1,481,560 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,195 UART: [idev] Erasing UDS.KEYID = 0
1,505,987 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,791 UART: [idev] --
1,515,934 UART: [ldev] ++
1,516,102 UART: [ldev] CDI.KEYID = 6
1,516,465 UART: [ldev] SUBJECT.KEYID = 5
1,516,891 UART: [ldev] AUTHORITY.KEYID = 7
1,517,354 UART: [ldev] FE.KEYID = 1
1,522,726 UART: [ldev] Erasing FE.KEYID = 1
1,547,947 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,629 UART: [ldev] --
1,586,894 UART: [fwproc] Waiting for Commands...
1,587,665 UART: [fwproc] Received command 0x46574c44
1,588,456 UART: [fwproc] Received Image of size 114332 bytes
2,886,270 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,460 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,812 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,803 >>> mbox cmd response: success
3,080,023 UART: [afmc] ++
3,080,191 UART: [afmc] CDI.KEYID = 6
3,080,553 UART: [afmc] SUBJECT.KEYID = 7
3,080,978 UART: [afmc] AUTHORITY.KEYID = 5
3,116,149 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,295 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,075 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,803 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,688 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,378 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,347 UART: [afmc] --
3,159,269 UART: [cold-reset] --
3,159,869 UART: [state] Locking Datavault
3,160,774 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,378 UART: [state] Locking ICCM
3,162,042 UART: [exit] Launching FMC @ 0x40000130
3,167,371 UART:
3,167,387 UART: Running Caliptra FMC ...
3,167,795 UART:
3,167,938 UART: [state] CFI Enabled
3,178,437 UART: [fht] FMC Alias Private Key: 7
3,286,704 UART: [art] Extend RT PCRs Done
3,287,132 UART: [art] Lock RT PCRs Done
3,288,814 UART: [art] Populate DV Done
3,297,045 UART: [fht] FMC Alias Private Key: 7
3,298,121 UART: [art] Derive CDI
3,298,401 UART: [art] Store in in slot 0x4
3,384,246 UART: [art] Derive Key Pair
3,384,606 UART: [art] Store priv key in slot 0x5
3,397,626 UART: [art] Derive Key Pair - Done
3,412,524 UART: [art] Signing Cert with AUTHO
3,413,004 UART: RITY.KEYID = 7
3,428,422 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,187 UART: [art] PUB.X = 6BD1210EA90976657AAC41AB0D6A2A939E46D84718F6B022409BDD22965C5628F6944E1AFF6D1013B11121512B6FAB49
3,435,948 UART: [art] PUB.Y = CAB2B73A626AF61A7D670EC09E8399A366E59768602742BB2967706C52446B9BF8F10C9472FF1D08B319B7D2AFB419D7
3,442,891 UART: [art] SIG.R = 5D5DA0D66E10A893102D72D745E0311D2AACB5D6606983E54E65A06DF1832DAB496B4E82BBCB1CF7293F803981B0BDB8
3,449,671 UART: [art] SIG.S = E9A81C1BEC1083F2E3519F8C739BE992A293184BCCBA77CCFAEAFB29DB858425A92D1B510FBC9EE537FFAFB5FC135940
3,472,917 UART: Caliptra RT
3,473,262 UART: [state] CFI Enabled
3,583,041 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,266 ready_for_fw is high
1,362,266 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,445 >>> mbox cmd response: success
2,989,119 UART:
2,989,135 UART: Running Caliptra FMC ...
2,989,543 UART:
2,989,686 UART: [state] CFI Enabled
3,000,517 UART: [fht] FMC Alias Private Key: 7
3,108,354 UART: [art] Extend RT PCRs Done
3,108,782 UART: [art] Lock RT PCRs Done
3,110,252 UART: [art] Populate DV Done
3,118,509 UART: [fht] FMC Alias Private Key: 7
3,119,549 UART: [art] Derive CDI
3,119,829 UART: [art] Store in in slot 0x4
3,205,832 UART: [art] Derive Key Pair
3,206,192 UART: [art] Store priv key in slot 0x5
3,220,452 UART: [art] Derive Key Pair - Done
3,235,202 UART: [art] Signing Cert with AUTHO
3,235,682 UART: RITY.KEYID = 7
3,251,006 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,771 UART: [art] PUB.X = BE3CAA257D5CD0A21C56C2C3A502CD89A32673CE78610075247F1083E8A8FE9B4896A33A7685199CC98A61B094485E27
3,258,516 UART: [art] PUB.Y = 552020581515584240C72D8BBEA8935FB51AD6D9B9EDD995EAAB0412E33F1392834D09DCCDE944D80E1060BB4B27439D
3,265,461 UART: [art] SIG.R = 234C3F89CFDC647F3206E3651459682CC41C9EA737CD53F4A9DF17E29A4EEB69C9B8D0969D6559052976577BEBA1D924
3,272,229 UART: [art] SIG.S = 26C2B4552BEA9E2D07745CC76A43D9439E58A88EB712DA864FB37C996DE3DC8FA3B57E6BD7720F3DCC87151D15F70A67
3,296,243 UART: Caliptra RT
3,296,588 UART: [state] CFI Enabled
3,405,658 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,564 UART: [state] LifecycleState = Unprovisioned
86,219 UART: [state] DebugLocked = No
86,737 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [kat] SHA2-256
893,594 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,719 UART: [kat] ++
897,871 UART: [kat] sha1
902,207 UART: [kat] SHA2-256
904,147 UART: [kat] SHA2-384
906,716 UART: [kat] SHA2-512-ACC
908,617 UART: [kat] ECC-384
918,128 UART: [kat] HMAC-384Kdf
922,730 UART: [kat] LMS
1,171,058 UART: [kat] --
1,172,273 UART: [cold-reset] ++
1,172,815 UART: [fht] FHT @ 0x50003400
1,175,552 UART: [idev] ++
1,175,720 UART: [idev] CDI.KEYID = 6
1,176,080 UART: [idev] SUBJECT.KEYID = 7
1,176,504 UART: [idev] UDS.KEYID = 0
1,176,849 ready_for_fw is high
1,176,849 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,390 UART: [idev] Erasing UDS.KEYID = 0
1,201,783 UART: [idev] Sha1 KeyId Algorithm
1,210,277 UART: [idev] --
1,211,217 UART: [ldev] ++
1,211,385 UART: [ldev] CDI.KEYID = 6
1,211,748 UART: [ldev] SUBJECT.KEYID = 5
1,212,174 UART: [ldev] AUTHORITY.KEYID = 7
1,212,637 UART: [ldev] FE.KEYID = 1
1,217,917 UART: [ldev] Erasing FE.KEYID = 1
1,244,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,995 UART: [ldev] --
1,283,510 UART: [fwproc] Wait for Commands...
1,284,172 UART: [fwproc] Recv command 0x46574c44
1,284,900 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,960 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,264 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,005 >>> mbox cmd response: success
2,776,149 UART: [afmc] ++
2,776,317 UART: [afmc] CDI.KEYID = 6
2,776,679 UART: [afmc] SUBJECT.KEYID = 7
2,777,104 UART: [afmc] AUTHORITY.KEYID = 5
2,812,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,386 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,134 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,862 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,747 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,466 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,456 UART: [afmc] --
2,855,582 UART: [cold-reset] --
2,856,332 UART: [state] Locking Datavault
2,857,729 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,333 UART: [state] Locking ICCM
2,858,901 UART: [exit] Launching FMC @ 0x40000130
2,864,230 UART:
2,864,246 UART: Running Caliptra FMC ...
2,864,654 UART:
2,864,708 UART: [state] CFI Enabled
2,875,273 UART: [fht] FMC Alias Private Key: 7
2,983,344 UART: [art] Extend RT PCRs Done
2,983,772 UART: [art] Lock RT PCRs Done
2,985,298 UART: [art] Populate DV Done
2,993,659 UART: [fht] FMC Alias Private Key: 7
2,994,601 UART: [art] Derive CDI
2,994,881 UART: [art] Store in in slot 0x4
3,080,266 UART: [art] Derive Key Pair
3,080,626 UART: [art] Store priv key in slot 0x5
3,093,818 UART: [art] Derive Key Pair - Done
3,108,534 UART: [art] Signing Cert with AUTHO
3,109,014 UART: RITY.KEYID = 7
3,123,894 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,659 UART: [art] PUB.X = 5B13D1801BE3C91078EF25E30A771C464177A91A410FA213D4434C8F9F182BADA32640CDB627BB18CD126CC9E5DE5986
3,131,429 UART: [art] PUB.Y = 53ECFC4FFF5A8282969368A39A7012B0AE0DD0DDA429CB4E2643641280FBD481A4B9100497E75CB19A231F1A7249CA9C
3,138,381 UART: [art] SIG.R = 4086EFE631EB38B67D315E2578D183CD09BAEAFD5D1B0C52931254B38D914D9B9B7218AF79AE232B9DF6D783507737A2
3,145,151 UART: [art] SIG.S = 50AA47A3C9A895C2D75C2C9FB5BE1092AE57920A4773963E621659918E0D0785024E39B3D11F198314269CA8968636C6
3,169,102 UART: Caliptra RT
3,169,355 UART: [state] CFI Enabled
3,277,610 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,479 ready_for_fw is high
1,060,479 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,362 >>> mbox cmd response: success
2,689,690 UART:
2,689,706 UART: Running Caliptra FMC ...
2,690,114 UART:
2,690,168 UART: [state] CFI Enabled
2,700,877 UART: [fht] FMC Alias Private Key: 7
2,808,816 UART: [art] Extend RT PCRs Done
2,809,244 UART: [art] Lock RT PCRs Done
2,811,052 UART: [art] Populate DV Done
2,819,285 UART: [fht] FMC Alias Private Key: 7
2,820,451 UART: [art] Derive CDI
2,820,731 UART: [art] Store in in slot 0x4
2,906,304 UART: [art] Derive Key Pair
2,906,664 UART: [art] Store priv key in slot 0x5
2,920,522 UART: [art] Derive Key Pair - Done
2,935,117 UART: [art] Signing Cert with AUTHO
2,935,597 UART: RITY.KEYID = 7
2,950,589 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,354 UART: [art] PUB.X = F572F8EEABF2B4FDFF09AD3B0276426A6D24A07E123381947AA3583CC6C05F4C45C44B50CAAC861012B0CCDC9E750F9B
2,958,133 UART: [art] PUB.Y = 0B2E15D8EEF3AAB631A71CFAC5D49259EB032216BC4AA6E5C6033AC3AE21830B63F79166C7892AA561A47EFFF6BB4A0F
2,965,088 UART: [art] SIG.R = 4D0BBA9157B6AA917B3F7D86A9A1060301B5EB6CC8F260A14A5720CF5C63794BF37C673BBD01F0CE9A6D1E7015BDD982
2,971,857 UART: [art] SIG.S = 568EFD98D3CF9E8CF646B3D288FD3598EBD7EB01438260F86F7971F54A4EC57A9F5DD9BD05A8C2533AE75F6DB74DB4E8
2,995,696 UART: Caliptra RT
2,995,949 UART: [state] CFI Enabled
3,103,220 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
893,695 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,820 UART: [kat] ++
897,972 UART: [kat] sha1
902,134 UART: [kat] SHA2-256
904,074 UART: [kat] SHA2-384
906,833 UART: [kat] SHA2-512-ACC
908,734 UART: [kat] ECC-384
918,627 UART: [kat] HMAC-384Kdf
923,397 UART: [kat] LMS
1,171,725 UART: [kat] --
1,172,376 UART: [cold-reset] ++
1,172,950 UART: [fht] FHT @ 0x50003400
1,175,695 UART: [idev] ++
1,175,863 UART: [idev] CDI.KEYID = 6
1,176,223 UART: [idev] SUBJECT.KEYID = 7
1,176,647 UART: [idev] UDS.KEYID = 0
1,176,992 ready_for_fw is high
1,176,992 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,529 UART: [idev] Erasing UDS.KEYID = 0
1,201,820 UART: [idev] Sha1 KeyId Algorithm
1,210,400 UART: [idev] --
1,211,346 UART: [ldev] ++
1,211,514 UART: [ldev] CDI.KEYID = 6
1,211,877 UART: [ldev] SUBJECT.KEYID = 5
1,212,303 UART: [ldev] AUTHORITY.KEYID = 7
1,212,766 UART: [ldev] FE.KEYID = 1
1,218,006 UART: [ldev] Erasing FE.KEYID = 1
1,244,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,650 UART: [ldev] --
1,283,951 UART: [fwproc] Wait for Commands...
1,284,593 UART: [fwproc] Recv command 0x46574c44
1,285,321 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,595 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,899 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,754 >>> mbox cmd response: success
2,776,918 UART: [afmc] ++
2,777,086 UART: [afmc] CDI.KEYID = 6
2,777,448 UART: [afmc] SUBJECT.KEYID = 7
2,777,873 UART: [afmc] AUTHORITY.KEYID = 5
2,813,544 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,179 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,927 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,655 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,540 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,259 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,161 UART: [afmc] --
2,857,229 UART: [cold-reset] --
2,858,079 UART: [state] Locking Datavault
2,859,420 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,024 UART: [state] Locking ICCM
2,860,580 UART: [exit] Launching FMC @ 0x40000130
2,865,909 UART:
2,865,925 UART: Running Caliptra FMC ...
2,866,333 UART:
2,866,476 UART: [state] CFI Enabled
2,877,243 UART: [fht] FMC Alias Private Key: 7
2,985,532 UART: [art] Extend RT PCRs Done
2,985,960 UART: [art] Lock RT PCRs Done
2,987,580 UART: [art] Populate DV Done
2,995,863 UART: [fht] FMC Alias Private Key: 7
2,996,835 UART: [art] Derive CDI
2,997,115 UART: [art] Store in in slot 0x4
3,083,008 UART: [art] Derive Key Pair
3,083,368 UART: [art] Store priv key in slot 0x5
3,096,698 UART: [art] Derive Key Pair - Done
3,110,963 UART: [art] Signing Cert with AUTHO
3,111,443 UART: RITY.KEYID = 7
3,126,775 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,540 UART: [art] PUB.X = 84EB97BE483DD5FDEF87D271E20D342CAFFAEE5E2A915CA6826C690AC55E6935ECD15E2FAB5048E50545B8F7FBB8B48C
3,134,325 UART: [art] PUB.Y = DEF37F488931E69BC04679778655FD987B038F91023EB9F63D698DA7C8F5F36DB5742E02C638D8A0F2398E53EBDCB0FC
3,141,274 UART: [art] SIG.R = 688F0276A2C6C3CBE9595DA3BFD9345811717451C80576378ECC7E1A30EBBB2EE92F872BC2F6A18F164451CE1A518D03
3,148,041 UART: [art] SIG.S = F33C45795215B3AD6C54C2A0832E7F8B884A73E9FB0A4F0026756D1DEBF403D37E3357AC5F9F13B2BDBE83153268725E
3,171,466 UART: Caliptra RT
3,171,811 UART: [state] CFI Enabled
3,279,268 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,554 ready_for_fw is high
1,061,554 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,721 >>> mbox cmd response: success
2,688,525 UART:
2,688,541 UART: Running Caliptra FMC ...
2,688,949 UART:
2,689,092 UART: [state] CFI Enabled
2,699,541 UART: [fht] FMC Alias Private Key: 7
2,807,570 UART: [art] Extend RT PCRs Done
2,807,998 UART: [art] Lock RT PCRs Done
2,809,542 UART: [art] Populate DV Done
2,817,437 UART: [fht] FMC Alias Private Key: 7
2,818,537 UART: [art] Derive CDI
2,818,817 UART: [art] Store in in slot 0x4
2,904,384 UART: [art] Derive Key Pair
2,904,744 UART: [art] Store priv key in slot 0x5
2,918,170 UART: [art] Derive Key Pair - Done
2,932,911 UART: [art] Signing Cert with AUTHO
2,933,391 UART: RITY.KEYID = 7
2,948,803 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,568 UART: [art] PUB.X = 37C13051F554C421CBB487C8EEC76739685B4C11CA70A0DBC9B9562778B3658D9C7C091F16F11E45AF152B1F617B5BD9
2,956,339 UART: [art] PUB.Y = 317308384428724FEFA49723DEC6FABFA3862ADB8464F1F7546FBF7C45E355201C8837B13976E4FA21F594D4380DEE23
2,963,285 UART: [art] SIG.R = 4B275E00DDACD4EBCEBEF838BA2695E9BBCFCA060E56E689D2CAD042F3B84249834C26F349228FE8F876E75B6E082024
2,970,040 UART: [art] SIG.S = 6B2210ED6FDD93EB007DFBAC3DDE16A1C4800A52AFFA52F72ED636CFEF897104C397C144BB72EFC4C2CE77FA68678206
2,993,170 UART: Caliptra RT
2,993,515 UART: [state] CFI Enabled
3,101,036 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,836 UART: [state] LifecycleState = Unprovisioned
85,491 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [kat] SHA2-256
890,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,001 UART: [kat] ++
895,153 UART: [kat] sha1
899,581 UART: [kat] SHA2-256
901,521 UART: [kat] SHA2-384
904,072 UART: [kat] SHA2-512-ACC
905,973 UART: [kat] ECC-384
915,332 UART: [kat] HMAC-384Kdf
919,836 UART: [kat] LMS
1,168,148 UART: [kat] --
1,168,793 UART: [cold-reset] ++
1,169,319 UART: [fht] FHT @ 0x50003400
1,172,067 UART: [idev] ++
1,172,235 UART: [idev] CDI.KEYID = 6
1,172,596 UART: [idev] SUBJECT.KEYID = 7
1,173,021 UART: [idev] UDS.KEYID = 0
1,173,367 ready_for_fw is high
1,173,367 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,265 UART: [idev] Erasing UDS.KEYID = 0
1,198,255 UART: [idev] Sha1 KeyId Algorithm
1,207,153 UART: [idev] --
1,208,116 UART: [ldev] ++
1,208,284 UART: [ldev] CDI.KEYID = 6
1,208,648 UART: [ldev] SUBJECT.KEYID = 5
1,209,075 UART: [ldev] AUTHORITY.KEYID = 7
1,209,538 UART: [ldev] FE.KEYID = 1
1,214,422 UART: [ldev] Erasing FE.KEYID = 1
1,241,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,996 UART: [ldev] --
1,280,420 UART: [fwproc] Wait for Commands...
1,281,113 UART: [fwproc] Recv command 0x46574c44
1,281,846 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,570 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,634 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,943 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,809 >>> mbox cmd response: success
2,773,982 UART: [afmc] ++
2,774,150 UART: [afmc] CDI.KEYID = 6
2,774,513 UART: [afmc] SUBJECT.KEYID = 7
2,774,939 UART: [afmc] AUTHORITY.KEYID = 5
2,810,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,803 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,532 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,415 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,134 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,977 UART: [afmc] --
2,853,935 UART: [cold-reset] --
2,854,855 UART: [state] Locking Datavault
2,855,994 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,598 UART: [state] Locking ICCM
2,857,098 UART: [exit] Launching FMC @ 0x40000130
2,862,427 UART:
2,862,443 UART: Running Caliptra FMC ...
2,862,851 UART:
2,862,905 UART: [state] CFI Enabled
2,873,364 UART: [fht] FMC Alias Private Key: 7
2,981,387 UART: [art] Extend RT PCRs Done
2,981,815 UART: [art] Lock RT PCRs Done
2,983,429 UART: [art] Populate DV Done
2,991,582 UART: [fht] FMC Alias Private Key: 7
2,992,564 UART: [art] Derive CDI
2,992,844 UART: [art] Store in in slot 0x4
3,078,807 UART: [art] Derive Key Pair
3,079,167 UART: [art] Store priv key in slot 0x5
3,092,109 UART: [art] Derive Key Pair - Done
3,106,705 UART: [art] Signing Cert with AUTHO
3,107,185 UART: RITY.KEYID = 7
3,122,241 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,006 UART: [art] PUB.X = 5D37FD98F1B82B633D10EDA1C30B58652FCA485AE1473DEC9B1C1D33E6B493730F7061DC102A51C162BC28B772409141
3,129,774 UART: [art] PUB.Y = EA62929F047E1BBFC8F48C35F7F01358E06B87AD4ECE8D33FD16599ED5DBF5D0840E100BC5F805E680CA26B2AED3AF73
3,136,732 UART: [art] SIG.R = 3C0CFAC4A045F2AEA992D8D4C0CEA22557F868135D1A4413760C502D6C446DC0D91A053865C9CD0CA3875A8D504189F5
3,143,496 UART: [art] SIG.S = 8D28C1C10F1AC2188B6049BD2D5CA7C7CB8D12722F8AC5BF312F990F100B973A009E223D4DB9F70F69EF56AA5885718A
3,167,109 UART: Caliptra RT
3,167,362 UART: [state] CFI Enabled
3,274,983 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,890 ready_for_fw is high
1,055,890 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,405 >>> mbox cmd response: success
2,684,515 UART:
2,684,531 UART: Running Caliptra FMC ...
2,684,939 UART:
2,684,993 UART: [state] CFI Enabled
2,695,594 UART: [fht] FMC Alias Private Key: 7
2,803,993 UART: [art] Extend RT PCRs Done
2,804,421 UART: [art] Lock RT PCRs Done
2,806,067 UART: [art] Populate DV Done
2,814,186 UART: [fht] FMC Alias Private Key: 7
2,815,326 UART: [art] Derive CDI
2,815,606 UART: [art] Store in in slot 0x4
2,901,201 UART: [art] Derive Key Pair
2,901,561 UART: [art] Store priv key in slot 0x5
2,914,579 UART: [art] Derive Key Pair - Done
2,929,474 UART: [art] Signing Cert with AUTHO
2,929,954 UART: RITY.KEYID = 7
2,944,864 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,629 UART: [art] PUB.X = AF36B79CEDA6556E9D2920CEDCCA645B9EFF0B23EBB94D971093DB1956FA3A22C8D5E94E907D90148171FA7831514F33
2,952,408 UART: [art] PUB.Y = 92205EFD0DB9A07E5420F0EF10C8922E33442FCDBCC3B8072BB1597A8158E2BD2EF96F917F9320BE7BD195755921F349
2,959,358 UART: [art] SIG.R = E65EA5072D0213717278E4905BD0054D86F2360C0BF0EA00CCC417A1DA9A92B6434809E88539D40EA462358E675D60A5
2,966,081 UART: [art] SIG.S = 6AC6B7866B2F1417F61C76F645A5D4E5EE6D5A387160A174A61542106158F73E9D606568D533E9A58FC62E895FC962D3
2,989,898 UART: Caliptra RT
2,990,151 UART: [state] CFI Enabled
3,097,512 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
891,471 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,600 UART: [kat] ++
895,752 UART: [kat] sha1
900,168 UART: [kat] SHA2-256
902,108 UART: [kat] SHA2-384
904,887 UART: [kat] SHA2-512-ACC
906,788 UART: [kat] ECC-384
916,209 UART: [kat] HMAC-384Kdf
920,881 UART: [kat] LMS
1,169,193 UART: [kat] --
1,169,936 UART: [cold-reset] ++
1,170,470 UART: [fht] FHT @ 0x50003400
1,173,100 UART: [idev] ++
1,173,268 UART: [idev] CDI.KEYID = 6
1,173,629 UART: [idev] SUBJECT.KEYID = 7
1,174,054 UART: [idev] UDS.KEYID = 0
1,174,400 ready_for_fw is high
1,174,400 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,064 UART: [idev] Erasing UDS.KEYID = 0
1,199,750 UART: [idev] Sha1 KeyId Algorithm
1,208,770 UART: [idev] --
1,209,907 UART: [ldev] ++
1,210,075 UART: [ldev] CDI.KEYID = 6
1,210,439 UART: [ldev] SUBJECT.KEYID = 5
1,210,866 UART: [ldev] AUTHORITY.KEYID = 7
1,211,329 UART: [ldev] FE.KEYID = 1
1,216,187 UART: [ldev] Erasing FE.KEYID = 1
1,242,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,181 UART: [ldev] --
1,281,543 UART: [fwproc] Wait for Commands...
1,282,122 UART: [fwproc] Recv command 0x46574c44
1,282,855 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,751 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,060 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,872 >>> mbox cmd response: success
2,772,889 UART: [afmc] ++
2,773,057 UART: [afmc] CDI.KEYID = 6
2,773,420 UART: [afmc] SUBJECT.KEYID = 7
2,773,846 UART: [afmc] AUTHORITY.KEYID = 5
2,809,499 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,777 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,528 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,257 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,140 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,859 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,648 UART: [afmc] --
2,852,624 UART: [cold-reset] --
2,853,622 UART: [state] Locking Datavault
2,854,769 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,373 UART: [state] Locking ICCM
2,856,009 UART: [exit] Launching FMC @ 0x40000130
2,861,338 UART:
2,861,354 UART: Running Caliptra FMC ...
2,861,762 UART:
2,861,905 UART: [state] CFI Enabled
2,872,780 UART: [fht] FMC Alias Private Key: 7
2,980,887 UART: [art] Extend RT PCRs Done
2,981,315 UART: [art] Lock RT PCRs Done
2,982,729 UART: [art] Populate DV Done
2,991,126 UART: [fht] FMC Alias Private Key: 7
2,992,086 UART: [art] Derive CDI
2,992,366 UART: [art] Store in in slot 0x4
3,078,341 UART: [art] Derive Key Pair
3,078,701 UART: [art] Store priv key in slot 0x5
3,091,917 UART: [art] Derive Key Pair - Done
3,107,033 UART: [art] Signing Cert with AUTHO
3,107,513 UART: RITY.KEYID = 7
3,122,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,360 UART: [art] PUB.X = 7BD335AD6412CE8AE8190322E3AA67BB5231CBFC17DCE51125F1E60159F57BD9AD51FDF12438CB7FDC894134B820DCD8
3,130,140 UART: [art] PUB.Y = 1D8531C3ADE8601B1016DEBF4053D8730BCFA599E07F75201F57A67DD3EBB003ED686DF69E3BFBFD0531DD80715C6574
3,137,093 UART: [art] SIG.R = C1518F9DC79DA39FF116F4C7FA27363D463F2BD19170DFBD960CE814EE96A6BC7C6467A8D3694B2CA090F313F4DCB938
3,143,874 UART: [art] SIG.S = 0CCBA9A97573E680DC256DAD9324F9C38CDBF8D1BEEB6E447F68CFA779C84E9BD9EB6687E8521E91BF229B2805A2C83B
3,167,455 UART: Caliptra RT
3,167,800 UART: [state] CFI Enabled
3,276,135 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,683 ready_for_fw is high
1,056,683 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,346 >>> mbox cmd response: success
2,685,496 UART:
2,685,512 UART: Running Caliptra FMC ...
2,685,920 UART:
2,686,063 UART: [state] CFI Enabled
2,696,760 UART: [fht] FMC Alias Private Key: 7
2,804,317 UART: [art] Extend RT PCRs Done
2,804,745 UART: [art] Lock RT PCRs Done
2,806,193 UART: [art] Populate DV Done
2,814,338 UART: [fht] FMC Alias Private Key: 7
2,815,430 UART: [art] Derive CDI
2,815,710 UART: [art] Store in in slot 0x4
2,901,163 UART: [art] Derive Key Pair
2,901,523 UART: [art] Store priv key in slot 0x5
2,914,599 UART: [art] Derive Key Pair - Done
2,929,395 UART: [art] Signing Cert with AUTHO
2,929,875 UART: RITY.KEYID = 7
2,944,927 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,692 UART: [art] PUB.X = B8AA9913C73073E1897CFF024B2B550788DDD964FE056D15E4DD890322D48ACAA7C983FE57891E2A9998AFB5A69349F4
2,952,456 UART: [art] PUB.Y = 250C761F3110E89300CE6FF861DD9E0DE225820E31FCCEF46638CBD067108319E0537B556B566F48849D0E7A0F3FCA1B
2,959,373 UART: [art] SIG.R = 6AFF22FECFC65C3C1A060984E24FF51834357C9AB14AA0CA0F4839040CFB3DB1A32FAE82C2FFA9C4ADD93744923139E1
2,966,146 UART: [art] SIG.S = E4561286E69A0C0826DC7FD85973DDD005C5A3586C0C69DFE993267F1BB94720CA2545EA90B10C46D4A0A17788E6C959
2,989,650 UART: Caliptra RT
2,989,995 UART: [state] CFI Enabled
3,097,132 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,139 UART: [kat] SHA2-256
882,070 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,185 UART: [kat] ++
886,337 UART: [kat] sha1
890,775 UART: [kat] SHA2-256
892,713 UART: [kat] SHA2-384
895,508 UART: [kat] SHA2-512-ACC
897,409 UART: [kat] ECC-384
903,164 UART: [kat] HMAC-384Kdf
907,870 UART: [kat] LMS
1,476,066 UART: [kat] --
1,476,821 UART: [cold-reset] ++
1,477,309 UART: [fht] Storing FHT @ 0x50003400
1,479,976 UART: [idev] ++
1,480,144 UART: [idev] CDI.KEYID = 6
1,480,504 UART: [idev] SUBJECT.KEYID = 7
1,480,928 UART: [idev] UDS.KEYID = 0
1,488,892 UART: [idev] Erasing UDS.KEYID = 0
1,505,090 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,778 UART: [idev] --
1,514,677 UART: [ldev] ++
1,514,845 UART: [ldev] CDI.KEYID = 6
1,515,208 UART: [ldev] SUBJECT.KEYID = 5
1,515,634 UART: [ldev] AUTHORITY.KEYID = 7
1,516,097 UART: [ldev] FE.KEYID = 1
1,521,493 UART: [ldev] Erasing FE.KEYID = 1
1,546,692 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,328 UART: [ldev] --
1,585,799 UART: [fwproc] Waiting for Commands...
1,586,496 UART: [fwproc] Received command 0x4d454153
1,590,560 >>> mbox cmd response data (12 bytes)
1,590,561 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,590,697 UART: [fwproc] Received command 0x46574c44
1,591,488 UART: [fwproc] Received Image of size 78704 bytes
2,482,296 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,508,648 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,538,000 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,620,311 >>> mbox cmd response: success
2,621,351 UART: [afmc] ++
2,621,519 UART: [afmc] CDI.KEYID = 6
2,621,881 UART: [afmc] SUBJECT.KEYID = 7
2,622,306 UART: [afmc] AUTHORITY.KEYID = 5
2,657,639 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,673,941 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,674,721 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,680,449 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,686,334 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,692,024 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,699,725 UART: [afmc] --
2,700,649 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,700,671 UART: [cold-reset] --
2,701,577 UART: [state] Locking Datavault
2,702,746 UART: [state] Locking PCR0, PCR1 and PCR31
2,703,350 UART: [state] Locking ICCM
2,703,882 UART: [exit] Launching FMC @ 0x40000130
2,709,211 UART:
2,709,227 UART: Running Caliptra FMC ...
2,709,635 UART:
2,709,689 UART: [state] CFI Enabled
2,720,080 UART: [fht] FMC Alias Private Key: 7
2,827,629 UART: [art] Extend RT PCRs Done
2,828,057 UART: [art] Lock RT PCRs Done
2,829,367 UART: [art] Populate DV Done
2,837,528 UART: [fht] FMC Alias Private Key: 7
2,838,608 UART: [art] Derive CDI
2,838,888 UART: [art] Store in in slot 0x4
2,925,027 UART: [art] Derive Key Pair
2,925,387 UART: [art] Store priv key in slot 0x5
2,938,427 UART: [art] Derive Key Pair - Done
2,953,152 UART: [art] Signing Cert with AUTHO
2,953,632 UART: RITY.KEYID = 7
2,968,648 UART: [art] Erasing AUTHORITY.KEYID = 7
2,969,413 UART: [art] PUB.X = A1C94F52BCA1D4C3559B3CB9D6610F3E94FF0ED6788D98BB148CE0737DD6D05FA64BEC2D5DED8A159F85F74595FE70ED
2,976,199 UART: [art] PUB.Y = 2411BD4D241B431E08FD7A4D3873B4E5A5338EA179BD47C002AF1FCDD1C9E2B032BA493886D646929B147CB6C478283A
2,983,149 UART: [art] SIG.R = C79CE9292ECF0561D4A244C3371C08605D21495231D737400FF3C719788AB9F38F15733D29CF05B6CEAC303AF5999CD2
2,989,907 UART: [art] SIG.S = C6D63FE269345681406A6B8F4136F8F48B9BD74ED5C9F1EB51D53EFD15DEB116374042B01345F9CC6722B45C545A7745
3,014,130 UART: mbox::rt_entry...
3,014,502 UART: ____ _ _ _ ____ _____
3,015,286 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,016,086 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,016,854 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,017,622 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,018,390 UART: |_|
3,018,702 UART:
3,138,312 UART: [rt] Runtime listening for mailbox commands...
3,139,493 >>> mbox cmd response data (48 bytes)
3,139,494 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,142,277 >>> mbox cmd response data (48 bytes)
3,142,278 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,157,415 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,445,191 >>> mbox cmd response data (12 bytes)
1,445,192 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,470,723 >>> mbox cmd response: success
2,525,618 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,531,577 UART:
2,531,593 UART: Running Caliptra FMC ...
2,532,001 UART:
2,532,055 UART: [state] CFI Enabled
2,542,472 UART: [fht] FMC Alias Private Key: 7
2,650,945 UART: [art] Extend RT PCRs Done
2,651,373 UART: [art] Lock RT PCRs Done
2,652,787 UART: [art] Populate DV Done
2,661,132 UART: [fht] FMC Alias Private Key: 7
2,662,076 UART: [art] Derive CDI
2,662,356 UART: [art] Store in in slot 0x4
2,747,955 UART: [art] Derive Key Pair
2,748,315 UART: [art] Store priv key in slot 0x5
2,761,537 UART: [art] Derive Key Pair - Done
2,776,633 UART: [art] Signing Cert with AUTHO
2,777,113 UART: RITY.KEYID = 7
2,792,209 UART: [art] Erasing AUTHORITY.KEYID = 7
2,792,974 UART: [art] PUB.X = 18E16FB92EC7FE7247590AD6C816F32B3BB116BC4C52C077DC313DA7327A354FB3BB42914EA348900BBD4E8405EF1088
2,799,743 UART: [art] PUB.Y = DBAA760A369AA77D02B8585D70AE3E380823C7730304A8F6393B99EE632024C6935F21B9D5F8932F10AF573575CA65C3
2,806,676 UART: [art] SIG.R = 7EA28EEE2149BCBF202DABFEAB08801F5CDCD1CECCE4E0349C1566B64A914A5B19C92A9B9DA13630BA33F97A6B3E4509
2,813,464 UART: [art] SIG.S = 575009C4BF7CE0C6A7B3011A29596E307F25A711D99BD41A12C9034AA56D8213522DD94410717A14E0E1CB597753110E
2,837,385 UART: mbox::rt_entry...
2,837,757 UART: ____ _ _ _ ____ _____
2,838,541 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,839,341 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,840,109 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,840,877 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,841,645 UART: |_|
2,841,957 UART:
2,961,365 UART: [rt] Runtime listening for mailbox commands...
2,962,546 >>> mbox cmd response data (48 bytes)
2,962,547 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,965,330 >>> mbox cmd response data (48 bytes)
2,965,331 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,980,468 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,860 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,538 UART: [kat] SHA2-256
882,469 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,584 UART: [kat] ++
886,736 UART: [kat] sha1
891,002 UART: [kat] SHA2-256
892,940 UART: [kat] SHA2-384
895,763 UART: [kat] SHA2-512-ACC
897,664 UART: [kat] ECC-384
903,333 UART: [kat] HMAC-384Kdf
907,851 UART: [kat] LMS
1,476,047 UART: [kat] --
1,476,978 UART: [cold-reset] ++
1,477,364 UART: [fht] Storing FHT @ 0x50003400
1,480,181 UART: [idev] ++
1,480,349 UART: [idev] CDI.KEYID = 6
1,480,709 UART: [idev] SUBJECT.KEYID = 7
1,481,133 UART: [idev] UDS.KEYID = 0
1,488,829 UART: [idev] Erasing UDS.KEYID = 0
1,505,181 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,869 UART: [idev] --
1,514,768 UART: [ldev] ++
1,514,936 UART: [ldev] CDI.KEYID = 6
1,515,299 UART: [ldev] SUBJECT.KEYID = 5
1,515,725 UART: [ldev] AUTHORITY.KEYID = 7
1,516,188 UART: [ldev] FE.KEYID = 1
1,521,406 UART: [ldev] Erasing FE.KEYID = 1
1,547,637 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,549 UART: [ldev] --
1,586,900 UART: [fwproc] Waiting for Commands...
1,587,601 UART: [fwproc] Received command 0x4d454153
1,591,665 >>> mbox cmd response data (12 bytes)
1,591,666 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,591,810 UART: [fwproc] Received command 0x46574c44
1,592,601 UART: [fwproc] Received Image of size 78704 bytes
2,483,987 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,510,585 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,539,937 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,622,330 >>> mbox cmd response: success
2,623,458 UART: [afmc] ++
2,623,626 UART: [afmc] CDI.KEYID = 6
2,623,988 UART: [afmc] SUBJECT.KEYID = 7
2,624,413 UART: [afmc] AUTHORITY.KEYID = 5
2,658,978 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,675,272 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,676,052 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,681,780 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,687,665 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,693,355 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,701,118 UART: [afmc] --
2,701,990 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,702,012 UART: [cold-reset] --
2,702,654 UART: [state] Locking Datavault
2,703,649 UART: [state] Locking PCR0, PCR1 and PCR31
2,704,253 UART: [state] Locking ICCM
2,704,841 UART: [exit] Launching FMC @ 0x40000130
2,710,170 UART:
2,710,186 UART: Running Caliptra FMC ...
2,710,594 UART:
2,710,737 UART: [state] CFI Enabled
2,721,298 UART: [fht] FMC Alias Private Key: 7
2,829,579 UART: [art] Extend RT PCRs Done
2,830,007 UART: [art] Lock RT PCRs Done
2,831,707 UART: [art] Populate DV Done
2,839,928 UART: [fht] FMC Alias Private Key: 7
2,841,080 UART: [art] Derive CDI
2,841,360 UART: [art] Store in in slot 0x4
2,927,291 UART: [art] Derive Key Pair
2,927,651 UART: [art] Store priv key in slot 0x5
2,941,109 UART: [art] Derive Key Pair - Done
2,955,720 UART: [art] Signing Cert with AUTHO
2,956,200 UART: RITY.KEYID = 7
2,971,852 UART: [art] Erasing AUTHORITY.KEYID = 7
2,972,617 UART: [art] PUB.X = F6AF82205E44D512A7ED8372982F393020215B191DC201A8B617F281879CD03EA43F4A790802FB5F9E84656186D38196
2,979,368 UART: [art] PUB.Y = 00A180A327A898E57C48972994BD45AB62A0199E48BDDFE68D95FBDF49EBBFF8E9496AEB7755485B7D81387BC966BFC8
2,986,308 UART: [art] SIG.R = F484A2BF6EB472A7DB3685778512923113C8A48324511B0B0F9D1563E803243515AAD66D1A6EF07EB13F50080ABF8FAF
2,993,065 UART: [art] SIG.S = 347555D8F5B9B659D02A3641775C4EA9E845FEDF5AF797903CD64178D3A6430CB7E5AC071DA02768C15B6E0EAACD612B
3,016,205 UART: mbox::rt_entry...
3,016,577 UART: ____ _ _ _ ____ _____
3,017,361 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,018,161 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,018,929 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,019,697 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,020,465 UART: |_|
3,020,777 UART:
3,140,364 UART: [rt] Runtime listening for mailbox commands...
3,141,545 >>> mbox cmd response data (48 bytes)
3,141,546 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,144,329 >>> mbox cmd response data (48 bytes)
3,144,330 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,159,467 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,443,454 >>> mbox cmd response data (12 bytes)
1,443,455 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,468,424 >>> mbox cmd response: success
2,523,895 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,529,950 UART:
2,529,966 UART: Running Caliptra FMC ...
2,530,374 UART:
2,530,517 UART: [state] CFI Enabled
2,540,720 UART: [fht] FMC Alias Private Key: 7
2,649,179 UART: [art] Extend RT PCRs Done
2,649,607 UART: [art] Lock RT PCRs Done
2,651,043 UART: [art] Populate DV Done
2,659,384 UART: [fht] FMC Alias Private Key: 7
2,660,364 UART: [art] Derive CDI
2,660,644 UART: [art] Store in in slot 0x4
2,746,583 UART: [art] Derive Key Pair
2,746,943 UART: [art] Store priv key in slot 0x5
2,760,659 UART: [art] Derive Key Pair - Done
2,775,649 UART: [art] Signing Cert with AUTHO
2,776,129 UART: RITY.KEYID = 7
2,790,873 UART: [art] Erasing AUTHORITY.KEYID = 7
2,791,638 UART: [art] PUB.X = F0F47C1800F345948B3CA8F8705D93AD27CD3D39F903429B2E95DDA9C0D5BAE60A052E10DB8ECA21612C2ED9C92CCFEF
2,798,397 UART: [art] PUB.Y = 409496A89B8DE531C5B4894FD0308A157CFAC84651996ABD0CFEDD20C844E8999A6CC253845F8D3A2938CAF7B14E4644
2,805,350 UART: [art] SIG.R = 292C162C234B870D4F3F76BB6601BF450C950359F6F06CD40326813121EE736E68A1679D4F1660B5C8EF3A9EC7E2C617
2,812,103 UART: [art] SIG.S = AAB0E122C1003A1ED90D170647A010775BFCDBB11DC9B73305E49AC64F4289D5E85C66F322C356447B6873ADBE13A1EA
2,835,815 UART: mbox::rt_entry...
2,836,187 UART: ____ _ _ _ ____ _____
2,836,971 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,837,771 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,838,539 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,839,307 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,840,075 UART: |_|
2,840,387 UART:
2,958,440 UART: [rt] Runtime listening for mailbox commands...
2,959,621 >>> mbox cmd response data (48 bytes)
2,959,622 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,962,405 >>> mbox cmd response data (48 bytes)
2,962,406 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,977,543 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,780 UART: [kat] SHA2-256
893,430 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,555 UART: [kat] ++
897,707 UART: [kat] sha1
902,001 UART: [kat] SHA2-256
903,941 UART: [kat] SHA2-384
906,746 UART: [kat] SHA2-512-ACC
908,647 UART: [kat] ECC-384
918,456 UART: [kat] HMAC-384Kdf
923,132 UART: [kat] LMS
1,171,460 UART: [kat] --
1,171,997 UART: [cold-reset] ++
1,172,575 UART: [fht] FHT @ 0x50003400
1,175,176 UART: [idev] ++
1,175,344 UART: [idev] CDI.KEYID = 6
1,175,704 UART: [idev] SUBJECT.KEYID = 7
1,176,128 UART: [idev] UDS.KEYID = 0
1,184,080 UART: [idev] Erasing UDS.KEYID = 0
1,201,351 UART: [idev] Sha1 KeyId Algorithm
1,209,829 UART: [idev] --
1,210,883 UART: [ldev] ++
1,211,051 UART: [ldev] CDI.KEYID = 6
1,211,414 UART: [ldev] SUBJECT.KEYID = 5
1,211,840 UART: [ldev] AUTHORITY.KEYID = 7
1,212,303 UART: [ldev] FE.KEYID = 1
1,217,395 UART: [ldev] Erasing FE.KEYID = 1
1,243,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,869 UART: [ldev] --
1,283,272 UART: [fwproc] Wait for Commands...
1,283,948 UART: [fwproc] Recv command 0x4d454153
1,287,957 >>> mbox cmd response data (12 bytes)
1,287,958 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,288,209 UART: [fwproc] Recv command 0x46574c44
1,288,937 UART: [fwproc] Recv'd Img size: 78704 bytes
2,180,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,207,081 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,236,385 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,318,836 >>> mbox cmd response: success
2,319,964 UART: [afmc] ++
2,320,132 UART: [afmc] CDI.KEYID = 6
2,320,494 UART: [afmc] SUBJECT.KEYID = 7
2,320,919 UART: [afmc] AUTHORITY.KEYID = 5
2,356,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,373,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,374,187 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,379,915 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,385,800 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,391,519 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,399,357 UART: [afmc] --
2,400,293 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,400,315 UART: [cold-reset] --
2,401,205 UART: [state] Locking Datavault
2,402,398 UART: [state] Locking PCR0, PCR1 and PCR31
2,403,002 UART: [state] Locking ICCM
2,403,614 UART: [exit] Launching FMC @ 0x40000130
2,408,943 UART:
2,408,959 UART: Running Caliptra FMC ...
2,409,367 UART:
2,409,421 UART: [state] CFI Enabled
2,419,520 UART: [fht] FMC Alias Private Key: 7
2,527,387 UART: [art] Extend RT PCRs Done
2,527,815 UART: [art] Lock RT PCRs Done
2,529,455 UART: [art] Populate DV Done
2,537,920 UART: [fht] FMC Alias Private Key: 7
2,538,948 UART: [art] Derive CDI
2,539,228 UART: [art] Store in in slot 0x4
2,625,073 UART: [art] Derive Key Pair
2,625,433 UART: [art] Store priv key in slot 0x5
2,638,407 UART: [art] Derive Key Pair - Done
2,653,087 UART: [art] Signing Cert with AUTHO
2,653,567 UART: RITY.KEYID = 7
2,668,983 UART: [art] Erasing AUTHORITY.KEYID = 7
2,669,748 UART: [art] PUB.X = BA9254FECDDDFC341CC8A53145C89C2754D7F7D81A6CCF9F7E5731EFFE11D2110DADC79DEE593E29D0D37D8206582352
2,676,530 UART: [art] PUB.Y = 9204B333483843AB3247716362D075BA468B50EFEDC3999401E8EC7C5A8BB620FA40B74EFC3FCAA4AC688E3E1C0F810B
2,683,478 UART: [art] SIG.R = 0429A021E09B1808DC14C3CB75A828D0C0FD4506B54895D21EB252507AA2FE0B8BB1F9890A3F585DA9A1AFDF51AF8348
2,690,243 UART: [art] SIG.S = 446B80FF74DEF92ED207EBA6B9D1B9624C5F4668141ADC56A4920A34B0861A93857422DAC6837CACA0F89DA3620BD9D5
2,713,839 UART: mbox::rt_entry...
2,714,211 UART: ____ _ _ _ ____ _____
2,714,995 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,715,795 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,716,563 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,717,331 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,718,099 UART: |_|
2,718,411 UART:
2,838,084 UART: [rt] Runtime listening for mailbox commands...
2,839,265 >>> mbox cmd response data (48 bytes)
2,839,266 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,842,049 >>> mbox cmd response data (48 bytes)
2,842,050 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,857,187 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,489 >>> mbox cmd response data (12 bytes)
1,142,490 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,168,449 >>> mbox cmd response: success
2,223,820 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,229,981 UART:
2,229,997 UART: Running Caliptra FMC ...
2,230,405 UART:
2,230,459 UART: [state] CFI Enabled
2,241,000 UART: [fht] FMC Alias Private Key: 7
2,349,397 UART: [art] Extend RT PCRs Done
2,349,825 UART: [art] Lock RT PCRs Done
2,351,579 UART: [art] Populate DV Done
2,359,944 UART: [fht] FMC Alias Private Key: 7
2,361,002 UART: [art] Derive CDI
2,361,282 UART: [art] Store in in slot 0x4
2,447,285 UART: [art] Derive Key Pair
2,447,645 UART: [art] Store priv key in slot 0x5
2,460,771 UART: [art] Derive Key Pair - Done
2,475,385 UART: [art] Signing Cert with AUTHO
2,475,865 UART: RITY.KEYID = 7
2,490,917 UART: [art] Erasing AUTHORITY.KEYID = 7
2,491,682 UART: [art] PUB.X = 77325F0811FC1B2293DBD7EEE3CDB97FE734C0E4A52BC732EC81412B3603A60818E7BF913B981CF62864D37B7DCDC3F1
2,498,455 UART: [art] PUB.Y = 83F4DC73201504E7C69C904A75664B0C80A4B5F112C49432E9A3496880A82581EDA5308D74DB2995A0CDCDDF52EB6A65
2,505,401 UART: [art] SIG.R = A14C04330F4F83A5FA6787452B348D35172D8D5594308CF4E5C4B64FC63CBDA033A759688F5273D2DDCA3C478C434E88
2,512,167 UART: [art] SIG.S = 6DC95CD2BBB46F343113268A6527204D7769F577DB4E42744DFA42B6B2E135447E923463E7B75E95342EC5E405A7D207
2,535,832 UART: mbox::rt_entry...
2,536,204 UART: ____ _ _ _ ____ _____
2,536,988 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,537,788 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,538,556 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,539,324 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,540,092 UART: |_|
2,540,404 UART:
2,659,127 UART: [rt] Runtime listening for mailbox commands...
2,660,308 >>> mbox cmd response data (48 bytes)
2,660,309 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,663,092 >>> mbox cmd response data (48 bytes)
2,663,093 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,678,230 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
893,639 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,764 UART: [kat] ++
897,916 UART: [kat] sha1
902,108 UART: [kat] SHA2-256
904,048 UART: [kat] SHA2-384
906,913 UART: [kat] SHA2-512-ACC
908,814 UART: [kat] ECC-384
918,257 UART: [kat] HMAC-384Kdf
922,947 UART: [kat] LMS
1,171,275 UART: [kat] --
1,172,188 UART: [cold-reset] ++
1,172,622 UART: [fht] FHT @ 0x50003400
1,175,435 UART: [idev] ++
1,175,603 UART: [idev] CDI.KEYID = 6
1,175,963 UART: [idev] SUBJECT.KEYID = 7
1,176,387 UART: [idev] UDS.KEYID = 0
1,184,353 UART: [idev] Erasing UDS.KEYID = 0
1,200,860 UART: [idev] Sha1 KeyId Algorithm
1,209,350 UART: [idev] --
1,210,290 UART: [ldev] ++
1,210,458 UART: [ldev] CDI.KEYID = 6
1,210,821 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,162 UART: [ldev] Erasing FE.KEYID = 1
1,243,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,590 UART: [ldev] --
1,282,909 UART: [fwproc] Wait for Commands...
1,283,693 UART: [fwproc] Recv command 0x4d454153
1,287,702 >>> mbox cmd response data (12 bytes)
1,287,703 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,287,836 UART: [fwproc] Recv command 0x46574c44
1,288,564 UART: [fwproc] Recv'd Img size: 78704 bytes
2,178,345 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,205,104 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,234,408 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,316,671 >>> mbox cmd response: success
2,317,901 UART: [afmc] ++
2,318,069 UART: [afmc] CDI.KEYID = 6
2,318,431 UART: [afmc] SUBJECT.KEYID = 7
2,318,856 UART: [afmc] AUTHORITY.KEYID = 5
2,355,439 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,371,762 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,372,510 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,378,238 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,384,123 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,389,842 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,397,488 UART: [afmc] --
2,398,358 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,398,380 UART: [cold-reset] --
2,399,330 UART: [state] Locking Datavault
2,400,245 UART: [state] Locking PCR0, PCR1 and PCR31
2,400,849 UART: [state] Locking ICCM
2,401,357 UART: [exit] Launching FMC @ 0x40000130
2,406,686 UART:
2,406,702 UART: Running Caliptra FMC ...
2,407,110 UART:
2,407,253 UART: [state] CFI Enabled
2,418,080 UART: [fht] FMC Alias Private Key: 7
2,526,075 UART: [art] Extend RT PCRs Done
2,526,503 UART: [art] Lock RT PCRs Done
2,528,131 UART: [art] Populate DV Done
2,536,462 UART: [fht] FMC Alias Private Key: 7
2,537,598 UART: [art] Derive CDI
2,537,878 UART: [art] Store in in slot 0x4
2,623,571 UART: [art] Derive Key Pair
2,623,931 UART: [art] Store priv key in slot 0x5
2,637,063 UART: [art] Derive Key Pair - Done
2,651,577 UART: [art] Signing Cert with AUTHO
2,652,057 UART: RITY.KEYID = 7
2,667,251 UART: [art] Erasing AUTHORITY.KEYID = 7
2,668,016 UART: [art] PUB.X = 15792EDE7ED8981A363BA4F61ABB4A863BCC427393BBCF07455D77A0133FF4C90E1078289EFBF13AF442044B5927C540
2,674,783 UART: [art] PUB.Y = 94FA972AD5FADD841A0C502C251E55072755982D11F1464E2511341B88BED2496523D08EC546D522C5AE560FA092A2A2
2,681,722 UART: [art] SIG.R = 70A5C2AD9982393E02A7DD287E0FBEC8EBCA98A2A29F9980DBC597B5DE99D9CF13E2380B8F5A209E5F0B4ABC806BD58A
2,688,502 UART: [art] SIG.S = 0A0CFAEEB7D3167D989DEE232F2E14980C17019FF3C76052E9A836C6EB425E66FC937E9425D869273387E01AEDA67498
2,712,371 UART: mbox::rt_entry...
2,712,743 UART: ____ _ _ _ ____ _____
2,713,527 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,714,327 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,715,095 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,715,863 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,716,631 UART: |_|
2,716,943 UART:
2,834,480 UART: [rt] Runtime listening for mailbox commands...
2,835,661 >>> mbox cmd response data (48 bytes)
2,835,662 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,838,445 >>> mbox cmd response data (48 bytes)
2,838,446 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,853,583 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,254 >>> mbox cmd response data (12 bytes)
1,143,255 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,169,704 >>> mbox cmd response: success
2,225,789 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,232,224 UART:
2,232,240 UART: Running Caliptra FMC ...
2,232,648 UART:
2,232,791 UART: [state] CFI Enabled
2,243,304 UART: [fht] FMC Alias Private Key: 7
2,350,929 UART: [art] Extend RT PCRs Done
2,351,357 UART: [art] Lock RT PCRs Done
2,353,125 UART: [art] Populate DV Done
2,361,394 UART: [fht] FMC Alias Private Key: 7
2,362,406 UART: [art] Derive CDI
2,362,686 UART: [art] Store in in slot 0x4
2,448,417 UART: [art] Derive Key Pair
2,448,777 UART: [art] Store priv key in slot 0x5
2,462,121 UART: [art] Derive Key Pair - Done
2,476,887 UART: [art] Signing Cert with AUTHO
2,477,367 UART: RITY.KEYID = 7
2,492,755 UART: [art] Erasing AUTHORITY.KEYID = 7
2,493,520 UART: [art] PUB.X = 84AD3B0B2F1FA5E6C553946437A101CBDA635A15DA4E3F4B5C60F4F9ACA6EE1D7F8ACA37B68B4B3A8BEDBB64ED085CBA
2,500,313 UART: [art] PUB.Y = 1DD75575E93568D60A56CB8FECB31F2DE534A4BFD360D4235F56E7DF5AD23D5FBC3832142878302E69838C5F7E241C7B
2,507,268 UART: [art] SIG.R = E27875BD21FD6BF1C41602B58FCC7C7E4186D614CD5D9DD0DF34AA5C93D3425BD19533FAE6E1AFD9C4618A7F67304F45
2,514,051 UART: [art] SIG.S = E501B298E039374623E5614B22E80D1293BA55F7580D7C00526362664FCC852F2BE242DF5F800B8D3010EA3FC767F1DD
2,537,484 UART: mbox::rt_entry...
2,537,856 UART: ____ _ _ _ ____ _____
2,538,640 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,539,440 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,540,208 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,540,976 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,541,744 UART: |_|
2,542,056 UART:
2,660,946 UART: [rt] Runtime listening for mailbox commands...
2,662,127 >>> mbox cmd response data (48 bytes)
2,662,128 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,664,911 >>> mbox cmd response data (48 bytes)
2,664,912 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,680,049 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,494 UART: [state] LifecycleState = Unprovisioned
85,149 UART: [state] DebugLocked = No
85,759 UART: [state] WD Timer not started. Device not locked for debugging
86,970 UART: [kat] SHA2-256
890,520 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,649 UART: [kat] ++
894,801 UART: [kat] sha1
899,177 UART: [kat] SHA2-256
901,117 UART: [kat] SHA2-384
903,928 UART: [kat] SHA2-512-ACC
905,829 UART: [kat] ECC-384
915,484 UART: [kat] HMAC-384Kdf
919,974 UART: [kat] LMS
1,168,286 UART: [kat] --
1,169,017 UART: [cold-reset] ++
1,169,517 UART: [fht] FHT @ 0x50003400
1,172,119 UART: [idev] ++
1,172,287 UART: [idev] CDI.KEYID = 6
1,172,648 UART: [idev] SUBJECT.KEYID = 7
1,173,073 UART: [idev] UDS.KEYID = 0
1,181,275 UART: [idev] Erasing UDS.KEYID = 0
1,198,461 UART: [idev] Sha1 KeyId Algorithm
1,207,279 UART: [idev] --
1,208,250 UART: [ldev] ++
1,208,418 UART: [ldev] CDI.KEYID = 6
1,208,782 UART: [ldev] SUBJECT.KEYID = 5
1,209,209 UART: [ldev] AUTHORITY.KEYID = 7
1,209,672 UART: [ldev] FE.KEYID = 1
1,214,758 UART: [ldev] Erasing FE.KEYID = 1
1,240,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,490 UART: [ldev] --
1,279,762 UART: [fwproc] Wait for Commands...
1,280,361 UART: [fwproc] Recv command 0x4d454153
1,284,388 >>> mbox cmd response data (12 bytes)
1,284,389 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,284,564 UART: [fwproc] Recv command 0x46574c44
1,285,297 UART: [fwproc] Recv'd Img size: 78704 bytes
2,175,487 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,991 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,232,300 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,314,800 >>> mbox cmd response: success
2,316,033 UART: [afmc] ++
2,316,201 UART: [afmc] CDI.KEYID = 6
2,316,564 UART: [afmc] SUBJECT.KEYID = 7
2,316,990 UART: [afmc] AUTHORITY.KEYID = 5
2,352,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,369,009 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,760 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,375,489 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,381,372 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,387,091 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,980 UART: [afmc] --
2,395,872 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,395,894 UART: [cold-reset] --
2,396,636 UART: [state] Locking Datavault
2,397,971 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,575 UART: [state] Locking ICCM
2,399,217 UART: [exit] Launching FMC @ 0x40000130
2,404,546 UART:
2,404,562 UART: Running Caliptra FMC ...
2,404,970 UART:
2,405,024 UART: [state] CFI Enabled
2,415,319 UART: [fht] FMC Alias Private Key: 7
2,522,656 UART: [art] Extend RT PCRs Done
2,523,084 UART: [art] Lock RT PCRs Done
2,524,598 UART: [art] Populate DV Done
2,532,761 UART: [fht] FMC Alias Private Key: 7
2,533,723 UART: [art] Derive CDI
2,534,003 UART: [art] Store in in slot 0x4
2,619,826 UART: [art] Derive Key Pair
2,620,186 UART: [art] Store priv key in slot 0x5
2,633,802 UART: [art] Derive Key Pair - Done
2,649,091 UART: [art] Signing Cert with AUTHO
2,649,571 UART: RITY.KEYID = 7
2,664,363 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,128 UART: [art] PUB.X = 2EFF1E399B9EA6CD5EB347CB44130E5E7E663B5CF38574E465983D7E294744CAFEFCF129A480F750BB05FB857EBC3E6A
2,671,910 UART: [art] PUB.Y = C12B3007C5CE6AEEBFEBAF5B2B84EFE77EC9C24E31E3F5947E029BD5AEFC27B0E02309AD810B7C3E6640B3F8B2AC328C
2,678,876 UART: [art] SIG.R = 0A42D9D715E2A38A3CFC165E4DCCADBF506C178789FBD594E75BB752D39665645BF8AED4D208B054F488942D99BBC40D
2,685,651 UART: [art] SIG.S = D4563771E29189EFED9B578CCBFD791FAA93D2C89EE2A3404C9F3337DB831B73A6C2B4625D4A5E7285CBC38D8F06897D
2,708,897 UART: mbox::rt_entry...
2,709,269 UART: ____ _ _ _ ____ _____
2,710,053 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,853 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,621 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,389 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,157 UART: |_|
2,713,469 UART:
2,832,368 UART: [rt] Runtime listening for mailbox commands...
2,833,549 >>> mbox cmd response data (48 bytes)
2,833,550 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,836,333 >>> mbox cmd response data (48 bytes)
2,836,334 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,851,471 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,824 >>> mbox cmd response data (12 bytes)
1,138,825 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,423 >>> mbox cmd response: success
2,221,216 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,226,985 UART:
2,227,001 UART: Running Caliptra FMC ...
2,227,409 UART:
2,227,463 UART: [state] CFI Enabled
2,237,856 UART: [fht] FMC Alias Private Key: 7
2,346,061 UART: [art] Extend RT PCRs Done
2,346,489 UART: [art] Lock RT PCRs Done
2,347,943 UART: [art] Populate DV Done
2,356,064 UART: [fht] FMC Alias Private Key: 7
2,357,206 UART: [art] Derive CDI
2,357,486 UART: [art] Store in in slot 0x4
2,442,837 UART: [art] Derive Key Pair
2,443,197 UART: [art] Store priv key in slot 0x5
2,456,569 UART: [art] Derive Key Pair - Done
2,471,760 UART: [art] Signing Cert with AUTHO
2,472,240 UART: RITY.KEYID = 7
2,487,274 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,039 UART: [art] PUB.X = 7DC7FFA667C725E284EFF1B2DEDA0EAF01B7D540FB75A86A32E75000E50319F405291E7A832CCA91A017C373CB8C01AF
2,494,788 UART: [art] PUB.Y = AD9FDA9F40948849F69B6229727987405FF24F834DC5601F7B6A35F956F776BA67244FAE2AAE7F4EA8F45FB8DAD2F14F
2,501,750 UART: [art] SIG.R = 5D4F682C81C37C97949A29B00AC562E640A794064E35BCB9F73E6B4BC00989C2F72AC81447E29263D4B2313FCCAAB29D
2,508,517 UART: [art] SIG.S = 73A22FE1A5E1F0FCA16B1C5070F06FD307FE6703332AA527E11ADD5099B758B33821DA821CDF6B557463D0B14FB8B117
2,532,148 UART: mbox::rt_entry...
2,532,520 UART: ____ _ _ _ ____ _____
2,533,304 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,104 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,872 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,640 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,408 UART: |_|
2,536,720 UART:
2,654,391 UART: [rt] Runtime listening for mailbox commands...
2,655,572 >>> mbox cmd response data (48 bytes)
2,655,573 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,658,356 >>> mbox cmd response data (48 bytes)
2,658,357 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,673,494 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,722 UART: [state] DebugLocked = No
86,348 UART: [state] WD Timer not started. Device not locked for debugging
87,663 UART: [kat] SHA2-256
891,213 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,342 UART: [kat] ++
895,494 UART: [kat] sha1
899,754 UART: [kat] SHA2-256
901,694 UART: [kat] SHA2-384
904,417 UART: [kat] SHA2-512-ACC
906,318 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
921,027 UART: [kat] LMS
1,169,339 UART: [kat] --
1,170,118 UART: [cold-reset] ++
1,170,486 UART: [fht] FHT @ 0x50003400
1,173,116 UART: [idev] ++
1,173,284 UART: [idev] CDI.KEYID = 6
1,173,645 UART: [idev] SUBJECT.KEYID = 7
1,174,070 UART: [idev] UDS.KEYID = 0
1,182,154 UART: [idev] Erasing UDS.KEYID = 0
1,199,406 UART: [idev] Sha1 KeyId Algorithm
1,208,490 UART: [idev] --
1,209,515 UART: [ldev] ++
1,209,683 UART: [ldev] CDI.KEYID = 6
1,210,047 UART: [ldev] SUBJECT.KEYID = 5
1,210,474 UART: [ldev] AUTHORITY.KEYID = 7
1,210,937 UART: [ldev] FE.KEYID = 1
1,216,063 UART: [ldev] Erasing FE.KEYID = 1
1,242,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,115 UART: [ldev] --
1,281,455 UART: [fwproc] Wait for Commands...
1,282,084 UART: [fwproc] Recv command 0x4d454153
1,286,111 >>> mbox cmd response data (12 bytes)
1,286,112 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,286,231 UART: [fwproc] Recv command 0x46574c44
1,286,964 UART: [fwproc] Recv'd Img size: 78704 bytes
2,176,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,204,040 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,233,349 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,315,605 >>> mbox cmd response: success
2,316,624 UART: [afmc] ++
2,316,792 UART: [afmc] CDI.KEYID = 6
2,317,155 UART: [afmc] SUBJECT.KEYID = 7
2,317,581 UART: [afmc] AUTHORITY.KEYID = 5
2,353,866 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,369,964 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,370,715 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,376,444 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,382,327 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,388,046 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,395,753 UART: [afmc] --
2,396,739 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,396,761 UART: [cold-reset] --
2,397,395 UART: [state] Locking Datavault
2,398,456 UART: [state] Locking PCR0, PCR1 and PCR31
2,399,060 UART: [state] Locking ICCM
2,399,660 UART: [exit] Launching FMC @ 0x40000130
2,404,989 UART:
2,405,005 UART: Running Caliptra FMC ...
2,405,413 UART:
2,405,556 UART: [state] CFI Enabled
2,416,153 UART: [fht] FMC Alias Private Key: 7
2,524,000 UART: [art] Extend RT PCRs Done
2,524,428 UART: [art] Lock RT PCRs Done
2,525,540 UART: [art] Populate DV Done
2,534,009 UART: [fht] FMC Alias Private Key: 7
2,535,149 UART: [art] Derive CDI
2,535,429 UART: [art] Store in in slot 0x4
2,621,230 UART: [art] Derive Key Pair
2,621,590 UART: [art] Store priv key in slot 0x5
2,634,902 UART: [art] Derive Key Pair - Done
2,649,628 UART: [art] Signing Cert with AUTHO
2,650,108 UART: RITY.KEYID = 7
2,665,304 UART: [art] Erasing AUTHORITY.KEYID = 7
2,666,069 UART: [art] PUB.X = 3EE45A24F3882C5E07A1F2DEC1C7AA5DCBD296491C0B43EF0BA6F95A57EE2351BB4430634D7BBE46D2D32CA2C6F037B2
2,672,850 UART: [art] PUB.Y = B9A563D18529FFF9F7B33CEA62B042C80E1334876F54F9301124F14FAAB447B52516B8558779171CF9973CE98E4D006F
2,679,773 UART: [art] SIG.R = 40DA88627093016C68DB2D30A95B85BA0E14554806102C8021EFB47724F8B91743FB346B63F8F64154318EFB7BE9CAD6
2,686,532 UART: [art] SIG.S = 21521A2B2E922679C3BC7E6DB2B1EABAC66EC1E8BFB2D5F5DB27AB5062E0C1E5D7F9158C0F26668F6E52588A63224E0C
2,710,431 UART: mbox::rt_entry...
2,710,803 UART: ____ _ _ _ ____ _____
2,711,587 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,712,387 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,713,155 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,713,923 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,714,691 UART: |_|
2,715,003 UART:
2,834,122 UART: [rt] Runtime listening for mailbox commands...
2,835,303 >>> mbox cmd response data (48 bytes)
2,835,304 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,838,087 >>> mbox cmd response data (48 bytes)
2,838,088 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,853,225 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,623 >>> mbox cmd response data (12 bytes)
1,139,624 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,164,842 >>> mbox cmd response: success
2,221,185 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,227,202 UART:
2,227,218 UART: Running Caliptra FMC ...
2,227,626 UART:
2,227,769 UART: [state] CFI Enabled
2,238,068 UART: [fht] FMC Alias Private Key: 7
2,346,195 UART: [art] Extend RT PCRs Done
2,346,623 UART: [art] Lock RT PCRs Done
2,348,345 UART: [art] Populate DV Done
2,356,452 UART: [fht] FMC Alias Private Key: 7
2,357,624 UART: [art] Derive CDI
2,357,904 UART: [art] Store in in slot 0x4
2,443,869 UART: [art] Derive Key Pair
2,444,229 UART: [art] Store priv key in slot 0x5
2,458,011 UART: [art] Derive Key Pair - Done
2,472,783 UART: [art] Signing Cert with AUTHO
2,473,263 UART: RITY.KEYID = 7
2,488,717 UART: [art] Erasing AUTHORITY.KEYID = 7
2,489,482 UART: [art] PUB.X = F770A09DDB566660E67E8B69A302E1E90CA2C16070B15938D194BEF1D9E4DE8BB028E8C16607B7FC8A7F39086DDF4036
2,496,248 UART: [art] PUB.Y = 72C0E5056EFEF0FDAEC98521D5A24C2D3D019F47C6E012E40D9861BE018C40B56E21F35FD0FCDE2EB4CA19A50BF59A51
2,503,203 UART: [art] SIG.R = 877E04B1773B2F80378822A6E3A08BB48E207D5CE7D031707A3C6EB59341D5D8F80670FAC921E34035E35DF566D2F812
2,509,965 UART: [art] SIG.S = B46EC722CCF6F7AF401648CFB5C439D44A2E22C6ABBD6D6314F13C1FE85566FE0BEDA8C8C1C2AEF277037FE8BA313039
2,533,864 UART: mbox::rt_entry...
2,534,236 UART: ____ _ _ _ ____ _____
2,535,020 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,535,820 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,536,588 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,537,356 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,538,124 UART: |_|
2,538,436 UART:
2,657,942 UART: [rt] Runtime listening for mailbox commands...
2,659,123 >>> mbox cmd response data (48 bytes)
2,659,124 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,661,907 >>> mbox cmd response data (48 bytes)
2,661,908 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,677,045 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,712 UART: [state] LifecycleState = Unprovisioned
85,367 UART: [state] DebugLocked = No
85,891 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,373 UART: [kat] SHA2-256
881,304 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,419 UART: [kat] ++
885,571 UART: [kat] sha1
889,799 UART: [kat] SHA2-256
891,737 UART: [kat] SHA2-384
894,528 UART: [kat] SHA2-512-ACC
896,429 UART: [kat] ECC-384
902,050 UART: [kat] HMAC-384Kdf
906,762 UART: [kat] LMS
1,474,958 UART: [kat] --
1,475,771 UART: [cold-reset] ++
1,476,351 UART: [fht] Storing FHT @ 0x50003400
1,478,994 UART: [idev] ++
1,479,162 UART: [idev] CDI.KEYID = 6
1,479,522 UART: [idev] SUBJECT.KEYID = 7
1,479,946 UART: [idev] UDS.KEYID = 0
1,480,291 ready_for_fw is high
1,480,291 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,487,990 UART: [idev] Erasing UDS.KEYID = 0
1,504,858 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,282 UART: [idev] --
1,514,513 UART: [ldev] ++
1,514,681 UART: [ldev] CDI.KEYID = 6
1,515,044 UART: [ldev] SUBJECT.KEYID = 5
1,515,470 UART: [ldev] AUTHORITY.KEYID = 7
1,515,933 UART: [ldev] FE.KEYID = 1
1,521,303 UART: [ldev] Erasing FE.KEYID = 1
1,547,408 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,342 UART: [ldev] --
1,586,659 UART: [fwproc] Waiting for Commands...
1,587,368 UART: [fwproc] Received command 0x46574c44
1,588,159 UART: [fwproc] Received Image of size 31832 bytes
1,942,226 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,969,514 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,998,866 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
2,010,841 >>> mbox cmd response: success
2,011,967 UART: [afmc] ++
2,012,135 UART: [afmc] CDI.KEYID = 6
2,012,497 UART: [afmc] SUBJECT.KEYID = 7
2,012,922 UART: [afmc] AUTHORITY.KEYID = 5
2,048,061 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,064,623 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,065,403 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,071,131 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,077,016 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,082,706 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,090,749 UART: [afmc] --
2,091,855 UART: [cold-reset] --
2,092,685 UART: [state] Locking Datavault
2,093,670 UART: [state] Locking PCR0, PCR1 and PCR31
2,094,274 UART: [state] Locking ICCM
2,094,752 UART: [exit] Launching FMC @ 0x40000130
2,100,081 UART:
2,100,097 UART: Running Caliptra FMC ...
2,100,505 UART:
2,100,559 UART: [state] CFI Enabled
2,111,220 UART: [fht] FMC Alias Private Key: 7
2,219,049 UART: [art] Extend RT PCRs Done
2,219,477 UART: [art] Lock RT PCRs Done
2,220,917 UART: [art] Populate DV Done
2,228,886 UART: [fht] FMC Alias Private Key: 7
2,229,956 UART: [art] Derive CDI
2,230,236 UART: [art] Store in in slot 0x4
2,315,725 UART: [art] Derive Key Pair
2,316,085 UART: [art] Store priv key in slot 0x5
2,328,547 UART: [art] Derive Key Pair - Done
2,343,311 UART: [art] Signing Cert with AUTHO
2,343,791 UART: RITY.KEYID = 7
2,358,891 UART: [art] Erasing AUTHORITY.KEYID = 7
2,359,656 UART: [art] PUB.X = E724B8D77DAF786D40F405599BB561D6627AD139BE43E229C779AC03AD0889CD13AB114146536C944F6CF4347269D300
2,366,393 UART: [art] PUB.Y = DDCCDFD3DFEE9BC2995A44FAB4C553DA9AF01D47AA23BF8DFDADD5D40042675D6C582B63D9B85032C52970114FE30FC9
2,373,344 UART: [art] SIG.R = 634F657DA7072224DC4684757F4A6AAE0A8823301092EFE6F41B1DAF0E06FD8BF9C2929F7AD125CB5F2490B5D1320354
2,380,103 UART: [art] SIG.S = 52A517CDD8B1B3977A74F02EDC8409704AE20511EACAE01FCE753043529999031417C2C289F33B7FF0CA2CE303C5CB7C
2,404,101 UART: persistent_rt::test_persistent_data_layout...[ok]
2,405,344 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,733 ready_for_fw is high
1,362,733 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,857,851 >>> mbox cmd response: success
1,918,929 UART:
1,918,945 UART: Running Caliptra FMC ...
1,919,353 UART:
1,919,407 UART: [state] CFI Enabled
1,929,728 UART: [fht] FMC Alias Private Key: 7
2,037,683 UART: [art] Extend RT PCRs Done
2,038,111 UART: [art] Lock RT PCRs Done
2,039,591 UART: [art] Populate DV Done
2,047,774 UART: [fht] FMC Alias Private Key: 7
2,048,858 UART: [art] Derive CDI
2,049,138 UART: [art] Store in in slot 0x4
2,134,649 UART: [art] Derive Key Pair
2,135,009 UART: [art] Store priv key in slot 0x5
2,147,657 UART: [art] Derive Key Pair - Done
2,162,503 UART: [art] Signing Cert with AUTHO
2,162,983 UART: RITY.KEYID = 7
2,177,815 UART: [art] Erasing AUTHORITY.KEYID = 7
2,178,580 UART: [art] PUB.X = AFF4B18D3E0E8C0DA79C641CB16CC9BE664DF388BFD2EF273B57B3A451C0A6A7E864605A0DE8E41C0C43133BA6763E6F
2,185,358 UART: [art] PUB.Y = FEFBB338E8126BBB0D931E1583E247C497A0C7FDD4EA578653537BB796EBFF071A693B64F0F6FB2480E9E8978E9BE414
2,192,314 UART: [art] SIG.R = 96A6594E826E082D082842895776B6F6702ACD2CBF883E2925FFE1CEA51D2226A0E99E3C74CBF4E89F85EA0D3A6FED0B
2,199,084 UART: [art] SIG.S = 60DF8FBDB2A535F37797273245047AF8FA51938BE64A7B9574EFE6D4ECD748A294585776E1B23E40CF0BCDFA3B4ADD1C
2,222,410 UART: persistent_rt::test_persistent_data_layout...[ok]
2,223,653 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,889 UART: [state] LifecycleState = Unprovisioned
86,544 UART: [state] DebugLocked = No
87,086 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,652 UART: [kat] SHA2-256
882,583 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,698 UART: [kat] ++
886,850 UART: [kat] sha1
891,136 UART: [kat] SHA2-256
893,074 UART: [kat] SHA2-384
895,813 UART: [kat] SHA2-512-ACC
897,714 UART: [kat] ECC-384
903,241 UART: [kat] HMAC-384Kdf
907,921 UART: [kat] LMS
1,476,117 UART: [kat] --
1,476,952 UART: [cold-reset] ++
1,477,374 UART: [fht] Storing FHT @ 0x50003400
1,480,093 UART: [idev] ++
1,480,261 UART: [idev] CDI.KEYID = 6
1,480,621 UART: [idev] SUBJECT.KEYID = 7
1,481,045 UART: [idev] UDS.KEYID = 0
1,481,390 ready_for_fw is high
1,481,390 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,488,919 UART: [idev] Erasing UDS.KEYID = 0
1,505,679 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,223 UART: [idev] --
1,515,460 UART: [ldev] ++
1,515,628 UART: [ldev] CDI.KEYID = 6
1,515,991 UART: [ldev] SUBJECT.KEYID = 5
1,516,417 UART: [ldev] AUTHORITY.KEYID = 7
1,516,880 UART: [ldev] FE.KEYID = 1
1,522,178 UART: [ldev] Erasing FE.KEYID = 1
1,547,987 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,849 UART: [ldev] --
1,587,198 UART: [fwproc] Waiting for Commands...
1,587,841 UART: [fwproc] Received command 0x46574c44
1,588,632 UART: [fwproc] Received Image of size 31832 bytes
1,940,045 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,967,001 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,996,353 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
2,008,368 >>> mbox cmd response: success
2,009,484 UART: [afmc] ++
2,009,652 UART: [afmc] CDI.KEYID = 6
2,010,014 UART: [afmc] SUBJECT.KEYID = 7
2,010,439 UART: [afmc] AUTHORITY.KEYID = 5
2,045,414 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,061,820 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,062,600 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,068,328 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,074,213 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,079,903 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,087,964 UART: [afmc] --
2,088,918 UART: [cold-reset] --
2,089,638 UART: [state] Locking Datavault
2,090,789 UART: [state] Locking PCR0, PCR1 and PCR31
2,091,393 UART: [state] Locking ICCM
2,092,001 UART: [exit] Launching FMC @ 0x40000130
2,097,330 UART:
2,097,346 UART: Running Caliptra FMC ...
2,097,754 UART:
2,097,897 UART: [state] CFI Enabled
2,108,516 UART: [fht] FMC Alias Private Key: 7
2,216,397 UART: [art] Extend RT PCRs Done
2,216,825 UART: [art] Lock RT PCRs Done
2,218,441 UART: [art] Populate DV Done
2,226,554 UART: [fht] FMC Alias Private Key: 7
2,227,596 UART: [art] Derive CDI
2,227,876 UART: [art] Store in in slot 0x4
2,313,651 UART: [art] Derive Key Pair
2,314,011 UART: [art] Store priv key in slot 0x5
2,327,029 UART: [art] Derive Key Pair - Done
2,341,685 UART: [art] Signing Cert with AUTHO
2,342,165 UART: RITY.KEYID = 7
2,357,363 UART: [art] Erasing AUTHORITY.KEYID = 7
2,358,128 UART: [art] PUB.X = 4F5B1B340AB113DFC9D9E7E69491BCE3A2D99053DACF2BF4A50FE9A886DAF6E4C64D1B447D545D79483C0E5B1CA05ED6
2,364,911 UART: [art] PUB.Y = B8F05033D6EEDB338773B2018E3908F624F7070054F7A808B3DA4CB2382DEB3C51A16008BAB03BDB965DEEAF2A331CDB
2,371,838 UART: [art] SIG.R = 76AEA4E56155C7C59A8A41F4E248FA4CEDBD991823BA336A7C06AB6D62DB3196348D3CB4BA27265F1A841046578EA131
2,378,613 UART: [art] SIG.S = 2E8CC182F6AFB487323B1312C55319A8EC827067BD9CECAEEE40F723BB5F724F43D569C9C1DEC7B2B1D3685D390ADA1D
2,401,916 UART: persistent_rt::test_persistent_data_layout...[ok]
2,403,159 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,512 ready_for_fw is high
1,363,512 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,859,360 >>> mbox cmd response: success
1,919,676 UART:
1,919,692 UART: Running Caliptra FMC ...
1,920,100 UART:
1,920,243 UART: [state] CFI Enabled
1,931,028 UART: [fht] FMC Alias Private Key: 7
2,039,047 UART: [art] Extend RT PCRs Done
2,039,475 UART: [art] Lock RT PCRs Done
2,040,731 UART: [art] Populate DV Done
2,048,816 UART: [fht] FMC Alias Private Key: 7
2,049,830 UART: [art] Derive CDI
2,050,110 UART: [art] Store in in slot 0x4
2,136,111 UART: [art] Derive Key Pair
2,136,471 UART: [art] Store priv key in slot 0x5
2,149,553 UART: [art] Derive Key Pair - Done
2,164,364 UART: [art] Signing Cert with AUTHO
2,164,844 UART: RITY.KEYID = 7
2,179,760 UART: [art] Erasing AUTHORITY.KEYID = 7
2,180,525 UART: [art] PUB.X = AFB7EB0FA63F7B4E4608BD828938B1718635C288410DADC9A8FC621E09DC33258A4EECB33F1B561D22B13649A69EA295
2,187,293 UART: [art] PUB.Y = 5C70D6F330F8AC22AAE40E3B846D60326E8A60F1669013E02AF0DD3DFF8779BEA8BA11713E23CF6D8B6C9049B529AA74
2,194,252 UART: [art] SIG.R = 94AD54821F69C9C789C63E11F280A7A92A5C97A0FF505D9537AEC31631DBEAA2F23AE32E1EBE3FE1B1FA844D6E3F27E9
2,201,040 UART: [art] SIG.S = EF6033535334965D5C2178B1469B60EF29AA680C7FDA75848C297A7CCCB7C5F637ECF4456955B0C71BD0CCCB1E306FFD
2,224,679 UART: persistent_rt::test_persistent_data_layout...[ok]
2,225,922 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
893,370 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,495 UART: [kat] ++
897,647 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,666 UART: [kat] SHA2-512-ACC
908,567 UART: [kat] ECC-384
918,678 UART: [kat] HMAC-384Kdf
923,198 UART: [kat] LMS
1,171,526 UART: [kat] --
1,172,391 UART: [cold-reset] ++
1,172,971 UART: [fht] FHT @ 0x50003400
1,175,588 UART: [idev] ++
1,175,756 UART: [idev] CDI.KEYID = 6
1,176,116 UART: [idev] SUBJECT.KEYID = 7
1,176,540 UART: [idev] UDS.KEYID = 0
1,176,885 ready_for_fw is high
1,176,885 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,184,452 UART: [idev] Erasing UDS.KEYID = 0
1,200,869 UART: [idev] Sha1 KeyId Algorithm
1,209,547 UART: [idev] --
1,210,657 UART: [ldev] ++
1,210,825 UART: [ldev] CDI.KEYID = 6
1,211,188 UART: [ldev] SUBJECT.KEYID = 5
1,211,614 UART: [ldev] AUTHORITY.KEYID = 7
1,212,077 UART: [ldev] FE.KEYID = 1
1,217,317 UART: [ldev] Erasing FE.KEYID = 1
1,243,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,235 UART: [ldev] --
1,282,622 UART: [fwproc] Wait for Commands...
1,283,202 UART: [fwproc] Recv command 0x46574c44
1,283,930 UART: [fwproc] Recv'd Img size: 31832 bytes
1,635,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,483 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,787 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,703,912 >>> mbox cmd response: success
1,705,084 UART: [afmc] ++
1,705,252 UART: [afmc] CDI.KEYID = 6
1,705,614 UART: [afmc] SUBJECT.KEYID = 7
1,706,039 UART: [afmc] AUTHORITY.KEYID = 5
1,741,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,533 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,281 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,764,009 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,894 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,613 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,329 UART: [afmc] --
1,784,209 UART: [cold-reset] --
1,785,009 UART: [state] Locking Datavault
1,786,392 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,996 UART: [state] Locking ICCM
1,787,492 UART: [exit] Launching FMC @ 0x40000130
1,792,821 UART:
1,792,837 UART: Running Caliptra FMC ...
1,793,245 UART:
1,793,299 UART: [state] CFI Enabled
1,803,482 UART: [fht] FMC Alias Private Key: 7
1,911,439 UART: [art] Extend RT PCRs Done
1,911,867 UART: [art] Lock RT PCRs Done
1,913,315 UART: [art] Populate DV Done
1,921,510 UART: [fht] FMC Alias Private Key: 7
1,922,596 UART: [art] Derive CDI
1,922,876 UART: [art] Store in in slot 0x4
2,008,195 UART: [art] Derive Key Pair
2,008,555 UART: [art] Store priv key in slot 0x5
2,021,943 UART: [art] Derive Key Pair - Done
2,036,709 UART: [art] Signing Cert with AUTHO
2,037,189 UART: RITY.KEYID = 7
2,052,377 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,142 UART: [art] PUB.X = FD474960C8B1C975E0B3B99B26F2D2CFA854AE47009EB21336B2F349C66AF238FAC63370BE1123956EC8EF064D0031D5
2,059,871 UART: [art] PUB.Y = CE0B2208D9A56F51410B1ADDB42FE0D4D040364BF05CA01C06E8BF234E8BC793569F39FDC30F839797458A5AA3452C89
2,066,814 UART: [art] SIG.R = CE86CCFA087DC5822027B7AEC4382980C50B3579C46FEA69F4A99B11DB8E8AA8A5DA8F848411AC4F656D3A82B800C768
2,073,568 UART: [art] SIG.S = EBC3B0714A32421EB392D7170767507D4FD5E1D45C2F147964604D334A9320898DF84D238CB8BB003CEA8D93E3C2A127
2,097,187 UART: persistent_rt::test_persistent_data_layout...[ok]
2,098,430 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,311 ready_for_fw is high
1,059,311 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,555,989 >>> mbox cmd response: success
1,617,961 UART:
1,617,977 UART: Running Caliptra FMC ...
1,618,385 UART:
1,618,439 UART: [state] CFI Enabled
1,628,618 UART: [fht] FMC Alias Private Key: 7
1,736,969 UART: [art] Extend RT PCRs Done
1,737,397 UART: [art] Lock RT PCRs Done
1,739,115 UART: [art] Populate DV Done
1,747,488 UART: [fht] FMC Alias Private Key: 7
1,748,510 UART: [art] Derive CDI
1,748,790 UART: [art] Store in in slot 0x4
1,834,537 UART: [art] Derive Key Pair
1,834,897 UART: [art] Store priv key in slot 0x5
1,848,087 UART: [art] Derive Key Pair - Done
1,862,774 UART: [art] Signing Cert with AUTHO
1,863,254 UART: RITY.KEYID = 7
1,878,166 UART: [art] Erasing AUTHORITY.KEYID = 7
1,878,931 UART: [art] PUB.X = 1CDC4B87738F7DC33CE560ECA72CF979F02AED8279F641D0315DAEEF1F955D12B30B102B325BCCDEFC194F6E5917634B
1,885,716 UART: [art] PUB.Y = 4CF1D2C0C30FE3BE6CC92549691882234189F2CCA6E7B0EAB57A51827DA952959D4680585F2E5456D06FABA7355AC549
1,892,667 UART: [art] SIG.R = 996C00FD59CB441F5B66D98C017FE2E0900781309034DC0892441427638BEE4D25DABB888F2B91C95D4714308C669FB3
1,899,402 UART: [art] SIG.S = A2517AE3EDB16CD13FE920DD42238C098DCADC2F89635C2BD80CB8F73AB0518FE1EECBF059B26767C6C723EA60E7026A
1,923,237 UART: persistent_rt::test_persistent_data_layout...[ok]
1,924,480 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Unprovisioned
85,732 UART: [state] DebugLocked = No
86,296 UART: [state] WD Timer not started. Device not locked for debugging
87,435 UART: [kat] SHA2-256
893,085 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,210 UART: [kat] ++
897,362 UART: [kat] sha1
901,586 UART: [kat] SHA2-256
903,526 UART: [kat] SHA2-384
906,109 UART: [kat] SHA2-512-ACC
908,010 UART: [kat] ECC-384
917,777 UART: [kat] HMAC-384Kdf
922,445 UART: [kat] LMS
1,170,773 UART: [kat] --
1,171,578 UART: [cold-reset] ++
1,172,116 UART: [fht] FHT @ 0x50003400
1,174,653 UART: [idev] ++
1,174,821 UART: [idev] CDI.KEYID = 6
1,175,181 UART: [idev] SUBJECT.KEYID = 7
1,175,605 UART: [idev] UDS.KEYID = 0
1,175,950 ready_for_fw is high
1,175,950 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,183,805 UART: [idev] Erasing UDS.KEYID = 0
1,200,774 UART: [idev] Sha1 KeyId Algorithm
1,209,118 UART: [idev] --
1,210,258 UART: [ldev] ++
1,210,426 UART: [ldev] CDI.KEYID = 6
1,210,789 UART: [ldev] SUBJECT.KEYID = 5
1,211,215 UART: [ldev] AUTHORITY.KEYID = 7
1,211,678 UART: [ldev] FE.KEYID = 1
1,216,854 UART: [ldev] Erasing FE.KEYID = 1
1,243,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,324 UART: [ldev] --
1,282,695 UART: [fwproc] Wait for Commands...
1,283,409 UART: [fwproc] Recv command 0x46574c44
1,284,137 UART: [fwproc] Recv'd Img size: 31832 bytes
1,635,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,663,060 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,364 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,704,403 >>> mbox cmd response: success
1,705,429 UART: [afmc] ++
1,705,597 UART: [afmc] CDI.KEYID = 6
1,705,959 UART: [afmc] SUBJECT.KEYID = 7
1,706,384 UART: [afmc] AUTHORITY.KEYID = 5
1,742,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,759,046 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,759,794 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,765,522 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,771,407 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,777,126 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,785,084 UART: [afmc] --
1,786,032 UART: [cold-reset] --
1,786,810 UART: [state] Locking Datavault
1,788,185 UART: [state] Locking PCR0, PCR1 and PCR31
1,788,789 UART: [state] Locking ICCM
1,789,393 UART: [exit] Launching FMC @ 0x40000130
1,794,722 UART:
1,794,738 UART: Running Caliptra FMC ...
1,795,146 UART:
1,795,289 UART: [state] CFI Enabled
1,805,726 UART: [fht] FMC Alias Private Key: 7
1,914,333 UART: [art] Extend RT PCRs Done
1,914,761 UART: [art] Lock RT PCRs Done
1,916,067 UART: [art] Populate DV Done
1,924,340 UART: [fht] FMC Alias Private Key: 7
1,925,348 UART: [art] Derive CDI
1,925,628 UART: [art] Store in in slot 0x4
2,011,091 UART: [art] Derive Key Pair
2,011,451 UART: [art] Store priv key in slot 0x5
2,024,849 UART: [art] Derive Key Pair - Done
2,040,012 UART: [art] Signing Cert with AUTHO
2,040,492 UART: RITY.KEYID = 7
2,055,534 UART: [art] Erasing AUTHORITY.KEYID = 7
2,056,299 UART: [art] PUB.X = EB1AC2348419C3BB3625EB23DBA38A8A2FEBF11A8C8398897DC732CAB3CE67C88387D18F8B67F2C3BED7DD78B24243D3
2,063,087 UART: [art] PUB.Y = 94D679D8901624EF4F02691CBED3CD30A8996B5CC03592D29C4A814F20F31207BE160F13E2C5E2C36FED9F16F1DB2F79
2,070,036 UART: [art] SIG.R = 6542AA85E3E9D88E626D8F469F5171A6EBC2F20327FF4DCC222A6CC5ED4B7D9FFCEF594849A9672BA968324EE24B3477
2,076,815 UART: [art] SIG.S = 83321F9BDA203285FBB8073B645F0EFF6342E8E17913F7614281E3C7BC2CFA7DAC36333F5767871518F3C06F94A6C787
2,101,159 UART: persistent_rt::test_persistent_data_layout...[ok]
2,102,402 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,792 ready_for_fw is high
1,060,792 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,560,114 >>> mbox cmd response: success
1,622,710 UART:
1,622,726 UART: Running Caliptra FMC ...
1,623,134 UART:
1,623,277 UART: [state] CFI Enabled
1,633,754 UART: [fht] FMC Alias Private Key: 7
1,741,281 UART: [art] Extend RT PCRs Done
1,741,709 UART: [art] Lock RT PCRs Done
1,743,123 UART: [art] Populate DV Done
1,751,208 UART: [fht] FMC Alias Private Key: 7
1,752,244 UART: [art] Derive CDI
1,752,524 UART: [art] Store in in slot 0x4
1,838,371 UART: [art] Derive Key Pair
1,838,731 UART: [art] Store priv key in slot 0x5
1,852,029 UART: [art] Derive Key Pair - Done
1,866,624 UART: [art] Signing Cert with AUTHO
1,867,104 UART: RITY.KEYID = 7
1,882,482 UART: [art] Erasing AUTHORITY.KEYID = 7
1,883,247 UART: [art] PUB.X = 570D0744529D056A0646B1F20FE085723D66790FBAC4F3A5AE72D96EF748C439A2D2F15614486781420D9123AEC6FF17
1,889,992 UART: [art] PUB.Y = 21672CCDA1C1924DE5335F475C6398776A401761D18A179F2584DFCF4C9F4B159E1D0712BE72695DED41572370D26800
1,896,911 UART: [art] SIG.R = E9290B54313408BD7B6A36152E3BF0C8519AA424FCA18DFF66410F8D5A245EE63E743A0F59B6DC44A425682F9ED055AB
1,903,677 UART: [art] SIG.S = C0ED7BE64EB4F243AAD28C4FCF3E5A3E8C70CECAFAC2D0998E5632634CA57E951739A9E64F3F1B57B094AE486E49683A
1,927,685 UART: persistent_rt::test_persistent_data_layout...[ok]
1,928,928 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,656 UART: [kat] SHA2-256
891,206 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,335 UART: [kat] ++
895,487 UART: [kat] sha1
899,635 UART: [kat] SHA2-256
901,575 UART: [kat] SHA2-384
904,238 UART: [kat] SHA2-512-ACC
906,139 UART: [kat] ECC-384
915,644 UART: [kat] HMAC-384Kdf
920,164 UART: [kat] LMS
1,168,476 UART: [kat] --
1,169,229 UART: [cold-reset] ++
1,169,793 UART: [fht] FHT @ 0x50003400
1,172,501 UART: [idev] ++
1,172,669 UART: [idev] CDI.KEYID = 6
1,173,030 UART: [idev] SUBJECT.KEYID = 7
1,173,455 UART: [idev] UDS.KEYID = 0
1,173,801 ready_for_fw is high
1,173,801 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,181,665 UART: [idev] Erasing UDS.KEYID = 0
1,197,657 UART: [idev] Sha1 KeyId Algorithm
1,206,623 UART: [idev] --
1,207,620 UART: [ldev] ++
1,207,788 UART: [ldev] CDI.KEYID = 6
1,208,152 UART: [ldev] SUBJECT.KEYID = 5
1,208,579 UART: [ldev] AUTHORITY.KEYID = 7
1,209,042 UART: [ldev] FE.KEYID = 1
1,214,400 UART: [ldev] Erasing FE.KEYID = 1
1,241,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,038 UART: [ldev] --
1,280,382 UART: [fwproc] Wait for Commands...
1,281,009 UART: [fwproc] Recv command 0x46574c44
1,281,742 UART: [fwproc] Recv'd Img size: 31832 bytes
1,632,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,659,569 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,688,878 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,700,840 >>> mbox cmd response: success
1,702,049 UART: [afmc] ++
1,702,217 UART: [afmc] CDI.KEYID = 6
1,702,580 UART: [afmc] SUBJECT.KEYID = 7
1,703,006 UART: [afmc] AUTHORITY.KEYID = 5
1,738,303 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,754,597 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,755,348 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,761,077 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,766,960 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,772,679 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,780,442 UART: [afmc] --
1,781,540 UART: [cold-reset] --
1,782,548 UART: [state] Locking Datavault
1,783,559 UART: [state] Locking PCR0, PCR1 and PCR31
1,784,163 UART: [state] Locking ICCM
1,784,665 UART: [exit] Launching FMC @ 0x40000130
1,789,994 UART:
1,790,010 UART: Running Caliptra FMC ...
1,790,418 UART:
1,790,472 UART: [state] CFI Enabled
1,800,823 UART: [fht] FMC Alias Private Key: 7
1,908,868 UART: [art] Extend RT PCRs Done
1,909,296 UART: [art] Lock RT PCRs Done
1,910,822 UART: [art] Populate DV Done
1,919,171 UART: [fht] FMC Alias Private Key: 7
1,920,127 UART: [art] Derive CDI
1,920,407 UART: [art] Store in in slot 0x4
2,006,214 UART: [art] Derive Key Pair
2,006,574 UART: [art] Store priv key in slot 0x5
2,019,788 UART: [art] Derive Key Pair - Done
2,034,156 UART: [art] Signing Cert with AUTHO
2,034,636 UART: RITY.KEYID = 7
2,049,536 UART: [art] Erasing AUTHORITY.KEYID = 7
2,050,301 UART: [art] PUB.X = 007C0C230C1BDB6420E33309E6162533851AD31049373391ECD4564AE7006E3F3B76D9444938D5CA7453AB4D32BD9E56
2,057,012 UART: [art] PUB.Y = C05381A6B6B08C6D0C020A6C40FF4FA2D4F9EE54FC3345A83C05E27AB36737A6DD1D1884ECE8459213CC63EB5ADCEF0F
2,063,967 UART: [art] SIG.R = F772CFEAFFD4AF9B6D8BFB11A59DB55F253743ED4B3EA67AD17FD128043C67D7B25F4ABA482F2D6F2F2274809298CEBF
2,070,758 UART: [art] SIG.S = 9537D52E021B117EC44F2EC5DE895F29D7A4096A48FD625287381BCA0DE92285DA48B305C031E0DC9EDA5587FB8D43E1
2,093,796 UART: persistent_rt::test_persistent_data_layout...[ok]
2,095,039 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,454 ready_for_fw is high
1,054,454 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,551,506 >>> mbox cmd response: success
1,614,294 UART:
1,614,310 UART: Running Caliptra FMC ...
1,614,718 UART:
1,614,772 UART: [state] CFI Enabled
1,625,397 UART: [fht] FMC Alias Private Key: 7
1,733,342 UART: [art] Extend RT PCRs Done
1,733,770 UART: [art] Lock RT PCRs Done
1,735,162 UART: [art] Populate DV Done
1,743,217 UART: [fht] FMC Alias Private Key: 7
1,744,277 UART: [art] Derive CDI
1,744,557 UART: [art] Store in in slot 0x4
1,830,138 UART: [art] Derive Key Pair
1,830,498 UART: [art] Store priv key in slot 0x5
1,843,896 UART: [art] Derive Key Pair - Done
1,858,720 UART: [art] Signing Cert with AUTHO
1,859,200 UART: RITY.KEYID = 7
1,874,274 UART: [art] Erasing AUTHORITY.KEYID = 7
1,875,039 UART: [art] PUB.X = F238B76880D747ADC7FFF4D4B27E1785A3BCBDCEAD26C47A80372D4657503991C1429FDF1C7752629115C2003D7EB775
1,881,791 UART: [art] PUB.Y = CE4E9A307F036C8F9A2B885AA2DD13ADAA75E6EC457BDD2BE40CCBB0C072229517BADF83440D08981E005CB62E06F10C
1,888,721 UART: [art] SIG.R = 7F733383643F0B012EC8F0B2E897ABB848F18B03A8023F2B1AAA16EEA6EAD76D0E29396F0BC2B223BF18C50653C4687B
1,895,480 UART: [art] SIG.S = C2C5EB1C7A5E71B5AA16A72631ECF1CA9BC0821623C1050749C31051C788511FA5D7726903444F120D62D2E1BC23FAFB
1,919,816 UART: persistent_rt::test_persistent_data_layout...[ok]
1,921,059 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,924 UART: [state] DebugLocked = No
86,408 UART: [state] WD Timer not started. Device not locked for debugging
87,609 UART: [kat] SHA2-256
891,159 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,288 UART: [kat] ++
895,440 UART: [kat] sha1
899,668 UART: [kat] SHA2-256
901,608 UART: [kat] SHA2-384
904,415 UART: [kat] SHA2-512-ACC
906,316 UART: [kat] ECC-384
915,923 UART: [kat] HMAC-384Kdf
920,587 UART: [kat] LMS
1,168,899 UART: [kat] --
1,169,854 UART: [cold-reset] ++
1,170,240 UART: [fht] FHT @ 0x50003400
1,173,140 UART: [idev] ++
1,173,308 UART: [idev] CDI.KEYID = 6
1,173,669 UART: [idev] SUBJECT.KEYID = 7
1,174,094 UART: [idev] UDS.KEYID = 0
1,174,440 ready_for_fw is high
1,174,440 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,182,406 UART: [idev] Erasing UDS.KEYID = 0
1,199,008 UART: [idev] Sha1 KeyId Algorithm
1,207,762 UART: [idev] --
1,208,805 UART: [ldev] ++
1,208,973 UART: [ldev] CDI.KEYID = 6
1,209,337 UART: [ldev] SUBJECT.KEYID = 5
1,209,764 UART: [ldev] AUTHORITY.KEYID = 7
1,210,227 UART: [ldev] FE.KEYID = 1
1,215,497 UART: [ldev] Erasing FE.KEYID = 1
1,242,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,367 UART: [ldev] --
1,281,701 UART: [fwproc] Wait for Commands...
1,282,500 UART: [fwproc] Recv command 0x46574c44
1,283,233 UART: [fwproc] Recv'd Img size: 31832 bytes
1,635,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,040 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,349 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,703,339 >>> mbox cmd response: success
1,704,490 UART: [afmc] ++
1,704,658 UART: [afmc] CDI.KEYID = 6
1,705,021 UART: [afmc] SUBJECT.KEYID = 7
1,705,447 UART: [afmc] AUTHORITY.KEYID = 5
1,740,746 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,274 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,025 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,754 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,637 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,356 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,169 UART: [afmc] --
1,784,229 UART: [cold-reset] --
1,785,109 UART: [state] Locking Datavault
1,786,482 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,086 UART: [state] Locking ICCM
1,787,534 UART: [exit] Launching FMC @ 0x40000130
1,792,863 UART:
1,792,879 UART: Running Caliptra FMC ...
1,793,287 UART:
1,793,430 UART: [state] CFI Enabled
1,803,893 UART: [fht] FMC Alias Private Key: 7
1,911,892 UART: [art] Extend RT PCRs Done
1,912,320 UART: [art] Lock RT PCRs Done
1,913,918 UART: [art] Populate DV Done
1,921,845 UART: [fht] FMC Alias Private Key: 7
1,923,013 UART: [art] Derive CDI
1,923,293 UART: [art] Store in in slot 0x4
2,009,526 UART: [art] Derive Key Pair
2,009,886 UART: [art] Store priv key in slot 0x5
2,023,102 UART: [art] Derive Key Pair - Done
2,037,832 UART: [art] Signing Cert with AUTHO
2,038,312 UART: RITY.KEYID = 7
2,053,590 UART: [art] Erasing AUTHORITY.KEYID = 7
2,054,355 UART: [art] PUB.X = 2841020E399156042B6188D3AAC2285A8EFAB6B7B2F91DCE5DDF416468B07ED99924B38AB6496B1B5B1FFE23AC4ED083
2,061,126 UART: [art] PUB.Y = D9501D450F3D10E7B1D869FD3E8998BABF4311378BE3003FFB1DCD6111970EEDFF077B7F1885F583CCC8C5F473A58EB1
2,068,059 UART: [art] SIG.R = 142A12177134AF03483C6A467EA9D278758E9E3A26A79668AD5D7097127BC289625E11F581426B06730C67F996034E0D
2,074,800 UART: [art] SIG.S = 3A84A5AC847D72D3C8ED4BA16BFB90CC1E95CD2C4BABAEBBF01572B23152939E27E43070E4D8B823CFC2113802D4EE0C
2,099,184 UART: persistent_rt::test_persistent_data_layout...[ok]
2,100,427 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,559 ready_for_fw is high
1,056,559 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,553,353 >>> mbox cmd response: success
1,615,283 UART:
1,615,299 UART: Running Caliptra FMC ...
1,615,707 UART:
1,615,850 UART: [state] CFI Enabled
1,626,353 UART: [fht] FMC Alias Private Key: 7
1,733,722 UART: [art] Extend RT PCRs Done
1,734,150 UART: [art] Lock RT PCRs Done
1,735,778 UART: [art] Populate DV Done
1,744,019 UART: [fht] FMC Alias Private Key: 7
1,744,995 UART: [art] Derive CDI
1,745,275 UART: [art] Store in in slot 0x4
1,830,890 UART: [art] Derive Key Pair
1,831,250 UART: [art] Store priv key in slot 0x5
1,844,772 UART: [art] Derive Key Pair - Done
1,859,230 UART: [art] Signing Cert with AUTHO
1,859,710 UART: RITY.KEYID = 7
1,875,306 UART: [art] Erasing AUTHORITY.KEYID = 7
1,876,071 UART: [art] PUB.X = 5A9979A1A5CFFAE37630B4DFB4F1CB4BCFF760D715F85C4C9C0CAC690ABD90B25AA52C844F05E757C832E8274C174035
1,882,848 UART: [art] PUB.Y = 9F8056759F60A16AA6154617395D8263AB41527FDC7D7E737C9044EAB592B11BAFD71D0B59A679B92BA283D14A76B084
1,889,795 UART: [art] SIG.R = 509E65C79E117814B29DF73E1A1461870E66EAD2B272D7C0FE20F5E1696E8B90E1598A966A1BDDBD207087914B6D4492
1,896,562 UART: [art] SIG.S = 1F7F159A443002BCDCCDF232DE5509A8D52EB0E14BE0977AC4F598BA8BBC6A63F8D04A5CBC54D5CC259B3612C5E0956F
1,920,182 UART: persistent_rt::test_persistent_data_layout...[ok]
1,921,425 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,409 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,083 UART: [kat] SHA2-256
882,014 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,129 UART: [kat] ++
886,281 UART: [kat] sha1
890,453 UART: [kat] SHA2-256
892,391 UART: [kat] SHA2-384
895,176 UART: [kat] SHA2-512-ACC
897,077 UART: [kat] ECC-384
902,504 UART: [kat] HMAC-384Kdf
907,088 UART: [kat] LMS
1,475,284 UART: [kat] --
1,476,419 UART: [cold-reset] ++
1,476,959 UART: [fht] Storing FHT @ 0x50003400
1,479,608 UART: [idev] ++
1,479,776 UART: [idev] CDI.KEYID = 6
1,480,136 UART: [idev] SUBJECT.KEYID = 7
1,480,560 UART: [idev] UDS.KEYID = 0
1,480,905 ready_for_fw is high
1,480,905 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,306 UART: [idev] Erasing UDS.KEYID = 0
1,504,744 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,322 UART: [idev] --
1,514,239 UART: [ldev] ++
1,514,407 UART: [ldev] CDI.KEYID = 6
1,514,770 UART: [ldev] SUBJECT.KEYID = 5
1,515,196 UART: [ldev] AUTHORITY.KEYID = 7
1,515,659 UART: [ldev] FE.KEYID = 1
1,521,097 UART: [ldev] Erasing FE.KEYID = 1
1,546,458 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,262 UART: [ldev] --
1,585,743 UART: [fwproc] Waiting for Commands...
1,586,362 UART: [fwproc] Received command 0x46574c44
1,587,153 UART: [fwproc] Received Image of size 114332 bytes
2,883,863 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,067 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,419 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,338 >>> mbox cmd response: success
3,077,588 UART: [afmc] ++
3,077,756 UART: [afmc] CDI.KEYID = 6
3,078,118 UART: [afmc] SUBJECT.KEYID = 7
3,078,543 UART: [afmc] AUTHORITY.KEYID = 5
3,113,208 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,472 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,252 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,980 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,865 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,555 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,272 UART: [afmc] --
3,156,166 UART: [cold-reset] --
3,156,874 UART: [state] Locking Datavault
3,157,867 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,471 UART: [state] Locking ICCM
3,159,033 UART: [exit] Launching FMC @ 0x40000130
3,164,362 UART:
3,164,378 UART: Running Caliptra FMC ...
3,164,786 UART:
3,164,840 UART: [state] CFI Enabled
3,175,583 UART: [fht] FMC Alias Private Key: 7
3,283,232 UART: [art] Extend RT PCRs Done
3,283,660 UART: [art] Lock RT PCRs Done
3,284,988 UART: [art] Populate DV Done
3,292,967 UART: [fht] FMC Alias Private Key: 7
3,294,049 UART: [art] Derive CDI
3,294,329 UART: [art] Store in in slot 0x4
3,379,766 UART: [art] Derive Key Pair
3,380,126 UART: [art] Store priv key in slot 0x5
3,392,868 UART: [art] Derive Key Pair - Done
3,407,849 UART: [art] Signing Cert with AUTHO
3,408,329 UART: RITY.KEYID = 7
3,423,463 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,228 UART: [art] PUB.X = 9605B59AF84BF4B61B88161D17E59F8EAB776A56AE50A54464DF01C83FAE1E99A1940FF7DB6538EA3EE46A5118650D2E
3,430,996 UART: [art] PUB.Y = 9F0827CBC693CE403D1F6037B8C29773D082BCF14BC12F371673F8D0D10CCFC42AF0414F88BAD8A9758F9E4249A60099
3,437,924 UART: [art] SIG.R = 7A107C7FB3791F611A4346C736642A903A0AAAFB3882FAAAB6DFAD124A95A0034E25D404B506E68BD65B0766ECBCF474
3,444,691 UART: [art] SIG.S = 02EF07B2F469CF4DACC7CEECA8D316738A1FB22DB29033C2D962C4E2A57800AB73DDDDE181958BDDAB5F088D72201787
3,468,053 UART: Caliptra RT
3,468,306 UART: [state] CFI Enabled
3,577,236 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,571 ready_for_fw is high
1,362,571 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,206 >>> mbox cmd response: success
2,988,582 UART:
2,988,598 UART: Running Caliptra FMC ...
2,989,006 UART:
2,989,060 UART: [state] CFI Enabled
2,999,909 UART: [fht] FMC Alias Private Key: 7
3,107,912 UART: [art] Extend RT PCRs Done
3,108,340 UART: [art] Lock RT PCRs Done
3,109,692 UART: [art] Populate DV Done
3,117,879 UART: [fht] FMC Alias Private Key: 7
3,118,945 UART: [art] Derive CDI
3,119,225 UART: [art] Store in in slot 0x4
3,204,900 UART: [art] Derive Key Pair
3,205,260 UART: [art] Store priv key in slot 0x5
3,218,454 UART: [art] Derive Key Pair - Done
3,233,264 UART: [art] Signing Cert with AUTHO
3,233,744 UART: RITY.KEYID = 7
3,248,812 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,577 UART: [art] PUB.X = 6AEABB30F890D37570ABAABAD522B37B9A374EE612E734EE6B0F04772144EF9FE21042141908C29C8F2EF8C29007D144
3,256,343 UART: [art] PUB.Y = 96DCA13048E4E05ADD6E0CC0F3DAB71A1EB19EEF7E4EA8DDB898716AD549EE99FC08748D16C7911BFA16A29A72DB4A20
3,263,311 UART: [art] SIG.R = 57A0CDAAD5E48D94A98BDB0544469F405D8E51D0A62756E887451EA9CF28C71822FAD71B4DE11E49440F180CDBB6BE91
3,270,084 UART: [art] SIG.S = 492FB851F9D93CFA5B868B692BB5838633E75D299A7BE48C850C7A15138C574FC5283E7965E7D0CDC12A0524677904A2
3,294,038 UART: Caliptra RT
3,294,291 UART: [state] CFI Enabled
3,401,747 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,658 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,262 UART: [kat] SHA2-256
882,193 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,308 UART: [kat] ++
886,460 UART: [kat] sha1
890,640 UART: [kat] SHA2-256
892,578 UART: [kat] SHA2-384
895,101 UART: [kat] SHA2-512-ACC
897,002 UART: [kat] ECC-384
902,433 UART: [kat] HMAC-384Kdf
907,047 UART: [kat] LMS
1,475,243 UART: [kat] --
1,476,040 UART: [cold-reset] ++
1,476,512 UART: [fht] Storing FHT @ 0x50003400
1,479,109 UART: [idev] ++
1,479,277 UART: [idev] CDI.KEYID = 6
1,479,637 UART: [idev] SUBJECT.KEYID = 7
1,480,061 UART: [idev] UDS.KEYID = 0
1,480,406 ready_for_fw is high
1,480,406 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,457 UART: [idev] Erasing UDS.KEYID = 0
1,505,179 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,793 UART: [idev] --
1,514,866 UART: [ldev] ++
1,515,034 UART: [ldev] CDI.KEYID = 6
1,515,397 UART: [ldev] SUBJECT.KEYID = 5
1,515,823 UART: [ldev] AUTHORITY.KEYID = 7
1,516,286 UART: [ldev] FE.KEYID = 1
1,521,216 UART: [ldev] Erasing FE.KEYID = 1
1,547,277 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,323 UART: [ldev] --
1,586,682 UART: [fwproc] Waiting for Commands...
1,587,303 UART: [fwproc] Received command 0x46574c44
1,588,094 UART: [fwproc] Received Image of size 114332 bytes
2,886,892 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,664 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,016 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,763 >>> mbox cmd response: success
3,080,795 UART: [afmc] ++
3,080,963 UART: [afmc] CDI.KEYID = 6
3,081,325 UART: [afmc] SUBJECT.KEYID = 7
3,081,750 UART: [afmc] AUTHORITY.KEYID = 5
3,116,683 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,305 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,085 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,813 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,698 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,388 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,215 UART: [afmc] --
3,160,215 UART: [cold-reset] --
3,161,333 UART: [state] Locking Datavault
3,162,576 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,180 UART: [state] Locking ICCM
3,163,844 UART: [exit] Launching FMC @ 0x40000130
3,169,173 UART:
3,169,189 UART: Running Caliptra FMC ...
3,169,597 UART:
3,169,740 UART: [state] CFI Enabled
3,180,051 UART: [fht] FMC Alias Private Key: 7
3,288,054 UART: [art] Extend RT PCRs Done
3,288,482 UART: [art] Lock RT PCRs Done
3,290,142 UART: [art] Populate DV Done
3,298,363 UART: [fht] FMC Alias Private Key: 7
3,299,465 UART: [art] Derive CDI
3,299,745 UART: [art] Store in in slot 0x4
3,385,724 UART: [art] Derive Key Pair
3,386,084 UART: [art] Store priv key in slot 0x5
3,399,536 UART: [art] Derive Key Pair - Done
3,414,656 UART: [art] Signing Cert with AUTHO
3,415,136 UART: RITY.KEYID = 7
3,430,680 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,445 UART: [art] PUB.X = 7FE06AF320C2218144380DDBBE40E28983DDCDB28E2725F6791B0142300BF432B501C71A1616D8FAA03DCF0748F4845E
3,438,204 UART: [art] PUB.Y = 505F5127CFEE51DEACD0E3871CE50D3B8436A3FAC5DDB493DF263C7A0D3D8768F1C09A42F8104AA8023917694CEFBD45
3,445,161 UART: [art] SIG.R = 61A96EAF099E3955C1CBBFE361E4049A63895A4ABD917C4C7D4467157CA059747A25175BDA71085211D11E61605D17A1
3,451,920 UART: [art] SIG.S = 714CE973D0496E23DE57F7C35699877866481FDE802BFCBB790FB8A04EA69ABE509A650EC1AD6AB2F087DDB54FEF8174
3,475,791 UART: Caliptra RT
3,476,136 UART: [state] CFI Enabled
3,584,180 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,814 ready_for_fw is high
1,362,814 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,565 >>> mbox cmd response: success
2,989,771 UART:
2,989,787 UART: Running Caliptra FMC ...
2,990,195 UART:
2,990,338 UART: [state] CFI Enabled
3,001,157 UART: [fht] FMC Alias Private Key: 7
3,109,406 UART: [art] Extend RT PCRs Done
3,109,834 UART: [art] Lock RT PCRs Done
3,111,280 UART: [art] Populate DV Done
3,119,547 UART: [fht] FMC Alias Private Key: 7
3,120,697 UART: [art] Derive CDI
3,120,977 UART: [art] Store in in slot 0x4
3,207,178 UART: [art] Derive Key Pair
3,207,538 UART: [art] Store priv key in slot 0x5
3,220,692 UART: [art] Derive Key Pair - Done
3,234,906 UART: [art] Signing Cert with AUTHO
3,235,386 UART: RITY.KEYID = 7
3,250,848 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,613 UART: [art] PUB.X = EB23EB46839D1F2B46403483B7B1648097EAD6617590C821A090F67F42DB0B5A0426814F553C36543FACC3807A811921
3,258,369 UART: [art] PUB.Y = 5053E70A191AD05C566FC0383A06D2BA4AA561E46BBF95496FBC2A85523FE4913BBD08F071CE4FA69AB00FB0B9C2DE88
3,265,323 UART: [art] SIG.R = 14E78A0C1B9F7256446F5B6A483E59866243BE48D4177A4488B8B95E310C29343F9A503C4E29BB6B7ED7D1DD53F63A0D
3,272,086 UART: [art] SIG.S = 6AFD499335DDBDFE81A26DD64EBF8146885A00A33D22ED837D46191E0AEB782674191418F2EDB8FA384DFEF7B71F95F6
3,295,688 UART: Caliptra RT
3,296,033 UART: [state] CFI Enabled
3,404,139 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,340 UART: [kat] SHA2-256
892,990 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,115 UART: [kat] ++
897,267 UART: [kat] sha1
901,543 UART: [kat] SHA2-256
903,483 UART: [kat] SHA2-384
906,248 UART: [kat] SHA2-512-ACC
908,149 UART: [kat] ECC-384
917,524 UART: [kat] HMAC-384Kdf
922,172 UART: [kat] LMS
1,170,500 UART: [kat] --
1,171,339 UART: [cold-reset] ++
1,171,829 UART: [fht] FHT @ 0x50003400
1,174,296 UART: [idev] ++
1,174,464 UART: [idev] CDI.KEYID = 6
1,174,824 UART: [idev] SUBJECT.KEYID = 7
1,175,248 UART: [idev] UDS.KEYID = 0
1,175,593 ready_for_fw is high
1,175,593 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,174 UART: [idev] Erasing UDS.KEYID = 0
1,200,075 UART: [idev] Sha1 KeyId Algorithm
1,208,519 UART: [idev] --
1,209,563 UART: [ldev] ++
1,209,731 UART: [ldev] CDI.KEYID = 6
1,210,094 UART: [ldev] SUBJECT.KEYID = 5
1,210,520 UART: [ldev] AUTHORITY.KEYID = 7
1,210,983 UART: [ldev] FE.KEYID = 1
1,216,199 UART: [ldev] Erasing FE.KEYID = 1
1,243,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,967 UART: [ldev] --
1,282,402 UART: [fwproc] Wait for Commands...
1,283,144 UART: [fwproc] Recv command 0x46574c44
1,283,872 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,846 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,150 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,853 >>> mbox cmd response: success
2,774,049 UART: [afmc] ++
2,774,217 UART: [afmc] CDI.KEYID = 6
2,774,579 UART: [afmc] SUBJECT.KEYID = 7
2,775,004 UART: [afmc] AUTHORITY.KEYID = 5
2,811,009 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,016 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,764 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,492 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,377 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,096 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,872 UART: [afmc] --
2,853,978 UART: [cold-reset] --
2,854,852 UART: [state] Locking Datavault
2,856,167 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,771 UART: [state] Locking ICCM
2,857,329 UART: [exit] Launching FMC @ 0x40000130
2,862,658 UART:
2,862,674 UART: Running Caliptra FMC ...
2,863,082 UART:
2,863,136 UART: [state] CFI Enabled
2,873,483 UART: [fht] FMC Alias Private Key: 7
2,981,168 UART: [art] Extend RT PCRs Done
2,981,596 UART: [art] Lock RT PCRs Done
2,983,166 UART: [art] Populate DV Done
2,991,271 UART: [fht] FMC Alias Private Key: 7
2,992,349 UART: [art] Derive CDI
2,992,629 UART: [art] Store in in slot 0x4
3,078,690 UART: [art] Derive Key Pair
3,079,050 UART: [art] Store priv key in slot 0x5
3,092,304 UART: [art] Derive Key Pair - Done
3,106,729 UART: [art] Signing Cert with AUTHO
3,107,209 UART: RITY.KEYID = 7
3,122,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,674 UART: [art] PUB.X = 254C0923A5D5DC5DF497E4B18E3D87345350E61893E4D9E9C1A90FF8A9F360619BF5FEF9FAAD9A37ED63DAB55657CB99
3,130,452 UART: [art] PUB.Y = 9FB239C996A0569F35F43E323C781C83884B7400F71116923811C7C811B14B1BB33D6973D2D035AE918080EA9E8DB36C
3,137,374 UART: [art] SIG.R = F90513DE309EB3977A1CA2A8229A7F4257987FCA83A88F970A6E22DE2CBCAD4EB6CDBC8E9391AB71BB1BEFD30D6EEA69
3,144,161 UART: [art] SIG.S = 24D81A9CC8EF554ED259D1615F77EB13D2BFB00B05341829B05919E953008A16BBC39D8F87E578F43322C7B2FDACF1FF
3,167,584 UART: Caliptra RT
3,167,837 UART: [state] CFI Enabled
3,275,518 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,061 ready_for_fw is high
1,060,061 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,220 >>> mbox cmd response: success
2,687,016 UART:
2,687,032 UART: Running Caliptra FMC ...
2,687,440 UART:
2,687,494 UART: [state] CFI Enabled
2,698,005 UART: [fht] FMC Alias Private Key: 7
2,806,456 UART: [art] Extend RT PCRs Done
2,806,884 UART: [art] Lock RT PCRs Done
2,808,190 UART: [art] Populate DV Done
2,816,395 UART: [fht] FMC Alias Private Key: 7
2,817,517 UART: [art] Derive CDI
2,817,797 UART: [art] Store in in slot 0x4
2,903,546 UART: [art] Derive Key Pair
2,903,906 UART: [art] Store priv key in slot 0x5
2,916,906 UART: [art] Derive Key Pair - Done
2,931,509 UART: [art] Signing Cert with AUTHO
2,931,989 UART: RITY.KEYID = 7
2,946,827 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,592 UART: [art] PUB.X = D38ACB887B23965E2205C133C38FDB3A4BB8AAD528ED6EBBA581AF15998EFD752859D9E7C54B0781B4B80D81F014B43B
2,954,367 UART: [art] PUB.Y = D0A03815BBC0C42941B8A9565362793C19400718333B1B1BEC86361AEC283DC1F0C1703BFBDCB8FBD024172D92E0B461
2,961,318 UART: [art] SIG.R = 654B551D4C957AA9D2F78F7E0B080AB4800830EA0174389156E604322C16D6EE208C0A251D881EDCB386D57B06916D9D
2,968,062 UART: [art] SIG.S = 32962C38852FBFB165DCF436F4C052EE2428FC0BF2F3A4DE7855A1D417A14A06A884AEA0AE1EA1AADFCD50FF1EB015C6
2,991,893 UART: Caliptra RT
2,992,146 UART: [state] CFI Enabled
3,099,401 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
893,483 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,608 UART: [kat] ++
897,760 UART: [kat] sha1
901,968 UART: [kat] SHA2-256
903,908 UART: [kat] SHA2-384
906,559 UART: [kat] SHA2-512-ACC
908,460 UART: [kat] ECC-384
918,065 UART: [kat] HMAC-384Kdf
922,587 UART: [kat] LMS
1,170,915 UART: [kat] --
1,171,578 UART: [cold-reset] ++
1,172,104 UART: [fht] FHT @ 0x50003400
1,174,567 UART: [idev] ++
1,174,735 UART: [idev] CDI.KEYID = 6
1,175,095 UART: [idev] SUBJECT.KEYID = 7
1,175,519 UART: [idev] UDS.KEYID = 0
1,175,864 ready_for_fw is high
1,175,864 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,549 UART: [idev] Erasing UDS.KEYID = 0
1,200,312 UART: [idev] Sha1 KeyId Algorithm
1,208,830 UART: [idev] --
1,209,786 UART: [ldev] ++
1,209,954 UART: [ldev] CDI.KEYID = 6
1,210,317 UART: [ldev] SUBJECT.KEYID = 5
1,210,743 UART: [ldev] AUTHORITY.KEYID = 7
1,211,206 UART: [ldev] FE.KEYID = 1
1,216,416 UART: [ldev] Erasing FE.KEYID = 1
1,242,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,670 UART: [ldev] --
1,282,137 UART: [fwproc] Wait for Commands...
1,282,811 UART: [fwproc] Recv command 0x46574c44
1,283,539 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,197 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,501 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,266 >>> mbox cmd response: success
2,774,502 UART: [afmc] ++
2,774,670 UART: [afmc] CDI.KEYID = 6
2,775,032 UART: [afmc] SUBJECT.KEYID = 7
2,775,457 UART: [afmc] AUTHORITY.KEYID = 5
2,811,300 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,509 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,237 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,122 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,841 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,611 UART: [afmc] --
2,854,491 UART: [cold-reset] --
2,855,311 UART: [state] Locking Datavault
2,856,250 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,854 UART: [state] Locking ICCM
2,857,318 UART: [exit] Launching FMC @ 0x40000130
2,862,647 UART:
2,862,663 UART: Running Caliptra FMC ...
2,863,071 UART:
2,863,214 UART: [state] CFI Enabled
2,874,023 UART: [fht] FMC Alias Private Key: 7
2,982,122 UART: [art] Extend RT PCRs Done
2,982,550 UART: [art] Lock RT PCRs Done
2,983,972 UART: [art] Populate DV Done
2,992,357 UART: [fht] FMC Alias Private Key: 7
2,993,495 UART: [art] Derive CDI
2,993,775 UART: [art] Store in in slot 0x4
3,079,032 UART: [art] Derive Key Pair
3,079,392 UART: [art] Store priv key in slot 0x5
3,092,716 UART: [art] Derive Key Pair - Done
3,107,744 UART: [art] Signing Cert with AUTHO
3,108,224 UART: RITY.KEYID = 7
3,123,360 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,125 UART: [art] PUB.X = DE5232F7A7D52A3D177A7D4F8288CCC1EB5E76927DE92A5D3119C020E4E3C3FC828EF38FA842C1DCE50C344D2931EFDC
3,130,910 UART: [art] PUB.Y = BF71B8773D88802A9F1E41007FD8169A23EA6FD6DCFF8CA048026F1FCFC381C92D7ACCBC244F74470C72C4A1AB8C9692
3,137,848 UART: [art] SIG.R = 4B8F4E923950CE1AF2A8036E4301C0ED2665E10962BD9F11E88E1CD217A016D1134534B046B99FDCD77A997CA5A1CF2C
3,144,617 UART: [art] SIG.S = F168882C9BF036285E8688A37153E51E2B91B7033E915F66EE1B8FEAE7C00BF97F7C662E4D6D06343EBB0AC4EEF9B2A3
3,168,316 UART: Caliptra RT
3,168,661 UART: [state] CFI Enabled
3,277,290 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,064 ready_for_fw is high
1,060,064 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,263 >>> mbox cmd response: success
2,689,395 UART:
2,689,411 UART: Running Caliptra FMC ...
2,689,819 UART:
2,689,962 UART: [state] CFI Enabled
2,700,627 UART: [fht] FMC Alias Private Key: 7
2,809,158 UART: [art] Extend RT PCRs Done
2,809,586 UART: [art] Lock RT PCRs Done
2,811,046 UART: [art] Populate DV Done
2,818,993 UART: [fht] FMC Alias Private Key: 7
2,820,111 UART: [art] Derive CDI
2,820,391 UART: [art] Store in in slot 0x4
2,906,222 UART: [art] Derive Key Pair
2,906,582 UART: [art] Store priv key in slot 0x5
2,920,184 UART: [art] Derive Key Pair - Done
2,934,790 UART: [art] Signing Cert with AUTHO
2,935,270 UART: RITY.KEYID = 7
2,950,826 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,591 UART: [art] PUB.X = 05EAEBDF95706FB13A4F5721AEB5EB5DCB0F5D9623A8064096D318F467F2EB27C4265D1A30D8301554B0FA06E080D705
2,958,354 UART: [art] PUB.Y = FF994599C973E143044028D5AF9624C9C6C7B7F7FEE143E21E120F68C77C8C5421A76F4F79ECB32DE0B4A8B38ABA5442
2,965,306 UART: [art] SIG.R = 93C11E388F79500A40BBB7D32F67572204DA3659DE5F9A18865C06593410B55146C5867AA00D2107D54C3829FB2FB0BD
2,972,057 UART: [art] SIG.S = 8230043835E1D1425CA2ED73F1806925D8422ABBFA579D6D8C0AA5126862B9A34FF01832E20E6477DAA85081E81A72A3
2,995,871 UART: Caliptra RT
2,996,216 UART: [state] CFI Enabled
3,104,000 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,727 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
891,480 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,609 UART: [kat] ++
895,761 UART: [kat] sha1
899,817 UART: [kat] SHA2-256
901,757 UART: [kat] SHA2-384
904,512 UART: [kat] SHA2-512-ACC
906,413 UART: [kat] ECC-384
915,854 UART: [kat] HMAC-384Kdf
920,542 UART: [kat] LMS
1,168,854 UART: [kat] --
1,169,635 UART: [cold-reset] ++
1,170,017 UART: [fht] FHT @ 0x50003400
1,172,645 UART: [idev] ++
1,172,813 UART: [idev] CDI.KEYID = 6
1,173,174 UART: [idev] SUBJECT.KEYID = 7
1,173,599 UART: [idev] UDS.KEYID = 0
1,173,945 ready_for_fw is high
1,173,945 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,583 UART: [idev] Erasing UDS.KEYID = 0
1,198,695 UART: [idev] Sha1 KeyId Algorithm
1,207,367 UART: [idev] --
1,208,476 UART: [ldev] ++
1,208,644 UART: [ldev] CDI.KEYID = 6
1,209,008 UART: [ldev] SUBJECT.KEYID = 5
1,209,435 UART: [ldev] AUTHORITY.KEYID = 7
1,209,898 UART: [ldev] FE.KEYID = 1
1,215,196 UART: [ldev] Erasing FE.KEYID = 1
1,240,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,886 UART: [ldev] --
1,280,356 UART: [fwproc] Wait for Commands...
1,280,959 UART: [fwproc] Recv command 0x46574c44
1,281,692 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,396 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,705 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,561 >>> mbox cmd response: success
2,771,664 UART: [afmc] ++
2,771,832 UART: [afmc] CDI.KEYID = 6
2,772,195 UART: [afmc] SUBJECT.KEYID = 7
2,772,621 UART: [afmc] AUTHORITY.KEYID = 5
2,807,730 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,895 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,624 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,507 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,226 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,221 UART: [afmc] --
2,851,249 UART: [cold-reset] --
2,852,145 UART: [state] Locking Datavault
2,853,534 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,138 UART: [state] Locking ICCM
2,854,796 UART: [exit] Launching FMC @ 0x40000130
2,860,125 UART:
2,860,141 UART: Running Caliptra FMC ...
2,860,549 UART:
2,860,603 UART: [state] CFI Enabled
2,871,030 UART: [fht] FMC Alias Private Key: 7
2,978,987 UART: [art] Extend RT PCRs Done
2,979,415 UART: [art] Lock RT PCRs Done
2,980,813 UART: [art] Populate DV Done
2,988,894 UART: [fht] FMC Alias Private Key: 7
2,990,020 UART: [art] Derive CDI
2,990,300 UART: [art] Store in in slot 0x4
3,075,693 UART: [art] Derive Key Pair
3,076,053 UART: [art] Store priv key in slot 0x5
3,088,429 UART: [art] Derive Key Pair - Done
3,103,314 UART: [art] Signing Cert with AUTHO
3,103,794 UART: RITY.KEYID = 7
3,118,884 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,649 UART: [art] PUB.X = 56179B4AD7ED20EF9E5950D53C52C2C7D4B1F7323F8585A28BCB4517AE2DAA60B919B599111F03E08FF15DCDF1137590
3,126,424 UART: [art] PUB.Y = 44EF60BE16C376D12C92BD5346DCF0180F7AE98BC2AFF28754D527D6726B0E435EB82F3093C75A5C798D07760F58070E
3,133,360 UART: [art] SIG.R = 6D837B866E9CA0E6D9B2C9EAE74BBEBB9907511A677038B4F06846A6BC9994A3A93EF33C38FE84F105505EF8FB57175A
3,140,134 UART: [art] SIG.S = B60604DEBFC43E83899A62E050779511240E7F5DB01CA8714BB86831576DD4286CEF41E5421CB89528CFF6ACE603C6DC
3,164,039 UART: Caliptra RT
3,164,292 UART: [state] CFI Enabled
3,271,435 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,568 ready_for_fw is high
1,055,568 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,005 >>> mbox cmd response: success
2,684,695 UART:
2,684,711 UART: Running Caliptra FMC ...
2,685,119 UART:
2,685,173 UART: [state] CFI Enabled
2,695,998 UART: [fht] FMC Alias Private Key: 7
2,803,979 UART: [art] Extend RT PCRs Done
2,804,407 UART: [art] Lock RT PCRs Done
2,806,367 UART: [art] Populate DV Done
2,814,412 UART: [fht] FMC Alias Private Key: 7
2,815,450 UART: [art] Derive CDI
2,815,730 UART: [art] Store in in slot 0x4
2,901,607 UART: [art] Derive Key Pair
2,901,967 UART: [art] Store priv key in slot 0x5
2,915,099 UART: [art] Derive Key Pair - Done
2,929,998 UART: [art] Signing Cert with AUTHO
2,930,478 UART: RITY.KEYID = 7
2,946,174 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,939 UART: [art] PUB.X = 4572D62567BB7912735BCAEEE552DE45212D64A07DEC586DEA151DB52260249B7F701D0DC29B2CD31C12F26A782A7C38
2,953,712 UART: [art] PUB.Y = 8584A4D7DB4B29BB00345B23BE850E0D43004ABD8F4C9B137E3FE1BE6F09858791CD76DF6A3AC502292D72F5AB66D25B
2,960,618 UART: [art] SIG.R = 1B1FED0063CF89F78E9A50BB4EBF7E3A018F0AB3B827BD18C5B87C5C2E0AA371CC8D5B675AA51FA442399AB2A1F017F4
2,967,379 UART: [art] SIG.S = 5C3C9147BB4C12EB1C17A86B5194F5D41C059C5A35AABD6ADAAEBA853E371C675B1173294E7CC6E1D59083C960AB9766
2,991,545 UART: Caliptra RT
2,991,798 UART: [state] CFI Enabled
3,100,119 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
891,247 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,376 UART: [kat] ++
895,528 UART: [kat] sha1
899,698 UART: [kat] SHA2-256
901,638 UART: [kat] SHA2-384
904,585 UART: [kat] SHA2-512-ACC
906,486 UART: [kat] ECC-384
915,999 UART: [kat] HMAC-384Kdf
920,453 UART: [kat] LMS
1,168,765 UART: [kat] --
1,169,942 UART: [cold-reset] ++
1,170,450 UART: [fht] FHT @ 0x50003400
1,173,170 UART: [idev] ++
1,173,338 UART: [idev] CDI.KEYID = 6
1,173,699 UART: [idev] SUBJECT.KEYID = 7
1,174,124 UART: [idev] UDS.KEYID = 0
1,174,470 ready_for_fw is high
1,174,470 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,036 UART: [idev] Erasing UDS.KEYID = 0
1,199,060 UART: [idev] Sha1 KeyId Algorithm
1,208,034 UART: [idev] --
1,209,083 UART: [ldev] ++
1,209,251 UART: [ldev] CDI.KEYID = 6
1,209,615 UART: [ldev] SUBJECT.KEYID = 5
1,210,042 UART: [ldev] AUTHORITY.KEYID = 7
1,210,505 UART: [ldev] FE.KEYID = 1
1,215,723 UART: [ldev] Erasing FE.KEYID = 1
1,242,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,887 UART: [ldev] --
1,281,357 UART: [fwproc] Wait for Commands...
1,281,944 UART: [fwproc] Recv command 0x46574c44
1,282,677 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,283 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,592 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,390 >>> mbox cmd response: success
2,773,515 UART: [afmc] ++
2,773,683 UART: [afmc] CDI.KEYID = 6
2,774,046 UART: [afmc] SUBJECT.KEYID = 7
2,774,472 UART: [afmc] AUTHORITY.KEYID = 5
2,810,481 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,057 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,808 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,537 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,420 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,139 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,064 UART: [afmc] --
2,854,152 UART: [cold-reset] --
2,854,956 UART: [state] Locking Datavault
2,855,751 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,355 UART: [state] Locking ICCM
2,856,869 UART: [exit] Launching FMC @ 0x40000130
2,862,198 UART:
2,862,214 UART: Running Caliptra FMC ...
2,862,622 UART:
2,862,765 UART: [state] CFI Enabled
2,873,414 UART: [fht] FMC Alias Private Key: 7
2,982,307 UART: [art] Extend RT PCRs Done
2,982,735 UART: [art] Lock RT PCRs Done
2,984,763 UART: [art] Populate DV Done
2,993,108 UART: [fht] FMC Alias Private Key: 7
2,994,106 UART: [art] Derive CDI
2,994,386 UART: [art] Store in in slot 0x4
3,079,705 UART: [art] Derive Key Pair
3,080,065 UART: [art] Store priv key in slot 0x5
3,093,609 UART: [art] Derive Key Pair - Done
3,108,497 UART: [art] Signing Cert with AUTHO
3,108,977 UART: RITY.KEYID = 7
3,124,689 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,454 UART: [art] PUB.X = 78FFCB83FCB9F8B819ABC5A14F15F39DEABF53CAFBFBFE3016947B6075D25B7AC525C3D214FFE6C41A13853FDA29DE41
3,132,252 UART: [art] PUB.Y = 246F1CB719B15B624B2EAD75EE16899C447DE8CFEB0387448756D5803112738D99580B379E0C366378D381F0BF854BC1
3,139,189 UART: [art] SIG.R = A45E7AA81F0A0FFFFEE37F7B4E94A5940EE4075A3D13867148580C1F5ED131E1EF9B4ED1310697C3E6A85A343EAC068E
3,145,952 UART: [art] SIG.S = 0DC19197DAE3692ABC6F64809056D04BE7A350936774C4C93227BC77241DF15C96F61F0CCBADD988AD6832C6CA3ECA28
3,169,427 UART: Caliptra RT
3,169,772 UART: [state] CFI Enabled
3,277,249 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,449 ready_for_fw is high
1,056,449 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,828 >>> mbox cmd response: success
2,684,782 UART:
2,684,798 UART: Running Caliptra FMC ...
2,685,206 UART:
2,685,349 UART: [state] CFI Enabled
2,695,708 UART: [fht] FMC Alias Private Key: 7
2,803,097 UART: [art] Extend RT PCRs Done
2,803,525 UART: [art] Lock RT PCRs Done
2,804,973 UART: [art] Populate DV Done
2,813,018 UART: [fht] FMC Alias Private Key: 7
2,814,164 UART: [art] Derive CDI
2,814,444 UART: [art] Store in in slot 0x4
2,900,307 UART: [art] Derive Key Pair
2,900,667 UART: [art] Store priv key in slot 0x5
2,913,551 UART: [art] Derive Key Pair - Done
2,927,954 UART: [art] Signing Cert with AUTHO
2,928,434 UART: RITY.KEYID = 7
2,943,844 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,609 UART: [art] PUB.X = 0B339325F247EFC4D3104C72740C87FB1A0D741E1BC1EE9B2AF3E79DDA591327A872351767CE99203AA8659C74BC58AB
2,951,376 UART: [art] PUB.Y = 42F61D8F0DAA5EC0512C65FF4FC708FF96A9F253EA0406360A095CF426AAF83AAC2AD2B493BFE810BF008112CA436C00
2,958,280 UART: [art] SIG.R = 2BD4E9977DDE4366AE20C83900112EF7433B0F12AFC9A063D788499390190F7D87C5F986A8509BE4B3B475FBFF4AF9CE
2,965,030 UART: [art] SIG.S = 7D724A4FE33ECF3EA9F7E0E2DFD74153F961DE9C64A99344703C878ABB6CBA79603F7F185507ABD60CBC669356587FB1
2,989,395 UART: Caliptra RT
2,989,740 UART: [state] CFI Enabled
3,098,959 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
Truncated 1358290 bytes from beginning
6 UART: [art] Store in in slot 0x4
1,717,390,959 UART: [art] Derive Key Pair
1,717,391,319 UART: [art] Store priv key in slot 0x5
1,717,404,945 UART: [art] Derive Key Pair - Done
1,717,419,585 UART: [art] Signing Cert with AUTHO
1,717,420,065 UART: RITY.KEYID = 7
1,717,435,203 UART: [art] Erasing AUTHORITY.KEYID = 7
1,717,435,968 UART: [art] PUB.X = C69130E777CF253307D7FEC3EA990B7362940352D5D398D8E25BD8932167C76055F01508F294A96B7E009B698226C038
1,717,442,692 UART: [art] PUB.Y = F22F8194B86C11B86829140A85ACFF953EB5F950A0980F6320EEF97D1ED6BAF84D6EAFCEAA39BE37EB7BEFBDCE19BC1A
1,717,449,666 UART: [art] SIG.R = E40E6314DE0E301AE510A18E9A89DD3FBC8C8345D718DA4D45F527ED3C49CC2999FA9999EDAE403EB66B9A464A30CF1E
1,717,456,448 UART: [art] SIG.S = 1C78F3390B108239F12EDB97D6122D7D136EE1F2C27F9816ECF8042DC6BC71E50AF7A8FF7F2FD6336AA14398BF741204
1,717,480,131 UART: Caliptra RT
1,717,480,384 UART: [state] CFI Enabled
1,717,764,103 UART: [rt] RT listening for mailbox commands...
1,717,764,773 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,717,765,949 UART:
1,717,765,965 UART: Running Caliptra ROM ...
1,717,766,373 UART:
1,717,766,427 UART: [state] CFI Enabled
1,717,769,125 UART: [state] LifecycleState = Unprovisioned
1,717,769,780 UART: [state] DebugLocked = No
1,717,770,402 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,717,771,947 UART: [kat] SHA2-256
1,718,565,878 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,718,569,993 UART: [kat] ++
1,718,570,145 UART: [kat] sha1
1,718,574,389 UART: [kat] SHA2-256
1,718,576,327 UART: [kat] SHA2-384
1,718,578,970 UART: [kat] SHA2-512-ACC
1,718,580,870 UART: [kat] ECC-384
1,718,586,581 UART: [kat] HMAC-384Kdf
1,718,591,275 UART: [kat] LMS
1,719,159,471 UART: [kat] --
1,719,160,062 UART: [update-reset] ++
1,720,495,266 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,720,496,328 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
1,720,646,204 >>> mbox cmd response: success
1,720,646,421 UART: [update-reset] Copying MAN_2 To MAN_1
1,720,654,435 UART: [update-reset Success] --
1,720,655,202 UART: [state] Locking Datavault
1,720,656,112 UART: [state] Locking PCR0, PCR1 and PCR31
1,720,656,716 UART: [state] Locking ICCM
1,720,657,302 UART: [exit] Launching FMC @ 0x40000130
1,720,662,631 UART:
1,720,662,647 UART: Running Caliptra FMC ...
1,720,663,055 UART:
1,720,663,109 UART: [state] CFI Enabled
1,720,751,980 UART: [art] Extend RT PCRs Done
1,720,752,408 UART: [art] Lock RT PCRs Done
1,720,753,735 UART: [art] Populate DV Done
1,720,761,960 UART: [fht] FMC Alias Private Key: 7
1,720,763,054 UART: [art] Derive CDI
1,720,763,334 UART: [art] Store in in slot 0x4
1,720,849,229 UART: [art] Derive Key Pair
1,720,849,589 UART: [art] Store priv key in slot 0x5
1,720,862,577 UART: [art] Derive Key Pair - Done
1,720,877,469 UART: [art] Signing Cert with AUTHO
1,720,877,949 UART: RITY.KEYID = 7
1,720,893,153 UART: [art] Erasing AUTHORITY.KEYID = 7
1,720,893,918 UART: [art] PUB.X = 647A4E1F11894C4E0836D8D5431756B726A6B3208E6DC2ADB1733A4F19E5619C566F45EBBC68BAF4DE0F2B3F70B81479
1,720,900,688 UART: [art] PUB.Y = 94DA00674761EAED1C0B2C52EDA1FEA9F4C2F21137914F5C052209D5D060D619AC92549A2B64A000B73EA28915C010FB
1,720,907,591 UART: [art] SIG.R = 8C4A25F83E60A06C7FBB11378ADB8009BC783C6400D9A55CE48BA6E495E9346A2D442C1BD32D6BA5ECD8242350DB6439
1,720,914,346 UART: [art] SIG.S = FDD634F9FAEB68376D4D5F5C555580ABFBB34FEBF98AF97D64D20E6DD38972A13AD74303DF3FD7F994A99E152A679526
1,720,938,281 UART: Caliptra RT
1,720,938,534 UART: [state] CFI Enabled
1,721,222,580 UART: [rt] RT listening for mailbox commands...
1,721,223,250 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,721,224,200 UART:
1,721,224,216 UART: Running Caliptra ROM ...
1,721,224,624 UART:
1,721,224,678 UART: [state] CFI Enabled
1,721,227,176 UART: [state] LifecycleState = Unprovisioned
1,721,227,831 UART: [state] DebugLocked = No
1,721,228,337 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,721,229,978 UART: [kat] SHA2-256
1,722,023,909 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,722,028,024 UART: [kat] ++
1,722,028,176 UART: [kat] sha1
1,722,032,460 UART: [kat] SHA2-256
1,722,034,398 UART: [kat] SHA2-384
1,722,037,305 UART: [kat] SHA2-512-ACC
1,722,039,205 UART: [kat] ECC-384
1,722,044,634 UART: [kat] HMAC-384Kdf
1,722,049,260 UART: [kat] LMS
1,722,617,456 UART: [kat] --
1,722,618,557 UART: [update-reset] ++
1,723,952,911 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,723,954,011 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
1,724,103,887 >>> mbox cmd response: success
1,724,103,996 UART: [update-reset] Copying MAN_2 To MAN_1
1,724,112,010 UART: [update-reset Success] --
1,724,112,979 UART: [state] Locking Datavault
1,724,113,845 UART: [state] Locking PCR0, PCR1 and PCR31
1,724,114,449 UART: [state] Locking ICCM
1,724,114,883 UART: [exit] Launching FMC @ 0x40000130
1,724,120,212 UART:
1,724,120,228 UART: Running Caliptra FMC ...
1,724,120,636 UART:
1,724,120,690 UART: [state] CFI Enabled
1,724,209,409 UART: [art] Extend RT PCRs Done
1,724,209,837 UART: [art] Lock RT PCRs Done
1,724,210,984 UART: [art] Populate DV Done
1,724,219,155 UART: [fht] FMC Alias Private Key: 7
1,724,220,105 UART: [art] Derive CDI
1,724,220,385 UART: [art] Store in in slot 0x4
1,724,306,264 UART: [art] Derive Key Pair
1,724,306,624 UART: [art] Store priv key in slot 0x5
1,724,320,128 UART: [art] Derive Key Pair - Done
1,724,334,590 UART: [art] Signing Cert with AUTHO
1,724,335,070 UART: RITY.KEYID = 7
1,724,350,190 UART: [art] Erasing AUTHORITY.KEYID = 7
1,724,350,955 UART: [art] PUB.X = C69130E777CF253307D7FEC3EA990B7362940352D5D398D8E25BD8932167C76055F01508F294A96B7E009B698226C038
1,724,357,679 UART: [art] PUB.Y = F22F8194B86C11B86829140A85ACFF953EB5F950A0980F6320EEF97D1ED6BAF84D6EAFCEAA39BE37EB7BEFBDCE19BC1A
1,724,364,653 UART: [art] SIG.R = E40E6314DE0E301AE510A18E9A89DD3FBC8C8345D718DA4D45F527ED3C49CC2999FA9999EDAE403EB66B9A464A30CF1E
1,724,371,435 UART: [art] SIG.S = 1C78F3390B108239F12EDB97D6122D7D136EE1F2C27F9816ECF8042DC6BC71E50AF7A8FF7F2FD6336AA14398BF741204
1,724,395,634 UART: Caliptra RT
1,724,395,887 UART: [state] CFI Enabled
1,724,675,558 UART: [rt] RT listening for mailbox commands...
1,724,676,228 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,724,677,222 UART:
1,724,677,238 UART: Running Caliptra ROM ...
1,724,677,646 UART:
1,724,677,700 UART: [state] CFI Enabled
1,724,680,284 UART: [state] LifecycleState = Unprovisioned
1,724,680,939 UART: [state] DebugLocked = No
1,724,681,511 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,724,683,116 UART: [kat] SHA2-256
1,725,477,047 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,725,481,162 UART: [kat] ++
1,725,481,314 UART: [kat] sha1
1,725,485,322 UART: [kat] SHA2-256
1,725,487,260 UART: [kat] SHA2-384
1,725,489,949 UART: [kat] SHA2-512-ACC
1,725,491,849 UART: [kat] ECC-384
1,725,497,498 UART: [kat] HMAC-384Kdf
1,725,502,030 UART: [kat] LMS
1,726,070,226 UART: [kat] --
1,726,071,411 UART: [update-reset] ++
1,727,405,919 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,727,407,201 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
1,727,557,077 >>> mbox cmd response: success
1,727,557,354 UART: [update-reset] Copying MAN_2 To MAN_1
1,727,565,368 UART: [update-reset Success] --
1,727,566,275 UART: [state] Locking Datavault
1,727,567,009 UART: [state] Locking PCR0, PCR1 and PCR31
1,727,567,613 UART: [state] Locking ICCM
1,727,568,125 UART: [exit] Launching FMC @ 0x40000130
1,727,573,454 UART:
1,727,573,470 UART: Running Caliptra FMC ...
1,727,573,878 UART:
1,727,573,932 UART: [state] CFI Enabled
1,727,663,107 UART: [art] Extend RT PCRs Done
1,727,663,535 UART: [art] Lock RT PCRs Done
1,727,664,922 UART: [art] Populate DV Done
1,727,673,193 UART: [fht] FMC Alias Private Key: 7
1,727,674,319 UART: [art] Derive CDI
1,727,674,599 UART: [art] Store in in slot 0x4
1,727,760,214 UART: [art] Derive Key Pair
1,727,760,574 UART: [art] Store priv key in slot 0x5
1,727,773,306 UART: [art] Derive Key Pair - Done
1,727,788,258 UART: [art] Signing Cert with AUTHO
1,727,788,738 UART: RITY.KEYID = 7
1,727,804,234 UART: [art] Erasing AUTHORITY.KEYID = 7
1,727,804,999 UART: [art] PUB.X = 647A4E1F11894C4E0836D8D5431756B726A6B3208E6DC2ADB1733A4F19E5619C566F45EBBC68BAF4DE0F2B3F70B81479
1,727,811,769 UART: [art] PUB.Y = 94DA00674761EAED1C0B2C52EDA1FEA9F4C2F21137914F5C052209D5D060D619AC92549A2B64A000B73EA28915C010FB
1,727,818,672 UART: [art] SIG.R = 8C4A25F83E60A06C7FBB11378ADB8009BC783C6400D9A55CE48BA6E495E9346A2D442C1BD32D6BA5ECD8242350DB6439
1,727,825,427 UART: [art] SIG.S = FDD634F9FAEB68376D4D5F5C555580ABFBB34FEBF98AF97D64D20E6DD38972A13AD74303DF3FD7F994A99E152A679526
1,727,849,052 UART: Caliptra RT
1,727,849,305 UART: [state] CFI Enabled
1,728,135,383 UART: [rt] RT listening for mailbox commands...
1,728,136,053 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,728,137,199 UART:
1,728,137,215 UART: Running Caliptra ROM ...
1,728,137,623 UART:
1,728,137,677 UART: [state] CFI Enabled
1,728,140,613 UART: [state] LifecycleState = Unprovisioned
1,728,141,268 UART: [state] DebugLocked = No
1,728,141,832 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,728,143,371 UART: [kat] SHA2-256
1,728,937,302 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,728,941,417 UART: [kat] ++
1,728,941,569 UART: [kat] sha1
1,728,945,811 UART: [kat] SHA2-256
1,728,947,749 UART: [kat] SHA2-384
1,728,950,438 UART: [kat] SHA2-512-ACC
1,728,952,338 UART: [kat] ECC-384
1,728,957,607 UART: [kat] HMAC-384Kdf
1,728,962,283 UART: [kat] LMS
1,729,530,479 UART: [kat] --
1,729,531,474 UART: [update-reset] ++
1,730,866,158 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,730,867,236 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
1,731,017,112 >>> mbox cmd response: success
1,731,017,411 UART: [update-reset] Copying MAN_2 To MAN_1
1,731,025,425 UART: [update-reset Success] --
1,731,026,244 UART: [state] Locking Datavault
1,731,027,198 UART: [state] Locking PCR0, PCR1 and PCR31
1,731,027,802 UART: [state] Locking ICCM
1,731,028,330 UART: [exit] Launching FMC @ 0x40000130
1,731,033,659 UART:
1,731,033,675 UART: Running Caliptra FMC ...
1,731,034,083 UART:
1,731,034,137 UART: [state] CFI Enabled
1,731,123,296 UART: [art] Extend RT PCRs Done
1,731,123,724 UART: [art] Lock RT PCRs Done
1,731,125,053 UART: [art] Populate DV Done
1,731,133,252 UART: [fht] FMC Alias Private Key: 7
1,731,134,406 UART: [art] Derive CDI
1,731,134,686 UART: [art] Store in in slot 0x4
1,731,220,077 UART: [art] Derive Key Pair
1,731,220,437 UART: [art] Store priv key in slot 0x5
1,731,233,795 UART: [art] Derive Key Pair - Done
1,731,248,459 UART: [art] Signing Cert with AUTHO
1,731,248,939 UART: RITY.KEYID = 7
1,731,263,929 UART: [art] Erasing AUTHORITY.KEYID = 7
1,731,264,694 UART: [art] PUB.X = C69130E777CF253307D7FEC3EA990B7362940352D5D398D8E25BD8932167C76055F01508F294A96B7E009B698226C038
1,731,271,418 UART: [art] PUB.Y = F22F8194B86C11B86829140A85ACFF953EB5F950A0980F6320EEF97D1ED6BAF84D6EAFCEAA39BE37EB7BEFBDCE19BC1A
1,731,278,392 UART: [art] SIG.R = E40E6314DE0E301AE510A18E9A89DD3FBC8C8345D718DA4D45F527ED3C49CC2999FA9999EDAE403EB66B9A464A30CF1E
1,731,285,174 UART: [art] SIG.S = 1C78F3390B108239F12EDB97D6122D7D136EE1F2C27F9816ECF8042DC6BC71E50AF7A8FF7F2FD6336AA14398BF741204
1,731,309,285 UART: Caliptra RT
1,731,309,538 UART: [state] CFI Enabled
1,731,594,943 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 342.94s
Truncated 734970 bytes from beginning
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,646,579,374 >>> mbox cmd response: success
1,646,592,733 UART:
1,646,592,749 UART: Running Caliptra FMC ...
1,646,593,157 UART:
1,646,593,211 UART: [state] CFI Enabled
1,646,682,416 UART: [art] Extend RT PCRs Done
1,646,682,844 UART: [art] Lock RT PCRs Done
1,646,684,107 UART: [art] Populate DV Done
1,646,692,590 UART: [fht] FMC Alias Private Key: 7
1,646,693,700 UART: [art] Derive CDI
1,646,693,980 UART: [art] Store in in slot 0x4
1,646,780,057 UART: [art] Derive Key Pair
1,646,780,417 UART: [art] Store priv key in slot 0x5
1,646,793,633 UART: [art] Derive Key Pair - Done
1,646,808,120 UART: [art] Signing Cert with AUTHO
1,646,808,600 UART: RITY.KEYID = 7
1,646,823,468 UART: [art] Erasing AUTHORITY.KEYID = 7
1,646,824,233 UART: [art] PUB.X = 16172CE789D2FE2087762C3D2EB908CBEA101334113E2EAE6882D8265972690B89B15C728EAF7DCD35E9C093AA87FDF1
1,646,831,003 UART: [art] PUB.Y = EB2C16DCD3FBBAF7DC5F1F451183567AA24A9A3E4F3F069ECB0089C5AE7AEFCA22E2D40F466ED4F072E4F5B5712C40AE
1,646,837,953 UART: [art] SIG.R = C67A469D644A64F8AA299A78DA75FE532B56E56FEDE7D8519E2762EB9B5DF65D9CB9D4CAB45FD684310A26C226BAF330
1,646,844,736 UART: [art] SIG.S = 0B27010C047EF240FC96F74D92C0FA3B959372F0FA9DF75D703FAC05A63F04D3989C2352A0C7FB610C0117D4337431E8
1,646,868,465 UART: Caliptra RT
1,646,868,718 UART: [state] CFI Enabled
1,647,151,807 UART: [rt] RT listening for mailbox commands...
1,647,152,477 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,649,914,720 >>> mbox cmd response: success
1,649,928,197 UART:
1,649,928,213 UART: Running Caliptra FMC ...
1,649,928,621 UART:
1,649,928,675 UART: [state] CFI Enabled
1,650,017,192 UART: [art] Extend RT PCRs Done
1,650,017,620 UART: [art] Lock RT PCRs Done
1,650,018,941 UART: [art] Populate DV Done
1,650,027,154 UART: [fht] FMC Alias Private Key: 7
1,650,028,190 UART: [art] Derive CDI
1,650,028,470 UART: [art] Store in in slot 0x4
1,650,113,971 UART: [art] Derive Key Pair
1,650,114,331 UART: [art] Store priv key in slot 0x5
1,650,127,115 UART: [art] Derive Key Pair - Done
1,650,141,618 UART: [art] Signing Cert with AUTHO
1,650,142,098 UART: RITY.KEYID = 7
1,650,157,408 UART: [art] Erasing AUTHORITY.KEYID = 7
1,650,158,173 UART: [art] PUB.X = 7DB2B2A24F5D50A525F902A11503B741BCC57C98055A27EB386BCC90E60F17C1292DD81AE4B49B5CD0E634B1FCC29820
1,650,164,941 UART: [art] PUB.Y = E84A9B881BE4ADFF5F3F3E2E2663477D4F84C4EF75A0DEB643EE9E50D1EE1601ACB436CB2050673A5666222CC8ED7BF9
1,650,171,906 UART: [art] SIG.R = 478AE28B7D6AE32283283DD33A39E1CB40A33D849714A28D173B43EC0A3F087FE367BDE293C690C10DF950296E1E2E8F
1,650,178,673 UART: [art] SIG.S = 7544C1F77E833941DE07D5DB24EF953182FB13AD4773146B83EE3B8763DCA4556BF437815ACBF6BF38A00A9B57C330FD
1,650,202,646 UART: Caliptra RT
1,650,202,899 UART: [state] CFI Enabled
1,650,486,693 UART: [rt] RT listening for mailbox commands...
1,650,487,363 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,653,249,516 >>> mbox cmd response: success
1,653,263,125 UART:
1,653,263,141 UART: Running Caliptra FMC ...
1,653,263,549 UART:
1,653,263,603 UART: [state] CFI Enabled
1,653,352,534 UART: [art] Extend RT PCRs Done
1,653,352,962 UART: [art] Lock RT PCRs Done
1,653,354,263 UART: [art] Populate DV Done
1,653,362,416 UART: [fht] FMC Alias Private Key: 7
1,653,363,560 UART: [art] Derive CDI
1,653,363,840 UART: [art] Store in in slot 0x4
1,653,449,309 UART: [art] Derive Key Pair
1,653,449,669 UART: [art] Store priv key in slot 0x5
1,653,462,965 UART: [art] Derive Key Pair - Done
1,653,477,534 UART: [art] Signing Cert with AUTHO
1,653,478,014 UART: RITY.KEYID = 7
1,653,493,158 UART: [art] Erasing AUTHORITY.KEYID = 7
1,653,493,923 UART: [art] PUB.X = 16172CE789D2FE2087762C3D2EB908CBEA101334113E2EAE6882D8265972690B89B15C728EAF7DCD35E9C093AA87FDF1
1,653,500,693 UART: [art] PUB.Y = EB2C16DCD3FBBAF7DC5F1F451183567AA24A9A3E4F3F069ECB0089C5AE7AEFCA22E2D40F466ED4F072E4F5B5712C40AE
1,653,507,643 UART: [art] SIG.R = C67A469D644A64F8AA299A78DA75FE532B56E56FEDE7D8519E2762EB9B5DF65D9CB9D4CAB45FD684310A26C226BAF330
1,653,514,426 UART: [art] SIG.S = 0B27010C047EF240FC96F74D92C0FA3B959372F0FA9DF75D703FAC05A63F04D3989C2352A0C7FB610C0117D4337431E8
1,653,538,523 UART: Caliptra RT
1,653,538,776 UART: [state] CFI Enabled
1,653,820,717 UART: [rt] RT listening for mailbox commands...
1,653,821,387 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,656,584,984 >>> mbox cmd response: success
1,656,598,039 UART:
1,656,598,055 UART: Running Caliptra FMC ...
1,656,598,463 UART:
1,656,598,517 UART: [state] CFI Enabled
1,656,687,698 UART: [art] Extend RT PCRs Done
1,656,688,126 UART: [art] Lock RT PCRs Done
1,656,689,003 UART: [art] Populate DV Done
1,656,697,204 UART: [fht] FMC Alias Private Key: 7
1,656,698,330 UART: [art] Derive CDI
1,656,698,610 UART: [art] Store in in slot 0x4
1,656,784,575 UART: [art] Derive Key Pair
1,656,784,935 UART: [art] Store priv key in slot 0x5
1,656,798,263 UART: [art] Derive Key Pair - Done
1,656,812,924 UART: [art] Signing Cert with AUTHO
1,656,813,404 UART: RITY.KEYID = 7
1,656,828,938 UART: [art] Erasing AUTHORITY.KEYID = 7
1,656,829,703 UART: [art] PUB.X = 7DB2B2A24F5D50A525F902A11503B741BCC57C98055A27EB386BCC90E60F17C1292DD81AE4B49B5CD0E634B1FCC29820
1,656,836,471 UART: [art] PUB.Y = E84A9B881BE4ADFF5F3F3E2E2663477D4F84C4EF75A0DEB643EE9E50D1EE1601ACB436CB2050673A5666222CC8ED7BF9
1,656,843,436 UART: [art] SIG.R = 478AE28B7D6AE32283283DD33A39E1CB40A33D849714A28D173B43EC0A3F087FE367BDE293C690C10DF950296E1E2E8F
1,656,850,203 UART: [art] SIG.S = 7544C1F77E833941DE07D5DB24EF953182FB13AD4773146B83EE3B8763DCA4556BF437815ACBF6BF38A00A9B57C330FD
1,656,874,456 UART: Caliptra RT
1,656,874,709 UART: [state] CFI Enabled
1,657,157,875 UART: [rt] RT listening for mailbox commands...
1,657,158,545 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,659,921,608 >>> mbox cmd response: success
1,659,935,185 UART:
1,659,935,201 UART: Running Caliptra FMC ...
1,659,935,609 UART:
1,659,935,663 UART: [state] CFI Enabled
1,660,024,510 UART: [art] Extend RT PCRs Done
1,660,024,938 UART: [art] Lock RT PCRs Done
1,660,026,153 UART: [art] Populate DV Done
1,660,034,556 UART: [fht] FMC Alias Private Key: 7
1,660,035,636 UART: [art] Derive CDI
1,660,035,916 UART: [art] Store in in slot 0x4
1,660,121,327 UART: [art] Derive Key Pair
1,660,121,687 UART: [art] Store priv key in slot 0x5
1,660,134,407 UART: [art] Derive Key Pair - Done
1,660,149,054 UART: [art] Signing Cert with AUTHO
1,660,149,534 UART: RITY.KEYID = 7
1,660,164,980 UART: [art] Erasing AUTHORITY.KEYID = 7
1,660,165,745 UART: [art] PUB.X = 16172CE789D2FE2087762C3D2EB908CBEA101334113E2EAE6882D8265972690B89B15C728EAF7DCD35E9C093AA87FDF1
1,660,172,515 UART: [art] PUB.Y = EB2C16DCD3FBBAF7DC5F1F451183567AA24A9A3E4F3F069ECB0089C5AE7AEFCA22E2D40F466ED4F072E4F5B5712C40AE
1,660,179,465 UART: [art] SIG.R = C67A469D644A64F8AA299A78DA75FE532B56E56FEDE7D8519E2762EB9B5DF65D9CB9D4CAB45FD684310A26C226BAF330
1,660,186,248 UART: [art] SIG.S = 0B27010C047EF240FC96F74D92C0FA3B959372F0FA9DF75D703FAC05A63F04D3989C2352A0C7FB610C0117D4337431E8
1,660,209,777 UART: Caliptra RT
1,660,210,030 UART: [state] CFI Enabled
1,660,494,161 UART: [rt] RT listening for mailbox commands...
1,660,494,831 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,663,257,000 >>> mbox cmd response: success
1,663,270,565 UART:
1,663,270,581 UART: Running Caliptra FMC ...
1,663,270,989 UART:
1,663,271,043 UART: [state] CFI Enabled
1,663,360,308 UART: [art] Extend RT PCRs Done
1,663,360,736 UART: [art] Lock RT PCRs Done
1,663,362,007 UART: [art] Populate DV Done
1,663,370,162 UART: [fht] FMC Alias Private Key: 7
1,663,371,204 UART: [art] Derive CDI
1,663,371,484 UART: [art] Store in in slot 0x4
1,663,456,961 UART: [art] Derive Key Pair
1,663,457,321 UART: [art] Store priv key in slot 0x5
1,663,470,327 UART: [art] Derive Key Pair - Done
1,663,485,312 UART: [art] Signing Cert with AUTHO
1,663,485,792 UART: RITY.KEYID = 7
1,663,500,762 UART: [art] Erasing AUTHORITY.KEYID = 7
1,663,501,527 UART: [art] PUB.X = 7DB2B2A24F5D50A525F902A11503B741BCC57C98055A27EB386BCC90E60F17C1292DD81AE4B49B5CD0E634B1FCC29820
1,663,508,295 UART: [art] PUB.Y = E84A9B881BE4ADFF5F3F3E2E2663477D4F84C4EF75A0DEB643EE9E50D1EE1601ACB436CB2050673A5666222CC8ED7BF9
1,663,515,260 UART: [art] SIG.R = 478AE28B7D6AE32283283DD33A39E1CB40A33D849714A28D173B43EC0A3F087FE367BDE293C690C10DF950296E1E2E8F
1,663,522,027 UART: [art] SIG.S = 7544C1F77E833941DE07D5DB24EF953182FB13AD4773146B83EE3B8763DCA4556BF437815ACBF6BF38A00A9B57C330FD
1,663,545,206 UART: Caliptra RT
1,663,545,459 UART: [state] CFI Enabled
1,663,825,835 UART: [rt] RT listening for mailbox commands...
1,663,826,505 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,666,587,752 >>> mbox cmd response: success
1,666,600,803 UART:
1,666,600,819 UART: Running Caliptra FMC ...
1,666,601,227 UART:
1,666,601,281 UART: [state] CFI Enabled
1,666,689,806 UART: [art] Extend RT PCRs Done
1,666,690,234 UART: [art] Lock RT PCRs Done
1,666,691,379 UART: [art] Populate DV Done
1,666,699,596 UART: [fht] FMC Alias Private Key: 7
1,666,700,538 UART: [art] Derive CDI
1,666,700,818 UART: [art] Store in in slot 0x4
1,666,786,781 UART: [art] Derive Key Pair
1,666,787,141 UART: [art] Store priv key in slot 0x5
1,666,800,677 UART: [art] Derive Key Pair - Done
1,666,815,696 UART: [art] Signing Cert with AUTHO
1,666,816,176 UART: RITY.KEYID = 7
1,666,831,348 UART: [art] Erasing AUTHORITY.KEYID = 7
1,666,832,113 UART: [art] PUB.X = 16172CE789D2FE2087762C3D2EB908CBEA101334113E2EAE6882D8265972690B89B15C728EAF7DCD35E9C093AA87FDF1
1,666,838,883 UART: [art] PUB.Y = EB2C16DCD3FBBAF7DC5F1F451183567AA24A9A3E4F3F069ECB0089C5AE7AEFCA22E2D40F466ED4F072E4F5B5712C40AE
1,666,845,833 UART: [art] SIG.R = C67A469D644A64F8AA299A78DA75FE532B56E56FEDE7D8519E2762EB9B5DF65D9CB9D4CAB45FD684310A26C226BAF330
1,666,852,616 UART: [art] SIG.S = 0B27010C047EF240FC96F74D92C0FA3B959372F0FA9DF75D703FAC05A63F04D3989C2352A0C7FB610C0117D4337431E8
1,666,876,867 UART: Caliptra RT
1,666,877,120 UART: [state] CFI Enabled
1,667,154,829 UART: [rt] RT listening for mailbox commands...
1,667,155,499 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,669,916,650 >>> mbox cmd response: success
1,669,930,059 UART:
1,669,930,075 UART: Running Caliptra FMC ...
1,669,930,483 UART:
1,669,930,537 UART: [state] CFI Enabled
1,670,020,022 UART: [art] Extend RT PCRs Done
1,670,020,450 UART: [art] Lock RT PCRs Done
1,670,021,725 UART: [art] Populate DV Done
1,670,029,828 UART: [fht] FMC Alias Private Key: 7
1,670,030,888 UART: [art] Derive CDI
1,670,031,168 UART: [art] Store in in slot 0x4
1,670,117,093 UART: [art] Derive Key Pair
1,670,117,453 UART: [art] Store priv key in slot 0x5
1,670,130,467 UART: [art] Derive Key Pair - Done
1,670,145,314 UART: [art] Signing Cert with AUTHO
1,670,145,794 UART: RITY.KEYID = 7
1,670,160,744 UART: [art] Erasing AUTHORITY.KEYID = 7
1,670,161,509 UART: [art] PUB.X = 7DB2B2A24F5D50A525F902A11503B741BCC57C98055A27EB386BCC90E60F17C1292DD81AE4B49B5CD0E634B1FCC29820
1,670,168,277 UART: [art] PUB.Y = E84A9B881BE4ADFF5F3F3E2E2663477D4F84C4EF75A0DEB643EE9E50D1EE1601ACB436CB2050673A5666222CC8ED7BF9
1,670,175,242 UART: [art] SIG.R = 478AE28B7D6AE32283283DD33A39E1CB40A33D849714A28D173B43EC0A3F087FE367BDE293C690C10DF950296E1E2E8F
1,670,182,009 UART: [art] SIG.S = 7544C1F77E833941DE07D5DB24EF953182FB13AD4773146B83EE3B8763DCA4556BF437815ACBF6BF38A00A9B57C330FD
1,670,205,898 UART: Caliptra RT
1,670,206,151 UART: [state] CFI Enabled
1,670,487,767 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 332.08s
Truncated 1358308 bytes from beginning
5 UART: [art] Store in in slot 0x4
1,717,927,536 UART: [art] Derive Key Pair
1,717,927,896 UART: [art] Store priv key in slot 0x5
1,717,941,582 UART: [art] Derive Key Pair - Done
1,717,956,437 UART: [art] Signing Cert with AUTHO
1,717,956,917 UART: RITY.KEYID = 7
1,717,971,845 UART: [art] Erasing AUTHORITY.KEYID = 7
1,717,972,610 UART: [art] PUB.X = D299EB240C68D27772DED742D7DD5A43E398AEA846143BFDAC93B21A852555620C82488E8FFA2F6AC880262D94842480
1,717,979,376 UART: [art] PUB.Y = 005B95EB56E48F21DD694306858CED321F1F252427151B160B8167B44F0B1269F6014EE0A343703C8A658C3B8E621742
1,717,986,282 UART: [art] SIG.R = FFD9937DA621B5BFA3358C807C011F411B847317BA289038508856BF0AFF53424A30274A8B39206A8F90BEE72053696A
1,717,993,042 UART: [art] SIG.S = 8FE1BE35DF599E628E8D854E09A8D435019C08282587522F6D4995060FAD07A362B13437A7BDF1BA705A546392E5687C
1,718,016,033 UART: Caliptra RT
1,718,016,378 UART: [state] CFI Enabled
1,718,299,982 UART: [rt] RT listening for mailbox commands...
1,718,300,652 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,718,301,784 UART:
1,718,301,800 UART: Running Caliptra ROM ...
1,718,302,208 UART:
1,718,302,349 UART: [state] CFI Enabled
1,718,304,827 UART: [state] LifecycleState = Unprovisioned
1,718,305,482 UART: [state] DebugLocked = No
1,718,306,188 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,718,307,881 UART: [kat] SHA2-256
1,719,101,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,719,105,927 UART: [kat] ++
1,719,106,079 UART: [kat] sha1
1,719,110,331 UART: [kat] SHA2-256
1,719,112,269 UART: [kat] SHA2-384
1,719,115,114 UART: [kat] SHA2-512-ACC
1,719,117,014 UART: [kat] ECC-384
1,719,122,709 UART: [kat] HMAC-384Kdf
1,719,127,263 UART: [kat] LMS
1,719,695,459 UART: [kat] --
1,719,696,438 UART: [update-reset] ++
1,721,031,080 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,721,032,344 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
1,721,182,220 >>> mbox cmd response: success
1,721,182,497 UART: [update-reset] Copying MAN_2 To MAN_1
1,721,190,511 UART: [update-reset Success] --
1,721,191,242 UART: [state] Locking Datavault
1,721,192,014 UART: [state] Locking PCR0, PCR1 and PCR31
1,721,192,618 UART: [state] Locking ICCM
1,721,193,048 UART: [exit] Launching FMC @ 0x40000130
1,721,198,377 UART:
1,721,198,393 UART: Running Caliptra FMC ...
1,721,198,801 UART:
1,721,198,944 UART: [state] CFI Enabled
1,721,287,809 UART: [art] Extend RT PCRs Done
1,721,288,237 UART: [art] Lock RT PCRs Done
1,721,289,614 UART: [art] Populate DV Done
1,721,297,947 UART: [fht] FMC Alias Private Key: 7
1,721,298,983 UART: [art] Derive CDI
1,721,299,263 UART: [art] Store in in slot 0x4
1,721,384,672 UART: [art] Derive Key Pair
1,721,385,032 UART: [art] Store priv key in slot 0x5
1,721,398,118 UART: [art] Derive Key Pair - Done
1,721,412,969 UART: [art] Signing Cert with AUTHO
1,721,413,449 UART: RITY.KEYID = 7
1,721,429,093 UART: [art] Erasing AUTHORITY.KEYID = 7
1,721,429,858 UART: [art] PUB.X = 5E8A5210C882F2F07DC4BA681649D14E7B1B83A2CB61F7F71A828C7A3EC81C9A9AFDA2D9AC3D1BB861FC441E21B881C9
1,721,436,646 UART: [art] PUB.Y = EA10AFD097AA3CE40939B7AA439EB0F3D896FD4F91D0AD49FEA8531400203946DA97209FCEE00EEC7E597DB55B58E89C
1,721,443,586 UART: [art] SIG.R = 6FE20399E21640F8161A85888683ED09350BEE59CB71E40233FA9DE87F5F881CEB8137E890F321AD039579DF18E3C5DC
1,721,450,343 UART: [art] SIG.S = 46DD0080D9E685AA6822B8D9834842C97698122B7E46DD13E262483AD1713DCD698C200C3013603CAA232670B2E3F765
1,721,474,423 UART: Caliptra RT
1,721,474,768 UART: [state] CFI Enabled
1,721,757,874 UART: [rt] RT listening for mailbox commands...
1,721,758,544 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,721,759,454 UART:
1,721,759,470 UART: Running Caliptra ROM ...
1,721,759,878 UART:
1,721,760,019 UART: [state] CFI Enabled
1,721,762,775 UART: [state] LifecycleState = Unprovisioned
1,721,763,430 UART: [state] DebugLocked = No
1,721,764,072 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,721,765,585 UART: [kat] SHA2-256
1,722,559,516 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,722,563,631 UART: [kat] ++
1,722,563,783 UART: [kat] sha1
1,722,568,099 UART: [kat] SHA2-256
1,722,570,037 UART: [kat] SHA2-384
1,722,572,770 UART: [kat] SHA2-512-ACC
1,722,574,670 UART: [kat] ECC-384
1,722,580,183 UART: [kat] HMAC-384Kdf
1,722,584,767 UART: [kat] LMS
1,723,152,963 UART: [kat] --
1,723,153,892 UART: [update-reset] ++
1,724,488,836 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,724,490,100 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
1,724,639,976 >>> mbox cmd response: success
1,724,640,085 UART: [update-reset] Copying MAN_2 To MAN_1
1,724,648,099 UART: [update-reset Success] --
1,724,648,864 UART: [state] Locking Datavault
1,724,649,792 UART: [state] Locking PCR0, PCR1 and PCR31
1,724,650,396 UART: [state] Locking ICCM
1,724,651,012 UART: [exit] Launching FMC @ 0x40000130
1,724,656,341 UART:
1,724,656,357 UART: Running Caliptra FMC ...
1,724,656,765 UART:
1,724,656,908 UART: [state] CFI Enabled
1,724,745,907 UART: [art] Extend RT PCRs Done
1,724,746,335 UART: [art] Lock RT PCRs Done
1,724,747,278 UART: [art] Populate DV Done
1,724,755,493 UART: [fht] FMC Alias Private Key: 7
1,724,756,423 UART: [art] Derive CDI
1,724,756,703 UART: [art] Store in in slot 0x4
1,724,842,388 UART: [art] Derive Key Pair
1,724,842,748 UART: [art] Store priv key in slot 0x5
1,724,855,642 UART: [art] Derive Key Pair - Done
1,724,870,513 UART: [art] Signing Cert with AUTHO
1,724,870,993 UART: RITY.KEYID = 7
1,724,886,201 UART: [art] Erasing AUTHORITY.KEYID = 7
1,724,886,966 UART: [art] PUB.X = D299EB240C68D27772DED742D7DD5A43E398AEA846143BFDAC93B21A852555620C82488E8FFA2F6AC880262D94842480
1,724,893,732 UART: [art] PUB.Y = 005B95EB56E48F21DD694306858CED321F1F252427151B160B8167B44F0B1269F6014EE0A343703C8A658C3B8E621742
1,724,900,638 UART: [art] SIG.R = FFD9937DA621B5BFA3358C807C011F411B847317BA289038508856BF0AFF53424A30274A8B39206A8F90BEE72053696A
1,724,907,398 UART: [art] SIG.S = 8FE1BE35DF599E628E8D854E09A8D435019C08282587522F6D4995060FAD07A362B13437A7BDF1BA705A546392E5687C
1,724,930,809 UART: Caliptra RT
1,724,931,154 UART: [state] CFI Enabled
1,725,216,670 UART: [rt] RT listening for mailbox commands...
1,725,217,340 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,725,218,078 UART:
1,725,218,094 UART: Running Caliptra ROM ...
1,725,218,502 UART:
1,725,218,643 UART: [state] CFI Enabled
1,725,221,355 UART: [state] LifecycleState = Unprovisioned
1,725,222,010 UART: [state] DebugLocked = No
1,725,222,692 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,725,224,261 UART: [kat] SHA2-256
1,726,018,192 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,726,022,307 UART: [kat] ++
1,726,022,459 UART: [kat] sha1
1,726,026,701 UART: [kat] SHA2-256
1,726,028,639 UART: [kat] SHA2-384
1,726,031,432 UART: [kat] SHA2-512-ACC
1,726,033,332 UART: [kat] ECC-384
1,726,039,225 UART: [kat] HMAC-384Kdf
1,726,043,769 UART: [kat] LMS
1,726,611,965 UART: [kat] --
1,726,612,628 UART: [update-reset] ++
1,727,948,878 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,727,950,056 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
1,728,099,932 >>> mbox cmd response: success
1,728,100,211 UART: [update-reset] Copying MAN_2 To MAN_1
1,728,108,225 UART: [update-reset Success] --
1,728,109,180 UART: [state] Locking Datavault
1,728,109,840 UART: [state] Locking PCR0, PCR1 and PCR31
1,728,110,444 UART: [state] Locking ICCM
1,728,110,966 UART: [exit] Launching FMC @ 0x40000130
1,728,116,295 UART:
1,728,116,311 UART: Running Caliptra FMC ...
1,728,116,719 UART:
1,728,116,862 UART: [state] CFI Enabled
1,728,206,423 UART: [art] Extend RT PCRs Done
1,728,206,851 UART: [art] Lock RT PCRs Done
1,728,208,176 UART: [art] Populate DV Done
1,728,216,509 UART: [fht] FMC Alias Private Key: 7
1,728,217,539 UART: [art] Derive CDI
1,728,217,819 UART: [art] Store in in slot 0x4
1,728,303,602 UART: [art] Derive Key Pair
1,728,303,962 UART: [art] Store priv key in slot 0x5
1,728,317,832 UART: [art] Derive Key Pair - Done
1,728,332,309 UART: [art] Signing Cert with AUTHO
1,728,332,789 UART: RITY.KEYID = 7
1,728,348,155 UART: [art] Erasing AUTHORITY.KEYID = 7
1,728,348,920 UART: [art] PUB.X = 5E8A5210C882F2F07DC4BA681649D14E7B1B83A2CB61F7F71A828C7A3EC81C9A9AFDA2D9AC3D1BB861FC441E21B881C9
1,728,355,708 UART: [art] PUB.Y = EA10AFD097AA3CE40939B7AA439EB0F3D896FD4F91D0AD49FEA8531400203946DA97209FCEE00EEC7E597DB55B58E89C
1,728,362,648 UART: [art] SIG.R = 6FE20399E21640F8161A85888683ED09350BEE59CB71E40233FA9DE87F5F881CEB8137E890F321AD039579DF18E3C5DC
1,728,369,405 UART: [art] SIG.S = 46DD0080D9E685AA6822B8D9834842C97698122B7E46DD13E262483AD1713DCD698C200C3013603CAA232670B2E3F765
1,728,392,831 UART: Caliptra RT
1,728,393,176 UART: [state] CFI Enabled
1,728,675,330 UART: [rt] RT listening for mailbox commands...
1,728,676,000 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,728,677,112 UART:
1,728,677,128 UART: Running Caliptra ROM ...
1,728,677,536 UART:
1,728,677,677 UART: [state] CFI Enabled
1,728,680,811 UART: [state] LifecycleState = Unprovisioned
1,728,681,466 UART: [state] DebugLocked = No
1,728,682,026 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,728,683,747 UART: [kat] SHA2-256
1,729,477,678 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,729,481,793 UART: [kat] ++
1,729,481,945 UART: [kat] sha1
1,729,486,305 UART: [kat] SHA2-256
1,729,488,243 UART: [kat] SHA2-384
1,729,491,046 UART: [kat] SHA2-512-ACC
1,729,492,946 UART: [kat] ECC-384
1,729,498,749 UART: [kat] HMAC-384Kdf
1,729,503,337 UART: [kat] LMS
1,730,071,533 UART: [kat] --
1,730,072,532 UART: [update-reset] ++
1,731,406,448 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,731,407,614 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
1,731,557,490 >>> mbox cmd response: success
1,731,557,793 UART: [update-reset] Copying MAN_2 To MAN_1
1,731,565,807 UART: [update-reset Success] --
1,731,566,844 UART: [state] Locking Datavault
1,731,567,658 UART: [state] Locking PCR0, PCR1 and PCR31
1,731,568,262 UART: [state] Locking ICCM
1,731,568,918 UART: [exit] Launching FMC @ 0x40000130
1,731,574,247 UART:
1,731,574,263 UART: Running Caliptra FMC ...
1,731,574,671 UART:
1,731,574,814 UART: [state] CFI Enabled
1,731,664,405 UART: [art] Extend RT PCRs Done
1,731,664,833 UART: [art] Lock RT PCRs Done
1,731,666,160 UART: [art] Populate DV Done
1,731,674,173 UART: [fht] FMC Alias Private Key: 7
1,731,675,261 UART: [art] Derive CDI
1,731,675,541 UART: [art] Store in in slot 0x4
1,731,761,540 UART: [art] Derive Key Pair
1,731,761,900 UART: [art] Store priv key in slot 0x5
1,731,774,746 UART: [art] Derive Key Pair - Done
1,731,789,687 UART: [art] Signing Cert with AUTHO
1,731,790,167 UART: RITY.KEYID = 7
1,731,805,597 UART: [art] Erasing AUTHORITY.KEYID = 7
1,731,806,362 UART: [art] PUB.X = D299EB240C68D27772DED742D7DD5A43E398AEA846143BFDAC93B21A852555620C82488E8FFA2F6AC880262D94842480
1,731,813,128 UART: [art] PUB.Y = 005B95EB56E48F21DD694306858CED321F1F252427151B160B8167B44F0B1269F6014EE0A343703C8A658C3B8E621742
1,731,820,034 UART: [art] SIG.R = FFD9937DA621B5BFA3358C807C011F411B847317BA289038508856BF0AFF53424A30274A8B39206A8F90BEE72053696A
1,731,826,794 UART: [art] SIG.S = 8FE1BE35DF599E628E8D854E09A8D435019C08282587522F6D4995060FAD07A362B13437A7BDF1BA705A546392E5687C
1,731,850,421 UART: Caliptra RT
1,731,850,766 UART: [state] CFI Enabled
1,732,136,318 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 342.27s
Truncated 735002 bytes from beginning
5 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,647,096,259 >>> mbox cmd response: success
1,647,109,286 UART:
1,647,109,302 UART: Running Caliptra FMC ...
1,647,109,710 UART:
1,647,109,853 UART: [state] CFI Enabled
1,647,198,768 UART: [art] Extend RT PCRs Done
1,647,199,196 UART: [art] Lock RT PCRs Done
1,647,200,449 UART: [art] Populate DV Done
1,647,208,646 UART: [fht] FMC Alias Private Key: 7
1,647,209,714 UART: [art] Derive CDI
1,647,209,994 UART: [art] Store in in slot 0x4
1,647,295,859 UART: [art] Derive Key Pair
1,647,296,219 UART: [art] Store priv key in slot 0x5
1,647,309,487 UART: [art] Derive Key Pair - Done
1,647,324,085 UART: [art] Signing Cert with AUTHO
1,647,324,565 UART: RITY.KEYID = 7
1,647,339,995 UART: [art] Erasing AUTHORITY.KEYID = 7
1,647,340,760 UART: [art] PUB.X = 1864C7864300017D28A679553F02CFAE5500954954199A289B12601AF6A8829F881969BB30D07173CC4BF1ED75F7E327
1,647,347,468 UART: [art] PUB.Y = 1A5C8C2AF301CB3D070405685217DE9A4EED0091FBEE541C03D7AB018909826F9395098E31D133F42CF34097DEE5388C
1,647,354,374 UART: [art] SIG.R = BBC48AAEDF5FBCCB48C0156B5FC538F8B6C4D848EC68F0E7779EEF8BC9A232BDBE6B489B50E31300AC9B1DDC168D6B6D
1,647,361,154 UART: [art] SIG.S = D4BCBF4F716E8DA45AC9F4C9DB87BE16FB4998FA820153CF0D43B610F88543BDAC0058C9B8E72AA3030FAA442699404B
1,647,385,287 UART: Caliptra RT
1,647,385,632 UART: [state] CFI Enabled
1,647,665,440 UART: [rt] RT listening for mailbox commands...
1,647,666,110 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,650,427,422 >>> mbox cmd response: success
1,650,440,993 UART:
1,650,441,009 UART: Running Caliptra FMC ...
1,650,441,417 UART:
1,650,441,560 UART: [state] CFI Enabled
1,650,530,551 UART: [art] Extend RT PCRs Done
1,650,530,979 UART: [art] Lock RT PCRs Done
1,650,532,238 UART: [art] Populate DV Done
1,650,540,327 UART: [fht] FMC Alias Private Key: 7
1,650,541,421 UART: [art] Derive CDI
1,650,541,701 UART: [art] Store in in slot 0x4
1,650,627,652 UART: [art] Derive Key Pair
1,650,628,012 UART: [art] Store priv key in slot 0x5
1,650,641,504 UART: [art] Derive Key Pair - Done
1,650,656,248 UART: [art] Signing Cert with AUTHO
1,650,656,728 UART: RITY.KEYID = 7
1,650,671,714 UART: [art] Erasing AUTHORITY.KEYID = 7
1,650,672,479 UART: [art] PUB.X = CED76BCBDA37DED9A079EBB8ADF3E916A3D9346A79B2F58842FC3987A9A1B3346A802674823AEAF6B5F52055F5A7A434
1,650,679,265 UART: [art] PUB.Y = 969F47B3C3D01D0E936BFA65A1AAD12D34459BCF643C0DA944D01805CEF8E2ED6D612692C6D3228BB3F25DA51155E5FF
1,650,686,220 UART: [art] SIG.R = 670A7A35099CFF0F3FEE6B905330A5C5FD4B1E52EBFA77617938E63C077A2D594D5D802A8C9828B99B979F135FB88C10
1,650,692,984 UART: [art] SIG.S = 46464E89B3BF0AF6DBE98DD63609C38729F216D674E00CC5EA18E6FB58529DA53F451798D389907063E6EEF612E17F17
1,650,716,738 UART: Caliptra RT
1,650,717,083 UART: [state] CFI Enabled
1,651,001,343 UART: [rt] RT listening for mailbox commands...
1,651,002,013 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,653,762,929 >>> mbox cmd response: success
1,653,776,254 UART:
1,653,776,270 UART: Running Caliptra FMC ...
1,653,776,678 UART:
1,653,776,821 UART: [state] CFI Enabled
1,653,866,122 UART: [art] Extend RT PCRs Done
1,653,866,550 UART: [art] Lock RT PCRs Done
1,653,867,875 UART: [art] Populate DV Done
1,653,876,064 UART: [fht] FMC Alias Private Key: 7
1,653,877,202 UART: [art] Derive CDI
1,653,877,482 UART: [art] Store in in slot 0x4
1,653,963,555 UART: [art] Derive Key Pair
1,653,963,915 UART: [art] Store priv key in slot 0x5
1,653,976,503 UART: [art] Derive Key Pair - Done
1,653,991,707 UART: [art] Signing Cert with AUTHO
1,653,992,187 UART: RITY.KEYID = 7
1,654,007,487 UART: [art] Erasing AUTHORITY.KEYID = 7
1,654,008,252 UART: [art] PUB.X = 1864C7864300017D28A679553F02CFAE5500954954199A289B12601AF6A8829F881969BB30D07173CC4BF1ED75F7E327
1,654,014,960 UART: [art] PUB.Y = 1A5C8C2AF301CB3D070405685217DE9A4EED0091FBEE541C03D7AB018909826F9395098E31D133F42CF34097DEE5388C
1,654,021,866 UART: [art] SIG.R = BBC48AAEDF5FBCCB48C0156B5FC538F8B6C4D848EC68F0E7779EEF8BC9A232BDBE6B489B50E31300AC9B1DDC168D6B6D
1,654,028,646 UART: [art] SIG.S = D4BCBF4F716E8DA45AC9F4C9DB87BE16FB4998FA820153CF0D43B610F88543BDAC0058C9B8E72AA3030FAA442699404B
1,654,052,471 UART: Caliptra RT
1,654,052,816 UART: [state] CFI Enabled
1,654,334,308 UART: [rt] RT listening for mailbox commands...
1,654,334,978 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,657,097,440 >>> mbox cmd response: success
1,657,111,001 UART:
1,657,111,017 UART: Running Caliptra FMC ...
1,657,111,425 UART:
1,657,111,568 UART: [state] CFI Enabled
1,657,200,195 UART: [art] Extend RT PCRs Done
1,657,200,623 UART: [art] Lock RT PCRs Done
1,657,201,672 UART: [art] Populate DV Done
1,657,209,917 UART: [fht] FMC Alias Private Key: 7
1,657,210,989 UART: [art] Derive CDI
1,657,211,269 UART: [art] Store in in slot 0x4
1,657,296,842 UART: [art] Derive Key Pair
1,657,297,202 UART: [art] Store priv key in slot 0x5
1,657,310,534 UART: [art] Derive Key Pair - Done
1,657,325,162 UART: [art] Signing Cert with AUTHO
1,657,325,642 UART: RITY.KEYID = 7
1,657,340,396 UART: [art] Erasing AUTHORITY.KEYID = 7
1,657,341,161 UART: [art] PUB.X = CED76BCBDA37DED9A079EBB8ADF3E916A3D9346A79B2F58842FC3987A9A1B3346A802674823AEAF6B5F52055F5A7A434
1,657,347,947 UART: [art] PUB.Y = 969F47B3C3D01D0E936BFA65A1AAD12D34459BCF643C0DA944D01805CEF8E2ED6D612692C6D3228BB3F25DA51155E5FF
1,657,354,902 UART: [art] SIG.R = 670A7A35099CFF0F3FEE6B905330A5C5FD4B1E52EBFA77617938E63C077A2D594D5D802A8C9828B99B979F135FB88C10
1,657,361,666 UART: [art] SIG.S = 46464E89B3BF0AF6DBE98DD63609C38729F216D674E00CC5EA18E6FB58529DA53F451798D389907063E6EEF612E17F17
1,657,384,928 UART: Caliptra RT
1,657,385,273 UART: [state] CFI Enabled
1,657,670,297 UART: [rt] RT listening for mailbox commands...
1,657,670,967 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,660,434,125 >>> mbox cmd response: success
1,660,447,908 UART:
1,660,447,924 UART: Running Caliptra FMC ...
1,660,448,332 UART:
1,660,448,475 UART: [state] CFI Enabled
1,660,537,144 UART: [art] Extend RT PCRs Done
1,660,537,572 UART: [art] Lock RT PCRs Done
1,660,539,031 UART: [art] Populate DV Done
1,660,547,276 UART: [fht] FMC Alias Private Key: 7
1,660,548,260 UART: [art] Derive CDI
1,660,548,540 UART: [art] Store in in slot 0x4
1,660,634,237 UART: [art] Derive Key Pair
1,660,634,597 UART: [art] Store priv key in slot 0x5
1,660,647,937 UART: [art] Derive Key Pair - Done
1,660,662,611 UART: [art] Signing Cert with AUTHO
1,660,663,091 UART: RITY.KEYID = 7
1,660,678,099 UART: [art] Erasing AUTHORITY.KEYID = 7
1,660,678,864 UART: [art] PUB.X = 1864C7864300017D28A679553F02CFAE5500954954199A289B12601AF6A8829F881969BB30D07173CC4BF1ED75F7E327
1,660,685,572 UART: [art] PUB.Y = 1A5C8C2AF301CB3D070405685217DE9A4EED0091FBEE541C03D7AB018909826F9395098E31D133F42CF34097DEE5388C
1,660,692,478 UART: [art] SIG.R = BBC48AAEDF5FBCCB48C0156B5FC538F8B6C4D848EC68F0E7779EEF8BC9A232BDBE6B489B50E31300AC9B1DDC168D6B6D
1,660,699,258 UART: [art] SIG.S = D4BCBF4F716E8DA45AC9F4C9DB87BE16FB4998FA820153CF0D43B610F88543BDAC0058C9B8E72AA3030FAA442699404B
1,660,723,037 UART: Caliptra RT
1,660,723,382 UART: [state] CFI Enabled
1,661,004,286 UART: [rt] RT listening for mailbox commands...
1,661,004,956 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,663,766,824 >>> mbox cmd response: success
1,663,779,895 UART:
1,663,779,911 UART: Running Caliptra FMC ...
1,663,780,319 UART:
1,663,780,462 UART: [state] CFI Enabled
1,663,869,407 UART: [art] Extend RT PCRs Done
1,663,869,835 UART: [art] Lock RT PCRs Done
1,663,871,068 UART: [art] Populate DV Done
1,663,879,301 UART: [fht] FMC Alias Private Key: 7
1,663,880,311 UART: [art] Derive CDI
1,663,880,591 UART: [art] Store in in slot 0x4
1,663,966,256 UART: [art] Derive Key Pair
1,663,966,616 UART: [art] Store priv key in slot 0x5
1,663,979,378 UART: [art] Derive Key Pair - Done
1,663,994,408 UART: [art] Signing Cert with AUTHO
1,663,994,888 UART: RITY.KEYID = 7
1,664,009,946 UART: [art] Erasing AUTHORITY.KEYID = 7
1,664,010,711 UART: [art] PUB.X = CED76BCBDA37DED9A079EBB8ADF3E916A3D9346A79B2F58842FC3987A9A1B3346A802674823AEAF6B5F52055F5A7A434
1,664,017,497 UART: [art] PUB.Y = 969F47B3C3D01D0E936BFA65A1AAD12D34459BCF643C0DA944D01805CEF8E2ED6D612692C6D3228BB3F25DA51155E5FF
1,664,024,452 UART: [art] SIG.R = 670A7A35099CFF0F3FEE6B905330A5C5FD4B1E52EBFA77617938E63C077A2D594D5D802A8C9828B99B979F135FB88C10
1,664,031,216 UART: [art] SIG.S = 46464E89B3BF0AF6DBE98DD63609C38729F216D674E00CC5EA18E6FB58529DA53F451798D389907063E6EEF612E17F17
1,664,054,590 UART: Caliptra RT
1,664,054,935 UART: [state] CFI Enabled
1,664,341,051 UART: [rt] RT listening for mailbox commands...
1,664,341,721 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,667,105,719 >>> mbox cmd response: success
1,667,119,246 UART:
1,667,119,262 UART: Running Caliptra FMC ...
1,667,119,670 UART:
1,667,119,813 UART: [state] CFI Enabled
1,667,209,106 UART: [art] Extend RT PCRs Done
1,667,209,534 UART: [art] Lock RT PCRs Done
1,667,210,511 UART: [art] Populate DV Done
1,667,218,706 UART: [fht] FMC Alias Private Key: 7
1,667,219,866 UART: [art] Derive CDI
1,667,220,146 UART: [art] Store in in slot 0x4
1,667,305,771 UART: [art] Derive Key Pair
1,667,306,131 UART: [art] Store priv key in slot 0x5
1,667,318,671 UART: [art] Derive Key Pair - Done
1,667,333,567 UART: [art] Signing Cert with AUTHO
1,667,334,047 UART: RITY.KEYID = 7
1,667,349,439 UART: [art] Erasing AUTHORITY.KEYID = 7
1,667,350,204 UART: [art] PUB.X = 1864C7864300017D28A679553F02CFAE5500954954199A289B12601AF6A8829F881969BB30D07173CC4BF1ED75F7E327
1,667,356,912 UART: [art] PUB.Y = 1A5C8C2AF301CB3D070405685217DE9A4EED0091FBEE541C03D7AB018909826F9395098E31D133F42CF34097DEE5388C
1,667,363,818 UART: [art] SIG.R = BBC48AAEDF5FBCCB48C0156B5FC538F8B6C4D848EC68F0E7779EEF8BC9A232BDBE6B489B50E31300AC9B1DDC168D6B6D
1,667,370,598 UART: [art] SIG.S = D4BCBF4F716E8DA45AC9F4C9DB87BE16FB4998FA820153CF0D43B610F88543BDAC0058C9B8E72AA3030FAA442699404B
1,667,394,743 UART: Caliptra RT
1,667,395,088 UART: [state] CFI Enabled
1,667,681,818 UART: [rt] RT listening for mailbox commands...
1,667,682,488 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,670,443,382 >>> mbox cmd response: success
1,670,456,455 UART:
1,670,456,471 UART: Running Caliptra FMC ...
1,670,456,879 UART:
1,670,457,022 UART: [state] CFI Enabled
1,670,546,225 UART: [art] Extend RT PCRs Done
1,670,546,653 UART: [art] Lock RT PCRs Done
1,670,547,892 UART: [art] Populate DV Done
1,670,556,141 UART: [fht] FMC Alias Private Key: 7
1,670,557,229 UART: [art] Derive CDI
1,670,557,509 UART: [art] Store in in slot 0x4
1,670,643,196 UART: [art] Derive Key Pair
1,670,643,556 UART: [art] Store priv key in slot 0x5
1,670,656,110 UART: [art] Derive Key Pair - Done
1,670,671,194 UART: [art] Signing Cert with AUTHO
1,670,671,674 UART: RITY.KEYID = 7
1,670,686,950 UART: [art] Erasing AUTHORITY.KEYID = 7
1,670,687,715 UART: [art] PUB.X = CED76BCBDA37DED9A079EBB8ADF3E916A3D9346A79B2F58842FC3987A9A1B3346A802674823AEAF6B5F52055F5A7A434
1,670,694,501 UART: [art] PUB.Y = 969F47B3C3D01D0E936BFA65A1AAD12D34459BCF643C0DA944D01805CEF8E2ED6D612692C6D3228BB3F25DA51155E5FF
1,670,701,456 UART: [art] SIG.R = 670A7A35099CFF0F3FEE6B905330A5C5FD4B1E52EBFA77617938E63C077A2D594D5D802A8C9828B99B979F135FB88C10
1,670,708,220 UART: [art] SIG.S = 46464E89B3BF0AF6DBE98DD63609C38729F216D674E00CC5EA18E6FB58529DA53F451798D389907063E6EEF612E17F17
1,670,732,080 UART: Caliptra RT
1,670,732,425 UART: [state] CFI Enabled
1,671,013,319 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 330.39s
Truncated 1339593 bytes from beginning
[art] Populate DV Done
1,554,755,715 UART: [fht] FMC Alias Private Key: 7
1,554,756,825 UART: [art] Derive CDI
1,554,757,105 UART: [art] Store in in slot 0x4
1,554,842,766 UART: [art] Derive Key Pair
1,554,843,126 UART: [art] Store priv key in slot 0x5
1,554,856,162 UART: [art] Derive Key Pair - Done
1,554,870,817 UART: [art] Signing Cert with AUTHO
1,554,871,297 UART: RITY.KEYID = 7
1,554,886,105 UART: [art] Erasing AUTHORITY.KEYID = 7
1,554,886,870 UART: [art] PUB.X = EFF504757E9563FA4C4F3EC474FFD44C93F67B8828E2ED777269A8ECFDB3FD66716731006CA5AC8A11CB6577C2F70EF2
1,554,893,626 UART: [art] PUB.Y = 736A11F1C6267114EBD1D39BAF41EA7C4D421068105CF6AF08B9AC7D913CA83CD7A65E23F40736F9E29C09A1F4FAF0A0
1,554,900,581 UART: [art] SIG.R = 6D74521F1E65E419431DFE72FEBD33DF2C2AC51AE79D1F421FCD37A3382926D9AF5ED5453EDEE2F6E18F644A7CB848B2
1,554,907,369 UART: [art] SIG.S = AA1ADF553EC28B7B5E18A87B9DF7A0A331755347FD09D5F2998A8ED592B157D1347DC89F97998E8FD935BF83A71EC5BC
1,554,931,481 UART: Caliptra RT
1,554,931,734 UART: [state] CFI Enabled
1,555,213,887 UART: [rt] RT listening for mailbox commands...
1,555,214,557 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,555,215,468 UART:
1,555,215,484 UART: Running Caliptra ROM ...
1,555,215,892 UART:
1,555,215,947 UART: [state] CFI Enabled
1,555,218,323 UART: [state] LifecycleState = Unprovisioned
1,555,218,978 UART: [state] DebugLocked = No
1,555,219,658 UART: [state] WD Timer not started. Device not locked for debugging
1,555,220,942 UART: [kat] SHA2-256
1,556,026,592 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,556,030,717 UART: [kat] ++
1,556,030,869 UART: [kat] sha1
1,556,035,249 UART: [kat] SHA2-256
1,556,037,189 UART: [kat] SHA2-384
1,556,039,990 UART: [kat] SHA2-512-ACC
1,556,041,890 UART: [kat] ECC-384
1,556,051,869 UART: [kat] HMAC-384Kdf
1,556,056,381 UART: [kat] LMS
1,556,304,709 UART: [kat] --
1,556,305,675 UART: [update-reset] ++
1,557,617,307 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,557,618,290 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,557,768,114 >>> mbox cmd response: success
1,557,768,339 UART: [update-reset] Copying MAN_2 To MAN_1
1,557,776,353 UART: [update-reset Success] --
1,557,777,310 UART: [state] Locking Datavault
1,557,778,324 UART: [state] Locking PCR0, PCR1 and PCR31
1,557,778,928 UART: [state] Locking ICCM
1,557,779,402 UART: [exit] Launching FMC @ 0x40000130
1,557,784,731 UART:
1,557,784,747 UART: Running Caliptra FMC ...
1,557,785,155 UART:
1,557,785,209 UART: [state] CFI Enabled
1,557,874,394 UART: [art] Extend RT PCRs Done
1,557,874,822 UART: [art] Lock RT PCRs Done
1,557,876,043 UART: [art] Populate DV Done
1,557,883,946 UART: [fht] FMC Alias Private Key: 7
1,557,885,072 UART: [art] Derive CDI
1,557,885,352 UART: [art] Store in in slot 0x4
1,557,971,359 UART: [art] Derive Key Pair
1,557,971,719 UART: [art] Store priv key in slot 0x5
1,557,984,959 UART: [art] Derive Key Pair - Done
1,557,999,582 UART: [art] Signing Cert with AUTHO
1,558,000,062 UART: RITY.KEYID = 7
1,558,015,480 UART: [art] Erasing AUTHORITY.KEYID = 7
1,558,016,245 UART: [art] PUB.X = 82578AEC96D521D54F73356FE3670415276D91AA9E85C68BF608495500B6F6AEB5514C50D1BE4F2D5844F3A0F9534CA2
1,558,022,987 UART: [art] PUB.Y = 4B8A6B530236BAAB0807FA7278541DB7661F13AFFF346FA949EA7CA0D682936CDC2CE40828A37626D5EE4E3127E7F9E9
1,558,029,935 UART: [art] SIG.R = 99290149CDD8D5D14A4044F2E4A3E34FD07D40C8C6C6BD5F890AC0D341AA23CA26686E18E0BC37FF6F774A3B39E0C91D
1,558,036,713 UART: [art] SIG.S = 00720DE4A26CD2E34703E7127BFCD9ABAA91351A5A23D8BDFC2387998C3CBF253D76CA6781CE101C9EFE985048E96525
1,558,060,340 UART: Caliptra RT
1,558,060,593 UART: [state] CFI Enabled
1,558,344,039 UART: [rt] RT listening for mailbox commands...
1,558,344,709 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,558,345,776 UART:
1,558,345,792 UART: Running Caliptra ROM ...
1,558,346,200 UART:
1,558,346,255 UART: [state] CFI Enabled
1,558,349,513 UART: [state] LifecycleState = Unprovisioned
1,558,350,168 UART: [state] DebugLocked = No
1,558,350,902 UART: [state] WD Timer not started. Device not locked for debugging
1,558,352,134 UART: [kat] SHA2-256
1,559,157,784 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,559,161,909 UART: [kat] ++
1,559,162,061 UART: [kat] sha1
1,559,166,341 UART: [kat] SHA2-256
1,559,168,281 UART: [kat] SHA2-384
1,559,170,874 UART: [kat] SHA2-512-ACC
1,559,172,774 UART: [kat] ECC-384
1,559,182,047 UART: [kat] HMAC-384Kdf
1,559,186,423 UART: [kat] LMS
1,559,434,751 UART: [kat] --
1,559,435,663 UART: [update-reset] ++
1,560,748,313 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,560,749,442 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,560,899,266 >>> mbox cmd response: success
1,560,899,495 UART: [update-reset] Copying MAN_2 To MAN_1
1,560,907,509 UART: [update-reset Success] --
1,560,908,586 UART: [state] Locking Datavault
1,560,909,296 UART: [state] Locking PCR0, PCR1 and PCR31
1,560,909,900 UART: [state] Locking ICCM
1,560,910,344 UART: [exit] Launching FMC @ 0x40000130
1,560,915,673 UART:
1,560,915,689 UART: Running Caliptra FMC ...
1,560,916,097 UART:
1,560,916,151 UART: [state] CFI Enabled
1,561,005,538 UART: [art] Extend RT PCRs Done
1,561,005,966 UART: [art] Lock RT PCRs Done
1,561,007,033 UART: [art] Populate DV Done
1,561,015,234 UART: [fht] FMC Alias Private Key: 7
1,561,016,316 UART: [art] Derive CDI
1,561,016,596 UART: [art] Store in in slot 0x4
1,561,102,045 UART: [art] Derive Key Pair
1,561,102,405 UART: [art] Store priv key in slot 0x5
1,561,115,513 UART: [art] Derive Key Pair - Done
1,561,130,004 UART: [art] Signing Cert with AUTHO
1,561,130,484 UART: RITY.KEYID = 7
1,561,145,688 UART: [art] Erasing AUTHORITY.KEYID = 7
1,561,146,453 UART: [art] PUB.X = EFF504757E9563FA4C4F3EC474FFD44C93F67B8828E2ED777269A8ECFDB3FD66716731006CA5AC8A11CB6577C2F70EF2
1,561,153,209 UART: [art] PUB.Y = 736A11F1C6267114EBD1D39BAF41EA7C4D421068105CF6AF08B9AC7D913CA83CD7A65E23F40736F9E29C09A1F4FAF0A0
1,561,160,164 UART: [art] SIG.R = 6D74521F1E65E419431DFE72FEBD33DF2C2AC51AE79D1F421FCD37A3382926D9AF5ED5453EDEE2F6E18F644A7CB848B2
1,561,166,952 UART: [art] SIG.S = AA1ADF553EC28B7B5E18A87B9DF7A0A331755347FD09D5F2998A8ED592B157D1347DC89F97998E8FD935BF83A71EC5BC
1,561,190,810 UART: Caliptra RT
1,561,191,063 UART: [state] CFI Enabled
1,561,470,662 UART: [rt] RT listening for mailbox commands...
1,561,471,332 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,561,472,067 UART:
1,561,472,083 UART: Running Caliptra ROM ...
1,561,472,491 UART:
1,561,472,546 UART: [state] CFI Enabled
1,561,475,314 UART: [state] LifecycleState = Unprovisioned
1,561,475,969 UART: [state] DebugLocked = No
1,561,476,535 UART: [state] WD Timer not started. Device not locked for debugging
1,561,477,845 UART: [kat] SHA2-256
1,562,283,495 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,562,287,620 UART: [kat] ++
1,562,287,772 UART: [kat] sha1
1,562,292,018 UART: [kat] SHA2-256
1,562,293,958 UART: [kat] SHA2-384
1,562,296,707 UART: [kat] SHA2-512-ACC
1,562,298,607 UART: [kat] ECC-384
1,562,308,580 UART: [kat] HMAC-384Kdf
1,562,313,220 UART: [kat] LMS
1,562,561,548 UART: [kat] --
1,562,562,556 UART: [update-reset] ++
1,563,875,140 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,563,876,123 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,564,025,947 >>> mbox cmd response: success
1,564,026,258 UART: [update-reset] Copying MAN_2 To MAN_1
1,564,034,272 UART: [update-reset Success] --
1,564,035,137 UART: [state] Locking Datavault
1,564,035,901 UART: [state] Locking PCR0, PCR1 and PCR31
1,564,036,505 UART: [state] Locking ICCM
1,564,037,083 UART: [exit] Launching FMC @ 0x40000130
1,564,042,412 UART:
1,564,042,428 UART: Running Caliptra FMC ...
1,564,042,836 UART:
1,564,042,890 UART: [state] CFI Enabled
1,564,132,977 UART: [art] Extend RT PCRs Done
1,564,133,405 UART: [art] Lock RT PCRs Done
1,564,134,842 UART: [art] Populate DV Done
1,564,142,939 UART: [fht] FMC Alias Private Key: 7
1,564,143,917 UART: [art] Derive CDI
1,564,144,197 UART: [art] Store in in slot 0x4
1,564,229,916 UART: [art] Derive Key Pair
1,564,230,276 UART: [art] Store priv key in slot 0x5
1,564,243,774 UART: [art] Derive Key Pair - Done
1,564,258,761 UART: [art] Signing Cert with AUTHO
1,564,259,241 UART: RITY.KEYID = 7
1,564,273,901 UART: [art] Erasing AUTHORITY.KEYID = 7
1,564,274,666 UART: [art] PUB.X = 82578AEC96D521D54F73356FE3670415276D91AA9E85C68BF608495500B6F6AEB5514C50D1BE4F2D5844F3A0F9534CA2
1,564,281,408 UART: [art] PUB.Y = 4B8A6B530236BAAB0807FA7278541DB7661F13AFFF346FA949EA7CA0D682936CDC2CE40828A37626D5EE4E3127E7F9E9
1,564,288,356 UART: [art] SIG.R = 99290149CDD8D5D14A4044F2E4A3E34FD07D40C8C6C6BD5F890AC0D341AA23CA26686E18E0BC37FF6F774A3B39E0C91D
1,564,295,134 UART: [art] SIG.S = 00720DE4A26CD2E34703E7127BFCD9ABAA91351A5A23D8BDFC2387998C3CBF253D76CA6781CE101C9EFE985048E96525
1,564,319,341 UART: Caliptra RT
1,564,319,594 UART: [state] CFI Enabled
1,564,603,118 UART: [rt] RT listening for mailbox commands...
1,564,603,788 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,564,604,613 UART:
1,564,604,629 UART: Running Caliptra ROM ...
1,564,605,037 UART:
1,564,605,092 UART: [state] CFI Enabled
1,564,607,820 UART: [state] LifecycleState = Unprovisioned
1,564,608,475 UART: [state] DebugLocked = No
1,564,609,089 UART: [state] WD Timer not started. Device not locked for debugging
1,564,610,421 UART: [kat] SHA2-256
1,565,416,071 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,565,420,196 UART: [kat] ++
1,565,420,348 UART: [kat] sha1
1,565,424,628 UART: [kat] SHA2-256
1,565,426,568 UART: [kat] SHA2-384
1,565,429,277 UART: [kat] SHA2-512-ACC
1,565,431,177 UART: [kat] ECC-384
1,565,440,692 UART: [kat] HMAC-384Kdf
1,565,445,222 UART: [kat] LMS
1,565,693,550 UART: [kat] --
1,565,694,514 UART: [update-reset] ++
1,567,007,550 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,567,008,607 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,567,158,431 >>> mbox cmd response: success
1,567,158,786 UART: [update-reset] Copying MAN_2 To MAN_1
1,567,166,800 UART: [update-reset Success] --
1,567,167,681 UART: [state] Locking Datavault
1,567,168,401 UART: [state] Locking PCR0, PCR1 and PCR31
1,567,169,005 UART: [state] Locking ICCM
1,567,169,657 UART: [exit] Launching FMC @ 0x40000130
1,567,174,986 UART:
1,567,175,002 UART: Running Caliptra FMC ...
1,567,175,410 UART:
1,567,175,464 UART: [state] CFI Enabled
1,567,264,783 UART: [art] Extend RT PCRs Done
1,567,265,211 UART: [art] Lock RT PCRs Done
1,567,266,684 UART: [art] Populate DV Done
1,567,274,871 UART: [fht] FMC Alias Private Key: 7
1,567,275,929 UART: [art] Derive CDI
1,567,276,209 UART: [art] Store in in slot 0x4
1,567,362,160 UART: [art] Derive Key Pair
1,567,362,520 UART: [art] Store priv key in slot 0x5
1,567,375,592 UART: [art] Derive Key Pair - Done
1,567,390,699 UART: [art] Signing Cert with AUTHO
1,567,391,179 UART: RITY.KEYID = 7
1,567,406,691 UART: [art] Erasing AUTHORITY.KEYID = 7
1,567,407,456 UART: [art] PUB.X = EFF504757E9563FA4C4F3EC474FFD44C93F67B8828E2ED777269A8ECFDB3FD66716731006CA5AC8A11CB6577C2F70EF2
1,567,414,212 UART: [art] PUB.Y = 736A11F1C6267114EBD1D39BAF41EA7C4D421068105CF6AF08B9AC7D913CA83CD7A65E23F40736F9E29C09A1F4FAF0A0
1,567,421,167 UART: [art] SIG.R = 6D74521F1E65E419431DFE72FEBD33DF2C2AC51AE79D1F421FCD37A3382926D9AF5ED5453EDEE2F6E18F644A7CB848B2
1,567,427,955 UART: [art] SIG.S = AA1ADF553EC28B7B5E18A87B9DF7A0A331755347FD09D5F2998A8ED592B157D1347DC89F97998E8FD935BF83A71EC5BC
1,567,451,823 UART: Caliptra RT
1,567,452,076 UART: [state] CFI Enabled
1,567,734,535 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 318.36s
Truncated 733352 bytes from beginning
2 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,486,051,172 >>> mbox cmd response: success
1,486,064,376 UART:
1,486,064,392 UART: Running Caliptra FMC ...
1,486,064,800 UART:
1,486,064,854 UART: [state] CFI Enabled
1,486,153,797 UART: [art] Extend RT PCRs Done
1,486,154,225 UART: [art] Lock RT PCRs Done
1,486,155,458 UART: [art] Populate DV Done
1,486,163,713 UART: [fht] FMC Alias Private Key: 7
1,486,164,827 UART: [art] Derive CDI
1,486,165,107 UART: [art] Store in in slot 0x4
1,486,251,108 UART: [art] Derive Key Pair
1,486,251,468 UART: [art] Store priv key in slot 0x5
1,486,264,036 UART: [art] Derive Key Pair - Done
1,486,279,058 UART: [art] Signing Cert with AUTHO
1,486,279,538 UART: RITY.KEYID = 7
1,486,294,166 UART: [art] Erasing AUTHORITY.KEYID = 7
1,486,294,931 UART: [art] PUB.X = 9E13E97A23ACA97DDC869072686ECEE8CA882C978F306B7C6FF171E0B5A37564829C541A6671F2C2561791BB6F887785
1,486,301,701 UART: [art] PUB.Y = F3E84A37DE56F3BE4C48A744067A298F68A148304CFE9B0EC6B09AE476A54B646A2BBD2D3C53DB55E7B40E5E6ABC4642
1,486,308,658 UART: [art] SIG.R = 30D3CAEF517E3066A0690770ADD7EC9CBF49A46CED93A28F0B86C33BE53F2BCEF127BB9AAF9F9EC9B885570236971963
1,486,315,435 UART: [art] SIG.S = 2334114122952258C431529EEA629A1BEED08F644A93881503621C5BB7972528E67CACD6FE0B6491C7EEFF6568AC08DC
1,486,339,261 UART: Caliptra RT
1,486,339,514 UART: [state] CFI Enabled
1,486,619,247 UART: [rt] RT listening for mailbox commands...
1,486,619,917 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,489,058,467 >>> mbox cmd response: success
1,489,071,787 UART:
1,489,071,803 UART: Running Caliptra FMC ...
1,489,072,211 UART:
1,489,072,265 UART: [state] CFI Enabled
1,489,160,900 UART: [art] Extend RT PCRs Done
1,489,161,328 UART: [art] Lock RT PCRs Done
1,489,162,657 UART: [art] Populate DV Done
1,489,170,970 UART: [fht] FMC Alias Private Key: 7
1,489,171,954 UART: [art] Derive CDI
1,489,172,234 UART: [art] Store in in slot 0x4
1,489,257,547 UART: [art] Derive Key Pair
1,489,257,907 UART: [art] Store priv key in slot 0x5
1,489,270,433 UART: [art] Derive Key Pair - Done
1,489,285,422 UART: [art] Signing Cert with AUTHO
1,489,285,902 UART: RITY.KEYID = 7
1,489,300,906 UART: [art] Erasing AUTHORITY.KEYID = 7
1,489,301,671 UART: [art] PUB.X = BC3D560F459F683AA14CF9AB54D3D187EFFBF51D73E261F055D1F42A7330F7D45E37B96B238FD06C5C35537920D6BB41
1,489,308,448 UART: [art] PUB.Y = CA06F55BF3A1AF3C15ABE2985B21BCFFB7C884C20E74855C55E86CA36A8A2A0B84A1BA8804BAB9F8E637085F881293A3
1,489,315,399 UART: [art] SIG.R = 3B5AC79323DCAD358405062E56CA0E3457F5E42BAB8D43F0C26121261D8FC09D0580AA234097A7D9A301A07B2120BE6C
1,489,322,158 UART: [art] SIG.S = 05D43C81A7099AC32CB737FBDA2A313BB1E8A11F04488FCEB554885EE50847F154D295DBE158B517CC6309EC140AF487
1,489,345,909 UART: Caliptra RT
1,489,346,162 UART: [state] CFI Enabled
1,489,632,219 UART: [rt] RT listening for mailbox commands...
1,489,632,889 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,492,070,793 >>> mbox cmd response: success
1,492,084,127 UART:
1,492,084,143 UART: Running Caliptra FMC ...
1,492,084,551 UART:
1,492,084,605 UART: [state] CFI Enabled
1,492,173,316 UART: [art] Extend RT PCRs Done
1,492,173,744 UART: [art] Lock RT PCRs Done
1,492,174,847 UART: [art] Populate DV Done
1,492,182,986 UART: [fht] FMC Alias Private Key: 7
1,492,184,012 UART: [art] Derive CDI
1,492,184,292 UART: [art] Store in in slot 0x4
1,492,269,755 UART: [art] Derive Key Pair
1,492,270,115 UART: [art] Store priv key in slot 0x5
1,492,283,691 UART: [art] Derive Key Pair - Done
1,492,298,409 UART: [art] Signing Cert with AUTHO
1,492,298,889 UART: RITY.KEYID = 7
1,492,314,031 UART: [art] Erasing AUTHORITY.KEYID = 7
1,492,314,796 UART: [art] PUB.X = 9E13E97A23ACA97DDC869072686ECEE8CA882C978F306B7C6FF171E0B5A37564829C541A6671F2C2561791BB6F887785
1,492,321,566 UART: [art] PUB.Y = F3E84A37DE56F3BE4C48A744067A298F68A148304CFE9B0EC6B09AE476A54B646A2BBD2D3C53DB55E7B40E5E6ABC4642
1,492,328,523 UART: [art] SIG.R = 30D3CAEF517E3066A0690770ADD7EC9CBF49A46CED93A28F0B86C33BE53F2BCEF127BB9AAF9F9EC9B885570236971963
1,492,335,300 UART: [art] SIG.S = 2334114122952258C431529EEA629A1BEED08F644A93881503621C5BB7972528E67CACD6FE0B6491C7EEFF6568AC08DC
1,492,358,916 UART: Caliptra RT
1,492,359,169 UART: [state] CFI Enabled
1,492,639,204 UART: [rt] RT listening for mailbox commands...
1,492,639,874 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,495,076,658 >>> mbox cmd response: success
1,495,090,020 UART:
1,495,090,036 UART: Running Caliptra FMC ...
1,495,090,444 UART:
1,495,090,498 UART: [state] CFI Enabled
1,495,179,387 UART: [art] Extend RT PCRs Done
1,495,179,815 UART: [art] Lock RT PCRs Done
1,495,180,766 UART: [art] Populate DV Done
1,495,189,247 UART: [fht] FMC Alias Private Key: 7
1,495,190,205 UART: [art] Derive CDI
1,495,190,485 UART: [art] Store in in slot 0x4
1,495,275,748 UART: [art] Derive Key Pair
1,495,276,108 UART: [art] Store priv key in slot 0x5
1,495,289,524 UART: [art] Derive Key Pair - Done
1,495,304,333 UART: [art] Signing Cert with AUTHO
1,495,304,813 UART: RITY.KEYID = 7
1,495,320,229 UART: [art] Erasing AUTHORITY.KEYID = 7
1,495,320,994 UART: [art] PUB.X = BC3D560F459F683AA14CF9AB54D3D187EFFBF51D73E261F055D1F42A7330F7D45E37B96B238FD06C5C35537920D6BB41
1,495,327,771 UART: [art] PUB.Y = CA06F55BF3A1AF3C15ABE2985B21BCFFB7C884C20E74855C55E86CA36A8A2A0B84A1BA8804BAB9F8E637085F881293A3
1,495,334,722 UART: [art] SIG.R = 3B5AC79323DCAD358405062E56CA0E3457F5E42BAB8D43F0C26121261D8FC09D0580AA234097A7D9A301A07B2120BE6C
1,495,341,481 UART: [art] SIG.S = 05D43C81A7099AC32CB737FBDA2A313BB1E8A11F04488FCEB554885EE50847F154D295DBE158B517CC6309EC140AF487
1,495,365,188 UART: Caliptra RT
1,495,365,441 UART: [state] CFI Enabled
1,495,646,422 UART: [rt] RT listening for mailbox commands...
1,495,647,092 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,498,084,630 >>> mbox cmd response: success
1,498,097,672 UART:
1,498,097,688 UART: Running Caliptra FMC ...
1,498,098,096 UART:
1,498,098,150 UART: [state] CFI Enabled
1,498,187,395 UART: [art] Extend RT PCRs Done
1,498,187,823 UART: [art] Lock RT PCRs Done
1,498,188,934 UART: [art] Populate DV Done
1,498,196,857 UART: [fht] FMC Alias Private Key: 7
1,498,197,861 UART: [art] Derive CDI
1,498,198,141 UART: [art] Store in in slot 0x4
1,498,283,742 UART: [art] Derive Key Pair
1,498,284,102 UART: [art] Store priv key in slot 0x5
1,498,297,876 UART: [art] Derive Key Pair - Done
1,498,312,568 UART: [art] Signing Cert with AUTHO
1,498,313,048 UART: RITY.KEYID = 7
1,498,328,572 UART: [art] Erasing AUTHORITY.KEYID = 7
1,498,329,337 UART: [art] PUB.X = 9E13E97A23ACA97DDC869072686ECEE8CA882C978F306B7C6FF171E0B5A37564829C541A6671F2C2561791BB6F887785
1,498,336,107 UART: [art] PUB.Y = F3E84A37DE56F3BE4C48A744067A298F68A148304CFE9B0EC6B09AE476A54B646A2BBD2D3C53DB55E7B40E5E6ABC4642
1,498,343,064 UART: [art] SIG.R = 30D3CAEF517E3066A0690770ADD7EC9CBF49A46CED93A28F0B86C33BE53F2BCEF127BB9AAF9F9EC9B885570236971963
1,498,349,841 UART: [art] SIG.S = 2334114122952258C431529EEA629A1BEED08F644A93881503621C5BB7972528E67CACD6FE0B6491C7EEFF6568AC08DC
1,498,374,109 UART: Caliptra RT
1,498,374,362 UART: [state] CFI Enabled
1,498,655,317 UART: [rt] RT listening for mailbox commands...
1,498,655,987 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,501,095,163 >>> mbox cmd response: success
1,501,108,405 UART:
1,501,108,421 UART: Running Caliptra FMC ...
1,501,108,829 UART:
1,501,108,883 UART: [state] CFI Enabled
1,501,197,650 UART: [art] Extend RT PCRs Done
1,501,198,078 UART: [art] Lock RT PCRs Done
1,501,199,199 UART: [art] Populate DV Done
1,501,207,464 UART: [fht] FMC Alias Private Key: 7
1,501,208,392 UART: [art] Derive CDI
1,501,208,672 UART: [art] Store in in slot 0x4
1,501,294,805 UART: [art] Derive Key Pair
1,501,295,165 UART: [art] Store priv key in slot 0x5
1,501,308,299 UART: [art] Derive Key Pair - Done
1,501,323,342 UART: [art] Signing Cert with AUTHO
1,501,323,822 UART: RITY.KEYID = 7
1,501,338,920 UART: [art] Erasing AUTHORITY.KEYID = 7
1,501,339,685 UART: [art] PUB.X = BC3D560F459F683AA14CF9AB54D3D187EFFBF51D73E261F055D1F42A7330F7D45E37B96B238FD06C5C35537920D6BB41
1,501,346,462 UART: [art] PUB.Y = CA06F55BF3A1AF3C15ABE2985B21BCFFB7C884C20E74855C55E86CA36A8A2A0B84A1BA8804BAB9F8E637085F881293A3
1,501,353,413 UART: [art] SIG.R = 3B5AC79323DCAD358405062E56CA0E3457F5E42BAB8D43F0C26121261D8FC09D0580AA234097A7D9A301A07B2120BE6C
1,501,360,172 UART: [art] SIG.S = 05D43C81A7099AC32CB737FBDA2A313BB1E8A11F04488FCEB554885EE50847F154D295DBE158B517CC6309EC140AF487
1,501,383,879 UART: Caliptra RT
1,501,384,132 UART: [state] CFI Enabled
1,501,662,491 UART: [rt] RT listening for mailbox commands...
1,501,663,161 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,504,100,751 >>> mbox cmd response: success
1,504,114,163 UART:
1,504,114,179 UART: Running Caliptra FMC ...
1,504,114,587 UART:
1,504,114,641 UART: [state] CFI Enabled
1,504,204,020 UART: [art] Extend RT PCRs Done
1,504,204,448 UART: [art] Lock RT PCRs Done
1,504,205,651 UART: [art] Populate DV Done
1,504,213,898 UART: [fht] FMC Alias Private Key: 7
1,504,215,054 UART: [art] Derive CDI
1,504,215,334 UART: [art] Store in in slot 0x4
1,504,300,853 UART: [art] Derive Key Pair
1,504,301,213 UART: [art] Store priv key in slot 0x5
1,504,314,261 UART: [art] Derive Key Pair - Done
1,504,328,963 UART: [art] Signing Cert with AUTHO
1,504,329,443 UART: RITY.KEYID = 7
1,504,344,487 UART: [art] Erasing AUTHORITY.KEYID = 7
1,504,345,252 UART: [art] PUB.X = 9E13E97A23ACA97DDC869072686ECEE8CA882C978F306B7C6FF171E0B5A37564829C541A6671F2C2561791BB6F887785
1,504,352,022 UART: [art] PUB.Y = F3E84A37DE56F3BE4C48A744067A298F68A148304CFE9B0EC6B09AE476A54B646A2BBD2D3C53DB55E7B40E5E6ABC4642
1,504,358,979 UART: [art] SIG.R = 30D3CAEF517E3066A0690770ADD7EC9CBF49A46CED93A28F0B86C33BE53F2BCEF127BB9AAF9F9EC9B885570236971963
1,504,365,756 UART: [art] SIG.S = 2334114122952258C431529EEA629A1BEED08F644A93881503621C5BB7972528E67CACD6FE0B6491C7EEFF6568AC08DC
1,504,389,728 UART: Caliptra RT
1,504,389,981 UART: [state] CFI Enabled
1,504,673,382 UART: [rt] RT listening for mailbox commands...
1,504,674,052 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,507,111,430 >>> mbox cmd response: success
1,507,124,746 UART:
1,507,124,762 UART: Running Caliptra FMC ...
1,507,125,170 UART:
1,507,125,224 UART: [state] CFI Enabled
1,507,214,369 UART: [art] Extend RT PCRs Done
1,507,214,797 UART: [art] Lock RT PCRs Done
1,507,216,008 UART: [art] Populate DV Done
1,507,224,025 UART: [fht] FMC Alias Private Key: 7
1,507,224,969 UART: [art] Derive CDI
1,507,225,249 UART: [art] Store in in slot 0x4
1,507,310,640 UART: [art] Derive Key Pair
1,507,311,000 UART: [art] Store priv key in slot 0x5
1,507,323,776 UART: [art] Derive Key Pair - Done
1,507,338,337 UART: [art] Signing Cert with AUTHO
1,507,338,817 UART: RITY.KEYID = 7
1,507,353,747 UART: [art] Erasing AUTHORITY.KEYID = 7
1,507,354,512 UART: [art] PUB.X = BC3D560F459F683AA14CF9AB54D3D187EFFBF51D73E261F055D1F42A7330F7D45E37B96B238FD06C5C35537920D6BB41
1,507,361,289 UART: [art] PUB.Y = CA06F55BF3A1AF3C15ABE2985B21BCFFB7C884C20E74855C55E86CA36A8A2A0B84A1BA8804BAB9F8E637085F881293A3
1,507,368,240 UART: [art] SIG.R = 3B5AC79323DCAD358405062E56CA0E3457F5E42BAB8D43F0C26121261D8FC09D0580AA234097A7D9A301A07B2120BE6C
1,507,374,999 UART: [art] SIG.S = 05D43C81A7099AC32CB737FBDA2A313BB1E8A11F04488FCEB554885EE50847F154D295DBE158B517CC6309EC140AF487
1,507,398,456 UART: Caliptra RT
1,507,398,709 UART: [state] CFI Enabled
1,507,678,502 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 306.50s
Truncated 1339593 bytes from beginning
[art] Populate DV Done
1,555,285,052 UART: [fht] FMC Alias Private Key: 7
1,555,286,222 UART: [art] Derive CDI
1,555,286,502 UART: [art] Store in in slot 0x4
1,555,372,017 UART: [art] Derive Key Pair
1,555,372,377 UART: [art] Store priv key in slot 0x5
1,555,386,055 UART: [art] Derive Key Pair - Done
1,555,401,019 UART: [art] Signing Cert with AUTHO
1,555,401,499 UART: RITY.KEYID = 7
1,555,416,125 UART: [art] Erasing AUTHORITY.KEYID = 7
1,555,416,890 UART: [art] PUB.X = 03DB4B4E79E15C563D6CD22860AFE187ADC59026D4DCF67DF4C4A467018F5E9AA76E618DC9265F698CE75AB964025DF6
1,555,423,663 UART: [art] PUB.Y = 78521C3A72DD839D949A33BEF5637017B1B81A5C6DB3DD104D9DB77A900719B7C4279E771B60D9E3A73B1C055A262A43
1,555,430,609 UART: [art] SIG.R = 52100BF2EAC4739252DBAE777F77FD4929F6ECA1F9BD4D9031AD704E5F9B2C28938D8442B31819E624503D4EB7C13065
1,555,437,380 UART: [art] SIG.S = CD2BF8E03BD946DB8D9EEFACC84EE43BB77B26F9B1C970DDC44EBCA409C34EE9E025096F8653D3B97044CD600FAD00D3
1,555,461,192 UART: Caliptra RT
1,555,461,537 UART: [state] CFI Enabled
1,555,745,096 UART: [rt] RT listening for mailbox commands...
1,555,745,766 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,555,746,985 UART:
1,555,747,001 UART: Running Caliptra ROM ...
1,555,747,409 UART:
1,555,747,551 UART: [state] CFI Enabled
1,555,750,193 UART: [state] LifecycleState = Unprovisioned
1,555,750,848 UART: [state] DebugLocked = No
1,555,751,420 UART: [state] WD Timer not started. Device not locked for debugging
1,555,752,636 UART: [kat] SHA2-256
1,556,558,286 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,556,562,411 UART: [kat] ++
1,556,562,563 UART: [kat] sha1
1,556,566,669 UART: [kat] SHA2-256
1,556,568,609 UART: [kat] SHA2-384
1,556,571,320 UART: [kat] SHA2-512-ACC
1,556,573,220 UART: [kat] ECC-384
1,556,582,977 UART: [kat] HMAC-384Kdf
1,556,587,645 UART: [kat] LMS
1,556,835,973 UART: [kat] --
1,556,837,105 UART: [update-reset] ++
1,558,150,135 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,558,151,234 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,558,301,058 >>> mbox cmd response: success
1,558,301,329 UART: [update-reset] Copying MAN_2 To MAN_1
1,558,309,343 UART: [update-reset Success] --
1,558,310,592 UART: [state] Locking Datavault
1,558,311,520 UART: [state] Locking PCR0, PCR1 and PCR31
1,558,312,124 UART: [state] Locking ICCM
1,558,312,704 UART: [exit] Launching FMC @ 0x40000130
1,558,318,033 UART:
1,558,318,049 UART: Running Caliptra FMC ...
1,558,318,457 UART:
1,558,318,600 UART: [state] CFI Enabled
1,558,407,643 UART: [art] Extend RT PCRs Done
1,558,408,071 UART: [art] Lock RT PCRs Done
1,558,409,244 UART: [art] Populate DV Done
1,558,417,505 UART: [fht] FMC Alias Private Key: 7
1,558,418,491 UART: [art] Derive CDI
1,558,418,771 UART: [art] Store in in slot 0x4
1,558,504,442 UART: [art] Derive Key Pair
1,558,504,802 UART: [art] Store priv key in slot 0x5
1,558,518,146 UART: [art] Derive Key Pair - Done
1,558,533,022 UART: [art] Signing Cert with AUTHO
1,558,533,502 UART: RITY.KEYID = 7
1,558,548,648 UART: [art] Erasing AUTHORITY.KEYID = 7
1,558,549,413 UART: [art] PUB.X = 9AA60F0522D6F6B240E71EA4E575BA8A14DF0EC6BAEA65AF00743AEA5D834C31F25F9D9109F2146893C210252D485FA8
1,558,556,159 UART: [art] PUB.Y = 48126AAAA9FB9FFE203B750FE633E8A1B7D0EAFD408E7019F0AF08AE3EA21EBB1C76C8E10EBC127B95A028AEF0AB6063
1,558,563,126 UART: [art] SIG.R = AC36DDC96F37F0ABC1B6C2BB64798B6F20ACB039D4C8A776D6D0E329DAEC632963E9325197FF760FC26C051145101E41
1,558,569,900 UART: [art] SIG.S = C003B7360C82C637E0FEA18891062F7E24DD69E5AA0A210FB9CA7F06D0EE10CE10BD7235579C2C1A1EB70A3137CDEA34
1,558,593,472 UART: Caliptra RT
1,558,593,817 UART: [state] CFI Enabled
1,558,877,575 UART: [rt] RT listening for mailbox commands...
1,558,878,245 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,558,879,560 UART:
1,558,879,576 UART: Running Caliptra ROM ...
1,558,879,984 UART:
1,558,880,126 UART: [state] CFI Enabled
1,558,882,888 UART: [state] LifecycleState = Unprovisioned
1,558,883,543 UART: [state] DebugLocked = No
1,558,884,275 UART: [state] WD Timer not started. Device not locked for debugging
1,558,885,599 UART: [kat] SHA2-256
1,559,691,249 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,559,695,374 UART: [kat] ++
1,559,695,526 UART: [kat] sha1
1,559,699,682 UART: [kat] SHA2-256
1,559,701,622 UART: [kat] SHA2-384
1,559,704,533 UART: [kat] SHA2-512-ACC
1,559,706,433 UART: [kat] ECC-384
1,559,716,268 UART: [kat] HMAC-384Kdf
1,559,720,990 UART: [kat] LMS
1,559,969,318 UART: [kat] --
1,559,969,934 UART: [update-reset] ++
1,561,282,260 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,561,283,351 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,561,433,175 >>> mbox cmd response: success
1,561,433,466 UART: [update-reset] Copying MAN_2 To MAN_1
1,561,441,480 UART: [update-reset Success] --
1,561,442,627 UART: [state] Locking Datavault
1,561,443,217 UART: [state] Locking PCR0, PCR1 and PCR31
1,561,443,821 UART: [state] Locking ICCM
1,561,444,345 UART: [exit] Launching FMC @ 0x40000130
1,561,449,674 UART:
1,561,449,690 UART: Running Caliptra FMC ...
1,561,450,098 UART:
1,561,450,241 UART: [state] CFI Enabled
1,561,539,710 UART: [art] Extend RT PCRs Done
1,561,540,138 UART: [art] Lock RT PCRs Done
1,561,541,329 UART: [art] Populate DV Done
1,561,549,718 UART: [fht] FMC Alias Private Key: 7
1,561,550,790 UART: [art] Derive CDI
1,561,551,070 UART: [art] Store in in slot 0x4
1,561,636,713 UART: [art] Derive Key Pair
1,561,637,073 UART: [art] Store priv key in slot 0x5
1,561,650,261 UART: [art] Derive Key Pair - Done
1,561,664,885 UART: [art] Signing Cert with AUTHO
1,561,665,365 UART: RITY.KEYID = 7
1,561,681,093 UART: [art] Erasing AUTHORITY.KEYID = 7
1,561,681,858 UART: [art] PUB.X = 03DB4B4E79E15C563D6CD22860AFE187ADC59026D4DCF67DF4C4A467018F5E9AA76E618DC9265F698CE75AB964025DF6
1,561,688,631 UART: [art] PUB.Y = 78521C3A72DD839D949A33BEF5637017B1B81A5C6DB3DD104D9DB77A900719B7C4279E771B60D9E3A73B1C055A262A43
1,561,695,577 UART: [art] SIG.R = 52100BF2EAC4739252DBAE777F77FD4929F6ECA1F9BD4D9031AD704E5F9B2C28938D8442B31819E624503D4EB7C13065
1,561,702,348 UART: [art] SIG.S = CD2BF8E03BD946DB8D9EEFACC84EE43BB77B26F9B1C970DDC44EBCA409C34EE9E025096F8653D3B97044CD600FAD00D3
1,561,726,620 UART: Caliptra RT
1,561,726,965 UART: [state] CFI Enabled
1,562,011,194 UART: [rt] RT listening for mailbox commands...
1,562,011,864 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,562,012,665 UART:
1,562,012,681 UART: Running Caliptra ROM ...
1,562,013,089 UART:
1,562,013,231 UART: [state] CFI Enabled
1,562,016,101 UART: [state] LifecycleState = Unprovisioned
1,562,016,756 UART: [state] DebugLocked = No
1,562,017,448 UART: [state] WD Timer not started. Device not locked for debugging
1,562,018,706 UART: [kat] SHA2-256
1,562,824,356 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,562,828,481 UART: [kat] ++
1,562,828,633 UART: [kat] sha1
1,562,832,641 UART: [kat] SHA2-256
1,562,834,581 UART: [kat] SHA2-384
1,562,837,244 UART: [kat] SHA2-512-ACC
1,562,839,144 UART: [kat] ECC-384
1,562,849,145 UART: [kat] HMAC-384Kdf
1,562,853,763 UART: [kat] LMS
1,563,102,091 UART: [kat] --
1,563,103,009 UART: [update-reset] ++
1,564,414,709 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,564,415,868 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,564,565,692 >>> mbox cmd response: success
1,564,565,895 UART: [update-reset] Copying MAN_2 To MAN_1
1,564,573,909 UART: [update-reset Success] --
1,564,574,858 UART: [state] Locking Datavault
1,564,575,722 UART: [state] Locking PCR0, PCR1 and PCR31
1,564,576,326 UART: [state] Locking ICCM
1,564,576,906 UART: [exit] Launching FMC @ 0x40000130
1,564,582,235 UART:
1,564,582,251 UART: Running Caliptra FMC ...
1,564,582,659 UART:
1,564,582,802 UART: [state] CFI Enabled
1,564,672,301 UART: [art] Extend RT PCRs Done
1,564,672,729 UART: [art] Lock RT PCRs Done
1,564,673,922 UART: [art] Populate DV Done
1,564,682,127 UART: [fht] FMC Alias Private Key: 7
1,564,683,303 UART: [art] Derive CDI
1,564,683,583 UART: [art] Store in in slot 0x4
1,564,769,538 UART: [art] Derive Key Pair
1,564,769,898 UART: [art] Store priv key in slot 0x5
1,564,783,546 UART: [art] Derive Key Pair - Done
1,564,798,352 UART: [art] Signing Cert with AUTHO
1,564,798,832 UART: RITY.KEYID = 7
1,564,813,956 UART: [art] Erasing AUTHORITY.KEYID = 7
1,564,814,721 UART: [art] PUB.X = 9AA60F0522D6F6B240E71EA4E575BA8A14DF0EC6BAEA65AF00743AEA5D834C31F25F9D9109F2146893C210252D485FA8
1,564,821,467 UART: [art] PUB.Y = 48126AAAA9FB9FFE203B750FE633E8A1B7D0EAFD408E7019F0AF08AE3EA21EBB1C76C8E10EBC127B95A028AEF0AB6063
1,564,828,434 UART: [art] SIG.R = AC36DDC96F37F0ABC1B6C2BB64798B6F20ACB039D4C8A776D6D0E329DAEC632963E9325197FF760FC26C051145101E41
1,564,835,208 UART: [art] SIG.S = C003B7360C82C637E0FEA18891062F7E24DD69E5AA0A210FB9CA7F06D0EE10CE10BD7235579C2C1A1EB70A3137CDEA34
1,564,859,218 UART: Caliptra RT
1,564,859,563 UART: [state] CFI Enabled
1,565,145,789 UART: [rt] RT listening for mailbox commands...
1,565,146,459 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,565,147,428 UART:
1,565,147,444 UART: Running Caliptra ROM ...
1,565,147,852 UART:
1,565,147,994 UART: [state] CFI Enabled
1,565,151,064 UART: [state] LifecycleState = Unprovisioned
1,565,151,719 UART: [state] DebugLocked = No
1,565,152,339 UART: [state] WD Timer not started. Device not locked for debugging
1,565,153,647 UART: [kat] SHA2-256
1,565,959,297 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,565,963,422 UART: [kat] ++
1,565,963,574 UART: [kat] sha1
1,565,967,878 UART: [kat] SHA2-256
1,565,969,818 UART: [kat] SHA2-384
1,565,972,405 UART: [kat] SHA2-512-ACC
1,565,974,305 UART: [kat] ECC-384
1,565,984,240 UART: [kat] HMAC-384Kdf
1,565,988,966 UART: [kat] LMS
1,566,237,294 UART: [kat] --
1,566,238,394 UART: [update-reset] ++
1,567,551,504 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,567,552,693 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,567,702,517 >>> mbox cmd response: success
1,567,702,712 UART: [update-reset] Copying MAN_2 To MAN_1
1,567,710,726 UART: [update-reset Success] --
1,567,711,931 UART: [state] Locking Datavault
1,567,712,759 UART: [state] Locking PCR0, PCR1 and PCR31
1,567,713,363 UART: [state] Locking ICCM
1,567,713,875 UART: [exit] Launching FMC @ 0x40000130
1,567,719,204 UART:
1,567,719,220 UART: Running Caliptra FMC ...
1,567,719,628 UART:
1,567,719,771 UART: [state] CFI Enabled
1,567,809,010 UART: [art] Extend RT PCRs Done
1,567,809,438 UART: [art] Lock RT PCRs Done
1,567,810,845 UART: [art] Populate DV Done
1,567,819,128 UART: [fht] FMC Alias Private Key: 7
1,567,820,068 UART: [art] Derive CDI
1,567,820,348 UART: [art] Store in in slot 0x4
1,567,906,197 UART: [art] Derive Key Pair
1,567,906,557 UART: [art] Store priv key in slot 0x5
1,567,920,339 UART: [art] Derive Key Pair - Done
1,567,935,315 UART: [art] Signing Cert with AUTHO
1,567,935,795 UART: RITY.KEYID = 7
1,567,950,791 UART: [art] Erasing AUTHORITY.KEYID = 7
1,567,951,556 UART: [art] PUB.X = 03DB4B4E79E15C563D6CD22860AFE187ADC59026D4DCF67DF4C4A467018F5E9AA76E618DC9265F698CE75AB964025DF6
1,567,958,329 UART: [art] PUB.Y = 78521C3A72DD839D949A33BEF5637017B1B81A5C6DB3DD104D9DB77A900719B7C4279E771B60D9E3A73B1C055A262A43
1,567,965,275 UART: [art] SIG.R = 52100BF2EAC4739252DBAE777F77FD4929F6ECA1F9BD4D9031AD704E5F9B2C28938D8442B31819E624503D4EB7C13065
1,567,972,046 UART: [art] SIG.S = CD2BF8E03BD946DB8D9EEFACC84EE43BB77B26F9B1C970DDC44EBCA409C34EE9E025096F8653D3B97044CD600FAD00D3
1,567,996,178 UART: Caliptra RT
1,567,996,523 UART: [state] CFI Enabled
1,568,277,664 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 324.36s
Truncated 733352 bytes from beginning
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,486,653,976 >>> mbox cmd response: success
1,486,667,098 UART:
1,486,667,114 UART: Running Caliptra FMC ...
1,486,667,522 UART:
1,486,667,665 UART: [state] CFI Enabled
1,486,756,520 UART: [art] Extend RT PCRs Done
1,486,756,948 UART: [art] Lock RT PCRs Done
1,486,758,181 UART: [art] Populate DV Done
1,486,766,266 UART: [fht] FMC Alias Private Key: 7
1,486,767,322 UART: [art] Derive CDI
1,486,767,602 UART: [art] Store in in slot 0x4
1,486,853,317 UART: [art] Derive Key Pair
1,486,853,677 UART: [art] Store priv key in slot 0x5
1,486,866,647 UART: [art] Derive Key Pair - Done
1,486,881,478 UART: [art] Signing Cert with AUTHO
1,486,881,958 UART: RITY.KEYID = 7
1,486,897,060 UART: [art] Erasing AUTHORITY.KEYID = 7
1,486,897,825 UART: [art] PUB.X = 5F9FB03B62039ECBC2286EDC2690C55C8B60FA5F6A62003EB4DD0D4CCEC8BFD48638BCFC583D77FA1C091CC29AB31B16
1,486,904,588 UART: [art] PUB.Y = C1C42A58BEC3A90E958EC58E588F8173C6D388912316C446722AC0BC844B8E39378EC5D747AD9B8AE64BB21BE4AD552F
1,486,911,545 UART: [art] SIG.R = 61ABD023BD846874845865B69B8B07046620D5062A6A5BC71BA944FE36B05A45D51A7E7CD5B7F044FC8538359A362ABC
1,486,918,308 UART: [art] SIG.S = 0E419D8256B05740B1DF944193A03A177446D51C30D87FFF48198CB96F9E33938BCBA22E7B16B0D1F1FC334CC52F2DE4
1,486,943,398 UART: Caliptra RT
1,486,943,743 UART: [state] CFI Enabled
1,487,226,684 UART: [rt] RT listening for mailbox commands...
1,487,227,354 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,489,666,637 >>> mbox cmd response: success
1,489,679,909 UART:
1,489,679,925 UART: Running Caliptra FMC ...
1,489,680,333 UART:
1,489,680,476 UART: [state] CFI Enabled
1,489,769,361 UART: [art] Extend RT PCRs Done
1,489,769,789 UART: [art] Lock RT PCRs Done
1,489,771,036 UART: [art] Populate DV Done
1,489,779,213 UART: [fht] FMC Alias Private Key: 7
1,489,780,301 UART: [art] Derive CDI
1,489,780,581 UART: [art] Store in in slot 0x4
1,489,865,946 UART: [art] Derive Key Pair
1,489,866,306 UART: [art] Store priv key in slot 0x5
1,489,879,458 UART: [art] Derive Key Pair - Done
1,489,894,453 UART: [art] Signing Cert with AUTHO
1,489,894,933 UART: RITY.KEYID = 7
1,489,910,927 UART: [art] Erasing AUTHORITY.KEYID = 7
1,489,911,692 UART: [art] PUB.X = 7D93743D12C875B5EA1A9C18287E66BFC6FFA69491B761676180B1044C212012739FAC74741807847F1BF7B5F2A76F9C
1,489,918,452 UART: [art] PUB.Y = 38618439E97622687802E9BDFE4A21D5750A5D9621CE82999A2BAEE2FAD0F3E816C0F7996E4CDB3913ED0851074848D6
1,489,925,390 UART: [art] SIG.R = B658730BBCCD1D48E4D82852EDE37E1F3682D3169AD5CEC0CB5B8FD2650FA7A879E0D1F22648953E7C3827CC021DD52A
1,489,932,165 UART: [art] SIG.S = 4B642F073737C9DCB94C77C05953005564117318C1CB3B8BD5A3EC935B283E962BA74126F182E3FEC76A7CB0C725A2B7
1,489,956,359 UART: Caliptra RT
1,489,956,704 UART: [state] CFI Enabled
1,490,235,729 UART: [rt] RT listening for mailbox commands...
1,490,236,399 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,492,675,120 >>> mbox cmd response: success
1,492,688,306 UART:
1,492,688,322 UART: Running Caliptra FMC ...
1,492,688,730 UART:
1,492,688,873 UART: [state] CFI Enabled
1,492,777,692 UART: [art] Extend RT PCRs Done
1,492,778,120 UART: [art] Lock RT PCRs Done
1,492,779,429 UART: [art] Populate DV Done
1,492,787,692 UART: [fht] FMC Alias Private Key: 7
1,492,788,630 UART: [art] Derive CDI
1,492,788,910 UART: [art] Store in in slot 0x4
1,492,874,583 UART: [art] Derive Key Pair
1,492,874,943 UART: [art] Store priv key in slot 0x5
1,492,888,477 UART: [art] Derive Key Pair - Done
1,492,903,350 UART: [art] Signing Cert with AUTHO
1,492,903,830 UART: RITY.KEYID = 7
1,492,918,738 UART: [art] Erasing AUTHORITY.KEYID = 7
1,492,919,503 UART: [art] PUB.X = 5F9FB03B62039ECBC2286EDC2690C55C8B60FA5F6A62003EB4DD0D4CCEC8BFD48638BCFC583D77FA1C091CC29AB31B16
1,492,926,266 UART: [art] PUB.Y = C1C42A58BEC3A90E958EC58E588F8173C6D388912316C446722AC0BC844B8E39378EC5D747AD9B8AE64BB21BE4AD552F
1,492,933,223 UART: [art] SIG.R = 61ABD023BD846874845865B69B8B07046620D5062A6A5BC71BA944FE36B05A45D51A7E7CD5B7F044FC8538359A362ABC
1,492,939,986 UART: [art] SIG.S = 0E419D8256B05740B1DF944193A03A177446D51C30D87FFF48198CB96F9E33938BCBA22E7B16B0D1F1FC334CC52F2DE4
1,492,963,510 UART: Caliptra RT
1,492,963,855 UART: [state] CFI Enabled
1,493,246,680 UART: [rt] RT listening for mailbox commands...
1,493,247,350 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,495,684,861 >>> mbox cmd response: success
1,495,698,119 UART:
1,495,698,135 UART: Running Caliptra FMC ...
1,495,698,543 UART:
1,495,698,686 UART: [state] CFI Enabled
1,495,787,719 UART: [art] Extend RT PCRs Done
1,495,788,147 UART: [art] Lock RT PCRs Done
1,495,789,402 UART: [art] Populate DV Done
1,495,797,471 UART: [fht] FMC Alias Private Key: 7
1,495,798,617 UART: [art] Derive CDI
1,495,798,897 UART: [art] Store in in slot 0x4
1,495,884,432 UART: [art] Derive Key Pair
1,495,884,792 UART: [art] Store priv key in slot 0x5
1,495,898,270 UART: [art] Derive Key Pair - Done
1,495,912,941 UART: [art] Signing Cert with AUTHO
1,495,913,421 UART: RITY.KEYID = 7
1,495,928,869 UART: [art] Erasing AUTHORITY.KEYID = 7
1,495,929,634 UART: [art] PUB.X = 7D93743D12C875B5EA1A9C18287E66BFC6FFA69491B761676180B1044C212012739FAC74741807847F1BF7B5F2A76F9C
1,495,936,394 UART: [art] PUB.Y = 38618439E97622687802E9BDFE4A21D5750A5D9621CE82999A2BAEE2FAD0F3E816C0F7996E4CDB3913ED0851074848D6
1,495,943,332 UART: [art] SIG.R = B658730BBCCD1D48E4D82852EDE37E1F3682D3169AD5CEC0CB5B8FD2650FA7A879E0D1F22648953E7C3827CC021DD52A
1,495,950,107 UART: [art] SIG.S = 4B642F073737C9DCB94C77C05953005564117318C1CB3B8BD5A3EC935B283E962BA74126F182E3FEC76A7CB0C725A2B7
1,495,973,651 UART: Caliptra RT
1,495,973,996 UART: [state] CFI Enabled
1,496,257,173 UART: [rt] RT listening for mailbox commands...
1,496,257,843 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,498,695,834 >>> mbox cmd response: success
1,498,709,418 UART:
1,498,709,434 UART: Running Caliptra FMC ...
1,498,709,842 UART:
1,498,709,985 UART: [state] CFI Enabled
1,498,799,352 UART: [art] Extend RT PCRs Done
1,498,799,780 UART: [art] Lock RT PCRs Done
1,498,800,741 UART: [art] Populate DV Done
1,498,809,048 UART: [fht] FMC Alias Private Key: 7
1,498,810,148 UART: [art] Derive CDI
1,498,810,428 UART: [art] Store in in slot 0x4
1,498,896,451 UART: [art] Derive Key Pair
1,498,896,811 UART: [art] Store priv key in slot 0x5
1,498,910,241 UART: [art] Derive Key Pair - Done
1,498,924,552 UART: [art] Signing Cert with AUTHO
1,498,925,032 UART: RITY.KEYID = 7
1,498,939,864 UART: [art] Erasing AUTHORITY.KEYID = 7
1,498,940,629 UART: [art] PUB.X = 5F9FB03B62039ECBC2286EDC2690C55C8B60FA5F6A62003EB4DD0D4CCEC8BFD48638BCFC583D77FA1C091CC29AB31B16
1,498,947,392 UART: [art] PUB.Y = C1C42A58BEC3A90E958EC58E588F8173C6D388912316C446722AC0BC844B8E39378EC5D747AD9B8AE64BB21BE4AD552F
1,498,954,349 UART: [art] SIG.R = 61ABD023BD846874845865B69B8B07046620D5062A6A5BC71BA944FE36B05A45D51A7E7CD5B7F044FC8538359A362ABC
1,498,961,112 UART: [art] SIG.S = 0E419D8256B05740B1DF944193A03A177446D51C30D87FFF48198CB96F9E33938BCBA22E7B16B0D1F1FC334CC52F2DE4
1,498,984,470 UART: Caliptra RT
1,498,984,815 UART: [state] CFI Enabled
1,499,265,264 UART: [rt] RT listening for mailbox commands...
1,499,265,934 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,501,705,723 >>> mbox cmd response: success
1,501,718,861 UART:
1,501,718,877 UART: Running Caliptra FMC ...
1,501,719,285 UART:
1,501,719,428 UART: [state] CFI Enabled
1,501,808,495 UART: [art] Extend RT PCRs Done
1,501,808,923 UART: [art] Lock RT PCRs Done
1,501,810,236 UART: [art] Populate DV Done
1,501,818,453 UART: [fht] FMC Alias Private Key: 7
1,501,819,495 UART: [art] Derive CDI
1,501,819,775 UART: [art] Store in in slot 0x4
1,501,905,294 UART: [art] Derive Key Pair
1,501,905,654 UART: [art] Store priv key in slot 0x5
1,501,919,296 UART: [art] Derive Key Pair - Done
1,501,934,291 UART: [art] Signing Cert with AUTHO
1,501,934,771 UART: RITY.KEYID = 7
1,501,949,679 UART: [art] Erasing AUTHORITY.KEYID = 7
1,501,950,444 UART: [art] PUB.X = 7D93743D12C875B5EA1A9C18287E66BFC6FFA69491B761676180B1044C212012739FAC74741807847F1BF7B5F2A76F9C
1,501,957,204 UART: [art] PUB.Y = 38618439E97622687802E9BDFE4A21D5750A5D9621CE82999A2BAEE2FAD0F3E816C0F7996E4CDB3913ED0851074848D6
1,501,964,142 UART: [art] SIG.R = B658730BBCCD1D48E4D82852EDE37E1F3682D3169AD5CEC0CB5B8FD2650FA7A879E0D1F22648953E7C3827CC021DD52A
1,501,970,917 UART: [art] SIG.S = 4B642F073737C9DCB94C77C05953005564117318C1CB3B8BD5A3EC935B283E962BA74126F182E3FEC76A7CB0C725A2B7
1,501,994,725 UART: Caliptra RT
1,501,995,070 UART: [state] CFI Enabled
1,502,276,675 UART: [rt] RT listening for mailbox commands...
1,502,277,345 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,504,715,300 >>> mbox cmd response: success
1,504,728,996 UART:
1,504,729,012 UART: Running Caliptra FMC ...
1,504,729,420 UART:
1,504,729,563 UART: [state] CFI Enabled
1,504,818,746 UART: [art] Extend RT PCRs Done
1,504,819,174 UART: [art] Lock RT PCRs Done
1,504,820,631 UART: [art] Populate DV Done
1,504,828,958 UART: [fht] FMC Alias Private Key: 7
1,504,829,936 UART: [art] Derive CDI
1,504,830,216 UART: [art] Store in in slot 0x4
1,504,916,133 UART: [art] Derive Key Pair
1,504,916,493 UART: [art] Store priv key in slot 0x5
1,504,929,913 UART: [art] Derive Key Pair - Done
1,504,944,794 UART: [art] Signing Cert with AUTHO
1,504,945,274 UART: RITY.KEYID = 7
1,504,960,188 UART: [art] Erasing AUTHORITY.KEYID = 7
1,504,960,953 UART: [art] PUB.X = 5F9FB03B62039ECBC2286EDC2690C55C8B60FA5F6A62003EB4DD0D4CCEC8BFD48638BCFC583D77FA1C091CC29AB31B16
1,504,967,716 UART: [art] PUB.Y = C1C42A58BEC3A90E958EC58E588F8173C6D388912316C446722AC0BC844B8E39378EC5D747AD9B8AE64BB21BE4AD552F
1,504,974,673 UART: [art] SIG.R = 61ABD023BD846874845865B69B8B07046620D5062A6A5BC71BA944FE36B05A45D51A7E7CD5B7F044FC8538359A362ABC
1,504,981,436 UART: [art] SIG.S = 0E419D8256B05740B1DF944193A03A177446D51C30D87FFF48198CB96F9E33938BCBA22E7B16B0D1F1FC334CC52F2DE4
1,505,005,444 UART: Caliptra RT
1,505,005,789 UART: [state] CFI Enabled
1,505,291,518 UART: [rt] RT listening for mailbox commands...
1,505,292,188 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,507,731,445 >>> mbox cmd response: success
1,507,744,629 UART:
1,507,744,645 UART: Running Caliptra FMC ...
1,507,745,053 UART:
1,507,745,196 UART: [state] CFI Enabled
1,507,833,855 UART: [art] Extend RT PCRs Done
1,507,834,283 UART: [art] Lock RT PCRs Done
1,507,835,720 UART: [art] Populate DV Done
1,507,843,953 UART: [fht] FMC Alias Private Key: 7
1,507,845,031 UART: [art] Derive CDI
1,507,845,311 UART: [art] Store in in slot 0x4
1,507,931,008 UART: [art] Derive Key Pair
1,507,931,368 UART: [art] Store priv key in slot 0x5
1,507,944,938 UART: [art] Derive Key Pair - Done
1,507,959,589 UART: [art] Signing Cert with AUTHO
1,507,960,069 UART: RITY.KEYID = 7
1,507,975,267 UART: [art] Erasing AUTHORITY.KEYID = 7
1,507,976,032 UART: [art] PUB.X = 7D93743D12C875B5EA1A9C18287E66BFC6FFA69491B761676180B1044C212012739FAC74741807847F1BF7B5F2A76F9C
1,507,982,792 UART: [art] PUB.Y = 38618439E97622687802E9BDFE4A21D5750A5D9621CE82999A2BAEE2FAD0F3E816C0F7996E4CDB3913ED0851074848D6
1,507,989,730 UART: [art] SIG.R = B658730BBCCD1D48E4D82852EDE37E1F3682D3169AD5CEC0CB5B8FD2650FA7A879E0D1F22648953E7C3827CC021DD52A
1,507,996,505 UART: [art] SIG.S = 4B642F073737C9DCB94C77C05953005564117318C1CB3B8BD5A3EC935B283E962BA74126F182E3FEC76A7CB0C725A2B7
1,508,020,653 UART: Caliptra RT
1,508,020,998 UART: [state] CFI Enabled
1,508,301,307 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 315.16s
Truncated 1339589 bytes from beginning
[art] Populate DV Done
1,553,516,785 UART: [fht] FMC Alias Private Key: 7
1,553,517,941 UART: [art] Derive CDI
1,553,518,221 UART: [art] Store in in slot 0x4
1,553,603,720 UART: [art] Derive Key Pair
1,553,604,080 UART: [art] Store priv key in slot 0x5
1,553,616,658 UART: [art] Derive Key Pair - Done
1,553,631,192 UART: [art] Signing Cert with AUTHO
1,553,631,672 UART: RITY.KEYID = 7
1,553,647,132 UART: [art] Erasing AUTHORITY.KEYID = 7
1,553,647,897 UART: [art] PUB.X = 380B974C594E1E73EB4752529C08983E7416143B4BD7C3BBEEAF5549FBEA30527D79EC4246B46CC45CC81232C960021D
1,553,654,660 UART: [art] PUB.Y = 96E14F3C3C1C2A3C1CFDEF7EABCA7B349B984D8C956AFF9B4DF3155589776B3C97473A8A849050CDB7AB5D9337B13AB8
1,553,661,628 UART: [art] SIG.R = D481B7C629400C5EDE6410D5FD7E9C35354403F6B825A0DCCAA02C5F080A08D89CD0DC5D2ABC896AF4204D5D2471CA6D
1,553,668,399 UART: [art] SIG.S = 1CBABA70648AFEB3FFCDA64B4D448BCB35FC4FF0EB85DA5181D0A85240081CFDEC62C1888EEC77251CE6EFFB69EC2FD8
1,553,692,321 UART: Caliptra RT
1,553,692,574 UART: [state] CFI Enabled
1,553,970,039 UART: [rt] RT listening for mailbox commands...
1,553,970,709 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,553,971,580 UART:
1,553,971,596 UART: Running Caliptra ROM ...
1,553,972,004 UART:
1,553,972,059 UART: [state] CFI Enabled
1,553,974,953 UART: [state] LifecycleState = Unprovisioned
1,553,975,608 UART: [state] DebugLocked = No
1,553,976,098 UART: [state] WD Timer not started. Device not locked for debugging
1,553,977,410 UART: [kat] SHA2-256
1,554,780,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,554,785,089 UART: [kat] ++
1,554,785,241 UART: [kat] sha1
1,554,789,571 UART: [kat] SHA2-256
1,554,791,511 UART: [kat] SHA2-384
1,554,794,208 UART: [kat] SHA2-512-ACC
1,554,796,108 UART: [kat] ECC-384
1,554,806,229 UART: [kat] HMAC-384Kdf
1,554,810,647 UART: [kat] LMS
1,555,058,959 UART: [kat] --
1,555,059,763 UART: [update-reset] ++
1,556,371,792 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,556,372,847 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,556,522,671 >>> mbox cmd response: success
1,556,522,834 UART: [update-reset] Copying MAN_2 To MAN_1
1,556,530,848 UART: [update-reset Success] --
1,556,531,667 UART: [state] Locking Datavault
1,556,532,573 UART: [state] Locking PCR0, PCR1 and PCR31
1,556,533,177 UART: [state] Locking ICCM
1,556,533,765 UART: [exit] Launching FMC @ 0x40000130
1,556,539,094 UART:
1,556,539,110 UART: Running Caliptra FMC ...
1,556,539,518 UART:
1,556,539,572 UART: [state] CFI Enabled
1,556,628,443 UART: [art] Extend RT PCRs Done
1,556,628,871 UART: [art] Lock RT PCRs Done
1,556,630,350 UART: [art] Populate DV Done
1,556,638,447 UART: [fht] FMC Alias Private Key: 7
1,556,639,511 UART: [art] Derive CDI
1,556,639,791 UART: [art] Store in in slot 0x4
1,556,725,380 UART: [art] Derive Key Pair
1,556,725,740 UART: [art] Store priv key in slot 0x5
1,556,738,730 UART: [art] Derive Key Pair - Done
1,556,753,834 UART: [art] Signing Cert with AUTHO
1,556,754,314 UART: RITY.KEYID = 7
1,556,769,680 UART: [art] Erasing AUTHORITY.KEYID = 7
1,556,770,445 UART: [art] PUB.X = 27DB7DB715E2F5C14B275C3108C3ECBF185130E554A82FA8E6693A1DBC4A487C3FD426733C33EC17F1E85478B6BB011A
1,556,777,219 UART: [art] PUB.Y = 467DC24F97299FE655B2CA929ED20A1E6500B276AD770F881EDAF1D7F299908EFEE899DC0B601552D2FEA99EEB51C654
1,556,784,150 UART: [art] SIG.R = ED275DDF3876C7129F41CBB04BF477416989DB966C8E49E762907D3DA904947912B232E54BF62F2BA57EB6250F3A4EAC
1,556,790,920 UART: [art] SIG.S = BBFB42AFBBBC300292542678AECDD83291E55CDF922BF20031D21DAACFCD4AAFEEEA2374A6EA32B73BF77E59F68CA359
1,556,814,822 UART: Caliptra RT
1,556,815,075 UART: [state] CFI Enabled
1,557,097,411 UART: [rt] RT listening for mailbox commands...
1,557,098,081 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,557,099,184 UART:
1,557,099,200 UART: Running Caliptra ROM ...
1,557,099,608 UART:
1,557,099,663 UART: [state] CFI Enabled
1,557,102,163 UART: [state] LifecycleState = Unprovisioned
1,557,102,818 UART: [state] DebugLocked = No
1,557,103,320 UART: [state] WD Timer not started. Device not locked for debugging
1,557,104,650 UART: [kat] SHA2-256
1,557,908,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,557,912,329 UART: [kat] ++
1,557,912,481 UART: [kat] sha1
1,557,916,733 UART: [kat] SHA2-256
1,557,918,673 UART: [kat] SHA2-384
1,557,921,390 UART: [kat] SHA2-512-ACC
1,557,923,290 UART: [kat] ECC-384
1,557,933,389 UART: [kat] HMAC-384Kdf
1,557,937,911 UART: [kat] LMS
1,558,186,223 UART: [kat] --
1,558,187,063 UART: [update-reset] ++
1,559,498,696 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,559,499,793 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,559,649,617 >>> mbox cmd response: success
1,559,649,774 UART: [update-reset] Copying MAN_2 To MAN_1
1,559,657,788 UART: [update-reset Success] --
1,559,658,643 UART: [state] Locking Datavault
1,559,659,447 UART: [state] Locking PCR0, PCR1 and PCR31
1,559,660,051 UART: [state] Locking ICCM
1,559,660,681 UART: [exit] Launching FMC @ 0x40000130
1,559,666,010 UART:
1,559,666,026 UART: Running Caliptra FMC ...
1,559,666,434 UART:
1,559,666,488 UART: [state] CFI Enabled
1,559,755,405 UART: [art] Extend RT PCRs Done
1,559,755,833 UART: [art] Lock RT PCRs Done
1,559,756,936 UART: [art] Populate DV Done
1,559,765,179 UART: [fht] FMC Alias Private Key: 7
1,559,766,295 UART: [art] Derive CDI
1,559,766,575 UART: [art] Store in in slot 0x4
1,559,852,040 UART: [art] Derive Key Pair
1,559,852,400 UART: [art] Store priv key in slot 0x5
1,559,865,008 UART: [art] Derive Key Pair - Done
1,559,880,056 UART: [art] Signing Cert with AUTHO
1,559,880,536 UART: RITY.KEYID = 7
1,559,895,548 UART: [art] Erasing AUTHORITY.KEYID = 7
1,559,896,313 UART: [art] PUB.X = 380B974C594E1E73EB4752529C08983E7416143B4BD7C3BBEEAF5549FBEA30527D79EC4246B46CC45CC81232C960021D
1,559,903,076 UART: [art] PUB.Y = 96E14F3C3C1C2A3C1CFDEF7EABCA7B349B984D8C956AFF9B4DF3155589776B3C97473A8A849050CDB7AB5D9337B13AB8
1,559,910,044 UART: [art] SIG.R = D481B7C629400C5EDE6410D5FD7E9C35354403F6B825A0DCCAA02C5F080A08D89CD0DC5D2ABC896AF4204D5D2471CA6D
1,559,916,815 UART: [art] SIG.S = 1CBABA70648AFEB3FFCDA64B4D448BCB35FC4FF0EB85DA5181D0A85240081CFDEC62C1888EEC77251CE6EFFB69EC2FD8
1,559,940,559 UART: Caliptra RT
1,559,940,812 UART: [state] CFI Enabled
1,560,221,369 UART: [rt] RT listening for mailbox commands...
1,560,222,039 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,560,222,904 UART:
1,560,222,920 UART: Running Caliptra ROM ...
1,560,223,328 UART:
1,560,223,383 UART: [state] CFI Enabled
1,560,226,245 UART: [state] LifecycleState = Unprovisioned
1,560,226,900 UART: [state] DebugLocked = No
1,560,227,520 UART: [state] WD Timer not started. Device not locked for debugging
1,560,228,646 UART: [kat] SHA2-256
1,561,032,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,561,036,325 UART: [kat] ++
1,561,036,477 UART: [kat] sha1
1,561,040,721 UART: [kat] SHA2-256
1,561,042,661 UART: [kat] SHA2-384
1,561,045,422 UART: [kat] SHA2-512-ACC
1,561,047,322 UART: [kat] ECC-384
1,561,057,057 UART: [kat] HMAC-384Kdf
1,561,061,641 UART: [kat] LMS
1,561,309,953 UART: [kat] --
1,561,310,883 UART: [update-reset] ++
1,562,622,406 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,562,623,477 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,562,773,301 >>> mbox cmd response: success
1,562,773,528 UART: [update-reset] Copying MAN_2 To MAN_1
1,562,781,542 UART: [update-reset Success] --
1,562,782,247 UART: [state] Locking Datavault
1,562,783,007 UART: [state] Locking PCR0, PCR1 and PCR31
1,562,783,611 UART: [state] Locking ICCM
1,562,784,097 UART: [exit] Launching FMC @ 0x40000130
1,562,789,426 UART:
1,562,789,442 UART: Running Caliptra FMC ...
1,562,789,850 UART:
1,562,789,904 UART: [state] CFI Enabled
1,562,878,679 UART: [art] Extend RT PCRs Done
1,562,879,107 UART: [art] Lock RT PCRs Done
1,562,880,270 UART: [art] Populate DV Done
1,562,888,233 UART: [fht] FMC Alias Private Key: 7
1,562,889,313 UART: [art] Derive CDI
1,562,889,593 UART: [art] Store in in slot 0x4
1,562,975,508 UART: [art] Derive Key Pair
1,562,975,868 UART: [art] Store priv key in slot 0x5
1,562,988,986 UART: [art] Derive Key Pair - Done
1,563,003,786 UART: [art] Signing Cert with AUTHO
1,563,004,266 UART: RITY.KEYID = 7
1,563,019,488 UART: [art] Erasing AUTHORITY.KEYID = 7
1,563,020,253 UART: [art] PUB.X = 27DB7DB715E2F5C14B275C3108C3ECBF185130E554A82FA8E6693A1DBC4A487C3FD426733C33EC17F1E85478B6BB011A
1,563,027,027 UART: [art] PUB.Y = 467DC24F97299FE655B2CA929ED20A1E6500B276AD770F881EDAF1D7F299908EFEE899DC0B601552D2FEA99EEB51C654
1,563,033,958 UART: [art] SIG.R = ED275DDF3876C7129F41CBB04BF477416989DB966C8E49E762907D3DA904947912B232E54BF62F2BA57EB6250F3A4EAC
1,563,040,728 UART: [art] SIG.S = BBFB42AFBBBC300292542678AECDD83291E55CDF922BF20031D21DAACFCD4AAFEEEA2374A6EA32B73BF77E59F68CA359
1,563,064,666 UART: Caliptra RT
1,563,064,919 UART: [state] CFI Enabled
1,563,350,523 UART: [rt] RT listening for mailbox commands...
1,563,351,193 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,563,352,020 UART:
1,563,352,036 UART: Running Caliptra ROM ...
1,563,352,444 UART:
1,563,352,499 UART: [state] CFI Enabled
1,563,355,101 UART: [state] LifecycleState = Unprovisioned
1,563,355,756 UART: [state] DebugLocked = No
1,563,356,290 UART: [state] WD Timer not started. Device not locked for debugging
1,563,357,484 UART: [kat] SHA2-256
1,564,161,034 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,564,165,163 UART: [kat] ++
1,564,165,315 UART: [kat] sha1
1,564,169,367 UART: [kat] SHA2-256
1,564,171,307 UART: [kat] SHA2-384
1,564,174,006 UART: [kat] SHA2-512-ACC
1,564,175,906 UART: [kat] ECC-384
1,564,185,587 UART: [kat] HMAC-384Kdf
1,564,190,321 UART: [kat] LMS
1,564,438,633 UART: [kat] --
1,564,439,441 UART: [update-reset] ++
1,565,751,068 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,565,752,207 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,565,902,031 >>> mbox cmd response: success
1,565,902,216 UART: [update-reset] Copying MAN_2 To MAN_1
1,565,910,230 UART: [update-reset Success] --
1,565,911,367 UART: [state] Locking Datavault
1,565,912,209 UART: [state] Locking PCR0, PCR1 and PCR31
1,565,912,813 UART: [state] Locking ICCM
1,565,913,481 UART: [exit] Launching FMC @ 0x40000130
1,565,918,810 UART:
1,565,918,826 UART: Running Caliptra FMC ...
1,565,919,234 UART:
1,565,919,288 UART: [state] CFI Enabled
1,566,008,185 UART: [art] Extend RT PCRs Done
1,566,008,613 UART: [art] Lock RT PCRs Done
1,566,009,900 UART: [art] Populate DV Done
1,566,018,097 UART: [fht] FMC Alias Private Key: 7
1,566,019,097 UART: [art] Derive CDI
1,566,019,377 UART: [art] Store in in slot 0x4
1,566,105,060 UART: [art] Derive Key Pair
1,566,105,420 UART: [art] Store priv key in slot 0x5
1,566,118,432 UART: [art] Derive Key Pair - Done
1,566,133,342 UART: [art] Signing Cert with AUTHO
1,566,133,822 UART: RITY.KEYID = 7
1,566,148,934 UART: [art] Erasing AUTHORITY.KEYID = 7
1,566,149,699 UART: [art] PUB.X = 380B974C594E1E73EB4752529C08983E7416143B4BD7C3BBEEAF5549FBEA30527D79EC4246B46CC45CC81232C960021D
1,566,156,462 UART: [art] PUB.Y = 96E14F3C3C1C2A3C1CFDEF7EABCA7B349B984D8C956AFF9B4DF3155589776B3C97473A8A849050CDB7AB5D9337B13AB8
1,566,163,430 UART: [art] SIG.R = D481B7C629400C5EDE6410D5FD7E9C35354403F6B825A0DCCAA02C5F080A08D89CD0DC5D2ABC896AF4204D5D2471CA6D
1,566,170,201 UART: [art] SIG.S = 1CBABA70648AFEB3FFCDA64B4D448BCB35FC4FF0EB85DA5181D0A85240081CFDEC62C1888EEC77251CE6EFFB69EC2FD8
1,566,194,049 UART: Caliptra RT
1,566,194,302 UART: [state] CFI Enabled
1,566,475,921 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 320.11s
Truncated 733352 bytes from beginning
8 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,483,897,349 >>> mbox cmd response: success
1,483,910,751 UART:
1,483,910,767 UART: Running Caliptra FMC ...
1,483,911,175 UART:
1,483,911,229 UART: [state] CFI Enabled
1,484,000,294 UART: [art] Extend RT PCRs Done
1,484,000,722 UART: [art] Lock RT PCRs Done
1,484,001,743 UART: [art] Populate DV Done
1,484,010,134 UART: [fht] FMC Alias Private Key: 7
1,484,011,106 UART: [art] Derive CDI
1,484,011,386 UART: [art] Store in in slot 0x4
1,484,096,611 UART: [art] Derive Key Pair
1,484,096,971 UART: [art] Store priv key in slot 0x5
1,484,110,423 UART: [art] Derive Key Pair - Done
1,484,124,984 UART: [art] Signing Cert with AUTHO
1,484,125,464 UART: RITY.KEYID = 7
1,484,140,654 UART: [art] Erasing AUTHORITY.KEYID = 7
1,484,141,419 UART: [art] PUB.X = 165983F87DE5834B609C17D16414EC6E375B4084D9AA4E4E980FB4CE123963B6711C9F5FC7642AB4AE4F2431555A041C
1,484,148,183 UART: [art] PUB.Y = 2DE566202104CA82BCC26F0C185F2A6E5888A2FAA65A321794DFDE07508518C35AC23C3AA407AAF81F4B94DB6FFF2B13
1,484,155,135 UART: [art] SIG.R = 7D34B6C6C6161E1D6016009FBE48B38C8142B8F773A14D2DEFFDC5A02BC93CFF2F3028500D65079108DF762ACB91C76D
1,484,161,884 UART: [art] SIG.S = 47179958BF2C1309A4CC22B9190E876CF5E8E9265CAF4C2E0BDB026379E4B7E87EECE764278BF6C2122ED617456DD12C
1,484,185,761 UART: Caliptra RT
1,484,186,014 UART: [state] CFI Enabled
1,484,467,709 UART: [rt] RT listening for mailbox commands...
1,484,468,379 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,486,900,568 >>> mbox cmd response: success
1,486,914,148 UART:
1,486,914,164 UART: Running Caliptra FMC ...
1,486,914,572 UART:
1,486,914,626 UART: [state] CFI Enabled
1,487,003,793 UART: [art] Extend RT PCRs Done
1,487,004,221 UART: [art] Lock RT PCRs Done
1,487,005,068 UART: [art] Populate DV Done
1,487,013,419 UART: [fht] FMC Alias Private Key: 7
1,487,014,443 UART: [art] Derive CDI
1,487,014,723 UART: [art] Store in in slot 0x4
1,487,100,038 UART: [art] Derive Key Pair
1,487,100,398 UART: [art] Store priv key in slot 0x5
1,487,114,044 UART: [art] Derive Key Pair - Done
1,487,128,647 UART: [art] Signing Cert with AUTHO
1,487,129,127 UART: RITY.KEYID = 7
1,487,144,151 UART: [art] Erasing AUTHORITY.KEYID = 7
1,487,144,916 UART: [art] PUB.X = C14BC58598CFF089735903F5C35B262C9D6A0C0BF0567E890E553C60A1853CE19A6910F7505C0F9C90A94F831AAC86D3
1,487,151,673 UART: [art] PUB.Y = E0B2109B7AC91AF22ECECA7A98C3D7AE37357FEF8AFD7F318A3E0CD782E805EFE22B10337BA1094EFFD78EF310AFAA41
1,487,158,642 UART: [art] SIG.R = 0BDF99203110360F813005B5349FFF7C16BF20E7F3E2DD166DAE136EB24C546D35773CFCDD6B1917BFEC3951174386AF
1,487,165,411 UART: [art] SIG.S = F83BC38CB8F3A785B187870F50E2E993D61ECE3C2CCFF173BC115BD6146E70F7F582963D9889E7B96ECFAEB8F67C60C4
1,487,189,849 UART: Caliptra RT
1,487,190,102 UART: [state] CFI Enabled
1,487,471,829 UART: [rt] RT listening for mailbox commands...
1,487,472,499 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,489,905,354 >>> mbox cmd response: success
1,489,918,918 UART:
1,489,918,934 UART: Running Caliptra FMC ...
1,489,919,342 UART:
1,489,919,396 UART: [state] CFI Enabled
1,490,008,343 UART: [art] Extend RT PCRs Done
1,490,008,771 UART: [art] Lock RT PCRs Done
1,490,009,976 UART: [art] Populate DV Done
1,490,018,001 UART: [fht] FMC Alias Private Key: 7
1,490,018,965 UART: [art] Derive CDI
1,490,019,245 UART: [art] Store in in slot 0x4
1,490,105,070 UART: [art] Derive Key Pair
1,490,105,430 UART: [art] Store priv key in slot 0x5
1,490,118,520 UART: [art] Derive Key Pair - Done
1,490,133,593 UART: [art] Signing Cert with AUTHO
1,490,134,073 UART: RITY.KEYID = 7
1,490,149,351 UART: [art] Erasing AUTHORITY.KEYID = 7
1,490,150,116 UART: [art] PUB.X = 165983F87DE5834B609C17D16414EC6E375B4084D9AA4E4E980FB4CE123963B6711C9F5FC7642AB4AE4F2431555A041C
1,490,156,880 UART: [art] PUB.Y = 2DE566202104CA82BCC26F0C185F2A6E5888A2FAA65A321794DFDE07508518C35AC23C3AA407AAF81F4B94DB6FFF2B13
1,490,163,832 UART: [art] SIG.R = 7D34B6C6C6161E1D6016009FBE48B38C8142B8F773A14D2DEFFDC5A02BC93CFF2F3028500D65079108DF762ACB91C76D
1,490,170,581 UART: [art] SIG.S = 47179958BF2C1309A4CC22B9190E876CF5E8E9265CAF4C2E0BDB026379E4B7E87EECE764278BF6C2122ED617456DD12C
1,490,194,476 UART: Caliptra RT
1,490,194,729 UART: [state] CFI Enabled
1,490,474,794 UART: [rt] RT listening for mailbox commands...
1,490,475,464 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,492,909,729 >>> mbox cmd response: success
1,492,923,047 UART:
1,492,923,063 UART: Running Caliptra FMC ...
1,492,923,471 UART:
1,492,923,525 UART: [state] CFI Enabled
1,493,012,626 UART: [art] Extend RT PCRs Done
1,493,013,054 UART: [art] Lock RT PCRs Done
1,493,014,407 UART: [art] Populate DV Done
1,493,022,716 UART: [fht] FMC Alias Private Key: 7
1,493,023,798 UART: [art] Derive CDI
1,493,024,078 UART: [art] Store in in slot 0x4
1,493,109,417 UART: [art] Derive Key Pair
1,493,109,777 UART: [art] Store priv key in slot 0x5
1,493,123,253 UART: [art] Derive Key Pair - Done
1,493,138,158 UART: [art] Signing Cert with AUTHO
1,493,138,638 UART: RITY.KEYID = 7
1,493,153,424 UART: [art] Erasing AUTHORITY.KEYID = 7
1,493,154,189 UART: [art] PUB.X = C14BC58598CFF089735903F5C35B262C9D6A0C0BF0567E890E553C60A1853CE19A6910F7505C0F9C90A94F831AAC86D3
1,493,160,946 UART: [art] PUB.Y = E0B2109B7AC91AF22ECECA7A98C3D7AE37357FEF8AFD7F318A3E0CD782E805EFE22B10337BA1094EFFD78EF310AFAA41
1,493,167,915 UART: [art] SIG.R = 0BDF99203110360F813005B5349FFF7C16BF20E7F3E2DD166DAE136EB24C546D35773CFCDD6B1917BFEC3951174386AF
1,493,174,684 UART: [art] SIG.S = F83BC38CB8F3A785B187870F50E2E993D61ECE3C2CCFF173BC115BD6146E70F7F582963D9889E7B96ECFAEB8F67C60C4
1,493,198,192 UART: Caliptra RT
1,493,198,445 UART: [state] CFI Enabled
1,493,477,248 UART: [rt] RT listening for mailbox commands...
1,493,477,918 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,495,911,027 >>> mbox cmd response: success
1,495,924,105 UART:
1,495,924,121 UART: Running Caliptra FMC ...
1,495,924,529 UART:
1,495,924,583 UART: [state] CFI Enabled
1,496,013,232 UART: [art] Extend RT PCRs Done
1,496,013,660 UART: [art] Lock RT PCRs Done
1,496,014,653 UART: [art] Populate DV Done
1,496,022,958 UART: [fht] FMC Alias Private Key: 7
1,496,024,098 UART: [art] Derive CDI
1,496,024,378 UART: [art] Store in in slot 0x4
1,496,109,879 UART: [art] Derive Key Pair
1,496,110,239 UART: [art] Store priv key in slot 0x5
1,496,123,709 UART: [art] Derive Key Pair - Done
1,496,138,766 UART: [art] Signing Cert with AUTHO
1,496,139,246 UART: RITY.KEYID = 7
1,496,154,390 UART: [art] Erasing AUTHORITY.KEYID = 7
1,496,155,155 UART: [art] PUB.X = 165983F87DE5834B609C17D16414EC6E375B4084D9AA4E4E980FB4CE123963B6711C9F5FC7642AB4AE4F2431555A041C
1,496,161,919 UART: [art] PUB.Y = 2DE566202104CA82BCC26F0C185F2A6E5888A2FAA65A321794DFDE07508518C35AC23C3AA407AAF81F4B94DB6FFF2B13
1,496,168,871 UART: [art] SIG.R = 7D34B6C6C6161E1D6016009FBE48B38C8142B8F773A14D2DEFFDC5A02BC93CFF2F3028500D65079108DF762ACB91C76D
1,496,175,620 UART: [art] SIG.S = 47179958BF2C1309A4CC22B9190E876CF5E8E9265CAF4C2E0BDB026379E4B7E87EECE764278BF6C2122ED617456DD12C
1,496,199,561 UART: Caliptra RT
1,496,199,814 UART: [state] CFI Enabled
1,496,482,027 UART: [rt] RT listening for mailbox commands...
1,496,482,697 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,498,914,896 >>> mbox cmd response: success
1,498,928,266 UART:
1,498,928,282 UART: Running Caliptra FMC ...
1,498,928,690 UART:
1,498,928,744 UART: [state] CFI Enabled
1,499,018,199 UART: [art] Extend RT PCRs Done
1,499,018,627 UART: [art] Lock RT PCRs Done
1,499,019,840 UART: [art] Populate DV Done
1,499,027,929 UART: [fht] FMC Alias Private Key: 7
1,499,029,109 UART: [art] Derive CDI
1,499,029,389 UART: [art] Store in in slot 0x4
1,499,114,990 UART: [art] Derive Key Pair
1,499,115,350 UART: [art] Store priv key in slot 0x5
1,499,128,728 UART: [art] Derive Key Pair - Done
1,499,143,803 UART: [art] Signing Cert with AUTHO
1,499,144,283 UART: RITY.KEYID = 7
1,499,159,309 UART: [art] Erasing AUTHORITY.KEYID = 7
1,499,160,074 UART: [art] PUB.X = C14BC58598CFF089735903F5C35B262C9D6A0C0BF0567E890E553C60A1853CE19A6910F7505C0F9C90A94F831AAC86D3
1,499,166,831 UART: [art] PUB.Y = E0B2109B7AC91AF22ECECA7A98C3D7AE37357FEF8AFD7F318A3E0CD782E805EFE22B10337BA1094EFFD78EF310AFAA41
1,499,173,800 UART: [art] SIG.R = 0BDF99203110360F813005B5349FFF7C16BF20E7F3E2DD166DAE136EB24C546D35773CFCDD6B1917BFEC3951174386AF
1,499,180,569 UART: [art] SIG.S = F83BC38CB8F3A785B187870F50E2E993D61ECE3C2CCFF173BC115BD6146E70F7F582963D9889E7B96ECFAEB8F67C60C4
1,499,204,305 UART: Caliptra RT
1,499,204,558 UART: [state] CFI Enabled
1,499,487,135 UART: [rt] RT listening for mailbox commands...
1,499,487,805 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,501,920,404 >>> mbox cmd response: success
1,501,933,654 UART:
1,501,933,670 UART: Running Caliptra FMC ...
1,501,934,078 UART:
1,501,934,132 UART: [state] CFI Enabled
1,502,023,313 UART: [art] Extend RT PCRs Done
1,502,023,741 UART: [art] Lock RT PCRs Done
1,502,024,894 UART: [art] Populate DV Done
1,502,033,141 UART: [fht] FMC Alias Private Key: 7
1,502,034,191 UART: [art] Derive CDI
1,502,034,471 UART: [art] Store in in slot 0x4
1,502,119,978 UART: [art] Derive Key Pair
1,502,120,338 UART: [art] Store priv key in slot 0x5
1,502,133,108 UART: [art] Derive Key Pair - Done
1,502,147,815 UART: [art] Signing Cert with AUTHO
1,502,148,295 UART: RITY.KEYID = 7
1,502,163,303 UART: [art] Erasing AUTHORITY.KEYID = 7
1,502,164,068 UART: [art] PUB.X = 165983F87DE5834B609C17D16414EC6E375B4084D9AA4E4E980FB4CE123963B6711C9F5FC7642AB4AE4F2431555A041C
1,502,170,832 UART: [art] PUB.Y = 2DE566202104CA82BCC26F0C185F2A6E5888A2FAA65A321794DFDE07508518C35AC23C3AA407AAF81F4B94DB6FFF2B13
1,502,177,784 UART: [art] SIG.R = 7D34B6C6C6161E1D6016009FBE48B38C8142B8F773A14D2DEFFDC5A02BC93CFF2F3028500D65079108DF762ACB91C76D
1,502,184,533 UART: [art] SIG.S = 47179958BF2C1309A4CC22B9190E876CF5E8E9265CAF4C2E0BDB026379E4B7E87EECE764278BF6C2122ED617456DD12C
1,502,208,246 UART: Caliptra RT
1,502,208,499 UART: [state] CFI Enabled
1,502,489,946 UART: [rt] RT listening for mailbox commands...
1,502,490,616 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,504,923,481 >>> mbox cmd response: success
1,504,937,009 UART:
1,504,937,025 UART: Running Caliptra FMC ...
1,504,937,433 UART:
1,504,937,487 UART: [state] CFI Enabled
1,505,026,522 UART: [art] Extend RT PCRs Done
1,505,026,950 UART: [art] Lock RT PCRs Done
1,505,027,961 UART: [art] Populate DV Done
1,505,036,066 UART: [fht] FMC Alias Private Key: 7
1,505,037,096 UART: [art] Derive CDI
1,505,037,376 UART: [art] Store in in slot 0x4
1,505,123,005 UART: [art] Derive Key Pair
1,505,123,365 UART: [art] Store priv key in slot 0x5
1,505,136,553 UART: [art] Derive Key Pair - Done
1,505,151,036 UART: [art] Signing Cert with AUTHO
1,505,151,516 UART: RITY.KEYID = 7
1,505,166,942 UART: [art] Erasing AUTHORITY.KEYID = 7
1,505,167,707 UART: [art] PUB.X = C14BC58598CFF089735903F5C35B262C9D6A0C0BF0567E890E553C60A1853CE19A6910F7505C0F9C90A94F831AAC86D3
1,505,174,464 UART: [art] PUB.Y = E0B2109B7AC91AF22ECECA7A98C3D7AE37357FEF8AFD7F318A3E0CD782E805EFE22B10337BA1094EFFD78EF310AFAA41
1,505,181,433 UART: [art] SIG.R = 0BDF99203110360F813005B5349FFF7C16BF20E7F3E2DD166DAE136EB24C546D35773CFCDD6B1917BFEC3951174386AF
1,505,188,202 UART: [art] SIG.S = F83BC38CB8F3A785B187870F50E2E993D61ECE3C2CCFF173BC115BD6146E70F7F582963D9889E7B96ECFAEB8F67C60C4
1,505,211,986 UART: Caliptra RT
1,505,212,239 UART: [state] CFI Enabled
1,505,487,848 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 311.35s
Truncated 1339593 bytes from beginning
[art] Populate DV Done
1,554,003,314 UART: [fht] FMC Alias Private Key: 7
1,554,004,250 UART: [art] Derive CDI
1,554,004,530 UART: [art] Store in in slot 0x4
1,554,089,911 UART: [art] Derive Key Pair
1,554,090,271 UART: [art] Store priv key in slot 0x5
1,554,103,651 UART: [art] Derive Key Pair - Done
1,554,118,069 UART: [art] Signing Cert with AUTHO
1,554,118,549 UART: RITY.KEYID = 7
1,554,133,959 UART: [art] Erasing AUTHORITY.KEYID = 7
1,554,134,724 UART: [art] PUB.X = F6217CE8137A61C4B4E908A32A4D172071F40737A7A9386C1C928A2EBD7EA9994C5C0D204C55A0E4B9022FE34055AB40
1,554,141,484 UART: [art] PUB.Y = 9272A4013DA49F0FD28264F52BE00AB4B7E581F4E03A9EE33F74D82697F62190EC960C6536838377D7A81EF0DB8BA8A2
1,554,148,426 UART: [art] SIG.R = 46ED9E0B2FE4E9B44EF0C760D52CFD486D738B30151F7D1A56FE10C77ED4E4D001933DCEFEFAB3971DC4D5939D657C24
1,554,155,208 UART: [art] SIG.S = 82B38D52ED4F94916FE6A65CF5A2B6242DBDECE2BF61CF0A07F76742AC04CF6EC280E94698A1445A383A49F7D3D1E334
1,554,179,114 UART: Caliptra RT
1,554,179,459 UART: [state] CFI Enabled
1,554,463,940 UART: [rt] RT listening for mailbox commands...
1,554,464,610 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,554,465,735 UART:
1,554,465,751 UART: Running Caliptra ROM ...
1,554,466,159 UART:
1,554,466,301 UART: [state] CFI Enabled
1,554,469,211 UART: [state] LifecycleState = Unprovisioned
1,554,469,866 UART: [state] DebugLocked = No
1,554,470,576 UART: [state] WD Timer not started. Device not locked for debugging
1,554,471,742 UART: [kat] SHA2-256
1,555,275,292 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,555,279,421 UART: [kat] ++
1,555,279,573 UART: [kat] sha1
1,555,283,933 UART: [kat] SHA2-256
1,555,285,873 UART: [kat] SHA2-384
1,555,288,712 UART: [kat] SHA2-512-ACC
1,555,290,612 UART: [kat] ECC-384
1,555,299,955 UART: [kat] HMAC-384Kdf
1,555,304,583 UART: [kat] LMS
1,555,552,895 UART: [kat] --
1,555,553,343 UART: [update-reset] ++
1,556,865,988 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,556,867,043 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,557,016,867 >>> mbox cmd response: success
1,557,017,150 UART: [update-reset] Copying MAN_2 To MAN_1
1,557,025,164 UART: [update-reset Success] --
1,557,026,129 UART: [state] Locking Datavault
1,557,027,081 UART: [state] Locking PCR0, PCR1 and PCR31
1,557,027,685 UART: [state] Locking ICCM
1,557,028,177 UART: [exit] Launching FMC @ 0x40000130
1,557,033,506 UART:
1,557,033,522 UART: Running Caliptra FMC ...
1,557,033,930 UART:
1,557,034,073 UART: [state] CFI Enabled
1,557,122,668 UART: [art] Extend RT PCRs Done
1,557,123,096 UART: [art] Lock RT PCRs Done
1,557,124,461 UART: [art] Populate DV Done
1,557,132,562 UART: [fht] FMC Alias Private Key: 7
1,557,133,634 UART: [art] Derive CDI
1,557,133,914 UART: [art] Store in in slot 0x4
1,557,219,461 UART: [art] Derive Key Pair
1,557,219,821 UART: [art] Store priv key in slot 0x5
1,557,233,389 UART: [art] Derive Key Pair - Done
1,557,247,950 UART: [art] Signing Cert with AUTHO
1,557,248,430 UART: RITY.KEYID = 7
1,557,263,724 UART: [art] Erasing AUTHORITY.KEYID = 7
1,557,264,489 UART: [art] PUB.X = 09B98AED7884392EAD960DDEC17713DF5D564CC0628537017B0BDE473C0E672C2A3293422BD7144862B1065CC122A391
1,557,271,239 UART: [art] PUB.Y = 8F1C3B69E0D6E7283DD2A5D43F20C5595D52225B2E8691987FCF62B78285D96A1E256C8FD083CCC708E4DE4B749C3A70
1,557,278,192 UART: [art] SIG.R = C061AFFE6116D71FDB1DD39A003634E8A66CAB52F250BE8D0F43ED694CA234F0FE7B86D06D58CECF40A5C3D195E5E254
1,557,284,957 UART: [art] SIG.S = 2B395C560FF5E799250DD0FA14670BA42DAA3EEBB64E4323C28F13D05B5A70377FCD97EB87BBC9BD2DA1DD7663903579
1,557,308,165 UART: Caliptra RT
1,557,308,510 UART: [state] CFI Enabled
1,557,592,367 UART: [rt] RT listening for mailbox commands...
1,557,593,037 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,557,593,948 UART:
1,557,593,964 UART: Running Caliptra ROM ...
1,557,594,372 UART:
1,557,594,514 UART: [state] CFI Enabled
1,557,597,068 UART: [state] LifecycleState = Unprovisioned
1,557,597,723 UART: [state] DebugLocked = No
1,557,598,373 UART: [state] WD Timer not started. Device not locked for debugging
1,557,599,555 UART: [kat] SHA2-256
1,558,403,105 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,558,407,234 UART: [kat] ++
1,558,407,386 UART: [kat] sha1
1,558,411,396 UART: [kat] SHA2-256
1,558,413,336 UART: [kat] SHA2-384
1,558,416,013 UART: [kat] SHA2-512-ACC
1,558,417,913 UART: [kat] ECC-384
1,558,427,234 UART: [kat] HMAC-384Kdf
1,558,431,856 UART: [kat] LMS
1,558,680,168 UART: [kat] --
1,558,681,120 UART: [update-reset] ++
1,559,993,441 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,559,994,496 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,560,144,320 >>> mbox cmd response: success
1,560,144,523 UART: [update-reset] Copying MAN_2 To MAN_1
1,560,152,537 UART: [update-reset Success] --
1,560,153,400 UART: [state] Locking Datavault
1,560,154,156 UART: [state] Locking PCR0, PCR1 and PCR31
1,560,154,760 UART: [state] Locking ICCM
1,560,155,342 UART: [exit] Launching FMC @ 0x40000130
1,560,160,671 UART:
1,560,160,687 UART: Running Caliptra FMC ...
1,560,161,095 UART:
1,560,161,238 UART: [state] CFI Enabled
1,560,250,361 UART: [art] Extend RT PCRs Done
1,560,250,789 UART: [art] Lock RT PCRs Done
1,560,252,290 UART: [art] Populate DV Done
1,560,260,231 UART: [fht] FMC Alias Private Key: 7
1,560,261,285 UART: [art] Derive CDI
1,560,261,565 UART: [art] Store in in slot 0x4
1,560,347,624 UART: [art] Derive Key Pair
1,560,347,984 UART: [art] Store priv key in slot 0x5
1,560,360,896 UART: [art] Derive Key Pair - Done
1,560,375,582 UART: [art] Signing Cert with AUTHO
1,560,376,062 UART: RITY.KEYID = 7
1,560,391,200 UART: [art] Erasing AUTHORITY.KEYID = 7
1,560,391,965 UART: [art] PUB.X = F6217CE8137A61C4B4E908A32A4D172071F40737A7A9386C1C928A2EBD7EA9994C5C0D204C55A0E4B9022FE34055AB40
1,560,398,725 UART: [art] PUB.Y = 9272A4013DA49F0FD28264F52BE00AB4B7E581F4E03A9EE33F74D82697F62190EC960C6536838377D7A81EF0DB8BA8A2
1,560,405,667 UART: [art] SIG.R = 46ED9E0B2FE4E9B44EF0C760D52CFD486D738B30151F7D1A56FE10C77ED4E4D001933DCEFEFAB3971DC4D5939D657C24
1,560,412,449 UART: [art] SIG.S = 82B38D52ED4F94916FE6A65CF5A2B6242DBDECE2BF61CF0A07F76742AC04CF6EC280E94698A1445A383A49F7D3D1E334
1,560,436,545 UART: Caliptra RT
1,560,436,890 UART: [state] CFI Enabled
1,560,721,603 UART: [rt] RT listening for mailbox commands...
1,560,722,273 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,560,722,918 UART:
1,560,722,934 UART: Running Caliptra ROM ...
1,560,723,342 UART:
1,560,723,484 UART: [state] CFI Enabled
1,560,726,280 UART: [state] LifecycleState = Unprovisioned
1,560,726,935 UART: [state] DebugLocked = No
1,560,727,587 UART: [state] WD Timer not started. Device not locked for debugging
1,560,728,803 UART: [kat] SHA2-256
1,561,532,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,561,536,482 UART: [kat] ++
1,561,536,634 UART: [kat] sha1
1,561,541,008 UART: [kat] SHA2-256
1,561,542,948 UART: [kat] SHA2-384
1,561,545,563 UART: [kat] SHA2-512-ACC
1,561,547,463 UART: [kat] ECC-384
1,561,557,250 UART: [kat] HMAC-384Kdf
1,561,561,890 UART: [kat] LMS
1,561,810,202 UART: [kat] --
1,561,811,000 UART: [update-reset] ++
1,563,123,643 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,563,124,694 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,563,274,518 >>> mbox cmd response: success
1,563,274,719 UART: [update-reset] Copying MAN_2 To MAN_1
1,563,282,733 UART: [update-reset Success] --
1,563,283,836 UART: [state] Locking Datavault
1,563,284,720 UART: [state] Locking PCR0, PCR1 and PCR31
1,563,285,324 UART: [state] Locking ICCM
1,563,285,964 UART: [exit] Launching FMC @ 0x40000130
1,563,291,293 UART:
1,563,291,309 UART: Running Caliptra FMC ...
1,563,291,717 UART:
1,563,291,860 UART: [state] CFI Enabled
1,563,380,985 UART: [art] Extend RT PCRs Done
1,563,381,413 UART: [art] Lock RT PCRs Done
1,563,382,912 UART: [art] Populate DV Done
1,563,391,021 UART: [fht] FMC Alias Private Key: 7
1,563,392,145 UART: [art] Derive CDI
1,563,392,425 UART: [art] Store in in slot 0x4
1,563,477,914 UART: [art] Derive Key Pair
1,563,478,274 UART: [art] Store priv key in slot 0x5
1,563,491,852 UART: [art] Derive Key Pair - Done
1,563,506,601 UART: [art] Signing Cert with AUTHO
1,563,507,081 UART: RITY.KEYID = 7
1,563,521,917 UART: [art] Erasing AUTHORITY.KEYID = 7
1,563,522,682 UART: [art] PUB.X = 09B98AED7884392EAD960DDEC17713DF5D564CC0628537017B0BDE473C0E672C2A3293422BD7144862B1065CC122A391
1,563,529,432 UART: [art] PUB.Y = 8F1C3B69E0D6E7283DD2A5D43F20C5595D52225B2E8691987FCF62B78285D96A1E256C8FD083CCC708E4DE4B749C3A70
1,563,536,385 UART: [art] SIG.R = C061AFFE6116D71FDB1DD39A003634E8A66CAB52F250BE8D0F43ED694CA234F0FE7B86D06D58CECF40A5C3D195E5E254
1,563,543,150 UART: [art] SIG.S = 2B395C560FF5E799250DD0FA14670BA42DAA3EEBB64E4323C28F13D05B5A70377FCD97EB87BBC9BD2DA1DD7663903579
1,563,567,304 UART: Caliptra RT
1,563,567,649 UART: [state] CFI Enabled
1,563,846,596 UART: [rt] RT listening for mailbox commands...
1,563,847,266 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,563,848,225 UART:
1,563,848,241 UART: Running Caliptra ROM ...
1,563,848,649 UART:
1,563,848,791 UART: [state] CFI Enabled
1,563,851,451 UART: [state] LifecycleState = Unprovisioned
1,563,852,106 UART: [state] DebugLocked = No
1,563,852,680 UART: [state] WD Timer not started. Device not locked for debugging
1,563,854,038 UART: [kat] SHA2-256
1,564,657,588 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,564,661,717 UART: [kat] ++
1,564,661,869 UART: [kat] sha1
1,564,665,937 UART: [kat] SHA2-256
1,564,667,877 UART: [kat] SHA2-384
1,564,670,616 UART: [kat] SHA2-512-ACC
1,564,672,516 UART: [kat] ECC-384
1,564,682,641 UART: [kat] HMAC-384Kdf
1,564,687,161 UART: [kat] LMS
1,564,935,473 UART: [kat] --
1,564,936,367 UART: [update-reset] ++
1,566,247,568 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,566,248,549 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
1,566,398,373 >>> mbox cmd response: success
1,566,398,702 UART: [update-reset] Copying MAN_2 To MAN_1
1,566,406,716 UART: [update-reset Success] --
1,566,407,817 UART: [state] Locking Datavault
1,566,408,507 UART: [state] Locking PCR0, PCR1 and PCR31
1,566,409,111 UART: [state] Locking ICCM
1,566,409,533 UART: [exit] Launching FMC @ 0x40000130
1,566,414,862 UART:
1,566,414,878 UART: Running Caliptra FMC ...
1,566,415,286 UART:
1,566,415,429 UART: [state] CFI Enabled
1,566,504,840 UART: [art] Extend RT PCRs Done
1,566,505,268 UART: [art] Lock RT PCRs Done
1,566,506,763 UART: [art] Populate DV Done
1,566,515,246 UART: [fht] FMC Alias Private Key: 7
1,566,516,258 UART: [art] Derive CDI
1,566,516,538 UART: [art] Store in in slot 0x4
1,566,602,351 UART: [art] Derive Key Pair
1,566,602,711 UART: [art] Store priv key in slot 0x5
1,566,615,363 UART: [art] Derive Key Pair - Done
1,566,630,311 UART: [art] Signing Cert with AUTHO
1,566,630,791 UART: RITY.KEYID = 7
1,566,645,693 UART: [art] Erasing AUTHORITY.KEYID = 7
1,566,646,458 UART: [art] PUB.X = F6217CE8137A61C4B4E908A32A4D172071F40737A7A9386C1C928A2EBD7EA9994C5C0D204C55A0E4B9022FE34055AB40
1,566,653,218 UART: [art] PUB.Y = 9272A4013DA49F0FD28264F52BE00AB4B7E581F4E03A9EE33F74D82697F62190EC960C6536838377D7A81EF0DB8BA8A2
1,566,660,160 UART: [art] SIG.R = 46ED9E0B2FE4E9B44EF0C760D52CFD486D738B30151F7D1A56FE10C77ED4E4D001933DCEFEFAB3971DC4D5939D657C24
1,566,666,942 UART: [art] SIG.S = 82B38D52ED4F94916FE6A65CF5A2B6242DBDECE2BF61CF0A07F76742AC04CF6EC280E94698A1445A383A49F7D3D1E334
1,566,690,402 UART: Caliptra RT
1,566,690,747 UART: [state] CFI Enabled
1,566,970,892 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 325.60s
Truncated 733352 bytes from beginning
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,484,432,681 >>> mbox cmd response: success
1,484,446,083 UART:
1,484,446,099 UART: Running Caliptra FMC ...
1,484,446,507 UART:
1,484,446,650 UART: [state] CFI Enabled
1,484,535,733 UART: [art] Extend RT PCRs Done
1,484,536,161 UART: [art] Lock RT PCRs Done
1,484,537,486 UART: [art] Populate DV Done
1,484,545,621 UART: [fht] FMC Alias Private Key: 7
1,484,546,799 UART: [art] Derive CDI
1,484,547,079 UART: [art] Store in in slot 0x4
1,484,632,966 UART: [art] Derive Key Pair
1,484,633,326 UART: [art] Store priv key in slot 0x5
1,484,646,500 UART: [art] Derive Key Pair - Done
1,484,661,461 UART: [art] Signing Cert with AUTHO
1,484,661,941 UART: RITY.KEYID = 7
1,484,676,979 UART: [art] Erasing AUTHORITY.KEYID = 7
1,484,677,744 UART: [art] PUB.X = 986756FC9B01CA50C16C676B930CF75F6C33A7029216F214811986FABE68267DFA7D08DFD2D9E2351626E2A555BD2BE5
1,484,684,506 UART: [art] PUB.Y = 70FC14DAE8F09462A012302279ABCB5915A7C71253FB4F733D2A0D4139619AC72192D42FFE67216E5A4E5799D669A4A2
1,484,691,453 UART: [art] SIG.R = FD3F807BBF215B60C70C65641AAB3C032197ABA988D8BFB00BDB3E633BED95E343833C0F65386F48C5D0319F4559885D
1,484,698,219 UART: [art] SIG.S = E9BC55EFCA51A8AE6F311F0ECB20EF58D41F2BD8AB77999C94DE3603F5A38C6D2FD9F31E0D5B962D11750B7B47156979
1,484,721,782 UART: Caliptra RT
1,484,722,127 UART: [state] CFI Enabled
1,485,003,811 UART: [rt] RT listening for mailbox commands...
1,485,004,481 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,487,439,087 >>> mbox cmd response: success
1,487,452,585 UART:
1,487,452,601 UART: Running Caliptra FMC ...
1,487,453,009 UART:
1,487,453,152 UART: [state] CFI Enabled
1,487,542,445 UART: [art] Extend RT PCRs Done
1,487,542,873 UART: [art] Lock RT PCRs Done
1,487,544,180 UART: [art] Populate DV Done
1,487,552,333 UART: [fht] FMC Alias Private Key: 7
1,487,553,389 UART: [art] Derive CDI
1,487,553,669 UART: [art] Store in in slot 0x4
1,487,639,638 UART: [art] Derive Key Pair
1,487,639,998 UART: [art] Store priv key in slot 0x5
1,487,652,984 UART: [art] Derive Key Pair - Done
1,487,667,906 UART: [art] Signing Cert with AUTHO
1,487,668,386 UART: RITY.KEYID = 7
1,487,683,444 UART: [art] Erasing AUTHORITY.KEYID = 7
1,487,684,209 UART: [art] PUB.X = C4652222F47AA910A19B5BF877B9EA6459021C36EAF0E85C9717B8F5A4C084E1938C6A34DE06E1FAA862965FDAE5A1EA
1,487,690,985 UART: [art] PUB.Y = DA2B98FEE9C2A847173EF17C7D965227F97EB6EB19FE94A1691A1C17D26B88C46DB855F40ED97D9F3F6307181D1F1941
1,487,697,937 UART: [art] SIG.R = F27AFFB5594291B17F505C391715BB53D37C1E8121B6A435453586AAE0B4A79BB40A37F0B2C26B7C42A00FADE32750AB
1,487,704,709 UART: [art] SIG.S = F77B2D47A3EE11EC30DDDEFC76E786582E490327DAEFEFC40407C939483CF943FCE41710EF22F0455E9181A4D871279D
1,487,728,793 UART: Caliptra RT
1,487,729,138 UART: [state] CFI Enabled
1,488,012,450 UART: [rt] RT listening for mailbox commands...
1,488,013,120 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,490,445,536 >>> mbox cmd response: success
1,490,459,078 UART:
1,490,459,094 UART: Running Caliptra FMC ...
1,490,459,502 UART:
1,490,459,645 UART: [state] CFI Enabled
1,490,548,642 UART: [art] Extend RT PCRs Done
1,490,549,070 UART: [art] Lock RT PCRs Done
1,490,550,317 UART: [art] Populate DV Done
1,490,558,740 UART: [fht] FMC Alias Private Key: 7
1,490,559,904 UART: [art] Derive CDI
1,490,560,184 UART: [art] Store in in slot 0x4
1,490,646,271 UART: [art] Derive Key Pair
1,490,646,631 UART: [art] Store priv key in slot 0x5
1,490,660,437 UART: [art] Derive Key Pair - Done
1,490,675,266 UART: [art] Signing Cert with AUTHO
1,490,675,746 UART: RITY.KEYID = 7
1,490,690,854 UART: [art] Erasing AUTHORITY.KEYID = 7
1,490,691,619 UART: [art] PUB.X = 986756FC9B01CA50C16C676B930CF75F6C33A7029216F214811986FABE68267DFA7D08DFD2D9E2351626E2A555BD2BE5
1,490,698,381 UART: [art] PUB.Y = 70FC14DAE8F09462A012302279ABCB5915A7C71253FB4F733D2A0D4139619AC72192D42FFE67216E5A4E5799D669A4A2
1,490,705,328 UART: [art] SIG.R = FD3F807BBF215B60C70C65641AAB3C032197ABA988D8BFB00BDB3E633BED95E343833C0F65386F48C5D0319F4559885D
1,490,712,094 UART: [art] SIG.S = E9BC55EFCA51A8AE6F311F0ECB20EF58D41F2BD8AB77999C94DE3603F5A38C6D2FD9F31E0D5B962D11750B7B47156979
1,490,736,199 UART: Caliptra RT
1,490,736,544 UART: [state] CFI Enabled
1,491,017,164 UART: [rt] RT listening for mailbox commands...
1,491,017,834 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,493,452,234 >>> mbox cmd response: success
1,493,465,744 UART:
1,493,465,760 UART: Running Caliptra FMC ...
1,493,466,168 UART:
1,493,466,311 UART: [state] CFI Enabled
1,493,555,176 UART: [art] Extend RT PCRs Done
1,493,555,604 UART: [art] Lock RT PCRs Done
1,493,556,759 UART: [art] Populate DV Done
1,493,564,902 UART: [fht] FMC Alias Private Key: 7
1,493,566,028 UART: [art] Derive CDI
1,493,566,308 UART: [art] Store in in slot 0x4
1,493,651,727 UART: [art] Derive Key Pair
1,493,652,087 UART: [art] Store priv key in slot 0x5
1,493,665,153 UART: [art] Derive Key Pair - Done
1,493,679,911 UART: [art] Signing Cert with AUTHO
1,493,680,391 UART: RITY.KEYID = 7
1,493,695,667 UART: [art] Erasing AUTHORITY.KEYID = 7
1,493,696,432 UART: [art] PUB.X = C4652222F47AA910A19B5BF877B9EA6459021C36EAF0E85C9717B8F5A4C084E1938C6A34DE06E1FAA862965FDAE5A1EA
1,493,703,208 UART: [art] PUB.Y = DA2B98FEE9C2A847173EF17C7D965227F97EB6EB19FE94A1691A1C17D26B88C46DB855F40ED97D9F3F6307181D1F1941
1,493,710,160 UART: [art] SIG.R = F27AFFB5594291B17F505C391715BB53D37C1E8121B6A435453586AAE0B4A79BB40A37F0B2C26B7C42A00FADE32750AB
1,493,716,932 UART: [art] SIG.S = F77B2D47A3EE11EC30DDDEFC76E786582E490327DAEFEFC40407C939483CF943FCE41710EF22F0455E9181A4D871279D
1,493,740,784 UART: Caliptra RT
1,493,741,129 UART: [state] CFI Enabled
1,494,023,181 UART: [rt] RT listening for mailbox commands...
1,494,023,851 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,496,457,133 >>> mbox cmd response: success
1,496,470,451 UART:
1,496,470,467 UART: Running Caliptra FMC ...
1,496,470,875 UART:
1,496,471,018 UART: [state] CFI Enabled
1,496,559,819 UART: [art] Extend RT PCRs Done
1,496,560,247 UART: [art] Lock RT PCRs Done
1,496,561,308 UART: [art] Populate DV Done
1,496,569,597 UART: [fht] FMC Alias Private Key: 7
1,496,570,585 UART: [art] Derive CDI
1,496,570,865 UART: [art] Store in in slot 0x4
1,496,656,646 UART: [art] Derive Key Pair
1,496,657,006 UART: [art] Store priv key in slot 0x5
1,496,669,494 UART: [art] Derive Key Pair - Done
1,496,684,399 UART: [art] Signing Cert with AUTHO
1,496,684,879 UART: RITY.KEYID = 7
1,496,700,073 UART: [art] Erasing AUTHORITY.KEYID = 7
1,496,700,838 UART: [art] PUB.X = 986756FC9B01CA50C16C676B930CF75F6C33A7029216F214811986FABE68267DFA7D08DFD2D9E2351626E2A555BD2BE5
1,496,707,600 UART: [art] PUB.Y = 70FC14DAE8F09462A012302279ABCB5915A7C71253FB4F733D2A0D4139619AC72192D42FFE67216E5A4E5799D669A4A2
1,496,714,547 UART: [art] SIG.R = FD3F807BBF215B60C70C65641AAB3C032197ABA988D8BFB00BDB3E633BED95E343833C0F65386F48C5D0319F4559885D
1,496,721,313 UART: [art] SIG.S = E9BC55EFCA51A8AE6F311F0ECB20EF58D41F2BD8AB77999C94DE3603F5A38C6D2FD9F31E0D5B962D11750B7B47156979
1,496,745,494 UART: Caliptra RT
1,496,745,839 UART: [state] CFI Enabled
1,497,025,443 UART: [rt] RT listening for mailbox commands...
1,497,026,113 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,499,461,487 >>> mbox cmd response: success
1,499,475,059 UART:
1,499,475,075 UART: Running Caliptra FMC ...
1,499,475,483 UART:
1,499,475,626 UART: [state] CFI Enabled
1,499,565,011 UART: [art] Extend RT PCRs Done
1,499,565,439 UART: [art] Lock RT PCRs Done
1,499,566,642 UART: [art] Populate DV Done
1,499,574,737 UART: [fht] FMC Alias Private Key: 7
1,499,575,709 UART: [art] Derive CDI
1,499,575,989 UART: [art] Store in in slot 0x4
1,499,661,380 UART: [art] Derive Key Pair
1,499,661,740 UART: [art] Store priv key in slot 0x5
1,499,675,360 UART: [art] Derive Key Pair - Done
1,499,690,148 UART: [art] Signing Cert with AUTHO
1,499,690,628 UART: RITY.KEYID = 7
1,499,705,842 UART: [art] Erasing AUTHORITY.KEYID = 7
1,499,706,607 UART: [art] PUB.X = C4652222F47AA910A19B5BF877B9EA6459021C36EAF0E85C9717B8F5A4C084E1938C6A34DE06E1FAA862965FDAE5A1EA
1,499,713,383 UART: [art] PUB.Y = DA2B98FEE9C2A847173EF17C7D965227F97EB6EB19FE94A1691A1C17D26B88C46DB855F40ED97D9F3F6307181D1F1941
1,499,720,335 UART: [art] SIG.R = F27AFFB5594291B17F505C391715BB53D37C1E8121B6A435453586AAE0B4A79BB40A37F0B2C26B7C42A00FADE32750AB
1,499,727,107 UART: [art] SIG.S = F77B2D47A3EE11EC30DDDEFC76E786582E490327DAEFEFC40407C939483CF943FCE41710EF22F0455E9181A4D871279D
1,499,750,573 UART: Caliptra RT
1,499,750,918 UART: [state] CFI Enabled
1,500,033,846 UART: [rt] RT listening for mailbox commands...
1,500,034,516 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,502,466,946 >>> mbox cmd response: success
1,502,480,366 UART:
1,502,480,382 UART: Running Caliptra FMC ...
1,502,480,790 UART:
1,502,480,933 UART: [state] CFI Enabled
1,502,569,868 UART: [art] Extend RT PCRs Done
1,502,570,296 UART: [art] Lock RT PCRs Done
1,502,571,661 UART: [art] Populate DV Done
1,502,579,714 UART: [fht] FMC Alias Private Key: 7
1,502,580,670 UART: [art] Derive CDI
1,502,580,950 UART: [art] Store in in slot 0x4
1,502,666,821 UART: [art] Derive Key Pair
1,502,667,181 UART: [art] Store priv key in slot 0x5
1,502,680,583 UART: [art] Derive Key Pair - Done
1,502,695,728 UART: [art] Signing Cert with AUTHO
1,502,696,208 UART: RITY.KEYID = 7
1,502,711,362 UART: [art] Erasing AUTHORITY.KEYID = 7
1,502,712,127 UART: [art] PUB.X = 986756FC9B01CA50C16C676B930CF75F6C33A7029216F214811986FABE68267DFA7D08DFD2D9E2351626E2A555BD2BE5
1,502,718,889 UART: [art] PUB.Y = 70FC14DAE8F09462A012302279ABCB5915A7C71253FB4F733D2A0D4139619AC72192D42FFE67216E5A4E5799D669A4A2
1,502,725,836 UART: [art] SIG.R = FD3F807BBF215B60C70C65641AAB3C032197ABA988D8BFB00BDB3E633BED95E343833C0F65386F48C5D0319F4559885D
1,502,732,602 UART: [art] SIG.S = E9BC55EFCA51A8AE6F311F0ECB20EF58D41F2BD8AB77999C94DE3603F5A38C6D2FD9F31E0D5B962D11750B7B47156979
1,502,756,199 UART: Caliptra RT
1,502,756,544 UART: [state] CFI Enabled
1,503,040,902 UART: [rt] RT listening for mailbox commands...
1,503,041,572 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,505,474,922 >>> mbox cmd response: success
1,505,488,148 UART:
1,505,488,164 UART: Running Caliptra FMC ...
1,505,488,572 UART:
1,505,488,715 UART: [state] CFI Enabled
1,505,577,578 UART: [art] Extend RT PCRs Done
1,505,578,006 UART: [art] Lock RT PCRs Done
1,505,579,339 UART: [art] Populate DV Done
1,505,587,486 UART: [fht] FMC Alias Private Key: 7
1,505,588,474 UART: [art] Derive CDI
1,505,588,754 UART: [art] Store in in slot 0x4
1,505,674,315 UART: [art] Derive Key Pair
1,505,674,675 UART: [art] Store priv key in slot 0x5
1,505,688,223 UART: [art] Derive Key Pair - Done
1,505,702,917 UART: [art] Signing Cert with AUTHO
1,505,703,397 UART: RITY.KEYID = 7
1,505,718,533 UART: [art] Erasing AUTHORITY.KEYID = 7
1,505,719,298 UART: [art] PUB.X = C4652222F47AA910A19B5BF877B9EA6459021C36EAF0E85C9717B8F5A4C084E1938C6A34DE06E1FAA862965FDAE5A1EA
1,505,726,074 UART: [art] PUB.Y = DA2B98FEE9C2A847173EF17C7D965227F97EB6EB19FE94A1691A1C17D26B88C46DB855F40ED97D9F3F6307181D1F1941
1,505,733,026 UART: [art] SIG.R = F27AFFB5594291B17F505C391715BB53D37C1E8121B6A435453586AAE0B4A79BB40A37F0B2C26B7C42A00FADE32750AB
1,505,739,798 UART: [art] SIG.S = F77B2D47A3EE11EC30DDDEFC76E786582E490327DAEFEFC40407C939483CF943FCE41710EF22F0455E9181A4D871279D
1,505,764,104 UART: Caliptra RT
1,505,764,449 UART: [state] CFI Enabled
1,506,049,189 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 317.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,383 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,013 UART: [kat] SHA2-256
881,944 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,059 UART: [kat] ++
886,211 UART: [kat] sha1
890,219 UART: [kat] SHA2-256
892,157 UART: [kat] SHA2-384
894,944 UART: [kat] SHA2-512-ACC
896,845 UART: [kat] ECC-384
902,520 UART: [kat] HMAC-384Kdf
906,994 UART: [kat] LMS
1,475,190 UART: [kat] --
1,476,285 UART: [cold-reset] ++
1,476,719 UART: [fht] Storing FHT @ 0x50003400
1,479,570 UART: [idev] ++
1,479,738 UART: [idev] CDI.KEYID = 6
1,480,098 UART: [idev] SUBJECT.KEYID = 7
1,480,522 UART: [idev] UDS.KEYID = 0
1,480,867 ready_for_fw is high
1,480,867 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,078 UART: [idev] Erasing UDS.KEYID = 0
1,504,704 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,346 UART: [idev] --
1,514,407 UART: [ldev] ++
1,514,575 UART: [ldev] CDI.KEYID = 6
1,514,938 UART: [ldev] SUBJECT.KEYID = 5
1,515,364 UART: [ldev] AUTHORITY.KEYID = 7
1,515,827 UART: [ldev] FE.KEYID = 1
1,520,827 UART: [ldev] Erasing FE.KEYID = 1
1,545,784 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,824 UART: [ldev] --
1,585,093 UART: [fwproc] Waiting for Commands...
1,585,766 UART: [fwproc] Received command 0x46574c44
1,586,557 UART: [fwproc] Received Image of size 114332 bytes
2,884,845 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,449 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,801 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,734 >>> mbox cmd response: success
3,077,734 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,078,840 UART: [afmc] ++
3,079,008 UART: [afmc] CDI.KEYID = 6
3,079,370 UART: [afmc] SUBJECT.KEYID = 7
3,079,795 UART: [afmc] AUTHORITY.KEYID = 5
3,114,766 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,138 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,918 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,646 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,531 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,221 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,044 UART: [afmc] --
3,158,032 UART: [cold-reset] --
3,158,638 UART: [state] Locking Datavault
3,159,887 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,491 UART: [state] Locking ICCM
3,161,065 UART: [exit] Launching FMC @ 0x40000130
3,166,394 UART:
3,166,410 UART: Running Caliptra FMC ...
3,166,818 UART:
3,166,872 UART: [state] CFI Enabled
3,177,209 UART: [fht] FMC Alias Private Key: 7
3,286,022 UART: [art] Extend RT PCRs Done
3,286,450 UART: [art] Lock RT PCRs Done
3,288,008 UART: [art] Populate DV Done
3,296,381 UART: [fht] FMC Alias Private Key: 7
3,297,381 UART: [art] Derive CDI
3,297,661 UART: [art] Store in in slot 0x4
3,383,414 UART: [art] Derive Key Pair
3,383,774 UART: [art] Store priv key in slot 0x5
3,396,502 UART: [art] Derive Key Pair - Done
3,411,233 UART: [art] Signing Cert with AUTHO
3,411,713 UART: RITY.KEYID = 7
3,427,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,996 UART: [art] PUB.X = 7615A4DA2FD5A7ED1821197B07A54EE19F95A2845759D8FDB67CEA8E79333DDE450482B6848EB89414576B42A897627A
3,434,760 UART: [art] PUB.Y = 2A06CB880EF4D6F737F9850D73ACD1B15FF2A35AE68C49D4DD560B388AD3ABA3BD6873751C0AA5113F590E1A949732E4
3,441,704 UART: [art] SIG.R = AD986287B3E1ADA002FCBBFEEA3A0241CF77E2A6976A345F7AF089E0B3F62A1764A240F663BCCEA0EE5CC891B8885216
3,448,486 UART: [art] SIG.S = E08E96F4D0D56E97B9284699CEF6F0F16139B6A02F47C1B71EA1FD20132A44B54B0D01FB44F1E94880F89CD88DF75F1E
3,471,697 UART: Caliptra RT
3,471,950 UART: [state] CFI Enabled
3,580,492 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,223 UART:
3,582,239 UART: Running Caliptra ROM ...
3,582,647 UART:
3,582,701 UART: [state] CFI Enabled
3,585,037 UART: [state] LifecycleState = Unprovisioned
3,585,692 UART: [state] DebugLocked = No
3,586,354 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,587,925 UART: [kat] SHA2-256
4,381,856 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,385,971 UART: [kat] ++
4,386,123 UART: [kat] sha1
4,390,479 UART: [kat] SHA2-256
4,392,417 UART: [kat] SHA2-384
4,395,296 UART: [kat] SHA2-512-ACC
4,397,196 UART: [kat] ECC-384
4,402,855 UART: [kat] HMAC-384Kdf
4,407,475 UART: [kat] LMS
4,975,671 UART: [kat] --
4,976,476 UART: [update-reset] ++
6,311,846 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,313,046 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,462,922 >>> mbox cmd response: success
6,463,265 UART: [update-reset] Copying MAN_2 To MAN_1
6,471,279 UART: [update-reset Success] --
6,472,124 UART: [state] Locking Datavault
6,472,862 UART: [state] Locking PCR0, PCR1 and PCR31
6,473,466 UART: [state] Locking ICCM
6,473,934 UART: [exit] Launching FMC @ 0x40000130
6,479,263 UART:
6,479,279 UART: Running Caliptra FMC ...
6,479,687 UART:
6,479,741 UART: [state] CFI Enabled
6,568,600 UART: [art] Extend RT PCRs Done
6,569,028 UART: [art] Lock RT PCRs Done
6,570,101 UART: [art] Populate DV Done
6,578,128 UART: [fht] FMC Alias Private Key: 7
6,579,082 UART: [art] Derive CDI
6,579,362 UART: [art] Store in in slot 0x4
6,664,865 UART: [art] Derive Key Pair
6,665,225 UART: [art] Store priv key in slot 0x5
6,677,929 UART: [art] Derive Key Pair - Done
6,692,846 UART: [art] Signing Cert with AUTHO
6,693,326 UART: RITY.KEYID = 7
6,708,618 UART: [art] Erasing AUTHORITY.KEYID = 7
6,709,383 UART: [art] PUB.X = 79D9D4B91E957472F4F9E0AFBECCB83640E77D13E00444266B490D89B8FB7D07861E2F795C3563E9F44F67CA1E414A9E
6,716,150 UART: [art] PUB.Y = 6700C9E79A8B34E55A5AFF0D18EF4F952AE8D3CEAEC77AB3F2BAEAE0264594BA1E0CBFD1B01F9D15DA8A4BA07B928B40
6,723,102 UART: [art] SIG.R = C5FABFC0715C97E456A2EE5672B10C04FA2C3B0BEF8FDF78CCB7AF5E26DA69CE84E803C07F449CA08D34CFFF5FC2A934
6,729,890 UART: [art] SIG.S = 6D3DF3344370FF646D79F7E596B60E1E3C74B93665007AB1B576FED0C5F26F843DC35425C21FBC3BF0F7D3CD32F22792
6,753,656 UART: Caliptra RT
6,753,909 UART: [state] CFI Enabled
7,033,336 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,239 ready_for_fw is high
1,362,239 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,840 >>> mbox cmd response: success
2,927,840 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,989,670 UART:
2,989,686 UART: Running Caliptra FMC ...
2,990,094 UART:
2,990,148 UART: [state] CFI Enabled
3,000,645 UART: [fht] FMC Alias Private Key: 7
3,108,614 UART: [art] Extend RT PCRs Done
3,109,042 UART: [art] Lock RT PCRs Done
3,110,742 UART: [art] Populate DV Done
3,118,959 UART: [fht] FMC Alias Private Key: 7
3,119,959 UART: [art] Derive CDI
3,120,239 UART: [art] Store in in slot 0x4
3,205,914 UART: [art] Derive Key Pair
3,206,274 UART: [art] Store priv key in slot 0x5
3,219,944 UART: [art] Derive Key Pair - Done
3,234,734 UART: [art] Signing Cert with AUTHO
3,235,214 UART: RITY.KEYID = 7
3,250,430 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,195 UART: [art] PUB.X = 69501179CA4CB93C61E2A393F8BAF293A849F3671BCB8F809EE310E34F49F280B39D53293A4D97F27146A44E6096675E
3,257,963 UART: [art] PUB.Y = 90DA09F103064C19E44C2599E6C417F61F70F61665D95E9044A986E8E26DDB29AC7D3248B01DCE71F5A2486A73745C96
3,264,902 UART: [art] SIG.R = 18885FD82245421E78BDF15CB9EF66446ECA1B2A9601F4FD2112FF899B522946CB025EF362CB1AF4E25BF4C4D72387A3
3,271,674 UART: [art] SIG.S = 286E7C36D5ACB01FA6F4A7213BE04FA21ADC40A5D9D9DE4D7BCA999AE0E05C5B40B900C69032557613C8104016F80602
3,295,417 UART: Caliptra RT
3,295,670 UART: [state] CFI Enabled
3,404,664 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,166,984 >>> mbox cmd response: success
6,180,527 UART:
6,180,543 UART: Running Caliptra FMC ...
6,180,951 UART:
6,181,005 UART: [state] CFI Enabled
6,269,942 UART: [art] Extend RT PCRs Done
6,270,370 UART: [art] Lock RT PCRs Done
6,271,687 UART: [art] Populate DV Done
6,279,908 UART: [fht] FMC Alias Private Key: 7
6,280,844 UART: [art] Derive CDI
6,281,124 UART: [art] Store in in slot 0x4
6,366,839 UART: [art] Derive Key Pair
6,367,199 UART: [art] Store priv key in slot 0x5
6,380,201 UART: [art] Derive Key Pair - Done
6,395,073 UART: [art] Signing Cert with AUTHO
6,395,553 UART: RITY.KEYID = 7
6,410,939 UART: [art] Erasing AUTHORITY.KEYID = 7
6,411,704 UART: [art] PUB.X = 5E959B21945717F9B80B98D276D5E7DFB76150302F878AD91379D6221599291C58E2C9A30B642B1BDED964AA26152BC2
6,418,464 UART: [art] PUB.Y = 4598F692BB1CFC44E4F020F94C0AFBC1624B6DE4194805137FB5A9FF418F711654E6A6D5DDF08ED651D3C4C56E0EF3BC
6,425,421 UART: [art] SIG.R = 3BBCE40264C2BEE8F8BE1E05D2AD6FBABC904534BA767778902B9FDC7BE45B1FF5F5DB3EBB5D01E465633D3F5B503608
6,432,201 UART: [art] SIG.S = 7B7C3E1EF6AEF214D8F5C738447BAEFDFCEB1813D6FE094F993266B82BAF4D15A9A091ECB98872FD2E11F38DA6B33E38
6,456,039 UART: Caliptra RT
6,456,292 UART: [state] CFI Enabled
6,739,720 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = No
86,258 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,850 UART: [kat] SHA2-256
881,781 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,896 UART: [kat] ++
886,048 UART: [kat] sha1
890,146 UART: [kat] SHA2-256
892,084 UART: [kat] SHA2-384
894,901 UART: [kat] SHA2-512-ACC
896,802 UART: [kat] ECC-384
902,295 UART: [kat] HMAC-384Kdf
906,865 UART: [kat] LMS
1,475,061 UART: [kat] --
1,475,918 UART: [cold-reset] ++
1,476,426 UART: [fht] Storing FHT @ 0x50003400
1,479,293 UART: [idev] ++
1,479,461 UART: [idev] CDI.KEYID = 6
1,479,821 UART: [idev] SUBJECT.KEYID = 7
1,480,245 UART: [idev] UDS.KEYID = 0
1,480,590 ready_for_fw is high
1,480,590 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,295 UART: [idev] Erasing UDS.KEYID = 0
1,505,027 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,699 UART: [idev] --
1,514,778 UART: [ldev] ++
1,514,946 UART: [ldev] CDI.KEYID = 6
1,515,309 UART: [ldev] SUBJECT.KEYID = 5
1,515,735 UART: [ldev] AUTHORITY.KEYID = 7
1,516,198 UART: [ldev] FE.KEYID = 1
1,521,630 UART: [ldev] Erasing FE.KEYID = 1
1,547,813 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,787 UART: [ldev] --
1,587,134 UART: [fwproc] Waiting for Commands...
1,587,833 UART: [fwproc] Received command 0x46574c44
1,588,624 UART: [fwproc] Received Image of size 114332 bytes
2,886,252 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,952 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,304 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,113 >>> mbox cmd response: success
3,079,113 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,080,135 UART: [afmc] ++
3,080,303 UART: [afmc] CDI.KEYID = 6
3,080,665 UART: [afmc] SUBJECT.KEYID = 7
3,081,090 UART: [afmc] AUTHORITY.KEYID = 5
3,116,403 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,555 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,335 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,063 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,948 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,638 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,689 UART: [afmc] --
3,159,783 UART: [cold-reset] --
3,160,581 UART: [state] Locking Datavault
3,161,928 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,532 UART: [state] Locking ICCM
3,163,160 UART: [exit] Launching FMC @ 0x40000130
3,168,489 UART:
3,168,505 UART: Running Caliptra FMC ...
3,168,913 UART:
3,169,056 UART: [state] CFI Enabled
3,179,571 UART: [fht] FMC Alias Private Key: 7
3,287,912 UART: [art] Extend RT PCRs Done
3,288,340 UART: [art] Lock RT PCRs Done
3,289,530 UART: [art] Populate DV Done
3,297,513 UART: [fht] FMC Alias Private Key: 7
3,298,607 UART: [art] Derive CDI
3,298,887 UART: [art] Store in in slot 0x4
3,384,516 UART: [art] Derive Key Pair
3,384,876 UART: [art] Store priv key in slot 0x5
3,397,956 UART: [art] Derive Key Pair - Done
3,412,944 UART: [art] Signing Cert with AUTHO
3,413,424 UART: RITY.KEYID = 7
3,428,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,253 UART: [art] PUB.X = 51EAE6EE359DF3F64E7027F55DD4D9EDFE99E3E5410E7241DEBD4D0A346E5C4AA6D85CDA98AE59A7C7E2528A97B9DBBC
3,436,045 UART: [art] PUB.Y = 20620AE06898312DBF8F846B4EF4A182133EC5C27A9C4E7239B3645CC5964E03C8058A0163CEA303FC6EBE8AD284AC05
3,442,983 UART: [art] SIG.R = F20AA0CB83B05537C7926716BF07152EA8F9861F05F8269114A7A4B86092230ED53798BF8EEDFF44BC4EBD2B5A0164CD
3,449,746 UART: [art] SIG.S = 26A160FAB4E024ACC7AFB3A627B57BB510F9DE095B17E4724E1AF30E62C400224222C69935FAEF0A68F1049B1FE0329E
3,473,593 UART: Caliptra RT
3,473,938 UART: [state] CFI Enabled
3,581,931 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,080 UART:
3,584,096 UART: Running Caliptra ROM ...
3,584,504 UART:
3,584,645 UART: [state] CFI Enabled
3,587,037 UART: [state] LifecycleState = Unprovisioned
3,587,692 UART: [state] DebugLocked = No
3,588,286 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,590,007 UART: [kat] SHA2-256
4,383,938 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,388,053 UART: [kat] ++
4,388,205 UART: [kat] sha1
4,392,421 UART: [kat] SHA2-256
4,394,359 UART: [kat] SHA2-384
4,397,110 UART: [kat] SHA2-512-ACC
4,399,010 UART: [kat] ECC-384
4,404,513 UART: [kat] HMAC-384Kdf
4,409,227 UART: [kat] LMS
4,977,423 UART: [kat] --
4,978,442 UART: [update-reset] ++
6,313,410 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,314,654 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,464,530 >>> mbox cmd response: success
6,464,673 UART: [update-reset] Copying MAN_2 To MAN_1
6,472,687 UART: [update-reset Success] --
6,473,718 UART: [state] Locking Datavault
6,474,612 UART: [state] Locking PCR0, PCR1 and PCR31
6,475,216 UART: [state] Locking ICCM
6,475,866 UART: [exit] Launching FMC @ 0x40000130
6,481,195 UART:
6,481,211 UART: Running Caliptra FMC ...
6,481,619 UART:
6,481,762 UART: [state] CFI Enabled
6,570,705 UART: [art] Extend RT PCRs Done
6,571,133 UART: [art] Lock RT PCRs Done
6,572,486 UART: [art] Populate DV Done
6,580,601 UART: [fht] FMC Alias Private Key: 7
6,581,613 UART: [art] Derive CDI
6,581,893 UART: [art] Store in in slot 0x4
6,667,766 UART: [art] Derive Key Pair
6,668,126 UART: [art] Store priv key in slot 0x5
6,681,250 UART: [art] Derive Key Pair - Done
6,696,103 UART: [art] Signing Cert with AUTHO
6,696,583 UART: RITY.KEYID = 7
6,711,771 UART: [art] Erasing AUTHORITY.KEYID = 7
6,712,536 UART: [art] PUB.X = DB2F6C0D1688C0B248894A5FCF737F257BEAEEB28F0A50B801DBC57C0D3C3425AD8951365E72EA05FD0709BCB523F067
6,719,299 UART: [art] PUB.Y = D2DD79C422CAED14523EFF49595DCB13859CEA087B4A19598C4E5E1E9E9906928007329E07E8443456C0B406F9C1F58B
6,726,236 UART: [art] SIG.R = 08FE45FBB8EC0D8FE6CCA3EC8F932E6F790330E291AB1FE5F6FB6E3888EB4C3D5E36A9F355368E4E3698B7EF4B5F1766
6,733,017 UART: [art] SIG.S = 4BB2BFA8A7E54876A051662729850F01925527E9B0A76CF6FDC506114804109C8CAC058CBF73954AC730D1E7FAED9A64
6,757,057 UART: Caliptra RT
6,757,402 UART: [state] CFI Enabled
7,039,260 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,072 ready_for_fw is high
1,363,072 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,539 >>> mbox cmd response: success
2,929,539 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,991,015 UART:
2,991,031 UART: Running Caliptra FMC ...
2,991,439 UART:
2,991,582 UART: [state] CFI Enabled
3,002,391 UART: [fht] FMC Alias Private Key: 7
3,110,838 UART: [art] Extend RT PCRs Done
3,111,266 UART: [art] Lock RT PCRs Done
3,113,180 UART: [art] Populate DV Done
3,121,237 UART: [fht] FMC Alias Private Key: 7
3,122,231 UART: [art] Derive CDI
3,122,511 UART: [art] Store in in slot 0x4
3,208,026 UART: [art] Derive Key Pair
3,208,386 UART: [art] Store priv key in slot 0x5
3,221,570 UART: [art] Derive Key Pair - Done
3,235,879 UART: [art] Signing Cert with AUTHO
3,236,359 UART: RITY.KEYID = 7
3,251,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,332 UART: [art] PUB.X = 44BE8FEDBD326B007FBD09F40D4D06F6CF0EC50AEF62ED8F18D8DD7BDC74DDFB8D32D72EFD639188154589B0593C54F8
3,259,089 UART: [art] PUB.Y = 238B3F3C61794A8B043B7B8768285859C08623EAF75D355B09F04B729B67D52E8C8BC0BDD3BEE88A27FC2BD26C619A85
3,266,039 UART: [art] SIG.R = E4EC04FE4DEB34822E545360DD142F6E5DDA2266512DAE4B31578F8DB37C95F4AFDE77B946468B0833C3CE88AC470D80
3,272,812 UART: [art] SIG.S = 5C1AF6D742965EBF31407A8D7CB1C82B73C8FCF422401CA682488D8ACF99A653000DA74E6DC21DF81CCAD0CB53950DD0
3,296,785 UART: Caliptra RT
3,297,130 UART: [state] CFI Enabled
3,405,747 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,169,150 >>> mbox cmd response: success
6,182,741 UART:
6,182,757 UART: Running Caliptra FMC ...
6,183,165 UART:
6,183,308 UART: [state] CFI Enabled
6,273,167 UART: [art] Extend RT PCRs Done
6,273,595 UART: [art] Lock RT PCRs Done
6,274,848 UART: [art] Populate DV Done
6,283,019 UART: [fht] FMC Alias Private Key: 7
6,284,187 UART: [art] Derive CDI
6,284,467 UART: [art] Store in in slot 0x4
6,370,432 UART: [art] Derive Key Pair
6,370,792 UART: [art] Store priv key in slot 0x5
6,384,418 UART: [art] Derive Key Pair - Done
6,399,047 UART: [art] Signing Cert with AUTHO
6,399,527 UART: RITY.KEYID = 7
6,414,903 UART: [art] Erasing AUTHORITY.KEYID = 7
6,415,668 UART: [art] PUB.X = D0D05E1424C7CFB1B86FA0F3D572046E3FF17A90272CA73141A4D2766301877E094FB44B6C19914D00814D28552FDDD3
6,422,407 UART: [art] PUB.Y = 9871A002C3CB5BAB81296779D91DD1967144D94581CF036A905122564CE4C7D16E1C2F3EABB0D8669D8DE42B6C16E40A
6,429,352 UART: [art] SIG.R = 1F313CF1CF5C13ACD647B685199D066A0CE0B12810C522245FAC193BBE6CDEAEBD79FA50DEEB511FD4F01FDDE3FF16FE
6,436,146 UART: [art] SIG.S = 111DED268DD9F057D52ECA74EA0A54D2D58A26DC284217ACE9B80A7E2D56442DEEA9A1277073C64AB26289A0A44122F0
6,459,709 UART: Caliptra RT
6,460,054 UART: [state] CFI Enabled
6,741,286 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
893,208 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,333 UART: [kat] ++
897,485 UART: [kat] sha1
901,767 UART: [kat] SHA2-256
903,707 UART: [kat] SHA2-384
906,520 UART: [kat] SHA2-512-ACC
908,421 UART: [kat] ECC-384
918,206 UART: [kat] HMAC-384Kdf
922,892 UART: [kat] LMS
1,171,220 UART: [kat] --
1,172,291 UART: [cold-reset] ++
1,172,801 UART: [fht] FHT @ 0x50003400
1,175,622 UART: [idev] ++
1,175,790 UART: [idev] CDI.KEYID = 6
1,176,150 UART: [idev] SUBJECT.KEYID = 7
1,176,574 UART: [idev] UDS.KEYID = 0
1,176,919 ready_for_fw is high
1,176,919 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,722 UART: [idev] Erasing UDS.KEYID = 0
1,201,925 UART: [idev] Sha1 KeyId Algorithm
1,210,499 UART: [idev] --
1,211,729 UART: [ldev] ++
1,211,897 UART: [ldev] CDI.KEYID = 6
1,212,260 UART: [ldev] SUBJECT.KEYID = 5
1,212,686 UART: [ldev] AUTHORITY.KEYID = 7
1,213,149 UART: [ldev] FE.KEYID = 1
1,218,499 UART: [ldev] Erasing FE.KEYID = 1
1,244,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,829 UART: [ldev] --
1,284,240 UART: [fwproc] Wait for Commands...
1,284,838 UART: [fwproc] Recv command 0x46574c44
1,285,566 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,016 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,320 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,161 >>> mbox cmd response: success
2,776,161 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,777,387 UART: [afmc] ++
2,777,555 UART: [afmc] CDI.KEYID = 6
2,777,917 UART: [afmc] SUBJECT.KEYID = 7
2,778,342 UART: [afmc] AUTHORITY.KEYID = 5
2,813,289 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,746 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,494 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,222 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,107 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,826 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,760 UART: [afmc] --
2,856,842 UART: [cold-reset] --
2,857,812 UART: [state] Locking Datavault
2,859,023 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,627 UART: [state] Locking ICCM
2,860,067 UART: [exit] Launching FMC @ 0x40000130
2,865,396 UART:
2,865,412 UART: Running Caliptra FMC ...
2,865,820 UART:
2,865,874 UART: [state] CFI Enabled
2,876,433 UART: [fht] FMC Alias Private Key: 7
2,984,236 UART: [art] Extend RT PCRs Done
2,984,664 UART: [art] Lock RT PCRs Done
2,986,372 UART: [art] Populate DV Done
2,994,543 UART: [fht] FMC Alias Private Key: 7
2,995,575 UART: [art] Derive CDI
2,995,855 UART: [art] Store in in slot 0x4
3,081,782 UART: [art] Derive Key Pair
3,082,142 UART: [art] Store priv key in slot 0x5
3,095,380 UART: [art] Derive Key Pair - Done
3,109,801 UART: [art] Signing Cert with AUTHO
3,110,281 UART: RITY.KEYID = 7
3,125,229 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,994 UART: [art] PUB.X = E16D2F3C18B4BA4F71DC2D64210E08BD6FB8240008BE418AAE14BA204ACFEB254E731DB595DB4023206CD2AA997FA137
3,132,749 UART: [art] PUB.Y = 9B9C635CC52FA91CA465D5D55C903FF24B7B5F74C94BFB078BC03776B3958C3C7EB2694C710EF4D2BC638827B06CB5FA
3,139,707 UART: [art] SIG.R = DE05E80DC61B4BC969AFF0E0C951774ED37DB4035DC99DCA26B16282A62FC378AEFE7296DC5F89D1FDABEA2996410CC3
3,146,487 UART: [art] SIG.S = 3CDFCB9978C704FA55E69E2E6AA33B99846B53E8EF12303B2089E02EC94B142F04AEF142C595108DFB1763C73C5F1716
3,169,520 UART: Caliptra RT
3,169,773 UART: [state] CFI Enabled
3,277,250 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,426 UART:
3,279,442 UART: Running Caliptra ROM ...
3,279,850 UART:
3,279,905 UART: [state] CFI Enabled
3,282,997 UART: [state] LifecycleState = Unprovisioned
3,283,652 UART: [state] DebugLocked = No
3,284,274 UART: [state] WD Timer not started. Device not locked for debugging
3,285,448 UART: [kat] SHA2-256
4,091,098 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,095,223 UART: [kat] ++
4,095,375 UART: [kat] sha1
4,099,837 UART: [kat] SHA2-256
4,101,777 UART: [kat] SHA2-384
4,104,444 UART: [kat] SHA2-512-ACC
4,106,344 UART: [kat] ECC-384
4,116,079 UART: [kat] HMAC-384Kdf
4,120,643 UART: [kat] LMS
4,368,971 UART: [kat] --
4,369,517 UART: [update-reset] ++
5,681,657 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,682,624 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,832,448 >>> mbox cmd response: success
5,832,587 UART: [update-reset] Copying MAN_2 To MAN_1
5,840,601 UART: [update-reset Success] --
5,841,518 UART: [state] Locking Datavault
5,842,294 UART: [state] Locking PCR0, PCR1 and PCR31
5,842,898 UART: [state] Locking ICCM
5,843,526 UART: [exit] Launching FMC @ 0x40000130
5,848,855 UART:
5,848,871 UART: Running Caliptra FMC ...
5,849,279 UART:
5,849,333 UART: [state] CFI Enabled
5,938,020 UART: [art] Extend RT PCRs Done
5,938,448 UART: [art] Lock RT PCRs Done
5,939,653 UART: [art] Populate DV Done
5,947,886 UART: [fht] FMC Alias Private Key: 7
5,948,956 UART: [art] Derive CDI
5,949,236 UART: [art] Store in in slot 0x4
6,034,637 UART: [art] Derive Key Pair
6,034,997 UART: [art] Store priv key in slot 0x5
6,047,855 UART: [art] Derive Key Pair - Done
6,062,603 UART: [art] Signing Cert with AUTHO
6,063,083 UART: RITY.KEYID = 7
6,078,177 UART: [art] Erasing AUTHORITY.KEYID = 7
6,078,942 UART: [art] PUB.X = C6DA5B3372B08B947224B1E72E7C099662DEDC92A8C858A3765AC8A311CC57695723AB95D71BF23A54CB1A237206D2D8
6,085,710 UART: [art] PUB.Y = AA27E20B16351FF626307057744301F4778BAE7D7B7657234F86FE378D61DF8A39ECE79243A674F4D2D2C84E8A91421A
6,092,652 UART: [art] SIG.R = D3E8FF37846FBDC1D9DB285DDC1F2AB819E31E4AFFDF1A1F0F0CD84202C8B83788AC25D85CF4237389943856CACADB1E
6,099,437 UART: [art] SIG.S = 1A5BFF737D14AD366073D2109F7B2D53E0D313962A91A9A49DE9DBCDEA0C548F1FC7D3F8B94663FC66078EADFBB6C64A
6,123,534 UART: Caliptra RT
6,123,787 UART: [state] CFI Enabled
6,407,786 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,849 ready_for_fw is high
1,059,849 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,650 >>> mbox cmd response: success
2,627,650 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,689,264 UART:
2,689,280 UART: Running Caliptra FMC ...
2,689,688 UART:
2,689,742 UART: [state] CFI Enabled
2,700,075 UART: [fht] FMC Alias Private Key: 7
2,808,162 UART: [art] Extend RT PCRs Done
2,808,590 UART: [art] Lock RT PCRs Done
2,810,096 UART: [art] Populate DV Done
2,818,281 UART: [fht] FMC Alias Private Key: 7
2,819,409 UART: [art] Derive CDI
2,819,689 UART: [art] Store in in slot 0x4
2,905,162 UART: [art] Derive Key Pair
2,905,522 UART: [art] Store priv key in slot 0x5
2,919,398 UART: [art] Derive Key Pair - Done
2,933,629 UART: [art] Signing Cert with AUTHO
2,934,109 UART: RITY.KEYID = 7
2,949,191 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,956 UART: [art] PUB.X = AF53AB238C235C4BF77A8DB742B5922D13DE00E0A7943A7B5679E427D532BEB348439C07FFEB9DF45AC2B2F6CD36AC82
2,956,717 UART: [art] PUB.Y = 27889EA724EA6D135B61A31EBF6CC0C0DE4B0EA7F926906F4D525D2469CBE4C487FB11C4115E3EDF5EA75D58E10368CA
2,963,677 UART: [art] SIG.R = 1B6A626AFDC434FBEC25D2DCC62E92DA9D7AD06F15804E001CA461DD46ED57E27D3821C78BFBC4EA374E12B0E5390355
2,970,440 UART: [art] SIG.S = 731F1C91A51D2558E506C222C9D54D0E33D09B5ECDDE5E30A14D41690DCFCA3A4004B8BC349B67373A77076F91DE1E31
2,994,912 UART: Caliptra RT
2,995,165 UART: [state] CFI Enabled
3,101,960 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,540,301 >>> mbox cmd response: success
5,553,647 UART:
5,553,663 UART: Running Caliptra FMC ...
5,554,071 UART:
5,554,125 UART: [state] CFI Enabled
5,643,446 UART: [art] Extend RT PCRs Done
5,643,874 UART: [art] Lock RT PCRs Done
5,645,205 UART: [art] Populate DV Done
5,653,274 UART: [fht] FMC Alias Private Key: 7
5,654,292 UART: [art] Derive CDI
5,654,572 UART: [art] Store in in slot 0x4
5,740,155 UART: [art] Derive Key Pair
5,740,515 UART: [art] Store priv key in slot 0x5
5,753,423 UART: [art] Derive Key Pair - Done
5,768,518 UART: [art] Signing Cert with AUTHO
5,768,998 UART: RITY.KEYID = 7
5,783,850 UART: [art] Erasing AUTHORITY.KEYID = 7
5,784,615 UART: [art] PUB.X = CE692F352F3301D82D093526C81D811C976783D9BCC1224D1ECA1836E949226E4233D408B7AB92788B0CB2CBF9682FD0
5,791,373 UART: [art] PUB.Y = 02AA81F5EFEF4374DA34AA911BF31E1D759D362317E8F4F323E186DFE4839FD366EC28A09DAEA80E128EF44E6D4F2A19
5,798,333 UART: [art] SIG.R = 079169C6F51E4C20DA939F7399B47CE6E24F963B289CE44BEB1A5901003C73507E194CDAFD2472A248D39DC09286FC9A
5,805,079 UART: [art] SIG.S = 0A654961D89F6AA9329BB7D5132B23C987086F17B078163E65877B92C5287495BC557781C62FA2AE2336666DF928F86E
5,829,252 UART: Caliptra RT
5,829,505 UART: [state] CFI Enabled
6,112,416 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,847 UART: [state] LifecycleState = Unprovisioned
86,502 UART: [state] DebugLocked = No
87,106 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [kat] SHA2-256
893,887 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,012 UART: [kat] ++
898,164 UART: [kat] sha1
902,448 UART: [kat] SHA2-256
904,388 UART: [kat] SHA2-384
907,151 UART: [kat] SHA2-512-ACC
909,052 UART: [kat] ECC-384
918,743 UART: [kat] HMAC-384Kdf
923,525 UART: [kat] LMS
1,171,853 UART: [kat] --
1,172,640 UART: [cold-reset] ++
1,173,062 UART: [fht] FHT @ 0x50003400
1,175,611 UART: [idev] ++
1,175,779 UART: [idev] CDI.KEYID = 6
1,176,139 UART: [idev] SUBJECT.KEYID = 7
1,176,563 UART: [idev] UDS.KEYID = 0
1,176,908 ready_for_fw is high
1,176,908 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,401 UART: [idev] Erasing UDS.KEYID = 0
1,200,972 UART: [idev] Sha1 KeyId Algorithm
1,209,590 UART: [idev] --
1,210,480 UART: [ldev] ++
1,210,648 UART: [ldev] CDI.KEYID = 6
1,211,011 UART: [ldev] SUBJECT.KEYID = 5
1,211,437 UART: [ldev] AUTHORITY.KEYID = 7
1,211,900 UART: [ldev] FE.KEYID = 1
1,217,278 UART: [ldev] Erasing FE.KEYID = 1
1,243,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,730 UART: [ldev] --
1,283,205 UART: [fwproc] Wait for Commands...
1,283,897 UART: [fwproc] Recv command 0x46574c44
1,284,625 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,649 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,953 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,670 >>> mbox cmd response: success
2,775,670 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,776,688 UART: [afmc] ++
2,776,856 UART: [afmc] CDI.KEYID = 6
2,777,218 UART: [afmc] SUBJECT.KEYID = 7
2,777,643 UART: [afmc] AUTHORITY.KEYID = 5
2,812,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,425 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,173 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,901 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,786 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,505 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,451 UART: [afmc] --
2,856,419 UART: [cold-reset] --
2,857,133 UART: [state] Locking Datavault
2,858,316 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,920 UART: [state] Locking ICCM
2,859,376 UART: [exit] Launching FMC @ 0x40000130
2,864,705 UART:
2,864,721 UART: Running Caliptra FMC ...
2,865,129 UART:
2,865,272 UART: [state] CFI Enabled
2,875,839 UART: [fht] FMC Alias Private Key: 7
2,984,364 UART: [art] Extend RT PCRs Done
2,984,792 UART: [art] Lock RT PCRs Done
2,986,438 UART: [art] Populate DV Done
2,994,763 UART: [fht] FMC Alias Private Key: 7
2,995,913 UART: [art] Derive CDI
2,996,193 UART: [art] Store in in slot 0x4
3,082,088 UART: [art] Derive Key Pair
3,082,448 UART: [art] Store priv key in slot 0x5
3,095,770 UART: [art] Derive Key Pair - Done
3,110,381 UART: [art] Signing Cert with AUTHO
3,110,861 UART: RITY.KEYID = 7
3,126,003 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,768 UART: [art] PUB.X = 4D3873CA18E631A4146E0F0BC4A22940C5B78EAD37C7544F04593DC6D1C5E3F414EB1A3607AE4A27AC535BEA99BB026C
3,133,535 UART: [art] PUB.Y = ED72995301529DB06F6D34541325388DFE16EBE70047EB0A005A50531B764038A579A95A18428EA3A6502848CFD37E6D
3,140,429 UART: [art] SIG.R = 9C2295A8D52BBC246A5705AC0B520439408AF0A0D289D752E2FB51879FA566BE654D2E8EE3BBD05228E9250063D82058
3,147,168 UART: [art] SIG.S = 5BABDC5018A5D5571812F451853101A6BCDF9870CA90CF9E4D4B98DCF4CB03873309D863221EF4BA660158F5F9A27538
3,170,827 UART: Caliptra RT
3,171,172 UART: [state] CFI Enabled
3,279,227 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,281,371 UART:
3,281,387 UART: Running Caliptra ROM ...
3,281,795 UART:
3,281,937 UART: [state] CFI Enabled
3,284,485 UART: [state] LifecycleState = Unprovisioned
3,285,140 UART: [state] DebugLocked = No
3,285,728 UART: [state] WD Timer not started. Device not locked for debugging
3,286,886 UART: [kat] SHA2-256
4,092,536 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,096,661 UART: [kat] ++
4,096,813 UART: [kat] sha1
4,100,951 UART: [kat] SHA2-256
4,102,891 UART: [kat] SHA2-384
4,105,434 UART: [kat] SHA2-512-ACC
4,107,334 UART: [kat] ECC-384
4,117,073 UART: [kat] HMAC-384Kdf
4,121,675 UART: [kat] LMS
4,370,003 UART: [kat] --
4,370,935 UART: [update-reset] ++
5,683,249 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,684,444 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,834,268 >>> mbox cmd response: success
5,834,525 UART: [update-reset] Copying MAN_2 To MAN_1
5,842,539 UART: [update-reset Success] --
5,843,560 UART: [state] Locking Datavault
5,844,468 UART: [state] Locking PCR0, PCR1 and PCR31
5,845,072 UART: [state] Locking ICCM
5,845,524 UART: [exit] Launching FMC @ 0x40000130
5,850,853 UART:
5,850,869 UART: Running Caliptra FMC ...
5,851,277 UART:
5,851,420 UART: [state] CFI Enabled
5,940,647 UART: [art] Extend RT PCRs Done
5,941,075 UART: [art] Lock RT PCRs Done
5,942,374 UART: [art] Populate DV Done
5,950,411 UART: [fht] FMC Alias Private Key: 7
5,951,417 UART: [art] Derive CDI
5,951,697 UART: [art] Store in in slot 0x4
6,037,192 UART: [art] Derive Key Pair
6,037,552 UART: [art] Store priv key in slot 0x5
6,050,922 UART: [art] Derive Key Pair - Done
6,065,949 UART: [art] Signing Cert with AUTHO
6,066,429 UART: RITY.KEYID = 7
6,081,985 UART: [art] Erasing AUTHORITY.KEYID = 7
6,082,750 UART: [art] PUB.X = 52700D8385B434B222FA5D98146C09B462B0FCA206056B3B5E2F67B94725E75E31B801C803F593B0A249D3E75651D4EF
6,089,498 UART: [art] PUB.Y = 01E115AD1E51CB5A8CAC5140F6472C9DD975EDEE3A9929215FED328F3E41A7D3CFDEF3B28EDE377276130BBEF1300754
6,096,455 UART: [art] SIG.R = 778D867ACFBD708EEA59F41E184D89655C348E683EDCC64A8E0C27A2E5A8EB73BF8BFFF154E64C96B97CEC721829B325
6,103,238 UART: [art] SIG.S = 89C09F60F544D6DE28C316C71C1AEBBF65BEFCB40BBC2AC44ACCEB1DF7F73EB42099F40775E5B7A966F28F5A0584BEB1
6,127,670 UART: Caliptra RT
6,128,015 UART: [state] CFI Enabled
6,410,938 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,596 ready_for_fw is high
1,060,596 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,667 >>> mbox cmd response: success
2,625,667 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,687,917 UART:
2,687,933 UART: Running Caliptra FMC ...
2,688,341 UART:
2,688,484 UART: [state] CFI Enabled
2,699,233 UART: [fht] FMC Alias Private Key: 7
2,807,380 UART: [art] Extend RT PCRs Done
2,807,808 UART: [art] Lock RT PCRs Done
2,809,388 UART: [art] Populate DV Done
2,817,513 UART: [fht] FMC Alias Private Key: 7
2,818,465 UART: [art] Derive CDI
2,818,745 UART: [art] Store in in slot 0x4
2,904,714 UART: [art] Derive Key Pair
2,905,074 UART: [art] Store priv key in slot 0x5
2,918,224 UART: [art] Derive Key Pair - Done
2,932,582 UART: [art] Signing Cert with AUTHO
2,933,062 UART: RITY.KEYID = 7
2,948,352 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,117 UART: [art] PUB.X = 2B4E444ED0314B20ED7FB9668C7D46DE763831A2FD77E33D9B624584FB004A537C80C646FE32243552069D6F4136BBBF
2,955,864 UART: [art] PUB.Y = F63394380E798EDBCDD2650F1F4C84DD717D873DBE05758CE0707A7E608E355DDDE364B00744EE3FF7DD41DA6DCBE72E
2,962,820 UART: [art] SIG.R = CF1F1CF0892CEC6D4D4489ADD348C395F2A77FAA5A0FFA94800CC35D6315CE484965A3445EF973DBA2585378A14D38A0
2,969,596 UART: [art] SIG.S = 2A2230D7E9D476270F3EDB9F1B42B2E6A0B4F73762CDBE45C97F7E86D845942EAAFE8246A295752503EDCFBAF44478D5
2,992,759 UART: Caliptra RT
2,993,104 UART: [state] CFI Enabled
3,100,681 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,538,649 >>> mbox cmd response: success
5,552,053 UART:
5,552,069 UART: Running Caliptra FMC ...
5,552,477 UART:
5,552,620 UART: [state] CFI Enabled
5,641,681 UART: [art] Extend RT PCRs Done
5,642,109 UART: [art] Lock RT PCRs Done
5,643,488 UART: [art] Populate DV Done
5,651,745 UART: [fht] FMC Alias Private Key: 7
5,652,847 UART: [art] Derive CDI
5,653,127 UART: [art] Store in in slot 0x4
5,738,680 UART: [art] Derive Key Pair
5,739,040 UART: [art] Store priv key in slot 0x5
5,752,212 UART: [art] Derive Key Pair - Done
5,766,867 UART: [art] Signing Cert with AUTHO
5,767,347 UART: RITY.KEYID = 7
5,782,751 UART: [art] Erasing AUTHORITY.KEYID = 7
5,783,516 UART: [art] PUB.X = F5D109ED4FB6F0C9F415A5C1ED5FB676C2A5226EBFA4B7CC3CD5BC9CF2CA9B374A7FFDB4B1770FB4B4934A6B09D1F1CD
5,790,311 UART: [art] PUB.Y = CA6945379E73A6935D96A915EA290F195BEF776BDAD83484A42443F4A9D0A7BC2CC23F2155117F50C32741FEAB55800E
5,797,259 UART: [art] SIG.R = 7E9514D979353368C7DB513F3FBEA7E19E22548804ECC553D5D6958EB69A92410438C2CFE24ED97D75D2B4F675EA9AD6
5,804,029 UART: [art] SIG.S = 93FF7A288180829B93E397B5A35FCA312CEEE0F42AF673E2447C68406AB11DE3DC6D3E31C313056D085191442C435EAA
5,827,614 UART: Caliptra RT
5,827,959 UART: [state] CFI Enabled
6,111,052 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,552 UART: [state] LifecycleState = Unprovisioned
85,207 UART: [state] DebugLocked = No
85,809 UART: [state] WD Timer not started. Device not locked for debugging
87,088 UART: [kat] SHA2-256
890,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,767 UART: [kat] ++
894,919 UART: [kat] sha1
898,935 UART: [kat] SHA2-256
900,875 UART: [kat] SHA2-384
903,724 UART: [kat] SHA2-512-ACC
905,625 UART: [kat] ECC-384
915,448 UART: [kat] HMAC-384Kdf
920,156 UART: [kat] LMS
1,168,468 UART: [kat] --
1,169,443 UART: [cold-reset] ++
1,169,873 UART: [fht] FHT @ 0x50003400
1,172,631 UART: [idev] ++
1,172,799 UART: [idev] CDI.KEYID = 6
1,173,160 UART: [idev] SUBJECT.KEYID = 7
1,173,585 UART: [idev] UDS.KEYID = 0
1,173,931 ready_for_fw is high
1,173,931 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,989 UART: [idev] Erasing UDS.KEYID = 0
1,198,459 UART: [idev] Sha1 KeyId Algorithm
1,207,453 UART: [idev] --
1,208,474 UART: [ldev] ++
1,208,642 UART: [ldev] CDI.KEYID = 6
1,209,006 UART: [ldev] SUBJECT.KEYID = 5
1,209,433 UART: [ldev] AUTHORITY.KEYID = 7
1,209,896 UART: [ldev] FE.KEYID = 1
1,215,174 UART: [ldev] Erasing FE.KEYID = 1
1,241,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,432 UART: [ldev] --
1,280,864 UART: [fwproc] Wait for Commands...
1,281,631 UART: [fwproc] Recv command 0x46574c44
1,282,364 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,542 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,851 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,577 >>> mbox cmd response: success
2,771,577 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,772,824 UART: [afmc] ++
2,772,992 UART: [afmc] CDI.KEYID = 6
2,773,355 UART: [afmc] SUBJECT.KEYID = 7
2,773,781 UART: [afmc] AUTHORITY.KEYID = 5
2,809,184 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,578 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,329 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,058 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,941 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,660 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,457 UART: [afmc] --
2,852,389 UART: [cold-reset] --
2,853,141 UART: [state] Locking Datavault
2,854,126 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,730 UART: [state] Locking ICCM
2,855,332 UART: [exit] Launching FMC @ 0x40000130
2,860,661 UART:
2,860,677 UART: Running Caliptra FMC ...
2,861,085 UART:
2,861,139 UART: [state] CFI Enabled
2,871,362 UART: [fht] FMC Alias Private Key: 7
2,978,957 UART: [art] Extend RT PCRs Done
2,979,385 UART: [art] Lock RT PCRs Done
2,980,715 UART: [art] Populate DV Done
2,989,020 UART: [fht] FMC Alias Private Key: 7
2,990,194 UART: [art] Derive CDI
2,990,474 UART: [art] Store in in slot 0x4
3,076,037 UART: [art] Derive Key Pair
3,076,397 UART: [art] Store priv key in slot 0x5
3,089,829 UART: [art] Derive Key Pair - Done
3,104,446 UART: [art] Signing Cert with AUTHO
3,104,926 UART: RITY.KEYID = 7
3,119,824 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,589 UART: [art] PUB.X = 6F03BE7A08CD6E18879330C869EA0383D8F4C521A41F8845239E6DA5A8DED168ED16D7BCBEC6E59B9E7ED9DD88640712
3,127,359 UART: [art] PUB.Y = 8E550B79CE396531DB953903D96F83F30AD6316670BD9D0EF1EE7926BC37B103A36BC714B3CC18E3B78FA44093359FCB
3,134,300 UART: [art] SIG.R = 014B6B6EA05D9BCB73DAB2475CFCA8A2DFBB55C1AAF91DE9BFCD6715C853A926E07FBD2DB7A66D42EFC7D1B6A87338C1
3,141,099 UART: [art] SIG.S = 05AA1BE92FC94B9249A432D8749007A831CA66EF2B53568341C4F469B8ECABC010FD7282B82E460D8E9EC05F4CB42A7C
3,164,763 UART: Caliptra RT
3,165,016 UART: [state] CFI Enabled
3,272,515 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,711 UART:
3,274,727 UART: Running Caliptra ROM ...
3,275,135 UART:
3,275,190 UART: [state] CFI Enabled
3,277,504 UART: [state] LifecycleState = Unprovisioned
3,278,159 UART: [state] DebugLocked = No
3,278,759 UART: [state] WD Timer not started. Device not locked for debugging
3,279,919 UART: [kat] SHA2-256
4,083,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,087,598 UART: [kat] ++
4,087,750 UART: [kat] sha1
4,091,880 UART: [kat] SHA2-256
4,093,820 UART: [kat] SHA2-384
4,096,629 UART: [kat] SHA2-512-ACC
4,098,529 UART: [kat] ECC-384
4,108,214 UART: [kat] HMAC-384Kdf
4,112,898 UART: [kat] LMS
4,361,210 UART: [kat] --
4,362,186 UART: [update-reset] ++
5,674,099 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,675,174 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,824,998 >>> mbox cmd response: success
5,825,293 UART: [update-reset] Copying MAN_2 To MAN_1
5,833,307 UART: [update-reset Success] --
5,834,270 UART: [state] Locking Datavault
5,835,124 UART: [state] Locking PCR0, PCR1 and PCR31
5,835,728 UART: [state] Locking ICCM
5,836,350 UART: [exit] Launching FMC @ 0x40000130
5,841,679 UART:
5,841,695 UART: Running Caliptra FMC ...
5,842,103 UART:
5,842,157 UART: [state] CFI Enabled
5,930,966 UART: [art] Extend RT PCRs Done
5,931,394 UART: [art] Lock RT PCRs Done
5,932,667 UART: [art] Populate DV Done
5,941,006 UART: [fht] FMC Alias Private Key: 7
5,942,164 UART: [art] Derive CDI
5,942,444 UART: [art] Store in in slot 0x4
6,027,917 UART: [art] Derive Key Pair
6,028,277 UART: [art] Store priv key in slot 0x5
6,041,497 UART: [art] Derive Key Pair - Done
6,056,027 UART: [art] Signing Cert with AUTHO
6,056,507 UART: RITY.KEYID = 7
6,071,275 UART: [art] Erasing AUTHORITY.KEYID = 7
6,072,040 UART: [art] PUB.X = DB0D284495BF4752E1D19C2ECBE299F3639DC6C4E7562B4D212FBB446E332CF368D6B294ED0D84682F3DCD3FAADEC337
6,078,822 UART: [art] PUB.Y = 1F71A0C477B6AB658222497FA0F965C946D5FBCBCC297A8298095DC30122DD70BEC0FB088C330E06F411BDC0F489CCBD
6,085,771 UART: [art] SIG.R = 089227E5FC701DF628ED75797E042C13CFD7E9FE8A7E0CC0AAD75A1EE6BE2889045B8F3DC05FB2DD7C18245A9111B2FC
6,092,547 UART: [art] SIG.S = B5104A2983DB593B10024AAB1E78DBFBF094872E9DC7E4363C1EC347C0DC9BB0B9BB3027A8F672C974E51692F0452BC7
6,116,093 UART: Caliptra RT
6,116,346 UART: [state] CFI Enabled
6,397,517 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,604 ready_for_fw is high
1,055,604 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,727 >>> mbox cmd response: success
2,622,727 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,685,267 UART:
2,685,283 UART: Running Caliptra FMC ...
2,685,691 UART:
2,685,745 UART: [state] CFI Enabled
2,695,948 UART: [fht] FMC Alias Private Key: 7
2,803,691 UART: [art] Extend RT PCRs Done
2,804,119 UART: [art] Lock RT PCRs Done
2,805,457 UART: [art] Populate DV Done
2,813,918 UART: [fht] FMC Alias Private Key: 7
2,815,020 UART: [art] Derive CDI
2,815,300 UART: [art] Store in in slot 0x4
2,900,919 UART: [art] Derive Key Pair
2,901,279 UART: [art] Store priv key in slot 0x5
2,914,995 UART: [art] Derive Key Pair - Done
2,930,057 UART: [art] Signing Cert with AUTHO
2,930,537 UART: RITY.KEYID = 7
2,945,713 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,478 UART: [art] PUB.X = 5018998ECD11F07979FA2E45C8B913DB6025D059548427CFAB3E59019B7FEE62CAF9654496C0E64BE98B21FDAFC0D83B
2,953,255 UART: [art] PUB.Y = 1B851FC58CBDB2A1EDFE3FD0A53D53FA7DE394819EC800EBD11C50C902FDAA8CF359396D218C44C87B857ACDC18FB79C
2,960,206 UART: [art] SIG.R = 0F9FFC66FE6EF59B0264B91DED11C1EBD44194B13B3BDB1E15D85EF5CD5024CAFBC28D41D2B6F8280058578B695FA217
2,966,966 UART: [art] SIG.S = F79F228104AD80EC95D54EE3BA13F388D3535AFB2E3542639F158F2ECFB0C56097F09B3BC79816356D9E4E8801E2163B
2,991,101 UART: Caliptra RT
2,991,354 UART: [state] CFI Enabled
3,099,739 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,534,464 >>> mbox cmd response: success
5,547,894 UART:
5,547,910 UART: Running Caliptra FMC ...
5,548,318 UART:
5,548,372 UART: [state] CFI Enabled
5,637,505 UART: [art] Extend RT PCRs Done
5,637,933 UART: [art] Lock RT PCRs Done
5,639,302 UART: [art] Populate DV Done
5,647,495 UART: [fht] FMC Alias Private Key: 7
5,648,427 UART: [art] Derive CDI
5,648,707 UART: [art] Store in in slot 0x4
5,734,476 UART: [art] Derive Key Pair
5,734,836 UART: [art] Store priv key in slot 0x5
5,747,518 UART: [art] Derive Key Pair - Done
5,762,167 UART: [art] Signing Cert with AUTHO
5,762,647 UART: RITY.KEYID = 7
5,777,943 UART: [art] Erasing AUTHORITY.KEYID = 7
5,778,708 UART: [art] PUB.X = 972CA7D304957D3E30D915892EE6B049EC4B4CF79160BE4C07773EE17ED09943C99D7BFA005B7770B0015D8911419068
5,785,443 UART: [art] PUB.Y = DB8B0E3D1BA8BADF5D7D492857F75C769E78B469870658933E858F47ED3C32D10853DF6C46028398B1D4656BF5E37A28
5,792,383 UART: [art] SIG.R = FEB88592C62D57759F4A3DF06C11C0729BFF3A47A15D374FFC6E6DCEA374A67D5EE366EB0039743EE5BF89E084545670
5,799,141 UART: [art] SIG.S = 84508A7D35EE11C8B50643A06D757E15F88FA2621452810C397D7938DA4FBCD7E44DD1CB5380D5338628EDE3A05B6ACC
5,823,046 UART: Caliptra RT
5,823,299 UART: [state] CFI Enabled
6,102,239 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
891,511 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,640 UART: [kat] ++
895,792 UART: [kat] sha1
900,124 UART: [kat] SHA2-256
902,064 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
916,203 UART: [kat] HMAC-384Kdf
920,821 UART: [kat] LMS
1,169,133 UART: [kat] --
1,169,964 UART: [cold-reset] ++
1,170,358 UART: [fht] FHT @ 0x50003400
1,173,116 UART: [idev] ++
1,173,284 UART: [idev] CDI.KEYID = 6
1,173,645 UART: [idev] SUBJECT.KEYID = 7
1,174,070 UART: [idev] UDS.KEYID = 0
1,174,416 ready_for_fw is high
1,174,416 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,372 UART: [idev] Erasing UDS.KEYID = 0
1,199,932 UART: [idev] Sha1 KeyId Algorithm
1,208,788 UART: [idev] --
1,210,067 UART: [ldev] ++
1,210,235 UART: [ldev] CDI.KEYID = 6
1,210,599 UART: [ldev] SUBJECT.KEYID = 5
1,211,026 UART: [ldev] AUTHORITY.KEYID = 7
1,211,489 UART: [ldev] FE.KEYID = 1
1,216,817 UART: [ldev] Erasing FE.KEYID = 1
1,243,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,497 UART: [ldev] --
1,282,937 UART: [fwproc] Wait for Commands...
1,283,738 UART: [fwproc] Recv command 0x46574c44
1,284,471 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,065 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,374 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,124 >>> mbox cmd response: success
2,774,124 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,775,321 UART: [afmc] ++
2,775,489 UART: [afmc] CDI.KEYID = 6
2,775,852 UART: [afmc] SUBJECT.KEYID = 7
2,776,278 UART: [afmc] AUTHORITY.KEYID = 5
2,811,939 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,073 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,824 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,553 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,436 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,155 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,970 UART: [afmc] --
2,855,058 UART: [cold-reset] --
2,856,006 UART: [state] Locking Datavault
2,856,957 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,561 UART: [state] Locking ICCM
2,858,067 UART: [exit] Launching FMC @ 0x40000130
2,863,396 UART:
2,863,412 UART: Running Caliptra FMC ...
2,863,820 UART:
2,863,963 UART: [state] CFI Enabled
2,874,638 UART: [fht] FMC Alias Private Key: 7
2,982,233 UART: [art] Extend RT PCRs Done
2,982,661 UART: [art] Lock RT PCRs Done
2,984,329 UART: [art] Populate DV Done
2,992,592 UART: [fht] FMC Alias Private Key: 7
2,993,574 UART: [art] Derive CDI
2,993,854 UART: [art] Store in in slot 0x4
3,079,881 UART: [art] Derive Key Pair
3,080,241 UART: [art] Store priv key in slot 0x5
3,093,739 UART: [art] Derive Key Pair - Done
3,108,667 UART: [art] Signing Cert with AUTHO
3,109,147 UART: RITY.KEYID = 7
3,124,203 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,968 UART: [art] PUB.X = BF2EAC31AF1C9037AEDB0D7BC5BFFA962B75EA1ED5C8E0AAE6F8133E825D4B7EB0B0B4A047E9FED3A8D22E0258721169
3,131,760 UART: [art] PUB.Y = 21126B5745D7D77A024D9F15AC732E11A97F53228C8AEDEA75C7EDFD6B862F265B5ACFE73C87A32471B0F59E1D65695B
3,138,717 UART: [art] SIG.R = E911FF01A66F896D8FA1693523336E495EB2E22E08B4845E8E42E8105AA8C946A744682020DA9E7324DDB8BFA7A26152
3,145,481 UART: [art] SIG.S = 97EFCCAF271A1CE431E96B37C13C7CA608D38FE4759ECFD65CC4F84129F0D91E8748AA8ED7D45721979EB4F618CFC8E3
3,169,067 UART: Caliptra RT
3,169,412 UART: [state] CFI Enabled
3,276,756 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,744 UART:
3,278,760 UART: Running Caliptra ROM ...
3,279,168 UART:
3,279,310 UART: [state] CFI Enabled
3,282,396 UART: [state] LifecycleState = Unprovisioned
3,283,051 UART: [state] DebugLocked = No
3,283,549 UART: [state] WD Timer not started. Device not locked for debugging
3,284,837 UART: [kat] SHA2-256
4,088,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,092,516 UART: [kat] ++
4,092,668 UART: [kat] sha1
4,096,798 UART: [kat] SHA2-256
4,098,738 UART: [kat] SHA2-384
4,101,651 UART: [kat] SHA2-512-ACC
4,103,551 UART: [kat] ECC-384
4,113,706 UART: [kat] HMAC-384Kdf
4,118,310 UART: [kat] LMS
4,366,622 UART: [kat] --
4,367,528 UART: [update-reset] ++
5,678,357 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,679,404 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,829,228 >>> mbox cmd response: success
5,829,535 UART: [update-reset] Copying MAN_2 To MAN_1
5,837,549 UART: [update-reset Success] --
5,838,530 UART: [state] Locking Datavault
5,839,330 UART: [state] Locking PCR0, PCR1 and PCR31
5,839,934 UART: [state] Locking ICCM
5,840,558 UART: [exit] Launching FMC @ 0x40000130
5,845,887 UART:
5,845,903 UART: Running Caliptra FMC ...
5,846,311 UART:
5,846,454 UART: [state] CFI Enabled
5,936,037 UART: [art] Extend RT PCRs Done
5,936,465 UART: [art] Lock RT PCRs Done
5,937,680 UART: [art] Populate DV Done
5,945,853 UART: [fht] FMC Alias Private Key: 7
5,946,951 UART: [art] Derive CDI
5,947,231 UART: [art] Store in in slot 0x4
6,032,852 UART: [art] Derive Key Pair
6,033,212 UART: [art] Store priv key in slot 0x5
6,046,528 UART: [art] Derive Key Pair - Done
6,061,225 UART: [art] Signing Cert with AUTHO
6,061,705 UART: RITY.KEYID = 7
6,077,293 UART: [art] Erasing AUTHORITY.KEYID = 7
6,078,058 UART: [art] PUB.X = 3D480BE4E25FF6F6EAB53F625596CFFE8DCA16C4BDD6EAFFD9FB96A92D0D3493723575E8C7B10972D8363F1DD8282FF7
6,084,839 UART: [art] PUB.Y = 817751FB95E6436B345D9DE8EE6790D24A8F3C90B0FBE768925A88287583F175C27CBCA1B0745FD7CCFB859B41034C12
6,091,790 UART: [art] SIG.R = 590E786754DA0255BAA1A9756E1B2ED208680F2BDFEE5A4BBF7698ADFE8E01D1859019A2AEAE6644B57DC69825405511
6,098,553 UART: [art] SIG.S = E8E467FFA3ED6A9E4A0528120E521916C9B7F4B5ADB5EB70B953C8D40A69299FA9A6D327EBFAF81CA057939944E1514E
6,122,267 UART: Caliptra RT
6,122,612 UART: [state] CFI Enabled
6,403,399 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,111 ready_for_fw is high
1,056,111 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,714 >>> mbox cmd response: success
2,622,714 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,685,092 UART:
2,685,108 UART: Running Caliptra FMC ...
2,685,516 UART:
2,685,659 UART: [state] CFI Enabled
2,696,758 UART: [fht] FMC Alias Private Key: 7
2,804,421 UART: [art] Extend RT PCRs Done
2,804,849 UART: [art] Lock RT PCRs Done
2,806,109 UART: [art] Populate DV Done
2,814,398 UART: [fht] FMC Alias Private Key: 7
2,815,406 UART: [art] Derive CDI
2,815,686 UART: [art] Store in in slot 0x4
2,901,889 UART: [art] Derive Key Pair
2,902,249 UART: [art] Store priv key in slot 0x5
2,916,253 UART: [art] Derive Key Pair - Done
2,930,580 UART: [art] Signing Cert with AUTHO
2,931,060 UART: RITY.KEYID = 7
2,946,244 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,009 UART: [art] PUB.X = 95A854C76C8842D3539BB298A1C326D0F820168540775DE0D73E7801511EB3FC0A4C43316635AB880840F910A749F77C
2,953,760 UART: [art] PUB.Y = DC3499E919B8D51F24319D78340EC8075EC252A66488BE03F19D83106C5D276720E41DBD01DF9019D111B20989702E47
2,960,687 UART: [art] SIG.R = 73577ADE80E6C1F8CA7523B31BF54CB3DB9C89BEAC00CA2EADFF67B70D116FF4B637161988E1A29B55FE65CC254BE20F
2,967,451 UART: [art] SIG.S = 43A09B62B61C37FDD3A2F6EAB650638E3ADA27907EE2F9F15976927E6AE4CFF4686EAF18B206875723002C3A850CCBEE
2,991,402 UART: Caliptra RT
2,991,747 UART: [state] CFI Enabled
3,100,036 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,534,363 >>> mbox cmd response: success
5,547,751 UART:
5,547,767 UART: Running Caliptra FMC ...
5,548,175 UART:
5,548,318 UART: [state] CFI Enabled
5,637,661 UART: [art] Extend RT PCRs Done
5,638,089 UART: [art] Lock RT PCRs Done
5,639,318 UART: [art] Populate DV Done
5,647,689 UART: [fht] FMC Alias Private Key: 7
5,648,693 UART: [art] Derive CDI
5,648,973 UART: [art] Store in in slot 0x4
5,734,566 UART: [art] Derive Key Pair
5,734,926 UART: [art] Store priv key in slot 0x5
5,748,394 UART: [art] Derive Key Pair - Done
5,763,482 UART: [art] Signing Cert with AUTHO
5,763,962 UART: RITY.KEYID = 7
5,779,352 UART: [art] Erasing AUTHORITY.KEYID = 7
5,780,117 UART: [art] PUB.X = 6838C884C99E52A497552F4A6A46D1440CF162AFD6602710BAD404A14F6AFCE44A506B9E5684E79772AC3F4B1D7BF7D1
5,786,887 UART: [art] PUB.Y = ED98D8CD8110679414A3E7642ACBFE2A092EFB5166DB138BE88CA8FA580EB901C817483103FB1A9619CBD451A5C287B5
5,793,835 UART: [art] SIG.R = E9481C16105DB1B1043ED3AACC666E668A64F6358523B72410A7D8BABD1F50248B36FA9AABC6227ED408B662699C70F2
5,800,605 UART: [art] SIG.S = F12F63D5ACFA96ABECA3871479D85D6F95252F629FF21659EB3E17327F0EF7734C77120C97C6C38E0D4CCB278FB91BAA
5,824,075 UART: Caliptra RT
5,824,420 UART: [state] CFI Enabled
6,107,966 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,391 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,993 UART: [kat] SHA2-256
881,924 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,039 UART: [kat] ++
886,191 UART: [kat] sha1
890,387 UART: [kat] SHA2-256
892,325 UART: [kat] SHA2-384
894,826 UART: [kat] SHA2-512-ACC
896,727 UART: [kat] ECC-384
902,710 UART: [kat] HMAC-384Kdf
907,396 UART: [kat] LMS
1,475,592 UART: [kat] --
1,476,485 UART: [cold-reset] ++
1,476,825 UART: [fht] Storing FHT @ 0x50003400
1,479,692 UART: [idev] ++
1,479,860 UART: [idev] CDI.KEYID = 6
1,480,220 UART: [idev] SUBJECT.KEYID = 7
1,480,644 UART: [idev] UDS.KEYID = 0
1,480,989 ready_for_fw is high
1,480,989 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,426 UART: [idev] Erasing UDS.KEYID = 0
1,504,612 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,018 UART: [idev] --
1,514,043 UART: [ldev] ++
1,514,211 UART: [ldev] CDI.KEYID = 6
1,514,574 UART: [ldev] SUBJECT.KEYID = 5
1,515,000 UART: [ldev] AUTHORITY.KEYID = 7
1,515,463 UART: [ldev] FE.KEYID = 1
1,520,737 UART: [ldev] Erasing FE.KEYID = 1
1,545,946 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,868 UART: [ldev] --
1,585,259 UART: [fwproc] Waiting for Commands...
1,586,116 UART: [fwproc] Received command 0x46574c44
1,586,907 UART: [fwproc] Received Image of size 114332 bytes
2,884,563 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,349 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,701 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,610 >>> mbox cmd response: success
3,077,844 UART: [afmc] ++
3,078,012 UART: [afmc] CDI.KEYID = 6
3,078,374 UART: [afmc] SUBJECT.KEYID = 7
3,078,799 UART: [afmc] AUTHORITY.KEYID = 5
3,113,874 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,234 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,014 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,742 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,627 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,317 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,190 UART: [afmc] --
3,157,148 UART: [cold-reset] --
3,158,036 UART: [state] Locking Datavault
3,158,979 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,583 UART: [state] Locking ICCM
3,160,115 UART: [exit] Launching FMC @ 0x40000130
3,165,444 UART:
3,165,460 UART: Running Caliptra FMC ...
3,165,868 UART:
3,165,922 UART: [state] CFI Enabled
3,176,633 UART: [fht] FMC Alias Private Key: 7
3,284,306 UART: [art] Extend RT PCRs Done
3,284,734 UART: [art] Lock RT PCRs Done
3,286,484 UART: [art] Populate DV Done
3,294,521 UART: [fht] FMC Alias Private Key: 7
3,295,459 UART: [art] Derive CDI
3,295,739 UART: [art] Store in in slot 0x4
3,381,118 UART: [art] Derive Key Pair
3,381,478 UART: [art] Store priv key in slot 0x5
3,394,428 UART: [art] Derive Key Pair - Done
3,409,549 UART: [art] Signing Cert with AUTHO
3,410,029 UART: RITY.KEYID = 7
3,425,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,844 UART: [art] PUB.X = C021653C28C6C2DC3A9568CC2072234FE50CB52C5C8F182C16F894809B30F8525B08DD89096714331AB4AF4F3F5C2F27
3,432,605 UART: [art] PUB.Y = E8F10798A267D17DD437C79D4EF3B5897E98F33A7B4D4110F2E94A00902EE2D36C09B319D8E7E368CC791A08A6330817
3,439,521 UART: [art] SIG.R = 83E1E6829B0599B1719111F5B316F0C8E58636DFB7C8C6287F703D5BEE52492E335464944153B2B8795ECE333983E894
3,446,278 UART: [art] SIG.S = F556F6F5FBA78E4CB12B31D0B2936077F5EC652F1DA6D1F5D442469CD40A2A2CA51E1BEA771C1AAC22754B2824A12651
3,470,300 UART: Caliptra RT
3,470,553 UART: [state] CFI Enabled
3,578,359 UART: [rt] RT listening for mailbox commands...
3,579,029 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,405 UART: [rt]cmd =0x434b4558, len=80
3,778,192 >>> mbox cmd response data (6280 bytes)
3,778,193 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,807,937 UART: [rt]cmd =0x414c544e, len=41
3,809,670 >>> mbox cmd response data (8 bytes)
3,809,671 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,839,376 UART: [rt]cmd =0x434b4558, len=80
4,008,279 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,603 ready_for_fw is high
1,362,603 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,364 >>> mbox cmd response: success
2,988,078 UART:
2,988,094 UART: Running Caliptra FMC ...
2,988,502 UART:
2,988,556 UART: [state] CFI Enabled
2,999,271 UART: [fht] FMC Alias Private Key: 7
3,106,712 UART: [art] Extend RT PCRs Done
3,107,140 UART: [art] Lock RT PCRs Done
3,108,822 UART: [art] Populate DV Done
3,117,089 UART: [fht] FMC Alias Private Key: 7
3,118,255 UART: [art] Derive CDI
3,118,535 UART: [art] Store in in slot 0x4
3,204,192 UART: [art] Derive Key Pair
3,204,552 UART: [art] Store priv key in slot 0x5
3,216,970 UART: [art] Derive Key Pair - Done
3,231,584 UART: [art] Signing Cert with AUTHO
3,232,064 UART: RITY.KEYID = 7
3,247,540 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,305 UART: [art] PUB.X = E27FC7B34581EE17B863E7E2CAA809F2EE7B90989638E14F0AD8365BA5167265411916F60AB40A99134A485B82B79C5C
3,255,063 UART: [art] PUB.Y = 4E880066BDBF933EA420D13E69D06C367D1F641D4474F39EEEA7AA7F4B743D4279A588D41BB60263DB484BA969A65759
3,261,992 UART: [art] SIG.R = 2B0A34E24256A9C6208F6DCE1124D2D48AACDF3BDAD00AB289F8F023A1542D4E85415EEEB2386A9E2A185A33E4C56A51
3,268,770 UART: [art] SIG.S = BD64ABBEF7F3DDD98ECFD8C6454EFCD024B98F40BB3A4E10F45BAA3D90243763B3BDA5E67B1E68160746A153CA18D862
3,292,150 UART: Caliptra RT
3,292,403 UART: [state] CFI Enabled
3,399,450 UART: [rt] RT listening for mailbox commands...
3,400,120 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,438 UART: [rt]cmd =0x434b4558, len=80
3,599,279 >>> mbox cmd response data (6280 bytes)
3,599,280 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,932 UART: [rt]cmd =0x414c544e, len=41
3,630,869 >>> mbox cmd response data (8 bytes)
3,630,870 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,660,885 UART: [rt]cmd =0x434b4558, len=80
3,830,008 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,698 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,372 UART: [kat] SHA2-256
882,303 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,418 UART: [kat] ++
886,570 UART: [kat] sha1
890,826 UART: [kat] SHA2-256
892,764 UART: [kat] SHA2-384
895,533 UART: [kat] SHA2-512-ACC
897,434 UART: [kat] ECC-384
903,039 UART: [kat] HMAC-384Kdf
907,595 UART: [kat] LMS
1,475,791 UART: [kat] --
1,476,526 UART: [cold-reset] ++
1,476,904 UART: [fht] Storing FHT @ 0x50003400
1,479,567 UART: [idev] ++
1,479,735 UART: [idev] CDI.KEYID = 6
1,480,095 UART: [idev] SUBJECT.KEYID = 7
1,480,519 UART: [idev] UDS.KEYID = 0
1,480,864 ready_for_fw is high
1,480,864 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,931 UART: [idev] Erasing UDS.KEYID = 0
1,505,705 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,339 UART: [idev] --
1,515,488 UART: [ldev] ++
1,515,656 UART: [ldev] CDI.KEYID = 6
1,516,019 UART: [ldev] SUBJECT.KEYID = 5
1,516,445 UART: [ldev] AUTHORITY.KEYID = 7
1,516,908 UART: [ldev] FE.KEYID = 1
1,521,956 UART: [ldev] Erasing FE.KEYID = 1
1,547,293 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,639 UART: [ldev] --
1,587,080 UART: [fwproc] Waiting for Commands...
1,587,785 UART: [fwproc] Received command 0x46574c44
1,588,576 UART: [fwproc] Received Image of size 114332 bytes
2,885,456 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,024 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,376 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,349 >>> mbox cmd response: success
3,079,417 UART: [afmc] ++
3,079,585 UART: [afmc] CDI.KEYID = 6
3,079,947 UART: [afmc] SUBJECT.KEYID = 7
3,080,372 UART: [afmc] AUTHORITY.KEYID = 5
3,115,423 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,775 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,555 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,283 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,168 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,858 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,803 UART: [afmc] --
3,158,727 UART: [cold-reset] --
3,159,533 UART: [state] Locking Datavault
3,160,918 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,522 UART: [state] Locking ICCM
3,162,104 UART: [exit] Launching FMC @ 0x40000130
3,167,433 UART:
3,167,449 UART: Running Caliptra FMC ...
3,167,857 UART:
3,168,000 UART: [state] CFI Enabled
3,178,695 UART: [fht] FMC Alias Private Key: 7
3,287,018 UART: [art] Extend RT PCRs Done
3,287,446 UART: [art] Lock RT PCRs Done
3,289,112 UART: [art] Populate DV Done
3,297,223 UART: [fht] FMC Alias Private Key: 7
3,298,261 UART: [art] Derive CDI
3,298,541 UART: [art] Store in in slot 0x4
3,384,420 UART: [art] Derive Key Pair
3,384,780 UART: [art] Store priv key in slot 0x5
3,397,804 UART: [art] Derive Key Pair - Done
3,413,048 UART: [art] Signing Cert with AUTHO
3,413,528 UART: RITY.KEYID = 7
3,428,710 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,475 UART: [art] PUB.X = 9FA647D1F5AAD5AE43BEB243CCC2174A1745FCBB5332876E526324A4F68E4ECF9AC88FA529AF17BF9185601FACE2F274
3,436,263 UART: [art] PUB.Y = 6160FA9E9575BEE89383971281EB8D19D8041AC738CFFFCBB9273353C400757A339F3D188DE7AF0CA50E349AB4704D45
3,443,186 UART: [art] SIG.R = B1415D354FD78748D9EBA8A6CF2C7C77EBA713AAEBCE80A4C3EB7058BA557378609FB5C564E0A3C35620E7732AEAD7DE
3,449,976 UART: [art] SIG.S = 666988258FF01F607BD9AAA07B2ADC328428276F17A6F60DB200923FA059C70B41CE5100D6234B05FF79D751DEDCC6AE
3,473,900 UART: Caliptra RT
3,474,245 UART: [state] CFI Enabled
3,582,596 UART: [rt] RT listening for mailbox commands...
3,583,266 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,704 UART: [rt]cmd =0x434b4558, len=80
3,783,653 >>> mbox cmd response data (6280 bytes)
3,783,654 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,813,134 UART: [rt]cmd =0x414c544e, len=41
3,814,903 >>> mbox cmd response data (8 bytes)
3,814,904 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,844,687 UART: [rt]cmd =0x434b4558, len=80
4,014,506 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,156 ready_for_fw is high
1,363,156 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,679 >>> mbox cmd response: success
2,990,591 UART:
2,990,607 UART: Running Caliptra FMC ...
2,991,015 UART:
2,991,158 UART: [state] CFI Enabled
3,001,825 UART: [fht] FMC Alias Private Key: 7
3,109,438 UART: [art] Extend RT PCRs Done
3,109,866 UART: [art] Lock RT PCRs Done
3,111,326 UART: [art] Populate DV Done
3,119,553 UART: [fht] FMC Alias Private Key: 7
3,120,511 UART: [art] Derive CDI
3,120,791 UART: [art] Store in in slot 0x4
3,206,430 UART: [art] Derive Key Pair
3,206,790 UART: [art] Store priv key in slot 0x5
3,219,926 UART: [art] Derive Key Pair - Done
3,234,291 UART: [art] Signing Cert with AUTHO
3,234,771 UART: RITY.KEYID = 7
3,250,399 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,164 UART: [art] PUB.X = F29F6DC21779CE266E2C276906A3BC0C4A9B769218549C92250FF8031128339569D2E27859F63714F70E9B552C88D102
3,257,904 UART: [art] PUB.Y = 225B289B340CCBC770488352D4FA64B2AAB054404C98A25F9BCC4DD63BBFA6C007D24E346E5D440302C061D3A00983D3
3,264,845 UART: [art] SIG.R = D9068143C026F5C74F42D245A0103537760B363D35EF03BFCFEE75BCEDE7D8951C90AFA8A18AD3D0EEB6170F1B857EB3
3,271,617 UART: [art] SIG.S = 59C4FD1237B067576121627557847B2154DBC9A2EA7E1A12EAEE7B5699EAE290E923C1D35D4DC500DAC2D59197AC816F
3,295,490 UART: Caliptra RT
3,295,835 UART: [state] CFI Enabled
3,404,326 UART: [rt] RT listening for mailbox commands...
3,404,996 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,244 UART: [rt]cmd =0x434b4558, len=80
3,604,130 >>> mbox cmd response data (6280 bytes)
3,604,131 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,873 UART: [rt]cmd =0x414c544e, len=41
3,635,616 >>> mbox cmd response data (8 bytes)
3,635,617 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,518 UART: [rt]cmd =0x434b4558, len=80
3,833,616 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
893,238 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,363 UART: [kat] ++
897,515 UART: [kat] sha1
901,741 UART: [kat] SHA2-256
903,681 UART: [kat] SHA2-384
906,444 UART: [kat] SHA2-512-ACC
908,345 UART: [kat] ECC-384
918,164 UART: [kat] HMAC-384Kdf
922,660 UART: [kat] LMS
1,170,988 UART: [kat] --
1,171,793 UART: [cold-reset] ++
1,172,325 UART: [fht] FHT @ 0x50003400
1,174,900 UART: [idev] ++
1,175,068 UART: [idev] CDI.KEYID = 6
1,175,428 UART: [idev] SUBJECT.KEYID = 7
1,175,852 UART: [idev] UDS.KEYID = 0
1,176,197 ready_for_fw is high
1,176,197 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,640 UART: [idev] Erasing UDS.KEYID = 0
1,200,283 UART: [idev] Sha1 KeyId Algorithm
1,208,783 UART: [idev] --
1,209,893 UART: [ldev] ++
1,210,061 UART: [ldev] CDI.KEYID = 6
1,210,424 UART: [ldev] SUBJECT.KEYID = 5
1,210,850 UART: [ldev] AUTHORITY.KEYID = 7
1,211,313 UART: [ldev] FE.KEYID = 1
1,216,645 UART: [ldev] Erasing FE.KEYID = 1
1,242,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,659 UART: [ldev] --
1,282,084 UART: [fwproc] Wait for Commands...
1,282,864 UART: [fwproc] Recv command 0x46574c44
1,283,592 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,796 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,100 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,901 >>> mbox cmd response: success
2,774,103 UART: [afmc] ++
2,774,271 UART: [afmc] CDI.KEYID = 6
2,774,633 UART: [afmc] SUBJECT.KEYID = 7
2,775,058 UART: [afmc] AUTHORITY.KEYID = 5
2,810,263 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,320 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,048 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,933 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,652 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,684 UART: [afmc] --
2,853,738 UART: [cold-reset] --
2,854,730 UART: [state] Locking Datavault
2,856,047 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,651 UART: [state] Locking ICCM
2,857,071 UART: [exit] Launching FMC @ 0x40000130
2,862,400 UART:
2,862,416 UART: Running Caliptra FMC ...
2,862,824 UART:
2,862,878 UART: [state] CFI Enabled
2,874,025 UART: [fht] FMC Alias Private Key: 7
2,982,650 UART: [art] Extend RT PCRs Done
2,983,078 UART: [art] Lock RT PCRs Done
2,984,426 UART: [art] Populate DV Done
2,992,499 UART: [fht] FMC Alias Private Key: 7
2,993,613 UART: [art] Derive CDI
2,993,893 UART: [art] Store in in slot 0x4
3,080,018 UART: [art] Derive Key Pair
3,080,378 UART: [art] Store priv key in slot 0x5
3,093,698 UART: [art] Derive Key Pair - Done
3,108,887 UART: [art] Signing Cert with AUTHO
3,109,367 UART: RITY.KEYID = 7
3,124,415 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,180 UART: [art] PUB.X = A3C64E4B6209AC3E8CEADDC1517F577A55ADD72701BFF57DE679CA85812417E6842925E89334AC953805E8877F7441AE
3,131,945 UART: [art] PUB.Y = 923DAAB041B7DAA5F30CDC3379E3E4880791B5E39EFC268161E8E44761E2CEBC7BBA7034916C8FC5F3A38016541C7C01
3,138,896 UART: [art] SIG.R = D899CE465E3423E0B68343D14249D9AA564C7D3E18BC38987C617F08C0F022CF07A4107316D41B8DB41544B00169AAD0
3,145,655 UART: [art] SIG.S = CAD1CD11D3249675B004EBB53330187C8B8E29C4CD8B9EC370B1D0786AF05843B3E80AC32FACD6F29F940B919555B6ED
3,169,659 UART: Caliptra RT
3,169,912 UART: [state] CFI Enabled
3,277,612 UART: [rt] RT listening for mailbox commands...
3,278,282 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,614 UART: [rt]cmd =0x434b4558, len=80
3,477,801 >>> mbox cmd response data (6280 bytes)
3,477,802 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,507,324 UART: [rt]cmd =0x414c544e, len=41
3,509,119 >>> mbox cmd response data (8 bytes)
3,509,120 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,849 UART: [rt]cmd =0x434b4558, len=80
3,707,668 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,173 ready_for_fw is high
1,060,173 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,756 >>> mbox cmd response: success
2,688,778 UART:
2,688,794 UART: Running Caliptra FMC ...
2,689,202 UART:
2,689,256 UART: [state] CFI Enabled
2,700,015 UART: [fht] FMC Alias Private Key: 7
2,807,942 UART: [art] Extend RT PCRs Done
2,808,370 UART: [art] Lock RT PCRs Done
2,810,106 UART: [art] Populate DV Done
2,818,185 UART: [fht] FMC Alias Private Key: 7
2,819,185 UART: [art] Derive CDI
2,819,465 UART: [art] Store in in slot 0x4
2,905,084 UART: [art] Derive Key Pair
2,905,444 UART: [art] Store priv key in slot 0x5
2,918,854 UART: [art] Derive Key Pair - Done
2,933,699 UART: [art] Signing Cert with AUTHO
2,934,179 UART: RITY.KEYID = 7
2,949,573 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,338 UART: [art] PUB.X = 585C4E070336EEA6517AA18568EBF5590531F611C5A317E9F5E7A4A989438D09EE049DBE3B96DF1983FD5E36A893151F
2,957,095 UART: [art] PUB.Y = 1655CAE73B3ABE6413BF3E69832404B8FD28CE6800BDB8243265B7C3C1564440A407C32CDD681C8868024E7D80AFA662
2,964,016 UART: [art] SIG.R = 55908432067D00E92AA42CE3B787DB8F8382A32AF5E0DB4155AA6A311D8EB81C59DB6D40815A5C3D662B024DA1C4F57C
2,970,766 UART: [art] SIG.S = AAFB617C74A231EC0A8EBA0005AEA7B29945602EC033A3AE93E829FB3BD3F8CEAF3A78797FB59C4E0318CB50DF564C69
2,994,678 UART: Caliptra RT
2,994,931 UART: [state] CFI Enabled
3,103,026 UART: [rt] RT listening for mailbox commands...
3,103,696 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,210 UART: [rt]cmd =0x434b4558, len=80
3,303,194 >>> mbox cmd response data (6280 bytes)
3,303,195 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,707 UART: [rt]cmd =0x414c544e, len=41
3,334,548 >>> mbox cmd response data (8 bytes)
3,334,549 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,416 UART: [rt]cmd =0x434b4558, len=80
3,534,070 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
893,629 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,754 UART: [kat] ++
897,906 UART: [kat] sha1
902,248 UART: [kat] SHA2-256
904,188 UART: [kat] SHA2-384
906,971 UART: [kat] SHA2-512-ACC
908,872 UART: [kat] ECC-384
918,657 UART: [kat] HMAC-384Kdf
923,301 UART: [kat] LMS
1,171,629 UART: [kat] --
1,172,424 UART: [cold-reset] ++
1,172,988 UART: [fht] FHT @ 0x50003400
1,175,677 UART: [idev] ++
1,175,845 UART: [idev] CDI.KEYID = 6
1,176,205 UART: [idev] SUBJECT.KEYID = 7
1,176,629 UART: [idev] UDS.KEYID = 0
1,176,974 ready_for_fw is high
1,176,974 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,083 UART: [idev] Erasing UDS.KEYID = 0
1,202,046 UART: [idev] Sha1 KeyId Algorithm
1,210,666 UART: [idev] --
1,211,894 UART: [ldev] ++
1,212,062 UART: [ldev] CDI.KEYID = 6
1,212,425 UART: [ldev] SUBJECT.KEYID = 5
1,212,851 UART: [ldev] AUTHORITY.KEYID = 7
1,213,314 UART: [ldev] FE.KEYID = 1
1,218,550 UART: [ldev] Erasing FE.KEYID = 1
1,244,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,538 UART: [ldev] --
1,284,007 UART: [fwproc] Wait for Commands...
1,284,697 UART: [fwproc] Recv command 0x46574c44
1,285,425 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,165 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,469 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,406 >>> mbox cmd response: success
2,776,554 UART: [afmc] ++
2,776,722 UART: [afmc] CDI.KEYID = 6
2,777,084 UART: [afmc] SUBJECT.KEYID = 7
2,777,509 UART: [afmc] AUTHORITY.KEYID = 5
2,813,154 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,001 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,749 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,477 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,362 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,081 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,011 UART: [afmc] --
2,857,127 UART: [cold-reset] --
2,858,035 UART: [state] Locking Datavault
2,859,210 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,814 UART: [state] Locking ICCM
2,860,242 UART: [exit] Launching FMC @ 0x40000130
2,865,571 UART:
2,865,587 UART: Running Caliptra FMC ...
2,865,995 UART:
2,866,138 UART: [state] CFI Enabled
2,876,899 UART: [fht] FMC Alias Private Key: 7
2,985,500 UART: [art] Extend RT PCRs Done
2,985,928 UART: [art] Lock RT PCRs Done
2,987,350 UART: [art] Populate DV Done
2,995,389 UART: [fht] FMC Alias Private Key: 7
2,996,471 UART: [art] Derive CDI
2,996,751 UART: [art] Store in in slot 0x4
3,082,482 UART: [art] Derive Key Pair
3,082,842 UART: [art] Store priv key in slot 0x5
3,097,036 UART: [art] Derive Key Pair - Done
3,111,396 UART: [art] Signing Cert with AUTHO
3,111,876 UART: RITY.KEYID = 7
3,127,030 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,795 UART: [art] PUB.X = 40B97497C5DA6829FC81373A50FAC61AA4C4C9A09430090C129EC426C032BB7A9A5A66DE5CBDBFCAF7452233A5A32D95
3,134,571 UART: [art] PUB.Y = 1AAC1EEE9AA4AA23CED642FC5ED99289118B05528292BF621A8D79F15267040E577B9197611DCF3A120D14E977FA3128
3,141,513 UART: [art] SIG.R = 28F5FEB4538E629A6679F4275F654F99489F7A79CF0C7FE99EFCC1F6548C31C4AE6127C3D735A8A3AB0E91F36BC926CC
3,148,289 UART: [art] SIG.S = 7B184A55255896299514D4CC88D2BF765EC838BE467069F344A84DD76940B2C97E11937E89F0F683043BE51E29BEB6C7
3,171,313 UART: Caliptra RT
3,171,658 UART: [state] CFI Enabled
3,278,529 UART: [rt] RT listening for mailbox commands...
3,279,199 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,739 UART: [rt]cmd =0x434b4558, len=80
3,478,529 >>> mbox cmd response data (6280 bytes)
3,478,530 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,508,008 UART: [rt]cmd =0x414c544e, len=41
3,509,815 >>> mbox cmd response data (8 bytes)
3,509,816 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,701 UART: [rt]cmd =0x434b4558, len=80
3,708,567 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,646 ready_for_fw is high
1,060,646 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,603 >>> mbox cmd response: success
2,690,755 UART:
2,690,771 UART: Running Caliptra FMC ...
2,691,179 UART:
2,691,322 UART: [state] CFI Enabled
2,702,051 UART: [fht] FMC Alias Private Key: 7
2,810,150 UART: [art] Extend RT PCRs Done
2,810,578 UART: [art] Lock RT PCRs Done
2,812,146 UART: [art] Populate DV Done
2,820,273 UART: [fht] FMC Alias Private Key: 7
2,821,371 UART: [art] Derive CDI
2,821,651 UART: [art] Store in in slot 0x4
2,907,144 UART: [art] Derive Key Pair
2,907,504 UART: [art] Store priv key in slot 0x5
2,920,958 UART: [art] Derive Key Pair - Done
2,936,279 UART: [art] Signing Cert with AUTHO
2,936,759 UART: RITY.KEYID = 7
2,951,839 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,604 UART: [art] PUB.X = 3AB297E9B395C3F4ADFC61A3E1430BBDC5F35E5C3974CDFB8817E46C196625286C1FB8A41BE40568E193BF1882836387
2,959,374 UART: [art] PUB.Y = AADC9F9A6503324715C518F60849FF76FA098C61AC4B4CC3BE2949F7D05C2EBA0275AF5C88AA894536578AC72825126F
2,966,318 UART: [art] SIG.R = 239669318297E235FC42D5FDC407EFAC22CA8E43CCF62D103A04B5A1F49EB58C95F4E6A8DB8C45C2815724A585E6E407
2,973,087 UART: [art] SIG.S = 552B48547D548EA229BC9985685AA1F7923B540243486C714A7A52A40D76013A5C79B641A860A77E9D36B46793B782B2
2,996,863 UART: Caliptra RT
2,997,208 UART: [state] CFI Enabled
3,103,719 UART: [rt] RT listening for mailbox commands...
3,104,389 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,591 UART: [rt]cmd =0x434b4558, len=80
3,303,582 >>> mbox cmd response data (6280 bytes)
3,303,583 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,333,281 UART: [rt]cmd =0x414c544e, len=41
3,335,266 >>> mbox cmd response data (8 bytes)
3,335,267 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,278 UART: [rt]cmd =0x434b4558, len=80
3,534,071 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,778 UART: [state] LifecycleState = Unprovisioned
85,433 UART: [state] DebugLocked = No
86,105 UART: [state] WD Timer not started. Device not locked for debugging
87,356 UART: [kat] SHA2-256
890,906 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,035 UART: [kat] ++
895,187 UART: [kat] sha1
899,433 UART: [kat] SHA2-256
901,373 UART: [kat] SHA2-384
904,162 UART: [kat] SHA2-512-ACC
906,063 UART: [kat] ECC-384
915,992 UART: [kat] HMAC-384Kdf
920,534 UART: [kat] LMS
1,168,846 UART: [kat] --
1,169,699 UART: [cold-reset] ++
1,170,217 UART: [fht] FHT @ 0x50003400
1,172,755 UART: [idev] ++
1,172,923 UART: [idev] CDI.KEYID = 6
1,173,284 UART: [idev] SUBJECT.KEYID = 7
1,173,709 UART: [idev] UDS.KEYID = 0
1,174,055 ready_for_fw is high
1,174,055 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,137 UART: [idev] Erasing UDS.KEYID = 0
1,198,243 UART: [idev] Sha1 KeyId Algorithm
1,207,185 UART: [idev] --
1,208,290 UART: [ldev] ++
1,208,458 UART: [ldev] CDI.KEYID = 6
1,208,822 UART: [ldev] SUBJECT.KEYID = 5
1,209,249 UART: [ldev] AUTHORITY.KEYID = 7
1,209,712 UART: [ldev] FE.KEYID = 1
1,214,992 UART: [ldev] Erasing FE.KEYID = 1
1,240,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,002 UART: [ldev] --
1,279,386 UART: [fwproc] Wait for Commands...
1,280,203 UART: [fwproc] Recv command 0x46574c44
1,280,936 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,034 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,343 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,279 >>> mbox cmd response: success
2,771,384 UART: [afmc] ++
2,771,552 UART: [afmc] CDI.KEYID = 6
2,771,915 UART: [afmc] SUBJECT.KEYID = 7
2,772,341 UART: [afmc] AUTHORITY.KEYID = 5
2,808,382 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,615 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,344 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,227 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,946 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,983 UART: [afmc] --
2,851,907 UART: [cold-reset] --
2,852,965 UART: [state] Locking Datavault
2,854,190 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,794 UART: [state] Locking ICCM
2,855,254 UART: [exit] Launching FMC @ 0x40000130
2,860,583 UART:
2,860,599 UART: Running Caliptra FMC ...
2,861,007 UART:
2,861,061 UART: [state] CFI Enabled
2,871,488 UART: [fht] FMC Alias Private Key: 7
2,979,531 UART: [art] Extend RT PCRs Done
2,979,959 UART: [art] Lock RT PCRs Done
2,981,283 UART: [art] Populate DV Done
2,989,636 UART: [fht] FMC Alias Private Key: 7
2,990,578 UART: [art] Derive CDI
2,990,858 UART: [art] Store in in slot 0x4
3,076,281 UART: [art] Derive Key Pair
3,076,641 UART: [art] Store priv key in slot 0x5
3,090,127 UART: [art] Derive Key Pair - Done
3,105,205 UART: [art] Signing Cert with AUTHO
3,105,685 UART: RITY.KEYID = 7
3,120,745 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,510 UART: [art] PUB.X = E28CAFB6744B22A06573A5F4D4646181500718A98271EFD5BCC8873D5599FFAB929EE63123CE7A7784FFFD7502D58999
3,128,276 UART: [art] PUB.Y = A4996947B6977636B3A8FE71A298AAD2A65E426C06FF437F0BE2745B621801EFCBC8B8D69E64BF41780F645E43F84197
3,135,216 UART: [art] SIG.R = 834AAB0F4CDD322E813B8417DD9264857C7E321861E46E56AAED757857621036C2D2CBDB2C55088DE5F180844B138A53
3,141,980 UART: [art] SIG.S = 89526B059F1C8FAB99D7B1C691E4848ED065DD587C9A6CD8AE80C5B72BFD00CA0B192BA03DACC5C39851E7FB1BC19C0F
3,166,048 UART: Caliptra RT
3,166,301 UART: [state] CFI Enabled
3,274,171 UART: [rt] RT listening for mailbox commands...
3,274,841 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,045 UART: [rt]cmd =0x434b4558, len=80
3,472,601 >>> mbox cmd response data (6280 bytes)
3,472,602 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,256 UART: [rt]cmd =0x414c544e, len=41
3,504,059 >>> mbox cmd response data (8 bytes)
3,504,060 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,863 UART: [rt]cmd =0x434b4558, len=80
3,702,585 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,538 ready_for_fw is high
1,055,538 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,309 >>> mbox cmd response: success
2,683,607 UART:
2,683,623 UART: Running Caliptra FMC ...
2,684,031 UART:
2,684,085 UART: [state] CFI Enabled
2,694,484 UART: [fht] FMC Alias Private Key: 7
2,802,131 UART: [art] Extend RT PCRs Done
2,802,559 UART: [art] Lock RT PCRs Done
2,803,711 UART: [art] Populate DV Done
2,811,744 UART: [fht] FMC Alias Private Key: 7
2,812,806 UART: [art] Derive CDI
2,813,086 UART: [art] Store in in slot 0x4
2,898,645 UART: [art] Derive Key Pair
2,899,005 UART: [art] Store priv key in slot 0x5
2,912,199 UART: [art] Derive Key Pair - Done
2,927,083 UART: [art] Signing Cert with AUTHO
2,927,563 UART: RITY.KEYID = 7
2,942,565 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,330 UART: [art] PUB.X = EB0698DADFF2C72761D24EA1DAD9F9F91FD84714414DBCD0FF3C1B0D739B371029A742CD8C7BF6FBAFBF5605C2E51C69
2,950,115 UART: [art] PUB.Y = 115C260D5D873E43236F0B98E782A875FFF4D63BA44FAF0EEA42511551A67C03FE526FDE0041063E972C137848FF60AC
2,957,032 UART: [art] SIG.R = 089585407271E4BF49C24DAF849034C1AD835D5D70F04BB57489FC5CF06B696209B0D2247FEFFF9DF60FE7A908D8A0ED
2,963,800 UART: [art] SIG.S = B51BEC6EF859C9E613BF3A6BB6F690112D708A513B110CC6F8967BE519DCE3FBF36636A857069446091A2000AB4FECFA
2,987,206 UART: Caliptra RT
2,987,459 UART: [state] CFI Enabled
3,095,530 UART: [rt] RT listening for mailbox commands...
3,096,200 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,522 UART: [rt]cmd =0x434b4558, len=80
3,296,206 >>> mbox cmd response data (6280 bytes)
3,296,207 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,955 UART: [rt]cmd =0x414c544e, len=41
3,327,926 >>> mbox cmd response data (8 bytes)
3,327,927 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,950 UART: [rt]cmd =0x434b4558, len=80
3,526,572 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,803 UART: [state] LifecycleState = Unprovisioned
86,458 UART: [state] DebugLocked = No
87,140 UART: [state] WD Timer not started. Device not locked for debugging
88,413 UART: [kat] SHA2-256
891,963 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,092 UART: [kat] ++
896,244 UART: [kat] sha1
900,664 UART: [kat] SHA2-256
902,604 UART: [kat] SHA2-384
905,465 UART: [kat] SHA2-512-ACC
907,366 UART: [kat] ECC-384
917,125 UART: [kat] HMAC-384Kdf
921,843 UART: [kat] LMS
1,170,155 UART: [kat] --
1,171,242 UART: [cold-reset] ++
1,171,626 UART: [fht] FHT @ 0x50003400
1,174,252 UART: [idev] ++
1,174,420 UART: [idev] CDI.KEYID = 6
1,174,781 UART: [idev] SUBJECT.KEYID = 7
1,175,206 UART: [idev] UDS.KEYID = 0
1,175,552 ready_for_fw is high
1,175,552 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,242 UART: [idev] Erasing UDS.KEYID = 0
1,200,540 UART: [idev] Sha1 KeyId Algorithm
1,209,602 UART: [idev] --
1,210,661 UART: [ldev] ++
1,210,829 UART: [ldev] CDI.KEYID = 6
1,211,193 UART: [ldev] SUBJECT.KEYID = 5
1,211,620 UART: [ldev] AUTHORITY.KEYID = 7
1,212,083 UART: [ldev] FE.KEYID = 1
1,217,673 UART: [ldev] Erasing FE.KEYID = 1
1,244,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,961 UART: [ldev] --
1,284,469 UART: [fwproc] Wait for Commands...
1,285,182 UART: [fwproc] Recv command 0x46574c44
1,285,915 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,999 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,207 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,382 >>> mbox cmd response: success
2,776,463 UART: [afmc] ++
2,776,631 UART: [afmc] CDI.KEYID = 6
2,776,994 UART: [afmc] SUBJECT.KEYID = 7
2,777,420 UART: [afmc] AUTHORITY.KEYID = 5
2,813,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,005 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,756 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,485 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,368 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,087 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,062 UART: [afmc] --
2,857,060 UART: [cold-reset] --
2,857,850 UART: [state] Locking Datavault
2,859,107 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,711 UART: [state] Locking ICCM
2,860,145 UART: [exit] Launching FMC @ 0x40000130
2,865,474 UART:
2,865,490 UART: Running Caliptra FMC ...
2,865,898 UART:
2,866,041 UART: [state] CFI Enabled
2,876,796 UART: [fht] FMC Alias Private Key: 7
2,984,659 UART: [art] Extend RT PCRs Done
2,985,087 UART: [art] Lock RT PCRs Done
2,986,621 UART: [art] Populate DV Done
2,994,854 UART: [fht] FMC Alias Private Key: 7
2,995,838 UART: [art] Derive CDI
2,996,118 UART: [art] Store in in slot 0x4
3,081,873 UART: [art] Derive Key Pair
3,082,233 UART: [art] Store priv key in slot 0x5
3,095,965 UART: [art] Derive Key Pair - Done
3,110,797 UART: [art] Signing Cert with AUTHO
3,111,277 UART: RITY.KEYID = 7
3,126,407 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,172 UART: [art] PUB.X = 1A609C9460B42C25809680404148DCC717832E8D3FDFBD731DCBABFD522CBB2C42B0D39F8583F9BC24DCB97D2F1964F5
3,133,954 UART: [art] PUB.Y = 21E43D747F7A847F58B73FE1488FD7C06E85AB6152D17C1CB97CD31563CABF29CA04C5038A990501482AAB0CE5A370E3
3,140,897 UART: [art] SIG.R = C45EC7E9479ED7DD2D2EAFE251B043C305F38C384A10989D5965026164C56A6517BC799F429028998BD47983E4C10B94
3,147,654 UART: [art] SIG.S = 86B5EF001F773E3A1B5005166AC4C8D21B336AD84895BF8B2811797AB6DBD9605E07A296D63CDEBA676C82C2940C4985
3,171,718 UART: Caliptra RT
3,172,063 UART: [state] CFI Enabled
3,280,137 UART: [rt] RT listening for mailbox commands...
3,280,807 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,289 UART: [rt]cmd =0x434b4558, len=80
3,479,587 >>> mbox cmd response data (6280 bytes)
3,479,588 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,509,244 UART: [rt]cmd =0x414c544e, len=41
3,511,115 >>> mbox cmd response data (8 bytes)
3,511,116 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,541,041 UART: [rt]cmd =0x434b4558, len=80
3,709,141 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,217 ready_for_fw is high
1,057,217 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,014 >>> mbox cmd response: success
2,687,742 UART:
2,687,758 UART: Running Caliptra FMC ...
2,688,166 UART:
2,688,309 UART: [state] CFI Enabled
2,698,984 UART: [fht] FMC Alias Private Key: 7
2,806,823 UART: [art] Extend RT PCRs Done
2,807,251 UART: [art] Lock RT PCRs Done
2,808,985 UART: [art] Populate DV Done
2,817,208 UART: [fht] FMC Alias Private Key: 7
2,818,204 UART: [art] Derive CDI
2,818,484 UART: [art] Store in in slot 0x4
2,904,611 UART: [art] Derive Key Pair
2,904,971 UART: [art] Store priv key in slot 0x5
2,917,611 UART: [art] Derive Key Pair - Done
2,932,406 UART: [art] Signing Cert with AUTHO
2,932,886 UART: RITY.KEYID = 7
2,948,372 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,137 UART: [art] PUB.X = 5AE9A76925D8EAA72E340C19D09B0A6C6F798A4FD30724CCE7DAD70B2E275A7266A74F7DFFBF61259BE7373F0747638F
2,955,904 UART: [art] PUB.Y = F78EFBAB25B65380156AEE1B67ADE95F9879F138B70201A7E75FC8AF745135285093C1AE4E466851591AAE988EF84858
2,962,850 UART: [art] SIG.R = BA378EB8914E66241B3CD03B261E117CCB85F7D589C52EDF46BE1DCC4098B5DFE527025B940F4EEAFF73B3298E873D2A
2,969,630 UART: [art] SIG.S = E0249703749452EF04DDC70F74B28B22C2B622EE6485BBC22B9281835A6975D94A11ED78B54ACB6EEF1B979E77092900
2,993,193 UART: Caliptra RT
2,993,538 UART: [state] CFI Enabled
3,100,776 UART: [rt] RT listening for mailbox commands...
3,101,446 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,928 UART: [rt]cmd =0x434b4558, len=80
3,300,855 >>> mbox cmd response data (6280 bytes)
3,300,856 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,406 UART: [rt]cmd =0x414c544e, len=41
3,332,179 >>> mbox cmd response data (8 bytes)
3,332,180 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,127 UART: [rt]cmd =0x434b4558, len=80
3,531,556 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,790 UART: [state] LifecycleState = Unprovisioned
85,445 UART: [state] DebugLocked = No
85,981 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,697 UART: [kat] SHA2-256
881,628 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,743 UART: [kat] ++
885,895 UART: [kat] sha1
890,173 UART: [kat] SHA2-256
892,111 UART: [kat] SHA2-384
894,908 UART: [kat] SHA2-512-ACC
896,809 UART: [kat] ECC-384
902,218 UART: [kat] HMAC-384Kdf
906,858 UART: [kat] LMS
1,475,054 UART: [kat] --
1,476,083 UART: [cold-reset] ++
1,476,631 UART: [fht] Storing FHT @ 0x50003400
1,479,346 UART: [idev] ++
1,479,514 UART: [idev] CDI.KEYID = 6
1,479,874 UART: [idev] SUBJECT.KEYID = 7
1,480,298 UART: [idev] UDS.KEYID = 0
1,480,643 ready_for_fw is high
1,480,643 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,568 UART: [idev] Erasing UDS.KEYID = 0
1,504,776 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,326 UART: [idev] --
1,514,243 UART: [ldev] ++
1,514,411 UART: [ldev] CDI.KEYID = 6
1,514,774 UART: [ldev] SUBJECT.KEYID = 5
1,515,200 UART: [ldev] AUTHORITY.KEYID = 7
1,515,663 UART: [ldev] FE.KEYID = 1
1,520,785 UART: [ldev] Erasing FE.KEYID = 1
1,546,016 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,966 UART: [ldev] --
1,585,339 UART: [fwproc] Waiting for Commands...
1,586,188 UART: [fwproc] Received command 0x46574c44
1,586,979 UART: [fwproc] Received Image of size 114332 bytes
2,885,465 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,427 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,779 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,732 >>> mbox cmd response: success
3,078,944 UART: [afmc] ++
3,079,112 UART: [afmc] CDI.KEYID = 6
3,079,474 UART: [afmc] SUBJECT.KEYID = 7
3,079,899 UART: [afmc] AUTHORITY.KEYID = 5
3,114,762 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,024 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,804 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,532 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,417 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,107 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,904 UART: [afmc] --
3,157,950 UART: [cold-reset] --
3,158,928 UART: [state] Locking Datavault
3,160,075 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,679 UART: [state] Locking ICCM
3,161,249 UART: [exit] Launching FMC @ 0x40000130
3,166,578 UART:
3,166,594 UART: Running Caliptra FMC ...
3,167,002 UART:
3,167,056 UART: [state] CFI Enabled
3,177,137 UART: [fht] FMC Alias Private Key: 7
3,285,136 UART: [art] Extend RT PCRs Done
3,285,564 UART: [art] Lock RT PCRs Done
3,287,164 UART: [art] Populate DV Done
3,294,969 UART: [fht] FMC Alias Private Key: 7
3,296,003 UART: [art] Derive CDI
3,296,283 UART: [art] Store in in slot 0x4
3,381,702 UART: [art] Derive Key Pair
3,382,062 UART: [art] Store priv key in slot 0x5
3,394,562 UART: [art] Derive Key Pair - Done
3,409,201 UART: [art] Signing Cert with AUTHO
3,409,681 UART: RITY.KEYID = 7
3,424,571 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,336 UART: [art] PUB.X = CADA3E7974D11AAA5C0E244D24D6EB2F092D39CB35373C8FF472A117C72B773C66E5B71C80EEBBBDC21294A79950DC7C
3,432,118 UART: [art] PUB.Y = 57C0A0483E49B9217F2135D4A80F011FEDA3B348CF8CAB57F63BECC70AA00DFC483112EDCAFD83C2822717E27CA57586
3,439,070 UART: [art] SIG.R = F73776BD413C62877B76E452292FA453BA47A609FFFAD3A39A1DF1F8FF5435C125C7BE43BD2F1B4A0635C7C0B30BB610
3,445,843 UART: [art] SIG.S = 43EF90728E92095E3AF2A073A8F0E1307F7D58185B85408016B7E761AC02D41D86EFC5B8C827A3E06E15A800F5FB2EB2
3,470,096 UART: Caliptra RT
3,470,349 UART: [state] CFI Enabled
3,578,162 UART: [rt] RT listening for mailbox commands...
3,578,832 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,781 UART: [rt]cmd =0x414c544e, len=41
3,610,908 >>> mbox cmd response data (8 bytes)
3,610,909 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,660 UART: [rt]cmd =0x434b4558, len=80
3,812,043 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,401 ready_for_fw is high
1,362,401 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,142 >>> mbox cmd response: success
2,990,494 UART:
2,990,510 UART: Running Caliptra FMC ...
2,990,918 UART:
2,990,972 UART: [state] CFI Enabled
3,001,595 UART: [fht] FMC Alias Private Key: 7
3,109,962 UART: [art] Extend RT PCRs Done
3,110,390 UART: [art] Lock RT PCRs Done
3,111,980 UART: [art] Populate DV Done
3,120,113 UART: [fht] FMC Alias Private Key: 7
3,121,215 UART: [art] Derive CDI
3,121,495 UART: [art] Store in in slot 0x4
3,207,078 UART: [art] Derive Key Pair
3,207,438 UART: [art] Store priv key in slot 0x5
3,220,410 UART: [art] Derive Key Pair - Done
3,235,031 UART: [art] Signing Cert with AUTHO
3,235,511 UART: RITY.KEYID = 7
3,251,199 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,964 UART: [art] PUB.X = F008DA4264541C7DDD46E29AA262BA7690632FAEE77F36D3B71BBCD57B07B133FBDDDF5BF7D5A3C65A5C57AB8B9DA621
3,258,752 UART: [art] PUB.Y = CBAB1A4396339997101D7074B90A3F0986DA275632CAE69D92BA344D340EDEEFEF17A03B1CC081A4A4912863AF4F38CC
3,265,703 UART: [art] SIG.R = 5C1625F3D1CA74E8694D661B0D4FC47EF982438313F5A3E7F27E164A3A8F6E6F57D62EA3D6895512ABD7B3DF678F768E
3,272,478 UART: [art] SIG.S = 43C178EA07755B7EB3A8637103FB58D58B3B0F5BE993189E04E7B027FC5A78752FE757F8FD5BAF6228F6E79EB4DD9328
3,296,267 UART: Caliptra RT
3,296,520 UART: [state] CFI Enabled
3,404,486 UART: [rt] RT listening for mailbox commands...
3,405,156 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,199 UART: [rt]cmd =0x414c544e, len=41
3,437,168 >>> mbox cmd response data (8 bytes)
3,437,169 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,098 UART: [rt]cmd =0x434b4558, len=80
3,637,930 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,902 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,554 UART: [kat] SHA2-256
882,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,600 UART: [kat] ++
886,752 UART: [kat] sha1
891,092 UART: [kat] SHA2-256
893,030 UART: [kat] SHA2-384
895,763 UART: [kat] SHA2-512-ACC
897,664 UART: [kat] ECC-384
903,541 UART: [kat] HMAC-384Kdf
908,221 UART: [kat] LMS
1,476,417 UART: [kat] --
1,477,418 UART: [cold-reset] ++
1,477,996 UART: [fht] Storing FHT @ 0x50003400
1,480,611 UART: [idev] ++
1,480,779 UART: [idev] CDI.KEYID = 6
1,481,139 UART: [idev] SUBJECT.KEYID = 7
1,481,563 UART: [idev] UDS.KEYID = 0
1,481,908 ready_for_fw is high
1,481,908 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,393 UART: [idev] Erasing UDS.KEYID = 0
1,506,467 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,975 UART: [idev] --
1,516,026 UART: [ldev] ++
1,516,194 UART: [ldev] CDI.KEYID = 6
1,516,557 UART: [ldev] SUBJECT.KEYID = 5
1,516,983 UART: [ldev] AUTHORITY.KEYID = 7
1,517,446 UART: [ldev] FE.KEYID = 1
1,522,906 UART: [ldev] Erasing FE.KEYID = 1
1,548,319 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,217 UART: [ldev] --
1,587,500 UART: [fwproc] Waiting for Commands...
1,588,291 UART: [fwproc] Received command 0x46574c44
1,589,082 UART: [fwproc] Received Image of size 114332 bytes
2,887,382 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,142 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,494 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,259 >>> mbox cmd response: success
3,080,275 UART: [afmc] ++
3,080,443 UART: [afmc] CDI.KEYID = 6
3,080,805 UART: [afmc] SUBJECT.KEYID = 7
3,081,230 UART: [afmc] AUTHORITY.KEYID = 5
3,116,469 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,663 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,443 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,171 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,056 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,746 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,613 UART: [afmc] --
3,159,565 UART: [cold-reset] --
3,160,261 UART: [state] Locking Datavault
3,161,158 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,762 UART: [state] Locking ICCM
3,162,280 UART: [exit] Launching FMC @ 0x40000130
3,167,609 UART:
3,167,625 UART: Running Caliptra FMC ...
3,168,033 UART:
3,168,176 UART: [state] CFI Enabled
3,178,819 UART: [fht] FMC Alias Private Key: 7
3,286,972 UART: [art] Extend RT PCRs Done
3,287,400 UART: [art] Lock RT PCRs Done
3,288,890 UART: [art] Populate DV Done
3,297,401 UART: [fht] FMC Alias Private Key: 7
3,298,453 UART: [art] Derive CDI
3,298,733 UART: [art] Store in in slot 0x4
3,384,412 UART: [art] Derive Key Pair
3,384,772 UART: [art] Store priv key in slot 0x5
3,397,808 UART: [art] Derive Key Pair - Done
3,412,650 UART: [art] Signing Cert with AUTHO
3,413,130 UART: RITY.KEYID = 7
3,428,286 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,051 UART: [art] PUB.X = 942C8D43DED8C185DEBC214BF7AEBE5452F0CF044983AD3C19379BF745AFBF669B0131B808BA15E9A084E9E8F85D088C
3,435,825 UART: [art] PUB.Y = 3BCE76868A1300146B4E4D6DB94FB2E0AE6B296917973ECDCF0D2BEBAB2F15EFA01D640410B2A9A1A59F8FDFD6EB3213
3,442,769 UART: [art] SIG.R = D6565A1E5F788C860ED4DE1CFCF131627E86DE40EC7D974BA0C55C483EF8CB608E87D8B21C5C81108524CCF1A9EC4362
3,449,550 UART: [art] SIG.S = B5124B793235F6E37EC04A3626428347711007E48156BD0334C62E3DB84E7AB7092252365C260F5409069CCCA441CE6A
3,473,697 UART: Caliptra RT
3,474,042 UART: [state] CFI Enabled
3,582,954 UART: [rt] RT listening for mailbox commands...
3,583,624 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,827 UART: [rt]cmd =0x414c544e, len=41
3,615,916 >>> mbox cmd response data (8 bytes)
3,615,917 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,944 UART: [rt]cmd =0x434b4558, len=80
3,817,065 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,752 ready_for_fw is high
1,362,752 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,869 >>> mbox cmd response: success
2,989,737 UART:
2,989,753 UART: Running Caliptra FMC ...
2,990,161 UART:
2,990,304 UART: [state] CFI Enabled
3,000,665 UART: [fht] FMC Alias Private Key: 7
3,108,104 UART: [art] Extend RT PCRs Done
3,108,532 UART: [art] Lock RT PCRs Done
3,110,228 UART: [art] Populate DV Done
3,118,321 UART: [fht] FMC Alias Private Key: 7
3,119,381 UART: [art] Derive CDI
3,119,661 UART: [art] Store in in slot 0x4
3,204,894 UART: [art] Derive Key Pair
3,205,254 UART: [art] Store priv key in slot 0x5
3,219,220 UART: [art] Derive Key Pair - Done
3,233,776 UART: [art] Signing Cert with AUTHO
3,234,256 UART: RITY.KEYID = 7
3,249,452 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,217 UART: [art] PUB.X = 9165D78C011DF01E64AC7CBE2C9568BACDEA1E04C7F13B8F280F04E8DC22231A857215D14613A2BAFF83AC61348B764B
3,256,987 UART: [art] PUB.Y = 8D7DAA1F967FF51ECBBCF986A7951824165C4363B1F514E0C9DC6E849971BCB4369CC790A33E5F2659B6B7DCFEE5E27E
3,263,953 UART: [art] SIG.R = BF127D263FB057A238FD7DDA2FA4C0C9BA02C20A66321D8C431A40B2F8F6F8DB56EA0AF240170001D138B37ECB49D21C
3,270,705 UART: [art] SIG.S = 4EC1C912ED4CF4D034D55CD48E3AE82A3D96E97D6452F5026BB9545D657945970E76720F7A23C20E82E2C7C4817A9B5D
3,294,770 UART: Caliptra RT
3,295,115 UART: [state] CFI Enabled
3,403,052 UART: [rt] RT listening for mailbox commands...
3,403,722 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,657 UART: [rt]cmd =0x414c544e, len=41
3,435,766 >>> mbox cmd response data (8 bytes)
3,435,767 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,524 UART: [rt]cmd =0x434b4558, len=80
3,637,118 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
893,280 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,405 UART: [kat] ++
897,557 UART: [kat] sha1
901,823 UART: [kat] SHA2-256
903,763 UART: [kat] SHA2-384
906,394 UART: [kat] SHA2-512-ACC
908,295 UART: [kat] ECC-384
917,740 UART: [kat] HMAC-384Kdf
922,186 UART: [kat] LMS
1,170,514 UART: [kat] --
1,171,465 UART: [cold-reset] ++
1,171,979 UART: [fht] FHT @ 0x50003400
1,174,680 UART: [idev] ++
1,174,848 UART: [idev] CDI.KEYID = 6
1,175,208 UART: [idev] SUBJECT.KEYID = 7
1,175,632 UART: [idev] UDS.KEYID = 0
1,175,977 ready_for_fw is high
1,175,977 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,802 UART: [idev] Erasing UDS.KEYID = 0
1,200,261 UART: [idev] Sha1 KeyId Algorithm
1,208,911 UART: [idev] --
1,209,973 UART: [ldev] ++
1,210,141 UART: [ldev] CDI.KEYID = 6
1,210,504 UART: [ldev] SUBJECT.KEYID = 5
1,210,930 UART: [ldev] AUTHORITY.KEYID = 7
1,211,393 UART: [ldev] FE.KEYID = 1
1,216,741 UART: [ldev] Erasing FE.KEYID = 1
1,243,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,499 UART: [ldev] --
1,282,980 UART: [fwproc] Wait for Commands...
1,283,750 UART: [fwproc] Recv command 0x46574c44
1,284,478 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,480 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,784 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,667 >>> mbox cmd response: success
2,774,807 UART: [afmc] ++
2,774,975 UART: [afmc] CDI.KEYID = 6
2,775,337 UART: [afmc] SUBJECT.KEYID = 7
2,775,762 UART: [afmc] AUTHORITY.KEYID = 5
2,810,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,100 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,848 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,576 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,461 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,180 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,910 UART: [afmc] --
2,853,834 UART: [cold-reset] --
2,854,872 UART: [state] Locking Datavault
2,855,851 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,455 UART: [state] Locking ICCM
2,857,051 UART: [exit] Launching FMC @ 0x40000130
2,862,380 UART:
2,862,396 UART: Running Caliptra FMC ...
2,862,804 UART:
2,862,858 UART: [state] CFI Enabled
2,873,615 UART: [fht] FMC Alias Private Key: 7
2,981,496 UART: [art] Extend RT PCRs Done
2,981,924 UART: [art] Lock RT PCRs Done
2,983,240 UART: [art] Populate DV Done
2,991,471 UART: [fht] FMC Alias Private Key: 7
2,992,615 UART: [art] Derive CDI
2,992,895 UART: [art] Store in in slot 0x4
3,078,712 UART: [art] Derive Key Pair
3,079,072 UART: [art] Store priv key in slot 0x5
3,092,228 UART: [art] Derive Key Pair - Done
3,107,144 UART: [art] Signing Cert with AUTHO
3,107,624 UART: RITY.KEYID = 7
3,122,892 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,657 UART: [art] PUB.X = FE78B64F9DE3E074660045D54217C53F946EC75A5F5561EF89290DE04465ADA358A5CEA89F1CC1548C6CF9B923FBCD85
3,130,412 UART: [art] PUB.Y = 57720C5A4E2F8E8C8A04100049A900438073AEE0EE370214AAA6035E57EBCF4C888C70EA3ABBD9EA96251641A490C5FD
3,137,314 UART: [art] SIG.R = E15E6071AC3A0EFF0757C378DC761D7F14D3FB17A2EAF3BE232223F751E82227CD6A8C8801531DAA14F4C0461741E716
3,144,081 UART: [art] SIG.S = FB4E138D316B5C63736C618C2B69E883555FA8472908B59CB85A8B62563B175420BA0F71EFBCE384760EFD6C100EBA47
3,167,416 UART: Caliptra RT
3,167,669 UART: [state] CFI Enabled
3,276,785 UART: [rt] RT listening for mailbox commands...
3,277,455 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,760 UART: [rt]cmd =0x414c544e, len=41
3,309,695 >>> mbox cmd response data (8 bytes)
3,309,696 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,459 UART: [rt]cmd =0x434b4558, len=80
3,510,449 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,839 ready_for_fw is high
1,059,839 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,054 >>> mbox cmd response: success
2,689,136 UART:
2,689,152 UART: Running Caliptra FMC ...
2,689,560 UART:
2,689,614 UART: [state] CFI Enabled
2,700,529 UART: [fht] FMC Alias Private Key: 7
2,808,022 UART: [art] Extend RT PCRs Done
2,808,450 UART: [art] Lock RT PCRs Done
2,810,076 UART: [art] Populate DV Done
2,818,283 UART: [fht] FMC Alias Private Key: 7
2,819,385 UART: [art] Derive CDI
2,819,665 UART: [art] Store in in slot 0x4
2,905,490 UART: [art] Derive Key Pair
2,905,850 UART: [art] Store priv key in slot 0x5
2,919,442 UART: [art] Derive Key Pair - Done
2,933,935 UART: [art] Signing Cert with AUTHO
2,934,415 UART: RITY.KEYID = 7
2,949,341 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,106 UART: [art] PUB.X = 192D48E1557D0D31C0A8478183A27CAD5D2D4EDA54C1C808F4EF2FFC446D6A20A49244CAE9618C2EAE19B04E9E0ADC1E
2,956,885 UART: [art] PUB.Y = EC517763828B3B7A25D9163EF962C22C6CB534F9B5393748078B7EAECC4040BD66BBC8E997E50A23F8C1B53B5EFF0703
2,963,831 UART: [art] SIG.R = C33B3518F6A743445F80ECCF28F64A66ED1C4AB53C96EDD933FAA46BAC89253C0810F277A421744CB4B490E56C28E218
2,970,606 UART: [art] SIG.S = C332A4D9B00A8341B6D1B7B3D037D2159D8391A979EB913F685748890B509A6283DF8011E391361B85069F6A991AE2AC
2,994,266 UART: Caliptra RT
2,994,519 UART: [state] CFI Enabled
3,103,183 UART: [rt] RT listening for mailbox commands...
3,103,853 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,190 UART: [rt]cmd =0x414c544e, len=41
3,135,977 >>> mbox cmd response data (8 bytes)
3,135,978 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,949 UART: [rt]cmd =0x434b4558, len=80
3,336,971 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,408 UART: [state] WD Timer not started. Device not locked for debugging
87,527 UART: [kat] SHA2-256
893,177 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,302 UART: [kat] ++
897,454 UART: [kat] sha1
901,756 UART: [kat] SHA2-256
903,696 UART: [kat] SHA2-384
906,465 UART: [kat] SHA2-512-ACC
908,366 UART: [kat] ECC-384
917,679 UART: [kat] HMAC-384Kdf
922,469 UART: [kat] LMS
1,170,797 UART: [kat] --
1,171,868 UART: [cold-reset] ++
1,172,262 UART: [fht] FHT @ 0x50003400
1,174,913 UART: [idev] ++
1,175,081 UART: [idev] CDI.KEYID = 6
1,175,441 UART: [idev] SUBJECT.KEYID = 7
1,175,865 UART: [idev] UDS.KEYID = 0
1,176,210 ready_for_fw is high
1,176,210 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,043 UART: [idev] Erasing UDS.KEYID = 0
1,201,336 UART: [idev] Sha1 KeyId Algorithm
1,209,590 UART: [idev] --
1,210,620 UART: [ldev] ++
1,210,788 UART: [ldev] CDI.KEYID = 6
1,211,151 UART: [ldev] SUBJECT.KEYID = 5
1,211,577 UART: [ldev] AUTHORITY.KEYID = 7
1,212,040 UART: [ldev] FE.KEYID = 1
1,217,334 UART: [ldev] Erasing FE.KEYID = 1
1,243,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,518 UART: [ldev] --
1,282,905 UART: [fwproc] Wait for Commands...
1,283,631 UART: [fwproc] Recv command 0x46574c44
1,284,359 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,064 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,407 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,711 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,512 >>> mbox cmd response: success
2,775,588 UART: [afmc] ++
2,775,756 UART: [afmc] CDI.KEYID = 6
2,776,118 UART: [afmc] SUBJECT.KEYID = 7
2,776,543 UART: [afmc] AUTHORITY.KEYID = 5
2,812,180 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,751 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,499 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,227 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,112 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,831 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,551 UART: [afmc] --
2,855,653 UART: [cold-reset] --
2,856,353 UART: [state] Locking Datavault
2,857,434 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,038 UART: [state] Locking ICCM
2,858,546 UART: [exit] Launching FMC @ 0x40000130
2,863,875 UART:
2,863,891 UART: Running Caliptra FMC ...
2,864,299 UART:
2,864,442 UART: [state] CFI Enabled
2,874,887 UART: [fht] FMC Alias Private Key: 7
2,982,534 UART: [art] Extend RT PCRs Done
2,982,962 UART: [art] Lock RT PCRs Done
2,984,604 UART: [art] Populate DV Done
2,992,439 UART: [fht] FMC Alias Private Key: 7
2,993,379 UART: [art] Derive CDI
2,993,659 UART: [art] Store in in slot 0x4
3,079,544 UART: [art] Derive Key Pair
3,079,904 UART: [art] Store priv key in slot 0x5
3,092,428 UART: [art] Derive Key Pair - Done
3,107,192 UART: [art] Signing Cert with AUTHO
3,107,672 UART: RITY.KEYID = 7
3,122,924 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,689 UART: [art] PUB.X = F79E3A397398CA7EB04902420D78C83249D3EC20DE1065584808BC570339A4FD27DB275901B69C463E1D746EF9B1466A
3,130,440 UART: [art] PUB.Y = 0445965B6DD2C9F22B15015CDF7A15557C52BECE17441D86A3740B40F7365BE78BE83B1A0BC6B1C3B68C8EB200633AC8
3,137,364 UART: [art] SIG.R = B57682905CC855BCDF0CA926D2729C38716C0EF899D5E0FBE2FDD3058EEE77CA11E359C9D30833FE92E510D4E991B9E1
3,144,134 UART: [art] SIG.S = D608C8A0D72EEF8E7F2E5D41D95A41FAA05CC2DC03B9433B48F13EC93676EFC3FBB50AF5AA493A047952040926A1684D
3,168,135 UART: Caliptra RT
3,168,480 UART: [state] CFI Enabled
3,276,610 UART: [rt] RT listening for mailbox commands...
3,277,280 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,093 UART: [rt]cmd =0x414c544e, len=41
3,308,986 >>> mbox cmd response data (8 bytes)
3,308,987 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,820 UART: [rt]cmd =0x434b4558, len=80
3,509,607 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,046 ready_for_fw is high
1,061,046 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,125 >>> mbox cmd response: success
2,689,765 UART:
2,689,781 UART: Running Caliptra FMC ...
2,690,189 UART:
2,690,332 UART: [state] CFI Enabled
2,701,015 UART: [fht] FMC Alias Private Key: 7
2,809,088 UART: [art] Extend RT PCRs Done
2,809,516 UART: [art] Lock RT PCRs Done
2,811,098 UART: [art] Populate DV Done
2,819,437 UART: [fht] FMC Alias Private Key: 7
2,820,447 UART: [art] Derive CDI
2,820,727 UART: [art] Store in in slot 0x4
2,906,030 UART: [art] Derive Key Pair
2,906,390 UART: [art] Store priv key in slot 0x5
2,919,648 UART: [art] Derive Key Pair - Done
2,934,352 UART: [art] Signing Cert with AUTHO
2,934,832 UART: RITY.KEYID = 7
2,950,032 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,797 UART: [art] PUB.X = 9F962C210DBFD301837FE035A8B7D4F468FDF14697B8DA4E975B47B71DAD20458B72D555A9150B9FCE56060F91495A02
2,957,553 UART: [art] PUB.Y = E50B59D2551C47C2F38F8B0F010EA61B83EC763B7248EA2F62A792C4F4B9D81E7635B78697E45421511892F85E138393
2,964,485 UART: [art] SIG.R = DC3BACF4CF3C152402E986DB94F22578C588502B235BFA9EB47C3A5D2C87DE2425CFD30AB2C6DDA25E9FBD2FEC7673D7
2,971,273 UART: [art] SIG.S = 0254625B3B8D9CB0043F5F7D38DC1B009E5D66158CD7500680490568A7A444AFB6F1F8D9A83BC43225C21447EBC8C1C4
2,995,036 UART: Caliptra RT
2,995,381 UART: [state] CFI Enabled
3,103,220 UART: [rt] RT listening for mailbox commands...
3,103,890 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,841 UART: [rt]cmd =0x414c544e, len=41
3,135,760 >>> mbox cmd response data (8 bytes)
3,135,761 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,840 UART: [rt]cmd =0x434b4558, len=80
3,337,372 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,655 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [kat] SHA2-256
891,380 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,509 UART: [kat] ++
895,661 UART: [kat] sha1
899,963 UART: [kat] SHA2-256
901,903 UART: [kat] SHA2-384
904,636 UART: [kat] SHA2-512-ACC
906,537 UART: [kat] ECC-384
915,876 UART: [kat] HMAC-384Kdf
920,506 UART: [kat] LMS
1,168,818 UART: [kat] --
1,169,649 UART: [cold-reset] ++
1,170,033 UART: [fht] FHT @ 0x50003400
1,172,635 UART: [idev] ++
1,172,803 UART: [idev] CDI.KEYID = 6
1,173,164 UART: [idev] SUBJECT.KEYID = 7
1,173,589 UART: [idev] UDS.KEYID = 0
1,173,935 ready_for_fw is high
1,173,935 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,589 UART: [idev] Erasing UDS.KEYID = 0
1,198,063 UART: [idev] Sha1 KeyId Algorithm
1,207,083 UART: [idev] --
1,207,994 UART: [ldev] ++
1,208,162 UART: [ldev] CDI.KEYID = 6
1,208,526 UART: [ldev] SUBJECT.KEYID = 5
1,208,953 UART: [ldev] AUTHORITY.KEYID = 7
1,209,416 UART: [ldev] FE.KEYID = 1
1,214,430 UART: [ldev] Erasing FE.KEYID = 1
1,240,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,934 UART: [ldev] --
1,279,308 UART: [fwproc] Wait for Commands...
1,280,013 UART: [fwproc] Recv command 0x46574c44
1,280,746 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,680 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,989 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,933 >>> mbox cmd response: success
2,771,974 UART: [afmc] ++
2,772,142 UART: [afmc] CDI.KEYID = 6
2,772,505 UART: [afmc] SUBJECT.KEYID = 7
2,772,931 UART: [afmc] AUTHORITY.KEYID = 5
2,808,918 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,292 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,043 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,772 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,655 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,374 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,161 UART: [afmc] --
2,852,277 UART: [cold-reset] --
2,853,077 UART: [state] Locking Datavault
2,854,174 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,778 UART: [state] Locking ICCM
2,855,286 UART: [exit] Launching FMC @ 0x40000130
2,860,615 UART:
2,860,631 UART: Running Caliptra FMC ...
2,861,039 UART:
2,861,093 UART: [state] CFI Enabled
2,871,304 UART: [fht] FMC Alias Private Key: 7
2,979,405 UART: [art] Extend RT PCRs Done
2,979,833 UART: [art] Lock RT PCRs Done
2,981,233 UART: [art] Populate DV Done
2,989,518 UART: [fht] FMC Alias Private Key: 7
2,990,612 UART: [art] Derive CDI
2,990,892 UART: [art] Store in in slot 0x4
3,076,535 UART: [art] Derive Key Pair
3,076,895 UART: [art] Store priv key in slot 0x5
3,090,453 UART: [art] Derive Key Pair - Done
3,105,174 UART: [art] Signing Cert with AUTHO
3,105,654 UART: RITY.KEYID = 7
3,120,790 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,555 UART: [art] PUB.X = BA8F8AEF27C7D85EC28AF2B6544AE547E143CC84DFFDCFED582CAE4769CE7BBC38DE3CE5A3178DC6F7EFD28411609E51
3,128,355 UART: [art] PUB.Y = 6E574DEE54FD7EEDDE93A93DA7E09FD070B7C62A48F0F1064EA8020110A6FE6F00E499A59ED66E90623B6A989EEA2145
3,135,288 UART: [art] SIG.R = CA9D9FBD5A83FFDD405B139D57772297D34AD6488C375A62DE40596CC16063A5F563F65FFD72B734D802A619C024F98D
3,142,061 UART: [art] SIG.S = DFEBA9C31EE3A7ABED91CBC3CC5599517AB97ADACDE124BBEFA24C0C2FC62AED3A6A961AEF67FE5D5020302FAF1A103B
3,166,413 UART: Caliptra RT
3,166,666 UART: [state] CFI Enabled
3,274,128 UART: [rt] RT listening for mailbox commands...
3,274,798 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,065 UART: [rt]cmd =0x414c544e, len=41
3,306,820 >>> mbox cmd response data (8 bytes)
3,306,821 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,848 UART: [rt]cmd =0x434b4558, len=80
3,508,270 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,442 ready_for_fw is high
1,055,442 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,995 >>> mbox cmd response: success
2,684,699 UART:
2,684,715 UART: Running Caliptra FMC ...
2,685,123 UART:
2,685,177 UART: [state] CFI Enabled
2,695,630 UART: [fht] FMC Alias Private Key: 7
2,803,769 UART: [art] Extend RT PCRs Done
2,804,197 UART: [art] Lock RT PCRs Done
2,805,747 UART: [art] Populate DV Done
2,814,270 UART: [fht] FMC Alias Private Key: 7
2,815,208 UART: [art] Derive CDI
2,815,488 UART: [art] Store in in slot 0x4
2,900,767 UART: [art] Derive Key Pair
2,901,127 UART: [art] Store priv key in slot 0x5
2,914,175 UART: [art] Derive Key Pair - Done
2,929,300 UART: [art] Signing Cert with AUTHO
2,929,780 UART: RITY.KEYID = 7
2,944,956 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,721 UART: [art] PUB.X = 662ED2EC608E52DB6E149AE58F4D4A1C08421C7F68E74CEE4AFEDE6352D547F1AABD1AAFDFEE51DA4B8261409A02972F
2,952,509 UART: [art] PUB.Y = A6A44BF3B6C9FE15A12FD7A45FC72D078FC46AA1E2DB074F14758A92E9A386D8EDCB9F856632A805502004DD2F52EE37
2,959,461 UART: [art] SIG.R = 93490BEC20E10CAD62087A910A95F975EB6FDA5A486B9FDE0EBF90D5540DD0ED6A390866AEB0784A6BC4C329D3DBCC9C
2,966,232 UART: [art] SIG.S = 32B7D898104B0537F3C1325898BC63B805C6B70921D3F45F0293766D28E1B26394B17CAA90BF7D772FFD71BAE350CC63
2,989,939 UART: Caliptra RT
2,990,192 UART: [state] CFI Enabled
3,099,613 UART: [rt] RT listening for mailbox commands...
3,100,283 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,022 UART: [rt]cmd =0x414c544e, len=41
3,132,083 >>> mbox cmd response data (8 bytes)
3,132,084 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,189 UART: [rt]cmd =0x434b4558, len=80
3,332,735 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,537 UART: [kat] SHA2-256
891,087 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,216 UART: [kat] ++
895,368 UART: [kat] sha1
899,638 UART: [kat] SHA2-256
901,578 UART: [kat] SHA2-384
904,447 UART: [kat] SHA2-512-ACC
906,348 UART: [kat] ECC-384
916,395 UART: [kat] HMAC-384Kdf
921,055 UART: [kat] LMS
1,169,367 UART: [kat] --
1,170,160 UART: [cold-reset] ++
1,170,718 UART: [fht] FHT @ 0x50003400
1,173,306 UART: [idev] ++
1,173,474 UART: [idev] CDI.KEYID = 6
1,173,835 UART: [idev] SUBJECT.KEYID = 7
1,174,260 UART: [idev] UDS.KEYID = 0
1,174,606 ready_for_fw is high
1,174,606 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,402 UART: [idev] Erasing UDS.KEYID = 0
1,199,248 UART: [idev] Sha1 KeyId Algorithm
1,207,992 UART: [idev] --
1,209,057 UART: [ldev] ++
1,209,225 UART: [ldev] CDI.KEYID = 6
1,209,589 UART: [ldev] SUBJECT.KEYID = 5
1,210,016 UART: [ldev] AUTHORITY.KEYID = 7
1,210,479 UART: [ldev] FE.KEYID = 1
1,215,651 UART: [ldev] Erasing FE.KEYID = 1
1,241,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,317 UART: [ldev] --
1,280,653 UART: [fwproc] Wait for Commands...
1,281,264 UART: [fwproc] Recv command 0x46574c44
1,281,997 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,505 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,703 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,012 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,762 >>> mbox cmd response: success
2,772,941 UART: [afmc] ++
2,773,109 UART: [afmc] CDI.KEYID = 6
2,773,472 UART: [afmc] SUBJECT.KEYID = 7
2,773,898 UART: [afmc] AUTHORITY.KEYID = 5
2,809,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,198 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,927 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,810 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,529 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,264 UART: [afmc] --
2,852,208 UART: [cold-reset] --
2,853,244 UART: [state] Locking Datavault
2,854,553 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,157 UART: [state] Locking ICCM
2,855,787 UART: [exit] Launching FMC @ 0x40000130
2,861,116 UART:
2,861,132 UART: Running Caliptra FMC ...
2,861,540 UART:
2,861,683 UART: [state] CFI Enabled
2,872,336 UART: [fht] FMC Alias Private Key: 7
2,980,163 UART: [art] Extend RT PCRs Done
2,980,591 UART: [art] Lock RT PCRs Done
2,982,083 UART: [art] Populate DV Done
2,990,252 UART: [fht] FMC Alias Private Key: 7
2,991,292 UART: [art] Derive CDI
2,991,572 UART: [art] Store in in slot 0x4
3,077,475 UART: [art] Derive Key Pair
3,077,835 UART: [art] Store priv key in slot 0x5
3,091,123 UART: [art] Derive Key Pair - Done
3,106,099 UART: [art] Signing Cert with AUTHO
3,106,579 UART: RITY.KEYID = 7
3,121,507 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,272 UART: [art] PUB.X = ED33CE66146E3A9C5844F52496A93EAA1F1D4FB396B56BAA6384E435FA7713C3195F38137E1D8387C4AA21179C7E7E4A
3,129,048 UART: [art] PUB.Y = 6CB2B679455E9984A7EF68745B874DB44E2DF9D764A1D6F127A89180A536F0CF5F538AA7333FFC9ABC68882FF3EFDE3F
3,136,012 UART: [art] SIG.R = 5628A711F5C02F45B3772A492A08CD380FAA5F26B5264E7B68D31816547A2348736F9DCA19239C130C4FFAF814B799B0
3,142,771 UART: [art] SIG.S = CBDF2BAC0578C7DA6CEB416D372BF7EB11D6445DAB8DD99B775CA55B0A76306FDDDF0B1509A338B342D5FE7FEE1600BC
3,166,614 UART: Caliptra RT
3,166,959 UART: [state] CFI Enabled
3,274,570 UART: [rt] RT listening for mailbox commands...
3,275,240 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,351 UART: [rt]cmd =0x414c544e, len=41
3,307,324 >>> mbox cmd response data (8 bytes)
3,307,325 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,436 UART: [rt]cmd =0x434b4558, len=80
3,509,384 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,113 ready_for_fw is high
1,056,113 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,004 >>> mbox cmd response: success
2,685,758 UART:
2,685,774 UART: Running Caliptra FMC ...
2,686,182 UART:
2,686,325 UART: [state] CFI Enabled
2,697,168 UART: [fht] FMC Alias Private Key: 7
2,805,215 UART: [art] Extend RT PCRs Done
2,805,643 UART: [art] Lock RT PCRs Done
2,807,299 UART: [art] Populate DV Done
2,815,636 UART: [fht] FMC Alias Private Key: 7
2,816,590 UART: [art] Derive CDI
2,816,870 UART: [art] Store in in slot 0x4
2,902,771 UART: [art] Derive Key Pair
2,903,131 UART: [art] Store priv key in slot 0x5
2,916,241 UART: [art] Derive Key Pair - Done
2,931,170 UART: [art] Signing Cert with AUTHO
2,931,650 UART: RITY.KEYID = 7
2,946,860 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,625 UART: [art] PUB.X = 2DF01612D5779C8ED67D08AA9227E5E965EF93B3CE92F07DC4A15C2A552C86373AAEC3FF6EBF8C62831A535845F07631
2,954,400 UART: [art] PUB.Y = 696E65256A4761D4B03761D078F1318A0D37148FF0F47D87440921B46E64B46D9AC8555840DBC99DF494A1F84ACD1779
2,961,338 UART: [art] SIG.R = 7EC8D99AFED1CFB499FB2CBB5CC895087ED66E2C9B9E6B2D37CC96548C28B33ADB93F6510E0C7F6904B30535BD227371
2,968,109 UART: [art] SIG.S = 697ED0C2F7B0FBA9D1D22B9C810F08FE11FD325E6F3043832D5499B3B0824D68E6B1256C7BDBF475B527F44D75678547
2,991,948 UART: Caliptra RT
2,992,293 UART: [state] CFI Enabled
3,101,056 UART: [rt] RT listening for mailbox commands...
3,101,726 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,429 UART: [rt]cmd =0x414c544e, len=41
3,133,254 >>> mbox cmd response data (8 bytes)
3,133,255 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,134 UART: [rt]cmd =0x434b4558, len=80
3,334,632 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,485 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,055 UART: [kat] SHA2-256
881,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,101 UART: [kat] ++
886,253 UART: [kat] sha1
890,415 UART: [kat] SHA2-256
892,353 UART: [kat] SHA2-384
895,142 UART: [kat] SHA2-512-ACC
897,043 UART: [kat] ECC-384
902,648 UART: [kat] HMAC-384Kdf
907,082 UART: [kat] LMS
1,475,278 UART: [kat] --
1,476,181 UART: [cold-reset] ++
1,476,679 UART: [fht] Storing FHT @ 0x50003400
1,479,510 UART: [idev] ++
1,479,678 UART: [idev] CDI.KEYID = 6
1,480,038 UART: [idev] SUBJECT.KEYID = 7
1,480,462 UART: [idev] UDS.KEYID = 0
1,480,807 ready_for_fw is high
1,480,807 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,194 UART: [idev] Erasing UDS.KEYID = 0
1,504,810 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,668 UART: [idev] --
1,514,677 UART: [ldev] ++
1,514,845 UART: [ldev] CDI.KEYID = 6
1,515,208 UART: [ldev] SUBJECT.KEYID = 5
1,515,634 UART: [ldev] AUTHORITY.KEYID = 7
1,516,097 UART: [ldev] FE.KEYID = 1
1,521,275 UART: [ldev] Erasing FE.KEYID = 1
1,547,244 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,222 UART: [ldev] --
1,586,691 UART: [fwproc] Waiting for Commands...
1,587,498 UART: [fwproc] Received command 0x46574c44
1,588,289 UART: [fwproc] Received Image of size 114332 bytes
2,886,595 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,499 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,851 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,750 >>> mbox cmd response: success
3,079,984 UART: [afmc] ++
3,080,152 UART: [afmc] CDI.KEYID = 6
3,080,514 UART: [afmc] SUBJECT.KEYID = 7
3,080,939 UART: [afmc] AUTHORITY.KEYID = 5
3,116,024 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,370 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,150 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,878 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,763 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,453 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,146 UART: [afmc] --
3,159,246 UART: [cold-reset] --
3,160,302 UART: [state] Locking Datavault
3,161,315 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,919 UART: [state] Locking ICCM
3,162,433 UART: [exit] Launching FMC @ 0x40000130
3,167,762 UART:
3,167,778 UART: Running Caliptra FMC ...
3,168,186 UART:
3,168,240 UART: [state] CFI Enabled
3,178,703 UART: [fht] FMC Alias Private Key: 7
3,286,238 UART: [art] Extend RT PCRs Done
3,286,666 UART: [art] Lock RT PCRs Done
3,288,186 UART: [art] Populate DV Done
3,296,335 UART: [fht] FMC Alias Private Key: 7
3,297,409 UART: [art] Derive CDI
3,297,689 UART: [art] Store in in slot 0x4
3,383,308 UART: [art] Derive Key Pair
3,383,668 UART: [art] Store priv key in slot 0x5
3,396,436 UART: [art] Derive Key Pair - Done
3,411,299 UART: [art] Signing Cert with AUTHO
3,411,779 UART: RITY.KEYID = 7
3,426,969 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,734 UART: [art] PUB.X = BF33F7541BE567102B661D52173E6643DD4AC7C84FC8A72ADC40EC81F0CDD0E83160231A8DD36F6E08C011DDD6BA6F7C
3,434,517 UART: [art] PUB.Y = C716BEB87D3E858B7F086B64055A53D96FD9D1B7325B258DB7FC6D9AB40F0D1EF1C85A6C36E28DD2A7F71AC6B9F6AEB8
3,441,477 UART: [art] SIG.R = 4B8A34916C9C8D2C96F57BCFE0CDF5A1DC0FA505DA300E4FC0D814AF7B1F129613E27FBD66407975FC2AAF0BAE1F9BE9
3,448,261 UART: [art] SIG.S = 45F97CE422781C8A501A100BA90263C75926A291EE78E489F01700BDD57A568F30413B1C29F5212319AE21D6B15C0C6D
3,472,171 UART: Caliptra RT
3,472,424 UART: [state] CFI Enabled
3,580,178 UART: [rt] RT listening for mailbox commands...
3,580,848 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,506 UART: [rt]cmd =0x414c544e, len=20
3,611,744 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,429 ready_for_fw is high
1,362,429 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,324 >>> mbox cmd response: success
2,989,810 UART:
2,989,826 UART: Running Caliptra FMC ...
2,990,234 UART:
2,990,288 UART: [state] CFI Enabled
3,000,935 UART: [fht] FMC Alias Private Key: 7
3,109,464 UART: [art] Extend RT PCRs Done
3,109,892 UART: [art] Lock RT PCRs Done
3,111,338 UART: [art] Populate DV Done
3,119,443 UART: [fht] FMC Alias Private Key: 7
3,120,483 UART: [art] Derive CDI
3,120,763 UART: [art] Store in in slot 0x4
3,206,524 UART: [art] Derive Key Pair
3,206,884 UART: [art] Store priv key in slot 0x5
3,219,630 UART: [art] Derive Key Pair - Done
3,234,226 UART: [art] Signing Cert with AUTHO
3,234,706 UART: RITY.KEYID = 7
3,250,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,947 UART: [art] PUB.X = 6D7C9A2FADB022C69640478316B00A4100CE1FACA25A97DC73BDC41D126D38A5E96C2FE7EB8895879E9EF57946E75536
3,257,700 UART: [art] PUB.Y = 2A5393301EF6E68798EE69BEE6349E3970A5710566E6EE9979E1D4DC1C50B1040527B54C6EE536C535AC12542AD79D17
3,264,639 UART: [art] SIG.R = 6051E6418DCBBCB1C64F7EC26EE06E12A9B1A93BC024922A3A5166D02F889926ABCC2597112F0AFC27E08F1F9FF16F81
3,271,418 UART: [art] SIG.S = 238BA2881E675B53AD7127F4C333AB8EDDD5181B1711A8A8029D336120B845A5175F54207E538220D6F6CD9625B7C4E0
3,295,326 UART: Caliptra RT
3,295,579 UART: [state] CFI Enabled
3,404,141 UART: [rt] RT listening for mailbox commands...
3,404,811 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,527 UART: [rt]cmd =0x414c544e, len=20
3,435,939 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Unprovisioned
85,708 UART: [state] DebugLocked = No
86,266 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,856 UART: [kat] SHA2-256
881,787 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,902 UART: [kat] ++
886,054 UART: [kat] sha1
890,070 UART: [kat] SHA2-256
892,008 UART: [kat] SHA2-384
894,851 UART: [kat] SHA2-512-ACC
896,752 UART: [kat] ECC-384
902,503 UART: [kat] HMAC-384Kdf
907,315 UART: [kat] LMS
1,475,511 UART: [kat] --
1,476,430 UART: [cold-reset] ++
1,476,938 UART: [fht] Storing FHT @ 0x50003400
1,479,623 UART: [idev] ++
1,479,791 UART: [idev] CDI.KEYID = 6
1,480,151 UART: [idev] SUBJECT.KEYID = 7
1,480,575 UART: [idev] UDS.KEYID = 0
1,480,920 ready_for_fw is high
1,480,920 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,641 UART: [idev] Erasing UDS.KEYID = 0
1,505,841 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,505 UART: [idev] --
1,515,734 UART: [ldev] ++
1,515,902 UART: [ldev] CDI.KEYID = 6
1,516,265 UART: [ldev] SUBJECT.KEYID = 5
1,516,691 UART: [ldev] AUTHORITY.KEYID = 7
1,517,154 UART: [ldev] FE.KEYID = 1
1,522,234 UART: [ldev] Erasing FE.KEYID = 1
1,547,635 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,239 UART: [ldev] --
1,587,656 UART: [fwproc] Waiting for Commands...
1,588,469 UART: [fwproc] Received command 0x46574c44
1,589,260 UART: [fwproc] Received Image of size 114332 bytes
2,887,672 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,986 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,338 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,217 >>> mbox cmd response: success
3,081,249 UART: [afmc] ++
3,081,417 UART: [afmc] CDI.KEYID = 6
3,081,779 UART: [afmc] SUBJECT.KEYID = 7
3,082,204 UART: [afmc] AUTHORITY.KEYID = 5
3,117,183 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,321 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,101 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,829 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,714 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,404 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,125 UART: [afmc] --
3,160,169 UART: [cold-reset] --
3,161,241 UART: [state] Locking Datavault
3,162,442 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,046 UART: [state] Locking ICCM
3,163,592 UART: [exit] Launching FMC @ 0x40000130
3,168,921 UART:
3,168,937 UART: Running Caliptra FMC ...
3,169,345 UART:
3,169,488 UART: [state] CFI Enabled
3,180,029 UART: [fht] FMC Alias Private Key: 7
3,288,714 UART: [art] Extend RT PCRs Done
3,289,142 UART: [art] Lock RT PCRs Done
3,290,464 UART: [art] Populate DV Done
3,298,735 UART: [fht] FMC Alias Private Key: 7
3,299,813 UART: [art] Derive CDI
3,300,093 UART: [art] Store in in slot 0x4
3,386,010 UART: [art] Derive Key Pair
3,386,370 UART: [art] Store priv key in slot 0x5
3,399,448 UART: [art] Derive Key Pair - Done
3,414,209 UART: [art] Signing Cert with AUTHO
3,414,689 UART: RITY.KEYID = 7
3,429,767 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,532 UART: [art] PUB.X = 614D78E038C90A7C9E1FD65D0FB616775D5DDE7507D6EA05956E02496097F3C12507FF2BFDF39978234498F95E60A484
3,437,282 UART: [art] PUB.Y = 87D051A762E7F9DC9DE7614A4A33DD0335AA52990010D5F89A438BCFD45E10F8A91E29BCE81A682209DA9FBB692BD7F7
3,444,216 UART: [art] SIG.R = 7998EE407CD7923C6D12ABFF19E90B605928D8F9F2822CD107F0BB7A05DDB555882EEE39E0180B4BB8088E460F2C97E5
3,450,976 UART: [art] SIG.S = 11B3D07D87A04D7F23A2E9FD845D0D919EEAB11707807CB9D1C51A6A9BB571FDB2D2A01E022B83E202C356CF0783B745
3,475,006 UART: Caliptra RT
3,475,351 UART: [state] CFI Enabled
3,583,407 UART: [rt] RT listening for mailbox commands...
3,584,077 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,871 UART: [rt]cmd =0x414c544e, len=20
3,615,167 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,942 ready_for_fw is high
1,362,942 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,930,243 >>> mbox cmd response: success
2,992,139 UART:
2,992,155 UART: Running Caliptra FMC ...
2,992,563 UART:
2,992,706 UART: [state] CFI Enabled
3,003,731 UART: [fht] FMC Alias Private Key: 7
3,111,790 UART: [art] Extend RT PCRs Done
3,112,218 UART: [art] Lock RT PCRs Done
3,113,940 UART: [art] Populate DV Done
3,121,941 UART: [fht] FMC Alias Private Key: 7
3,122,959 UART: [art] Derive CDI
3,123,239 UART: [art] Store in in slot 0x4
3,209,182 UART: [art] Derive Key Pair
3,209,542 UART: [art] Store priv key in slot 0x5
3,222,942 UART: [art] Derive Key Pair - Done
3,237,806 UART: [art] Signing Cert with AUTHO
3,238,286 UART: RITY.KEYID = 7
3,253,772 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,537 UART: [art] PUB.X = 18F571ADAD09B060E786AB826A1E8EAE1941B3316BA0491423259A2AED540BD0E351ECACAE3D142B37B1A4D4F3EE4EDB
3,261,321 UART: [art] PUB.Y = E937EA83248E382619B2950467FC0149D49D0DE1DFD3E0FE340212BBDB8E48E15D55451E7633E660CCA5302894EC37CC
3,268,263 UART: [art] SIG.R = 0E7E5C22CA08A55D4A489F405C0EA1B46CA842C2D0C1D69992640564A112A0AF598D6B49B84BD28F508C046739BB50AF
3,275,024 UART: [art] SIG.S = 45667420F80642669406E854E73F6B3F230548AB5F5619E59BEA4B1C87A12F21513EF044703A4B1CBBDA859833E5B112
3,298,346 UART: Caliptra RT
3,298,691 UART: [state] CFI Enabled
3,406,079 UART: [rt] RT listening for mailbox commands...
3,406,749 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,597 UART: [rt]cmd =0x414c544e, len=20
3,437,835 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,280 UART: [kat] SHA2-256
892,930 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,055 UART: [kat] ++
897,207 UART: [kat] sha1
901,415 UART: [kat] SHA2-256
903,355 UART: [kat] SHA2-384
906,142 UART: [kat] SHA2-512-ACC
908,043 UART: [kat] ECC-384
918,152 UART: [kat] HMAC-384Kdf
922,712 UART: [kat] LMS
1,171,040 UART: [kat] --
1,172,067 UART: [cold-reset] ++
1,172,449 UART: [fht] FHT @ 0x50003400
1,175,100 UART: [idev] ++
1,175,268 UART: [idev] CDI.KEYID = 6
1,175,628 UART: [idev] SUBJECT.KEYID = 7
1,176,052 UART: [idev] UDS.KEYID = 0
1,176,397 ready_for_fw is high
1,176,397 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,898 UART: [idev] Erasing UDS.KEYID = 0
1,200,885 UART: [idev] Sha1 KeyId Algorithm
1,209,553 UART: [idev] --
1,210,547 UART: [ldev] ++
1,210,715 UART: [ldev] CDI.KEYID = 6
1,211,078 UART: [ldev] SUBJECT.KEYID = 5
1,211,504 UART: [ldev] AUTHORITY.KEYID = 7
1,211,967 UART: [ldev] FE.KEYID = 1
1,217,045 UART: [ldev] Erasing FE.KEYID = 1
1,243,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,633 UART: [ldev] --
1,282,922 UART: [fwproc] Wait for Commands...
1,283,666 UART: [fwproc] Recv command 0x46574c44
1,284,394 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,778 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,082 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,963 >>> mbox cmd response: success
2,775,029 UART: [afmc] ++
2,775,197 UART: [afmc] CDI.KEYID = 6
2,775,559 UART: [afmc] SUBJECT.KEYID = 7
2,775,984 UART: [afmc] AUTHORITY.KEYID = 5
2,811,665 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,772 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,500 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,385 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,104 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,844 UART: [afmc] --
2,854,788 UART: [cold-reset] --
2,855,720 UART: [state] Locking Datavault
2,856,737 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,341 UART: [state] Locking ICCM
2,857,999 UART: [exit] Launching FMC @ 0x40000130
2,863,328 UART:
2,863,344 UART: Running Caliptra FMC ...
2,863,752 UART:
2,863,806 UART: [state] CFI Enabled
2,874,115 UART: [fht] FMC Alias Private Key: 7
2,981,500 UART: [art] Extend RT PCRs Done
2,981,928 UART: [art] Lock RT PCRs Done
2,983,610 UART: [art] Populate DV Done
2,991,799 UART: [fht] FMC Alias Private Key: 7
2,992,979 UART: [art] Derive CDI
2,993,259 UART: [art] Store in in slot 0x4
3,079,046 UART: [art] Derive Key Pair
3,079,406 UART: [art] Store priv key in slot 0x5
3,092,424 UART: [art] Derive Key Pair - Done
3,106,954 UART: [art] Signing Cert with AUTHO
3,107,434 UART: RITY.KEYID = 7
3,122,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,303 UART: [art] PUB.X = 54BC62B1765F5FB49ACAE46D1D8AEB0CEA9B695BC86A622CC6899E92E43E9ED27B3F3DE2CECCB29EDE88D46ED7E3495B
3,130,100 UART: [art] PUB.Y = 159CE6A5E7498F7159FE5C00203C27326920F46B477B6D9DDFBE906409D6D68C56C2E5DD734B1EDBB3F6F98277F3E1D9
3,137,033 UART: [art] SIG.R = FB82F4ADB30A73095A974E1F9FCFDC13AF6A14B717D7647C68CD804862F37802728A997B693ED9B492FE86C70360D842
3,143,795 UART: [art] SIG.S = 03FF7CF7916036F6A84805746C3DF7996B3ADA021D799F69E52DDFB2A4D0C2B641597A281AE545768F9070E3110847F6
3,167,256 UART: Caliptra RT
3,167,509 UART: [state] CFI Enabled
3,275,728 UART: [rt] RT listening for mailbox commands...
3,276,398 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,160 UART: [rt]cmd =0x414c544e, len=20
3,307,394 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,737 ready_for_fw is high
1,059,737 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,034 >>> mbox cmd response: success
2,688,012 UART:
2,688,028 UART: Running Caliptra FMC ...
2,688,436 UART:
2,688,490 UART: [state] CFI Enabled
2,699,067 UART: [fht] FMC Alias Private Key: 7
2,806,918 UART: [art] Extend RT PCRs Done
2,807,346 UART: [art] Lock RT PCRs Done
2,808,794 UART: [art] Populate DV Done
2,817,001 UART: [fht] FMC Alias Private Key: 7
2,818,157 UART: [art] Derive CDI
2,818,437 UART: [art] Store in in slot 0x4
2,903,800 UART: [art] Derive Key Pair
2,904,160 UART: [art] Store priv key in slot 0x5
2,917,018 UART: [art] Derive Key Pair - Done
2,931,998 UART: [art] Signing Cert with AUTHO
2,932,478 UART: RITY.KEYID = 7
2,947,570 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,335 UART: [art] PUB.X = 1F829B7EFE66DEB283C03294F3B2FCAAB2B8B285CCF3D3566A32F681D331A43258FC21A452687BA3E8FD4F75F137743E
2,955,117 UART: [art] PUB.Y = F9722D6474FCE60DAF5D3A253BDF81A695696857B931180D27918C099401A53FE67489004889BC740B8DF764DF45944F
2,962,024 UART: [art] SIG.R = 1F4920C1ACC7F4E5F64CC9E5B09160F4600DEF3F5FD56EBDE8FA30B8C27A28088F2EAA2DBB44839E64F9429C490C8AF9
2,968,805 UART: [art] SIG.S = 176C0E8449BCCA290155B31CBCD2579AB1C873A3B8885850C8ED2780D57CA236D44F12636EB94AFE48395C69FB4DEBC8
2,992,722 UART: Caliptra RT
2,992,975 UART: [state] CFI Enabled
3,100,668 UART: [rt] RT listening for mailbox commands...
3,101,338 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,102 UART: [rt]cmd =0x414c544e, len=20
3,132,532 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,735 UART: [state] LifecycleState = Unprovisioned
86,390 UART: [state] DebugLocked = No
87,082 UART: [state] WD Timer not started. Device not locked for debugging
88,429 UART: [kat] SHA2-256
894,079 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,204 UART: [kat] ++
898,356 UART: [kat] sha1
902,824 UART: [kat] SHA2-256
904,764 UART: [kat] SHA2-384
907,521 UART: [kat] SHA2-512-ACC
909,422 UART: [kat] ECC-384
919,197 UART: [kat] HMAC-384Kdf
923,831 UART: [kat] LMS
1,172,159 UART: [kat] --
1,173,220 UART: [cold-reset] ++
1,173,794 UART: [fht] FHT @ 0x50003400
1,176,325 UART: [idev] ++
1,176,493 UART: [idev] CDI.KEYID = 6
1,176,853 UART: [idev] SUBJECT.KEYID = 7
1,177,277 UART: [idev] UDS.KEYID = 0
1,177,622 ready_for_fw is high
1,177,622 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,647 UART: [idev] Erasing UDS.KEYID = 0
1,202,660 UART: [idev] Sha1 KeyId Algorithm
1,210,974 UART: [idev] --
1,211,936 UART: [ldev] ++
1,212,104 UART: [ldev] CDI.KEYID = 6
1,212,467 UART: [ldev] SUBJECT.KEYID = 5
1,212,893 UART: [ldev] AUTHORITY.KEYID = 7
1,213,356 UART: [ldev] FE.KEYID = 1
1,218,650 UART: [ldev] Erasing FE.KEYID = 1
1,244,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,264 UART: [ldev] --
1,283,753 UART: [fwproc] Wait for Commands...
1,284,327 UART: [fwproc] Recv command 0x46574c44
1,285,055 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,572 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,869 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,044 >>> mbox cmd response: success
2,776,128 UART: [afmc] ++
2,776,296 UART: [afmc] CDI.KEYID = 6
2,776,658 UART: [afmc] SUBJECT.KEYID = 7
2,777,083 UART: [afmc] AUTHORITY.KEYID = 5
2,812,976 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,281 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,029 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,757 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,642 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,361 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,259 UART: [afmc] --
2,856,375 UART: [cold-reset] --
2,857,281 UART: [state] Locking Datavault
2,858,562 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,166 UART: [state] Locking ICCM
2,859,832 UART: [exit] Launching FMC @ 0x40000130
2,865,161 UART:
2,865,177 UART: Running Caliptra FMC ...
2,865,585 UART:
2,865,728 UART: [state] CFI Enabled
2,876,433 UART: [fht] FMC Alias Private Key: 7
2,984,628 UART: [art] Extend RT PCRs Done
2,985,056 UART: [art] Lock RT PCRs Done
2,986,324 UART: [art] Populate DV Done
2,994,557 UART: [fht] FMC Alias Private Key: 7
2,995,715 UART: [art] Derive CDI
2,995,995 UART: [art] Store in in slot 0x4
3,081,652 UART: [art] Derive Key Pair
3,082,012 UART: [art] Store priv key in slot 0x5
3,095,914 UART: [art] Derive Key Pair - Done
3,110,538 UART: [art] Signing Cert with AUTHO
3,111,018 UART: RITY.KEYID = 7
3,126,076 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,841 UART: [art] PUB.X = 67F9FD317E5BCFA6E43050AB6E945AEABA4074573C479B78E24789B3F2B73B43446DD2A1CD658D9C54270B6E688EF61A
3,133,618 UART: [art] PUB.Y = 219F959ECD5ADD362F2CA6A02F3A242AD886848859525AD476C29B1E6CAB205ED03788E13A73A829859356E9CA495B83
3,140,570 UART: [art] SIG.R = A9EFFECAC07AA1F131DAFECDFA41C711B69CA2A960662E013ED4767ACE0043AC98117E7EB6E6DDBC776D900C442B2E52
3,147,338 UART: [art] SIG.S = A08243BB66757BA229A4E79E158DD83B9B1C556D13B38AEDB9D0720F9E5FC7274959184C31F24856AD1F80669968AAE0
3,170,676 UART: Caliptra RT
3,171,021 UART: [state] CFI Enabled
3,277,819 UART: [rt] RT listening for mailbox commands...
3,278,489 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,421 UART: [rt]cmd =0x414c544e, len=20
3,309,759 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,776 ready_for_fw is high
1,060,776 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,629,077 >>> mbox cmd response: success
2,691,749 UART:
2,691,765 UART: Running Caliptra FMC ...
2,692,173 UART:
2,692,316 UART: [state] CFI Enabled
2,702,895 UART: [fht] FMC Alias Private Key: 7
2,810,880 UART: [art] Extend RT PCRs Done
2,811,308 UART: [art] Lock RT PCRs Done
2,812,932 UART: [art] Populate DV Done
2,821,169 UART: [fht] FMC Alias Private Key: 7
2,822,225 UART: [art] Derive CDI
2,822,505 UART: [art] Store in in slot 0x4
2,907,888 UART: [art] Derive Key Pair
2,908,248 UART: [art] Store priv key in slot 0x5
2,921,546 UART: [art] Derive Key Pair - Done
2,936,260 UART: [art] Signing Cert with AUTHO
2,936,740 UART: RITY.KEYID = 7
2,952,214 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,979 UART: [art] PUB.X = 15A71DC4884015C14FDCEA3E02D21B8D3A92E92B5A56C3D107FBBA8BF8E4719167F2EBEAE5CC1318F814825C3EED3E02
2,959,758 UART: [art] PUB.Y = 9D38CEDA5673EB7F9FA4ED8CF7D2B20C60FF3DF16BF8620E9F1F2EDF6F3F476F90A39B93C7630F2AF1AC660A081EC6A4
2,966,719 UART: [art] SIG.R = 327559FEA2EEF017B901383B2503B5AD59C876CFFD445947F1A70726E1CFC3C29B7F8711A43E1A67AF98660D19007D3F
2,973,459 UART: [art] SIG.S = 6D1BB5701D76E6F2625161F7B73CC1834CE4259755C03B521C23195E611D8BF3B81A398A6EA54507425009916000FC59
2,997,348 UART: Caliptra RT
2,997,693 UART: [state] CFI Enabled
3,105,956 UART: [rt] RT listening for mailbox commands...
3,106,626 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,646 UART: [rt]cmd =0x414c544e, len=20
3,137,962 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
891,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,361 UART: [kat] ++
895,513 UART: [kat] sha1
899,807 UART: [kat] SHA2-256
901,747 UART: [kat] SHA2-384
904,330 UART: [kat] SHA2-512-ACC
906,231 UART: [kat] ECC-384
915,810 UART: [kat] HMAC-384Kdf
920,442 UART: [kat] LMS
1,168,754 UART: [kat] --
1,169,771 UART: [cold-reset] ++
1,170,143 UART: [fht] FHT @ 0x50003400
1,172,883 UART: [idev] ++
1,173,051 UART: [idev] CDI.KEYID = 6
1,173,412 UART: [idev] SUBJECT.KEYID = 7
1,173,837 UART: [idev] UDS.KEYID = 0
1,174,183 ready_for_fw is high
1,174,183 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,385 UART: [idev] Erasing UDS.KEYID = 0
1,198,399 UART: [idev] Sha1 KeyId Algorithm
1,207,147 UART: [idev] --
1,208,248 UART: [ldev] ++
1,208,416 UART: [ldev] CDI.KEYID = 6
1,208,780 UART: [ldev] SUBJECT.KEYID = 5
1,209,207 UART: [ldev] AUTHORITY.KEYID = 7
1,209,670 UART: [ldev] FE.KEYID = 1
1,214,776 UART: [ldev] Erasing FE.KEYID = 1
1,240,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,716 UART: [ldev] --
1,280,142 UART: [fwproc] Wait for Commands...
1,280,733 UART: [fwproc] Recv command 0x46574c44
1,281,466 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,248 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,252 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,561 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,441 >>> mbox cmd response: success
2,774,510 UART: [afmc] ++
2,774,678 UART: [afmc] CDI.KEYID = 6
2,775,041 UART: [afmc] SUBJECT.KEYID = 7
2,775,467 UART: [afmc] AUTHORITY.KEYID = 5
2,810,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,576 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,327 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,056 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,939 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,658 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,509 UART: [afmc] --
2,854,591 UART: [cold-reset] --
2,855,617 UART: [state] Locking Datavault
2,856,790 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,394 UART: [state] Locking ICCM
2,857,970 UART: [exit] Launching FMC @ 0x40000130
2,863,299 UART:
2,863,315 UART: Running Caliptra FMC ...
2,863,723 UART:
2,863,777 UART: [state] CFI Enabled
2,874,290 UART: [fht] FMC Alias Private Key: 7
2,982,347 UART: [art] Extend RT PCRs Done
2,982,775 UART: [art] Lock RT PCRs Done
2,984,079 UART: [art] Populate DV Done
2,992,084 UART: [fht] FMC Alias Private Key: 7
2,993,062 UART: [art] Derive CDI
2,993,342 UART: [art] Store in in slot 0x4
3,079,375 UART: [art] Derive Key Pair
3,079,735 UART: [art] Store priv key in slot 0x5
3,092,945 UART: [art] Derive Key Pair - Done
3,107,834 UART: [art] Signing Cert with AUTHO
3,108,314 UART: RITY.KEYID = 7
3,123,572 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,337 UART: [art] PUB.X = 8F4E536BD3B9D08E43ADF21AF8727101351A53EBF31F5F1E6E3F708B2556BA2002A516F8787E38F3536B2CEED76BE5D5
3,131,111 UART: [art] PUB.Y = ADFD6CC862D15D4A2BD2991FCD4E7F0775765E7C965F7A97A147AAEC67B6D54C2C24755E1B652909A36B7415B44850DF
3,138,065 UART: [art] SIG.R = 754A4394225B2EA24A8AA5089F114CE6812A145E5CF89E09D18B9592F593AD177E5F3F8B2892A3CAD60DDBADB97D322E
3,144,836 UART: [art] SIG.S = F6B741D05A31E4ACC343AB1524EEA739AFFE3F9D9C858AC195A0F91BB4B56C18233682ED95BF211DC158147161132CED
3,169,435 UART: Caliptra RT
3,169,688 UART: [state] CFI Enabled
3,278,013 UART: [rt] RT listening for mailbox commands...
3,278,683 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,123 UART: [rt]cmd =0x414c544e, len=20
3,309,607 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,238 ready_for_fw is high
1,056,238 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,239 >>> mbox cmd response: success
2,684,887 UART:
2,684,903 UART: Running Caliptra FMC ...
2,685,311 UART:
2,685,365 UART: [state] CFI Enabled
2,695,938 UART: [fht] FMC Alias Private Key: 7
2,804,441 UART: [art] Extend RT PCRs Done
2,804,869 UART: [art] Lock RT PCRs Done
2,806,291 UART: [art] Populate DV Done
2,814,456 UART: [fht] FMC Alias Private Key: 7
2,815,540 UART: [art] Derive CDI
2,815,820 UART: [art] Store in in slot 0x4
2,901,555 UART: [art] Derive Key Pair
2,901,915 UART: [art] Store priv key in slot 0x5
2,914,887 UART: [art] Derive Key Pair - Done
2,929,836 UART: [art] Signing Cert with AUTHO
2,930,316 UART: RITY.KEYID = 7
2,945,296 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,061 UART: [art] PUB.X = 53E12CC54A4D1926E9977A2DDE0DF05CF21689D3253377D40FF4A4DF7B986DC0D15622B5F0130A988E37F7636084FF33
2,952,824 UART: [art] PUB.Y = 321A3175335ECCAE350FDAE92024EED4320B8749471501788DBD1E7D100CB77509B604363F27D77AE698BC7CC69008FF
2,959,755 UART: [art] SIG.R = 4332C8E647212F7B8C81195600BE73483D7C4AF3AADE5B16191AE6B96523ED2F30315884BD22DCF9D829B3663D0EAD79
2,966,504 UART: [art] SIG.S = B7B5C3F996BDEB609EF2FCCD5134671CD220460B6E921D3EA9A8B044A8A3B6CB9B3120F18F285B152BE3EDB04A6592E6
2,989,466 UART: Caliptra RT
2,989,719 UART: [state] CFI Enabled
3,097,596 UART: [rt] RT listening for mailbox commands...
3,098,266 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,154 UART: [rt]cmd =0x414c544e, len=20
3,129,432 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
891,645 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,774 UART: [kat] ++
895,926 UART: [kat] sha1
900,086 UART: [kat] SHA2-256
902,026 UART: [kat] SHA2-384
904,903 UART: [kat] SHA2-512-ACC
906,804 UART: [kat] ECC-384
916,269 UART: [kat] HMAC-384Kdf
920,987 UART: [kat] LMS
1,169,299 UART: [kat] --
1,169,974 UART: [cold-reset] ++
1,170,474 UART: [fht] FHT @ 0x50003400
1,172,968 UART: [idev] ++
1,173,136 UART: [idev] CDI.KEYID = 6
1,173,497 UART: [idev] SUBJECT.KEYID = 7
1,173,922 UART: [idev] UDS.KEYID = 0
1,174,268 ready_for_fw is high
1,174,268 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,900 UART: [idev] Erasing UDS.KEYID = 0
1,198,500 UART: [idev] Sha1 KeyId Algorithm
1,207,358 UART: [idev] --
1,208,455 UART: [ldev] ++
1,208,623 UART: [ldev] CDI.KEYID = 6
1,208,987 UART: [ldev] SUBJECT.KEYID = 5
1,209,414 UART: [ldev] AUTHORITY.KEYID = 7
1,209,877 UART: [ldev] FE.KEYID = 1
1,215,455 UART: [ldev] Erasing FE.KEYID = 1
1,242,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,205 UART: [ldev] --
1,281,595 UART: [fwproc] Wait for Commands...
1,282,388 UART: [fwproc] Recv command 0x46574c44
1,283,121 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,037 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,346 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,070 >>> mbox cmd response: success
2,772,171 UART: [afmc] ++
2,772,339 UART: [afmc] CDI.KEYID = 6
2,772,702 UART: [afmc] SUBJECT.KEYID = 7
2,773,128 UART: [afmc] AUTHORITY.KEYID = 5
2,809,289 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,601 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,352 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,081 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,964 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,683 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,660 UART: [afmc] --
2,852,700 UART: [cold-reset] --
2,853,686 UART: [state] Locking Datavault
2,854,677 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,281 UART: [state] Locking ICCM
2,855,939 UART: [exit] Launching FMC @ 0x40000130
2,861,268 UART:
2,861,284 UART: Running Caliptra FMC ...
2,861,692 UART:
2,861,835 UART: [state] CFI Enabled
2,872,354 UART: [fht] FMC Alias Private Key: 7
2,981,151 UART: [art] Extend RT PCRs Done
2,981,579 UART: [art] Lock RT PCRs Done
2,983,117 UART: [art] Populate DV Done
2,991,292 UART: [fht] FMC Alias Private Key: 7
2,992,330 UART: [art] Derive CDI
2,992,610 UART: [art] Store in in slot 0x4
3,078,373 UART: [art] Derive Key Pair
3,078,733 UART: [art] Store priv key in slot 0x5
3,092,211 UART: [art] Derive Key Pair - Done
3,107,003 UART: [art] Signing Cert with AUTHO
3,107,483 UART: RITY.KEYID = 7
3,122,431 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,196 UART: [art] PUB.X = C35A9C3E43EA5ABEFB184FF91FDA3343CC3A05B153900CBCD9103D292B96CC74036085DD5996DA35863E83579C3F7621
3,129,965 UART: [art] PUB.Y = 94AD538F77A03F9AC2F6A9CBB2626D21C0961E7A9A0FC4C045E29410653CDBA2029D6D71FDC293781C3412D6E0643C5E
3,136,917 UART: [art] SIG.R = C4595623AF8EF2BC3D637A5B388006DEE4D2838896815CCC35DF64920C1FD6CD4A7A0AE7D0D8871FA7EFE00A147A7D71
3,143,689 UART: [art] SIG.S = 6D925E432C47545200D5A45BEEFAA463D1B49BE5EFAD2A1F96EDEC1B16BF53D59B9673F82A00C20ACE2A80076842AA51
3,167,190 UART: Caliptra RT
3,167,535 UART: [state] CFI Enabled
3,275,386 UART: [rt] RT listening for mailbox commands...
3,276,056 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,012 UART: [rt]cmd =0x414c544e, len=20
3,307,552 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,403 ready_for_fw is high
1,056,403 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,852 >>> mbox cmd response: success
2,682,954 UART:
2,682,970 UART: Running Caliptra FMC ...
2,683,378 UART:
2,683,521 UART: [state] CFI Enabled
2,693,910 UART: [fht] FMC Alias Private Key: 7
2,802,775 UART: [art] Extend RT PCRs Done
2,803,203 UART: [art] Lock RT PCRs Done
2,805,005 UART: [art] Populate DV Done
2,813,270 UART: [fht] FMC Alias Private Key: 7
2,814,398 UART: [art] Derive CDI
2,814,678 UART: [art] Store in in slot 0x4
2,900,725 UART: [art] Derive Key Pair
2,901,085 UART: [art] Store priv key in slot 0x5
2,914,401 UART: [art] Derive Key Pair - Done
2,929,113 UART: [art] Signing Cert with AUTHO
2,929,593 UART: RITY.KEYID = 7
2,944,649 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,414 UART: [art] PUB.X = EFE7CCDB7E9C8E5C687EFBA28CD78FDB00CAADB03F1D1C43FA31BC6D6F7773B46A6E6DE2E64DB49667869152670C689B
2,952,185 UART: [art] PUB.Y = 58A125BC0DA898E651615330A59AC53FBA30C770C55BCDA9531C13A0CD0F3A732FA3A4EA3098882DDF21FD395956E3B2
2,959,139 UART: [art] SIG.R = 024AAAA36ED0EE8EDEB0CE858677D04F129117DD17CF973F5BBC6C77CC2AB80BF231C27C0EF46C2330D4B20A1218FB3E
2,965,919 UART: [art] SIG.S = 73AEFD1DE68ADF69F68BB754E25DBC0FE3B9782509CAD4A290CC3AB5781AD40F4FCF9942350C9E97477510C2E28E0D31
2,989,371 UART: Caliptra RT
2,989,716 UART: [state] CFI Enabled
3,097,473 UART: [rt] RT listening for mailbox commands...
3,098,143 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,311 UART: [rt]cmd =0x414c544e, len=20
3,129,773 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
Truncated 5006 bytes from beginning
701868719C9BA1C55329B46C0F9031C1F54D6
3,437,307 UART: [art] PUB.Y = 1A7A0E24C49BCB0353F8CD6F709524714F46342E0D7E7F6E3C17C9C794A8666059E54B39CDC8D48B92774429C23EB025
3,444,248 UART: [art] SIG.R = B427AC529E2C2E1E9AD43AF7CFFB7339476453FE9F3C9126AC97ADE197F2E2728EEF5FC3D65036DC04D4F2515C51977F
3,451,029 UART: [art] SIG.S = EB4AE1CB341CAFCDCBFDE786611516F78F57740373FD7124F0F75B938BD714D7BE31B9AFF4D6623D61CBA0D80C5648EA
3,473,954 UART: Caliptra RT
3,474,207 UART: [state] CFI Enabled
3,594,785 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,857 UART: [rt]cmd =0x44504543, len=92
3,816,663 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,401 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,079 UART: [kat] SHA2-256
882,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,125 UART: [kat] ++
886,277 UART: [kat] sha1
890,727 UART: [kat] SHA2-256
892,665 UART: [kat] SHA2-384
895,470 UART: [kat] SHA2-512-ACC
897,371 UART: [kat] ECC-384
903,030 UART: [kat] HMAC-384Kdf
907,816 UART: [kat] LMS
1,476,012 UART: [kat] --
1,476,873 UART: [cold-reset] ++
1,477,207 UART: [fht] Storing FHT @ 0x50003400
1,479,994 UART: [idev] ++
1,480,162 UART: [idev] CDI.KEYID = 6
1,480,522 UART: [idev] SUBJECT.KEYID = 7
1,480,946 UART: [idev] UDS.KEYID = 0
1,481,291 ready_for_fw is high
1,481,291 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,618 UART: [idev] Erasing UDS.KEYID = 0
1,505,234 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,896 UART: [idev] --
1,514,955 UART: [ldev] ++
1,515,123 UART: [ldev] CDI.KEYID = 6
1,515,486 UART: [ldev] SUBJECT.KEYID = 5
1,515,912 UART: [ldev] AUTHORITY.KEYID = 7
1,516,375 UART: [ldev] FE.KEYID = 1
1,521,625 UART: [ldev] Erasing FE.KEYID = 1
1,546,620 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,918 UART: [ldev] --
1,586,393 UART: [fwproc] Waiting for Commands...
1,587,108 UART: [fwproc] Received command 0x46574c44
1,587,899 UART: [fwproc] Received Image of size 114332 bytes
2,885,489 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,521 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,873 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,634 >>> mbox cmd response: success
3,077,634 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,078,726 UART: [afmc] ++
3,078,894 UART: [afmc] CDI.KEYID = 6
3,079,256 UART: [afmc] SUBJECT.KEYID = 7
3,079,681 UART: [afmc] AUTHORITY.KEYID = 5
3,114,842 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,448 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,228 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,956 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,841 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,531 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,314 UART: [afmc] --
3,158,254 UART: [cold-reset] --
3,159,038 UART: [state] Locking Datavault
3,160,217 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,821 UART: [state] Locking ICCM
3,161,375 UART: [exit] Launching FMC @ 0x40000130
3,166,704 UART:
3,166,720 UART: Running Caliptra FMC ...
3,167,128 UART:
3,167,182 UART: [state] CFI Enabled
3,177,601 UART: [fht] FMC Alias Private Key: 7
3,285,382 UART: [art] Extend RT PCRs Done
3,285,810 UART: [art] Lock RT PCRs Done
3,287,514 UART: [art] Populate DV Done
3,295,821 UART: [fht] FMC Alias Private Key: 7
3,296,903 UART: [art] Derive CDI
3,297,183 UART: [art] Store in in slot 0x4
3,382,870 UART: [art] Derive Key Pair
3,383,230 UART: [art] Store priv key in slot 0x5
3,396,556 UART: [art] Derive Key Pair - Done
3,411,381 UART: [art] Signing Cert with AUTHO
3,411,861 UART: RITY.KEYID = 7
3,426,853 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,618 UART: [art] PUB.X = B4A987524DAB62D86B884F534AF05718EDC7E22D537A3D29F24CB6941F3701868719C9BA1C55329B46C0F9031C1F54D6
3,434,382 UART: [art] PUB.Y = 1A7A0E24C49BCB0353F8CD6F709524714F46342E0D7E7F6E3C17C9C794A8666059E54B39CDC8D48B92774429C23EB025
3,441,323 UART: [art] SIG.R = B427AC529E2C2E1E9AD43AF7CFFB7339476453FE9F3C9126AC97ADE197F2E2728EEF5FC3D65036DC04D4F2515C51977F
3,448,104 UART: [art] SIG.S = EB4AE1CB341CAFCDCBFDE786611516F78F57740373FD7124F0F75B938BD714D7BE31B9AFF4D6623D61CBA0D80C5648EA
3,472,247 UART: Caliptra RT
3,472,500 UART: [state] CFI Enabled
3,579,954 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,302 UART: [rt]cmd =0x4d454153, len=108
3,631,761 >>> mbox cmd response data (12 bytes)
3,631,762 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,885 UART: [rt]cmd =0x44504543, len=92
3,853,321 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,391 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,011 UART: [kat] SHA2-256
881,942 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,057 UART: [kat] ++
886,209 UART: [kat] sha1
890,387 UART: [kat] SHA2-256
892,325 UART: [kat] SHA2-384
895,072 UART: [kat] SHA2-512-ACC
896,973 UART: [kat] ECC-384
902,418 UART: [kat] HMAC-384Kdf
906,976 UART: [kat] LMS
1,475,172 UART: [kat] --
1,475,961 UART: [cold-reset] ++
1,476,445 UART: [fht] Storing FHT @ 0x50003400
1,479,126 UART: [idev] ++
1,479,294 UART: [idev] CDI.KEYID = 6
1,479,654 UART: [idev] SUBJECT.KEYID = 7
1,480,078 UART: [idev] UDS.KEYID = 0
1,480,423 ready_for_fw is high
1,480,423 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,108 UART: [idev] Erasing UDS.KEYID = 0
1,505,106 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,704 UART: [idev] --
1,514,883 UART: [ldev] ++
1,515,051 UART: [ldev] CDI.KEYID = 6
1,515,414 UART: [ldev] SUBJECT.KEYID = 5
1,515,840 UART: [ldev] AUTHORITY.KEYID = 7
1,516,303 UART: [ldev] FE.KEYID = 1
1,521,437 UART: [ldev] Erasing FE.KEYID = 1
1,546,904 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,610 UART: [ldev] --
1,586,101 UART: [fwproc] Waiting for Commands...
1,586,952 UART: [fwproc] Received command 0x46574c44
1,587,743 UART: [fwproc] Received Image of size 114332 bytes
2,885,111 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,777 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,129 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,894 >>> mbox cmd response: success
3,077,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,079,112 UART: [afmc] ++
3,079,280 UART: [afmc] CDI.KEYID = 6
3,079,642 UART: [afmc] SUBJECT.KEYID = 7
3,080,067 UART: [afmc] AUTHORITY.KEYID = 5
3,114,488 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,826 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,606 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,334 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,219 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,909 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,754 UART: [afmc] --
3,157,648 UART: [cold-reset] --
3,158,546 UART: [state] Locking Datavault
3,159,725 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,329 UART: [state] Locking ICCM
3,160,793 UART: [exit] Launching FMC @ 0x40000130
3,166,122 UART:
3,166,138 UART: Running Caliptra FMC ...
3,166,546 UART:
3,166,600 UART: [state] CFI Enabled
3,177,349 UART: [fht] FMC Alias Private Key: 7
3,285,448 UART: [art] Extend RT PCRs Done
3,285,876 UART: [art] Lock RT PCRs Done
3,287,258 UART: [art] Populate DV Done
3,295,439 UART: [fht] FMC Alias Private Key: 7
3,296,513 UART: [art] Derive CDI
3,296,793 UART: [art] Store in in slot 0x4
3,382,194 UART: [art] Derive Key Pair
3,382,554 UART: [art] Store priv key in slot 0x5
3,394,976 UART: [art] Derive Key Pair - Done
3,409,661 UART: [art] Signing Cert with AUTHO
3,410,141 UART: RITY.KEYID = 7
3,425,589 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,354 UART: [art] PUB.X = B4A987524DAB62D86B884F534AF05718EDC7E22D537A3D29F24CB6941F3701868719C9BA1C55329B46C0F9031C1F54D6
3,433,118 UART: [art] PUB.Y = 1A7A0E24C49BCB0353F8CD6F709524714F46342E0D7E7F6E3C17C9C794A8666059E54B39CDC8D48B92774429C23EB025
3,440,059 UART: [art] SIG.R = B427AC529E2C2E1E9AD43AF7CFFB7339476453FE9F3C9126AC97ADE197F2E2728EEF5FC3D65036DC04D4F2515C51977F
3,446,840 UART: [art] SIG.S = EB4AE1CB341CAFCDCBFDE786611516F78F57740373FD7124F0F75B938BD714D7BE31B9AFF4D6623D61CBA0D80C5648EA
3,470,477 UART: Caliptra RT
3,470,730 UART: [state] CFI Enabled
3,578,872 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,968 UART: [rt]cmd =0x44504543, len=96
3,642,175 >>> mbox cmd response data (56 bytes)
3,642,176 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,671,845 UART: [rt]cmd =0x44504543, len=92
3,862,843 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,445,773 >>> mbox cmd response data (12 bytes)
1,445,774 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,931,407 >>> mbox cmd response: success
2,931,407 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,992,363 UART:
2,992,379 UART: Running Caliptra FMC ...
2,992,787 UART:
2,992,841 UART: [state] CFI Enabled
3,003,706 UART: [fht] FMC Alias Private Key: 7
3,111,729 UART: [art] Extend RT PCRs Done
3,112,157 UART: [art] Lock RT PCRs Done
3,113,669 UART: [art] Populate DV Done
3,121,948 UART: [fht] FMC Alias Private Key: 7
3,122,984 UART: [art] Derive CDI
3,123,264 UART: [art] Store in in slot 0x4
3,208,591 UART: [art] Derive Key Pair
3,208,951 UART: [art] Store priv key in slot 0x5
3,222,201 UART: [art] Derive Key Pair - Done
3,237,411 UART: [art] Signing Cert with AUTHO
3,237,891 UART: RITY.KEYID = 7
3,253,237 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,002 UART: [art] PUB.X = 6F7874E0BC62BE929BB59846FB62C36D86DA0D599C526D9656F6C9F4751B47AC9AEC8DEDD8B66221812D09F6BEE4F330
3,260,778 UART: [art] PUB.Y = 5DA9FB190CCDAFCDC22A268C9B59868937B987B57D14492087ADFFA70F09FAF05373433E9DE33C16790143B9080863BC
3,267,716 UART: [art] SIG.R = EC8197561A61A2A3692197DA0348D8F5C508005305DA0E0F09AC23AB67B3EBA0E5C37ECE75592EA6B7B33DF1DC9A97E1
3,274,458 UART: [art] SIG.S = 41A8A358C542A64EC899C22407DFB5598906AB711DAF8FF5F766CBFF64ED9639647ECA9F08DF5175AF1A39C0D8C92743
3,298,732 UART: Caliptra RT
3,298,985 UART: [state] CFI Enabled
3,418,102 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,302 UART: [rt]cmd =0x44504543, len=92
3,640,381 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,797 ready_for_fw is high
1,361,797 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,072 >>> mbox cmd response: success
2,928,072 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,989,990 UART:
2,990,006 UART: Running Caliptra FMC ...
2,990,414 UART:
2,990,468 UART: [state] CFI Enabled
3,001,005 UART: [fht] FMC Alias Private Key: 7
3,108,032 UART: [art] Extend RT PCRs Done
3,108,460 UART: [art] Lock RT PCRs Done
3,109,986 UART: [art] Populate DV Done
3,118,219 UART: [fht] FMC Alias Private Key: 7
3,119,191 UART: [art] Derive CDI
3,119,471 UART: [art] Store in in slot 0x4
3,204,814 UART: [art] Derive Key Pair
3,205,174 UART: [art] Store priv key in slot 0x5
3,218,872 UART: [art] Derive Key Pair - Done
3,233,530 UART: [art] Signing Cert with AUTHO
3,234,010 UART: RITY.KEYID = 7
3,248,886 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,651 UART: [art] PUB.X = 6F7874E0BC62BE929BB59846FB62C36D86DA0D599C526D9656F6C9F4751B47AC9AEC8DEDD8B66221812D09F6BEE4F330
3,256,427 UART: [art] PUB.Y = 5DA9FB190CCDAFCDC22A268C9B59868937B987B57D14492087ADFFA70F09FAF05373433E9DE33C16790143B9080863BC
3,263,365 UART: [art] SIG.R = EC8197561A61A2A3692197DA0348D8F5C508005305DA0E0F09AC23AB67B3EBA0E5C37ECE75592EA6B7B33DF1DC9A97E1
3,270,107 UART: [art] SIG.S = 41A8A358C542A64EC899C22407DFB5598906AB711DAF8FF5F766CBFF64ED9639647ECA9F08DF5175AF1A39C0D8C92743
3,294,365 UART: Caliptra RT
3,294,618 UART: [state] CFI Enabled
3,403,395 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,071 UART: [rt]cmd =0x4d454153, len=108
3,454,132 >>> mbox cmd response data (12 bytes)
3,454,133 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,484,032 UART: [rt]cmd =0x44504543, len=92
3,675,735 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,795 ready_for_fw is high
1,362,795 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,100 >>> mbox cmd response: success
2,929,100 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,990,336 UART:
2,990,352 UART: Running Caliptra FMC ...
2,990,760 UART:
2,990,814 UART: [state] CFI Enabled
3,001,481 UART: [fht] FMC Alias Private Key: 7
3,109,398 UART: [art] Extend RT PCRs Done
3,109,826 UART: [art] Lock RT PCRs Done
3,111,482 UART: [art] Populate DV Done
3,119,597 UART: [fht] FMC Alias Private Key: 7
3,120,585 UART: [art] Derive CDI
3,120,865 UART: [art] Store in in slot 0x4
3,206,470 UART: [art] Derive Key Pair
3,206,830 UART: [art] Store priv key in slot 0x5
3,220,192 UART: [art] Derive Key Pair - Done
3,235,210 UART: [art] Signing Cert with AUTHO
3,235,690 UART: RITY.KEYID = 7
3,251,004 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,769 UART: [art] PUB.X = 6F7874E0BC62BE929BB59846FB62C36D86DA0D599C526D9656F6C9F4751B47AC9AEC8DEDD8B66221812D09F6BEE4F330
3,258,545 UART: [art] PUB.Y = 5DA9FB190CCDAFCDC22A268C9B59868937B987B57D14492087ADFFA70F09FAF05373433E9DE33C16790143B9080863BC
3,265,483 UART: [art] SIG.R = EC8197561A61A2A3692197DA0348D8F5C508005305DA0E0F09AC23AB67B3EBA0E5C37ECE75592EA6B7B33DF1DC9A97E1
3,272,225 UART: [art] SIG.S = 41A8A358C542A64EC899C22407DFB5598906AB711DAF8FF5F766CBFF64ED9639647ECA9F08DF5175AF1A39C0D8C92743
3,295,993 UART: Caliptra RT
3,296,246 UART: [state] CFI Enabled
3,405,061 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,009 UART: [rt]cmd =0x44504543, len=96
3,468,812 >>> mbox cmd response data (56 bytes)
3,468,813 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,498,800 UART: [rt]cmd =0x44504543, len=92
3,689,869 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.58s
Truncated 5006 bytes from beginning
7DACF23B2C317915FBD30BE91E498C8DFF518
3,437,346 UART: [art] PUB.Y = 8A647DDE2BC3666D94E54F6669655F1FB61CD3E73852A6DB0CF957A7AFD515581F4F7C8D83E95C3636D8E0071D3475D4
3,444,296 UART: [art] SIG.R = 577B2BBC40AB754DF05FE947F3E41B75CF6BE67E632BE169B0543E9DB0FAB89C43AC56FC88404AA72CA63E081FF1AAA7
3,451,085 UART: [art] SIG.S = EDF44F0409F882CA6D8876BAAD4BF56000D7231FF31EAFEB11290500F167BCFED2F047050D8121E3819644673271117A
3,475,001 UART: Caliptra RT
3,475,346 UART: [state] CFI Enabled
3,594,455 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,341 UART: [rt]cmd =0x44504543, len=92
3,816,888 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,711 UART: [state] LifecycleState = Unprovisioned
86,366 UART: [state] DebugLocked = No
86,900 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,500 UART: [kat] SHA2-256
882,431 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,546 UART: [kat] ++
886,698 UART: [kat] sha1
890,842 UART: [kat] SHA2-256
892,780 UART: [kat] SHA2-384
895,505 UART: [kat] SHA2-512-ACC
897,406 UART: [kat] ECC-384
903,023 UART: [kat] HMAC-384Kdf
907,783 UART: [kat] LMS
1,475,979 UART: [kat] --
1,477,220 UART: [cold-reset] ++
1,477,552 UART: [fht] Storing FHT @ 0x50003400
1,480,469 UART: [idev] ++
1,480,637 UART: [idev] CDI.KEYID = 6
1,480,997 UART: [idev] SUBJECT.KEYID = 7
1,481,421 UART: [idev] UDS.KEYID = 0
1,481,766 ready_for_fw is high
1,481,766 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,991 UART: [idev] Erasing UDS.KEYID = 0
1,506,029 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,643 UART: [idev] --
1,515,672 UART: [ldev] ++
1,515,840 UART: [ldev] CDI.KEYID = 6
1,516,203 UART: [ldev] SUBJECT.KEYID = 5
1,516,629 UART: [ldev] AUTHORITY.KEYID = 7
1,517,092 UART: [ldev] FE.KEYID = 1
1,522,274 UART: [ldev] Erasing FE.KEYID = 1
1,548,269 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,921 UART: [ldev] --
1,587,394 UART: [fwproc] Waiting for Commands...
1,588,261 UART: [fwproc] Received command 0x46574c44
1,589,052 UART: [fwproc] Received Image of size 114332 bytes
2,887,404 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,234 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,586 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,519 >>> mbox cmd response: success
3,079,519 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,080,583 UART: [afmc] ++
3,080,751 UART: [afmc] CDI.KEYID = 6
3,081,113 UART: [afmc] SUBJECT.KEYID = 7
3,081,538 UART: [afmc] AUTHORITY.KEYID = 5
3,116,979 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,261 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,041 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,769 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,654 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,344 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,151 UART: [afmc] --
3,160,047 UART: [cold-reset] --
3,160,793 UART: [state] Locking Datavault
3,161,976 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,580 UART: [state] Locking ICCM
3,163,002 UART: [exit] Launching FMC @ 0x40000130
3,168,331 UART:
3,168,347 UART: Running Caliptra FMC ...
3,168,755 UART:
3,168,898 UART: [state] CFI Enabled
3,179,689 UART: [fht] FMC Alias Private Key: 7
3,287,600 UART: [art] Extend RT PCRs Done
3,288,028 UART: [art] Lock RT PCRs Done
3,289,478 UART: [art] Populate DV Done
3,297,759 UART: [fht] FMC Alias Private Key: 7
3,298,791 UART: [art] Derive CDI
3,299,071 UART: [art] Store in in slot 0x4
3,384,844 UART: [art] Derive Key Pair
3,385,204 UART: [art] Store priv key in slot 0x5
3,398,086 UART: [art] Derive Key Pair - Done
3,412,845 UART: [art] Signing Cert with AUTHO
3,413,325 UART: RITY.KEYID = 7
3,428,559 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,324 UART: [art] PUB.X = 08FB531AF4773AA1A4E400ADB513E0E9DCB700133534871A01E95109F267DACF23B2C317915FBD30BE91E498C8DFF518
3,436,049 UART: [art] PUB.Y = 8A647DDE2BC3666D94E54F6669655F1FB61CD3E73852A6DB0CF957A7AFD515581F4F7C8D83E95C3636D8E0071D3475D4
3,442,999 UART: [art] SIG.R = 577B2BBC40AB754DF05FE947F3E41B75CF6BE67E632BE169B0543E9DB0FAB89C43AC56FC88404AA72CA63E081FF1AAA7
3,449,788 UART: [art] SIG.S = EDF44F0409F882CA6D8876BAAD4BF56000D7231FF31EAFEB11290500F167BCFED2F047050D8121E3819644673271117A
3,473,894 UART: Caliptra RT
3,474,239 UART: [state] CFI Enabled
3,582,928 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,388 UART: [rt]cmd =0x4d454153, len=108
3,635,117 >>> mbox cmd response data (12 bytes)
3,635,118 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,327 UART: [rt]cmd =0x44504543, len=92
3,856,578 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,916 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,616 UART: [kat] SHA2-256
882,547 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,662 UART: [kat] ++
886,814 UART: [kat] sha1
891,114 UART: [kat] SHA2-256
893,052 UART: [kat] SHA2-384
895,845 UART: [kat] SHA2-512-ACC
897,746 UART: [kat] ECC-384
903,787 UART: [kat] HMAC-384Kdf
908,335 UART: [kat] LMS
1,476,531 UART: [kat] --
1,477,386 UART: [cold-reset] ++
1,477,902 UART: [fht] Storing FHT @ 0x50003400
1,480,635 UART: [idev] ++
1,480,803 UART: [idev] CDI.KEYID = 6
1,481,163 UART: [idev] SUBJECT.KEYID = 7
1,481,587 UART: [idev] UDS.KEYID = 0
1,481,932 ready_for_fw is high
1,481,932 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,551 UART: [idev] Erasing UDS.KEYID = 0
1,506,627 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,431 UART: [idev] --
1,516,540 UART: [ldev] ++
1,516,708 UART: [ldev] CDI.KEYID = 6
1,517,071 UART: [ldev] SUBJECT.KEYID = 5
1,517,497 UART: [ldev] AUTHORITY.KEYID = 7
1,517,960 UART: [ldev] FE.KEYID = 1
1,523,424 UART: [ldev] Erasing FE.KEYID = 1
1,548,625 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,407 UART: [ldev] --
1,587,848 UART: [fwproc] Waiting for Commands...
1,588,489 UART: [fwproc] Received command 0x46574c44
1,589,280 UART: [fwproc] Received Image of size 114332 bytes
2,887,508 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,752 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,104 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,961 >>> mbox cmd response: success
3,079,961 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,081,011 UART: [afmc] ++
3,081,179 UART: [afmc] CDI.KEYID = 6
3,081,541 UART: [afmc] SUBJECT.KEYID = 7
3,081,966 UART: [afmc] AUTHORITY.KEYID = 5
3,117,121 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,327 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,107 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,835 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,720 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,410 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,323 UART: [afmc] --
3,160,313 UART: [cold-reset] --
3,161,165 UART: [state] Locking Datavault
3,162,438 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,042 UART: [state] Locking ICCM
3,163,624 UART: [exit] Launching FMC @ 0x40000130
3,168,953 UART:
3,168,969 UART: Running Caliptra FMC ...
3,169,377 UART:
3,169,520 UART: [state] CFI Enabled
3,179,985 UART: [fht] FMC Alias Private Key: 7
3,288,080 UART: [art] Extend RT PCRs Done
3,288,508 UART: [art] Lock RT PCRs Done
3,290,270 UART: [art] Populate DV Done
3,298,693 UART: [fht] FMC Alias Private Key: 7
3,299,819 UART: [art] Derive CDI
3,300,099 UART: [art] Store in in slot 0x4
3,385,974 UART: [art] Derive Key Pair
3,386,334 UART: [art] Store priv key in slot 0x5
3,399,058 UART: [art] Derive Key Pair - Done
3,414,219 UART: [art] Signing Cert with AUTHO
3,414,699 UART: RITY.KEYID = 7
3,429,689 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,454 UART: [art] PUB.X = 08FB531AF4773AA1A4E400ADB513E0E9DCB700133534871A01E95109F267DACF23B2C317915FBD30BE91E498C8DFF518
3,437,179 UART: [art] PUB.Y = 8A647DDE2BC3666D94E54F6669655F1FB61CD3E73852A6DB0CF957A7AFD515581F4F7C8D83E95C3636D8E0071D3475D4
3,444,129 UART: [art] SIG.R = 577B2BBC40AB754DF05FE947F3E41B75CF6BE67E632BE169B0543E9DB0FAB89C43AC56FC88404AA72CA63E081FF1AAA7
3,450,918 UART: [art] SIG.S = EDF44F0409F882CA6D8876BAAD4BF56000D7231FF31EAFEB11290500F167BCFED2F047050D8121E3819644673271117A
3,474,718 UART: Caliptra RT
3,475,063 UART: [state] CFI Enabled
3,583,598 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,700 UART: [rt]cmd =0x44504543, len=96
3,647,021 >>> mbox cmd response data (56 bytes)
3,647,022 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,676,789 UART: [rt]cmd =0x44504543, len=92
3,869,330 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,444,798 >>> mbox cmd response data (12 bytes)
1,444,799 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,932,506 >>> mbox cmd response: success
2,932,506 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,994,556 UART:
2,994,572 UART: Running Caliptra FMC ...
2,994,980 UART:
2,995,123 UART: [state] CFI Enabled
3,005,790 UART: [fht] FMC Alias Private Key: 7
3,114,299 UART: [art] Extend RT PCRs Done
3,114,727 UART: [art] Lock RT PCRs Done
3,116,041 UART: [art] Populate DV Done
3,124,260 UART: [fht] FMC Alias Private Key: 7
3,125,400 UART: [art] Derive CDI
3,125,680 UART: [art] Store in in slot 0x4
3,211,417 UART: [art] Derive Key Pair
3,211,777 UART: [art] Store priv key in slot 0x5
3,225,289 UART: [art] Derive Key Pair - Done
3,240,083 UART: [art] Signing Cert with AUTHO
3,240,563 UART: RITY.KEYID = 7
3,255,677 UART: [art] Erasing AUTHORITY.KEYID = 7
3,256,442 UART: [art] PUB.X = B908EFB9CD62B5099763EE5900A4B08C348EE1085DAF16356DAE5D63808477FA3AEFF3027284B25CF149D4842EC3E49A
3,263,186 UART: [art] PUB.Y = 853EF368852144422200C7DBFEA47183F0A8387A866AEB27F830F347CC2544F96AA73B5F7B5D356F2B0FD32268680EAC
3,270,110 UART: [art] SIG.R = EAD4BA6B215E7E386B61942886D2F8C9CCA40E0392F6208664C8FC0924CEAC4A1A23779FA708BDDB2510775E497320C5
3,276,874 UART: [art] SIG.S = 3E1CAE716949B9B00FA7D5A1BCD71C15CA1C018489696AB28753AC74901E8BEA066D95502ECC2A50009BEF0B700815DA
3,300,418 UART: Caliptra RT
3,300,763 UART: [state] CFI Enabled
3,421,034 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,452,228 UART: [rt]cmd =0x44504543, len=92
3,643,689 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,136 ready_for_fw is high
1,363,136 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,895 >>> mbox cmd response: success
2,928,895 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,991,347 UART:
2,991,363 UART: Running Caliptra FMC ...
2,991,771 UART:
2,991,914 UART: [state] CFI Enabled
3,002,413 UART: [fht] FMC Alias Private Key: 7
3,110,334 UART: [art] Extend RT PCRs Done
3,110,762 UART: [art] Lock RT PCRs Done
3,112,294 UART: [art] Populate DV Done
3,120,495 UART: [fht] FMC Alias Private Key: 7
3,121,653 UART: [art] Derive CDI
3,121,933 UART: [art] Store in in slot 0x4
3,207,374 UART: [art] Derive Key Pair
3,207,734 UART: [art] Store priv key in slot 0x5
3,221,160 UART: [art] Derive Key Pair - Done
3,235,800 UART: [art] Signing Cert with AUTHO
3,236,280 UART: RITY.KEYID = 7
3,251,674 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,439 UART: [art] PUB.X = B908EFB9CD62B5099763EE5900A4B08C348EE1085DAF16356DAE5D63808477FA3AEFF3027284B25CF149D4842EC3E49A
3,259,183 UART: [art] PUB.Y = 853EF368852144422200C7DBFEA47183F0A8387A866AEB27F830F347CC2544F96AA73B5F7B5D356F2B0FD32268680EAC
3,266,107 UART: [art] SIG.R = EAD4BA6B215E7E386B61942886D2F8C9CCA40E0392F6208664C8FC0924CEAC4A1A23779FA708BDDB2510775E497320C5
3,272,871 UART: [art] SIG.S = 3E1CAE716949B9B00FA7D5A1BCD71C15CA1C018489696AB28753AC74901E8BEA066D95502ECC2A50009BEF0B700815DA
3,296,605 UART: Caliptra RT
3,296,950 UART: [state] CFI Enabled
3,405,879 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,817 UART: [rt]cmd =0x4d454153, len=108
3,458,304 >>> mbox cmd response data (12 bytes)
3,458,305 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,488,262 UART: [rt]cmd =0x44504543, len=92
3,679,559 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,540 ready_for_fw is high
1,362,540 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,621 >>> mbox cmd response: success
2,929,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,990,483 UART:
2,990,499 UART: Running Caliptra FMC ...
2,990,907 UART:
2,991,050 UART: [state] CFI Enabled
3,001,503 UART: [fht] FMC Alias Private Key: 7
3,109,444 UART: [art] Extend RT PCRs Done
3,109,872 UART: [art] Lock RT PCRs Done
3,111,768 UART: [art] Populate DV Done
3,119,915 UART: [fht] FMC Alias Private Key: 7
3,120,871 UART: [art] Derive CDI
3,121,151 UART: [art] Store in in slot 0x4
3,206,742 UART: [art] Derive Key Pair
3,207,102 UART: [art] Store priv key in slot 0x5
3,220,834 UART: [art] Derive Key Pair - Done
3,235,238 UART: [art] Signing Cert with AUTHO
3,235,718 UART: RITY.KEYID = 7
3,250,992 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,757 UART: [art] PUB.X = B908EFB9CD62B5099763EE5900A4B08C348EE1085DAF16356DAE5D63808477FA3AEFF3027284B25CF149D4842EC3E49A
3,258,501 UART: [art] PUB.Y = 853EF368852144422200C7DBFEA47183F0A8387A866AEB27F830F347CC2544F96AA73B5F7B5D356F2B0FD32268680EAC
3,265,425 UART: [art] SIG.R = EAD4BA6B215E7E386B61942886D2F8C9CCA40E0392F6208664C8FC0924CEAC4A1A23779FA708BDDB2510775E497320C5
3,272,189 UART: [art] SIG.S = 3E1CAE716949B9B00FA7D5A1BCD71C15CA1C018489696AB28753AC74901E8BEA066D95502ECC2A50009BEF0B700815DA
3,295,329 UART: Caliptra RT
3,295,674 UART: [state] CFI Enabled
3,404,241 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,353 UART: [rt]cmd =0x44504543, len=96
3,467,908 >>> mbox cmd response data (56 bytes)
3,467,909 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,497,830 UART: [rt]cmd =0x44504543, len=92
3,689,509 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.85s
Truncated 4783 bytes from beginning
7
3,128,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,775 UART: [art] PUB.X = A2E591B364C7A35D5823918F2982C3A8D25C54D5795D011BC1C39D1A695244E902F9AD44315D353C8E3E32467D5FA67A
3,135,537 UART: [art] PUB.Y = A2DE43B071660FA648545614D6626C7468001EF342E15B7AEB1F0BB903B7A39D9785BB90775F419128A74F6B4735F4FF
3,142,454 UART: [art] SIG.R = 3F8246AC4F8B6B87C5B9D4A885E1A17F954F8F52321700952B3A9CEE2FB38F5DEB064D2FD01F45BE7127644636048F60
3,149,200 UART: [art] SIG.S = 73A456659C03C0B6CAF75C3B3CA64D04BAC7E51720109DBED8BFB22B0C9C4C74BED5A275842FE2EBC898EBF1093E1157
3,173,005 UART: Caliptra RT
3,173,258 UART: [state] CFI Enabled
3,292,443 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,283 UART: [rt]cmd =0x44504543, len=92
3,514,463 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [kat] SHA2-256
893,348 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,473 UART: [kat] ++
897,625 UART: [kat] sha1
901,839 UART: [kat] SHA2-256
903,779 UART: [kat] SHA2-384
906,536 UART: [kat] SHA2-512-ACC
908,437 UART: [kat] ECC-384
918,044 UART: [kat] HMAC-384Kdf
922,582 UART: [kat] LMS
1,170,910 UART: [kat] --
1,171,909 UART: [cold-reset] ++
1,172,315 UART: [fht] FHT @ 0x50003400
1,174,994 UART: [idev] ++
1,175,162 UART: [idev] CDI.KEYID = 6
1,175,522 UART: [idev] SUBJECT.KEYID = 7
1,175,946 UART: [idev] UDS.KEYID = 0
1,176,291 ready_for_fw is high
1,176,291 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,860 UART: [idev] Erasing UDS.KEYID = 0
1,200,743 UART: [idev] Sha1 KeyId Algorithm
1,209,061 UART: [idev] --
1,210,147 UART: [ldev] ++
1,210,315 UART: [ldev] CDI.KEYID = 6
1,210,678 UART: [ldev] SUBJECT.KEYID = 5
1,211,104 UART: [ldev] AUTHORITY.KEYID = 7
1,211,567 UART: [ldev] FE.KEYID = 1
1,216,883 UART: [ldev] Erasing FE.KEYID = 1
1,243,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,025 UART: [ldev] --
1,282,364 UART: [fwproc] Wait for Commands...
1,283,046 UART: [fwproc] Recv command 0x46574c44
1,283,774 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,344 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,648 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,495 >>> mbox cmd response: success
2,774,495 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,775,741 UART: [afmc] ++
2,775,909 UART: [afmc] CDI.KEYID = 6
2,776,271 UART: [afmc] SUBJECT.KEYID = 7
2,776,696 UART: [afmc] AUTHORITY.KEYID = 5
2,812,011 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,474 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,222 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,950 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,835 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,554 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,248 UART: [afmc] --
2,855,352 UART: [cold-reset] --
2,856,030 UART: [state] Locking Datavault
2,857,225 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,829 UART: [state] Locking ICCM
2,858,301 UART: [exit] Launching FMC @ 0x40000130
2,863,630 UART:
2,863,646 UART: Running Caliptra FMC ...
2,864,054 UART:
2,864,108 UART: [state] CFI Enabled
2,874,639 UART: [fht] FMC Alias Private Key: 7
2,982,836 UART: [art] Extend RT PCRs Done
2,983,264 UART: [art] Lock RT PCRs Done
2,985,048 UART: [art] Populate DV Done
2,993,331 UART: [fht] FMC Alias Private Key: 7
2,994,295 UART: [art] Derive CDI
2,994,575 UART: [art] Store in in slot 0x4
3,080,064 UART: [art] Derive Key Pair
3,080,424 UART: [art] Store priv key in slot 0x5
3,093,376 UART: [art] Derive Key Pair - Done
3,108,255 UART: [art] Signing Cert with AUTHO
3,108,735 UART: RITY.KEYID = 7
3,124,081 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,846 UART: [art] PUB.X = A2E591B364C7A35D5823918F2982C3A8D25C54D5795D011BC1C39D1A695244E902F9AD44315D353C8E3E32467D5FA67A
3,131,608 UART: [art] PUB.Y = A2DE43B071660FA648545614D6626C7468001EF342E15B7AEB1F0BB903B7A39D9785BB90775F419128A74F6B4735F4FF
3,138,525 UART: [art] SIG.R = 3F8246AC4F8B6B87C5B9D4A885E1A17F954F8F52321700952B3A9CEE2FB38F5DEB064D2FD01F45BE7127644636048F60
3,145,271 UART: [art] SIG.S = 73A456659C03C0B6CAF75C3B3CA64D04BAC7E51720109DBED8BFB22B0C9C4C74BED5A275842FE2EBC898EBF1093E1157
3,169,006 UART: Caliptra RT
3,169,259 UART: [state] CFI Enabled
3,277,146 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,216 UART: [rt]cmd =0x4d454153, len=108
3,328,277 >>> mbox cmd response data (12 bytes)
3,328,278 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,069 UART: [rt]cmd =0x44504543, len=92
3,549,559 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,796 UART: [state] LifecycleState = Unprovisioned
85,451 UART: [state] DebugLocked = No
86,081 UART: [state] WD Timer not started. Device not locked for debugging
87,222 UART: [kat] SHA2-256
892,872 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,997 UART: [kat] ++
897,149 UART: [kat] sha1
901,435 UART: [kat] SHA2-256
903,375 UART: [kat] SHA2-384
906,122 UART: [kat] SHA2-512-ACC
908,023 UART: [kat] ECC-384
917,690 UART: [kat] HMAC-384Kdf
922,422 UART: [kat] LMS
1,170,750 UART: [kat] --
1,171,611 UART: [cold-reset] ++
1,172,101 UART: [fht] FHT @ 0x50003400
1,174,664 UART: [idev] ++
1,174,832 UART: [idev] CDI.KEYID = 6
1,175,192 UART: [idev] SUBJECT.KEYID = 7
1,175,616 UART: [idev] UDS.KEYID = 0
1,175,961 ready_for_fw is high
1,175,961 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,630 UART: [idev] Erasing UDS.KEYID = 0
1,200,071 UART: [idev] Sha1 KeyId Algorithm
1,208,617 UART: [idev] --
1,209,613 UART: [ldev] ++
1,209,781 UART: [ldev] CDI.KEYID = 6
1,210,144 UART: [ldev] SUBJECT.KEYID = 5
1,210,570 UART: [ldev] AUTHORITY.KEYID = 7
1,211,033 UART: [ldev] FE.KEYID = 1
1,216,151 UART: [ldev] Erasing FE.KEYID = 1
1,241,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,713 UART: [ldev] --
1,281,148 UART: [fwproc] Wait for Commands...
1,281,954 UART: [fwproc] Recv command 0x46574c44
1,282,682 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,196 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,500 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,377 >>> mbox cmd response: success
2,773,377 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,774,547 UART: [afmc] ++
2,774,715 UART: [afmc] CDI.KEYID = 6
2,775,077 UART: [afmc] SUBJECT.KEYID = 7
2,775,502 UART: [afmc] AUTHORITY.KEYID = 5
2,810,959 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,894 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,622 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,507 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,226 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,042 UART: [afmc] --
2,854,122 UART: [cold-reset] --
2,854,860 UART: [state] Locking Datavault
2,855,881 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,485 UART: [state] Locking ICCM
2,857,001 UART: [exit] Launching FMC @ 0x40000130
2,862,330 UART:
2,862,346 UART: Running Caliptra FMC ...
2,862,754 UART:
2,862,808 UART: [state] CFI Enabled
2,872,969 UART: [fht] FMC Alias Private Key: 7
2,981,616 UART: [art] Extend RT PCRs Done
2,982,044 UART: [art] Lock RT PCRs Done
2,983,514 UART: [art] Populate DV Done
2,991,755 UART: [fht] FMC Alias Private Key: 7
2,992,869 UART: [art] Derive CDI
2,993,149 UART: [art] Store in in slot 0x4
3,079,034 UART: [art] Derive Key Pair
3,079,394 UART: [art] Store priv key in slot 0x5
3,093,076 UART: [art] Derive Key Pair - Done
3,108,093 UART: [art] Signing Cert with AUTHO
3,108,573 UART: RITY.KEYID = 7
3,124,459 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,224 UART: [art] PUB.X = A2E591B364C7A35D5823918F2982C3A8D25C54D5795D011BC1C39D1A695244E902F9AD44315D353C8E3E32467D5FA67A
3,131,986 UART: [art] PUB.Y = A2DE43B071660FA648545614D6626C7468001EF342E15B7AEB1F0BB903B7A39D9785BB90775F419128A74F6B4735F4FF
3,138,903 UART: [art] SIG.R = 3F8246AC4F8B6B87C5B9D4A885E1A17F954F8F52321700952B3A9CEE2FB38F5DEB064D2FD01F45BE7127644636048F60
3,145,649 UART: [art] SIG.S = 73A456659C03C0B6CAF75C3B3CA64D04BAC7E51720109DBED8BFB22B0C9C4C74BED5A275842FE2EBC898EBF1093E1157
3,169,880 UART: Caliptra RT
3,170,133 UART: [state] CFI Enabled
3,277,342 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,322 UART: [rt]cmd =0x44504543, len=96
3,341,403 >>> mbox cmd response data (56 bytes)
3,341,404 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,213 UART: [rt]cmd =0x44504543, len=92
3,561,009 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,169 >>> mbox cmd response data (12 bytes)
1,144,170 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,630,009 >>> mbox cmd response: success
2,630,009 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,692,459 UART:
2,692,475 UART: Running Caliptra FMC ...
2,692,883 UART:
2,692,937 UART: [state] CFI Enabled
2,703,476 UART: [fht] FMC Alias Private Key: 7
2,811,099 UART: [art] Extend RT PCRs Done
2,811,527 UART: [art] Lock RT PCRs Done
2,813,259 UART: [art] Populate DV Done
2,821,732 UART: [fht] FMC Alias Private Key: 7
2,822,744 UART: [art] Derive CDI
2,823,024 UART: [art] Store in in slot 0x4
2,908,273 UART: [art] Derive Key Pair
2,908,633 UART: [art] Store priv key in slot 0x5
2,921,829 UART: [art] Derive Key Pair - Done
2,936,705 UART: [art] Signing Cert with AUTHO
2,937,185 UART: RITY.KEYID = 7
2,952,353 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,118 UART: [art] PUB.X = C5EC59FB296E7A1C4BE80C8A3B630AA7D5080F2378EEEEE3AE9E96F5CBFA0343C0CDAB139F5EBFD8A1256D1CD1807B7F
2,959,903 UART: [art] PUB.Y = 9C9C152EAFFFC1DC69C9FB08052BF366252DF2F21A1397F5B41E54894E179DDCC8E50A3B8BAE1C9BECAB6D67CBA0C60C
2,966,869 UART: [art] SIG.R = B6BBF0E3C7F254A86056A8A76FA87F8F29EF1FD95C1F1151B769C803B30210C0CFF37A491C2A047F7E663EDE24D3246B
2,973,642 UART: [art] SIG.S = 961CC9759B5A0C57CDE49B0D45010A23DCD87FE1AC435AF1B5D3A4374F2D05B6DBEB5C798E51BCFEAEA76F72779BD612
2,997,386 UART: Caliptra RT
2,997,639 UART: [state] CFI Enabled
3,118,227 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,541 UART: [rt]cmd =0x44504543, len=92
3,340,360 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,365 ready_for_fw is high
1,060,365 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,038 >>> mbox cmd response: success
2,626,038 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,687,506 UART:
2,687,522 UART: Running Caliptra FMC ...
2,687,930 UART:
2,687,984 UART: [state] CFI Enabled
2,698,359 UART: [fht] FMC Alias Private Key: 7
2,805,450 UART: [art] Extend RT PCRs Done
2,805,878 UART: [art] Lock RT PCRs Done
2,807,396 UART: [art] Populate DV Done
2,815,681 UART: [fht] FMC Alias Private Key: 7
2,816,685 UART: [art] Derive CDI
2,816,965 UART: [art] Store in in slot 0x4
2,902,652 UART: [art] Derive Key Pair
2,903,012 UART: [art] Store priv key in slot 0x5
2,916,346 UART: [art] Derive Key Pair - Done
2,931,154 UART: [art] Signing Cert with AUTHO
2,931,634 UART: RITY.KEYID = 7
2,947,090 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,855 UART: [art] PUB.X = C5EC59FB296E7A1C4BE80C8A3B630AA7D5080F2378EEEEE3AE9E96F5CBFA0343C0CDAB139F5EBFD8A1256D1CD1807B7F
2,954,640 UART: [art] PUB.Y = 9C9C152EAFFFC1DC69C9FB08052BF366252DF2F21A1397F5B41E54894E179DDCC8E50A3B8BAE1C9BECAB6D67CBA0C60C
2,961,606 UART: [art] SIG.R = B6BBF0E3C7F254A86056A8A76FA87F8F29EF1FD95C1F1151B769C803B30210C0CFF37A491C2A047F7E663EDE24D3246B
2,968,379 UART: [art] SIG.S = 961CC9759B5A0C57CDE49B0D45010A23DCD87FE1AC435AF1B5D3A4374F2D05B6DBEB5C798E51BCFEAEA76F72779BD612
2,992,443 UART: Caliptra RT
2,992,696 UART: [state] CFI Enabled
3,100,666 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,864 UART: [rt]cmd =0x4d454153, len=108
3,152,327 >>> mbox cmd response data (12 bytes)
3,152,328 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,327 UART: [rt]cmd =0x44504543, len=92
3,373,782 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,323 ready_for_fw is high
1,060,323 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,216 >>> mbox cmd response: success
2,627,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,689,476 UART:
2,689,492 UART: Running Caliptra FMC ...
2,689,900 UART:
2,689,954 UART: [state] CFI Enabled
2,700,781 UART: [fht] FMC Alias Private Key: 7
2,809,072 UART: [art] Extend RT PCRs Done
2,809,500 UART: [art] Lock RT PCRs Done
2,811,518 UART: [art] Populate DV Done
2,819,727 UART: [fht] FMC Alias Private Key: 7
2,820,889 UART: [art] Derive CDI
2,821,169 UART: [art] Store in in slot 0x4
2,907,030 UART: [art] Derive Key Pair
2,907,390 UART: [art] Store priv key in slot 0x5
2,920,540 UART: [art] Derive Key Pair - Done
2,935,066 UART: [art] Signing Cert with AUTHO
2,935,546 UART: RITY.KEYID = 7
2,950,998 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,763 UART: [art] PUB.X = C5EC59FB296E7A1C4BE80C8A3B630AA7D5080F2378EEEEE3AE9E96F5CBFA0343C0CDAB139F5EBFD8A1256D1CD1807B7F
2,958,548 UART: [art] PUB.Y = 9C9C152EAFFFC1DC69C9FB08052BF366252DF2F21A1397F5B41E54894E179DDCC8E50A3B8BAE1C9BECAB6D67CBA0C60C
2,965,514 UART: [art] SIG.R = B6BBF0E3C7F254A86056A8A76FA87F8F29EF1FD95C1F1151B769C803B30210C0CFF37A491C2A047F7E663EDE24D3246B
2,972,287 UART: [art] SIG.S = 961CC9759B5A0C57CDE49B0D45010A23DCD87FE1AC435AF1B5D3A4374F2D05B6DBEB5C798E51BCFEAEA76F72779BD612
2,996,199 UART: Caliptra RT
2,996,452 UART: [state] CFI Enabled
3,104,250 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,182 UART: [rt]cmd =0x44504543, len=96
3,167,303 >>> mbox cmd response data (56 bytes)
3,167,304 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,197,205 UART: [rt]cmd =0x44504543, len=92
3,388,670 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.77s
Truncated 4783 bytes from beginning
7
3,131,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,106 UART: [art] PUB.X = 474675023EACA57FBE1668B3A161250A88CDE302952098079544CCD5E9EC01F97C856D1B00A9197D33052CE8A5A79BEB
3,138,838 UART: [art] PUB.Y = 01AFE0182C7E506A6D4B0B8B2999F595C6A3B41415C932B7E899089CB0886FE5B50D753AAA6D832B7F9F05435E74958B
3,145,775 UART: [art] SIG.R = 91CFB88262C9E51B91A7F13EB407C800D04F6AAE69EC74BB4B5B18FCB0B0D12208BBA343AE7A25B6C1352F23A4529A7F
3,152,533 UART: [art] SIG.S = 76266765DAA01F4127022E319B10A999AC0AF1F83E1B1EFF625A4F150F97579597BD85474B7DC7B29C2BE6119039D1D3
3,176,219 UART: Caliptra RT
3,176,564 UART: [state] CFI Enabled
3,295,575 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,443 UART: [rt]cmd =0x44504543, len=92
3,517,181 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,873 UART: [kat] SHA2-256
893,523 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,648 UART: [kat] ++
897,800 UART: [kat] sha1
902,232 UART: [kat] SHA2-256
904,172 UART: [kat] SHA2-384
906,703 UART: [kat] SHA2-512-ACC
908,604 UART: [kat] ECC-384
917,991 UART: [kat] HMAC-384Kdf
922,641 UART: [kat] LMS
1,170,969 UART: [kat] --
1,171,644 UART: [cold-reset] ++
1,172,030 UART: [fht] FHT @ 0x50003400
1,174,647 UART: [idev] ++
1,174,815 UART: [idev] CDI.KEYID = 6
1,175,175 UART: [idev] SUBJECT.KEYID = 7
1,175,599 UART: [idev] UDS.KEYID = 0
1,175,944 ready_for_fw is high
1,175,944 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,289 UART: [idev] Erasing UDS.KEYID = 0
1,200,396 UART: [idev] Sha1 KeyId Algorithm
1,208,774 UART: [idev] --
1,209,798 UART: [ldev] ++
1,209,966 UART: [ldev] CDI.KEYID = 6
1,210,329 UART: [ldev] SUBJECT.KEYID = 5
1,210,755 UART: [ldev] AUTHORITY.KEYID = 7
1,211,218 UART: [ldev] FE.KEYID = 1
1,216,586 UART: [ldev] Erasing FE.KEYID = 1
1,242,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,220 UART: [ldev] --
1,282,581 UART: [fwproc] Wait for Commands...
1,283,283 UART: [fwproc] Recv command 0x46574c44
1,284,011 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,355 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,659 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,578 >>> mbox cmd response: success
2,774,578 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,775,760 UART: [afmc] ++
2,775,928 UART: [afmc] CDI.KEYID = 6
2,776,290 UART: [afmc] SUBJECT.KEYID = 7
2,776,715 UART: [afmc] AUTHORITY.KEYID = 5
2,811,868 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,143 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,871 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,756 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,475 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,325 UART: [afmc] --
2,855,417 UART: [cold-reset] --
2,856,107 UART: [state] Locking Datavault
2,857,214 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,818 UART: [state] Locking ICCM
2,858,296 UART: [exit] Launching FMC @ 0x40000130
2,863,625 UART:
2,863,641 UART: Running Caliptra FMC ...
2,864,049 UART:
2,864,192 UART: [state] CFI Enabled
2,874,723 UART: [fht] FMC Alias Private Key: 7
2,982,714 UART: [art] Extend RT PCRs Done
2,983,142 UART: [art] Lock RT PCRs Done
2,984,502 UART: [art] Populate DV Done
2,992,801 UART: [fht] FMC Alias Private Key: 7
2,993,841 UART: [art] Derive CDI
2,994,121 UART: [art] Store in in slot 0x4
3,079,612 UART: [art] Derive Key Pair
3,079,972 UART: [art] Store priv key in slot 0x5
3,092,962 UART: [art] Derive Key Pair - Done
3,107,654 UART: [art] Signing Cert with AUTHO
3,108,134 UART: RITY.KEYID = 7
3,123,024 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,789 UART: [art] PUB.X = 474675023EACA57FBE1668B3A161250A88CDE302952098079544CCD5E9EC01F97C856D1B00A9197D33052CE8A5A79BEB
3,130,521 UART: [art] PUB.Y = 01AFE0182C7E506A6D4B0B8B2999F595C6A3B41415C932B7E899089CB0886FE5B50D753AAA6D832B7F9F05435E74958B
3,137,458 UART: [art] SIG.R = 91CFB88262C9E51B91A7F13EB407C800D04F6AAE69EC74BB4B5B18FCB0B0D12208BBA343AE7A25B6C1352F23A4529A7F
3,144,216 UART: [art] SIG.S = 76266765DAA01F4127022E319B10A999AC0AF1F83E1B1EFF625A4F150F97579597BD85474B7DC7B29C2BE6119039D1D3
3,169,352 UART: Caliptra RT
3,169,697 UART: [state] CFI Enabled
3,277,730 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,568 UART: [rt]cmd =0x4d454153, len=108
3,329,565 >>> mbox cmd response data (12 bytes)
3,329,566 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,415 UART: [rt]cmd =0x44504543, len=92
3,549,801 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,736 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
893,653 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,778 UART: [kat] ++
897,930 UART: [kat] sha1
902,126 UART: [kat] SHA2-256
904,066 UART: [kat] SHA2-384
906,763 UART: [kat] SHA2-512-ACC
908,664 UART: [kat] ECC-384
918,291 UART: [kat] HMAC-384Kdf
922,917 UART: [kat] LMS
1,171,245 UART: [kat] --
1,172,084 UART: [cold-reset] ++
1,172,642 UART: [fht] FHT @ 0x50003400
1,175,355 UART: [idev] ++
1,175,523 UART: [idev] CDI.KEYID = 6
1,175,883 UART: [idev] SUBJECT.KEYID = 7
1,176,307 UART: [idev] UDS.KEYID = 0
1,176,652 ready_for_fw is high
1,176,652 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,243 UART: [idev] Erasing UDS.KEYID = 0
1,201,082 UART: [idev] Sha1 KeyId Algorithm
1,209,610 UART: [idev] --
1,210,640 UART: [ldev] ++
1,210,808 UART: [ldev] CDI.KEYID = 6
1,211,171 UART: [ldev] SUBJECT.KEYID = 5
1,211,597 UART: [ldev] AUTHORITY.KEYID = 7
1,212,060 UART: [ldev] FE.KEYID = 1
1,217,342 UART: [ldev] Erasing FE.KEYID = 1
1,244,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,746 UART: [ldev] --
1,283,141 UART: [fwproc] Wait for Commands...
1,283,897 UART: [fwproc] Recv command 0x46574c44
1,284,625 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,685 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,989 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,818 >>> mbox cmd response: success
2,773,818 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,774,834 UART: [afmc] ++
2,775,002 UART: [afmc] CDI.KEYID = 6
2,775,364 UART: [afmc] SUBJECT.KEYID = 7
2,775,789 UART: [afmc] AUTHORITY.KEYID = 5
2,811,048 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,413 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,161 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,889 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,774 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,493 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,449 UART: [afmc] --
2,854,495 UART: [cold-reset] --
2,855,271 UART: [state] Locking Datavault
2,856,478 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,082 UART: [state] Locking ICCM
2,857,530 UART: [exit] Launching FMC @ 0x40000130
2,862,859 UART:
2,862,875 UART: Running Caliptra FMC ...
2,863,283 UART:
2,863,426 UART: [state] CFI Enabled
2,874,313 UART: [fht] FMC Alias Private Key: 7
2,981,870 UART: [art] Extend RT PCRs Done
2,982,298 UART: [art] Lock RT PCRs Done
2,983,916 UART: [art] Populate DV Done
2,991,925 UART: [fht] FMC Alias Private Key: 7
2,993,089 UART: [art] Derive CDI
2,993,369 UART: [art] Store in in slot 0x4
3,079,308 UART: [art] Derive Key Pair
3,079,668 UART: [art] Store priv key in slot 0x5
3,093,102 UART: [art] Derive Key Pair - Done
3,108,036 UART: [art] Signing Cert with AUTHO
3,108,516 UART: RITY.KEYID = 7
3,123,514 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,279 UART: [art] PUB.X = 474675023EACA57FBE1668B3A161250A88CDE302952098079544CCD5E9EC01F97C856D1B00A9197D33052CE8A5A79BEB
3,131,011 UART: [art] PUB.Y = 01AFE0182C7E506A6D4B0B8B2999F595C6A3B41415C932B7E899089CB0886FE5B50D753AAA6D832B7F9F05435E74958B
3,137,948 UART: [art] SIG.R = 91CFB88262C9E51B91A7F13EB407C800D04F6AAE69EC74BB4B5B18FCB0B0D12208BBA343AE7A25B6C1352F23A4529A7F
3,144,706 UART: [art] SIG.S = 76266765DAA01F4127022E319B10A999AC0AF1F83E1B1EFF625A4F150F97579597BD85474B7DC7B29C2BE6119039D1D3
3,168,384 UART: Caliptra RT
3,168,729 UART: [state] CFI Enabled
3,276,620 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,726 UART: [rt]cmd =0x44504543, len=96
3,340,675 >>> mbox cmd response data (56 bytes)
3,340,676 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,370,369 UART: [rt]cmd =0x44504543, len=92
3,561,763 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,812 >>> mbox cmd response data (12 bytes)
1,143,813 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,629,806 >>> mbox cmd response: success
2,629,806 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,691,744 UART:
2,691,760 UART: Running Caliptra FMC ...
2,692,168 UART:
2,692,311 UART: [state] CFI Enabled
2,703,206 UART: [fht] FMC Alias Private Key: 7
2,811,543 UART: [art] Extend RT PCRs Done
2,811,971 UART: [art] Lock RT PCRs Done
2,813,401 UART: [art] Populate DV Done
2,821,558 UART: [fht] FMC Alias Private Key: 7
2,822,500 UART: [art] Derive CDI
2,822,780 UART: [art] Store in in slot 0x4
2,908,423 UART: [art] Derive Key Pair
2,908,783 UART: [art] Store priv key in slot 0x5
2,921,887 UART: [art] Derive Key Pair - Done
2,936,676 UART: [art] Signing Cert with AUTHO
2,937,156 UART: RITY.KEYID = 7
2,952,270 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,035 UART: [art] PUB.X = A2D45475BC4D8D9EBBC13D08B7848977BED98ECD5E4B0D31B92BA441B8EFC2BA2404A9F4E02FDB93EB9ED26CD43A431D
2,959,822 UART: [art] PUB.Y = D26304CDB8271E18A2DF43FB330B163B90E837FA32DAB9176D6F8E048663DCDB9DE8FEED7F3FC1CD56D3A0453C51796B
2,966,781 UART: [art] SIG.R = 1D902BB6F33F8185DC20862741A8812C5A379F33A7DD2412784AAE43DE045411E7CB5FF384C79CB4A11A0A0B50E6911F
2,973,546 UART: [art] SIG.S = F4684FAB73FE0F1F35044FDA8964B47FDDE384AD7B67B399424EAE4287EFC2B97EEE4D1A37EC1BA860528F9CAC2A6851
2,997,587 UART: Caliptra RT
2,997,932 UART: [state] CFI Enabled
3,118,735 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,909 UART: [rt]cmd =0x44504543, len=92
3,340,931 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,326 ready_for_fw is high
1,060,326 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,627 >>> mbox cmd response: success
2,626,627 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,689,019 UART:
2,689,035 UART: Running Caliptra FMC ...
2,689,443 UART:
2,689,586 UART: [state] CFI Enabled
2,700,117 UART: [fht] FMC Alias Private Key: 7
2,808,526 UART: [art] Extend RT PCRs Done
2,808,954 UART: [art] Lock RT PCRs Done
2,810,410 UART: [art] Populate DV Done
2,818,363 UART: [fht] FMC Alias Private Key: 7
2,819,311 UART: [art] Derive CDI
2,819,591 UART: [art] Store in in slot 0x4
2,905,224 UART: [art] Derive Key Pair
2,905,584 UART: [art] Store priv key in slot 0x5
2,918,376 UART: [art] Derive Key Pair - Done
2,933,225 UART: [art] Signing Cert with AUTHO
2,933,705 UART: RITY.KEYID = 7
2,948,803 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,568 UART: [art] PUB.X = A2D45475BC4D8D9EBBC13D08B7848977BED98ECD5E4B0D31B92BA441B8EFC2BA2404A9F4E02FDB93EB9ED26CD43A431D
2,956,355 UART: [art] PUB.Y = D26304CDB8271E18A2DF43FB330B163B90E837FA32DAB9176D6F8E048663DCDB9DE8FEED7F3FC1CD56D3A0453C51796B
2,963,314 UART: [art] SIG.R = 1D902BB6F33F8185DC20862741A8812C5A379F33A7DD2412784AAE43DE045411E7CB5FF384C79CB4A11A0A0B50E6911F
2,970,079 UART: [art] SIG.S = F4684FAB73FE0F1F35044FDA8964B47FDDE384AD7B67B399424EAE4287EFC2B97EEE4D1A37EC1BA860528F9CAC2A6851
2,994,092 UART: Caliptra RT
2,994,437 UART: [state] CFI Enabled
3,102,274 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,452 UART: [rt]cmd =0x4d454153, len=108
3,154,213 >>> mbox cmd response data (12 bytes)
3,154,214 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,129 UART: [rt]cmd =0x44504543, len=92
3,375,795 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,794 ready_for_fw is high
1,060,794 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,629,307 >>> mbox cmd response: success
2,629,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,691,505 UART:
2,691,521 UART: Running Caliptra FMC ...
2,691,929 UART:
2,692,072 UART: [state] CFI Enabled
2,702,781 UART: [fht] FMC Alias Private Key: 7
2,810,374 UART: [art] Extend RT PCRs Done
2,810,802 UART: [art] Lock RT PCRs Done
2,812,522 UART: [art] Populate DV Done
2,820,635 UART: [fht] FMC Alias Private Key: 7
2,821,803 UART: [art] Derive CDI
2,822,083 UART: [art] Store in in slot 0x4
2,908,034 UART: [art] Derive Key Pair
2,908,394 UART: [art] Store priv key in slot 0x5
2,921,918 UART: [art] Derive Key Pair - Done
2,936,737 UART: [art] Signing Cert with AUTHO
2,937,217 UART: RITY.KEYID = 7
2,952,397 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,162 UART: [art] PUB.X = A2D45475BC4D8D9EBBC13D08B7848977BED98ECD5E4B0D31B92BA441B8EFC2BA2404A9F4E02FDB93EB9ED26CD43A431D
2,959,949 UART: [art] PUB.Y = D26304CDB8271E18A2DF43FB330B163B90E837FA32DAB9176D6F8E048663DCDB9DE8FEED7F3FC1CD56D3A0453C51796B
2,966,908 UART: [art] SIG.R = 1D902BB6F33F8185DC20862741A8812C5A379F33A7DD2412784AAE43DE045411E7CB5FF384C79CB4A11A0A0B50E6911F
2,973,673 UART: [art] SIG.S = F4684FAB73FE0F1F35044FDA8964B47FDDE384AD7B67B399424EAE4287EFC2B97EEE4D1A37EC1BA860528F9CAC2A6851
2,997,412 UART: Caliptra RT
2,997,757 UART: [state] CFI Enabled
3,106,072 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,974 UART: [rt]cmd =0x44504543, len=96
3,169,267 >>> mbox cmd response data (56 bytes)
3,169,268 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,199,049 UART: [rt]cmd =0x44504543, len=92
3,390,393 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.77s
Truncated 4783 bytes from beginning
7
3,125,953 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,718 UART: [art] PUB.X = 3FD7882490CC60BA790134F83BF7D468F613037FBDDD6912842AC46D417D78611178D5F51ADDE025C8B5F7A1D09F21A1
3,133,486 UART: [art] PUB.Y = 7852A5E337924CD3A5B5CD81156E22D1D9EDA430EF6588195C0CC3227221B390F2A62B018EA8BF84B1D3E7EE19049BC6
3,140,433 UART: [art] SIG.R = 55DEA1769C49B60919BD7FE01ACD319592D8D7B2B6C573609A0FCD4423D9A7F23D194CD8DAC5144D1FFEAB5B68FA96B9
3,147,215 UART: [art] SIG.S = 092E006C847F3F750EBA63FE55B96A414ABB018FE70EBE7421DE016A7FC46191ED2535F7C5EEDCBA0D82F98AAB33D532
3,171,006 UART: Caliptra RT
3,171,259 UART: [state] CFI Enabled
3,291,476 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,406 UART: [rt]cmd =0x44504543, len=92
3,512,790 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
891,154 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,283 UART: [kat] ++
895,435 UART: [kat] sha1
899,485 UART: [kat] SHA2-256
901,425 UART: [kat] SHA2-384
904,230 UART: [kat] SHA2-512-ACC
906,131 UART: [kat] ECC-384
915,898 UART: [kat] HMAC-384Kdf
920,366 UART: [kat] LMS
1,168,678 UART: [kat] --
1,169,593 UART: [cold-reset] ++
1,170,149 UART: [fht] FHT @ 0x50003400
1,172,859 UART: [idev] ++
1,173,027 UART: [idev] CDI.KEYID = 6
1,173,388 UART: [idev] SUBJECT.KEYID = 7
1,173,813 UART: [idev] UDS.KEYID = 0
1,174,159 ready_for_fw is high
1,174,159 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,717 UART: [idev] Erasing UDS.KEYID = 0
1,198,553 UART: [idev] Sha1 KeyId Algorithm
1,207,503 UART: [idev] --
1,208,430 UART: [ldev] ++
1,208,598 UART: [ldev] CDI.KEYID = 6
1,208,962 UART: [ldev] SUBJECT.KEYID = 5
1,209,389 UART: [ldev] AUTHORITY.KEYID = 7
1,209,852 UART: [ldev] FE.KEYID = 1
1,214,758 UART: [ldev] Erasing FE.KEYID = 1
1,241,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,642 UART: [ldev] --
1,280,144 UART: [fwproc] Wait for Commands...
1,280,747 UART: [fwproc] Recv command 0x46574c44
1,281,480 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,490 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,799 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,533 >>> mbox cmd response: success
2,771,533 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,772,592 UART: [afmc] ++
2,772,760 UART: [afmc] CDI.KEYID = 6
2,773,123 UART: [afmc] SUBJECT.KEYID = 7
2,773,549 UART: [afmc] AUTHORITY.KEYID = 5
2,809,078 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,287 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,016 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,899 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,618 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,501 UART: [afmc] --
2,852,581 UART: [cold-reset] --
2,853,413 UART: [state] Locking Datavault
2,854,542 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,146 UART: [state] Locking ICCM
2,855,718 UART: [exit] Launching FMC @ 0x40000130
2,861,047 UART:
2,861,063 UART: Running Caliptra FMC ...
2,861,471 UART:
2,861,525 UART: [state] CFI Enabled
2,872,146 UART: [fht] FMC Alias Private Key: 7
2,979,559 UART: [art] Extend RT PCRs Done
2,979,987 UART: [art] Lock RT PCRs Done
2,981,531 UART: [art] Populate DV Done
2,989,904 UART: [fht] FMC Alias Private Key: 7
2,990,938 UART: [art] Derive CDI
2,991,218 UART: [art] Store in in slot 0x4
3,076,769 UART: [art] Derive Key Pair
3,077,129 UART: [art] Store priv key in slot 0x5
3,090,537 UART: [art] Derive Key Pair - Done
3,105,534 UART: [art] Signing Cert with AUTHO
3,106,014 UART: RITY.KEYID = 7
3,120,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,737 UART: [art] PUB.X = 3FD7882490CC60BA790134F83BF7D468F613037FBDDD6912842AC46D417D78611178D5F51ADDE025C8B5F7A1D09F21A1
3,128,505 UART: [art] PUB.Y = 7852A5E337924CD3A5B5CD81156E22D1D9EDA430EF6588195C0CC3227221B390F2A62B018EA8BF84B1D3E7EE19049BC6
3,135,452 UART: [art] SIG.R = 55DEA1769C49B60919BD7FE01ACD319592D8D7B2B6C573609A0FCD4423D9A7F23D194CD8DAC5144D1FFEAB5B68FA96B9
3,142,234 UART: [art] SIG.S = 092E006C847F3F750EBA63FE55B96A414ABB018FE70EBE7421DE016A7FC46191ED2535F7C5EEDCBA0D82F98AAB33D532
3,165,333 UART: Caliptra RT
3,165,586 UART: [state] CFI Enabled
3,273,251 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,149 UART: [rt]cmd =0x4d454153, len=108
3,325,568 >>> mbox cmd response data (12 bytes)
3,325,569 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,355,470 UART: [rt]cmd =0x44504543, len=92
3,546,980 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,254 UART: [state] LifecycleState = Unprovisioned
84,909 UART: [state] DebugLocked = No
85,613 UART: [state] WD Timer not started. Device not locked for debugging
86,828 UART: [kat] SHA2-256
890,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,507 UART: [kat] ++
894,659 UART: [kat] sha1
898,869 UART: [kat] SHA2-256
900,809 UART: [kat] SHA2-384
903,532 UART: [kat] SHA2-512-ACC
905,433 UART: [kat] ECC-384
914,944 UART: [kat] HMAC-384Kdf
919,664 UART: [kat] LMS
1,167,976 UART: [kat] --
1,168,873 UART: [cold-reset] ++
1,169,345 UART: [fht] FHT @ 0x50003400
1,171,809 UART: [idev] ++
1,171,977 UART: [idev] CDI.KEYID = 6
1,172,338 UART: [idev] SUBJECT.KEYID = 7
1,172,763 UART: [idev] UDS.KEYID = 0
1,173,109 ready_for_fw is high
1,173,109 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,579 UART: [idev] Erasing UDS.KEYID = 0
1,197,435 UART: [idev] Sha1 KeyId Algorithm
1,206,147 UART: [idev] --
1,207,120 UART: [ldev] ++
1,207,288 UART: [ldev] CDI.KEYID = 6
1,207,652 UART: [ldev] SUBJECT.KEYID = 5
1,208,079 UART: [ldev] AUTHORITY.KEYID = 7
1,208,542 UART: [ldev] FE.KEYID = 1
1,213,890 UART: [ldev] Erasing FE.KEYID = 1
1,240,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,758 UART: [ldev] --
1,279,102 UART: [fwproc] Wait for Commands...
1,279,921 UART: [fwproc] Recv command 0x46574c44
1,280,654 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,812 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,121 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,903 >>> mbox cmd response: success
2,770,903 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,772,098 UART: [afmc] ++
2,772,266 UART: [afmc] CDI.KEYID = 6
2,772,629 UART: [afmc] SUBJECT.KEYID = 7
2,773,055 UART: [afmc] AUTHORITY.KEYID = 5
2,808,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,950 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,701 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,430 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,313 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,032 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,011 UART: [afmc] --
2,851,895 UART: [cold-reset] --
2,852,623 UART: [state] Locking Datavault
2,853,846 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,450 UART: [state] Locking ICCM
2,854,944 UART: [exit] Launching FMC @ 0x40000130
2,860,273 UART:
2,860,289 UART: Running Caliptra FMC ...
2,860,697 UART:
2,860,751 UART: [state] CFI Enabled
2,871,502 UART: [fht] FMC Alias Private Key: 7
2,980,151 UART: [art] Extend RT PCRs Done
2,980,579 UART: [art] Lock RT PCRs Done
2,982,237 UART: [art] Populate DV Done
2,990,336 UART: [fht] FMC Alias Private Key: 7
2,991,294 UART: [art] Derive CDI
2,991,574 UART: [art] Store in in slot 0x4
3,077,503 UART: [art] Derive Key Pair
3,077,863 UART: [art] Store priv key in slot 0x5
3,091,097 UART: [art] Derive Key Pair - Done
3,105,970 UART: [art] Signing Cert with AUTHO
3,106,450 UART: RITY.KEYID = 7
3,121,776 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,541 UART: [art] PUB.X = 3FD7882490CC60BA790134F83BF7D468F613037FBDDD6912842AC46D417D78611178D5F51ADDE025C8B5F7A1D09F21A1
3,129,309 UART: [art] PUB.Y = 7852A5E337924CD3A5B5CD81156E22D1D9EDA430EF6588195C0CC3227221B390F2A62B018EA8BF84B1D3E7EE19049BC6
3,136,256 UART: [art] SIG.R = 55DEA1769C49B60919BD7FE01ACD319592D8D7B2B6C573609A0FCD4423D9A7F23D194CD8DAC5144D1FFEAB5B68FA96B9
3,143,038 UART: [art] SIG.S = 092E006C847F3F750EBA63FE55B96A414ABB018FE70EBE7421DE016A7FC46191ED2535F7C5EEDCBA0D82F98AAB33D532
3,167,047 UART: Caliptra RT
3,167,300 UART: [state] CFI Enabled
3,274,839 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,905 UART: [rt]cmd =0x44504543, len=96
3,338,926 >>> mbox cmd response data (56 bytes)
3,338,927 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,368,874 UART: [rt]cmd =0x44504543, len=92
3,560,356 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,484 >>> mbox cmd response data (12 bytes)
1,140,485 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,639 >>> mbox cmd response: success
2,625,639 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,686,817 UART:
2,686,833 UART: Running Caliptra FMC ...
2,687,241 UART:
2,687,295 UART: [state] CFI Enabled
2,697,580 UART: [fht] FMC Alias Private Key: 7
2,805,353 UART: [art] Extend RT PCRs Done
2,805,781 UART: [art] Lock RT PCRs Done
2,807,111 UART: [art] Populate DV Done
2,815,200 UART: [fht] FMC Alias Private Key: 7
2,816,152 UART: [art] Derive CDI
2,816,432 UART: [art] Store in in slot 0x4
2,901,935 UART: [art] Derive Key Pair
2,902,295 UART: [art] Store priv key in slot 0x5
2,915,433 UART: [art] Derive Key Pair - Done
2,930,271 UART: [art] Signing Cert with AUTHO
2,930,751 UART: RITY.KEYID = 7
2,945,975 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,740 UART: [art] PUB.X = 999A2DBA87E682BB7C64FE5B929FBE7F43DEC8904267E19DF20924FF37968BA99E87A82EC3458ABDF20B44B112CD37ED
2,953,520 UART: [art] PUB.Y = 569B72ABA5369C84157B324BE73BE27A145EDCF10106D0565750359D4364E0DD802F7284388501F4011AF25A1D0766FC
2,960,449 UART: [art] SIG.R = 4E2506F878436DEAC15B961AEEA97366AC76B8AFB8061D85478811CC48A80EC6BDC097FF23CEFD8316D33CF73326C695
2,967,220 UART: [art] SIG.S = 4D4A98656C2D4B5018A0F535187081841C62416EC2B21C0522642CCDD1D66CFCDB519840387B825A25CA1C281AC80A5C
2,991,289 UART: Caliptra RT
2,991,542 UART: [state] CFI Enabled
3,112,269 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,245 UART: [rt]cmd =0x44504543, len=92
3,335,205 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,440 ready_for_fw is high
1,055,440 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,871 >>> mbox cmd response: success
2,621,871 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,683,177 UART:
2,683,193 UART: Running Caliptra FMC ...
2,683,601 UART:
2,683,655 UART: [state] CFI Enabled
2,694,132 UART: [fht] FMC Alias Private Key: 7
2,802,693 UART: [art] Extend RT PCRs Done
2,803,121 UART: [art] Lock RT PCRs Done
2,805,005 UART: [art] Populate DV Done
2,812,958 UART: [fht] FMC Alias Private Key: 7
2,814,050 UART: [art] Derive CDI
2,814,330 UART: [art] Store in in slot 0x4
2,900,317 UART: [art] Derive Key Pair
2,900,677 UART: [art] Store priv key in slot 0x5
2,913,737 UART: [art] Derive Key Pair - Done
2,928,687 UART: [art] Signing Cert with AUTHO
2,929,167 UART: RITY.KEYID = 7
2,944,255 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,020 UART: [art] PUB.X = 999A2DBA87E682BB7C64FE5B929FBE7F43DEC8904267E19DF20924FF37968BA99E87A82EC3458ABDF20B44B112CD37ED
2,951,800 UART: [art] PUB.Y = 569B72ABA5369C84157B324BE73BE27A145EDCF10106D0565750359D4364E0DD802F7284388501F4011AF25A1D0766FC
2,958,729 UART: [art] SIG.R = 4E2506F878436DEAC15B961AEEA97366AC76B8AFB8061D85478811CC48A80EC6BDC097FF23CEFD8316D33CF73326C695
2,965,500 UART: [art] SIG.S = 4D4A98656C2D4B5018A0F535187081841C62416EC2B21C0522642CCDD1D66CFCDB519840387B825A25CA1C281AC80A5C
2,989,191 UART: Caliptra RT
2,989,444 UART: [state] CFI Enabled
3,097,491 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,951 UART: [rt]cmd =0x4d454153, len=108
3,148,928 >>> mbox cmd response data (12 bytes)
3,148,929 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,178,928 UART: [rt]cmd =0x44504543, len=92
3,370,836 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,996 ready_for_fw is high
1,055,996 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,151 >>> mbox cmd response: success
2,623,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,686,123 UART:
2,686,139 UART: Running Caliptra FMC ...
2,686,547 UART:
2,686,601 UART: [state] CFI Enabled
2,697,006 UART: [fht] FMC Alias Private Key: 7
2,805,077 UART: [art] Extend RT PCRs Done
2,805,505 UART: [art] Lock RT PCRs Done
2,806,991 UART: [art] Populate DV Done
2,815,116 UART: [fht] FMC Alias Private Key: 7
2,816,138 UART: [art] Derive CDI
2,816,418 UART: [art] Store in in slot 0x4
2,901,711 UART: [art] Derive Key Pair
2,902,071 UART: [art] Store priv key in slot 0x5
2,914,619 UART: [art] Derive Key Pair - Done
2,929,319 UART: [art] Signing Cert with AUTHO
2,929,799 UART: RITY.KEYID = 7
2,944,635 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,400 UART: [art] PUB.X = 999A2DBA87E682BB7C64FE5B929FBE7F43DEC8904267E19DF20924FF37968BA99E87A82EC3458ABDF20B44B112CD37ED
2,952,180 UART: [art] PUB.Y = 569B72ABA5369C84157B324BE73BE27A145EDCF10106D0565750359D4364E0DD802F7284388501F4011AF25A1D0766FC
2,959,109 UART: [art] SIG.R = 4E2506F878436DEAC15B961AEEA97366AC76B8AFB8061D85478811CC48A80EC6BDC097FF23CEFD8316D33CF73326C695
2,965,880 UART: [art] SIG.S = 4D4A98656C2D4B5018A0F535187081841C62416EC2B21C0522642CCDD1D66CFCDB519840387B825A25CA1C281AC80A5C
2,989,819 UART: Caliptra RT
2,990,072 UART: [state] CFI Enabled
3,097,137 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,973 UART: [rt]cmd =0x44504543, len=96
3,160,504 >>> mbox cmd response data (56 bytes)
3,160,505 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,496 UART: [rt]cmd =0x44504543, len=92
3,381,658 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.67s
Truncated 4783 bytes from beginning
7
3,125,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,311 UART: [art] PUB.X = E0AEFFAD598DB8A4B4B04D31B32EC2A57564A9FB0066C9270880DAD059DBA197EB60BBEEEC2B0C54DAA4EDB81B1B5216
3,133,081 UART: [art] PUB.Y = 6F00A6AF20BE363560E32267939D8DADB15F3CA7934C9B8FBB85BD4705D463EBFCB2B03C3DE1FB9A4FCAB9C86500A231
3,140,004 UART: [art] SIG.R = CE30A67C68FF4D0741BF99BB7CD856FD35DA3B454C71BC507FDA26105CA201365414F6E11FE4DD3575D077F174E1D20D
3,146,777 UART: [art] SIG.S = C6B87E4053F5777A9E1CD9FBABEB91C2867AE00A5E702C1D19696A50C09FF140EBE0B4AE2C375194CCF82C2C1A364CF3
3,171,027 UART: Caliptra RT
3,171,372 UART: [state] CFI Enabled
3,291,372 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,726 UART: [rt]cmd =0x44504543, len=92
3,513,207 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,828 UART: [state] WD Timer not started. Device not locked for debugging
88,103 UART: [kat] SHA2-256
891,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,782 UART: [kat] ++
895,934 UART: [kat] sha1
900,286 UART: [kat] SHA2-256
902,226 UART: [kat] SHA2-384
905,083 UART: [kat] SHA2-512-ACC
906,984 UART: [kat] ECC-384
916,747 UART: [kat] HMAC-384Kdf
921,427 UART: [kat] LMS
1,169,739 UART: [kat] --
1,170,748 UART: [cold-reset] ++
1,171,162 UART: [fht] FHT @ 0x50003400
1,173,906 UART: [idev] ++
1,174,074 UART: [idev] CDI.KEYID = 6
1,174,435 UART: [idev] SUBJECT.KEYID = 7
1,174,860 UART: [idev] UDS.KEYID = 0
1,175,206 ready_for_fw is high
1,175,206 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,012 UART: [idev] Erasing UDS.KEYID = 0
1,200,178 UART: [idev] Sha1 KeyId Algorithm
1,208,896 UART: [idev] --
1,209,825 UART: [ldev] ++
1,209,993 UART: [ldev] CDI.KEYID = 6
1,210,357 UART: [ldev] SUBJECT.KEYID = 5
1,210,784 UART: [ldev] AUTHORITY.KEYID = 7
1,211,247 UART: [ldev] FE.KEYID = 1
1,216,323 UART: [ldev] Erasing FE.KEYID = 1
1,241,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,595 UART: [ldev] --
1,281,057 UART: [fwproc] Wait for Commands...
1,281,792 UART: [fwproc] Recv command 0x46574c44
1,282,525 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,891 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,383 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,692 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,504 >>> mbox cmd response: success
2,771,504 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,772,565 UART: [afmc] ++
2,772,733 UART: [afmc] CDI.KEYID = 6
2,773,096 UART: [afmc] SUBJECT.KEYID = 7
2,773,522 UART: [afmc] AUTHORITY.KEYID = 5
2,808,839 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,254 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,983 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,866 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,585 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,358 UART: [afmc] --
2,852,242 UART: [cold-reset] --
2,852,956 UART: [state] Locking Datavault
2,854,153 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,757 UART: [state] Locking ICCM
2,855,189 UART: [exit] Launching FMC @ 0x40000130
2,860,518 UART:
2,860,534 UART: Running Caliptra FMC ...
2,860,942 UART:
2,861,085 UART: [state] CFI Enabled
2,871,822 UART: [fht] FMC Alias Private Key: 7
2,980,305 UART: [art] Extend RT PCRs Done
2,980,733 UART: [art] Lock RT PCRs Done
2,981,925 UART: [art] Populate DV Done
2,990,254 UART: [fht] FMC Alias Private Key: 7
2,991,390 UART: [art] Derive CDI
2,991,670 UART: [art] Store in in slot 0x4
3,077,495 UART: [art] Derive Key Pair
3,077,855 UART: [art] Store priv key in slot 0x5
3,090,883 UART: [art] Derive Key Pair - Done
3,105,899 UART: [art] Signing Cert with AUTHO
3,106,379 UART: RITY.KEYID = 7
3,121,525 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,290 UART: [art] PUB.X = E0AEFFAD598DB8A4B4B04D31B32EC2A57564A9FB0066C9270880DAD059DBA197EB60BBEEEC2B0C54DAA4EDB81B1B5216
3,129,060 UART: [art] PUB.Y = 6F00A6AF20BE363560E32267939D8DADB15F3CA7934C9B8FBB85BD4705D463EBFCB2B03C3DE1FB9A4FCAB9C86500A231
3,135,983 UART: [art] SIG.R = CE30A67C68FF4D0741BF99BB7CD856FD35DA3B454C71BC507FDA26105CA201365414F6E11FE4DD3575D077F174E1D20D
3,142,756 UART: [art] SIG.S = C6B87E4053F5777A9E1CD9FBABEB91C2867AE00A5E702C1D19696A50C09FF140EBE0B4AE2C375194CCF82C2C1A364CF3
3,166,576 UART: Caliptra RT
3,166,921 UART: [state] CFI Enabled
3,275,111 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,137 UART: [rt]cmd =0x4d454153, len=108
3,326,640 >>> mbox cmd response data (12 bytes)
3,326,641 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,674 UART: [rt]cmd =0x44504543, len=92
3,548,125 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,992 UART: [state] WD Timer not started. Device not locked for debugging
88,329 UART: [kat] SHA2-256
891,879 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,008 UART: [kat] ++
896,160 UART: [kat] sha1
900,424 UART: [kat] SHA2-256
902,364 UART: [kat] SHA2-384
904,967 UART: [kat] SHA2-512-ACC
906,868 UART: [kat] ECC-384
916,355 UART: [kat] HMAC-384Kdf
920,795 UART: [kat] LMS
1,169,107 UART: [kat] --
1,170,280 UART: [cold-reset] ++
1,170,756 UART: [fht] FHT @ 0x50003400
1,173,502 UART: [idev] ++
1,173,670 UART: [idev] CDI.KEYID = 6
1,174,031 UART: [idev] SUBJECT.KEYID = 7
1,174,456 UART: [idev] UDS.KEYID = 0
1,174,802 ready_for_fw is high
1,174,802 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,514 UART: [idev] Erasing UDS.KEYID = 0
1,199,686 UART: [idev] Sha1 KeyId Algorithm
1,208,658 UART: [idev] --
1,209,745 UART: [ldev] ++
1,209,913 UART: [ldev] CDI.KEYID = 6
1,210,277 UART: [ldev] SUBJECT.KEYID = 5
1,210,704 UART: [ldev] AUTHORITY.KEYID = 7
1,211,167 UART: [ldev] FE.KEYID = 1
1,216,545 UART: [ldev] Erasing FE.KEYID = 1
1,243,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,829 UART: [ldev] --
1,282,249 UART: [fwproc] Wait for Commands...
1,282,854 UART: [fwproc] Recv command 0x46574c44
1,283,587 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,425 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,734 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,658 >>> mbox cmd response: success
2,774,658 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,775,695 UART: [afmc] ++
2,775,863 UART: [afmc] CDI.KEYID = 6
2,776,226 UART: [afmc] SUBJECT.KEYID = 7
2,776,652 UART: [afmc] AUTHORITY.KEYID = 5
2,811,643 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,430 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,159 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,042 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,761 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,562 UART: [afmc] --
2,854,658 UART: [cold-reset] --
2,855,438 UART: [state] Locking Datavault
2,856,679 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,283 UART: [state] Locking ICCM
2,857,931 UART: [exit] Launching FMC @ 0x40000130
2,863,260 UART:
2,863,276 UART: Running Caliptra FMC ...
2,863,684 UART:
2,863,827 UART: [state] CFI Enabled
2,874,164 UART: [fht] FMC Alias Private Key: 7
2,982,639 UART: [art] Extend RT PCRs Done
2,983,067 UART: [art] Lock RT PCRs Done
2,984,667 UART: [art] Populate DV Done
2,992,918 UART: [fht] FMC Alias Private Key: 7
2,993,868 UART: [art] Derive CDI
2,994,148 UART: [art] Store in in slot 0x4
3,079,969 UART: [art] Derive Key Pair
3,080,329 UART: [art] Store priv key in slot 0x5
3,093,425 UART: [art] Derive Key Pair - Done
3,108,213 UART: [art] Signing Cert with AUTHO
3,108,693 UART: RITY.KEYID = 7
3,123,773 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,538 UART: [art] PUB.X = E0AEFFAD598DB8A4B4B04D31B32EC2A57564A9FB0066C9270880DAD059DBA197EB60BBEEEC2B0C54DAA4EDB81B1B5216
3,131,308 UART: [art] PUB.Y = 6F00A6AF20BE363560E32267939D8DADB15F3CA7934C9B8FBB85BD4705D463EBFCB2B03C3DE1FB9A4FCAB9C86500A231
3,138,231 UART: [art] SIG.R = CE30A67C68FF4D0741BF99BB7CD856FD35DA3B454C71BC507FDA26105CA201365414F6E11FE4DD3575D077F174E1D20D
3,145,004 UART: [art] SIG.S = C6B87E4053F5777A9E1CD9FBABEB91C2867AE00A5E702C1D19696A50C09FF140EBE0B4AE2C375194CCF82C2C1A364CF3
3,168,074 UART: Caliptra RT
3,168,419 UART: [state] CFI Enabled
3,275,929 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,189 UART: [rt]cmd =0x44504543, len=96
3,339,490 >>> mbox cmd response data (56 bytes)
3,339,491 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,369,536 UART: [rt]cmd =0x44504543, len=92
3,561,063 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,669 >>> mbox cmd response data (12 bytes)
1,140,670 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,124 >>> mbox cmd response: success
2,625,124 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,688,034 UART:
2,688,050 UART: Running Caliptra FMC ...
2,688,458 UART:
2,688,601 UART: [state] CFI Enabled
2,699,374 UART: [fht] FMC Alias Private Key: 7
2,807,793 UART: [art] Extend RT PCRs Done
2,808,221 UART: [art] Lock RT PCRs Done
2,809,887 UART: [art] Populate DV Done
2,818,274 UART: [fht] FMC Alias Private Key: 7
2,819,332 UART: [art] Derive CDI
2,819,612 UART: [art] Store in in slot 0x4
2,905,181 UART: [art] Derive Key Pair
2,905,541 UART: [art] Store priv key in slot 0x5
2,919,171 UART: [art] Derive Key Pair - Done
2,934,081 UART: [art] Signing Cert with AUTHO
2,934,561 UART: RITY.KEYID = 7
2,950,001 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,766 UART: [art] PUB.X = BD5568B6DD01179BE074C48A748122C3ED3696DDC69C9CBF04C4569153CCB233BEDCF0EA0C4ACBCA03E011052DFD5D09
2,957,538 UART: [art] PUB.Y = F2D39E3B2D25DB3B6192D564F6FA43A82A3F6FF067EA3D59E1524277C44DDD56006D1D3D3E404680BD64DACCC707D752
2,964,475 UART: [art] SIG.R = 88E0713A9FAD46614D6BFD92AC1F35750E9A04620B3E42885BE58A0C717E8B5FFD5E94F09E267CBCCB230713C9F8BC50
2,971,242 UART: [art] SIG.S = 993DF1D64942308EA2DE0CCF857378DF5F9EEE6780D2F0193CE57023185345B5ECEAEE09FAEBB6B1006161A216A4665B
2,995,015 UART: Caliptra RT
2,995,360 UART: [state] CFI Enabled
3,115,538 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,880 UART: [rt]cmd =0x44504543, len=92
3,337,952 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,973 ready_for_fw is high
1,055,973 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,978 >>> mbox cmd response: success
2,622,978 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,686,158 UART:
2,686,174 UART: Running Caliptra FMC ...
2,686,582 UART:
2,686,725 UART: [state] CFI Enabled
2,697,322 UART: [fht] FMC Alias Private Key: 7
2,805,389 UART: [art] Extend RT PCRs Done
2,805,817 UART: [art] Lock RT PCRs Done
2,807,407 UART: [art] Populate DV Done
2,815,570 UART: [fht] FMC Alias Private Key: 7
2,816,554 UART: [art] Derive CDI
2,816,834 UART: [art] Store in in slot 0x4
2,902,647 UART: [art] Derive Key Pair
2,903,007 UART: [art] Store priv key in slot 0x5
2,916,509 UART: [art] Derive Key Pair - Done
2,931,191 UART: [art] Signing Cert with AUTHO
2,931,671 UART: RITY.KEYID = 7
2,947,535 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,300 UART: [art] PUB.X = BD5568B6DD01179BE074C48A748122C3ED3696DDC69C9CBF04C4569153CCB233BEDCF0EA0C4ACBCA03E011052DFD5D09
2,955,072 UART: [art] PUB.Y = F2D39E3B2D25DB3B6192D564F6FA43A82A3F6FF067EA3D59E1524277C44DDD56006D1D3D3E404680BD64DACCC707D752
2,962,009 UART: [art] SIG.R = 88E0713A9FAD46614D6BFD92AC1F35750E9A04620B3E42885BE58A0C717E8B5FFD5E94F09E267CBCCB230713C9F8BC50
2,968,776 UART: [art] SIG.S = 993DF1D64942308EA2DE0CCF857378DF5F9EEE6780D2F0193CE57023185345B5ECEAEE09FAEBB6B1006161A216A4665B
2,992,509 UART: Caliptra RT
2,992,854 UART: [state] CFI Enabled
3,100,558 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,652 UART: [rt]cmd =0x4d454153, len=108
3,151,631 >>> mbox cmd response data (12 bytes)
3,151,632 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,181,393 UART: [rt]cmd =0x44504543, len=92
3,372,239 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,247 ready_for_fw is high
1,056,247 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,550 >>> mbox cmd response: success
2,624,550 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,686,606 UART:
2,686,622 UART: Running Caliptra FMC ...
2,687,030 UART:
2,687,173 UART: [state] CFI Enabled
2,698,050 UART: [fht] FMC Alias Private Key: 7
2,806,485 UART: [art] Extend RT PCRs Done
2,806,913 UART: [art] Lock RT PCRs Done
2,808,333 UART: [art] Populate DV Done
2,816,468 UART: [fht] FMC Alias Private Key: 7
2,817,572 UART: [art] Derive CDI
2,817,852 UART: [art] Store in in slot 0x4
2,903,249 UART: [art] Derive Key Pair
2,903,609 UART: [art] Store priv key in slot 0x5
2,916,947 UART: [art] Derive Key Pair - Done
2,931,437 UART: [art] Signing Cert with AUTHO
2,931,917 UART: RITY.KEYID = 7
2,947,273 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,038 UART: [art] PUB.X = BD5568B6DD01179BE074C48A748122C3ED3696DDC69C9CBF04C4569153CCB233BEDCF0EA0C4ACBCA03E011052DFD5D09
2,954,810 UART: [art] PUB.Y = F2D39E3B2D25DB3B6192D564F6FA43A82A3F6FF067EA3D59E1524277C44DDD56006D1D3D3E404680BD64DACCC707D752
2,961,747 UART: [art] SIG.R = 88E0713A9FAD46614D6BFD92AC1F35750E9A04620B3E42885BE58A0C717E8B5FFD5E94F09E267CBCCB230713C9F8BC50
2,968,514 UART: [art] SIG.S = 993DF1D64942308EA2DE0CCF857378DF5F9EEE6780D2F0193CE57023185345B5ECEAEE09FAEBB6B1006161A216A4665B
2,992,827 UART: Caliptra RT
2,993,172 UART: [state] CFI Enabled
3,100,730 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,780 UART: [rt]cmd =0x44504543, len=96
3,165,145 >>> mbox cmd response data (56 bytes)
3,165,146 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,195,289 UART: [rt]cmd =0x44504543, len=92
3,386,979 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Unprovisioned
86,137 UART: [state] DebugLocked = No
86,627 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,279 UART: [kat] SHA2-256
882,210 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,325 UART: [kat] ++
886,477 UART: [kat] sha1
890,559 UART: [kat] SHA2-256
892,497 UART: [kat] SHA2-384
895,126 UART: [kat] SHA2-512-ACC
897,027 UART: [kat] ECC-384
902,482 UART: [kat] HMAC-384Kdf
907,232 UART: [kat] LMS
1,475,428 UART: [kat] --
1,476,083 UART: [cold-reset] ++
1,476,561 UART: [fht] Storing FHT @ 0x50003400
1,479,350 UART: [idev] ++
1,479,518 UART: [idev] CDI.KEYID = 6
1,479,878 UART: [idev] SUBJECT.KEYID = 7
1,480,302 UART: [idev] UDS.KEYID = 0
1,480,647 ready_for_fw is high
1,480,647 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,036 UART: [idev] Erasing UDS.KEYID = 0
1,504,360 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,074 UART: [idev] --
1,514,101 UART: [ldev] ++
1,514,269 UART: [ldev] CDI.KEYID = 6
1,514,632 UART: [ldev] SUBJECT.KEYID = 5
1,515,058 UART: [ldev] AUTHORITY.KEYID = 7
1,515,521 UART: [ldev] FE.KEYID = 1
1,520,517 UART: [ldev] Erasing FE.KEYID = 1
1,546,284 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,988 UART: [ldev] --
1,585,447 UART: [fwproc] Waiting for Commands...
1,586,128 UART: [fwproc] Received command 0x46574c44
1,586,919 UART: [fwproc] Received Image of size 114332 bytes
2,884,685 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,777 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,129 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,870 >>> mbox cmd response: success
3,076,870 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,077,958 UART: [afmc] ++
3,078,126 UART: [afmc] CDI.KEYID = 6
3,078,488 UART: [afmc] SUBJECT.KEYID = 7
3,078,913 UART: [afmc] AUTHORITY.KEYID = 5
3,114,212 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,456 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,236 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,964 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,849 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,539 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,582 UART: [afmc] --
3,157,572 UART: [cold-reset] --
3,158,390 UART: [state] Locking Datavault
3,159,817 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,421 UART: [state] Locking ICCM
3,160,893 UART: [exit] Launching FMC @ 0x40000130
3,166,222 UART:
3,166,238 UART: Running Caliptra FMC ...
3,166,646 UART:
3,166,700 UART: [state] CFI Enabled
3,177,263 UART: [fht] FMC Alias Private Key: 7
3,285,194 UART: [art] Extend RT PCRs Done
3,285,622 UART: [art] Lock RT PCRs Done
3,286,904 UART: [art] Populate DV Done
3,295,311 UART: [fht] FMC Alias Private Key: 7
3,296,363 UART: [art] Derive CDI
3,296,643 UART: [art] Store in in slot 0x4
3,382,218 UART: [art] Derive Key Pair
3,382,578 UART: [art] Store priv key in slot 0x5
3,395,590 UART: [art] Derive Key Pair - Done
3,410,709 UART: [art] Signing Cert with AUTHO
3,411,189 UART: RITY.KEYID = 7
3,426,325 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,090 UART: [art] PUB.X = 0BBE16E48F1C821947C7569C8822E3CAA816C60F6340965FB3ECCACC9388566EA41E8674D91950BC800D21082FB2AD35
3,433,852 UART: [art] PUB.Y = 39EA1E9C3D63015113D4BC88F6FFB88168B7B7EA1B7845A2CE370B637BC889676794C36D3F6020ABF83A14F85695977D
3,440,798 UART: [art] SIG.R = 3D69D5F87CF987468FAE4EC78406C883D23A99AAF7D1CB93E6D1853987CEDCFFE2561FCA7B6611D2093BBADF3207AA18
3,447,577 UART: [art] SIG.S = D3AACEA3FD6335EA4149E463ECC3EE92C75FFC5B98392DE81486FABCDC7F485A1DD44060A92FD7DF7362CCCB55845A83
3,471,776 UART: Caliptra RT
3,472,029 UART: [state] CFI Enabled
3,579,950 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,208 UART: [rt]cmd =0x43455252, len=4
3,621,004 >>> mbox cmd response data (783 bytes)
3,621,005 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,650,790 UART: [rt]cmd =0x44504543, len=92
3,833,774 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,419 ready_for_fw is high
1,362,419 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,426 >>> mbox cmd response: success
2,925,426 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,987,480 UART:
2,987,496 UART: Running Caliptra FMC ...
2,987,904 UART:
2,987,958 UART: [state] CFI Enabled
2,998,569 UART: [fht] FMC Alias Private Key: 7
3,106,532 UART: [art] Extend RT PCRs Done
3,106,960 UART: [art] Lock RT PCRs Done
3,108,246 UART: [art] Populate DV Done
3,116,443 UART: [fht] FMC Alias Private Key: 7
3,117,505 UART: [art] Derive CDI
3,117,785 UART: [art] Store in in slot 0x4
3,203,212 UART: [art] Derive Key Pair
3,203,572 UART: [art] Store priv key in slot 0x5
3,216,984 UART: [art] Derive Key Pair - Done
3,231,556 UART: [art] Signing Cert with AUTHO
3,232,036 UART: RITY.KEYID = 7
3,247,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,931 UART: [art] PUB.X = 89D0525531B1B8835191745F6AA33464084CB51F803C4E74C708E703A66EE5F0532A11CDFDB2446F3673F3B35B6C49FB
3,254,690 UART: [art] PUB.Y = 23D23A84AF2B9663B430C1A4883C73861AEA0670472DAD4201E5E4658D816D00D1966150CA37F248EEF5CA2BA76BC2F8
3,261,616 UART: [art] SIG.R = E903DDA18EE9022D984B9646B07D81F8C721B2632B8D6BEFAD8675D479BC3EE6088AD6F656C8767F564A78EC385D5A19
3,268,385 UART: [art] SIG.S = 0A42A1FA6B41F9D9056621E62EF62EFBE99BA3BA7D12FA0479C771BC1073085FB1772172E8B5057036AB6453F876F534
3,291,857 UART: Caliptra RT
3,292,110 UART: [state] CFI Enabled
3,400,793 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,953 UART: [rt]cmd =0x43455252, len=4
3,441,745 >>> mbox cmd response data (783 bytes)
3,441,746 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,433 UART: [rt]cmd =0x44504543, len=92
3,654,161 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,789 UART: [state] LifecycleState = Unprovisioned
86,444 UART: [state] DebugLocked = No
87,178 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,862 UART: [kat] SHA2-256
882,793 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,908 UART: [kat] ++
887,060 UART: [kat] sha1
891,218 UART: [kat] SHA2-256
893,156 UART: [kat] SHA2-384
895,921 UART: [kat] SHA2-512-ACC
897,822 UART: [kat] ECC-384
903,663 UART: [kat] HMAC-384Kdf
908,363 UART: [kat] LMS
1,476,559 UART: [kat] --
1,477,420 UART: [cold-reset] ++
1,477,838 UART: [fht] Storing FHT @ 0x50003400
1,480,589 UART: [idev] ++
1,480,757 UART: [idev] CDI.KEYID = 6
1,481,117 UART: [idev] SUBJECT.KEYID = 7
1,481,541 UART: [idev] UDS.KEYID = 0
1,481,886 ready_for_fw is high
1,481,886 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,713 UART: [idev] Erasing UDS.KEYID = 0
1,506,875 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,649 UART: [idev] --
1,516,656 UART: [ldev] ++
1,516,824 UART: [ldev] CDI.KEYID = 6
1,517,187 UART: [ldev] SUBJECT.KEYID = 5
1,517,613 UART: [ldev] AUTHORITY.KEYID = 7
1,518,076 UART: [ldev] FE.KEYID = 1
1,523,252 UART: [ldev] Erasing FE.KEYID = 1
1,549,011 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,901 UART: [ldev] --
1,588,374 UART: [fwproc] Waiting for Commands...
1,589,023 UART: [fwproc] Received command 0x46574c44
1,589,814 UART: [fwproc] Received Image of size 114332 bytes
2,888,092 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,368 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,720 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,561 >>> mbox cmd response: success
3,080,561 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,081,687 UART: [afmc] ++
3,081,855 UART: [afmc] CDI.KEYID = 6
3,082,217 UART: [afmc] SUBJECT.KEYID = 7
3,082,642 UART: [afmc] AUTHORITY.KEYID = 5
3,117,311 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,197 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,977 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,705 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,590 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,280 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,157 UART: [afmc] --
3,160,039 UART: [cold-reset] --
3,160,779 UART: [state] Locking Datavault
3,162,014 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,618 UART: [state] Locking ICCM
3,163,128 UART: [exit] Launching FMC @ 0x40000130
3,168,457 UART:
3,168,473 UART: Running Caliptra FMC ...
3,168,881 UART:
3,169,024 UART: [state] CFI Enabled
3,179,939 UART: [fht] FMC Alias Private Key: 7
3,288,176 UART: [art] Extend RT PCRs Done
3,288,604 UART: [art] Lock RT PCRs Done
3,289,864 UART: [art] Populate DV Done
3,297,939 UART: [fht] FMC Alias Private Key: 7
3,298,909 UART: [art] Derive CDI
3,299,189 UART: [art] Store in in slot 0x4
3,384,996 UART: [art] Derive Key Pair
3,385,356 UART: [art] Store priv key in slot 0x5
3,398,812 UART: [art] Derive Key Pair - Done
3,413,656 UART: [art] Signing Cert with AUTHO
3,414,136 UART: RITY.KEYID = 7
3,429,360 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,125 UART: [art] PUB.X = 1034C954D3D52AA67D052B1C33FE0073BB261E3738C9875FEC417AD9E6095C102F5D795CCDF062C54569C5C0331B316F
3,436,869 UART: [art] PUB.Y = BF2DCC2077B18DB0F0F12558C4733B6CA6035810FEF1695C7FF6A6B6479119FFCD86CEF1A4875009336AAA419E1C2A44
3,443,823 UART: [art] SIG.R = 6B102D1E984E00FE0B887AB16A7EC4B3D4B9DE614CD88B0FEC78F3F3D0570D271218A32050B5A5FF2A314302242E178B
3,450,567 UART: [art] SIG.S = 7477A6433B3543C5F82895ADFADCA3625058378B7FE22F6EE28540C30DED7DD9D8871FF44458279E656AB252CA5786D1
3,473,763 UART: Caliptra RT
3,474,108 UART: [state] CFI Enabled
3,581,828 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,210 UART: [rt]cmd =0x43455252, len=4
3,623,184 >>> mbox cmd response data (782 bytes)
3,623,185 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,124 UART: [rt]cmd =0x44504543, len=92
3,837,677 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,056 ready_for_fw is high
1,363,056 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,679 >>> mbox cmd response: success
2,929,679 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,991,743 UART:
2,991,759 UART: Running Caliptra FMC ...
2,992,167 UART:
2,992,310 UART: [state] CFI Enabled
3,002,909 UART: [fht] FMC Alias Private Key: 7
3,110,834 UART: [art] Extend RT PCRs Done
3,111,262 UART: [art] Lock RT PCRs Done
3,112,782 UART: [art] Populate DV Done
3,120,911 UART: [fht] FMC Alias Private Key: 7
3,121,871 UART: [art] Derive CDI
3,122,151 UART: [art] Store in in slot 0x4
3,207,446 UART: [art] Derive Key Pair
3,207,806 UART: [art] Store priv key in slot 0x5
3,220,938 UART: [art] Derive Key Pair - Done
3,236,069 UART: [art] Signing Cert with AUTHO
3,236,549 UART: RITY.KEYID = 7
3,251,669 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,434 UART: [art] PUB.X = F9FB06E1456625CFB29C8705639991B47D9C3EEB0A54E45EAA84A65ACF62AB4D5C065924600BEB269E5C55AC02C98642
3,259,194 UART: [art] PUB.Y = CBF303CDC52A6C09EEB9328EE95B3057A4DBCCCA4A10027DAC95A6C72730B289FD0BFEA9326F303E9D98089298D9F803
3,266,142 UART: [art] SIG.R = 84E3839F310EBA5AE784F0849D1B57A33FADC48E9849B221B29D80E1D50439B3B6585353C4C78A979184CB75DC0E44B7
3,272,905 UART: [art] SIG.S = F16FE1864A29472C21A4E144FE48DF6AECA43AB2613415722808B45D9CFEABD5FE168DAAA98261E10875FD5B6D84FAEB
3,297,210 UART: Caliptra RT
3,297,555 UART: [state] CFI Enabled
3,405,763 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,271 UART: [rt]cmd =0x43455252, len=4
3,447,270 >>> mbox cmd response data (784 bytes)
3,447,271 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,477,228 UART: [rt]cmd =0x44504543, len=92
3,659,974 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,550 UART: [state] LifecycleState = Unprovisioned
86,205 UART: [state] DebugLocked = No
86,783 UART: [state] WD Timer not started. Device not locked for debugging
88,122 UART: [kat] SHA2-256
893,772 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,897 UART: [kat] ++
898,049 UART: [kat] sha1
902,381 UART: [kat] SHA2-256
904,321 UART: [kat] SHA2-384
907,068 UART: [kat] SHA2-512-ACC
908,969 UART: [kat] ECC-384
918,366 UART: [kat] HMAC-384Kdf
923,016 UART: [kat] LMS
1,171,344 UART: [kat] --
1,172,417 UART: [cold-reset] ++
1,172,853 UART: [fht] FHT @ 0x50003400
1,175,452 UART: [idev] ++
1,175,620 UART: [idev] CDI.KEYID = 6
1,175,980 UART: [idev] SUBJECT.KEYID = 7
1,176,404 UART: [idev] UDS.KEYID = 0
1,176,749 ready_for_fw is high
1,176,749 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,350 UART: [idev] Erasing UDS.KEYID = 0
1,200,947 UART: [idev] Sha1 KeyId Algorithm
1,209,601 UART: [idev] --
1,210,641 UART: [ldev] ++
1,210,809 UART: [ldev] CDI.KEYID = 6
1,211,172 UART: [ldev] SUBJECT.KEYID = 5
1,211,598 UART: [ldev] AUTHORITY.KEYID = 7
1,212,061 UART: [ldev] FE.KEYID = 1
1,217,321 UART: [ldev] Erasing FE.KEYID = 1
1,243,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,479 UART: [ldev] --
1,282,830 UART: [fwproc] Wait for Commands...
1,283,454 UART: [fwproc] Recv command 0x46574c44
1,284,182 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,910 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,214 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,937 >>> mbox cmd response: success
2,772,937 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,773,995 UART: [afmc] ++
2,774,163 UART: [afmc] CDI.KEYID = 6
2,774,525 UART: [afmc] SUBJECT.KEYID = 7
2,774,950 UART: [afmc] AUTHORITY.KEYID = 5
2,811,257 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,448 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,176 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,061 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,780 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,714 UART: [afmc] --
2,854,814 UART: [cold-reset] --
2,855,806 UART: [state] Locking Datavault
2,856,727 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,331 UART: [state] Locking ICCM
2,857,753 UART: [exit] Launching FMC @ 0x40000130
2,863,082 UART:
2,863,098 UART: Running Caliptra FMC ...
2,863,506 UART:
2,863,560 UART: [state] CFI Enabled
2,874,127 UART: [fht] FMC Alias Private Key: 7
2,982,050 UART: [art] Extend RT PCRs Done
2,982,478 UART: [art] Lock RT PCRs Done
2,983,940 UART: [art] Populate DV Done
2,992,391 UART: [fht] FMC Alias Private Key: 7
2,993,527 UART: [art] Derive CDI
2,993,807 UART: [art] Store in in slot 0x4
3,079,516 UART: [art] Derive Key Pair
3,079,876 UART: [art] Store priv key in slot 0x5
3,092,824 UART: [art] Derive Key Pair - Done
3,107,574 UART: [art] Signing Cert with AUTHO
3,108,054 UART: RITY.KEYID = 7
3,123,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,311 UART: [art] PUB.X = BCFFB0523B7DB996A01B8EBAF1056A8BF24D5F3343C1E02D1656B951A0859B71FE6F494D40FA0E6DD52F29DE9F742BFA
3,131,095 UART: [art] PUB.Y = 5D2A4A0A1F0D3163BDA15A198443862FFD557DE6AC3DE1E00AE6F925E3CC7D1572E3C20FC29EE57567E9A7DBBC80E6E3
3,138,053 UART: [art] SIG.R = F1017EE796477FA87C4593489802501216A20DE92D193EC8897A5047CF344C94EE7C2D4BCDEE2EF6E86D696FD81FC47E
3,144,820 UART: [art] SIG.S = 4290AE226280407A04EC1209A2A9904A814B1CAF45C5996C5E87F3A55A38D3E2C41F59D5C927D0D2EF2BD42BD8D001D2
3,168,902 UART: Caliptra RT
3,169,155 UART: [state] CFI Enabled
3,277,550 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,110 UART: [rt]cmd =0x43455252, len=4
3,318,872 >>> mbox cmd response data (783 bytes)
3,318,873 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,746 UART: [rt]cmd =0x44504543, len=92
3,531,593 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,003 ready_for_fw is high
1,060,003 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,630 >>> mbox cmd response: success
2,625,630 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,687,484 UART:
2,687,500 UART: Running Caliptra FMC ...
2,687,908 UART:
2,687,962 UART: [state] CFI Enabled
2,698,385 UART: [fht] FMC Alias Private Key: 7
2,805,894 UART: [art] Extend RT PCRs Done
2,806,322 UART: [art] Lock RT PCRs Done
2,807,926 UART: [art] Populate DV Done
2,816,335 UART: [fht] FMC Alias Private Key: 7
2,817,439 UART: [art] Derive CDI
2,817,719 UART: [art] Store in in slot 0x4
2,903,630 UART: [art] Derive Key Pair
2,903,990 UART: [art] Store priv key in slot 0x5
2,917,466 UART: [art] Derive Key Pair - Done
2,931,926 UART: [art] Signing Cert with AUTHO
2,932,406 UART: RITY.KEYID = 7
2,947,768 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,533 UART: [art] PUB.X = 6F227A31652B6F7F3AB73F638C19A59E7214791A8B5C1E2D9E32C07C0EE588DE09D02F4FC93C2E02178F611717C68685
2,955,294 UART: [art] PUB.Y = B73D8F0E8F90189B8712B2F6A13802145532CE1349922B9ACD13E4F0EB847A61954AC294CB996EAF77D6B8AD1E46F5A1
2,962,244 UART: [art] SIG.R = CFE1ACC213518F29BBED240B9CD260EBAC7AB4A09BB4196AFE303EF72BB38C3C7116DC7DAEC49357F825C5291DBBE653
2,969,037 UART: [art] SIG.S = 9A0C525A3A344D66E069097C6A2581839328687ADA53CBDF415D257B8CEDA753739AE216A8B3085D029ADA167B1A6558
2,992,558 UART: Caliptra RT
2,992,811 UART: [state] CFI Enabled
3,100,517 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,971 UART: [rt]cmd =0x43455252, len=4
3,141,924 >>> mbox cmd response data (784 bytes)
3,141,925 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,932 UART: [rt]cmd =0x44504543, len=92
3,355,391 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,747 UART: [state] LifecycleState = Unprovisioned
86,402 UART: [state] DebugLocked = No
86,910 UART: [state] WD Timer not started. Device not locked for debugging
88,213 UART: [kat] SHA2-256
893,863 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,988 UART: [kat] ++
898,140 UART: [kat] sha1
902,304 UART: [kat] SHA2-256
904,244 UART: [kat] SHA2-384
906,919 UART: [kat] SHA2-512-ACC
908,820 UART: [kat] ECC-384
918,421 UART: [kat] HMAC-384Kdf
923,131 UART: [kat] LMS
1,171,459 UART: [kat] --
1,172,490 UART: [cold-reset] ++
1,172,952 UART: [fht] FHT @ 0x50003400
1,175,589 UART: [idev] ++
1,175,757 UART: [idev] CDI.KEYID = 6
1,176,117 UART: [idev] SUBJECT.KEYID = 7
1,176,541 UART: [idev] UDS.KEYID = 0
1,176,886 ready_for_fw is high
1,176,886 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,727 UART: [idev] Erasing UDS.KEYID = 0
1,201,736 UART: [idev] Sha1 KeyId Algorithm
1,210,376 UART: [idev] --
1,211,558 UART: [ldev] ++
1,211,726 UART: [ldev] CDI.KEYID = 6
1,212,089 UART: [ldev] SUBJECT.KEYID = 5
1,212,515 UART: [ldev] AUTHORITY.KEYID = 7
1,212,978 UART: [ldev] FE.KEYID = 1
1,218,190 UART: [ldev] Erasing FE.KEYID = 1
1,244,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,010 UART: [ldev] --
1,284,311 UART: [fwproc] Wait for Commands...
1,284,923 UART: [fwproc] Recv command 0x46574c44
1,285,651 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,177 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,481 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,350 >>> mbox cmd response: success
2,776,350 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,777,396 UART: [afmc] ++
2,777,564 UART: [afmc] CDI.KEYID = 6
2,777,926 UART: [afmc] SUBJECT.KEYID = 7
2,778,351 UART: [afmc] AUTHORITY.KEYID = 5
2,813,770 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,453 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,201 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,929 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,814 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,533 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,319 UART: [afmc] --
2,857,373 UART: [cold-reset] --
2,858,029 UART: [state] Locking Datavault
2,859,090 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,694 UART: [state] Locking ICCM
2,860,206 UART: [exit] Launching FMC @ 0x40000130
2,865,535 UART:
2,865,551 UART: Running Caliptra FMC ...
2,865,959 UART:
2,866,102 UART: [state] CFI Enabled
2,876,719 UART: [fht] FMC Alias Private Key: 7
2,984,286 UART: [art] Extend RT PCRs Done
2,984,714 UART: [art] Lock RT PCRs Done
2,986,428 UART: [art] Populate DV Done
2,994,831 UART: [fht] FMC Alias Private Key: 7
2,996,007 UART: [art] Derive CDI
2,996,287 UART: [art] Store in in slot 0x4
3,081,992 UART: [art] Derive Key Pair
3,082,352 UART: [art] Store priv key in slot 0x5
3,095,622 UART: [art] Derive Key Pair - Done
3,110,354 UART: [art] Signing Cert with AUTHO
3,110,834 UART: RITY.KEYID = 7
3,126,404 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,169 UART: [art] PUB.X = 7AADEFAA29B2B6C7B817D2107D92C9CA9623853E2311D522827BF72407A5606B40CA51864DA044B474EDB89C2E48E4E6
3,133,942 UART: [art] PUB.Y = A024EF3445192DB4D0044F4E4A3F868A154AB323446044DFA07A01FFD2C55EA71864A8235DE12E6BF3AE445670B24DC4
3,140,892 UART: [art] SIG.R = 17127AF1D3F2D8E59464E3084A516EFF78EF191BA4CE81CA572F6F228489B1A606A08161ABC823917B36FAB634237C27
3,147,658 UART: [art] SIG.S = 23FC754524BD2D2D63B5872A69B72EFD458460463659021DFBD7553DE0FBFCC9ED6084F0DF43CD42FD4AE8CC1EE6B473
3,171,516 UART: Caliptra RT
3,171,861 UART: [state] CFI Enabled
3,281,156 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,660 UART: [rt]cmd =0x43455252, len=4
3,322,502 >>> mbox cmd response data (782 bytes)
3,322,503 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,352,608 UART: [rt]cmd =0x44504543, len=92
3,537,489 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,040 ready_for_fw is high
1,060,040 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,795 >>> mbox cmd response: success
2,626,795 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,687,881 UART:
2,687,897 UART: Running Caliptra FMC ...
2,688,305 UART:
2,688,448 UART: [state] CFI Enabled
2,699,323 UART: [fht] FMC Alias Private Key: 7
2,807,212 UART: [art] Extend RT PCRs Done
2,807,640 UART: [art] Lock RT PCRs Done
2,809,096 UART: [art] Populate DV Done
2,817,213 UART: [fht] FMC Alias Private Key: 7
2,818,141 UART: [art] Derive CDI
2,818,421 UART: [art] Store in in slot 0x4
2,903,724 UART: [art] Derive Key Pair
2,904,084 UART: [art] Store priv key in slot 0x5
2,917,422 UART: [art] Derive Key Pair - Done
2,932,523 UART: [art] Signing Cert with AUTHO
2,933,003 UART: RITY.KEYID = 7
2,948,537 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,302 UART: [art] PUB.X = D923DC307BD77397CB74EDDF3A946BCA3AB3B50DCF1A27633F30F4D7FFF9B935E33572940D48C743EB6A441D3D837CDF
2,956,084 UART: [art] PUB.Y = 6BA33F4977D3207AF17804B875E9AAF18E70A9E574457D5D5666AC033B4E15A1A343D59A9C62130462542C8688C96B77
2,963,019 UART: [art] SIG.R = AC38C5F555C2008CF15C06351E064A519EE7D439684B9BC3BD72E351BB0DA23A3A9B872D30C1940BAB52247B8C2EAF46
2,969,765 UART: [art] SIG.S = 0C7CB890F46E3801D3250D47961985B55C8E3E94270532308B8C03CA3598606F6E2421180D7AB099B5D1CC0CCB3E4D78
2,993,437 UART: Caliptra RT
2,993,782 UART: [state] CFI Enabled
3,101,175 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,909 UART: [rt]cmd =0x43455252, len=4
3,142,701 >>> mbox cmd response data (783 bytes)
3,142,702 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,663 UART: [rt]cmd =0x44504543, len=92
3,356,181 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,384 UART: [kat] SHA2-256
890,934 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,063 UART: [kat] ++
895,215 UART: [kat] sha1
899,319 UART: [kat] SHA2-256
901,259 UART: [kat] SHA2-384
903,880 UART: [kat] SHA2-512-ACC
905,781 UART: [kat] ECC-384
915,468 UART: [kat] HMAC-384Kdf
919,934 UART: [kat] LMS
1,168,246 UART: [kat] --
1,169,047 UART: [cold-reset] ++
1,169,541 UART: [fht] FHT @ 0x50003400
1,172,285 UART: [idev] ++
1,172,453 UART: [idev] CDI.KEYID = 6
1,172,814 UART: [idev] SUBJECT.KEYID = 7
1,173,239 UART: [idev] UDS.KEYID = 0
1,173,585 ready_for_fw is high
1,173,585 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,237 UART: [idev] Erasing UDS.KEYID = 0
1,198,377 UART: [idev] Sha1 KeyId Algorithm
1,207,279 UART: [idev] --
1,208,344 UART: [ldev] ++
1,208,512 UART: [ldev] CDI.KEYID = 6
1,208,876 UART: [ldev] SUBJECT.KEYID = 5
1,209,303 UART: [ldev] AUTHORITY.KEYID = 7
1,209,766 UART: [ldev] FE.KEYID = 1
1,214,916 UART: [ldev] Erasing FE.KEYID = 1
1,240,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,552 UART: [ldev] --
1,279,974 UART: [fwproc] Wait for Commands...
1,280,653 UART: [fwproc] Recv command 0x46574c44
1,281,386 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,612 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,921 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,731 >>> mbox cmd response: success
2,770,731 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,771,764 UART: [afmc] ++
2,771,932 UART: [afmc] CDI.KEYID = 6
2,772,295 UART: [afmc] SUBJECT.KEYID = 7
2,772,721 UART: [afmc] AUTHORITY.KEYID = 5
2,808,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,388 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,139 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,868 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,751 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,470 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,105 UART: [afmc] --
2,851,171 UART: [cold-reset] --
2,851,969 UART: [state] Locking Datavault
2,853,190 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,794 UART: [state] Locking ICCM
2,854,458 UART: [exit] Launching FMC @ 0x40000130
2,859,787 UART:
2,859,803 UART: Running Caliptra FMC ...
2,860,211 UART:
2,860,265 UART: [state] CFI Enabled
2,870,890 UART: [fht] FMC Alias Private Key: 7
2,979,251 UART: [art] Extend RT PCRs Done
2,979,679 UART: [art] Lock RT PCRs Done
2,981,557 UART: [art] Populate DV Done
2,989,884 UART: [fht] FMC Alias Private Key: 7
2,991,048 UART: [art] Derive CDI
2,991,328 UART: [art] Store in in slot 0x4
3,077,037 UART: [art] Derive Key Pair
3,077,397 UART: [art] Store priv key in slot 0x5
3,090,195 UART: [art] Derive Key Pair - Done
3,105,073 UART: [art] Signing Cert with AUTHO
3,105,553 UART: RITY.KEYID = 7
3,120,667 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,432 UART: [art] PUB.X = 544FD890333BA6A5173463327D2FEF6B6A79E1512A20EA2D61A520A84EB0FB17A4B5AEF082CB1BAEEB222CFFBE5F75CB
3,128,224 UART: [art] PUB.Y = 2364064625B48B6C7681465EF7E8C9621B040B1C3C342BE48FF472AE2918465709B325A3EADCF8E2A9036189CA939A97
3,135,155 UART: [art] SIG.R = 292C365D3820602AFC1F9E602689D10E00E51211978049BFA1FCDB0E3F27C921F86BE827D2586FE750746F5770E971F9
3,141,893 UART: [art] SIG.S = E372113C75D1649C92AA5BD3D88F83CC9D3B7D67F6912648B920526374F80C49E92F21AA09DA6BFB3FEDE75BFD26E207
3,166,119 UART: Caliptra RT
3,166,372 UART: [state] CFI Enabled
3,274,211 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,599 UART: [rt]cmd =0x43455252, len=4
3,315,493 >>> mbox cmd response data (783 bytes)
3,315,494 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,375 UART: [rt]cmd =0x44504543, len=92
3,529,418 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,196 ready_for_fw is high
1,056,196 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,645 >>> mbox cmd response: success
2,624,645 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,687,067 UART:
2,687,083 UART: Running Caliptra FMC ...
2,687,491 UART:
2,687,545 UART: [state] CFI Enabled
2,697,748 UART: [fht] FMC Alias Private Key: 7
2,805,269 UART: [art] Extend RT PCRs Done
2,805,697 UART: [art] Lock RT PCRs Done
2,807,133 UART: [art] Populate DV Done
2,815,098 UART: [fht] FMC Alias Private Key: 7
2,816,192 UART: [art] Derive CDI
2,816,472 UART: [art] Store in in slot 0x4
2,901,817 UART: [art] Derive Key Pair
2,902,177 UART: [art] Store priv key in slot 0x5
2,915,327 UART: [art] Derive Key Pair - Done
2,930,436 UART: [art] Signing Cert with AUTHO
2,930,916 UART: RITY.KEYID = 7
2,945,786 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,551 UART: [art] PUB.X = 4F374F969853176936B86BED0DF6B4C474F135851DB92F29E8280C4F42827CBD931DDB550B2700C1593A284F5C9E1AE3
2,953,290 UART: [art] PUB.Y = 035885C625A9C3A9A4DA203D3B15AFF87F1288163600989B143663B4C80F05EEBFA5BF17F3233D614FD2600382B08903
2,960,199 UART: [art] SIG.R = F23354E06C7457F5806C54F4DEDC73B2D399DFB0B039F65CCC7F8734A2D44B2C5C316D73FADA8E1053EA00BAE2B4F130
2,966,963 UART: [art] SIG.S = 394EEC44BD6B69924222D347A9DD6D00F3E8F6DC67337B21C1808E52946B9C5CD9FB4D367BFCD84C79AC45A132D9390F
2,990,805 UART: Caliptra RT
2,991,058 UART: [state] CFI Enabled
3,098,125 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,823 UART: [rt]cmd =0x43455252, len=4
3,139,379 >>> mbox cmd response data (783 bytes)
3,139,380 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,169,331 UART: [rt]cmd =0x44504543, len=92
3,352,856 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,773 UART: [state] LifecycleState = Unprovisioned
86,428 UART: [state] DebugLocked = No
86,996 UART: [state] WD Timer not started. Device not locked for debugging
88,323 UART: [kat] SHA2-256
891,873 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,002 UART: [kat] ++
896,154 UART: [kat] sha1
900,388 UART: [kat] SHA2-256
902,328 UART: [kat] SHA2-384
905,143 UART: [kat] SHA2-512-ACC
907,044 UART: [kat] ECC-384
916,797 UART: [kat] HMAC-384Kdf
921,247 UART: [kat] LMS
1,169,559 UART: [kat] --
1,170,420 UART: [cold-reset] ++
1,170,796 UART: [fht] FHT @ 0x50003400
1,173,314 UART: [idev] ++
1,173,482 UART: [idev] CDI.KEYID = 6
1,173,843 UART: [idev] SUBJECT.KEYID = 7
1,174,268 UART: [idev] UDS.KEYID = 0
1,174,614 ready_for_fw is high
1,174,614 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,428 UART: [idev] Erasing UDS.KEYID = 0
1,199,794 UART: [idev] Sha1 KeyId Algorithm
1,208,618 UART: [idev] --
1,209,697 UART: [ldev] ++
1,209,865 UART: [ldev] CDI.KEYID = 6
1,210,229 UART: [ldev] SUBJECT.KEYID = 5
1,210,656 UART: [ldev] AUTHORITY.KEYID = 7
1,211,119 UART: [ldev] FE.KEYID = 1
1,216,207 UART: [ldev] Erasing FE.KEYID = 1
1,242,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,953 UART: [ldev] --
1,282,231 UART: [fwproc] Wait for Commands...
1,283,016 UART: [fwproc] Recv command 0x46574c44
1,283,749 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,741 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,050 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,788 >>> mbox cmd response: success
2,773,788 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,775,023 UART: [afmc] ++
2,775,191 UART: [afmc] CDI.KEYID = 6
2,775,554 UART: [afmc] SUBJECT.KEYID = 7
2,775,980 UART: [afmc] AUTHORITY.KEYID = 5
2,811,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,025 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,776 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,505 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,388 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,107 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,920 UART: [afmc] --
2,855,008 UART: [cold-reset] --
2,855,840 UART: [state] Locking Datavault
2,857,049 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,653 UART: [state] Locking ICCM
2,858,207 UART: [exit] Launching FMC @ 0x40000130
2,863,536 UART:
2,863,552 UART: Running Caliptra FMC ...
2,863,960 UART:
2,864,103 UART: [state] CFI Enabled
2,874,860 UART: [fht] FMC Alias Private Key: 7
2,983,161 UART: [art] Extend RT PCRs Done
2,983,589 UART: [art] Lock RT PCRs Done
2,985,177 UART: [art] Populate DV Done
2,993,266 UART: [fht] FMC Alias Private Key: 7
2,994,200 UART: [art] Derive CDI
2,994,480 UART: [art] Store in in slot 0x4
3,080,127 UART: [art] Derive Key Pair
3,080,487 UART: [art] Store priv key in slot 0x5
3,093,347 UART: [art] Derive Key Pair - Done
3,107,911 UART: [art] Signing Cert with AUTHO
3,108,391 UART: RITY.KEYID = 7
3,123,711 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,476 UART: [art] PUB.X = F40C4C0F12BA05CFBF2CFCA491A99C526899D0CB59A3E24FFD84CE1A983F95CEF061D946DC1426ABB377C84FDFD0B615
3,131,261 UART: [art] PUB.Y = D1C5FEC4C54F4B3A7DF9BE0D4AC3A0423ED1BB3B7FA4232868FBC9BC9AFE43465A1C1B3F1AB5AFC68E91827779CF48EA
3,138,238 UART: [art] SIG.R = 05A083EF133586B662DD53B234954367540CD2D5E9BBF811C2E03A29427A2D52521F5C2E5EE933613A48C0DEDC6F78B0
3,145,004 UART: [art] SIG.S = 821B84D0E4552E99289F031DF1B27E2EA9B5810C2C5DF48F9B2416CDCD71646AB61484E19F95F3CF3C18D658DBBB67AF
3,168,977 UART: Caliptra RT
3,169,322 UART: [state] CFI Enabled
3,277,415 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,797 UART: [rt]cmd =0x43455252, len=4
3,318,647 >>> mbox cmd response data (783 bytes)
3,318,648 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,419 UART: [rt]cmd =0x44504543, len=92
3,532,723 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,389 ready_for_fw is high
1,056,389 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,566 >>> mbox cmd response: success
2,622,566 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,684,890 UART:
2,684,906 UART: Running Caliptra FMC ...
2,685,314 UART:
2,685,457 UART: [state] CFI Enabled
2,696,218 UART: [fht] FMC Alias Private Key: 7
2,804,513 UART: [art] Extend RT PCRs Done
2,804,941 UART: [art] Lock RT PCRs Done
2,806,221 UART: [art] Populate DV Done
2,814,392 UART: [fht] FMC Alias Private Key: 7
2,815,350 UART: [art] Derive CDI
2,815,630 UART: [art] Store in in slot 0x4
2,901,465 UART: [art] Derive Key Pair
2,901,825 UART: [art] Store priv key in slot 0x5
2,915,723 UART: [art] Derive Key Pair - Done
2,930,618 UART: [art] Signing Cert with AUTHO
2,931,098 UART: RITY.KEYID = 7
2,946,028 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,793 UART: [art] PUB.X = 118D9D869C04D299F1340A76F8E33961006A839DF07884DC5C27A02AC9A9489EB1CA3FE3A2C20203FF0A751603C4EE09
2,953,522 UART: [art] PUB.Y = B1CAA5AE9365146C1BAB42AC3B39031FB045AF3AB807E794EA2971DA918A70A5550BF1FA391A81EEABDB295705EA2BA8
2,960,480 UART: [art] SIG.R = 4D2A298AFACB39B79E439C59B788F60CF0823539F34E7C8005A37327C58FD60C5E609EACBF036E4FA087951DA2FC1D01
2,967,245 UART: [art] SIG.S = 190CEEEAAC69769EEAFFB4922AD24E663277FB2D5D6BD0B28633C6D1B1D4CCF0AA380FC6772C6388D9E2AD6BE7D47977
2,991,598 UART: Caliptra RT
2,991,943 UART: [state] CFI Enabled
3,100,354 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,852 UART: [rt]cmd =0x43455252, len=4
3,141,762 >>> mbox cmd response data (782 bytes)
3,141,763 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,708 UART: [rt]cmd =0x44504543, len=92
3,354,736 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,257 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,823 UART: [kat] SHA2-256
881,754 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,869 UART: [kat] ++
886,021 UART: [kat] sha1
890,423 UART: [kat] SHA2-256
892,361 UART: [kat] SHA2-384
895,250 UART: [kat] SHA2-512-ACC
897,151 UART: [kat] ECC-384
902,484 UART: [kat] HMAC-384Kdf
907,174 UART: [kat] LMS
1,475,370 UART: [kat] --
1,476,249 UART: [cold-reset] ++
1,476,685 UART: [fht] Storing FHT @ 0x50003400
1,479,482 UART: [idev] ++
1,479,650 UART: [idev] CDI.KEYID = 6
1,480,010 UART: [idev] SUBJECT.KEYID = 7
1,480,434 UART: [idev] UDS.KEYID = 0
1,480,779 ready_for_fw is high
1,480,779 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,428 UART: [idev] Erasing UDS.KEYID = 0
1,504,496 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,192 UART: [idev] --
1,514,161 UART: [ldev] ++
1,514,329 UART: [ldev] CDI.KEYID = 6
1,514,692 UART: [ldev] SUBJECT.KEYID = 5
1,515,118 UART: [ldev] AUTHORITY.KEYID = 7
1,515,581 UART: [ldev] FE.KEYID = 1
1,520,857 UART: [ldev] Erasing FE.KEYID = 1
1,547,000 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,768 UART: [ldev] --
1,586,107 UART: [fwproc] Waiting for Commands...
1,586,882 UART: [fwproc] Received command 0x46574c44
1,587,673 UART: [fwproc] Received Image of size 114332 bytes
2,885,945 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,685 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,037 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,996 >>> mbox cmd response: success
3,077,996 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,079,136 UART: [afmc] ++
3,079,304 UART: [afmc] CDI.KEYID = 6
3,079,666 UART: [afmc] SUBJECT.KEYID = 7
3,080,091 UART: [afmc] AUTHORITY.KEYID = 5
3,114,702 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,874 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,654 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,382 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,267 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,957 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,862 UART: [afmc] --
3,157,786 UART: [cold-reset] --
3,158,828 UART: [state] Locking Datavault
3,159,971 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,575 UART: [state] Locking ICCM
3,161,129 UART: [exit] Launching FMC @ 0x40000130
3,166,458 UART:
3,166,474 UART: Running Caliptra FMC ...
3,166,882 UART:
3,166,936 UART: [state] CFI Enabled
3,177,531 UART: [fht] FMC Alias Private Key: 7
3,285,232 UART: [art] Extend RT PCRs Done
3,285,660 UART: [art] Lock RT PCRs Done
3,287,146 UART: [art] Populate DV Done
3,295,497 UART: [fht] FMC Alias Private Key: 7
3,296,567 UART: [art] Derive CDI
3,296,847 UART: [art] Store in in slot 0x4
3,382,424 UART: [art] Derive Key Pair
3,382,784 UART: [art] Store priv key in slot 0x5
3,395,668 UART: [art] Derive Key Pair - Done
3,410,647 UART: [art] Signing Cert with AUTHO
3,411,127 UART: RITY.KEYID = 7
3,426,203 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,968 UART: [art] PUB.X = 2A7ABF1F89C1BA3BB310920F847F75AD6307AFD1EAFFBB7F2DBEA6E2EB0890811866A6685C71D0370ED277A631B2AFF7
3,433,746 UART: [art] PUB.Y = DAD549F0A039F80A714CC2C438E5D471C15086F8C2683241AB89B47227549F7DC5A911F1351A583132D6B50FED89611B
3,440,688 UART: [art] SIG.R = 32F5EF53F73E38F010ADA146D74A023AEB4ED662F89449311C54289827D0F34DA381AFA240304B067C4E9463A0C67198
3,447,450 UART: [art] SIG.S = 554FCC5C1B957BEF27A497250D504585C79B20A2DEFEF77516C72A6EB126D66A48561359BEE5D1FC464CDE9CEDCEF8A9
3,470,770 UART: Caliptra RT
3,471,023 UART: [state] CFI Enabled
3,578,701 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,897 UART: [rt]cmd =0x4c444556, len=4
3,619,208 >>> mbox cmd response data (687 bytes)
3,619,209 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,784 UART: [rt]cmd =0x43455246, len=4
3,660,907 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,945 ready_for_fw is high
1,361,945 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,250 >>> mbox cmd response: success
2,927,250 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,988,714 UART:
2,988,730 UART: Running Caliptra FMC ...
2,989,138 UART:
2,989,192 UART: [state] CFI Enabled
2,999,489 UART: [fht] FMC Alias Private Key: 7
3,108,030 UART: [art] Extend RT PCRs Done
3,108,458 UART: [art] Lock RT PCRs Done
3,110,170 UART: [art] Populate DV Done
3,118,213 UART: [fht] FMC Alias Private Key: 7
3,119,219 UART: [art] Derive CDI
3,119,499 UART: [art] Store in in slot 0x4
3,205,070 UART: [art] Derive Key Pair
3,205,430 UART: [art] Store priv key in slot 0x5
3,218,478 UART: [art] Derive Key Pair - Done
3,233,081 UART: [art] Signing Cert with AUTHO
3,233,561 UART: RITY.KEYID = 7
3,248,755 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,520 UART: [art] PUB.X = BDFF3E8917F50FBF5D43803479FC40A9D076A01A9E232938EF0C248E0785C194AC20B228E2A9F77CE5C63D857C5C23FD
3,256,291 UART: [art] PUB.Y = 25CBE7A66A99CBCD48C1C923A9C2A8C9DCEDA66EBA2B41989DD4337446C86B565D801F58A06379A4A67969C8D44CDA95
3,263,255 UART: [art] SIG.R = 7210574DFBE4E2D309B0701D0AC8369641838737446CD6339F9E482FE4ACF805A8B44371B7721455AE5322F8F79D2B83
3,270,010 UART: [art] SIG.S = ED52E3C2D780A6E0FCE1D84FC044D41145F0BC3286BE9824DB9576F36673EA389A0B56AC0689C5DA8EC1B40F67BD3C2D
3,293,854 UART: Caliptra RT
3,294,107 UART: [state] CFI Enabled
3,401,268 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,716 UART: [rt]cmd =0x4c444556, len=4
3,442,077 >>> mbox cmd response data (687 bytes)
3,442,078 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,325 UART: [rt]cmd =0x43455246, len=4
3,483,586 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,508 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,234 UART: [kat] SHA2-256
882,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,280 UART: [kat] ++
886,432 UART: [kat] sha1
890,750 UART: [kat] SHA2-256
892,688 UART: [kat] SHA2-384
895,453 UART: [kat] SHA2-512-ACC
897,354 UART: [kat] ECC-384
902,953 UART: [kat] HMAC-384Kdf
907,685 UART: [kat] LMS
1,475,881 UART: [kat] --
1,476,550 UART: [cold-reset] ++
1,477,016 UART: [fht] Storing FHT @ 0x50003400
1,479,777 UART: [idev] ++
1,479,945 UART: [idev] CDI.KEYID = 6
1,480,305 UART: [idev] SUBJECT.KEYID = 7
1,480,729 UART: [idev] UDS.KEYID = 0
1,481,074 ready_for_fw is high
1,481,074 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,701 UART: [idev] Erasing UDS.KEYID = 0
1,505,401 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,043 UART: [idev] --
1,515,078 UART: [ldev] ++
1,515,246 UART: [ldev] CDI.KEYID = 6
1,515,609 UART: [ldev] SUBJECT.KEYID = 5
1,516,035 UART: [ldev] AUTHORITY.KEYID = 7
1,516,498 UART: [ldev] FE.KEYID = 1
1,521,670 UART: [ldev] Erasing FE.KEYID = 1
1,546,603 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,109 UART: [ldev] --
1,586,484 UART: [fwproc] Waiting for Commands...
1,587,109 UART: [fwproc] Received command 0x46574c44
1,587,900 UART: [fwproc] Received Image of size 114332 bytes
2,885,112 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,486 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,838 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,749 >>> mbox cmd response: success
3,078,749 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,079,903 UART: [afmc] ++
3,080,071 UART: [afmc] CDI.KEYID = 6
3,080,433 UART: [afmc] SUBJECT.KEYID = 7
3,080,858 UART: [afmc] AUTHORITY.KEYID = 5
3,116,553 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,143 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,923 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,651 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,536 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,226 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,135 UART: [afmc] --
3,160,193 UART: [cold-reset] --
3,161,163 UART: [state] Locking Datavault
3,161,932 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,536 UART: [state] Locking ICCM
3,163,034 UART: [exit] Launching FMC @ 0x40000130
3,168,363 UART:
3,168,379 UART: Running Caliptra FMC ...
3,168,787 UART:
3,168,930 UART: [state] CFI Enabled
3,179,543 UART: [fht] FMC Alias Private Key: 7
3,287,484 UART: [art] Extend RT PCRs Done
3,287,912 UART: [art] Lock RT PCRs Done
3,289,640 UART: [art] Populate DV Done
3,297,647 UART: [fht] FMC Alias Private Key: 7
3,298,577 UART: [art] Derive CDI
3,298,857 UART: [art] Store in in slot 0x4
3,384,466 UART: [art] Derive Key Pair
3,384,826 UART: [art] Store priv key in slot 0x5
3,397,850 UART: [art] Derive Key Pair - Done
3,412,827 UART: [art] Signing Cert with AUTHO
3,413,307 UART: RITY.KEYID = 7
3,428,397 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,162 UART: [art] PUB.X = 49CB2C79FF6E43A4C4023D31E0CFEF92D05A93A31FAAF6D2A98C3A85E1B47DD22F711F3F88DB89FB2DB4AD2525CE7612
3,435,951 UART: [art] PUB.Y = D38063B225C1381A675F2393957F88AE3C7A4D5D04DFA89CD1E6271694EC27C96B03FBFD4A1EC93C24AC8AD083DEB46C
3,442,909 UART: [art] SIG.R = 2FCAA23E295B3B54CD604D9F4DBE217D6679ECA1CE14A8B7AA252DC47B32A89768CA2DE1C6770921C1448CBA12CBA061
3,449,694 UART: [art] SIG.S = 82C6D6808C57FB72C0A70B7E4F7B85FB2F128F2D4C0176B56D24A7C07367D2D2694A78ECCA59E20F2E158D8C6873E4CC
3,473,102 UART: Caliptra RT
3,473,447 UART: [state] CFI Enabled
3,582,528 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,066 UART: [rt]cmd =0x4c444556, len=4
3,623,663 >>> mbox cmd response data (687 bytes)
3,623,664 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,652,921 UART: [rt]cmd =0x43455246, len=4
3,665,302 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,862 ready_for_fw is high
1,362,862 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,003 >>> mbox cmd response: success
2,929,003 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,989,883 UART:
2,989,899 UART: Running Caliptra FMC ...
2,990,307 UART:
2,990,450 UART: [state] CFI Enabled
3,001,401 UART: [fht] FMC Alias Private Key: 7
3,108,704 UART: [art] Extend RT PCRs Done
3,109,132 UART: [art] Lock RT PCRs Done
3,110,730 UART: [art] Populate DV Done
3,119,039 UART: [fht] FMC Alias Private Key: 7
3,120,041 UART: [art] Derive CDI
3,120,321 UART: [art] Store in in slot 0x4
3,205,974 UART: [art] Derive Key Pair
3,206,334 UART: [art] Store priv key in slot 0x5
3,219,602 UART: [art] Derive Key Pair - Done
3,234,409 UART: [art] Signing Cert with AUTHO
3,234,889 UART: RITY.KEYID = 7
3,249,973 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,738 UART: [art] PUB.X = 98D844B1074D902F63B795B5E5DC787282F87347535D5D681499B9A778AA967A39A634404BD76839F761AFFDC1B11FF7
3,257,501 UART: [art] PUB.Y = 40D79B8660C2F2DB88887BE83149EC1EE45EB1F27B5C6A59EDD004F78636AB0C7C7EE846F8A437F62A6F35547DFF84E8
3,264,457 UART: [art] SIG.R = 9484D5B0F4E451BB38045812969DFD2326D3B05DC516C78056BE4C9FBA8F75E9A053E02DFFED35F064BCB328BA35203D
3,271,234 UART: [art] SIG.S = 165B5802BC59762F96CE9920D1044AFAED113535597FCD312BA6FD65B8DD67730F265D2C49D909CD695FA97E2AC382CF
3,295,223 UART: Caliptra RT
3,295,568 UART: [state] CFI Enabled
3,403,309 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,665 UART: [rt]cmd =0x4c444556, len=4
3,444,196 >>> mbox cmd response data (687 bytes)
3,444,197 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,790 UART: [rt]cmd =0x43455246, len=4
3,486,201 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [kat] SHA2-256
893,480 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,605 UART: [kat] ++
897,757 UART: [kat] sha1
901,925 UART: [kat] SHA2-256
903,865 UART: [kat] SHA2-384
906,726 UART: [kat] SHA2-512-ACC
908,627 UART: [kat] ECC-384
918,076 UART: [kat] HMAC-384Kdf
922,714 UART: [kat] LMS
1,171,042 UART: [kat] --
1,172,243 UART: [cold-reset] ++
1,172,817 UART: [fht] FHT @ 0x50003400
1,175,328 UART: [idev] ++
1,175,496 UART: [idev] CDI.KEYID = 6
1,175,856 UART: [idev] SUBJECT.KEYID = 7
1,176,280 UART: [idev] UDS.KEYID = 0
1,176,625 ready_for_fw is high
1,176,625 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,022 UART: [idev] Erasing UDS.KEYID = 0
1,201,229 UART: [idev] Sha1 KeyId Algorithm
1,209,617 UART: [idev] --
1,210,705 UART: [ldev] ++
1,210,873 UART: [ldev] CDI.KEYID = 6
1,211,236 UART: [ldev] SUBJECT.KEYID = 5
1,211,662 UART: [ldev] AUTHORITY.KEYID = 7
1,212,125 UART: [ldev] FE.KEYID = 1
1,217,437 UART: [ldev] Erasing FE.KEYID = 1
1,243,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,381 UART: [ldev] --
1,282,654 UART: [fwproc] Wait for Commands...
1,283,270 UART: [fwproc] Recv command 0x46574c44
1,283,998 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,399 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,786 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,090 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,789 >>> mbox cmd response: success
2,774,789 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,776,001 UART: [afmc] ++
2,776,169 UART: [afmc] CDI.KEYID = 6
2,776,531 UART: [afmc] SUBJECT.KEYID = 7
2,776,956 UART: [afmc] AUTHORITY.KEYID = 5
2,813,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,374 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,122 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,850 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,735 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,454 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,194 UART: [afmc] --
2,856,274 UART: [cold-reset] --
2,857,204 UART: [state] Locking Datavault
2,858,433 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,037 UART: [state] Locking ICCM
2,859,487 UART: [exit] Launching FMC @ 0x40000130
2,864,816 UART:
2,864,832 UART: Running Caliptra FMC ...
2,865,240 UART:
2,865,294 UART: [state] CFI Enabled
2,875,655 UART: [fht] FMC Alias Private Key: 7
2,983,472 UART: [art] Extend RT PCRs Done
2,983,900 UART: [art] Lock RT PCRs Done
2,985,416 UART: [art] Populate DV Done
2,993,623 UART: [fht] FMC Alias Private Key: 7
2,994,687 UART: [art] Derive CDI
2,994,967 UART: [art] Store in in slot 0x4
3,080,360 UART: [art] Derive Key Pair
3,080,720 UART: [art] Store priv key in slot 0x5
3,093,650 UART: [art] Derive Key Pair - Done
3,108,372 UART: [art] Signing Cert with AUTHO
3,108,852 UART: RITY.KEYID = 7
3,123,714 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,479 UART: [art] PUB.X = F0140212CB0C3867765AA4A9D7B40DCFA9D224E694AFCBD595DC2DD5A151D5A7EC7C0BC5E06CC3B04B18EAA4B2018582
3,131,254 UART: [art] PUB.Y = 4511CBD1F0AB2C7EEE460477DF72487AEEBF5128406AB45F73D9E0E58ADC377237DEF473CEE4EA1DE417FA52DFE34759
3,138,221 UART: [art] SIG.R = C569353BB6BDBD652E0931A754BD0DF404F99A29CD701E4F611CD89B236C500AF3CB70D4BAC5300E6C6A4D350525C0FD
3,144,987 UART: [art] SIG.S = F56CC3160FE4C8934FDFFE6EEF70ACC57C10BC06690E9B5708F78A49147456DBF40E3BAE2FDDC2094DDD0153D05E54DB
3,168,921 UART: Caliptra RT
3,169,174 UART: [state] CFI Enabled
3,276,818 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,776 UART: [rt]cmd =0x4c444556, len=4
3,318,241 >>> mbox cmd response data (687 bytes)
3,318,242 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,541 UART: [rt]cmd =0x43455246, len=4
3,359,590 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,701 ready_for_fw is high
1,060,701 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,024 >>> mbox cmd response: success
2,626,024 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,687,942 UART:
2,687,958 UART: Running Caliptra FMC ...
2,688,366 UART:
2,688,420 UART: [state] CFI Enabled
2,699,149 UART: [fht] FMC Alias Private Key: 7
2,806,604 UART: [art] Extend RT PCRs Done
2,807,032 UART: [art] Lock RT PCRs Done
2,808,540 UART: [art] Populate DV Done
2,816,951 UART: [fht] FMC Alias Private Key: 7
2,817,939 UART: [art] Derive CDI
2,818,219 UART: [art] Store in in slot 0x4
2,904,036 UART: [art] Derive Key Pair
2,904,396 UART: [art] Store priv key in slot 0x5
2,917,732 UART: [art] Derive Key Pair - Done
2,932,304 UART: [art] Signing Cert with AUTHO
2,932,784 UART: RITY.KEYID = 7
2,947,970 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,735 UART: [art] PUB.X = 2D3F36907714B2C981C79439834F0401FCF443F98972698127A57749146DE0539B9054E8F8E6AD2B28DEF90E40E86FDC
2,955,490 UART: [art] PUB.Y = D5AD4F6B279C94DE028E04826BA9641C05D2D532B4882DCF156455356483250A3E5DC5F5D0A1F1518B4C3720F376D7EA
2,962,430 UART: [art] SIG.R = F2874C151E5541318892F73697BDB9DF05028B3496A2F9263C8990094FD51DA848BD652750E6C3E29840774BD7B9C8BB
2,969,185 UART: [art] SIG.S = 269A2BA59F0DA08980D77909A0AEF00C65930F8E2CB67D7517FC4EBE092F4A6901953A9EAE1018E70FCFBFEF439F2784
2,992,901 UART: Caliptra RT
2,993,154 UART: [state] CFI Enabled
3,101,525 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,103 UART: [rt]cmd =0x4c444556, len=4
3,142,640 >>> mbox cmd response data (687 bytes)
3,142,641 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,912 UART: [rt]cmd =0x43455246, len=4
3,183,843 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [kat] SHA2-256
893,557 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,682 UART: [kat] ++
897,834 UART: [kat] sha1
902,054 UART: [kat] SHA2-256
903,994 UART: [kat] SHA2-384
906,963 UART: [kat] SHA2-512-ACC
908,864 UART: [kat] ECC-384
919,089 UART: [kat] HMAC-384Kdf
923,905 UART: [kat] LMS
1,172,233 UART: [kat] --
1,173,022 UART: [cold-reset] ++
1,173,588 UART: [fht] FHT @ 0x50003400
1,176,077 UART: [idev] ++
1,176,245 UART: [idev] CDI.KEYID = 6
1,176,605 UART: [idev] SUBJECT.KEYID = 7
1,177,029 UART: [idev] UDS.KEYID = 0
1,177,374 ready_for_fw is high
1,177,374 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,487 UART: [idev] Erasing UDS.KEYID = 0
1,202,626 UART: [idev] Sha1 KeyId Algorithm
1,211,032 UART: [idev] --
1,212,058 UART: [ldev] ++
1,212,226 UART: [ldev] CDI.KEYID = 6
1,212,589 UART: [ldev] SUBJECT.KEYID = 5
1,213,015 UART: [ldev] AUTHORITY.KEYID = 7
1,213,478 UART: [ldev] FE.KEYID = 1
1,218,662 UART: [ldev] Erasing FE.KEYID = 1
1,245,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,214 UART: [ldev] --
1,284,553 UART: [fwproc] Wait for Commands...
1,285,283 UART: [fwproc] Recv command 0x46574c44
1,286,011 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,663 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,967 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,848 >>> mbox cmd response: success
2,774,848 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,775,872 UART: [afmc] ++
2,776,040 UART: [afmc] CDI.KEYID = 6
2,776,402 UART: [afmc] SUBJECT.KEYID = 7
2,776,827 UART: [afmc] AUTHORITY.KEYID = 5
2,812,552 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,181 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,929 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,657 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,542 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,261 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,973 UART: [afmc] --
2,855,989 UART: [cold-reset] --
2,856,801 UART: [state] Locking Datavault
2,857,938 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,542 UART: [state] Locking ICCM
2,859,180 UART: [exit] Launching FMC @ 0x40000130
2,864,509 UART:
2,864,525 UART: Running Caliptra FMC ...
2,864,933 UART:
2,865,076 UART: [state] CFI Enabled
2,875,701 UART: [fht] FMC Alias Private Key: 7
2,983,136 UART: [art] Extend RT PCRs Done
2,983,564 UART: [art] Lock RT PCRs Done
2,985,162 UART: [art] Populate DV Done
2,993,449 UART: [fht] FMC Alias Private Key: 7
2,994,431 UART: [art] Derive CDI
2,994,711 UART: [art] Store in in slot 0x4
3,080,492 UART: [art] Derive Key Pair
3,080,852 UART: [art] Store priv key in slot 0x5
3,094,504 UART: [art] Derive Key Pair - Done
3,109,247 UART: [art] Signing Cert with AUTHO
3,109,727 UART: RITY.KEYID = 7
3,124,971 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,736 UART: [art] PUB.X = 7B66D65E25E9790C062D376C3BBBF8EAE4C83A4763ADCB6A3364BAFDCFB2756D337083B17A4F979AC8F647B747AC1F5A
3,132,518 UART: [art] PUB.Y = 307F0CA25A060713737A99FA486417E7C1DC2C93D8763CDD636F3192365E47AD52E8067DD6466365D9837CE867A06BEB
3,139,454 UART: [art] SIG.R = 5A2553E2E21A670BC5BEE30AADBB37BEA385B4E75D94485117322BC6AD445567CE107EF6864E5753528217C42E20D408
3,146,217 UART: [art] SIG.S = E3CD1E53180EE30CAC8FFCC6116BCB5B3148CF6913409891989D5BD57EFC47BE1A61E25ECCD5F9BCB98732886DBFD6E1
3,170,152 UART: Caliptra RT
3,170,497 UART: [state] CFI Enabled
3,277,972 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,504 UART: [rt]cmd =0x4c444556, len=4
3,319,103 >>> mbox cmd response data (687 bytes)
3,319,104 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,333 UART: [rt]cmd =0x43455246, len=4
3,360,532 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,802 ready_for_fw is high
1,060,802 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,569 >>> mbox cmd response: success
2,627,569 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,690,499 UART:
2,690,515 UART: Running Caliptra FMC ...
2,690,923 UART:
2,691,066 UART: [state] CFI Enabled
2,701,313 UART: [fht] FMC Alias Private Key: 7
2,809,174 UART: [art] Extend RT PCRs Done
2,809,602 UART: [art] Lock RT PCRs Done
2,811,252 UART: [art] Populate DV Done
2,819,627 UART: [fht] FMC Alias Private Key: 7
2,820,567 UART: [art] Derive CDI
2,820,847 UART: [art] Store in in slot 0x4
2,906,410 UART: [art] Derive Key Pair
2,906,770 UART: [art] Store priv key in slot 0x5
2,919,606 UART: [art] Derive Key Pair - Done
2,934,096 UART: [art] Signing Cert with AUTHO
2,934,576 UART: RITY.KEYID = 7
2,950,110 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,875 UART: [art] PUB.X = 925C9926404D7056E673C85AC760500EF49E3BC83A0E6566A631914D4C1A44C13149DE6CE4F10988E821370C7CDD097A
2,957,626 UART: [art] PUB.Y = 10AF20E31F18B378FD075317D0F74F486BA530F0BE013E6C5632BFCE9514799B38C20642ADE65B881AA1B25F4BE91BE1
2,964,575 UART: [art] SIG.R = D23D347882DBC2EC8C9867AE5CD440441298642619DB0922A25D5565926BDC52E969076D3267958521915027F22985A5
2,971,323 UART: [art] SIG.S = 8DE1AD1C135F9BE943D5149E8DFF7820FFFDB7937F258BC715E2A5079845235E4BC1BD46FF094B4C4F22EAC1DA0B3EBB
2,995,081 UART: Caliptra RT
2,995,426 UART: [state] CFI Enabled
3,102,890 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,136 UART: [rt]cmd =0x4c444556, len=4
3,143,383 >>> mbox cmd response data (687 bytes)
3,143,384 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,711 UART: [rt]cmd =0x43455246, len=4
3,184,754 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,728 UART: [state] LifecycleState = Unprovisioned
85,383 UART: [state] DebugLocked = No
86,029 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
890,930 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,059 UART: [kat] ++
895,211 UART: [kat] sha1
899,567 UART: [kat] SHA2-256
901,507 UART: [kat] SHA2-384
904,168 UART: [kat] SHA2-512-ACC
906,069 UART: [kat] ECC-384
915,390 UART: [kat] HMAC-384Kdf
920,002 UART: [kat] LMS
1,168,314 UART: [kat] --
1,169,411 UART: [cold-reset] ++
1,169,773 UART: [fht] FHT @ 0x50003400
1,172,555 UART: [idev] ++
1,172,723 UART: [idev] CDI.KEYID = 6
1,173,084 UART: [idev] SUBJECT.KEYID = 7
1,173,509 UART: [idev] UDS.KEYID = 0
1,173,855 ready_for_fw is high
1,173,855 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,201 UART: [idev] Erasing UDS.KEYID = 0
1,198,465 UART: [idev] Sha1 KeyId Algorithm
1,207,423 UART: [idev] --
1,208,578 UART: [ldev] ++
1,208,746 UART: [ldev] CDI.KEYID = 6
1,209,110 UART: [ldev] SUBJECT.KEYID = 5
1,209,537 UART: [ldev] AUTHORITY.KEYID = 7
1,210,000 UART: [ldev] FE.KEYID = 1
1,215,170 UART: [ldev] Erasing FE.KEYID = 1
1,241,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,642 UART: [ldev] --
1,281,022 UART: [fwproc] Wait for Commands...
1,281,679 UART: [fwproc] Recv command 0x46574c44
1,282,412 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,112 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,421 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,355 >>> mbox cmd response: success
2,773,355 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,396 UART: [afmc] ++
2,774,564 UART: [afmc] CDI.KEYID = 6
2,774,927 UART: [afmc] SUBJECT.KEYID = 7
2,775,353 UART: [afmc] AUTHORITY.KEYID = 5
2,810,924 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,087 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,816 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,699 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,418 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,157 UART: [afmc] --
2,854,239 UART: [cold-reset] --
2,855,077 UART: [state] Locking Datavault
2,856,316 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,920 UART: [state] Locking ICCM
2,857,340 UART: [exit] Launching FMC @ 0x40000130
2,862,669 UART:
2,862,685 UART: Running Caliptra FMC ...
2,863,093 UART:
2,863,147 UART: [state] CFI Enabled
2,873,778 UART: [fht] FMC Alias Private Key: 7
2,981,885 UART: [art] Extend RT PCRs Done
2,982,313 UART: [art] Lock RT PCRs Done
2,984,249 UART: [art] Populate DV Done
2,992,570 UART: [fht] FMC Alias Private Key: 7
2,993,618 UART: [art] Derive CDI
2,993,898 UART: [art] Store in in slot 0x4
3,079,223 UART: [art] Derive Key Pair
3,079,583 UART: [art] Store priv key in slot 0x5
3,092,867 UART: [art] Derive Key Pair - Done
3,107,822 UART: [art] Signing Cert with AUTHO
3,108,302 UART: RITY.KEYID = 7
3,123,328 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,093 UART: [art] PUB.X = BFE9D6A10D1C9519ACFC23D747E610D85A8496881A7DCBB88B173C0ABC2FC1DD0D80984285EC8B7A4E1FF08C7535CA83
3,130,872 UART: [art] PUB.Y = 179975E6A7A1525E834A25F574E86C00429F50F90C97C688CFC28956C53DCAFB3DADE50D1EB098ED3D5CB3F37325E9C8
3,137,804 UART: [art] SIG.R = FA592619331F8BFB0B31C9327874C698ACC466D99BDEF0D40CF32BD980F8B58F882E17DDD167D3A3FD7C18CD7D6EC66A
3,144,586 UART: [art] SIG.S = 5B3CA5CC69DA5A28B577B77EED074DB3BF71FEBF50125C266BEA86F2E050DC937586BFA90B8707D238C04F7D8456A420
3,167,894 UART: Caliptra RT
3,168,147 UART: [state] CFI Enabled
3,275,900 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,512 UART: [rt]cmd =0x4c444556, len=4
3,316,975 >>> mbox cmd response data (687 bytes)
3,316,976 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,281 UART: [rt]cmd =0x43455246, len=4
3,358,508 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,090 ready_for_fw is high
1,055,090 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,447 >>> mbox cmd response: success
2,621,447 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,683,091 UART:
2,683,107 UART: Running Caliptra FMC ...
2,683,515 UART:
2,683,569 UART: [state] CFI Enabled
2,694,060 UART: [fht] FMC Alias Private Key: 7
2,802,477 UART: [art] Extend RT PCRs Done
2,802,905 UART: [art] Lock RT PCRs Done
2,804,533 UART: [art] Populate DV Done
2,812,938 UART: [fht] FMC Alias Private Key: 7
2,814,120 UART: [art] Derive CDI
2,814,400 UART: [art] Store in in slot 0x4
2,900,249 UART: [art] Derive Key Pair
2,900,609 UART: [art] Store priv key in slot 0x5
2,913,471 UART: [art] Derive Key Pair - Done
2,928,551 UART: [art] Signing Cert with AUTHO
2,929,031 UART: RITY.KEYID = 7
2,944,707 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,472 UART: [art] PUB.X = B708AEE12BFA892674EDC3FC1DBFB69F172CE3ADAE268138E02199F0BAADC94FFDAF5D2A9537C13E4373A06DFCBBCF61
2,952,271 UART: [art] PUB.Y = 4A3973DBBAAD4D0A657F62F9C83093C1C222CD85591EA7420D05BAC1EA561414C2DCF4AB6FE4FEA7750970837AC83776
2,959,221 UART: [art] SIG.R = 581AD15D4D1F91E800C838ECBDAAA6A57234656A2667A137274874112A72BE3A93A7B15FBDAB652A99DBE3487E3878A1
2,965,975 UART: [art] SIG.S = AA43E2351EFA8C4D6DD885C95D9CEECD6A98DF68A7AFEFB33089AAE86E1BFF62A9818C2721241A29912E5B905A0F2F24
2,989,739 UART: Caliptra RT
2,989,992 UART: [state] CFI Enabled
3,097,909 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,057 UART: [rt]cmd =0x4c444556, len=4
3,138,628 >>> mbox cmd response data (687 bytes)
3,138,629 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,018 UART: [rt]cmd =0x43455246, len=4
3,180,095 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
891,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,534 UART: [kat] ++
895,686 UART: [kat] sha1
899,814 UART: [kat] SHA2-256
901,754 UART: [kat] SHA2-384
904,523 UART: [kat] SHA2-512-ACC
906,424 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,995 UART: [kat] LMS
1,169,307 UART: [kat] --
1,170,522 UART: [cold-reset] ++
1,171,064 UART: [fht] FHT @ 0x50003400
1,173,774 UART: [idev] ++
1,173,942 UART: [idev] CDI.KEYID = 6
1,174,303 UART: [idev] SUBJECT.KEYID = 7
1,174,728 UART: [idev] UDS.KEYID = 0
1,175,074 ready_for_fw is high
1,175,074 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,582 UART: [idev] Erasing UDS.KEYID = 0
1,200,048 UART: [idev] Sha1 KeyId Algorithm
1,208,938 UART: [idev] --
1,210,069 UART: [ldev] ++
1,210,237 UART: [ldev] CDI.KEYID = 6
1,210,601 UART: [ldev] SUBJECT.KEYID = 5
1,211,028 UART: [ldev] AUTHORITY.KEYID = 7
1,211,491 UART: [ldev] FE.KEYID = 1
1,216,693 UART: [ldev] Erasing FE.KEYID = 1
1,243,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,397 UART: [ldev] --
1,282,851 UART: [fwproc] Wait for Commands...
1,283,558 UART: [fwproc] Recv command 0x46574c44
1,284,291 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,625 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,934 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,696 >>> mbox cmd response: success
2,773,696 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,943 UART: [afmc] ++
2,775,111 UART: [afmc] CDI.KEYID = 6
2,775,474 UART: [afmc] SUBJECT.KEYID = 7
2,775,900 UART: [afmc] AUTHORITY.KEYID = 5
2,812,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,274 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,003 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,886 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,605 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,546 UART: [afmc] --
2,855,478 UART: [cold-reset] --
2,856,388 UART: [state] Locking Datavault
2,857,521 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,125 UART: [state] Locking ICCM
2,858,639 UART: [exit] Launching FMC @ 0x40000130
2,863,968 UART:
2,863,984 UART: Running Caliptra FMC ...
2,864,392 UART:
2,864,535 UART: [state] CFI Enabled
2,875,210 UART: [fht] FMC Alias Private Key: 7
2,983,781 UART: [art] Extend RT PCRs Done
2,984,209 UART: [art] Lock RT PCRs Done
2,985,473 UART: [art] Populate DV Done
2,993,582 UART: [fht] FMC Alias Private Key: 7
2,994,564 UART: [art] Derive CDI
2,994,844 UART: [art] Store in in slot 0x4
3,080,429 UART: [art] Derive Key Pair
3,080,789 UART: [art] Store priv key in slot 0x5
3,093,893 UART: [art] Derive Key Pair - Done
3,108,442 UART: [art] Signing Cert with AUTHO
3,108,922 UART: RITY.KEYID = 7
3,123,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,745 UART: [art] PUB.X = E45FDA90EDB11A0392DD7734E87E13E606E38988AACD9279267FD9FC2FB1CC76E55A2AFAECF858D79CCAD8BF2E48FB4F
3,131,537 UART: [art] PUB.Y = 5689FDCE1A675A7C4B3046BF50A27EAE9BB8B97B9518FE9BA59DDB3BE8A67B0284984DE3EF7C948AA6ABCA35C498E99C
3,138,508 UART: [art] SIG.R = F3A3DD4AAFE3947B8EBDAF7F43E51DB681B0C130DE4C7AA41A33F006937F78039FC392D016E977CE91CC7D18CD26B9D2
3,145,292 UART: [art] SIG.S = 28A71EEA51F8B3B70262688DC94AF40BF59C84C36E0B6FA4C365C1DEFA3C8D5535A1D6EB36C39BC1AD44E8046B03175A
3,168,790 UART: Caliptra RT
3,169,135 UART: [state] CFI Enabled
3,277,540 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,952 UART: [rt]cmd =0x4c444556, len=4
3,318,463 >>> mbox cmd response data (687 bytes)
3,318,464 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,745 UART: [rt]cmd =0x43455246, len=4
3,359,774 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,275 ready_for_fw is high
1,056,275 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,486 >>> mbox cmd response: success
2,624,486 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,687,216 UART:
2,687,232 UART: Running Caliptra FMC ...
2,687,640 UART:
2,687,783 UART: [state] CFI Enabled
2,697,964 UART: [fht] FMC Alias Private Key: 7
2,805,653 UART: [art] Extend RT PCRs Done
2,806,081 UART: [art] Lock RT PCRs Done
2,807,723 UART: [art] Populate DV Done
2,815,802 UART: [fht] FMC Alias Private Key: 7
2,816,796 UART: [art] Derive CDI
2,817,076 UART: [art] Store in in slot 0x4
2,902,775 UART: [art] Derive Key Pair
2,903,135 UART: [art] Store priv key in slot 0x5
2,915,819 UART: [art] Derive Key Pair - Done
2,930,927 UART: [art] Signing Cert with AUTHO
2,931,407 UART: RITY.KEYID = 7
2,946,751 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,516 UART: [art] PUB.X = 189BB63F2806250A447A9EFE64AB8F4EE613B1134C430816F1A50B6A94D7E2B242F3B19DFE4835BBEBAFB92697775B60
2,954,282 UART: [art] PUB.Y = 7E22664AF723AEB5A7276D0B8895AC2B769DC69F3C6CA373B3285CD0AE8F5EB4B2CFB07D2F10F34D35A5DAFEDC121C6C
2,961,253 UART: [art] SIG.R = 65B4B3509582409C97927692AABA2EAFDD8BC2F2F99D499A2A1061A9A9CB0AC41A493F11AAA156D57E964A5DCDE87320
2,968,032 UART: [art] SIG.S = FE561BD04B341D131D5019AD47DAFED7E29105C2D563D67BAC10BBD86BF6E4F18067612094306BDA8E578292141CA6E0
2,991,908 UART: Caliptra RT
2,992,253 UART: [state] CFI Enabled
3,100,036 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,708 UART: [rt]cmd =0x4c444556, len=4
3,141,163 >>> mbox cmd response data (687 bytes)
3,141,164 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,170,533 UART: [rt]cmd =0x43455246, len=4
3,182,566 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,295 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,923 UART: [kat] SHA2-256
881,854 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,969 UART: [kat] ++
886,121 UART: [kat] sha1
890,447 UART: [kat] SHA2-256
892,385 UART: [kat] SHA2-384
895,278 UART: [kat] SHA2-512-ACC
897,179 UART: [kat] ECC-384
902,934 UART: [kat] HMAC-384Kdf
907,488 UART: [kat] LMS
1,475,684 UART: [kat] --
1,476,535 UART: [cold-reset] ++
1,477,033 UART: [fht] Storing FHT @ 0x50003400
1,479,814 UART: [idev] ++
1,479,982 UART: [idev] CDI.KEYID = 6
1,480,342 UART: [idev] SUBJECT.KEYID = 7
1,480,766 UART: [idev] UDS.KEYID = 0
1,481,111 ready_for_fw is high
1,481,111 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,678 UART: [idev] Erasing UDS.KEYID = 0
1,505,430 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,128 UART: [idev] --
1,515,311 UART: [ldev] ++
1,515,479 UART: [ldev] CDI.KEYID = 6
1,515,842 UART: [ldev] SUBJECT.KEYID = 5
1,516,268 UART: [ldev] AUTHORITY.KEYID = 7
1,516,731 UART: [ldev] FE.KEYID = 1
1,521,965 UART: [ldev] Erasing FE.KEYID = 1
1,547,716 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,312 UART: [ldev] --
1,586,597 UART: [fwproc] Waiting for Commands...
1,587,216 UART: [fwproc] Received command 0x46574c44
1,588,007 UART: [fwproc] Received Image of size 114332 bytes
2,886,317 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,159 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,511 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,502 >>> mbox cmd response: success
3,078,502 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,079,696 UART: [afmc] ++
3,079,864 UART: [afmc] CDI.KEYID = 6
3,080,226 UART: [afmc] SUBJECT.KEYID = 7
3,080,651 UART: [afmc] AUTHORITY.KEYID = 5
3,116,376 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,602 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,382 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,110 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,995 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,685 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,756 UART: [afmc] --
3,159,858 UART: [cold-reset] --
3,160,664 UART: [state] Locking Datavault
3,161,851 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,455 UART: [state] Locking ICCM
3,163,097 UART: [exit] Launching FMC @ 0x40000130
3,168,426 UART:
3,168,442 UART: Running Caliptra FMC ...
3,168,850 UART:
3,168,904 UART: [state] CFI Enabled
3,179,649 UART: [fht] FMC Alias Private Key: 7
3,287,316 UART: [art] Extend RT PCRs Done
3,287,744 UART: [art] Lock RT PCRs Done
3,289,336 UART: [art] Populate DV Done
3,297,521 UART: [fht] FMC Alias Private Key: 7
3,298,601 UART: [art] Derive CDI
3,298,881 UART: [art] Store in in slot 0x4
3,384,250 UART: [art] Derive Key Pair
3,384,610 UART: [art] Store priv key in slot 0x5
3,397,724 UART: [art] Derive Key Pair - Done
3,412,749 UART: [art] Signing Cert with AUTHO
3,413,229 UART: RITY.KEYID = 7
3,428,181 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,946 UART: [art] PUB.X = 05C9CD81AEC210F45C3BC164CF974197398116D12DBA3A70A456FBC726A7E16998826EFEF7BF06CD6B64D22C1E1EA47B
3,435,724 UART: [art] PUB.Y = CF3870CD543C4284AEF61E97A4FF3863179C2D266E6EA6F1E085DC64027101A52A006DF4E04A31430E4F6E83160FC348
3,442,642 UART: [art] SIG.R = 1715ABD667B739E7A79015D6CC327881269C9B1C62796ED1C1242A9477622CA93DBB178D1CA1E1711D2C22FEC7DC0AB9
3,449,415 UART: [art] SIG.S = 9C8D98684FF823CBC3C3F319F798064F447F4BA147B57FFB06BD479A8B787050027421A096D97AAE273998198A5F19A9
3,473,397 UART: Caliptra RT
3,473,650 UART: [state] CFI Enabled
3,581,443 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,705 UART: [rt]cmd =0x4c444556, len=4
3,622,106 >>> mbox cmd response data (687 bytes)
3,622,107 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,651,482 UART: [rt]cmd =0x43455246, len=4
3,663,871 >>> mbox cmd response data (920 bytes)
3,663,872 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,693,431 UART: [rt]cmd =0x43455252, len=4
3,704,377 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,543 ready_for_fw is high
1,362,543 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,658 >>> mbox cmd response: success
2,925,658 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,987,528 UART:
2,987,544 UART: Running Caliptra FMC ...
2,987,952 UART:
2,988,006 UART: [state] CFI Enabled
2,998,101 UART: [fht] FMC Alias Private Key: 7
3,106,590 UART: [art] Extend RT PCRs Done
3,107,018 UART: [art] Lock RT PCRs Done
3,108,488 UART: [art] Populate DV Done
3,116,515 UART: [fht] FMC Alias Private Key: 7
3,117,541 UART: [art] Derive CDI
3,117,821 UART: [art] Store in in slot 0x4
3,203,690 UART: [art] Derive Key Pair
3,204,050 UART: [art] Store priv key in slot 0x5
3,217,588 UART: [art] Derive Key Pair - Done
3,232,430 UART: [art] Signing Cert with AUTHO
3,232,910 UART: RITY.KEYID = 7
3,247,496 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,261 UART: [art] PUB.X = 6C2CD3F07207181504BF68E2D36558E1FE033602911EC338C8ECA62CCD118E59EC17628350C688843432EF318F895B27
3,255,013 UART: [art] PUB.Y = 2DCCAD60ECABEAA0E24BB3CE036DCB3C453A4B13E7AF9584EFC27A7CE3BB624B89C3BEE64109A4DC80A68D5F9A80A0A3
3,261,991 UART: [art] SIG.R = 5CB497C3EF7FC238EE36DB2FE5F51467AFD4B2583A0E02DC2CACB81A8E50C053C1EB467EE9169660D402EF35E6548A44
3,268,768 UART: [art] SIG.S = ADDD06FD80A98F408BBF8943255858819FA7872E3D7270D0B3C45979849BC28072D1AB84729205844436ABDAD780E915
3,292,251 UART: Caliptra RT
3,292,504 UART: [state] CFI Enabled
3,401,453 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,961 UART: [rt]cmd =0x4c444556, len=4
3,442,434 >>> mbox cmd response data (687 bytes)
3,442,435 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,782 UART: [rt]cmd =0x43455246, len=4
3,484,079 >>> mbox cmd response data (920 bytes)
3,484,080 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,513,289 UART: [rt]cmd =0x43455252, len=4
3,524,269 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,616 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,156 UART: [kat] SHA2-256
882,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,202 UART: [kat] ++
886,354 UART: [kat] sha1
890,478 UART: [kat] SHA2-256
892,416 UART: [kat] SHA2-384
895,163 UART: [kat] SHA2-512-ACC
897,064 UART: [kat] ECC-384
902,503 UART: [kat] HMAC-384Kdf
907,113 UART: [kat] LMS
1,475,309 UART: [kat] --
1,476,280 UART: [cold-reset] ++
1,476,610 UART: [fht] Storing FHT @ 0x50003400
1,479,211 UART: [idev] ++
1,479,379 UART: [idev] CDI.KEYID = 6
1,479,739 UART: [idev] SUBJECT.KEYID = 7
1,480,163 UART: [idev] UDS.KEYID = 0
1,480,508 ready_for_fw is high
1,480,508 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,599 UART: [idev] Erasing UDS.KEYID = 0
1,505,465 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,029 UART: [idev] --
1,515,058 UART: [ldev] ++
1,515,226 UART: [ldev] CDI.KEYID = 6
1,515,589 UART: [ldev] SUBJECT.KEYID = 5
1,516,015 UART: [ldev] AUTHORITY.KEYID = 7
1,516,478 UART: [ldev] FE.KEYID = 1
1,521,486 UART: [ldev] Erasing FE.KEYID = 1
1,546,343 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,619 UART: [ldev] --
1,586,028 UART: [fwproc] Waiting for Commands...
1,586,815 UART: [fwproc] Received command 0x46574c44
1,587,606 UART: [fwproc] Received Image of size 114332 bytes
2,885,798 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,620 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,972 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,761 >>> mbox cmd response: success
3,077,761 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,078,985 UART: [afmc] ++
3,079,153 UART: [afmc] CDI.KEYID = 6
3,079,515 UART: [afmc] SUBJECT.KEYID = 7
3,079,940 UART: [afmc] AUTHORITY.KEYID = 5
3,115,229 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,671 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,451 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,179 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,064 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,754 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,645 UART: [afmc] --
3,158,557 UART: [cold-reset] --
3,159,521 UART: [state] Locking Datavault
3,160,812 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,416 UART: [state] Locking ICCM
3,162,076 UART: [exit] Launching FMC @ 0x40000130
3,167,405 UART:
3,167,421 UART: Running Caliptra FMC ...
3,167,829 UART:
3,167,972 UART: [state] CFI Enabled
3,178,535 UART: [fht] FMC Alias Private Key: 7
3,285,814 UART: [art] Extend RT PCRs Done
3,286,242 UART: [art] Lock RT PCRs Done
3,288,236 UART: [art] Populate DV Done
3,296,379 UART: [fht] FMC Alias Private Key: 7
3,297,391 UART: [art] Derive CDI
3,297,671 UART: [art] Store in in slot 0x4
3,383,402 UART: [art] Derive Key Pair
3,383,762 UART: [art] Store priv key in slot 0x5
3,396,846 UART: [art] Derive Key Pair - Done
3,411,352 UART: [art] Signing Cert with AUTHO
3,411,832 UART: RITY.KEYID = 7
3,426,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,647 UART: [art] PUB.X = F24269AF0DE44F45DC4B059DF618B64D614E0DB0960081FE1E9E22250EDE820BA3BC6F391C1DCB954E2A4874B2B7B574
3,434,392 UART: [art] PUB.Y = DC76818D597F2393DB8C28AE7F30429BE4BCD6D8D741E468BB292B2D0FD5D0FFB8B08B9AE0BB8F8908E7E70286E98062
3,441,347 UART: [art] SIG.R = ADAAD31DF550AC10E31DA31D725CC8F875DED5CE6900E0FFC80B9B22E379A45F3DD77F80675CD239E18D7876640894EF
3,448,105 UART: [art] SIG.S = 2DD0E66D90A9857AC4989F311DA9F864C9E5D2D10E7EB99EFC7EA847A6164E735488E16F6838B015DF976ACC18C7E56D
3,471,463 UART: Caliptra RT
3,471,808 UART: [state] CFI Enabled
3,579,881 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,495 UART: [rt]cmd =0x4c444556, len=4
3,620,940 >>> mbox cmd response data (687 bytes)
3,620,941 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,650,496 UART: [rt]cmd =0x43455246, len=4
3,662,949 >>> mbox cmd response data (920 bytes)
3,662,950 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,692,165 UART: [rt]cmd =0x43455252, len=4
3,702,949 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,570 ready_for_fw is high
1,363,570 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,967 >>> mbox cmd response: success
2,929,967 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,992,171 UART:
2,992,187 UART: Running Caliptra FMC ...
2,992,595 UART:
2,992,738 UART: [state] CFI Enabled
3,003,141 UART: [fht] FMC Alias Private Key: 7
3,111,526 UART: [art] Extend RT PCRs Done
3,111,954 UART: [art] Lock RT PCRs Done
3,113,704 UART: [art] Populate DV Done
3,121,785 UART: [fht] FMC Alias Private Key: 7
3,122,895 UART: [art] Derive CDI
3,123,175 UART: [art] Store in in slot 0x4
3,209,156 UART: [art] Derive Key Pair
3,209,516 UART: [art] Store priv key in slot 0x5
3,223,444 UART: [art] Derive Key Pair - Done
3,238,035 UART: [art] Signing Cert with AUTHO
3,238,515 UART: RITY.KEYID = 7
3,253,835 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,600 UART: [art] PUB.X = 78F062BB090686A890F9EE637ECC67C2CD39C1C236EE9048FB0D04B31E20D3AEE3C3DCE928464F74D1D1DC64B7C56C52
3,261,372 UART: [art] PUB.Y = 840C7B800A6E111BFE42B3E6B3D442100CF1869FF2E6640DDE6A434151755B92FAB2BBC32FEF52D2ACF5D1D17E3A0EA1
3,268,325 UART: [art] SIG.R = 6D02B67F2DCD8D35C6D49431926CBB99941CD15AA248AE7D9A711B2BF151C6D227762DC96F45C65F9240A5CFB8D2E26F
3,275,104 UART: [art] SIG.S = 03D33A57501D1D2C28A433CC7979F1746A0ED565052C2B9BCF55D586579C060EED439CE9FECE6209AFCF1FF58B01DC10
3,298,930 UART: Caliptra RT
3,299,275 UART: [state] CFI Enabled
3,406,827 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,415 UART: [rt]cmd =0x4c444556, len=4
3,447,708 >>> mbox cmd response data (687 bytes)
3,447,709 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,477,036 UART: [rt]cmd =0x43455246, len=4
3,489,429 >>> mbox cmd response data (920 bytes)
3,489,430 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,879 UART: [rt]cmd =0x43455252, len=4
3,529,689 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
893,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,461 UART: [kat] ++
897,613 UART: [kat] sha1
901,879 UART: [kat] SHA2-256
903,819 UART: [kat] SHA2-384
906,590 UART: [kat] SHA2-512-ACC
908,491 UART: [kat] ECC-384
918,294 UART: [kat] HMAC-384Kdf
922,988 UART: [kat] LMS
1,171,316 UART: [kat] --
1,172,183 UART: [cold-reset] ++
1,172,701 UART: [fht] FHT @ 0x50003400
1,175,362 UART: [idev] ++
1,175,530 UART: [idev] CDI.KEYID = 6
1,175,890 UART: [idev] SUBJECT.KEYID = 7
1,176,314 UART: [idev] UDS.KEYID = 0
1,176,659 ready_for_fw is high
1,176,659 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,290 UART: [idev] Erasing UDS.KEYID = 0
1,201,463 UART: [idev] Sha1 KeyId Algorithm
1,209,779 UART: [idev] --
1,210,773 UART: [ldev] ++
1,210,941 UART: [ldev] CDI.KEYID = 6
1,211,304 UART: [ldev] SUBJECT.KEYID = 5
1,211,730 UART: [ldev] AUTHORITY.KEYID = 7
1,212,193 UART: [ldev] FE.KEYID = 1
1,217,187 UART: [ldev] Erasing FE.KEYID = 1
1,243,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,521 UART: [ldev] --
1,282,802 UART: [fwproc] Wait for Commands...
1,283,480 UART: [fwproc] Recv command 0x46574c44
1,284,208 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,251 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,022 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,326 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,069 >>> mbox cmd response: success
2,775,069 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,776,137 UART: [afmc] ++
2,776,305 UART: [afmc] CDI.KEYID = 6
2,776,667 UART: [afmc] SUBJECT.KEYID = 7
2,777,092 UART: [afmc] AUTHORITY.KEYID = 5
2,812,017 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,444 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,192 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,920 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,805 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,524 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,322 UART: [afmc] --
2,855,244 UART: [cold-reset] --
2,856,048 UART: [state] Locking Datavault
2,857,167 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,771 UART: [state] Locking ICCM
2,858,311 UART: [exit] Launching FMC @ 0x40000130
2,863,640 UART:
2,863,656 UART: Running Caliptra FMC ...
2,864,064 UART:
2,864,118 UART: [state] CFI Enabled
2,874,453 UART: [fht] FMC Alias Private Key: 7
2,983,248 UART: [art] Extend RT PCRs Done
2,983,676 UART: [art] Lock RT PCRs Done
2,985,280 UART: [art] Populate DV Done
2,993,489 UART: [fht] FMC Alias Private Key: 7
2,994,605 UART: [art] Derive CDI
2,994,885 UART: [art] Store in in slot 0x4
3,080,896 UART: [art] Derive Key Pair
3,081,256 UART: [art] Store priv key in slot 0x5
3,093,882 UART: [art] Derive Key Pair - Done
3,108,826 UART: [art] Signing Cert with AUTHO
3,109,306 UART: RITY.KEYID = 7
3,124,456 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,221 UART: [art] PUB.X = 3FD6D0338A2B0B34978507BFCBE6050DC964C3B0622CEFEEBD943D8023AED60CDAB001DD04F583B3D1627E563602B8A6
3,131,981 UART: [art] PUB.Y = E66016587A640E9C0505247F05EEF5DFFAE4E804C04CC743B3F04AF07D87232C3A064B49A554915BD368FF8B6C246A63
3,138,917 UART: [art] SIG.R = 85855A0AFBAA7A14ADCFF526BAB74F1DF7188C246DE4F06AA355B4707D576C7256F82EBF2B8436CB98F01D9C2D93A256
3,145,700 UART: [art] SIG.S = 35954DA1DCDB82156F0BF65A642FE44861913D876279999AFF1DC2F06831166700AD0187084EB4532449B10C35105C03
3,169,466 UART: Caliptra RT
3,169,719 UART: [state] CFI Enabled
3,276,944 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,350 UART: [rt]cmd =0x4c444556, len=4
3,317,803 >>> mbox cmd response data (687 bytes)
3,317,804 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,093 UART: [rt]cmd =0x43455246, len=4
3,359,150 >>> mbox cmd response data (887 bytes)
3,359,151 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,388,710 UART: [rt]cmd =0x43455252, len=4
3,399,464 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,875 ready_for_fw is high
1,059,875 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,354 >>> mbox cmd response: success
2,626,354 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,688,160 UART:
2,688,176 UART: Running Caliptra FMC ...
2,688,584 UART:
2,688,638 UART: [state] CFI Enabled
2,699,171 UART: [fht] FMC Alias Private Key: 7
2,807,292 UART: [art] Extend RT PCRs Done
2,807,720 UART: [art] Lock RT PCRs Done
2,809,084 UART: [art] Populate DV Done
2,817,253 UART: [fht] FMC Alias Private Key: 7
2,818,367 UART: [art] Derive CDI
2,818,647 UART: [art] Store in in slot 0x4
2,904,338 UART: [art] Derive Key Pair
2,904,698 UART: [art] Store priv key in slot 0x5
2,917,046 UART: [art] Derive Key Pair - Done
2,931,908 UART: [art] Signing Cert with AUTHO
2,932,388 UART: RITY.KEYID = 7
2,947,770 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,535 UART: [art] PUB.X = 5B1AF6071E9CFBD1938BCD9AA9211880E287A1711F8DD1DA6C575472BFCC363BD65F105BF9E042B79EDB19D13810FB56
2,955,316 UART: [art] PUB.Y = 79BE1F1DDD2E713EC99F722A4BC3E500984BBA89F3D04FE3BC79D3C63F0A539684BE3BCA35E01853CE5136AACB18DFB3
2,962,263 UART: [art] SIG.R = 85B9BD2ECEC668C0E0ADE37661505D6533373F82FFE57623A041312E98D75B712017D2547D007D5F27B39EE1DDAEA97F
2,969,017 UART: [art] SIG.S = DEA9CC7C09E11E74BB5E288D874E668C5E857CB0F186697F6578FD085CCF1D968D9C790F3BF8A6CC10628DBFA2BB915C
2,992,851 UART: Caliptra RT
2,993,104 UART: [state] CFI Enabled
3,101,682 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,208 UART: [rt]cmd =0x4c444556, len=4
3,142,551 >>> mbox cmd response data (687 bytes)
3,142,552 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,643 UART: [rt]cmd =0x43455246, len=4
3,183,458 >>> mbox cmd response data (887 bytes)
3,183,459 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,212,810 UART: [rt]cmd =0x43455252, len=4
3,223,433 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,133 UART: [kat] SHA2-256
893,783 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,908 UART: [kat] ++
898,060 UART: [kat] sha1
902,458 UART: [kat] SHA2-256
904,398 UART: [kat] SHA2-384
907,137 UART: [kat] SHA2-512-ACC
909,038 UART: [kat] ECC-384
918,327 UART: [kat] HMAC-384Kdf
923,001 UART: [kat] LMS
1,171,329 UART: [kat] --
1,172,218 UART: [cold-reset] ++
1,172,612 UART: [fht] FHT @ 0x50003400
1,175,183 UART: [idev] ++
1,175,351 UART: [idev] CDI.KEYID = 6
1,175,711 UART: [idev] SUBJECT.KEYID = 7
1,176,135 UART: [idev] UDS.KEYID = 0
1,176,480 ready_for_fw is high
1,176,480 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,185 UART: [idev] Erasing UDS.KEYID = 0
1,201,622 UART: [idev] Sha1 KeyId Algorithm
1,210,170 UART: [idev] --
1,211,326 UART: [ldev] ++
1,211,494 UART: [ldev] CDI.KEYID = 6
1,211,857 UART: [ldev] SUBJECT.KEYID = 5
1,212,283 UART: [ldev] AUTHORITY.KEYID = 7
1,212,746 UART: [ldev] FE.KEYID = 1
1,217,784 UART: [ldev] Erasing FE.KEYID = 1
1,244,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,106 UART: [ldev] --
1,283,447 UART: [fwproc] Wait for Commands...
1,284,093 UART: [fwproc] Recv command 0x46574c44
1,284,821 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,548 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,001 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,305 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,140 >>> mbox cmd response: success
2,775,140 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,776,268 UART: [afmc] ++
2,776,436 UART: [afmc] CDI.KEYID = 6
2,776,798 UART: [afmc] SUBJECT.KEYID = 7
2,777,223 UART: [afmc] AUTHORITY.KEYID = 5
2,812,182 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,519 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,247 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,132 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,851 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,679 UART: [afmc] --
2,855,647 UART: [cold-reset] --
2,856,553 UART: [state] Locking Datavault
2,857,476 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,080 UART: [state] Locking ICCM
2,858,598 UART: [exit] Launching FMC @ 0x40000130
2,863,927 UART:
2,863,943 UART: Running Caliptra FMC ...
2,864,351 UART:
2,864,494 UART: [state] CFI Enabled
2,875,141 UART: [fht] FMC Alias Private Key: 7
2,982,916 UART: [art] Extend RT PCRs Done
2,983,344 UART: [art] Lock RT PCRs Done
2,985,010 UART: [art] Populate DV Done
2,993,405 UART: [fht] FMC Alias Private Key: 7
2,994,441 UART: [art] Derive CDI
2,994,721 UART: [art] Store in in slot 0x4
3,080,514 UART: [art] Derive Key Pair
3,080,874 UART: [art] Store priv key in slot 0x5
3,094,120 UART: [art] Derive Key Pair - Done
3,108,860 UART: [art] Signing Cert with AUTHO
3,109,340 UART: RITY.KEYID = 7
3,124,472 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,237 UART: [art] PUB.X = 4DAF970411BA3067C6281ADC2AC16359C5AD1DCC3548C83C074B2234F08C05D6EE63C8FC5F26123E1CCB879E88D4BEA9
3,132,012 UART: [art] PUB.Y = F066965FDE8F587D30C830AFFACFA13F60082ECDEC45ABFE6B97C49B3F8442DA8F9F2F9D526987AB06D087D9F8A344CE
3,138,978 UART: [art] SIG.R = EAB02A7BE0BB725B5D4D80990E869B9AEB8BFF1CC019BF4CEBA724A008F8756D364DEAB9E3A928917B584583F72CFC74
3,145,762 UART: [art] SIG.S = E7210D2C0950C4F4706A0DFA907859D4E0941E6ACEFB911BFBF5A678E49C310515C661B6EA4A8B9E4ED8066979F25939
3,169,206 UART: Caliptra RT
3,169,551 UART: [state] CFI Enabled
3,278,053 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,553 UART: [rt]cmd =0x4c444556, len=4
3,319,164 >>> mbox cmd response data (687 bytes)
3,319,165 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,808 UART: [rt]cmd =0x43455246, len=4
3,360,857 >>> mbox cmd response data (887 bytes)
3,360,858 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,390,219 UART: [rt]cmd =0x43455252, len=4
3,401,184 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,894 ready_for_fw is high
1,060,894 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,413 >>> mbox cmd response: success
2,626,413 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,688,713 UART:
2,688,729 UART: Running Caliptra FMC ...
2,689,137 UART:
2,689,280 UART: [state] CFI Enabled
2,700,095 UART: [fht] FMC Alias Private Key: 7
2,808,302 UART: [art] Extend RT PCRs Done
2,808,730 UART: [art] Lock RT PCRs Done
2,810,536 UART: [art] Populate DV Done
2,818,699 UART: [fht] FMC Alias Private Key: 7
2,819,835 UART: [art] Derive CDI
2,820,115 UART: [art] Store in in slot 0x4
2,905,580 UART: [art] Derive Key Pair
2,905,940 UART: [art] Store priv key in slot 0x5
2,918,984 UART: [art] Derive Key Pair - Done
2,933,878 UART: [art] Signing Cert with AUTHO
2,934,358 UART: RITY.KEYID = 7
2,949,834 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,599 UART: [art] PUB.X = 73BEB3A9592E4FE8478CCC25DCAA8A08C29564FBE16C05A43344C8625BCC3B11162A5FD8D36588283620CFA8D61963B9
2,957,371 UART: [art] PUB.Y = 927A483AB119D6AE4609461B614EEBC969C1AD318788AC5428D399F7089FB871F0CA6E2158301765B64FE54DBC8A55B9
2,964,317 UART: [art] SIG.R = 9E64D0B549D2CAE0A41A910FB516FEE7831D34D61BF8DE8B5E3E4EE058DB3339F16B5809A6F6CE82851CE363D24543E8
2,971,093 UART: [art] SIG.S = CDBC3C41091432FB62C0F6F43B79CF8FD866F0969313892CBCE9E60AA54D17A9C19A15230A9B663E27952A7C059E358D
2,994,262 UART: Caliptra RT
2,994,607 UART: [state] CFI Enabled
3,102,987 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,321 UART: [rt]cmd =0x4c444556, len=4
3,143,744 >>> mbox cmd response data (687 bytes)
3,143,745 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,776 UART: [rt]cmd =0x43455246, len=4
3,184,801 >>> mbox cmd response data (887 bytes)
3,184,802 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,214,231 UART: [rt]cmd =0x43455252, len=4
3,225,178 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
891,260 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,389 UART: [kat] ++
895,541 UART: [kat] sha1
899,775 UART: [kat] SHA2-256
901,715 UART: [kat] SHA2-384
904,498 UART: [kat] SHA2-512-ACC
906,399 UART: [kat] ECC-384
916,172 UART: [kat] HMAC-384Kdf
920,766 UART: [kat] LMS
1,169,078 UART: [kat] --
1,169,907 UART: [cold-reset] ++
1,170,435 UART: [fht] FHT @ 0x50003400
1,173,245 UART: [idev] ++
1,173,413 UART: [idev] CDI.KEYID = 6
1,173,774 UART: [idev] SUBJECT.KEYID = 7
1,174,199 UART: [idev] UDS.KEYID = 0
1,174,545 ready_for_fw is high
1,174,545 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,719 UART: [idev] Erasing UDS.KEYID = 0
1,198,399 UART: [idev] Sha1 KeyId Algorithm
1,207,309 UART: [idev] --
1,208,294 UART: [ldev] ++
1,208,462 UART: [ldev] CDI.KEYID = 6
1,208,826 UART: [ldev] SUBJECT.KEYID = 5
1,209,253 UART: [ldev] AUTHORITY.KEYID = 7
1,209,716 UART: [ldev] FE.KEYID = 1
1,214,872 UART: [ldev] Erasing FE.KEYID = 1
1,241,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,676 UART: [ldev] --
1,281,172 UART: [fwproc] Wait for Commands...
1,281,867 UART: [fwproc] Recv command 0x46574c44
1,282,600 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,718 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,967 >>> mbox cmd response: success
2,772,967 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,142 UART: [afmc] ++
2,774,310 UART: [afmc] CDI.KEYID = 6
2,774,673 UART: [afmc] SUBJECT.KEYID = 7
2,775,099 UART: [afmc] AUTHORITY.KEYID = 5
2,810,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,430 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,181 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,910 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,793 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,512 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,363 UART: [afmc] --
2,853,471 UART: [cold-reset] --
2,854,487 UART: [state] Locking Datavault
2,855,978 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,582 UART: [state] Locking ICCM
2,857,210 UART: [exit] Launching FMC @ 0x40000130
2,862,539 UART:
2,862,555 UART: Running Caliptra FMC ...
2,862,963 UART:
2,863,017 UART: [state] CFI Enabled
2,873,460 UART: [fht] FMC Alias Private Key: 7
2,982,007 UART: [art] Extend RT PCRs Done
2,982,435 UART: [art] Lock RT PCRs Done
2,984,041 UART: [art] Populate DV Done
2,992,280 UART: [fht] FMC Alias Private Key: 7
2,993,392 UART: [art] Derive CDI
2,993,672 UART: [art] Store in in slot 0x4
3,079,587 UART: [art] Derive Key Pair
3,079,947 UART: [art] Store priv key in slot 0x5
3,093,745 UART: [art] Derive Key Pair - Done
3,108,722 UART: [art] Signing Cert with AUTHO
3,109,202 UART: RITY.KEYID = 7
3,124,070 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,835 UART: [art] PUB.X = 8B4ABD80A6FF732499F28D1B3716D9FC4E772B938A2C87190C7E786E981F62275243237B646AD6470A16A5A1F6191AEC
3,131,599 UART: [art] PUB.Y = DA62E3ACEA729A1E13A236078B963DAF665C4A9D63E592F5604319AA1AEFA55271B396FEE0F354D086058CD2DE53CEE6
3,138,557 UART: [art] SIG.R = 34ABA64B6B579E39ABF03DA3068B419E9B1EA0D3F9B8B354F0C4127A9502B209BFED2A5EE8EAFED5766BCC8F31122560
3,145,336 UART: [art] SIG.S = D72E8774A04EF49941F24E064FC0B778D60D0F11F4E19AFD3C38758F303EBA1084397BC14308C74986738A40DD1A8FFB
3,168,911 UART: Caliptra RT
3,169,164 UART: [state] CFI Enabled
3,277,245 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,753 UART: [rt]cmd =0x4c444556, len=4
3,318,136 >>> mbox cmd response data (687 bytes)
3,318,137 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,446 UART: [rt]cmd =0x43455246, len=4
3,359,527 >>> mbox cmd response data (887 bytes)
3,359,528 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,388,779 UART: [rt]cmd =0x43455252, len=4
3,399,527 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,482 ready_for_fw is high
1,055,482 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,113 >>> mbox cmd response: success
2,622,113 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,684,363 UART:
2,684,379 UART: Running Caliptra FMC ...
2,684,787 UART:
2,684,841 UART: [state] CFI Enabled
2,695,184 UART: [fht] FMC Alias Private Key: 7
2,802,949 UART: [art] Extend RT PCRs Done
2,803,377 UART: [art] Lock RT PCRs Done
2,804,553 UART: [art] Populate DV Done
2,812,498 UART: [fht] FMC Alias Private Key: 7
2,813,458 UART: [art] Derive CDI
2,813,738 UART: [art] Store in in slot 0x4
2,899,583 UART: [art] Derive Key Pair
2,899,943 UART: [art] Store priv key in slot 0x5
2,913,389 UART: [art] Derive Key Pair - Done
2,928,168 UART: [art] Signing Cert with AUTHO
2,928,648 UART: RITY.KEYID = 7
2,944,034 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,799 UART: [art] PUB.X = C3E13B3A669939A92825311D3076A686D56F9BDEE1BC4EF24C8F2990B1578D9AAB49CF7A5428C27FB3BDB01DE2567ACF
2,951,583 UART: [art] PUB.Y = 6166D8FA2B3F5A29FCB731540577D15D95FFC7F552F23932D2767F72E818DC99D3C273D6DEC42725B449441B4C832757
2,958,528 UART: [art] SIG.R = 4710AB013DC7A9F9CD8DF84ECF05D31332161A5CBF8BCE68E5980AA21C5004ED610D924688B1F810A7C0EA121F638ACB
2,965,297 UART: [art] SIG.S = A54596D8AE8F496C7759405081C41AD34A12A85EB27B1A865B9C16E9FAEF2D50A9125D1B94182A2F282314DE0142D0A2
2,989,257 UART: Caliptra RT
2,989,510 UART: [state] CFI Enabled
3,097,001 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,507 UART: [rt]cmd =0x4c444556, len=4
3,137,944 >>> mbox cmd response data (687 bytes)
3,137,945 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,370 UART: [rt]cmd =0x43455246, len=4
3,179,291 >>> mbox cmd response data (887 bytes)
3,179,292 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,208,731 UART: [rt]cmd =0x43455252, len=4
3,219,513 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,727 UART: [state] LifecycleState = Unprovisioned
86,382 UART: [state] DebugLocked = No
86,986 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
891,677 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,806 UART: [kat] ++
895,958 UART: [kat] sha1
900,114 UART: [kat] SHA2-256
902,054 UART: [kat] SHA2-384
904,899 UART: [kat] SHA2-512-ACC
906,800 UART: [kat] ECC-384
916,307 UART: [kat] HMAC-384Kdf
920,865 UART: [kat] LMS
1,169,177 UART: [kat] --
1,169,844 UART: [cold-reset] ++
1,170,202 UART: [fht] FHT @ 0x50003400
1,172,844 UART: [idev] ++
1,173,012 UART: [idev] CDI.KEYID = 6
1,173,373 UART: [idev] SUBJECT.KEYID = 7
1,173,798 UART: [idev] UDS.KEYID = 0
1,174,144 ready_for_fw is high
1,174,144 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,150 UART: [idev] Erasing UDS.KEYID = 0
1,199,230 UART: [idev] Sha1 KeyId Algorithm
1,207,934 UART: [idev] --
1,208,987 UART: [ldev] ++
1,209,155 UART: [ldev] CDI.KEYID = 6
1,209,519 UART: [ldev] SUBJECT.KEYID = 5
1,209,946 UART: [ldev] AUTHORITY.KEYID = 7
1,210,409 UART: [ldev] FE.KEYID = 1
1,215,725 UART: [ldev] Erasing FE.KEYID = 1
1,242,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,209 UART: [ldev] --
1,281,665 UART: [fwproc] Wait for Commands...
1,282,448 UART: [fwproc] Recv command 0x46574c44
1,283,181 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,715 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,549 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,858 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,600 >>> mbox cmd response: success
2,774,600 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,775,835 UART: [afmc] ++
2,776,003 UART: [afmc] CDI.KEYID = 6
2,776,366 UART: [afmc] SUBJECT.KEYID = 7
2,776,792 UART: [afmc] AUTHORITY.KEYID = 5
2,812,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,119 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,870 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,599 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,482 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,201 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,984 UART: [afmc] --
2,855,966 UART: [cold-reset] --
2,856,740 UART: [state] Locking Datavault
2,857,933 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,537 UART: [state] Locking ICCM
2,859,063 UART: [exit] Launching FMC @ 0x40000130
2,864,392 UART:
2,864,408 UART: Running Caliptra FMC ...
2,864,816 UART:
2,864,959 UART: [state] CFI Enabled
2,875,500 UART: [fht] FMC Alias Private Key: 7
2,983,309 UART: [art] Extend RT PCRs Done
2,983,737 UART: [art] Lock RT PCRs Done
2,985,477 UART: [art] Populate DV Done
2,993,628 UART: [fht] FMC Alias Private Key: 7
2,994,762 UART: [art] Derive CDI
2,995,042 UART: [art] Store in in slot 0x4
3,080,659 UART: [art] Derive Key Pair
3,081,019 UART: [art] Store priv key in slot 0x5
3,094,285 UART: [art] Derive Key Pair - Done
3,108,594 UART: [art] Signing Cert with AUTHO
3,109,074 UART: RITY.KEYID = 7
3,124,158 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,923 UART: [art] PUB.X = 446FFB3D0D042B9C951A02418E30B0AD55CB9CE00357A00692E0F54B765C825A3A07E962C0AC44ADC06FA03D6C7FDF2F
3,131,689 UART: [art] PUB.Y = 9645EFD86573A97AEA0170A4E6D89A14B6F41F9F3094C3F1056553C80424452E88D1DB802DE723057D3A7FBA509028B2
3,138,625 UART: [art] SIG.R = E773A48C904985E74559CF3940BC5C1176426285041799F81C2EA5EF89D91F1BF03F1D00421150AB02DF55BE50D4B715
3,145,363 UART: [art] SIG.S = D2680882EBB0B042255A3D0434357FDF29F4D6953BE4A3B235DDCE802A53100F23B482978D4EF9F71C4EC1FA5A662940
3,169,369 UART: Caliptra RT
3,169,714 UART: [state] CFI Enabled
3,277,654 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,110 UART: [rt]cmd =0x4c444556, len=4
3,318,599 >>> mbox cmd response data (687 bytes)
3,318,600 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,979 UART: [rt]cmd =0x43455246, len=4
3,360,198 >>> mbox cmd response data (887 bytes)
3,360,199 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,389,480 UART: [rt]cmd =0x43455252, len=4
3,400,073 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,423 ready_for_fw is high
1,056,423 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,208 >>> mbox cmd response: success
2,622,208 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,683,508 UART:
2,683,524 UART: Running Caliptra FMC ...
2,683,932 UART:
2,684,075 UART: [state] CFI Enabled
2,694,778 UART: [fht] FMC Alias Private Key: 7
2,802,317 UART: [art] Extend RT PCRs Done
2,802,745 UART: [art] Lock RT PCRs Done
2,804,447 UART: [art] Populate DV Done
2,812,938 UART: [fht] FMC Alias Private Key: 7
2,814,108 UART: [art] Derive CDI
2,814,388 UART: [art] Store in in slot 0x4
2,899,973 UART: [art] Derive Key Pair
2,900,333 UART: [art] Store priv key in slot 0x5
2,914,331 UART: [art] Derive Key Pair - Done
2,928,822 UART: [art] Signing Cert with AUTHO
2,929,302 UART: RITY.KEYID = 7
2,944,934 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,699 UART: [art] PUB.X = 15F6C666236AC7C7C0186A4E785AE4185BF56A2FDEA13B1301043C41D4E3A365FF5DF9759AAA75ED7C33FF1C8736406A
2,952,473 UART: [art] PUB.Y = 03FDB9FF281D8968D130A3CB08526C2C17C6575CC8FC918BF1BBA9120E39DD31555742FD3A9EA53A98361E691170E4F8
2,959,420 UART: [art] SIG.R = CBF7147A11B784FD70FF7D8D8863E4EC928C3276780277D33D1E80794A15B737F742C8219B8668B34E91A93602524CF5
2,966,178 UART: [art] SIG.S = 44800BDB3DD2D8A1A79EA0A5F9183DA3F0EF7B36D918E3A1C41CE2B4558ABA8E8F0B70D7BA7D4D2EDF1E9FA6D1477B45
2,989,667 UART: Caliptra RT
2,990,012 UART: [state] CFI Enabled
3,098,475 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,993 UART: [rt]cmd =0x4c444556, len=4
3,139,388 >>> mbox cmd response data (687 bytes)
3,139,389 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,814 UART: [rt]cmd =0x43455246, len=4
3,180,811 >>> mbox cmd response data (887 bytes)
3,180,812 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,210,247 UART: [rt]cmd =0x43455252, len=4
3,220,911 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,600 UART: [state] LifecycleState = Unprovisioned
86,255 UART: [state] DebugLocked = No
86,987 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,619 UART: [kat] SHA2-256
882,550 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,665 UART: [kat] ++
886,817 UART: [kat] sha1
891,053 UART: [kat] SHA2-256
892,991 UART: [kat] SHA2-384
895,768 UART: [kat] SHA2-512-ACC
897,669 UART: [kat] ECC-384
902,922 UART: [kat] HMAC-384Kdf
907,442 UART: [kat] LMS
1,475,638 UART: [kat] --
1,476,385 UART: [cold-reset] ++
1,476,883 UART: [fht] Storing FHT @ 0x50003400
1,479,644 UART: [idev] ++
1,479,812 UART: [idev] CDI.KEYID = 6
1,480,172 UART: [idev] SUBJECT.KEYID = 7
1,480,596 UART: [idev] UDS.KEYID = 0
1,480,941 ready_for_fw is high
1,480,941 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,264 UART: [idev] Erasing UDS.KEYID = 0
1,505,010 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,528 UART: [idev] --
1,514,719 UART: [ldev] ++
1,514,887 UART: [ldev] CDI.KEYID = 6
1,515,250 UART: [ldev] SUBJECT.KEYID = 5
1,515,676 UART: [ldev] AUTHORITY.KEYID = 7
1,516,139 UART: [ldev] FE.KEYID = 1
1,521,689 UART: [ldev] Erasing FE.KEYID = 1
1,546,744 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,422 UART: [ldev] --
1,585,699 UART: [fwproc] Waiting for Commands...
1,586,332 UART: [fwproc] Received command 0x46574c44
1,587,123 UART: [fwproc] Received Image of size 114332 bytes
2,885,153 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,657 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,009 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,864 >>> mbox cmd response: success
3,077,864 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,079,002 UART: [afmc] ++
3,079,170 UART: [afmc] CDI.KEYID = 6
3,079,532 UART: [afmc] SUBJECT.KEYID = 7
3,079,957 UART: [afmc] AUTHORITY.KEYID = 5
3,114,852 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,990 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,770 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,498 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,383 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,073 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,982 UART: [afmc] --
3,158,090 UART: [cold-reset] --
3,158,980 UART: [state] Locking Datavault
3,159,979 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,583 UART: [state] Locking ICCM
3,161,149 UART: [exit] Launching FMC @ 0x40000130
3,166,478 UART:
3,166,494 UART: Running Caliptra FMC ...
3,166,902 UART:
3,166,956 UART: [state] CFI Enabled
3,177,525 UART: [fht] FMC Alias Private Key: 7
3,284,876 UART: [art] Extend RT PCRs Done
3,285,304 UART: [art] Lock RT PCRs Done
3,286,972 UART: [art] Populate DV Done
3,294,989 UART: [fht] FMC Alias Private Key: 7
3,296,073 UART: [art] Derive CDI
3,296,353 UART: [art] Store in in slot 0x4
3,382,164 UART: [art] Derive Key Pair
3,382,524 UART: [art] Store priv key in slot 0x5
3,396,190 UART: [art] Derive Key Pair - Done
3,410,647 UART: [art] Signing Cert with AUTHO
3,411,127 UART: RITY.KEYID = 7
3,426,133 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,898 UART: [art] PUB.X = E7D1906A60DB721BE5033FB42A7E54109F992660C95AF1D3E790D83DB0C9D7D9F0C484882F01B67BE1B01EBB45DA6409
3,433,667 UART: [art] PUB.Y = 92E52073553389CFEE1BEDCEC8843A77DC41D692C911CE8202C051E3E50EA070CE037F966FD5D2BB77920371C2EEEF97
3,440,615 UART: [art] SIG.R = A3ACECCF2DD3A5A0D316341D98E9AEBDB0BCB8BDC0A52585BD7DA4376EA28171932ADEAC7B6462A2D6DABEF346EC1A49
3,447,419 UART: [art] SIG.S = D9790BCF98BE3CF5C30F4B236605D1AEAE9EB0AAB71541CC2E878E52A42094DF633D932581EE9B91712750D67F7C88A3
3,471,065 UART: Caliptra RT
3,471,318 UART: [state] CFI Enabled
3,578,590 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,025 UART: [rt]cmd =0x49444543, len=327
3,619,312 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,915 ready_for_fw is high
1,362,915 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,874 >>> mbox cmd response: success
2,927,874 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,989,110 UART:
2,989,126 UART: Running Caliptra FMC ...
2,989,534 UART:
2,989,588 UART: [state] CFI Enabled
2,999,829 UART: [fht] FMC Alias Private Key: 7
3,107,678 UART: [art] Extend RT PCRs Done
3,108,106 UART: [art] Lock RT PCRs Done
3,109,570 UART: [art] Populate DV Done
3,117,815 UART: [fht] FMC Alias Private Key: 7
3,118,895 UART: [art] Derive CDI
3,119,175 UART: [art] Store in in slot 0x4
3,204,784 UART: [art] Derive Key Pair
3,205,144 UART: [art] Store priv key in slot 0x5
3,218,414 UART: [art] Derive Key Pair - Done
3,233,022 UART: [art] Signing Cert with AUTHO
3,233,502 UART: RITY.KEYID = 7
3,248,858 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,623 UART: [art] PUB.X = F2E4893CC56CE35AC7164AB55BABA2E7D79044EE398E4BF4F806A1F1CADECEA97C06FC0B54D39FED83D7FAD9C3FDB780
3,256,416 UART: [art] PUB.Y = 9F817D72CF0D07DBA40EE756FBC856B8ADCA1D4797A9711CD4886E1A641D5E608F1F48EB2ACFC24BBCC146A1C4910C19
3,263,374 UART: [art] SIG.R = DC33A0E63EFE3C7ECDA96B858CBCBF0C13295FEA0B7DA3BF8D865D132EE8AC903DA8C0EE8D764C36515799475CB91B1D
3,270,164 UART: [art] SIG.S = 269A8B28FED413BE74207BF48A5A1A4191266AE19B09022C719B3D5B8DBAE51497A69922854EEE84EFDE5FE9BEFC9BA3
3,294,793 UART: Caliptra RT
3,295,046 UART: [state] CFI Enabled
3,402,311 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,170 UART: [rt]cmd =0x49444543, len=327
3,443,442 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,977 UART: [state] LifecycleState = Unprovisioned
86,632 UART: [state] DebugLocked = No
87,358 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,940 UART: [kat] SHA2-256
882,871 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,986 UART: [kat] ++
887,138 UART: [kat] sha1
891,490 UART: [kat] SHA2-256
893,428 UART: [kat] SHA2-384
896,073 UART: [kat] SHA2-512-ACC
897,974 UART: [kat] ECC-384
903,729 UART: [kat] HMAC-384Kdf
908,269 UART: [kat] LMS
1,476,465 UART: [kat] --
1,477,642 UART: [cold-reset] ++
1,478,084 UART: [fht] Storing FHT @ 0x50003400
1,480,935 UART: [idev] ++
1,481,103 UART: [idev] CDI.KEYID = 6
1,481,463 UART: [idev] SUBJECT.KEYID = 7
1,481,887 UART: [idev] UDS.KEYID = 0
1,482,232 ready_for_fw is high
1,482,232 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,577 UART: [idev] Erasing UDS.KEYID = 0
1,506,575 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,197 UART: [idev] --
1,516,352 UART: [ldev] ++
1,516,520 UART: [ldev] CDI.KEYID = 6
1,516,883 UART: [ldev] SUBJECT.KEYID = 5
1,517,309 UART: [ldev] AUTHORITY.KEYID = 7
1,517,772 UART: [ldev] FE.KEYID = 1
1,522,806 UART: [ldev] Erasing FE.KEYID = 1
1,548,775 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,541 UART: [ldev] --
1,587,914 UART: [fwproc] Waiting for Commands...
1,588,591 UART: [fwproc] Received command 0x46574c44
1,589,382 UART: [fwproc] Received Image of size 114332 bytes
2,887,394 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,226 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,578 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,519 >>> mbox cmd response: success
3,079,519 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,080,619 UART: [afmc] ++
3,080,787 UART: [afmc] CDI.KEYID = 6
3,081,149 UART: [afmc] SUBJECT.KEYID = 7
3,081,574 UART: [afmc] AUTHORITY.KEYID = 5
3,116,757 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,183 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,963 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,691 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,576 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,266 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,245 UART: [afmc] --
3,160,271 UART: [cold-reset] --
3,160,889 UART: [state] Locking Datavault
3,162,092 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,696 UART: [state] Locking ICCM
3,163,288 UART: [exit] Launching FMC @ 0x40000130
3,168,617 UART:
3,168,633 UART: Running Caliptra FMC ...
3,169,041 UART:
3,169,184 UART: [state] CFI Enabled
3,179,891 UART: [fht] FMC Alias Private Key: 7
3,287,874 UART: [art] Extend RT PCRs Done
3,288,302 UART: [art] Lock RT PCRs Done
3,289,696 UART: [art] Populate DV Done
3,297,963 UART: [fht] FMC Alias Private Key: 7
3,299,037 UART: [art] Derive CDI
3,299,317 UART: [art] Store in in slot 0x4
3,385,076 UART: [art] Derive Key Pair
3,385,436 UART: [art] Store priv key in slot 0x5
3,398,628 UART: [art] Derive Key Pair - Done
3,413,170 UART: [art] Signing Cert with AUTHO
3,413,650 UART: RITY.KEYID = 7
3,428,510 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,275 UART: [art] PUB.X = 29A4DEEF3EAD43FB98AE2727214C5158614F111F56E60390BE6AC1A48CB97563B9785BB3DA64E4578CA4D415FBB37F16
3,436,052 UART: [art] PUB.Y = 6413A6385E2747BED38C1E1E66C81E37153CEB0C44B3EAA506EDF15D539CCF80A1228ADE645347895DFBB5ABE5745445
3,443,006 UART: [art] SIG.R = 8D2224AD93E6AF6BDC0BD877BDE4FBB11EDE83875402CA1ACE244782E67E0A40FA5A8E621D2D9A5C22F28F2AE187A971
3,449,787 UART: [art] SIG.S = 6E98027A80A79323B842ACC86F8D9B52F8E6BDB73F27F2685FB6E4AB32B6ED9ACDA923561D28CAEE353B84E23700839F
3,473,551 UART: Caliptra RT
3,473,896 UART: [state] CFI Enabled
3,582,077 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,612 UART: [rt]cmd =0x49444543, len=327
3,623,033 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,362 ready_for_fw is high
1,363,362 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,449 >>> mbox cmd response: success
2,929,449 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,990,705 UART:
2,990,721 UART: Running Caliptra FMC ...
2,991,129 UART:
2,991,272 UART: [state] CFI Enabled
3,001,819 UART: [fht] FMC Alias Private Key: 7
3,110,290 UART: [art] Extend RT PCRs Done
3,110,718 UART: [art] Lock RT PCRs Done
3,112,430 UART: [art] Populate DV Done
3,120,651 UART: [fht] FMC Alias Private Key: 7
3,121,627 UART: [art] Derive CDI
3,121,907 UART: [art] Store in in slot 0x4
3,207,472 UART: [art] Derive Key Pair
3,207,832 UART: [art] Store priv key in slot 0x5
3,220,896 UART: [art] Derive Key Pair - Done
3,235,579 UART: [art] Signing Cert with AUTHO
3,236,059 UART: RITY.KEYID = 7
3,251,157 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,922 UART: [art] PUB.X = 1462C20763BDA3EB16964DBAC584E63F9B0FF1191829FC675094EC9B4307E1A1A85E07EEDB2EC595A8FA2989450A05D6
3,258,682 UART: [art] PUB.Y = C722712669F3276967956780D559FE963D780D76FE8621405D4BD83FC685119A5A9294C694C09F887D037F57FB353881
3,265,610 UART: [art] SIG.R = B99F1B657023803AF9F5DF6C13581E41E6C9E9A7246A7EAFAB7CCF5C76C162C31EB4E854844BA166651939F80C244596
3,272,381 UART: [art] SIG.S = 89FCFAA58A60CF10A5BCD26EDE60985FA6E41EBD262C2783F6C03883197FDFCE22719C3BBE39240C57C151B3ED0C43EB
3,296,378 UART: Caliptra RT
3,296,723 UART: [state] CFI Enabled
3,405,445 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,096 UART: [rt]cmd =0x49444543, len=327
3,446,528 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,588 UART: [state] LifecycleState = Unprovisioned
86,243 UART: [state] DebugLocked = No
86,887 UART: [state] WD Timer not started. Device not locked for debugging
88,062 UART: [kat] SHA2-256
893,712 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,837 UART: [kat] ++
897,989 UART: [kat] sha1
902,261 UART: [kat] SHA2-256
904,201 UART: [kat] SHA2-384
906,988 UART: [kat] SHA2-512-ACC
908,889 UART: [kat] ECC-384
918,242 UART: [kat] HMAC-384Kdf
922,976 UART: [kat] LMS
1,171,304 UART: [kat] --
1,172,301 UART: [cold-reset] ++
1,172,831 UART: [fht] FHT @ 0x50003400
1,175,284 UART: [idev] ++
1,175,452 UART: [idev] CDI.KEYID = 6
1,175,812 UART: [idev] SUBJECT.KEYID = 7
1,176,236 UART: [idev] UDS.KEYID = 0
1,176,581 ready_for_fw is high
1,176,581 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,320 UART: [idev] Erasing UDS.KEYID = 0
1,201,389 UART: [idev] Sha1 KeyId Algorithm
1,209,829 UART: [idev] --
1,210,853 UART: [ldev] ++
1,211,021 UART: [ldev] CDI.KEYID = 6
1,211,384 UART: [ldev] SUBJECT.KEYID = 5
1,211,810 UART: [ldev] AUTHORITY.KEYID = 7
1,212,273 UART: [ldev] FE.KEYID = 1
1,217,305 UART: [ldev] Erasing FE.KEYID = 1
1,243,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,529 UART: [ldev] --
1,282,822 UART: [fwproc] Wait for Commands...
1,283,478 UART: [fwproc] Recv command 0x46574c44
1,284,206 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,756 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,060 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,825 >>> mbox cmd response: success
2,773,825 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,774,913 UART: [afmc] ++
2,775,081 UART: [afmc] CDI.KEYID = 6
2,775,443 UART: [afmc] SUBJECT.KEYID = 7
2,775,868 UART: [afmc] AUTHORITY.KEYID = 5
2,811,751 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,118 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,846 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,731 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,450 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,316 UART: [afmc] --
2,855,320 UART: [cold-reset] --
2,856,166 UART: [state] Locking Datavault
2,857,329 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,933 UART: [state] Locking ICCM
2,858,417 UART: [exit] Launching FMC @ 0x40000130
2,863,746 UART:
2,863,762 UART: Running Caliptra FMC ...
2,864,170 UART:
2,864,224 UART: [state] CFI Enabled
2,874,675 UART: [fht] FMC Alias Private Key: 7
2,982,792 UART: [art] Extend RT PCRs Done
2,983,220 UART: [art] Lock RT PCRs Done
2,984,532 UART: [art] Populate DV Done
2,992,745 UART: [fht] FMC Alias Private Key: 7
2,993,703 UART: [art] Derive CDI
2,993,983 UART: [art] Store in in slot 0x4
3,079,816 UART: [art] Derive Key Pair
3,080,176 UART: [art] Store priv key in slot 0x5
3,093,718 UART: [art] Derive Key Pair - Done
3,108,372 UART: [art] Signing Cert with AUTHO
3,108,852 UART: RITY.KEYID = 7
3,124,144 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,909 UART: [art] PUB.X = BA11A1869959E6504EC14A5E65E9652A4083AB5A17825AFDFC5B09D3C13904AE90C5958AD309208402C7CEAD679B0198
3,131,666 UART: [art] PUB.Y = CE8F0FE82DB5FED8E9EFECAD0B87F007320248BE9F472968331EA60DCDD31A64FD7E2E9B1A07A082D24D659930D4BD96
3,138,618 UART: [art] SIG.R = CC6D834C1491AE2DB2C7A7B46AD07BB0C653E079DDFBC312B357910D81F735FE54D4C4BB698F7B2389BF5D907039A500
3,145,375 UART: [art] SIG.S = 26D5F8D916E43DA173F21D0AFFBFE034FF67EAF68E8FF196A2C4CFB2EFE056FF492A3C8F031C6F6C9A5E9B348CB82751
3,169,734 UART: Caliptra RT
3,169,987 UART: [state] CFI Enabled
3,277,604 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,271 UART: [rt]cmd =0x49444543, len=327
3,318,665 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,813 ready_for_fw is high
1,060,813 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,106 >>> mbox cmd response: success
2,626,106 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,688,828 UART:
2,688,844 UART: Running Caliptra FMC ...
2,689,252 UART:
2,689,306 UART: [state] CFI Enabled
2,699,521 UART: [fht] FMC Alias Private Key: 7
2,807,664 UART: [art] Extend RT PCRs Done
2,808,092 UART: [art] Lock RT PCRs Done
2,809,562 UART: [art] Populate DV Done
2,817,777 UART: [fht] FMC Alias Private Key: 7
2,818,899 UART: [art] Derive CDI
2,819,179 UART: [art] Store in in slot 0x4
2,904,638 UART: [art] Derive Key Pair
2,904,998 UART: [art] Store priv key in slot 0x5
2,918,810 UART: [art] Derive Key Pair - Done
2,933,441 UART: [art] Signing Cert with AUTHO
2,933,921 UART: RITY.KEYID = 7
2,949,323 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,088 UART: [art] PUB.X = 53E2DD4338075C690CC49EAF7E9BDD7892A44FC431A648C33A7AD1F93C4CFB6D91FE4470670D95D55AB9FE7EE557B387
2,956,863 UART: [art] PUB.Y = 1077D0DE4149050FB65D331A2D74488DB2868B2BB5092993D1D10F24DF2F4B095FC55C7224339F989AD4DA5BE3731CFB
2,963,802 UART: [art] SIG.R = 6FC3263E3CFE3159C61CBD904BB230A6868C6C976B5D8BEDBDE888FC252A2BD726F494AD850494E4973F56971A08BFC5
2,970,578 UART: [art] SIG.S = 2F4FAE64FDA48531BBEAFD7A246A140BEC11E30DE44EE93563BF1AE3D4A526847DC32CCF13ABDB58FD3013F307EA8C46
2,994,470 UART: Caliptra RT
2,994,723 UART: [state] CFI Enabled
3,101,636 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,041 UART: [rt]cmd =0x49444543, len=327
3,142,683 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Unprovisioned
85,774 UART: [state] DebugLocked = No
86,390 UART: [state] WD Timer not started. Device not locked for debugging
87,731 UART: [kat] SHA2-256
893,381 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,506 UART: [kat] ++
897,658 UART: [kat] sha1
901,872 UART: [kat] SHA2-256
903,812 UART: [kat] SHA2-384
906,555 UART: [kat] SHA2-512-ACC
908,456 UART: [kat] ECC-384
918,343 UART: [kat] HMAC-384Kdf
923,143 UART: [kat] LMS
1,171,471 UART: [kat] --
1,172,252 UART: [cold-reset] ++
1,172,714 UART: [fht] FHT @ 0x50003400
1,175,351 UART: [idev] ++
1,175,519 UART: [idev] CDI.KEYID = 6
1,175,879 UART: [idev] SUBJECT.KEYID = 7
1,176,303 UART: [idev] UDS.KEYID = 0
1,176,648 ready_for_fw is high
1,176,648 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,385 UART: [idev] Erasing UDS.KEYID = 0
1,201,862 UART: [idev] Sha1 KeyId Algorithm
1,210,360 UART: [idev] --
1,211,296 UART: [ldev] ++
1,211,464 UART: [ldev] CDI.KEYID = 6
1,211,827 UART: [ldev] SUBJECT.KEYID = 5
1,212,253 UART: [ldev] AUTHORITY.KEYID = 7
1,212,716 UART: [ldev] FE.KEYID = 1
1,217,898 UART: [ldev] Erasing FE.KEYID = 1
1,243,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,764 UART: [ldev] --
1,283,211 UART: [fwproc] Wait for Commands...
1,283,783 UART: [fwproc] Recv command 0x46574c44
1,284,511 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,188 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,691 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,995 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,812 >>> mbox cmd response: success
2,774,812 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,776,016 UART: [afmc] ++
2,776,184 UART: [afmc] CDI.KEYID = 6
2,776,546 UART: [afmc] SUBJECT.KEYID = 7
2,776,971 UART: [afmc] AUTHORITY.KEYID = 5
2,811,950 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,899 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,627 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,512 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,231 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,903 UART: [afmc] --
2,855,015 UART: [cold-reset] --
2,856,083 UART: [state] Locking Datavault
2,857,494 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,098 UART: [state] Locking ICCM
2,858,732 UART: [exit] Launching FMC @ 0x40000130
2,864,061 UART:
2,864,077 UART: Running Caliptra FMC ...
2,864,485 UART:
2,864,628 UART: [state] CFI Enabled
2,875,091 UART: [fht] FMC Alias Private Key: 7
2,983,282 UART: [art] Extend RT PCRs Done
2,983,710 UART: [art] Lock RT PCRs Done
2,985,082 UART: [art] Populate DV Done
2,993,511 UART: [fht] FMC Alias Private Key: 7
2,994,645 UART: [art] Derive CDI
2,994,925 UART: [art] Store in in slot 0x4
3,081,022 UART: [art] Derive Key Pair
3,081,382 UART: [art] Store priv key in slot 0x5
3,094,024 UART: [art] Derive Key Pair - Done
3,108,516 UART: [art] Signing Cert with AUTHO
3,108,996 UART: RITY.KEYID = 7
3,123,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,285 UART: [art] PUB.X = 3746295813643B085F65E7C841DE703D45DD41C39123A1F35463E2B20890603BD91D20AAD90DCA4204FF092AED7D174E
3,131,038 UART: [art] PUB.Y = E652EFCFE4EA9B0FBE515F2C9433D98C74A04BD8A1CCE6F58DF29365413599E513013DA086B552BA71ECE9C32D3F81F0
3,137,998 UART: [art] SIG.R = 31A939D851612B0AB8F6AFF89640A9EA3A9239C8ABF4B0B81F88BF121B00F64AF7B0C60F739C20B2E4173E57D47A8057
3,144,748 UART: [art] SIG.S = 8A6E8047F2F0ECBBCE8063B2A9E574F78030A1A162E20AC211E256DCCFA97F97FEDADDFA021257A68520AE36C10349A6
3,168,626 UART: Caliptra RT
3,168,971 UART: [state] CFI Enabled
3,277,050 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,691 UART: [rt]cmd =0x49444543, len=327
3,318,039 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,806 ready_for_fw is high
1,060,806 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,455 >>> mbox cmd response: success
2,627,455 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,689,329 UART:
2,689,345 UART: Running Caliptra FMC ...
2,689,753 UART:
2,689,896 UART: [state] CFI Enabled
2,700,603 UART: [fht] FMC Alias Private Key: 7
2,808,192 UART: [art] Extend RT PCRs Done
2,808,620 UART: [art] Lock RT PCRs Done
2,810,038 UART: [art] Populate DV Done
2,818,291 UART: [fht] FMC Alias Private Key: 7
2,819,291 UART: [art] Derive CDI
2,819,571 UART: [art] Store in in slot 0x4
2,904,834 UART: [art] Derive Key Pair
2,905,194 UART: [art] Store priv key in slot 0x5
2,918,244 UART: [art] Derive Key Pair - Done
2,933,221 UART: [art] Signing Cert with AUTHO
2,933,701 UART: RITY.KEYID = 7
2,949,313 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,078 UART: [art] PUB.X = 986843DDE4CE7E6FF9AC3411C01CD8AA79D83A6D295F1CAA8DACB191BC164D09746D2797B28EAD73F059558A79E5B20E
2,956,858 UART: [art] PUB.Y = 6093BDE296CC9EDF9460ED3000BA2585156AA81FF395133E198501D17DFDCF55A38C72E2F1693E0434E800BF2733C769
2,963,760 UART: [art] SIG.R = C24422DCA43156D22722339285D6350E5D0EA44001303A29F483C6E5D370D3BBC46F7B025F0620CCEF5B880675514277
2,970,504 UART: [art] SIG.S = 07CE054B9026494F594280BD56F40BFE99AADAB46BA2B597291DCC3FF3F48707E367AC2887C94543FC8850B7B48A0467
2,993,882 UART: Caliptra RT
2,994,227 UART: [state] CFI Enabled
3,102,466 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,115 UART: [rt]cmd =0x49444543, len=327
3,143,685 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,606 UART: [state] LifecycleState = Unprovisioned
86,261 UART: [state] DebugLocked = No
86,989 UART: [state] WD Timer not started. Device not locked for debugging
88,270 UART: [kat] SHA2-256
891,820 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,949 UART: [kat] ++
896,101 UART: [kat] sha1
900,433 UART: [kat] SHA2-256
902,373 UART: [kat] SHA2-384
905,132 UART: [kat] SHA2-512-ACC
907,033 UART: [kat] ECC-384
916,800 UART: [kat] HMAC-384Kdf
921,494 UART: [kat] LMS
1,169,806 UART: [kat] --
1,170,629 UART: [cold-reset] ++
1,171,021 UART: [fht] FHT @ 0x50003400
1,173,687 UART: [idev] ++
1,173,855 UART: [idev] CDI.KEYID = 6
1,174,216 UART: [idev] SUBJECT.KEYID = 7
1,174,641 UART: [idev] UDS.KEYID = 0
1,174,987 ready_for_fw is high
1,174,987 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,703 UART: [idev] Erasing UDS.KEYID = 0
1,199,231 UART: [idev] Sha1 KeyId Algorithm
1,208,087 UART: [idev] --
1,209,044 UART: [ldev] ++
1,209,212 UART: [ldev] CDI.KEYID = 6
1,209,576 UART: [ldev] SUBJECT.KEYID = 5
1,210,003 UART: [ldev] AUTHORITY.KEYID = 7
1,210,466 UART: [ldev] FE.KEYID = 1
1,215,530 UART: [ldev] Erasing FE.KEYID = 1
1,241,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,400 UART: [ldev] --
1,280,712 UART: [fwproc] Wait for Commands...
1,281,483 UART: [fwproc] Recv command 0x46574c44
1,282,216 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,792 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,849 >>> mbox cmd response: success
2,770,849 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,771,956 UART: [afmc] ++
2,772,124 UART: [afmc] CDI.KEYID = 6
2,772,487 UART: [afmc] SUBJECT.KEYID = 7
2,772,913 UART: [afmc] AUTHORITY.KEYID = 5
2,808,688 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,759 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,488 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,371 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,090 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,719 UART: [afmc] --
2,851,687 UART: [cold-reset] --
2,852,425 UART: [state] Locking Datavault
2,853,806 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,410 UART: [state] Locking ICCM
2,854,918 UART: [exit] Launching FMC @ 0x40000130
2,860,247 UART:
2,860,263 UART: Running Caliptra FMC ...
2,860,671 UART:
2,860,725 UART: [state] CFI Enabled
2,871,188 UART: [fht] FMC Alias Private Key: 7
2,978,933 UART: [art] Extend RT PCRs Done
2,979,361 UART: [art] Lock RT PCRs Done
2,981,015 UART: [art] Populate DV Done
2,989,182 UART: [fht] FMC Alias Private Key: 7
2,990,274 UART: [art] Derive CDI
2,990,554 UART: [art] Store in in slot 0x4
3,075,821 UART: [art] Derive Key Pair
3,076,181 UART: [art] Store priv key in slot 0x5
3,089,257 UART: [art] Derive Key Pair - Done
3,104,029 UART: [art] Signing Cert with AUTHO
3,104,509 UART: RITY.KEYID = 7
3,119,625 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,390 UART: [art] PUB.X = C2631F3B5E35C2730E49F59F0A9EDC3AE54977CE18317F047B936E8B54A9B02153388CE73CBF2EE48578872F67709D4E
3,127,153 UART: [art] PUB.Y = 426F2A266A68F2C3F66CF584E8792CA832CF7746011B6E16A32675C1499FFE0ED1A28D689A42B21A46D08A4C16444239
3,134,095 UART: [art] SIG.R = 5AD5797DCF427725507A1A3D0FF6905D12F785380A6A854679B7B5C5859BBDE6F9816059F7BB9C02C9CF8EBCF9A947AD
3,140,866 UART: [art] SIG.S = 0E390FD27E7F52C4055E5A16127B702889911AB75139487EE45E7BF2A665E36814863345298C5892088BBB6648BAE400
3,165,263 UART: Caliptra RT
3,165,516 UART: [state] CFI Enabled
3,272,259 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,804 UART: [rt]cmd =0x49444543, len=327
3,313,385 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,184 ready_for_fw is high
1,056,184 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,043 >>> mbox cmd response: success
2,622,043 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,684,207 UART:
2,684,223 UART: Running Caliptra FMC ...
2,684,631 UART:
2,684,685 UART: [state] CFI Enabled
2,695,376 UART: [fht] FMC Alias Private Key: 7
2,802,485 UART: [art] Extend RT PCRs Done
2,802,913 UART: [art] Lock RT PCRs Done
2,804,139 UART: [art] Populate DV Done
2,812,606 UART: [fht] FMC Alias Private Key: 7
2,813,576 UART: [art] Derive CDI
2,813,856 UART: [art] Store in in slot 0x4
2,899,365 UART: [art] Derive Key Pair
2,899,725 UART: [art] Store priv key in slot 0x5
2,912,651 UART: [art] Derive Key Pair - Done
2,927,370 UART: [art] Signing Cert with AUTHO
2,927,850 UART: RITY.KEYID = 7
2,942,860 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,625 UART: [art] PUB.X = 4B6EC34AFA5E60EAE072178A24A790FD1214570F0E556CB16B7380607C78E45E12E39232EE2953846AA5C8CDC7978C77
2,950,391 UART: [art] PUB.Y = 57E18751FA40D251F972872143B6C054770F776D79B24CF3CC910EBEE611672F6DA01E5792DD397CBD34D0398C7C8FE9
2,957,337 UART: [art] SIG.R = 5720AC74CEDD9DD06BAE457160BD574EA92A6806FC593AC8FD82C783BC8B566EEA6B8E7B55583E8AACB700EBFD4D4C27
2,964,106 UART: [art] SIG.S = 96801BFF6D6976AC6088E874987C91C9B35D3A1DD333EC9D32EEC4D46098C71078A3D5A7F340CD19FBFCEB56C279966D
2,987,843 UART: Caliptra RT
2,988,096 UART: [state] CFI Enabled
3,095,855 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,474 UART: [rt]cmd =0x49444543, len=327
3,136,989 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
891,665 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,794 UART: [kat] ++
895,946 UART: [kat] sha1
900,156 UART: [kat] SHA2-256
902,096 UART: [kat] SHA2-384
904,897 UART: [kat] SHA2-512-ACC
906,798 UART: [kat] ECC-384
916,349 UART: [kat] HMAC-384Kdf
920,857 UART: [kat] LMS
1,169,169 UART: [kat] --
1,170,088 UART: [cold-reset] ++
1,170,446 UART: [fht] FHT @ 0x50003400
1,173,022 UART: [idev] ++
1,173,190 UART: [idev] CDI.KEYID = 6
1,173,551 UART: [idev] SUBJECT.KEYID = 7
1,173,976 UART: [idev] UDS.KEYID = 0
1,174,322 ready_for_fw is high
1,174,322 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,840 UART: [idev] Erasing UDS.KEYID = 0
1,198,716 UART: [idev] Sha1 KeyId Algorithm
1,207,670 UART: [idev] --
1,208,703 UART: [ldev] ++
1,208,871 UART: [ldev] CDI.KEYID = 6
1,209,235 UART: [ldev] SUBJECT.KEYID = 5
1,209,662 UART: [ldev] AUTHORITY.KEYID = 7
1,210,125 UART: [ldev] FE.KEYID = 1
1,215,349 UART: [ldev] Erasing FE.KEYID = 1
1,241,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,719 UART: [ldev] --
1,281,035 UART: [fwproc] Wait for Commands...
1,281,694 UART: [fwproc] Recv command 0x46574c44
1,282,427 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,977 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,286 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,170 >>> mbox cmd response: success
2,773,170 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,774,247 UART: [afmc] ++
2,774,415 UART: [afmc] CDI.KEYID = 6
2,774,778 UART: [afmc] SUBJECT.KEYID = 7
2,775,204 UART: [afmc] AUTHORITY.KEYID = 5
2,811,355 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,783 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,534 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,263 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,146 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,865 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,788 UART: [afmc] --
2,854,732 UART: [cold-reset] --
2,855,648 UART: [state] Locking Datavault
2,856,843 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,447 UART: [state] Locking ICCM
2,858,035 UART: [exit] Launching FMC @ 0x40000130
2,863,364 UART:
2,863,380 UART: Running Caliptra FMC ...
2,863,788 UART:
2,863,931 UART: [state] CFI Enabled
2,874,734 UART: [fht] FMC Alias Private Key: 7
2,981,701 UART: [art] Extend RT PCRs Done
2,982,129 UART: [art] Lock RT PCRs Done
2,983,709 UART: [art] Populate DV Done
2,991,902 UART: [fht] FMC Alias Private Key: 7
2,992,904 UART: [art] Derive CDI
2,993,184 UART: [art] Store in in slot 0x4
3,079,091 UART: [art] Derive Key Pair
3,079,451 UART: [art] Store priv key in slot 0x5
3,092,521 UART: [art] Derive Key Pair - Done
3,107,318 UART: [art] Signing Cert with AUTHO
3,107,798 UART: RITY.KEYID = 7
3,123,354 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,119 UART: [art] PUB.X = 44C19DF25F9959D674006BA08467658CE7DA5CD12E547E361AC217D9ABB56B4E59FBABA9B3A88790D1C3D9A5872B002B
3,130,855 UART: [art] PUB.Y = 623C7C488D4EA4CA49FDD4D7C0EEC89F101F09A10791A8287801DA893B22936F941E1D6947C0D8D00CB408E307342307
3,137,784 UART: [art] SIG.R = 86C54D7A477CF5E6C933F0FCB47B71461872D806B3E8F746DB1FF16F8FFE04A72AB258C08A51F18452F0CB56ADE08810
3,144,558 UART: [art] SIG.S = 1A61CDF32E824C3F510183908B1A933B2089EE326EB0221DE2C4207B6D3DD6510F1DC88CA37CDE32E18AC0561596ACE1
3,168,637 UART: Caliptra RT
3,168,982 UART: [state] CFI Enabled
3,277,237 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,612 UART: [rt]cmd =0x49444543, len=327
3,318,058 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,483 ready_for_fw is high
1,056,483 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,792 >>> mbox cmd response: success
2,624,792 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,686,802 UART:
2,686,818 UART: Running Caliptra FMC ...
2,687,226 UART:
2,687,369 UART: [state] CFI Enabled
2,697,730 UART: [fht] FMC Alias Private Key: 7
2,806,307 UART: [art] Extend RT PCRs Done
2,806,735 UART: [art] Lock RT PCRs Done
2,808,103 UART: [art] Populate DV Done
2,816,444 UART: [fht] FMC Alias Private Key: 7
2,817,626 UART: [art] Derive CDI
2,817,906 UART: [art] Store in in slot 0x4
2,903,703 UART: [art] Derive Key Pair
2,904,063 UART: [art] Store priv key in slot 0x5
2,917,383 UART: [art] Derive Key Pair - Done
2,931,760 UART: [art] Signing Cert with AUTHO
2,932,240 UART: RITY.KEYID = 7
2,947,166 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,931 UART: [art] PUB.X = CA9EE496B47D8B1865DD05825A525C2564C0D69657CCDE70731E05E7AD6B21A040EBFA20C32833F21B570C5BD57A62A3
2,954,700 UART: [art] PUB.Y = F3E8412D7D5506F4AC52E907F526704AFEEBF9F4D5BBDD8E0A462475AF1FEEF5727B01DB110180AB45AC67361DF31A62
2,961,651 UART: [art] SIG.R = EAE7722C52A2CB1B812F78C2051C574904D624918DEB2772DDD1D84D33F71EE353B264FEA4AE5E965A1EC332D0F9CD2E
2,968,429 UART: [art] SIG.S = 88BA9F61D90A70427765F1E8DB98EB1E8D06CEA22868C6118CD4D15222D46477E6F3E1D06E2464826806B47D90A746FD
2,992,521 UART: Caliptra RT
2,992,866 UART: [state] CFI Enabled
3,100,090 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,743 UART: [rt]cmd =0x49444543, len=327
3,141,173 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,549 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,273 UART: [kat] SHA2-256
882,204 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,319 UART: [kat] ++
886,471 UART: [kat] sha1
890,675 UART: [kat] SHA2-256
892,613 UART: [kat] SHA2-384
895,264 UART: [kat] SHA2-512-ACC
897,165 UART: [kat] ECC-384
902,574 UART: [kat] HMAC-384Kdf
907,186 UART: [kat] LMS
1,475,382 UART: [kat] --
1,476,101 UART: [cold-reset] ++
1,476,609 UART: [fht] Storing FHT @ 0x50003400
1,479,352 UART: [idev] ++
1,479,520 UART: [idev] CDI.KEYID = 6
1,479,880 UART: [idev] SUBJECT.KEYID = 7
1,480,304 UART: [idev] UDS.KEYID = 0
1,480,649 ready_for_fw is high
1,480,649 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,308 UART: [idev] Erasing UDS.KEYID = 0
1,504,892 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,502 UART: [idev] --
1,514,463 UART: [ldev] ++
1,514,631 UART: [ldev] CDI.KEYID = 6
1,514,994 UART: [ldev] SUBJECT.KEYID = 5
1,515,420 UART: [ldev] AUTHORITY.KEYID = 7
1,515,883 UART: [ldev] FE.KEYID = 1
1,520,917 UART: [ldev] Erasing FE.KEYID = 1
1,545,904 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,852 UART: [ldev] --
1,585,229 UART: [fwproc] Waiting for Commands...
1,586,012 UART: [fwproc] Received command 0x46574c44
1,586,803 UART: [fwproc] Received Image of size 114332 bytes
2,884,411 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,017 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,369 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,144 >>> mbox cmd response: success
3,077,144 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,078,316 UART: [afmc] ++
3,078,484 UART: [afmc] CDI.KEYID = 6
3,078,846 UART: [afmc] SUBJECT.KEYID = 7
3,079,271 UART: [afmc] AUTHORITY.KEYID = 5
3,114,386 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,516 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,296 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,024 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,909 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,599 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,480 UART: [afmc] --
3,157,444 UART: [cold-reset] --
3,158,374 UART: [state] Locking Datavault
3,159,707 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,311 UART: [state] Locking ICCM
3,160,911 UART: [exit] Launching FMC @ 0x40000130
3,166,240 UART:
3,166,256 UART: Running Caliptra FMC ...
3,166,664 UART:
3,166,718 UART: [state] CFI Enabled
3,177,395 UART: [fht] FMC Alias Private Key: 7
3,285,072 UART: [art] Extend RT PCRs Done
3,285,500 UART: [art] Lock RT PCRs Done
3,287,150 UART: [art] Populate DV Done
3,295,397 UART: [fht] FMC Alias Private Key: 7
3,296,443 UART: [art] Derive CDI
3,296,723 UART: [art] Store in in slot 0x4
3,382,432 UART: [art] Derive Key Pair
3,382,792 UART: [art] Store priv key in slot 0x5
3,395,774 UART: [art] Derive Key Pair - Done
3,410,713 UART: [art] Signing Cert with AUTHO
3,411,193 UART: RITY.KEYID = 7
3,426,603 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,368 UART: [art] PUB.X = 339E9B7F64377ED4354CAC69617BA041380EBD5F6917BF69EA9751AB09A643CB2E23A13C1486C2EC52379DE0DD7D41C9
3,434,140 UART: [art] PUB.Y = AA8353D68BEB760B9938FF4170FDCCC8143633801BE3FE43E137BFE5D614A2D073E5F2285A8B6504217099BC13654950
3,441,084 UART: [art] SIG.R = 6866A84D698ABC2BC3DE0EAD33FA0901A8BC8A37F6B1FA1022D848533D0D9445E5659A3F901A70EFF7AFB4680052DC04
3,447,829 UART: [art] SIG.S = 6988A2E5C736490F89F53E56E850A332E4F9DC2DD5A4C68561AD203BBE17F4002841FAE9A3C9950415655C9AD53CC13D
3,472,238 UART: Caliptra RT
3,472,491 UART: [state] CFI Enabled
3,580,627 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,185 UART: [rt]cmd =0x4c444556, len=4
3,621,436 >>> mbox cmd response data (687 bytes)
3,621,437 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,650,690 UART: [rt]cmd =0x49444549, len=4
3,653,025 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,459 ready_for_fw is high
1,362,459 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,724 >>> mbox cmd response: success
2,929,724 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,990,644 UART:
2,990,660 UART: Running Caliptra FMC ...
2,991,068 UART:
2,991,122 UART: [state] CFI Enabled
3,001,745 UART: [fht] FMC Alias Private Key: 7
3,109,696 UART: [art] Extend RT PCRs Done
3,110,124 UART: [art] Lock RT PCRs Done
3,111,806 UART: [art] Populate DV Done
3,120,439 UART: [fht] FMC Alias Private Key: 7
3,121,369 UART: [art] Derive CDI
3,121,649 UART: [art] Store in in slot 0x4
3,207,142 UART: [art] Derive Key Pair
3,207,502 UART: [art] Store priv key in slot 0x5
3,221,018 UART: [art] Derive Key Pair - Done
3,235,904 UART: [art] Signing Cert with AUTHO
3,236,384 UART: RITY.KEYID = 7
3,251,168 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,933 UART: [art] PUB.X = 07A67AFCD8C861724A4421E19FFBAA083C3BB35F176FC2D948FBCA5A91496B4C910EC0CE6D92760E83E612FC36772150
3,258,701 UART: [art] PUB.Y = 3725689C5973DD84FFEEE70939CE10D2CFCF1818456857A120921BFB59BAB79A3EBF44359F3F7C448C4A85892CC88ECD
3,265,658 UART: [art] SIG.R = A315B7AA3FA8F4F382C5411EF252A274E7670CA4049B2EDE361E83D0F8EFDEA6D00E436DB17CDD0D687B748035E680C7
3,272,430 UART: [art] SIG.S = A4DAD385912268D76D6649471CD010DEC8448A0C277DD7F04F7B54318041045210C6CDE6546ACE492D9B823EF4370497
3,296,388 UART: Caliptra RT
3,296,641 UART: [state] CFI Enabled
3,404,689 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,061 UART: [rt]cmd =0x4c444556, len=4
3,445,608 >>> mbox cmd response data (687 bytes)
3,445,609 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,964 UART: [rt]cmd =0x49444549, len=4
3,477,459 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = No
86,608 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,122 UART: [kat] SHA2-256
882,053 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,168 UART: [kat] ++
886,320 UART: [kat] sha1
890,526 UART: [kat] SHA2-256
892,464 UART: [kat] SHA2-384
895,305 UART: [kat] SHA2-512-ACC
897,206 UART: [kat] ECC-384
902,911 UART: [kat] HMAC-384Kdf
907,605 UART: [kat] LMS
1,475,801 UART: [kat] --
1,476,632 UART: [cold-reset] ++
1,477,036 UART: [fht] Storing FHT @ 0x50003400
1,479,873 UART: [idev] ++
1,480,041 UART: [idev] CDI.KEYID = 6
1,480,401 UART: [idev] SUBJECT.KEYID = 7
1,480,825 UART: [idev] UDS.KEYID = 0
1,481,170 ready_for_fw is high
1,481,170 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,107 UART: [idev] Erasing UDS.KEYID = 0
1,505,565 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,135 UART: [idev] --
1,515,072 UART: [ldev] ++
1,515,240 UART: [ldev] CDI.KEYID = 6
1,515,603 UART: [ldev] SUBJECT.KEYID = 5
1,516,029 UART: [ldev] AUTHORITY.KEYID = 7
1,516,492 UART: [ldev] FE.KEYID = 1
1,521,870 UART: [ldev] Erasing FE.KEYID = 1
1,547,167 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,261 UART: [ldev] --
1,586,728 UART: [fwproc] Waiting for Commands...
1,587,471 UART: [fwproc] Received command 0x46574c44
1,588,262 UART: [fwproc] Received Image of size 114332 bytes
2,886,458 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,338 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,690 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,653 >>> mbox cmd response: success
3,078,653 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,079,739 UART: [afmc] ++
3,079,907 UART: [afmc] CDI.KEYID = 6
3,080,269 UART: [afmc] SUBJECT.KEYID = 7
3,080,694 UART: [afmc] AUTHORITY.KEYID = 5
3,116,611 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,047 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,827 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,555 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,440 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,130 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,149 UART: [afmc] --
3,160,061 UART: [cold-reset] --
3,160,921 UART: [state] Locking Datavault
3,162,204 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,808 UART: [state] Locking ICCM
3,163,462 UART: [exit] Launching FMC @ 0x40000130
3,168,791 UART:
3,168,807 UART: Running Caliptra FMC ...
3,169,215 UART:
3,169,358 UART: [state] CFI Enabled
3,179,935 UART: [fht] FMC Alias Private Key: 7
3,287,496 UART: [art] Extend RT PCRs Done
3,287,924 UART: [art] Lock RT PCRs Done
3,289,702 UART: [art] Populate DV Done
3,297,567 UART: [fht] FMC Alias Private Key: 7
3,298,537 UART: [art] Derive CDI
3,298,817 UART: [art] Store in in slot 0x4
3,384,864 UART: [art] Derive Key Pair
3,385,224 UART: [art] Store priv key in slot 0x5
3,398,416 UART: [art] Derive Key Pair - Done
3,413,086 UART: [art] Signing Cert with AUTHO
3,413,566 UART: RITY.KEYID = 7
3,429,228 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,993 UART: [art] PUB.X = 3CC5096E6E78DCBFD8C63FCC3535CB2C7F15BDEA7049C2B09D1F8155799EADE128F602F4F04BF41D511C667CFC234F77
3,436,775 UART: [art] PUB.Y = 1D6AB1E2B13FF6AF54B7873CFEB412E25802D5B3EEA7A7C8E2615145E6F917BB994A78E9159D5E95B4FEA16068783B69
3,443,732 UART: [art] SIG.R = D9904090BB0B4AD61BDCA2F19468AFA528881678CC7A3FE9870AF143131046D91944D297771C8C6A15DB06181DE2A1A8
3,450,495 UART: [art] SIG.S = 42210130DC7654E93310F004DF0A825192E41D4261A13185B59D20B838156FAE4784FBED7118215FB02F91539146BF03
3,474,640 UART: Caliptra RT
3,474,985 UART: [state] CFI Enabled
3,583,556 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,102 UART: [rt]cmd =0x4c444556, len=4
3,624,543 >>> mbox cmd response data (687 bytes)
3,624,544 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,851 UART: [rt]cmd =0x49444549, len=4
3,655,956 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,486 ready_for_fw is high
1,362,486 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,523 >>> mbox cmd response: success
2,926,523 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,988,557 UART:
2,988,573 UART: Running Caliptra FMC ...
2,988,981 UART:
2,989,124 UART: [state] CFI Enabled
3,000,347 UART: [fht] FMC Alias Private Key: 7
3,108,144 UART: [art] Extend RT PCRs Done
3,108,572 UART: [art] Lock RT PCRs Done
3,110,238 UART: [art] Populate DV Done
3,118,317 UART: [fht] FMC Alias Private Key: 7
3,119,449 UART: [art] Derive CDI
3,119,729 UART: [art] Store in in slot 0x4
3,205,512 UART: [art] Derive Key Pair
3,205,872 UART: [art] Store priv key in slot 0x5
3,218,938 UART: [art] Derive Key Pair - Done
3,233,553 UART: [art] Signing Cert with AUTHO
3,234,033 UART: RITY.KEYID = 7
3,249,251 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,016 UART: [art] PUB.X = 7E97206C5758D5D6FF300F28C793ADF695555B4E9E79E4F4B8FDE32F7B8E8FF356F688ACDAF12E090E2E91F734F8A1C2
3,256,791 UART: [art] PUB.Y = B302DE356DD5363843436D73F967699F574A0172A30185F49F010CC8AAF93EDF4733F5699E9C1E92B1508EDEBAAACD3A
3,263,734 UART: [art] SIG.R = 2540E5F3BE62C401AA3301C117C3DB5DB7CD62F2433928B0B05851200517DF2E7511E7F6C9E1D7D1C1FB8A8B5FF1B5C6
3,270,505 UART: [art] SIG.S = DFF828631240DA5B3AB0450F86405C974D850F4292F1F997674300C4E079F1DED2C2C7E639CBA536AB226226277B8D9F
3,294,036 UART: Caliptra RT
3,294,381 UART: [state] CFI Enabled
3,402,938 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,666 UART: [rt]cmd =0x4c444556, len=4
3,444,167 >>> mbox cmd response data (687 bytes)
3,444,168 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,579 UART: [rt]cmd =0x49444549, len=4
3,476,110 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
88,000 UART: [kat] SHA2-256
893,650 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,775 UART: [kat] ++
897,927 UART: [kat] sha1
902,113 UART: [kat] SHA2-256
904,053 UART: [kat] SHA2-384
906,838 UART: [kat] SHA2-512-ACC
908,739 UART: [kat] ECC-384
918,386 UART: [kat] HMAC-384Kdf
923,002 UART: [kat] LMS
1,171,330 UART: [kat] --
1,172,297 UART: [cold-reset] ++
1,172,661 UART: [fht] FHT @ 0x50003400
1,175,130 UART: [idev] ++
1,175,298 UART: [idev] CDI.KEYID = 6
1,175,658 UART: [idev] SUBJECT.KEYID = 7
1,176,082 UART: [idev] UDS.KEYID = 0
1,176,427 ready_for_fw is high
1,176,427 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,122 UART: [idev] Erasing UDS.KEYID = 0
1,201,027 UART: [idev] Sha1 KeyId Algorithm
1,209,465 UART: [idev] --
1,210,413 UART: [ldev] ++
1,210,581 UART: [ldev] CDI.KEYID = 6
1,210,944 UART: [ldev] SUBJECT.KEYID = 5
1,211,370 UART: [ldev] AUTHORITY.KEYID = 7
1,211,833 UART: [ldev] FE.KEYID = 1
1,216,899 UART: [ldev] Erasing FE.KEYID = 1
1,242,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,741 UART: [ldev] --
1,282,156 UART: [fwproc] Wait for Commands...
1,282,906 UART: [fwproc] Recv command 0x46574c44
1,283,634 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,186 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,490 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,347 >>> mbox cmd response: success
2,773,347 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,479 UART: [afmc] ++
2,774,647 UART: [afmc] CDI.KEYID = 6
2,775,009 UART: [afmc] SUBJECT.KEYID = 7
2,775,434 UART: [afmc] AUTHORITY.KEYID = 5
2,810,523 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,168 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,916 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,644 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,529 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,248 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,002 UART: [afmc] --
2,853,994 UART: [cold-reset] --
2,854,898 UART: [state] Locking Datavault
2,856,133 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,737 UART: [state] Locking ICCM
2,857,277 UART: [exit] Launching FMC @ 0x40000130
2,862,606 UART:
2,862,622 UART: Running Caliptra FMC ...
2,863,030 UART:
2,863,084 UART: [state] CFI Enabled
2,873,855 UART: [fht] FMC Alias Private Key: 7
2,981,882 UART: [art] Extend RT PCRs Done
2,982,310 UART: [art] Lock RT PCRs Done
2,983,804 UART: [art] Populate DV Done
2,992,043 UART: [fht] FMC Alias Private Key: 7
2,993,053 UART: [art] Derive CDI
2,993,333 UART: [art] Store in in slot 0x4
3,078,964 UART: [art] Derive Key Pair
3,079,324 UART: [art] Store priv key in slot 0x5
3,092,640 UART: [art] Derive Key Pair - Done
3,107,648 UART: [art] Signing Cert with AUTHO
3,108,128 UART: RITY.KEYID = 7
3,123,360 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,125 UART: [art] PUB.X = 1680F3C0BCA47BC7C5BFF92DEA68922ED4BF654C03A062FD98743859720F293CD2FF098497B4F63558134E2C13EEEFEF
3,130,898 UART: [art] PUB.Y = CD4B88130EEA0231A351701C61759363C5BBBBB5E3AFC93F0FB296D6663736DB041471F1BB84211BF7653A415DAF4FD4
3,137,844 UART: [art] SIG.R = 9E0EAC7AAD4097515D7974E8EA7A4224F3D5472FB4405BCA469FCE302A367E120200D43728281299668EBB634249E0E3
3,144,584 UART: [art] SIG.S = 05C0768E87F7B595A59E3FCC11767F043640DC1ABD680CBF71C6AB272202C1B5AE8CB47E6A5F6FBAF9B4ACCD89BD82D6
3,168,431 UART: Caliptra RT
3,168,684 UART: [state] CFI Enabled
3,276,213 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,739 UART: [rt]cmd =0x4c444556, len=4
3,317,232 >>> mbox cmd response data (687 bytes)
3,317,233 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,778 UART: [rt]cmd =0x49444549, len=4
3,348,915 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,717 ready_for_fw is high
1,059,717 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,548 >>> mbox cmd response: success
2,624,548 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,687,442 UART:
2,687,458 UART: Running Caliptra FMC ...
2,687,866 UART:
2,687,920 UART: [state] CFI Enabled
2,698,499 UART: [fht] FMC Alias Private Key: 7
2,806,688 UART: [art] Extend RT PCRs Done
2,807,116 UART: [art] Lock RT PCRs Done
2,808,624 UART: [art] Populate DV Done
2,816,779 UART: [fht] FMC Alias Private Key: 7
2,817,729 UART: [art] Derive CDI
2,818,009 UART: [art] Store in in slot 0x4
2,903,390 UART: [art] Derive Key Pair
2,903,750 UART: [art] Store priv key in slot 0x5
2,917,140 UART: [art] Derive Key Pair - Done
2,931,926 UART: [art] Signing Cert with AUTHO
2,932,406 UART: RITY.KEYID = 7
2,947,532 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,297 UART: [art] PUB.X = 1BD1901CC1CB5B16698CA55B80B70A33C8A136C1B03553312248E520F33F2FB46FF7F7439F07858199DC3AC45784F8E3
2,955,061 UART: [art] PUB.Y = 6CA5BFE4D6C5383A345760C2CEF687277BBF2C50210D5723709039D7E947E3426D50706B16331C1C06FC870D64C40444
2,961,993 UART: [art] SIG.R = 6D8FE51C04740D385D7178AD4E0B562832F488870FFBCCFB29C87D1F755D10CEA8ED3AC3E22A01135B884CF6260879F3
2,968,753 UART: [art] SIG.S = 70583D358CB71CBECFCF91E0BB73E3AC32AEFF7F738608F1E09FA725360DA5E5C170B34811A19D7C37D5B2AB7FB30A25
2,993,369 UART: Caliptra RT
2,993,622 UART: [state] CFI Enabled
3,101,355 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,865 UART: [rt]cmd =0x4c444556, len=4
3,142,212 >>> mbox cmd response data (687 bytes)
3,142,213 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,578 UART: [rt]cmd =0x49444549, len=4
3,174,031 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,940 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
893,779 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,904 UART: [kat] ++
898,056 UART: [kat] sha1
902,398 UART: [kat] SHA2-256
904,338 UART: [kat] SHA2-384
907,153 UART: [kat] SHA2-512-ACC
909,054 UART: [kat] ECC-384
918,645 UART: [kat] HMAC-384Kdf
923,189 UART: [kat] LMS
1,171,517 UART: [kat] --
1,172,232 UART: [cold-reset] ++
1,172,572 UART: [fht] FHT @ 0x50003400
1,175,185 UART: [idev] ++
1,175,353 UART: [idev] CDI.KEYID = 6
1,175,713 UART: [idev] SUBJECT.KEYID = 7
1,176,137 UART: [idev] UDS.KEYID = 0
1,176,482 ready_for_fw is high
1,176,482 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,167 UART: [idev] Erasing UDS.KEYID = 0
1,200,874 UART: [idev] Sha1 KeyId Algorithm
1,209,364 UART: [idev] --
1,210,460 UART: [ldev] ++
1,210,628 UART: [ldev] CDI.KEYID = 6
1,210,991 UART: [ldev] SUBJECT.KEYID = 5
1,211,417 UART: [ldev] AUTHORITY.KEYID = 7
1,211,880 UART: [ldev] FE.KEYID = 1
1,216,834 UART: [ldev] Erasing FE.KEYID = 1
1,243,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,944 UART: [ldev] --
1,282,235 UART: [fwproc] Wait for Commands...
1,283,017 UART: [fwproc] Recv command 0x46574c44
1,283,745 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,985 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,289 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,198 >>> mbox cmd response: success
2,773,198 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,380 UART: [afmc] ++
2,774,548 UART: [afmc] CDI.KEYID = 6
2,774,910 UART: [afmc] SUBJECT.KEYID = 7
2,775,335 UART: [afmc] AUTHORITY.KEYID = 5
2,811,280 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,413 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,141 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,026 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,745 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,505 UART: [afmc] --
2,854,433 UART: [cold-reset] --
2,855,395 UART: [state] Locking Datavault
2,856,530 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,134 UART: [state] Locking ICCM
2,857,732 UART: [exit] Launching FMC @ 0x40000130
2,863,061 UART:
2,863,077 UART: Running Caliptra FMC ...
2,863,485 UART:
2,863,628 UART: [state] CFI Enabled
2,874,195 UART: [fht] FMC Alias Private Key: 7
2,980,980 UART: [art] Extend RT PCRs Done
2,981,408 UART: [art] Lock RT PCRs Done
2,982,806 UART: [art] Populate DV Done
2,991,047 UART: [fht] FMC Alias Private Key: 7
2,992,047 UART: [art] Derive CDI
2,992,327 UART: [art] Store in in slot 0x4
3,078,244 UART: [art] Derive Key Pair
3,078,604 UART: [art] Store priv key in slot 0x5
3,091,884 UART: [art] Derive Key Pair - Done
3,106,960 UART: [art] Signing Cert with AUTHO
3,107,440 UART: RITY.KEYID = 7
3,122,640 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,405 UART: [art] PUB.X = ED4DDC4A4F263925E841936C8B75E7002DA776D50F802BAEA1134E9EF9F0CBF73900C426062C9966522E4E7824C0FB57
3,130,129 UART: [art] PUB.Y = C0641BF911F04B89B88ACAADFA8D12936C0EC637EAD8BFC358C3F06192DAEA7A59E14CC13D4F377710E047AB547241D6
3,137,092 UART: [art] SIG.R = CE086A69124644C059996533E9689EE6861C648E7604A865BF9C8488502DE67F580BCBFC8009E9B9AD412158E5AB87EE
3,143,848 UART: [art] SIG.S = CC23D4B2029394D1C775D4795BC3BE761EDF7748016F42CD2B0049EA5325F60114506F9F2509D095707C1BAFA99770E7
3,168,233 UART: Caliptra RT
3,168,578 UART: [state] CFI Enabled
3,275,966 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,476 UART: [rt]cmd =0x4c444556, len=4
3,316,901 >>> mbox cmd response data (687 bytes)
3,316,902 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,319 UART: [rt]cmd =0x49444549, len=4
3,348,640 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,900 ready_for_fw is high
1,060,900 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,705 >>> mbox cmd response: success
2,626,705 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,689,165 UART:
2,689,181 UART: Running Caliptra FMC ...
2,689,589 UART:
2,689,732 UART: [state] CFI Enabled
2,700,211 UART: [fht] FMC Alias Private Key: 7
2,808,072 UART: [art] Extend RT PCRs Done
2,808,500 UART: [art] Lock RT PCRs Done
2,810,326 UART: [art] Populate DV Done
2,818,659 UART: [fht] FMC Alias Private Key: 7
2,819,761 UART: [art] Derive CDI
2,820,041 UART: [art] Store in in slot 0x4
2,905,814 UART: [art] Derive Key Pair
2,906,174 UART: [art] Store priv key in slot 0x5
2,919,266 UART: [art] Derive Key Pair - Done
2,934,156 UART: [art] Signing Cert with AUTHO
2,934,636 UART: RITY.KEYID = 7
2,949,676 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,441 UART: [art] PUB.X = 2DE2590FDCB83EC65D728C8382A464DF27CFD773F5353532CEC207BE8BD7503B947DBB2DD3055B6F07BF689A9B4F1FE7
2,957,215 UART: [art] PUB.Y = B62891851DA5B47085DF45FCB21AA5AB2CADC6E17D3A3457708A098251117F3201ADE2183ED8099561208803952580CE
2,964,149 UART: [art] SIG.R = 676DC7241D80234292FB3F21AD2C1B773C87A6A564AE6AC3502ABD474C448BA92E746F009F2E8A17CA75D91693321B5D
2,970,901 UART: [art] SIG.S = E1407FF3C609B7A52AFDADB22BE22E970E85E8E188C57788073383A22F4E53CD2501958DFF672FFF1BABD910E1710E7B
2,994,599 UART: Caliptra RT
2,994,944 UART: [state] CFI Enabled
3,102,341 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,035 UART: [rt]cmd =0x4c444556, len=4
3,143,616 >>> mbox cmd response data (687 bytes)
3,143,617 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,958 UART: [rt]cmd =0x49444549, len=4
3,175,471 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,917 UART: [kat] SHA2-256
901,857 UART: [kat] SHA2-384
904,690 UART: [kat] SHA2-512-ACC
906,591 UART: [kat] ECC-384
916,164 UART: [kat] HMAC-384Kdf
920,822 UART: [kat] LMS
1,169,134 UART: [kat] --
1,170,165 UART: [cold-reset] ++
1,170,581 UART: [fht] FHT @ 0x50003400
1,173,001 UART: [idev] ++
1,173,169 UART: [idev] CDI.KEYID = 6
1,173,530 UART: [idev] SUBJECT.KEYID = 7
1,173,955 UART: [idev] UDS.KEYID = 0
1,174,301 ready_for_fw is high
1,174,301 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,955 UART: [idev] Erasing UDS.KEYID = 0
1,199,095 UART: [idev] Sha1 KeyId Algorithm
1,207,785 UART: [idev] --
1,208,682 UART: [ldev] ++
1,208,850 UART: [ldev] CDI.KEYID = 6
1,209,214 UART: [ldev] SUBJECT.KEYID = 5
1,209,641 UART: [ldev] AUTHORITY.KEYID = 7
1,210,104 UART: [ldev] FE.KEYID = 1
1,215,100 UART: [ldev] Erasing FE.KEYID = 1
1,241,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,538 UART: [ldev] --
1,280,944 UART: [fwproc] Wait for Commands...
1,281,585 UART: [fwproc] Recv command 0x46574c44
1,282,318 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,572 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,881 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,661 >>> mbox cmd response: success
2,772,661 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,773,842 UART: [afmc] ++
2,774,010 UART: [afmc] CDI.KEYID = 6
2,774,373 UART: [afmc] SUBJECT.KEYID = 7
2,774,799 UART: [afmc] AUTHORITY.KEYID = 5
2,810,438 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,292 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,043 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,772 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,655 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,374 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,257 UART: [afmc] --
2,854,261 UART: [cold-reset] --
2,855,045 UART: [state] Locking Datavault
2,856,272 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,876 UART: [state] Locking ICCM
2,857,398 UART: [exit] Launching FMC @ 0x40000130
2,862,727 UART:
2,862,743 UART: Running Caliptra FMC ...
2,863,151 UART:
2,863,205 UART: [state] CFI Enabled
2,874,162 UART: [fht] FMC Alias Private Key: 7
2,981,867 UART: [art] Extend RT PCRs Done
2,982,295 UART: [art] Lock RT PCRs Done
2,983,617 UART: [art] Populate DV Done
2,991,716 UART: [fht] FMC Alias Private Key: 7
2,992,756 UART: [art] Derive CDI
2,993,036 UART: [art] Store in in slot 0x4
3,078,441 UART: [art] Derive Key Pair
3,078,801 UART: [art] Store priv key in slot 0x5
3,091,767 UART: [art] Derive Key Pair - Done
3,106,864 UART: [art] Signing Cert with AUTHO
3,107,344 UART: RITY.KEYID = 7
3,122,492 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,257 UART: [art] PUB.X = ECA473BD4A2E24297CA5D7EEAC8A37112B31B8EC9980C16318FBA5BCF8259585AA93205E4391592A7C567D26EE72DD01
3,130,034 UART: [art] PUB.Y = D0CFA357945C5EC444A22D20C52A1255F8CCF430AEFA2FD9C572F18B75685035D25185B2BE67DC568ED6E950D250D84E
3,136,994 UART: [art] SIG.R = 978F02111A0E7642A4A25E20DDD9C65649B0C7E28414ABB1F05804D2CB69864694522CBB2D5A86400BEE13A006C05CF1
3,143,751 UART: [art] SIG.S = 18BBF3AFD5ADD6828D70CB0916DC74B797E636F6AD5C2FE5FE7A17D16699CEEA6668973A3FC355B88DED8FD17C18BB1F
3,168,227 UART: Caliptra RT
3,168,480 UART: [state] CFI Enabled
3,276,253 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,725 UART: [rt]cmd =0x4c444556, len=4
3,317,160 >>> mbox cmd response data (687 bytes)
3,317,161 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,446 UART: [rt]cmd =0x49444549, len=4
3,348,815 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,786 ready_for_fw is high
1,055,786 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,411 >>> mbox cmd response: success
2,620,411 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,683,409 UART:
2,683,425 UART: Running Caliptra FMC ...
2,683,833 UART:
2,683,887 UART: [state] CFI Enabled
2,694,624 UART: [fht] FMC Alias Private Key: 7
2,802,599 UART: [art] Extend RT PCRs Done
2,803,027 UART: [art] Lock RT PCRs Done
2,804,039 UART: [art] Populate DV Done
2,812,296 UART: [fht] FMC Alias Private Key: 7
2,813,308 UART: [art] Derive CDI
2,813,588 UART: [art] Store in in slot 0x4
2,899,333 UART: [art] Derive Key Pair
2,899,693 UART: [art] Store priv key in slot 0x5
2,913,083 UART: [art] Derive Key Pair - Done
2,927,599 UART: [art] Signing Cert with AUTHO
2,928,079 UART: RITY.KEYID = 7
2,943,541 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,306 UART: [art] PUB.X = 55F47AC58E1721565FE41CDA1DB593504F2DE16E78D41A0765C06FAEAF98211A338239BA82D6C913AAC28667710C34F9
2,951,074 UART: [art] PUB.Y = A5FEFD9A3D519CD1419BC8AFFE5E5A9E3CA0D931BCD97F3CEE065098D4D38BE7A9BBA55198D187E9383CAC94BBF9F146
2,958,049 UART: [art] SIG.R = 58855B016580A930D4064B3810A414BCF85522888ED7F5C2A735709DE8A8C189D929E3635F2D22623F018BFBC6BE4CEE
2,964,810 UART: [art] SIG.S = DE39F423F5230DE2AE7FFBA8564074DA56B73CD29531DDDFE4BD9A47AB525AC876F00E03731E2BA07AD1FCB58E97B917
2,988,696 UART: Caliptra RT
2,988,949 UART: [state] CFI Enabled
3,096,118 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,254 UART: [rt]cmd =0x4c444556, len=4
3,136,601 >>> mbox cmd response data (687 bytes)
3,136,602 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,905 UART: [rt]cmd =0x49444549, len=4
3,168,100 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
891,627 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,756 UART: [kat] ++
895,908 UART: [kat] sha1
900,170 UART: [kat] SHA2-256
902,110 UART: [kat] SHA2-384
904,731 UART: [kat] SHA2-512-ACC
906,632 UART: [kat] ECC-384
916,183 UART: [kat] HMAC-384Kdf
920,965 UART: [kat] LMS
1,169,277 UART: [kat] --
1,170,284 UART: [cold-reset] ++
1,170,628 UART: [fht] FHT @ 0x50003400
1,173,426 UART: [idev] ++
1,173,594 UART: [idev] CDI.KEYID = 6
1,173,955 UART: [idev] SUBJECT.KEYID = 7
1,174,380 UART: [idev] UDS.KEYID = 0
1,174,726 ready_for_fw is high
1,174,726 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,356 UART: [idev] Erasing UDS.KEYID = 0
1,199,504 UART: [idev] Sha1 KeyId Algorithm
1,208,398 UART: [idev] --
1,209,435 UART: [ldev] ++
1,209,603 UART: [ldev] CDI.KEYID = 6
1,209,967 UART: [ldev] SUBJECT.KEYID = 5
1,210,394 UART: [ldev] AUTHORITY.KEYID = 7
1,210,857 UART: [ldev] FE.KEYID = 1
1,216,147 UART: [ldev] Erasing FE.KEYID = 1
1,242,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,215 UART: [ldev] --
1,281,559 UART: [fwproc] Wait for Commands...
1,282,232 UART: [fwproc] Recv command 0x46574c44
1,282,965 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,423 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,732 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,466 >>> mbox cmd response: success
2,773,466 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,613 UART: [afmc] ++
2,774,781 UART: [afmc] CDI.KEYID = 6
2,775,144 UART: [afmc] SUBJECT.KEYID = 7
2,775,570 UART: [afmc] AUTHORITY.KEYID = 5
2,811,235 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,470 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,199 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,082 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,801 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,594 UART: [afmc] --
2,854,628 UART: [cold-reset] --
2,855,440 UART: [state] Locking Datavault
2,856,647 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,251 UART: [state] Locking ICCM
2,857,803 UART: [exit] Launching FMC @ 0x40000130
2,863,132 UART:
2,863,148 UART: Running Caliptra FMC ...
2,863,556 UART:
2,863,699 UART: [state] CFI Enabled
2,874,696 UART: [fht] FMC Alias Private Key: 7
2,983,385 UART: [art] Extend RT PCRs Done
2,983,813 UART: [art] Lock RT PCRs Done
2,985,363 UART: [art] Populate DV Done
2,993,358 UART: [fht] FMC Alias Private Key: 7
2,994,504 UART: [art] Derive CDI
2,994,784 UART: [art] Store in in slot 0x4
3,080,311 UART: [art] Derive Key Pair
3,080,671 UART: [art] Store priv key in slot 0x5
3,094,187 UART: [art] Derive Key Pair - Done
3,108,830 UART: [art] Signing Cert with AUTHO
3,109,310 UART: RITY.KEYID = 7
3,124,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,301 UART: [art] PUB.X = A09A02410C5E27169EE02FF4C6C34A7E77683781F8B342BA0173E5035F004C068D87C040555FB9BCE833DCAB675D3070
3,132,034 UART: [art] PUB.Y = 77C66A0D873B472A1D70085F38627D060258B4E8F756A172DAF5FCE675FFBA3495CAB2B09270A7755A8219C53CBDC87F
3,138,978 UART: [art] SIG.R = 5C5867F6C1C69AD3E3909FB2FEADE2F04F89849578DD620C8E3352B9E8E474EBB7BAE70C2D87F29BAD158BE789586273
3,145,754 UART: [art] SIG.S = E5AEEC30FD3A05500CC35AD4513FF1B248EA4CBD24EC5F3160D89F9A50AE877879D6ABF4E2A3D959417D439124A9F513
3,168,799 UART: Caliptra RT
3,169,144 UART: [state] CFI Enabled
3,276,707 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,993 UART: [rt]cmd =0x4c444556, len=4
3,317,410 >>> mbox cmd response data (687 bytes)
3,317,411 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,740 UART: [rt]cmd =0x49444549, len=4
3,349,243 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,979 ready_for_fw is high
1,056,979 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,298 >>> mbox cmd response: success
2,623,298 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,685,472 UART:
2,685,488 UART: Running Caliptra FMC ...
2,685,896 UART:
2,686,039 UART: [state] CFI Enabled
2,696,480 UART: [fht] FMC Alias Private Key: 7
2,804,333 UART: [art] Extend RT PCRs Done
2,804,761 UART: [art] Lock RT PCRs Done
2,806,565 UART: [art] Populate DV Done
2,814,650 UART: [fht] FMC Alias Private Key: 7
2,815,648 UART: [art] Derive CDI
2,815,928 UART: [art] Store in in slot 0x4
2,902,057 UART: [art] Derive Key Pair
2,902,417 UART: [art] Store priv key in slot 0x5
2,916,033 UART: [art] Derive Key Pair - Done
2,930,801 UART: [art] Signing Cert with AUTHO
2,931,281 UART: RITY.KEYID = 7
2,946,609 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,374 UART: [art] PUB.X = 322F7496A42DF9CB5050F259E0B063CDA7860B2D36871BE9667749DAB16BD4C1EF1AE59F06453031EEF8D48CF596B79E
2,954,146 UART: [art] PUB.Y = 5FE5E1C04E5287500869CEBCBEADFDC6C316618340FB923362E1685843FEB21B1372E43CE7837532EDBCA4AE8A6AFED8
2,961,109 UART: [art] SIG.R = 7344CB46AC974F3640BE35A2D1C83A3D3760915F7513AC3059525BBB21D66BE80718FDE98382B6EB087EFE93B1FB3360
2,967,877 UART: [art] SIG.S = 82FEFE114C4E5C61A180BEA26EA63FA1884FEC3C89C26543809E3079AF84979ABFDFD44DE9F1E16D3C63CE157825145E
2,991,138 UART: Caliptra RT
2,991,483 UART: [state] CFI Enabled
3,099,404 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,962 UART: [rt]cmd =0x4c444556, len=4
3,140,243 >>> mbox cmd response data (687 bytes)
3,140,244 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,169,541 UART: [rt]cmd =0x49444549, len=4
3,171,700 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,251 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,941 UART: [kat] SHA2-256
881,872 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,987 UART: [kat] ++
886,139 UART: [kat] sha1
890,223 UART: [kat] SHA2-256
892,161 UART: [kat] SHA2-384
895,000 UART: [kat] SHA2-512-ACC
896,901 UART: [kat] ECC-384
902,556 UART: [kat] HMAC-384Kdf
907,042 UART: [kat] LMS
1,475,238 UART: [kat] --
1,476,127 UART: [cold-reset] ++
1,476,639 UART: [fht] Storing FHT @ 0x50003400
1,479,270 UART: [idev] ++
1,479,438 UART: [idev] CDI.KEYID = 6
1,479,798 UART: [idev] SUBJECT.KEYID = 7
1,480,222 UART: [idev] UDS.KEYID = 0
1,480,567 ready_for_fw is high
1,480,567 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,814 UART: [idev] Erasing UDS.KEYID = 0
1,504,282 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,012 UART: [idev] --
1,514,093 UART: [ldev] ++
1,514,261 UART: [ldev] CDI.KEYID = 6
1,514,624 UART: [ldev] SUBJECT.KEYID = 5
1,515,050 UART: [ldev] AUTHORITY.KEYID = 7
1,515,513 UART: [ldev] FE.KEYID = 1
1,520,633 UART: [ldev] Erasing FE.KEYID = 1
1,546,358 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,782 UART: [ldev] --
1,585,169 UART: [fwproc] Waiting for Commands...
1,586,036 UART: [fwproc] Received command 0x46574c44
1,586,827 UART: [fwproc] Received Image of size 114332 bytes
2,884,909 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,947 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,299 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,282 >>> mbox cmd response: success
3,077,282 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,078,492 UART: [afmc] ++
3,078,660 UART: [afmc] CDI.KEYID = 6
3,079,022 UART: [afmc] SUBJECT.KEYID = 7
3,079,447 UART: [afmc] AUTHORITY.KEYID = 5
3,114,290 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,828 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,608 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,336 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,221 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,911 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,850 UART: [afmc] --
3,157,738 UART: [cold-reset] --
3,158,620 UART: [state] Locking Datavault
3,159,835 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,439 UART: [state] Locking ICCM
3,160,897 UART: [exit] Launching FMC @ 0x40000130
3,166,226 UART:
3,166,242 UART: Running Caliptra FMC ...
3,166,650 UART:
3,166,704 UART: [state] CFI Enabled
3,176,999 UART: [fht] FMC Alias Private Key: 7
3,285,436 UART: [art] Extend RT PCRs Done
3,285,864 UART: [art] Lock RT PCRs Done
3,287,236 UART: [art] Populate DV Done
3,295,495 UART: [fht] FMC Alias Private Key: 7
3,296,623 UART: [art] Derive CDI
3,296,903 UART: [art] Store in in slot 0x4
3,382,622 UART: [art] Derive Key Pair
3,382,982 UART: [art] Store priv key in slot 0x5
3,395,952 UART: [art] Derive Key Pair - Done
3,410,599 UART: [art] Signing Cert with AUTHO
3,411,079 UART: RITY.KEYID = 7
3,426,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,824 UART: [art] PUB.X = 76828A4EEA00F3FA06C332B565EB101F7C86E7F8DBECFB1E52BBD75A55739E7D8E42EF916AA87E618D1CE63DBC28BA68
3,433,591 UART: [art] PUB.Y = 0EDC991CD17E3F7FBFADFD54F6E937E0DF5760D4ABD0998FCA332986B4AB69AAA3E60D3C86D444A9E31D29A47906F190
3,440,552 UART: [art] SIG.R = ECE9EF2E1DBC62F193EBF6021645A58EF91979A3F824AF538F3A0F2719C60F247551C4108899E345AB4DEFFBFC920B92
3,447,322 UART: [art] SIG.S = 28D25A8A573B5DA109DB9CCBB3E64B82100D1604120049F25FEC8DDCC43220690D032E05B8DED058F1DD91F33B21C2B5
3,471,403 UART: Caliptra RT
3,471,656 UART: [state] CFI Enabled
3,580,593 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,153 UART: [rt]cmd =0x43455246, len=4
3,623,480 >>> mbox cmd response data (920 bytes)
3,623,481 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,652,930 UART: [rt]cmd =0x43455252, len=4
3,663,636 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,217 ready_for_fw is high
1,362,217 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,111 >>> mbox cmd response: success
2,929,111 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,990,469 UART:
2,990,485 UART: Running Caliptra FMC ...
2,990,893 UART:
2,990,947 UART: [state] CFI Enabled
3,001,504 UART: [fht] FMC Alias Private Key: 7
3,109,073 UART: [art] Extend RT PCRs Done
3,109,501 UART: [art] Lock RT PCRs Done
3,111,225 UART: [art] Populate DV Done
3,119,186 UART: [fht] FMC Alias Private Key: 7
3,120,276 UART: [art] Derive CDI
3,120,556 UART: [art] Store in in slot 0x4
3,205,821 UART: [art] Derive Key Pair
3,206,181 UART: [art] Store priv key in slot 0x5
3,218,759 UART: [art] Derive Key Pair - Done
3,233,665 UART: [art] Signing Cert with AUTHO
3,234,145 UART: RITY.KEYID = 7
3,249,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,254 UART: [art] PUB.X = 3693A250503132CBFE12CBFFAC7D005CC5E7FE5B17725E732548A5EA8EC340C424EE0E8D23CC5667861620EA948F607A
3,257,007 UART: [art] PUB.Y = 4109261D58706E1B8034FE0F71C00392AAA3FDBD4AB2ADEE3ABD69AC4E7D0DB934709CE2DBDB3CBA8FC90103FD9677DD
3,263,965 UART: [art] SIG.R = 2940C055653620F237E224CF51A04BBFC34028B8AD84A8FA7F70C1C5753F6ABABE14ACEA5E45FD8B2E12C3CCAC256854
3,270,751 UART: [art] SIG.S = 5A60FBA2EC59650AF4D8354B0591359C7E0FCF3DEFB20DE996B8A7DB0A21C2C4B99053151B862989717D8E36ACE07316
3,294,439 UART: Caliptra RT
3,294,692 UART: [state] CFI Enabled
3,402,484 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,902 UART: [rt]cmd =0x43455246, len=4
3,445,047 >>> mbox cmd response data (920 bytes)
3,445,048 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,255 UART: [rt]cmd =0x43455252, len=4
3,485,309 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,989 UART: [state] LifecycleState = Unprovisioned
85,644 UART: [state] DebugLocked = No
86,380 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,876 UART: [kat] SHA2-256
881,807 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,922 UART: [kat] ++
886,074 UART: [kat] sha1
890,424 UART: [kat] SHA2-256
892,362 UART: [kat] SHA2-384
894,971 UART: [kat] SHA2-512-ACC
896,872 UART: [kat] ECC-384
902,189 UART: [kat] HMAC-384Kdf
906,997 UART: [kat] LMS
1,475,193 UART: [kat] --
1,476,008 UART: [cold-reset] ++
1,476,392 UART: [fht] Storing FHT @ 0x50003400
1,478,997 UART: [idev] ++
1,479,165 UART: [idev] CDI.KEYID = 6
1,479,525 UART: [idev] SUBJECT.KEYID = 7
1,479,949 UART: [idev] UDS.KEYID = 0
1,480,294 ready_for_fw is high
1,480,294 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,035 UART: [idev] Erasing UDS.KEYID = 0
1,504,455 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,061 UART: [idev] --
1,513,980 UART: [ldev] ++
1,514,148 UART: [ldev] CDI.KEYID = 6
1,514,511 UART: [ldev] SUBJECT.KEYID = 5
1,514,937 UART: [ldev] AUTHORITY.KEYID = 7
1,515,400 UART: [ldev] FE.KEYID = 1
1,520,554 UART: [ldev] Erasing FE.KEYID = 1
1,545,685 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,515 UART: [ldev] --
1,584,988 UART: [fwproc] Waiting for Commands...
1,585,655 UART: [fwproc] Received command 0x46574c44
1,586,446 UART: [fwproc] Received Image of size 114332 bytes
2,884,202 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,546 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,898 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,783 >>> mbox cmd response: success
3,076,783 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,078,027 UART: [afmc] ++
3,078,195 UART: [afmc] CDI.KEYID = 6
3,078,557 UART: [afmc] SUBJECT.KEYID = 7
3,078,982 UART: [afmc] AUTHORITY.KEYID = 5
3,114,463 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,633 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,413 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,141 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,026 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,716 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,663 UART: [afmc] --
3,157,791 UART: [cold-reset] --
3,158,699 UART: [state] Locking Datavault
3,159,754 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,358 UART: [state] Locking ICCM
3,160,876 UART: [exit] Launching FMC @ 0x40000130
3,166,205 UART:
3,166,221 UART: Running Caliptra FMC ...
3,166,629 UART:
3,166,772 UART: [state] CFI Enabled
3,177,755 UART: [fht] FMC Alias Private Key: 7
3,285,972 UART: [art] Extend RT PCRs Done
3,286,400 UART: [art] Lock RT PCRs Done
3,288,038 UART: [art] Populate DV Done
3,296,301 UART: [fht] FMC Alias Private Key: 7
3,297,361 UART: [art] Derive CDI
3,297,641 UART: [art] Store in in slot 0x4
3,383,822 UART: [art] Derive Key Pair
3,384,182 UART: [art] Store priv key in slot 0x5
3,397,626 UART: [art] Derive Key Pair - Done
3,412,770 UART: [art] Signing Cert with AUTHO
3,413,250 UART: RITY.KEYID = 7
3,428,630 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,395 UART: [art] PUB.X = 9C558237EAEAE7CF49B48ED0A40CD3F722E1A7BCC218E0762A54F4C1A242102F4F18A33EB4528EC099F6C06FBF864961
3,436,174 UART: [art] PUB.Y = 969E2B0B86A83EE2CEA4C713F660566821392B24F59965B878E58E84CCF2ACCFD3EEF3FABB211229BF7B79859953D5DF
3,443,133 UART: [art] SIG.R = B3EC3C346F823FB01B19C42B5CFC6FE6E77DA0AE7403FA102070FFA67515686E77818892612D8DB818501F9FDC6B535F
3,449,908 UART: [art] SIG.S = 73751D5749C690802AEEB4F46D8AD8E9C5B1E2BC55CAC303035DC3C3EBE3ACB81074ED52425DDAC3442FADEC7FD15BC5
3,473,505 UART: Caliptra RT
3,473,850 UART: [state] CFI Enabled
3,581,105 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,595 UART: [rt]cmd =0x43455246, len=4
3,623,972 >>> mbox cmd response data (920 bytes)
3,623,973 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,572 UART: [rt]cmd =0x43455252, len=4
3,664,226 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,364,138 ready_for_fw is high
1,364,138 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,931,065 >>> mbox cmd response: success
2,931,065 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,993,073 UART:
2,993,089 UART: Running Caliptra FMC ...
2,993,497 UART:
2,993,640 UART: [state] CFI Enabled
3,004,357 UART: [fht] FMC Alias Private Key: 7
3,112,392 UART: [art] Extend RT PCRs Done
3,112,820 UART: [art] Lock RT PCRs Done
3,114,530 UART: [art] Populate DV Done
3,122,767 UART: [fht] FMC Alias Private Key: 7
3,123,835 UART: [art] Derive CDI
3,124,115 UART: [art] Store in in slot 0x4
3,209,800 UART: [art] Derive Key Pair
3,210,160 UART: [art] Store priv key in slot 0x5
3,223,326 UART: [art] Derive Key Pair - Done
3,238,013 UART: [art] Signing Cert with AUTHO
3,238,493 UART: RITY.KEYID = 7
3,253,237 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,002 UART: [art] PUB.X = 803A44E840787E183D61D18AE7D9CBB34ACACA6466612E3885A9BD7A3A49B314B2252B37662F3730218978150EA7C1EA
3,260,769 UART: [art] PUB.Y = A1D7607472F1A1B55FB5B08B55B255CE8BFE0BA863FC6EE583AFABFCEBDE68A5F3462A4F6C4D4DD948C5E02B18C89E5A
3,267,744 UART: [art] SIG.R = 0C927A2CD69DE1225B1F9F1E7F39740CC32E4B045D73B5BEC82598A67C2ED4761B760CBC8F8A4E8B1213A449DFB7096A
3,274,511 UART: [art] SIG.S = 2201EF9BFB124F348F1A81EA956245C626B6D52BBEDE565C43431706A3E31CB0B51DCA8CE35F2F3E5662B4BBD37379F2
3,298,108 UART: Caliptra RT
3,298,453 UART: [state] CFI Enabled
3,407,395 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,963 UART: [rt]cmd =0x43455246, len=4
3,450,330 >>> mbox cmd response data (920 bytes)
3,450,331 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,636 UART: [rt]cmd =0x43455252, len=4
3,490,312 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,874 UART: [state] LifecycleState = Unprovisioned
85,529 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,328 UART: [kat] SHA2-256
892,978 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,103 UART: [kat] ++
897,255 UART: [kat] sha1
901,295 UART: [kat] SHA2-256
903,235 UART: [kat] SHA2-384
905,986 UART: [kat] SHA2-512-ACC
907,887 UART: [kat] ECC-384
917,288 UART: [kat] HMAC-384Kdf
921,750 UART: [kat] LMS
1,170,078 UART: [kat] --
1,171,009 UART: [cold-reset] ++
1,171,533 UART: [fht] FHT @ 0x50003400
1,174,282 UART: [idev] ++
1,174,450 UART: [idev] CDI.KEYID = 6
1,174,810 UART: [idev] SUBJECT.KEYID = 7
1,175,234 UART: [idev] UDS.KEYID = 0
1,175,579 ready_for_fw is high
1,175,579 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,952 UART: [idev] Erasing UDS.KEYID = 0
1,200,109 UART: [idev] Sha1 KeyId Algorithm
1,208,613 UART: [idev] --
1,209,731 UART: [ldev] ++
1,209,899 UART: [ldev] CDI.KEYID = 6
1,210,262 UART: [ldev] SUBJECT.KEYID = 5
1,210,688 UART: [ldev] AUTHORITY.KEYID = 7
1,211,151 UART: [ldev] FE.KEYID = 1
1,216,255 UART: [ldev] Erasing FE.KEYID = 1
1,242,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,349 UART: [ldev] --
1,281,714 UART: [fwproc] Wait for Commands...
1,282,316 UART: [fwproc] Recv command 0x46574c44
1,283,044 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,334 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,638 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,567 >>> mbox cmd response: success
2,774,567 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,775,639 UART: [afmc] ++
2,775,807 UART: [afmc] CDI.KEYID = 6
2,776,169 UART: [afmc] SUBJECT.KEYID = 7
2,776,594 UART: [afmc] AUTHORITY.KEYID = 5
2,812,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,692 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,440 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,168 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,053 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,772 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,758 UART: [afmc] --
2,855,776 UART: [cold-reset] --
2,856,634 UART: [state] Locking Datavault
2,857,615 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,219 UART: [state] Locking ICCM
2,858,731 UART: [exit] Launching FMC @ 0x40000130
2,864,060 UART:
2,864,076 UART: Running Caliptra FMC ...
2,864,484 UART:
2,864,538 UART: [state] CFI Enabled
2,875,039 UART: [fht] FMC Alias Private Key: 7
2,982,672 UART: [art] Extend RT PCRs Done
2,983,100 UART: [art] Lock RT PCRs Done
2,984,630 UART: [art] Populate DV Done
2,992,777 UART: [fht] FMC Alias Private Key: 7
2,993,833 UART: [art] Derive CDI
2,994,113 UART: [art] Store in in slot 0x4
3,079,632 UART: [art] Derive Key Pair
3,079,992 UART: [art] Store priv key in slot 0x5
3,093,206 UART: [art] Derive Key Pair - Done
3,107,845 UART: [art] Signing Cert with AUTHO
3,108,325 UART: RITY.KEYID = 7
3,123,663 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,428 UART: [art] PUB.X = D7B7788D0E4EA7779A6836EA783883CC7A0AB0D39942D05D917A3AD1F140F70BA6190026162C3DD417C603BBFF9986F2
3,131,168 UART: [art] PUB.Y = 91169DC48906B0521B673D13F814A33E0ACBE9CB774A84DAED7756F6C04AD1508357E02321E1134F5B11BA30FA0C6CDE
3,138,117 UART: [art] SIG.R = 7D904447A6F6C2A8B27158F74F477E5CFE66D5C42C088E3154BA297DC1E0E0111AF989E67820A65271D2FE23F1451415
3,144,882 UART: [art] SIG.S = EE16EBA44C6F0B2391B174683BCFBBB2A049F5C967EAB6179198311409716C1F70217E1BF3F8DF4F4C4A6D893D334739
3,168,147 UART: Caliptra RT
3,168,400 UART: [state] CFI Enabled
3,275,011 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,331 UART: [rt]cmd =0x43455246, len=4
3,317,252 >>> mbox cmd response data (887 bytes)
3,317,253 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,738 UART: [rt]cmd =0x43455252, len=4
3,357,578 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,291 ready_for_fw is high
1,060,291 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,976 >>> mbox cmd response: success
2,625,976 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,687,066 UART:
2,687,082 UART: Running Caliptra FMC ...
2,687,490 UART:
2,687,544 UART: [state] CFI Enabled
2,697,951 UART: [fht] FMC Alias Private Key: 7
2,806,208 UART: [art] Extend RT PCRs Done
2,806,636 UART: [art] Lock RT PCRs Done
2,808,108 UART: [art] Populate DV Done
2,816,217 UART: [fht] FMC Alias Private Key: 7
2,817,341 UART: [art] Derive CDI
2,817,621 UART: [art] Store in in slot 0x4
2,903,004 UART: [art] Derive Key Pair
2,903,364 UART: [art] Store priv key in slot 0x5
2,916,530 UART: [art] Derive Key Pair - Done
2,931,381 UART: [art] Signing Cert with AUTHO
2,931,861 UART: RITY.KEYID = 7
2,947,027 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,792 UART: [art] PUB.X = 269C5B1E74B89C8CD39B3E329F2665800E45EA8E7B005B0F47A87D7DA91259EA6E826201EF0C27785EF8E337A39AF9DB
2,954,536 UART: [art] PUB.Y = 2B26CF1A244DF801B97461F6D043305483717559AF4B954F35B90919FE4BAD079E181CE30F0B902E9E007561F10849FF
2,961,442 UART: [art] SIG.R = D8F6CA772CB2D77D6698B7034E765857F19CF876C2BF2E02287E2885603EA9EE5C02D3AE863D245AE035839C70E65521
2,968,203 UART: [art] SIG.S = B35EC6B3CB239DC1B5F20AA9F9BC04FBFCF64094C8A56B36735DBEEF399FEFA0A06A95BBF2BDB6024676A9D5E1CEE32F
2,992,013 UART: Caliptra RT
2,992,266 UART: [state] CFI Enabled
3,099,622 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,368 UART: [rt]cmd =0x43455246, len=4
3,142,481 >>> mbox cmd response data (887 bytes)
3,142,482 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,065 UART: [rt]cmd =0x43455252, len=4
3,182,918 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,599 UART: [kat] SHA2-256
893,249 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,374 UART: [kat] ++
897,526 UART: [kat] sha1
901,626 UART: [kat] SHA2-256
903,566 UART: [kat] SHA2-384
906,377 UART: [kat] SHA2-512-ACC
908,278 UART: [kat] ECC-384
917,983 UART: [kat] HMAC-384Kdf
922,647 UART: [kat] LMS
1,170,975 UART: [kat] --
1,171,720 UART: [cold-reset] ++
1,172,110 UART: [fht] FHT @ 0x50003400
1,174,735 UART: [idev] ++
1,174,903 UART: [idev] CDI.KEYID = 6
1,175,263 UART: [idev] SUBJECT.KEYID = 7
1,175,687 UART: [idev] UDS.KEYID = 0
1,176,032 ready_for_fw is high
1,176,032 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,629 UART: [idev] Erasing UDS.KEYID = 0
1,200,622 UART: [idev] Sha1 KeyId Algorithm
1,208,984 UART: [idev] --
1,210,208 UART: [ldev] ++
1,210,376 UART: [ldev] CDI.KEYID = 6
1,210,739 UART: [ldev] SUBJECT.KEYID = 5
1,211,165 UART: [ldev] AUTHORITY.KEYID = 7
1,211,628 UART: [ldev] FE.KEYID = 1
1,216,908 UART: [ldev] Erasing FE.KEYID = 1
1,243,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,016 UART: [ldev] --
1,283,479 UART: [fwproc] Wait for Commands...
1,284,223 UART: [fwproc] Recv command 0x46574c44
1,284,951 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,393 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,697 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,558 >>> mbox cmd response: success
2,775,558 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,776,684 UART: [afmc] ++
2,776,852 UART: [afmc] CDI.KEYID = 6
2,777,214 UART: [afmc] SUBJECT.KEYID = 7
2,777,639 UART: [afmc] AUTHORITY.KEYID = 5
2,812,382 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,747 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,495 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,223 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,108 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,827 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,623 UART: [afmc] --
2,855,567 UART: [cold-reset] --
2,856,259 UART: [state] Locking Datavault
2,857,514 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,118 UART: [state] Locking ICCM
2,858,704 UART: [exit] Launching FMC @ 0x40000130
2,864,033 UART:
2,864,049 UART: Running Caliptra FMC ...
2,864,457 UART:
2,864,600 UART: [state] CFI Enabled
2,875,009 UART: [fht] FMC Alias Private Key: 7
2,983,312 UART: [art] Extend RT PCRs Done
2,983,740 UART: [art] Lock RT PCRs Done
2,985,212 UART: [art] Populate DV Done
2,993,555 UART: [fht] FMC Alias Private Key: 7
2,994,493 UART: [art] Derive CDI
2,994,773 UART: [art] Store in in slot 0x4
3,080,432 UART: [art] Derive Key Pair
3,080,792 UART: [art] Store priv key in slot 0x5
3,094,062 UART: [art] Derive Key Pair - Done
3,108,872 UART: [art] Signing Cert with AUTHO
3,109,352 UART: RITY.KEYID = 7
3,124,954 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,719 UART: [art] PUB.X = 26D01FAFE54AC8596BF11AABC00A3E5E7CC0DC56D7E667695B6E7BA81AB4C9AACC28F69539057B9E7F7581FD581A7F0E
3,132,502 UART: [art] PUB.Y = 345653508DEEA5C58934261A1B71045C88EEF19E9766E58963BD21776CF39C383FFE4BC05D775D0C018B54C8857A3273
3,139,439 UART: [art] SIG.R = 394B305FFE69A42DC67741FFBFCFBCA3A2962BF587A7EC337C09C9BF268156D09ABCAF5A8C2F77B40543CB99EA55FCC5
3,146,227 UART: [art] SIG.S = A00F5C134301274D23734A5253A575190F09C42946BA85E0388BDDCC182DC8CBE6D6AEE1ED7C1E58625B736BAA77EE2C
3,170,300 UART: Caliptra RT
3,170,645 UART: [state] CFI Enabled
3,278,998 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,442 UART: [rt]cmd =0x43455246, len=4
3,321,621 >>> mbox cmd response data (887 bytes)
3,321,622 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,941 UART: [rt]cmd =0x43455252, len=4
3,361,759 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,372 ready_for_fw is high
1,060,372 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,877 >>> mbox cmd response: success
2,625,877 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,688,563 UART:
2,688,579 UART: Running Caliptra FMC ...
2,688,987 UART:
2,689,130 UART: [state] CFI Enabled
2,699,815 UART: [fht] FMC Alias Private Key: 7
2,807,864 UART: [art] Extend RT PCRs Done
2,808,292 UART: [art] Lock RT PCRs Done
2,809,652 UART: [art] Populate DV Done
2,818,157 UART: [fht] FMC Alias Private Key: 7
2,819,329 UART: [art] Derive CDI
2,819,609 UART: [art] Store in in slot 0x4
2,905,960 UART: [art] Derive Key Pair
2,906,320 UART: [art] Store priv key in slot 0x5
2,920,284 UART: [art] Derive Key Pair - Done
2,935,270 UART: [art] Signing Cert with AUTHO
2,935,750 UART: RITY.KEYID = 7
2,950,218 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,983 UART: [art] PUB.X = DA4DAEDFF2C6B1A40FA470FBF9F6F78AE7A779740E6398623C06DB25BFDC4BAF28716B20BFC1B83192B9CE40DBB22292
2,957,768 UART: [art] PUB.Y = 4D9BBB0744EA94DE68EC59042D574829CFE494EA6582BBBBC1D88FE9ECDF5CC1951D3AAC415C287E5A45E9B624F6E271
2,964,732 UART: [art] SIG.R = A71FA7BA8900CADB6A7C94FDF77253A4CEC0727A6FC0A888B1112488F4A9D8F9F466974B184EEAD1C8DA9726302B4CCC
2,971,498 UART: [art] SIG.S = 3B2D89C8E40EA7CED70052E6B284A04763EE1AA2A10DB9B40A2698824911F6B0F28C30160F85104F41636278B0A2B782
2,995,133 UART: Caliptra RT
2,995,478 UART: [state] CFI Enabled
3,102,733 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,237 UART: [rt]cmd =0x43455246, len=4
3,145,460 >>> mbox cmd response data (887 bytes)
3,145,461 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,175,068 UART: [rt]cmd =0x43455252, len=4
3,185,800 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,550 UART: [state] LifecycleState = Unprovisioned
86,205 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
87,872 UART: [kat] SHA2-256
891,422 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,551 UART: [kat] ++
895,703 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,480 UART: [kat] SHA2-512-ACC
906,381 UART: [kat] ECC-384
916,124 UART: [kat] HMAC-384Kdf
920,720 UART: [kat] LMS
1,169,032 UART: [kat] --
1,169,745 UART: [cold-reset] ++
1,170,087 UART: [fht] FHT @ 0x50003400
1,172,845 UART: [idev] ++
1,173,013 UART: [idev] CDI.KEYID = 6
1,173,374 UART: [idev] SUBJECT.KEYID = 7
1,173,799 UART: [idev] UDS.KEYID = 0
1,174,145 ready_for_fw is high
1,174,145 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,685 UART: [idev] Erasing UDS.KEYID = 0
1,198,339 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,382 UART: [ldev] ++
1,208,550 UART: [ldev] CDI.KEYID = 6
1,208,914 UART: [ldev] SUBJECT.KEYID = 5
1,209,341 UART: [ldev] AUTHORITY.KEYID = 7
1,209,804 UART: [ldev] FE.KEYID = 1
1,214,696 UART: [ldev] Erasing FE.KEYID = 1
1,241,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,100 UART: [ldev] --
1,280,436 UART: [fwproc] Wait for Commands...
1,281,249 UART: [fwproc] Recv command 0x46574c44
1,281,982 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,716 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,716 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,025 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,809 >>> mbox cmd response: success
2,771,809 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,772,946 UART: [afmc] ++
2,773,114 UART: [afmc] CDI.KEYID = 6
2,773,477 UART: [afmc] SUBJECT.KEYID = 7
2,773,903 UART: [afmc] AUTHORITY.KEYID = 5
2,808,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,142 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,893 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,622 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,505 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,224 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,267 UART: [afmc] --
2,852,227 UART: [cold-reset] --
2,853,123 UART: [state] Locking Datavault
2,854,196 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,800 UART: [state] Locking ICCM
2,855,372 UART: [exit] Launching FMC @ 0x40000130
2,860,701 UART:
2,860,717 UART: Running Caliptra FMC ...
2,861,125 UART:
2,861,179 UART: [state] CFI Enabled
2,871,586 UART: [fht] FMC Alias Private Key: 7
2,978,813 UART: [art] Extend RT PCRs Done
2,979,241 UART: [art] Lock RT PCRs Done
2,980,729 UART: [art] Populate DV Done
2,988,970 UART: [fht] FMC Alias Private Key: 7
2,990,034 UART: [art] Derive CDI
2,990,314 UART: [art] Store in in slot 0x4
3,075,965 UART: [art] Derive Key Pair
3,076,325 UART: [art] Store priv key in slot 0x5
3,089,293 UART: [art] Derive Key Pair - Done
3,103,881 UART: [art] Signing Cert with AUTHO
3,104,361 UART: RITY.KEYID = 7
3,119,475 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,240 UART: [art] PUB.X = E9208D285E940D6576B685B6A09C020D27CC8E89DE0107407AAD113A5752FC24F043196BBAEF6A29B5263D42FAE96753
3,126,997 UART: [art] PUB.Y = 6292598A111F2CDDC21135138D638501D4FAAC205D073C7BA5051B2443E35B85AD70E8640FA0E7FCEBE6E4D36615E967
3,133,939 UART: [art] SIG.R = E65DF11374802F6CBCC7DE3930C1107606E3A934D83B9A5E4E16CA495F79CEE468AB2955B7C58098D5755838CB8C499A
3,140,710 UART: [art] SIG.S = 64854B3052E8A33D6ED0CE212C16888996BB9997A97E8B8890C3D82163F4CEE77836FF487518C497B267DF6F2C062278
3,164,558 UART: Caliptra RT
3,164,811 UART: [state] CFI Enabled
3,271,572 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,318 UART: [rt]cmd =0x43455246, len=4
3,314,473 >>> mbox cmd response data (887 bytes)
3,314,474 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,921 UART: [rt]cmd =0x43455252, len=4
3,354,921 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,854 ready_for_fw is high
1,055,854 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,141 >>> mbox cmd response: success
2,622,141 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,684,089 UART:
2,684,105 UART: Running Caliptra FMC ...
2,684,513 UART:
2,684,567 UART: [state] CFI Enabled
2,695,224 UART: [fht] FMC Alias Private Key: 7
2,803,783 UART: [art] Extend RT PCRs Done
2,804,211 UART: [art] Lock RT PCRs Done
2,805,859 UART: [art] Populate DV Done
2,813,966 UART: [fht] FMC Alias Private Key: 7
2,814,982 UART: [art] Derive CDI
2,815,262 UART: [art] Store in in slot 0x4
2,901,259 UART: [art] Derive Key Pair
2,901,619 UART: [art] Store priv key in slot 0x5
2,915,167 UART: [art] Derive Key Pair - Done
2,929,501 UART: [art] Signing Cert with AUTHO
2,929,981 UART: RITY.KEYID = 7
2,944,663 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,428 UART: [art] PUB.X = 48AD45D545C24EB9FEB2CDF79A0BD8B73F9E66BD24F9AD381C96B6D4AFA791F0497CB21D0876277506B2D29C80496F7A
2,952,203 UART: [art] PUB.Y = B6A3DD3FB7299B51B4D3FEE607CD2D3AAFDB61A62ACD05E5BF509E742B24D9542BEB4A122836D9D820D63F14591B1D87
2,959,165 UART: [art] SIG.R = CC63F41749806169B88F45028CAD8A8DFF7966A9C343BEE16125ADEDC8CA2B3437172B9160BB53BF16603399F09285A4
2,965,934 UART: [art] SIG.S = A93C64D8937E94A34817D1F1D28C64D3B91B135BB9CA3E0797E4E7746D9E32DD8C5BD025C300B1B418DD5B09923AC5B4
2,989,425 UART: Caliptra RT
2,989,678 UART: [state] CFI Enabled
3,097,364 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,770 UART: [rt]cmd =0x43455246, len=4
3,139,625 >>> mbox cmd response data (887 bytes)
3,139,626 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,169,123 UART: [rt]cmd =0x43455252, len=4
3,179,788 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
891,367 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,496 UART: [kat] ++
895,648 UART: [kat] sha1
900,014 UART: [kat] SHA2-256
901,954 UART: [kat] SHA2-384
904,721 UART: [kat] SHA2-512-ACC
906,622 UART: [kat] ECC-384
916,599 UART: [kat] HMAC-384Kdf
921,371 UART: [kat] LMS
1,169,683 UART: [kat] --
1,170,452 UART: [cold-reset] ++
1,170,840 UART: [fht] FHT @ 0x50003400
1,173,350 UART: [idev] ++
1,173,518 UART: [idev] CDI.KEYID = 6
1,173,879 UART: [idev] SUBJECT.KEYID = 7
1,174,304 UART: [idev] UDS.KEYID = 0
1,174,650 ready_for_fw is high
1,174,650 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,070 UART: [idev] Erasing UDS.KEYID = 0
1,199,390 UART: [idev] Sha1 KeyId Algorithm
1,208,342 UART: [idev] --
1,209,329 UART: [ldev] ++
1,209,497 UART: [ldev] CDI.KEYID = 6
1,209,861 UART: [ldev] SUBJECT.KEYID = 5
1,210,288 UART: [ldev] AUTHORITY.KEYID = 7
1,210,751 UART: [ldev] FE.KEYID = 1
1,216,231 UART: [ldev] Erasing FE.KEYID = 1
1,242,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,611 UART: [ldev] --
1,282,031 UART: [fwproc] Wait for Commands...
1,282,782 UART: [fwproc] Recv command 0x46574c44
1,283,515 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,719 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,028 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,832 >>> mbox cmd response: success
2,773,832 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,775,097 UART: [afmc] ++
2,775,265 UART: [afmc] CDI.KEYID = 6
2,775,628 UART: [afmc] SUBJECT.KEYID = 7
2,776,054 UART: [afmc] AUTHORITY.KEYID = 5
2,811,669 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,173 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,924 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,653 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,536 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,255 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,138 UART: [afmc] --
2,855,234 UART: [cold-reset] --
2,856,160 UART: [state] Locking Datavault
2,857,027 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,631 UART: [state] Locking ICCM
2,858,291 UART: [exit] Launching FMC @ 0x40000130
2,863,620 UART:
2,863,636 UART: Running Caliptra FMC ...
2,864,044 UART:
2,864,187 UART: [state] CFI Enabled
2,874,878 UART: [fht] FMC Alias Private Key: 7
2,982,887 UART: [art] Extend RT PCRs Done
2,983,315 UART: [art] Lock RT PCRs Done
2,984,705 UART: [art] Populate DV Done
2,992,884 UART: [fht] FMC Alias Private Key: 7
2,993,820 UART: [art] Derive CDI
2,994,100 UART: [art] Store in in slot 0x4
3,079,359 UART: [art] Derive Key Pair
3,079,719 UART: [art] Store priv key in slot 0x5
3,093,437 UART: [art] Derive Key Pair - Done
3,107,956 UART: [art] Signing Cert with AUTHO
3,108,436 UART: RITY.KEYID = 7
3,123,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,747 UART: [art] PUB.X = 7993862C1C81A26522AD6171CB2E3D581DA3B97A040A489C696A1126032953FBC985012C4908568C57BAD8BC2285762E
3,131,494 UART: [art] PUB.Y = 8CF3D4DE1819F945634048323E8751A597BDD6BDBBE02F46FF63DFDAC9B836C63BAA87F96BB9284562D6FD7CEC4B3248
3,138,460 UART: [art] SIG.R = 94AA868EFA49F5F89CD78DDF19862E8F8512D5FD9CFA9DA6CE13DE89C1F850F812BCBF807F6D8AEA1B9BFA814C024161
3,145,251 UART: [art] SIG.S = 6367D10D031AF2A221CE8704DEC2DC8DD5CABAA70D5F6E976EDF8F1C45A54CD10167C97314998AD46BD5E26286309FC1
3,168,987 UART: Caliptra RT
3,169,332 UART: [state] CFI Enabled
3,277,011 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,351 UART: [rt]cmd =0x43455246, len=4
3,319,524 >>> mbox cmd response data (887 bytes)
3,319,525 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,954 UART: [rt]cmd =0x43455252, len=4
3,359,758 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,841 ready_for_fw is high
1,055,841 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,504 >>> mbox cmd response: success
2,622,504 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,684,608 UART:
2,684,624 UART: Running Caliptra FMC ...
2,685,032 UART:
2,685,175 UART: [state] CFI Enabled
2,695,618 UART: [fht] FMC Alias Private Key: 7
2,804,003 UART: [art] Extend RT PCRs Done
2,804,431 UART: [art] Lock RT PCRs Done
2,805,877 UART: [art] Populate DV Done
2,814,276 UART: [fht] FMC Alias Private Key: 7
2,815,420 UART: [art] Derive CDI
2,815,700 UART: [art] Store in in slot 0x4
2,901,123 UART: [art] Derive Key Pair
2,901,483 UART: [art] Store priv key in slot 0x5
2,915,635 UART: [art] Derive Key Pair - Done
2,930,184 UART: [art] Signing Cert with AUTHO
2,930,664 UART: RITY.KEYID = 7
2,946,300 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,065 UART: [art] PUB.X = AFBF742F638CE543364BC3ED3DB7E8F7EAFCC033F22E979A209FF6A645A53449E9E1A1D084FF2F7D93F0C17B0A836885
2,953,848 UART: [art] PUB.Y = 12AF608E694D69C0A6532A472BCC45ABECE031D19001A5FD2858A6C121F1B7931E9121C46649C89BCB164EE346079865
2,960,792 UART: [art] SIG.R = 2E5984035C0926DBBDA3E1EBEC503E4553D8D8DF01896F830F98B40EBB87681580F16852A25C7A6F259A9CD91EBFF56E
2,967,557 UART: [art] SIG.S = E121DE839FBC7DAC1D7CEFBA1A0D2C85B8CCFA09C97E6F323E71B8C6572E868B554597A8E43415B4AA7559724A27C67B
2,991,702 UART: Caliptra RT
2,992,047 UART: [state] CFI Enabled
3,099,880 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,332 UART: [rt]cmd =0x43455246, len=4
3,142,315 >>> mbox cmd response data (887 bytes)
3,142,316 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,601 UART: [rt]cmd =0x43455252, len=4
3,182,481 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,211 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,799 UART: [kat] SHA2-256
881,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,845 UART: [kat] ++
885,997 UART: [kat] sha1
890,233 UART: [kat] SHA2-256
892,171 UART: [kat] SHA2-384
895,108 UART: [kat] SHA2-512-ACC
897,009 UART: [kat] ECC-384
902,790 UART: [kat] HMAC-384Kdf
907,280 UART: [kat] LMS
1,475,476 UART: [kat] --
1,476,279 UART: [cold-reset] ++
1,476,827 UART: [fht] Storing FHT @ 0x50003400
1,479,600 UART: [idev] ++
1,479,768 UART: [idev] CDI.KEYID = 6
1,480,128 UART: [idev] SUBJECT.KEYID = 7
1,480,552 UART: [idev] UDS.KEYID = 0
1,480,897 ready_for_fw is high
1,480,897 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,622 UART: [idev] Erasing UDS.KEYID = 0
1,505,406 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,978 UART: [idev] --
1,514,919 UART: [ldev] ++
1,515,087 UART: [ldev] CDI.KEYID = 6
1,515,450 UART: [ldev] SUBJECT.KEYID = 5
1,515,876 UART: [ldev] AUTHORITY.KEYID = 7
1,516,339 UART: [ldev] FE.KEYID = 1
1,521,535 UART: [ldev] Erasing FE.KEYID = 1
1,546,886 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,910 UART: [ldev] --
1,586,367 UART: [fwproc] Waiting for Commands...
1,587,042 UART: [fwproc] Received command 0x46574c44
1,587,833 UART: [fwproc] Received Image of size 114332 bytes
2,884,789 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,509 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,861 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,760 >>> mbox cmd response: success
3,077,760 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,078,998 UART: [afmc] ++
3,079,166 UART: [afmc] CDI.KEYID = 6
3,079,528 UART: [afmc] SUBJECT.KEYID = 7
3,079,953 UART: [afmc] AUTHORITY.KEYID = 5
3,114,548 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,700 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,480 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,208 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,093 UART: [afmc] SIG.R = 1A743C3A7D904AB160CD61DC895A36FA36F447F58D4DDDA3052B0AD9776D66E7B60BFE7137FFC32B58F5ADDFF97E3916
3,148,805 UART: [afmc] SIG.S = CAC50B695CBE242FDD8B0AA6597D17EDA5AEF329775580D553F8608A51D5B147B9505EDF40F3AB8CC947D612826E0DFF
3,156,629 UART: [afmc] --
3,157,757 UART: [cold-reset] --
3,158,515 UART: [state] Locking Datavault
3,159,370 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,974 UART: [state] Locking ICCM
3,160,502 UART: [exit] Launching FMC @ 0x40000130
3,165,831 UART:
3,165,847 UART: Running Caliptra FMC ...
3,166,255 UART:
3,166,309 UART: [state] CFI Enabled
3,176,924 UART: [fht] FMC Alias Private Key: 7
3,284,443 UART: [art] Extend RT PCRs Done
3,284,871 UART: [art] Lock RT PCRs Done
3,286,685 UART: [art] Populate DV Done
3,294,848 UART: [fht] FMC Alias Private Key: 7
3,295,820 UART: [art] Derive CDI
3,296,100 UART: [art] Store in in slot 0x4
3,381,363 UART: [art] Derive Key Pair
3,381,723 UART: [art] Store priv key in slot 0x5
3,395,313 UART: [art] Derive Key Pair - Done
3,410,423 UART: [art] Signing Cert with AUTHO
3,410,903 UART: RITY.KEYID = 7
3,426,161 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,926 UART: [art] PUB.X = C78BA528EEEB7A3DD1EF5BE313A4525CB74D1B01B78600E5C8B01E4FB98B5F58003F8C1500FBA9EC43A2314AE4B32B02
3,433,642 UART: [art] PUB.Y = 9C3615C8543A221544273D994F9C5B892D80A5E437BBCF2B38019D2DD25ED6B96CBEFC8A1690751BF3DC4C816ED08190
3,440,595 UART: [art] SIG.R = D098D7DD951C6730F153B315B480EC25CE45DD1F72F1935311BA1E5D4BE628472AFE147D5C70D92A5C471574F23D4AFD
3,447,373 UART: [art] SIG.S = 842CEEAB5B6D6582F47691F26D04F19A0DCC323412D6E6CB4C915101581DED62EF662ED3D0A871FB3E42E563AC73B20F
3,471,144 UART: Caliptra RT
3,471,397 UART: [state] CFI Enabled
3,579,536 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,006 UART: [rt]cmd =0x43455252, len=4
3,620,839 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,649 ready_for_fw is high
1,362,649 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,184 >>> mbox cmd response: success
2,927,184 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,989,522 UART:
2,989,538 UART: Running Caliptra FMC ...
2,989,946 UART:
2,990,000 UART: [state] CFI Enabled
3,000,075 UART: [fht] FMC Alias Private Key: 7
3,108,370 UART: [art] Extend RT PCRs Done
3,108,798 UART: [art] Lock RT PCRs Done
3,110,376 UART: [art] Populate DV Done
3,118,797 UART: [fht] FMC Alias Private Key: 7
3,119,795 UART: [art] Derive CDI
3,120,075 UART: [art] Store in in slot 0x4
3,205,608 UART: [art] Derive Key Pair
3,205,968 UART: [art] Store priv key in slot 0x5
3,219,314 UART: [art] Derive Key Pair - Done
3,234,568 UART: [art] Signing Cert with AUTHO
3,235,048 UART: RITY.KEYID = 7
3,250,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,131 UART: [art] PUB.X = E8C52E5B366190771FA06B8A9668462D3B1B99BF992316AC074E05B80FE6ADFFAC25EB026D9016AAA63D0A0A57B51783
3,257,891 UART: [art] PUB.Y = E3179D7CBFF5909B3C690D739D6D384305BB06F3980CC36F7DC1B162781468943060B6A7B7A367525B678907EEBA44B9
3,264,824 UART: [art] SIG.R = 7E15B4BEDFAE68AAB9F5C9BC55B2836CCF391690201F3A67A9EB348903E3A64BF756BDD9BA9687F96B3D943ED9F7D263
3,271,609 UART: [art] SIG.S = 24110ADE92F3FAF396257093F8F6040B8E126D2A40F723B1D08A435F6E1B7732FFF4F089B3E770ABD3F52DD198936AD8
3,295,333 UART: Caliptra RT
3,295,586 UART: [state] CFI Enabled
3,403,887 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,223 UART: [rt]cmd =0x43455252, len=4
3,444,957 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,660 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,142 UART: [kat] SHA2-256
882,073 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,188 UART: [kat] ++
886,340 UART: [kat] sha1
890,586 UART: [kat] SHA2-256
892,524 UART: [kat] SHA2-384
895,191 UART: [kat] SHA2-512-ACC
897,092 UART: [kat] ECC-384
902,807 UART: [kat] HMAC-384Kdf
907,363 UART: [kat] LMS
1,475,559 UART: [kat] --
1,476,508 UART: [cold-reset] ++
1,476,944 UART: [fht] Storing FHT @ 0x50003400
1,479,735 UART: [idev] ++
1,479,903 UART: [idev] CDI.KEYID = 6
1,480,263 UART: [idev] SUBJECT.KEYID = 7
1,480,687 UART: [idev] UDS.KEYID = 0
1,481,032 ready_for_fw is high
1,481,032 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,419 UART: [idev] Erasing UDS.KEYID = 0
1,504,865 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,597 UART: [idev] --
1,514,802 UART: [ldev] ++
1,514,970 UART: [ldev] CDI.KEYID = 6
1,515,333 UART: [ldev] SUBJECT.KEYID = 5
1,515,759 UART: [ldev] AUTHORITY.KEYID = 7
1,516,222 UART: [ldev] FE.KEYID = 1
1,521,522 UART: [ldev] Erasing FE.KEYID = 1
1,547,037 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,115 UART: [ldev] --
1,586,388 UART: [fwproc] Waiting for Commands...
1,587,057 UART: [fwproc] Received command 0x46574c44
1,587,848 UART: [fwproc] Received Image of size 114332 bytes
2,884,810 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,984 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,336 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,237 >>> mbox cmd response: success
3,077,237 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,078,637 UART: [afmc] ++
3,078,805 UART: [afmc] CDI.KEYID = 6
3,079,167 UART: [afmc] SUBJECT.KEYID = 7
3,079,592 UART: [afmc] AUTHORITY.KEYID = 5
3,115,183 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,289 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,069 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,797 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,682 UART: [afmc] SIG.R = 1A743C3A7D904AB160CD61DC895A36FA36F447F58D4DDDA3052B0AD9776D66E7B60BFE7137FFC32B58F5ADDFF97E3916
3,149,394 UART: [afmc] SIG.S = CAC50B695CBE242FDD8B0AA6597D17EDA5AEF329775580D553F8608A51D5B147B9505EDF40F3AB8CC947D612826E0DFF
3,157,210 UART: [afmc] --
3,158,144 UART: [cold-reset] --
3,158,962 UART: [state] Locking Datavault
3,160,067 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,671 UART: [state] Locking ICCM
3,161,161 UART: [exit] Launching FMC @ 0x40000130
3,166,490 UART:
3,166,506 UART: Running Caliptra FMC ...
3,166,914 UART:
3,167,057 UART: [state] CFI Enabled
3,177,714 UART: [fht] FMC Alias Private Key: 7
3,285,295 UART: [art] Extend RT PCRs Done
3,285,723 UART: [art] Lock RT PCRs Done
3,287,743 UART: [art] Populate DV Done
3,296,000 UART: [fht] FMC Alias Private Key: 7
3,297,034 UART: [art] Derive CDI
3,297,314 UART: [art] Store in in slot 0x4
3,383,251 UART: [art] Derive Key Pair
3,383,611 UART: [art] Store priv key in slot 0x5
3,397,031 UART: [art] Derive Key Pair - Done
3,412,100 UART: [art] Signing Cert with AUTHO
3,412,580 UART: RITY.KEYID = 7
3,428,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,791 UART: [art] PUB.X = 3A6BB6B5804A67F40DE9EB621FD4C1B034AFEB1CEC88694FCCFF0969F47A982F60202C0B14AC6CB55C014EB683DA6261
3,435,567 UART: [art] PUB.Y = 8708EB0645296538DA799A3AFFD5FCE4B339A27D91FEEC781601CED70D854B8EA22FC89DE12427C2C34F3BC625D7F075
3,442,517 UART: [art] SIG.R = AE83C4DF0A890C1BBA292817E468932F349A0C2EA9328D8CDEA4790EC308411E1039B53BB1D01650364E72EE667FBAC0
3,449,280 UART: [art] SIG.S = E9B04FAF64491B46CF03544CC95986565FE985269C35E1E703BBC02FBD7505FAD95122DD80CB3B155B3D8F11565CBFE9
3,473,072 UART: Caliptra RT
3,473,417 UART: [state] CFI Enabled
3,581,360 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,644 UART: [rt]cmd =0x43455252, len=4
3,622,199 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,356 ready_for_fw is high
1,362,356 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,331 >>> mbox cmd response: success
2,927,331 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,989,807 UART:
2,989,823 UART: Running Caliptra FMC ...
2,990,231 UART:
2,990,374 UART: [state] CFI Enabled
3,001,249 UART: [fht] FMC Alias Private Key: 7
3,109,224 UART: [art] Extend RT PCRs Done
3,109,652 UART: [art] Lock RT PCRs Done
3,111,424 UART: [art] Populate DV Done
3,119,739 UART: [fht] FMC Alias Private Key: 7
3,120,915 UART: [art] Derive CDI
3,121,195 UART: [art] Store in in slot 0x4
3,206,914 UART: [art] Derive Key Pair
3,207,274 UART: [art] Store priv key in slot 0x5
3,220,076 UART: [art] Derive Key Pair - Done
3,234,878 UART: [art] Signing Cert with AUTHO
3,235,358 UART: RITY.KEYID = 7
3,250,856 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,621 UART: [art] PUB.X = BEAEC18237CF8913DEF26F724BCABC49D1115860C86EBAB59DC7E4648E8D3D56867A1D7FCDB0CFD75325932759A8B5D4
3,258,409 UART: [art] PUB.Y = CC2414D20D24F0CDA1F1FC7CAD7E60B9EAC0C48C3E3005E5DFC879DCAFAAE1CCA3E83DD9285F6AE285EDC769A085739E
3,265,385 UART: [art] SIG.R = 57E1D424BF6C9061DCD0AA43EA959442C5FFA9D5B223EA2A8939584BAA4AFF93D572BD9F69931B31BF9DE3B8F4284A2F
3,272,173 UART: [art] SIG.S = 1A0EA7C919F8D661651231DA4188D2DC617AE0570329326A7D24A0D1F2ECDC6B9154969379526AE8EE273CC2CD6379EF
3,295,670 UART: Caliptra RT
3,296,015 UART: [state] CFI Enabled
3,405,092 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,242 UART: [rt]cmd =0x43455252, len=4
3,446,234 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,733 UART: [state] WD Timer not started. Device not locked for debugging
87,904 UART: [kat] SHA2-256
893,554 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,679 UART: [kat] ++
897,831 UART: [kat] sha1
902,029 UART: [kat] SHA2-256
903,969 UART: [kat] SHA2-384
906,546 UART: [kat] SHA2-512-ACC
908,447 UART: [kat] ECC-384
917,894 UART: [kat] HMAC-384Kdf
922,626 UART: [kat] LMS
1,170,954 UART: [kat] --
1,171,927 UART: [cold-reset] ++
1,172,379 UART: [fht] FHT @ 0x50003400
1,175,016 UART: [idev] ++
1,175,184 UART: [idev] CDI.KEYID = 6
1,175,544 UART: [idev] SUBJECT.KEYID = 7
1,175,968 UART: [idev] UDS.KEYID = 0
1,176,313 ready_for_fw is high
1,176,313 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,946 UART: [idev] Erasing UDS.KEYID = 0
1,201,227 UART: [idev] Sha1 KeyId Algorithm
1,209,567 UART: [idev] --
1,210,487 UART: [ldev] ++
1,210,655 UART: [ldev] CDI.KEYID = 6
1,211,018 UART: [ldev] SUBJECT.KEYID = 5
1,211,444 UART: [ldev] AUTHORITY.KEYID = 7
1,211,907 UART: [ldev] FE.KEYID = 1
1,217,105 UART: [ldev] Erasing FE.KEYID = 1
1,243,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,601 UART: [ldev] --
1,282,996 UART: [fwproc] Wait for Commands...
1,283,572 UART: [fwproc] Recv command 0x46574c44
1,284,300 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,475 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,900 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,204 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,123 >>> mbox cmd response: success
2,775,123 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,776,381 UART: [afmc] ++
2,776,549 UART: [afmc] CDI.KEYID = 6
2,776,911 UART: [afmc] SUBJECT.KEYID = 7
2,777,336 UART: [afmc] AUTHORITY.KEYID = 5
2,813,337 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,862 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,610 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,338 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,223 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,847,933 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,855,745 UART: [afmc] --
2,856,813 UART: [cold-reset] --
2,857,695 UART: [state] Locking Datavault
2,858,888 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,492 UART: [state] Locking ICCM
2,860,132 UART: [exit] Launching FMC @ 0x40000130
2,865,461 UART:
2,865,477 UART: Running Caliptra FMC ...
2,865,885 UART:
2,865,939 UART: [state] CFI Enabled
2,876,098 UART: [fht] FMC Alias Private Key: 7
2,983,997 UART: [art] Extend RT PCRs Done
2,984,425 UART: [art] Lock RT PCRs Done
2,985,911 UART: [art] Populate DV Done
2,994,492 UART: [fht] FMC Alias Private Key: 7
2,995,556 UART: [art] Derive CDI
2,995,836 UART: [art] Store in in slot 0x4
3,081,743 UART: [art] Derive Key Pair
3,082,103 UART: [art] Store priv key in slot 0x5
3,095,263 UART: [art] Derive Key Pair - Done
3,109,951 UART: [art] Signing Cert with AUTHO
3,110,431 UART: RITY.KEYID = 7
3,125,469 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,234 UART: [art] PUB.X = EB12DE90B7381E24EF27855CDBEF23B4C780A45B926B70801CCDB89E1997B5E3FEBFC84A7272F4C14F2B431B302CC678
3,133,018 UART: [art] PUB.Y = 86CA1379F3C00E393B86DCA7742A0814A8D90E75FDCBB58B433F1C2F1F3D7A96E742BA28D3D5E594D1BAB35C97F6939B
3,139,973 UART: [art] SIG.R = 51B430F0A8E5873A7B851563F70BA5A3651E9689BF5EE1945AFED7372E37B3FDD7643A7F29AAB1BBDDD6C803ADBD9CAE
3,146,759 UART: [art] SIG.S = A92E1F863F6FA7A6ED415EEAFE560D507A166E96A3D6190C2A8CA63B356E69DFD8659CAB3597893D0558EE2F06B6B696
3,170,504 UART: Caliptra RT
3,170,757 UART: [state] CFI Enabled
3,278,249 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,467 UART: [rt]cmd =0x43455252, len=4
3,319,457 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,475 ready_for_fw is high
1,060,475 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,568 >>> mbox cmd response: success
2,625,568 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,687,576 UART:
2,687,592 UART: Running Caliptra FMC ...
2,688,000 UART:
2,688,054 UART: [state] CFI Enabled
2,698,249 UART: [fht] FMC Alias Private Key: 7
2,806,128 UART: [art] Extend RT PCRs Done
2,806,556 UART: [art] Lock RT PCRs Done
2,808,482 UART: [art] Populate DV Done
2,816,779 UART: [fht] FMC Alias Private Key: 7
2,817,887 UART: [art] Derive CDI
2,818,167 UART: [art] Store in in slot 0x4
2,903,558 UART: [art] Derive Key Pair
2,903,918 UART: [art] Store priv key in slot 0x5
2,917,004 UART: [art] Derive Key Pair - Done
2,932,311 UART: [art] Signing Cert with AUTHO
2,932,791 UART: RITY.KEYID = 7
2,948,169 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,934 UART: [art] PUB.X = 3194128EC24EA4807C6A09C30F6B7E76F905C779691939582B8B74C51805DB166C6A49499F64F48504526A0DF96C2F43
2,955,676 UART: [art] PUB.Y = 1E9E91A03226EF376D171B23712F962C3D3CEE0CEF5DD85F2B665FE7C3C3E58C29BFD7BD03B1DCC113771353ACD91901
2,962,631 UART: [art] SIG.R = DA743093490FD469E8EC0B40115273B811E29CB376C6482E0389C55913A040673BFFFEF7FB724021DCB4F7A27627FEA2
2,969,394 UART: [art] SIG.S = 69B7F5E671798D26D4AA04DD6285FF6BC6E43740D37EC4D9D42E8963631C1CFB86FAF69A60C24C40CAA3A83F4F32489D
2,993,476 UART: Caliptra RT
2,993,729 UART: [state] CFI Enabled
3,101,653 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,197 UART: [rt]cmd =0x43455252, len=4
3,143,063 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,113 UART: [state] LifecycleState = Unprovisioned
86,768 UART: [state] DebugLocked = No
87,318 UART: [state] WD Timer not started. Device not locked for debugging
88,443 UART: [kat] SHA2-256
894,093 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,218 UART: [kat] ++
898,370 UART: [kat] sha1
902,812 UART: [kat] SHA2-256
904,752 UART: [kat] SHA2-384
907,321 UART: [kat] SHA2-512-ACC
909,222 UART: [kat] ECC-384
918,819 UART: [kat] HMAC-384Kdf
923,525 UART: [kat] LMS
1,171,853 UART: [kat] --
1,173,030 UART: [cold-reset] ++
1,173,592 UART: [fht] FHT @ 0x50003400
1,176,239 UART: [idev] ++
1,176,407 UART: [idev] CDI.KEYID = 6
1,176,767 UART: [idev] SUBJECT.KEYID = 7
1,177,191 UART: [idev] UDS.KEYID = 0
1,177,536 ready_for_fw is high
1,177,536 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,653 UART: [idev] Erasing UDS.KEYID = 0
1,202,662 UART: [idev] Sha1 KeyId Algorithm
1,211,210 UART: [idev] --
1,212,302 UART: [ldev] ++
1,212,470 UART: [ldev] CDI.KEYID = 6
1,212,833 UART: [ldev] SUBJECT.KEYID = 5
1,213,259 UART: [ldev] AUTHORITY.KEYID = 7
1,213,722 UART: [ldev] FE.KEYID = 1
1,219,146 UART: [ldev] Erasing FE.KEYID = 1
1,245,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,626 UART: [ldev] --
1,285,103 UART: [fwproc] Wait for Commands...
1,285,687 UART: [fwproc] Recv command 0x46574c44
1,286,415 UART: [fwproc] Recv'd Img size: 114332 bytes
2,585,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,874 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,178 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,777,877 >>> mbox cmd response: success
2,777,877 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,779,251 UART: [afmc] ++
2,779,419 UART: [afmc] CDI.KEYID = 6
2,779,781 UART: [afmc] SUBJECT.KEYID = 7
2,780,206 UART: [afmc] AUTHORITY.KEYID = 5
2,814,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,894 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,622 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,507 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,849,217 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,857,111 UART: [afmc] --
2,858,219 UART: [cold-reset] --
2,859,083 UART: [state] Locking Datavault
2,860,536 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,140 UART: [state] Locking ICCM
2,861,696 UART: [exit] Launching FMC @ 0x40000130
2,867,025 UART:
2,867,041 UART: Running Caliptra FMC ...
2,867,449 UART:
2,867,592 UART: [state] CFI Enabled
2,878,369 UART: [fht] FMC Alias Private Key: 7
2,986,572 UART: [art] Extend RT PCRs Done
2,987,000 UART: [art] Lock RT PCRs Done
2,988,238 UART: [art] Populate DV Done
2,996,599 UART: [fht] FMC Alias Private Key: 7
2,997,561 UART: [art] Derive CDI
2,997,841 UART: [art] Store in in slot 0x4
3,083,756 UART: [art] Derive Key Pair
3,084,116 UART: [art] Store priv key in slot 0x5
3,097,342 UART: [art] Derive Key Pair - Done
3,112,300 UART: [art] Signing Cert with AUTHO
3,112,780 UART: RITY.KEYID = 7
3,127,588 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,353 UART: [art] PUB.X = F17B0C4FA6818D3CBBD81321924799BD19B2441DF3980CD385FBF0A457F1FF45046AC6912658D833A4F01742D285DB9D
3,135,118 UART: [art] PUB.Y = E4BC311F1C53CD76A387362D296381FBFA99EBA31F92545ABDA7EBD64844B4307AEEFEC923FF1979C6F381000F7CE413
3,142,057 UART: [art] SIG.R = 72D66CA636459D400CF6A6A52C06F80C4BC63ADC941A5CFF4275B85642E0F58CEFEF54586FBF0190EF4D5297CB86C764
3,148,827 UART: [art] SIG.S = 330ABD08A770E004DAEF5C0C9821C4B493563D82FA80E1BCC581B1DA682C37C159F1737B2BFE150DCAA2E5DEC7EDFF39
3,172,145 UART: Caliptra RT
3,172,490 UART: [state] CFI Enabled
3,281,058 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,478 UART: [rt]cmd =0x43455252, len=4
3,322,352 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,710 ready_for_fw is high
1,060,710 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,423 >>> mbox cmd response: success
2,628,423 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,691,063 UART:
2,691,079 UART: Running Caliptra FMC ...
2,691,487 UART:
2,691,630 UART: [state] CFI Enabled
2,702,241 UART: [fht] FMC Alias Private Key: 7
2,810,166 UART: [art] Extend RT PCRs Done
2,810,594 UART: [art] Lock RT PCRs Done
2,812,294 UART: [art] Populate DV Done
2,820,305 UART: [fht] FMC Alias Private Key: 7
2,821,341 UART: [art] Derive CDI
2,821,621 UART: [art] Store in in slot 0x4
2,907,172 UART: [art] Derive Key Pair
2,907,532 UART: [art] Store priv key in slot 0x5
2,921,674 UART: [art] Derive Key Pair - Done
2,936,859 UART: [art] Signing Cert with AUTHO
2,937,339 UART: RITY.KEYID = 7
2,952,643 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,408 UART: [art] PUB.X = 0BC463698407EF59A7BF9DE8BAD6A4B4149E4C3773FAAAF6DD9794713C15537DF225F0BCF8FEBBF75CCD83A40BEC371E
2,960,193 UART: [art] PUB.Y = 62D2A911E51DB42C3118906C3FE8E25670668543BCEA0F9F0B481FCDA108A1FEACF1BF0CB7DBABC16518E3A3A9FC4BDC
2,967,157 UART: [art] SIG.R = 4035529FA95AAAD5D8458461D4AF1264C1EF2A622A706042E9D3CF9A9A0C23BF7FCD2163D80139B88D394EE4C3AB6FA2
2,973,933 UART: [art] SIG.S = 9B2D678FE5D5D4ECA8288EDE6086058F903B6C7E6694C5BFBF796E988A53CF70B8B8EE6A05E5CEB3643AB7BED7CA7A53
2,997,556 UART: Caliptra RT
2,997,901 UART: [state] CFI Enabled
3,105,637 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,401 UART: [rt]cmd =0x43455252, len=4
3,147,245 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,207 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [kat] SHA2-256
890,980 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,109 UART: [kat] ++
895,261 UART: [kat] sha1
899,641 UART: [kat] SHA2-256
901,581 UART: [kat] SHA2-384
904,252 UART: [kat] SHA2-512-ACC
906,153 UART: [kat] ECC-384
915,990 UART: [kat] HMAC-384Kdf
920,578 UART: [kat] LMS
1,168,890 UART: [kat] --
1,169,917 UART: [cold-reset] ++
1,170,495 UART: [fht] FHT @ 0x50003400
1,173,201 UART: [idev] ++
1,173,369 UART: [idev] CDI.KEYID = 6
1,173,730 UART: [idev] SUBJECT.KEYID = 7
1,174,155 UART: [idev] UDS.KEYID = 0
1,174,501 ready_for_fw is high
1,174,501 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,657 UART: [idev] Erasing UDS.KEYID = 0
1,199,397 UART: [idev] Sha1 KeyId Algorithm
1,208,191 UART: [idev] --
1,209,406 UART: [ldev] ++
1,209,574 UART: [ldev] CDI.KEYID = 6
1,209,938 UART: [ldev] SUBJECT.KEYID = 5
1,210,365 UART: [ldev] AUTHORITY.KEYID = 7
1,210,828 UART: [ldev] FE.KEYID = 1
1,216,054 UART: [ldev] Erasing FE.KEYID = 1
1,242,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,558 UART: [ldev] --
1,281,840 UART: [fwproc] Wait for Commands...
1,282,605 UART: [fwproc] Recv command 0x46574c44
1,283,338 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,190 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,499 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,221 >>> mbox cmd response: success
2,772,221 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,773,414 UART: [afmc] ++
2,773,582 UART: [afmc] CDI.KEYID = 6
2,773,945 UART: [afmc] SUBJECT.KEYID = 7
2,774,371 UART: [afmc] AUTHORITY.KEYID = 5
2,810,022 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,628 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,379 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,108 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,991 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,844,701 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,852,502 UART: [afmc] --
2,853,522 UART: [cold-reset] --
2,854,384 UART: [state] Locking Datavault
2,855,617 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,221 UART: [state] Locking ICCM
2,856,839 UART: [exit] Launching FMC @ 0x40000130
2,862,168 UART:
2,862,184 UART: Running Caliptra FMC ...
2,862,592 UART:
2,862,646 UART: [state] CFI Enabled
2,873,309 UART: [fht] FMC Alias Private Key: 7
2,981,548 UART: [art] Extend RT PCRs Done
2,981,976 UART: [art] Lock RT PCRs Done
2,983,434 UART: [art] Populate DV Done
2,991,477 UART: [fht] FMC Alias Private Key: 7
2,992,471 UART: [art] Derive CDI
2,992,751 UART: [art] Store in in slot 0x4
3,078,400 UART: [art] Derive Key Pair
3,078,760 UART: [art] Store priv key in slot 0x5
3,092,208 UART: [art] Derive Key Pair - Done
3,107,439 UART: [art] Signing Cert with AUTHO
3,107,919 UART: RITY.KEYID = 7
3,123,117 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,882 UART: [art] PUB.X = E7B23002FC10AFB2B3EC8474A650849949BDA75AA7D5326EEFCFD4578DF9A5FEBE8C129171A1B8F2AD3C2816D046BF1F
3,130,669 UART: [art] PUB.Y = 109E140AC79D2737FD0D1F65D5249513186DC66547E18489C531BAD49119EFEC47F2BD5C57B5B53B5D78B66BA5056F21
3,137,612 UART: [art] SIG.R = 3FEB1E0642066AB28142FA63BAC5DF893B524A90509B99BEBE8935A3DD43DA1C514D7E79F58CEC2499BD1970F8B54867
3,144,386 UART: [art] SIG.S = D05501C6C76E68C3F84F0EC5DE9BC36454A92F32C00586460BAE1AA429311B7DF5D5975435D351CCEB59FF96EEE692CD
3,168,123 UART: Caliptra RT
3,168,376 UART: [state] CFI Enabled
3,276,534 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,918 UART: [rt]cmd =0x43455252, len=4
3,317,902 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,258 ready_for_fw is high
1,056,258 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,689 >>> mbox cmd response: success
2,622,689 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,684,909 UART:
2,684,925 UART: Running Caliptra FMC ...
2,685,333 UART:
2,685,387 UART: [state] CFI Enabled
2,695,572 UART: [fht] FMC Alias Private Key: 7
2,804,039 UART: [art] Extend RT PCRs Done
2,804,467 UART: [art] Lock RT PCRs Done
2,805,865 UART: [art] Populate DV Done
2,814,038 UART: [fht] FMC Alias Private Key: 7
2,815,090 UART: [art] Derive CDI
2,815,370 UART: [art] Store in in slot 0x4
2,901,245 UART: [art] Derive Key Pair
2,901,605 UART: [art] Store priv key in slot 0x5
2,914,769 UART: [art] Derive Key Pair - Done
2,929,703 UART: [art] Signing Cert with AUTHO
2,930,183 UART: RITY.KEYID = 7
2,945,403 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,168 UART: [art] PUB.X = D8D5F2EEFC4AF47C15D6753D9CCF93219ACDA97B3EFB207292759890BB3A9CECF184005136847F178E77DC57E85C3D68
2,952,928 UART: [art] PUB.Y = 26A1DAD277136EA29FFF30E1F7B52F7C6A9B482E40F8013F3FBCF9ED3337C7C7B35B0CFE391F7EAF4DABACC5ADA39B9A
2,959,904 UART: [art] SIG.R = 7F390E6B1B766454B25FEAFC8534E456D21931A884871A489950F2F061E7FC40C97BE4DCA3F9E7437AAD871750423E1B
2,966,673 UART: [art] SIG.S = ACDCB1439DD12CA830CD901542CD40483E1E3481CBEF4874977B0014439D2482B5A498F3B95CFC1590C29BA4813A0841
2,990,771 UART: Caliptra RT
2,991,024 UART: [state] CFI Enabled
3,099,898 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,346 UART: [rt]cmd =0x43455252, len=4
3,141,068 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
88,035 UART: [kat] SHA2-256
891,585 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,714 UART: [kat] ++
895,866 UART: [kat] sha1
900,104 UART: [kat] SHA2-256
902,044 UART: [kat] SHA2-384
904,765 UART: [kat] SHA2-512-ACC
906,666 UART: [kat] ECC-384
916,503 UART: [kat] HMAC-384Kdf
921,315 UART: [kat] LMS
1,169,627 UART: [kat] --
1,170,616 UART: [cold-reset] ++
1,171,030 UART: [fht] FHT @ 0x50003400
1,173,804 UART: [idev] ++
1,173,972 UART: [idev] CDI.KEYID = 6
1,174,333 UART: [idev] SUBJECT.KEYID = 7
1,174,758 UART: [idev] UDS.KEYID = 0
1,175,104 ready_for_fw is high
1,175,104 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,498 UART: [idev] Erasing UDS.KEYID = 0
1,199,298 UART: [idev] Sha1 KeyId Algorithm
1,207,938 UART: [idev] --
1,208,875 UART: [ldev] ++
1,209,043 UART: [ldev] CDI.KEYID = 6
1,209,407 UART: [ldev] SUBJECT.KEYID = 5
1,209,834 UART: [ldev] AUTHORITY.KEYID = 7
1,210,297 UART: [ldev] FE.KEYID = 1
1,215,717 UART: [ldev] Erasing FE.KEYID = 1
1,242,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,157 UART: [ldev] --
1,281,645 UART: [fwproc] Wait for Commands...
1,282,412 UART: [fwproc] Recv command 0x46574c44
1,283,145 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,051 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,360 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,298 >>> mbox cmd response: success
2,773,298 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,774,685 UART: [afmc] ++
2,774,853 UART: [afmc] CDI.KEYID = 6
2,775,216 UART: [afmc] SUBJECT.KEYID = 7
2,775,642 UART: [afmc] AUTHORITY.KEYID = 5
2,811,225 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,631 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,382 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,111 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,994 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,845,704 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,853,647 UART: [afmc] --
2,854,771 UART: [cold-reset] --
2,855,509 UART: [state] Locking Datavault
2,856,614 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,218 UART: [state] Locking ICCM
2,857,700 UART: [exit] Launching FMC @ 0x40000130
2,863,029 UART:
2,863,045 UART: Running Caliptra FMC ...
2,863,453 UART:
2,863,596 UART: [state] CFI Enabled
2,874,619 UART: [fht] FMC Alias Private Key: 7
2,982,208 UART: [art] Extend RT PCRs Done
2,982,636 UART: [art] Lock RT PCRs Done
2,984,452 UART: [art] Populate DV Done
2,992,725 UART: [fht] FMC Alias Private Key: 7
2,993,803 UART: [art] Derive CDI
2,994,083 UART: [art] Store in in slot 0x4
3,080,048 UART: [art] Derive Key Pair
3,080,408 UART: [art] Store priv key in slot 0x5
3,093,924 UART: [art] Derive Key Pair - Done
3,109,016 UART: [art] Signing Cert with AUTHO
3,109,496 UART: RITY.KEYID = 7
3,124,964 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,729 UART: [art] PUB.X = 498B9F89FC44356B830A22D80D80A1EFBF099736EE4D32728318581E8EDF3EE4F64695496502A5C7BD80CC80D3BF555C
3,132,491 UART: [art] PUB.Y = 9FF85CDF0D0A63433AB358FC2F4F5E6CE7E6AF470450999173FC88D9084626DC0C232BAF7D6DDF22E16F98E6AA66F5FC
3,139,444 UART: [art] SIG.R = 348D2DB81480877E3F0838806BADBA759762CF8CFC752786E87421FC5134E772542AEB80CD2FEB5699468FA113FE296A
3,146,213 UART: [art] SIG.S = D840090C49B2898642FDCEA76769DF710509C02A2E875A5203703ABDCDEB954E4E06EE1C883E6ACE1A47D7ADBE9C56B1
3,170,320 UART: Caliptra RT
3,170,665 UART: [state] CFI Enabled
3,278,143 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,483 UART: [rt]cmd =0x43455252, len=4
3,319,429 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,169 ready_for_fw is high
1,056,169 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,214 >>> mbox cmd response: success
2,625,214 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,687,520 UART:
2,687,536 UART: Running Caliptra FMC ...
2,687,944 UART:
2,688,087 UART: [state] CFI Enabled
2,698,764 UART: [fht] FMC Alias Private Key: 7
2,806,509 UART: [art] Extend RT PCRs Done
2,806,937 UART: [art] Lock RT PCRs Done
2,808,581 UART: [art] Populate DV Done
2,816,936 UART: [fht] FMC Alias Private Key: 7
2,817,888 UART: [art] Derive CDI
2,818,168 UART: [art] Store in in slot 0x4
2,904,017 UART: [art] Derive Key Pair
2,904,377 UART: [art] Store priv key in slot 0x5
2,917,691 UART: [art] Derive Key Pair - Done
2,932,743 UART: [art] Signing Cert with AUTHO
2,933,223 UART: RITY.KEYID = 7
2,948,329 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,094 UART: [art] PUB.X = 12C47A736E150886530C013D6562D132EEB895F687C1EFB86ECA5C222039A0F433E76C0A502240954C4BC3CBFCAD79B7
2,955,856 UART: [art] PUB.Y = 91FFC9E691EBE9FD782EAC6F42E9D64DE909876F829EE3DA2BB9099D9B18DA022EB1C625162D48C3D20919BB6D08B427
2,962,805 UART: [art] SIG.R = 5F667A93B032E48E0DC4DC4BAFF943717C55EA90DE1005971E670A068C244C4660D4FC109C1FF30C0B07460E16196BA2
2,969,555 UART: [art] SIG.S = 32A694F780289FA574EA10A92340E59A3D253CC3366905C8FC31EE184589B8F137B7A0D08A900D6990B013512778FCD1
2,993,492 UART: Caliptra RT
2,993,837 UART: [state] CFI Enabled
3,102,041 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,805 UART: [rt]cmd =0x43455252, len=4
3,143,573 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,217 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,917 UART: [kat] SHA2-256
881,848 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,963 UART: [kat] ++
886,115 UART: [kat] sha1
890,453 UART: [kat] SHA2-256
892,391 UART: [kat] SHA2-384
894,986 UART: [kat] SHA2-512-ACC
896,887 UART: [kat] ECC-384
902,652 UART: [kat] HMAC-384Kdf
907,108 UART: [kat] LMS
1,475,304 UART: [kat] --
1,476,097 UART: [cold-reset] ++
1,476,449 UART: [fht] Storing FHT @ 0x50003400
1,479,366 UART: [idev] ++
1,479,534 UART: [idev] CDI.KEYID = 6
1,479,894 UART: [idev] SUBJECT.KEYID = 7
1,480,318 UART: [idev] UDS.KEYID = 0
1,480,663 ready_for_fw is high
1,480,663 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,234 UART: [idev] Erasing UDS.KEYID = 0
1,505,178 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,644 UART: [idev] --
1,514,595 UART: [ldev] ++
1,514,763 UART: [ldev] CDI.KEYID = 6
1,515,126 UART: [ldev] SUBJECT.KEYID = 5
1,515,552 UART: [ldev] AUTHORITY.KEYID = 7
1,516,015 UART: [ldev] FE.KEYID = 1
1,521,133 UART: [ldev] Erasing FE.KEYID = 1
1,546,304 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,468 UART: [ldev] --
1,585,815 UART: [fwproc] Waiting for Commands...
1,586,594 UART: [fwproc] Received command 0x46574c44
1,587,385 UART: [fwproc] Received Image of size 114332 bytes
2,883,921 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,407 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,759 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,596 >>> mbox cmd response: success
3,076,596 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,077,740 UART: [afmc] ++
3,077,908 UART: [afmc] CDI.KEYID = 6
3,078,270 UART: [afmc] SUBJECT.KEYID = 7
3,078,695 UART: [afmc] AUTHORITY.KEYID = 5
3,114,440 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,472 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,252 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,980 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,865 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,555 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,356 UART: [afmc] --
3,157,460 UART: [cold-reset] --
3,158,152 UART: [state] Locking Datavault
3,159,327 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,931 UART: [state] Locking ICCM
3,160,403 UART: [exit] Launching FMC @ 0x40000130
3,165,732 UART:
3,165,748 UART: Running Caliptra FMC ...
3,166,156 UART:
3,166,210 UART: [state] CFI Enabled
3,177,051 UART: [fht] FMC Alias Private Key: 7
3,285,408 UART: [art] Extend RT PCRs Done
3,285,836 UART: [art] Lock RT PCRs Done
3,287,424 UART: [art] Populate DV Done
3,295,537 UART: [fht] FMC Alias Private Key: 7
3,296,703 UART: [art] Derive CDI
3,296,983 UART: [art] Store in in slot 0x4
3,382,676 UART: [art] Derive Key Pair
3,383,036 UART: [art] Store priv key in slot 0x5
3,395,862 UART: [art] Derive Key Pair - Done
3,411,058 UART: [art] Signing Cert with AUTHO
3,411,538 UART: RITY.KEYID = 7
3,426,946 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,711 UART: [art] PUB.X = 0E06A5EB8ABCEB1FFEBCE64E176E316E2B34580727D13649D8BB7D8B97B4EF4546AD2AA2B70EFF4C609E54009BC30A32
3,434,464 UART: [art] PUB.Y = D6AAE35B60EF39DDEDB75955D29678B8FA82493ABCE8A911BCA8D0ABB42F94A2D45EA6962326E22CFE718F7B52328D7A
3,441,434 UART: [art] SIG.R = D7E0958F12A20C315C0FF2F8B282889AEC0B2A295BEA4261B1EE8D833881C4E83DC388E5C501B58C9ADEF26D14A66A46
3,448,204 UART: [art] SIG.S = B4AADB979FBD1D4B6C04E740FB9C9C860251F507A11220576ABDA55061D84DBD90ECDC05AC0FCBB6FF2ABC01B6520A3C
3,471,708 UART: Caliptra RT
3,471,961 UART: [state] CFI Enabled
3,580,311 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,849 UART: [rt]cmd =0x4453424c, len=4
3,624,708 >>> mbox cmd response data (8 bytes)
3,624,709 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,475 UART:
3,625,491 UART: Running Caliptra ROM ...
3,625,899 UART:
3,625,953 UART: [state] CFI Enabled
3,628,669 UART: [state] LifecycleState = Unprovisioned
3,629,324 UART: [state] DebugLocked = No
3,629,966 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,631,503 UART: [kat] SHA2-256
4,425,434 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,429,549 UART: [kat] ++
4,429,701 UART: [kat] sha1
4,433,923 UART: [kat] SHA2-256
4,435,861 UART: [kat] SHA2-384
4,438,588 UART: [kat] SHA2-512-ACC
4,440,488 UART: [kat] ECC-384
4,446,359 UART: [kat] HMAC-384Kdf
4,450,873 UART: [kat] LMS
5,019,069 UART: [kat] --
5,020,108 UART: [update-reset] ++
6,354,072 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,355,350 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,505,226 >>> mbox cmd response: success
6,505,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,505,347 UART: [update-reset] Copying MAN_2 To MAN_1
6,513,361 UART: [update-reset Success] --
6,514,252 UART: [state] Locking Datavault
6,515,032 UART: [state] Locking PCR0, PCR1 and PCR31
6,515,636 UART: [state] Locking ICCM
6,516,060 UART: [exit] Launching FMC @ 0x40000130
6,521,389 UART:
6,521,405 UART: Running Caliptra FMC ...
6,521,813 UART:
6,521,867 UART: [state] CFI Enabled
6,610,650 UART: [art] Extend RT PCRs Done
6,611,078 UART: [art] Lock RT PCRs Done
6,612,521 UART: [art] Populate DV Done
6,620,726 UART: [fht] FMC Alias Private Key: 7
6,621,790 UART: [art] Derive CDI
6,622,070 UART: [art] Store in in slot 0x4
6,707,463 UART: [art] Derive Key Pair
6,707,823 UART: [art] Store priv key in slot 0x5
6,721,131 UART: [art] Derive Key Pair - Done
6,735,896 UART: [art] Signing Cert with AUTHO
6,736,376 UART: RITY.KEYID = 7
6,751,628 UART: [art] Erasing AUTHORITY.KEYID = 7
6,752,393 UART: [art] PUB.X = AC4920EA27DD4E973272E096EBAAA74C2417301A02FCAD5ABACB20A946D7C1D24AB36A7D2347E68A8A2E8853A880C3EC
6,759,178 UART: [art] PUB.Y = 781CBD7076F2E4A22FF56291C6F27E7E6BF20695A753146AD82BFA3F1FE38270281E00B258F7A9D4334979CC15824585
6,766,101 UART: [art] SIG.R = CEB6549115C464B73FA94386D64F31FE1E159E30D11FB676299CB33A63127F08C5CFA74A872AE05CD69685773FB95088
6,772,868 UART: [art] SIG.S = 34E4CEE08B60420D821E49241E10C9A6677444C99203D50E8A008326738FBAB99190C714B3160EF0D004D1883AA78522
6,797,172 UART: Caliptra RT
6,797,425 UART: [state] CFI Enabled
7,091,064 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,121,315 UART: [rt]cmd =0x494e464f, len=4
7,125,032 >>> mbox cmd response data (312 bytes)
7,125,033 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,154,130 UART: [rt]cmd =0x43455252, len=4
7,164,874 >>> mbox cmd response data (783 bytes)
7,164,875 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,194,912 UART: [rt]cmd =0x44504543, len=92
7,379,602 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,957 ready_for_fw is high
1,362,957 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,714 >>> mbox cmd response: success
2,927,714 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,989,444 UART:
2,989,460 UART: Running Caliptra FMC ...
2,989,868 UART:
2,989,922 UART: [state] CFI Enabled
3,000,101 UART: [fht] FMC Alias Private Key: 7
3,108,066 UART: [art] Extend RT PCRs Done
3,108,494 UART: [art] Lock RT PCRs Done
3,109,934 UART: [art] Populate DV Done
3,118,121 UART: [fht] FMC Alias Private Key: 7
3,119,221 UART: [art] Derive CDI
3,119,501 UART: [art] Store in in slot 0x4
3,204,682 UART: [art] Derive Key Pair
3,205,042 UART: [art] Store priv key in slot 0x5
3,218,810 UART: [art] Derive Key Pair - Done
3,233,745 UART: [art] Signing Cert with AUTHO
3,234,225 UART: RITY.KEYID = 7
3,249,649 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,414 UART: [art] PUB.X = 9A13DCCF8D2CA9212FB22522C32DCF4AD98B9067206C6F9173469009DBC2C42E44B8338BA9FC539ED73FD6D2194AB10D
3,257,190 UART: [art] PUB.Y = 8A17BCE83032F191AAD33E6923314BC1FCE474D79D0F2FEA73CC9B9078AEA97BFA69D2CBEDDCE2B0D912544D59E191DD
3,264,161 UART: [art] SIG.R = AE163624B19F69CA82304C6D9FB8EC2A5FA7C1E3FBDA75BF780C5581D5C242A7F92A0B20DEFA5A290C47CDBE28975A6B
3,270,944 UART: [art] SIG.S = 147F42E0244D2D0E066F07034CB371564D41009855979116E32BB864FC0989604D709086D623522472F25E4980E88303
3,294,835 UART: Caliptra RT
3,295,088 UART: [state] CFI Enabled
3,403,311 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,903 UART: [rt]cmd =0x4453424c, len=4
3,447,340 >>> mbox cmd response data (8 bytes)
3,447,341 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,209,236 >>> mbox cmd response: success
6,209,236 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,222,465 UART:
6,222,481 UART: Running Caliptra FMC ...
6,222,889 UART:
6,222,943 UART: [state] CFI Enabled
6,312,564 UART: [art] Extend RT PCRs Done
6,312,992 UART: [art] Lock RT PCRs Done
6,314,161 UART: [art] Populate DV Done
6,322,662 UART: [fht] FMC Alias Private Key: 7
6,323,758 UART: [art] Derive CDI
6,324,038 UART: [art] Store in in slot 0x4
6,409,251 UART: [art] Derive Key Pair
6,409,611 UART: [art] Store priv key in slot 0x5
6,422,801 UART: [art] Derive Key Pair - Done
6,437,383 UART: [art] Signing Cert with AUTHO
6,437,863 UART: RITY.KEYID = 7
6,453,103 UART: [art] Erasing AUTHORITY.KEYID = 7
6,453,868 UART: [art] PUB.X = 6AE7C98825B2FDEF706A00C2E266834AC68BB7A1E3A106AD0859DD976054C38D2DADC7FF7146C9785BBFCF37C69CB451
6,460,626 UART: [art] PUB.Y = 269047E2A66A28B83BF1D154979D2273637C95ABAC00D5007FF1C2AA063092693C760EACDE11FDA29938B97068DD6E23
6,467,528 UART: [art] SIG.R = 8E88B3C8A64E16DB79AE995A56A3E965726DF6FE9A23DCED9ABD83C5E8DA1277C06624BF166B04C1E432B5D273380897
6,474,302 UART: [art] SIG.S = 3CA6C4DB50ED536658F466C585CCAAC13DB02A70D84F462000E3A200E4B0BFB6AEC9AEADF8BEC6D715AE631B5ECDCB34
6,498,567 UART: Caliptra RT
6,498,820 UART: [state] CFI Enabled
6,793,303 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,823,434 UART: [rt]cmd =0x494e464f, len=4
6,826,993 >>> mbox cmd response data (312 bytes)
6,826,994 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,856,177 UART: [rt]cmd =0x43455252, len=4
6,866,993 >>> mbox cmd response data (783 bytes)
6,866,994 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,896,901 UART: [rt]cmd =0x44504543, len=92
7,080,518 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,835 UART: [state] LifecycleState = Unprovisioned
86,490 UART: [state] DebugLocked = No
87,216 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,726 UART: [kat] SHA2-256
882,657 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,772 UART: [kat] ++
886,924 UART: [kat] sha1
891,358 UART: [kat] SHA2-256
893,296 UART: [kat] SHA2-384
896,229 UART: [kat] SHA2-512-ACC
898,130 UART: [kat] ECC-384
903,813 UART: [kat] HMAC-384Kdf
908,517 UART: [kat] LMS
1,476,713 UART: [kat] --
1,477,964 UART: [cold-reset] ++
1,478,316 UART: [fht] Storing FHT @ 0x50003400
1,481,131 UART: [idev] ++
1,481,299 UART: [idev] CDI.KEYID = 6
1,481,659 UART: [idev] SUBJECT.KEYID = 7
1,482,083 UART: [idev] UDS.KEYID = 0
1,482,428 ready_for_fw is high
1,482,428 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,490,179 UART: [idev] Erasing UDS.KEYID = 0
1,506,819 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,331 UART: [idev] --
1,516,202 UART: [ldev] ++
1,516,370 UART: [ldev] CDI.KEYID = 6
1,516,733 UART: [ldev] SUBJECT.KEYID = 5
1,517,159 UART: [ldev] AUTHORITY.KEYID = 7
1,517,622 UART: [ldev] FE.KEYID = 1
1,522,746 UART: [ldev] Erasing FE.KEYID = 1
1,547,721 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,943 UART: [ldev] --
1,587,340 UART: [fwproc] Waiting for Commands...
1,588,003 UART: [fwproc] Received command 0x46574c44
1,588,794 UART: [fwproc] Received Image of size 114332 bytes
2,886,234 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,700 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,052 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,029 >>> mbox cmd response: success
3,079,029 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,080,203 UART: [afmc] ++
3,080,371 UART: [afmc] CDI.KEYID = 6
3,080,733 UART: [afmc] SUBJECT.KEYID = 7
3,081,158 UART: [afmc] AUTHORITY.KEYID = 5
3,116,771 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,771 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,279 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,164 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,854 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,679 UART: [afmc] --
3,159,615 UART: [cold-reset] --
3,160,323 UART: [state] Locking Datavault
3,161,712 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,316 UART: [state] Locking ICCM
3,162,988 UART: [exit] Launching FMC @ 0x40000130
3,168,317 UART:
3,168,333 UART: Running Caliptra FMC ...
3,168,741 UART:
3,168,884 UART: [state] CFI Enabled
3,179,313 UART: [fht] FMC Alias Private Key: 7
3,287,912 UART: [art] Extend RT PCRs Done
3,288,340 UART: [art] Lock RT PCRs Done
3,289,448 UART: [art] Populate DV Done
3,297,395 UART: [fht] FMC Alias Private Key: 7
3,298,371 UART: [art] Derive CDI
3,298,651 UART: [art] Store in in slot 0x4
3,384,388 UART: [art] Derive Key Pair
3,384,748 UART: [art] Store priv key in slot 0x5
3,398,510 UART: [art] Derive Key Pair - Done
3,413,506 UART: [art] Signing Cert with AUTHO
3,413,986 UART: RITY.KEYID = 7
3,429,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,419 UART: [art] PUB.X = 25208E7C99C4B27E5540ECAD521853B71BEDAAE14CC7EC7D7CE6315D26406C45CBDD0B0905867F7495D7D9EB8964F90C
3,437,189 UART: [art] PUB.Y = 2045FDE957F27663468F76CEC76C7035D3EEDF99790E5A7285DC6A38F865585E32BEB63A6A1D7D549CC5FBB154060240
3,444,134 UART: [art] SIG.R = 4A09AEB1991BEF39F8E4CB3FAAE4EFE8C6E8CBBCE96476C6F959C769918E57E06A8D699F7800CBA0FDB725069F6F00B8
3,450,876 UART: [art] SIG.S = 642523E12C0C21EB8783620E12FEA07EC9B03E8CA3416794056FD200129DBE574DFC64596474A9AE07DDCCC1C86C3BD4
3,473,879 UART: Caliptra RT
3,474,224 UART: [state] CFI Enabled
3,583,986 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,754 UART: [rt]cmd =0x4453424c, len=4
3,628,885 >>> mbox cmd response data (8 bytes)
3,628,886 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,632 UART:
3,629,648 UART: Running Caliptra ROM ...
3,630,056 UART:
3,630,197 UART: [state] CFI Enabled
3,633,219 UART: [state] LifecycleState = Unprovisioned
3,633,874 UART: [state] DebugLocked = No
3,634,410 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,636,107 UART: [kat] SHA2-256
4,430,038 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,434,153 UART: [kat] ++
4,434,305 UART: [kat] sha1
4,438,629 UART: [kat] SHA2-256
4,440,567 UART: [kat] SHA2-384
4,443,400 UART: [kat] SHA2-512-ACC
4,445,300 UART: [kat] ECC-384
4,450,975 UART: [kat] HMAC-384Kdf
4,455,597 UART: [kat] LMS
5,023,793 UART: [kat] --
5,024,616 UART: [update-reset] ++
6,360,216 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,361,332 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,511,208 >>> mbox cmd response: success
6,511,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,511,425 UART: [update-reset] Copying MAN_2 To MAN_1
6,519,439 UART: [update-reset Success] --
6,520,326 UART: [state] Locking Datavault
6,520,900 UART: [state] Locking PCR0, PCR1 and PCR31
6,521,504 UART: [state] Locking ICCM
6,522,008 UART: [exit] Launching FMC @ 0x40000130
6,527,337 UART:
6,527,353 UART: Running Caliptra FMC ...
6,527,761 UART:
6,527,904 UART: [state] CFI Enabled
6,616,927 UART: [art] Extend RT PCRs Done
6,617,355 UART: [art] Lock RT PCRs Done
6,618,550 UART: [art] Populate DV Done
6,626,807 UART: [fht] FMC Alias Private Key: 7
6,627,917 UART: [art] Derive CDI
6,628,197 UART: [art] Store in in slot 0x4
6,713,914 UART: [art] Derive Key Pair
6,714,274 UART: [art] Store priv key in slot 0x5
6,727,610 UART: [art] Derive Key Pair - Done
6,742,446 UART: [art] Signing Cert with AUTHO
6,742,926 UART: RITY.KEYID = 7
6,757,978 UART: [art] Erasing AUTHORITY.KEYID = 7
6,758,743 UART: [art] PUB.X = FC21324602681B1F978F8E9251F3168E6D45F774B47D776AFF7761C13FAD82A55BB3383E3697BC7506331C8299B9BBD3
6,765,505 UART: [art] PUB.Y = 19B3D2DC6E795E9ACE5894160719EA8374B34A33303F34BEE3B10B43AEB14F08C4410285DFAF92764F12770DB8C103CE
6,772,443 UART: [art] SIG.R = 8D2E34FEFC5CF0B84941EDC9F0D64A15C9AE400FC0C89C0100F60818A655927434545E7A5D7E69A2D584825EF021FD53
6,779,188 UART: [art] SIG.S = 317FEDEDEF8AD63260745F86158D0ED448A9625BA3AFE9EF5C236231BF5A64F8C526D964F092B5F345BCF01C8FDB5AFE
6,803,072 UART: Caliptra RT
6,803,417 UART: [state] CFI Enabled
7,101,248 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,131,485 UART: [rt]cmd =0x494e464f, len=4
7,135,178 >>> mbox cmd response data (312 bytes)
7,135,179 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,164,730 UART: [rt]cmd =0x43455252, len=4
7,175,308 >>> mbox cmd response data (783 bytes)
7,175,309 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,205,220 UART: [rt]cmd =0x44504543, len=92
7,388,670 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,976 ready_for_fw is high
1,362,976 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,091 >>> mbox cmd response: success
2,929,091 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,991,283 UART:
2,991,299 UART: Running Caliptra FMC ...
2,991,707 UART:
2,991,850 UART: [state] CFI Enabled
3,002,701 UART: [fht] FMC Alias Private Key: 7
3,111,458 UART: [art] Extend RT PCRs Done
3,111,886 UART: [art] Lock RT PCRs Done
3,113,082 UART: [art] Populate DV Done
3,121,299 UART: [fht] FMC Alias Private Key: 7
3,122,319 UART: [art] Derive CDI
3,122,599 UART: [art] Store in in slot 0x4
3,208,510 UART: [art] Derive Key Pair
3,208,870 UART: [art] Store priv key in slot 0x5
3,222,076 UART: [art] Derive Key Pair - Done
3,237,146 UART: [art] Signing Cert with AUTHO
3,237,626 UART: RITY.KEYID = 7
3,252,678 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,443 UART: [art] PUB.X = 06BDC09C4785966CEA0801500B91BE215D36587488048BF2ABE3865A166A87CE6F959985D1287E5D874DBF28F27D491D
3,260,196 UART: [art] PUB.Y = 9F491B1A71D135ABAA82F661D182B40B3362E378D71E2A7F707470FD73D8273F001620D662E109DD6AF017E92E699F95
3,267,116 UART: [art] SIG.R = CFDAB929AC3F2B0A58CA9FF864611B2825E2D3ADACCD8DF96459EE06822DB266553C288B819F660B4D083771943E7462
3,273,882 UART: [art] SIG.S = CC49732381EFFF6A06C21B8EF0154C556F137749BAA4B2D566465BB7ECDD5A48547BD82241D589E77F2F6654578626DC
3,297,724 UART: Caliptra RT
3,298,069 UART: [state] CFI Enabled
3,407,047 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,641 UART: [rt]cmd =0x4453424c, len=4
3,451,052 >>> mbox cmd response data (8 bytes)
3,451,053 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,214,683 >>> mbox cmd response: success
6,214,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,227,938 UART:
6,227,954 UART: Running Caliptra FMC ...
6,228,362 UART:
6,228,505 UART: [state] CFI Enabled
6,317,664 UART: [art] Extend RT PCRs Done
6,318,092 UART: [art] Lock RT PCRs Done
6,319,435 UART: [art] Populate DV Done
6,327,612 UART: [fht] FMC Alias Private Key: 7
6,328,692 UART: [art] Derive CDI
6,328,972 UART: [art] Store in in slot 0x4
6,415,429 UART: [art] Derive Key Pair
6,415,789 UART: [art] Store priv key in slot 0x5
6,429,507 UART: [art] Derive Key Pair - Done
6,444,244 UART: [art] Signing Cert with AUTHO
6,444,724 UART: RITY.KEYID = 7
6,460,240 UART: [art] Erasing AUTHORITY.KEYID = 7
6,461,005 UART: [art] PUB.X = 560863B9303657177DEF036724415D0AD97BD8B4E3A077A188F62B1178993A95A6ABBC2EA35072F40DFA8B52E2A94EBE
6,467,767 UART: [art] PUB.Y = B069A9B12FEE9AE4F7C85CD2B50758DDEA6167C6015BB58FB717A862E2DDE32B9763E8F401B28CE91B238E37278A7044
6,474,718 UART: [art] SIG.R = 9AAEF99204F1C4ED1AFB0E5AB8426F66A6A017228871E3ED1B552ECFEE93904EC0133BBDD759FB827E64705A89079E70
6,481,491 UART: [art] SIG.S = 73786E113B8B60BEEC0BB98B77F3DDC605BEE2D6E3194CD66F7191E56401ACB86DE0E4144D13D720E6D247035538849D
6,505,470 UART: Caliptra RT
6,505,815 UART: [state] CFI Enabled
6,796,670 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,826,929 UART: [rt]cmd =0x494e464f, len=4
6,830,848 >>> mbox cmd response data (312 bytes)
6,830,849 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,860,474 UART: [rt]cmd =0x43455252, len=4
6,871,122 >>> mbox cmd response data (783 bytes)
6,871,123 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,900,964 UART: [rt]cmd =0x44504543, len=92
7,084,541 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,641 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
893,448 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,573 UART: [kat] ++
897,725 UART: [kat] sha1
901,763 UART: [kat] SHA2-256
903,703 UART: [kat] SHA2-384
906,398 UART: [kat] SHA2-512-ACC
908,299 UART: [kat] ECC-384
918,230 UART: [kat] HMAC-384Kdf
922,860 UART: [kat] LMS
1,171,188 UART: [kat] --
1,171,875 UART: [cold-reset] ++
1,172,373 UART: [fht] FHT @ 0x50003400
1,175,022 UART: [idev] ++
1,175,190 UART: [idev] CDI.KEYID = 6
1,175,550 UART: [idev] SUBJECT.KEYID = 7
1,175,974 UART: [idev] UDS.KEYID = 0
1,176,319 ready_for_fw is high
1,176,319 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,010 UART: [idev] Erasing UDS.KEYID = 0
1,201,099 UART: [idev] Sha1 KeyId Algorithm
1,209,669 UART: [idev] --
1,210,893 UART: [ldev] ++
1,211,061 UART: [ldev] CDI.KEYID = 6
1,211,424 UART: [ldev] SUBJECT.KEYID = 5
1,211,850 UART: [ldev] AUTHORITY.KEYID = 7
1,212,313 UART: [ldev] FE.KEYID = 1
1,217,399 UART: [ldev] Erasing FE.KEYID = 1
1,243,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,255 UART: [ldev] --
1,282,748 UART: [fwproc] Wait for Commands...
1,283,500 UART: [fwproc] Recv command 0x46574c44
1,284,228 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,336 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,640 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,427 >>> mbox cmd response: success
2,774,427 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,775,439 UART: [afmc] ++
2,775,607 UART: [afmc] CDI.KEYID = 6
2,775,969 UART: [afmc] SUBJECT.KEYID = 7
2,776,394 UART: [afmc] AUTHORITY.KEYID = 5
2,811,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,426 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,174 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,902 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,787 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,506 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,192 UART: [afmc] --
2,854,276 UART: [cold-reset] --
2,855,374 UART: [state] Locking Datavault
2,856,367 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,971 UART: [state] Locking ICCM
2,857,579 UART: [exit] Launching FMC @ 0x40000130
2,862,908 UART:
2,862,924 UART: Running Caliptra FMC ...
2,863,332 UART:
2,863,386 UART: [state] CFI Enabled
2,873,961 UART: [fht] FMC Alias Private Key: 7
2,981,490 UART: [art] Extend RT PCRs Done
2,981,918 UART: [art] Lock RT PCRs Done
2,983,750 UART: [art] Populate DV Done
2,991,925 UART: [fht] FMC Alias Private Key: 7
2,992,861 UART: [art] Derive CDI
2,993,141 UART: [art] Store in in slot 0x4
3,079,064 UART: [art] Derive Key Pair
3,079,424 UART: [art] Store priv key in slot 0x5
3,092,304 UART: [art] Derive Key Pair - Done
3,106,971 UART: [art] Signing Cert with AUTHO
3,107,451 UART: RITY.KEYID = 7
3,122,507 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,272 UART: [art] PUB.X = B4ABEE9A071E7224AFB6FBCAC4ED61C1F04185D77A4C57C0E13F018AF1854F9092B51B95449CF8267C45759CD17B43D9
3,130,048 UART: [art] PUB.Y = 8026782DE78143ECD56F799AA7A75882CA42F0E7AA3F9B8F59EE1152D0E241159682D4C7C7CA470B70FDDD71526F05EE
3,137,000 UART: [art] SIG.R = 50C7670E3D30590A28014238DFD4FF2DDA57D04F4B78357BC76918D1616FC313A6799A8B37AAE4A6156953EC5A64642C
3,143,761 UART: [art] SIG.S = F323273E573E9AF891B91CC10867B00B71E6AA381299C78FA15AB0E2F09C1BA175ED4804C7DC3248C6347FCE2156B946
3,167,121 UART: Caliptra RT
3,167,374 UART: [state] CFI Enabled
3,274,403 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,941 UART: [rt]cmd =0x4453424c, len=4
3,318,540 >>> mbox cmd response data (8 bytes)
3,318,541 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,242 UART:
3,319,258 UART: Running Caliptra ROM ...
3,319,666 UART:
3,319,721 UART: [state] CFI Enabled
3,322,643 UART: [state] LifecycleState = Unprovisioned
3,323,298 UART: [state] DebugLocked = No
3,323,852 UART: [state] WD Timer not started. Device not locked for debugging
3,324,980 UART: [kat] SHA2-256
4,130,630 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,134,755 UART: [kat] ++
4,134,907 UART: [kat] sha1
4,139,103 UART: [kat] SHA2-256
4,141,043 UART: [kat] SHA2-384
4,143,718 UART: [kat] SHA2-512-ACC
4,145,618 UART: [kat] ECC-384
4,155,201 UART: [kat] HMAC-384Kdf
4,159,659 UART: [kat] LMS
4,407,987 UART: [kat] --
4,408,657 UART: [update-reset] ++
5,720,721 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,721,764 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,871,588 >>> mbox cmd response: success
5,871,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,871,929 UART: [update-reset] Copying MAN_2 To MAN_1
5,879,943 UART: [update-reset Success] --
5,880,866 UART: [state] Locking Datavault
5,881,620 UART: [state] Locking PCR0, PCR1 and PCR31
5,882,224 UART: [state] Locking ICCM
5,882,764 UART: [exit] Launching FMC @ 0x40000130
5,888,093 UART:
5,888,109 UART: Running Caliptra FMC ...
5,888,517 UART:
5,888,571 UART: [state] CFI Enabled
5,977,464 UART: [art] Extend RT PCRs Done
5,977,892 UART: [art] Lock RT PCRs Done
5,979,059 UART: [art] Populate DV Done
5,987,218 UART: [fht] FMC Alias Private Key: 7
5,988,318 UART: [art] Derive CDI
5,988,598 UART: [art] Store in in slot 0x4
6,074,683 UART: [art] Derive Key Pair
6,075,043 UART: [art] Store priv key in slot 0x5
6,088,243 UART: [art] Derive Key Pair - Done
6,103,253 UART: [art] Signing Cert with AUTHO
6,103,733 UART: RITY.KEYID = 7
6,118,829 UART: [art] Erasing AUTHORITY.KEYID = 7
6,119,594 UART: [art] PUB.X = F75587B7826771E5C1F9F2533CA33898F5243071563ADDBE8395E1AA1C3138C6D870B34C0EDD8FA96FF2DA91E3F5920A
6,126,364 UART: [art] PUB.Y = CC1FE1FE31FA4C385E9E5801DCC6F7C4F4B353A383EE5FBED80BDF428C425B771E5CA4BDEB00B36517F6CBE9F27581A5
6,133,312 UART: [art] SIG.R = ED6BDA3CEEF6BA3B3418405AE0E7E2766444CADE3EFD5A6BFD988CE7DE7E2BEB95A9AA40B278E47676DC0611B3F33643
6,140,105 UART: [art] SIG.S = A4632D2D58321CEB821FEDEB62355D28B67B2DDF3EF6814885825CC9299ECC3DA81D753FC974CA60AD115ACC718A2321
6,163,646 UART: Caliptra RT
6,163,899 UART: [state] CFI Enabled
6,458,051 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,488,396 UART: [rt]cmd =0x494e464f, len=4
6,492,149 >>> mbox cmd response data (312 bytes)
6,492,150 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,521,669 UART: [rt]cmd =0x43455252, len=4
6,532,298 >>> mbox cmd response data (784 bytes)
6,532,299 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,562,290 UART: [rt]cmd =0x44504543, len=92
6,746,517 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,327 ready_for_fw is high
1,060,327 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,014 >>> mbox cmd response: success
2,626,014 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,687,976 UART:
2,687,992 UART: Running Caliptra FMC ...
2,688,400 UART:
2,688,454 UART: [state] CFI Enabled
2,698,955 UART: [fht] FMC Alias Private Key: 7
2,806,898 UART: [art] Extend RT PCRs Done
2,807,326 UART: [art] Lock RT PCRs Done
2,808,690 UART: [art] Populate DV Done
2,817,129 UART: [fht] FMC Alias Private Key: 7
2,818,127 UART: [art] Derive CDI
2,818,407 UART: [art] Store in in slot 0x4
2,903,902 UART: [art] Derive Key Pair
2,904,262 UART: [art] Store priv key in slot 0x5
2,917,092 UART: [art] Derive Key Pair - Done
2,932,099 UART: [art] Signing Cert with AUTHO
2,932,579 UART: RITY.KEYID = 7
2,947,807 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,572 UART: [art] PUB.X = 34A0A539F1478003F92EA721F780F28402722AEE45B394591D15398537207A3CFB9782C7F384D3514B5500B706EF6AD3
2,955,301 UART: [art] PUB.Y = D89C5C612804A2CF714D6E5EDFED69FF3A74DC75601BBA3BDA300AFC35C95B0337BDA0A3C5B2DB105D7CC08298D3AAF5
2,962,268 UART: [art] SIG.R = C5C01D8BE21B5AD7B8312DACC8501F2D5052168A268E8643EE43FC08426838224B246A1D900CF9939594DD8316EB1E3D
2,969,034 UART: [art] SIG.S = 0751115DB5A80EF49B5A82CCEE2F80AFAA190D7D2E60A4108705453ED0A0A4AF0E792E0F35B0CE41C1D3506B50ABEEB1
2,993,099 UART: Caliptra RT
2,993,352 UART: [state] CFI Enabled
3,101,977 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,431 UART: [rt]cmd =0x4453424c, len=4
3,145,642 >>> mbox cmd response data (8 bytes)
3,145,643 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,582,274 >>> mbox cmd response: success
5,582,274 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,595,626 UART:
5,595,642 UART: Running Caliptra FMC ...
5,596,050 UART:
5,596,104 UART: [state] CFI Enabled
5,684,991 UART: [art] Extend RT PCRs Done
5,685,419 UART: [art] Lock RT PCRs Done
5,686,664 UART: [art] Populate DV Done
5,694,739 UART: [fht] FMC Alias Private Key: 7
5,695,753 UART: [art] Derive CDI
5,696,033 UART: [art] Store in in slot 0x4
5,781,424 UART: [art] Derive Key Pair
5,781,784 UART: [art] Store priv key in slot 0x5
5,794,834 UART: [art] Derive Key Pair - Done
5,809,533 UART: [art] Signing Cert with AUTHO
5,810,013 UART: RITY.KEYID = 7
5,824,833 UART: [art] Erasing AUTHORITY.KEYID = 7
5,825,598 UART: [art] PUB.X = 6A9B504FBF40A599D99138B78E5B586389A10A77C8258CC745E2C3D646EB827E0017EDC000BAD8E41D108F7E7800C614
5,832,301 UART: [art] PUB.Y = B0728E3E1F344E82EFB11351F70510FBD9D54BC0DC3CE651B9440682BF9ED3724F3BB2D13B4CA24F3F5AFE7E35CCCB49
5,839,265 UART: [art] SIG.R = 1C8FFD7669261619FF8A0A7E5CD4EF02FF6B0DB3C8489ECC594ED2EB074BF2E08F269CC8996E19D31847FD0721DA508C
5,846,036 UART: [art] SIG.S = 3910223BD8BC0E955C32F4F783AE955710B849BF57D5DC7F71E1079B7DA81E87BEE8CEBBC2D564D104ABE31FE8333B21
5,870,094 UART: Caliptra RT
5,870,347 UART: [state] CFI Enabled
6,164,092 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,194,293 UART: [rt]cmd =0x494e464f, len=4
6,197,844 >>> mbox cmd response data (312 bytes)
6,197,845 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,227,172 UART: [rt]cmd =0x43455252, len=4
6,237,998 >>> mbox cmd response data (782 bytes)
6,237,999 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,267,924 UART: [rt]cmd =0x44504543, len=92
6,450,840 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
893,653 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,778 UART: [kat] ++
897,930 UART: [kat] sha1
902,176 UART: [kat] SHA2-256
904,116 UART: [kat] SHA2-384
906,951 UART: [kat] SHA2-512-ACC
908,852 UART: [kat] ECC-384
918,893 UART: [kat] HMAC-384Kdf
923,487 UART: [kat] LMS
1,171,815 UART: [kat] --
1,172,866 UART: [cold-reset] ++
1,173,344 UART: [fht] FHT @ 0x50003400
1,175,869 UART: [idev] ++
1,176,037 UART: [idev] CDI.KEYID = 6
1,176,397 UART: [idev] SUBJECT.KEYID = 7
1,176,821 UART: [idev] UDS.KEYID = 0
1,177,166 ready_for_fw is high
1,177,166 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,037 UART: [idev] Erasing UDS.KEYID = 0
1,202,310 UART: [idev] Sha1 KeyId Algorithm
1,210,864 UART: [idev] --
1,211,998 UART: [ldev] ++
1,212,166 UART: [ldev] CDI.KEYID = 6
1,212,529 UART: [ldev] SUBJECT.KEYID = 5
1,212,955 UART: [ldev] AUTHORITY.KEYID = 7
1,213,418 UART: [ldev] FE.KEYID = 1
1,218,908 UART: [ldev] Erasing FE.KEYID = 1
1,245,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,720 UART: [ldev] --
1,285,145 UART: [fwproc] Wait for Commands...
1,285,905 UART: [fwproc] Recv command 0x46574c44
1,286,633 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,708 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,811 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,115 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,814 >>> mbox cmd response: success
2,775,814 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,776,854 UART: [afmc] ++
2,777,022 UART: [afmc] CDI.KEYID = 6
2,777,384 UART: [afmc] SUBJECT.KEYID = 7
2,777,809 UART: [afmc] AUTHORITY.KEYID = 5
2,813,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,187 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,935 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,663 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,548 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,267 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,021 UART: [afmc] --
2,856,953 UART: [cold-reset] --
2,857,727 UART: [state] Locking Datavault
2,858,858 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,462 UART: [state] Locking ICCM
2,860,032 UART: [exit] Launching FMC @ 0x40000130
2,865,361 UART:
2,865,377 UART: Running Caliptra FMC ...
2,865,785 UART:
2,865,928 UART: [state] CFI Enabled
2,876,945 UART: [fht] FMC Alias Private Key: 7
2,984,590 UART: [art] Extend RT PCRs Done
2,985,018 UART: [art] Lock RT PCRs Done
2,986,496 UART: [art] Populate DV Done
2,994,669 UART: [fht] FMC Alias Private Key: 7
2,995,717 UART: [art] Derive CDI
2,995,997 UART: [art] Store in in slot 0x4
3,081,514 UART: [art] Derive Key Pair
3,081,874 UART: [art] Store priv key in slot 0x5
3,094,908 UART: [art] Derive Key Pair - Done
3,109,645 UART: [art] Signing Cert with AUTHO
3,110,125 UART: RITY.KEYID = 7
3,125,247 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,012 UART: [art] PUB.X = AC7826F5912CB5368278C64BB74FB1D91D6757402A230E3765DAE38DF677A5B8FAB8C563D9B7E748F629CE49CEB1AF01
3,132,786 UART: [art] PUB.Y = A205565E33BFE397C97E56844B70A062EC14D48294344382B45E0340C92C3A8F915E421B9852921DAABA8548BD99D3A3
3,139,726 UART: [art] SIG.R = 2FB99C0868FF0DD15BACF77D67B9DEE761B2CEC543C501594C21FE655130B0229006A1681091D8E704225AD61337D8D2
3,146,483 UART: [art] SIG.S = A9C8BD3DFD5DBE05FEA9BFC4A5FE8A35990A550F385D2880F6B46CB3670DF463B7DB8BD36842FD3BE5AD8AD6BD32BD32
3,170,176 UART: Caliptra RT
3,170,521 UART: [state] CFI Enabled
3,277,002 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,412 UART: [rt]cmd =0x4453424c, len=4
3,321,333 >>> mbox cmd response data (8 bytes)
3,321,334 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,069 UART:
3,322,085 UART: Running Caliptra ROM ...
3,322,493 UART:
3,322,635 UART: [state] CFI Enabled
3,325,531 UART: [state] LifecycleState = Unprovisioned
3,326,186 UART: [state] DebugLocked = No
3,326,744 UART: [state] WD Timer not started. Device not locked for debugging
3,327,988 UART: [kat] SHA2-256
4,133,638 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,137,763 UART: [kat] ++
4,137,915 UART: [kat] sha1
4,142,023 UART: [kat] SHA2-256
4,143,963 UART: [kat] SHA2-384
4,146,818 UART: [kat] SHA2-512-ACC
4,148,718 UART: [kat] ECC-384
4,158,185 UART: [kat] HMAC-384Kdf
4,162,787 UART: [kat] LMS
4,411,115 UART: [kat] --
4,412,005 UART: [update-reset] ++
5,724,241 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,725,266 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,875,090 >>> mbox cmd response: success
5,875,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,875,345 UART: [update-reset] Copying MAN_2 To MAN_1
5,883,359 UART: [update-reset Success] --
5,884,192 UART: [state] Locking Datavault
5,885,066 UART: [state] Locking PCR0, PCR1 and PCR31
5,885,670 UART: [state] Locking ICCM
5,886,330 UART: [exit] Launching FMC @ 0x40000130
5,891,659 UART:
5,891,675 UART: Running Caliptra FMC ...
5,892,083 UART:
5,892,226 UART: [state] CFI Enabled
5,981,715 UART: [art] Extend RT PCRs Done
5,982,143 UART: [art] Lock RT PCRs Done
5,983,646 UART: [art] Populate DV Done
5,991,683 UART: [fht] FMC Alias Private Key: 7
5,992,749 UART: [art] Derive CDI
5,993,029 UART: [art] Store in in slot 0x4
6,078,834 UART: [art] Derive Key Pair
6,079,194 UART: [art] Store priv key in slot 0x5
6,092,428 UART: [art] Derive Key Pair - Done
6,107,215 UART: [art] Signing Cert with AUTHO
6,107,695 UART: RITY.KEYID = 7
6,122,901 UART: [art] Erasing AUTHORITY.KEYID = 7
6,123,666 UART: [art] PUB.X = 7CDCBD62B1013B06D9F12546BCA8D95B6EC7F0081EAA55F5C63EA6D41D1EECF82F90AEDDEAF897F16AA3CDBA652DC821
6,130,459 UART: [art] PUB.Y = BF043AAABDC79702407F408D0276A6A90B938B37E2F593345458EB6EA437B64D2E3B51BF99BDF8C69EC04E5113C2FB18
6,137,407 UART: [art] SIG.R = 3721CC065FCC7176BE5ED60CF5C228620E2E80F8BFFE25E29FBEF63EB7F7CA8DEB51C436769C32FA05FDA67BD5EAA886
6,144,191 UART: [art] SIG.S = 82260914576B8F9B3F04E999A4A2D689873724F6C440DB460F162717AE3E171FE75D2BCC07205CA39C9247E22FA5FD0D
6,168,287 UART: Caliptra RT
6,168,632 UART: [state] CFI Enabled
6,459,007 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,489,040 UART: [rt]cmd =0x494e464f, len=4
6,492,775 >>> mbox cmd response data (312 bytes)
6,492,776 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,522,139 UART: [rt]cmd =0x43455252, len=4
6,532,983 >>> mbox cmd response data (783 bytes)
6,532,984 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,562,923 UART: [rt]cmd =0x44504543, len=92
6,746,382 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,184 ready_for_fw is high
1,060,184 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,611 >>> mbox cmd response: success
2,624,611 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,687,269 UART:
2,687,285 UART: Running Caliptra FMC ...
2,687,693 UART:
2,687,836 UART: [state] CFI Enabled
2,698,283 UART: [fht] FMC Alias Private Key: 7
2,806,236 UART: [art] Extend RT PCRs Done
2,806,664 UART: [art] Lock RT PCRs Done
2,808,294 UART: [art] Populate DV Done
2,816,597 UART: [fht] FMC Alias Private Key: 7
2,817,633 UART: [art] Derive CDI
2,817,913 UART: [art] Store in in slot 0x4
2,903,418 UART: [art] Derive Key Pair
2,903,778 UART: [art] Store priv key in slot 0x5
2,916,766 UART: [art] Derive Key Pair - Done
2,931,576 UART: [art] Signing Cert with AUTHO
2,932,056 UART: RITY.KEYID = 7
2,947,550 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,315 UART: [art] PUB.X = FAB52FB0B6ADC45FDB5327B256DC9F3F39FAB4A2002F74A438DC9BDA05E657A3DAAA2D68CABA5857360820B267202BF1
2,955,079 UART: [art] PUB.Y = 9D685B03E566150AB4A01C16CC1F4951DC9E62D856990560FAC7D7C3CE7B3218258F4BB9B12E46AEAE8B5A5BFAFFA9CF
2,962,040 UART: [art] SIG.R = EF5F1CB003B4066BC1272516A9F834567AAE14F59BDF0409DB4B2A9CB13BDECCF8FD5267BA48BF414D38D32F882AA6E1
2,968,818 UART: [art] SIG.S = 203197FD3EE04172FB564249040DE12AE2BEEAFA0CA70B2D97F67E3CA18B1E59774E065AFD07F69AED2143988D8BCE34
2,992,601 UART: Caliptra RT
2,992,946 UART: [state] CFI Enabled
3,100,659 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,119 UART: [rt]cmd =0x4453424c, len=4
3,145,244 >>> mbox cmd response data (8 bytes)
3,145,245 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,582,942 >>> mbox cmd response: success
5,582,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,596,162 UART:
5,596,178 UART: Running Caliptra FMC ...
5,596,586 UART:
5,596,729 UART: [state] CFI Enabled
5,686,156 UART: [art] Extend RT PCRs Done
5,686,584 UART: [art] Lock RT PCRs Done
5,687,713 UART: [art] Populate DV Done
5,695,772 UART: [fht] FMC Alias Private Key: 7
5,696,866 UART: [art] Derive CDI
5,697,146 UART: [art] Store in in slot 0x4
5,782,883 UART: [art] Derive Key Pair
5,783,243 UART: [art] Store priv key in slot 0x5
5,796,963 UART: [art] Derive Key Pair - Done
5,812,066 UART: [art] Signing Cert with AUTHO
5,812,546 UART: RITY.KEYID = 7
5,827,384 UART: [art] Erasing AUTHORITY.KEYID = 7
5,828,149 UART: [art] PUB.X = 0462B4FA810A550965DF82FBFC16BA45C9CE05C48FA611D0959A911D93411A455F1C3E79B3CF0CD533FF0384A4293E73
5,834,907 UART: [art] PUB.Y = CD0594E50C3600278746129B6759FD250B000F3A25F28B38CD02A54B2908B41C4781CFB4BB88E8E0FB5A42CDC6F345A0
5,841,799 UART: [art] SIG.R = 760CA5770FC4E9C487DA67FEFA85492D02F8E32DF76E13628858348670B8D80B584F0C00B328484DD5CDA05913789D0A
5,848,529 UART: [art] SIG.S = DEE528DE2FB7C52A4207E85B118A89966AAF0C42F31AE997BE873023941AFD7BED61B7B1AC8D88FF1C6B8B00608EE760
5,871,812 UART: Caliptra RT
5,872,157 UART: [state] CFI Enabled
6,172,946 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,203,201 UART: [rt]cmd =0x494e464f, len=4
6,207,000 >>> mbox cmd response data (312 bytes)
6,207,001 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,236,362 UART: [rt]cmd =0x43455252, len=4
6,247,306 >>> mbox cmd response data (783 bytes)
6,247,307 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,277,100 UART: [rt]cmd =0x44504543, len=92
6,460,813 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,289 UART: [kat] ++
895,441 UART: [kat] sha1
899,681 UART: [kat] SHA2-256
901,621 UART: [kat] SHA2-384
904,336 UART: [kat] SHA2-512-ACC
906,237 UART: [kat] ECC-384
915,558 UART: [kat] HMAC-384Kdf
920,104 UART: [kat] LMS
1,168,416 UART: [kat] --
1,169,289 UART: [cold-reset] ++
1,169,619 UART: [fht] FHT @ 0x50003400
1,172,213 UART: [idev] ++
1,172,381 UART: [idev] CDI.KEYID = 6
1,172,742 UART: [idev] SUBJECT.KEYID = 7
1,173,167 UART: [idev] UDS.KEYID = 0
1,173,513 ready_for_fw is high
1,173,513 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,975 UART: [idev] Erasing UDS.KEYID = 0
1,198,019 UART: [idev] Sha1 KeyId Algorithm
1,207,083 UART: [idev] --
1,208,178 UART: [ldev] ++
1,208,346 UART: [ldev] CDI.KEYID = 6
1,208,710 UART: [ldev] SUBJECT.KEYID = 5
1,209,137 UART: [ldev] AUTHORITY.KEYID = 7
1,209,600 UART: [ldev] FE.KEYID = 1
1,214,562 UART: [ldev] Erasing FE.KEYID = 1
1,240,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,842 UART: [ldev] --
1,280,164 UART: [fwproc] Wait for Commands...
1,280,791 UART: [fwproc] Recv command 0x46574c44
1,281,524 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,634 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,943 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,685 >>> mbox cmd response: success
2,771,685 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,772,860 UART: [afmc] ++
2,773,028 UART: [afmc] CDI.KEYID = 6
2,773,391 UART: [afmc] SUBJECT.KEYID = 7
2,773,817 UART: [afmc] AUTHORITY.KEYID = 5
2,809,136 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,676 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,427 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,156 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,039 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,758 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,493 UART: [afmc] --
2,852,517 UART: [cold-reset] --
2,853,567 UART: [state] Locking Datavault
2,854,638 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,242 UART: [state] Locking ICCM
2,855,736 UART: [exit] Launching FMC @ 0x40000130
2,861,065 UART:
2,861,081 UART: Running Caliptra FMC ...
2,861,489 UART:
2,861,543 UART: [state] CFI Enabled
2,872,544 UART: [fht] FMC Alias Private Key: 7
2,980,257 UART: [art] Extend RT PCRs Done
2,980,685 UART: [art] Lock RT PCRs Done
2,982,229 UART: [art] Populate DV Done
2,990,784 UART: [fht] FMC Alias Private Key: 7
2,991,756 UART: [art] Derive CDI
2,992,036 UART: [art] Store in in slot 0x4
3,077,509 UART: [art] Derive Key Pair
3,077,869 UART: [art] Store priv key in slot 0x5
3,090,975 UART: [art] Derive Key Pair - Done
3,106,044 UART: [art] Signing Cert with AUTHO
3,106,524 UART: RITY.KEYID = 7
3,121,824 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,589 UART: [art] PUB.X = 5097EB785257037EEE8EC5C7DE3FDCC3B16B64D604785BB7A77F47A1A9D36FF5F6C06FA9CB21FD5159F6F9C8510E3732
3,129,364 UART: [art] PUB.Y = 00C340839FB7113A19BA12594253622DC7D03AD189157E09A9537E2E4306020B28222B4D5EDF6E1A7AE218340CDF8FF4
3,136,275 UART: [art] SIG.R = 0C6B5B16E7EB23244F50C11F3DC40C9F756E46941CD19B1473F0F4713D98CFFAD2140B970BF825A7C50CAFCC5878DA8D
3,143,044 UART: [art] SIG.S = 6F0B17F73EE97BF92153CF0C22DFBC4FF617805047336632F58F3E7AFA867A09A3CAD8A6819ADD327843AA7B44015F42
3,167,003 UART: Caliptra RT
3,167,256 UART: [state] CFI Enabled
3,274,535 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,983 UART: [rt]cmd =0x4453424c, len=4
3,318,258 >>> mbox cmd response data (8 bytes)
3,318,259 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,992 UART:
3,319,008 UART: Running Caliptra ROM ...
3,319,416 UART:
3,319,471 UART: [state] CFI Enabled
3,322,127 UART: [state] LifecycleState = Unprovisioned
3,322,782 UART: [state] DebugLocked = No
3,323,280 UART: [state] WD Timer not started. Device not locked for debugging
3,324,446 UART: [kat] SHA2-256
4,127,996 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,132,125 UART: [kat] ++
4,132,277 UART: [kat] sha1
4,136,475 UART: [kat] SHA2-256
4,138,415 UART: [kat] SHA2-384
4,141,178 UART: [kat] SHA2-512-ACC
4,143,078 UART: [kat] ECC-384
4,152,415 UART: [kat] HMAC-384Kdf
4,156,921 UART: [kat] LMS
4,405,233 UART: [kat] --
4,405,825 UART: [update-reset] ++
5,718,190 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,719,281 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,869,105 >>> mbox cmd response: success
5,869,105 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,869,226 UART: [update-reset] Copying MAN_2 To MAN_1
5,877,240 UART: [update-reset Success] --
5,878,281 UART: [state] Locking Datavault
5,878,927 UART: [state] Locking PCR0, PCR1 and PCR31
5,879,531 UART: [state] Locking ICCM
5,880,023 UART: [exit] Launching FMC @ 0x40000130
5,885,352 UART:
5,885,368 UART: Running Caliptra FMC ...
5,885,776 UART:
5,885,830 UART: [state] CFI Enabled
5,975,023 UART: [art] Extend RT PCRs Done
5,975,451 UART: [art] Lock RT PCRs Done
5,976,688 UART: [art] Populate DV Done
5,984,961 UART: [fht] FMC Alias Private Key: 7
5,986,013 UART: [art] Derive CDI
5,986,293 UART: [art] Store in in slot 0x4
6,072,194 UART: [art] Derive Key Pair
6,072,554 UART: [art] Store priv key in slot 0x5
6,085,362 UART: [art] Derive Key Pair - Done
6,100,093 UART: [art] Signing Cert with AUTHO
6,100,573 UART: RITY.KEYID = 7
6,116,123 UART: [art] Erasing AUTHORITY.KEYID = 7
6,116,888 UART: [art] PUB.X = 3642D8F00EF792D44BF4EABB39E3E3942C3FD468BAE71C295DB0343B9B028888025AF0D68D7E869F4B46ECF3D90340C7
6,123,656 UART: [art] PUB.Y = DD4BA184DB99A16906309CCD8A06A7BECB51562AC209FAA16F3F2D2C658932C74260524936D0AE7ACD4DDDE1BF197F16
6,130,613 UART: [art] SIG.R = F508CA6B59B0EE2A8C048D8E79214850A213DE17E18407DA3805AA16D29AD3FEF26001F414E98ABA59776CAF4EB74536
6,137,376 UART: [art] SIG.S = 499200C130931C3D30762E1868FD4CF0EE09B72A161398DAF609FB1936D523B4E55B820B2CE3A0C317FCCBFD6FF7F7FA
6,160,996 UART: Caliptra RT
6,161,249 UART: [state] CFI Enabled
6,456,384 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,486,761 UART: [rt]cmd =0x494e464f, len=4
6,490,350 >>> mbox cmd response data (312 bytes)
6,490,351 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,519,772 UART: [rt]cmd =0x43455252, len=4
6,530,642 >>> mbox cmd response data (783 bytes)
6,530,643 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,560,680 UART: [rt]cmd =0x44504543, len=92
6,744,356 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,104 ready_for_fw is high
1,056,104 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,229 >>> mbox cmd response: success
2,621,229 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,683,367 UART:
2,683,383 UART: Running Caliptra FMC ...
2,683,791 UART:
2,683,845 UART: [state] CFI Enabled
2,694,394 UART: [fht] FMC Alias Private Key: 7
2,802,255 UART: [art] Extend RT PCRs Done
2,802,683 UART: [art] Lock RT PCRs Done
2,804,271 UART: [art] Populate DV Done
2,812,486 UART: [fht] FMC Alias Private Key: 7
2,813,450 UART: [art] Derive CDI
2,813,730 UART: [art] Store in in slot 0x4
2,899,631 UART: [art] Derive Key Pair
2,899,991 UART: [art] Store priv key in slot 0x5
2,912,491 UART: [art] Derive Key Pair - Done
2,927,390 UART: [art] Signing Cert with AUTHO
2,927,870 UART: RITY.KEYID = 7
2,942,922 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,687 UART: [art] PUB.X = 8FC984D943B4F64ED33A03BAFC43E0A81D2FCFDF1DA9F6F8B452E2F7268BF42EBF541CCEA2555FB43858C28A3B73CC86
2,950,478 UART: [art] PUB.Y = 867E58A9FBD13F768DBADB9DC68768B73ADAD8BF1B358A4B69503D9CBEB88CE1A29C9F20F96E98B7F5FAC8CDB4AEFDC9
2,957,462 UART: [art] SIG.R = 68DC21247D1D3BF7C661D1EC549F3A6384CEB9F4CD1913F68BEC33CD12421DE7A8598750BC20E1C68C34412AC77EC5BD
2,964,246 UART: [art] SIG.S = 7F848DAAC20A94E12B3AACD651B89F13C88EFE75F1A34A6F281B65594F1B3C361FB175E5EEC4442C4C53647EC5BCAC0D
2,988,075 UART: Caliptra RT
2,988,328 UART: [state] CFI Enabled
3,096,283 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,629 UART: [rt]cmd =0x4453424c, len=4
3,140,404 >>> mbox cmd response data (8 bytes)
3,140,405 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,573,862 >>> mbox cmd response: success
5,573,862 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,586,878 UART:
5,586,894 UART: Running Caliptra FMC ...
5,587,302 UART:
5,587,356 UART: [state] CFI Enabled
5,676,347 UART: [art] Extend RT PCRs Done
5,676,775 UART: [art] Lock RT PCRs Done
5,678,246 UART: [art] Populate DV Done
5,686,467 UART: [fht] FMC Alias Private Key: 7
5,687,421 UART: [art] Derive CDI
5,687,701 UART: [art] Store in in slot 0x4
5,773,276 UART: [art] Derive Key Pair
5,773,636 UART: [art] Store priv key in slot 0x5
5,786,210 UART: [art] Derive Key Pair - Done
5,801,000 UART: [art] Signing Cert with AUTHO
5,801,480 UART: RITY.KEYID = 7
5,816,600 UART: [art] Erasing AUTHORITY.KEYID = 7
5,817,365 UART: [art] PUB.X = E356EA3FE3805F8C51CD1A348B01C4E4AC66999DD6073CA2D0C655340FB88D34EFE28F069B66DD89434D244BD9BB1E13
5,824,135 UART: [art] PUB.Y = 6C5F05CF89A96E96EC37B35E95F504DFD36EEB1801BB8079B93B3D2841EE9BE44995FDD52589EA8AA7C8CD8D2026E80A
5,831,089 UART: [art] SIG.R = 218DCEAC7846B2B7A57FF256A2C0CCDBC1645FC7D06B2543A19868D57820A6F6D549189F5A738140FCF7269BF1B192C6
5,837,867 UART: [art] SIG.S = E455BDE5226327416538E4ED42BE32C599323E79141361A79905F049C5528B03C01FDE568837C2FB7E8EFE2E5C1DDE61
5,861,980 UART: Caliptra RT
5,862,233 UART: [state] CFI Enabled
6,156,100 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,186,473 UART: [rt]cmd =0x494e464f, len=4
6,190,228 >>> mbox cmd response data (312 bytes)
6,190,229 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,219,484 UART: [rt]cmd =0x43455252, len=4
6,230,436 >>> mbox cmd response data (783 bytes)
6,230,437 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,260,546 UART: [rt]cmd =0x44504543, len=92
6,443,444 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
891,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,660 UART: [kat] ++
895,812 UART: [kat] sha1
899,918 UART: [kat] SHA2-256
901,858 UART: [kat] SHA2-384
904,673 UART: [kat] SHA2-512-ACC
906,574 UART: [kat] ECC-384
916,383 UART: [kat] HMAC-384Kdf
920,913 UART: [kat] LMS
1,169,225 UART: [kat] --
1,170,076 UART: [cold-reset] ++
1,170,462 UART: [fht] FHT @ 0x50003400
1,173,096 UART: [idev] ++
1,173,264 UART: [idev] CDI.KEYID = 6
1,173,625 UART: [idev] SUBJECT.KEYID = 7
1,174,050 UART: [idev] UDS.KEYID = 0
1,174,396 ready_for_fw is high
1,174,396 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,088 UART: [idev] Erasing UDS.KEYID = 0
1,199,034 UART: [idev] Sha1 KeyId Algorithm
1,208,138 UART: [idev] --
1,209,179 UART: [ldev] ++
1,209,347 UART: [ldev] CDI.KEYID = 6
1,209,711 UART: [ldev] SUBJECT.KEYID = 5
1,210,138 UART: [ldev] AUTHORITY.KEYID = 7
1,210,601 UART: [ldev] FE.KEYID = 1
1,216,025 UART: [ldev] Erasing FE.KEYID = 1
1,242,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,363 UART: [ldev] --
1,281,657 UART: [fwproc] Wait for Commands...
1,282,364 UART: [fwproc] Recv command 0x46574c44
1,283,097 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,161 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,470 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,318 >>> mbox cmd response: success
2,772,318 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,773,389 UART: [afmc] ++
2,773,557 UART: [afmc] CDI.KEYID = 6
2,773,920 UART: [afmc] SUBJECT.KEYID = 7
2,774,346 UART: [afmc] AUTHORITY.KEYID = 5
2,809,797 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,036 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,765 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,648 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,367 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,152 UART: [afmc] --
2,853,224 UART: [cold-reset] --
2,854,334 UART: [state] Locking Datavault
2,855,429 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,033 UART: [state] Locking ICCM
2,856,551 UART: [exit] Launching FMC @ 0x40000130
2,861,880 UART:
2,861,896 UART: Running Caliptra FMC ...
2,862,304 UART:
2,862,447 UART: [state] CFI Enabled
2,873,230 UART: [fht] FMC Alias Private Key: 7
2,980,593 UART: [art] Extend RT PCRs Done
2,981,021 UART: [art] Lock RT PCRs Done
2,982,807 UART: [art] Populate DV Done
2,990,994 UART: [fht] FMC Alias Private Key: 7
2,992,048 UART: [art] Derive CDI
2,992,328 UART: [art] Store in in slot 0x4
3,077,847 UART: [art] Derive Key Pair
3,078,207 UART: [art] Store priv key in slot 0x5
3,091,783 UART: [art] Derive Key Pair - Done
3,106,378 UART: [art] Signing Cert with AUTHO
3,106,858 UART: RITY.KEYID = 7
3,121,810 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,575 UART: [art] PUB.X = 3819B95D2778FCBDCC950569454CD3A8B729284C2F06AA8E8702A2372EB5081BA3531FE712189913E9F14276889C125A
3,129,327 UART: [art] PUB.Y = 68E6F0C831DC927874921D6A0B3D10732A4F1FE9B340261606248E548FF681C0091BA13DCED1E5A69798CD000418EDEF
3,136,245 UART: [art] SIG.R = CA6C5E520430C0DCD93C84E489A5390D3FDC9DBA9BE35819E7C5CBCDE876002FDD1B23F49075497DAD850D59667D935B
3,142,998 UART: [art] SIG.S = 1FE0AB96478854D3B92E6A7EFFDBEAFB57904463989A22E11F1382B829B642A775E1CF9558D47A76EEF42E003BFE093F
3,166,596 UART: Caliptra RT
3,166,941 UART: [state] CFI Enabled
3,275,278 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,788 UART: [rt]cmd =0x4453424c, len=4
3,319,859 >>> mbox cmd response data (8 bytes)
3,319,860 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,375 UART:
3,320,391 UART: Running Caliptra ROM ...
3,320,799 UART:
3,320,941 UART: [state] CFI Enabled
3,323,555 UART: [state] LifecycleState = Unprovisioned
3,324,210 UART: [state] DebugLocked = No
3,324,814 UART: [state] WD Timer not started. Device not locked for debugging
3,326,028 UART: [kat] SHA2-256
4,129,578 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,133,707 UART: [kat] ++
4,133,859 UART: [kat] sha1
4,137,889 UART: [kat] SHA2-256
4,139,829 UART: [kat] SHA2-384
4,142,468 UART: [kat] SHA2-512-ACC
4,144,368 UART: [kat] ECC-384
4,153,763 UART: [kat] HMAC-384Kdf
4,158,373 UART: [kat] LMS
4,406,685 UART: [kat] --
4,407,279 UART: [update-reset] ++
5,719,442 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,720,653 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,870,477 >>> mbox cmd response: success
5,870,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,870,790 UART: [update-reset] Copying MAN_2 To MAN_1
5,878,804 UART: [update-reset Success] --
5,879,919 UART: [state] Locking Datavault
5,880,835 UART: [state] Locking PCR0, PCR1 and PCR31
5,881,439 UART: [state] Locking ICCM
5,881,895 UART: [exit] Launching FMC @ 0x40000130
5,887,224 UART:
5,887,240 UART: Running Caliptra FMC ...
5,887,648 UART:
5,887,791 UART: [state] CFI Enabled
5,977,186 UART: [art] Extend RT PCRs Done
5,977,614 UART: [art] Lock RT PCRs Done
5,978,715 UART: [art] Populate DV Done
5,986,972 UART: [fht] FMC Alias Private Key: 7
5,987,960 UART: [art] Derive CDI
5,988,240 UART: [art] Store in in slot 0x4
6,073,581 UART: [art] Derive Key Pair
6,073,941 UART: [art] Store priv key in slot 0x5
6,086,547 UART: [art] Derive Key Pair - Done
6,101,418 UART: [art] Signing Cert with AUTHO
6,101,898 UART: RITY.KEYID = 7
6,117,274 UART: [art] Erasing AUTHORITY.KEYID = 7
6,118,039 UART: [art] PUB.X = D2375952F0B0FD78935793B7F0A7D77C0EA3E07C0E5479664BEB924E6FF2BA9F22AC91C853EE7A5874D958025D1EDA2B
6,124,810 UART: [art] PUB.Y = 0959C4897D9F9948FBC512C251E1B7640826DB686B55365BFDC6F476ED2D6130979BA3822D8ED913B17A3C2B4FF4D88B
6,131,758 UART: [art] SIG.R = D6A1E023BE17F419511CF0F6A1E5E74E774F2880FE07CCA600B632D5805CEDB065051914E9893A4F75647D5CEA59D7CD
6,138,508 UART: [art] SIG.S = 1D7409B38483121B495DD340A1F0FE726539BC4AF2B31AD22AC2128EFF573154832E5B634EC55906F9F030E080AA1823
6,162,445 UART: Caliptra RT
6,162,790 UART: [state] CFI Enabled
6,459,043 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,489,354 UART: [rt]cmd =0x494e464f, len=4
6,493,065 >>> mbox cmd response data (312 bytes)
6,493,066 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,522,499 UART: [rt]cmd =0x43455252, len=4
6,533,331 >>> mbox cmd response data (783 bytes)
6,533,332 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,563,401 UART: [rt]cmd =0x44504543, len=92
6,747,213 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,417 ready_for_fw is high
1,056,417 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,344 >>> mbox cmd response: success
2,624,344 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,687,112 UART:
2,687,128 UART: Running Caliptra FMC ...
2,687,536 UART:
2,687,679 UART: [state] CFI Enabled
2,698,252 UART: [fht] FMC Alias Private Key: 7
2,806,255 UART: [art] Extend RT PCRs Done
2,806,683 UART: [art] Lock RT PCRs Done
2,808,227 UART: [art] Populate DV Done
2,816,590 UART: [fht] FMC Alias Private Key: 7
2,817,768 UART: [art] Derive CDI
2,818,048 UART: [art] Store in in slot 0x4
2,903,795 UART: [art] Derive Key Pair
2,904,155 UART: [art] Store priv key in slot 0x5
2,918,183 UART: [art] Derive Key Pair - Done
2,933,013 UART: [art] Signing Cert with AUTHO
2,933,493 UART: RITY.KEYID = 7
2,949,007 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,772 UART: [art] PUB.X = 3EB2C26F001F75C86ED0CBAB7DA2991E8EE789D3B5EE0488323012F06E2501EBBBD70FE0C22485722B3A9B386C58C417
2,956,521 UART: [art] PUB.Y = B921297B8FB90925F5EF08F536CE202201CA171B3267FA96DA5A7B24ED676A27EC436A0BCA452DC0E053B4E98E99C44D
2,963,469 UART: [art] SIG.R = 243FA39E32969EE9A98EA2F6D8A47DEA0BC7C7EB5731E433684AC0A3A64F02F5909A562C2632538BE65462BB54EF4C90
2,970,241 UART: [art] SIG.S = 398937DE5A746A7BBDD5242AF22AD041638D5F320B77132982FCFF82AD25AD685409C24BD5CFB13B6D906D260580EBDC
2,994,735 UART: Caliptra RT
2,995,080 UART: [state] CFI Enabled
3,102,783 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,595 UART: [rt]cmd =0x4453424c, len=4
3,147,356 >>> mbox cmd response data (8 bytes)
3,147,357 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,581,827 >>> mbox cmd response: success
5,581,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,595,403 UART:
5,595,419 UART: Running Caliptra FMC ...
5,595,827 UART:
5,595,970 UART: [state] CFI Enabled
5,684,885 UART: [art] Extend RT PCRs Done
5,685,313 UART: [art] Lock RT PCRs Done
5,686,376 UART: [art] Populate DV Done
5,694,695 UART: [fht] FMC Alias Private Key: 7
5,695,785 UART: [art] Derive CDI
5,696,065 UART: [art] Store in in slot 0x4
5,781,382 UART: [art] Derive Key Pair
5,781,742 UART: [art] Store priv key in slot 0x5
5,795,374 UART: [art] Derive Key Pair - Done
5,810,008 UART: [art] Signing Cert with AUTHO
5,810,488 UART: RITY.KEYID = 7
5,826,502 UART: [art] Erasing AUTHORITY.KEYID = 7
5,827,267 UART: [art] PUB.X = 9C080A04A058666FBE0117A072D6888C6BE72A811F9F95C49C5DCCC9E58647E5AD645434749DAA66D55EE7D6FCB2B37E
5,834,035 UART: [art] PUB.Y = D7156C04AAA48F88DB5DD21096589093DBBF61E1B1E7219ADF543D02C4DABF36EB785C245084DA0718B8C02C7BB8DEB7
5,840,992 UART: [art] SIG.R = F91293C88C69B2BBAFAD810999B658D1A33EF620B7C3FBDBED9C2BB83C76375406EC32E0AB5FDA75FB74D4DCEA121773
5,847,778 UART: [art] SIG.S = C5382D2F29DA38375ACD568B7868FCB88BCDDBD6E579CCFBB67DF703EE5A5E0B1929195D685EDC1A6B21492DB3B5E8B6
5,871,015 UART: Caliptra RT
5,871,360 UART: [state] CFI Enabled
6,164,854 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,194,929 UART: [rt]cmd =0x494e464f, len=4
6,198,452 >>> mbox cmd response data (312 bytes)
6,198,453 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,228,030 UART: [rt]cmd =0x43455252, len=4
6,238,879 >>> mbox cmd response data (784 bytes)
6,238,880 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,268,753 UART: [rt]cmd =0x44504543, len=92
6,452,225 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,585 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,155 UART: [kat] SHA2-256
882,086 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,201 UART: [kat] ++
886,353 UART: [kat] sha1
890,639 UART: [kat] SHA2-256
892,577 UART: [kat] SHA2-384
895,184 UART: [kat] SHA2-512-ACC
897,085 UART: [kat] ECC-384
902,580 UART: [kat] HMAC-384Kdf
907,154 UART: [kat] LMS
1,475,350 UART: [kat] --
1,476,123 UART: [cold-reset] ++
1,476,511 UART: [fht] Storing FHT @ 0x50003400
1,479,224 UART: [idev] ++
1,479,392 UART: [idev] CDI.KEYID = 6
1,479,752 UART: [idev] SUBJECT.KEYID = 7
1,480,176 UART: [idev] UDS.KEYID = 0
1,480,521 ready_for_fw is high
1,480,521 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,486 UART: [idev] Erasing UDS.KEYID = 0
1,505,236 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,988 UART: [idev] --
1,515,039 UART: [ldev] ++
1,515,207 UART: [ldev] CDI.KEYID = 6
1,515,570 UART: [ldev] SUBJECT.KEYID = 5
1,515,996 UART: [ldev] AUTHORITY.KEYID = 7
1,516,459 UART: [ldev] FE.KEYID = 1
1,521,581 UART: [ldev] Erasing FE.KEYID = 1
1,546,632 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,176 UART: [ldev] --
1,585,671 UART: [fwproc] Waiting for Commands...
1,586,326 UART: [fwproc] Received command 0x46574c44
1,587,117 UART: [fwproc] Received Image of size 114332 bytes
2,884,301 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,179 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,531 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,486 >>> mbox cmd response: success
3,077,486 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,078,726 UART: [afmc] ++
3,078,894 UART: [afmc] CDI.KEYID = 6
3,079,256 UART: [afmc] SUBJECT.KEYID = 7
3,079,681 UART: [afmc] AUTHORITY.KEYID = 5
3,114,644 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,806 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,586 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,314 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,199 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,889 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,988 UART: [afmc] --
3,157,990 UART: [cold-reset] --
3,158,666 UART: [state] Locking Datavault
3,159,705 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,309 UART: [state] Locking ICCM
3,160,793 UART: [exit] Launching FMC @ 0x40000130
3,166,122 UART:
3,166,138 UART: Running Caliptra FMC ...
3,166,546 UART:
3,166,600 UART: [state] CFI Enabled
3,177,243 UART: [fht] FMC Alias Private Key: 7
3,285,866 UART: [art] Extend RT PCRs Done
3,286,294 UART: [art] Lock RT PCRs Done
3,288,006 UART: [art] Populate DV Done
3,296,513 UART: [fht] FMC Alias Private Key: 7
3,297,667 UART: [art] Derive CDI
3,297,947 UART: [art] Store in in slot 0x4
3,383,754 UART: [art] Derive Key Pair
3,384,114 UART: [art] Store priv key in slot 0x5
3,397,222 UART: [art] Derive Key Pair - Done
3,412,056 UART: [art] Signing Cert with AUTHO
3,412,536 UART: RITY.KEYID = 7
3,427,652 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,417 UART: [art] PUB.X = D1E221AB1BA2380116A102C3B011496B16A8D6DCC8E8A3FA39D99D38BE09CBABBF1EDBCF9E2F2ED89F07A3C3ED5FB43B
3,435,205 UART: [art] PUB.Y = 191BCF46E287F1FE512465F193B1D6AABC54DA9DACEDBDAE2F41302E4ADF270AD95991582023BFA223E7BB3CA2B8CE69
3,442,176 UART: [art] SIG.R = 684372E730174B013BD52CCF9AEDC7FB464EEE881A44EB83B466CB6969F4028251625DD0F49ADE26225FE0272B10449F
3,448,944 UART: [art] SIG.S = 5131D84B984767E230F1C428D11DFFE341BD1B690B9466C4FE9776AF0B146E8ECC23699F45AAC97A971E0B1F1C06D237
3,473,459 UART: Caliptra RT
3,473,712 UART: [state] CFI Enabled
3,583,478 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,792 UART: [rt]cmd =0x44504543, len=136
3,677,758 >>> mbox cmd response data (136 bytes)
3,677,759 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,174 UART: [rt]cmd =0x4453424c, len=4
3,720,687 >>> mbox cmd response data (8 bytes)
3,720,688 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,750,549 UART: [rt]cmd =0x44504543, len=92
3,933,423 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,529 ready_for_fw is high
1,361,529 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,936 >>> mbox cmd response: success
2,927,936 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,989,918 UART:
2,989,934 UART: Running Caliptra FMC ...
2,990,342 UART:
2,990,396 UART: [state] CFI Enabled
3,001,095 UART: [fht] FMC Alias Private Key: 7
3,108,970 UART: [art] Extend RT PCRs Done
3,109,398 UART: [art] Lock RT PCRs Done
3,111,048 UART: [art] Populate DV Done
3,119,225 UART: [fht] FMC Alias Private Key: 7
3,120,191 UART: [art] Derive CDI
3,120,471 UART: [art] Store in in slot 0x4
3,206,268 UART: [art] Derive Key Pair
3,206,628 UART: [art] Store priv key in slot 0x5
3,220,070 UART: [art] Derive Key Pair - Done
3,234,654 UART: [art] Signing Cert with AUTHO
3,235,134 UART: RITY.KEYID = 7
3,250,298 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,063 UART: [art] PUB.X = 335900C47BB52B8F20CE51D55EECD457B3A235F4B356F9647ED83B5BA729F03B463FACC361B1815F3F5D7D6EC9C9FD27
3,257,825 UART: [art] PUB.Y = 79A8D7350E321FC349F00431E68C8C7CD668696E07B8B84DE67EB0317B4B55052342EA1F043A6352ED30C7D013AECA49
3,264,762 UART: [art] SIG.R = 66D1E6B98C14739F23CABF750724CF27A07E19CB75757403A167045B3741E6DED35DBDB951D4D82FFBAA877BF6B7A527
3,271,533 UART: [art] SIG.S = 0AD8D89A4979B4658B1DD316FE117E91CDB0D7907B6E84B665986097CFD3C5EB4D72EF8D6F01CAD0E3E031E52D59F8D3
3,294,978 UART: Caliptra RT
3,295,231 UART: [state] CFI Enabled
3,403,249 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,659 UART: [rt]cmd =0x44504543, len=136
3,497,521 >>> mbox cmd response data (136 bytes)
3,497,522 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,913 UART: [rt]cmd =0x4453424c, len=4
3,540,848 >>> mbox cmd response data (8 bytes)
3,540,849 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,570,596 UART: [rt]cmd =0x44504543, len=92
3,753,331 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,724 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,282 UART: [kat] SHA2-256
882,213 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,328 UART: [kat] ++
886,480 UART: [kat] sha1
890,762 UART: [kat] SHA2-256
892,700 UART: [kat] SHA2-384
895,455 UART: [kat] SHA2-512-ACC
897,356 UART: [kat] ECC-384
903,105 UART: [kat] HMAC-384Kdf
907,779 UART: [kat] LMS
1,475,975 UART: [kat] --
1,476,804 UART: [cold-reset] ++
1,477,318 UART: [fht] Storing FHT @ 0x50003400
1,480,159 UART: [idev] ++
1,480,327 UART: [idev] CDI.KEYID = 6
1,480,687 UART: [idev] SUBJECT.KEYID = 7
1,481,111 UART: [idev] UDS.KEYID = 0
1,481,456 ready_for_fw is high
1,481,456 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,579 UART: [idev] Erasing UDS.KEYID = 0
1,506,489 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,143 UART: [idev] --
1,516,150 UART: [ldev] ++
1,516,318 UART: [ldev] CDI.KEYID = 6
1,516,681 UART: [ldev] SUBJECT.KEYID = 5
1,517,107 UART: [ldev] AUTHORITY.KEYID = 7
1,517,570 UART: [ldev] FE.KEYID = 1
1,522,880 UART: [ldev] Erasing FE.KEYID = 1
1,548,405 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,233 UART: [ldev] --
1,587,636 UART: [fwproc] Waiting for Commands...
1,588,441 UART: [fwproc] Received command 0x46574c44
1,589,232 UART: [fwproc] Received Image of size 114332 bytes
2,886,658 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,998 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,350 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,147 >>> mbox cmd response: success
3,079,147 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,080,219 UART: [afmc] ++
3,080,387 UART: [afmc] CDI.KEYID = 6
3,080,749 UART: [afmc] SUBJECT.KEYID = 7
3,081,174 UART: [afmc] AUTHORITY.KEYID = 5
3,116,371 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,509 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,289 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,017 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,902 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,592 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,577 UART: [afmc] --
3,159,555 UART: [cold-reset] --
3,160,301 UART: [state] Locking Datavault
3,161,384 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,988 UART: [state] Locking ICCM
3,162,468 UART: [exit] Launching FMC @ 0x40000130
3,167,797 UART:
3,167,813 UART: Running Caliptra FMC ...
3,168,221 UART:
3,168,364 UART: [state] CFI Enabled
3,178,683 UART: [fht] FMC Alias Private Key: 7
3,286,144 UART: [art] Extend RT PCRs Done
3,286,572 UART: [art] Lock RT PCRs Done
3,288,222 UART: [art] Populate DV Done
3,296,171 UART: [fht] FMC Alias Private Key: 7
3,297,257 UART: [art] Derive CDI
3,297,537 UART: [art] Store in in slot 0x4
3,383,292 UART: [art] Derive Key Pair
3,383,652 UART: [art] Store priv key in slot 0x5
3,396,686 UART: [art] Derive Key Pair - Done
3,411,250 UART: [art] Signing Cert with AUTHO
3,411,730 UART: RITY.KEYID = 7
3,427,146 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,911 UART: [art] PUB.X = 0FDBA014C5B7D37510326512C8FAA20D0B6753A7422260B2D44C9F30A1D56DEB23343E022A244DB160EDF78345F15C0C
3,434,670 UART: [art] PUB.Y = D966BCC8DCE237C0508A5E771E910EC1B8396DCFAE542A75B3940BB792874E60CFB88D43CF76307AA6BD35354E7C4BE8
3,441,628 UART: [art] SIG.R = 6C5290860515EAAB9AF95D844450B9B0360D0793F56CC46152CA4739D073F879CC0BE9A0A187CFCEB8FB0DFA57C16F5E
3,448,395 UART: [art] SIG.S = 9EB39BFE91E309EF007D9ECB5C451E35016A61C2CB7C80D85074EAD7D8A570051B4A8FC678D2F96C5CFF052EEF303B1E
3,472,688 UART: Caliptra RT
3,473,033 UART: [state] CFI Enabled
3,581,598 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,230 UART: [rt]cmd =0x44504543, len=136
3,677,120 >>> mbox cmd response data (136 bytes)
3,677,121 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,592 UART: [rt]cmd =0x4453424c, len=4
3,720,079 >>> mbox cmd response data (8 bytes)
3,720,080 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,750,077 UART: [rt]cmd =0x44504543, len=92
3,934,214 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,330 ready_for_fw is high
1,363,330 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,547 >>> mbox cmd response: success
2,928,547 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,990,795 UART:
2,990,811 UART: Running Caliptra FMC ...
2,991,219 UART:
2,991,362 UART: [state] CFI Enabled
3,001,943 UART: [fht] FMC Alias Private Key: 7
3,109,902 UART: [art] Extend RT PCRs Done
3,110,330 UART: [art] Lock RT PCRs Done
3,111,866 UART: [art] Populate DV Done
3,120,125 UART: [fht] FMC Alias Private Key: 7
3,121,167 UART: [art] Derive CDI
3,121,447 UART: [art] Store in in slot 0x4
3,207,042 UART: [art] Derive Key Pair
3,207,402 UART: [art] Store priv key in slot 0x5
3,220,674 UART: [art] Derive Key Pair - Done
3,235,635 UART: [art] Signing Cert with AUTHO
3,236,115 UART: RITY.KEYID = 7
3,251,597 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,362 UART: [art] PUB.X = 6CF7F39B4F81890318C437C3A675D93E780D7B890189019BC998A71BF874CD18D51F6C74EC5FC3D75B2930492C2FEAA2
3,259,124 UART: [art] PUB.Y = EC816D51B6D835EFCF5B1BF5FC244E3474B4179D013B5C6FF18D1554C18E4D63D9A5EE47B2DE6E06B76E234FBE781B52
3,266,084 UART: [art] SIG.R = 0A6730DF9195EB088139C47D9EB9A5A22EA9CF784D8F4B79FA250E962258CCDF8B86106E4CD8E7E5CFA75771087C7FA3
3,272,854 UART: [art] SIG.S = 93EA972551862E3DB032711839C3C6167F3E1FC984E28C8065C1A435205B00DDA28E42E7FB9ABF33156AC76521DF3D23
3,296,825 UART: Caliptra RT
3,297,170 UART: [state] CFI Enabled
3,405,043 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,457 UART: [rt]cmd =0x44504543, len=136
3,500,601 >>> mbox cmd response data (136 bytes)
3,500,602 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,861 UART: [rt]cmd =0x4453424c, len=4
3,543,590 >>> mbox cmd response data (8 bytes)
3,543,591 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,510 UART: [rt]cmd =0x44504543, len=92
3,757,009 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
893,064 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,189 UART: [kat] ++
897,341 UART: [kat] sha1
901,415 UART: [kat] SHA2-256
903,355 UART: [kat] SHA2-384
906,172 UART: [kat] SHA2-512-ACC
908,073 UART: [kat] ECC-384
917,788 UART: [kat] HMAC-384Kdf
922,416 UART: [kat] LMS
1,170,744 UART: [kat] --
1,171,827 UART: [cold-reset] ++
1,172,203 UART: [fht] FHT @ 0x50003400
1,175,022 UART: [idev] ++
1,175,190 UART: [idev] CDI.KEYID = 6
1,175,550 UART: [idev] SUBJECT.KEYID = 7
1,175,974 UART: [idev] UDS.KEYID = 0
1,176,319 ready_for_fw is high
1,176,319 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,730 UART: [idev] Erasing UDS.KEYID = 0
1,200,353 UART: [idev] Sha1 KeyId Algorithm
1,208,971 UART: [idev] --
1,210,175 UART: [ldev] ++
1,210,343 UART: [ldev] CDI.KEYID = 6
1,210,706 UART: [ldev] SUBJECT.KEYID = 5
1,211,132 UART: [ldev] AUTHORITY.KEYID = 7
1,211,595 UART: [ldev] FE.KEYID = 1
1,216,733 UART: [ldev] Erasing FE.KEYID = 1
1,243,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,195 UART: [ldev] --
1,282,666 UART: [fwproc] Wait for Commands...
1,283,452 UART: [fwproc] Recv command 0x46574c44
1,284,180 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,576 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,880 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,697 >>> mbox cmd response: success
2,774,697 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,775,933 UART: [afmc] ++
2,776,101 UART: [afmc] CDI.KEYID = 6
2,776,463 UART: [afmc] SUBJECT.KEYID = 7
2,776,888 UART: [afmc] AUTHORITY.KEYID = 5
2,812,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,796 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,544 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,272 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,157 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,876 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,628 UART: [afmc] --
2,855,702 UART: [cold-reset] --
2,856,654 UART: [state] Locking Datavault
2,857,733 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,337 UART: [state] Locking ICCM
2,859,005 UART: [exit] Launching FMC @ 0x40000130
2,864,334 UART:
2,864,350 UART: Running Caliptra FMC ...
2,864,758 UART:
2,864,812 UART: [state] CFI Enabled
2,875,363 UART: [fht] FMC Alias Private Key: 7
2,983,310 UART: [art] Extend RT PCRs Done
2,983,738 UART: [art] Lock RT PCRs Done
2,985,208 UART: [art] Populate DV Done
2,993,313 UART: [fht] FMC Alias Private Key: 7
2,994,247 UART: [art] Derive CDI
2,994,527 UART: [art] Store in in slot 0x4
3,079,876 UART: [art] Derive Key Pair
3,080,236 UART: [art] Store priv key in slot 0x5
3,093,084 UART: [art] Derive Key Pair - Done
3,107,905 UART: [art] Signing Cert with AUTHO
3,108,385 UART: RITY.KEYID = 7
3,123,301 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,066 UART: [art] PUB.X = 003683FA168F159ADC3BDDC1061B4F48852579DF970080B5F81EF6AC7375777DC968C49F7E582FE47AAFD0D98601F2AF
3,130,794 UART: [art] PUB.Y = 97D551F2E893DAFBF02B4008591FC756E0800E6B1475889DC21AD481428724C4A2F7F9E8F243BF6DC5BA3CAABD3BEA6E
3,137,754 UART: [art] SIG.R = BFC9592D1BC847295AD49111C0DD78D64A354432D28BB99913F26708CAB13CA0E0DE9DAF4055CACB1CFDF99137A7347A
3,144,535 UART: [art] SIG.S = E99BAB1B4B93C5494DB7A98A5CCCCB34ACFFF7F5C9D1A5D2234CD6225D0793A1A10ED0E0D23161BA6AC5B32D2AA90340
3,168,701 UART: Caliptra RT
3,168,954 UART: [state] CFI Enabled
3,277,354 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,690 UART: [rt]cmd =0x44504543, len=136
3,371,726 >>> mbox cmd response data (136 bytes)
3,371,727 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,344 UART: [rt]cmd =0x4453424c, len=4
3,415,423 >>> mbox cmd response data (8 bytes)
3,415,424 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,621 UART: [rt]cmd =0x44504543, len=92
3,628,437 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,007 ready_for_fw is high
1,059,007 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,180 >>> mbox cmd response: success
2,625,180 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,687,510 UART:
2,687,526 UART: Running Caliptra FMC ...
2,687,934 UART:
2,687,988 UART: [state] CFI Enabled
2,698,623 UART: [fht] FMC Alias Private Key: 7
2,806,352 UART: [art] Extend RT PCRs Done
2,806,780 UART: [art] Lock RT PCRs Done
2,808,126 UART: [art] Populate DV Done
2,816,129 UART: [fht] FMC Alias Private Key: 7
2,817,193 UART: [art] Derive CDI
2,817,473 UART: [art] Store in in slot 0x4
2,903,486 UART: [art] Derive Key Pair
2,903,846 UART: [art] Store priv key in slot 0x5
2,916,806 UART: [art] Derive Key Pair - Done
2,931,684 UART: [art] Signing Cert with AUTHO
2,932,164 UART: RITY.KEYID = 7
2,947,368 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,133 UART: [art] PUB.X = 7AED2380D4D24E5DC5492701C2DE3BF571BE5DB04F99F0979143B433A42AE1C994F9EFA1FD25F79DA8E0D6CC19E2D615
2,954,916 UART: [art] PUB.Y = 11B643B9B60DB11409BF69A669B349F21EF1B6D93916CE716BEED358A94B96080D78063D88C3200C69B4F96DCC3AD3F6
2,961,854 UART: [art] SIG.R = 357877133A64F479663CE1F017DABECD9AD17E238FFBF255E2A982078467AEA8ED0E62A335321EF0047EB764876F6598
2,968,617 UART: [art] SIG.S = 57ACB82FFB732BA3AA30407D9C6E6E306D80339EBB01798C548CD8802A46396FC1B4ECB0651E78D49B076A71115F3FA6
2,993,072 UART: Caliptra RT
2,993,325 UART: [state] CFI Enabled
3,101,392 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,790 UART: [rt]cmd =0x44504543, len=136
3,196,016 >>> mbox cmd response data (136 bytes)
3,196,017 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,264 UART: [rt]cmd =0x4453424c, len=4
3,239,989 >>> mbox cmd response data (8 bytes)
3,239,990 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,270,049 UART: [rt]cmd =0x44504543, len=92
3,453,701 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [kat] SHA2-256
893,433 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,558 UART: [kat] ++
897,710 UART: [kat] sha1
901,842 UART: [kat] SHA2-256
903,782 UART: [kat] SHA2-384
906,511 UART: [kat] SHA2-512-ACC
908,412 UART: [kat] ECC-384
918,137 UART: [kat] HMAC-384Kdf
922,883 UART: [kat] LMS
1,171,211 UART: [kat] --
1,172,240 UART: [cold-reset] ++
1,172,598 UART: [fht] FHT @ 0x50003400
1,175,311 UART: [idev] ++
1,175,479 UART: [idev] CDI.KEYID = 6
1,175,839 UART: [idev] SUBJECT.KEYID = 7
1,176,263 UART: [idev] UDS.KEYID = 0
1,176,608 ready_for_fw is high
1,176,608 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,265 UART: [idev] Erasing UDS.KEYID = 0
1,200,938 UART: [idev] Sha1 KeyId Algorithm
1,209,410 UART: [idev] --
1,210,530 UART: [ldev] ++
1,210,698 UART: [ldev] CDI.KEYID = 6
1,211,061 UART: [ldev] SUBJECT.KEYID = 5
1,211,487 UART: [ldev] AUTHORITY.KEYID = 7
1,211,950 UART: [ldev] FE.KEYID = 1
1,217,570 UART: [ldev] Erasing FE.KEYID = 1
1,244,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,354 UART: [ldev] --
1,283,707 UART: [fwproc] Wait for Commands...
1,284,479 UART: [fwproc] Recv command 0x46574c44
1,285,207 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,926 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,537 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,841 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,618 >>> mbox cmd response: success
2,775,618 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,776,668 UART: [afmc] ++
2,776,836 UART: [afmc] CDI.KEYID = 6
2,777,198 UART: [afmc] SUBJECT.KEYID = 7
2,777,623 UART: [afmc] AUTHORITY.KEYID = 5
2,813,048 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,361 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,109 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,837 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,722 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,441 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,141 UART: [afmc] --
2,856,181 UART: [cold-reset] --
2,857,311 UART: [state] Locking Datavault
2,858,480 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,084 UART: [state] Locking ICCM
2,859,508 UART: [exit] Launching FMC @ 0x40000130
2,864,837 UART:
2,864,853 UART: Running Caliptra FMC ...
2,865,261 UART:
2,865,404 UART: [state] CFI Enabled
2,875,967 UART: [fht] FMC Alias Private Key: 7
2,983,434 UART: [art] Extend RT PCRs Done
2,983,862 UART: [art] Lock RT PCRs Done
2,985,298 UART: [art] Populate DV Done
2,993,607 UART: [fht] FMC Alias Private Key: 7
2,994,575 UART: [art] Derive CDI
2,994,855 UART: [art] Store in in slot 0x4
3,080,794 UART: [art] Derive Key Pair
3,081,154 UART: [art] Store priv key in slot 0x5
3,094,850 UART: [art] Derive Key Pair - Done
3,109,661 UART: [art] Signing Cert with AUTHO
3,110,141 UART: RITY.KEYID = 7
3,125,445 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,210 UART: [art] PUB.X = C629E29B9806D95348725C6638D0CED294F321E7DF49C7B6C88231C1AB9CAA19355E4F8DC338362B99260836ECD468C5
3,132,974 UART: [art] PUB.Y = ABDA00623EFB53C7D9A91B0FDF4BEC00A4E0AFE45E0B191BD3BF2A5D734E25525EA15208A5EC271DF0DC5998990A720C
3,139,887 UART: [art] SIG.R = A6EA649AC09D49FD3383F38C62D2568937CDD07836A6B62B50DD296A5575D035A4C200844AFCC0AF71796E8D7AD4B454
3,146,641 UART: [art] SIG.S = 70A4EF5D2C49426B0AF836C40E89EE2F39C6595624BB2C7E892C666C2AB6C4DD35D3BAC3B7E2E337AA665D514E0CA3E6
3,170,225 UART: Caliptra RT
3,170,570 UART: [state] CFI Enabled
3,278,371 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,713 UART: [rt]cmd =0x44504543, len=136
3,373,725 >>> mbox cmd response data (136 bytes)
3,373,726 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,037 UART: [rt]cmd =0x4453424c, len=4
3,417,310 >>> mbox cmd response data (8 bytes)
3,417,311 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,108 UART: [rt]cmd =0x44504543, len=92
3,630,620 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,884 ready_for_fw is high
1,060,884 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,211 >>> mbox cmd response: success
2,627,211 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,689,497 UART:
2,689,513 UART: Running Caliptra FMC ...
2,689,921 UART:
2,690,064 UART: [state] CFI Enabled
2,700,523 UART: [fht] FMC Alias Private Key: 7
2,808,554 UART: [art] Extend RT PCRs Done
2,808,982 UART: [art] Lock RT PCRs Done
2,810,920 UART: [art] Populate DV Done
2,819,109 UART: [fht] FMC Alias Private Key: 7
2,820,077 UART: [art] Derive CDI
2,820,357 UART: [art] Store in in slot 0x4
2,905,872 UART: [art] Derive Key Pair
2,906,232 UART: [art] Store priv key in slot 0x5
2,919,748 UART: [art] Derive Key Pair - Done
2,934,368 UART: [art] Signing Cert with AUTHO
2,934,848 UART: RITY.KEYID = 7
2,950,176 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,941 UART: [art] PUB.X = 0D6FB3E560FA7A3C3CF9161C0A877B857F2F993C7EAE6E4110F9703FFE31A77E18C37EB903E319597E9BFE42428494C7
2,957,710 UART: [art] PUB.Y = 4A8CCAA1135B719FF0C9D84D7F610F60A1D0C392CD45B5928FD7E4876B78D19AF834F4B9078F1EA9CFBE45F28031E6BA
2,964,670 UART: [art] SIG.R = 3DA38F831944B9199E01C948D0A61E0032EC37B05A7C9DC07BABE611406D58D81BDC37FF271E4D6F7912BD226932A0B6
2,971,421 UART: [art] SIG.S = 93F914F06B1CAD1D99042BCE63F465AECB018243C66DDD8122555EF23479303C003AD88D9E53F2FE1CEEFA39B6CDEC4B
2,995,442 UART: Caliptra RT
2,995,787 UART: [state] CFI Enabled
3,103,858 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,292 UART: [rt]cmd =0x44504543, len=136
3,198,624 >>> mbox cmd response data (136 bytes)
3,198,625 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,772 UART: [rt]cmd =0x4453424c, len=4
3,241,731 >>> mbox cmd response data (8 bytes)
3,241,732 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,271,451 UART: [rt]cmd =0x44504543, len=92
3,454,919 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,472 UART: [kat] SHA2-256
891,022 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,151 UART: [kat] ++
895,303 UART: [kat] sha1
899,453 UART: [kat] SHA2-256
901,393 UART: [kat] SHA2-384
903,940 UART: [kat] SHA2-512-ACC
905,841 UART: [kat] ECC-384
915,530 UART: [kat] HMAC-384Kdf
920,168 UART: [kat] LMS
1,168,480 UART: [kat] --
1,169,527 UART: [cold-reset] ++
1,170,071 UART: [fht] FHT @ 0x50003400
1,172,831 UART: [idev] ++
1,172,999 UART: [idev] CDI.KEYID = 6
1,173,360 UART: [idev] SUBJECT.KEYID = 7
1,173,785 UART: [idev] UDS.KEYID = 0
1,174,131 ready_for_fw is high
1,174,131 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,949 UART: [idev] Erasing UDS.KEYID = 0
1,199,677 UART: [idev] Sha1 KeyId Algorithm
1,208,753 UART: [idev] --
1,209,638 UART: [ldev] ++
1,209,806 UART: [ldev] CDI.KEYID = 6
1,210,170 UART: [ldev] SUBJECT.KEYID = 5
1,210,597 UART: [ldev] AUTHORITY.KEYID = 7
1,211,060 UART: [ldev] FE.KEYID = 1
1,216,136 UART: [ldev] Erasing FE.KEYID = 1
1,242,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,476 UART: [ldev] --
1,281,844 UART: [fwproc] Wait for Commands...
1,282,633 UART: [fwproc] Recv command 0x46574c44
1,283,366 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,150 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,459 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,325 >>> mbox cmd response: success
2,773,325 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,774,434 UART: [afmc] ++
2,774,602 UART: [afmc] CDI.KEYID = 6
2,774,965 UART: [afmc] SUBJECT.KEYID = 7
2,775,391 UART: [afmc] AUTHORITY.KEYID = 5
2,810,170 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,236 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,987 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,716 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,599 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,318 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,941 UART: [afmc] --
2,853,019 UART: [cold-reset] --
2,853,825 UART: [state] Locking Datavault
2,854,966 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,570 UART: [state] Locking ICCM
2,856,184 UART: [exit] Launching FMC @ 0x40000130
2,861,513 UART:
2,861,529 UART: Running Caliptra FMC ...
2,861,937 UART:
2,861,991 UART: [state] CFI Enabled
2,872,204 UART: [fht] FMC Alias Private Key: 7
2,981,007 UART: [art] Extend RT PCRs Done
2,981,435 UART: [art] Lock RT PCRs Done
2,982,909 UART: [art] Populate DV Done
2,990,982 UART: [fht] FMC Alias Private Key: 7
2,992,142 UART: [art] Derive CDI
2,992,422 UART: [art] Store in in slot 0x4
3,078,041 UART: [art] Derive Key Pair
3,078,401 UART: [art] Store priv key in slot 0x5
3,091,371 UART: [art] Derive Key Pair - Done
3,105,907 UART: [art] Signing Cert with AUTHO
3,106,387 UART: RITY.KEYID = 7
3,121,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,702 UART: [art] PUB.X = 06BB09B14409F2C7E5ABC4F480FDBAD2B61E8A736F5A00FDD483014B887666A0B600865C2C5E84BB468D139369EB9FD5
3,129,426 UART: [art] PUB.Y = 9136130722E752382D3AA51C8C7D896F877745D1503E8501B20DD9C06D267FEF5DEDC54A1E9279D40F6F3D6795C08F5D
3,136,364 UART: [art] SIG.R = F4C83C840B19A279E780E99001C5C71A03DE98A826A3A5B2D6A95EDFD989E9D0E3854F132F661BD063928DCAB3091EF9
3,143,130 UART: [art] SIG.S = 3C6CBB8F868C7D6D2C0BDA9035DB3234D708BBEAC49AE5F4E61B1853A4D213F5FBA221390C646D2DC03ABFC0BAA9A993
3,166,514 UART: Caliptra RT
3,166,767 UART: [state] CFI Enabled
3,273,722 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,286 UART: [rt]cmd =0x44504543, len=136
3,369,182 >>> mbox cmd response data (136 bytes)
3,369,183 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,612 UART: [rt]cmd =0x4453424c, len=4
3,412,291 >>> mbox cmd response data (8 bytes)
3,412,292 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,225 UART: [rt]cmd =0x44504543, len=92
3,624,950 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,878 ready_for_fw is high
1,055,878 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,355 >>> mbox cmd response: success
2,621,355 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,683,031 UART:
2,683,047 UART: Running Caliptra FMC ...
2,683,455 UART:
2,683,509 UART: [state] CFI Enabled
2,693,982 UART: [fht] FMC Alias Private Key: 7
2,801,303 UART: [art] Extend RT PCRs Done
2,801,731 UART: [art] Lock RT PCRs Done
2,803,219 UART: [art] Populate DV Done
2,811,316 UART: [fht] FMC Alias Private Key: 7
2,812,424 UART: [art] Derive CDI
2,812,704 UART: [art] Store in in slot 0x4
2,898,503 UART: [art] Derive Key Pair
2,898,863 UART: [art] Store priv key in slot 0x5
2,911,499 UART: [art] Derive Key Pair - Done
2,926,057 UART: [art] Signing Cert with AUTHO
2,926,537 UART: RITY.KEYID = 7
2,941,625 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,390 UART: [art] PUB.X = 090257CBFBBD7939EA111FADED94F4ACAAC140B10BBECA0A7FE029D1AE54A95AB03C8717DDF4BE79BFC00DCAD35422B9
2,949,179 UART: [art] PUB.Y = FC7A268E3629E6D04AC57D71EA86648FEEF30392967CB2EECA80908ECAA88AD90E3CBF3B0BEA3A283166FC5B23F9B0A5
2,956,142 UART: [art] SIG.R = E8BA150ACF43B0C178D5EC78F418B17D44139484C3C43E344C31BCE7E4B92AEE9F849C2BF626148BDAEBB6A9148BC411
2,962,925 UART: [art] SIG.S = 1417C1D8827B4085C61A5488E9C6B03D0F674D0B9D223548107729F5F7E2EA86E15A1E0EB516AAA8898EC4BE9AC139D4
2,986,897 UART: Caliptra RT
2,987,150 UART: [state] CFI Enabled
3,095,351 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,277 UART: [rt]cmd =0x44504543, len=136
3,189,527 >>> mbox cmd response data (136 bytes)
3,189,528 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,917 UART: [rt]cmd =0x4453424c, len=4
3,232,138 >>> mbox cmd response data (8 bytes)
3,232,139 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,262,070 UART: [rt]cmd =0x44504543, len=92
3,444,718 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,496 UART: [state] WD Timer not started. Device not locked for debugging
87,731 UART: [kat] SHA2-256
891,281 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,410 UART: [kat] ++
895,562 UART: [kat] sha1
899,820 UART: [kat] SHA2-256
901,760 UART: [kat] SHA2-384
904,461 UART: [kat] SHA2-512-ACC
906,362 UART: [kat] ECC-384
916,313 UART: [kat] HMAC-384Kdf
920,967 UART: [kat] LMS
1,169,279 UART: [kat] --
1,170,316 UART: [cold-reset] ++
1,170,666 UART: [fht] FHT @ 0x50003400
1,173,202 UART: [idev] ++
1,173,370 UART: [idev] CDI.KEYID = 6
1,173,731 UART: [idev] SUBJECT.KEYID = 7
1,174,156 UART: [idev] UDS.KEYID = 0
1,174,502 ready_for_fw is high
1,174,502 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,044 UART: [idev] Erasing UDS.KEYID = 0
1,199,120 UART: [idev] Sha1 KeyId Algorithm
1,208,086 UART: [idev] --
1,209,081 UART: [ldev] ++
1,209,249 UART: [ldev] CDI.KEYID = 6
1,209,613 UART: [ldev] SUBJECT.KEYID = 5
1,210,040 UART: [ldev] AUTHORITY.KEYID = 7
1,210,503 UART: [ldev] FE.KEYID = 1
1,215,753 UART: [ldev] Erasing FE.KEYID = 1
1,242,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,275 UART: [ldev] --
1,281,739 UART: [fwproc] Wait for Commands...
1,282,510 UART: [fwproc] Recv command 0x46574c44
1,283,243 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,383 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,692 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,490 >>> mbox cmd response: success
2,772,490 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,773,547 UART: [afmc] ++
2,773,715 UART: [afmc] CDI.KEYID = 6
2,774,078 UART: [afmc] SUBJECT.KEYID = 7
2,774,504 UART: [afmc] AUTHORITY.KEYID = 5
2,810,225 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,577 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,328 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,057 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,940 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,659 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,570 UART: [afmc] --
2,853,494 UART: [cold-reset] --
2,854,438 UART: [state] Locking Datavault
2,855,495 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,099 UART: [state] Locking ICCM
2,856,647 UART: [exit] Launching FMC @ 0x40000130
2,861,976 UART:
2,861,992 UART: Running Caliptra FMC ...
2,862,400 UART:
2,862,543 UART: [state] CFI Enabled
2,873,190 UART: [fht] FMC Alias Private Key: 7
2,980,955 UART: [art] Extend RT PCRs Done
2,981,383 UART: [art] Lock RT PCRs Done
2,983,223 UART: [art] Populate DV Done
2,991,506 UART: [fht] FMC Alias Private Key: 7
2,992,468 UART: [art] Derive CDI
2,992,748 UART: [art] Store in in slot 0x4
3,078,609 UART: [art] Derive Key Pair
3,078,969 UART: [art] Store priv key in slot 0x5
3,092,505 UART: [art] Derive Key Pair - Done
3,107,143 UART: [art] Signing Cert with AUTHO
3,107,623 UART: RITY.KEYID = 7
3,122,729 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,494 UART: [art] PUB.X = 848EB307836260B83C7A03BF1328087520B2831B7A8634FDC4B1B1E339EEE70DF5CA06B284C6AB9ED0E50F26F1465764
3,130,248 UART: [art] PUB.Y = 9C0BCC7AB36693142F864BE7484117E6B1F79CEA8ABF8C7380C6A8FE08AEC8D7A422FEA69325CA3496EFBB4A0C0A6BFD
3,137,210 UART: [art] SIG.R = 3BDA890C9CD51900D135F27455F0DB33B5533DC1A32115F4B2787CE179F066260A00FF200D55580E653F950CCCFDF2B4
3,143,925 UART: [art] SIG.S = 83D2471F7D9B9E27A90217BD9CB98793427CC340B143F57786B6C3A1AE9496CA487FE2BC3045B0DF4F46075FA397A541
3,168,250 UART: Caliptra RT
3,168,595 UART: [state] CFI Enabled
3,277,356 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,596 UART: [rt]cmd =0x44504543, len=136
3,372,182 >>> mbox cmd response data (136 bytes)
3,372,183 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,426 UART: [rt]cmd =0x4453424c, len=4
3,415,505 >>> mbox cmd response data (8 bytes)
3,415,506 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,445 UART: [rt]cmd =0x44504543, len=92
3,628,827 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,599 ready_for_fw is high
1,056,599 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,014 >>> mbox cmd response: success
2,624,014 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,685,398 UART:
2,685,414 UART: Running Caliptra FMC ...
2,685,822 UART:
2,685,965 UART: [state] CFI Enabled
2,696,282 UART: [fht] FMC Alias Private Key: 7
2,804,535 UART: [art] Extend RT PCRs Done
2,804,963 UART: [art] Lock RT PCRs Done
2,806,787 UART: [art] Populate DV Done
2,814,930 UART: [fht] FMC Alias Private Key: 7
2,815,882 UART: [art] Derive CDI
2,816,162 UART: [art] Store in in slot 0x4
2,901,681 UART: [art] Derive Key Pair
2,902,041 UART: [art] Store priv key in slot 0x5
2,915,229 UART: [art] Derive Key Pair - Done
2,929,975 UART: [art] Signing Cert with AUTHO
2,930,455 UART: RITY.KEYID = 7
2,946,063 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,828 UART: [art] PUB.X = 22B9B2674797490992137F8ECDAB1D7FF1705E0169CCFFFC3C5350B4C98E17C6A6C7213BB079674626E30980F368066D
2,953,584 UART: [art] PUB.Y = E601FD3540FA6BDD587100D8AA9F84F1111052605155878E0B70ADCAFC582790CA6EA4BC4D55C65D07DF443D1B1E32B1
2,960,513 UART: [art] SIG.R = 9075B8B3220490B56478BF473BE17460051DF099A727E939C16890D8876285B313C33082E409508522FF2F395579AAC7
2,967,256 UART: [art] SIG.S = C6C4C645E2929ACA4C90CFDA2C3E60C2166D1D16D9CA9C6D724E689F5B0A4A2FB7B5ABC0BDC4602657C11328368BDDB1
2,990,670 UART: Caliptra RT
2,991,015 UART: [state] CFI Enabled
3,098,161 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,631 UART: [rt]cmd =0x44504543, len=136
3,193,531 >>> mbox cmd response data (136 bytes)
3,193,532 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,023 UART: [rt]cmd =0x4453424c, len=4
3,236,592 >>> mbox cmd response data (8 bytes)
3,236,593 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,266,678 UART: [rt]cmd =0x44504543, len=92
3,450,241 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
Truncated 47782 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.51s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.59s
Truncated 47782 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.47s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.54s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.69s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 5.16s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.70s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.47s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.50s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 5.57s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.70s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,065 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,665 UART: [kat] SHA2-256
881,596 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,711 UART: [kat] ++
885,863 UART: [kat] sha1
890,131 UART: [kat] SHA2-256
892,069 UART: [kat] SHA2-384
894,852 UART: [kat] SHA2-512-ACC
896,753 UART: [kat] ECC-384
902,662 UART: [kat] HMAC-384Kdf
907,478 UART: [kat] LMS
1,475,674 UART: [kat] --
1,476,551 UART: [cold-reset] ++
1,476,879 UART: [fht] Storing FHT @ 0x50003400
1,479,672 UART: [idev] ++
1,479,840 UART: [idev] CDI.KEYID = 6
1,480,200 UART: [idev] SUBJECT.KEYID = 7
1,480,624 UART: [idev] UDS.KEYID = 0
1,480,969 ready_for_fw is high
1,480,969 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,082 UART: [idev] Erasing UDS.KEYID = 0
1,505,722 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,286 UART: [idev] --
1,515,307 UART: [ldev] ++
1,515,475 UART: [ldev] CDI.KEYID = 6
1,515,838 UART: [ldev] SUBJECT.KEYID = 5
1,516,264 UART: [ldev] AUTHORITY.KEYID = 7
1,516,727 UART: [ldev] FE.KEYID = 1
1,522,161 UART: [ldev] Erasing FE.KEYID = 1
1,547,912 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,364 UART: [ldev] --
1,586,749 UART: [fwproc] Waiting for Commands...
1,587,442 UART: [fwproc] Received command 0x46574c44
1,588,233 UART: [fwproc] Received Image of size 114332 bytes
2,885,517 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,763 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,115 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,874 >>> mbox cmd response: success
3,077,874 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,078,952 UART: [afmc] ++
3,079,120 UART: [afmc] CDI.KEYID = 6
3,079,482 UART: [afmc] SUBJECT.KEYID = 7
3,079,907 UART: [afmc] AUTHORITY.KEYID = 5
3,115,552 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,814 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,594 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,322 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,207 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,897 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,854 UART: [afmc] --
3,158,958 UART: [cold-reset] --
3,159,944 UART: [state] Locking Datavault
3,161,045 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,649 UART: [state] Locking ICCM
3,162,105 UART: [exit] Launching FMC @ 0x40000130
3,167,434 UART:
3,167,450 UART: Running Caliptra FMC ...
3,167,858 UART:
3,167,912 UART: [state] CFI Enabled
3,178,343 UART: [fht] FMC Alias Private Key: 7
3,286,320 UART: [art] Extend RT PCRs Done
3,286,748 UART: [art] Lock RT PCRs Done
3,288,304 UART: [art] Populate DV Done
3,296,759 UART: [fht] FMC Alias Private Key: 7
3,297,873 UART: [art] Derive CDI
3,298,153 UART: [art] Store in in slot 0x4
3,383,700 UART: [art] Derive Key Pair
3,384,060 UART: [art] Store priv key in slot 0x5
3,397,332 UART: [art] Derive Key Pair - Done
3,412,506 UART: [art] Signing Cert with AUTHO
3,412,986 UART: RITY.KEYID = 7
3,427,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,655 UART: [art] PUB.X = 41E6FA059DD4D9853BC95551301BB0250887568B4C348DB826E09742AC755DAFB251FF9E03179B33F7E50A3058F0CFC8
3,435,415 UART: [art] PUB.Y = 362F5F81859C628A29FF27F2D42485C5DC7B07C21CE638CB2EBFC724A5652B12C769DE7C1C9970E41B6C67A33A0489B2
3,442,365 UART: [art] SIG.R = 0B7D1D425AC3F09FB7832CDFFAFBD8CBF875847BE45950228A9A858241EC5642A4B97B9CAA17406B4DF9BA23072DFFF9
3,449,147 UART: [art] SIG.S = FF4FDA96DBD1F6B593E211E4BD02CE02B828071B4437DAFA37801EE7805FBDC0C1022151AC9B5E3F2483BBDD16AA8F38
3,472,636 UART: Caliptra RT
3,472,889 UART: [state] CFI Enabled
3,581,758 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,595,923 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,753 ready_for_fw is high
1,362,753 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,864 >>> mbox cmd response: success
2,927,864 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,988,956 UART:
2,988,972 UART: Running Caliptra FMC ...
2,989,380 UART:
2,989,434 UART: [state] CFI Enabled
2,999,999 UART: [fht] FMC Alias Private Key: 7
3,108,124 UART: [art] Extend RT PCRs Done
3,108,552 UART: [art] Lock RT PCRs Done
3,110,366 UART: [art] Populate DV Done
3,118,585 UART: [fht] FMC Alias Private Key: 7
3,119,643 UART: [art] Derive CDI
3,119,923 UART: [art] Store in in slot 0x4
3,205,518 UART: [art] Derive Key Pair
3,205,878 UART: [art] Store priv key in slot 0x5
3,219,124 UART: [art] Derive Key Pair - Done
3,234,387 UART: [art] Signing Cert with AUTHO
3,234,867 UART: RITY.KEYID = 7
3,250,265 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,030 UART: [art] PUB.X = 21106DFB3259EF1B0F7DD9E58C6CD93A9552D7D6E0B2248B770BE18F46D9F036601323EEE63E9BB4A8F2ED3E45CDC520
3,257,808 UART: [art] PUB.Y = 7251567804B001B04871330D41ED9DB19188DD6628D3CE509C0F1E2A7E7D3BA76503A03DB83A299434FBCE9CD308F6DF
3,264,744 UART: [art] SIG.R = 15F04AC8E629702A5B2EB2B03E061489B78CFE688C79A100ADB14A79FC1C7118BC602D2D92441B4F864FBCBD528879A2
3,271,497 UART: [art] SIG.S = AB565C6CB78B01F9AC848B049FD5CEB06EA7AF0D354C08D024BD6C2CF1ECBC9451139979929A28291410CB3CC82EF6AC
3,295,256 UART: Caliptra RT
3,295,509 UART: [state] CFI Enabled
3,402,796 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,417,065 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,734 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,308 UART: [kat] SHA2-256
882,239 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,354 UART: [kat] ++
886,506 UART: [kat] sha1
890,510 UART: [kat] SHA2-256
892,448 UART: [kat] SHA2-384
895,293 UART: [kat] SHA2-512-ACC
897,194 UART: [kat] ECC-384
902,847 UART: [kat] HMAC-384Kdf
907,561 UART: [kat] LMS
1,475,757 UART: [kat] --
1,476,518 UART: [cold-reset] ++
1,476,918 UART: [fht] Storing FHT @ 0x50003400
1,479,713 UART: [idev] ++
1,479,881 UART: [idev] CDI.KEYID = 6
1,480,241 UART: [idev] SUBJECT.KEYID = 7
1,480,665 UART: [idev] UDS.KEYID = 0
1,481,010 ready_for_fw is high
1,481,010 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,979 UART: [idev] Erasing UDS.KEYID = 0
1,506,169 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,751 UART: [idev] --
1,515,838 UART: [ldev] ++
1,516,006 UART: [ldev] CDI.KEYID = 6
1,516,369 UART: [ldev] SUBJECT.KEYID = 5
1,516,795 UART: [ldev] AUTHORITY.KEYID = 7
1,517,258 UART: [ldev] FE.KEYID = 1
1,522,478 UART: [ldev] Erasing FE.KEYID = 1
1,547,989 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,881 UART: [ldev] --
1,587,386 UART: [fwproc] Waiting for Commands...
1,588,117 UART: [fwproc] Received command 0x46574c44
1,588,908 UART: [fwproc] Received Image of size 114332 bytes
2,885,166 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,116 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,468 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,445 >>> mbox cmd response: success
3,078,445 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,079,607 UART: [afmc] ++
3,079,775 UART: [afmc] CDI.KEYID = 6
3,080,137 UART: [afmc] SUBJECT.KEYID = 7
3,080,562 UART: [afmc] AUTHORITY.KEYID = 5
3,115,563 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,971 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,751 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,479 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,364 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,054 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,141 UART: [afmc] --
3,159,047 UART: [cold-reset] --
3,159,979 UART: [state] Locking Datavault
3,160,954 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,558 UART: [state] Locking ICCM
3,161,988 UART: [exit] Launching FMC @ 0x40000130
3,167,317 UART:
3,167,333 UART: Running Caliptra FMC ...
3,167,741 UART:
3,167,884 UART: [state] CFI Enabled
3,178,359 UART: [fht] FMC Alias Private Key: 7
3,285,368 UART: [art] Extend RT PCRs Done
3,285,796 UART: [art] Lock RT PCRs Done
3,287,296 UART: [art] Populate DV Done
3,295,501 UART: [fht] FMC Alias Private Key: 7
3,296,541 UART: [art] Derive CDI
3,296,821 UART: [art] Store in in slot 0x4
3,382,706 UART: [art] Derive Key Pair
3,383,066 UART: [art] Store priv key in slot 0x5
3,396,028 UART: [art] Derive Key Pair - Done
3,410,747 UART: [art] Signing Cert with AUTHO
3,411,227 UART: RITY.KEYID = 7
3,426,101 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,866 UART: [art] PUB.X = 6C30A6B3268E77617E53AE108DE9949895FFE03F7F2D0FD2096019749245C43C75BD1873F1C21D4BAA8AC73D20D9909D
3,433,632 UART: [art] PUB.Y = 603B0DCF3AAB581F235BF686BC6E5D6A934582C228A6808427242C218403C28C8A71C50FD2DBACD6341D2312C9EC9B1F
3,440,581 UART: [art] SIG.R = 18969FF29D20A5200828FCE3444D9076CB3613FEEB441A8FB644982A3FF5B1FF7E8B65BF50A27220CF461E14B3F9BA83
3,447,356 UART: [art] SIG.S = B367F864260D9F98CFAC0E2E65BF255D8AEDDDA4374744692D4A5A1EB40B577E6A3FEBA69516ECCA532492E7703B01AC
3,471,881 UART: Caliptra RT
3,472,226 UART: [state] CFI Enabled
3,580,347 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,594,448 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,854 ready_for_fw is high
1,362,854 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,645 >>> mbox cmd response: success
2,928,645 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,990,461 UART:
2,990,477 UART: Running Caliptra FMC ...
2,990,885 UART:
2,991,028 UART: [state] CFI Enabled
3,001,479 UART: [fht] FMC Alias Private Key: 7
3,109,746 UART: [art] Extend RT PCRs Done
3,110,174 UART: [art] Lock RT PCRs Done
3,111,968 UART: [art] Populate DV Done
3,120,139 UART: [fht] FMC Alias Private Key: 7
3,121,233 UART: [art] Derive CDI
3,121,513 UART: [art] Store in in slot 0x4
3,206,992 UART: [art] Derive Key Pair
3,207,352 UART: [art] Store priv key in slot 0x5
3,220,774 UART: [art] Derive Key Pair - Done
3,235,835 UART: [art] Signing Cert with AUTHO
3,236,315 UART: RITY.KEYID = 7
3,251,517 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,282 UART: [art] PUB.X = AEF8CCD2C92EDCE3320C1D9D42477457D4FF8BD66D8B2F366D20472AACCB871839AE3029DC8B23E304AE60A556657F7D
3,259,062 UART: [art] PUB.Y = 1B1FAC80FA5634C286FF22FAA184B6463FACC6F726CFEFADF83C8C6BF75E1020E3F6756CED1FAC55ADD57DE25AD954C5
3,266,042 UART: [art] SIG.R = 6780399168D5B5677AC6B85DB888A5766A82708488F0407E6F1E65093EDE17251567E459BEA8B86A24B48A8F9B6BDEDA
3,272,809 UART: [art] SIG.S = F20DBD15490DA73064F8C47BCAD1AB2DCA37716244528711189D9C41B0F5B00E5829C1779871471CC6EC50CFD1CA0242
3,296,064 UART: Caliptra RT
3,296,409 UART: [state] CFI Enabled
3,404,832 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,418,885 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
893,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,409 UART: [kat] ++
897,561 UART: [kat] sha1
901,629 UART: [kat] SHA2-256
903,569 UART: [kat] SHA2-384
906,550 UART: [kat] SHA2-512-ACC
908,451 UART: [kat] ECC-384
917,936 UART: [kat] HMAC-384Kdf
922,568 UART: [kat] LMS
1,170,896 UART: [kat] --
1,171,813 UART: [cold-reset] ++
1,172,225 UART: [fht] FHT @ 0x50003400
1,174,814 UART: [idev] ++
1,174,982 UART: [idev] CDI.KEYID = 6
1,175,342 UART: [idev] SUBJECT.KEYID = 7
1,175,766 UART: [idev] UDS.KEYID = 0
1,176,111 ready_for_fw is high
1,176,111 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,838 UART: [idev] Erasing UDS.KEYID = 0
1,201,049 UART: [idev] Sha1 KeyId Algorithm
1,209,563 UART: [idev] --
1,210,465 UART: [ldev] ++
1,210,633 UART: [ldev] CDI.KEYID = 6
1,210,996 UART: [ldev] SUBJECT.KEYID = 5
1,211,422 UART: [ldev] AUTHORITY.KEYID = 7
1,211,885 UART: [ldev] FE.KEYID = 1
1,217,003 UART: [ldev] Erasing FE.KEYID = 1
1,243,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,145 UART: [ldev] --
1,282,604 UART: [fwproc] Wait for Commands...
1,283,374 UART: [fwproc] Recv command 0x46574c44
1,284,102 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,482 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,786 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,589 >>> mbox cmd response: success
2,771,589 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,772,837 UART: [afmc] ++
2,773,005 UART: [afmc] CDI.KEYID = 6
2,773,367 UART: [afmc] SUBJECT.KEYID = 7
2,773,792 UART: [afmc] AUTHORITY.KEYID = 5
2,809,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,756 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,504 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,232 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,117 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,836 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,772 UART: [afmc] --
2,852,678 UART: [cold-reset] --
2,853,402 UART: [state] Locking Datavault
2,854,445 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,049 UART: [state] Locking ICCM
2,855,553 UART: [exit] Launching FMC @ 0x40000130
2,860,882 UART:
2,860,898 UART: Running Caliptra FMC ...
2,861,306 UART:
2,861,360 UART: [state] CFI Enabled
2,872,033 UART: [fht] FMC Alias Private Key: 7
2,980,006 UART: [art] Extend RT PCRs Done
2,980,434 UART: [art] Lock RT PCRs Done
2,982,012 UART: [art] Populate DV Done
2,990,353 UART: [fht] FMC Alias Private Key: 7
2,991,473 UART: [art] Derive CDI
2,991,753 UART: [art] Store in in slot 0x4
3,077,406 UART: [art] Derive Key Pair
3,077,766 UART: [art] Store priv key in slot 0x5
3,090,708 UART: [art] Derive Key Pair - Done
3,105,214 UART: [art] Signing Cert with AUTHO
3,105,694 UART: RITY.KEYID = 7
3,121,068 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,833 UART: [art] PUB.X = 152BD2FB5273A296DD43A962515086921B26F2E43CD69C8C72AA5B3F0EC87CB86053CCF016EB87DACFD7871C36FD0121
3,128,607 UART: [art] PUB.Y = 455E1434D89AA509DC83C57337465238CBF363D10B58190000F93873CD43D73A15BF566000727A1A2EDE01DF3410106F
3,135,474 UART: [art] SIG.R = 5AEB60F7D3214C69B8C835A560DA31E911A7CA7D4E2891F379E61363406EF024D33BFFD3EFE37296EC7F917F45B49E7F
3,142,254 UART: [art] SIG.S = E394C07F5BAC1368C697801F0C21F18E82FFC63FCF7125862CFCD67685FF605A823C5FB05654802B6DBE065ABABCE8D7
3,165,713 UART: Caliptra RT
3,165,966 UART: [state] CFI Enabled
3,273,131 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,287,190 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,161 ready_for_fw is high
1,060,161 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,268 >>> mbox cmd response: success
2,626,268 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,688,590 UART:
2,688,606 UART: Running Caliptra FMC ...
2,689,014 UART:
2,689,068 UART: [state] CFI Enabled
2,699,643 UART: [fht] FMC Alias Private Key: 7
2,807,228 UART: [art] Extend RT PCRs Done
2,807,656 UART: [art] Lock RT PCRs Done
2,809,428 UART: [art] Populate DV Done
2,817,613 UART: [fht] FMC Alias Private Key: 7
2,818,699 UART: [art] Derive CDI
2,818,979 UART: [art] Store in in slot 0x4
2,904,868 UART: [art] Derive Key Pair
2,905,228 UART: [art] Store priv key in slot 0x5
2,918,686 UART: [art] Derive Key Pair - Done
2,933,082 UART: [art] Signing Cert with AUTHO
2,933,562 UART: RITY.KEYID = 7
2,948,730 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,495 UART: [art] PUB.X = 65B69BBECB104ED7C4C955D9181DDF6328B2BCD3386452E7FC59B9CB5DC51352E5EC02E0F6A57F6D089E6AF182F02605
2,956,270 UART: [art] PUB.Y = CAE15598ADE9B4A7C37719267CED8838E9FBE812AEC4060308EE37875BA3809BCDCAD98A3E0AF40521FD86973C3F5545
2,963,217 UART: [art] SIG.R = ED63F877817A7E5F0EEDEEDC3D0433A3D4632D764D08079BAEDAB0C787BFF72B989507BC028DEEB45173D4FCD2FBBFEC
2,969,997 UART: [art] SIG.S = 2364A943EB492B89687159910780C967BF57075BAF11FECB42B92D59147E7F3366E9F92FA2D909BDCD5636C7B63DBAC6
2,994,251 UART: Caliptra RT
2,994,504 UART: [state] CFI Enabled
3,102,279 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,116,500 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,764 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
893,673 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,798 UART: [kat] ++
897,950 UART: [kat] sha1
902,198 UART: [kat] SHA2-256
904,138 UART: [kat] SHA2-384
906,781 UART: [kat] SHA2-512-ACC
908,682 UART: [kat] ECC-384
918,283 UART: [kat] HMAC-384Kdf
922,955 UART: [kat] LMS
1,171,283 UART: [kat] --
1,172,192 UART: [cold-reset] ++
1,172,740 UART: [fht] FHT @ 0x50003400
1,175,309 UART: [idev] ++
1,175,477 UART: [idev] CDI.KEYID = 6
1,175,837 UART: [idev] SUBJECT.KEYID = 7
1,176,261 UART: [idev] UDS.KEYID = 0
1,176,606 ready_for_fw is high
1,176,606 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,093 UART: [idev] Erasing UDS.KEYID = 0
1,200,224 UART: [idev] Sha1 KeyId Algorithm
1,208,506 UART: [idev] --
1,209,438 UART: [ldev] ++
1,209,606 UART: [ldev] CDI.KEYID = 6
1,209,969 UART: [ldev] SUBJECT.KEYID = 5
1,210,395 UART: [ldev] AUTHORITY.KEYID = 7
1,210,858 UART: [ldev] FE.KEYID = 1
1,216,112 UART: [ldev] Erasing FE.KEYID = 1
1,242,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,194 UART: [ldev] --
1,281,679 UART: [fwproc] Wait for Commands...
1,282,391 UART: [fwproc] Recv command 0x46574c44
1,283,119 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,455 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,759 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,638 >>> mbox cmd response: success
2,772,638 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,773,712 UART: [afmc] ++
2,773,880 UART: [afmc] CDI.KEYID = 6
2,774,242 UART: [afmc] SUBJECT.KEYID = 7
2,774,667 UART: [afmc] AUTHORITY.KEYID = 5
2,810,002 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,399 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,127 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,012 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,731 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,583 UART: [afmc] --
2,853,711 UART: [cold-reset] --
2,854,569 UART: [state] Locking Datavault
2,855,574 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,178 UART: [state] Locking ICCM
2,856,726 UART: [exit] Launching FMC @ 0x40000130
2,862,055 UART:
2,862,071 UART: Running Caliptra FMC ...
2,862,479 UART:
2,862,622 UART: [state] CFI Enabled
2,872,885 UART: [fht] FMC Alias Private Key: 7
2,980,638 UART: [art] Extend RT PCRs Done
2,981,066 UART: [art] Lock RT PCRs Done
2,982,628 UART: [art] Populate DV Done
2,990,659 UART: [fht] FMC Alias Private Key: 7
2,991,615 UART: [art] Derive CDI
2,991,895 UART: [art] Store in in slot 0x4
3,077,282 UART: [art] Derive Key Pair
3,077,642 UART: [art] Store priv key in slot 0x5
3,091,382 UART: [art] Derive Key Pair - Done
3,106,232 UART: [art] Signing Cert with AUTHO
3,106,712 UART: RITY.KEYID = 7
3,121,792 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,557 UART: [art] PUB.X = 39B95ECBD2137F69559656F6A6ACCF7D87587E7A4A6F022BB91AC111C1C8F2A9CDB50A5F9A3D31E9B96E4978E6E66D5A
3,129,337 UART: [art] PUB.Y = 6415AC2882E309466D3798B96CDFF00B2F4E6FAB23F5D5956424A3BCA472D728298D03CB111E96669E2416D613AAD232
3,136,278 UART: [art] SIG.R = 7F803FFF5C83F1B876293D7E144940425A82E237A169154AF4462CB52E84EB522B137E8F811B0D44F7590D2CDB1DA2FD
3,143,046 UART: [art] SIG.S = F2F327D97A32335C6CDBE94DC82E5C3221DE34A58E0E7901450141AE462908C140C4B67DFD62FF1F84F16AAC963BD7A0
3,167,039 UART: Caliptra RT
3,167,384 UART: [state] CFI Enabled
3,275,753 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,289,742 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,894 ready_for_fw is high
1,060,894 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,403 >>> mbox cmd response: success
2,626,403 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,688,889 UART:
2,688,905 UART: Running Caliptra FMC ...
2,689,313 UART:
2,689,456 UART: [state] CFI Enabled
2,700,085 UART: [fht] FMC Alias Private Key: 7
2,808,186 UART: [art] Extend RT PCRs Done
2,808,614 UART: [art] Lock RT PCRs Done
2,810,196 UART: [art] Populate DV Done
2,818,423 UART: [fht] FMC Alias Private Key: 7
2,819,487 UART: [art] Derive CDI
2,819,767 UART: [art] Store in in slot 0x4
2,905,464 UART: [art] Derive Key Pair
2,905,824 UART: [art] Store priv key in slot 0x5
2,918,854 UART: [art] Derive Key Pair - Done
2,933,623 UART: [art] Signing Cert with AUTHO
2,934,103 UART: RITY.KEYID = 7
2,948,993 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,758 UART: [art] PUB.X = 761C8F8C07103A6187D0462F05D475D94401705F6B4FA39D885A7DF26288793C3B65ED75CA0058DDA20C89DC58246D77
2,956,490 UART: [art] PUB.Y = 0378E01357C634211CC84B1B715EAC5EFABB8BCEF1AE35E4550D034E723C9CD2AA8DD8F4A21B029367C10572CBD53EF4
2,963,441 UART: [art] SIG.R = 9E21B69C2A53AD2F3AA3971F6A4C6B7A39F48C5A187A5E2B3BADABA1A80A8887C842F877E830984ED6A924BFB1303216
2,970,220 UART: [art] SIG.S = 91432922472A0723B3E474BBEE1C330867F27BF17C929B1E96055067B35CF0F9E7DAA0DF0F31F195925C062980B3036E
2,993,931 UART: Caliptra RT
2,994,276 UART: [state] CFI Enabled
3,103,144 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,117,189 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,736 UART: [state] LifecycleState = Unprovisioned
85,391 UART: [state] DebugLocked = No
86,011 UART: [state] WD Timer not started. Device not locked for debugging
87,328 UART: [kat] SHA2-256
890,878 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,007 UART: [kat] ++
895,159 UART: [kat] sha1
899,377 UART: [kat] SHA2-256
901,317 UART: [kat] SHA2-384
904,018 UART: [kat] SHA2-512-ACC
905,919 UART: [kat] ECC-384
915,472 UART: [kat] HMAC-384Kdf
920,080 UART: [kat] LMS
1,168,392 UART: [kat] --
1,169,389 UART: [cold-reset] ++
1,169,739 UART: [fht] FHT @ 0x50003400
1,172,387 UART: [idev] ++
1,172,555 UART: [idev] CDI.KEYID = 6
1,172,916 UART: [idev] SUBJECT.KEYID = 7
1,173,341 UART: [idev] UDS.KEYID = 0
1,173,687 ready_for_fw is high
1,173,687 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,121 UART: [idev] Erasing UDS.KEYID = 0
1,198,329 UART: [idev] Sha1 KeyId Algorithm
1,207,141 UART: [idev] --
1,208,252 UART: [ldev] ++
1,208,420 UART: [ldev] CDI.KEYID = 6
1,208,784 UART: [ldev] SUBJECT.KEYID = 5
1,209,211 UART: [ldev] AUTHORITY.KEYID = 7
1,209,674 UART: [ldev] FE.KEYID = 1
1,215,032 UART: [ldev] Erasing FE.KEYID = 1
1,241,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,298 UART: [ldev] --
1,280,572 UART: [fwproc] Wait for Commands...
1,281,245 UART: [fwproc] Recv command 0x46574c44
1,281,978 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,686 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,995 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,857 >>> mbox cmd response: success
2,772,857 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,773,922 UART: [afmc] ++
2,774,090 UART: [afmc] CDI.KEYID = 6
2,774,453 UART: [afmc] SUBJECT.KEYID = 7
2,774,879 UART: [afmc] AUTHORITY.KEYID = 5
2,809,994 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,888 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,639 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,368 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,251 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,970 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,659 UART: [afmc] --
2,853,597 UART: [cold-reset] --
2,854,165 UART: [state] Locking Datavault
2,855,588 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,192 UART: [state] Locking ICCM
2,856,748 UART: [exit] Launching FMC @ 0x40000130
2,862,077 UART:
2,862,093 UART: Running Caliptra FMC ...
2,862,501 UART:
2,862,555 UART: [state] CFI Enabled
2,873,030 UART: [fht] FMC Alias Private Key: 7
2,981,001 UART: [art] Extend RT PCRs Done
2,981,429 UART: [art] Lock RT PCRs Done
2,983,073 UART: [art] Populate DV Done
2,991,460 UART: [fht] FMC Alias Private Key: 7
2,992,486 UART: [art] Derive CDI
2,992,766 UART: [art] Store in in slot 0x4
3,078,421 UART: [art] Derive Key Pair
3,078,781 UART: [art] Store priv key in slot 0x5
3,092,375 UART: [art] Derive Key Pair - Done
3,106,842 UART: [art] Signing Cert with AUTHO
3,107,322 UART: RITY.KEYID = 7
3,122,570 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,335 UART: [art] PUB.X = 2D556418BDEBF099A5E45BD881A372BE9BC1DF4954F540ED20AC95EC07BD44EF0702E03D2212CE486033526B853E5119
3,130,102 UART: [art] PUB.Y = 4625BEC704F7F7483F9898D7F77123B65B921683F4081D56045316FB8044AD9C2AC52075826E98154ACA030844ABB94C
3,137,029 UART: [art] SIG.R = F08D0725E67BB53933F0A6240BD9A0D60110A2E78ACDF11217A0D23D5399FA345C0E7FAC8509AB17C0F33BD2D879E97E
3,143,794 UART: [art] SIG.S = 09F224FFE8BAA687BB205AE98D7AEF72EF4B3144446B8F0AA700415031E2BFCC0F0F43B246D5AE739CC8A60827CD26E5
3,167,532 UART: Caliptra RT
3,167,785 UART: [state] CFI Enabled
3,275,264 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,289,167 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,856 ready_for_fw is high
1,055,856 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,569 >>> mbox cmd response: success
2,622,569 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,684,809 UART:
2,684,825 UART: Running Caliptra FMC ...
2,685,233 UART:
2,685,287 UART: [state] CFI Enabled
2,695,768 UART: [fht] FMC Alias Private Key: 7
2,803,757 UART: [art] Extend RT PCRs Done
2,804,185 UART: [art] Lock RT PCRs Done
2,805,467 UART: [art] Populate DV Done
2,813,870 UART: [fht] FMC Alias Private Key: 7
2,814,996 UART: [art] Derive CDI
2,815,276 UART: [art] Store in in slot 0x4
2,900,837 UART: [art] Derive Key Pair
2,901,197 UART: [art] Store priv key in slot 0x5
2,914,381 UART: [art] Derive Key Pair - Done
2,928,921 UART: [art] Signing Cert with AUTHO
2,929,401 UART: RITY.KEYID = 7
2,944,599 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,364 UART: [art] PUB.X = 6F5749C304F1042722F7E9013B815CE085970E362552F8A84C43A4A6757F13336D86BED13E6FFC57C26A8E01D091F904
2,952,110 UART: [art] PUB.Y = F50EA3DA49705635ABE7B5DD2D3129197CB65AD0D882ADFF2A888B523A178A302E0DF0E81FC434D81F43C94609F1C105
2,959,058 UART: [art] SIG.R = 70CF5E9E8B36BC14B2332FD42908A952209531F1A4126E56A7902059DB44C36A303E3825BFE2FA212F8AF6CE3D61774E
2,965,827 UART: [art] SIG.S = F15A9F796D8F371906F9F276742193DDE1F2B5B8023B93E4F4BDC61FCED7ED85B04485801E4B8151378D559D7CF8D1ED
2,989,580 UART: Caliptra RT
2,989,833 UART: [state] CFI Enabled
3,097,986 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,111,937 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
891,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
899,918 UART: [kat] SHA2-256
901,858 UART: [kat] SHA2-384
904,373 UART: [kat] SHA2-512-ACC
906,274 UART: [kat] ECC-384
915,867 UART: [kat] HMAC-384Kdf
920,413 UART: [kat] LMS
1,168,725 UART: [kat] --
1,169,536 UART: [cold-reset] ++
1,169,904 UART: [fht] FHT @ 0x50003400
1,172,750 UART: [idev] ++
1,172,918 UART: [idev] CDI.KEYID = 6
1,173,279 UART: [idev] SUBJECT.KEYID = 7
1,173,704 UART: [idev] UDS.KEYID = 0
1,174,050 ready_for_fw is high
1,174,050 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,892 UART: [idev] Erasing UDS.KEYID = 0
1,199,126 UART: [idev] Sha1 KeyId Algorithm
1,207,924 UART: [idev] --
1,208,805 UART: [ldev] ++
1,208,973 UART: [ldev] CDI.KEYID = 6
1,209,337 UART: [ldev] SUBJECT.KEYID = 5
1,209,764 UART: [ldev] AUTHORITY.KEYID = 7
1,210,227 UART: [ldev] FE.KEYID = 1
1,215,717 UART: [ldev] Erasing FE.KEYID = 1
1,242,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,027 UART: [ldev] --
1,281,411 UART: [fwproc] Wait for Commands...
1,282,116 UART: [fwproc] Recv command 0x46574c44
1,282,849 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,423 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,732 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,652 >>> mbox cmd response: success
2,773,652 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,774,763 UART: [afmc] ++
2,774,931 UART: [afmc] CDI.KEYID = 6
2,775,294 UART: [afmc] SUBJECT.KEYID = 7
2,775,720 UART: [afmc] AUTHORITY.KEYID = 5
2,810,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,519 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,270 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,999 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,882 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,601 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,416 UART: [afmc] --
2,854,526 UART: [cold-reset] --
2,855,400 UART: [state] Locking Datavault
2,856,579 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,183 UART: [state] Locking ICCM
2,857,819 UART: [exit] Launching FMC @ 0x40000130
2,863,148 UART:
2,863,164 UART: Running Caliptra FMC ...
2,863,572 UART:
2,863,715 UART: [state] CFI Enabled
2,874,060 UART: [fht] FMC Alias Private Key: 7
2,981,743 UART: [art] Extend RT PCRs Done
2,982,171 UART: [art] Lock RT PCRs Done
2,983,605 UART: [art] Populate DV Done
2,991,986 UART: [fht] FMC Alias Private Key: 7
2,993,082 UART: [art] Derive CDI
2,993,362 UART: [art] Store in in slot 0x4
3,078,739 UART: [art] Derive Key Pair
3,079,099 UART: [art] Store priv key in slot 0x5
3,092,721 UART: [art] Derive Key Pair - Done
3,107,555 UART: [art] Signing Cert with AUTHO
3,108,035 UART: RITY.KEYID = 7
3,123,413 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,178 UART: [art] PUB.X = 68219A75DAAD5E927485730279097187C46BDB88E930FD8A4C6BAD203ED30AA3731DACEDC6CC97544CFF233F38EFE6D7
3,130,953 UART: [art] PUB.Y = B68B5DC39ACB5229ACD3637EA1FDF645A21E3590AB695F607B87354883189C7C6FE443702DAA3E6244C899924D7CD359
3,137,907 UART: [art] SIG.R = 1499CBE5CB2F9A86EFFDEBC13BCAC39CE8BBB26F0B79D0894EC97B04459C4C623DBED8E97B8771C4C6B8A605E3810C01
3,144,686 UART: [art] SIG.S = 350480FC2E996900F365C72C9EA0C4ED0ED1C209D2245F620A86D136F4C531AC0542634523291533657F8A23E327E236
3,168,640 UART: Caliptra RT
3,168,985 UART: [state] CFI Enabled
3,276,948 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,291,089 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,819 ready_for_fw is high
1,056,819 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,662 >>> mbox cmd response: success
2,621,662 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,683,322 UART:
2,683,338 UART: Running Caliptra FMC ...
2,683,746 UART:
2,683,889 UART: [state] CFI Enabled
2,694,566 UART: [fht] FMC Alias Private Key: 7
2,802,067 UART: [art] Extend RT PCRs Done
2,802,495 UART: [art] Lock RT PCRs Done
2,803,869 UART: [art] Populate DV Done
2,812,146 UART: [fht] FMC Alias Private Key: 7
2,813,126 UART: [art] Derive CDI
2,813,406 UART: [art] Store in in slot 0x4
2,899,097 UART: [art] Derive Key Pair
2,899,457 UART: [art] Store priv key in slot 0x5
2,913,207 UART: [art] Derive Key Pair - Done
2,927,951 UART: [art] Signing Cert with AUTHO
2,928,431 UART: RITY.KEYID = 7
2,943,705 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,470 UART: [art] PUB.X = 24D8A6E0AA598757B43CBFF98A2ABE425E66829BC1E9EE03EF3D1547D26B6F37BC1ACF7A5F5F8FB295F8EAF06A304681
2,951,257 UART: [art] PUB.Y = CFAFC31D1C469EA82B252776683CAEA3CEFD666DE5CE1EF112B9E7C311CF4E435A592281F8BDCD3BA0250502C9A854B8
2,958,221 UART: [art] SIG.R = FDF1648EF359AAF694C6EEAC8EB245AE4D63D8FD13A382B71D4E11A2F02FE4F607FA14ED5D86118830861A6862CAADDF
2,965,010 UART: [art] SIG.S = 29549ECAF9EEF82C021C1192A03354E0A31DB3788B5D31092F72D1B11444A1501E054D2EF21D7579BBACE70EBCCCAD72
2,989,311 UART: Caliptra RT
2,989,656 UART: [state] CFI Enabled
3,097,961 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,112,086 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,311 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,883 UART: [kat] SHA2-256
881,814 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,929 UART: [kat] ++
886,081 UART: [kat] sha1
890,335 UART: [kat] SHA2-256
892,273 UART: [kat] SHA2-384
895,084 UART: [kat] SHA2-512-ACC
896,985 UART: [kat] ECC-384
902,606 UART: [kat] HMAC-384Kdf
907,132 UART: [kat] LMS
1,475,328 UART: [kat] --
1,476,285 UART: [cold-reset] ++
1,476,747 UART: [fht] Storing FHT @ 0x50003400
1,479,544 UART: [idev] ++
1,479,712 UART: [idev] CDI.KEYID = 6
1,480,072 UART: [idev] SUBJECT.KEYID = 7
1,480,496 UART: [idev] UDS.KEYID = 0
1,480,841 ready_for_fw is high
1,480,841 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,598 UART: [idev] Erasing UDS.KEYID = 0
1,505,012 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,606 UART: [idev] --
1,514,707 UART: [ldev] ++
1,514,875 UART: [ldev] CDI.KEYID = 6
1,515,238 UART: [ldev] SUBJECT.KEYID = 5
1,515,664 UART: [ldev] AUTHORITY.KEYID = 7
1,516,127 UART: [ldev] FE.KEYID = 1
1,521,107 UART: [ldev] Erasing FE.KEYID = 1
1,546,370 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,438 UART: [ldev] --
1,585,947 UART: [fwproc] Waiting for Commands...
1,586,702 UART: [fwproc] Received command 0x46574c44
1,587,493 UART: [fwproc] Received Image of size 114332 bytes
2,884,775 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,251 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,603 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,434 >>> mbox cmd response: success
3,078,552 UART: [afmc] ++
3,078,720 UART: [afmc] CDI.KEYID = 6
3,079,082 UART: [afmc] SUBJECT.KEYID = 7
3,079,507 UART: [afmc] AUTHORITY.KEYID = 5
3,114,486 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,968 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,748 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,476 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,361 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,051 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,886 UART: [afmc] --
3,157,950 UART: [cold-reset] --
3,158,754 UART: [state] Locking Datavault
3,160,097 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,701 UART: [state] Locking ICCM
3,161,167 UART: [exit] Launching FMC @ 0x40000130
3,166,496 UART:
3,166,512 UART: Running Caliptra FMC ...
3,166,920 UART:
3,166,974 UART: [state] CFI Enabled
3,177,699 UART: [fht] FMC Alias Private Key: 7
3,285,538 UART: [art] Extend RT PCRs Done
3,285,966 UART: [art] Lock RT PCRs Done
3,287,256 UART: [art] Populate DV Done
3,295,343 UART: [fht] FMC Alias Private Key: 7
3,296,495 UART: [art] Derive CDI
3,296,775 UART: [art] Store in in slot 0x4
3,382,670 UART: [art] Derive Key Pair
3,383,030 UART: [art] Store priv key in slot 0x5
3,396,316 UART: [art] Derive Key Pair - Done
3,410,972 UART: [art] Signing Cert with AUTHO
3,411,452 UART: RITY.KEYID = 7
3,426,426 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,191 UART: [art] PUB.X = 6C386D889CDFD773D85C1673EC4639FBED52C648BB95EC8EDEAA573CAC4683B215A5C18D546BBD1B6629F81AD0E93D16
3,433,979 UART: [art] PUB.Y = 2F3620AA20068F1129D4334F7E5D690A4F93CC722A5D582B0D4B71F922E722D1575BA3EB7D7B3BEB5B9CEF2861585DAA
3,440,930 UART: [art] SIG.R = 96155BBC073B93FFA711EF87A2444113FDB23337B545D516E3F1F669AD116E23F3D6F33FCEA0EB42F1D26869A3DA202E
3,447,707 UART: [art] SIG.S = 699BBA761399D6AB56F706EDC70E0850802D90F90646CA54F38B66927273B42D66983D2E4BE5C322F3764DD15EB8D6D7
3,471,386 UART: Caliptra RT
3,471,639 UART: [state] CFI Enabled
3,579,236 UART: [rt] RT listening for mailbox commands...
3,579,906 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,842 UART: [rt]cmd =0x53494756, len=196
3,616,208 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,949 ready_for_fw is high
1,362,949 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,418 >>> mbox cmd response: success
2,991,284 UART:
2,991,300 UART: Running Caliptra FMC ...
2,991,708 UART:
2,991,762 UART: [state] CFI Enabled
3,002,029 UART: [fht] FMC Alias Private Key: 7
3,108,854 UART: [art] Extend RT PCRs Done
3,109,282 UART: [art] Lock RT PCRs Done
3,111,112 UART: [art] Populate DV Done
3,119,607 UART: [fht] FMC Alias Private Key: 7
3,120,677 UART: [art] Derive CDI
3,120,957 UART: [art] Store in in slot 0x4
3,206,162 UART: [art] Derive Key Pair
3,206,522 UART: [art] Store priv key in slot 0x5
3,220,076 UART: [art] Derive Key Pair - Done
3,234,814 UART: [art] Signing Cert with AUTHO
3,235,294 UART: RITY.KEYID = 7
3,250,630 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,395 UART: [art] PUB.X = 6AF32411F5C837D6D86ED7295610EF42BE49BAB6446874BADA1B84215D769F61D86F29A673E9626F50ADDA6ACC532A36
3,258,173 UART: [art] PUB.Y = 709825D8610EA4FB4B98953519B7C5C1FA17A9653011E86430699BD336D83284F578F2B3BB3B05085E62625F4F69E311
3,265,104 UART: [art] SIG.R = 35B05701AF587BCD097285BFD9BB05F70454145400D0D890D3AB81355C8058E9A7EB3B490121272DD08F3582922032E5
3,271,829 UART: [art] SIG.S = 0A245898205C392C0ACC8EBCBB1C929C0B5FC1FA615EA78F8A4675343F725EA4FB8E386E9FA47C5C7B74CE29BBE28A64
3,295,665 UART: Caliptra RT
3,295,918 UART: [state] CFI Enabled
3,404,422 UART: [rt] RT listening for mailbox commands...
3,405,092 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,116 UART: [rt]cmd =0x53494756, len=196
3,441,298 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,516 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,186 UART: [kat] SHA2-256
882,117 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,232 UART: [kat] ++
886,384 UART: [kat] sha1
890,766 UART: [kat] SHA2-256
892,704 UART: [kat] SHA2-384
895,517 UART: [kat] SHA2-512-ACC
897,418 UART: [kat] ECC-384
902,963 UART: [kat] HMAC-384Kdf
907,621 UART: [kat] LMS
1,475,817 UART: [kat] --
1,476,726 UART: [cold-reset] ++
1,477,258 UART: [fht] Storing FHT @ 0x50003400
1,480,097 UART: [idev] ++
1,480,265 UART: [idev] CDI.KEYID = 6
1,480,625 UART: [idev] SUBJECT.KEYID = 7
1,481,049 UART: [idev] UDS.KEYID = 0
1,481,394 ready_for_fw is high
1,481,394 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,955 UART: [idev] Erasing UDS.KEYID = 0
1,505,683 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,339 UART: [idev] --
1,515,226 UART: [ldev] ++
1,515,394 UART: [ldev] CDI.KEYID = 6
1,515,757 UART: [ldev] SUBJECT.KEYID = 5
1,516,183 UART: [ldev] AUTHORITY.KEYID = 7
1,516,646 UART: [ldev] FE.KEYID = 1
1,522,182 UART: [ldev] Erasing FE.KEYID = 1
1,547,517 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,581 UART: [ldev] --
1,586,942 UART: [fwproc] Waiting for Commands...
1,587,697 UART: [fwproc] Received command 0x46574c44
1,588,488 UART: [fwproc] Received Image of size 114332 bytes
2,886,628 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,296 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,648 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,497 >>> mbox cmd response: success
3,080,623 UART: [afmc] ++
3,080,791 UART: [afmc] CDI.KEYID = 6
3,081,153 UART: [afmc] SUBJECT.KEYID = 7
3,081,578 UART: [afmc] AUTHORITY.KEYID = 5
3,117,271 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,323 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,103 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,831 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,716 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,406 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,329 UART: [afmc] --
3,160,439 UART: [cold-reset] --
3,161,359 UART: [state] Locking Datavault
3,162,566 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,170 UART: [state] Locking ICCM
3,163,684 UART: [exit] Launching FMC @ 0x40000130
3,169,013 UART:
3,169,029 UART: Running Caliptra FMC ...
3,169,437 UART:
3,169,580 UART: [state] CFI Enabled
3,180,359 UART: [fht] FMC Alias Private Key: 7
3,288,748 UART: [art] Extend RT PCRs Done
3,289,176 UART: [art] Lock RT PCRs Done
3,290,424 UART: [art] Populate DV Done
3,298,633 UART: [fht] FMC Alias Private Key: 7
3,299,799 UART: [art] Derive CDI
3,300,079 UART: [art] Store in in slot 0x4
3,385,808 UART: [art] Derive Key Pair
3,386,168 UART: [art] Store priv key in slot 0x5
3,399,404 UART: [art] Derive Key Pair - Done
3,413,989 UART: [art] Signing Cert with AUTHO
3,414,469 UART: RITY.KEYID = 7
3,429,599 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,364 UART: [art] PUB.X = AF81D745F7931A858E0B1DE20A145F23BCE73A449D6400441795D1FF91B77DDF8EFF282FBBA254023D7C86AF3D1630F9
3,437,113 UART: [art] PUB.Y = 9EA090EC333A2F17B86630052C4DC0C3AE3BE292AE1A2963C1DC90391AF6466075B6A8E5741ADDAD5618C6BE93D20076
3,444,046 UART: [art] SIG.R = 7B223442528E89F3742FDEDCAF44A5CF77A961E44C01C476F2FF4F3B4131C10A096CF28E06C9E06AB7097A4AB8DF662A
3,450,813 UART: [art] SIG.S = AF4090357C6114F1A7E43DB370D23C804A75D616A3A45E055F149D04EC1F30FD51EAAD776C98648B04E89CA704E34D51
3,474,688 UART: Caliptra RT
3,475,033 UART: [state] CFI Enabled
3,583,518 UART: [rt] RT listening for mailbox commands...
3,584,188 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,300 UART: [rt]cmd =0x53494756, len=196
3,620,566 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,244 ready_for_fw is high
1,363,244 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,501 >>> mbox cmd response: success
2,990,203 UART:
2,990,219 UART: Running Caliptra FMC ...
2,990,627 UART:
2,990,770 UART: [state] CFI Enabled
3,001,691 UART: [fht] FMC Alias Private Key: 7
3,110,136 UART: [art] Extend RT PCRs Done
3,110,564 UART: [art] Lock RT PCRs Done
3,112,380 UART: [art] Populate DV Done
3,120,745 UART: [fht] FMC Alias Private Key: 7
3,121,837 UART: [art] Derive CDI
3,122,117 UART: [art] Store in in slot 0x4
3,207,902 UART: [art] Derive Key Pair
3,208,262 UART: [art] Store priv key in slot 0x5
3,221,618 UART: [art] Derive Key Pair - Done
3,236,380 UART: [art] Signing Cert with AUTHO
3,236,860 UART: RITY.KEYID = 7
3,251,946 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,711 UART: [art] PUB.X = 19BBD48F3849BF8136B576049CD61F70BCE37BABAD95293F5C0C22DC0C7B5D7F1DF5102608E49082AB69C44BB668F225
3,259,479 UART: [art] PUB.Y = 98CDC0B5FECFE0525108A05A29E72F2BF137B209E75CDC9689EB8AD2622D71B650E3E32683EC6924671CD63F4CAD3B95
3,266,435 UART: [art] SIG.R = 1A038EC7340BA42CC6E74794B317E6E73F5A94A16C8FC408A214A0C38BE75BDECA0D4B78B28BBA80C05355D00AC77D82
3,273,204 UART: [art] SIG.S = BBE36D17A0AA1CC22F0B0F56A083E1BB39D7BB7A28B52DA8BA74BB72E0D82410811715D95BA1815CEB85C30341F20996
3,297,089 UART: Caliptra RT
3,297,434 UART: [state] CFI Enabled
3,406,573 UART: [rt] RT listening for mailbox commands...
3,407,243 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,273 UART: [rt]cmd =0x53494756, len=196
3,443,407 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [kat] SHA2-256
893,176 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,301 UART: [kat] ++
897,453 UART: [kat] sha1
901,759 UART: [kat] SHA2-256
903,699 UART: [kat] SHA2-384
906,642 UART: [kat] SHA2-512-ACC
908,543 UART: [kat] ECC-384
918,558 UART: [kat] HMAC-384Kdf
923,132 UART: [kat] LMS
1,171,460 UART: [kat] --
1,172,411 UART: [cold-reset] ++
1,172,789 UART: [fht] FHT @ 0x50003400
1,175,526 UART: [idev] ++
1,175,694 UART: [idev] CDI.KEYID = 6
1,176,054 UART: [idev] SUBJECT.KEYID = 7
1,176,478 UART: [idev] UDS.KEYID = 0
1,176,823 ready_for_fw is high
1,176,823 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,418 UART: [idev] Erasing UDS.KEYID = 0
1,201,141 UART: [idev] Sha1 KeyId Algorithm
1,209,531 UART: [idev] --
1,210,519 UART: [ldev] ++
1,210,687 UART: [ldev] CDI.KEYID = 6
1,211,050 UART: [ldev] SUBJECT.KEYID = 5
1,211,476 UART: [ldev] AUTHORITY.KEYID = 7
1,211,939 UART: [ldev] FE.KEYID = 1
1,217,149 UART: [ldev] Erasing FE.KEYID = 1
1,243,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,379 UART: [ldev] --
1,282,726 UART: [fwproc] Wait for Commands...
1,283,402 UART: [fwproc] Recv command 0x46574c44
1,284,130 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,384 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,688 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,495 >>> mbox cmd response: success
2,775,719 UART: [afmc] ++
2,775,887 UART: [afmc] CDI.KEYID = 6
2,776,249 UART: [afmc] SUBJECT.KEYID = 7
2,776,674 UART: [afmc] AUTHORITY.KEYID = 5
2,811,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,132 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,860 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,745 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,464 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,100 UART: [afmc] --
2,855,026 UART: [cold-reset] --
2,856,010 UART: [state] Locking Datavault
2,857,061 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,665 UART: [state] Locking ICCM
2,858,285 UART: [exit] Launching FMC @ 0x40000130
2,863,614 UART:
2,863,630 UART: Running Caliptra FMC ...
2,864,038 UART:
2,864,092 UART: [state] CFI Enabled
2,874,577 UART: [fht] FMC Alias Private Key: 7
2,981,508 UART: [art] Extend RT PCRs Done
2,981,936 UART: [art] Lock RT PCRs Done
2,983,306 UART: [art] Populate DV Done
2,991,457 UART: [fht] FMC Alias Private Key: 7
2,992,629 UART: [art] Derive CDI
2,992,909 UART: [art] Store in in slot 0x4
3,078,848 UART: [art] Derive Key Pair
3,079,208 UART: [art] Store priv key in slot 0x5
3,092,290 UART: [art] Derive Key Pair - Done
3,107,374 UART: [art] Signing Cert with AUTHO
3,107,854 UART: RITY.KEYID = 7
3,123,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,775 UART: [art] PUB.X = 0791305B5316A85D97A9A80DAE9D057A82ADCF4389E05A5F0091CC40F3A94A24BA6F4D67429FB3ECBFA5A7A1B01F35FF
3,130,530 UART: [art] PUB.Y = E3AB021E941FFBFC6BE134F97674AA1F50C934B729B5B889B1AEC93DAA71BD5E5E6CA76059164BDD678153FE86A3FF6F
3,137,497 UART: [art] SIG.R = CF3CB9C54F510C91AD7F54772A2F2B94AF3C1297752184F2CB0516B9F41B905F4EE4E3101AC5D988B43C308830AD52C9
3,144,267 UART: [art] SIG.S = 5CDADB665EE98048777D01D12BDCD8ADF67FAD45ED590C10FCCD63271DEAE62B8D28B0FCAF77F59B3869B57C1F47B228
3,167,962 UART: Caliptra RT
3,168,215 UART: [state] CFI Enabled
3,276,466 UART: [rt] RT listening for mailbox commands...
3,277,136 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,246 UART: [rt]cmd =0x53494756, len=196
3,313,626 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,103 ready_for_fw is high
1,060,103 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,640 >>> mbox cmd response: success
2,687,392 UART:
2,687,408 UART: Running Caliptra FMC ...
2,687,816 UART:
2,687,870 UART: [state] CFI Enabled
2,698,089 UART: [fht] FMC Alias Private Key: 7
2,805,814 UART: [art] Extend RT PCRs Done
2,806,242 UART: [art] Lock RT PCRs Done
2,807,576 UART: [art] Populate DV Done
2,815,577 UART: [fht] FMC Alias Private Key: 7
2,816,675 UART: [art] Derive CDI
2,816,955 UART: [art] Store in in slot 0x4
2,902,940 UART: [art] Derive Key Pair
2,903,300 UART: [art] Store priv key in slot 0x5
2,916,396 UART: [art] Derive Key Pair - Done
2,930,810 UART: [art] Signing Cert with AUTHO
2,931,290 UART: RITY.KEYID = 7
2,946,560 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,325 UART: [art] PUB.X = 1585181A4C86D85F5B8EC0BFEB1D10A283B0C445C0E74895E83CABAAA5F7D0D4E9393DDD7B05F55AFC0FE3B74B217953
2,954,107 UART: [art] PUB.Y = B30D4966E4A9D9C2A07692BEA73322DC443FBFCB013DC46D94422EEECFEE300F2E1ABA4C279D45A12FAD242DC76D52EE
2,961,072 UART: [art] SIG.R = 11E2331A884113570B6F8787E3A3C9441CFF2BCB7DF0F25B9C97B72FF4B287553D51437DB0A7D893D69719BA9D5C67CF
2,967,845 UART: [art] SIG.S = B1F30EC085F922A5A7EFAF63EAF6693E095CFBF0A8E5E6738BD9D0639C89497FCD72589B522268F20A9853F56FB9071B
2,991,770 UART: Caliptra RT
2,992,023 UART: [state] CFI Enabled
3,098,602 UART: [rt] RT listening for mailbox commands...
3,099,272 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,934 UART: [rt]cmd =0x53494756, len=196
3,135,374 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
893,561 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,686 UART: [kat] ++
897,838 UART: [kat] sha1
902,174 UART: [kat] SHA2-256
904,114 UART: [kat] SHA2-384
906,975 UART: [kat] SHA2-512-ACC
908,876 UART: [kat] ECC-384
918,505 UART: [kat] HMAC-384Kdf
923,081 UART: [kat] LMS
1,171,409 UART: [kat] --
1,172,404 UART: [cold-reset] ++
1,172,928 UART: [fht] FHT @ 0x50003400
1,175,641 UART: [idev] ++
1,175,809 UART: [idev] CDI.KEYID = 6
1,176,169 UART: [idev] SUBJECT.KEYID = 7
1,176,593 UART: [idev] UDS.KEYID = 0
1,176,938 ready_for_fw is high
1,176,938 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,633 UART: [idev] Erasing UDS.KEYID = 0
1,201,924 UART: [idev] Sha1 KeyId Algorithm
1,210,286 UART: [idev] --
1,211,354 UART: [ldev] ++
1,211,522 UART: [ldev] CDI.KEYID = 6
1,211,885 UART: [ldev] SUBJECT.KEYID = 5
1,212,311 UART: [ldev] AUTHORITY.KEYID = 7
1,212,774 UART: [ldev] FE.KEYID = 1
1,217,900 UART: [ldev] Erasing FE.KEYID = 1
1,244,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,474 UART: [ldev] --
1,283,763 UART: [fwproc] Wait for Commands...
1,284,427 UART: [fwproc] Recv command 0x46574c44
1,285,155 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,795 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,099 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,954 >>> mbox cmd response: success
2,777,082 UART: [afmc] ++
2,777,250 UART: [afmc] CDI.KEYID = 6
2,777,612 UART: [afmc] SUBJECT.KEYID = 7
2,778,037 UART: [afmc] AUTHORITY.KEYID = 5
2,813,154 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,501 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,249 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,977 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,862 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,581 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,473 UART: [afmc] --
2,856,597 UART: [cold-reset] --
2,857,277 UART: [state] Locking Datavault
2,858,726 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,330 UART: [state] Locking ICCM
2,859,812 UART: [exit] Launching FMC @ 0x40000130
2,865,141 UART:
2,865,157 UART: Running Caliptra FMC ...
2,865,565 UART:
2,865,708 UART: [state] CFI Enabled
2,876,143 UART: [fht] FMC Alias Private Key: 7
2,984,046 UART: [art] Extend RT PCRs Done
2,984,474 UART: [art] Lock RT PCRs Done
2,986,240 UART: [art] Populate DV Done
2,994,477 UART: [fht] FMC Alias Private Key: 7
2,995,649 UART: [art] Derive CDI
2,995,929 UART: [art] Store in in slot 0x4
3,081,898 UART: [art] Derive Key Pair
3,082,258 UART: [art] Store priv key in slot 0x5
3,095,298 UART: [art] Derive Key Pair - Done
3,110,040 UART: [art] Signing Cert with AUTHO
3,110,520 UART: RITY.KEYID = 7
3,125,854 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,619 UART: [art] PUB.X = C5D392307FC5520D1BEB6E1A3F325BE12A13D9A0272ADF52C351167E6CFA87ED1DECB5274437AFFBEE55D9E8119D37DF
3,133,406 UART: [art] PUB.Y = 32661EA6521A5F18B5462B468F7DDE1E44A3C2CB3335F0E7573C2CB9BE58E455980E812095BF5C0DFDC530B0EC858F09
3,140,355 UART: [art] SIG.R = 0E8467DE541537C61BE88988CBBA1475AE4CD127DEE91E1EF32FA775B392B6E6FF060B4ED74DAE78C0FD580994CD392F
3,147,129 UART: [art] SIG.S = B3D24D87F6424549979DDD16D82C3E2A995172C9AD8FEEB4F2ACEF2BB0B1E435DFA82B28185968C1A0190C2B224C04B3
3,171,040 UART: Caliptra RT
3,171,385 UART: [state] CFI Enabled
3,278,072 UART: [rt] RT listening for mailbox commands...
3,278,742 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,782 UART: [rt]cmd =0x53494756, len=196
3,315,226 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,906 ready_for_fw is high
1,059,906 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,851 >>> mbox cmd response: success
2,688,051 UART:
2,688,067 UART: Running Caliptra FMC ...
2,688,475 UART:
2,688,618 UART: [state] CFI Enabled
2,699,561 UART: [fht] FMC Alias Private Key: 7
2,807,608 UART: [art] Extend RT PCRs Done
2,808,036 UART: [art] Lock RT PCRs Done
2,809,780 UART: [art] Populate DV Done
2,818,051 UART: [fht] FMC Alias Private Key: 7
2,819,151 UART: [art] Derive CDI
2,819,431 UART: [art] Store in in slot 0x4
2,905,004 UART: [art] Derive Key Pair
2,905,364 UART: [art] Store priv key in slot 0x5
2,918,590 UART: [art] Derive Key Pair - Done
2,933,427 UART: [art] Signing Cert with AUTHO
2,933,907 UART: RITY.KEYID = 7
2,949,189 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,954 UART: [art] PUB.X = 68E588DF1B75DA3BE5525F6518F4897870F650E393FFBC85B6AABD0FB7F22F70000E0DE6438ADE67521161463D64D03A
2,956,699 UART: [art] PUB.Y = 2B19A355F146FD1C6D9AE9F650407362F8BCB23F19DBEEDB3517DA0059C24B595EABBEA1673A1CE444FDAE7719B6FB12
2,963,647 UART: [art] SIG.R = B83BA174FC3A423B906189B6AA15218FF9B57AB4D0CEBA69F1C61E66538793BCF90963F6B7F85C82DE54E6FBC284B11E
2,970,428 UART: [art] SIG.S = 59A22C44D3383F36DA7A48018838C583C9CC5A046DDA7D8F8B6DA23C3799EFB9E67425572AA8223E4C2188EF37FFC055
2,993,883 UART: Caliptra RT
2,994,228 UART: [state] CFI Enabled
3,101,991 UART: [rt] RT listening for mailbox commands...
3,102,661 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,787 UART: [rt]cmd =0x53494756, len=196
3,139,303 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
891,186 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,315 UART: [kat] ++
895,467 UART: [kat] sha1
899,613 UART: [kat] SHA2-256
901,553 UART: [kat] SHA2-384
904,504 UART: [kat] SHA2-512-ACC
906,405 UART: [kat] ECC-384
915,976 UART: [kat] HMAC-384Kdf
920,568 UART: [kat] LMS
1,168,880 UART: [kat] --
1,169,759 UART: [cold-reset] ++
1,170,125 UART: [fht] FHT @ 0x50003400
1,172,965 UART: [idev] ++
1,173,133 UART: [idev] CDI.KEYID = 6
1,173,494 UART: [idev] SUBJECT.KEYID = 7
1,173,919 UART: [idev] UDS.KEYID = 0
1,174,265 ready_for_fw is high
1,174,265 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,089 UART: [idev] Erasing UDS.KEYID = 0
1,198,803 UART: [idev] Sha1 KeyId Algorithm
1,207,613 UART: [idev] --
1,208,566 UART: [ldev] ++
1,208,734 UART: [ldev] CDI.KEYID = 6
1,209,098 UART: [ldev] SUBJECT.KEYID = 5
1,209,525 UART: [ldev] AUTHORITY.KEYID = 7
1,209,988 UART: [ldev] FE.KEYID = 1
1,214,990 UART: [ldev] Erasing FE.KEYID = 1
1,241,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,290 UART: [ldev] --
1,280,682 UART: [fwproc] Wait for Commands...
1,281,295 UART: [fwproc] Recv command 0x46574c44
1,282,028 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,274 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,583 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,309 >>> mbox cmd response: success
2,772,458 UART: [afmc] ++
2,772,626 UART: [afmc] CDI.KEYID = 6
2,772,989 UART: [afmc] SUBJECT.KEYID = 7
2,773,415 UART: [afmc] AUTHORITY.KEYID = 5
2,808,600 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,262 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,013 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,742 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,625 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,344 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,123 UART: [afmc] --
2,852,015 UART: [cold-reset] --
2,852,941 UART: [state] Locking Datavault
2,853,948 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,552 UART: [state] Locking ICCM
2,855,018 UART: [exit] Launching FMC @ 0x40000130
2,860,347 UART:
2,860,363 UART: Running Caliptra FMC ...
2,860,771 UART:
2,860,825 UART: [state] CFI Enabled
2,871,210 UART: [fht] FMC Alias Private Key: 7
2,978,971 UART: [art] Extend RT PCRs Done
2,979,399 UART: [art] Lock RT PCRs Done
2,981,045 UART: [art] Populate DV Done
2,989,298 UART: [fht] FMC Alias Private Key: 7
2,990,288 UART: [art] Derive CDI
2,990,568 UART: [art] Store in in slot 0x4
3,076,351 UART: [art] Derive Key Pair
3,076,711 UART: [art] Store priv key in slot 0x5
3,090,533 UART: [art] Derive Key Pair - Done
3,105,534 UART: [art] Signing Cert with AUTHO
3,106,014 UART: RITY.KEYID = 7
3,121,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,775 UART: [art] PUB.X = 08E7ADE81C0FD9F7A676414D2003B2E71D5EE11C1A13E2F3FB0B6A9385C23980D55B5973A8FAB968EA291CD20E9EA75D
3,128,544 UART: [art] PUB.Y = 6D500CE34B56ECE6F81637A85E5EF50E8BD56C8C7017DC81554061589C2247D20E7C1D0B6B96D92D8F2B1ED125F86E9A
3,135,490 UART: [art] SIG.R = 578213403A0DE1E3843741CFA653E2B70D4C65DC0716E06EC653EBE58945B549156E07F408FB95A5DE74333A6CD39435
3,142,243 UART: [art] SIG.S = A49ABF50E00D8B16337CE95CA902E5E28FE73983A86AB4FA3C04D5065E689D44470BC1D00FAFD26F32F573F1EE40C887
3,166,026 UART: Caliptra RT
3,166,279 UART: [state] CFI Enabled
3,273,742 UART: [rt] RT listening for mailbox commands...
3,274,412 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,494 UART: [rt]cmd =0x53494756, len=196
3,311,028 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,690 ready_for_fw is high
1,055,690 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,419 >>> mbox cmd response: success
2,683,429 UART:
2,683,445 UART: Running Caliptra FMC ...
2,683,853 UART:
2,683,907 UART: [state] CFI Enabled
2,694,510 UART: [fht] FMC Alias Private Key: 7
2,802,253 UART: [art] Extend RT PCRs Done
2,802,681 UART: [art] Lock RT PCRs Done
2,804,537 UART: [art] Populate DV Done
2,812,958 UART: [fht] FMC Alias Private Key: 7
2,814,108 UART: [art] Derive CDI
2,814,388 UART: [art] Store in in slot 0x4
2,900,131 UART: [art] Derive Key Pair
2,900,491 UART: [art] Store priv key in slot 0x5
2,913,153 UART: [art] Derive Key Pair - Done
2,928,283 UART: [art] Signing Cert with AUTHO
2,928,763 UART: RITY.KEYID = 7
2,943,977 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,742 UART: [art] PUB.X = 365069FE6AF23220440B862538B5120F521F7B3D35D04BDBBC533980C277E496046CB4ABF078B17E5AC216E23D518A5B
2,951,503 UART: [art] PUB.Y = 2050FD129A1AD311E894E51ED38D3B3B911F265FEA8F52478AC83A3823041DBE9571825FB826C580A2239589432A9AA6
2,958,448 UART: [art] SIG.R = 59A35300C646746603BD3D61CE5F15540248BCC123926904EDD6DEFA5B437439E543027FCED860EA518ED3174597E282
2,965,180 UART: [art] SIG.S = 522986A8863E04E6A56D317B533B9CFE9462031FC5BED660C7EA227C64F39FB026B0F225A7A688B130D6A8B9B05507C9
2,988,616 UART: Caliptra RT
2,988,869 UART: [state] CFI Enabled
3,096,444 UART: [rt] RT listening for mailbox commands...
3,097,114 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,400 UART: [rt]cmd =0x53494756, len=196
3,133,780 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,960 UART: [state] WD Timer not started. Device not locked for debugging
88,069 UART: [kat] SHA2-256
891,619 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,748 UART: [kat] ++
895,900 UART: [kat] sha1
900,316 UART: [kat] SHA2-256
902,256 UART: [kat] SHA2-384
905,107 UART: [kat] SHA2-512-ACC
907,008 UART: [kat] ECC-384
916,889 UART: [kat] HMAC-384Kdf
921,567 UART: [kat] LMS
1,169,879 UART: [kat] --
1,170,648 UART: [cold-reset] ++
1,171,204 UART: [fht] FHT @ 0x50003400
1,173,902 UART: [idev] ++
1,174,070 UART: [idev] CDI.KEYID = 6
1,174,431 UART: [idev] SUBJECT.KEYID = 7
1,174,856 UART: [idev] UDS.KEYID = 0
1,175,202 ready_for_fw is high
1,175,202 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,814 UART: [idev] Erasing UDS.KEYID = 0
1,199,686 UART: [idev] Sha1 KeyId Algorithm
1,208,430 UART: [idev] --
1,209,587 UART: [ldev] ++
1,209,755 UART: [ldev] CDI.KEYID = 6
1,210,119 UART: [ldev] SUBJECT.KEYID = 5
1,210,546 UART: [ldev] AUTHORITY.KEYID = 7
1,211,009 UART: [ldev] FE.KEYID = 1
1,216,171 UART: [ldev] Erasing FE.KEYID = 1
1,242,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,479 UART: [ldev] --
1,281,979 UART: [fwproc] Wait for Commands...
1,282,560 UART: [fwproc] Recv command 0x46574c44
1,283,293 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,025 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,334 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,210 >>> mbox cmd response: success
2,774,301 UART: [afmc] ++
2,774,469 UART: [afmc] CDI.KEYID = 6
2,774,832 UART: [afmc] SUBJECT.KEYID = 7
2,775,258 UART: [afmc] AUTHORITY.KEYID = 5
2,810,201 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,763 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,514 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,243 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,126 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,845 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,636 UART: [afmc] --
2,853,590 UART: [cold-reset] --
2,854,456 UART: [state] Locking Datavault
2,855,545 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,149 UART: [state] Locking ICCM
2,856,761 UART: [exit] Launching FMC @ 0x40000130
2,862,090 UART:
2,862,106 UART: Running Caliptra FMC ...
2,862,514 UART:
2,862,657 UART: [state] CFI Enabled
2,872,872 UART: [fht] FMC Alias Private Key: 7
2,980,599 UART: [art] Extend RT PCRs Done
2,981,027 UART: [art] Lock RT PCRs Done
2,982,539 UART: [art] Populate DV Done
2,990,656 UART: [fht] FMC Alias Private Key: 7
2,991,778 UART: [art] Derive CDI
2,992,058 UART: [art] Store in in slot 0x4
3,077,649 UART: [art] Derive Key Pair
3,078,009 UART: [art] Store priv key in slot 0x5
3,091,317 UART: [art] Derive Key Pair - Done
3,105,911 UART: [art] Signing Cert with AUTHO
3,106,391 UART: RITY.KEYID = 7
3,121,451 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,216 UART: [art] PUB.X = 4235CE5FEA50FE984EEEF9062B46F3646E3EDD175D54C44994582242A087AB5075D2A18CC85051039F0F8BA6091C5887
3,128,974 UART: [art] PUB.Y = C799E4ACE4E7C7CE059B9A1249A2F46189F72AC628602949821002D842BE4660F25B6498B1DD7E90A8DBA7D1DDA2A843
3,135,924 UART: [art] SIG.R = 32113B75FDC682CD3147A7A513E67FDB62FA6EDCE8387F45D320036A8B8F8A67A85834243D866B353AC8373B9FA8AD75
3,142,697 UART: [art] SIG.S = F8811C5CBDC0AC3D6064C775E5E6AFF93C583666ABA6216BD314D3B9B63B188B8843F320B89500973513429535CA96B9
3,166,196 UART: Caliptra RT
3,166,541 UART: [state] CFI Enabled
3,275,222 UART: [rt] RT listening for mailbox commands...
3,275,892 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,872 UART: [rt]cmd =0x53494756, len=196
3,312,222 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,107 ready_for_fw is high
1,056,107 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,940 >>> mbox cmd response: success
2,685,082 UART:
2,685,098 UART: Running Caliptra FMC ...
2,685,506 UART:
2,685,649 UART: [state] CFI Enabled
2,696,308 UART: [fht] FMC Alias Private Key: 7
2,804,791 UART: [art] Extend RT PCRs Done
2,805,219 UART: [art] Lock RT PCRs Done
2,806,593 UART: [art] Populate DV Done
2,814,746 UART: [fht] FMC Alias Private Key: 7
2,815,730 UART: [art] Derive CDI
2,816,010 UART: [art] Store in in slot 0x4
2,901,701 UART: [art] Derive Key Pair
2,902,061 UART: [art] Store priv key in slot 0x5
2,915,191 UART: [art] Derive Key Pair - Done
2,930,262 UART: [art] Signing Cert with AUTHO
2,930,742 UART: RITY.KEYID = 7
2,945,892 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,657 UART: [art] PUB.X = 7ACE1C952187424A6457C790ABF49DD1FBDD87F2C8BB7D08781F91B42B38EB89F26671C388201C75B1DE345F22759172
2,953,426 UART: [art] PUB.Y = 93C559811E5599C658018EAA7247642677BABC3AF8B2C68310A4A3F0FA47AE23D4D12A4E68C807A51B7EE4B83FFE5D64
2,960,378 UART: [art] SIG.R = 0A46D60D5B3F43CA8C7C0EB63445240897B45B3B3E9F5FB5D149C6B697752FA79218E44AB1A59A1C4B0A4E3CB290949C
2,967,141 UART: [art] SIG.S = D5FB840AA41EA8FC554AA6ADD321A93923C1B6080FD58D55DEB30C46A84AD985802777A86451693D36513ED6CDA4478E
2,990,618 UART: Caliptra RT
2,990,963 UART: [state] CFI Enabled
3,098,566 UART: [rt] RT listening for mailbox commands...
3,099,236 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,582 UART: [rt]cmd =0x53494756, len=196
3,135,652 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,511 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,053 UART: [kat] SHA2-256
881,984 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,099 UART: [kat] ++
886,251 UART: [kat] sha1
890,381 UART: [kat] SHA2-256
892,319 UART: [kat] SHA2-384
895,100 UART: [kat] SHA2-512-ACC
897,001 UART: [kat] ECC-384
902,480 UART: [kat] HMAC-384Kdf
907,236 UART: [kat] LMS
1,475,432 UART: [kat] --
1,476,145 UART: [cold-reset] ++
1,476,565 UART: [fht] Storing FHT @ 0x50003400
1,479,346 UART: [idev] ++
1,479,514 UART: [idev] CDI.KEYID = 6
1,479,874 UART: [idev] SUBJECT.KEYID = 7
1,480,298 UART: [idev] UDS.KEYID = 0
1,480,643 ready_for_fw is high
1,480,643 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,468 UART: [idev] Erasing UDS.KEYID = 0
1,504,912 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,406 UART: [idev] --
1,514,439 UART: [ldev] ++
1,514,607 UART: [ldev] CDI.KEYID = 6
1,514,970 UART: [ldev] SUBJECT.KEYID = 5
1,515,396 UART: [ldev] AUTHORITY.KEYID = 7
1,515,859 UART: [ldev] FE.KEYID = 1
1,520,963 UART: [ldev] Erasing FE.KEYID = 1
1,545,522 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,132 UART: [ldev] --
1,584,429 UART: [fwproc] Waiting for Commands...
1,585,240 UART: [fwproc] Received command 0x46574c44
1,586,031 UART: [fwproc] Received Image of size 114332 bytes
2,884,989 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,735 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,087 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,998 >>> mbox cmd response: success
3,076,998 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,078,180 UART: [afmc] ++
3,078,348 UART: [afmc] CDI.KEYID = 6
3,078,710 UART: [afmc] SUBJECT.KEYID = 7
3,079,135 UART: [afmc] AUTHORITY.KEYID = 5
3,113,856 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,910 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,690 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,418 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,303 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,993 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,062 UART: [afmc] --
3,157,142 UART: [cold-reset] --
3,158,184 UART: [state] Locking Datavault
3,159,313 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,917 UART: [state] Locking ICCM
3,160,365 UART: [exit] Launching FMC @ 0x40000130
3,165,694 UART:
3,165,710 UART: Running Caliptra FMC ...
3,166,118 UART:
3,166,172 UART: [state] CFI Enabled
3,176,665 UART: [fht] FMC Alias Private Key: 7
3,285,058 UART: [art] Extend RT PCRs Done
3,285,486 UART: [art] Lock RT PCRs Done
3,287,070 UART: [art] Populate DV Done
3,295,409 UART: [fht] FMC Alias Private Key: 7
3,296,565 UART: [art] Derive CDI
3,296,845 UART: [art] Store in in slot 0x4
3,382,542 UART: [art] Derive Key Pair
3,382,902 UART: [art] Store priv key in slot 0x5
3,395,720 UART: [art] Derive Key Pair - Done
3,410,656 UART: [art] Signing Cert with AUTHO
3,411,136 UART: RITY.KEYID = 7
3,426,168 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,933 UART: [art] PUB.X = C5E939BF6547755BC92C5E24A1E4B5506D1E2644247148F7561800D90BC6332E88E935DC4788DA66ACB30DBA10102AC3
3,433,675 UART: [art] PUB.Y = 9D3A12720027982FA02437C8ED5042565181015C12F16C096B7E5BEE4CAAC9DE8D648286BBDCCE543545EA98512B6BDF
3,440,603 UART: [art] SIG.R = 193559DA91C77DACD3B24CF6DF28B4020C22707FA8555F8A7C422B5DAF92FE6F96CBE03BEDB7C7AC9926B139AEF760CE
3,447,389 UART: [art] SIG.S = DCFC9297BF8E00BE75FEE42B0CE887C2A07715B8944EA0F9665896A5B89224D9468A5BA3753D14482944C7C8AB3801FA
3,471,234 UART: Caliptra RT
3,471,487 UART: [state] CFI Enabled
3,578,846 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,234 UART: [rt]cmd =0x46505344, len=4
3,717,562 >>> mbox cmd response data (8 bytes)
3,717,563 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,717,599 UART: Fatal Error: 0x000E0008
3,718,722 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,877 ready_for_fw is high
1,362,877 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,458 >>> mbox cmd response: success
2,927,458 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,989,166 UART:
2,989,182 UART: Running Caliptra FMC ...
2,989,590 UART:
2,989,644 UART: [state] CFI Enabled
3,000,003 UART: [fht] FMC Alias Private Key: 7
3,107,906 UART: [art] Extend RT PCRs Done
3,108,334 UART: [art] Lock RT PCRs Done
3,110,092 UART: [art] Populate DV Done
3,118,401 UART: [fht] FMC Alias Private Key: 7
3,119,427 UART: [art] Derive CDI
3,119,707 UART: [art] Store in in slot 0x4
3,204,828 UART: [art] Derive Key Pair
3,205,188 UART: [art] Store priv key in slot 0x5
3,218,892 UART: [art] Derive Key Pair - Done
3,233,583 UART: [art] Signing Cert with AUTHO
3,234,063 UART: RITY.KEYID = 7
3,249,591 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,356 UART: [art] PUB.X = ED140F930247015F7BB4F7516D16B86D884A7309B48EA4FB16D33E37BFA0CE064173D2C9B8DAC983EC002703AA69A113
3,257,092 UART: [art] PUB.Y = 204AB41787F05C4471CE05B37F3B952C6A8C183F2AFA94E73461A257DB47D0F746F271582B323EA57D62BBA7A8088A32
3,264,038 UART: [art] SIG.R = 660AD835AB17EC9B5A3EFF8CCA3797487A6BB4309C59873F3B82A724C7367A97481DEF459A916BF225DF9DDC222AAFF9
3,270,819 UART: [art] SIG.S = E5AD42774AF53BE1511B8EE19F3B9473BB53344BE3F0A77801571B0FF58B02895CE682DA43582EE1388B45581605F272
3,294,500 UART: Caliptra RT
3,294,753 UART: [state] CFI Enabled
3,402,560 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,070 UART: [rt]cmd =0x46505344, len=4
3,541,304 >>> mbox cmd response data (8 bytes)
3,541,305 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,541,341 UART: Fatal Error: 0x000E0008
3,542,464 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,632 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,184 UART: [kat] SHA2-256
882,115 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,230 UART: [kat] ++
886,382 UART: [kat] sha1
890,688 UART: [kat] SHA2-256
892,626 UART: [kat] SHA2-384
895,287 UART: [kat] SHA2-512-ACC
897,188 UART: [kat] ECC-384
903,047 UART: [kat] HMAC-384Kdf
907,637 UART: [kat] LMS
1,475,833 UART: [kat] --
1,476,656 UART: [cold-reset] ++
1,477,118 UART: [fht] Storing FHT @ 0x50003400
1,479,949 UART: [idev] ++
1,480,117 UART: [idev] CDI.KEYID = 6
1,480,477 UART: [idev] SUBJECT.KEYID = 7
1,480,901 UART: [idev] UDS.KEYID = 0
1,481,246 ready_for_fw is high
1,481,246 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,083 UART: [idev] Erasing UDS.KEYID = 0
1,506,235 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,821 UART: [idev] --
1,515,806 UART: [ldev] ++
1,515,974 UART: [ldev] CDI.KEYID = 6
1,516,337 UART: [ldev] SUBJECT.KEYID = 5
1,516,763 UART: [ldev] AUTHORITY.KEYID = 7
1,517,226 UART: [ldev] FE.KEYID = 1
1,522,716 UART: [ldev] Erasing FE.KEYID = 1
1,547,755 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,971 UART: [ldev] --
1,587,486 UART: [fwproc] Waiting for Commands...
1,588,235 UART: [fwproc] Received command 0x46574c44
1,589,026 UART: [fwproc] Received Image of size 114332 bytes
2,887,248 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,268 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,620 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,461 >>> mbox cmd response: success
3,080,461 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,081,469 UART: [afmc] ++
3,081,637 UART: [afmc] CDI.KEYID = 6
3,081,999 UART: [afmc] SUBJECT.KEYID = 7
3,082,424 UART: [afmc] AUTHORITY.KEYID = 5
3,117,731 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,879 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,659 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,387 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,272 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,962 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,817 UART: [afmc] --
3,160,877 UART: [cold-reset] --
3,161,733 UART: [state] Locking Datavault
3,162,792 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,396 UART: [state] Locking ICCM
3,164,058 UART: [exit] Launching FMC @ 0x40000130
3,169,387 UART:
3,169,403 UART: Running Caliptra FMC ...
3,169,811 UART:
3,169,954 UART: [state] CFI Enabled
3,180,571 UART: [fht] FMC Alias Private Key: 7
3,288,058 UART: [art] Extend RT PCRs Done
3,288,486 UART: [art] Lock RT PCRs Done
3,289,796 UART: [art] Populate DV Done
3,298,069 UART: [fht] FMC Alias Private Key: 7
3,299,051 UART: [art] Derive CDI
3,299,331 UART: [art] Store in in slot 0x4
3,384,798 UART: [art] Derive Key Pair
3,385,158 UART: [art] Store priv key in slot 0x5
3,398,328 UART: [art] Derive Key Pair - Done
3,412,968 UART: [art] Signing Cert with AUTHO
3,413,448 UART: RITY.KEYID = 7
3,428,934 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,699 UART: [art] PUB.X = 055E138A18241DADEFD990A2244C93608C55F6177B8A8F926751D620D962139D87A4E18D1635B02BC21D96DCDF7AD868
3,436,466 UART: [art] PUB.Y = AD60CE35CDAE8ECBF1BCF9209D786C23880BF757FC43C00D73B80A9934469EB41C57BF466FA0FEBF4457BCEAE241B89F
3,443,431 UART: [art] SIG.R = 49EDD2A28530F33B79388E9ACF30D185AF0FFDF7B85F8361ADFA7FB0C8234DC83E8BF4CF06A29398A2AE724431529D6D
3,450,211 UART: [art] SIG.S = 96FD46EC276EF548641E434BEB2536E2055200F60A4048749A4D87A61E816271358D5E2ECA4B71F71F9CE107D63B77CA
3,473,867 UART: Caliptra RT
3,474,212 UART: [state] CFI Enabled
3,581,853 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,111 UART: [rt]cmd =0x46505344, len=4
3,720,279 >>> mbox cmd response data (8 bytes)
3,720,280 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,720,316 UART: Fatal Error: 0x000E0008
3,721,439 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,668 ready_for_fw is high
1,362,668 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,707 >>> mbox cmd response: success
2,928,707 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,989,771 UART:
2,989,787 UART: Running Caliptra FMC ...
2,990,195 UART:
2,990,338 UART: [state] CFI Enabled
3,001,359 UART: [fht] FMC Alias Private Key: 7
3,109,412 UART: [art] Extend RT PCRs Done
3,109,840 UART: [art] Lock RT PCRs Done
3,111,472 UART: [art] Populate DV Done
3,119,803 UART: [fht] FMC Alias Private Key: 7
3,120,923 UART: [art] Derive CDI
3,121,203 UART: [art] Store in in slot 0x4
3,206,822 UART: [art] Derive Key Pair
3,207,182 UART: [art] Store priv key in slot 0x5
3,220,114 UART: [art] Derive Key Pair - Done
3,235,265 UART: [art] Signing Cert with AUTHO
3,235,745 UART: RITY.KEYID = 7
3,251,107 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,872 UART: [art] PUB.X = 79B760500C4538D503A0D09D3ABC4366A5BED4592ED97F76EB0798B923BEEC7D50DF7508B509073B589E2BE3DE618CA3
3,258,632 UART: [art] PUB.Y = CF29E09345686924E38539BAA1EFC72AB6F29ED275DDFB73F6E9DF8503CDEDAA3E123060855EB874DB9E6BF329E173F1
3,265,595 UART: [art] SIG.R = E9CC7A1A43498BF9F2A827820411CEE0B3FB4698D029CAC3B8F781DE5CFE732AF0CDC80764FB7955B8A6CE7ED4762FC0
3,272,379 UART: [art] SIG.S = 6367762D19AC494BF3C9E57D350256ACA0953B2FD3CDE29C8ECE92588A66E17223CC506C9DA3B6386C331FECC8C33547
3,295,877 UART: Caliptra RT
3,296,222 UART: [state] CFI Enabled
3,403,559 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,065 UART: [rt]cmd =0x46505344, len=4
3,542,211 >>> mbox cmd response data (8 bytes)
3,542,212 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,542,248 UART: Fatal Error: 0x000E0008
3,543,371 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,514 UART: [kat] SHA2-256
893,164 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,289 UART: [kat] ++
897,441 UART: [kat] sha1
901,581 UART: [kat] SHA2-256
903,521 UART: [kat] SHA2-384
906,134 UART: [kat] SHA2-512-ACC
908,035 UART: [kat] ECC-384
917,220 UART: [kat] HMAC-384Kdf
921,890 UART: [kat] LMS
1,170,218 UART: [kat] --
1,171,071 UART: [cold-reset] ++
1,171,529 UART: [fht] FHT @ 0x50003400
1,174,278 UART: [idev] ++
1,174,446 UART: [idev] CDI.KEYID = 6
1,174,806 UART: [idev] SUBJECT.KEYID = 7
1,175,230 UART: [idev] UDS.KEYID = 0
1,175,575 ready_for_fw is high
1,175,575 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,528 UART: [idev] Erasing UDS.KEYID = 0
1,199,269 UART: [idev] Sha1 KeyId Algorithm
1,207,895 UART: [idev] --
1,208,967 UART: [ldev] ++
1,209,135 UART: [ldev] CDI.KEYID = 6
1,209,498 UART: [ldev] SUBJECT.KEYID = 5
1,209,924 UART: [ldev] AUTHORITY.KEYID = 7
1,210,387 UART: [ldev] FE.KEYID = 1
1,215,593 UART: [ldev] Erasing FE.KEYID = 1
1,241,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,571 UART: [ldev] --
1,280,960 UART: [fwproc] Wait for Commands...
1,281,540 UART: [fwproc] Recv command 0x46574c44
1,282,268 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,008 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,312 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,061 >>> mbox cmd response: success
2,774,061 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,775,309 UART: [afmc] ++
2,775,477 UART: [afmc] CDI.KEYID = 6
2,775,839 UART: [afmc] SUBJECT.KEYID = 7
2,776,264 UART: [afmc] AUTHORITY.KEYID = 5
2,811,259 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,720 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,468 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,196 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,081 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,800 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,636 UART: [afmc] --
2,854,716 UART: [cold-reset] --
2,855,522 UART: [state] Locking Datavault
2,856,601 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,205 UART: [state] Locking ICCM
2,857,757 UART: [exit] Launching FMC @ 0x40000130
2,863,086 UART:
2,863,102 UART: Running Caliptra FMC ...
2,863,510 UART:
2,863,564 UART: [state] CFI Enabled
2,873,711 UART: [fht] FMC Alias Private Key: 7
2,982,198 UART: [art] Extend RT PCRs Done
2,982,626 UART: [art] Lock RT PCRs Done
2,984,058 UART: [art] Populate DV Done
2,992,301 UART: [fht] FMC Alias Private Key: 7
2,993,431 UART: [art] Derive CDI
2,993,711 UART: [art] Store in in slot 0x4
3,079,712 UART: [art] Derive Key Pair
3,080,072 UART: [art] Store priv key in slot 0x5
3,092,888 UART: [art] Derive Key Pair - Done
3,107,755 UART: [art] Signing Cert with AUTHO
3,108,235 UART: RITY.KEYID = 7
3,123,309 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,074 UART: [art] PUB.X = CE9002A1A186C2FE85295D92AA8F2CE0BDE83CEB7A07146D8345724590B48FA25C14E388849B8B6BABF38DCFEEDC963D
3,130,856 UART: [art] PUB.Y = 1BB22404B75B192E0B9D1FD4C9C66F9D52E5344737488432DC0EE099574DAF26637CF2984FD6A47BB82CB305A9E8877B
3,137,798 UART: [art] SIG.R = 0A46D9A91ED45880A25FAA4FB1D111496A201B23D6293EA83DD8EEC0DA8AB8AEF8468073823314EEA64CC78566159315
3,144,571 UART: [art] SIG.S = 3CE5F83548260CCA1145CEB79FF19DF29C8695A5C0598DE8DC25050B52DDA2E7A556BDEDE802D25975520C8B27E678D1
3,168,597 UART: Caliptra RT
3,168,850 UART: [state] CFI Enabled
3,277,559 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,929 UART: [rt]cmd =0x46505344, len=4
3,415,709 >>> mbox cmd response data (8 bytes)
3,415,710 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,415,746 UART: Fatal Error: 0x000E0008
3,416,869 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,489 ready_for_fw is high
1,060,489 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,962 >>> mbox cmd response: success
2,625,962 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,688,024 UART:
2,688,040 UART: Running Caliptra FMC ...
2,688,448 UART:
2,688,502 UART: [state] CFI Enabled
2,699,355 UART: [fht] FMC Alias Private Key: 7
2,807,164 UART: [art] Extend RT PCRs Done
2,807,592 UART: [art] Lock RT PCRs Done
2,809,118 UART: [art] Populate DV Done
2,817,437 UART: [fht] FMC Alias Private Key: 7
2,818,515 UART: [art] Derive CDI
2,818,795 UART: [art] Store in in slot 0x4
2,904,434 UART: [art] Derive Key Pair
2,904,794 UART: [art] Store priv key in slot 0x5
2,918,392 UART: [art] Derive Key Pair - Done
2,932,921 UART: [art] Signing Cert with AUTHO
2,933,401 UART: RITY.KEYID = 7
2,948,245 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,010 UART: [art] PUB.X = FA861B09A12EF9B59E82FF82DC0DEB30449CBCA1B2162534C6D254F7BF8C3D1506A035D0B29138A86CFECDF8A651EAC5
2,955,791 UART: [art] PUB.Y = CD7B7381BF106DB0965897BA9A09B4F084098E9F8633A09EC55A40EA164BC07937A72E604B95B0C839062D0FDF1DD417
2,962,733 UART: [art] SIG.R = 79C3C7F71AD8E8A658726C46AB7082357AD9863794B0E552C621D31AFEF1CCC929EB475151C370497F10AE63F088AB34
2,969,505 UART: [art] SIG.S = D8A51847BEEF5EF7ADF2862E406805D6FC05F1AFCF181DA26D7C46C9CE680AF109218975812FCE819582DFC119787A2B
2,993,782 UART: Caliptra RT
2,994,035 UART: [state] CFI Enabled
3,102,384 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,714 UART: [rt]cmd =0x46505344, len=4
3,240,884 >>> mbox cmd response data (8 bytes)
3,240,885 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,240,921 UART: Fatal Error: 0x000E0008
3,242,044 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
893,533 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,658 UART: [kat] ++
897,810 UART: [kat] sha1
902,186 UART: [kat] SHA2-256
904,126 UART: [kat] SHA2-384
907,037 UART: [kat] SHA2-512-ACC
908,938 UART: [kat] ECC-384
918,649 UART: [kat] HMAC-384Kdf
923,321 UART: [kat] LMS
1,171,649 UART: [kat] --
1,172,276 UART: [cold-reset] ++
1,172,786 UART: [fht] FHT @ 0x50003400
1,175,327 UART: [idev] ++
1,175,495 UART: [idev] CDI.KEYID = 6
1,175,855 UART: [idev] SUBJECT.KEYID = 7
1,176,279 UART: [idev] UDS.KEYID = 0
1,176,624 ready_for_fw is high
1,176,624 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,335 UART: [idev] Erasing UDS.KEYID = 0
1,201,434 UART: [idev] Sha1 KeyId Algorithm
1,209,940 UART: [idev] --
1,210,812 UART: [ldev] ++
1,210,980 UART: [ldev] CDI.KEYID = 6
1,211,343 UART: [ldev] SUBJECT.KEYID = 5
1,211,769 UART: [ldev] AUTHORITY.KEYID = 7
1,212,232 UART: [ldev] FE.KEYID = 1
1,217,572 UART: [ldev] Erasing FE.KEYID = 1
1,243,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,982 UART: [ldev] --
1,283,327 UART: [fwproc] Wait for Commands...
1,284,085 UART: [fwproc] Recv command 0x46574c44
1,284,813 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,741 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,045 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,740 >>> mbox cmd response: success
2,774,740 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,775,960 UART: [afmc] ++
2,776,128 UART: [afmc] CDI.KEYID = 6
2,776,490 UART: [afmc] SUBJECT.KEYID = 7
2,776,915 UART: [afmc] AUTHORITY.KEYID = 5
2,812,178 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,631 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,379 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,107 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,992 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,711 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,513 UART: [afmc] --
2,855,427 UART: [cold-reset] --
2,856,265 UART: [state] Locking Datavault
2,857,362 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,966 UART: [state] Locking ICCM
2,858,420 UART: [exit] Launching FMC @ 0x40000130
2,863,749 UART:
2,863,765 UART: Running Caliptra FMC ...
2,864,173 UART:
2,864,316 UART: [state] CFI Enabled
2,874,855 UART: [fht] FMC Alias Private Key: 7
2,982,886 UART: [art] Extend RT PCRs Done
2,983,314 UART: [art] Lock RT PCRs Done
2,985,424 UART: [art] Populate DV Done
2,993,733 UART: [fht] FMC Alias Private Key: 7
2,994,819 UART: [art] Derive CDI
2,995,099 UART: [art] Store in in slot 0x4
3,080,558 UART: [art] Derive Key Pair
3,080,918 UART: [art] Store priv key in slot 0x5
3,094,626 UART: [art] Derive Key Pair - Done
3,109,288 UART: [art] Signing Cert with AUTHO
3,109,768 UART: RITY.KEYID = 7
3,124,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,299 UART: [art] PUB.X = 2D9C749180BFEF177D4CA34EF8EC4A9A1CAB6A383FC7A1EEDC9D7150D8FD581E653D2E8B58F5A79E3A07E2A08C545D7D
3,132,090 UART: [art] PUB.Y = 8B344C96921D5ADAAC58D28006CE1A1C0A459B88885B142943D5585337CD9F76FF8269179C3779C9D99A2349955AD817
3,139,028 UART: [art] SIG.R = D044E1E04BCDA830DE66FE08E59643394B71D1AB0BDAD52F14ACCE80EB3A2D1AE45E5EF8B87DF389B037292E6BCB49CD
3,145,818 UART: [art] SIG.S = BA1A939E0F174BC56BEDF4DDE7C0768663000E306D9B9E2D0755CCB85C1D8DA4F1EBDA6EBDBB42143289A40A45887A57
3,169,989 UART: Caliptra RT
3,170,334 UART: [state] CFI Enabled
3,278,252 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,786 UART: [rt]cmd =0x46505344, len=4
3,417,032 >>> mbox cmd response data (8 bytes)
3,417,033 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,417,069 UART: Fatal Error: 0x000E0008
3,418,192 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,734 ready_for_fw is high
1,060,734 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,113 >>> mbox cmd response: success
2,626,113 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,687,637 UART:
2,687,653 UART: Running Caliptra FMC ...
2,688,061 UART:
2,688,204 UART: [state] CFI Enabled
2,698,863 UART: [fht] FMC Alias Private Key: 7
2,806,692 UART: [art] Extend RT PCRs Done
2,807,120 UART: [art] Lock RT PCRs Done
2,808,682 UART: [art] Populate DV Done
2,817,139 UART: [fht] FMC Alias Private Key: 7
2,818,167 UART: [art] Derive CDI
2,818,447 UART: [art] Store in in slot 0x4
2,904,028 UART: [art] Derive Key Pair
2,904,388 UART: [art] Store priv key in slot 0x5
2,917,958 UART: [art] Derive Key Pair - Done
2,932,746 UART: [art] Signing Cert with AUTHO
2,933,226 UART: RITY.KEYID = 7
2,948,442 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,207 UART: [art] PUB.X = ECB8601E6750D4768CFFAE4AABC0D082F7D54E942E491F4D5797FD003A120CE97D68E8C30896658837E658E1ED8CDB2B
2,955,961 UART: [art] PUB.Y = F4AB024113CA3918ABF865C7280B3691E9D55BDBEBDB7F87C943BEB3C0C23CF57C3BACF7943914555917B14800F0E9F8
2,962,895 UART: [art] SIG.R = 02421C838F5036926B0594277B04439AD762860F3B08285A1393B5BD266C837B71BB5DC8A80EDE0EF32347F2C102011D
2,969,630 UART: [art] SIG.S = 43C4BE5E17CCC296603665237510CAAE50C456A888BF63EB97702714FBE7E7BA3206E8E1503C3EFB3A4C183E8B8B8283
2,993,350 UART: Caliptra RT
2,993,695 UART: [state] CFI Enabled
3,100,974 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,610 UART: [rt]cmd =0x46505344, len=4
3,239,686 >>> mbox cmd response data (8 bytes)
3,239,687 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,239,723 UART: Fatal Error: 0x000E0008
3,240,846 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,624 UART: [state] LifecycleState = Unprovisioned
85,279 UART: [state] DebugLocked = No
85,789 UART: [state] WD Timer not started. Device not locked for debugging
86,942 UART: [kat] SHA2-256
890,492 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,621 UART: [kat] ++
894,773 UART: [kat] sha1
899,049 UART: [kat] SHA2-256
900,989 UART: [kat] SHA2-384
903,822 UART: [kat] SHA2-512-ACC
905,723 UART: [kat] ECC-384
914,688 UART: [kat] HMAC-384Kdf
919,212 UART: [kat] LMS
1,167,524 UART: [kat] --
1,168,197 UART: [cold-reset] ++
1,168,611 UART: [fht] FHT @ 0x50003400
1,171,427 UART: [idev] ++
1,171,595 UART: [idev] CDI.KEYID = 6
1,171,956 UART: [idev] SUBJECT.KEYID = 7
1,172,381 UART: [idev] UDS.KEYID = 0
1,172,727 ready_for_fw is high
1,172,727 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,091 UART: [idev] Erasing UDS.KEYID = 0
1,196,749 UART: [idev] Sha1 KeyId Algorithm
1,205,677 UART: [idev] --
1,206,704 UART: [ldev] ++
1,206,872 UART: [ldev] CDI.KEYID = 6
1,207,236 UART: [ldev] SUBJECT.KEYID = 5
1,207,663 UART: [ldev] AUTHORITY.KEYID = 7
1,208,126 UART: [ldev] FE.KEYID = 1
1,213,194 UART: [ldev] Erasing FE.KEYID = 1
1,240,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,748 UART: [ldev] --
1,279,096 UART: [fwproc] Wait for Commands...
1,279,795 UART: [fwproc] Recv command 0x46574c44
1,280,528 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,054 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,363 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,243 >>> mbox cmd response: success
2,771,243 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,772,452 UART: [afmc] ++
2,772,620 UART: [afmc] CDI.KEYID = 6
2,772,983 UART: [afmc] SUBJECT.KEYID = 7
2,773,409 UART: [afmc] AUTHORITY.KEYID = 5
2,808,986 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,236 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,987 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,716 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,599 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,318 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,273 UART: [afmc] --
2,852,281 UART: [cold-reset] --
2,853,103 UART: [state] Locking Datavault
2,853,922 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,526 UART: [state] Locking ICCM
2,855,170 UART: [exit] Launching FMC @ 0x40000130
2,860,499 UART:
2,860,515 UART: Running Caliptra FMC ...
2,860,923 UART:
2,860,977 UART: [state] CFI Enabled
2,871,220 UART: [fht] FMC Alias Private Key: 7
2,979,005 UART: [art] Extend RT PCRs Done
2,979,433 UART: [art] Lock RT PCRs Done
2,980,811 UART: [art] Populate DV Done
2,989,088 UART: [fht] FMC Alias Private Key: 7
2,990,260 UART: [art] Derive CDI
2,990,540 UART: [art] Store in in slot 0x4
3,076,221 UART: [art] Derive Key Pair
3,076,581 UART: [art] Store priv key in slot 0x5
3,090,197 UART: [art] Derive Key Pair - Done
3,104,962 UART: [art] Signing Cert with AUTHO
3,105,442 UART: RITY.KEYID = 7
3,121,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,935 UART: [art] PUB.X = 4EFF88427D7CA71180DCA7EE1CF6A3AB307DC0A1A690976C6937BB63F21F728473197E84E88D228F8B86D3A1715ED684
3,128,711 UART: [art] PUB.Y = FBC94EAF373AB5D18DFCDE89191766B091E28F4D6366DB799C524C3B7A0E4C7407C36D9205C5A2515CCB28B970541C3E
3,135,662 UART: [art] SIG.R = 79BC0580A2B0093AC27B14026B3BEECB34FD6835448F3A2E9D5F92FC833EFDF53E35D53F87FA839323BBF2D475CD3A3D
3,142,439 UART: [art] SIG.S = 35567DF3D490ADF105744E465DF4F875F24D24C093C59C23ADF5BEFEF1E0FBB71B460404C23A9462E5113323CD6E8B86
3,165,841 UART: Caliptra RT
3,166,094 UART: [state] CFI Enabled
3,274,153 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,259 UART: [rt]cmd =0x46505344, len=4
3,412,521 >>> mbox cmd response data (8 bytes)
3,412,522 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,412,558 UART: Fatal Error: 0x000E0008
3,413,681 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,510 ready_for_fw is high
1,056,510 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,331 >>> mbox cmd response: success
2,623,331 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,684,837 UART:
2,684,853 UART: Running Caliptra FMC ...
2,685,261 UART:
2,685,315 UART: [state] CFI Enabled
2,695,692 UART: [fht] FMC Alias Private Key: 7
2,803,665 UART: [art] Extend RT PCRs Done
2,804,093 UART: [art] Lock RT PCRs Done
2,805,475 UART: [art] Populate DV Done
2,813,644 UART: [fht] FMC Alias Private Key: 7
2,814,596 UART: [art] Derive CDI
2,814,876 UART: [art] Store in in slot 0x4
2,900,379 UART: [art] Derive Key Pair
2,900,739 UART: [art] Store priv key in slot 0x5
2,913,889 UART: [art] Derive Key Pair - Done
2,928,474 UART: [art] Signing Cert with AUTHO
2,928,954 UART: RITY.KEYID = 7
2,944,122 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,887 UART: [art] PUB.X = D0D16096EDFFCE6A0B90EB80CD7E017AA105C9A36EB0463E7A6F2B81707FF3F7C6CA1DB1A1FAF00F140915F8385363C5
2,951,660 UART: [art] PUB.Y = 9DE79D9D7442809F461A14F6A41F2274CAF45A97F880F724BB250756E4B42FF889DB76C7A8A453B10DD9E88C8409CBAA
2,958,609 UART: [art] SIG.R = BB232ADDA92021BE2642269953FB2B74AAD8FC21EF59510660FC6B9D48416CA58E329260F497F4D7922D58425CAABF73
2,965,382 UART: [art] SIG.S = 42D95C6EF5BD98EACC9E409C595E7B37EE3B886DD9855615C5CC6DB73D9BF38BA0AF864F3FB658C9CB295EE9B8858941
2,989,591 UART: Caliptra RT
2,989,844 UART: [state] CFI Enabled
3,097,181 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,693 UART: [rt]cmd =0x46505344, len=4
3,235,977 >>> mbox cmd response data (8 bytes)
3,235,978 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,236,014 UART: Fatal Error: 0x000E0008
3,237,137 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
88,157 UART: [kat] SHA2-256
891,707 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,836 UART: [kat] ++
895,988 UART: [kat] sha1
900,282 UART: [kat] SHA2-256
902,222 UART: [kat] SHA2-384
904,939 UART: [kat] SHA2-512-ACC
906,840 UART: [kat] ECC-384
916,657 UART: [kat] HMAC-384Kdf
921,329 UART: [kat] LMS
1,169,641 UART: [kat] --
1,170,576 UART: [cold-reset] ++
1,171,016 UART: [fht] FHT @ 0x50003400
1,173,790 UART: [idev] ++
1,173,958 UART: [idev] CDI.KEYID = 6
1,174,319 UART: [idev] SUBJECT.KEYID = 7
1,174,744 UART: [idev] UDS.KEYID = 0
1,175,090 ready_for_fw is high
1,175,090 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,812 UART: [idev] Erasing UDS.KEYID = 0
1,199,802 UART: [idev] Sha1 KeyId Algorithm
1,208,544 UART: [idev] --
1,209,619 UART: [ldev] ++
1,209,787 UART: [ldev] CDI.KEYID = 6
1,210,151 UART: [ldev] SUBJECT.KEYID = 5
1,210,578 UART: [ldev] AUTHORITY.KEYID = 7
1,211,041 UART: [ldev] FE.KEYID = 1
1,216,187 UART: [ldev] Erasing FE.KEYID = 1
1,242,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,621 UART: [ldev] --
1,282,105 UART: [fwproc] Wait for Commands...
1,282,684 UART: [fwproc] Recv command 0x46574c44
1,283,417 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,367 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,569 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,878 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,690 >>> mbox cmd response: success
2,772,690 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,773,849 UART: [afmc] ++
2,774,017 UART: [afmc] CDI.KEYID = 6
2,774,380 UART: [afmc] SUBJECT.KEYID = 7
2,774,806 UART: [afmc] AUTHORITY.KEYID = 5
2,810,661 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,678 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,407 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,290 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,009 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,768 UART: [afmc] --
2,853,782 UART: [cold-reset] --
2,854,422 UART: [state] Locking Datavault
2,855,543 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,147 UART: [state] Locking ICCM
2,856,671 UART: [exit] Launching FMC @ 0x40000130
2,862,000 UART:
2,862,016 UART: Running Caliptra FMC ...
2,862,424 UART:
2,862,567 UART: [state] CFI Enabled
2,873,028 UART: [fht] FMC Alias Private Key: 7
2,980,731 UART: [art] Extend RT PCRs Done
2,981,159 UART: [art] Lock RT PCRs Done
2,982,501 UART: [art] Populate DV Done
2,990,700 UART: [fht] FMC Alias Private Key: 7
2,991,816 UART: [art] Derive CDI
2,992,096 UART: [art] Store in in slot 0x4
3,077,783 UART: [art] Derive Key Pair
3,078,143 UART: [art] Store priv key in slot 0x5
3,091,489 UART: [art] Derive Key Pair - Done
3,106,126 UART: [art] Signing Cert with AUTHO
3,106,606 UART: RITY.KEYID = 7
3,121,562 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,327 UART: [art] PUB.X = 5953D97787310348F7B7B6DF35656C4EC5550B9F80F5D114104A43FF49FAC4285920721DE87EFE65E2646331FC508397
3,129,083 UART: [art] PUB.Y = 36DFE3DF0A913DE308FB2721B4B61514FE376D4DED57DA3C6B82626DDB28BA403397451F9D8C35690B2D439325E135EC
3,136,032 UART: [art] SIG.R = 577F966A26D002483C18445695327DD1B039E2D8B9725E7A4F9BC588D4CC9B8BB42C708577C714970408464928688932
3,142,777 UART: [art] SIG.S = 811479E04B97B376EC666B3C2C0F15E803FE89B163303920945BB157F963F417B51E430A1F1B13BD820CA26C13B82E0B
3,166,133 UART: Caliptra RT
3,166,478 UART: [state] CFI Enabled
3,274,669 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,127 UART: [rt]cmd =0x46505344, len=4
3,413,755 >>> mbox cmd response data (8 bytes)
3,413,756 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,413,792 UART: Fatal Error: 0x000E0008
3,414,915 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,091 ready_for_fw is high
1,056,091 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,114 >>> mbox cmd response: success
2,623,114 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,684,536 UART:
2,684,552 UART: Running Caliptra FMC ...
2,684,960 UART:
2,685,103 UART: [state] CFI Enabled
2,696,094 UART: [fht] FMC Alias Private Key: 7
2,804,411 UART: [art] Extend RT PCRs Done
2,804,839 UART: [art] Lock RT PCRs Done
2,806,235 UART: [art] Populate DV Done
2,814,580 UART: [fht] FMC Alias Private Key: 7
2,815,514 UART: [art] Derive CDI
2,815,794 UART: [art] Store in in slot 0x4
2,901,241 UART: [art] Derive Key Pair
2,901,601 UART: [art] Store priv key in slot 0x5
2,915,641 UART: [art] Derive Key Pair - Done
2,930,088 UART: [art] Signing Cert with AUTHO
2,930,568 UART: RITY.KEYID = 7
2,945,464 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,229 UART: [art] PUB.X = 7BFFB33074D9B33E61C95FDAA4C88D4901230183B04FD7082EC7F67F9DC4B511257FDD5A9731A9C4C0E62734D53D9F41
2,952,998 UART: [art] PUB.Y = 87A0EDF977C25F44BC040F95AEBE6F4CC4BB7C12A46BE9F5FAC7BAC1C9874DB897B8FF4FE746B836075AC7C71EA772DB
2,959,967 UART: [art] SIG.R = 5727B1C59FD66DAE080969C0DB86CE23462EEA317FA3AF1F7EF9483E3D692260FBC8AB1A1D76E11C67D17B61DC011A08
2,966,739 UART: [art] SIG.S = 2A16BCDD738240112D5B07C7DA3BEFBEB7C2B7ACA836343B0AF78DDCF117E1873CFF0610964357BC6AE0E68C9580D323
2,990,201 UART: Caliptra RT
2,990,546 UART: [state] CFI Enabled
3,097,837 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,619 UART: [rt]cmd =0x46505344, len=4
3,237,091 >>> mbox cmd response data (8 bytes)
3,237,092 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,237,128 UART: Fatal Error: 0x000E0008
3,238,251 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,549 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,063 UART: [kat] SHA2-256
881,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,109 UART: [kat] ++
886,261 UART: [kat] sha1
890,613 UART: [kat] SHA2-256
892,551 UART: [kat] SHA2-384
895,332 UART: [kat] SHA2-512-ACC
897,233 UART: [kat] ECC-384
902,656 UART: [kat] HMAC-384Kdf
907,372 UART: [kat] LMS
1,475,568 UART: [kat] --
1,476,503 UART: [cold-reset] ++
1,476,903 UART: [fht] Storing FHT @ 0x50003400
1,479,714 UART: [idev] ++
1,479,882 UART: [idev] CDI.KEYID = 6
1,480,242 UART: [idev] SUBJECT.KEYID = 7
1,480,666 UART: [idev] UDS.KEYID = 0
1,481,011 ready_for_fw is high
1,481,011 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,370 UART: [idev] Erasing UDS.KEYID = 0
1,504,462 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,976 UART: [idev] --
1,513,925 UART: [ldev] ++
1,514,093 UART: [ldev] CDI.KEYID = 6
1,514,456 UART: [ldev] SUBJECT.KEYID = 5
1,514,882 UART: [ldev] AUTHORITY.KEYID = 7
1,515,345 UART: [ldev] FE.KEYID = 1
1,520,691 UART: [ldev] Erasing FE.KEYID = 1
1,545,968 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,994 UART: [ldev] --
1,585,407 UART: [fwproc] Waiting for Commands...
1,586,230 UART: [fwproc] Received command 0x46574c44
1,587,021 UART: [fwproc] Received Image of size 114332 bytes
2,885,013 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,453 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,805 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,618 >>> mbox cmd response: success
3,077,618 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,078,812 UART: [afmc] ++
3,078,980 UART: [afmc] CDI.KEYID = 6
3,079,342 UART: [afmc] SUBJECT.KEYID = 7
3,079,767 UART: [afmc] AUTHORITY.KEYID = 5
3,114,766 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,096 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,876 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,604 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,489 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,179 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,052 UART: [afmc] --
3,158,082 UART: [cold-reset] --
3,158,994 UART: [state] Locking Datavault
3,160,259 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,863 UART: [state] Locking ICCM
3,161,421 UART: [exit] Launching FMC @ 0x40000130
3,166,750 UART:
3,166,766 UART: Running Caliptra FMC ...
3,167,174 UART:
3,167,228 UART: [state] CFI Enabled
3,177,839 UART: [fht] FMC Alias Private Key: 7
3,285,916 UART: [art] Extend RT PCRs Done
3,286,344 UART: [art] Lock RT PCRs Done
3,287,970 UART: [art] Populate DV Done
3,295,891 UART: [fht] FMC Alias Private Key: 7
3,296,955 UART: [art] Derive CDI
3,297,235 UART: [art] Store in in slot 0x4
3,383,308 UART: [art] Derive Key Pair
3,383,668 UART: [art] Store priv key in slot 0x5
3,396,098 UART: [art] Derive Key Pair - Done
3,411,180 UART: [art] Signing Cert with AUTHO
3,411,660 UART: RITY.KEYID = 7
3,426,782 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,547 UART: [art] PUB.X = 23F5B20CFFF9E39A62BC2A082AD5D45E5C9691355152387EC0EBC30F5B4FD6D6C30F0946BDB4B55D0B0E7CBB469D0F52
3,434,311 UART: [art] PUB.Y = 452F95E19A9CE5FB8885956DE6388E9DC2AA9BCB1B41E0A18E74B043DB375E99CEA655C5626237C15F398C1CD44F0CEE
3,441,272 UART: [art] SIG.R = 4BC5ECB2C590D82C7079541936053E16EFADDA06A9D78368B67F735EB7AF24905DA93F134DAE23910D7CA897F633D79C
3,448,041 UART: [art] SIG.S = B8D639B7F45764C99BC6527C3A6C8A6855CCE0F636799754AA50A3C47EDE0F7E0CAF1B5D3F0C5B2060C860636357F097
3,471,311 UART: Caliptra RT
3,471,564 UART: [state] CFI Enabled
3,580,203 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,845 UART: [rt]cmd =0x46505652, len=4
3,611,505 UART: [rt] FIPS Version
3,612,584 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,055 ready_for_fw is high
1,363,055 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,498 >>> mbox cmd response: success
2,929,498 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,990,624 UART:
2,990,640 UART: Running Caliptra FMC ...
2,991,048 UART:
2,991,102 UART: [state] CFI Enabled
3,001,483 UART: [fht] FMC Alias Private Key: 7
3,109,430 UART: [art] Extend RT PCRs Done
3,109,858 UART: [art] Lock RT PCRs Done
3,111,398 UART: [art] Populate DV Done
3,119,595 UART: [fht] FMC Alias Private Key: 7
3,120,697 UART: [art] Derive CDI
3,120,977 UART: [art] Store in in slot 0x4
3,206,538 UART: [art] Derive Key Pair
3,206,898 UART: [art] Store priv key in slot 0x5
3,220,054 UART: [art] Derive Key Pair - Done
3,234,960 UART: [art] Signing Cert with AUTHO
3,235,440 UART: RITY.KEYID = 7
3,250,810 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,575 UART: [art] PUB.X = 42CAE4FD829C503EAD6750C6D5D2BE86907537E4B92DE7D56F144318B145F77E9270108AFE29AA62A2BCC955455C1811
3,258,349 UART: [art] PUB.Y = 360F24D7785884E276596F259B68B8BEBC4CB36B1F84478890C1433C0AAB4AE381C923C5183C844E3C9B41B8102B8C7F
3,265,293 UART: [art] SIG.R = 38C12C311AD9185E2147513900AA4A69132E548F60DF8E9E4AE68D95163B5B4F73F018BBA61252915F52F7135005AB8C
3,272,034 UART: [art] SIG.S = 3033985502AE97AFE61E3431AA9F44C90D11FFDF18BC5F99026FFD0E6F1BB78D2900A263274FE15BC214347B70DDA068
3,296,017 UART: Caliptra RT
3,296,270 UART: [state] CFI Enabled
3,405,380 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,804 UART: [rt]cmd =0x46505652, len=4
3,436,464 UART: [rt] FIPS Version
3,437,399 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,606 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,180 UART: [kat] SHA2-256
882,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,226 UART: [kat] ++
886,378 UART: [kat] sha1
890,554 UART: [kat] SHA2-256
892,492 UART: [kat] SHA2-384
895,133 UART: [kat] SHA2-512-ACC
897,034 UART: [kat] ECC-384
902,693 UART: [kat] HMAC-384Kdf
907,161 UART: [kat] LMS
1,475,357 UART: [kat] --
1,476,072 UART: [cold-reset] ++
1,476,496 UART: [fht] Storing FHT @ 0x50003400
1,479,391 UART: [idev] ++
1,479,559 UART: [idev] CDI.KEYID = 6
1,479,919 UART: [idev] SUBJECT.KEYID = 7
1,480,343 UART: [idev] UDS.KEYID = 0
1,480,688 ready_for_fw is high
1,480,688 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,509 UART: [idev] Erasing UDS.KEYID = 0
1,505,051 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,601 UART: [idev] --
1,514,722 UART: [ldev] ++
1,514,890 UART: [ldev] CDI.KEYID = 6
1,515,253 UART: [ldev] SUBJECT.KEYID = 5
1,515,679 UART: [ldev] AUTHORITY.KEYID = 7
1,516,142 UART: [ldev] FE.KEYID = 1
1,521,574 UART: [ldev] Erasing FE.KEYID = 1
1,547,135 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,991 UART: [ldev] --
1,586,400 UART: [fwproc] Waiting for Commands...
1,587,165 UART: [fwproc] Received command 0x46574c44
1,587,956 UART: [fwproc] Received Image of size 114332 bytes
2,886,548 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,506 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,858 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,777 >>> mbox cmd response: success
3,079,777 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,080,877 UART: [afmc] ++
3,081,045 UART: [afmc] CDI.KEYID = 6
3,081,407 UART: [afmc] SUBJECT.KEYID = 7
3,081,832 UART: [afmc] AUTHORITY.KEYID = 5
3,117,447 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,995 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,775 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,503 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,388 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,078 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,011 UART: [afmc] --
3,160,893 UART: [cold-reset] --
3,161,779 UART: [state] Locking Datavault
3,162,946 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,550 UART: [state] Locking ICCM
3,164,056 UART: [exit] Launching FMC @ 0x40000130
3,169,385 UART:
3,169,401 UART: Running Caliptra FMC ...
3,169,809 UART:
3,169,952 UART: [state] CFI Enabled
3,180,641 UART: [fht] FMC Alias Private Key: 7
3,288,680 UART: [art] Extend RT PCRs Done
3,289,108 UART: [art] Lock RT PCRs Done
3,290,854 UART: [art] Populate DV Done
3,299,135 UART: [fht] FMC Alias Private Key: 7
3,300,265 UART: [art] Derive CDI
3,300,545 UART: [art] Store in in slot 0x4
3,386,190 UART: [art] Derive Key Pair
3,386,550 UART: [art] Store priv key in slot 0x5
3,399,950 UART: [art] Derive Key Pair - Done
3,414,697 UART: [art] Signing Cert with AUTHO
3,415,177 UART: RITY.KEYID = 7
3,430,583 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,348 UART: [art] PUB.X = 447C38B1EDC817668C693B23F2CD6ED65BB8C42BD1066E81830204D9403AEC9D9C8900E2439D2402E61D375E1517D65B
3,438,084 UART: [art] PUB.Y = 67D6ACF245761E3FBB5D057E0573E2819F304AFA56D53798C46C0FD3D2BDE603E9F8B2C6FBF0A354CBD2DA5FE42227DA
3,445,042 UART: [art] SIG.R = EB2745CFB7B603FD5888290A5D55C151E025AC08EEF1788874FB4A9EAA8F8C96695A6873D858EBB756DB11799E232F21
3,451,809 UART: [art] SIG.S = B4F72546C44301FA1C74496615E2E2408EC417451A0CB2EEB49FD709FC097EA2E430202D68260C3B250B6DE8DDF1DD0F
3,475,587 UART: Caliptra RT
3,475,932 UART: [state] CFI Enabled
3,584,314 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,936 UART: [rt]cmd =0x46505652, len=4
3,615,596 UART: [rt] FIPS Version
3,616,671 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,352 ready_for_fw is high
1,362,352 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,761 >>> mbox cmd response: success
2,928,761 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,990,611 UART:
2,990,627 UART: Running Caliptra FMC ...
2,991,035 UART:
2,991,178 UART: [state] CFI Enabled
3,001,945 UART: [fht] FMC Alias Private Key: 7
3,109,798 UART: [art] Extend RT PCRs Done
3,110,226 UART: [art] Lock RT PCRs Done
3,111,992 UART: [art] Populate DV Done
3,120,143 UART: [fht] FMC Alias Private Key: 7
3,121,123 UART: [art] Derive CDI
3,121,403 UART: [art] Store in in slot 0x4
3,207,198 UART: [art] Derive Key Pair
3,207,558 UART: [art] Store priv key in slot 0x5
3,221,102 UART: [art] Derive Key Pair - Done
3,235,441 UART: [art] Signing Cert with AUTHO
3,235,921 UART: RITY.KEYID = 7
3,250,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,504 UART: [art] PUB.X = C7CD68F0DA2DD610C4F11D01CDDA1235825F255E1E29501618E4C0FAC399AEC426E1AE68B724F1A6690AD87DC6F6BA97
3,258,284 UART: [art] PUB.Y = 9AD877BD2C49977D63891A88C08B2332E4813F824A1C7C3C235078C9BE76323E720719E5EA0A084B4CB0BF9B6FB622E8
3,265,227 UART: [art] SIG.R = 19B4FAD897E2E3D8ED1E80A6998F3DA461CDE21722A1BD0F720052C069513575CFA2AA34D0C333A8E67D0B6635B5286A
3,271,977 UART: [art] SIG.S = 89235C4DF504C09CDD60809968E7D2758D2FE1B04846C44F48F63912EED73601B15531A61A36C5972AD29B2B8DF37F37
3,296,034 UART: Caliptra RT
3,296,379 UART: [state] CFI Enabled
3,404,754 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,118 UART: [rt]cmd =0x46505652, len=4
3,435,778 UART: [rt] FIPS Version
3,436,661 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,882 UART: [kat] SHA2-256
893,532 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,657 UART: [kat] ++
897,809 UART: [kat] sha1
902,007 UART: [kat] SHA2-256
903,947 UART: [kat] SHA2-384
906,684 UART: [kat] SHA2-512-ACC
908,585 UART: [kat] ECC-384
917,720 UART: [kat] HMAC-384Kdf
922,218 UART: [kat] LMS
1,170,546 UART: [kat] --
1,171,487 UART: [cold-reset] ++
1,171,841 UART: [fht] FHT @ 0x50003400
1,174,442 UART: [idev] ++
1,174,610 UART: [idev] CDI.KEYID = 6
1,174,970 UART: [idev] SUBJECT.KEYID = 7
1,175,394 UART: [idev] UDS.KEYID = 0
1,175,739 ready_for_fw is high
1,175,739 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,360 UART: [idev] Erasing UDS.KEYID = 0
1,200,573 UART: [idev] Sha1 KeyId Algorithm
1,209,061 UART: [idev] --
1,210,037 UART: [ldev] ++
1,210,205 UART: [ldev] CDI.KEYID = 6
1,210,568 UART: [ldev] SUBJECT.KEYID = 5
1,210,994 UART: [ldev] AUTHORITY.KEYID = 7
1,211,457 UART: [ldev] FE.KEYID = 1
1,216,499 UART: [ldev] Erasing FE.KEYID = 1
1,242,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,863 UART: [ldev] --
1,281,130 UART: [fwproc] Wait for Commands...
1,281,908 UART: [fwproc] Recv command 0x46574c44
1,282,636 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,444 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,748 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,495 >>> mbox cmd response: success
2,773,495 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,774,541 UART: [afmc] ++
2,774,709 UART: [afmc] CDI.KEYID = 6
2,775,071 UART: [afmc] SUBJECT.KEYID = 7
2,775,496 UART: [afmc] AUTHORITY.KEYID = 5
2,810,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,212 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,960 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,688 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,573 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,292 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,034 UART: [afmc] --
2,854,108 UART: [cold-reset] --
2,854,888 UART: [state] Locking Datavault
2,855,799 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,403 UART: [state] Locking ICCM
2,857,057 UART: [exit] Launching FMC @ 0x40000130
2,862,386 UART:
2,862,402 UART: Running Caliptra FMC ...
2,862,810 UART:
2,862,864 UART: [state] CFI Enabled
2,873,547 UART: [fht] FMC Alias Private Key: 7
2,981,862 UART: [art] Extend RT PCRs Done
2,982,290 UART: [art] Lock RT PCRs Done
2,983,790 UART: [art] Populate DV Done
2,991,931 UART: [fht] FMC Alias Private Key: 7
2,993,055 UART: [art] Derive CDI
2,993,335 UART: [art] Store in in slot 0x4
3,079,018 UART: [art] Derive Key Pair
3,079,378 UART: [art] Store priv key in slot 0x5
3,092,360 UART: [art] Derive Key Pair - Done
3,107,055 UART: [art] Signing Cert with AUTHO
3,107,535 UART: RITY.KEYID = 7
3,122,919 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,684 UART: [art] PUB.X = A904D098A4F0D09D7C606163984B510A0C1818204D1D2CB18D774F5C1737483932B2EE755B83E4EB7938F9AD9A1CF92D
3,130,445 UART: [art] PUB.Y = 951FB662184BFF55F233145A44A1C59D403F199988AE4484025099A333D90E69C7F3BCA9E3F02B341FB5F19E8B685427
3,137,385 UART: [art] SIG.R = C246B84B2BE83CBE6E66B47C695988FB25000D2AC40B0D38C5D85F37C70DBCC20E0E95DC732F8F4926856838AAA42C64
3,144,125 UART: [art] SIG.S = BC197B697BB8F2A4017C6265B41F64F5457602BEB3930BEF163E8B52C7D05CC524FF2E363749C47D6FED82C723936ADE
3,167,875 UART: Caliptra RT
3,168,128 UART: [state] CFI Enabled
3,275,106 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,424 UART: [rt]cmd =0x46505652, len=4
3,306,084 UART: [rt] FIPS Version
3,307,165 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,149 ready_for_fw is high
1,060,149 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,286 >>> mbox cmd response: success
2,627,286 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,138 UART:
2,689,154 UART: Running Caliptra FMC ...
2,689,562 UART:
2,689,616 UART: [state] CFI Enabled
2,700,331 UART: [fht] FMC Alias Private Key: 7
2,808,832 UART: [art] Extend RT PCRs Done
2,809,260 UART: [art] Lock RT PCRs Done
2,810,702 UART: [art] Populate DV Done
2,818,929 UART: [fht] FMC Alias Private Key: 7
2,819,903 UART: [art] Derive CDI
2,820,183 UART: [art] Store in in slot 0x4
2,905,984 UART: [art] Derive Key Pair
2,906,344 UART: [art] Store priv key in slot 0x5
2,919,516 UART: [art] Derive Key Pair - Done
2,934,209 UART: [art] Signing Cert with AUTHO
2,934,689 UART: RITY.KEYID = 7
2,949,837 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,602 UART: [art] PUB.X = D6B630B205FFCC6CCF0BFB329404BCD84211D03F23C0043A6D7EF9424746A5480957C7A32D3539B915A08F95465C1D7D
2,957,361 UART: [art] PUB.Y = 32DA72B0E60ED18B42E98301758C7E71ABF88C0C6D7D829CB37337BF017D483E38CFA4449EC31E836D481BCCAB82E73B
2,964,311 UART: [art] SIG.R = 7F87DAAED76B1A841D27EF6EB45D003242B10F83507EBBBB971E747F2D33EA1F5EA0995F06B9C43B47753BCF42BC40BA
2,971,071 UART: [art] SIG.S = E64554D65E226308855B7A23B162C308F1937AE30718EB25BC7C0E33987F0A3FD719047891B71B005BFB0EE641100558
2,995,616 UART: Caliptra RT
2,995,869 UART: [state] CFI Enabled
3,102,970 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,314 UART: [rt]cmd =0x46505652, len=4
3,133,974 UART: [rt] FIPS Version
3,134,975 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
893,447 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,572 UART: [kat] ++
897,724 UART: [kat] sha1
901,812 UART: [kat] SHA2-256
903,752 UART: [kat] SHA2-384
906,463 UART: [kat] SHA2-512-ACC
908,364 UART: [kat] ECC-384
918,145 UART: [kat] HMAC-384Kdf
922,619 UART: [kat] LMS
1,170,947 UART: [kat] --
1,171,866 UART: [cold-reset] ++
1,172,446 UART: [fht] FHT @ 0x50003400
1,175,201 UART: [idev] ++
1,175,369 UART: [idev] CDI.KEYID = 6
1,175,729 UART: [idev] SUBJECT.KEYID = 7
1,176,153 UART: [idev] UDS.KEYID = 0
1,176,498 ready_for_fw is high
1,176,498 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,159 UART: [idev] Erasing UDS.KEYID = 0
1,201,668 UART: [idev] Sha1 KeyId Algorithm
1,210,100 UART: [idev] --
1,211,128 UART: [ldev] ++
1,211,296 UART: [ldev] CDI.KEYID = 6
1,211,659 UART: [ldev] SUBJECT.KEYID = 5
1,212,085 UART: [ldev] AUTHORITY.KEYID = 7
1,212,548 UART: [ldev] FE.KEYID = 1
1,217,692 UART: [ldev] Erasing FE.KEYID = 1
1,243,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,774 UART: [ldev] --
1,283,285 UART: [fwproc] Wait for Commands...
1,283,983 UART: [fwproc] Recv command 0x46574c44
1,284,711 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,465 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,769 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,662 >>> mbox cmd response: success
2,774,662 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,822 UART: [afmc] ++
2,775,990 UART: [afmc] CDI.KEYID = 6
2,776,352 UART: [afmc] SUBJECT.KEYID = 7
2,776,777 UART: [afmc] AUTHORITY.KEYID = 5
2,812,628 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,877 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,625 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,353 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,238 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,957 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,703 UART: [afmc] --
2,855,611 UART: [cold-reset] --
2,856,677 UART: [state] Locking Datavault
2,857,918 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,522 UART: [state] Locking ICCM
2,859,130 UART: [exit] Launching FMC @ 0x40000130
2,864,459 UART:
2,864,475 UART: Running Caliptra FMC ...
2,864,883 UART:
2,865,026 UART: [state] CFI Enabled
2,875,757 UART: [fht] FMC Alias Private Key: 7
2,983,840 UART: [art] Extend RT PCRs Done
2,984,268 UART: [art] Lock RT PCRs Done
2,985,808 UART: [art] Populate DV Done
2,994,061 UART: [fht] FMC Alias Private Key: 7
2,995,181 UART: [art] Derive CDI
2,995,461 UART: [art] Store in in slot 0x4
3,081,542 UART: [art] Derive Key Pair
3,081,902 UART: [art] Store priv key in slot 0x5
3,094,878 UART: [art] Derive Key Pair - Done
3,110,014 UART: [art] Signing Cert with AUTHO
3,110,494 UART: RITY.KEYID = 7
3,125,784 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,549 UART: [art] PUB.X = 055698CD92FDF87DE06FCF99E0768DF9648DE058110E44E6A22372E19F660A8A1638DEE5FB4C6E674FED5DE9125B44A2
3,133,320 UART: [art] PUB.Y = 3C8FE03FE5008DABF8CCC66D797F53085CFFB914456B7FD4280AA83809E7A4155A57657ADD1BBB4BBF8C15251E2916AE
3,140,255 UART: [art] SIG.R = 92E508EB655E043BB93C50EBC94ABC3F3464C91B39F92E4DC08415A3533C4D5F3C215BA403D4FF7501B3201ACC1108B1
3,147,018 UART: [art] SIG.S = 9FDD551B8345FD1F449815557AD1A55BFFB006F437DF17F9669D0F64D2598A7E232922227530FD906C917B5C060B65C7
3,170,503 UART: Caliptra RT
3,170,848 UART: [state] CFI Enabled
3,278,088 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,830 UART: [rt]cmd =0x46505652, len=4
3,309,490 UART: [rt] FIPS Version
3,310,573 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,436 ready_for_fw is high
1,060,436 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,067 >>> mbox cmd response: success
2,628,067 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,905 UART:
2,689,921 UART: Running Caliptra FMC ...
2,690,329 UART:
2,690,472 UART: [state] CFI Enabled
2,701,171 UART: [fht] FMC Alias Private Key: 7
2,809,110 UART: [art] Extend RT PCRs Done
2,809,538 UART: [art] Lock RT PCRs Done
2,811,274 UART: [art] Populate DV Done
2,819,447 UART: [fht] FMC Alias Private Key: 7
2,820,621 UART: [art] Derive CDI
2,820,901 UART: [art] Store in in slot 0x4
2,906,638 UART: [art] Derive Key Pair
2,906,998 UART: [art] Store priv key in slot 0x5
2,920,170 UART: [art] Derive Key Pair - Done
2,935,206 UART: [art] Signing Cert with AUTHO
2,935,686 UART: RITY.KEYID = 7
2,951,264 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,029 UART: [art] PUB.X = 95CE67EC4FB98F54B5B9F072CEF6505C8F3B8FF57DE356AEDA55AA1F9E734970F38A9E057C938C0ECD1AEE27D388BAEA
2,958,819 UART: [art] PUB.Y = 7F0D408381646C1651B84312EDE4F14928E0576D84F552CFEF14B2809C0A87C9C7B97263C1BEF5E76D94FB847D0BF180
2,965,762 UART: [art] SIG.R = 6A2A2B21EC87D9CB2728AA5AACBEE6FB6C1EEDBD43368AEC986AA3BEC1D37F94560A4916F3FCB373B171ED712AECA844
2,972,559 UART: [art] SIG.S = 72545E600B02D07AD67715BA763FB3BBAB9FEB269EBC3E4EADC132CE4D7FB4FAF00451EE9A0DD05E1643E348BAAF65DA
2,996,654 UART: Caliptra RT
2,996,999 UART: [state] CFI Enabled
3,105,180 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,728 UART: [rt]cmd =0x46505652, len=4
3,136,388 UART: [rt] FIPS Version
3,137,215 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,253 UART: [kat] ++
895,405 UART: [kat] sha1
899,689 UART: [kat] SHA2-256
901,629 UART: [kat] SHA2-384
904,516 UART: [kat] SHA2-512-ACC
906,417 UART: [kat] ECC-384
916,090 UART: [kat] HMAC-384Kdf
920,618 UART: [kat] LMS
1,168,930 UART: [kat] --
1,169,891 UART: [cold-reset] ++
1,170,273 UART: [fht] FHT @ 0x50003400
1,172,857 UART: [idev] ++
1,173,025 UART: [idev] CDI.KEYID = 6
1,173,386 UART: [idev] SUBJECT.KEYID = 7
1,173,811 UART: [idev] UDS.KEYID = 0
1,174,157 ready_for_fw is high
1,174,157 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,169 UART: [idev] Erasing UDS.KEYID = 0
1,199,505 UART: [idev] Sha1 KeyId Algorithm
1,208,347 UART: [idev] --
1,209,340 UART: [ldev] ++
1,209,508 UART: [ldev] CDI.KEYID = 6
1,209,872 UART: [ldev] SUBJECT.KEYID = 5
1,210,299 UART: [ldev] AUTHORITY.KEYID = 7
1,210,762 UART: [ldev] FE.KEYID = 1
1,216,120 UART: [ldev] Erasing FE.KEYID = 1
1,242,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,138 UART: [ldev] --
1,281,616 UART: [fwproc] Wait for Commands...
1,282,355 UART: [fwproc] Recv command 0x46574c44
1,283,088 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,788 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,097 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,839 >>> mbox cmd response: success
2,771,839 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,772,898 UART: [afmc] ++
2,773,066 UART: [afmc] CDI.KEYID = 6
2,773,429 UART: [afmc] SUBJECT.KEYID = 7
2,773,855 UART: [afmc] AUTHORITY.KEYID = 5
2,808,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,036 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,787 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,516 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,399 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,118 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,061 UART: [afmc] --
2,852,021 UART: [cold-reset] --
2,852,773 UART: [state] Locking Datavault
2,854,070 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,674 UART: [state] Locking ICCM
2,855,226 UART: [exit] Launching FMC @ 0x40000130
2,860,555 UART:
2,860,571 UART: Running Caliptra FMC ...
2,860,979 UART:
2,861,033 UART: [state] CFI Enabled
2,871,282 UART: [fht] FMC Alias Private Key: 7
2,978,995 UART: [art] Extend RT PCRs Done
2,979,423 UART: [art] Lock RT PCRs Done
2,980,833 UART: [art] Populate DV Done
2,989,292 UART: [fht] FMC Alias Private Key: 7
2,990,246 UART: [art] Derive CDI
2,990,526 UART: [art] Store in in slot 0x4
3,076,071 UART: [art] Derive Key Pair
3,076,431 UART: [art] Store priv key in slot 0x5
3,089,689 UART: [art] Derive Key Pair - Done
3,104,529 UART: [art] Signing Cert with AUTHO
3,105,009 UART: RITY.KEYID = 7
3,120,275 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,040 UART: [art] PUB.X = 98D94B94E5BE983F42954A6E87160A80B4177B7494CF37A442CD9256A8D8F76E80E966A959CF558FE67015F3A6AE63DA
3,127,809 UART: [art] PUB.Y = 45FA9B391A2D0951E1F480F0658B0E3C5FFA7CB866FC47750E09EE0013A660ACD00CC2343FFBF679519748850E0D9583
3,134,720 UART: [art] SIG.R = 07BDEA6F4C6DC86182DF60355D13B7A93E03515FA46C7E161E2AFD946746B3CE994D6598C6D67C80611FCA795B44E356
3,141,490 UART: [art] SIG.S = D98D16F63C913E17638020EF46A60CF7C534AD20327E8884FF93830EB2D14B03A54DE8107C07C020E9B3618A7F3CFCF1
3,165,475 UART: Caliptra RT
3,165,728 UART: [state] CFI Enabled
3,273,341 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,705 UART: [rt]cmd =0x46505652, len=4
3,304,365 UART: [rt] FIPS Version
3,305,568 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,276 ready_for_fw is high
1,055,276 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,645 >>> mbox cmd response: success
2,621,645 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,683,945 UART:
2,683,961 UART: Running Caliptra FMC ...
2,684,369 UART:
2,684,423 UART: [state] CFI Enabled
2,694,980 UART: [fht] FMC Alias Private Key: 7
2,802,563 UART: [art] Extend RT PCRs Done
2,802,991 UART: [art] Lock RT PCRs Done
2,804,607 UART: [art] Populate DV Done
2,813,074 UART: [fht] FMC Alias Private Key: 7
2,814,202 UART: [art] Derive CDI
2,814,482 UART: [art] Store in in slot 0x4
2,900,583 UART: [art] Derive Key Pair
2,900,943 UART: [art] Store priv key in slot 0x5
2,914,089 UART: [art] Derive Key Pair - Done
2,928,894 UART: [art] Signing Cert with AUTHO
2,929,374 UART: RITY.KEYID = 7
2,944,536 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,301 UART: [art] PUB.X = 6B0DB6CF71526500CD68FA3E1F9BB476E22D1E92A54ED8D31E61AE436C7CBFEEFA64DC8DD05DBC3F2E51F1F4F28A91D4
2,952,074 UART: [art] PUB.Y = 5E4787216C1330B59C4B49D4669DD4C4132F76ABBBAA6B7CCD4E91EFA7AB0B3AB778F9069479E6934E127BABA1DC6C60
2,959,034 UART: [art] SIG.R = 63499CF4A65023679D9164A16DEB58E3F5B203460D69DCBC43EC5283238799AD660D7E4B245C893CD0AAE1BAAE42DC8E
2,965,805 UART: [art] SIG.S = EAC3C1D63904B2E4FFC662CD46D911E3B4A9E25B99BD0E5504C59B11C343E4214DBEB79451909B02031F21FE2F4385A8
2,989,629 UART: Caliptra RT
2,989,882 UART: [state] CFI Enabled
3,096,667 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,087 UART: [rt]cmd =0x46505652, len=4
3,127,747 UART: [rt] FIPS Version
3,128,834 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
86,972 UART: [state] WD Timer not started. Device not locked for debugging
88,323 UART: [kat] SHA2-256
891,873 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,002 UART: [kat] ++
896,154 UART: [kat] sha1
900,256 UART: [kat] SHA2-256
902,196 UART: [kat] SHA2-384
905,131 UART: [kat] SHA2-512-ACC
907,032 UART: [kat] ECC-384
916,755 UART: [kat] HMAC-384Kdf
921,393 UART: [kat] LMS
1,169,705 UART: [kat] --
1,170,612 UART: [cold-reset] ++
1,171,090 UART: [fht] FHT @ 0x50003400
1,173,674 UART: [idev] ++
1,173,842 UART: [idev] CDI.KEYID = 6
1,174,203 UART: [idev] SUBJECT.KEYID = 7
1,174,628 UART: [idev] UDS.KEYID = 0
1,174,974 ready_for_fw is high
1,174,974 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,574 UART: [idev] Erasing UDS.KEYID = 0
1,200,504 UART: [idev] Sha1 KeyId Algorithm
1,209,472 UART: [idev] --
1,210,625 UART: [ldev] ++
1,210,793 UART: [ldev] CDI.KEYID = 6
1,211,157 UART: [ldev] SUBJECT.KEYID = 5
1,211,584 UART: [ldev] AUTHORITY.KEYID = 7
1,212,047 UART: [ldev] FE.KEYID = 1
1,217,503 UART: [ldev] Erasing FE.KEYID = 1
1,243,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,743 UART: [ldev] --
1,283,011 UART: [fwproc] Wait for Commands...
1,283,774 UART: [fwproc] Recv command 0x46574c44
1,284,507 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,121 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,430 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,150 >>> mbox cmd response: success
2,774,150 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,171 UART: [afmc] ++
2,775,339 UART: [afmc] CDI.KEYID = 6
2,775,702 UART: [afmc] SUBJECT.KEYID = 7
2,776,128 UART: [afmc] AUTHORITY.KEYID = 5
2,812,205 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,893 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,644 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,373 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,256 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,975 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,840 UART: [afmc] --
2,855,782 UART: [cold-reset] --
2,856,496 UART: [state] Locking Datavault
2,857,769 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,373 UART: [state] Locking ICCM
2,858,987 UART: [exit] Launching FMC @ 0x40000130
2,864,316 UART:
2,864,332 UART: Running Caliptra FMC ...
2,864,740 UART:
2,864,883 UART: [state] CFI Enabled
2,875,432 UART: [fht] FMC Alias Private Key: 7
2,982,973 UART: [art] Extend RT PCRs Done
2,983,401 UART: [art] Lock RT PCRs Done
2,985,031 UART: [art] Populate DV Done
2,993,342 UART: [fht] FMC Alias Private Key: 7
2,994,328 UART: [art] Derive CDI
2,994,608 UART: [art] Store in in slot 0x4
3,080,043 UART: [art] Derive Key Pair
3,080,403 UART: [art] Store priv key in slot 0x5
3,093,627 UART: [art] Derive Key Pair - Done
3,108,304 UART: [art] Signing Cert with AUTHO
3,108,784 UART: RITY.KEYID = 7
3,123,758 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,523 UART: [art] PUB.X = 4460F6D188A1C715474FA023FDC9DD1EFAF443EEEA35D82D76208E7AAFB866F65B18F084F9861309CDCB7B18935DBD7B
3,131,306 UART: [art] PUB.Y = 15E29B2AB3A08298C65EDC97D3FE8460F209664AE515CDA18CFB2D1E4CB17DCE1ABA2E9192FE5EB94C519217325F9341
3,138,267 UART: [art] SIG.R = 2ABB76C5A2C33E08F304F349F1D6D903DC0A1773BD4FE5B01F038B88911DAC2549E3AF34D0570A445CFB1B8417CAA24B
3,145,033 UART: [art] SIG.S = 97FE99FB333E733D3A73E235FA4AACB3A27C66CA3DC6F93B8FB5435C6207A9F533A152B681AE0AB93A09715855326139
3,169,019 UART: Caliptra RT
3,169,364 UART: [state] CFI Enabled
3,277,293 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,789 UART: [rt]cmd =0x46505652, len=4
3,308,449 UART: [rt] FIPS Version
3,309,676 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,163 ready_for_fw is high
1,056,163 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,124 >>> mbox cmd response: success
2,622,124 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,684,294 UART:
2,684,310 UART: Running Caliptra FMC ...
2,684,718 UART:
2,684,861 UART: [state] CFI Enabled
2,695,650 UART: [fht] FMC Alias Private Key: 7
2,803,893 UART: [art] Extend RT PCRs Done
2,804,321 UART: [art] Lock RT PCRs Done
2,806,067 UART: [art] Populate DV Done
2,814,130 UART: [fht] FMC Alias Private Key: 7
2,815,212 UART: [art] Derive CDI
2,815,492 UART: [art] Store in in slot 0x4
2,901,579 UART: [art] Derive Key Pair
2,901,939 UART: [art] Store priv key in slot 0x5
2,915,231 UART: [art] Derive Key Pair - Done
2,929,570 UART: [art] Signing Cert with AUTHO
2,930,050 UART: RITY.KEYID = 7
2,944,798 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,563 UART: [art] PUB.X = D97FD64885578037FA2C526F500D9744507F22FC38EC5B285BE4D15A4A9C58AABF34D2A84D8B74D2F842CDE80F5955A8
2,952,335 UART: [art] PUB.Y = EB2BC7C2634C3AB9D8D29FC5C4D6C124B173C943432B9F0CB59002418FAA7F066C10E3C388CC4D5B5320C17E8F4E9E34
2,959,288 UART: [art] SIG.R = 7400190C4B76433E98EFFCC44ADF351986D83DF65D74EA1B84CD4776C1B0B88FD190DE0F0173314B4B932D494BD58F7A
2,966,035 UART: [art] SIG.S = 84386D0E076A220E2717B40B6BE6573490DC33A68449D9099DF6C08E740928B40222C4C3314E3AFD05D649B0B97FC931
2,989,778 UART: Caliptra RT
2,990,123 UART: [state] CFI Enabled
3,097,896 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,560 UART: [rt]cmd =0x46505652, len=4
3,129,220 UART: [rt] FIPS Version
3,130,233 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,577 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,101 UART: [kat] SHA2-256
882,032 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,147 UART: [kat] ++
886,299 UART: [kat] sha1
890,513 UART: [kat] SHA2-256
892,451 UART: [kat] SHA2-384
895,356 UART: [kat] SHA2-512-ACC
897,257 UART: [kat] ECC-384
902,614 UART: [kat] HMAC-384Kdf
907,288 UART: [kat] LMS
1,475,484 UART: [kat] --
1,476,353 UART: [cold-reset] ++
1,476,769 UART: [fht] Storing FHT @ 0x50003400
1,479,478 UART: [idev] ++
1,479,646 UART: [idev] CDI.KEYID = 6
1,480,006 UART: [idev] SUBJECT.KEYID = 7
1,480,430 UART: [idev] UDS.KEYID = 0
1,480,775 ready_for_fw is high
1,480,775 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,464 UART: [idev] Erasing UDS.KEYID = 0
1,505,486 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,078 UART: [idev] --
1,514,995 UART: [ldev] ++
1,515,163 UART: [ldev] CDI.KEYID = 6
1,515,526 UART: [ldev] SUBJECT.KEYID = 5
1,515,952 UART: [ldev] AUTHORITY.KEYID = 7
1,516,415 UART: [ldev] FE.KEYID = 1
1,521,643 UART: [ldev] Erasing FE.KEYID = 1
1,546,906 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,690 UART: [ldev] --
1,586,041 UART: [fwproc] Waiting for Commands...
1,586,686 UART: [fwproc] Received command 0x46574c44
1,587,477 UART: [fwproc] Received Image of size 114332 bytes
2,884,655 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,855 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,207 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,090 >>> mbox cmd response: success
3,077,090 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,078,236 UART: [afmc] ++
3,078,404 UART: [afmc] CDI.KEYID = 6
3,078,766 UART: [afmc] SUBJECT.KEYID = 7
3,079,191 UART: [afmc] AUTHORITY.KEYID = 5
3,114,082 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,096 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,876 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,604 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,489 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,179 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,004 UART: [afmc] --
3,156,976 UART: [cold-reset] --
3,157,970 UART: [state] Locking Datavault
3,159,095 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,699 UART: [state] Locking ICCM
3,160,207 UART: [exit] Launching FMC @ 0x40000130
3,165,536 UART:
3,165,552 UART: Running Caliptra FMC ...
3,165,960 UART:
3,166,014 UART: [state] CFI Enabled
3,176,591 UART: [fht] FMC Alias Private Key: 7
3,284,630 UART: [art] Extend RT PCRs Done
3,285,058 UART: [art] Lock RT PCRs Done
3,286,530 UART: [art] Populate DV Done
3,294,533 UART: [fht] FMC Alias Private Key: 7
3,295,589 UART: [art] Derive CDI
3,295,869 UART: [art] Store in in slot 0x4
3,381,908 UART: [art] Derive Key Pair
3,382,268 UART: [art] Store priv key in slot 0x5
3,395,236 UART: [art] Derive Key Pair - Done
3,410,078 UART: [art] Signing Cert with AUTHO
3,410,558 UART: RITY.KEYID = 7
3,426,072 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,837 UART: [art] PUB.X = 966FEB10835DFE5E0CB699E74F1DCFB8FC8FC534033232C7A9AE876CC4A740E2440C3FE58D749E2A8AA17D0758411E38
3,433,607 UART: [art] PUB.Y = 954813291D3E741ED36662E505D431B20F73AA8E0565A536E1B9AC1B8064C6B6B7D04E3C838CB9C96D3F6F48C07684FE
3,440,550 UART: [art] SIG.R = B43E71EC4D5B1B643F19558E22FED4F8C62F5CB695E76DC1F0E83AB8F609D8E4805CE301526DFFBAFBBE5B01DC1EEB5E
3,447,339 UART: [art] SIG.S = 38FED79D459BB29604040D9F46ED37364FA52E69AEE764D9105786C87C295BCD8CFB4693D8C6EB1FD2F5DE1457472483
3,471,203 UART: Caliptra RT
3,471,456 UART: [state] CFI Enabled
3,580,149 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,779 UART: [rt]cmd =0x464d4352, len=4
3,617,728 >>> mbox cmd response data (524 bytes)
3,617,729 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,372 UART: [rt]cmd =0x43455252, len=4
3,658,100 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,727 ready_for_fw is high
1,361,727 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,650 >>> mbox cmd response: success
2,925,650 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,987,030 UART:
2,987,046 UART: Running Caliptra FMC ...
2,987,454 UART:
2,987,508 UART: [state] CFI Enabled
2,997,855 UART: [fht] FMC Alias Private Key: 7
3,105,652 UART: [art] Extend RT PCRs Done
3,106,080 UART: [art] Lock RT PCRs Done
3,107,714 UART: [art] Populate DV Done
3,115,861 UART: [fht] FMC Alias Private Key: 7
3,116,891 UART: [art] Derive CDI
3,117,171 UART: [art] Store in in slot 0x4
3,202,930 UART: [art] Derive Key Pair
3,203,290 UART: [art] Store priv key in slot 0x5
3,216,416 UART: [art] Derive Key Pair - Done
3,231,153 UART: [art] Signing Cert with AUTHO
3,231,633 UART: RITY.KEYID = 7
3,246,965 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,730 UART: [art] PUB.X = 45438D248AE8349104E7A31B00A51FB8BE5D6DD77F56B6E08CC7AA149E19862C5BFFCB0F81AEEFF385F30B3AD11F9378
3,254,485 UART: [art] PUB.Y = E15B4E8682840ABEE8CD2DBFD95EEA50F39CB9AAC17727DE06A38C7AF36616DEE98737E60F9BE821240A69B50FA8E761
3,261,438 UART: [art] SIG.R = C5822C1947350A9715CF1C0632139B7D005053D922AC2BDCACF67024D9035F6912572F4694E4E15235DBC36C0000D7F8
3,268,127 UART: [art] SIG.S = 36101669A76D669C4F9B3B0843D0DCE296479C3F559DC477D3874235460E9CB461AD101151117610BA2F28297748B355
3,291,766 UART: Caliptra RT
3,292,019 UART: [state] CFI Enabled
3,399,806 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,278 UART: [rt]cmd =0x464d4352, len=4
3,437,117 >>> mbox cmd response data (524 bytes)
3,437,118 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,357 UART: [rt]cmd =0x43455252, len=4
3,477,117 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,778 UART: [state] DebugLocked = No
86,298 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,830 UART: [kat] SHA2-256
881,761 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,876 UART: [kat] ++
886,028 UART: [kat] sha1
890,246 UART: [kat] SHA2-256
892,184 UART: [kat] SHA2-384
894,857 UART: [kat] SHA2-512-ACC
896,758 UART: [kat] ECC-384
902,355 UART: [kat] HMAC-384Kdf
907,015 UART: [kat] LMS
1,475,211 UART: [kat] --
1,476,152 UART: [cold-reset] ++
1,476,552 UART: [fht] Storing FHT @ 0x50003400
1,479,181 UART: [idev] ++
1,479,349 UART: [idev] CDI.KEYID = 6
1,479,709 UART: [idev] SUBJECT.KEYID = 7
1,480,133 UART: [idev] UDS.KEYID = 0
1,480,478 ready_for_fw is high
1,480,478 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,099 UART: [idev] Erasing UDS.KEYID = 0
1,505,017 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,747 UART: [idev] --
1,514,556 UART: [ldev] ++
1,514,724 UART: [ldev] CDI.KEYID = 6
1,515,087 UART: [ldev] SUBJECT.KEYID = 5
1,515,513 UART: [ldev] AUTHORITY.KEYID = 7
1,515,976 UART: [ldev] FE.KEYID = 1
1,521,154 UART: [ldev] Erasing FE.KEYID = 1
1,546,565 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,409 UART: [ldev] --
1,585,768 UART: [fwproc] Waiting for Commands...
1,586,593 UART: [fwproc] Received command 0x46574c44
1,587,384 UART: [fwproc] Received Image of size 114332 bytes
2,885,446 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,186 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,538 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,517 >>> mbox cmd response: success
3,078,517 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,079,717 UART: [afmc] ++
3,079,885 UART: [afmc] CDI.KEYID = 6
3,080,247 UART: [afmc] SUBJECT.KEYID = 7
3,080,672 UART: [afmc] AUTHORITY.KEYID = 5
3,115,879 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,869 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,649 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,377 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,262 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,952 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,655 UART: [afmc] --
3,158,759 UART: [cold-reset] --
3,159,519 UART: [state] Locking Datavault
3,160,682 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,286 UART: [state] Locking ICCM
3,161,858 UART: [exit] Launching FMC @ 0x40000130
3,167,187 UART:
3,167,203 UART: Running Caliptra FMC ...
3,167,611 UART:
3,167,754 UART: [state] CFI Enabled
3,178,119 UART: [fht] FMC Alias Private Key: 7
3,285,254 UART: [art] Extend RT PCRs Done
3,285,682 UART: [art] Lock RT PCRs Done
3,287,164 UART: [art] Populate DV Done
3,295,247 UART: [fht] FMC Alias Private Key: 7
3,296,381 UART: [art] Derive CDI
3,296,661 UART: [art] Store in in slot 0x4
3,382,370 UART: [art] Derive Key Pair
3,382,730 UART: [art] Store priv key in slot 0x5
3,395,882 UART: [art] Derive Key Pair - Done
3,410,746 UART: [art] Signing Cert with AUTHO
3,411,226 UART: RITY.KEYID = 7
3,426,628 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,393 UART: [art] PUB.X = 3F4E7DEA14DFC8C1DCAE4CA874871C36A1DA87DDA5620C9CD8FA6A963C0CCDF7CBABB6EE3638706E3609C1115202B5E0
3,434,177 UART: [art] PUB.Y = 454FB856DCFC60FBA5CEEF28541266956B92EF7A156133052A613C36E6CC942E9BB22C21A6EDB4DC90A5DF0EAA7A5177
3,441,137 UART: [art] SIG.R = 645A8F9F8F95DFC8266E09CAA666555FF68655AE74C3EDEC39FDABA5A989010DB9E59E9ED1C4D8CD079B997263347083
3,447,907 UART: [art] SIG.S = DD250259D8645BCD158965904A6E2F21BCA1D50DD596BD7F12E050B08245C21129C430946A6697976AE3374EFB49BCFA
3,471,436 UART: Caliptra RT
3,471,781 UART: [state] CFI Enabled
3,580,208 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,668 UART: [rt]cmd =0x464d4352, len=4
3,617,789 >>> mbox cmd response data (524 bytes)
3,617,790 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,171 UART: [rt]cmd =0x43455252, len=4
3,657,947 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,912 ready_for_fw is high
1,362,912 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,101 >>> mbox cmd response: success
2,928,101 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,988,501 UART:
2,988,517 UART: Running Caliptra FMC ...
2,988,925 UART:
2,989,068 UART: [state] CFI Enabled
2,999,807 UART: [fht] FMC Alias Private Key: 7
3,107,714 UART: [art] Extend RT PCRs Done
3,108,142 UART: [art] Lock RT PCRs Done
3,109,618 UART: [art] Populate DV Done
3,117,825 UART: [fht] FMC Alias Private Key: 7
3,118,905 UART: [art] Derive CDI
3,119,185 UART: [art] Store in in slot 0x4
3,205,062 UART: [art] Derive Key Pair
3,205,422 UART: [art] Store priv key in slot 0x5
3,218,326 UART: [art] Derive Key Pair - Done
3,233,461 UART: [art] Signing Cert with AUTHO
3,233,941 UART: RITY.KEYID = 7
3,249,667 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,432 UART: [art] PUB.X = 37EF6F6356EF561C3B7AA3EA0BEBC3331EB6BA516C5C265FB7B36CEAFBCAB0A254EF1E177B9A19872E19493751A954AE
3,257,221 UART: [art] PUB.Y = 7EAD1CD0053699F33A57B593021B4F6C862F73473A19A36003C7C908AE72A9372B6E0B331627CD52767BB7A032D58FDF
3,264,156 UART: [art] SIG.R = 39CB1FCFE5651D7BAD1924AEE3E6DDEF569955221AC7A2844D3D8DD95B3DE5E0E85A928794949B0C8C4E1BDD381A4CE2
3,270,943 UART: [art] SIG.S = DDD56B76065E48B0D2A652B2A5BCBC89EBC882EE776D225B429E9A8600E7DB7EA84D896F8066D5937080BA50E952E9A7
3,294,985 UART: Caliptra RT
3,295,330 UART: [state] CFI Enabled
3,403,869 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,691 UART: [rt]cmd =0x464d4352, len=4
3,441,802 >>> mbox cmd response data (524 bytes)
3,441,803 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,302 UART: [rt]cmd =0x43455252, len=4
3,482,386 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,840 UART: [kat] SHA2-256
893,490 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,615 UART: [kat] ++
897,767 UART: [kat] sha1
902,089 UART: [kat] SHA2-256
904,029 UART: [kat] SHA2-384
906,862 UART: [kat] SHA2-512-ACC
908,763 UART: [kat] ECC-384
918,758 UART: [kat] HMAC-384Kdf
923,244 UART: [kat] LMS
1,171,572 UART: [kat] --
1,172,311 UART: [cold-reset] ++
1,172,765 UART: [fht] FHT @ 0x50003400
1,175,484 UART: [idev] ++
1,175,652 UART: [idev] CDI.KEYID = 6
1,176,012 UART: [idev] SUBJECT.KEYID = 7
1,176,436 UART: [idev] UDS.KEYID = 0
1,176,781 ready_for_fw is high
1,176,781 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,456 UART: [idev] Erasing UDS.KEYID = 0
1,201,355 UART: [idev] Sha1 KeyId Algorithm
1,209,745 UART: [idev] --
1,210,707 UART: [ldev] ++
1,210,875 UART: [ldev] CDI.KEYID = 6
1,211,238 UART: [ldev] SUBJECT.KEYID = 5
1,211,664 UART: [ldev] AUTHORITY.KEYID = 7
1,212,127 UART: [ldev] FE.KEYID = 1
1,217,485 UART: [ldev] Erasing FE.KEYID = 1
1,243,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,085 UART: [ldev] --
1,282,524 UART: [fwproc] Wait for Commands...
1,283,254 UART: [fwproc] Recv command 0x46574c44
1,283,982 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,558 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,862 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,731 >>> mbox cmd response: success
2,773,731 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,774,775 UART: [afmc] ++
2,774,943 UART: [afmc] CDI.KEYID = 6
2,775,305 UART: [afmc] SUBJECT.KEYID = 7
2,775,730 UART: [afmc] AUTHORITY.KEYID = 5
2,810,947 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,244 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,992 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,720 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,605 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,324 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,186 UART: [afmc] --
2,854,318 UART: [cold-reset] --
2,855,144 UART: [state] Locking Datavault
2,856,353 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,957 UART: [state] Locking ICCM
2,857,471 UART: [exit] Launching FMC @ 0x40000130
2,862,800 UART:
2,862,816 UART: Running Caliptra FMC ...
2,863,224 UART:
2,863,278 UART: [state] CFI Enabled
2,873,601 UART: [fht] FMC Alias Private Key: 7
2,981,716 UART: [art] Extend RT PCRs Done
2,982,144 UART: [art] Lock RT PCRs Done
2,983,712 UART: [art] Populate DV Done
2,991,827 UART: [fht] FMC Alias Private Key: 7
2,992,987 UART: [art] Derive CDI
2,993,267 UART: [art] Store in in slot 0x4
3,078,542 UART: [art] Derive Key Pair
3,078,902 UART: [art] Store priv key in slot 0x5
3,092,708 UART: [art] Derive Key Pair - Done
3,107,596 UART: [art] Signing Cert with AUTHO
3,108,076 UART: RITY.KEYID = 7
3,123,064 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,829 UART: [art] PUB.X = 3B3F714172C711FB7781535329BB1120047329E9DE5657295FB53DB3B0DE96246CA5F526ADA46A7303730520CC5080CB
3,130,584 UART: [art] PUB.Y = CB8383A33590CC1F3A9A9F6F7C3254C002119928575D0B320602214A2992ABBA25BE450DB2910B39AAB028BB434B09CE
3,137,515 UART: [art] SIG.R = E4098CA3E5FE20A6DBC01425A3D5EB0FDD1B7F8B32A645280D2996DFEB332F7F7DF0A250F629D07910AE50F98372C01C
3,144,290 UART: [art] SIG.S = 7BDBF03C8437717D59DD3B95CE2C4195495F77096D1A33867E3EFE26A0905FFE01B1916C4F18C188D1456812EB30FE85
3,167,771 UART: Caliptra RT
3,168,024 UART: [state] CFI Enabled
3,275,929 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,467 UART: [rt]cmd =0x464d4352, len=4
3,313,610 >>> mbox cmd response data (524 bytes)
3,313,611 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,166 UART: [rt]cmd =0x43455252, len=4
3,354,104 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,389 ready_for_fw is high
1,061,389 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,582 >>> mbox cmd response: success
2,627,582 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,688,994 UART:
2,689,010 UART: Running Caliptra FMC ...
2,689,418 UART:
2,689,472 UART: [state] CFI Enabled
2,699,863 UART: [fht] FMC Alias Private Key: 7
2,808,464 UART: [art] Extend RT PCRs Done
2,808,892 UART: [art] Lock RT PCRs Done
2,810,260 UART: [art] Populate DV Done
2,818,427 UART: [fht] FMC Alias Private Key: 7
2,819,503 UART: [art] Derive CDI
2,819,783 UART: [art] Store in in slot 0x4
2,905,238 UART: [art] Derive Key Pair
2,905,598 UART: [art] Store priv key in slot 0x5
2,919,042 UART: [art] Derive Key Pair - Done
2,933,500 UART: [art] Signing Cert with AUTHO
2,933,980 UART: RITY.KEYID = 7
2,949,232 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,997 UART: [art] PUB.X = 2784045424D60EF0FB77C7D64A629524BBB17158C31086E82DC87AE5E160B73BAB4A2F70B451A4DFD44CBCF07CAC490A
2,956,770 UART: [art] PUB.Y = 3975E1C9E600FDD3A5AB8AC762A42A7C8F2840B1E42946B3795599C11AD70E9D60C99844C60FD0B9CD3FD1ACBA7ACE3E
2,963,710 UART: [art] SIG.R = 65D831AD89AF58902C61F8A518C1412C02ED92791B1DEBFF930F2EA09B9F1057A6FBBF0C29FA3079FACE2C2DC13888DE
2,970,489 UART: [art] SIG.S = 748FFF21D53F693046D1416DF1885F5BECAA9AB811D605726921890F724CF7F56A4CC45319A5808C28C67614056A7E8F
2,994,165 UART: Caliptra RT
2,994,418 UART: [state] CFI Enabled
3,103,359 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,045 UART: [rt]cmd =0x464d4352, len=4
3,141,332 >>> mbox cmd response data (524 bytes)
3,141,333 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,170,788 UART: [rt]cmd =0x43455252, len=4
3,181,626 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
893,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,824 UART: [kat] ++
897,976 UART: [kat] sha1
902,202 UART: [kat] SHA2-256
904,142 UART: [kat] SHA2-384
906,997 UART: [kat] SHA2-512-ACC
908,898 UART: [kat] ECC-384
918,673 UART: [kat] HMAC-384Kdf
923,277 UART: [kat] LMS
1,171,605 UART: [kat] --
1,172,634 UART: [cold-reset] ++
1,173,176 UART: [fht] FHT @ 0x50003400
1,175,813 UART: [idev] ++
1,175,981 UART: [idev] CDI.KEYID = 6
1,176,341 UART: [idev] SUBJECT.KEYID = 7
1,176,765 UART: [idev] UDS.KEYID = 0
1,177,110 ready_for_fw is high
1,177,110 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,087 UART: [idev] Erasing UDS.KEYID = 0
1,201,346 UART: [idev] Sha1 KeyId Algorithm
1,209,804 UART: [idev] --
1,210,728 UART: [ldev] ++
1,210,896 UART: [ldev] CDI.KEYID = 6
1,211,259 UART: [ldev] SUBJECT.KEYID = 5
1,211,685 UART: [ldev] AUTHORITY.KEYID = 7
1,212,148 UART: [ldev] FE.KEYID = 1
1,217,528 UART: [ldev] Erasing FE.KEYID = 1
1,244,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,612 UART: [ldev] --
1,283,113 UART: [fwproc] Wait for Commands...
1,283,829 UART: [fwproc] Recv command 0x46574c44
1,284,557 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,685 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,989 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,916 >>> mbox cmd response: success
2,775,916 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,776,982 UART: [afmc] ++
2,777,150 UART: [afmc] CDI.KEYID = 6
2,777,512 UART: [afmc] SUBJECT.KEYID = 7
2,777,937 UART: [afmc] AUTHORITY.KEYID = 5
2,813,286 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,617 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,365 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,093 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,978 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,697 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,561 UART: [afmc] --
2,856,677 UART: [cold-reset] --
2,857,547 UART: [state] Locking Datavault
2,858,512 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,116 UART: [state] Locking ICCM
2,859,718 UART: [exit] Launching FMC @ 0x40000130
2,865,047 UART:
2,865,063 UART: Running Caliptra FMC ...
2,865,471 UART:
2,865,614 UART: [state] CFI Enabled
2,876,401 UART: [fht] FMC Alias Private Key: 7
2,984,428 UART: [art] Extend RT PCRs Done
2,984,856 UART: [art] Lock RT PCRs Done
2,986,378 UART: [art] Populate DV Done
2,994,533 UART: [fht] FMC Alias Private Key: 7
2,995,573 UART: [art] Derive CDI
2,995,853 UART: [art] Store in in slot 0x4
3,081,196 UART: [art] Derive Key Pair
3,081,556 UART: [art] Store priv key in slot 0x5
3,094,840 UART: [art] Derive Key Pair - Done
3,109,489 UART: [art] Signing Cert with AUTHO
3,109,969 UART: RITY.KEYID = 7
3,125,191 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,956 UART: [art] PUB.X = 8A9E6395623247C910A87CA87D59FB0E6ABE56371685BA317D873B73897788216014796D88433156B917ABC914BD0619
3,132,706 UART: [art] PUB.Y = 0334EC84904888ACFA6D21C21C7B1051BF6C77E33AA82E14C61304D15519F2E382334D021B74D45E8A1BACBA12DBF529
3,139,653 UART: [art] SIG.R = 1D292C1ACEA7F2AE0D8647F1B48D13E5F704D4FA165268C902529FF22984752FE71B8ED00F1597D4D56A967E4A4B4BD8
3,146,419 UART: [art] SIG.S = 540A2A1259D299BC983B4F0FD0D1485AB7FA7E6BCFF7D27DBC45847E4A9F628AC3C178154AFD7CA1BB9B9CB46B094773
3,169,953 UART: Caliptra RT
3,170,298 UART: [state] CFI Enabled
3,278,765 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,271 UART: [rt]cmd =0x464d4352, len=4
3,316,406 >>> mbox cmd response data (524 bytes)
3,316,407 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,632 UART: [rt]cmd =0x43455252, len=4
3,356,512 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,780 ready_for_fw is high
1,059,780 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,779 >>> mbox cmd response: success
2,626,779 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,689,173 UART:
2,689,189 UART: Running Caliptra FMC ...
2,689,597 UART:
2,689,740 UART: [state] CFI Enabled
2,700,257 UART: [fht] FMC Alias Private Key: 7
2,808,018 UART: [art] Extend RT PCRs Done
2,808,446 UART: [art] Lock RT PCRs Done
2,809,770 UART: [art] Populate DV Done
2,818,049 UART: [fht] FMC Alias Private Key: 7
2,819,153 UART: [art] Derive CDI
2,819,433 UART: [art] Store in in slot 0x4
2,905,362 UART: [art] Derive Key Pair
2,905,722 UART: [art] Store priv key in slot 0x5
2,919,178 UART: [art] Derive Key Pair - Done
2,933,683 UART: [art] Signing Cert with AUTHO
2,934,163 UART: RITY.KEYID = 7
2,948,927 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,692 UART: [art] PUB.X = 4940F0BD62D85310BA1DF95A901AF41BF52CAB086AE66E4B3C182A6B5211CE4C8545E966B0B7F252910EE70439B480C8
2,956,459 UART: [art] PUB.Y = B1C14049DCE130FA45E1578B3A007A4CA51464E26C418ADD4D41B1385FE0CE6394D0C601EA0EB411A3620430338A3CA9
2,963,384 UART: [art] SIG.R = EF384F25B24D974CED4ADBA3918C58C4C35A244C76C3DBA4BC17F385F0A313720065F2A5A524999ECC7A4C8D0F1C4633
2,970,141 UART: [art] SIG.S = 92A83A53E352C2DF05F2A41ACF2CF43ABBE837C86B7895C7574BAC30393BB6F7408E13AF9F23FDC2BBFD6D5E08E8558B
2,993,590 UART: Caliptra RT
2,993,935 UART: [state] CFI Enabled
3,102,039 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,703 UART: [rt]cmd =0x464d4352, len=4
3,139,748 >>> mbox cmd response data (524 bytes)
3,139,749 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,169,218 UART: [rt]cmd =0x43455252, len=4
3,179,803 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
86,173 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
890,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,103 UART: [kat] ++
895,255 UART: [kat] sha1
899,391 UART: [kat] SHA2-256
901,331 UART: [kat] SHA2-384
904,094 UART: [kat] SHA2-512-ACC
905,995 UART: [kat] ECC-384
915,952 UART: [kat] HMAC-384Kdf
920,520 UART: [kat] LMS
1,168,832 UART: [kat] --
1,169,735 UART: [cold-reset] ++
1,170,061 UART: [fht] FHT @ 0x50003400
1,172,965 UART: [idev] ++
1,173,133 UART: [idev] CDI.KEYID = 6
1,173,494 UART: [idev] SUBJECT.KEYID = 7
1,173,919 UART: [idev] UDS.KEYID = 0
1,174,265 ready_for_fw is high
1,174,265 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,719 UART: [idev] Erasing UDS.KEYID = 0
1,199,207 UART: [idev] Sha1 KeyId Algorithm
1,208,069 UART: [idev] --
1,209,062 UART: [ldev] ++
1,209,230 UART: [ldev] CDI.KEYID = 6
1,209,594 UART: [ldev] SUBJECT.KEYID = 5
1,210,021 UART: [ldev] AUTHORITY.KEYID = 7
1,210,484 UART: [ldev] FE.KEYID = 1
1,215,462 UART: [ldev] Erasing FE.KEYID = 1
1,241,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,930 UART: [ldev] --
1,280,208 UART: [fwproc] Wait for Commands...
1,280,867 UART: [fwproc] Recv command 0x46574c44
1,281,600 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,514 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,823 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,737 >>> mbox cmd response: success
2,771,737 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,772,816 UART: [afmc] ++
2,772,984 UART: [afmc] CDI.KEYID = 6
2,773,347 UART: [afmc] SUBJECT.KEYID = 7
2,773,773 UART: [afmc] AUTHORITY.KEYID = 5
2,809,912 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,822 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,573 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,302 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,185 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,904 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,705 UART: [afmc] --
2,853,729 UART: [cold-reset] --
2,854,549 UART: [state] Locking Datavault
2,855,484 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,088 UART: [state] Locking ICCM
2,856,544 UART: [exit] Launching FMC @ 0x40000130
2,861,873 UART:
2,861,889 UART: Running Caliptra FMC ...
2,862,297 UART:
2,862,351 UART: [state] CFI Enabled
2,872,838 UART: [fht] FMC Alias Private Key: 7
2,980,541 UART: [art] Extend RT PCRs Done
2,980,969 UART: [art] Lock RT PCRs Done
2,982,669 UART: [art] Populate DV Done
2,991,026 UART: [fht] FMC Alias Private Key: 7
2,992,198 UART: [art] Derive CDI
2,992,478 UART: [art] Store in in slot 0x4
3,077,883 UART: [art] Derive Key Pair
3,078,243 UART: [art] Store priv key in slot 0x5
3,091,245 UART: [art] Derive Key Pair - Done
3,106,260 UART: [art] Signing Cert with AUTHO
3,106,740 UART: RITY.KEYID = 7
3,122,342 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,107 UART: [art] PUB.X = 63B4C68B71A52D54486A4734C2A092E7161B9E97D8E94B113CFDE567D0F73D90F34FE023E640F8B579BC85F32E61DE4E
3,129,883 UART: [art] PUB.Y = 32F5BD96FDDAD075BA91E0A4E5EC67AC4399B8F5618B137D58E447FEA79B55907DDE278006311B6E143E033B8A5B8001
3,136,832 UART: [art] SIG.R = 6B8E7F7546A7C48D6948506D60DBC70DCB95BCE23373C2E62D13B13063228158AC23DB28E1A0B05E16B54C1BAF34FCE6
3,143,609 UART: [art] SIG.S = 3ED4EE1C2FBF89E16B6084B02BAF8FCC6AE4815796CEE045AB6BA2A7691A7C46670D2CCF91FDB370436EB4418324794C
3,167,327 UART: Caliptra RT
3,167,580 UART: [state] CFI Enabled
3,276,079 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,495 UART: [rt]cmd =0x464d4352, len=4
3,313,556 >>> mbox cmd response data (524 bytes)
3,313,557 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,766 UART: [rt]cmd =0x43455252, len=4
3,353,592 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,604 ready_for_fw is high
1,055,604 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,927 >>> mbox cmd response: success
2,620,927 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,682,611 UART:
2,682,627 UART: Running Caliptra FMC ...
2,683,035 UART:
2,683,089 UART: [state] CFI Enabled
2,693,536 UART: [fht] FMC Alias Private Key: 7
2,801,835 UART: [art] Extend RT PCRs Done
2,802,263 UART: [art] Lock RT PCRs Done
2,803,865 UART: [art] Populate DV Done
2,812,176 UART: [fht] FMC Alias Private Key: 7
2,813,136 UART: [art] Derive CDI
2,813,416 UART: [art] Store in in slot 0x4
2,899,199 UART: [art] Derive Key Pair
2,899,559 UART: [art] Store priv key in slot 0x5
2,912,967 UART: [art] Derive Key Pair - Done
2,927,968 UART: [art] Signing Cert with AUTHO
2,928,448 UART: RITY.KEYID = 7
2,943,546 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,311 UART: [art] PUB.X = 8E0B4E03657F64BC5BDC2E0430A150ECCF9C6901C3270A24166CE4BDF1FCF52D616CA29CB0E377B40ADD3FFE8AEE89DE
2,951,089 UART: [art] PUB.Y = 8CF9584E863ECC4279E34814CED01D271D442042BAD4A2A42BFB20591A86320482AD8D013B96CFB20203B3BA7A86F817
2,958,031 UART: [art] SIG.R = EF933E08B79BE06F92FF169799EE7C3479393E297A43B30FE152E8BFA422BB7B3C09CADDC4649C914721CDF25052615D
2,964,800 UART: [art] SIG.S = 6155627710CC6ADF0CF5D5A46F1DDFED1EF6F454648116ED8ACB20F15623A520D113FF7371F7B3F922D68752F5E33295
2,988,806 UART: Caliptra RT
2,989,059 UART: [state] CFI Enabled
3,096,474 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,968 UART: [rt]cmd =0x464d4352, len=4
3,134,215 >>> mbox cmd response data (524 bytes)
3,134,216 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,765 UART: [rt]cmd =0x43455252, len=4
3,174,537 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,619 UART: [kat] SHA2-256
891,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,298 UART: [kat] ++
895,450 UART: [kat] sha1
899,512 UART: [kat] SHA2-256
901,452 UART: [kat] SHA2-384
904,193 UART: [kat] SHA2-512-ACC
906,094 UART: [kat] ECC-384
915,693 UART: [kat] HMAC-384Kdf
920,397 UART: [kat] LMS
1,168,709 UART: [kat] --
1,169,644 UART: [cold-reset] ++
1,170,118 UART: [fht] FHT @ 0x50003400
1,172,944 UART: [idev] ++
1,173,112 UART: [idev] CDI.KEYID = 6
1,173,473 UART: [idev] SUBJECT.KEYID = 7
1,173,898 UART: [idev] UDS.KEYID = 0
1,174,244 ready_for_fw is high
1,174,244 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,766 UART: [idev] Erasing UDS.KEYID = 0
1,199,082 UART: [idev] Sha1 KeyId Algorithm
1,208,106 UART: [idev] --
1,209,197 UART: [ldev] ++
1,209,365 UART: [ldev] CDI.KEYID = 6
1,209,729 UART: [ldev] SUBJECT.KEYID = 5
1,210,156 UART: [ldev] AUTHORITY.KEYID = 7
1,210,619 UART: [ldev] FE.KEYID = 1
1,215,603 UART: [ldev] Erasing FE.KEYID = 1
1,242,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,923 UART: [ldev] --
1,281,189 UART: [fwproc] Wait for Commands...
1,281,934 UART: [fwproc] Recv command 0x46574c44
1,282,667 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,797 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,573 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,882 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,800 >>> mbox cmd response: success
2,771,800 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,773,053 UART: [afmc] ++
2,773,221 UART: [afmc] CDI.KEYID = 6
2,773,584 UART: [afmc] SUBJECT.KEYID = 7
2,774,010 UART: [afmc] AUTHORITY.KEYID = 5
2,809,991 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,407 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,158 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,887 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,770 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,489 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,254 UART: [afmc] --
2,853,382 UART: [cold-reset] --
2,854,282 UART: [state] Locking Datavault
2,855,533 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,137 UART: [state] Locking ICCM
2,856,557 UART: [exit] Launching FMC @ 0x40000130
2,861,886 UART:
2,861,902 UART: Running Caliptra FMC ...
2,862,310 UART:
2,862,453 UART: [state] CFI Enabled
2,873,088 UART: [fht] FMC Alias Private Key: 7
2,981,075 UART: [art] Extend RT PCRs Done
2,981,503 UART: [art] Lock RT PCRs Done
2,982,831 UART: [art] Populate DV Done
2,991,350 UART: [fht] FMC Alias Private Key: 7
2,992,398 UART: [art] Derive CDI
2,992,678 UART: [art] Store in in slot 0x4
3,078,071 UART: [art] Derive Key Pair
3,078,431 UART: [art] Store priv key in slot 0x5
3,091,985 UART: [art] Derive Key Pair - Done
3,106,604 UART: [art] Signing Cert with AUTHO
3,107,084 UART: RITY.KEYID = 7
3,122,288 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,053 UART: [art] PUB.X = 397950269ADB3BF295AF04A1444DA861DFED0857D12AEC5E679DDE92974532C295A387F61C5B59862EE345572F61AF06
3,129,816 UART: [art] PUB.Y = C466C7D83D2D6C2844EDDC547E01E1830DFBA92AA0906D651D840B74BCC8C63BBE416BA5DF251FA243147262CC112754
3,136,767 UART: [art] SIG.R = E5E57FF9A8DF4FD320A08FD38838BEAAC6ADF2857AE838549E4DF40914766DD6F37F9C1E96393E8411D475DC4C076234
3,143,541 UART: [art] SIG.S = D529A415BC819B3E28369B60C6FA39C05972A1337433F576C16D107E0EF89206902140A9EDBCE2CF3C43EF4404991CFA
3,167,535 UART: Caliptra RT
3,167,880 UART: [state] CFI Enabled
3,275,900 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,320 UART: [rt]cmd =0x464d4352, len=4
3,313,399 >>> mbox cmd response data (524 bytes)
3,313,400 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,677 UART: [rt]cmd =0x43455252, len=4
3,353,452 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,459 ready_for_fw is high
1,056,459 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,070 >>> mbox cmd response: success
2,624,070 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,686,620 UART:
2,686,636 UART: Running Caliptra FMC ...
2,687,044 UART:
2,687,187 UART: [state] CFI Enabled
2,697,678 UART: [fht] FMC Alias Private Key: 7
2,805,539 UART: [art] Extend RT PCRs Done
2,805,967 UART: [art] Lock RT PCRs Done
2,807,513 UART: [art] Populate DV Done
2,815,626 UART: [fht] FMC Alias Private Key: 7
2,816,594 UART: [art] Derive CDI
2,816,874 UART: [art] Store in in slot 0x4
2,902,553 UART: [art] Derive Key Pair
2,902,913 UART: [art] Store priv key in slot 0x5
2,916,123 UART: [art] Derive Key Pair - Done
2,930,787 UART: [art] Signing Cert with AUTHO
2,931,267 UART: RITY.KEYID = 7
2,946,671 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,436 UART: [art] PUB.X = A79377719DB161AE6A59C73C81742461E62E46A953AF7A2D5F71770725EC2B7EB49FF133B957AC96D8A19ECBF8D33B1F
2,954,211 UART: [art] PUB.Y = 1EAE1CC064CCB77A2E590ACE300F4ABC1E9F178AB28B0AC019702F0E60359019D88A907544B25F34F59268B5D7446A60
2,961,155 UART: [art] SIG.R = 76ECF6750E3DD7E8B1AE5AFE3D90A4895DAAE97A46CACC2528810F6C9F62A4625E6C5E71594CF149EF75CF5C7F3A2E91
2,967,939 UART: [art] SIG.S = 82E7C74ACB00AFF4D11A2CA8A217C46249F32A138E2D8A7134C88D8C5F59996ACD75C16B0ED745A5868725715AA73198
2,992,273 UART: Caliptra RT
2,992,618 UART: [state] CFI Enabled
3,101,177 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,717 UART: [rt]cmd =0x464d4352, len=4
3,138,646 >>> mbox cmd response data (524 bytes)
3,138,647 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,026 UART: [rt]cmd =0x43455252, len=4
3,178,732 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,223 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 UART: [kat] SHA2-256
881,790 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,905 UART: [kat] ++
886,057 UART: [kat] sha1
890,251 UART: [kat] SHA2-256
892,189 UART: [kat] SHA2-384
894,978 UART: [kat] SHA2-512-ACC
896,879 UART: [kat] ECC-384
902,270 UART: [kat] HMAC-384Kdf
906,852 UART: [kat] LMS
1,475,048 UART: [kat] --
1,475,847 UART: [cold-reset] ++
1,476,249 UART: [fht] Storing FHT @ 0x50003400
1,479,128 UART: [idev] ++
1,479,296 UART: [idev] CDI.KEYID = 6
1,479,656 UART: [idev] SUBJECT.KEYID = 7
1,480,080 UART: [idev] UDS.KEYID = 0
1,488,138 UART: [idev] Erasing UDS.KEYID = 0
1,504,836 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,283 UART: [idev] CSR upload requested
1,515,129 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,525,886 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,531,593 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,537,475 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,543,180 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,551,600 UART: [idev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
1,601,748 UART: [idev] CSR uploaded
1,604,129 ready_for_fw is high
1,604,129 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,604,300 UART: [idev] --
1,605,357 UART: [ldev] ++
1,605,525 UART: [ldev] CDI.KEYID = 6
1,605,888 UART: [ldev] SUBJECT.KEYID = 5
1,606,314 UART: [ldev] AUTHORITY.KEYID = 7
1,606,777 UART: [ldev] FE.KEYID = 1
1,611,899 UART: [ldev] Erasing FE.KEYID = 1
1,636,702 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,650,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,656,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,662,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,667,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,674,700 UART: [ldev] --
1,676,197 UART: [fwproc] Waiting for Commands...
1,676,960 UART: [fwproc] Received command 0x46574c44
1,677,751 UART: [fwproc] Received Image of size 114332 bytes
2,975,541 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,002,899 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
3,032,251 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,168,192 >>> mbox cmd response: success
3,168,192 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,169,314 UART: [afmc] ++
3,169,482 UART: [afmc] CDI.KEYID = 6
3,169,844 UART: [afmc] SUBJECT.KEYID = 7
3,170,269 UART: [afmc] AUTHORITY.KEYID = 5
3,204,872 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,220,996 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,221,776 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,227,504 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,233,389 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,239,079 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,246,834 UART: [afmc] --
3,247,906 UART: [cold-reset] --
3,248,790 UART: [state] Locking Datavault
3,249,905 UART: [state] Locking PCR0, PCR1 and PCR31
3,250,509 UART: [state] Locking ICCM
3,251,053 UART: [exit] Launching FMC @ 0x40000130
3,256,382 UART:
3,256,398 UART: Running Caliptra FMC ...
3,256,806 UART:
3,256,860 UART: [state] CFI Enabled
3,267,559 UART: [fht] FMC Alias Private Key: 7
3,375,490 UART: [art] Extend RT PCRs Done
3,375,918 UART: [art] Lock RT PCRs Done
3,377,668 UART: [art] Populate DV Done
3,385,893 UART: [fht] FMC Alias Private Key: 7
3,387,025 UART: [art] Derive CDI
3,387,305 UART: [art] Store in in slot 0x4
3,472,448 UART: [art] Derive Key Pair
3,472,808 UART: [art] Store priv key in slot 0x5
3,486,326 UART: [art] Derive Key Pair - Done
3,501,135 UART: [art] Signing Cert with AUTHO
3,501,615 UART: RITY.KEYID = 7
3,517,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,517,830 UART: [art] PUB.X = 4E57D865BD6D088353DF707D21DD049A405F172A77576734AAC9BEA034B82105F0FFB69E7954E296B18ED747D5A5C044
3,524,593 UART: [art] PUB.Y = 57002E8149DE0A574F4FFE00C319A33DAFDCCCBE85B38ABE6F499912151471D42D5827BA2C4B4F92CF6F6B3BA85914D4
3,531,510 UART: [art] SIG.R = 89E4AE9042A597F5202907D35C83BF211B077AAE3E4DEB2F43E75427D79F09D13D5F80591299A0AA5F72F54A23353B94
3,538,271 UART: [art] SIG.S = 1D357EF777892D68241AEA248666A580B72664C92872468369A711DD20A6B9018F911ED24F9B01D0DDE200BDC69601D0
3,561,633 UART: Caliptra RT
3,561,886 UART: [state] CFI Enabled
3,669,973 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,273 UART: [rt]cmd =0x49444352, len=4
3,701,738 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,409,860 ready_for_fw is high
1,409,860 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,942,375 >>> mbox cmd response: success
2,942,375 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,003,669 UART:
3,003,685 UART: Running Caliptra FMC ...
3,004,093 UART:
3,004,147 UART: [state] CFI Enabled
3,014,432 UART: [fht] FMC Alias Private Key: 7
3,122,103 UART: [art] Extend RT PCRs Done
3,122,531 UART: [art] Lock RT PCRs Done
3,124,277 UART: [art] Populate DV Done
3,132,494 UART: [fht] FMC Alias Private Key: 7
3,133,538 UART: [art] Derive CDI
3,133,818 UART: [art] Store in in slot 0x4
3,219,379 UART: [art] Derive Key Pair
3,219,739 UART: [art] Store priv key in slot 0x5
3,232,855 UART: [art] Derive Key Pair - Done
3,247,632 UART: [art] Signing Cert with AUTHO
3,248,112 UART: RITY.KEYID = 7
3,263,220 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,985 UART: [art] PUB.X = 35A68CB226CC1F98D25507A5884CC56CABA2DFFC892C1366E6440F74933496ABDE52FC09C8E87F0F8A1C5394F5923940
3,270,749 UART: [art] PUB.Y = 60042342BBFFDEBA282DB06DE099514155C2C05F9DC651066CCECBDBCC4E5B479514FB7B0E4F155F97E0C21081CCA717
3,277,706 UART: [art] SIG.R = 4EDA278B6766D5A0099C290E3B6FE843876E2B115615F64A1C35095631093C5F42D2D160B8863E9BCC3D2EF27ADB77A7
3,284,466 UART: [art] SIG.S = FB79DDB92990EA9A8275247C1DD24BB4A60D8650AD4C1ACBD5A333DA30E08C69A7389666052BDDAC164974B951782E5C
3,307,943 UART: Caliptra RT
3,308,196 UART: [state] CFI Enabled
3,415,969 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,629 UART: [rt]cmd =0x49444352, len=4
3,447,866 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Unprovisioned
85,814 UART: [state] DebugLocked = No
86,390 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,074 UART: [kat] SHA2-256
882,005 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,120 UART: [kat] ++
886,272 UART: [kat] sha1
890,432 UART: [kat] SHA2-256
892,370 UART: [kat] SHA2-384
895,277 UART: [kat] SHA2-512-ACC
897,178 UART: [kat] ECC-384
902,411 UART: [kat] HMAC-384Kdf
907,023 UART: [kat] LMS
1,475,219 UART: [kat] --
1,476,216 UART: [cold-reset] ++
1,476,782 UART: [fht] Storing FHT @ 0x50003400
1,479,613 UART: [idev] ++
1,479,781 UART: [idev] CDI.KEYID = 6
1,480,141 UART: [idev] SUBJECT.KEYID = 7
1,480,565 UART: [idev] UDS.KEYID = 0
1,488,647 UART: [idev] Erasing UDS.KEYID = 0
1,505,399 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,802 UART: [idev] CSR upload requested
1,515,648 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,526,267 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,531,974 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,537,856 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,543,561 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,551,981 UART: [idev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
1,602,129 UART: [idev] CSR uploaded
1,604,510 ready_for_fw is high
1,604,510 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,604,681 UART: [idev] --
1,605,734 UART: [ldev] ++
1,605,902 UART: [ldev] CDI.KEYID = 6
1,606,265 UART: [ldev] SUBJECT.KEYID = 5
1,606,691 UART: [ldev] AUTHORITY.KEYID = 7
1,607,154 UART: [ldev] FE.KEYID = 1
1,612,482 UART: [ldev] Erasing FE.KEYID = 1
1,638,027 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,651,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,657,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,663,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,669,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,676,063 UART: [ldev] --
1,677,360 UART: [fwproc] Waiting for Commands...
1,678,073 UART: [fwproc] Received command 0x46574c44
1,678,864 UART: [fwproc] Received Image of size 114332 bytes
2,976,350 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,003,586 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
3,032,938 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,168,929 >>> mbox cmd response: success
3,168,929 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,170,143 UART: [afmc] ++
3,170,311 UART: [afmc] CDI.KEYID = 6
3,170,673 UART: [afmc] SUBJECT.KEYID = 7
3,171,098 UART: [afmc] AUTHORITY.KEYID = 5
3,206,305 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,222,707 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,223,487 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,229,215 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,235,100 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,240,790 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,248,635 UART: [afmc] --
3,249,537 UART: [cold-reset] --
3,250,413 UART: [state] Locking Datavault
3,251,664 UART: [state] Locking PCR0, PCR1 and PCR31
3,252,268 UART: [state] Locking ICCM
3,252,718 UART: [exit] Launching FMC @ 0x40000130
3,258,047 UART:
3,258,063 UART: Running Caliptra FMC ...
3,258,471 UART:
3,258,614 UART: [state] CFI Enabled
3,269,691 UART: [fht] FMC Alias Private Key: 7
3,377,528 UART: [art] Extend RT PCRs Done
3,377,956 UART: [art] Lock RT PCRs Done
3,379,516 UART: [art] Populate DV Done
3,387,685 UART: [fht] FMC Alias Private Key: 7
3,388,713 UART: [art] Derive CDI
3,388,993 UART: [art] Store in in slot 0x4
3,474,884 UART: [art] Derive Key Pair
3,475,244 UART: [art] Store priv key in slot 0x5
3,488,398 UART: [art] Derive Key Pair - Done
3,503,577 UART: [art] Signing Cert with AUTHO
3,504,057 UART: RITY.KEYID = 7
3,519,131 UART: [art] Erasing AUTHORITY.KEYID = 7
3,519,896 UART: [art] PUB.X = 2A31A89C2CEFE2C3322827EBE5410A3AE225D7164A18065A41349D45F9AE4D0AE0FEFF26E2B1A7F8B47D52A0062A5FD7
3,526,668 UART: [art] PUB.Y = E798805639E2FC9F60FE1118E9F1C7E5BB258A8DB9E682590D0C311F62666153F8B921530BFA6552EB1D20517AEEF04E
3,533,613 UART: [art] SIG.R = A28F0EDF5BABD71100378687D9D35148D3B7EE6BFBE723AD5F3DCCE3F76A087A49C3D63230A9865C96E013B9D3F7DFCB
3,540,375 UART: [art] SIG.S = 20ACD0849F816E822E28A375BD0C1B61BF8362F64C9D5B09034BE4D0FC990FBB0468F91BC3F656D921A84792F4ED133F
3,564,733 UART: Caliptra RT
3,565,078 UART: [state] CFI Enabled
3,673,365 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,993 UART: [rt]cmd =0x49444352, len=4
3,705,486 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,411,787 ready_for_fw is high
1,411,787 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,944,882 >>> mbox cmd response: success
2,944,882 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,006,402 UART:
3,006,418 UART: Running Caliptra FMC ...
3,006,826 UART:
3,006,969 UART: [state] CFI Enabled
3,017,820 UART: [fht] FMC Alias Private Key: 7
3,125,727 UART: [art] Extend RT PCRs Done
3,126,155 UART: [art] Lock RT PCRs Done
3,127,673 UART: [art] Populate DV Done
3,135,950 UART: [fht] FMC Alias Private Key: 7
3,137,064 UART: [art] Derive CDI
3,137,344 UART: [art] Store in in slot 0x4
3,222,995 UART: [art] Derive Key Pair
3,223,355 UART: [art] Store priv key in slot 0x5
3,236,753 UART: [art] Derive Key Pair - Done
3,251,451 UART: [art] Signing Cert with AUTHO
3,251,931 UART: RITY.KEYID = 7
3,267,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,267,888 UART: [art] PUB.X = 33E713882CBFA47EC53E86C2B13F7CA799F35F9CEED253151E5AC00D8BE49A376FB6F961E1F7DAC29CE97D6EBD75DC81
3,274,677 UART: [art] PUB.Y = AACE989BE717680B5E9B742B0C8D59011B7846F92BEEA7B8EC396053A45C20ACC9B59D7EC3FAB2375FA1FB03EA61A735
3,281,633 UART: [art] SIG.R = 7D461C1B0AAE5A067205484680F4AB75C7872942BF2C4CF888718D64E9CABBD9530DEE98FA5D0D2427A76CA63098FF3E
3,288,398 UART: [art] SIG.S = 6748FA6E2F2B24035F71AECCC5D42CE58C98248FFD8F152E1779A5C0940589190DC742124F6E2919DA2F55319D11F4BA
3,312,414 UART: Caliptra RT
3,312,759 UART: [state] CFI Enabled
3,421,243 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,451,825 UART: [rt]cmd =0x49444352, len=4
3,453,340 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,916 UART: [kat] SHA2-256
893,566 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,691 UART: [kat] ++
897,843 UART: [kat] sha1
902,093 UART: [kat] SHA2-256
904,033 UART: [kat] SHA2-384
906,928 UART: [kat] SHA2-512-ACC
908,829 UART: [kat] ECC-384
918,728 UART: [kat] HMAC-384Kdf
923,396 UART: [kat] LMS
1,171,724 UART: [kat] --
1,172,859 UART: [cold-reset] ++
1,173,281 UART: [fht] FHT @ 0x50003400
1,175,842 UART: [idev] ++
1,176,010 UART: [idev] CDI.KEYID = 6
1,176,370 UART: [idev] SUBJECT.KEYID = 7
1,176,794 UART: [idev] UDS.KEYID = 0
1,184,426 UART: [idev] Erasing UDS.KEYID = 0
1,201,243 UART: [idev] Sha1 KeyId Algorithm
1,209,573 UART: [idev] CSR upload begun
1,211,354 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,772 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,227,479 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,233,361 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,239,066 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,247,486 UART: [idev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
1,297,634 UART: [idev] CSR uploaded
1,300,013 ready_for_fw is high
1,300,013 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,184 UART: [idev] --
1,301,366 UART: [ldev] ++
1,301,534 UART: [ldev] CDI.KEYID = 6
1,301,897 UART: [ldev] SUBJECT.KEYID = 5
1,302,323 UART: [ldev] AUTHORITY.KEYID = 7
1,302,786 UART: [ldev] FE.KEYID = 1
1,307,666 UART: [ldev] Erasing FE.KEYID = 1
1,333,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,960 UART: [ldev] --
1,373,405 UART: [fwproc] Wait for Commands...
1,374,193 UART: [fwproc] Recv command 0x46574c44
1,374,921 UART: [fwproc] Recv'd Img size: 114332 bytes
2,673,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,865 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,169 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,865,868 >>> mbox cmd response: success
2,865,868 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,867,124 UART: [afmc] ++
2,867,292 UART: [afmc] CDI.KEYID = 6
2,867,654 UART: [afmc] SUBJECT.KEYID = 7
2,868,079 UART: [afmc] AUTHORITY.KEYID = 5
2,903,556 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,387 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,115 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,000 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,719 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,617 UART: [afmc] --
2,946,641 UART: [cold-reset] --
2,947,499 UART: [state] Locking Datavault
2,948,804 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,408 UART: [state] Locking ICCM
2,949,874 UART: [exit] Launching FMC @ 0x40000130
2,955,203 UART:
2,955,219 UART: Running Caliptra FMC ...
2,955,627 UART:
2,955,681 UART: [state] CFI Enabled
2,966,310 UART: [fht] FMC Alias Private Key: 7
3,073,627 UART: [art] Extend RT PCRs Done
3,074,055 UART: [art] Lock RT PCRs Done
3,075,601 UART: [art] Populate DV Done
3,083,894 UART: [fht] FMC Alias Private Key: 7
3,085,004 UART: [art] Derive CDI
3,085,284 UART: [art] Store in in slot 0x4
3,170,559 UART: [art] Derive Key Pair
3,170,919 UART: [art] Store priv key in slot 0x5
3,183,703 UART: [art] Derive Key Pair - Done
3,198,087 UART: [art] Signing Cert with AUTHO
3,198,567 UART: RITY.KEYID = 7
3,213,483 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,248 UART: [art] PUB.X = C306ADCEA155D5A1C1FD8C11AFE074226308C44696ED848C7229CB7CEC79780A0FC2D010644C695207E56A04689CBA32
3,221,006 UART: [art] PUB.Y = E5741751BBBAC673A888434693A60140AB0FA8A4184965CA0AE1B220E5F715C6E646EC99487FB9B6DC4A7DEEDCC5F2F6
3,227,961 UART: [art] SIG.R = B101168E2A8C940611FD2D3B9970F38FCB745DCF6A7C77BC65A7066999D4E35FDB23C7AFDADF67107748E45130AF5D46
3,234,732 UART: [art] SIG.S = 5EFEEA47F597159800FE85D56FB96848C219401A7BD2B089B83EE7099F5DCC73959A41584BB5048FA3E334FCCD03B451
3,258,172 UART: Caliptra RT
3,258,425 UART: [state] CFI Enabled
3,365,886 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,412 UART: [rt]cmd =0x49444352, len=4
3,397,773 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,580 ready_for_fw is high
1,108,580 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,642,772 >>> mbox cmd response: success
2,642,772 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,705,440 UART:
2,705,456 UART: Running Caliptra FMC ...
2,705,864 UART:
2,705,918 UART: [state] CFI Enabled
2,716,369 UART: [fht] FMC Alias Private Key: 7
2,824,450 UART: [art] Extend RT PCRs Done
2,824,878 UART: [art] Lock RT PCRs Done
2,826,232 UART: [art] Populate DV Done
2,834,421 UART: [fht] FMC Alias Private Key: 7
2,835,539 UART: [art] Derive CDI
2,835,819 UART: [art] Store in in slot 0x4
2,921,530 UART: [art] Derive Key Pair
2,921,890 UART: [art] Store priv key in slot 0x5
2,934,794 UART: [art] Derive Key Pair - Done
2,949,781 UART: [art] Signing Cert with AUTHO
2,950,261 UART: RITY.KEYID = 7
2,965,425 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,190 UART: [art] PUB.X = C773FC9EE3B14A50840A6E92820CEDBB2B6D1CC6E4CC8A0087D0033FBDFB0CE3AD6E77439AAF88680538F170F04C841E
2,972,941 UART: [art] PUB.Y = B71EB3F635BF44E5D8455F489502655D657424BCD174CD5094E75BF6E0DE46EC25C6626F1C1AB2E1A281424D7FF00F3D
2,979,893 UART: [art] SIG.R = D34DEE93C623DC12CBF8C66EEA045B57B00C6262B3EEF74D0E362A9FDCE1365D0518DCFE7DFAC0EA9AD869E737C8B825
2,986,677 UART: [art] SIG.S = 21C2E93BBD5F2BCB6E9580EE609EFE3F0CD258412E4512B8707425DD162A5E8175B39CBDFF7D68F813B3E3835F91BF1F
3,010,489 UART: Caliptra RT
3,010,742 UART: [state] CFI Enabled
3,118,541 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,123 UART: [rt]cmd =0x49444352, len=4
3,150,494 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,376 UART: [state] WD Timer not started. Device not locked for debugging
87,731 UART: [kat] SHA2-256
893,381 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,506 UART: [kat] ++
897,658 UART: [kat] sha1
901,934 UART: [kat] SHA2-256
903,874 UART: [kat] SHA2-384
906,707 UART: [kat] SHA2-512-ACC
908,608 UART: [kat] ECC-384
918,091 UART: [kat] HMAC-384Kdf
922,621 UART: [kat] LMS
1,170,949 UART: [kat] --
1,171,742 UART: [cold-reset] ++
1,172,320 UART: [fht] FHT @ 0x50003400
1,175,039 UART: [idev] ++
1,175,207 UART: [idev] CDI.KEYID = 6
1,175,567 UART: [idev] SUBJECT.KEYID = 7
1,175,991 UART: [idev] UDS.KEYID = 0
1,183,977 UART: [idev] Erasing UDS.KEYID = 0
1,201,416 UART: [idev] Sha1 KeyId Algorithm
1,209,838 UART: [idev] CSR upload begun
1,211,619 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,551 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,228,258 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,234,140 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,239,845 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,248,265 UART: [idev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
1,298,413 UART: [idev] CSR uploaded
1,300,792 ready_for_fw is high
1,300,792 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,300,963 UART: [idev] --
1,302,111 UART: [ldev] ++
1,302,279 UART: [ldev] CDI.KEYID = 6
1,302,642 UART: [ldev] SUBJECT.KEYID = 5
1,303,068 UART: [ldev] AUTHORITY.KEYID = 7
1,303,531 UART: [ldev] FE.KEYID = 1
1,308,739 UART: [ldev] Erasing FE.KEYID = 1
1,335,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,727 UART: [ldev] --
1,374,126 UART: [fwproc] Wait for Commands...
1,374,886 UART: [fwproc] Recv command 0x46574c44
1,375,614 UART: [fwproc] Recv'd Img size: 114332 bytes
2,672,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,260 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,564 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,864,331 >>> mbox cmd response: success
2,864,331 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,865,547 UART: [afmc] ++
2,865,715 UART: [afmc] CDI.KEYID = 6
2,866,077 UART: [afmc] SUBJECT.KEYID = 7
2,866,502 UART: [afmc] AUTHORITY.KEYID = 5
2,902,045 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,578 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,326 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,054 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,939 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,658 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,588 UART: [afmc] --
2,945,494 UART: [cold-reset] --
2,946,468 UART: [state] Locking Datavault
2,947,541 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,145 UART: [state] Locking ICCM
2,948,783 UART: [exit] Launching FMC @ 0x40000130
2,954,112 UART:
2,954,128 UART: Running Caliptra FMC ...
2,954,536 UART:
2,954,679 UART: [state] CFI Enabled
2,965,198 UART: [fht] FMC Alias Private Key: 7
3,073,173 UART: [art] Extend RT PCRs Done
3,073,601 UART: [art] Lock RT PCRs Done
3,075,073 UART: [art] Populate DV Done
3,083,550 UART: [fht] FMC Alias Private Key: 7
3,084,588 UART: [art] Derive CDI
3,084,868 UART: [art] Store in in slot 0x4
3,170,639 UART: [art] Derive Key Pair
3,170,999 UART: [art] Store priv key in slot 0x5
3,184,553 UART: [art] Derive Key Pair - Done
3,199,198 UART: [art] Signing Cert with AUTHO
3,199,678 UART: RITY.KEYID = 7
3,215,006 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,771 UART: [art] PUB.X = 9C7936435E3CB3DA6CDF02B6BDFCBF270541EF9A1F2C8EA267F2267F68FD7D4349BAB8DD15BBC985D551FA57B2517C75
3,222,555 UART: [art] PUB.Y = 8632A8B66F6850D7DE9070E96C157D0B84C71B355F8CEF87C60DD9EDE7CE43308FE14107CB8154EA7D21CFBA87F3AE4C
3,229,512 UART: [art] SIG.R = C1401FD4CDAAB9D556A94AF4FC07D8AFCE98DF44B672DB59E2757BF25CE8A550E762DD9B604B3D6F5A0812206C57FC15
3,236,296 UART: [art] SIG.S = CDAF5F5DBE462DCE3F10999A78ABA8872A46CB51975D3315D39B60BAD01B3C98CE6398065AF16209167B984F52D93882
3,259,989 UART: Caliptra RT
3,260,334 UART: [state] CFI Enabled
3,367,344 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,848 UART: [rt]cmd =0x49444352, len=4
3,399,047 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,753 ready_for_fw is high
1,109,753 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,643,507 >>> mbox cmd response: success
2,643,507 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,706,021 UART:
2,706,037 UART: Running Caliptra FMC ...
2,706,445 UART:
2,706,588 UART: [state] CFI Enabled
2,717,339 UART: [fht] FMC Alias Private Key: 7
2,825,546 UART: [art] Extend RT PCRs Done
2,825,974 UART: [art] Lock RT PCRs Done
2,827,346 UART: [art] Populate DV Done
2,835,629 UART: [fht] FMC Alias Private Key: 7
2,836,729 UART: [art] Derive CDI
2,837,009 UART: [art] Store in in slot 0x4
2,923,008 UART: [art] Derive Key Pair
2,923,368 UART: [art] Store priv key in slot 0x5
2,936,798 UART: [art] Derive Key Pair - Done
2,951,847 UART: [art] Signing Cert with AUTHO
2,952,327 UART: RITY.KEYID = 7
2,967,051 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,816 UART: [art] PUB.X = 5B34BA833D83126673AB4E8DC2EDCE5210670B6D677BBEB543361D6F5C83BE5C6AB37C0B66070DD80C3F95F4142D6D28
2,974,581 UART: [art] PUB.Y = 24E3FC9B3EDBC163A6D1F229EEB0ACD2F0FC55988E3CA6DD842B83DFEA1D6E24E5304937FFE1C1323412E1A738394B8A
2,981,551 UART: [art] SIG.R = 7C339CD6C7DE94B09717214B499C0B6E95E585CAA45526BAB83D9401CB8E0F579E218AB176F8E915B17FFF0C9C555E83
2,988,317 UART: [art] SIG.S = EBD906143B81B1CA81EEF320EC1589479FBB28B880151728A4DEC5C384B62787F86D79BA03934C02B1ED0BFBF281B9BD
3,012,490 UART: Caliptra RT
3,012,835 UART: [state] CFI Enabled
3,121,000 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,151,480 UART: [rt]cmd =0x49444352, len=4
3,153,009 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
891,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,219 UART: [kat] ++
895,371 UART: [kat] sha1
899,499 UART: [kat] SHA2-256
901,439 UART: [kat] SHA2-384
904,148 UART: [kat] SHA2-512-ACC
906,049 UART: [kat] ECC-384
916,216 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,169,565 UART: [cold-reset] ++
1,170,019 UART: [fht] FHT @ 0x50003400
1,172,655 UART: [idev] ++
1,172,823 UART: [idev] CDI.KEYID = 6
1,173,184 UART: [idev] SUBJECT.KEYID = 7
1,173,609 UART: [idev] UDS.KEYID = 0
1,181,561 UART: [idev] Erasing UDS.KEYID = 0
1,198,495 UART: [idev] Sha1 KeyId Algorithm
1,206,815 UART: [idev] CSR upload begun
1,208,594 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,031 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,739 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,624 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,330 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,759 UART: [idev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
1,296,253 UART: [idev] CSR uploaded
1,299,298 ready_for_fw is high
1,299,298 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,299,467 UART: [idev] --
1,300,434 UART: [ldev] ++
1,300,602 UART: [ldev] CDI.KEYID = 6
1,300,966 UART: [ldev] SUBJECT.KEYID = 5
1,301,393 UART: [ldev] AUTHORITY.KEYID = 7
1,301,856 UART: [ldev] FE.KEYID = 1
1,306,972 UART: [ldev] Erasing FE.KEYID = 1
1,332,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,462 UART: [ldev] --
1,371,836 UART: [fwproc] Wait for Commands...
1,372,477 UART: [fwproc] Recv command 0x46574c44
1,373,210 UART: [fwproc] Recv'd Img size: 114332 bytes
2,670,464 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,697,970 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,279 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,863,051 >>> mbox cmd response: success
2,863,051 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,864,318 UART: [afmc] ++
2,864,486 UART: [afmc] CDI.KEYID = 6
2,864,849 UART: [afmc] SUBJECT.KEYID = 7
2,865,275 UART: [afmc] AUTHORITY.KEYID = 5
2,900,636 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,916,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,917,615 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,923,344 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,929,227 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,934,946 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,942,931 UART: [afmc] --
2,944,003 UART: [cold-reset] --
2,944,887 UART: [state] Locking Datavault
2,945,994 UART: [state] Locking PCR0, PCR1 and PCR31
2,946,598 UART: [state] Locking ICCM
2,947,022 UART: [exit] Launching FMC @ 0x40000130
2,952,351 UART:
2,952,367 UART: Running Caliptra FMC ...
2,952,775 UART:
2,952,829 UART: [state] CFI Enabled
2,963,704 UART: [fht] FMC Alias Private Key: 7
3,071,047 UART: [art] Extend RT PCRs Done
3,071,475 UART: [art] Lock RT PCRs Done
3,072,915 UART: [art] Populate DV Done
3,081,250 UART: [fht] FMC Alias Private Key: 7
3,082,366 UART: [art] Derive CDI
3,082,646 UART: [art] Store in in slot 0x4
3,168,361 UART: [art] Derive Key Pair
3,168,721 UART: [art] Store priv key in slot 0x5
3,181,389 UART: [art] Derive Key Pair - Done
3,196,235 UART: [art] Signing Cert with AUTHO
3,196,715 UART: RITY.KEYID = 7
3,211,597 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,362 UART: [art] PUB.X = 96D3B716A5ADA4CF36330C98723B3CC36FA65A175FDD5EA9C3832176275FFEB4F21D73313A2E745EFC2DAA86CFFE4426
3,219,145 UART: [art] PUB.Y = 3EDC60CBCC0412DA245D45C1A9F4809A0241D722CA100AAD4EB92358987976FD03B83DBD2571B11A2FB6358A5A47B863
3,226,091 UART: [art] SIG.R = 9E28BFAE847CBA829134733C39458464E228DA87E05FCDF1327F28279D5EB64AC6ABD638519EDCC83B622447C1D1294D
3,232,867 UART: [art] SIG.S = 62582AC3228D7A7FD9C30B4AB4DD715A0E4B481A10B84F7E776811E6F028D0751388CA86A869EB4D54836CDDF0D34E40
3,256,424 UART: Caliptra RT
3,256,677 UART: [state] CFI Enabled
3,363,128 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,393,944 UART: [rt]cmd =0x49444352, len=4
3,401,088 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,447 ready_for_fw is high
1,107,447 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,642,614 >>> mbox cmd response: success
2,642,614 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,704,994 UART:
2,705,010 UART: Running Caliptra FMC ...
2,705,418 UART:
2,705,472 UART: [state] CFI Enabled
2,715,865 UART: [fht] FMC Alias Private Key: 7
2,823,366 UART: [art] Extend RT PCRs Done
2,823,794 UART: [art] Lock RT PCRs Done
2,825,320 UART: [art] Populate DV Done
2,833,313 UART: [fht] FMC Alias Private Key: 7
2,834,441 UART: [art] Derive CDI
2,834,721 UART: [art] Store in in slot 0x4
2,920,050 UART: [art] Derive Key Pair
2,920,410 UART: [art] Store priv key in slot 0x5
2,933,790 UART: [art] Derive Key Pair - Done
2,948,640 UART: [art] Signing Cert with AUTHO
2,949,120 UART: RITY.KEYID = 7
2,964,328 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,093 UART: [art] PUB.X = 1AC35FD75CD9959BFA5C4B1B0D6463F0614193AB4C570A2993F2836E941A6FFD46B1AA6667FC5A4E1F53B8588C2F5A59
2,971,867 UART: [art] PUB.Y = 64BDA57EB73EF7A8AA0797211C0960B8428066D145F763428BA17C92A6DDD31DCE40AB7F06B2B733073980DAD32E8505
2,978,806 UART: [art] SIG.R = 68CA710933C321CF7E743CCD0D8BD4BCEDCD19433A68AE48667E8B7F622EF1D5B972EFE62E09F977ADFFC34FCF556E0F
2,985,588 UART: [art] SIG.S = 7C6B619D2021EFA57A0511AC8C9E7BFF9767F1F4ABC3984F53362C49048570047E44B8F27348E6742B8BDFD473BAE7F9
3,009,638 UART: Caliptra RT
3,009,891 UART: [state] CFI Enabled
3,118,232 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,866 UART: [rt]cmd =0x49444352, len=4
3,156,052 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
891,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,384 UART: [kat] ++
895,536 UART: [kat] sha1
899,712 UART: [kat] SHA2-256
901,652 UART: [kat] SHA2-384
904,399 UART: [kat] SHA2-512-ACC
906,300 UART: [kat] ECC-384
915,651 UART: [kat] HMAC-384Kdf
920,123 UART: [kat] LMS
1,168,435 UART: [kat] --
1,169,460 UART: [cold-reset] ++
1,169,896 UART: [fht] FHT @ 0x50003400
1,172,648 UART: [idev] ++
1,172,816 UART: [idev] CDI.KEYID = 6
1,173,177 UART: [idev] SUBJECT.KEYID = 7
1,173,602 UART: [idev] UDS.KEYID = 0
1,181,526 UART: [idev] Erasing UDS.KEYID = 0
1,198,652 UART: [idev] Sha1 KeyId Algorithm
1,207,108 UART: [idev] CSR upload begun
1,208,887 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,408 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,116 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,001 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,707 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,136 UART: [idev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
1,296,630 UART: [idev] CSR uploaded
1,299,675 ready_for_fw is high
1,299,675 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,299,844 UART: [idev] --
1,300,975 UART: [ldev] ++
1,301,143 UART: [ldev] CDI.KEYID = 6
1,301,507 UART: [ldev] SUBJECT.KEYID = 5
1,301,934 UART: [ldev] AUTHORITY.KEYID = 7
1,302,397 UART: [ldev] FE.KEYID = 1
1,307,773 UART: [ldev] Erasing FE.KEYID = 1
1,334,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,427 UART: [ldev] --
1,373,717 UART: [fwproc] Wait for Commands...
1,374,312 UART: [fwproc] Recv command 0x46574c44
1,375,045 UART: [fwproc] Recv'd Img size: 114332 bytes
2,673,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,851 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,160 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,864,872 >>> mbox cmd response: success
2,864,872 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,866,083 UART: [afmc] ++
2,866,251 UART: [afmc] CDI.KEYID = 6
2,866,614 UART: [afmc] SUBJECT.KEYID = 7
2,867,040 UART: [afmc] AUTHORITY.KEYID = 5
2,901,871 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,419 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,170 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,899 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,782 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,501 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,268 UART: [afmc] --
2,945,294 UART: [cold-reset] --
2,946,194 UART: [state] Locking Datavault
2,947,333 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,937 UART: [state] Locking ICCM
2,948,593 UART: [exit] Launching FMC @ 0x40000130
2,953,922 UART:
2,953,938 UART: Running Caliptra FMC ...
2,954,346 UART:
2,954,489 UART: [state] CFI Enabled
2,965,448 UART: [fht] FMC Alias Private Key: 7
3,073,425 UART: [art] Extend RT PCRs Done
3,073,853 UART: [art] Lock RT PCRs Done
3,075,073 UART: [art] Populate DV Done
3,083,296 UART: [fht] FMC Alias Private Key: 7
3,084,336 UART: [art] Derive CDI
3,084,616 UART: [art] Store in in slot 0x4
3,170,425 UART: [art] Derive Key Pair
3,170,785 UART: [art] Store priv key in slot 0x5
3,184,273 UART: [art] Derive Key Pair - Done
3,198,912 UART: [art] Signing Cert with AUTHO
3,199,392 UART: RITY.KEYID = 7
3,214,630 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,395 UART: [art] PUB.X = 8D8B1DEBB8C11FBD41CA02881FD3E5AA04BA41A73F15D739F59BB4D8EE4A80EE0AC137A8EEBFCE7BBAAC636C9BA476C9
3,222,192 UART: [art] PUB.Y = 287251C46FB2B381DA0EE4BA10D49B271CF83C3878E02BE50BE97752D7AE416CB89370C17DB9CF7CB8EAAA713336DBA8
3,229,152 UART: [art] SIG.R = C836D491CF3AD37AD5ECB8DF557C57ECEC5F70CB356BAB8AA3C18FB84224EAD2CB14AAA3D6C52A0BBCD0B4A92DAFF560
3,235,957 UART: [art] SIG.S = CD69B2EAD57ED886CB83423C21279952C440EDF6DDE4ABCBD5B92F02F0545D9D3DA9F4FCA9A7C284C3B9D26E96B4168F
3,259,627 UART: Caliptra RT
3,259,972 UART: [state] CFI Enabled
3,367,900 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,646 UART: [rt]cmd =0x49444352, len=4
3,405,858 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,202 ready_for_fw is high
1,108,202 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,641,805 >>> mbox cmd response: success
2,641,805 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,704,341 UART:
2,704,357 UART: Running Caliptra FMC ...
2,704,765 UART:
2,704,908 UART: [state] CFI Enabled
2,715,115 UART: [fht] FMC Alias Private Key: 7
2,822,732 UART: [art] Extend RT PCRs Done
2,823,160 UART: [art] Lock RT PCRs Done
2,824,668 UART: [art] Populate DV Done
2,832,699 UART: [fht] FMC Alias Private Key: 7
2,833,661 UART: [art] Derive CDI
2,833,941 UART: [art] Store in in slot 0x4
2,919,858 UART: [art] Derive Key Pair
2,920,218 UART: [art] Store priv key in slot 0x5
2,933,428 UART: [art] Derive Key Pair - Done
2,948,112 UART: [art] Signing Cert with AUTHO
2,948,592 UART: RITY.KEYID = 7
2,963,708 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,473 UART: [art] PUB.X = 1E761158DA47EF380C68C474F582BCFBA0800516F4CD59851DFCB852A9D9FF79C587D7C77C1E0F71D5FD6F236FEB2785
2,971,246 UART: [art] PUB.Y = 279FAE42E20DBB3E72A67DAB12DB3A5209644B979D0650FE8DB005D17FEC87E84D7F327BB747D865E4979C66A11EEF35
2,978,196 UART: [art] SIG.R = 48771A0EBA1DDF9554FD1251138A0CA7A4DDAF36BE9A5F4B532FF2B2562B716020494D1BE66BE8D96F2A6C59D27572C9
2,984,972 UART: [art] SIG.S = 72D5A2A78879C4D7020867CAC670CBF7929FD514D8F15FBCD6209B9629B093B53B5D28EA7EECD4E48C3E627E65BAE676
3,008,861 UART: Caliptra RT
3,009,206 UART: [state] CFI Enabled
3,118,163 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,581 UART: [rt]cmd =0x49444352, len=4
3,155,631 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,422 UART: [state] LifecycleState = Unprovisioned
85,077 UART: [state] DebugLocked = No
85,805 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,305 UART: [kat] SHA2-256
881,236 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,351 UART: [kat] ++
885,503 UART: [kat] sha1
889,959 UART: [kat] SHA2-256
891,897 UART: [kat] SHA2-384
894,660 UART: [kat] SHA2-512-ACC
896,561 UART: [kat] ECC-384
902,446 UART: [kat] HMAC-384Kdf
907,234 UART: [kat] LMS
1,475,430 UART: [kat] --
1,476,363 UART: [cold-reset] ++
1,476,797 UART: [fht] Storing FHT @ 0x50003400
1,479,748 UART: [idev] ++
1,479,916 UART: [idev] CDI.KEYID = 6
1,480,276 UART: [idev] SUBJECT.KEYID = 7
1,480,700 UART: [idev] UDS.KEYID = 0
1,481,045 ready_for_fw is high
1,481,045 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,948 UART: [idev] Erasing UDS.KEYID = 0
1,505,674 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,408 UART: [idev] --
1,515,317 UART: [ldev] ++
1,515,485 UART: [ldev] CDI.KEYID = 6
1,515,848 UART: [ldev] SUBJECT.KEYID = 5
1,516,274 UART: [ldev] AUTHORITY.KEYID = 7
1,516,737 UART: [ldev] FE.KEYID = 1
1,521,791 UART: [ldev] Erasing FE.KEYID = 1
1,547,734 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,616 UART: [ldev] --
1,587,111 UART: [fwproc] Waiting for Commands...
1,587,730 UART: [fwproc] Received command 0x46574c44
1,588,521 UART: [fwproc] Received Image of size 114332 bytes
2,886,419 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,111 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,463 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,314 >>> mbox cmd response: success
3,080,424 UART: [afmc] ++
3,080,592 UART: [afmc] CDI.KEYID = 6
3,080,954 UART: [afmc] SUBJECT.KEYID = 7
3,081,379 UART: [afmc] AUTHORITY.KEYID = 5
3,116,406 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,590 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,370 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,098 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,983 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,673 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,600 UART: [afmc] --
3,159,638 UART: [cold-reset] --
3,160,392 UART: [state] Locking Datavault
3,161,421 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,025 UART: [state] Locking ICCM
3,162,577 UART: [exit] Launching FMC @ 0x40000130
3,167,906 UART:
3,167,922 UART: Running Caliptra FMC ...
3,168,330 UART:
3,168,384 UART: [state] CFI Enabled
3,178,765 UART: [fht] FMC Alias Private Key: 7
3,286,616 UART: [art] Extend RT PCRs Done
3,287,044 UART: [art] Lock RT PCRs Done
3,288,532 UART: [art] Populate DV Done
3,296,977 UART: [fht] FMC Alias Private Key: 7
3,297,915 UART: [art] Derive CDI
3,298,195 UART: [art] Store in in slot 0x4
3,383,804 UART: [art] Derive Key Pair
3,384,164 UART: [art] Store priv key in slot 0x5
3,397,220 UART: [art] Derive Key Pair - Done
3,411,900 UART: [art] Signing Cert with AUTHO
3,412,380 UART: RITY.KEYID = 7
3,427,142 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,907 UART: [art] PUB.X = D1212781854AA64BE7E431A7F84A3D1B2BB521295F697F0BAF1CD6990E7D519DEBEC14D2C528B40BB9485EFDA590ADA2
3,434,684 UART: [art] PUB.Y = 5AC5D4125A707BEE084A6692CEB39A9661ADE72AB7CC93F9BAAB2C5E118F4C7CD4FA2C8893751BBCE78871D444BFFEF8
3,441,655 UART: [art] SIG.R = B6004CE646930167FDF407D24125EE3AC4DE699607634DFA386CE4D65B15064AD0A574989B1042E69C2B3BEF01DE1133
3,448,390 UART: [art] SIG.S = F3DA8576D18FEC448CAAF6BA147A39F0290110B51D6F30832360B49A81649EC724F81F18C059E0DBD421DA21DB05B929
3,472,599 UART: Caliptra RT
3,472,852 UART: [state] CFI Enabled
3,581,416 UART: [rt] RT listening for mailbox commands...
3,582,086 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,946 UART: [rt]cmd =0x49444352, len=4
3,613,281 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,393 ready_for_fw is high
1,362,393 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,650 >>> mbox cmd response: success
2,990,330 UART:
2,990,346 UART: Running Caliptra FMC ...
2,990,754 UART:
2,990,808 UART: [state] CFI Enabled
3,001,473 UART: [fht] FMC Alias Private Key: 7
3,109,408 UART: [art] Extend RT PCRs Done
3,109,836 UART: [art] Lock RT PCRs Done
3,111,516 UART: [art] Populate DV Done
3,119,655 UART: [fht] FMC Alias Private Key: 7
3,120,695 UART: [art] Derive CDI
3,120,975 UART: [art] Store in in slot 0x4
3,206,920 UART: [art] Derive Key Pair
3,207,280 UART: [art] Store priv key in slot 0x5
3,220,362 UART: [art] Derive Key Pair - Done
3,234,843 UART: [art] Signing Cert with AUTHO
3,235,323 UART: RITY.KEYID = 7
3,250,861 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,626 UART: [art] PUB.X = CA2AAB275E4F8B05E5339DB31F41F3461C695A9A32D99449AA5029B28B2C6DFEC4F90F9F653244DA076C7C5FDEE41D2A
3,258,403 UART: [art] PUB.Y = AEAA52AC31BAC51721D3737091AAE84FAF4639435249623E3F7F75D229AAE43D962B2F5D7961CA4748992D1F1B754962
3,265,355 UART: [art] SIG.R = 615829F048DF5846B395C7E76D89A51C22D3141F547294A372AA698A813121CB93AC98FCB146B5D4C11AC01FF0BFCBD5
3,272,131 UART: [art] SIG.S = 4A958FE1F507A846794EA41EA1C4F9609EC399F181B65744D3F9526CE50C8B50526F13FB8B13CB47C5DF37DDBB724BA6
3,295,704 UART: Caliptra RT
3,295,957 UART: [state] CFI Enabled
3,403,653 UART: [rt] RT listening for mailbox commands...
3,404,323 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,335 UART: [rt]cmd =0x49444352, len=4
3,435,714 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,696 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,282 UART: [kat] SHA2-256
882,213 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,328 UART: [kat] ++
886,480 UART: [kat] sha1
890,714 UART: [kat] SHA2-256
892,652 UART: [kat] SHA2-384
895,435 UART: [kat] SHA2-512-ACC
897,336 UART: [kat] ECC-384
902,839 UART: [kat] HMAC-384Kdf
907,563 UART: [kat] LMS
1,475,759 UART: [kat] --
1,476,408 UART: [cold-reset] ++
1,476,798 UART: [fht] Storing FHT @ 0x50003400
1,479,675 UART: [idev] ++
1,479,843 UART: [idev] CDI.KEYID = 6
1,480,203 UART: [idev] SUBJECT.KEYID = 7
1,480,627 UART: [idev] UDS.KEYID = 0
1,480,972 ready_for_fw is high
1,480,972 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,111 UART: [idev] Erasing UDS.KEYID = 0
1,506,037 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,549 UART: [idev] --
1,515,618 UART: [ldev] ++
1,515,786 UART: [ldev] CDI.KEYID = 6
1,516,149 UART: [ldev] SUBJECT.KEYID = 5
1,516,575 UART: [ldev] AUTHORITY.KEYID = 7
1,517,038 UART: [ldev] FE.KEYID = 1
1,522,278 UART: [ldev] Erasing FE.KEYID = 1
1,548,371 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,221 UART: [ldev] --
1,587,716 UART: [fwproc] Waiting for Commands...
1,588,443 UART: [fwproc] Received command 0x46574c44
1,589,234 UART: [fwproc] Received Image of size 114332 bytes
2,885,724 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,488 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,840 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,707 >>> mbox cmd response: success
3,079,929 UART: [afmc] ++
3,080,097 UART: [afmc] CDI.KEYID = 6
3,080,459 UART: [afmc] SUBJECT.KEYID = 7
3,080,884 UART: [afmc] AUTHORITY.KEYID = 5
3,115,923 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,145 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,925 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,653 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,538 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,228 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,041 UART: [afmc] --
3,158,967 UART: [cold-reset] --
3,159,807 UART: [state] Locking Datavault
3,160,596 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,200 UART: [state] Locking ICCM
3,161,706 UART: [exit] Launching FMC @ 0x40000130
3,167,035 UART:
3,167,051 UART: Running Caliptra FMC ...
3,167,459 UART:
3,167,602 UART: [state] CFI Enabled
3,178,321 UART: [fht] FMC Alias Private Key: 7
3,286,506 UART: [art] Extend RT PCRs Done
3,286,934 UART: [art] Lock RT PCRs Done
3,288,448 UART: [art] Populate DV Done
3,296,911 UART: [fht] FMC Alias Private Key: 7
3,298,073 UART: [art] Derive CDI
3,298,353 UART: [art] Store in in slot 0x4
3,384,222 UART: [art] Derive Key Pair
3,384,582 UART: [art] Store priv key in slot 0x5
3,398,028 UART: [art] Derive Key Pair - Done
3,412,919 UART: [art] Signing Cert with AUTHO
3,413,399 UART: RITY.KEYID = 7
3,429,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,856 UART: [art] PUB.X = D82A0F167359D1572611C24216F3510665DAED64E6C2F66E45FD3E16DA4DF58E93C76D9AA5EFA6E4C36B37A7E4B06069
3,436,628 UART: [art] PUB.Y = 3D94F696B72C634DC87E9CE2EF996C2985DE6A9BBE358708BEF5A0F48AD18518F5AAE7AD21CB17225AA33B4E383DFF4D
3,443,595 UART: [art] SIG.R = F5BEC9D709962BA91915DF6FC2254A67FD212FDC9E241FE2D4B40544B60C77374297A6CE55E1E905DD720E0C961877E5
3,450,353 UART: [art] SIG.S = 60B2FCE4E792F2C622121F29C9818808B5EA202D8B0A25655442EAB35C9EE1797BE734B91AEEF80F4FC34425FE64E945
3,474,395 UART: Caliptra RT
3,474,740 UART: [state] CFI Enabled
3,581,663 UART: [rt] RT listening for mailbox commands...
3,582,333 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,069 UART: [rt]cmd =0x49444352, len=4
3,613,500 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,956 ready_for_fw is high
1,362,956 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,077 >>> mbox cmd response: success
2,989,809 UART:
2,989,825 UART: Running Caliptra FMC ...
2,990,233 UART:
2,990,376 UART: [state] CFI Enabled
3,001,003 UART: [fht] FMC Alias Private Key: 7
3,109,222 UART: [art] Extend RT PCRs Done
3,109,650 UART: [art] Lock RT PCRs Done
3,111,400 UART: [art] Populate DV Done
3,119,531 UART: [fht] FMC Alias Private Key: 7
3,120,683 UART: [art] Derive CDI
3,120,963 UART: [art] Store in in slot 0x4
3,206,992 UART: [art] Derive Key Pair
3,207,352 UART: [art] Store priv key in slot 0x5
3,220,670 UART: [art] Derive Key Pair - Done
3,235,416 UART: [art] Signing Cert with AUTHO
3,235,896 UART: RITY.KEYID = 7
3,251,336 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,101 UART: [art] PUB.X = 08B59D281F0E9035E08D7E71BB41109699BD1DB87EFEA23C48DC932E81B4542DCBC403654E6CC39B54E9F871DA12C6E4
3,258,872 UART: [art] PUB.Y = D71EAEFB70EEEFC456CEC40A7F2FF565ACA4B342744A5E3F2A10D31F717C964913C703DC7E8AF739C021A56EF6BCAD41
3,265,840 UART: [art] SIG.R = 7522D472F154F003DDAD0B8717ACFB231E129A2BE961CADC017BBA5C5A9D65F0B1DD8AC2CDBFB9461B7685A23E4DC2B2
3,272,625 UART: [art] SIG.S = F952B6DB6FD47386171DC789CE0C249722C0C550BD4858168BEEAF76A99798E49F4CD47F1BF246D196C52CF40AB3E832
3,296,308 UART: Caliptra RT
3,296,653 UART: [state] CFI Enabled
3,405,494 UART: [rt] RT listening for mailbox commands...
3,406,164 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,124 UART: [rt]cmd =0x49444352, len=4
3,437,425 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,448 UART: [state] LifecycleState = Unprovisioned
86,103 UART: [state] DebugLocked = No
86,781 UART: [state] WD Timer not started. Device not locked for debugging
87,982 UART: [kat] SHA2-256
893,632 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,757 UART: [kat] ++
897,909 UART: [kat] sha1
902,065 UART: [kat] SHA2-256
904,005 UART: [kat] SHA2-384
906,924 UART: [kat] SHA2-512-ACC
908,825 UART: [kat] ECC-384
918,330 UART: [kat] HMAC-384Kdf
922,908 UART: [kat] LMS
1,171,236 UART: [kat] --
1,172,113 UART: [cold-reset] ++
1,172,529 UART: [fht] FHT @ 0x50003400
1,175,018 UART: [idev] ++
1,175,186 UART: [idev] CDI.KEYID = 6
1,175,546 UART: [idev] SUBJECT.KEYID = 7
1,175,970 UART: [idev] UDS.KEYID = 0
1,176,315 ready_for_fw is high
1,176,315 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,554 UART: [idev] Erasing UDS.KEYID = 0
1,200,707 UART: [idev] Sha1 KeyId Algorithm
1,209,165 UART: [idev] --
1,210,241 UART: [ldev] ++
1,210,409 UART: [ldev] CDI.KEYID = 6
1,210,772 UART: [ldev] SUBJECT.KEYID = 5
1,211,198 UART: [ldev] AUTHORITY.KEYID = 7
1,211,661 UART: [ldev] FE.KEYID = 1
1,217,053 UART: [ldev] Erasing FE.KEYID = 1
1,243,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,905 UART: [ldev] --
1,283,282 UART: [fwproc] Wait for Commands...
1,284,032 UART: [fwproc] Recv command 0x46574c44
1,284,760 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,651 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,686 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,990 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,911 >>> mbox cmd response: success
2,775,023 UART: [afmc] ++
2,775,191 UART: [afmc] CDI.KEYID = 6
2,775,553 UART: [afmc] SUBJECT.KEYID = 7
2,775,978 UART: [afmc] AUTHORITY.KEYID = 5
2,811,241 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,798 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,546 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,274 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,159 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,878 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,686 UART: [afmc] --
2,854,752 UART: [cold-reset] --
2,855,690 UART: [state] Locking Datavault
2,856,773 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,377 UART: [state] Locking ICCM
2,857,923 UART: [exit] Launching FMC @ 0x40000130
2,863,252 UART:
2,863,268 UART: Running Caliptra FMC ...
2,863,676 UART:
2,863,730 UART: [state] CFI Enabled
2,874,203 UART: [fht] FMC Alias Private Key: 7
2,982,288 UART: [art] Extend RT PCRs Done
2,982,716 UART: [art] Lock RT PCRs Done
2,984,172 UART: [art] Populate DV Done
2,992,619 UART: [fht] FMC Alias Private Key: 7
2,993,585 UART: [art] Derive CDI
2,993,865 UART: [art] Store in in slot 0x4
3,079,566 UART: [art] Derive Key Pair
3,079,926 UART: [art] Store priv key in slot 0x5
3,093,010 UART: [art] Derive Key Pair - Done
3,107,939 UART: [art] Signing Cert with AUTHO
3,108,419 UART: RITY.KEYID = 7
3,123,171 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,936 UART: [art] PUB.X = 010019BA16CE358DCB1D755EC086B98FF5B3B9C82C81D1835F501BF1AFC934CFFA49A0C55E334C0289217A4A6CB44F9F
3,130,692 UART: [art] PUB.Y = 9923C1724DC824EF3A4E033A1E34975135D179C50C1E0F553228B936599E0214B31609292701F448F685F74AF5E59B49
3,137,610 UART: [art] SIG.R = 16A1A9063210E7DD9987F9ED714C389C80D303F3DF6629753441E68D817FC815BED326B8606506BAD883F6E334381AFE
3,144,369 UART: [art] SIG.S = 80C5B9CDE8369E7E1D0A1AF63594F216CBA2C8C41262B06759B203F47CC83C6FA0A817373702639E2E7FC1CBAE3E9F90
3,168,465 UART: Caliptra RT
3,168,718 UART: [state] CFI Enabled
3,276,507 UART: [rt] RT listening for mailbox commands...
3,277,177 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,927 UART: [rt]cmd =0x49444352, len=4
3,308,440 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,273 ready_for_fw is high
1,060,273 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,182 >>> mbox cmd response: success
2,689,710 UART:
2,689,726 UART: Running Caliptra FMC ...
2,690,134 UART:
2,690,188 UART: [state] CFI Enabled
2,700,695 UART: [fht] FMC Alias Private Key: 7
2,808,204 UART: [art] Extend RT PCRs Done
2,808,632 UART: [art] Lock RT PCRs Done
2,810,268 UART: [art] Populate DV Done
2,818,557 UART: [fht] FMC Alias Private Key: 7
2,819,561 UART: [art] Derive CDI
2,819,841 UART: [art] Store in in slot 0x4
2,905,308 UART: [art] Derive Key Pair
2,905,668 UART: [art] Store priv key in slot 0x5
2,918,908 UART: [art] Derive Key Pair - Done
2,933,578 UART: [art] Signing Cert with AUTHO
2,934,058 UART: RITY.KEYID = 7
2,949,464 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,229 UART: [art] PUB.X = F593136D5513D744E990FDF87D4A97E607D6965FA5DA6C264042B41111DDF1836EB62BF0B6A372821541F019661B03C3
2,956,989 UART: [art] PUB.Y = 67FCE5562A7648B36FBB2940B14A5ACA30E85FFD17D25137F91DC7E60538EF915FA01E3435CA09EE2E33285C387EC43E
2,963,943 UART: [art] SIG.R = C802077956A52D1669D88DBC8F5D6B2CB921FF0EBC5EDA031EE0C51C34E04C224A2F1DA1298E70059EB04892F1D18A7E
2,970,710 UART: [art] SIG.S = 9B4090395E62E78CEAC664BAC6B3623B5AA0CACA02B4118A129E9AACA37BB70B3E8AD2335046450BB97C8312441D6C60
2,994,450 UART: Caliptra RT
2,994,703 UART: [state] CFI Enabled
3,103,245 UART: [rt] RT listening for mailbox commands...
3,103,915 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,737 UART: [rt]cmd =0x49444352, len=4
3,134,878 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
893,531 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,656 UART: [kat] ++
897,808 UART: [kat] sha1
902,086 UART: [kat] SHA2-256
904,026 UART: [kat] SHA2-384
906,887 UART: [kat] SHA2-512-ACC
908,788 UART: [kat] ECC-384
919,337 UART: [kat] HMAC-384Kdf
923,945 UART: [kat] LMS
1,172,273 UART: [kat] --
1,173,276 UART: [cold-reset] ++
1,173,676 UART: [fht] FHT @ 0x50003400
1,176,411 UART: [idev] ++
1,176,579 UART: [idev] CDI.KEYID = 6
1,176,939 UART: [idev] SUBJECT.KEYID = 7
1,177,363 UART: [idev] UDS.KEYID = 0
1,177,708 ready_for_fw is high
1,177,708 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,305 UART: [idev] Erasing UDS.KEYID = 0
1,202,780 UART: [idev] Sha1 KeyId Algorithm
1,211,196 UART: [idev] --
1,212,292 UART: [ldev] ++
1,212,460 UART: [ldev] CDI.KEYID = 6
1,212,823 UART: [ldev] SUBJECT.KEYID = 5
1,213,249 UART: [ldev] AUTHORITY.KEYID = 7
1,213,712 UART: [ldev] FE.KEYID = 1
1,219,148 UART: [ldev] Erasing FE.KEYID = 1
1,245,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,660 UART: [ldev] --
1,285,017 UART: [fwproc] Wait for Commands...
1,285,761 UART: [fwproc] Recv command 0x46574c44
1,286,489 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,657 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,961 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,660 >>> mbox cmd response: success
2,776,686 UART: [afmc] ++
2,776,854 UART: [afmc] CDI.KEYID = 6
2,777,216 UART: [afmc] SUBJECT.KEYID = 7
2,777,641 UART: [afmc] AUTHORITY.KEYID = 5
2,813,296 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,431 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,159 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,044 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,763 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,727 UART: [afmc] --
2,856,623 UART: [cold-reset] --
2,857,601 UART: [state] Locking Datavault
2,858,876 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,480 UART: [state] Locking ICCM
2,860,020 UART: [exit] Launching FMC @ 0x40000130
2,865,349 UART:
2,865,365 UART: Running Caliptra FMC ...
2,865,773 UART:
2,865,916 UART: [state] CFI Enabled
2,876,627 UART: [fht] FMC Alias Private Key: 7
2,984,424 UART: [art] Extend RT PCRs Done
2,984,852 UART: [art] Lock RT PCRs Done
2,986,358 UART: [art] Populate DV Done
2,994,507 UART: [fht] FMC Alias Private Key: 7
2,995,521 UART: [art] Derive CDI
2,995,801 UART: [art] Store in in slot 0x4
3,081,408 UART: [art] Derive Key Pair
3,081,768 UART: [art] Store priv key in slot 0x5
3,095,298 UART: [art] Derive Key Pair - Done
3,109,929 UART: [art] Signing Cert with AUTHO
3,110,409 UART: RITY.KEYID = 7
3,125,677 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,442 UART: [art] PUB.X = 34BA4C947C34E1A7BB3FE4E2DB2D3431C670C2DA720C7EEAFD7F18A28A34DB8A412DDB087D1636EAA2FF5B2C80D6029C
3,133,227 UART: [art] PUB.Y = D59CE465D87712F35A01AEF7114C3E2E5AD553273149AC0A50B01F79DEF80DD97D8FEFB0024B16FF46E66D205C09E520
3,140,172 UART: [art] SIG.R = D767E7D5638B3F916D59F7D4A6CE747173FC3F666EC0BCDFEE07BBC5EA717F32E79ED3D7E860C49D74B193FAAAD8D4D3
3,146,963 UART: [art] SIG.S = 3B898AB9D78B956C17A41E2CFD38774CE36C1267A06546376E1B55E4AAE1E9EF92FFD4046AA408DD22EF2A7BCA90E4AC
3,170,932 UART: Caliptra RT
3,171,277 UART: [state] CFI Enabled
3,279,074 UART: [rt] RT listening for mailbox commands...
3,279,744 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,306 UART: [rt]cmd =0x49444352, len=4
3,310,541 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,664 ready_for_fw is high
1,060,664 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,219 >>> mbox cmd response: success
2,688,653 UART:
2,688,669 UART: Running Caliptra FMC ...
2,689,077 UART:
2,689,220 UART: [state] CFI Enabled
2,699,541 UART: [fht] FMC Alias Private Key: 7
2,807,090 UART: [art] Extend RT PCRs Done
2,807,518 UART: [art] Lock RT PCRs Done
2,809,112 UART: [art] Populate DV Done
2,817,555 UART: [fht] FMC Alias Private Key: 7
2,818,505 UART: [art] Derive CDI
2,818,785 UART: [art] Store in in slot 0x4
2,904,660 UART: [art] Derive Key Pair
2,905,020 UART: [art] Store priv key in slot 0x5
2,918,472 UART: [art] Derive Key Pair - Done
2,933,131 UART: [art] Signing Cert with AUTHO
2,933,611 UART: RITY.KEYID = 7
2,948,817 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,582 UART: [art] PUB.X = 489406904DD32500ACE5D35F344F40556C38E3DE52C002E57D619EDD931A9FE79FA05D319B12BB082FB069C8A685E621
2,956,323 UART: [art] PUB.Y = D8B29E66E2269C7C75C8C268C46EE3911E4EBDDCD670A6E5D34A8480884ADD8F935C1C7E0D5C1B8E456C01928CAF2F01
2,963,278 UART: [art] SIG.R = BA5C7A5B7C3CE712F817E6989E833E47A98F82C1FE6C5CD515B45C5FDD44EEE3863704DBEB311E72CD17CDA90DB8E2CC
2,970,066 UART: [art] SIG.S = B0DA18AA32E99B73AE4AEE00A3ADCB77413C5731BBB530E539398B2FA0AC7600D799E2FD1BF15A4EE84B38963435F934
2,993,765 UART: Caliptra RT
2,994,110 UART: [state] CFI Enabled
3,101,896 UART: [rt] RT listening for mailbox commands...
3,102,566 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,626 UART: [rt]cmd =0x49444352, len=4
3,133,933 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
891,106 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,235 UART: [kat] ++
895,387 UART: [kat] sha1
899,703 UART: [kat] SHA2-256
901,643 UART: [kat] SHA2-384
904,460 UART: [kat] SHA2-512-ACC
906,361 UART: [kat] ECC-384
915,976 UART: [kat] HMAC-384Kdf
920,436 UART: [kat] LMS
1,168,748 UART: [kat] --
1,169,765 UART: [cold-reset] ++
1,170,249 UART: [fht] FHT @ 0x50003400
1,172,945 UART: [idev] ++
1,173,113 UART: [idev] CDI.KEYID = 6
1,173,474 UART: [idev] SUBJECT.KEYID = 7
1,173,899 UART: [idev] UDS.KEYID = 0
1,174,245 ready_for_fw is high
1,174,245 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,903 UART: [idev] Erasing UDS.KEYID = 0
1,198,685 UART: [idev] Sha1 KeyId Algorithm
1,207,431 UART: [idev] --
1,208,402 UART: [ldev] ++
1,208,570 UART: [ldev] CDI.KEYID = 6
1,208,934 UART: [ldev] SUBJECT.KEYID = 5
1,209,361 UART: [ldev] AUTHORITY.KEYID = 7
1,209,824 UART: [ldev] FE.KEYID = 1
1,214,994 UART: [ldev] Erasing FE.KEYID = 1
1,241,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,306 UART: [ldev] --
1,280,596 UART: [fwproc] Wait for Commands...
1,281,255 UART: [fwproc] Recv command 0x46574c44
1,281,988 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,234 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,543 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,441 >>> mbox cmd response: success
2,772,484 UART: [afmc] ++
2,772,652 UART: [afmc] CDI.KEYID = 6
2,773,015 UART: [afmc] SUBJECT.KEYID = 7
2,773,441 UART: [afmc] AUTHORITY.KEYID = 5
2,808,850 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,287 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,016 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,899 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,618 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,509 UART: [afmc] --
2,852,515 UART: [cold-reset] --
2,853,379 UART: [state] Locking Datavault
2,854,602 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,206 UART: [state] Locking ICCM
2,855,682 UART: [exit] Launching FMC @ 0x40000130
2,861,011 UART:
2,861,027 UART: Running Caliptra FMC ...
2,861,435 UART:
2,861,489 UART: [state] CFI Enabled
2,871,970 UART: [fht] FMC Alias Private Key: 7
2,980,033 UART: [art] Extend RT PCRs Done
2,980,461 UART: [art] Lock RT PCRs Done
2,982,005 UART: [art] Populate DV Done
2,990,508 UART: [fht] FMC Alias Private Key: 7
2,991,680 UART: [art] Derive CDI
2,991,960 UART: [art] Store in in slot 0x4
3,077,667 UART: [art] Derive Key Pair
3,078,027 UART: [art] Store priv key in slot 0x5
3,091,091 UART: [art] Derive Key Pair - Done
3,105,966 UART: [art] Signing Cert with AUTHO
3,106,446 UART: RITY.KEYID = 7
3,121,628 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,393 UART: [art] PUB.X = EACAD19AA40151199141F543F75A6F80D6B782852A0E952341AC5FFE89FAC1BA22C4AD6A33AF0A8EB1BA532E1EE7443A
3,129,172 UART: [art] PUB.Y = A88A346F0A0C3EF8D68210901E759411427A5240E04EC605125BC68826E683CB7A5A354DB5B492823E327E431B2E01D7
3,136,104 UART: [art] SIG.R = 5DB9CECDDAF6BA7435B61C2205C4BE4F45D320A133F58E9DEEE296A0B0579EE34E21789B6A83DBBC5C07611237AB80F1
3,142,886 UART: [art] SIG.S = 4F75585AEDA07DDD88BFF21437EAEF8157B2557E245D96560FFD0DE06026C444DF3E2A89D744BF263C38C5131426B423
3,167,033 UART: Caliptra RT
3,167,286 UART: [state] CFI Enabled
3,274,977 UART: [rt] RT listening for mailbox commands...
3,275,647 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,351 UART: [rt]cmd =0x49444352, len=4
3,306,614 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,704 ready_for_fw is high
1,055,704 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,811 >>> mbox cmd response: success
2,682,991 UART:
2,683,007 UART: Running Caliptra FMC ...
2,683,415 UART:
2,683,469 UART: [state] CFI Enabled
2,694,162 UART: [fht] FMC Alias Private Key: 7
2,801,309 UART: [art] Extend RT PCRs Done
2,801,737 UART: [art] Lock RT PCRs Done
2,803,177 UART: [art] Populate DV Done
2,811,506 UART: [fht] FMC Alias Private Key: 7
2,812,594 UART: [art] Derive CDI
2,812,874 UART: [art] Store in in slot 0x4
2,898,523 UART: [art] Derive Key Pair
2,898,883 UART: [art] Store priv key in slot 0x5
2,912,387 UART: [art] Derive Key Pair - Done
2,927,052 UART: [art] Signing Cert with AUTHO
2,927,532 UART: RITY.KEYID = 7
2,942,938 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,703 UART: [art] PUB.X = 523AB3BC35E9BA43454BAEB9C81348096EA20001A5CD78E492EB6035AE44EAA1BF5AE4F740ABDC3F0E48ACF10369E028
2,950,457 UART: [art] PUB.Y = EE1D86137B8715C97E11B59173A01B97619303C01677C25BD5A9C5791C4F31875DF8D3BAFA7F40BBA937EADCB1AE5930
2,957,412 UART: [art] SIG.R = 91CA830A11E255B15C87BAA5C75C7696B7E9BB31E0F9A3544E45E67A0C02E60EDDDB9F349E6EB410B27ED3C35C62163D
2,964,184 UART: [art] SIG.S = 895C53842E6036C58C792C759ECDB00EFA656263D9E90CDDDE1BEA62F2C310B503BC510E55BFA378A3EF84140CE4B2CF
2,987,702 UART: Caliptra RT
2,987,955 UART: [state] CFI Enabled
3,095,615 UART: [rt] RT listening for mailbox commands...
3,096,285 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,225 UART: [rt]cmd =0x49444352, len=4
3,127,354 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
891,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
899,972 UART: [kat] SHA2-256
901,912 UART: [kat] SHA2-384
904,697 UART: [kat] SHA2-512-ACC
906,598 UART: [kat] ECC-384
916,809 UART: [kat] HMAC-384Kdf
921,449 UART: [kat] LMS
1,169,761 UART: [kat] --
1,170,788 UART: [cold-reset] ++
1,171,186 UART: [fht] FHT @ 0x50003400
1,173,838 UART: [idev] ++
1,174,006 UART: [idev] CDI.KEYID = 6
1,174,367 UART: [idev] SUBJECT.KEYID = 7
1,174,792 UART: [idev] UDS.KEYID = 0
1,175,138 ready_for_fw is high
1,175,138 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,496 UART: [idev] Erasing UDS.KEYID = 0
1,200,156 UART: [idev] Sha1 KeyId Algorithm
1,208,984 UART: [idev] --
1,209,891 UART: [ldev] ++
1,210,059 UART: [ldev] CDI.KEYID = 6
1,210,423 UART: [ldev] SUBJECT.KEYID = 5
1,210,850 UART: [ldev] AUTHORITY.KEYID = 7
1,211,313 UART: [ldev] FE.KEYID = 1
1,216,833 UART: [ldev] Erasing FE.KEYID = 1
1,243,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,553 UART: [ldev] --
1,282,861 UART: [fwproc] Wait for Commands...
1,283,438 UART: [fwproc] Recv command 0x46574c44
1,284,171 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,600 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,328 >>> mbox cmd response: success
2,775,545 UART: [afmc] ++
2,775,713 UART: [afmc] CDI.KEYID = 6
2,776,076 UART: [afmc] SUBJECT.KEYID = 7
2,776,502 UART: [afmc] AUTHORITY.KEYID = 5
2,811,331 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,969 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,720 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,449 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,332 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,051 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,800 UART: [afmc] --
2,854,762 UART: [cold-reset] --
2,855,660 UART: [state] Locking Datavault
2,856,677 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,281 UART: [state] Locking ICCM
2,857,763 UART: [exit] Launching FMC @ 0x40000130
2,863,092 UART:
2,863,108 UART: Running Caliptra FMC ...
2,863,516 UART:
2,863,659 UART: [state] CFI Enabled
2,874,216 UART: [fht] FMC Alias Private Key: 7
2,982,141 UART: [art] Extend RT PCRs Done
2,982,569 UART: [art] Lock RT PCRs Done
2,984,123 UART: [art] Populate DV Done
2,992,130 UART: [fht] FMC Alias Private Key: 7
2,993,112 UART: [art] Derive CDI
2,993,392 UART: [art] Store in in slot 0x4
3,079,065 UART: [art] Derive Key Pair
3,079,425 UART: [art] Store priv key in slot 0x5
3,092,391 UART: [art] Derive Key Pair - Done
3,106,963 UART: [art] Signing Cert with AUTHO
3,107,443 UART: RITY.KEYID = 7
3,122,763 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,528 UART: [art] PUB.X = 288006D9CF33628CC61FDF7ACC09DA3E42F719F7CD3FA63943E6D6B391C166CAB09EEBCA59EFDF29742CF843C7D92562
3,130,310 UART: [art] PUB.Y = 23693367ABAC6BBC989931F3FAA258C441549F5019187C7E769B29ECC5E086B0F7892D7E0086A154FEA0AB516B6A1A9B
3,137,244 UART: [art] SIG.R = 55F9835E70BD801EDC13FA6A2753FE55717C5C77CE2BA247BBD58E52C74ACEE1CECD4E43F9714E4E372351C8DCAEFE16
3,144,036 UART: [art] SIG.S = 79EC763087436F6AB4C3ECD40EAA86D157CD9D03D9B89FDAC87CE133027C90145C0FAE9F96356B2A1D963B983C28DE3C
3,168,235 UART: Caliptra RT
3,168,580 UART: [state] CFI Enabled
3,276,075 UART: [rt] RT listening for mailbox commands...
3,276,745 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,643 UART: [rt]cmd =0x49444352, len=4
3,308,264 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,437 ready_for_fw is high
1,056,437 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,544 >>> mbox cmd response: success
2,685,352 UART:
2,685,368 UART: Running Caliptra FMC ...
2,685,776 UART:
2,685,919 UART: [state] CFI Enabled
2,696,912 UART: [fht] FMC Alias Private Key: 7
2,804,553 UART: [art] Extend RT PCRs Done
2,804,981 UART: [art] Lock RT PCRs Done
2,806,451 UART: [art] Populate DV Done
2,814,688 UART: [fht] FMC Alias Private Key: 7
2,815,778 UART: [art] Derive CDI
2,816,058 UART: [art] Store in in slot 0x4
2,901,777 UART: [art] Derive Key Pair
2,902,137 UART: [art] Store priv key in slot 0x5
2,915,965 UART: [art] Derive Key Pair - Done
2,931,070 UART: [art] Signing Cert with AUTHO
2,931,550 UART: RITY.KEYID = 7
2,947,146 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,911 UART: [art] PUB.X = C6831BE59F693CE00DB2C2DF654FF15DA6E94B06C707B7AF5097A1DA37DA5B8EE42D9E078B76E2A11DCB8EE2C374B467
2,954,689 UART: [art] PUB.Y = 13742312753512E719FC1C867857305D1843293557C6E06C444FE408A80191502294585C2A34875611F76C162A57B3DE
2,961,609 UART: [art] SIG.R = 10B776229698F34415CFA8901B319582D5012519B678943BAD815EAD5D5C67A23DACAAD0C64EE2C90C8FDBCA2AF8A508
2,968,380 UART: [art] SIG.S = 1B9F1B57C0150CB4BE077B9E6A4F0C7F224E575A6DD222648A91B95765CEDB91B964C872EB88E8A24DB159274A7C3E45
2,991,864 UART: Caliptra RT
2,992,209 UART: [state] CFI Enabled
3,100,990 UART: [rt] RT listening for mailbox commands...
3,101,660 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,330 UART: [rt]cmd =0x49444352, len=4
3,132,555 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,211 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,791 UART: [kat] SHA2-256
881,722 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,837 UART: [kat] ++
885,989 UART: [kat] sha1
890,333 UART: [kat] SHA2-256
892,271 UART: [kat] SHA2-384
895,010 UART: [kat] SHA2-512-ACC
896,911 UART: [kat] ECC-384
902,474 UART: [kat] HMAC-384Kdf
907,172 UART: [kat] LMS
1,475,368 UART: [kat] --
1,476,071 UART: [cold-reset] ++
1,476,475 UART: [fht] Storing FHT @ 0x50003400
1,479,188 UART: [idev] ++
1,479,356 UART: [idev] CDI.KEYID = 6
1,479,716 UART: [idev] SUBJECT.KEYID = 7
1,480,140 UART: [idev] UDS.KEYID = 0
1,480,485 ready_for_fw is high
1,480,485 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,930 UART: [idev] Erasing UDS.KEYID = 0
1,504,102 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,636 UART: [idev] --
1,513,765 UART: [ldev] ++
1,513,933 UART: [ldev] CDI.KEYID = 6
1,514,296 UART: [ldev] SUBJECT.KEYID = 5
1,514,722 UART: [ldev] AUTHORITY.KEYID = 7
1,515,185 UART: [ldev] FE.KEYID = 1
1,520,169 UART: [ldev] Erasing FE.KEYID = 1
1,545,188 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,268 UART: [ldev] --
1,584,639 UART: [fwproc] Waiting for Commands...
1,585,472 UART: [fwproc] Received command 0x46574c44
1,586,263 UART: [fwproc] Received Image of size 114332 bytes
2,884,359 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,495 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,847 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,810 >>> mbox cmd response: success
3,076,810 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,078,058 UART: [afmc] ++
3,078,226 UART: [afmc] CDI.KEYID = 6
3,078,588 UART: [afmc] SUBJECT.KEYID = 7
3,079,013 UART: [afmc] AUTHORITY.KEYID = 5
3,114,322 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,630 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,410 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,138 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,023 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,713 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,348 UART: [afmc] --
3,157,436 UART: [cold-reset] --
3,158,382 UART: [state] Locking Datavault
3,159,481 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,085 UART: [state] Locking ICCM
3,160,607 UART: [exit] Launching FMC @ 0x40000130
3,165,936 UART:
3,165,952 UART: Running Caliptra FMC ...
3,166,360 UART:
3,166,414 UART: [state] CFI Enabled
3,176,671 UART: [fht] FMC Alias Private Key: 7
3,284,472 UART: [art] Extend RT PCRs Done
3,284,900 UART: [art] Lock RT PCRs Done
3,286,606 UART: [art] Populate DV Done
3,294,917 UART: [fht] FMC Alias Private Key: 7
3,296,099 UART: [art] Derive CDI
3,296,379 UART: [art] Store in in slot 0x4
3,382,020 UART: [art] Derive Key Pair
3,382,380 UART: [art] Store priv key in slot 0x5
3,395,634 UART: [art] Derive Key Pair - Done
3,410,362 UART: [art] Signing Cert with AUTHO
3,410,842 UART: RITY.KEYID = 7
3,426,292 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,057 UART: [art] PUB.X = 7ABA40B6184CE079E024A5CA79117CDD917A1C44A6E84F1967EDF15EF7375F6C75A60EE12C7E638EF49378C141961C30
3,433,830 UART: [art] PUB.Y = 02E43CD1CCF8488A88367E2EB69601E1D4BFC3DC75E5EC5AA9B5E7D04D85FA03B85E406F58114502D45A54F530EBF868
3,440,780 UART: [art] SIG.R = 2C6436FBB4700CB9B3E2A3A6E736E4A57A7D98AB5A38780263DACD2BF4236A9E19F5B62AD0AFE14A50D943B75FC7D8A0
3,447,562 UART: [art] SIG.S = 48CE20AE7BB9CD6C24222DA7498475D38EF719758EB072D8426BC928C67DBA0F3A1411589866BC0C1FD0A6035B7BE1A7
3,471,240 UART: Caliptra RT
3,471,493 UART: [state] CFI Enabled
3,578,919 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,231 UART: [rt]cmd =0x43415053, len=4
3,610,488 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,575 ready_for_fw is high
1,362,575 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,616 >>> mbox cmd response: success
2,927,616 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,989,250 UART:
2,989,266 UART: Running Caliptra FMC ...
2,989,674 UART:
2,989,728 UART: [state] CFI Enabled
3,000,079 UART: [fht] FMC Alias Private Key: 7
3,108,298 UART: [art] Extend RT PCRs Done
3,108,726 UART: [art] Lock RT PCRs Done
3,110,552 UART: [art] Populate DV Done
3,118,959 UART: [fht] FMC Alias Private Key: 7
3,120,077 UART: [art] Derive CDI
3,120,357 UART: [art] Store in in slot 0x4
3,205,960 UART: [art] Derive Key Pair
3,206,320 UART: [art] Store priv key in slot 0x5
3,219,412 UART: [art] Derive Key Pair - Done
3,234,274 UART: [art] Signing Cert with AUTHO
3,234,754 UART: RITY.KEYID = 7
3,249,824 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,589 UART: [art] PUB.X = B3A38C877EEEC32651F7EB075F8F0578F65BD71A13EDC3E83003EBAA214692D534AD0C1E0169AB08520602D737E3D351
3,257,341 UART: [art] PUB.Y = 2B997BC240FD24901EC69E099FF35115AAB3C0F38AD474ED962DC99428D4C4E7549A8D8FE8EF60B58420DE5D31AD660A
3,264,297 UART: [art] SIG.R = 8C877A939EEB03C30868AD684F7DCCEFC9C5B3FCB40F8E755C3A8FF19A0990A9A19A5CDB7E1AD82F718C26E91F376555
3,271,073 UART: [art] SIG.S = 47A002467FF06CA09F59D0B9E4AF9E35B88B7300EB86E0946A5526629E1C28874A5DB723D4F58EA39E98CA356B721BA3
3,295,363 UART: Caliptra RT
3,295,616 UART: [state] CFI Enabled
3,403,941 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,443 UART: [rt]cmd =0x43415053, len=4
3,435,484 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,789 UART: [state] LifecycleState = Unprovisioned
86,444 UART: [state] DebugLocked = No
87,000 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,708 UART: [kat] SHA2-256
882,639 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,754 UART: [kat] ++
886,906 UART: [kat] sha1
891,092 UART: [kat] SHA2-256
893,030 UART: [kat] SHA2-384
895,765 UART: [kat] SHA2-512-ACC
897,666 UART: [kat] ECC-384
903,101 UART: [kat] HMAC-384Kdf
907,771 UART: [kat] LMS
1,475,967 UART: [kat] --
1,476,588 UART: [cold-reset] ++
1,477,046 UART: [fht] Storing FHT @ 0x50003400
1,479,661 UART: [idev] ++
1,479,829 UART: [idev] CDI.KEYID = 6
1,480,189 UART: [idev] SUBJECT.KEYID = 7
1,480,613 UART: [idev] UDS.KEYID = 0
1,480,958 ready_for_fw is high
1,480,958 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,711 UART: [idev] Erasing UDS.KEYID = 0
1,505,535 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,175 UART: [idev] --
1,515,246 UART: [ldev] ++
1,515,414 UART: [ldev] CDI.KEYID = 6
1,515,777 UART: [ldev] SUBJECT.KEYID = 5
1,516,203 UART: [ldev] AUTHORITY.KEYID = 7
1,516,666 UART: [ldev] FE.KEYID = 1
1,521,816 UART: [ldev] Erasing FE.KEYID = 1
1,547,363 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,479 UART: [ldev] --
1,586,754 UART: [fwproc] Waiting for Commands...
1,587,597 UART: [fwproc] Received command 0x46574c44
1,588,388 UART: [fwproc] Received Image of size 114332 bytes
2,886,714 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,284 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,636 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,437 >>> mbox cmd response: success
3,079,437 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,080,513 UART: [afmc] ++
3,080,681 UART: [afmc] CDI.KEYID = 6
3,081,043 UART: [afmc] SUBJECT.KEYID = 7
3,081,468 UART: [afmc] AUTHORITY.KEYID = 5
3,116,897 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,747 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,527 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,255 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,140 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,830 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,807 UART: [afmc] --
3,160,791 UART: [cold-reset] --
3,161,857 UART: [state] Locking Datavault
3,163,036 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,640 UART: [state] Locking ICCM
3,164,090 UART: [exit] Launching FMC @ 0x40000130
3,169,419 UART:
3,169,435 UART: Running Caliptra FMC ...
3,169,843 UART:
3,169,986 UART: [state] CFI Enabled
3,180,721 UART: [fht] FMC Alias Private Key: 7
3,289,246 UART: [art] Extend RT PCRs Done
3,289,674 UART: [art] Lock RT PCRs Done
3,291,346 UART: [art] Populate DV Done
3,299,367 UART: [fht] FMC Alias Private Key: 7
3,300,407 UART: [art] Derive CDI
3,300,687 UART: [art] Store in in slot 0x4
3,386,592 UART: [art] Derive Key Pair
3,386,952 UART: [art] Store priv key in slot 0x5
3,400,508 UART: [art] Derive Key Pair - Done
3,415,115 UART: [art] Signing Cert with AUTHO
3,415,595 UART: RITY.KEYID = 7
3,430,999 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,764 UART: [art] PUB.X = 1473AA9C7BEE16F026BAEB840B618DCCA4DF41E2EEF6817A0465E09DCE873F0409E97C3063C3D91925F2EE8A4A433437
3,438,534 UART: [art] PUB.Y = 833C4EBB27239584A009538B035D744C047B36264982163DA8FC5D07FA4ABD68BC2503282B7FF0202F2ACA069D9AE3C7
3,445,468 UART: [art] SIG.R = D08539F74F9916E0E3ECA60E03BC4F08955DABC220DC6E6B06DFD0F293E40187952DA1EBADC775D4372CC4CC2D8D3A38
3,452,241 UART: [art] SIG.S = C7511B0A27FC0984F08AEEDFA68D8CC9168755C5E3985AE7FF5465326BD82E9D9FCEECA99F493FBFAD16AB35B355FF26
3,475,912 UART: Caliptra RT
3,476,257 UART: [state] CFI Enabled
3,583,965 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,447 UART: [rt]cmd =0x43415053, len=4
3,615,674 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,652 ready_for_fw is high
1,362,652 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,523 >>> mbox cmd response: success
2,927,523 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,989,503 UART:
2,989,519 UART: Running Caliptra FMC ...
2,989,927 UART:
2,990,070 UART: [state] CFI Enabled
3,000,605 UART: [fht] FMC Alias Private Key: 7
3,108,704 UART: [art] Extend RT PCRs Done
3,109,132 UART: [art] Lock RT PCRs Done
3,110,372 UART: [art] Populate DV Done
3,118,281 UART: [fht] FMC Alias Private Key: 7
3,119,269 UART: [art] Derive CDI
3,119,549 UART: [art] Store in in slot 0x4
3,205,112 UART: [art] Derive Key Pair
3,205,472 UART: [art] Store priv key in slot 0x5
3,218,956 UART: [art] Derive Key Pair - Done
3,233,951 UART: [art] Signing Cert with AUTHO
3,234,431 UART: RITY.KEYID = 7
3,249,617 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,382 UART: [art] PUB.X = CAD94A1644BBDF72DEBC35707227E63714FB23D74B8219F412F40C56A5EE3E720A5BCAE5E2FF686A0844AA3FEBC0E197
3,257,161 UART: [art] PUB.Y = BF7FEE06498E952B4771910190FAF7C4500777D047981847006948C1F9B1A886040583B3BA790CA8683A4B799D68E273
3,264,059 UART: [art] SIG.R = 9A62AF68569BADDE1FDB7FE3CD2380CF019355CB2712EA8AD146663B1AB9C311C8C47F5A5254DB71DD7585E5DC1ED7E1
3,270,846 UART: [art] SIG.S = 2C14D115AA6BC5B706AA2AC71E12A8ED2FEAE65A4970341D18AC4307E9F7067A02065F5DD1BAFEF7851AA84E6A009E75
3,294,094 UART: Caliptra RT
3,294,439 UART: [state] CFI Enabled
3,403,648 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,256 UART: [rt]cmd =0x43415053, len=4
3,435,629 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,143 UART: [state] WD Timer not started. Device not locked for debugging
87,264 UART: [kat] SHA2-256
892,914 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,039 UART: [kat] ++
897,191 UART: [kat] sha1
901,581 UART: [kat] SHA2-256
903,521 UART: [kat] SHA2-384
906,224 UART: [kat] SHA2-512-ACC
908,125 UART: [kat] ECC-384
917,916 UART: [kat] HMAC-384Kdf
922,412 UART: [kat] LMS
1,170,740 UART: [kat] --
1,171,699 UART: [cold-reset] ++
1,172,151 UART: [fht] FHT @ 0x50003400
1,174,748 UART: [idev] ++
1,174,916 UART: [idev] CDI.KEYID = 6
1,175,276 UART: [idev] SUBJECT.KEYID = 7
1,175,700 UART: [idev] UDS.KEYID = 0
1,176,045 ready_for_fw is high
1,176,045 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,742 UART: [idev] Erasing UDS.KEYID = 0
1,200,329 UART: [idev] Sha1 KeyId Algorithm
1,208,815 UART: [idev] --
1,209,883 UART: [ldev] ++
1,210,051 UART: [ldev] CDI.KEYID = 6
1,210,414 UART: [ldev] SUBJECT.KEYID = 5
1,210,840 UART: [ldev] AUTHORITY.KEYID = 7
1,211,303 UART: [ldev] FE.KEYID = 1
1,216,405 UART: [ldev] Erasing FE.KEYID = 1
1,243,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,777 UART: [ldev] --
1,282,086 UART: [fwproc] Wait for Commands...
1,282,874 UART: [fwproc] Recv command 0x46574c44
1,283,602 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,250 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,554 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,469 >>> mbox cmd response: success
2,773,469 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,774,579 UART: [afmc] ++
2,774,747 UART: [afmc] CDI.KEYID = 6
2,775,109 UART: [afmc] SUBJECT.KEYID = 7
2,775,534 UART: [afmc] AUTHORITY.KEYID = 5
2,811,235 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,782 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,530 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,258 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,143 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,862 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,772 UART: [afmc] --
2,854,780 UART: [cold-reset] --
2,855,810 UART: [state] Locking Datavault
2,856,759 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,363 UART: [state] Locking ICCM
2,857,859 UART: [exit] Launching FMC @ 0x40000130
2,863,188 UART:
2,863,204 UART: Running Caliptra FMC ...
2,863,612 UART:
2,863,666 UART: [state] CFI Enabled
2,873,755 UART: [fht] FMC Alias Private Key: 7
2,981,490 UART: [art] Extend RT PCRs Done
2,981,918 UART: [art] Lock RT PCRs Done
2,983,524 UART: [art] Populate DV Done
2,991,683 UART: [fht] FMC Alias Private Key: 7
2,992,851 UART: [art] Derive CDI
2,993,131 UART: [art] Store in in slot 0x4
3,078,636 UART: [art] Derive Key Pair
3,078,996 UART: [art] Store priv key in slot 0x5
3,091,736 UART: [art] Derive Key Pair - Done
3,106,606 UART: [art] Signing Cert with AUTHO
3,107,086 UART: RITY.KEYID = 7
3,122,434 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,199 UART: [art] PUB.X = EB9A8152A67E5A61F9D78C17E9A5FFDB2E4E12C17548EA66E9EB40C2332A1CB2FDB2586BA32C9F241DBC94096FB2CD43
3,129,986 UART: [art] PUB.Y = 60F2A981F8D8070C92B4E7F27EC33493BE5BBDD7B5A15098ACBB29ADEEC15A2F1EE83976868656EA7D66D20A749BAFCC
3,136,947 UART: [art] SIG.R = 120F74812B4624D30AA6490744F1FA32E2F01C315D4A3678EBCB5FA98201D418BE7BBEAAC8DD8943C305E26D239DA25E
3,143,712 UART: [art] SIG.S = D82A2FB38387D09ED597B86F3ECDEA98097F9604FFAB5E6877AF7763BEA2F29445A7152D2F4F03DE682AA1FA855C4FB1
3,167,338 UART: Caliptra RT
3,167,591 UART: [state] CFI Enabled
3,274,732 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,108 UART: [rt]cmd =0x43415053, len=4
3,306,375 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,291 ready_for_fw is high
1,060,291 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,984 >>> mbox cmd response: success
2,627,984 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,689,574 UART:
2,689,590 UART: Running Caliptra FMC ...
2,689,998 UART:
2,690,052 UART: [state] CFI Enabled
2,700,315 UART: [fht] FMC Alias Private Key: 7
2,808,334 UART: [art] Extend RT PCRs Done
2,808,762 UART: [art] Lock RT PCRs Done
2,810,246 UART: [art] Populate DV Done
2,818,403 UART: [fht] FMC Alias Private Key: 7
2,819,527 UART: [art] Derive CDI
2,819,807 UART: [art] Store in in slot 0x4
2,905,062 UART: [art] Derive Key Pair
2,905,422 UART: [art] Store priv key in slot 0x5
2,918,684 UART: [art] Derive Key Pair - Done
2,933,236 UART: [art] Signing Cert with AUTHO
2,933,716 UART: RITY.KEYID = 7
2,948,960 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,725 UART: [art] PUB.X = A80D72B00163DFA763A6832D40E8B4DDE1A10B1F7478A73D8F8BF313A17971F135258663B983E39E126546C8628F7EAF
2,956,486 UART: [art] PUB.Y = DE3907B68914083DFD27C6A0FE8EA5AD30700977E4394DAA822D52F6E37526C19A18AE2E145AB6349BD8B648C02ABA4C
2,963,437 UART: [art] SIG.R = E6756735DF4E78CD3A56C43C1E8E492F72AF17A0480829D104D99025435DAC687485E5DEA4ABE6196135866AF9544F67
2,970,199 UART: [art] SIG.S = 37FEF87D77A1F12C92C2D28514DD1C332E409AED7C7D13A8CA26FCF2BCAADC7B4B5A8906C824B9EF0C69ABBB3F58C786
2,993,904 UART: Caliptra RT
2,994,157 UART: [state] CFI Enabled
3,102,152 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,416 UART: [rt]cmd =0x43415053, len=4
3,133,593 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,966 UART: [state] WD Timer not started. Device not locked for debugging
88,295 UART: [kat] SHA2-256
893,945 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,070 UART: [kat] ++
898,222 UART: [kat] sha1
902,344 UART: [kat] SHA2-256
904,284 UART: [kat] SHA2-384
907,103 UART: [kat] SHA2-512-ACC
909,004 UART: [kat] ECC-384
918,791 UART: [kat] HMAC-384Kdf
923,537 UART: [kat] LMS
1,171,865 UART: [kat] --
1,172,376 UART: [cold-reset] ++
1,172,860 UART: [fht] FHT @ 0x50003400
1,175,581 UART: [idev] ++
1,175,749 UART: [idev] CDI.KEYID = 6
1,176,109 UART: [idev] SUBJECT.KEYID = 7
1,176,533 UART: [idev] UDS.KEYID = 0
1,176,878 ready_for_fw is high
1,176,878 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,497 UART: [idev] Erasing UDS.KEYID = 0
1,201,610 UART: [idev] Sha1 KeyId Algorithm
1,210,036 UART: [idev] --
1,211,222 UART: [ldev] ++
1,211,390 UART: [ldev] CDI.KEYID = 6
1,211,753 UART: [ldev] SUBJECT.KEYID = 5
1,212,179 UART: [ldev] AUTHORITY.KEYID = 7
1,212,642 UART: [ldev] FE.KEYID = 1
1,217,770 UART: [ldev] Erasing FE.KEYID = 1
1,243,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,628 UART: [ldev] --
1,283,033 UART: [fwproc] Wait for Commands...
1,283,745 UART: [fwproc] Recv command 0x46574c44
1,284,473 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,145 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,449 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,274 >>> mbox cmd response: success
2,774,274 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,775,282 UART: [afmc] ++
2,775,450 UART: [afmc] CDI.KEYID = 6
2,775,812 UART: [afmc] SUBJECT.KEYID = 7
2,776,237 UART: [afmc] AUTHORITY.KEYID = 5
2,811,462 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,639 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,367 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,252 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,971 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,739 UART: [afmc] --
2,854,811 UART: [cold-reset] --
2,855,375 UART: [state] Locking Datavault
2,856,330 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,934 UART: [state] Locking ICCM
2,857,540 UART: [exit] Launching FMC @ 0x40000130
2,862,869 UART:
2,862,885 UART: Running Caliptra FMC ...
2,863,293 UART:
2,863,436 UART: [state] CFI Enabled
2,873,953 UART: [fht] FMC Alias Private Key: 7
2,981,704 UART: [art] Extend RT PCRs Done
2,982,132 UART: [art] Lock RT PCRs Done
2,983,912 UART: [art] Populate DV Done
2,992,249 UART: [fht] FMC Alias Private Key: 7
2,993,233 UART: [art] Derive CDI
2,993,513 UART: [art] Store in in slot 0x4
3,079,188 UART: [art] Derive Key Pair
3,079,548 UART: [art] Store priv key in slot 0x5
3,093,394 UART: [art] Derive Key Pair - Done
3,108,294 UART: [art] Signing Cert with AUTHO
3,108,774 UART: RITY.KEYID = 7
3,124,468 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,233 UART: [art] PUB.X = 4117F5E28D5BECC60BF54BAABE0D94F1CE3D1B195927F0936B87439B8330EB0E754F4062088C632EA53584949CE36AD5
3,131,997 UART: [art] PUB.Y = 261C8F97C5C99D66E01416C68C49AB3F5247037CB4631D72ED4A12D55DFA56DF48403E6553A2B9D7CB08DA4AFDAAA73A
3,138,955 UART: [art] SIG.R = 907B8CA2CEC92E43E1AFB0DEBE51E5624068FFA033C7258CB4AD73F92E5C0B31024AA72805561E8F490BCF8D4EC3D34C
3,145,731 UART: [art] SIG.S = A4817EB10C19BB393452632919A8F40B935EF360FEAE106574C0779FD56A55D942B5C2CA8C660B8E55C13D6E527EFF45
3,169,509 UART: Caliptra RT
3,169,854 UART: [state] CFI Enabled
3,277,556 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,928 UART: [rt]cmd =0x43415053, len=4
3,309,157 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,564 ready_for_fw is high
1,060,564 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,595 >>> mbox cmd response: success
2,627,595 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,690,721 UART:
2,690,737 UART: Running Caliptra FMC ...
2,691,145 UART:
2,691,288 UART: [state] CFI Enabled
2,702,207 UART: [fht] FMC Alias Private Key: 7
2,810,334 UART: [art] Extend RT PCRs Done
2,810,762 UART: [art] Lock RT PCRs Done
2,812,450 UART: [art] Populate DV Done
2,820,841 UART: [fht] FMC Alias Private Key: 7
2,821,961 UART: [art] Derive CDI
2,822,241 UART: [art] Store in in slot 0x4
2,907,716 UART: [art] Derive Key Pair
2,908,076 UART: [art] Store priv key in slot 0x5
2,920,886 UART: [art] Derive Key Pair - Done
2,936,088 UART: [art] Signing Cert with AUTHO
2,936,568 UART: RITY.KEYID = 7
2,952,198 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,963 UART: [art] PUB.X = 9F6D57DB49FB70B50F78B1F0095548E85C1E0E14B48A624218FBE03631A91BE319E0D21837532D14B209361942DF1375
2,959,715 UART: [art] PUB.Y = 20904EBC4B56B269086EAF7C26C0FC1344D3646AF8588D962B78BCDDADAD26B72AB32A404C43BFB7E2E6D04FECC90687
2,966,677 UART: [art] SIG.R = 82AB34DB43B4523E750D10AE5EC09BF9D1D19E55253F42165F2800DC744392D22635ED4939443ADA729B265E561ADAFA
2,973,426 UART: [art] SIG.S = 9CC9AF29C616BBE3492A7FE4E39F9C572DB5AAE6DB68B7283E0FA52399AB3280C7F934CBD87568C0F809AEAA30121D53
2,997,377 UART: Caliptra RT
2,997,722 UART: [state] CFI Enabled
3,105,752 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,272 UART: [rt]cmd =0x43415053, len=4
3,137,511 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,135 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,159 UART: [kat] ++
895,311 UART: [kat] sha1
899,595 UART: [kat] SHA2-256
901,535 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
915,768 UART: [kat] HMAC-384Kdf
920,294 UART: [kat] LMS
1,168,606 UART: [kat] --
1,169,335 UART: [cold-reset] ++
1,169,775 UART: [fht] FHT @ 0x50003400
1,172,513 UART: [idev] ++
1,172,681 UART: [idev] CDI.KEYID = 6
1,173,042 UART: [idev] SUBJECT.KEYID = 7
1,173,467 UART: [idev] UDS.KEYID = 0
1,173,813 ready_for_fw is high
1,173,813 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,479 UART: [idev] Erasing UDS.KEYID = 0
1,198,653 UART: [idev] Sha1 KeyId Algorithm
1,207,665 UART: [idev] --
1,208,590 UART: [ldev] ++
1,208,758 UART: [ldev] CDI.KEYID = 6
1,209,122 UART: [ldev] SUBJECT.KEYID = 5
1,209,549 UART: [ldev] AUTHORITY.KEYID = 7
1,210,012 UART: [ldev] FE.KEYID = 1
1,215,248 UART: [ldev] Erasing FE.KEYID = 1
1,241,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,906 UART: [ldev] --
1,280,332 UART: [fwproc] Wait for Commands...
1,280,933 UART: [fwproc] Recv command 0x46574c44
1,281,666 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,778 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,087 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,823 >>> mbox cmd response: success
2,771,823 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,773,008 UART: [afmc] ++
2,773,176 UART: [afmc] CDI.KEYID = 6
2,773,539 UART: [afmc] SUBJECT.KEYID = 7
2,773,965 UART: [afmc] AUTHORITY.KEYID = 5
2,809,410 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,759 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,488 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,371 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,090 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,019 UART: [afmc] --
2,853,023 UART: [cold-reset] --
2,853,835 UART: [state] Locking Datavault
2,854,704 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,308 UART: [state] Locking ICCM
2,855,852 UART: [exit] Launching FMC @ 0x40000130
2,861,181 UART:
2,861,197 UART: Running Caliptra FMC ...
2,861,605 UART:
2,861,659 UART: [state] CFI Enabled
2,872,010 UART: [fht] FMC Alias Private Key: 7
2,979,551 UART: [art] Extend RT PCRs Done
2,979,979 UART: [art] Lock RT PCRs Done
2,981,613 UART: [art] Populate DV Done
2,989,716 UART: [fht] FMC Alias Private Key: 7
2,990,890 UART: [art] Derive CDI
2,991,170 UART: [art] Store in in slot 0x4
3,076,499 UART: [art] Derive Key Pair
3,076,859 UART: [art] Store priv key in slot 0x5
3,089,835 UART: [art] Derive Key Pair - Done
3,104,624 UART: [art] Signing Cert with AUTHO
3,105,104 UART: RITY.KEYID = 7
3,119,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,755 UART: [art] PUB.X = 6A4A323CA883D1F932F443425804FCEBEFD94EF1D3DDA15B4660414E3654C0BECA76AD59B438CF67E1DF14FA825C5A69
3,127,538 UART: [art] PUB.Y = 8C7CFCED036ED2DDCC82C06BF78A0C36FF2900DD4AB973C1CDDA096F86911BF8D226046D3704A29EB0C9336F39837D68
3,134,467 UART: [art] SIG.R = 1C129E612F6AC8BADFD43DE959ECF18D2C489DD0DB188EFDACCCB52ADE28B470C214C1A505AFE41ABF02817F26AE7CFB
3,141,265 UART: [art] SIG.S = A593FA370FD3791EA9EC3ADE04783924D8ECDD0CFD99850171A425CBE54C46BE98842B4A3E16E829B892DE51AFB8705F
3,164,962 UART: Caliptra RT
3,165,215 UART: [state] CFI Enabled
3,273,668 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,182 UART: [rt]cmd =0x43415053, len=4
3,305,537 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,320 ready_for_fw is high
1,055,320 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,249 >>> mbox cmd response: success
2,621,249 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,683,339 UART:
2,683,355 UART: Running Caliptra FMC ...
2,683,763 UART:
2,683,817 UART: [state] CFI Enabled
2,693,832 UART: [fht] FMC Alias Private Key: 7
2,801,353 UART: [art] Extend RT PCRs Done
2,801,781 UART: [art] Lock RT PCRs Done
2,803,385 UART: [art] Populate DV Done
2,811,370 UART: [fht] FMC Alias Private Key: 7
2,812,454 UART: [art] Derive CDI
2,812,734 UART: [art] Store in in slot 0x4
2,898,473 UART: [art] Derive Key Pair
2,898,833 UART: [art] Store priv key in slot 0x5
2,911,897 UART: [art] Derive Key Pair - Done
2,926,929 UART: [art] Signing Cert with AUTHO
2,927,409 UART: RITY.KEYID = 7
2,942,497 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,262 UART: [art] PUB.X = 201C52CCA28AB23F2120092966E1097718D0F768FA6638816E534A54F20143B52230D94A15BF31C4EBDB1A5D8F98744F
2,950,019 UART: [art] PUB.Y = 4C242C31EE0B4648BC8B07E36E38FB91863B1273496B14C17F6DF87F89ED42C7EAE40A2CF90F645E6B31902A2FD865CE
2,956,967 UART: [art] SIG.R = 0E612F4B8C8CEB399EA39418A139A1EC5310082E8BA80C1B1A47A7514BF591F4C3FEC622DCCF9427ABEE375FBD569972
2,963,742 UART: [art] SIG.S = 60EC5FCF2CC17E64E3A1BAF6299B6A81DA117913C5E101DAF6923443F662CE26A87FC27AA478FAA3799EF51BB878DD2A
2,987,534 UART: Caliptra RT
2,987,787 UART: [state] CFI Enabled
3,096,058 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,450 UART: [rt]cmd =0x43415053, len=4
3,127,729 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
87,046 UART: [state] WD Timer not started. Device not locked for debugging
88,363 UART: [kat] SHA2-256
891,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,042 UART: [kat] ++
896,194 UART: [kat] sha1
900,248 UART: [kat] SHA2-256
902,188 UART: [kat] SHA2-384
904,929 UART: [kat] SHA2-512-ACC
906,830 UART: [kat] ECC-384
916,805 UART: [kat] HMAC-384Kdf
921,537 UART: [kat] LMS
1,169,849 UART: [kat] --
1,170,768 UART: [cold-reset] ++
1,171,150 UART: [fht] FHT @ 0x50003400
1,173,816 UART: [idev] ++
1,173,984 UART: [idev] CDI.KEYID = 6
1,174,345 UART: [idev] SUBJECT.KEYID = 7
1,174,770 UART: [idev] UDS.KEYID = 0
1,175,116 ready_for_fw is high
1,175,116 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,770 UART: [idev] Erasing UDS.KEYID = 0
1,199,382 UART: [idev] Sha1 KeyId Algorithm
1,208,138 UART: [idev] --
1,209,321 UART: [ldev] ++
1,209,489 UART: [ldev] CDI.KEYID = 6
1,209,853 UART: [ldev] SUBJECT.KEYID = 5
1,210,280 UART: [ldev] AUTHORITY.KEYID = 7
1,210,743 UART: [ldev] FE.KEYID = 1
1,216,379 UART: [ldev] Erasing FE.KEYID = 1
1,242,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,533 UART: [ldev] --
1,281,959 UART: [fwproc] Wait for Commands...
1,282,660 UART: [fwproc] Recv command 0x46574c44
1,283,393 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,939 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,248 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,104 >>> mbox cmd response: success
2,774,104 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,775,175 UART: [afmc] ++
2,775,343 UART: [afmc] CDI.KEYID = 6
2,775,706 UART: [afmc] SUBJECT.KEYID = 7
2,776,132 UART: [afmc] AUTHORITY.KEYID = 5
2,811,353 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,385 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,136 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,865 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,748 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,467 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,274 UART: [afmc] --
2,854,386 UART: [cold-reset] --
2,855,022 UART: [state] Locking Datavault
2,855,983 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,587 UART: [state] Locking ICCM
2,857,091 UART: [exit] Launching FMC @ 0x40000130
2,862,420 UART:
2,862,436 UART: Running Caliptra FMC ...
2,862,844 UART:
2,862,987 UART: [state] CFI Enabled
2,873,652 UART: [fht] FMC Alias Private Key: 7
2,982,211 UART: [art] Extend RT PCRs Done
2,982,639 UART: [art] Lock RT PCRs Done
2,984,129 UART: [art] Populate DV Done
2,992,504 UART: [fht] FMC Alias Private Key: 7
2,993,438 UART: [art] Derive CDI
2,993,718 UART: [art] Store in in slot 0x4
3,079,505 UART: [art] Derive Key Pair
3,079,865 UART: [art] Store priv key in slot 0x5
3,093,241 UART: [art] Derive Key Pair - Done
3,108,210 UART: [art] Signing Cert with AUTHO
3,108,690 UART: RITY.KEYID = 7
3,124,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,973 UART: [art] PUB.X = A3AB63CB762B03D82FE96B350C0FBE7D5D332F62F78123B5CA08B6D003268978878025A392E9DF7B0BAB03540809FA46
3,131,720 UART: [art] PUB.Y = B5FA6228867CF49F6EE7E1FBB4ED3EADEEB32327113284A5A20DA14FC1E24D3E5D218040B374C5E10A2735B835646DCC
3,138,678 UART: [art] SIG.R = D7C72E8E723E2185968951FAE66854820324DC915FE20E78EAD467C7B670E63461DE931C1E00317E0315DD81878B0509
3,145,403 UART: [art] SIG.S = AEC18E153D5E12CEC2F6045CF9EE8D170195AE4FEF102328DAF3152218F36D9FC7E294AB47204B06D8CDBF2C48047B60
3,168,896 UART: Caliptra RT
3,169,241 UART: [state] CFI Enabled
3,275,627 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,117 UART: [rt]cmd =0x43415053, len=4
3,307,342 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,929 ready_for_fw is high
1,056,929 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,754 >>> mbox cmd response: success
2,623,754 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,686,264 UART:
2,686,280 UART: Running Caliptra FMC ...
2,686,688 UART:
2,686,831 UART: [state] CFI Enabled
2,697,642 UART: [fht] FMC Alias Private Key: 7
2,805,671 UART: [art] Extend RT PCRs Done
2,806,099 UART: [art] Lock RT PCRs Done
2,807,749 UART: [art] Populate DV Done
2,816,098 UART: [fht] FMC Alias Private Key: 7
2,817,058 UART: [art] Derive CDI
2,817,338 UART: [art] Store in in slot 0x4
2,903,185 UART: [art] Derive Key Pair
2,903,545 UART: [art] Store priv key in slot 0x5
2,916,781 UART: [art] Derive Key Pair - Done
2,931,973 UART: [art] Signing Cert with AUTHO
2,932,453 UART: RITY.KEYID = 7
2,947,335 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,100 UART: [art] PUB.X = 13ACDFD39A72EDF6505192B59BF12CD78C25BA9A582A55E2AEF208F6DC3B29A8CC66FB807228D25102BCB8653D56A8EA
2,954,882 UART: [art] PUB.Y = 8A09DC0B7726619BA099AC42F8E62190DC564180ADF1B9A128E3FEB7F484F8B0FA06091757958D0501E2C296AA66D8A4
2,961,818 UART: [art] SIG.R = 71AA35A940B5056425FCAAACC92F5E991AD4FEF7435016F783E26CFB44D6967965B4C0A380116A385A153DD1851C8C83
2,968,589 UART: [art] SIG.S = D70A7DF97189215ABFAD5F12DCC5C210906BCECE748451E7A8AF4E9F2A43A2331B2108BD47FDB4941316C3C8C646DB32
2,992,978 UART: Caliptra RT
2,993,323 UART: [state] CFI Enabled
3,100,990 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,636 UART: [rt]cmd =0x43415053, len=4
3,132,811 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
Truncated 2120 bytes from beginning
,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,316 UART: [ldev] --
1,584,595 UART: [fwproc] Waiting for Commands...
1,585,332 UART: [fwproc] Received command 0x46574c44
1,586,123 UART: [fwproc] Received Image of size 114332 bytes
2,884,378 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,976 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,328 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,119 >>> mbox cmd response: success
3,077,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,078,175 UART: [afmc] ++
3,078,343 UART: [afmc] CDI.KEYID = 6
3,078,705 UART: [afmc] SUBJECT.KEYID = 7
3,079,130 UART: [afmc] AUTHORITY.KEYID = 5
3,114,170 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,628 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,408 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
3,137,100 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
3,142,973 UART: [afmc] SIG.R = 8F0A6885272083A6E8E8B8B95CD9E8F58F40896BA19AC0C6F7B194F4AEFDD2164CF5C4AB04A9FB1E996A4FAB4830A260
3,148,687 UART: [afmc] SIG.S = 60CE1CF9B19E3C4AC1AC951A7ABB78ECED5C30414CE58401BDA2F4C1F7C3BA9F88BA7370001A855F932D7F374DB30C1E
3,156,414 UART: [afmc] --
3,157,318 UART: [cold-reset] --
3,158,372 UART: [state] Locking Datavault
3,159,223 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,827 UART: [state] Locking ICCM
3,160,491 UART: [exit] Launching FMC @ 0x40000130
3,165,820 UART:
3,165,836 UART: Running Caliptra FMC ...
3,166,244 UART:
3,166,298 UART: [state] CFI Enabled
3,176,726 UART: [fht] FMC Alias Private Key: 7
3,285,225 UART: [art] Extend RT PCRs Done
3,285,653 UART: [art] Lock RT PCRs Done
3,287,001 UART: [art] Populate DV Done
3,295,231 UART: [fht] FMC Alias Private Key: 7
3,296,287 UART: [art] Derive CDI
3,296,567 UART: [art] Store in in slot 0x4
3,381,854 UART: [art] Derive Key Pair
3,382,214 UART: [art] Store priv key in slot 0x5
3,395,346 UART: [art] Derive Key Pair - Done
3,409,932 UART: [art] Signing Cert with AUTHO
3,410,412 UART: RITY.KEYID = 7
3,425,358 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,123 UART: [art] PUB.X = F761198522D89F63F124022C6554E367ABE6DB931AB3B634025E58FFEA4813F813D9E4394E4CB565DCF10986238686B8
3,432,880 UART: [art] PUB.Y = 619AE60E7DD6FD5EDB29D5141D8BA310A8063195A2F291E8BB931150B3E65B9FD121A542F3274EB35020CA8F04E30DAC
3,439,828 UART: [art] SIG.R = 9263B61F24F82A1789761BEA4C5C7E7A4BE98AF26FB31FC5C7328F31E15EC484F6B6E94628737E0AE1CA92D1F268427B
3,446,603 UART: [art] SIG.S = CEC043BF23CBF5976D6A403FA346FA2B56DCE9F3CED0DB703B4CBA27BAFCFBF5E88FFFBB0782BD38B26DF0E49227E04D
3,469,693 UART: Caliptra RT
3,469,946 UART: [state] CFI Enabled
3,577,494 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,812 UART: [rt]cmd =0x494e464f, len=4
3,611,333 >>> mbox cmd response data (312 bytes)
3,611,334 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,172 UART:
3,612,188 UART: Running Caliptra ROM ...
3,612,596 UART:
3,612,650 UART: [state] CFI Enabled
3,615,514 UART: [state] LifecycleState = Unprovisioned
3,616,169 UART: [state] DebugLocked = No
3,616,819 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,618,372 UART: [kat] SHA2-256
4,412,303 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,416,418 UART: [kat] ++
4,416,570 UART: [kat] sha1
4,420,772 UART: [kat] SHA2-256
4,422,710 UART: [kat] SHA2-384
4,425,395 UART: [kat] SHA2-512-ACC
4,427,295 UART: [kat] ECC-384
4,432,862 UART: [kat] HMAC-384Kdf
4,437,376 UART: [kat] LMS
5,005,572 UART: [kat] --
5,006,483 UART: [update-reset] ++
6,341,184 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,342,366 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,492,242 >>> mbox cmd response: success
6,492,567 UART: [update-reset] Copying MAN_2 To MAN_1
6,500,581 UART: [update-reset Success] --
6,501,594 UART: [state] Locking Datavault
6,502,178 UART: [state] Locking PCR0, PCR1 and PCR31
6,502,782 UART: [state] Locking ICCM
6,503,424 UART: [exit] Launching FMC @ 0x40000130
6,508,753 UART:
6,508,769 UART: Running Caliptra FMC ...
6,509,177 UART:
6,509,231 UART: [state] CFI Enabled
6,598,538 UART: [art] Extend RT PCRs Done
6,598,966 UART: [art] Lock RT PCRs Done
6,600,227 UART: [art] Populate DV Done
6,608,469 UART: [fht] FMC Alias Private Key: 7
6,609,425 UART: [art] Derive CDI
6,609,705 UART: [art] Store in in slot 0x4
6,695,138 UART: [art] Derive Key Pair
6,695,498 UART: [art] Store priv key in slot 0x5
6,708,684 UART: [art] Derive Key Pair - Done
6,723,171 UART: [art] Signing Cert with AUTHO
6,723,651 UART: RITY.KEYID = 7
6,738,565 UART: [art] Erasing AUTHORITY.KEYID = 7
6,739,330 UART: [art] PUB.X = 26A94B93F10DD057C9E83357B56B9675C296FCA5F54B0085F87CA12A1FE9A9794FAC4D205171731E2D29F4B6EF77E894
6,746,079 UART: [art] PUB.Y = 51026838C6389D1D0B5E3289390D7834895B1E47628F0A7E59464233D17039275770BFB1E51D54DE6E1E405B736F01E7
6,753,000 UART: [art] SIG.R = A83BFF9D61FDB6B0567CD3898F71523231022D061E9E5853DBD7B6CD7070BFEB72C330E5FD10596078503BD63C1E6E14
6,759,770 UART: [art] SIG.S = DDE98E4DE8BB6EF34C33F70D561786BC376BCAB51906353FB30132B8929C09D8FF5FE0C287556017C5AD0A198787EEB4
6,783,610 UART: Caliptra RT
6,783,863 UART: [state] CFI Enabled
7,063,555 UART: [rt] RT listening for mailbox commands...
7,064,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,093,834 UART: [rt]cmd =0x494e464f, len=4
7,097,513 >>> mbox cmd response data (312 bytes)
7,097,514 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,098,336 UART:
7,098,352 UART: Running Caliptra ROM ...
7,098,760 UART:
7,098,814 UART: [state] CFI Enabled
7,102,042 UART: [state] LifecycleState = Unprovisioned
7,102,697 UART: [state] DebugLocked = No
7,103,249 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,104,892 UART: [kat] SHA2-256
7,898,823 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,902,938 UART: [kat] ++
7,903,090 UART: [kat] sha1
7,907,340 UART: [kat] SHA2-256
7,909,278 UART: [kat] SHA2-384
7,911,981 UART: [kat] SHA2-512-ACC
7,913,881 UART: [kat] ECC-384
7,919,438 UART: [kat] HMAC-384Kdf
7,923,998 UART: [kat] LMS
8,492,194 UART: [kat] --
8,493,081 UART: [update-reset] ++
9,827,432 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,828,626 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
9,978,502 >>> mbox cmd response: success
9,978,645 UART: [update-reset] Copying MAN_2 To MAN_1
9,986,659 UART: [update-reset Success] --
9,987,446 UART: [state] Locking Datavault
9,988,284 UART: [state] Locking PCR0, PCR1 and PCR31
9,988,888 UART: [state] Locking ICCM
9,989,444 UART: [exit] Launching FMC @ 0x40000130
9,994,773 UART:
9,994,789 UART: Running Caliptra FMC ...
9,995,197 UART:
9,995,251 UART: [state] CFI Enabled
10,084,514 UART: [art] Extend RT PCRs Done
10,084,942 UART: [art] Lock RT PCRs Done
10,086,375 UART: [art] Populate DV Done
10,094,733 UART: [fht] FMC Alias Private Key: 7
10,095,663 UART: [art] Derive CDI
10,095,943 UART: [art] Store in in slot 0x4
10,181,666 UART: [art] Derive Key Pair
10,182,026 UART: [art] Store priv key in slot 0x5
10,194,744 UART: [art] Derive Key Pair - Done
10,209,750 UART: [art] Signing Cert with AUTHO
10,210,230 UART: RITY.KEYID = 7
10,225,372 UART: [art] Erasing AUTHORITY.KEYID = 7
10,226,137 UART: [art] PUB.X = 6071C0489C436AC82E8ABE40564E6AD67065F60FC608636BDF3D487DBB4A2F2340234BD5B45C9D1C24406FFC3D7FC980
10,232,909 UART: [art] PUB.Y = EA554CDB2AAA1153CB69277D92DD80F15BFDDBC92E7217EB467B85EA93C82325E8F5A9EAECE87004F66E0F514FEB7AA3
10,239,877 UART: [art] SIG.R = 0488EF127FBF1E1F4923BA149D064842EC640F9205008893C4016098FE77BB8BD207F839C11CEBB94F00120BA884654A
10,246,580 UART: [art] SIG.S = 4869AA2EE599946BB5CE9CC448A5C990795B600E380AFE838BB48A899AAEF0F2EAC2FAFF269A75053A5972A0AD2FC834
10,270,294 UART: Caliptra RT
10,270,547 UART: [state] CFI Enabled
10,552,741 UART: [rt] RT listening for mailbox commands...
10,553,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,583,058 UART: [rt]cmd =0x494e464f, len=4
10,586,541 >>> mbox cmd response data (312 bytes)
10,586,542 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,587,476 UART:
10,587,492 UART: Running Caliptra ROM ...
10,587,900 UART:
10,587,954 UART: [state] CFI Enabled
10,590,764 UART: [state] LifecycleState = Unprovisioned
10,591,419 UART: [state] DebugLocked = No
10,592,137 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,593,812 UART: [kat] SHA2-256
11,387,743 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,391,858 UART: [kat] ++
11,392,010 UART: [kat] sha1
11,396,120 UART: [kat] SHA2-256
11,398,058 UART: [kat] SHA2-384
11,400,805 UART: [kat] SHA2-512-ACC
11,402,705 UART: [kat] ECC-384
11,408,168 UART: [kat] HMAC-384Kdf
11,412,652 UART: [kat] LMS
11,980,848 UART: [kat] --
11,981,669 UART: [update-reset] ++
13,315,974 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,317,252 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
13,467,128 >>> mbox cmd response: success
13,467,407 UART: [update-reset] Copying MAN_2 To MAN_1
13,475,421 UART: [update-reset Success] --
13,476,424 UART: [state] Locking Datavault
13,477,210 UART: [state] Locking PCR0, PCR1 and PCR31
13,477,814 UART: [state] Locking ICCM
13,478,268 UART: [exit] Launching FMC @ 0x40000130
13,483,597 UART:
13,483,613 UART: Running Caliptra FMC ...
13,484,021 UART:
13,484,075 UART: [state] CFI Enabled
13,573,048 UART: [art] Extend RT PCRs Done
13,573,476 UART: [art] Lock RT PCRs Done
13,574,423 UART: [art] Populate DV Done
13,582,659 UART: [fht] FMC Alias Private Key: 7
13,583,773 UART: [art] Derive CDI
13,584,053 UART: [art] Store in in slot 0x4
13,669,912 UART: [art] Derive Key Pair
13,670,272 UART: [art] Store priv key in slot 0x5
13,683,174 UART: [art] Derive Key Pair - Done
13,698,161 UART: [art] Signing Cert with AUTHO
13,698,641 UART: RITY.KEYID = 7
13,713,749 UART: [art] Erasing AUTHORITY.KEYID = 7
13,714,514 UART: [art] PUB.X = 26A94B93F10DD057C9E83357B56B9675C296FCA5F54B0085F87CA12A1FE9A9794FAC4D205171731E2D29F4B6EF77E894
13,721,263 UART: [art] PUB.Y = 51026838C6389D1D0B5E3289390D7834895B1E47628F0A7E59464233D17039275770BFB1E51D54DE6E1E405B736F01E7
13,728,184 UART: [art] SIG.R = A83BFF9D61FDB6B0567CD3898F71523231022D061E9E5853DBD7B6CD7070BFEB72C330E5FD10596078503BD63C1E6E14
13,734,954 UART: [art] SIG.S = DDE98E4DE8BB6EF34C33F70D561786BC376BCAB51906353FB30132B8929C09D8FF5FE0C287556017C5AD0A198787EEB4
13,759,238 UART: Caliptra RT
13,759,491 UART: [state] CFI Enabled
14,044,507 UART: [rt] RT listening for mailbox commands...
14,045,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
14,074,690 UART: [rt]cmd =0x494e464f, len=4
14,078,411 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,499 ready_for_fw is high
1,362,499 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,375 >>> mbox cmd response: success
2,926,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,987,344 UART:
2,987,360 UART: Running Caliptra FMC ...
2,987,768 UART:
2,987,822 UART: [state] CFI Enabled
2,998,036 UART: [fht] FMC Alias Private Key: 7
3,106,277 UART: [art] Extend RT PCRs Done
3,106,705 UART: [art] Lock RT PCRs Done
3,108,491 UART: [art] Populate DV Done
3,116,669 UART: [fht] FMC Alias Private Key: 7
3,117,781 UART: [art] Derive CDI
3,118,061 UART: [art] Store in in slot 0x4
3,203,264 UART: [art] Derive Key Pair
3,203,624 UART: [art] Store priv key in slot 0x5
3,216,866 UART: [art] Derive Key Pair - Done
3,231,462 UART: [art] Signing Cert with AUTHO
3,231,942 UART: RITY.KEYID = 7
3,246,600 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,365 UART: [art] PUB.X = A79FF998EF26214445FCC8FE3A6CB8A392EEEB530EA4571654908D8301F9B63F0FAE1D61992F88FDD0C858759E481D18
3,254,134 UART: [art] PUB.Y = FB87E45CC9BFA8F4BF79E5B3876A9219EA331A91D05E2C821AA92CD43D69A80DA2C6725CDF8914E48410F75B911DC6A4
3,261,095 UART: [art] SIG.R = 1A1CA9A11DF11628A30E247FD3FA2712F6CE2214BF24F5DC04CB69B7767620EC96E00406248D27E75DB4739547FC41CD
3,267,859 UART: [art] SIG.S = 1AD0369E4169B4A5B378D703F135DF0CD10A2AAC5ECD28B25712E93FFD3DA5C72823D35ADF81B8A7C2E423F47C75F903
3,291,982 UART: Caliptra RT
3,292,235 UART: [state] CFI Enabled
3,400,193 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,511 UART: [rt]cmd =0x494e464f, len=4
3,434,122 >>> mbox cmd response data (312 bytes)
3,434,123 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,194,341 >>> mbox cmd response: success
6,207,532 UART:
6,207,548 UART: Running Caliptra FMC ...
6,207,956 UART:
6,208,010 UART: [state] CFI Enabled
6,297,221 UART: [art] Extend RT PCRs Done
6,297,649 UART: [art] Lock RT PCRs Done
6,298,816 UART: [art] Populate DV Done
6,307,010 UART: [fht] FMC Alias Private Key: 7
6,308,156 UART: [art] Derive CDI
6,308,436 UART: [art] Store in in slot 0x4
6,394,413 UART: [art] Derive Key Pair
6,394,773 UART: [art] Store priv key in slot 0x5
6,407,361 UART: [art] Derive Key Pair - Done
6,422,469 UART: [art] Signing Cert with AUTHO
6,422,949 UART: RITY.KEYID = 7
6,438,457 UART: [art] Erasing AUTHORITY.KEYID = 7
6,439,222 UART: [art] PUB.X = 6CD6C22266CD3621AF6A6389181A56558E786121E15FFAD0C19E2383738F91A2FCF6944CA5F1DCA2E95E53ABB799CC24
6,446,000 UART: [art] PUB.Y = 172DFAF5892968CE7A84CC515BF3ACF32C2BF234C3BB770C9B73A472ECD1548753E9E2F5284231E16067EF84DA24FB11
6,452,957 UART: [art] SIG.R = 42CB277931C832F0C4B2E840686EEE59AC0383C849E7A202B8711F415713D64DD0FE06716FD383F7B16592CDA102E1FB
6,459,717 UART: [art] SIG.S = 187D96DF005E696B6F1F3988884A21EC5BE7F99F76F6423E85F9F9A0FE5C04A2D8A0D25FA37C21E759197407E792BB05
6,483,683 UART: Caliptra RT
6,483,936 UART: [state] CFI Enabled
6,766,530 UART: [rt] RT listening for mailbox commands...
6,767,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,796,669 UART: [rt]cmd =0x494e464f, len=4
6,800,458 >>> mbox cmd response data (312 bytes)
6,800,459 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,563,281 >>> mbox cmd response: success
9,576,496 UART:
9,576,512 UART: Running Caliptra FMC ...
9,576,920 UART:
9,576,974 UART: [state] CFI Enabled
9,666,079 UART: [art] Extend RT PCRs Done
9,666,507 UART: [art] Lock RT PCRs Done
9,667,648 UART: [art] Populate DV Done
9,675,894 UART: [fht] FMC Alias Private Key: 7
9,676,988 UART: [art] Derive CDI
9,677,268 UART: [art] Store in in slot 0x4
9,762,895 UART: [art] Derive Key Pair
9,763,255 UART: [art] Store priv key in slot 0x5
9,776,495 UART: [art] Derive Key Pair - Done
9,791,475 UART: [art] Signing Cert with AUTHO
9,791,955 UART: RITY.KEYID = 7
9,807,165 UART: [art] Erasing AUTHORITY.KEYID = 7
9,807,930 UART: [art] PUB.X = D56D89C333E5339260468A6B199A2196501A51EF49FEBB980CEBA8879CA135F3838D5F3910B26942916F7637ABE0D6D8
9,814,695 UART: [art] PUB.Y = 729006EF49EFB6A44A0ED64E4CD31917A9E923EE8658B046DADADDFC314516A7BEC0CC0405ACF4592F579ECDC7E97CCC
9,821,657 UART: [art] SIG.R = 3AC371026645D5D2DF42DA7A8D9D8825170F541AB90534A00648545F187E7A57ACFC3F29444A51F4CD4DE1AE118BC9E1
9,828,421 UART: [art] SIG.S = 499D980F812CBE5421F6F6874F154E2E38CB5F7D60B19CF70FB2E8DF935A719EB5DE334C2BA9DCDBF164328105F6DFE7
9,852,181 UART: Caliptra RT
9,852,434 UART: [state] CFI Enabled
10,138,386 UART: [rt] RT listening for mailbox commands...
10,139,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,168,707 UART: [rt]cmd =0x494e464f, len=4
10,172,270 >>> mbox cmd response data (312 bytes)
10,172,271 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,935,191 >>> mbox cmd response: success
12,948,528 UART:
12,948,544 UART: Running Caliptra FMC ...
12,948,952 UART:
12,949,006 UART: [state] CFI Enabled
13,038,011 UART: [art] Extend RT PCRs Done
13,038,439 UART: [art] Lock RT PCRs Done
13,039,702 UART: [art] Populate DV Done
13,048,040 UART: [fht] FMC Alias Private Key: 7
13,048,988 UART: [art] Derive CDI
13,049,268 UART: [art] Store in in slot 0x4
13,135,047 UART: [art] Derive Key Pair
13,135,407 UART: [art] Store priv key in slot 0x5
13,148,303 UART: [art] Derive Key Pair - Done
13,163,055 UART: [art] Signing Cert with AUTHO
13,163,535 UART: RITY.KEYID = 7
13,178,685 UART: [art] Erasing AUTHORITY.KEYID = 7
13,179,450 UART: [art] PUB.X = 6CD6C22266CD3621AF6A6389181A56558E786121E15FFAD0C19E2383738F91A2FCF6944CA5F1DCA2E95E53ABB799CC24
13,186,228 UART: [art] PUB.Y = 172DFAF5892968CE7A84CC515BF3ACF32C2BF234C3BB770C9B73A472ECD1548753E9E2F5284231E16067EF84DA24FB11
13,193,185 UART: [art] SIG.R = 42CB277931C832F0C4B2E840686EEE59AC0383C849E7A202B8711F415713D64DD0FE06716FD383F7B16592CDA102E1FB
13,199,945 UART: [art] SIG.S = 187D96DF005E696B6F1F3988884A21EC5BE7F99F76F6423E85F9F9A0FE5C04A2D8A0D25FA37C21E759197407E792BB05
13,223,919 UART: Caliptra RT
13,224,172 UART: [state] CFI Enabled
13,504,340 UART: [rt] RT listening for mailbox commands...
13,505,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
13,534,497 UART: [rt]cmd =0x494e464f, len=4
13,538,232 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.94s
Truncated 2120 bytes from beginning
,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,687 UART: [ldev] --
1,585,988 UART: [fwproc] Waiting for Commands...
1,586,697 UART: [fwproc] Received command 0x46574c44
1,587,488 UART: [fwproc] Received Image of size 114332 bytes
2,884,157 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,797 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,149 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,948 >>> mbox cmd response: success
3,076,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,078,038 UART: [afmc] ++
3,078,206 UART: [afmc] CDI.KEYID = 6
3,078,568 UART: [afmc] SUBJECT.KEYID = 7
3,078,993 UART: [afmc] AUTHORITY.KEYID = 5
3,114,461 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,869 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,649 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
3,137,341 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
3,143,214 UART: [afmc] SIG.R = 8F0A6885272083A6E8E8B8B95CD9E8F58F40896BA19AC0C6F7B194F4AEFDD2164CF5C4AB04A9FB1E996A4FAB4830A260
3,148,928 UART: [afmc] SIG.S = 60CE1CF9B19E3C4AC1AC951A7ABB78ECED5C30414CE58401BDA2F4C1F7C3BA9F88BA7370001A855F932D7F374DB30C1E
3,156,923 UART: [afmc] --
3,157,877 UART: [cold-reset] --
3,158,581 UART: [state] Locking Datavault
3,159,718 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,322 UART: [state] Locking ICCM
3,160,784 UART: [exit] Launching FMC @ 0x40000130
3,166,113 UART:
3,166,129 UART: Running Caliptra FMC ...
3,166,537 UART:
3,166,680 UART: [state] CFI Enabled
3,177,394 UART: [fht] FMC Alias Private Key: 7
3,285,195 UART: [art] Extend RT PCRs Done
3,285,623 UART: [art] Lock RT PCRs Done
3,287,037 UART: [art] Populate DV Done
3,295,301 UART: [fht] FMC Alias Private Key: 7
3,296,457 UART: [art] Derive CDI
3,296,737 UART: [art] Store in in slot 0x4
3,382,192 UART: [art] Derive Key Pair
3,382,552 UART: [art] Store priv key in slot 0x5
3,396,018 UART: [art] Derive Key Pair - Done
3,411,068 UART: [art] Signing Cert with AUTHO
3,411,548 UART: RITY.KEYID = 7
3,427,002 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,767 UART: [art] PUB.X = C38AA680615654104FDC5926746389D474B1F292776C0765837013AB6FACFBF798CD02E12D2CB5DDA059DA27B370FC6F
3,434,535 UART: [art] PUB.Y = 825F526068A46E81CEF98AA1444618559CACFD085BD40B2BDFAAD4E30B53D32E99003431D49670954282D21B14CBE704
3,441,453 UART: [art] SIG.R = 9857DF526C6EC38D60154459D8B78FA34F5410D2234371037C1D0E29D0E4B44D5FE928B99AEC498B172FC8F303C5A4A9
3,448,216 UART: [art] SIG.S = 57D3C53F18BEF8BA46BD83746FF6AE60161EA406772EF23ED71379FC922889701CB3E364F36A928B9752ADA67524549D
3,471,844 UART: Caliptra RT
3,472,189 UART: [state] CFI Enabled
3,580,560 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,360 UART: [rt]cmd =0x494e464f, len=4
3,615,071 >>> mbox cmd response data (312 bytes)
3,615,072 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,834 UART:
3,615,850 UART: Running Caliptra ROM ...
3,616,258 UART:
3,616,399 UART: [state] CFI Enabled
3,618,811 UART: [state] LifecycleState = Unprovisioned
3,619,466 UART: [state] DebugLocked = No
3,620,136 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,621,689 UART: [kat] SHA2-256
4,415,620 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,419,735 UART: [kat] ++
4,419,887 UART: [kat] sha1
4,424,121 UART: [kat] SHA2-256
4,426,059 UART: [kat] SHA2-384
4,428,804 UART: [kat] SHA2-512-ACC
4,430,704 UART: [kat] ECC-384
4,436,477 UART: [kat] HMAC-384Kdf
4,441,207 UART: [kat] LMS
5,009,403 UART: [kat] --
5,010,334 UART: [update-reset] ++
6,344,103 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,345,369 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,495,245 >>> mbox cmd response: success
6,495,436 UART: [update-reset] Copying MAN_2 To MAN_1
6,503,450 UART: [update-reset Success] --
6,504,527 UART: [state] Locking Datavault
6,505,143 UART: [state] Locking PCR0, PCR1 and PCR31
6,505,747 UART: [state] Locking ICCM
6,506,305 UART: [exit] Launching FMC @ 0x40000130
6,511,634 UART:
6,511,650 UART: Running Caliptra FMC ...
6,512,058 UART:
6,512,201 UART: [state] CFI Enabled
6,601,558 UART: [art] Extend RT PCRs Done
6,601,986 UART: [art] Lock RT PCRs Done
6,603,519 UART: [art] Populate DV Done
6,611,721 UART: [fht] FMC Alias Private Key: 7
6,612,699 UART: [art] Derive CDI
6,612,979 UART: [art] Store in in slot 0x4
6,698,620 UART: [art] Derive Key Pair
6,698,980 UART: [art] Store priv key in slot 0x5
6,712,198 UART: [art] Derive Key Pair - Done
6,726,879 UART: [art] Signing Cert with AUTHO
6,727,359 UART: RITY.KEYID = 7
6,742,961 UART: [art] Erasing AUTHORITY.KEYID = 7
6,743,726 UART: [art] PUB.X = 8B7E1DB178270DFECCD9EC96FED06C7CA911AE92694B4297962AB6BADBDB085DA3A7885110D36AECAFA8C393E5BBED4A
6,750,520 UART: [art] PUB.Y = 137C2B3277A4E1521C1682E84F8860940540659E168471BCA38320F03FE3FC0B68EF196E1223E3B221690F3883F019D5
6,757,449 UART: [art] SIG.R = ED4214E63E70D1CDC1EABFB36E2B370C20E996B7BEDFBC29DA6AD4D47166EA0DC4BD7516DC1DE09F1EBCE1A5FB2BC66D
6,764,251 UART: [art] SIG.S = 4D548DC22CB86A809ECEFC2825ECC88452970CC033CC3991BBF35C1C6BF8D974358C9F52B010B854C6246F5C8D45451F
6,788,213 UART: Caliptra RT
6,788,558 UART: [state] CFI Enabled
7,069,643 UART: [rt] RT listening for mailbox commands...
7,070,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,100,100 UART: [rt]cmd =0x494e464f, len=4
7,103,725 >>> mbox cmd response data (312 bytes)
7,103,726 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,104,410 UART:
7,104,426 UART: Running Caliptra ROM ...
7,104,834 UART:
7,104,975 UART: [state] CFI Enabled
7,107,721 UART: [state] LifecycleState = Unprovisioned
7,108,376 UART: [state] DebugLocked = No
7,109,002 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,110,591 UART: [kat] SHA2-256
7,904,522 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,908,637 UART: [kat] ++
7,908,789 UART: [kat] sha1
7,913,117 UART: [kat] SHA2-256
7,915,055 UART: [kat] SHA2-384
7,917,798 UART: [kat] SHA2-512-ACC
7,919,698 UART: [kat] ECC-384
7,925,315 UART: [kat] HMAC-384Kdf
7,929,885 UART: [kat] LMS
8,498,081 UART: [kat] --
8,498,858 UART: [update-reset] ++
9,832,133 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,833,391 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
9,983,267 >>> mbox cmd response: success
9,983,534 UART: [update-reset] Copying MAN_2 To MAN_1
9,991,548 UART: [update-reset Success] --
9,992,325 UART: [state] Locking Datavault
9,993,255 UART: [state] Locking PCR0, PCR1 and PCR31
9,993,859 UART: [state] Locking ICCM
9,994,477 UART: [exit] Launching FMC @ 0x40000130
9,999,806 UART:
9,999,822 UART: Running Caliptra FMC ...
10,000,230 UART:
10,000,373 UART: [state] CFI Enabled
10,089,684 UART: [art] Extend RT PCRs Done
10,090,112 UART: [art] Lock RT PCRs Done
10,091,321 UART: [art] Populate DV Done
10,099,585 UART: [fht] FMC Alias Private Key: 7
10,100,717 UART: [art] Derive CDI
10,100,997 UART: [art] Store in in slot 0x4
10,187,142 UART: [art] Derive Key Pair
10,187,502 UART: [art] Store priv key in slot 0x5
10,201,174 UART: [art] Derive Key Pair - Done
10,215,676 UART: [art] Signing Cert with AUTHO
10,216,156 UART: RITY.KEYID = 7
10,231,076 UART: [art] Erasing AUTHORITY.KEYID = 7
10,231,841 UART: [art] PUB.X = FE725737D1BAF5179D6E3F0F495CBF539293187B3D6DD3B2C0820DC6FA0AB3F7969FA825AC6426AA882763ABB3B52F79
10,238,614 UART: [art] PUB.Y = C4C0F36242B10ADD4A0A7B98F758CD6449F920EC8BF9D241A47EEF7020B95F2E67D2EA8858BF5528E5151652B12948E8
10,245,564 UART: [art] SIG.R = 4D506521FA7AC95C8EEA37837C3332461B3421E6A3F72894B78C86575B965F2F7A97F02A9DD6063DE6D4A260B8EF5AD5
10,252,335 UART: [art] SIG.S = F2DFA95574A27A1CF83CA9F62D55249BF0FD31148BC52DD6FFF595EB8B1B361A1962490E8ECB147AF5E33AB3DAF28221
10,276,047 UART: Caliptra RT
10,276,392 UART: [state] CFI Enabled
10,560,507 UART: [rt] RT listening for mailbox commands...
10,561,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,590,446 UART: [rt]cmd =0x494e464f, len=4
10,593,993 >>> mbox cmd response data (312 bytes)
10,593,994 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,594,850 UART:
10,594,866 UART: Running Caliptra ROM ...
10,595,274 UART:
10,595,415 UART: [state] CFI Enabled
10,598,203 UART: [state] LifecycleState = Unprovisioned
10,598,858 UART: [state] DebugLocked = No
10,599,568 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,601,235 UART: [kat] SHA2-256
11,395,166 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,399,281 UART: [kat] ++
11,399,433 UART: [kat] sha1
11,403,631 UART: [kat] SHA2-256
11,405,569 UART: [kat] SHA2-384
11,408,274 UART: [kat] SHA2-512-ACC
11,410,174 UART: [kat] ECC-384
11,416,033 UART: [kat] HMAC-384Kdf
11,420,623 UART: [kat] LMS
11,988,819 UART: [kat] --
11,989,640 UART: [update-reset] ++
13,324,811 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,326,039 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
13,475,915 >>> mbox cmd response: success
13,476,074 UART: [update-reset] Copying MAN_2 To MAN_1
13,484,088 UART: [update-reset Success] --
13,485,205 UART: [state] Locking Datavault
13,486,001 UART: [state] Locking PCR0, PCR1 and PCR31
13,486,605 UART: [state] Locking ICCM
13,487,277 UART: [exit] Launching FMC @ 0x40000130
13,492,606 UART:
13,492,622 UART: Running Caliptra FMC ...
13,493,030 UART:
13,493,173 UART: [state] CFI Enabled
13,582,066 UART: [art] Extend RT PCRs Done
13,582,494 UART: [art] Lock RT PCRs Done
13,583,875 UART: [art] Populate DV Done
13,592,137 UART: [fht] FMC Alias Private Key: 7
13,593,071 UART: [art] Derive CDI
13,593,351 UART: [art] Store in in slot 0x4
13,679,320 UART: [art] Derive Key Pair
13,679,680 UART: [art] Store priv key in slot 0x5
13,692,942 UART: [art] Derive Key Pair - Done
13,707,529 UART: [art] Signing Cert with AUTHO
13,708,009 UART: RITY.KEYID = 7
13,723,185 UART: [art] Erasing AUTHORITY.KEYID = 7
13,723,950 UART: [art] PUB.X = 8B7E1DB178270DFECCD9EC96FED06C7CA911AE92694B4297962AB6BADBDB085DA3A7885110D36AECAFA8C393E5BBED4A
13,730,744 UART: [art] PUB.Y = 137C2B3277A4E1521C1682E84F8860940540659E168471BCA38320F03FE3FC0B68EF196E1223E3B221690F3883F019D5
13,737,673 UART: [art] SIG.R = ED4214E63E70D1CDC1EABFB36E2B370C20E996B7BEDFBC29DA6AD4D47166EA0DC4BD7516DC1DE09F1EBCE1A5FB2BC66D
13,744,475 UART: [art] SIG.S = 4D548DC22CB86A809ECEFC2825ECC88452970CC033CC3991BBF35C1C6BF8D974358C9F52B010B854C6246F5C8D45451F
13,768,735 UART: Caliptra RT
13,769,080 UART: [state] CFI Enabled
14,050,525 UART: [rt] RT listening for mailbox commands...
14,051,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
14,080,566 UART: [rt]cmd =0x494e464f, len=4
14,084,391 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,972 ready_for_fw is high
1,362,972 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,892 >>> mbox cmd response: success
2,928,892 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,990,955 UART:
2,990,971 UART: Running Caliptra FMC ...
2,991,379 UART:
2,991,522 UART: [state] CFI Enabled
3,002,306 UART: [fht] FMC Alias Private Key: 7
3,109,985 UART: [art] Extend RT PCRs Done
3,110,413 UART: [art] Lock RT PCRs Done
3,112,123 UART: [art] Populate DV Done
3,120,503 UART: [fht] FMC Alias Private Key: 7
3,121,507 UART: [art] Derive CDI
3,121,787 UART: [art] Store in in slot 0x4
3,207,696 UART: [art] Derive Key Pair
3,208,056 UART: [art] Store priv key in slot 0x5
3,221,298 UART: [art] Derive Key Pair - Done
3,235,855 UART: [art] Signing Cert with AUTHO
3,236,335 UART: RITY.KEYID = 7
3,251,543 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,308 UART: [art] PUB.X = BDDC1A691B5EE4E5CA4934611398472972A560502C379EC6A819B2628755951E84747A8E16E1470F52425AFFA01F26AA
3,259,071 UART: [art] PUB.Y = 2FCB0B2C249276AA75CC18DF8B81F6AF8BC6B9D271D5E06E8BA5BDE01A6AD969067CC9870A470BBAC39C938171FCF412
3,266,029 UART: [art] SIG.R = 93D3D2394B7053EB256B22791C343C001905B1C2B7E95885B71CA035B90DF29D0B7427095A9FE7267D091ACD6716C16B
3,272,758 UART: [art] SIG.S = 20BCF3B96E6844176329E75A66A09E28D1C7643A987D525B00FBBC1E5CFB5FCAB779B6E725F38B5C2DB339FA3863EAE1
3,296,597 UART: Caliptra RT
3,296,942 UART: [state] CFI Enabled
3,404,827 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,083 UART: [rt]cmd =0x494e464f, len=4
3,438,838 >>> mbox cmd response data (312 bytes)
3,438,839 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,200,698 >>> mbox cmd response: success
6,214,167 UART:
6,214,183 UART: Running Caliptra FMC ...
6,214,591 UART:
6,214,734 UART: [state] CFI Enabled
6,303,975 UART: [art] Extend RT PCRs Done
6,304,403 UART: [art] Lock RT PCRs Done
6,305,540 UART: [art] Populate DV Done
6,313,844 UART: [fht] FMC Alias Private Key: 7
6,314,882 UART: [art] Derive CDI
6,315,162 UART: [art] Store in in slot 0x4
6,401,065 UART: [art] Derive Key Pair
6,401,425 UART: [art] Store priv key in slot 0x5
6,414,581 UART: [art] Derive Key Pair - Done
6,429,903 UART: [art] Signing Cert with AUTHO
6,430,383 UART: RITY.KEYID = 7
6,445,659 UART: [art] Erasing AUTHORITY.KEYID = 7
6,446,424 UART: [art] PUB.X = 6E41EBC56F93D406655788163794D162381D1361A989A07031E907736C913A77E322423844BC25592D3B7B2AEAD7EE2C
6,453,178 UART: [art] PUB.Y = CA5089CED0F172D00F5D188ACA3572E825DADA30715DB4556728D8B17E48CBF1483EE5BDAE0ECC9E95BF092EC77BC505
6,460,136 UART: [art] SIG.R = CE047D69E2268D22159654ED2F592EFBAF0FC790B5E0C743F3185838EC0A5F4BC1F2DEFCB35F44B17B4D69C9E69D1AE6
6,466,915 UART: [art] SIG.S = CA5FB9F385369F23E164F3B8EE89678339C21BB06CF5E4D0C5DDEA78CF91DE4B334504D9B37DE6093B038D991D642B2F
6,490,823 UART: Caliptra RT
6,491,168 UART: [state] CFI Enabled
6,775,934 UART: [rt] RT listening for mailbox commands...
6,776,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,806,003 UART: [rt]cmd =0x494e464f, len=4
6,809,686 >>> mbox cmd response data (312 bytes)
6,809,687 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,572,280 >>> mbox cmd response: success
9,585,767 UART:
9,585,783 UART: Running Caliptra FMC ...
9,586,191 UART:
9,586,334 UART: [state] CFI Enabled
9,675,377 UART: [art] Extend RT PCRs Done
9,675,805 UART: [art] Lock RT PCRs Done
9,677,258 UART: [art] Populate DV Done
9,685,428 UART: [fht] FMC Alias Private Key: 7
9,686,580 UART: [art] Derive CDI
9,686,860 UART: [art] Store in in slot 0x4
9,772,577 UART: [art] Derive Key Pair
9,772,937 UART: [art] Store priv key in slot 0x5
9,786,739 UART: [art] Derive Key Pair - Done
9,801,335 UART: [art] Signing Cert with AUTHO
9,801,815 UART: RITY.KEYID = 7
9,817,403 UART: [art] Erasing AUTHORITY.KEYID = 7
9,818,168 UART: [art] PUB.X = CEDAEE015F8859EF7A4B8016EEC335939E2795FA4D6FF9D0343523CAC3C1E8B6216622A7503E0123DEB9A8659C00B2B9
9,824,920 UART: [art] PUB.Y = E70DFBCFE92B9E63AD0687F3D128BB61EF92DCC46E09A4FEF6CC8A76B29FAADFF4494D90BBEDCB34EE46162AC079FA7E
9,831,897 UART: [art] SIG.R = 9BBB10A633980715179CF512758729FF613962EEC7852763708CDE09B2FE30EA03E1D0FD2533C788FAD58F92BD3A5FB8
9,838,662 UART: [art] SIG.S = B38EE2F70B03C5EBCFA45D28A4F04FD8D597FA4DC5AA916D8D6CE787BA51527C24BBEEA58905C4F07D1EECA2A724E853
9,862,354 UART: Caliptra RT
9,862,699 UART: [state] CFI Enabled
10,143,635 UART: [rt] RT listening for mailbox commands...
10,144,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,173,998 UART: [rt]cmd =0x494e464f, len=4
10,177,719 >>> mbox cmd response data (312 bytes)
10,177,720 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,940,049 >>> mbox cmd response: success
12,953,684 UART:
12,953,700 UART: Running Caliptra FMC ...
12,954,108 UART:
12,954,251 UART: [state] CFI Enabled
13,043,608 UART: [art] Extend RT PCRs Done
13,044,036 UART: [art] Lock RT PCRs Done
13,045,131 UART: [art] Populate DV Done
13,053,405 UART: [fht] FMC Alias Private Key: 7
13,054,523 UART: [art] Derive CDI
13,054,803 UART: [art] Store in in slot 0x4
13,140,244 UART: [art] Derive Key Pair
13,140,604 UART: [art] Store priv key in slot 0x5
13,153,968 UART: [art] Derive Key Pair - Done
13,168,614 UART: [art] Signing Cert with AUTHO
13,169,094 UART: RITY.KEYID = 7
13,184,718 UART: [art] Erasing AUTHORITY.KEYID = 7
13,185,483 UART: [art] PUB.X = 6E41EBC56F93D406655788163794D162381D1361A989A07031E907736C913A77E322423844BC25592D3B7B2AEAD7EE2C
13,192,237 UART: [art] PUB.Y = CA5089CED0F172D00F5D188ACA3572E825DADA30715DB4556728D8B17E48CBF1483EE5BDAE0ECC9E95BF092EC77BC505
13,199,195 UART: [art] SIG.R = CE047D69E2268D22159654ED2F592EFBAF0FC790B5E0C743F3185838EC0A5F4BC1F2DEFCB35F44B17B4D69C9E69D1AE6
13,205,974 UART: [art] SIG.S = CA5FB9F385369F23E164F3B8EE89678339C21BB06CF5E4D0C5DDEA78CF91DE4B334504D9B37DE6093B038D991D642B2F
13,229,444 UART: Caliptra RT
13,229,789 UART: [state] CFI Enabled
13,514,597 UART: [rt] RT listening for mailbox commands...
13,515,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
13,544,704 UART: [rt]cmd =0x494e464f, len=4
13,548,473 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.71s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,505 UART: [ldev] --
1,281,910 UART: [fwproc] Wait for Commands...
1,282,602 UART: [fwproc] Recv command 0x46574c44
1,283,330 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,341 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,645 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,456 >>> mbox cmd response: success
2,772,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,773,674 UART: [afmc] ++
2,773,842 UART: [afmc] CDI.KEYID = 6
2,774,204 UART: [afmc] SUBJECT.KEYID = 7
2,774,629 UART: [afmc] AUTHORITY.KEYID = 5
2,809,967 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,354 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,833,046 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,838,919 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,844,621 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,852,434 UART: [afmc] --
2,853,502 UART: [cold-reset] --
2,854,428 UART: [state] Locking Datavault
2,855,545 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,149 UART: [state] Locking ICCM
2,856,675 UART: [exit] Launching FMC @ 0x40000130
2,862,004 UART:
2,862,020 UART: Running Caliptra FMC ...
2,862,428 UART:
2,862,482 UART: [state] CFI Enabled
2,873,078 UART: [fht] FMC Alias Private Key: 7
2,981,033 UART: [art] Extend RT PCRs Done
2,981,461 UART: [art] Lock RT PCRs Done
2,982,713 UART: [art] Populate DV Done
2,990,907 UART: [fht] FMC Alias Private Key: 7
2,991,899 UART: [art] Derive CDI
2,992,179 UART: [art] Store in in slot 0x4
3,077,566 UART: [art] Derive Key Pair
3,077,926 UART: [art] Store priv key in slot 0x5
3,091,464 UART: [art] Derive Key Pair - Done
3,106,056 UART: [art] Signing Cert with AUTHO
3,106,536 UART: RITY.KEYID = 7
3,121,934 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,699 UART: [art] PUB.X = 08F52F4A8E2E75FA0040C319C88427A3B1325BCDC7A76B9D10024229C0F0B33B9DFA17979C323F8D6754090B262E8E56
3,129,435 UART: [art] PUB.Y = 603BD7694D07FAAD2356B8BA0A12D45C02D42EA85E7E3D86E294BECF5CA677BA1DBA78A94183870D8C28D3D4DE059B9D
3,136,388 UART: [art] SIG.R = A9AD7B5AF4447BEBECB1237D72D538FA48F63A1196741F34AD458A27B74B721441B9EC32AB259F64E6EB7D7C80EDE15F
3,143,174 UART: [art] SIG.S = 4F4D06E4D6BBA1B013A689C6307ABB5713AD6048F99771D11509C94FC305E775FBFA08C7C3D8A48208CA1F5E9E25E965
3,167,120 UART: Caliptra RT
3,167,373 UART: [state] CFI Enabled
3,275,812 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,244 UART: [rt]cmd =0x494e464f, len=4
3,309,905 >>> mbox cmd response data (312 bytes)
3,309,906 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,889 UART:
3,310,905 UART: Running Caliptra ROM ...
3,311,313 UART:
3,311,368 UART: [state] CFI Enabled
3,313,838 UART: [state] LifecycleState = Unprovisioned
3,314,493 UART: [state] DebugLocked = No
3,315,101 UART: [state] WD Timer not started. Device not locked for debugging
3,316,277 UART: [kat] SHA2-256
4,121,927 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,126,052 UART: [kat] ++
4,126,204 UART: [kat] sha1
4,130,526 UART: [kat] SHA2-256
4,132,466 UART: [kat] SHA2-384
4,135,133 UART: [kat] SHA2-512-ACC
4,137,033 UART: [kat] ECC-384
4,146,518 UART: [kat] HMAC-384Kdf
4,151,020 UART: [kat] LMS
4,399,348 UART: [kat] --
4,400,376 UART: [update-reset] ++
5,712,721 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,713,870 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,863,694 >>> mbox cmd response: success
5,863,919 UART: [update-reset] Copying MAN_2 To MAN_1
5,871,933 UART: [update-reset Success] --
5,872,944 UART: [state] Locking Datavault
5,873,832 UART: [state] Locking PCR0, PCR1 and PCR31
5,874,436 UART: [state] Locking ICCM
5,874,962 UART: [exit] Launching FMC @ 0x40000130
5,880,291 UART:
5,880,307 UART: Running Caliptra FMC ...
5,880,715 UART:
5,880,769 UART: [state] CFI Enabled
5,969,518 UART: [art] Extend RT PCRs Done
5,969,946 UART: [art] Lock RT PCRs Done
5,971,321 UART: [art] Populate DV Done
5,979,547 UART: [fht] FMC Alias Private Key: 7
5,980,479 UART: [art] Derive CDI
5,980,759 UART: [art] Store in in slot 0x4
6,066,350 UART: [art] Derive Key Pair
6,066,710 UART: [art] Store priv key in slot 0x5
6,079,354 UART: [art] Derive Key Pair - Done
6,094,215 UART: [art] Signing Cert with AUTHO
6,094,695 UART: RITY.KEYID = 7
6,110,177 UART: [art] Erasing AUTHORITY.KEYID = 7
6,110,942 UART: [art] PUB.X = 110E117558EC149391B116F1B6E4ABA608D329338CAE5781D39818689158F537107B84415C894857F70DAC8465DB9332
6,117,689 UART: [art] PUB.Y = 332871BE0A5A8325550B15B0D1BFCF2703F6D3350DC5A0612F33921A83E56AA7EFCB5CB4CEFA11D5FF9BC5B564D906D4
6,124,640 UART: [art] SIG.R = 6332F769C67DE1A053FEC9A12CCF97C008BDF4045C5B17F8A32A6B442ED8DB24C901EB187A554488903243852FCF8B13
6,131,407 UART: [art] SIG.S = 40C4BD2E3834FC1167A951274B0CB7A7C90CC2E273A512609A02872C47F979EFB713373E69559C31E2A4BA8B81B30E03
6,155,753 UART: Caliptra RT
6,156,006 UART: [state] CFI Enabled
6,437,994 UART: [rt] RT listening for mailbox commands...
6,438,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,468,293 UART: [rt]cmd =0x494e464f, len=4
6,471,972 >>> mbox cmd response data (312 bytes)
6,471,973 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,472,850 UART:
6,472,866 UART: Running Caliptra ROM ...
6,473,274 UART:
6,473,329 UART: [state] CFI Enabled
6,476,285 UART: [state] LifecycleState = Unprovisioned
6,476,940 UART: [state] DebugLocked = No
6,477,566 UART: [state] WD Timer not started. Device not locked for debugging
6,478,792 UART: [kat] SHA2-256
7,284,442 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,288,567 UART: [kat] ++
7,288,719 UART: [kat] sha1
7,293,043 UART: [kat] SHA2-256
7,294,983 UART: [kat] SHA2-384
7,297,798 UART: [kat] SHA2-512-ACC
7,299,698 UART: [kat] ECC-384
7,310,015 UART: [kat] HMAC-384Kdf
7,314,435 UART: [kat] LMS
7,562,763 UART: [kat] --
7,563,411 UART: [update-reset] ++
8,876,222 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,877,271 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
9,027,095 >>> mbox cmd response: success
9,027,364 UART: [update-reset] Copying MAN_2 To MAN_1
9,035,378 UART: [update-reset Success] --
9,036,307 UART: [state] Locking Datavault
9,037,261 UART: [state] Locking PCR0, PCR1 and PCR31
9,037,865 UART: [state] Locking ICCM
9,038,431 UART: [exit] Launching FMC @ 0x40000130
9,043,760 UART:
9,043,776 UART: Running Caliptra FMC ...
9,044,184 UART:
9,044,238 UART: [state] CFI Enabled
9,133,021 UART: [art] Extend RT PCRs Done
9,133,449 UART: [art] Lock RT PCRs Done
9,134,644 UART: [art] Populate DV Done
9,142,898 UART: [fht] FMC Alias Private Key: 7
9,143,970 UART: [art] Derive CDI
9,144,250 UART: [art] Store in in slot 0x4
9,230,051 UART: [art] Derive Key Pair
9,230,411 UART: [art] Store priv key in slot 0x5
9,243,959 UART: [art] Derive Key Pair - Done
9,258,762 UART: [art] Signing Cert with AUTHO
9,259,242 UART: RITY.KEYID = 7
9,274,878 UART: [art] Erasing AUTHORITY.KEYID = 7
9,275,643 UART: [art] PUB.X = F3D9FA1322C6529FC6B5C8E63151D99724AE277D4CB004E9D271C20953DD5694F9E8722E6A2D0866B545CC0902D43864
9,282,396 UART: [art] PUB.Y = 5EFA4A015A7DF6C2098BF8292B6D190BAB06D497B412808F0FA66FFF9FF09029D79F1D7F2D7D035223BF42185C8775DF
9,289,338 UART: [art] SIG.R = 105505FB7AAC473B75617AD80C951B3BC370EEBDA906292AF8E42B2019B7CE454BF17B049075A450F29938CCF7B87665
9,296,100 UART: [art] SIG.S = F2F07DDCA21F69E4045664544C82ACABBF053ABBFD6B74DB1848CAA7D5925FC9C3CA0AC5A86DA90355BF93D449A23189
9,319,415 UART: Caliptra RT
9,319,668 UART: [state] CFI Enabled
9,599,799 UART: [rt] RT listening for mailbox commands...
9,600,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,629,934 UART: [rt]cmd =0x494e464f, len=4
9,633,601 >>> mbox cmd response data (312 bytes)
9,633,602 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,634,373 UART:
9,634,389 UART: Running Caliptra ROM ...
9,634,797 UART:
9,634,852 UART: [state] CFI Enabled
9,637,848 UART: [state] LifecycleState = Unprovisioned
9,638,503 UART: [state] DebugLocked = No
9,639,225 UART: [state] WD Timer not started. Device not locked for debugging
9,640,557 UART: [kat] SHA2-256
10,446,207 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,450,332 UART: [kat] ++
10,450,484 UART: [kat] sha1
10,454,632 UART: [kat] SHA2-256
10,456,572 UART: [kat] SHA2-384
10,459,301 UART: [kat] SHA2-512-ACC
10,461,201 UART: [kat] ECC-384
10,470,918 UART: [kat] HMAC-384Kdf
10,475,568 UART: [kat] LMS
10,723,896 UART: [kat] --
10,724,646 UART: [update-reset] ++
12,038,197 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,039,324 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
12,189,148 >>> mbox cmd response: success
12,189,283 UART: [update-reset] Copying MAN_2 To MAN_1
12,197,297 UART: [update-reset Success] --
12,198,316 UART: [state] Locking Datavault
12,198,966 UART: [state] Locking PCR0, PCR1 and PCR31
12,199,570 UART: [state] Locking ICCM
12,200,236 UART: [exit] Launching FMC @ 0x40000130
12,205,565 UART:
12,205,581 UART: Running Caliptra FMC ...
12,205,989 UART:
12,206,043 UART: [state] CFI Enabled
12,295,122 UART: [art] Extend RT PCRs Done
12,295,550 UART: [art] Lock RT PCRs Done
12,296,731 UART: [art] Populate DV Done
12,305,211 UART: [fht] FMC Alias Private Key: 7
12,306,383 UART: [art] Derive CDI
12,306,663 UART: [art] Store in in slot 0x4
12,392,014 UART: [art] Derive Key Pair
12,392,374 UART: [art] Store priv key in slot 0x5
12,405,180 UART: [art] Derive Key Pair - Done
12,419,929 UART: [art] Signing Cert with AUTHO
12,420,409 UART: RITY.KEYID = 7
12,435,461 UART: [art] Erasing AUTHORITY.KEYID = 7
12,436,226 UART: [art] PUB.X = 110E117558EC149391B116F1B6E4ABA608D329338CAE5781D39818689158F537107B84415C894857F70DAC8465DB9332
12,442,973 UART: [art] PUB.Y = 332871BE0A5A8325550B15B0D1BFCF2703F6D3350DC5A0612F33921A83E56AA7EFCB5CB4CEFA11D5FF9BC5B564D906D4
12,449,924 UART: [art] SIG.R = 6332F769C67DE1A053FEC9A12CCF97C008BDF4045C5B17F8A32A6B442ED8DB24C901EB187A554488903243852FCF8B13
12,456,691 UART: [art] SIG.S = 40C4BD2E3834FC1167A951274B0CB7A7C90CC2E273A512609A02872C47F979EFB713373E69559C31E2A4BA8B81B30E03
12,481,271 UART: Caliptra RT
12,481,524 UART: [state] CFI Enabled
12,766,828 UART: [rt] RT listening for mailbox commands...
12,767,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,796,849 UART: [rt]cmd =0x494e464f, len=4
12,800,554 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,055 ready_for_fw is high
1,060,055 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,561 >>> mbox cmd response: success
2,625,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,686,868 UART:
2,686,884 UART: Running Caliptra FMC ...
2,687,292 UART:
2,687,346 UART: [state] CFI Enabled
2,697,578 UART: [fht] FMC Alias Private Key: 7
2,805,291 UART: [art] Extend RT PCRs Done
2,805,719 UART: [art] Lock RT PCRs Done
2,807,147 UART: [art] Populate DV Done
2,815,509 UART: [fht] FMC Alias Private Key: 7
2,816,465 UART: [art] Derive CDI
2,816,745 UART: [art] Store in in slot 0x4
2,902,308 UART: [art] Derive Key Pair
2,902,668 UART: [art] Store priv key in slot 0x5
2,915,792 UART: [art] Derive Key Pair - Done
2,930,231 UART: [art] Signing Cert with AUTHO
2,930,711 UART: RITY.KEYID = 7
2,945,881 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,646 UART: [art] PUB.X = BB9C9C87AAC4DC196242A6DBC7E648BF88E8AC998B04B33130CEAF4A2A6C77F85F21386E7CD935405914CD7EA87E888F
2,953,429 UART: [art] PUB.Y = A432F046FCE7A9922BFD2B274FA58B3CBA0D867ED978308F8897FA992F1284779C1C9A8B42EB13AEB7343262818BB790
2,960,382 UART: [art] SIG.R = 4A8BC2D881C65C6C04FBD626A402355B503CBC3CD49E561011BB49E093183F83F4C5C8E33BE75F15DBEB451F886D0129
2,967,151 UART: [art] SIG.S = 055144726D69F2D58B1F5A961FA286F4E7DE16DCCC5CB779B585F7A6CCC174E9E2A7E499249AD1DB56F1DA8975B6203C
2,990,777 UART: Caliptra RT
2,991,030 UART: [state] CFI Enabled
3,097,932 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,282 UART: [rt]cmd =0x494e464f, len=4
3,132,137 >>> mbox cmd response data (312 bytes)
3,132,138 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,569,485 >>> mbox cmd response: success
5,582,867 UART:
5,582,883 UART: Running Caliptra FMC ...
5,583,291 UART:
5,583,345 UART: [state] CFI Enabled
5,672,324 UART: [art] Extend RT PCRs Done
5,672,752 UART: [art] Lock RT PCRs Done
5,673,967 UART: [art] Populate DV Done
5,682,123 UART: [fht] FMC Alias Private Key: 7
5,683,237 UART: [art] Derive CDI
5,683,517 UART: [art] Store in in slot 0x4
5,769,186 UART: [art] Derive Key Pair
5,769,546 UART: [art] Store priv key in slot 0x5
5,782,626 UART: [art] Derive Key Pair - Done
5,797,289 UART: [art] Signing Cert with AUTHO
5,797,769 UART: RITY.KEYID = 7
5,813,253 UART: [art] Erasing AUTHORITY.KEYID = 7
5,814,018 UART: [art] PUB.X = E33902476A312F5726CED5EA8D4A57AF93594C4ECB641619315DFC4A7412B3261D239E8F722D031E313ABB7A5ACFA057
5,820,788 UART: [art] PUB.Y = 0258C2FD9A4113FEEA4CED1CCAABB66199C27F907577D69BA090E0990851DC8F0DA4E9F8AE1028ABF9E43963B30B4B50
5,827,742 UART: [art] SIG.R = 2F81E93F4202DB73DA9DCCF12F8B1B808CB1F109E8312B2DA612B5097D9810D6D9A5799C6D4A186AF204F6CC99044C49
5,834,505 UART: [art] SIG.S = 86B1270EB7DF099E942E36CEB96FE9C7FE137B7F760C8024724D54A668876257B78190C12CB3487EE78AB2E1DD03C863
5,857,750 UART: Caliptra RT
5,858,003 UART: [state] CFI Enabled
6,137,652 UART: [rt] RT listening for mailbox commands...
6,138,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,167,615 UART: [rt]cmd =0x494e464f, len=4
6,171,498 >>> mbox cmd response data (312 bytes)
6,171,499 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,608,362 >>> mbox cmd response: success
8,621,582 UART:
8,621,598 UART: Running Caliptra FMC ...
8,622,006 UART:
8,622,060 UART: [state] CFI Enabled
8,711,011 UART: [art] Extend RT PCRs Done
8,711,439 UART: [art] Lock RT PCRs Done
8,712,744 UART: [art] Populate DV Done
8,720,754 UART: [fht] FMC Alias Private Key: 7
8,721,836 UART: [art] Derive CDI
8,722,116 UART: [art] Store in in slot 0x4
8,807,233 UART: [art] Derive Key Pair
8,807,593 UART: [art] Store priv key in slot 0x5
8,820,495 UART: [art] Derive Key Pair - Done
8,835,002 UART: [art] Signing Cert with AUTHO
8,835,482 UART: RITY.KEYID = 7
8,850,314 UART: [art] Erasing AUTHORITY.KEYID = 7
8,851,079 UART: [art] PUB.X = 2161046997E1FF86933CA0D6F653A8D67A1BEAFFBD328A11211D3760297082227279D2CCDAA0FEDEF60CFF5E47125A55
8,857,851 UART: [art] PUB.Y = 678FDA81A54DDF1EE7FA88EF0B9CF49DBD802B4D56948B231B8991693F6EE61A6D300259B8D062E85D2EE579679C9F9C
8,864,807 UART: [art] SIG.R = A4A53E1785326AEDC85634FADDEE3257F157A95CBF0D5E1361E7B97667914157CB5A747C6CEAE4337B75F931DAEB8894
8,871,584 UART: [art] SIG.S = 4063B56ED44F3E67220DB560A0B270E79686E03095416C6CC6CD5B63FF229543C07991FD95D9DC6D130F3CCF49185AE0
8,896,085 UART: Caliptra RT
8,896,338 UART: [state] CFI Enabled
9,177,365 UART: [rt] RT listening for mailbox commands...
9,178,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,207,474 UART: [rt]cmd =0x494e464f, len=4
9,211,251 >>> mbox cmd response data (312 bytes)
9,211,252 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,648,595 >>> mbox cmd response: success
11,661,627 UART:
11,661,643 UART: Running Caliptra FMC ...
11,662,051 UART:
11,662,105 UART: [state] CFI Enabled
11,751,186 UART: [art] Extend RT PCRs Done
11,751,614 UART: [art] Lock RT PCRs Done
11,752,601 UART: [art] Populate DV Done
11,760,663 UART: [fht] FMC Alias Private Key: 7
11,761,625 UART: [art] Derive CDI
11,761,905 UART: [art] Store in in slot 0x4
11,847,434 UART: [art] Derive Key Pair
11,847,794 UART: [art] Store priv key in slot 0x5
11,860,690 UART: [art] Derive Key Pair - Done
11,875,327 UART: [art] Signing Cert with AUTHO
11,875,807 UART: RITY.KEYID = 7
11,890,905 UART: [art] Erasing AUTHORITY.KEYID = 7
11,891,670 UART: [art] PUB.X = E33902476A312F5726CED5EA8D4A57AF93594C4ECB641619315DFC4A7412B3261D239E8F722D031E313ABB7A5ACFA057
11,898,440 UART: [art] PUB.Y = 0258C2FD9A4113FEEA4CED1CCAABB66199C27F907577D69BA090E0990851DC8F0DA4E9F8AE1028ABF9E43963B30B4B50
11,905,394 UART: [art] SIG.R = 2F81E93F4202DB73DA9DCCF12F8B1B808CB1F109E8312B2DA612B5097D9810D6D9A5799C6D4A186AF204F6CC99044C49
11,912,157 UART: [art] SIG.S = 86B1270EB7DF099E942E36CEB96FE9C7FE137B7F760C8024724D54A668876257B78190C12CB3487EE78AB2E1DD03C863
11,935,754 UART: Caliptra RT
11,936,007 UART: [state] CFI Enabled
12,216,584 UART: [rt] RT listening for mailbox commands...
12,217,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,246,863 UART: [rt]cmd =0x494e464f, len=4
12,250,452 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.49s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,810 UART: [ldev] --
1,285,187 UART: [fwproc] Wait for Commands...
1,285,757 UART: [fwproc] Recv command 0x46574c44
1,286,485 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,320 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,624 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,331 >>> mbox cmd response: success
2,776,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,777,551 UART: [afmc] ++
2,777,719 UART: [afmc] CDI.KEYID = 6
2,778,081 UART: [afmc] SUBJECT.KEYID = 7
2,778,506 UART: [afmc] AUTHORITY.KEYID = 5
2,814,030 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,435 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,183 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,836,875 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,842,748 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,848,450 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,856,121 UART: [afmc] --
2,857,101 UART: [cold-reset] --
2,858,039 UART: [state] Locking Datavault
2,859,224 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,828 UART: [state] Locking ICCM
2,860,356 UART: [exit] Launching FMC @ 0x40000130
2,865,685 UART:
2,865,701 UART: Running Caliptra FMC ...
2,866,109 UART:
2,866,252 UART: [state] CFI Enabled
2,877,070 UART: [fht] FMC Alias Private Key: 7
2,985,195 UART: [art] Extend RT PCRs Done
2,985,623 UART: [art] Lock RT PCRs Done
2,987,073 UART: [art] Populate DV Done
2,995,273 UART: [fht] FMC Alias Private Key: 7
2,996,329 UART: [art] Derive CDI
2,996,609 UART: [art] Store in in slot 0x4
3,082,328 UART: [art] Derive Key Pair
3,082,688 UART: [art] Store priv key in slot 0x5
3,095,592 UART: [art] Derive Key Pair - Done
3,110,446 UART: [art] Signing Cert with AUTHO
3,110,926 UART: RITY.KEYID = 7
3,126,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,593 UART: [art] PUB.X = 3773B94A18F92A97063F1A3EB823BDA362C532B07FB2C2CBB111FB2F2F2B2AD65EB0C3EA7D9A6DBCA4CA1FEE02281161
3,134,379 UART: [art] PUB.Y = 9EC0674B84D77EF26A04EB6DE06C017EDF86EF3352B8955B016702EF73130B6D18FD9B84D85425193492C225A6DAFF8B
3,141,320 UART: [art] SIG.R = 1C19EE8B618A6BD8BF0B20D257A151278C23A8E2E2F338F1B5B659CFA44BB14BB741594DC8F25EAA6CD46CCFD0CEC869
3,148,109 UART: [art] SIG.S = 9B79759CD8106554F4ABB22AF15017BB49AA6CC2030F9851276DADD11239E2D5A6989BC6754E89C34110F8C7C5D7B6F0
3,172,588 UART: Caliptra RT
3,172,933 UART: [state] CFI Enabled
3,280,338 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,178 UART: [rt]cmd =0x494e464f, len=4
3,314,841 >>> mbox cmd response data (312 bytes)
3,314,842 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,577 UART:
3,315,593 UART: Running Caliptra ROM ...
3,316,001 UART:
3,316,143 UART: [state] CFI Enabled
3,319,209 UART: [state] LifecycleState = Unprovisioned
3,319,864 UART: [state] DebugLocked = No
3,320,350 UART: [state] WD Timer not started. Device not locked for debugging
3,321,654 UART: [kat] SHA2-256
4,127,304 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,131,429 UART: [kat] ++
4,131,581 UART: [kat] sha1
4,135,861 UART: [kat] SHA2-256
4,137,801 UART: [kat] SHA2-384
4,140,550 UART: [kat] SHA2-512-ACC
4,142,450 UART: [kat] ECC-384
4,152,035 UART: [kat] HMAC-384Kdf
4,156,467 UART: [kat] LMS
4,404,795 UART: [kat] --
4,405,673 UART: [update-reset] ++
5,718,552 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,719,645 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,869,469 >>> mbox cmd response: success
5,869,786 UART: [update-reset] Copying MAN_2 To MAN_1
5,877,800 UART: [update-reset Success] --
5,878,655 UART: [state] Locking Datavault
5,879,259 UART: [state] Locking PCR0, PCR1 and PCR31
5,879,863 UART: [state] Locking ICCM
5,880,389 UART: [exit] Launching FMC @ 0x40000130
5,885,718 UART:
5,885,734 UART: Running Caliptra FMC ...
5,886,142 UART:
5,886,285 UART: [state] CFI Enabled
5,975,396 UART: [art] Extend RT PCRs Done
5,975,824 UART: [art] Lock RT PCRs Done
5,976,919 UART: [art] Populate DV Done
5,985,133 UART: [fht] FMC Alias Private Key: 7
5,986,087 UART: [art] Derive CDI
5,986,367 UART: [art] Store in in slot 0x4
6,072,190 UART: [art] Derive Key Pair
6,072,550 UART: [art] Store priv key in slot 0x5
6,086,336 UART: [art] Derive Key Pair - Done
6,101,084 UART: [art] Signing Cert with AUTHO
6,101,564 UART: RITY.KEYID = 7
6,117,202 UART: [art] Erasing AUTHORITY.KEYID = 7
6,117,967 UART: [art] PUB.X = 42D3331235A6B567C3A44E0B6673C5E07AC606BFFAED2C487741AC84B09785371EB1DAF94604C935E1E9877456F13988
6,124,726 UART: [art] PUB.Y = 46B4BC28DADCA6170C40D40F8AF3F21CD65EDDB79644C99C781705F37A3FAD99B27374EB7A3256E38C283980568F6056
6,131,673 UART: [art] SIG.R = 1980FCD65213BC07464B3ABD007479C4C9FB7A954398371B6CCE18ED4005F60530FB034D4B192019A763333EE97D5951
6,138,405 UART: [art] SIG.S = B538D5786D1389D871C017542E18AB8391DEADE735E19EC7B0812A0BE20134E52CDDAA28330CACFD88FAB62CFC912823
6,161,875 UART: Caliptra RT
6,162,220 UART: [state] CFI Enabled
6,442,959 UART: [rt] RT listening for mailbox commands...
6,443,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,473,108 UART: [rt]cmd =0x494e464f, len=4
6,476,849 >>> mbox cmd response data (312 bytes)
6,476,850 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,477,773 UART:
6,477,789 UART: Running Caliptra ROM ...
6,478,197 UART:
6,478,339 UART: [state] CFI Enabled
6,481,129 UART: [state] LifecycleState = Unprovisioned
6,481,784 UART: [state] DebugLocked = No
6,482,268 UART: [state] WD Timer not started. Device not locked for debugging
6,483,440 UART: [kat] SHA2-256
7,289,090 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,293,215 UART: [kat] ++
7,293,367 UART: [kat] sha1
7,297,589 UART: [kat] SHA2-256
7,299,529 UART: [kat] SHA2-384
7,302,292 UART: [kat] SHA2-512-ACC
7,304,192 UART: [kat] ECC-384
7,313,931 UART: [kat] HMAC-384Kdf
7,318,647 UART: [kat] LMS
7,566,975 UART: [kat] --
7,567,783 UART: [update-reset] ++
8,881,148 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,882,311 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
9,032,135 >>> mbox cmd response: success
9,032,396 UART: [update-reset] Copying MAN_2 To MAN_1
9,040,410 UART: [update-reset Success] --
9,041,331 UART: [state] Locking Datavault
9,042,303 UART: [state] Locking PCR0, PCR1 and PCR31
9,042,907 UART: [state] Locking ICCM
9,043,395 UART: [exit] Launching FMC @ 0x40000130
9,048,724 UART:
9,048,740 UART: Running Caliptra FMC ...
9,049,148 UART:
9,049,291 UART: [state] CFI Enabled
9,138,510 UART: [art] Extend RT PCRs Done
9,138,938 UART: [art] Lock RT PCRs Done
9,140,453 UART: [art] Populate DV Done
9,148,741 UART: [fht] FMC Alias Private Key: 7
9,149,701 UART: [art] Derive CDI
9,149,981 UART: [art] Store in in slot 0x4
9,235,464 UART: [art] Derive Key Pair
9,235,824 UART: [art] Store priv key in slot 0x5
9,249,230 UART: [art] Derive Key Pair - Done
9,263,794 UART: [art] Signing Cert with AUTHO
9,264,274 UART: RITY.KEYID = 7
9,279,186 UART: [art] Erasing AUTHORITY.KEYID = 7
9,279,951 UART: [art] PUB.X = 40DAEEC066C1E50A887B82297ED8B94413C4CE7492AD816A18916B9B0AED06FCC1C2860D66FFEC027E0A9A546A9E02FB
9,286,716 UART: [art] PUB.Y = 7197F0DAA4FC13C9AAE2111CE2F596FFAEF5B6518ACC9E7FBBEEBEF915A453BA740E2632CA62F571965A08819B2E72A1
9,293,682 UART: [art] SIG.R = F5C1D56F62A2F468D11E24DE76F558B076A436BEAFA35119D3985A60B723B41D01E8685F058C6C7E86FD9EE01BF61F57
9,300,454 UART: [art] SIG.S = B235D2890CE524A0B893A91EA6ABD4AE4D5A644BB366129A047FFEA0607A98DCFD67EB89BED82A832FE56A36A9A0215D
9,324,139 UART: Caliptra RT
9,324,484 UART: [state] CFI Enabled
9,607,071 UART: [rt] RT listening for mailbox commands...
9,607,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,636,988 UART: [rt]cmd =0x494e464f, len=4
9,640,925 >>> mbox cmd response data (312 bytes)
9,640,926 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,641,623 UART:
9,641,639 UART: Running Caliptra ROM ...
9,642,047 UART:
9,642,189 UART: [state] CFI Enabled
9,645,065 UART: [state] LifecycleState = Unprovisioned
9,645,720 UART: [state] DebugLocked = No
9,646,278 UART: [state] WD Timer not started. Device not locked for debugging
9,647,534 UART: [kat] SHA2-256
10,453,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,457,309 UART: [kat] ++
10,457,461 UART: [kat] sha1
10,461,713 UART: [kat] SHA2-256
10,463,653 UART: [kat] SHA2-384
10,466,434 UART: [kat] SHA2-512-ACC
10,468,334 UART: [kat] ECC-384
10,477,967 UART: [kat] HMAC-384Kdf
10,482,473 UART: [kat] LMS
10,730,801 UART: [kat] --
10,731,631 UART: [update-reset] ++
12,044,210 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,045,383 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
12,195,207 >>> mbox cmd response: success
12,195,382 UART: [update-reset] Copying MAN_2 To MAN_1
12,203,396 UART: [update-reset Success] --
12,204,581 UART: [state] Locking Datavault
12,205,193 UART: [state] Locking PCR0, PCR1 and PCR31
12,205,797 UART: [state] Locking ICCM
12,206,255 UART: [exit] Launching FMC @ 0x40000130
12,211,584 UART:
12,211,600 UART: Running Caliptra FMC ...
12,212,008 UART:
12,212,151 UART: [state] CFI Enabled
12,301,518 UART: [art] Extend RT PCRs Done
12,301,946 UART: [art] Lock RT PCRs Done
12,303,351 UART: [art] Populate DV Done
12,311,649 UART: [fht] FMC Alias Private Key: 7
12,312,661 UART: [art] Derive CDI
12,312,941 UART: [art] Store in in slot 0x4
12,398,540 UART: [art] Derive Key Pair
12,398,900 UART: [art] Store priv key in slot 0x5
12,412,280 UART: [art] Derive Key Pair - Done
12,426,638 UART: [art] Signing Cert with AUTHO
12,427,118 UART: RITY.KEYID = 7
12,442,550 UART: [art] Erasing AUTHORITY.KEYID = 7
12,443,315 UART: [art] PUB.X = 42D3331235A6B567C3A44E0B6673C5E07AC606BFFAED2C487741AC84B09785371EB1DAF94604C935E1E9877456F13988
12,450,074 UART: [art] PUB.Y = 46B4BC28DADCA6170C40D40F8AF3F21CD65EDDB79644C99C781705F37A3FAD99B27374EB7A3256E38C283980568F6056
12,457,021 UART: [art] SIG.R = 1980FCD65213BC07464B3ABD007479C4C9FB7A954398371B6CCE18ED4005F60530FB034D4B192019A763333EE97D5951
12,463,753 UART: [art] SIG.S = B538D5786D1389D871C017542E18AB8391DEADE735E19EC7B0812A0BE20134E52CDDAA28330CACFD88FAB62CFC912823
12,487,981 UART: Caliptra RT
12,488,326 UART: [state] CFI Enabled
12,765,703 UART: [rt] RT listening for mailbox commands...
12,766,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,795,874 UART: [rt]cmd =0x494e464f, len=4
12,799,491 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,294 ready_for_fw is high
1,060,294 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,850 >>> mbox cmd response: success
2,625,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,689,161 UART:
2,689,177 UART: Running Caliptra FMC ...
2,689,585 UART:
2,689,728 UART: [state] CFI Enabled
2,700,144 UART: [fht] FMC Alias Private Key: 7
2,808,003 UART: [art] Extend RT PCRs Done
2,808,431 UART: [art] Lock RT PCRs Done
2,810,187 UART: [art] Populate DV Done
2,818,655 UART: [fht] FMC Alias Private Key: 7
2,819,645 UART: [art] Derive CDI
2,819,925 UART: [art] Store in in slot 0x4
2,905,414 UART: [art] Derive Key Pair
2,905,774 UART: [art] Store priv key in slot 0x5
2,918,808 UART: [art] Derive Key Pair - Done
2,933,563 UART: [art] Signing Cert with AUTHO
2,934,043 UART: RITY.KEYID = 7
2,949,139 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,904 UART: [art] PUB.X = A3138DF49E7F4FBF0DC77F8A085390712AB06A6460514E911827CF077B4D5A48C85DBEAE790B580279C4199AAEC0ED17
2,956,667 UART: [art] PUB.Y = B370810A1F6AEA42A8E282767DCC229941B172706DF239BF798A1D95EDEE9A0A60E9B0E1223EBFB312BB5B22266084BB
2,963,621 UART: [art] SIG.R = 3D0DB540CD3761DB10524DEF5CD530D6821137B47F53FEDF5952B9B7E165FDC8C33517779F55DCC2EBB5D1B233DF9798
2,970,400 UART: [art] SIG.S = 8165686F64A9C4B0F4C41CB6033F3832AC3DC11F193C3578296AFA6B3746D8613157B9553D317A5D1406377D4B579D87
2,994,573 UART: Caliptra RT
2,994,918 UART: [state] CFI Enabled
3,102,305 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,491 UART: [rt]cmd =0x494e464f, len=4
3,136,288 >>> mbox cmd response data (312 bytes)
3,136,289 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,572,897 >>> mbox cmd response: success
5,585,919 UART:
5,585,935 UART: Running Caliptra FMC ...
5,586,343 UART:
5,586,486 UART: [state] CFI Enabled
5,675,605 UART: [art] Extend RT PCRs Done
5,676,033 UART: [art] Lock RT PCRs Done
5,677,024 UART: [art] Populate DV Done
5,685,310 UART: [fht] FMC Alias Private Key: 7
5,686,300 UART: [art] Derive CDI
5,686,580 UART: [art] Store in in slot 0x4
5,772,005 UART: [art] Derive Key Pair
5,772,365 UART: [art] Store priv key in slot 0x5
5,785,999 UART: [art] Derive Key Pair - Done
5,801,097 UART: [art] Signing Cert with AUTHO
5,801,577 UART: RITY.KEYID = 7
5,816,641 UART: [art] Erasing AUTHORITY.KEYID = 7
5,817,406 UART: [art] PUB.X = 4EC6DEC423B4E2C03A05CBCDB0EE88CAFB35E4B7C53DFD3BB423C8C53A2A761B91B65E082E1CED3111CABEB379421FBD
5,824,202 UART: [art] PUB.Y = FBAF59A2B79CCF32E20536302E012051A262B6DC2EC4D1381D9ED50940DBC0321AE648ABE281628A983E774EB1AC605A
5,831,153 UART: [art] SIG.R = 7CCFD2D500D3CCDCA51D8F246852CB363E366D7ED4E445B8838D88C28DA4F98E08A6C2FBF781CAE205E6BA358F527FF4
5,837,915 UART: [art] SIG.S = 190FB1CDDB703BDA48167E90EEA057427C57A6FB1413B5B6151A16A3B3003F7D535264E28AE769DEAAE2ABDE8826E695
5,861,735 UART: Caliptra RT
5,862,080 UART: [state] CFI Enabled
6,144,804 UART: [rt] RT listening for mailbox commands...
6,145,474 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,174,841 UART: [rt]cmd =0x494e464f, len=4
6,178,390 >>> mbox cmd response data (312 bytes)
6,178,391 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,617,607 >>> mbox cmd response: success
8,631,105 UART:
8,631,121 UART: Running Caliptra FMC ...
8,631,529 UART:
8,631,672 UART: [state] CFI Enabled
8,720,291 UART: [art] Extend RT PCRs Done
8,720,719 UART: [art] Lock RT PCRs Done
8,721,944 UART: [art] Populate DV Done
8,730,140 UART: [fht] FMC Alias Private Key: 7
8,731,176 UART: [art] Derive CDI
8,731,456 UART: [art] Store in in slot 0x4
8,817,099 UART: [art] Derive Key Pair
8,817,459 UART: [art] Store priv key in slot 0x5
8,831,005 UART: [art] Derive Key Pair - Done
8,846,009 UART: [art] Signing Cert with AUTHO
8,846,489 UART: RITY.KEYID = 7
8,861,811 UART: [art] Erasing AUTHORITY.KEYID = 7
8,862,576 UART: [art] PUB.X = 0BFB42635B08B9CD78572FF98BB9EC60C5CB73EE026CF5B02277E9936210816DCC0C09CFDD06DF0F738AF928C0010A97
8,869,331 UART: [art] PUB.Y = 1BE11DF38ADA59CE04BFA1ECD4928FC3C14F9FE18F9E138DFD74EC38997A4F539103A1E5961A018C3BF83F2D4589B37F
8,876,290 UART: [art] SIG.R = 651F7E4C30855ADEEB6B1FA82682A1BBC0C25F0AE3CC57E54AF4CD85BA6378624E38B1427B43E84B635FB9549B203035
8,883,067 UART: [art] SIG.S = 121747C6F0439C82B9A57F77BA671FB0C47D354068E84861A2BFD0B07C7BDED56A65A4D85601C9A01724F3DC64D3B287
8,906,385 UART: Caliptra RT
8,906,730 UART: [state] CFI Enabled
9,182,978 UART: [rt] RT listening for mailbox commands...
9,183,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,213,161 UART: [rt]cmd =0x494e464f, len=4
9,216,926 >>> mbox cmd response data (312 bytes)
9,216,927 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,654,365 >>> mbox cmd response: success
11,667,633 UART:
11,667,649 UART: Running Caliptra FMC ...
11,668,057 UART:
11,668,200 UART: [state] CFI Enabled
11,757,707 UART: [art] Extend RT PCRs Done
11,758,135 UART: [art] Lock RT PCRs Done
11,759,288 UART: [art] Populate DV Done
11,767,408 UART: [fht] FMC Alias Private Key: 7
11,768,356 UART: [art] Derive CDI
11,768,636 UART: [art] Store in in slot 0x4
11,854,327 UART: [art] Derive Key Pair
11,854,687 UART: [art] Store priv key in slot 0x5
11,868,129 UART: [art] Derive Key Pair - Done
11,882,627 UART: [art] Signing Cert with AUTHO
11,883,107 UART: RITY.KEYID = 7
11,898,747 UART: [art] Erasing AUTHORITY.KEYID = 7
11,899,512 UART: [art] PUB.X = 4EC6DEC423B4E2C03A05CBCDB0EE88CAFB35E4B7C53DFD3BB423C8C53A2A761B91B65E082E1CED3111CABEB379421FBD
11,906,308 UART: [art] PUB.Y = FBAF59A2B79CCF32E20536302E012051A262B6DC2EC4D1381D9ED50940DBC0321AE648ABE281628A983E774EB1AC605A
11,913,259 UART: [art] SIG.R = 7CCFD2D500D3CCDCA51D8F246852CB363E366D7ED4E445B8838D88C28DA4F98E08A6C2FBF781CAE205E6BA358F527FF4
11,920,021 UART: [art] SIG.S = 190FB1CDDB703BDA48167E90EEA057427C57A6FB1413B5B6151A16A3B3003F7D535264E28AE769DEAAE2ABDE8826E695
11,943,731 UART: Caliptra RT
11,944,076 UART: [state] CFI Enabled
12,226,710 UART: [rt] RT listening for mailbox commands...
12,227,380 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,257,191 UART: [rt]cmd =0x494e464f, len=4
12,261,062 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.63s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,644 UART: [ldev] --
1,281,006 UART: [fwproc] Wait for Commands...
1,281,759 UART: [fwproc] Recv command 0x46574c44
1,282,492 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,289 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,693 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,002 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,698 >>> mbox cmd response: success
2,770,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,771,925 UART: [afmc] ++
2,772,093 UART: [afmc] CDI.KEYID = 6
2,772,456 UART: [afmc] SUBJECT.KEYID = 7
2,772,882 UART: [afmc] AUTHORITY.KEYID = 5
2,807,904 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,620 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,371 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,831,064 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,836,935 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,842,637 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,850,553 UART: [afmc] --
2,851,447 UART: [cold-reset] --
2,852,307 UART: [state] Locking Datavault
2,853,386 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,990 UART: [state] Locking ICCM
2,854,494 UART: [exit] Launching FMC @ 0x40000130
2,859,823 UART:
2,859,839 UART: Running Caliptra FMC ...
2,860,247 UART:
2,860,301 UART: [state] CFI Enabled
2,870,591 UART: [fht] FMC Alias Private Key: 7
2,978,184 UART: [art] Extend RT PCRs Done
2,978,612 UART: [art] Lock RT PCRs Done
2,980,210 UART: [art] Populate DV Done
2,988,786 UART: [fht] FMC Alias Private Key: 7
2,989,908 UART: [art] Derive CDI
2,990,188 UART: [art] Store in in slot 0x4
3,075,579 UART: [art] Derive Key Pair
3,075,939 UART: [art] Store priv key in slot 0x5
3,088,781 UART: [art] Derive Key Pair - Done
3,103,206 UART: [art] Signing Cert with AUTHO
3,103,686 UART: RITY.KEYID = 7
3,119,054 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,819 UART: [art] PUB.X = B33FD2C707A0476391EDAA551C3D231DE0A8101E6B70A85FFC5328589F6F7B1F54CFA093715A81307626E99EFD9C7B63
3,126,592 UART: [art] PUB.Y = 15BE74DDBFB512C62859B910F9CB3144B7846AAA0B3D0EDFB99BADCC4A78F2F830E7A0B6E6EE691B6F1F23DF7839A119
3,133,558 UART: [art] SIG.R = FA51879A52AD9F058321CD50DF7F7CE11FA2CB0B46C20C99055FAE349DCAE04A8B5938F92333935BED58DCBA7EB8C15D
3,140,336 UART: [art] SIG.S = 63944ED66EF03FF9013E0E714A741EDD9C4604B5684DE7FD8F0E8A707CEF1BC66E528E843FCD61C30FF7C23630148312
3,163,728 UART: Caliptra RT
3,163,981 UART: [state] CFI Enabled
3,271,858 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,546 UART: [rt]cmd =0x494e464f, len=4
3,306,233 >>> mbox cmd response data (312 bytes)
3,306,234 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,055 UART:
3,307,071 UART: Running Caliptra ROM ...
3,307,479 UART:
3,307,534 UART: [state] CFI Enabled
3,309,894 UART: [state] LifecycleState = Unprovisioned
3,310,549 UART: [state] DebugLocked = No
3,311,165 UART: [state] WD Timer not started. Device not locked for debugging
3,312,281 UART: [kat] SHA2-256
4,115,831 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,119,960 UART: [kat] ++
4,120,112 UART: [kat] sha1
4,124,374 UART: [kat] SHA2-256
4,126,314 UART: [kat] SHA2-384
4,129,097 UART: [kat] SHA2-512-ACC
4,130,997 UART: [kat] ECC-384
4,141,072 UART: [kat] HMAC-384Kdf
4,145,698 UART: [kat] LMS
4,394,010 UART: [kat] --
4,394,962 UART: [update-reset] ++
5,707,360 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,708,403 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,858,227 >>> mbox cmd response: success
5,858,366 UART: [update-reset] Copying MAN_2 To MAN_1
5,866,380 UART: [update-reset Success] --
5,867,463 UART: [state] Locking Datavault
5,868,345 UART: [state] Locking PCR0, PCR1 and PCR31
5,868,949 UART: [state] Locking ICCM
5,869,389 UART: [exit] Launching FMC @ 0x40000130
5,874,718 UART:
5,874,734 UART: Running Caliptra FMC ...
5,875,142 UART:
5,875,196 UART: [state] CFI Enabled
5,964,835 UART: [art] Extend RT PCRs Done
5,965,263 UART: [art] Lock RT PCRs Done
5,966,738 UART: [art] Populate DV Done
5,974,636 UART: [fht] FMC Alias Private Key: 7
5,975,750 UART: [art] Derive CDI
5,976,030 UART: [art] Store in in slot 0x4
6,061,913 UART: [art] Derive Key Pair
6,062,273 UART: [art] Store priv key in slot 0x5
6,075,301 UART: [art] Derive Key Pair - Done
6,090,146 UART: [art] Signing Cert with AUTHO
6,090,626 UART: RITY.KEYID = 7
6,105,672 UART: [art] Erasing AUTHORITY.KEYID = 7
6,106,437 UART: [art] PUB.X = 127BFA3782BFA302CC899CD5B7C9ABB2B3F5434C21BF70C073683496FAE4B1171EB81649D54C5C1EAACEA75B6E725D9D
6,113,222 UART: [art] PUB.Y = 46A77296607CB22146ECC8DF6B57A1503218F36A59E5E613728B0812939775B59EBAD1D4C62F4C9552A0A397AC8A9D36
6,120,167 UART: [art] SIG.R = 0AD6569185D99176FB722FEEB9E13D39BCB181AD590D710FD59A1C9BF520585CED0ADCA9981D843841B917E487A8FB2E
6,126,937 UART: [art] SIG.S = 202F67836A7036476660570AF1982F028B49E1DAA891BA72D13BC9E83E8CEE4354CD7983519CD32D97660BB707A34D6C
6,150,582 UART: Caliptra RT
6,150,835 UART: [state] CFI Enabled
6,436,371 UART: [rt] RT listening for mailbox commands...
6,437,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,466,520 UART: [rt]cmd =0x494e464f, len=4
6,470,207 >>> mbox cmd response data (312 bytes)
6,470,208 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,470,869 UART:
6,470,885 UART: Running Caliptra ROM ...
6,471,293 UART:
6,471,348 UART: [state] CFI Enabled
6,474,422 UART: [state] LifecycleState = Unprovisioned
6,475,077 UART: [state] DebugLocked = No
6,475,759 UART: [state] WD Timer not started. Device not locked for debugging
6,477,067 UART: [kat] SHA2-256
7,280,617 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,284,746 UART: [kat] ++
7,284,898 UART: [kat] sha1
7,289,048 UART: [kat] SHA2-256
7,290,988 UART: [kat] SHA2-384
7,293,781 UART: [kat] SHA2-512-ACC
7,295,681 UART: [kat] ECC-384
7,305,386 UART: [kat] HMAC-384Kdf
7,310,070 UART: [kat] LMS
7,558,382 UART: [kat] --
7,559,130 UART: [update-reset] ++
8,870,540 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,871,667 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
9,021,491 >>> mbox cmd response: success
9,021,832 UART: [update-reset] Copying MAN_2 To MAN_1
9,029,846 UART: [update-reset Success] --
9,030,875 UART: [state] Locking Datavault
9,031,631 UART: [state] Locking PCR0, PCR1 and PCR31
9,032,235 UART: [state] Locking ICCM
9,032,827 UART: [exit] Launching FMC @ 0x40000130
9,038,156 UART:
9,038,172 UART: Running Caliptra FMC ...
9,038,580 UART:
9,038,634 UART: [state] CFI Enabled
9,127,551 UART: [art] Extend RT PCRs Done
9,127,979 UART: [art] Lock RT PCRs Done
9,129,376 UART: [art] Populate DV Done
9,137,826 UART: [fht] FMC Alias Private Key: 7
9,138,828 UART: [art] Derive CDI
9,139,108 UART: [art] Store in in slot 0x4
9,224,793 UART: [art] Derive Key Pair
9,225,153 UART: [art] Store priv key in slot 0x5
9,238,739 UART: [art] Derive Key Pair - Done
9,253,493 UART: [art] Signing Cert with AUTHO
9,253,973 UART: RITY.KEYID = 7
9,269,441 UART: [art] Erasing AUTHORITY.KEYID = 7
9,270,206 UART: [art] PUB.X = 1C8E3947F4DA02B85D892444891149DD9111069FBFD08B62262C061474664FF26E23CFEA43953102C685506A5CE922C9
9,276,956 UART: [art] PUB.Y = 4AF4A42147EBF1977EB0A24330F024B4D9BAC8FFBACE91420ADBA305DA7627059EBC40E81CA6CA30047FFA0020527B54
9,283,888 UART: [art] SIG.R = 17E3DDB8639EB20545F61A0EC950EAFB2B6025B4C21CEF4825B1C7CC938FEDDF52F7AEC4F8B0EF58F8765690C82AE3F1
9,290,674 UART: [art] SIG.S = 0E4A2635C18BF8C089EE9ABE053DB804CB02B7AFBFB3C965185C6B9EC56AB908605808676B425798502875DDE7FAEE03
9,314,840 UART: Caliptra RT
9,315,093 UART: [state] CFI Enabled
9,597,459 UART: [rt] RT listening for mailbox commands...
9,598,129 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,627,632 UART: [rt]cmd =0x494e464f, len=4
9,631,495 >>> mbox cmd response data (312 bytes)
9,631,496 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,632,459 UART:
9,632,475 UART: Running Caliptra ROM ...
9,632,883 UART:
9,632,938 UART: [state] CFI Enabled
9,635,190 UART: [state] LifecycleState = Unprovisioned
9,635,845 UART: [state] DebugLocked = No
9,636,455 UART: [state] WD Timer not started. Device not locked for debugging
9,637,699 UART: [kat] SHA2-256
10,441,249 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,445,378 UART: [kat] ++
10,445,530 UART: [kat] sha1
10,449,762 UART: [kat] SHA2-256
10,451,702 UART: [kat] SHA2-384
10,454,413 UART: [kat] SHA2-512-ACC
10,456,313 UART: [kat] ECC-384
10,466,594 UART: [kat] HMAC-384Kdf
10,471,366 UART: [kat] LMS
10,719,678 UART: [kat] --
10,720,724 UART: [update-reset] ++
12,032,642 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,033,779 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
12,183,603 >>> mbox cmd response: success
12,183,740 UART: [update-reset] Copying MAN_2 To MAN_1
12,191,754 UART: [update-reset Success] --
12,192,697 UART: [state] Locking Datavault
12,193,449 UART: [state] Locking PCR0, PCR1 and PCR31
12,194,053 UART: [state] Locking ICCM
12,194,557 UART: [exit] Launching FMC @ 0x40000130
12,199,886 UART:
12,199,902 UART: Running Caliptra FMC ...
12,200,310 UART:
12,200,364 UART: [state] CFI Enabled
12,288,961 UART: [art] Extend RT PCRs Done
12,289,389 UART: [art] Lock RT PCRs Done
12,290,786 UART: [art] Populate DV Done
12,298,862 UART: [fht] FMC Alias Private Key: 7
12,299,888 UART: [art] Derive CDI
12,300,168 UART: [art] Store in in slot 0x4
12,385,903 UART: [art] Derive Key Pair
12,386,263 UART: [art] Store priv key in slot 0x5
12,399,005 UART: [art] Derive Key Pair - Done
12,413,890 UART: [art] Signing Cert with AUTHO
12,414,370 UART: RITY.KEYID = 7
12,429,716 UART: [art] Erasing AUTHORITY.KEYID = 7
12,430,481 UART: [art] PUB.X = 127BFA3782BFA302CC899CD5B7C9ABB2B3F5434C21BF70C073683496FAE4B1171EB81649D54C5C1EAACEA75B6E725D9D
12,437,266 UART: [art] PUB.Y = 46A77296607CB22146ECC8DF6B57A1503218F36A59E5E613728B0812939775B59EBAD1D4C62F4C9552A0A397AC8A9D36
12,444,211 UART: [art] SIG.R = 0AD6569185D99176FB722FEEB9E13D39BCB181AD590D710FD59A1C9BF520585CED0ADCA9981D843841B917E487A8FB2E
12,450,981 UART: [art] SIG.S = 202F67836A7036476660570AF1982F028B49E1DAA891BA72D13BC9E83E8CEE4354CD7983519CD32D97660BB707A34D6C
12,475,062 UART: Caliptra RT
12,475,315 UART: [state] CFI Enabled
12,759,195 UART: [rt] RT listening for mailbox commands...
12,759,865 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,789,504 UART: [rt]cmd =0x494e464f, len=4
12,793,181 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,520 ready_for_fw is high
1,056,520 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,540 >>> mbox cmd response: success
2,623,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,685,675 UART:
2,685,691 UART: Running Caliptra FMC ...
2,686,099 UART:
2,686,153 UART: [state] CFI Enabled
2,696,709 UART: [fht] FMC Alias Private Key: 7
2,804,160 UART: [art] Extend RT PCRs Done
2,804,588 UART: [art] Lock RT PCRs Done
2,806,008 UART: [art] Populate DV Done
2,814,182 UART: [fht] FMC Alias Private Key: 7
2,815,210 UART: [art] Derive CDI
2,815,490 UART: [art] Store in in slot 0x4
2,901,327 UART: [art] Derive Key Pair
2,901,687 UART: [art] Store priv key in slot 0x5
2,914,857 UART: [art] Derive Key Pair - Done
2,929,796 UART: [art] Signing Cert with AUTHO
2,930,276 UART: RITY.KEYID = 7
2,945,136 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,901 UART: [art] PUB.X = 1676C445D67791F2EDAE170C6D1BCA78D184CFA02E1381D68982C92936D9FAD040DF34B10F2C55F5F109E3075473B62B
2,952,663 UART: [art] PUB.Y = E1CBE16D2E9AC179461F6E5EB8FA51D635613134145EE304DEF39399643C49F3D402C1D3F98845AA2FB2C45E9F06BAED
2,959,616 UART: [art] SIG.R = B13A6E51B8DD6796763BC9EB34FADA44833D30C21048174F9FF1C64ACC5B202FEB5C9E2CD25E146B3D494C651CE2CBDF
2,966,406 UART: [art] SIG.S = FDF3157FA1AE2A15BBB40C29FBC376AC3F4BF6E75B2DF39FF69B403F7DA69B796C6C40C63D6055ED648BB6BC34121772
2,989,500 UART: Caliptra RT
2,989,753 UART: [state] CFI Enabled
3,096,348 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,816 UART: [rt]cmd =0x494e464f, len=4
3,130,665 >>> mbox cmd response data (312 bytes)
3,130,666 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,563,678 >>> mbox cmd response: success
5,577,046 UART:
5,577,062 UART: Running Caliptra FMC ...
5,577,470 UART:
5,577,524 UART: [state] CFI Enabled
5,666,827 UART: [art] Extend RT PCRs Done
5,667,255 UART: [art] Lock RT PCRs Done
5,668,866 UART: [art] Populate DV Done
5,677,176 UART: [fht] FMC Alias Private Key: 7
5,678,302 UART: [art] Derive CDI
5,678,582 UART: [art] Store in in slot 0x4
5,764,027 UART: [art] Derive Key Pair
5,764,387 UART: [art] Store priv key in slot 0x5
5,778,113 UART: [art] Derive Key Pair - Done
5,793,048 UART: [art] Signing Cert with AUTHO
5,793,528 UART: RITY.KEYID = 7
5,808,766 UART: [art] Erasing AUTHORITY.KEYID = 7
5,809,531 UART: [art] PUB.X = 0C9DAE76896CD740193E10D194C095813F2FEA4142964A639BAF035992C1F277B02B5AF2B0BAAE3074E8C22A7F5EF0EC
5,816,305 UART: [art] PUB.Y = 2C21B84C3EAC50E6D2D80DE8141E0F7425B704839B15A6D7F42267B0BAD7825B5B47C2095E80F5986C95622660D46EA5
5,823,243 UART: [art] SIG.R = 8C2CAF9E8463642095E6FF7AAB84EFB087252D39099416AFC8D2E30B4B1FF03EC5FB2A9B2AF75C92E8C0626022BF7F4F
5,830,023 UART: [art] SIG.S = 07B3F0309110174CD005CA16F0CF1AF64D3024E408721E164CFDBF33A7C7B90F7ED4245EBE0BDC9D24C599F1C4806D90
5,854,027 UART: Caliptra RT
5,854,280 UART: [state] CFI Enabled
6,136,317 UART: [rt] RT listening for mailbox commands...
6,136,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,166,446 UART: [rt]cmd =0x494e464f, len=4
6,170,199 >>> mbox cmd response data (312 bytes)
6,170,200 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,602,134 >>> mbox cmd response: success
8,615,512 UART:
8,615,528 UART: Running Caliptra FMC ...
8,615,936 UART:
8,615,990 UART: [state] CFI Enabled
8,705,685 UART: [art] Extend RT PCRs Done
8,706,113 UART: [art] Lock RT PCRs Done
8,707,234 UART: [art] Populate DV Done
8,715,562 UART: [fht] FMC Alias Private Key: 7
8,716,496 UART: [art] Derive CDI
8,716,776 UART: [art] Store in in slot 0x4
8,802,219 UART: [art] Derive Key Pair
8,802,579 UART: [art] Store priv key in slot 0x5
8,815,399 UART: [art] Derive Key Pair - Done
8,830,093 UART: [art] Signing Cert with AUTHO
8,830,573 UART: RITY.KEYID = 7
8,845,527 UART: [art] Erasing AUTHORITY.KEYID = 7
8,846,292 UART: [art] PUB.X = BE9D70918A64621A9D5A5A8F8F55D225994F60C6508348B9DE67956FC4813E227D0AD4B8EFAA38953AF725DD5BAD3B55
8,853,067 UART: [art] PUB.Y = 9E0A7602C4CCA3176AE9D6D5CDB4B990BE7B5C7A9F8201E69D78721384AA94645431F4AAC3ED0D21F57C299C26C18808
8,860,010 UART: [art] SIG.R = 368B842942531BE355B95BF6DB5DA51D6EB09CF06ECA603417586760F2B4A0F1F8150B534377AF534FEBF0B0B889C832
8,866,781 UART: [art] SIG.S = 356D2A937BB11775C560D56C72429F00AD770C725AE3D6772B2DFD1F57B31867121BEA9A67A307042E26DFB32F9F7B45
8,889,987 UART: Caliptra RT
8,890,240 UART: [state] CFI Enabled
9,171,886 UART: [rt] RT listening for mailbox commands...
9,172,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,201,917 UART: [rt]cmd =0x494e464f, len=4
9,205,662 >>> mbox cmd response data (312 bytes)
9,205,663 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,636,831 >>> mbox cmd response: success
11,649,891 UART:
11,649,907 UART: Running Caliptra FMC ...
11,650,315 UART:
11,650,369 UART: [state] CFI Enabled
11,739,190 UART: [art] Extend RT PCRs Done
11,739,618 UART: [art] Lock RT PCRs Done
11,741,239 UART: [art] Populate DV Done
11,749,563 UART: [fht] FMC Alias Private Key: 7
11,750,683 UART: [art] Derive CDI
11,750,963 UART: [art] Store in in slot 0x4
11,836,878 UART: [art] Derive Key Pair
11,837,238 UART: [art] Store priv key in slot 0x5
11,850,094 UART: [art] Derive Key Pair - Done
11,864,941 UART: [art] Signing Cert with AUTHO
11,865,421 UART: RITY.KEYID = 7
11,880,805 UART: [art] Erasing AUTHORITY.KEYID = 7
11,881,570 UART: [art] PUB.X = 0C9DAE76896CD740193E10D194C095813F2FEA4142964A639BAF035992C1F277B02B5AF2B0BAAE3074E8C22A7F5EF0EC
11,888,344 UART: [art] PUB.Y = 2C21B84C3EAC50E6D2D80DE8141E0F7425B704839B15A6D7F42267B0BAD7825B5B47C2095E80F5986C95622660D46EA5
11,895,282 UART: [art] SIG.R = 8C2CAF9E8463642095E6FF7AAB84EFB087252D39099416AFC8D2E30B4B1FF03EC5FB2A9B2AF75C92E8C0626022BF7F4F
11,902,062 UART: [art] SIG.S = 07B3F0309110174CD005CA16F0CF1AF64D3024E408721E164CFDBF33A7C7B90F7ED4245EBE0BDC9D24C599F1C4806D90
11,925,748 UART: Caliptra RT
11,926,001 UART: [state] CFI Enabled
12,204,314 UART: [rt] RT listening for mailbox commands...
12,204,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,234,661 UART: [rt]cmd =0x494e464f, len=4
12,238,430 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.52s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,943 UART: [ldev] --
1,281,307 UART: [fwproc] Wait for Commands...
1,281,984 UART: [fwproc] Recv command 0x46574c44
1,282,717 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,036 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,345 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,149 >>> mbox cmd response: success
2,771,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,772,282 UART: [afmc] ++
2,772,450 UART: [afmc] CDI.KEYID = 6
2,772,813 UART: [afmc] SUBJECT.KEYID = 7
2,773,239 UART: [afmc] AUTHORITY.KEYID = 5
2,808,643 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,509 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,260 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,831,953 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,837,824 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,843,526 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,851,514 UART: [afmc] --
2,852,494 UART: [cold-reset] --
2,853,352 UART: [state] Locking Datavault
2,854,557 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,161 UART: [state] Locking ICCM
2,855,777 UART: [exit] Launching FMC @ 0x40000130
2,861,106 UART:
2,861,122 UART: Running Caliptra FMC ...
2,861,530 UART:
2,861,673 UART: [state] CFI Enabled
2,871,931 UART: [fht] FMC Alias Private Key: 7
2,979,702 UART: [art] Extend RT PCRs Done
2,980,130 UART: [art] Lock RT PCRs Done
2,981,560 UART: [art] Populate DV Done
2,989,800 UART: [fht] FMC Alias Private Key: 7
2,990,776 UART: [art] Derive CDI
2,991,056 UART: [art] Store in in slot 0x4
3,077,007 UART: [art] Derive Key Pair
3,077,367 UART: [art] Store priv key in slot 0x5
3,090,781 UART: [art] Derive Key Pair - Done
3,105,474 UART: [art] Signing Cert with AUTHO
3,105,954 UART: RITY.KEYID = 7
3,121,034 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,799 UART: [art] PUB.X = 1E35EA3EFA87B21F6A555D89A66B1CDBF5829FEFB0F09364DAE75CF5DD7BF693681E518C494D5572F30164D09CE7E799
3,128,580 UART: [art] PUB.Y = EA8CAB499E51B5D35B6CD3667EB00EB20BF741DE576B07965723DF9A3168FAC8877A73654119F3EB4D9AD29F27F000D8
3,135,509 UART: [art] SIG.R = 03ACCBB0CF559EE544ABF11D6488AC7CE9105463B31759C3433A23B7A418FBD5AA78D1769719D1090E7B3462E878C5A7
3,142,276 UART: [art] SIG.S = F01D98BC6D7BCA8752F96D12467A4597487CA1FA214EE55CBEE5E828857677A9B963260F9B549BEAA7ED6D8FCA930C6C
3,166,145 UART: Caliptra RT
3,166,490 UART: [state] CFI Enabled
3,274,885 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,411 UART: [rt]cmd =0x494e464f, len=4
3,309,070 >>> mbox cmd response data (312 bytes)
3,309,071 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,778 UART:
3,309,794 UART: Running Caliptra ROM ...
3,310,202 UART:
3,310,344 UART: [state] CFI Enabled
3,313,466 UART: [state] LifecycleState = Unprovisioned
3,314,121 UART: [state] DebugLocked = No
3,314,785 UART: [state] WD Timer not started. Device not locked for debugging
3,315,901 UART: [kat] SHA2-256
4,119,451 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,123,580 UART: [kat] ++
4,123,732 UART: [kat] sha1
4,127,966 UART: [kat] SHA2-256
4,129,906 UART: [kat] SHA2-384
4,132,663 UART: [kat] SHA2-512-ACC
4,134,563 UART: [kat] ECC-384
4,144,234 UART: [kat] HMAC-384Kdf
4,148,842 UART: [kat] LMS
4,397,154 UART: [kat] --
4,397,952 UART: [update-reset] ++
5,710,224 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,711,323 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,861,147 >>> mbox cmd response: success
5,861,412 UART: [update-reset] Copying MAN_2 To MAN_1
5,869,426 UART: [update-reset Success] --
5,870,299 UART: [state] Locking Datavault
5,870,995 UART: [state] Locking PCR0, PCR1 and PCR31
5,871,599 UART: [state] Locking ICCM
5,872,153 UART: [exit] Launching FMC @ 0x40000130
5,877,482 UART:
5,877,498 UART: Running Caliptra FMC ...
5,877,906 UART:
5,878,049 UART: [state] CFI Enabled
5,967,218 UART: [art] Extend RT PCRs Done
5,967,646 UART: [art] Lock RT PCRs Done
5,968,909 UART: [art] Populate DV Done
5,977,317 UART: [fht] FMC Alias Private Key: 7
5,978,365 UART: [art] Derive CDI
5,978,645 UART: [art] Store in in slot 0x4
6,064,570 UART: [art] Derive Key Pair
6,064,930 UART: [art] Store priv key in slot 0x5
6,078,030 UART: [art] Derive Key Pair - Done
6,092,710 UART: [art] Signing Cert with AUTHO
6,093,190 UART: RITY.KEYID = 7
6,108,710 UART: [art] Erasing AUTHORITY.KEYID = 7
6,109,475 UART: [art] PUB.X = 65067F10D2C6B99A9A951024623DE991CC52F2A7A3D3B79BE0CE35197898E983539CF0DC0776E7AC86CE56892ED0B4C5
6,116,243 UART: [art] PUB.Y = 2AED61AFC3A1BC1932FFE359BE04C8722661778FA1AB73677148F65EAB5569D3A6DCD2139D192AB195DCD4306AE66E70
6,123,202 UART: [art] SIG.R = 68836F210056FF3EB4D0CD5BA914C54DA4136DA12855D9849560E3F9E1780F32BC01D288DF75CB2103EF511F24D26AEA
6,129,947 UART: [art] SIG.S = 9512309B9F23A30F600229B23CC498A1BD1CB740727C339C576378053CD256322CB34E7AFD82EAD6A7A53BBF101C6FDE
6,153,145 UART: Caliptra RT
6,153,490 UART: [state] CFI Enabled
6,437,677 UART: [rt] RT listening for mailbox commands...
6,438,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,467,962 UART: [rt]cmd =0x494e464f, len=4
6,471,613 >>> mbox cmd response data (312 bytes)
6,471,614 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,472,505 UART:
6,472,521 UART: Running Caliptra ROM ...
6,472,929 UART:
6,473,071 UART: [state] CFI Enabled
6,475,791 UART: [state] LifecycleState = Unprovisioned
6,476,446 UART: [state] DebugLocked = No
6,476,984 UART: [state] WD Timer not started. Device not locked for debugging
6,478,314 UART: [kat] SHA2-256
7,281,864 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,285,993 UART: [kat] ++
7,286,145 UART: [kat] sha1
7,290,365 UART: [kat] SHA2-256
7,292,305 UART: [kat] SHA2-384
7,295,036 UART: [kat] SHA2-512-ACC
7,296,936 UART: [kat] ECC-384
7,306,629 UART: [kat] HMAC-384Kdf
7,311,273 UART: [kat] LMS
7,559,585 UART: [kat] --
7,560,769 UART: [update-reset] ++
8,871,751 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,872,900 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
9,022,724 >>> mbox cmd response: success
9,022,979 UART: [update-reset] Copying MAN_2 To MAN_1
9,030,993 UART: [update-reset Success] --
9,031,752 UART: [state] Locking Datavault
9,032,452 UART: [state] Locking PCR0, PCR1 and PCR31
9,033,056 UART: [state] Locking ICCM
9,033,542 UART: [exit] Launching FMC @ 0x40000130
9,038,871 UART:
9,038,887 UART: Running Caliptra FMC ...
9,039,295 UART:
9,039,438 UART: [state] CFI Enabled
9,128,611 UART: [art] Extend RT PCRs Done
9,129,039 UART: [art] Lock RT PCRs Done
9,130,186 UART: [art] Populate DV Done
9,138,284 UART: [fht] FMC Alias Private Key: 7
9,139,212 UART: [art] Derive CDI
9,139,492 UART: [art] Store in in slot 0x4
9,225,181 UART: [art] Derive Key Pair
9,225,541 UART: [art] Store priv key in slot 0x5
9,238,317 UART: [art] Derive Key Pair - Done
9,253,270 UART: [art] Signing Cert with AUTHO
9,253,750 UART: RITY.KEYID = 7
9,269,402 UART: [art] Erasing AUTHORITY.KEYID = 7
9,270,167 UART: [art] PUB.X = 355CD0CC8AD154D488006F04AFCF89DDA4F5F63517FC0AEE70A68F71F2FF66EC954BEDCC348ACE9938DC18505BC073A7
9,276,931 UART: [art] PUB.Y = C2ED6868C9CD52B798B0DAE793C1FDE0E9BD1B5064CA969E63F63995636FF903A8AB83ECDA4427185BD0F02779905862
9,283,886 UART: [art] SIG.R = ED87F4852C41FB4713D2784948F05E116E7688F843711BF6CDBF87EBC7906391DE7B4F9E8D4621CD3FF5ED113B6A921B
9,290,664 UART: [art] SIG.S = B065F4FBF8912AC6BF016A07D9D86B53B120E6862B898678411C26FF24138E8DB384A6B45F5AC5649B67E450DEB8F830
9,314,101 UART: Caliptra RT
9,314,446 UART: [state] CFI Enabled
9,594,221 UART: [rt] RT listening for mailbox commands...
9,594,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,624,274 UART: [rt]cmd =0x494e464f, len=4
9,627,871 >>> mbox cmd response data (312 bytes)
9,627,872 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,628,813 UART:
9,628,829 UART: Running Caliptra ROM ...
9,629,237 UART:
9,629,379 UART: [state] CFI Enabled
9,631,991 UART: [state] LifecycleState = Unprovisioned
9,632,646 UART: [state] DebugLocked = No
9,633,282 UART: [state] WD Timer not started. Device not locked for debugging
9,634,420 UART: [kat] SHA2-256
10,437,970 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,442,099 UART: [kat] ++
10,442,251 UART: [kat] sha1
10,446,391 UART: [kat] SHA2-256
10,448,331 UART: [kat] SHA2-384
10,450,948 UART: [kat] SHA2-512-ACC
10,452,848 UART: [kat] ECC-384
10,462,687 UART: [kat] HMAC-384Kdf
10,467,511 UART: [kat] LMS
10,715,823 UART: [kat] --
10,717,019 UART: [update-reset] ++
12,029,283 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,030,318 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
12,180,142 >>> mbox cmd response: success
12,180,355 UART: [update-reset] Copying MAN_2 To MAN_1
12,188,369 UART: [update-reset Success] --
12,189,326 UART: [state] Locking Datavault
12,190,152 UART: [state] Locking PCR0, PCR1 and PCR31
12,190,756 UART: [state] Locking ICCM
12,191,342 UART: [exit] Launching FMC @ 0x40000130
12,196,671 UART:
12,196,687 UART: Running Caliptra FMC ...
12,197,095 UART:
12,197,238 UART: [state] CFI Enabled
12,286,371 UART: [art] Extend RT PCRs Done
12,286,799 UART: [art] Lock RT PCRs Done
12,288,258 UART: [art] Populate DV Done
12,296,502 UART: [fht] FMC Alias Private Key: 7
12,297,644 UART: [art] Derive CDI
12,297,924 UART: [art] Store in in slot 0x4
12,383,577 UART: [art] Derive Key Pair
12,383,937 UART: [art] Store priv key in slot 0x5
12,397,273 UART: [art] Derive Key Pair - Done
12,411,709 UART: [art] Signing Cert with AUTHO
12,412,189 UART: RITY.KEYID = 7
12,427,475 UART: [art] Erasing AUTHORITY.KEYID = 7
12,428,240 UART: [art] PUB.X = 65067F10D2C6B99A9A951024623DE991CC52F2A7A3D3B79BE0CE35197898E983539CF0DC0776E7AC86CE56892ED0B4C5
12,435,008 UART: [art] PUB.Y = 2AED61AFC3A1BC1932FFE359BE04C8722661778FA1AB73677148F65EAB5569D3A6DCD2139D192AB195DCD4306AE66E70
12,441,967 UART: [art] SIG.R = 68836F210056FF3EB4D0CD5BA914C54DA4136DA12855D9849560E3F9E1780F32BC01D288DF75CB2103EF511F24D26AEA
12,448,712 UART: [art] SIG.S = 9512309B9F23A30F600229B23CC498A1BD1CB740727C339C576378053CD256322CB34E7AFD82EAD6A7A53BBF101C6FDE
12,472,796 UART: Caliptra RT
12,473,141 UART: [state] CFI Enabled
12,754,892 UART: [rt] RT listening for mailbox commands...
12,755,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,785,073 UART: [rt]cmd =0x494e464f, len=4
12,788,916 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,397 ready_for_fw is high
1,056,397 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,541 >>> mbox cmd response: success
2,623,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,685,610 UART:
2,685,626 UART: Running Caliptra FMC ...
2,686,034 UART:
2,686,177 UART: [state] CFI Enabled
2,696,801 UART: [fht] FMC Alias Private Key: 7
2,804,434 UART: [art] Extend RT PCRs Done
2,804,862 UART: [art] Lock RT PCRs Done
2,806,468 UART: [art] Populate DV Done
2,814,738 UART: [fht] FMC Alias Private Key: 7
2,815,676 UART: [art] Derive CDI
2,815,956 UART: [art] Store in in slot 0x4
2,901,653 UART: [art] Derive Key Pair
2,902,013 UART: [art] Store priv key in slot 0x5
2,915,359 UART: [art] Derive Key Pair - Done
2,930,082 UART: [art] Signing Cert with AUTHO
2,930,562 UART: RITY.KEYID = 7
2,945,242 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,007 UART: [art] PUB.X = E65C0523215848D20FB87DDC464CE07B2139B1BA802C6CECF2E5487D11D6C5BF602E89E15E3F6E8947C68E0831EFBCF8
2,952,780 UART: [art] PUB.Y = 0B328DA131E02FEA4E775388C626E52C1B826B6D36E05ECA58CAF0B92AF17A3FEA21D495997E58CD32A4EC7A46E29376
2,959,739 UART: [art] SIG.R = 7DE2FFB679195F9806F4F8885F6F4EB58585550C9C2C60058C9DEA011D0F4BB692630E701B3E4F669837BD0BF91C5479
2,966,490 UART: [art] SIG.S = DCB93EFCDC147B091E0037C88E2DD9896CFDA1237401F17A18A89ACBEFC404CD06D3A15281C26DC9D9CF6FED8D6C3FCA
2,990,311 UART: Caliptra RT
2,990,656 UART: [state] CFI Enabled
3,098,231 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,651 UART: [rt]cmd =0x494e464f, len=4
3,132,294 >>> mbox cmd response data (312 bytes)
3,132,295 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,566,694 >>> mbox cmd response: success
5,580,008 UART:
5,580,024 UART: Running Caliptra FMC ...
5,580,432 UART:
5,580,575 UART: [state] CFI Enabled
5,670,256 UART: [art] Extend RT PCRs Done
5,670,684 UART: [art] Lock RT PCRs Done
5,671,825 UART: [art] Populate DV Done
5,679,887 UART: [fht] FMC Alias Private Key: 7
5,681,021 UART: [art] Derive CDI
5,681,301 UART: [art] Store in in slot 0x4
5,766,956 UART: [art] Derive Key Pair
5,767,316 UART: [art] Store priv key in slot 0x5
5,780,544 UART: [art] Derive Key Pair - Done
5,795,194 UART: [art] Signing Cert with AUTHO
5,795,674 UART: RITY.KEYID = 7
5,810,576 UART: [art] Erasing AUTHORITY.KEYID = 7
5,811,341 UART: [art] PUB.X = 0FA0B4ED7EE6C09CB45C32EC9701AFFF2F616756CD82D54EABA74D235AC4199807F1A611E748230452919EE6623B248E
5,818,107 UART: [art] PUB.Y = 8252054B09B64DC606C4DC1B2B2936E32EF23D4A45186DE575A969C74E1AE724A23EBE16F2E4A3178C8EB3FED18B2357
5,825,056 UART: [art] SIG.R = 7B3F72E04BBDA12A42EB0E13EB9CFC45AC2F8C9B5C95B2A5D49A8D7B825219789578040FB1AB5AA70898DEF68AACED11
5,831,836 UART: [art] SIG.S = 6E479C28A95852D2B69182B2E3AF25BD828654E0F537AF530CE5D5A077D6BC880CF191A39EC35468254EF3056E7C9D7C
5,855,900 UART: Caliptra RT
5,856,245 UART: [state] CFI Enabled
6,135,121 UART: [rt] RT listening for mailbox commands...
6,135,791 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,165,136 UART: [rt]cmd =0x494e464f, len=4
6,168,713 >>> mbox cmd response data (312 bytes)
6,168,714 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,601,163 >>> mbox cmd response: success
8,614,645 UART:
8,614,661 UART: Running Caliptra FMC ...
8,615,069 UART:
8,615,212 UART: [state] CFI Enabled
8,704,475 UART: [art] Extend RT PCRs Done
8,704,903 UART: [art] Lock RT PCRs Done
8,706,060 UART: [art] Populate DV Done
8,714,072 UART: [fht] FMC Alias Private Key: 7
8,715,062 UART: [art] Derive CDI
8,715,342 UART: [art] Store in in slot 0x4
8,800,893 UART: [art] Derive Key Pair
8,801,253 UART: [art] Store priv key in slot 0x5
8,814,783 UART: [art] Derive Key Pair - Done
8,829,603 UART: [art] Signing Cert with AUTHO
8,830,083 UART: RITY.KEYID = 7
8,845,369 UART: [art] Erasing AUTHORITY.KEYID = 7
8,846,134 UART: [art] PUB.X = 0C7EA7952E22A55E0DAF6737E64D3F36CFAB39AD28CB57A72104E2977E894A03DC586D4CFBCF92BB1773A179E6C5043E
8,852,903 UART: [art] PUB.Y = D95CB8D79AE8B2A6E698427E6425C4253CF0776A9061CD168FC29D1AD790C4A4E9030F8A379A91428C73E169033A38EB
8,859,846 UART: [art] SIG.R = 488B1CE4B26074B1EA1D8DE351D4CF24C519D4D734CE364AFD1A91E7BC3A032496EE1C6AA339F46B2971666369BD5E5D
8,866,625 UART: [art] SIG.S = 8EE33BD8E0D9C2C4EBB00F51D2AA8DFA7233D5A42125CE09717DEC208B8C058858EE75321BB3A4A3C4439EA1A0FB2401
8,890,194 UART: Caliptra RT
8,890,539 UART: [state] CFI Enabled
9,171,268 UART: [rt] RT listening for mailbox commands...
9,171,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,201,313 UART: [rt]cmd =0x494e464f, len=4
9,205,084 >>> mbox cmd response data (312 bytes)
9,205,085 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,637,768 >>> mbox cmd response: success
11,650,968 UART:
11,650,984 UART: Running Caliptra FMC ...
11,651,392 UART:
11,651,535 UART: [state] CFI Enabled
11,740,986 UART: [art] Extend RT PCRs Done
11,741,414 UART: [art] Lock RT PCRs Done
11,742,829 UART: [art] Populate DV Done
11,750,865 UART: [fht] FMC Alias Private Key: 7
11,752,037 UART: [art] Derive CDI
11,752,317 UART: [art] Store in in slot 0x4
11,837,596 UART: [art] Derive Key Pair
11,837,956 UART: [art] Store priv key in slot 0x5
11,850,832 UART: [art] Derive Key Pair - Done
11,865,552 UART: [art] Signing Cert with AUTHO
11,866,032 UART: RITY.KEYID = 7
11,881,240 UART: [art] Erasing AUTHORITY.KEYID = 7
11,882,005 UART: [art] PUB.X = 0FA0B4ED7EE6C09CB45C32EC9701AFFF2F616756CD82D54EABA74D235AC4199807F1A611E748230452919EE6623B248E
11,888,771 UART: [art] PUB.Y = 8252054B09B64DC606C4DC1B2B2936E32EF23D4A45186DE575A969C74E1AE724A23EBE16F2E4A3178C8EB3FED18B2357
11,895,720 UART: [art] SIG.R = 7B3F72E04BBDA12A42EB0E13EB9CFC45AC2F8C9B5C95B2A5D49A8D7B825219789578040FB1AB5AA70898DEF68AACED11
11,902,500 UART: [art] SIG.S = 6E479C28A95852D2B69182B2E3AF25BD828654E0F537AF530CE5D5A077D6BC880CF191A39EC35468254EF3056E7C9D7C
11,926,752 UART: Caliptra RT
11,927,097 UART: [state] CFI Enabled
12,207,287 UART: [rt] RT listening for mailbox commands...
12,207,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,237,366 UART: [rt]cmd =0x494e464f, len=4
12,241,269 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,359 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,053 UART: [kat] SHA2-256
881,984 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,099 UART: [kat] ++
886,251 UART: [kat] sha1
890,421 UART: [kat] SHA2-256
892,359 UART: [kat] SHA2-384
894,954 UART: [kat] SHA2-512-ACC
896,855 UART: [kat] ECC-384
902,508 UART: [kat] HMAC-384Kdf
907,152 UART: [kat] LMS
1,475,348 UART: [kat] --
1,476,381 UART: [cold-reset] ++
1,476,715 UART: [fht] Storing FHT @ 0x50003400
1,479,434 UART: [idev] ++
1,479,602 UART: [idev] CDI.KEYID = 6
1,479,962 UART: [idev] SUBJECT.KEYID = 7
1,480,386 UART: [idev] UDS.KEYID = 0
1,480,731 ready_for_fw is high
1,480,731 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,084 UART: [idev] Erasing UDS.KEYID = 0
1,504,586 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,162 UART: [idev] --
1,514,279 UART: [ldev] ++
1,514,447 UART: [ldev] CDI.KEYID = 6
1,514,810 UART: [ldev] SUBJECT.KEYID = 5
1,515,236 UART: [ldev] AUTHORITY.KEYID = 7
1,515,699 UART: [ldev] FE.KEYID = 1
1,520,613 UART: [ldev] Erasing FE.KEYID = 1
1,546,030 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,618 UART: [ldev] --
1,585,073 UART: [fwproc] Waiting for Commands...
1,585,854 UART: [fwproc] Received command 0x46574c44
1,586,645 UART: [fwproc] Received Image of size 114332 bytes
2,885,003 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,751 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,103 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,924 >>> mbox cmd response: success
3,077,924 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,079,170 UART: [afmc] ++
3,079,338 UART: [afmc] CDI.KEYID = 6
3,079,700 UART: [afmc] SUBJECT.KEYID = 7
3,080,125 UART: [afmc] AUTHORITY.KEYID = 5
3,114,622 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,722 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,502 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,230 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,115 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,805 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,764 UART: [afmc] --
3,157,786 UART: [cold-reset] --
3,158,800 UART: [state] Locking Datavault
3,159,881 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,485 UART: [state] Locking ICCM
3,161,045 UART: [exit] Launching FMC @ 0x40000130
3,166,374 UART:
3,166,390 UART: Running Caliptra FMC ...
3,166,798 UART:
3,166,852 UART: [state] CFI Enabled
3,177,143 UART: [fht] FMC Alias Private Key: 7
3,285,108 UART: [art] Extend RT PCRs Done
3,285,536 UART: [art] Lock RT PCRs Done
3,287,214 UART: [art] Populate DV Done
3,295,663 UART: [fht] FMC Alias Private Key: 7
3,296,827 UART: [art] Derive CDI
3,297,107 UART: [art] Store in in slot 0x4
3,383,104 UART: [art] Derive Key Pair
3,383,464 UART: [art] Store priv key in slot 0x5
3,397,232 UART: [art] Derive Key Pair - Done
3,412,103 UART: [art] Signing Cert with AUTHO
3,412,583 UART: RITY.KEYID = 7
3,427,725 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,490 UART: [art] PUB.X = C26182FB78D52F96C7C6095E689FC92BD1D6A9D2DF0B959DA60A6CF50609986897BF91AFFD759AB9E6351DC73930D40C
3,435,252 UART: [art] PUB.Y = E316A148D16B403F333E8B904834DC36432FA2476B15C8DF7C51B7F8F627A7A71C6922F0371C76FEB9CE07A2E6823D97
3,442,201 UART: [art] SIG.R = 249305485E2B32EF362304CBA667B6649269489543C94A55F9201DDFB113599BBDCC9E441AD4EBA57CF5BE0398717794
3,448,960 UART: [art] SIG.S = 8BF1BE88886886551187287C0D876CCCC604FF593F4BBE6001554241BABC38A40A6C119CEEA3E72F5C486A7569459427
3,473,205 UART: Caliptra RT
3,473,458 UART: [state] CFI Enabled
3,581,351 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,809 UART: [rt]cmd =0x49444549, len=4
3,614,108 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,897 ready_for_fw is high
1,362,897 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,250 >>> mbox cmd response: success
2,929,250 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,991,184 UART:
2,991,200 UART: Running Caliptra FMC ...
2,991,608 UART:
2,991,662 UART: [state] CFI Enabled
3,002,629 UART: [fht] FMC Alias Private Key: 7
3,109,602 UART: [art] Extend RT PCRs Done
3,110,030 UART: [art] Lock RT PCRs Done
3,111,826 UART: [art] Populate DV Done
3,120,003 UART: [fht] FMC Alias Private Key: 7
3,121,155 UART: [art] Derive CDI
3,121,435 UART: [art] Store in in slot 0x4
3,206,874 UART: [art] Derive Key Pair
3,207,234 UART: [art] Store priv key in slot 0x5
3,220,382 UART: [art] Derive Key Pair - Done
3,234,868 UART: [art] Signing Cert with AUTHO
3,235,348 UART: RITY.KEYID = 7
3,250,228 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,993 UART: [art] PUB.X = 0344F9E0D39E08880398EC5AA81AE98DCFA522688E16F53162BAF487B68EB5797D718794E814DD3FDF4B935C4752D542
3,257,756 UART: [art] PUB.Y = D0DFDFCE36277A7F00FC760FEE241FF5A77BF08206709824039F1D969D144E4F60ECF5654CB18BE55F4969A1219D2657
3,264,681 UART: [art] SIG.R = E41C43C6A726CBEA078327C4D65FC163CDECFE1B08CEE130FEDB708E39CDBDF7AEF8FEB94D1667788CC0B12818B55639
3,271,469 UART: [art] SIG.S = B99A03E35D62B00C8B50968D4CB3D5BF6934439BC818A8A307C446AA9B2DD81F4C25B2AF06AEB8DDD3A2D6B6E6204562
3,295,740 UART: Caliptra RT
3,295,993 UART: [state] CFI Enabled
3,405,367 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,745 UART: [rt]cmd =0x49444549, len=4
3,438,258 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,752 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,310 UART: [kat] SHA2-256
882,241 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,356 UART: [kat] ++
886,508 UART: [kat] sha1
890,816 UART: [kat] SHA2-256
892,754 UART: [kat] SHA2-384
895,361 UART: [kat] SHA2-512-ACC
897,262 UART: [kat] ECC-384
902,511 UART: [kat] HMAC-384Kdf
907,203 UART: [kat] LMS
1,475,399 UART: [kat] --
1,476,540 UART: [cold-reset] ++
1,477,022 UART: [fht] Storing FHT @ 0x50003400
1,479,849 UART: [idev] ++
1,480,017 UART: [idev] CDI.KEYID = 6
1,480,377 UART: [idev] SUBJECT.KEYID = 7
1,480,801 UART: [idev] UDS.KEYID = 0
1,481,146 ready_for_fw is high
1,481,146 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,495 UART: [idev] Erasing UDS.KEYID = 0
1,505,221 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,835 UART: [idev] --
1,514,886 UART: [ldev] ++
1,515,054 UART: [ldev] CDI.KEYID = 6
1,515,417 UART: [ldev] SUBJECT.KEYID = 5
1,515,843 UART: [ldev] AUTHORITY.KEYID = 7
1,516,306 UART: [ldev] FE.KEYID = 1
1,521,504 UART: [ldev] Erasing FE.KEYID = 1
1,547,025 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,939 UART: [ldev] --
1,586,356 UART: [fwproc] Waiting for Commands...
1,587,033 UART: [fwproc] Received command 0x46574c44
1,587,824 UART: [fwproc] Received Image of size 114332 bytes
2,886,080 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,730 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,082 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,913 >>> mbox cmd response: success
3,078,913 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,079,945 UART: [afmc] ++
3,080,113 UART: [afmc] CDI.KEYID = 6
3,080,475 UART: [afmc] SUBJECT.KEYID = 7
3,080,900 UART: [afmc] AUTHORITY.KEYID = 5
3,115,655 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,051 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,831 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,559 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,444 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,134 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,051 UART: [afmc] --
3,158,951 UART: [cold-reset] --
3,159,859 UART: [state] Locking Datavault
3,161,014 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,618 UART: [state] Locking ICCM
3,162,116 UART: [exit] Launching FMC @ 0x40000130
3,167,445 UART:
3,167,461 UART: Running Caliptra FMC ...
3,167,869 UART:
3,168,012 UART: [state] CFI Enabled
3,178,843 UART: [fht] FMC Alias Private Key: 7
3,286,426 UART: [art] Extend RT PCRs Done
3,286,854 UART: [art] Lock RT PCRs Done
3,288,230 UART: [art] Populate DV Done
3,296,587 UART: [fht] FMC Alias Private Key: 7
3,297,583 UART: [art] Derive CDI
3,297,863 UART: [art] Store in in slot 0x4
3,383,482 UART: [art] Derive Key Pair
3,383,842 UART: [art] Store priv key in slot 0x5
3,396,868 UART: [art] Derive Key Pair - Done
3,411,986 UART: [art] Signing Cert with AUTHO
3,412,466 UART: RITY.KEYID = 7
3,427,614 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,379 UART: [art] PUB.X = 31F35E8B33C7AB44EA8A4B66AE2156BF4750CC3E89635390415DB1A2516D34EF7EF774B9228F44173FAC045A73355AD9
3,435,150 UART: [art] PUB.Y = F9E42750A87349FD254E1C2AF698F19BCE84CFB6136468191C78DD1DB157135C1DA8CDDC9124F975AEF3D122C257F333
3,442,108 UART: [art] SIG.R = 260D83B405C1F7B2309D52C8A89759F6C00FB6253FC1BD1C2804D633A0C7679CC4869EAA6E3B3109249E3A1CC05E21F4
3,448,867 UART: [art] SIG.S = B3369E871A363D87737AB2D6893D2E01F4D8A48FD3A7E2457B39B627A8EF96B5238F577AE5601B2918AEBCB672834DC9
3,473,075 UART: Caliptra RT
3,473,420 UART: [state] CFI Enabled
3,581,209 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,949 UART: [rt]cmd =0x49444549, len=4
3,614,212 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,768 ready_for_fw is high
1,362,768 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,703 >>> mbox cmd response: success
2,928,703 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,990,509 UART:
2,990,525 UART: Running Caliptra FMC ...
2,990,933 UART:
2,991,076 UART: [state] CFI Enabled
3,002,151 UART: [fht] FMC Alias Private Key: 7
3,109,930 UART: [art] Extend RT PCRs Done
3,110,358 UART: [art] Lock RT PCRs Done
3,111,810 UART: [art] Populate DV Done
3,120,035 UART: [fht] FMC Alias Private Key: 7
3,120,973 UART: [art] Derive CDI
3,121,253 UART: [art] Store in in slot 0x4
3,206,784 UART: [art] Derive Key Pair
3,207,144 UART: [art] Store priv key in slot 0x5
3,220,722 UART: [art] Derive Key Pair - Done
3,235,617 UART: [art] Signing Cert with AUTHO
3,236,097 UART: RITY.KEYID = 7
3,251,389 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,154 UART: [art] PUB.X = E77CE0070AC8F65440CFDBE9FD0B6E78005330AB15B84C66A30900F79F5A9EA7C7B60AE1A57006060AFE0F9017595CEE
3,258,865 UART: [art] PUB.Y = 670C252DA85091EA28756749F846A68856EEA732B88F1603E596246E385A146B47FCA9FF7B873012CBB9BB18955E8D39
3,265,805 UART: [art] SIG.R = 2E54A9F728CD85E1459105D5F8A5C41D88AEC25A9B0B5E1393B613274CFD60ED1BBB52F2A4573CA87F6C9FCBAB572D50
3,272,585 UART: [art] SIG.S = D58214B96FE79F39B558D8A07140AE6E3DCE4DA806C757D59C320EF6E26476E6A6E9E501C2B49CDAD541F738914B7F24
3,296,447 UART: Caliptra RT
3,296,792 UART: [state] CFI Enabled
3,403,431 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,947 UART: [rt]cmd =0x49444549, len=4
3,436,070 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
893,076 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,201 UART: [kat] ++
897,353 UART: [kat] sha1
901,385 UART: [kat] SHA2-256
903,325 UART: [kat] SHA2-384
906,194 UART: [kat] SHA2-512-ACC
908,095 UART: [kat] ECC-384
918,002 UART: [kat] HMAC-384Kdf
922,504 UART: [kat] LMS
1,170,832 UART: [kat] --
1,171,949 UART: [cold-reset] ++
1,172,491 UART: [fht] FHT @ 0x50003400
1,175,132 UART: [idev] ++
1,175,300 UART: [idev] CDI.KEYID = 6
1,175,660 UART: [idev] SUBJECT.KEYID = 7
1,176,084 UART: [idev] UDS.KEYID = 0
1,176,429 ready_for_fw is high
1,176,429 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,266 UART: [idev] Erasing UDS.KEYID = 0
1,201,655 UART: [idev] Sha1 KeyId Algorithm
1,210,059 UART: [idev] --
1,211,127 UART: [ldev] ++
1,211,295 UART: [ldev] CDI.KEYID = 6
1,211,658 UART: [ldev] SUBJECT.KEYID = 5
1,212,084 UART: [ldev] AUTHORITY.KEYID = 7
1,212,547 UART: [ldev] FE.KEYID = 1
1,217,673 UART: [ldev] Erasing FE.KEYID = 1
1,243,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,629 UART: [ldev] --
1,283,004 UART: [fwproc] Wait for Commands...
1,283,702 UART: [fwproc] Recv command 0x46574c44
1,284,430 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,228 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,532 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,365 >>> mbox cmd response: success
2,775,365 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,776,401 UART: [afmc] ++
2,776,569 UART: [afmc] CDI.KEYID = 6
2,776,931 UART: [afmc] SUBJECT.KEYID = 7
2,777,356 UART: [afmc] AUTHORITY.KEYID = 5
2,812,031 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,664 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,412 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,140 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,025 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,744 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,474 UART: [afmc] --
2,855,464 UART: [cold-reset] --
2,856,530 UART: [state] Locking Datavault
2,857,687 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,291 UART: [state] Locking ICCM
2,858,959 UART: [exit] Launching FMC @ 0x40000130
2,864,288 UART:
2,864,304 UART: Running Caliptra FMC ...
2,864,712 UART:
2,864,766 UART: [state] CFI Enabled
2,875,249 UART: [fht] FMC Alias Private Key: 7
2,983,614 UART: [art] Extend RT PCRs Done
2,984,042 UART: [art] Lock RT PCRs Done
2,985,718 UART: [art] Populate DV Done
2,993,713 UART: [fht] FMC Alias Private Key: 7
2,994,673 UART: [art] Derive CDI
2,994,953 UART: [art] Store in in slot 0x4
3,081,126 UART: [art] Derive Key Pair
3,081,486 UART: [art] Store priv key in slot 0x5
3,094,530 UART: [art] Derive Key Pair - Done
3,109,314 UART: [art] Signing Cert with AUTHO
3,109,794 UART: RITY.KEYID = 7
3,124,766 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,531 UART: [art] PUB.X = 36940DED160F0F94C91C477DE427304FE9B309BA419FF87B8E72823D840A33A7E810D29E01D2C8E54F2054E68513D520
3,132,281 UART: [art] PUB.Y = C30A44D5A2532891BB1EC0BB0447806FB5B10B022624BF3199ED23FED2AE9E20949C1380F7E752D08E63D0994809AB85
3,139,218 UART: [art] SIG.R = FD04F8275C65A82580F1D9FD7E13027929E1235619018CBE317BB43A6C57C02AC00DF03CE24A5DDC11EFE35EB90D4C8F
3,145,985 UART: [art] SIG.S = 8AF6537A0B0E97654D93D25FE49AC4FD0C5F704FB5E5619CFF1B3DB883B17397EAE3C1984043B564F4977CF9CA4AFCAF
3,169,983 UART: Caliptra RT
3,170,236 UART: [state] CFI Enabled
3,277,342 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,558 UART: [rt]cmd =0x49444549, len=4
3,309,939 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,933 ready_for_fw is high
1,059,933 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,466 >>> mbox cmd response: success
2,625,466 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,686,588 UART:
2,686,604 UART: Running Caliptra FMC ...
2,687,012 UART:
2,687,066 UART: [state] CFI Enabled
2,697,445 UART: [fht] FMC Alias Private Key: 7
2,805,030 UART: [art] Extend RT PCRs Done
2,805,458 UART: [art] Lock RT PCRs Done
2,806,808 UART: [art] Populate DV Done
2,814,943 UART: [fht] FMC Alias Private Key: 7
2,815,969 UART: [art] Derive CDI
2,816,249 UART: [art] Store in in slot 0x4
2,902,074 UART: [art] Derive Key Pair
2,902,434 UART: [art] Store priv key in slot 0x5
2,915,844 UART: [art] Derive Key Pair - Done
2,930,471 UART: [art] Signing Cert with AUTHO
2,930,951 UART: RITY.KEYID = 7
2,945,953 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,718 UART: [art] PUB.X = 50B18A381F7697E053CA5D82F68EB259D455728F5071229A53015C36818927C7960DD00D529805B48A28DCCBD4DAD805
2,953,467 UART: [art] PUB.Y = 1086306A18D25E4B3C97F80E5A2DFA433C3A73B916B7ECE291E27259934818DD860503A394942D284A67E937A5B82432
2,960,400 UART: [art] SIG.R = 03CFA5D631D2A3F11EDBE11D4152F153ABAB154A08A60FE82CC7B2ADACA6036E158C3A596E4836FA8618B7CFB5F25C01
2,967,175 UART: [art] SIG.S = 05AFCCA0F2A3AC8750E74C1CBA4E17EE579EAE027950A3AFA3B9421A7C6B60154AE62C2FC6C71E8FC9639B10CC0577D8
2,990,745 UART: Caliptra RT
2,990,998 UART: [state] CFI Enabled
3,099,659 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,669 UART: [rt]cmd =0x49444549, len=4
3,133,242 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
893,493 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,618 UART: [kat] ++
897,770 UART: [kat] sha1
902,104 UART: [kat] SHA2-256
904,044 UART: [kat] SHA2-384
906,673 UART: [kat] SHA2-512-ACC
908,574 UART: [kat] ECC-384
918,775 UART: [kat] HMAC-384Kdf
923,377 UART: [kat] LMS
1,171,705 UART: [kat] --
1,172,898 UART: [cold-reset] ++
1,173,274 UART: [fht] FHT @ 0x50003400
1,175,961 UART: [idev] ++
1,176,129 UART: [idev] CDI.KEYID = 6
1,176,489 UART: [idev] SUBJECT.KEYID = 7
1,176,913 UART: [idev] UDS.KEYID = 0
1,177,258 ready_for_fw is high
1,177,258 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,999 UART: [idev] Erasing UDS.KEYID = 0
1,202,292 UART: [idev] Sha1 KeyId Algorithm
1,210,850 UART: [idev] --
1,211,848 UART: [ldev] ++
1,212,016 UART: [ldev] CDI.KEYID = 6
1,212,379 UART: [ldev] SUBJECT.KEYID = 5
1,212,805 UART: [ldev] AUTHORITY.KEYID = 7
1,213,268 UART: [ldev] FE.KEYID = 1
1,218,592 UART: [ldev] Erasing FE.KEYID = 1
1,244,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,664 UART: [ldev] --
1,284,043 UART: [fwproc] Wait for Commands...
1,284,763 UART: [fwproc] Recv command 0x46574c44
1,285,491 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,224 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,869 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,912 >>> mbox cmd response: success
2,775,912 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,777,102 UART: [afmc] ++
2,777,270 UART: [afmc] CDI.KEYID = 6
2,777,632 UART: [afmc] SUBJECT.KEYID = 7
2,778,057 UART: [afmc] AUTHORITY.KEYID = 5
2,813,796 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,773 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,521 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,249 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,134 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,853 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,745 UART: [afmc] --
2,856,853 UART: [cold-reset] --
2,857,729 UART: [state] Locking Datavault
2,858,808 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,412 UART: [state] Locking ICCM
2,859,880 UART: [exit] Launching FMC @ 0x40000130
2,865,209 UART:
2,865,225 UART: Running Caliptra FMC ...
2,865,633 UART:
2,865,776 UART: [state] CFI Enabled
2,876,115 UART: [fht] FMC Alias Private Key: 7
2,984,210 UART: [art] Extend RT PCRs Done
2,984,638 UART: [art] Lock RT PCRs Done
2,986,312 UART: [art] Populate DV Done
2,994,581 UART: [fht] FMC Alias Private Key: 7
2,995,521 UART: [art] Derive CDI
2,995,801 UART: [art] Store in in slot 0x4
3,081,086 UART: [art] Derive Key Pair
3,081,446 UART: [art] Store priv key in slot 0x5
3,094,352 UART: [art] Derive Key Pair - Done
3,108,700 UART: [art] Signing Cert with AUTHO
3,109,180 UART: RITY.KEYID = 7
3,124,516 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,281 UART: [art] PUB.X = 6C1671B1804FDFA902E12336BE670B709E44F24411666E5EF570A58F6EF08FB26988E769649E0C094516D33297487781
3,132,027 UART: [art] PUB.Y = 6CF547F612ECDC5C69E85D14EF33796515CEE1AE53E698869B9DCD0F13BB0A984FE8BA722BA0A469ED674DB9700DA6F0
3,138,986 UART: [art] SIG.R = AFA080945A168E0D12420E60228F4C04402EF2D3AAFA726D65A7598C6F01632413343A23BA7B071081018AB4836CBEB7
3,145,736 UART: [art] SIG.S = 81119BBEDBC643B966CA539CFF7AF82F95E58411F814CEE6FEED1BD858FE4EF3C4980892A8231F4D5E680004ACD9323E
3,169,713 UART: Caliptra RT
3,170,058 UART: [state] CFI Enabled
3,276,854 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,334 UART: [rt]cmd =0x49444549, len=4
3,309,551 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,796 ready_for_fw is high
1,060,796 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,007 >>> mbox cmd response: success
2,628,007 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,689,757 UART:
2,689,773 UART: Running Caliptra FMC ...
2,690,181 UART:
2,690,324 UART: [state] CFI Enabled
2,700,995 UART: [fht] FMC Alias Private Key: 7
2,808,454 UART: [art] Extend RT PCRs Done
2,808,882 UART: [art] Lock RT PCRs Done
2,810,328 UART: [art] Populate DV Done
2,818,535 UART: [fht] FMC Alias Private Key: 7
2,819,553 UART: [art] Derive CDI
2,819,833 UART: [art] Store in in slot 0x4
2,905,454 UART: [art] Derive Key Pair
2,905,814 UART: [art] Store priv key in slot 0x5
2,919,078 UART: [art] Derive Key Pair - Done
2,933,452 UART: [art] Signing Cert with AUTHO
2,933,932 UART: RITY.KEYID = 7
2,949,588 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,353 UART: [art] PUB.X = 6D49E35321F1A244C48F9E5181B6F72F41CA2BBD32DB0AA1D89459457176D187E3B76E1C3134DB70F0724106B6EA5941
2,957,117 UART: [art] PUB.Y = 9C5318E9E384D7682E34AA024B71AA48497186C1D97F296C3AE7D83F35147BFAD34E755BBE32FF8D1D50A57A777C1957
2,964,068 UART: [art] SIG.R = 67487F8B5A293F28F0C2914A48DF84C41F8C3C85B394B8726CB8267A79F1E3D1C1CCDE40BA0E0BF912939A9507DEF66E
2,970,839 UART: [art] SIG.S = EA1EEAA5B825497E250AFF9797AF049A788D2DC3B441C51EF379F9B2B4B42DB74AA6516B25F4BB3C175757E0726B9EDC
2,994,958 UART: Caliptra RT
2,995,303 UART: [state] CFI Enabled
3,103,750 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,206 UART: [rt]cmd =0x49444549, len=4
3,136,395 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
891,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,385 UART: [kat] ++
895,537 UART: [kat] sha1
899,653 UART: [kat] SHA2-256
901,593 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
915,988 UART: [kat] HMAC-384Kdf
920,666 UART: [kat] LMS
1,168,978 UART: [kat] --
1,169,801 UART: [cold-reset] ++
1,170,145 UART: [fht] FHT @ 0x50003400
1,172,627 UART: [idev] ++
1,172,795 UART: [idev] CDI.KEYID = 6
1,173,156 UART: [idev] SUBJECT.KEYID = 7
1,173,581 UART: [idev] UDS.KEYID = 0
1,173,927 ready_for_fw is high
1,173,927 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,819 UART: [idev] Erasing UDS.KEYID = 0
1,198,895 UART: [idev] Sha1 KeyId Algorithm
1,207,817 UART: [idev] --
1,208,882 UART: [ldev] ++
1,209,050 UART: [ldev] CDI.KEYID = 6
1,209,414 UART: [ldev] SUBJECT.KEYID = 5
1,209,841 UART: [ldev] AUTHORITY.KEYID = 7
1,210,304 UART: [ldev] FE.KEYID = 1
1,215,822 UART: [ldev] Erasing FE.KEYID = 1
1,241,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,774 UART: [ldev] --
1,281,160 UART: [fwproc] Wait for Commands...
1,281,789 UART: [fwproc] Recv command 0x46574c44
1,282,522 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,257 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,943 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,252 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,168 >>> mbox cmd response: success
2,771,168 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,772,345 UART: [afmc] ++
2,772,513 UART: [afmc] CDI.KEYID = 6
2,772,876 UART: [afmc] SUBJECT.KEYID = 7
2,773,302 UART: [afmc] AUTHORITY.KEYID = 5
2,808,041 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,685 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,436 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,165 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,048 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,767 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,654 UART: [afmc] --
2,851,572 UART: [cold-reset] --
2,852,362 UART: [state] Locking Datavault
2,853,509 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,113 UART: [state] Locking ICCM
2,854,731 UART: [exit] Launching FMC @ 0x40000130
2,860,060 UART:
2,860,076 UART: Running Caliptra FMC ...
2,860,484 UART:
2,860,538 UART: [state] CFI Enabled
2,871,179 UART: [fht] FMC Alias Private Key: 7
2,979,356 UART: [art] Extend RT PCRs Done
2,979,784 UART: [art] Lock RT PCRs Done
2,981,412 UART: [art] Populate DV Done
2,989,559 UART: [fht] FMC Alias Private Key: 7
2,990,499 UART: [art] Derive CDI
2,990,779 UART: [art] Store in in slot 0x4
3,076,546 UART: [art] Derive Key Pair
3,076,906 UART: [art] Store priv key in slot 0x5
3,089,504 UART: [art] Derive Key Pair - Done
3,104,477 UART: [art] Signing Cert with AUTHO
3,104,957 UART: RITY.KEYID = 7
3,120,121 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,886 UART: [art] PUB.X = 47D6CCA2C67F1E0279F1B19389F62A1516538A7D7BB26AE9B239914E1CB8346BDD28F958582A09E69B17ED44CF16880D
3,127,651 UART: [art] PUB.Y = 04236504D412F6BEE746859A775AA147273AE2CAA75086D59636341CAC3F7A31B5334F01017A6E6B9A681244FA59D440
3,134,583 UART: [art] SIG.R = A5798CB19AE855795DFFA8A768659123FC32F8EE7BA1D3220C3F3BE9DDBC2736F6F5F9A23E1A418938763F33478F95AA
3,141,360 UART: [art] SIG.S = 115B5F4A130A54ED605B590E4E715CF526A814AB54FB5FC7BD7138CB035A5694B1A2725623A5EE3A9BA447A3E33B5155
3,164,734 UART: Caliptra RT
3,164,987 UART: [state] CFI Enabled
3,272,118 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,714 UART: [rt]cmd =0x49444549, len=4
3,305,219 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,136 ready_for_fw is high
1,056,136 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,653 >>> mbox cmd response: success
2,621,653 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,683,853 UART:
2,683,869 UART: Running Caliptra FMC ...
2,684,277 UART:
2,684,331 UART: [state] CFI Enabled
2,694,706 UART: [fht] FMC Alias Private Key: 7
2,801,803 UART: [art] Extend RT PCRs Done
2,802,231 UART: [art] Lock RT PCRs Done
2,803,711 UART: [art] Populate DV Done
2,812,056 UART: [fht] FMC Alias Private Key: 7
2,813,192 UART: [art] Derive CDI
2,813,472 UART: [art] Store in in slot 0x4
2,899,199 UART: [art] Derive Key Pair
2,899,559 UART: [art] Store priv key in slot 0x5
2,912,809 UART: [art] Derive Key Pair - Done
2,927,842 UART: [art] Signing Cert with AUTHO
2,928,322 UART: RITY.KEYID = 7
2,944,176 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,941 UART: [art] PUB.X = BFF5A227EABFB2D9DBBAA9BFA3B068E8AD66CCE2124C09B47A439537F819F3CD6BFA642E2BEC91F6B337904200F972D1
2,951,710 UART: [art] PUB.Y = AA1592BBF2ABD02E5616F140D59057956278E63C59975C48CC63C5AE79942AF9094607BD333E4583F6BAB35C92D23324
2,958,652 UART: [art] SIG.R = 92844668EB2A3BBCBD4EF8659E0B7733F66AA81D5F2FD33DCBFA88AA7A19921001EB83B137DDCF7FB9039B2015AFD57D
2,965,433 UART: [art] SIG.S = 3214942ED7676338CA10C515D3808308B65E61E7AC7FB42D3D85DBE0AF4A88D210919BC626F73E28ACB7B6D11D2D797D
2,988,913 UART: Caliptra RT
2,989,166 UART: [state] CFI Enabled
3,096,957 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,285 UART: [rt]cmd =0x49444549, len=4
3,129,632 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
891,391 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,520 UART: [kat] ++
895,672 UART: [kat] sha1
899,956 UART: [kat] SHA2-256
901,896 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
916,357 UART: [kat] HMAC-384Kdf
921,139 UART: [kat] LMS
1,169,451 UART: [kat] --
1,170,376 UART: [cold-reset] ++
1,170,892 UART: [fht] FHT @ 0x50003400
1,173,598 UART: [idev] ++
1,173,766 UART: [idev] CDI.KEYID = 6
1,174,127 UART: [idev] SUBJECT.KEYID = 7
1,174,552 UART: [idev] UDS.KEYID = 0
1,174,898 ready_for_fw is high
1,174,898 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,394 UART: [idev] Erasing UDS.KEYID = 0
1,199,338 UART: [idev] Sha1 KeyId Algorithm
1,208,164 UART: [idev] --
1,209,113 UART: [ldev] ++
1,209,281 UART: [ldev] CDI.KEYID = 6
1,209,645 UART: [ldev] SUBJECT.KEYID = 5
1,210,072 UART: [ldev] AUTHORITY.KEYID = 7
1,210,535 UART: [ldev] FE.KEYID = 1
1,215,771 UART: [ldev] Erasing FE.KEYID = 1
1,242,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,905 UART: [ldev] --
1,281,225 UART: [fwproc] Wait for Commands...
1,281,930 UART: [fwproc] Recv command 0x46574c44
1,282,663 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,184 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,092 >>> mbox cmd response: success
2,772,092 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,773,245 UART: [afmc] ++
2,773,413 UART: [afmc] CDI.KEYID = 6
2,773,776 UART: [afmc] SUBJECT.KEYID = 7
2,774,202 UART: [afmc] AUTHORITY.KEYID = 5
2,809,447 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,855 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,606 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,335 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,218 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,937 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,620 UART: [afmc] --
2,852,544 UART: [cold-reset] --
2,853,580 UART: [state] Locking Datavault
2,854,947 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,551 UART: [state] Locking ICCM
2,856,125 UART: [exit] Launching FMC @ 0x40000130
2,861,454 UART:
2,861,470 UART: Running Caliptra FMC ...
2,861,878 UART:
2,862,021 UART: [state] CFI Enabled
2,873,026 UART: [fht] FMC Alias Private Key: 7
2,980,743 UART: [art] Extend RT PCRs Done
2,981,171 UART: [art] Lock RT PCRs Done
2,982,677 UART: [art] Populate DV Done
2,991,002 UART: [fht] FMC Alias Private Key: 7
2,992,176 UART: [art] Derive CDI
2,992,456 UART: [art] Store in in slot 0x4
3,078,021 UART: [art] Derive Key Pair
3,078,381 UART: [art] Store priv key in slot 0x5
3,091,453 UART: [art] Derive Key Pair - Done
3,105,949 UART: [art] Signing Cert with AUTHO
3,106,429 UART: RITY.KEYID = 7
3,121,447 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,212 UART: [art] PUB.X = C2AB64C514AB086F43ACD117F26F8DEA3B5545599572C5FB263B7FCDEA025D0DB9F211D8AB4AA20BE180303F0DCEF8E7
3,128,989 UART: [art] PUB.Y = D1EBDB681392177609B343C9EA346A8CB8204A1C4F36D3DD7FE7EF10639D226678DCFB083FD0B37DE461338ADDE9D99E
3,135,947 UART: [art] SIG.R = CD571C828679C462BB5917DFE98D7E562B9C8FC880ADCE7F5191F2B99BE9514FBCD4E83FE3A0AA2262E36206B75DD033
3,142,728 UART: [art] SIG.S = 3BE8B533684E1A4E7B0568AD3A1665FE6CFB0209366DF5C91FE2BE05A3DBD59275F181F55A8DE790AC5F94FF8D77BD40
3,166,759 UART: Caliptra RT
3,167,104 UART: [state] CFI Enabled
3,274,497 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,929 UART: [rt]cmd =0x49444549, len=4
3,307,402 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,729 ready_for_fw is high
1,056,729 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,318 >>> mbox cmd response: success
2,624,318 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,686,874 UART:
2,686,890 UART: Running Caliptra FMC ...
2,687,298 UART:
2,687,441 UART: [state] CFI Enabled
2,698,156 UART: [fht] FMC Alias Private Key: 7
2,806,133 UART: [art] Extend RT PCRs Done
2,806,561 UART: [art] Lock RT PCRs Done
2,808,301 UART: [art] Populate DV Done
2,816,728 UART: [fht] FMC Alias Private Key: 7
2,817,756 UART: [art] Derive CDI
2,818,036 UART: [art] Store in in slot 0x4
2,903,619 UART: [art] Derive Key Pair
2,903,979 UART: [art] Store priv key in slot 0x5
2,917,191 UART: [art] Derive Key Pair - Done
2,931,803 UART: [art] Signing Cert with AUTHO
2,932,283 UART: RITY.KEYID = 7
2,947,559 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,324 UART: [art] PUB.X = BFCAB95334D28E4679E1043C15F1BE5589204043FF8232EF3558D4331D5BAE339328E6CA92454DEC2180AADE21F7E086
2,955,095 UART: [art] PUB.Y = 2424F721FC4F5ADF1C6C8019839D77EA41CBF9A1359EFE415B360011CB3F543811E00D0302C7CDA025E587342ED3E939
2,962,018 UART: [art] SIG.R = B7F464928CC52A7219FCC519EA4C4C949B2E3F5D59695DF57D61448F102C288B0707814008C627C226D958AF8927AE2D
2,968,777 UART: [art] SIG.S = 9A419C54B0AA914A3052BF3E9B1CF3269062F5A796CFCA4D1FFBEBAD281AD5A35168AF7CCB5AC5E488C69B6AEC6EE369
2,993,232 UART: Caliptra RT
2,993,577 UART: [state] CFI Enabled
3,100,601 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,105 UART: [rt]cmd =0x49444549, len=4
3,133,506 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,496 UART: [state] LifecycleState = Unprovisioned
86,151 UART: [state] DebugLocked = No
86,687 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,375 UART: [kat] SHA2-256
882,306 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,421 UART: [kat] ++
886,573 UART: [kat] sha1
890,719 UART: [kat] SHA2-256
892,657 UART: [kat] SHA2-384
895,462 UART: [kat] SHA2-512-ACC
897,363 UART: [kat] ECC-384
902,858 UART: [kat] HMAC-384Kdf
907,514 UART: [kat] LMS
1,475,710 UART: [kat] --
1,476,517 UART: [cold-reset] ++
1,476,971 UART: [fht] Storing FHT @ 0x50003400
1,479,680 UART: [idev] ++
1,479,848 UART: [idev] CDI.KEYID = 6
1,480,208 UART: [idev] SUBJECT.KEYID = 7
1,480,632 UART: [idev] UDS.KEYID = 0
1,480,977 ready_for_fw is high
1,480,977 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,052 UART: [idev] Erasing UDS.KEYID = 0
1,505,078 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,866 UART: [idev] --
1,514,779 UART: [ldev] ++
1,514,947 UART: [ldev] CDI.KEYID = 6
1,515,310 UART: [ldev] SUBJECT.KEYID = 5
1,515,736 UART: [ldev] AUTHORITY.KEYID = 7
1,516,199 UART: [ldev] FE.KEYID = 1
1,521,253 UART: [ldev] Erasing FE.KEYID = 1
1,546,594 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,842 UART: [ldev] --
1,586,193 UART: [fwproc] Waiting for Commands...
1,586,898 UART: [fwproc] Received command 0x46574c44
1,587,689 UART: [fwproc] Received Image of size 114332 bytes
2,885,517 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,299 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,651 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,486 >>> mbox cmd response: success
3,078,738 UART: [afmc] ++
3,078,906 UART: [afmc] CDI.KEYID = 6
3,079,268 UART: [afmc] SUBJECT.KEYID = 7
3,079,693 UART: [afmc] AUTHORITY.KEYID = 5
3,115,590 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,838 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,618 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,346 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,231 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,921 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,722 UART: [afmc] --
3,158,646 UART: [cold-reset] --
3,159,412 UART: [state] Locking Datavault
3,160,989 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,593 UART: [state] Locking ICCM
3,162,089 UART: [exit] Launching FMC @ 0x40000130
3,167,418 UART:
3,167,434 UART: Running Caliptra FMC ...
3,167,842 UART:
3,167,896 UART: [state] CFI Enabled
3,178,045 UART: [fht] FMC Alias Private Key: 7
3,285,746 UART: [art] Extend RT PCRs Done
3,286,174 UART: [art] Lock RT PCRs Done
3,287,780 UART: [art] Populate DV Done
3,296,103 UART: [fht] FMC Alias Private Key: 7
3,297,139 UART: [art] Derive CDI
3,297,419 UART: [art] Store in in slot 0x4
3,383,262 UART: [art] Derive Key Pair
3,383,622 UART: [art] Store priv key in slot 0x5
3,396,476 UART: [art] Derive Key Pair - Done
3,411,215 UART: [art] Signing Cert with AUTHO
3,411,695 UART: RITY.KEYID = 7
3,426,657 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,422 UART: [art] PUB.X = 3CCCD82317200BECF3C2FA1997CF9D5EA009FF001A9DC7308C5884204E0E7DEF9486D2E6FF39F490BCED3F44937B4AAC
3,434,181 UART: [art] PUB.Y = 9968D5647FEEC252DE2825D76FFB61E85F6694A77770E8C7B93354799FFC4E7391D4C444A12B0A0DB71B41D8E2009868
3,441,103 UART: [art] SIG.R = DEA6FB20782076F003A06600FD7751CABFF5371B7C22564354E8089B4C9651D4D98DE9AEAC72202483F414DCE72F8367
3,447,847 UART: [art] SIG.S = ACC7285DC59D6CF6EFA4DE1D6E2CC2B81482C6D6A759D73357EA4CB70676412F9B805FE4FFDF1EA243AB79AF5AD1C76C
3,471,113 UART: Caliptra RT
3,471,366 UART: [state] CFI Enabled
3,579,574 UART: [rt] RT listening for mailbox commands...
3,580,244 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,844 UART: [rt]cmd =0x44504543, len=136
3,673,952 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,867 ready_for_fw is high
1,362,867 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,452 >>> mbox cmd response: success
2,988,080 UART:
2,988,096 UART: Running Caliptra FMC ...
2,988,504 UART:
2,988,558 UART: [state] CFI Enabled
2,999,035 UART: [fht] FMC Alias Private Key: 7
3,107,156 UART: [art] Extend RT PCRs Done
3,107,584 UART: [art] Lock RT PCRs Done
3,109,706 UART: [art] Populate DV Done
3,118,029 UART: [fht] FMC Alias Private Key: 7
3,119,179 UART: [art] Derive CDI
3,119,459 UART: [art] Store in in slot 0x4
3,205,060 UART: [art] Derive Key Pair
3,205,420 UART: [art] Store priv key in slot 0x5
3,218,672 UART: [art] Derive Key Pair - Done
3,233,294 UART: [art] Signing Cert with AUTHO
3,233,774 UART: RITY.KEYID = 7
3,249,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,137 UART: [art] PUB.X = 97A41D68FBEF36D2E5ECBA75478375E8291A3FE71C6A7E74A15D02DF02E0DF02122827C090B14714835DFF2E0464C348
3,256,899 UART: [art] PUB.Y = F221F2DD5A1B55F3D9423BE42321701805B77F28EEE5E0C721BF92ED4DC2B344C4E219918EB9B4052F2E748B706C5F7B
3,263,851 UART: [art] SIG.R = 90F2897D2E14BD79A5CBCEE4BD547DF69B243458BD72EE8A161A3B4C75B27CF4AAACF681A5814BAC602F4BAE462E3611
3,270,641 UART: [art] SIG.S = 6F0EDB13836EAF77F64AF50C118160EE07D0214EF4E27A58B7DB37DACF58A7546C995F5F8A08AAB9DF5FC95ABB5F66B8
3,294,368 UART: Caliptra RT
3,294,621 UART: [state] CFI Enabled
3,403,016 UART: [rt] RT listening for mailbox commands...
3,403,686 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,532 UART: [rt]cmd =0x44504543, len=136
3,498,294 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,502 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,202 UART: [kat] SHA2-256
882,133 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,248 UART: [kat] ++
886,400 UART: [kat] sha1
890,848 UART: [kat] SHA2-256
892,786 UART: [kat] SHA2-384
895,555 UART: [kat] SHA2-512-ACC
897,456 UART: [kat] ECC-384
903,103 UART: [kat] HMAC-384Kdf
907,631 UART: [kat] LMS
1,475,827 UART: [kat] --
1,476,760 UART: [cold-reset] ++
1,477,238 UART: [fht] Storing FHT @ 0x50003400
1,479,867 UART: [idev] ++
1,480,035 UART: [idev] CDI.KEYID = 6
1,480,395 UART: [idev] SUBJECT.KEYID = 7
1,480,819 UART: [idev] UDS.KEYID = 0
1,481,164 ready_for_fw is high
1,481,164 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,323 UART: [idev] Erasing UDS.KEYID = 0
1,506,325 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,027 UART: [idev] --
1,515,892 UART: [ldev] ++
1,516,060 UART: [ldev] CDI.KEYID = 6
1,516,423 UART: [ldev] SUBJECT.KEYID = 5
1,516,849 UART: [ldev] AUTHORITY.KEYID = 7
1,517,312 UART: [ldev] FE.KEYID = 1
1,522,378 UART: [ldev] Erasing FE.KEYID = 1
1,547,725 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,517 UART: [ldev] --
1,586,788 UART: [fwproc] Waiting for Commands...
1,587,421 UART: [fwproc] Received command 0x46574c44
1,588,212 UART: [fwproc] Received Image of size 114332 bytes
2,886,260 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,232 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,584 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,553 >>> mbox cmd response: success
3,080,705 UART: [afmc] ++
3,080,873 UART: [afmc] CDI.KEYID = 6
3,081,235 UART: [afmc] SUBJECT.KEYID = 7
3,081,660 UART: [afmc] AUTHORITY.KEYID = 5
3,117,121 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,617 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,397 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,125 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,010 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,700 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,595 UART: [afmc] --
3,160,591 UART: [cold-reset] --
3,161,345 UART: [state] Locking Datavault
3,162,574 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,178 UART: [state] Locking ICCM
3,163,674 UART: [exit] Launching FMC @ 0x40000130
3,169,003 UART:
3,169,019 UART: Running Caliptra FMC ...
3,169,427 UART:
3,169,570 UART: [state] CFI Enabled
3,179,831 UART: [fht] FMC Alias Private Key: 7
3,287,574 UART: [art] Extend RT PCRs Done
3,288,002 UART: [art] Lock RT PCRs Done
3,289,762 UART: [art] Populate DV Done
3,298,111 UART: [fht] FMC Alias Private Key: 7
3,299,047 UART: [art] Derive CDI
3,299,327 UART: [art] Store in in slot 0x4
3,384,946 UART: [art] Derive Key Pair
3,385,306 UART: [art] Store priv key in slot 0x5
3,398,188 UART: [art] Derive Key Pair - Done
3,413,116 UART: [art] Signing Cert with AUTHO
3,413,596 UART: RITY.KEYID = 7
3,429,268 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,033 UART: [art] PUB.X = 5E0AF375B8E0B4DFA3B2C06B5D823F86E2C004B80250C4B8021EE410AF2A6878CECCA2BFAB48B9F0D32461B892AB71DF
3,436,811 UART: [art] PUB.Y = 948FE946F3FCB8262BD02979DB605EB77553F7E238F3CC7B4E2F779FC05C17EA04F8631433CCE04B2D9F71203BEB2446
3,443,766 UART: [art] SIG.R = F06EFAD792C920ABB22265CB70133922E1BFCEEFB3333BF3F9F686E4E007D3C2D2D35922C5560DFBBC26CF3F34206D08
3,450,543 UART: [art] SIG.S = 77F42382BB774B1658DA7FE2C45AD9D516C45344EEC17E6B3BF7BA77F347C3797E313F067CF14C9C9D7DC55F1B7752EF
3,474,409 UART: Caliptra RT
3,474,754 UART: [state] CFI Enabled
3,582,967 UART: [rt] RT listening for mailbox commands...
3,583,637 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,103 UART: [rt]cmd =0x44504543, len=136
3,677,713 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,428 ready_for_fw is high
1,362,428 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,081 >>> mbox cmd response: success
2,989,931 UART:
2,989,947 UART: Running Caliptra FMC ...
2,990,355 UART:
2,990,498 UART: [state] CFI Enabled
3,000,829 UART: [fht] FMC Alias Private Key: 7
3,108,912 UART: [art] Extend RT PCRs Done
3,109,340 UART: [art] Lock RT PCRs Done
3,111,150 UART: [art] Populate DV Done
3,119,119 UART: [fht] FMC Alias Private Key: 7
3,120,257 UART: [art] Derive CDI
3,120,537 UART: [art] Store in in slot 0x4
3,205,954 UART: [art] Derive Key Pair
3,206,314 UART: [art] Store priv key in slot 0x5
3,219,580 UART: [art] Derive Key Pair - Done
3,234,350 UART: [art] Signing Cert with AUTHO
3,234,830 UART: RITY.KEYID = 7
3,250,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,871 UART: [art] PUB.X = D7754F0AFC4620C815EA6DE45479FC57C0AC8667CA2412CF26580CF2401C695DBCF7CE6C9D1F835092FF8A934FD1E4F0
3,257,649 UART: [art] PUB.Y = 48C1C1535F49DEB8E363D24545BF2F896FBA9275DAD33F099B937DB14163668AE9F9BB67F596957E13D2964803203FD4
3,264,593 UART: [art] SIG.R = 429E68329C5DC61BE3D647029C329C72B1B173131A7581B3C4E25FEB34631F39070BE4EAC643F377A8482ED3F4C72FDB
3,271,358 UART: [art] SIG.S = B853FC0F5B98E726BEE9781214BE4FB08A817CDBAF5B2B1C2DE3237A8CD4C19247E5A02558435A0123DCF08950C376F4
3,295,491 UART: Caliptra RT
3,295,836 UART: [state] CFI Enabled
3,403,925 UART: [rt] RT listening for mailbox commands...
3,404,595 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,153 UART: [rt]cmd =0x44504543, len=136
3,499,803 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
893,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,445 UART: [kat] ++
897,597 UART: [kat] sha1
901,769 UART: [kat] SHA2-256
903,709 UART: [kat] SHA2-384
906,354 UART: [kat] SHA2-512-ACC
908,255 UART: [kat] ECC-384
918,160 UART: [kat] HMAC-384Kdf
922,940 UART: [kat] LMS
1,171,268 UART: [kat] --
1,172,253 UART: [cold-reset] ++
1,172,595 UART: [fht] FHT @ 0x50003400
1,175,290 UART: [idev] ++
1,175,458 UART: [idev] CDI.KEYID = 6
1,175,818 UART: [idev] SUBJECT.KEYID = 7
1,176,242 UART: [idev] UDS.KEYID = 0
1,176,587 ready_for_fw is high
1,176,587 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,904 UART: [idev] Erasing UDS.KEYID = 0
1,201,015 UART: [idev] Sha1 KeyId Algorithm
1,209,663 UART: [idev] --
1,210,595 UART: [ldev] ++
1,210,763 UART: [ldev] CDI.KEYID = 6
1,211,126 UART: [ldev] SUBJECT.KEYID = 5
1,211,552 UART: [ldev] AUTHORITY.KEYID = 7
1,212,015 UART: [ldev] FE.KEYID = 1
1,216,999 UART: [ldev] Erasing FE.KEYID = 1
1,243,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,753 UART: [ldev] --
1,283,060 UART: [fwproc] Wait for Commands...
1,283,814 UART: [fwproc] Recv command 0x46574c44
1,284,542 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,344 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,648 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,491 >>> mbox cmd response: success
2,775,717 UART: [afmc] ++
2,775,885 UART: [afmc] CDI.KEYID = 6
2,776,247 UART: [afmc] SUBJECT.KEYID = 7
2,776,672 UART: [afmc] AUTHORITY.KEYID = 5
2,812,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,566 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,314 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,042 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,927 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,646 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,484 UART: [afmc] --
2,855,416 UART: [cold-reset] --
2,856,232 UART: [state] Locking Datavault
2,857,607 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,211 UART: [state] Locking ICCM
2,858,799 UART: [exit] Launching FMC @ 0x40000130
2,864,128 UART:
2,864,144 UART: Running Caliptra FMC ...
2,864,552 UART:
2,864,606 UART: [state] CFI Enabled
2,875,261 UART: [fht] FMC Alias Private Key: 7
2,983,662 UART: [art] Extend RT PCRs Done
2,984,090 UART: [art] Lock RT PCRs Done
2,985,322 UART: [art] Populate DV Done
2,993,581 UART: [fht] FMC Alias Private Key: 7
2,994,687 UART: [art] Derive CDI
2,994,967 UART: [art] Store in in slot 0x4
3,080,720 UART: [art] Derive Key Pair
3,081,080 UART: [art] Store priv key in slot 0x5
3,094,522 UART: [art] Derive Key Pair - Done
3,109,204 UART: [art] Signing Cert with AUTHO
3,109,684 UART: RITY.KEYID = 7
3,125,144 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,909 UART: [art] PUB.X = DC76486F3AC62393312ED8CBC65AC1D66821C1EC21C67A887FA9FBEDEA37691540EB9EAF2668878DF8677D114BD5FC2B
3,132,695 UART: [art] PUB.Y = 335F0B99A95906F37CDDFCBC8329838C3C579AE456744833FC6A2C6514C160F922AD53BD319FFB39F92F1672703115B2
3,139,639 UART: [art] SIG.R = 8F1FAC212BFA1E4F9175164D1F2554CDA00EFDBB1E288EDCE0841F0658A6D2A56FD23EF26C345AFD206C4CAB7CECE537
3,146,429 UART: [art] SIG.S = 87A68754AD6DC13EE816031AE400ACEB0C8573C75A0C4B7C170A5050D909910EDB0A2DF52D39F37C2BE54F448CDBAE5A
3,170,117 UART: Caliptra RT
3,170,370 UART: [state] CFI Enabled
3,277,728 UART: [rt] RT listening for mailbox commands...
3,278,398 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,102 UART: [rt]cmd =0x44504543, len=136
3,372,232 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,291 ready_for_fw is high
1,060,291 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,700 >>> mbox cmd response: success
2,687,858 UART:
2,687,874 UART: Running Caliptra FMC ...
2,688,282 UART:
2,688,336 UART: [state] CFI Enabled
2,698,907 UART: [fht] FMC Alias Private Key: 7
2,807,378 UART: [art] Extend RT PCRs Done
2,807,806 UART: [art] Lock RT PCRs Done
2,809,500 UART: [art] Populate DV Done
2,817,733 UART: [fht] FMC Alias Private Key: 7
2,818,773 UART: [art] Derive CDI
2,819,053 UART: [art] Store in in slot 0x4
2,904,770 UART: [art] Derive Key Pair
2,905,130 UART: [art] Store priv key in slot 0x5
2,918,626 UART: [art] Derive Key Pair - Done
2,933,087 UART: [art] Signing Cert with AUTHO
2,933,567 UART: RITY.KEYID = 7
2,948,617 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,382 UART: [art] PUB.X = EAF3AD75B7579025422EA669F03A92F175F7EFC1E3807CA7B9F6A6FEFA531EB3773696D9BB096705FD3DF1BFEF8374F4
2,956,162 UART: [art] PUB.Y = 2AA8479627C4391ACBC2761B0CB4E3181EDE049C96D691D2279492C4B8EE18EFE9C776880F514D05842B73E75DCB749E
2,963,104 UART: [art] SIG.R = DE43D8B5D56D128874CCB3DE3F0745E160908C50A701455D12831E663E6CFD214F9D079A54F7CC6C318F419902B0FDB5
2,969,866 UART: [art] SIG.S = 6179584031E7E344D07806BA15903940A68F762CF2C1FF3DA37EB058ED36AF8F136334BBD2F4C1AA4EA118295EF40BF9
2,992,915 UART: Caliptra RT
2,993,168 UART: [state] CFI Enabled
3,100,373 UART: [rt] RT listening for mailbox commands...
3,101,043 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,769 UART: [rt]cmd =0x44504543, len=136
3,195,047 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,625 UART: [state] LifecycleState = Unprovisioned
86,280 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
893,695 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,820 UART: [kat] ++
897,972 UART: [kat] sha1
902,258 UART: [kat] SHA2-256
904,198 UART: [kat] SHA2-384
906,875 UART: [kat] SHA2-512-ACC
908,776 UART: [kat] ECC-384
918,665 UART: [kat] HMAC-384Kdf
923,079 UART: [kat] LMS
1,171,407 UART: [kat] --
1,172,532 UART: [cold-reset] ++
1,172,918 UART: [fht] FHT @ 0x50003400
1,175,417 UART: [idev] ++
1,175,585 UART: [idev] CDI.KEYID = 6
1,175,945 UART: [idev] SUBJECT.KEYID = 7
1,176,369 UART: [idev] UDS.KEYID = 0
1,176,714 ready_for_fw is high
1,176,714 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,705 UART: [idev] Erasing UDS.KEYID = 0
1,201,762 UART: [idev] Sha1 KeyId Algorithm
1,210,178 UART: [idev] --
1,211,304 UART: [ldev] ++
1,211,472 UART: [ldev] CDI.KEYID = 6
1,211,835 UART: [ldev] SUBJECT.KEYID = 5
1,212,261 UART: [ldev] AUTHORITY.KEYID = 7
1,212,724 UART: [ldev] FE.KEYID = 1
1,218,026 UART: [ldev] Erasing FE.KEYID = 1
1,244,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,570 UART: [ldev] --
1,283,973 UART: [fwproc] Wait for Commands...
1,284,737 UART: [fwproc] Recv command 0x46574c44
1,285,465 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,497 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,801 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,664 >>> mbox cmd response: success
2,775,874 UART: [afmc] ++
2,776,042 UART: [afmc] CDI.KEYID = 6
2,776,404 UART: [afmc] SUBJECT.KEYID = 7
2,776,829 UART: [afmc] AUTHORITY.KEYID = 5
2,812,374 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,009 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,757 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,485 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,370 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,089 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,827 UART: [afmc] --
2,855,793 UART: [cold-reset] --
2,856,725 UART: [state] Locking Datavault
2,857,852 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,456 UART: [state] Locking ICCM
2,859,010 UART: [exit] Launching FMC @ 0x40000130
2,864,339 UART:
2,864,355 UART: Running Caliptra FMC ...
2,864,763 UART:
2,864,906 UART: [state] CFI Enabled
2,875,481 UART: [fht] FMC Alias Private Key: 7
2,983,282 UART: [art] Extend RT PCRs Done
2,983,710 UART: [art] Lock RT PCRs Done
2,985,570 UART: [art] Populate DV Done
2,993,939 UART: [fht] FMC Alias Private Key: 7
2,995,085 UART: [art] Derive CDI
2,995,365 UART: [art] Store in in slot 0x4
3,080,780 UART: [art] Derive Key Pair
3,081,140 UART: [art] Store priv key in slot 0x5
3,094,206 UART: [art] Derive Key Pair - Done
3,108,689 UART: [art] Signing Cert with AUTHO
3,109,169 UART: RITY.KEYID = 7
3,124,107 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,872 UART: [art] PUB.X = BAFF34CBD271F5A5C7AE5532608BB244FEB500FF1D627F18F0507E8E422A858DEEEF294A061B95A37E6D91F8437947C4
3,131,629 UART: [art] PUB.Y = EFC00B9F25401635B784CD8E6938057523AE50407F4BC85671EB3161E03FF80057A79996AD7A1EAFB1136BBB8F65B740
3,138,553 UART: [art] SIG.R = 4AD16E689BB3CED2E4FD61EBC909F08B398563A78D8CBCDAFAD82A903546FA947F024722520ADAC0A79F55BC87AC8C13
3,145,334 UART: [art] SIG.S = 067803B75151E6B7D19600181D9BC7B99F6C30B5374E74AF7A852A399A47863C57BFE30C99692DE26B2C954871061808
3,168,668 UART: Caliptra RT
3,169,013 UART: [state] CFI Enabled
3,276,678 UART: [rt] RT listening for mailbox commands...
3,277,348 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,894 UART: [rt]cmd =0x44504543, len=136
3,372,068 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,230 ready_for_fw is high
1,060,230 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,645 >>> mbox cmd response: success
2,689,149 UART:
2,689,165 UART: Running Caliptra FMC ...
2,689,573 UART:
2,689,716 UART: [state] CFI Enabled
2,700,103 UART: [fht] FMC Alias Private Key: 7
2,808,086 UART: [art] Extend RT PCRs Done
2,808,514 UART: [art] Lock RT PCRs Done
2,810,052 UART: [art] Populate DV Done
2,818,519 UART: [fht] FMC Alias Private Key: 7
2,819,691 UART: [art] Derive CDI
2,819,971 UART: [art] Store in in slot 0x4
2,905,748 UART: [art] Derive Key Pair
2,906,108 UART: [art] Store priv key in slot 0x5
2,919,690 UART: [art] Derive Key Pair - Done
2,934,462 UART: [art] Signing Cert with AUTHO
2,934,942 UART: RITY.KEYID = 7
2,949,994 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,759 UART: [art] PUB.X = 48AB485CA1E8E711B8058295514EB0BFB0BC61B5C02D82386A34DF3ED4A7A96CC2093D964D014281568FC2D943C9EF61
2,957,526 UART: [art] PUB.Y = 81C5F428C8B2B554188857ADE70177A220E470ABB9978BEF2C13918BCA189204F12D8FBFA8B884B937E6ACB6E3826B20
2,964,476 UART: [art] SIG.R = E8E40E0B68C07479985E8E733037F177F0096241976C4D2F4486080602A5BAA39068EE371A668FCB25FAF655AB6B62AD
2,971,226 UART: [art] SIG.S = B2F7D36295E6E17BF7B0DC325F669A0A392D47E41427FFDBEBEE382799A54CF9329BBC4851C3FA08A0E7F1892ABCAA7C
2,994,987 UART: Caliptra RT
2,995,332 UART: [state] CFI Enabled
3,103,226 UART: [rt] RT listening for mailbox commands...
3,103,896 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,654 UART: [rt]cmd =0x44504543, len=136
3,199,036 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,173 UART: [state] WD Timer not started. Device not locked for debugging
87,450 UART: [kat] SHA2-256
891,000 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,129 UART: [kat] ++
895,281 UART: [kat] sha1
899,495 UART: [kat] SHA2-256
901,435 UART: [kat] SHA2-384
904,086 UART: [kat] SHA2-512-ACC
905,987 UART: [kat] ECC-384
915,828 UART: [kat] HMAC-384Kdf
920,326 UART: [kat] LMS
1,168,638 UART: [kat] --
1,169,421 UART: [cold-reset] ++
1,169,805 UART: [fht] FHT @ 0x50003400
1,172,463 UART: [idev] ++
1,172,631 UART: [idev] CDI.KEYID = 6
1,172,992 UART: [idev] SUBJECT.KEYID = 7
1,173,417 UART: [idev] UDS.KEYID = 0
1,173,763 ready_for_fw is high
1,173,763 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,995 UART: [idev] Erasing UDS.KEYID = 0
1,197,891 UART: [idev] Sha1 KeyId Algorithm
1,206,827 UART: [idev] --
1,207,902 UART: [ldev] ++
1,208,070 UART: [ldev] CDI.KEYID = 6
1,208,434 UART: [ldev] SUBJECT.KEYID = 5
1,208,861 UART: [ldev] AUTHORITY.KEYID = 7
1,209,324 UART: [ldev] FE.KEYID = 1
1,214,576 UART: [ldev] Erasing FE.KEYID = 1
1,241,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,376 UART: [ldev] --
1,280,706 UART: [fwproc] Wait for Commands...
1,281,523 UART: [fwproc] Recv command 0x46574c44
1,282,256 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,806 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,115 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,861 >>> mbox cmd response: success
2,773,094 UART: [afmc] ++
2,773,262 UART: [afmc] CDI.KEYID = 6
2,773,625 UART: [afmc] SUBJECT.KEYID = 7
2,774,051 UART: [afmc] AUTHORITY.KEYID = 5
2,808,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,136 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,887 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,616 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,499 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,218 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,029 UART: [afmc] --
2,852,137 UART: [cold-reset] --
2,852,917 UART: [state] Locking Datavault
2,854,090 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,694 UART: [state] Locking ICCM
2,855,346 UART: [exit] Launching FMC @ 0x40000130
2,860,675 UART:
2,860,691 UART: Running Caliptra FMC ...
2,861,099 UART:
2,861,153 UART: [state] CFI Enabled
2,871,626 UART: [fht] FMC Alias Private Key: 7
2,979,813 UART: [art] Extend RT PCRs Done
2,980,241 UART: [art] Lock RT PCRs Done
2,981,715 UART: [art] Populate DV Done
2,990,060 UART: [fht] FMC Alias Private Key: 7
2,991,230 UART: [art] Derive CDI
2,991,510 UART: [art] Store in in slot 0x4
3,077,083 UART: [art] Derive Key Pair
3,077,443 UART: [art] Store priv key in slot 0x5
3,090,069 UART: [art] Derive Key Pair - Done
3,104,759 UART: [art] Signing Cert with AUTHO
3,105,239 UART: RITY.KEYID = 7
3,120,321 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,086 UART: [art] PUB.X = EEDE6817EF2A60AD88D323E57DED4DBF2E328FF2CF9D57B14563C8D72F664395474F5FE1BACD298CF44B91AE26F45537
3,127,874 UART: [art] PUB.Y = 12BC84CF2C87BDCE6958DE857A6B97CB9D9EF518F9A1E74A53D968B74D21FEE674D3EA58D287284E559D8D15086B80A2
3,134,833 UART: [art] SIG.R = A4F0A11BD26A5A9ACA084A3A5F142BD058BBEF0CC7787477B7B66690625DAA4E09C2E6045CDA35B8080B574E3A623859
3,141,595 UART: [art] SIG.S = 153BFCF3D64A8236116BFDEEFF6EB9C36AB3B8897D5953A312A9FB73B9B8A91EB48F735A6EA890F6563F317331C5D40D
3,165,569 UART: Caliptra RT
3,165,822 UART: [state] CFI Enabled
3,272,787 UART: [rt] RT listening for mailbox commands...
3,273,457 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,997 UART: [rt]cmd =0x44504543, len=136
3,367,053 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,134 ready_for_fw is high
1,056,134 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,257 >>> mbox cmd response: success
2,684,467 UART:
2,684,483 UART: Running Caliptra FMC ...
2,684,891 UART:
2,684,945 UART: [state] CFI Enabled
2,695,204 UART: [fht] FMC Alias Private Key: 7
2,803,007 UART: [art] Extend RT PCRs Done
2,803,435 UART: [art] Lock RT PCRs Done
2,805,071 UART: [art] Populate DV Done
2,813,202 UART: [fht] FMC Alias Private Key: 7
2,814,188 UART: [art] Derive CDI
2,814,468 UART: [art] Store in in slot 0x4
2,900,283 UART: [art] Derive Key Pair
2,900,643 UART: [art] Store priv key in slot 0x5
2,913,977 UART: [art] Derive Key Pair - Done
2,928,512 UART: [art] Signing Cert with AUTHO
2,928,992 UART: RITY.KEYID = 7
2,944,490 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,255 UART: [art] PUB.X = 02123099DED3913E263AE386EDB85F6F2AE0A2B6B06CD9E7A885EA470E25BCC9A4C26BDA5CB7AA5531747965D1D4A7AA
2,952,037 UART: [art] PUB.Y = 1E052246A87581F24906D5E83D0972E15C8C1024D5F629291333B299248EED040FC524645BCF8F6136FD16C60249E350
2,958,957 UART: [art] SIG.R = 0135EBB7485FFAE6C7436B7AADEF4E0B5A71C808582A687F166C4E6CF860AF0AC838F19813F8DFB2A0324E6A728EEEE2
2,965,733 UART: [art] SIG.S = 22A2493BCEB5A5D314ED0316C257945C06F59CBF441E64464AA01B7771DE9D111D50193D9D4444BB8D6EE49BB0A395EA
2,988,960 UART: Caliptra RT
2,989,213 UART: [state] CFI Enabled
3,097,784 UART: [rt] RT listening for mailbox commands...
3,098,454 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,246 UART: [rt]cmd =0x44504543, len=136
3,193,020 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,382 UART: [kat] ++
895,534 UART: [kat] sha1
899,708 UART: [kat] SHA2-256
901,648 UART: [kat] SHA2-384
904,447 UART: [kat] SHA2-512-ACC
906,348 UART: [kat] ECC-384
916,019 UART: [kat] HMAC-384Kdf
920,641 UART: [kat] LMS
1,168,953 UART: [kat] --
1,169,670 UART: [cold-reset] ++
1,170,246 UART: [fht] FHT @ 0x50003400
1,172,708 UART: [idev] ++
1,172,876 UART: [idev] CDI.KEYID = 6
1,173,237 UART: [idev] SUBJECT.KEYID = 7
1,173,662 UART: [idev] UDS.KEYID = 0
1,174,008 ready_for_fw is high
1,174,008 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,750 UART: [idev] Erasing UDS.KEYID = 0
1,199,158 UART: [idev] Sha1 KeyId Algorithm
1,207,994 UART: [idev] --
1,209,107 UART: [ldev] ++
1,209,275 UART: [ldev] CDI.KEYID = 6
1,209,639 UART: [ldev] SUBJECT.KEYID = 5
1,210,066 UART: [ldev] AUTHORITY.KEYID = 7
1,210,529 UART: [ldev] FE.KEYID = 1
1,215,873 UART: [ldev] Erasing FE.KEYID = 1
1,242,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,229 UART: [ldev] --
1,281,659 UART: [fwproc] Wait for Commands...
1,282,430 UART: [fwproc] Recv command 0x46574c44
1,283,163 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,493 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,802 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,666 >>> mbox cmd response: success
2,772,847 UART: [afmc] ++
2,773,015 UART: [afmc] CDI.KEYID = 6
2,773,378 UART: [afmc] SUBJECT.KEYID = 7
2,773,804 UART: [afmc] AUTHORITY.KEYID = 5
2,808,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,902 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,631 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,514 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,233 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,042 UART: [afmc] --
2,852,084 UART: [cold-reset] --
2,852,908 UART: [state] Locking Datavault
2,854,097 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,701 UART: [state] Locking ICCM
2,855,311 UART: [exit] Launching FMC @ 0x40000130
2,860,640 UART:
2,860,656 UART: Running Caliptra FMC ...
2,861,064 UART:
2,861,207 UART: [state] CFI Enabled
2,871,810 UART: [fht] FMC Alias Private Key: 7
2,979,983 UART: [art] Extend RT PCRs Done
2,980,411 UART: [art] Lock RT PCRs Done
2,981,859 UART: [art] Populate DV Done
2,990,214 UART: [fht] FMC Alias Private Key: 7
2,991,286 UART: [art] Derive CDI
2,991,566 UART: [art] Store in in slot 0x4
3,076,863 UART: [art] Derive Key Pair
3,077,223 UART: [art] Store priv key in slot 0x5
3,090,345 UART: [art] Derive Key Pair - Done
3,105,289 UART: [art] Signing Cert with AUTHO
3,105,769 UART: RITY.KEYID = 7
3,120,771 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,536 UART: [art] PUB.X = 249CEB5764726C004843FE9A5DBA7DF6466F846865DCC0CF5DFCD2751F7507FD87F841ECE4EBF987D3B14F524DB9E460
3,128,295 UART: [art] PUB.Y = 5F49359F25A4EF83FC350D67CF80BFFFF78C5EE3BB6530D18476CE2DFE001F70B4801F8BE0FAE79A4B218A0E3567C3C9
3,135,235 UART: [art] SIG.R = 730A42D71DAB81E256CE13B658074FB0790477856FF89EC7A207AF8161EC27BC6C12FF4C61F2C75FF57E5181F17B2768
3,141,997 UART: [art] SIG.S = D5611A605B409504F5C9946194CFC12728ECCA6E84AA6766F5BD49BEBD32C2134E15CB2540A7AFBA35E94A6FC65A0717
3,165,558 UART: Caliptra RT
3,165,903 UART: [state] CFI Enabled
3,273,190 UART: [rt] RT listening for mailbox commands...
3,273,860 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,220 UART: [rt]cmd =0x44504543, len=136
3,369,102 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,197 ready_for_fw is high
1,056,197 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,060 >>> mbox cmd response: success
2,685,180 UART:
2,685,196 UART: Running Caliptra FMC ...
2,685,604 UART:
2,685,747 UART: [state] CFI Enabled
2,696,662 UART: [fht] FMC Alias Private Key: 7
2,805,093 UART: [art] Extend RT PCRs Done
2,805,521 UART: [art] Lock RT PCRs Done
2,806,981 UART: [art] Populate DV Done
2,814,870 UART: [fht] FMC Alias Private Key: 7
2,815,948 UART: [art] Derive CDI
2,816,228 UART: [art] Store in in slot 0x4
2,901,839 UART: [art] Derive Key Pair
2,902,199 UART: [art] Store priv key in slot 0x5
2,915,677 UART: [art] Derive Key Pair - Done
2,930,459 UART: [art] Signing Cert with AUTHO
2,930,939 UART: RITY.KEYID = 7
2,946,269 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,034 UART: [art] PUB.X = 1D487619B208BEE183466D159ED3731C783D35C8A4635C13F1C58CFB3D3B090BE283380DF0B15C296DAAFD067210D9C8
2,953,793 UART: [art] PUB.Y = 71305BF69FEF86D5D9C5D4582109083E2B35BE0BB49DF32AC773074B27CAA088AB477899F8B89B08E73CBE23E35B27AC
2,960,738 UART: [art] SIG.R = CBFD5901E018603D6D7D08AD72A03B5577B163C7C5A4531FF7CA41F4DE0D6C16A9A4CC2402A2CBAB87A78588969B7DC3
2,967,510 UART: [art] SIG.S = AF8B5C77BE923C5F9E3F97A4DE00104AED229607AD5A966C50ECA0C0E96AC898A3A4D96E2DA553AF0EDCC60427FFC772
2,991,812 UART: Caliptra RT
2,992,157 UART: [state] CFI Enabled
3,099,757 UART: [rt] RT listening for mailbox commands...
3,100,427 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,963 UART: [rt]cmd =0x44504543, len=136
3,194,573 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,383 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,893 UART: [kat] SHA2-256
881,824 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,939 UART: [kat] ++
886,091 UART: [kat] sha1
890,287 UART: [kat] SHA2-256
892,225 UART: [kat] SHA2-384
894,970 UART: [kat] SHA2-512-ACC
896,871 UART: [kat] ECC-384
902,480 UART: [kat] HMAC-384Kdf
907,110 UART: [kat] LMS
1,475,306 UART: [kat] --
1,476,023 UART: [cold-reset] ++
1,476,465 UART: [fht] Storing FHT @ 0x50003400
1,479,194 UART: [idev] ++
1,479,362 UART: [idev] CDI.KEYID = 6
1,479,722 UART: [idev] SUBJECT.KEYID = 7
1,480,146 UART: [idev] UDS.KEYID = 0
1,480,491 ready_for_fw is high
1,480,491 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,340 UART: [idev] Erasing UDS.KEYID = 0
1,505,420 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,238 UART: [idev] --
1,515,177 UART: [ldev] ++
1,515,345 UART: [ldev] CDI.KEYID = 6
1,515,708 UART: [ldev] SUBJECT.KEYID = 5
1,516,134 UART: [ldev] AUTHORITY.KEYID = 7
1,516,597 UART: [ldev] FE.KEYID = 1
1,521,701 UART: [ldev] Erasing FE.KEYID = 1
1,547,646 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,056 UART: [ldev] --
1,587,497 UART: [fwproc] Waiting for Commands...
1,588,308 UART: [fwproc] Received command 0x46574c44
1,589,099 UART: [fwproc] Received Image of size 114332 bytes
2,887,953 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,647 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,999 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,854 >>> mbox cmd response: success
3,080,922 UART: [afmc] ++
3,081,090 UART: [afmc] CDI.KEYID = 6
3,081,452 UART: [afmc] SUBJECT.KEYID = 7
3,081,877 UART: [afmc] AUTHORITY.KEYID = 5
3,116,644 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,364 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,144 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,872 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,757 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,447 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,312 UART: [afmc] --
3,160,278 UART: [cold-reset] --
3,161,182 UART: [state] Locking Datavault
3,162,245 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,849 UART: [state] Locking ICCM
3,163,303 UART: [exit] Launching FMC @ 0x40000130
3,168,632 UART:
3,168,648 UART: Running Caliptra FMC ...
3,169,056 UART:
3,169,110 UART: [state] CFI Enabled
3,179,943 UART: [fht] FMC Alias Private Key: 7
3,288,230 UART: [art] Extend RT PCRs Done
3,288,658 UART: [art] Lock RT PCRs Done
3,290,344 UART: [art] Populate DV Done
3,298,587 UART: [fht] FMC Alias Private Key: 7
3,299,581 UART: [art] Derive CDI
3,299,861 UART: [art] Store in in slot 0x4
3,385,656 UART: [art] Derive Key Pair
3,386,016 UART: [art] Store priv key in slot 0x5
3,398,642 UART: [art] Derive Key Pair - Done
3,413,085 UART: [art] Signing Cert with AUTHO
3,413,565 UART: RITY.KEYID = 7
3,428,723 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,488 UART: [art] PUB.X = 9DCF53BEA6BDC50E8C42D45C720A8938B97FFCF11BC004D2D30FFAE4E20BFB5BDFE492BD51E2CC8D44836D5471DFA64A
3,436,273 UART: [art] PUB.Y = 6BD51ADCD13AF11CECCB5C794EBC9CC7FF4BA3430B524E7C2CA1E7FFC22A974BF392AA0159BD25558B6228D0686AF6DF
3,443,245 UART: [art] SIG.R = EB3E659EA52F0366AD953363F339B34A6DC08B33834D2F5118F39CFD7063123E83D2B7E929B9E63780AB84D15EE2AA43
3,450,016 UART: [art] SIG.S = CB69520CD0EED2366719751A416C5CA5A50184D54B40392F11A43C0DA4E8D89ED780BE4AE0E5E5AAABE634E4A7825E10
3,473,720 UART: Caliptra RT
3,473,973 UART: [state] CFI Enabled
3,581,883 UART: [rt] RT listening for mailbox commands...
3,582,553 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,025 UART: [rt]cmd =0x44504543, len=92
3,828,684 >>> mbox cmd response data (6284 bytes)
3,828,685 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,857,922 UART: [rt]cmd =0x43455252, len=4
3,868,613 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,123 ready_for_fw is high
1,363,123 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,502 >>> mbox cmd response: success
2,989,546 UART:
2,989,562 UART: Running Caliptra FMC ...
2,989,970 UART:
2,990,024 UART: [state] CFI Enabled
3,000,455 UART: [fht] FMC Alias Private Key: 7
3,108,616 UART: [art] Extend RT PCRs Done
3,109,044 UART: [art] Lock RT PCRs Done
3,110,552 UART: [art] Populate DV Done
3,118,799 UART: [fht] FMC Alias Private Key: 7
3,119,909 UART: [art] Derive CDI
3,120,189 UART: [art] Store in in slot 0x4
3,205,716 UART: [art] Derive Key Pair
3,206,076 UART: [art] Store priv key in slot 0x5
3,219,390 UART: [art] Derive Key Pair - Done
3,233,856 UART: [art] Signing Cert with AUTHO
3,234,336 UART: RITY.KEYID = 7
3,249,808 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,573 UART: [art] PUB.X = 7C18F5BCE468F243092C3C78385806D000DABD57D9E281BD5A6A6032BC89E1B4735F8696D56071FB081C15F2068D68C9
3,257,309 UART: [art] PUB.Y = 86915AA64AD23218DD3146842F42C1AD0B8DAB3507E7F5D95A44503E45E065DC8731151E83ED4EF2C4DDA432214A81DB
3,264,259 UART: [art] SIG.R = 2C3AFA50A4AC91A0E8E892A259BB0EA00909F8619BB5BAE01CF16B2B7C9A8AC72F3C7F610D3773604A46E34D1FC6E4A3
3,271,035 UART: [art] SIG.S = 787DEC3F1FF4F0D15F852DDC02EB6C21D5FF794B8CA4309C74132B2EE870E47AF0D882502E6F5F995922C0BFEC76CC26
3,294,487 UART: Caliptra RT
3,294,740 UART: [state] CFI Enabled
3,403,692 UART: [rt] RT listening for mailbox commands...
3,404,362 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,846 UART: [rt]cmd =0x44504543, len=92
3,650,983 >>> mbox cmd response data (6284 bytes)
3,650,984 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,680,205 UART: [rt]cmd =0x43455252, len=4
3,691,025 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,390 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,098 UART: [kat] SHA2-256
882,029 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,144 UART: [kat] ++
886,296 UART: [kat] sha1
890,504 UART: [kat] SHA2-256
892,442 UART: [kat] SHA2-384
895,209 UART: [kat] SHA2-512-ACC
897,110 UART: [kat] ECC-384
902,607 UART: [kat] HMAC-384Kdf
907,341 UART: [kat] LMS
1,475,537 UART: [kat] --
1,476,520 UART: [cold-reset] ++
1,476,900 UART: [fht] Storing FHT @ 0x50003400
1,479,675 UART: [idev] ++
1,479,843 UART: [idev] CDI.KEYID = 6
1,480,203 UART: [idev] SUBJECT.KEYID = 7
1,480,627 UART: [idev] UDS.KEYID = 0
1,480,972 ready_for_fw is high
1,480,972 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,659 UART: [idev] Erasing UDS.KEYID = 0
1,505,749 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,265 UART: [idev] --
1,515,430 UART: [ldev] ++
1,515,598 UART: [ldev] CDI.KEYID = 6
1,515,961 UART: [ldev] SUBJECT.KEYID = 5
1,516,387 UART: [ldev] AUTHORITY.KEYID = 7
1,516,850 UART: [ldev] FE.KEYID = 1
1,521,894 UART: [ldev] Erasing FE.KEYID = 1
1,548,269 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,211 UART: [ldev] --
1,587,654 UART: [fwproc] Waiting for Commands...
1,588,359 UART: [fwproc] Received command 0x46574c44
1,589,150 UART: [fwproc] Received Image of size 114332 bytes
2,887,246 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,598 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,950 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,865 >>> mbox cmd response: success
3,080,939 UART: [afmc] ++
3,081,107 UART: [afmc] CDI.KEYID = 6
3,081,469 UART: [afmc] SUBJECT.KEYID = 7
3,081,894 UART: [afmc] AUTHORITY.KEYID = 5
3,117,411 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,781 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,561 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,289 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,174 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,864 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,819 UART: [afmc] --
3,160,883 UART: [cold-reset] --
3,161,845 UART: [state] Locking Datavault
3,162,966 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,570 UART: [state] Locking ICCM
3,164,092 UART: [exit] Launching FMC @ 0x40000130
3,169,421 UART:
3,169,437 UART: Running Caliptra FMC ...
3,169,845 UART:
3,169,988 UART: [state] CFI Enabled
3,180,557 UART: [fht] FMC Alias Private Key: 7
3,288,870 UART: [art] Extend RT PCRs Done
3,289,298 UART: [art] Lock RT PCRs Done
3,290,906 UART: [art] Populate DV Done
3,299,201 UART: [fht] FMC Alias Private Key: 7
3,300,213 UART: [art] Derive CDI
3,300,493 UART: [art] Store in in slot 0x4
3,386,388 UART: [art] Derive Key Pair
3,386,748 UART: [art] Store priv key in slot 0x5
3,399,610 UART: [art] Derive Key Pair - Done
3,414,761 UART: [art] Signing Cert with AUTHO
3,415,241 UART: RITY.KEYID = 7
3,430,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,292 UART: [art] PUB.X = DC87A489C20E115ADBE9F1B9F7879EFD6CBB484E50DCF600D7551AD83F2AE950083EF0D9D0ADB80D0F21602CF06E3DB7
3,438,050 UART: [art] PUB.Y = 3685323B5B6E914F494FA5A18C40D84B3B0A2E134FBD51273E83856715C95E5566B95DDC03E72FAD5C8B8D381E2F7C60
3,444,998 UART: [art] SIG.R = 91861F3728C799C05CC810577ECB7D78FDBBB1A53E8B097312E110011EC397258B632D5A189405F95AD907B87C2E5BBD
3,451,758 UART: [art] SIG.S = 8EE0512EDE009C92BDE44A99774E00AA77D79D2B596311D6CAC397503158963087864B34BB5B933E57E6CBF0DA1DB89C
3,475,269 UART: Caliptra RT
3,475,614 UART: [state] CFI Enabled
3,584,980 UART: [rt] RT listening for mailbox commands...
3,585,650 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,852 UART: [rt]cmd =0x44504543, len=92
3,832,737 >>> mbox cmd response data (6284 bytes)
3,832,738 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,039 UART: [rt]cmd =0x43455252, len=4
3,872,648 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,578 ready_for_fw is high
1,363,578 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,293 >>> mbox cmd response: success
2,990,909 UART:
2,990,925 UART: Running Caliptra FMC ...
2,991,333 UART:
2,991,476 UART: [state] CFI Enabled
3,002,285 UART: [fht] FMC Alias Private Key: 7
3,110,802 UART: [art] Extend RT PCRs Done
3,111,230 UART: [art] Lock RT PCRs Done
3,112,862 UART: [art] Populate DV Done
3,121,301 UART: [fht] FMC Alias Private Key: 7
3,122,429 UART: [art] Derive CDI
3,122,709 UART: [art] Store in in slot 0x4
3,208,688 UART: [art] Derive Key Pair
3,209,048 UART: [art] Store priv key in slot 0x5
3,222,108 UART: [art] Derive Key Pair - Done
3,236,902 UART: [art] Signing Cert with AUTHO
3,237,382 UART: RITY.KEYID = 7
3,252,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,309 UART: [art] PUB.X = 954F8ADEEF90E34A9572BE83CC90ED1F1C1876787E510D526EBC13F573E2EA0E8CD517B57907AFC71F9E180310419235
3,260,073 UART: [art] PUB.Y = E22767F4CC7DA32A70FC42A78002A351A0D6A92798B52EA0FC8FD321466C383365DB29F5B01A9144AF8EF4836907D536
3,267,019 UART: [art] SIG.R = 790FAEF5B89A352C9123E192C1F4C41F232E63EAB960A3EE464331F8F25C73897815696EAC037D0979D3882B253AEB21
3,273,780 UART: [art] SIG.S = A16AD1B4A41AC2B1442ED9F966C828BCCB610041F6E5914453E9F36B51A79BD211B9132E01DDB521772E61015CC6F995
3,296,825 UART: Caliptra RT
3,297,170 UART: [state] CFI Enabled
3,404,183 UART: [rt] RT listening for mailbox commands...
3,404,853 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,291 UART: [rt]cmd =0x44504543, len=92
3,652,089 >>> mbox cmd response data (6284 bytes)
3,652,090 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,681,239 UART: [rt]cmd =0x43455252, len=4
3,691,997 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
893,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,393 UART: [kat] ++
897,545 UART: [kat] sha1
901,645 UART: [kat] SHA2-256
903,585 UART: [kat] SHA2-384
906,312 UART: [kat] SHA2-512-ACC
908,213 UART: [kat] ECC-384
917,566 UART: [kat] HMAC-384Kdf
922,152 UART: [kat] LMS
1,170,480 UART: [kat] --
1,171,649 UART: [cold-reset] ++
1,172,213 UART: [fht] FHT @ 0x50003400
1,174,786 UART: [idev] ++
1,174,954 UART: [idev] CDI.KEYID = 6
1,175,314 UART: [idev] SUBJECT.KEYID = 7
1,175,738 UART: [idev] UDS.KEYID = 0
1,176,083 ready_for_fw is high
1,176,083 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,900 UART: [idev] Erasing UDS.KEYID = 0
1,200,611 UART: [idev] Sha1 KeyId Algorithm
1,209,217 UART: [idev] --
1,210,165 UART: [ldev] ++
1,210,333 UART: [ldev] CDI.KEYID = 6
1,210,696 UART: [ldev] SUBJECT.KEYID = 5
1,211,122 UART: [ldev] AUTHORITY.KEYID = 7
1,211,585 UART: [ldev] FE.KEYID = 1
1,216,831 UART: [ldev] Erasing FE.KEYID = 1
1,243,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,233 UART: [ldev] --
1,282,632 UART: [fwproc] Wait for Commands...
1,283,362 UART: [fwproc] Recv command 0x46574c44
1,284,090 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,352 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,656 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,461 >>> mbox cmd response: success
2,774,591 UART: [afmc] ++
2,774,759 UART: [afmc] CDI.KEYID = 6
2,775,121 UART: [afmc] SUBJECT.KEYID = 7
2,775,546 UART: [afmc] AUTHORITY.KEYID = 5
2,811,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,542 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,290 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,018 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,903 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,622 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,358 UART: [afmc] --
2,854,462 UART: [cold-reset] --
2,855,230 UART: [state] Locking Datavault
2,856,535 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,139 UART: [state] Locking ICCM
2,857,565 UART: [exit] Launching FMC @ 0x40000130
2,862,894 UART:
2,862,910 UART: Running Caliptra FMC ...
2,863,318 UART:
2,863,372 UART: [state] CFI Enabled
2,873,713 UART: [fht] FMC Alias Private Key: 7
2,981,624 UART: [art] Extend RT PCRs Done
2,982,052 UART: [art] Lock RT PCRs Done
2,983,588 UART: [art] Populate DV Done
2,991,625 UART: [fht] FMC Alias Private Key: 7
2,992,679 UART: [art] Derive CDI
2,992,959 UART: [art] Store in in slot 0x4
3,078,750 UART: [art] Derive Key Pair
3,079,110 UART: [art] Store priv key in slot 0x5
3,092,384 UART: [art] Derive Key Pair - Done
3,106,984 UART: [art] Signing Cert with AUTHO
3,107,464 UART: RITY.KEYID = 7
3,122,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,197 UART: [art] PUB.X = 114FF8A439B9B6B3067C41B4204AD6D2EE7944C2430383A203447D181B4F698F2915A80D9684B309FE977BE94E8C01FE
3,129,947 UART: [art] PUB.Y = B8661437CB45BCB5926EC275AF9144D999B107FB07A557BE7C9EDFDE1572A0B7C14724C9207899F2A52982FB71E86B90
3,136,895 UART: [art] SIG.R = F4CB4FB9EC3250870D79FA62EEA734CBF3B104E45BCCD5065B7A5288312661B219624A923A996451308B9228606B7AC6
3,143,656 UART: [art] SIG.S = 9257EE6402BA5AA7C9C74F1DF4B5F22E1BECA81ABEB92808C9F7B32D029285CAC0EB23C4F634FABFE63B33F5FF0AA69E
3,166,921 UART: Caliptra RT
3,167,174 UART: [state] CFI Enabled
3,274,984 UART: [rt] RT listening for mailbox commands...
3,275,654 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,112 UART: [rt]cmd =0x44504543, len=92
3,521,780 >>> mbox cmd response data (6284 bytes)
3,521,781 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,551,372 UART: [rt]cmd =0x43455252, len=4
3,562,251 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,121 ready_for_fw is high
1,061,121 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,636 >>> mbox cmd response: success
2,690,268 UART:
2,690,284 UART: Running Caliptra FMC ...
2,690,692 UART:
2,690,746 UART: [state] CFI Enabled
2,701,299 UART: [fht] FMC Alias Private Key: 7
2,809,510 UART: [art] Extend RT PCRs Done
2,809,938 UART: [art] Lock RT PCRs Done
2,811,180 UART: [art] Populate DV Done
2,819,045 UART: [fht] FMC Alias Private Key: 7
2,820,049 UART: [art] Derive CDI
2,820,329 UART: [art] Store in in slot 0x4
2,905,788 UART: [art] Derive Key Pair
2,906,148 UART: [art] Store priv key in slot 0x5
2,918,944 UART: [art] Derive Key Pair - Done
2,933,647 UART: [art] Signing Cert with AUTHO
2,934,127 UART: RITY.KEYID = 7
2,949,181 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,946 UART: [art] PUB.X = A9D315429D09F22C05AE498F9A71F9E906F4BA8DF8186C4567C54F18906B47B9B656565C2E2A659F6ECA75CF2601A3E8
2,956,708 UART: [art] PUB.Y = DB166F770D263C882AF94E17E7C991935A7921E0C4328283C090AA5909DB1FC118809604AAB07EBAAEEA3AF058F4B79C
2,963,657 UART: [art] SIG.R = 81B9A97C17F86B22FC741C31A4DBA9A48178E8647390AFA06560393E58EE1C20EAD72F9B70F897682CE716525A85217B
2,970,427 UART: [art] SIG.S = 076DE8E7B5F714A414A702A100056D6BDCE6D50EC812CC9A3DE98D41EA782FEACFDB1B7D65C0E37580307A73AAF2F79D
2,994,632 UART: Caliptra RT
2,994,885 UART: [state] CFI Enabled
3,102,732 UART: [rt] RT listening for mailbox commands...
3,103,402 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,512 UART: [rt]cmd =0x44504543, len=92
3,349,664 >>> mbox cmd response data (6284 bytes)
3,349,665 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,379,108 UART: [rt]cmd =0x43455252, len=4
3,389,884 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
893,639 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,764 UART: [kat] ++
897,916 UART: [kat] sha1
902,152 UART: [kat] SHA2-256
904,092 UART: [kat] SHA2-384
906,983 UART: [kat] SHA2-512-ACC
908,884 UART: [kat] ECC-384
918,767 UART: [kat] HMAC-384Kdf
923,339 UART: [kat] LMS
1,171,667 UART: [kat] --
1,172,632 UART: [cold-reset] ++
1,173,146 UART: [fht] FHT @ 0x50003400
1,175,949 UART: [idev] ++
1,176,117 UART: [idev] CDI.KEYID = 6
1,176,477 UART: [idev] SUBJECT.KEYID = 7
1,176,901 UART: [idev] UDS.KEYID = 0
1,177,246 ready_for_fw is high
1,177,246 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,229 UART: [idev] Erasing UDS.KEYID = 0
1,202,148 UART: [idev] Sha1 KeyId Algorithm
1,210,624 UART: [idev] --
1,211,624 UART: [ldev] ++
1,211,792 UART: [ldev] CDI.KEYID = 6
1,212,155 UART: [ldev] SUBJECT.KEYID = 5
1,212,581 UART: [ldev] AUTHORITY.KEYID = 7
1,213,044 UART: [ldev] FE.KEYID = 1
1,218,074 UART: [ldev] Erasing FE.KEYID = 1
1,244,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,162 UART: [ldev] --
1,283,637 UART: [fwproc] Wait for Commands...
1,284,275 UART: [fwproc] Recv command 0x46574c44
1,285,003 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,649 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,953 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,686 >>> mbox cmd response: success
2,774,698 UART: [afmc] ++
2,774,866 UART: [afmc] CDI.KEYID = 6
2,775,228 UART: [afmc] SUBJECT.KEYID = 7
2,775,653 UART: [afmc] AUTHORITY.KEYID = 5
2,811,636 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,173 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,921 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,649 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,534 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,253 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,161 UART: [afmc] --
2,855,075 UART: [cold-reset] --
2,855,909 UART: [state] Locking Datavault
2,857,146 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,750 UART: [state] Locking ICCM
2,858,316 UART: [exit] Launching FMC @ 0x40000130
2,863,645 UART:
2,863,661 UART: Running Caliptra FMC ...
2,864,069 UART:
2,864,212 UART: [state] CFI Enabled
2,874,977 UART: [fht] FMC Alias Private Key: 7
2,982,844 UART: [art] Extend RT PCRs Done
2,983,272 UART: [art] Lock RT PCRs Done
2,985,208 UART: [art] Populate DV Done
2,993,751 UART: [fht] FMC Alias Private Key: 7
2,994,717 UART: [art] Derive CDI
2,994,997 UART: [art] Store in in slot 0x4
3,081,006 UART: [art] Derive Key Pair
3,081,366 UART: [art] Store priv key in slot 0x5
3,094,622 UART: [art] Derive Key Pair - Done
3,109,175 UART: [art] Signing Cert with AUTHO
3,109,655 UART: RITY.KEYID = 7
3,124,995 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,760 UART: [art] PUB.X = D122FE52DB7F1798AC10086301E65D239BE69CBFE20F45D6A4CFDC145367F78AE02496ED13389FAF6A351382F2C9F717
3,132,529 UART: [art] PUB.Y = 8457EC2B1F55CDB63A7639D0D6A3F8E326F1DC3ECDF1D435AF59C2893B15E59213F029BBEE859AA14A9B5AC64328E058
3,139,493 UART: [art] SIG.R = C31BF15C175867B3822ED094AC55A1C3DC021B2C3B33BF2E24C54DB49D55C091A2018120AE9C2725C9EC63F81E8B6807
3,146,260 UART: [art] SIG.S = 216BEEAE7092511B12BF19BDC209A53135B9C96095907634519AEEF3391C3688A15F975489D46D048E3719CDD68CA54E
3,170,303 UART: Caliptra RT
3,170,648 UART: [state] CFI Enabled
3,277,893 UART: [rt] RT listening for mailbox commands...
3,278,563 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,017 UART: [rt]cmd =0x44504543, len=92
3,525,536 >>> mbox cmd response data (6284 bytes)
3,525,537 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,555,052 UART: [rt]cmd =0x43455252, len=4
3,565,990 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,372 ready_for_fw is high
1,060,372 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,391 >>> mbox cmd response: success
2,689,297 UART:
2,689,313 UART: Running Caliptra FMC ...
2,689,721 UART:
2,689,864 UART: [state] CFI Enabled
2,700,465 UART: [fht] FMC Alias Private Key: 7
2,808,396 UART: [art] Extend RT PCRs Done
2,808,824 UART: [art] Lock RT PCRs Done
2,810,410 UART: [art] Populate DV Done
2,818,565 UART: [fht] FMC Alias Private Key: 7
2,819,533 UART: [art] Derive CDI
2,819,813 UART: [art] Store in in slot 0x4
2,905,650 UART: [art] Derive Key Pair
2,906,010 UART: [art] Store priv key in slot 0x5
2,919,392 UART: [art] Derive Key Pair - Done
2,934,361 UART: [art] Signing Cert with AUTHO
2,934,841 UART: RITY.KEYID = 7
2,950,137 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,902 UART: [art] PUB.X = C1856602A017C84226D9AAAE5F43E5CE7EFF302C8C2692EE2FC854B3DE4C858CE002A46A73903A253F0B991DACF5B58E
2,957,677 UART: [art] PUB.Y = 906A31446D065DC9FC3141B7B2B9606D8230EC464F665998DFB496CC716F7E751AA1B13672D5E3F3FC675BEEBB1AB17E
2,964,634 UART: [art] SIG.R = CA7D57CB9F9AAC4A31DD6AEB1483D733A52376749F808D96759CA8D97E4AD8D56F0F4D09A935BAFF297D8B44F91924E6
2,971,412 UART: [art] SIG.S = 8B3903C78DD83AE4A2F97E1A8FFDE5124E7D658B3D574EF627E0DC3866CE36120C7156879C6929E3DD559BC550891A5F
2,995,027 UART: Caliptra RT
2,995,372 UART: [state] CFI Enabled
3,103,468 UART: [rt] RT listening for mailbox commands...
3,104,138 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,582 UART: [rt]cmd =0x44504543, len=92
3,350,919 >>> mbox cmd response data (6284 bytes)
3,350,920 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,380,201 UART: [rt]cmd =0x43455252, len=4
3,390,948 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Unprovisioned
85,949 UART: [state] DebugLocked = No
86,657 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [kat] SHA2-256
891,470 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,599 UART: [kat] ++
895,751 UART: [kat] sha1
900,155 UART: [kat] SHA2-256
902,095 UART: [kat] SHA2-384
904,752 UART: [kat] SHA2-512-ACC
906,653 UART: [kat] ECC-384
916,498 UART: [kat] HMAC-384Kdf
921,106 UART: [kat] LMS
1,169,418 UART: [kat] --
1,170,347 UART: [cold-reset] ++
1,170,919 UART: [fht] FHT @ 0x50003400
1,173,563 UART: [idev] ++
1,173,731 UART: [idev] CDI.KEYID = 6
1,174,092 UART: [idev] SUBJECT.KEYID = 7
1,174,517 UART: [idev] UDS.KEYID = 0
1,174,863 ready_for_fw is high
1,174,863 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,403 UART: [idev] Erasing UDS.KEYID = 0
1,199,409 UART: [idev] Sha1 KeyId Algorithm
1,208,163 UART: [idev] --
1,209,218 UART: [ldev] ++
1,209,386 UART: [ldev] CDI.KEYID = 6
1,209,750 UART: [ldev] SUBJECT.KEYID = 5
1,210,177 UART: [ldev] AUTHORITY.KEYID = 7
1,210,640 UART: [ldev] FE.KEYID = 1
1,215,596 UART: [ldev] Erasing FE.KEYID = 1
1,241,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,884 UART: [ldev] --
1,281,254 UART: [fwproc] Wait for Commands...
1,281,981 UART: [fwproc] Recv command 0x46574c44
1,282,714 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,726 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,035 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,883 >>> mbox cmd response: success
2,772,900 UART: [afmc] ++
2,773,068 UART: [afmc] CDI.KEYID = 6
2,773,431 UART: [afmc] SUBJECT.KEYID = 7
2,773,857 UART: [afmc] AUTHORITY.KEYID = 5
2,809,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,902 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,653 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,382 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,265 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,984 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,637 UART: [afmc] --
2,852,657 UART: [cold-reset] --
2,853,589 UART: [state] Locking Datavault
2,854,540 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,144 UART: [state] Locking ICCM
2,855,650 UART: [exit] Launching FMC @ 0x40000130
2,860,979 UART:
2,860,995 UART: Running Caliptra FMC ...
2,861,403 UART:
2,861,457 UART: [state] CFI Enabled
2,871,794 UART: [fht] FMC Alias Private Key: 7
2,979,923 UART: [art] Extend RT PCRs Done
2,980,351 UART: [art] Lock RT PCRs Done
2,981,883 UART: [art] Populate DV Done
2,990,100 UART: [fht] FMC Alias Private Key: 7
2,991,072 UART: [art] Derive CDI
2,991,352 UART: [art] Store in in slot 0x4
3,077,071 UART: [art] Derive Key Pair
3,077,431 UART: [art] Store priv key in slot 0x5
3,090,497 UART: [art] Derive Key Pair - Done
3,105,564 UART: [art] Signing Cert with AUTHO
3,106,044 UART: RITY.KEYID = 7
3,121,652 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,417 UART: [art] PUB.X = F88693CFB9487EC2285B250BAB8D626B399CBAED0D78C55135C42AC53DEF328F3C5188440F7FE689BCA5D05170C1A1C4
3,129,190 UART: [art] PUB.Y = E59B431D5100B071AAECF062F6DF941FF7890E6A325A5C59F3C9BA15BF96B8003BF07CA06C230CEF10FB7BCF80A4E378
3,136,108 UART: [art] SIG.R = 8F4227A282185E1D481CEB3D263BFCC3208C3C86391330AC06C84E863DBF2D934C21C204E45FACB6377BCF5A2358FC91
3,142,880 UART: [art] SIG.S = A93C8D3E7173F61E353E00CB8AA0E6E3931C07EE6727FC54D5A487DF0D36F28A4AD39BFFFF160E278AC1F096A5D84563
3,166,472 UART: Caliptra RT
3,166,725 UART: [state] CFI Enabled
3,274,307 UART: [rt] RT listening for mailbox commands...
3,274,977 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,415 UART: [rt]cmd =0x44504543, len=92
3,520,389 >>> mbox cmd response data (6284 bytes)
3,520,390 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,549,667 UART: [rt]cmd =0x43455252, len=4
3,560,580 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,926 ready_for_fw is high
1,055,926 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,677 >>> mbox cmd response: success
2,684,861 UART:
2,684,877 UART: Running Caliptra FMC ...
2,685,285 UART:
2,685,339 UART: [state] CFI Enabled
2,695,868 UART: [fht] FMC Alias Private Key: 7
2,803,283 UART: [art] Extend RT PCRs Done
2,803,711 UART: [art] Lock RT PCRs Done
2,805,169 UART: [art] Populate DV Done
2,813,608 UART: [fht] FMC Alias Private Key: 7
2,814,536 UART: [art] Derive CDI
2,814,816 UART: [art] Store in in slot 0x4
2,900,241 UART: [art] Derive Key Pair
2,900,601 UART: [art] Store priv key in slot 0x5
2,913,585 UART: [art] Derive Key Pair - Done
2,928,521 UART: [art] Signing Cert with AUTHO
2,929,001 UART: RITY.KEYID = 7
2,944,223 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,988 UART: [art] PUB.X = 9A82BC5005DDA8741A186D5262638A3B9A541960CB02D2D4F7713A41D64C3DD72F8C800D3F631AC2E9AD9A63FC71DCF3
2,951,759 UART: [art] PUB.Y = 7B6B84DA13049B290EA23D3DA4A40D6A0F631E1FFD5D1904055CAEFA0A34AC0B4D75ED983188C7ECD39639C2B62F3E17
2,958,701 UART: [art] SIG.R = 9F64DB5D546AC6647DEB161A693F6A39724A4ED6BCACA83B44A67EB8A9A8E83EC2192CB6D528D009ED5C16C216EFBFEB
2,965,492 UART: [art] SIG.S = D362065F3B0DD55E1A2ED0D365971FFEE44D240A5612D7FCC58812F98B4A10E3A1A66BC00E9ACA948889CC1992AC6E0F
2,989,406 UART: Caliptra RT
2,989,659 UART: [state] CFI Enabled
3,096,579 UART: [rt] RT listening for mailbox commands...
3,097,249 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,475 UART: [rt]cmd =0x44504543, len=92
3,343,649 >>> mbox cmd response data (6284 bytes)
3,343,650 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,373,063 UART: [rt]cmd =0x43455252, len=4
3,383,828 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
86,974 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
891,651 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,780 UART: [kat] ++
895,932 UART: [kat] sha1
900,184 UART: [kat] SHA2-256
902,124 UART: [kat] SHA2-384
904,817 UART: [kat] SHA2-512-ACC
906,718 UART: [kat] ECC-384
916,527 UART: [kat] HMAC-384Kdf
921,095 UART: [kat] LMS
1,169,407 UART: [kat] --
1,170,348 UART: [cold-reset] ++
1,170,818 UART: [fht] FHT @ 0x50003400
1,173,548 UART: [idev] ++
1,173,716 UART: [idev] CDI.KEYID = 6
1,174,077 UART: [idev] SUBJECT.KEYID = 7
1,174,502 UART: [idev] UDS.KEYID = 0
1,174,848 ready_for_fw is high
1,174,848 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,258 UART: [idev] Erasing UDS.KEYID = 0
1,199,692 UART: [idev] Sha1 KeyId Algorithm
1,208,732 UART: [idev] --
1,209,909 UART: [ldev] ++
1,210,077 UART: [ldev] CDI.KEYID = 6
1,210,441 UART: [ldev] SUBJECT.KEYID = 5
1,210,868 UART: [ldev] AUTHORITY.KEYID = 7
1,211,331 UART: [ldev] FE.KEYID = 1
1,216,687 UART: [ldev] Erasing FE.KEYID = 1
1,242,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,807 UART: [ldev] --
1,282,273 UART: [fwproc] Wait for Commands...
1,283,012 UART: [fwproc] Recv command 0x46574c44
1,283,745 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,787 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,096 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,924 >>> mbox cmd response: success
2,776,105 UART: [afmc] ++
2,776,273 UART: [afmc] CDI.KEYID = 6
2,776,636 UART: [afmc] SUBJECT.KEYID = 7
2,777,062 UART: [afmc] AUTHORITY.KEYID = 5
2,812,743 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,073 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,824 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,553 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,436 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,155 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,838 UART: [afmc] --
2,855,832 UART: [cold-reset] --
2,856,864 UART: [state] Locking Datavault
2,858,017 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,621 UART: [state] Locking ICCM
2,859,197 UART: [exit] Launching FMC @ 0x40000130
2,864,526 UART:
2,864,542 UART: Running Caliptra FMC ...
2,864,950 UART:
2,865,093 UART: [state] CFI Enabled
2,875,390 UART: [fht] FMC Alias Private Key: 7
2,982,979 UART: [art] Extend RT PCRs Done
2,983,407 UART: [art] Lock RT PCRs Done
2,985,115 UART: [art] Populate DV Done
2,993,294 UART: [fht] FMC Alias Private Key: 7
2,994,242 UART: [art] Derive CDI
2,994,522 UART: [art] Store in in slot 0x4
3,080,187 UART: [art] Derive Key Pair
3,080,547 UART: [art] Store priv key in slot 0x5
3,093,689 UART: [art] Derive Key Pair - Done
3,108,458 UART: [art] Signing Cert with AUTHO
3,108,938 UART: RITY.KEYID = 7
3,123,786 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,551 UART: [art] PUB.X = 400D6521046E7BF90FB3CBDD4474DE4A9AE724672A4FDA8F27450BFC361BC70750270FF5FFD3CA6F702DD814C76B9942
3,131,315 UART: [art] PUB.Y = 82B24AAD2B08384C9FE56667FAA9C6141567F0B7B894439B5DB082D126C697BB234B527F4EE344DF61F180F44D0DD6A8
3,138,265 UART: [art] SIG.R = 6990CD9E8A7B2EAD08FBB3DE41EB74DFF935C60F946C9D205B390952712E55EFBAF601514F1AEB531A2F0F6C059D78CE
3,145,035 UART: [art] SIG.S = BB8A134F004AA38AC5F7BF882F97192ED0CE71E5645442FA1CA995DA2D21F4DC6680C7D54DE1CC21636D928D18C62802
3,169,029 UART: Caliptra RT
3,169,374 UART: [state] CFI Enabled
3,277,197 UART: [rt] RT listening for mailbox commands...
3,277,867 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,153 UART: [rt]cmd =0x44504543, len=92
3,523,955 >>> mbox cmd response data (6284 bytes)
3,523,956 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,553,239 UART: [rt]cmd =0x43455252, len=4
3,563,963 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,343 ready_for_fw is high
1,056,343 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,694 >>> mbox cmd response: success
2,686,768 UART:
2,686,784 UART: Running Caliptra FMC ...
2,687,192 UART:
2,687,335 UART: [state] CFI Enabled
2,698,084 UART: [fht] FMC Alias Private Key: 7
2,805,547 UART: [art] Extend RT PCRs Done
2,805,975 UART: [art] Lock RT PCRs Done
2,807,345 UART: [art] Populate DV Done
2,815,772 UART: [fht] FMC Alias Private Key: 7
2,816,852 UART: [art] Derive CDI
2,817,132 UART: [art] Store in in slot 0x4
2,903,017 UART: [art] Derive Key Pair
2,903,377 UART: [art] Store priv key in slot 0x5
2,916,487 UART: [art] Derive Key Pair - Done
2,931,096 UART: [art] Signing Cert with AUTHO
2,931,576 UART: RITY.KEYID = 7
2,946,682 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,447 UART: [art] PUB.X = 744A22439FEE1CA19355047C7DA67F1B9323DC471D881CF81987AAB19AF596735ED0F59903CFAC3D87774FAABE5108BE
2,954,218 UART: [art] PUB.Y = DE74318E4684F28CF3EC6B8419B0F3C3CEE2D7F91E514E5EA587FD89BBF3F3712FB54BF4B1606A281551FF670131A40F
2,961,174 UART: [art] SIG.R = 5A752EB621C3D2933094C8C94A8D64307910B3123E28EFA49A865133B7B2E486CA935DF80D5DB89F7A5B7376EADBC580
2,967,945 UART: [art] SIG.S = 68CDCA3DA0991B04BF7DCAFC76991E17502E376C6812D534054F91FF6235EAAA61DF6C4528896745DD3C8BD30D6AAFB3
2,991,265 UART: Caliptra RT
2,991,610 UART: [state] CFI Enabled
3,099,811 UART: [rt] RT listening for mailbox commands...
3,100,481 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,803 UART: [rt]cmd =0x44504543, len=92
3,347,573 >>> mbox cmd response data (6284 bytes)
3,347,574 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,376,997 UART: [rt]cmd =0x43455252, len=4
3,387,873 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,629 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,165 UART: [kat] SHA2-256
882,096 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,211 UART: [kat] ++
886,363 UART: [kat] sha1
890,627 UART: [kat] SHA2-256
892,565 UART: [kat] SHA2-384
895,178 UART: [kat] SHA2-512-ACC
897,079 UART: [kat] ECC-384
902,698 UART: [kat] HMAC-384Kdf
907,420 UART: [kat] LMS
1,475,616 UART: [kat] --
1,476,325 UART: [cold-reset] ++
1,476,805 UART: [fht] Storing FHT @ 0x50003400
1,479,400 UART: [idev] ++
1,479,568 UART: [idev] CDI.KEYID = 6
1,479,928 UART: [idev] SUBJECT.KEYID = 7
1,480,352 UART: [idev] UDS.KEYID = 0
1,480,697 ready_for_fw is high
1,480,697 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,590 UART: [idev] Erasing UDS.KEYID = 0
1,505,078 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,770 UART: [idev] --
1,514,749 UART: [ldev] ++
1,514,917 UART: [ldev] CDI.KEYID = 6
1,515,280 UART: [ldev] SUBJECT.KEYID = 5
1,515,706 UART: [ldev] AUTHORITY.KEYID = 7
1,516,169 UART: [ldev] FE.KEYID = 1
1,521,537 UART: [ldev] Erasing FE.KEYID = 1
1,547,328 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,290 UART: [ldev] --
1,586,643 UART: [fwproc] Waiting for Commands...
1,587,322 UART: [fwproc] Received command 0x46574c44
1,588,113 UART: [fwproc] Received Image of size 114332 bytes
2,886,387 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,823 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,175 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,968 >>> mbox cmd response: success
3,078,968 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,080,150 UART: [afmc] ++
3,080,318 UART: [afmc] CDI.KEYID = 6
3,080,680 UART: [afmc] SUBJECT.KEYID = 7
3,081,105 UART: [afmc] AUTHORITY.KEYID = 5
3,116,060 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,470 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,250 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,978 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,863 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,553 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,516 UART: [afmc] --
3,159,548 UART: [cold-reset] --
3,160,308 UART: [state] Locking Datavault
3,161,461 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,065 UART: [state] Locking ICCM
3,162,693 UART: [exit] Launching FMC @ 0x40000130
3,168,022 UART:
3,168,038 UART: Running Caliptra FMC ...
3,168,446 UART:
3,168,500 UART: [state] CFI Enabled
3,179,217 UART: [fht] FMC Alias Private Key: 7
3,287,506 UART: [art] Extend RT PCRs Done
3,287,934 UART: [art] Lock RT PCRs Done
3,289,478 UART: [art] Populate DV Done
3,297,683 UART: [fht] FMC Alias Private Key: 7
3,298,615 UART: [art] Derive CDI
3,298,895 UART: [art] Store in in slot 0x4
3,384,904 UART: [art] Derive Key Pair
3,385,264 UART: [art] Store priv key in slot 0x5
3,398,396 UART: [art] Derive Key Pair - Done
3,413,097 UART: [art] Signing Cert with AUTHO
3,413,577 UART: RITY.KEYID = 7
3,429,093 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,858 UART: [art] PUB.X = 7832D8D26FA8E41F76077CDEC944393DE6050D6C88B39CB5CF85FA550DA086372ED47EF0DCA0C66AFDDC0814E4FB0B14
3,436,628 UART: [art] PUB.Y = BCC8BE5E395D8980121CDC80FF287AD9A5086C77E1A00F440E177A6DB626FE7283474CF65A2231E771CDA796E27A9754
3,443,575 UART: [art] SIG.R = 98CCB389159FA75E0628711468C30D04A415B25E084E38AAF0F2D4E9781AE78E14D89581ECC4ED7B40CA88E5218D6778
3,450,335 UART: [art] SIG.S = 69A17E6A15D9171C4B1BC811261118316682C522662617D3E08AA174C233EB4CBA030446DAA7A90F16D30D1070703EB4
3,474,490 UART: Caliptra RT
3,474,743 UART: [state] CFI Enabled
3,583,516 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,332 UART: [rt]cmd =0x44504543, len=92
3,796,909 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,389 ready_for_fw is high
1,361,389 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,528 >>> mbox cmd response: success
2,926,528 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,988,704 UART:
2,988,720 UART: Running Caliptra FMC ...
2,989,128 UART:
2,989,182 UART: [state] CFI Enabled
2,999,647 UART: [fht] FMC Alias Private Key: 7
3,108,454 UART: [art] Extend RT PCRs Done
3,108,882 UART: [art] Lock RT PCRs Done
3,110,506 UART: [art] Populate DV Done
3,119,059 UART: [fht] FMC Alias Private Key: 7
3,120,239 UART: [art] Derive CDI
3,120,519 UART: [art] Store in in slot 0x4
3,205,930 UART: [art] Derive Key Pair
3,206,290 UART: [art] Store priv key in slot 0x5
3,219,502 UART: [art] Derive Key Pair - Done
3,233,987 UART: [art] Signing Cert with AUTHO
3,234,467 UART: RITY.KEYID = 7
3,249,635 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,400 UART: [art] PUB.X = 4A3904798CD16CAB07C019ADEFAEBF7669265FA08BFB0AAF60F80D220E4FE0604EF37FB35F2271E339E1FA17B733FE7F
3,257,175 UART: [art] PUB.Y = 1CE799E58672AF9CFE79F9F0A17C6BF029C0BAE926599C0FE76E3D3F8EFA7B42BA33304D50812109D93C447E88C76E2A
3,264,131 UART: [art] SIG.R = 91BFD103B21562EBD34BF59B7C27C95FDF65AD6834EF6985AD1CFBD2198134EDE59687B6D780B522023FED0933C8F766
3,270,902 UART: [art] SIG.S = 6A110C675F1E651535E79317AB2B08BDA9DF989125B5F923AC359D2997B214742D77E9BFA034FA062E6BA22E973E7A2F
3,295,054 UART: Caliptra RT
3,295,307 UART: [state] CFI Enabled
3,404,254 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,280 UART: [rt]cmd =0x44504543, len=92
3,618,190 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,785 UART: [state] LifecycleState = Unprovisioned
86,440 UART: [state] DebugLocked = No
87,028 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,516 UART: [kat] SHA2-256
882,447 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,562 UART: [kat] ++
886,714 UART: [kat] sha1
890,868 UART: [kat] SHA2-256
892,806 UART: [kat] SHA2-384
895,453 UART: [kat] SHA2-512-ACC
897,354 UART: [kat] ECC-384
903,153 UART: [kat] HMAC-384Kdf
907,661 UART: [kat] LMS
1,475,857 UART: [kat] --
1,476,674 UART: [cold-reset] ++
1,477,220 UART: [fht] Storing FHT @ 0x50003400
1,480,035 UART: [idev] ++
1,480,203 UART: [idev] CDI.KEYID = 6
1,480,563 UART: [idev] SUBJECT.KEYID = 7
1,480,987 UART: [idev] UDS.KEYID = 0
1,481,332 ready_for_fw is high
1,481,332 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,659 UART: [idev] Erasing UDS.KEYID = 0
1,505,477 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,021 UART: [idev] --
1,514,918 UART: [ldev] ++
1,515,086 UART: [ldev] CDI.KEYID = 6
1,515,449 UART: [ldev] SUBJECT.KEYID = 5
1,515,875 UART: [ldev] AUTHORITY.KEYID = 7
1,516,338 UART: [ldev] FE.KEYID = 1
1,521,656 UART: [ldev] Erasing FE.KEYID = 1
1,547,203 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,171 UART: [ldev] --
1,586,660 UART: [fwproc] Waiting for Commands...
1,587,403 UART: [fwproc] Received command 0x46574c44
1,588,194 UART: [fwproc] Received Image of size 114332 bytes
2,886,102 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,378 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,730 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,693 >>> mbox cmd response: success
3,078,693 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,079,913 UART: [afmc] ++
3,080,081 UART: [afmc] CDI.KEYID = 6
3,080,443 UART: [afmc] SUBJECT.KEYID = 7
3,080,868 UART: [afmc] AUTHORITY.KEYID = 5
3,116,291 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,475 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,255 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,983 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,868 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,558 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,449 UART: [afmc] --
3,159,521 UART: [cold-reset] --
3,160,437 UART: [state] Locking Datavault
3,161,884 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,488 UART: [state] Locking ICCM
3,162,926 UART: [exit] Launching FMC @ 0x40000130
3,168,255 UART:
3,168,271 UART: Running Caliptra FMC ...
3,168,679 UART:
3,168,822 UART: [state] CFI Enabled
3,179,549 UART: [fht] FMC Alias Private Key: 7
3,287,358 UART: [art] Extend RT PCRs Done
3,287,786 UART: [art] Lock RT PCRs Done
3,289,282 UART: [art] Populate DV Done
3,297,479 UART: [fht] FMC Alias Private Key: 7
3,298,427 UART: [art] Derive CDI
3,298,707 UART: [art] Store in in slot 0x4
3,384,108 UART: [art] Derive Key Pair
3,384,468 UART: [art] Store priv key in slot 0x5
3,397,510 UART: [art] Derive Key Pair - Done
3,412,198 UART: [art] Signing Cert with AUTHO
3,412,678 UART: RITY.KEYID = 7
3,427,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,317 UART: [art] PUB.X = E4B4030CCF43A5F63D079E23ED33912297061D231F0DC349D4E29E66ABAFB0D6A75F2047BDFD43CD5C609537398E2128
3,435,078 UART: [art] PUB.Y = B268D6745957EAB9E9188C4F1C769BA6EA0C2CE718EE63F44EAEB7E9C8FBA6B89944578E224190BF8721AC1E298D9EE5
3,442,039 UART: [art] SIG.R = B7FF40A9CCE34879CFE350F3616E52776FF776E73FDE3409E577F2BFF77FB417883563F4B1F87076099C0581294C533D
3,448,800 UART: [art] SIG.S = E4358DFEB433F7A43E32F182134727564907031BCBE917FCE68D317B6EC4225BD3E0D4A4124C5F8D2629E9C86F8F11A9
3,472,751 UART: Caliptra RT
3,473,096 UART: [state] CFI Enabled
3,581,514 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,602 UART: [rt]cmd =0x44504543, len=92
3,795,616 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,316 ready_for_fw is high
1,363,316 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,015 >>> mbox cmd response: success
2,929,015 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,990,565 UART:
2,990,581 UART: Running Caliptra FMC ...
2,990,989 UART:
2,991,132 UART: [state] CFI Enabled
3,001,613 UART: [fht] FMC Alias Private Key: 7
3,109,746 UART: [art] Extend RT PCRs Done
3,110,174 UART: [art] Lock RT PCRs Done
3,111,542 UART: [art] Populate DV Done
3,119,727 UART: [fht] FMC Alias Private Key: 7
3,120,809 UART: [art] Derive CDI
3,121,089 UART: [art] Store in in slot 0x4
3,207,084 UART: [art] Derive Key Pair
3,207,444 UART: [art] Store priv key in slot 0x5
3,221,016 UART: [art] Derive Key Pair - Done
3,235,738 UART: [art] Signing Cert with AUTHO
3,236,218 UART: RITY.KEYID = 7
3,251,126 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,891 UART: [art] PUB.X = EC45C3BC7B3D8DB5C8B5948270EE6BD897661A6A0AE01C14279E3520457D768620D91C14C66D8E7E01C4F9D0C7E56249
3,258,659 UART: [art] PUB.Y = 717E78C354B3503341C6E36B4FAF8EA68EDCC365004EB62DA9C87E4E21C3F1A0FC3AE054893832C943A83453C2B77F62
3,265,593 UART: [art] SIG.R = 4C030ADB56F51DA9AEFAA3FD69AEB270A223810661B49E2B2F149688F891E2118EE937E3BF1FFD05D7AE657EACC686DC
3,272,371 UART: [art] SIG.S = CB01CB284C54EC565F65449DAB93C1101B9C06635E872BF88CED345462A8A415274EDC8581031084E1DB7BF912314E1B
3,296,063 UART: Caliptra RT
3,296,408 UART: [state] CFI Enabled
3,404,941 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,865 UART: [rt]cmd =0x44504543, len=92
3,618,396 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,808 UART: [state] LifecycleState = Unprovisioned
85,463 UART: [state] DebugLocked = No
86,087 UART: [state] WD Timer not started. Device not locked for debugging
87,280 UART: [kat] SHA2-256
892,930 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,055 UART: [kat] ++
897,207 UART: [kat] sha1
901,427 UART: [kat] SHA2-256
903,367 UART: [kat] SHA2-384
905,954 UART: [kat] SHA2-512-ACC
907,855 UART: [kat] ECC-384
917,366 UART: [kat] HMAC-384Kdf
922,002 UART: [kat] LMS
1,170,330 UART: [kat] --
1,171,251 UART: [cold-reset] ++
1,171,797 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,175,901 ready_for_fw is high
1,175,901 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,422 UART: [idev] Erasing UDS.KEYID = 0
1,199,685 UART: [idev] Sha1 KeyId Algorithm
1,208,123 UART: [idev] --
1,209,163 UART: [ldev] ++
1,209,331 UART: [ldev] CDI.KEYID = 6
1,209,694 UART: [ldev] SUBJECT.KEYID = 5
1,210,120 UART: [ldev] AUTHORITY.KEYID = 7
1,210,583 UART: [ldev] FE.KEYID = 1
1,215,685 UART: [ldev] Erasing FE.KEYID = 1
1,241,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,601 UART: [ldev] --
1,280,864 UART: [fwproc] Wait for Commands...
1,281,556 UART: [fwproc] Recv command 0x46574c44
1,282,284 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,284 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,588 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,337 >>> mbox cmd response: success
2,772,337 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,773,419 UART: [afmc] ++
2,773,587 UART: [afmc] CDI.KEYID = 6
2,773,949 UART: [afmc] SUBJECT.KEYID = 7
2,774,374 UART: [afmc] AUTHORITY.KEYID = 5
2,809,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,944 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,692 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,420 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,305 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,024 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,904 UART: [afmc] --
2,852,798 UART: [cold-reset] --
2,853,720 UART: [state] Locking Datavault
2,854,951 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,555 UART: [state] Locking ICCM
2,856,115 UART: [exit] Launching FMC @ 0x40000130
2,861,444 UART:
2,861,460 UART: Running Caliptra FMC ...
2,861,868 UART:
2,861,922 UART: [state] CFI Enabled
2,872,785 UART: [fht] FMC Alias Private Key: 7
2,980,778 UART: [art] Extend RT PCRs Done
2,981,206 UART: [art] Lock RT PCRs Done
2,982,662 UART: [art] Populate DV Done
2,991,197 UART: [fht] FMC Alias Private Key: 7
2,992,283 UART: [art] Derive CDI
2,992,563 UART: [art] Store in in slot 0x4
3,078,046 UART: [art] Derive Key Pair
3,078,406 UART: [art] Store priv key in slot 0x5
3,092,098 UART: [art] Derive Key Pair - Done
3,106,813 UART: [art] Signing Cert with AUTHO
3,107,293 UART: RITY.KEYID = 7
3,121,885 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,650 UART: [art] PUB.X = EF313EC1CF6018E25F1F8F639B4866B9A9AE813849133C14899F62B228F5233BFE72650039DE8C8F3EF2BE671357A783
3,129,398 UART: [art] PUB.Y = 6801D678077A737913FC977AEC3158525551ABC755577FFF383ED746682806C20E42098A0095072114949FB316DCFCEC
3,136,298 UART: [art] SIG.R = 9BD8C2195DBF301901DAD826970ACDA96C900ACD6D4FB6C4FE1DFE76419F1290C57B449B9669A2E14FF1B79474AA199F
3,143,073 UART: [art] SIG.S = 4EB6B5B264F9111045CB35990AC8769A3263C4BE8FD0AF8A5BDF421051F9EA6BAC5203B86A3CB76B56EB6F44F1093B4E
3,167,175 UART: Caliptra RT
3,167,428 UART: [state] CFI Enabled
3,275,379 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,581 UART: [rt]cmd =0x44504543, len=92
3,491,047 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,495 ready_for_fw is high
1,060,495 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,514 >>> mbox cmd response: success
2,626,514 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,689,152 UART:
2,689,168 UART: Running Caliptra FMC ...
2,689,576 UART:
2,689,630 UART: [state] CFI Enabled
2,700,367 UART: [fht] FMC Alias Private Key: 7
2,808,328 UART: [art] Extend RT PCRs Done
2,808,756 UART: [art] Lock RT PCRs Done
2,810,416 UART: [art] Populate DV Done
2,818,383 UART: [fht] FMC Alias Private Key: 7
2,819,345 UART: [art] Derive CDI
2,819,625 UART: [art] Store in in slot 0x4
2,904,868 UART: [art] Derive Key Pair
2,905,228 UART: [art] Store priv key in slot 0x5
2,918,624 UART: [art] Derive Key Pair - Done
2,933,025 UART: [art] Signing Cert with AUTHO
2,933,505 UART: RITY.KEYID = 7
2,948,797 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,562 UART: [art] PUB.X = 21C72D1D1AE7D26292AB8CDBE79486F8191D45555790395E475F404EE393105DE1E3B13C9CA0366A8DC8A6D16B074A8C
2,956,333 UART: [art] PUB.Y = E4B851E96EF0BFCE6F069668F31CDC3B1BAF6136D78E2CF24D1E06146E191EDC52444D74C6DBB5672D1F5926564BE17A
2,963,291 UART: [art] SIG.R = 15FDBA6E4A9D3970DCF60D0F847EC3F00DAD43A3B698832CD78758D36D5300FE7C5EEAFB7613F684542A1E2411609C84
2,970,040 UART: [art] SIG.S = E2B9DB737581E174BD0A3531DF0AF665FA78CC4619DD197BC60D3D965203F1D0536F480AB469B5C8C0041CF6BDAB77B0
2,993,531 UART: Caliptra RT
2,993,784 UART: [state] CFI Enabled
3,101,381 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,397 UART: [rt]cmd =0x44504543, len=92
3,316,192 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,749 UART: [state] LifecycleState = Unprovisioned
86,404 UART: [state] DebugLocked = No
86,974 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
893,731 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,856 UART: [kat] ++
898,008 UART: [kat] sha1
902,224 UART: [kat] SHA2-256
904,164 UART: [kat] SHA2-384
906,945 UART: [kat] SHA2-512-ACC
908,846 UART: [kat] ECC-384
918,679 UART: [kat] HMAC-384Kdf
923,331 UART: [kat] LMS
1,171,659 UART: [kat] --
1,172,662 UART: [cold-reset] ++
1,173,152 UART: [fht] FHT @ 0x50003400
1,175,989 UART: [idev] ++
1,176,157 UART: [idev] CDI.KEYID = 6
1,176,517 UART: [idev] SUBJECT.KEYID = 7
1,176,941 UART: [idev] UDS.KEYID = 0
1,177,286 ready_for_fw is high
1,177,286 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,545 UART: [idev] Erasing UDS.KEYID = 0
1,201,742 UART: [idev] Sha1 KeyId Algorithm
1,210,134 UART: [idev] --
1,211,342 UART: [ldev] ++
1,211,510 UART: [ldev] CDI.KEYID = 6
1,211,873 UART: [ldev] SUBJECT.KEYID = 5
1,212,299 UART: [ldev] AUTHORITY.KEYID = 7
1,212,762 UART: [ldev] FE.KEYID = 1
1,218,200 UART: [ldev] Erasing FE.KEYID = 1
1,245,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,020 UART: [ldev] --
1,284,347 UART: [fwproc] Wait for Commands...
1,284,969 UART: [fwproc] Recv command 0x46574c44
1,285,697 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,239 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,543 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,284 >>> mbox cmd response: success
2,776,284 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,777,368 UART: [afmc] ++
2,777,536 UART: [afmc] CDI.KEYID = 6
2,777,898 UART: [afmc] SUBJECT.KEYID = 7
2,778,323 UART: [afmc] AUTHORITY.KEYID = 5
2,814,324 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,729 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,477 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,205 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,090 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,809 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,797 UART: [afmc] --
2,857,813 UART: [cold-reset] --
2,858,619 UART: [state] Locking Datavault
2,859,656 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,260 UART: [state] Locking ICCM
2,860,780 UART: [exit] Launching FMC @ 0x40000130
2,866,109 UART:
2,866,125 UART: Running Caliptra FMC ...
2,866,533 UART:
2,866,676 UART: [state] CFI Enabled
2,877,517 UART: [fht] FMC Alias Private Key: 7
2,985,418 UART: [art] Extend RT PCRs Done
2,985,846 UART: [art] Lock RT PCRs Done
2,986,974 UART: [art] Populate DV Done
2,994,983 UART: [fht] FMC Alias Private Key: 7
2,996,091 UART: [art] Derive CDI
2,996,371 UART: [art] Store in in slot 0x4
3,082,232 UART: [art] Derive Key Pair
3,082,592 UART: [art] Store priv key in slot 0x5
3,095,814 UART: [art] Derive Key Pair - Done
3,110,356 UART: [art] Signing Cert with AUTHO
3,110,836 UART: RITY.KEYID = 7
3,126,306 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,071 UART: [art] PUB.X = 33762164F8752138B4D0B18F14E66DC0ECEF48A30CA0ADBC5A18301146568AC1F0DA075AE998F803D03CFFBB3E66276B
3,133,842 UART: [art] PUB.Y = E135F79A9001CF300B449122FF4D3B292ED24A5CBD4DEC6830C9595DCDB3683E2BD0C30FA5EBE21D564BB9D9C437BA60
3,140,801 UART: [art] SIG.R = 9CADA45F26AB013E0B20BA40972841D05645156396832C536DC2A5CF14E5DF480D102FE0E369AC929C63C120B57FF329
3,147,564 UART: [art] SIG.S = 9F9F8A47DF047AE9AD12861033B5B1B1EE4FD677565DBDBD066DDC2DF5B9F6BC7B1EE551A9B3630B6E1D01FFACF825D3
3,171,255 UART: Caliptra RT
3,171,600 UART: [state] CFI Enabled
3,279,568 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,706 UART: [rt]cmd =0x44504543, len=92
3,494,208 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,914 ready_for_fw is high
1,060,914 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,247 >>> mbox cmd response: success
2,627,247 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,689,813 UART:
2,689,829 UART: Running Caliptra FMC ...
2,690,237 UART:
2,690,380 UART: [state] CFI Enabled
2,700,971 UART: [fht] FMC Alias Private Key: 7
2,809,198 UART: [art] Extend RT PCRs Done
2,809,626 UART: [art] Lock RT PCRs Done
2,811,244 UART: [art] Populate DV Done
2,819,575 UART: [fht] FMC Alias Private Key: 7
2,820,599 UART: [art] Derive CDI
2,820,879 UART: [art] Store in in slot 0x4
2,906,772 UART: [art] Derive Key Pair
2,907,132 UART: [art] Store priv key in slot 0x5
2,920,154 UART: [art] Derive Key Pair - Done
2,934,735 UART: [art] Signing Cert with AUTHO
2,935,215 UART: RITY.KEYID = 7
2,950,753 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,518 UART: [art] PUB.X = A8EF4B9D53349A25F67719230B89E22C2CC5F5DB45479D0589CC722F303C91692D55EFC6563858B36CCCCAAEA97C278F
2,958,290 UART: [art] PUB.Y = 15DD98FBE813679FDC8E223D0DD81445B129B8CE91EE7F7E4ABC7270010717C1F2C8645BBAB94965036C6B2EF68148C6
2,965,236 UART: [art] SIG.R = E292EC8BCEE6F4B6041BFE71B58118F06EDBFF43B629C0A5B3B600C94233ADEC7AE682A5DC89213091D01A15D46D270B
2,971,994 UART: [art] SIG.S = 768C64E284B1DAC8A4330F80F1F160B6EE83AE9D37716332306FA1BB793112F76C14E8ECC41C056973377182237ADBE6
2,996,077 UART: Caliptra RT
2,996,422 UART: [state] CFI Enabled
3,104,255 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,307 UART: [rt]cmd =0x44504543, len=92
3,318,518 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,620 UART: [state] LifecycleState = Unprovisioned
85,275 UART: [state] DebugLocked = No
85,975 UART: [state] WD Timer not started. Device not locked for debugging
87,298 UART: [kat] SHA2-256
890,848 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,977 UART: [kat] ++
895,129 UART: [kat] sha1
899,361 UART: [kat] SHA2-256
901,301 UART: [kat] SHA2-384
904,118 UART: [kat] SHA2-512-ACC
906,019 UART: [kat] ECC-384
915,842 UART: [kat] HMAC-384Kdf
920,194 UART: [kat] LMS
1,168,506 UART: [kat] --
1,169,559 UART: [cold-reset] ++
1,170,103 UART: [fht] FHT @ 0x50003400
1,172,911 UART: [idev] ++
1,173,079 UART: [idev] CDI.KEYID = 6
1,173,440 UART: [idev] SUBJECT.KEYID = 7
1,173,865 UART: [idev] UDS.KEYID = 0
1,174,211 ready_for_fw is high
1,174,211 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,881 UART: [idev] Erasing UDS.KEYID = 0
1,198,975 UART: [idev] Sha1 KeyId Algorithm
1,207,935 UART: [idev] --
1,208,962 UART: [ldev] ++
1,209,130 UART: [ldev] CDI.KEYID = 6
1,209,494 UART: [ldev] SUBJECT.KEYID = 5
1,209,921 UART: [ldev] AUTHORITY.KEYID = 7
1,210,384 UART: [ldev] FE.KEYID = 1
1,215,506 UART: [ldev] Erasing FE.KEYID = 1
1,241,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,260 UART: [ldev] --
1,280,620 UART: [fwproc] Wait for Commands...
1,281,239 UART: [fwproc] Recv command 0x46574c44
1,281,972 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,672 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,981 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,927 >>> mbox cmd response: success
2,772,927 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,774,150 UART: [afmc] ++
2,774,318 UART: [afmc] CDI.KEYID = 6
2,774,681 UART: [afmc] SUBJECT.KEYID = 7
2,775,107 UART: [afmc] AUTHORITY.KEYID = 5
2,811,308 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,661 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,390 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,273 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,992 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,629 UART: [afmc] --
2,854,717 UART: [cold-reset] --
2,855,733 UART: [state] Locking Datavault
2,857,006 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,610 UART: [state] Locking ICCM
2,858,138 UART: [exit] Launching FMC @ 0x40000130
2,863,467 UART:
2,863,483 UART: Running Caliptra FMC ...
2,863,891 UART:
2,863,945 UART: [state] CFI Enabled
2,874,366 UART: [fht] FMC Alias Private Key: 7
2,982,747 UART: [art] Extend RT PCRs Done
2,983,175 UART: [art] Lock RT PCRs Done
2,984,915 UART: [art] Populate DV Done
2,993,120 UART: [fht] FMC Alias Private Key: 7
2,994,296 UART: [art] Derive CDI
2,994,576 UART: [art] Store in in slot 0x4
3,079,803 UART: [art] Derive Key Pair
3,080,163 UART: [art] Store priv key in slot 0x5
3,093,857 UART: [art] Derive Key Pair - Done
3,108,253 UART: [art] Signing Cert with AUTHO
3,108,733 UART: RITY.KEYID = 7
3,123,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,732 UART: [art] PUB.X = F11A19981D5985C48122E53FB5800162F47BFD3A1547701B09C729EC855852E188523B8BB444FAAA6C9645512DA8A11E
3,131,492 UART: [art] PUB.Y = 1880F45831143B58C92F14170003449FF8D71AAAB327392BB7975BF50287A1A6E68AC7BB27F6F1A5CA1028E7A8381B13
3,138,412 UART: [art] SIG.R = 8B2805433D3C650B670BD8DE186C5FA2ACE55331D3C947CCBA0E5B9C61E4AF96FC15206D333A7D154CA7290BCED57861
3,145,179 UART: [art] SIG.S = BE1A17E44B4BF911C78A450A026EDADF6AD369295FD01DAEA562F6B059A67169E43DDECF5670052E07C85099C4E3C8DE
3,168,900 UART: Caliptra RT
3,169,153 UART: [state] CFI Enabled
3,276,567 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,505 UART: [rt]cmd =0x44504543, len=92
3,491,604 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,592 ready_for_fw is high
1,055,592 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,833 >>> mbox cmd response: success
2,621,833 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,683,265 UART:
2,683,281 UART: Running Caliptra FMC ...
2,683,689 UART:
2,683,743 UART: [state] CFI Enabled
2,694,262 UART: [fht] FMC Alias Private Key: 7
2,803,099 UART: [art] Extend RT PCRs Done
2,803,527 UART: [art] Lock RT PCRs Done
2,805,225 UART: [art] Populate DV Done
2,813,614 UART: [fht] FMC Alias Private Key: 7
2,814,734 UART: [art] Derive CDI
2,815,014 UART: [art] Store in in slot 0x4
2,900,365 UART: [art] Derive Key Pair
2,900,725 UART: [art] Store priv key in slot 0x5
2,914,137 UART: [art] Derive Key Pair - Done
2,928,604 UART: [art] Signing Cert with AUTHO
2,929,084 UART: RITY.KEYID = 7
2,944,480 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,245 UART: [art] PUB.X = C11789D8F633E6B29649E709D52F7C48E04F4049206C33EDF23CF774F2AB2D184EC521B073B37045410676EAA237C206
2,952,002 UART: [art] PUB.Y = 6F1AA0A2E1A6B68F12A25BC6359CF0FA2DE0239CB83361A855415E707B35CD4DC53CEE1E2A0BBB14C8CD5A935E52D64C
2,958,969 UART: [art] SIG.R = 5E14983B4BD1EBBA90AC3DFCC804D9F88135D282D7589468D641BAF766ED9203F8D251B5A367B3AF2853851F6F593713
2,965,737 UART: [art] SIG.S = DB2BB51983CF9F7DC6A78CC3A05973EF8DC7A9F39B9FE09DD80D4F533ACFB71C09BA8995E2B7F29642ED5A089C7CACC6
2,989,799 UART: Caliptra RT
2,990,052 UART: [state] CFI Enabled
3,096,555 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,537 UART: [rt]cmd =0x44504543, len=92
3,310,847 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,620 UART: [kat] ++
895,772 UART: [kat] sha1
900,174 UART: [kat] SHA2-256
902,114 UART: [kat] SHA2-384
904,745 UART: [kat] SHA2-512-ACC
906,646 UART: [kat] ECC-384
916,133 UART: [kat] HMAC-384Kdf
920,559 UART: [kat] LMS
1,168,871 UART: [kat] --
1,169,880 UART: [cold-reset] ++
1,170,412 UART: [fht] FHT @ 0x50003400
1,173,006 UART: [idev] ++
1,173,174 UART: [idev] CDI.KEYID = 6
1,173,535 UART: [idev] SUBJECT.KEYID = 7
1,173,960 UART: [idev] UDS.KEYID = 0
1,174,306 ready_for_fw is high
1,174,306 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,944 UART: [idev] Erasing UDS.KEYID = 0
1,198,918 UART: [idev] Sha1 KeyId Algorithm
1,207,800 UART: [idev] --
1,208,919 UART: [ldev] ++
1,209,087 UART: [ldev] CDI.KEYID = 6
1,209,451 UART: [ldev] SUBJECT.KEYID = 5
1,209,878 UART: [ldev] AUTHORITY.KEYID = 7
1,210,341 UART: [ldev] FE.KEYID = 1
1,215,691 UART: [ldev] Erasing FE.KEYID = 1
1,242,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,625 UART: [ldev] --
1,282,043 UART: [fwproc] Wait for Commands...
1,282,758 UART: [fwproc] Recv command 0x46574c44
1,283,491 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,879 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,188 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,014 >>> mbox cmd response: success
2,773,014 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,774,253 UART: [afmc] ++
2,774,421 UART: [afmc] CDI.KEYID = 6
2,774,784 UART: [afmc] SUBJECT.KEYID = 7
2,775,210 UART: [afmc] AUTHORITY.KEYID = 5
2,810,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,086 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,815 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,698 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,417 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,270 UART: [afmc] --
2,854,160 UART: [cold-reset] --
2,855,120 UART: [state] Locking Datavault
2,856,311 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,915 UART: [state] Locking ICCM
2,857,427 UART: [exit] Launching FMC @ 0x40000130
2,862,756 UART:
2,862,772 UART: Running Caliptra FMC ...
2,863,180 UART:
2,863,323 UART: [state] CFI Enabled
2,874,012 UART: [fht] FMC Alias Private Key: 7
2,982,609 UART: [art] Extend RT PCRs Done
2,983,037 UART: [art] Lock RT PCRs Done
2,984,699 UART: [art] Populate DV Done
2,993,088 UART: [fht] FMC Alias Private Key: 7
2,994,084 UART: [art] Derive CDI
2,994,364 UART: [art] Store in in slot 0x4
3,079,947 UART: [art] Derive Key Pair
3,080,307 UART: [art] Store priv key in slot 0x5
3,093,891 UART: [art] Derive Key Pair - Done
3,108,565 UART: [art] Signing Cert with AUTHO
3,109,045 UART: RITY.KEYID = 7
3,124,339 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,104 UART: [art] PUB.X = 314E7598F3BE40451069A2F8CF3060E301A2C6B0DDB6950D9AE83FCFED78328EF04601CEBED24BB5F811840E268A008F
3,131,850 UART: [art] PUB.Y = 8B40AD37F703AB5F2217CAB866881402C95D7E69AD0EADF185E890AEEA82A16F5876050536ADC7D1B6B9205B1EA57139
3,138,793 UART: [art] SIG.R = FE3F31AE239A1655756461FCE60E49DFC537EA0F257E6D18A17A0BB3D512C923401528054E72F08B6A1AC12577F1806C
3,145,553 UART: [art] SIG.S = E18943A3B05DC1CB960F738A0CD808E30A63500031C00B5FD0F5FDBA2647B561FEC2AC971890369E22AF15E5C042890D
3,169,470 UART: Caliptra RT
3,169,815 UART: [state] CFI Enabled
3,276,785 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,853 UART: [rt]cmd =0x44504543, len=92
3,491,918 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,701 ready_for_fw is high
1,055,701 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,506 >>> mbox cmd response: success
2,623,506 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,685,824 UART:
2,685,840 UART: Running Caliptra FMC ...
2,686,248 UART:
2,686,391 UART: [state] CFI Enabled
2,696,916 UART: [fht] FMC Alias Private Key: 7
2,805,315 UART: [art] Extend RT PCRs Done
2,805,743 UART: [art] Lock RT PCRs Done
2,807,491 UART: [art] Populate DV Done
2,815,568 UART: [fht] FMC Alias Private Key: 7
2,816,574 UART: [art] Derive CDI
2,816,854 UART: [art] Store in in slot 0x4
2,902,669 UART: [art] Derive Key Pair
2,903,029 UART: [art] Store priv key in slot 0x5
2,916,455 UART: [art] Derive Key Pair - Done
2,931,363 UART: [art] Signing Cert with AUTHO
2,931,843 UART: RITY.KEYID = 7
2,947,235 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,000 UART: [art] PUB.X = 1849213CF63175814B866CCD9F25E810B79EE003FD2CB3835CEB206D9EAE9474F2115EAE679FE705D7C981798655EDE1
2,954,768 UART: [art] PUB.Y = 230DE7F3327FAE57FB3844961C1BDB49F3D988B17A6D86339EBA49EFD0E57802EEE8830A8B13E97A57C2E1AC0A0B413C
2,961,717 UART: [art] SIG.R = 8419B3CA1C21002882103FFF70E5907CE6190B235F75A738339EADE373860E3E91B1AF043A379F56A7715B68314B27DA
2,968,452 UART: [art] SIG.S = AAD1C192F3B412A16E7ADAC6F00C9E3020D74AE3B5CC46BF2584AFFDB11E7E148B19F03E7231A348FF50349CE4FA6C38
2,992,102 UART: Caliptra RT
2,992,447 UART: [state] CFI Enabled
3,099,953 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,015 UART: [rt]cmd =0x44504543, len=92
3,315,345 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,440 UART: [state] LifecycleState = Unprovisioned
86,095 UART: [state] DebugLocked = No
86,787 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,459 UART: [kat] SHA2-256
882,390 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,505 UART: [kat] ++
886,657 UART: [kat] sha1
891,111 UART: [kat] SHA2-256
893,049 UART: [kat] SHA2-384
895,610 UART: [kat] SHA2-512-ACC
897,511 UART: [kat] ECC-384
902,912 UART: [kat] HMAC-384Kdf
907,528 UART: [kat] LMS
1,475,724 UART: [kat] --
1,476,579 UART: [cold-reset] ++
1,476,913 UART: [fht] Storing FHT @ 0x50003400
1,479,672 UART: [idev] ++
1,479,840 UART: [idev] CDI.KEYID = 6
1,480,200 UART: [idev] SUBJECT.KEYID = 7
1,480,624 UART: [idev] UDS.KEYID = 0
1,480,969 ready_for_fw is high
1,480,969 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,700 UART: [idev] Erasing UDS.KEYID = 0
1,504,982 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,664 UART: [idev] --
1,514,547 UART: [ldev] ++
1,514,715 UART: [ldev] CDI.KEYID = 6
1,515,078 UART: [ldev] SUBJECT.KEYID = 5
1,515,504 UART: [ldev] AUTHORITY.KEYID = 7
1,515,967 UART: [ldev] FE.KEYID = 1
1,521,079 UART: [ldev] Erasing FE.KEYID = 1
1,546,116 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,116 UART: [ldev] --
1,585,475 UART: [fwproc] Waiting for Commands...
1,586,336 UART: [fwproc] Received command 0x46574c44
1,587,127 UART: [fwproc] Received Image of size 114332 bytes
2,884,827 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,509 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,861 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,644 >>> mbox cmd response: success
3,078,894 UART: [afmc] ++
3,079,062 UART: [afmc] CDI.KEYID = 6
3,079,424 UART: [afmc] SUBJECT.KEYID = 7
3,079,849 UART: [afmc] AUTHORITY.KEYID = 5
3,114,878 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,746 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,526 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,254 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,139 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,829 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,668 UART: [afmc] --
3,157,580 UART: [cold-reset] --
3,158,416 UART: [state] Locking Datavault
3,159,617 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,221 UART: [state] Locking ICCM
3,160,871 UART: [exit] Launching FMC @ 0x40000130
3,166,200 UART:
3,166,216 UART: Running Caliptra FMC ...
3,166,624 UART:
3,166,678 UART: [state] CFI Enabled
3,177,271 UART: [fht] FMC Alias Private Key: 7
3,285,404 UART: [art] Extend RT PCRs Done
3,285,832 UART: [art] Lock RT PCRs Done
3,287,392 UART: [art] Populate DV Done
3,295,689 UART: [fht] FMC Alias Private Key: 7
3,296,827 UART: [art] Derive CDI
3,297,107 UART: [art] Store in in slot 0x4
3,382,674 UART: [art] Derive Key Pair
3,383,034 UART: [art] Store priv key in slot 0x5
3,395,920 UART: [art] Derive Key Pair - Done
3,410,990 UART: [art] Signing Cert with AUTHO
3,411,470 UART: RITY.KEYID = 7
3,426,688 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,453 UART: [art] PUB.X = 2F8F07FEED9CC7A323D8EFF5AE0BE33875D7FC82438F0617DF1131F9692BEFD5301FAA8571AC12072A429F9B80D0FC6B
3,434,229 UART: [art] PUB.Y = A675349A00924CA702629EEAD1A80F95C714D53E62A6767B0FB4F26CBA308DC7489F34E350CAB34A9F6461D76C69A1FA
3,441,156 UART: [art] SIG.R = 26A69240CACE851C9266475719ADD63B1358C3A2726DB99DC6E3EDA152AE1D1BE7F1668790D4B98BC387DBA82E3A73B7
3,447,936 UART: [art] SIG.S = 48E73490B08FF228D3FE58CA49A305A26DAD32486F7D9A9CBA5D4EFE680A4E53BC8C3AB7F4654F84573DAF2A79E1C561
3,472,505 UART: Caliptra RT
3,472,758 UART: [state] CFI Enabled
3,580,300 UART: [rt] RT listening for mailbox commands...
3,580,970 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,386 UART: [rt]cmd =0x44504543, len=96
3,791,740 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,167 ready_for_fw is high
1,362,167 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,404 >>> mbox cmd response: success
2,987,578 UART:
2,987,594 UART: Running Caliptra FMC ...
2,988,002 UART:
2,988,056 UART: [state] CFI Enabled
2,998,387 UART: [fht] FMC Alias Private Key: 7
3,106,334 UART: [art] Extend RT PCRs Done
3,106,762 UART: [art] Lock RT PCRs Done
3,108,524 UART: [art] Populate DV Done
3,116,897 UART: [fht] FMC Alias Private Key: 7
3,118,039 UART: [art] Derive CDI
3,118,319 UART: [art] Store in in slot 0x4
3,203,770 UART: [art] Derive Key Pair
3,204,130 UART: [art] Store priv key in slot 0x5
3,216,956 UART: [art] Derive Key Pair - Done
3,231,307 UART: [art] Signing Cert with AUTHO
3,231,787 UART: RITY.KEYID = 7
3,246,451 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,216 UART: [art] PUB.X = 54081CB3E74484A5EC968FEF77E16B7D85F13B18D353EE6EA5BE5897520B4D1B98913750225EA9B4B2A426B34C34F27B
3,253,984 UART: [art] PUB.Y = 88DF7244F27FAFA33BDA9B7D59A110ED7E9C3F780EF6D9489A98C9EA8C66C39BB1F5303AF90CA5C9EB3E74FBCC943D1A
3,260,954 UART: [art] SIG.R = 5B49C922D9D3209254F49BD667045D832D87944716344B18214FA380FA06C8916F60B280D00D1D29E3728AC79F832430
3,267,701 UART: [art] SIG.S = 3A3FF5FDB7CF361A82C31C08AC6CDC76AD3B74675882F514D10E9C600E8F3BE6CF2D81100DC0167F30AA46194BA1DB97
3,291,268 UART: Caliptra RT
3,291,521 UART: [state] CFI Enabled
3,399,461 UART: [rt] RT listening for mailbox commands...
3,400,131 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,399 UART: [rt]cmd =0x44504543, len=96
3,610,685 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,238 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,720 UART: [kat] SHA2-256
881,651 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,766 UART: [kat] ++
885,918 UART: [kat] sha1
890,210 UART: [kat] SHA2-256
892,148 UART: [kat] SHA2-384
894,849 UART: [kat] SHA2-512-ACC
896,750 UART: [kat] ECC-384
902,363 UART: [kat] HMAC-384Kdf
907,115 UART: [kat] LMS
1,475,311 UART: [kat] --
1,476,124 UART: [cold-reset] ++
1,476,510 UART: [fht] Storing FHT @ 0x50003400
1,479,361 UART: [idev] ++
1,479,529 UART: [idev] CDI.KEYID = 6
1,479,889 UART: [idev] SUBJECT.KEYID = 7
1,480,313 UART: [idev] UDS.KEYID = 0
1,480,658 ready_for_fw is high
1,480,658 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,369 UART: [idev] Erasing UDS.KEYID = 0
1,504,839 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,245 UART: [idev] --
1,514,346 UART: [ldev] ++
1,514,514 UART: [ldev] CDI.KEYID = 6
1,514,877 UART: [ldev] SUBJECT.KEYID = 5
1,515,303 UART: [ldev] AUTHORITY.KEYID = 7
1,515,766 UART: [ldev] FE.KEYID = 1
1,520,888 UART: [ldev] Erasing FE.KEYID = 1
1,546,535 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,617 UART: [ldev] --
1,586,110 UART: [fwproc] Waiting for Commands...
1,586,779 UART: [fwproc] Received command 0x46574c44
1,587,570 UART: [fwproc] Received Image of size 114332 bytes
2,885,316 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,426 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,778 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,597 >>> mbox cmd response: success
3,078,665 UART: [afmc] ++
3,078,833 UART: [afmc] CDI.KEYID = 6
3,079,195 UART: [afmc] SUBJECT.KEYID = 7
3,079,620 UART: [afmc] AUTHORITY.KEYID = 5
3,114,553 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,843 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,623 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,351 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,236 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,926 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,831 UART: [afmc] --
3,157,929 UART: [cold-reset] --
3,158,865 UART: [state] Locking Datavault
3,160,012 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,616 UART: [state] Locking ICCM
3,161,068 UART: [exit] Launching FMC @ 0x40000130
3,166,397 UART:
3,166,413 UART: Running Caliptra FMC ...
3,166,821 UART:
3,166,964 UART: [state] CFI Enabled
3,177,731 UART: [fht] FMC Alias Private Key: 7
3,285,762 UART: [art] Extend RT PCRs Done
3,286,190 UART: [art] Lock RT PCRs Done
3,287,844 UART: [art] Populate DV Done
3,296,393 UART: [fht] FMC Alias Private Key: 7
3,297,447 UART: [art] Derive CDI
3,297,727 UART: [art] Store in in slot 0x4
3,383,258 UART: [art] Derive Key Pair
3,383,618 UART: [art] Store priv key in slot 0x5
3,396,468 UART: [art] Derive Key Pair - Done
3,410,988 UART: [art] Signing Cert with AUTHO
3,411,468 UART: RITY.KEYID = 7
3,427,242 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,007 UART: [art] PUB.X = E0193FC2E88FDFB7CF74100FEE5B43B94381ACC8B3491CBE948B3D468D969EC9B8D0305E5F3AD6A78FA69AE74973E6A4
3,434,792 UART: [art] PUB.Y = 0BBC7C73B1D666FA49F1EFC341A0454E551EFC97776477DD20D9FBE00618AAF2F5DCFE4115B373D0BE80E5B86D60F3E2
3,441,754 UART: [art] SIG.R = 1D757BB65EC299D8DC178C3F02F6ECD9AA4D86306F2224C0542BA869858169ADF01DB0152A0D265E5E6DD700AA3978BD
3,448,506 UART: [art] SIG.S = 3F7369F9D4D8EE7EA972A8D15A67B12260C1AE8D40F6BDCDDF62CD0CD0EF428D6CD21E5ACADD85108FE104B4667E526E
3,472,029 UART: Caliptra RT
3,472,374 UART: [state] CFI Enabled
3,580,946 UART: [rt] RT listening for mailbox commands...
3,581,616 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,412 UART: [rt]cmd =0x44504543, len=96
3,792,243 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,506 ready_for_fw is high
1,362,506 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,527 >>> mbox cmd response: success
2,989,043 UART:
2,989,059 UART: Running Caliptra FMC ...
2,989,467 UART:
2,989,610 UART: [state] CFI Enabled
3,000,343 UART: [fht] FMC Alias Private Key: 7
3,108,332 UART: [art] Extend RT PCRs Done
3,108,760 UART: [art] Lock RT PCRs Done
3,110,330 UART: [art] Populate DV Done
3,118,605 UART: [fht] FMC Alias Private Key: 7
3,119,725 UART: [art] Derive CDI
3,120,005 UART: [art] Store in in slot 0x4
3,205,754 UART: [art] Derive Key Pair
3,206,114 UART: [art] Store priv key in slot 0x5
3,219,734 UART: [art] Derive Key Pair - Done
3,234,442 UART: [art] Signing Cert with AUTHO
3,234,922 UART: RITY.KEYID = 7
3,250,138 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,903 UART: [art] PUB.X = 776D9A69ECBF1E8C887331EE50F9DC2FF016A2AEA55123FE2A48EB2E6994130B0DC76BCAAB54AD2898217DEF8ACA5F91
3,257,689 UART: [art] PUB.Y = 8F805AB2DF5DA56A5607F657BFB1E541DDA09B811655568D9B97644522DA95769E7911B99F4AF7E17448AF31A7081AA7
3,264,635 UART: [art] SIG.R = 737848F7A13547A8B948547BCE5B7B2DAD555182F5C6D020D17D2EFEBBE1A69D2A0082A6D81475E38D095B49D8984E0D
3,271,383 UART: [art] SIG.S = 8511C81EF28F15058B62DAE16A2F08ABE03AD7CBA6D06DEEE3012777FFCA70306F108A911BCF3F36A3025845CA970891
3,295,463 UART: Caliptra RT
3,295,808 UART: [state] CFI Enabled
3,403,689 UART: [rt] RT listening for mailbox commands...
3,404,359 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,581 UART: [rt]cmd =0x44504543, len=96
3,614,846 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
893,304 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,429 UART: [kat] ++
897,581 UART: [kat] sha1
901,795 UART: [kat] SHA2-256
903,735 UART: [kat] SHA2-384
906,610 UART: [kat] SHA2-512-ACC
908,511 UART: [kat] ECC-384
918,170 UART: [kat] HMAC-384Kdf
922,858 UART: [kat] LMS
1,171,186 UART: [kat] --
1,171,971 UART: [cold-reset] ++
1,172,441 UART: [fht] FHT @ 0x50003400
1,175,216 UART: [idev] ++
1,175,384 UART: [idev] CDI.KEYID = 6
1,175,744 UART: [idev] SUBJECT.KEYID = 7
1,176,168 UART: [idev] UDS.KEYID = 0
1,176,513 ready_for_fw is high
1,176,513 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,440 UART: [idev] Erasing UDS.KEYID = 0
1,201,215 UART: [idev] Sha1 KeyId Algorithm
1,209,615 UART: [idev] --
1,210,653 UART: [ldev] ++
1,210,821 UART: [ldev] CDI.KEYID = 6
1,211,184 UART: [ldev] SUBJECT.KEYID = 5
1,211,610 UART: [ldev] AUTHORITY.KEYID = 7
1,212,073 UART: [ldev] FE.KEYID = 1
1,217,131 UART: [ldev] Erasing FE.KEYID = 1
1,243,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,183 UART: [ldev] --
1,282,542 UART: [fwproc] Wait for Commands...
1,283,124 UART: [fwproc] Recv command 0x46574c44
1,283,852 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,176 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,480 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,421 >>> mbox cmd response: success
2,774,557 UART: [afmc] ++
2,774,725 UART: [afmc] CDI.KEYID = 6
2,775,087 UART: [afmc] SUBJECT.KEYID = 7
2,775,512 UART: [afmc] AUTHORITY.KEYID = 5
2,810,551 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,694 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,422 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,307 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,026 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,888 UART: [afmc] --
2,853,986 UART: [cold-reset] --
2,854,890 UART: [state] Locking Datavault
2,856,185 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,789 UART: [state] Locking ICCM
2,857,339 UART: [exit] Launching FMC @ 0x40000130
2,862,668 UART:
2,862,684 UART: Running Caliptra FMC ...
2,863,092 UART:
2,863,146 UART: [state] CFI Enabled
2,873,641 UART: [fht] FMC Alias Private Key: 7
2,981,948 UART: [art] Extend RT PCRs Done
2,982,376 UART: [art] Lock RT PCRs Done
2,983,830 UART: [art] Populate DV Done
2,992,017 UART: [fht] FMC Alias Private Key: 7
2,993,065 UART: [art] Derive CDI
2,993,345 UART: [art] Store in in slot 0x4
3,078,972 UART: [art] Derive Key Pair
3,079,332 UART: [art] Store priv key in slot 0x5
3,093,088 UART: [art] Derive Key Pair - Done
3,108,046 UART: [art] Signing Cert with AUTHO
3,108,526 UART: RITY.KEYID = 7
3,123,684 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,449 UART: [art] PUB.X = AE835130CB004F24157FBBB52A4CB4652E48C92CB29870C0DACEF4CE591672373334EBE9166A43C48FBF788CD3BA2048
3,131,207 UART: [art] PUB.Y = DA4BACB690F5B584DDB1753B3ED8679F55554AB561B6978ED7111B71CEF08035753061CB7AA0C8813D076B3C76FF5DBA
3,138,166 UART: [art] SIG.R = 41311A2ADC86F161301D615849BFBC42A99BE17EFD10353DB5150EDB490C8831776B48D40ADBD539CDD0C35789EF0220
3,144,930 UART: [art] SIG.S = EB971A2436388C67C697346434CB1E3382BAEE84402B00F6156F8A65EE2D675E40DDE411F70517CBC55B4A9B6972FD5A
3,168,688 UART: Caliptra RT
3,168,941 UART: [state] CFI Enabled
3,276,272 UART: [rt] RT listening for mailbox commands...
3,276,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,310 UART: [rt]cmd =0x44504543, len=96
3,488,390 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,761 ready_for_fw is high
1,059,761 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,352 >>> mbox cmd response: success
2,685,960 UART:
2,685,976 UART: Running Caliptra FMC ...
2,686,384 UART:
2,686,438 UART: [state] CFI Enabled
2,697,033 UART: [fht] FMC Alias Private Key: 7
2,804,650 UART: [art] Extend RT PCRs Done
2,805,078 UART: [art] Lock RT PCRs Done
2,806,740 UART: [art] Populate DV Done
2,814,865 UART: [fht] FMC Alias Private Key: 7
2,815,821 UART: [art] Derive CDI
2,816,101 UART: [art] Store in in slot 0x4
2,901,618 UART: [art] Derive Key Pair
2,901,978 UART: [art] Store priv key in slot 0x5
2,915,052 UART: [art] Derive Key Pair - Done
2,929,887 UART: [art] Signing Cert with AUTHO
2,930,367 UART: RITY.KEYID = 7
2,945,431 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,196 UART: [art] PUB.X = B66A6A781512A46CBACF9B24B8FC064A2AED45B5FB45166D86B0603404636EA8D0F48340E2C49BA596955CD02008AF96
2,952,963 UART: [art] PUB.Y = 958B2A17BA1F588F5737F6DE2DB73536C8FD382C03A1F9A67EE0D4F0E3D8B57F1BC1C83733F8ECB376835F488EDF411D
2,959,924 UART: [art] SIG.R = 2D993EFBA76F3F84F9464EA4DA9F15881E3A396FABFDDBB81EAA13C9D69AA0E1D042432C4C89813F022C1D1D318D9C6C
2,966,711 UART: [art] SIG.S = 9F1E48AAD30244E11217920E6D3276C52DD1FE84453E7FD0F16E3F3CD7E90CA7E0F9C1BD175E91F75B2722A91EC118B9
2,989,921 UART: Caliptra RT
2,990,174 UART: [state] CFI Enabled
3,098,271 UART: [rt] RT listening for mailbox commands...
3,098,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,395 UART: [rt]cmd =0x44504543, len=96
3,309,943 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
893,449 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,574 UART: [kat] ++
897,726 UART: [kat] sha1
901,906 UART: [kat] SHA2-256
903,846 UART: [kat] SHA2-384
906,493 UART: [kat] SHA2-512-ACC
908,394 UART: [kat] ECC-384
917,951 UART: [kat] HMAC-384Kdf
922,577 UART: [kat] LMS
1,170,905 UART: [kat] --
1,171,758 UART: [cold-reset] ++
1,172,098 UART: [fht] FHT @ 0x50003400
1,174,709 UART: [idev] ++
1,174,877 UART: [idev] CDI.KEYID = 6
1,175,237 UART: [idev] SUBJECT.KEYID = 7
1,175,661 UART: [idev] UDS.KEYID = 0
1,176,006 ready_for_fw is high
1,176,006 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,469 UART: [idev] Erasing UDS.KEYID = 0
1,200,826 UART: [idev] Sha1 KeyId Algorithm
1,209,242 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,795 UART: [ldev] SUBJECT.KEYID = 5
1,211,221 UART: [ldev] AUTHORITY.KEYID = 7
1,211,684 UART: [ldev] FE.KEYID = 1
1,216,838 UART: [ldev] Erasing FE.KEYID = 1
1,243,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,100 UART: [ldev] --
1,282,527 UART: [fwproc] Wait for Commands...
1,283,259 UART: [fwproc] Recv command 0x46574c44
1,283,987 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,075 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,379 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,168 >>> mbox cmd response: success
2,774,378 UART: [afmc] ++
2,774,546 UART: [afmc] CDI.KEYID = 6
2,774,908 UART: [afmc] SUBJECT.KEYID = 7
2,775,333 UART: [afmc] AUTHORITY.KEYID = 5
2,811,230 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,529 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,277 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,005 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,890 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,609 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,467 UART: [afmc] --
2,854,393 UART: [cold-reset] --
2,855,325 UART: [state] Locking Datavault
2,856,432 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,036 UART: [state] Locking ICCM
2,857,694 UART: [exit] Launching FMC @ 0x40000130
2,863,023 UART:
2,863,039 UART: Running Caliptra FMC ...
2,863,447 UART:
2,863,590 UART: [state] CFI Enabled
2,873,873 UART: [fht] FMC Alias Private Key: 7
2,982,348 UART: [art] Extend RT PCRs Done
2,982,776 UART: [art] Lock RT PCRs Done
2,984,136 UART: [art] Populate DV Done
2,992,253 UART: [fht] FMC Alias Private Key: 7
2,993,399 UART: [art] Derive CDI
2,993,679 UART: [art] Store in in slot 0x4
3,079,008 UART: [art] Derive Key Pair
3,079,368 UART: [art] Store priv key in slot 0x5
3,093,076 UART: [art] Derive Key Pair - Done
3,107,908 UART: [art] Signing Cert with AUTHO
3,108,388 UART: RITY.KEYID = 7
3,123,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,315 UART: [art] PUB.X = F4766BCBC556B905F62F19C7860FBE1D7B2E606A582830B57E1B8B8688F7363A4DBCC053A358EE50525B973313A281FE
3,131,083 UART: [art] PUB.Y = 5C38245C89513F1ABC909C1842D150F4FE09F846AE299DA048FEA592560337A928A5635204D123E127A5DD351E341CA7
3,138,020 UART: [art] SIG.R = 216648B039B8FAFD734A2B251B90FEF6CD42FEB860B420F585C2E66AE4BCC184AF9EE715ABB3257F78970C26FFA8801D
3,144,803 UART: [art] SIG.S = D3F319D8604D6598F3EDBEA410E472AAB7D104602D1CA7CE909F7A5830316B68F9F33D995437BAE1D6BB2C1F6F9988C6
3,168,071 UART: Caliptra RT
3,168,416 UART: [state] CFI Enabled
3,276,131 UART: [rt] RT listening for mailbox commands...
3,276,801 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,657 UART: [rt]cmd =0x44504543, len=96
3,488,441 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,276 ready_for_fw is high
1,060,276 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,845 >>> mbox cmd response: success
2,689,121 UART:
2,689,137 UART: Running Caliptra FMC ...
2,689,545 UART:
2,689,688 UART: [state] CFI Enabled
2,700,467 UART: [fht] FMC Alias Private Key: 7
2,808,804 UART: [art] Extend RT PCRs Done
2,809,232 UART: [art] Lock RT PCRs Done
2,810,634 UART: [art] Populate DV Done
2,818,819 UART: [fht] FMC Alias Private Key: 7
2,819,923 UART: [art] Derive CDI
2,820,203 UART: [art] Store in in slot 0x4
2,905,980 UART: [art] Derive Key Pair
2,906,340 UART: [art] Store priv key in slot 0x5
2,919,402 UART: [art] Derive Key Pair - Done
2,934,266 UART: [art] Signing Cert with AUTHO
2,934,746 UART: RITY.KEYID = 7
2,950,050 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,815 UART: [art] PUB.X = 0DED24DC091E13BE02B31DE59E1400EC28DD8628F842E8D00C42AE861C0C9830CE37000A3477EDB8E15D804524211C74
2,957,527 UART: [art] PUB.Y = 3AFF3A10EBFC61503494680C7210ED52D398E4FDC1602CA73C0F3AA295766DCD61894DE02C83EE5571CBEEB960AD2A59
2,964,485 UART: [art] SIG.R = 2D57B3FD08EFADBC0C746D6A6A0F11825B6F3C3B1E48595D1C1B8C4A9A8B2E2EFD83F953A72CA6D5F697D3FEF3DB40BF
2,971,274 UART: [art] SIG.S = C2D9C3805438E5FBDE4D84738E030C5D8F82C60034DDD124E30596023EF0D06F90E37107D7458F5D71DA7D00228B0E2D
2,994,999 UART: Caliptra RT
2,995,344 UART: [state] CFI Enabled
3,103,215 UART: [rt] RT listening for mailbox commands...
3,103,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,001 UART: [rt]cmd =0x44504543, len=96
3,314,761 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
891,352 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,481 UART: [kat] ++
895,633 UART: [kat] sha1
899,967 UART: [kat] SHA2-256
901,907 UART: [kat] SHA2-384
904,828 UART: [kat] SHA2-512-ACC
906,729 UART: [kat] ECC-384
916,414 UART: [kat] HMAC-384Kdf
920,940 UART: [kat] LMS
1,169,252 UART: [kat] --
1,170,435 UART: [cold-reset] ++
1,170,843 UART: [fht] FHT @ 0x50003400
1,173,527 UART: [idev] ++
1,173,695 UART: [idev] CDI.KEYID = 6
1,174,056 UART: [idev] SUBJECT.KEYID = 7
1,174,481 UART: [idev] UDS.KEYID = 0
1,174,827 ready_for_fw is high
1,174,827 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,903 UART: [idev] Erasing UDS.KEYID = 0
1,199,623 UART: [idev] Sha1 KeyId Algorithm
1,208,485 UART: [idev] --
1,209,616 UART: [ldev] ++
1,209,784 UART: [ldev] CDI.KEYID = 6
1,210,148 UART: [ldev] SUBJECT.KEYID = 5
1,210,575 UART: [ldev] AUTHORITY.KEYID = 7
1,211,038 UART: [ldev] FE.KEYID = 1
1,216,316 UART: [ldev] Erasing FE.KEYID = 1
1,242,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,462 UART: [ldev] --
1,281,944 UART: [fwproc] Wait for Commands...
1,282,757 UART: [fwproc] Recv command 0x46574c44
1,283,490 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,918 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,227 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,109 >>> mbox cmd response: success
2,774,362 UART: [afmc] ++
2,774,530 UART: [afmc] CDI.KEYID = 6
2,774,893 UART: [afmc] SUBJECT.KEYID = 7
2,775,319 UART: [afmc] AUTHORITY.KEYID = 5
2,810,354 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,576 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,327 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,056 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,939 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,658 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,651 UART: [afmc] --
2,853,599 UART: [cold-reset] --
2,854,333 UART: [state] Locking Datavault
2,855,648 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,252 UART: [state] Locking ICCM
2,856,902 UART: [exit] Launching FMC @ 0x40000130
2,862,231 UART:
2,862,247 UART: Running Caliptra FMC ...
2,862,655 UART:
2,862,709 UART: [state] CFI Enabled
2,873,050 UART: [fht] FMC Alias Private Key: 7
2,981,047 UART: [art] Extend RT PCRs Done
2,981,475 UART: [art] Lock RT PCRs Done
2,982,723 UART: [art] Populate DV Done
2,990,766 UART: [fht] FMC Alias Private Key: 7
2,991,816 UART: [art] Derive CDI
2,992,096 UART: [art] Store in in slot 0x4
3,077,571 UART: [art] Derive Key Pair
3,077,931 UART: [art] Store priv key in slot 0x5
3,090,971 UART: [art] Derive Key Pair - Done
3,105,608 UART: [art] Signing Cert with AUTHO
3,106,088 UART: RITY.KEYID = 7
3,121,148 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,913 UART: [art] PUB.X = 9CA527675BF8A75E3DC0C2CD016604F8ECED73F633C8CA84AA8EB0AF390B970B41101BB391AABCE47AB2E168551670C5
3,128,687 UART: [art] PUB.Y = 208EC1F7892061B425FBC3D457458B4558EC195D1868E5B33F8B92F701E15CE79E11A4FCE2EB4E7396874BB9795F20E7
3,135,636 UART: [art] SIG.R = A4FB1065885E6BABCAF9DFB175E1F1C6156983921606352FEF4974E8FF2B445A90F5BBAB1E2B9743B907D745F9F0A065
3,142,410 UART: [art] SIG.S = 550D68A223B01D41310CA92E0C527002F64AFA17AF364B1F87DCD10D1B13BAF3D2EB9A8C5C5CCAF81D44DAACA6B16B96
3,165,402 UART: Caliptra RT
3,165,655 UART: [state] CFI Enabled
3,274,244 UART: [rt] RT listening for mailbox commands...
3,274,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,056 UART: [rt]cmd =0x44504543, len=96
3,483,585 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,666 ready_for_fw is high
1,056,666 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,907 >>> mbox cmd response: success
2,683,385 UART:
2,683,401 UART: Running Caliptra FMC ...
2,683,809 UART:
2,683,863 UART: [state] CFI Enabled
2,694,672 UART: [fht] FMC Alias Private Key: 7
2,803,167 UART: [art] Extend RT PCRs Done
2,803,595 UART: [art] Lock RT PCRs Done
2,805,251 UART: [art] Populate DV Done
2,813,532 UART: [fht] FMC Alias Private Key: 7
2,814,666 UART: [art] Derive CDI
2,814,946 UART: [art] Store in in slot 0x4
2,900,801 UART: [art] Derive Key Pair
2,901,161 UART: [art] Store priv key in slot 0x5
2,914,037 UART: [art] Derive Key Pair - Done
2,929,123 UART: [art] Signing Cert with AUTHO
2,929,603 UART: RITY.KEYID = 7
2,944,767 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,532 UART: [art] PUB.X = 17A7E2A1F95DFD5699C8461C9A32F691E00CF84141284E53B8B0E04C833FF659972770B50A5DD0B32D67B1C6FF85C094
2,952,298 UART: [art] PUB.Y = FBCAAA09801C7EDADE706FA167732001B3F9BD5443B9E03944654DEE7DBD27C2CFF9C0D30F26668B620A37F6595E1B89
2,959,250 UART: [art] SIG.R = F98904F327060A074D50158066DBD67A8EF051A23C3D6EDE6AAE4F109DE82CE79E6ED83591FB31BD9BB4D7B06186A5AE
2,966,022 UART: [art] SIG.S = EE9985956DD00F90E5C8B76903D4579320EA9E92F3522060D458587EA83CB1C98803F9B02EAE634B95117881E36239BD
2,989,762 UART: Caliptra RT
2,990,015 UART: [state] CFI Enabled
3,098,039 UART: [rt] RT listening for mailbox commands...
3,098,709 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,787 UART: [rt]cmd =0x44504543, len=96
3,309,623 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,890 UART: [state] WD Timer not started. Device not locked for debugging
88,141 UART: [kat] SHA2-256
891,691 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,820 UART: [kat] ++
895,972 UART: [kat] sha1
900,072 UART: [kat] SHA2-256
902,012 UART: [kat] SHA2-384
904,763 UART: [kat] SHA2-512-ACC
906,664 UART: [kat] ECC-384
916,689 UART: [kat] HMAC-384Kdf
921,347 UART: [kat] LMS
1,169,659 UART: [kat] --
1,170,738 UART: [cold-reset] ++
1,171,212 UART: [fht] FHT @ 0x50003400
1,173,882 UART: [idev] ++
1,174,050 UART: [idev] CDI.KEYID = 6
1,174,411 UART: [idev] SUBJECT.KEYID = 7
1,174,836 UART: [idev] UDS.KEYID = 0
1,175,182 ready_for_fw is high
1,175,182 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,990 UART: [idev] Erasing UDS.KEYID = 0
1,200,690 UART: [idev] Sha1 KeyId Algorithm
1,209,760 UART: [idev] --
1,210,679 UART: [ldev] ++
1,210,847 UART: [ldev] CDI.KEYID = 6
1,211,211 UART: [ldev] SUBJECT.KEYID = 5
1,211,638 UART: [ldev] AUTHORITY.KEYID = 7
1,212,101 UART: [ldev] FE.KEYID = 1
1,217,347 UART: [ldev] Erasing FE.KEYID = 1
1,244,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,647 UART: [ldev] --
1,282,971 UART: [fwproc] Wait for Commands...
1,283,706 UART: [fwproc] Recv command 0x46574c44
1,284,439 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,001 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,155 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,464 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,192 >>> mbox cmd response: success
2,775,453 UART: [afmc] ++
2,775,621 UART: [afmc] CDI.KEYID = 6
2,775,984 UART: [afmc] SUBJECT.KEYID = 7
2,776,410 UART: [afmc] AUTHORITY.KEYID = 5
2,812,377 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,744 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,473 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,356 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,075 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,702 UART: [afmc] --
2,855,746 UART: [cold-reset] --
2,856,394 UART: [state] Locking Datavault
2,857,775 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,379 UART: [state] Locking ICCM
2,859,023 UART: [exit] Launching FMC @ 0x40000130
2,864,352 UART:
2,864,368 UART: Running Caliptra FMC ...
2,864,776 UART:
2,864,919 UART: [state] CFI Enabled
2,875,402 UART: [fht] FMC Alias Private Key: 7
2,983,863 UART: [art] Extend RT PCRs Done
2,984,291 UART: [art] Lock RT PCRs Done
2,985,979 UART: [art] Populate DV Done
2,994,334 UART: [fht] FMC Alias Private Key: 7
2,995,328 UART: [art] Derive CDI
2,995,608 UART: [art] Store in in slot 0x4
3,081,191 UART: [art] Derive Key Pair
3,081,551 UART: [art] Store priv key in slot 0x5
3,095,079 UART: [art] Derive Key Pair - Done
3,109,732 UART: [art] Signing Cert with AUTHO
3,110,212 UART: RITY.KEYID = 7
3,125,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,385 UART: [art] PUB.X = DA675EECE2006E15337156AAA58C20FEEDA04EBF3A4389C83C056A012BBA2026695F94D1D4EF380E28EE171D8A4FD4D6
3,133,140 UART: [art] PUB.Y = 64DD6C532274AF26E99AFB0F548EAE0817E8CB60621AE3DD7DC11488AA2E7573B8D45D09E58CE7EC99625AC1E9D4C9A3
3,140,097 UART: [art] SIG.R = F2A3F0AFB723B68ECD13F9EF5397B1E580B7C56FF442F653153E9E2CF7758C4254C9E5066730D72C6EA6E440A8E86862
3,146,870 UART: [art] SIG.S = BBF929E6DC2FFDFA4BBE367D74289DAB4A01E1A4252FC0DBDD2CC65A241B7887FA435BBB66071B3B717DCC385F49419F
3,170,925 UART: Caliptra RT
3,171,270 UART: [state] CFI Enabled
3,278,418 UART: [rt] RT listening for mailbox commands...
3,279,088 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,646 UART: [rt]cmd =0x44504543, len=96
3,490,477 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,263 ready_for_fw is high
1,056,263 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,036 >>> mbox cmd response: success
2,683,944 UART:
2,683,960 UART: Running Caliptra FMC ...
2,684,368 UART:
2,684,511 UART: [state] CFI Enabled
2,694,864 UART: [fht] FMC Alias Private Key: 7
2,803,459 UART: [art] Extend RT PCRs Done
2,803,887 UART: [art] Lock RT PCRs Done
2,805,483 UART: [art] Populate DV Done
2,813,596 UART: [fht] FMC Alias Private Key: 7
2,814,722 UART: [art] Derive CDI
2,815,002 UART: [art] Store in in slot 0x4
2,900,735 UART: [art] Derive Key Pair
2,901,095 UART: [art] Store priv key in slot 0x5
2,913,731 UART: [art] Derive Key Pair - Done
2,928,765 UART: [art] Signing Cert with AUTHO
2,929,245 UART: RITY.KEYID = 7
2,944,483 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,248 UART: [art] PUB.X = FFCBF324AC478C5AFBFCAF6C8F33D570E184ED0D0362CC597623A2B2CA97B04B22AC63F1F9DDB54644EB8624CA4D184B
2,952,036 UART: [art] PUB.Y = 3E4B3489EAAD29D8DD388D2FCD0872645C40367B9D2693D42BF7F65BFFAA89408BF37D4520F49508F6DAAC4D90FDF9AB
2,958,998 UART: [art] SIG.R = 7EE5F18DA8718CFD491F588D71F429F5E58C0382ADFAF23A589FFDDA3E6F10876636CD20F9639478ED66D2B3B3F3EA37
2,965,779 UART: [art] SIG.S = 7CED0609F4BE4174DDB2BCB374B20C8D73EA488D1D3654287C9E67C2A3A949D06F3EA6B74067E26431D4485E51AD2CF8
2,989,327 UART: Caliptra RT
2,989,672 UART: [state] CFI Enabled
3,097,551 UART: [rt] RT listening for mailbox commands...
3,098,221 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,913 UART: [rt]cmd =0x44504543, len=96
3,309,149 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,527 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,221 UART: [kat] SHA2-256
882,152 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,267 UART: [kat] ++
886,419 UART: [kat] sha1
890,611 UART: [kat] SHA2-256
892,549 UART: [kat] SHA2-384
895,202 UART: [kat] SHA2-512-ACC
897,103 UART: [kat] ECC-384
902,546 UART: [kat] HMAC-384Kdf
907,268 UART: [kat] LMS
1,475,464 UART: [kat] --
1,476,585 UART: [cold-reset] ++
1,477,147 UART: [fht] Storing FHT @ 0x50003400
1,479,990 UART: [idev] ++
1,480,158 UART: [idev] CDI.KEYID = 6
1,480,518 UART: [idev] SUBJECT.KEYID = 7
1,480,942 UART: [idev] UDS.KEYID = 0
1,481,287 ready_for_fw is high
1,481,287 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,780 UART: [idev] Erasing UDS.KEYID = 0
1,505,142 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,862 UART: [idev] --
1,514,837 UART: [ldev] ++
1,515,005 UART: [ldev] CDI.KEYID = 6
1,515,368 UART: [ldev] SUBJECT.KEYID = 5
1,515,794 UART: [ldev] AUTHORITY.KEYID = 7
1,516,257 UART: [ldev] FE.KEYID = 1
1,521,287 UART: [ldev] Erasing FE.KEYID = 1
1,546,514 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,380 UART: [ldev] --
1,585,769 UART: [fwproc] Waiting for Commands...
1,586,434 UART: [fwproc] Received command 0x46574c44
1,587,225 UART: [fwproc] Received Image of size 114332 bytes
2,884,967 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,487 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,839 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,664 >>> mbox cmd response: success
3,077,774 UART: [afmc] ++
3,077,942 UART: [afmc] CDI.KEYID = 6
3,078,304 UART: [afmc] SUBJECT.KEYID = 7
3,078,729 UART: [afmc] AUTHORITY.KEYID = 5
3,113,410 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,544 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,324 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,052 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,937 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,627 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,528 UART: [afmc] --
3,156,562 UART: [cold-reset] --
3,157,510 UART: [state] Locking Datavault
3,158,789 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,393 UART: [state] Locking ICCM
3,159,999 UART: [exit] Launching FMC @ 0x40000130
3,165,328 UART:
3,165,344 UART: Running Caliptra FMC ...
3,165,752 UART:
3,165,806 UART: [state] CFI Enabled
3,176,531 UART: [fht] FMC Alias Private Key: 7
3,284,658 UART: [art] Extend RT PCRs Done
3,285,086 UART: [art] Lock RT PCRs Done
3,286,418 UART: [art] Populate DV Done
3,294,695 UART: [fht] FMC Alias Private Key: 7
3,295,649 UART: [art] Derive CDI
3,295,929 UART: [art] Store in in slot 0x4
3,381,588 UART: [art] Derive Key Pair
3,381,948 UART: [art] Store priv key in slot 0x5
3,394,868 UART: [art] Derive Key Pair - Done
3,409,634 UART: [art] Signing Cert with AUTHO
3,410,114 UART: RITY.KEYID = 7
3,425,198 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,963 UART: [art] PUB.X = B8B4756ADBF10C5DD61E739AEEBF93D67ECB937355C2C80B56F2F6792745E07D859AB984DDE094807E9495199B25EA81
3,432,735 UART: [art] PUB.Y = CE1E41A227A918182F2FECEBFBE63EB0176125D2CAFB974D956DFE2D3051F33EBBDE43AD2008482EEB12376F0143C3EE
3,439,699 UART: [art] SIG.R = 2976FD2375C0DFFF24E1DE726DC4E48947B80440C7F278D097D51D8121D65EB0261191D713896508B80E684F109B6B14
3,446,454 UART: [art] SIG.S = 9BA203AFBE97F800A61C121A945678D77DDE56FD797C05B8808F22E1B08C311E5B51D3B8D91383F6B86177F247B012C5
3,470,307 UART: Caliptra RT
3,470,560 UART: [state] CFI Enabled
3,578,241 UART: [rt] RT listening for mailbox commands...
3,578,911 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,685 UART: [rt]cmd =0x44504543, len=28
3,651,749 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,573 ready_for_fw is high
1,362,573 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,474 >>> mbox cmd response: success
2,990,564 UART:
2,990,580 UART: Running Caliptra FMC ...
2,990,988 UART:
2,991,042 UART: [state] CFI Enabled
3,001,465 UART: [fht] FMC Alias Private Key: 7
3,108,856 UART: [art] Extend RT PCRs Done
3,109,284 UART: [art] Lock RT PCRs Done
3,110,662 UART: [art] Populate DV Done
3,118,989 UART: [fht] FMC Alias Private Key: 7
3,119,955 UART: [art] Derive CDI
3,120,235 UART: [art] Store in in slot 0x4
3,206,014 UART: [art] Derive Key Pair
3,206,374 UART: [art] Store priv key in slot 0x5
3,219,554 UART: [art] Derive Key Pair - Done
3,234,291 UART: [art] Signing Cert with AUTHO
3,234,771 UART: RITY.KEYID = 7
3,249,623 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,388 UART: [art] PUB.X = B7C8127CF0F0D69BEA64AB0835E40683E24356FC434B90558906D8B66C6DE673AB8FEFDD0DDA058F239569F8627E3EE6
3,257,153 UART: [art] PUB.Y = 64989B3A4D24DD63D9F93DDFA89926DCD76A5E14A987E874BC4FEC914EF8CCC7BAF82E8BCFEEC6D5E6D1564762DAA31B
3,264,131 UART: [art] SIG.R = 945FA7042F5D971CD460BEB744B1814C047EEF134FC3C2CC6E0BAF9691356EBA10FBB03C91E09D5867E4C3EF3F09ADF9
3,270,907 UART: [art] SIG.S = C756A871496B637B9F383BD360ADFE001C14FF120C8035152D106959395C5FD648BF4BF03D8702CB73CFCC0BC1C9476B
3,294,837 UART: Caliptra RT
3,295,090 UART: [state] CFI Enabled
3,402,840 UART: [rt] RT listening for mailbox commands...
3,403,510 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,498 UART: [rt]cmd =0x44504543, len=28
3,476,796 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
86,946 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,424 UART: [kat] SHA2-256
882,355 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,470 UART: [kat] ++
886,622 UART: [kat] sha1
890,760 UART: [kat] SHA2-256
892,698 UART: [kat] SHA2-384
895,421 UART: [kat] SHA2-512-ACC
897,322 UART: [kat] ECC-384
902,803 UART: [kat] HMAC-384Kdf
907,597 UART: [kat] LMS
1,475,793 UART: [kat] --
1,476,838 UART: [cold-reset] ++
1,477,386 UART: [fht] Storing FHT @ 0x50003400
1,480,071 UART: [idev] ++
1,480,239 UART: [idev] CDI.KEYID = 6
1,480,599 UART: [idev] SUBJECT.KEYID = 7
1,481,023 UART: [idev] UDS.KEYID = 0
1,481,368 ready_for_fw is high
1,481,368 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,481 UART: [idev] Erasing UDS.KEYID = 0
1,505,695 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,351 UART: [idev] --
1,515,326 UART: [ldev] ++
1,515,494 UART: [ldev] CDI.KEYID = 6
1,515,857 UART: [ldev] SUBJECT.KEYID = 5
1,516,283 UART: [ldev] AUTHORITY.KEYID = 7
1,516,746 UART: [ldev] FE.KEYID = 1
1,521,828 UART: [ldev] Erasing FE.KEYID = 1
1,546,877 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,593 UART: [ldev] --
1,585,880 UART: [fwproc] Waiting for Commands...
1,586,507 UART: [fwproc] Received command 0x46574c44
1,587,298 UART: [fwproc] Received Image of size 114332 bytes
2,886,036 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,198 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,550 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,521 >>> mbox cmd response: success
3,079,647 UART: [afmc] ++
3,079,815 UART: [afmc] CDI.KEYID = 6
3,080,177 UART: [afmc] SUBJECT.KEYID = 7
3,080,602 UART: [afmc] AUTHORITY.KEYID = 5
3,115,363 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,589 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,369 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,097 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,982 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,672 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,563 UART: [afmc] --
3,158,525 UART: [cold-reset] --
3,159,447 UART: [state] Locking Datavault
3,160,410 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,014 UART: [state] Locking ICCM
3,161,510 UART: [exit] Launching FMC @ 0x40000130
3,166,839 UART:
3,166,855 UART: Running Caliptra FMC ...
3,167,263 UART:
3,167,406 UART: [state] CFI Enabled
3,178,091 UART: [fht] FMC Alias Private Key: 7
3,286,044 UART: [art] Extend RT PCRs Done
3,286,472 UART: [art] Lock RT PCRs Done
3,287,730 UART: [art] Populate DV Done
3,295,825 UART: [fht] FMC Alias Private Key: 7
3,296,955 UART: [art] Derive CDI
3,297,235 UART: [art] Store in in slot 0x4
3,382,574 UART: [art] Derive Key Pair
3,382,934 UART: [art] Store priv key in slot 0x5
3,396,552 UART: [art] Derive Key Pair - Done
3,411,254 UART: [art] Signing Cert with AUTHO
3,411,734 UART: RITY.KEYID = 7
3,427,286 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,051 UART: [art] PUB.X = 646264DD15B60399EE2DED3ABB6234DA6626F1DDCB7FC74108E81178D0E4F3D6E7E803B821F7C5C795A578BA8FC90ADA
3,434,825 UART: [art] PUB.Y = DB8FD2928B831898DABF7B95C7B5E212BCCDCE9B1F875A6FEB646880C3AC3B59B1271B07B1874A31A51B3CE03901AF95
3,441,785 UART: [art] SIG.R = D93C568FA8E3203FA645361275EA375593232737EAFB1E9DE60564710FBFAB8FA6A1CC7404B1DF9942B06329C807BCB3
3,448,549 UART: [art] SIG.S = 60466523F66C92E4643B2F50DE86387AF23E543BD174CC4B419F9C40504803600493B44CD164F27A83E0B3F1BB5270EB
3,472,346 UART: Caliptra RT
3,472,691 UART: [state] CFI Enabled
3,581,634 UART: [rt] RT listening for mailbox commands...
3,582,304 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,560 UART: [rt]cmd =0x44504543, len=28
3,655,456 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,574 ready_for_fw is high
1,362,574 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,930,443 >>> mbox cmd response: success
2,991,967 UART:
2,991,983 UART: Running Caliptra FMC ...
2,992,391 UART:
2,992,534 UART: [state] CFI Enabled
3,003,441 UART: [fht] FMC Alias Private Key: 7
3,110,956 UART: [art] Extend RT PCRs Done
3,111,384 UART: [art] Lock RT PCRs Done
3,112,658 UART: [art] Populate DV Done
3,120,727 UART: [fht] FMC Alias Private Key: 7
3,121,771 UART: [art] Derive CDI
3,122,051 UART: [art] Store in in slot 0x4
3,207,530 UART: [art] Derive Key Pair
3,207,890 UART: [art] Store priv key in slot 0x5
3,220,944 UART: [art] Derive Key Pair - Done
3,235,365 UART: [art] Signing Cert with AUTHO
3,235,845 UART: RITY.KEYID = 7
3,251,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,806 UART: [art] PUB.X = 496330B873161450AF6576CF1BE062613A55CE43E8774D5784EF4A415EBEF0A860709E13BC246EAEDED5AD99F39D75EC
3,258,584 UART: [art] PUB.Y = 11D533199A85CC654BC2D742A2EA2F3273D9F88D71B1498AC0A7792976CCB4C74D0692DC45872A1E9EA8C2069DB6E809
3,265,529 UART: [art] SIG.R = 4B60B91811A3C4286043CFC5C46BD98534BEDCAEA73EC9126DE954A760A19A985DFFB8F99D38428A8F4BDB85E3A68416
3,272,311 UART: [art] SIG.S = 1B0E6542BE9643EE0185B85E00B309FCD92F00DCA3DB40FC6293AA3610295C91E1AC164F7FDBE036F89E58B3B17A3109
3,296,016 UART: Caliptra RT
3,296,361 UART: [state] CFI Enabled
3,405,081 UART: [rt] RT listening for mailbox commands...
3,405,751 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,593 UART: [rt]cmd =0x44504543, len=28
3,478,891 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,436 UART: [state] LifecycleState = Unprovisioned
86,091 UART: [state] DebugLocked = No
86,677 UART: [state] WD Timer not started. Device not locked for debugging
87,814 UART: [kat] SHA2-256
893,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,589 UART: [kat] ++
897,741 UART: [kat] sha1
902,031 UART: [kat] SHA2-256
903,971 UART: [kat] SHA2-384
906,618 UART: [kat] SHA2-512-ACC
908,519 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,596 UART: [kat] LMS
1,170,924 UART: [kat] --
1,171,805 UART: [cold-reset] ++
1,172,365 UART: [fht] FHT @ 0x50003400
1,174,944 UART: [idev] ++
1,175,112 UART: [idev] CDI.KEYID = 6
1,175,472 UART: [idev] SUBJECT.KEYID = 7
1,175,896 UART: [idev] UDS.KEYID = 0
1,176,241 ready_for_fw is high
1,176,241 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,772 UART: [idev] Erasing UDS.KEYID = 0
1,201,071 UART: [idev] Sha1 KeyId Algorithm
1,209,543 UART: [idev] --
1,210,623 UART: [ldev] ++
1,210,791 UART: [ldev] CDI.KEYID = 6
1,211,154 UART: [ldev] SUBJECT.KEYID = 5
1,211,580 UART: [ldev] AUTHORITY.KEYID = 7
1,212,043 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,243,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,923 UART: [ldev] --
1,282,412 UART: [fwproc] Wait for Commands...
1,283,076 UART: [fwproc] Recv command 0x46574c44
1,283,804 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,658 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,962 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,703 >>> mbox cmd response: success
2,774,747 UART: [afmc] ++
2,774,915 UART: [afmc] CDI.KEYID = 6
2,775,277 UART: [afmc] SUBJECT.KEYID = 7
2,775,702 UART: [afmc] AUTHORITY.KEYID = 5
2,810,923 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,206 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,934 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,819 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,538 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,342 UART: [afmc] --
2,854,236 UART: [cold-reset] --
2,855,062 UART: [state] Locking Datavault
2,856,123 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,727 UART: [state] Locking ICCM
2,857,239 UART: [exit] Launching FMC @ 0x40000130
2,862,568 UART:
2,862,584 UART: Running Caliptra FMC ...
2,862,992 UART:
2,863,046 UART: [state] CFI Enabled
2,873,325 UART: [fht] FMC Alias Private Key: 7
2,980,352 UART: [art] Extend RT PCRs Done
2,980,780 UART: [art] Lock RT PCRs Done
2,982,298 UART: [art] Populate DV Done
2,990,553 UART: [fht] FMC Alias Private Key: 7
2,991,511 UART: [art] Derive CDI
2,991,791 UART: [art] Store in in slot 0x4
3,077,452 UART: [art] Derive Key Pair
3,077,812 UART: [art] Store priv key in slot 0x5
3,090,662 UART: [art] Derive Key Pair - Done
3,105,318 UART: [art] Signing Cert with AUTHO
3,105,798 UART: RITY.KEYID = 7
3,120,996 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,761 UART: [art] PUB.X = 62B4E98E2DA8B3E1C05C5696F5283FB560B60D648DA1A1B164CE7C0FB3640F6EAF76C5A7652AF1CDD071483DEDEF0DDB
3,128,541 UART: [art] PUB.Y = 740E96F54F6DA422B7286C9080A71B3E2179003E541036B225436F1DAEEE91399405A86385620022212361F8DEE35AF9
3,135,429 UART: [art] SIG.R = 12A5EE5FEF5415BEA181EB73BDA32DE113A3C1BB39BBFC4966D2D28E8543EC821FF8BFFDF0524FF5D9AA4C76EED5DC65
3,142,231 UART: [art] SIG.S = 46A6D00F0844767EB427CA8F1502F6E030E39DFD7EF1E86C90883920544D7ADC6D5604DF5759619103A4B8BCEC711410
3,166,317 UART: Caliptra RT
3,166,570 UART: [state] CFI Enabled
3,274,027 UART: [rt] RT listening for mailbox commands...
3,274,697 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,603 UART: [rt]cmd =0x44504543, len=28
3,348,151 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,229 ready_for_fw is high
1,059,229 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,581 >>> mbox cmd response: success
2,687,115 UART:
2,687,131 UART: Running Caliptra FMC ...
2,687,539 UART:
2,687,593 UART: [state] CFI Enabled
2,698,150 UART: [fht] FMC Alias Private Key: 7
2,805,225 UART: [art] Extend RT PCRs Done
2,805,653 UART: [art] Lock RT PCRs Done
2,807,225 UART: [art] Populate DV Done
2,815,450 UART: [fht] FMC Alias Private Key: 7
2,816,408 UART: [art] Derive CDI
2,816,688 UART: [art] Store in in slot 0x4
2,902,515 UART: [art] Derive Key Pair
2,902,875 UART: [art] Store priv key in slot 0x5
2,915,289 UART: [art] Derive Key Pair - Done
2,930,161 UART: [art] Signing Cert with AUTHO
2,930,641 UART: RITY.KEYID = 7
2,945,425 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,190 UART: [art] PUB.X = EBC25A50CCF25DE40E2EFBF5CE2901174403044E08C22750729512061590BDB7CD1A35CC08D2561292737F0B29CC4129
2,952,936 UART: [art] PUB.Y = 76A17115C39F6C94ACCCC2E46ECCE5650AAEEEDF43614B5A0723FF4F77AE0B371989A06B2CF8EBDC0F331EE9305C9717
2,959,894 UART: [art] SIG.R = 9C3F083DB9F7F0CF60AC3F0A65EB432D3898A045B52A0220D6DF05DF8BD9AECFC0AEB506E7539B25972B1E7CF319B253
2,966,667 UART: [art] SIG.S = 9486AD16A94813823EF41C3EF412DB1B42347E1D3E724260F1837D6818188C0F9CEAF7A4618704D149BB5BAA61BDC02D
2,990,562 UART: Caliptra RT
2,990,815 UART: [state] CFI Enabled
3,098,309 UART: [rt] RT listening for mailbox commands...
3,098,979 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,037 UART: [rt]cmd =0x44504543, len=28
3,172,213 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,890 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [kat] SHA2-256
893,857 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,982 UART: [kat] ++
898,134 UART: [kat] sha1
902,444 UART: [kat] SHA2-256
904,384 UART: [kat] SHA2-384
907,103 UART: [kat] SHA2-512-ACC
909,004 UART: [kat] ECC-384
919,049 UART: [kat] HMAC-384Kdf
923,629 UART: [kat] LMS
1,171,957 UART: [kat] --
1,172,668 UART: [cold-reset] ++
1,173,180 UART: [fht] FHT @ 0x50003400
1,175,823 UART: [idev] ++
1,175,991 UART: [idev] CDI.KEYID = 6
1,176,351 UART: [idev] SUBJECT.KEYID = 7
1,176,775 UART: [idev] UDS.KEYID = 0
1,177,120 ready_for_fw is high
1,177,120 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,421 UART: [idev] Erasing UDS.KEYID = 0
1,202,002 UART: [idev] Sha1 KeyId Algorithm
1,210,372 UART: [idev] --
1,211,498 UART: [ldev] ++
1,211,666 UART: [ldev] CDI.KEYID = 6
1,212,029 UART: [ldev] SUBJECT.KEYID = 5
1,212,455 UART: [ldev] AUTHORITY.KEYID = 7
1,212,918 UART: [ldev] FE.KEYID = 1
1,218,056 UART: [ldev] Erasing FE.KEYID = 1
1,244,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,290 UART: [ldev] --
1,283,723 UART: [fwproc] Wait for Commands...
1,284,333 UART: [fwproc] Recv command 0x46574c44
1,285,061 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,213 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,517 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,458 >>> mbox cmd response: success
2,776,476 UART: [afmc] ++
2,776,644 UART: [afmc] CDI.KEYID = 6
2,777,006 UART: [afmc] SUBJECT.KEYID = 7
2,777,431 UART: [afmc] AUTHORITY.KEYID = 5
2,813,500 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,923 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,651 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,536 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,255 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,181 UART: [afmc] --
2,857,269 UART: [cold-reset] --
2,858,083 UART: [state] Locking Datavault
2,859,044 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,648 UART: [state] Locking ICCM
2,860,158 UART: [exit] Launching FMC @ 0x40000130
2,865,487 UART:
2,865,503 UART: Running Caliptra FMC ...
2,865,911 UART:
2,866,054 UART: [state] CFI Enabled
2,876,493 UART: [fht] FMC Alias Private Key: 7
2,984,862 UART: [art] Extend RT PCRs Done
2,985,290 UART: [art] Lock RT PCRs Done
2,986,768 UART: [art] Populate DV Done
2,994,909 UART: [fht] FMC Alias Private Key: 7
2,995,971 UART: [art] Derive CDI
2,996,251 UART: [art] Store in in slot 0x4
3,082,164 UART: [art] Derive Key Pair
3,082,524 UART: [art] Store priv key in slot 0x5
3,095,800 UART: [art] Derive Key Pair - Done
3,110,735 UART: [art] Signing Cert with AUTHO
3,111,215 UART: RITY.KEYID = 7
3,126,279 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,044 UART: [art] PUB.X = A93474F2DACD5A57B45D1108BC2F420910A2E1F3E8493EFD25BBE4810CBA00C6517A1770DE0F981440BD0372F2BD3C10
3,133,787 UART: [art] PUB.Y = 840ACF09362D5DFD63DA5600E297CACB80FEBC064E5A06A34FAF3BF5B71A9BB2CBAEB9F7EC94DAB3E30A218175718903
3,140,721 UART: [art] SIG.R = 41AE59269F881F54C75F8838211CB210A1CFE495FCC7F919C1C5DBAD7137E03072C4836BFFC784CDF7FBE92AFF213BFF
3,147,509 UART: [art] SIG.S = D16AB1F2AB3AE132863A9EF53DAEFDB80053B72E545750005AF2F9B2FA703F070C5397CACF7D07AB30860E120BE288DA
3,170,953 UART: Caliptra RT
3,171,298 UART: [state] CFI Enabled
3,278,831 UART: [rt] RT listening for mailbox commands...
3,279,501 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,419 UART: [rt]cmd =0x44504543, len=28
3,352,401 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,610 ready_for_fw is high
1,061,610 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,053 >>> mbox cmd response: success
2,690,045 UART:
2,690,061 UART: Running Caliptra FMC ...
2,690,469 UART:
2,690,612 UART: [state] CFI Enabled
2,700,755 UART: [fht] FMC Alias Private Key: 7
2,809,710 UART: [art] Extend RT PCRs Done
2,810,138 UART: [art] Lock RT PCRs Done
2,811,656 UART: [art] Populate DV Done
2,819,821 UART: [fht] FMC Alias Private Key: 7
2,820,785 UART: [art] Derive CDI
2,821,065 UART: [art] Store in in slot 0x4
2,906,642 UART: [art] Derive Key Pair
2,907,002 UART: [art] Store priv key in slot 0x5
2,921,066 UART: [art] Derive Key Pair - Done
2,935,546 UART: [art] Signing Cert with AUTHO
2,936,026 UART: RITY.KEYID = 7
2,951,374 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,139 UART: [art] PUB.X = 7D03122801165593E4DDDD62966614440DB46FB26B44287A0314EE5A41031900762EA3B28DFA187FA3A6CCD582EA9CCA
2,958,874 UART: [art] PUB.Y = 83A472AB28E8F9CCEF15AAC1537EA1592AC219AC3DFDF222268DAA48A2DD9950C35956D88709334D127BCFDE138A2729
2,965,833 UART: [art] SIG.R = 95DB71E5B2CC03227FD60ACDEB39743C98CFDE74E346DBD29EBA6FF56AB269409FA2E860D08796A1F86B05185C2BD120
2,972,610 UART: [art] SIG.S = 08D974EEAAB746C5F2B0C00C15A47AFBE35D52159B985064945E31165216C2D8768E89A6555A447E907CDD73ADF5BDD3
2,996,581 UART: Caliptra RT
2,996,926 UART: [state] CFI Enabled
3,103,955 UART: [rt] RT listening for mailbox commands...
3,104,625 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,637 UART: [rt]cmd =0x44504543, len=28
3,178,015 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,615 UART: [kat] SHA2-256
901,555 UART: [kat] SHA2-384
904,302 UART: [kat] SHA2-512-ACC
906,203 UART: [kat] ECC-384
915,546 UART: [kat] HMAC-384Kdf
920,030 UART: [kat] LMS
1,168,342 UART: [kat] --
1,169,241 UART: [cold-reset] ++
1,169,649 UART: [fht] FHT @ 0x50003400
1,172,141 UART: [idev] ++
1,172,309 UART: [idev] CDI.KEYID = 6
1,172,670 UART: [idev] SUBJECT.KEYID = 7
1,173,095 UART: [idev] UDS.KEYID = 0
1,173,441 ready_for_fw is high
1,173,441 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,939 UART: [idev] Erasing UDS.KEYID = 0
1,198,181 UART: [idev] Sha1 KeyId Algorithm
1,207,171 UART: [idev] --
1,208,124 UART: [ldev] ++
1,208,292 UART: [ldev] CDI.KEYID = 6
1,208,656 UART: [ldev] SUBJECT.KEYID = 5
1,209,083 UART: [ldev] AUTHORITY.KEYID = 7
1,209,546 UART: [ldev] FE.KEYID = 1
1,214,964 UART: [ldev] Erasing FE.KEYID = 1
1,241,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,240 UART: [ldev] --
1,280,580 UART: [fwproc] Wait for Commands...
1,281,383 UART: [fwproc] Recv command 0x46574c44
1,282,116 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,104 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,413 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,163 >>> mbox cmd response: success
2,773,280 UART: [afmc] ++
2,773,448 UART: [afmc] CDI.KEYID = 6
2,773,811 UART: [afmc] SUBJECT.KEYID = 7
2,774,237 UART: [afmc] AUTHORITY.KEYID = 5
2,809,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,697 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,426 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,309 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,028 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,857 UART: [afmc] --
2,852,829 UART: [cold-reset] --
2,853,763 UART: [state] Locking Datavault
2,854,996 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,600 UART: [state] Locking ICCM
2,856,148 UART: [exit] Launching FMC @ 0x40000130
2,861,477 UART:
2,861,493 UART: Running Caliptra FMC ...
2,861,901 UART:
2,861,955 UART: [state] CFI Enabled
2,872,558 UART: [fht] FMC Alias Private Key: 7
2,980,359 UART: [art] Extend RT PCRs Done
2,980,787 UART: [art] Lock RT PCRs Done
2,982,321 UART: [art] Populate DV Done
2,990,574 UART: [fht] FMC Alias Private Key: 7
2,991,574 UART: [art] Derive CDI
2,991,854 UART: [art] Store in in slot 0x4
3,077,717 UART: [art] Derive Key Pair
3,078,077 UART: [art] Store priv key in slot 0x5
3,091,193 UART: [art] Derive Key Pair - Done
3,105,863 UART: [art] Signing Cert with AUTHO
3,106,343 UART: RITY.KEYID = 7
3,121,903 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,668 UART: [art] PUB.X = 61ACEA2EEFA2F5DA6414AA0651CDD1DE2A257CCFF41416FD1BD153053F9E318D9C329650AA9B14478BF3712B61A53C22
3,129,448 UART: [art] PUB.Y = 15E466FC7D69307E8ED857F93F9BD0A48945A6E01078BD9CF7B411BAA0EEB3A43FF99DABFDF55227FE9AAE76F3B00A7E
3,136,419 UART: [art] SIG.R = 422F8E242BE05907EE439C131D5A7A4D46B513F20D2B22027AF9A35E66A9ED457B3A1FD0EFBA9D1CD099547AD8DDFB63
3,143,196 UART: [art] SIG.S = 10245921AD2E6C1BCF3FCCC7EF0DE81E51AD8FE37138F269EB37AAEB39213621ACEAE33BC761095078E6F3C326528453
3,166,451 UART: Caliptra RT
3,166,704 UART: [state] CFI Enabled
3,274,339 UART: [rt] RT listening for mailbox commands...
3,275,009 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,271 UART: [rt]cmd =0x44504543, len=28
3,348,751 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,890 ready_for_fw is high
1,055,890 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,751 >>> mbox cmd response: success
2,683,775 UART:
2,683,791 UART: Running Caliptra FMC ...
2,684,199 UART:
2,684,253 UART: [state] CFI Enabled
2,694,342 UART: [fht] FMC Alias Private Key: 7
2,802,321 UART: [art] Extend RT PCRs Done
2,802,749 UART: [art] Lock RT PCRs Done
2,804,139 UART: [art] Populate DV Done
2,812,190 UART: [fht] FMC Alias Private Key: 7
2,813,368 UART: [art] Derive CDI
2,813,648 UART: [art] Store in in slot 0x4
2,899,365 UART: [art] Derive Key Pair
2,899,725 UART: [art] Store priv key in slot 0x5
2,913,231 UART: [art] Derive Key Pair - Done
2,928,143 UART: [art] Signing Cert with AUTHO
2,928,623 UART: RITY.KEYID = 7
2,943,789 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,554 UART: [art] PUB.X = CE7932543BDE4902AE4C7D8E0626C1BAC683C3BA5B64CAA1F4CE13656A81AE7F9FC20250E007AAD27D81332A467E02B1
2,951,323 UART: [art] PUB.Y = 0E7F4B9D078FB3C5C7261E51677CF6CD97C7399C9A1D0E18B6420533628F7D5C833DFEED4666FAA2D45A5AE9DEF2CE65
2,958,277 UART: [art] SIG.R = 81F2DC885B7298CE7158477773ABF83AF94D4F8925DB05D983139780A784F451D668DAD0CF2CF2670D0A2C9A76324782
2,965,036 UART: [art] SIG.S = BB12A88B53EFD0F97102E1700789EF4DDB143D0812919613B3792F3323730755811F559DF58CF1D241B56D83F6711FA0
2,988,851 UART: Caliptra RT
2,989,104 UART: [state] CFI Enabled
3,096,674 UART: [rt] RT listening for mailbox commands...
3,097,344 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,368 UART: [rt]cmd =0x44504543, len=28
3,170,506 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Unprovisioned
85,730 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,585 UART: [kat] SHA2-256
891,135 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,264 UART: [kat] ++
895,416 UART: [kat] sha1
899,568 UART: [kat] SHA2-256
901,508 UART: [kat] SHA2-384
904,337 UART: [kat] SHA2-512-ACC
906,238 UART: [kat] ECC-384
916,071 UART: [kat] HMAC-384Kdf
920,659 UART: [kat] LMS
1,168,971 UART: [kat] --
1,169,774 UART: [cold-reset] ++
1,170,330 UART: [fht] FHT @ 0x50003400
1,172,916 UART: [idev] ++
1,173,084 UART: [idev] CDI.KEYID = 6
1,173,445 UART: [idev] SUBJECT.KEYID = 7
1,173,870 UART: [idev] UDS.KEYID = 0
1,174,216 ready_for_fw is high
1,174,216 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,878 UART: [idev] Erasing UDS.KEYID = 0
1,199,068 UART: [idev] Sha1 KeyId Algorithm
1,208,098 UART: [idev] --
1,209,131 UART: [ldev] ++
1,209,299 UART: [ldev] CDI.KEYID = 6
1,209,663 UART: [ldev] SUBJECT.KEYID = 5
1,210,090 UART: [ldev] AUTHORITY.KEYID = 7
1,210,553 UART: [ldev] FE.KEYID = 1
1,216,041 UART: [ldev] Erasing FE.KEYID = 1
1,242,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,817 UART: [ldev] --
1,281,303 UART: [fwproc] Wait for Commands...
1,281,962 UART: [fwproc] Recv command 0x46574c44
1,282,695 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,653 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,962 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,830 >>> mbox cmd response: success
2,773,081 UART: [afmc] ++
2,773,249 UART: [afmc] CDI.KEYID = 6
2,773,612 UART: [afmc] SUBJECT.KEYID = 7
2,774,038 UART: [afmc] AUTHORITY.KEYID = 5
2,809,551 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,718 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,447 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,330 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,049 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,672 UART: [afmc] --
2,852,664 UART: [cold-reset] --
2,853,622 UART: [state] Locking Datavault
2,854,829 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,433 UART: [state] Locking ICCM
2,855,853 UART: [exit] Launching FMC @ 0x40000130
2,861,182 UART:
2,861,198 UART: Running Caliptra FMC ...
2,861,606 UART:
2,861,749 UART: [state] CFI Enabled
2,872,212 UART: [fht] FMC Alias Private Key: 7
2,980,449 UART: [art] Extend RT PCRs Done
2,980,877 UART: [art] Lock RT PCRs Done
2,982,675 UART: [art] Populate DV Done
2,990,942 UART: [fht] FMC Alias Private Key: 7
2,991,946 UART: [art] Derive CDI
2,992,226 UART: [art] Store in in slot 0x4
3,078,273 UART: [art] Derive Key Pair
3,078,633 UART: [art] Store priv key in slot 0x5
3,092,461 UART: [art] Derive Key Pair - Done
3,107,259 UART: [art] Signing Cert with AUTHO
3,107,739 UART: RITY.KEYID = 7
3,122,861 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,626 UART: [art] PUB.X = 617EF15A1DEE897052376DDD91FFE289F6738F6A71BFE1FA359CD14925826E8411EC6E486E01815E15D71194DB309DB2
3,130,397 UART: [art] PUB.Y = 9E435F1A87DC6B59A21B66DA1FD1232A51EF0ED9D0E6287A90885C26351F6926EEE73214874699D9DC9B35A951963305
3,137,339 UART: [art] SIG.R = EE132604DF48FBD9406B0AB5AB709A0A2BA93FB99DD903DA2ED91FE07A944CCD436FAC682AB6347F3975F1198F4020C1
3,144,113 UART: [art] SIG.S = 4760DB773A5CCBFC242510B3008C07743BFF5C311F8A23015337B53FEC91C2CB047A55BFE117063E93E5436F3B44BE86
3,167,692 UART: Caliptra RT
3,168,037 UART: [state] CFI Enabled
3,277,030 UART: [rt] RT listening for mailbox commands...
3,277,700 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,476 UART: [rt]cmd =0x44504543, len=28
3,350,410 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,583 ready_for_fw is high
1,056,583 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,722 >>> mbox cmd response: success
2,686,478 UART:
2,686,494 UART: Running Caliptra FMC ...
2,686,902 UART:
2,687,045 UART: [state] CFI Enabled
2,697,860 UART: [fht] FMC Alias Private Key: 7
2,805,691 UART: [art] Extend RT PCRs Done
2,806,119 UART: [art] Lock RT PCRs Done
2,807,619 UART: [art] Populate DV Done
2,816,090 UART: [fht] FMC Alias Private Key: 7
2,817,266 UART: [art] Derive CDI
2,817,546 UART: [art] Store in in slot 0x4
2,902,921 UART: [art] Derive Key Pair
2,903,281 UART: [art] Store priv key in slot 0x5
2,917,275 UART: [art] Derive Key Pair - Done
2,932,203 UART: [art] Signing Cert with AUTHO
2,932,683 UART: RITY.KEYID = 7
2,948,159 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,924 UART: [art] PUB.X = 007D4AEEA28DF299830827D3763CBA5448B6F22B26707643300F7133A5737753974E659A3F1017D1B2A5EA0C05870FC9
2,955,649 UART: [art] PUB.Y = C6566DD9EB1CBE0C253E4B01B71155CCFC7E1B3D3689187835382B726C7A891AF9F64B5272F1FDB6004028C8C4EE9536
2,962,577 UART: [art] SIG.R = BF045B53CEA687C121646C66716488955D46BA8ECD3D3B7DA91F80F78F2E1ED0B1067B2FF91E4BC849893C38BA00E2B3
2,969,329 UART: [art] SIG.S = F087C344160FE2E8CAF85F618E266C07AD9A341D961564CEAFB558CBB703E2EDBE9BE53AFAB8AC41C4409FC139BB125C
2,993,183 UART: Caliptra RT
2,993,528 UART: [state] CFI Enabled
3,101,644 UART: [rt] RT listening for mailbox commands...
3,102,314 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,536 UART: [rt]cmd =0x44504543, len=28
3,175,546 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,127 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,765 UART: [kat] SHA2-256
881,696 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,811 UART: [kat] ++
885,963 UART: [kat] sha1
890,231 UART: [kat] SHA2-256
892,169 UART: [kat] SHA2-384
894,924 UART: [kat] SHA2-512-ACC
896,825 UART: [kat] ECC-384
902,192 UART: [kat] HMAC-384Kdf
906,850 UART: [kat] LMS
1,475,046 UART: [kat] --
1,475,987 UART: [cold-reset] ++
1,476,459 UART: [fht] Storing FHT @ 0x50003400
1,479,186 UART: [idev] ++
1,479,354 UART: [idev] CDI.KEYID = 6
1,479,714 UART: [idev] SUBJECT.KEYID = 7
1,480,138 UART: [idev] UDS.KEYID = 0
1,480,483 ready_for_fw is high
1,480,483 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,762 UART: [idev] Erasing UDS.KEYID = 0
1,504,656 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,438 UART: [idev] --
1,514,351 UART: [ldev] ++
1,514,519 UART: [ldev] CDI.KEYID = 6
1,514,882 UART: [ldev] SUBJECT.KEYID = 5
1,515,308 UART: [ldev] AUTHORITY.KEYID = 7
1,515,771 UART: [ldev] FE.KEYID = 1
1,521,149 UART: [ldev] Erasing FE.KEYID = 1
1,546,428 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,488 UART: [ldev] --
1,585,969 UART: [fwproc] Waiting for Commands...
1,586,806 UART: [fwproc] Received command 0x46574c44
1,587,597 UART: [fwproc] Received Image of size 114332 bytes
2,884,491 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,353 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,705 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,592 >>> mbox cmd response: success
3,077,708 UART: [afmc] ++
3,077,876 UART: [afmc] CDI.KEYID = 6
3,078,238 UART: [afmc] SUBJECT.KEYID = 7
3,078,663 UART: [afmc] AUTHORITY.KEYID = 5
3,114,262 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,792 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,572 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,300 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,185 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,875 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,710 UART: [afmc] --
3,157,704 UART: [cold-reset] --
3,158,470 UART: [state] Locking Datavault
3,159,821 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,425 UART: [state] Locking ICCM
3,160,947 UART: [exit] Launching FMC @ 0x40000130
3,166,276 UART:
3,166,292 UART: Running Caliptra FMC ...
3,166,700 UART:
3,166,754 UART: [state] CFI Enabled
3,177,561 UART: [fht] FMC Alias Private Key: 7
3,285,818 UART: [art] Extend RT PCRs Done
3,286,246 UART: [art] Lock RT PCRs Done
3,287,858 UART: [art] Populate DV Done
3,296,419 UART: [fht] FMC Alias Private Key: 7
3,297,477 UART: [art] Derive CDI
3,297,757 UART: [art] Store in in slot 0x4
3,383,476 UART: [art] Derive Key Pair
3,383,836 UART: [art] Store priv key in slot 0x5
3,396,868 UART: [art] Derive Key Pair - Done
3,411,156 UART: [art] Signing Cert with AUTHO
3,411,636 UART: RITY.KEYID = 7
3,426,600 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,365 UART: [art] PUB.X = 705440159B7DED72A6A5E7E3D7B52A81DB92D0CA734A5F8F7DB6668CC554BD5B223119954FA955D2898F556AAD78F29A
3,434,143 UART: [art] PUB.Y = 2AD6AF679604936E950AC2E4507C1C60971371A0F7C0932A6A18FF7C89F86E980340DF42EAF8B9AAD00094DF995FB35A
3,441,068 UART: [art] SIG.R = AF682127E05B495B6893B1E50413E549FB37A904D1B6560657DB89F620817B42896CBF5088B230E06DCE52458A3D9CF1
3,447,825 UART: [art] SIG.S = 8A0D35D5B5C7182FA0B2BF9CD0FA9B8D0C2F7D4A7542D8BDCFF5415FEFF40AC38FBB36E0D3A507BB7596C7358CA6D89D
3,471,880 UART: Caliptra RT
3,472,133 UART: [state] CFI Enabled
3,579,723 UART: [rt] RT listening for mailbox commands...
3,580,393 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,317 UART: [rt]cmd =0x44504543, len=20
3,631,051 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,795 ready_for_fw is high
1,362,795 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,962 >>> mbox cmd response: success
2,990,534 UART:
2,990,550 UART: Running Caliptra FMC ...
2,990,958 UART:
2,991,012 UART: [state] CFI Enabled
3,001,679 UART: [fht] FMC Alias Private Key: 7
3,108,886 UART: [art] Extend RT PCRs Done
3,109,314 UART: [art] Lock RT PCRs Done
3,110,892 UART: [art] Populate DV Done
3,119,085 UART: [fht] FMC Alias Private Key: 7
3,120,159 UART: [art] Derive CDI
3,120,439 UART: [art] Store in in slot 0x4
3,205,944 UART: [art] Derive Key Pair
3,206,304 UART: [art] Store priv key in slot 0x5
3,219,974 UART: [art] Derive Key Pair - Done
3,234,813 UART: [art] Signing Cert with AUTHO
3,235,293 UART: RITY.KEYID = 7
3,250,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,028 UART: [art] PUB.X = 5667D359F5AEA89076A4829DA2BE2F452BCC73832272CD0A01F847044939CC253EFC3783170271958AD859AE3C7315A1
3,257,782 UART: [art] PUB.Y = 63AEB191B22D37CF151BF3F3C6753FBAC446A7797E7E520AA26A74F55600DAEAD1F79FAAC25255B45CDB318A36341723
3,264,719 UART: [art] SIG.R = 2BC05A682481A53476143F3208E37929F725AAC08A1382C9C97EEA387DD72F6F08FECE6994113DEE734D3A84EF9AA23A
3,271,489 UART: [art] SIG.S = D8E0D66BB257787B4C93712EA7D623E23CF1E3F05250342A2134BC33427E1F6B489FF551A1F6FD85FEB0C3874FFB60DB
3,295,074 UART: Caliptra RT
3,295,327 UART: [state] CFI Enabled
3,403,720 UART: [rt] RT listening for mailbox commands...
3,404,390 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,414 UART: [rt]cmd =0x44504543, len=20
3,455,558 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,990 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,520 UART: [kat] SHA2-256
882,451 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,566 UART: [kat] ++
886,718 UART: [kat] sha1
890,956 UART: [kat] SHA2-256
892,894 UART: [kat] SHA2-384
895,769 UART: [kat] SHA2-512-ACC
897,670 UART: [kat] ECC-384
903,029 UART: [kat] HMAC-384Kdf
907,697 UART: [kat] LMS
1,475,893 UART: [kat] --
1,476,676 UART: [cold-reset] ++
1,477,058 UART: [fht] Storing FHT @ 0x50003400
1,479,833 UART: [idev] ++
1,480,001 UART: [idev] CDI.KEYID = 6
1,480,361 UART: [idev] SUBJECT.KEYID = 7
1,480,785 UART: [idev] UDS.KEYID = 0
1,481,130 ready_for_fw is high
1,481,130 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,873 UART: [idev] Erasing UDS.KEYID = 0
1,505,471 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,187 UART: [idev] --
1,515,274 UART: [ldev] ++
1,515,442 UART: [ldev] CDI.KEYID = 6
1,515,805 UART: [ldev] SUBJECT.KEYID = 5
1,516,231 UART: [ldev] AUTHORITY.KEYID = 7
1,516,694 UART: [ldev] FE.KEYID = 1
1,522,044 UART: [ldev] Erasing FE.KEYID = 1
1,547,745 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,855 UART: [ldev] --
1,587,344 UART: [fwproc] Waiting for Commands...
1,588,045 UART: [fwproc] Received command 0x46574c44
1,588,836 UART: [fwproc] Received Image of size 114332 bytes
2,886,780 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,160 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,512 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,271 >>> mbox cmd response: success
3,080,473 UART: [afmc] ++
3,080,641 UART: [afmc] CDI.KEYID = 6
3,081,003 UART: [afmc] SUBJECT.KEYID = 7
3,081,428 UART: [afmc] AUTHORITY.KEYID = 5
3,116,761 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,957 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,737 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,465 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,350 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,040 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,835 UART: [afmc] --
3,159,813 UART: [cold-reset] --
3,160,481 UART: [state] Locking Datavault
3,161,350 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,954 UART: [state] Locking ICCM
3,162,570 UART: [exit] Launching FMC @ 0x40000130
3,167,899 UART:
3,167,915 UART: Running Caliptra FMC ...
3,168,323 UART:
3,168,466 UART: [state] CFI Enabled
3,178,999 UART: [fht] FMC Alias Private Key: 7
3,287,760 UART: [art] Extend RT PCRs Done
3,288,188 UART: [art] Lock RT PCRs Done
3,290,054 UART: [art] Populate DV Done
3,298,325 UART: [fht] FMC Alias Private Key: 7
3,299,467 UART: [art] Derive CDI
3,299,747 UART: [art] Store in in slot 0x4
3,385,724 UART: [art] Derive Key Pair
3,386,084 UART: [art] Store priv key in slot 0x5
3,399,316 UART: [art] Derive Key Pair - Done
3,413,937 UART: [art] Signing Cert with AUTHO
3,414,417 UART: RITY.KEYID = 7
3,429,327 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,092 UART: [art] PUB.X = 8483025E74C2BB0E521BF6F64A1C37E5BCAD3AC1EA91311A10A36B3908044B8DFA151BB4CAE1A90FA8F15C4C53B823F8
3,436,863 UART: [art] PUB.Y = DF78B988F48104F59C37F0EE6560B219DE14D31DA3D2221115353A7048EBC0926768044E204174C0E0F2EE74CEC75E9F
3,443,807 UART: [art] SIG.R = 3627781E784BA52254F577237C1923E8FB7DD611CF1926348B2E34AE0525F8EAA3521180DF1F0FB3D393F2AB5B8EE9A1
3,450,575 UART: [art] SIG.S = CB3F2A80735515470E5E52D7C3AF39D71C4095BCD9981DA330C6A63D1BCD8B0E09961905C96E07CF11900E962D8ED4D9
3,474,292 UART: Caliptra RT
3,474,637 UART: [state] CFI Enabled
3,582,452 UART: [rt] RT listening for mailbox commands...
3,583,122 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,380 UART: [rt]cmd =0x44504543, len=20
3,634,066 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,350 ready_for_fw is high
1,362,350 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,062 >>> mbox cmd response: success
2,990,022 UART:
2,990,038 UART: Running Caliptra FMC ...
2,990,446 UART:
2,990,589 UART: [state] CFI Enabled
3,001,580 UART: [fht] FMC Alias Private Key: 7
3,108,611 UART: [art] Extend RT PCRs Done
3,109,039 UART: [art] Lock RT PCRs Done
3,110,425 UART: [art] Populate DV Done
3,118,744 UART: [fht] FMC Alias Private Key: 7
3,119,836 UART: [art] Derive CDI
3,120,116 UART: [art] Store in in slot 0x4
3,205,785 UART: [art] Derive Key Pair
3,206,145 UART: [art] Store priv key in slot 0x5
3,219,877 UART: [art] Derive Key Pair - Done
3,234,574 UART: [art] Signing Cert with AUTHO
3,235,054 UART: RITY.KEYID = 7
3,250,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,483 UART: [art] PUB.X = 5688DCD423E644AD4615CC4286F2ED2915730A0001C84AB176716804735C71893E1AFA1835BAE4788A11A525B062471E
3,258,214 UART: [art] PUB.Y = B0423D5BC245A12F3D98E439AD5EB957761EDA90FF00D66140E2C2E66A9980153D363C1EA581A1EDA5CBDA452DCBBC4A
3,265,160 UART: [art] SIG.R = 98A23276991249A16815AF98D24522C4B3106C51344388228F23FC0A36ECE2DB66C6825374AAC463326F6A137B6EEEC4
3,271,921 UART: [art] SIG.S = D603666710DEFE6BD34436302A4640B50B6186F47DF4F744F368ADA1C001FD47EDE30A489B717FF329FAC334F0D153EC
3,295,638 UART: Caliptra RT
3,295,983 UART: [state] CFI Enabled
3,403,843 UART: [rt] RT listening for mailbox commands...
3,404,513 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,473 UART: [rt]cmd =0x44504543, len=20
3,455,263 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,738 UART: [state] LifecycleState = Unprovisioned
86,393 UART: [state] DebugLocked = No
86,963 UART: [state] WD Timer not started. Device not locked for debugging
88,288 UART: [kat] SHA2-256
893,938 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,063 UART: [kat] ++
898,215 UART: [kat] sha1
902,477 UART: [kat] SHA2-256
904,417 UART: [kat] SHA2-384
907,118 UART: [kat] SHA2-512-ACC
909,019 UART: [kat] ECC-384
918,578 UART: [kat] HMAC-384Kdf
923,130 UART: [kat] LMS
1,171,458 UART: [kat] --
1,172,397 UART: [cold-reset] ++
1,172,767 UART: [fht] FHT @ 0x50003400
1,175,386 UART: [idev] ++
1,175,554 UART: [idev] CDI.KEYID = 6
1,175,914 UART: [idev] SUBJECT.KEYID = 7
1,176,338 UART: [idev] UDS.KEYID = 0
1,176,683 ready_for_fw is high
1,176,683 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,966 UART: [idev] Erasing UDS.KEYID = 0
1,201,291 UART: [idev] Sha1 KeyId Algorithm
1,209,883 UART: [idev] --
1,210,993 UART: [ldev] ++
1,211,161 UART: [ldev] CDI.KEYID = 6
1,211,524 UART: [ldev] SUBJECT.KEYID = 5
1,211,950 UART: [ldev] AUTHORITY.KEYID = 7
1,212,413 UART: [ldev] FE.KEYID = 1
1,217,643 UART: [ldev] Erasing FE.KEYID = 1
1,244,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,313 UART: [ldev] --
1,283,800 UART: [fwproc] Wait for Commands...
1,284,434 UART: [fwproc] Recv command 0x46574c44
1,285,162 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,786 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,090 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,031 >>> mbox cmd response: success
2,776,199 UART: [afmc] ++
2,776,367 UART: [afmc] CDI.KEYID = 6
2,776,729 UART: [afmc] SUBJECT.KEYID = 7
2,777,154 UART: [afmc] AUTHORITY.KEYID = 5
2,812,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,446 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,194 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,922 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,807 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,526 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,466 UART: [afmc] --
2,855,408 UART: [cold-reset] --
2,856,258 UART: [state] Locking Datavault
2,857,327 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,931 UART: [state] Locking ICCM
2,858,591 UART: [exit] Launching FMC @ 0x40000130
2,863,920 UART:
2,863,936 UART: Running Caliptra FMC ...
2,864,344 UART:
2,864,398 UART: [state] CFI Enabled
2,874,361 UART: [fht] FMC Alias Private Key: 7
2,982,262 UART: [art] Extend RT PCRs Done
2,982,690 UART: [art] Lock RT PCRs Done
2,984,204 UART: [art] Populate DV Done
2,992,477 UART: [fht] FMC Alias Private Key: 7
2,993,493 UART: [art] Derive CDI
2,993,773 UART: [art] Store in in slot 0x4
3,079,952 UART: [art] Derive Key Pair
3,080,312 UART: [art] Store priv key in slot 0x5
3,093,504 UART: [art] Derive Key Pair - Done
3,108,509 UART: [art] Signing Cert with AUTHO
3,108,989 UART: RITY.KEYID = 7
3,124,051 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,816 UART: [art] PUB.X = 6CAECD7DB3EE86307F8EF635F10B5AC785A24BED7D7DA449A0ECBDEF1E5BC7B7579DEB5A2182D647DA7C4371F403729B
3,131,606 UART: [art] PUB.Y = FF7004940AB574D9C592D6028D1D5E470E61562B188C9D1EB943C2EB0D442A37CBFA2582507B48E6E4113217FE37C048
3,138,541 UART: [art] SIG.R = ACECCB5AFB82FBCA273020F64572D3698A0D5184A40BCD95BFF0215BF0BA503ACA3D389F1BEDD69915C1ABDFA830C42F
3,145,333 UART: [art] SIG.S = D2450F0060A0B2CFAA9120D59448C8BC2C9AA6C1F8568B6A81B3D7D9BF0B2EB54F941EE481F84C1AD97EB829F940C1EC
3,169,136 UART: Caliptra RT
3,169,389 UART: [state] CFI Enabled
3,277,887 UART: [rt] RT listening for mailbox commands...
3,278,557 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,179 UART: [rt]cmd =0x44504543, len=20
3,328,739 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,607 ready_for_fw is high
1,060,607 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,234 >>> mbox cmd response: success
2,688,842 UART:
2,688,858 UART: Running Caliptra FMC ...
2,689,266 UART:
2,689,320 UART: [state] CFI Enabled
2,699,611 UART: [fht] FMC Alias Private Key: 7
2,807,544 UART: [art] Extend RT PCRs Done
2,807,972 UART: [art] Lock RT PCRs Done
2,809,396 UART: [art] Populate DV Done
2,817,467 UART: [fht] FMC Alias Private Key: 7
2,818,399 UART: [art] Derive CDI
2,818,679 UART: [art] Store in in slot 0x4
2,904,442 UART: [art] Derive Key Pair
2,904,802 UART: [art] Store priv key in slot 0x5
2,918,340 UART: [art] Derive Key Pair - Done
2,933,006 UART: [art] Signing Cert with AUTHO
2,933,486 UART: RITY.KEYID = 7
2,948,594 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,359 UART: [art] PUB.X = 3A423DE47DD99EF82C6379B4CB379FA7A85E325D8815D759C693CECD4915CA8AD05D6213247E6CCCEB71934ED50C9936
2,956,136 UART: [art] PUB.Y = 04863F5F7D7FCF3182D2723C80F4022E494AEDBE4586DB667EBF30BD6A1BEB7B1AF2FFD63C659142472319247F5C4041
2,963,088 UART: [art] SIG.R = 28B7F038E82D12A81B289DA1A53B356821D786E99184BA062873DE68FCEE47AD8AE56EDCB39F7C187AD735F37DA0C3BC
2,969,869 UART: [art] SIG.S = B932F1332BE6A2C341C07D95A6D7B9146633C5AAFB294EAD6FD61A4691B711E4924FDC0D7898F3D3C6E8DDCB6EF6CE9B
2,994,003 UART: Caliptra RT
2,994,256 UART: [state] CFI Enabled
3,102,911 UART: [rt] RT listening for mailbox commands...
3,103,581 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,577 UART: [rt]cmd =0x44504543, len=20
3,154,255 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,931 UART: [state] LifecycleState = Unprovisioned
85,586 UART: [state] DebugLocked = No
86,158 UART: [state] WD Timer not started. Device not locked for debugging
87,439 UART: [kat] SHA2-256
893,089 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,214 UART: [kat] ++
897,366 UART: [kat] sha1
901,512 UART: [kat] SHA2-256
903,452 UART: [kat] SHA2-384
906,161 UART: [kat] SHA2-512-ACC
908,062 UART: [kat] ECC-384
917,665 UART: [kat] HMAC-384Kdf
922,415 UART: [kat] LMS
1,170,743 UART: [kat] --
1,171,672 UART: [cold-reset] ++
1,172,118 UART: [fht] FHT @ 0x50003400
1,174,911 UART: [idev] ++
1,175,079 UART: [idev] CDI.KEYID = 6
1,175,439 UART: [idev] SUBJECT.KEYID = 7
1,175,863 UART: [idev] UDS.KEYID = 0
1,176,208 ready_for_fw is high
1,176,208 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,731 UART: [idev] Erasing UDS.KEYID = 0
1,200,598 UART: [idev] Sha1 KeyId Algorithm
1,209,098 UART: [idev] --
1,210,124 UART: [ldev] ++
1,210,292 UART: [ldev] CDI.KEYID = 6
1,210,655 UART: [ldev] SUBJECT.KEYID = 5
1,211,081 UART: [ldev] AUTHORITY.KEYID = 7
1,211,544 UART: [ldev] FE.KEYID = 1
1,216,726 UART: [ldev] Erasing FE.KEYID = 1
1,242,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,802 UART: [ldev] --
1,282,197 UART: [fwproc] Wait for Commands...
1,282,935 UART: [fwproc] Recv command 0x46574c44
1,283,663 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,736 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,413 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,717 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,608 >>> mbox cmd response: success
2,773,740 UART: [afmc] ++
2,773,908 UART: [afmc] CDI.KEYID = 6
2,774,270 UART: [afmc] SUBJECT.KEYID = 7
2,774,695 UART: [afmc] AUTHORITY.KEYID = 5
2,809,446 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,173 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,921 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,649 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,534 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,253 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,099 UART: [afmc] --
2,853,223 UART: [cold-reset] --
2,854,029 UART: [state] Locking Datavault
2,855,392 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,996 UART: [state] Locking ICCM
2,856,638 UART: [exit] Launching FMC @ 0x40000130
2,861,967 UART:
2,861,983 UART: Running Caliptra FMC ...
2,862,391 UART:
2,862,534 UART: [state] CFI Enabled
2,873,175 UART: [fht] FMC Alias Private Key: 7
2,981,512 UART: [art] Extend RT PCRs Done
2,981,940 UART: [art] Lock RT PCRs Done
2,983,162 UART: [art] Populate DV Done
2,991,233 UART: [fht] FMC Alias Private Key: 7
2,992,271 UART: [art] Derive CDI
2,992,551 UART: [art] Store in in slot 0x4
3,078,388 UART: [art] Derive Key Pair
3,078,748 UART: [art] Store priv key in slot 0x5
3,091,318 UART: [art] Derive Key Pair - Done
3,106,174 UART: [art] Signing Cert with AUTHO
3,106,654 UART: RITY.KEYID = 7
3,121,704 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,469 UART: [art] PUB.X = 4DEC9C9DEF2A67ECEF25EC1C7BEB073E93026C538B9574314DF87DDEDE1CC5299793EE62128CB2F7D55F60202639E357
3,129,247 UART: [art] PUB.Y = 11C8657CDEE9DC7F422DB0EF81904DE3FB5DB81C38F5C428FEB5BF084E7E8D17936EC63BFB979E221C10BF6929B6E930
3,136,212 UART: [art] SIG.R = D45E55A480720C49C9227C04AE2C19F0656B7955833A96060D8F309CD20467780A975125D00B74D37A90502A0DFC1D13
3,142,948 UART: [art] SIG.S = 1A3E6A07EF2C7539C33D8AE94D62B3E30952F2F73AE77FCCCFD5BC93C2457B14405134D7827A8AA491CD61CD450C7BB3
3,167,072 UART: Caliptra RT
3,167,417 UART: [state] CFI Enabled
3,276,374 UART: [rt] RT listening for mailbox commands...
3,277,044 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,884 UART: [rt]cmd =0x44504543, len=20
3,327,672 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,128 ready_for_fw is high
1,060,128 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,113 >>> mbox cmd response: success
2,688,825 UART:
2,688,841 UART: Running Caliptra FMC ...
2,689,249 UART:
2,689,392 UART: [state] CFI Enabled
2,699,949 UART: [fht] FMC Alias Private Key: 7
2,808,692 UART: [art] Extend RT PCRs Done
2,809,120 UART: [art] Lock RT PCRs Done
2,810,704 UART: [art] Populate DV Done
2,819,273 UART: [fht] FMC Alias Private Key: 7
2,820,265 UART: [art] Derive CDI
2,820,545 UART: [art] Store in in slot 0x4
2,906,052 UART: [art] Derive Key Pair
2,906,412 UART: [art] Store priv key in slot 0x5
2,920,324 UART: [art] Derive Key Pair - Done
2,935,124 UART: [art] Signing Cert with AUTHO
2,935,604 UART: RITY.KEYID = 7
2,950,878 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,643 UART: [art] PUB.X = 50A82A9D539DDA0927494850DA006519A3648E60532DBF179F0780DB91F7A9354D63200A4BB64565508C1E95F4DCDCCB
2,958,382 UART: [art] PUB.Y = D8D2DDAD34B2F703914C0F4D0831E2D2F1A1CE243DEFF6E9C4CEE701FEC358D7B25A3561EE207D57BA400E5975B3014B
2,965,332 UART: [art] SIG.R = 3D8D0ECAA1F774B21B1C0B2CFCA66E73803DFFF3FD7B041BCB6F768F91AEA62FA3D37FA45F36BC10507EACFE9B48D0BE
2,972,127 UART: [art] SIG.S = 34AAE41D356E6F3D2DFE4F93B8DA06D6C42E0D008C35DCCF527BF913E7775054C0FA4D000B079A7FA1DA4B3784816235
2,995,716 UART: Caliptra RT
2,996,061 UART: [state] CFI Enabled
3,104,388 UART: [rt] RT listening for mailbox commands...
3,105,058 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,922 UART: [rt]cmd =0x44504543, len=20
3,155,802 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,336 UART: [kat] SHA2-256
890,886 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,015 UART: [kat] ++
895,167 UART: [kat] sha1
899,289 UART: [kat] SHA2-256
901,229 UART: [kat] SHA2-384
903,918 UART: [kat] SHA2-512-ACC
905,819 UART: [kat] ECC-384
915,570 UART: [kat] HMAC-384Kdf
920,268 UART: [kat] LMS
1,168,580 UART: [kat] --
1,169,453 UART: [cold-reset] ++
1,169,963 UART: [fht] FHT @ 0x50003400
1,172,769 UART: [idev] ++
1,172,937 UART: [idev] CDI.KEYID = 6
1,173,298 UART: [idev] SUBJECT.KEYID = 7
1,173,723 UART: [idev] UDS.KEYID = 0
1,174,069 ready_for_fw is high
1,174,069 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,777 UART: [idev] Erasing UDS.KEYID = 0
1,198,817 UART: [idev] Sha1 KeyId Algorithm
1,207,797 UART: [idev] --
1,208,682 UART: [ldev] ++
1,208,850 UART: [ldev] CDI.KEYID = 6
1,209,214 UART: [ldev] SUBJECT.KEYID = 5
1,209,641 UART: [ldev] AUTHORITY.KEYID = 7
1,210,104 UART: [ldev] FE.KEYID = 1
1,215,148 UART: [ldev] Erasing FE.KEYID = 1
1,240,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,732 UART: [ldev] --
1,280,146 UART: [fwproc] Wait for Commands...
1,280,843 UART: [fwproc] Recv command 0x46574c44
1,281,576 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,964 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,273 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,143 >>> mbox cmd response: success
2,772,186 UART: [afmc] ++
2,772,354 UART: [afmc] CDI.KEYID = 6
2,772,717 UART: [afmc] SUBJECT.KEYID = 7
2,773,143 UART: [afmc] AUTHORITY.KEYID = 5
2,808,144 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,418 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,169 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,898 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,781 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,500 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,383 UART: [afmc] --
2,851,399 UART: [cold-reset] --
2,852,339 UART: [state] Locking Datavault
2,853,442 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,046 UART: [state] Locking ICCM
2,854,696 UART: [exit] Launching FMC @ 0x40000130
2,860,025 UART:
2,860,041 UART: Running Caliptra FMC ...
2,860,449 UART:
2,860,503 UART: [state] CFI Enabled
2,870,862 UART: [fht] FMC Alias Private Key: 7
2,978,609 UART: [art] Extend RT PCRs Done
2,979,037 UART: [art] Lock RT PCRs Done
2,980,303 UART: [art] Populate DV Done
2,988,470 UART: [fht] FMC Alias Private Key: 7
2,989,548 UART: [art] Derive CDI
2,989,828 UART: [art] Store in in slot 0x4
3,075,649 UART: [art] Derive Key Pair
3,076,009 UART: [art] Store priv key in slot 0x5
3,089,879 UART: [art] Derive Key Pair - Done
3,104,822 UART: [art] Signing Cert with AUTHO
3,105,302 UART: RITY.KEYID = 7
3,120,452 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,217 UART: [art] PUB.X = D42382FFAC7F17A71E11DA1AD1D5A3647DB1ACE6E0AE040D930F944DB8D153F64834D1A577F56F12CE5AD73209087547
3,127,982 UART: [art] PUB.Y = 0FB6B96C5B4606938D0975E84AD7ED94B9F82B3660E13A7C61BEFF92F4A3D94007EDB07E5F6A73F3493A356E41A0124F
3,134,928 UART: [art] SIG.R = 280477FA50163AB6B21E65B8D725B2D71219B6B0817D9CFFCB8E4249C34BC038715AA010709347296A7BA47530CB652F
3,141,693 UART: [art] SIG.S = C3C575016494A06B2913BB2F8D3FB4BDFD0CAD385149B974D507CA268AC1FBC4E27176AC9512EC74F7426FB883E08B7F
3,165,041 UART: Caliptra RT
3,165,294 UART: [state] CFI Enabled
3,272,037 UART: [rt] RT listening for mailbox commands...
3,272,707 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,747 UART: [rt]cmd =0x44504543, len=20
3,323,493 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,744 ready_for_fw is high
1,055,744 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,021 >>> mbox cmd response: success
2,686,077 UART:
2,686,093 UART: Running Caliptra FMC ...
2,686,501 UART:
2,686,555 UART: [state] CFI Enabled
2,697,266 UART: [fht] FMC Alias Private Key: 7
2,804,585 UART: [art] Extend RT PCRs Done
2,805,013 UART: [art] Lock RT PCRs Done
2,806,439 UART: [art] Populate DV Done
2,814,804 UART: [fht] FMC Alias Private Key: 7
2,815,784 UART: [art] Derive CDI
2,816,064 UART: [art] Store in in slot 0x4
2,901,455 UART: [art] Derive Key Pair
2,901,815 UART: [art] Store priv key in slot 0x5
2,914,521 UART: [art] Derive Key Pair - Done
2,929,053 UART: [art] Signing Cert with AUTHO
2,929,533 UART: RITY.KEYID = 7
2,945,065 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,830 UART: [art] PUB.X = BC46C68A4A0F70B419A6CE4F1AEC3C519386FECABE77E406DDC47A29513E1DB2337FA9B6A1E64EE9570194C336CFE8D1
2,952,611 UART: [art] PUB.Y = ADE10EAF0CAD9B901F4C829EA468A4F2AB184048A7F13C0FF8924B0986BA56996D7D5EE82D3BE28143880681CB94484F
2,959,556 UART: [art] SIG.R = 4C81EECDCC3560A2DB9BBC49884BD2A1C0652E43596472182508E3FC2858333F901A858AE0BE31355CAC1CEF1D312DA8
2,966,333 UART: [art] SIG.S = EB12CBED92E6EF5ABA7ADD45508A2FDA50067FD839DFC43052104A442D7D5A921DE10E71AE095C101CCCB0B4380D234F
2,990,350 UART: Caliptra RT
2,990,603 UART: [state] CFI Enabled
3,097,560 UART: [rt] RT listening for mailbox commands...
3,098,230 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,188 UART: [rt]cmd =0x44504543, len=20
3,148,842 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,761 UART: [kat] SHA2-256
891,311 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,440 UART: [kat] ++
895,592 UART: [kat] sha1
899,972 UART: [kat] SHA2-256
901,912 UART: [kat] SHA2-384
904,657 UART: [kat] SHA2-512-ACC
906,558 UART: [kat] ECC-384
916,337 UART: [kat] HMAC-384Kdf
921,001 UART: [kat] LMS
1,169,313 UART: [kat] --
1,170,482 UART: [cold-reset] ++
1,170,846 UART: [fht] FHT @ 0x50003400
1,173,376 UART: [idev] ++
1,173,544 UART: [idev] CDI.KEYID = 6
1,173,905 UART: [idev] SUBJECT.KEYID = 7
1,174,330 UART: [idev] UDS.KEYID = 0
1,174,676 ready_for_fw is high
1,174,676 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,484 UART: [idev] Erasing UDS.KEYID = 0
1,199,816 UART: [idev] Sha1 KeyId Algorithm
1,208,746 UART: [idev] --
1,209,857 UART: [ldev] ++
1,210,025 UART: [ldev] CDI.KEYID = 6
1,210,389 UART: [ldev] SUBJECT.KEYID = 5
1,210,816 UART: [ldev] AUTHORITY.KEYID = 7
1,211,279 UART: [ldev] FE.KEYID = 1
1,216,409 UART: [ldev] Erasing FE.KEYID = 1
1,243,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,661 UART: [ldev] --
1,282,179 UART: [fwproc] Wait for Commands...
1,282,810 UART: [fwproc] Recv command 0x46574c44
1,283,543 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,327 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,636 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,442 >>> mbox cmd response: success
2,774,521 UART: [afmc] ++
2,774,689 UART: [afmc] CDI.KEYID = 6
2,775,052 UART: [afmc] SUBJECT.KEYID = 7
2,775,478 UART: [afmc] AUTHORITY.KEYID = 5
2,811,431 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,265 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,016 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,745 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,628 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,347 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,402 UART: [afmc] --
2,855,348 UART: [cold-reset] --
2,856,280 UART: [state] Locking Datavault
2,857,711 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,315 UART: [state] Locking ICCM
2,858,815 UART: [exit] Launching FMC @ 0x40000130
2,864,144 UART:
2,864,160 UART: Running Caliptra FMC ...
2,864,568 UART:
2,864,711 UART: [state] CFI Enabled
2,875,370 UART: [fht] FMC Alias Private Key: 7
2,983,425 UART: [art] Extend RT PCRs Done
2,983,853 UART: [art] Lock RT PCRs Done
2,985,341 UART: [art] Populate DV Done
2,993,388 UART: [fht] FMC Alias Private Key: 7
2,994,354 UART: [art] Derive CDI
2,994,634 UART: [art] Store in in slot 0x4
3,080,145 UART: [art] Derive Key Pair
3,080,505 UART: [art] Store priv key in slot 0x5
3,094,195 UART: [art] Derive Key Pair - Done
3,109,137 UART: [art] Signing Cert with AUTHO
3,109,617 UART: RITY.KEYID = 7
3,125,195 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,960 UART: [art] PUB.X = 44439D6D8B4D9D0D824EE15DB46472D1F8ADAEE2DD4B6B3A261C0CC4B48DDB4AE086C6EB1657F568F811CB66DB39C8AA
3,132,748 UART: [art] PUB.Y = EF6DE28655B1B6563EEB6DEFB9531DA259CFC1C2B99E1AA5F65B6A826E195BE0D538465FE4EEBE5A8FF54EB73167CD5A
3,139,724 UART: [art] SIG.R = C0E57C6CEE1E031AB999C98A049CCDD0797E95BB8ABA59738F04C8E2A216202953971F71EC86BF5A5806AD602CAC2838
3,146,492 UART: [art] SIG.S = 7D0AA265F8F103C141E34316AA3CA904D436568499771525A5734B8932DE2DBBBCB0C22119FEFBD5EA6E40B52B259823
3,169,806 UART: Caliptra RT
3,170,151 UART: [state] CFI Enabled
3,278,186 UART: [rt] RT listening for mailbox commands...
3,278,856 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,564 UART: [rt]cmd =0x44504543, len=20
3,329,308 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,147 ready_for_fw is high
1,056,147 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,612 >>> mbox cmd response: success
2,684,682 UART:
2,684,698 UART: Running Caliptra FMC ...
2,685,106 UART:
2,685,249 UART: [state] CFI Enabled
2,695,696 UART: [fht] FMC Alias Private Key: 7
2,803,013 UART: [art] Extend RT PCRs Done
2,803,441 UART: [art] Lock RT PCRs Done
2,804,629 UART: [art] Populate DV Done
2,813,214 UART: [fht] FMC Alias Private Key: 7
2,814,368 UART: [art] Derive CDI
2,814,648 UART: [art] Store in in slot 0x4
2,900,937 UART: [art] Derive Key Pair
2,901,297 UART: [art] Store priv key in slot 0x5
2,914,333 UART: [art] Derive Key Pair - Done
2,929,196 UART: [art] Signing Cert with AUTHO
2,929,676 UART: RITY.KEYID = 7
2,944,588 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,353 UART: [art] PUB.X = 6A5D377EAAF3D0313FB331EF008187731A27FC0101F08F13D3833C3B0B25205283AE138E7189A81F889C6C0333B78AEB
2,952,089 UART: [art] PUB.Y = 9BC74008AD3C1FBD90ECA61461749217347FE76DEBBBB4A1E6D45C4618E5C2D25257E0EBE8C275196A00FAAFBF5D0671
2,959,027 UART: [art] SIG.R = 8867D06A21854F983F8CD2D52C165B119BD3452A6B670CB92EA55360BF55EDA7C4EEB2AFB0A6166469973C617301B230
2,965,793 UART: [art] SIG.S = FA178B198118AC2B0C727212C2AFAB2B18A30A934086D71392FBC7438B59C3B82D2B6AADF2317BB1CC4703CA8C504663
2,989,617 UART: Caliptra RT
2,989,962 UART: [state] CFI Enabled
3,097,292 UART: [rt] RT listening for mailbox commands...
3,097,962 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,850 UART: [rt]cmd =0x44504543, len=20
3,148,684 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,259 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,777 UART: [kat] SHA2-256
881,708 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,823 UART: [kat] ++
885,975 UART: [kat] sha1
890,237 UART: [kat] SHA2-256
892,175 UART: [kat] SHA2-384
894,894 UART: [kat] SHA2-512-ACC
896,795 UART: [kat] ECC-384
902,392 UART: [kat] HMAC-384Kdf
907,102 UART: [kat] LMS
1,475,298 UART: [kat] --
1,476,211 UART: [cold-reset] ++
1,476,741 UART: [fht] Storing FHT @ 0x50003400
1,479,544 UART: [idev] ++
1,479,712 UART: [idev] CDI.KEYID = 6
1,480,072 UART: [idev] SUBJECT.KEYID = 7
1,480,496 UART: [idev] UDS.KEYID = 0
1,480,841 ready_for_fw is high
1,480,841 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,526 UART: [idev] Erasing UDS.KEYID = 0
1,505,254 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,966 UART: [idev] --
1,515,013 UART: [ldev] ++
1,515,181 UART: [ldev] CDI.KEYID = 6
1,515,544 UART: [ldev] SUBJECT.KEYID = 5
1,515,970 UART: [ldev] AUTHORITY.KEYID = 7
1,516,433 UART: [ldev] FE.KEYID = 1
1,521,381 UART: [ldev] Erasing FE.KEYID = 1
1,546,952 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,068 UART: [ldev] --
1,586,389 UART: [fwproc] Waiting for Commands...
1,587,114 UART: [fwproc] Received command 0x46574c44
1,587,905 UART: [fwproc] Received Image of size 114332 bytes
2,886,757 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,445 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,797 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,584 >>> mbox cmd response: success
3,080,846 UART: [afmc] ++
3,081,014 UART: [afmc] CDI.KEYID = 6
3,081,376 UART: [afmc] SUBJECT.KEYID = 7
3,081,801 UART: [afmc] AUTHORITY.KEYID = 5
3,116,536 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,958 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,738 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,466 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,351 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,041 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,810 UART: [afmc] --
3,159,752 UART: [cold-reset] --
3,160,662 UART: [state] Locking Datavault
3,161,635 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,239 UART: [state] Locking ICCM
3,162,753 UART: [exit] Launching FMC @ 0x40000130
3,168,082 UART:
3,168,098 UART: Running Caliptra FMC ...
3,168,506 UART:
3,168,560 UART: [state] CFI Enabled
3,179,215 UART: [fht] FMC Alias Private Key: 7
3,286,858 UART: [art] Extend RT PCRs Done
3,287,286 UART: [art] Lock RT PCRs Done
3,288,778 UART: [art] Populate DV Done
3,297,143 UART: [fht] FMC Alias Private Key: 7
3,298,289 UART: [art] Derive CDI
3,298,569 UART: [art] Store in in slot 0x4
3,384,662 UART: [art] Derive Key Pair
3,385,022 UART: [art] Store priv key in slot 0x5
3,397,904 UART: [art] Derive Key Pair - Done
3,412,581 UART: [art] Signing Cert with AUTHO
3,413,061 UART: RITY.KEYID = 7
3,428,555 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,320 UART: [art] PUB.X = 0373E67F422EDCC61087D4452B10F323E98C3C80C0E7958904CA7A7FA8EE506AD2D3D429FA9EB786AB1187DBA81BBC10
3,436,096 UART: [art] PUB.Y = D618E9DB6EEC804C6B7B08A1F5DE81E2A9B95BE93AD35CD1204C3FB11C0180EC5646C6A1C7F8DF0080C740D58B4ACBDD
3,443,042 UART: [art] SIG.R = 56458752118F1CC5140EA681F9CF5E8964BC802D92CA4B4A85DB3A0F0400197CD925F5132DA49CD3414D67CFE04EB1A6
3,449,787 UART: [art] SIG.S = E699A17B4DD9A4651EDB5EA7AE2BA19DD04FF2E629E3596F60A19F147E3CCC22232B1D3F52B1D7DF9E0A342164047444
3,473,762 UART: Caliptra RT
3,474,015 UART: [state] CFI Enabled
3,581,826 UART: [rt] RT listening for mailbox commands...
3,582,496 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,098 UART: [rt]cmd =0x44504543, len=40
3,638,587 >>> mbox cmd response data (40 bytes)
3,638,588 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,668,143 UART: [rt]cmd =0x44504543, len=40
3,690,960 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,925 ready_for_fw is high
1,361,925 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,020 >>> mbox cmd response: success
2,988,332 UART:
2,988,348 UART: Running Caliptra FMC ...
2,988,756 UART:
2,988,810 UART: [state] CFI Enabled
2,999,367 UART: [fht] FMC Alias Private Key: 7
3,107,090 UART: [art] Extend RT PCRs Done
3,107,518 UART: [art] Lock RT PCRs Done
3,108,782 UART: [art] Populate DV Done
3,116,881 UART: [fht] FMC Alias Private Key: 7
3,118,021 UART: [art] Derive CDI
3,118,301 UART: [art] Store in in slot 0x4
3,204,304 UART: [art] Derive Key Pair
3,204,664 UART: [art] Store priv key in slot 0x5
3,218,212 UART: [art] Derive Key Pair - Done
3,232,983 UART: [art] Signing Cert with AUTHO
3,233,463 UART: RITY.KEYID = 7
3,248,767 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,532 UART: [art] PUB.X = CC445C17D5B2C61FB1B8DD367A808FFA73CC3171D613ECF3D0FC7C19796997F536A8F89D6371193B667465E3AD4CD154
3,256,310 UART: [art] PUB.Y = 20D2F9C116ED3890299711FCAE18E47A3AD3395D416EA0C2B9E46A14F06FCFD7D6772608CA49BA7D399DDF932927DE21
3,263,267 UART: [art] SIG.R = D05C1504CD291F04096D44AEDE3D85137D64935F47F978C794FFFD9D77861CA2B651B0441AD3E0C86E95AC52EC9D92EC
3,270,038 UART: [art] SIG.S = F4B4D186FFB646076E5364E1AE6E57043C630E8D192701C957C6F2FFB49C6A9C6675DF3279176A1005D42E3200D5206F
3,294,140 UART: Caliptra RT
3,294,393 UART: [state] CFI Enabled
3,402,551 UART: [rt] RT listening for mailbox commands...
3,403,221 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,383 UART: [rt]cmd =0x44504543, len=40
3,459,558 >>> mbox cmd response data (40 bytes)
3,459,559 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,489,196 UART: [rt]cmd =0x44504543, len=40
3,511,933 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,784 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,446 UART: [kat] SHA2-256
882,377 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,492 UART: [kat] ++
886,644 UART: [kat] sha1
890,892 UART: [kat] SHA2-256
892,830 UART: [kat] SHA2-384
895,513 UART: [kat] SHA2-512-ACC
897,414 UART: [kat] ECC-384
903,111 UART: [kat] HMAC-384Kdf
907,753 UART: [kat] LMS
1,475,949 UART: [kat] --
1,476,952 UART: [cold-reset] ++
1,477,496 UART: [fht] Storing FHT @ 0x50003400
1,480,259 UART: [idev] ++
1,480,427 UART: [idev] CDI.KEYID = 6
1,480,787 UART: [idev] SUBJECT.KEYID = 7
1,481,211 UART: [idev] UDS.KEYID = 0
1,481,556 ready_for_fw is high
1,481,556 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,463 UART: [idev] Erasing UDS.KEYID = 0
1,506,165 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,771 UART: [idev] --
1,515,938 UART: [ldev] ++
1,516,106 UART: [ldev] CDI.KEYID = 6
1,516,469 UART: [ldev] SUBJECT.KEYID = 5
1,516,895 UART: [ldev] AUTHORITY.KEYID = 7
1,517,358 UART: [ldev] FE.KEYID = 1
1,522,362 UART: [ldev] Erasing FE.KEYID = 1
1,547,955 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,843 UART: [ldev] --
1,587,162 UART: [fwproc] Waiting for Commands...
1,588,023 UART: [fwproc] Received command 0x46574c44
1,588,814 UART: [fwproc] Received Image of size 114332 bytes
2,886,802 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,866 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,218 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,023 >>> mbox cmd response: success
3,080,179 UART: [afmc] ++
3,080,347 UART: [afmc] CDI.KEYID = 6
3,080,709 UART: [afmc] SUBJECT.KEYID = 7
3,081,134 UART: [afmc] AUTHORITY.KEYID = 5
3,116,565 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,863 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,643 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,371 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,256 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,946 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,829 UART: [afmc] --
3,159,723 UART: [cold-reset] --
3,160,301 UART: [state] Locking Datavault
3,161,746 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,350 UART: [state] Locking ICCM
3,163,006 UART: [exit] Launching FMC @ 0x40000130
3,168,335 UART:
3,168,351 UART: Running Caliptra FMC ...
3,168,759 UART:
3,168,902 UART: [state] CFI Enabled
3,179,565 UART: [fht] FMC Alias Private Key: 7
3,287,502 UART: [art] Extend RT PCRs Done
3,287,930 UART: [art] Lock RT PCRs Done
3,289,654 UART: [art] Populate DV Done
3,297,851 UART: [fht] FMC Alias Private Key: 7
3,298,975 UART: [art] Derive CDI
3,299,255 UART: [art] Store in in slot 0x4
3,385,054 UART: [art] Derive Key Pair
3,385,414 UART: [art] Store priv key in slot 0x5
3,398,944 UART: [art] Derive Key Pair - Done
3,413,582 UART: [art] Signing Cert with AUTHO
3,414,062 UART: RITY.KEYID = 7
3,429,168 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,933 UART: [art] PUB.X = 28574A194ED9258C6ABB4AFC2D49FD2D9E1CEE2139631DD0400F2160703E22D52BB3754F577B4755358CCB78B35B8D23
3,436,704 UART: [art] PUB.Y = 4892710542F1B9CB98307D1E0C0EBC02740EC659FDD12262A7CEFCD97885DBB82D17F3B345BEF2439CC03E7C9CBF2C99
3,443,653 UART: [art] SIG.R = B1AADC02F2C557F4196997458FD623588BB4CBA962448C2F6C65893AE4E12C74280CFFCC0A89E3AD03CDD96F3475D56D
3,450,423 UART: [art] SIG.S = 102DE41121EA6AC1713663944B5E1F6DB6C098C42F64D0004C4C7C5045AF3918C387BCC7C5BA9E0BC577DB42C9994734
3,473,977 UART: Caliptra RT
3,474,322 UART: [state] CFI Enabled
3,582,871 UART: [rt] RT listening for mailbox commands...
3,583,541 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,635 UART: [rt]cmd =0x44504543, len=40
3,639,768 >>> mbox cmd response data (40 bytes)
3,639,769 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,669,340 UART: [rt]cmd =0x44504543, len=40
3,692,161 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,174 ready_for_fw is high
1,363,174 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,961 >>> mbox cmd response: success
2,989,199 UART:
2,989,215 UART: Running Caliptra FMC ...
2,989,623 UART:
2,989,766 UART: [state] CFI Enabled
3,000,409 UART: [fht] FMC Alias Private Key: 7
3,108,516 UART: [art] Extend RT PCRs Done
3,108,944 UART: [art] Lock RT PCRs Done
3,110,640 UART: [art] Populate DV Done
3,118,647 UART: [fht] FMC Alias Private Key: 7
3,119,587 UART: [art] Derive CDI
3,119,867 UART: [art] Store in in slot 0x4
3,205,698 UART: [art] Derive Key Pair
3,206,058 UART: [art] Store priv key in slot 0x5
3,219,276 UART: [art] Derive Key Pair - Done
3,234,057 UART: [art] Signing Cert with AUTHO
3,234,537 UART: RITY.KEYID = 7
3,249,965 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,730 UART: [art] PUB.X = EBDCE077003D6A34723562EC70AFFEC892253F28960B53E40E656C05BD66C06E6E014C646BB2F557BBDC8E5244A1E88C
3,257,476 UART: [art] PUB.Y = BC2316CD88074B9012E5B930CEBDD542846C27ED2B6255622F994516A8E272B6C4F9FC9F5BCA2C644A48C380534DACE6
3,264,431 UART: [art] SIG.R = F22D7F891AC2E2A1D70B796B1E9BF5C667C6A2392F17CFECAE137BFFD8538A3FB81319C2794409105B962C3E16DEC147
3,271,207 UART: [art] SIG.S = 41AF93AFAF146FC6B13742D94C4BA0097333482CA9BCB807EADD2DA54E8B0BF34697AB573586A91930DC4BD7D66B0DEE
3,294,794 UART: Caliptra RT
3,295,139 UART: [state] CFI Enabled
3,403,402 UART: [rt] RT listening for mailbox commands...
3,404,072 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,170 UART: [rt]cmd =0x44504543, len=40
3,460,575 >>> mbox cmd response data (40 bytes)
3,460,576 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,490,135 UART: [rt]cmd =0x44504543, len=40
3,513,262 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,087 UART: [state] WD Timer not started. Device not locked for debugging
87,308 UART: [kat] SHA2-256
892,958 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,083 UART: [kat] ++
897,235 UART: [kat] sha1
901,671 UART: [kat] SHA2-256
903,611 UART: [kat] SHA2-384
906,176 UART: [kat] SHA2-512-ACC
908,077 UART: [kat] ECC-384
917,888 UART: [kat] HMAC-384Kdf
922,250 UART: [kat] LMS
1,170,578 UART: [kat] --
1,171,267 UART: [cold-reset] ++
1,171,677 UART: [fht] FHT @ 0x50003400
1,174,502 UART: [idev] ++
1,174,670 UART: [idev] CDI.KEYID = 6
1,175,030 UART: [idev] SUBJECT.KEYID = 7
1,175,454 UART: [idev] UDS.KEYID = 0
1,175,799 ready_for_fw is high
1,175,799 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,766 UART: [idev] Erasing UDS.KEYID = 0
1,200,599 UART: [idev] Sha1 KeyId Algorithm
1,209,017 UART: [idev] --
1,209,991 UART: [ldev] ++
1,210,159 UART: [ldev] CDI.KEYID = 6
1,210,522 UART: [ldev] SUBJECT.KEYID = 5
1,210,948 UART: [ldev] AUTHORITY.KEYID = 7
1,211,411 UART: [ldev] FE.KEYID = 1
1,216,869 UART: [ldev] Erasing FE.KEYID = 1
1,243,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,245 UART: [ldev] --
1,282,636 UART: [fwproc] Wait for Commands...
1,283,460 UART: [fwproc] Recv command 0x46574c44
1,284,188 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,984 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,288 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,033 >>> mbox cmd response: success
2,776,147 UART: [afmc] ++
2,776,315 UART: [afmc] CDI.KEYID = 6
2,776,677 UART: [afmc] SUBJECT.KEYID = 7
2,777,102 UART: [afmc] AUTHORITY.KEYID = 5
2,812,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,244 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,992 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,720 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,605 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,324 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,168 UART: [afmc] --
2,856,092 UART: [cold-reset] --
2,856,620 UART: [state] Locking Datavault
2,857,667 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,271 UART: [state] Locking ICCM
2,858,879 UART: [exit] Launching FMC @ 0x40000130
2,864,208 UART:
2,864,224 UART: Running Caliptra FMC ...
2,864,632 UART:
2,864,686 UART: [state] CFI Enabled
2,875,371 UART: [fht] FMC Alias Private Key: 7
2,982,964 UART: [art] Extend RT PCRs Done
2,983,392 UART: [art] Lock RT PCRs Done
2,985,080 UART: [art] Populate DV Done
2,993,183 UART: [fht] FMC Alias Private Key: 7
2,994,289 UART: [art] Derive CDI
2,994,569 UART: [art] Store in in slot 0x4
3,080,072 UART: [art] Derive Key Pair
3,080,432 UART: [art] Store priv key in slot 0x5
3,093,810 UART: [art] Derive Key Pair - Done
3,108,449 UART: [art] Signing Cert with AUTHO
3,108,929 UART: RITY.KEYID = 7
3,124,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,988 UART: [art] PUB.X = 9B59E4E677639EC8BBEADE35FD0F8BECE5486430D5A2B49AB2A12ECA1A3956FA400954310F915D14BAEE329E47D94DAA
3,131,769 UART: [art] PUB.Y = 12C991CDCBFA053A1B0368B4AA5FE8ABCA9AC59A5C6819F58973A48DBC01685E0E664FA05ACDC1802D65053CC90B4BF7
3,138,721 UART: [art] SIG.R = E343AA5F36CCBEAD9BF76F044F8EE109C11A22F1F5BC6FD84A521A85A2949B543B2976233D5DBC5EB2084184135C3F1D
3,145,496 UART: [art] SIG.S = 2E19BCB2EA073773AD95D07789C40567EFE54963CD90B64F44709C1BF0B8606BAC4421E367EB3C4C4A24460F93D6B430
3,168,530 UART: Caliptra RT
3,168,783 UART: [state] CFI Enabled
3,276,754 UART: [rt] RT listening for mailbox commands...
3,277,424 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,816 UART: [rt]cmd =0x44504543, len=40
3,333,683 >>> mbox cmd response data (40 bytes)
3,333,684 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,481 UART: [rt]cmd =0x44504543, len=40
3,386,718 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,409 ready_for_fw is high
1,060,409 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,486 >>> mbox cmd response: success
2,688,466 UART:
2,688,482 UART: Running Caliptra FMC ...
2,688,890 UART:
2,688,944 UART: [state] CFI Enabled
2,699,421 UART: [fht] FMC Alias Private Key: 7
2,807,460 UART: [art] Extend RT PCRs Done
2,807,888 UART: [art] Lock RT PCRs Done
2,809,434 UART: [art] Populate DV Done
2,817,695 UART: [fht] FMC Alias Private Key: 7
2,818,673 UART: [art] Derive CDI
2,818,953 UART: [art] Store in in slot 0x4
2,904,936 UART: [art] Derive Key Pair
2,905,296 UART: [art] Store priv key in slot 0x5
2,918,474 UART: [art] Derive Key Pair - Done
2,933,547 UART: [art] Signing Cert with AUTHO
2,934,027 UART: RITY.KEYID = 7
2,949,585 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,350 UART: [art] PUB.X = 1A1753D2368D6D0DEEF7A12DA21CCA4C1B98895D104A72471793419BC089B3C3965385A9FE001258B32689CEA0C94526
2,957,093 UART: [art] PUB.Y = 6785EACBAEDC1CD6A4D4BCB32B665D0C1F1BB945FA4EDEE4489AD1BD9F647BC3C661FC635DA6E6BEB5B394CEFE1FA9B1
2,964,080 UART: [art] SIG.R = 38345ECDC12241E623B7CA96970BCF1D4B2744D67CAADFE13F34A4012103A5B6C33B1D747F5D02D690BBA0ACC47AEC72
2,970,854 UART: [art] SIG.S = C64FFB9C2965DEEAA4C1CC2DF20BA6B7C285EF675355A12B1F8BA8EA5E990534B62DB5F2A06971D1D524CB3A239DE416
2,994,731 UART: Caliptra RT
2,994,984 UART: [state] CFI Enabled
3,103,531 UART: [rt] RT listening for mailbox commands...
3,104,201 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,327 UART: [rt]cmd =0x44504543, len=40
3,160,500 >>> mbox cmd response data (40 bytes)
3,160,501 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,882 UART: [rt]cmd =0x44504543, len=40
3,212,787 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Unprovisioned
86,388 UART: [state] DebugLocked = No
87,124 UART: [state] WD Timer not started. Device not locked for debugging
88,245 UART: [kat] SHA2-256
893,895 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,020 UART: [kat] ++
898,172 UART: [kat] sha1
902,416 UART: [kat] SHA2-256
904,356 UART: [kat] SHA2-384
907,171 UART: [kat] SHA2-512-ACC
909,072 UART: [kat] ECC-384
918,607 UART: [kat] HMAC-384Kdf
923,429 UART: [kat] LMS
1,171,757 UART: [kat] --
1,172,804 UART: [cold-reset] ++
1,173,136 UART: [fht] FHT @ 0x50003400
1,175,799 UART: [idev] ++
1,175,967 UART: [idev] CDI.KEYID = 6
1,176,327 UART: [idev] SUBJECT.KEYID = 7
1,176,751 UART: [idev] UDS.KEYID = 0
1,177,096 ready_for_fw is high
1,177,096 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,971 UART: [idev] Erasing UDS.KEYID = 0
1,202,192 UART: [idev] Sha1 KeyId Algorithm
1,210,614 UART: [idev] --
1,211,666 UART: [ldev] ++
1,211,834 UART: [ldev] CDI.KEYID = 6
1,212,197 UART: [ldev] SUBJECT.KEYID = 5
1,212,623 UART: [ldev] AUTHORITY.KEYID = 7
1,213,086 UART: [ldev] FE.KEYID = 1
1,218,422 UART: [ldev] Erasing FE.KEYID = 1
1,245,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,850 UART: [ldev] --
1,284,355 UART: [fwproc] Wait for Commands...
1,285,115 UART: [fwproc] Recv command 0x46574c44
1,285,843 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,551 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,855 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,548 >>> mbox cmd response: success
2,777,630 UART: [afmc] ++
2,777,798 UART: [afmc] CDI.KEYID = 6
2,778,160 UART: [afmc] SUBJECT.KEYID = 7
2,778,585 UART: [afmc] AUTHORITY.KEYID = 5
2,814,476 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,123 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,871 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,599 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,484 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,203 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,103 UART: [afmc] --
2,858,015 UART: [cold-reset] --
2,859,047 UART: [state] Locking Datavault
2,860,416 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,020 UART: [state] Locking ICCM
2,861,622 UART: [exit] Launching FMC @ 0x40000130
2,866,951 UART:
2,866,967 UART: Running Caliptra FMC ...
2,867,375 UART:
2,867,518 UART: [state] CFI Enabled
2,877,857 UART: [fht] FMC Alias Private Key: 7
2,985,478 UART: [art] Extend RT PCRs Done
2,985,906 UART: [art] Lock RT PCRs Done
2,987,220 UART: [art] Populate DV Done
2,995,575 UART: [fht] FMC Alias Private Key: 7
2,996,541 UART: [art] Derive CDI
2,996,821 UART: [art] Store in in slot 0x4
3,082,218 UART: [art] Derive Key Pair
3,082,578 UART: [art] Store priv key in slot 0x5
3,095,858 UART: [art] Derive Key Pair - Done
3,110,498 UART: [art] Signing Cert with AUTHO
3,110,978 UART: RITY.KEYID = 7
3,126,448 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,213 UART: [art] PUB.X = 3957EB0A9E2B50A8D7F495419687730EC92CD483DE051C24508113C6EC74EA2FA1F03D006075CAA91E52A1B91B3235A6
3,133,954 UART: [art] PUB.Y = 7B4A7560E6ED55376590DF6A234A644C118F8C23194B525BF16EB4392F06DDDB5540F97E269255C18ACAC0D97E614299
3,140,901 UART: [art] SIG.R = F2AEE96227467AC299E9E0E942E04BC1B5BEA4D47737C7803EBF97220537496D68CF04C2473CA99C6A655642060BCBE6
3,147,663 UART: [art] SIG.S = 57253CAE5DF9471E2E8A537FB8BF03F051933958CF6DF27E06DED56B05B6BA2A9B9485D7F0F806D8007216010EA6C8ED
3,171,902 UART: Caliptra RT
3,172,247 UART: [state] CFI Enabled
3,279,722 UART: [rt] RT listening for mailbox commands...
3,280,392 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,494 UART: [rt]cmd =0x44504543, len=40
3,336,491 >>> mbox cmd response data (40 bytes)
3,336,492 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,366,053 UART: [rt]cmd =0x44504543, len=40
3,388,308 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,874 ready_for_fw is high
1,059,874 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,525 >>> mbox cmd response: success
2,687,963 UART:
2,687,979 UART: Running Caliptra FMC ...
2,688,387 UART:
2,688,530 UART: [state] CFI Enabled
2,699,045 UART: [fht] FMC Alias Private Key: 7
2,806,788 UART: [art] Extend RT PCRs Done
2,807,216 UART: [art] Lock RT PCRs Done
2,808,836 UART: [art] Populate DV Done
2,816,847 UART: [fht] FMC Alias Private Key: 7
2,818,027 UART: [art] Derive CDI
2,818,307 UART: [art] Store in in slot 0x4
2,904,138 UART: [art] Derive Key Pair
2,904,498 UART: [art] Store priv key in slot 0x5
2,918,186 UART: [art] Derive Key Pair - Done
2,932,714 UART: [art] Signing Cert with AUTHO
2,933,194 UART: RITY.KEYID = 7
2,947,788 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,553 UART: [art] PUB.X = 1377055AE687B73865B07675F1E42F12DC788DBB84488147CFD44D71D0A8B79BBF6AF1F3BA37896843893251F8CABC5F
2,955,324 UART: [art] PUB.Y = A49E8019F155290B030F183CBC3AEE011CE9B741EDD8F5572F3F5AD9F00935AF41B3EB6B9A47F01B62D3DFE1BEA4FE47
2,962,279 UART: [art] SIG.R = 241BCBE656322622D432F6C5FD7C1EE2C3F959F8DF7F34A7E399226CDBF2CD0BD4148CAF03DADEBD065D149460F3E849
2,969,058 UART: [art] SIG.S = 84410785BD9B8DBD9FB1E5C6BE024D337F7701F3377455223084F61F156B16878C41170BD0D21EF74BA3B523B51A44FC
2,993,379 UART: Caliptra RT
2,993,724 UART: [state] CFI Enabled
3,102,331 UART: [rt] RT listening for mailbox commands...
3,103,001 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,115 UART: [rt]cmd =0x44504543, len=40
3,159,082 >>> mbox cmd response data (40 bytes)
3,159,083 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,510 UART: [rt]cmd =0x44504543, len=40
3,211,233 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
891,210 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,339 UART: [kat] ++
895,491 UART: [kat] sha1
899,791 UART: [kat] SHA2-256
901,731 UART: [kat] SHA2-384
904,468 UART: [kat] SHA2-512-ACC
906,369 UART: [kat] ECC-384
915,984 UART: [kat] HMAC-384Kdf
920,400 UART: [kat] LMS
1,168,712 UART: [kat] --
1,169,533 UART: [cold-reset] ++
1,169,903 UART: [fht] FHT @ 0x50003400
1,172,669 UART: [idev] ++
1,172,837 UART: [idev] CDI.KEYID = 6
1,173,198 UART: [idev] SUBJECT.KEYID = 7
1,173,623 UART: [idev] UDS.KEYID = 0
1,173,969 ready_for_fw is high
1,173,969 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,599 UART: [idev] Erasing UDS.KEYID = 0
1,198,475 UART: [idev] Sha1 KeyId Algorithm
1,207,489 UART: [idev] --
1,208,416 UART: [ldev] ++
1,208,584 UART: [ldev] CDI.KEYID = 6
1,208,948 UART: [ldev] SUBJECT.KEYID = 5
1,209,375 UART: [ldev] AUTHORITY.KEYID = 7
1,209,838 UART: [ldev] FE.KEYID = 1
1,214,796 UART: [ldev] Erasing FE.KEYID = 1
1,241,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,660 UART: [ldev] --
1,281,080 UART: [fwproc] Wait for Commands...
1,281,873 UART: [fwproc] Recv command 0x46574c44
1,282,606 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,494 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,803 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,645 >>> mbox cmd response: success
2,773,668 UART: [afmc] ++
2,773,836 UART: [afmc] CDI.KEYID = 6
2,774,199 UART: [afmc] SUBJECT.KEYID = 7
2,774,625 UART: [afmc] AUTHORITY.KEYID = 5
2,810,222 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,556 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,307 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,036 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,919 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,638 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,629 UART: [afmc] --
2,853,541 UART: [cold-reset] --
2,854,391 UART: [state] Locking Datavault
2,855,394 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,998 UART: [state] Locking ICCM
2,856,476 UART: [exit] Launching FMC @ 0x40000130
2,861,805 UART:
2,861,821 UART: Running Caliptra FMC ...
2,862,229 UART:
2,862,283 UART: [state] CFI Enabled
2,872,798 UART: [fht] FMC Alias Private Key: 7
2,981,187 UART: [art] Extend RT PCRs Done
2,981,615 UART: [art] Lock RT PCRs Done
2,983,239 UART: [art] Populate DV Done
2,991,626 UART: [fht] FMC Alias Private Key: 7
2,992,772 UART: [art] Derive CDI
2,993,052 UART: [art] Store in in slot 0x4
3,078,781 UART: [art] Derive Key Pair
3,079,141 UART: [art] Store priv key in slot 0x5
3,092,889 UART: [art] Derive Key Pair - Done
3,107,613 UART: [art] Signing Cert with AUTHO
3,108,093 UART: RITY.KEYID = 7
3,122,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,638 UART: [art] PUB.X = 93D363FC21D42BE80F4220980487B2B409E8C6A8441020F5C3DE2B3FADB487899B09B327B6D0B8D03917A8B1B704C2B5
3,130,395 UART: [art] PUB.Y = 7F556C030AB1B15C7CE8C3E8D3BB5C00DAEED94C7C1316479BFD2FA575B5C140EB87F281A5C8F664A49D4F744ECF5491
3,137,335 UART: [art] SIG.R = 7851EC90397B6D671727F7A77ECA3814BCEF6558FA352A58ED83A01324B89067E5B24548E616CF3234830BC0880029DC
3,144,076 UART: [art] SIG.S = F6CE0A7FCDE22E631836C7DD8575C702B236C1893DA2CCE5E7C7BC1D7B1FEF86B91EE0D3D5BC94B23F22A1BA40186EAC
3,167,907 UART: Caliptra RT
3,168,160 UART: [state] CFI Enabled
3,276,399 UART: [rt] RT listening for mailbox commands...
3,277,069 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,093 UART: [rt]cmd =0x44504543, len=40
3,332,908 >>> mbox cmd response data (40 bytes)
3,332,909 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,394 UART: [rt]cmd =0x44504543, len=40
3,385,109 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,654 ready_for_fw is high
1,056,654 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,133 >>> mbox cmd response: success
2,685,099 UART:
2,685,115 UART: Running Caliptra FMC ...
2,685,523 UART:
2,685,577 UART: [state] CFI Enabled
2,696,054 UART: [fht] FMC Alias Private Key: 7
2,803,837 UART: [art] Extend RT PCRs Done
2,804,265 UART: [art] Lock RT PCRs Done
2,805,755 UART: [art] Populate DV Done
2,813,934 UART: [fht] FMC Alias Private Key: 7
2,815,090 UART: [art] Derive CDI
2,815,370 UART: [art] Store in in slot 0x4
2,900,785 UART: [art] Derive Key Pair
2,901,145 UART: [art] Store priv key in slot 0x5
2,914,633 UART: [art] Derive Key Pair - Done
2,929,554 UART: [art] Signing Cert with AUTHO
2,930,034 UART: RITY.KEYID = 7
2,945,022 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,787 UART: [art] PUB.X = CF5029DA649DD684853FE53FC6B683A135D9E1837DDFC1B2FA65C2006A7A8F54A6234967A2F166ABCCEF7E8DA30897BB
2,952,548 UART: [art] PUB.Y = E517D65ECDFDF47299C4717502C1F988839BF804BD008B43A3F2A273DF472F3AD078C12DFD4736D6D04111028304EDA8
2,959,468 UART: [art] SIG.R = E0EEA9D1FCC5308F8DCF7C0930C4AEE5F493D86108DA67C4BE2AE3F568471AD78D04961614253909F6C232454877A0D7
2,966,232 UART: [art] SIG.S = 80C0CF6B02E90574D18E82A648482D47CABC3E8AEF28B9464C2B1E428433D87069DBBE3A09D9D5E2665D685755E5AB94
2,990,492 UART: Caliptra RT
2,990,745 UART: [state] CFI Enabled
3,097,221 UART: [rt] RT listening for mailbox commands...
3,097,891 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,055 UART: [rt]cmd =0x44504543, len=40
3,153,610 >>> mbox cmd response data (40 bytes)
3,153,611 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,088 UART: [rt]cmd =0x44504543, len=40
3,205,189 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
899,848 UART: [kat] SHA2-256
901,788 UART: [kat] SHA2-384
904,685 UART: [kat] SHA2-512-ACC
906,586 UART: [kat] ECC-384
916,827 UART: [kat] HMAC-384Kdf
921,433 UART: [kat] LMS
1,169,745 UART: [kat] --
1,170,700 UART: [cold-reset] ++
1,171,196 UART: [fht] FHT @ 0x50003400
1,173,924 UART: [idev] ++
1,174,092 UART: [idev] CDI.KEYID = 6
1,174,453 UART: [idev] SUBJECT.KEYID = 7
1,174,878 UART: [idev] UDS.KEYID = 0
1,175,224 ready_for_fw is high
1,175,224 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,706 UART: [idev] Erasing UDS.KEYID = 0
1,199,646 UART: [idev] Sha1 KeyId Algorithm
1,208,542 UART: [idev] --
1,209,745 UART: [ldev] ++
1,209,913 UART: [ldev] CDI.KEYID = 6
1,210,277 UART: [ldev] SUBJECT.KEYID = 5
1,210,704 UART: [ldev] AUTHORITY.KEYID = 7
1,211,167 UART: [ldev] FE.KEYID = 1
1,216,441 UART: [ldev] Erasing FE.KEYID = 1
1,243,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,335 UART: [ldev] --
1,282,773 UART: [fwproc] Wait for Commands...
1,283,492 UART: [fwproc] Recv command 0x46574c44
1,284,225 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,911 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,220 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,084 >>> mbox cmd response: success
2,775,157 UART: [afmc] ++
2,775,325 UART: [afmc] CDI.KEYID = 6
2,775,688 UART: [afmc] SUBJECT.KEYID = 7
2,776,114 UART: [afmc] AUTHORITY.KEYID = 5
2,811,663 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,455 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,206 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,935 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,818 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,537 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,184 UART: [afmc] --
2,855,178 UART: [cold-reset] --
2,856,078 UART: [state] Locking Datavault
2,857,319 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,923 UART: [state] Locking ICCM
2,858,411 UART: [exit] Launching FMC @ 0x40000130
2,863,740 UART:
2,863,756 UART: Running Caliptra FMC ...
2,864,164 UART:
2,864,307 UART: [state] CFI Enabled
2,874,630 UART: [fht] FMC Alias Private Key: 7
2,982,773 UART: [art] Extend RT PCRs Done
2,983,201 UART: [art] Lock RT PCRs Done
2,984,677 UART: [art] Populate DV Done
2,992,844 UART: [fht] FMC Alias Private Key: 7
2,994,012 UART: [art] Derive CDI
2,994,292 UART: [art] Store in in slot 0x4
3,079,805 UART: [art] Derive Key Pair
3,080,165 UART: [art] Store priv key in slot 0x5
3,092,961 UART: [art] Derive Key Pair - Done
3,107,227 UART: [art] Signing Cert with AUTHO
3,107,707 UART: RITY.KEYID = 7
3,122,517 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,282 UART: [art] PUB.X = F53DC693AA5ECCBBA7F687E0964792FB6D2ED5ED3872A52061388C6EB0BF55DF50017638AF1A4F4A4ECFA99F2DA7C2AF
3,130,073 UART: [art] PUB.Y = 9A9E8AB39C5C9091A35CE0AD498591BFC8CA1A835EF5861E65A90EDB91B0753E78388DC2610BE60F4553FD94D2A00765
3,137,019 UART: [art] SIG.R = 70813525F40AA73CA922BFDFF30EB4EE4E1D3014221C24E0EA793D6DE5B99BF11AB8884B9347CF6E14F0C63C3E075FDB
3,143,796 UART: [art] SIG.S = 7E537A65C1CFEEA55942A700A5A6720D34CB45C45E33251073D0C4B2693ACD55A2BC729749C85B552EA6F565AB3C7BC4
3,166,986 UART: Caliptra RT
3,167,331 UART: [state] CFI Enabled
3,274,762 UART: [rt] RT listening for mailbox commands...
3,275,432 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,476 UART: [rt]cmd =0x44504543, len=40
3,332,001 >>> mbox cmd response data (40 bytes)
3,332,002 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,565 UART: [rt]cmd =0x44504543, len=40
3,384,514 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,885 ready_for_fw is high
1,055,885 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,190 >>> mbox cmd response: success
2,683,312 UART:
2,683,328 UART: Running Caliptra FMC ...
2,683,736 UART:
2,683,879 UART: [state] CFI Enabled
2,693,990 UART: [fht] FMC Alias Private Key: 7
2,801,637 UART: [art] Extend RT PCRs Done
2,802,065 UART: [art] Lock RT PCRs Done
2,803,225 UART: [art] Populate DV Done
2,811,294 UART: [fht] FMC Alias Private Key: 7
2,812,302 UART: [art] Derive CDI
2,812,582 UART: [art] Store in in slot 0x4
2,897,971 UART: [art] Derive Key Pair
2,898,331 UART: [art] Store priv key in slot 0x5
2,912,077 UART: [art] Derive Key Pair - Done
2,926,774 UART: [art] Signing Cert with AUTHO
2,927,254 UART: RITY.KEYID = 7
2,942,772 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,537 UART: [art] PUB.X = 9AF6DB6AE6B17430275B43EDA0FDB2E0F292336B7C23EA4500FAD72548108CEF3C15C81509D941322C3F10CB2EBEF948
2,950,294 UART: [art] PUB.Y = 945096E99E4807B20F6F70E93EDE55664EE1EABA780D8670719BAD5C5087532CCCFE405A8D1C5047F31E10679EE373B0
2,957,239 UART: [art] SIG.R = DBD319A64CC4CF4A91E0D178F7E5EB7C94DC3C6FA6DD7D78D18083AC083FF1EC490807468D2DA6BB469B357969877786
2,964,012 UART: [art] SIG.S = 5069F736B30795C107F30F09350D18AC5F652E70BD5CC7853208166436AD826C06331AD0DEA3393D348A66A7627C4F8D
2,987,928 UART: Caliptra RT
2,988,273 UART: [state] CFI Enabled
3,095,548 UART: [rt] RT listening for mailbox commands...
3,096,218 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,354 UART: [rt]cmd =0x44504543, len=40
3,152,261 >>> mbox cmd response data (40 bytes)
3,152,262 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,181,795 UART: [rt]cmd =0x44504543, len=40
3,204,836 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,876 UART: [state] LifecycleState = Unprovisioned
85,531 UART: [state] DebugLocked = No
86,043 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,549 UART: [kat] SHA2-256
881,480 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,595 UART: [kat] ++
885,747 UART: [kat] sha1
889,775 UART: [kat] SHA2-256
891,713 UART: [kat] SHA2-384
894,450 UART: [kat] SHA2-512-ACC
896,351 UART: [kat] ECC-384
901,780 UART: [kat] HMAC-384Kdf
906,500 UART: [kat] LMS
1,474,696 UART: [kat] --
1,475,611 UART: [cold-reset] ++
1,476,129 UART: [fht] Storing FHT @ 0x50003400
1,478,794 UART: [idev] ++
1,478,962 UART: [idev] CDI.KEYID = 6
1,479,322 UART: [idev] SUBJECT.KEYID = 7
1,479,746 UART: [idev] UDS.KEYID = 0
1,480,091 ready_for_fw is high
1,480,091 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,446 UART: [idev] Erasing UDS.KEYID = 0
1,503,618 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,272 UART: [idev] --
1,513,337 UART: [ldev] ++
1,513,505 UART: [ldev] CDI.KEYID = 6
1,513,868 UART: [ldev] SUBJECT.KEYID = 5
1,514,294 UART: [ldev] AUTHORITY.KEYID = 7
1,514,757 UART: [ldev] FE.KEYID = 1
1,520,037 UART: [ldev] Erasing FE.KEYID = 1
1,545,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,946 UART: [ldev] --
1,584,327 UART: [fwproc] Waiting for Commands...
1,585,128 UART: [fwproc] Received command 0x46574c44
1,585,919 UART: [fwproc] Received Image of size 114332 bytes
2,883,917 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,379 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,731 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,075,598 >>> mbox cmd response: success
3,075,598 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,076,678 UART: [afmc] ++
3,076,846 UART: [afmc] CDI.KEYID = 6
3,077,208 UART: [afmc] SUBJECT.KEYID = 7
3,077,633 UART: [afmc] AUTHORITY.KEYID = 5
3,112,788 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,858 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,638 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,366 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,251 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,941 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,878 UART: [afmc] --
3,155,952 UART: [cold-reset] --
3,156,996 UART: [state] Locking Datavault
3,158,009 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,613 UART: [state] Locking ICCM
3,159,047 UART: [exit] Launching FMC @ 0x40000130
3,164,376 UART:
3,164,392 UART: Running Caliptra FMC ...
3,164,800 UART:
3,164,854 UART: [state] CFI Enabled
3,175,309 UART: [fht] FMC Alias Private Key: 7
3,283,444 UART: [art] Extend RT PCRs Done
3,283,872 UART: [art] Lock RT PCRs Done
3,285,722 UART: [art] Populate DV Done
3,293,895 UART: [fht] FMC Alias Private Key: 7
3,294,879 UART: [art] Derive CDI
3,295,159 UART: [art] Store in in slot 0x4
3,380,430 UART: [art] Derive Key Pair
3,380,790 UART: [art] Store priv key in slot 0x5
3,393,174 UART: [art] Derive Key Pair - Done
3,407,768 UART: [art] Signing Cert with AUTHO
3,408,248 UART: RITY.KEYID = 7
3,423,600 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,365 UART: [art] PUB.X = 260BF72EDD0A0B6C9885ADAD04BD7CA2B4E9B8ED3708D8D862FE126D2F6D8AF8CD212005DDEF659E108B05AE49143445
3,431,132 UART: [art] PUB.Y = 0A67911C2F8E3CBB45456ED95E32A9F6F211D4E8B4129DCA6CA3BE29586D25019607845944A202D52F14C54AE107DFE6
3,438,071 UART: [art] SIG.R = 04AADAFB00FF74BBA6A63F64209084C290C84AEB1491EF9B5A2D1B79DA053FFDB325FD59A1EEA5D171FB2043AC5AFCBE
3,444,843 UART: [art] SIG.S = CA28E5E90B2C08AFD180022BDD73AFB8876650BEF18256DEBF85FF2E781C48183A55E968F84C641DBD985962B9D8691C
3,468,953 UART: Caliptra RT
3,469,206 UART: [state] CFI Enabled
3,577,123 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,627 UART: [rt]cmd =0x44504543, len=136
3,672,045 >>> mbox cmd response data (136 bytes)
3,672,046 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,081 UART: [rt]cmd =0x44504543, len=92
3,885,025 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,741 ready_for_fw is high
1,362,741 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,530 >>> mbox cmd response: success
2,928,530 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,989,502 UART:
2,989,518 UART: Running Caliptra FMC ...
2,989,926 UART:
2,989,980 UART: [state] CFI Enabled
3,000,485 UART: [fht] FMC Alias Private Key: 7
3,108,606 UART: [art] Extend RT PCRs Done
3,109,034 UART: [art] Lock RT PCRs Done
3,110,964 UART: [art] Populate DV Done
3,119,219 UART: [fht] FMC Alias Private Key: 7
3,120,323 UART: [art] Derive CDI
3,120,603 UART: [art] Store in in slot 0x4
3,206,126 UART: [art] Derive Key Pair
3,206,486 UART: [art] Store priv key in slot 0x5
3,219,478 UART: [art] Derive Key Pair - Done
3,234,427 UART: [art] Signing Cert with AUTHO
3,234,907 UART: RITY.KEYID = 7
3,249,819 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,584 UART: [art] PUB.X = 17B365080DC46D0DF3BCFBD147B69628836F5175B85E551B37848DE6C58DC0C9D1692A762B1D395C83EFA278E2387B3E
3,257,349 UART: [art] PUB.Y = EFE91B5988F6F599610CE47464D3E655CE942D1DD83A1D28F0395DD11E193888AE024364E7D4CB5C0D6233B09B6E2457
3,264,292 UART: [art] SIG.R = 00ABF16F78C29782D5FC7C88EA2E2AAD6EA989C3D492011E2C71B293CA8FA5479BCEC90926C77BA2827AD1655E855263
3,271,044 UART: [art] SIG.S = FB3CE481036B13F40528059BDFEF9D2CB2E3A55122B97A86138283DEEEE1012F5B557811BF6DCA1517BA62AEAE5913F5
3,294,329 UART: Caliptra RT
3,294,582 UART: [state] CFI Enabled
3,402,418 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,908 UART: [rt]cmd =0x44504543, len=136
3,498,270 >>> mbox cmd response data (136 bytes)
3,498,271 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,400 UART: [rt]cmd =0x44504543, len=92
3,711,882 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,748 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,246 UART: [kat] SHA2-256
882,177 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,292 UART: [kat] ++
886,444 UART: [kat] sha1
890,682 UART: [kat] SHA2-256
892,620 UART: [kat] SHA2-384
895,421 UART: [kat] SHA2-512-ACC
897,322 UART: [kat] ECC-384
903,191 UART: [kat] HMAC-384Kdf
907,797 UART: [kat] LMS
1,475,993 UART: [kat] --
1,476,600 UART: [cold-reset] ++
1,476,946 UART: [fht] Storing FHT @ 0x50003400
1,479,859 UART: [idev] ++
1,480,027 UART: [idev] CDI.KEYID = 6
1,480,387 UART: [idev] SUBJECT.KEYID = 7
1,480,811 UART: [idev] UDS.KEYID = 0
1,481,156 ready_for_fw is high
1,481,156 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,957 UART: [idev] Erasing UDS.KEYID = 0
1,505,749 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,409 UART: [idev] --
1,515,438 UART: [ldev] ++
1,515,606 UART: [ldev] CDI.KEYID = 6
1,515,969 UART: [ldev] SUBJECT.KEYID = 5
1,516,395 UART: [ldev] AUTHORITY.KEYID = 7
1,516,858 UART: [ldev] FE.KEYID = 1
1,521,986 UART: [ldev] Erasing FE.KEYID = 1
1,547,663 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,529 UART: [ldev] --
1,586,948 UART: [fwproc] Waiting for Commands...
1,587,657 UART: [fwproc] Received command 0x46574c44
1,588,448 UART: [fwproc] Received Image of size 114332 bytes
2,885,352 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,476 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,828 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,795 >>> mbox cmd response: success
3,077,795 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,079,039 UART: [afmc] ++
3,079,207 UART: [afmc] CDI.KEYID = 6
3,079,569 UART: [afmc] SUBJECT.KEYID = 7
3,079,994 UART: [afmc] AUTHORITY.KEYID = 5
3,115,145 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,711 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,491 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,219 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,104 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,794 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,695 UART: [afmc] --
3,158,587 UART: [cold-reset] --
3,159,551 UART: [state] Locking Datavault
3,160,840 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,444 UART: [state] Locking ICCM
3,162,118 UART: [exit] Launching FMC @ 0x40000130
3,167,447 UART:
3,167,463 UART: Running Caliptra FMC ...
3,167,871 UART:
3,168,014 UART: [state] CFI Enabled
3,178,779 UART: [fht] FMC Alias Private Key: 7
3,286,810 UART: [art] Extend RT PCRs Done
3,287,238 UART: [art] Lock RT PCRs Done
3,288,512 UART: [art] Populate DV Done
3,296,765 UART: [fht] FMC Alias Private Key: 7
3,297,927 UART: [art] Derive CDI
3,298,207 UART: [art] Store in in slot 0x4
3,383,988 UART: [art] Derive Key Pair
3,384,348 UART: [art] Store priv key in slot 0x5
3,397,824 UART: [art] Derive Key Pair - Done
3,412,111 UART: [art] Signing Cert with AUTHO
3,412,591 UART: RITY.KEYID = 7
3,427,815 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,580 UART: [art] PUB.X = 9652296EB5FFBC567E96DB26D5F14A7BB1AF2D89356E25B75155898FA2538C6D723E274A551448B340166E9FBA4C4426
3,435,350 UART: [art] PUB.Y = CE5B117682B15DD5A0A8D7E23A37A63FE7EF32C857FFF0F9842A0380D263749BC8D3B789D50C14516CD1B513C987BDFA
3,442,306 UART: [art] SIG.R = D7D260A9FF5F2428BA8872392D588DC3A5E3D29681EC39A59BBB8F539680CB38D4517A5309471154A8A472EB4DAD9AA7
3,449,079 UART: [art] SIG.S = 5734AC943AD37773AB8C2637D6EFB9229CF16EB03533D0E5626A1325F67ECCB78032C518FC7C244D786519AE356583AF
3,472,718 UART: Caliptra RT
3,473,063 UART: [state] CFI Enabled
3,581,810 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,390 UART: [rt]cmd =0x44504543, len=136
3,676,886 >>> mbox cmd response data (136 bytes)
3,676,887 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,726 UART: [rt]cmd =0x44504543, len=92
3,889,357 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,728 ready_for_fw is high
1,362,728 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,941 >>> mbox cmd response: success
2,928,941 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,991,485 UART:
2,991,501 UART: Running Caliptra FMC ...
2,991,909 UART:
2,992,052 UART: [state] CFI Enabled
3,002,767 UART: [fht] FMC Alias Private Key: 7
3,110,618 UART: [art] Extend RT PCRs Done
3,111,046 UART: [art] Lock RT PCRs Done
3,112,194 UART: [art] Populate DV Done
3,120,397 UART: [fht] FMC Alias Private Key: 7
3,121,531 UART: [art] Derive CDI
3,121,811 UART: [art] Store in in slot 0x4
3,207,422 UART: [art] Derive Key Pair
3,207,782 UART: [art] Store priv key in slot 0x5
3,221,228 UART: [art] Derive Key Pair - Done
3,236,068 UART: [art] Signing Cert with AUTHO
3,236,548 UART: RITY.KEYID = 7
3,251,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,513 UART: [art] PUB.X = 38C9A703887C860813555522FBA27117A5DF496D3C26597485D1804F5E4FE8E844F6F4036AA148400898550319EEB236
3,259,254 UART: [art] PUB.Y = EB71A7C796E424D822F1761BFF162BF04D3DC60AFB7BF3202B9B0FA2FEF7B86C427CBC70AD2DE378A2DA9FCC43E4BAD2
3,266,228 UART: [art] SIG.R = D70F34F9427BEF08F53CC54A7FC64314065FF812472D9DC2F6A39326B682050BDAE7D5DF64B2AF52B734EE4BE2255ED4
3,272,995 UART: [art] SIG.S = 19AF018EE2043B3CDC094A24986D655CB5940D3460F52B0F409B846A64CDC922F1873460599409CAA2BBCD1CB071FA1A
3,296,258 UART: Caliptra RT
3,296,603 UART: [state] CFI Enabled
3,404,482 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,860 UART: [rt]cmd =0x44504543, len=136
3,499,622 >>> mbox cmd response data (136 bytes)
3,499,623 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,404 UART: [rt]cmd =0x44504543, len=92
3,712,703 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
893,158 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,283 UART: [kat] ++
897,435 UART: [kat] sha1
901,711 UART: [kat] SHA2-256
903,651 UART: [kat] SHA2-384
906,218 UART: [kat] SHA2-512-ACC
908,119 UART: [kat] ECC-384
917,576 UART: [kat] HMAC-384Kdf
922,286 UART: [kat] LMS
1,170,614 UART: [kat] --
1,171,683 UART: [cold-reset] ++
1,172,253 UART: [fht] FHT @ 0x50003400
1,174,834 UART: [idev] ++
1,175,002 UART: [idev] CDI.KEYID = 6
1,175,362 UART: [idev] SUBJECT.KEYID = 7
1,175,786 UART: [idev] UDS.KEYID = 0
1,176,131 ready_for_fw is high
1,176,131 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,734 UART: [idev] Erasing UDS.KEYID = 0
1,200,855 UART: [idev] Sha1 KeyId Algorithm
1,209,361 UART: [idev] --
1,210,653 UART: [ldev] ++
1,210,821 UART: [ldev] CDI.KEYID = 6
1,211,184 UART: [ldev] SUBJECT.KEYID = 5
1,211,610 UART: [ldev] AUTHORITY.KEYID = 7
1,212,073 UART: [ldev] FE.KEYID = 1
1,217,391 UART: [ldev] Erasing FE.KEYID = 1
1,243,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,549 UART: [ldev] --
1,282,968 UART: [fwproc] Wait for Commands...
1,283,550 UART: [fwproc] Recv command 0x46574c44
1,284,278 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,748 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,052 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,839 >>> mbox cmd response: success
2,774,839 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,775,919 UART: [afmc] ++
2,776,087 UART: [afmc] CDI.KEYID = 6
2,776,449 UART: [afmc] SUBJECT.KEYID = 7
2,776,874 UART: [afmc] AUTHORITY.KEYID = 5
2,812,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,334 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,062 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,947 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,666 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,484 UART: [afmc] --
2,855,410 UART: [cold-reset] --
2,856,262 UART: [state] Locking Datavault
2,857,479 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,083 UART: [state] Locking ICCM
2,858,515 UART: [exit] Launching FMC @ 0x40000130
2,863,844 UART:
2,863,860 UART: Running Caliptra FMC ...
2,864,268 UART:
2,864,322 UART: [state] CFI Enabled
2,875,157 UART: [fht] FMC Alias Private Key: 7
2,983,456 UART: [art] Extend RT PCRs Done
2,983,884 UART: [art] Lock RT PCRs Done
2,985,450 UART: [art] Populate DV Done
2,993,689 UART: [fht] FMC Alias Private Key: 7
2,994,791 UART: [art] Derive CDI
2,995,071 UART: [art] Store in in slot 0x4
3,080,934 UART: [art] Derive Key Pair
3,081,294 UART: [art] Store priv key in slot 0x5
3,094,136 UART: [art] Derive Key Pair - Done
3,108,943 UART: [art] Signing Cert with AUTHO
3,109,423 UART: RITY.KEYID = 7
3,125,011 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,776 UART: [art] PUB.X = 6C0D305952ED27B890467B020D7285AF01A0DB43E492D128F1690460F979799C2A5ABCFD59F06E2B75637456C3A672F7
3,132,527 UART: [art] PUB.Y = EE61DE3BAAA671D2A808F8D64221429032AC16D3BC028C3BF8B9B6DF72A6C2A5352CA9B926D7AA2E55E0E201A6376884
3,139,480 UART: [art] SIG.R = 9AD7433DAA1438A2A7A1F0A7BFAC2478DFEA95A8BF2D9933D457EC3C9CDC59624C4BCB97DE771B089324BE05861E3D5D
3,146,264 UART: [art] SIG.S = 92F2B78910C62CC3360F45276E5A2EF4375931024CC4C508ECF9F231866862E7B98332328BE1E61D1ACA4501D0F7E972
3,170,143 UART: Caliptra RT
3,170,396 UART: [state] CFI Enabled
3,277,570 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,904 UART: [rt]cmd =0x44504543, len=136
3,373,110 >>> mbox cmd response data (136 bytes)
3,373,111 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,860 UART: [rt]cmd =0x44504543, len=92
3,587,264 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,241 ready_for_fw is high
1,060,241 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,310 >>> mbox cmd response: success
2,626,310 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,688,058 UART:
2,688,074 UART: Running Caliptra FMC ...
2,688,482 UART:
2,688,536 UART: [state] CFI Enabled
2,699,279 UART: [fht] FMC Alias Private Key: 7
2,807,674 UART: [art] Extend RT PCRs Done
2,808,102 UART: [art] Lock RT PCRs Done
2,809,880 UART: [art] Populate DV Done
2,818,349 UART: [fht] FMC Alias Private Key: 7
2,819,491 UART: [art] Derive CDI
2,819,771 UART: [art] Store in in slot 0x4
2,905,660 UART: [art] Derive Key Pair
2,906,020 UART: [art] Store priv key in slot 0x5
2,919,298 UART: [art] Derive Key Pair - Done
2,934,398 UART: [art] Signing Cert with AUTHO
2,934,878 UART: RITY.KEYID = 7
2,950,100 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,865 UART: [art] PUB.X = BA36F2DACC9FAF701702C5CC1909D11804198921F182DC2552B32091648633E9303CCA0EBC9C8B8CAD41ADBB649950EB
2,957,633 UART: [art] PUB.Y = 5C40874168D6C5821944352F3A488E4B1DD8D5908A0BEF58BCE4B9D3F73B36DA53713358C883304D8F04ED285A063128
2,964,570 UART: [art] SIG.R = 1F75335E4E9FA0E11333DCDA3B0D84B615DB68425AA13AD58FD2780023F5ADBE478CE08F7595704BAFB47B13D654A011
2,971,325 UART: [art] SIG.S = 275951A94811E1B98784A7E7A96386116560CE3FA0ACCFD22993236BFC22BE9A87CB9FF251262454C49EC60C28EF12DE
2,995,319 UART: Caliptra RT
2,995,572 UART: [state] CFI Enabled
3,103,413 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,901 UART: [rt]cmd =0x44504543, len=136
3,198,057 >>> mbox cmd response data (136 bytes)
3,198,058 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,881 UART: [rt]cmd =0x44504543, len=92
3,412,436 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
86,974 UART: [state] WD Timer not started. Device not locked for debugging
88,157 UART: [kat] SHA2-256
893,807 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,932 UART: [kat] ++
898,084 UART: [kat] sha1
902,256 UART: [kat] SHA2-256
904,196 UART: [kat] SHA2-384
907,001 UART: [kat] SHA2-512-ACC
908,902 UART: [kat] ECC-384
918,737 UART: [kat] HMAC-384Kdf
923,259 UART: [kat] LMS
1,171,587 UART: [kat] --
1,172,358 UART: [cold-reset] ++
1,172,758 UART: [fht] FHT @ 0x50003400
1,175,361 UART: [idev] ++
1,175,529 UART: [idev] CDI.KEYID = 6
1,175,889 UART: [idev] SUBJECT.KEYID = 7
1,176,313 UART: [idev] UDS.KEYID = 0
1,176,658 ready_for_fw is high
1,176,658 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,523 UART: [idev] Erasing UDS.KEYID = 0
1,201,906 UART: [idev] Sha1 KeyId Algorithm
1,210,378 UART: [idev] --
1,211,216 UART: [ldev] ++
1,211,384 UART: [ldev] CDI.KEYID = 6
1,211,747 UART: [ldev] SUBJECT.KEYID = 5
1,212,173 UART: [ldev] AUTHORITY.KEYID = 7
1,212,636 UART: [ldev] FE.KEYID = 1
1,217,928 UART: [ldev] Erasing FE.KEYID = 1
1,244,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,366 UART: [ldev] --
1,283,835 UART: [fwproc] Wait for Commands...
1,284,469 UART: [fwproc] Recv command 0x46574c44
1,285,197 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,312 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,453 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,757 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,648 >>> mbox cmd response: success
2,775,648 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,776,888 UART: [afmc] ++
2,777,056 UART: [afmc] CDI.KEYID = 6
2,777,418 UART: [afmc] SUBJECT.KEYID = 7
2,777,843 UART: [afmc] AUTHORITY.KEYID = 5
2,813,208 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,295 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,023 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,908 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,627 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,591 UART: [afmc] --
2,856,721 UART: [cold-reset] --
2,857,553 UART: [state] Locking Datavault
2,858,770 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,374 UART: [state] Locking ICCM
2,860,014 UART: [exit] Launching FMC @ 0x40000130
2,865,343 UART:
2,865,359 UART: Running Caliptra FMC ...
2,865,767 UART:
2,865,910 UART: [state] CFI Enabled
2,876,663 UART: [fht] FMC Alias Private Key: 7
2,984,628 UART: [art] Extend RT PCRs Done
2,985,056 UART: [art] Lock RT PCRs Done
2,986,256 UART: [art] Populate DV Done
2,994,669 UART: [fht] FMC Alias Private Key: 7
2,995,735 UART: [art] Derive CDI
2,996,015 UART: [art] Store in in slot 0x4
3,081,606 UART: [art] Derive Key Pair
3,081,966 UART: [art] Store priv key in slot 0x5
3,094,916 UART: [art] Derive Key Pair - Done
3,109,697 UART: [art] Signing Cert with AUTHO
3,110,177 UART: RITY.KEYID = 7
3,125,515 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,280 UART: [art] PUB.X = D281AADBAAF07A9BA5A9AD5CBFD30F84F00A755249619A686EBF58A91DBE32D6F593D1D11DA68FA122B9034CCF32CEC3
3,133,067 UART: [art] PUB.Y = 61ED8F070F0EFA8E64D5B07838CBB8F15E4F1C0142C7917F98AB808B8A32F9D359C0BED9186C0451BF39FEBEB44D7872
3,140,016 UART: [art] SIG.R = C5B713C6954724FD76C8D693269338CFCB7F512478F311E70B25154F9DE9F1CB0821FA9D2B55CE6E1FD6FDF6B4892D75
3,146,788 UART: [art] SIG.S = 253BA4F2ABA9C7AB925E779D80E07EEF1777210E6BAB1A9DEEDF57EA48820DF92CF50B4B40C7B1CE5D921CD22809ABBB
3,170,427 UART: Caliptra RT
3,170,772 UART: [state] CFI Enabled
3,278,185 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,463 UART: [rt]cmd =0x44504543, len=136
3,373,171 >>> mbox cmd response data (136 bytes)
3,373,172 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,987 UART: [rt]cmd =0x44504543, len=92
3,585,555 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,454 ready_for_fw is high
1,061,454 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,053 >>> mbox cmd response: success
2,628,053 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,690,321 UART:
2,690,337 UART: Running Caliptra FMC ...
2,690,745 UART:
2,690,888 UART: [state] CFI Enabled
2,701,281 UART: [fht] FMC Alias Private Key: 7
2,808,896 UART: [art] Extend RT PCRs Done
2,809,324 UART: [art] Lock RT PCRs Done
2,810,664 UART: [art] Populate DV Done
2,818,587 UART: [fht] FMC Alias Private Key: 7
2,819,759 UART: [art] Derive CDI
2,820,039 UART: [art] Store in in slot 0x4
2,906,050 UART: [art] Derive Key Pair
2,906,410 UART: [art] Store priv key in slot 0x5
2,919,522 UART: [art] Derive Key Pair - Done
2,934,313 UART: [art] Signing Cert with AUTHO
2,934,793 UART: RITY.KEYID = 7
2,949,763 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,528 UART: [art] PUB.X = 7310012F936FA268FA32BA6141411882DEAB75C199FE9D31E1121EC0848B4D0BF61C54BB8072C2B9F50C5B27DB492BE1
2,957,295 UART: [art] PUB.Y = BAD8631DBBDB7A9069DF465D176E4D0E021A3F914E17B3046B129C1F6D832CFCE72EBBB8139EA6A29AC728EFB97F5DD1
2,964,258 UART: [art] SIG.R = 610D40AFF595044B5ECB774255761207080D22AD440B1D145B594DCAC10C9426E1C3066AB88ACA8197197E66F7E69ED5
2,971,004 UART: [art] SIG.S = 785315CEA35CEAF0ED591E2B3BD1BED6D3F637A3629E831814AC36F024A693D443E42D367CB8826E1F949A8B737CF732
2,994,853 UART: Caliptra RT
2,995,198 UART: [state] CFI Enabled
3,103,859 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,201 UART: [rt]cmd =0x44504543, len=136
3,199,309 >>> mbox cmd response data (136 bytes)
3,199,310 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,079 UART: [rt]cmd =0x44504543, len=92
3,413,073 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,578 UART: [state] LifecycleState = Unprovisioned
85,233 UART: [state] DebugLocked = No
85,961 UART: [state] WD Timer not started. Device not locked for debugging
87,308 UART: [kat] SHA2-256
890,858 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,987 UART: [kat] ++
895,139 UART: [kat] sha1
899,489 UART: [kat] SHA2-256
901,429 UART: [kat] SHA2-384
904,248 UART: [kat] SHA2-512-ACC
906,149 UART: [kat] ECC-384
915,670 UART: [kat] HMAC-384Kdf
920,182 UART: [kat] LMS
1,168,494 UART: [kat] --
1,169,493 UART: [cold-reset] ++
1,170,031 UART: [fht] FHT @ 0x50003400
1,172,799 UART: [idev] ++
1,172,967 UART: [idev] CDI.KEYID = 6
1,173,328 UART: [idev] SUBJECT.KEYID = 7
1,173,753 UART: [idev] UDS.KEYID = 0
1,174,099 ready_for_fw is high
1,174,099 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,893 UART: [idev] Erasing UDS.KEYID = 0
1,199,093 UART: [idev] Sha1 KeyId Algorithm
1,207,809 UART: [idev] --
1,208,844 UART: [ldev] ++
1,209,012 UART: [ldev] CDI.KEYID = 6
1,209,376 UART: [ldev] SUBJECT.KEYID = 5
1,209,803 UART: [ldev] AUTHORITY.KEYID = 7
1,210,266 UART: [ldev] FE.KEYID = 1
1,215,366 UART: [ldev] Erasing FE.KEYID = 1
1,242,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,032 UART: [ldev] --
1,281,530 UART: [fwproc] Wait for Commands...
1,282,201 UART: [fwproc] Recv command 0x46574c44
1,282,934 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,822 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,526 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,835 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,691 >>> mbox cmd response: success
2,773,691 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,774,830 UART: [afmc] ++
2,774,998 UART: [afmc] CDI.KEYID = 6
2,775,361 UART: [afmc] SUBJECT.KEYID = 7
2,775,787 UART: [afmc] AUTHORITY.KEYID = 5
2,810,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,248 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,999 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,728 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,611 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,330 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,219 UART: [afmc] --
2,854,327 UART: [cold-reset] --
2,855,239 UART: [state] Locking Datavault
2,856,452 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,056 UART: [state] Locking ICCM
2,857,566 UART: [exit] Launching FMC @ 0x40000130
2,862,895 UART:
2,862,911 UART: Running Caliptra FMC ...
2,863,319 UART:
2,863,373 UART: [state] CFI Enabled
2,874,304 UART: [fht] FMC Alias Private Key: 7
2,982,061 UART: [art] Extend RT PCRs Done
2,982,489 UART: [art] Lock RT PCRs Done
2,983,777 UART: [art] Populate DV Done
2,991,892 UART: [fht] FMC Alias Private Key: 7
2,992,854 UART: [art] Derive CDI
2,993,134 UART: [art] Store in in slot 0x4
3,078,475 UART: [art] Derive Key Pair
3,078,835 UART: [art] Store priv key in slot 0x5
3,092,269 UART: [art] Derive Key Pair - Done
3,106,888 UART: [art] Signing Cert with AUTHO
3,107,368 UART: RITY.KEYID = 7
3,122,542 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,307 UART: [art] PUB.X = 13A211C65426A2EC215CD9D356F8CCA5AB92D1D942D28D8617FA3552C7A3979491C133270EDCA718115BC4EA6F14086B
3,130,075 UART: [art] PUB.Y = D56EC4BB8D5167FF75791445C64082887039A011358B1AABD6A8BB564DB8D1A142F2CCB3ECEE37C3770C07C55ED86504
3,137,024 UART: [art] SIG.R = 509354627AA1076973C3DFE4BD8419298A77E3E99B98EB607AB65938DC23992BD34C46FF94BAA4878C3069A1A206AAE5
3,143,790 UART: [art] SIG.S = B5F018C2BD28AA24CA7AAC737D48C2D6A70982C1DA89E6C98727D8B6EEA7C6209DB6845CD059F5AD679F9CE9D541A0A5
3,167,130 UART: Caliptra RT
3,167,383 UART: [state] CFI Enabled
3,275,598 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,034 UART: [rt]cmd =0x44504543, len=136
3,371,048 >>> mbox cmd response data (136 bytes)
3,371,049 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,924 UART: [rt]cmd =0x44504543, len=92
3,583,211 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,576 ready_for_fw is high
1,055,576 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,109 >>> mbox cmd response: success
2,622,109 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,684,503 UART:
2,684,519 UART: Running Caliptra FMC ...
2,684,927 UART:
2,684,981 UART: [state] CFI Enabled
2,695,586 UART: [fht] FMC Alias Private Key: 7
2,802,829 UART: [art] Extend RT PCRs Done
2,803,257 UART: [art] Lock RT PCRs Done
2,804,827 UART: [art] Populate DV Done
2,812,878 UART: [fht] FMC Alias Private Key: 7
2,813,928 UART: [art] Derive CDI
2,814,208 UART: [art] Store in in slot 0x4
2,899,693 UART: [art] Derive Key Pair
2,900,053 UART: [art] Store priv key in slot 0x5
2,913,015 UART: [art] Derive Key Pair - Done
2,927,923 UART: [art] Signing Cert with AUTHO
2,928,403 UART: RITY.KEYID = 7
2,943,401 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,166 UART: [art] PUB.X = 160097383879CC4B2EF55646CBB1CC46794924B22C619C2A33072535CEF214825E2F5C22D93A0873DAFF487477D50C46
2,950,899 UART: [art] PUB.Y = 708E4E5A2D527D549ED2C1FB2E69FEBBC3797BB7C304D82ECF3669310C871B59B0E58ED72FCAF0590B3BD9084F4691B6
2,957,851 UART: [art] SIG.R = 055A93D64C1A196F8BE1F21983E1DE3453F4234473C640CA4AFAB0EB36A66F19393EF38753BBF61E0CDB4D3515E3D66E
2,964,625 UART: [art] SIG.S = 241627972D6839AEACD6C46BC7C548220BB06221E9CCB1DAE01DEEFF70715B44DD8CFBD846A33CF6DE534937D8812C9C
2,988,237 UART: Caliptra RT
2,988,490 UART: [state] CFI Enabled
3,095,833 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,485 UART: [rt]cmd =0x44504543, len=136
3,190,691 >>> mbox cmd response data (136 bytes)
3,190,692 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,549 UART: [rt]cmd =0x44504543, len=92
3,403,470 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,043 UART: [state] LifecycleState = Unprovisioned
85,698 UART: [state] DebugLocked = No
86,326 UART: [state] WD Timer not started. Device not locked for debugging
87,541 UART: [kat] SHA2-256
891,091 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,220 UART: [kat] ++
895,372 UART: [kat] sha1
899,600 UART: [kat] SHA2-256
901,540 UART: [kat] SHA2-384
904,235 UART: [kat] SHA2-512-ACC
906,136 UART: [kat] ECC-384
915,877 UART: [kat] HMAC-384Kdf
920,591 UART: [kat] LMS
1,168,903 UART: [kat] --
1,169,736 UART: [cold-reset] ++
1,170,104 UART: [fht] FHT @ 0x50003400
1,172,792 UART: [idev] ++
1,172,960 UART: [idev] CDI.KEYID = 6
1,173,321 UART: [idev] SUBJECT.KEYID = 7
1,173,746 UART: [idev] UDS.KEYID = 0
1,174,092 ready_for_fw is high
1,174,092 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,272 UART: [idev] Erasing UDS.KEYID = 0
1,199,170 UART: [idev] Sha1 KeyId Algorithm
1,208,036 UART: [idev] --
1,209,035 UART: [ldev] ++
1,209,203 UART: [ldev] CDI.KEYID = 6
1,209,567 UART: [ldev] SUBJECT.KEYID = 5
1,209,994 UART: [ldev] AUTHORITY.KEYID = 7
1,210,457 UART: [ldev] FE.KEYID = 1
1,215,381 UART: [ldev] Erasing FE.KEYID = 1
1,241,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,111 UART: [ldev] --
1,280,621 UART: [fwproc] Wait for Commands...
1,281,348 UART: [fwproc] Recv command 0x46574c44
1,282,081 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,207 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,244 >>> mbox cmd response: success
2,771,244 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,772,315 UART: [afmc] ++
2,772,483 UART: [afmc] CDI.KEYID = 6
2,772,846 UART: [afmc] SUBJECT.KEYID = 7
2,773,272 UART: [afmc] AUTHORITY.KEYID = 5
2,808,681 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,449 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,200 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,929 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,812 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,531 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,448 UART: [afmc] --
2,852,546 UART: [cold-reset] --
2,853,508 UART: [state] Locking Datavault
2,854,529 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,133 UART: [state] Locking ICCM
2,855,803 UART: [exit] Launching FMC @ 0x40000130
2,861,132 UART:
2,861,148 UART: Running Caliptra FMC ...
2,861,556 UART:
2,861,699 UART: [state] CFI Enabled
2,872,744 UART: [fht] FMC Alias Private Key: 7
2,981,243 UART: [art] Extend RT PCRs Done
2,981,671 UART: [art] Lock RT PCRs Done
2,983,237 UART: [art] Populate DV Done
2,991,422 UART: [fht] FMC Alias Private Key: 7
2,992,532 UART: [art] Derive CDI
2,992,812 UART: [art] Store in in slot 0x4
3,078,561 UART: [art] Derive Key Pair
3,078,921 UART: [art] Store priv key in slot 0x5
3,092,539 UART: [art] Derive Key Pair - Done
3,107,529 UART: [art] Signing Cert with AUTHO
3,108,009 UART: RITY.KEYID = 7
3,123,395 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,160 UART: [art] PUB.X = F737CB7C7BE4462BEA2CF6E4038CC9EBD1107BDCF2A8A8D2E3B1D29B551F8A1A22F2DF915E83C8E21D9AAB49201FBC1F
3,130,955 UART: [art] PUB.Y = AAE7F91138077DB9E2EA2E60CAC2F341157A8341C8CE4E0BCE8EF73BB21B0A30F3D16B6E497DC7180021C953575AD066
3,137,886 UART: [art] SIG.R = D639F7D27E5F4F2CEA6828C0D99341FC30F0056C3BC0C091B47EEAE8E7D68082F687792708B0C70837FAF2A840A3C705
3,144,650 UART: [art] SIG.S = FC6F16B397C0FED0BCBB44BEF0643652D662DF6744FE450A292FD63883B79BA3267BC31E95E683E788E1AA7CC1E84B15
3,167,802 UART: Caliptra RT
3,168,147 UART: [state] CFI Enabled
3,275,653 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,933 UART: [rt]cmd =0x44504543, len=136
3,369,919 >>> mbox cmd response data (136 bytes)
3,369,920 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,875 UART: [rt]cmd =0x44504543, len=92
3,582,407 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,655 ready_for_fw is high
1,055,655 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,016 >>> mbox cmd response: success
2,623,016 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,686,474 UART:
2,686,490 UART: Running Caliptra FMC ...
2,686,898 UART:
2,687,041 UART: [state] CFI Enabled
2,697,880 UART: [fht] FMC Alias Private Key: 7
2,806,511 UART: [art] Extend RT PCRs Done
2,806,939 UART: [art] Lock RT PCRs Done
2,808,435 UART: [art] Populate DV Done
2,816,732 UART: [fht] FMC Alias Private Key: 7
2,817,840 UART: [art] Derive CDI
2,818,120 UART: [art] Store in in slot 0x4
2,903,779 UART: [art] Derive Key Pair
2,904,139 UART: [art] Store priv key in slot 0x5
2,917,069 UART: [art] Derive Key Pair - Done
2,931,844 UART: [art] Signing Cert with AUTHO
2,932,324 UART: RITY.KEYID = 7
2,947,722 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,487 UART: [art] PUB.X = CEF892FCD4A54B1728BCB57F4EEAF5AEC597B6E928342B15EB04CA9D3CCC4FFD89AB882EACECED8230DF8B42C41C70AA
2,955,290 UART: [art] PUB.Y = 826BD07463DF1C6DEE8DE6D2EF2D0B2AD336A2579F7794448B9496DD573E1AF248EAEF9D69FB0CA34D06549B67A82BAA
2,962,249 UART: [art] SIG.R = 1637C5E0CA1567A3E863B4C45B38783DE842AA27C6BB69896C28D5DDE7E9DBB2C7F044A811C0ADF9F98C932633CD595D
2,969,031 UART: [art] SIG.S = EBE36A240F61537FF9D1EAC7F9187FA065DB27687B6A38786AB9BB20766D12E7FCF8DA3F75AC7E469A499294C19128EF
2,992,473 UART: Caliptra RT
2,992,818 UART: [state] CFI Enabled
3,101,007 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,415 UART: [rt]cmd =0x44504543, len=136
3,196,155 >>> mbox cmd response data (136 bytes)
3,196,156 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,061 UART: [rt]cmd =0x44504543, len=92
3,410,113 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,421 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,011 UART: [kat] SHA2-256
881,942 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,057 UART: [kat] ++
886,209 UART: [kat] sha1
890,629 UART: [kat] SHA2-256
892,567 UART: [kat] SHA2-384
895,374 UART: [kat] SHA2-512-ACC
897,275 UART: [kat] ECC-384
902,582 UART: [kat] HMAC-384Kdf
907,268 UART: [kat] LMS
1,475,464 UART: [kat] --
1,476,355 UART: [cold-reset] ++
1,476,693 UART: [fht] Storing FHT @ 0x50003400
1,479,510 UART: [idev] ++
1,479,678 UART: [idev] CDI.KEYID = 6
1,480,038 UART: [idev] SUBJECT.KEYID = 7
1,480,462 UART: [idev] UDS.KEYID = 0
1,480,807 ready_for_fw is high
1,480,807 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,596 UART: [idev] Erasing UDS.KEYID = 0
1,504,940 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,536 UART: [idev] --
1,514,691 UART: [ldev] ++
1,514,859 UART: [ldev] CDI.KEYID = 6
1,515,222 UART: [ldev] SUBJECT.KEYID = 5
1,515,648 UART: [ldev] AUTHORITY.KEYID = 7
1,516,111 UART: [ldev] FE.KEYID = 1
1,521,221 UART: [ldev] Erasing FE.KEYID = 1
1,546,656 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,676 UART: [ldev] --
1,585,967 UART: [fwproc] Waiting for Commands...
1,586,764 UART: [fwproc] Received command 0x46574c44
1,587,555 UART: [fwproc] Received Image of size 114332 bytes
2,885,607 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,679 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,031 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,908 >>> mbox cmd response: success
3,078,988 UART: [afmc] ++
3,079,156 UART: [afmc] CDI.KEYID = 6
3,079,518 UART: [afmc] SUBJECT.KEYID = 7
3,079,943 UART: [afmc] AUTHORITY.KEYID = 5
3,115,116 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,418 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,198 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,926 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,811 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,501 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,472 UART: [afmc] --
3,158,532 UART: [cold-reset] --
3,159,462 UART: [state] Locking Datavault
3,160,399 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,003 UART: [state] Locking ICCM
3,161,477 UART: [exit] Launching FMC @ 0x40000130
3,166,806 UART:
3,166,822 UART: Running Caliptra FMC ...
3,167,230 UART:
3,167,284 UART: [state] CFI Enabled
3,178,001 UART: [fht] FMC Alias Private Key: 7
3,285,712 UART: [art] Extend RT PCRs Done
3,286,140 UART: [art] Lock RT PCRs Done
3,287,682 UART: [art] Populate DV Done
3,296,085 UART: [fht] FMC Alias Private Key: 7
3,297,263 UART: [art] Derive CDI
3,297,543 UART: [art] Store in in slot 0x4
3,383,618 UART: [art] Derive Key Pair
3,383,978 UART: [art] Store priv key in slot 0x5
3,396,504 UART: [art] Derive Key Pair - Done
3,411,688 UART: [art] Signing Cert with AUTHO
3,412,168 UART: RITY.KEYID = 7
3,427,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,385 UART: [art] PUB.X = 444EB387257DD6C2E7A1C98D80F5FAEB88DB345C9EF6EEECC71F89A69057C108BC33906B216C76D2ADC01D5EF7540572
3,435,163 UART: [art] PUB.Y = 804FC225C43D60CE91152F9484080DBB6F02D4CCA297ABF5648D616DE19AA421EF120C1257992DCAF064A4C24FE760A9
3,442,109 UART: [art] SIG.R = E5E44666CF02BBA5F454C12AB4A9CDDCAA38457E5B136AB516845BEF87792399965AABF3D77635FF5C4A3DE72FA4A25C
3,448,894 UART: [art] SIG.S = B87D091AEBB853EDC2418842C096154013313B18F8103D13E5558F851B040C82887AADDCCB316C538E64FE5F39168721
3,472,772 UART: Caliptra RT
3,473,025 UART: [state] CFI Enabled
3,582,123 UART: [rt] RT listening for mailbox commands...
3,582,793 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,297 UART: [rt]cmd =0x4c4d5356, len=1672
4,143,864 >>> mbox cmd response data (8 bytes)
4,143,865 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,184,082 UART: [rt]cmd =0x4c4d5356, len=1672
4,460,447 >>> mbox cmd response data (8 bytes)
4,460,448 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,500,567 UART: [rt]cmd =0x4c4d5356, len=1672
4,776,896 >>> mbox cmd response data (8 bytes)
4,776,897 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,817,166 UART: [rt]cmd =0x4c4d5356, len=1672
5,088,577 >>> mbox cmd response data (8 bytes)
5,088,578 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,128,761 UART: [rt]cmd =0x4c4d5356, len=1672
5,400,304 >>> mbox cmd response data (8 bytes)
5,400,305 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,440,498 UART: [rt]cmd =0x4c4d5356, len=1672
5,714,576 >>> mbox cmd response data (8 bytes)
5,714,577 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,754,658 UART: [rt]cmd =0x4c4d5356, len=1672
6,026,387 >>> mbox cmd response data (8 bytes)
6,026,388 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,066,311 UART: [rt]cmd =0x4c4d5356, len=1672
6,340,239 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,101 ready_for_fw is high
1,362,101 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,340 >>> mbox cmd response: success
2,987,470 UART:
2,987,486 UART: Running Caliptra FMC ...
2,987,894 UART:
2,987,948 UART: [state] CFI Enabled
2,998,509 UART: [fht] FMC Alias Private Key: 7
3,106,764 UART: [art] Extend RT PCRs Done
3,107,192 UART: [art] Lock RT PCRs Done
3,109,024 UART: [art] Populate DV Done
3,117,297 UART: [fht] FMC Alias Private Key: 7
3,118,325 UART: [art] Derive CDI
3,118,605 UART: [art] Store in in slot 0x4
3,204,134 UART: [art] Derive Key Pair
3,204,494 UART: [art] Store priv key in slot 0x5
3,217,034 UART: [art] Derive Key Pair - Done
3,231,901 UART: [art] Signing Cert with AUTHO
3,232,381 UART: RITY.KEYID = 7
3,247,635 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,400 UART: [art] PUB.X = 9067F7CB8BCBD4D752C9D4344D4D326268A0B277E76B0F028045FF010E1BC98F7EF0B2060D4123464C64EF082B0BA26C
3,255,152 UART: [art] PUB.Y = 1DBB62C4E7149E3A3EA4D38D365F6DA4730DC1EC5288BEDF2E426AD3D75C1BE7716DEDCE044B3B2C3269A5BF7637813D
3,262,116 UART: [art] SIG.R = FF98D46BBF26BFB7162C4D2523BB9C9C1C2D25B13EE52EF53EFDB38F827B69E63E716B2DD9534FFDF40E462A3D694E97
3,268,903 UART: [art] SIG.S = 8D6301EDC8C7DD23372FDAE81260B36FF3651F7ECC1798DE820AEB06507417A8729E188BC84F9B2732278BA9891C8682
3,292,435 UART: Caliptra RT
3,292,688 UART: [state] CFI Enabled
3,401,400 UART: [rt] RT listening for mailbox commands...
3,402,070 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,772 UART: [rt]cmd =0x4c4d5356, len=1672
3,963,163 >>> mbox cmd response data (8 bytes)
3,963,164 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,003,443 UART: [rt]cmd =0x4c4d5356, len=1672
4,279,942 >>> mbox cmd response data (8 bytes)
4,279,943 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,320,002 UART: [rt]cmd =0x4c4d5356, len=1672
4,596,487 >>> mbox cmd response data (8 bytes)
4,596,488 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,636,747 UART: [rt]cmd =0x4c4d5356, len=1672
4,908,116 >>> mbox cmd response data (8 bytes)
4,908,117 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,948,254 UART: [rt]cmd =0x4c4d5356, len=1672
5,219,853 >>> mbox cmd response data (8 bytes)
5,219,854 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,260,029 UART: [rt]cmd =0x4c4d5356, len=1672
5,534,341 >>> mbox cmd response data (8 bytes)
5,534,342 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,574,575 UART: [rt]cmd =0x4c4d5356, len=1672
5,845,938 >>> mbox cmd response data (8 bytes)
5,845,939 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,886,062 UART: [rt]cmd =0x4c4d5356, len=1672
6,160,166 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,890 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,566 UART: [kat] SHA2-256
882,497 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,612 UART: [kat] ++
886,764 UART: [kat] sha1
891,128 UART: [kat] SHA2-256
893,066 UART: [kat] SHA2-384
895,679 UART: [kat] SHA2-512-ACC
897,580 UART: [kat] ECC-384
903,329 UART: [kat] HMAC-384Kdf
908,005 UART: [kat] LMS
1,476,201 UART: [kat] --
1,476,966 UART: [cold-reset] ++
1,477,430 UART: [fht] Storing FHT @ 0x50003400
1,480,281 UART: [idev] ++
1,480,449 UART: [idev] CDI.KEYID = 6
1,480,809 UART: [idev] SUBJECT.KEYID = 7
1,481,233 UART: [idev] UDS.KEYID = 0
1,481,578 ready_for_fw is high
1,481,578 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,263 UART: [idev] Erasing UDS.KEYID = 0
1,506,669 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,129 UART: [idev] --
1,516,200 UART: [ldev] ++
1,516,368 UART: [ldev] CDI.KEYID = 6
1,516,731 UART: [ldev] SUBJECT.KEYID = 5
1,517,157 UART: [ldev] AUTHORITY.KEYID = 7
1,517,620 UART: [ldev] FE.KEYID = 1
1,522,846 UART: [ldev] Erasing FE.KEYID = 1
1,548,265 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,063 UART: [ldev] --
1,587,562 UART: [fwproc] Waiting for Commands...
1,588,347 UART: [fwproc] Received command 0x46574c44
1,589,138 UART: [fwproc] Received Image of size 114332 bytes
2,887,604 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,430 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,782 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,591 >>> mbox cmd response: success
3,081,613 UART: [afmc] ++
3,081,781 UART: [afmc] CDI.KEYID = 6
3,082,143 UART: [afmc] SUBJECT.KEYID = 7
3,082,568 UART: [afmc] AUTHORITY.KEYID = 5
3,118,347 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,621 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,401 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,129 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,014 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,704 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,413 UART: [afmc] --
3,161,397 UART: [cold-reset] --
3,162,197 UART: [state] Locking Datavault
3,163,564 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,168 UART: [state] Locking ICCM
3,164,658 UART: [exit] Launching FMC @ 0x40000130
3,169,987 UART:
3,170,003 UART: Running Caliptra FMC ...
3,170,411 UART:
3,170,554 UART: [state] CFI Enabled
3,181,229 UART: [fht] FMC Alias Private Key: 7
3,289,074 UART: [art] Extend RT PCRs Done
3,289,502 UART: [art] Lock RT PCRs Done
3,291,008 UART: [art] Populate DV Done
3,299,437 UART: [fht] FMC Alias Private Key: 7
3,300,475 UART: [art] Derive CDI
3,300,755 UART: [art] Store in in slot 0x4
3,386,602 UART: [art] Derive Key Pair
3,386,962 UART: [art] Store priv key in slot 0x5
3,401,136 UART: [art] Derive Key Pair - Done
3,415,945 UART: [art] Signing Cert with AUTHO
3,416,425 UART: RITY.KEYID = 7
3,431,687 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,452 UART: [art] PUB.X = 3F8DC5D7025B5B75900AB095757F0ED971ED495FBD62A04CC99BCE553B8922381C1B814BC41288BF4EAFE839C4411E98
3,439,221 UART: [art] PUB.Y = 4F933498843E3DB2345E394659B5322A01EF57CE8864AF965EB0DEDA784A801B9DF1784CDB51D4B2F3E24575BAAEC058
3,446,176 UART: [art] SIG.R = 8E644AE1261CD57E848863514372A4FBDE42D227C78A0CF4EBA317B77E09CB09041769646A53DAFACA1864F9EDE2FDBA
3,452,948 UART: [art] SIG.S = 6765D40356C8A0C1E7DEC4351F37559440C612C73E84EFCF2E40E0DE9A4FEFBA86D6863FBF82EA0FE9EB612F48EAFA4D
3,477,287 UART: Caliptra RT
3,477,632 UART: [state] CFI Enabled
3,587,029 UART: [rt] RT listening for mailbox commands...
3,587,699 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,365 UART: [rt]cmd =0x4c4d5356, len=1672
4,148,524 >>> mbox cmd response data (8 bytes)
4,148,525 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,188,864 UART: [rt]cmd =0x4c4d5356, len=1672
4,465,563 >>> mbox cmd response data (8 bytes)
4,465,564 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,505,849 UART: [rt]cmd =0x4c4d5356, len=1672
4,782,420 >>> mbox cmd response data (8 bytes)
4,782,421 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,822,880 UART: [rt]cmd =0x4c4d5356, len=1672
5,094,425 >>> mbox cmd response data (8 bytes)
5,094,426 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,134,371 UART: [rt]cmd =0x4c4d5356, len=1672
5,405,948 >>> mbox cmd response data (8 bytes)
5,405,949 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,446,338 UART: [rt]cmd =0x4c4d5356, len=1672
5,720,056 >>> mbox cmd response data (8 bytes)
5,720,057 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,760,128 UART: [rt]cmd =0x4c4d5356, len=1672
6,031,783 >>> mbox cmd response data (8 bytes)
6,031,784 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,071,817 UART: [rt]cmd =0x4c4d5356, len=1672
6,345,997 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,382 ready_for_fw is high
1,363,382 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,885 >>> mbox cmd response: success
2,990,711 UART:
2,990,727 UART: Running Caliptra FMC ...
2,991,135 UART:
2,991,278 UART: [state] CFI Enabled
3,002,097 UART: [fht] FMC Alias Private Key: 7
3,110,460 UART: [art] Extend RT PCRs Done
3,110,888 UART: [art] Lock RT PCRs Done
3,112,474 UART: [art] Populate DV Done
3,120,819 UART: [fht] FMC Alias Private Key: 7
3,121,885 UART: [art] Derive CDI
3,122,165 UART: [art] Store in in slot 0x4
3,207,860 UART: [art] Derive Key Pair
3,208,220 UART: [art] Store priv key in slot 0x5
3,221,374 UART: [art] Derive Key Pair - Done
3,235,834 UART: [art] Signing Cert with AUTHO
3,236,314 UART: RITY.KEYID = 7
3,251,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,009 UART: [art] PUB.X = 17F956B586496C7C984A11FF2CFE887C5F7FC10BB4976ED6F6FDBD4C837D1793A0150E7103A890B10CCB0E8F0544CFC8
3,258,773 UART: [art] PUB.Y = 5C91B132449B30F7F199F925C1E162FC81B9EBD952143DA851F56F61F77508B0222A6E481FAEBE7C81D85364004A58C0
3,265,698 UART: [art] SIG.R = D87A6E471413180CCF55624996F8454B37F8A0B50B3A626E28D403F3EC42C4E6959475E2022CCE3F22DA43B18A3291FF
3,272,456 UART: [art] SIG.S = 99807E971A756C8974AD21F0F340543760D7BA9C863EAE7FE17E1AE6B43372AC3D30C43FEEF9FF019151A567E1354495
3,296,346 UART: Caliptra RT
3,296,691 UART: [state] CFI Enabled
3,404,251 UART: [rt] RT listening for mailbox commands...
3,404,921 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,299 UART: [rt]cmd =0x4c4d5356, len=1672
3,965,654 >>> mbox cmd response data (8 bytes)
3,965,655 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,005,798 UART: [rt]cmd =0x4c4d5356, len=1672
4,282,371 >>> mbox cmd response data (8 bytes)
4,282,372 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,322,547 UART: [rt]cmd =0x4c4d5356, len=1672
4,598,994 >>> mbox cmd response data (8 bytes)
4,598,995 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,639,166 UART: [rt]cmd =0x4c4d5356, len=1672
4,910,889 >>> mbox cmd response data (8 bytes)
4,910,890 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,951,159 UART: [rt]cmd =0x4c4d5356, len=1672
5,222,742 >>> mbox cmd response data (8 bytes)
5,222,743 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,262,964 UART: [rt]cmd =0x4c4d5356, len=1672
5,536,884 >>> mbox cmd response data (8 bytes)
5,536,885 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,577,028 UART: [rt]cmd =0x4c4d5356, len=1672
5,848,627 >>> mbox cmd response data (8 bytes)
5,848,628 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,888,979 UART: [rt]cmd =0x4c4d5356, len=1672
6,163,171 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,750 UART: [state] LifecycleState = Unprovisioned
86,405 UART: [state] DebugLocked = No
86,915 UART: [state] WD Timer not started. Device not locked for debugging
88,068 UART: [kat] SHA2-256
893,718 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,843 UART: [kat] ++
897,995 UART: [kat] sha1
902,333 UART: [kat] SHA2-256
904,273 UART: [kat] SHA2-384
907,068 UART: [kat] SHA2-512-ACC
908,969 UART: [kat] ECC-384
918,662 UART: [kat] HMAC-384Kdf
923,234 UART: [kat] LMS
1,171,562 UART: [kat] --
1,172,389 UART: [cold-reset] ++
1,172,747 UART: [fht] FHT @ 0x50003400
1,175,284 UART: [idev] ++
1,175,452 UART: [idev] CDI.KEYID = 6
1,175,812 UART: [idev] SUBJECT.KEYID = 7
1,176,236 UART: [idev] UDS.KEYID = 0
1,176,581 ready_for_fw is high
1,176,581 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,418 UART: [idev] Erasing UDS.KEYID = 0
1,201,495 UART: [idev] Sha1 KeyId Algorithm
1,209,929 UART: [idev] --
1,210,881 UART: [ldev] ++
1,211,049 UART: [ldev] CDI.KEYID = 6
1,211,412 UART: [ldev] SUBJECT.KEYID = 5
1,211,838 UART: [ldev] AUTHORITY.KEYID = 7
1,212,301 UART: [ldev] FE.KEYID = 1
1,217,267 UART: [ldev] Erasing FE.KEYID = 1
1,243,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,321 UART: [ldev] --
1,282,648 UART: [fwproc] Wait for Commands...
1,283,436 UART: [fwproc] Recv command 0x46574c44
1,284,164 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,461 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,316 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,620 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,323 >>> mbox cmd response: success
2,775,499 UART: [afmc] ++
2,775,667 UART: [afmc] CDI.KEYID = 6
2,776,029 UART: [afmc] SUBJECT.KEYID = 7
2,776,454 UART: [afmc] AUTHORITY.KEYID = 5
2,811,637 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,170 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,918 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,646 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,531 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,250 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,148 UART: [afmc] --
2,855,054 UART: [cold-reset] --
2,855,800 UART: [state] Locking Datavault
2,856,989 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,593 UART: [state] Locking ICCM
2,858,077 UART: [exit] Launching FMC @ 0x40000130
2,863,406 UART:
2,863,422 UART: Running Caliptra FMC ...
2,863,830 UART:
2,863,884 UART: [state] CFI Enabled
2,874,583 UART: [fht] FMC Alias Private Key: 7
2,982,698 UART: [art] Extend RT PCRs Done
2,983,126 UART: [art] Lock RT PCRs Done
2,984,676 UART: [art] Populate DV Done
2,992,923 UART: [fht] FMC Alias Private Key: 7
2,993,933 UART: [art] Derive CDI
2,994,213 UART: [art] Store in in slot 0x4
3,079,750 UART: [art] Derive Key Pair
3,080,110 UART: [art] Store priv key in slot 0x5
3,093,634 UART: [art] Derive Key Pair - Done
3,108,353 UART: [art] Signing Cert with AUTHO
3,108,833 UART: RITY.KEYID = 7
3,123,717 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,482 UART: [art] PUB.X = C0988B08AEF91F09AA19BB6D80873FEECC2878D77CDDC510895DC0B3AF5C10113086594359132516F314D4CDA8128129
3,131,248 UART: [art] PUB.Y = 6FA1A3DC0EF766D9AD478D9E2457A5BDA123CFC0AAE2DF8E67308A463AB68D3023D67BC7BFB150D5E7F78E1A694C64DF
3,138,219 UART: [art] SIG.R = BD4E09D714846BE6C8174542FEC241F51C5DF8CACCBB4EC28E088F8B1A0F00D66202FBEFC7DBDCAEC6841DDB27A4B96F
3,144,985 UART: [art] SIG.S = 4007463D62C23661D4C9DD87B43BE81047A680B88A64C3352C96826CE8CAEEE1BE4188B83F7AEEF1BADD6579EF7FB2DA
3,168,721 UART: Caliptra RT
3,168,974 UART: [state] CFI Enabled
3,276,359 UART: [rt] RT listening for mailbox commands...
3,277,029 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,405 UART: [rt]cmd =0x4c4d5356, len=1672
3,837,916 >>> mbox cmd response data (8 bytes)
3,837,917 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,100 UART: [rt]cmd =0x4c4d5356, len=1672
4,154,793 >>> mbox cmd response data (8 bytes)
4,154,794 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,194,919 UART: [rt]cmd =0x4c4d5356, len=1672
4,471,624 >>> mbox cmd response data (8 bytes)
4,471,625 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,511,906 UART: [rt]cmd =0x4c4d5356, len=1672
4,783,509 >>> mbox cmd response data (8 bytes)
4,783,510 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,823,549 UART: [rt]cmd =0x4c4d5356, len=1672
5,095,142 >>> mbox cmd response data (8 bytes)
5,095,143 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,135,398 UART: [rt]cmd =0x4c4d5356, len=1672
5,409,590 >>> mbox cmd response data (8 bytes)
5,409,591 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,449,862 UART: [rt]cmd =0x4c4d5356, len=1672
5,721,425 >>> mbox cmd response data (8 bytes)
5,721,426 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,761,649 UART: [rt]cmd =0x4c4d5356, len=1672
6,035,869 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,513 ready_for_fw is high
1,060,513 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,122 >>> mbox cmd response: success
2,689,190 UART:
2,689,206 UART: Running Caliptra FMC ...
2,689,614 UART:
2,689,668 UART: [state] CFI Enabled
2,699,843 UART: [fht] FMC Alias Private Key: 7
2,807,412 UART: [art] Extend RT PCRs Done
2,807,840 UART: [art] Lock RT PCRs Done
2,809,278 UART: [art] Populate DV Done
2,817,547 UART: [fht] FMC Alias Private Key: 7
2,818,677 UART: [art] Derive CDI
2,818,957 UART: [art] Store in in slot 0x4
2,904,456 UART: [art] Derive Key Pair
2,904,816 UART: [art] Store priv key in slot 0x5
2,918,050 UART: [art] Derive Key Pair - Done
2,932,569 UART: [art] Signing Cert with AUTHO
2,933,049 UART: RITY.KEYID = 7
2,948,113 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,878 UART: [art] PUB.X = 6AD512B5E741C0A66EEB7E4CE69E70F2897F60CFA8BFE258520E61D921E5D32D997604251BF75CCC004D8A1C7549FAF5
2,955,632 UART: [art] PUB.Y = E5DD59D2D866F7FDD23886B3DC6AB49E2502DB30E3E2CD6093961AD987A4D490A43ABB2C35E1BB883EEAF5F4BDB57178
2,962,599 UART: [art] SIG.R = A47889FD64E0A10E0411DE6615CE99AC0159B60EBB82DED5F3A6E542989AA37D46215AB01585F2D7B3EB1AF9B1A9A62B
2,969,371 UART: [art] SIG.S = D8DA1DA84E8527F39AE2143ACF782EF4F9298DC1C0D4236179478165B6896FAF92B29EF80F3E3F1957B586F4053A3B9C
2,993,048 UART: Caliptra RT
2,993,301 UART: [state] CFI Enabled
3,102,253 UART: [rt] RT listening for mailbox commands...
3,102,923 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,489 UART: [rt]cmd =0x4c4d5356, len=1672
3,663,876 >>> mbox cmd response data (8 bytes)
3,663,877 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,190 UART: [rt]cmd =0x4c4d5356, len=1672
3,980,441 >>> mbox cmd response data (8 bytes)
3,980,442 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,020,571 UART: [rt]cmd =0x4c4d5356, len=1672
4,297,102 >>> mbox cmd response data (8 bytes)
4,297,103 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,337,468 UART: [rt]cmd =0x4c4d5356, len=1672
4,608,895 >>> mbox cmd response data (8 bytes)
4,608,896 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,649,073 UART: [rt]cmd =0x4c4d5356, len=1672
4,920,584 >>> mbox cmd response data (8 bytes)
4,920,585 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,960,920 UART: [rt]cmd =0x4c4d5356, len=1672
5,235,100 >>> mbox cmd response data (8 bytes)
5,235,101 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,275,362 UART: [rt]cmd =0x4c4d5356, len=1672
5,546,925 >>> mbox cmd response data (8 bytes)
5,546,926 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,587,077 UART: [rt]cmd =0x4c4d5356, len=1672
5,861,057 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,948 UART: [state] WD Timer not started. Device not locked for debugging
88,223 UART: [kat] SHA2-256
893,873 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,998 UART: [kat] ++
898,150 UART: [kat] sha1
902,220 UART: [kat] SHA2-256
904,160 UART: [kat] SHA2-384
906,939 UART: [kat] SHA2-512-ACC
908,840 UART: [kat] ECC-384
918,685 UART: [kat] HMAC-384Kdf
923,215 UART: [kat] LMS
1,171,543 UART: [kat] --
1,172,516 UART: [cold-reset] ++
1,172,906 UART: [fht] FHT @ 0x50003400
1,175,479 UART: [idev] ++
1,175,647 UART: [idev] CDI.KEYID = 6
1,176,007 UART: [idev] SUBJECT.KEYID = 7
1,176,431 UART: [idev] UDS.KEYID = 0
1,176,776 ready_for_fw is high
1,176,776 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,883 UART: [idev] Erasing UDS.KEYID = 0
1,201,708 UART: [idev] Sha1 KeyId Algorithm
1,210,336 UART: [idev] --
1,211,272 UART: [ldev] ++
1,211,440 UART: [ldev] CDI.KEYID = 6
1,211,803 UART: [ldev] SUBJECT.KEYID = 5
1,212,229 UART: [ldev] AUTHORITY.KEYID = 7
1,212,692 UART: [ldev] FE.KEYID = 1
1,217,946 UART: [ldev] Erasing FE.KEYID = 1
1,244,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,946 UART: [ldev] --
1,284,253 UART: [fwproc] Wait for Commands...
1,284,947 UART: [fwproc] Recv command 0x46574c44
1,285,675 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,225 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,529 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,286 >>> mbox cmd response: success
2,776,390 UART: [afmc] ++
2,776,558 UART: [afmc] CDI.KEYID = 6
2,776,920 UART: [afmc] SUBJECT.KEYID = 7
2,777,345 UART: [afmc] AUTHORITY.KEYID = 5
2,813,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,567 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,315 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,043 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,928 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,647 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,579 UART: [afmc] --
2,856,671 UART: [cold-reset] --
2,857,689 UART: [state] Locking Datavault
2,859,100 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,704 UART: [state] Locking ICCM
2,860,276 UART: [exit] Launching FMC @ 0x40000130
2,865,605 UART:
2,865,621 UART: Running Caliptra FMC ...
2,866,029 UART:
2,866,172 UART: [state] CFI Enabled
2,876,727 UART: [fht] FMC Alias Private Key: 7
2,984,856 UART: [art] Extend RT PCRs Done
2,985,284 UART: [art] Lock RT PCRs Done
2,986,592 UART: [art] Populate DV Done
2,994,891 UART: [fht] FMC Alias Private Key: 7
2,995,941 UART: [art] Derive CDI
2,996,221 UART: [art] Store in in slot 0x4
3,081,908 UART: [art] Derive Key Pair
3,082,268 UART: [art] Store priv key in slot 0x5
3,095,070 UART: [art] Derive Key Pair - Done
3,109,857 UART: [art] Signing Cert with AUTHO
3,110,337 UART: RITY.KEYID = 7
3,125,501 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,266 UART: [art] PUB.X = 3640F688B77B49C786CD701B0260CED9C2D92CBDAF89B4FE9CFF5403BC52500C30F3798B9FE58EE27939E76C5DC15051
3,133,037 UART: [art] PUB.Y = 80D58A41EC25D5E0BEA1E1D51568981D5D9BF6FCE5EC86B7AD5C78A96999D1BB246204301308EB25C5D73830FBD2D4C2
3,139,993 UART: [art] SIG.R = A99F21150647132C6A249C11A9C4E98FA81CD3F6F92210286C893E09BAA8C3CA9E2F357E932655364A7D51FEBC31078A
3,146,756 UART: [art] SIG.S = 90E3E222FE07BC5AA881403F2DA82C1D69A51DC76A75931A20B701195270B8359FC6D3454D31DCD20AACEC88DB8D2642
3,170,308 UART: Caliptra RT
3,170,653 UART: [state] CFI Enabled
3,278,905 UART: [rt] RT listening for mailbox commands...
3,279,575 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,241 UART: [rt]cmd =0x4c4d5356, len=1672
3,840,752 >>> mbox cmd response data (8 bytes)
3,840,753 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,920 UART: [rt]cmd =0x4c4d5356, len=1672
4,157,521 >>> mbox cmd response data (8 bytes)
4,157,522 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,197,583 UART: [rt]cmd =0x4c4d5356, len=1672
4,474,332 >>> mbox cmd response data (8 bytes)
4,474,333 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,514,522 UART: [rt]cmd =0x4c4d5356, len=1672
4,785,781 >>> mbox cmd response data (8 bytes)
4,785,782 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,825,925 UART: [rt]cmd =0x4c4d5356, len=1672
5,097,378 >>> mbox cmd response data (8 bytes)
5,097,379 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,137,400 UART: [rt]cmd =0x4c4d5356, len=1672
5,411,232 >>> mbox cmd response data (8 bytes)
5,411,233 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,451,546 UART: [rt]cmd =0x4c4d5356, len=1672
5,723,289 >>> mbox cmd response data (8 bytes)
5,723,290 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,763,527 UART: [rt]cmd =0x4c4d5356, len=1672
6,037,701 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,590 ready_for_fw is high
1,060,590 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,177 >>> mbox cmd response: success
2,688,679 UART:
2,688,695 UART: Running Caliptra FMC ...
2,689,103 UART:
2,689,246 UART: [state] CFI Enabled
2,699,727 UART: [fht] FMC Alias Private Key: 7
2,807,762 UART: [art] Extend RT PCRs Done
2,808,190 UART: [art] Lock RT PCRs Done
2,809,824 UART: [art] Populate DV Done
2,817,921 UART: [fht] FMC Alias Private Key: 7
2,818,955 UART: [art] Derive CDI
2,819,235 UART: [art] Store in in slot 0x4
2,904,558 UART: [art] Derive Key Pair
2,904,918 UART: [art] Store priv key in slot 0x5
2,918,448 UART: [art] Derive Key Pair - Done
2,933,287 UART: [art] Signing Cert with AUTHO
2,933,767 UART: RITY.KEYID = 7
2,949,033 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,798 UART: [art] PUB.X = B679E648A360CEC129E5BB410294EBD0643AF83A36584A9C41AC6F4699CF6B340118B1EFCECDE6CA6EDFCF8DD3F2B013
2,956,584 UART: [art] PUB.Y = 24C33BDB4C7E1FF56E31D69574769841E8A09775973591FB18EB1C451EB10D2DFB5300A31017AFEC63CF79358249DC22
2,963,511 UART: [art] SIG.R = 047CFD608C5FE2B03B11C482E7EC08AFFD727EEDBB01A23613D1D8A17BF94781601066EC428DCF7F1C036878AC86C8D7
2,970,283 UART: [art] SIG.S = 339044FAB54E094C2BAFB0F09AA3102A009717036F30D1AC4BF228F88308F288397FE3120ECBB7EC5C6B4AC91E9B2D42
2,994,016 UART: Caliptra RT
2,994,361 UART: [state] CFI Enabled
3,102,364 UART: [rt] RT listening for mailbox commands...
3,103,034 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,376 UART: [rt]cmd =0x4c4d5356, len=1672
3,663,809 >>> mbox cmd response data (8 bytes)
3,663,810 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,171 UART: [rt]cmd =0x4c4d5356, len=1672
3,980,590 >>> mbox cmd response data (8 bytes)
3,980,591 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,020,674 UART: [rt]cmd =0x4c4d5356, len=1672
4,297,067 >>> mbox cmd response data (8 bytes)
4,297,068 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,337,075 UART: [rt]cmd =0x4c4d5356, len=1672
4,608,664 >>> mbox cmd response data (8 bytes)
4,608,665 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,648,968 UART: [rt]cmd =0x4c4d5356, len=1672
4,920,595 >>> mbox cmd response data (8 bytes)
4,920,596 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,961,137 UART: [rt]cmd =0x4c4d5356, len=1672
5,234,929 >>> mbox cmd response data (8 bytes)
5,234,930 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,275,205 UART: [rt]cmd =0x4c4d5356, len=1672
5,546,930 >>> mbox cmd response data (8 bytes)
5,546,931 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,587,172 UART: [rt]cmd =0x4c4d5356, len=1672
5,861,334 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,348 UART: [state] LifecycleState = Unprovisioned
85,003 UART: [state] DebugLocked = No
85,681 UART: [state] WD Timer not started. Device not locked for debugging
87,024 UART: [kat] SHA2-256
890,574 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,703 UART: [kat] ++
894,855 UART: [kat] sha1
898,967 UART: [kat] SHA2-256
900,907 UART: [kat] SHA2-384
903,736 UART: [kat] SHA2-512-ACC
905,637 UART: [kat] ECC-384
915,258 UART: [kat] HMAC-384Kdf
919,690 UART: [kat] LMS
1,168,002 UART: [kat] --
1,168,811 UART: [cold-reset] ++
1,169,301 UART: [fht] FHT @ 0x50003400
1,171,973 UART: [idev] ++
1,172,141 UART: [idev] CDI.KEYID = 6
1,172,502 UART: [idev] SUBJECT.KEYID = 7
1,172,927 UART: [idev] UDS.KEYID = 0
1,173,273 ready_for_fw is high
1,173,273 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,237 UART: [idev] Erasing UDS.KEYID = 0
1,197,583 UART: [idev] Sha1 KeyId Algorithm
1,206,487 UART: [idev] --
1,207,530 UART: [ldev] ++
1,207,698 UART: [ldev] CDI.KEYID = 6
1,208,062 UART: [ldev] SUBJECT.KEYID = 5
1,208,489 UART: [ldev] AUTHORITY.KEYID = 7
1,208,952 UART: [ldev] FE.KEYID = 1
1,214,082 UART: [ldev] Erasing FE.KEYID = 1
1,239,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,962 UART: [ldev] --
1,279,296 UART: [fwproc] Wait for Commands...
1,279,893 UART: [fwproc] Recv command 0x46574c44
1,280,626 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,294 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,603 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,769,363 >>> mbox cmd response: success
2,770,432 UART: [afmc] ++
2,770,600 UART: [afmc] CDI.KEYID = 6
2,770,963 UART: [afmc] SUBJECT.KEYID = 7
2,771,389 UART: [afmc] AUTHORITY.KEYID = 5
2,806,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,634 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,385 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,114 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,997 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,716 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,483 UART: [afmc] --
2,849,515 UART: [cold-reset] --
2,850,623 UART: [state] Locking Datavault
2,851,678 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,282 UART: [state] Locking ICCM
2,852,712 UART: [exit] Launching FMC @ 0x40000130
2,858,041 UART:
2,858,057 UART: Running Caliptra FMC ...
2,858,465 UART:
2,858,519 UART: [state] CFI Enabled
2,868,692 UART: [fht] FMC Alias Private Key: 7
2,976,653 UART: [art] Extend RT PCRs Done
2,977,081 UART: [art] Lock RT PCRs Done
2,978,623 UART: [art] Populate DV Done
2,986,718 UART: [fht] FMC Alias Private Key: 7
2,987,796 UART: [art] Derive CDI
2,988,076 UART: [art] Store in in slot 0x4
3,073,591 UART: [art] Derive Key Pair
3,073,951 UART: [art] Store priv key in slot 0x5
3,086,965 UART: [art] Derive Key Pair - Done
3,101,898 UART: [art] Signing Cert with AUTHO
3,102,378 UART: RITY.KEYID = 7
3,117,604 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,369 UART: [art] PUB.X = 59ED566FD94AC4216A0B5A894C3A11D57351176DE1214C3725DA599171BCBB0E8064F0D804D7EA7EBB7D2DEC604CE3DD
3,125,144 UART: [art] PUB.Y = CC38873CB3193311AF16E93DEE21B037035CAB7F202E538214B146F3A2C6816E10F930E229F1B70E7CC35A02C877CD0F
3,132,086 UART: [art] SIG.R = DC35CC25FA9EB8FED3CC0935448B8B8F46C4E4082FFF77141E95BF09E0AD7D7E5C82181EF02D084DB1F48DB08D562AE2
3,138,864 UART: [art] SIG.S = 85CEEA1368606AA81C0BA586CC81D4660D0A97C0A689141CFF33BFEB08AE9C8FF72BF73524B36995E33EB671612EEDF6
3,162,021 UART: Caliptra RT
3,162,274 UART: [state] CFI Enabled
3,269,914 UART: [rt] RT listening for mailbox commands...
3,270,584 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,262 UART: [rt]cmd =0x4c4d5356, len=1672
3,831,785 >>> mbox cmd response data (8 bytes)
3,831,786 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,871,983 UART: [rt]cmd =0x4c4d5356, len=1672
4,148,608 >>> mbox cmd response data (8 bytes)
4,148,609 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,188,842 UART: [rt]cmd =0x4c4d5356, len=1672
4,465,287 >>> mbox cmd response data (8 bytes)
4,465,288 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,505,511 UART: [rt]cmd =0x4c4d5356, len=1672
4,777,010 >>> mbox cmd response data (8 bytes)
4,777,011 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,817,454 UART: [rt]cmd =0x4c4d5356, len=1672
5,089,073 >>> mbox cmd response data (8 bytes)
5,089,074 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,129,255 UART: [rt]cmd =0x4c4d5356, len=1672
5,403,607 >>> mbox cmd response data (8 bytes)
5,403,608 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,443,761 UART: [rt]cmd =0x4c4d5356, len=1672
5,715,532 >>> mbox cmd response data (8 bytes)
5,715,533 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,755,722 UART: [rt]cmd =0x4c4d5356, len=1672
6,029,972 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,884 ready_for_fw is high
1,055,884 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,479 >>> mbox cmd response: success
2,684,681 UART:
2,684,697 UART: Running Caliptra FMC ...
2,685,105 UART:
2,685,159 UART: [state] CFI Enabled
2,695,808 UART: [fht] FMC Alias Private Key: 7
2,803,349 UART: [art] Extend RT PCRs Done
2,803,777 UART: [art] Lock RT PCRs Done
2,805,529 UART: [art] Populate DV Done
2,814,042 UART: [fht] FMC Alias Private Key: 7
2,815,000 UART: [art] Derive CDI
2,815,280 UART: [art] Store in in slot 0x4
2,901,211 UART: [art] Derive Key Pair
2,901,571 UART: [art] Store priv key in slot 0x5
2,914,515 UART: [art] Derive Key Pair - Done
2,929,220 UART: [art] Signing Cert with AUTHO
2,929,700 UART: RITY.KEYID = 7
2,944,586 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,351 UART: [art] PUB.X = 9A51013BDA1FFD075404DD388751676FCC99C8047472C2D9D655729FD796EF1EF037BBD43DD703FB5AC258A7890F9455
2,952,107 UART: [art] PUB.Y = D2CC344BD83DA2F08CB791DD270CB12314BE23CC564EB615FDC311BFEA404A6471A12D03CFFB0E42BA5AB116B28DED88
2,959,072 UART: [art] SIG.R = 589134874B30AB4083733AE55CB61E1179F8DCCE06336B03A628E0914BBA35BAD2CAD999CC0C6CB484C6D64D084BF350
2,965,838 UART: [art] SIG.S = 14BD2C385E4095CCD246F8CD246F228739480F55CF2D7D677664F2767654A8D5171D96A8EE36F42B1CDFB74A54F91D91
2,989,288 UART: Caliptra RT
2,989,541 UART: [state] CFI Enabled
3,096,438 UART: [rt] RT listening for mailbox commands...
3,097,108 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,680 UART: [rt]cmd =0x4c4d5356, len=1672
3,657,761 >>> mbox cmd response data (8 bytes)
3,657,762 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,697,723 UART: [rt]cmd =0x4c4d5356, len=1672
3,974,044 >>> mbox cmd response data (8 bytes)
3,974,045 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,014,384 UART: [rt]cmd =0x4c4d5356, len=1672
4,290,835 >>> mbox cmd response data (8 bytes)
4,290,836 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,330,999 UART: [rt]cmd =0x4c4d5356, len=1672
4,602,312 >>> mbox cmd response data (8 bytes)
4,602,313 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,642,520 UART: [rt]cmd =0x4c4d5356, len=1672
4,913,947 >>> mbox cmd response data (8 bytes)
4,913,948 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,954,285 UART: [rt]cmd =0x4c4d5356, len=1672
5,228,277 >>> mbox cmd response data (8 bytes)
5,228,278 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,268,735 UART: [rt]cmd =0x4c4d5356, len=1672
5,540,486 >>> mbox cmd response data (8 bytes)
5,540,487 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,580,788 UART: [rt]cmd =0x4c4d5356, len=1672
5,854,930 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
891,571 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,700 UART: [kat] ++
895,852 UART: [kat] sha1
899,974 UART: [kat] SHA2-256
901,914 UART: [kat] SHA2-384
904,577 UART: [kat] SHA2-512-ACC
906,478 UART: [kat] ECC-384
916,339 UART: [kat] HMAC-384Kdf
920,831 UART: [kat] LMS
1,169,143 UART: [kat] --
1,169,744 UART: [cold-reset] ++
1,170,156 UART: [fht] FHT @ 0x50003400
1,172,710 UART: [idev] ++
1,172,878 UART: [idev] CDI.KEYID = 6
1,173,239 UART: [idev] SUBJECT.KEYID = 7
1,173,664 UART: [idev] UDS.KEYID = 0
1,174,010 ready_for_fw is high
1,174,010 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,344 UART: [idev] Erasing UDS.KEYID = 0
1,198,150 UART: [idev] Sha1 KeyId Algorithm
1,206,914 UART: [idev] --
1,208,141 UART: [ldev] ++
1,208,309 UART: [ldev] CDI.KEYID = 6
1,208,673 UART: [ldev] SUBJECT.KEYID = 5
1,209,100 UART: [ldev] AUTHORITY.KEYID = 7
1,209,563 UART: [ldev] FE.KEYID = 1
1,214,483 UART: [ldev] Erasing FE.KEYID = 1
1,240,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,919 UART: [ldev] --
1,280,311 UART: [fwproc] Wait for Commands...
1,281,024 UART: [fwproc] Recv command 0x46574c44
1,281,757 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,073 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,227 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,536 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,402 >>> mbox cmd response: success
2,773,523 UART: [afmc] ++
2,773,691 UART: [afmc] CDI.KEYID = 6
2,774,054 UART: [afmc] SUBJECT.KEYID = 7
2,774,480 UART: [afmc] AUTHORITY.KEYID = 5
2,810,377 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,707 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,458 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,187 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,070 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,789 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,626 UART: [afmc] --
2,853,518 UART: [cold-reset] --
2,854,516 UART: [state] Locking Datavault
2,856,055 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,659 UART: [state] Locking ICCM
2,857,213 UART: [exit] Launching FMC @ 0x40000130
2,862,542 UART:
2,862,558 UART: Running Caliptra FMC ...
2,862,966 UART:
2,863,109 UART: [state] CFI Enabled
2,873,776 UART: [fht] FMC Alias Private Key: 7
2,980,575 UART: [art] Extend RT PCRs Done
2,981,003 UART: [art] Lock RT PCRs Done
2,982,641 UART: [art] Populate DV Done
2,990,976 UART: [fht] FMC Alias Private Key: 7
2,992,088 UART: [art] Derive CDI
2,992,368 UART: [art] Store in in slot 0x4
3,078,587 UART: [art] Derive Key Pair
3,078,947 UART: [art] Store priv key in slot 0x5
3,092,211 UART: [art] Derive Key Pair - Done
3,106,738 UART: [art] Signing Cert with AUTHO
3,107,218 UART: RITY.KEYID = 7
3,122,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,315 UART: [art] PUB.X = CE65BE4CF7C56F6B822A55AE618E2F125274D319E5A581A7EF0C212FED397A6D5439EF0ADB58EA342B85E83F2C3B1DBC
3,130,099 UART: [art] PUB.Y = 3CCC8CB053AE3EF77CC94E75C5D376DFAEB1149982182D742ED5297B83A1A7FDB830FB11B94B083FA3D9C376E292CC57
3,137,062 UART: [art] SIG.R = 54E2B3DFAC6551F93157840F850D004EE4BA4981B0C3564C4B086C1BC95A2DF5241F7429850467093BFE8A9E9B0CB085
3,143,794 UART: [art] SIG.S = 894471FCC8AA439FE951BB954B4C1DEA16D383C6CF6277471458D0644C74922E3513AB61EB304353B0052AE3DB35A0BD
3,167,356 UART: Caliptra RT
3,167,701 UART: [state] CFI Enabled
3,275,992 UART: [rt] RT listening for mailbox commands...
3,276,662 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,460 UART: [rt]cmd =0x4c4d5356, len=1672
3,837,821 >>> mbox cmd response data (8 bytes)
3,837,822 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,021 UART: [rt]cmd =0x4c4d5356, len=1672
4,154,742 >>> mbox cmd response data (8 bytes)
4,154,743 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,194,920 UART: [rt]cmd =0x4c4d5356, len=1672
4,471,327 >>> mbox cmd response data (8 bytes)
4,471,328 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,511,573 UART: [rt]cmd =0x4c4d5356, len=1672
4,783,504 >>> mbox cmd response data (8 bytes)
4,783,505 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,823,624 UART: [rt]cmd =0x4c4d5356, len=1672
5,095,299 >>> mbox cmd response data (8 bytes)
5,095,300 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,135,457 UART: [rt]cmd =0x4c4d5356, len=1672
5,409,293 >>> mbox cmd response data (8 bytes)
5,409,294 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,449,377 UART: [rt]cmd =0x4c4d5356, len=1672
5,720,966 >>> mbox cmd response data (8 bytes)
5,720,967 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,761,076 UART: [rt]cmd =0x4c4d5356, len=1672
6,035,212 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,357 ready_for_fw is high
1,057,357 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,410 >>> mbox cmd response: success
2,686,340 UART:
2,686,356 UART: Running Caliptra FMC ...
2,686,764 UART:
2,686,907 UART: [state] CFI Enabled
2,697,040 UART: [fht] FMC Alias Private Key: 7
2,805,197 UART: [art] Extend RT PCRs Done
2,805,625 UART: [art] Lock RT PCRs Done
2,806,971 UART: [art] Populate DV Done
2,815,162 UART: [fht] FMC Alias Private Key: 7
2,816,330 UART: [art] Derive CDI
2,816,610 UART: [art] Store in in slot 0x4
2,902,163 UART: [art] Derive Key Pair
2,902,523 UART: [art] Store priv key in slot 0x5
2,916,409 UART: [art] Derive Key Pair - Done
2,931,185 UART: [art] Signing Cert with AUTHO
2,931,665 UART: RITY.KEYID = 7
2,946,653 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,418 UART: [art] PUB.X = 2076B793616D16DE9C1B309AEF639F9DC99894E4D8D9C6EEB6BE11F89884DD094671521EDEBD1E8E577E9EEFD0C90F99
2,954,196 UART: [art] PUB.Y = D6670D6DF80BBBFB3A350C00FE434A7C8FA77D66E353685D9C3DEB0277209884E6608A79B5D88E5E522D285448507601
2,961,109 UART: [art] SIG.R = 53A5067E4A6BBAF8DA8510F7E83E89732E9330BFFCEB3B77A0EE58D55731CE5CE4A700B2A0686B1A1C9B52CD97FA3C12
2,967,872 UART: [art] SIG.S = 00C76692409CD2621FB5B27E116E71DF2FA162D8E389BBB63F02A4DF8292E81CE64030A4916557537C69BD6370FAE8C3
2,992,194 UART: Caliptra RT
2,992,539 UART: [state] CFI Enabled
3,101,255 UART: [rt] RT listening for mailbox commands...
3,101,925 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,477 UART: [rt]cmd =0x4c4d5356, len=1672
3,662,954 >>> mbox cmd response data (8 bytes)
3,662,955 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,088 UART: [rt]cmd =0x4c4d5356, len=1672
3,979,773 >>> mbox cmd response data (8 bytes)
3,979,774 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,020,107 UART: [rt]cmd =0x4c4d5356, len=1672
4,296,650 >>> mbox cmd response data (8 bytes)
4,296,651 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,336,810 UART: [rt]cmd =0x4c4d5356, len=1672
4,608,257 >>> mbox cmd response data (8 bytes)
4,608,258 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,648,577 UART: [rt]cmd =0x4c4d5356, len=1672
4,920,150 >>> mbox cmd response data (8 bytes)
4,920,151 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,960,266 UART: [rt]cmd =0x4c4d5356, len=1672
5,234,178 >>> mbox cmd response data (8 bytes)
5,234,179 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,274,580 UART: [rt]cmd =0x4c4d5356, len=1672
5,546,255 >>> mbox cmd response data (8 bytes)
5,546,256 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,586,317 UART: [rt]cmd =0x4c4d5356, len=1672
5,860,247 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,535 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,149 UART: [kat] SHA2-256
882,080 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,195 UART: [kat] ++
886,347 UART: [kat] sha1
890,757 UART: [kat] SHA2-256
892,695 UART: [kat] SHA2-384
895,524 UART: [kat] SHA2-512-ACC
897,425 UART: [kat] ECC-384
902,886 UART: [kat] HMAC-384Kdf
907,514 UART: [kat] LMS
1,475,710 UART: [kat] --
1,476,845 UART: [cold-reset] ++
1,477,263 UART: [fht] Storing FHT @ 0x50003400
1,480,212 UART: [idev] ++
1,480,380 UART: [idev] CDI.KEYID = 6
1,480,740 UART: [idev] SUBJECT.KEYID = 7
1,481,164 UART: [idev] UDS.KEYID = 0
1,481,509 ready_for_fw is high
1,481,509 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,710 UART: [idev] Erasing UDS.KEYID = 0
1,505,176 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,886 UART: [idev] --
1,514,947 UART: [ldev] ++
1,515,115 UART: [ldev] CDI.KEYID = 6
1,515,478 UART: [ldev] SUBJECT.KEYID = 5
1,515,904 UART: [ldev] AUTHORITY.KEYID = 7
1,516,367 UART: [ldev] FE.KEYID = 1
1,521,537 UART: [ldev] Erasing FE.KEYID = 1
1,546,410 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,372 UART: [ldev] --
1,585,841 UART: [fwproc] Waiting for Commands...
1,586,534 UART: [fwproc] Received command 0x46574c44
1,587,325 UART: [fwproc] Received Image of size 114332 bytes
2,884,969 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,763 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,115 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,982 >>> mbox cmd response: success
3,079,032 UART: [afmc] ++
3,079,200 UART: [afmc] CDI.KEYID = 6
3,079,562 UART: [afmc] SUBJECT.KEYID = 7
3,079,987 UART: [afmc] AUTHORITY.KEYID = 5
3,115,126 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,948 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,728 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,456 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,341 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,031 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,890 UART: [afmc] --
3,158,802 UART: [cold-reset] --
3,159,600 UART: [state] Locking Datavault
3,160,505 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,109 UART: [state] Locking ICCM
3,161,689 UART: [exit] Launching FMC @ 0x40000130
3,167,018 UART:
3,167,034 UART: Running Caliptra FMC ...
3,167,442 UART:
3,167,496 UART: [state] CFI Enabled
3,178,211 UART: [fht] FMC Alias Private Key: 7
3,285,752 UART: [art] Extend RT PCRs Done
3,286,180 UART: [art] Lock RT PCRs Done
3,287,686 UART: [art] Populate DV Done
3,296,119 UART: [fht] FMC Alias Private Key: 7
3,297,285 UART: [art] Derive CDI
3,297,565 UART: [art] Store in in slot 0x4
3,382,684 UART: [art] Derive Key Pair
3,383,044 UART: [art] Store priv key in slot 0x5
3,396,294 UART: [art] Derive Key Pair - Done
3,411,098 UART: [art] Signing Cert with AUTHO
3,411,578 UART: RITY.KEYID = 7
3,427,460 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,225 UART: [art] PUB.X = 692811229F3241A9C178CE015DFA9C8B2B813E01A92769CAAAD740CA5666F46E1ABA91DCC9BAD6B5B31FB74BACA77658
3,435,005 UART: [art] PUB.Y = 2077FF56C9D5A9B5BA09873FF36FA7640593BF0C9BEE79452AF2371515F09264B3F4B60BC61F813F96F97AF5F3771E05
3,441,944 UART: [art] SIG.R = 32E5BBF3E471259B7610925C0985BF29B2865B427A23875F227FC0A41566310BA904C5ACF8BEB6A037B0C7DE75D62970
3,448,705 UART: [art] SIG.S = 89F807F0E8C2C5A5516E6D9C04B29CC7325A0D0D9143FC5479358943A01AA476E3D6ABF99F66086669CDE29C809A02CB
3,472,070 UART: Caliptra RT
3,472,323 UART: [state] CFI Enabled
3,581,432 UART: [rt] RT listening for mailbox commands...
3,582,102 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,832 UART: [rt]cmd =0x4c4d5356, len=1672
4,152,776 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,145 ready_for_fw is high
1,362,145 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,098 >>> mbox cmd response: success
2,990,074 UART:
2,990,090 UART: Running Caliptra FMC ...
2,990,498 UART:
2,990,552 UART: [state] CFI Enabled
3,001,219 UART: [fht] FMC Alias Private Key: 7
3,108,956 UART: [art] Extend RT PCRs Done
3,109,384 UART: [art] Lock RT PCRs Done
3,110,802 UART: [art] Populate DV Done
3,119,037 UART: [fht] FMC Alias Private Key: 7
3,120,187 UART: [art] Derive CDI
3,120,467 UART: [art] Store in in slot 0x4
3,206,298 UART: [art] Derive Key Pair
3,206,658 UART: [art] Store priv key in slot 0x5
3,219,606 UART: [art] Derive Key Pair - Done
3,234,517 UART: [art] Signing Cert with AUTHO
3,234,997 UART: RITY.KEYID = 7
3,250,443 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,208 UART: [art] PUB.X = 7702507CFE273F8CDA41AE8F15287C4C74F49704BAF67EF06D238B038614129D37B8B34B6250CD9091812C483A3136AF
3,257,967 UART: [art] PUB.Y = 4A4F3D97091AF5AD194C1322C6276B33EFC8A37700B32746D0B19C860EA45A24C783CF2F17555854A8B069C17A532B56
3,264,887 UART: [art] SIG.R = CEC1429AE38267AC5A734BE3F0E494B479E4D5055BEC21A3889FA1A771D3A2AC21D1EE4161B33253CAEB6D8BE771DDD0
3,271,672 UART: [art] SIG.S = 9C6D42B8530C499EDD34339A79A6CA13457A0306B64A579D5A56155F1BC95B648A5CDF8F7F3885CB9BB60E910186700A
3,295,561 UART: Caliptra RT
3,295,814 UART: [state] CFI Enabled
3,404,050 UART: [rt] RT listening for mailbox commands...
3,404,720 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,316 UART: [rt]cmd =0x4c4d5356, len=1672
3,975,304 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,602 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,168 UART: [kat] SHA2-256
882,099 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,214 UART: [kat] ++
886,366 UART: [kat] sha1
890,494 UART: [kat] SHA2-256
892,432 UART: [kat] SHA2-384
895,201 UART: [kat] SHA2-512-ACC
897,102 UART: [kat] ECC-384
902,595 UART: [kat] HMAC-384Kdf
907,377 UART: [kat] LMS
1,475,573 UART: [kat] --
1,476,500 UART: [cold-reset] ++
1,476,934 UART: [fht] Storing FHT @ 0x50003400
1,479,837 UART: [idev] ++
1,480,005 UART: [idev] CDI.KEYID = 6
1,480,365 UART: [idev] SUBJECT.KEYID = 7
1,480,789 UART: [idev] UDS.KEYID = 0
1,481,134 ready_for_fw is high
1,481,134 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,033 UART: [idev] Erasing UDS.KEYID = 0
1,505,671 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,267 UART: [idev] --
1,515,484 UART: [ldev] ++
1,515,652 UART: [ldev] CDI.KEYID = 6
1,516,015 UART: [ldev] SUBJECT.KEYID = 5
1,516,441 UART: [ldev] AUTHORITY.KEYID = 7
1,516,904 UART: [ldev] FE.KEYID = 1
1,521,972 UART: [ldev] Erasing FE.KEYID = 1
1,548,063 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,103 UART: [ldev] --
1,587,380 UART: [fwproc] Waiting for Commands...
1,588,045 UART: [fwproc] Received command 0x46574c44
1,588,836 UART: [fwproc] Received Image of size 114332 bytes
2,887,500 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,698 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,050 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,957 >>> mbox cmd response: success
3,081,039 UART: [afmc] ++
3,081,207 UART: [afmc] CDI.KEYID = 6
3,081,569 UART: [afmc] SUBJECT.KEYID = 7
3,081,994 UART: [afmc] AUTHORITY.KEYID = 5
3,117,083 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,333 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,113 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,841 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,726 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,416 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,341 UART: [afmc] --
3,160,439 UART: [cold-reset] --
3,161,123 UART: [state] Locking Datavault
3,162,506 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,110 UART: [state] Locking ICCM
3,163,676 UART: [exit] Launching FMC @ 0x40000130
3,169,005 UART:
3,169,021 UART: Running Caliptra FMC ...
3,169,429 UART:
3,169,572 UART: [state] CFI Enabled
3,180,317 UART: [fht] FMC Alias Private Key: 7
3,288,016 UART: [art] Extend RT PCRs Done
3,288,444 UART: [art] Lock RT PCRs Done
3,290,386 UART: [art] Populate DV Done
3,298,585 UART: [fht] FMC Alias Private Key: 7
3,299,685 UART: [art] Derive CDI
3,299,965 UART: [art] Store in in slot 0x4
3,385,526 UART: [art] Derive Key Pair
3,385,886 UART: [art] Store priv key in slot 0x5
3,399,680 UART: [art] Derive Key Pair - Done
3,414,433 UART: [art] Signing Cert with AUTHO
3,414,913 UART: RITY.KEYID = 7
3,430,163 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,928 UART: [art] PUB.X = 779F79E5E6F75335ADEF9D56D09F25924DA9B5BC052C6862F4452D257DB7C3AAAC2ACB3C8F9EB0BD723F1A1096163653
3,437,707 UART: [art] PUB.Y = 3A7FF29D4C51AD74F76CC628A69B719EA653E53C1009912799963A29F5C63A3B1E6CF7D63426692ACED59881410FC01E
3,444,653 UART: [art] SIG.R = 6C5ABBE4CA23270F464CAD3CA3A7187E762DA0FEE98CE4B01E168AADC403B8CA677F66901CCC9B6E9018E12A737C45EF
3,451,439 UART: [art] SIG.S = 389C976AE8703EB14DBF55A2A88234D47EA102CB2AE8E97D9375107245C9352E78B6F5E5B0B19A404A9D0A32A25AA0C5
3,475,576 UART: Caliptra RT
3,475,921 UART: [state] CFI Enabled
3,584,363 UART: [rt] RT listening for mailbox commands...
3,585,033 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,883 UART: [rt]cmd =0x4c4d5356, len=1672
4,156,019 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,088 ready_for_fw is high
1,363,088 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,597 >>> mbox cmd response: success
2,991,469 UART:
2,991,485 UART: Running Caliptra FMC ...
2,991,893 UART:
2,992,036 UART: [state] CFI Enabled
3,002,469 UART: [fht] FMC Alias Private Key: 7
3,110,558 UART: [art] Extend RT PCRs Done
3,110,986 UART: [art] Lock RT PCRs Done
3,112,738 UART: [art] Populate DV Done
3,121,205 UART: [fht] FMC Alias Private Key: 7
3,122,375 UART: [art] Derive CDI
3,122,655 UART: [art] Store in in slot 0x4
3,207,758 UART: [art] Derive Key Pair
3,208,118 UART: [art] Store priv key in slot 0x5
3,221,416 UART: [art] Derive Key Pair - Done
3,236,192 UART: [art] Signing Cert with AUTHO
3,236,672 UART: RITY.KEYID = 7
3,251,656 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,421 UART: [art] PUB.X = 1F3D04A06A6690EDD0C512F72EDA63CB989CEC892BBAA7D3FE128D20F6B4042CEA1F636AB1605742D0819AC874A01E89
3,259,199 UART: [art] PUB.Y = CC1180C8A546E7C7B7DFF24BF5B0E765DBC6D8292D409DCEB174CFB888FDC118D9EFE1DAE6B152A62F4F41719B0AB968
3,266,170 UART: [art] SIG.R = BD4954266C337392F9250A25C6345B7496457C668720540A57385F8E9E510C3EC53B6D26AD88802D56967F918D49A303
3,272,912 UART: [art] SIG.S = 24ED11DBE2D0DADFE1312BC7A265C039B1456DD08D516BF06F62677B05A6EBD53562A09BE0D5B0046D692F614F52EE11
3,296,589 UART: Caliptra RT
3,296,934 UART: [state] CFI Enabled
3,404,927 UART: [rt] RT listening for mailbox commands...
3,405,597 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,365 UART: [rt]cmd =0x4c4d5356, len=1672
3,976,261 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
893,064 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,189 UART: [kat] ++
897,341 UART: [kat] sha1
901,613 UART: [kat] SHA2-256
903,553 UART: [kat] SHA2-384
906,290 UART: [kat] SHA2-512-ACC
908,191 UART: [kat] ECC-384
917,912 UART: [kat] HMAC-384Kdf
922,454 UART: [kat] LMS
1,170,782 UART: [kat] --
1,171,455 UART: [cold-reset] ++
1,171,925 UART: [fht] FHT @ 0x50003400
1,174,606 UART: [idev] ++
1,174,774 UART: [idev] CDI.KEYID = 6
1,175,134 UART: [idev] SUBJECT.KEYID = 7
1,175,558 UART: [idev] UDS.KEYID = 0
1,175,903 ready_for_fw is high
1,175,903 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,888 UART: [idev] Erasing UDS.KEYID = 0
1,200,711 UART: [idev] Sha1 KeyId Algorithm
1,208,935 UART: [idev] --
1,209,991 UART: [ldev] ++
1,210,159 UART: [ldev] CDI.KEYID = 6
1,210,522 UART: [ldev] SUBJECT.KEYID = 5
1,210,948 UART: [ldev] AUTHORITY.KEYID = 7
1,211,411 UART: [ldev] FE.KEYID = 1
1,216,751 UART: [ldev] Erasing FE.KEYID = 1
1,243,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,747 UART: [ldev] --
1,282,114 UART: [fwproc] Wait for Commands...
1,282,862 UART: [fwproc] Recv command 0x46574c44
1,283,590 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,999 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,190 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,494 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,227 >>> mbox cmd response: success
2,774,329 UART: [afmc] ++
2,774,497 UART: [afmc] CDI.KEYID = 6
2,774,859 UART: [afmc] SUBJECT.KEYID = 7
2,775,284 UART: [afmc] AUTHORITY.KEYID = 5
2,810,833 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,772 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,500 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,385 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,104 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,068 UART: [afmc] --
2,854,150 UART: [cold-reset] --
2,855,116 UART: [state] Locking Datavault
2,856,183 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,787 UART: [state] Locking ICCM
2,857,303 UART: [exit] Launching FMC @ 0x40000130
2,862,632 UART:
2,862,648 UART: Running Caliptra FMC ...
2,863,056 UART:
2,863,110 UART: [state] CFI Enabled
2,873,695 UART: [fht] FMC Alias Private Key: 7
2,982,270 UART: [art] Extend RT PCRs Done
2,982,698 UART: [art] Lock RT PCRs Done
2,984,458 UART: [art] Populate DV Done
2,992,523 UART: [fht] FMC Alias Private Key: 7
2,993,521 UART: [art] Derive CDI
2,993,801 UART: [art] Store in in slot 0x4
3,079,452 UART: [art] Derive Key Pair
3,079,812 UART: [art] Store priv key in slot 0x5
3,092,684 UART: [art] Derive Key Pair - Done
3,107,111 UART: [art] Signing Cert with AUTHO
3,107,591 UART: RITY.KEYID = 7
3,122,793 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,558 UART: [art] PUB.X = 2B8D2FA1C1B51B2D332ECDB7DD0DAE3470C46F6042A08E334984107C7EAA1322B17E94B94D7BDE6D5ED430B83327C535
3,130,337 UART: [art] PUB.Y = 140CF395BB262EFF6AA2C387C06D90D4C3CC06ABA5CCC7F8C0CB64CE914F72125C65C81F38FD7D6CBD6C5F35AA771C14
3,137,305 UART: [art] SIG.R = 160FE26B8498765E8B51C09B9E1B38E515D63BAF87485F1B5C2968B2DC61D9CBD7F5D703E833343B346B5E433BBAE79C
3,144,077 UART: [art] SIG.S = DF7D865118A9E50BC4538CB1B0646233B27FC802F0F3DB33215903760C2A06822A7BE81CAAA20DA5B23622FCBD6364E1
3,167,618 UART: Caliptra RT
3,167,871 UART: [state] CFI Enabled
3,276,508 UART: [rt] RT listening for mailbox commands...
3,277,178 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,812 UART: [rt]cmd =0x4c4d5356, len=1672
3,847,698 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,347 ready_for_fw is high
1,060,347 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,260 >>> mbox cmd response: success
2,686,478 UART:
2,686,494 UART: Running Caliptra FMC ...
2,686,902 UART:
2,686,956 UART: [state] CFI Enabled
2,697,355 UART: [fht] FMC Alias Private Key: 7
2,804,924 UART: [art] Extend RT PCRs Done
2,805,352 UART: [art] Lock RT PCRs Done
2,807,120 UART: [art] Populate DV Done
2,815,385 UART: [fht] FMC Alias Private Key: 7
2,816,521 UART: [art] Derive CDI
2,816,801 UART: [art] Store in in slot 0x4
2,902,384 UART: [art] Derive Key Pair
2,902,744 UART: [art] Store priv key in slot 0x5
2,915,802 UART: [art] Derive Key Pair - Done
2,930,635 UART: [art] Signing Cert with AUTHO
2,931,115 UART: RITY.KEYID = 7
2,946,193 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,958 UART: [art] PUB.X = 849B55A273F823DFBB5673F0A3B40B4255DEAAD5DF4A9CA6A257A35C6DEE2739E3949BC318756E5E6144E0B99F5315F1
2,953,735 UART: [art] PUB.Y = E4130EB022CC822D1875AD5B5064DA752B44D9EAEE45728225495622C826A7F3C56D2BF05EA4FF56047C46091FA6CD85
2,960,680 UART: [art] SIG.R = 5DCFC766029E418C75ADC5B9BF253080AB5C1E1EC199591FFE402EA387FF622115B8E8D4197A556968586D138108B2F9
2,967,446 UART: [art] SIG.S = 5A3F54ED937E83C81278BDEC23312E6386E0E86185211723349814728F725BC15E5BC017B6E064EEB3B324AA8F8CD5D9
2,991,591 UART: Caliptra RT
2,991,844 UART: [state] CFI Enabled
3,099,317 UART: [rt] RT listening for mailbox commands...
3,099,987 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,991 UART: [rt]cmd =0x4c4d5356, len=1672
3,670,727 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
893,379 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,504 UART: [kat] ++
897,656 UART: [kat] sha1
901,824 UART: [kat] SHA2-256
903,764 UART: [kat] SHA2-384
906,613 UART: [kat] SHA2-512-ACC
908,514 UART: [kat] ECC-384
918,043 UART: [kat] HMAC-384Kdf
922,501 UART: [kat] LMS
1,170,829 UART: [kat] --
1,171,712 UART: [cold-reset] ++
1,172,152 UART: [fht] FHT @ 0x50003400
1,174,975 UART: [idev] ++
1,175,143 UART: [idev] CDI.KEYID = 6
1,175,503 UART: [idev] SUBJECT.KEYID = 7
1,175,927 UART: [idev] UDS.KEYID = 0
1,176,272 ready_for_fw is high
1,176,272 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,153 UART: [idev] Erasing UDS.KEYID = 0
1,201,374 UART: [idev] Sha1 KeyId Algorithm
1,209,832 UART: [idev] --
1,210,936 UART: [ldev] ++
1,211,104 UART: [ldev] CDI.KEYID = 6
1,211,467 UART: [ldev] SUBJECT.KEYID = 5
1,211,893 UART: [ldev] AUTHORITY.KEYID = 7
1,212,356 UART: [ldev] FE.KEYID = 1
1,218,058 UART: [ldev] Erasing FE.KEYID = 1
1,244,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,212 UART: [ldev] --
1,283,587 UART: [fwproc] Wait for Commands...
1,284,175 UART: [fwproc] Recv command 0x46574c44
1,284,903 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,461 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,765 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,490 >>> mbox cmd response: success
2,776,706 UART: [afmc] ++
2,776,874 UART: [afmc] CDI.KEYID = 6
2,777,236 UART: [afmc] SUBJECT.KEYID = 7
2,777,661 UART: [afmc] AUTHORITY.KEYID = 5
2,812,776 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,495 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,243 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,971 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,856 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,575 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,487 UART: [afmc] --
2,856,433 UART: [cold-reset] --
2,857,051 UART: [state] Locking Datavault
2,858,104 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,708 UART: [state] Locking ICCM
2,859,272 UART: [exit] Launching FMC @ 0x40000130
2,864,601 UART:
2,864,617 UART: Running Caliptra FMC ...
2,865,025 UART:
2,865,168 UART: [state] CFI Enabled
2,875,823 UART: [fht] FMC Alias Private Key: 7
2,984,140 UART: [art] Extend RT PCRs Done
2,984,568 UART: [art] Lock RT PCRs Done
2,986,406 UART: [art] Populate DV Done
2,994,483 UART: [fht] FMC Alias Private Key: 7
2,995,625 UART: [art] Derive CDI
2,995,905 UART: [art] Store in in slot 0x4
3,081,904 UART: [art] Derive Key Pair
3,082,264 UART: [art] Store priv key in slot 0x5
3,095,594 UART: [art] Derive Key Pair - Done
3,110,191 UART: [art] Signing Cert with AUTHO
3,110,671 UART: RITY.KEYID = 7
3,125,407 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,172 UART: [art] PUB.X = 4F06A9B34E752CC009112190F08E918B35D2AD8EC343D327018FB96F4C28DB0A3BCC53E3C16EE39DE634C3A610115779
3,132,934 UART: [art] PUB.Y = E049FAB68918AC9E6761EBF8B9B9785C4A93D85FE78EDD8125D87FB7C7E5C5A3CEC1601F4D35E830BF0F423639979148
3,139,891 UART: [art] SIG.R = 65F4EDB94CE3230AB099F259894B310143E72555D08D0DB27605996738F79F9FA52C18EA4A4728C9A6E205E7906EA44A
3,146,644 UART: [art] SIG.S = 93A3258B69A43866C38788233A66508ED3B2862F13C1DA408BADD3B3754D27BCECDA6CFE2D15E174E0575434F6158AF2
3,170,793 UART: Caliptra RT
3,171,138 UART: [state] CFI Enabled
3,279,335 UART: [rt] RT listening for mailbox commands...
3,280,005 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,545 UART: [rt]cmd =0x4c4d5356, len=1672
3,850,547 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,720 ready_for_fw is high
1,059,720 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,101 >>> mbox cmd response: success
2,688,457 UART:
2,688,473 UART: Running Caliptra FMC ...
2,688,881 UART:
2,689,024 UART: [state] CFI Enabled
2,699,313 UART: [fht] FMC Alias Private Key: 7
2,807,146 UART: [art] Extend RT PCRs Done
2,807,574 UART: [art] Lock RT PCRs Done
2,808,778 UART: [art] Populate DV Done
2,817,083 UART: [fht] FMC Alias Private Key: 7
2,818,217 UART: [art] Derive CDI
2,818,497 UART: [art] Store in in slot 0x4
2,904,188 UART: [art] Derive Key Pair
2,904,548 UART: [art] Store priv key in slot 0x5
2,917,872 UART: [art] Derive Key Pair - Done
2,932,698 UART: [art] Signing Cert with AUTHO
2,933,178 UART: RITY.KEYID = 7
2,948,440 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,205 UART: [art] PUB.X = 7FEA9990D721A859483E091C4DFF862D564F91438C0AB7992EAF25A03BA346C0EA0D4446F3D6134B42E818C2DCAB383C
2,955,974 UART: [art] PUB.Y = A0BA4AE2C21D7D8160C3F07C620571CAB935A01F82526F2489EDA0055D8EC2CB98536D28039505C8B62DF156512EEA73
2,962,916 UART: [art] SIG.R = B19058AA2DA7B53E000E07B7E8AB65351197190A829BB966D40979F8790497190F95556F91E50EF81637B7559DFA3DA8
2,969,637 UART: [art] SIG.S = 2F1C29A8DCCA94D742A6CA8795C2CEB0F685C6CF5588BBF54A48B362257A5C3636E02066E801B8634C7ED630320CED60
2,992,818 UART: Caliptra RT
2,993,163 UART: [state] CFI Enabled
3,100,850 UART: [rt] RT listening for mailbox commands...
3,101,520 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,614 UART: [rt]cmd =0x4c4d5356, len=1672
3,672,382 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,714 UART: [state] LifecycleState = Unprovisioned
85,369 UART: [state] DebugLocked = No
85,941 UART: [state] WD Timer not started. Device not locked for debugging
87,234 UART: [kat] SHA2-256
890,784 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,913 UART: [kat] ++
895,065 UART: [kat] sha1
899,381 UART: [kat] SHA2-256
901,321 UART: [kat] SHA2-384
904,152 UART: [kat] SHA2-512-ACC
906,053 UART: [kat] ECC-384
915,490 UART: [kat] HMAC-384Kdf
919,882 UART: [kat] LMS
1,168,194 UART: [kat] --
1,168,697 UART: [cold-reset] ++
1,169,263 UART: [fht] FHT @ 0x50003400
1,171,903 UART: [idev] ++
1,172,071 UART: [idev] CDI.KEYID = 6
1,172,432 UART: [idev] SUBJECT.KEYID = 7
1,172,857 UART: [idev] UDS.KEYID = 0
1,173,203 ready_for_fw is high
1,173,203 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,895 UART: [idev] Erasing UDS.KEYID = 0
1,198,131 UART: [idev] Sha1 KeyId Algorithm
1,206,931 UART: [idev] --
1,207,904 UART: [ldev] ++
1,208,072 UART: [ldev] CDI.KEYID = 6
1,208,436 UART: [ldev] SUBJECT.KEYID = 5
1,208,863 UART: [ldev] AUTHORITY.KEYID = 7
1,209,326 UART: [ldev] FE.KEYID = 1
1,214,424 UART: [ldev] Erasing FE.KEYID = 1
1,240,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,812 UART: [ldev] --
1,280,184 UART: [fwproc] Wait for Commands...
1,280,925 UART: [fwproc] Recv command 0x46574c44
1,281,658 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,562 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,871 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,767 >>> mbox cmd response: success
2,774,022 UART: [afmc] ++
2,774,190 UART: [afmc] CDI.KEYID = 6
2,774,553 UART: [afmc] SUBJECT.KEYID = 7
2,774,979 UART: [afmc] AUTHORITY.KEYID = 5
2,810,606 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,016 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,767 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,496 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,379 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,098 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,919 UART: [afmc] --
2,853,823 UART: [cold-reset] --
2,854,635 UART: [state] Locking Datavault
2,856,076 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,680 UART: [state] Locking ICCM
2,857,296 UART: [exit] Launching FMC @ 0x40000130
2,862,625 UART:
2,862,641 UART: Running Caliptra FMC ...
2,863,049 UART:
2,863,103 UART: [state] CFI Enabled
2,873,928 UART: [fht] FMC Alias Private Key: 7
2,981,673 UART: [art] Extend RT PCRs Done
2,982,101 UART: [art] Lock RT PCRs Done
2,983,325 UART: [art] Populate DV Done
2,991,784 UART: [fht] FMC Alias Private Key: 7
2,992,842 UART: [art] Derive CDI
2,993,122 UART: [art] Store in in slot 0x4
3,078,657 UART: [art] Derive Key Pair
3,079,017 UART: [art] Store priv key in slot 0x5
3,091,893 UART: [art] Derive Key Pair - Done
3,106,895 UART: [art] Signing Cert with AUTHO
3,107,375 UART: RITY.KEYID = 7
3,122,279 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,044 UART: [art] PUB.X = 6CA24D6395E7F523BC77701D9EB061A3756B0257E8A95EDD36292F3F92F6B4B27B2405CD10999496F8DD4B412B1A89CD
3,129,812 UART: [art] PUB.Y = A1AA92086CFD2435ED52089F7B7865A129233CC07D5F6BD77CD47EAA079D467F0B4DB505A7B18A34D5813906D67115B5
3,136,748 UART: [art] SIG.R = 792ED483D5E45BE37E853D2F7ABD29D01395A3F8124EB5F6B69AE88C579D22E992CB4BF4DF758A6FFCEB3E6A65D3EB59
3,143,538 UART: [art] SIG.S = 25AC0605FD6F8C22880529CE0A8625F092CACFF074AC2135ED4FDC8A010256DEF296CF27258C313BB7234BEB723AA601
3,167,026 UART: Caliptra RT
3,167,279 UART: [state] CFI Enabled
3,274,298 UART: [rt] RT listening for mailbox commands...
3,274,968 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,392 UART: [rt]cmd =0x4c4d5356, len=1672
3,845,226 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,640 ready_for_fw is high
1,055,640 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,667 >>> mbox cmd response: success
2,684,339 UART:
2,684,355 UART: Running Caliptra FMC ...
2,684,763 UART:
2,684,817 UART: [state] CFI Enabled
2,695,358 UART: [fht] FMC Alias Private Key: 7
2,802,987 UART: [art] Extend RT PCRs Done
2,803,415 UART: [art] Lock RT PCRs Done
2,805,049 UART: [art] Populate DV Done
2,813,302 UART: [fht] FMC Alias Private Key: 7
2,814,330 UART: [art] Derive CDI
2,814,610 UART: [art] Store in in slot 0x4
2,899,727 UART: [art] Derive Key Pair
2,900,087 UART: [art] Store priv key in slot 0x5
2,912,905 UART: [art] Derive Key Pair - Done
2,927,770 UART: [art] Signing Cert with AUTHO
2,928,250 UART: RITY.KEYID = 7
2,943,956 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,721 UART: [art] PUB.X = 06C63069C3C27152CDFB44BBBA4633BFDD3284066A923D175A1FF072AC6379671BC8FDED484CB79D77D09FF3317DA4A2
2,951,497 UART: [art] PUB.Y = AA6E530A29B77B7B4B0D5F615E117D9E0054EF44822AC3F46114F1F007147C1565493707E34CB28F17FBC96C13A8A10E
2,958,412 UART: [art] SIG.R = 88ADE0F2559EBF24A464DFEA27285C277FBB4B7462322508D6ECCA34DD4E12A60E03585183C02EC5280C906B2A061E22
2,965,173 UART: [art] SIG.S = 3BDE013D78E87778F78A5E4144AC8F9752500D42460FFB2826736A15CF702C5DEAD506D991D178CB758132D2C760971C
2,989,294 UART: Caliptra RT
2,989,547 UART: [state] CFI Enabled
3,097,484 UART: [rt] RT listening for mailbox commands...
3,098,154 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,946 UART: [rt]cmd =0x4c4d5356, len=1672
3,668,758 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,516 UART: [kat] ++
895,668 UART: [kat] sha1
899,698 UART: [kat] SHA2-256
901,638 UART: [kat] SHA2-384
904,399 UART: [kat] SHA2-512-ACC
906,300 UART: [kat] ECC-384
916,443 UART: [kat] HMAC-384Kdf
921,027 UART: [kat] LMS
1,169,339 UART: [kat] --
1,170,018 UART: [cold-reset] ++
1,170,404 UART: [fht] FHT @ 0x50003400
1,173,090 UART: [idev] ++
1,173,258 UART: [idev] CDI.KEYID = 6
1,173,619 UART: [idev] SUBJECT.KEYID = 7
1,174,044 UART: [idev] UDS.KEYID = 0
1,174,390 ready_for_fw is high
1,174,390 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,824 UART: [idev] Erasing UDS.KEYID = 0
1,199,496 UART: [idev] Sha1 KeyId Algorithm
1,208,308 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,075 UART: [ldev] SUBJECT.KEYID = 5
1,210,502 UART: [ldev] AUTHORITY.KEYID = 7
1,210,965 UART: [ldev] FE.KEYID = 1
1,216,171 UART: [ldev] Erasing FE.KEYID = 1
1,242,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,255 UART: [ldev] --
1,281,725 UART: [fwproc] Wait for Commands...
1,282,410 UART: [fwproc] Recv command 0x46574c44
1,283,143 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,185 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,494 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,374 >>> mbox cmd response: success
2,773,435 UART: [afmc] ++
2,773,603 UART: [afmc] CDI.KEYID = 6
2,773,966 UART: [afmc] SUBJECT.KEYID = 7
2,774,392 UART: [afmc] AUTHORITY.KEYID = 5
2,810,433 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,825 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,576 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,305 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,188 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,907 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,888 UART: [afmc] --
2,853,806 UART: [cold-reset] --
2,854,780 UART: [state] Locking Datavault
2,855,711 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,315 UART: [state] Locking ICCM
2,856,941 UART: [exit] Launching FMC @ 0x40000130
2,862,270 UART:
2,862,286 UART: Running Caliptra FMC ...
2,862,694 UART:
2,862,837 UART: [state] CFI Enabled
2,873,578 UART: [fht] FMC Alias Private Key: 7
2,981,607 UART: [art] Extend RT PCRs Done
2,982,035 UART: [art] Lock RT PCRs Done
2,983,435 UART: [art] Populate DV Done
2,991,640 UART: [fht] FMC Alias Private Key: 7
2,992,670 UART: [art] Derive CDI
2,992,950 UART: [art] Store in in slot 0x4
3,078,723 UART: [art] Derive Key Pair
3,079,083 UART: [art] Store priv key in slot 0x5
3,091,955 UART: [art] Derive Key Pair - Done
3,106,387 UART: [art] Signing Cert with AUTHO
3,106,867 UART: RITY.KEYID = 7
3,122,161 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,926 UART: [art] PUB.X = 12C921C8153CA11E56E25E3EB7D0AF8C1E0855D90EEF4DF047018AFD708DC130747F65AD6CDAB13911DEC96CB67FDE6D
3,129,707 UART: [art] PUB.Y = 536D6AF5FF5BB1B90ABF07631A6F1FD6071D28FD7585D0DE1275B75B1FC4AF19C458276F2E0C353B8FF86633D4496128
3,136,653 UART: [art] SIG.R = 2D55F28C447159A76AB7AAA81659BB9CEF1F090BF4148BA5D59BA65ECDA0DF215AA1FA2A8758EEF0E2F3CEA7A2334063
3,143,439 UART: [art] SIG.S = E73E7A3B85E26B5F75A4D80A5CB5DA7EFBC9D9FE4427E290D4FCAA4488936BC55EED0D9FF193243442C14B24E38D93D6
3,167,420 UART: Caliptra RT
3,167,765 UART: [state] CFI Enabled
3,275,448 UART: [rt] RT listening for mailbox commands...
3,276,118 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,876 UART: [rt]cmd =0x4c4d5356, len=1672
3,846,664 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,587 ready_for_fw is high
1,056,587 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,904 >>> mbox cmd response: success
2,685,088 UART:
2,685,104 UART: Running Caliptra FMC ...
2,685,512 UART:
2,685,655 UART: [state] CFI Enabled
2,696,092 UART: [fht] FMC Alias Private Key: 7
2,804,193 UART: [art] Extend RT PCRs Done
2,804,621 UART: [art] Lock RT PCRs Done
2,806,263 UART: [art] Populate DV Done
2,814,528 UART: [fht] FMC Alias Private Key: 7
2,815,484 UART: [art] Derive CDI
2,815,764 UART: [art] Store in in slot 0x4
2,901,475 UART: [art] Derive Key Pair
2,901,835 UART: [art] Store priv key in slot 0x5
2,915,153 UART: [art] Derive Key Pair - Done
2,929,681 UART: [art] Signing Cert with AUTHO
2,930,161 UART: RITY.KEYID = 7
2,945,299 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,064 UART: [art] PUB.X = 731C9E19E0E2607B74164042826B4C95B9CF6EEB244F479753E38EBA1B1D4144F27088707B4672477F8E4066D29F94FB
2,952,828 UART: [art] PUB.Y = 9C5823BD26CF42A364684F9F3CE973D3A57F458DDB7B1A85F9616934BBE23908DD34DF6828FB778212DC99A3DEF50FB6
2,959,782 UART: [art] SIG.R = 7369F9E06D8799B3009D490984428B61416499A200ED2C0B8CC28FF7762FEB952CED12FDBD3806454C2F85704C3F795E
2,966,497 UART: [art] SIG.S = 3B265AF8DBDF59E1E017A0B981230B09BB8D54C325F14053F27F254C1E85565E06A9437A455E533ED7B885E0D75E17A4
2,990,855 UART: Caliptra RT
2,991,200 UART: [state] CFI Enabled
3,098,443 UART: [rt] RT listening for mailbox commands...
3,099,113 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,481 UART: [rt]cmd =0x4c4d5356, len=1672
3,669,013 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
86,027 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,605 UART: [kat] SHA2-256
881,536 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,651 UART: [kat] ++
885,803 UART: [kat] sha1
889,827 UART: [kat] SHA2-256
891,765 UART: [kat] SHA2-384
894,346 UART: [kat] SHA2-512-ACC
896,247 UART: [kat] ECC-384
901,790 UART: [kat] HMAC-384Kdf
906,262 UART: [kat] LMS
1,474,458 UART: [kat] --
1,475,639 UART: [cold-reset] ++
1,476,121 UART: [fht] Storing FHT @ 0x50003400
1,479,032 UART: [idev] ++
1,479,200 UART: [idev] CDI.KEYID = 6
1,479,560 UART: [idev] SUBJECT.KEYID = 7
1,479,984 UART: [idev] UDS.KEYID = 0
1,480,329 ready_for_fw is high
1,480,329 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,826 UART: [idev] Erasing UDS.KEYID = 0
1,504,790 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,394 UART: [idev] --
1,514,521 UART: [ldev] ++
1,514,689 UART: [ldev] CDI.KEYID = 6
1,515,052 UART: [ldev] SUBJECT.KEYID = 5
1,515,478 UART: [ldev] AUTHORITY.KEYID = 7
1,515,941 UART: [ldev] FE.KEYID = 1
1,521,251 UART: [ldev] Erasing FE.KEYID = 1
1,546,130 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,938 UART: [ldev] --
1,585,247 UART: [fwproc] Waiting for Commands...
1,586,032 UART: [fwproc] Received command 0x46574c44
1,586,823 UART: [fwproc] Received Image of size 114332 bytes
2,883,773 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,737 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,089 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,020 >>> mbox cmd response: success
3,077,050 UART: [afmc] ++
3,077,218 UART: [afmc] CDI.KEYID = 6
3,077,580 UART: [afmc] SUBJECT.KEYID = 7
3,078,005 UART: [afmc] AUTHORITY.KEYID = 5
3,112,772 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,070 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,850 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,578 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,463 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,153 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,994 UART: [afmc] --
3,156,064 UART: [cold-reset] --
3,156,876 UART: [state] Locking Datavault
3,158,071 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,675 UART: [state] Locking ICCM
3,159,141 UART: [exit] Launching FMC @ 0x40000130
3,164,470 UART:
3,164,486 UART: Running Caliptra FMC ...
3,164,894 UART:
3,164,948 UART: [state] CFI Enabled
3,175,575 UART: [fht] FMC Alias Private Key: 7
3,283,928 UART: [art] Extend RT PCRs Done
3,284,356 UART: [art] Lock RT PCRs Done
3,286,270 UART: [art] Populate DV Done
3,294,423 UART: [fht] FMC Alias Private Key: 7
3,295,475 UART: [art] Derive CDI
3,295,755 UART: [art] Store in in slot 0x4
3,381,084 UART: [art] Derive Key Pair
3,381,444 UART: [art] Store priv key in slot 0x5
3,394,424 UART: [art] Derive Key Pair - Done
3,409,462 UART: [art] Signing Cert with AUTHO
3,409,942 UART: RITY.KEYID = 7
3,425,284 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,049 UART: [art] PUB.X = 001099064D75480FC4B5F6CD5B7784BF39138A128F4016D9D297F146533944BF420068B6D00B17D07B49547EF8BAEEC9
3,432,762 UART: [art] PUB.Y = DAAA433AE4770AE3090412120CC9D1087B0C9344E98AA3C45E03A70CC2E193AB0DE0315AB00DF470DC98CBE2AE3CB21F
3,439,700 UART: [art] SIG.R = BD6253107CAF6FFF8D703420074CBDA1ECD44ABCC8F279A2BB880BBA95B1092A79198847B689CFA49E51B1F8A66CA08D
3,446,479 UART: [art] SIG.S = 4AB376E026DD9E1564D0398051E619A89958632C840F816385A991D4BE3B9D6DB9CA0E66CF3D4E4F1BAA40A2396D3ECB
3,470,056 UART: Caliptra RT
3,470,309 UART: [state] CFI Enabled
3,579,018 UART: [rt] RT listening for mailbox commands...
3,579,688 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,216 UART: [rt]cmd =0x4c4d5356, len=1672
3,872,522 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,403 ready_for_fw is high
1,362,403 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,342 >>> mbox cmd response: success
2,987,946 UART:
2,987,962 UART: Running Caliptra FMC ...
2,988,370 UART:
2,988,424 UART: [state] CFI Enabled
2,998,885 UART: [fht] FMC Alias Private Key: 7
3,106,332 UART: [art] Extend RT PCRs Done
3,106,760 UART: [art] Lock RT PCRs Done
3,108,128 UART: [art] Populate DV Done
3,116,559 UART: [fht] FMC Alias Private Key: 7
3,117,591 UART: [art] Derive CDI
3,117,871 UART: [art] Store in in slot 0x4
3,203,548 UART: [art] Derive Key Pair
3,203,908 UART: [art] Store priv key in slot 0x5
3,216,688 UART: [art] Derive Key Pair - Done
3,231,461 UART: [art] Signing Cert with AUTHO
3,231,941 UART: RITY.KEYID = 7
3,247,245 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,010 UART: [art] PUB.X = A2EABE481522AFBC7B94DD30CCE33A0C78D9F0B99414170C6D806A114532CFE75323D58696794C0E7334795AE726DD29
3,254,775 UART: [art] PUB.Y = 8304DB9E4AA730394A2F964E11C808DD30CFD23B6DC14FA9FA0AC2C79F1779B95EB3E13EFED47A7018773F5CEEFE1349
3,261,734 UART: [art] SIG.R = F5714A8BEBA1171190FD3B8E0D0429A3F2F526556A95315C5808E1C272FB8BCA7EB4F9FE2E77138123DA4B1853859B5C
3,268,501 UART: [art] SIG.S = 9CCDBCE588E568477B2024152D54D5918F02383A6690E9F0F8474D5277413F58268FB58C581850938691A0EE130B23F2
3,292,338 UART: Caliptra RT
3,292,591 UART: [state] CFI Enabled
3,399,943 UART: [rt] RT listening for mailbox commands...
3,400,613 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,169 UART: [rt]cmd =0x4c4d5356, len=1672
3,693,579 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,817 UART: [state] LifecycleState = Unprovisioned
86,472 UART: [state] DebugLocked = No
87,204 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,732 UART: [kat] SHA2-256
882,663 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,778 UART: [kat] ++
886,930 UART: [kat] sha1
891,244 UART: [kat] SHA2-256
893,182 UART: [kat] SHA2-384
896,095 UART: [kat] SHA2-512-ACC
897,996 UART: [kat] ECC-384
903,817 UART: [kat] HMAC-384Kdf
908,475 UART: [kat] LMS
1,476,671 UART: [kat] --
1,477,670 UART: [cold-reset] ++
1,478,180 UART: [fht] Storing FHT @ 0x50003400
1,480,949 UART: [idev] ++
1,481,117 UART: [idev] CDI.KEYID = 6
1,481,477 UART: [idev] SUBJECT.KEYID = 7
1,481,901 UART: [idev] UDS.KEYID = 0
1,482,246 ready_for_fw is high
1,482,246 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,987 UART: [idev] Erasing UDS.KEYID = 0
1,506,577 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,987 UART: [idev] --
1,516,038 UART: [ldev] ++
1,516,206 UART: [ldev] CDI.KEYID = 6
1,516,569 UART: [ldev] SUBJECT.KEYID = 5
1,516,995 UART: [ldev] AUTHORITY.KEYID = 7
1,517,458 UART: [ldev] FE.KEYID = 1
1,522,778 UART: [ldev] Erasing FE.KEYID = 1
1,548,047 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,947 UART: [ldev] --
1,587,280 UART: [fwproc] Waiting for Commands...
1,587,897 UART: [fwproc] Received command 0x46574c44
1,588,688 UART: [fwproc] Received Image of size 114332 bytes
2,886,400 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,092 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,444 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,311 >>> mbox cmd response: success
3,079,339 UART: [afmc] ++
3,079,507 UART: [afmc] CDI.KEYID = 6
3,079,869 UART: [afmc] SUBJECT.KEYID = 7
3,080,294 UART: [afmc] AUTHORITY.KEYID = 5
3,116,077 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,643 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,423 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,151 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,036 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,726 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,711 UART: [afmc] --
3,159,687 UART: [cold-reset] --
3,160,383 UART: [state] Locking Datavault
3,161,408 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,012 UART: [state] Locking ICCM
3,162,658 UART: [exit] Launching FMC @ 0x40000130
3,167,987 UART:
3,168,003 UART: Running Caliptra FMC ...
3,168,411 UART:
3,168,554 UART: [state] CFI Enabled
3,179,063 UART: [fht] FMC Alias Private Key: 7
3,286,804 UART: [art] Extend RT PCRs Done
3,287,232 UART: [art] Lock RT PCRs Done
3,288,876 UART: [art] Populate DV Done
3,297,119 UART: [fht] FMC Alias Private Key: 7
3,298,091 UART: [art] Derive CDI
3,298,371 UART: [art] Store in in slot 0x4
3,384,250 UART: [art] Derive Key Pair
3,384,610 UART: [art] Store priv key in slot 0x5
3,397,932 UART: [art] Derive Key Pair - Done
3,412,352 UART: [art] Signing Cert with AUTHO
3,412,832 UART: RITY.KEYID = 7
3,428,080 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,845 UART: [art] PUB.X = 3D3F5F6A5CB4007A43D60B8F6A3FED061D4157F8C5E5E247B2D3C2BDF7B2360CAC3DEE21315FC6A469C44A2D95A5CB83
3,435,604 UART: [art] PUB.Y = 48D8AC3C3090D25B4884F9BC7340A76E36F30AA787BE8CD950351D5444B0EECA28CD3286215A8B20D23BA32B641CC6FC
3,442,561 UART: [art] SIG.R = 4787086F0C74F735DBE6308CA8E316A9A68B2C08353D664D404B9B44985B1BC2B270933364BA66F14795666309C5A9E8
3,449,311 UART: [art] SIG.S = 2AE6CD57447C3E9B616282FD8EEF3325069A07A024F330171109D19D53951CCFE06058A50F7C0FFBE9C912DDD2F81081
3,473,111 UART: Caliptra RT
3,473,456 UART: [state] CFI Enabled
3,582,064 UART: [rt] RT listening for mailbox commands...
3,582,734 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,556 UART: [rt]cmd =0x4c4d5356, len=1672
3,876,014 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,338 ready_for_fw is high
1,363,338 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,599 >>> mbox cmd response: success
2,989,795 UART:
2,989,811 UART: Running Caliptra FMC ...
2,990,219 UART:
2,990,362 UART: [state] CFI Enabled
3,001,049 UART: [fht] FMC Alias Private Key: 7
3,108,740 UART: [art] Extend RT PCRs Done
3,109,168 UART: [art] Lock RT PCRs Done
3,110,820 UART: [art] Populate DV Done
3,118,945 UART: [fht] FMC Alias Private Key: 7
3,120,127 UART: [art] Derive CDI
3,120,407 UART: [art] Store in in slot 0x4
3,205,972 UART: [art] Derive Key Pair
3,206,332 UART: [art] Store priv key in slot 0x5
3,219,800 UART: [art] Derive Key Pair - Done
3,234,502 UART: [art] Signing Cert with AUTHO
3,234,982 UART: RITY.KEYID = 7
3,250,126 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,891 UART: [art] PUB.X = FF7939DB3DCE16051833E4E020E4148A1D9E8ECBD284E6BECEFECBD1B5467D9B1C351D948F092D1F00A4B2E92CA9D865
3,257,653 UART: [art] PUB.Y = D116639D03110ABB41D7E3C5E4E8FB6D08FBF1059241E16EC0879A6BDE51626FDCF25C2519DFDFE5BA93CC72B598D51F
3,264,609 UART: [art] SIG.R = C0E1DBB6CA9D33E33E7090E3C16C572FDA4EE24F130D1BE1629F19FCCF9AF69B8DBD03838199FCF9B6E7463FFFB2B883
3,271,397 UART: [art] SIG.S = 3266328B7FBD42909220BC9178C289974EC596C117AC97A7E140C22839228C5F3D8F512E3EB4845D0A34566FA60FCDA5
3,295,016 UART: Caliptra RT
3,295,361 UART: [state] CFI Enabled
3,403,466 UART: [rt] RT listening for mailbox commands...
3,404,136 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,844 UART: [rt]cmd =0x4c4d5356, len=1672
3,697,264 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
893,378 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,503 UART: [kat] ++
897,655 UART: [kat] sha1
901,751 UART: [kat] SHA2-256
903,691 UART: [kat] SHA2-384
906,504 UART: [kat] SHA2-512-ACC
908,405 UART: [kat] ECC-384
918,460 UART: [kat] HMAC-384Kdf
922,900 UART: [kat] LMS
1,171,228 UART: [kat] --
1,172,177 UART: [cold-reset] ++
1,172,509 UART: [fht] FHT @ 0x50003400
1,174,992 UART: [idev] ++
1,175,160 UART: [idev] CDI.KEYID = 6
1,175,520 UART: [idev] SUBJECT.KEYID = 7
1,175,944 UART: [idev] UDS.KEYID = 0
1,176,289 ready_for_fw is high
1,176,289 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,932 UART: [idev] Erasing UDS.KEYID = 0
1,200,953 UART: [idev] Sha1 KeyId Algorithm
1,209,461 UART: [idev] --
1,210,545 UART: [ldev] ++
1,210,713 UART: [ldev] CDI.KEYID = 6
1,211,076 UART: [ldev] SUBJECT.KEYID = 5
1,211,502 UART: [ldev] AUTHORITY.KEYID = 7
1,211,965 UART: [ldev] FE.KEYID = 1
1,217,297 UART: [ldev] Erasing FE.KEYID = 1
1,243,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,513 UART: [ldev] --
1,282,984 UART: [fwproc] Wait for Commands...
1,283,788 UART: [fwproc] Recv command 0x46574c44
1,284,516 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,940 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,244 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,113 >>> mbox cmd response: success
2,776,337 UART: [afmc] ++
2,776,505 UART: [afmc] CDI.KEYID = 6
2,776,867 UART: [afmc] SUBJECT.KEYID = 7
2,777,292 UART: [afmc] AUTHORITY.KEYID = 5
2,812,955 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,118 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,846 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,731 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,450 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,172 UART: [afmc] --
2,856,188 UART: [cold-reset] --
2,856,822 UART: [state] Locking Datavault
2,857,965 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,569 UART: [state] Locking ICCM
2,859,065 UART: [exit] Launching FMC @ 0x40000130
2,864,394 UART:
2,864,410 UART: Running Caliptra FMC ...
2,864,818 UART:
2,864,872 UART: [state] CFI Enabled
2,875,313 UART: [fht] FMC Alias Private Key: 7
2,983,318 UART: [art] Extend RT PCRs Done
2,983,746 UART: [art] Lock RT PCRs Done
2,985,444 UART: [art] Populate DV Done
2,993,847 UART: [fht] FMC Alias Private Key: 7
2,994,909 UART: [art] Derive CDI
2,995,189 UART: [art] Store in in slot 0x4
3,080,738 UART: [art] Derive Key Pair
3,081,098 UART: [art] Store priv key in slot 0x5
3,094,330 UART: [art] Derive Key Pair - Done
3,109,002 UART: [art] Signing Cert with AUTHO
3,109,482 UART: RITY.KEYID = 7
3,124,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,209 UART: [art] PUB.X = 23F2E5A9D7795734DC6C11D392B792851F4F08B3AEFB83E8504B895C06E9978B2EC60569886450C253260CF73D7EF462
3,131,963 UART: [art] PUB.Y = E4EE5A724F254C6918EA1EF262A2193A312189D1B7B35F057A9B03A0E711EDD2BCF046B0F420E630B52F9E097DC9900F
3,138,909 UART: [art] SIG.R = 63EC346E8002BEDD604A17FFF47044FD22BD98B2CC155CF030C752A6E4EC140A964FC8C282ADC584E8EE4999B29EF2EF
3,145,691 UART: [art] SIG.S = 2ECE536601962C4072E4E2B77B2F093FF00026B73D5BEAF243D8CB1ED9C85E150EC59F88CB774B4856AC7953262779B7
3,169,247 UART: Caliptra RT
3,169,500 UART: [state] CFI Enabled
3,277,131 UART: [rt] RT listening for mailbox commands...
3,277,801 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,299 UART: [rt]cmd =0x4c4d5356, len=1672
3,570,841 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,567 ready_for_fw is high
1,059,567 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,961 >>> mbox cmd response: success
2,687,385 UART:
2,687,401 UART: Running Caliptra FMC ...
2,687,809 UART:
2,687,863 UART: [state] CFI Enabled
2,698,264 UART: [fht] FMC Alias Private Key: 7
2,806,331 UART: [art] Extend RT PCRs Done
2,806,759 UART: [art] Lock RT PCRs Done
2,808,415 UART: [art] Populate DV Done
2,816,366 UART: [fht] FMC Alias Private Key: 7
2,817,346 UART: [art] Derive CDI
2,817,626 UART: [art] Store in in slot 0x4
2,903,575 UART: [art] Derive Key Pair
2,903,935 UART: [art] Store priv key in slot 0x5
2,915,971 UART: [art] Derive Key Pair - Done
2,930,749 UART: [art] Signing Cert with AUTHO
2,931,229 UART: RITY.KEYID = 7
2,946,177 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,942 UART: [art] PUB.X = 6ED95B88FE1B61CC5224631D3443E51F804389ECF86C2F33855D17EFE4F8C4E3FA1350376E55F93015748361D105EAF3
2,953,709 UART: [art] PUB.Y = 7C73341B3CE471B96FC54F5F7F970184307696E19781D7C0F5B68F37386918E9A618729BD90D9D28054607CEF979752D
2,960,637 UART: [art] SIG.R = 9EDE679848CC1442D0488D7CF08AEBA3F852EE1F94F6E31E8F36995C277AF3E977B796FA802454A37B0012C9BAD489A3
2,967,393 UART: [art] SIG.S = 7856300DF4B73C0D0AB667D10DDD10AEC767BC25209A50C29A16BCF5FBDBD7D091C4DC27A79BDAC4BD5BDDE7C350AF69
2,991,692 UART: Caliptra RT
2,991,945 UART: [state] CFI Enabled
3,100,122 UART: [rt] RT listening for mailbox commands...
3,100,792 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,300 UART: [rt]cmd =0x4c4d5356, len=1672
3,393,586 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
893,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,876 UART: [kat] ++
898,028 UART: [kat] sha1
902,090 UART: [kat] SHA2-256
904,030 UART: [kat] SHA2-384
906,991 UART: [kat] SHA2-512-ACC
908,892 UART: [kat] ECC-384
918,469 UART: [kat] HMAC-384Kdf
923,097 UART: [kat] LMS
1,171,425 UART: [kat] --
1,172,656 UART: [cold-reset] ++
1,173,142 UART: [fht] FHT @ 0x50003400
1,175,825 UART: [idev] ++
1,175,993 UART: [idev] CDI.KEYID = 6
1,176,353 UART: [idev] SUBJECT.KEYID = 7
1,176,777 UART: [idev] UDS.KEYID = 0
1,177,122 ready_for_fw is high
1,177,122 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,625 UART: [idev] Erasing UDS.KEYID = 0
1,201,522 UART: [idev] Sha1 KeyId Algorithm
1,210,100 UART: [idev] --
1,211,062 UART: [ldev] ++
1,211,230 UART: [ldev] CDI.KEYID = 6
1,211,593 UART: [ldev] SUBJECT.KEYID = 5
1,212,019 UART: [ldev] AUTHORITY.KEYID = 7
1,212,482 UART: [ldev] FE.KEYID = 1
1,217,786 UART: [ldev] Erasing FE.KEYID = 1
1,244,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,684 UART: [ldev] --
1,283,969 UART: [fwproc] Wait for Commands...
1,284,567 UART: [fwproc] Recv command 0x46574c44
1,285,295 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,957 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,261 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,968 >>> mbox cmd response: success
2,776,178 UART: [afmc] ++
2,776,346 UART: [afmc] CDI.KEYID = 6
2,776,708 UART: [afmc] SUBJECT.KEYID = 7
2,777,133 UART: [afmc] AUTHORITY.KEYID = 5
2,812,076 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,437 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,185 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,913 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,798 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,517 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,177 UART: [afmc] --
2,855,243 UART: [cold-reset] --
2,856,229 UART: [state] Locking Datavault
2,857,122 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,726 UART: [state] Locking ICCM
2,858,336 UART: [exit] Launching FMC @ 0x40000130
2,863,665 UART:
2,863,681 UART: Running Caliptra FMC ...
2,864,089 UART:
2,864,232 UART: [state] CFI Enabled
2,874,777 UART: [fht] FMC Alias Private Key: 7
2,982,758 UART: [art] Extend RT PCRs Done
2,983,186 UART: [art] Lock RT PCRs Done
2,984,692 UART: [art] Populate DV Done
2,993,073 UART: [fht] FMC Alias Private Key: 7
2,994,203 UART: [art] Derive CDI
2,994,483 UART: [art] Store in in slot 0x4
3,080,244 UART: [art] Derive Key Pair
3,080,604 UART: [art] Store priv key in slot 0x5
3,093,606 UART: [art] Derive Key Pair - Done
3,108,550 UART: [art] Signing Cert with AUTHO
3,109,030 UART: RITY.KEYID = 7
3,124,000 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,765 UART: [art] PUB.X = 078E4C4B2A183A129902BC691BA0C0642E14CFE0D89792DB95F505EE47A3F58A9EC80E2CF292C8A005436BCE6AAA210B
3,131,529 UART: [art] PUB.Y = 34A8B46DE315DC5A69E2E0F5A7739F5832CEF934C6D7C5FE5BA880C0E628C705D5CDA63E274EB7B2B41A32055C27F4C9
3,138,487 UART: [art] SIG.R = B4AB992958BE146523C9254576A16C38A84E92E50A89F2A9BFE37C610649773CD56EBA36FB0C4E69F3DF7A5A57557223
3,145,250 UART: [art] SIG.S = F901246BA89C3A476AFAE98AEBF25383CFBF4D8802FED337D650AC5137D44B41D4B21A41268B154D4F1097F5856B3DFC
3,169,123 UART: Caliptra RT
3,169,468 UART: [state] CFI Enabled
3,278,070 UART: [rt] RT listening for mailbox commands...
3,278,740 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,386 UART: [rt]cmd =0x4c4d5356, len=1672
3,572,144 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,972 ready_for_fw is high
1,060,972 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,601 >>> mbox cmd response: success
2,689,337 UART:
2,689,353 UART: Running Caliptra FMC ...
2,689,761 UART:
2,689,904 UART: [state] CFI Enabled
2,700,425 UART: [fht] FMC Alias Private Key: 7
2,808,410 UART: [art] Extend RT PCRs Done
2,808,838 UART: [art] Lock RT PCRs Done
2,810,064 UART: [art] Populate DV Done
2,818,351 UART: [fht] FMC Alias Private Key: 7
2,819,419 UART: [art] Derive CDI
2,819,699 UART: [art] Store in in slot 0x4
2,905,356 UART: [art] Derive Key Pair
2,905,716 UART: [art] Store priv key in slot 0x5
2,919,118 UART: [art] Derive Key Pair - Done
2,934,018 UART: [art] Signing Cert with AUTHO
2,934,498 UART: RITY.KEYID = 7
2,950,046 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,811 UART: [art] PUB.X = 1A92AB610476543FF2536B60F5A5CAC270FF58EEFF0018FBE3BDE889B34C036FA5CE16F43092ABFDD0B39BE910E60E1D
2,957,570 UART: [art] PUB.Y = D549DD754F7D10DAF785AC6C894B0F58B77AAE87C864705EDE35FE28013A3378938EC5ED30DC7A5C6BC6B767BAB2656E
2,964,530 UART: [art] SIG.R = 34C4094A25180394084DD6B1CD76671A85B7E1A0CED7B6810531A9116809203663E086377B9B18B32A1065B91358026A
2,971,266 UART: [art] SIG.S = CB25507393865D8E7CD25CAA581726A1F7A10CE6DC548E10719CA7664D194CFB9C69AF016B47DFE89968A3AA680A0D2C
2,995,393 UART: Caliptra RT
2,995,738 UART: [state] CFI Enabled
3,104,179 UART: [rt] RT listening for mailbox commands...
3,104,849 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,457 UART: [rt]cmd =0x4c4d5356, len=1672
3,397,795 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,295 UART: [kat] ++
895,447 UART: [kat] sha1
899,615 UART: [kat] SHA2-256
901,555 UART: [kat] SHA2-384
904,146 UART: [kat] SHA2-512-ACC
906,047 UART: [kat] ECC-384
915,842 UART: [kat] HMAC-384Kdf
920,538 UART: [kat] LMS
1,168,850 UART: [kat] --
1,169,783 UART: [cold-reset] ++
1,170,127 UART: [fht] FHT @ 0x50003400
1,172,943 UART: [idev] ++
1,173,111 UART: [idev] CDI.KEYID = 6
1,173,472 UART: [idev] SUBJECT.KEYID = 7
1,173,897 UART: [idev] UDS.KEYID = 0
1,174,243 ready_for_fw is high
1,174,243 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,893 UART: [idev] Erasing UDS.KEYID = 0
1,199,151 UART: [idev] Sha1 KeyId Algorithm
1,208,157 UART: [idev] --
1,209,162 UART: [ldev] ++
1,209,330 UART: [ldev] CDI.KEYID = 6
1,209,694 UART: [ldev] SUBJECT.KEYID = 5
1,210,121 UART: [ldev] AUTHORITY.KEYID = 7
1,210,584 UART: [ldev] FE.KEYID = 1
1,215,730 UART: [ldev] Erasing FE.KEYID = 1
1,241,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,452 UART: [ldev] --
1,280,958 UART: [fwproc] Wait for Commands...
1,281,701 UART: [fwproc] Recv command 0x46574c44
1,282,434 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,094 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,403 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,115 >>> mbox cmd response: success
2,773,150 UART: [afmc] ++
2,773,318 UART: [afmc] CDI.KEYID = 6
2,773,681 UART: [afmc] SUBJECT.KEYID = 7
2,774,107 UART: [afmc] AUTHORITY.KEYID = 5
2,809,474 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,441 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,170 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,053 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,772 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,565 UART: [afmc] --
2,852,531 UART: [cold-reset] --
2,853,337 UART: [state] Locking Datavault
2,854,856 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,460 UART: [state] Locking ICCM
2,856,072 UART: [exit] Launching FMC @ 0x40000130
2,861,401 UART:
2,861,417 UART: Running Caliptra FMC ...
2,861,825 UART:
2,861,879 UART: [state] CFI Enabled
2,872,450 UART: [fht] FMC Alias Private Key: 7
2,980,453 UART: [art] Extend RT PCRs Done
2,980,881 UART: [art] Lock RT PCRs Done
2,982,529 UART: [art] Populate DV Done
2,990,998 UART: [fht] FMC Alias Private Key: 7
2,992,164 UART: [art] Derive CDI
2,992,444 UART: [art] Store in in slot 0x4
3,077,937 UART: [art] Derive Key Pair
3,078,297 UART: [art] Store priv key in slot 0x5
3,091,151 UART: [art] Derive Key Pair - Done
3,106,038 UART: [art] Signing Cert with AUTHO
3,106,518 UART: RITY.KEYID = 7
3,121,864 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,629 UART: [art] PUB.X = 72A09A5D4DE54F21411503548975E14B1FB282D9A00538D0EC1F918DF560871E496702603F4D79B4DDF625EC3E775221
3,129,384 UART: [art] PUB.Y = E9BA9DE4D5E75E8FEB3FBB15C6183616767D08FCECF0314887EA0780591EF1980E1900120222A8B794B52C68CEDF4FA3
3,136,310 UART: [art] SIG.R = 639541048015A6CB19AA8EDF9884BBE42129E4D4EC64AD26644E34E951F6F678CD784082742E27A52BE3614563C145CC
3,143,075 UART: [art] SIG.S = 8CE80C41DE92371C2449863E039893F782E733538DF5E7DEBC664D14E4B7C2C00BB328804B5160F2FE81C35F5DC296AD
3,166,935 UART: Caliptra RT
3,167,188 UART: [state] CFI Enabled
3,275,035 UART: [rt] RT listening for mailbox commands...
3,275,705 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,607 UART: [rt]cmd =0x4c4d5356, len=1672
3,569,119 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,736 ready_for_fw is high
1,056,736 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,123 >>> mbox cmd response: success
2,684,517 UART:
2,684,533 UART: Running Caliptra FMC ...
2,684,941 UART:
2,684,995 UART: [state] CFI Enabled
2,695,516 UART: [fht] FMC Alias Private Key: 7
2,803,185 UART: [art] Extend RT PCRs Done
2,803,613 UART: [art] Lock RT PCRs Done
2,805,015 UART: [art] Populate DV Done
2,813,368 UART: [fht] FMC Alias Private Key: 7
2,814,514 UART: [art] Derive CDI
2,814,794 UART: [art] Store in in slot 0x4
2,900,373 UART: [art] Derive Key Pair
2,900,733 UART: [art] Store priv key in slot 0x5
2,913,767 UART: [art] Derive Key Pair - Done
2,928,758 UART: [art] Signing Cert with AUTHO
2,929,238 UART: RITY.KEYID = 7
2,944,262 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,027 UART: [art] PUB.X = 2F67442BCFCAF4B1C99B02B083B4C392FBAA8BA66DF3E21E05E50A48C1EC352830738E31FF93C5A169BFA90B8B8B1DDE
2,951,807 UART: [art] PUB.Y = D06620BCA1D83FB968626A80E6F46F70E65F23BB06CE06ACFA74A5AF656C571C1F98A2E4AA85BE49400939ACDC3381A1
2,958,762 UART: [art] SIG.R = D856D0207D4895B7A6DE0CE4212EFA373DD0481DBE9083FDC9F2175C7212A928C299CE1819819BE446A21C27EEE07DAA
2,965,539 UART: [art] SIG.S = 35D1FA90520A5D0A8E4B39CF8CCFCDE8F722AE8B319FFBCB86E053DFBC1490F640EF730EEF9EE6E2215E9C8764993480
2,989,293 UART: Caliptra RT
2,989,546 UART: [state] CFI Enabled
3,096,053 UART: [rt] RT listening for mailbox commands...
3,096,723 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,361 UART: [rt]cmd =0x4c4d5356, len=1672
3,390,151 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,550 UART: [kat] ++
895,702 UART: [kat] sha1
899,942 UART: [kat] SHA2-256
901,882 UART: [kat] SHA2-384
904,653 UART: [kat] SHA2-512-ACC
906,554 UART: [kat] ECC-384
916,315 UART: [kat] HMAC-384Kdf
921,025 UART: [kat] LMS
1,169,337 UART: [kat] --
1,169,904 UART: [cold-reset] ++
1,170,256 UART: [fht] FHT @ 0x50003400
1,172,874 UART: [idev] ++
1,173,042 UART: [idev] CDI.KEYID = 6
1,173,403 UART: [idev] SUBJECT.KEYID = 7
1,173,828 UART: [idev] UDS.KEYID = 0
1,174,174 ready_for_fw is high
1,174,174 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,042 UART: [idev] Erasing UDS.KEYID = 0
1,199,424 UART: [idev] Sha1 KeyId Algorithm
1,208,260 UART: [idev] --
1,209,289 UART: [ldev] ++
1,209,457 UART: [ldev] CDI.KEYID = 6
1,209,821 UART: [ldev] SUBJECT.KEYID = 5
1,210,248 UART: [ldev] AUTHORITY.KEYID = 7
1,210,711 UART: [ldev] FE.KEYID = 1
1,216,059 UART: [ldev] Erasing FE.KEYID = 1
1,242,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,817 UART: [ldev] --
1,281,087 UART: [fwproc] Wait for Commands...
1,281,820 UART: [fwproc] Recv command 0x46574c44
1,282,553 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,939 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,789 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,098 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,904 >>> mbox cmd response: success
2,773,951 UART: [afmc] ++
2,774,119 UART: [afmc] CDI.KEYID = 6
2,774,482 UART: [afmc] SUBJECT.KEYID = 7
2,774,908 UART: [afmc] AUTHORITY.KEYID = 5
2,810,533 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,955 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,706 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,435 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,318 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,037 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,972 UART: [afmc] --
2,853,976 UART: [cold-reset] --
2,854,958 UART: [state] Locking Datavault
2,856,065 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,669 UART: [state] Locking ICCM
2,857,211 UART: [exit] Launching FMC @ 0x40000130
2,862,540 UART:
2,862,556 UART: Running Caliptra FMC ...
2,862,964 UART:
2,863,107 UART: [state] CFI Enabled
2,873,428 UART: [fht] FMC Alias Private Key: 7
2,981,477 UART: [art] Extend RT PCRs Done
2,981,905 UART: [art] Lock RT PCRs Done
2,983,215 UART: [art] Populate DV Done
2,991,584 UART: [fht] FMC Alias Private Key: 7
2,992,572 UART: [art] Derive CDI
2,992,852 UART: [art] Store in in slot 0x4
3,078,233 UART: [art] Derive Key Pair
3,078,593 UART: [art] Store priv key in slot 0x5
3,092,189 UART: [art] Derive Key Pair - Done
3,106,822 UART: [art] Signing Cert with AUTHO
3,107,302 UART: RITY.KEYID = 7
3,122,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,607 UART: [art] PUB.X = F289D52974F03245FF5C14DB2B6798B26EB4B221DAFA1D1A135EFC6DF45C902A2974990522E63CE1446237C7599D5309
3,130,371 UART: [art] PUB.Y = DC51A8DBF31C4E3EC4A292EB0CA8C788B8E952360FC42DED9F4E15A93D43EE7BE6BCBE98CA0E6EB77C036D1BB43A0BF7
3,137,338 UART: [art] SIG.R = 21E2748C01853CE8EFB2D1B5CD47989140E2188320491E73010F86EB1D1C1AE2964E6E747C542C20C5477248BA8DD0E0
3,144,097 UART: [art] SIG.S = BFDC95D373B96C4C1C4662D90AEF2DE5385F6CF015465EBBF4FF7AAFF56D18295C4F6AB6C68EB1F265CC0EDC6BBA8C99
3,168,214 UART: Caliptra RT
3,168,559 UART: [state] CFI Enabled
3,277,358 UART: [rt] RT listening for mailbox commands...
3,278,028 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,792 UART: [rt]cmd =0x4c4d5356, len=1672
3,571,342 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,059 ready_for_fw is high
1,056,059 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,888 >>> mbox cmd response: success
2,683,916 UART:
2,683,932 UART: Running Caliptra FMC ...
2,684,340 UART:
2,684,483 UART: [state] CFI Enabled
2,695,208 UART: [fht] FMC Alias Private Key: 7
2,803,421 UART: [art] Extend RT PCRs Done
2,803,849 UART: [art] Lock RT PCRs Done
2,805,487 UART: [art] Populate DV Done
2,813,568 UART: [fht] FMC Alias Private Key: 7
2,814,546 UART: [art] Derive CDI
2,814,826 UART: [art] Store in in slot 0x4
2,900,763 UART: [art] Derive Key Pair
2,901,123 UART: [art] Store priv key in slot 0x5
2,914,039 UART: [art] Derive Key Pair - Done
2,928,666 UART: [art] Signing Cert with AUTHO
2,929,146 UART: RITY.KEYID = 7
2,944,436 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,201 UART: [art] PUB.X = A583E22CA7087782D830D0E81E1AC467625FADD46768EDCB68981A4391274757A36CCD9A71EE8D845A289105A5A02E67
2,951,965 UART: [art] PUB.Y = 216FAEF74BA899FC1E692ECAAF5B5443266318CCEF832172DC21E67488B616120652B1C762CD1CE9E5E3900E4262415D
2,958,913 UART: [art] SIG.R = 372E01FD182314CE331092A29E51828339357AD718A786AC00835A0F9DB10CF0FE8807728AEA16105C07F951F929131C
2,965,638 UART: [art] SIG.S = CF7ED50B9447080E17474E435CC8CCB3D3D1E277965953CDA68A370DFF33BA63778A3206B2629FA4438E8D9E5EB02C97
2,989,234 UART: Caliptra RT
2,989,579 UART: [state] CFI Enabled
3,097,290 UART: [rt] RT listening for mailbox commands...
3,097,960 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,570 UART: [rt]cmd =0x4c4d5356, len=1672
3,390,896 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,251 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,877 UART: [kat] SHA2-256
881,808 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,923 UART: [kat] ++
886,075 UART: [kat] sha1
890,415 UART: [kat] SHA2-256
892,353 UART: [kat] SHA2-384
895,072 UART: [kat] SHA2-512-ACC
896,973 UART: [kat] ECC-384
902,790 UART: [kat] HMAC-384Kdf
907,204 UART: [kat] LMS
1,475,400 UART: [kat] --
1,476,391 UART: [cold-reset] ++
1,476,965 UART: [fht] Storing FHT @ 0x50003400
1,479,706 UART: [idev] ++
1,479,874 UART: [idev] CDI.KEYID = 6
1,480,234 UART: [idev] SUBJECT.KEYID = 7
1,480,658 UART: [idev] UDS.KEYID = 0
1,481,003 ready_for_fw is high
1,481,003 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,418 UART: [idev] Erasing UDS.KEYID = 0
1,504,578 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,208 UART: [idev] --
1,514,405 UART: [ldev] ++
1,514,573 UART: [ldev] CDI.KEYID = 6
1,514,936 UART: [ldev] SUBJECT.KEYID = 5
1,515,362 UART: [ldev] AUTHORITY.KEYID = 7
1,515,825 UART: [ldev] FE.KEYID = 1
1,521,169 UART: [ldev] Erasing FE.KEYID = 1
1,546,420 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,148 UART: [ldev] --
1,585,503 UART: [fwproc] Waiting for Commands...
1,586,322 UART: [fwproc] Received command 0x46574c44
1,587,113 UART: [fwproc] Received Image of size 114332 bytes
2,885,067 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,709 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,061 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,818 >>> mbox cmd response: success
3,078,842 UART: [afmc] ++
3,079,010 UART: [afmc] CDI.KEYID = 6
3,079,372 UART: [afmc] SUBJECT.KEYID = 7
3,079,797 UART: [afmc] AUTHORITY.KEYID = 5
3,114,416 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,538 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,318 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,046 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,931 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,621 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,634 UART: [afmc] --
3,157,626 UART: [cold-reset] --
3,158,444 UART: [state] Locking Datavault
3,159,569 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,173 UART: [state] Locking ICCM
3,160,715 UART: [exit] Launching FMC @ 0x40000130
3,166,044 UART:
3,166,060 UART: Running Caliptra FMC ...
3,166,468 UART:
3,166,522 UART: [state] CFI Enabled
3,176,761 UART: [fht] FMC Alias Private Key: 7
3,284,742 UART: [art] Extend RT PCRs Done
3,285,170 UART: [art] Lock RT PCRs Done
3,286,930 UART: [art] Populate DV Done
3,295,141 UART: [fht] FMC Alias Private Key: 7
3,296,127 UART: [art] Derive CDI
3,296,407 UART: [art] Store in in slot 0x4
3,381,806 UART: [art] Derive Key Pair
3,382,166 UART: [art] Store priv key in slot 0x5
3,395,464 UART: [art] Derive Key Pair - Done
3,410,254 UART: [art] Signing Cert with AUTHO
3,410,734 UART: RITY.KEYID = 7
3,425,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,127 UART: [art] PUB.X = F7DEEAE7FD1B28D1A4F95152F4BC102A1F842F6B2757DBA2802EAF8AEA32A425A1377B109556816F333F7B9DA99D4380
3,432,909 UART: [art] PUB.Y = F4941301CAE6C6F8AAF2AC50BDEFA8CE88D5DAA5952E5E108529701949B5B855D2515A8171D17AB7B4C08BBB0E3E917D
3,439,869 UART: [art] SIG.R = 3E964B3DDE1EA13A585FB4FC7E5929FAB78838530F6778713C4F47D13466CD60C4E6899448DB7514814A9D72990B547A
3,446,631 UART: [art] SIG.S = F21E8AC784DBCA03AA66D010710A4495DE1387EF30D0066835654D113FCFA2D8FF48EACA1592DC22D2BABDA63962FBDC
3,470,401 UART: Caliptra RT
3,470,654 UART: [state] CFI Enabled
3,578,909 UART: [rt] RT listening for mailbox commands...
3,579,579 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,157 UART: [rt]cmd =0x4c4d5356, len=1672
3,872,392 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,761 ready_for_fw is high
1,361,761 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,270 >>> mbox cmd response: success
2,988,426 UART:
2,988,442 UART: Running Caliptra FMC ...
2,988,850 UART:
2,988,904 UART: [state] CFI Enabled
2,999,655 UART: [fht] FMC Alias Private Key: 7
3,106,886 UART: [art] Extend RT PCRs Done
3,107,314 UART: [art] Lock RT PCRs Done
3,109,042 UART: [art] Populate DV Done
3,116,929 UART: [fht] FMC Alias Private Key: 7
3,117,873 UART: [art] Derive CDI
3,118,153 UART: [art] Store in in slot 0x4
3,203,656 UART: [art] Derive Key Pair
3,204,016 UART: [art] Store priv key in slot 0x5
3,216,810 UART: [art] Derive Key Pair - Done
3,231,551 UART: [art] Signing Cert with AUTHO
3,232,031 UART: RITY.KEYID = 7
3,247,127 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,892 UART: [art] PUB.X = 604C110708FA59859FB106005633E0788CE47C7B3503B745EEF80F10F5394A846711E41244A9DFAC12B8EC15EEFECDAD
3,254,631 UART: [art] PUB.Y = A975715098BDED60405A1D75EC6480DA7DEB12562B2886C8B2C6215FC994ACB3F3D8D52045221F15023041C6238D9738
3,261,574 UART: [art] SIG.R = D777EF388B7ABB394BD90195B4394371E279B049C9F1B59DD1FA03392BE135B8941A749006CAE5268500B5FB850768E7
3,268,308 UART: [art] SIG.S = 2F848A1FB0734133FC792A3F8420F3C6958DBDCE1A812518EF9A02FED0A49D6780867AD895F522E0243A4C030F782787
3,291,590 UART: Caliptra RT
3,291,843 UART: [state] CFI Enabled
3,399,258 UART: [rt] RT listening for mailbox commands...
3,399,928 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,536 UART: [rt]cmd =0x4c4d5356, len=1672
3,692,813 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,993 UART: [state] LifecycleState = Unprovisioned
85,648 UART: [state] DebugLocked = No
86,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,884 UART: [kat] SHA2-256
881,815 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,930 UART: [kat] ++
886,082 UART: [kat] sha1
890,172 UART: [kat] SHA2-256
892,110 UART: [kat] SHA2-384
894,607 UART: [kat] SHA2-512-ACC
896,508 UART: [kat] ECC-384
901,927 UART: [kat] HMAC-384Kdf
906,573 UART: [kat] LMS
1,474,769 UART: [kat] --
1,475,420 UART: [cold-reset] ++
1,475,836 UART: [fht] Storing FHT @ 0x50003400
1,478,465 UART: [idev] ++
1,478,633 UART: [idev] CDI.KEYID = 6
1,478,993 UART: [idev] SUBJECT.KEYID = 7
1,479,417 UART: [idev] UDS.KEYID = 0
1,479,762 ready_for_fw is high
1,479,762 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,617 UART: [idev] Erasing UDS.KEYID = 0
1,504,945 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,383 UART: [idev] --
1,514,326 UART: [ldev] ++
1,514,494 UART: [ldev] CDI.KEYID = 6
1,514,857 UART: [ldev] SUBJECT.KEYID = 5
1,515,283 UART: [ldev] AUTHORITY.KEYID = 7
1,515,746 UART: [ldev] FE.KEYID = 1
1,521,168 UART: [ldev] Erasing FE.KEYID = 1
1,546,687 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,809 UART: [ldev] --
1,586,212 UART: [fwproc] Waiting for Commands...
1,587,019 UART: [fwproc] Received command 0x46574c44
1,587,810 UART: [fwproc] Received Image of size 114332 bytes
2,884,594 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,470 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,822 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,565 >>> mbox cmd response: success
3,078,655 UART: [afmc] ++
3,078,823 UART: [afmc] CDI.KEYID = 6
3,079,185 UART: [afmc] SUBJECT.KEYID = 7
3,079,610 UART: [afmc] AUTHORITY.KEYID = 5
3,114,549 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,315 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,095 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,823 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,708 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,398 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,319 UART: [afmc] --
3,158,381 UART: [cold-reset] --
3,159,201 UART: [state] Locking Datavault
3,160,386 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,990 UART: [state] Locking ICCM
3,161,634 UART: [exit] Launching FMC @ 0x40000130
3,166,963 UART:
3,166,979 UART: Running Caliptra FMC ...
3,167,387 UART:
3,167,530 UART: [state] CFI Enabled
3,178,353 UART: [fht] FMC Alias Private Key: 7
3,285,280 UART: [art] Extend RT PCRs Done
3,285,708 UART: [art] Lock RT PCRs Done
3,287,334 UART: [art] Populate DV Done
3,295,467 UART: [fht] FMC Alias Private Key: 7
3,296,593 UART: [art] Derive CDI
3,296,873 UART: [art] Store in in slot 0x4
3,382,362 UART: [art] Derive Key Pair
3,382,722 UART: [art] Store priv key in slot 0x5
3,396,220 UART: [art] Derive Key Pair - Done
3,411,086 UART: [art] Signing Cert with AUTHO
3,411,566 UART: RITY.KEYID = 7
3,427,110 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,875 UART: [art] PUB.X = A0A6BB5683076451F2902BB016C37F41068CD60170D0DA2F65A0BFB5293200C6175CDF8B9EB1DFC8225BA436B1339913
3,434,616 UART: [art] PUB.Y = 070FB724BDCD75EB1750161E612739A6350DC3756DE3185D7D08ACA816799A6BEE3B56C74D6E711844B2F3FAA299ACBE
3,441,564 UART: [art] SIG.R = 7EC52FC7CC8DC72159043008F32C3F8F84023C30A9CC59EB8F09BEC7E38BF5348CB74B04F600E9D9D0F2D5430E811DE2
3,448,306 UART: [art] SIG.S = 53BC7E74447E13FF66CCD5BBC263461A3A81FCE30AC8207E572F480D6E214E2A0E216CEF3A41612C134885451FD2492F
3,472,216 UART: Caliptra RT
3,472,561 UART: [state] CFI Enabled
3,580,467 UART: [rt] RT listening for mailbox commands...
3,581,137 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,679 UART: [rt]cmd =0x4c4d5356, len=1672
3,874,194 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,534 ready_for_fw is high
1,362,534 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,461 >>> mbox cmd response: success
2,988,311 UART:
2,988,327 UART: Running Caliptra FMC ...
2,988,735 UART:
2,988,878 UART: [state] CFI Enabled
2,999,871 UART: [fht] FMC Alias Private Key: 7
3,108,160 UART: [art] Extend RT PCRs Done
3,108,588 UART: [art] Lock RT PCRs Done
3,110,384 UART: [art] Populate DV Done
3,118,431 UART: [fht] FMC Alias Private Key: 7
3,119,607 UART: [art] Derive CDI
3,119,887 UART: [art] Store in in slot 0x4
3,205,956 UART: [art] Derive Key Pair
3,206,316 UART: [art] Store priv key in slot 0x5
3,219,212 UART: [art] Derive Key Pair - Done
3,234,076 UART: [art] Signing Cert with AUTHO
3,234,556 UART: RITY.KEYID = 7
3,249,694 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,459 UART: [art] PUB.X = 98F22C4B1A27484F96427562FBE6461C2EA01FF23A1657408E29CD1C4E5F13A2825D572FBCB391CC3929EB1006BB7C88
3,257,230 UART: [art] PUB.Y = 85072EA56E224B72EB544B42A77633B8F24C351BFEC47F2FBF8669F62837590ED44F4877039C698C3699D14F0764994D
3,264,162 UART: [art] SIG.R = 86C63D22A660DF8A8CFB7BD8D7D2B16BAEA077E95D561991E69028401C47C8A4A6ED1D76420F785307DBE37E2B8FDE16
3,270,938 UART: [art] SIG.S = 759B65496163F811D09DFADD93AA78753826634ED39A00945602252F8E3D953A3FA3AB56B31F3D9767E6847C9749D093
3,294,348 UART: Caliptra RT
3,294,693 UART: [state] CFI Enabled
3,402,554 UART: [rt] RT listening for mailbox commands...
3,403,224 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,806 UART: [rt]cmd =0x4c4d5356, len=1672
3,696,465 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,572 UART: [state] LifecycleState = Unprovisioned
85,227 UART: [state] DebugLocked = No
85,875 UART: [state] WD Timer not started. Device not locked for debugging
87,224 UART: [kat] SHA2-256
892,874 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,999 UART: [kat] ++
897,151 UART: [kat] sha1
901,429 UART: [kat] SHA2-256
903,369 UART: [kat] SHA2-384
906,036 UART: [kat] SHA2-512-ACC
907,937 UART: [kat] ECC-384
917,852 UART: [kat] HMAC-384Kdf
922,454 UART: [kat] LMS
1,170,782 UART: [kat] --
1,171,841 UART: [cold-reset] ++
1,172,411 UART: [fht] FHT @ 0x50003400
1,175,228 UART: [idev] ++
1,175,396 UART: [idev] CDI.KEYID = 6
1,175,756 UART: [idev] SUBJECT.KEYID = 7
1,176,180 UART: [idev] UDS.KEYID = 0
1,176,525 ready_for_fw is high
1,176,525 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,126 UART: [idev] Erasing UDS.KEYID = 0
1,200,661 UART: [idev] Sha1 KeyId Algorithm
1,208,947 UART: [idev] --
1,209,971 UART: [ldev] ++
1,210,139 UART: [ldev] CDI.KEYID = 6
1,210,502 UART: [ldev] SUBJECT.KEYID = 5
1,210,928 UART: [ldev] AUTHORITY.KEYID = 7
1,211,391 UART: [ldev] FE.KEYID = 1
1,216,381 UART: [ldev] Erasing FE.KEYID = 1
1,242,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,423 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,847 UART: [ldev] --
1,281,206 UART: [fwproc] Wait for Commands...
1,281,976 UART: [fwproc] Recv command 0x46574c44
1,282,704 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,610 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,914 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,671 >>> mbox cmd response: success
2,772,779 UART: [afmc] ++
2,772,947 UART: [afmc] CDI.KEYID = 6
2,773,309 UART: [afmc] SUBJECT.KEYID = 7
2,773,734 UART: [afmc] AUTHORITY.KEYID = 5
2,809,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,550 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,278 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,163 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,882 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,674 UART: [afmc] --
2,852,590 UART: [cold-reset] --
2,853,304 UART: [state] Locking Datavault
2,854,693 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,297 UART: [state] Locking ICCM
2,855,807 UART: [exit] Launching FMC @ 0x40000130
2,861,136 UART:
2,861,152 UART: Running Caliptra FMC ...
2,861,560 UART:
2,861,614 UART: [state] CFI Enabled
2,871,961 UART: [fht] FMC Alias Private Key: 7
2,979,996 UART: [art] Extend RT PCRs Done
2,980,424 UART: [art] Lock RT PCRs Done
2,981,530 UART: [art] Populate DV Done
2,989,777 UART: [fht] FMC Alias Private Key: 7
2,990,927 UART: [art] Derive CDI
2,991,207 UART: [art] Store in in slot 0x4
3,076,786 UART: [art] Derive Key Pair
3,077,146 UART: [art] Store priv key in slot 0x5
3,090,698 UART: [art] Derive Key Pair - Done
3,105,685 UART: [art] Signing Cert with AUTHO
3,106,165 UART: RITY.KEYID = 7
3,121,297 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,062 UART: [art] PUB.X = 384F5A97CEA64F29F883FA6CC6B11605E2AAF82E14B3457EC660F2532C10C2DE59AA46BE4D9AE1125374DD175600AD67
3,128,817 UART: [art] PUB.Y = E37074163881CB940FF2928ADC380EF4AFA184E6B3EE4012CF2D6FB08EC6FA639223D954442C40FF8628A6EBE0BFAFEC
3,135,779 UART: [art] SIG.R = F768699940845BFF29A3DA6D533C408A9149CFE573F1D7898C4118F23C024DCF73969498CCE11DE3FAF9B85774F703F0
3,142,545 UART: [art] SIG.S = 1895B2A133F46F8B2099D3BF771FA9260BF582A533E16884138330E459D323F77CAC7335F356D8F32A4285777F77748F
3,166,215 UART: Caliptra RT
3,166,468 UART: [state] CFI Enabled
3,275,077 UART: [rt] RT listening for mailbox commands...
3,275,747 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,583 UART: [rt]cmd =0x4c4d5356, len=1672
3,569,258 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,125 ready_for_fw is high
1,060,125 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,766 >>> mbox cmd response: success
2,688,598 UART:
2,688,614 UART: Running Caliptra FMC ...
2,689,022 UART:
2,689,076 UART: [state] CFI Enabled
2,699,443 UART: [fht] FMC Alias Private Key: 7
2,807,264 UART: [art] Extend RT PCRs Done
2,807,692 UART: [art] Lock RT PCRs Done
2,809,154 UART: [art] Populate DV Done
2,817,347 UART: [fht] FMC Alias Private Key: 7
2,818,373 UART: [art] Derive CDI
2,818,653 UART: [art] Store in in slot 0x4
2,904,448 UART: [art] Derive Key Pair
2,904,808 UART: [art] Store priv key in slot 0x5
2,917,734 UART: [art] Derive Key Pair - Done
2,932,874 UART: [art] Signing Cert with AUTHO
2,933,354 UART: RITY.KEYID = 7
2,948,914 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,679 UART: [art] PUB.X = 64DD45C85ADE89528A137664D2D0120EF298672AE713C3DD19B928A455563C0CE2600AD5FE182CEBA32F9E3EC252984E
2,956,446 UART: [art] PUB.Y = 955FDB9EA3F50A4D0B0B89A9A8EE3C59D60B4E4B4DE9BD3612330114C54263FE26B720A9BE8F25A70F03AA3C4E46A6D3
2,963,391 UART: [art] SIG.R = 99C3AD3D416EEF802411BC1C5859025656C5B0EE87230059B22300F02560DD0F99ED40B762D0F46C9B7C7F078B5747CF
2,970,108 UART: [art] SIG.S = DE539FCFC34742B5361B902A34636834EE765932B22DFCC9A8397F7B4C5532C167423BFDA2C7A80A2B4C3DCD8FFD9EE9
2,993,860 UART: Caliptra RT
2,994,113 UART: [state] CFI Enabled
3,102,029 UART: [rt] RT listening for mailbox commands...
3,102,699 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,747 UART: [rt]cmd =0x4c4d5356, len=1672
3,396,080 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
88,041 UART: [kat] SHA2-256
893,691 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,816 UART: [kat] ++
897,968 UART: [kat] sha1
902,302 UART: [kat] SHA2-256
904,242 UART: [kat] SHA2-384
906,849 UART: [kat] SHA2-512-ACC
908,750 UART: [kat] ECC-384
918,539 UART: [kat] HMAC-384Kdf
923,309 UART: [kat] LMS
1,171,637 UART: [kat] --
1,172,726 UART: [cold-reset] ++
1,173,260 UART: [fht] FHT @ 0x50003400
1,175,991 UART: [idev] ++
1,176,159 UART: [idev] CDI.KEYID = 6
1,176,519 UART: [idev] SUBJECT.KEYID = 7
1,176,943 UART: [idev] UDS.KEYID = 0
1,177,288 ready_for_fw is high
1,177,288 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,933 UART: [idev] Erasing UDS.KEYID = 0
1,201,598 UART: [idev] Sha1 KeyId Algorithm
1,209,918 UART: [idev] --
1,210,920 UART: [ldev] ++
1,211,088 UART: [ldev] CDI.KEYID = 6
1,211,451 UART: [ldev] SUBJECT.KEYID = 5
1,211,877 UART: [ldev] AUTHORITY.KEYID = 7
1,212,340 UART: [ldev] FE.KEYID = 1
1,217,908 UART: [ldev] Erasing FE.KEYID = 1
1,244,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,864 UART: [ldev] --
1,283,173 UART: [fwproc] Wait for Commands...
1,283,973 UART: [fwproc] Recv command 0x46574c44
1,284,701 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,918 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,493 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,598 >>> mbox cmd response: success
2,776,670 UART: [afmc] ++
2,776,838 UART: [afmc] CDI.KEYID = 6
2,777,200 UART: [afmc] SUBJECT.KEYID = 7
2,777,625 UART: [afmc] AUTHORITY.KEYID = 5
2,813,362 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,865 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,613 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,341 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,226 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,945 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,721 UART: [afmc] --
2,856,819 UART: [cold-reset] --
2,857,691 UART: [state] Locking Datavault
2,858,882 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,486 UART: [state] Locking ICCM
2,860,026 UART: [exit] Launching FMC @ 0x40000130
2,865,355 UART:
2,865,371 UART: Running Caliptra FMC ...
2,865,779 UART:
2,865,922 UART: [state] CFI Enabled
2,876,531 UART: [fht] FMC Alias Private Key: 7
2,984,786 UART: [art] Extend RT PCRs Done
2,985,214 UART: [art] Lock RT PCRs Done
2,986,530 UART: [art] Populate DV Done
2,994,763 UART: [fht] FMC Alias Private Key: 7
2,995,881 UART: [art] Derive CDI
2,996,161 UART: [art] Store in in slot 0x4
3,081,956 UART: [art] Derive Key Pair
3,082,316 UART: [art] Store priv key in slot 0x5
3,095,772 UART: [art] Derive Key Pair - Done
3,110,691 UART: [art] Signing Cert with AUTHO
3,111,171 UART: RITY.KEYID = 7
3,126,117 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,882 UART: [art] PUB.X = 92D1B252B51FCDEE3911F2E1C5F58BC27BF93786A5E06358B3822CAFC20A2B4086EFCA73DB5AEDF94F2E7C3343ADDCA5
3,133,673 UART: [art] PUB.Y = 7838B9E5E36F4EBA54EC4805613DD7947636AF732610D6CC2A933747D15B6F2C4E9DD166093DE4C91B0E6941FAA34FDA
3,140,622 UART: [art] SIG.R = 86C6EAD5970A783E0C395DFE5B25EC0B9660687208079B9C70ABA6F8AC75ED437225385BD4387577353995BCE87EB036
3,147,377 UART: [art] SIG.S = 87F3315BCBCA4F2F151DC271666EA47789B5B10F8206633B1C64623D2F6C11295098E9726D280BAFAF4971653E88C2F6
3,171,841 UART: Caliptra RT
3,172,186 UART: [state] CFI Enabled
3,280,354 UART: [rt] RT listening for mailbox commands...
3,281,024 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,200 UART: [rt]cmd =0x4c4d5356, len=1672
3,573,577 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,928 ready_for_fw is high
1,060,928 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,731 >>> mbox cmd response: success
2,690,761 UART:
2,690,777 UART: Running Caliptra FMC ...
2,691,185 UART:
2,691,328 UART: [state] CFI Enabled
2,701,981 UART: [fht] FMC Alias Private Key: 7
2,809,370 UART: [art] Extend RT PCRs Done
2,809,798 UART: [art] Lock RT PCRs Done
2,811,188 UART: [art] Populate DV Done
2,819,467 UART: [fht] FMC Alias Private Key: 7
2,820,487 UART: [art] Derive CDI
2,820,767 UART: [art] Store in in slot 0x4
2,906,704 UART: [art] Derive Key Pair
2,907,064 UART: [art] Store priv key in slot 0x5
2,919,980 UART: [art] Derive Key Pair - Done
2,934,651 UART: [art] Signing Cert with AUTHO
2,935,131 UART: RITY.KEYID = 7
2,950,181 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,946 UART: [art] PUB.X = 3124449AB4C034ED5027CF11AD957AA261CDDF24FABD4C523DD10153DA0E2B02E56EB228D82F161982A1E78B7CAC2F6F
2,957,723 UART: [art] PUB.Y = 865078F718C1679964E6929F9E2CC94310363F7D9FBA610F94F822AE6A339C73C0FC877CB221B56FFC84706276A5AFBB
2,964,672 UART: [art] SIG.R = 3281356F59D64CA91C1C5031DD309564629831546E64413B18F51FFBE4A065834B69E750DBEE180F6903DD0352FA18D2
2,971,427 UART: [art] SIG.S = F045C0B1F0149CDD44E3159E5952CF56CE5B23E443E246D0DFC78D9DD78D8ECE9482EC5011CB3C5B45CEF78905505168
2,995,085 UART: Caliptra RT
2,995,430 UART: [state] CFI Enabled
3,103,517 UART: [rt] RT listening for mailbox commands...
3,104,187 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,061 UART: [rt]cmd =0x4c4d5356, len=1672
3,397,644 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,083 UART: [state] DebugLocked = No
86,661 UART: [state] WD Timer not started. Device not locked for debugging
87,910 UART: [kat] SHA2-256
891,460 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,589 UART: [kat] ++
895,741 UART: [kat] sha1
899,941 UART: [kat] SHA2-256
901,881 UART: [kat] SHA2-384
904,396 UART: [kat] SHA2-512-ACC
906,297 UART: [kat] ECC-384
915,796 UART: [kat] HMAC-384Kdf
920,396 UART: [kat] LMS
1,168,708 UART: [kat] --
1,169,689 UART: [cold-reset] ++
1,170,169 UART: [fht] FHT @ 0x50003400
1,172,855 UART: [idev] ++
1,173,023 UART: [idev] CDI.KEYID = 6
1,173,384 UART: [idev] SUBJECT.KEYID = 7
1,173,809 UART: [idev] UDS.KEYID = 0
1,174,155 ready_for_fw is high
1,174,155 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,577 UART: [idev] Erasing UDS.KEYID = 0
1,198,631 UART: [idev] Sha1 KeyId Algorithm
1,207,577 UART: [idev] --
1,208,732 UART: [ldev] ++
1,208,900 UART: [ldev] CDI.KEYID = 6
1,209,264 UART: [ldev] SUBJECT.KEYID = 5
1,209,691 UART: [ldev] AUTHORITY.KEYID = 7
1,210,154 UART: [ldev] FE.KEYID = 1
1,215,292 UART: [ldev] Erasing FE.KEYID = 1
1,241,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,240 UART: [ldev] --
1,280,664 UART: [fwproc] Wait for Commands...
1,281,355 UART: [fwproc] Recv command 0x46574c44
1,282,088 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,592 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,270 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,579 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,383 >>> mbox cmd response: success
2,773,436 UART: [afmc] ++
2,773,604 UART: [afmc] CDI.KEYID = 6
2,773,967 UART: [afmc] SUBJECT.KEYID = 7
2,774,393 UART: [afmc] AUTHORITY.KEYID = 5
2,809,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,050 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,801 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,530 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,413 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,132 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,921 UART: [afmc] --
2,852,931 UART: [cold-reset] --
2,853,781 UART: [state] Locking Datavault
2,855,112 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,716 UART: [state] Locking ICCM
2,856,252 UART: [exit] Launching FMC @ 0x40000130
2,861,581 UART:
2,861,597 UART: Running Caliptra FMC ...
2,862,005 UART:
2,862,059 UART: [state] CFI Enabled
2,872,560 UART: [fht] FMC Alias Private Key: 7
2,980,589 UART: [art] Extend RT PCRs Done
2,981,017 UART: [art] Lock RT PCRs Done
2,982,255 UART: [art] Populate DV Done
2,990,646 UART: [fht] FMC Alias Private Key: 7
2,991,786 UART: [art] Derive CDI
2,992,066 UART: [art] Store in in slot 0x4
3,078,039 UART: [art] Derive Key Pair
3,078,399 UART: [art] Store priv key in slot 0x5
3,091,671 UART: [art] Derive Key Pair - Done
3,106,454 UART: [art] Signing Cert with AUTHO
3,106,934 UART: RITY.KEYID = 7
3,121,848 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,613 UART: [art] PUB.X = 88C36495781B418DABB3CFEDC623CBDCB1931EDA7F7F665F2B48F0885E0B7D116E917613B3B8C1A81B0A14A38BEF07AA
3,129,392 UART: [art] PUB.Y = 2CFD4361479A00D7526340B4C4F9EAABB6021360E1FB4CC3D725A3F5E32E2506D13828155BCCA846171F66327F092B2C
3,136,313 UART: [art] SIG.R = 948F72DF11BE945DD315218996E1F74323D8A3973EB6B7063012A0115388FC22CEBE06A944A4A4F5EB935353A2829B60
3,143,073 UART: [art] SIG.S = 58EA363626E977C9BD11C79D46391F3226E36C592594E6D97F2413C431F926EA0CBC0AD7EC80E2B3C3FE8B468C027701
3,166,396 UART: Caliptra RT
3,166,649 UART: [state] CFI Enabled
3,273,972 UART: [rt] RT listening for mailbox commands...
3,274,642 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,106 UART: [rt]cmd =0x4c4d5356, len=1672
3,567,555 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,356 ready_for_fw is high
1,055,356 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,377 >>> mbox cmd response: success
2,682,177 UART:
2,682,193 UART: Running Caliptra FMC ...
2,682,601 UART:
2,682,655 UART: [state] CFI Enabled
2,693,322 UART: [fht] FMC Alias Private Key: 7
2,801,589 UART: [art] Extend RT PCRs Done
2,802,017 UART: [art] Lock RT PCRs Done
2,803,539 UART: [art] Populate DV Done
2,811,736 UART: [fht] FMC Alias Private Key: 7
2,812,852 UART: [art] Derive CDI
2,813,132 UART: [art] Store in in slot 0x4
2,899,087 UART: [art] Derive Key Pair
2,899,447 UART: [art] Store priv key in slot 0x5
2,912,395 UART: [art] Derive Key Pair - Done
2,927,166 UART: [art] Signing Cert with AUTHO
2,927,646 UART: RITY.KEYID = 7
2,943,070 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,835 UART: [art] PUB.X = 646949513DD390B1AF23A6E351988B69408689769F70DCE20F38995F837BB5E71B37926059103D3E08024A113C20C87E
2,950,582 UART: [art] PUB.Y = D588565B76665EDDC3B7347776790D99E15C97E28B5F026CDC338FE0DDDFC406CC6FEED9E633007691F6B7C9EB2EC314
2,957,513 UART: [art] SIG.R = 40DAAF2A5DF2E472F697B49B2551C87E97517174E31815039AF19B6CBBB8843562AFE2C3FBF1443D1208BB90423A9603
2,964,276 UART: [art] SIG.S = 87239171DAFA77950D96D7AAC9484D0E3FC2C67FDC5D16F3D28B2BBAFBE2939778086CF540F5B1497F3F30C2C886E890
2,987,676 UART: Caliptra RT
2,987,929 UART: [state] CFI Enabled
3,094,864 UART: [rt] RT listening for mailbox commands...
3,095,534 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,192 UART: [rt]cmd =0x4c4d5356, len=1672
3,388,919 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,869 UART: [state] LifecycleState = Unprovisioned
85,524 UART: [state] DebugLocked = No
86,060 UART: [state] WD Timer not started. Device not locked for debugging
87,289 UART: [kat] SHA2-256
890,839 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,968 UART: [kat] ++
895,120 UART: [kat] sha1
899,228 UART: [kat] SHA2-256
901,168 UART: [kat] SHA2-384
903,921 UART: [kat] SHA2-512-ACC
905,822 UART: [kat] ECC-384
915,847 UART: [kat] HMAC-384Kdf
920,495 UART: [kat] LMS
1,168,807 UART: [kat] --
1,169,992 UART: [cold-reset] ++
1,170,516 UART: [fht] FHT @ 0x50003400
1,173,262 UART: [idev] ++
1,173,430 UART: [idev] CDI.KEYID = 6
1,173,791 UART: [idev] SUBJECT.KEYID = 7
1,174,216 UART: [idev] UDS.KEYID = 0
1,174,562 ready_for_fw is high
1,174,562 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,856 UART: [idev] Erasing UDS.KEYID = 0
1,198,914 UART: [idev] Sha1 KeyId Algorithm
1,207,728 UART: [idev] --
1,208,733 UART: [ldev] ++
1,208,901 UART: [ldev] CDI.KEYID = 6
1,209,265 UART: [ldev] SUBJECT.KEYID = 5
1,209,692 UART: [ldev] AUTHORITY.KEYID = 7
1,210,155 UART: [ldev] FE.KEYID = 1
1,215,381 UART: [ldev] Erasing FE.KEYID = 1
1,241,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,193 UART: [ldev] --
1,280,693 UART: [fwproc] Wait for Commands...
1,281,430 UART: [fwproc] Recv command 0x46574c44
1,282,163 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,017 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,326 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,052 >>> mbox cmd response: success
2,774,167 UART: [afmc] ++
2,774,335 UART: [afmc] CDI.KEYID = 6
2,774,698 UART: [afmc] SUBJECT.KEYID = 7
2,775,124 UART: [afmc] AUTHORITY.KEYID = 5
2,811,241 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,460 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,189 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,072 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,791 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,628 UART: [afmc] --
2,854,718 UART: [cold-reset] --
2,855,620 UART: [state] Locking Datavault
2,856,805 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,409 UART: [state] Locking ICCM
2,858,071 UART: [exit] Launching FMC @ 0x40000130
2,863,400 UART:
2,863,416 UART: Running Caliptra FMC ...
2,863,824 UART:
2,863,967 UART: [state] CFI Enabled
2,874,634 UART: [fht] FMC Alias Private Key: 7
2,983,109 UART: [art] Extend RT PCRs Done
2,983,537 UART: [art] Lock RT PCRs Done
2,985,089 UART: [art] Populate DV Done
2,993,362 UART: [fht] FMC Alias Private Key: 7
2,994,450 UART: [art] Derive CDI
2,994,730 UART: [art] Store in in slot 0x4
3,080,243 UART: [art] Derive Key Pair
3,080,603 UART: [art] Store priv key in slot 0x5
3,093,795 UART: [art] Derive Key Pair - Done
3,108,485 UART: [art] Signing Cert with AUTHO
3,108,965 UART: RITY.KEYID = 7
3,124,033 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,798 UART: [art] PUB.X = BA4D422BABA8B31C8909663037EDA9DEE5E62F06B237D75B307F7B10456345E294028B13A57042DAEE564805F1FD0534
3,131,555 UART: [art] PUB.Y = CF5D7FF9CFAA6E413C09D36F5FFDCDE56DDEAF1039B20A2F8AB9692AF07C1E5BE32A45DA799D1CDD207ED53889D7C338
3,138,529 UART: [art] SIG.R = 4DEF2034C97A99335F4EE95702884DE0F0828F138B2F2A4B8FC069B459D482B4AD0BE1559137925AC4F4FE6E53F6D4CC
3,145,301 UART: [art] SIG.S = 29CE4AF0E32196E00485ECFA10F2D533DD1D7FF8A1F46E2104D114A89BE2A235AEF53E1BC476748ABAA19A4551C35414
3,168,670 UART: Caliptra RT
3,169,015 UART: [state] CFI Enabled
3,276,418 UART: [rt] RT listening for mailbox commands...
3,277,088 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,542 UART: [rt]cmd =0x4c4d5356, len=1672
3,570,177 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,595 ready_for_fw is high
1,056,595 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,074 >>> mbox cmd response: success
2,686,016 UART:
2,686,032 UART: Running Caliptra FMC ...
2,686,440 UART:
2,686,583 UART: [state] CFI Enabled
2,697,320 UART: [fht] FMC Alias Private Key: 7
2,805,451 UART: [art] Extend RT PCRs Done
2,805,879 UART: [art] Lock RT PCRs Done
2,807,431 UART: [art] Populate DV Done
2,815,658 UART: [fht] FMC Alias Private Key: 7
2,816,724 UART: [art] Derive CDI
2,817,004 UART: [art] Store in in slot 0x4
2,902,817 UART: [art] Derive Key Pair
2,903,177 UART: [art] Store priv key in slot 0x5
2,916,779 UART: [art] Derive Key Pair - Done
2,931,607 UART: [art] Signing Cert with AUTHO
2,932,087 UART: RITY.KEYID = 7
2,947,533 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,298 UART: [art] PUB.X = 8B884855C5B23CA837F5793124562552B5E31E8E83D5118EDEF46ADEBD1437B276DB3119DF70CE4022AF2BD0693BCD2E
2,955,076 UART: [art] PUB.Y = 256629F31086D6EFC592C5359CB6249A4847342C5DBC0E7C40202593065B6524770F5D0F8841D8AA3FE2E7E13564B870
2,962,006 UART: [art] SIG.R = C94385F2F86098D4A68B6E1C3400F36D89D605147BAD71BF015CFB5B588320822C910396D6C1B8A2EA64DB30CCA49174
2,968,747 UART: [art] SIG.S = 0889545E913B824B343D5A668D53616A6917E595CF611B6B53F2BA977E2457C7CCCE409FC40EE41474AE07C224D9E596
2,992,541 UART: Caliptra RT
2,992,886 UART: [state] CFI Enabled
3,099,935 UART: [rt] RT listening for mailbox commands...
3,100,605 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,199 UART: [rt]cmd =0x4c4d5356, len=1672
3,393,722 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,625 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,199 UART: [kat] SHA2-256
882,130 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,245 UART: [kat] ++
886,397 UART: [kat] sha1
890,603 UART: [kat] SHA2-256
892,541 UART: [kat] SHA2-384
895,310 UART: [kat] SHA2-512-ACC
897,211 UART: [kat] ECC-384
902,880 UART: [kat] HMAC-384Kdf
907,594 UART: [kat] LMS
1,475,790 UART: [kat] --
1,476,697 UART: [cold-reset] ++
1,477,043 UART: [fht] Storing FHT @ 0x50003400
1,479,702 UART: [idev] ++
1,479,870 UART: [idev] CDI.KEYID = 6
1,480,230 UART: [idev] SUBJECT.KEYID = 7
1,480,654 UART: [idev] UDS.KEYID = 0
1,480,999 ready_for_fw is high
1,480,999 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,728 UART: [idev] Erasing UDS.KEYID = 0
1,505,014 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,524 UART: [idev] --
1,514,777 UART: [ldev] ++
1,514,945 UART: [ldev] CDI.KEYID = 6
1,515,308 UART: [ldev] SUBJECT.KEYID = 5
1,515,734 UART: [ldev] AUTHORITY.KEYID = 7
1,516,197 UART: [ldev] FE.KEYID = 1
1,521,335 UART: [ldev] Erasing FE.KEYID = 1
1,546,846 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,374 UART: [ldev] --
1,585,805 UART: [fwproc] Waiting for Commands...
1,586,462 UART: [fwproc] Received command 0x46574c44
1,587,253 UART: [fwproc] Received Image of size 114332 bytes
2,884,661 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,131 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,483 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,362 >>> mbox cmd response: success
3,078,460 UART: [afmc] ++
3,078,628 UART: [afmc] CDI.KEYID = 6
3,078,990 UART: [afmc] SUBJECT.KEYID = 7
3,079,415 UART: [afmc] AUTHORITY.KEYID = 5
3,113,730 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,182 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,962 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,690 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,575 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,265 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,258 UART: [afmc] --
3,157,388 UART: [cold-reset] --
3,158,130 UART: [state] Locking Datavault
3,159,047 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,651 UART: [state] Locking ICCM
3,160,123 UART: [exit] Launching FMC @ 0x40000130
3,165,452 UART:
3,165,468 UART: Running Caliptra FMC ...
3,165,876 UART:
3,165,930 UART: [state] CFI Enabled
3,176,179 UART: [fht] FMC Alias Private Key: 7
3,284,084 UART: [art] Extend RT PCRs Done
3,284,512 UART: [art] Lock RT PCRs Done
3,286,026 UART: [art] Populate DV Done
3,293,999 UART: [fht] FMC Alias Private Key: 7
3,294,959 UART: [art] Derive CDI
3,295,239 UART: [art] Store in in slot 0x4
3,380,750 UART: [art] Derive Key Pair
3,381,110 UART: [art] Store priv key in slot 0x5
3,394,620 UART: [art] Derive Key Pair - Done
3,409,339 UART: [art] Signing Cert with AUTHO
3,409,819 UART: RITY.KEYID = 7
3,424,803 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,568 UART: [art] PUB.X = E56029F39657BD239412D95FEC196660776EBB698D6A0727709C3B4EBF577CE36681D9533F277E3A80676FF07463C2C2
3,432,329 UART: [art] PUB.Y = 5FE6A15C214EFBEC90BDC92D59DE83CF9DE1C887D2981162CD9B2011372314C07FBE31A7F5C74DD20A965DC5FAD4A24D
3,439,296 UART: [art] SIG.R = 5CE2C560E6785BC0813FCED8419E78E7CD8821580807C8C8B9F0511373F590B8F5CE836490EE5B7CF9402F78BEEA19EF
3,446,068 UART: [art] SIG.S = 733ADD7EB5A51F0D6F4E8E618ECEA22B88CAB5181184D9C386EDA27D8FD22DD5F2AE3B3AA908130B5C9253D78C137B4A
3,469,714 UART: Caliptra RT
3,469,967 UART: [state] CFI Enabled
3,578,349 UART: [rt] RT listening for mailbox commands...
3,579,019 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,467 UART: [rt]cmd =0x4c4d5356, len=1672
3,872,056 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,433 ready_for_fw is high
1,363,433 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,328 >>> mbox cmd response: success
2,990,280 UART:
2,990,296 UART: Running Caliptra FMC ...
2,990,704 UART:
2,990,758 UART: [state] CFI Enabled
3,001,259 UART: [fht] FMC Alias Private Key: 7
3,108,458 UART: [art] Extend RT PCRs Done
3,108,886 UART: [art] Lock RT PCRs Done
3,110,322 UART: [art] Populate DV Done
3,118,505 UART: [fht] FMC Alias Private Key: 7
3,119,475 UART: [art] Derive CDI
3,119,755 UART: [art] Store in in slot 0x4
3,205,100 UART: [art] Derive Key Pair
3,205,460 UART: [art] Store priv key in slot 0x5
3,218,674 UART: [art] Derive Key Pair - Done
3,233,258 UART: [art] Signing Cert with AUTHO
3,233,738 UART: RITY.KEYID = 7
3,248,710 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,475 UART: [art] PUB.X = 0DA78CBE2BCADDF259887DC393D6F28B226B96D9129C8A228C026E1F989C03C38EFE7F29E98AF4C2A4628CE9616EC6BB
3,256,254 UART: [art] PUB.Y = B0C5FD8D95F6C05197A4481D970D4FCCDD08DB4EA03118523B7373D202752B3CEDB23B43106DFB2D43BC14FD65EFF3CE
3,263,213 UART: [art] SIG.R = 31D4A1EA6E81EAC544CE4884D588C141117505EA8C9B3679E0DC5AD8AFD82C527924DA91116F299785A875B5F128300A
3,269,979 UART: [art] SIG.S = 6D66646E076F982D0EE17B4775A5775760E0B422FB7A7F8FF4355F14E8CBC34FDE0BB18DF87AD46C8E3091CA3582346D
3,294,119 UART: Caliptra RT
3,294,372 UART: [state] CFI Enabled
3,402,230 UART: [rt] RT listening for mailbox commands...
3,402,900 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,526 UART: [rt]cmd =0x4c4d5356, len=1672
3,696,195 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
86,878 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,482 UART: [kat] SHA2-256
882,413 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,528 UART: [kat] ++
886,680 UART: [kat] sha1
890,932 UART: [kat] SHA2-256
892,870 UART: [kat] SHA2-384
895,651 UART: [kat] SHA2-512-ACC
897,552 UART: [kat] ECC-384
903,235 UART: [kat] HMAC-384Kdf
908,021 UART: [kat] LMS
1,476,217 UART: [kat] --
1,477,018 UART: [cold-reset] ++
1,477,550 UART: [fht] Storing FHT @ 0x50003400
1,480,437 UART: [idev] ++
1,480,605 UART: [idev] CDI.KEYID = 6
1,480,965 UART: [idev] SUBJECT.KEYID = 7
1,481,389 UART: [idev] UDS.KEYID = 0
1,481,734 ready_for_fw is high
1,481,734 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,361 UART: [idev] Erasing UDS.KEYID = 0
1,506,403 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,107 UART: [idev] --
1,516,314 UART: [ldev] ++
1,516,482 UART: [ldev] CDI.KEYID = 6
1,516,845 UART: [ldev] SUBJECT.KEYID = 5
1,517,271 UART: [ldev] AUTHORITY.KEYID = 7
1,517,734 UART: [ldev] FE.KEYID = 1
1,522,734 UART: [ldev] Erasing FE.KEYID = 1
1,547,799 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,949 UART: [ldev] --
1,587,372 UART: [fwproc] Waiting for Commands...
1,588,011 UART: [fwproc] Received command 0x46574c44
1,588,802 UART: [fwproc] Received Image of size 114332 bytes
2,886,450 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,428 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,780 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,771 >>> mbox cmd response: success
3,080,869 UART: [afmc] ++
3,081,037 UART: [afmc] CDI.KEYID = 6
3,081,399 UART: [afmc] SUBJECT.KEYID = 7
3,081,824 UART: [afmc] AUTHORITY.KEYID = 5
3,117,345 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,047 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,827 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,555 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,440 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,130 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,973 UART: [afmc] --
3,160,917 UART: [cold-reset] --
3,161,793 UART: [state] Locking Datavault
3,162,812 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,416 UART: [state] Locking ICCM
3,164,048 UART: [exit] Launching FMC @ 0x40000130
3,169,377 UART:
3,169,393 UART: Running Caliptra FMC ...
3,169,801 UART:
3,169,944 UART: [state] CFI Enabled
3,180,631 UART: [fht] FMC Alias Private Key: 7
3,288,990 UART: [art] Extend RT PCRs Done
3,289,418 UART: [art] Lock RT PCRs Done
3,290,894 UART: [art] Populate DV Done
3,299,091 UART: [fht] FMC Alias Private Key: 7
3,300,067 UART: [art] Derive CDI
3,300,347 UART: [art] Store in in slot 0x4
3,385,716 UART: [art] Derive Key Pair
3,386,076 UART: [art] Store priv key in slot 0x5
3,399,054 UART: [art] Derive Key Pair - Done
3,413,505 UART: [art] Signing Cert with AUTHO
3,413,985 UART: RITY.KEYID = 7
3,429,157 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,922 UART: [art] PUB.X = 667F110E892EF6BD0A81DB7AB91BDD1F66ADC41AF237580B78A5DAE3438CB56D283A296E71FB34E5C6F2973335724A94
3,436,693 UART: [art] PUB.Y = 6740D5237565F60C599C5437E5F9C248F06B0E3A74B9DFD9DDE6C9F2687361EA75B690594D381AAF46582087E145DE90
3,443,635 UART: [art] SIG.R = F297B7BBFC00185F67B70D08AF9EFF78E3851046582C94C0A3C3523C3F539B31E8636C9B8C2DEE759AE06E694D16AC7A
3,450,387 UART: [art] SIG.S = 32C2EA39EF48E1CA9625B63FAC8963C3367763743F206996D1AF19A2AB59A551B45F34CB7D68B044A43CA34E18C3C618
3,474,038 UART: Caliptra RT
3,474,383 UART: [state] CFI Enabled
3,582,192 UART: [rt] RT listening for mailbox commands...
3,582,862 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,416 UART: [rt]cmd =0x4c4d5356, len=1672
3,875,677 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,842 ready_for_fw is high
1,361,842 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,469 >>> mbox cmd response: success
2,991,327 UART:
2,991,343 UART: Running Caliptra FMC ...
2,991,751 UART:
2,991,894 UART: [state] CFI Enabled
3,002,337 UART: [fht] FMC Alias Private Key: 7
3,110,158 UART: [art] Extend RT PCRs Done
3,110,586 UART: [art] Lock RT PCRs Done
3,111,916 UART: [art] Populate DV Done
3,119,917 UART: [fht] FMC Alias Private Key: 7
3,120,859 UART: [art] Derive CDI
3,121,139 UART: [art] Store in in slot 0x4
3,206,630 UART: [art] Derive Key Pair
3,206,990 UART: [art] Store priv key in slot 0x5
3,220,328 UART: [art] Derive Key Pair - Done
3,235,301 UART: [art] Signing Cert with AUTHO
3,235,781 UART: RITY.KEYID = 7
3,250,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,638 UART: [art] PUB.X = D187D0556C577EF4D98E54B2916152474B142453617E1DBD3BED0225484DF3A20ADE0F43AA2E3EEF7B886B73A6C37402
3,258,400 UART: [art] PUB.Y = 957D4D7F24D9D3913518D3924577CDEAA9BBA78B5C4E011AA8A68A06B4E9A789495C5D2F82954C86027F4555C13B061F
3,265,340 UART: [art] SIG.R = 08DCD428FE853419B7994A4EEB86831ED41029044276C9B7718FB9A6DFBC9959D0F09D25E05E5918665D35F368CA9493
3,272,102 UART: [art] SIG.S = C91AEC366A8C969075B9552673B4C44369285ADABA9BC78176B3121E0589B6C65D5C6726392AE01F6454F44E76BB9673
3,295,972 UART: Caliptra RT
3,296,317 UART: [state] CFI Enabled
3,404,846 UART: [rt] RT listening for mailbox commands...
3,405,516 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,048 UART: [rt]cmd =0x4c4d5356, len=1672
3,698,333 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,474 UART: [state] LifecycleState = Unprovisioned
86,129 UART: [state] DebugLocked = No
86,831 UART: [state] WD Timer not started. Device not locked for debugging
87,964 UART: [kat] SHA2-256
893,614 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,739 UART: [kat] ++
897,891 UART: [kat] sha1
902,089 UART: [kat] SHA2-256
904,029 UART: [kat] SHA2-384
906,788 UART: [kat] SHA2-512-ACC
908,689 UART: [kat] ECC-384
918,310 UART: [kat] HMAC-384Kdf
923,002 UART: [kat] LMS
1,171,330 UART: [kat] --
1,172,395 UART: [cold-reset] ++
1,172,911 UART: [fht] FHT @ 0x50003400
1,175,578 UART: [idev] ++
1,175,746 UART: [idev] CDI.KEYID = 6
1,176,106 UART: [idev] SUBJECT.KEYID = 7
1,176,530 UART: [idev] UDS.KEYID = 0
1,176,875 ready_for_fw is high
1,176,875 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,380 UART: [idev] Erasing UDS.KEYID = 0
1,202,123 UART: [idev] Sha1 KeyId Algorithm
1,210,361 UART: [idev] --
1,211,535 UART: [ldev] ++
1,211,703 UART: [ldev] CDI.KEYID = 6
1,212,066 UART: [ldev] SUBJECT.KEYID = 5
1,212,492 UART: [ldev] AUTHORITY.KEYID = 7
1,212,955 UART: [ldev] FE.KEYID = 1
1,217,823 UART: [ldev] Erasing FE.KEYID = 1
1,243,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,769 UART: [ldev] --
1,283,084 UART: [fwproc] Wait for Commands...
1,283,674 UART: [fwproc] Recv command 0x46574c44
1,284,402 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,532 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,836 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,723 >>> mbox cmd response: success
2,774,909 UART: [afmc] ++
2,775,077 UART: [afmc] CDI.KEYID = 6
2,775,439 UART: [afmc] SUBJECT.KEYID = 7
2,775,864 UART: [afmc] AUTHORITY.KEYID = 5
2,811,481 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,006 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,754 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,482 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,367 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,086 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,836 UART: [afmc] --
2,854,816 UART: [cold-reset] --
2,855,728 UART: [state] Locking Datavault
2,856,697 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,301 UART: [state] Locking ICCM
2,857,753 UART: [exit] Launching FMC @ 0x40000130
2,863,082 UART:
2,863,098 UART: Running Caliptra FMC ...
2,863,506 UART:
2,863,560 UART: [state] CFI Enabled
2,874,259 UART: [fht] FMC Alias Private Key: 7
2,982,190 UART: [art] Extend RT PCRs Done
2,982,618 UART: [art] Lock RT PCRs Done
2,984,290 UART: [art] Populate DV Done
2,992,655 UART: [fht] FMC Alias Private Key: 7
2,993,677 UART: [art] Derive CDI
2,993,957 UART: [art] Store in in slot 0x4
3,080,126 UART: [art] Derive Key Pair
3,080,486 UART: [art] Store priv key in slot 0x5
3,093,114 UART: [art] Derive Key Pair - Done
3,107,789 UART: [art] Signing Cert with AUTHO
3,108,269 UART: RITY.KEYID = 7
3,123,211 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,976 UART: [art] PUB.X = D925850828AB9C077136E17B6DEEB2CDED7BFC1843FA020341FAB37196047F14498151CF40992026E7BCECBFC775BAF0
3,130,741 UART: [art] PUB.Y = 3ACB409181E47579B65518916E5D6DAE471F5067F999EAEB498600944C4239A77347FD85F8E5934BCEFED0022A0B0C39
3,137,660 UART: [art] SIG.R = F46CEFA8A4BC258AD4CECCB2468308E63666F3B57C95DCDBFB0C3D3FA968F772E31DBC254ADCA93848DAEC6CC081C281
3,144,452 UART: [art] SIG.S = 3239F067B53158D1314F2F279FBB1770FE4D65CA0EA80359C7CA85FC78D9AD34A68747969B3C6064715E6BAEB79878C1
3,167,643 UART: Caliptra RT
3,167,896 UART: [state] CFI Enabled
3,276,143 UART: [rt] RT listening for mailbox commands...
3,276,813 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,637 UART: [rt]cmd =0x4c4d5356, len=1672
3,569,968 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,531 ready_for_fw is high
1,060,531 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,106 >>> mbox cmd response: success
2,690,412 UART:
2,690,428 UART: Running Caliptra FMC ...
2,690,836 UART:
2,690,890 UART: [state] CFI Enabled
2,701,175 UART: [fht] FMC Alias Private Key: 7
2,809,106 UART: [art] Extend RT PCRs Done
2,809,534 UART: [art] Lock RT PCRs Done
2,810,674 UART: [art] Populate DV Done
2,819,333 UART: [fht] FMC Alias Private Key: 7
2,820,443 UART: [art] Derive CDI
2,820,723 UART: [art] Store in in slot 0x4
2,906,310 UART: [art] Derive Key Pair
2,906,670 UART: [art] Store priv key in slot 0x5
2,920,000 UART: [art] Derive Key Pair - Done
2,934,548 UART: [art] Signing Cert with AUTHO
2,935,028 UART: RITY.KEYID = 7
2,949,748 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,513 UART: [art] PUB.X = BB2F78B38FE34764090A840049A2580E8C23A9AE304E26309685C293B6988ABDAA7F1C5BA9376CF0E68AD672F5DA3082
2,957,256 UART: [art] PUB.Y = 5E831D7FEA41737CA1D1B99DC27ECEE6FBD02DBAD2B2C75CF951443F84E1C470957D334F3B6AB6A71C2F92E4A536675C
2,964,224 UART: [art] SIG.R = E7E45A125C466B2BB96EBF9FFCB30D929E01D3D6BEC1A510BFCD41AC28F52E63056CC69ABA783977B1C58DE3A4FE115C
2,971,009 UART: [art] SIG.S = AEDAC627E65CE064437775E1102D4963C76A8BE9DA187829445D618535DE16F056EE766016F07F1F6762F376F6043942
2,994,837 UART: Caliptra RT
2,995,090 UART: [state] CFI Enabled
3,103,522 UART: [rt] RT listening for mailbox commands...
3,104,192 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,716 UART: [rt]cmd =0x4c4d5356, len=1672
3,397,453 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
86,826 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
893,787 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,912 UART: [kat] ++
898,064 UART: [kat] sha1
902,264 UART: [kat] SHA2-256
904,204 UART: [kat] SHA2-384
906,881 UART: [kat] SHA2-512-ACC
908,782 UART: [kat] ECC-384
918,531 UART: [kat] HMAC-384Kdf
922,987 UART: [kat] LMS
1,171,315 UART: [kat] --
1,172,134 UART: [cold-reset] ++
1,172,510 UART: [fht] FHT @ 0x50003400
1,175,315 UART: [idev] ++
1,175,483 UART: [idev] CDI.KEYID = 6
1,175,843 UART: [idev] SUBJECT.KEYID = 7
1,176,267 UART: [idev] UDS.KEYID = 0
1,176,612 ready_for_fw is high
1,176,612 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,721 UART: [idev] Erasing UDS.KEYID = 0
1,201,938 UART: [idev] Sha1 KeyId Algorithm
1,210,340 UART: [idev] --
1,211,324 UART: [ldev] ++
1,211,492 UART: [ldev] CDI.KEYID = 6
1,211,855 UART: [ldev] SUBJECT.KEYID = 5
1,212,281 UART: [ldev] AUTHORITY.KEYID = 7
1,212,744 UART: [ldev] FE.KEYID = 1
1,218,270 UART: [ldev] Erasing FE.KEYID = 1
1,244,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,462 UART: [ldev] --
1,283,723 UART: [fwproc] Wait for Commands...
1,284,453 UART: [fwproc] Recv command 0x46574c44
1,285,181 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,007 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,311 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,242 >>> mbox cmd response: success
2,777,270 UART: [afmc] ++
2,777,438 UART: [afmc] CDI.KEYID = 6
2,777,800 UART: [afmc] SUBJECT.KEYID = 7
2,778,225 UART: [afmc] AUTHORITY.KEYID = 5
2,814,374 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,275 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,023 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,751 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,636 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,355 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,167 UART: [afmc] --
2,858,241 UART: [cold-reset] --
2,859,107 UART: [state] Locking Datavault
2,860,250 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,854 UART: [state] Locking ICCM
2,861,426 UART: [exit] Launching FMC @ 0x40000130
2,866,755 UART:
2,866,771 UART: Running Caliptra FMC ...
2,867,179 UART:
2,867,322 UART: [state] CFI Enabled
2,878,001 UART: [fht] FMC Alias Private Key: 7
2,985,870 UART: [art] Extend RT PCRs Done
2,986,298 UART: [art] Lock RT PCRs Done
2,987,662 UART: [art] Populate DV Done
2,995,761 UART: [fht] FMC Alias Private Key: 7
2,996,905 UART: [art] Derive CDI
2,997,185 UART: [art] Store in in slot 0x4
3,082,548 UART: [art] Derive Key Pair
3,082,908 UART: [art] Store priv key in slot 0x5
3,096,048 UART: [art] Derive Key Pair - Done
3,110,955 UART: [art] Signing Cert with AUTHO
3,111,435 UART: RITY.KEYID = 7
3,126,501 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,266 UART: [art] PUB.X = 0636440ECFB0E60D7009F54EEBD13554B888B82F0E918B2DEFC1C2376B10F0A0B181418AF63DF8430C033E2592A2FE46
3,134,021 UART: [art] PUB.Y = 3715BF79BC4577994157CB46AB06429035FDD3CDEDDE464A0BBA8B5A35A81418A21346D3B416CC0CE3D738423958CEDE
3,140,972 UART: [art] SIG.R = A55EA2AB6A9F559E3E2045479C3C5E5FD42EF4F1748C3EE813CC52384C935405CE23EEFABDE41553C4068752F551CECA
3,147,750 UART: [art] SIG.S = 95EA4CAA50F287714C6D8CA1337B84357E5B7B8187325CF14061673AA272EDFCD3DCD758D06970D550413CA9A1AD7362
3,171,301 UART: Caliptra RT
3,171,646 UART: [state] CFI Enabled
3,279,274 UART: [rt] RT listening for mailbox commands...
3,279,944 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,414 UART: [rt]cmd =0x4c4d5356, len=1672
3,572,905 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,600 ready_for_fw is high
1,060,600 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,643 >>> mbox cmd response: success
2,689,589 UART:
2,689,605 UART: Running Caliptra FMC ...
2,690,013 UART:
2,690,156 UART: [state] CFI Enabled
2,700,739 UART: [fht] FMC Alias Private Key: 7
2,808,740 UART: [art] Extend RT PCRs Done
2,809,168 UART: [art] Lock RT PCRs Done
2,810,342 UART: [art] Populate DV Done
2,818,831 UART: [fht] FMC Alias Private Key: 7
2,819,775 UART: [art] Derive CDI
2,820,055 UART: [art] Store in in slot 0x4
2,906,082 UART: [art] Derive Key Pair
2,906,442 UART: [art] Store priv key in slot 0x5
2,920,176 UART: [art] Derive Key Pair - Done
2,934,963 UART: [art] Signing Cert with AUTHO
2,935,443 UART: RITY.KEYID = 7
2,950,925 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,690 UART: [art] PUB.X = 54D8F0494E9964D4513E44F7BFFD67C6E18E5B29410A72F2F6B521F41D411890F79F6C49653C819508E5FDA2BFDDD9EB
2,958,462 UART: [art] PUB.Y = 9A43B9BBB9C6078A43F5B69CA4188503E9D5E409DD31EF7EB3260D88202E54B1839DEA8A7CE812282B46DC009B17F3B1
2,965,386 UART: [art] SIG.R = AE1184E3188B08C6F028E5F5D3A157B18E51D4336881E0458C52AE66B7327414AF895C0DA58B12F023B7CEAD901E9D5E
2,972,154 UART: [art] SIG.S = 2C0060B203479359CF835304304626038AC16D12446C6982A1DDD3611B4EC0954CB1F0F1264CF91B0D6A27D089741E9D
2,996,725 UART: Caliptra RT
2,997,070 UART: [state] CFI Enabled
3,104,761 UART: [rt] RT listening for mailbox commands...
3,105,431 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,069 UART: [rt]cmd =0x4c4d5356, len=1672
3,398,630 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,726 UART: [state] LifecycleState = Unprovisioned
85,381 UART: [state] DebugLocked = No
85,989 UART: [state] WD Timer not started. Device not locked for debugging
87,188 UART: [kat] SHA2-256
890,738 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,867 UART: [kat] ++
895,019 UART: [kat] sha1
899,397 UART: [kat] SHA2-256
901,337 UART: [kat] SHA2-384
904,022 UART: [kat] SHA2-512-ACC
905,923 UART: [kat] ECC-384
915,372 UART: [kat] HMAC-384Kdf
920,018 UART: [kat] LMS
1,168,330 UART: [kat] --
1,169,459 UART: [cold-reset] ++
1,169,979 UART: [fht] FHT @ 0x50003400
1,172,819 UART: [idev] ++
1,172,987 UART: [idev] CDI.KEYID = 6
1,173,348 UART: [idev] SUBJECT.KEYID = 7
1,173,773 UART: [idev] UDS.KEYID = 0
1,174,119 ready_for_fw is high
1,174,119 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,313 UART: [idev] Erasing UDS.KEYID = 0
1,197,585 UART: [idev] Sha1 KeyId Algorithm
1,206,427 UART: [idev] --
1,207,552 UART: [ldev] ++
1,207,720 UART: [ldev] CDI.KEYID = 6
1,208,084 UART: [ldev] SUBJECT.KEYID = 5
1,208,511 UART: [ldev] AUTHORITY.KEYID = 7
1,208,974 UART: [ldev] FE.KEYID = 1
1,214,188 UART: [ldev] Erasing FE.KEYID = 1
1,240,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,416 UART: [ldev] --
1,279,852 UART: [fwproc] Wait for Commands...
1,280,593 UART: [fwproc] Recv command 0x46574c44
1,281,326 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,812 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,121 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,937 >>> mbox cmd response: success
2,772,202 UART: [afmc] ++
2,772,370 UART: [afmc] CDI.KEYID = 6
2,772,733 UART: [afmc] SUBJECT.KEYID = 7
2,773,159 UART: [afmc] AUTHORITY.KEYID = 5
2,808,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,788 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,539 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,268 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,151 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,870 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,837 UART: [afmc] --
2,851,913 UART: [cold-reset] --
2,852,919 UART: [state] Locking Datavault
2,854,012 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,616 UART: [state] Locking ICCM
2,855,120 UART: [exit] Launching FMC @ 0x40000130
2,860,449 UART:
2,860,465 UART: Running Caliptra FMC ...
2,860,873 UART:
2,860,927 UART: [state] CFI Enabled
2,871,114 UART: [fht] FMC Alias Private Key: 7
2,979,233 UART: [art] Extend RT PCRs Done
2,979,661 UART: [art] Lock RT PCRs Done
2,981,073 UART: [art] Populate DV Done
2,989,250 UART: [fht] FMC Alias Private Key: 7
2,990,262 UART: [art] Derive CDI
2,990,542 UART: [art] Store in in slot 0x4
3,076,443 UART: [art] Derive Key Pair
3,076,803 UART: [art] Store priv key in slot 0x5
3,090,821 UART: [art] Derive Key Pair - Done
3,105,811 UART: [art] Signing Cert with AUTHO
3,106,291 UART: RITY.KEYID = 7
3,120,979 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,744 UART: [art] PUB.X = 24BBC19A68744251A27026780BDB488EC74BBA55F3E82D04134A8F5FE1A123526EE9736C80BBFA6BC36ABEA911B778AF
3,128,520 UART: [art] PUB.Y = A537CB7439BEF424D077E8755954FA1EB5823CB12F5DD480029E308311033692C13B6466D48C5AEA836CDFA75B60DBC8
3,135,468 UART: [art] SIG.R = 170F3D0F4990D726238317762E1C7A774A717DAB36236F1EBA5EE6944626013064315263ABFF15B79B911DF7C6FFDF55
3,142,227 UART: [art] SIG.S = 6662FD7169173F9B5C7BDF71561232F852BC6B46A4E3E72FEA7090831FF6D09127276D6784852165A5CA3DABFA228723
3,165,838 UART: Caliptra RT
3,166,091 UART: [state] CFI Enabled
3,273,474 UART: [rt] RT listening for mailbox commands...
3,274,144 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,880 UART: [rt]cmd =0x4c4d5356, len=1672
3,567,345 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,300 ready_for_fw is high
1,056,300 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,035 >>> mbox cmd response: success
2,686,171 UART:
2,686,187 UART: Running Caliptra FMC ...
2,686,595 UART:
2,686,649 UART: [state] CFI Enabled
2,697,294 UART: [fht] FMC Alias Private Key: 7
2,804,929 UART: [art] Extend RT PCRs Done
2,805,357 UART: [art] Lock RT PCRs Done
2,807,137 UART: [art] Populate DV Done
2,814,996 UART: [fht] FMC Alias Private Key: 7
2,816,132 UART: [art] Derive CDI
2,816,412 UART: [art] Store in in slot 0x4
2,902,469 UART: [art] Derive Key Pair
2,902,829 UART: [art] Store priv key in slot 0x5
2,915,525 UART: [art] Derive Key Pair - Done
2,930,047 UART: [art] Signing Cert with AUTHO
2,930,527 UART: RITY.KEYID = 7
2,945,835 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,600 UART: [art] PUB.X = 40D63ACD69781C745F7666B83ADE8D04970260961E135F27A4DA3CB821C18FB94C6F67772311564F57EBCC3A82650743
2,953,357 UART: [art] PUB.Y = A5D440F142FFD2B0EEE2A6563D157BE37FE7E117E3CE10C0E7E7B2044E1CB787BE2B35D89A5F6915067D482FD8733369
2,960,311 UART: [art] SIG.R = AFED9B8E9A7DA56A6101D5894724AF05821D40B20EAD9981B55B38329EF7FBDF2CC2B515FB6E896AECD2B2491C92812E
2,967,088 UART: [art] SIG.S = B35883E0954ECC836B511EB2B471A3E2E6FF23D609B55CA651D8F121244A6D46110AF9CF9C35C051986762879A4F1E6D
2,991,313 UART: Caliptra RT
2,991,566 UART: [state] CFI Enabled
3,098,748 UART: [rt] RT listening for mailbox commands...
3,099,418 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,174 UART: [rt]cmd =0x4c4d5356, len=1672
3,392,667 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,390 UART: [state] WD Timer not started. Device not locked for debugging
87,647 UART: [kat] SHA2-256
891,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,856 UART: [kat] SHA2-256
901,796 UART: [kat] SHA2-384
904,531 UART: [kat] SHA2-512-ACC
906,432 UART: [kat] ECC-384
916,651 UART: [kat] HMAC-384Kdf
921,301 UART: [kat] LMS
1,169,613 UART: [kat] --
1,170,590 UART: [cold-reset] ++
1,170,934 UART: [fht] FHT @ 0x50003400
1,173,606 UART: [idev] ++
1,173,774 UART: [idev] CDI.KEYID = 6
1,174,135 UART: [idev] SUBJECT.KEYID = 7
1,174,560 UART: [idev] UDS.KEYID = 0
1,174,906 ready_for_fw is high
1,174,906 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,526 UART: [idev] Erasing UDS.KEYID = 0
1,200,052 UART: [idev] Sha1 KeyId Algorithm
1,208,954 UART: [idev] --
1,210,089 UART: [ldev] ++
1,210,257 UART: [ldev] CDI.KEYID = 6
1,210,621 UART: [ldev] SUBJECT.KEYID = 5
1,211,048 UART: [ldev] AUTHORITY.KEYID = 7
1,211,511 UART: [ldev] FE.KEYID = 1
1,216,499 UART: [ldev] Erasing FE.KEYID = 1
1,242,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,077 UART: [ldev] --
1,281,407 UART: [fwproc] Wait for Commands...
1,282,096 UART: [fwproc] Recv command 0x46574c44
1,282,829 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,543 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,852 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,708 >>> mbox cmd response: success
2,773,779 UART: [afmc] ++
2,773,947 UART: [afmc] CDI.KEYID = 6
2,774,310 UART: [afmc] SUBJECT.KEYID = 7
2,774,736 UART: [afmc] AUTHORITY.KEYID = 5
2,810,531 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,853 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,604 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,333 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,216 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,935 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,840 UART: [afmc] --
2,853,870 UART: [cold-reset] --
2,854,890 UART: [state] Locking Datavault
2,856,041 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,645 UART: [state] Locking ICCM
2,857,185 UART: [exit] Launching FMC @ 0x40000130
2,862,514 UART:
2,862,530 UART: Running Caliptra FMC ...
2,862,938 UART:
2,863,081 UART: [state] CFI Enabled
2,873,702 UART: [fht] FMC Alias Private Key: 7
2,981,939 UART: [art] Extend RT PCRs Done
2,982,367 UART: [art] Lock RT PCRs Done
2,983,765 UART: [art] Populate DV Done
2,991,984 UART: [fht] FMC Alias Private Key: 7
2,992,982 UART: [art] Derive CDI
2,993,262 UART: [art] Store in in slot 0x4
3,078,987 UART: [art] Derive Key Pair
3,079,347 UART: [art] Store priv key in slot 0x5
3,092,885 UART: [art] Derive Key Pair - Done
3,107,653 UART: [art] Signing Cert with AUTHO
3,108,133 UART: RITY.KEYID = 7
3,123,483 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,248 UART: [art] PUB.X = 10BA49B7B6689BA420B3633490459C006CD9A1C6E1CB7FE14B33849A77C68EB4C430A27A088C1D928BA5D7164332C98F
3,130,995 UART: [art] PUB.Y = EF49F7CCED6D4F1124DDA7E63C555C27653F7D44EADA4A0F8A39E5549A15E414D63407271E41E97B315B1DE0B030DC06
3,137,948 UART: [art] SIG.R = E84F97DD7D06D4617B8914583EDCDE91700179A4959812C25ED8D55829C26C80052356CD5C02DD4BA4DF169619809537
3,144,700 UART: [art] SIG.S = 334488D95CC3A5394A63D1656191B723B079F9FC1F0D4D465FA9374935E31CD940D8405DE5BE752C3E470A7F1F899694
3,167,971 UART: Caliptra RT
3,168,316 UART: [state] CFI Enabled
3,276,383 UART: [rt] RT listening for mailbox commands...
3,277,053 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,641 UART: [rt]cmd =0x4c4d5356, len=1672
3,570,290 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,803 ready_for_fw is high
1,056,803 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,860 >>> mbox cmd response: success
2,684,886 UART:
2,684,902 UART: Running Caliptra FMC ...
2,685,310 UART:
2,685,453 UART: [state] CFI Enabled
2,696,108 UART: [fht] FMC Alias Private Key: 7
2,803,081 UART: [art] Extend RT PCRs Done
2,803,509 UART: [art] Lock RT PCRs Done
2,804,911 UART: [art] Populate DV Done
2,813,126 UART: [fht] FMC Alias Private Key: 7
2,814,176 UART: [art] Derive CDI
2,814,456 UART: [art] Store in in slot 0x4
2,900,647 UART: [art] Derive Key Pair
2,901,007 UART: [art] Store priv key in slot 0x5
2,914,275 UART: [art] Derive Key Pair - Done
2,928,901 UART: [art] Signing Cert with AUTHO
2,929,381 UART: RITY.KEYID = 7
2,944,793 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,558 UART: [art] PUB.X = DD0F85BDDFCBB8968B417E7C89B291DF531CF660C3FDF798C59E73E46C9D4FA18ACA579D8E07800C3DEE8BDD3AB8726F
2,952,345 UART: [art] PUB.Y = AB4CCC16A24F5D185D60FC34F5D498A7004AA381B58875E2667F2756B039B3FF842E2CFD5671DC44D71E8464F1D8B63B
2,959,281 UART: [art] SIG.R = 862C7B842918D486FB5CD2C4199C67155A02697D9D71B5CE73D154405EC82A2301F3AA8037F013E5778D83346C227B69
2,966,037 UART: [art] SIG.S = 6EB8F4955B56F493A93E1B6B460F51914CAD9B4B13DADF45AD174FFA35C327EDB5941E268D864CF034D97EF0A76E23B7
2,990,179 UART: Caliptra RT
2,990,524 UART: [state] CFI Enabled
3,097,893 UART: [rt] RT listening for mailbox commands...
3,098,563 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,179 UART: [rt]cmd =0x4c4d5356, len=1672
3,391,512 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,281 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,821 UART: [kat] SHA2-256
881,752 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,867 UART: [kat] ++
886,019 UART: [kat] sha1
890,245 UART: [kat] SHA2-256
892,183 UART: [kat] SHA2-384
894,766 UART: [kat] SHA2-512-ACC
896,667 UART: [kat] ECC-384
902,330 UART: [kat] HMAC-384Kdf
906,894 UART: [kat] LMS
1,475,090 UART: [kat] --
1,475,907 UART: [cold-reset] ++
1,476,359 UART: [fht] Storing FHT @ 0x50003400
1,479,334 UART: [idev] ++
1,479,502 UART: [idev] CDI.KEYID = 6
1,479,862 UART: [idev] SUBJECT.KEYID = 7
1,480,286 UART: [idev] UDS.KEYID = 0
1,480,631 ready_for_fw is high
1,480,631 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,512 UART: [idev] Erasing UDS.KEYID = 0
1,505,298 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,026 UART: [idev] --
1,515,099 UART: [ldev] ++
1,515,267 UART: [ldev] CDI.KEYID = 6
1,515,630 UART: [ldev] SUBJECT.KEYID = 5
1,516,056 UART: [ldev] AUTHORITY.KEYID = 7
1,516,519 UART: [ldev] FE.KEYID = 1
1,521,543 UART: [ldev] Erasing FE.KEYID = 1
1,546,782 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,464 UART: [ldev] --
1,585,811 UART: [fwproc] Waiting for Commands...
1,586,470 UART: [fwproc] Received command 0x46574c44
1,587,261 UART: [fwproc] Received Image of size 114332 bytes
2,885,317 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,255 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,607 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,418 >>> mbox cmd response: success
3,077,418 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,078,466 UART: [afmc] ++
3,078,634 UART: [afmc] CDI.KEYID = 6
3,078,996 UART: [afmc] SUBJECT.KEYID = 7
3,079,421 UART: [afmc] AUTHORITY.KEYID = 5
3,114,784 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,264 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,044 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,772 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,657 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,347 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,304 UART: [afmc] --
3,158,224 UART: [cold-reset] --
3,159,096 UART: [state] Locking Datavault
3,160,159 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,763 UART: [state] Locking ICCM
3,161,265 UART: [exit] Launching FMC @ 0x40000130
3,166,594 UART:
3,166,610 UART: Running Caliptra FMC ...
3,167,018 UART:
3,167,072 UART: [state] CFI Enabled
3,177,749 UART: [fht] FMC Alias Private Key: 7
3,285,350 UART: [art] Extend RT PCRs Done
3,285,778 UART: [art] Lock RT PCRs Done
3,287,122 UART: [art] Populate DV Done
3,295,511 UART: [fht] FMC Alias Private Key: 7
3,296,541 UART: [art] Derive CDI
3,296,821 UART: [art] Store in in slot 0x4
3,382,508 UART: [art] Derive Key Pair
3,382,868 UART: [art] Store priv key in slot 0x5
3,396,248 UART: [art] Derive Key Pair - Done
3,411,251 UART: [art] Signing Cert with AUTHO
3,411,731 UART: RITY.KEYID = 7
3,426,779 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,544 UART: [art] PUB.X = 80F10E8FD3A0B8C42B9C9707675525C72B1E23F91EF698FD9088DD70AE01FF096A22C477EB8677759649F38697815D7B
3,434,300 UART: [art] PUB.Y = 76650EF80A2B1103FF2816D8E946A55056BB169BDEA8C01E4304B85F02CB65C389C738B09DA852323ECBF3B11A374187
3,441,237 UART: [art] SIG.R = AF8AB0DC25E7242D94FE06DB464835840E69CC020B66346B1A29BA0A5F2E47BE56678034EE3281BE010343F16100DD8A
3,447,968 UART: [art] SIG.S = 6C4A1D2A263EECECED41B20D0BEB3FDB16D95746D71489D17B539681D9150770E08BD45908AE388BDAE30CC99437073A
3,472,221 UART: Caliptra RT
3,472,474 UART: [state] CFI Enabled
3,580,371 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,593,472 >>> mbox cmd response: failed
3,593,472 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,856 UART: [rt]cmd =0x46505652, len=4
3,623,516 UART: [rt] FIPS Version
3,624,649 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,649 ready_for_fw is high
1,362,649 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,564 >>> mbox cmd response: success
2,927,564 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,989,676 UART:
2,989,692 UART: Running Caliptra FMC ...
2,990,100 UART:
2,990,154 UART: [state] CFI Enabled
3,000,943 UART: [fht] FMC Alias Private Key: 7
3,108,348 UART: [art] Extend RT PCRs Done
3,108,776 UART: [art] Lock RT PCRs Done
3,110,166 UART: [art] Populate DV Done
3,118,573 UART: [fht] FMC Alias Private Key: 7
3,119,665 UART: [art] Derive CDI
3,119,945 UART: [art] Store in in slot 0x4
3,205,434 UART: [art] Derive Key Pair
3,205,794 UART: [art] Store priv key in slot 0x5
3,218,806 UART: [art] Derive Key Pair - Done
3,233,513 UART: [art] Signing Cert with AUTHO
3,233,993 UART: RITY.KEYID = 7
3,248,813 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,578 UART: [art] PUB.X = 0C46BD87C7EB3DCE573013DE58A774DC4ADDCE5CD68745A8CF025AD64FB379321AE71D9AF0B260E1A468074C7CCFCD85
3,256,361 UART: [art] PUB.Y = 3984F4A58B04D30EEE543036E15A1BCB5AA278F95F03C97D3C22BF635A9B5B14E5A54B7948117C831E212DFE173B0C5E
3,263,307 UART: [art] SIG.R = 512F8EC8EFFA00A2AEAF40D9C4AB83E7272074DA279028535AF455445CE07DCFCCC0D7D4780835AC36A036DEF5EA546A
3,270,070 UART: [art] SIG.S = A0A50B2B23F7ED40EC3D411C53B2B27E146A95AC14D7863528267B40036FEECF4914D7E1A37DEDE529E10A62FA8F7749
3,294,236 UART: Caliptra RT
3,294,489 UART: [state] CFI Enabled
3,402,506 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,415,095 >>> mbox cmd response: failed
3,415,095 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,241 UART: [rt]cmd =0x46505652, len=4
3,444,901 UART: [rt] FIPS Version
3,446,128 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,640 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,192 UART: [kat] SHA2-256
882,123 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,238 UART: [kat] ++
886,390 UART: [kat] sha1
890,742 UART: [kat] SHA2-256
892,680 UART: [kat] SHA2-384
895,343 UART: [kat] SHA2-512-ACC
897,244 UART: [kat] ECC-384
902,941 UART: [kat] HMAC-384Kdf
907,555 UART: [kat] LMS
1,475,751 UART: [kat] --
1,476,432 UART: [cold-reset] ++
1,476,796 UART: [fht] Storing FHT @ 0x50003400
1,479,463 UART: [idev] ++
1,479,631 UART: [idev] CDI.KEYID = 6
1,479,991 UART: [idev] SUBJECT.KEYID = 7
1,480,415 UART: [idev] UDS.KEYID = 0
1,480,760 ready_for_fw is high
1,480,760 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,095 UART: [idev] Erasing UDS.KEYID = 0
1,504,821 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,483 UART: [idev] --
1,514,668 UART: [ldev] ++
1,514,836 UART: [ldev] CDI.KEYID = 6
1,515,199 UART: [ldev] SUBJECT.KEYID = 5
1,515,625 UART: [ldev] AUTHORITY.KEYID = 7
1,516,088 UART: [ldev] FE.KEYID = 1
1,521,054 UART: [ldev] Erasing FE.KEYID = 1
1,545,749 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,651 UART: [ldev] --
1,585,106 UART: [fwproc] Waiting for Commands...
1,585,797 UART: [fwproc] Received command 0x46574c44
1,586,588 UART: [fwproc] Received Image of size 114332 bytes
2,884,268 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,868 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,220 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,147 >>> mbox cmd response: success
3,077,147 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,078,239 UART: [afmc] ++
3,078,407 UART: [afmc] CDI.KEYID = 6
3,078,769 UART: [afmc] SUBJECT.KEYID = 7
3,079,194 UART: [afmc] AUTHORITY.KEYID = 5
3,115,483 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,719 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,499 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,227 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,112 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,802 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,589 UART: [afmc] --
3,158,615 UART: [cold-reset] --
3,159,407 UART: [state] Locking Datavault
3,160,630 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,234 UART: [state] Locking ICCM
3,161,706 UART: [exit] Launching FMC @ 0x40000130
3,167,035 UART:
3,167,051 UART: Running Caliptra FMC ...
3,167,459 UART:
3,167,602 UART: [state] CFI Enabled
3,177,737 UART: [fht] FMC Alias Private Key: 7
3,286,074 UART: [art] Extend RT PCRs Done
3,286,502 UART: [art] Lock RT PCRs Done
3,288,194 UART: [art] Populate DV Done
3,296,467 UART: [fht] FMC Alias Private Key: 7
3,297,429 UART: [art] Derive CDI
3,297,709 UART: [art] Store in in slot 0x4
3,383,534 UART: [art] Derive Key Pair
3,383,894 UART: [art] Store priv key in slot 0x5
3,396,784 UART: [art] Derive Key Pair - Done
3,411,593 UART: [art] Signing Cert with AUTHO
3,412,073 UART: RITY.KEYID = 7
3,426,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,656 UART: [art] PUB.X = 31F13DDA4B0253C8AF67E070C774F97E60F1168BC93D1285CDC9093A2805B25450954D70C7C57C77F3C7CFA747C84966
3,434,417 UART: [art] PUB.Y = 2C5FC991BB1621EEB1B8BCDA14813040174F45DDD2BB99148AEFB3ACC10D74108C65618ECA99E7F136DBE3C0B972B72C
3,441,382 UART: [art] SIG.R = 0B476C06CCDBF9B07A5799540ACD72E7D8C1D477CB25958320E52CD3019B659178B2F3AA6172ABE1551AA112931D1C66
3,448,144 UART: [art] SIG.S = 0871E9D68E872E04338BA1C77440BB3CFFF1C70CBBC504054442D9C410B51BF8BDB68F7512D54C7A49EDACA1AE0C67CF
3,471,771 UART: Caliptra RT
3,472,116 UART: [state] CFI Enabled
3,580,548 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,593,525 >>> mbox cmd response: failed
3,593,525 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,713 UART: [rt]cmd =0x46505652, len=4
3,623,373 UART: [rt] FIPS Version
3,624,280 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,022 ready_for_fw is high
1,363,022 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,523 >>> mbox cmd response: success
2,928,523 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,990,199 UART:
2,990,215 UART: Running Caliptra FMC ...
2,990,623 UART:
2,990,766 UART: [state] CFI Enabled
3,001,465 UART: [fht] FMC Alias Private Key: 7
3,109,210 UART: [art] Extend RT PCRs Done
3,109,638 UART: [art] Lock RT PCRs Done
3,110,902 UART: [art] Populate DV Done
3,118,983 UART: [fht] FMC Alias Private Key: 7
3,120,095 UART: [art] Derive CDI
3,120,375 UART: [art] Store in in slot 0x4
3,206,044 UART: [art] Derive Key Pair
3,206,404 UART: [art] Store priv key in slot 0x5
3,219,028 UART: [art] Derive Key Pair - Done
3,233,761 UART: [art] Signing Cert with AUTHO
3,234,241 UART: RITY.KEYID = 7
3,249,585 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,350 UART: [art] PUB.X = 273ED5809ADAAB45B3E1CDF409593665F32A4428FC0FB4D7FA1F57AC93943E75A03EAFEEC4452A97C3D58F6FB57731B4
3,257,130 UART: [art] PUB.Y = 6061749D9773590E8B338BAAB1E4FFDFDB111441F0EBF5D15CD15CC8B43BA66B656F3685309DD751531A2804CBF63DD6
3,264,084 UART: [art] SIG.R = CA45FC9117EA1D7DE4CFED8B6C76FC27F64F461828E59740CBD0645D686848B436B3722F805D6BE5F97F10F7E012E3B8
3,270,864 UART: [art] SIG.S = 2D274D67F621F56CAC9C546248A278FC3BBAD837768CABBAFBF6E0FC536F9AC004654657BE5AD7241D6C977B7704C4EA
3,295,445 UART: Caliptra RT
3,295,790 UART: [state] CFI Enabled
3,404,271 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,417,092 >>> mbox cmd response: failed
3,417,092 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,342 UART: [rt]cmd =0x46505652, len=4
3,447,002 UART: [rt] FIPS Version
3,448,263 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,890 UART: [state] LifecycleState = Unprovisioned
85,545 UART: [state] DebugLocked = No
86,125 UART: [state] WD Timer not started. Device not locked for debugging
87,292 UART: [kat] SHA2-256
892,942 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,067 UART: [kat] ++
897,219 UART: [kat] sha1
901,307 UART: [kat] SHA2-256
903,247 UART: [kat] SHA2-384
905,824 UART: [kat] SHA2-512-ACC
907,725 UART: [kat] ECC-384
917,016 UART: [kat] HMAC-384Kdf
921,662 UART: [kat] LMS
1,169,990 UART: [kat] --
1,170,861 UART: [cold-reset] ++
1,171,293 UART: [fht] FHT @ 0x50003400
1,173,778 UART: [idev] ++
1,173,946 UART: [idev] CDI.KEYID = 6
1,174,306 UART: [idev] SUBJECT.KEYID = 7
1,174,730 UART: [idev] UDS.KEYID = 0
1,175,075 ready_for_fw is high
1,175,075 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,056 UART: [idev] Erasing UDS.KEYID = 0
1,199,989 UART: [idev] Sha1 KeyId Algorithm
1,208,459 UART: [idev] --
1,209,653 UART: [ldev] ++
1,209,821 UART: [ldev] CDI.KEYID = 6
1,210,184 UART: [ldev] SUBJECT.KEYID = 5
1,210,610 UART: [ldev] AUTHORITY.KEYID = 7
1,211,073 UART: [ldev] FE.KEYID = 1
1,216,161 UART: [ldev] Erasing FE.KEYID = 1
1,242,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,663 UART: [ldev] --
1,281,998 UART: [fwproc] Wait for Commands...
1,282,780 UART: [fwproc] Recv command 0x46574c44
1,283,508 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,017 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,650 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,954 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,721 >>> mbox cmd response: success
2,772,721 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,773,893 UART: [afmc] ++
2,774,061 UART: [afmc] CDI.KEYID = 6
2,774,423 UART: [afmc] SUBJECT.KEYID = 7
2,774,848 UART: [afmc] AUTHORITY.KEYID = 5
2,809,885 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,512 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,260 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,988 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,873 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,592 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,534 UART: [afmc] --
2,853,568 UART: [cold-reset] --
2,854,342 UART: [state] Locking Datavault
2,855,585 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,189 UART: [state] Locking ICCM
2,856,715 UART: [exit] Launching FMC @ 0x40000130
2,862,044 UART:
2,862,060 UART: Running Caliptra FMC ...
2,862,468 UART:
2,862,522 UART: [state] CFI Enabled
2,872,801 UART: [fht] FMC Alias Private Key: 7
2,980,840 UART: [art] Extend RT PCRs Done
2,981,268 UART: [art] Lock RT PCRs Done
2,982,866 UART: [art] Populate DV Done
2,991,135 UART: [fht] FMC Alias Private Key: 7
2,992,299 UART: [art] Derive CDI
2,992,579 UART: [art] Store in in slot 0x4
3,078,298 UART: [art] Derive Key Pair
3,078,658 UART: [art] Store priv key in slot 0x5
3,091,862 UART: [art] Derive Key Pair - Done
3,106,669 UART: [art] Signing Cert with AUTHO
3,107,149 UART: RITY.KEYID = 7
3,122,579 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,344 UART: [art] PUB.X = 09CD761A6D9A3A4ECDEBAD0D662FF63A4774529094F829E4C1C619266FB66C5E5E94F3CC15E4A2CFE23DEEB841F0F9B4
3,130,128 UART: [art] PUB.Y = 0795BBF4A2E301F23D4497C23F5FF43D43024BA2CBB9926E60DB72EA099FF6BDBCEADE86BB6AECE1030B974927E1BF9E
3,137,084 UART: [art] SIG.R = 4420D50BA586AACADA55FB10875AA5123BED90F37164959593CD9F35E94CB9B7B2CC82360E00B75A656673EF1DFD5ACC
3,143,840 UART: [art] SIG.S = A82E3DCC4AD1421C9448B6E46601B353995C181C5795986BBDB695D694D9C03F62428EDF04BC7041F6C83541198D235F
3,167,641 UART: Caliptra RT
3,167,894 UART: [state] CFI Enabled
3,274,895 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,287,930 >>> mbox cmd response: failed
3,287,930 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,424 UART: [rt]cmd =0x46505652, len=4
3,318,084 UART: [rt] FIPS Version
3,319,231 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,705 ready_for_fw is high
1,059,705 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,314 >>> mbox cmd response: success
2,625,314 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,686,942 UART:
2,686,958 UART: Running Caliptra FMC ...
2,687,366 UART:
2,687,420 UART: [state] CFI Enabled
2,698,053 UART: [fht] FMC Alias Private Key: 7
2,805,632 UART: [art] Extend RT PCRs Done
2,806,060 UART: [art] Lock RT PCRs Done
2,807,422 UART: [art] Populate DV Done
2,815,791 UART: [fht] FMC Alias Private Key: 7
2,816,859 UART: [art] Derive CDI
2,817,139 UART: [art] Store in in slot 0x4
2,902,742 UART: [art] Derive Key Pair
2,903,102 UART: [art] Store priv key in slot 0x5
2,916,340 UART: [art] Derive Key Pair - Done
2,930,864 UART: [art] Signing Cert with AUTHO
2,931,344 UART: RITY.KEYID = 7
2,946,896 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,661 UART: [art] PUB.X = 8F2D6C9A31A151A517EA32C600EB150010C0D2625DDDDE77E0D13E4BE50DA5E63934E83D5705C9A1852E1A6653987048
2,954,383 UART: [art] PUB.Y = 7CEFEBD106C0E764C79C129839F23968E644ECBE0544A5E79329DB7AA1A9FCC4ABE1A3604C8A6D11A8E445D2DABB1DC7
2,961,349 UART: [art] SIG.R = 1E241FEFE7BB86DE732F453621F3E37603F54B888DD5A59340ECF4239DAEB5B9314118F2B840DF9EEA2DAF0657CF0BA3
2,968,126 UART: [art] SIG.S = E9D7CEAE8B9877177E0F859E023DA9606171B5982DF1C76C1A62D46951C4F3F3F3DA812207532B9A6674AC0677EBA923
2,992,221 UART: Caliptra RT
2,992,474 UART: [state] CFI Enabled
3,098,875 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,111,594 >>> mbox cmd response: failed
3,111,594 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,026 UART: [rt]cmd =0x46505652, len=4
3,141,686 UART: [rt] FIPS Version
3,142,661 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
893,451 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,576 UART: [kat] ++
897,728 UART: [kat] sha1
902,044 UART: [kat] SHA2-256
903,984 UART: [kat] SHA2-384
906,681 UART: [kat] SHA2-512-ACC
908,582 UART: [kat] ECC-384
918,197 UART: [kat] HMAC-384Kdf
922,855 UART: [kat] LMS
1,171,183 UART: [kat] --
1,172,010 UART: [cold-reset] ++
1,172,544 UART: [fht] FHT @ 0x50003400
1,175,331 UART: [idev] ++
1,175,499 UART: [idev] CDI.KEYID = 6
1,175,859 UART: [idev] SUBJECT.KEYID = 7
1,176,283 UART: [idev] UDS.KEYID = 0
1,176,628 ready_for_fw is high
1,176,628 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,043 UART: [idev] Erasing UDS.KEYID = 0
1,201,568 UART: [idev] Sha1 KeyId Algorithm
1,209,882 UART: [idev] --
1,211,160 UART: [ldev] ++
1,211,328 UART: [ldev] CDI.KEYID = 6
1,211,691 UART: [ldev] SUBJECT.KEYID = 5
1,212,117 UART: [ldev] AUTHORITY.KEYID = 7
1,212,580 UART: [ldev] FE.KEYID = 1
1,218,026 UART: [ldev] Erasing FE.KEYID = 1
1,244,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,430 UART: [ldev] --
1,283,871 UART: [fwproc] Wait for Commands...
1,284,571 UART: [fwproc] Recv command 0x46574c44
1,285,299 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,553 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,857 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,666 >>> mbox cmd response: success
2,774,666 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,775,908 UART: [afmc] ++
2,776,076 UART: [afmc] CDI.KEYID = 6
2,776,438 UART: [afmc] SUBJECT.KEYID = 7
2,776,863 UART: [afmc] AUTHORITY.KEYID = 5
2,812,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,561 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,289 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,174 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,893 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,947 UART: [afmc] --
2,855,883 UART: [cold-reset] --
2,856,797 UART: [state] Locking Datavault
2,858,034 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,638 UART: [state] Locking ICCM
2,859,232 UART: [exit] Launching FMC @ 0x40000130
2,864,561 UART:
2,864,577 UART: Running Caliptra FMC ...
2,864,985 UART:
2,865,128 UART: [state] CFI Enabled
2,875,485 UART: [fht] FMC Alias Private Key: 7
2,982,792 UART: [art] Extend RT PCRs Done
2,983,220 UART: [art] Lock RT PCRs Done
2,984,906 UART: [art] Populate DV Done
2,993,405 UART: [fht] FMC Alias Private Key: 7
2,994,553 UART: [art] Derive CDI
2,994,833 UART: [art] Store in in slot 0x4
3,080,852 UART: [art] Derive Key Pair
3,081,212 UART: [art] Store priv key in slot 0x5
3,094,172 UART: [art] Derive Key Pair - Done
3,108,940 UART: [art] Signing Cert with AUTHO
3,109,420 UART: RITY.KEYID = 7
3,124,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,349 UART: [art] PUB.X = CB2A2F14120AA806482B82F8DDF1EEAA2C30A829699D787AEBE93FBA6F0E4EB0F60FCD88995EAE22FA996B80F2544DE5
3,132,129 UART: [art] PUB.Y = 0E0A86424C470A3620C27FF8DAC6EBBBDACEE0E47DDD9F96E9C7650C0073DCCBC73D5CB36B6BEED8100F0F5E6D5C9166
3,139,067 UART: [art] SIG.R = 367589FFB117F53AE79D8AF33BFFB0D45B8B3BAEA523FF88739A585FE8F19CA17E0EEFA5BF0946830125A1DB207FD1C3
3,145,848 UART: [art] SIG.S = 2C9EE8FA0DA62650D382BF2DCB0372993A6604B12040EE8D1DB3CDEBF83624200625ECB1AD13C04919CB173720E1ECEE
3,169,717 UART: Caliptra RT
3,170,062 UART: [state] CFI Enabled
3,278,393 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,291,060 >>> mbox cmd response: failed
3,291,060 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,626 UART: [rt]cmd =0x46505652, len=4
3,321,286 UART: [rt] FIPS Version
3,322,363 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,366 ready_for_fw is high
1,060,366 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,187 >>> mbox cmd response: success
2,627,187 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,688,119 UART:
2,688,135 UART: Running Caliptra FMC ...
2,688,543 UART:
2,688,686 UART: [state] CFI Enabled
2,699,765 UART: [fht] FMC Alias Private Key: 7
2,808,020 UART: [art] Extend RT PCRs Done
2,808,448 UART: [art] Lock RT PCRs Done
2,810,152 UART: [art] Populate DV Done
2,818,523 UART: [fht] FMC Alias Private Key: 7
2,819,589 UART: [art] Derive CDI
2,819,869 UART: [art] Store in in slot 0x4
2,905,640 UART: [art] Derive Key Pair
2,906,000 UART: [art] Store priv key in slot 0x5
2,919,568 UART: [art] Derive Key Pair - Done
2,934,767 UART: [art] Signing Cert with AUTHO
2,935,247 UART: RITY.KEYID = 7
2,950,993 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,758 UART: [art] PUB.X = D7B916E0AE37D2A885D782E6E5D0CFEDC182A1617197DDC4EC730D42A871AF7E1F4F74D12B1BCD281FF308590C0449B7
2,958,530 UART: [art] PUB.Y = B4FAAFCDD7BB330800F5DEF25C1389597DB4DE04991EBD0614E4B22FF02072B4278621006CD0C8BC9B350A9A495E1F8F
2,965,438 UART: [art] SIG.R = 034D33DEF100C092729CF853069DD64DB7ADC42A9A14650D7F7EC0699EFB1ADBF0EDAA0899D790FE4105E75A5C8781CC
2,972,187 UART: [art] SIG.S = D8E579023723E4061D8405B784979437CC8FB3BDD30AF6A8D31D66895BC795FDA5AAB8572BBBA861A91D3B8F15B59F19
2,995,948 UART: Caliptra RT
2,996,293 UART: [state] CFI Enabled
3,103,612 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,116,477 >>> mbox cmd response: failed
3,116,477 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,923 UART: [rt]cmd =0x46505652, len=4
3,146,583 UART: [rt] FIPS Version
3,147,812 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,754 UART: [kat] SHA2-256
891,304 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,433 UART: [kat] ++
895,585 UART: [kat] sha1
899,839 UART: [kat] SHA2-256
901,779 UART: [kat] SHA2-384
904,498 UART: [kat] SHA2-512-ACC
906,399 UART: [kat] ECC-384
916,004 UART: [kat] HMAC-384Kdf
920,398 UART: [kat] LMS
1,168,710 UART: [kat] --
1,169,683 UART: [cold-reset] ++
1,170,065 UART: [fht] FHT @ 0x50003400
1,172,763 UART: [idev] ++
1,172,931 UART: [idev] CDI.KEYID = 6
1,173,292 UART: [idev] SUBJECT.KEYID = 7
1,173,717 UART: [idev] UDS.KEYID = 0
1,174,063 ready_for_fw is high
1,174,063 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,977 UART: [idev] Erasing UDS.KEYID = 0
1,199,091 UART: [idev] Sha1 KeyId Algorithm
1,208,073 UART: [idev] --
1,209,182 UART: [ldev] ++
1,209,350 UART: [ldev] CDI.KEYID = 6
1,209,714 UART: [ldev] SUBJECT.KEYID = 5
1,210,141 UART: [ldev] AUTHORITY.KEYID = 7
1,210,604 UART: [ldev] FE.KEYID = 1
1,215,636 UART: [ldev] Erasing FE.KEYID = 1
1,242,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,030 UART: [ldev] --
1,281,534 UART: [fwproc] Wait for Commands...
1,282,141 UART: [fwproc] Recv command 0x46574c44
1,282,874 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,070 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,379 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,117 >>> mbox cmd response: success
2,772,117 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,773,344 UART: [afmc] ++
2,773,512 UART: [afmc] CDI.KEYID = 6
2,773,875 UART: [afmc] SUBJECT.KEYID = 7
2,774,301 UART: [afmc] AUTHORITY.KEYID = 5
2,809,682 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,498 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,249 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,978 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,861 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,580 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,521 UART: [afmc] --
2,853,461 UART: [cold-reset] --
2,854,083 UART: [state] Locking Datavault
2,855,024 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,628 UART: [state] Locking ICCM
2,856,228 UART: [exit] Launching FMC @ 0x40000130
2,861,557 UART:
2,861,573 UART: Running Caliptra FMC ...
2,861,981 UART:
2,862,035 UART: [state] CFI Enabled
2,872,488 UART: [fht] FMC Alias Private Key: 7
2,980,507 UART: [art] Extend RT PCRs Done
2,980,935 UART: [art] Lock RT PCRs Done
2,982,475 UART: [art] Populate DV Done
2,990,546 UART: [fht] FMC Alias Private Key: 7
2,991,526 UART: [art] Derive CDI
2,991,806 UART: [art] Store in in slot 0x4
3,077,619 UART: [art] Derive Key Pair
3,077,979 UART: [art] Store priv key in slot 0x5
3,090,987 UART: [art] Derive Key Pair - Done
3,106,054 UART: [art] Signing Cert with AUTHO
3,106,534 UART: RITY.KEYID = 7
3,121,872 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,637 UART: [art] PUB.X = 2D921EB2515DF0DBF0DA513645A614D1654504880B74E5A3DA5259074A39F4E22AF469F180697BCA3EF2B6286DBF3BE4
3,129,404 UART: [art] PUB.Y = 4534B388027D45090DCD3B9DAEBA202DE85D81CF81E6A439A271CB8986A84C7EDB02E0C783BA152BC0C71F8BF5F724EA
3,136,358 UART: [art] SIG.R = B22AFE77C93453A15D57D38D4FAEFA31B03F17DE3B87000BFD834E452910A7564656DF756E314DD96E9A534B7837BBBE
3,143,113 UART: [art] SIG.S = 5CF63EBB850FB225A07A28988993A8AFDDEDF1A49C9FD1CE7E10830BA75A4E9F72DCCE50EA69F74A25F15BEC29044536
3,167,325 UART: Caliptra RT
3,167,578 UART: [state] CFI Enabled
3,275,501 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,287,856 >>> mbox cmd response: failed
3,287,856 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,190 UART: [rt]cmd =0x46505652, len=4
3,317,850 UART: [rt] FIPS Version
3,319,017 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,564 ready_for_fw is high
1,056,564 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,239 >>> mbox cmd response: success
2,622,239 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,685,019 UART:
2,685,035 UART: Running Caliptra FMC ...
2,685,443 UART:
2,685,497 UART: [state] CFI Enabled
2,696,030 UART: [fht] FMC Alias Private Key: 7
2,803,669 UART: [art] Extend RT PCRs Done
2,804,097 UART: [art] Lock RT PCRs Done
2,805,487 UART: [art] Populate DV Done
2,813,720 UART: [fht] FMC Alias Private Key: 7
2,814,784 UART: [art] Derive CDI
2,815,064 UART: [art] Store in in slot 0x4
2,900,821 UART: [art] Derive Key Pair
2,901,181 UART: [art] Store priv key in slot 0x5
2,914,225 UART: [art] Derive Key Pair - Done
2,928,992 UART: [art] Signing Cert with AUTHO
2,929,472 UART: RITY.KEYID = 7
2,944,684 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,449 UART: [art] PUB.X = 6A8D6E58B06A13DA9BDF1FF00991BFB0F9DB6A95C86D244F42826E7327E7AE32A378E3A39B2D3319DFB10324757A3BA9
2,952,225 UART: [art] PUB.Y = 70A56DBBFD7E56DA8A25F767E813488F8C1B71CAEC37127696BCE9286CB10FB2D61A08795E9E498B9EB05F45E4A2C20F
2,959,180 UART: [art] SIG.R = 485DC617DBE89D718356BBD35FFAEDD8A9EBBC5858D2E53051999658715C82905A257480967606FF696C32BE8924ECBC
2,965,951 UART: [art] SIG.S = 2ECEEA26DA6F24C39D5E5ECB757D2E677504FA6EE31C86C8F85BB91855214FEFE1C0C901D695723FCB9CEE1BF998009B
2,990,246 UART: Caliptra RT
2,990,499 UART: [state] CFI Enabled
3,098,866 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,111,603 >>> mbox cmd response: failed
3,111,603 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,997 UART: [rt]cmd =0x46505652, len=4
3,141,657 UART: [rt] FIPS Version
3,142,742 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,887 UART: [state] LifecycleState = Unprovisioned
86,542 UART: [state] DebugLocked = No
87,048 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
891,753 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,882 UART: [kat] ++
896,034 UART: [kat] sha1
900,512 UART: [kat] SHA2-256
902,452 UART: [kat] SHA2-384
905,311 UART: [kat] SHA2-512-ACC
907,212 UART: [kat] ECC-384
917,045 UART: [kat] HMAC-384Kdf
921,693 UART: [kat] LMS
1,170,005 UART: [kat] --
1,170,978 UART: [cold-reset] ++
1,171,350 UART: [fht] FHT @ 0x50003400
1,174,122 UART: [idev] ++
1,174,290 UART: [idev] CDI.KEYID = 6
1,174,651 UART: [idev] SUBJECT.KEYID = 7
1,175,076 UART: [idev] UDS.KEYID = 0
1,175,422 ready_for_fw is high
1,175,422 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,486 UART: [idev] Erasing UDS.KEYID = 0
1,201,088 UART: [idev] Sha1 KeyId Algorithm
1,209,832 UART: [idev] --
1,210,865 UART: [ldev] ++
1,211,033 UART: [ldev] CDI.KEYID = 6
1,211,397 UART: [ldev] SUBJECT.KEYID = 5
1,211,824 UART: [ldev] AUTHORITY.KEYID = 7
1,212,287 UART: [ldev] FE.KEYID = 1
1,217,231 UART: [ldev] Erasing FE.KEYID = 1
1,243,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,617 UART: [ldev] --
1,283,041 UART: [fwproc] Wait for Commands...
1,283,720 UART: [fwproc] Recv command 0x46574c44
1,284,453 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,299 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,608 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,546 >>> mbox cmd response: success
2,774,546 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,775,629 UART: [afmc] ++
2,775,797 UART: [afmc] CDI.KEYID = 6
2,776,160 UART: [afmc] SUBJECT.KEYID = 7
2,776,586 UART: [afmc] AUTHORITY.KEYID = 5
2,812,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,861 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,612 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,341 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,224 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,943 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,978 UART: [afmc] --
2,855,914 UART: [cold-reset] --
2,856,828 UART: [state] Locking Datavault
2,857,971 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,575 UART: [state] Locking ICCM
2,859,221 UART: [exit] Launching FMC @ 0x40000130
2,864,550 UART:
2,864,566 UART: Running Caliptra FMC ...
2,864,974 UART:
2,865,117 UART: [state] CFI Enabled
2,875,278 UART: [fht] FMC Alias Private Key: 7
2,983,233 UART: [art] Extend RT PCRs Done
2,983,661 UART: [art] Lock RT PCRs Done
2,985,169 UART: [art] Populate DV Done
2,993,524 UART: [fht] FMC Alias Private Key: 7
2,994,618 UART: [art] Derive CDI
2,994,898 UART: [art] Store in in slot 0x4
3,080,693 UART: [art] Derive Key Pair
3,081,053 UART: [art] Store priv key in slot 0x5
3,094,435 UART: [art] Derive Key Pair - Done
3,109,184 UART: [art] Signing Cert with AUTHO
3,109,664 UART: RITY.KEYID = 7
3,124,206 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,971 UART: [art] PUB.X = EA4921E0A5682ECD6A410F37ECB27C753E51A474D173DA78D5C3A1380BD40206D0603B9AB0BD564590CC590819CD82E3
3,131,732 UART: [art] PUB.Y = FD647084E19A7882057F9620A752B7F700E7E342211AD53554C82B304FAFCFEDBA2034C9419D68C81FED140C26FF0438
3,138,653 UART: [art] SIG.R = 497D48CBBDEA548D86C448767F1B4300039DC0C109F76EFE472AAC2DEF21E11B20726DE089434E4BFF477B299BFD91BB
3,145,409 UART: [art] SIG.S = 6AD1D515BADD16593D14A524BE57DD36407FFFECAC893D5164F09100CB268AFD80B8EDD83668B205CD31F433725D72EA
3,169,047 UART: Caliptra RT
3,169,392 UART: [state] CFI Enabled
3,276,665 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,289,210 >>> mbox cmd response: failed
3,289,210 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,698 UART: [rt]cmd =0x46505652, len=4
3,319,358 UART: [rt] FIPS Version
3,320,385 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,269 ready_for_fw is high
1,056,269 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,567 >>> mbox cmd response: success
2,622,567 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,684,643 UART:
2,684,659 UART: Running Caliptra FMC ...
2,685,067 UART:
2,685,210 UART: [state] CFI Enabled
2,695,317 UART: [fht] FMC Alias Private Key: 7
2,803,530 UART: [art] Extend RT PCRs Done
2,803,958 UART: [art] Lock RT PCRs Done
2,805,698 UART: [art] Populate DV Done
2,813,883 UART: [fht] FMC Alias Private Key: 7
2,814,971 UART: [art] Derive CDI
2,815,251 UART: [art] Store in in slot 0x4
2,901,276 UART: [art] Derive Key Pair
2,901,636 UART: [art] Store priv key in slot 0x5
2,914,924 UART: [art] Derive Key Pair - Done
2,929,890 UART: [art] Signing Cert with AUTHO
2,930,370 UART: RITY.KEYID = 7
2,945,818 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,583 UART: [art] PUB.X = 8F8D36741DD1D046ED11777B61FEA6A32099448309BCF000DE7120790B3715A131E1C937F860833DB549CD5C0BC1B163
2,953,320 UART: [art] PUB.Y = 065A9A98C2288F9D7304C82927368805C67C9D575EE707F970758AD6A9D7DFDEDAC737DB79A32F1570977F4F2AFC9A4B
2,960,264 UART: [art] SIG.R = EE54ECD3C1C5700FDE295FEE3FD340AA48E9EA02263F83DF1780D115B9AA4A00E499C8DF327E5D0F3708A94045FCB186
2,967,016 UART: [art] SIG.S = AE105DDA3E7D93252E7BE0D40BACC84DAFBF383306E4C17817EB5C63DBF6B67006918E2FE2DD02996DB4DD24FFE38B5E
2,990,759 UART: Caliptra RT
2,991,104 UART: [state] CFI Enabled
3,099,198 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,111,857 >>> mbox cmd response: failed
3,111,857 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,229 UART: [rt]cmd =0x46505652, len=4
3,141,889 UART: [rt] FIPS Version
3,143,164 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,363 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,945 UART: [kat] SHA2-256
881,876 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,991 UART: [kat] ++
886,143 UART: [kat] sha1
890,329 UART: [kat] SHA2-256
892,267 UART: [kat] SHA2-384
895,132 UART: [kat] SHA2-512-ACC
897,033 UART: [kat] ECC-384
902,240 UART: [kat] HMAC-384Kdf
906,648 UART: [kat] LMS
1,474,844 UART: [kat] --
1,476,025 UART: [cold-reset] ++
1,476,545 UART: [fht] Storing FHT @ 0x50003400
1,479,384 UART: [idev] ++
1,479,552 UART: [idev] CDI.KEYID = 6
1,479,912 UART: [idev] SUBJECT.KEYID = 7
1,480,336 UART: [idev] UDS.KEYID = 0
1,480,681 ready_for_fw is high
1,480,681 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,028 UART: [idev] Erasing UDS.KEYID = 0
1,504,350 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,988 UART: [idev] --
1,513,889 UART: [ldev] ++
1,514,057 UART: [ldev] CDI.KEYID = 6
1,514,420 UART: [ldev] SUBJECT.KEYID = 5
1,514,846 UART: [ldev] AUTHORITY.KEYID = 7
1,515,309 UART: [ldev] FE.KEYID = 1
1,520,475 UART: [ldev] Erasing FE.KEYID = 1
1,545,738 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,686 UART: [ldev] --
1,585,067 UART: [fwproc] Waiting for Commands...
1,585,702 UART: [fwproc] Received command 0x46574c44
1,586,493 UART: [fwproc] Received Image of size 114332 bytes
2,884,739 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,911 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,263 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,030 >>> mbox cmd response: success
3,078,030 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,079,196 UART: [afmc] ++
3,079,364 UART: [afmc] CDI.KEYID = 6
3,079,726 UART: [afmc] SUBJECT.KEYID = 7
3,080,151 UART: [afmc] AUTHORITY.KEYID = 5
3,115,144 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,140 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,920 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,648 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,533 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,223 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,224 UART: [afmc] --
3,158,288 UART: [cold-reset] --
3,159,152 UART: [state] Locking Datavault
3,160,101 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,705 UART: [state] Locking ICCM
3,161,175 UART: [exit] Launching FMC @ 0x40000130
3,166,504 UART:
3,166,520 UART: Running Caliptra FMC ...
3,166,928 UART:
3,166,982 UART: [state] CFI Enabled
3,177,351 UART: [fht] FMC Alias Private Key: 7
3,284,722 UART: [art] Extend RT PCRs Done
3,285,150 UART: [art] Lock RT PCRs Done
3,286,918 UART: [art] Populate DV Done
3,295,479 UART: [fht] FMC Alias Private Key: 7
3,296,601 UART: [art] Derive CDI
3,296,881 UART: [art] Store in in slot 0x4
3,382,572 UART: [art] Derive Key Pair
3,382,932 UART: [art] Store priv key in slot 0x5
3,396,350 UART: [art] Derive Key Pair - Done
3,411,233 UART: [art] Signing Cert with AUTHO
3,411,713 UART: RITY.KEYID = 7
3,426,857 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,622 UART: [art] PUB.X = 371870D326C9147E2B1B015AA8C632336A863916349E1C5C8D42BE55CCBDFDC5220D6E5EE9B6F2528570093F5BB98FAB
3,434,389 UART: [art] PUB.Y = 3641BF71E26A4A2A32AC97FB7DDF3643E17A7CFB955F1A5D4BF97A20201E4E874B508A17EC0EFA260B089E4D0E59B6B3
3,441,343 UART: [art] SIG.R = 1469C16918B9D3EC9B41B0C95C3FAB62F8A4397BE63B2EB2B1E749AC90ED375AE4AF5AB2BA25EF4D0271DD787ACD79C9
3,448,132 UART: [art] SIG.S = F790C0D1544F6BF7AFAA50333136EBE1C4603730B29B470C1317E537799524B2C30715C57192E33455D2653A1923F228
3,471,733 UART: Caliptra RT
3,471,986 UART: [state] CFI Enabled
3,580,221 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,787 UART: [rt]cmd =0xaabbccdd, len=4
3,611,773 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,251 ready_for_fw is high
1,362,251 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,978 >>> mbox cmd response: success
2,926,978 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,988,802 UART:
2,988,818 UART: Running Caliptra FMC ...
2,989,226 UART:
2,989,280 UART: [state] CFI Enabled
2,999,771 UART: [fht] FMC Alias Private Key: 7
3,107,744 UART: [art] Extend RT PCRs Done
3,108,172 UART: [art] Lock RT PCRs Done
3,109,772 UART: [art] Populate DV Done
3,117,873 UART: [fht] FMC Alias Private Key: 7
3,118,925 UART: [art] Derive CDI
3,119,205 UART: [art] Store in in slot 0x4
3,204,738 UART: [art] Derive Key Pair
3,205,098 UART: [art] Store priv key in slot 0x5
3,218,608 UART: [art] Derive Key Pair - Done
3,233,697 UART: [art] Signing Cert with AUTHO
3,234,177 UART: RITY.KEYID = 7
3,249,469 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,234 UART: [art] PUB.X = 3CBF8189D9827D4D48048BDBC595B5BCC044FAF3BAE00DFD60517078BDA080F1422D2FB8790161815DB415894F3443F1
3,257,001 UART: [art] PUB.Y = 0C79E2E82ED8A2DECE41EDC29A696BB9074B718AC40C074D8C28971E0DBFE423E84DFFE946DE7F30184EC9806E4F17DD
3,263,956 UART: [art] SIG.R = 648C5BA090373618CC86C4A73FE42C2FF4D55020D5C0E2306BB1251431F62F9E6B369C01617FA45194BABD3C460ED6FD
3,270,726 UART: [art] SIG.S = 509AF1AACFEEB556637E5A9B8B3ADDC16A714EBBF4812DF95A3A0DCB4205FC1956E225C3AB714211095C064E0C669E2A
3,294,302 UART: Caliptra RT
3,294,555 UART: [state] CFI Enabled
3,402,111 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,605 UART: [rt]cmd =0xaabbccdd, len=4
3,433,595 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,634 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,300 UART: [kat] SHA2-256
882,231 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,346 UART: [kat] ++
886,498 UART: [kat] sha1
890,592 UART: [kat] SHA2-256
892,530 UART: [kat] SHA2-384
895,073 UART: [kat] SHA2-512-ACC
896,974 UART: [kat] ECC-384
902,525 UART: [kat] HMAC-384Kdf
907,341 UART: [kat] LMS
1,475,537 UART: [kat] --
1,476,264 UART: [cold-reset] ++
1,476,672 UART: [fht] Storing FHT @ 0x50003400
1,479,499 UART: [idev] ++
1,479,667 UART: [idev] CDI.KEYID = 6
1,480,027 UART: [idev] SUBJECT.KEYID = 7
1,480,451 UART: [idev] UDS.KEYID = 0
1,480,796 ready_for_fw is high
1,480,796 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,625 UART: [idev] Erasing UDS.KEYID = 0
1,505,373 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,991 UART: [idev] --
1,514,968 UART: [ldev] ++
1,515,136 UART: [ldev] CDI.KEYID = 6
1,515,499 UART: [ldev] SUBJECT.KEYID = 5
1,515,925 UART: [ldev] AUTHORITY.KEYID = 7
1,516,388 UART: [ldev] FE.KEYID = 1
1,521,946 UART: [ldev] Erasing FE.KEYID = 1
1,547,063 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,897 UART: [ldev] --
1,586,188 UART: [fwproc] Waiting for Commands...
1,587,007 UART: [fwproc] Received command 0x46574c44
1,587,798 UART: [fwproc] Received Image of size 114332 bytes
2,884,794 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,970 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,322 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,141 >>> mbox cmd response: success
3,077,141 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,078,321 UART: [afmc] ++
3,078,489 UART: [afmc] CDI.KEYID = 6
3,078,851 UART: [afmc] SUBJECT.KEYID = 7
3,079,276 UART: [afmc] AUTHORITY.KEYID = 5
3,114,215 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,251 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,031 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,759 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,644 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,334 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,243 UART: [afmc] --
3,157,123 UART: [cold-reset] --
3,158,009 UART: [state] Locking Datavault
3,159,360 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,964 UART: [state] Locking ICCM
3,160,602 UART: [exit] Launching FMC @ 0x40000130
3,165,931 UART:
3,165,947 UART: Running Caliptra FMC ...
3,166,355 UART:
3,166,498 UART: [state] CFI Enabled
3,177,065 UART: [fht] FMC Alias Private Key: 7
3,284,272 UART: [art] Extend RT PCRs Done
3,284,700 UART: [art] Lock RT PCRs Done
3,285,936 UART: [art] Populate DV Done
3,294,337 UART: [fht] FMC Alias Private Key: 7
3,295,313 UART: [art] Derive CDI
3,295,593 UART: [art] Store in in slot 0x4
3,381,384 UART: [art] Derive Key Pair
3,381,744 UART: [art] Store priv key in slot 0x5
3,395,324 UART: [art] Derive Key Pair - Done
3,409,761 UART: [art] Signing Cert with AUTHO
3,410,241 UART: RITY.KEYID = 7
3,425,631 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,396 UART: [art] PUB.X = 18D5D2AEC29F72234E3A1E2A69A88993EF4AF60A47E291B7DBB627E3F1F88DF5A9BB892815FE991E10B2723DEEC92A53
3,433,177 UART: [art] PUB.Y = 1154B81286D2DB7FD1953472975730461A3F7B9D7734A818E66EB2E9965D0B42DFCE8B8C0B9A557AD41A328809E57531
3,440,114 UART: [art] SIG.R = D73C44A1C0F92AF8654D3E3EDFC89EC15678D2974CCBE54F13867040FE63D530E742EF2AF0248F0EBC0CFCDDD7F7222C
3,446,898 UART: [art] SIG.S = D695D12C54755C2AD9145969F619276A14F2D2D626E488E2335046284877E94D4E05E4E2B6196B0AB0EC530560134D33
3,470,234 UART: Caliptra RT
3,470,579 UART: [state] CFI Enabled
3,580,383 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,895 UART: [rt]cmd =0xaabbccdd, len=4
3,611,977 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,868 ready_for_fw is high
1,362,868 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,021 >>> mbox cmd response: success
2,929,021 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,990,315 UART:
2,990,331 UART: Running Caliptra FMC ...
2,990,739 UART:
2,990,882 UART: [state] CFI Enabled
3,001,657 UART: [fht] FMC Alias Private Key: 7
3,109,062 UART: [art] Extend RT PCRs Done
3,109,490 UART: [art] Lock RT PCRs Done
3,111,496 UART: [art] Populate DV Done
3,119,643 UART: [fht] FMC Alias Private Key: 7
3,120,665 UART: [art] Derive CDI
3,120,945 UART: [art] Store in in slot 0x4
3,206,834 UART: [art] Derive Key Pair
3,207,194 UART: [art] Store priv key in slot 0x5
3,219,994 UART: [art] Derive Key Pair - Done
3,234,394 UART: [art] Signing Cert with AUTHO
3,234,874 UART: RITY.KEYID = 7
3,249,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,747 UART: [art] PUB.X = C08149A1860E23DBDEE2344AA2DA850C9722214D049A67EAFCCF0A9E999361AE01125DFFC8D1AE6E64C534D7FE4A3992
3,257,516 UART: [art] PUB.Y = 96BA1F31129183DE3F75C7E9B503F6208F7F0A7075B0740A2A3FAD8C1C02811617B9CD847E89254AA0A232B0066D1482
3,264,449 UART: [art] SIG.R = 1BB6693544426AE6CC3BD3DA8D9B9D0AC929AFF6586A2FED1A36AD9C76356488BD2D3F8C7B3A11F0719730AB53A231BF
3,271,232 UART: [art] SIG.S = A785262D15D27BE4D976EF030116AE092E38A07DF0D6490896EB9860EDBCD5310D7EDC2DFA8EF5869C602269583D4E58
3,295,500 UART: Caliptra RT
3,295,845 UART: [state] CFI Enabled
3,404,222 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,576 UART: [rt]cmd =0xaabbccdd, len=4
3,435,618 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
893,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,239 UART: [kat] ++
897,391 UART: [kat] sha1
901,821 UART: [kat] SHA2-256
903,761 UART: [kat] SHA2-384
906,582 UART: [kat] SHA2-512-ACC
908,483 UART: [kat] ECC-384
917,996 UART: [kat] HMAC-384Kdf
922,536 UART: [kat] LMS
1,170,864 UART: [kat] --
1,171,583 UART: [cold-reset] ++
1,172,113 UART: [fht] FHT @ 0x50003400
1,174,706 UART: [idev] ++
1,174,874 UART: [idev] CDI.KEYID = 6
1,175,234 UART: [idev] SUBJECT.KEYID = 7
1,175,658 UART: [idev] UDS.KEYID = 0
1,176,003 ready_for_fw is high
1,176,003 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,520 UART: [idev] Erasing UDS.KEYID = 0
1,200,747 UART: [idev] Sha1 KeyId Algorithm
1,209,137 UART: [idev] --
1,210,319 UART: [ldev] ++
1,210,487 UART: [ldev] CDI.KEYID = 6
1,210,850 UART: [ldev] SUBJECT.KEYID = 5
1,211,276 UART: [ldev] AUTHORITY.KEYID = 7
1,211,739 UART: [ldev] FE.KEYID = 1
1,217,031 UART: [ldev] Erasing FE.KEYID = 1
1,243,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,275 UART: [ldev] --
1,282,764 UART: [fwproc] Wait for Commands...
1,283,536 UART: [fwproc] Recv command 0x46574c44
1,284,264 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,826 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,130 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,839 >>> mbox cmd response: success
2,773,839 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,774,941 UART: [afmc] ++
2,775,109 UART: [afmc] CDI.KEYID = 6
2,775,471 UART: [afmc] SUBJECT.KEYID = 7
2,775,896 UART: [afmc] AUTHORITY.KEYID = 5
2,811,343 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,188 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,936 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,664 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,549 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,268 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,102 UART: [afmc] --
2,855,018 UART: [cold-reset] --
2,855,864 UART: [state] Locking Datavault
2,856,873 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,477 UART: [state] Locking ICCM
2,858,117 UART: [exit] Launching FMC @ 0x40000130
2,863,446 UART:
2,863,462 UART: Running Caliptra FMC ...
2,863,870 UART:
2,863,924 UART: [state] CFI Enabled
2,874,611 UART: [fht] FMC Alias Private Key: 7
2,982,660 UART: [art] Extend RT PCRs Done
2,983,088 UART: [art] Lock RT PCRs Done
2,984,592 UART: [art] Populate DV Done
2,992,997 UART: [fht] FMC Alias Private Key: 7
2,993,969 UART: [art] Derive CDI
2,994,249 UART: [art] Store in in slot 0x4
3,079,910 UART: [art] Derive Key Pair
3,080,270 UART: [art] Store priv key in slot 0x5
3,093,390 UART: [art] Derive Key Pair - Done
3,108,021 UART: [art] Signing Cert with AUTHO
3,108,501 UART: RITY.KEYID = 7
3,123,359 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,124 UART: [art] PUB.X = 74CEF0C5ADB5DE3E13106D18F1BD4FD10BB99D32E393B6AB12E6B102D799E24DE021A0E3EC8F62EC3FB24D9D353F5D5F
3,130,912 UART: [art] PUB.Y = 1935E9BEA1CA83E28BB76AA442C8A42059FA53E5CD94EE0A5F4949F15FC3150F86CB7E324DB3962DB3C5BCB79C8DD361
3,137,874 UART: [art] SIG.R = 19FEEA0F17D736624BFB27A37B5417DC4F8AE2D4CF973B3FA7215615911C5C6B63BEC99C7117078CF3B5303B69C27373
3,144,644 UART: [art] SIG.S = BD4F41496EE440252EC67E969C75E72880990C242378DBFDBD1B27758580D998FA16F39B50765C6A8ABD74F283E4F2DC
3,167,672 UART: Caliptra RT
3,167,925 UART: [state] CFI Enabled
3,274,802 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,350 UART: [rt]cmd =0xaabbccdd, len=4
3,306,316 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,201 ready_for_fw is high
1,060,201 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,488 >>> mbox cmd response: success
2,626,488 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,688,244 UART:
2,688,260 UART: Running Caliptra FMC ...
2,688,668 UART:
2,688,722 UART: [state] CFI Enabled
2,699,031 UART: [fht] FMC Alias Private Key: 7
2,807,082 UART: [art] Extend RT PCRs Done
2,807,510 UART: [art] Lock RT PCRs Done
2,808,974 UART: [art] Populate DV Done
2,817,203 UART: [fht] FMC Alias Private Key: 7
2,818,273 UART: [art] Derive CDI
2,818,553 UART: [art] Store in in slot 0x4
2,903,872 UART: [art] Derive Key Pair
2,904,232 UART: [art] Store priv key in slot 0x5
2,917,280 UART: [art] Derive Key Pair - Done
2,931,939 UART: [art] Signing Cert with AUTHO
2,932,419 UART: RITY.KEYID = 7
2,947,471 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,236 UART: [art] PUB.X = 979155B7DBEA3EFA296CA929070C070CA3E926E0A4C52A6E2C98AEC0B56E0A16285CB485B160EFE6D2932F0B0C05222F
2,954,994 UART: [art] PUB.Y = 61ECB82F78724847021E560B6556174F0798F4E631CB28B3628AEF392FF714EE5399E16690721A4FD708D4E35C83597D
2,961,924 UART: [art] SIG.R = C072E9CFE07765518AF6206136320B3D71CCF28CA23D9E5C9C7FAE3659FEB36A4E4E5CC5E7DE04DF154D8F3D3BB12BA9
2,968,708 UART: [art] SIG.S = A9D093BAD99788FAA8382C5BEF5B074CC3E25EEB4897A25CA7F23149950DE7C3CAFC7BCB0165CE5A37BC341D62ED8B92
2,992,208 UART: Caliptra RT
2,992,461 UART: [state] CFI Enabled
3,100,651 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,351 UART: [rt]cmd =0xaabbccdd, len=4
3,132,453 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Unprovisioned
85,850 UART: [state] DebugLocked = No
86,568 UART: [state] WD Timer not started. Device not locked for debugging
87,835 UART: [kat] SHA2-256
893,485 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,610 UART: [kat] ++
897,762 UART: [kat] sha1
901,882 UART: [kat] SHA2-256
903,822 UART: [kat] SHA2-384
906,439 UART: [kat] SHA2-512-ACC
908,340 UART: [kat] ECC-384
918,367 UART: [kat] HMAC-384Kdf
923,181 UART: [kat] LMS
1,171,509 UART: [kat] --
1,172,422 UART: [cold-reset] ++
1,172,916 UART: [fht] FHT @ 0x50003400
1,175,649 UART: [idev] ++
1,175,817 UART: [idev] CDI.KEYID = 6
1,176,177 UART: [idev] SUBJECT.KEYID = 7
1,176,601 UART: [idev] UDS.KEYID = 0
1,176,946 ready_for_fw is high
1,176,946 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,801 UART: [idev] Erasing UDS.KEYID = 0
1,201,952 UART: [idev] Sha1 KeyId Algorithm
1,210,426 UART: [idev] --
1,211,602 UART: [ldev] ++
1,211,770 UART: [ldev] CDI.KEYID = 6
1,212,133 UART: [ldev] SUBJECT.KEYID = 5
1,212,559 UART: [ldev] AUTHORITY.KEYID = 7
1,213,022 UART: [ldev] FE.KEYID = 1
1,218,240 UART: [ldev] Erasing FE.KEYID = 1
1,244,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,782 UART: [ldev] --
1,284,161 UART: [fwproc] Wait for Commands...
1,284,851 UART: [fwproc] Recv command 0x46574c44
1,285,579 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,617 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,921 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,834 >>> mbox cmd response: success
2,776,834 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,777,956 UART: [afmc] ++
2,778,124 UART: [afmc] CDI.KEYID = 6
2,778,486 UART: [afmc] SUBJECT.KEYID = 7
2,778,911 UART: [afmc] AUTHORITY.KEYID = 5
2,815,116 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,765 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,493 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,378 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,097 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,839 UART: [afmc] --
2,858,943 UART: [cold-reset] --
2,859,703 UART: [state] Locking Datavault
2,860,584 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,188 UART: [state] Locking ICCM
2,861,726 UART: [exit] Launching FMC @ 0x40000130
2,867,055 UART:
2,867,071 UART: Running Caliptra FMC ...
2,867,479 UART:
2,867,622 UART: [state] CFI Enabled
2,878,045 UART: [fht] FMC Alias Private Key: 7
2,985,338 UART: [art] Extend RT PCRs Done
2,985,766 UART: [art] Lock RT PCRs Done
2,987,258 UART: [art] Populate DV Done
2,995,567 UART: [fht] FMC Alias Private Key: 7
2,996,603 UART: [art] Derive CDI
2,996,883 UART: [art] Store in in slot 0x4
3,082,470 UART: [art] Derive Key Pair
3,082,830 UART: [art] Store priv key in slot 0x5
3,096,422 UART: [art] Derive Key Pair - Done
3,111,172 UART: [art] Signing Cert with AUTHO
3,111,652 UART: RITY.KEYID = 7
3,126,650 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,415 UART: [art] PUB.X = 7577CDA88DEF5194C1597B4F5CB93E2E1F69152DB6DC51A40AE880A8B0FDE068A144D843FD11796FDB4B681A469322E6
3,134,192 UART: [art] PUB.Y = FFEF589B9CB341E003692E973CE6B687D58F347DD6DA26608BF8569C439D8B90B8B8D6C104FF83F256760CA29720BD45
3,141,139 UART: [art] SIG.R = 3BEC48C9F82E9EC29B9B51148D5FE0967647E1748CD64349866E999CD5127CED36E78ACA443AFE0A90C41054A14CE4CC
3,147,916 UART: [art] SIG.S = ED74C883CA61BB493A513B04FFF29A4FE61475836A22FA399597E09748DAEFBD765077E0EDC90DD8A7CA758E6212EB1A
3,171,317 UART: Caliptra RT
3,171,662 UART: [state] CFI Enabled
3,281,009 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,577 UART: [rt]cmd =0xaabbccdd, len=4
3,312,717 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,118 ready_for_fw is high
1,060,118 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,453 >>> mbox cmd response: success
2,627,453 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,689,687 UART:
2,689,703 UART: Running Caliptra FMC ...
2,690,111 UART:
2,690,254 UART: [state] CFI Enabled
2,700,707 UART: [fht] FMC Alias Private Key: 7
2,808,606 UART: [art] Extend RT PCRs Done
2,809,034 UART: [art] Lock RT PCRs Done
2,810,112 UART: [art] Populate DV Done
2,818,397 UART: [fht] FMC Alias Private Key: 7
2,819,343 UART: [art] Derive CDI
2,819,623 UART: [art] Store in in slot 0x4
2,905,202 UART: [art] Derive Key Pair
2,905,562 UART: [art] Store priv key in slot 0x5
2,917,936 UART: [art] Derive Key Pair - Done
2,932,818 UART: [art] Signing Cert with AUTHO
2,933,298 UART: RITY.KEYID = 7
2,948,704 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,469 UART: [art] PUB.X = 4040D6B8892B26E7EEE70E4EADB7875974BE7D0D4D2F15AC60ED3887F68E5D170E19F72799C10B56D5B4F7360E55C344
2,956,230 UART: [art] PUB.Y = 724F8E07B0E00C26CCF2CD87B066B8AABA98262C95587258C83A6C2E0A5C05E4381DFC70A0B51D3E23DC604A4E1753FE
2,963,180 UART: [art] SIG.R = 7AFF79B455482239C3CF0A303D39519CAE3B580208F894F45ACD1DA34E8136C1C156919A1C2E010295C0CA8CE0DB5119
2,969,939 UART: [art] SIG.S = BDBF6AE17A20CD0970BDAA2E8F648635F7FF38896CCA46C255F404B75E421D05E9CF9D4107944FFD34E78894B77C9224
2,993,960 UART: Caliptra RT
2,994,305 UART: [state] CFI Enabled
3,102,072 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,796 UART: [rt]cmd =0xaabbccdd, len=4
3,133,620 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,271 UART: [kat] ++
895,423 UART: [kat] sha1
899,629 UART: [kat] SHA2-256
901,569 UART: [kat] SHA2-384
904,256 UART: [kat] SHA2-512-ACC
906,157 UART: [kat] ECC-384
915,308 UART: [kat] HMAC-384Kdf
920,030 UART: [kat] LMS
1,168,342 UART: [kat] --
1,169,039 UART: [cold-reset] ++
1,169,429 UART: [fht] FHT @ 0x50003400
1,171,989 UART: [idev] ++
1,172,157 UART: [idev] CDI.KEYID = 6
1,172,518 UART: [idev] SUBJECT.KEYID = 7
1,172,943 UART: [idev] UDS.KEYID = 0
1,173,289 ready_for_fw is high
1,173,289 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,617 UART: [idev] Erasing UDS.KEYID = 0
1,197,553 UART: [idev] Sha1 KeyId Algorithm
1,206,337 UART: [idev] --
1,207,246 UART: [ldev] ++
1,207,414 UART: [ldev] CDI.KEYID = 6
1,207,778 UART: [ldev] SUBJECT.KEYID = 5
1,208,205 UART: [ldev] AUTHORITY.KEYID = 7
1,208,668 UART: [ldev] FE.KEYID = 1
1,213,666 UART: [ldev] Erasing FE.KEYID = 1
1,239,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,780 UART: [ldev] --
1,279,194 UART: [fwproc] Wait for Commands...
1,280,009 UART: [fwproc] Recv command 0x46574c44
1,280,742 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,958 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,267 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,031 >>> mbox cmd response: success
2,770,031 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,771,086 UART: [afmc] ++
2,771,254 UART: [afmc] CDI.KEYID = 6
2,771,617 UART: [afmc] SUBJECT.KEYID = 7
2,772,043 UART: [afmc] AUTHORITY.KEYID = 5
2,807,142 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,488 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,239 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,968 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,851 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,570 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,447 UART: [afmc] --
2,850,503 UART: [cold-reset] --
2,851,343 UART: [state] Locking Datavault
2,852,568 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,172 UART: [state] Locking ICCM
2,853,592 UART: [exit] Launching FMC @ 0x40000130
2,858,921 UART:
2,858,937 UART: Running Caliptra FMC ...
2,859,345 UART:
2,859,399 UART: [state] CFI Enabled
2,870,060 UART: [fht] FMC Alias Private Key: 7
2,978,445 UART: [art] Extend RT PCRs Done
2,978,873 UART: [art] Lock RT PCRs Done
2,980,339 UART: [art] Populate DV Done
2,988,572 UART: [fht] FMC Alias Private Key: 7
2,989,676 UART: [art] Derive CDI
2,989,956 UART: [art] Store in in slot 0x4
3,075,631 UART: [art] Derive Key Pair
3,075,991 UART: [art] Store priv key in slot 0x5
3,089,207 UART: [art] Derive Key Pair - Done
3,103,901 UART: [art] Signing Cert with AUTHO
3,104,381 UART: RITY.KEYID = 7
3,119,733 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,498 UART: [art] PUB.X = BB7EF8FFE98E10E0BC34CA602458B81B6A4D15EABBC5C0BA6237871320E0FB8D0045ED58652930711323EC734537F500
3,127,230 UART: [art] PUB.Y = 31E22209F9A16449B9E348B0848EDB939BD20BE8DF5CE8781F38BAC4A8D23D37CDC89887C8B4A9D919773AB0DC99EAE0
3,134,188 UART: [art] SIG.R = B0333D29901FCCDAC3647CBD83C36F7348A29B5335AE3E730BDF1E997023807C0484BDC292AF3883E5EB6FAA09BE0B98
3,140,958 UART: [art] SIG.S = 8970F94D81DDD744094784874D0A12069A06CDAE3A347836A4EA52C9F777943E08AC1BFB496AA22DEA98A4319C0E46E6
3,164,385 UART: Caliptra RT
3,164,638 UART: [state] CFI Enabled
3,272,218 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,786 UART: [rt]cmd =0xaabbccdd, len=4
3,303,772 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,430 ready_for_fw is high
1,056,430 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,423 >>> mbox cmd response: success
2,623,423 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,684,299 UART:
2,684,315 UART: Running Caliptra FMC ...
2,684,723 UART:
2,684,777 UART: [state] CFI Enabled
2,695,350 UART: [fht] FMC Alias Private Key: 7
2,803,067 UART: [art] Extend RT PCRs Done
2,803,495 UART: [art] Lock RT PCRs Done
2,805,127 UART: [art] Populate DV Done
2,813,094 UART: [fht] FMC Alias Private Key: 7
2,814,126 UART: [art] Derive CDI
2,814,406 UART: [art] Store in in slot 0x4
2,900,021 UART: [art] Derive Key Pair
2,900,381 UART: [art] Store priv key in slot 0x5
2,913,527 UART: [art] Derive Key Pair - Done
2,928,212 UART: [art] Signing Cert with AUTHO
2,928,692 UART: RITY.KEYID = 7
2,944,236 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,001 UART: [art] PUB.X = D51D144A24CDD63B61F3C56098F4A661E494E34AB3393C6708FBE23D2AC5DD15270C85DA416BB5410BF7F5F1A9F62B8D
2,951,774 UART: [art] PUB.Y = A66935609809F82D25B6F67C4DE4537DBBDA0462816D1CFC840E7E5AEE57D890B7B751692F5824973DB739893EEF3B14
2,958,717 UART: [art] SIG.R = A9FCE3C2DF69DA270A93DAF5EEA1B29C49FC16BC92E079A909E23919EF2E4CFCE12A11F07860F3AB9C9EC02A15F30943
2,965,500 UART: [art] SIG.S = 2A85A2071FCCDD838EC5B9EA6F04C6D6E26D34420F62C863093436D5654A5AA31D2AEC14D08F7C560FB30CE9792BC19F
2,989,485 UART: Caliptra RT
2,989,738 UART: [state] CFI Enabled
3,097,581 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,277 UART: [rt]cmd =0xaabbccdd, len=4
3,129,345 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,039 UART: [state] LifecycleState = Unprovisioned
85,694 UART: [state] DebugLocked = No
86,404 UART: [state] WD Timer not started. Device not locked for debugging
87,619 UART: [kat] SHA2-256
891,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,298 UART: [kat] ++
895,450 UART: [kat] sha1
899,562 UART: [kat] SHA2-256
901,502 UART: [kat] SHA2-384
904,365 UART: [kat] SHA2-512-ACC
906,266 UART: [kat] ECC-384
915,991 UART: [kat] HMAC-384Kdf
920,571 UART: [kat] LMS
1,168,883 UART: [kat] --
1,169,596 UART: [cold-reset] ++
1,169,994 UART: [fht] FHT @ 0x50003400
1,172,696 UART: [idev] ++
1,172,864 UART: [idev] CDI.KEYID = 6
1,173,225 UART: [idev] SUBJECT.KEYID = 7
1,173,650 UART: [idev] UDS.KEYID = 0
1,173,996 ready_for_fw is high
1,173,996 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,906 UART: [idev] Erasing UDS.KEYID = 0
1,199,090 UART: [idev] Sha1 KeyId Algorithm
1,208,074 UART: [idev] --
1,209,019 UART: [ldev] ++
1,209,187 UART: [ldev] CDI.KEYID = 6
1,209,551 UART: [ldev] SUBJECT.KEYID = 5
1,209,978 UART: [ldev] AUTHORITY.KEYID = 7
1,210,441 UART: [ldev] FE.KEYID = 1
1,215,703 UART: [ldev] Erasing FE.KEYID = 1
1,241,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,905 UART: [ldev] --
1,281,337 UART: [fwproc] Wait for Commands...
1,282,136 UART: [fwproc] Recv command 0x46574c44
1,282,869 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,567 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,876 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,674 >>> mbox cmd response: success
2,772,674 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,773,915 UART: [afmc] ++
2,774,083 UART: [afmc] CDI.KEYID = 6
2,774,446 UART: [afmc] SUBJECT.KEYID = 7
2,774,872 UART: [afmc] AUTHORITY.KEYID = 5
2,810,927 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,933 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,684 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,413 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,296 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,015 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,996 UART: [afmc] --
2,853,970 UART: [cold-reset] --
2,854,866 UART: [state] Locking Datavault
2,855,969 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,573 UART: [state] Locking ICCM
2,857,035 UART: [exit] Launching FMC @ 0x40000130
2,862,364 UART:
2,862,380 UART: Running Caliptra FMC ...
2,862,788 UART:
2,862,931 UART: [state] CFI Enabled
2,873,416 UART: [fht] FMC Alias Private Key: 7
2,980,861 UART: [art] Extend RT PCRs Done
2,981,289 UART: [art] Lock RT PCRs Done
2,982,789 UART: [art] Populate DV Done
2,991,242 UART: [fht] FMC Alias Private Key: 7
2,992,202 UART: [art] Derive CDI
2,992,482 UART: [art] Store in in slot 0x4
3,078,441 UART: [art] Derive Key Pair
3,078,801 UART: [art] Store priv key in slot 0x5
3,092,287 UART: [art] Derive Key Pair - Done
3,106,911 UART: [art] Signing Cert with AUTHO
3,107,391 UART: RITY.KEYID = 7
3,122,685 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,450 UART: [art] PUB.X = BFA6273DA9CBFF3D326DD1B21F081A9CAF2E882DD3166459FC2C8D5B88B7C89AA93F1398039BB4665CAE564B1C05A23B
3,130,229 UART: [art] PUB.Y = 52578DBC3B401C5314FFB7F585F3F20D0E06CA90B07794D8F3868AECF1BD334BFB727F0C50AE363A3D6A65EE341C5263
3,137,179 UART: [art] SIG.R = 70ADF9DB289E32B1F413B175A1602CDF1ECFC7D7B1E794190CC6B13C14D2598F3D2686288B4D812A9949C70903D0CC29
3,143,946 UART: [art] SIG.S = E400EE2ED9840FFDA894F25B0E8F4E8550AE3592861B03A24DCE993950F67933915D8F533F2C36E4084FBA1A9B2D002A
3,167,843 UART: Caliptra RT
3,168,188 UART: [state] CFI Enabled
3,276,993 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,481 UART: [rt]cmd =0xaabbccdd, len=4
3,308,439 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,487 ready_for_fw is high
1,056,487 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,772 >>> mbox cmd response: success
2,623,772 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,686,750 UART:
2,686,766 UART: Running Caliptra FMC ...
2,687,174 UART:
2,687,317 UART: [state] CFI Enabled
2,698,096 UART: [fht] FMC Alias Private Key: 7
2,806,845 UART: [art] Extend RT PCRs Done
2,807,273 UART: [art] Lock RT PCRs Done
2,808,769 UART: [art] Populate DV Done
2,817,262 UART: [fht] FMC Alias Private Key: 7
2,818,298 UART: [art] Derive CDI
2,818,578 UART: [art] Store in in slot 0x4
2,904,183 UART: [art] Derive Key Pair
2,904,543 UART: [art] Store priv key in slot 0x5
2,918,325 UART: [art] Derive Key Pair - Done
2,933,134 UART: [art] Signing Cert with AUTHO
2,933,614 UART: RITY.KEYID = 7
2,948,756 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,521 UART: [art] PUB.X = 061303EDD049FF32FD23DEE64B5880F80275DDB1EC59BF8A0310C6CD371FDC5FFDC64A1A8A4ADA54646A5D19C32533BF
2,956,299 UART: [art] PUB.Y = 902F7D9EE53EC41C5ECDA6817D00C550F152767F5B99992F9EDC8B98255CA7E803537CD5BF36100B7B15B9526895B5CC
2,963,227 UART: [art] SIG.R = C04CA5D80BBF61A09E4366ECE2F56392BB00C96813F6F6E5A1C17008290C264B829DCD850CB3AFCB51AD95B8D254DD28
2,969,977 UART: [art] SIG.S = 18335D2EDEA2A630FA4647894459641CCE8D262E634F13A6D9D0B24EA9C24B8F615277032B82B2E3E3618E25131C781A
2,994,367 UART: Caliptra RT
2,994,712 UART: [state] CFI Enabled
3,102,253 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,921 UART: [rt]cmd =0xaabbccdd, len=4
3,134,113 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,641 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,159 UART: [kat] SHA2-256
882,090 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,205 UART: [kat] ++
886,357 UART: [kat] sha1
890,455 UART: [kat] SHA2-256
892,393 UART: [kat] SHA2-384
894,994 UART: [kat] SHA2-512-ACC
896,895 UART: [kat] ECC-384
902,670 UART: [kat] HMAC-384Kdf
907,292 UART: [kat] LMS
1,475,488 UART: [kat] --
1,476,353 UART: [cold-reset] ++
1,476,729 UART: [fht] Storing FHT @ 0x50003400
1,479,484 UART: [idev] ++
1,479,652 UART: [idev] CDI.KEYID = 6
1,480,012 UART: [idev] SUBJECT.KEYID = 7
1,480,436 UART: [idev] UDS.KEYID = 0
1,480,781 ready_for_fw is high
1,480,781 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,446 UART: [idev] Erasing UDS.KEYID = 0
1,504,924 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,610 UART: [idev] --
1,514,689 UART: [ldev] ++
1,514,857 UART: [ldev] CDI.KEYID = 6
1,515,220 UART: [ldev] SUBJECT.KEYID = 5
1,515,646 UART: [ldev] AUTHORITY.KEYID = 7
1,516,109 UART: [ldev] FE.KEYID = 1
1,521,227 UART: [ldev] Erasing FE.KEYID = 1
1,546,886 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,740 UART: [ldev] --
1,586,117 UART: [fwproc] Waiting for Commands...
1,586,896 UART: [fwproc] Received command 0x46574c44
1,587,687 UART: [fwproc] Received Image of size 114332 bytes
2,884,797 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,809 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,161 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,912 >>> mbox cmd response: success
3,078,126 UART: [afmc] ++
3,078,294 UART: [afmc] CDI.KEYID = 6
3,078,656 UART: [afmc] SUBJECT.KEYID = 7
3,079,081 UART: [afmc] AUTHORITY.KEYID = 5
3,114,108 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,224 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,004 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,732 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,617 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,307 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,140 UART: [afmc] --
3,157,226 UART: [cold-reset] --
3,158,096 UART: [state] Locking Datavault
3,159,419 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,023 UART: [state] Locking ICCM
3,160,549 UART: [exit] Launching FMC @ 0x40000130
3,165,878 UART:
3,165,894 UART: Running Caliptra FMC ...
3,166,302 UART:
3,166,356 UART: [state] CFI Enabled
3,176,783 UART: [fht] FMC Alias Private Key: 7
3,284,552 UART: [art] Extend RT PCRs Done
3,284,980 UART: [art] Lock RT PCRs Done
3,286,450 UART: [art] Populate DV Done
3,294,551 UART: [fht] FMC Alias Private Key: 7
3,295,571 UART: [art] Derive CDI
3,295,851 UART: [art] Store in in slot 0x4
3,381,284 UART: [art] Derive Key Pair
3,381,644 UART: [art] Store priv key in slot 0x5
3,395,162 UART: [art] Derive Key Pair - Done
3,409,941 UART: [art] Signing Cert with AUTHO
3,410,421 UART: RITY.KEYID = 7
3,425,831 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,596 UART: [art] PUB.X = E0763EB821F85E054E3042D68A422D4E53087CF135FA7C802BF7BA122E340D15C8F1C254A73E444E0CB0E8D80CAECCDB
3,433,365 UART: [art] PUB.Y = 56436CCF1C7C1B434CB6215048F931B0190BF73FCA6E335E3AF10D6B559F4FB7B495D8FB97BCE8A0AA923CBD63FF4A27
3,440,327 UART: [art] SIG.R = 9A4A97DC0A890E313EE994399992D5935E2D808E1CF626BD5874A3A253ECCC52FA9E4D2121EF2E90E81A01082ECE5DD3
3,447,095 UART: [art] SIG.S = 456268325EB89C9BE0B31687EB932290107B8B271A13848695EF8D0783BAF0CA912AD68236AC93B5A8B1BD053CD6FAA8
3,470,838 UART: Caliptra RT
3,471,091 UART: [state] CFI Enabled
3,579,384 UART: [rt] RT listening for mailbox commands...
3,580,054 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,274 UART: [rt]cmd =0x434b4558, len=80
3,611,463 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,447 ready_for_fw is high
1,362,447 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,256 >>> mbox cmd response: success
2,989,132 UART:
2,989,148 UART: Running Caliptra FMC ...
2,989,556 UART:
2,989,610 UART: [state] CFI Enabled
3,000,175 UART: [fht] FMC Alias Private Key: 7
3,108,046 UART: [art] Extend RT PCRs Done
3,108,474 UART: [art] Lock RT PCRs Done
3,109,768 UART: [art] Populate DV Done
3,118,027 UART: [fht] FMC Alias Private Key: 7
3,119,137 UART: [art] Derive CDI
3,119,417 UART: [art] Store in in slot 0x4
3,205,138 UART: [art] Derive Key Pair
3,205,498 UART: [art] Store priv key in slot 0x5
3,219,006 UART: [art] Derive Key Pair - Done
3,233,348 UART: [art] Signing Cert with AUTHO
3,233,828 UART: RITY.KEYID = 7
3,249,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,781 UART: [art] PUB.X = 7C886622A4E114326E8548CA28BBE5477C0DDF1C678AB1C68FFE54BC934CFC8B7774645870160E4A5DA7EC619D9DAE61
3,256,555 UART: [art] PUB.Y = 7C8DD00EF66DD0D63F9AC64D27444AFE18A2C270B1350040E8D1C1BD864662B34CB2D87D53D76D9B12DE169FA4867E57
3,263,490 UART: [art] SIG.R = 0B98362C46CA06C746E3516A9896DEDBF3C375E5B3F2276D6F221BFCC42C0F41B82950C3F71809509631CDCA2EA75119
3,270,252 UART: [art] SIG.S = 491A5E802AB1D35D29B4DA763CDD86A1CC24F271987E0323690A8684D515477A886E1DED47502175C88490663076580E
3,293,966 UART: Caliptra RT
3,294,219 UART: [state] CFI Enabled
3,402,723 UART: [rt] RT listening for mailbox commands...
3,403,393 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,965 UART: [rt]cmd =0x434b4558, len=80
3,435,086 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,848 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,576 UART: [kat] SHA2-256
882,507 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,622 UART: [kat] ++
886,774 UART: [kat] sha1
891,250 UART: [kat] SHA2-256
893,188 UART: [kat] SHA2-384
895,891 UART: [kat] SHA2-512-ACC
897,792 UART: [kat] ECC-384
903,555 UART: [kat] HMAC-384Kdf
908,219 UART: [kat] LMS
1,476,415 UART: [kat] --
1,477,564 UART: [cold-reset] ++
1,477,962 UART: [fht] Storing FHT @ 0x50003400
1,480,677 UART: [idev] ++
1,480,845 UART: [idev] CDI.KEYID = 6
1,481,205 UART: [idev] SUBJECT.KEYID = 7
1,481,629 UART: [idev] UDS.KEYID = 0
1,481,974 ready_for_fw is high
1,481,974 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,333 UART: [idev] Erasing UDS.KEYID = 0
1,506,761 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,335 UART: [idev] --
1,516,378 UART: [ldev] ++
1,516,546 UART: [ldev] CDI.KEYID = 6
1,516,909 UART: [ldev] SUBJECT.KEYID = 5
1,517,335 UART: [ldev] AUTHORITY.KEYID = 7
1,517,798 UART: [ldev] FE.KEYID = 1
1,522,818 UART: [ldev] Erasing FE.KEYID = 1
1,548,425 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,083 UART: [ldev] --
1,587,488 UART: [fwproc] Waiting for Commands...
1,588,351 UART: [fwproc] Received command 0x46574c44
1,589,142 UART: [fwproc] Received Image of size 114332 bytes
2,886,484 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,652 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,004 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,981 >>> mbox cmd response: success
3,080,041 UART: [afmc] ++
3,080,209 UART: [afmc] CDI.KEYID = 6
3,080,571 UART: [afmc] SUBJECT.KEYID = 7
3,080,996 UART: [afmc] AUTHORITY.KEYID = 5
3,115,961 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,323 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,103 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,831 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,716 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,406 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,321 UART: [afmc] --
3,159,441 UART: [cold-reset] --
3,160,187 UART: [state] Locking Datavault
3,161,172 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,776 UART: [state] Locking ICCM
3,162,370 UART: [exit] Launching FMC @ 0x40000130
3,167,699 UART:
3,167,715 UART: Running Caliptra FMC ...
3,168,123 UART:
3,168,266 UART: [state] CFI Enabled
3,178,835 UART: [fht] FMC Alias Private Key: 7
3,286,274 UART: [art] Extend RT PCRs Done
3,286,702 UART: [art] Lock RT PCRs Done
3,288,522 UART: [art] Populate DV Done
3,296,457 UART: [fht] FMC Alias Private Key: 7
3,297,509 UART: [art] Derive CDI
3,297,789 UART: [art] Store in in slot 0x4
3,383,674 UART: [art] Derive Key Pair
3,384,034 UART: [art] Store priv key in slot 0x5
3,397,574 UART: [art] Derive Key Pair - Done
3,412,226 UART: [art] Signing Cert with AUTHO
3,412,706 UART: RITY.KEYID = 7
3,427,810 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,575 UART: [art] PUB.X = BB7E99D48701A6675A615B4C4A8DC654761F0391EF3BF9016AE2DEB35C4F57F938A773DB971F81E63AB5025CB89B30D7
3,435,341 UART: [art] PUB.Y = C02377EF385996FA6EE1037BE03F0370AD3799B6C578D321E61F69F42D310AF482BF7D8D9D0A61E6835F3E23F3B368A2
3,442,283 UART: [art] SIG.R = 01A68BC698DE54F05A5F37668D039ADE6770FFDE4AD945825A6F51981E4FA31B3C9C04F6A71B338BF930D0F51046B2A1
3,449,052 UART: [art] SIG.S = D1A828B2ACBF404566BC87145007CDFB71B3E7813829E345728EEA1A908CFD3B3A81807A81FCAAA5AFA8DDDD8D1A5445
3,472,858 UART: Caliptra RT
3,473,203 UART: [state] CFI Enabled
3,581,130 UART: [rt] RT listening for mailbox commands...
3,581,800 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,114 UART: [rt]cmd =0x434b4558, len=80
3,613,149 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,008 ready_for_fw is high
1,363,008 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,493 >>> mbox cmd response: success
2,991,645 UART:
2,991,661 UART: Running Caliptra FMC ...
2,992,069 UART:
2,992,212 UART: [state] CFI Enabled
3,002,703 UART: [fht] FMC Alias Private Key: 7
3,111,098 UART: [art] Extend RT PCRs Done
3,111,526 UART: [art] Lock RT PCRs Done
3,113,228 UART: [art] Populate DV Done
3,121,271 UART: [fht] FMC Alias Private Key: 7
3,122,257 UART: [art] Derive CDI
3,122,537 UART: [art] Store in in slot 0x4
3,207,930 UART: [art] Derive Key Pair
3,208,290 UART: [art] Store priv key in slot 0x5
3,221,842 UART: [art] Derive Key Pair - Done
3,236,776 UART: [art] Signing Cert with AUTHO
3,237,256 UART: RITY.KEYID = 7
3,252,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,047 UART: [art] PUB.X = 1D99CC5315BA00AADF3C414F24B00A27943D0155F1D5131EAC5DB068A9B18F750C0663A32E14D0010E1C48FB49B5B969
3,259,783 UART: [art] PUB.Y = 547093D2412B8E3C11ADAF9343A6702B193A0189204353E8D83DE1131BCD0BC06CBBD66D39FFB11C3179619D47F4EEA0
3,266,733 UART: [art] SIG.R = 8BE6E088E0F9033BF7FA1097035644F924C9E689613B2101370311C22A0F415727703C61BD2B506A2A3B1CEE46C5E25C
3,273,484 UART: [art] SIG.S = 456834A4BC01411821A62530ECC57305B11038CD74DBF675F4CDAB474597339A680CC96C2AA17E03BE54A280CA6401F0
3,296,922 UART: Caliptra RT
3,297,267 UART: [state] CFI Enabled
3,405,558 UART: [rt] RT listening for mailbox commands...
3,406,228 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,530 UART: [rt]cmd =0x434b4558, len=80
3,437,449 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
893,422 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,547 UART: [kat] ++
897,699 UART: [kat] sha1
901,909 UART: [kat] SHA2-256
903,849 UART: [kat] SHA2-384
906,550 UART: [kat] SHA2-512-ACC
908,451 UART: [kat] ECC-384
917,870 UART: [kat] HMAC-384Kdf
922,632 UART: [kat] LMS
1,170,960 UART: [kat] --
1,172,013 UART: [cold-reset] ++
1,172,457 UART: [fht] FHT @ 0x50003400
1,175,206 UART: [idev] ++
1,175,374 UART: [idev] CDI.KEYID = 6
1,175,734 UART: [idev] SUBJECT.KEYID = 7
1,176,158 UART: [idev] UDS.KEYID = 0
1,176,503 ready_for_fw is high
1,176,503 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,740 UART: [idev] Erasing UDS.KEYID = 0
1,200,857 UART: [idev] Sha1 KeyId Algorithm
1,209,273 UART: [idev] --
1,210,359 UART: [ldev] ++
1,210,527 UART: [ldev] CDI.KEYID = 6
1,210,890 UART: [ldev] SUBJECT.KEYID = 5
1,211,316 UART: [ldev] AUTHORITY.KEYID = 7
1,211,779 UART: [ldev] FE.KEYID = 1
1,216,865 UART: [ldev] Erasing FE.KEYID = 1
1,243,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,903 UART: [ldev] --
1,282,248 UART: [fwproc] Wait for Commands...
1,283,014 UART: [fwproc] Recv command 0x46574c44
1,283,742 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,776 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,080 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,981 >>> mbox cmd response: success
2,775,073 UART: [afmc] ++
2,775,241 UART: [afmc] CDI.KEYID = 6
2,775,603 UART: [afmc] SUBJECT.KEYID = 7
2,776,028 UART: [afmc] AUTHORITY.KEYID = 5
2,811,715 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,854 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,602 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,330 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,215 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,934 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,796 UART: [afmc] --
2,854,812 UART: [cold-reset] --
2,855,360 UART: [state] Locking Datavault
2,856,719 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,323 UART: [state] Locking ICCM
2,857,959 UART: [exit] Launching FMC @ 0x40000130
2,863,288 UART:
2,863,304 UART: Running Caliptra FMC ...
2,863,712 UART:
2,863,766 UART: [state] CFI Enabled
2,874,257 UART: [fht] FMC Alias Private Key: 7
2,982,408 UART: [art] Extend RT PCRs Done
2,982,836 UART: [art] Lock RT PCRs Done
2,984,386 UART: [art] Populate DV Done
2,992,343 UART: [fht] FMC Alias Private Key: 7
2,993,339 UART: [art] Derive CDI
2,993,619 UART: [art] Store in in slot 0x4
3,079,436 UART: [art] Derive Key Pair
3,079,796 UART: [art] Store priv key in slot 0x5
3,093,226 UART: [art] Derive Key Pair - Done
3,107,961 UART: [art] Signing Cert with AUTHO
3,108,441 UART: RITY.KEYID = 7
3,123,289 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,054 UART: [art] PUB.X = 2F718C56BCDDCDD18D58913FF3F12AE460928A6A9EA870E527006B9F61574F348ADF314C80BE9229168DB89594AAF385
3,130,808 UART: [art] PUB.Y = F19E0D8592805BB4A0BB6F507A5FF30E547BFEB4CF8130EC347B817BC4306CD4214CF2ADE1B6AF7D82E0249781156BD1
3,137,766 UART: [art] SIG.R = 0C2DF94C97B541A9532EB9E87251A6F636B2DD7878AB2CBBD1E0B814B1897E229BA026BC9DCFEC923A6017DF4B9245C7
3,144,547 UART: [art] SIG.S = D92D8A17E6493E75F9D949DD835FE61F042C4CA939C41C618B88171EC584100E8C96C10A78D22B5A6A0A076AE299F6FC
3,168,581 UART: Caliptra RT
3,168,834 UART: [state] CFI Enabled
3,277,139 UART: [rt] RT listening for mailbox commands...
3,277,809 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,857 UART: [rt]cmd =0x434b4558, len=80
3,308,710 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,897 ready_for_fw is high
1,059,897 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,274 >>> mbox cmd response: success
2,688,502 UART:
2,688,518 UART: Running Caliptra FMC ...
2,688,926 UART:
2,688,980 UART: [state] CFI Enabled
2,699,633 UART: [fht] FMC Alias Private Key: 7
2,807,022 UART: [art] Extend RT PCRs Done
2,807,450 UART: [art] Lock RT PCRs Done
2,808,798 UART: [art] Populate DV Done
2,817,305 UART: [fht] FMC Alias Private Key: 7
2,818,375 UART: [art] Derive CDI
2,818,655 UART: [art] Store in in slot 0x4
2,904,626 UART: [art] Derive Key Pair
2,904,986 UART: [art] Store priv key in slot 0x5
2,918,100 UART: [art] Derive Key Pair - Done
2,932,703 UART: [art] Signing Cert with AUTHO
2,933,183 UART: RITY.KEYID = 7
2,948,097 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,862 UART: [art] PUB.X = C56BD26A275FD06897A6B3A3DFEB72A3EC77E57BE39B70C7102C08D6BA220F6D66CDDAD12E6696FCE0A887AA5357BBF8
2,955,648 UART: [art] PUB.Y = 51C3E26B382E1F1BE1BD96C3A42864E252C527B10B927FB62406E16B9E7D3B07FB3BD234FFB4ADE31EA7F5C07E69A2F8
2,962,605 UART: [art] SIG.R = 775A83355F4CE532D6FDC1FD015393301A0933FB50AC4037EAF0BB6EC6119E0A634B29A2139E0E6209AE5BAF39875B27
2,969,366 UART: [art] SIG.S = A4022870AEE7E58F3EF0E256FA8121EE93AD5CBED016CEB2C5964DA642FEBFEB41443F4E6CC4EBB8E5E9DAD9F8D8DCA0
2,993,988 UART: Caliptra RT
2,994,241 UART: [state] CFI Enabled
3,101,986 UART: [rt] RT listening for mailbox commands...
3,102,656 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,642 UART: [rt]cmd =0x434b4558, len=80
3,133,687 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
893,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,768 UART: [kat] ++
897,920 UART: [kat] sha1
902,004 UART: [kat] SHA2-256
903,944 UART: [kat] SHA2-384
906,827 UART: [kat] SHA2-512-ACC
908,728 UART: [kat] ECC-384
918,265 UART: [kat] HMAC-384Kdf
922,789 UART: [kat] LMS
1,171,117 UART: [kat] --
1,172,240 UART: [cold-reset] ++
1,172,792 UART: [fht] FHT @ 0x50003400
1,175,269 UART: [idev] ++
1,175,437 UART: [idev] CDI.KEYID = 6
1,175,797 UART: [idev] SUBJECT.KEYID = 7
1,176,221 UART: [idev] UDS.KEYID = 0
1,176,566 ready_for_fw is high
1,176,566 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,377 UART: [idev] Erasing UDS.KEYID = 0
1,201,852 UART: [idev] Sha1 KeyId Algorithm
1,210,408 UART: [idev] --
1,211,458 UART: [ldev] ++
1,211,626 UART: [ldev] CDI.KEYID = 6
1,211,989 UART: [ldev] SUBJECT.KEYID = 5
1,212,415 UART: [ldev] AUTHORITY.KEYID = 7
1,212,878 UART: [ldev] FE.KEYID = 1
1,218,132 UART: [ldev] Erasing FE.KEYID = 1
1,244,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,418 UART: [ldev] --
1,283,907 UART: [fwproc] Wait for Commands...
1,284,533 UART: [fwproc] Recv command 0x46574c44
1,285,261 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,848 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,581 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,364 >>> mbox cmd response: success
2,775,554 UART: [afmc] ++
2,775,722 UART: [afmc] CDI.KEYID = 6
2,776,084 UART: [afmc] SUBJECT.KEYID = 7
2,776,509 UART: [afmc] AUTHORITY.KEYID = 5
2,812,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,135 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,883 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,611 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,496 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,215 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,005 UART: [afmc] --
2,855,961 UART: [cold-reset] --
2,856,773 UART: [state] Locking Datavault
2,858,050 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,654 UART: [state] Locking ICCM
2,859,296 UART: [exit] Launching FMC @ 0x40000130
2,864,625 UART:
2,864,641 UART: Running Caliptra FMC ...
2,865,049 UART:
2,865,192 UART: [state] CFI Enabled
2,875,655 UART: [fht] FMC Alias Private Key: 7
2,983,486 UART: [art] Extend RT PCRs Done
2,983,914 UART: [art] Lock RT PCRs Done
2,985,574 UART: [art] Populate DV Done
2,993,463 UART: [fht] FMC Alias Private Key: 7
2,994,445 UART: [art] Derive CDI
2,994,725 UART: [art] Store in in slot 0x4
3,080,708 UART: [art] Derive Key Pair
3,081,068 UART: [art] Store priv key in slot 0x5
3,094,214 UART: [art] Derive Key Pair - Done
3,108,878 UART: [art] Signing Cert with AUTHO
3,109,358 UART: RITY.KEYID = 7
3,124,604 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,369 UART: [art] PUB.X = A7FCF6969B7A4C29809317DB049E3ACA1595BB24CC18A72AB32D6A5E8C0B3DD5F6890F802FE97D048A3C3CDF8362F3F0
3,132,143 UART: [art] PUB.Y = 623B3D902CA7906E1E3988BCC810FB91D280E6524471B04F561BD62E4317CD0FECB653BEC54E789416271E4CBAFC3EF5
3,139,100 UART: [art] SIG.R = 5E7A5C95639E2FEA43D8DB2C685EE3EF35690617705ED1AEDB7FD274D37834BF9454814F1B8F35D27E0E1E58090C64BD
3,145,868 UART: [art] SIG.S = 1819AA1D8358B90D0685A90940477441E31E0E74435882A4ECAAC562C8BBC70FC573F9D9060828E4BABA3D4A7048D534
3,169,406 UART: Caliptra RT
3,169,751 UART: [state] CFI Enabled
3,278,160 UART: [rt] RT listening for mailbox commands...
3,278,830 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,842 UART: [rt]cmd =0x434b4558, len=80
3,309,805 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,794 ready_for_fw is high
1,060,794 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,765 >>> mbox cmd response: success
2,689,581 UART:
2,689,597 UART: Running Caliptra FMC ...
2,690,005 UART:
2,690,148 UART: [state] CFI Enabled
2,700,781 UART: [fht] FMC Alias Private Key: 7
2,808,692 UART: [art] Extend RT PCRs Done
2,809,120 UART: [art] Lock RT PCRs Done
2,810,474 UART: [art] Populate DV Done
2,818,735 UART: [fht] FMC Alias Private Key: 7
2,819,857 UART: [art] Derive CDI
2,820,137 UART: [art] Store in in slot 0x4
2,905,994 UART: [art] Derive Key Pair
2,906,354 UART: [art] Store priv key in slot 0x5
2,919,668 UART: [art] Derive Key Pair - Done
2,934,408 UART: [art] Signing Cert with AUTHO
2,934,888 UART: RITY.KEYID = 7
2,950,390 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,155 UART: [art] PUB.X = D981D0C2D509F0C86B5417BEA17055DB4EFFD05A0C7467AAC538AF638087695016D99F236B6BB40196C7895C49DB73A3
2,957,920 UART: [art] PUB.Y = 574E38B3197702E98C643908215DEBFF15851143300EBA651A2974B75CBD1DC2E1E3A072AA9CFE9E878D58102A26172A
2,964,861 UART: [art] SIG.R = 522828140E96EDAC5C1D83BC6D0EF5AAA6881A08B66A6CC69BE158CB8D0D422C9995DB00096F61CF5CC41053874F51FC
2,971,606 UART: [art] SIG.S = 1400D253BBA23B737A87DEBB1C440F5832804934DE5F9C83FB95F89B44B6D239546E560BA07D9B0BDE87B329B6FC88AF
2,995,770 UART: Caliptra RT
2,996,115 UART: [state] CFI Enabled
3,104,382 UART: [rt] RT listening for mailbox commands...
3,105,052 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,632 UART: [rt]cmd =0x434b4558, len=80
3,136,711 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
891,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,183 UART: [kat] ++
895,335 UART: [kat] sha1
899,629 UART: [kat] SHA2-256
901,569 UART: [kat] SHA2-384
904,356 UART: [kat] SHA2-512-ACC
906,257 UART: [kat] ECC-384
915,784 UART: [kat] HMAC-384Kdf
920,506 UART: [kat] LMS
1,168,818 UART: [kat] --
1,169,665 UART: [cold-reset] ++
1,170,227 UART: [fht] FHT @ 0x50003400
1,172,981 UART: [idev] ++
1,173,149 UART: [idev] CDI.KEYID = 6
1,173,510 UART: [idev] SUBJECT.KEYID = 7
1,173,935 UART: [idev] UDS.KEYID = 0
1,174,281 ready_for_fw is high
1,174,281 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,217 UART: [idev] Erasing UDS.KEYID = 0
1,199,297 UART: [idev] Sha1 KeyId Algorithm
1,208,311 UART: [idev] --
1,209,272 UART: [ldev] ++
1,209,440 UART: [ldev] CDI.KEYID = 6
1,209,804 UART: [ldev] SUBJECT.KEYID = 5
1,210,231 UART: [ldev] AUTHORITY.KEYID = 7
1,210,694 UART: [ldev] FE.KEYID = 1
1,215,802 UART: [ldev] Erasing FE.KEYID = 1
1,242,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,978 UART: [ldev] --
1,281,414 UART: [fwproc] Wait for Commands...
1,282,143 UART: [fwproc] Recv command 0x46574c44
1,282,876 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,450 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,014 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,323 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,235 >>> mbox cmd response: success
2,774,442 UART: [afmc] ++
2,774,610 UART: [afmc] CDI.KEYID = 6
2,774,973 UART: [afmc] SUBJECT.KEYID = 7
2,775,399 UART: [afmc] AUTHORITY.KEYID = 5
2,810,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,891 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,620 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,503 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,222 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,171 UART: [afmc] --
2,854,117 UART: [cold-reset] --
2,854,955 UART: [state] Locking Datavault
2,855,926 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,530 UART: [state] Locking ICCM
2,856,982 UART: [exit] Launching FMC @ 0x40000130
2,862,311 UART:
2,862,327 UART: Running Caliptra FMC ...
2,862,735 UART:
2,862,789 UART: [state] CFI Enabled
2,873,694 UART: [fht] FMC Alias Private Key: 7
2,982,293 UART: [art] Extend RT PCRs Done
2,982,721 UART: [art] Lock RT PCRs Done
2,983,977 UART: [art] Populate DV Done
2,992,196 UART: [fht] FMC Alias Private Key: 7
2,993,226 UART: [art] Derive CDI
2,993,506 UART: [art] Store in in slot 0x4
3,078,989 UART: [art] Derive Key Pair
3,079,349 UART: [art] Store priv key in slot 0x5
3,092,027 UART: [art] Derive Key Pair - Done
3,106,837 UART: [art] Signing Cert with AUTHO
3,107,317 UART: RITY.KEYID = 7
3,121,913 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,678 UART: [art] PUB.X = 51F58997E0CB4EC03F73EA00175E41F4C3FEB8FA7B2008DA0CABF21E945AFF4CDA9D99B82311D2BF6FED279B9D2AD37A
3,129,446 UART: [art] PUB.Y = 5B0FC1B5E530E30647EE0E6870BEFAC27E99AB015491CC47A5D010485998B2C20C3331AA80F301107451AFE60875E024
3,136,375 UART: [art] SIG.R = DF00429FB1425958C7C4F4140BE5D286160F2BC5FF749423D9D3398CB82D0797F43C703277FC1F271AFDA2A2EE31E62C
3,143,120 UART: [art] SIG.S = CAEEDF306678EE3AD4D6770862E5C4DA8F8C1D5349130E1EF98A64E1FD691EA0B085A0B5EB5C517D124783F02A29D80F
3,167,090 UART: Caliptra RT
3,167,343 UART: [state] CFI Enabled
3,275,255 UART: [rt] RT listening for mailbox commands...
3,275,925 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,481 UART: [rt]cmd =0x434b4558, len=80
3,307,422 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,090 ready_for_fw is high
1,055,090 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,321 >>> mbox cmd response: success
2,684,401 UART:
2,684,417 UART: Running Caliptra FMC ...
2,684,825 UART:
2,684,879 UART: [state] CFI Enabled
2,695,270 UART: [fht] FMC Alias Private Key: 7
2,803,345 UART: [art] Extend RT PCRs Done
2,803,773 UART: [art] Lock RT PCRs Done
2,805,195 UART: [art] Populate DV Done
2,813,372 UART: [fht] FMC Alias Private Key: 7
2,814,388 UART: [art] Derive CDI
2,814,668 UART: [art] Store in in slot 0x4
2,900,639 UART: [art] Derive Key Pair
2,900,999 UART: [art] Store priv key in slot 0x5
2,913,907 UART: [art] Derive Key Pair - Done
2,928,506 UART: [art] Signing Cert with AUTHO
2,928,986 UART: RITY.KEYID = 7
2,944,326 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,091 UART: [art] PUB.X = 0CF813EC500D2B231BE1CDF12FB93E1F98C1BE0CED40550B3756817DCB527309127E3235F560386A1B29F9AF72617445
2,951,848 UART: [art] PUB.Y = A78D47793D489F73063F0DF879A71370C93FBC3B2ACDB98BFC93D593B1DDD33A6B5D83B352FBC4D615BD8E1E5930165D
2,958,806 UART: [art] SIG.R = B8C130F15C1C8BFEF748093B8BC22AA054665D7A8BB477A7FEA9497622B9EFF928B6A5477F0A0B61E90322D4ABD5D643
2,965,576 UART: [art] SIG.S = D57986C56A5469456D560CD54F8B00620CA9F45C2C23CD169C3EC8B1E9FD7ED28C739CF30DBBC3465A579C0D39C1D86D
2,989,533 UART: Caliptra RT
2,989,786 UART: [state] CFI Enabled
3,097,914 UART: [rt] RT listening for mailbox commands...
3,098,584 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,904 UART: [rt]cmd =0x434b4558, len=80
3,130,155 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,767 UART: [state] LifecycleState = Unprovisioned
86,422 UART: [state] DebugLocked = No
87,014 UART: [state] WD Timer not started. Device not locked for debugging
88,327 UART: [kat] SHA2-256
891,877 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,006 UART: [kat] ++
896,158 UART: [kat] sha1
900,366 UART: [kat] SHA2-256
902,306 UART: [kat] SHA2-384
905,217 UART: [kat] SHA2-512-ACC
907,118 UART: [kat] ECC-384
917,229 UART: [kat] HMAC-384Kdf
921,825 UART: [kat] LMS
1,170,137 UART: [kat] --
1,171,214 UART: [cold-reset] ++
1,171,618 UART: [fht] FHT @ 0x50003400
1,174,106 UART: [idev] ++
1,174,274 UART: [idev] CDI.KEYID = 6
1,174,635 UART: [idev] SUBJECT.KEYID = 7
1,175,060 UART: [idev] UDS.KEYID = 0
1,175,406 ready_for_fw is high
1,175,406 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,538 UART: [idev] Erasing UDS.KEYID = 0
1,200,560 UART: [idev] Sha1 KeyId Algorithm
1,209,470 UART: [idev] --
1,210,625 UART: [ldev] ++
1,210,793 UART: [ldev] CDI.KEYID = 6
1,211,157 UART: [ldev] SUBJECT.KEYID = 5
1,211,584 UART: [ldev] AUTHORITY.KEYID = 7
1,212,047 UART: [ldev] FE.KEYID = 1
1,216,957 UART: [ldev] Erasing FE.KEYID = 1
1,243,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,209 UART: [ldev] --
1,282,489 UART: [fwproc] Wait for Commands...
1,283,230 UART: [fwproc] Recv command 0x46574c44
1,283,963 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,447 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,756 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,490 >>> mbox cmd response: success
2,775,539 UART: [afmc] ++
2,775,707 UART: [afmc] CDI.KEYID = 6
2,776,070 UART: [afmc] SUBJECT.KEYID = 7
2,776,496 UART: [afmc] AUTHORITY.KEYID = 5
2,812,467 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,769 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,520 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,249 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,132 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,851 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,648 UART: [afmc] --
2,855,722 UART: [cold-reset] --
2,856,418 UART: [state] Locking Datavault
2,857,421 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,025 UART: [state] Locking ICCM
2,858,493 UART: [exit] Launching FMC @ 0x40000130
2,863,822 UART:
2,863,838 UART: Running Caliptra FMC ...
2,864,246 UART:
2,864,389 UART: [state] CFI Enabled
2,874,702 UART: [fht] FMC Alias Private Key: 7
2,982,515 UART: [art] Extend RT PCRs Done
2,982,943 UART: [art] Lock RT PCRs Done
2,984,757 UART: [art] Populate DV Done
2,992,838 UART: [fht] FMC Alias Private Key: 7
2,993,968 UART: [art] Derive CDI
2,994,248 UART: [art] Store in in slot 0x4
3,079,445 UART: [art] Derive Key Pair
3,079,805 UART: [art] Store priv key in slot 0x5
3,093,035 UART: [art] Derive Key Pair - Done
3,108,049 UART: [art] Signing Cert with AUTHO
3,108,529 UART: RITY.KEYID = 7
3,124,003 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,768 UART: [art] PUB.X = A702D478503DDCC48FC1BB05FE4653AF23898B34328E260136C5FE28BE60DAD4408BEFE562C536DFCADFC264CCF684D6
3,131,547 UART: [art] PUB.Y = D143E5B49F7E8D002E2B918B8ACD8B94809CE0E3E18380E322567BD8559461E7BF78A4747BD59EBD6922CFE78C98AF9E
3,138,485 UART: [art] SIG.R = 146086DAB2987D9FC95F79DE75C46DFF067558AB2105A29E1F4D28627DC870161829A73404B64357067E101C2F9007F6
3,145,232 UART: [art] SIG.S = 6D1FE0767DF603A2F16F8A013F09873CC26D1A2C9FC4D7FC0E792C78A6E8CB40240FBAEB5793B76CD3E0346D4EB6F3DD
3,168,514 UART: Caliptra RT
3,168,859 UART: [state] CFI Enabled
3,276,154 UART: [rt] RT listening for mailbox commands...
3,276,824 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,070 UART: [rt]cmd =0x434b4558, len=80
3,308,173 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,983 ready_for_fw is high
1,055,983 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,726 >>> mbox cmd response: success
2,684,288 UART:
2,684,304 UART: Running Caliptra FMC ...
2,684,712 UART:
2,684,855 UART: [state] CFI Enabled
2,694,990 UART: [fht] FMC Alias Private Key: 7
2,803,537 UART: [art] Extend RT PCRs Done
2,803,965 UART: [art] Lock RT PCRs Done
2,805,627 UART: [art] Populate DV Done
2,813,854 UART: [fht] FMC Alias Private Key: 7
2,814,964 UART: [art] Derive CDI
2,815,244 UART: [art] Store in in slot 0x4
2,900,679 UART: [art] Derive Key Pair
2,901,039 UART: [art] Store priv key in slot 0x5
2,913,619 UART: [art] Derive Key Pair - Done
2,928,354 UART: [art] Signing Cert with AUTHO
2,928,834 UART: RITY.KEYID = 7
2,944,266 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,031 UART: [art] PUB.X = 98DE47CFAAA199FEE814B1143875CCFFE57FB26E7865AD64F770A366B3A0A44C896283CBA4A507C6E4ED8A974E537A5A
2,951,814 UART: [art] PUB.Y = 45B9F2A0CBAB0ECCAE06B8A1F41975C6D84ABD8412BF644CDA6B322E438B2069F47E2F2884BC7B5F98629482C76820CD
2,958,772 UART: [art] SIG.R = 9E2B29D2D8A5FECAE7F5CFB74D17C951E38B8FB011B4E8D0C0BEFDD400001005DA1F96AAEB2EE2FB9CCC98BC17216B19
2,965,525 UART: [art] SIG.S = 8AA072E3C2C22EB5C880770038A113F7E91EBE2CFD8CF5ACF84B14C0D940DABDECB3F65BA268711856F50C54EAC5CDC3
2,989,473 UART: Caliptra RT
2,989,818 UART: [state] CFI Enabled
3,098,152 UART: [rt] RT listening for mailbox commands...
3,098,822 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,776 UART: [rt]cmd =0x434b4558, len=80
3,129,647 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,612 UART: [state] LifecycleState = Unprovisioned
85,267 UART: [state] DebugLocked = No
85,911 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,525 UART: [kat] SHA2-256
881,456 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,571 UART: [kat] ++
885,723 UART: [kat] sha1
889,981 UART: [kat] SHA2-256
891,919 UART: [kat] SHA2-384
894,778 UART: [kat] SHA2-512-ACC
896,679 UART: [kat] ECC-384
902,228 UART: [kat] HMAC-384Kdf
906,914 UART: [kat] LMS
1,475,110 UART: [kat] --
1,475,735 UART: [cold-reset] ++
1,476,289 UART: [fht] Storing FHT @ 0x50003400
1,479,230 UART: [idev] ++
1,479,398 UART: [idev] CDI.KEYID = 6
1,479,758 UART: [idev] SUBJECT.KEYID = 7
1,480,182 UART: [idev] UDS.KEYID = 0
1,480,527 ready_for_fw is high
1,480,527 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,344 UART: [idev] Erasing UDS.KEYID = 0
1,504,862 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,530 UART: [idev] --
1,514,603 UART: [ldev] ++
1,514,771 UART: [ldev] CDI.KEYID = 6
1,515,134 UART: [ldev] SUBJECT.KEYID = 5
1,515,560 UART: [ldev] AUTHORITY.KEYID = 7
1,516,023 UART: [ldev] FE.KEYID = 1
1,521,479 UART: [ldev] Erasing FE.KEYID = 1
1,547,130 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,038 UART: [ldev] --
1,586,497 UART: [fwproc] Waiting for Commands...
1,587,284 UART: [fwproc] Received command 0x46574c44
1,588,075 UART: [fwproc] Received Image of size 114332 bytes
2,886,014 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,886 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,238 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,123 >>> mbox cmd response: success
3,079,275 UART: [afmc] ++
3,079,443 UART: [afmc] CDI.KEYID = 6
3,079,805 UART: [afmc] SUBJECT.KEYID = 7
3,080,230 UART: [afmc] AUTHORITY.KEYID = 5
3,115,245 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,303 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,083 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,811 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,696 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,386 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,275 UART: [afmc] --
3,158,179 UART: [cold-reset] --
3,159,057 UART: [state] Locking Datavault
3,160,270 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,874 UART: [state] Locking ICCM
3,161,396 UART: [exit] Launching FMC @ 0x40000130
3,166,725 UART:
3,166,741 UART: Running Caliptra FMC ...
3,167,149 UART:
3,167,203 UART: [state] CFI Enabled
3,177,482 UART: [fht] FMC Alias Private Key: 7
3,285,103 UART: [art] Extend RT PCRs Done
3,285,531 UART: [art] Lock RT PCRs Done
3,287,149 UART: [art] Populate DV Done
3,295,454 UART: [fht] FMC Alias Private Key: 7
3,296,626 UART: [art] Derive CDI
3,296,906 UART: [art] Store in in slot 0x4
3,382,909 UART: [art] Derive Key Pair
3,383,269 UART: [art] Store priv key in slot 0x5
3,396,771 UART: [art] Derive Key Pair - Done
3,411,708 UART: [art] Signing Cert with AUTHO
3,412,188 UART: RITY.KEYID = 7
3,427,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,317 UART: [art] PUB.X = F76BCE7EE0839DC81CAD9236B8953CF69CA17D1DE9CAF31209DAD1CB77D82532F25B021F3CE0CF3545A42F11ED8581C9
3,435,099 UART: [art] PUB.Y = B050EC4F3D21DA8A074BC4DA242CDF77882374962A3B33C78F5F16789C0B1364B50AF62578F6CBDF4315A998A6775C90
3,442,044 UART: [art] SIG.R = 74C57E57F1A525BC7352BC2D7EFC2B345DECCFD70D4B6E97475D515C49AF0D870008C33FC0ADA136E5EAECA975965B9F
3,448,803 UART: [art] SIG.S = 2662E383EAC1ADF304AD7054F51B522CA36FCAAB4A0075D2DBF0174DB76B2845FA4A8BE370D84E6D5E863F33D22B974D
3,473,219 UART: Caliptra RT
3,473,472 UART: [state] CFI Enabled
3,581,558 UART: [rt] RT listening for mailbox commands...
3,582,228 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,414 UART: [rt]cmd =0x44504543, len=92
3,619,598 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,585 ready_for_fw is high
1,362,585 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,862 >>> mbox cmd response: success
2,991,342 UART:
2,991,358 UART: Running Caliptra FMC ...
2,991,766 UART:
2,991,820 UART: [state] CFI Enabled
3,002,245 UART: [fht] FMC Alias Private Key: 7
3,110,478 UART: [art] Extend RT PCRs Done
3,110,906 UART: [art] Lock RT PCRs Done
3,112,446 UART: [art] Populate DV Done
3,120,679 UART: [fht] FMC Alias Private Key: 7
3,121,831 UART: [art] Derive CDI
3,122,111 UART: [art] Store in in slot 0x4
3,207,972 UART: [art] Derive Key Pair
3,208,332 UART: [art] Store priv key in slot 0x5
3,221,334 UART: [art] Derive Key Pair - Done
3,236,152 UART: [art] Signing Cert with AUTHO
3,236,632 UART: RITY.KEYID = 7
3,252,030 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,795 UART: [art] PUB.X = 7E1BBFBFB83FB09E311B74FE2F3858C6B13902128E5FCAB8B5C35872435825805122CDC2E4461E88B103C64112481EA8
3,259,561 UART: [art] PUB.Y = 5E43C7C577592BFF27F3672FEA20C8E3BD09EB186EF1B860DD7E258582DC6421D57BEAB1FA880819E62EDB8A2FF1163D
3,266,521 UART: [art] SIG.R = 9F444A8CE84CCC8CCAEF2DD27CB1EFA659B39051BA7069F0BACE79000B55A8A9C1C3937259E28C3ECB98ED3C4B0C81FB
3,273,289 UART: [art] SIG.S = 19BF9731227F7D6A05DF64AAABA48730F7AF7A4D2C4094B8E9A44743E29AAA34E336337DF3BF453D44590419EA2FD9F1
3,296,906 UART: Caliptra RT
3,297,159 UART: [state] CFI Enabled
3,406,378 UART: [rt] RT listening for mailbox commands...
3,407,048 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,366 UART: [rt]cmd =0x44504543, len=92
3,444,724 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,812 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,462 UART: [kat] SHA2-256
882,393 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,508 UART: [kat] ++
886,660 UART: [kat] sha1
891,036 UART: [kat] SHA2-256
892,974 UART: [kat] SHA2-384
895,723 UART: [kat] SHA2-512-ACC
897,624 UART: [kat] ECC-384
903,237 UART: [kat] HMAC-384Kdf
907,715 UART: [kat] LMS
1,475,911 UART: [kat] --
1,476,602 UART: [cold-reset] ++
1,477,066 UART: [fht] Storing FHT @ 0x50003400
1,479,713 UART: [idev] ++
1,479,881 UART: [idev] CDI.KEYID = 6
1,480,241 UART: [idev] SUBJECT.KEYID = 7
1,480,665 UART: [idev] UDS.KEYID = 0
1,481,010 ready_for_fw is high
1,481,010 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,919 UART: [idev] Erasing UDS.KEYID = 0
1,505,835 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,319 UART: [idev] --
1,515,444 UART: [ldev] ++
1,515,612 UART: [ldev] CDI.KEYID = 6
1,515,975 UART: [ldev] SUBJECT.KEYID = 5
1,516,401 UART: [ldev] AUTHORITY.KEYID = 7
1,516,864 UART: [ldev] FE.KEYID = 1
1,521,964 UART: [ldev] Erasing FE.KEYID = 1
1,547,259 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,121 UART: [ldev] --
1,586,614 UART: [fwproc] Waiting for Commands...
1,587,295 UART: [fwproc] Received command 0x46574c44
1,588,086 UART: [fwproc] Received Image of size 114332 bytes
2,885,280 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,740 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,092 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,829 >>> mbox cmd response: success
3,078,877 UART: [afmc] ++
3,079,045 UART: [afmc] CDI.KEYID = 6
3,079,407 UART: [afmc] SUBJECT.KEYID = 7
3,079,832 UART: [afmc] AUTHORITY.KEYID = 5
3,114,689 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,931 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,711 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,439 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,324 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,014 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,853 UART: [afmc] --
3,157,967 UART: [cold-reset] --
3,158,905 UART: [state] Locking Datavault
3,160,094 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,698 UART: [state] Locking ICCM
3,161,334 UART: [exit] Launching FMC @ 0x40000130
3,166,663 UART:
3,166,679 UART: Running Caliptra FMC ...
3,167,087 UART:
3,167,230 UART: [state] CFI Enabled
3,177,895 UART: [fht] FMC Alias Private Key: 7
3,286,070 UART: [art] Extend RT PCRs Done
3,286,498 UART: [art] Lock RT PCRs Done
3,288,120 UART: [art] Populate DV Done
3,296,457 UART: [fht] FMC Alias Private Key: 7
3,297,403 UART: [art] Derive CDI
3,297,683 UART: [art] Store in in slot 0x4
3,383,318 UART: [art] Derive Key Pair
3,383,678 UART: [art] Store priv key in slot 0x5
3,397,014 UART: [art] Derive Key Pair - Done
3,411,670 UART: [art] Signing Cert with AUTHO
3,412,150 UART: RITY.KEYID = 7
3,427,562 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,327 UART: [art] PUB.X = B2CC20EEE55949E4044D4E1FA61A4DBB6DAF38B94C423A83DB0E820962CC52195827B7D7BDB8A5719DA84B718BAB9EE4
3,435,106 UART: [art] PUB.Y = E5CCD20F4823F14C0A317EE45D1299FB96246AABCFAF8E3DAA6054BA4FD6E719353529B437552665BF1E0190BCFD45FA
3,442,063 UART: [art] SIG.R = 6D48F1FB16126EF7C627D05B5121BD4B817298D510400E1F266D7BBAAA6BBD100234E5BDCE8AA5629A6E4964E9748AE8
3,448,837 UART: [art] SIG.S = 9FA28102DD7C99B5425D00EBE1583B0E14775A7F6F3330241D28B3F965AF8E3A3C31BA05104DD85188AABA055A1361E5
3,472,898 UART: Caliptra RT
3,473,243 UART: [state] CFI Enabled
3,581,324 UART: [rt] RT listening for mailbox commands...
3,581,994 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,466 UART: [rt]cmd =0x44504543, len=92
3,619,710 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,752 ready_for_fw is high
1,362,752 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,651 >>> mbox cmd response: success
2,990,653 UART:
2,990,669 UART: Running Caliptra FMC ...
2,991,077 UART:
2,991,220 UART: [state] CFI Enabled
3,002,011 UART: [fht] FMC Alias Private Key: 7
3,109,706 UART: [art] Extend RT PCRs Done
3,110,134 UART: [art] Lock RT PCRs Done
3,111,738 UART: [art] Populate DV Done
3,119,861 UART: [fht] FMC Alias Private Key: 7
3,120,817 UART: [art] Derive CDI
3,121,097 UART: [art] Store in in slot 0x4
3,206,960 UART: [art] Derive Key Pair
3,207,320 UART: [art] Store priv key in slot 0x5
3,220,210 UART: [art] Derive Key Pair - Done
3,235,262 UART: [art] Signing Cert with AUTHO
3,235,742 UART: RITY.KEYID = 7
3,250,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,303 UART: [art] PUB.X = B08BF1DDBCD10D04EE0C90B14C6BDD02853111AD6AF52C5D48E191CFC81BE50E8A8CE4B34FC41BCCA012D8D13B6F8F7E
3,258,088 UART: [art] PUB.Y = 81E7B4E781EFC526161B75C918BE6A5BCF3868896BD34EB10CE362B398F6020871E48FF363EA49A991D0F13528C81AEB
3,265,035 UART: [art] SIG.R = D9121186591C508571646401B959B84615BBDD52E278D264DB59C49AD5610E3156A9936C004ED7B7FB1988C413151F3B
3,271,767 UART: [art] SIG.S = 40762778EC619BFF4DF5419A09BDB31EBF417339CC42F48E743B20C4743A615AAA9F73CB84C51A128959A98B41C3E842
3,296,141 UART: Caliptra RT
3,296,486 UART: [state] CFI Enabled
3,405,817 UART: [rt] RT listening for mailbox commands...
3,406,487 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,741 UART: [rt]cmd =0x44504543, len=92
3,443,839 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,754 UART: [state] LifecycleState = Unprovisioned
85,409 UART: [state] DebugLocked = No
85,945 UART: [state] WD Timer not started. Device not locked for debugging
87,240 UART: [kat] SHA2-256
892,890 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,015 UART: [kat] ++
897,167 UART: [kat] sha1
901,373 UART: [kat] SHA2-256
903,313 UART: [kat] SHA2-384
906,052 UART: [kat] SHA2-512-ACC
907,953 UART: [kat] ECC-384
917,934 UART: [kat] HMAC-384Kdf
922,618 UART: [kat] LMS
1,170,946 UART: [kat] --
1,171,779 UART: [cold-reset] ++
1,172,129 UART: [fht] FHT @ 0x50003400
1,174,594 UART: [idev] ++
1,174,762 UART: [idev] CDI.KEYID = 6
1,175,122 UART: [idev] SUBJECT.KEYID = 7
1,175,546 UART: [idev] UDS.KEYID = 0
1,175,891 ready_for_fw is high
1,175,891 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,524 UART: [idev] Erasing UDS.KEYID = 0
1,200,461 UART: [idev] Sha1 KeyId Algorithm
1,208,981 UART: [idev] --
1,209,929 UART: [ldev] ++
1,210,097 UART: [ldev] CDI.KEYID = 6
1,210,460 UART: [ldev] SUBJECT.KEYID = 5
1,210,886 UART: [ldev] AUTHORITY.KEYID = 7
1,211,349 UART: [ldev] FE.KEYID = 1
1,216,751 UART: [ldev] Erasing FE.KEYID = 1
1,243,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,571 UART: [ldev] --
1,283,054 UART: [fwproc] Wait for Commands...
1,283,820 UART: [fwproc] Recv command 0x46574c44
1,284,548 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,464 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,768 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,469 >>> mbox cmd response: success
2,774,587 UART: [afmc] ++
2,774,755 UART: [afmc] CDI.KEYID = 6
2,775,117 UART: [afmc] SUBJECT.KEYID = 7
2,775,542 UART: [afmc] AUTHORITY.KEYID = 5
2,811,353 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,872 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,620 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,348 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,233 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,952 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,672 UART: [afmc] --
2,854,758 UART: [cold-reset] --
2,855,690 UART: [state] Locking Datavault
2,856,721 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,325 UART: [state] Locking ICCM
2,857,757 UART: [exit] Launching FMC @ 0x40000130
2,863,086 UART:
2,863,102 UART: Running Caliptra FMC ...
2,863,510 UART:
2,863,564 UART: [state] CFI Enabled
2,873,971 UART: [fht] FMC Alias Private Key: 7
2,981,958 UART: [art] Extend RT PCRs Done
2,982,386 UART: [art] Lock RT PCRs Done
2,983,710 UART: [art] Populate DV Done
2,991,829 UART: [fht] FMC Alias Private Key: 7
2,992,905 UART: [art] Derive CDI
2,993,185 UART: [art] Store in in slot 0x4
3,078,694 UART: [art] Derive Key Pair
3,079,054 UART: [art] Store priv key in slot 0x5
3,091,676 UART: [art] Derive Key Pair - Done
3,106,489 UART: [art] Signing Cert with AUTHO
3,106,969 UART: RITY.KEYID = 7
3,122,211 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,976 UART: [art] PUB.X = EC54385160CF46FF5067DC94DB40B488AC2462BA0F5FB1740D938D6D1A0A5FBBDA64053BE3A976BE78F30BD521A7C5D4
3,129,747 UART: [art] PUB.Y = A6093391D2A09AA2A7E8DD5ECB65B94E5BF952A465B5A001351023C1FD8B059EFD35891631E2BE2F01076732F3F2F161
3,136,686 UART: [art] SIG.R = D43DC9512059BAE5036E787AC2956A52726F4A24E1BA78FB029284AB17FFA05384CFF1EAB68E530A6E05DD67C75F6CAE
3,143,458 UART: [art] SIG.S = 5D312AD5C266DBA26AC77185927701387E19159B17F704858B4E579D4E969CAE383BEF7C2E9C78C1945B446F626749EA
3,167,393 UART: Caliptra RT
3,167,646 UART: [state] CFI Enabled
3,275,293 UART: [rt] RT listening for mailbox commands...
3,275,963 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,145 UART: [rt]cmd =0x44504543, len=92
3,313,623 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,333 ready_for_fw is high
1,060,333 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,210 >>> mbox cmd response: success
2,687,212 UART:
2,687,228 UART: Running Caliptra FMC ...
2,687,636 UART:
2,687,690 UART: [state] CFI Enabled
2,698,077 UART: [fht] FMC Alias Private Key: 7
2,805,828 UART: [art] Extend RT PCRs Done
2,806,256 UART: [art] Lock RT PCRs Done
2,807,536 UART: [art] Populate DV Done
2,815,629 UART: [fht] FMC Alias Private Key: 7
2,816,565 UART: [art] Derive CDI
2,816,845 UART: [art] Store in in slot 0x4
2,902,664 UART: [art] Derive Key Pair
2,903,024 UART: [art] Store priv key in slot 0x5
2,916,434 UART: [art] Derive Key Pair - Done
2,930,715 UART: [art] Signing Cert with AUTHO
2,931,195 UART: RITY.KEYID = 7
2,946,661 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,426 UART: [art] PUB.X = 842419A12BCE2FFCB4B15902E8789CDD95171181E5852875978001883FA6C8CFC677D079D236AA2A11AE3DF95C8922EF
2,954,192 UART: [art] PUB.Y = C6B587AC34EE7455BD1E3ACAC8EC3E866DF76AA05FBAD47F57BC5A56B811E433847816D5793B7890DB72463FD861DF1B
2,961,158 UART: [art] SIG.R = 49B8FC953ACA2403BB9DF920C7DC0E6EB3E3BF93E8536D5CDB77EFE290A2A04E41D048DE8EF1B8F0F64CC6136C5C0301
2,967,938 UART: [art] SIG.S = 2DDAF31AD0B5B3271109040AD6CE528C135EBC1B3AF13FB60638F1EC17658D112E517B7ADE6BE85F30B06A51EECBC8FC
2,992,147 UART: Caliptra RT
2,992,400 UART: [state] CFI Enabled
3,099,833 UART: [rt] RT listening for mailbox commands...
3,100,503 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,729 UART: [rt]cmd =0x44504543, len=92
3,138,193 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,097 UART: [state] LifecycleState = Unprovisioned
85,752 UART: [state] DebugLocked = No
86,364 UART: [state] WD Timer not started. Device not locked for debugging
87,633 UART: [kat] SHA2-256
893,283 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,408 UART: [kat] ++
897,560 UART: [kat] sha1
901,756 UART: [kat] SHA2-256
903,696 UART: [kat] SHA2-384
906,445 UART: [kat] SHA2-512-ACC
908,346 UART: [kat] ECC-384
918,027 UART: [kat] HMAC-384Kdf
922,623 UART: [kat] LMS
1,170,951 UART: [kat] --
1,171,790 UART: [cold-reset] ++
1,172,364 UART: [fht] FHT @ 0x50003400
1,175,197 UART: [idev] ++
1,175,365 UART: [idev] CDI.KEYID = 6
1,175,725 UART: [idev] SUBJECT.KEYID = 7
1,176,149 UART: [idev] UDS.KEYID = 0
1,176,494 ready_for_fw is high
1,176,494 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,647 UART: [idev] Erasing UDS.KEYID = 0
1,200,434 UART: [idev] Sha1 KeyId Algorithm
1,208,870 UART: [idev] --
1,210,090 UART: [ldev] ++
1,210,258 UART: [ldev] CDI.KEYID = 6
1,210,621 UART: [ldev] SUBJECT.KEYID = 5
1,211,047 UART: [ldev] AUTHORITY.KEYID = 7
1,211,510 UART: [ldev] FE.KEYID = 1
1,216,706 UART: [ldev] Erasing FE.KEYID = 1
1,243,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,566 UART: [ldev] --
1,282,937 UART: [fwproc] Wait for Commands...
1,283,561 UART: [fwproc] Recv command 0x46574c44
1,284,289 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,553 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,857 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,566 >>> mbox cmd response: success
2,774,602 UART: [afmc] ++
2,774,770 UART: [afmc] CDI.KEYID = 6
2,775,132 UART: [afmc] SUBJECT.KEYID = 7
2,775,557 UART: [afmc] AUTHORITY.KEYID = 5
2,811,494 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,985 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,713 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,598 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,317 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,113 UART: [afmc] --
2,855,221 UART: [cold-reset] --
2,856,093 UART: [state] Locking Datavault
2,857,084 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,688 UART: [state] Locking ICCM
2,858,294 UART: [exit] Launching FMC @ 0x40000130
2,863,623 UART:
2,863,639 UART: Running Caliptra FMC ...
2,864,047 UART:
2,864,190 UART: [state] CFI Enabled
2,874,797 UART: [fht] FMC Alias Private Key: 7
2,983,096 UART: [art] Extend RT PCRs Done
2,983,524 UART: [art] Lock RT PCRs Done
2,984,928 UART: [art] Populate DV Done
2,992,943 UART: [fht] FMC Alias Private Key: 7
2,994,027 UART: [art] Derive CDI
2,994,307 UART: [art] Store in in slot 0x4
3,079,946 UART: [art] Derive Key Pair
3,080,306 UART: [art] Store priv key in slot 0x5
3,093,358 UART: [art] Derive Key Pair - Done
3,108,029 UART: [art] Signing Cert with AUTHO
3,108,509 UART: RITY.KEYID = 7
3,123,113 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,878 UART: [art] PUB.X = 01737B11E2A50B3668CA2D453A2A94C893CDBF2D4451454AF3871D87B20F975F5DF06010F8F442DA961AA0257B92C324
3,130,639 UART: [art] PUB.Y = 86B46837B0E09E0415D6556A4BE9173B176396DD1E8384B15F96AA1D622CA40E7B0E27D2E8A1EEF30DF6FC8D393A19B6
3,137,585 UART: [art] SIG.R = 11AF8AE7D4EE58D82154F06025ACE7DB224B78A8821B4EA289D8544A0FD57001F7B19F5F41810280EC144B111F4A23F9
3,144,350 UART: [art] SIG.S = 1070E5B7DD0E0CE6D508DD86FF3A9C5977634F077389AD947390ED15F2A5E18668062800D7848DC5F3A4B7544E329DC5
3,168,168 UART: Caliptra RT
3,168,513 UART: [state] CFI Enabled
3,275,704 UART: [rt] RT listening for mailbox commands...
3,276,374 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,588 UART: [rt]cmd =0x44504543, len=92
3,313,624 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,432 ready_for_fw is high
1,060,432 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,623 >>> mbox cmd response: success
2,686,945 UART:
2,686,961 UART: Running Caliptra FMC ...
2,687,369 UART:
2,687,512 UART: [state] CFI Enabled
2,698,107 UART: [fht] FMC Alias Private Key: 7
2,806,152 UART: [art] Extend RT PCRs Done
2,806,580 UART: [art] Lock RT PCRs Done
2,808,148 UART: [art] Populate DV Done
2,816,303 UART: [fht] FMC Alias Private Key: 7
2,817,399 UART: [art] Derive CDI
2,817,679 UART: [art] Store in in slot 0x4
2,903,322 UART: [art] Derive Key Pair
2,903,682 UART: [art] Store priv key in slot 0x5
2,917,042 UART: [art] Derive Key Pair - Done
2,931,958 UART: [art] Signing Cert with AUTHO
2,932,438 UART: RITY.KEYID = 7
2,948,182 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,947 UART: [art] PUB.X = FECFC72BDA669BCFE68A10CE4F636733BCDAB8023DC985B04FCC793D3A03A82E1714EE0A3BF293AC9D8ACD41C39AA43A
2,955,738 UART: [art] PUB.Y = B6DCBBE10D5569137AB2F68EC9832E077B679F9196CA3514E0DDEA1A3C72073AD7721CA290EB85067CEE4E77834D8A92
2,962,686 UART: [art] SIG.R = 419A0764B5213E75F64FCD87273C06E65B3F100FBFB97D3F5D2C35F2BC90107796E41DF16D0BBB3A916E042984D54D21
2,969,445 UART: [art] SIG.S = 21106ACFE1BFD2005EEBBD50E64BF692B1C7C5F3C463B1FBB45694A01FBA4CD4B48961C50E98C3441DF85E18288C8C21
2,993,065 UART: Caliptra RT
2,993,410 UART: [state] CFI Enabled
3,100,537 UART: [rt] RT listening for mailbox commands...
3,101,207 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,977 UART: [rt]cmd =0x44504543, len=92
3,139,221 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,634 UART: [state] LifecycleState = Unprovisioned
85,289 UART: [state] DebugLocked = No
85,865 UART: [state] WD Timer not started. Device not locked for debugging
87,016 UART: [kat] SHA2-256
890,566 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,695 UART: [kat] ++
894,847 UART: [kat] sha1
899,107 UART: [kat] SHA2-256
901,047 UART: [kat] SHA2-384
903,742 UART: [kat] SHA2-512-ACC
905,643 UART: [kat] ECC-384
914,878 UART: [kat] HMAC-384Kdf
919,496 UART: [kat] LMS
1,167,808 UART: [kat] --
1,168,755 UART: [cold-reset] ++
1,169,279 UART: [fht] FHT @ 0x50003400
1,171,785 UART: [idev] ++
1,171,953 UART: [idev] CDI.KEYID = 6
1,172,314 UART: [idev] SUBJECT.KEYID = 7
1,172,739 UART: [idev] UDS.KEYID = 0
1,173,085 ready_for_fw is high
1,173,085 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,927 UART: [idev] Erasing UDS.KEYID = 0
1,198,063 UART: [idev] Sha1 KeyId Algorithm
1,206,863 UART: [idev] --
1,207,978 UART: [ldev] ++
1,208,146 UART: [ldev] CDI.KEYID = 6
1,208,510 UART: [ldev] SUBJECT.KEYID = 5
1,208,937 UART: [ldev] AUTHORITY.KEYID = 7
1,209,400 UART: [ldev] FE.KEYID = 1
1,214,596 UART: [ldev] Erasing FE.KEYID = 1
1,241,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,400 UART: [ldev] --
1,280,708 UART: [fwproc] Wait for Commands...
1,281,497 UART: [fwproc] Recv command 0x46574c44
1,282,230 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,098 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,407 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,327 >>> mbox cmd response: success
2,775,404 UART: [afmc] ++
2,775,572 UART: [afmc] CDI.KEYID = 6
2,775,935 UART: [afmc] SUBJECT.KEYID = 7
2,776,361 UART: [afmc] AUTHORITY.KEYID = 5
2,811,482 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,822 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,573 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,302 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,185 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,904 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,867 UART: [afmc] --
2,854,841 UART: [cold-reset] --
2,855,363 UART: [state] Locking Datavault
2,856,480 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,084 UART: [state] Locking ICCM
2,857,522 UART: [exit] Launching FMC @ 0x40000130
2,862,851 UART:
2,862,867 UART: Running Caliptra FMC ...
2,863,275 UART:
2,863,329 UART: [state] CFI Enabled
2,873,858 UART: [fht] FMC Alias Private Key: 7
2,981,283 UART: [art] Extend RT PCRs Done
2,981,711 UART: [art] Lock RT PCRs Done
2,983,307 UART: [art] Populate DV Done
2,991,432 UART: [fht] FMC Alias Private Key: 7
2,992,448 UART: [art] Derive CDI
2,992,728 UART: [art] Store in in slot 0x4
3,078,267 UART: [art] Derive Key Pair
3,078,627 UART: [art] Store priv key in slot 0x5
3,091,797 UART: [art] Derive Key Pair - Done
3,106,661 UART: [art] Signing Cert with AUTHO
3,107,141 UART: RITY.KEYID = 7
3,122,203 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,968 UART: [art] PUB.X = 5C680293EF609E3B653E014A0888B8BEBBFE5B0D4EF0AAAF83DC366C52ADC08117FB8D2FCDB9A23548054D46E991C9CA
3,129,743 UART: [art] PUB.Y = 75E3B9E47B3F9F027AB1F2198F7F4A3FC03E63F4D1662FDBB059270BE4224922E24B9661633820ADDB5DB176C20BFAA7
3,136,694 UART: [art] SIG.R = 539AA872073C10722D8A2163DF4AADB7BB33CD3C3AF4134122FEF2D20DB4D43A243CF27A138A2C970F854AD464B08232
3,143,463 UART: [art] SIG.S = F95D622C78D2B8FCCFBADBB4070840BB834788CCF11D9302D97718C5E298FEE2826AA188A54D54DC2D8AE9F9C8EB4499
3,167,567 UART: Caliptra RT
3,167,820 UART: [state] CFI Enabled
3,275,299 UART: [rt] RT listening for mailbox commands...
3,275,969 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,585 UART: [rt]cmd =0x44504543, len=92
3,313,773 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,296 ready_for_fw is high
1,056,296 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,667 >>> mbox cmd response: success
2,683,281 UART:
2,683,297 UART: Running Caliptra FMC ...
2,683,705 UART:
2,683,759 UART: [state] CFI Enabled
2,694,054 UART: [fht] FMC Alias Private Key: 7
2,802,161 UART: [art] Extend RT PCRs Done
2,802,589 UART: [art] Lock RT PCRs Done
2,803,903 UART: [art] Populate DV Done
2,812,316 UART: [fht] FMC Alias Private Key: 7
2,813,402 UART: [art] Derive CDI
2,813,682 UART: [art] Store in in slot 0x4
2,899,681 UART: [art] Derive Key Pair
2,900,041 UART: [art] Store priv key in slot 0x5
2,913,031 UART: [art] Derive Key Pair - Done
2,927,734 UART: [art] Signing Cert with AUTHO
2,928,214 UART: RITY.KEYID = 7
2,943,472 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,237 UART: [art] PUB.X = 0C612872BB44C4D0BAF636ED9B138EB8A59A09FD59852FFF9C6AF47365B52183B0DFABFDC1A890A83893D900420CFDC5
2,950,992 UART: [art] PUB.Y = 4F390FE1AB045D9C3EB440E121D06F277E2046C976756D32C47665FE67867258B4BE477B9BA47566DCF93478BDA8DE58
2,957,938 UART: [art] SIG.R = A4D2667717162B114C46FC8B347AC229CD677A8492B961D6571CB6E207A8578F52BE4A07B0AC99AF793DE8991E52A4ED
2,964,706 UART: [art] SIG.S = BC74347739E42BE00FE053E1D352EE16308988FF51FAA04DD2156C220B0FBD4998FAC4C7CC6C82BDB5E2651B3C069D45
2,988,685 UART: Caliptra RT
2,988,938 UART: [state] CFI Enabled
3,096,608 UART: [rt] RT listening for mailbox commands...
3,097,278 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,722 UART: [rt]cmd =0x44504543, len=92
3,134,906 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,027 UART: [state] LifecycleState = Unprovisioned
85,682 UART: [state] DebugLocked = No
86,304 UART: [state] WD Timer not started. Device not locked for debugging
87,535 UART: [kat] SHA2-256
891,085 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,214 UART: [kat] ++
895,366 UART: [kat] sha1
899,814 UART: [kat] SHA2-256
901,754 UART: [kat] SHA2-384
904,347 UART: [kat] SHA2-512-ACC
906,248 UART: [kat] ECC-384
916,291 UART: [kat] HMAC-384Kdf
921,051 UART: [kat] LMS
1,169,363 UART: [kat] --
1,170,426 UART: [cold-reset] ++
1,170,842 UART: [fht] FHT @ 0x50003400
1,173,472 UART: [idev] ++
1,173,640 UART: [idev] CDI.KEYID = 6
1,174,001 UART: [idev] SUBJECT.KEYID = 7
1,174,426 UART: [idev] UDS.KEYID = 0
1,174,772 ready_for_fw is high
1,174,772 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,230 UART: [idev] Erasing UDS.KEYID = 0
1,199,514 UART: [idev] Sha1 KeyId Algorithm
1,208,438 UART: [idev] --
1,209,643 UART: [ldev] ++
1,209,811 UART: [ldev] CDI.KEYID = 6
1,210,175 UART: [ldev] SUBJECT.KEYID = 5
1,210,602 UART: [ldev] AUTHORITY.KEYID = 7
1,211,065 UART: [ldev] FE.KEYID = 1
1,216,343 UART: [ldev] Erasing FE.KEYID = 1
1,242,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,529 UART: [ldev] --
1,281,979 UART: [fwproc] Wait for Commands...
1,282,748 UART: [fwproc] Recv command 0x46574c44
1,283,481 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,207 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,302 >>> mbox cmd response: success
2,773,501 UART: [afmc] ++
2,773,669 UART: [afmc] CDI.KEYID = 6
2,774,032 UART: [afmc] SUBJECT.KEYID = 7
2,774,458 UART: [afmc] AUTHORITY.KEYID = 5
2,809,871 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,271 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,022 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,751 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,634 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,353 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,176 UART: [afmc] --
2,853,224 UART: [cold-reset] --
2,854,234 UART: [state] Locking Datavault
2,855,587 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,191 UART: [state] Locking ICCM
2,856,839 UART: [exit] Launching FMC @ 0x40000130
2,862,168 UART:
2,862,184 UART: Running Caliptra FMC ...
2,862,592 UART:
2,862,735 UART: [state] CFI Enabled
2,873,346 UART: [fht] FMC Alias Private Key: 7
2,981,443 UART: [art] Extend RT PCRs Done
2,981,871 UART: [art] Lock RT PCRs Done
2,983,483 UART: [art] Populate DV Done
2,991,878 UART: [fht] FMC Alias Private Key: 7
2,992,822 UART: [art] Derive CDI
2,993,102 UART: [art] Store in in slot 0x4
3,078,697 UART: [art] Derive Key Pair
3,079,057 UART: [art] Store priv key in slot 0x5
3,092,255 UART: [art] Derive Key Pair - Done
3,106,842 UART: [art] Signing Cert with AUTHO
3,107,322 UART: RITY.KEYID = 7
3,122,318 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,083 UART: [art] PUB.X = 7E026C3D0246F149CD72C59F89E52F49418147F4111110D5E9624E6A7EC86A355895664936E800A06C1685E2112B0F08
3,129,805 UART: [art] PUB.Y = 568C658883EB5DCECD450E005B0AC312501F405CEC8F427E983C0DDD555730B1DC05E4A91FDEF9B76B1DDA39EB3E7194
3,136,737 UART: [art] SIG.R = 19C93C370944F650759ECF2250ABA3B974A549AF8C832DAD8886BBB50B329FD98077DFBD3AA172B36D69A168929D7E54
3,143,507 UART: [art] SIG.S = D5CE4E1D667F60110F60F3630B67DA32C15D36740D3C6645BD0F5BB6462664BA6920A95027B529B46C21376284544521
3,167,160 UART: Caliptra RT
3,167,505 UART: [state] CFI Enabled
3,274,876 UART: [rt] RT listening for mailbox commands...
3,275,546 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,948 UART: [rt]cmd =0x44504543, len=92
3,313,098 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,545 ready_for_fw is high
1,056,545 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,872 >>> mbox cmd response: success
2,686,012 UART:
2,686,028 UART: Running Caliptra FMC ...
2,686,436 UART:
2,686,579 UART: [state] CFI Enabled
2,696,968 UART: [fht] FMC Alias Private Key: 7
2,805,037 UART: [art] Extend RT PCRs Done
2,805,465 UART: [art] Lock RT PCRs Done
2,806,723 UART: [art] Populate DV Done
2,814,802 UART: [fht] FMC Alias Private Key: 7
2,815,976 UART: [art] Derive CDI
2,816,256 UART: [art] Store in in slot 0x4
2,902,201 UART: [art] Derive Key Pair
2,902,561 UART: [art] Store priv key in slot 0x5
2,916,197 UART: [art] Derive Key Pair - Done
2,931,114 UART: [art] Signing Cert with AUTHO
2,931,594 UART: RITY.KEYID = 7
2,946,778 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,543 UART: [art] PUB.X = 633A7BF70CE7EA39C313EB5B9E1EFF0928D104545D56B95A85E48AFDD3D7C7C3DAA25CFC4F9BE4A2E163AB9EE3198210
2,954,326 UART: [art] PUB.Y = 41A94DFB639B3D3D6528433D76B69E0AA3F01A7CD35AFB66DE45895A911D463251F2FA2B3291FA203760B2E51FC3F540
2,961,279 UART: [art] SIG.R = 2D22F9896DC43D3EB273420E57BB62808697D68200828BA604457F2827F5FF557307076E7C59AC558C5026D36C5CF728
2,968,005 UART: [art] SIG.S = EF8FED27D147C8025AA569F990178C9CD45229F3FFD08260BC132FC87EAEE295E1D6340CBF9376F37DE157B5D215309A
2,991,988 UART: Caliptra RT
2,992,333 UART: [state] CFI Enabled
3,100,162 UART: [rt] RT listening for mailbox commands...
3,100,832 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,438 UART: [rt]cmd =0x44504543, len=92
3,138,510 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,495 UART: [state] DebugLocked = No
86,089 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,705 UART: [kat] SHA2-256
881,636 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,751 UART: [kat] ++
885,903 UART: [kat] sha1
890,103 UART: [kat] SHA2-256
892,041 UART: [kat] SHA2-384
894,804 UART: [kat] SHA2-512-ACC
896,705 UART: [kat] ECC-384
902,142 UART: [kat] HMAC-384Kdf
906,688 UART: [kat] LMS
1,474,884 UART: [kat] --
1,475,649 UART: [cold-reset] ++
1,476,059 UART: [fht] Storing FHT @ 0x50003400
1,478,918 UART: [idev] ++
1,479,086 UART: [idev] CDI.KEYID = 6
1,479,446 UART: [idev] SUBJECT.KEYID = 7
1,479,870 UART: [idev] UDS.KEYID = 0
1,480,215 ready_for_fw is high
1,480,215 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,930 UART: [idev] Erasing UDS.KEYID = 0
1,504,840 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,542 UART: [idev] --
1,514,497 UART: [ldev] ++
1,514,665 UART: [ldev] CDI.KEYID = 6
1,515,028 UART: [ldev] SUBJECT.KEYID = 5
1,515,454 UART: [ldev] AUTHORITY.KEYID = 7
1,515,917 UART: [ldev] FE.KEYID = 1
1,521,309 UART: [ldev] Erasing FE.KEYID = 1
1,546,972 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,574 UART: [ldev] --
1,585,997 UART: [fwproc] Waiting for Commands...
1,586,780 UART: [fwproc] Received command 0x46574c44
1,587,571 UART: [fwproc] Received Image of size 114332 bytes
2,886,627 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,695 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,047 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,888 >>> mbox cmd response: success
3,080,008 UART: [afmc] ++
3,080,176 UART: [afmc] CDI.KEYID = 6
3,080,538 UART: [afmc] SUBJECT.KEYID = 7
3,080,963 UART: [afmc] AUTHORITY.KEYID = 5
3,115,920 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,058 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,838 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,566 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,451 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,141 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,888 UART: [afmc] --
3,158,946 UART: [cold-reset] --
3,159,932 UART: [state] Locking Datavault
3,161,107 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,711 UART: [state] Locking ICCM
3,162,265 UART: [exit] Launching FMC @ 0x40000130
3,167,594 UART:
3,167,610 UART: Running Caliptra FMC ...
3,168,018 UART:
3,168,072 UART: [state] CFI Enabled
3,178,629 UART: [fht] FMC Alias Private Key: 7
3,286,388 UART: [art] Extend RT PCRs Done
3,286,816 UART: [art] Lock RT PCRs Done
3,288,258 UART: [art] Populate DV Done
3,296,571 UART: [fht] FMC Alias Private Key: 7
3,297,571 UART: [art] Derive CDI
3,297,851 UART: [art] Store in in slot 0x4
3,383,182 UART: [art] Derive Key Pair
3,383,542 UART: [art] Store priv key in slot 0x5
3,396,702 UART: [art] Derive Key Pair - Done
3,411,514 UART: [art] Signing Cert with AUTHO
3,411,994 UART: RITY.KEYID = 7
3,427,400 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,165 UART: [art] PUB.X = 167BDDCD9B21A5A5A466D93EFFDAAF2EBAB87D5E9F2FCD8F8F38A4BAB59750C22D20AD87503C31D876667E279A7718CE
3,434,959 UART: [art] PUB.Y = 39DC872D91AC73B419B8FD44F9FE32528FB1BE3C620695B1A15C3C40B5BBA82491B7273E648612C42DE60D8FE4DA5693
3,441,911 UART: [art] SIG.R = 0948E9F2E68B89EF91AFF6779E29AE1CC97A003B2A1A738E1ADCB7EB2B2B8571FE65DDC297A9CD2B5F17A7069E34821C
3,448,671 UART: [art] SIG.S = 0EE9617FCC0CF884B5EB977EE637630241C2D9F4BEC2ED4E5DBEEE6D5892041353E448FA49836770E18E624B34540585
3,472,411 UART: Caliptra RT
3,472,664 UART: [state] CFI Enabled
3,581,478 UART: [rt] RT listening for mailbox commands...
3,582,148 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,216 UART: [rt]cmd =0x44504543, len=96
3,644,477 >>> mbox cmd response data (56 bytes)
3,644,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,674,513 UART: [rt]cmd =0x44504543, len=96
3,706,941 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,007 ready_for_fw is high
1,362,007 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,082 >>> mbox cmd response: success
2,987,054 UART:
2,987,070 UART: Running Caliptra FMC ...
2,987,478 UART:
2,987,532 UART: [state] CFI Enabled
2,997,805 UART: [fht] FMC Alias Private Key: 7
3,106,520 UART: [art] Extend RT PCRs Done
3,106,948 UART: [art] Lock RT PCRs Done
3,108,094 UART: [art] Populate DV Done
3,116,587 UART: [fht] FMC Alias Private Key: 7
3,117,657 UART: [art] Derive CDI
3,117,937 UART: [art] Store in in slot 0x4
3,203,522 UART: [art] Derive Key Pair
3,203,882 UART: [art] Store priv key in slot 0x5
3,217,188 UART: [art] Derive Key Pair - Done
3,231,881 UART: [art] Signing Cert with AUTHO
3,232,361 UART: RITY.KEYID = 7
3,247,729 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,494 UART: [art] PUB.X = 7D760B9D64B203BADD3AD40FDAA52AB03DF7389EF6C7E5FB6EFC9AE98FCCA454169A3B62072F81796973B77BB5EC72B2
3,255,274 UART: [art] PUB.Y = B148D29E6ECF313896ADCF327B5EE56A02DB3B6DFDC256C8D8A806D7939567CED4DB94121D9D257817F869DBDD3AB670
3,262,234 UART: [art] SIG.R = 36CDC018791BB74A18C827FA4E52CA4D083F0A50C993AE313E6DDAAE7F4260F8783F262F090B7F65DA3C47D2CC016B1F
3,269,003 UART: [art] SIG.S = 823094DC1865BD8B2DD4F1D58B1F0A0C1DBF30DBAB8C5E0C33CAF426CCCDC121E0A2767A8BE0DB7B973A844DAB8AAEFC
3,293,437 UART: Caliptra RT
3,293,690 UART: [state] CFI Enabled
3,402,085 UART: [rt] RT listening for mailbox commands...
3,402,755 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,325 UART: [rt]cmd =0x44504543, len=96
3,466,082 >>> mbox cmd response data (56 bytes)
3,466,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,496,008 UART: [rt]cmd =0x44504543, len=96
3,528,848 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,516 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,210 UART: [kat] SHA2-256
882,141 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,256 UART: [kat] ++
886,408 UART: [kat] sha1
890,824 UART: [kat] SHA2-256
892,762 UART: [kat] SHA2-384
895,549 UART: [kat] SHA2-512-ACC
897,450 UART: [kat] ECC-384
902,841 UART: [kat] HMAC-384Kdf
907,475 UART: [kat] LMS
1,475,671 UART: [kat] --
1,476,370 UART: [cold-reset] ++
1,476,912 UART: [fht] Storing FHT @ 0x50003400
1,479,827 UART: [idev] ++
1,479,995 UART: [idev] CDI.KEYID = 6
1,480,355 UART: [idev] SUBJECT.KEYID = 7
1,480,779 UART: [idev] UDS.KEYID = 0
1,481,124 ready_for_fw is high
1,481,124 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,951 UART: [idev] Erasing UDS.KEYID = 0
1,505,421 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,133 UART: [idev] --
1,515,038 UART: [ldev] ++
1,515,206 UART: [ldev] CDI.KEYID = 6
1,515,569 UART: [ldev] SUBJECT.KEYID = 5
1,515,995 UART: [ldev] AUTHORITY.KEYID = 7
1,516,458 UART: [ldev] FE.KEYID = 1
1,521,614 UART: [ldev] Erasing FE.KEYID = 1
1,546,881 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,857 UART: [ldev] --
1,586,258 UART: [fwproc] Waiting for Commands...
1,587,067 UART: [fwproc] Received command 0x46574c44
1,587,858 UART: [fwproc] Received Image of size 114332 bytes
2,885,067 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,977 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,329 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,076 >>> mbox cmd response: success
3,079,180 UART: [afmc] ++
3,079,348 UART: [afmc] CDI.KEYID = 6
3,079,710 UART: [afmc] SUBJECT.KEYID = 7
3,080,135 UART: [afmc] AUTHORITY.KEYID = 5
3,115,680 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,186 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,966 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,694 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,579 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,269 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,226 UART: [afmc] --
3,159,134 UART: [cold-reset] --
3,160,130 UART: [state] Locking Datavault
3,161,305 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,909 UART: [state] Locking ICCM
3,162,551 UART: [exit] Launching FMC @ 0x40000130
3,167,880 UART:
3,167,896 UART: Running Caliptra FMC ...
3,168,304 UART:
3,168,447 UART: [state] CFI Enabled
3,178,680 UART: [fht] FMC Alias Private Key: 7
3,286,397 UART: [art] Extend RT PCRs Done
3,286,825 UART: [art] Lock RT PCRs Done
3,288,595 UART: [art] Populate DV Done
3,296,988 UART: [fht] FMC Alias Private Key: 7
3,298,086 UART: [art] Derive CDI
3,298,366 UART: [art] Store in in slot 0x4
3,383,823 UART: [art] Derive Key Pair
3,384,183 UART: [art] Store priv key in slot 0x5
3,397,769 UART: [art] Derive Key Pair - Done
3,412,337 UART: [art] Signing Cert with AUTHO
3,412,817 UART: RITY.KEYID = 7
3,428,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,824 UART: [art] PUB.X = 1A39084A20D9227B545F0E6A4A60A3701E78CBC195B5B69DAFA77FEC2D623429C3A85973AD7BE68EB2685282CA2D4E45
3,435,596 UART: [art] PUB.Y = 40FA069F45C5A22F0FFBE67B2C96B434849F729B29D4F2603820053E1CECD6D700D1B9FE0C05AB3565FBB3662FCFDECE
3,442,527 UART: [art] SIG.R = ECCB1873A2EDC560E54B15FDDF7F166CC6F81004A40273474E1501B42EF07FC13929F22AB67E14D05369DBFC0530D430
3,449,293 UART: [art] SIG.S = 025539FBC3C14A8FB392770BD2B499130F9415FAC703CA43E03F02E89BEB6A24B72AA2BF6924F9B688E5B801CAC138E1
3,473,304 UART: Caliptra RT
3,473,649 UART: [state] CFI Enabled
3,582,600 UART: [rt] RT listening for mailbox commands...
3,583,270 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,804 UART: [rt]cmd =0x44504543, len=96
3,645,925 >>> mbox cmd response data (56 bytes)
3,645,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,676,153 UART: [rt]cmd =0x44504543, len=96
3,708,445 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,662 ready_for_fw is high
1,362,662 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,569 >>> mbox cmd response: success
2,988,629 UART:
2,988,645 UART: Running Caliptra FMC ...
2,989,053 UART:
2,989,196 UART: [state] CFI Enabled
3,000,091 UART: [fht] FMC Alias Private Key: 7
3,107,678 UART: [art] Extend RT PCRs Done
3,108,106 UART: [art] Lock RT PCRs Done
3,109,770 UART: [art] Populate DV Done
3,117,885 UART: [fht] FMC Alias Private Key: 7
3,119,005 UART: [art] Derive CDI
3,119,285 UART: [art] Store in in slot 0x4
3,205,056 UART: [art] Derive Key Pair
3,205,416 UART: [art] Store priv key in slot 0x5
3,218,656 UART: [art] Derive Key Pair - Done
3,233,574 UART: [art] Signing Cert with AUTHO
3,234,054 UART: RITY.KEYID = 7
3,249,478 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,243 UART: [art] PUB.X = 7B932E6A509315FF9B82F0D9D391F32F4A988EC805C0A8FF923C15AACCA27C6B10F7142A3B0805B612E49FDE0CF1AEF2
3,257,017 UART: [art] PUB.Y = CE399109960F471EEFF6670E66988B5621861C8BE1C36C8912AA5ECBE6216E275F5D80E448A55B379E32BE67B3AAFF86
3,263,964 UART: [art] SIG.R = 42D94A7549A188E3247FE717CB73C5AD9FDB6405A0308B53ADF89EB99AF31A5C5913D1B336515F0B1BB5EF51645D8B00
3,270,714 UART: [art] SIG.S = 4DF4877C239B4D5744DF1750881A42959E60EC1C9B3F605264284F00C2E6A5EFCF044AF3BFE7D2386D81D2E5ADD3C7A1
3,294,816 UART: Caliptra RT
3,295,161 UART: [state] CFI Enabled
3,403,017 UART: [rt] RT listening for mailbox commands...
3,403,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,811 UART: [rt]cmd =0x44504543, len=96
3,466,706 >>> mbox cmd response data (56 bytes)
3,466,707 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,496,952 UART: [rt]cmd =0x44504543, len=96
3,529,124 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Unprovisioned
86,143 UART: [state] DebugLocked = No
86,875 UART: [state] WD Timer not started. Device not locked for debugging
88,096 UART: [kat] SHA2-256
893,746 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,871 UART: [kat] ++
898,023 UART: [kat] sha1
902,301 UART: [kat] SHA2-256
904,241 UART: [kat] SHA2-384
906,980 UART: [kat] SHA2-512-ACC
908,881 UART: [kat] ECC-384
918,544 UART: [kat] HMAC-384Kdf
923,246 UART: [kat] LMS
1,171,574 UART: [kat] --
1,172,407 UART: [cold-reset] ++
1,172,945 UART: [fht] FHT @ 0x50003400
1,175,776 UART: [idev] ++
1,175,944 UART: [idev] CDI.KEYID = 6
1,176,304 UART: [idev] SUBJECT.KEYID = 7
1,176,728 UART: [idev] UDS.KEYID = 0
1,177,073 ready_for_fw is high
1,177,073 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,560 UART: [idev] Erasing UDS.KEYID = 0
1,202,171 UART: [idev] Sha1 KeyId Algorithm
1,210,765 UART: [idev] --
1,211,801 UART: [ldev] ++
1,211,969 UART: [ldev] CDI.KEYID = 6
1,212,332 UART: [ldev] SUBJECT.KEYID = 5
1,212,758 UART: [ldev] AUTHORITY.KEYID = 7
1,213,221 UART: [ldev] FE.KEYID = 1
1,218,307 UART: [ldev] Erasing FE.KEYID = 1
1,244,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,511 UART: [ldev] --
1,283,906 UART: [fwproc] Wait for Commands...
1,284,638 UART: [fwproc] Recv command 0x46574c44
1,285,366 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,277 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,828 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,132 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,915 >>> mbox cmd response: success
2,776,953 UART: [afmc] ++
2,777,121 UART: [afmc] CDI.KEYID = 6
2,777,483 UART: [afmc] SUBJECT.KEYID = 7
2,777,908 UART: [afmc] AUTHORITY.KEYID = 5
2,813,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,908 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,656 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,384 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,269 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,988 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,696 UART: [afmc] --
2,856,794 UART: [cold-reset] --
2,857,634 UART: [state] Locking Datavault
2,858,889 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,493 UART: [state] Locking ICCM
2,859,933 UART: [exit] Launching FMC @ 0x40000130
2,865,262 UART:
2,865,278 UART: Running Caliptra FMC ...
2,865,686 UART:
2,865,740 UART: [state] CFI Enabled
2,876,671 UART: [fht] FMC Alias Private Key: 7
2,984,734 UART: [art] Extend RT PCRs Done
2,985,162 UART: [art] Lock RT PCRs Done
2,986,632 UART: [art] Populate DV Done
2,994,741 UART: [fht] FMC Alias Private Key: 7
2,995,799 UART: [art] Derive CDI
2,996,079 UART: [art] Store in in slot 0x4
3,081,832 UART: [art] Derive Key Pair
3,082,192 UART: [art] Store priv key in slot 0x5
3,095,084 UART: [art] Derive Key Pair - Done
3,109,453 UART: [art] Signing Cert with AUTHO
3,109,933 UART: RITY.KEYID = 7
3,125,565 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,330 UART: [art] PUB.X = FF1A57138944ECF1CB268789DD9A18D9DE47647FE93094541188DB8FC2BCE20C9D834D0B2F90F4DB53F489D06C68BF03
3,133,101 UART: [art] PUB.Y = 8C18B4B52F7E27AAFF61A98AEC6C1B0772C01A2BD7B481B85C521D165F0E83B11D593EBD119B578FE7EC76E91C215A6B
3,140,061 UART: [art] SIG.R = 9F1370676683E206D364DFF13729A77B40EA3FAF6454BDB3E986F8154900F8126A065427E3F1990E367B103DA911DDF2
3,146,796 UART: [art] SIG.S = A41CC38A9CF97681471718D5B27B9D63EB2DB0F473965B68AF4370DDA9139F46E8B6D01DFB994885961FFC8FBC379F62
3,171,159 UART: Caliptra RT
3,171,412 UART: [state] CFI Enabled
3,278,658 UART: [rt] RT listening for mailbox commands...
3,279,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,850 UART: [rt]cmd =0x44504543, len=96
3,342,519 >>> mbox cmd response data (56 bytes)
3,342,520 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,333 UART: [rt]cmd =0x44504543, len=96
3,405,059 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,355 ready_for_fw is high
1,060,355 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,118 >>> mbox cmd response: success
2,689,104 UART:
2,689,120 UART: Running Caliptra FMC ...
2,689,528 UART:
2,689,582 UART: [state] CFI Enabled
2,699,887 UART: [fht] FMC Alias Private Key: 7
2,807,774 UART: [art] Extend RT PCRs Done
2,808,202 UART: [art] Lock RT PCRs Done
2,809,752 UART: [art] Populate DV Done
2,817,733 UART: [fht] FMC Alias Private Key: 7
2,818,709 UART: [art] Derive CDI
2,818,989 UART: [art] Store in in slot 0x4
2,904,710 UART: [art] Derive Key Pair
2,905,070 UART: [art] Store priv key in slot 0x5
2,917,636 UART: [art] Derive Key Pair - Done
2,932,568 UART: [art] Signing Cert with AUTHO
2,933,048 UART: RITY.KEYID = 7
2,947,966 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,731 UART: [art] PUB.X = D9A429B4BA1E5CFD6748779D8D5759EA445F1E1E6CFC923A8B59EC20C069682F29D5B168AF9CEA1FD80B5D7945B7D70C
2,955,511 UART: [art] PUB.Y = 58372538BB24C51DEA809D685C30C195A12C6C2D05F5F28BA70D4F1DCA75A954B1D315B74E2E609E916BA6A12BBE89EA
2,962,467 UART: [art] SIG.R = ED2A9DA50235369B4A21691110EA6866C5AA2410F8F2C763B09B2CA8C0F1B1475038FBCC1F666E0AC91577F5EF33E600
2,969,215 UART: [art] SIG.S = EC1027734342E19943F83D9E6438F4E5B42D3BAC55B0B921BF56A45C07226638CFD4D9631EA083FE9C1C9F9CD8E341C5
2,992,875 UART: Caliptra RT
2,993,128 UART: [state] CFI Enabled
3,100,564 UART: [rt] RT listening for mailbox commands...
3,101,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,538 UART: [rt]cmd =0x44504543, len=96
3,164,031 >>> mbox cmd response data (56 bytes)
3,164,032 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,193,883 UART: [rt]cmd =0x44504543, len=96
3,225,839 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,743 UART: [state] LifecycleState = Unprovisioned
86,398 UART: [state] DebugLocked = No
86,976 UART: [state] WD Timer not started. Device not locked for debugging
88,303 UART: [kat] SHA2-256
893,953 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,078 UART: [kat] ++
898,230 UART: [kat] sha1
902,412 UART: [kat] SHA2-256
904,352 UART: [kat] SHA2-384
907,067 UART: [kat] SHA2-512-ACC
908,968 UART: [kat] ECC-384
919,065 UART: [kat] HMAC-384Kdf
923,589 UART: [kat] LMS
1,171,917 UART: [kat] --
1,172,634 UART: [cold-reset] ++
1,173,178 UART: [fht] FHT @ 0x50003400
1,175,877 UART: [idev] ++
1,176,045 UART: [idev] CDI.KEYID = 6
1,176,405 UART: [idev] SUBJECT.KEYID = 7
1,176,829 UART: [idev] UDS.KEYID = 0
1,177,174 ready_for_fw is high
1,177,174 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,231 UART: [idev] Erasing UDS.KEYID = 0
1,202,236 UART: [idev] Sha1 KeyId Algorithm
1,210,874 UART: [idev] --
1,211,758 UART: [ldev] ++
1,211,926 UART: [ldev] CDI.KEYID = 6
1,212,289 UART: [ldev] SUBJECT.KEYID = 5
1,212,715 UART: [ldev] AUTHORITY.KEYID = 7
1,213,178 UART: [ldev] FE.KEYID = 1
1,218,396 UART: [ldev] Erasing FE.KEYID = 1
1,244,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,428 UART: [ldev] --
1,283,689 UART: [fwproc] Wait for Commands...
1,284,327 UART: [fwproc] Recv command 0x46574c44
1,285,055 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,431 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,735 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,452 >>> mbox cmd response: success
2,775,546 UART: [afmc] ++
2,775,714 UART: [afmc] CDI.KEYID = 6
2,776,076 UART: [afmc] SUBJECT.KEYID = 7
2,776,501 UART: [afmc] AUTHORITY.KEYID = 5
2,812,606 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,033 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,781 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,509 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,394 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,113 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,953 UART: [afmc] --
2,855,935 UART: [cold-reset] --
2,856,905 UART: [state] Locking Datavault
2,857,900 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,504 UART: [state] Locking ICCM
2,859,168 UART: [exit] Launching FMC @ 0x40000130
2,864,497 UART:
2,864,513 UART: Running Caliptra FMC ...
2,864,921 UART:
2,865,064 UART: [state] CFI Enabled
2,875,585 UART: [fht] FMC Alias Private Key: 7
2,984,190 UART: [art] Extend RT PCRs Done
2,984,618 UART: [art] Lock RT PCRs Done
2,986,288 UART: [art] Populate DV Done
2,994,477 UART: [fht] FMC Alias Private Key: 7
2,995,569 UART: [art] Derive CDI
2,995,849 UART: [art] Store in in slot 0x4
3,081,464 UART: [art] Derive Key Pair
3,081,824 UART: [art] Store priv key in slot 0x5
3,095,068 UART: [art] Derive Key Pair - Done
3,109,830 UART: [art] Signing Cert with AUTHO
3,110,310 UART: RITY.KEYID = 7
3,125,474 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,239 UART: [art] PUB.X = 539FA70EEAD0FF783CF81208C74F2C65CF1376CBC2299EC48E2DB490498C2FDA8AC7A1A13B5325396E56C83C41869D63
3,133,013 UART: [art] PUB.Y = AB8F8D271ADAA5183D12E4DE8A67035AF3BD4A6AF425C2721A953D1E9883FEF3162E399200D1139716E0E0C449CB9A4D
3,139,948 UART: [art] SIG.R = A2CC3D173C58EEF6193EDB0B197F065E48743B8CD4B35C8641CE06CC7D74C1CB68A35E0959D3DED69364C288905362C7
3,146,714 UART: [art] SIG.S = 0FF02B370236A49CA7DF9B57CE9D8B9A4EA3201C935E4A2242BD62ACEA25568879E8627D492B80CCC057C7822EF4F6F3
3,170,015 UART: Caliptra RT
3,170,360 UART: [state] CFI Enabled
3,278,633 UART: [rt] RT listening for mailbox commands...
3,279,303 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,667 UART: [rt]cmd =0x44504543, len=96
3,341,984 >>> mbox cmd response data (56 bytes)
3,341,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,720 UART: [rt]cmd =0x44504543, len=96
3,404,770 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,510 ready_for_fw is high
1,060,510 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,213 >>> mbox cmd response: success
2,689,669 UART:
2,689,685 UART: Running Caliptra FMC ...
2,690,093 UART:
2,690,236 UART: [state] CFI Enabled
2,701,199 UART: [fht] FMC Alias Private Key: 7
2,808,976 UART: [art] Extend RT PCRs Done
2,809,404 UART: [art] Lock RT PCRs Done
2,811,070 UART: [art] Populate DV Done
2,819,151 UART: [fht] FMC Alias Private Key: 7
2,820,283 UART: [art] Derive CDI
2,820,563 UART: [art] Store in in slot 0x4
2,906,284 UART: [art] Derive Key Pair
2,906,644 UART: [art] Store priv key in slot 0x5
2,920,080 UART: [art] Derive Key Pair - Done
2,934,364 UART: [art] Signing Cert with AUTHO
2,934,844 UART: RITY.KEYID = 7
2,949,968 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,733 UART: [art] PUB.X = FC0C6C524D966CF8F8A1F6CD352C5A0C9E75114B52FB3E766ADF87B85BABB660D3F01D993099C78982F28A2541F18DF5
2,957,509 UART: [art] PUB.Y = A6610C936E32AD6F4AB63F6A22CD22668C0F75901B228D784D6461E54872EE74CC1CCF089B05958322BFB31E927BACAA
2,964,455 UART: [art] SIG.R = 43977335611D2C2261C3CA34DF387E354B05F175EDDC62A78D245B82D9063FA50CB13FF4C6879BF31C27D50C510A7BE9
2,971,214 UART: [art] SIG.S = 98686229439D46EAA47C6C2BFE6D105F86783E08417C463E8F2B7AC91316E76259EC420C709B0A9F5C229A48709E8371
2,994,532 UART: Caliptra RT
2,994,877 UART: [state] CFI Enabled
3,102,048 UART: [rt] RT listening for mailbox commands...
3,102,718 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,960 UART: [rt]cmd =0x44504543, len=96
3,165,433 >>> mbox cmd response data (56 bytes)
3,165,434 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,195,331 UART: [rt]cmd =0x44504543, len=96
3,227,869 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,778 UART: [state] LifecycleState = Unprovisioned
86,433 UART: [state] DebugLocked = No
87,099 UART: [state] WD Timer not started. Device not locked for debugging
88,450 UART: [kat] SHA2-256
892,000 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,129 UART: [kat] ++
896,281 UART: [kat] sha1
900,405 UART: [kat] SHA2-256
902,345 UART: [kat] SHA2-384
905,252 UART: [kat] SHA2-512-ACC
907,153 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
920,960 UART: [kat] LMS
1,169,272 UART: [kat] --
1,170,171 UART: [cold-reset] ++
1,170,515 UART: [fht] FHT @ 0x50003400
1,173,251 UART: [idev] ++
1,173,419 UART: [idev] CDI.KEYID = 6
1,173,780 UART: [idev] SUBJECT.KEYID = 7
1,174,205 UART: [idev] UDS.KEYID = 0
1,174,551 ready_for_fw is high
1,174,551 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,121 UART: [idev] Erasing UDS.KEYID = 0
1,199,661 UART: [idev] Sha1 KeyId Algorithm
1,208,563 UART: [idev] --
1,209,648 UART: [ldev] ++
1,209,816 UART: [ldev] CDI.KEYID = 6
1,210,180 UART: [ldev] SUBJECT.KEYID = 5
1,210,607 UART: [ldev] AUTHORITY.KEYID = 7
1,211,070 UART: [ldev] FE.KEYID = 1
1,216,216 UART: [ldev] Erasing FE.KEYID = 1
1,242,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,652 UART: [ldev] --
1,281,998 UART: [fwproc] Wait for Commands...
1,282,719 UART: [fwproc] Recv command 0x46574c44
1,283,452 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,804 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,148 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,457 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,393 >>> mbox cmd response: success
2,774,558 UART: [afmc] ++
2,774,726 UART: [afmc] CDI.KEYID = 6
2,775,089 UART: [afmc] SUBJECT.KEYID = 7
2,775,515 UART: [afmc] AUTHORITY.KEYID = 5
2,811,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,720 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,471 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,200 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,083 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,802 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,719 UART: [afmc] --
2,854,621 UART: [cold-reset] --
2,855,285 UART: [state] Locking Datavault
2,856,410 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,014 UART: [state] Locking ICCM
2,857,664 UART: [exit] Launching FMC @ 0x40000130
2,862,993 UART:
2,863,009 UART: Running Caliptra FMC ...
2,863,417 UART:
2,863,471 UART: [state] CFI Enabled
2,873,968 UART: [fht] FMC Alias Private Key: 7
2,982,315 UART: [art] Extend RT PCRs Done
2,982,743 UART: [art] Lock RT PCRs Done
2,984,071 UART: [art] Populate DV Done
2,992,392 UART: [fht] FMC Alias Private Key: 7
2,993,522 UART: [art] Derive CDI
2,993,802 UART: [art] Store in in slot 0x4
3,079,709 UART: [art] Derive Key Pair
3,080,069 UART: [art] Store priv key in slot 0x5
3,093,163 UART: [art] Derive Key Pair - Done
3,108,034 UART: [art] Signing Cert with AUTHO
3,108,514 UART: RITY.KEYID = 7
3,123,664 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,429 UART: [art] PUB.X = 254E773DA7D1013314E89A73477AC25A6F26A6EF42FCDEEB95A521A142FDAD9C5D7C548F4C1032A94976DDDA85F4A8C0
3,131,210 UART: [art] PUB.Y = DAC099E5A04964A771051F6DFC304C3EE104E7B12AA8A9CCB4B8A421F1E1FD364C441F11E82C798269942F5BFB9A4C30
3,138,166 UART: [art] SIG.R = C49BFF103CC818E08F91A54C83D7CAC8432D4686CE5457A56C6269820CB750CB4728D5249AE3453A06B020D8A0B87CE7
3,144,934 UART: [art] SIG.S = 775E6277EE1941DE7E83AA99E3471611095BE18540298A6B6728CFF0F7AD41C5C66743F103EB2861DA7194BDBE037BD5
3,169,152 UART: Caliptra RT
3,169,405 UART: [state] CFI Enabled
3,277,104 UART: [rt] RT listening for mailbox commands...
3,277,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,004 UART: [rt]cmd =0x44504543, len=96
3,340,405 >>> mbox cmd response data (56 bytes)
3,340,406 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,370,335 UART: [rt]cmd =0x44504543, len=96
3,402,431 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,850 ready_for_fw is high
1,055,850 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,487 >>> mbox cmd response: success
2,682,341 UART:
2,682,357 UART: Running Caliptra FMC ...
2,682,765 UART:
2,682,819 UART: [state] CFI Enabled
2,693,392 UART: [fht] FMC Alias Private Key: 7
2,801,889 UART: [art] Extend RT PCRs Done
2,802,317 UART: [art] Lock RT PCRs Done
2,803,687 UART: [art] Populate DV Done
2,811,716 UART: [fht] FMC Alias Private Key: 7
2,812,778 UART: [art] Derive CDI
2,813,058 UART: [art] Store in in slot 0x4
2,898,651 UART: [art] Derive Key Pair
2,899,011 UART: [art] Store priv key in slot 0x5
2,911,915 UART: [art] Derive Key Pair - Done
2,926,590 UART: [art] Signing Cert with AUTHO
2,927,070 UART: RITY.KEYID = 7
2,942,236 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,001 UART: [art] PUB.X = 89B6C06855096B06CC125BD5EA5843E073B3197D8A9E77093228A8FEC4F7FF0044F6FCB7D116908CEA089887FEA587A1
2,949,741 UART: [art] PUB.Y = C1D719C7083E4B725D677D44FDAA789D5F8615093C41EE240368DA2E677E1F80305A94FB86CE974D164057995AF4DD19
2,956,682 UART: [art] SIG.R = 897C889C1B963EADFDC79ED6D88BC9C62F0078658E48EAD29CBFF48CA2C105F877AFA1681EA50C78129AAC8C49250E30
2,963,437 UART: [art] SIG.S = 66786DE4041CD318D06C4D2B85040DDD3FE58FFB509F39E88696F73FD6606967C1C62F95DDCA4AA66C6622C2F2F89970
2,987,155 UART: Caliptra RT
2,987,408 UART: [state] CFI Enabled
3,095,327 UART: [rt] RT listening for mailbox commands...
3,095,997 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,721 UART: [rt]cmd =0x44504543, len=96
3,158,348 >>> mbox cmd response data (56 bytes)
3,158,349 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,002 UART: [rt]cmd =0x44504543, len=96
3,220,720 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
899,784 UART: [kat] SHA2-256
901,724 UART: [kat] SHA2-384
904,627 UART: [kat] SHA2-512-ACC
906,528 UART: [kat] ECC-384
916,203 UART: [kat] HMAC-384Kdf
920,881 UART: [kat] LMS
1,169,193 UART: [kat] --
1,169,902 UART: [cold-reset] ++
1,170,298 UART: [fht] FHT @ 0x50003400
1,173,140 UART: [idev] ++
1,173,308 UART: [idev] CDI.KEYID = 6
1,173,669 UART: [idev] SUBJECT.KEYID = 7
1,174,094 UART: [idev] UDS.KEYID = 0
1,174,440 ready_for_fw is high
1,174,440 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,004 UART: [idev] Erasing UDS.KEYID = 0
1,199,236 UART: [idev] Sha1 KeyId Algorithm
1,208,054 UART: [idev] --
1,209,121 UART: [ldev] ++
1,209,289 UART: [ldev] CDI.KEYID = 6
1,209,653 UART: [ldev] SUBJECT.KEYID = 5
1,210,080 UART: [ldev] AUTHORITY.KEYID = 7
1,210,543 UART: [ldev] FE.KEYID = 1
1,215,869 UART: [ldev] Erasing FE.KEYID = 1
1,242,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,477 UART: [ldev] --
1,281,895 UART: [fwproc] Wait for Commands...
1,282,588 UART: [fwproc] Recv command 0x46574c44
1,283,321 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,759 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,068 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,824 >>> mbox cmd response: success
2,774,907 UART: [afmc] ++
2,775,075 UART: [afmc] CDI.KEYID = 6
2,775,438 UART: [afmc] SUBJECT.KEYID = 7
2,775,864 UART: [afmc] AUTHORITY.KEYID = 5
2,811,781 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,389 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,140 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,869 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,752 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,471 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,492 UART: [afmc] --
2,855,576 UART: [cold-reset] --
2,856,726 UART: [state] Locking Datavault
2,857,877 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,481 UART: [state] Locking ICCM
2,858,975 UART: [exit] Launching FMC @ 0x40000130
2,864,304 UART:
2,864,320 UART: Running Caliptra FMC ...
2,864,728 UART:
2,864,871 UART: [state] CFI Enabled
2,875,070 UART: [fht] FMC Alias Private Key: 7
2,982,929 UART: [art] Extend RT PCRs Done
2,983,357 UART: [art] Lock RT PCRs Done
2,984,897 UART: [art] Populate DV Done
2,993,462 UART: [fht] FMC Alias Private Key: 7
2,994,484 UART: [art] Derive CDI
2,994,764 UART: [art] Store in in slot 0x4
3,080,501 UART: [art] Derive Key Pair
3,080,861 UART: [art] Store priv key in slot 0x5
3,094,461 UART: [art] Derive Key Pair - Done
3,109,312 UART: [art] Signing Cert with AUTHO
3,109,792 UART: RITY.KEYID = 7
3,125,132 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,897 UART: [art] PUB.X = AD02931A183225D6B63DB8F84EA0F357A096354099D71FB0EE0E52D6287ECF81A8A51429BE173CFDD89060DC6B28ACCA
3,132,673 UART: [art] PUB.Y = DFE72E8BD73F14574AF3E6F8DBEF1EEEBB07C605B3C6EB91B9B230C95E61A878B8E141102EB844F5AF75422D2A0CF715
3,139,634 UART: [art] SIG.R = C60A19E4B0188AC72B40E25BC19A60621A719950C7D09AE78864A5EB1C415F7C2CE02B9FF43780AD9E1F73F193836BB6
3,146,407 UART: [art] SIG.S = A9E38EA968BBA04E7486B51713F41F8E40BE08DC50126A7C156B7E5067973496AEDD54DF62D81CDC23269F8D6544F6A0
3,170,217 UART: Caliptra RT
3,170,562 UART: [state] CFI Enabled
3,277,934 UART: [rt] RT listening for mailbox commands...
3,278,604 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,924 UART: [rt]cmd =0x44504543, len=96
3,341,393 >>> mbox cmd response data (56 bytes)
3,341,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,697 UART: [rt]cmd =0x44504543, len=96
3,404,577 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,607 ready_for_fw is high
1,056,607 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,892 >>> mbox cmd response: success
2,684,942 UART:
2,684,958 UART: Running Caliptra FMC ...
2,685,366 UART:
2,685,509 UART: [state] CFI Enabled
2,695,944 UART: [fht] FMC Alias Private Key: 7
2,803,521 UART: [art] Extend RT PCRs Done
2,803,949 UART: [art] Lock RT PCRs Done
2,805,505 UART: [art] Populate DV Done
2,813,348 UART: [fht] FMC Alias Private Key: 7
2,814,498 UART: [art] Derive CDI
2,814,778 UART: [art] Store in in slot 0x4
2,900,449 UART: [art] Derive Key Pair
2,900,809 UART: [art] Store priv key in slot 0x5
2,914,531 UART: [art] Derive Key Pair - Done
2,929,306 UART: [art] Signing Cert with AUTHO
2,929,786 UART: RITY.KEYID = 7
2,945,068 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,833 UART: [art] PUB.X = 62CAD6BB78AA6CF8DC69050614964AE7095509A65E455A880CE1CE225AFB70CC1251C33F52658219AA00694A97D2B95A
2,952,570 UART: [art] PUB.Y = 3EEE62CB48C7ABB98D8ACA04FE08DAD5E5E5B685DD0C4DB57A6E07368FDA5A58CCDDADF7922F363C965C47D057F7C1F3
2,959,538 UART: [art] SIG.R = CD8EA1E32AC9E91F55D96273D7985A37446905E30ADAA0613180710DA6989B1D0C0A4D0B30DAF67EB7C2D4C3EB19E831
2,966,300 UART: [art] SIG.S = DF7B782C481D7A1C6B0937410562D2EDA4F6F8FC8366BE12091AD381CA29AD8327FA0EBE57122107390C8551F1A50154
2,990,274 UART: Caliptra RT
2,990,619 UART: [state] CFI Enabled
3,097,949 UART: [rt] RT listening for mailbox commands...
3,098,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,275 UART: [rt]cmd =0x44504543, len=96
3,161,542 >>> mbox cmd response data (56 bytes)
3,161,543 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,424 UART: [rt]cmd =0x44504543, len=96
3,223,344 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,209 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,759 UART: [kat] SHA2-256
881,690 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,805 UART: [kat] ++
885,957 UART: [kat] sha1
890,237 UART: [kat] SHA2-256
892,175 UART: [kat] SHA2-384
894,950 UART: [kat] SHA2-512-ACC
896,851 UART: [kat] ECC-384
902,428 UART: [kat] HMAC-384Kdf
906,826 UART: [kat] LMS
1,475,022 UART: [kat] --
1,475,849 UART: [cold-reset] ++
1,476,191 UART: [fht] Storing FHT @ 0x50003400
1,479,056 UART: [idev] ++
1,479,224 UART: [idev] CDI.KEYID = 6
1,479,584 UART: [idev] SUBJECT.KEYID = 7
1,480,008 UART: [idev] UDS.KEYID = 0
1,480,353 ready_for_fw is high
1,480,353 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,206 UART: [idev] Erasing UDS.KEYID = 0
1,504,766 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,314 UART: [idev] --
1,514,335 UART: [ldev] ++
1,514,503 UART: [ldev] CDI.KEYID = 6
1,514,866 UART: [ldev] SUBJECT.KEYID = 5
1,515,292 UART: [ldev] AUTHORITY.KEYID = 7
1,515,755 UART: [ldev] FE.KEYID = 1
1,521,147 UART: [ldev] Erasing FE.KEYID = 1
1,546,514 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,444 UART: [ldev] --
1,585,769 UART: [fwproc] Waiting for Commands...
1,586,442 UART: [fwproc] Received command 0x46574c44
1,587,233 UART: [fwproc] Received Image of size 114332 bytes
2,885,440 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,068 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,420 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,277 >>> mbox cmd response: success
3,079,421 UART: [afmc] ++
3,079,589 UART: [afmc] CDI.KEYID = 6
3,079,951 UART: [afmc] SUBJECT.KEYID = 7
3,080,376 UART: [afmc] AUTHORITY.KEYID = 5
3,115,567 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,965 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,745 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,473 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,358 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,048 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,825 UART: [afmc] --
3,158,897 UART: [cold-reset] --
3,159,781 UART: [state] Locking Datavault
3,160,914 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,518 UART: [state] Locking ICCM
3,162,034 UART: [exit] Launching FMC @ 0x40000130
3,167,363 UART:
3,167,379 UART: Running Caliptra FMC ...
3,167,787 UART:
3,167,841 UART: [state] CFI Enabled
3,178,254 UART: [fht] FMC Alias Private Key: 7
3,286,891 UART: [art] Extend RT PCRs Done
3,287,319 UART: [art] Lock RT PCRs Done
3,288,683 UART: [art] Populate DV Done
3,296,858 UART: [fht] FMC Alias Private Key: 7
3,298,004 UART: [art] Derive CDI
3,298,284 UART: [art] Store in in slot 0x4
3,383,925 UART: [art] Derive Key Pair
3,384,285 UART: [art] Store priv key in slot 0x5
3,397,683 UART: [art] Derive Key Pair - Done
3,412,074 UART: [art] Signing Cert with AUTHO
3,412,554 UART: RITY.KEYID = 7
3,427,750 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,515 UART: [art] PUB.X = B14E9EFEB5FB9080A580231AD5433BF628AEBB730002386848AD11B8D7FB7429045C08B302D8BD2EB163E0D2C5B3C9BF
3,435,263 UART: [art] PUB.Y = 782964834B48B795A65395B5429CA9C6046D67377707572D2E523185468395E907F7EED9659F87E9F28F68A6096DA753
3,442,183 UART: [art] SIG.R = 91E218E885D4122531A3BACDA34644E4CFD2E76B81374C824C5DEF9522FCA662317D39561C6C4FDE3579B8794EB3850E
3,448,954 UART: [art] SIG.S = 4820FEA763D10EA977F1FDC7867D379BE14103C0275F38B0CB7D259127364B1C14605AC8A5A22B5607BC9AC9EF18B63F
3,472,966 UART: Caliptra RT
3,473,219 UART: [state] CFI Enabled
3,582,002 UART: [rt] RT listening for mailbox commands...
3,582,672 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,812 UART: [rt]cmd =0x44504543, len=24
3,638,743 >>> mbox cmd response data (40 bytes)
3,638,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,668,763 UART: [rt]cmd =0x44504543, len=96
3,676,044 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,845 ready_for_fw is high
1,361,845 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,324 >>> mbox cmd response: success
2,987,250 UART:
2,987,266 UART: Running Caliptra FMC ...
2,987,674 UART:
2,987,728 UART: [state] CFI Enabled
2,998,151 UART: [fht] FMC Alias Private Key: 7
3,106,640 UART: [art] Extend RT PCRs Done
3,107,068 UART: [art] Lock RT PCRs Done
3,108,788 UART: [art] Populate DV Done
3,117,131 UART: [fht] FMC Alias Private Key: 7
3,118,233 UART: [art] Derive CDI
3,118,513 UART: [art] Store in in slot 0x4
3,204,334 UART: [art] Derive Key Pair
3,204,694 UART: [art] Store priv key in slot 0x5
3,217,512 UART: [art] Derive Key Pair - Done
3,232,240 UART: [art] Signing Cert with AUTHO
3,232,720 UART: RITY.KEYID = 7
3,248,060 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,825 UART: [art] PUB.X = D872B702D188A526250BE17AAC79F7FA8F9659B4D265B1338B3D084BE1710324CAD285DE6F2B2BDB76C1ACFFBF004477
3,255,573 UART: [art] PUB.Y = 1AE5998686728B65FE6B1FD21522029496F1577D1B059CA0383DA410AF5DD9E8EF07C14EB593E8DCF34DB6AE212C35B2
3,262,522 UART: [art] SIG.R = 7FC7E64D9F31924F6A4A87BE14E4044EC9A768EF6D143E6AC59BB4F6E771D6416746620833887F83C7BFB854CF2B880C
3,269,289 UART: [art] SIG.S = B57AEF3F2B779E512A3C2035083E8B5347E551E75B4D14076B16A8360C51DAD00448C70E6680328BF9F1B10A15A25834
3,292,804 UART: Caliptra RT
3,293,057 UART: [state] CFI Enabled
3,401,670 UART: [rt] RT listening for mailbox commands...
3,402,340 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,422 UART: [rt]cmd =0x44504543, len=24
3,459,067 >>> mbox cmd response data (40 bytes)
3,459,068 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,489,077 UART: [rt]cmd =0x44504543, len=96
3,496,414 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,636 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,214 UART: [kat] SHA2-256
882,145 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,260 UART: [kat] ++
886,412 UART: [kat] sha1
890,528 UART: [kat] SHA2-256
892,466 UART: [kat] SHA2-384
895,207 UART: [kat] SHA2-512-ACC
897,108 UART: [kat] ECC-384
902,641 UART: [kat] HMAC-384Kdf
907,151 UART: [kat] LMS
1,475,347 UART: [kat] --
1,476,282 UART: [cold-reset] ++
1,476,632 UART: [fht] Storing FHT @ 0x50003400
1,479,399 UART: [idev] ++
1,479,567 UART: [idev] CDI.KEYID = 6
1,479,927 UART: [idev] SUBJECT.KEYID = 7
1,480,351 UART: [idev] UDS.KEYID = 0
1,480,696 ready_for_fw is high
1,480,696 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,451 UART: [idev] Erasing UDS.KEYID = 0
1,505,027 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,585 UART: [idev] --
1,514,828 UART: [ldev] ++
1,514,996 UART: [ldev] CDI.KEYID = 6
1,515,359 UART: [ldev] SUBJECT.KEYID = 5
1,515,785 UART: [ldev] AUTHORITY.KEYID = 7
1,516,248 UART: [ldev] FE.KEYID = 1
1,521,506 UART: [ldev] Erasing FE.KEYID = 1
1,547,615 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,161 UART: [ldev] --
1,586,434 UART: [fwproc] Waiting for Commands...
1,587,057 UART: [fwproc] Received command 0x46574c44
1,587,848 UART: [fwproc] Received Image of size 114332 bytes
2,886,426 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,276 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,628 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,619 >>> mbox cmd response: success
3,079,759 UART: [afmc] ++
3,079,927 UART: [afmc] CDI.KEYID = 6
3,080,289 UART: [afmc] SUBJECT.KEYID = 7
3,080,714 UART: [afmc] AUTHORITY.KEYID = 5
3,116,449 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,357 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,137 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,865 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,750 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,440 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,129 UART: [afmc] --
3,159,163 UART: [cold-reset] --
3,160,195 UART: [state] Locking Datavault
3,161,370 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,974 UART: [state] Locking ICCM
3,162,452 UART: [exit] Launching FMC @ 0x40000130
3,167,781 UART:
3,167,797 UART: Running Caliptra FMC ...
3,168,205 UART:
3,168,348 UART: [state] CFI Enabled
3,179,169 UART: [fht] FMC Alias Private Key: 7
3,287,604 UART: [art] Extend RT PCRs Done
3,288,032 UART: [art] Lock RT PCRs Done
3,289,804 UART: [art] Populate DV Done
3,297,783 UART: [fht] FMC Alias Private Key: 7
3,298,813 UART: [art] Derive CDI
3,299,093 UART: [art] Store in in slot 0x4
3,384,612 UART: [art] Derive Key Pair
3,384,972 UART: [art] Store priv key in slot 0x5
3,398,596 UART: [art] Derive Key Pair - Done
3,413,198 UART: [art] Signing Cert with AUTHO
3,413,678 UART: RITY.KEYID = 7
3,429,078 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,843 UART: [art] PUB.X = 6DBA6A5DF6BEB280E31C18452C30F2F42F34B27AEEBD105FE991285FFAFDF4E317CFA3B1666CF4515A80594C00223C9B
3,436,609 UART: [art] PUB.Y = E3B66283546A51B1555372B7F2B842F89FBC97D3F6EF7C220CDFA3ABEF6618BCB3C157D9643543E255F80C08B6A51997
3,443,556 UART: [art] SIG.R = 314D218B21637BFF8EA21BD06B86E12E6FA0AE09F7A9A88D8F66CE71E86C8B6155A1EC7C1910121DA7285E1E2455E0CF
3,450,335 UART: [art] SIG.S = 1D21B6B1360991AA06FBE294F07DD3DCD2C824D84E99B71E11C95E0EA52C614854CF3A6B006F24EF1502E94F7E5AF197
3,474,030 UART: Caliptra RT
3,474,375 UART: [state] CFI Enabled
3,581,983 UART: [rt] RT listening for mailbox commands...
3,582,653 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,501 UART: [rt]cmd =0x44504543, len=24
3,639,102 >>> mbox cmd response data (40 bytes)
3,639,103 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,669,160 UART: [rt]cmd =0x44504543, len=96
3,676,507 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,072 ready_for_fw is high
1,363,072 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,107 >>> mbox cmd response: success
2,990,981 UART:
2,990,997 UART: Running Caliptra FMC ...
2,991,405 UART:
2,991,548 UART: [state] CFI Enabled
3,001,975 UART: [fht] FMC Alias Private Key: 7
3,109,576 UART: [art] Extend RT PCRs Done
3,110,004 UART: [art] Lock RT PCRs Done
3,111,474 UART: [art] Populate DV Done
3,119,611 UART: [fht] FMC Alias Private Key: 7
3,120,643 UART: [art] Derive CDI
3,120,923 UART: [art] Store in in slot 0x4
3,206,556 UART: [art] Derive Key Pair
3,206,916 UART: [art] Store priv key in slot 0x5
3,220,554 UART: [art] Derive Key Pair - Done
3,235,420 UART: [art] Signing Cert with AUTHO
3,235,900 UART: RITY.KEYID = 7
3,251,220 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,985 UART: [art] PUB.X = 36361740C1074E4425BB2A32E0EF82D640EA8945CAF6B207F60AF389242397B95CD3D81D8F4E8B5B8E8B263520440C56
3,258,741 UART: [art] PUB.Y = E3386EBF9BF122FD73CBA91A061F0CBA0275937EFB17F381A3094058EF3CBC363608AE3C8C0B6F9CDCD6172C20285C89
3,265,687 UART: [art] SIG.R = 14F1D49212E3460EC7399FF6BB9B9676CE16CDFB192035A3BBE789E1524762818D346BA4F8AC67B057032FAC520BAE34
3,272,454 UART: [art] SIG.S = 349F5FD5CB790F66155D654A2EDEFF27B87DBEF3B6DE32F2D8FE038B52F081A223DDC136A1B55E6339EE8230672D1010
3,296,211 UART: Caliptra RT
3,296,556 UART: [state] CFI Enabled
3,405,080 UART: [rt] RT listening for mailbox commands...
3,405,750 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,864 UART: [rt]cmd =0x44504543, len=24
3,462,255 >>> mbox cmd response data (40 bytes)
3,462,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,492,329 UART: [rt]cmd =0x44504543, len=96
3,499,400 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
893,250 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,375 UART: [kat] ++
897,527 UART: [kat] sha1
901,787 UART: [kat] SHA2-256
903,727 UART: [kat] SHA2-384
906,506 UART: [kat] SHA2-512-ACC
908,407 UART: [kat] ECC-384
918,570 UART: [kat] HMAC-384Kdf
923,170 UART: [kat] LMS
1,171,498 UART: [kat] --
1,172,417 UART: [cold-reset] ++
1,172,893 UART: [fht] FHT @ 0x50003400
1,175,572 UART: [idev] ++
1,175,740 UART: [idev] CDI.KEYID = 6
1,176,100 UART: [idev] SUBJECT.KEYID = 7
1,176,524 UART: [idev] UDS.KEYID = 0
1,176,869 ready_for_fw is high
1,176,869 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,280 UART: [idev] Erasing UDS.KEYID = 0
1,201,141 UART: [idev] Sha1 KeyId Algorithm
1,209,663 UART: [idev] --
1,210,611 UART: [ldev] ++
1,210,779 UART: [ldev] CDI.KEYID = 6
1,211,142 UART: [ldev] SUBJECT.KEYID = 5
1,211,568 UART: [ldev] AUTHORITY.KEYID = 7
1,212,031 UART: [ldev] FE.KEYID = 1
1,217,331 UART: [ldev] Erasing FE.KEYID = 1
1,243,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,853 UART: [ldev] --
1,282,242 UART: [fwproc] Wait for Commands...
1,282,950 UART: [fwproc] Recv command 0x46574c44
1,283,678 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,582 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,886 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,651 >>> mbox cmd response: success
2,774,829 UART: [afmc] ++
2,774,997 UART: [afmc] CDI.KEYID = 6
2,775,359 UART: [afmc] SUBJECT.KEYID = 7
2,775,784 UART: [afmc] AUTHORITY.KEYID = 5
2,811,793 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,538 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,286 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,014 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,899 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,618 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,390 UART: [afmc] --
2,855,336 UART: [cold-reset] --
2,856,132 UART: [state] Locking Datavault
2,857,341 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,945 UART: [state] Locking ICCM
2,858,599 UART: [exit] Launching FMC @ 0x40000130
2,863,928 UART:
2,863,944 UART: Running Caliptra FMC ...
2,864,352 UART:
2,864,406 UART: [state] CFI Enabled
2,874,295 UART: [fht] FMC Alias Private Key: 7
2,981,978 UART: [art] Extend RT PCRs Done
2,982,406 UART: [art] Lock RT PCRs Done
2,984,020 UART: [art] Populate DV Done
2,992,351 UART: [fht] FMC Alias Private Key: 7
2,993,427 UART: [art] Derive CDI
2,993,707 UART: [art] Store in in slot 0x4
3,079,450 UART: [art] Derive Key Pair
3,079,810 UART: [art] Store priv key in slot 0x5
3,093,224 UART: [art] Derive Key Pair - Done
3,107,864 UART: [art] Signing Cert with AUTHO
3,108,344 UART: RITY.KEYID = 7
3,123,580 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,345 UART: [art] PUB.X = 5B1D76F68989D5F3CA72F3097D9F3F68C346A814CF85D5300B6878EF67503C87D138CF17235A426657A8001CDDD415D7
3,131,085 UART: [art] PUB.Y = A76EE89D4CB97825749603F5D5225C9B327CCCCD14399B1089CFA466A642DBCE8A82F5D9ED25F6CA6A669DBFE439E347
3,138,046 UART: [art] SIG.R = 85CAB575D3F74BB5C782EA3FA569E79C4987FFC3E79B94D84BD287455228B1DFEF0F99A7A9BD68C5888D80E85E73A5FE
3,144,829 UART: [art] SIG.S = 789E24AA1669A5BA06A9EF323800D1E6BB103E77963C9691AC8880F8EADC3FC6D297AFF227685FE0E19101DAE2FEB6BA
3,168,248 UART: Caliptra RT
3,168,501 UART: [state] CFI Enabled
3,276,066 UART: [rt] RT listening for mailbox commands...
3,276,736 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,636 UART: [rt]cmd =0x44504543, len=24
3,333,107 >>> mbox cmd response data (40 bytes)
3,333,108 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,925 UART: [rt]cmd =0x44504543, len=96
3,370,136 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,607 ready_for_fw is high
1,059,607 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,754 >>> mbox cmd response: success
2,686,630 UART:
2,686,646 UART: Running Caliptra FMC ...
2,687,054 UART:
2,687,108 UART: [state] CFI Enabled
2,697,471 UART: [fht] FMC Alias Private Key: 7
2,805,080 UART: [art] Extend RT PCRs Done
2,805,508 UART: [art] Lock RT PCRs Done
2,807,000 UART: [art] Populate DV Done
2,815,095 UART: [fht] FMC Alias Private Key: 7
2,816,025 UART: [art] Derive CDI
2,816,305 UART: [art] Store in in slot 0x4
2,902,002 UART: [art] Derive Key Pair
2,902,362 UART: [art] Store priv key in slot 0x5
2,916,116 UART: [art] Derive Key Pair - Done
2,930,627 UART: [art] Signing Cert with AUTHO
2,931,107 UART: RITY.KEYID = 7
2,946,739 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,504 UART: [art] PUB.X = 752F39C2845EA0A411C80E4414557116FC63EC6B4BA98BDB890BD37E84136985EB405CCBDA301235CE90938352879F36
2,954,266 UART: [art] PUB.Y = 77F30BC3C6D5BE6779E6D8BF79BC6311FF7A0ED5E895EDD1092753E978C6DF0A23F0ABC5A156EBF2EC82C791A745DD56
2,961,224 UART: [art] SIG.R = 263910A43DC5FC1AC1740F9F6D33DC7062B0BD7C8CFA77C291C3F97B0656E994F4ABCE479CE7D55CE31672343C235A00
2,967,976 UART: [art] SIG.S = D8561C4E69A1D86CC4B4AA83BB71B7811093C727963165E0CE5B2B94E16ACC65035F7D677873A5BBFF3309A6A7E8B4C5
2,991,729 UART: Caliptra RT
2,991,982 UART: [state] CFI Enabled
3,100,609 UART: [rt] RT listening for mailbox commands...
3,101,279 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,133 UART: [rt]cmd =0x44504543, len=24
3,157,498 >>> mbox cmd response data (40 bytes)
3,157,499 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,620 UART: [rt]cmd =0x44504543, len=96
3,195,157 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
86,942 UART: [state] WD Timer not started. Device not locked for debugging
88,221 UART: [kat] SHA2-256
893,871 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,996 UART: [kat] ++
898,148 UART: [kat] sha1
902,454 UART: [kat] SHA2-256
904,394 UART: [kat] SHA2-384
907,125 UART: [kat] SHA2-512-ACC
909,026 UART: [kat] ECC-384
919,391 UART: [kat] HMAC-384Kdf
923,987 UART: [kat] LMS
1,172,315 UART: [kat] --
1,173,166 UART: [cold-reset] ++
1,173,704 UART: [fht] FHT @ 0x50003400
1,176,523 UART: [idev] ++
1,176,691 UART: [idev] CDI.KEYID = 6
1,177,051 UART: [idev] SUBJECT.KEYID = 7
1,177,475 UART: [idev] UDS.KEYID = 0
1,177,820 ready_for_fw is high
1,177,820 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,575 UART: [idev] Erasing UDS.KEYID = 0
1,202,482 UART: [idev] Sha1 KeyId Algorithm
1,211,016 UART: [idev] --
1,212,174 UART: [ldev] ++
1,212,342 UART: [ldev] CDI.KEYID = 6
1,212,705 UART: [ldev] SUBJECT.KEYID = 5
1,213,131 UART: [ldev] AUTHORITY.KEYID = 7
1,213,594 UART: [ldev] FE.KEYID = 1
1,218,492 UART: [ldev] Erasing FE.KEYID = 1
1,244,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,630 UART: [ldev] --
1,283,939 UART: [fwproc] Wait for Commands...
1,284,519 UART: [fwproc] Recv command 0x46574c44
1,285,247 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,604 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,059 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,363 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,080 >>> mbox cmd response: success
2,776,100 UART: [afmc] ++
2,776,268 UART: [afmc] CDI.KEYID = 6
2,776,630 UART: [afmc] SUBJECT.KEYID = 7
2,777,055 UART: [afmc] AUTHORITY.KEYID = 5
2,811,970 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,461 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,209 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,937 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,822 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,541 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,385 UART: [afmc] --
2,855,397 UART: [cold-reset] --
2,856,021 UART: [state] Locking Datavault
2,857,050 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,654 UART: [state] Locking ICCM
2,858,300 UART: [exit] Launching FMC @ 0x40000130
2,863,629 UART:
2,863,645 UART: Running Caliptra FMC ...
2,864,053 UART:
2,864,196 UART: [state] CFI Enabled
2,875,057 UART: [fht] FMC Alias Private Key: 7
2,983,738 UART: [art] Extend RT PCRs Done
2,984,166 UART: [art] Lock RT PCRs Done
2,985,666 UART: [art] Populate DV Done
2,994,045 UART: [fht] FMC Alias Private Key: 7
2,995,037 UART: [art] Derive CDI
2,995,317 UART: [art] Store in in slot 0x4
3,081,088 UART: [art] Derive Key Pair
3,081,448 UART: [art] Store priv key in slot 0x5
3,094,592 UART: [art] Derive Key Pair - Done
3,109,393 UART: [art] Signing Cert with AUTHO
3,109,873 UART: RITY.KEYID = 7
3,125,009 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,774 UART: [art] PUB.X = BDB3E1F431A3E0E9BE93FCF58D301A51A54F87497DDA1B2F9F7A2044BF3C680062CD3619025942E7022A11CD86FC330A
3,132,523 UART: [art] PUB.Y = CDD24D42034B672DA4D340922F1C3D95B5595445798F0A9ADE5EC97C6BDA09BAB1EB91FBE5F873250B2521632B60F853
3,139,469 UART: [art] SIG.R = ECE67BCF93AAA5CEB7B25A5D0861B964395BA999B02213BE0719E5F0A37F65C242D2C02AA6924B99FD10F07335ACABF6
3,146,249 UART: [art] SIG.S = 620D2AAC415BD1C23F07C3062FB495D23136B3B24B3ACF54B7897B2D12D4897E1975E931D553AC2416F9868CBF2CB329
3,169,323 UART: Caliptra RT
3,169,668 UART: [state] CFI Enabled
3,277,667 UART: [rt] RT listening for mailbox commands...
3,278,337 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,239 UART: [rt]cmd =0x44504543, len=24
3,334,388 >>> mbox cmd response data (40 bytes)
3,334,389 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,186 UART: [rt]cmd =0x44504543, len=96
3,371,241 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,418 ready_for_fw is high
1,061,418 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,769 >>> mbox cmd response: success
2,691,395 UART:
2,691,411 UART: Running Caliptra FMC ...
2,691,819 UART:
2,691,962 UART: [state] CFI Enabled
2,702,307 UART: [fht] FMC Alias Private Key: 7
2,810,200 UART: [art] Extend RT PCRs Done
2,810,628 UART: [art] Lock RT PCRs Done
2,812,116 UART: [art] Populate DV Done
2,820,291 UART: [fht] FMC Alias Private Key: 7
2,821,391 UART: [art] Derive CDI
2,821,671 UART: [art] Store in in slot 0x4
2,907,352 UART: [art] Derive Key Pair
2,907,712 UART: [art] Store priv key in slot 0x5
2,921,000 UART: [art] Derive Key Pair - Done
2,935,757 UART: [art] Signing Cert with AUTHO
2,936,237 UART: RITY.KEYID = 7
2,951,375 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,140 UART: [art] PUB.X = A05C031ABEFF22507D387F3E69AC5601A2F822DDDCE5A0934A605575A98FCF2474968862B0C0DB8B58A7F6115B78C3AA
2,958,914 UART: [art] PUB.Y = 34557E7C50679A3BAF3283FD177258AF0746F8CB20331AFE43DB4494C9614B483E8809E033CFB984EB593757FDE86592
2,965,856 UART: [art] SIG.R = 3960166DA27D0B4BFF5E71DC2695F619AFED4B3F050C2765D2FE0553A6D0B81B58FDD9FC5AADF774B9CD79311542934E
2,972,628 UART: [art] SIG.S = 28332035AC5A3CF2878BD70213CB903B22035AD423F6C397BF9131BC31CE7E0EC9533830073B50425D081D156B07510B
2,996,196 UART: Caliptra RT
2,996,541 UART: [state] CFI Enabled
3,104,090 UART: [rt] RT listening for mailbox commands...
3,104,760 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,916 UART: [rt]cmd =0x44504543, len=24
3,160,869 >>> mbox cmd response data (40 bytes)
3,160,870 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,937 UART: [rt]cmd =0x44504543, len=96
3,198,358 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,973 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
891,280 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,409 UART: [kat] ++
895,561 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,404 UART: [kat] SHA2-512-ACC
906,305 UART: [kat] ECC-384
916,228 UART: [kat] HMAC-384Kdf
921,024 UART: [kat] LMS
1,169,336 UART: [kat] --
1,170,223 UART: [cold-reset] ++
1,170,789 UART: [fht] FHT @ 0x50003400
1,173,589 UART: [idev] ++
1,173,757 UART: [idev] CDI.KEYID = 6
1,174,118 UART: [idev] SUBJECT.KEYID = 7
1,174,543 UART: [idev] UDS.KEYID = 0
1,174,889 ready_for_fw is high
1,174,889 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,851 UART: [idev] Erasing UDS.KEYID = 0
1,200,381 UART: [idev] Sha1 KeyId Algorithm
1,209,043 UART: [idev] --
1,210,014 UART: [ldev] ++
1,210,182 UART: [ldev] CDI.KEYID = 6
1,210,546 UART: [ldev] SUBJECT.KEYID = 5
1,210,973 UART: [ldev] AUTHORITY.KEYID = 7
1,211,436 UART: [ldev] FE.KEYID = 1
1,216,630 UART: [ldev] Erasing FE.KEYID = 1
1,242,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,150 UART: [ldev] --
1,281,440 UART: [fwproc] Wait for Commands...
1,282,019 UART: [fwproc] Recv command 0x46574c44
1,282,752 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,804 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,113 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,851 >>> mbox cmd response: success
2,773,928 UART: [afmc] ++
2,774,096 UART: [afmc] CDI.KEYID = 6
2,774,459 UART: [afmc] SUBJECT.KEYID = 7
2,774,885 UART: [afmc] AUTHORITY.KEYID = 5
2,809,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,608 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,359 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,088 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,971 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,690 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,563 UART: [afmc] --
2,853,665 UART: [cold-reset] --
2,854,805 UART: [state] Locking Datavault
2,856,008 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,612 UART: [state] Locking ICCM
2,857,076 UART: [exit] Launching FMC @ 0x40000130
2,862,405 UART:
2,862,421 UART: Running Caliptra FMC ...
2,862,829 UART:
2,862,883 UART: [state] CFI Enabled
2,872,990 UART: [fht] FMC Alias Private Key: 7
2,980,177 UART: [art] Extend RT PCRs Done
2,980,605 UART: [art] Lock RT PCRs Done
2,982,045 UART: [art] Populate DV Done
2,990,310 UART: [fht] FMC Alias Private Key: 7
2,991,342 UART: [art] Derive CDI
2,991,622 UART: [art] Store in in slot 0x4
3,076,943 UART: [art] Derive Key Pair
3,077,303 UART: [art] Store priv key in slot 0x5
3,090,625 UART: [art] Derive Key Pair - Done
3,105,268 UART: [art] Signing Cert with AUTHO
3,105,748 UART: RITY.KEYID = 7
3,121,178 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,943 UART: [art] PUB.X = D8A746A16A3E6CAADE7F0C542087BA5610444EE76856D3564D800C020F08159D5318FA3FFFAEE1FBBE571EEA02D07749
3,128,707 UART: [art] PUB.Y = DD0146D2BC2AFA7EF0A418E82012EFD159921528D1D76063EBA1A7BDB693D689983C3792AACACDAB8FD9D151DC6B2DC2
3,135,676 UART: [art] SIG.R = E67860B69359418E9A1102E4995C8F08F54BAACC1E551C82BECBC55ECBCCE80FD7506A40E13FEE1159599AAFFDEBFF63
3,142,459 UART: [art] SIG.S = 9ACC54B7708FDE1C37E910EBD91AF504215F293E4CCA9D5FFE74542ADDA4BB9F4473D2207478BF8F4AB60710F842AEAF
3,165,826 UART: Caliptra RT
3,166,079 UART: [state] CFI Enabled
3,275,307 UART: [rt] RT listening for mailbox commands...
3,275,977 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,097 UART: [rt]cmd =0x44504543, len=24
3,332,162 >>> mbox cmd response data (40 bytes)
3,332,163 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,154 UART: [rt]cmd =0x44504543, len=96
3,369,343 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,454 ready_for_fw is high
1,056,454 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,873 >>> mbox cmd response: success
2,686,727 UART:
2,686,743 UART: Running Caliptra FMC ...
2,687,151 UART:
2,687,205 UART: [state] CFI Enabled
2,697,432 UART: [fht] FMC Alias Private Key: 7
2,804,623 UART: [art] Extend RT PCRs Done
2,805,051 UART: [art] Lock RT PCRs Done
2,806,579 UART: [art] Populate DV Done
2,814,634 UART: [fht] FMC Alias Private Key: 7
2,815,636 UART: [art] Derive CDI
2,815,916 UART: [art] Store in in slot 0x4
2,900,997 UART: [art] Derive Key Pair
2,901,357 UART: [art] Store priv key in slot 0x5
2,914,599 UART: [art] Derive Key Pair - Done
2,929,350 UART: [art] Signing Cert with AUTHO
2,929,830 UART: RITY.KEYID = 7
2,944,676 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,441 UART: [art] PUB.X = 3CD70D5E29E3CC79A9E052D52D3E557F9D1EB3B7031E93F9B401EED78DCE1FDCB1714B3B435B278C4BA1F617E8F6F9C2
2,952,222 UART: [art] PUB.Y = 6946022252825D5ED1272A8559710D9312E1CD60894D948CC243CF5950A917012649CC20DFA9E03194E1262F91424579
2,959,145 UART: [art] SIG.R = 7AF83BAC80BCB657C62D77B62793316972FA24DAFDB71520C392B029A4058567C9648CF2F8D5376117A0998985FC193E
2,965,910 UART: [art] SIG.S = F4CA730023349B93B8E5901F1B727A0A723D0E7588A87CA1FECF33C5C8BE499609CE39E44E1A891759A8519A8D1615C0
2,990,034 UART: Caliptra RT
2,990,287 UART: [state] CFI Enabled
3,097,332 UART: [rt] RT listening for mailbox commands...
3,098,002 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,712 UART: [rt]cmd =0x44504543, len=24
3,153,599 >>> mbox cmd response data (40 bytes)
3,153,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,517 UART: [rt]cmd =0x44504543, len=96
3,190,714 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,667 UART: [kat] SHA2-256
891,217 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,346 UART: [kat] ++
895,498 UART: [kat] sha1
899,636 UART: [kat] SHA2-256
901,576 UART: [kat] SHA2-384
904,181 UART: [kat] SHA2-512-ACC
906,082 UART: [kat] ECC-384
915,767 UART: [kat] HMAC-384Kdf
920,407 UART: [kat] LMS
1,168,719 UART: [kat] --
1,169,868 UART: [cold-reset] ++
1,170,272 UART: [fht] FHT @ 0x50003400
1,173,040 UART: [idev] ++
1,173,208 UART: [idev] CDI.KEYID = 6
1,173,569 UART: [idev] SUBJECT.KEYID = 7
1,173,994 UART: [idev] UDS.KEYID = 0
1,174,340 ready_for_fw is high
1,174,340 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,732 UART: [idev] Erasing UDS.KEYID = 0
1,198,628 UART: [idev] Sha1 KeyId Algorithm
1,207,532 UART: [idev] --
1,208,525 UART: [ldev] ++
1,208,693 UART: [ldev] CDI.KEYID = 6
1,209,057 UART: [ldev] SUBJECT.KEYID = 5
1,209,484 UART: [ldev] AUTHORITY.KEYID = 7
1,209,947 UART: [ldev] FE.KEYID = 1
1,215,217 UART: [ldev] Erasing FE.KEYID = 1
1,241,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,421 UART: [ldev] --
1,280,791 UART: [fwproc] Wait for Commands...
1,281,600 UART: [fwproc] Recv command 0x46574c44
1,282,333 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,559 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,868 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,776 >>> mbox cmd response: success
2,773,835 UART: [afmc] ++
2,774,003 UART: [afmc] CDI.KEYID = 6
2,774,366 UART: [afmc] SUBJECT.KEYID = 7
2,774,792 UART: [afmc] AUTHORITY.KEYID = 5
2,810,471 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,957 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,708 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,437 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,320 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,039 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,004 UART: [afmc] --
2,854,130 UART: [cold-reset] --
2,854,880 UART: [state] Locking Datavault
2,855,991 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,595 UART: [state] Locking ICCM
2,857,179 UART: [exit] Launching FMC @ 0x40000130
2,862,508 UART:
2,862,524 UART: Running Caliptra FMC ...
2,862,932 UART:
2,863,075 UART: [state] CFI Enabled
2,873,564 UART: [fht] FMC Alias Private Key: 7
2,981,309 UART: [art] Extend RT PCRs Done
2,981,737 UART: [art] Lock RT PCRs Done
2,983,715 UART: [art] Populate DV Done
2,991,938 UART: [fht] FMC Alias Private Key: 7
2,992,908 UART: [art] Derive CDI
2,993,188 UART: [art] Store in in slot 0x4
3,079,069 UART: [art] Derive Key Pair
3,079,429 UART: [art] Store priv key in slot 0x5
3,092,923 UART: [art] Derive Key Pair - Done
3,107,743 UART: [art] Signing Cert with AUTHO
3,108,223 UART: RITY.KEYID = 7
3,123,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,106 UART: [art] PUB.X = E6406B91E40321BA587AEF8FBEF133EEA354830ED8451A0372BA5C0A648F28733550AC08F4FE304963552C9C560095F5
3,130,839 UART: [art] PUB.Y = DD85DD4EAF4DE06CB824EE8BDF4A4BCDC09008902DC01E9088DBBEB613A4DF550234FDAD3D834720C7FFD43C7CAF0886
3,137,808 UART: [art] SIG.R = 6578240FA11338CD593341B4950253881472F70B7991197FBD2ABF790A4A898270232BED5F69FF0678BAB5BC8F1786C4
3,144,557 UART: [art] SIG.S = B1C9B457ED354661A7793421B9C5581523A74E4ACB17AF26C1EA92E55EF5C1CCEBC518D293F83E799473C4327934A553
3,168,432 UART: Caliptra RT
3,168,777 UART: [state] CFI Enabled
3,276,384 UART: [rt] RT listening for mailbox commands...
3,277,054 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,024 UART: [rt]cmd =0x44504543, len=24
3,333,311 >>> mbox cmd response data (40 bytes)
3,333,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,061 UART: [rt]cmd =0x44504543, len=96
3,370,088 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,455 ready_for_fw is high
1,056,455 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,580 >>> mbox cmd response: success
2,686,200 UART:
2,686,216 UART: Running Caliptra FMC ...
2,686,624 UART:
2,686,767 UART: [state] CFI Enabled
2,697,376 UART: [fht] FMC Alias Private Key: 7
2,805,591 UART: [art] Extend RT PCRs Done
2,806,019 UART: [art] Lock RT PCRs Done
2,807,559 UART: [art] Populate DV Done
2,815,938 UART: [fht] FMC Alias Private Key: 7
2,816,972 UART: [art] Derive CDI
2,817,252 UART: [art] Store in in slot 0x4
2,902,917 UART: [art] Derive Key Pair
2,903,277 UART: [art] Store priv key in slot 0x5
2,916,463 UART: [art] Derive Key Pair - Done
2,931,005 UART: [art] Signing Cert with AUTHO
2,931,485 UART: RITY.KEYID = 7
2,946,873 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,638 UART: [art] PUB.X = 77D978AC2AE6F2E0FFA652BA90342AFF91A63D6347273230F6EC9CCCB5481E769A80C185338F726BE5462C82A9595EE1
2,954,414 UART: [art] PUB.Y = 109C6F6D0C38C21EBDFC740793D131D7D76D1079D6BCF7E212B5634D03DEBA6A1BBA3A76C75793403C9CA4E9995748D9
2,961,365 UART: [art] SIG.R = 9F5E49B4499D89598E11E8CD411864A152CD0DE312A68061174BC90C41241E6281B15E2F5C78A675B6F3B955729D3D62
2,968,123 UART: [art] SIG.S = 93072491333BB05CB8FA6C04E4518B1F529F6AEA1D75716ED365E5C011FFCEC9116AAE2C4FE00014F61B2046E707E254
2,991,753 UART: Caliptra RT
2,992,098 UART: [state] CFI Enabled
3,099,110 UART: [rt] RT listening for mailbox commands...
3,099,780 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,594 UART: [rt]cmd =0x44504543, len=24
3,155,473 >>> mbox cmd response data (40 bytes)
3,155,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,441 UART: [rt]cmd =0x44504543, len=96
3,192,452 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,643 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,227 UART: [kat] SHA2-256
882,158 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,273 UART: [kat] ++
886,425 UART: [kat] sha1
890,667 UART: [kat] SHA2-256
892,605 UART: [kat] SHA2-384
895,406 UART: [kat] SHA2-512-ACC
897,307 UART: [kat] ECC-384
903,116 UART: [kat] HMAC-384Kdf
907,736 UART: [kat] LMS
1,475,932 UART: [kat] --
1,476,765 UART: [cold-reset] ++
1,477,237 UART: [fht] Storing FHT @ 0x50003400
1,479,924 UART: [idev] ++
1,480,092 UART: [idev] CDI.KEYID = 6
1,480,452 UART: [idev] SUBJECT.KEYID = 7
1,480,876 UART: [idev] UDS.KEYID = 0
1,481,221 ready_for_fw is high
1,481,221 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,656 UART: [idev] Erasing UDS.KEYID = 0
1,505,124 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,768 UART: [idev] --
1,514,991 UART: [ldev] ++
1,515,159 UART: [ldev] CDI.KEYID = 6
1,515,522 UART: [ldev] SUBJECT.KEYID = 5
1,515,948 UART: [ldev] AUTHORITY.KEYID = 7
1,516,411 UART: [ldev] FE.KEYID = 1
1,521,669 UART: [ldev] Erasing FE.KEYID = 1
1,547,108 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,292 UART: [ldev] --
1,586,801 UART: [fwproc] Waiting for Commands...
1,587,416 UART: [fwproc] Received command 0x46574c44
1,588,207 UART: [fwproc] Received Image of size 114332 bytes
2,885,563 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,555 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,907 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,888 >>> mbox cmd response: success
3,079,076 UART: [afmc] ++
3,079,244 UART: [afmc] CDI.KEYID = 6
3,079,606 UART: [afmc] SUBJECT.KEYID = 7
3,080,031 UART: [afmc] AUTHORITY.KEYID = 5
3,115,064 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,518 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,298 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,026 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,911 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,601 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,456 UART: [afmc] --
3,158,566 UART: [cold-reset] --
3,159,454 UART: [state] Locking Datavault
3,160,309 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,913 UART: [state] Locking ICCM
3,161,337 UART: [exit] Launching FMC @ 0x40000130
3,166,666 UART:
3,166,682 UART: Running Caliptra FMC ...
3,167,090 UART:
3,167,144 UART: [state] CFI Enabled
3,177,525 UART: [fht] FMC Alias Private Key: 7
3,285,288 UART: [art] Extend RT PCRs Done
3,285,716 UART: [art] Lock RT PCRs Done
3,287,044 UART: [art] Populate DV Done
3,295,215 UART: [fht] FMC Alias Private Key: 7
3,296,227 UART: [art] Derive CDI
3,296,507 UART: [art] Store in in slot 0x4
3,382,024 UART: [art] Derive Key Pair
3,382,384 UART: [art] Store priv key in slot 0x5
3,395,170 UART: [art] Derive Key Pair - Done
3,409,932 UART: [art] Signing Cert with AUTHO
3,410,412 UART: RITY.KEYID = 7
3,425,698 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,463 UART: [art] PUB.X = 37955EE910FF4A7C72690BFD0FD07B7E437246DD352AB95B8E8136CC7428836E5DB985FA788C9BFDB7821D20CB6B1EA4
3,433,239 UART: [art] PUB.Y = 82B4B5BB1EB3FC39EFD8F95746C04BFED8A3821C63F8134EA1454330C27C00AA46EAFC2701EDEB6D6273E529B4E04D89
3,440,180 UART: [art] SIG.R = 22AD248C13229E8E8C585DDDE260A6F0357002C1AB9F5FEB234531A8F61A38315ACFA94134AE6D7A13E7A556F268C812
3,446,953 UART: [art] SIG.S = DA2757B798DD9FDA108B8E555D1D56BB139AF46933B33825B011007AF65311C0ED412AD3997DCF2D1B8E7303D814C72D
3,471,017 UART: Caliptra RT
3,471,270 UART: [state] CFI Enabled
3,578,755 UART: [rt] RT listening for mailbox commands...
3,579,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,933 UART: [rt]cmd =0x44504543, len=96
3,617,045 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,543 ready_for_fw is high
1,362,543 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,058 >>> mbox cmd response: success
2,988,164 UART:
2,988,180 UART: Running Caliptra FMC ...
2,988,588 UART:
2,988,642 UART: [state] CFI Enabled
2,999,223 UART: [fht] FMC Alias Private Key: 7
3,107,092 UART: [art] Extend RT PCRs Done
3,107,520 UART: [art] Lock RT PCRs Done
3,109,084 UART: [art] Populate DV Done
3,117,425 UART: [fht] FMC Alias Private Key: 7
3,118,495 UART: [art] Derive CDI
3,118,775 UART: [art] Store in in slot 0x4
3,204,544 UART: [art] Derive Key Pair
3,204,904 UART: [art] Store priv key in slot 0x5
3,217,344 UART: [art] Derive Key Pair - Done
3,232,109 UART: [art] Signing Cert with AUTHO
3,232,589 UART: RITY.KEYID = 7
3,247,579 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,344 UART: [art] PUB.X = BB4735531F36659C7E6DF92155B91EB9DB168350C339752BB3D03E85385F59D5DCEFD0A4AF368EA5AE70122E146084C4
3,255,118 UART: [art] PUB.Y = F0FD6432B4675888D470B065DFD85D9B3A3BB94C132F939107D1919F21EABBD86ACC15FBF4ED2A8E0735B4FFFB779014
3,262,076 UART: [art] SIG.R = F5384DF0031103333E211D4EA79C34D4D938AE34381ABAD5087F61E2682E6C7547D160BBBF9E92F8D49E1461FB242AF9
3,268,841 UART: [art] SIG.S = A9C57609A54527F59F95D0CCB3C0B01714D890BB5A813A1D0019E040B2721C822105CAEF7C58FDE4F9A5F63E4EA85F11
3,292,376 UART: Caliptra RT
3,292,629 UART: [state] CFI Enabled
3,401,217 UART: [rt] RT listening for mailbox commands...
3,401,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,545 UART: [rt]cmd =0x44504543, len=96
3,439,911 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,939 UART: [state] LifecycleState = Unprovisioned
85,594 UART: [state] DebugLocked = No
86,076 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,734 UART: [kat] SHA2-256
881,665 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,780 UART: [kat] ++
885,932 UART: [kat] sha1
890,266 UART: [kat] SHA2-256
892,204 UART: [kat] SHA2-384
894,955 UART: [kat] SHA2-512-ACC
896,856 UART: [kat] ECC-384
902,113 UART: [kat] HMAC-384Kdf
906,917 UART: [kat] LMS
1,475,113 UART: [kat] --
1,475,786 UART: [cold-reset] ++
1,476,134 UART: [fht] Storing FHT @ 0x50003400
1,478,887 UART: [idev] ++
1,479,055 UART: [idev] CDI.KEYID = 6
1,479,415 UART: [idev] SUBJECT.KEYID = 7
1,479,839 UART: [idev] UDS.KEYID = 0
1,480,184 ready_for_fw is high
1,480,184 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,837 UART: [idev] Erasing UDS.KEYID = 0
1,504,665 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,295 UART: [idev] --
1,514,276 UART: [ldev] ++
1,514,444 UART: [ldev] CDI.KEYID = 6
1,514,807 UART: [ldev] SUBJECT.KEYID = 5
1,515,233 UART: [ldev] AUTHORITY.KEYID = 7
1,515,696 UART: [ldev] FE.KEYID = 1
1,520,984 UART: [ldev] Erasing FE.KEYID = 1
1,546,321 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,375 UART: [ldev] --
1,585,698 UART: [fwproc] Waiting for Commands...
1,586,555 UART: [fwproc] Received command 0x46574c44
1,587,346 UART: [fwproc] Received Image of size 114332 bytes
2,885,412 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,570 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,922 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,815 >>> mbox cmd response: success
3,078,825 UART: [afmc] ++
3,078,993 UART: [afmc] CDI.KEYID = 6
3,079,355 UART: [afmc] SUBJECT.KEYID = 7
3,079,780 UART: [afmc] AUTHORITY.KEYID = 5
3,115,405 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,489 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,269 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,997 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,882 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,572 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,459 UART: [afmc] --
3,158,555 UART: [cold-reset] --
3,159,345 UART: [state] Locking Datavault
3,160,336 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,940 UART: [state] Locking ICCM
3,161,476 UART: [exit] Launching FMC @ 0x40000130
3,166,805 UART:
3,166,821 UART: Running Caliptra FMC ...
3,167,229 UART:
3,167,372 UART: [state] CFI Enabled
3,177,669 UART: [fht] FMC Alias Private Key: 7
3,285,612 UART: [art] Extend RT PCRs Done
3,286,040 UART: [art] Lock RT PCRs Done
3,287,922 UART: [art] Populate DV Done
3,296,043 UART: [fht] FMC Alias Private Key: 7
3,297,155 UART: [art] Derive CDI
3,297,435 UART: [art] Store in in slot 0x4
3,383,546 UART: [art] Derive Key Pair
3,383,906 UART: [art] Store priv key in slot 0x5
3,397,428 UART: [art] Derive Key Pair - Done
3,412,186 UART: [art] Signing Cert with AUTHO
3,412,666 UART: RITY.KEYID = 7
3,427,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,419 UART: [art] PUB.X = 13921C0EAEC2DCE8E4D4CBA773EBF87A7FA9A874B8C2DF26FFBD781F03FF5708526A64A581026F58ED322CEB79A020F8
3,435,197 UART: [art] PUB.Y = 6DC21EAF7DB5620B7A30D983FE67750D77FAE21701DE0361C71685D3D9FE932D84F8935F0FDB908EC4725EAA0A22EC63
3,442,141 UART: [art] SIG.R = C7A90B9312BEC3EDB0DA1D42EE11EE8F73DAC88074077C17407F005F0D9C60CCED43D5C509A7A7E67BE745725B4DAC90
3,448,895 UART: [art] SIG.S = 0098DCF3D3B581B1142A324AF2724CE042BA52F02E3B7FBF5A5E87C2B1D55D3CABFA848E2F7920FFA97A035861974D7D
3,472,555 UART: Caliptra RT
3,472,900 UART: [state] CFI Enabled
3,581,036 UART: [rt] RT listening for mailbox commands...
3,581,706 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,326 UART: [rt]cmd =0x44504543, len=96
3,619,368 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,566 ready_for_fw is high
1,363,566 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,855 >>> mbox cmd response: success
2,988,713 UART:
2,988,729 UART: Running Caliptra FMC ...
2,989,137 UART:
2,989,280 UART: [state] CFI Enabled
2,999,767 UART: [fht] FMC Alias Private Key: 7
3,107,494 UART: [art] Extend RT PCRs Done
3,107,922 UART: [art] Lock RT PCRs Done
3,109,400 UART: [art] Populate DV Done
3,117,943 UART: [fht] FMC Alias Private Key: 7
3,118,959 UART: [art] Derive CDI
3,119,239 UART: [art] Store in in slot 0x4
3,205,256 UART: [art] Derive Key Pair
3,205,616 UART: [art] Store priv key in slot 0x5
3,218,984 UART: [art] Derive Key Pair - Done
3,233,776 UART: [art] Signing Cert with AUTHO
3,234,256 UART: RITY.KEYID = 7
3,249,334 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,099 UART: [art] PUB.X = 1733537A89ACCBF3799E581C3462DBA004D26C3592A70ACB87A7754CBE055FC847D2B07D8AF368ADC5E1DCB77D24DA18
3,256,874 UART: [art] PUB.Y = E3266F570D20E0C102A8FB0A7E02CAB322FEC5068776769CECFCDAC03303A86D05947D1C60463EDBB4C18C4FF2A7BA04
3,263,816 UART: [art] SIG.R = 3F2EE1408E5E07D25E241FF4192EF92EE959ACAC922479ECA8499B012A77C64455415AECA6D90FD5A1DFEE5B2E9E4F8E
3,270,595 UART: [art] SIG.S = 7CFE4FDE33EC287739698A5E2FFAC6815D00D7DE23ABA73051FAA7CB58A754601592292CCAC108FD43A8A8685FB1602D
3,294,517 UART: Caliptra RT
3,294,862 UART: [state] CFI Enabled
3,403,886 UART: [rt] RT listening for mailbox commands...
3,404,556 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,068 UART: [rt]cmd =0x44504543, len=96
3,442,202 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,009 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
893,012 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,137 UART: [kat] ++
897,289 UART: [kat] sha1
901,593 UART: [kat] SHA2-256
903,533 UART: [kat] SHA2-384
906,340 UART: [kat] SHA2-512-ACC
908,241 UART: [kat] ECC-384
917,776 UART: [kat] HMAC-384Kdf
922,424 UART: [kat] LMS
1,170,752 UART: [kat] --
1,171,675 UART: [cold-reset] ++
1,172,151 UART: [fht] FHT @ 0x50003400
1,174,788 UART: [idev] ++
1,174,956 UART: [idev] CDI.KEYID = 6
1,175,316 UART: [idev] SUBJECT.KEYID = 7
1,175,740 UART: [idev] UDS.KEYID = 0
1,176,085 ready_for_fw is high
1,176,085 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,926 UART: [idev] Erasing UDS.KEYID = 0
1,201,117 UART: [idev] Sha1 KeyId Algorithm
1,209,513 UART: [idev] --
1,210,583 UART: [ldev] ++
1,210,751 UART: [ldev] CDI.KEYID = 6
1,211,114 UART: [ldev] SUBJECT.KEYID = 5
1,211,540 UART: [ldev] AUTHORITY.KEYID = 7
1,212,003 UART: [ldev] FE.KEYID = 1
1,217,315 UART: [ldev] Erasing FE.KEYID = 1
1,243,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,565 UART: [ldev] --
1,283,022 UART: [fwproc] Wait for Commands...
1,283,696 UART: [fwproc] Recv command 0x46574c44
1,284,424 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,866 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,170 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,081 >>> mbox cmd response: success
2,775,193 UART: [afmc] ++
2,775,361 UART: [afmc] CDI.KEYID = 6
2,775,723 UART: [afmc] SUBJECT.KEYID = 7
2,776,148 UART: [afmc] AUTHORITY.KEYID = 5
2,811,543 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,080 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,808 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,693 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,412 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,338 UART: [afmc] --
2,855,246 UART: [cold-reset] --
2,856,134 UART: [state] Locking Datavault
2,857,589 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,193 UART: [state] Locking ICCM
2,858,649 UART: [exit] Launching FMC @ 0x40000130
2,863,978 UART:
2,863,994 UART: Running Caliptra FMC ...
2,864,402 UART:
2,864,456 UART: [state] CFI Enabled
2,874,905 UART: [fht] FMC Alias Private Key: 7
2,983,030 UART: [art] Extend RT PCRs Done
2,983,458 UART: [art] Lock RT PCRs Done
2,984,930 UART: [art] Populate DV Done
2,993,069 UART: [fht] FMC Alias Private Key: 7
2,994,101 UART: [art] Derive CDI
2,994,381 UART: [art] Store in in slot 0x4
3,080,120 UART: [art] Derive Key Pair
3,080,480 UART: [art] Store priv key in slot 0x5
3,093,482 UART: [art] Derive Key Pair - Done
3,108,831 UART: [art] Signing Cert with AUTHO
3,109,311 UART: RITY.KEYID = 7
3,123,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,550 UART: [art] PUB.X = 9A6AE91FF507229375991557A40497440A4543E0A50F3DB787C07B484C9BA43D495E136EE4D0415525C0BE4EF1DE00D8
3,131,284 UART: [art] PUB.Y = 86AF42234F9FE3AE2B2C2671EE1B2F47C358B149918BC786E85FC1F8A2EDBC000A9FAAC08DBA1C4817F5C9DD6BE53930
3,138,229 UART: [art] SIG.R = E28AF85DF6370DF92F55AB42E94A16816BE8EDE089F0909A1C397EB182B1A2E15875D9013C776E7C3AB513B0157D612B
3,144,999 UART: [art] SIG.S = AF1F292450D12B113815BB44D754CFBF1441AE20148ED1762C7300B3DB55617042FA405CAB5F9DB0524CE9FAFED80D0E
3,168,440 UART: Caliptra RT
3,168,693 UART: [state] CFI Enabled
3,277,061 UART: [rt] RT listening for mailbox commands...
3,277,731 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,981 UART: [rt]cmd =0x44504543, len=96
3,315,339 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,863 ready_for_fw is high
1,060,863 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,984 >>> mbox cmd response: success
2,689,634 UART:
2,689,650 UART: Running Caliptra FMC ...
2,690,058 UART:
2,690,112 UART: [state] CFI Enabled
2,700,367 UART: [fht] FMC Alias Private Key: 7
2,808,272 UART: [art] Extend RT PCRs Done
2,808,700 UART: [art] Lock RT PCRs Done
2,810,164 UART: [art] Populate DV Done
2,818,337 UART: [fht] FMC Alias Private Key: 7
2,819,309 UART: [art] Derive CDI
2,819,589 UART: [art] Store in in slot 0x4
2,905,078 UART: [art] Derive Key Pair
2,905,438 UART: [art] Store priv key in slot 0x5
2,918,644 UART: [art] Derive Key Pair - Done
2,933,281 UART: [art] Signing Cert with AUTHO
2,933,761 UART: RITY.KEYID = 7
2,948,627 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,392 UART: [art] PUB.X = 3D9F54E3B820BD926C8F568A9F206987F7250EF060AF404AD515425DDDF3B222E307889ADF92E5538EB9D565D51C678D
2,956,160 UART: [art] PUB.Y = E7AD03D47E26A26A86FF25361A1E2499C77B60E33135305D7FA9820339229ECC058E02A7CB87BDAF3F0A19FE9F3F2287
2,963,101 UART: [art] SIG.R = E13BEC244DAB0EFA34DF2CB5A853390C1C11222C254F7C7DA38A19E7B2A8F6018B3A9A380E7B32F36A8E945B8A78835F
2,969,873 UART: [art] SIG.S = 48831603FDBE19CA5FE8CCFCEC33219827519C9F808F8D009105611B84A30D60A5F2A135E4468B9EBFB4F1130EE935EE
2,993,826 UART: Caliptra RT
2,994,079 UART: [state] CFI Enabled
3,101,816 UART: [rt] RT listening for mailbox commands...
3,102,486 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,862 UART: [rt]cmd =0x44504543, len=96
3,139,788 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,592 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
893,545 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,670 UART: [kat] ++
897,822 UART: [kat] sha1
902,014 UART: [kat] SHA2-256
903,954 UART: [kat] SHA2-384
906,791 UART: [kat] SHA2-512-ACC
908,692 UART: [kat] ECC-384
918,985 UART: [kat] HMAC-384Kdf
923,535 UART: [kat] LMS
1,171,863 UART: [kat] --
1,172,706 UART: [cold-reset] ++
1,173,212 UART: [fht] FHT @ 0x50003400
1,176,023 UART: [idev] ++
1,176,191 UART: [idev] CDI.KEYID = 6
1,176,551 UART: [idev] SUBJECT.KEYID = 7
1,176,975 UART: [idev] UDS.KEYID = 0
1,177,320 ready_for_fw is high
1,177,320 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,819 UART: [idev] Erasing UDS.KEYID = 0
1,201,440 UART: [idev] Sha1 KeyId Algorithm
1,209,868 UART: [idev] --
1,210,914 UART: [ldev] ++
1,211,082 UART: [ldev] CDI.KEYID = 6
1,211,445 UART: [ldev] SUBJECT.KEYID = 5
1,211,871 UART: [ldev] AUTHORITY.KEYID = 7
1,212,334 UART: [ldev] FE.KEYID = 1
1,217,806 UART: [ldev] Erasing FE.KEYID = 1
1,244,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,668 UART: [ldev] --
1,283,971 UART: [fwproc] Wait for Commands...
1,284,787 UART: [fwproc] Recv command 0x46574c44
1,285,515 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,463 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,767 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,680 >>> mbox cmd response: success
2,776,854 UART: [afmc] ++
2,777,022 UART: [afmc] CDI.KEYID = 6
2,777,384 UART: [afmc] SUBJECT.KEYID = 7
2,777,809 UART: [afmc] AUTHORITY.KEYID = 5
2,813,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,217 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,945 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,830 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,549 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,465 UART: [afmc] --
2,856,393 UART: [cold-reset] --
2,857,255 UART: [state] Locking Datavault
2,858,586 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,190 UART: [state] Locking ICCM
2,859,772 UART: [exit] Launching FMC @ 0x40000130
2,865,101 UART:
2,865,117 UART: Running Caliptra FMC ...
2,865,525 UART:
2,865,668 UART: [state] CFI Enabled
2,876,543 UART: [fht] FMC Alias Private Key: 7
2,984,530 UART: [art] Extend RT PCRs Done
2,984,958 UART: [art] Lock RT PCRs Done
2,986,512 UART: [art] Populate DV Done
2,994,635 UART: [fht] FMC Alias Private Key: 7
2,995,761 UART: [art] Derive CDI
2,996,041 UART: [art] Store in in slot 0x4
3,081,460 UART: [art] Derive Key Pair
3,081,820 UART: [art] Store priv key in slot 0x5
3,094,894 UART: [art] Derive Key Pair - Done
3,109,971 UART: [art] Signing Cert with AUTHO
3,110,451 UART: RITY.KEYID = 7
3,125,745 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,510 UART: [art] PUB.X = 5E904E89E52BE5E9CEF81B09B08CC48DC78646ED32F0F59F8E7286B037A208A513A344A276EE5AE14688CCC12FDDF8B8
3,133,288 UART: [art] PUB.Y = 310988071831BA28ED997E35A60B4B9AEE95A4891524FB197B7AACFB704E1060A593A042556F7A7A86C06D8335212951
3,140,223 UART: [art] SIG.R = 437B611D5C3F6B107A5ED2676AA1A61337C9DB6CD10A2EC25B52184366729E8A5D2F7346AF41B97838BBC0B7789A8F70
3,146,994 UART: [art] SIG.S = CDCCD30A5379D1F6DBD9D3B747E6B72EEA40C0755840044F83CB9D0C224575899571F6794BB0002606CDE89D8D0E18EC
3,171,198 UART: Caliptra RT
3,171,543 UART: [state] CFI Enabled
3,279,252 UART: [rt] RT listening for mailbox commands...
3,279,922 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,292 UART: [rt]cmd =0x44504543, len=96
3,317,682 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,948 ready_for_fw is high
1,060,948 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,803 >>> mbox cmd response: success
2,689,171 UART:
2,689,187 UART: Running Caliptra FMC ...
2,689,595 UART:
2,689,738 UART: [state] CFI Enabled
2,700,265 UART: [fht] FMC Alias Private Key: 7
2,808,232 UART: [art] Extend RT PCRs Done
2,808,660 UART: [art] Lock RT PCRs Done
2,810,362 UART: [art] Populate DV Done
2,818,621 UART: [fht] FMC Alias Private Key: 7
2,819,571 UART: [art] Derive CDI
2,819,851 UART: [art] Store in in slot 0x4
2,905,580 UART: [art] Derive Key Pair
2,905,940 UART: [art] Store priv key in slot 0x5
2,919,256 UART: [art] Derive Key Pair - Done
2,934,120 UART: [art] Signing Cert with AUTHO
2,934,600 UART: RITY.KEYID = 7
2,949,698 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,463 UART: [art] PUB.X = 1BABFE52F341426067D501143A769621BB588CE7DCB4EE034F94C97AC3BA987D69676BF8C4363B403D9E143EA86B9C74
2,957,233 UART: [art] PUB.Y = 9644964F73E44A2937D37953D124F4369CB1C06A12DF40D33AD2CCF64049B78A64DCCEBD9C6B7A08303630F819591C18
2,964,180 UART: [art] SIG.R = 2F5C85A1FCA0647BD31268AB39E1BA7869267B56DF7D3419237C50046213AC775D4FE91AC0FD32AA3F73D0E82CE2A862
2,970,955 UART: [art] SIG.S = D64C0BBA3BEF46966E413E1112AF81391BE2D25473E1C733B42C1F13F39129D5C873DF1ACBFFBFB2F6E88853EA37601F
2,994,675 UART: Caliptra RT
2,995,020 UART: [state] CFI Enabled
3,102,315 UART: [rt] RT listening for mailbox commands...
3,102,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,261 UART: [rt]cmd =0x44504543, len=96
3,140,617 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,876 UART: [state] LifecycleState = Unprovisioned
85,531 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,440 UART: [kat] SHA2-256
890,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,119 UART: [kat] ++
895,271 UART: [kat] sha1
899,653 UART: [kat] SHA2-256
901,593 UART: [kat] SHA2-384
904,248 UART: [kat] SHA2-512-ACC
906,149 UART: [kat] ECC-384
915,744 UART: [kat] HMAC-384Kdf
920,424 UART: [kat] LMS
1,168,736 UART: [kat] --
1,170,025 UART: [cold-reset] ++
1,170,559 UART: [fht] FHT @ 0x50003400
1,173,093 UART: [idev] ++
1,173,261 UART: [idev] CDI.KEYID = 6
1,173,622 UART: [idev] SUBJECT.KEYID = 7
1,174,047 UART: [idev] UDS.KEYID = 0
1,174,393 ready_for_fw is high
1,174,393 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,015 UART: [idev] Erasing UDS.KEYID = 0
1,198,803 UART: [idev] Sha1 KeyId Algorithm
1,207,815 UART: [idev] --
1,208,958 UART: [ldev] ++
1,209,126 UART: [ldev] CDI.KEYID = 6
1,209,490 UART: [ldev] SUBJECT.KEYID = 5
1,209,917 UART: [ldev] AUTHORITY.KEYID = 7
1,210,380 UART: [ldev] FE.KEYID = 1
1,215,316 UART: [ldev] Erasing FE.KEYID = 1
1,241,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,110 UART: [ldev] --
1,280,558 UART: [fwproc] Wait for Commands...
1,281,237 UART: [fwproc] Recv command 0x46574c44
1,281,970 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,228 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,537 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,235 >>> mbox cmd response: success
2,773,432 UART: [afmc] ++
2,773,600 UART: [afmc] CDI.KEYID = 6
2,773,963 UART: [afmc] SUBJECT.KEYID = 7
2,774,389 UART: [afmc] AUTHORITY.KEYID = 5
2,809,832 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,053 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,782 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,665 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,384 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,071 UART: [afmc] --
2,853,027 UART: [cold-reset] --
2,853,889 UART: [state] Locking Datavault
2,855,236 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,840 UART: [state] Locking ICCM
2,856,278 UART: [exit] Launching FMC @ 0x40000130
2,861,607 UART:
2,861,623 UART: Running Caliptra FMC ...
2,862,031 UART:
2,862,085 UART: [state] CFI Enabled
2,872,380 UART: [fht] FMC Alias Private Key: 7
2,980,527 UART: [art] Extend RT PCRs Done
2,980,955 UART: [art] Lock RT PCRs Done
2,982,321 UART: [art] Populate DV Done
2,990,756 UART: [fht] FMC Alias Private Key: 7
2,991,766 UART: [art] Derive CDI
2,992,046 UART: [art] Store in in slot 0x4
3,077,227 UART: [art] Derive Key Pair
3,077,587 UART: [art] Store priv key in slot 0x5
3,091,741 UART: [art] Derive Key Pair - Done
3,106,575 UART: [art] Signing Cert with AUTHO
3,107,055 UART: RITY.KEYID = 7
3,122,415 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,180 UART: [art] PUB.X = 106E5259A7F7F5B9CBFF70440D17C214880F020C0B910A070C0C987BE2F44C0C23AC4573D9C7653B11FA48147EFA1157
3,129,922 UART: [art] PUB.Y = 658E74424127350C145523232BA9A006DE294CF2F22706C78863D2932E18091039784A1E6C41826BF25CC5ED04912FAC
3,136,845 UART: [art] SIG.R = 0E4732E7E418B9A85008EA64B7A941E1F2E305613ABB2AFA0420728C3FE069D57C0D7F68CC70EA0DE87948619EE24C8A
3,143,605 UART: [art] SIG.S = 3EC8B7D44B9115B7BA17FCEF28BD78E85A2698F7E9FF7352D0A5753827C78CE1126B240B6D6D5F24EB752E52192866CC
3,167,407 UART: Caliptra RT
3,167,660 UART: [state] CFI Enabled
3,275,623 UART: [rt] RT listening for mailbox commands...
3,276,293 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,563 UART: [rt]cmd =0x44504543, len=96
3,314,141 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,044 ready_for_fw is high
1,057,044 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,921 >>> mbox cmd response: success
2,686,023 UART:
2,686,039 UART: Running Caliptra FMC ...
2,686,447 UART:
2,686,501 UART: [state] CFI Enabled
2,696,958 UART: [fht] FMC Alias Private Key: 7
2,804,679 UART: [art] Extend RT PCRs Done
2,805,107 UART: [art] Lock RT PCRs Done
2,806,665 UART: [art] Populate DV Done
2,814,934 UART: [fht] FMC Alias Private Key: 7
2,816,032 UART: [art] Derive CDI
2,816,312 UART: [art] Store in in slot 0x4
2,901,301 UART: [art] Derive Key Pair
2,901,661 UART: [art] Store priv key in slot 0x5
2,914,931 UART: [art] Derive Key Pair - Done
2,929,758 UART: [art] Signing Cert with AUTHO
2,930,238 UART: RITY.KEYID = 7
2,945,544 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,309 UART: [art] PUB.X = 0622CC65B8D4900CEF9F29EF9AC64011B8046B7AA7B680F09E62FAD22A0EBC38C4D9A2FDD2E53A8C51AD544DB3837BB3
2,953,087 UART: [art] PUB.Y = F5EAE3D601221708AC1A8F47D011DD2BE086D89B0ECCA6EA1E510C2B899AB634EF46B7EEAA119C4091F07FD64899F395
2,960,041 UART: [art] SIG.R = AB9F088DFF368213197F1585F7A751BCCDC5129B72BA5C9E6B10585ABA584711F24647125AC304ED574F71BF097EE831
2,966,806 UART: [art] SIG.S = ACDD5D737FA534EEC861747C1270C4965E5DD35FE5BB46D8EAFC808911A0867022000B99917B094459188BEC8F452B73
2,990,523 UART: Caliptra RT
2,990,776 UART: [state] CFI Enabled
3,098,344 UART: [rt] RT listening for mailbox commands...
3,099,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,260 UART: [rt]cmd =0x44504543, len=96
3,136,568 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,690 UART: [state] DebugLocked = No
86,382 UART: [state] WD Timer not started. Device not locked for debugging
87,721 UART: [kat] SHA2-256
891,271 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,400 UART: [kat] ++
895,552 UART: [kat] sha1
899,648 UART: [kat] SHA2-256
901,588 UART: [kat] SHA2-384
904,269 UART: [kat] SHA2-512-ACC
906,170 UART: [kat] ECC-384
915,587 UART: [kat] HMAC-384Kdf
920,207 UART: [kat] LMS
1,168,519 UART: [kat] --
1,169,464 UART: [cold-reset] ++
1,169,836 UART: [fht] FHT @ 0x50003400
1,172,638 UART: [idev] ++
1,172,806 UART: [idev] CDI.KEYID = 6
1,173,167 UART: [idev] SUBJECT.KEYID = 7
1,173,592 UART: [idev] UDS.KEYID = 0
1,173,938 ready_for_fw is high
1,173,938 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,748 UART: [idev] Erasing UDS.KEYID = 0
1,198,906 UART: [idev] Sha1 KeyId Algorithm
1,207,774 UART: [idev] --
1,208,857 UART: [ldev] ++
1,209,025 UART: [ldev] CDI.KEYID = 6
1,209,389 UART: [ldev] SUBJECT.KEYID = 5
1,209,816 UART: [ldev] AUTHORITY.KEYID = 7
1,210,279 UART: [ldev] FE.KEYID = 1
1,215,617 UART: [ldev] Erasing FE.KEYID = 1
1,242,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,743 UART: [ldev] --
1,281,091 UART: [fwproc] Wait for Commands...
1,281,710 UART: [fwproc] Recv command 0x46574c44
1,282,443 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,845 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,154 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,010 >>> mbox cmd response: success
2,773,207 UART: [afmc] ++
2,773,375 UART: [afmc] CDI.KEYID = 6
2,773,738 UART: [afmc] SUBJECT.KEYID = 7
2,774,164 UART: [afmc] AUTHORITY.KEYID = 5
2,810,099 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,191 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,942 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,671 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,554 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,273 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,026 UART: [afmc] --
2,853,040 UART: [cold-reset] --
2,853,858 UART: [state] Locking Datavault
2,855,141 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,745 UART: [state] Locking ICCM
2,856,343 UART: [exit] Launching FMC @ 0x40000130
2,861,672 UART:
2,861,688 UART: Running Caliptra FMC ...
2,862,096 UART:
2,862,239 UART: [state] CFI Enabled
2,872,886 UART: [fht] FMC Alias Private Key: 7
2,980,695 UART: [art] Extend RT PCRs Done
2,981,123 UART: [art] Lock RT PCRs Done
2,982,441 UART: [art] Populate DV Done
2,990,570 UART: [fht] FMC Alias Private Key: 7
2,991,516 UART: [art] Derive CDI
2,991,796 UART: [art] Store in in slot 0x4
3,077,531 UART: [art] Derive Key Pair
3,077,891 UART: [art] Store priv key in slot 0x5
3,090,729 UART: [art] Derive Key Pair - Done
3,105,417 UART: [art] Signing Cert with AUTHO
3,105,897 UART: RITY.KEYID = 7
3,120,935 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,700 UART: [art] PUB.X = 4AD51EBD7E4C4D4DB10D9AAFFC3CB729E953D289A5B7237DCAC40F6C7BD4208400EB3C3836EF3FA494FF837EBBA638A7
3,128,468 UART: [art] PUB.Y = BD3A8BB3FA6235AEA4651CF845775B6BB871EFDD2C2E0A2A3258B9327428FF1D44D045327CEF6126586F971EC44F9068
3,135,423 UART: [art] SIG.R = E0FA845691EEDEFD2A3AEC8F91687AEA96E77A48BE1FDF2552D6D5BE9AC8973835FC7AE2A6592DBB850CEC88C62C4274
3,142,214 UART: [art] SIG.S = 8A19FA9D48FAB62932312AB87B0DFA6401DBCFCE2DC2864EE92FB0B51E5036DE545E991A654A39B4E03C353096E4C857
3,165,579 UART: Caliptra RT
3,165,924 UART: [state] CFI Enabled
3,273,536 UART: [rt] RT listening for mailbox commands...
3,274,206 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,584 UART: [rt]cmd =0x44504543, len=96
3,311,826 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,409 ready_for_fw is high
1,056,409 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,306 >>> mbox cmd response: success
2,686,116 UART:
2,686,132 UART: Running Caliptra FMC ...
2,686,540 UART:
2,686,683 UART: [state] CFI Enabled
2,697,098 UART: [fht] FMC Alias Private Key: 7
2,805,295 UART: [art] Extend RT PCRs Done
2,805,723 UART: [art] Lock RT PCRs Done
2,807,369 UART: [art] Populate DV Done
2,815,534 UART: [fht] FMC Alias Private Key: 7
2,816,482 UART: [art] Derive CDI
2,816,762 UART: [art] Store in in slot 0x4
2,902,397 UART: [art] Derive Key Pair
2,902,757 UART: [art] Store priv key in slot 0x5
2,915,823 UART: [art] Derive Key Pair - Done
2,930,474 UART: [art] Signing Cert with AUTHO
2,930,954 UART: RITY.KEYID = 7
2,946,128 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,893 UART: [art] PUB.X = 0460B82B0843F7C2369366028937100D1BFCF0C3271FB50177700B8FD2CA894F3FE6100C2990BA66BA9109B7B6791020
2,953,631 UART: [art] PUB.Y = D6975F9AC8314CD3A6D26FBE0874C8B5BE90F7574E55B0D5C357EAD69B7B09C86182D3C598119017DEFC74F373FC8024
2,960,583 UART: [art] SIG.R = B5FADD1995C1167E520CAAED65A8891089267C5F2F4B68B804B73FB71C291E816A5DA9D4BA9FB4776167981165F60FE0
2,967,350 UART: [art] SIG.S = 0F63E00349CEDD14D181AC6CF42E1C5287BFA5854F96EE2DCED74DD70F1B529E06EE4EE6629D5BFB690CE7BF613D104A
2,990,902 UART: Caliptra RT
2,991,247 UART: [state] CFI Enabled
3,098,054 UART: [rt] RT listening for mailbox commands...
3,098,724 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,252 UART: [rt]cmd =0x44504543, len=96
3,136,654 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,211 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,799 UART: [kat] SHA2-256
881,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,845 UART: [kat] ++
885,997 UART: [kat] sha1
890,329 UART: [kat] SHA2-256
892,267 UART: [kat] SHA2-384
894,888 UART: [kat] SHA2-512-ACC
896,789 UART: [kat] ECC-384
902,100 UART: [kat] HMAC-384Kdf
906,710 UART: [kat] LMS
1,474,906 UART: [kat] --
1,475,913 UART: [cold-reset] ++
1,476,399 UART: [fht] Storing FHT @ 0x50003400
1,479,214 UART: [idev] ++
1,479,382 UART: [idev] CDI.KEYID = 6
1,479,742 UART: [idev] SUBJECT.KEYID = 7
1,480,166 UART: [idev] UDS.KEYID = 0
1,480,511 ready_for_fw is high
1,480,511 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,946 UART: [idev] Erasing UDS.KEYID = 0
1,504,624 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,342 UART: [idev] --
1,514,341 UART: [ldev] ++
1,514,509 UART: [ldev] CDI.KEYID = 6
1,514,872 UART: [ldev] SUBJECT.KEYID = 5
1,515,298 UART: [ldev] AUTHORITY.KEYID = 7
1,515,761 UART: [ldev] FE.KEYID = 1
1,521,023 UART: [ldev] Erasing FE.KEYID = 1
1,546,110 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,678 UART: [ldev] --
1,584,977 UART: [fwproc] Waiting for Commands...
1,585,678 UART: [fwproc] Received command 0x46574c44
1,586,469 UART: [fwproc] Received Image of size 114332 bytes
2,883,365 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,911 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,263 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,075,028 >>> mbox cmd response: success
3,076,036 UART: [afmc] ++
3,076,204 UART: [afmc] CDI.KEYID = 6
3,076,566 UART: [afmc] SUBJECT.KEYID = 7
3,076,991 UART: [afmc] AUTHORITY.KEYID = 5
3,111,812 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,896 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,676 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,404 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,289 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,979 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,922 UART: [afmc] --
3,154,872 UART: [cold-reset] --
3,155,744 UART: [state] Locking Datavault
3,156,859 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,463 UART: [state] Locking ICCM
3,157,949 UART: [exit] Launching FMC @ 0x40000130
3,163,278 UART:
3,163,294 UART: Running Caliptra FMC ...
3,163,702 UART:
3,163,756 UART: [state] CFI Enabled
3,174,495 UART: [fht] FMC Alias Private Key: 7
3,282,702 UART: [art] Extend RT PCRs Done
3,283,130 UART: [art] Lock RT PCRs Done
3,284,882 UART: [art] Populate DV Done
3,293,103 UART: [fht] FMC Alias Private Key: 7
3,294,109 UART: [art] Derive CDI
3,294,389 UART: [art] Store in in slot 0x4
3,380,058 UART: [art] Derive Key Pair
3,380,418 UART: [art] Store priv key in slot 0x5
3,393,452 UART: [art] Derive Key Pair - Done
3,408,222 UART: [art] Signing Cert with AUTHO
3,408,702 UART: RITY.KEYID = 7
3,424,232 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,997 UART: [art] PUB.X = 778BC4595D84422C97C1BECDE9B3397D71D49FC144EBD974B76A0F79AA01BF83AA1D8BBA706F4B62C151135E1BBF5B9D
3,431,779 UART: [art] PUB.Y = CE88763620AEEC17F5C2F6386A2C8173FB8B59D6F3744B55FDAF6766934B92BDAD1BCB71AD013FDCFEED554A05D818E3
3,438,743 UART: [art] SIG.R = D518A1BD67F0350FE95C2BCD8404FB44BF9DE47D0128C61680AD32A07CD7404E7E9849255E0D10272B3F668216736865
3,445,499 UART: [art] SIG.S = 07043A285489C112FCCD09828AFF8BECC2C283B497AE83D07E818618602A43D68390C1B7AFE33D319D2C5B110A0638B7
3,469,233 UART: Caliptra RT
3,469,486 UART: [state] CFI Enabled
3,577,681 UART: [rt] RT listening for mailbox commands...
3,578,351 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,895 UART: [rt]cmd =0x4d454153, len=108
3,629,612 >>> mbox cmd response data (12 bytes)
3,629,613 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,659,560 UART: [rt]cmd =0x4d454153, len=108
3,680,001 >>> mbox cmd response data (12 bytes)
3,680,002 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,273 UART: [rt]cmd =0x4d454153, len=108
3,731,252 >>> mbox cmd response data (12 bytes)
3,731,253 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,272 UART: [rt]cmd =0x4d454153, len=108
3,782,065 >>> mbox cmd response data (12 bytes)
3,782,066 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,903 UART: [rt]cmd =0x4d454153, len=108
3,832,660 >>> mbox cmd response data (12 bytes)
3,832,661 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,654 UART: [rt]cmd =0x4d454153, len=108
3,883,981 >>> mbox cmd response data (12 bytes)
3,883,982 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,913,951 UART: [rt]cmd =0x4d454153, len=108
3,934,474 >>> mbox cmd response data (12 bytes)
3,934,475 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,360 UART: [rt]cmd =0x4d454153, len=108
3,984,767 >>> mbox cmd response data (12 bytes)
3,984,768 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,014,837 UART: [rt]cmd =0x4d454153, len=108
4,035,784 >>> mbox cmd response data (12 bytes)
4,035,785 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,065,800 UART: [rt]cmd =0x4d454153, len=108
4,086,557 >>> mbox cmd response data (12 bytes)
4,086,558 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,116,817 UART: [rt]cmd =0x4d454153, len=108
4,137,228 >>> mbox cmd response data (12 bytes)
4,137,229 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,167,200 UART: [rt]cmd =0x4d454153, len=108
4,187,753 >>> mbox cmd response data (12 bytes)
4,187,754 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,217,915 UART: [rt]cmd =0x4d454153, len=108
4,239,188 >>> mbox cmd response data (12 bytes)
4,239,189 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,269,306 UART: [rt]cmd =0x4d454153, len=108
4,289,985 >>> mbox cmd response data (12 bytes)
4,289,986 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,320,141 UART: [rt]cmd =0x4d454153, len=108
4,341,880 >>> mbox cmd response data (12 bytes)
4,341,881 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,371,976 UART: [rt]cmd =0x4d454153, len=108
4,373,944 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,733 ready_for_fw is high
1,362,733 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,634 >>> mbox cmd response: success
2,989,356 UART:
2,989,372 UART: Running Caliptra FMC ...
2,989,780 UART:
2,989,834 UART: [state] CFI Enabled
3,000,495 UART: [fht] FMC Alias Private Key: 7
3,108,302 UART: [art] Extend RT PCRs Done
3,108,730 UART: [art] Lock RT PCRs Done
3,110,408 UART: [art] Populate DV Done
3,118,709 UART: [fht] FMC Alias Private Key: 7
3,119,671 UART: [art] Derive CDI
3,119,951 UART: [art] Store in in slot 0x4
3,205,586 UART: [art] Derive Key Pair
3,205,946 UART: [art] Store priv key in slot 0x5
3,219,014 UART: [art] Derive Key Pair - Done
3,233,580 UART: [art] Signing Cert with AUTHO
3,234,060 UART: RITY.KEYID = 7
3,248,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,727 UART: [art] PUB.X = 3F0A0F3E7F95728D62266D6E509F2B26E16AFB068FAADE096B31A0E760314116128761D457501897DF0150EC4FDC3A4A
3,256,484 UART: [art] PUB.Y = D46F3BA4F46F36AEF9F23EEFB0DAA43541CC52476D33EC230468F53D824BFD7C8511A957493C377DE69E49AC7D4FD53C
3,263,447 UART: [art] SIG.R = 468A9D3DFCCA7AEB438454BAC94B705DA0D9D16E4BB92D5F5D32770A51AFAACA2FC22D6174810D1E52958018BDBDF3CA
3,270,235 UART: [art] SIG.S = 01930E5B4462649D078FA44D38079454D972AA21413A1F746A84A6A969E9AB6135C07CC3F4347B5097B277B3E628DE4D
3,294,030 UART: Caliptra RT
3,294,283 UART: [state] CFI Enabled
3,402,057 UART: [rt] RT listening for mailbox commands...
3,402,727 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,095 UART: [rt]cmd =0x4d454153, len=108
3,453,668 >>> mbox cmd response data (12 bytes)
3,453,669 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,686 UART: [rt]cmd =0x4d454153, len=108
3,504,599 >>> mbox cmd response data (12 bytes)
3,504,600 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,697 UART: [rt]cmd =0x4d454153, len=108
3,555,304 >>> mbox cmd response data (12 bytes)
3,555,305 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,184 UART: [rt]cmd =0x4d454153, len=108
3,605,927 >>> mbox cmd response data (12 bytes)
3,605,928 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,635,931 UART: [rt]cmd =0x4d454153, len=108
3,656,124 >>> mbox cmd response data (12 bytes)
3,656,125 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,050 UART: [rt]cmd =0x4d454153, len=108
3,706,001 >>> mbox cmd response data (12 bytes)
3,706,002 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,899 UART: [rt]cmd =0x4d454153, len=108
3,757,428 >>> mbox cmd response data (12 bytes)
3,757,429 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,386 UART: [rt]cmd =0x4d454153, len=108
3,807,845 >>> mbox cmd response data (12 bytes)
3,807,846 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,837,973 UART: [rt]cmd =0x4d454153, len=108
3,858,352 >>> mbox cmd response data (12 bytes)
3,858,353 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,888,476 UART: [rt]cmd =0x4d454153, len=108
3,909,109 >>> mbox cmd response data (12 bytes)
3,909,110 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,179 UART: [rt]cmd =0x4d454153, len=108
3,959,810 >>> mbox cmd response data (12 bytes)
3,959,811 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,989,840 UART: [rt]cmd =0x4d454153, len=108
4,010,253 >>> mbox cmd response data (12 bytes)
4,010,254 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,040,337 UART: [rt]cmd =0x4d454153, len=108
4,060,526 >>> mbox cmd response data (12 bytes)
4,060,527 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,090,330 UART: [rt]cmd =0x4d454153, len=108
4,110,243 >>> mbox cmd response data (12 bytes)
4,110,244 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,140,029 UART: [rt]cmd =0x4d454153, len=108
4,160,916 >>> mbox cmd response data (12 bytes)
4,160,917 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,190,812 UART: [rt]cmd =0x4d454153, len=108
4,192,554 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,494 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,166 UART: [kat] SHA2-256
882,097 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,212 UART: [kat] ++
886,364 UART: [kat] sha1
890,540 UART: [kat] SHA2-256
892,478 UART: [kat] SHA2-384
895,217 UART: [kat] SHA2-512-ACC
897,118 UART: [kat] ECC-384
902,815 UART: [kat] HMAC-384Kdf
907,651 UART: [kat] LMS
1,475,847 UART: [kat] --
1,476,618 UART: [cold-reset] ++
1,477,034 UART: [fht] Storing FHT @ 0x50003400
1,479,741 UART: [idev] ++
1,479,909 UART: [idev] CDI.KEYID = 6
1,480,269 UART: [idev] SUBJECT.KEYID = 7
1,480,693 UART: [idev] UDS.KEYID = 0
1,481,038 ready_for_fw is high
1,481,038 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,733 UART: [idev] Erasing UDS.KEYID = 0
1,505,293 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,953 UART: [idev] --
1,515,008 UART: [ldev] ++
1,515,176 UART: [ldev] CDI.KEYID = 6
1,515,539 UART: [ldev] SUBJECT.KEYID = 5
1,515,965 UART: [ldev] AUTHORITY.KEYID = 7
1,516,428 UART: [ldev] FE.KEYID = 1
1,521,414 UART: [ldev] Erasing FE.KEYID = 1
1,547,763 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,857 UART: [ldev] --
1,587,154 UART: [fwproc] Waiting for Commands...
1,587,785 UART: [fwproc] Received command 0x46574c44
1,588,576 UART: [fwproc] Received Image of size 114332 bytes
2,885,190 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,618 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,970 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,961 >>> mbox cmd response: success
3,079,001 UART: [afmc] ++
3,079,169 UART: [afmc] CDI.KEYID = 6
3,079,531 UART: [afmc] SUBJECT.KEYID = 7
3,079,956 UART: [afmc] AUTHORITY.KEYID = 5
3,115,303 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,131 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,911 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,639 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,524 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,214 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,967 UART: [afmc] --
3,159,051 UART: [cold-reset] --
3,160,065 UART: [state] Locking Datavault
3,161,224 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,828 UART: [state] Locking ICCM
3,162,260 UART: [exit] Launching FMC @ 0x40000130
3,167,589 UART:
3,167,605 UART: Running Caliptra FMC ...
3,168,013 UART:
3,168,156 UART: [state] CFI Enabled
3,178,281 UART: [fht] FMC Alias Private Key: 7
3,286,730 UART: [art] Extend RT PCRs Done
3,287,158 UART: [art] Lock RT PCRs Done
3,288,880 UART: [art] Populate DV Done
3,296,861 UART: [fht] FMC Alias Private Key: 7
3,297,867 UART: [art] Derive CDI
3,298,147 UART: [art] Store in in slot 0x4
3,384,088 UART: [art] Derive Key Pair
3,384,448 UART: [art] Store priv key in slot 0x5
3,397,826 UART: [art] Derive Key Pair - Done
3,412,833 UART: [art] Signing Cert with AUTHO
3,413,313 UART: RITY.KEYID = 7
3,428,235 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,000 UART: [art] PUB.X = 237EFE967ADD84C1F05F28B198011601F549738EF5FC390F0E74DE19FC97621C0115E44DC4F91114CFEBF954A6413CA2
3,435,761 UART: [art] PUB.Y = 18C781499ACBC8C14AD6C74879C464E3B571EAC8492D273723473D92941E317DC2B901190C98E0F581E6BBB82DEF7E19
3,442,707 UART: [art] SIG.R = C98606A995F854354D1EB09B42BEBA706DD91EE8006BC8E63432555BCBC81BEBDD10EAC285BB20D43B6E3BB7C331CF4A
3,449,472 UART: [art] SIG.S = F670D8AA6AB8B78CA529D73B40A0B76E35CF41237F310E652E75B1DAB43463D99E85A9477A533F218400D0229BF47302
3,473,355 UART: Caliptra RT
3,473,700 UART: [state] CFI Enabled
3,581,832 UART: [rt] RT listening for mailbox commands...
3,582,502 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,168 UART: [rt]cmd =0x4d454153, len=108
3,633,971 >>> mbox cmd response data (12 bytes)
3,633,972 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,819 UART: [rt]cmd =0x4d454153, len=108
3,684,504 >>> mbox cmd response data (12 bytes)
3,684,505 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,714,712 UART: [rt]cmd =0x4d454153, len=108
3,734,975 >>> mbox cmd response data (12 bytes)
3,734,976 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,187 UART: [rt]cmd =0x4d454153, len=108
3,785,648 >>> mbox cmd response data (12 bytes)
3,785,649 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,815,772 UART: [rt]cmd =0x4d454153, len=108
3,837,239 >>> mbox cmd response data (12 bytes)
3,837,240 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,557 UART: [rt]cmd =0x4d454153, len=108
3,888,418 >>> mbox cmd response data (12 bytes)
3,888,419 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,140 UART: [rt]cmd =0x4d454153, len=108
3,938,453 >>> mbox cmd response data (12 bytes)
3,938,454 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,329 UART: [rt]cmd =0x4d454153, len=108
3,988,476 >>> mbox cmd response data (12 bytes)
3,988,477 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,370 UART: [rt]cmd =0x4d454153, len=108
4,038,775 >>> mbox cmd response data (12 bytes)
4,038,776 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,815 UART: [rt]cmd =0x4d454153, len=108
4,088,852 >>> mbox cmd response data (12 bytes)
4,088,853 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,119,056 UART: [rt]cmd =0x4d454153, len=108
4,139,561 >>> mbox cmd response data (12 bytes)
4,139,562 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,169,717 UART: [rt]cmd =0x4d454153, len=108
4,191,020 >>> mbox cmd response data (12 bytes)
4,191,021 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,221,250 UART: [rt]cmd =0x4d454153, len=108
4,241,391 >>> mbox cmd response data (12 bytes)
4,241,392 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,271,425 UART: [rt]cmd =0x4d454153, len=108
4,292,358 >>> mbox cmd response data (12 bytes)
4,292,359 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,322,368 UART: [rt]cmd =0x4d454153, len=108
4,343,281 >>> mbox cmd response data (12 bytes)
4,343,282 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,373,249 UART: [rt]cmd =0x4d454153, len=108
4,375,103 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,408 ready_for_fw is high
1,362,408 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,713 >>> mbox cmd response: success
2,988,695 UART:
2,988,711 UART: Running Caliptra FMC ...
2,989,119 UART:
2,989,262 UART: [state] CFI Enabled
2,999,743 UART: [fht] FMC Alias Private Key: 7
3,107,612 UART: [art] Extend RT PCRs Done
3,108,040 UART: [art] Lock RT PCRs Done
3,109,306 UART: [art] Populate DV Done
3,117,481 UART: [fht] FMC Alias Private Key: 7
3,118,461 UART: [art] Derive CDI
3,118,741 UART: [art] Store in in slot 0x4
3,204,168 UART: [art] Derive Key Pair
3,204,528 UART: [art] Store priv key in slot 0x5
3,217,570 UART: [art] Derive Key Pair - Done
3,232,508 UART: [art] Signing Cert with AUTHO
3,232,988 UART: RITY.KEYID = 7
3,247,886 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,651 UART: [art] PUB.X = 3CC574C6B9A4D258A235B88C7E12833193614CD1F58C7334B2A95B9DC822FA99F62D1BC2ED70B8E9D51FEB4FB04792E0
3,255,431 UART: [art] PUB.Y = 6EAFDCCF3214634186504445774AE8E3B5A5B55BE83273E6EE20E9DACFD4BAC998464DA13F15173346EF47FBCBA2CC97
3,262,397 UART: [art] SIG.R = A5B692735D4ED3A6C5EBF6790C34BBCA33F6EE27E459C0C2A6E1B95A5FDFD4139E80929FE33E248DA0F02AB254008A06
3,269,155 UART: [art] SIG.S = 9DF289E6E1E236B1A4346D9E9928B6213E033E6048B67200D96B35B392B0E1EBC1126A1892A5D2E31C8645C6F0C85D07
3,293,142 UART: Caliptra RT
3,293,487 UART: [state] CFI Enabled
3,401,107 UART: [rt] RT listening for mailbox commands...
3,401,777 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,361 UART: [rt]cmd =0x4d454153, len=108
3,452,856 >>> mbox cmd response data (12 bytes)
3,452,857 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,006 UART: [rt]cmd =0x4d454153, len=108
3,503,207 >>> mbox cmd response data (12 bytes)
3,503,208 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,307 UART: [rt]cmd =0x4d454153, len=108
3,553,396 >>> mbox cmd response data (12 bytes)
3,553,397 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,268 UART: [rt]cmd =0x4d454153, len=108
3,603,705 >>> mbox cmd response data (12 bytes)
3,603,706 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,551 UART: [rt]cmd =0x4d454153, len=108
3,654,122 >>> mbox cmd response data (12 bytes)
3,654,123 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,683,950 UART: [rt]cmd =0x4d454153, len=108
3,704,997 >>> mbox cmd response data (12 bytes)
3,704,998 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,163 UART: [rt]cmd =0x4d454153, len=108
3,755,480 >>> mbox cmd response data (12 bytes)
3,755,481 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,785,630 UART: [rt]cmd =0x4d454153, len=108
3,807,247 >>> mbox cmd response data (12 bytes)
3,807,248 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,837,215 UART: [rt]cmd =0x4d454153, len=108
3,858,110 >>> mbox cmd response data (12 bytes)
3,858,111 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,888,238 UART: [rt]cmd =0x4d454153, len=108
3,908,631 >>> mbox cmd response data (12 bytes)
3,908,632 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,539 UART: [rt]cmd =0x4d454153, len=108
3,959,696 >>> mbox cmd response data (12 bytes)
3,959,697 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,989,736 UART: [rt]cmd =0x4d454153, len=108
4,010,431 >>> mbox cmd response data (12 bytes)
4,010,432 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,040,705 UART: [rt]cmd =0x4d454153, len=108
4,060,658 >>> mbox cmd response data (12 bytes)
4,060,659 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,090,664 UART: [rt]cmd =0x4d454153, len=108
4,111,457 >>> mbox cmd response data (12 bytes)
4,111,458 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,141,387 UART: [rt]cmd =0x4d454153, len=108
4,162,296 >>> mbox cmd response data (12 bytes)
4,162,297 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,192,242 UART: [rt]cmd =0x4d454153, len=108
4,194,096 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,484 UART: [kat] SHA2-256
893,134 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,259 UART: [kat] ++
897,411 UART: [kat] sha1
901,723 UART: [kat] SHA2-256
903,663 UART: [kat] SHA2-384
906,574 UART: [kat] SHA2-512-ACC
908,475 UART: [kat] ECC-384
918,312 UART: [kat] HMAC-384Kdf
922,908 UART: [kat] LMS
1,171,236 UART: [kat] --
1,172,163 UART: [cold-reset] ++
1,172,607 UART: [fht] FHT @ 0x50003400
1,175,344 UART: [idev] ++
1,175,512 UART: [idev] CDI.KEYID = 6
1,175,872 UART: [idev] SUBJECT.KEYID = 7
1,176,296 UART: [idev] UDS.KEYID = 0
1,176,641 ready_for_fw is high
1,176,641 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,290 UART: [idev] Erasing UDS.KEYID = 0
1,201,107 UART: [idev] Sha1 KeyId Algorithm
1,209,581 UART: [idev] --
1,210,505 UART: [ldev] ++
1,210,673 UART: [ldev] CDI.KEYID = 6
1,211,036 UART: [ldev] SUBJECT.KEYID = 5
1,211,462 UART: [ldev] AUTHORITY.KEYID = 7
1,211,925 UART: [ldev] FE.KEYID = 1
1,216,825 UART: [ldev] Erasing FE.KEYID = 1
1,242,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,763 UART: [ldev] --
1,282,068 UART: [fwproc] Wait for Commands...
1,282,872 UART: [fwproc] Recv command 0x46574c44
1,283,600 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,802 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,743 >>> mbox cmd response: success
2,774,809 UART: [afmc] ++
2,774,977 UART: [afmc] CDI.KEYID = 6
2,775,339 UART: [afmc] SUBJECT.KEYID = 7
2,775,764 UART: [afmc] AUTHORITY.KEYID = 5
2,811,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,350 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,078 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,963 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,682 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,566 UART: [afmc] --
2,854,694 UART: [cold-reset] --
2,855,502 UART: [state] Locking Datavault
2,856,837 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,441 UART: [state] Locking ICCM
2,857,909 UART: [exit] Launching FMC @ 0x40000130
2,863,238 UART:
2,863,254 UART: Running Caliptra FMC ...
2,863,662 UART:
2,863,716 UART: [state] CFI Enabled
2,874,047 UART: [fht] FMC Alias Private Key: 7
2,981,734 UART: [art] Extend RT PCRs Done
2,982,162 UART: [art] Lock RT PCRs Done
2,983,636 UART: [art] Populate DV Done
2,992,055 UART: [fht] FMC Alias Private Key: 7
2,993,013 UART: [art] Derive CDI
2,993,293 UART: [art] Store in in slot 0x4
3,078,842 UART: [art] Derive Key Pair
3,079,202 UART: [art] Store priv key in slot 0x5
3,092,208 UART: [art] Derive Key Pair - Done
3,107,217 UART: [art] Signing Cert with AUTHO
3,107,697 UART: RITY.KEYID = 7
3,123,335 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,100 UART: [art] PUB.X = 2D53DE2728446A3320E7A07A4CAAA9AC1129E4FFA7BFC51AC9901BBBEF02F2E702C57B992009C72445F5C83C2D6B4639
3,130,873 UART: [art] PUB.Y = 5DDB11C4C209198B96F8D351DC7EF1027F870711AA2DCF43DA67EF0FB856B8F5915FF7F305D333E366F2BC717A6ECF2C
3,137,824 UART: [art] SIG.R = 2265C2754F74598AD90848C1B1133160257160B5E000441C6E4943436510D23489C02F04806B8FBCBC7B8AEFAEE29791
3,144,556 UART: [art] SIG.S = 23A98700997235A36ABC195234D1A69409CAF127E4CDBB2127AAB95C55FE4667BA983659D6F3DCC786118DCAED005763
3,168,600 UART: Caliptra RT
3,168,853 UART: [state] CFI Enabled
3,276,310 UART: [rt] RT listening for mailbox commands...
3,276,980 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,454 UART: [rt]cmd =0x4d454153, len=108
3,327,867 >>> mbox cmd response data (12 bytes)
3,327,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,085 UART: [rt]cmd =0x4d454153, len=108
3,378,418 >>> mbox cmd response data (12 bytes)
3,378,419 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,408,520 UART: [rt]cmd =0x4d454153, len=108
3,428,579 >>> mbox cmd response data (12 bytes)
3,428,580 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,458,647 UART: [rt]cmd =0x4d454153, len=108
3,479,790 >>> mbox cmd response data (12 bytes)
3,479,791 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,510,104 UART: [rt]cmd =0x4d454153, len=108
3,531,253 >>> mbox cmd response data (12 bytes)
3,531,254 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,511 UART: [rt]cmd =0x4d454153, len=108
3,582,186 >>> mbox cmd response data (12 bytes)
3,582,187 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,080 UART: [rt]cmd =0x4d454153, len=108
3,632,645 >>> mbox cmd response data (12 bytes)
3,632,646 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,403 UART: [rt]cmd =0x4d454153, len=108
3,682,948 >>> mbox cmd response data (12 bytes)
3,682,949 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,060 UART: [rt]cmd =0x4d454153, len=108
3,733,847 >>> mbox cmd response data (12 bytes)
3,733,848 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,071 UART: [rt]cmd =0x4d454153, len=108
3,784,844 >>> mbox cmd response data (12 bytes)
3,784,845 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,988 UART: [rt]cmd =0x4d454153, len=108
3,835,059 >>> mbox cmd response data (12 bytes)
3,835,060 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,007 UART: [rt]cmd =0x4d454153, len=108
3,886,446 >>> mbox cmd response data (12 bytes)
3,886,447 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,528 UART: [rt]cmd =0x4d454153, len=108
3,937,471 >>> mbox cmd response data (12 bytes)
3,937,472 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,967,655 UART: [rt]cmd =0x4d454153, len=108
3,988,996 >>> mbox cmd response data (12 bytes)
3,988,997 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,019,130 UART: [rt]cmd =0x4d454153, len=108
4,039,935 >>> mbox cmd response data (12 bytes)
4,039,936 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,069,775 UART: [rt]cmd =0x4d454153, len=108
4,071,621 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,871 ready_for_fw is high
1,060,871 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,744 >>> mbox cmd response: success
2,687,694 UART:
2,687,710 UART: Running Caliptra FMC ...
2,688,118 UART:
2,688,172 UART: [state] CFI Enabled
2,698,865 UART: [fht] FMC Alias Private Key: 7
2,807,422 UART: [art] Extend RT PCRs Done
2,807,850 UART: [art] Lock RT PCRs Done
2,809,858 UART: [art] Populate DV Done
2,817,987 UART: [fht] FMC Alias Private Key: 7
2,819,023 UART: [art] Derive CDI
2,819,303 UART: [art] Store in in slot 0x4
2,905,018 UART: [art] Derive Key Pair
2,905,378 UART: [art] Store priv key in slot 0x5
2,918,508 UART: [art] Derive Key Pair - Done
2,933,158 UART: [art] Signing Cert with AUTHO
2,933,638 UART: RITY.KEYID = 7
2,948,838 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,603 UART: [art] PUB.X = 371CF7361FF537EBE2AD1951CBF336564052723996E4967161C32C49474E5AFAF5ABA4949FDEC98922B32C61C9683273
2,956,371 UART: [art] PUB.Y = 6079801B8222EB543D8A976A2216671825C03AE33575611682EA4F5111AFBA2DC992D5EA6A420D97B8B178621AC6D392
2,963,312 UART: [art] SIG.R = 7424B9DE9032836E09B0914A973F169C2002AD8ABA2BDEB7BE726139661CB880812254E617D0A44C52468204908CA4BD
2,970,069 UART: [art] SIG.S = 87F9449B2678D1A60163A7D912A6DD98720B5BC9932D3EDDA8A71F3F49CC42C1EB27F9306DEFAD19D90A02414EB40AA5
2,993,849 UART: Caliptra RT
2,994,102 UART: [state] CFI Enabled
3,102,943 UART: [rt] RT listening for mailbox commands...
3,103,613 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,055 UART: [rt]cmd =0x4d454153, len=108
3,154,164 >>> mbox cmd response data (12 bytes)
3,154,165 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,142 UART: [rt]cmd =0x4d454153, len=108
3,205,199 >>> mbox cmd response data (12 bytes)
3,205,200 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,235,031 UART: [rt]cmd =0x4d454153, len=108
3,256,064 >>> mbox cmd response data (12 bytes)
3,256,065 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,286,116 UART: [rt]cmd =0x4d454153, len=108
3,307,063 >>> mbox cmd response data (12 bytes)
3,307,064 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,011 UART: [rt]cmd =0x4d454153, len=108
3,357,776 >>> mbox cmd response data (12 bytes)
3,357,777 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,387,938 UART: [rt]cmd =0x4d454153, len=108
3,408,187 >>> mbox cmd response data (12 bytes)
3,408,188 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,243 UART: [rt]cmd =0x4d454153, len=108
3,459,018 >>> mbox cmd response data (12 bytes)
3,459,019 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,488,848 UART: [rt]cmd =0x4d454153, len=108
3,509,065 >>> mbox cmd response data (12 bytes)
3,509,066 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,013 UART: [rt]cmd =0x4d454153, len=108
3,559,978 >>> mbox cmd response data (12 bytes)
3,559,979 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,589,986 UART: [rt]cmd =0x4d454153, len=108
3,610,505 >>> mbox cmd response data (12 bytes)
3,610,506 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,779 UART: [rt]cmd =0x4d454153, len=108
3,662,146 >>> mbox cmd response data (12 bytes)
3,662,147 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,692,246 UART: [rt]cmd =0x4d454153, len=108
3,713,285 >>> mbox cmd response data (12 bytes)
3,713,286 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,423 UART: [rt]cmd =0x4d454153, len=108
3,763,944 >>> mbox cmd response data (12 bytes)
3,763,945 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,793,794 UART: [rt]cmd =0x4d454153, len=108
3,815,771 >>> mbox cmd response data (12 bytes)
3,815,772 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,845,613 UART: [rt]cmd =0x4d454153, len=108
3,866,566 >>> mbox cmd response data (12 bytes)
3,866,567 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,896,548 UART: [rt]cmd =0x4d454153, len=108
3,898,464 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
893,425 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,550 UART: [kat] ++
897,702 UART: [kat] sha1
901,760 UART: [kat] SHA2-256
903,700 UART: [kat] SHA2-384
906,479 UART: [kat] SHA2-512-ACC
908,380 UART: [kat] ECC-384
918,353 UART: [kat] HMAC-384Kdf
922,891 UART: [kat] LMS
1,171,219 UART: [kat] --
1,172,160 UART: [cold-reset] ++
1,172,562 UART: [fht] FHT @ 0x50003400
1,175,339 UART: [idev] ++
1,175,507 UART: [idev] CDI.KEYID = 6
1,175,867 UART: [idev] SUBJECT.KEYID = 7
1,176,291 UART: [idev] UDS.KEYID = 0
1,176,636 ready_for_fw is high
1,176,636 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,971 UART: [idev] Erasing UDS.KEYID = 0
1,200,242 UART: [idev] Sha1 KeyId Algorithm
1,208,630 UART: [idev] --
1,209,578 UART: [ldev] ++
1,209,746 UART: [ldev] CDI.KEYID = 6
1,210,109 UART: [ldev] SUBJECT.KEYID = 5
1,210,535 UART: [ldev] AUTHORITY.KEYID = 7
1,210,998 UART: [ldev] FE.KEYID = 1
1,216,294 UART: [ldev] Erasing FE.KEYID = 1
1,242,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,852 UART: [ldev] --
1,282,145 UART: [fwproc] Wait for Commands...
1,282,885 UART: [fwproc] Recv command 0x46574c44
1,283,613 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,068 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,109 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,413 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,132 >>> mbox cmd response: success
2,775,366 UART: [afmc] ++
2,775,534 UART: [afmc] CDI.KEYID = 6
2,775,896 UART: [afmc] SUBJECT.KEYID = 7
2,776,321 UART: [afmc] AUTHORITY.KEYID = 5
2,811,682 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,663 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,391 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,276 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,995 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,971 UART: [afmc] --
2,854,977 UART: [cold-reset] --
2,855,733 UART: [state] Locking Datavault
2,857,036 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,640 UART: [state] Locking ICCM
2,858,276 UART: [exit] Launching FMC @ 0x40000130
2,863,605 UART:
2,863,621 UART: Running Caliptra FMC ...
2,864,029 UART:
2,864,172 UART: [state] CFI Enabled
2,874,931 UART: [fht] FMC Alias Private Key: 7
2,983,260 UART: [art] Extend RT PCRs Done
2,983,688 UART: [art] Lock RT PCRs Done
2,985,418 UART: [art] Populate DV Done
2,993,647 UART: [fht] FMC Alias Private Key: 7
2,994,829 UART: [art] Derive CDI
2,995,109 UART: [art] Store in in slot 0x4
3,081,386 UART: [art] Derive Key Pair
3,081,746 UART: [art] Store priv key in slot 0x5
3,095,184 UART: [art] Derive Key Pair - Done
3,109,757 UART: [art] Signing Cert with AUTHO
3,110,237 UART: RITY.KEYID = 7
3,125,587 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,352 UART: [art] PUB.X = 1FD2C87322021EF012D444EE86FBAA2F80D96C6104868650D6CCBF2228E2831841A393DEBF52DF690F769D43C54FFB94
3,133,119 UART: [art] PUB.Y = 6382516902BD239A47DE23F6FECDE727DEF09DCE1CD2843460DC38CD76C93196AB02B067B46F6FA35F6FA9BE51190139
3,140,070 UART: [art] SIG.R = 6846404E0F05C131FC72DC98B936D51B3B7513E142A0630B289A7C2B774EFCF1A3F570F9D8439796283C420B3D1E75A5
3,146,826 UART: [art] SIG.S = 6C8B1614D11F7A95BF0E6032DB15C5FE3A93BDB1CAA94F4247548A5DADC9A9E216B97DDA74E6526F0BE91AFDD3179A20
3,170,913 UART: Caliptra RT
3,171,258 UART: [state] CFI Enabled
3,279,847 UART: [rt] RT listening for mailbox commands...
3,280,517 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,983 UART: [rt]cmd =0x4d454153, len=108
3,331,028 >>> mbox cmd response data (12 bytes)
3,331,029 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,102 UART: [rt]cmd =0x4d454153, len=108
3,381,189 >>> mbox cmd response data (12 bytes)
3,381,190 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,411,469 UART: [rt]cmd =0x4d454153, len=108
3,432,026 >>> mbox cmd response data (12 bytes)
3,432,027 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,198 UART: [rt]cmd =0x4d454153, len=108
3,482,429 >>> mbox cmd response data (12 bytes)
3,482,430 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,512,599 UART: [rt]cmd =0x4d454153, len=108
3,532,944 >>> mbox cmd response data (12 bytes)
3,532,945 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,006 UART: [rt]cmd =0x4d454153, len=108
3,583,523 >>> mbox cmd response data (12 bytes)
3,583,524 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,427 UART: [rt]cmd =0x4d454153, len=108
3,633,838 >>> mbox cmd response data (12 bytes)
3,633,839 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,780 UART: [rt]cmd =0x4d454153, len=108
3,684,779 >>> mbox cmd response data (12 bytes)
3,684,780 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,061 UART: [rt]cmd =0x4d454153, len=108
3,735,612 >>> mbox cmd response data (12 bytes)
3,735,613 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,638 UART: [rt]cmd =0x4d454153, len=108
3,787,123 >>> mbox cmd response data (12 bytes)
3,787,124 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,817,141 UART: [rt]cmd =0x4d454153, len=108
3,838,112 >>> mbox cmd response data (12 bytes)
3,838,113 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,868,300 UART: [rt]cmd =0x4d454153, len=108
3,889,669 >>> mbox cmd response data (12 bytes)
3,889,670 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,901 UART: [rt]cmd =0x4d454153, len=108
3,940,270 >>> mbox cmd response data (12 bytes)
3,940,271 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,970,068 UART: [rt]cmd =0x4d454153, len=108
3,990,445 >>> mbox cmd response data (12 bytes)
3,990,446 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,020,319 UART: [rt]cmd =0x4d454153, len=108
4,040,292 >>> mbox cmd response data (12 bytes)
4,040,293 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,070,124 UART: [rt]cmd =0x4d454153, len=108
4,071,944 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,978 ready_for_fw is high
1,060,978 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,483 >>> mbox cmd response: success
2,690,179 UART:
2,690,195 UART: Running Caliptra FMC ...
2,690,603 UART:
2,690,746 UART: [state] CFI Enabled
2,701,397 UART: [fht] FMC Alias Private Key: 7
2,809,494 UART: [art] Extend RT PCRs Done
2,809,922 UART: [art] Lock RT PCRs Done
2,810,890 UART: [art] Populate DV Done
2,819,171 UART: [fht] FMC Alias Private Key: 7
2,820,255 UART: [art] Derive CDI
2,820,535 UART: [art] Store in in slot 0x4
2,906,086 UART: [art] Derive Key Pair
2,906,446 UART: [art] Store priv key in slot 0x5
2,919,522 UART: [art] Derive Key Pair - Done
2,934,314 UART: [art] Signing Cert with AUTHO
2,934,794 UART: RITY.KEYID = 7
2,950,246 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,011 UART: [art] PUB.X = ADF507F2418F0404BD86385B2C6D370D3B8A1C7CEE3960253CC79751CCC25869B03387DD46A9317B013EB28F9102DFEC
2,957,769 UART: [art] PUB.Y = 5447158C4F82A14648A2A57593D5CD407E354AEFAA697F0949789D2AE624B4C6FBE8D890E74C6581B649E7145DEA3F06
2,964,715 UART: [art] SIG.R = 027DF46141AE252BFF2A3DCA6D9C6414C858BF5C68A2E73D6F29FEC3FE0F5119EF60675687765D4743D0B7CE15FC4D8D
2,971,493 UART: [art] SIG.S = 55D0357B8D98D6B24A44149469B5CF8F059B182781936E78D4A7ABBB395C3B1C24273E939FA658E07D8F0660780AF16D
2,995,301 UART: Caliptra RT
2,995,646 UART: [state] CFI Enabled
3,104,263 UART: [rt] RT listening for mailbox commands...
3,104,933 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,287 UART: [rt]cmd =0x4d454153, len=108
3,156,154 >>> mbox cmd response data (12 bytes)
3,156,155 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,160 UART: [rt]cmd =0x4d454153, len=108
3,206,469 >>> mbox cmd response data (12 bytes)
3,206,470 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,236,561 UART: [rt]cmd =0x4d454153, len=108
3,257,096 >>> mbox cmd response data (12 bytes)
3,257,097 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,287,106 UART: [rt]cmd =0x4d454153, len=108
3,307,719 >>> mbox cmd response data (12 bytes)
3,307,720 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,983 UART: [rt]cmd =0x4d454153, len=108
3,359,062 >>> mbox cmd response data (12 bytes)
3,359,063 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,389,294 UART: [rt]cmd =0x4d454153, len=108
3,409,747 >>> mbox cmd response data (12 bytes)
3,409,748 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,771 UART: [rt]cmd =0x4d454153, len=108
3,459,578 >>> mbox cmd response data (12 bytes)
3,459,579 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,489,712 UART: [rt]cmd =0x4d454153, len=108
3,511,117 >>> mbox cmd response data (12 bytes)
3,511,118 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,541,261 UART: [rt]cmd =0x4d454153, len=108
3,562,270 >>> mbox cmd response data (12 bytes)
3,562,271 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,592,172 UART: [rt]cmd =0x4d454153, len=108
3,613,531 >>> mbox cmd response data (12 bytes)
3,613,532 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,409 UART: [rt]cmd =0x4d454153, len=108
3,664,892 >>> mbox cmd response data (12 bytes)
3,664,893 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,688 UART: [rt]cmd =0x4d454153, len=108
3,715,467 >>> mbox cmd response data (12 bytes)
3,715,468 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,745,499 UART: [rt]cmd =0x4d454153, len=108
3,766,398 >>> mbox cmd response data (12 bytes)
3,766,399 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,796,332 UART: [rt]cmd =0x4d454153, len=108
3,817,343 >>> mbox cmd response data (12 bytes)
3,817,344 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,847,537 UART: [rt]cmd =0x4d454153, len=108
3,868,590 >>> mbox cmd response data (12 bytes)
3,868,591 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,898,358 UART: [rt]cmd =0x4d454153, len=108
3,900,144 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,732 UART: [state] LifecycleState = Unprovisioned
85,387 UART: [state] DebugLocked = No
86,069 UART: [state] WD Timer not started. Device not locked for debugging
87,274 UART: [kat] SHA2-256
890,824 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,953 UART: [kat] ++
895,105 UART: [kat] sha1
899,431 UART: [kat] SHA2-256
901,371 UART: [kat] SHA2-384
904,256 UART: [kat] SHA2-512-ACC
906,157 UART: [kat] ECC-384
916,036 UART: [kat] HMAC-384Kdf
920,646 UART: [kat] LMS
1,168,958 UART: [kat] --
1,169,761 UART: [cold-reset] ++
1,170,253 UART: [fht] FHT @ 0x50003400
1,173,063 UART: [idev] ++
1,173,231 UART: [idev] CDI.KEYID = 6
1,173,592 UART: [idev] SUBJECT.KEYID = 7
1,174,017 UART: [idev] UDS.KEYID = 0
1,174,363 ready_for_fw is high
1,174,363 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,827 UART: [idev] Erasing UDS.KEYID = 0
1,199,351 UART: [idev] Sha1 KeyId Algorithm
1,208,331 UART: [idev] --
1,209,224 UART: [ldev] ++
1,209,392 UART: [ldev] CDI.KEYID = 6
1,209,756 UART: [ldev] SUBJECT.KEYID = 5
1,210,183 UART: [ldev] AUTHORITY.KEYID = 7
1,210,646 UART: [ldev] FE.KEYID = 1
1,215,954 UART: [ldev] Erasing FE.KEYID = 1
1,242,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,472 UART: [ldev] --
1,281,738 UART: [fwproc] Wait for Commands...
1,282,465 UART: [fwproc] Recv command 0x46574c44
1,283,198 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,994 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,768 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,077 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,967 >>> mbox cmd response: success
2,775,068 UART: [afmc] ++
2,775,236 UART: [afmc] CDI.KEYID = 6
2,775,599 UART: [afmc] SUBJECT.KEYID = 7
2,776,025 UART: [afmc] AUTHORITY.KEYID = 5
2,811,918 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,204 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,955 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,684 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,567 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,286 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,023 UART: [afmc] --
2,855,071 UART: [cold-reset] --
2,855,931 UART: [state] Locking Datavault
2,857,168 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,772 UART: [state] Locking ICCM
2,858,310 UART: [exit] Launching FMC @ 0x40000130
2,863,639 UART:
2,863,655 UART: Running Caliptra FMC ...
2,864,063 UART:
2,864,117 UART: [state] CFI Enabled
2,874,488 UART: [fht] FMC Alias Private Key: 7
2,982,239 UART: [art] Extend RT PCRs Done
2,982,667 UART: [art] Lock RT PCRs Done
2,984,273 UART: [art] Populate DV Done
2,992,738 UART: [fht] FMC Alias Private Key: 7
2,993,702 UART: [art] Derive CDI
2,993,982 UART: [art] Store in in slot 0x4
3,080,089 UART: [art] Derive Key Pair
3,080,449 UART: [art] Store priv key in slot 0x5
3,093,531 UART: [art] Derive Key Pair - Done
3,108,644 UART: [art] Signing Cert with AUTHO
3,109,124 UART: RITY.KEYID = 7
3,124,516 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,281 UART: [art] PUB.X = 8B561417BA57D79E6B023DF6FE0B10285274D9FDEB7C85B6EC854083320E1FF4F7AC81437BC008B533CC805039AD60C2
3,132,045 UART: [art] PUB.Y = 927C5A5ECF54C607E54AE3681F07DA33471734CC30EC0268125EF90BA7661766182E7ABEECE16A007D472BBF75A586F5
3,138,967 UART: [art] SIG.R = 2C352CF09C32940500A779F2630467FA6776D5C964FEE4024E98CB9EE809D1768CA5BA9BDEB75C98EA66C1A9877A5EE3
3,145,711 UART: [art] SIG.S = AD882044CC77F72D91F497CF6E79A3A83925732FEB7778EFB8BF5DBC226EC3F8E3CC153AAC52ABF42E0A2C5C3657E970
3,169,545 UART: Caliptra RT
3,169,798 UART: [state] CFI Enabled
3,277,453 UART: [rt] RT listening for mailbox commands...
3,278,123 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,473 UART: [rt]cmd =0x4d454153, len=108
3,328,778 >>> mbox cmd response data (12 bytes)
3,328,779 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,822 UART: [rt]cmd =0x4d454153, len=108
3,380,285 >>> mbox cmd response data (12 bytes)
3,380,286 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,410,175 UART: [rt]cmd =0x4d454153, len=108
3,430,626 >>> mbox cmd response data (12 bytes)
3,430,627 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,460,796 UART: [rt]cmd =0x4d454153, len=108
3,482,207 >>> mbox cmd response data (12 bytes)
3,482,208 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,512,281 UART: [rt]cmd =0x4d454153, len=108
3,532,402 >>> mbox cmd response data (12 bytes)
3,532,403 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,440 UART: [rt]cmd =0x4d454153, len=108
3,582,971 >>> mbox cmd response data (12 bytes)
3,582,972 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,047 UART: [rt]cmd =0x4d454153, len=108
3,633,674 >>> mbox cmd response data (12 bytes)
3,633,675 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,598 UART: [rt]cmd =0x4d454153, len=108
3,684,923 >>> mbox cmd response data (12 bytes)
3,684,924 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,033 UART: [rt]cmd =0x4d454153, len=108
3,735,188 >>> mbox cmd response data (12 bytes)
3,735,189 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,230 UART: [rt]cmd =0x4d454153, len=108
3,785,875 >>> mbox cmd response data (12 bytes)
3,785,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,013 UART: [rt]cmd =0x4d454153, len=108
3,836,626 >>> mbox cmd response data (12 bytes)
3,836,627 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,746 UART: [rt]cmd =0x4d454153, len=108
3,887,437 >>> mbox cmd response data (12 bytes)
3,887,438 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,917,419 UART: [rt]cmd =0x4d454153, len=108
3,938,990 >>> mbox cmd response data (12 bytes)
3,938,991 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,969,070 UART: [rt]cmd =0x4d454153, len=108
3,989,615 >>> mbox cmd response data (12 bytes)
3,989,616 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,019,679 UART: [rt]cmd =0x4d454153, len=108
4,040,420 >>> mbox cmd response data (12 bytes)
4,040,421 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,070,370 UART: [rt]cmd =0x4d454153, len=108
4,072,376 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,882 ready_for_fw is high
1,055,882 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,351 >>> mbox cmd response: success
2,685,001 UART:
2,685,017 UART: Running Caliptra FMC ...
2,685,425 UART:
2,685,479 UART: [state] CFI Enabled
2,696,086 UART: [fht] FMC Alias Private Key: 7
2,804,999 UART: [art] Extend RT PCRs Done
2,805,427 UART: [art] Lock RT PCRs Done
2,806,839 UART: [art] Populate DV Done
2,815,018 UART: [fht] FMC Alias Private Key: 7
2,815,976 UART: [art] Derive CDI
2,816,256 UART: [art] Store in in slot 0x4
2,901,605 UART: [art] Derive Key Pair
2,901,965 UART: [art] Store priv key in slot 0x5
2,914,729 UART: [art] Derive Key Pair - Done
2,929,218 UART: [art] Signing Cert with AUTHO
2,929,698 UART: RITY.KEYID = 7
2,945,016 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,781 UART: [art] PUB.X = 7A1E176F09CC9633BEDD9114E0D02D4717BC25B8FD8199D77EA054CE415DBAA0E3617F1AC74874CA1F8C7663256067C7
2,952,556 UART: [art] PUB.Y = A1FA6A897451505F18CAA2987D58E9D05F4C7FDA67FB34BD37F658F32EFDC577A432782CF14310D4E973503793682933
2,959,506 UART: [art] SIG.R = 1941E356AAFAD94E5845077D4D64F5919AA24DA392BE15D7B6DC71FF3C83422186336566456D07276F9ECC6A35452DF7
2,966,270 UART: [art] SIG.S = 7D2BE1350AAFB492D3F4C00128E4536AFE743865884B89006AE5E75F811A7E7FEDBC9F2775F96223A1CD64827B844A7C
2,990,039 UART: Caliptra RT
2,990,292 UART: [state] CFI Enabled
3,097,629 UART: [rt] RT listening for mailbox commands...
3,098,299 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,759 UART: [rt]cmd =0x4d454153, len=108
3,149,742 >>> mbox cmd response data (12 bytes)
3,149,743 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,179,736 UART: [rt]cmd =0x4d454153, len=108
3,201,173 >>> mbox cmd response data (12 bytes)
3,201,174 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,455 UART: [rt]cmd =0x4d454153, len=108
3,251,792 >>> mbox cmd response data (12 bytes)
3,251,793 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,281,732 UART: [rt]cmd =0x4d454153, len=108
3,302,057 >>> mbox cmd response data (12 bytes)
3,302,058 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,047 UART: [rt]cmd =0x4d454153, len=108
3,352,534 >>> mbox cmd response data (12 bytes)
3,352,535 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,382,342 UART: [rt]cmd =0x4d454153, len=108
3,402,965 >>> mbox cmd response data (12 bytes)
3,402,966 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,993 UART: [rt]cmd =0x4d454153, len=108
3,453,840 >>> mbox cmd response data (12 bytes)
3,453,841 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,484,050 UART: [rt]cmd =0x4d454153, len=108
3,505,057 >>> mbox cmd response data (12 bytes)
3,505,058 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,065 UART: [rt]cmd =0x4d454153, len=108
3,556,540 >>> mbox cmd response data (12 bytes)
3,556,541 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,512 UART: [rt]cmd =0x4d454153, len=108
3,607,133 >>> mbox cmd response data (12 bytes)
3,607,134 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,179 UART: [rt]cmd =0x4d454153, len=108
3,658,112 >>> mbox cmd response data (12 bytes)
3,658,113 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,688,378 UART: [rt]cmd =0x4d454153, len=108
3,708,795 >>> mbox cmd response data (12 bytes)
3,708,796 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,107 UART: [rt]cmd =0x4d454153, len=108
3,760,232 >>> mbox cmd response data (12 bytes)
3,760,233 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,294 UART: [rt]cmd =0x4d454153, len=108
3,811,311 >>> mbox cmd response data (12 bytes)
3,811,312 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,841,503 UART: [rt]cmd =0x4d454153, len=108
3,862,554 >>> mbox cmd response data (12 bytes)
3,862,555 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,892,398 UART: [rt]cmd =0x4d454153, len=108
3,894,504 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
88,151 UART: [kat] SHA2-256
891,701 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,830 UART: [kat] ++
895,982 UART: [kat] sha1
900,222 UART: [kat] SHA2-256
902,162 UART: [kat] SHA2-384
905,061 UART: [kat] SHA2-512-ACC
906,962 UART: [kat] ECC-384
916,899 UART: [kat] HMAC-384Kdf
921,491 UART: [kat] LMS
1,169,803 UART: [kat] --
1,170,432 UART: [cold-reset] ++
1,171,002 UART: [fht] FHT @ 0x50003400
1,173,868 UART: [idev] ++
1,174,036 UART: [idev] CDI.KEYID = 6
1,174,397 UART: [idev] SUBJECT.KEYID = 7
1,174,822 UART: [idev] UDS.KEYID = 0
1,175,168 ready_for_fw is high
1,175,168 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,078 UART: [idev] Erasing UDS.KEYID = 0
1,200,590 UART: [idev] Sha1 KeyId Algorithm
1,209,580 UART: [idev] --
1,210,657 UART: [ldev] ++
1,210,825 UART: [ldev] CDI.KEYID = 6
1,211,189 UART: [ldev] SUBJECT.KEYID = 5
1,211,616 UART: [ldev] AUTHORITY.KEYID = 7
1,212,079 UART: [ldev] FE.KEYID = 1
1,217,179 UART: [ldev] Erasing FE.KEYID = 1
1,243,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,141 UART: [ldev] --
1,282,655 UART: [fwproc] Wait for Commands...
1,283,446 UART: [fwproc] Recv command 0x46574c44
1,284,179 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,093 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,402 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,312 >>> mbox cmd response: success
2,774,535 UART: [afmc] ++
2,774,703 UART: [afmc] CDI.KEYID = 6
2,775,066 UART: [afmc] SUBJECT.KEYID = 7
2,775,492 UART: [afmc] AUTHORITY.KEYID = 5
2,811,753 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,732 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,461 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,344 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,063 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,792 UART: [afmc] --
2,854,834 UART: [cold-reset] --
2,855,610 UART: [state] Locking Datavault
2,856,815 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,419 UART: [state] Locking ICCM
2,857,917 UART: [exit] Launching FMC @ 0x40000130
2,863,246 UART:
2,863,262 UART: Running Caliptra FMC ...
2,863,670 UART:
2,863,813 UART: [state] CFI Enabled
2,874,056 UART: [fht] FMC Alias Private Key: 7
2,981,961 UART: [art] Extend RT PCRs Done
2,982,389 UART: [art] Lock RT PCRs Done
2,983,921 UART: [art] Populate DV Done
2,992,140 UART: [fht] FMC Alias Private Key: 7
2,993,124 UART: [art] Derive CDI
2,993,404 UART: [art] Store in in slot 0x4
3,078,927 UART: [art] Derive Key Pair
3,079,287 UART: [art] Store priv key in slot 0x5
3,091,991 UART: [art] Derive Key Pair - Done
3,106,576 UART: [art] Signing Cert with AUTHO
3,107,056 UART: RITY.KEYID = 7
3,122,156 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,921 UART: [art] PUB.X = 0B0D1A732459ACA6921B0A1C9F3E5782892160AC731D4FA7FDFEADBA28A7B5AF7143938C5CDBEEAA16252EA9E8C2C3A3
3,129,704 UART: [art] PUB.Y = 15360473E3DF33B66DC5CEC8F286F5CFD2663486E4440571827CB2B48D80788E570BB5FB71F3CB0968CFD5F0D16DDBB4
3,136,652 UART: [art] SIG.R = 222BF4E28E3CDB6DFBE77506EFE723119780AAC0E17C2B93A5EA3A89277B00E52ED212629DAD20A62E82E5DA6ABB2C48
3,143,415 UART: [art] SIG.S = 987B9AB342ED979599E0F61ED96181D38525A3EA1AA4D4CDFA7559880138301AA98407619B6725B61C183648DABCA79D
3,167,000 UART: Caliptra RT
3,167,345 UART: [state] CFI Enabled
3,275,286 UART: [rt] RT listening for mailbox commands...
3,275,956 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,384 UART: [rt]cmd =0x4d454153, len=108
3,327,283 >>> mbox cmd response data (12 bytes)
3,327,284 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,325 UART: [rt]cmd =0x4d454153, len=108
3,377,582 >>> mbox cmd response data (12 bytes)
3,377,583 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,434 UART: [rt]cmd =0x4d454153, len=108
3,428,187 >>> mbox cmd response data (12 bytes)
3,428,188 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,458,327 UART: [rt]cmd =0x4d454153, len=108
3,478,968 >>> mbox cmd response data (12 bytes)
3,478,969 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,508,942 UART: [rt]cmd =0x4d454153, len=108
3,530,043 >>> mbox cmd response data (12 bytes)
3,530,044 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,025 UART: [rt]cmd =0x4d454153, len=108
3,580,444 >>> mbox cmd response data (12 bytes)
3,580,445 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,586 UART: [rt]cmd =0x4d454153, len=108
3,632,001 >>> mbox cmd response data (12 bytes)
3,632,002 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,067 UART: [rt]cmd =0x4d454153, len=108
3,683,218 >>> mbox cmd response data (12 bytes)
3,683,219 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,078 UART: [rt]cmd =0x4d454153, len=108
3,734,789 >>> mbox cmd response data (12 bytes)
3,734,790 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,963 UART: [rt]cmd =0x4d454153, len=108
3,785,182 >>> mbox cmd response data (12 bytes)
3,785,183 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,815,146 UART: [rt]cmd =0x4d454153, len=108
3,836,179 >>> mbox cmd response data (12 bytes)
3,836,180 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,183 UART: [rt]cmd =0x4d454153, len=108
3,886,400 >>> mbox cmd response data (12 bytes)
3,886,401 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,488 UART: [rt]cmd =0x4d454153, len=108
3,937,439 >>> mbox cmd response data (12 bytes)
3,937,440 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,967,237 UART: [rt]cmd =0x4d454153, len=108
3,987,778 >>> mbox cmd response data (12 bytes)
3,987,779 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,017,746 UART: [rt]cmd =0x4d454153, len=108
4,038,359 >>> mbox cmd response data (12 bytes)
4,038,360 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,339 UART: [rt]cmd =0x4d454153, len=108
4,070,351 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,283 ready_for_fw is high
1,056,283 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,490 >>> mbox cmd response: success
2,683,602 UART:
2,683,618 UART: Running Caliptra FMC ...
2,684,026 UART:
2,684,169 UART: [state] CFI Enabled
2,694,918 UART: [fht] FMC Alias Private Key: 7
2,803,261 UART: [art] Extend RT PCRs Done
2,803,689 UART: [art] Lock RT PCRs Done
2,805,393 UART: [art] Populate DV Done
2,813,582 UART: [fht] FMC Alias Private Key: 7
2,814,618 UART: [art] Derive CDI
2,814,898 UART: [art] Store in in slot 0x4
2,901,041 UART: [art] Derive Key Pair
2,901,401 UART: [art] Store priv key in slot 0x5
2,914,857 UART: [art] Derive Key Pair - Done
2,930,102 UART: [art] Signing Cert with AUTHO
2,930,582 UART: RITY.KEYID = 7
2,946,006 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,771 UART: [art] PUB.X = 5D0DB9546A464A18C4C4125884236E989808FC368CB0CC3FA854D8731F19913FDFB244DB6BB048811EBAA2FE144039BB
2,953,541 UART: [art] PUB.Y = 912B26E23449CED0EA0D8500787ABA44DB1F21F3823A9D5EB56AFF6184EB4B2E1110632937DDBF49294A29654BA69CA3
2,960,474 UART: [art] SIG.R = C7A1847F629642301456B54ADBCA0817B8D87AFAB08669E1A51424F80295AEAD980F4A6EF00A3D96B6BC1552DAF0CE22
2,967,242 UART: [art] SIG.S = 0D2D951BDDA877CE705B010DAB2F663C0A01F6495A823B9E7659B7C81FD5326CC4DA83D792F0579B40565DA4B517BD5D
2,990,726 UART: Caliptra RT
2,991,071 UART: [state] CFI Enabled
3,098,888 UART: [rt] RT listening for mailbox commands...
3,099,558 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,224 UART: [rt]cmd =0x4d454153, len=108
3,150,263 >>> mbox cmd response data (12 bytes)
3,150,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,180,427 UART: [rt]cmd =0x4d454153, len=108
3,201,096 >>> mbox cmd response data (12 bytes)
3,201,097 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,872 UART: [rt]cmd =0x4d454153, len=108
3,251,175 >>> mbox cmd response data (12 bytes)
3,251,176 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,281,091 UART: [rt]cmd =0x4d454153, len=108
3,302,286 >>> mbox cmd response data (12 bytes)
3,302,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,172 UART: [rt]cmd =0x4d454153, len=108
3,353,123 >>> mbox cmd response data (12 bytes)
3,353,124 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,383,179 UART: [rt]cmd =0x4d454153, len=108
3,403,674 >>> mbox cmd response data (12 bytes)
3,403,675 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,726 UART: [rt]cmd =0x4d454153, len=108
3,454,083 >>> mbox cmd response data (12 bytes)
3,454,084 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,484,317 UART: [rt]cmd =0x4d454153, len=108
3,505,246 >>> mbox cmd response data (12 bytes)
3,505,247 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,290 UART: [rt]cmd =0x4d454153, len=108
3,556,687 >>> mbox cmd response data (12 bytes)
3,556,688 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,777 UART: [rt]cmd =0x4d454153, len=108
3,607,074 >>> mbox cmd response data (12 bytes)
3,607,075 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,260 UART: [rt]cmd =0x4d454153, len=108
3,658,097 >>> mbox cmd response data (12 bytes)
3,658,098 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,688,187 UART: [rt]cmd =0x4d454153, len=108
3,708,584 >>> mbox cmd response data (12 bytes)
3,708,585 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,470 UART: [rt]cmd =0x4d454153, len=108
3,759,169 >>> mbox cmd response data (12 bytes)
3,759,170 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,789,377 UART: [rt]cmd =0x4d454153, len=108
3,810,238 >>> mbox cmd response data (12 bytes)
3,810,239 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,840,378 UART: [rt]cmd =0x4d454153, len=108
3,860,787 >>> mbox cmd response data (12 bytes)
3,860,788 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,890,969 UART: [rt]cmd =0x4d454153, len=108
3,892,823 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,455 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,009 UART: [kat] SHA2-256
881,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,055 UART: [kat] ++
886,207 UART: [kat] sha1
890,497 UART: [kat] SHA2-256
892,435 UART: [kat] SHA2-384
895,200 UART: [kat] SHA2-512-ACC
897,101 UART: [kat] ECC-384
902,406 UART: [kat] HMAC-384Kdf
907,108 UART: [kat] LMS
1,475,304 UART: [kat] --
1,476,367 UART: [cold-reset] ++
1,476,869 UART: [fht] Storing FHT @ 0x50003400
1,479,556 UART: [idev] ++
1,479,724 UART: [idev] CDI.KEYID = 6
1,480,084 UART: [idev] SUBJECT.KEYID = 7
1,480,508 UART: [idev] UDS.KEYID = 0
1,480,853 ready_for_fw is high
1,480,853 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,378 UART: [idev] Erasing UDS.KEYID = 0
1,505,164 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,756 UART: [idev] --
1,514,761 UART: [ldev] ++
1,514,929 UART: [ldev] CDI.KEYID = 6
1,515,292 UART: [ldev] SUBJECT.KEYID = 5
1,515,718 UART: [ldev] AUTHORITY.KEYID = 7
1,516,181 UART: [ldev] FE.KEYID = 1
1,521,507 UART: [ldev] Erasing FE.KEYID = 1
1,547,428 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,398 UART: [ldev] --
1,586,905 UART: [fwproc] Waiting for Commands...
1,587,698 UART: [fwproc] Received command 0x46574c44
1,588,489 UART: [fwproc] Received Image of size 114332 bytes
2,886,492 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,010 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,362 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,121 >>> mbox cmd response: success
3,080,243 UART: [afmc] ++
3,080,411 UART: [afmc] CDI.KEYID = 6
3,080,773 UART: [afmc] SUBJECT.KEYID = 7
3,081,198 UART: [afmc] AUTHORITY.KEYID = 5
3,116,015 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,423 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,203 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,931 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,816 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,506 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,401 UART: [afmc] --
3,159,295 UART: [cold-reset] --
3,160,147 UART: [state] Locking Datavault
3,161,218 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,822 UART: [state] Locking ICCM
3,162,450 UART: [exit] Launching FMC @ 0x40000130
3,167,779 UART:
3,167,795 UART: Running Caliptra FMC ...
3,168,203 UART:
3,168,257 UART: [state] CFI Enabled
3,178,914 UART: [fht] FMC Alias Private Key: 7
3,286,803 UART: [art] Extend RT PCRs Done
3,287,231 UART: [art] Lock RT PCRs Done
3,288,691 UART: [art] Populate DV Done
3,296,960 UART: [fht] FMC Alias Private Key: 7
3,297,972 UART: [art] Derive CDI
3,298,252 UART: [art] Store in in slot 0x4
3,384,057 UART: [art] Derive Key Pair
3,384,417 UART: [art] Store priv key in slot 0x5
3,397,537 UART: [art] Derive Key Pair - Done
3,412,502 UART: [art] Signing Cert with AUTHO
3,412,982 UART: RITY.KEYID = 7
3,427,604 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,369 UART: [art] PUB.X = E6ED445B116DA574A8E64A8958A4EDC241A096D60640D2F23FD6F7F4C7B0E323AC2AB1EDE3A402A69CAC2C663F19D579
3,435,149 UART: [art] PUB.Y = 29798517F85386AE6AADCF2B3B5C8CE6C49CC2751F7CEA4948B983A4EDF43409D2F797947E21BE2771B30F0D2A6AD382
3,442,100 UART: [art] SIG.R = CA95BAD16CC4D758E4ADEA1E69EA14FDC6B9877C53A3AB19597598745C5022A1B7ABE14A865FDDF1AA4A4D04578ABABA
3,448,893 UART: [art] SIG.S = B5D7018B99471C0368F3E739D3F07F54314DB08861C5930CCED15F0602FFDFC9DAED4B078F1E7192B5ED499BC6680DC2
3,472,725 UART: Caliptra RT
3,472,978 UART: [state] CFI Enabled
3,581,990 UART: [rt] RT listening for mailbox commands...
3,582,660 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,724 UART: [rt]cmd =0x44504543, len=40
3,638,697 >>> mbox cmd response data (40 bytes)
3,638,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,668,591 UART: [rt]cmd =0x44504543, len=96
3,708,812 >>> mbox cmd response data (56 bytes)
3,708,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,932 UART: [rt]cmd =0x44504543, len=96
3,779,430 >>> mbox cmd response data (56 bytes)
3,779,431 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,192 UART: [rt]cmd =0x44504543, len=96
3,849,880 >>> mbox cmd response data (56 bytes)
3,849,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,882 UART: [rt]cmd =0x44504543, len=96
3,920,408 >>> mbox cmd response data (56 bytes)
3,920,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,300 UART: [rt]cmd =0x44504543, len=96
3,991,500 >>> mbox cmd response data (56 bytes)
3,991,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,021,308 UART: [rt]cmd =0x44504543, len=96
4,063,238 >>> mbox cmd response data (56 bytes)
4,063,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,093,264 UART: [rt]cmd =0x44504543, len=96
4,135,248 >>> mbox cmd response data (56 bytes)
4,135,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,165,100 UART: [rt]cmd =0x44504543, len=96
4,207,742 >>> mbox cmd response data (56 bytes)
4,207,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,237,652 UART: [rt]cmd =0x44504543, len=96
4,279,500 >>> mbox cmd response data (56 bytes)
4,279,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,309,434 UART: [rt]cmd =0x44504543, len=96
4,352,024 >>> mbox cmd response data (56 bytes)
4,352,025 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,382,114 UART: [rt]cmd =0x44504543, len=96
4,424,870 >>> mbox cmd response data (56 bytes)
4,424,871 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,454,866 UART: [rt]cmd =0x44504543, len=96
4,499,056 >>> mbox cmd response data (56 bytes)
4,499,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,528,988 UART: [rt]cmd =0x44504543, len=96
4,572,396 >>> mbox cmd response data (56 bytes)
4,572,397 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,602,430 UART: [rt]cmd =0x44504543, len=96
4,646,466 >>> mbox cmd response data (56 bytes)
4,646,467 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,676,298 UART: [rt]cmd =0x44504543, len=96
4,721,444 >>> mbox cmd response data (56 bytes)
4,721,445 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,751,572 UART: [rt]cmd =0x44504543, len=96
4,758,745 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,955 ready_for_fw is high
1,362,955 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,244 >>> mbox cmd response: success
2,991,096 UART:
2,991,112 UART: Running Caliptra FMC ...
2,991,520 UART:
2,991,574 UART: [state] CFI Enabled
3,002,265 UART: [fht] FMC Alias Private Key: 7
3,110,136 UART: [art] Extend RT PCRs Done
3,110,564 UART: [art] Lock RT PCRs Done
3,112,030 UART: [art] Populate DV Done
3,120,289 UART: [fht] FMC Alias Private Key: 7
3,121,251 UART: [art] Derive CDI
3,121,531 UART: [art] Store in in slot 0x4
3,207,132 UART: [art] Derive Key Pair
3,207,492 UART: [art] Store priv key in slot 0x5
3,220,722 UART: [art] Derive Key Pair - Done
3,235,575 UART: [art] Signing Cert with AUTHO
3,236,055 UART: RITY.KEYID = 7
3,250,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,702 UART: [art] PUB.X = 2EBECE1ACA5D2C26305078BEE8823A87C206D5005AFE7D8D45AE1A2C4F8739C5A91A40F6A2303BEEA8A5411061B47D30
3,258,461 UART: [art] PUB.Y = 24AF0B1D2FE69008AD41AC76C5BD4281138678913D01B5568795C5B24303D3C4F9207FC4E84F855BCA1125BF6D1CB317
3,265,401 UART: [art] SIG.R = 15F547898987F16E3B0E1E84D1249AE2FB021BC876EBEF1B40F306E28C0C76288D87FFEAD2E2267C3AEF45354A199B6C
3,272,169 UART: [art] SIG.S = 6F50A0BF917A1D3C4D07DB65D28F163E899FEC8CCBAF9588E84C3CF1F2C2B2831638DBD6CC6D33FD622EF007FE36B3FD
3,296,282 UART: Caliptra RT
3,296,535 UART: [state] CFI Enabled
3,405,327 UART: [rt] RT listening for mailbox commands...
3,405,997 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,297 UART: [rt]cmd =0x44504543, len=40
3,462,346 >>> mbox cmd response data (40 bytes)
3,462,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,492,432 UART: [rt]cmd =0x44504543, len=96
3,532,831 >>> mbox cmd response data (56 bytes)
3,532,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,649 UART: [rt]cmd =0x44504543, len=96
3,603,325 >>> mbox cmd response data (56 bytes)
3,603,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,433 UART: [rt]cmd =0x44504543, len=96
3,674,277 >>> mbox cmd response data (56 bytes)
3,674,278 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,271 UART: [rt]cmd =0x44504543, len=96
3,745,755 >>> mbox cmd response data (56 bytes)
3,745,756 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,637 UART: [rt]cmd =0x44504543, len=96
3,817,361 >>> mbox cmd response data (56 bytes)
3,817,362 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,847,379 UART: [rt]cmd =0x44504543, len=96
3,889,257 >>> mbox cmd response data (56 bytes)
3,889,258 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,165 UART: [rt]cmd =0x44504543, len=96
3,960,945 >>> mbox cmd response data (56 bytes)
3,960,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,990,851 UART: [rt]cmd =0x44504543, len=96
4,033,347 >>> mbox cmd response data (56 bytes)
4,033,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,063,409 UART: [rt]cmd =0x44504543, len=96
4,106,267 >>> mbox cmd response data (56 bytes)
4,106,268 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,136,267 UART: [rt]cmd =0x44504543, len=96
4,178,927 >>> mbox cmd response data (56 bytes)
4,178,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,208,909 UART: [rt]cmd =0x44504543, len=96
4,251,559 >>> mbox cmd response data (56 bytes)
4,251,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,281,625 UART: [rt]cmd =0x44504543, len=96
4,325,043 >>> mbox cmd response data (56 bytes)
4,325,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,355,031 UART: [rt]cmd =0x44504543, len=96
4,397,897 >>> mbox cmd response data (56 bytes)
4,397,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,428,025 UART: [rt]cmd =0x44504543, len=96
4,471,739 >>> mbox cmd response data (56 bytes)
4,471,740 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,501,861 UART: [rt]cmd =0x44504543, len=96
4,546,241 >>> mbox cmd response data (56 bytes)
4,546,242 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,576,305 UART: [rt]cmd =0x44504543, len=96
4,583,540 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,582 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,078 UART: [kat] SHA2-256
882,009 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,124 UART: [kat] ++
886,276 UART: [kat] sha1
890,670 UART: [kat] SHA2-256
892,608 UART: [kat] SHA2-384
895,407 UART: [kat] SHA2-512-ACC
897,308 UART: [kat] ECC-384
902,925 UART: [kat] HMAC-384Kdf
907,391 UART: [kat] LMS
1,475,587 UART: [kat] --
1,476,412 UART: [cold-reset] ++
1,476,958 UART: [fht] Storing FHT @ 0x50003400
1,479,749 UART: [idev] ++
1,479,917 UART: [idev] CDI.KEYID = 6
1,480,277 UART: [idev] SUBJECT.KEYID = 7
1,480,701 UART: [idev] UDS.KEYID = 0
1,481,046 ready_for_fw is high
1,481,046 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,987 UART: [idev] Erasing UDS.KEYID = 0
1,505,369 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,829 UART: [idev] --
1,515,128 UART: [ldev] ++
1,515,296 UART: [ldev] CDI.KEYID = 6
1,515,659 UART: [ldev] SUBJECT.KEYID = 5
1,516,085 UART: [ldev] AUTHORITY.KEYID = 7
1,516,548 UART: [ldev] FE.KEYID = 1
1,522,100 UART: [ldev] Erasing FE.KEYID = 1
1,547,785 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,603 UART: [ldev] --
1,587,000 UART: [fwproc] Waiting for Commands...
1,587,705 UART: [fwproc] Received command 0x46574c44
1,588,496 UART: [fwproc] Received Image of size 114332 bytes
2,885,974 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,762 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,114 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,003 >>> mbox cmd response: success
3,080,145 UART: [afmc] ++
3,080,313 UART: [afmc] CDI.KEYID = 6
3,080,675 UART: [afmc] SUBJECT.KEYID = 7
3,081,100 UART: [afmc] AUTHORITY.KEYID = 5
3,116,279 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,583 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,363 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,091 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,976 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,666 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,443 UART: [afmc] --
3,159,553 UART: [cold-reset] --
3,160,429 UART: [state] Locking Datavault
3,161,814 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,418 UART: [state] Locking ICCM
3,163,062 UART: [exit] Launching FMC @ 0x40000130
3,168,391 UART:
3,168,407 UART: Running Caliptra FMC ...
3,168,815 UART:
3,168,958 UART: [state] CFI Enabled
3,179,751 UART: [fht] FMC Alias Private Key: 7
3,287,434 UART: [art] Extend RT PCRs Done
3,287,862 UART: [art] Lock RT PCRs Done
3,289,380 UART: [art] Populate DV Done
3,297,723 UART: [fht] FMC Alias Private Key: 7
3,298,757 UART: [art] Derive CDI
3,299,037 UART: [art] Store in in slot 0x4
3,385,092 UART: [art] Derive Key Pair
3,385,452 UART: [art] Store priv key in slot 0x5
3,398,816 UART: [art] Derive Key Pair - Done
3,413,538 UART: [art] Signing Cert with AUTHO
3,414,018 UART: RITY.KEYID = 7
3,429,580 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,345 UART: [art] PUB.X = 92AE1B8D81617ABB7A4D0556113DB1FE3754A167C0D536C539D33DE8FE156962BE60EC740609C63F83836DB8F3AA5D76
3,437,112 UART: [art] PUB.Y = A4D1A71DE5C0863C4CD6F0FA61659CA89FE294372F9C0023D117E72B9924C86C612CC835984B76F60BB02D784A606B97
3,444,039 UART: [art] SIG.R = E86C2C41379B9D15D9B299E9CB5675045EE124C49097538AF60650AE4966B1E571C58F477F975731B3CBE4163B05D0B1
3,450,796 UART: [art] SIG.S = B1CEB22AB309954388A757D26E41132AAB6343CC3788F74F110FD6758CB3A46C08F940DD71C79126F19297FEDCE1E2DC
3,474,334 UART: Caliptra RT
3,474,679 UART: [state] CFI Enabled
3,582,765 UART: [rt] RT listening for mailbox commands...
3,583,435 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,665 UART: [rt]cmd =0x44504543, len=40
3,639,540 >>> mbox cmd response data (40 bytes)
3,639,541 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,669,776 UART: [rt]cmd =0x44504543, len=96
3,711,301 >>> mbox cmd response data (56 bytes)
3,711,302 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,059 UART: [rt]cmd =0x44504543, len=96
3,781,359 >>> mbox cmd response data (56 bytes)
3,781,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,047 UART: [rt]cmd =0x44504543, len=96
3,851,731 >>> mbox cmd response data (56 bytes)
3,851,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,747 UART: [rt]cmd =0x44504543, len=96
3,922,981 >>> mbox cmd response data (56 bytes)
3,922,982 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,897 UART: [rt]cmd =0x44504543, len=96
3,994,493 >>> mbox cmd response data (56 bytes)
3,994,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,024,559 UART: [rt]cmd =0x44504543, len=96
4,066,271 >>> mbox cmd response data (56 bytes)
4,066,272 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,096,443 UART: [rt]cmd =0x44504543, len=96
4,138,725 >>> mbox cmd response data (56 bytes)
4,138,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,168,531 UART: [rt]cmd =0x44504543, len=96
4,210,875 >>> mbox cmd response data (56 bytes)
4,210,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,240,797 UART: [rt]cmd =0x44504543, len=96
4,283,277 >>> mbox cmd response data (56 bytes)
4,283,278 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,312,997 UART: [rt]cmd =0x44504543, len=96
4,355,733 >>> mbox cmd response data (56 bytes)
4,355,734 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,385,777 UART: [rt]cmd =0x44504543, len=96
4,429,067 >>> mbox cmd response data (56 bytes)
4,429,068 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,459,125 UART: [rt]cmd =0x44504543, len=96
4,501,861 >>> mbox cmd response data (56 bytes)
4,501,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,531,763 UART: [rt]cmd =0x44504543, len=96
4,575,877 >>> mbox cmd response data (56 bytes)
4,575,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,605,805 UART: [rt]cmd =0x44504543, len=96
4,649,361 >>> mbox cmd response data (56 bytes)
4,649,362 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,679,189 UART: [rt]cmd =0x44504543, len=96
4,723,937 >>> mbox cmd response data (56 bytes)
4,723,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,753,993 UART: [rt]cmd =0x44504543, len=96
4,761,334 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,886 ready_for_fw is high
1,362,886 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,885 >>> mbox cmd response: success
2,990,927 UART:
2,990,943 UART: Running Caliptra FMC ...
2,991,351 UART:
2,991,494 UART: [state] CFI Enabled
3,002,291 UART: [fht] FMC Alias Private Key: 7
3,110,400 UART: [art] Extend RT PCRs Done
3,110,828 UART: [art] Lock RT PCRs Done
3,112,694 UART: [art] Populate DV Done
3,120,889 UART: [fht] FMC Alias Private Key: 7
3,121,897 UART: [art] Derive CDI
3,122,177 UART: [art] Store in in slot 0x4
3,207,960 UART: [art] Derive Key Pair
3,208,320 UART: [art] Store priv key in slot 0x5
3,221,186 UART: [art] Derive Key Pair - Done
3,236,025 UART: [art] Signing Cert with AUTHO
3,236,505 UART: RITY.KEYID = 7
3,252,129 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,894 UART: [art] PUB.X = 0E55C810E1F76C32EFF7E38409DC6EA0B04CE01F6D3F53DF3384B72B005ECEFFA87899A2420A22844C8798B279A9C41C
3,259,643 UART: [art] PUB.Y = 0D279EC2C80EE953FF3FCB2CD2EADE1ADEBFBD7773DB67A6FD3B958566A858A5E68C8C358722AA35E06109FB912D9229
3,266,604 UART: [art] SIG.R = 3AE86B6718EE33CE133F1F6CAAA61AE18A4F13AEFF55DC7CDD2A6CEB03C8C0BFF8D3EB8C2415AD3B076296D7113C988E
3,273,396 UART: [art] SIG.S = E24BEAAF15B9236E76BC75739345318690757915FFBC7405C8E247EB14FAD594843462F1068B5FA44A0F047AE569B99F
3,297,309 UART: Caliptra RT
3,297,654 UART: [state] CFI Enabled
3,406,745 UART: [rt] RT listening for mailbox commands...
3,407,415 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,545 UART: [rt]cmd =0x44504543, len=40
3,463,902 >>> mbox cmd response data (40 bytes)
3,463,903 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,493,938 UART: [rt]cmd =0x44504543, len=96
3,534,159 >>> mbox cmd response data (56 bytes)
3,534,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,033 UART: [rt]cmd =0x44504543, len=96
3,603,975 >>> mbox cmd response data (56 bytes)
3,603,976 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,969 UART: [rt]cmd =0x44504543, len=96
3,674,697 >>> mbox cmd response data (56 bytes)
3,674,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,761 UART: [rt]cmd =0x44504543, len=96
3,745,149 >>> mbox cmd response data (56 bytes)
3,745,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,093 UART: [rt]cmd =0x44504543, len=96
3,816,883 >>> mbox cmd response data (56 bytes)
3,816,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,846,737 UART: [rt]cmd =0x44504543, len=96
3,888,407 >>> mbox cmd response data (56 bytes)
3,888,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,101 UART: [rt]cmd =0x44504543, len=96
3,959,591 >>> mbox cmd response data (56 bytes)
3,959,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,989,641 UART: [rt]cmd =0x44504543, len=96
4,031,757 >>> mbox cmd response data (56 bytes)
4,031,758 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,061,835 UART: [rt]cmd =0x44504543, len=96
4,104,125 >>> mbox cmd response data (56 bytes)
4,104,126 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,134,043 UART: [rt]cmd =0x44504543, len=96
4,176,417 >>> mbox cmd response data (56 bytes)
4,176,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,206,479 UART: [rt]cmd =0x44504543, len=96
4,248,741 >>> mbox cmd response data (56 bytes)
4,248,742 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,278,727 UART: [rt]cmd =0x44504543, len=96
4,322,271 >>> mbox cmd response data (56 bytes)
4,322,272 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,352,119 UART: [rt]cmd =0x44504543, len=96
4,395,939 >>> mbox cmd response data (56 bytes)
4,395,940 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,425,747 UART: [rt]cmd =0x44504543, len=96
4,469,933 >>> mbox cmd response data (56 bytes)
4,469,934 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,499,923 UART: [rt]cmd =0x44504543, len=96
4,544,675 >>> mbox cmd response data (56 bytes)
4,544,676 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,574,705 UART: [rt]cmd =0x44504543, len=96
4,581,676 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
893,174 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,299 UART: [kat] ++
897,451 UART: [kat] sha1
901,455 UART: [kat] SHA2-256
903,395 UART: [kat] SHA2-384
906,244 UART: [kat] SHA2-512-ACC
908,145 UART: [kat] ECC-384
917,846 UART: [kat] HMAC-384Kdf
922,516 UART: [kat] LMS
1,170,844 UART: [kat] --
1,171,717 UART: [cold-reset] ++
1,172,195 UART: [fht] FHT @ 0x50003400
1,174,834 UART: [idev] ++
1,175,002 UART: [idev] CDI.KEYID = 6
1,175,362 UART: [idev] SUBJECT.KEYID = 7
1,175,786 UART: [idev] UDS.KEYID = 0
1,176,131 ready_for_fw is high
1,176,131 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,404 UART: [idev] Erasing UDS.KEYID = 0
1,200,479 UART: [idev] Sha1 KeyId Algorithm
1,208,951 UART: [idev] --
1,209,947 UART: [ldev] ++
1,210,115 UART: [ldev] CDI.KEYID = 6
1,210,478 UART: [ldev] SUBJECT.KEYID = 5
1,210,904 UART: [ldev] AUTHORITY.KEYID = 7
1,211,367 UART: [ldev] FE.KEYID = 1
1,216,715 UART: [ldev] Erasing FE.KEYID = 1
1,242,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,397 UART: [ldev] --
1,281,700 UART: [fwproc] Wait for Commands...
1,282,484 UART: [fwproc] Recv command 0x46574c44
1,283,212 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,918 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,222 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,043 >>> mbox cmd response: success
2,775,079 UART: [afmc] ++
2,775,247 UART: [afmc] CDI.KEYID = 6
2,775,609 UART: [afmc] SUBJECT.KEYID = 7
2,776,034 UART: [afmc] AUTHORITY.KEYID = 5
2,811,599 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,940 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,688 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,416 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,301 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,020 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,862 UART: [afmc] --
2,854,768 UART: [cold-reset] --
2,855,710 UART: [state] Locking Datavault
2,856,723 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,327 UART: [state] Locking ICCM
2,857,941 UART: [exit] Launching FMC @ 0x40000130
2,863,270 UART:
2,863,286 UART: Running Caliptra FMC ...
2,863,694 UART:
2,863,748 UART: [state] CFI Enabled
2,874,289 UART: [fht] FMC Alias Private Key: 7
2,981,972 UART: [art] Extend RT PCRs Done
2,982,400 UART: [art] Lock RT PCRs Done
2,983,638 UART: [art] Populate DV Done
2,992,007 UART: [fht] FMC Alias Private Key: 7
2,992,989 UART: [art] Derive CDI
2,993,269 UART: [art] Store in in slot 0x4
3,078,708 UART: [art] Derive Key Pair
3,079,068 UART: [art] Store priv key in slot 0x5
3,092,574 UART: [art] Derive Key Pair - Done
3,107,568 UART: [art] Signing Cert with AUTHO
3,108,048 UART: RITY.KEYID = 7
3,122,928 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,693 UART: [art] PUB.X = DB0CF5105DEA96932CC6B32DBBFBE617092CE4D73AEBEF11F91620444A83F242222AED40BCF25524962EEB0B915CB911
3,130,470 UART: [art] PUB.Y = B7844641FE38CF98BCCA6A09037AD8897CA92E0D9E04ED9E5F930E158809521CF78579EC75F39C30BCD4799E404DB327
3,137,408 UART: [art] SIG.R = C1B3F297BC4AE7D95182DB4A8346F0FD760E4921814ACF6E60143D9A357CD44883DFBDA093730478631D671F73C80BAC
3,144,175 UART: [art] SIG.S = 6F22FCC42ACF44F9237285D2772DFC8064E36D1B7EABDFBE22C71E7CBDDA20356E248153A5BAA8EA48D079E129188D5B
3,167,990 UART: Caliptra RT
3,168,243 UART: [state] CFI Enabled
3,275,966 UART: [rt] RT listening for mailbox commands...
3,276,636 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,812 UART: [rt]cmd =0x44504543, len=40
3,333,211 >>> mbox cmd response data (40 bytes)
3,333,212 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,333 UART: [rt]cmd =0x44504543, len=96
3,403,514 >>> mbox cmd response data (56 bytes)
3,403,515 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,442 UART: [rt]cmd =0x44504543, len=96
3,473,458 >>> mbox cmd response data (56 bytes)
3,473,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,482 UART: [rt]cmd =0x44504543, len=96
3,543,718 >>> mbox cmd response data (56 bytes)
3,543,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,622 UART: [rt]cmd =0x44504543, len=96
3,613,964 >>> mbox cmd response data (56 bytes)
3,613,965 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,852 UART: [rt]cmd =0x44504543, len=96
3,685,248 >>> mbox cmd response data (56 bytes)
3,685,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,242 UART: [rt]cmd =0x44504543, len=96
3,757,218 >>> mbox cmd response data (56 bytes)
3,757,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,168 UART: [rt]cmd =0x44504543, len=96
3,828,958 >>> mbox cmd response data (56 bytes)
3,828,959 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,859,000 UART: [rt]cmd =0x44504543, len=96
3,901,544 >>> mbox cmd response data (56 bytes)
3,901,545 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,931,392 UART: [rt]cmd =0x44504543, len=96
3,973,918 >>> mbox cmd response data (56 bytes)
3,973,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,003,684 UART: [rt]cmd =0x44504543, len=96
4,046,294 >>> mbox cmd response data (56 bytes)
4,046,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,076,250 UART: [rt]cmd =0x44504543, len=96
4,119,714 >>> mbox cmd response data (56 bytes)
4,119,715 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,149,706 UART: [rt]cmd =0x44504543, len=96
4,192,336 >>> mbox cmd response data (56 bytes)
4,192,337 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,222,306 UART: [rt]cmd =0x44504543, len=96
4,266,608 >>> mbox cmd response data (56 bytes)
4,266,609 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,296,682 UART: [rt]cmd =0x44504543, len=96
4,340,776 >>> mbox cmd response data (56 bytes)
4,340,777 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,370,656 UART: [rt]cmd =0x44504543, len=96
4,414,384 >>> mbox cmd response data (56 bytes)
4,414,385 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,444,434 UART: [rt]cmd =0x44504543, len=96
4,451,807 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,683 ready_for_fw is high
1,060,683 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,548 >>> mbox cmd response: success
2,688,706 UART:
2,688,722 UART: Running Caliptra FMC ...
2,689,130 UART:
2,689,184 UART: [state] CFI Enabled
2,699,513 UART: [fht] FMC Alias Private Key: 7
2,807,588 UART: [art] Extend RT PCRs Done
2,808,016 UART: [art] Lock RT PCRs Done
2,809,398 UART: [art] Populate DV Done
2,817,499 UART: [fht] FMC Alias Private Key: 7
2,818,679 UART: [art] Derive CDI
2,818,959 UART: [art] Store in in slot 0x4
2,904,320 UART: [art] Derive Key Pair
2,904,680 UART: [art] Store priv key in slot 0x5
2,917,810 UART: [art] Derive Key Pair - Done
2,932,535 UART: [art] Signing Cert with AUTHO
2,933,015 UART: RITY.KEYID = 7
2,948,131 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,896 UART: [art] PUB.X = 6AA707450E62420EB89C8BEA61FFF2D363D0A3A1EFF9CB7241267B74AD0B257EEDE634BC92BAEB2B2768505DA10977D4
2,955,667 UART: [art] PUB.Y = EC09C0823156424B08D321E00E0954ECF8D36AF96F90A496C2E18EECFF28A3BCC927F2C664EB37C3332C1D908535F01A
2,962,613 UART: [art] SIG.R = 6D7C6A8FDF876EE097D192FA28127D047A4EB0ACB746C65E59459511F00740C5FC7FFC39846D8A45137D0977A016D8D8
2,969,378 UART: [art] SIG.S = 57819DDF24A627BE0B9B44A8DA0D791C152E99CAB6CD296F7FE6D02177051E35BFA3796A819EA7BF8FC3F1E0E59906C8
2,992,619 UART: Caliptra RT
2,992,872 UART: [state] CFI Enabled
3,100,457 UART: [rt] RT listening for mailbox commands...
3,101,127 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,221 UART: [rt]cmd =0x44504543, len=40
3,157,830 >>> mbox cmd response data (40 bytes)
3,157,831 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,738 UART: [rt]cmd =0x44504543, len=96
3,228,093 >>> mbox cmd response data (56 bytes)
3,228,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,258,061 UART: [rt]cmd =0x44504543, len=96
3,298,293 >>> mbox cmd response data (56 bytes)
3,298,294 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,245 UART: [rt]cmd =0x44504543, len=96
3,368,411 >>> mbox cmd response data (56 bytes)
3,368,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,347 UART: [rt]cmd =0x44504543, len=96
3,439,843 >>> mbox cmd response data (56 bytes)
3,439,844 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,469,789 UART: [rt]cmd =0x44504543, len=96
3,511,447 >>> mbox cmd response data (56 bytes)
3,511,448 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,541,409 UART: [rt]cmd =0x44504543, len=96
3,582,743 >>> mbox cmd response data (56 bytes)
3,582,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,703 UART: [rt]cmd =0x44504543, len=96
3,654,045 >>> mbox cmd response data (56 bytes)
3,654,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,684,083 UART: [rt]cmd =0x44504543, len=96
3,726,737 >>> mbox cmd response data (56 bytes)
3,726,738 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,703 UART: [rt]cmd =0x44504543, len=96
3,798,123 >>> mbox cmd response data (56 bytes)
3,798,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,828,145 UART: [rt]cmd =0x44504543, len=96
3,870,649 >>> mbox cmd response data (56 bytes)
3,870,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,900,789 UART: [rt]cmd =0x44504543, len=96
3,944,045 >>> mbox cmd response data (56 bytes)
3,944,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,974,089 UART: [rt]cmd =0x44504543, len=96
4,017,251 >>> mbox cmd response data (56 bytes)
4,017,252 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,047,155 UART: [rt]cmd =0x44504543, len=96
4,090,815 >>> mbox cmd response data (56 bytes)
4,090,816 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,120,853 UART: [rt]cmd =0x44504543, len=96
4,164,417 >>> mbox cmd response data (56 bytes)
4,164,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,194,397 UART: [rt]cmd =0x44504543, len=96
4,239,089 >>> mbox cmd response data (56 bytes)
4,239,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,269,199 UART: [rt]cmd =0x44504543, len=96
4,276,410 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,346 UART: [state] WD Timer not started. Device not locked for debugging
87,481 UART: [kat] SHA2-256
893,131 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,256 UART: [kat] ++
897,408 UART: [kat] sha1
901,636 UART: [kat] SHA2-256
903,576 UART: [kat] SHA2-384
906,425 UART: [kat] SHA2-512-ACC
908,326 UART: [kat] ECC-384
917,893 UART: [kat] HMAC-384Kdf
922,763 UART: [kat] LMS
1,171,091 UART: [kat] --
1,171,854 UART: [cold-reset] ++
1,172,400 UART: [fht] FHT @ 0x50003400
1,175,015 UART: [idev] ++
1,175,183 UART: [idev] CDI.KEYID = 6
1,175,543 UART: [idev] SUBJECT.KEYID = 7
1,175,967 UART: [idev] UDS.KEYID = 0
1,176,312 ready_for_fw is high
1,176,312 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,913 UART: [idev] Erasing UDS.KEYID = 0
1,201,452 UART: [idev] Sha1 KeyId Algorithm
1,209,780 UART: [idev] --
1,210,864 UART: [ldev] ++
1,211,032 UART: [ldev] CDI.KEYID = 6
1,211,395 UART: [ldev] SUBJECT.KEYID = 5
1,211,821 UART: [ldev] AUTHORITY.KEYID = 7
1,212,284 UART: [ldev] FE.KEYID = 1
1,217,628 UART: [ldev] Erasing FE.KEYID = 1
1,244,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,122 UART: [ldev] --
1,283,571 UART: [fwproc] Wait for Commands...
1,284,221 UART: [fwproc] Recv command 0x46574c44
1,284,949 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,433 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,737 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,542 >>> mbox cmd response: success
2,776,760 UART: [afmc] ++
2,776,928 UART: [afmc] CDI.KEYID = 6
2,777,290 UART: [afmc] SUBJECT.KEYID = 7
2,777,715 UART: [afmc] AUTHORITY.KEYID = 5
2,813,362 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,825 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,573 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,301 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,186 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,905 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,653 UART: [afmc] --
2,856,597 UART: [cold-reset] --
2,857,351 UART: [state] Locking Datavault
2,858,560 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,164 UART: [state] Locking ICCM
2,859,584 UART: [exit] Launching FMC @ 0x40000130
2,864,913 UART:
2,864,929 UART: Running Caliptra FMC ...
2,865,337 UART:
2,865,480 UART: [state] CFI Enabled
2,876,193 UART: [fht] FMC Alias Private Key: 7
2,983,966 UART: [art] Extend RT PCRs Done
2,984,394 UART: [art] Lock RT PCRs Done
2,985,978 UART: [art] Populate DV Done
2,994,125 UART: [fht] FMC Alias Private Key: 7
2,995,121 UART: [art] Derive CDI
2,995,401 UART: [art] Store in in slot 0x4
3,081,472 UART: [art] Derive Key Pair
3,081,832 UART: [art] Store priv key in slot 0x5
3,095,198 UART: [art] Derive Key Pair - Done
3,109,969 UART: [art] Signing Cert with AUTHO
3,110,449 UART: RITY.KEYID = 7
3,125,497 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,262 UART: [art] PUB.X = AF08D1E766D74325F80930F97BCE36A2F3957F19C8B49C539E4DD49B9AC8A2DD707ED6D9FE0A9564A8ED468F1146870C
3,133,030 UART: [art] PUB.Y = 60E43559CAC186233FCC642078C9679EEAC89D8D0E517729E271A6CF2A99050CF79F163D638AA14A891A134F296C1A62
3,139,971 UART: [art] SIG.R = AD2E6E1F3AFA8B85468455666B463CD1360093564A5AA68BF6488F4379B52E1BA42E8A1B62F477D09B1551FB2DE86003
3,146,718 UART: [art] SIG.S = 222F947F8485233C10C55B0EFE0B9BEB6BB77FD7B3AC4764F56314285632051965767B4F3D0BECCB9E16A00CD23D2D66
3,170,820 UART: Caliptra RT
3,171,165 UART: [state] CFI Enabled
3,279,326 UART: [rt] RT listening for mailbox commands...
3,279,996 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,998 UART: [rt]cmd =0x44504543, len=40
3,335,993 >>> mbox cmd response data (40 bytes)
3,335,994 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,985 UART: [rt]cmd =0x44504543, len=96
3,406,302 >>> mbox cmd response data (56 bytes)
3,406,303 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,212 UART: [rt]cmd =0x44504543, len=96
3,476,982 >>> mbox cmd response data (56 bytes)
3,476,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,900 UART: [rt]cmd =0x44504543, len=96
3,548,116 >>> mbox cmd response data (56 bytes)
3,548,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,110 UART: [rt]cmd =0x44504543, len=96
3,619,478 >>> mbox cmd response data (56 bytes)
3,619,479 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,530 UART: [rt]cmd =0x44504543, len=96
3,691,264 >>> mbox cmd response data (56 bytes)
3,691,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,721,186 UART: [rt]cmd =0x44504543, len=96
3,762,308 >>> mbox cmd response data (56 bytes)
3,762,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,174 UART: [rt]cmd =0x44504543, len=96
3,834,266 >>> mbox cmd response data (56 bytes)
3,834,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,334 UART: [rt]cmd =0x44504543, len=96
3,907,284 >>> mbox cmd response data (56 bytes)
3,907,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,250 UART: [rt]cmd =0x44504543, len=96
3,980,218 >>> mbox cmd response data (56 bytes)
3,980,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,010,352 UART: [rt]cmd =0x44504543, len=96
4,052,866 >>> mbox cmd response data (56 bytes)
4,052,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,082,906 UART: [rt]cmd =0x44504543, len=96
4,126,096 >>> mbox cmd response data (56 bytes)
4,126,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,155,948 UART: [rt]cmd =0x44504543, len=96
4,199,540 >>> mbox cmd response data (56 bytes)
4,199,541 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,229,440 UART: [rt]cmd =0x44504543, len=96
4,272,856 >>> mbox cmd response data (56 bytes)
4,272,857 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,302,642 UART: [rt]cmd =0x44504543, len=96
4,347,214 >>> mbox cmd response data (56 bytes)
4,347,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,377,042 UART: [rt]cmd =0x44504543, len=96
4,421,552 >>> mbox cmd response data (56 bytes)
4,421,553 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,451,366 UART: [rt]cmd =0x44504543, len=96
4,458,733 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,506 ready_for_fw is high
1,060,506 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,889 >>> mbox cmd response: success
2,690,195 UART:
2,690,211 UART: Running Caliptra FMC ...
2,690,619 UART:
2,690,762 UART: [state] CFI Enabled
2,701,151 UART: [fht] FMC Alias Private Key: 7
2,808,738 UART: [art] Extend RT PCRs Done
2,809,166 UART: [art] Lock RT PCRs Done
2,810,690 UART: [art] Populate DV Done
2,818,931 UART: [fht] FMC Alias Private Key: 7
2,820,057 UART: [art] Derive CDI
2,820,337 UART: [art] Store in in slot 0x4
2,906,192 UART: [art] Derive Key Pair
2,906,552 UART: [art] Store priv key in slot 0x5
2,919,140 UART: [art] Derive Key Pair - Done
2,934,140 UART: [art] Signing Cert with AUTHO
2,934,620 UART: RITY.KEYID = 7
2,949,644 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,409 UART: [art] PUB.X = 7B8A9F99897DDE0D59922BB56704D73EAECB82B6B079162548D9295A308A78A307FDCFEEFEDA8E750BAAC7D86329CA10
2,957,183 UART: [art] PUB.Y = 34F347F13DAC7E6E133CF652061DDF9173E07FAB8669A92505686E49677AF2361EDFA4BBF523181A907D40A02A1BD854
2,964,131 UART: [art] SIG.R = 210DEB7A4435D4A1C9C00A6286A12DD8F409EB5AA2D6803CEC62BA5A8180CFC7B6C74F781E57A87E8AD9A3C6046782C2
2,970,903 UART: [art] SIG.S = 013100DD64EC8B2F7123E63D8FBF49853811D9B80F78A9A9F25E2CD7C99B4555718A836F6FCBE6071ED0D7A209803EDD
2,994,932 UART: Caliptra RT
2,995,277 UART: [state] CFI Enabled
3,103,242 UART: [rt] RT listening for mailbox commands...
3,103,912 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,990 UART: [rt]cmd =0x44504543, len=40
3,160,247 >>> mbox cmd response data (40 bytes)
3,160,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,131 UART: [rt]cmd =0x44504543, len=96
3,230,272 >>> mbox cmd response data (56 bytes)
3,230,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,260,326 UART: [rt]cmd =0x44504543, len=96
3,301,100 >>> mbox cmd response data (56 bytes)
3,301,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,956 UART: [rt]cmd =0x44504543, len=96
3,372,024 >>> mbox cmd response data (56 bytes)
3,372,025 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,806 UART: [rt]cmd =0x44504543, len=96
3,443,504 >>> mbox cmd response data (56 bytes)
3,443,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,650 UART: [rt]cmd =0x44504543, len=96
3,515,326 >>> mbox cmd response data (56 bytes)
3,515,327 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,545,444 UART: [rt]cmd =0x44504543, len=96
3,586,896 >>> mbox cmd response data (56 bytes)
3,586,897 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,050 UART: [rt]cmd =0x44504543, len=96
3,658,758 >>> mbox cmd response data (56 bytes)
3,658,759 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,688,846 UART: [rt]cmd =0x44504543, len=96
3,731,328 >>> mbox cmd response data (56 bytes)
3,731,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,360 UART: [rt]cmd =0x44504543, len=96
3,803,452 >>> mbox cmd response data (56 bytes)
3,803,453 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,833,386 UART: [rt]cmd =0x44504543, len=96
3,876,232 >>> mbox cmd response data (56 bytes)
3,876,233 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,906,140 UART: [rt]cmd =0x44504543, len=96
3,948,866 >>> mbox cmd response data (56 bytes)
3,948,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,978,992 UART: [rt]cmd =0x44504543, len=96
4,021,780 >>> mbox cmd response data (56 bytes)
4,021,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,051,570 UART: [rt]cmd =0x44504543, len=96
4,095,334 >>> mbox cmd response data (56 bytes)
4,095,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,125,294 UART: [rt]cmd =0x44504543, len=96
4,169,142 >>> mbox cmd response data (56 bytes)
4,169,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,199,134 UART: [rt]cmd =0x44504543, len=96
4,243,828 >>> mbox cmd response data (56 bytes)
4,243,829 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,273,902 UART: [rt]cmd =0x44504543, len=96
4,281,273 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
891,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,219 UART: [kat] ++
895,371 UART: [kat] sha1
899,531 UART: [kat] SHA2-256
901,471 UART: [kat] SHA2-384
904,182 UART: [kat] SHA2-512-ACC
906,083 UART: [kat] ECC-384
915,844 UART: [kat] HMAC-384Kdf
920,438 UART: [kat] LMS
1,168,750 UART: [kat] --
1,169,823 UART: [cold-reset] ++
1,170,241 UART: [fht] FHT @ 0x50003400
1,173,127 UART: [idev] ++
1,173,295 UART: [idev] CDI.KEYID = 6
1,173,656 UART: [idev] SUBJECT.KEYID = 7
1,174,081 UART: [idev] UDS.KEYID = 0
1,174,427 ready_for_fw is high
1,174,427 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,457 UART: [idev] Erasing UDS.KEYID = 0
1,199,391 UART: [idev] Sha1 KeyId Algorithm
1,208,229 UART: [idev] --
1,209,344 UART: [ldev] ++
1,209,512 UART: [ldev] CDI.KEYID = 6
1,209,876 UART: [ldev] SUBJECT.KEYID = 5
1,210,303 UART: [ldev] AUTHORITY.KEYID = 7
1,210,766 UART: [ldev] FE.KEYID = 1
1,215,818 UART: [ldev] Erasing FE.KEYID = 1
1,242,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,078 UART: [ldev] --
1,281,470 UART: [fwproc] Wait for Commands...
1,282,059 UART: [fwproc] Recv command 0x46574c44
1,282,792 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,279 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,851 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,160 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,982 >>> mbox cmd response: success
2,774,057 UART: [afmc] ++
2,774,225 UART: [afmc] CDI.KEYID = 6
2,774,588 UART: [afmc] SUBJECT.KEYID = 7
2,775,014 UART: [afmc] AUTHORITY.KEYID = 5
2,810,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,691 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,442 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,171 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,054 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,773 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,616 UART: [afmc] --
2,853,658 UART: [cold-reset] --
2,854,688 UART: [state] Locking Datavault
2,855,933 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,537 UART: [state] Locking ICCM
2,857,053 UART: [exit] Launching FMC @ 0x40000130
2,862,382 UART:
2,862,398 UART: Running Caliptra FMC ...
2,862,806 UART:
2,862,860 UART: [state] CFI Enabled
2,873,333 UART: [fht] FMC Alias Private Key: 7
2,980,742 UART: [art] Extend RT PCRs Done
2,981,170 UART: [art] Lock RT PCRs Done
2,982,240 UART: [art] Populate DV Done
2,990,599 UART: [fht] FMC Alias Private Key: 7
2,991,769 UART: [art] Derive CDI
2,992,049 UART: [art] Store in in slot 0x4
3,077,938 UART: [art] Derive Key Pair
3,078,298 UART: [art] Store priv key in slot 0x5
3,090,756 UART: [art] Derive Key Pair - Done
3,105,385 UART: [art] Signing Cert with AUTHO
3,105,865 UART: RITY.KEYID = 7
3,120,815 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,580 UART: [art] PUB.X = 224641DE67E0CF2D0DAC13B8670DC058575EF4724C3DA1697C1DED4A6B2A2EB620B36416961B1F300D3764752A5F8AF5
3,128,347 UART: [art] PUB.Y = 6C87FD7D739B1304BB7C41CD26C806977E83301303C61CC6305DDB23EA1A039A09E2BB4A20E1E72F71ADF7163D0386E6
3,135,285 UART: [art] SIG.R = 1109DA1B5E845DF5642EBF8C44BAE448DAB78BF01AD7356FD98A00B1E73BE14C02EAA0A1DAEBF3B6CA454B22699BB23E
3,142,053 UART: [art] SIG.S = F49E183888D65997FAF2807752F3DE63399F852E2639DE9D7138B4AF7AF0E9DF4D2D6AD17A0455E1FD31ABF68D0A920C
3,165,561 UART: Caliptra RT
3,165,814 UART: [state] CFI Enabled
3,273,099 UART: [rt] RT listening for mailbox commands...
3,273,769 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,777 UART: [rt]cmd =0x44504543, len=40
3,329,808 >>> mbox cmd response data (40 bytes)
3,329,809 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,778 UART: [rt]cmd =0x44504543, len=96
3,400,103 >>> mbox cmd response data (56 bytes)
3,400,104 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,329 UART: [rt]cmd =0x44504543, len=96
3,471,093 >>> mbox cmd response data (56 bytes)
3,471,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,501,099 UART: [rt]cmd =0x44504543, len=96
3,541,663 >>> mbox cmd response data (56 bytes)
3,541,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,571,463 UART: [rt]cmd =0x44504543, len=96
3,613,161 >>> mbox cmd response data (56 bytes)
3,613,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,037 UART: [rt]cmd =0x44504543, len=96
3,684,629 >>> mbox cmd response data (56 bytes)
3,684,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,714,569 UART: [rt]cmd =0x44504543, len=96
3,756,495 >>> mbox cmd response data (56 bytes)
3,756,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,786,489 UART: [rt]cmd =0x44504543, len=96
3,828,239 >>> mbox cmd response data (56 bytes)
3,828,240 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,858,377 UART: [rt]cmd =0x44504543, len=96
3,900,785 >>> mbox cmd response data (56 bytes)
3,900,786 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,930,499 UART: [rt]cmd =0x44504543, len=96
3,972,591 >>> mbox cmd response data (56 bytes)
3,972,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,002,497 UART: [rt]cmd =0x44504543, len=96
4,045,187 >>> mbox cmd response data (56 bytes)
4,045,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,075,221 UART: [rt]cmd =0x44504543, len=96
4,118,631 >>> mbox cmd response data (56 bytes)
4,118,632 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,148,371 UART: [rt]cmd =0x44504543, len=96
4,192,335 >>> mbox cmd response data (56 bytes)
4,192,336 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,222,161 UART: [rt]cmd =0x44504543, len=96
4,266,315 >>> mbox cmd response data (56 bytes)
4,266,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,296,117 UART: [rt]cmd =0x44504543, len=96
4,339,985 >>> mbox cmd response data (56 bytes)
4,339,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,369,855 UART: [rt]cmd =0x44504543, len=96
4,413,967 >>> mbox cmd response data (56 bytes)
4,413,968 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,443,951 UART: [rt]cmd =0x44504543, len=96
4,451,446 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,802 ready_for_fw is high
1,055,802 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,345 >>> mbox cmd response: success
2,684,457 UART:
2,684,473 UART: Running Caliptra FMC ...
2,684,881 UART:
2,684,935 UART: [state] CFI Enabled
2,695,542 UART: [fht] FMC Alias Private Key: 7
2,802,913 UART: [art] Extend RT PCRs Done
2,803,341 UART: [art] Lock RT PCRs Done
2,804,729 UART: [art] Populate DV Done
2,813,016 UART: [fht] FMC Alias Private Key: 7
2,813,974 UART: [art] Derive CDI
2,814,254 UART: [art] Store in in slot 0x4
2,899,843 UART: [art] Derive Key Pair
2,900,203 UART: [art] Store priv key in slot 0x5
2,914,233 UART: [art] Derive Key Pair - Done
2,928,924 UART: [art] Signing Cert with AUTHO
2,929,404 UART: RITY.KEYID = 7
2,944,160 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,925 UART: [art] PUB.X = 166EA927A0CF4A79F77148ADA0055ACB75BB5DA0352C65783853933C535C6D72D97D7D85AB2DF2DA4F73AFCD154FBE79
2,951,706 UART: [art] PUB.Y = ABC319B7BB76CCD68A7EE257FFFF87C0534CF4728715AAC37E2F7F6F1BEEC9100FDAE7E134A75FD498027F1688EE1735
2,958,670 UART: [art] SIG.R = 8A3CC7BC7D885D605C6D3444FD7FB7C43BE6D943D0650B52CCC3FE1B4B58F4514FD4F00FED8E14CFDD7D38BBCABA27B9
2,965,464 UART: [art] SIG.S = 32C51C660D76891DEF5F442308EAA20C58A6055BE0581C1B22EF4F6BF511EA40601840392E62B4B68429C17872E096BA
2,989,207 UART: Caliptra RT
2,989,460 UART: [state] CFI Enabled
3,096,585 UART: [rt] RT listening for mailbox commands...
3,097,255 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,215 UART: [rt]cmd =0x44504543, len=40
3,153,026 >>> mbox cmd response data (40 bytes)
3,153,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,150 UART: [rt]cmd =0x44504543, len=96
3,223,247 >>> mbox cmd response data (56 bytes)
3,223,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,253,161 UART: [rt]cmd =0x44504543, len=96
3,293,471 >>> mbox cmd response data (56 bytes)
3,293,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,669 UART: [rt]cmd =0x44504543, len=96
3,365,123 >>> mbox cmd response data (56 bytes)
3,365,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,127 UART: [rt]cmd =0x44504543, len=96
3,435,955 >>> mbox cmd response data (56 bytes)
3,435,956 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,687 UART: [rt]cmd =0x44504543, len=96
3,507,555 >>> mbox cmd response data (56 bytes)
3,507,556 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,483 UART: [rt]cmd =0x44504543, len=96
3,579,335 >>> mbox cmd response data (56 bytes)
3,579,336 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,077 UART: [rt]cmd =0x44504543, len=96
3,650,723 >>> mbox cmd response data (56 bytes)
3,650,724 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,680,737 UART: [rt]cmd =0x44504543, len=96
3,723,181 >>> mbox cmd response data (56 bytes)
3,723,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,753,153 UART: [rt]cmd =0x44504543, len=96
3,795,871 >>> mbox cmd response data (56 bytes)
3,795,872 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,997 UART: [rt]cmd =0x44504543, len=96
3,869,259 >>> mbox cmd response data (56 bytes)
3,869,260 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,899,177 UART: [rt]cmd =0x44504543, len=96
3,942,529 >>> mbox cmd response data (56 bytes)
3,942,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,972,621 UART: [rt]cmd =0x44504543, len=96
4,015,555 >>> mbox cmd response data (56 bytes)
4,015,556 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,745 UART: [rt]cmd =0x44504543, len=96
4,089,153 >>> mbox cmd response data (56 bytes)
4,089,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,118,953 UART: [rt]cmd =0x44504543, len=96
4,162,813 >>> mbox cmd response data (56 bytes)
4,162,814 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,192,661 UART: [rt]cmd =0x44504543, len=96
4,236,219 >>> mbox cmd response data (56 bytes)
4,236,220 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,266,153 UART: [rt]cmd =0x44504543, len=96
4,273,218 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
891,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,446 UART: [kat] ++
895,598 UART: [kat] sha1
899,776 UART: [kat] SHA2-256
901,716 UART: [kat] SHA2-384
904,509 UART: [kat] SHA2-512-ACC
906,410 UART: [kat] ECC-384
916,647 UART: [kat] HMAC-384Kdf
921,129 UART: [kat] LMS
1,169,441 UART: [kat] --
1,170,454 UART: [cold-reset] ++
1,170,828 UART: [fht] FHT @ 0x50003400
1,173,498 UART: [idev] ++
1,173,666 UART: [idev] CDI.KEYID = 6
1,174,027 UART: [idev] SUBJECT.KEYID = 7
1,174,452 UART: [idev] UDS.KEYID = 0
1,174,798 ready_for_fw is high
1,174,798 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,350 UART: [idev] Erasing UDS.KEYID = 0
1,199,688 UART: [idev] Sha1 KeyId Algorithm
1,208,410 UART: [idev] --
1,209,585 UART: [ldev] ++
1,209,753 UART: [ldev] CDI.KEYID = 6
1,210,117 UART: [ldev] SUBJECT.KEYID = 5
1,210,544 UART: [ldev] AUTHORITY.KEYID = 7
1,211,007 UART: [ldev] FE.KEYID = 1
1,216,071 UART: [ldev] Erasing FE.KEYID = 1
1,242,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,181 UART: [ldev] --
1,281,693 UART: [fwproc] Wait for Commands...
1,282,454 UART: [fwproc] Recv command 0x46574c44
1,283,187 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,635 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,944 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,710 >>> mbox cmd response: success
2,774,829 UART: [afmc] ++
2,774,997 UART: [afmc] CDI.KEYID = 6
2,775,360 UART: [afmc] SUBJECT.KEYID = 7
2,775,786 UART: [afmc] AUTHORITY.KEYID = 5
2,811,531 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,040 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,769 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,652 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,371 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,230 UART: [afmc] --
2,855,328 UART: [cold-reset] --
2,856,214 UART: [state] Locking Datavault
2,857,373 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,977 UART: [state] Locking ICCM
2,858,629 UART: [exit] Launching FMC @ 0x40000130
2,863,958 UART:
2,863,974 UART: Running Caliptra FMC ...
2,864,382 UART:
2,864,525 UART: [state] CFI Enabled
2,875,270 UART: [fht] FMC Alias Private Key: 7
2,983,523 UART: [art] Extend RT PCRs Done
2,983,951 UART: [art] Lock RT PCRs Done
2,985,157 UART: [art] Populate DV Done
2,992,998 UART: [fht] FMC Alias Private Key: 7
2,994,082 UART: [art] Derive CDI
2,994,362 UART: [art] Store in in slot 0x4
3,080,365 UART: [art] Derive Key Pair
3,080,725 UART: [art] Store priv key in slot 0x5
3,094,241 UART: [art] Derive Key Pair - Done
3,108,859 UART: [art] Signing Cert with AUTHO
3,109,339 UART: RITY.KEYID = 7
3,124,545 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,310 UART: [art] PUB.X = 9B8B89E81E21AA1470194A21ED15F706B1F7CF6415CC5D7A159C6389E904ABBD900539C8EEBF0CA5AA8E023218CA0D85
3,132,074 UART: [art] PUB.Y = CB5FF1DEA79D5E641670701F285A868B0D5EB6EBCFA70155B3A370D3E33E785DFF3EB0292B8E30D0207482C3C31ACA5F
3,139,034 UART: [art] SIG.R = 2D6E72B7A2D6521D8406250FEB0D9174A0E362C00C7BB8643E7C593DFD3D334550228CFC823EC4EAB870742242481AA0
3,145,794 UART: [art] SIG.S = E34CB9896DDAC8E219AB3F27D0568F8CA85A95E3DA789E78B90001DAE8F271D5029B95F1A08DDEF98D1B67709A1BC284
3,169,749 UART: Caliptra RT
3,170,094 UART: [state] CFI Enabled
3,277,631 UART: [rt] RT listening for mailbox commands...
3,278,301 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,603 UART: [rt]cmd =0x44504543, len=40
3,334,698 >>> mbox cmd response data (40 bytes)
3,334,699 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,398 UART: [rt]cmd =0x44504543, len=96
3,404,319 >>> mbox cmd response data (56 bytes)
3,404,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,433 UART: [rt]cmd =0x44504543, len=96
3,475,477 >>> mbox cmd response data (56 bytes)
3,475,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,757 UART: [rt]cmd =0x44504543, len=96
3,546,745 >>> mbox cmd response data (56 bytes)
3,546,746 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,695 UART: [rt]cmd =0x44504543, len=96
3,618,447 >>> mbox cmd response data (56 bytes)
3,618,448 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,439 UART: [rt]cmd =0x44504543, len=96
3,690,377 >>> mbox cmd response data (56 bytes)
3,690,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,720,233 UART: [rt]cmd =0x44504543, len=96
3,762,291 >>> mbox cmd response data (56 bytes)
3,762,292 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,151 UART: [rt]cmd =0x44504543, len=96
3,834,989 >>> mbox cmd response data (56 bytes)
3,834,990 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,007 UART: [rt]cmd =0x44504543, len=96
3,908,083 >>> mbox cmd response data (56 bytes)
3,908,084 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,141 UART: [rt]cmd =0x44504543, len=96
3,979,629 >>> mbox cmd response data (56 bytes)
3,979,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,009,519 UART: [rt]cmd =0x44504543, len=96
4,052,589 >>> mbox cmd response data (56 bytes)
4,052,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,082,481 UART: [rt]cmd =0x44504543, len=96
4,125,535 >>> mbox cmd response data (56 bytes)
4,125,536 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,155,585 UART: [rt]cmd =0x44504543, len=96
4,199,877 >>> mbox cmd response data (56 bytes)
4,199,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,229,967 UART: [rt]cmd =0x44504543, len=96
4,273,373 >>> mbox cmd response data (56 bytes)
4,273,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,303,571 UART: [rt]cmd =0x44504543, len=96
4,347,383 >>> mbox cmd response data (56 bytes)
4,347,384 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,377,217 UART: [rt]cmd =0x44504543, len=96
4,421,987 >>> mbox cmd response data (56 bytes)
4,421,988 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,452,015 UART: [rt]cmd =0x44504543, len=96
4,459,186 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,113 ready_for_fw is high
1,056,113 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,832 >>> mbox cmd response: success
2,685,362 UART:
2,685,378 UART: Running Caliptra FMC ...
2,685,786 UART:
2,685,929 UART: [state] CFI Enabled
2,696,736 UART: [fht] FMC Alias Private Key: 7
2,804,783 UART: [art] Extend RT PCRs Done
2,805,211 UART: [art] Lock RT PCRs Done
2,806,983 UART: [art] Populate DV Done
2,815,146 UART: [fht] FMC Alias Private Key: 7
2,816,134 UART: [art] Derive CDI
2,816,414 UART: [art] Store in in slot 0x4
2,901,853 UART: [art] Derive Key Pair
2,902,213 UART: [art] Store priv key in slot 0x5
2,915,947 UART: [art] Derive Key Pair - Done
2,930,553 UART: [art] Signing Cert with AUTHO
2,931,033 UART: RITY.KEYID = 7
2,946,359 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,124 UART: [art] PUB.X = 16652BBF19AA4DFF59AE5688AA6152396DAFA04B0FCBA95636377FFDA4170437B75F3F25853E9F6A75C8D8C25A06C973
2,953,895 UART: [art] PUB.Y = CDB7055FD4410CB46C0C5706AD55E08F4578E91B2DCC673CAFADC09A53A83FDDD1E7CCCD4E20179F81A73E8BC3163FEC
2,960,859 UART: [art] SIG.R = 04E01AB4B1D54E0603B2A652424D38B06B86F34F2AF6594885FA966F92C414A8857AAD21AB878B2DEDE13F0EB93457BB
2,967,625 UART: [art] SIG.S = 787B45DA82D70ABB0D8AD93C3C03681D014D3A76E75C85CDD19FA6A0A180BB98C6A98C56A3E0D579E580205E60199E0B
2,991,679 UART: Caliptra RT
2,992,024 UART: [state] CFI Enabled
3,100,359 UART: [rt] RT listening for mailbox commands...
3,101,029 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,043 UART: [rt]cmd =0x44504543, len=40
3,157,626 >>> mbox cmd response data (40 bytes)
3,157,627 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,560 UART: [rt]cmd =0x44504543, len=96
3,227,379 >>> mbox cmd response data (56 bytes)
3,227,380 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,257,277 UART: [rt]cmd =0x44504543, len=96
3,298,101 >>> mbox cmd response data (56 bytes)
3,298,102 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,191 UART: [rt]cmd =0x44504543, len=96
3,368,237 >>> mbox cmd response data (56 bytes)
3,368,238 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,273 UART: [rt]cmd =0x44504543, len=96
3,438,295 >>> mbox cmd response data (56 bytes)
3,438,296 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,213 UART: [rt]cmd =0x44504543, len=96
3,509,835 >>> mbox cmd response data (56 bytes)
3,509,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,877 UART: [rt]cmd =0x44504543, len=96
3,582,265 >>> mbox cmd response data (56 bytes)
3,582,266 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,281 UART: [rt]cmd =0x44504543, len=96
3,654,599 >>> mbox cmd response data (56 bytes)
3,654,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,684,495 UART: [rt]cmd =0x44504543, len=96
3,726,787 >>> mbox cmd response data (56 bytes)
3,726,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,547 UART: [rt]cmd =0x44504543, len=96
3,799,477 >>> mbox cmd response data (56 bytes)
3,799,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,829,429 UART: [rt]cmd =0x44504543, len=96
3,872,303 >>> mbox cmd response data (56 bytes)
3,872,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,902,163 UART: [rt]cmd =0x44504543, len=96
3,945,329 >>> mbox cmd response data (56 bytes)
3,945,330 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,337 UART: [rt]cmd =0x44504543, len=96
4,019,551 >>> mbox cmd response data (56 bytes)
4,019,552 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,049,773 UART: [rt]cmd =0x44504543, len=96
4,094,677 >>> mbox cmd response data (56 bytes)
4,094,678 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,124,531 UART: [rt]cmd =0x44504543, len=96
4,168,759 >>> mbox cmd response data (56 bytes)
4,168,760 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,198,563 UART: [rt]cmd =0x44504543, len=96
4,243,505 >>> mbox cmd response data (56 bytes)
4,243,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,273,345 UART: [rt]cmd =0x44504543, len=96
4,280,588 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,335 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,845 UART: [kat] SHA2-256
881,776 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,891 UART: [kat] ++
886,043 UART: [kat] sha1
890,293 UART: [kat] SHA2-256
892,231 UART: [kat] SHA2-384
895,000 UART: [kat] SHA2-512-ACC
896,901 UART: [kat] ECC-384
902,408 UART: [kat] HMAC-384Kdf
907,030 UART: [kat] LMS
1,475,226 UART: [kat] --
1,476,259 UART: [cold-reset] ++
1,476,707 UART: [fht] Storing FHT @ 0x50003400
1,479,344 UART: [idev] ++
1,479,512 UART: [idev] CDI.KEYID = 6
1,479,872 UART: [idev] SUBJECT.KEYID = 7
1,480,296 UART: [idev] UDS.KEYID = 0
1,480,641 ready_for_fw is high
1,480,641 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,124 UART: [idev] Erasing UDS.KEYID = 0
1,504,542 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,116 UART: [idev] --
1,514,011 UART: [ldev] ++
1,514,179 UART: [ldev] CDI.KEYID = 6
1,514,542 UART: [ldev] SUBJECT.KEYID = 5
1,514,968 UART: [ldev] AUTHORITY.KEYID = 7
1,515,431 UART: [ldev] FE.KEYID = 1
1,520,407 UART: [ldev] Erasing FE.KEYID = 1
1,545,218 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,146 UART: [ldev] --
1,584,479 UART: [fwproc] Waiting for Commands...
1,585,316 UART: [fwproc] Received command 0x46574c44
1,586,107 UART: [fwproc] Received Image of size 114332 bytes
2,883,987 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,097 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,449 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,412 >>> mbox cmd response: success
3,078,624 UART: [afmc] ++
3,078,792 UART: [afmc] CDI.KEYID = 6
3,079,154 UART: [afmc] SUBJECT.KEYID = 7
3,079,579 UART: [afmc] AUTHORITY.KEYID = 5
3,114,024 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,278 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,058 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,786 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,671 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,361 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,176 UART: [afmc] --
3,157,250 UART: [cold-reset] --
3,158,018 UART: [state] Locking Datavault
3,159,003 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,607 UART: [state] Locking ICCM
3,160,063 UART: [exit] Launching FMC @ 0x40000130
3,165,392 UART:
3,165,408 UART: Running Caliptra FMC ...
3,165,816 UART:
3,165,870 UART: [state] CFI Enabled
3,176,217 UART: [fht] FMC Alias Private Key: 7
3,284,350 UART: [art] Extend RT PCRs Done
3,284,778 UART: [art] Lock RT PCRs Done
3,286,382 UART: [art] Populate DV Done
3,294,509 UART: [fht] FMC Alias Private Key: 7
3,295,457 UART: [art] Derive CDI
3,295,737 UART: [art] Store in in slot 0x4
3,381,536 UART: [art] Derive Key Pair
3,381,896 UART: [art] Store priv key in slot 0x5
3,394,652 UART: [art] Derive Key Pair - Done
3,409,661 UART: [art] Signing Cert with AUTHO
3,410,141 UART: RITY.KEYID = 7
3,425,877 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,642 UART: [art] PUB.X = 3028CAC347865BDB0A5388619F05F466912D590CF08E540E0C89A718C9848E8E5288FD81370BA147F7648F2E2BD30320
3,433,385 UART: [art] PUB.Y = 55BC941991FF235D80EA6547F057A353C052C224E85711C6F0570EB549D331DBF640F29E5ED32AE3A3FC3E449D035FAE
3,440,335 UART: [art] SIG.R = 83EF7E52AC087E2D74A771A7F8A5D575116DCC0257F87ECC4A2FD1BF4B93DC133F52136257D73259A42D3A470CC752F2
3,447,104 UART: [art] SIG.S = 2F8D7A2BA76829FD49644CDE3751AFD27E583FEC46D3A27424B4644FBC3A9CBCC08BE4651580CCBF779E3162B9DD28AF
3,471,423 UART: Caliptra RT
3,471,676 UART: [state] CFI Enabled
3,580,207 UART: [rt] RT listening for mailbox commands...
3,580,877 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,551 UART: [rt]cmd =0x44504543, len=24
3,636,849 >>> mbox cmd response data (40 bytes)
3,636,850 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,666,353 UART: [rt]cmd =0x44504543, len=24
3,692,761 >>> mbox cmd response data (40 bytes)
3,692,762 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,722,239 UART: [rt]cmd =0x44504543, len=24
3,748,167 >>> mbox cmd response data (40 bytes)
3,748,168 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,777,531 UART: [rt]cmd =0x44504543, len=24
3,803,671 >>> mbox cmd response data (40 bytes)
3,803,672 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,833,263 UART: [rt]cmd =0x44504543, len=24
3,859,539 >>> mbox cmd response data (40 bytes)
3,859,540 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,003 UART: [rt]cmd =0x44504543, len=24
3,914,949 >>> mbox cmd response data (40 bytes)
3,914,950 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,303 UART: [rt]cmd =0x44504543, len=24
3,970,647 >>> mbox cmd response data (40 bytes)
3,970,648 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,000,095 UART: [rt]cmd =0x44504543, len=24
4,026,579 >>> mbox cmd response data (40 bytes)
4,026,580 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,055,955 UART: [rt]cmd =0x44504543, len=24
4,081,939 >>> mbox cmd response data (40 bytes)
4,081,940 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,111,529 UART: [rt]cmd =0x44504543, len=24
4,137,073 >>> mbox cmd response data (40 bytes)
4,137,074 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,166,505 UART: [rt]cmd =0x44504543, len=24
4,192,679 >>> mbox cmd response data (40 bytes)
4,192,680 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,222,143 UART: [rt]cmd =0x44504543, len=24
4,248,923 >>> mbox cmd response data (40 bytes)
4,248,924 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,278,401 UART: [rt]cmd =0x44504543, len=24
4,304,915 >>> mbox cmd response data (40 bytes)
4,304,916 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,334,485 UART: [rt]cmd =0x44504543, len=24
4,360,423 >>> mbox cmd response data (40 bytes)
4,360,424 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,389,983 UART: [rt]cmd =0x44504543, len=24
4,416,369 >>> mbox cmd response data (40 bytes)
4,416,370 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,445,669 UART: [rt]cmd =0x44504543, len=24
4,452,771 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,465 ready_for_fw is high
1,362,465 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,360 >>> mbox cmd response: success
2,988,116 UART:
2,988,132 UART: Running Caliptra FMC ...
2,988,540 UART:
2,988,594 UART: [state] CFI Enabled
2,998,999 UART: [fht] FMC Alias Private Key: 7
3,106,910 UART: [art] Extend RT PCRs Done
3,107,338 UART: [art] Lock RT PCRs Done
3,108,896 UART: [art] Populate DV Done
3,117,175 UART: [fht] FMC Alias Private Key: 7
3,118,173 UART: [art] Derive CDI
3,118,453 UART: [art] Store in in slot 0x4
3,204,770 UART: [art] Derive Key Pair
3,205,130 UART: [art] Store priv key in slot 0x5
3,218,104 UART: [art] Derive Key Pair - Done
3,233,096 UART: [art] Signing Cert with AUTHO
3,233,576 UART: RITY.KEYID = 7
3,248,618 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,383 UART: [art] PUB.X = 47470F0820BB1FABCCADE7E6472D0C45AD7AEB6345A6A692562FE41DF3536A5E6F2DB6A41B1056EA295CB6B433D9123F
3,256,160 UART: [art] PUB.Y = 6B52B68187053CDE1C57B0B22783613791C6BE6EFD07ECC7FA35842744852343B45C53DDE002D9D957CE74B006522C1A
3,263,098 UART: [art] SIG.R = EFC7C422919A3C1907510F4169B23D2A23B8D1B622DCB4AE216D62A461C13A7C724C82E27741BEAB3283A15421A2B0F6
3,269,866 UART: [art] SIG.S = 41DEDD797D757FFD7196BEAD34D83AC9810AC1720266B54333A1561B987C0B2750E22F14F61700FDC6184DBEE8CCBBF6
3,294,468 UART: Caliptra RT
3,294,721 UART: [state] CFI Enabled
3,402,442 UART: [rt] RT listening for mailbox commands...
3,403,112 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,146 UART: [rt]cmd =0x44504543, len=24
3,459,212 >>> mbox cmd response data (40 bytes)
3,459,213 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,488,642 UART: [rt]cmd =0x44504543, len=24
3,515,184 >>> mbox cmd response data (40 bytes)
3,515,185 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,544,810 UART: [rt]cmd =0x44504543, len=24
3,571,326 >>> mbox cmd response data (40 bytes)
3,571,327 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,600,812 UART: [rt]cmd =0x44504543, len=24
3,626,548 >>> mbox cmd response data (40 bytes)
3,626,549 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,655,970 UART: [rt]cmd =0x44504543, len=24
3,681,886 >>> mbox cmd response data (40 bytes)
3,681,887 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,270 UART: [rt]cmd =0x44504543, len=24
3,737,374 >>> mbox cmd response data (40 bytes)
3,737,375 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,794 UART: [rt]cmd =0x44504543, len=24
3,793,110 >>> mbox cmd response data (40 bytes)
3,793,111 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,816 UART: [rt]cmd =0x44504543, len=24
3,849,162 >>> mbox cmd response data (40 bytes)
3,849,163 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,776 UART: [rt]cmd =0x44504543, len=24
3,905,274 >>> mbox cmd response data (40 bytes)
3,905,275 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,872 UART: [rt]cmd =0x44504543, len=24
3,960,890 >>> mbox cmd response data (40 bytes)
3,960,891 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,990,246 UART: [rt]cmd =0x44504543, len=24
4,017,026 >>> mbox cmd response data (40 bytes)
4,017,027 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,612 UART: [rt]cmd =0x44504543, len=24
4,072,450 >>> mbox cmd response data (40 bytes)
4,072,451 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,101,924 UART: [rt]cmd =0x44504543, len=24
4,128,216 >>> mbox cmd response data (40 bytes)
4,128,217 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,157,844 UART: [rt]cmd =0x44504543, len=24
4,183,818 >>> mbox cmd response data (40 bytes)
4,183,819 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,213,332 UART: [rt]cmd =0x44504543, len=24
4,240,140 >>> mbox cmd response data (40 bytes)
4,240,141 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,269,518 UART: [rt]cmd =0x44504543, len=24
4,276,774 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,538 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,102 UART: [kat] SHA2-256
882,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,148 UART: [kat] ++
886,300 UART: [kat] sha1
890,622 UART: [kat] SHA2-256
892,560 UART: [kat] SHA2-384
895,271 UART: [kat] SHA2-512-ACC
897,172 UART: [kat] ECC-384
902,615 UART: [kat] HMAC-384Kdf
907,277 UART: [kat] LMS
1,475,473 UART: [kat] --
1,476,274 UART: [cold-reset] ++
1,476,732 UART: [fht] Storing FHT @ 0x50003400
1,479,475 UART: [idev] ++
1,479,643 UART: [idev] CDI.KEYID = 6
1,480,003 UART: [idev] SUBJECT.KEYID = 7
1,480,427 UART: [idev] UDS.KEYID = 0
1,480,772 ready_for_fw is high
1,480,772 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,291 UART: [idev] Erasing UDS.KEYID = 0
1,505,331 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,889 UART: [idev] --
1,514,790 UART: [ldev] ++
1,514,958 UART: [ldev] CDI.KEYID = 6
1,515,321 UART: [ldev] SUBJECT.KEYID = 5
1,515,747 UART: [ldev] AUTHORITY.KEYID = 7
1,516,210 UART: [ldev] FE.KEYID = 1
1,521,336 UART: [ldev] Erasing FE.KEYID = 1
1,546,723 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,275 UART: [ldev] --
1,585,586 UART: [fwproc] Waiting for Commands...
1,586,277 UART: [fwproc] Received command 0x46574c44
1,587,068 UART: [fwproc] Received Image of size 114332 bytes
2,885,382 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,188 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,540 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,361 >>> mbox cmd response: success
3,079,485 UART: [afmc] ++
3,079,653 UART: [afmc] CDI.KEYID = 6
3,080,015 UART: [afmc] SUBJECT.KEYID = 7
3,080,440 UART: [afmc] AUTHORITY.KEYID = 5
3,115,227 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,641 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,421 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,149 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,034 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,724 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,531 UART: [afmc] --
3,158,425 UART: [cold-reset] --
3,159,321 UART: [state] Locking Datavault
3,160,430 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,034 UART: [state] Locking ICCM
3,161,648 UART: [exit] Launching FMC @ 0x40000130
3,166,977 UART:
3,166,993 UART: Running Caliptra FMC ...
3,167,401 UART:
3,167,544 UART: [state] CFI Enabled
3,178,017 UART: [fht] FMC Alias Private Key: 7
3,286,018 UART: [art] Extend RT PCRs Done
3,286,446 UART: [art] Lock RT PCRs Done
3,288,070 UART: [art] Populate DV Done
3,296,325 UART: [fht] FMC Alias Private Key: 7
3,297,285 UART: [art] Derive CDI
3,297,565 UART: [art] Store in in slot 0x4
3,383,468 UART: [art] Derive Key Pair
3,383,828 UART: [art] Store priv key in slot 0x5
3,397,626 UART: [art] Derive Key Pair - Done
3,412,455 UART: [art] Signing Cert with AUTHO
3,412,935 UART: RITY.KEYID = 7
3,428,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,194 UART: [art] PUB.X = 0B49604F18D21F347B29A0BE2499EA4336430547016DBFBAC3427026DBFFE17ECEFF1E499DE0B1C4FE00EE537775D109
3,435,940 UART: [art] PUB.Y = D1EDFFFAB77F2E8FA3E9D96DA0648431431AF16D7EF2CC23A4FF6673566356425BC7B60D9B9A2E1563FD5A9F4A174F0A
3,442,902 UART: [art] SIG.R = 228310D715ABB2CE0C397C1BFFC05ED32B9D9E69CCFFCCA3600A523F2503CDA540FC53115D64F065EAE78B2F606D7BBB
3,449,685 UART: [art] SIG.S = 9E70D9ADE03893FD8E727B53B0C4276460FDC6C8C89CDB3B9A84EFD619A7A495A50E6BD3EA802F68C5DC9094368131C9
3,473,165 UART: Caliptra RT
3,473,510 UART: [state] CFI Enabled
3,581,731 UART: [rt] RT listening for mailbox commands...
3,582,401 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,361 UART: [rt]cmd =0x44504543, len=24
3,638,661 >>> mbox cmd response data (40 bytes)
3,638,662 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,668,359 UART: [rt]cmd =0x44504543, len=24
3,694,985 >>> mbox cmd response data (40 bytes)
3,694,986 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,724,413 UART: [rt]cmd =0x44504543, len=24
3,750,551 >>> mbox cmd response data (40 bytes)
3,750,552 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,780,167 UART: [rt]cmd =0x44504543, len=24
3,806,671 >>> mbox cmd response data (40 bytes)
3,806,672 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,835,889 UART: [rt]cmd =0x44504543, len=24
3,861,855 >>> mbox cmd response data (40 bytes)
3,861,856 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,891,443 UART: [rt]cmd =0x44504543, len=24
3,917,581 >>> mbox cmd response data (40 bytes)
3,917,582 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,233 UART: [rt]cmd =0x44504543, len=24
3,973,969 >>> mbox cmd response data (40 bytes)
3,973,970 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,003,213 UART: [rt]cmd =0x44504543, len=24
4,029,883 >>> mbox cmd response data (40 bytes)
4,029,884 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,059,413 UART: [rt]cmd =0x44504543, len=24
4,085,513 >>> mbox cmd response data (40 bytes)
4,085,514 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,115,079 UART: [rt]cmd =0x44504543, len=24
4,141,507 >>> mbox cmd response data (40 bytes)
4,141,508 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,171,069 UART: [rt]cmd =0x44504543, len=24
4,196,801 >>> mbox cmd response data (40 bytes)
4,196,802 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,225,997 UART: [rt]cmd =0x44504543, len=24
4,252,265 >>> mbox cmd response data (40 bytes)
4,252,266 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,281,905 UART: [rt]cmd =0x44504543, len=24
4,308,337 >>> mbox cmd response data (40 bytes)
4,308,338 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,337,851 UART: [rt]cmd =0x44504543, len=24
4,364,381 >>> mbox cmd response data (40 bytes)
4,364,382 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,393,907 UART: [rt]cmd =0x44504543, len=24
4,420,423 >>> mbox cmd response data (40 bytes)
4,420,424 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,449,687 UART: [rt]cmd =0x44504543, len=24
4,456,669 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,720 ready_for_fw is high
1,362,720 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,021 >>> mbox cmd response: success
2,988,823 UART:
2,988,839 UART: Running Caliptra FMC ...
2,989,247 UART:
2,989,390 UART: [state] CFI Enabled
2,999,657 UART: [fht] FMC Alias Private Key: 7
3,107,802 UART: [art] Extend RT PCRs Done
3,108,230 UART: [art] Lock RT PCRs Done
3,109,864 UART: [art] Populate DV Done
3,118,117 UART: [fht] FMC Alias Private Key: 7
3,119,261 UART: [art] Derive CDI
3,119,541 UART: [art] Store in in slot 0x4
3,205,182 UART: [art] Derive Key Pair
3,205,542 UART: [art] Store priv key in slot 0x5
3,218,892 UART: [art] Derive Key Pair - Done
3,233,305 UART: [art] Signing Cert with AUTHO
3,233,785 UART: RITY.KEYID = 7
3,249,193 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,958 UART: [art] PUB.X = F9745540E0409ADBAACE9C2241203CEC3B1A8271D23A3336FCB2EED3FD774C517A929B4D9DCA254ACD24FB1408A98A76
3,256,741 UART: [art] PUB.Y = 7F828F5C14E4A4FBA1710C117B0534C111099E1D8EB4E393754DB14AB2C4EA57461852079B4CE97AE50D4EBBE1F2624A
3,263,684 UART: [art] SIG.R = 675B89EDBB28F5CC64855CEB9AAE895E02AF8B3D428C431064A76DE33D29486046E4BAA6C1157CFF0DAFFF7A85FFDE91
3,270,470 UART: [art] SIG.S = AAF7B0FA8DE9A9D8B0AC59A4A7E2DFE2F6FFF402188ADF426FA932A559338A844F8D7AFEEF191FE6463D810A1C3E3CD2
3,294,209 UART: Caliptra RT
3,294,554 UART: [state] CFI Enabled
3,402,743 UART: [rt] RT listening for mailbox commands...
3,403,413 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,325 UART: [rt]cmd =0x44504543, len=24
3,460,073 >>> mbox cmd response data (40 bytes)
3,460,074 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,489,553 UART: [rt]cmd =0x44504543, len=24
3,515,311 >>> mbox cmd response data (40 bytes)
3,515,312 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,544,861 UART: [rt]cmd =0x44504543, len=24
3,571,253 >>> mbox cmd response data (40 bytes)
3,571,254 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,600,839 UART: [rt]cmd =0x44504543, len=24
3,627,529 >>> mbox cmd response data (40 bytes)
3,627,530 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,657,031 UART: [rt]cmd =0x44504543, len=24
3,683,135 >>> mbox cmd response data (40 bytes)
3,683,136 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,493 UART: [rt]cmd =0x44504543, len=24
3,738,511 >>> mbox cmd response data (40 bytes)
3,738,512 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,085 UART: [rt]cmd =0x44504543, len=24
3,794,645 >>> mbox cmd response data (40 bytes)
3,794,646 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,087 UART: [rt]cmd =0x44504543, len=24
3,850,325 >>> mbox cmd response data (40 bytes)
3,850,326 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,973 UART: [rt]cmd =0x44504543, len=24
3,906,491 >>> mbox cmd response data (40 bytes)
3,906,492 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,903 UART: [rt]cmd =0x44504543, len=24
3,962,043 >>> mbox cmd response data (40 bytes)
3,962,044 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,991,601 UART: [rt]cmd =0x44504543, len=24
4,018,021 >>> mbox cmd response data (40 bytes)
4,018,022 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,047,717 UART: [rt]cmd =0x44504543, len=24
4,074,215 >>> mbox cmd response data (40 bytes)
4,074,216 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,103,511 UART: [rt]cmd =0x44504543, len=24
4,129,779 >>> mbox cmd response data (40 bytes)
4,129,780 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,159,233 UART: [rt]cmd =0x44504543, len=24
4,185,209 >>> mbox cmd response data (40 bytes)
4,185,210 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,214,853 UART: [rt]cmd =0x44504543, len=24
4,240,655 >>> mbox cmd response data (40 bytes)
4,240,656 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,270,107 UART: [rt]cmd =0x44504543, len=24
4,277,261 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
87,886 UART: [kat] SHA2-256
893,536 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,661 UART: [kat] ++
897,813 UART: [kat] sha1
901,865 UART: [kat] SHA2-256
903,805 UART: [kat] SHA2-384
906,568 UART: [kat] SHA2-512-ACC
908,469 UART: [kat] ECC-384
917,892 UART: [kat] HMAC-384Kdf
922,462 UART: [kat] LMS
1,170,790 UART: [kat] --
1,171,979 UART: [cold-reset] ++
1,172,327 UART: [fht] FHT @ 0x50003400
1,174,804 UART: [idev] ++
1,174,972 UART: [idev] CDI.KEYID = 6
1,175,332 UART: [idev] SUBJECT.KEYID = 7
1,175,756 UART: [idev] UDS.KEYID = 0
1,176,101 ready_for_fw is high
1,176,101 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,474 UART: [idev] Erasing UDS.KEYID = 0
1,200,839 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,435 UART: [ldev] ++
1,210,603 UART: [ldev] CDI.KEYID = 6
1,210,966 UART: [ldev] SUBJECT.KEYID = 5
1,211,392 UART: [ldev] AUTHORITY.KEYID = 7
1,211,855 UART: [ldev] FE.KEYID = 1
1,217,041 UART: [ldev] Erasing FE.KEYID = 1
1,242,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,563 UART: [ldev] --
1,281,842 UART: [fwproc] Wait for Commands...
1,282,538 UART: [fwproc] Recv command 0x46574c44
1,283,266 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,490 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,794 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,555 >>> mbox cmd response: success
2,773,669 UART: [afmc] ++
2,773,837 UART: [afmc] CDI.KEYID = 6
2,774,199 UART: [afmc] SUBJECT.KEYID = 7
2,774,624 UART: [afmc] AUTHORITY.KEYID = 5
2,810,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,854 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,602 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,330 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,215 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,934 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,008 UART: [afmc] --
2,853,892 UART: [cold-reset] --
2,854,826 UART: [state] Locking Datavault
2,855,829 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,433 UART: [state] Locking ICCM
2,857,021 UART: [exit] Launching FMC @ 0x40000130
2,862,350 UART:
2,862,366 UART: Running Caliptra FMC ...
2,862,774 UART:
2,862,828 UART: [state] CFI Enabled
2,873,025 UART: [fht] FMC Alias Private Key: 7
2,980,590 UART: [art] Extend RT PCRs Done
2,981,018 UART: [art] Lock RT PCRs Done
2,982,444 UART: [art] Populate DV Done
2,990,759 UART: [fht] FMC Alias Private Key: 7
2,991,695 UART: [art] Derive CDI
2,991,975 UART: [art] Store in in slot 0x4
3,077,886 UART: [art] Derive Key Pair
3,078,246 UART: [art] Store priv key in slot 0x5
3,091,166 UART: [art] Derive Key Pair - Done
3,105,950 UART: [art] Signing Cert with AUTHO
3,106,430 UART: RITY.KEYID = 7
3,121,760 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,525 UART: [art] PUB.X = 00E2A89DE339731F052A733994B9C347CC3D8EB148BD794534A0BFE9BF9346BB89EE02C3526B526312335472F23D7FFF
3,129,269 UART: [art] PUB.Y = 34A3DB26142D446D1722A675542364D10CB14FE35E88C586BF4AB72BB0D99D35539DBB6B3638AD9D22CF6A3324372A8B
3,136,220 UART: [art] SIG.R = BDB745690FDCC3D857C60657D992631613D171F9CB16930ED7CAC53EB8A782420C474C2C7691F10720FD79CAB77393A4
3,142,977 UART: [art] SIG.S = 5D30810D3C6E6418301CD3179E4034AD3D2EE5C70EB0AAEBD3F3BEFFD76AA60CFA950352D350C083217596ECD6C273FD
3,167,254 UART: Caliptra RT
3,167,507 UART: [state] CFI Enabled
3,275,462 UART: [rt] RT listening for mailbox commands...
3,276,132 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,464 UART: [rt]cmd =0x44504543, len=24
3,332,218 >>> mbox cmd response data (40 bytes)
3,332,219 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,830 UART: [rt]cmd =0x44504543, len=24
3,388,118 >>> mbox cmd response data (40 bytes)
3,388,119 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,417,746 UART: [rt]cmd =0x44504543, len=24
3,444,164 >>> mbox cmd response data (40 bytes)
3,444,165 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,794 UART: [rt]cmd =0x44504543, len=24
3,499,760 >>> mbox cmd response data (40 bytes)
3,499,761 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,322 UART: [rt]cmd =0x44504543, len=24
3,555,778 >>> mbox cmd response data (40 bytes)
3,555,779 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,242 UART: [rt]cmd =0x44504543, len=24
3,611,634 >>> mbox cmd response data (40 bytes)
3,611,635 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,190 UART: [rt]cmd =0x44504543, len=24
3,667,304 >>> mbox cmd response data (40 bytes)
3,667,305 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,770 UART: [rt]cmd =0x44504543, len=24
3,723,310 >>> mbox cmd response data (40 bytes)
3,723,311 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,670 UART: [rt]cmd =0x44504543, len=24
3,778,832 >>> mbox cmd response data (40 bytes)
3,778,833 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,808,244 UART: [rt]cmd =0x44504543, len=24
3,834,418 >>> mbox cmd response data (40 bytes)
3,834,419 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,068 UART: [rt]cmd =0x44504543, len=24
3,890,298 >>> mbox cmd response data (40 bytes)
3,890,299 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,700 UART: [rt]cmd =0x44504543, len=24
3,946,074 >>> mbox cmd response data (40 bytes)
3,946,075 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,664 UART: [rt]cmd =0x44504543, len=24
4,001,888 >>> mbox cmd response data (40 bytes)
4,001,889 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,031,056 UART: [rt]cmd =0x44504543, len=24
4,057,538 >>> mbox cmd response data (40 bytes)
4,057,539 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,086,912 UART: [rt]cmd =0x44504543, len=24
4,113,218 >>> mbox cmd response data (40 bytes)
4,113,219 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,142,618 UART: [rt]cmd =0x44504543, len=24
4,149,970 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,947 ready_for_fw is high
1,059,947 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,826 >>> mbox cmd response: success
2,688,760 UART:
2,688,776 UART: Running Caliptra FMC ...
2,689,184 UART:
2,689,238 UART: [state] CFI Enabled
2,699,993 UART: [fht] FMC Alias Private Key: 7
2,807,908 UART: [art] Extend RT PCRs Done
2,808,336 UART: [art] Lock RT PCRs Done
2,809,704 UART: [art] Populate DV Done
2,817,767 UART: [fht] FMC Alias Private Key: 7
2,818,871 UART: [art] Derive CDI
2,819,151 UART: [art] Store in in slot 0x4
2,904,812 UART: [art] Derive Key Pair
2,905,172 UART: [art] Store priv key in slot 0x5
2,918,508 UART: [art] Derive Key Pair - Done
2,933,153 UART: [art] Signing Cert with AUTHO
2,933,633 UART: RITY.KEYID = 7
2,948,537 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,302 UART: [art] PUB.X = 02D3AA8102D91F15067EF3485AD72D81023E5649C25B9451840935A363C9F81A404BC7787CA0BCD922429D9784BBAD94
2,956,053 UART: [art] PUB.Y = E3C476D2E3E420AA3B824A4EB5C1BE51C8B98C741DECE8DE98F4C2896F94BBF1DA68F3D2ECB6F98BE5F41BFF6DDCCAD6
2,963,039 UART: [art] SIG.R = CC68D0CED72C308DB14543CFC92F32B9429823E849E225CB1EA2050408B650ED8D299229011B6E2E492D228B2C73E3E3
2,969,799 UART: [art] SIG.S = 3AA6DFC912DA94469F7ABB0225B6A8080BAB81A1047B82D330B5ADE09F92071C8DAE88B183052EB16E373F10D2202632
2,993,626 UART: Caliptra RT
2,993,879 UART: [state] CFI Enabled
3,101,280 UART: [rt] RT listening for mailbox commands...
3,101,950 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,838 UART: [rt]cmd =0x44504543, len=24
3,158,534 >>> mbox cmd response data (40 bytes)
3,158,535 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,906 UART: [rt]cmd =0x44504543, len=24
3,213,758 >>> mbox cmd response data (40 bytes)
3,213,759 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,243,156 UART: [rt]cmd =0x44504543, len=24
3,268,658 >>> mbox cmd response data (40 bytes)
3,268,659 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,298,170 UART: [rt]cmd =0x44504543, len=24
3,324,734 >>> mbox cmd response data (40 bytes)
3,324,735 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,354,308 UART: [rt]cmd =0x44504543, len=24
3,380,498 >>> mbox cmd response data (40 bytes)
3,380,499 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,409,828 UART: [rt]cmd =0x44504543, len=24
3,436,148 >>> mbox cmd response data (40 bytes)
3,436,149 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,438 UART: [rt]cmd =0x44504543, len=24
3,491,872 >>> mbox cmd response data (40 bytes)
3,491,873 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,521,454 UART: [rt]cmd =0x44504543, len=24
3,547,828 >>> mbox cmd response data (40 bytes)
3,547,829 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,044 UART: [rt]cmd =0x44504543, len=24
3,602,986 >>> mbox cmd response data (40 bytes)
3,602,987 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,348 UART: [rt]cmd =0x44504543, len=24
3,658,296 >>> mbox cmd response data (40 bytes)
3,658,297 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,687,592 UART: [rt]cmd =0x44504543, len=24
3,713,846 >>> mbox cmd response data (40 bytes)
3,713,847 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,586 UART: [rt]cmd =0x44504543, len=24
3,770,270 >>> mbox cmd response data (40 bytes)
3,770,271 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,799,722 UART: [rt]cmd =0x44504543, len=24
3,825,880 >>> mbox cmd response data (40 bytes)
3,825,881 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,855,244 UART: [rt]cmd =0x44504543, len=24
3,881,136 >>> mbox cmd response data (40 bytes)
3,881,137 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,910,606 UART: [rt]cmd =0x44504543, len=24
3,936,906 >>> mbox cmd response data (40 bytes)
3,936,907 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,468 UART: [rt]cmd =0x44504543, len=24
3,973,510 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
893,595 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,720 UART: [kat] ++
897,872 UART: [kat] sha1
902,250 UART: [kat] SHA2-256
904,190 UART: [kat] SHA2-384
907,135 UART: [kat] SHA2-512-ACC
909,036 UART: [kat] ECC-384
919,055 UART: [kat] HMAC-384Kdf
923,697 UART: [kat] LMS
1,172,025 UART: [kat] --
1,172,782 UART: [cold-reset] ++
1,173,200 UART: [fht] FHT @ 0x50003400
1,175,817 UART: [idev] ++
1,175,985 UART: [idev] CDI.KEYID = 6
1,176,345 UART: [idev] SUBJECT.KEYID = 7
1,176,769 UART: [idev] UDS.KEYID = 0
1,177,114 ready_for_fw is high
1,177,114 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,783 UART: [idev] Erasing UDS.KEYID = 0
1,201,532 UART: [idev] Sha1 KeyId Algorithm
1,209,948 UART: [idev] --
1,210,934 UART: [ldev] ++
1,211,102 UART: [ldev] CDI.KEYID = 6
1,211,465 UART: [ldev] SUBJECT.KEYID = 5
1,211,891 UART: [ldev] AUTHORITY.KEYID = 7
1,212,354 UART: [ldev] FE.KEYID = 1
1,217,352 UART: [ldev] Erasing FE.KEYID = 1
1,244,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,790 UART: [ldev] --
1,283,281 UART: [fwproc] Wait for Commands...
1,283,883 UART: [fwproc] Recv command 0x46574c44
1,284,611 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,095 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,399 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,190 >>> mbox cmd response: success
2,775,206 UART: [afmc] ++
2,775,374 UART: [afmc] CDI.KEYID = 6
2,775,736 UART: [afmc] SUBJECT.KEYID = 7
2,776,161 UART: [afmc] AUTHORITY.KEYID = 5
2,811,694 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,659 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,387 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,272 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,991 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,675 UART: [afmc] --
2,854,591 UART: [cold-reset] --
2,855,557 UART: [state] Locking Datavault
2,856,474 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,078 UART: [state] Locking ICCM
2,857,752 UART: [exit] Launching FMC @ 0x40000130
2,863,081 UART:
2,863,097 UART: Running Caliptra FMC ...
2,863,505 UART:
2,863,648 UART: [state] CFI Enabled
2,874,297 UART: [fht] FMC Alias Private Key: 7
2,982,446 UART: [art] Extend RT PCRs Done
2,982,874 UART: [art] Lock RT PCRs Done
2,984,226 UART: [art] Populate DV Done
2,992,571 UART: [fht] FMC Alias Private Key: 7
2,993,603 UART: [art] Derive CDI
2,993,883 UART: [art] Store in in slot 0x4
3,079,730 UART: [art] Derive Key Pair
3,080,090 UART: [art] Store priv key in slot 0x5
3,093,104 UART: [art] Derive Key Pair - Done
3,107,554 UART: [art] Signing Cert with AUTHO
3,108,034 UART: RITY.KEYID = 7
3,123,228 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,993 UART: [art] PUB.X = BD722AF11DDB46750F38B276ED798FAB15DA5C7AB4442756746546562CD944389B64EBF115C41E7455BB17B43E342676
3,130,760 UART: [art] PUB.Y = DCBEE4DD4F112F2ACA99CB29FE809E893E6DD78389B84A611333DCC5BBD093B6ACC7DB63F4F78FF67F09E1539C74FA9B
3,137,733 UART: [art] SIG.R = 713CB3A754CCE92E24C3AC3FC181516FEEFAAC5B9034DC36B8B4AF1D6058D193A54B7B2E8A88850DD56B7E4FD242DFB9
3,144,522 UART: [art] SIG.S = FCC33CED5CB02DC1D5CCC51464A231436DFABC83F6E21B8F914E19B367BAEE362D50185367B814BA4CD100A245373199
3,168,249 UART: Caliptra RT
3,168,594 UART: [state] CFI Enabled
3,276,971 UART: [rt] RT listening for mailbox commands...
3,277,641 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,631 UART: [rt]cmd =0x44504543, len=24
3,334,363 >>> mbox cmd response data (40 bytes)
3,334,364 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,821 UART: [rt]cmd =0x44504543, len=24
3,389,953 >>> mbox cmd response data (40 bytes)
3,389,954 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,419,275 UART: [rt]cmd =0x44504543, len=24
3,445,715 >>> mbox cmd response data (40 bytes)
3,445,716 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,475,165 UART: [rt]cmd =0x44504543, len=24
3,501,441 >>> mbox cmd response data (40 bytes)
3,501,442 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,979 UART: [rt]cmd =0x44504543, len=24
3,557,079 >>> mbox cmd response data (40 bytes)
3,557,080 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,807 UART: [rt]cmd =0x44504543, len=24
3,613,477 >>> mbox cmd response data (40 bytes)
3,613,478 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,905 UART: [rt]cmd =0x44504543, len=24
3,669,765 >>> mbox cmd response data (40 bytes)
3,669,766 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,331 UART: [rt]cmd =0x44504543, len=24
3,725,627 >>> mbox cmd response data (40 bytes)
3,725,628 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,965 UART: [rt]cmd =0x44504543, len=24
3,781,019 >>> mbox cmd response data (40 bytes)
3,781,020 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,810,445 UART: [rt]cmd =0x44504543, len=24
3,837,043 >>> mbox cmd response data (40 bytes)
3,837,044 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,607 UART: [rt]cmd =0x44504543, len=24
3,892,705 >>> mbox cmd response data (40 bytes)
3,892,706 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,922,305 UART: [rt]cmd =0x44504543, len=24
3,948,847 >>> mbox cmd response data (40 bytes)
3,948,848 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,978,407 UART: [rt]cmd =0x44504543, len=24
4,004,827 >>> mbox cmd response data (40 bytes)
4,004,828 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,034,163 UART: [rt]cmd =0x44504543, len=24
4,060,955 >>> mbox cmd response data (40 bytes)
4,060,956 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,090,379 UART: [rt]cmd =0x44504543, len=24
4,116,581 >>> mbox cmd response data (40 bytes)
4,116,582 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,146,215 UART: [rt]cmd =0x44504543, len=24
4,153,347 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,322 ready_for_fw is high
1,060,322 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,553 >>> mbox cmd response: success
2,689,889 UART:
2,689,905 UART: Running Caliptra FMC ...
2,690,313 UART:
2,690,456 UART: [state] CFI Enabled
2,701,283 UART: [fht] FMC Alias Private Key: 7
2,809,132 UART: [art] Extend RT PCRs Done
2,809,560 UART: [art] Lock RT PCRs Done
2,811,442 UART: [art] Populate DV Done
2,819,463 UART: [fht] FMC Alias Private Key: 7
2,820,631 UART: [art] Derive CDI
2,820,911 UART: [art] Store in in slot 0x4
2,906,684 UART: [art] Derive Key Pair
2,907,044 UART: [art] Store priv key in slot 0x5
2,920,438 UART: [art] Derive Key Pair - Done
2,935,434 UART: [art] Signing Cert with AUTHO
2,935,914 UART: RITY.KEYID = 7
2,951,056 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,821 UART: [art] PUB.X = 6B47B02336ADE68694615FAC75E4E3C44ED9A7F12166715EC95E95CA56FAD62B1C50893951B686C4050B73242F7AA177
2,958,585 UART: [art] PUB.Y = 066C912A28A9F0A3F957E7433670E41AD83384863D96F5B7929EC6476C3A4613DBB19EB25393EB14428DC7403BCA5EA7
2,965,532 UART: [art] SIG.R = 22B400CA08DF84E4F25084A79BC09350A146AC073305AADF8588CB46AB06890E377F00A9E260F1B142BCD01EACE0864B
2,972,251 UART: [art] SIG.S = DDB79CB925E1C7446312FBAAD42A1241493457C80BD76E3D26AE6AFDEC71505A6C1C6C66DEA7A3E1E1D092EC7377F10C
2,996,030 UART: Caliptra RT
2,996,375 UART: [state] CFI Enabled
3,104,154 UART: [rt] RT listening for mailbox commands...
3,104,824 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,720 UART: [rt]cmd =0x44504543, len=24
3,160,972 >>> mbox cmd response data (40 bytes)
3,160,973 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,182 UART: [rt]cmd =0x44504543, len=24
3,216,638 >>> mbox cmd response data (40 bytes)
3,216,639 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,246,172 UART: [rt]cmd =0x44504543, len=24
3,272,458 >>> mbox cmd response data (40 bytes)
3,272,459 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,988 UART: [rt]cmd =0x44504543, len=24
3,328,384 >>> mbox cmd response data (40 bytes)
3,328,385 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,974 UART: [rt]cmd =0x44504543, len=24
3,384,304 >>> mbox cmd response data (40 bytes)
3,384,305 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,413,888 UART: [rt]cmd =0x44504543, len=24
3,440,392 >>> mbox cmd response data (40 bytes)
3,440,393 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,469,704 UART: [rt]cmd =0x44504543, len=24
3,495,812 >>> mbox cmd response data (40 bytes)
3,495,813 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,254 UART: [rt]cmd =0x44504543, len=24
3,551,890 >>> mbox cmd response data (40 bytes)
3,551,891 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,300 UART: [rt]cmd =0x44504543, len=24
3,607,808 >>> mbox cmd response data (40 bytes)
3,607,809 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,402 UART: [rt]cmd =0x44504543, len=24
3,663,762 >>> mbox cmd response data (40 bytes)
3,663,763 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,693,184 UART: [rt]cmd =0x44504543, len=24
3,719,700 >>> mbox cmd response data (40 bytes)
3,719,701 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,749,256 UART: [rt]cmd =0x44504543, len=24
3,775,802 >>> mbox cmd response data (40 bytes)
3,775,803 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,805,044 UART: [rt]cmd =0x44504543, len=24
3,831,356 >>> mbox cmd response data (40 bytes)
3,831,357 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,054 UART: [rt]cmd =0x44504543, len=24
3,887,310 >>> mbox cmd response data (40 bytes)
3,887,311 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,638 UART: [rt]cmd =0x44504543, len=24
3,942,934 >>> mbox cmd response data (40 bytes)
3,942,935 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,972,364 UART: [rt]cmd =0x44504543, len=24
3,979,778 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,446 UART: [state] LifecycleState = Unprovisioned
86,101 UART: [state] DebugLocked = No
86,791 UART: [state] WD Timer not started. Device not locked for debugging
88,140 UART: [kat] SHA2-256
891,690 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,819 UART: [kat] ++
895,971 UART: [kat] sha1
900,115 UART: [kat] SHA2-256
902,055 UART: [kat] SHA2-384
904,822 UART: [kat] SHA2-512-ACC
906,723 UART: [kat] ECC-384
916,396 UART: [kat] HMAC-384Kdf
921,146 UART: [kat] LMS
1,169,458 UART: [kat] --
1,170,587 UART: [cold-reset] ++
1,170,959 UART: [fht] FHT @ 0x50003400
1,173,589 UART: [idev] ++
1,173,757 UART: [idev] CDI.KEYID = 6
1,174,118 UART: [idev] SUBJECT.KEYID = 7
1,174,543 UART: [idev] UDS.KEYID = 0
1,174,889 ready_for_fw is high
1,174,889 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,307 UART: [idev] Erasing UDS.KEYID = 0
1,199,203 UART: [idev] Sha1 KeyId Algorithm
1,208,103 UART: [idev] --
1,208,970 UART: [ldev] ++
1,209,138 UART: [ldev] CDI.KEYID = 6
1,209,502 UART: [ldev] SUBJECT.KEYID = 5
1,209,929 UART: [ldev] AUTHORITY.KEYID = 7
1,210,392 UART: [ldev] FE.KEYID = 1
1,215,310 UART: [ldev] Erasing FE.KEYID = 1
1,241,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,118 UART: [ldev] --
1,280,516 UART: [fwproc] Wait for Commands...
1,281,293 UART: [fwproc] Recv command 0x46574c44
1,282,026 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,581 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,890 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,684 >>> mbox cmd response: success
2,773,893 UART: [afmc] ++
2,774,061 UART: [afmc] CDI.KEYID = 6
2,774,424 UART: [afmc] SUBJECT.KEYID = 7
2,774,850 UART: [afmc] AUTHORITY.KEYID = 5
2,810,121 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,374 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,103 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,986 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,705 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,548 UART: [afmc] --
2,853,604 UART: [cold-reset] --
2,854,494 UART: [state] Locking Datavault
2,855,623 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,227 UART: [state] Locking ICCM
2,856,737 UART: [exit] Launching FMC @ 0x40000130
2,862,066 UART:
2,862,082 UART: Running Caliptra FMC ...
2,862,490 UART:
2,862,544 UART: [state] CFI Enabled
2,872,809 UART: [fht] FMC Alias Private Key: 7
2,981,350 UART: [art] Extend RT PCRs Done
2,981,778 UART: [art] Lock RT PCRs Done
2,983,290 UART: [art] Populate DV Done
2,991,427 UART: [fht] FMC Alias Private Key: 7
2,992,551 UART: [art] Derive CDI
2,992,831 UART: [art] Store in in slot 0x4
3,078,684 UART: [art] Derive Key Pair
3,079,044 UART: [art] Store priv key in slot 0x5
3,092,210 UART: [art] Derive Key Pair - Done
3,106,855 UART: [art] Signing Cert with AUTHO
3,107,335 UART: RITY.KEYID = 7
3,122,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,374 UART: [art] PUB.X = 2F38167C2F2D01302F4AD7D2FF00065959F55FD6D5645AD480EE27821F97E803DBCA47C45DD51986C4C7DACB8C653238
3,130,119 UART: [art] PUB.Y = 40E3A5F8BCADFC3A1569DD461E4D96B62672972453D2B48477D1BB927D8BA1FB6D285E5F35E423686A71E217A2186304
3,137,068 UART: [art] SIG.R = 2EB298CA83766A24A1FACE2C4C235ED4B07A07DC7EB208F2837AB6A929612CFF3147EF3ED01D27A51ABD92FBBFBEF49F
3,143,858 UART: [art] SIG.S = 5CD87D4D8D39F573C180A60B84DE3473C61DA4BB72811217D5D1793E46AC408AD14790FFE472A1509FC6E2DEE08AE845
3,167,340 UART: Caliptra RT
3,167,593 UART: [state] CFI Enabled
3,274,314 UART: [rt] RT listening for mailbox commands...
3,274,984 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,986 UART: [rt]cmd =0x44504543, len=24
3,330,752 >>> mbox cmd response data (40 bytes)
3,330,753 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,974 UART: [rt]cmd =0x44504543, len=24
3,386,718 >>> mbox cmd response data (40 bytes)
3,386,719 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,416,340 UART: [rt]cmd =0x44504543, len=24
3,442,272 >>> mbox cmd response data (40 bytes)
3,442,273 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,614 UART: [rt]cmd =0x44504543, len=24
3,497,526 >>> mbox cmd response data (40 bytes)
3,497,527 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,066 UART: [rt]cmd =0x44504543, len=24
3,553,294 >>> mbox cmd response data (40 bytes)
3,553,295 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,622 UART: [rt]cmd =0x44504543, len=24
3,609,048 >>> mbox cmd response data (40 bytes)
3,609,049 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,464 UART: [rt]cmd =0x44504543, len=24
3,664,798 >>> mbox cmd response data (40 bytes)
3,664,799 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,256 UART: [rt]cmd =0x44504543, len=24
3,720,208 >>> mbox cmd response data (40 bytes)
3,720,209 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,749,446 UART: [rt]cmd =0x44504543, len=24
3,775,806 >>> mbox cmd response data (40 bytes)
3,775,807 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,805,462 UART: [rt]cmd =0x44504543, len=24
3,831,934 >>> mbox cmd response data (40 bytes)
3,831,935 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,222 UART: [rt]cmd =0x44504543, len=24
3,887,076 >>> mbox cmd response data (40 bytes)
3,887,077 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,650 UART: [rt]cmd =0x44504543, len=24
3,942,828 >>> mbox cmd response data (40 bytes)
3,942,829 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,972,574 UART: [rt]cmd =0x44504543, len=24
3,998,912 >>> mbox cmd response data (40 bytes)
3,998,913 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,028,426 UART: [rt]cmd =0x44504543, len=24
4,055,288 >>> mbox cmd response data (40 bytes)
4,055,289 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,084,606 UART: [rt]cmd =0x44504543, len=24
4,111,166 >>> mbox cmd response data (40 bytes)
4,111,167 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,140,776 UART: [rt]cmd =0x44504543, len=24
4,147,698 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,004 ready_for_fw is high
1,056,004 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,541 >>> mbox cmd response: success
2,683,833 UART:
2,683,849 UART: Running Caliptra FMC ...
2,684,257 UART:
2,684,311 UART: [state] CFI Enabled
2,695,044 UART: [fht] FMC Alias Private Key: 7
2,802,881 UART: [art] Extend RT PCRs Done
2,803,309 UART: [art] Lock RT PCRs Done
2,804,899 UART: [art] Populate DV Done
2,813,166 UART: [fht] FMC Alias Private Key: 7
2,814,304 UART: [art] Derive CDI
2,814,584 UART: [art] Store in in slot 0x4
2,900,073 UART: [art] Derive Key Pair
2,900,433 UART: [art] Store priv key in slot 0x5
2,912,823 UART: [art] Derive Key Pair - Done
2,927,605 UART: [art] Signing Cert with AUTHO
2,928,085 UART: RITY.KEYID = 7
2,943,111 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,876 UART: [art] PUB.X = 0FA91B58EDC26C205CB3742ADE3A72936EB7DC1EB1275A92308921ABAB631CED3157576616B5CDC368A0F8D19F79C1D0
2,950,655 UART: [art] PUB.Y = 1BDD95286461A10AC47FB41EFF21962EC165FDD1B8F601B3A340E62F5D4F50E0D9962CA02CF8F68D1E864F11FE3B4A9E
2,957,615 UART: [art] SIG.R = 31C808FF8B04986C6DE4E838A47CC891BB95477009C06F2F7C972B45A7AB79732410900B4B9EBBC780698FE419C641ED
2,964,375 UART: [art] SIG.S = 6706FBDD5D2598AD193762928FA604C6671F6B13970C0C6735E1363C8D4F4506B46AF595DB927C30094FAB57FA89B132
2,987,924 UART: Caliptra RT
2,988,177 UART: [state] CFI Enabled
3,095,074 UART: [rt] RT listening for mailbox commands...
3,095,744 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,500 UART: [rt]cmd =0x44504543, len=24
3,151,266 >>> mbox cmd response data (40 bytes)
3,151,267 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,180,750 UART: [rt]cmd =0x44504543, len=24
3,206,712 >>> mbox cmd response data (40 bytes)
3,206,713 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,236,164 UART: [rt]cmd =0x44504543, len=24
3,262,352 >>> mbox cmd response data (40 bytes)
3,262,353 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,291,954 UART: [rt]cmd =0x44504543, len=24
3,318,252 >>> mbox cmd response data (40 bytes)
3,318,253 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,910 UART: [rt]cmd =0x44504543, len=24
3,373,748 >>> mbox cmd response data (40 bytes)
3,373,749 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,404 UART: [rt]cmd =0x44504543, len=24
3,429,764 >>> mbox cmd response data (40 bytes)
3,429,765 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,459,184 UART: [rt]cmd =0x44504543, len=24
3,485,182 >>> mbox cmd response data (40 bytes)
3,485,183 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,678 UART: [rt]cmd =0x44504543, len=24
3,541,156 >>> mbox cmd response data (40 bytes)
3,541,157 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,570,530 UART: [rt]cmd =0x44504543, len=24
3,597,310 >>> mbox cmd response data (40 bytes)
3,597,311 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,556 UART: [rt]cmd =0x44504543, len=24
3,652,766 >>> mbox cmd response data (40 bytes)
3,652,767 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,682,244 UART: [rt]cmd =0x44504543, len=24
3,708,600 >>> mbox cmd response data (40 bytes)
3,708,601 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,162 UART: [rt]cmd =0x44504543, len=24
3,764,544 >>> mbox cmd response data (40 bytes)
3,764,545 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,794,058 UART: [rt]cmd =0x44504543, len=24
3,820,784 >>> mbox cmd response data (40 bytes)
3,820,785 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,850,258 UART: [rt]cmd =0x44504543, len=24
3,876,574 >>> mbox cmd response data (40 bytes)
3,876,575 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,905,990 UART: [rt]cmd =0x44504543, len=24
3,932,622 >>> mbox cmd response data (40 bytes)
3,932,623 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,962,244 UART: [rt]cmd =0x44504543, len=24
3,969,324 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
891,375 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,504 UART: [kat] ++
895,656 UART: [kat] sha1
899,922 UART: [kat] SHA2-256
901,862 UART: [kat] SHA2-384
904,575 UART: [kat] SHA2-512-ACC
906,476 UART: [kat] ECC-384
916,515 UART: [kat] HMAC-384Kdf
921,169 UART: [kat] LMS
1,169,481 UART: [kat] --
1,170,508 UART: [cold-reset] ++
1,171,026 UART: [fht] FHT @ 0x50003400
1,173,648 UART: [idev] ++
1,173,816 UART: [idev] CDI.KEYID = 6
1,174,177 UART: [idev] SUBJECT.KEYID = 7
1,174,602 UART: [idev] UDS.KEYID = 0
1,174,948 ready_for_fw is high
1,174,948 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,140 UART: [idev] Erasing UDS.KEYID = 0
1,200,528 UART: [idev] Sha1 KeyId Algorithm
1,209,488 UART: [idev] --
1,210,719 UART: [ldev] ++
1,210,887 UART: [ldev] CDI.KEYID = 6
1,211,251 UART: [ldev] SUBJECT.KEYID = 5
1,211,678 UART: [ldev] AUTHORITY.KEYID = 7
1,212,141 UART: [ldev] FE.KEYID = 1
1,217,693 UART: [ldev] Erasing FE.KEYID = 1
1,244,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,751 UART: [ldev] --
1,283,195 UART: [fwproc] Wait for Commands...
1,284,008 UART: [fwproc] Recv command 0x46574c44
1,284,741 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,117 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,426 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,354 >>> mbox cmd response: success
2,774,435 UART: [afmc] ++
2,774,603 UART: [afmc] CDI.KEYID = 6
2,774,966 UART: [afmc] SUBJECT.KEYID = 7
2,775,392 UART: [afmc] AUTHORITY.KEYID = 5
2,811,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,925 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,676 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,405 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,288 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,007 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,894 UART: [afmc] --
2,854,916 UART: [cold-reset] --
2,855,780 UART: [state] Locking Datavault
2,856,975 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,579 UART: [state] Locking ICCM
2,858,111 UART: [exit] Launching FMC @ 0x40000130
2,863,440 UART:
2,863,456 UART: Running Caliptra FMC ...
2,863,864 UART:
2,864,007 UART: [state] CFI Enabled
2,874,570 UART: [fht] FMC Alias Private Key: 7
2,982,885 UART: [art] Extend RT PCRs Done
2,983,313 UART: [art] Lock RT PCRs Done
2,984,643 UART: [art] Populate DV Done
2,992,918 UART: [fht] FMC Alias Private Key: 7
2,994,092 UART: [art] Derive CDI
2,994,372 UART: [art] Store in in slot 0x4
3,080,081 UART: [art] Derive Key Pair
3,080,441 UART: [art] Store priv key in slot 0x5
3,093,537 UART: [art] Derive Key Pair - Done
3,108,406 UART: [art] Signing Cert with AUTHO
3,108,886 UART: RITY.KEYID = 7
3,123,944 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,709 UART: [art] PUB.X = 0C869A8B335E0818412BBE8319E2082B379D63D388E8C96C37BDEB69DFBAA39C251EBA3F8258568513E04F02CCA495B5
3,131,473 UART: [art] PUB.Y = A3186DE6C4982F6657552AEDC2A22DB9798013F1C7729E91C8117CCD1B219ACA537A1E6988652AFEC07D21C5C5B54F64
3,138,429 UART: [art] SIG.R = E17854F5E1BAD9269462A89C25CE514F0B909262778CF3D36C68517307A0ED2871144FEF6B2F0C8494302941E0EBB04C
3,145,188 UART: [art] SIG.S = 4AA5053B123654B1BE969D42FAAE0438ABA8344AE91256191FEE87180198F3C021B258AA80D4FD94585B246A572CC781
3,169,212 UART: Caliptra RT
3,169,557 UART: [state] CFI Enabled
3,277,328 UART: [rt] RT listening for mailbox commands...
3,277,998 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,962 UART: [rt]cmd =0x44504543, len=24
3,334,022 >>> mbox cmd response data (40 bytes)
3,334,023 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,350 UART: [rt]cmd =0x44504543, len=24
3,389,520 >>> mbox cmd response data (40 bytes)
3,389,521 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,418,916 UART: [rt]cmd =0x44504543, len=24
3,445,318 >>> mbox cmd response data (40 bytes)
3,445,319 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,824 UART: [rt]cmd =0x44504543, len=24
3,500,864 >>> mbox cmd response data (40 bytes)
3,500,865 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,316 UART: [rt]cmd =0x44504543, len=24
3,556,936 >>> mbox cmd response data (40 bytes)
3,556,937 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,338 UART: [rt]cmd =0x44504543, len=24
3,612,882 >>> mbox cmd response data (40 bytes)
3,612,883 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,366 UART: [rt]cmd =0x44504543, len=24
3,668,840 >>> mbox cmd response data (40 bytes)
3,668,841 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,348 UART: [rt]cmd =0x44504543, len=24
3,725,000 >>> mbox cmd response data (40 bytes)
3,725,001 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,594 UART: [rt]cmd =0x44504543, len=24
3,780,618 >>> mbox cmd response data (40 bytes)
3,780,619 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,834 UART: [rt]cmd =0x44504543, len=24
3,835,682 >>> mbox cmd response data (40 bytes)
3,835,683 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,228 UART: [rt]cmd =0x44504543, len=24
3,891,502 >>> mbox cmd response data (40 bytes)
3,891,503 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,920,910 UART: [rt]cmd =0x44504543, len=24
3,947,186 >>> mbox cmd response data (40 bytes)
3,947,187 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,976,550 UART: [rt]cmd =0x44504543, len=24
4,002,836 >>> mbox cmd response data (40 bytes)
4,002,837 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,032,616 UART: [rt]cmd =0x44504543, len=24
4,059,416 >>> mbox cmd response data (40 bytes)
4,059,417 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,088,718 UART: [rt]cmd =0x44504543, len=24
4,115,572 >>> mbox cmd response data (40 bytes)
4,115,573 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,144,914 UART: [rt]cmd =0x44504543, len=24
4,152,344 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,267 ready_for_fw is high
1,056,267 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,442 >>> mbox cmd response: success
2,684,604 UART:
2,684,620 UART: Running Caliptra FMC ...
2,685,028 UART:
2,685,171 UART: [state] CFI Enabled
2,695,682 UART: [fht] FMC Alias Private Key: 7
2,804,389 UART: [art] Extend RT PCRs Done
2,804,817 UART: [art] Lock RT PCRs Done
2,806,495 UART: [art] Populate DV Done
2,814,764 UART: [fht] FMC Alias Private Key: 7
2,815,708 UART: [art] Derive CDI
2,815,988 UART: [art] Store in in slot 0x4
2,901,543 UART: [art] Derive Key Pair
2,901,903 UART: [art] Store priv key in slot 0x5
2,915,211 UART: [art] Derive Key Pair - Done
2,929,370 UART: [art] Signing Cert with AUTHO
2,929,850 UART: RITY.KEYID = 7
2,945,238 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,003 UART: [art] PUB.X = B8032030745BF6F4264EEA119F80D79439E06EF79E44C8C6889B5A251C5F515A5152DE4E298A192AF34A7EF4A429230E
2,952,767 UART: [art] PUB.Y = 7D6E1731C3029EB289BBAA825BF9A51066CBFE5F8BFF25F1910DC352673E219BF07343FF9A6FFD3DCE345B960253A875
2,959,720 UART: [art] SIG.R = FAF2BFF1CE22525DCAFDE51A18F0EE5BABB70913DD0D02772F482F3EF0F7D1F78C734CE9AA086DD7B342CE8A5B4609C8
2,966,503 UART: [art] SIG.S = C72650B0EA94EFDDE4DB5F007CDCB85647B8A844115AF504B6AA04ED53A95825E1C69491AB7DFA44C95CAB878FDF51F7
2,990,248 UART: Caliptra RT
2,990,593 UART: [state] CFI Enabled
3,097,969 UART: [rt] RT listening for mailbox commands...
3,098,639 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,521 UART: [rt]cmd =0x44504543, len=24
3,154,577 >>> mbox cmd response data (40 bytes)
3,154,578 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,043 UART: [rt]cmd =0x44504543, len=24
3,209,755 >>> mbox cmd response data (40 bytes)
3,209,756 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,239,303 UART: [rt]cmd =0x44504543, len=24
3,265,327 >>> mbox cmd response data (40 bytes)
3,265,328 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,295,067 UART: [rt]cmd =0x44504543, len=24
3,321,001 >>> mbox cmd response data (40 bytes)
3,321,002 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,521 UART: [rt]cmd =0x44504543, len=24
3,377,343 >>> mbox cmd response data (40 bytes)
3,377,344 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,785 UART: [rt]cmd =0x44504543, len=24
3,433,227 >>> mbox cmd response data (40 bytes)
3,433,228 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,741 UART: [rt]cmd =0x44504543, len=24
3,488,699 >>> mbox cmd response data (40 bytes)
3,488,700 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,285 UART: [rt]cmd =0x44504543, len=24
3,544,557 >>> mbox cmd response data (40 bytes)
3,544,558 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,901 UART: [rt]cmd =0x44504543, len=24
3,600,745 >>> mbox cmd response data (40 bytes)
3,600,746 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,301 UART: [rt]cmd =0x44504543, len=24
3,656,893 >>> mbox cmd response data (40 bytes)
3,656,894 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,535 UART: [rt]cmd =0x44504543, len=24
3,712,967 >>> mbox cmd response data (40 bytes)
3,712,968 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,545 UART: [rt]cmd =0x44504543, len=24
3,769,179 >>> mbox cmd response data (40 bytes)
3,769,180 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,798,783 UART: [rt]cmd =0x44504543, len=24
3,824,589 >>> mbox cmd response data (40 bytes)
3,824,590 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,854,125 UART: [rt]cmd =0x44504543, len=24
3,880,303 >>> mbox cmd response data (40 bytes)
3,880,304 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,909,861 UART: [rt]cmd =0x44504543, len=24
3,936,529 >>> mbox cmd response data (40 bytes)
3,936,530 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,965,905 UART: [rt]cmd =0x44504543, len=24
3,973,163 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,059 UART: [kat] SHA2-256
881,990 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,105 UART: [kat] ++
886,257 UART: [kat] sha1
890,463 UART: [kat] SHA2-256
892,401 UART: [kat] SHA2-384
895,358 UART: [kat] SHA2-512-ACC
897,259 UART: [kat] ECC-384
902,672 UART: [kat] HMAC-384Kdf
907,164 UART: [kat] LMS
1,475,360 UART: [kat] --
1,476,139 UART: [cold-reset] ++
1,476,465 UART: [fht] Storing FHT @ 0x50003400
1,479,124 UART: [idev] ++
1,479,292 UART: [idev] CDI.KEYID = 6
1,479,652 UART: [idev] SUBJECT.KEYID = 7
1,480,076 UART: [idev] UDS.KEYID = 0
1,480,421 ready_for_fw is high
1,480,421 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,224 UART: [idev] Erasing UDS.KEYID = 0
1,504,834 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,512 UART: [idev] --
1,514,613 UART: [ldev] ++
1,514,781 UART: [ldev] CDI.KEYID = 6
1,515,144 UART: [ldev] SUBJECT.KEYID = 5
1,515,570 UART: [ldev] AUTHORITY.KEYID = 7
1,516,033 UART: [ldev] FE.KEYID = 1
1,520,975 UART: [ldev] Erasing FE.KEYID = 1
1,545,546 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,306 UART: [ldev] --
1,584,719 UART: [fwproc] Waiting for Commands...
1,585,370 UART: [fwproc] Received command 0x46574c44
1,586,161 UART: [fwproc] Received Image of size 114332 bytes
2,884,137 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,827 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,179 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,114 >>> mbox cmd response: success
3,077,350 UART: [afmc] ++
3,077,518 UART: [afmc] CDI.KEYID = 6
3,077,880 UART: [afmc] SUBJECT.KEYID = 7
3,078,305 UART: [afmc] AUTHORITY.KEYID = 5
3,113,174 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,688 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,468 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,196 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,081 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,771 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,538 UART: [afmc] --
3,156,642 UART: [cold-reset] --
3,157,416 UART: [state] Locking Datavault
3,158,467 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,071 UART: [state] Locking ICCM
3,159,555 UART: [exit] Launching FMC @ 0x40000130
3,164,884 UART:
3,164,900 UART: Running Caliptra FMC ...
3,165,308 UART:
3,165,362 UART: [state] CFI Enabled
3,175,765 UART: [fht] FMC Alias Private Key: 7
3,284,006 UART: [art] Extend RT PCRs Done
3,284,434 UART: [art] Lock RT PCRs Done
3,286,172 UART: [art] Populate DV Done
3,294,507 UART: [fht] FMC Alias Private Key: 7
3,295,601 UART: [art] Derive CDI
3,295,881 UART: [art] Store in in slot 0x4
3,381,010 UART: [art] Derive Key Pair
3,381,370 UART: [art] Store priv key in slot 0x5
3,394,550 UART: [art] Derive Key Pair - Done
3,409,387 UART: [art] Signing Cert with AUTHO
3,409,867 UART: RITY.KEYID = 7
3,424,781 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,546 UART: [art] PUB.X = 9CB3AF959FB6A50DAF5D38E46E1E515691B7D206333C769448A4F075462952154F6D959C6D1B40C151E27D290057CC6F
3,432,286 UART: [art] PUB.Y = 30C50678A99623881B5CF2B3E95ADD2B16680A750F6B7CDA812798C3DF22C5FEDE094884BCF9AEF62B1E722822961D1A
3,439,232 UART: [art] SIG.R = 6AD5AFECA6E1CFA90EE0DECC811454F17EC1EB693238E7856C2DC1C441700F4B8BC3270BDC1C09750FE3C6D2267C0CE8
3,446,006 UART: [art] SIG.S = 8BC78D40ED28CBF1AADB4B74CAAB90358AF31EDC8B5C2312B5A3F1337D8E3C1C4BC67D7D853CAB55D4E1DFC042A0E4C2
3,470,371 UART: Caliptra RT
3,470,624 UART: [state] CFI Enabled
3,579,029 UART: [rt] RT listening for mailbox commands...
3,579,699 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,697 UART: [rt]cmd =0x44504543, len=24
3,636,214 >>> mbox cmd response data (40 bytes)
3,636,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,666,378 UART: [rt]cmd =0x44504543, len=96
3,706,882 >>> mbox cmd response data (56 bytes)
3,706,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,784 UART: [rt]cmd =0x44504543, len=96
3,777,035 >>> mbox cmd response data (56 bytes)
3,777,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,806,823 UART: [rt]cmd =0x44504543, len=96
3,847,848 >>> mbox cmd response data (56 bytes)
3,847,849 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,877,532 UART: [rt]cmd =0x44504543, len=96
3,918,815 >>> mbox cmd response data (56 bytes)
3,918,816 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,753 UART: [rt]cmd =0x44504543, len=96
3,989,770 >>> mbox cmd response data (56 bytes)
3,989,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,019,670 UART: [rt]cmd =0x44504543, len=96
4,061,453 >>> mbox cmd response data (56 bytes)
4,061,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,091,421 UART: [rt]cmd =0x44504543, len=96
4,132,910 >>> mbox cmd response data (56 bytes)
4,132,911 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,163,002 UART: [rt]cmd =0x44504543, len=96
4,205,837 >>> mbox cmd response data (56 bytes)
4,205,838 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,236,035 UART: [rt]cmd =0x44504543, len=96
4,278,294 >>> mbox cmd response data (56 bytes)
4,278,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,308,060 UART: [rt]cmd =0x44504543, len=96
4,350,609 >>> mbox cmd response data (56 bytes)
4,350,610 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,380,835 UART: [rt]cmd =0x44504543, len=96
4,424,210 >>> mbox cmd response data (56 bytes)
4,424,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,454,144 UART: [rt]cmd =0x44504543, len=96
4,497,659 >>> mbox cmd response data (56 bytes)
4,497,660 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,527,699 UART: [rt]cmd =0x44504543, len=96
4,571,490 >>> mbox cmd response data (56 bytes)
4,571,491 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,601,482 UART: [rt]cmd =0x44504543, len=96
4,644,795 >>> mbox cmd response data (56 bytes)
4,644,796 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,674,887 UART: [rt]cmd =0x44504543, len=96
4,682,387 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,375 ready_for_fw is high
1,362,375 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,406 >>> mbox cmd response: success
2,986,662 UART:
2,986,678 UART: Running Caliptra FMC ...
2,987,086 UART:
2,987,140 UART: [state] CFI Enabled
2,997,627 UART: [fht] FMC Alias Private Key: 7
3,105,974 UART: [art] Extend RT PCRs Done
3,106,402 UART: [art] Lock RT PCRs Done
3,108,374 UART: [art] Populate DV Done
3,116,859 UART: [fht] FMC Alias Private Key: 7
3,117,821 UART: [art] Derive CDI
3,118,101 UART: [art] Store in in slot 0x4
3,203,624 UART: [art] Derive Key Pair
3,203,984 UART: [art] Store priv key in slot 0x5
3,217,202 UART: [art] Derive Key Pair - Done
3,232,274 UART: [art] Signing Cert with AUTHO
3,232,754 UART: RITY.KEYID = 7
3,247,692 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,457 UART: [art] PUB.X = 4982249E0D542B5444C651935059837EB74ADEAB17AE47B47FAE55D527CE4AE0C33D88175353BA17A65EE0A0AE096D5A
3,255,227 UART: [art] PUB.Y = 5A6BD5B04690E88D2B9DA893640ACB89270495DC71DD1AB7A46EFCE8EB79AEF9ADB625D3C120BC6C9B71AB4B02E9549B
3,262,190 UART: [art] SIG.R = 2D2859F21C56470C9F8CDEC8A315542C5842201E2D1A80C97F0EBCA73AB32BBEB136954EA2BF2FB91C4B7BF266BFBC10
3,268,972 UART: [art] SIG.S = 9F9FF8C6B43A00EEB20346A85118E18E35DB5A60BD8A363957FF17FABBAACF0329B53DDBEE5B0AF604A4C0D9A52BB9D6
3,293,291 UART: Caliptra RT
3,293,544 UART: [state] CFI Enabled
3,402,501 UART: [rt] RT listening for mailbox commands...
3,403,171 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,227 UART: [rt]cmd =0x44504543, len=24
3,459,344 >>> mbox cmd response data (40 bytes)
3,459,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,489,478 UART: [rt]cmd =0x44504543, len=96
3,529,726 >>> mbox cmd response data (56 bytes)
3,529,727 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,694 UART: [rt]cmd =0x44504543, len=96
3,600,657 >>> mbox cmd response data (56 bytes)
3,600,658 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,691 UART: [rt]cmd =0x44504543, len=96
3,671,480 >>> mbox cmd response data (56 bytes)
3,671,481 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,506 UART: [rt]cmd =0x44504543, len=96
3,742,751 >>> mbox cmd response data (56 bytes)
3,742,752 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,709 UART: [rt]cmd =0x44504543, len=96
3,814,112 >>> mbox cmd response data (56 bytes)
3,814,113 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,844,218 UART: [rt]cmd =0x44504543, len=96
3,885,735 >>> mbox cmd response data (56 bytes)
3,885,736 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,673 UART: [rt]cmd =0x44504543, len=96
3,956,998 >>> mbox cmd response data (56 bytes)
3,956,999 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,987,184 UART: [rt]cmd =0x44504543, len=96
4,029,047 >>> mbox cmd response data (56 bytes)
4,029,048 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,058,931 UART: [rt]cmd =0x44504543, len=96
4,101,266 >>> mbox cmd response data (56 bytes)
4,101,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,131,200 UART: [rt]cmd =0x44504543, len=96
4,173,371 >>> mbox cmd response data (56 bytes)
4,173,372 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,203,463 UART: [rt]cmd =0x44504543, len=96
4,246,772 >>> mbox cmd response data (56 bytes)
4,246,773 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,276,884 UART: [rt]cmd =0x44504543, len=96
4,320,243 >>> mbox cmd response data (56 bytes)
4,320,244 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,350,293 UART: [rt]cmd =0x44504543, len=96
4,393,688 >>> mbox cmd response data (56 bytes)
4,393,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,423,514 UART: [rt]cmd =0x44504543, len=96
4,466,877 >>> mbox cmd response data (56 bytes)
4,466,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,496,719 UART: [rt]cmd =0x44504543, len=96
4,503,947 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,268 UART: [kat] SHA2-256
882,199 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,314 UART: [kat] ++
886,466 UART: [kat] sha1
890,620 UART: [kat] SHA2-256
892,558 UART: [kat] SHA2-384
895,087 UART: [kat] SHA2-512-ACC
896,988 UART: [kat] ECC-384
902,681 UART: [kat] HMAC-384Kdf
907,271 UART: [kat] LMS
1,475,467 UART: [kat] --
1,476,270 UART: [cold-reset] ++
1,476,802 UART: [fht] Storing FHT @ 0x50003400
1,479,549 UART: [idev] ++
1,479,717 UART: [idev] CDI.KEYID = 6
1,480,077 UART: [idev] SUBJECT.KEYID = 7
1,480,501 UART: [idev] UDS.KEYID = 0
1,480,846 ready_for_fw is high
1,480,846 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,627 UART: [idev] Erasing UDS.KEYID = 0
1,505,735 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,471 UART: [idev] --
1,515,474 UART: [ldev] ++
1,515,642 UART: [ldev] CDI.KEYID = 6
1,516,005 UART: [ldev] SUBJECT.KEYID = 5
1,516,431 UART: [ldev] AUTHORITY.KEYID = 7
1,516,894 UART: [ldev] FE.KEYID = 1
1,522,090 UART: [ldev] Erasing FE.KEYID = 1
1,547,647 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,703 UART: [ldev] --
1,587,022 UART: [fwproc] Waiting for Commands...
1,587,647 UART: [fwproc] Received command 0x46574c44
1,588,438 UART: [fwproc] Received Image of size 114332 bytes
2,885,682 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,996 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,348 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,289 >>> mbox cmd response: success
3,079,501 UART: [afmc] ++
3,079,669 UART: [afmc] CDI.KEYID = 6
3,080,031 UART: [afmc] SUBJECT.KEYID = 7
3,080,456 UART: [afmc] AUTHORITY.KEYID = 5
3,115,769 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,135 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,915 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,643 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,528 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,218 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,095 UART: [afmc] --
3,159,185 UART: [cold-reset] --
3,160,237 UART: [state] Locking Datavault
3,161,392 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,996 UART: [state] Locking ICCM
3,162,642 UART: [exit] Launching FMC @ 0x40000130
3,167,971 UART:
3,167,987 UART: Running Caliptra FMC ...
3,168,395 UART:
3,168,538 UART: [state] CFI Enabled
3,179,553 UART: [fht] FMC Alias Private Key: 7
3,286,702 UART: [art] Extend RT PCRs Done
3,287,130 UART: [art] Lock RT PCRs Done
3,288,772 UART: [art] Populate DV Done
3,296,847 UART: [fht] FMC Alias Private Key: 7
3,297,791 UART: [art] Derive CDI
3,298,071 UART: [art] Store in in slot 0x4
3,384,162 UART: [art] Derive Key Pair
3,384,522 UART: [art] Store priv key in slot 0x5
3,398,200 UART: [art] Derive Key Pair - Done
3,412,954 UART: [art] Signing Cert with AUTHO
3,413,434 UART: RITY.KEYID = 7
3,428,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,371 UART: [art] PUB.X = F56501EB936335303EEC1BCB896E1877B4A7D96C2FA849AF143F06EDE6EA0663602C2C2FAEC124F4F5C4E808EBD07DD4
3,436,145 UART: [art] PUB.Y = 37E6B8B392DCAE4F453D23EE26B3919219AF7FD31E8F78CAC4A74820FC0BCD983341522FA6D40D26C1AA7299A1ADD50F
3,443,102 UART: [art] SIG.R = D70043787E650A865F0569710492202A61404E075EC39163BB28B80F7989D28F3537633C3AA3B9EE4320D1F38E31B107
3,449,818 UART: [art] SIG.S = 7309771D03F254B19936B0509463064DBD21A83CAFD7A0CCC863A7B1F3B954FE78CDD84615ADDCD4AEB9EBE7D604EC11
3,473,739 UART: Caliptra RT
3,474,084 UART: [state] CFI Enabled
3,581,759 UART: [rt] RT listening for mailbox commands...
3,582,429 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,509 UART: [rt]cmd =0x44504543, len=24
3,638,408 >>> mbox cmd response data (40 bytes)
3,638,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,668,364 UART: [rt]cmd =0x44504543, len=96
3,708,744 >>> mbox cmd response data (56 bytes)
3,708,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,614 UART: [rt]cmd =0x44504543, len=96
3,779,679 >>> mbox cmd response data (56 bytes)
3,779,680 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,555 UART: [rt]cmd =0x44504543, len=96
3,850,542 >>> mbox cmd response data (56 bytes)
3,850,543 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,616 UART: [rt]cmd =0x44504543, len=96
3,921,913 >>> mbox cmd response data (56 bytes)
3,921,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,951,993 UART: [rt]cmd =0x44504543, len=96
3,993,972 >>> mbox cmd response data (56 bytes)
3,993,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,024,012 UART: [rt]cmd =0x44504543, len=96
4,066,349 >>> mbox cmd response data (56 bytes)
4,066,350 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,096,469 UART: [rt]cmd =0x44504543, len=96
4,137,810 >>> mbox cmd response data (56 bytes)
4,137,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,167,548 UART: [rt]cmd =0x44504543, len=96
4,210,061 >>> mbox cmd response data (56 bytes)
4,210,062 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,240,173 UART: [rt]cmd =0x44504543, len=96
4,282,828 >>> mbox cmd response data (56 bytes)
4,282,829 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,313,002 UART: [rt]cmd =0x44504543, len=96
4,356,267 >>> mbox cmd response data (56 bytes)
4,356,268 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,386,085 UART: [rt]cmd =0x44504543, len=96
4,429,146 >>> mbox cmd response data (56 bytes)
4,429,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,459,064 UART: [rt]cmd =0x44504543, len=96
4,502,247 >>> mbox cmd response data (56 bytes)
4,502,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,532,207 UART: [rt]cmd =0x44504543, len=96
4,575,982 >>> mbox cmd response data (56 bytes)
4,575,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,605,994 UART: [rt]cmd =0x44504543, len=96
4,650,587 >>> mbox cmd response data (56 bytes)
4,650,588 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,680,645 UART: [rt]cmd =0x44504543, len=96
4,688,175 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,274 ready_for_fw is high
1,363,274 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,117 >>> mbox cmd response: success
2,988,893 UART:
2,988,909 UART: Running Caliptra FMC ...
2,989,317 UART:
2,989,460 UART: [state] CFI Enabled
3,000,261 UART: [fht] FMC Alias Private Key: 7
3,107,682 UART: [art] Extend RT PCRs Done
3,108,110 UART: [art] Lock RT PCRs Done
3,109,764 UART: [art] Populate DV Done
3,118,067 UART: [fht] FMC Alias Private Key: 7
3,119,211 UART: [art] Derive CDI
3,119,491 UART: [art] Store in in slot 0x4
3,205,258 UART: [art] Derive Key Pair
3,205,618 UART: [art] Store priv key in slot 0x5
3,218,668 UART: [art] Derive Key Pair - Done
3,233,711 UART: [art] Signing Cert with AUTHO
3,234,191 UART: RITY.KEYID = 7
3,249,015 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,780 UART: [art] PUB.X = 7B2C30DE4801AC18059884CE687FF87EC54E38E2F15662F49249A39B08CB97DD6468774D69DB6696CA561D403A575BCC
3,256,543 UART: [art] PUB.Y = 59EA42E93F7894BB7D6A03C092BD76E6E526F5DB103A57556082B14FAF9C6A0CBDCC33CB7EC5A2278BF2483F41DAC157
3,263,503 UART: [art] SIG.R = 237122319915867E6AB2F58D531003973130A05195F1BB52E4F64909C7B9854B7F13A5CBF794217076AD34AC001B9A4A
3,270,235 UART: [art] SIG.S = 2FA963C261051EF61F3DC6E993F36625F36032F5BBD668C5EA696C31DD9AF41D7348F9DF1F8BC246659EDCCD1595EBC5
3,293,579 UART: Caliptra RT
3,293,924 UART: [state] CFI Enabled
3,401,964 UART: [rt] RT listening for mailbox commands...
3,402,634 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,514 UART: [rt]cmd =0x44504543, len=24
3,458,483 >>> mbox cmd response data (40 bytes)
3,458,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,488,599 UART: [rt]cmd =0x44504543, len=96
3,529,257 >>> mbox cmd response data (56 bytes)
3,529,258 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,297 UART: [rt]cmd =0x44504543, len=96
3,600,418 >>> mbox cmd response data (56 bytes)
3,600,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,408 UART: [rt]cmd =0x44504543, len=96
3,670,371 >>> mbox cmd response data (56 bytes)
3,670,372 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,557 UART: [rt]cmd =0x44504543, len=96
3,740,986 >>> mbox cmd response data (56 bytes)
3,740,987 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,960 UART: [rt]cmd =0x44504543, len=96
3,812,423 >>> mbox cmd response data (56 bytes)
3,812,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,441 UART: [rt]cmd =0x44504543, len=96
3,884,618 >>> mbox cmd response data (56 bytes)
3,884,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,620 UART: [rt]cmd =0x44504543, len=96
3,955,761 >>> mbox cmd response data (56 bytes)
3,955,762 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,985,711 UART: [rt]cmd =0x44504543, len=96
4,028,328 >>> mbox cmd response data (56 bytes)
4,028,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,058,308 UART: [rt]cmd =0x44504543, len=96
4,100,167 >>> mbox cmd response data (56 bytes)
4,100,168 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,130,149 UART: [rt]cmd =0x44504543, len=96
4,173,608 >>> mbox cmd response data (56 bytes)
4,173,609 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,203,512 UART: [rt]cmd =0x44504543, len=96
4,247,275 >>> mbox cmd response data (56 bytes)
4,247,276 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,277,199 UART: [rt]cmd =0x44504543, len=96
4,320,276 >>> mbox cmd response data (56 bytes)
4,320,277 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,350,450 UART: [rt]cmd =0x44504543, len=96
4,394,107 >>> mbox cmd response data (56 bytes)
4,394,108 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,423,937 UART: [rt]cmd =0x44504543, len=96
4,468,254 >>> mbox cmd response data (56 bytes)
4,468,255 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,497,966 UART: [rt]cmd =0x44504543, len=96
4,505,226 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,808 UART: [state] LifecycleState = Unprovisioned
85,463 UART: [state] DebugLocked = No
86,095 UART: [state] WD Timer not started. Device not locked for debugging
87,392 UART: [kat] SHA2-256
893,042 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,167 UART: [kat] ++
897,319 UART: [kat] sha1
901,493 UART: [kat] SHA2-256
903,433 UART: [kat] SHA2-384
906,282 UART: [kat] SHA2-512-ACC
908,183 UART: [kat] ECC-384
917,828 UART: [kat] HMAC-384Kdf
922,354 UART: [kat] LMS
1,170,682 UART: [kat] --
1,171,615 UART: [cold-reset] ++
1,172,049 UART: [fht] FHT @ 0x50003400
1,174,634 UART: [idev] ++
1,174,802 UART: [idev] CDI.KEYID = 6
1,175,162 UART: [idev] SUBJECT.KEYID = 7
1,175,586 UART: [idev] UDS.KEYID = 0
1,175,931 ready_for_fw is high
1,175,931 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,750 UART: [idev] Erasing UDS.KEYID = 0
1,200,547 UART: [idev] Sha1 KeyId Algorithm
1,209,091 UART: [idev] --
1,210,071 UART: [ldev] ++
1,210,239 UART: [ldev] CDI.KEYID = 6
1,210,602 UART: [ldev] SUBJECT.KEYID = 5
1,211,028 UART: [ldev] AUTHORITY.KEYID = 7
1,211,491 UART: [ldev] FE.KEYID = 1
1,216,635 UART: [ldev] Erasing FE.KEYID = 1
1,243,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,857 UART: [ldev] --
1,282,254 UART: [fwproc] Wait for Commands...
1,282,824 UART: [fwproc] Recv command 0x46574c44
1,283,552 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,252 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,556 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,355 >>> mbox cmd response: success
2,775,603 UART: [afmc] ++
2,775,771 UART: [afmc] CDI.KEYID = 6
2,776,133 UART: [afmc] SUBJECT.KEYID = 7
2,776,558 UART: [afmc] AUTHORITY.KEYID = 5
2,812,307 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,132 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,860 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,745 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,464 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,204 UART: [afmc] --
2,855,146 UART: [cold-reset] --
2,856,098 UART: [state] Locking Datavault
2,857,213 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,817 UART: [state] Locking ICCM
2,858,449 UART: [exit] Launching FMC @ 0x40000130
2,863,778 UART:
2,863,794 UART: Running Caliptra FMC ...
2,864,202 UART:
2,864,256 UART: [state] CFI Enabled
2,874,987 UART: [fht] FMC Alias Private Key: 7
2,982,830 UART: [art] Extend RT PCRs Done
2,983,258 UART: [art] Lock RT PCRs Done
2,984,858 UART: [art] Populate DV Done
2,993,069 UART: [fht] FMC Alias Private Key: 7
2,994,231 UART: [art] Derive CDI
2,994,511 UART: [art] Store in in slot 0x4
3,080,050 UART: [art] Derive Key Pair
3,080,410 UART: [art] Store priv key in slot 0x5
3,093,386 UART: [art] Derive Key Pair - Done
3,108,055 UART: [art] Signing Cert with AUTHO
3,108,535 UART: RITY.KEYID = 7
3,123,307 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,072 UART: [art] PUB.X = E69967A41473758071BC0BDFEB8220B3CA78CAB1F728CFBB7CEC43531238A28D57C489D12C2A4981B04FBB56E1D6759C
3,130,849 UART: [art] PUB.Y = 09F3460EBC216BD5E55CDEB73255775BBE9AEF209110D88A1E914534F67705FF4F05CC1C0E62875B6804043EC3692AC6
3,137,782 UART: [art] SIG.R = A264CAEE7FFD55DB982FB58A80890AAE087FD01274E27526A14AD5A8AE6429DE574A9542F43A3D36296417513FA264BB
3,144,554 UART: [art] SIG.S = 3A6C3AAD2CCBABBD678DB0529658F451CA13F375370FBEA3F0815FE12F82BDB5184115878FB9D9B8F079B8BA628C0F3A
3,168,423 UART: Caliptra RT
3,168,676 UART: [state] CFI Enabled
3,275,599 UART: [rt] RT listening for mailbox commands...
3,276,269 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,275 UART: [rt]cmd =0x44504543, len=24
3,332,720 >>> mbox cmd response data (40 bytes)
3,332,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,666 UART: [rt]cmd =0x44504543, len=96
3,402,300 >>> mbox cmd response data (56 bytes)
3,402,301 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,304 UART: [rt]cmd =0x44504543, len=96
3,472,869 >>> mbox cmd response data (56 bytes)
3,472,870 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,845 UART: [rt]cmd =0x44504543, len=96
3,543,476 >>> mbox cmd response data (56 bytes)
3,543,477 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,586 UART: [rt]cmd =0x44504543, len=96
3,614,553 >>> mbox cmd response data (56 bytes)
3,614,554 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,475 UART: [rt]cmd =0x44504543, len=96
3,686,074 >>> mbox cmd response data (56 bytes)
3,686,075 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,984 UART: [rt]cmd =0x44504543, len=96
3,757,487 >>> mbox cmd response data (56 bytes)
3,757,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,607 UART: [rt]cmd =0x44504543, len=96
3,829,352 >>> mbox cmd response data (56 bytes)
3,829,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,859,246 UART: [rt]cmd =0x44504543, len=96
3,900,853 >>> mbox cmd response data (56 bytes)
3,900,854 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,930,693 UART: [rt]cmd =0x44504543, len=96
3,973,874 >>> mbox cmd response data (56 bytes)
3,973,875 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,003,906 UART: [rt]cmd =0x44504543, len=96
4,046,469 >>> mbox cmd response data (56 bytes)
4,046,470 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,076,255 UART: [rt]cmd =0x44504543, len=96
4,119,156 >>> mbox cmd response data (56 bytes)
4,119,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,149,036 UART: [rt]cmd =0x44504543, len=96
4,192,391 >>> mbox cmd response data (56 bytes)
4,192,392 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,222,411 UART: [rt]cmd =0x44504543, len=96
4,265,842 >>> mbox cmd response data (56 bytes)
4,265,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,295,756 UART: [rt]cmd =0x44504543, len=96
4,339,293 >>> mbox cmd response data (56 bytes)
4,339,294 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,369,303 UART: [rt]cmd =0x44504543, len=96
4,376,599 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,147 ready_for_fw is high
1,060,147 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,256 >>> mbox cmd response: success
2,686,572 UART:
2,686,588 UART: Running Caliptra FMC ...
2,686,996 UART:
2,687,050 UART: [state] CFI Enabled
2,697,755 UART: [fht] FMC Alias Private Key: 7
2,805,784 UART: [art] Extend RT PCRs Done
2,806,212 UART: [art] Lock RT PCRs Done
2,807,518 UART: [art] Populate DV Done
2,815,665 UART: [fht] FMC Alias Private Key: 7
2,816,657 UART: [art] Derive CDI
2,816,937 UART: [art] Store in in slot 0x4
2,902,752 UART: [art] Derive Key Pair
2,903,112 UART: [art] Store priv key in slot 0x5
2,916,964 UART: [art] Derive Key Pair - Done
2,932,047 UART: [art] Signing Cert with AUTHO
2,932,527 UART: RITY.KEYID = 7
2,947,537 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,302 UART: [art] PUB.X = BC52CFD02A8971B5E9EF0E2C71E2B56903044DDED5C45F138BB8D91F076F84D951E45B4D7176BA005755BA9FA7409EF6
2,955,050 UART: [art] PUB.Y = C4B9E83F60D7F2DAD8B7DB7C1C37B4D6869C14B07AB25916EEBC91B8E249E254BFAACDA3A19E830566AC02530494E4E9
2,962,009 UART: [art] SIG.R = 8E4F60A4145AC9D3E0A2C00C39EAC023BD4E1494A34EA6139A7402E8EDCE9FC14CD73E6AD3EAD0506044A47DA2D18A39
2,968,791 UART: [art] SIG.S = 7F946839D6ED673F34E02F95078F6F9416DAE7AF721BCF62922591816AF59D07C31DE5AC5BD9B0D55D62E1B0EE700245
2,993,233 UART: Caliptra RT
2,993,486 UART: [state] CFI Enabled
3,101,039 UART: [rt] RT listening for mailbox commands...
3,101,709 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,717 UART: [rt]cmd =0x44504543, len=24
3,158,538 >>> mbox cmd response data (40 bytes)
3,158,539 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,374 UART: [rt]cmd =0x44504543, len=96
3,228,568 >>> mbox cmd response data (56 bytes)
3,228,569 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,258,560 UART: [rt]cmd =0x44504543, len=96
3,298,783 >>> mbox cmd response data (56 bytes)
3,298,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,917 UART: [rt]cmd =0x44504543, len=96
3,369,616 >>> mbox cmd response data (56 bytes)
3,369,617 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,652 UART: [rt]cmd =0x44504543, len=96
3,440,377 >>> mbox cmd response data (56 bytes)
3,440,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,470,021 UART: [rt]cmd =0x44504543, len=96
3,511,394 >>> mbox cmd response data (56 bytes)
3,511,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,541,318 UART: [rt]cmd =0x44504543, len=96
3,583,055 >>> mbox cmd response data (56 bytes)
3,583,056 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,901 UART: [rt]cmd =0x44504543, len=96
3,654,572 >>> mbox cmd response data (56 bytes)
3,654,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,684,574 UART: [rt]cmd =0x44504543, len=96
3,726,601 >>> mbox cmd response data (56 bytes)
3,726,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,625 UART: [rt]cmd =0x44504543, len=96
3,799,788 >>> mbox cmd response data (56 bytes)
3,799,789 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,829,808 UART: [rt]cmd =0x44504543, len=96
3,872,597 >>> mbox cmd response data (56 bytes)
3,872,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,902,615 UART: [rt]cmd =0x44504543, len=96
3,945,660 >>> mbox cmd response data (56 bytes)
3,945,661 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,868 UART: [rt]cmd =0x44504543, len=96
4,018,727 >>> mbox cmd response data (56 bytes)
4,018,728 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,048,479 UART: [rt]cmd =0x44504543, len=96
4,091,524 >>> mbox cmd response data (56 bytes)
4,091,525 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,121,660 UART: [rt]cmd =0x44504543, len=96
4,166,177 >>> mbox cmd response data (56 bytes)
4,166,178 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,196,013 UART: [rt]cmd =0x44504543, len=96
4,203,271 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
893,517 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,642 UART: [kat] ++
897,794 UART: [kat] sha1
902,166 UART: [kat] SHA2-256
904,106 UART: [kat] SHA2-384
907,079 UART: [kat] SHA2-512-ACC
908,980 UART: [kat] ECC-384
918,485 UART: [kat] HMAC-384Kdf
923,307 UART: [kat] LMS
1,171,635 UART: [kat] --
1,172,698 UART: [cold-reset] ++
1,173,028 UART: [fht] FHT @ 0x50003400
1,175,727 UART: [idev] ++
1,175,895 UART: [idev] CDI.KEYID = 6
1,176,255 UART: [idev] SUBJECT.KEYID = 7
1,176,679 UART: [idev] UDS.KEYID = 0
1,177,024 ready_for_fw is high
1,177,024 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,773 UART: [idev] Erasing UDS.KEYID = 0
1,201,402 UART: [idev] Sha1 KeyId Algorithm
1,209,760 UART: [idev] --
1,210,832 UART: [ldev] ++
1,211,000 UART: [ldev] CDI.KEYID = 6
1,211,363 UART: [ldev] SUBJECT.KEYID = 5
1,211,789 UART: [ldev] AUTHORITY.KEYID = 7
1,212,252 UART: [ldev] FE.KEYID = 1
1,217,490 UART: [ldev] Erasing FE.KEYID = 1
1,244,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,284 UART: [ldev] --
1,283,795 UART: [fwproc] Wait for Commands...
1,284,543 UART: [fwproc] Recv command 0x46574c44
1,285,271 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,721 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,025 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,952 >>> mbox cmd response: success
2,777,030 UART: [afmc] ++
2,777,198 UART: [afmc] CDI.KEYID = 6
2,777,560 UART: [afmc] SUBJECT.KEYID = 7
2,777,985 UART: [afmc] AUTHORITY.KEYID = 5
2,813,356 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,789 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,537 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,265 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,150 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,869 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,909 UART: [afmc] --
2,856,871 UART: [cold-reset] --
2,857,771 UART: [state] Locking Datavault
2,858,956 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,560 UART: [state] Locking ICCM
2,860,058 UART: [exit] Launching FMC @ 0x40000130
2,865,387 UART:
2,865,403 UART: Running Caliptra FMC ...
2,865,811 UART:
2,865,954 UART: [state] CFI Enabled
2,876,943 UART: [fht] FMC Alias Private Key: 7
2,984,518 UART: [art] Extend RT PCRs Done
2,984,946 UART: [art] Lock RT PCRs Done
2,986,518 UART: [art] Populate DV Done
2,994,655 UART: [fht] FMC Alias Private Key: 7
2,995,755 UART: [art] Derive CDI
2,996,035 UART: [art] Store in in slot 0x4
3,081,570 UART: [art] Derive Key Pair
3,081,930 UART: [art] Store priv key in slot 0x5
3,095,652 UART: [art] Derive Key Pair - Done
3,110,385 UART: [art] Signing Cert with AUTHO
3,110,865 UART: RITY.KEYID = 7
3,125,709 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,474 UART: [art] PUB.X = D49D5FE693B9781188B02F15D05963548A7EDBEB750AA5A699A2E1B936B5A3959DDBC1490AF85DD6316A27C3D375DD83
3,133,246 UART: [art] PUB.Y = 5F77C5E88FDD73C798F57933E2CC71BCBA2D13FCC38953DEA123F2F75AD28C2C464ADB568DE55F1652CAE17A71293062
3,140,210 UART: [art] SIG.R = 9E49C5FE07A144A70882DB2A7A25C94A4980CD2A99C64EEC62AAD054A131CDA94887C52C9A0E9EDC029251A1D9AE73DC
3,146,984 UART: [art] SIG.S = 4F56D67D7C7834B22E56E316A9FEC441C7F1A8EB95C276A9395F8178F4FE6FB317EA039F59E8530D840FFE3B7DDF2ED6
3,171,296 UART: Caliptra RT
3,171,641 UART: [state] CFI Enabled
3,279,104 UART: [rt] RT listening for mailbox commands...
3,279,774 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,728 UART: [rt]cmd =0x44504543, len=24
3,335,623 >>> mbox cmd response data (40 bytes)
3,335,624 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,685 UART: [rt]cmd =0x44504543, len=96
3,405,311 >>> mbox cmd response data (56 bytes)
3,405,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,149 UART: [rt]cmd =0x44504543, len=96
3,475,294 >>> mbox cmd response data (56 bytes)
3,475,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,378 UART: [rt]cmd =0x44504543, len=96
3,546,651 >>> mbox cmd response data (56 bytes)
3,546,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,523 UART: [rt]cmd =0x44504543, len=96
3,618,056 >>> mbox cmd response data (56 bytes)
3,618,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,762 UART: [rt]cmd =0x44504543, len=96
3,689,009 >>> mbox cmd response data (56 bytes)
3,689,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,718,831 UART: [rt]cmd =0x44504543, len=96
3,760,758 >>> mbox cmd response data (56 bytes)
3,760,759 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,948 UART: [rt]cmd =0x44504543, len=96
3,833,201 >>> mbox cmd response data (56 bytes)
3,833,202 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,135 UART: [rt]cmd =0x44504543, len=96
3,905,240 >>> mbox cmd response data (56 bytes)
3,905,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,112 UART: [rt]cmd =0x44504543, len=96
3,977,869 >>> mbox cmd response data (56 bytes)
3,977,870 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,007,837 UART: [rt]cmd =0x44504543, len=96
4,049,444 >>> mbox cmd response data (56 bytes)
4,049,445 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,079,534 UART: [rt]cmd =0x44504543, len=96
4,122,443 >>> mbox cmd response data (56 bytes)
4,122,444 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,152,173 UART: [rt]cmd =0x44504543, len=96
4,195,590 >>> mbox cmd response data (56 bytes)
4,195,591 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,225,648 UART: [rt]cmd =0x44504543, len=96
4,269,459 >>> mbox cmd response data (56 bytes)
4,269,460 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,299,441 UART: [rt]cmd =0x44504543, len=96
4,344,022 >>> mbox cmd response data (56 bytes)
4,344,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,374,170 UART: [rt]cmd =0x44504543, len=96
4,381,374 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,064 ready_for_fw is high
1,061,064 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,805 >>> mbox cmd response: success
2,689,967 UART:
2,689,983 UART: Running Caliptra FMC ...
2,690,391 UART:
2,690,534 UART: [state] CFI Enabled
2,700,953 UART: [fht] FMC Alias Private Key: 7
2,808,536 UART: [art] Extend RT PCRs Done
2,808,964 UART: [art] Lock RT PCRs Done
2,810,862 UART: [art] Populate DV Done
2,819,075 UART: [fht] FMC Alias Private Key: 7
2,820,155 UART: [art] Derive CDI
2,820,435 UART: [art] Store in in slot 0x4
2,906,028 UART: [art] Derive Key Pair
2,906,388 UART: [art] Store priv key in slot 0x5
2,919,894 UART: [art] Derive Key Pair - Done
2,934,696 UART: [art] Signing Cert with AUTHO
2,935,176 UART: RITY.KEYID = 7
2,950,490 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,255 UART: [art] PUB.X = D9BDDF679CA87FC5634BA4DA8A01C880A3B820C228B144BB0ABB2EA049877B3061E693B371E50C8E984C631B7A38A0AC
2,958,030 UART: [art] PUB.Y = 5568C6A01C0A774E5F37E8109C5E265184BFC9C81B79989722EEDC9AB201EC0A12A504815B6C870650F04D47EA0FE594
2,964,964 UART: [art] SIG.R = CC113E0FB76F9899C620D9C05312095C49A0353BB4BDD425BAA7FBD6424843792F9B4D2FC4B7FB959D0DE1A64026D517
2,971,733 UART: [art] SIG.S = E983D933FA794316F319B129BF6B4C219FC6126BDC89CE8714A82A725E3B965460CE0CF009A4272F221A59A21F83A4FD
2,995,086 UART: Caliptra RT
2,995,431 UART: [state] CFI Enabled
3,104,165 UART: [rt] RT listening for mailbox commands...
3,104,835 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,843 UART: [rt]cmd =0x44504543, len=24
3,161,282 >>> mbox cmd response data (40 bytes)
3,161,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,136 UART: [rt]cmd =0x44504543, len=96
3,230,754 >>> mbox cmd response data (56 bytes)
3,230,755 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,260,388 UART: [rt]cmd =0x44504543, len=96
3,301,185 >>> mbox cmd response data (56 bytes)
3,301,186 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,989 UART: [rt]cmd =0x44504543, len=96
3,372,270 >>> mbox cmd response data (56 bytes)
3,372,271 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,140 UART: [rt]cmd =0x44504543, len=96
3,442,879 >>> mbox cmd response data (56 bytes)
3,442,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,472,969 UART: [rt]cmd =0x44504543, len=96
3,513,904 >>> mbox cmd response data (56 bytes)
3,513,905 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,544,030 UART: [rt]cmd =0x44504543, len=96
3,586,069 >>> mbox cmd response data (56 bytes)
3,586,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,879 UART: [rt]cmd =0x44504543, len=96
3,657,642 >>> mbox cmd response data (56 bytes)
3,657,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,687,524 UART: [rt]cmd =0x44504543, len=96
3,729,541 >>> mbox cmd response data (56 bytes)
3,729,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,447 UART: [rt]cmd =0x44504543, len=96
3,802,236 >>> mbox cmd response data (56 bytes)
3,802,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,832,220 UART: [rt]cmd =0x44504543, len=96
3,875,193 >>> mbox cmd response data (56 bytes)
3,875,194 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,904,973 UART: [rt]cmd =0x44504543, len=96
3,948,236 >>> mbox cmd response data (56 bytes)
3,948,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,978,050 UART: [rt]cmd =0x44504543, len=96
4,021,561 >>> mbox cmd response data (56 bytes)
4,021,562 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,051,655 UART: [rt]cmd =0x44504543, len=96
4,096,128 >>> mbox cmd response data (56 bytes)
4,096,129 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,125,932 UART: [rt]cmd =0x44504543, len=96
4,170,591 >>> mbox cmd response data (56 bytes)
4,170,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,200,661 UART: [rt]cmd =0x44504543, len=96
4,207,651 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,287 UART: [kat] ++
895,439 UART: [kat] sha1
899,645 UART: [kat] SHA2-256
901,585 UART: [kat] SHA2-384
904,394 UART: [kat] SHA2-512-ACC
906,295 UART: [kat] ECC-384
916,222 UART: [kat] HMAC-384Kdf
921,012 UART: [kat] LMS
1,169,324 UART: [kat] --
1,170,299 UART: [cold-reset] ++
1,170,767 UART: [fht] FHT @ 0x50003400
1,173,317 UART: [idev] ++
1,173,485 UART: [idev] CDI.KEYID = 6
1,173,846 UART: [idev] SUBJECT.KEYID = 7
1,174,271 UART: [idev] UDS.KEYID = 0
1,174,617 ready_for_fw is high
1,174,617 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,269 UART: [idev] Erasing UDS.KEYID = 0
1,199,243 UART: [idev] Sha1 KeyId Algorithm
1,208,111 UART: [idev] --
1,209,048 UART: [ldev] ++
1,209,216 UART: [ldev] CDI.KEYID = 6
1,209,580 UART: [ldev] SUBJECT.KEYID = 5
1,210,007 UART: [ldev] AUTHORITY.KEYID = 7
1,210,470 UART: [ldev] FE.KEYID = 1
1,215,696 UART: [ldev] Erasing FE.KEYID = 1
1,242,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,552 UART: [ldev] --
1,282,050 UART: [fwproc] Wait for Commands...
1,282,737 UART: [fwproc] Recv command 0x46574c44
1,283,470 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,214 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,090 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,399 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,319 >>> mbox cmd response: success
2,773,488 UART: [afmc] ++
2,773,656 UART: [afmc] CDI.KEYID = 6
2,774,019 UART: [afmc] SUBJECT.KEYID = 7
2,774,445 UART: [afmc] AUTHORITY.KEYID = 5
2,810,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,768 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,519 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,248 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,131 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,850 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,773 UART: [afmc] --
2,853,825 UART: [cold-reset] --
2,854,591 UART: [state] Locking Datavault
2,855,754 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,358 UART: [state] Locking ICCM
2,856,992 UART: [exit] Launching FMC @ 0x40000130
2,862,321 UART:
2,862,337 UART: Running Caliptra FMC ...
2,862,745 UART:
2,862,799 UART: [state] CFI Enabled
2,873,620 UART: [fht] FMC Alias Private Key: 7
2,981,873 UART: [art] Extend RT PCRs Done
2,982,301 UART: [art] Lock RT PCRs Done
2,983,823 UART: [art] Populate DV Done
2,992,050 UART: [fht] FMC Alias Private Key: 7
2,993,094 UART: [art] Derive CDI
2,993,374 UART: [art] Store in in slot 0x4
3,078,957 UART: [art] Derive Key Pair
3,079,317 UART: [art] Store priv key in slot 0x5
3,092,315 UART: [art] Derive Key Pair - Done
3,106,993 UART: [art] Signing Cert with AUTHO
3,107,473 UART: RITY.KEYID = 7
3,122,833 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,598 UART: [art] PUB.X = 1BA7634D948BE1AEBE423AC0DBE3FBB3BE73B4767CBC69585B0B9A806EF569AEDE82197DB8AC97A24ADC2EC2A101587B
3,130,388 UART: [art] PUB.Y = 5CA6A97CF7F75D8B192C64F46B26E4630FCF636D228AF680FA618B0CFF6707E3A9B012EAB5A9BEA46312C0B3FFDB84BA
3,137,351 UART: [art] SIG.R = CF88E5CA95F991AF6770EA527055466FB41AC46B7EAB9437C6779FF660CB3D3355B352ADEEECF3B921BFA679C3025F6B
3,144,134 UART: [art] SIG.S = 4CB3A904FF8FAD57702CA77E6FD87CD1FBCE854EA488022422634C599AD3DC43E803D43E97F6496E4B6A3EDEE3D11919
3,167,610 UART: Caliptra RT
3,167,863 UART: [state] CFI Enabled
3,275,854 UART: [rt] RT listening for mailbox commands...
3,276,524 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,494 UART: [rt]cmd =0x44504543, len=24
3,332,513 >>> mbox cmd response data (40 bytes)
3,332,514 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,349 UART: [rt]cmd =0x44504543, len=96
3,403,105 >>> mbox cmd response data (56 bytes)
3,403,106 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,951 UART: [rt]cmd =0x44504543, len=96
3,474,366 >>> mbox cmd response data (56 bytes)
3,474,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,504,408 UART: [rt]cmd =0x44504543, len=96
3,545,247 >>> mbox cmd response data (56 bytes)
3,545,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,225 UART: [rt]cmd =0x44504543, len=96
3,615,944 >>> mbox cmd response data (56 bytes)
3,615,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,804 UART: [rt]cmd =0x44504543, len=96
3,688,191 >>> mbox cmd response data (56 bytes)
3,688,192 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,718,139 UART: [rt]cmd =0x44504543, len=96
3,759,926 >>> mbox cmd response data (56 bytes)
3,759,927 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,789,830 UART: [rt]cmd =0x44504543, len=96
3,832,253 >>> mbox cmd response data (56 bytes)
3,832,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,287 UART: [rt]cmd =0x44504543, len=96
3,904,702 >>> mbox cmd response data (56 bytes)
3,904,703 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,770 UART: [rt]cmd =0x44504543, len=96
3,977,523 >>> mbox cmd response data (56 bytes)
3,977,524 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,007,485 UART: [rt]cmd =0x44504543, len=96
4,050,568 >>> mbox cmd response data (56 bytes)
4,050,569 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,080,404 UART: [rt]cmd =0x44504543, len=96
4,123,253 >>> mbox cmd response data (56 bytes)
4,123,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,153,175 UART: [rt]cmd =0x44504543, len=96
4,196,136 >>> mbox cmd response data (56 bytes)
4,196,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,226,056 UART: [rt]cmd =0x44504543, len=96
4,269,707 >>> mbox cmd response data (56 bytes)
4,269,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,299,635 UART: [rt]cmd =0x44504543, len=96
4,343,698 >>> mbox cmd response data (56 bytes)
4,343,699 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,373,786 UART: [rt]cmd =0x44504543, len=96
4,380,876 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,414 ready_for_fw is high
1,055,414 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,793 >>> mbox cmd response: success
2,683,571 UART:
2,683,587 UART: Running Caliptra FMC ...
2,683,995 UART:
2,684,049 UART: [state] CFI Enabled
2,694,868 UART: [fht] FMC Alias Private Key: 7
2,803,075 UART: [art] Extend RT PCRs Done
2,803,503 UART: [art] Lock RT PCRs Done
2,805,183 UART: [art] Populate DV Done
2,813,638 UART: [fht] FMC Alias Private Key: 7
2,814,706 UART: [art] Derive CDI
2,814,986 UART: [art] Store in in slot 0x4
2,900,845 UART: [art] Derive Key Pair
2,901,205 UART: [art] Store priv key in slot 0x5
2,914,683 UART: [art] Derive Key Pair - Done
2,929,414 UART: [art] Signing Cert with AUTHO
2,929,894 UART: RITY.KEYID = 7
2,944,616 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,381 UART: [art] PUB.X = D8D17F62F587B6919838A419CE726F823D4F9260401312E8FD9DC82AF46EB121CD22C4721A3B6D621E0F3245A5FBD865
2,952,150 UART: [art] PUB.Y = 58F528CC5724D1DFB879F84F3C4DC08617BAAF94511C76F9D270F51AA213FA5309D0A2D41F74D6FCD12D40557C7C7DAA
2,959,111 UART: [art] SIG.R = 62CE5982B9113D7F24F95A803A4B1CD589CAC4DC18588D8D04CDECF557FA3CAA1B71E4DCBE46C2F7D16B3A52B1CB8198
2,965,900 UART: [art] SIG.S = 550379DD1CC89DA304B48E84DFB0F71615C70E3195437BED9BE4C5ACF2C7C393DC7C63E29C461AFEB88663D6C056FDA7
2,989,876 UART: Caliptra RT
2,990,129 UART: [state] CFI Enabled
3,097,834 UART: [rt] RT listening for mailbox commands...
3,098,504 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,628 UART: [rt]cmd =0x44504543, len=24
3,154,867 >>> mbox cmd response data (40 bytes)
3,154,868 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,953 UART: [rt]cmd =0x44504543, len=96
3,225,931 >>> mbox cmd response data (56 bytes)
3,225,932 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,255,899 UART: [rt]cmd =0x44504543, len=96
3,296,974 >>> mbox cmd response data (56 bytes)
3,296,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,842 UART: [rt]cmd =0x44504543, len=96
3,367,317 >>> mbox cmd response data (56 bytes)
3,367,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,139 UART: [rt]cmd =0x44504543, len=96
3,438,600 >>> mbox cmd response data (56 bytes)
3,438,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,892 UART: [rt]cmd =0x44504543, len=96
3,510,757 >>> mbox cmd response data (56 bytes)
3,510,758 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,540,605 UART: [rt]cmd =0x44504543, len=96
3,582,030 >>> mbox cmd response data (56 bytes)
3,582,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,064 UART: [rt]cmd =0x44504543, len=96
3,653,695 >>> mbox cmd response data (56 bytes)
3,653,696 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,683,763 UART: [rt]cmd =0x44504543, len=96
3,725,772 >>> mbox cmd response data (56 bytes)
3,725,773 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,628 UART: [rt]cmd =0x44504543, len=96
3,798,367 >>> mbox cmd response data (56 bytes)
3,798,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,828,259 UART: [rt]cmd =0x44504543, len=96
3,870,786 >>> mbox cmd response data (56 bytes)
3,870,787 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,900,672 UART: [rt]cmd =0x44504543, len=96
3,943,845 >>> mbox cmd response data (56 bytes)
3,943,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,973,861 UART: [rt]cmd =0x44504543, len=96
4,017,582 >>> mbox cmd response data (56 bytes)
4,017,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,047,344 UART: [rt]cmd =0x44504543, len=96
4,090,639 >>> mbox cmd response data (56 bytes)
4,090,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,120,459 UART: [rt]cmd =0x44504543, len=96
4,163,638 >>> mbox cmd response data (56 bytes)
4,163,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,193,532 UART: [rt]cmd =0x44504543, len=96
4,200,738 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,225 UART: [kat] SHA2-256
891,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,904 UART: [kat] ++
896,056 UART: [kat] sha1
900,312 UART: [kat] SHA2-256
902,252 UART: [kat] SHA2-384
904,977 UART: [kat] SHA2-512-ACC
906,878 UART: [kat] ECC-384
916,759 UART: [kat] HMAC-384Kdf
921,411 UART: [kat] LMS
1,169,723 UART: [kat] --
1,170,748 UART: [cold-reset] ++
1,171,240 UART: [fht] FHT @ 0x50003400
1,173,872 UART: [idev] ++
1,174,040 UART: [idev] CDI.KEYID = 6
1,174,401 UART: [idev] SUBJECT.KEYID = 7
1,174,826 UART: [idev] UDS.KEYID = 0
1,175,172 ready_for_fw is high
1,175,172 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,692 UART: [idev] Erasing UDS.KEYID = 0
1,199,994 UART: [idev] Sha1 KeyId Algorithm
1,208,980 UART: [idev] --
1,209,935 UART: [ldev] ++
1,210,103 UART: [ldev] CDI.KEYID = 6
1,210,467 UART: [ldev] SUBJECT.KEYID = 5
1,210,894 UART: [ldev] AUTHORITY.KEYID = 7
1,211,357 UART: [ldev] FE.KEYID = 1
1,216,811 UART: [ldev] Erasing FE.KEYID = 1
1,243,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,481 UART: [ldev] --
1,281,933 UART: [fwproc] Wait for Commands...
1,282,716 UART: [fwproc] Recv command 0x46574c44
1,283,449 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,073 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,382 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,188 >>> mbox cmd response: success
2,775,427 UART: [afmc] ++
2,775,595 UART: [afmc] CDI.KEYID = 6
2,775,958 UART: [afmc] SUBJECT.KEYID = 7
2,776,384 UART: [afmc] AUTHORITY.KEYID = 5
2,812,167 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,490 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,219 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,102 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,821 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,478 UART: [afmc] --
2,855,370 UART: [cold-reset] --
2,856,270 UART: [state] Locking Datavault
2,857,391 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,995 UART: [state] Locking ICCM
2,858,425 UART: [exit] Launching FMC @ 0x40000130
2,863,754 UART:
2,863,770 UART: Running Caliptra FMC ...
2,864,178 UART:
2,864,321 UART: [state] CFI Enabled
2,875,354 UART: [fht] FMC Alias Private Key: 7
2,982,971 UART: [art] Extend RT PCRs Done
2,983,399 UART: [art] Lock RT PCRs Done
2,984,953 UART: [art] Populate DV Done
2,992,968 UART: [fht] FMC Alias Private Key: 7
2,993,898 UART: [art] Derive CDI
2,994,178 UART: [art] Store in in slot 0x4
3,079,723 UART: [art] Derive Key Pair
3,080,083 UART: [art] Store priv key in slot 0x5
3,093,117 UART: [art] Derive Key Pair - Done
3,107,949 UART: [art] Signing Cert with AUTHO
3,108,429 UART: RITY.KEYID = 7
3,123,553 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,318 UART: [art] PUB.X = A53C9E1BABDA39285297820E65A0BDB76CE33B15FC54DD66DACD3FF6E8251C50DE1F28A4415D216262949B88F3822EB0
3,131,097 UART: [art] PUB.Y = 870A8940EA93B6B9E5668C6B93F769F07E1255656C392746D2A28EE7F32AEA91694551421C3EEF024096A1643E78B4E9
3,138,035 UART: [art] SIG.R = EE0F7F1DCBB3BEAC227A6C6351CDF686A99BDB4B07B0CA446534251D2122791DA85100462F744FE3162815612D9A23BC
3,144,785 UART: [art] SIG.S = CEB1829614F0D3BE0A591F6E35752A40ABA8F731BB2637267FBD0E85145CA11256CB614CC1CFCA8578B0C579C4CBF653
3,168,664 UART: Caliptra RT
3,169,009 UART: [state] CFI Enabled
3,276,483 UART: [rt] RT listening for mailbox commands...
3,277,153 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,157 UART: [rt]cmd =0x44504543, len=24
3,333,686 >>> mbox cmd response data (40 bytes)
3,333,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,580 UART: [rt]cmd =0x44504543, len=96
3,404,106 >>> mbox cmd response data (56 bytes)
3,404,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,994 UART: [rt]cmd =0x44504543, len=96
3,475,009 >>> mbox cmd response data (56 bytes)
3,475,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,081 UART: [rt]cmd =0x44504543, len=96
3,546,422 >>> mbox cmd response data (56 bytes)
3,546,423 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,466 UART: [rt]cmd =0x44504543, len=96
3,618,035 >>> mbox cmd response data (56 bytes)
3,618,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,119 UART: [rt]cmd =0x44504543, len=96
3,689,166 >>> mbox cmd response data (56 bytes)
3,689,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,719,188 UART: [rt]cmd =0x44504543, len=96
3,760,815 >>> mbox cmd response data (56 bytes)
3,760,816 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,897 UART: [rt]cmd =0x44504543, len=96
3,833,046 >>> mbox cmd response data (56 bytes)
3,833,047 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,916 UART: [rt]cmd =0x44504543, len=96
3,905,147 >>> mbox cmd response data (56 bytes)
3,905,148 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,127 UART: [rt]cmd =0x44504543, len=96
3,977,044 >>> mbox cmd response data (56 bytes)
3,977,045 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,007,082 UART: [rt]cmd =0x44504543, len=96
4,049,561 >>> mbox cmd response data (56 bytes)
4,049,562 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,079,327 UART: [rt]cmd =0x44504543, len=96
4,122,858 >>> mbox cmd response data (56 bytes)
4,122,859 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,152,588 UART: [rt]cmd =0x44504543, len=96
4,196,315 >>> mbox cmd response data (56 bytes)
4,196,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,226,419 UART: [rt]cmd =0x44504543, len=96
4,270,792 >>> mbox cmd response data (56 bytes)
4,270,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,300,576 UART: [rt]cmd =0x44504543, len=96
4,345,329 >>> mbox cmd response data (56 bytes)
4,345,330 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,375,249 UART: [rt]cmd =0x44504543, len=96
4,382,597 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,989 ready_for_fw is high
1,056,989 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,966 >>> mbox cmd response: success
2,685,156 UART:
2,685,172 UART: Running Caliptra FMC ...
2,685,580 UART:
2,685,723 UART: [state] CFI Enabled
2,696,788 UART: [fht] FMC Alias Private Key: 7
2,803,707 UART: [art] Extend RT PCRs Done
2,804,135 UART: [art] Lock RT PCRs Done
2,805,945 UART: [art] Populate DV Done
2,814,326 UART: [fht] FMC Alias Private Key: 7
2,815,266 UART: [art] Derive CDI
2,815,546 UART: [art] Store in in slot 0x4
2,901,523 UART: [art] Derive Key Pair
2,901,883 UART: [art] Store priv key in slot 0x5
2,914,959 UART: [art] Derive Key Pair - Done
2,929,866 UART: [art] Signing Cert with AUTHO
2,930,346 UART: RITY.KEYID = 7
2,945,532 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,297 UART: [art] PUB.X = F9AFC477FAC79C250ACE4EDD0CCE753D0B190A3A181961A540F9B66A193B16B4DC0A95A1B17D46EF2E4757AA6B45281B
2,953,070 UART: [art] PUB.Y = 248E9FEBAC13327F6EDAEBA2FC87D83F7099C6403BEAA207950C0E05473DBE00DE7F3696BE313D26B776E15BF3D49C2A
2,960,004 UART: [art] SIG.R = F00867BC63265E3E9EDAB5C185F09D90A0BAC7A6E0EDBAC5AFFD24D08D0C846AFEEAA5835613958CEA1FFCDC230A3454
2,966,793 UART: [art] SIG.S = 550DF6EF619E7D7CFFF06B5DB66D903519F09DA2EDE4E82D8B1152B37CE8246A23C1E02556C921851FD49D6C801D41B3
2,990,553 UART: Caliptra RT
2,990,898 UART: [state] CFI Enabled
3,099,249 UART: [rt] RT listening for mailbox commands...
3,099,919 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,793 UART: [rt]cmd =0x44504543, len=24
3,156,052 >>> mbox cmd response data (40 bytes)
3,156,053 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,826 UART: [rt]cmd =0x44504543, len=96
3,226,152 >>> mbox cmd response data (56 bytes)
3,226,153 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,255,932 UART: [rt]cmd =0x44504543, len=96
3,296,359 >>> mbox cmd response data (56 bytes)
3,296,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,259 UART: [rt]cmd =0x44504543, len=96
3,366,448 >>> mbox cmd response data (56 bytes)
3,366,449 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,434 UART: [rt]cmd =0x44504543, len=96
3,437,295 >>> mbox cmd response data (56 bytes)
3,437,296 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,115 UART: [rt]cmd =0x44504543, len=96
3,508,294 >>> mbox cmd response data (56 bytes)
3,508,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,098 UART: [rt]cmd =0x44504543, len=96
3,579,067 >>> mbox cmd response data (56 bytes)
3,579,068 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,043 UART: [rt]cmd =0x44504543, len=96
3,652,486 >>> mbox cmd response data (56 bytes)
3,652,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,682,536 UART: [rt]cmd =0x44504543, len=96
3,724,317 >>> mbox cmd response data (56 bytes)
3,724,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,357 UART: [rt]cmd =0x44504543, len=96
3,796,920 >>> mbox cmd response data (56 bytes)
3,796,921 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,826,762 UART: [rt]cmd =0x44504543, len=96
3,869,745 >>> mbox cmd response data (56 bytes)
3,869,746 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,899,507 UART: [rt]cmd =0x44504543, len=96
3,943,040 >>> mbox cmd response data (56 bytes)
3,943,041 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,973,054 UART: [rt]cmd =0x44504543, len=96
4,016,185 >>> mbox cmd response data (56 bytes)
4,016,186 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,985 UART: [rt]cmd =0x44504543, len=96
4,090,346 >>> mbox cmd response data (56 bytes)
4,090,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,120,290 UART: [rt]cmd =0x44504543, len=96
4,164,461 >>> mbox cmd response data (56 bytes)
4,164,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,194,253 UART: [rt]cmd =0x44504543, len=96
4,201,345 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,502 UART: [state] LifecycleState = Unprovisioned
86,157 UART: [state] DebugLocked = No
86,853 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,335 UART: [kat] SHA2-256
882,266 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,381 UART: [kat] ++
886,533 UART: [kat] sha1
890,969 UART: [kat] SHA2-256
892,907 UART: [kat] SHA2-384
895,750 UART: [kat] SHA2-512-ACC
897,651 UART: [kat] ECC-384
903,016 UART: [kat] HMAC-384Kdf
907,574 UART: [kat] LMS
1,475,770 UART: [kat] --
1,476,931 UART: [cold-reset] ++
1,477,257 UART: [fht] Storing FHT @ 0x50003400
1,480,020 UART: [idev] ++
1,480,188 UART: [idev] CDI.KEYID = 6
1,480,548 UART: [idev] SUBJECT.KEYID = 7
1,480,972 UART: [idev] UDS.KEYID = 0
1,481,317 ready_for_fw is high
1,481,317 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,764 UART: [idev] Erasing UDS.KEYID = 0
1,505,466 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,162 UART: [idev] --
1,515,099 UART: [ldev] ++
1,515,267 UART: [ldev] CDI.KEYID = 6
1,515,630 UART: [ldev] SUBJECT.KEYID = 5
1,516,056 UART: [ldev] AUTHORITY.KEYID = 7
1,516,519 UART: [ldev] FE.KEYID = 1
1,521,639 UART: [ldev] Erasing FE.KEYID = 1
1,546,918 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,196 UART: [ldev] --
1,586,491 UART: [fwproc] Waiting for Commands...
1,587,202 UART: [fwproc] Received command 0x46574c44
1,587,993 UART: [fwproc] Received Image of size 114332 bytes
2,885,907 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,409 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,761 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,664 >>> mbox cmd response: success
3,079,836 UART: [afmc] ++
3,080,004 UART: [afmc] CDI.KEYID = 6
3,080,366 UART: [afmc] SUBJECT.KEYID = 7
3,080,791 UART: [afmc] AUTHORITY.KEYID = 5
3,116,378 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,992 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,772 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,500 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,385 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,075 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,042 UART: [afmc] --
3,159,948 UART: [cold-reset] --
3,160,656 UART: [state] Locking Datavault
3,161,539 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,143 UART: [state] Locking ICCM
3,162,763 UART: [exit] Launching FMC @ 0x40000130
3,168,092 UART:
3,168,108 UART: Running Caliptra FMC ...
3,168,516 UART:
3,168,570 UART: [state] CFI Enabled
3,178,561 UART: [fht] FMC Alias Private Key: 7
3,286,912 UART: [art] Extend RT PCRs Done
3,287,340 UART: [art] Lock RT PCRs Done
3,289,144 UART: [art] Populate DV Done
3,297,563 UART: [fht] FMC Alias Private Key: 7
3,298,551 UART: [art] Derive CDI
3,298,831 UART: [art] Store in in slot 0x4
3,384,438 UART: [art] Derive Key Pair
3,384,798 UART: [art] Store priv key in slot 0x5
3,397,484 UART: [art] Derive Key Pair - Done
3,412,203 UART: [art] Signing Cert with AUTHO
3,412,683 UART: RITY.KEYID = 7
3,427,695 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,460 UART: [art] PUB.X = 458B68ACC2356D2D6FB669A49E902628CB9066A584FE814B1C183EA76B4107FD6A6ADA67B92DC56D98064D31B62B1CA4
3,435,232 UART: [art] PUB.Y = CDAA50E10039D850B987F2EA5521465891BB238400914565E542E4558621DCD560990D5F94723E108A4FD25305E19D52
3,442,120 UART: [art] SIG.R = BDEA188CEFD3761AAAE27105E48E86A9C52E27C9BFE5467FAE72052EF9178C1FBFB8111688FB22177184C25CD770DDEC
3,448,902 UART: [art] SIG.S = 34EC2011A98BEC281BB89B55C0C9D200B9405806D3E52407C66ED10BF50F41949DF8995A609EEB2C74A141E62C79A3BD
3,472,931 UART: Caliptra RT
3,473,184 UART: [state] CFI Enabled
3,581,133 UART: [rt] RT listening for mailbox commands...
3,581,803 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,593 UART: [rt]cmd =0x44504543, len=24
3,637,832 >>> mbox cmd response data (40 bytes)
3,637,833 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,667,442 UART: [rt]cmd =0x44504543, len=24
3,694,245 >>> mbox cmd response data (40 bytes)
3,694,246 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,723,651 UART: [rt]cmd =0x44504543, len=24
3,749,838 >>> mbox cmd response data (40 bytes)
3,749,839 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,779,494 UART: [rt]cmd =0x44504543, len=24
3,806,007 >>> mbox cmd response data (40 bytes)
3,806,008 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,835,333 UART: [rt]cmd =0x44504543, len=24
3,861,694 >>> mbox cmd response data (40 bytes)
3,861,695 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,891,022 UART: [rt]cmd =0x44504543, len=24
3,917,673 >>> mbox cmd response data (40 bytes)
3,917,674 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,103 UART: [rt]cmd =0x44504543, len=24
3,973,994 >>> mbox cmd response data (40 bytes)
3,973,995 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,003,496 UART: [rt]cmd =0x44504543, len=24
4,029,309 >>> mbox cmd response data (40 bytes)
4,029,310 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,058,791 UART: [rt]cmd =0x44504543, len=24
4,084,904 >>> mbox cmd response data (40 bytes)
4,084,905 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,114,512 UART: [rt]cmd =0x44504543, len=24
4,140,639 >>> mbox cmd response data (40 bytes)
4,140,640 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,170,011 UART: [rt]cmd =0x44504543, len=24
4,196,308 >>> mbox cmd response data (40 bytes)
4,196,309 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,225,696 UART: [rt]cmd =0x44504543, len=24
4,252,089 >>> mbox cmd response data (40 bytes)
4,252,090 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,281,669 UART: [rt]cmd =0x44504543, len=24
4,308,304 >>> mbox cmd response data (40 bytes)
4,308,305 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,337,844 UART: [rt]cmd =0x44504543, len=24
4,363,837 >>> mbox cmd response data (40 bytes)
4,363,838 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,393,381 UART: [rt]cmd =0x44504543, len=24
4,419,430 >>> mbox cmd response data (40 bytes)
4,419,431 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,448,686 UART: [rt]cmd =0x44504543, len=24
4,456,115 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,513 ready_for_fw is high
1,362,513 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,680 >>> mbox cmd response: success
2,988,618 UART:
2,988,634 UART: Running Caliptra FMC ...
2,989,042 UART:
2,989,096 UART: [state] CFI Enabled
2,999,339 UART: [fht] FMC Alias Private Key: 7
3,107,128 UART: [art] Extend RT PCRs Done
3,107,556 UART: [art] Lock RT PCRs Done
3,109,290 UART: [art] Populate DV Done
3,117,483 UART: [fht] FMC Alias Private Key: 7
3,118,557 UART: [art] Derive CDI
3,118,837 UART: [art] Store in in slot 0x4
3,204,312 UART: [art] Derive Key Pair
3,204,672 UART: [art] Store priv key in slot 0x5
3,218,456 UART: [art] Derive Key Pair - Done
3,233,356 UART: [art] Signing Cert with AUTHO
3,233,836 UART: RITY.KEYID = 7
3,248,702 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,467 UART: [art] PUB.X = 2847C4B3C0EA0B755E74A140321FA42360E0B9B598727BF84A031BF79D622AE2D32B1E6DFED31546257ACC668751CC86
3,256,235 UART: [art] PUB.Y = 1BB736F0B4601A841DE6098151081522796FA85EE7A24D560326FC65D6BC713B742B0000722FCCA885624CF23291087D
3,263,121 UART: [art] SIG.R = 8DAAB574B6E9EDDEAB078311A84DFFA48146213DC80D2116F78CEF5C1F3BEF5E608371E5B872355D985168BAF4BB8056
3,269,899 UART: [art] SIG.S = D8018540F4ABD1213E0A02C58B7444053B0989FEA1C532FDF647F9393D947D2BCE902D225E09EE7133C9E64762F581BC
3,293,980 UART: Caliptra RT
3,294,233 UART: [state] CFI Enabled
3,402,743 UART: [rt] RT listening for mailbox commands...
3,403,413 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,287 UART: [rt]cmd =0x44504543, len=24
3,459,370 >>> mbox cmd response data (40 bytes)
3,459,371 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,488,888 UART: [rt]cmd =0x44504543, len=24
3,515,149 >>> mbox cmd response data (40 bytes)
3,515,150 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,544,429 UART: [rt]cmd =0x44504543, len=24
3,570,890 >>> mbox cmd response data (40 bytes)
3,570,891 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,600,544 UART: [rt]cmd =0x44504543, len=24
3,626,697 >>> mbox cmd response data (40 bytes)
3,626,698 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,656,171 UART: [rt]cmd =0x44504543, len=24
3,682,190 >>> mbox cmd response data (40 bytes)
3,682,191 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,762 UART: [rt]cmd =0x44504543, len=24
3,737,789 >>> mbox cmd response data (40 bytes)
3,737,790 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,141 UART: [rt]cmd =0x44504543, len=24
3,793,244 >>> mbox cmd response data (40 bytes)
3,793,245 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,616 UART: [rt]cmd =0x44504543, len=24
3,849,053 >>> mbox cmd response data (40 bytes)
3,849,054 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,551 UART: [rt]cmd =0x44504543, len=24
3,904,968 >>> mbox cmd response data (40 bytes)
3,904,969 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,366 UART: [rt]cmd =0x44504543, len=24
3,960,467 >>> mbox cmd response data (40 bytes)
3,960,468 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,990,065 UART: [rt]cmd =0x44504543, len=24
4,016,522 >>> mbox cmd response data (40 bytes)
4,016,523 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,762 UART: [rt]cmd =0x44504543, len=24
4,071,979 >>> mbox cmd response data (40 bytes)
4,071,980 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,101,569 UART: [rt]cmd =0x44504543, len=24
4,128,178 >>> mbox cmd response data (40 bytes)
4,128,179 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,157,468 UART: [rt]cmd =0x44504543, len=24
4,184,075 >>> mbox cmd response data (40 bytes)
4,184,076 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,213,361 UART: [rt]cmd =0x44504543, len=24
4,239,604 >>> mbox cmd response data (40 bytes)
4,239,605 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,269,050 UART: [rt]cmd =0x44504543, len=24
4,276,365 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,488 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,148 UART: [kat] SHA2-256
882,079 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,194 UART: [kat] ++
886,346 UART: [kat] sha1
890,692 UART: [kat] SHA2-256
892,630 UART: [kat] SHA2-384
895,249 UART: [kat] SHA2-512-ACC
897,150 UART: [kat] ECC-384
903,037 UART: [kat] HMAC-384Kdf
907,605 UART: [kat] LMS
1,475,801 UART: [kat] --
1,476,554 UART: [cold-reset] ++
1,476,940 UART: [fht] Storing FHT @ 0x50003400
1,479,671 UART: [idev] ++
1,479,839 UART: [idev] CDI.KEYID = 6
1,480,199 UART: [idev] SUBJECT.KEYID = 7
1,480,623 UART: [idev] UDS.KEYID = 0
1,480,968 ready_for_fw is high
1,480,968 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,147 UART: [idev] Erasing UDS.KEYID = 0
1,504,983 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,747 UART: [idev] --
1,514,704 UART: [ldev] ++
1,514,872 UART: [ldev] CDI.KEYID = 6
1,515,235 UART: [ldev] SUBJECT.KEYID = 5
1,515,661 UART: [ldev] AUTHORITY.KEYID = 7
1,516,124 UART: [ldev] FE.KEYID = 1
1,521,406 UART: [ldev] Erasing FE.KEYID = 1
1,546,723 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,561 UART: [ldev] --
1,585,962 UART: [fwproc] Waiting for Commands...
1,586,639 UART: [fwproc] Received command 0x46574c44
1,587,430 UART: [fwproc] Received Image of size 114332 bytes
2,884,598 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,904 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,256 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,191 >>> mbox cmd response: success
3,078,407 UART: [afmc] ++
3,078,575 UART: [afmc] CDI.KEYID = 6
3,078,937 UART: [afmc] SUBJECT.KEYID = 7
3,079,362 UART: [afmc] AUTHORITY.KEYID = 5
3,114,719 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,987 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,767 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,495 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,380 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,070 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,969 UART: [afmc] --
3,158,011 UART: [cold-reset] --
3,158,797 UART: [state] Locking Datavault
3,159,648 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,252 UART: [state] Locking ICCM
3,160,856 UART: [exit] Launching FMC @ 0x40000130
3,166,185 UART:
3,166,201 UART: Running Caliptra FMC ...
3,166,609 UART:
3,166,752 UART: [state] CFI Enabled
3,177,329 UART: [fht] FMC Alias Private Key: 7
3,286,078 UART: [art] Extend RT PCRs Done
3,286,506 UART: [art] Lock RT PCRs Done
3,287,854 UART: [art] Populate DV Done
3,295,859 UART: [fht] FMC Alias Private Key: 7
3,296,947 UART: [art] Derive CDI
3,297,227 UART: [art] Store in in slot 0x4
3,382,718 UART: [art] Derive Key Pair
3,383,078 UART: [art] Store priv key in slot 0x5
3,396,224 UART: [art] Derive Key Pair - Done
3,411,039 UART: [art] Signing Cert with AUTHO
3,411,519 UART: RITY.KEYID = 7
3,426,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,656 UART: [art] PUB.X = CDF903E9096FDD0A952ACB1F6B047301B7AEC13A1C8235CFDEF84B70CDEC15074F45B0B3DAED996DF64A2F489B76BDCD
3,434,436 UART: [art] PUB.Y = AB178C5C0ED87E38F6788E55AE5D50FCAFB7897A6B1EE1D694E6E992A2EEB7F629E769470BAC7B9AE5C87638423BAADC
3,441,402 UART: [art] SIG.R = 4C6480B2EBC967FFBA7F3A790388EBFBF8C652210AA98210D09A18A3EDBB58D8B6173924E24037BE10CB0385AC25D54E
3,448,175 UART: [art] SIG.S = ED5C25479C263E3557DC8A6803FCF8B0F005B57F57D37F79EBD3B8F67B8440A86B3C3BF0D5559663E675073E0FA727F7
3,472,124 UART: Caliptra RT
3,472,469 UART: [state] CFI Enabled
3,580,374 UART: [rt] RT listening for mailbox commands...
3,581,044 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,714 UART: [rt]cmd =0x44504543, len=24
3,636,895 >>> mbox cmd response data (40 bytes)
3,636,896 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,666,359 UART: [rt]cmd =0x44504543, len=24
3,692,838 >>> mbox cmd response data (40 bytes)
3,692,839 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,722,180 UART: [rt]cmd =0x44504543, len=24
3,748,313 >>> mbox cmd response data (40 bytes)
3,748,314 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,777,883 UART: [rt]cmd =0x44504543, len=24
3,804,102 >>> mbox cmd response data (40 bytes)
3,804,103 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,833,620 UART: [rt]cmd =0x44504543, len=24
3,859,921 >>> mbox cmd response data (40 bytes)
3,859,922 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,257 UART: [rt]cmd =0x44504543, len=24
3,915,622 >>> mbox cmd response data (40 bytes)
3,915,623 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,072 UART: [rt]cmd =0x44504543, len=24
3,971,551 >>> mbox cmd response data (40 bytes)
3,971,552 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,001,121 UART: [rt]cmd =0x44504543, len=24
4,027,714 >>> mbox cmd response data (40 bytes)
4,027,715 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,057,038 UART: [rt]cmd =0x44504543, len=24
4,083,833 >>> mbox cmd response data (40 bytes)
4,083,834 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,113,431 UART: [rt]cmd =0x44504543, len=24
4,139,438 >>> mbox cmd response data (40 bytes)
4,139,439 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,168,762 UART: [rt]cmd =0x44504543, len=24
4,195,369 >>> mbox cmd response data (40 bytes)
4,195,370 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,224,693 UART: [rt]cmd =0x44504543, len=24
4,250,418 >>> mbox cmd response data (40 bytes)
4,250,419 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,280,036 UART: [rt]cmd =0x44504543, len=24
4,306,745 >>> mbox cmd response data (40 bytes)
4,306,746 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,336,347 UART: [rt]cmd =0x44504543, len=24
4,362,374 >>> mbox cmd response data (40 bytes)
4,362,375 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,391,920 UART: [rt]cmd =0x44504543, len=24
4,418,169 >>> mbox cmd response data (40 bytes)
4,418,170 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,447,631 UART: [rt]cmd =0x44504543, len=24
4,454,796 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,116 ready_for_fw is high
1,363,116 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,719 >>> mbox cmd response: success
2,991,845 UART:
2,991,861 UART: Running Caliptra FMC ...
2,992,269 UART:
2,992,412 UART: [state] CFI Enabled
3,003,327 UART: [fht] FMC Alias Private Key: 7
3,111,812 UART: [art] Extend RT PCRs Done
3,112,240 UART: [art] Lock RT PCRs Done
3,113,884 UART: [art] Populate DV Done
3,122,359 UART: [fht] FMC Alias Private Key: 7
3,123,495 UART: [art] Derive CDI
3,123,775 UART: [art] Store in in slot 0x4
3,209,438 UART: [art] Derive Key Pair
3,209,798 UART: [art] Store priv key in slot 0x5
3,223,052 UART: [art] Derive Key Pair - Done
3,238,014 UART: [art] Signing Cert with AUTHO
3,238,494 UART: RITY.KEYID = 7
3,254,050 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,815 UART: [art] PUB.X = 6BE183B6D46077F41BF3EE950561ACC8DC56D7F028782438C9440EA70FACBD72C1D923D142BC4088CCF520A217ABBC21
3,261,588 UART: [art] PUB.Y = 67E35DD54615148AD7A60FAE4F6828FEF89261D75EDBC30C4BA21668B53394B6DFF41DED6E5269CBB71751C425A71F0F
3,268,541 UART: [art] SIG.R = A3873EA33C7424337F2A1DEE43A84713443C5D2DD3CD94D005959AD9725A28F8E433EDFE5BA62DC43C764EBD26B3993D
3,275,318 UART: [art] SIG.S = A70D344892A483B5770181447DC0AA840C3E5D0CE27F4DD5DFB014F6F37D32BEE2A294EC87B250569E0E0788BE22F865
3,299,359 UART: Caliptra RT
3,299,704 UART: [state] CFI Enabled
3,408,316 UART: [rt] RT listening for mailbox commands...
3,408,986 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,796 UART: [rt]cmd =0x44504543, len=24
3,464,853 >>> mbox cmd response data (40 bytes)
3,464,854 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,494,431 UART: [rt]cmd =0x44504543, len=24
3,521,042 >>> mbox cmd response data (40 bytes)
3,521,043 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,550,390 UART: [rt]cmd =0x44504543, len=24
3,576,287 >>> mbox cmd response data (40 bytes)
3,576,288 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,745 UART: [rt]cmd =0x44504543, len=24
3,631,884 >>> mbox cmd response data (40 bytes)
3,631,885 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,234 UART: [rt]cmd =0x44504543, len=24
3,687,575 >>> mbox cmd response data (40 bytes)
3,687,576 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,717,143 UART: [rt]cmd =0x44504543, len=24
3,743,458 >>> mbox cmd response data (40 bytes)
3,743,459 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,946 UART: [rt]cmd =0x44504543, len=24
3,800,031 >>> mbox cmd response data (40 bytes)
3,800,032 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,829,551 UART: [rt]cmd =0x44504543, len=24
3,855,632 >>> mbox cmd response data (40 bytes)
3,855,633 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,885,268 UART: [rt]cmd =0x44504543, len=24
3,911,759 >>> mbox cmd response data (40 bytes)
3,911,760 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,221 UART: [rt]cmd =0x44504543, len=24
3,967,854 >>> mbox cmd response data (40 bytes)
3,967,855 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,997,140 UART: [rt]cmd =0x44504543, len=24
4,023,463 >>> mbox cmd response data (40 bytes)
4,023,464 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,053,007 UART: [rt]cmd =0x44504543, len=24
4,079,614 >>> mbox cmd response data (40 bytes)
4,079,615 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,109,132 UART: [rt]cmd =0x44504543, len=24
4,135,591 >>> mbox cmd response data (40 bytes)
4,135,592 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,165,223 UART: [rt]cmd =0x44504543, len=24
4,191,958 >>> mbox cmd response data (40 bytes)
4,191,959 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,221,516 UART: [rt]cmd =0x44504543, len=24
4,247,511 >>> mbox cmd response data (40 bytes)
4,247,512 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,276,937 UART: [rt]cmd =0x44504543, len=24
4,284,004 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
893,354 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,479 UART: [kat] ++
897,631 UART: [kat] sha1
902,039 UART: [kat] SHA2-256
903,979 UART: [kat] SHA2-384
906,738 UART: [kat] SHA2-512-ACC
908,639 UART: [kat] ECC-384
918,266 UART: [kat] HMAC-384Kdf
922,952 UART: [kat] LMS
1,171,280 UART: [kat] --
1,172,017 UART: [cold-reset] ++
1,172,505 UART: [fht] FHT @ 0x50003400
1,175,198 UART: [idev] ++
1,175,366 UART: [idev] CDI.KEYID = 6
1,175,726 UART: [idev] SUBJECT.KEYID = 7
1,176,150 UART: [idev] UDS.KEYID = 0
1,176,495 ready_for_fw is high
1,176,495 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,978 UART: [idev] Erasing UDS.KEYID = 0
1,200,757 UART: [idev] Sha1 KeyId Algorithm
1,209,039 UART: [idev] --
1,210,009 UART: [ldev] ++
1,210,177 UART: [ldev] CDI.KEYID = 6
1,210,540 UART: [ldev] SUBJECT.KEYID = 5
1,210,966 UART: [ldev] AUTHORITY.KEYID = 7
1,211,429 UART: [ldev] FE.KEYID = 1
1,216,587 UART: [ldev] Erasing FE.KEYID = 1
1,243,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,351 UART: [ldev] --
1,282,788 UART: [fwproc] Wait for Commands...
1,283,442 UART: [fwproc] Recv command 0x46574c44
1,284,170 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,052 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,356 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,225 >>> mbox cmd response: success
2,775,397 UART: [afmc] ++
2,775,565 UART: [afmc] CDI.KEYID = 6
2,775,927 UART: [afmc] SUBJECT.KEYID = 7
2,776,352 UART: [afmc] AUTHORITY.KEYID = 5
2,811,967 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,442 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,190 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,918 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,803 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,522 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,274 UART: [afmc] --
2,855,392 UART: [cold-reset] --
2,856,284 UART: [state] Locking Datavault
2,857,289 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,893 UART: [state] Locking ICCM
2,858,407 UART: [exit] Launching FMC @ 0x40000130
2,863,736 UART:
2,863,752 UART: Running Caliptra FMC ...
2,864,160 UART:
2,864,214 UART: [state] CFI Enabled
2,874,459 UART: [fht] FMC Alias Private Key: 7
2,982,304 UART: [art] Extend RT PCRs Done
2,982,732 UART: [art] Lock RT PCRs Done
2,984,460 UART: [art] Populate DV Done
2,992,641 UART: [fht] FMC Alias Private Key: 7
2,993,773 UART: [art] Derive CDI
2,994,053 UART: [art] Store in in slot 0x4
3,079,684 UART: [art] Derive Key Pair
3,080,044 UART: [art] Store priv key in slot 0x5
3,093,488 UART: [art] Derive Key Pair - Done
3,108,346 UART: [art] Signing Cert with AUTHO
3,108,826 UART: RITY.KEYID = 7
3,123,680 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,445 UART: [art] PUB.X = A5605B06F4E769B6A25B89B7E903E4E6F94A8DF1C2665068C6DBBEE0B79209A70AE8A06C19B578E017174CA4434A4AE7
3,131,211 UART: [art] PUB.Y = 50D009D86987D4F65FECB5D0609368B224272969CD6A22F06BDFF70872973474E15321D153F493CED9F0582DA840BC8D
3,138,153 UART: [art] SIG.R = 70E498DAA4D0A483F7120250F44791F89A292353E139B8016A06013F897927BC5D65B31F400794433E9B2D05EA7530A3
3,144,893 UART: [art] SIG.S = A3AEFC9EE0478C988F2527DC70B7ED7CC09B5FD8A04F6E450C745868C6885B6A84B4FC254BD6B813AF9462C157BCBF08
3,168,980 UART: Caliptra RT
3,169,233 UART: [state] CFI Enabled
3,277,470 UART: [rt] RT listening for mailbox commands...
3,278,140 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,074 UART: [rt]cmd =0x44504543, len=24
3,334,181 >>> mbox cmd response data (40 bytes)
3,334,182 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,671 UART: [rt]cmd =0x44504543, len=24
3,389,766 >>> mbox cmd response data (40 bytes)
3,389,767 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,419,054 UART: [rt]cmd =0x44504543, len=24
3,445,451 >>> mbox cmd response data (40 bytes)
3,445,452 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,883 UART: [rt]cmd =0x44504543, len=24
3,501,408 >>> mbox cmd response data (40 bytes)
3,501,409 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,884 UART: [rt]cmd =0x44504543, len=24
3,556,689 >>> mbox cmd response data (40 bytes)
3,556,690 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,383 UART: [rt]cmd =0x44504543, len=24
3,612,046 >>> mbox cmd response data (40 bytes)
3,612,047 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,740 UART: [rt]cmd =0x44504543, len=24
3,668,445 >>> mbox cmd response data (40 bytes)
3,668,446 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,091 UART: [rt]cmd =0x44504543, len=24
3,724,162 >>> mbox cmd response data (40 bytes)
3,724,163 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,753,546 UART: [rt]cmd =0x44504543, len=24
3,780,301 >>> mbox cmd response data (40 bytes)
3,780,302 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,863 UART: [rt]cmd =0x44504543, len=24
3,835,920 >>> mbox cmd response data (40 bytes)
3,835,921 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,146 UART: [rt]cmd =0x44504543, len=24
3,890,827 >>> mbox cmd response data (40 bytes)
3,890,828 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,920,425 UART: [rt]cmd =0x44504543, len=24
3,946,688 >>> mbox cmd response data (40 bytes)
3,946,689 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,976,194 UART: [rt]cmd =0x44504543, len=24
4,002,447 >>> mbox cmd response data (40 bytes)
4,002,448 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,031,949 UART: [rt]cmd =0x44504543, len=24
4,058,424 >>> mbox cmd response data (40 bytes)
4,058,425 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,966 UART: [rt]cmd =0x44504543, len=24
4,114,275 >>> mbox cmd response data (40 bytes)
4,114,276 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,143,707 UART: [rt]cmd =0x44504543, len=24
4,151,014 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,573 ready_for_fw is high
1,059,573 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,924 >>> mbox cmd response: success
2,686,792 UART:
2,686,808 UART: Running Caliptra FMC ...
2,687,216 UART:
2,687,270 UART: [state] CFI Enabled
2,697,589 UART: [fht] FMC Alias Private Key: 7
2,805,230 UART: [art] Extend RT PCRs Done
2,805,658 UART: [art] Lock RT PCRs Done
2,807,128 UART: [art] Populate DV Done
2,815,453 UART: [fht] FMC Alias Private Key: 7
2,816,523 UART: [art] Derive CDI
2,816,803 UART: [art] Store in in slot 0x4
2,902,736 UART: [art] Derive Key Pair
2,903,096 UART: [art] Store priv key in slot 0x5
2,915,882 UART: [art] Derive Key Pair - Done
2,930,481 UART: [art] Signing Cert with AUTHO
2,930,961 UART: RITY.KEYID = 7
2,946,149 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,914 UART: [art] PUB.X = 5AE01A595EB315092A54E55CA35C03285C24C08DB9DF1C7207C9463EA3B7C6A02E4C9F3E2DF6E7C34B211AF1631FA6FB
2,953,689 UART: [art] PUB.Y = 85D97BDAD9F565D6F37C327263F90A5314AE6FCD6F07CFC20ACDEE77C066F581BF32C8F778A4C975570BE866A0D82F4E
2,960,643 UART: [art] SIG.R = ED164BB7B9D03A7241142B21E7D5ACC3FF1A8C3FD4C66F83A15F6913C30CB0D220485FA598730649AFB8433E3B031DE2
2,967,414 UART: [art] SIG.S = 3ED7D9B71C3F737A723E7D28F1BFB8E13611C02185EF1918700B1B5303CEF1D05DA30F5C5432884E27C711226AABC4C5
2,990,650 UART: Caliptra RT
2,990,903 UART: [state] CFI Enabled
3,098,218 UART: [rt] RT listening for mailbox commands...
3,098,888 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,736 UART: [rt]cmd =0x44504543, len=24
3,154,661 >>> mbox cmd response data (40 bytes)
3,154,662 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,251 UART: [rt]cmd =0x44504543, len=24
3,210,980 >>> mbox cmd response data (40 bytes)
3,210,981 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,240,312 UART: [rt]cmd =0x44504543, len=24
3,266,303 >>> mbox cmd response data (40 bytes)
3,266,304 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,295,727 UART: [rt]cmd =0x44504543, len=24
3,321,950 >>> mbox cmd response data (40 bytes)
3,321,951 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,351,646 UART: [rt]cmd =0x44504543, len=24
3,378,231 >>> mbox cmd response data (40 bytes)
3,378,232 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,721 UART: [rt]cmd =0x44504543, len=24
3,433,974 >>> mbox cmd response data (40 bytes)
3,433,975 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,463,410 UART: [rt]cmd =0x44504543, len=24
3,489,751 >>> mbox cmd response data (40 bytes)
3,489,752 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,353 UART: [rt]cmd =0x44504543, len=24
3,546,030 >>> mbox cmd response data (40 bytes)
3,546,031 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,356 UART: [rt]cmd =0x44504543, len=24
3,601,637 >>> mbox cmd response data (40 bytes)
3,601,638 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,207 UART: [rt]cmd =0x44504543, len=24
3,657,300 >>> mbox cmd response data (40 bytes)
3,657,301 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,850 UART: [rt]cmd =0x44504543, len=24
3,713,281 >>> mbox cmd response data (40 bytes)
3,713,282 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,869 UART: [rt]cmd =0x44504543, len=24
3,769,186 >>> mbox cmd response data (40 bytes)
3,769,187 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,798,666 UART: [rt]cmd =0x44504543, len=24
3,824,591 >>> mbox cmd response data (40 bytes)
3,824,592 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,854,145 UART: [rt]cmd =0x44504543, len=24
3,879,732 >>> mbox cmd response data (40 bytes)
3,879,733 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,909,198 UART: [rt]cmd =0x44504543, len=24
3,935,543 >>> mbox cmd response data (40 bytes)
3,935,544 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,957 UART: [rt]cmd =0x44504543, len=24
3,972,278 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
87,072 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
893,861 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,986 UART: [kat] ++
898,138 UART: [kat] sha1
902,310 UART: [kat] SHA2-256
904,250 UART: [kat] SHA2-384
906,963 UART: [kat] SHA2-512-ACC
908,864 UART: [kat] ECC-384
918,285 UART: [kat] HMAC-384Kdf
922,929 UART: [kat] LMS
1,171,257 UART: [kat] --
1,172,048 UART: [cold-reset] ++
1,172,470 UART: [fht] FHT @ 0x50003400
1,175,167 UART: [idev] ++
1,175,335 UART: [idev] CDI.KEYID = 6
1,175,695 UART: [idev] SUBJECT.KEYID = 7
1,176,119 UART: [idev] UDS.KEYID = 0
1,176,464 ready_for_fw is high
1,176,464 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,171 UART: [idev] Erasing UDS.KEYID = 0
1,201,322 UART: [idev] Sha1 KeyId Algorithm
1,209,766 UART: [idev] --
1,210,826 UART: [ldev] ++
1,210,994 UART: [ldev] CDI.KEYID = 6
1,211,357 UART: [ldev] SUBJECT.KEYID = 5
1,211,783 UART: [ldev] AUTHORITY.KEYID = 7
1,212,246 UART: [ldev] FE.KEYID = 1
1,217,676 UART: [ldev] Erasing FE.KEYID = 1
1,243,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,728 UART: [ldev] --
1,283,151 UART: [fwproc] Wait for Commands...
1,283,889 UART: [fwproc] Recv command 0x46574c44
1,284,617 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,232 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,423 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,727 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,656 >>> mbox cmd response: success
2,774,878 UART: [afmc] ++
2,775,046 UART: [afmc] CDI.KEYID = 6
2,775,408 UART: [afmc] SUBJECT.KEYID = 7
2,775,833 UART: [afmc] AUTHORITY.KEYID = 5
2,811,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,083 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,811 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,696 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,415 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,337 UART: [afmc] --
2,855,277 UART: [cold-reset] --
2,855,939 UART: [state] Locking Datavault
2,857,286 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,890 UART: [state] Locking ICCM
2,858,436 UART: [exit] Launching FMC @ 0x40000130
2,863,765 UART:
2,863,781 UART: Running Caliptra FMC ...
2,864,189 UART:
2,864,332 UART: [state] CFI Enabled
2,875,069 UART: [fht] FMC Alias Private Key: 7
2,983,076 UART: [art] Extend RT PCRs Done
2,983,504 UART: [art] Lock RT PCRs Done
2,984,774 UART: [art] Populate DV Done
2,992,905 UART: [fht] FMC Alias Private Key: 7
2,993,933 UART: [art] Derive CDI
2,994,213 UART: [art] Store in in slot 0x4
3,079,670 UART: [art] Derive Key Pair
3,080,030 UART: [art] Store priv key in slot 0x5
3,092,814 UART: [art] Derive Key Pair - Done
3,107,463 UART: [art] Signing Cert with AUTHO
3,107,943 UART: RITY.KEYID = 7
3,123,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,078 UART: [art] PUB.X = BF04DD04CF6347B7D69CD199DA5AA9192DA2AC70A8679083D1E30DFE9B1FE5E32C385ED7DD2A9A59E152540B73463BA2
3,130,852 UART: [art] PUB.Y = 0DCB005DEA5E72F4B8DB9485E7A3FC8F839DAAE7E34FD74EF13BB9B15F2F6C78161B9902607395AA59AE6DAA18B1A6FF
3,137,798 UART: [art] SIG.R = 6F76B2919BE41187395C7EA87FCD14FBFB9FA5FA06565B31C5A94B7494CE5799D5C3246410206A2792DE371512CBDEEF
3,144,573 UART: [art] SIG.S = 913F215DF31493BB3423E159EE8E22D94B3AA022C1899794C8A73CD1114DDB1AD0976E63AF94C7AFBFCDBD8A6616BD9E
3,168,040 UART: Caliptra RT
3,168,385 UART: [state] CFI Enabled
3,276,312 UART: [rt] RT listening for mailbox commands...
3,276,982 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,024 UART: [rt]cmd =0x44504543, len=24
3,333,603 >>> mbox cmd response data (40 bytes)
3,333,604 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,145 UART: [rt]cmd =0x44504543, len=24
3,389,404 >>> mbox cmd response data (40 bytes)
3,389,405 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,418,912 UART: [rt]cmd =0x44504543, len=24
3,445,049 >>> mbox cmd response data (40 bytes)
3,445,050 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,553 UART: [rt]cmd =0x44504543, len=24
3,501,184 >>> mbox cmd response data (40 bytes)
3,501,185 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,514 UART: [rt]cmd =0x44504543, len=24
3,557,039 >>> mbox cmd response data (40 bytes)
3,557,040 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,421 UART: [rt]cmd =0x44504543, len=24
3,612,518 >>> mbox cmd response data (40 bytes)
3,612,519 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,924 UART: [rt]cmd =0x44504543, len=24
3,668,207 >>> mbox cmd response data (40 bytes)
3,668,208 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,697,701 UART: [rt]cmd =0x44504543, len=24
3,723,942 >>> mbox cmd response data (40 bytes)
3,723,943 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,753,374 UART: [rt]cmd =0x44504543, len=24
3,779,949 >>> mbox cmd response data (40 bytes)
3,779,950 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,479 UART: [rt]cmd =0x44504543, len=24
3,835,654 >>> mbox cmd response data (40 bytes)
3,835,655 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,262 UART: [rt]cmd =0x44504543, len=24
3,891,857 >>> mbox cmd response data (40 bytes)
3,891,858 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,921,201 UART: [rt]cmd =0x44504543, len=24
3,947,504 >>> mbox cmd response data (40 bytes)
3,947,505 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,976,916 UART: [rt]cmd =0x44504543, len=24
4,003,063 >>> mbox cmd response data (40 bytes)
4,003,064 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,032,543 UART: [rt]cmd =0x44504543, len=24
4,059,314 >>> mbox cmd response data (40 bytes)
4,059,315 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,088,878 UART: [rt]cmd =0x44504543, len=24
4,114,793 >>> mbox cmd response data (40 bytes)
4,114,794 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,144,013 UART: [rt]cmd =0x44504543, len=24
4,150,944 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,682 ready_for_fw is high
1,059,682 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,865 >>> mbox cmd response: success
2,689,433 UART:
2,689,449 UART: Running Caliptra FMC ...
2,689,857 UART:
2,690,000 UART: [state] CFI Enabled
2,700,539 UART: [fht] FMC Alias Private Key: 7
2,808,150 UART: [art] Extend RT PCRs Done
2,808,578 UART: [art] Lock RT PCRs Done
2,810,096 UART: [art] Populate DV Done
2,818,113 UART: [fht] FMC Alias Private Key: 7
2,819,101 UART: [art] Derive CDI
2,819,381 UART: [art] Store in in slot 0x4
2,904,336 UART: [art] Derive Key Pair
2,904,696 UART: [art] Store priv key in slot 0x5
2,918,386 UART: [art] Derive Key Pair - Done
2,933,407 UART: [art] Signing Cert with AUTHO
2,933,887 UART: RITY.KEYID = 7
2,948,817 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,582 UART: [art] PUB.X = FE10C6C6E5AD42FF08DA82A8DC003D5F5F86C1596871057AFA232C99B20A30D94E57E2929F660DC1F0CF3DEA5A2D0BBB
2,956,335 UART: [art] PUB.Y = E86F58854E74C032B34989399492221B576A79F1F184823938D84A23C663881031F635A054C3A23AE8F2533679342685
2,963,261 UART: [art] SIG.R = 3130F21CF666872A57DF0C0304D2387AE0475CE82967AD3AB8063E0F0836A576A72E9D7B1BBFB9BDBE5623E1DB2A8D0D
2,970,022 UART: [art] SIG.S = 310701BC32267D6E105D3BF6910767A87BBE0E5CF3703A1C5D53EF3F717688D4B4AEDAD0C67AF45DE8797F1DFF32AE9E
2,993,961 UART: Caliptra RT
2,994,306 UART: [state] CFI Enabled
3,102,161 UART: [rt] RT listening for mailbox commands...
3,102,831 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,061 UART: [rt]cmd =0x44504543, len=24
3,159,284 >>> mbox cmd response data (40 bytes)
3,159,285 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,608 UART: [rt]cmd =0x44504543, len=24
3,214,711 >>> mbox cmd response data (40 bytes)
3,214,712 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,244,273 UART: [rt]cmd =0x44504543, len=24
3,270,116 >>> mbox cmd response data (40 bytes)
3,270,117 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,299,286 UART: [rt]cmd =0x44504543, len=24
3,325,699 >>> mbox cmd response data (40 bytes)
3,325,700 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,354,927 UART: [rt]cmd =0x44504543, len=24
3,381,250 >>> mbox cmd response data (40 bytes)
3,381,251 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,410,732 UART: [rt]cmd =0x44504543, len=24
3,436,813 >>> mbox cmd response data (40 bytes)
3,436,814 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,291 UART: [rt]cmd =0x44504543, len=24
3,492,700 >>> mbox cmd response data (40 bytes)
3,492,701 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,066 UART: [rt]cmd =0x44504543, len=24
3,548,647 >>> mbox cmd response data (40 bytes)
3,548,648 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,285 UART: [rt]cmd =0x44504543, len=24
3,604,520 >>> mbox cmd response data (40 bytes)
3,604,521 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,918 UART: [rt]cmd =0x44504543, len=24
3,660,029 >>> mbox cmd response data (40 bytes)
3,660,030 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,689,605 UART: [rt]cmd =0x44504543, len=24
3,715,708 >>> mbox cmd response data (40 bytes)
3,715,709 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,745,206 UART: [rt]cmd =0x44504543, len=24
3,771,189 >>> mbox cmd response data (40 bytes)
3,771,190 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,800,803 UART: [rt]cmd =0x44504543, len=24
3,827,168 >>> mbox cmd response data (40 bytes)
3,827,169 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,856,628 UART: [rt]cmd =0x44504543, len=24
3,883,175 >>> mbox cmd response data (40 bytes)
3,883,176 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,912,599 UART: [rt]cmd =0x44504543, len=24
3,938,928 >>> mbox cmd response data (40 bytes)
3,938,929 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,452 UART: [rt]cmd =0x44504543, len=24
3,975,427 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,305 UART: [kat] ++
895,457 UART: [kat] sha1
899,665 UART: [kat] SHA2-256
901,605 UART: [kat] SHA2-384
904,410 UART: [kat] SHA2-512-ACC
906,311 UART: [kat] ECC-384
915,818 UART: [kat] HMAC-384Kdf
920,306 UART: [kat] LMS
1,168,618 UART: [kat] --
1,169,725 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,172,937 UART: [idev] ++
1,173,105 UART: [idev] CDI.KEYID = 6
1,173,466 UART: [idev] SUBJECT.KEYID = 7
1,173,891 UART: [idev] UDS.KEYID = 0
1,174,237 ready_for_fw is high
1,174,237 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,749 UART: [idev] Erasing UDS.KEYID = 0
1,198,781 UART: [idev] Sha1 KeyId Algorithm
1,207,837 UART: [idev] --
1,208,994 UART: [ldev] ++
1,209,162 UART: [ldev] CDI.KEYID = 6
1,209,526 UART: [ldev] SUBJECT.KEYID = 5
1,209,953 UART: [ldev] AUTHORITY.KEYID = 7
1,210,416 UART: [ldev] FE.KEYID = 1
1,215,808 UART: [ldev] Erasing FE.KEYID = 1
1,242,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,854 UART: [ldev] --
1,282,362 UART: [fwproc] Wait for Commands...
1,283,103 UART: [fwproc] Recv command 0x46574c44
1,283,836 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,968 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,277 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,023 >>> mbox cmd response: success
2,775,116 UART: [afmc] ++
2,775,284 UART: [afmc] CDI.KEYID = 6
2,775,647 UART: [afmc] SUBJECT.KEYID = 7
2,776,073 UART: [afmc] AUTHORITY.KEYID = 5
2,811,510 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,836 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,587 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,316 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,199 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,918 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,797 UART: [afmc] --
2,854,821 UART: [cold-reset] --
2,855,825 UART: [state] Locking Datavault
2,857,050 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,654 UART: [state] Locking ICCM
2,858,118 UART: [exit] Launching FMC @ 0x40000130
2,863,447 UART:
2,863,463 UART: Running Caliptra FMC ...
2,863,871 UART:
2,863,925 UART: [state] CFI Enabled
2,874,656 UART: [fht] FMC Alias Private Key: 7
2,982,673 UART: [art] Extend RT PCRs Done
2,983,101 UART: [art] Lock RT PCRs Done
2,984,497 UART: [art] Populate DV Done
2,993,020 UART: [fht] FMC Alias Private Key: 7
2,994,008 UART: [art] Derive CDI
2,994,288 UART: [art] Store in in slot 0x4
3,080,099 UART: [art] Derive Key Pair
3,080,459 UART: [art] Store priv key in slot 0x5
3,093,135 UART: [art] Derive Key Pair - Done
3,107,945 UART: [art] Signing Cert with AUTHO
3,108,425 UART: RITY.KEYID = 7
3,123,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,658 UART: [art] PUB.X = C794246D8136D8A480F2BD032225F4F82F6366D9596FED6E0F56AE708D83E3005852E3A676E9FC63E957CF30A6B88828
3,131,398 UART: [art] PUB.Y = B7C2579F833F641632AE13A2FC62A1A58A2DCCF94C19CD5560BE9188463D22C8A7D7B38EB9730800AE8BA95B7DBF514B
3,138,335 UART: [art] SIG.R = 0A4BAE06FD44D4EE6CA2361CEB07C1B0CA5194C9B4DF9612BD30BA150E62EE6EFBB9BF1746317EE976A77DB2109A29DA
3,145,117 UART: [art] SIG.S = 0A82A9DD4EC73BBC35903AC2A176C35BE125FBADD30B890857B2D829D2AFD521906DA907DFA5CE1F54F1CB76DB095567
3,169,113 UART: Caliptra RT
3,169,366 UART: [state] CFI Enabled
3,278,019 UART: [rt] RT listening for mailbox commands...
3,278,689 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,525 UART: [rt]cmd =0x44504543, len=24
3,334,582 >>> mbox cmd response data (40 bytes)
3,334,583 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,958 UART: [rt]cmd =0x44504543, len=24
3,389,675 >>> mbox cmd response data (40 bytes)
3,389,676 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,419,111 UART: [rt]cmd =0x44504543, len=24
3,445,942 >>> mbox cmd response data (40 bytes)
3,445,943 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,475,684 UART: [rt]cmd =0x44504543, len=24
3,501,797 >>> mbox cmd response data (40 bytes)
3,501,798 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,925 UART: [rt]cmd =0x44504543, len=24
3,557,570 >>> mbox cmd response data (40 bytes)
3,557,571 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,587,282 UART: [rt]cmd =0x44504543, len=24
3,613,287 >>> mbox cmd response data (40 bytes)
3,613,288 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,777 UART: [rt]cmd =0x44504543, len=24
3,669,378 >>> mbox cmd response data (40 bytes)
3,669,379 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,784 UART: [rt]cmd =0x44504543, len=24
3,725,291 >>> mbox cmd response data (40 bytes)
3,725,292 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,949 UART: [rt]cmd =0x44504543, len=24
3,781,368 >>> mbox cmd response data (40 bytes)
3,781,369 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,810,808 UART: [rt]cmd =0x44504543, len=24
3,836,783 >>> mbox cmd response data (40 bytes)
3,836,784 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,161 UART: [rt]cmd =0x44504543, len=24
3,892,470 >>> mbox cmd response data (40 bytes)
3,892,471 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,921,902 UART: [rt]cmd =0x44504543, len=24
3,948,419 >>> mbox cmd response data (40 bytes)
3,948,420 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,977,789 UART: [rt]cmd =0x44504543, len=24
4,004,316 >>> mbox cmd response data (40 bytes)
4,004,317 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,033,700 UART: [rt]cmd =0x44504543, len=24
4,059,917 >>> mbox cmd response data (40 bytes)
4,059,918 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,089,471 UART: [rt]cmd =0x44504543, len=24
4,115,608 >>> mbox cmd response data (40 bytes)
4,115,609 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,145,044 UART: [rt]cmd =0x44504543, len=24
4,152,211 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,310 ready_for_fw is high
1,055,310 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,227 >>> mbox cmd response: success
2,683,127 UART:
2,683,143 UART: Running Caliptra FMC ...
2,683,551 UART:
2,683,605 UART: [state] CFI Enabled
2,694,044 UART: [fht] FMC Alias Private Key: 7
2,801,995 UART: [art] Extend RT PCRs Done
2,802,423 UART: [art] Lock RT PCRs Done
2,803,797 UART: [art] Populate DV Done
2,812,142 UART: [fht] FMC Alias Private Key: 7
2,813,140 UART: [art] Derive CDI
2,813,420 UART: [art] Store in in slot 0x4
2,899,393 UART: [art] Derive Key Pair
2,899,753 UART: [art] Store priv key in slot 0x5
2,913,023 UART: [art] Derive Key Pair - Done
2,927,690 UART: [art] Signing Cert with AUTHO
2,928,170 UART: RITY.KEYID = 7
2,943,320 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,085 UART: [art] PUB.X = F6618470037C507C9941798725D5D3DD4760C62EB9DB75E06320DB4D3CC1D44E458745F764177508C15592EE01F17BDC
2,950,840 UART: [art] PUB.Y = 25A7E7F7C1B0FB1B4ECA0F89E3B5E5990D3132EA4614ADB8EC2CF5133F177E69E18BF65F5B1C1C50ED2550E41E4A7C9F
2,957,804 UART: [art] SIG.R = 315482D94C259FACAD1AA8471B49287E3035A23CFA33BC6D575BD9F053BB7753C4556B3CF700407274DD0312EF5A5BA8
2,964,555 UART: [art] SIG.S = 452E3AF2731B31A7FC4A3999CFB1931D81BDB0907CAA8DBB418843E162A973220A618FF61BCD7CC4577082774B56F563
2,988,101 UART: Caliptra RT
2,988,354 UART: [state] CFI Enabled
3,095,709 UART: [rt] RT listening for mailbox commands...
3,096,379 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,423 UART: [rt]cmd =0x44504543, len=24
3,152,474 >>> mbox cmd response data (40 bytes)
3,152,475 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,070 UART: [rt]cmd =0x44504543, len=24
3,208,419 >>> mbox cmd response data (40 bytes)
3,208,420 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,237,653 UART: [rt]cmd =0x44504543, len=24
3,264,028 >>> mbox cmd response data (40 bytes)
3,264,029 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,293,476 UART: [rt]cmd =0x44504543, len=24
3,319,599 >>> mbox cmd response data (40 bytes)
3,319,600 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,031 UART: [rt]cmd =0x44504543, len=24
3,375,130 >>> mbox cmd response data (40 bytes)
3,375,131 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,680 UART: [rt]cmd =0x44504543, len=24
3,431,023 >>> mbox cmd response data (40 bytes)
3,431,024 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,460,283 UART: [rt]cmd =0x44504543, len=24
3,486,466 >>> mbox cmd response data (40 bytes)
3,486,467 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,226 UART: [rt]cmd =0x44504543, len=24
3,542,749 >>> mbox cmd response data (40 bytes)
3,542,750 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,257 UART: [rt]cmd =0x44504543, len=24
3,598,272 >>> mbox cmd response data (40 bytes)
3,598,273 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,622 UART: [rt]cmd =0x44504543, len=24
3,653,493 >>> mbox cmd response data (40 bytes)
3,653,494 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,682,895 UART: [rt]cmd =0x44504543, len=24
3,709,328 >>> mbox cmd response data (40 bytes)
3,709,329 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,662 UART: [rt]cmd =0x44504543, len=24
3,765,063 >>> mbox cmd response data (40 bytes)
3,765,064 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,794,561 UART: [rt]cmd =0x44504543, len=24
3,821,366 >>> mbox cmd response data (40 bytes)
3,821,367 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,851,088 UART: [rt]cmd =0x44504543, len=24
3,877,613 >>> mbox cmd response data (40 bytes)
3,877,614 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,906,929 UART: [rt]cmd =0x44504543, len=24
3,933,432 >>> mbox cmd response data (40 bytes)
3,933,433 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,962,722 UART: [rt]cmd =0x44504543, len=24
3,969,631 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
891,643 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,772 UART: [kat] ++
895,924 UART: [kat] sha1
900,350 UART: [kat] SHA2-256
902,290 UART: [kat] SHA2-384
905,085 UART: [kat] SHA2-512-ACC
906,986 UART: [kat] ECC-384
917,013 UART: [kat] HMAC-384Kdf
921,763 UART: [kat] LMS
1,170,075 UART: [kat] --
1,171,006 UART: [cold-reset] ++
1,171,502 UART: [fht] FHT @ 0x50003400
1,174,232 UART: [idev] ++
1,174,400 UART: [idev] CDI.KEYID = 6
1,174,761 UART: [idev] SUBJECT.KEYID = 7
1,175,186 UART: [idev] UDS.KEYID = 0
1,175,532 ready_for_fw is high
1,175,532 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,148 UART: [idev] Erasing UDS.KEYID = 0
1,200,526 UART: [idev] Sha1 KeyId Algorithm
1,209,470 UART: [idev] --
1,210,577 UART: [ldev] ++
1,210,745 UART: [ldev] CDI.KEYID = 6
1,211,109 UART: [ldev] SUBJECT.KEYID = 5
1,211,536 UART: [ldev] AUTHORITY.KEYID = 7
1,211,999 UART: [ldev] FE.KEYID = 1
1,217,369 UART: [ldev] Erasing FE.KEYID = 1
1,244,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,733 UART: [ldev] --
1,283,251 UART: [fwproc] Wait for Commands...
1,283,826 UART: [fwproc] Recv command 0x46574c44
1,284,559 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,219 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,528 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,380 >>> mbox cmd response: success
2,775,565 UART: [afmc] ++
2,775,733 UART: [afmc] CDI.KEYID = 6
2,776,096 UART: [afmc] SUBJECT.KEYID = 7
2,776,522 UART: [afmc] AUTHORITY.KEYID = 5
2,812,591 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,053 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,804 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,533 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,416 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,135 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,030 UART: [afmc] --
2,856,074 UART: [cold-reset] --
2,856,794 UART: [state] Locking Datavault
2,857,681 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,285 UART: [state] Locking ICCM
2,858,947 UART: [exit] Launching FMC @ 0x40000130
2,864,276 UART:
2,864,292 UART: Running Caliptra FMC ...
2,864,700 UART:
2,864,843 UART: [state] CFI Enabled
2,875,390 UART: [fht] FMC Alias Private Key: 7
2,983,453 UART: [art] Extend RT PCRs Done
2,983,881 UART: [art] Lock RT PCRs Done
2,985,339 UART: [art] Populate DV Done
2,993,600 UART: [fht] FMC Alias Private Key: 7
2,994,712 UART: [art] Derive CDI
2,994,992 UART: [art] Store in in slot 0x4
3,080,709 UART: [art] Derive Key Pair
3,081,069 UART: [art] Store priv key in slot 0x5
3,094,499 UART: [art] Derive Key Pair - Done
3,109,474 UART: [art] Signing Cert with AUTHO
3,109,954 UART: RITY.KEYID = 7
3,125,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,447 UART: [art] PUB.X = 1077E6982670176E67C7920E320E92C087D7A3E6B6BA5DD6965D616A16521622BA300783AB6FB2A7DCB6949C134924B9
3,133,202 UART: [art] PUB.Y = 709D807C3FC2809F0619EBAD8856E7C108B25CE76811CE368372DFF2037EE7FE315D0AAD3EC7FEB8773050152DE6A5AE
3,140,152 UART: [art] SIG.R = 3CD9B86C60D1060ACECEA9880129C9FB8A4BDFA3B941ED1E33F530971E823D44F0863F02286D822AA61CF7D57F0785BD
3,146,919 UART: [art] SIG.S = 557A5E38FC605B605DBB1B908B44ED7FC1E11BF66C73EA0218315BBE9C20384944878B966FE0F9AF9C3719A9CFE04B45
3,170,803 UART: Caliptra RT
3,171,148 UART: [state] CFI Enabled
3,279,639 UART: [rt] RT listening for mailbox commands...
3,280,309 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,255 UART: [rt]cmd =0x44504543, len=24
3,336,926 >>> mbox cmd response data (40 bytes)
3,336,927 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,366,656 UART: [rt]cmd =0x44504543, len=24
3,393,375 >>> mbox cmd response data (40 bytes)
3,393,376 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,422,965 UART: [rt]cmd =0x44504543, len=24
3,448,926 >>> mbox cmd response data (40 bytes)
3,448,927 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,478,394 UART: [rt]cmd =0x44504543, len=24
3,504,441 >>> mbox cmd response data (40 bytes)
3,504,442 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,803 UART: [rt]cmd =0x44504543, len=24
3,559,914 >>> mbox cmd response data (40 bytes)
3,559,915 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,589,536 UART: [rt]cmd =0x44504543, len=24
3,616,171 >>> mbox cmd response data (40 bytes)
3,616,172 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,439 UART: [rt]cmd =0x44504543, len=24
3,672,024 >>> mbox cmd response data (40 bytes)
3,672,025 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,628 UART: [rt]cmd =0x44504543, len=24
3,727,969 >>> mbox cmd response data (40 bytes)
3,727,970 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,757,513 UART: [rt]cmd =0x44504543, len=24
3,783,648 >>> mbox cmd response data (40 bytes)
3,783,649 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,813,048 UART: [rt]cmd =0x44504543, len=24
3,839,579 >>> mbox cmd response data (40 bytes)
3,839,580 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,868,955 UART: [rt]cmd =0x44504543, len=24
3,895,238 >>> mbox cmd response data (40 bytes)
3,895,239 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,924,614 UART: [rt]cmd =0x44504543, len=24
3,950,789 >>> mbox cmd response data (40 bytes)
3,950,790 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,980,291 UART: [rt]cmd =0x44504543, len=24
4,007,400 >>> mbox cmd response data (40 bytes)
4,007,401 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,037,076 UART: [rt]cmd =0x44504543, len=24
4,063,817 >>> mbox cmd response data (40 bytes)
4,063,818 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,093,595 UART: [rt]cmd =0x44504543, len=24
4,119,740 >>> mbox cmd response data (40 bytes)
4,119,741 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,148,976 UART: [rt]cmd =0x44504543, len=24
4,156,195 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,467 ready_for_fw is high
1,056,467 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,908 >>> mbox cmd response: success
2,685,124 UART:
2,685,140 UART: Running Caliptra FMC ...
2,685,548 UART:
2,685,691 UART: [state] CFI Enabled
2,695,976 UART: [fht] FMC Alias Private Key: 7
2,803,927 UART: [art] Extend RT PCRs Done
2,804,355 UART: [art] Lock RT PCRs Done
2,805,793 UART: [art] Populate DV Done
2,814,340 UART: [fht] FMC Alias Private Key: 7
2,815,452 UART: [art] Derive CDI
2,815,732 UART: [art] Store in in slot 0x4
2,901,165 UART: [art] Derive Key Pair
2,901,525 UART: [art] Store priv key in slot 0x5
2,914,681 UART: [art] Derive Key Pair - Done
2,929,589 UART: [art] Signing Cert with AUTHO
2,930,069 UART: RITY.KEYID = 7
2,945,311 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,076 UART: [art] PUB.X = 96046EAF14F9D6633B0A1654B15307043A420B6ABC24258F8EC2039B17CFCB8FCDDC8D53CCACD543A02B323C00A439F3
2,952,818 UART: [art] PUB.Y = 2E450784DA5D09C341DCDA03C5F93B15EA411C525F0CC40E5BA9A4F2EE6DD3BCAC23DED0AE9F0CF8CCDE0ED32C0D6711
2,959,776 UART: [art] SIG.R = 30AAB910C1A47A2E7F8F4E57962DE31368624386784A4FAB6D86491908EB85C245C9B0B2577AA193AF307DCE0700E6CB
2,966,522 UART: [art] SIG.S = D483568B0C47F0C82B7DDE8DD54D2E0B9727EA0B93793F6489012FD2E4E96F02AEC00D906972AF56E5D808800994A1EE
2,989,981 UART: Caliptra RT
2,990,326 UART: [state] CFI Enabled
3,099,277 UART: [rt] RT listening for mailbox commands...
3,099,947 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,847 UART: [rt]cmd =0x44504543, len=24
3,155,564 >>> mbox cmd response data (40 bytes)
3,155,565 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,770 UART: [rt]cmd =0x44504543, len=24
3,211,063 >>> mbox cmd response data (40 bytes)
3,211,064 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,240,751 UART: [rt]cmd =0x44504543, len=24
3,267,050 >>> mbox cmd response data (40 bytes)
3,267,051 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,296,588 UART: [rt]cmd =0x44504543, len=24
3,322,651 >>> mbox cmd response data (40 bytes)
3,322,652 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,352,261 UART: [rt]cmd =0x44504543, len=24
3,378,860 >>> mbox cmd response data (40 bytes)
3,378,861 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,408,336 UART: [rt]cmd =0x44504543, len=24
3,434,971 >>> mbox cmd response data (40 bytes)
3,434,972 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,545 UART: [rt]cmd =0x44504543, len=24
3,491,240 >>> mbox cmd response data (40 bytes)
3,491,241 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,754 UART: [rt]cmd =0x44504543, len=24
3,547,347 >>> mbox cmd response data (40 bytes)
3,547,348 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,683 UART: [rt]cmd =0x44504543, len=24
3,603,076 >>> mbox cmd response data (40 bytes)
3,603,077 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,586 UART: [rt]cmd =0x44504543, len=24
3,658,605 >>> mbox cmd response data (40 bytes)
3,658,606 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,688,197 UART: [rt]cmd =0x44504543, len=24
3,714,424 >>> mbox cmd response data (40 bytes)
3,714,425 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,842 UART: [rt]cmd =0x44504543, len=24
3,770,147 >>> mbox cmd response data (40 bytes)
3,770,148 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,799,853 UART: [rt]cmd =0x44504543, len=24
3,825,860 >>> mbox cmd response data (40 bytes)
3,825,861 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,855,298 UART: [rt]cmd =0x44504543, len=24
3,881,769 >>> mbox cmd response data (40 bytes)
3,881,770 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,911,349 UART: [rt]cmd =0x44504543, len=24
3,937,390 >>> mbox cmd response data (40 bytes)
3,937,391 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,762 UART: [rt]cmd =0x44504543, len=24
3,973,855 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,837 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,519 UART: [kat] SHA2-256
882,450 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,565 UART: [kat] ++
886,717 UART: [kat] sha1
891,013 UART: [kat] SHA2-256
892,951 UART: [kat] SHA2-384
895,698 UART: [kat] SHA2-512-ACC
897,599 UART: [kat] ECC-384
903,528 UART: [kat] HMAC-384Kdf
908,168 UART: [kat] LMS
1,476,364 UART: [kat] --
1,477,097 UART: [cold-reset] ++
1,477,657 UART: [fht] Storing FHT @ 0x50003400
1,480,620 UART: [idev] ++
1,480,788 UART: [idev] CDI.KEYID = 6
1,481,148 UART: [idev] SUBJECT.KEYID = 7
1,481,572 UART: [idev] UDS.KEYID = 0
1,481,917 ready_for_fw is high
1,481,917 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,578 UART: [idev] Erasing UDS.KEYID = 0
1,505,912 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,576 UART: [idev] --
1,515,481 UART: [ldev] ++
1,515,649 UART: [ldev] CDI.KEYID = 6
1,516,012 UART: [ldev] SUBJECT.KEYID = 5
1,516,438 UART: [ldev] AUTHORITY.KEYID = 7
1,516,901 UART: [ldev] FE.KEYID = 1
1,521,755 UART: [ldev] Erasing FE.KEYID = 1
1,547,416 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,422 UART: [ldev] --
1,586,865 UART: [fwproc] Waiting for Commands...
1,587,498 UART: [fwproc] Received command 0x46574c44
1,588,289 UART: [fwproc] Received Image of size 114332 bytes
2,886,377 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,385 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,737 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,692 >>> mbox cmd response: success
3,079,854 UART: [afmc] ++
3,080,022 UART: [afmc] CDI.KEYID = 6
3,080,384 UART: [afmc] SUBJECT.KEYID = 7
3,080,809 UART: [afmc] AUTHORITY.KEYID = 5
3,116,132 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,504 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,284 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,012 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,897 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,587 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,502 UART: [afmc] --
3,159,452 UART: [cold-reset] --
3,160,182 UART: [state] Locking Datavault
3,161,487 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,091 UART: [state] Locking ICCM
3,162,537 UART: [exit] Launching FMC @ 0x40000130
3,167,866 UART:
3,167,882 UART: Running Caliptra FMC ...
3,168,290 UART:
3,168,344 UART: [state] CFI Enabled
3,178,927 UART: [fht] FMC Alias Private Key: 7
3,286,774 UART: [art] Extend RT PCRs Done
3,287,202 UART: [art] Lock RT PCRs Done
3,288,842 UART: [art] Populate DV Done
3,297,183 UART: [fht] FMC Alias Private Key: 7
3,298,253 UART: [art] Derive CDI
3,298,533 UART: [art] Store in in slot 0x4
3,383,980 UART: [art] Derive Key Pair
3,384,340 UART: [art] Store priv key in slot 0x5
3,397,424 UART: [art] Derive Key Pair - Done
3,412,226 UART: [art] Signing Cert with AUTHO
3,412,706 UART: RITY.KEYID = 7
3,427,894 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,659 UART: [art] PUB.X = 74BBF397E1AD7DC4B5B54AD19671CC68F5B905FCC29AC18C1FDE9910909A8444E5BD715D113006BEDE3AFE3A3937DCE5
3,435,443 UART: [art] PUB.Y = FC815B514A12B17E774E25C7363C5BF6A8B667BF10DE1BD1CB7AAB6D625E7E8DFC654D2925C61A68794B59A38BB3F6F5
3,442,409 UART: [art] SIG.R = 79B345A8DC40F5E629D1807F869412CE61AA49400650C96B41FA462CE739AB15E80E9916C190C03DA6FC84A7EA957E3B
3,449,177 UART: [art] SIG.S = 3608016795BA30F87ED239D7BF977504730545AFB81762696FF02B8D55A84DF5CE76B6F86DA470ABAB848940D0229906
3,473,241 UART: Caliptra RT
3,473,494 UART: [state] CFI Enabled
3,580,908 UART: [rt] RT listening for mailbox commands...
3,581,578 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,324 UART: [rt]cmd =0x49444550, len=8
3,613,177 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,665 ready_for_fw is high
1,362,665 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,074 >>> mbox cmd response: success
2,988,220 UART:
2,988,236 UART: Running Caliptra FMC ...
2,988,644 UART:
2,988,698 UART: [state] CFI Enabled
2,999,179 UART: [fht] FMC Alias Private Key: 7
3,107,326 UART: [art] Extend RT PCRs Done
3,107,754 UART: [art] Lock RT PCRs Done
3,109,426 UART: [art] Populate DV Done
3,117,553 UART: [fht] FMC Alias Private Key: 7
3,118,561 UART: [art] Derive CDI
3,118,841 UART: [art] Store in in slot 0x4
3,204,706 UART: [art] Derive Key Pair
3,205,066 UART: [art] Store priv key in slot 0x5
3,217,782 UART: [art] Derive Key Pair - Done
3,232,313 UART: [art] Signing Cert with AUTHO
3,232,793 UART: RITY.KEYID = 7
3,247,389 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,154 UART: [art] PUB.X = 6AE41A54E42B1FF5F34297AA2B8B5C9DFE5658F2570CDB3BADB5AB17AB5A2226E1347A5D65AD53D60FBC870FAC8347BE
3,254,939 UART: [art] PUB.Y = 14FBD27D8D2ABA5CFC03285824993908896178BAF2AE6619A02FC1AE628EAAECAB1BD679F2B3F4357C8D112A0B994426
3,261,892 UART: [art] SIG.R = 5B26C6E270D906DBF30B1A1B3291945D439264AE5CC263AC31E141A7181C0456452C06C6B52C00A4E2DAD9DD5E3CD66F
3,268,636 UART: [art] SIG.S = E8603229EC3DD2EC9B2A7BB8D68A55EFF2793A6351C8495495036AEA34A949E0F112D67AC5192FFE1BE5FA51D1E373AF
3,292,180 UART: Caliptra RT
3,292,433 UART: [state] CFI Enabled
3,400,524 UART: [rt] RT listening for mailbox commands...
3,401,194 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,188 UART: [rt]cmd =0x49444550, len=8
3,433,007 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
87,008 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,632 UART: [kat] SHA2-256
882,563 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,678 UART: [kat] ++
886,830 UART: [kat] sha1
890,946 UART: [kat] SHA2-256
892,884 UART: [kat] SHA2-384
895,731 UART: [kat] SHA2-512-ACC
897,632 UART: [kat] ECC-384
903,221 UART: [kat] HMAC-384Kdf
907,861 UART: [kat] LMS
1,476,057 UART: [kat] --
1,477,114 UART: [cold-reset] ++
1,477,532 UART: [fht] Storing FHT @ 0x50003400
1,480,521 UART: [idev] ++
1,480,689 UART: [idev] CDI.KEYID = 6
1,481,049 UART: [idev] SUBJECT.KEYID = 7
1,481,473 UART: [idev] UDS.KEYID = 0
1,481,818 ready_for_fw is high
1,481,818 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,443 UART: [idev] Erasing UDS.KEYID = 0
1,506,251 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,077 UART: [idev] --
1,516,256 UART: [ldev] ++
1,516,424 UART: [ldev] CDI.KEYID = 6
1,516,787 UART: [ldev] SUBJECT.KEYID = 5
1,517,213 UART: [ldev] AUTHORITY.KEYID = 7
1,517,676 UART: [ldev] FE.KEYID = 1
1,523,082 UART: [ldev] Erasing FE.KEYID = 1
1,548,263 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,913 UART: [ldev] --
1,587,260 UART: [fwproc] Waiting for Commands...
1,588,091 UART: [fwproc] Received command 0x46574c44
1,588,882 UART: [fwproc] Received Image of size 114332 bytes
2,887,340 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,294 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,646 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,545 >>> mbox cmd response: success
3,081,737 UART: [afmc] ++
3,081,905 UART: [afmc] CDI.KEYID = 6
3,082,267 UART: [afmc] SUBJECT.KEYID = 7
3,082,692 UART: [afmc] AUTHORITY.KEYID = 5
3,118,433 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,659 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,439 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,167 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,052 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,742 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,631 UART: [afmc] --
3,161,559 UART: [cold-reset] --
3,162,367 UART: [state] Locking Datavault
3,163,606 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,210 UART: [state] Locking ICCM
3,164,636 UART: [exit] Launching FMC @ 0x40000130
3,169,965 UART:
3,169,981 UART: Running Caliptra FMC ...
3,170,389 UART:
3,170,532 UART: [state] CFI Enabled
3,181,403 UART: [fht] FMC Alias Private Key: 7
3,289,492 UART: [art] Extend RT PCRs Done
3,289,920 UART: [art] Lock RT PCRs Done
3,291,502 UART: [art] Populate DV Done
3,299,751 UART: [fht] FMC Alias Private Key: 7
3,300,807 UART: [art] Derive CDI
3,301,087 UART: [art] Store in in slot 0x4
3,386,982 UART: [art] Derive Key Pair
3,387,342 UART: [art] Store priv key in slot 0x5
3,400,666 UART: [art] Derive Key Pair - Done
3,415,456 UART: [art] Signing Cert with AUTHO
3,415,936 UART: RITY.KEYID = 7
3,430,690 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,455 UART: [art] PUB.X = 8667AB64A1CAEF76FC96E1E79CB834798D7D073140F77A20863E6D684154BAE0F3F39E854E94E5DB1131CF25F11D2C3C
3,438,230 UART: [art] PUB.Y = FE0297B121F88ECD2B20F1E5A15B41BD4555D69D6E4FC9614072792A1687975E88EE97CEA8C6C58C23A4FF8B3EFFC8C6
3,445,191 UART: [art] SIG.R = D2A6705DFBBB3446B5D90CF90CDBDBA47B53893584DAFE1B33E6D79BCF1153264F92FE6619A16D52B318C9BC9EADCE20
3,451,977 UART: [art] SIG.S = AE5D01E2C51A66C7AB6E95BBB1FF3A2AD02A594312E307A7DACB2AEDAEAA8B4C94CA8A3C40FA645B04F89A105E3E71AD
3,475,797 UART: Caliptra RT
3,476,142 UART: [state] CFI Enabled
3,583,416 UART: [rt] RT listening for mailbox commands...
3,584,086 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,064 UART: [rt]cmd =0x49444550, len=8
3,616,027 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,378 ready_for_fw is high
1,363,378 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,645 >>> mbox cmd response: success
2,990,565 UART:
2,990,581 UART: Running Caliptra FMC ...
2,990,989 UART:
2,991,132 UART: [state] CFI Enabled
3,001,917 UART: [fht] FMC Alias Private Key: 7
3,110,490 UART: [art] Extend RT PCRs Done
3,110,918 UART: [art] Lock RT PCRs Done
3,112,292 UART: [art] Populate DV Done
3,120,327 UART: [fht] FMC Alias Private Key: 7
3,121,395 UART: [art] Derive CDI
3,121,675 UART: [art] Store in in slot 0x4
3,207,234 UART: [art] Derive Key Pair
3,207,594 UART: [art] Store priv key in slot 0x5
3,221,298 UART: [art] Derive Key Pair - Done
3,236,128 UART: [art] Signing Cert with AUTHO
3,236,608 UART: RITY.KEYID = 7
3,251,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,503 UART: [art] PUB.X = 5AA6B659BFC7CE1590F9FA766AE3FCA41DBFF3075FE0C9DFD2C0E4A6B5215D643A69916C1663EC8592A423C3917B5DB7
3,259,288 UART: [art] PUB.Y = 083937C55CC937A8E29EE8EB7D299ABD5A3AD8279DB7213AB84F5441310DC3A7B9AF80E1399C92471D4C1C03376A890E
3,266,232 UART: [art] SIG.R = 9863AE9552563C7E2A78B8775F4B35CD6B3E52959F659E59BC97EAE065ABDCA523B0E8ECE0CFD5B245529F8F587D8C2E
3,273,016 UART: [art] SIG.S = 698A3773EC73A4D126979BD1D969C25F2C6A6E632E337312C78C02110DF435258DCA1F9E50EAC18A80B241E806EAF404
3,296,833 UART: Caliptra RT
3,297,178 UART: [state] CFI Enabled
3,405,133 UART: [rt] RT listening for mailbox commands...
3,405,803 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,517 UART: [rt]cmd =0x49444550, len=8
3,437,186 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,780 UART: [kat] SHA2-256
893,430 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,555 UART: [kat] ++
897,707 UART: [kat] sha1
902,045 UART: [kat] SHA2-256
903,985 UART: [kat] SHA2-384
906,618 UART: [kat] SHA2-512-ACC
908,519 UART: [kat] ECC-384
918,334 UART: [kat] HMAC-384Kdf
922,890 UART: [kat] LMS
1,171,218 UART: [kat] --
1,172,169 UART: [cold-reset] ++
1,172,573 UART: [fht] FHT @ 0x50003400
1,175,348 UART: [idev] ++
1,175,516 UART: [idev] CDI.KEYID = 6
1,175,876 UART: [idev] SUBJECT.KEYID = 7
1,176,300 UART: [idev] UDS.KEYID = 0
1,176,645 ready_for_fw is high
1,176,645 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,224 UART: [idev] Erasing UDS.KEYID = 0
1,201,611 UART: [idev] Sha1 KeyId Algorithm
1,210,173 UART: [idev] --
1,211,323 UART: [ldev] ++
1,211,491 UART: [ldev] CDI.KEYID = 6
1,211,854 UART: [ldev] SUBJECT.KEYID = 5
1,212,280 UART: [ldev] AUTHORITY.KEYID = 7
1,212,743 UART: [ldev] FE.KEYID = 1
1,218,023 UART: [ldev] Erasing FE.KEYID = 1
1,244,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,267 UART: [ldev] --
1,283,570 UART: [fwproc] Wait for Commands...
1,284,214 UART: [fwproc] Recv command 0x46574c44
1,284,942 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,628 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,932 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,685 >>> mbox cmd response: success
2,775,859 UART: [afmc] ++
2,776,027 UART: [afmc] CDI.KEYID = 6
2,776,389 UART: [afmc] SUBJECT.KEYID = 7
2,776,814 UART: [afmc] AUTHORITY.KEYID = 5
2,812,211 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,510 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,258 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,986 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,871 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,590 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,474 UART: [afmc] --
2,855,354 UART: [cold-reset] --
2,856,352 UART: [state] Locking Datavault
2,857,701 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,305 UART: [state] Locking ICCM
2,858,975 UART: [exit] Launching FMC @ 0x40000130
2,864,304 UART:
2,864,320 UART: Running Caliptra FMC ...
2,864,728 UART:
2,864,782 UART: [state] CFI Enabled
2,875,279 UART: [fht] FMC Alias Private Key: 7
2,983,014 UART: [art] Extend RT PCRs Done
2,983,442 UART: [art] Lock RT PCRs Done
2,985,050 UART: [art] Populate DV Done
2,993,481 UART: [fht] FMC Alias Private Key: 7
2,994,619 UART: [art] Derive CDI
2,994,899 UART: [art] Store in in slot 0x4
3,080,336 UART: [art] Derive Key Pair
3,080,696 UART: [art] Store priv key in slot 0x5
3,093,898 UART: [art] Derive Key Pair - Done
3,108,595 UART: [art] Signing Cert with AUTHO
3,109,075 UART: RITY.KEYID = 7
3,124,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,334 UART: [art] PUB.X = 72824ACCD70B8B2065BD2CE65CEF0F3CC80EC543A87E75B2A2B27DBDBAA3B0C6CFC6B6E82BF5E22475832D174FF5911B
3,132,119 UART: [art] PUB.Y = 61C7371F77CC01108476228FB0E6DCC79E5EBB8718B7C6FB3B2BAB6FD00C56214DED30947C837FFC3656A85AC8338ABF
3,139,077 UART: [art] SIG.R = 992A5499A42343A7ECEA5F418268A182B2ADC8309622C555BD1730EEAFF0F60CDED434012F22D9DDFC6AC9B24D6E1B4D
3,145,857 UART: [art] SIG.S = AC33457736B45714CFCED91445AC5D612E904665E5520181A3355475F6FCFBD59646FC36D110703B990B333B77FBACA1
3,169,622 UART: Caliptra RT
3,169,875 UART: [state] CFI Enabled
3,277,241 UART: [rt] RT listening for mailbox commands...
3,277,911 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,675 UART: [rt]cmd =0x49444550, len=8
3,309,614 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,583 ready_for_fw is high
1,059,583 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,134 >>> mbox cmd response: success
2,689,042 UART:
2,689,058 UART: Running Caliptra FMC ...
2,689,466 UART:
2,689,520 UART: [state] CFI Enabled
2,700,331 UART: [fht] FMC Alias Private Key: 7
2,807,794 UART: [art] Extend RT PCRs Done
2,808,222 UART: [art] Lock RT PCRs Done
2,809,650 UART: [art] Populate DV Done
2,817,929 UART: [fht] FMC Alias Private Key: 7
2,819,039 UART: [art] Derive CDI
2,819,319 UART: [art] Store in in slot 0x4
2,905,238 UART: [art] Derive Key Pair
2,905,598 UART: [art] Store priv key in slot 0x5
2,919,210 UART: [art] Derive Key Pair - Done
2,933,878 UART: [art] Signing Cert with AUTHO
2,934,358 UART: RITY.KEYID = 7
2,949,930 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,695 UART: [art] PUB.X = 5A52156427FB21004B4CC6FB1890787B9345AA8875555FC3C50A4E2C5DA4A3C755043F6F8CDFCFE40A3029BDA1EA801F
2,957,444 UART: [art] PUB.Y = 138864B465D13DBA5E007028BBB386E80714A5B3605CC2CA3BD8D7777BE9D1362FB75D62F39F7A1ED970C4127C36851C
2,964,373 UART: [art] SIG.R = 90CFAD9E9A3AEFAB971F6C074DD21275DB43585AB01B0273276EDF29FDE391EF5048C5FF67322624648156A3029C9200
2,971,116 UART: [art] SIG.S = CE07A242CB068EBB27C9AABE4C4B563372A723749092F1C35159D19FD8161C86946F4751CE31965592421C1DC4155F70
2,995,167 UART: Caliptra RT
2,995,420 UART: [state] CFI Enabled
3,102,398 UART: [rt] RT listening for mailbox commands...
3,103,068 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,922 UART: [rt]cmd =0x49444550, len=8
3,134,991 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,994 UART: [state] WD Timer not started. Device not locked for debugging
88,341 UART: [kat] SHA2-256
893,991 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,116 UART: [kat] ++
898,268 UART: [kat] sha1
902,340 UART: [kat] SHA2-256
904,280 UART: [kat] SHA2-384
907,167 UART: [kat] SHA2-512-ACC
909,068 UART: [kat] ECC-384
918,887 UART: [kat] HMAC-384Kdf
923,555 UART: [kat] LMS
1,171,883 UART: [kat] --
1,172,698 UART: [cold-reset] ++
1,173,228 UART: [fht] FHT @ 0x50003400
1,175,879 UART: [idev] ++
1,176,047 UART: [idev] CDI.KEYID = 6
1,176,407 UART: [idev] SUBJECT.KEYID = 7
1,176,831 UART: [idev] UDS.KEYID = 0
1,177,176 ready_for_fw is high
1,177,176 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,253 UART: [idev] Erasing UDS.KEYID = 0
1,202,772 UART: [idev] Sha1 KeyId Algorithm
1,211,104 UART: [idev] --
1,212,024 UART: [ldev] ++
1,212,192 UART: [ldev] CDI.KEYID = 6
1,212,555 UART: [ldev] SUBJECT.KEYID = 5
1,212,981 UART: [ldev] AUTHORITY.KEYID = 7
1,213,444 UART: [ldev] FE.KEYID = 1
1,218,664 UART: [ldev] Erasing FE.KEYID = 1
1,245,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,606 UART: [ldev] --
1,284,943 UART: [fwproc] Wait for Commands...
1,285,573 UART: [fwproc] Recv command 0x46574c44
1,286,301 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,444 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,275 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,579 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,388 >>> mbox cmd response: success
2,775,556 UART: [afmc] ++
2,775,724 UART: [afmc] CDI.KEYID = 6
2,776,086 UART: [afmc] SUBJECT.KEYID = 7
2,776,511 UART: [afmc] AUTHORITY.KEYID = 5
2,811,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,141 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,889 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,617 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,502 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,221 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,811 UART: [afmc] --
2,854,723 UART: [cold-reset] --
2,855,219 UART: [state] Locking Datavault
2,856,348 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,952 UART: [state] Locking ICCM
2,857,426 UART: [exit] Launching FMC @ 0x40000130
2,862,755 UART:
2,862,771 UART: Running Caliptra FMC ...
2,863,179 UART:
2,863,322 UART: [state] CFI Enabled
2,873,741 UART: [fht] FMC Alias Private Key: 7
2,981,260 UART: [art] Extend RT PCRs Done
2,981,688 UART: [art] Lock RT PCRs Done
2,983,258 UART: [art] Populate DV Done
2,991,399 UART: [fht] FMC Alias Private Key: 7
2,992,579 UART: [art] Derive CDI
2,992,859 UART: [art] Store in in slot 0x4
3,078,204 UART: [art] Derive Key Pair
3,078,564 UART: [art] Store priv key in slot 0x5
3,091,866 UART: [art] Derive Key Pair - Done
3,106,606 UART: [art] Signing Cert with AUTHO
3,107,086 UART: RITY.KEYID = 7
3,122,532 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,297 UART: [art] PUB.X = 351019EB1F0DD38DE664FD77DF38E7883102F59C51B28EAEBED84A0CE54B070334744AF3C1B8D77C586FE0C0055D3FBF
3,130,063 UART: [art] PUB.Y = DC52E4C88502FAFFF0DB4296CEA4AE3AE129FE3DC1F48770CA100EEB48E4AA062F473DEF3622CBD92412EC913FF96D27
3,137,028 UART: [art] SIG.R = 02FA2759FC52E22147A53A2CB5F00406AA94AEF610C2D3266A5430E2914CAC3D9CB790616F7F2530E74753EA9B922997
3,143,789 UART: [art] SIG.S = C24E26E7C997BCB020BBF7EF81A75886F388EC22733E735C73FBD5306E29C16C56CB1AB51EE2C14A8BC1B6180E96AAE8
3,167,583 UART: Caliptra RT
3,167,928 UART: [state] CFI Enabled
3,275,785 UART: [rt] RT listening for mailbox commands...
3,276,455 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,899 UART: [rt]cmd =0x49444550, len=8
3,308,000 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,898 ready_for_fw is high
1,060,898 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,101 >>> mbox cmd response: success
2,689,133 UART:
2,689,149 UART: Running Caliptra FMC ...
2,689,557 UART:
2,689,700 UART: [state] CFI Enabled
2,700,213 UART: [fht] FMC Alias Private Key: 7
2,808,022 UART: [art] Extend RT PCRs Done
2,808,450 UART: [art] Lock RT PCRs Done
2,809,558 UART: [art] Populate DV Done
2,817,677 UART: [fht] FMC Alias Private Key: 7
2,818,665 UART: [art] Derive CDI
2,818,945 UART: [art] Store in in slot 0x4
2,904,780 UART: [art] Derive Key Pair
2,905,140 UART: [art] Store priv key in slot 0x5
2,918,160 UART: [art] Derive Key Pair - Done
2,932,746 UART: [art] Signing Cert with AUTHO
2,933,226 UART: RITY.KEYID = 7
2,948,326 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,091 UART: [art] PUB.X = 996831E2B7C2A1DA41576CB04F2A9FA0AE025E3CEFFD0330E81BD5282D46DB8A3233A329070C4FC43B7760F88910F215
2,955,855 UART: [art] PUB.Y = D0D4BEC64D1E25A196E797685A8A429A4EC6F250517EFF6A3CCAA1BDE758D994F69AFF183375EE7AC5788515F481992E
2,962,817 UART: [art] SIG.R = AB24B19C2115DA05FD91FBC53706BAE2C888B364A6B1234AEF8C51D9189A6A539704A1BF6F823649F2BD99EC239F106E
2,969,588 UART: [art] SIG.S = 880600AE9A56E57E0A578113E58C723B91C563214A99922140C78EEB15A0CD50706B1EBFC9E0852ACD06588D49001D8A
2,993,416 UART: Caliptra RT
2,993,761 UART: [state] CFI Enabled
3,101,497 UART: [rt] RT listening for mailbox commands...
3,102,167 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,187 UART: [rt]cmd =0x49444550, len=8
3,134,086 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
891,274 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,403 UART: [kat] ++
895,555 UART: [kat] sha1
899,833 UART: [kat] SHA2-256
901,773 UART: [kat] SHA2-384
904,318 UART: [kat] SHA2-512-ACC
906,219 UART: [kat] ECC-384
916,286 UART: [kat] HMAC-384Kdf
920,672 UART: [kat] LMS
1,168,984 UART: [kat] --
1,169,573 UART: [cold-reset] ++
1,170,013 UART: [fht] FHT @ 0x50003400
1,172,733 UART: [idev] ++
1,172,901 UART: [idev] CDI.KEYID = 6
1,173,262 UART: [idev] SUBJECT.KEYID = 7
1,173,687 UART: [idev] UDS.KEYID = 0
1,174,033 ready_for_fw is high
1,174,033 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,509 UART: [idev] Erasing UDS.KEYID = 0
1,198,543 UART: [idev] Sha1 KeyId Algorithm
1,207,319 UART: [idev] --
1,208,312 UART: [ldev] ++
1,208,480 UART: [ldev] CDI.KEYID = 6
1,208,844 UART: [ldev] SUBJECT.KEYID = 5
1,209,271 UART: [ldev] AUTHORITY.KEYID = 7
1,209,734 UART: [ldev] FE.KEYID = 1
1,214,772 UART: [ldev] Erasing FE.KEYID = 1
1,240,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,254 UART: [ldev] --
1,279,722 UART: [fwproc] Wait for Commands...
1,280,393 UART: [fwproc] Recv command 0x46574c44
1,281,126 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,612 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,921 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,709 >>> mbox cmd response: success
2,771,846 UART: [afmc] ++
2,772,014 UART: [afmc] CDI.KEYID = 6
2,772,377 UART: [afmc] SUBJECT.KEYID = 7
2,772,803 UART: [afmc] AUTHORITY.KEYID = 5
2,808,078 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,612 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,363 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,092 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,975 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,694 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,309 UART: [afmc] --
2,851,229 UART: [cold-reset] --
2,852,127 UART: [state] Locking Datavault
2,853,336 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,940 UART: [state] Locking ICCM
2,854,554 UART: [exit] Launching FMC @ 0x40000130
2,859,883 UART:
2,859,899 UART: Running Caliptra FMC ...
2,860,307 UART:
2,860,361 UART: [state] CFI Enabled
2,870,644 UART: [fht] FMC Alias Private Key: 7
2,978,637 UART: [art] Extend RT PCRs Done
2,979,065 UART: [art] Lock RT PCRs Done
2,980,701 UART: [art] Populate DV Done
2,988,988 UART: [fht] FMC Alias Private Key: 7
2,989,960 UART: [art] Derive CDI
2,990,240 UART: [art] Store in in slot 0x4
3,075,855 UART: [art] Derive Key Pair
3,076,215 UART: [art] Store priv key in slot 0x5
3,088,843 UART: [art] Derive Key Pair - Done
3,103,476 UART: [art] Signing Cert with AUTHO
3,103,956 UART: RITY.KEYID = 7
3,118,914 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,679 UART: [art] PUB.X = D436DFF94B75B0AD53A98A354359C5C5147BC6BB2730463343567634006C38E0F5FE19A0C122C93265FC13A1B4FA020A
3,126,421 UART: [art] PUB.Y = 5AC33283D2CCA9FB48E5E488F9AC61602602D45BE3B9525E6924D0E3D7ACB71400172D3FBDD5546E011AC01A43CA6E41
3,133,353 UART: [art] SIG.R = 54DCBBC4A27345CB1EE0EFCED63A8D84D3721FC11D5F5EC273FD7F122C3941B90EA7D36A59B568B256A524DC9F7FC01C
3,140,142 UART: [art] SIG.S = 3BDC95B5705D43D549C88CCB82C2A4C3E8A51F234098972E1F176E0A4FAD86B03C3CE777863BEE8C9B99938BE89AD913
3,163,796 UART: Caliptra RT
3,164,049 UART: [state] CFI Enabled
3,272,706 UART: [rt] RT listening for mailbox commands...
3,273,376 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,350 UART: [rt]cmd =0x49444550, len=8
3,305,285 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,486 ready_for_fw is high
1,055,486 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,247 >>> mbox cmd response: success
2,685,445 UART:
2,685,461 UART: Running Caliptra FMC ...
2,685,869 UART:
2,685,923 UART: [state] CFI Enabled
2,696,088 UART: [fht] FMC Alias Private Key: 7
2,803,999 UART: [art] Extend RT PCRs Done
2,804,427 UART: [art] Lock RT PCRs Done
2,805,805 UART: [art] Populate DV Done
2,813,748 UART: [fht] FMC Alias Private Key: 7
2,814,710 UART: [art] Derive CDI
2,814,990 UART: [art] Store in in slot 0x4
2,900,879 UART: [art] Derive Key Pair
2,901,239 UART: [art] Store priv key in slot 0x5
2,914,557 UART: [art] Derive Key Pair - Done
2,929,165 UART: [art] Signing Cert with AUTHO
2,929,645 UART: RITY.KEYID = 7
2,945,045 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,810 UART: [art] PUB.X = 5E7C44DDA7C52EC6D5CBC0982FF304B3E9442F3492532BF86E66D62B2EBE6BEE851EEF99E756DDC1C1ACEBF7D5C1885E
2,952,603 UART: [art] PUB.Y = 1DC3E8DEDE9980BCED7ED9AC07E0F25EDC5BF6162F6063221EDF3654CE8ED7766D1DFE10E033E3623238AF55F4636B4C
2,959,570 UART: [art] SIG.R = 1A6ABE4139DB85EA18A706C7118177525FAB4EB48F0B8F80CE8B8E9FC531EB68AC4C725F3415DD7CEE9DE9633043D56E
2,966,350 UART: [art] SIG.S = 24C1207809DD4CC6498EFB7EAA07B909C4E8C6587056AC9754D866BD334B55E09654F4F7E542FF2840244DEF940E9226
2,990,077 UART: Caliptra RT
2,990,330 UART: [state] CFI Enabled
3,098,097 UART: [rt] RT listening for mailbox commands...
3,098,767 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,513 UART: [rt]cmd =0x49444550, len=8
3,130,318 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,692 UART: [kat] SHA2-256
901,632 UART: [kat] SHA2-384
904,535 UART: [kat] SHA2-512-ACC
906,436 UART: [kat] ECC-384
916,259 UART: [kat] HMAC-384Kdf
920,901 UART: [kat] LMS
1,169,213 UART: [kat] --
1,170,174 UART: [cold-reset] ++
1,170,650 UART: [fht] FHT @ 0x50003400
1,173,242 UART: [idev] ++
1,173,410 UART: [idev] CDI.KEYID = 6
1,173,771 UART: [idev] SUBJECT.KEYID = 7
1,174,196 UART: [idev] UDS.KEYID = 0
1,174,542 ready_for_fw is high
1,174,542 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,306 UART: [idev] Erasing UDS.KEYID = 0
1,199,398 UART: [idev] Sha1 KeyId Algorithm
1,208,478 UART: [idev] --
1,209,531 UART: [ldev] ++
1,209,699 UART: [ldev] CDI.KEYID = 6
1,210,063 UART: [ldev] SUBJECT.KEYID = 5
1,210,490 UART: [ldev] AUTHORITY.KEYID = 7
1,210,953 UART: [ldev] FE.KEYID = 1
1,216,169 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,945 UART: [ldev] --
1,282,313 UART: [fwproc] Wait for Commands...
1,283,034 UART: [fwproc] Recv command 0x46574c44
1,283,767 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,393 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,702 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,444 >>> mbox cmd response: success
2,775,695 UART: [afmc] ++
2,775,863 UART: [afmc] CDI.KEYID = 6
2,776,226 UART: [afmc] SUBJECT.KEYID = 7
2,776,652 UART: [afmc] AUTHORITY.KEYID = 5
2,811,841 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,327 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,078 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,807 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,690 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,409 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,158 UART: [afmc] --
2,855,188 UART: [cold-reset] --
2,855,968 UART: [state] Locking Datavault
2,856,907 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,511 UART: [state] Locking ICCM
2,857,957 UART: [exit] Launching FMC @ 0x40000130
2,863,286 UART:
2,863,302 UART: Running Caliptra FMC ...
2,863,710 UART:
2,863,853 UART: [state] CFI Enabled
2,874,534 UART: [fht] FMC Alias Private Key: 7
2,983,267 UART: [art] Extend RT PCRs Done
2,983,695 UART: [art] Lock RT PCRs Done
2,985,313 UART: [art] Populate DV Done
2,993,366 UART: [fht] FMC Alias Private Key: 7
2,994,322 UART: [art] Derive CDI
2,994,602 UART: [art] Store in in slot 0x4
3,080,357 UART: [art] Derive Key Pair
3,080,717 UART: [art] Store priv key in slot 0x5
3,093,715 UART: [art] Derive Key Pair - Done
3,108,014 UART: [art] Signing Cert with AUTHO
3,108,494 UART: RITY.KEYID = 7
3,123,902 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,667 UART: [art] PUB.X = 979DB74A0F16FAAC7B2AEBD8975C8BC0C9C901C0A56DC1F3FD284219BC367F97044C88CF86E7C9E9EFCC13ED2338EF5F
3,131,452 UART: [art] PUB.Y = 9DE2FF6D05F040C8C7519C39236402543C47BF87A35553E46AD02C61BCF762F8EFB80EE434FB9654486C7E275AE1CE1E
3,138,401 UART: [art] SIG.R = 84DC65DCA43A2640C14B7D6103A05BA773048F60FB86F282F9D427739CA9C7AE9500420BBA468AD0B6E3F5B135565830
3,145,142 UART: [art] SIG.S = D973FF1563BD4383455F0739242789262CC15C00B4B8B172CCAD85CD6CF51F7DF2456214E27B6FF33BD237E5AD60F929
3,169,102 UART: Caliptra RT
3,169,447 UART: [state] CFI Enabled
3,276,829 UART: [rt] RT listening for mailbox commands...
3,277,499 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,605 UART: [rt]cmd =0x49444550, len=8
3,309,458 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,663 ready_for_fw is high
1,056,663 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,726 >>> mbox cmd response: success
2,686,924 UART:
2,686,940 UART: Running Caliptra FMC ...
2,687,348 UART:
2,687,491 UART: [state] CFI Enabled
2,697,706 UART: [fht] FMC Alias Private Key: 7
2,806,093 UART: [art] Extend RT PCRs Done
2,806,521 UART: [art] Lock RT PCRs Done
2,808,195 UART: [art] Populate DV Done
2,816,694 UART: [fht] FMC Alias Private Key: 7
2,817,748 UART: [art] Derive CDI
2,818,028 UART: [art] Store in in slot 0x4
2,903,883 UART: [art] Derive Key Pair
2,904,243 UART: [art] Store priv key in slot 0x5
2,917,671 UART: [art] Derive Key Pair - Done
2,932,445 UART: [art] Signing Cert with AUTHO
2,932,925 UART: RITY.KEYID = 7
2,948,369 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,134 UART: [art] PUB.X = 95B568DE1F61C79F55CA2F61A47B194731DBEFF3D3FEE543D8EFA779EDA525D5701842BCDE676A3348C1BAA13D7E55B5
2,955,922 UART: [art] PUB.Y = 659C7913765ADC46A29863A434595E7F86013320F3FD356DCB6002BADC3EE8A0E66A3AE552ABDB8EFE2A4FD781CB1B84
2,962,880 UART: [art] SIG.R = 4FFEF1799A806D91BB4A3BE17A174A10EE6DD2C246327243235825F48435644F4DDAA2BD638B2CB794AB5EBCFC64A067
2,969,662 UART: [art] SIG.S = D2B71D3D72AFFB18B786BB2493871CCC4DCF7995CCED76F5C3BB3638D177B6CC9D27CA606557EF3D3ED64986ED298813
2,993,587 UART: Caliptra RT
2,993,932 UART: [state] CFI Enabled
3,101,979 UART: [rt] RT listening for mailbox commands...
3,102,649 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,805 UART: [rt]cmd =0x49444550, len=8
3,134,594 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,549 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,039 UART: [kat] SHA2-256
881,970 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,085 UART: [kat] ++
886,237 UART: [kat] sha1
890,339 UART: [kat] SHA2-256
892,277 UART: [kat] SHA2-384
895,072 UART: [kat] SHA2-512-ACC
896,973 UART: [kat] ECC-384
902,326 UART: [kat] HMAC-384Kdf
906,956 UART: [kat] LMS
1,475,152 UART: [kat] --
1,476,057 UART: [cold-reset] ++
1,476,489 UART: [fht] Storing FHT @ 0x50003400
1,479,232 UART: [idev] ++
1,479,400 UART: [idev] CDI.KEYID = 6
1,479,760 UART: [idev] SUBJECT.KEYID = 7
1,480,184 UART: [idev] UDS.KEYID = 0
1,480,529 ready_for_fw is high
1,480,529 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,508 UART: [idev] Erasing UDS.KEYID = 0
1,504,876 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,670 UART: [idev] --
1,514,779 UART: [ldev] ++
1,514,947 UART: [ldev] CDI.KEYID = 6
1,515,310 UART: [ldev] SUBJECT.KEYID = 5
1,515,736 UART: [ldev] AUTHORITY.KEYID = 7
1,516,199 UART: [ldev] FE.KEYID = 1
1,521,483 UART: [ldev] Erasing FE.KEYID = 1
1,546,832 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,000 UART: [ldev] --
1,586,269 UART: [fwproc] Waiting for Commands...
1,586,904 UART: [fwproc] Received command 0x46574c44
1,587,695 UART: [fwproc] Received Image of size 114332 bytes
2,885,301 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,827 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,179 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,014 >>> mbox cmd response: success
3,079,228 UART: [afmc] ++
3,079,396 UART: [afmc] CDI.KEYID = 6
3,079,758 UART: [afmc] SUBJECT.KEYID = 7
3,080,183 UART: [afmc] AUTHORITY.KEYID = 5
3,115,710 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,966 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,746 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,474 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,359 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,049 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,954 UART: [afmc] --
3,159,020 UART: [cold-reset] --
3,159,908 UART: [state] Locking Datavault
3,160,783 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,387 UART: [state] Locking ICCM
3,161,835 UART: [exit] Launching FMC @ 0x40000130
3,167,164 UART:
3,167,180 UART: Running Caliptra FMC ...
3,167,588 UART:
3,167,642 UART: [state] CFI Enabled
3,177,835 UART: [fht] FMC Alias Private Key: 7
3,286,154 UART: [art] Extend RT PCRs Done
3,286,582 UART: [art] Lock RT PCRs Done
3,287,818 UART: [art] Populate DV Done
3,296,109 UART: [fht] FMC Alias Private Key: 7
3,297,225 UART: [art] Derive CDI
3,297,505 UART: [art] Store in in slot 0x4
3,383,110 UART: [art] Derive Key Pair
3,383,470 UART: [art] Store priv key in slot 0x5
3,396,442 UART: [art] Derive Key Pair - Done
3,411,363 UART: [art] Signing Cert with AUTHO
3,411,843 UART: RITY.KEYID = 7
3,427,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,078 UART: [art] PUB.X = 6EF6B1FB849EFB7634FCB9CC1A5B000348E4603A20372FB7BB654EA37CD97BE7B7FBB50B62026DFF10FD48369C8E9550
3,434,833 UART: [art] PUB.Y = 5F41A31AC40D662CBFE9E8F2C01F977894A53416F81ED53F721D6446CC3D088B33B2FE1B36566ADCE14D00D653B98B02
3,441,760 UART: [art] SIG.R = DF6C2BDFDF336D807CC444F4F5316D0F6F97D4D49225747FF396228334592262358A621AB77CA910245C993036C84A6F
3,448,523 UART: [art] SIG.S = 397AEC3C1D9C4B130C8522557F5ED22ED83E12DAB080F0FF32AEE34AD5B2C6F322826578A08CBE325513D523DF3E9059
3,472,447 UART: Caliptra RT
3,472,700 UART: [state] CFI Enabled
3,580,917 UART: [rt] RT listening for mailbox commands...
3,581,587 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,497 UART: [rt]cmd =0x52564348, len=36
3,612,916 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,943 ready_for_fw is high
1,362,943 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,536 >>> mbox cmd response: success
2,987,356 UART:
2,987,372 UART: Running Caliptra FMC ...
2,987,780 UART:
2,987,834 UART: [state] CFI Enabled
2,998,443 UART: [fht] FMC Alias Private Key: 7
3,106,682 UART: [art] Extend RT PCRs Done
3,107,110 UART: [art] Lock RT PCRs Done
3,108,918 UART: [art] Populate DV Done
3,117,185 UART: [fht] FMC Alias Private Key: 7
3,118,155 UART: [art] Derive CDI
3,118,435 UART: [art] Store in in slot 0x4
3,204,682 UART: [art] Derive Key Pair
3,205,042 UART: [art] Store priv key in slot 0x5
3,218,810 UART: [art] Derive Key Pair - Done
3,233,252 UART: [art] Signing Cert with AUTHO
3,233,732 UART: RITY.KEYID = 7
3,248,792 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,557 UART: [art] PUB.X = 4AEEF4FC5F8F4938A1FED81B63F8ED1529CD81F4C97F8CFB97A84CEDA447B0472FA01031267B6B55F3FAC320C7BC6296
3,256,347 UART: [art] PUB.Y = 8C7972971FED01264EF3C149E2D87009D04E647EEDB4553C6B5078F7FB48F3F7DEF0B3C7FE0819EF4121DCB3BA009F8D
3,263,280 UART: [art] SIG.R = 885AFC5D08153289BDCA153D849C35927C1904C5A89D81ADA62D09598C0121E2BA2A7C02B2E8F7B239407D6338744EAC
3,270,037 UART: [art] SIG.S = 2E4CF8746E373EC306569E16273AFEC50BAF264C85151612AEA210FFD1F7633798988D8FA9E59A724C3777CE0F9632DF
3,293,595 UART: Caliptra RT
3,293,848 UART: [state] CFI Enabled
3,402,099 UART: [rt] RT listening for mailbox commands...
3,402,769 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,797 UART: [rt]cmd =0x52564348, len=36
3,434,274 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,584 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,160 UART: [kat] SHA2-256
882,091 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,206 UART: [kat] ++
886,358 UART: [kat] sha1
890,510 UART: [kat] SHA2-256
892,448 UART: [kat] SHA2-384
895,093 UART: [kat] SHA2-512-ACC
896,994 UART: [kat] ECC-384
902,649 UART: [kat] HMAC-384Kdf
907,437 UART: [kat] LMS
1,475,633 UART: [kat] --
1,476,258 UART: [cold-reset] ++
1,476,792 UART: [fht] Storing FHT @ 0x50003400
1,479,461 UART: [idev] ++
1,479,629 UART: [idev] CDI.KEYID = 6
1,479,989 UART: [idev] SUBJECT.KEYID = 7
1,480,413 UART: [idev] UDS.KEYID = 0
1,480,758 ready_for_fw is high
1,480,758 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,269 UART: [idev] Erasing UDS.KEYID = 0
1,504,905 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,517 UART: [idev] --
1,514,628 UART: [ldev] ++
1,514,796 UART: [ldev] CDI.KEYID = 6
1,515,159 UART: [ldev] SUBJECT.KEYID = 5
1,515,585 UART: [ldev] AUTHORITY.KEYID = 7
1,516,048 UART: [ldev] FE.KEYID = 1
1,521,736 UART: [ldev] Erasing FE.KEYID = 1
1,546,375 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,747 UART: [ldev] --
1,586,012 UART: [fwproc] Waiting for Commands...
1,586,871 UART: [fwproc] Received command 0x46574c44
1,587,662 UART: [fwproc] Received Image of size 114332 bytes
2,885,422 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,744 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,096 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,867 >>> mbox cmd response: success
3,078,983 UART: [afmc] ++
3,079,151 UART: [afmc] CDI.KEYID = 6
3,079,513 UART: [afmc] SUBJECT.KEYID = 7
3,079,938 UART: [afmc] AUTHORITY.KEYID = 5
3,115,043 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,417 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,197 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,925 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,810 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,500 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,631 UART: [afmc] --
3,158,649 UART: [cold-reset] --
3,159,393 UART: [state] Locking Datavault
3,160,326 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,930 UART: [state] Locking ICCM
3,161,536 UART: [exit] Launching FMC @ 0x40000130
3,166,865 UART:
3,166,881 UART: Running Caliptra FMC ...
3,167,289 UART:
3,167,432 UART: [state] CFI Enabled
3,178,385 UART: [fht] FMC Alias Private Key: 7
3,285,926 UART: [art] Extend RT PCRs Done
3,286,354 UART: [art] Lock RT PCRs Done
3,287,746 UART: [art] Populate DV Done
3,296,057 UART: [fht] FMC Alias Private Key: 7
3,297,085 UART: [art] Derive CDI
3,297,365 UART: [art] Store in in slot 0x4
3,383,156 UART: [art] Derive Key Pair
3,383,516 UART: [art] Store priv key in slot 0x5
3,396,958 UART: [art] Derive Key Pair - Done
3,411,934 UART: [art] Signing Cert with AUTHO
3,412,414 UART: RITY.KEYID = 7
3,427,430 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,195 UART: [art] PUB.X = AE30334421E79B5B1968630ABC7293DF5D8BB144304896F50B57BD345CDE4CD40214CFFD26FF797592AECBA416C67F19
3,434,964 UART: [art] PUB.Y = 3D2284CCCCAA0F53BD964D6A65D4EF1E40C5F4F2833C14DE0DC21E00D70D4D22F793E840D7F0BBC808C6EC3267253D59
3,441,896 UART: [art] SIG.R = 8AFCB72690F98DFEF8774AB4780D4C80A3D6A6A083A92C1640B9B6D6832905180975F4AF0A124ECDA7AEA2399433DC62
3,448,662 UART: [art] SIG.S = 76F490E2844D787BF4DE56DD80A23141620806460CC1324C5787C8CD60D3FE5F85BCBCD24F0A7FDA6D49EFAA2AB97511
3,472,377 UART: Caliptra RT
3,472,722 UART: [state] CFI Enabled
3,580,279 UART: [rt] RT listening for mailbox commands...
3,580,949 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,607 UART: [rt]cmd =0x52564348, len=36
3,611,882 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,018 ready_for_fw is high
1,363,018 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,815 >>> mbox cmd response: success
2,990,913 UART:
2,990,929 UART: Running Caliptra FMC ...
2,991,337 UART:
2,991,480 UART: [state] CFI Enabled
3,002,309 UART: [fht] FMC Alias Private Key: 7
3,110,238 UART: [art] Extend RT PCRs Done
3,110,666 UART: [art] Lock RT PCRs Done
3,112,070 UART: [art] Populate DV Done
3,120,429 UART: [fht] FMC Alias Private Key: 7
3,121,477 UART: [art] Derive CDI
3,121,757 UART: [art] Store in in slot 0x4
3,207,598 UART: [art] Derive Key Pair
3,207,958 UART: [art] Store priv key in slot 0x5
3,221,572 UART: [art] Derive Key Pair - Done
3,236,238 UART: [art] Signing Cert with AUTHO
3,236,718 UART: RITY.KEYID = 7
3,251,354 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,119 UART: [art] PUB.X = 76299927146E430DBB57CB8A00BA9451BD35A74E9841724A6092E805AD6804D9953F62ED508B44AD761AEB9A793B3BFE
3,258,860 UART: [art] PUB.Y = A480487EF47B59F9513FD5A436818894CC987C17DDD9C87C0FBEEDBD70563DAFAA07EF819622CA8E43F86EE38139A0E9
3,265,818 UART: [art] SIG.R = 2D91384BE54F955A663D2A9DC6861914ADC43763F58FB4313FD9E5CD28FA891D0E2CAE08CC3465D90724603EA755A9EA
3,272,587 UART: [art] SIG.S = 22AD6FF60EC3F2D9C6F1136E7A782F4500F6AEEE225276138AAAA083E6756DF99F41DA2A95F9D179A728F40A70C99ABC
3,296,354 UART: Caliptra RT
3,296,699 UART: [state] CFI Enabled
3,405,549 UART: [rt] RT listening for mailbox commands...
3,406,219 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,415 UART: [rt]cmd =0x52564348, len=36
3,437,900 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,726 UART: [state] LifecycleState = Unprovisioned
85,381 UART: [state] DebugLocked = No
86,043 UART: [state] WD Timer not started. Device not locked for debugging
87,154 UART: [kat] SHA2-256
892,804 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,929 UART: [kat] ++
897,081 UART: [kat] sha1
901,213 UART: [kat] SHA2-256
903,153 UART: [kat] SHA2-384
906,056 UART: [kat] SHA2-512-ACC
907,957 UART: [kat] ECC-384
917,354 UART: [kat] HMAC-384Kdf
921,832 UART: [kat] LMS
1,170,160 UART: [kat] --
1,171,245 UART: [cold-reset] ++
1,171,643 UART: [fht] FHT @ 0x50003400
1,174,348 UART: [idev] ++
1,174,516 UART: [idev] CDI.KEYID = 6
1,174,876 UART: [idev] SUBJECT.KEYID = 7
1,175,300 UART: [idev] UDS.KEYID = 0
1,175,645 ready_for_fw is high
1,175,645 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,224 UART: [idev] Erasing UDS.KEYID = 0
1,200,651 UART: [idev] Sha1 KeyId Algorithm
1,209,265 UART: [idev] --
1,210,343 UART: [ldev] ++
1,210,511 UART: [ldev] CDI.KEYID = 6
1,210,874 UART: [ldev] SUBJECT.KEYID = 5
1,211,300 UART: [ldev] AUTHORITY.KEYID = 7
1,211,763 UART: [ldev] FE.KEYID = 1
1,217,111 UART: [ldev] Erasing FE.KEYID = 1
1,243,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,193 UART: [ldev] --
1,282,560 UART: [fwproc] Wait for Commands...
1,283,226 UART: [fwproc] Recv command 0x46574c44
1,283,954 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,554 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,858 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,643 >>> mbox cmd response: success
2,773,829 UART: [afmc] ++
2,773,997 UART: [afmc] CDI.KEYID = 6
2,774,359 UART: [afmc] SUBJECT.KEYID = 7
2,774,784 UART: [afmc] AUTHORITY.KEYID = 5
2,810,169 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,650 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,398 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,126 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,011 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,730 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,634 UART: [afmc] --
2,853,728 UART: [cold-reset] --
2,854,626 UART: [state] Locking Datavault
2,855,953 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,557 UART: [state] Locking ICCM
2,857,121 UART: [exit] Launching FMC @ 0x40000130
2,862,450 UART:
2,862,466 UART: Running Caliptra FMC ...
2,862,874 UART:
2,862,928 UART: [state] CFI Enabled
2,873,359 UART: [fht] FMC Alias Private Key: 7
2,981,538 UART: [art] Extend RT PCRs Done
2,981,966 UART: [art] Lock RT PCRs Done
2,983,460 UART: [art] Populate DV Done
2,991,403 UART: [fht] FMC Alias Private Key: 7
2,992,485 UART: [art] Derive CDI
2,992,765 UART: [art] Store in in slot 0x4
3,078,736 UART: [art] Derive Key Pair
3,079,096 UART: [art] Store priv key in slot 0x5
3,092,424 UART: [art] Derive Key Pair - Done
3,107,143 UART: [art] Signing Cert with AUTHO
3,107,623 UART: RITY.KEYID = 7
3,123,023 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,788 UART: [art] PUB.X = 9646E8933984371791F4342857516FE77D9071D8F7E418F2A515B5C7D55CD9909E8AC544FC6E91A237FB76D1040FCE8D
3,130,548 UART: [art] PUB.Y = EFC7F241F7903F88DC582A1DEA3AD6541140D8E8E2C19DEB2F75067E53502C167A06CD64524349FC2AA9658FB8196B72
3,137,498 UART: [art] SIG.R = 06DB58D680B89A08D60A3DC6D44BDD0A4EB8DE7D15A68C59828199392E825A5134F5630989CCB3DA06C98759032D04BC
3,144,248 UART: [art] SIG.S = 7DD4E040E35E51D208EDEE42DE7C22D4ED1CE72DBF7FA94DA34331DD0A99ADAAC4A2D1986D97DEE1BF0F4294183F7F2F
3,167,660 UART: Caliptra RT
3,167,913 UART: [state] CFI Enabled
3,275,116 UART: [rt] RT listening for mailbox commands...
3,275,786 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,668 UART: [rt]cmd =0x52564348, len=36
3,307,017 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,789 ready_for_fw is high
1,060,789 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,008 >>> mbox cmd response: success
2,690,000 UART:
2,690,016 UART: Running Caliptra FMC ...
2,690,424 UART:
2,690,478 UART: [state] CFI Enabled
2,701,163 UART: [fht] FMC Alias Private Key: 7
2,808,870 UART: [art] Extend RT PCRs Done
2,809,298 UART: [art] Lock RT PCRs Done
2,810,888 UART: [art] Populate DV Done
2,819,417 UART: [fht] FMC Alias Private Key: 7
2,820,479 UART: [art] Derive CDI
2,820,759 UART: [art] Store in in slot 0x4
2,906,308 UART: [art] Derive Key Pair
2,906,668 UART: [art] Store priv key in slot 0x5
2,919,976 UART: [art] Derive Key Pair - Done
2,934,846 UART: [art] Signing Cert with AUTHO
2,935,326 UART: RITY.KEYID = 7
2,950,952 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,717 UART: [art] PUB.X = 0A35042F23CE4315DD9683D7621D2175A618E9B6B61586FD5E9BFD66C5C03CA519CB9C76DA3F65A4688D22D1BC01DA74
2,958,486 UART: [art] PUB.Y = 9F012BE7B6CC56C7DB0F0330A3A15B4D88C8B0D3D78ED80456B87A695ED70A61DC174BA59E418B08653EA1EDA8BFBFD7
2,965,438 UART: [art] SIG.R = 6D6F0D1FDFB251E0AA9C3DB1652766981B0F72323DFC36048CE54F74BFE81737E1580F642CC74D06F7A5D9134713B03A
2,972,199 UART: [art] SIG.S = CE8F15DEDFFF1D0F4885FCF5FD328B4360942960EB5876331AED6E12A60A26326CABDE7CB1ECD1767936F5F55B3B7768
2,995,904 UART: Caliptra RT
2,996,157 UART: [state] CFI Enabled
3,104,344 UART: [rt] RT listening for mailbox commands...
3,105,014 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,904 UART: [rt]cmd =0x52564348, len=36
3,136,277 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
893,351 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,476 UART: [kat] ++
897,628 UART: [kat] sha1
901,702 UART: [kat] SHA2-256
903,642 UART: [kat] SHA2-384
906,499 UART: [kat] SHA2-512-ACC
908,400 UART: [kat] ECC-384
918,679 UART: [kat] HMAC-384Kdf
923,201 UART: [kat] LMS
1,171,529 UART: [kat] --
1,172,490 UART: [cold-reset] ++
1,173,012 UART: [fht] FHT @ 0x50003400
1,175,745 UART: [idev] ++
1,175,913 UART: [idev] CDI.KEYID = 6
1,176,273 UART: [idev] SUBJECT.KEYID = 7
1,176,697 UART: [idev] UDS.KEYID = 0
1,177,042 ready_for_fw is high
1,177,042 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,665 UART: [idev] Erasing UDS.KEYID = 0
1,201,782 UART: [idev] Sha1 KeyId Algorithm
1,210,206 UART: [idev] --
1,211,270 UART: [ldev] ++
1,211,438 UART: [ldev] CDI.KEYID = 6
1,211,801 UART: [ldev] SUBJECT.KEYID = 5
1,212,227 UART: [ldev] AUTHORITY.KEYID = 7
1,212,690 UART: [ldev] FE.KEYID = 1
1,217,896 UART: [ldev] Erasing FE.KEYID = 1
1,244,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,046 UART: [ldev] --
1,284,437 UART: [fwproc] Wait for Commands...
1,285,055 UART: [fwproc] Recv command 0x46574c44
1,285,783 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,207 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,511 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,234 >>> mbox cmd response: success
2,777,466 UART: [afmc] ++
2,777,634 UART: [afmc] CDI.KEYID = 6
2,777,996 UART: [afmc] SUBJECT.KEYID = 7
2,778,421 UART: [afmc] AUTHORITY.KEYID = 5
2,814,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,733 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,481 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,209 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,094 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,813 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,631 UART: [afmc] --
2,857,583 UART: [cold-reset] --
2,858,561 UART: [state] Locking Datavault
2,859,900 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,504 UART: [state] Locking ICCM
2,860,966 UART: [exit] Launching FMC @ 0x40000130
2,866,295 UART:
2,866,311 UART: Running Caliptra FMC ...
2,866,719 UART:
2,866,862 UART: [state] CFI Enabled
2,877,541 UART: [fht] FMC Alias Private Key: 7
2,985,914 UART: [art] Extend RT PCRs Done
2,986,342 UART: [art] Lock RT PCRs Done
2,988,036 UART: [art] Populate DV Done
2,996,481 UART: [fht] FMC Alias Private Key: 7
2,997,537 UART: [art] Derive CDI
2,997,817 UART: [art] Store in in slot 0x4
3,083,492 UART: [art] Derive Key Pair
3,083,852 UART: [art] Store priv key in slot 0x5
3,096,370 UART: [art] Derive Key Pair - Done
3,111,249 UART: [art] Signing Cert with AUTHO
3,111,729 UART: RITY.KEYID = 7
3,126,647 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,412 UART: [art] PUB.X = 1F7C20C1A7279F4D30F92237998AA38F24E57721F177BD527C20EA0C548B140FA96A1BC76F10F3F316440573B0E81A5A
3,134,173 UART: [art] PUB.Y = 51E4E758F545AE62966DE0C00DC150E6487FEE6FD678FEDBAF6115F50C5F2E3C39817DDC1B81BDDF703DAEE1D1C10A3D
3,141,138 UART: [art] SIG.R = 8FFE6990C54E1F40FAE6D50519F219C4124A74949DF02B7F9805F50380C9C4BC50F2ED8FA5125A1A450A34946A4DAB62
3,147,902 UART: [art] SIG.S = B2B8DACE2639EEFA4A639A1198377AF06ED5430AD2E2B685B0E7BABD1385412814292790BD0C71C97F18836B1910BA0B
3,171,998 UART: Caliptra RT
3,172,343 UART: [state] CFI Enabled
3,280,873 UART: [rt] RT listening for mailbox commands...
3,281,543 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,705 UART: [rt]cmd =0x52564348, len=36
3,313,212 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,566 ready_for_fw is high
1,060,566 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,985 >>> mbox cmd response: success
2,686,609 UART:
2,686,625 UART: Running Caliptra FMC ...
2,687,033 UART:
2,687,176 UART: [state] CFI Enabled
2,697,383 UART: [fht] FMC Alias Private Key: 7
2,804,934 UART: [art] Extend RT PCRs Done
2,805,362 UART: [art] Lock RT PCRs Done
2,807,210 UART: [art] Populate DV Done
2,815,429 UART: [fht] FMC Alias Private Key: 7
2,816,511 UART: [art] Derive CDI
2,816,791 UART: [art] Store in in slot 0x4
2,902,810 UART: [art] Derive Key Pair
2,903,170 UART: [art] Store priv key in slot 0x5
2,916,184 UART: [art] Derive Key Pair - Done
2,930,710 UART: [art] Signing Cert with AUTHO
2,931,190 UART: RITY.KEYID = 7
2,946,302 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,067 UART: [art] PUB.X = 7677525547F826539EC83166AE914ACBB2871C526E64D5A6B76970D698DB5CC5B9C7927173636729A1E1306286B0CF2F
2,953,829 UART: [art] PUB.Y = C66437492EC971FEC3A9B132183A380294F56A97F244AF8863E91E1E8A84A87B365014AB74E4A33F0467251DF2FAA044
2,960,771 UART: [art] SIG.R = 613A4A6711F853643F322A7E9E375D98315518272EB5A90AF17FEF832776C1475914C7403B7981670312ADB5B71771CD
2,967,523 UART: [art] SIG.S = F7520D5C7E47BB72DBDEB8FF786D6FC7FDD147BFB0CB8EE3C1ACE6358B76A36F959FE85A59603740981F4DD49E36CDB7
2,991,663 UART: Caliptra RT
2,992,008 UART: [state] CFI Enabled
3,099,443 UART: [rt] RT listening for mailbox commands...
3,100,113 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,101 UART: [rt]cmd =0x52564348, len=36
3,131,520 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,231 UART: [kat] ++
895,383 UART: [kat] sha1
899,703 UART: [kat] SHA2-256
901,643 UART: [kat] SHA2-384
904,184 UART: [kat] SHA2-512-ACC
906,085 UART: [kat] ECC-384
916,040 UART: [kat] HMAC-384Kdf
920,752 UART: [kat] LMS
1,169,064 UART: [kat] --
1,169,781 UART: [cold-reset] ++
1,170,177 UART: [fht] FHT @ 0x50003400
1,172,851 UART: [idev] ++
1,173,019 UART: [idev] CDI.KEYID = 6
1,173,380 UART: [idev] SUBJECT.KEYID = 7
1,173,805 UART: [idev] UDS.KEYID = 0
1,174,151 ready_for_fw is high
1,174,151 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,925 UART: [idev] Erasing UDS.KEYID = 0
1,199,047 UART: [idev] Sha1 KeyId Algorithm
1,208,065 UART: [idev] --
1,209,056 UART: [ldev] ++
1,209,224 UART: [ldev] CDI.KEYID = 6
1,209,588 UART: [ldev] SUBJECT.KEYID = 5
1,210,015 UART: [ldev] AUTHORITY.KEYID = 7
1,210,478 UART: [ldev] FE.KEYID = 1
1,215,864 UART: [ldev] Erasing FE.KEYID = 1
1,242,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,722 UART: [ldev] --
1,282,210 UART: [fwproc] Wait for Commands...
1,282,995 UART: [fwproc] Recv command 0x46574c44
1,283,728 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,482 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,770 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,079 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,791 >>> mbox cmd response: success
2,774,994 UART: [afmc] ++
2,775,162 UART: [afmc] CDI.KEYID = 6
2,775,525 UART: [afmc] SUBJECT.KEYID = 7
2,775,951 UART: [afmc] AUTHORITY.KEYID = 5
2,811,132 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,527 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,139 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,858 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,663 UART: [afmc] --
2,854,625 UART: [cold-reset] --
2,855,577 UART: [state] Locking Datavault
2,856,804 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,408 UART: [state] Locking ICCM
2,857,902 UART: [exit] Launching FMC @ 0x40000130
2,863,231 UART:
2,863,247 UART: Running Caliptra FMC ...
2,863,655 UART:
2,863,709 UART: [state] CFI Enabled
2,874,346 UART: [fht] FMC Alias Private Key: 7
2,982,469 UART: [art] Extend RT PCRs Done
2,982,897 UART: [art] Lock RT PCRs Done
2,984,247 UART: [art] Populate DV Done
2,992,706 UART: [fht] FMC Alias Private Key: 7
2,993,872 UART: [art] Derive CDI
2,994,152 UART: [art] Store in in slot 0x4
3,079,581 UART: [art] Derive Key Pair
3,079,941 UART: [art] Store priv key in slot 0x5
3,093,035 UART: [art] Derive Key Pair - Done
3,107,620 UART: [art] Signing Cert with AUTHO
3,108,100 UART: RITY.KEYID = 7
3,123,250 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,015 UART: [art] PUB.X = 83D61BB4DDFFEFD54947AE5CEFD25B1B7F50D4368DDE20B66A0D461BC93E71293F2B7B9B86AC10990BC3B1FD29DB2350
3,130,801 UART: [art] PUB.Y = AA4AB9B1B7DAAEA84FEE7CDEECE8C98529EA12056F1D2058055E2A4DFAF3B8E15C8711939B103199DB5F9DC27098DDE3
3,137,769 UART: [art] SIG.R = B32E06C5AAB99163F328016F6118B75148F72B66FD340AE7B1F2D1C4785AC53AA81AC44F220D2F1870ADC07FBB027813
3,144,530 UART: [art] SIG.S = 8F679038E58CFD3FCD522D681192C97D0D81262535EDC252D7DE227DADDEB090DB950F2FA9DAE30ADFB72A52D64C3172
3,168,794 UART: Caliptra RT
3,169,047 UART: [state] CFI Enabled
3,276,909 UART: [rt] RT listening for mailbox commands...
3,277,579 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,715 UART: [rt]cmd =0x52564348, len=36
3,309,102 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,134 ready_for_fw is high
1,056,134 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,733 >>> mbox cmd response: success
2,683,799 UART:
2,683,815 UART: Running Caliptra FMC ...
2,684,223 UART:
2,684,277 UART: [state] CFI Enabled
2,694,436 UART: [fht] FMC Alias Private Key: 7
2,801,913 UART: [art] Extend RT PCRs Done
2,802,341 UART: [art] Lock RT PCRs Done
2,803,765 UART: [art] Populate DV Done
2,811,736 UART: [fht] FMC Alias Private Key: 7
2,812,884 UART: [art] Derive CDI
2,813,164 UART: [art] Store in in slot 0x4
2,898,987 UART: [art] Derive Key Pair
2,899,347 UART: [art] Store priv key in slot 0x5
2,912,445 UART: [art] Derive Key Pair - Done
2,927,184 UART: [art] Signing Cert with AUTHO
2,927,664 UART: RITY.KEYID = 7
2,942,832 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,597 UART: [art] PUB.X = 4C0F919F5B833E4C14F500999389DD1C99384F87D83A883C9254BD7F8C0C8C0043E7447107BA3C22686CFFC0AF2EF165
2,950,316 UART: [art] PUB.Y = 8F9443A8D775EA21FEEA33C8AC4541C21F44444E0CEE06C9B3B97BB9EEBA011079FAD2ED8FC83869EF9086C9F57AE82C
2,957,277 UART: [art] SIG.R = BC51C409A2964DF9C9584F7966F89409AC98517331D6AA69D1C24C1B49269506C3EACD419771BF1BDA6D15763F83A793
2,964,038 UART: [art] SIG.S = FD235E99F993C5BA063808809260EEFB0209E1DADDFC6B74D4291BBD2FA3F2AD5A3FD141C4B1C8C256A328DE73B7A40B
2,988,054 UART: Caliptra RT
2,988,307 UART: [state] CFI Enabled
3,096,129 UART: [rt] RT listening for mailbox commands...
3,096,799 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,801 UART: [rt]cmd =0x52564348, len=36
3,128,494 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
891,303 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,432 UART: [kat] ++
895,584 UART: [kat] sha1
899,828 UART: [kat] SHA2-256
901,768 UART: [kat] SHA2-384
904,291 UART: [kat] SHA2-512-ACC
906,192 UART: [kat] ECC-384
916,043 UART: [kat] HMAC-384Kdf
920,567 UART: [kat] LMS
1,168,879 UART: [kat] --
1,169,700 UART: [cold-reset] ++
1,170,082 UART: [fht] FHT @ 0x50003400
1,172,684 UART: [idev] ++
1,172,852 UART: [idev] CDI.KEYID = 6
1,173,213 UART: [idev] SUBJECT.KEYID = 7
1,173,638 UART: [idev] UDS.KEYID = 0
1,173,984 ready_for_fw is high
1,173,984 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,882 UART: [idev] Erasing UDS.KEYID = 0
1,198,960 UART: [idev] Sha1 KeyId Algorithm
1,207,726 UART: [idev] --
1,208,919 UART: [ldev] ++
1,209,087 UART: [ldev] CDI.KEYID = 6
1,209,451 UART: [ldev] SUBJECT.KEYID = 5
1,209,878 UART: [ldev] AUTHORITY.KEYID = 7
1,210,341 UART: [ldev] FE.KEYID = 1
1,215,527 UART: [ldev] Erasing FE.KEYID = 1
1,241,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,307 UART: [ldev] --
1,280,729 UART: [fwproc] Wait for Commands...
1,281,320 UART: [fwproc] Recv command 0x46574c44
1,282,053 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,897 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,206 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,952 >>> mbox cmd response: success
2,773,013 UART: [afmc] ++
2,773,181 UART: [afmc] CDI.KEYID = 6
2,773,544 UART: [afmc] SUBJECT.KEYID = 7
2,773,970 UART: [afmc] AUTHORITY.KEYID = 5
2,809,953 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,962 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,691 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,574 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,293 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,064 UART: [afmc] --
2,853,144 UART: [cold-reset] --
2,854,054 UART: [state] Locking Datavault
2,855,489 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,093 UART: [state] Locking ICCM
2,856,703 UART: [exit] Launching FMC @ 0x40000130
2,862,032 UART:
2,862,048 UART: Running Caliptra FMC ...
2,862,456 UART:
2,862,599 UART: [state] CFI Enabled
2,873,392 UART: [fht] FMC Alias Private Key: 7
2,981,483 UART: [art] Extend RT PCRs Done
2,981,911 UART: [art] Lock RT PCRs Done
2,983,457 UART: [art] Populate DV Done
2,991,638 UART: [fht] FMC Alias Private Key: 7
2,992,764 UART: [art] Derive CDI
2,993,044 UART: [art] Store in in slot 0x4
3,078,959 UART: [art] Derive Key Pair
3,079,319 UART: [art] Store priv key in slot 0x5
3,092,157 UART: [art] Derive Key Pair - Done
3,106,896 UART: [art] Signing Cert with AUTHO
3,107,376 UART: RITY.KEYID = 7
3,122,510 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,275 UART: [art] PUB.X = 8A8559FD793154D7AAB4044F07FC4A89904C5CDA8E02A810DE80254282B8E59DF7E5D253C8C92B699849870895CC2B7E
3,130,035 UART: [art] PUB.Y = D6831C7CEAF24AD2922330F13BE487B732F6469E8AB86EA8CCB8026A3DE8AA1A8E89FFF4B0203E778C654B835FB64405
3,136,991 UART: [art] SIG.R = 2D21974D7831427EDAC885866EAF3F19ABC4C4C85219D7B605222346B9DE1FA4D023D04D95F12B6E8168D3BC65E2B91B
3,143,764 UART: [art] SIG.S = 9EDE90547F10D3C269D959A08C21B37CC8D79083F08DE07FD5DBECABA94AD68FBCEA5F0FF1C260E45BF2A952424C9ED5
3,167,314 UART: Caliptra RT
3,167,659 UART: [state] CFI Enabled
3,275,770 UART: [rt] RT listening for mailbox commands...
3,276,440 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,638 UART: [rt]cmd =0x52564348, len=36
3,307,873 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,017 ready_for_fw is high
1,056,017 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,774 >>> mbox cmd response: success
2,686,810 UART:
2,686,826 UART: Running Caliptra FMC ...
2,687,234 UART:
2,687,377 UART: [state] CFI Enabled
2,697,818 UART: [fht] FMC Alias Private Key: 7
2,805,645 UART: [art] Extend RT PCRs Done
2,806,073 UART: [art] Lock RT PCRs Done
2,807,273 UART: [art] Populate DV Done
2,815,636 UART: [fht] FMC Alias Private Key: 7
2,816,586 UART: [art] Derive CDI
2,816,866 UART: [art] Store in in slot 0x4
2,902,733 UART: [art] Derive Key Pair
2,903,093 UART: [art] Store priv key in slot 0x5
2,916,333 UART: [art] Derive Key Pair - Done
2,931,380 UART: [art] Signing Cert with AUTHO
2,931,860 UART: RITY.KEYID = 7
2,947,016 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,781 UART: [art] PUB.X = AF4FB47CC90507C6B63B5F01184AF64680CE9367992A9D960B5F49803A5E6EDA6EE70CC5300F5473ED10EA16F162FB6F
2,954,543 UART: [art] PUB.Y = 2623CD368A40C4E701F021866AE7B74384701418E893A22461F35941A56F6B23A4833F1ED77233A026369A10BD7A65EC
2,961,480 UART: [art] SIG.R = B1E239D63000409543CF931755E6F3BA65EB58975AC7FD3E044E8546815F1EBCDC5A02287E68BA0BF91818E9AE201E33
2,968,223 UART: [art] SIG.S = EDFE2341CF5574BDE8EED3AFC2D11FACBBA6A5BC5DE547C6B9FA1548EABFAA4439C7620E6A2BE6754DE420D711758A74
2,991,575 UART: Caliptra RT
2,991,920 UART: [state] CFI Enabled
3,099,534 UART: [rt] RT listening for mailbox commands...
3,100,204 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,602 UART: [rt]cmd =0x52564348, len=36
3,131,821 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,449 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,985 UART: [kat] SHA2-256
881,916 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,031 UART: [kat] ++
886,183 UART: [kat] sha1
890,361 UART: [kat] SHA2-256
892,299 UART: [kat] SHA2-384
894,916 UART: [kat] SHA2-512-ACC
896,817 UART: [kat] ECC-384
902,190 UART: [kat] HMAC-384Kdf
906,806 UART: [kat] LMS
1,475,002 UART: [kat] --
1,475,941 UART: [cold-reset] ++
1,476,311 UART: [fht] Storing FHT @ 0x50003400
1,478,954 UART: [idev] ++
1,479,122 UART: [idev] CDI.KEYID = 6
1,479,482 UART: [idev] SUBJECT.KEYID = 7
1,479,906 UART: [idev] UDS.KEYID = 0
1,480,251 ready_for_fw is high
1,480,251 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,208 UART: [idev] Erasing UDS.KEYID = 0
1,504,930 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,456 UART: [idev] --
1,514,511 UART: [ldev] ++
1,514,679 UART: [ldev] CDI.KEYID = 6
1,515,042 UART: [ldev] SUBJECT.KEYID = 5
1,515,468 UART: [ldev] AUTHORITY.KEYID = 7
1,515,931 UART: [ldev] FE.KEYID = 1
1,521,483 UART: [ldev] Erasing FE.KEYID = 1
1,547,002 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,418 UART: [ldev] --
1,585,867 UART: [fwproc] Waiting for Commands...
1,586,694 UART: [fwproc] Received command 0x46574c44
1,587,485 UART: [fwproc] Received Image of size 114332 bytes
2,885,031 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,777 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,129 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,900 >>> mbox cmd response: success
3,079,084 UART: [afmc] ++
3,079,252 UART: [afmc] CDI.KEYID = 6
3,079,614 UART: [afmc] SUBJECT.KEYID = 7
3,080,039 UART: [afmc] AUTHORITY.KEYID = 5
3,114,430 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,910 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,690 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,418 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,303 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,993 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,956 UART: [afmc] --
3,157,936 UART: [cold-reset] --
3,158,576 UART: [state] Locking Datavault
3,159,513 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,117 UART: [state] Locking ICCM
3,160,639 UART: [exit] Launching FMC @ 0x40000130
3,165,968 UART:
3,165,984 UART: Running Caliptra FMC ...
3,166,392 UART:
3,166,446 UART: [state] CFI Enabled
3,176,655 UART: [fht] FMC Alias Private Key: 7
3,283,832 UART: [art] Extend RT PCRs Done
3,284,260 UART: [art] Lock RT PCRs Done
3,285,686 UART: [art] Populate DV Done
3,293,943 UART: [fht] FMC Alias Private Key: 7
3,294,887 UART: [art] Derive CDI
3,295,167 UART: [art] Store in in slot 0x4
3,380,420 UART: [art] Derive Key Pair
3,380,780 UART: [art] Store priv key in slot 0x5
3,393,560 UART: [art] Derive Key Pair - Done
3,408,203 UART: [art] Signing Cert with AUTHO
3,408,683 UART: RITY.KEYID = 7
3,423,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,300 UART: [art] PUB.X = D3B3F72FFC0BC4DDA230732C3F7D15DA9AF19B36F9CB74CD06F604053366FADA07829EA85CC3B7C512EA60F3D927C966
3,431,073 UART: [art] PUB.Y = 20AECBB75147A8C6B2C09AEAAA5C57B71DB4F516219C121B5C0B892B520C182EF29C5F6B159A8973C63FCC0B60E93F42
3,438,028 UART: [art] SIG.R = A63B6DA2FB4A6D38B6452ABEF6BDA6E9928CC563C04558887E22C1E1ABB6A68672639D9D59647C539005460D6D27EE35
3,444,798 UART: [art] SIG.S = 189A5A02C9E7DC9165CD30CAAEDB612585A0FEC00E6A4200F39A27D2887D4010E06EE34F9F0C35A88CE5D1824E4025D8
3,468,534 UART: Caliptra RT
3,468,787 UART: [state] CFI Enabled
3,576,066 UART: [rt] RT listening for mailbox commands...
3,576,736 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,006 UART: [rt]cmd =0x53574545, len=84
3,608,680 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,657 ready_for_fw is high
1,362,657 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,800 >>> mbox cmd response: success
2,989,774 UART:
2,989,790 UART: Running Caliptra FMC ...
2,990,198 UART:
2,990,252 UART: [state] CFI Enabled
3,000,407 UART: [fht] FMC Alias Private Key: 7
3,108,528 UART: [art] Extend RT PCRs Done
3,108,956 UART: [art] Lock RT PCRs Done
3,110,228 UART: [art] Populate DV Done
3,118,497 UART: [fht] FMC Alias Private Key: 7
3,119,513 UART: [art] Derive CDI
3,119,793 UART: [art] Store in in slot 0x4
3,205,212 UART: [art] Derive Key Pair
3,205,572 UART: [art] Store priv key in slot 0x5
3,218,814 UART: [art] Derive Key Pair - Done
3,233,876 UART: [art] Signing Cert with AUTHO
3,234,356 UART: RITY.KEYID = 7
3,249,572 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,337 UART: [art] PUB.X = 36C6F1E86C122E92EEB02F700CFF2BDA1B055BAAB43C5B50A279D432E58AF9BD0529371CB44E06E5F49BE5D621F10385
3,257,106 UART: [art] PUB.Y = 679DEE2A485D3EEE4475CD03723BF2716992594D250445C20BBCAE0F7181537B1B8DB8601B2D0CE94BFE89BB1A36002C
3,264,027 UART: [art] SIG.R = 3D8811335C7FFBC82FE9E2316ADF2530F742B96531AD6950D255C54E16D851FB59248C2DE064D46236CB9729BCDA1384
3,270,799 UART: [art] SIG.S = 80D7AF7EA795E73503FE4FD8ACDE646F80D3EF078C88D27DDD2BE6DBB9536F771A0899202A0F3197C862CA0F166BC496
3,294,169 UART: Caliptra RT
3,294,422 UART: [state] CFI Enabled
3,402,859 UART: [rt] RT listening for mailbox commands...
3,403,529 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,593 UART: [rt]cmd =0x53574545, len=84
3,435,063 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,470 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,114 UART: [kat] SHA2-256
882,045 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,160 UART: [kat] ++
886,312 UART: [kat] sha1
890,576 UART: [kat] SHA2-256
892,514 UART: [kat] SHA2-384
895,067 UART: [kat] SHA2-512-ACC
896,968 UART: [kat] ECC-384
902,755 UART: [kat] HMAC-384Kdf
907,187 UART: [kat] LMS
1,475,383 UART: [kat] --
1,476,038 UART: [cold-reset] ++
1,476,482 UART: [fht] Storing FHT @ 0x50003400
1,479,403 UART: [idev] ++
1,479,571 UART: [idev] CDI.KEYID = 6
1,479,931 UART: [idev] SUBJECT.KEYID = 7
1,480,355 UART: [idev] UDS.KEYID = 0
1,480,700 ready_for_fw is high
1,480,700 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,731 UART: [idev] Erasing UDS.KEYID = 0
1,505,255 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,929 UART: [idev] --
1,515,160 UART: [ldev] ++
1,515,328 UART: [ldev] CDI.KEYID = 6
1,515,691 UART: [ldev] SUBJECT.KEYID = 5
1,516,117 UART: [ldev] AUTHORITY.KEYID = 7
1,516,580 UART: [ldev] FE.KEYID = 1
1,521,934 UART: [ldev] Erasing FE.KEYID = 1
1,548,035 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,891 UART: [ldev] --
1,587,288 UART: [fwproc] Waiting for Commands...
1,588,119 UART: [fwproc] Received command 0x46574c44
1,588,910 UART: [fwproc] Received Image of size 114332 bytes
2,886,238 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,536 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,888 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,805 >>> mbox cmd response: success
3,079,841 UART: [afmc] ++
3,080,009 UART: [afmc] CDI.KEYID = 6
3,080,371 UART: [afmc] SUBJECT.KEYID = 7
3,080,796 UART: [afmc] AUTHORITY.KEYID = 5
3,116,081 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,177 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,957 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,685 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,570 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,260 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,365 UART: [afmc] --
3,159,433 UART: [cold-reset] --
3,160,321 UART: [state] Locking Datavault
3,161,184 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,788 UART: [state] Locking ICCM
3,162,340 UART: [exit] Launching FMC @ 0x40000130
3,167,669 UART:
3,167,685 UART: Running Caliptra FMC ...
3,168,093 UART:
3,168,236 UART: [state] CFI Enabled
3,178,761 UART: [fht] FMC Alias Private Key: 7
3,286,864 UART: [art] Extend RT PCRs Done
3,287,292 UART: [art] Lock RT PCRs Done
3,288,692 UART: [art] Populate DV Done
3,296,767 UART: [fht] FMC Alias Private Key: 7
3,297,871 UART: [art] Derive CDI
3,298,151 UART: [art] Store in in slot 0x4
3,383,670 UART: [art] Derive Key Pair
3,384,030 UART: [art] Store priv key in slot 0x5
3,397,400 UART: [art] Derive Key Pair - Done
3,411,856 UART: [art] Signing Cert with AUTHO
3,412,336 UART: RITY.KEYID = 7
3,427,846 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,611 UART: [art] PUB.X = 27E8E09E0ECDCAC2471389245435AF8D534549B87DC0AADED6A14372240A9A2BA8F6B27227E999B27EBAFC3981B7C6DC
3,435,389 UART: [art] PUB.Y = 5C72E1341042332C43B7E6A96DC38FB0A944718770EEA1D17F9363930ADC97EA8705844E0DB2EDF85572C58BDDD174F2
3,442,334 UART: [art] SIG.R = A29A9D62FDC431BBA5886B487DF8FACE50336AFA6A657C8B035EDD586926F68A01431497662940C9CF9A85532B3F894D
3,449,104 UART: [art] SIG.S = DDACAC2F3B59F4EE674727A1CF91850D7139B7CA57E0EE74A23EFBD9FDA2D6E573BBC157B175BF29B4D861FD9385E0B9
3,473,030 UART: Caliptra RT
3,473,375 UART: [state] CFI Enabled
3,581,677 UART: [rt] RT listening for mailbox commands...
3,582,347 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,771 UART: [rt]cmd =0x53574545, len=84
3,614,081 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,362 ready_for_fw is high
1,362,362 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,529 >>> mbox cmd response: success
2,988,539 UART:
2,988,555 UART: Running Caliptra FMC ...
2,988,963 UART:
2,989,106 UART: [state] CFI Enabled
3,000,109 UART: [fht] FMC Alias Private Key: 7
3,107,794 UART: [art] Extend RT PCRs Done
3,108,222 UART: [art] Lock RT PCRs Done
3,110,040 UART: [art] Populate DV Done
3,118,369 UART: [fht] FMC Alias Private Key: 7
3,119,367 UART: [art] Derive CDI
3,119,647 UART: [art] Store in in slot 0x4
3,204,968 UART: [art] Derive Key Pair
3,205,328 UART: [art] Store priv key in slot 0x5
3,218,644 UART: [art] Derive Key Pair - Done
3,233,437 UART: [art] Signing Cert with AUTHO
3,233,917 UART: RITY.KEYID = 7
3,249,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,998 UART: [art] PUB.X = 3271443C10927CB45F12C331A52EBC2B972CC0D9137F5A0272A795F5D3BD51ABF4388A373A0EB78DDAE127B592784C61
3,256,766 UART: [art] PUB.Y = 400D06C2C3C19C77ACB2EEF5433956C1CD94121A87D4C735854791C796F879FC95EF243F8B7FFF921A29EDCC2581CD91
3,263,718 UART: [art] SIG.R = B180A85F9B9FA545F65B31E5D40768CD6632D170059EA4A0C7C522E6744A195DD982EF1DAF67917353D1A4D925077FA7
3,270,481 UART: [art] SIG.S = 7DFC87C7D01F1E38730C70A1292D700A86F5122516CE602F34779DDD3AFC4701BAF51FC9EC1A304BC38F54097F20C1E5
3,293,786 UART: Caliptra RT
3,294,131 UART: [state] CFI Enabled
3,403,018 UART: [rt] RT listening for mailbox commands...
3,403,688 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,066 UART: [rt]cmd =0x53574545, len=84
3,435,500 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
893,156 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,281 UART: [kat] ++
897,433 UART: [kat] sha1
901,843 UART: [kat] SHA2-256
903,783 UART: [kat] SHA2-384
906,346 UART: [kat] SHA2-512-ACC
908,247 UART: [kat] ECC-384
918,316 UART: [kat] HMAC-384Kdf
922,732 UART: [kat] LMS
1,171,060 UART: [kat] --
1,171,967 UART: [cold-reset] ++
1,172,423 UART: [fht] FHT @ 0x50003400
1,174,860 UART: [idev] ++
1,175,028 UART: [idev] CDI.KEYID = 6
1,175,388 UART: [idev] SUBJECT.KEYID = 7
1,175,812 UART: [idev] UDS.KEYID = 0
1,176,157 ready_for_fw is high
1,176,157 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,958 UART: [idev] Erasing UDS.KEYID = 0
1,201,081 UART: [idev] Sha1 KeyId Algorithm
1,209,647 UART: [idev] --
1,210,743 UART: [ldev] ++
1,210,911 UART: [ldev] CDI.KEYID = 6
1,211,274 UART: [ldev] SUBJECT.KEYID = 5
1,211,700 UART: [ldev] AUTHORITY.KEYID = 7
1,212,163 UART: [ldev] FE.KEYID = 1
1,217,227 UART: [ldev] Erasing FE.KEYID = 1
1,243,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,845 UART: [ldev] --
1,283,252 UART: [fwproc] Wait for Commands...
1,283,936 UART: [fwproc] Recv command 0x46574c44
1,284,664 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,296 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,600 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,389 >>> mbox cmd response: success
2,776,437 UART: [afmc] ++
2,776,605 UART: [afmc] CDI.KEYID = 6
2,776,967 UART: [afmc] SUBJECT.KEYID = 7
2,777,392 UART: [afmc] AUTHORITY.KEYID = 5
2,812,451 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,662 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,410 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,138 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,023 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,742 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,512 UART: [afmc] --
2,855,432 UART: [cold-reset] --
2,856,316 UART: [state] Locking Datavault
2,857,313 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,917 UART: [state] Locking ICCM
2,858,477 UART: [exit] Launching FMC @ 0x40000130
2,863,806 UART:
2,863,822 UART: Running Caliptra FMC ...
2,864,230 UART:
2,864,284 UART: [state] CFI Enabled
2,874,715 UART: [fht] FMC Alias Private Key: 7
2,982,498 UART: [art] Extend RT PCRs Done
2,982,926 UART: [art] Lock RT PCRs Done
2,984,410 UART: [art] Populate DV Done
2,992,797 UART: [fht] FMC Alias Private Key: 7
2,993,907 UART: [art] Derive CDI
2,994,187 UART: [art] Store in in slot 0x4
3,079,884 UART: [art] Derive Key Pair
3,080,244 UART: [art] Store priv key in slot 0x5
3,093,252 UART: [art] Derive Key Pair - Done
3,108,253 UART: [art] Signing Cert with AUTHO
3,108,733 UART: RITY.KEYID = 7
3,123,889 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,654 UART: [art] PUB.X = 2949B34C6E7EDCC64B9CCE53DF79A44BC3833B8DDC002B584D9C4592A933624560CF60424FD75EF6F001CA4AD84B4585
3,131,409 UART: [art] PUB.Y = BBF0F8E1826385912394C0ED4DDCED1E84690B1B09C06747B9607268F0E67B04A52AE72EB6EE123D3DEDE7696C5139B2
3,138,358 UART: [art] SIG.R = 78E36FCC82297FE7C2FEA41E4E05BDC3FD6B6B61015E017CDBB853AF81182794A31F7B2E298C1020AC9863E0CD4E9D30
3,145,133 UART: [art] SIG.S = 434C90A32D3FBCFA624B454FFB2CA6EA94DA8FFAA0E6A7EAEB3FB9A35633503081A42DB635FA6AAA77B4DF82026E1517
3,168,839 UART: Caliptra RT
3,169,092 UART: [state] CFI Enabled
3,276,185 UART: [rt] RT listening for mailbox commands...
3,276,855 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,377 UART: [rt]cmd =0x53574545, len=84
3,308,987 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,267 ready_for_fw is high
1,061,267 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,662 >>> mbox cmd response: success
2,690,698 UART:
2,690,714 UART: Running Caliptra FMC ...
2,691,122 UART:
2,691,176 UART: [state] CFI Enabled
2,701,623 UART: [fht] FMC Alias Private Key: 7
2,810,016 UART: [art] Extend RT PCRs Done
2,810,444 UART: [art] Lock RT PCRs Done
2,812,108 UART: [art] Populate DV Done
2,820,427 UART: [fht] FMC Alias Private Key: 7
2,821,487 UART: [art] Derive CDI
2,821,767 UART: [art] Store in in slot 0x4
2,907,278 UART: [art] Derive Key Pair
2,907,638 UART: [art] Store priv key in slot 0x5
2,921,152 UART: [art] Derive Key Pair - Done
2,936,011 UART: [art] Signing Cert with AUTHO
2,936,491 UART: RITY.KEYID = 7
2,951,603 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,368 UART: [art] PUB.X = CC9626A62794BCB376AE7D6DE7F0C97B5EF28ABFA1B7D20F0C9747AD2693D392649D8FD478E3A97959C546D338533451
2,959,138 UART: [art] PUB.Y = 7B76815376188E1BDAF897EB1FA9BFDDDE50FF663D93C7FAF9695B222DE858967950DF28C202B80A6E21E9D29D062DE1
2,966,091 UART: [art] SIG.R = 62E36E206DDF664E55CE552EBAF70E642BCDD3085139A0BADCB8E899FA6E61A90FBF4203A239D7A0D9689631971DDD3E
2,972,865 UART: [art] SIG.S = 10B952490754100676E4B41911828ED277351E2B96BF28F67FDE3B7EC920A2C63F9458FF9055305078CF9524312FB571
2,996,182 UART: Caliptra RT
2,996,435 UART: [state] CFI Enabled
3,104,132 UART: [rt] RT listening for mailbox commands...
3,104,802 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,270 UART: [rt]cmd =0x53574545, len=84
3,136,840 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,592 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
893,519 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,644 UART: [kat] ++
897,796 UART: [kat] sha1
902,098 UART: [kat] SHA2-256
904,038 UART: [kat] SHA2-384
906,725 UART: [kat] SHA2-512-ACC
908,626 UART: [kat] ECC-384
918,399 UART: [kat] HMAC-384Kdf
923,145 UART: [kat] LMS
1,171,473 UART: [kat] --
1,172,508 UART: [cold-reset] ++
1,172,994 UART: [fht] FHT @ 0x50003400
1,175,607 UART: [idev] ++
1,175,775 UART: [idev] CDI.KEYID = 6
1,176,135 UART: [idev] SUBJECT.KEYID = 7
1,176,559 UART: [idev] UDS.KEYID = 0
1,176,904 ready_for_fw is high
1,176,904 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,993 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,612 UART: [idev] --
1,211,674 UART: [ldev] ++
1,211,842 UART: [ldev] CDI.KEYID = 6
1,212,205 UART: [ldev] SUBJECT.KEYID = 5
1,212,631 UART: [ldev] AUTHORITY.KEYID = 7
1,213,094 UART: [ldev] FE.KEYID = 1
1,218,278 UART: [ldev] Erasing FE.KEYID = 1
1,244,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,836 UART: [ldev] --
1,283,221 UART: [fwproc] Wait for Commands...
1,283,807 UART: [fwproc] Recv command 0x46574c44
1,284,535 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,370 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,185 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,489 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,390 >>> mbox cmd response: success
2,776,530 UART: [afmc] ++
2,776,698 UART: [afmc] CDI.KEYID = 6
2,777,060 UART: [afmc] SUBJECT.KEYID = 7
2,777,485 UART: [afmc] AUTHORITY.KEYID = 5
2,813,304 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,745 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,493 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,221 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,106 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,825 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,671 UART: [afmc] --
2,856,635 UART: [cold-reset] --
2,857,429 UART: [state] Locking Datavault
2,858,796 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,400 UART: [state] Locking ICCM
2,860,004 UART: [exit] Launching FMC @ 0x40000130
2,865,333 UART:
2,865,349 UART: Running Caliptra FMC ...
2,865,757 UART:
2,865,900 UART: [state] CFI Enabled
2,876,231 UART: [fht] FMC Alias Private Key: 7
2,983,454 UART: [art] Extend RT PCRs Done
2,983,882 UART: [art] Lock RT PCRs Done
2,985,234 UART: [art] Populate DV Done
2,993,421 UART: [fht] FMC Alias Private Key: 7
2,994,473 UART: [art] Derive CDI
2,994,753 UART: [art] Store in in slot 0x4
3,080,342 UART: [art] Derive Key Pair
3,080,702 UART: [art] Store priv key in slot 0x5
3,094,166 UART: [art] Derive Key Pair - Done
3,109,057 UART: [art] Signing Cert with AUTHO
3,109,537 UART: RITY.KEYID = 7
3,124,575 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,340 UART: [art] PUB.X = 4E47BE924B14E8A636BA7D24240B12F4C44D8E635F5E1FEE8A39DA64FA6873F9A774D76910298A421BC9697362F2102F
3,132,109 UART: [art] PUB.Y = 8618EB3ACC5D18E48BA87F4E88E9B41E445EA29DE2EF6BEC8F5EDAFB9C8114D42CE82983B00982641A681F72A0266CA4
3,139,072 UART: [art] SIG.R = 577C766B9EFC6AF0D36F78946F78A532EC30A499B93ABFB745FE5308BB4A73F5BA2F5A8438FB696ED5555DCDEA581646
3,145,853 UART: [art] SIG.S = 1B8760B44C97491637190FACBED29A0056CF69017FA7D1ED7A32639037EDF213487D69C9FE6D6DFB7948A852BA8FC2F0
3,169,990 UART: Caliptra RT
3,170,335 UART: [state] CFI Enabled
3,277,662 UART: [rt] RT listening for mailbox commands...
3,278,332 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,570 UART: [rt]cmd =0x53574545, len=84
3,310,254 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,928 ready_for_fw is high
1,059,928 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,453 >>> mbox cmd response: success
2,689,911 UART:
2,689,927 UART: Running Caliptra FMC ...
2,690,335 UART:
2,690,478 UART: [state] CFI Enabled
2,701,055 UART: [fht] FMC Alias Private Key: 7
2,809,342 UART: [art] Extend RT PCRs Done
2,809,770 UART: [art] Lock RT PCRs Done
2,811,450 UART: [art] Populate DV Done
2,819,681 UART: [fht] FMC Alias Private Key: 7
2,820,633 UART: [art] Derive CDI
2,820,913 UART: [art] Store in in slot 0x4
2,906,964 UART: [art] Derive Key Pair
2,907,324 UART: [art] Store priv key in slot 0x5
2,920,386 UART: [art] Derive Key Pair - Done
2,934,964 UART: [art] Signing Cert with AUTHO
2,935,444 UART: RITY.KEYID = 7
2,950,622 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,387 UART: [art] PUB.X = 51686B231F55C2DC92AB63E43A12793E2AF5018F3E044D70173F77725053EB90B91B0BDBB11D2B8B4C80E313024DB53C
2,958,147 UART: [art] PUB.Y = 1CA3C4F1D915616105B1A0C7543B18A2DF272D15A067AD69DD6EC9AA6F93D652C05DD3E41D234AC409FF7DC8A14612DB
2,965,105 UART: [art] SIG.R = 220E75DCB08EE6835084C4CC6BF4F8AE2451BC08409D9E21ABE47C5B60337CD1CA9BC10324E376AA9FE6D844FC322B80
2,971,880 UART: [art] SIG.S = 82775C162507D553FCA888CF8B07DC0F6CA3E4CCE8FC73A97188E727DFD819632466E14C7BB87AB5681A07E56A873B9A
2,995,797 UART: Caliptra RT
2,996,142 UART: [state] CFI Enabled
3,103,739 UART: [rt] RT listening for mailbox commands...
3,104,409 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,577 UART: [rt]cmd =0x53574545, len=84
3,136,143 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,934 UART: [kat] SHA2-256
891,484 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,613 UART: [kat] ++
895,765 UART: [kat] sha1
900,001 UART: [kat] SHA2-256
901,941 UART: [kat] SHA2-384
904,858 UART: [kat] SHA2-512-ACC
906,759 UART: [kat] ECC-384
916,570 UART: [kat] HMAC-384Kdf
921,186 UART: [kat] LMS
1,169,498 UART: [kat] --
1,170,699 UART: [cold-reset] ++
1,171,199 UART: [fht] FHT @ 0x50003400
1,174,039 UART: [idev] ++
1,174,207 UART: [idev] CDI.KEYID = 6
1,174,568 UART: [idev] SUBJECT.KEYID = 7
1,174,993 UART: [idev] UDS.KEYID = 0
1,175,339 ready_for_fw is high
1,175,339 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,069 UART: [idev] Erasing UDS.KEYID = 0
1,200,361 UART: [idev] Sha1 KeyId Algorithm
1,209,217 UART: [idev] --
1,210,080 UART: [ldev] ++
1,210,248 UART: [ldev] CDI.KEYID = 6
1,210,612 UART: [ldev] SUBJECT.KEYID = 5
1,211,039 UART: [ldev] AUTHORITY.KEYID = 7
1,211,502 UART: [ldev] FE.KEYID = 1
1,216,880 UART: [ldev] Erasing FE.KEYID = 1
1,243,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,310 UART: [ldev] --
1,282,718 UART: [fwproc] Wait for Commands...
1,283,477 UART: [fwproc] Recv command 0x46574c44
1,284,210 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,644 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,953 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,827 >>> mbox cmd response: success
2,774,984 UART: [afmc] ++
2,775,152 UART: [afmc] CDI.KEYID = 6
2,775,515 UART: [afmc] SUBJECT.KEYID = 7
2,775,941 UART: [afmc] AUTHORITY.KEYID = 5
2,811,354 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,820 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,571 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,300 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,183 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,902 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,935 UART: [afmc] --
2,854,955 UART: [cold-reset] --
2,855,977 UART: [state] Locking Datavault
2,857,074 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,678 UART: [state] Locking ICCM
2,858,196 UART: [exit] Launching FMC @ 0x40000130
2,863,525 UART:
2,863,541 UART: Running Caliptra FMC ...
2,863,949 UART:
2,864,003 UART: [state] CFI Enabled
2,874,218 UART: [fht] FMC Alias Private Key: 7
2,982,373 UART: [art] Extend RT PCRs Done
2,982,801 UART: [art] Lock RT PCRs Done
2,984,167 UART: [art] Populate DV Done
2,992,590 UART: [fht] FMC Alias Private Key: 7
2,993,596 UART: [art] Derive CDI
2,993,876 UART: [art] Store in in slot 0x4
3,079,429 UART: [art] Derive Key Pair
3,079,789 UART: [art] Store priv key in slot 0x5
3,093,081 UART: [art] Derive Key Pair - Done
3,107,897 UART: [art] Signing Cert with AUTHO
3,108,377 UART: RITY.KEYID = 7
3,123,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,222 UART: [art] PUB.X = 64DE6E9E895CCF8BE47A4A6045C12368CD753863A3E25638F8589229771C1434596B924FF8B4830D0C5CCFA67BF43212
3,130,984 UART: [art] PUB.Y = E4027148D4F903C95C9D40374A5A7E13FD5E9E8F05CF0EE91218A6CB5FA26CA01D064939FF6999A27AC65C339B623545
3,137,923 UART: [art] SIG.R = E24968970F99DA7E3710E80320124C9F980031F4434F036B740AFF7048EC7931F94E64D30F9013343C2F1F050805F79D
3,144,635 UART: [art] SIG.S = 4EDE8F5199F808B4DB885F08155D314FE17C4405D63D2538FA01278115D40B0A98DB6CC6E18442121D03A1F7F993FE01
3,168,510 UART: Caliptra RT
3,168,763 UART: [state] CFI Enabled
3,276,182 UART: [rt] RT listening for mailbox commands...
3,276,852 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,104 UART: [rt]cmd =0x53574545, len=84
3,308,664 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,904 ready_for_fw is high
1,055,904 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,293 >>> mbox cmd response: success
2,684,173 UART:
2,684,189 UART: Running Caliptra FMC ...
2,684,597 UART:
2,684,651 UART: [state] CFI Enabled
2,695,344 UART: [fht] FMC Alias Private Key: 7
2,803,583 UART: [art] Extend RT PCRs Done
2,804,011 UART: [art] Lock RT PCRs Done
2,805,257 UART: [art] Populate DV Done
2,813,456 UART: [fht] FMC Alias Private Key: 7
2,814,450 UART: [art] Derive CDI
2,814,730 UART: [art] Store in in slot 0x4
2,900,499 UART: [art] Derive Key Pair
2,900,859 UART: [art] Store priv key in slot 0x5
2,914,087 UART: [art] Derive Key Pair - Done
2,928,612 UART: [art] Signing Cert with AUTHO
2,929,092 UART: RITY.KEYID = 7
2,944,582 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,347 UART: [art] PUB.X = F89ACB21D2822555383BA99FF719DE0A52D853AAA3A4DB96862C653FB826E2731215BEB4EC04DD1341C56B0EBFE8BDFC
2,952,126 UART: [art] PUB.Y = 6AA4A34FB391495C23FFD27794B9D34003CACE407F5BB5BCBC6D45E4A3E55CA04F6D066DCD1BCEB68FBBAFEB5A8CDF8D
2,959,106 UART: [art] SIG.R = BA1E5D20686A4F3E80E1940F60273C15719DB9B1D21EBFBB149D068A58B5902561B150AAE0084D9A86FF74461720479C
2,965,867 UART: [art] SIG.S = A069EC72EEE16B8285792F85A9FB5055B7EC126974B3DB68172FA54455F60A14D641307E9EC8B625BE76DC61D729C68D
2,989,443 UART: Caliptra RT
2,989,696 UART: [state] CFI Enabled
3,097,010 UART: [rt] RT listening for mailbox commands...
3,097,680 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,014 UART: [rt]cmd =0x53574545, len=84
3,129,296 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,508 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
891,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,482 UART: [kat] ++
895,634 UART: [kat] sha1
899,896 UART: [kat] SHA2-256
901,836 UART: [kat] SHA2-384
904,597 UART: [kat] SHA2-512-ACC
906,498 UART: [kat] ECC-384
916,303 UART: [kat] HMAC-384Kdf
920,755 UART: [kat] LMS
1,169,067 UART: [kat] --
1,169,954 UART: [cold-reset] ++
1,170,326 UART: [fht] FHT @ 0x50003400
1,173,040 UART: [idev] ++
1,173,208 UART: [idev] CDI.KEYID = 6
1,173,569 UART: [idev] SUBJECT.KEYID = 7
1,173,994 UART: [idev] UDS.KEYID = 0
1,174,340 ready_for_fw is high
1,174,340 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,860 UART: [idev] Erasing UDS.KEYID = 0
1,198,946 UART: [idev] Sha1 KeyId Algorithm
1,207,742 UART: [idev] --
1,208,783 UART: [ldev] ++
1,208,951 UART: [ldev] CDI.KEYID = 6
1,209,315 UART: [ldev] SUBJECT.KEYID = 5
1,209,742 UART: [ldev] AUTHORITY.KEYID = 7
1,210,205 UART: [ldev] FE.KEYID = 1
1,215,569 UART: [ldev] Erasing FE.KEYID = 1
1,241,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,523 UART: [ldev] --
1,281,029 UART: [fwproc] Wait for Commands...
1,281,780 UART: [fwproc] Recv command 0x46574c44
1,282,513 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,158 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,080 >>> mbox cmd response: success
2,775,227 UART: [afmc] ++
2,775,395 UART: [afmc] CDI.KEYID = 6
2,775,758 UART: [afmc] SUBJECT.KEYID = 7
2,776,184 UART: [afmc] AUTHORITY.KEYID = 5
2,812,107 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,242 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,971 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,854 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,573 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,416 UART: [afmc] --
2,855,530 UART: [cold-reset] --
2,856,594 UART: [state] Locking Datavault
2,857,533 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,137 UART: [state] Locking ICCM
2,858,595 UART: [exit] Launching FMC @ 0x40000130
2,863,924 UART:
2,863,940 UART: Running Caliptra FMC ...
2,864,348 UART:
2,864,491 UART: [state] CFI Enabled
2,875,288 UART: [fht] FMC Alias Private Key: 7
2,982,805 UART: [art] Extend RT PCRs Done
2,983,233 UART: [art] Lock RT PCRs Done
2,984,817 UART: [art] Populate DV Done
2,992,770 UART: [fht] FMC Alias Private Key: 7
2,993,798 UART: [art] Derive CDI
2,994,078 UART: [art] Store in in slot 0x4
3,079,963 UART: [art] Derive Key Pair
3,080,323 UART: [art] Store priv key in slot 0x5
3,093,209 UART: [art] Derive Key Pair - Done
3,108,220 UART: [art] Signing Cert with AUTHO
3,108,700 UART: RITY.KEYID = 7
3,124,064 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,829 UART: [art] PUB.X = 33B6DEDC0AF8F39B7F4BBAC37466E7D4A89E3382305BF5B6988080133BE2C423C427D380AD585F22FC022FBC1728C8E1
3,131,603 UART: [art] PUB.Y = 43935FB0E2CD3FE84200A6F257AFF0EF497D0EBBA95739EEBD43831F9E25F3EFD67447193B96D84FE5A1B2C97EFBCC23
3,138,548 UART: [art] SIG.R = 01E944585062474B01AC4CEA8CD304EBC05C8CF7052E7E40AFDED6C576B1B479D038294C60447D78020D2BC1F881A2F5
3,145,306 UART: [art] SIG.S = EB29F30A3ECF63EB5ED9176848B1F5C050C2A441D3AC639A6A32F78FCC6BB956F4E513FAEE1F500D293E2CD3E7361F63
3,169,187 UART: Caliptra RT
3,169,532 UART: [state] CFI Enabled
3,276,919 UART: [rt] RT listening for mailbox commands...
3,277,589 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,017 UART: [rt]cmd =0x53574545, len=84
3,309,497 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,571 ready_for_fw is high
1,055,571 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,586 >>> mbox cmd response: success
2,684,404 UART:
2,684,420 UART: Running Caliptra FMC ...
2,684,828 UART:
2,684,971 UART: [state] CFI Enabled
2,695,348 UART: [fht] FMC Alias Private Key: 7
2,803,983 UART: [art] Extend RT PCRs Done
2,804,411 UART: [art] Lock RT PCRs Done
2,805,931 UART: [art] Populate DV Done
2,814,264 UART: [fht] FMC Alias Private Key: 7
2,815,214 UART: [art] Derive CDI
2,815,494 UART: [art] Store in in slot 0x4
2,901,169 UART: [art] Derive Key Pair
2,901,529 UART: [art] Store priv key in slot 0x5
2,915,163 UART: [art] Derive Key Pair - Done
2,929,918 UART: [art] Signing Cert with AUTHO
2,930,398 UART: RITY.KEYID = 7
2,945,650 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,415 UART: [art] PUB.X = 1DD0D9F715243469B1BED00D8773A7EAE62F480A669AF1FBC5BCC7F500882F510CACD83B8D743F23093D63B58E76A3DA
2,953,165 UART: [art] PUB.Y = F40E01ECD877451277AD9440983D72C513C8F95063E9E8E2F28696CA0DA5080CAF7B5A3D08BECA9A73543D48CA9E19A1
2,960,105 UART: [art] SIG.R = 62C961A3240B7E7C1CFE9B5A02C8B0A4A3AB260DFE3ADA25125171D31B26E2FE329CB4078FBD8AF7B16230C03582CE1C
2,966,879 UART: [art] SIG.S = 25744B11F23EBEB0BB9997531C2CC6E2C51634D8CECF044FF8CDC1D9271261D4F3E4EC760C4285ED14E1CCA0CEF05DF8
2,990,966 UART: Caliptra RT
2,991,311 UART: [state] CFI Enabled
3,099,520 UART: [rt] RT listening for mailbox commands...
3,100,190 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,336 UART: [rt]cmd =0x53574545, len=84
3,131,924 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Unprovisioned
86,137 UART: [state] DebugLocked = No
86,855 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,459 UART: [kat] SHA2-256
882,390 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,505 UART: [kat] ++
886,657 UART: [kat] sha1
890,977 UART: [kat] SHA2-256
892,915 UART: [kat] SHA2-384
895,622 UART: [kat] SHA2-512-ACC
897,523 UART: [kat] ECC-384
903,134 UART: [kat] HMAC-384Kdf
907,690 UART: [kat] LMS
1,475,886 UART: [kat] --
1,476,753 UART: [cold-reset] ++
1,477,209 UART: [fht] Storing FHT @ 0x50003400
1,480,156 UART: [idev] ++
1,480,324 UART: [idev] CDI.KEYID = 6
1,480,684 UART: [idev] SUBJECT.KEYID = 7
1,481,108 UART: [idev] UDS.KEYID = 0
1,481,453 ready_for_fw is high
1,481,453 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,228 UART: [idev] Erasing UDS.KEYID = 0
1,505,640 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,370 UART: [idev] --
1,515,265 UART: [ldev] ++
1,515,433 UART: [ldev] CDI.KEYID = 6
1,515,796 UART: [ldev] SUBJECT.KEYID = 5
1,516,222 UART: [ldev] AUTHORITY.KEYID = 7
1,516,685 UART: [ldev] FE.KEYID = 1
1,521,623 UART: [ldev] Erasing FE.KEYID = 1
1,547,618 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,748 UART: [ldev] --
1,587,229 UART: [fwproc] Waiting for Commands...
1,588,052 UART: [fwproc] Received command 0x46574c44
1,588,843 UART: [fwproc] Received Image of size 114332 bytes
2,887,553 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,415 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,767 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,538 >>> mbox cmd response: success
3,080,700 UART: [afmc] ++
3,080,868 UART: [afmc] CDI.KEYID = 6
3,081,230 UART: [afmc] SUBJECT.KEYID = 7
3,081,655 UART: [afmc] AUTHORITY.KEYID = 5
3,116,516 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,014 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,794 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,522 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,407 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,097 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,196 UART: [afmc] --
3,160,276 UART: [cold-reset] --
3,161,226 UART: [state] Locking Datavault
3,162,131 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,735 UART: [state] Locking ICCM
3,163,233 UART: [exit] Launching FMC @ 0x40000130
3,168,562 UART:
3,168,578 UART: Running Caliptra FMC ...
3,168,986 UART:
3,169,040 UART: [state] CFI Enabled
3,179,561 UART: [fht] FMC Alias Private Key: 7
3,287,222 UART: [art] Extend RT PCRs Done
3,287,650 UART: [art] Lock RT PCRs Done
3,289,168 UART: [art] Populate DV Done
3,297,723 UART: [fht] FMC Alias Private Key: 7
3,298,891 UART: [art] Derive CDI
3,299,171 UART: [art] Store in in slot 0x4
3,384,796 UART: [art] Derive Key Pair
3,385,156 UART: [art] Store priv key in slot 0x5
3,398,044 UART: [art] Derive Key Pair - Done
3,412,677 UART: [art] Signing Cert with AUTHO
3,413,157 UART: RITY.KEYID = 7
3,428,775 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,540 UART: [art] PUB.X = CCBD11C2F3BFCF9A121733B07FE8699C40A1067762BE1A65C6489C091195D5EDBD2AD600F5CFA092CA30DFF0938A9F90
3,436,298 UART: [art] PUB.Y = 4E29DD7DAC4EB96A0BC777E90A6A1CB15E02984727AB5876C4BFABFE224A259DA55F95B4D51B547F4B53CAD9E7531DDE
3,443,261 UART: [art] SIG.R = 3D4AB7FF8B1D65F39DDE2C4BB4EF5A79B523923E453646B40681C0982FCFB3A040914EAE443CD89BE0006D7B67D1616D
3,450,018 UART: [art] SIG.S = B71DD423C890CB1B12E5D3C72A2275172A6E05C3C92E04930A6575785D7F9B4BEBCEC16E0381C48AFF91CFFD42D1CCCA
3,473,203 UART: Caliptra RT
3,473,456 UART: [state] CFI Enabled
3,582,673 UART: [rt] RT listening for mailbox commands...
3,583,343 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,925 UART: [rt]cmd =0x4d454153, len=108
3,615,278 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,427 ready_for_fw is high
1,362,427 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,284 >>> mbox cmd response: success
2,988,474 UART:
2,988,490 UART: Running Caliptra FMC ...
2,988,898 UART:
2,988,952 UART: [state] CFI Enabled
2,999,437 UART: [fht] FMC Alias Private Key: 7
3,108,056 UART: [art] Extend RT PCRs Done
3,108,484 UART: [art] Lock RT PCRs Done
3,109,920 UART: [art] Populate DV Done
3,118,083 UART: [fht] FMC Alias Private Key: 7
3,119,239 UART: [art] Derive CDI
3,119,519 UART: [art] Store in in slot 0x4
3,204,934 UART: [art] Derive Key Pair
3,205,294 UART: [art] Store priv key in slot 0x5
3,218,862 UART: [art] Derive Key Pair - Done
3,233,757 UART: [art] Signing Cert with AUTHO
3,234,237 UART: RITY.KEYID = 7
3,249,115 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,880 UART: [art] PUB.X = FB2B0F09ECE95E3EEE8464D6F099B291479E3BAF843CBE5DD9ADBBEEB253F70CE758CA4A90E1D53CBA712220D16C4ADA
3,256,671 UART: [art] PUB.Y = E16A17822D78CAD54FC767C5F3789EE5D57E7DE1DE0709751A8F9CF67FCB00F1B320C7BA267FDF2008E6B5BD90E0BB8B
3,263,610 UART: [art] SIG.R = A89C35527A517F8EA870692C3E0137F3BCC27337395954B953E178E4AE8D1934397142C95AC329AB98CD8477E9596370
3,270,367 UART: [art] SIG.S = A26095912D1666272C0207689280EF439ABD87209805B0B29C5F4ACAD388C0B093112EF3E61BB5D919B22856B4F22887
3,294,019 UART: Caliptra RT
3,294,272 UART: [state] CFI Enabled
3,402,978 UART: [rt] RT listening for mailbox commands...
3,403,648 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,164 UART: [rt]cmd =0x4d454153, len=108
3,435,741 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,568 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,140 UART: [kat] SHA2-256
882,071 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,186 UART: [kat] ++
886,338 UART: [kat] sha1
890,670 UART: [kat] SHA2-256
892,608 UART: [kat] SHA2-384
895,389 UART: [kat] SHA2-512-ACC
897,290 UART: [kat] ECC-384
903,007 UART: [kat] HMAC-384Kdf
907,725 UART: [kat] LMS
1,475,921 UART: [kat] --
1,476,782 UART: [cold-reset] ++
1,477,330 UART: [fht] Storing FHT @ 0x50003400
1,480,109 UART: [idev] ++
1,480,277 UART: [idev] CDI.KEYID = 6
1,480,637 UART: [idev] SUBJECT.KEYID = 7
1,481,061 UART: [idev] UDS.KEYID = 0
1,481,406 ready_for_fw is high
1,481,406 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,935 UART: [idev] Erasing UDS.KEYID = 0
1,505,219 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,645 UART: [idev] --
1,514,718 UART: [ldev] ++
1,514,886 UART: [ldev] CDI.KEYID = 6
1,515,249 UART: [ldev] SUBJECT.KEYID = 5
1,515,675 UART: [ldev] AUTHORITY.KEYID = 7
1,516,138 UART: [ldev] FE.KEYID = 1
1,521,532 UART: [ldev] Erasing FE.KEYID = 1
1,547,231 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,295 UART: [ldev] --
1,586,646 UART: [fwproc] Waiting for Commands...
1,587,307 UART: [fwproc] Received command 0x46574c44
1,588,098 UART: [fwproc] Received Image of size 114332 bytes
2,885,478 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,382 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,734 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,631 >>> mbox cmd response: success
3,079,783 UART: [afmc] ++
3,079,951 UART: [afmc] CDI.KEYID = 6
3,080,313 UART: [afmc] SUBJECT.KEYID = 7
3,080,738 UART: [afmc] AUTHORITY.KEYID = 5
3,116,555 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,661 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,441 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,169 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,054 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,744 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,651 UART: [afmc] --
3,159,567 UART: [cold-reset] --
3,160,431 UART: [state] Locking Datavault
3,161,594 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,198 UART: [state] Locking ICCM
3,162,754 UART: [exit] Launching FMC @ 0x40000130
3,168,083 UART:
3,168,099 UART: Running Caliptra FMC ...
3,168,507 UART:
3,168,650 UART: [state] CFI Enabled
3,179,241 UART: [fht] FMC Alias Private Key: 7
3,287,144 UART: [art] Extend RT PCRs Done
3,287,572 UART: [art] Lock RT PCRs Done
3,289,088 UART: [art] Populate DV Done
3,297,121 UART: [fht] FMC Alias Private Key: 7
3,298,273 UART: [art] Derive CDI
3,298,553 UART: [art] Store in in slot 0x4
3,384,040 UART: [art] Derive Key Pair
3,384,400 UART: [art] Store priv key in slot 0x5
3,398,146 UART: [art] Derive Key Pair - Done
3,412,776 UART: [art] Signing Cert with AUTHO
3,413,256 UART: RITY.KEYID = 7
3,428,524 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,289 UART: [art] PUB.X = 6ADF45574D73A060C203F177020AD8926A9B6F5E321F8033CF70D0E1E56124FEE1488EC5267809A226C97FCEDEF9C841
3,436,051 UART: [art] PUB.Y = CEEC161D13D69E9B4C83A4F7DC55609B15522085D929208FEA039B2BC4035F9AFBC983426B3BE61F56ACDD48F5783D46
3,443,005 UART: [art] SIG.R = 83CFB7FA312729810D8D6086CE293ED5A6A612756E272BFA17FCD61F2982227A4DD6954104C9C03303412C56ACE925DC
3,449,768 UART: [art] SIG.S = 499AC67ACA26C422BE87FECD080B312EA802EF96572959A44344186CDCD411641B5BE6246215541E03C574363CDB2A5C
3,474,067 UART: Caliptra RT
3,474,412 UART: [state] CFI Enabled
3,582,969 UART: [rt] RT listening for mailbox commands...
3,583,639 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,301 UART: [rt]cmd =0x4d454153, len=108
3,615,902 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,894 ready_for_fw is high
1,362,894 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,875 >>> mbox cmd response: success
2,988,805 UART:
2,988,821 UART: Running Caliptra FMC ...
2,989,229 UART:
2,989,372 UART: [state] CFI Enabled
2,999,885 UART: [fht] FMC Alias Private Key: 7
3,108,196 UART: [art] Extend RT PCRs Done
3,108,624 UART: [art] Lock RT PCRs Done
3,110,148 UART: [art] Populate DV Done
3,118,649 UART: [fht] FMC Alias Private Key: 7
3,119,601 UART: [art] Derive CDI
3,119,881 UART: [art] Store in in slot 0x4
3,205,520 UART: [art] Derive Key Pair
3,205,880 UART: [art] Store priv key in slot 0x5
3,219,678 UART: [art] Derive Key Pair - Done
3,234,147 UART: [art] Signing Cert with AUTHO
3,234,627 UART: RITY.KEYID = 7
3,249,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,698 UART: [art] PUB.X = 1052B6E4980332C7E53C722AB62A231B77009D4D95AF7CBEEDB9E86421A49A32E95BE99B3FF1E74ACBF27672E986990F
3,257,448 UART: [art] PUB.Y = A243D77337DDA5DCA3BD3C4AD51A410F055140653AA0A204ABFF29FF97DEDDFC0F73D1AF9308CFC80490C75E8DD9C4B7
3,264,404 UART: [art] SIG.R = 72A2D732C2F032B365D8DFC28F7FA3BCC45D092A6C0F00FC6D07F42CF3CB5088C9D25BD46ABDAF82587F808BECAD6FAB
3,271,171 UART: [art] SIG.S = BDDBEEFBE21CF5CB490398245E632BC77CE87E26732860F85C3112BF4044E6AE0148575CBC83E6CD6AC667F1AC7386E2
3,295,424 UART: Caliptra RT
3,295,769 UART: [state] CFI Enabled
3,404,760 UART: [rt] RT listening for mailbox commands...
3,405,430 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,000 UART: [rt]cmd =0x4d454153, len=108
3,437,305 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,647 UART: [state] WD Timer not started. Device not locked for debugging
87,816 UART: [kat] SHA2-256
893,466 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,591 UART: [kat] ++
897,743 UART: [kat] sha1
901,979 UART: [kat] SHA2-256
903,919 UART: [kat] SHA2-384
906,756 UART: [kat] SHA2-512-ACC
908,657 UART: [kat] ECC-384
918,648 UART: [kat] HMAC-384Kdf
923,286 UART: [kat] LMS
1,171,614 UART: [kat] --
1,172,361 UART: [cold-reset] ++
1,172,735 UART: [fht] FHT @ 0x50003400
1,175,254 UART: [idev] ++
1,175,422 UART: [idev] CDI.KEYID = 6
1,175,782 UART: [idev] SUBJECT.KEYID = 7
1,176,206 UART: [idev] UDS.KEYID = 0
1,176,551 ready_for_fw is high
1,176,551 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,126 UART: [idev] Erasing UDS.KEYID = 0
1,200,749 UART: [idev] Sha1 KeyId Algorithm
1,209,157 UART: [idev] --
1,210,223 UART: [ldev] ++
1,210,391 UART: [ldev] CDI.KEYID = 6
1,210,754 UART: [ldev] SUBJECT.KEYID = 5
1,211,180 UART: [ldev] AUTHORITY.KEYID = 7
1,211,643 UART: [ldev] FE.KEYID = 1
1,216,721 UART: [ldev] Erasing FE.KEYID = 1
1,243,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,551 UART: [ldev] --
1,282,812 UART: [fwproc] Wait for Commands...
1,283,430 UART: [fwproc] Recv command 0x46574c44
1,284,158 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,282 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,586 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,443 >>> mbox cmd response: success
2,774,485 UART: [afmc] ++
2,774,653 UART: [afmc] CDI.KEYID = 6
2,775,015 UART: [afmc] SUBJECT.KEYID = 7
2,775,440 UART: [afmc] AUTHORITY.KEYID = 5
2,810,833 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,286 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,034 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,762 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,647 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,366 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,278 UART: [afmc] --
2,854,346 UART: [cold-reset] --
2,855,004 UART: [state] Locking Datavault
2,855,891 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,495 UART: [state] Locking ICCM
2,857,093 UART: [exit] Launching FMC @ 0x40000130
2,862,422 UART:
2,862,438 UART: Running Caliptra FMC ...
2,862,846 UART:
2,862,900 UART: [state] CFI Enabled
2,873,311 UART: [fht] FMC Alias Private Key: 7
2,981,520 UART: [art] Extend RT PCRs Done
2,981,948 UART: [art] Lock RT PCRs Done
2,983,714 UART: [art] Populate DV Done
2,992,261 UART: [fht] FMC Alias Private Key: 7
2,993,263 UART: [art] Derive CDI
2,993,543 UART: [art] Store in in slot 0x4
3,079,554 UART: [art] Derive Key Pair
3,079,914 UART: [art] Store priv key in slot 0x5
3,093,024 UART: [art] Derive Key Pair - Done
3,107,681 UART: [art] Signing Cert with AUTHO
3,108,161 UART: RITY.KEYID = 7
3,123,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,300 UART: [art] PUB.X = 66F410382C1151ADF02F5877ECFE9CDFE3740BF3EBCD3701D6BD9B5E0173EEEB69FB865B35F842E2F2B55CB75609EC56
3,131,076 UART: [art] PUB.Y = 40B838931A7E1F58BF797DE26560B3D6D7B115AD67A324207A8B492D988BB8B19D49EE97FE7C95A72C2A94D7777CC403
3,138,027 UART: [art] SIG.R = 82B9D32F31048F58BD8108B294D76F40B6E5F64A68713D5ACA614CEB234356527489B5A65F912DDF4F66CAA01EC7C657
3,144,795 UART: [art] SIG.S = 26E6225D8C6EE4CD67AD8418896105F9936BD9D925945B2C2A437C326E6EA28C1B945DFC11B663E25B548C4B487A125C
3,169,073 UART: Caliptra RT
3,169,326 UART: [state] CFI Enabled
3,276,787 UART: [rt] RT listening for mailbox commands...
3,277,457 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,325 UART: [rt]cmd =0x4d454153, len=108
3,309,654 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,055 ready_for_fw is high
1,061,055 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,118 >>> mbox cmd response: success
2,689,164 UART:
2,689,180 UART: Running Caliptra FMC ...
2,689,588 UART:
2,689,642 UART: [state] CFI Enabled
2,700,177 UART: [fht] FMC Alias Private Key: 7
2,807,726 UART: [art] Extend RT PCRs Done
2,808,154 UART: [art] Lock RT PCRs Done
2,809,874 UART: [art] Populate DV Done
2,818,073 UART: [fht] FMC Alias Private Key: 7
2,819,251 UART: [art] Derive CDI
2,819,531 UART: [art] Store in in slot 0x4
2,905,222 UART: [art] Derive Key Pair
2,905,582 UART: [art] Store priv key in slot 0x5
2,919,172 UART: [art] Derive Key Pair - Done
2,933,825 UART: [art] Signing Cert with AUTHO
2,934,305 UART: RITY.KEYID = 7
2,949,003 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,768 UART: [art] PUB.X = C25E37C8C445EDB3D1E847FC2A24585AD9CACA4425718C3AF7FD6ADD350745A3A78484ED97FA04E91D8485C4B9B42E33
2,956,546 UART: [art] PUB.Y = 4FF081B6AD00EBA47038F2399573DDE1877DFFF2E2D193EDAB865206EE846DBB591E28828AF752A85842E6AA9F6AC820
2,963,483 UART: [art] SIG.R = 1BFC0D9EB77EBAB9DB70E604E800C9DAC0E3616FE624B9CE3B0696E8EC93556350BE0AC47A283C896B5AD367E55D7B25
2,970,237 UART: [art] SIG.S = 7D2C472C7EB57CB0AEAB6BFB22DF25A80BB77AF3E106EEBD92E4B46DCF006D7A8AAD7281F48C145FB176A52F7BDDE1E3
2,995,004 UART: Caliptra RT
2,995,257 UART: [state] CFI Enabled
3,103,502 UART: [rt] RT listening for mailbox commands...
3,104,172 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,842 UART: [rt]cmd =0x4d454153, len=108
3,136,431 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
893,353 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,478 UART: [kat] ++
897,630 UART: [kat] sha1
901,756 UART: [kat] SHA2-256
903,696 UART: [kat] SHA2-384
906,535 UART: [kat] SHA2-512-ACC
908,436 UART: [kat] ECC-384
918,431 UART: [kat] HMAC-384Kdf
923,219 UART: [kat] LMS
1,171,547 UART: [kat] --
1,172,630 UART: [cold-reset] ++
1,173,030 UART: [fht] FHT @ 0x50003400
1,175,727 UART: [idev] ++
1,175,895 UART: [idev] CDI.KEYID = 6
1,176,255 UART: [idev] SUBJECT.KEYID = 7
1,176,679 UART: [idev] UDS.KEYID = 0
1,177,024 ready_for_fw is high
1,177,024 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,851 UART: [idev] Erasing UDS.KEYID = 0
1,202,164 UART: [idev] Sha1 KeyId Algorithm
1,210,438 UART: [idev] --
1,211,574 UART: [ldev] ++
1,211,742 UART: [ldev] CDI.KEYID = 6
1,212,105 UART: [ldev] SUBJECT.KEYID = 5
1,212,531 UART: [ldev] AUTHORITY.KEYID = 7
1,212,994 UART: [ldev] FE.KEYID = 1
1,218,260 UART: [ldev] Erasing FE.KEYID = 1
1,244,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,832 UART: [ldev] --
1,284,253 UART: [fwproc] Wait for Commands...
1,284,871 UART: [fwproc] Recv command 0x46574c44
1,285,599 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,909 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,213 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,777,104 >>> mbox cmd response: success
2,778,238 UART: [afmc] ++
2,778,406 UART: [afmc] CDI.KEYID = 6
2,778,768 UART: [afmc] SUBJECT.KEYID = 7
2,779,193 UART: [afmc] AUTHORITY.KEYID = 5
2,815,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,603 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,351 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,079 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,964 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,683 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,443 UART: [afmc] --
2,858,385 UART: [cold-reset] --
2,859,393 UART: [state] Locking Datavault
2,860,634 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,238 UART: [state] Locking ICCM
2,861,712 UART: [exit] Launching FMC @ 0x40000130
2,867,041 UART:
2,867,057 UART: Running Caliptra FMC ...
2,867,465 UART:
2,867,608 UART: [state] CFI Enabled
2,878,021 UART: [fht] FMC Alias Private Key: 7
2,986,186 UART: [art] Extend RT PCRs Done
2,986,614 UART: [art] Lock RT PCRs Done
2,988,108 UART: [art] Populate DV Done
2,996,221 UART: [fht] FMC Alias Private Key: 7
2,997,275 UART: [art] Derive CDI
2,997,555 UART: [art] Store in in slot 0x4
3,082,876 UART: [art] Derive Key Pair
3,083,236 UART: [art] Store priv key in slot 0x5
3,097,170 UART: [art] Derive Key Pair - Done
3,112,047 UART: [art] Signing Cert with AUTHO
3,112,527 UART: RITY.KEYID = 7
3,127,759 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,524 UART: [art] PUB.X = BC9DDE6FBAC82C5DA4A4EDC4E7162C2A2B0C32AEA44A259AC0079A1B23C62DCAFC74A47F78D07C84E0AA1D07C8F61CF9
3,135,317 UART: [art] PUB.Y = 762E73C9EC328D3A079BE49763A10B34E0B6BCFD7A01CC085F97341E2AEB241BC0CB83194F06879A177795BB0AEA867A
3,142,259 UART: [art] SIG.R = BB74D32A369948679B02117A85A35E77BDDEA7B3A0656EE0B490E97B078B96B2AB15F6B3BDF58021B8608614F22115ED
3,149,027 UART: [art] SIG.S = 40A3D23CF8897E3CF0EFDD6F8C8ADD349BFC2FC62E4EFBE70E58D7CCC6B20CDB3CB4EFDBA920A929FBA452ADDF908CFA
3,172,806 UART: Caliptra RT
3,173,151 UART: [state] CFI Enabled
3,280,708 UART: [rt] RT listening for mailbox commands...
3,281,378 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,580 UART: [rt]cmd =0x4d454153, len=108
3,313,111 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,248 ready_for_fw is high
1,061,248 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,563 >>> mbox cmd response: success
2,687,661 UART:
2,687,677 UART: Running Caliptra FMC ...
2,688,085 UART:
2,688,228 UART: [state] CFI Enabled
2,698,699 UART: [fht] FMC Alias Private Key: 7
2,806,482 UART: [art] Extend RT PCRs Done
2,806,910 UART: [art] Lock RT PCRs Done
2,808,360 UART: [art] Populate DV Done
2,816,417 UART: [fht] FMC Alias Private Key: 7
2,817,387 UART: [art] Derive CDI
2,817,667 UART: [art] Store in in slot 0x4
2,902,916 UART: [art] Derive Key Pair
2,903,276 UART: [art] Store priv key in slot 0x5
2,916,450 UART: [art] Derive Key Pair - Done
2,931,241 UART: [art] Signing Cert with AUTHO
2,931,721 UART: RITY.KEYID = 7
2,946,745 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,510 UART: [art] PUB.X = 07EBA75EA37687378181102E378327E8E8CADF750F928BC0EBFE1DAC651A6E252275EFA21AE3E6D6FA7F4CD80C3557E4
2,954,285 UART: [art] PUB.Y = B6E681CBDA8353842B300A662D5B6E7FE85DF80AE56214026F617DB0CB7C409848E9A9DB1A301510A9853D36AC768149
2,961,228 UART: [art] SIG.R = DAF7D5952B838087AB5E3BAFD3FAE7B004ACE51394A65C8A60387C10A44819DD4E3B058F5CF1E6BD6BC81F61132B9271
2,968,006 UART: [art] SIG.S = D5CC27A50F03FE55C922144CCE0AC12F4D4A1CCAE13314C4BEF8941F86C7A9A1899C4C934218E234E69C4A28B99E31DC
2,992,632 UART: Caliptra RT
2,992,977 UART: [state] CFI Enabled
3,101,821 UART: [rt] RT listening for mailbox commands...
3,102,491 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,203 UART: [rt]cmd =0x4d454153, len=108
3,134,756 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,888 UART: [state] LifecycleState = Unprovisioned
85,543 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [kat] SHA2-256
891,050 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,179 UART: [kat] ++
895,331 UART: [kat] sha1
899,591 UART: [kat] SHA2-256
901,531 UART: [kat] SHA2-384
904,426 UART: [kat] SHA2-512-ACC
906,327 UART: [kat] ECC-384
916,266 UART: [kat] HMAC-384Kdf
921,054 UART: [kat] LMS
1,169,366 UART: [kat] --
1,170,503 UART: [cold-reset] ++
1,171,059 UART: [fht] FHT @ 0x50003400
1,173,691 UART: [idev] ++
1,173,859 UART: [idev] CDI.KEYID = 6
1,174,220 UART: [idev] SUBJECT.KEYID = 7
1,174,645 UART: [idev] UDS.KEYID = 0
1,174,991 ready_for_fw is high
1,174,991 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,355 UART: [idev] Erasing UDS.KEYID = 0
1,199,379 UART: [idev] Sha1 KeyId Algorithm
1,208,247 UART: [idev] --
1,209,302 UART: [ldev] ++
1,209,470 UART: [ldev] CDI.KEYID = 6
1,209,834 UART: [ldev] SUBJECT.KEYID = 5
1,210,261 UART: [ldev] AUTHORITY.KEYID = 7
1,210,724 UART: [ldev] FE.KEYID = 1
1,215,832 UART: [ldev] Erasing FE.KEYID = 1
1,242,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,196 UART: [ldev] --
1,281,670 UART: [fwproc] Wait for Commands...
1,282,287 UART: [fwproc] Recv command 0x46574c44
1,283,020 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,112 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,421 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,297 >>> mbox cmd response: success
2,775,544 UART: [afmc] ++
2,775,712 UART: [afmc] CDI.KEYID = 6
2,776,075 UART: [afmc] SUBJECT.KEYID = 7
2,776,501 UART: [afmc] AUTHORITY.KEYID = 5
2,812,156 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,582 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,333 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,062 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,945 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,664 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,421 UART: [afmc] --
2,855,315 UART: [cold-reset] --
2,856,239 UART: [state] Locking Datavault
2,857,374 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,978 UART: [state] Locking ICCM
2,858,416 UART: [exit] Launching FMC @ 0x40000130
2,863,745 UART:
2,863,761 UART: Running Caliptra FMC ...
2,864,169 UART:
2,864,223 UART: [state] CFI Enabled
2,874,688 UART: [fht] FMC Alias Private Key: 7
2,983,367 UART: [art] Extend RT PCRs Done
2,983,795 UART: [art] Lock RT PCRs Done
2,985,559 UART: [art] Populate DV Done
2,993,768 UART: [fht] FMC Alias Private Key: 7
2,994,930 UART: [art] Derive CDI
2,995,210 UART: [art] Store in in slot 0x4
3,080,775 UART: [art] Derive Key Pair
3,081,135 UART: [art] Store priv key in slot 0x5
3,094,627 UART: [art] Derive Key Pair - Done
3,109,242 UART: [art] Signing Cert with AUTHO
3,109,722 UART: RITY.KEYID = 7
3,124,490 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,255 UART: [art] PUB.X = C76966A85E4474FEF320187301BB228E5503918E7C74B67DE1D69A289ACD9D7C795132375ADA8587ECE470206B30B21E
3,132,017 UART: [art] PUB.Y = 85775E03095D89EF8AF238FCA9786CB9746427FAD4ECCA65C1F8F96C95AD3FF45F5542068A9A63E0FB18DE700E038F9C
3,138,964 UART: [art] SIG.R = 94B8C0F218F0A9AEFB4902CF1B1E39A3404B4E0355AFEDBD47C1CC18DBCB9DD3A97C1315B599679FC45B23FCB380E854
3,145,748 UART: [art] SIG.S = 9CE772ABE85BF4BC03701CDBDB8F5C097AA6B653971FDB0E2B6E37B1428F5BDB35F941F867DE7CCA6ADBA35774A9774E
3,170,016 UART: Caliptra RT
3,170,269 UART: [state] CFI Enabled
3,277,699 UART: [rt] RT listening for mailbox commands...
3,278,369 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,997 UART: [rt]cmd =0x4d454153, len=108
3,310,400 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,254 ready_for_fw is high
1,056,254 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,321 >>> mbox cmd response: success
2,683,901 UART:
2,683,917 UART: Running Caliptra FMC ...
2,684,325 UART:
2,684,379 UART: [state] CFI Enabled
2,695,074 UART: [fht] FMC Alias Private Key: 7
2,803,453 UART: [art] Extend RT PCRs Done
2,803,881 UART: [art] Lock RT PCRs Done
2,805,605 UART: [art] Populate DV Done
2,813,730 UART: [fht] FMC Alias Private Key: 7
2,814,836 UART: [art] Derive CDI
2,815,116 UART: [art] Store in in slot 0x4
2,901,049 UART: [art] Derive Key Pair
2,901,409 UART: [art] Store priv key in slot 0x5
2,914,041 UART: [art] Derive Key Pair - Done
2,928,503 UART: [art] Signing Cert with AUTHO
2,928,983 UART: RITY.KEYID = 7
2,944,351 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,116 UART: [art] PUB.X = 8E294B9146F5D962D65979B170627C41B722E801685AC4A02096726AC8D27F7A2F295548DAAE75CFB786D852B3CD3CAA
2,951,885 UART: [art] PUB.Y = EDC927E1EF641030EF9AFBE52080D3E9043D3CCE9A3DB3A875310EE703813FB987E9DB2906A90024EEA8DDBBC76ED712
2,958,819 UART: [art] SIG.R = 9630C227FEF405674BCD3EF7948AFD94FADBF756DBACC7D0E609883E6D09C2295F0483A5D3A93AE6935CC84B3B10A86B
2,965,593 UART: [art] SIG.S = 27C66FABC4AA4E61D755DCEBDE50796EC37A017A25052D3E7BAE6B0A8167D21482ADBC05A3BFAD140F1818039C48B95A
2,989,392 UART: Caliptra RT
2,989,645 UART: [state] CFI Enabled
3,096,896 UART: [rt] RT listening for mailbox commands...
3,097,566 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,154 UART: [rt]cmd =0x4d454153, len=108
3,129,657 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,564 UART: [state] WD Timer not started. Device not locked for debugging
87,731 UART: [kat] SHA2-256
891,281 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,410 UART: [kat] ++
895,562 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,279 UART: [kat] SHA2-512-ACC
906,180 UART: [kat] ECC-384
916,195 UART: [kat] HMAC-384Kdf
920,679 UART: [kat] LMS
1,168,991 UART: [kat] --
1,170,070 UART: [cold-reset] ++
1,170,626 UART: [fht] FHT @ 0x50003400
1,173,070 UART: [idev] ++
1,173,238 UART: [idev] CDI.KEYID = 6
1,173,599 UART: [idev] SUBJECT.KEYID = 7
1,174,024 UART: [idev] UDS.KEYID = 0
1,174,370 ready_for_fw is high
1,174,370 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,894 UART: [idev] Erasing UDS.KEYID = 0
1,199,068 UART: [idev] Sha1 KeyId Algorithm
1,207,896 UART: [idev] --
1,208,755 UART: [ldev] ++
1,208,923 UART: [ldev] CDI.KEYID = 6
1,209,287 UART: [ldev] SUBJECT.KEYID = 5
1,209,714 UART: [ldev] AUTHORITY.KEYID = 7
1,210,177 UART: [ldev] FE.KEYID = 1
1,215,607 UART: [ldev] Erasing FE.KEYID = 1
1,242,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,779 UART: [ldev] --
1,282,285 UART: [fwproc] Wait for Commands...
1,283,050 UART: [fwproc] Recv command 0x46574c44
1,283,783 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,479 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,788 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,624 >>> mbox cmd response: success
2,775,655 UART: [afmc] ++
2,775,823 UART: [afmc] CDI.KEYID = 6
2,776,186 UART: [afmc] SUBJECT.KEYID = 7
2,776,612 UART: [afmc] AUTHORITY.KEYID = 5
2,811,271 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,849 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,600 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,329 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,212 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,931 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,630 UART: [afmc] --
2,854,710 UART: [cold-reset] --
2,855,490 UART: [state] Locking Datavault
2,856,811 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,415 UART: [state] Locking ICCM
2,858,031 UART: [exit] Launching FMC @ 0x40000130
2,863,360 UART:
2,863,376 UART: Running Caliptra FMC ...
2,863,784 UART:
2,863,927 UART: [state] CFI Enabled
2,874,528 UART: [fht] FMC Alias Private Key: 7
2,982,031 UART: [art] Extend RT PCRs Done
2,982,459 UART: [art] Lock RT PCRs Done
2,983,715 UART: [art] Populate DV Done
2,992,018 UART: [fht] FMC Alias Private Key: 7
2,993,048 UART: [art] Derive CDI
2,993,328 UART: [art] Store in in slot 0x4
3,078,719 UART: [art] Derive Key Pair
3,079,079 UART: [art] Store priv key in slot 0x5
3,092,249 UART: [art] Derive Key Pair - Done
3,107,351 UART: [art] Signing Cert with AUTHO
3,107,831 UART: RITY.KEYID = 7
3,123,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,998 UART: [art] PUB.X = 5369AD5C21E2284BFAF4C790C4BBA2CB008B8974850A0B13A7AE56BA1FBCCF561070998F194BD6E4218E8EFEA9863F1F
3,130,756 UART: [art] PUB.Y = 45E9D2B16FEC2A9B151BD99454F81881D3A3FC13CD9EFB4D2490D7B38B9DA73C7D432FA1F260FD674DA3DF20F7C79E6A
3,137,726 UART: [art] SIG.R = 9579DF3659014D5029CEC92B7BB07140FFB3E9083F5D4BD95EDF13A3908B2726D069F870B974BE7241E3A6D94E9AC739
3,144,494 UART: [art] SIG.S = ED66C308D828AF1134CC70E94837049737A001AF8633EB2B7564DBBCBBCA2F99FD2F2E0D59CD168CECEC490E6105B581
3,168,369 UART: Caliptra RT
3,168,714 UART: [state] CFI Enabled
3,276,242 UART: [rt] RT listening for mailbox commands...
3,276,912 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,408 UART: [rt]cmd =0x4d454153, len=108
3,308,891 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,759 ready_for_fw is high
1,056,759 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,760 >>> mbox cmd response: success
2,687,156 UART:
2,687,172 UART: Running Caliptra FMC ...
2,687,580 UART:
2,687,723 UART: [state] CFI Enabled
2,698,300 UART: [fht] FMC Alias Private Key: 7
2,806,105 UART: [art] Extend RT PCRs Done
2,806,533 UART: [art] Lock RT PCRs Done
2,807,823 UART: [art] Populate DV Done
2,816,136 UART: [fht] FMC Alias Private Key: 7
2,817,160 UART: [art] Derive CDI
2,817,440 UART: [art] Store in in slot 0x4
2,902,887 UART: [art] Derive Key Pair
2,903,247 UART: [art] Store priv key in slot 0x5
2,916,253 UART: [art] Derive Key Pair - Done
2,930,626 UART: [art] Signing Cert with AUTHO
2,931,106 UART: RITY.KEYID = 7
2,946,156 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,921 UART: [art] PUB.X = AB6748532CF48C767A4DBA9AAA7EC97EC65F6AA687EEA9CBFB1F37E4FFD7163F312BEDBCC3784EC307AA7BAF5911379A
2,953,718 UART: [art] PUB.Y = A541876095FEFC9D71506737D5C66D639547C69C1044CAEE38CACDAF23CE78E4AB6C1995DB472E5EFF2CEB36688E5A16
2,960,682 UART: [art] SIG.R = 095E6972753EA0E5B84BCC55CE1DCF6E05879AAC8203B536DA9C18EA0B33C538128913C729791A5E9ABEAA957DF1182C
2,967,450 UART: [art] SIG.S = 9571C78AF956AB20E5AEC1E2C9B5C1DFD928D6BD3A35ACE049BCBC759ADACD1B8028C4E3A25D9D807011DC0027494EA8
2,990,995 UART: Caliptra RT
2,991,340 UART: [state] CFI Enabled
3,098,481 UART: [rt] RT listening for mailbox commands...
3,099,151 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,593 UART: [rt]cmd =0x4d454153, len=108
3,131,166 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,472 UART: [state] LifecycleState = Unprovisioned
86,127 UART: [state] DebugLocked = No
86,639 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,339 UART: [kat] SHA2-256
882,270 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,385 UART: [kat] ++
886,537 UART: [kat] sha1
890,683 UART: [kat] SHA2-256
892,621 UART: [kat] SHA2-384
895,496 UART: [kat] SHA2-512-ACC
897,397 UART: [kat] ECC-384
902,840 UART: [kat] HMAC-384Kdf
907,454 UART: [kat] LMS
1,475,650 UART: [kat] --
1,476,557 UART: [cold-reset] ++
1,477,119 UART: [fht] Storing FHT @ 0x50003400
1,479,930 UART: [idev] ++
1,480,098 UART: [idev] CDI.KEYID = 6
1,480,458 UART: [idev] SUBJECT.KEYID = 7
1,480,882 UART: [idev] UDS.KEYID = 0
1,481,227 ready_for_fw is high
1,481,227 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,908 UART: [idev] Erasing UDS.KEYID = 0
1,505,822 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,556 UART: [idev] --
1,515,685 UART: [ldev] ++
1,515,853 UART: [ldev] CDI.KEYID = 6
1,516,216 UART: [ldev] SUBJECT.KEYID = 5
1,516,642 UART: [ldev] AUTHORITY.KEYID = 7
1,517,105 UART: [ldev] FE.KEYID = 1
1,522,255 UART: [ldev] Erasing FE.KEYID = 1
1,547,614 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,210 UART: [ldev] --
1,586,711 UART: [fwproc] Waiting for Commands...
1,587,532 UART: [fwproc] Received command 0x46574c44
1,588,323 UART: [fwproc] Received Image of size 114332 bytes
2,886,723 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,913 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,265 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,188 >>> mbox cmd response: success
3,080,414 UART: [afmc] ++
3,080,582 UART: [afmc] CDI.KEYID = 6
3,080,944 UART: [afmc] SUBJECT.KEYID = 7
3,081,369 UART: [afmc] AUTHORITY.KEYID = 5
3,116,050 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,758 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,538 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,266 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,151 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,841 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,920 UART: [afmc] --
3,159,982 UART: [cold-reset] --
3,160,764 UART: [state] Locking Datavault
3,161,971 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,575 UART: [state] Locking ICCM
3,163,149 UART: [exit] Launching FMC @ 0x40000130
3,168,478 UART:
3,168,494 UART: Running Caliptra FMC ...
3,168,902 UART:
3,168,956 UART: [state] CFI Enabled
3,179,173 UART: [fht] FMC Alias Private Key: 7
3,287,322 UART: [art] Extend RT PCRs Done
3,287,750 UART: [art] Lock RT PCRs Done
3,288,978 UART: [art] Populate DV Done
3,297,261 UART: [fht] FMC Alias Private Key: 7
3,298,417 UART: [art] Derive CDI
3,298,697 UART: [art] Store in in slot 0x4
3,384,736 UART: [art] Derive Key Pair
3,385,096 UART: [art] Store priv key in slot 0x5
3,398,216 UART: [art] Derive Key Pair - Done
3,413,080 UART: [art] Signing Cert with AUTHO
3,413,560 UART: RITY.KEYID = 7
3,428,180 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,945 UART: [art] PUB.X = 2104E8071ED3DADA063C5709F481E7821B9C114E9D3C96499950AE12531C00A7D451BDBA378757FFE4B4C290562498AB
3,435,681 UART: [art] PUB.Y = E9EDBE28EB9A5816FC3DDE1AC8F93AE736FC82A49EE92C33D77C816406504E558BE9E1F1CC3717C8E9F7E9D745268733
3,442,642 UART: [art] SIG.R = 5C94FC0413918513D94924F480F89EBA354C40FDF760BAD408EA6364D3E13A2DD5C9CC98B3903292A1F2F50BD387156A
3,449,407 UART: [art] SIG.S = DFD082F717767C6CE3FE55ED5CBD086ABBD200DF8293A20111CBB9AC0FE37593F75F1BFA578BFAD2A6B2FD31A1C754CF
3,472,699 UART: Caliptra RT
3,472,952 UART: [state] CFI Enabled
3,581,685 UART: [rt] RT listening for mailbox commands...
3,582,355 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,093 UART: [rt]cmd =0x4d454153, len=108
3,633,632 >>> mbox cmd response data (12 bytes)
3,633,633 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,598 UART: [rt]cmd =0x4d454153, len=108
3,685,407 >>> mbox cmd response data (12 bytes)
3,685,408 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,553 UART: [rt]cmd =0x4d454153, len=108
3,735,688 >>> mbox cmd response data (12 bytes)
3,735,689 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,496 UART: [rt]cmd =0x4d454153, len=108
3,786,001 >>> mbox cmd response data (12 bytes)
3,786,002 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,077 UART: [rt]cmd =0x4d454153, len=108
3,836,788 >>> mbox cmd response data (12 bytes)
3,836,789 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,888 UART: [rt]cmd =0x4d454153, len=108
3,888,245 >>> mbox cmd response data (12 bytes)
3,888,246 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,425 UART: [rt]cmd =0x4d454153, len=108
3,938,892 >>> mbox cmd response data (12 bytes)
3,938,893 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,990 UART: [rt]cmd =0x4d454153, len=108
3,990,003 >>> mbox cmd response data (12 bytes)
3,990,004 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,019,861 UART: [rt]cmd =0x4d454153, len=108
4,040,894 >>> mbox cmd response data (12 bytes)
4,040,895 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,071,036 UART: [rt]cmd =0x4d454153, len=108
4,091,783 >>> mbox cmd response data (12 bytes)
4,091,784 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,121,631 UART: [rt]cmd =0x4d454153, len=108
4,142,614 >>> mbox cmd response data (12 bytes)
4,142,615 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,172,648 UART: [rt]cmd =0x4d454153, len=108
4,193,887 >>> mbox cmd response data (12 bytes)
4,193,888 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,223,945 UART: [rt]cmd =0x4d454153, len=108
4,244,894 >>> mbox cmd response data (12 bytes)
4,244,895 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,274,802 UART: [rt]cmd =0x4d454153, len=108
4,295,607 >>> mbox cmd response data (12 bytes)
4,295,608 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,325,647 UART: [rt]cmd =0x4d454153, len=108
4,346,040 >>> mbox cmd response data (12 bytes)
4,346,041 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,375,832 UART: [rt]cmd =0x4d454153, len=108
4,377,886 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,675 ready_for_fw is high
1,362,675 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,930 >>> mbox cmd response: success
2,990,344 UART:
2,990,360 UART: Running Caliptra FMC ...
2,990,768 UART:
2,990,822 UART: [state] CFI Enabled
3,001,397 UART: [fht] FMC Alias Private Key: 7
3,109,150 UART: [art] Extend RT PCRs Done
3,109,578 UART: [art] Lock RT PCRs Done
3,111,018 UART: [art] Populate DV Done
3,119,305 UART: [fht] FMC Alias Private Key: 7
3,120,429 UART: [art] Derive CDI
3,120,709 UART: [art] Store in in slot 0x4
3,206,630 UART: [art] Derive Key Pair
3,206,990 UART: [art] Store priv key in slot 0x5
3,219,432 UART: [art] Derive Key Pair - Done
3,234,294 UART: [art] Signing Cert with AUTHO
3,234,774 UART: RITY.KEYID = 7
3,250,250 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,015 UART: [art] PUB.X = F9B364838B2CEE9C70A5FCB9811E749D6D4D1C67EE243E9096DD69F278A172FDA7CFB55E301978167537386116047967
3,257,780 UART: [art] PUB.Y = 89098906E112E6E0754EC822A2C727C3D555DE5B268B9B2CAE27992636E2DFC170185CD20B62F179121352975ED6817C
3,264,715 UART: [art] SIG.R = F03C8B158490A5DCC4116350788D4B30BC55169EA0103D57EDE64F3E9BE4FB1F4DD82A632ED50757D5639AD7AF1D921B
3,271,492 UART: [art] SIG.S = 6A620976343E6B9892E13DEEC069D867232284308861E896C1BB01B7C7CE97BD6EE5D6D23117D5D26E664F1989A96456
3,295,375 UART: Caliptra RT
3,295,628 UART: [state] CFI Enabled
3,403,987 UART: [rt] RT listening for mailbox commands...
3,404,657 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,371 UART: [rt]cmd =0x4d454153, len=108
3,456,316 >>> mbox cmd response data (12 bytes)
3,456,317 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,486,448 UART: [rt]cmd =0x4d454153, len=108
3,507,295 >>> mbox cmd response data (12 bytes)
3,507,296 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,235 UART: [rt]cmd =0x4d454153, len=108
3,558,384 >>> mbox cmd response data (12 bytes)
3,558,385 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,382 UART: [rt]cmd =0x4d454153, len=108
3,609,689 >>> mbox cmd response data (12 bytes)
3,609,690 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,905 UART: [rt]cmd =0x4d454153, len=108
3,660,442 >>> mbox cmd response data (12 bytes)
3,660,443 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,610 UART: [rt]cmd =0x4d454153, len=108
3,711,721 >>> mbox cmd response data (12 bytes)
3,711,722 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,665 UART: [rt]cmd =0x4d454153, len=108
3,762,436 >>> mbox cmd response data (12 bytes)
3,762,437 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,458 UART: [rt]cmd =0x4d454153, len=108
3,812,603 >>> mbox cmd response data (12 bytes)
3,812,604 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,737 UART: [rt]cmd =0x4d454153, len=108
3,863,592 >>> mbox cmd response data (12 bytes)
3,863,593 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,893,660 UART: [rt]cmd =0x4d454153, len=108
3,914,231 >>> mbox cmd response data (12 bytes)
3,914,232 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,291 UART: [rt]cmd =0x4d454153, len=108
3,965,196 >>> mbox cmd response data (12 bytes)
3,965,197 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,995,296 UART: [rt]cmd =0x4d454153, len=108
4,015,533 >>> mbox cmd response data (12 bytes)
4,015,534 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,689 UART: [rt]cmd =0x4d454153, len=108
4,066,628 >>> mbox cmd response data (12 bytes)
4,066,629 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,096,564 UART: [rt]cmd =0x4d454153, len=108
4,118,115 >>> mbox cmd response data (12 bytes)
4,118,116 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,148,037 UART: [rt]cmd =0x4d454153, len=108
4,168,630 >>> mbox cmd response data (12 bytes)
4,168,631 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,198,720 UART: [rt]cmd =0x4d454153, len=108
4,200,450 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,788 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,446 UART: [kat] SHA2-256
882,377 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,492 UART: [kat] ++
886,644 UART: [kat] sha1
890,948 UART: [kat] SHA2-256
892,886 UART: [kat] SHA2-384
895,669 UART: [kat] SHA2-512-ACC
897,570 UART: [kat] ECC-384
903,629 UART: [kat] HMAC-384Kdf
908,115 UART: [kat] LMS
1,476,311 UART: [kat] --
1,477,306 UART: [cold-reset] ++
1,477,800 UART: [fht] Storing FHT @ 0x50003400
1,480,625 UART: [idev] ++
1,480,793 UART: [idev] CDI.KEYID = 6
1,481,153 UART: [idev] SUBJECT.KEYID = 7
1,481,577 UART: [idev] UDS.KEYID = 0
1,481,922 ready_for_fw is high
1,481,922 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,577 UART: [idev] Erasing UDS.KEYID = 0
1,506,465 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,095 UART: [idev] --
1,516,080 UART: [ldev] ++
1,516,248 UART: [ldev] CDI.KEYID = 6
1,516,611 UART: [ldev] SUBJECT.KEYID = 5
1,517,037 UART: [ldev] AUTHORITY.KEYID = 7
1,517,500 UART: [ldev] FE.KEYID = 1
1,523,010 UART: [ldev] Erasing FE.KEYID = 1
1,548,285 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,051 UART: [ldev] --
1,587,518 UART: [fwproc] Waiting for Commands...
1,588,265 UART: [fwproc] Received command 0x46574c44
1,589,056 UART: [fwproc] Received Image of size 114332 bytes
2,887,515 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,957 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,309 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,160 >>> mbox cmd response: success
3,081,278 UART: [afmc] ++
3,081,446 UART: [afmc] CDI.KEYID = 6
3,081,808 UART: [afmc] SUBJECT.KEYID = 7
3,082,233 UART: [afmc] AUTHORITY.KEYID = 5
3,117,784 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,222 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,002 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,730 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,615 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,305 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,356 UART: [afmc] --
3,161,350 UART: [cold-reset] --
3,162,430 UART: [state] Locking Datavault
3,163,509 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,113 UART: [state] Locking ICCM
3,164,535 UART: [exit] Launching FMC @ 0x40000130
3,169,864 UART:
3,169,880 UART: Running Caliptra FMC ...
3,170,288 UART:
3,170,431 UART: [state] CFI Enabled
3,180,814 UART: [fht] FMC Alias Private Key: 7
3,288,807 UART: [art] Extend RT PCRs Done
3,289,235 UART: [art] Lock RT PCRs Done
3,290,963 UART: [art] Populate DV Done
3,299,212 UART: [fht] FMC Alias Private Key: 7
3,300,348 UART: [art] Derive CDI
3,300,628 UART: [art] Store in in slot 0x4
3,386,295 UART: [art] Derive Key Pair
3,386,655 UART: [art] Store priv key in slot 0x5
3,399,621 UART: [art] Derive Key Pair - Done
3,414,641 UART: [art] Signing Cert with AUTHO
3,415,121 UART: RITY.KEYID = 7
3,430,449 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,214 UART: [art] PUB.X = 4EEC0464633883DF844AF55AAABFE9DC8DABA9008EF2E5BC489471FE11A0A1184BC12AADE5A55A180195565200D03C40
3,437,948 UART: [art] PUB.Y = 4BFFC364830FD90B9AC701A6C33FD2B3D4EFE3FE8CA5F2A32B7AF2E950C175A24D1AFE16940B3074716066011CC5E50C
3,444,896 UART: [art] SIG.R = D729E6B057FA4B0BC47EA07382CBA0698316B2CA7F97507AE4ADBB7F7624FBC1BF67D8FF8CB2A636D1E1A1A5BD0E944C
3,451,684 UART: [art] SIG.S = 45759E6A140225EB0AC5DF42B62569D1ECD514A4FCFAF3C24D73725D8F5B71FBB16FBC70727D212AF6834B8435926235
3,475,173 UART: Caliptra RT
3,475,518 UART: [state] CFI Enabled
3,583,433 UART: [rt] RT listening for mailbox commands...
3,584,103 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,429 UART: [rt]cmd =0x4d454153, len=108
3,635,252 >>> mbox cmd response data (12 bytes)
3,635,253 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,094 UART: [rt]cmd =0x4d454153, len=108
3,685,413 >>> mbox cmd response data (12 bytes)
3,685,414 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,517 UART: [rt]cmd =0x4d454153, len=108
3,736,790 >>> mbox cmd response data (12 bytes)
3,736,791 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,898 UART: [rt]cmd =0x4d454153, len=108
3,787,831 >>> mbox cmd response data (12 bytes)
3,787,832 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,817,685 UART: [rt]cmd =0x4d454153, len=108
3,838,734 >>> mbox cmd response data (12 bytes)
3,838,735 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,868,712 UART: [rt]cmd =0x4d454153, len=108
3,889,031 >>> mbox cmd response data (12 bytes)
3,889,032 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,145 UART: [rt]cmd =0x4d454153, len=108
3,940,430 >>> mbox cmd response data (12 bytes)
3,940,431 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,970,600 UART: [rt]cmd =0x4d454153, len=108
3,991,327 >>> mbox cmd response data (12 bytes)
3,991,328 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,021,225 UART: [rt]cmd =0x4d454153, len=108
4,041,822 >>> mbox cmd response data (12 bytes)
4,041,823 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,071,824 UART: [rt]cmd =0x4d454153, len=108
4,092,919 >>> mbox cmd response data (12 bytes)
4,092,920 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,122,905 UART: [rt]cmd =0x4d454153, len=108
4,144,186 >>> mbox cmd response data (12 bytes)
4,144,187 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,174,478 UART: [rt]cmd =0x4d454153, len=108
4,195,241 >>> mbox cmd response data (12 bytes)
4,195,242 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,225,251 UART: [rt]cmd =0x4d454153, len=108
4,245,916 >>> mbox cmd response data (12 bytes)
4,245,917 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,275,972 UART: [rt]cmd =0x4d454153, len=108
4,296,959 >>> mbox cmd response data (12 bytes)
4,296,960 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,327,001 UART: [rt]cmd =0x4d454153, len=108
4,348,044 >>> mbox cmd response data (12 bytes)
4,348,045 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,377,920 UART: [rt]cmd =0x4d454153, len=108
4,380,046 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,688 ready_for_fw is high
1,363,688 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,025 >>> mbox cmd response: success
2,990,353 UART:
2,990,369 UART: Running Caliptra FMC ...
2,990,777 UART:
2,990,920 UART: [state] CFI Enabled
3,001,773 UART: [fht] FMC Alias Private Key: 7
3,109,922 UART: [art] Extend RT PCRs Done
3,110,350 UART: [art] Lock RT PCRs Done
3,111,786 UART: [art] Populate DV Done
3,120,307 UART: [fht] FMC Alias Private Key: 7
3,121,431 UART: [art] Derive CDI
3,121,711 UART: [art] Store in in slot 0x4
3,207,282 UART: [art] Derive Key Pair
3,207,642 UART: [art] Store priv key in slot 0x5
3,221,048 UART: [art] Derive Key Pair - Done
3,235,615 UART: [art] Signing Cert with AUTHO
3,236,095 UART: RITY.KEYID = 7
3,251,089 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,854 UART: [art] PUB.X = DF715065CB986B6F7D730FB6AB370ABF8051919FB489EE6E53771A13B5305E00D23403524D28412193A23BEE37617A56
3,258,589 UART: [art] PUB.Y = 02884E867ECB44AF8597C58F1ED72F02A472013D95DBCCFF41D314E2595DE0F0BD9BCD401D1FE723228544F03EC68E70
3,265,540 UART: [art] SIG.R = 54487957CD424FA96AF849C2684D1A184CE5592DF9FA87CB6709BDF8C8C04E740FE27EB10C95B8BFD2D8D098B5019283
3,272,306 UART: [art] SIG.S = DC5157C3FA37AC4472D302B3D5144A305FAEB501DDA5922E6F87F2CFDF238B7209C1C3ECFD779EB192D57E9330789FDF
3,296,266 UART: Caliptra RT
3,296,611 UART: [state] CFI Enabled
3,405,968 UART: [rt] RT listening for mailbox commands...
3,406,638 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,082 UART: [rt]cmd =0x4d454153, len=108
3,457,257 >>> mbox cmd response data (12 bytes)
3,457,258 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,487,381 UART: [rt]cmd =0x4d454153, len=108
3,508,202 >>> mbox cmd response data (12 bytes)
3,508,203 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,314 UART: [rt]cmd =0x4d454153, len=108
3,558,645 >>> mbox cmd response data (12 bytes)
3,558,646 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,511 UART: [rt]cmd =0x4d454153, len=108
3,608,024 >>> mbox cmd response data (12 bytes)
3,608,025 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,054 UART: [rt]cmd =0x4d454153, len=108
3,659,191 >>> mbox cmd response data (12 bytes)
3,659,192 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,689,165 UART: [rt]cmd =0x4d454153, len=108
3,709,532 >>> mbox cmd response data (12 bytes)
3,709,533 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,624 UART: [rt]cmd =0x4d454153, len=108
3,760,881 >>> mbox cmd response data (12 bytes)
3,760,882 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,985 UART: [rt]cmd =0x4d454153, len=108
3,812,556 >>> mbox cmd response data (12 bytes)
3,812,557 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,728 UART: [rt]cmd =0x4d454153, len=108
3,863,417 >>> mbox cmd response data (12 bytes)
3,863,418 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,893,319 UART: [rt]cmd =0x4d454153, len=108
3,914,212 >>> mbox cmd response data (12 bytes)
3,914,213 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,186 UART: [rt]cmd =0x4d454153, len=108
3,964,845 >>> mbox cmd response data (12 bytes)
3,964,846 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,994,707 UART: [rt]cmd =0x4d454153, len=108
4,015,690 >>> mbox cmd response data (12 bytes)
4,015,691 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,550 UART: [rt]cmd =0x4d454153, len=108
4,066,337 >>> mbox cmd response data (12 bytes)
4,066,338 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,096,181 UART: [rt]cmd =0x4d454153, len=108
4,116,898 >>> mbox cmd response data (12 bytes)
4,116,899 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,147,050 UART: [rt]cmd =0x4d454153, len=108
4,168,023 >>> mbox cmd response data (12 bytes)
4,168,024 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,198,077 UART: [rt]cmd =0x4d454153, len=108
4,199,991 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
893,262 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,387 UART: [kat] ++
897,539 UART: [kat] sha1
901,719 UART: [kat] SHA2-256
903,659 UART: [kat] SHA2-384
906,396 UART: [kat] SHA2-512-ACC
908,297 UART: [kat] ECC-384
917,638 UART: [kat] HMAC-384Kdf
922,228 UART: [kat] LMS
1,170,556 UART: [kat] --
1,171,385 UART: [cold-reset] ++
1,171,741 UART: [fht] FHT @ 0x50003400
1,174,258 UART: [idev] ++
1,174,426 UART: [idev] CDI.KEYID = 6
1,174,786 UART: [idev] SUBJECT.KEYID = 7
1,175,210 UART: [idev] UDS.KEYID = 0
1,175,555 ready_for_fw is high
1,175,555 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,412 UART: [idev] Erasing UDS.KEYID = 0
1,200,411 UART: [idev] Sha1 KeyId Algorithm
1,208,975 UART: [idev] --
1,209,993 UART: [ldev] ++
1,210,161 UART: [ldev] CDI.KEYID = 6
1,210,524 UART: [ldev] SUBJECT.KEYID = 5
1,210,950 UART: [ldev] AUTHORITY.KEYID = 7
1,211,413 UART: [ldev] FE.KEYID = 1
1,216,787 UART: [ldev] Erasing FE.KEYID = 1
1,243,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,189 UART: [ldev] --
1,282,492 UART: [fwproc] Wait for Commands...
1,283,298 UART: [fwproc] Recv command 0x46574c44
1,284,026 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,981 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,548 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,852 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,647 >>> mbox cmd response: success
2,774,843 UART: [afmc] ++
2,775,011 UART: [afmc] CDI.KEYID = 6
2,775,373 UART: [afmc] SUBJECT.KEYID = 7
2,775,798 UART: [afmc] AUTHORITY.KEYID = 5
2,811,699 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,756 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,484 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,369 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,088 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,880 UART: [afmc] --
2,854,820 UART: [cold-reset] --
2,855,422 UART: [state] Locking Datavault
2,856,555 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,159 UART: [state] Locking ICCM
2,857,735 UART: [exit] Launching FMC @ 0x40000130
2,863,064 UART:
2,863,080 UART: Running Caliptra FMC ...
2,863,488 UART:
2,863,542 UART: [state] CFI Enabled
2,873,895 UART: [fht] FMC Alias Private Key: 7
2,982,338 UART: [art] Extend RT PCRs Done
2,982,766 UART: [art] Lock RT PCRs Done
2,984,492 UART: [art] Populate DV Done
2,992,483 UART: [fht] FMC Alias Private Key: 7
2,993,595 UART: [art] Derive CDI
2,993,875 UART: [art] Store in in slot 0x4
3,079,726 UART: [art] Derive Key Pair
3,080,086 UART: [art] Store priv key in slot 0x5
3,092,844 UART: [art] Derive Key Pair - Done
3,107,653 UART: [art] Signing Cert with AUTHO
3,108,133 UART: RITY.KEYID = 7
3,123,487 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,252 UART: [art] PUB.X = ECDAE692AD2D2C4665882F6657DF16C901CA00EFA3ECD0A816D39DF69C7BE0B331A72A7700E44B2C89130B5765CB8B6D
3,130,988 UART: [art] PUB.Y = 99F67413FFB43B0F83EE77591A21C9BEA6599B175936064C18C4C115FD20C8C7995AC874CB1C59F7EDA34773BD5E3F42
3,137,938 UART: [art] SIG.R = AD2E816806AE45B4126457DBFFDC6896A13911728EA86D41A1D585EC934A21668ABF0ECE3925FBB0C6EE4CD3A0C2C038
3,144,716 UART: [art] SIG.S = 8BD32239097C4C525B806F8C687EAC143E19A62E9E0E2F4B7484B975EFC4C83D6254A75AA2B4A3AA79EFDB97D2BF8CB2
3,168,641 UART: Caliptra RT
3,168,894 UART: [state] CFI Enabled
3,275,992 UART: [rt] RT listening for mailbox commands...
3,276,662 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,044 UART: [rt]cmd =0x4d454153, len=108
3,327,481 >>> mbox cmd response data (12 bytes)
3,327,482 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,379 UART: [rt]cmd =0x4d454153, len=108
3,378,286 >>> mbox cmd response data (12 bytes)
3,378,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,408,270 UART: [rt]cmd =0x4d454153, len=108
3,429,515 >>> mbox cmd response data (12 bytes)
3,429,516 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,459,763 UART: [rt]cmd =0x4d454153, len=108
3,479,986 >>> mbox cmd response data (12 bytes)
3,479,987 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,510,190 UART: [rt]cmd =0x4d454153, len=108
3,531,131 >>> mbox cmd response data (12 bytes)
3,531,132 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,397 UART: [rt]cmd =0x4d454153, len=108
3,582,150 >>> mbox cmd response data (12 bytes)
3,582,151 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,176 UART: [rt]cmd =0x4d454153, len=108
3,632,603 >>> mbox cmd response data (12 bytes)
3,632,604 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,849 UART: [rt]cmd =0x4d454153, len=108
3,683,524 >>> mbox cmd response data (12 bytes)
3,683,525 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,618 UART: [rt]cmd =0x4d454153, len=108
3,734,257 >>> mbox cmd response data (12 bytes)
3,734,258 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,115 UART: [rt]cmd =0x4d454153, len=108
3,784,480 >>> mbox cmd response data (12 bytes)
3,784,481 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,396 UART: [rt]cmd =0x4d454153, len=108
3,834,143 >>> mbox cmd response data (12 bytes)
3,834,144 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,081 UART: [rt]cmd =0x4d454153, len=108
3,884,542 >>> mbox cmd response data (12 bytes)
3,884,543 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,658 UART: [rt]cmd =0x4d454153, len=108
3,934,827 >>> mbox cmd response data (12 bytes)
3,934,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,991 UART: [rt]cmd =0x4d454153, len=108
3,985,752 >>> mbox cmd response data (12 bytes)
3,985,753 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,015,716 UART: [rt]cmd =0x4d454153, len=108
4,036,929 >>> mbox cmd response data (12 bytes)
4,036,930 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,067,119 UART: [rt]cmd =0x4d454153, len=108
4,068,757 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,115 ready_for_fw is high
1,060,115 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,096 >>> mbox cmd response: success
2,687,662 UART:
2,687,678 UART: Running Caliptra FMC ...
2,688,086 UART:
2,688,140 UART: [state] CFI Enabled
2,698,829 UART: [fht] FMC Alias Private Key: 7
2,806,892 UART: [art] Extend RT PCRs Done
2,807,320 UART: [art] Lock RT PCRs Done
2,808,628 UART: [art] Populate DV Done
2,816,577 UART: [fht] FMC Alias Private Key: 7
2,817,713 UART: [art] Derive CDI
2,817,993 UART: [art] Store in in slot 0x4
2,903,460 UART: [art] Derive Key Pair
2,903,820 UART: [art] Store priv key in slot 0x5
2,916,894 UART: [art] Derive Key Pair - Done
2,931,212 UART: [art] Signing Cert with AUTHO
2,931,692 UART: RITY.KEYID = 7
2,946,888 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,653 UART: [art] PUB.X = 68B201FAEEB778E80773FA9E6C61CE87CF5CDC3970209920DD89FCE5B0FC2E1BA287D4418C1BFAECF1C2E96F347C2211
2,954,437 UART: [art] PUB.Y = 8F017A39FE504E3FE85EED3401C466CE8D9A781469A8431E4B847080300F4DD954C3A5B6CFFA52BA300E132C2046E30B
2,961,378 UART: [art] SIG.R = 6659B6FCCE8C0D8E52CD1ED4DB42A904F8A5474D88B1C7AACB53AACE348B76CC09B45EC6BBFE1C2986FF11B734118AA1
2,968,165 UART: [art] SIG.S = 17C438880F611E78F8C5B662759507D637CACA88C4BEB6E1A37A9EBEB11865050BA565DA135F6EF2D12BD8F1B5930CDE
2,991,603 UART: Caliptra RT
2,991,856 UART: [state] CFI Enabled
3,099,919 UART: [rt] RT listening for mailbox commands...
3,100,589 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,845 UART: [rt]cmd =0x4d454153, len=108
3,151,510 >>> mbox cmd response data (12 bytes)
3,151,511 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,181,204 UART: [rt]cmd =0x4d454153, len=108
3,201,169 >>> mbox cmd response data (12 bytes)
3,201,170 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,365 UART: [rt]cmd =0x4d454153, len=108
3,252,466 >>> mbox cmd response data (12 bytes)
3,252,467 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,282,498 UART: [rt]cmd =0x4d454153, len=108
3,302,805 >>> mbox cmd response data (12 bytes)
3,302,806 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,641 UART: [rt]cmd =0x4d454153, len=108
3,352,846 >>> mbox cmd response data (12 bytes)
3,352,847 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,382,924 UART: [rt]cmd =0x4d454153, len=108
3,403,609 >>> mbox cmd response data (12 bytes)
3,403,610 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,729 UART: [rt]cmd =0x4d454153, len=108
3,453,972 >>> mbox cmd response data (12 bytes)
3,453,973 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,484,008 UART: [rt]cmd =0x4d454153, len=108
3,504,453 >>> mbox cmd response data (12 bytes)
3,504,454 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,577 UART: [rt]cmd =0x4d454153, len=108
3,554,286 >>> mbox cmd response data (12 bytes)
3,554,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,278 UART: [rt]cmd =0x4d454153, len=108
3,605,663 >>> mbox cmd response data (12 bytes)
3,605,664 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,635,667 UART: [rt]cmd =0x4d454153, len=108
3,656,686 >>> mbox cmd response data (12 bytes)
3,656,687 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,852 UART: [rt]cmd =0x4d454153, len=108
3,707,659 >>> mbox cmd response data (12 bytes)
3,707,660 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,715 UART: [rt]cmd =0x4d454153, len=108
3,758,978 >>> mbox cmd response data (12 bytes)
3,758,979 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,796 UART: [rt]cmd =0x4d454153, len=108
3,810,053 >>> mbox cmd response data (12 bytes)
3,810,054 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,840,149 UART: [rt]cmd =0x4d454153, len=108
3,860,948 >>> mbox cmd response data (12 bytes)
3,860,949 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,890,888 UART: [rt]cmd =0x4d454153, len=108
3,892,622 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,653 UART: [state] LifecycleState = Unprovisioned
85,308 UART: [state] DebugLocked = No
85,944 UART: [state] WD Timer not started. Device not locked for debugging
87,203 UART: [kat] SHA2-256
892,853 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,978 UART: [kat] ++
897,130 UART: [kat] sha1
901,460 UART: [kat] SHA2-256
903,400 UART: [kat] SHA2-384
906,249 UART: [kat] SHA2-512-ACC
908,150 UART: [kat] ECC-384
917,723 UART: [kat] HMAC-384Kdf
922,223 UART: [kat] LMS
1,170,551 UART: [kat] --
1,171,624 UART: [cold-reset] ++
1,172,024 UART: [fht] FHT @ 0x50003400
1,174,567 UART: [idev] ++
1,174,735 UART: [idev] CDI.KEYID = 6
1,175,095 UART: [idev] SUBJECT.KEYID = 7
1,175,519 UART: [idev] UDS.KEYID = 0
1,175,864 ready_for_fw is high
1,175,864 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,783 UART: [idev] Erasing UDS.KEYID = 0
1,200,334 UART: [idev] Sha1 KeyId Algorithm
1,208,758 UART: [idev] --
1,209,696 UART: [ldev] ++
1,209,864 UART: [ldev] CDI.KEYID = 6
1,210,227 UART: [ldev] SUBJECT.KEYID = 5
1,210,653 UART: [ldev] AUTHORITY.KEYID = 7
1,211,116 UART: [ldev] FE.KEYID = 1
1,216,320 UART: [ldev] Erasing FE.KEYID = 1
1,242,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,380 UART: [ldev] --
1,281,763 UART: [fwproc] Wait for Commands...
1,282,477 UART: [fwproc] Recv command 0x46574c44
1,283,205 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,557 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,861 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,620 >>> mbox cmd response: success
2,774,652 UART: [afmc] ++
2,774,820 UART: [afmc] CDI.KEYID = 6
2,775,182 UART: [afmc] SUBJECT.KEYID = 7
2,775,607 UART: [afmc] AUTHORITY.KEYID = 5
2,810,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,083 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,811 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,696 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,415 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,317 UART: [afmc] --
2,854,443 UART: [cold-reset] --
2,855,205 UART: [state] Locking Datavault
2,856,370 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,974 UART: [state] Locking ICCM
2,857,646 UART: [exit] Launching FMC @ 0x40000130
2,862,975 UART:
2,862,991 UART: Running Caliptra FMC ...
2,863,399 UART:
2,863,542 UART: [state] CFI Enabled
2,874,101 UART: [fht] FMC Alias Private Key: 7
2,982,658 UART: [art] Extend RT PCRs Done
2,983,086 UART: [art] Lock RT PCRs Done
2,984,498 UART: [art] Populate DV Done
2,992,943 UART: [fht] FMC Alias Private Key: 7
2,993,925 UART: [art] Derive CDI
2,994,205 UART: [art] Store in in slot 0x4
3,079,870 UART: [art] Derive Key Pair
3,080,230 UART: [art] Store priv key in slot 0x5
3,093,012 UART: [art] Derive Key Pair - Done
3,107,892 UART: [art] Signing Cert with AUTHO
3,108,372 UART: RITY.KEYID = 7
3,123,506 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,271 UART: [art] PUB.X = 9F48FB0A952FC0BD17FC83831FA82AA09588729B801CB6BF9E4D43A7F00E04755A5C289BD60E5311B233610B2C99184C
3,131,030 UART: [art] PUB.Y = 8C790E3720536E6074C7C9990FF1BB7E1B5C89254CA3F99F4BD547196B031F55BF58CA19F7EF8B515D33700187F6F12C
3,137,970 UART: [art] SIG.R = E57DBF65F0395D8B63C04CFE19148BD917B8BF0E63DE323058F4072A2726D6302FD252A9076610E8E5E9C447D4B36AD9
3,144,735 UART: [art] SIG.S = 9BE84CD619D3AC73ABC77C635BC8C3D4C55FC730DB91E5190F365989B59454CC16BCC9085446689C969563A909FD7149
3,168,699 UART: Caliptra RT
3,169,044 UART: [state] CFI Enabled
3,275,090 UART: [rt] RT listening for mailbox commands...
3,275,760 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,164 UART: [rt]cmd =0x4d454153, len=108
3,326,727 >>> mbox cmd response data (12 bytes)
3,326,728 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,875 UART: [rt]cmd =0x4d454153, len=108
3,376,976 >>> mbox cmd response data (12 bytes)
3,376,977 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,102 UART: [rt]cmd =0x4d454153, len=108
3,426,867 >>> mbox cmd response data (12 bytes)
3,426,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,456,905 UART: [rt]cmd =0x4d454153, len=108
3,477,556 >>> mbox cmd response data (12 bytes)
3,477,557 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,507,682 UART: [rt]cmd =0x4d454153, len=108
3,527,841 >>> mbox cmd response data (12 bytes)
3,527,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,829 UART: [rt]cmd =0x4d454153, len=108
3,579,422 >>> mbox cmd response data (12 bytes)
3,579,423 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,340 UART: [rt]cmd =0x4d454153, len=108
3,630,075 >>> mbox cmd response data (12 bytes)
3,630,076 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,659,953 UART: [rt]cmd =0x4d454153, len=108
3,680,138 >>> mbox cmd response data (12 bytes)
3,680,139 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,004 UART: [rt]cmd =0x4d454153, len=108
3,730,783 >>> mbox cmd response data (12 bytes)
3,730,784 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,797 UART: [rt]cmd =0x4d454153, len=108
3,781,524 >>> mbox cmd response data (12 bytes)
3,781,525 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,820 UART: [rt]cmd =0x4d454153, len=108
3,832,171 >>> mbox cmd response data (12 bytes)
3,832,172 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,013 UART: [rt]cmd =0x4d454153, len=108
3,882,590 >>> mbox cmd response data (12 bytes)
3,882,591 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,912,664 UART: [rt]cmd =0x4d454153, len=108
3,933,731 >>> mbox cmd response data (12 bytes)
3,933,732 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,759 UART: [rt]cmd =0x4d454153, len=108
3,984,514 >>> mbox cmd response data (12 bytes)
3,984,515 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,014,668 UART: [rt]cmd =0x4d454153, len=108
4,035,953 >>> mbox cmd response data (12 bytes)
4,035,954 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,066,123 UART: [rt]cmd =0x4d454153, len=108
4,068,005 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,284 ready_for_fw is high
1,060,284 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,455 >>> mbox cmd response: success
2,688,189 UART:
2,688,205 UART: Running Caliptra FMC ...
2,688,613 UART:
2,688,756 UART: [state] CFI Enabled
2,699,501 UART: [fht] FMC Alias Private Key: 7
2,808,144 UART: [art] Extend RT PCRs Done
2,808,572 UART: [art] Lock RT PCRs Done
2,810,006 UART: [art] Populate DV Done
2,818,291 UART: [fht] FMC Alias Private Key: 7
2,819,397 UART: [art] Derive CDI
2,819,677 UART: [art] Store in in slot 0x4
2,905,694 UART: [art] Derive Key Pair
2,906,054 UART: [art] Store priv key in slot 0x5
2,919,248 UART: [art] Derive Key Pair - Done
2,934,209 UART: [art] Signing Cert with AUTHO
2,934,689 UART: RITY.KEYID = 7
2,949,763 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,528 UART: [art] PUB.X = 4DBF6A73EE0F488129004AC63EAA0DD482F0F7273F42CB574F44019D16942110AE17DDC10D0C5AB24321E27E20361100
2,957,241 UART: [art] PUB.Y = 20FF32FB4D948F174C079476A83650630F94310A2FBEA8E12E35E76ABC5AC5263BCC51949BD825EB5DAAFF9E7FD8CFDE
2,964,202 UART: [art] SIG.R = FF4324ACDE0F595AF9BE30A5A5447A78EB932E0B18D1449C9D198A88F7DF175C3646A84106F7A21F430D015F00C2C3D9
2,970,943 UART: [art] SIG.S = F10B362FA063BDCE9F5DA6275A50E43E36A65FD4F178CAF832929B90923837A1B63AE90AA1EC6F3009E54E0F23DD6F3D
2,994,884 UART: Caliptra RT
2,995,229 UART: [state] CFI Enabled
3,103,559 UART: [rt] RT listening for mailbox commands...
3,104,229 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,419 UART: [rt]cmd =0x4d454153, len=108
3,155,132 >>> mbox cmd response data (12 bytes)
3,155,133 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,048 UART: [rt]cmd =0x4d454153, len=108
3,206,125 >>> mbox cmd response data (12 bytes)
3,206,126 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,236,187 UART: [rt]cmd =0x4d454153, len=108
3,256,912 >>> mbox cmd response data (12 bytes)
3,256,913 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,286,684 UART: [rt]cmd =0x4d454153, len=108
3,307,043 >>> mbox cmd response data (12 bytes)
3,307,044 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,831 UART: [rt]cmd =0x4d454153, len=108
3,357,986 >>> mbox cmd response data (12 bytes)
3,357,987 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,388,082 UART: [rt]cmd =0x4d454153, len=108
3,408,975 >>> mbox cmd response data (12 bytes)
3,408,976 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,899 UART: [rt]cmd =0x4d454153, len=108
3,460,312 >>> mbox cmd response data (12 bytes)
3,460,313 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,490,494 UART: [rt]cmd =0x4d454153, len=108
3,511,195 >>> mbox cmd response data (12 bytes)
3,511,196 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,541,177 UART: [rt]cmd =0x4d454153, len=108
3,561,888 >>> mbox cmd response data (12 bytes)
3,561,889 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,591,922 UART: [rt]cmd =0x4d454153, len=108
3,612,655 >>> mbox cmd response data (12 bytes)
3,612,656 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,519 UART: [rt]cmd =0x4d454153, len=108
3,662,884 >>> mbox cmd response data (12 bytes)
3,662,885 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,692,970 UART: [rt]cmd =0x4d454153, len=108
3,714,119 >>> mbox cmd response data (12 bytes)
3,714,120 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,744,307 UART: [rt]cmd =0x4d454153, len=108
3,765,104 >>> mbox cmd response data (12 bytes)
3,765,105 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,795,242 UART: [rt]cmd =0x4d454153, len=108
3,816,045 >>> mbox cmd response data (12 bytes)
3,816,046 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,846,105 UART: [rt]cmd =0x4d454153, len=108
3,866,528 >>> mbox cmd response data (12 bytes)
3,866,529 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,896,554 UART: [rt]cmd =0x4d454153, len=108
3,898,498 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,305 UART: [kat] ++
895,457 UART: [kat] sha1
899,739 UART: [kat] SHA2-256
901,679 UART: [kat] SHA2-384
904,394 UART: [kat] SHA2-512-ACC
906,295 UART: [kat] ECC-384
915,668 UART: [kat] HMAC-384Kdf
920,174 UART: [kat] LMS
1,168,486 UART: [kat] --
1,169,457 UART: [cold-reset] ++
1,169,903 UART: [fht] FHT @ 0x50003400
1,172,579 UART: [idev] ++
1,172,747 UART: [idev] CDI.KEYID = 6
1,173,108 UART: [idev] SUBJECT.KEYID = 7
1,173,533 UART: [idev] UDS.KEYID = 0
1,173,879 ready_for_fw is high
1,173,879 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,487 UART: [idev] Erasing UDS.KEYID = 0
1,197,967 UART: [idev] Sha1 KeyId Algorithm
1,206,757 UART: [idev] --
1,207,804 UART: [ldev] ++
1,207,972 UART: [ldev] CDI.KEYID = 6
1,208,336 UART: [ldev] SUBJECT.KEYID = 5
1,208,763 UART: [ldev] AUTHORITY.KEYID = 7
1,209,226 UART: [ldev] FE.KEYID = 1
1,214,164 UART: [ldev] Erasing FE.KEYID = 1
1,241,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,142 UART: [ldev] --
1,280,532 UART: [fwproc] Wait for Commands...
1,281,341 UART: [fwproc] Recv command 0x46574c44
1,282,074 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,664 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,973 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,721 >>> mbox cmd response: success
2,772,814 UART: [afmc] ++
2,772,982 UART: [afmc] CDI.KEYID = 6
2,773,345 UART: [afmc] SUBJECT.KEYID = 7
2,773,771 UART: [afmc] AUTHORITY.KEYID = 5
2,809,420 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,472 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,223 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,952 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,835 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,554 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,355 UART: [afmc] --
2,852,451 UART: [cold-reset] --
2,853,101 UART: [state] Locking Datavault
2,854,100 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,704 UART: [state] Locking ICCM
2,855,340 UART: [exit] Launching FMC @ 0x40000130
2,860,669 UART:
2,860,685 UART: Running Caliptra FMC ...
2,861,093 UART:
2,861,147 UART: [state] CFI Enabled
2,871,478 UART: [fht] FMC Alias Private Key: 7
2,979,581 UART: [art] Extend RT PCRs Done
2,980,009 UART: [art] Lock RT PCRs Done
2,981,367 UART: [art] Populate DV Done
2,989,456 UART: [fht] FMC Alias Private Key: 7
2,990,478 UART: [art] Derive CDI
2,990,758 UART: [art] Store in in slot 0x4
3,076,217 UART: [art] Derive Key Pair
3,076,577 UART: [art] Store priv key in slot 0x5
3,089,809 UART: [art] Derive Key Pair - Done
3,104,514 UART: [art] Signing Cert with AUTHO
3,104,994 UART: RITY.KEYID = 7
3,120,674 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,439 UART: [art] PUB.X = 355EC46AEFB7FA23FAAAB86248371C3B3028F401ADFF676E995CC3697EC47FFBB8F8FF8B738C7B1A702D77B5B1E2E9EE
3,128,230 UART: [art] PUB.Y = 4A865BA5B5FE62F375791DFC616F346F5153399FE5E33427F8C0BACF9768B95C1E99711875A02598FD388CC7DA6B6E6B
3,135,186 UART: [art] SIG.R = 095F2275AB32B4C18131CC16F997294A7A500A24719D43F7D0549CDCD79308A6ACFD930567B3C9702F82E448078789A3
3,141,935 UART: [art] SIG.S = 5F02EA1FC5795833885E6E8862C2B4B863FB66748D5BC542B1EF53001182A4AACA8DF59FD83ED1B5CF2AD6C69B2F773F
3,165,363 UART: Caliptra RT
3,165,616 UART: [state] CFI Enabled
3,274,147 UART: [rt] RT listening for mailbox commands...
3,274,817 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,443 UART: [rt]cmd =0x4d454153, len=108
3,326,188 >>> mbox cmd response data (12 bytes)
3,326,189 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,238 UART: [rt]cmd =0x4d454153, len=108
3,376,293 >>> mbox cmd response data (12 bytes)
3,376,294 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,491 UART: [rt]cmd =0x4d454153, len=108
3,427,028 >>> mbox cmd response data (12 bytes)
3,427,029 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,456,710 UART: [rt]cmd =0x4d454153, len=108
3,476,945 >>> mbox cmd response data (12 bytes)
3,476,946 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,805 UART: [rt]cmd =0x4d454153, len=108
3,526,786 >>> mbox cmd response data (12 bytes)
3,526,787 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,556,690 UART: [rt]cmd =0x4d454153, len=108
3,577,367 >>> mbox cmd response data (12 bytes)
3,577,368 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,513 UART: [rt]cmd =0x4d454153, len=108
3,628,194 >>> mbox cmd response data (12 bytes)
3,628,195 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,658,326 UART: [rt]cmd =0x4d454153, len=108
3,679,027 >>> mbox cmd response data (12 bytes)
3,679,028 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,083 UART: [rt]cmd =0x4d454153, len=108
3,729,282 >>> mbox cmd response data (12 bytes)
3,729,283 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,118 UART: [rt]cmd =0x4d454153, len=108
3,780,133 >>> mbox cmd response data (12 bytes)
3,780,134 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,810,145 UART: [rt]cmd =0x4d454153, len=108
3,830,324 >>> mbox cmd response data (12 bytes)
3,830,325 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,860,370 UART: [rt]cmd =0x4d454153, len=108
3,880,677 >>> mbox cmd response data (12 bytes)
3,880,678 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,910,749 UART: [rt]cmd =0x4d454153, len=108
3,931,912 >>> mbox cmd response data (12 bytes)
3,931,913 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,961,956 UART: [rt]cmd =0x4d454153, len=108
3,982,615 >>> mbox cmd response data (12 bytes)
3,982,616 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,012,711 UART: [rt]cmd =0x4d454153, len=108
4,034,166 >>> mbox cmd response data (12 bytes)
4,034,167 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,064,382 UART: [rt]cmd =0x4d454153, len=108
4,066,336 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,772 ready_for_fw is high
1,055,772 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,535 >>> mbox cmd response: success
2,682,817 UART:
2,682,833 UART: Running Caliptra FMC ...
2,683,241 UART:
2,683,295 UART: [state] CFI Enabled
2,693,314 UART: [fht] FMC Alias Private Key: 7
2,801,381 UART: [art] Extend RT PCRs Done
2,801,809 UART: [art] Lock RT PCRs Done
2,803,349 UART: [art] Populate DV Done
2,811,646 UART: [fht] FMC Alias Private Key: 7
2,812,800 UART: [art] Derive CDI
2,813,080 UART: [art] Store in in slot 0x4
2,898,567 UART: [art] Derive Key Pair
2,898,927 UART: [art] Store priv key in slot 0x5
2,912,409 UART: [art] Derive Key Pair - Done
2,927,126 UART: [art] Signing Cert with AUTHO
2,927,606 UART: RITY.KEYID = 7
2,942,982 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,747 UART: [art] PUB.X = A3B92F5EC58C662F67F5D5A81CD000B2327CCAA2D15C4BEF121B7D6F71F3006FF40C7C6C4B873D23C96824EC6E9259E8
2,950,484 UART: [art] PUB.Y = AD51A603E2515B4CF4F7AEB3877E0F082C81005423B467FA0055D8F7C17E4C3DF950E6EB1AFE53BA83FCD8FFB5E71ACD
2,957,403 UART: [art] SIG.R = B58CDE27E4CC9E18ADD7043154EF1B90B28CB40E42BCBD24DB355771F56A62F6AD391B57A50B16DF1EBDF11438C37FF6
2,964,184 UART: [art] SIG.S = 3A46103256FCA646B287F49D4314D7B6F0336653E1BD7CDD4FBB532EA29B353FE54042BB3FA1C63E6463AB0F453AF155
2,988,102 UART: Caliptra RT
2,988,355 UART: [state] CFI Enabled
3,096,388 UART: [rt] RT listening for mailbox commands...
3,097,058 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,618 UART: [rt]cmd =0x4d454153, len=108
3,147,609 >>> mbox cmd response data (12 bytes)
3,147,610 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,177,585 UART: [rt]cmd =0x4d454153, len=108
3,197,836 >>> mbox cmd response data (12 bytes)
3,197,837 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,794 UART: [rt]cmd =0x4d454153, len=108
3,249,169 >>> mbox cmd response data (12 bytes)
3,249,170 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,115 UART: [rt]cmd =0x4d454153, len=108
3,300,034 >>> mbox cmd response data (12 bytes)
3,300,035 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,329,876 UART: [rt]cmd =0x4d454153, len=108
3,350,691 >>> mbox cmd response data (12 bytes)
3,350,692 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,380,807 UART: [rt]cmd =0x4d454153, len=108
3,400,794 >>> mbox cmd response data (12 bytes)
3,400,795 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,736 UART: [rt]cmd =0x4d454153, len=108
3,451,107 >>> mbox cmd response data (12 bytes)
3,451,108 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,481,285 UART: [rt]cmd =0x4d454153, len=108
3,502,016 >>> mbox cmd response data (12 bytes)
3,502,017 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,794 UART: [rt]cmd =0x4d454153, len=108
3,552,779 >>> mbox cmd response data (12 bytes)
3,552,780 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,719 UART: [rt]cmd =0x4d454153, len=108
3,603,048 >>> mbox cmd response data (12 bytes)
3,603,049 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,958 UART: [rt]cmd =0x4d454153, len=108
3,653,577 >>> mbox cmd response data (12 bytes)
3,653,578 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,683,631 UART: [rt]cmd =0x4d454153, len=108
3,704,204 >>> mbox cmd response data (12 bytes)
3,704,205 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,192 UART: [rt]cmd =0x4d454153, len=108
3,755,411 >>> mbox cmd response data (12 bytes)
3,755,412 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,785,529 UART: [rt]cmd =0x4d454153, len=108
3,806,314 >>> mbox cmd response data (12 bytes)
3,806,315 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,836,390 UART: [rt]cmd =0x4d454153, len=108
3,856,995 >>> mbox cmd response data (12 bytes)
3,856,996 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,887,037 UART: [rt]cmd =0x4d454153, len=108
3,888,925 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,924 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
891,223 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,352 UART: [kat] ++
895,504 UART: [kat] sha1
899,772 UART: [kat] SHA2-256
901,712 UART: [kat] SHA2-384
904,389 UART: [kat] SHA2-512-ACC
906,290 UART: [kat] ECC-384
916,151 UART: [kat] HMAC-384Kdf
920,661 UART: [kat] LMS
1,168,973 UART: [kat] --
1,169,942 UART: [cold-reset] ++
1,170,398 UART: [fht] FHT @ 0x50003400
1,172,870 UART: [idev] ++
1,173,038 UART: [idev] CDI.KEYID = 6
1,173,399 UART: [idev] SUBJECT.KEYID = 7
1,173,824 UART: [idev] UDS.KEYID = 0
1,174,170 ready_for_fw is high
1,174,170 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,864 UART: [idev] Erasing UDS.KEYID = 0
1,198,910 UART: [idev] Sha1 KeyId Algorithm
1,207,932 UART: [idev] --
1,209,173 UART: [ldev] ++
1,209,341 UART: [ldev] CDI.KEYID = 6
1,209,705 UART: [ldev] SUBJECT.KEYID = 5
1,210,132 UART: [ldev] AUTHORITY.KEYID = 7
1,210,595 UART: [ldev] FE.KEYID = 1
1,215,837 UART: [ldev] Erasing FE.KEYID = 1
1,241,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,649 UART: [ldev] --
1,281,075 UART: [fwproc] Wait for Commands...
1,281,856 UART: [fwproc] Recv command 0x46574c44
1,282,589 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,555 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,864 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,694 >>> mbox cmd response: success
2,772,715 UART: [afmc] ++
2,772,883 UART: [afmc] CDI.KEYID = 6
2,773,246 UART: [afmc] SUBJECT.KEYID = 7
2,773,672 UART: [afmc] AUTHORITY.KEYID = 5
2,809,331 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,305 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,056 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,785 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,668 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,387 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,068 UART: [afmc] --
2,852,032 UART: [cold-reset] --
2,852,652 UART: [state] Locking Datavault
2,853,621 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,225 UART: [state] Locking ICCM
2,854,669 UART: [exit] Launching FMC @ 0x40000130
2,859,998 UART:
2,860,014 UART: Running Caliptra FMC ...
2,860,422 UART:
2,860,565 UART: [state] CFI Enabled
2,871,194 UART: [fht] FMC Alias Private Key: 7
2,979,577 UART: [art] Extend RT PCRs Done
2,980,005 UART: [art] Lock RT PCRs Done
2,981,447 UART: [art] Populate DV Done
2,989,688 UART: [fht] FMC Alias Private Key: 7
2,990,836 UART: [art] Derive CDI
2,991,116 UART: [art] Store in in slot 0x4
3,076,721 UART: [art] Derive Key Pair
3,077,081 UART: [art] Store priv key in slot 0x5
3,090,407 UART: [art] Derive Key Pair - Done
3,105,062 UART: [art] Signing Cert with AUTHO
3,105,542 UART: RITY.KEYID = 7
3,120,616 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,381 UART: [art] PUB.X = CD2D398E4008542B3057ED9EA2A9B927D113CAB6CA8CF26BB46A3D6855E9F9D7ED863047ABE72AEF6977452FE38DE5AA
3,128,166 UART: [art] PUB.Y = 43A889F2D37BAD965795969A8CCDD5151CAF18838ED2877FECFCE863FB313DA118240A32C1EBDD08353EB44B2E181FC3
3,135,124 UART: [art] SIG.R = EA37141D45AF62B9A6719498036C418C9EBEE74103204CC1C56092EC154D0269BF7D8937A732047192292F83726DDB75
3,141,874 UART: [art] SIG.S = 481CE5DB22234845F7650A138444C70A1BCE874FB7722F1865715F99DB539817661C647CC9F7D8652CBA5269D3781B6E
3,165,907 UART: Caliptra RT
3,166,252 UART: [state] CFI Enabled
3,273,739 UART: [rt] RT listening for mailbox commands...
3,274,409 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,791 UART: [rt]cmd =0x4d454153, len=108
3,324,634 >>> mbox cmd response data (12 bytes)
3,324,635 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,354,518 UART: [rt]cmd =0x4d454153, len=108
3,375,635 >>> mbox cmd response data (12 bytes)
3,375,636 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,799 UART: [rt]cmd =0x4d454153, len=108
3,426,584 >>> mbox cmd response data (12 bytes)
3,426,585 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,456,448 UART: [rt]cmd =0x4d454153, len=108
3,477,201 >>> mbox cmd response data (12 bytes)
3,477,202 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,507,137 UART: [rt]cmd =0x4d454153, len=108
3,528,008 >>> mbox cmd response data (12 bytes)
3,528,009 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,070 UART: [rt]cmd =0x4d454153, len=108
3,579,115 >>> mbox cmd response data (12 bytes)
3,579,116 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,259 UART: [rt]cmd =0x4d454153, len=108
3,629,878 >>> mbox cmd response data (12 bytes)
3,629,879 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,660,052 UART: [rt]cmd =0x4d454153, len=108
3,681,159 >>> mbox cmd response data (12 bytes)
3,681,160 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,397 UART: [rt]cmd =0x4d454153, len=108
3,731,866 >>> mbox cmd response data (12 bytes)
3,731,867 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,896 UART: [rt]cmd =0x4d454153, len=108
3,782,803 >>> mbox cmd response data (12 bytes)
3,782,804 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,812,703 UART: [rt]cmd =0x4d454153, len=108
3,833,596 >>> mbox cmd response data (12 bytes)
3,833,597 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,574 UART: [rt]cmd =0x4d454153, len=108
3,884,383 >>> mbox cmd response data (12 bytes)
3,884,384 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,233 UART: [rt]cmd =0x4d454153, len=108
3,935,262 >>> mbox cmd response data (12 bytes)
3,935,263 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,974 UART: [rt]cmd =0x4d454153, len=108
3,985,797 >>> mbox cmd response data (12 bytes)
3,985,798 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,015,743 UART: [rt]cmd =0x4d454153, len=108
4,037,396 >>> mbox cmd response data (12 bytes)
4,037,397 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,067,452 UART: [rt]cmd =0x4d454153, len=108
4,069,404 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,497 ready_for_fw is high
1,056,497 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,260 >>> mbox cmd response: success
2,685,694 UART:
2,685,710 UART: Running Caliptra FMC ...
2,686,118 UART:
2,686,261 UART: [state] CFI Enabled
2,696,998 UART: [fht] FMC Alias Private Key: 7
2,804,721 UART: [art] Extend RT PCRs Done
2,805,149 UART: [art] Lock RT PCRs Done
2,807,121 UART: [art] Populate DV Done
2,815,380 UART: [fht] FMC Alias Private Key: 7
2,816,544 UART: [art] Derive CDI
2,816,824 UART: [art] Store in in slot 0x4
2,902,547 UART: [art] Derive Key Pair
2,902,907 UART: [art] Store priv key in slot 0x5
2,916,317 UART: [art] Derive Key Pair - Done
2,931,393 UART: [art] Signing Cert with AUTHO
2,931,873 UART: RITY.KEYID = 7
2,946,959 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,724 UART: [art] PUB.X = 088027492C5002D2DFBFAE18B28D8C98D850FBE6F5A973F552A599F237F687E6881BFB3169499E618104FC5EB1FE27C6
2,954,489 UART: [art] PUB.Y = 0E948EDB659EB53911847D97FE41CB8B9A6FBCB2C184D1410B16CBA67CB2F746FA3C0CA30BC4CE37DBB7DA67A485DC31
2,961,451 UART: [art] SIG.R = 43BF94E2989ADC802FF816C053E78119679376F1ADAABFC594B29F79188A1B2260D2820F046E24E0FFFE753CF0D1654D
2,968,221 UART: [art] SIG.S = C84AF403934B300E4701ED1B4E106B94ED6AF68A1D886802516FF9859FF2DDD13DA1841D4A2C3D39407FB59D83A7E297
2,992,134 UART: Caliptra RT
2,992,479 UART: [state] CFI Enabled
3,100,000 UART: [rt] RT listening for mailbox commands...
3,100,670 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,054 UART: [rt]cmd =0x4d454153, len=108
3,152,161 >>> mbox cmd response data (12 bytes)
3,152,162 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,181,929 UART: [rt]cmd =0x4d454153, len=108
3,203,048 >>> mbox cmd response data (12 bytes)
3,203,049 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,233,090 UART: [rt]cmd =0x4d454153, len=108
3,253,689 >>> mbox cmd response data (12 bytes)
3,253,690 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,283,857 UART: [rt]cmd =0x4d454153, len=108
3,304,072 >>> mbox cmd response data (12 bytes)
3,304,073 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,062 UART: [rt]cmd =0x4d454153, len=108
3,355,627 >>> mbox cmd response data (12 bytes)
3,355,628 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,385,781 UART: [rt]cmd =0x4d454153, len=108
3,406,132 >>> mbox cmd response data (12 bytes)
3,406,133 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,048 UART: [rt]cmd =0x4d454153, len=108
3,457,363 >>> mbox cmd response data (12 bytes)
3,457,364 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,487,533 UART: [rt]cmd =0x4d454153, len=108
3,508,254 >>> mbox cmd response data (12 bytes)
3,508,255 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,162 UART: [rt]cmd =0x4d454153, len=108
3,558,673 >>> mbox cmd response data (12 bytes)
3,558,674 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,661 UART: [rt]cmd =0x4d454153, len=108
3,610,198 >>> mbox cmd response data (12 bytes)
3,610,199 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,430 UART: [rt]cmd =0x4d454153, len=108
3,660,629 >>> mbox cmd response data (12 bytes)
3,660,630 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,699 UART: [rt]cmd =0x4d454153, len=108
3,711,514 >>> mbox cmd response data (12 bytes)
3,711,515 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,534 UART: [rt]cmd =0x4d454153, len=108
3,762,183 >>> mbox cmd response data (12 bytes)
3,762,184 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,245 UART: [rt]cmd =0x4d454153, len=108
3,812,304 >>> mbox cmd response data (12 bytes)
3,812,305 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,240 UART: [rt]cmd =0x4d454153, len=108
3,863,381 >>> mbox cmd response data (12 bytes)
3,863,382 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,893,363 UART: [rt]cmd =0x4d454153, len=108
3,895,055 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,121 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,841 UART: [kat] SHA2-256
881,772 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,887 UART: [kat] ++
886,039 UART: [kat] sha1
890,287 UART: [kat] SHA2-256
892,225 UART: [kat] SHA2-384
894,840 UART: [kat] SHA2-512-ACC
896,741 UART: [kat] ECC-384
902,222 UART: [kat] HMAC-384Kdf
906,986 UART: [kat] LMS
1,475,182 UART: [kat] --
1,476,117 UART: [cold-reset] ++
1,476,539 UART: [fht] Storing FHT @ 0x50003400
1,479,310 UART: [idev] ++
1,479,478 UART: [idev] CDI.KEYID = 6
1,479,838 UART: [idev] SUBJECT.KEYID = 7
1,480,262 UART: [idev] UDS.KEYID = 0
1,488,544 UART: [idev] Erasing UDS.KEYID = 0
1,505,000 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,766 UART: [idev] --
1,514,809 UART: [ldev] ++
1,514,977 UART: [ldev] CDI.KEYID = 6
1,515,340 UART: [ldev] SUBJECT.KEYID = 5
1,515,766 UART: [ldev] AUTHORITY.KEYID = 7
1,516,229 UART: [ldev] FE.KEYID = 1
1,521,537 UART: [ldev] Erasing FE.KEYID = 1
1,546,456 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,238 UART: [ldev] --
1,585,619 UART: [fwproc] Waiting for Commands...
1,586,404 UART: [fwproc] Received command 0x46574c44
1,587,195 UART: [fwproc] Received Image of size 114332 bytes
2,885,423 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,493 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,845 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,820 >>> mbox cmd response: success
3,078,988 UART: [afmc] ++
3,079,156 UART: [afmc] CDI.KEYID = 6
3,079,518 UART: [afmc] SUBJECT.KEYID = 7
3,079,943 UART: [afmc] AUTHORITY.KEYID = 5
3,114,690 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,988 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,768 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,496 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,381 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,071 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,996 UART: [afmc] --
3,157,874 UART: [cold-reset] --
3,158,536 UART: [state] Locking Datavault
3,159,349 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,953 UART: [state] Locking ICCM
3,160,481 UART: [exit] Launching FMC @ 0x40000130
3,165,810 UART:
3,165,826 UART: Running Caliptra FMC ...
3,166,234 UART:
3,166,288 UART: [state] CFI Enabled
3,177,027 UART: [fht] FMC Alias Private Key: 7
3,284,362 UART: [art] Extend RT PCRs Done
3,284,790 UART: [art] Lock RT PCRs Done
3,286,522 UART: [art] Populate DV Done
3,294,763 UART: [fht] FMC Alias Private Key: 7
3,295,731 UART: [art] Derive CDI
3,296,011 UART: [art] Store in in slot 0x4
3,382,052 UART: [art] Derive Key Pair
3,382,412 UART: [art] Store priv key in slot 0x5
3,395,454 UART: [art] Derive Key Pair - Done
3,410,196 UART: [art] Signing Cert with AUTHO
3,410,676 UART: RITY.KEYID = 7
3,426,278 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,043 UART: [art] PUB.X = D194B256B0E46603D15410E5ABFD285323A265C9DB54E8DD2E139F1FCD50BF9FE44A3246CBCD9991FA3F3ACBC2DD21DD
3,433,832 UART: [art] PUB.Y = C7A7D296143A278740AE6F2BE28A9F57DD5A5ECF6007632364C91991D5269C95E212A427BFCE2859DDB2473FF2ECA21A
3,440,787 UART: [art] SIG.R = 9F7653414CDD31C68B790A3CF06FF2844A8040025659E045D837E3D1B8A05D97D019D57A259849083189085A8FF0EEEF
3,447,541 UART: [art] SIG.S = CEF3C8DC84337D45C42C02323A708DD50D33FF27109FD19575AFA9777BE821999EE802D718977CEF5241A61854135F32
3,471,543 UART: Caliptra RT
3,471,796 UART: [state] CFI Enabled
3,580,008 UART: [rt] RT listening for mailbox commands...
3,580,678 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,332 UART: [rt]cmd =0x44504543, len=92
3,618,444 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,074 >>> mbox cmd response: success
2,988,382 UART:
2,988,398 UART: Running Caliptra FMC ...
2,988,806 UART:
2,988,860 UART: [state] CFI Enabled
2,999,393 UART: [fht] FMC Alias Private Key: 7
3,106,668 UART: [art] Extend RT PCRs Done
3,107,096 UART: [art] Lock RT PCRs Done
3,108,566 UART: [art] Populate DV Done
3,116,947 UART: [fht] FMC Alias Private Key: 7
3,117,975 UART: [art] Derive CDI
3,118,255 UART: [art] Store in in slot 0x4
3,203,930 UART: [art] Derive Key Pair
3,204,290 UART: [art] Store priv key in slot 0x5
3,216,928 UART: [art] Derive Key Pair - Done
3,231,809 UART: [art] Signing Cert with AUTHO
3,232,289 UART: RITY.KEYID = 7
3,246,987 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,752 UART: [art] PUB.X = A7BF9260A67A89D0EE0CB84F086B5F0392D2E35D4C9FC4AAA293CB4EBDA021BA8C6010F237F5F72963DCCFE175073966
3,254,526 UART: [art] PUB.Y = 88C76A0BBDF047AFEE7D31C6843E9E9343EF4B1A47F992597780AB78173731B9C0CAD8D5A1B4380F35C1A52D4456A139
3,261,476 UART: [art] SIG.R = 36633B0E98205B253F1259DD2527E3CAC9980D096752DCD7009395A6AF0989B24CCE04C5FB99504D17879E3B85C43716
3,268,203 UART: [art] SIG.S = 46DBE751DC8583252C16F180CAAF4C7762EF5AECAA5C59FF7D0BE43D3B014A6FBB379EACF73CB699445E9248C81B9FF5
3,291,610 UART: Caliptra RT
3,291,863 UART: [state] CFI Enabled
3,399,173 UART: [rt] RT listening for mailbox commands...
3,399,843 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,597 UART: [rt]cmd =0x44504543, len=92
3,437,747 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,518 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,008 UART: [kat] SHA2-256
881,939 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,054 UART: [kat] ++
886,206 UART: [kat] sha1
890,328 UART: [kat] SHA2-256
892,266 UART: [kat] SHA2-384
895,173 UART: [kat] SHA2-512-ACC
897,074 UART: [kat] ECC-384
902,617 UART: [kat] HMAC-384Kdf
907,297 UART: [kat] LMS
1,475,493 UART: [kat] --
1,476,234 UART: [cold-reset] ++
1,476,626 UART: [fht] Storing FHT @ 0x50003400
1,479,425 UART: [idev] ++
1,479,593 UART: [idev] CDI.KEYID = 6
1,479,953 UART: [idev] SUBJECT.KEYID = 7
1,480,377 UART: [idev] UDS.KEYID = 0
1,488,539 UART: [idev] Erasing UDS.KEYID = 0
1,505,071 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,891 UART: [idev] --
1,514,962 UART: [ldev] ++
1,515,130 UART: [ldev] CDI.KEYID = 6
1,515,493 UART: [ldev] SUBJECT.KEYID = 5
1,515,919 UART: [ldev] AUTHORITY.KEYID = 7
1,516,382 UART: [ldev] FE.KEYID = 1
1,521,588 UART: [ldev] Erasing FE.KEYID = 1
1,547,119 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,063 UART: [ldev] --
1,586,430 UART: [fwproc] Waiting for Commands...
1,587,125 UART: [fwproc] Received command 0x46574c44
1,587,916 UART: [fwproc] Received Image of size 114332 bytes
2,886,202 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,628 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,980 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,967 >>> mbox cmd response: success
3,079,037 UART: [afmc] ++
3,079,205 UART: [afmc] CDI.KEYID = 6
3,079,567 UART: [afmc] SUBJECT.KEYID = 7
3,079,992 UART: [afmc] AUTHORITY.KEYID = 5
3,115,401 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,465 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,245 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,973 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,858 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,548 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,605 UART: [afmc] --
3,158,517 UART: [cold-reset] --
3,159,389 UART: [state] Locking Datavault
3,160,572 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,176 UART: [state] Locking ICCM
3,161,624 UART: [exit] Launching FMC @ 0x40000130
3,166,953 UART:
3,166,969 UART: Running Caliptra FMC ...
3,167,377 UART:
3,167,520 UART: [state] CFI Enabled
3,178,147 UART: [fht] FMC Alias Private Key: 7
3,285,654 UART: [art] Extend RT PCRs Done
3,286,082 UART: [art] Lock RT PCRs Done
3,287,608 UART: [art] Populate DV Done
3,295,657 UART: [fht] FMC Alias Private Key: 7
3,296,747 UART: [art] Derive CDI
3,297,027 UART: [art] Store in in slot 0x4
3,382,658 UART: [art] Derive Key Pair
3,383,018 UART: [art] Store priv key in slot 0x5
3,395,854 UART: [art] Derive Key Pair - Done
3,410,647 UART: [art] Signing Cert with AUTHO
3,411,127 UART: RITY.KEYID = 7
3,426,493 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,258 UART: [art] PUB.X = B2CE1A953E73F4FFC8858E435368229B3D86BF62E3AF38CA5D9E181994188EB0AF8EF5F2AB8E7D6F8DD8C40668E7717F
3,434,039 UART: [art] PUB.Y = FEB5B6057C76050C1F963AE5B833E4A0A571EF603F605D670591BD4D14F6CFBEA98E9388B1A06B17788A6E567A95FE08
3,440,982 UART: [art] SIG.R = 64BD04FE967B583BE3AB1B4A61ACF16EE3B256ED15BB258DEB104300E1BAEA6ECE6F3EFBBBD1E6C01806E2AB9126584B
3,447,752 UART: [art] SIG.S = C5086C1CDBB1AC61C09EEE895CCDEF154E2ABF1F0B34811B57DBB1E7E063B0DC41D463FF22BDDF97A0918A3D941EFFB9
3,471,613 UART: Caliptra RT
3,471,958 UART: [state] CFI Enabled
3,579,701 UART: [rt] RT listening for mailbox commands...
3,580,371 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,937 UART: [rt]cmd =0x44504543, len=92
3,618,189 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,153 >>> mbox cmd response: success
2,989,905 UART:
2,989,921 UART: Running Caliptra FMC ...
2,990,329 UART:
2,990,472 UART: [state] CFI Enabled
3,001,133 UART: [fht] FMC Alias Private Key: 7
3,109,404 UART: [art] Extend RT PCRs Done
3,109,832 UART: [art] Lock RT PCRs Done
3,111,406 UART: [art] Populate DV Done
3,119,905 UART: [fht] FMC Alias Private Key: 7
3,120,877 UART: [art] Derive CDI
3,121,157 UART: [art] Store in in slot 0x4
3,206,654 UART: [art] Derive Key Pair
3,207,014 UART: [art] Store priv key in slot 0x5
3,220,180 UART: [art] Derive Key Pair - Done
3,234,919 UART: [art] Signing Cert with AUTHO
3,235,399 UART: RITY.KEYID = 7
3,250,375 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,140 UART: [art] PUB.X = 18306583E1CB4CBB2C07E0825B924C2088DBBDA6A655EC6CB57423035FAFAB46BC1A232E00C5DE0E3ADB70E211C80E63
3,257,892 UART: [art] PUB.Y = 720B0CD1D92E2854A0E0E1DE35484100E519B0E61860598B4548ACD34D549A5401326002D675B0FA59EF46DB3CD191F4
3,264,806 UART: [art] SIG.R = A7AE5D7613AAC4EC80164005989CFB17B8AE7FFB0EC999338798D2A2ED1AB930F46D42C64CA04D71FA131EF8525566D7
3,271,582 UART: [art] SIG.S = AC2123B03E96140E8A99C9C333AD0B8B3777CAD5F65B8D80D41C7E5E7FE4B3DF1202EA422E3998106E3694F8DE9A4E74
3,295,744 UART: Caliptra RT
3,296,089 UART: [state] CFI Enabled
3,404,803 UART: [rt] RT listening for mailbox commands...
3,405,473 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,689 UART: [rt]cmd =0x44504543, len=92
3,442,893 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,239 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
893,104 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,229 UART: [kat] ++
897,381 UART: [kat] sha1
901,545 UART: [kat] SHA2-256
903,485 UART: [kat] SHA2-384
906,108 UART: [kat] SHA2-512-ACC
908,009 UART: [kat] ECC-384
917,470 UART: [kat] HMAC-384Kdf
922,090 UART: [kat] LMS
1,170,418 UART: [kat] --
1,171,035 UART: [cold-reset] ++
1,171,545 UART: [fht] FHT @ 0x50003400
1,174,182 UART: [idev] ++
1,174,350 UART: [idev] CDI.KEYID = 6
1,174,710 UART: [idev] SUBJECT.KEYID = 7
1,175,134 UART: [idev] UDS.KEYID = 0
1,183,106 UART: [idev] Erasing UDS.KEYID = 0
1,200,297 UART: [idev] Sha1 KeyId Algorithm
1,208,841 UART: [idev] --
1,209,827 UART: [ldev] ++
1,209,995 UART: [ldev] CDI.KEYID = 6
1,210,358 UART: [ldev] SUBJECT.KEYID = 5
1,210,784 UART: [ldev] AUTHORITY.KEYID = 7
1,211,247 UART: [ldev] FE.KEYID = 1
1,216,367 UART: [ldev] Erasing FE.KEYID = 1
1,242,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,027 UART: [ldev] --
1,282,334 UART: [fwproc] Wait for Commands...
1,282,944 UART: [fwproc] Recv command 0x46574c44
1,283,672 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,606 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,910 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,837 >>> mbox cmd response: success
2,775,037 UART: [afmc] ++
2,775,205 UART: [afmc] CDI.KEYID = 6
2,775,567 UART: [afmc] SUBJECT.KEYID = 7
2,775,992 UART: [afmc] AUTHORITY.KEYID = 5
2,811,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,746 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,474 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,359 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,078 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,108 UART: [afmc] --
2,855,126 UART: [cold-reset] --
2,855,992 UART: [state] Locking Datavault
2,857,135 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,739 UART: [state] Locking ICCM
2,858,251 UART: [exit] Launching FMC @ 0x40000130
2,863,580 UART:
2,863,596 UART: Running Caliptra FMC ...
2,864,004 UART:
2,864,058 UART: [state] CFI Enabled
2,874,239 UART: [fht] FMC Alias Private Key: 7
2,982,678 UART: [art] Extend RT PCRs Done
2,983,106 UART: [art] Lock RT PCRs Done
2,984,826 UART: [art] Populate DV Done
2,993,149 UART: [fht] FMC Alias Private Key: 7
2,994,151 UART: [art] Derive CDI
2,994,431 UART: [art] Store in in slot 0x4
3,080,128 UART: [art] Derive Key Pair
3,080,488 UART: [art] Store priv key in slot 0x5
3,094,104 UART: [art] Derive Key Pair - Done
3,108,668 UART: [art] Signing Cert with AUTHO
3,109,148 UART: RITY.KEYID = 7
3,124,570 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,335 UART: [art] PUB.X = 950121250DB29D832829EC8A73BA569822238F5CF79028CCB1B977EB9700C98EE8E9A40F859A30C5A46A0AFF86E6A59A
3,132,075 UART: [art] PUB.Y = 2A874BBD75BC17A7F8F378693203F2BB1CD485B99F0AC64D9B34AB8B6C769192824A2628C31ABEDDC6010A693C353091
3,139,019 UART: [art] SIG.R = 7E9DA4DF5C07DDAB3ADA3FEC0B090C74F4C7552AA7FC5A4593931467E641932C2AE6A1A4B7BECAB4112F1CAB9F92294C
3,145,801 UART: [art] SIG.S = CD2F0A86A6DF2E5E42783C9C70CE1E49562C6C687299D4067C311B3A922CE0CE0F0F387FCDBE998CE772E26A631B7496
3,169,948 UART: Caliptra RT
3,170,201 UART: [state] CFI Enabled
3,278,486 UART: [rt] RT listening for mailbox commands...
3,279,156 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,458 UART: [rt]cmd =0x44504543, len=92
3,316,760 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,290 >>> mbox cmd response: success
2,688,202 UART:
2,688,218 UART: Running Caliptra FMC ...
2,688,626 UART:
2,688,680 UART: [state] CFI Enabled
2,699,183 UART: [fht] FMC Alias Private Key: 7
2,807,034 UART: [art] Extend RT PCRs Done
2,807,462 UART: [art] Lock RT PCRs Done
2,808,914 UART: [art] Populate DV Done
2,816,935 UART: [fht] FMC Alias Private Key: 7
2,817,969 UART: [art] Derive CDI
2,818,249 UART: [art] Store in in slot 0x4
2,903,688 UART: [art] Derive Key Pair
2,904,048 UART: [art] Store priv key in slot 0x5
2,917,202 UART: [art] Derive Key Pair - Done
2,931,838 UART: [art] Signing Cert with AUTHO
2,932,318 UART: RITY.KEYID = 7
2,947,290 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,055 UART: [art] PUB.X = ADC9BA6B591675B3C6DFCD361944DDE3E9E586C37B9CD7219145A938804078636E6E58AC0651B832E3A78E7BEB617BDA
2,954,832 UART: [art] PUB.Y = 43DBD58A3259651F4C2362E5F7CB2081D764C9F1E84D85FB431375FA5D63922A6F8ADEFE31FD661866DACC148BC76D1F
2,961,794 UART: [art] SIG.R = F06AA58CB7DF52E94B12D0980F60F5AA84CAD3EF8089A928598050789E015F06389DDAB4C9A775CB52F8B41C2806F65C
2,968,560 UART: [art] SIG.S = 639864A948B9B67C91D096E528AF25256DCDB22340C0C5C3213404F85339AD4A9DA550B412B043B3D3E4848F83235D33
2,992,736 UART: Caliptra RT
2,992,989 UART: [state] CFI Enabled
3,100,962 UART: [rt] RT listening for mailbox commands...
3,101,632 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,644 UART: [rt]cmd =0x44504543, len=92
3,138,828 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,966 UART: [state] WD Timer not started. Device not locked for debugging
88,175 UART: [kat] SHA2-256
893,825 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,950 UART: [kat] ++
898,102 UART: [kat] sha1
902,266 UART: [kat] SHA2-256
904,206 UART: [kat] SHA2-384
906,881 UART: [kat] SHA2-512-ACC
908,782 UART: [kat] ECC-384
918,341 UART: [kat] HMAC-384Kdf
922,989 UART: [kat] LMS
1,171,317 UART: [kat] --
1,172,198 UART: [cold-reset] ++
1,172,684 UART: [fht] FHT @ 0x50003400
1,175,483 UART: [idev] ++
1,175,651 UART: [idev] CDI.KEYID = 6
1,176,011 UART: [idev] SUBJECT.KEYID = 7
1,176,435 UART: [idev] UDS.KEYID = 0
1,184,123 UART: [idev] Erasing UDS.KEYID = 0
1,201,150 UART: [idev] Sha1 KeyId Algorithm
1,209,490 UART: [idev] --
1,210,580 UART: [ldev] ++
1,210,748 UART: [ldev] CDI.KEYID = 6
1,211,111 UART: [ldev] SUBJECT.KEYID = 5
1,211,537 UART: [ldev] AUTHORITY.KEYID = 7
1,212,000 UART: [ldev] FE.KEYID = 1
1,217,256 UART: [ldev] Erasing FE.KEYID = 1
1,243,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,454 UART: [ldev] --
1,282,923 UART: [fwproc] Wait for Commands...
1,283,701 UART: [fwproc] Recv command 0x46574c44
1,284,429 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,685 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,989 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,830 >>> mbox cmd response: success
2,775,980 UART: [afmc] ++
2,776,148 UART: [afmc] CDI.KEYID = 6
2,776,510 UART: [afmc] SUBJECT.KEYID = 7
2,776,935 UART: [afmc] AUTHORITY.KEYID = 5
2,813,020 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,513 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,261 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,989 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,874 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,593 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,569 UART: [afmc] --
2,856,599 UART: [cold-reset] --
2,857,235 UART: [state] Locking Datavault
2,858,310 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,914 UART: [state] Locking ICCM
2,859,564 UART: [exit] Launching FMC @ 0x40000130
2,864,893 UART:
2,864,909 UART: Running Caliptra FMC ...
2,865,317 UART:
2,865,460 UART: [state] CFI Enabled
2,876,271 UART: [fht] FMC Alias Private Key: 7
2,984,026 UART: [art] Extend RT PCRs Done
2,984,454 UART: [art] Lock RT PCRs Done
2,986,060 UART: [art] Populate DV Done
2,994,499 UART: [fht] FMC Alias Private Key: 7
2,995,543 UART: [art] Derive CDI
2,995,823 UART: [art] Store in in slot 0x4
3,081,322 UART: [art] Derive Key Pair
3,081,682 UART: [art] Store priv key in slot 0x5
3,095,618 UART: [art] Derive Key Pair - Done
3,110,276 UART: [art] Signing Cert with AUTHO
3,110,756 UART: RITY.KEYID = 7
3,125,994 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,759 UART: [art] PUB.X = F408768E6A169C49592AFD5ABF4E4C2A20BA19909527239DD2D3E66516EB13F48AF671264AEBBD9F422F89B3925F6D9E
3,133,534 UART: [art] PUB.Y = BD7AF970D646A4A7E2F1F863AFD70520027739773B58EE25EA9DD2997859CA5946E0CA908B41AB9F81FF506FB29F4393
3,140,484 UART: [art] SIG.R = A0FDCC39B2316F17B79D01F03FF69E47D2D3CD0BCA39CE9606A92D569E15BE363BC020774AB5AF5B538420F47254D571
3,147,255 UART: [art] SIG.S = E52D36B97145FEB9AFD752745AB6FA6001F3844851DD02FD3E75484C26721626D2C349A7263DA8A3F34CDE82D14A42E6
3,171,142 UART: Caliptra RT
3,171,487 UART: [state] CFI Enabled
3,279,911 UART: [rt] RT listening for mailbox commands...
3,280,581 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,829 UART: [rt]cmd =0x44504543, len=92
3,317,955 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,647 >>> mbox cmd response: success
2,689,153 UART:
2,689,169 UART: Running Caliptra FMC ...
2,689,577 UART:
2,689,720 UART: [state] CFI Enabled
2,700,317 UART: [fht] FMC Alias Private Key: 7
2,808,806 UART: [art] Extend RT PCRs Done
2,809,234 UART: [art] Lock RT PCRs Done
2,810,732 UART: [art] Populate DV Done
2,818,921 UART: [fht] FMC Alias Private Key: 7
2,820,031 UART: [art] Derive CDI
2,820,311 UART: [art] Store in in slot 0x4
2,906,168 UART: [art] Derive Key Pair
2,906,528 UART: [art] Store priv key in slot 0x5
2,919,424 UART: [art] Derive Key Pair - Done
2,934,037 UART: [art] Signing Cert with AUTHO
2,934,517 UART: RITY.KEYID = 7
2,950,019 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,784 UART: [art] PUB.X = 16F310FBC52A7E9EF3323FFF0EA4D6193F621C8470706C85EF9FAD1A3A9005B476108016D9397674458209868558D189
2,957,537 UART: [art] PUB.Y = 4AEE2E89291C84C72C122D8EFC4EDFF0FB91EC3C7FA933EB51E4C118E36A675AA569C365033BDDA203C3117904D30853
2,964,487 UART: [art] SIG.R = 226B554F037222A8B92732301D3ABBB1920868C998784C6F1CFCA803D9D8E7719B96D0DA869A0F976AF9C4DADD3EF8CC
2,971,255 UART: [art] SIG.S = D20EB9E0B15303E25915EFAB6712B19D7CCF0B2711903AD79AABCEEE56612971C743D0872F39F6A47FB034A71D9544A5
2,995,029 UART: Caliptra RT
2,995,374 UART: [state] CFI Enabled
3,101,997 UART: [rt] RT listening for mailbox commands...
3,102,667 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,097 UART: [rt]cmd =0x44504543, len=92
3,140,415 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
87,902 UART: [kat] SHA2-256
891,452 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,581 UART: [kat] ++
895,733 UART: [kat] sha1
900,069 UART: [kat] SHA2-256
902,009 UART: [kat] SHA2-384
904,798 UART: [kat] SHA2-512-ACC
906,699 UART: [kat] ECC-384
915,830 UART: [kat] HMAC-384Kdf
920,334 UART: [kat] LMS
1,168,646 UART: [kat] --
1,169,263 UART: [cold-reset] ++
1,169,815 UART: [fht] FHT @ 0x50003400
1,172,535 UART: [idev] ++
1,172,703 UART: [idev] CDI.KEYID = 6
1,173,064 UART: [idev] SUBJECT.KEYID = 7
1,173,489 UART: [idev] UDS.KEYID = 0
1,181,143 UART: [idev] Erasing UDS.KEYID = 0
1,198,097 UART: [idev] Sha1 KeyId Algorithm
1,207,043 UART: [idev] --
1,207,906 UART: [ldev] ++
1,208,074 UART: [ldev] CDI.KEYID = 6
1,208,438 UART: [ldev] SUBJECT.KEYID = 5
1,208,865 UART: [ldev] AUTHORITY.KEYID = 7
1,209,328 UART: [ldev] FE.KEYID = 1
1,214,414 UART: [ldev] Erasing FE.KEYID = 1
1,240,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,622 UART: [ldev] --
1,279,900 UART: [fwproc] Wait for Commands...
1,280,475 UART: [fwproc] Recv command 0x46574c44
1,281,208 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,504 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,813 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,769,589 >>> mbox cmd response: success
2,770,764 UART: [afmc] ++
2,770,932 UART: [afmc] CDI.KEYID = 6
2,771,295 UART: [afmc] SUBJECT.KEYID = 7
2,771,721 UART: [afmc] AUTHORITY.KEYID = 5
2,807,574 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,916 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,667 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,396 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,279 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,998 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,949 UART: [afmc] --
2,851,005 UART: [cold-reset] --
2,851,853 UART: [state] Locking Datavault
2,853,124 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,728 UART: [state] Locking ICCM
2,854,360 UART: [exit] Launching FMC @ 0x40000130
2,859,689 UART:
2,859,705 UART: Running Caliptra FMC ...
2,860,113 UART:
2,860,167 UART: [state] CFI Enabled
2,870,774 UART: [fht] FMC Alias Private Key: 7
2,978,743 UART: [art] Extend RT PCRs Done
2,979,171 UART: [art] Lock RT PCRs Done
2,980,479 UART: [art] Populate DV Done
2,988,468 UART: [fht] FMC Alias Private Key: 7
2,989,428 UART: [art] Derive CDI
2,989,708 UART: [art] Store in in slot 0x4
3,075,325 UART: [art] Derive Key Pair
3,075,685 UART: [art] Store priv key in slot 0x5
3,088,379 UART: [art] Derive Key Pair - Done
3,102,917 UART: [art] Signing Cert with AUTHO
3,103,397 UART: RITY.KEYID = 7
3,118,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,326 UART: [art] PUB.X = 58B31848F9229E0345F3F5A98B8B49140E4499125746EAE3A5D04C926D02AA9E137D0C03DEAD45B358B05A8B15BE85BC
3,126,085 UART: [art] PUB.Y = D50843C4D6BDE59229D81DFAB2702D126CCBD7C5AF295D7AC2358D148DE7F0259CFBEE36C76B7435DF81933DC28E1C33
3,133,048 UART: [art] SIG.R = B4780F66FFBF10680E036161711A72FF0E04B2D4FAC65DC0D7036E46C2337BAE8D083B0F6C20491EABE35628391AE10C
3,139,799 UART: [art] SIG.S = 77CEEAD6F9D799F7533A9E2AA1C913ECB35D7E17A34C9527521403BA597685552FA332C4B43B86FFB6DDAA2EC9159908
3,163,754 UART: Caliptra RT
3,164,007 UART: [state] CFI Enabled
3,272,070 UART: [rt] RT listening for mailbox commands...
3,272,740 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,010 UART: [rt]cmd =0x44504543, len=92
3,310,292 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,233 >>> mbox cmd response: success
2,684,445 UART:
2,684,461 UART: Running Caliptra FMC ...
2,684,869 UART:
2,684,923 UART: [state] CFI Enabled
2,695,506 UART: [fht] FMC Alias Private Key: 7
2,803,413 UART: [art] Extend RT PCRs Done
2,803,841 UART: [art] Lock RT PCRs Done
2,805,163 UART: [art] Populate DV Done
2,813,310 UART: [fht] FMC Alias Private Key: 7
2,814,450 UART: [art] Derive CDI
2,814,730 UART: [art] Store in in slot 0x4
2,900,405 UART: [art] Derive Key Pair
2,900,765 UART: [art] Store priv key in slot 0x5
2,914,337 UART: [art] Derive Key Pair - Done
2,928,871 UART: [art] Signing Cert with AUTHO
2,929,351 UART: RITY.KEYID = 7
2,944,533 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,298 UART: [art] PUB.X = 9273AE6D6179C6339A83E24F6C02CA73BBD16AA7D1B7652011FA2569D3EA277295787FAF5CC599EE64DB6DB37BDD0A7E
2,952,076 UART: [art] PUB.Y = 2FFB41CF9328D9BF9D0D4B7A80DE2135DB0EACB5847A30D24A17D1DF346BF647C96291EE657EE14A50F80C78EA14764F
2,959,033 UART: [art] SIG.R = CB4356255886FDCDE681083A02F5C0C405C990D5E8AC5774D49D2973E9F0EB57D702A9242C11E35FAE8C193E149D9EE3
2,965,797 UART: [art] SIG.S = 032C005B85226509B6E8EAF0648D95A245BAE3A95030C463AA004A1E3046263015AF8779695989536AAC3910D47D2D87
2,989,206 UART: Caliptra RT
2,989,459 UART: [state] CFI Enabled
3,097,168 UART: [rt] RT listening for mailbox commands...
3,097,838 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,134 UART: [rt]cmd =0x44504543, len=92
3,135,268 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,570 UART: [kat] ++
895,722 UART: [kat] sha1
899,808 UART: [kat] SHA2-256
901,748 UART: [kat] SHA2-384
904,665 UART: [kat] SHA2-512-ACC
906,566 UART: [kat] ECC-384
916,431 UART: [kat] HMAC-384Kdf
921,165 UART: [kat] LMS
1,169,477 UART: [kat] --
1,170,216 UART: [cold-reset] ++
1,170,586 UART: [fht] FHT @ 0x50003400
1,173,290 UART: [idev] ++
1,173,458 UART: [idev] CDI.KEYID = 6
1,173,819 UART: [idev] SUBJECT.KEYID = 7
1,174,244 UART: [idev] UDS.KEYID = 0
1,181,966 UART: [idev] Erasing UDS.KEYID = 0
1,199,076 UART: [idev] Sha1 KeyId Algorithm
1,207,894 UART: [idev] --
1,208,981 UART: [ldev] ++
1,209,149 UART: [ldev] CDI.KEYID = 6
1,209,513 UART: [ldev] SUBJECT.KEYID = 5
1,209,940 UART: [ldev] AUTHORITY.KEYID = 7
1,210,403 UART: [ldev] FE.KEYID = 1
1,215,957 UART: [ldev] Erasing FE.KEYID = 1
1,242,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,587 UART: [ldev] --
1,281,017 UART: [fwproc] Wait for Commands...
1,281,690 UART: [fwproc] Recv command 0x46574c44
1,282,423 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,077 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,386 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,208 >>> mbox cmd response: success
2,774,361 UART: [afmc] ++
2,774,529 UART: [afmc] CDI.KEYID = 6
2,774,892 UART: [afmc] SUBJECT.KEYID = 7
2,775,318 UART: [afmc] AUTHORITY.KEYID = 5
2,811,151 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,687 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,438 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,167 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,050 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,769 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,582 UART: [afmc] --
2,854,504 UART: [cold-reset] --
2,855,494 UART: [state] Locking Datavault
2,856,675 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,279 UART: [state] Locking ICCM
2,857,931 UART: [exit] Launching FMC @ 0x40000130
2,863,260 UART:
2,863,276 UART: Running Caliptra FMC ...
2,863,684 UART:
2,863,827 UART: [state] CFI Enabled
2,874,890 UART: [fht] FMC Alias Private Key: 7
2,982,661 UART: [art] Extend RT PCRs Done
2,983,089 UART: [art] Lock RT PCRs Done
2,984,587 UART: [art] Populate DV Done
2,992,792 UART: [fht] FMC Alias Private Key: 7
2,993,960 UART: [art] Derive CDI
2,994,240 UART: [art] Store in in slot 0x4
3,079,891 UART: [art] Derive Key Pair
3,080,251 UART: [art] Store priv key in slot 0x5
3,093,625 UART: [art] Derive Key Pair - Done
3,108,496 UART: [art] Signing Cert with AUTHO
3,108,976 UART: RITY.KEYID = 7
3,124,080 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,845 UART: [art] PUB.X = 6A1EB683AF4D082AC4DE01BD22F729D32DF7C548AF0843F3FF36BE6B80D61C75263C7F7C6CB08455A05A680146B09876
3,131,611 UART: [art] PUB.Y = 8386C7083279964AAD00A3BC45405F33258702EDFBA8E96C64674769095524C50F866C42FA2B478FFFBA7FADD02E1810
3,138,527 UART: [art] SIG.R = 42CC8F615B4DDDEE4B2DCF62BAA3CDB04B892082BE23A4560121CE78CCED570723690B379D65F0640C7A4621130FA16A
3,145,294 UART: [art] SIG.S = 1202BAEF21510425A7ED63F441B5349FC614053BD7B047755585FF93844DBDAC2322356B75635232F7D9C21ACF755759
3,169,088 UART: Caliptra RT
3,169,433 UART: [state] CFI Enabled
3,278,040 UART: [rt] RT listening for mailbox commands...
3,278,710 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,042 UART: [rt]cmd =0x44504543, len=92
3,316,342 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,972 >>> mbox cmd response: success
2,685,912 UART:
2,685,928 UART: Running Caliptra FMC ...
2,686,336 UART:
2,686,479 UART: [state] CFI Enabled
2,696,970 UART: [fht] FMC Alias Private Key: 7
2,804,827 UART: [art] Extend RT PCRs Done
2,805,255 UART: [art] Lock RT PCRs Done
2,806,833 UART: [art] Populate DV Done
2,815,188 UART: [fht] FMC Alias Private Key: 7
2,816,118 UART: [art] Derive CDI
2,816,398 UART: [art] Store in in slot 0x4
2,902,149 UART: [art] Derive Key Pair
2,902,509 UART: [art] Store priv key in slot 0x5
2,915,593 UART: [art] Derive Key Pair - Done
2,930,618 UART: [art] Signing Cert with AUTHO
2,931,098 UART: RITY.KEYID = 7
2,946,574 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,339 UART: [art] PUB.X = 429DF4F36E352B04083AF29DC5C413C43B0EDF9633387661BFE422F0562489456DDC07CCE5BB9FBB9D46E4F9B18BBB2F
2,954,111 UART: [art] PUB.Y = 0231C1E545B12D2977158D35F563820997BFD9934D5E95BDC7729599CB243052C0D96A64E64D9F29B8353B275323BD64
2,961,045 UART: [art] SIG.R = 366A47EC3C9B9E506F487611A60C90D34574AEB9E6398F6F6E2FC77D63767544B683DA5B1A149F28557C36155135832B
2,967,806 UART: [art] SIG.S = 2B0030DF02871BF34C4D03034E08B416DCEAF4A9E282F6B6071BFD09485C145873D7F23B4D4F253D0BA31F6CF0D9EA87
2,991,694 UART: Caliptra RT
2,992,039 UART: [state] CFI Enabled
3,100,186 UART: [rt] RT listening for mailbox commands...
3,100,856 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,246 UART: [rt]cmd =0x44504543, len=92
3,138,412 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,427 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,969 UART: [kat] SHA2-256
881,900 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,015 UART: [kat] ++
886,167 UART: [kat] sha1
890,211 UART: [kat] SHA2-256
892,149 UART: [kat] SHA2-384
894,892 UART: [kat] SHA2-512-ACC
896,793 UART: [kat] ECC-384
902,402 UART: [kat] HMAC-384Kdf
906,930 UART: [kat] LMS
1,475,126 UART: [kat] --
1,476,059 UART: [cold-reset] ++
1,476,453 UART: [fht] Storing FHT @ 0x50003400
1,479,158 UART: [idev] ++
1,479,326 UART: [idev] CDI.KEYID = 6
1,479,686 UART: [idev] SUBJECT.KEYID = 7
1,480,110 UART: [idev] UDS.KEYID = 0
1,480,455 ready_for_fw is high
1,480,455 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,966 UART: [idev] Erasing UDS.KEYID = 0
1,505,130 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,794 UART: [idev] --
1,514,905 UART: [ldev] ++
1,515,073 UART: [ldev] CDI.KEYID = 6
1,515,436 UART: [ldev] SUBJECT.KEYID = 5
1,515,862 UART: [ldev] AUTHORITY.KEYID = 7
1,516,325 UART: [ldev] FE.KEYID = 1
1,521,689 UART: [ldev] Erasing FE.KEYID = 1
1,546,924 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,552 UART: [ldev] --
1,585,879 UART: [fwproc] Waiting for Commands...
1,586,516 UART: [fwproc] Received command 0x46574c44
1,587,307 UART: [fwproc] Received Image of size 114332 bytes
2,885,495 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,315 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,667 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,538 >>> mbox cmd response: success
3,078,538 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,079,594 UART: [afmc] ++
3,079,762 UART: [afmc] CDI.KEYID = 6
3,080,124 UART: [afmc] SUBJECT.KEYID = 7
3,080,549 UART: [afmc] AUTHORITY.KEYID = 5
3,115,818 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,822 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,602 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,330 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,215 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,905 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,718 UART: [afmc] --
3,158,770 UART: [cold-reset] --
3,159,502 UART: [state] Locking Datavault
3,160,717 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,321 UART: [state] Locking ICCM
3,161,973 UART: [exit] Launching FMC @ 0x40000130
3,167,302 UART:
3,167,318 UART: Running Caliptra FMC ...
3,167,726 UART:
3,167,780 UART: [state] CFI Enabled
3,178,693 UART: [fht] FMC Alias Private Key: 7
3,287,500 UART: [art] Extend RT PCRs Done
3,287,928 UART: [art] Lock RT PCRs Done
3,289,382 UART: [art] Populate DV Done
3,297,751 UART: [fht] FMC Alias Private Key: 7
3,298,899 UART: [art] Derive CDI
3,299,179 UART: [art] Store in in slot 0x4
3,384,874 UART: [art] Derive Key Pair
3,385,234 UART: [art] Store priv key in slot 0x5
3,398,574 UART: [art] Derive Key Pair - Done
3,413,198 UART: [art] Signing Cert with AUTHO
3,413,678 UART: RITY.KEYID = 7
3,428,348 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,113 UART: [art] PUB.X = 11A268AEDBBD9B7A1E3481032AEEA417D6F679FF7863AB58B823A3C1E009E78F4138C94D109A635AFC12C8CFF8D5001A
3,435,869 UART: [art] PUB.Y = A2C0987B2223C6D7A63107A0CFB9F6CF83BC9A1701CD11B1A7999347057B9747D8906F7826B1AB88BDA6839D8FFB5F15
3,442,816 UART: [art] SIG.R = 058F59055903E69C29A107997BB9F41DA2BA81107B76B087507CF5EFD31F1F46D36164F85F9B95847E096F6CC5A4AC53
3,449,571 UART: [art] SIG.S = 557086977978CD4D2F504E33AFD03BF6B48A1109335E58A61FA851CE256D848906CAA8A866C553016EEDEA60FC50265B
3,473,117 UART: Caliptra RT
3,473,370 UART: [state] CFI Enabled
3,582,380 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,974 UART: [rt]cmd =0x50435245, len=56
3,614,309 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,145 ready_for_fw is high
1,363,145 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,618 >>> mbox cmd response: success
2,928,618 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,990,652 UART:
2,990,668 UART: Running Caliptra FMC ...
2,991,076 UART:
2,991,130 UART: [state] CFI Enabled
3,001,399 UART: [fht] FMC Alias Private Key: 7
3,109,226 UART: [art] Extend RT PCRs Done
3,109,654 UART: [art] Lock RT PCRs Done
3,111,176 UART: [art] Populate DV Done
3,119,679 UART: [fht] FMC Alias Private Key: 7
3,120,821 UART: [art] Derive CDI
3,121,101 UART: [art] Store in in slot 0x4
3,206,458 UART: [art] Derive Key Pair
3,206,818 UART: [art] Store priv key in slot 0x5
3,220,048 UART: [art] Derive Key Pair - Done
3,234,785 UART: [art] Signing Cert with AUTHO
3,235,265 UART: RITY.KEYID = 7
3,250,445 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,210 UART: [art] PUB.X = 8FB1EB3C5E824AED88054FFA1054130079DA897AE10352B7BE193ED5334214FF250508DB6555E50F9497D50BDB82CA29
3,257,944 UART: [art] PUB.Y = DF45AACE2F00CF8C19B01137AB6CF32765DC4BCC5CC21C4B7BE4C95C769F3538405516D0B669A5AF1066E3396C4AFE52
3,264,888 UART: [art] SIG.R = 30050DBD65E57729C3F6D24F18746ED34EF7DD56E883D212C755632BDE9ACF43D5509B1A32A682B56DBB0C0AD8D47118
3,271,654 UART: [art] SIG.S = 460664FDE116A4003EE4E6F298D24EF175FA1AB2B62F45862A07524A7F68AD057CA2FA51A5E70C8C373AE77EC7FC17EB
3,295,553 UART: Caliptra RT
3,295,806 UART: [state] CFI Enabled
3,403,818 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,682 UART: [rt]cmd =0x50435245, len=56
3,436,099 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
86,834 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,364 UART: [kat] SHA2-256
882,295 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,410 UART: [kat] ++
886,562 UART: [kat] sha1
890,868 UART: [kat] SHA2-256
892,806 UART: [kat] SHA2-384
895,751 UART: [kat] SHA2-512-ACC
897,652 UART: [kat] ECC-384
903,639 UART: [kat] HMAC-384Kdf
908,263 UART: [kat] LMS
1,476,459 UART: [kat] --
1,477,668 UART: [cold-reset] ++
1,478,198 UART: [fht] Storing FHT @ 0x50003400
1,481,171 UART: [idev] ++
1,481,339 UART: [idev] CDI.KEYID = 6
1,481,699 UART: [idev] SUBJECT.KEYID = 7
1,482,123 UART: [idev] UDS.KEYID = 0
1,482,468 ready_for_fw is high
1,482,468 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,490,233 UART: [idev] Erasing UDS.KEYID = 0
1,506,407 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,065 UART: [idev] --
1,516,130 UART: [ldev] ++
1,516,298 UART: [ldev] CDI.KEYID = 6
1,516,661 UART: [ldev] SUBJECT.KEYID = 5
1,517,087 UART: [ldev] AUTHORITY.KEYID = 7
1,517,550 UART: [ldev] FE.KEYID = 1
1,522,550 UART: [ldev] Erasing FE.KEYID = 1
1,548,297 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,025 UART: [ldev] --
1,587,300 UART: [fwproc] Waiting for Commands...
1,588,093 UART: [fwproc] Received command 0x46574c44
1,588,884 UART: [fwproc] Received Image of size 114332 bytes
2,886,170 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,668 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,020 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,795 >>> mbox cmd response: success
3,077,795 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,078,829 UART: [afmc] ++
3,078,997 UART: [afmc] CDI.KEYID = 6
3,079,359 UART: [afmc] SUBJECT.KEYID = 7
3,079,784 UART: [afmc] AUTHORITY.KEYID = 5
3,115,611 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,637 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,417 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,145 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,030 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,720 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,723 UART: [afmc] --
3,158,657 UART: [cold-reset] --
3,159,299 UART: [state] Locking Datavault
3,160,372 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,976 UART: [state] Locking ICCM
3,161,508 UART: [exit] Launching FMC @ 0x40000130
3,166,837 UART:
3,166,853 UART: Running Caliptra FMC ...
3,167,261 UART:
3,167,404 UART: [state] CFI Enabled
3,178,195 UART: [fht] FMC Alias Private Key: 7
3,286,038 UART: [art] Extend RT PCRs Done
3,286,466 UART: [art] Lock RT PCRs Done
3,287,968 UART: [art] Populate DV Done
3,296,219 UART: [fht] FMC Alias Private Key: 7
3,297,341 UART: [art] Derive CDI
3,297,621 UART: [art] Store in in slot 0x4
3,383,516 UART: [art] Derive Key Pair
3,383,876 UART: [art] Store priv key in slot 0x5
3,397,142 UART: [art] Derive Key Pair - Done
3,411,702 UART: [art] Signing Cert with AUTHO
3,412,182 UART: RITY.KEYID = 7
3,427,464 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,229 UART: [art] PUB.X = 7523D1796058D993B43649C0F2469981558EA2695445060CCE001404E6DA7BC98B6CC98855CA2ED48631BD8C2F310969
3,434,955 UART: [art] PUB.Y = CDF4BFFEA2DDA09B2199E70FC0AB03D281B032808C30A19DE572A84C9979112D7EFD3C0B653BC5EAC0E2E083FC18FB02
3,441,915 UART: [art] SIG.R = 93E977A6FA45ECD9A86CA265EC362DB36E9CD53DED631C56F5BFD521C79D6AF0EF6BDB8131E870FF78B933071E1C5A13
3,448,702 UART: [art] SIG.S = EC0A832D1CAA6A10197880C476520A3D8918631F63D7D3888078D3928E76B63DA2C5D1349D13A13BD08DC4138FCD5791
3,472,775 UART: Caliptra RT
3,473,120 UART: [state] CFI Enabled
3,580,046 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,934 UART: [rt]cmd =0x50435245, len=56
3,612,201 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,022 ready_for_fw is high
1,363,022 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,097 >>> mbox cmd response: success
2,928,097 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,990,023 UART:
2,990,039 UART: Running Caliptra FMC ...
2,990,447 UART:
2,990,590 UART: [state] CFI Enabled
3,001,083 UART: [fht] FMC Alias Private Key: 7
3,108,496 UART: [art] Extend RT PCRs Done
3,108,924 UART: [art] Lock RT PCRs Done
3,110,328 UART: [art] Populate DV Done
3,118,655 UART: [fht] FMC Alias Private Key: 7
3,119,583 UART: [art] Derive CDI
3,119,863 UART: [art] Store in in slot 0x4
3,205,790 UART: [art] Derive Key Pair
3,206,150 UART: [art] Store priv key in slot 0x5
3,219,672 UART: [art] Derive Key Pair - Done
3,234,585 UART: [art] Signing Cert with AUTHO
3,235,065 UART: RITY.KEYID = 7
3,250,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,992 UART: [art] PUB.X = B6D2BB90C601960840E8621F0E49CED553C679C2F6147E5B833E134D6EC30392144AB1F7B4ACE929F52B5B8D8DE7C5FC
3,257,760 UART: [art] PUB.Y = 50D5C2D967465FFA8C083C94D6D9B77AD9E4DA8C41B1A80FCCCA18645AB1B9BF67D0B2AE25FCCDB872BF9FFE7283D787
3,264,730 UART: [art] SIG.R = FDD4451B72A3A5C002B282B9A3DC86E60D023454F62F92AEC1077B60ACD38D4591B0A5A72A869583D7DABB1F140D2F85
3,271,495 UART: [art] SIG.S = FCC7EF946071629C6E19DA39D5D67A0FE133DB93E4317772EE3065CA398463BCD87E9766B72A7CACE81C1DF4F9B837FB
3,295,181 UART: Caliptra RT
3,295,526 UART: [state] CFI Enabled
3,402,312 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,084 UART: [rt]cmd =0x50435245, len=56
3,434,587 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,215 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
893,094 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,219 UART: [kat] ++
897,371 UART: [kat] sha1
901,735 UART: [kat] SHA2-256
903,675 UART: [kat] SHA2-384
906,174 UART: [kat] SHA2-512-ACC
908,075 UART: [kat] ECC-384
917,716 UART: [kat] HMAC-384Kdf
922,286 UART: [kat] LMS
1,170,614 UART: [kat] --
1,171,413 UART: [cold-reset] ++
1,171,979 UART: [fht] FHT @ 0x50003400
1,174,666 UART: [idev] ++
1,174,834 UART: [idev] CDI.KEYID = 6
1,175,194 UART: [idev] SUBJECT.KEYID = 7
1,175,618 UART: [idev] UDS.KEYID = 0
1,175,963 ready_for_fw is high
1,175,963 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,594 UART: [idev] Erasing UDS.KEYID = 0
1,200,689 UART: [idev] Sha1 KeyId Algorithm
1,209,103 UART: [idev] --
1,210,157 UART: [ldev] ++
1,210,325 UART: [ldev] CDI.KEYID = 6
1,210,688 UART: [ldev] SUBJECT.KEYID = 5
1,211,114 UART: [ldev] AUTHORITY.KEYID = 7
1,211,577 UART: [ldev] FE.KEYID = 1
1,216,919 UART: [ldev] Erasing FE.KEYID = 1
1,243,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,133 UART: [ldev] --
1,283,600 UART: [fwproc] Wait for Commands...
1,284,218 UART: [fwproc] Recv command 0x46574c44
1,284,946 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,308 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,612 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,555 >>> mbox cmd response: success
2,774,555 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,775,649 UART: [afmc] ++
2,775,817 UART: [afmc] CDI.KEYID = 6
2,776,179 UART: [afmc] SUBJECT.KEYID = 7
2,776,604 UART: [afmc] AUTHORITY.KEYID = 5
2,811,179 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,378 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,106 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,991 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,710 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,726 UART: [afmc] --
2,854,702 UART: [cold-reset] --
2,855,516 UART: [state] Locking Datavault
2,856,675 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,279 UART: [state] Locking ICCM
2,857,733 UART: [exit] Launching FMC @ 0x40000130
2,863,062 UART:
2,863,078 UART: Running Caliptra FMC ...
2,863,486 UART:
2,863,540 UART: [state] CFI Enabled
2,873,877 UART: [fht] FMC Alias Private Key: 7
2,981,598 UART: [art] Extend RT PCRs Done
2,982,026 UART: [art] Lock RT PCRs Done
2,983,686 UART: [art] Populate DV Done
2,991,789 UART: [fht] FMC Alias Private Key: 7
2,992,853 UART: [art] Derive CDI
2,993,133 UART: [art] Store in in slot 0x4
3,079,460 UART: [art] Derive Key Pair
3,079,820 UART: [art] Store priv key in slot 0x5
3,093,060 UART: [art] Derive Key Pair - Done
3,107,594 UART: [art] Signing Cert with AUTHO
3,108,074 UART: RITY.KEYID = 7
3,122,790 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,555 UART: [art] PUB.X = 7329732DBB7EADDB6391C5191E7C917455AD1D864B0E830545DFB9F6A5A300781D6553356D3D268CD8C1A5BB91195780
3,130,297 UART: [art] PUB.Y = 1B0ED04C96CCCF37EF6F2F6F19F5CCBE86301E744B6ABF62F092B0DFF4AC2A2C9C334A2F6829A95670C25E4F47CB9B1A
3,137,268 UART: [art] SIG.R = 2D2D77409A3CA1E7CB4B48BC95DCC93F8FCAA7C913EDDA16DA34DE3E530D4883F8727EAC06051B9AFECFCA9CAE9454C9
3,144,059 UART: [art] SIG.S = E0EB5A599E1EC4B28FCF816CC6E8D177F99E604E344FC2703FB8E0CE4A2AEA9AF5229A69E11563FF4697108162B2DD85
3,168,002 UART: Caliptra RT
3,168,255 UART: [state] CFI Enabled
3,276,744 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,504 UART: [rt]cmd =0x50435245, len=56
3,308,891 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,401 ready_for_fw is high
1,060,401 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,378 >>> mbox cmd response: success
2,626,378 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,689,326 UART:
2,689,342 UART: Running Caliptra FMC ...
2,689,750 UART:
2,689,804 UART: [state] CFI Enabled
2,699,999 UART: [fht] FMC Alias Private Key: 7
2,808,002 UART: [art] Extend RT PCRs Done
2,808,430 UART: [art] Lock RT PCRs Done
2,810,092 UART: [art] Populate DV Done
2,818,099 UART: [fht] FMC Alias Private Key: 7
2,819,155 UART: [art] Derive CDI
2,819,435 UART: [art] Store in in slot 0x4
2,905,296 UART: [art] Derive Key Pair
2,905,656 UART: [art] Store priv key in slot 0x5
2,918,068 UART: [art] Derive Key Pair - Done
2,932,750 UART: [art] Signing Cert with AUTHO
2,933,230 UART: RITY.KEYID = 7
2,948,618 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,383 UART: [art] PUB.X = 0009F36C80F2A8CAE3DF260A343155B1CA8CA008FC7DD290284CABFAC39C135A3A2F817A203CB924F32AA7647CCF66BD
2,956,140 UART: [art] PUB.Y = E8E997D3B2D044568F1EA74330359AD92EEEF9F7451D349ACD64F4A60F22CE5C4F96BECA802575DABA9330F5CC2EF97D
2,963,105 UART: [art] SIG.R = D5FDFAC57A044A892D7B4F929863D3DD0D7FEC837B4560EDA5F953818723F8E83106797D9D89E2FA076D7970B019805F
2,969,867 UART: [art] SIG.S = 3E5694A655663A78700D82C2AE1C79A5DE14D4A890E361104C941B9FF53B0EF3427A10F48244F87B9C257254E1FE23E2
2,993,338 UART: Caliptra RT
2,993,591 UART: [state] CFI Enabled
3,101,338 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,312 UART: [rt]cmd =0x50435245, len=56
3,133,717 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [kat] SHA2-256
893,553 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,678 UART: [kat] ++
897,830 UART: [kat] sha1
901,938 UART: [kat] SHA2-256
903,878 UART: [kat] SHA2-384
906,493 UART: [kat] SHA2-512-ACC
908,394 UART: [kat] ECC-384
918,321 UART: [kat] HMAC-384Kdf
922,925 UART: [kat] LMS
1,171,253 UART: [kat] --
1,172,204 UART: [cold-reset] ++
1,172,686 UART: [fht] FHT @ 0x50003400
1,175,357 UART: [idev] ++
1,175,525 UART: [idev] CDI.KEYID = 6
1,175,885 UART: [idev] SUBJECT.KEYID = 7
1,176,309 UART: [idev] UDS.KEYID = 0
1,176,654 ready_for_fw is high
1,176,654 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,231 UART: [idev] Erasing UDS.KEYID = 0
1,201,456 UART: [idev] Sha1 KeyId Algorithm
1,209,992 UART: [idev] --
1,211,086 UART: [ldev] ++
1,211,254 UART: [ldev] CDI.KEYID = 6
1,211,617 UART: [ldev] SUBJECT.KEYID = 5
1,212,043 UART: [ldev] AUTHORITY.KEYID = 7
1,212,506 UART: [ldev] FE.KEYID = 1
1,218,002 UART: [ldev] Erasing FE.KEYID = 1
1,244,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,318 UART: [ldev] --
1,283,811 UART: [fwproc] Wait for Commands...
1,284,469 UART: [fwproc] Recv command 0x46574c44
1,285,197 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,437 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,741 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,626 >>> mbox cmd response: success
2,775,626 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,776,734 UART: [afmc] ++
2,776,902 UART: [afmc] CDI.KEYID = 6
2,777,264 UART: [afmc] SUBJECT.KEYID = 7
2,777,689 UART: [afmc] AUTHORITY.KEYID = 5
2,812,944 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,575 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,323 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,051 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,936 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,655 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,395 UART: [afmc] --
2,856,393 UART: [cold-reset] --
2,857,365 UART: [state] Locking Datavault
2,858,712 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,316 UART: [state] Locking ICCM
2,859,744 UART: [exit] Launching FMC @ 0x40000130
2,865,073 UART:
2,865,089 UART: Running Caliptra FMC ...
2,865,497 UART:
2,865,640 UART: [state] CFI Enabled
2,876,365 UART: [fht] FMC Alias Private Key: 7
2,984,596 UART: [art] Extend RT PCRs Done
2,985,024 UART: [art] Lock RT PCRs Done
2,986,568 UART: [art] Populate DV Done
2,994,599 UART: [fht] FMC Alias Private Key: 7
2,995,725 UART: [art] Derive CDI
2,996,005 UART: [art] Store in in slot 0x4
3,081,914 UART: [art] Derive Key Pair
3,082,274 UART: [art] Store priv key in slot 0x5
3,094,890 UART: [art] Derive Key Pair - Done
3,109,761 UART: [art] Signing Cert with AUTHO
3,110,241 UART: RITY.KEYID = 7
3,125,473 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,238 UART: [art] PUB.X = 53E577D9C4A15E2188FF5D93AB3F899667F57402BB830440A467AB9F66BC2466A1B2DC1B52B02232FEDC5B57A2E89FC4
3,133,010 UART: [art] PUB.Y = A7D4F64DB8DA887876A98269F5CB89A9AC5EE52D5C107247852E371B4217F5ED7CDAF7EC7B2CEC8111FEF832D2F7CFAB
3,139,982 UART: [art] SIG.R = 61212D8691C3EDCBF4368A6A1E88FB2856C11AACA8A553BC84D5E8B67861D27CDB43FF06FFA016402B5D3FD3B349AAA8
3,146,767 UART: [art] SIG.S = 69F2C0EF109166CC9D950BD2A5494A4FE10B56735213D4AC7FA2B46B0D713C4FD11CBB4E23242E1B6F58F1876A108ACA
3,170,619 UART: Caliptra RT
3,170,964 UART: [state] CFI Enabled
3,278,153 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,199 UART: [rt]cmd =0x50435245, len=56
3,310,474 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,326 ready_for_fw is high
1,061,326 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,321 >>> mbox cmd response: success
2,627,321 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,689,127 UART:
2,689,143 UART: Running Caliptra FMC ...
2,689,551 UART:
2,689,694 UART: [state] CFI Enabled
2,700,491 UART: [fht] FMC Alias Private Key: 7
2,808,290 UART: [art] Extend RT PCRs Done
2,808,718 UART: [art] Lock RT PCRs Done
2,810,284 UART: [art] Populate DV Done
2,818,795 UART: [fht] FMC Alias Private Key: 7
2,819,835 UART: [art] Derive CDI
2,820,115 UART: [art] Store in in slot 0x4
2,905,744 UART: [art] Derive Key Pair
2,906,104 UART: [art] Store priv key in slot 0x5
2,919,288 UART: [art] Derive Key Pair - Done
2,933,933 UART: [art] Signing Cert with AUTHO
2,934,413 UART: RITY.KEYID = 7
2,949,677 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,442 UART: [art] PUB.X = 013F8C53769EF2C084BAD3164BCCB7B7D66968AB1FD444229630E6D2905642088AF37061F68332159753B17479561463
2,957,192 UART: [art] PUB.Y = 59BE7B3FC9FF6F9DCBE1C608633FF216F2D9E1908C45086633BFFCE4C8132950C6EEE1FD0501B608949FE7645478B47C
2,964,137 UART: [art] SIG.R = FF0A1C537B86ECBB9ED25EAE13BD1E057FFF0CBE4AD8910D3C911A79C86AA7CB234F3CA2108D630E835BF5661C5D8B69
2,970,916 UART: [art] SIG.S = 9E9206F01A9278FCB5BDE790699338E00394C96466F7E3235543110E2DFD8A6F81F0FD5F31F105B8BB7AB13869A9CB95
2,994,765 UART: Caliptra RT
2,995,110 UART: [state] CFI Enabled
3,103,550 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,684 UART: [rt]cmd =0x50435245, len=56
3,136,177 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,067 UART: [state] WD Timer not started. Device not locked for debugging
87,386 UART: [kat] SHA2-256
890,936 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,065 UART: [kat] ++
895,217 UART: [kat] sha1
899,437 UART: [kat] SHA2-256
901,377 UART: [kat] SHA2-384
904,068 UART: [kat] SHA2-512-ACC
905,969 UART: [kat] ECC-384
915,386 UART: [kat] HMAC-384Kdf
919,892 UART: [kat] LMS
1,168,204 UART: [kat] --
1,169,135 UART: [cold-reset] ++
1,169,481 UART: [fht] FHT @ 0x50003400
1,172,127 UART: [idev] ++
1,172,295 UART: [idev] CDI.KEYID = 6
1,172,656 UART: [idev] SUBJECT.KEYID = 7
1,173,081 UART: [idev] UDS.KEYID = 0
1,173,427 ready_for_fw is high
1,173,427 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,521 UART: [idev] Erasing UDS.KEYID = 0
1,197,567 UART: [idev] Sha1 KeyId Algorithm
1,206,407 UART: [idev] --
1,207,668 UART: [ldev] ++
1,207,836 UART: [ldev] CDI.KEYID = 6
1,208,200 UART: [ldev] SUBJECT.KEYID = 5
1,208,627 UART: [ldev] AUTHORITY.KEYID = 7
1,209,090 UART: [ldev] FE.KEYID = 1
1,214,288 UART: [ldev] Erasing FE.KEYID = 1
1,240,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,906 UART: [ldev] --
1,280,184 UART: [fwproc] Wait for Commands...
1,280,901 UART: [fwproc] Recv command 0x46574c44
1,281,634 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,546 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,070 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,379 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,253 >>> mbox cmd response: success
2,771,253 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,772,454 UART: [afmc] ++
2,772,622 UART: [afmc] CDI.KEYID = 6
2,772,985 UART: [afmc] SUBJECT.KEYID = 7
2,773,411 UART: [afmc] AUTHORITY.KEYID = 5
2,808,916 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,412 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,163 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,892 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,775 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,494 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,169 UART: [afmc] --
2,852,179 UART: [cold-reset] --
2,853,211 UART: [state] Locking Datavault
2,854,400 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,004 UART: [state] Locking ICCM
2,855,614 UART: [exit] Launching FMC @ 0x40000130
2,860,943 UART:
2,860,959 UART: Running Caliptra FMC ...
2,861,367 UART:
2,861,421 UART: [state] CFI Enabled
2,872,182 UART: [fht] FMC Alias Private Key: 7
2,979,615 UART: [art] Extend RT PCRs Done
2,980,043 UART: [art] Lock RT PCRs Done
2,981,505 UART: [art] Populate DV Done
2,989,856 UART: [fht] FMC Alias Private Key: 7
2,990,848 UART: [art] Derive CDI
2,991,128 UART: [art] Store in in slot 0x4
3,076,445 UART: [art] Derive Key Pair
3,076,805 UART: [art] Store priv key in slot 0x5
3,089,715 UART: [art] Derive Key Pair - Done
3,104,494 UART: [art] Signing Cert with AUTHO
3,104,974 UART: RITY.KEYID = 7
3,119,964 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,729 UART: [art] PUB.X = CB8C26FD9E5C82EA2F312C4D24337EFA51D937E1BA7CCC18A34117848E906356B4C109A47C6D4B6DB5016DAAA53E6266
3,127,505 UART: [art] PUB.Y = BC184ED7052AB359CE7F141C02914D9A4E65704D6882C15C182C9EB721DA03CABA9642638BBCC4ACC7FBD8DB7FF7BC10
3,134,466 UART: [art] SIG.R = ED7EFFF1B7A095DD8030685073818CEBFCFDE1238D6728E5D64256344D3D075A600EAF860D57BFFF43D36AE057A74C7B
3,141,241 UART: [art] SIG.S = 66288968D93D2F4FF0F2709C0EB5915711950FC32317532B69D85F1985FA3AE8F7A52F7631A2055D86B5CA74DEBFBE57
3,165,395 UART: Caliptra RT
3,165,648 UART: [state] CFI Enabled
3,273,003 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,765 UART: [rt]cmd =0x50435245, len=56
3,305,240 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,244 ready_for_fw is high
1,056,244 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,325 >>> mbox cmd response: success
2,623,325 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,684,807 UART:
2,684,823 UART: Running Caliptra FMC ...
2,685,231 UART:
2,685,285 UART: [state] CFI Enabled
2,695,526 UART: [fht] FMC Alias Private Key: 7
2,803,485 UART: [art] Extend RT PCRs Done
2,803,913 UART: [art] Lock RT PCRs Done
2,805,621 UART: [art] Populate DV Done
2,813,736 UART: [fht] FMC Alias Private Key: 7
2,814,804 UART: [art] Derive CDI
2,815,084 UART: [art] Store in in slot 0x4
2,900,963 UART: [art] Derive Key Pair
2,901,323 UART: [art] Store priv key in slot 0x5
2,913,931 UART: [art] Derive Key Pair - Done
2,928,749 UART: [art] Signing Cert with AUTHO
2,929,229 UART: RITY.KEYID = 7
2,944,611 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,376 UART: [art] PUB.X = 7D5A1BEBC262F72C874D9A20D91D3671C2EE7B9AA6851F4FED2AB9DE1D94A44F5B732F588CE3EBDBC11F31B9AAE041AF
2,952,174 UART: [art] PUB.Y = BE4AD2A4DB4CD7DF1C979601DB59E0C9529CE2182F133992A5B4F1727D2B8D526B7D6F8D3853F1C302988471AE92E52A
2,959,126 UART: [art] SIG.R = 5A45BE71EAF35198A50CFF891F0CAA6CE09FD69F0AF566D5CAD8B02B9DEA1CB4A627C24976F898962AEA792378FFAF75
2,965,909 UART: [art] SIG.S = D553EDDB265FFEF979398F5171C37966D65FD4F6C6B928D786FC243591BD14D6FCACB0365DAFF03149E44292C79F92AA
2,989,264 UART: Caliptra RT
2,989,517 UART: [state] CFI Enabled
3,097,684 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,556 UART: [rt]cmd =0x50435245, len=56
3,130,171 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
891,287 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
899,710 UART: [kat] SHA2-256
901,650 UART: [kat] SHA2-384
904,175 UART: [kat] SHA2-512-ACC
906,076 UART: [kat] ECC-384
915,817 UART: [kat] HMAC-384Kdf
920,417 UART: [kat] LMS
1,168,729 UART: [kat] --
1,169,706 UART: [cold-reset] ++
1,170,130 UART: [fht] FHT @ 0x50003400
1,172,946 UART: [idev] ++
1,173,114 UART: [idev] CDI.KEYID = 6
1,173,475 UART: [idev] SUBJECT.KEYID = 7
1,173,900 UART: [idev] UDS.KEYID = 0
1,174,246 ready_for_fw is high
1,174,246 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,990 UART: [idev] Erasing UDS.KEYID = 0
1,198,714 UART: [idev] Sha1 KeyId Algorithm
1,207,562 UART: [idev] --
1,208,495 UART: [ldev] ++
1,208,663 UART: [ldev] CDI.KEYID = 6
1,209,027 UART: [ldev] SUBJECT.KEYID = 5
1,209,454 UART: [ldev] AUTHORITY.KEYID = 7
1,209,917 UART: [ldev] FE.KEYID = 1
1,215,213 UART: [ldev] Erasing FE.KEYID = 1
1,242,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,783 UART: [ldev] --
1,281,289 UART: [fwproc] Wait for Commands...
1,282,060 UART: [fwproc] Recv command 0x46574c44
1,282,793 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,549 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,323 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,632 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,442 >>> mbox cmd response: success
2,773,442 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,774,709 UART: [afmc] ++
2,774,877 UART: [afmc] CDI.KEYID = 6
2,775,240 UART: [afmc] SUBJECT.KEYID = 7
2,775,666 UART: [afmc] AUTHORITY.KEYID = 5
2,811,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,638 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,367 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,250 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,969 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,946 UART: [afmc] --
2,855,002 UART: [cold-reset] --
2,855,974 UART: [state] Locking Datavault
2,857,051 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,655 UART: [state] Locking ICCM
2,858,251 UART: [exit] Launching FMC @ 0x40000130
2,863,580 UART:
2,863,596 UART: Running Caliptra FMC ...
2,864,004 UART:
2,864,147 UART: [state] CFI Enabled
2,874,536 UART: [fht] FMC Alias Private Key: 7
2,982,565 UART: [art] Extend RT PCRs Done
2,982,993 UART: [art] Lock RT PCRs Done
2,984,351 UART: [art] Populate DV Done
2,992,554 UART: [fht] FMC Alias Private Key: 7
2,993,532 UART: [art] Derive CDI
2,993,812 UART: [art] Store in in slot 0x4
3,079,647 UART: [art] Derive Key Pair
3,080,007 UART: [art] Store priv key in slot 0x5
3,093,445 UART: [art] Derive Key Pair - Done
3,108,578 UART: [art] Signing Cert with AUTHO
3,109,058 UART: RITY.KEYID = 7
3,124,284 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,049 UART: [art] PUB.X = 4D95674C9395E651F0C692D4C43A00724943DF6CDBD3A1B419FD43EAFC3545F640AD0E649DF3716B94038D7F53F71714
3,131,793 UART: [art] PUB.Y = 59FBCBD6FD7D1AEC4B916B3B0ACFB91B11911EA8130F8A245D9B63265B70E4898DDE4109FEF83F03B95529797AA85CBB
3,138,749 UART: [art] SIG.R = 9093BA39B4DB0B841C8437DBE44311C19F9F0695BBF03F469A1DFD4AFA0ABED34A119BE85D7C24A4D2CA3C8D0E8F8B31
3,145,529 UART: [art] SIG.S = 64990A38ED830F7B1BE2D6BF4289BB2D2FA0485DE85B71434918BCB94B1DFE9025550AE5191971B0DB716385F1159EAF
3,169,363 UART: Caliptra RT
3,169,708 UART: [state] CFI Enabled
3,276,811 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,811 UART: [rt]cmd =0x50435245, len=56
3,309,054 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,961 ready_for_fw is high
1,056,961 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,492 >>> mbox cmd response: success
2,623,492 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,686,094 UART:
2,686,110 UART: Running Caliptra FMC ...
2,686,518 UART:
2,686,661 UART: [state] CFI Enabled
2,697,598 UART: [fht] FMC Alias Private Key: 7
2,805,667 UART: [art] Extend RT PCRs Done
2,806,095 UART: [art] Lock RT PCRs Done
2,807,583 UART: [art] Populate DV Done
2,815,842 UART: [fht] FMC Alias Private Key: 7
2,817,008 UART: [art] Derive CDI
2,817,288 UART: [art] Store in in slot 0x4
2,903,469 UART: [art] Derive Key Pair
2,903,829 UART: [art] Store priv key in slot 0x5
2,916,923 UART: [art] Derive Key Pair - Done
2,931,832 UART: [art] Signing Cert with AUTHO
2,932,312 UART: RITY.KEYID = 7
2,947,334 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,099 UART: [art] PUB.X = D1BB7E9954B26914066B2C961D8655054904AC580A7BFF1678438330355BFF4A7B522786B8BB010996792EAA7EC6ADFC
2,954,851 UART: [art] PUB.Y = 73280AA57CD972B4F0D62FE0BA299C1F5EE64260AFAE271B0B330D47D230247017FC8591601C9ADE9802F3A69EAB5E59
2,961,797 UART: [art] SIG.R = 778B3976DC9C7EDF44B1A21CB1608E7851C2FDD12F3C91422009384B743A5D13CB2D1941C312C4146E4F1F7E1D0DC95E
2,968,567 UART: [art] SIG.S = B72A022281AD1AA593B267CEB9EF21150FA178EBE47EF4EF3B6699CE0DE4F1F7C89746D1EA8C644CB303FA91D712BE4A
2,992,280 UART: Caliptra RT
2,992,625 UART: [state] CFI Enabled
3,100,172 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,820 UART: [rt]cmd =0x50435245, len=56
3,132,195 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,321 UART: [kat] SHA2-256
882,252 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,367 UART: [kat] ++
886,519 UART: [kat] sha1
890,659 UART: [kat] SHA2-256
892,597 UART: [kat] SHA2-384
895,468 UART: [kat] SHA2-512-ACC
897,369 UART: [kat] ECC-384
903,086 UART: [kat] HMAC-384Kdf
907,556 UART: [kat] LMS
1,475,752 UART: [kat] --
1,476,451 UART: [cold-reset] ++
1,476,779 UART: [fht] Storing FHT @ 0x50003400
1,479,494 UART: [idev] ++
1,479,662 UART: [idev] CDI.KEYID = 6
1,480,022 UART: [idev] SUBJECT.KEYID = 7
1,480,446 UART: [idev] UDS.KEYID = 0
1,480,791 ready_for_fw is high
1,480,791 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,420 UART: [idev] Erasing UDS.KEYID = 0
1,504,958 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,502 UART: [idev] --
1,514,703 UART: [ldev] ++
1,514,871 UART: [ldev] CDI.KEYID = 6
1,515,234 UART: [ldev] SUBJECT.KEYID = 5
1,515,660 UART: [ldev] AUTHORITY.KEYID = 7
1,516,123 UART: [ldev] FE.KEYID = 1
1,521,403 UART: [ldev] Erasing FE.KEYID = 1
1,545,924 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,834 UART: [ldev] --
1,585,189 UART: [fwproc] Waiting for Commands...
1,585,914 UART: [fwproc] Received command 0x46574c44
1,586,705 UART: [fwproc] Received Image of size 114332 bytes
2,884,987 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,835 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,187 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,162 >>> mbox cmd response: success
3,078,162 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,079,246 UART: [afmc] ++
3,079,414 UART: [afmc] CDI.KEYID = 6
3,079,776 UART: [afmc] SUBJECT.KEYID = 7
3,080,201 UART: [afmc] AUTHORITY.KEYID = 5
3,114,602 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,044 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,824 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,552 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,437 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,127 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,218 UART: [afmc] --
3,158,260 UART: [cold-reset] --
3,159,194 UART: [state] Locking Datavault
3,160,145 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,749 UART: [state] Locking ICCM
3,161,173 UART: [exit] Launching FMC @ 0x40000130
3,166,502 UART:
3,166,518 UART: Running Caliptra FMC ...
3,166,926 UART:
3,166,980 UART: [state] CFI Enabled
3,177,473 UART: [fht] FMC Alias Private Key: 7
3,285,180 UART: [art] Extend RT PCRs Done
3,285,608 UART: [art] Lock RT PCRs Done
3,286,758 UART: [art] Populate DV Done
3,295,167 UART: [fht] FMC Alias Private Key: 7
3,296,317 UART: [art] Derive CDI
3,296,597 UART: [art] Store in in slot 0x4
3,382,296 UART: [art] Derive Key Pair
3,382,656 UART: [art] Store priv key in slot 0x5
3,394,992 UART: [art] Derive Key Pair - Done
3,409,581 UART: [art] Signing Cert with AUTHO
3,410,061 UART: RITY.KEYID = 7
3,425,383 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,148 UART: [art] PUB.X = 904CF9FBB9CF381C03B69A347F85107C7ABF101D72D0DB0AE3BCA95EBC33EFF3AE0B199231DBE7842CFB5F599810C3DB
3,432,933 UART: [art] PUB.Y = 90EA302B6397BBDC05D4096A1A74FAC5E350F0E38542A85C5E9B1494546E688527AC61324B58CBD11A72BB4A2B780317
3,439,876 UART: [art] SIG.R = 59C998FF3BBC66B756FD3405BDF60461ECA9FF5690025CF1D82A73BE847898E48076B18AFFC043031939E4C1AF8C8B5B
3,446,644 UART: [art] SIG.S = 90755B8782A873D88FA23B430BC9668EF20F101F0DBD85D69E15065C3FDD5769ED99D9D9341E6B0EFB42FDAFA13E1A02
3,471,151 UART: Caliptra RT
3,471,404 UART: [state] CFI Enabled
3,579,713 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,419 UART: [rt]cmd =0x50435251, len=36
3,778,054 >>> mbox cmd response data (1848 bytes)
3,778,055 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,807,634 UART: [rt]cmd =0x50435245, len=56
3,811,246 >>> mbox cmd response data (8 bytes)
3,811,247 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,840,818 UART: [rt]cmd =0x50435251, len=36
4,008,165 >>> mbox cmd response data (1848 bytes)
4,008,166 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,037,907 UART: [rt]cmd =0x50435245, len=56
4,041,729 >>> mbox cmd response data (8 bytes)
4,041,730 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,071,339 UART: [rt]cmd =0x50435251, len=36
4,238,586 >>> mbox cmd response data (1848 bytes)
4,238,587 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,268,358 UART: [rt]cmd =0x50435245, len=56
4,271,692 >>> mbox cmd response data (8 bytes)
4,271,693 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,301,412 UART: [rt]cmd =0x50435251, len=36
4,468,551 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,349 ready_for_fw is high
1,362,349 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,942 >>> mbox cmd response: success
2,926,942 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,987,028 UART:
2,987,044 UART: Running Caliptra FMC ...
2,987,452 UART:
2,987,506 UART: [state] CFI Enabled
2,997,645 UART: [fht] FMC Alias Private Key: 7
3,105,514 UART: [art] Extend RT PCRs Done
3,105,942 UART: [art] Lock RT PCRs Done
3,107,250 UART: [art] Populate DV Done
3,115,403 UART: [fht] FMC Alias Private Key: 7
3,116,501 UART: [art] Derive CDI
3,116,781 UART: [art] Store in in slot 0x4
3,202,254 UART: [art] Derive Key Pair
3,202,614 UART: [art] Store priv key in slot 0x5
3,216,046 UART: [art] Derive Key Pair - Done
3,230,911 UART: [art] Signing Cert with AUTHO
3,231,391 UART: RITY.KEYID = 7
3,246,763 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,528 UART: [art] PUB.X = CB784A9E81CBA89BF28E660CAF333B8A1B24C000C84F5A624C82085D57F3BBF2D3E156B40E5532CA9ADFB9F11BB152A6
3,254,285 UART: [art] PUB.Y = E0EAED7C4DCDD41BCE4295C22718E9ED7D0DF0A41AE27D7E3040821889671CB66133EE84BCA3B63D1A9CC020F81EBE15
3,261,252 UART: [art] SIG.R = 1ED44D780694CC9ABD8290EA54693908150477C290179EA7C8AFA95331A3A629B259A149DFC10198C9CB5B644C285A22
3,268,008 UART: [art] SIG.S = 8AE838C09FB5054FD946365204A92BE1F1F2F91E0051CFEC3F9EC24E7148DCC64C02430CFDF1AAB59E49FA30EF2AEAD5
3,292,161 UART: Caliptra RT
3,292,414 UART: [state] CFI Enabled
3,401,501 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,271 UART: [rt]cmd =0x50435251, len=36
3,599,304 >>> mbox cmd response data (1848 bytes)
3,599,305 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,080 UART: [rt]cmd =0x50435245, len=56
3,632,884 >>> mbox cmd response data (8 bytes)
3,632,885 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,338 UART: [rt]cmd =0x50435251, len=36
3,829,323 >>> mbox cmd response data (1848 bytes)
3,829,324 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,859,129 UART: [rt]cmd =0x50435245, len=56
3,862,717 >>> mbox cmd response data (8 bytes)
3,862,718 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,892,425 UART: [rt]cmd =0x50435251, len=36
4,060,016 >>> mbox cmd response data (1848 bytes)
4,060,017 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,090,018 UART: [rt]cmd =0x50435245, len=56
4,093,538 >>> mbox cmd response data (8 bytes)
4,093,539 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,123,100 UART: [rt]cmd =0x50435251, len=36
4,290,363 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,674 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,160 UART: [kat] SHA2-256
882,091 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,206 UART: [kat] ++
886,358 UART: [kat] sha1
890,726 UART: [kat] SHA2-256
892,664 UART: [kat] SHA2-384
895,489 UART: [kat] SHA2-512-ACC
897,390 UART: [kat] ECC-384
902,867 UART: [kat] HMAC-384Kdf
907,459 UART: [kat] LMS
1,475,655 UART: [kat] --
1,476,628 UART: [cold-reset] ++
1,477,110 UART: [fht] Storing FHT @ 0x50003400
1,479,971 UART: [idev] ++
1,480,139 UART: [idev] CDI.KEYID = 6
1,480,499 UART: [idev] SUBJECT.KEYID = 7
1,480,923 UART: [idev] UDS.KEYID = 0
1,481,268 ready_for_fw is high
1,481,268 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,723 UART: [idev] Erasing UDS.KEYID = 0
1,505,663 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,399 UART: [idev] --
1,515,232 UART: [ldev] ++
1,515,400 UART: [ldev] CDI.KEYID = 6
1,515,763 UART: [ldev] SUBJECT.KEYID = 5
1,516,189 UART: [ldev] AUTHORITY.KEYID = 7
1,516,652 UART: [ldev] FE.KEYID = 1
1,522,084 UART: [ldev] Erasing FE.KEYID = 1
1,547,103 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,439 UART: [ldev] --
1,586,836 UART: [fwproc] Waiting for Commands...
1,587,695 UART: [fwproc] Received command 0x46574c44
1,588,486 UART: [fwproc] Received Image of size 114332 bytes
2,886,010 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,400 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,752 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,629 >>> mbox cmd response: success
3,078,629 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,079,733 UART: [afmc] ++
3,079,901 UART: [afmc] CDI.KEYID = 6
3,080,263 UART: [afmc] SUBJECT.KEYID = 7
3,080,688 UART: [afmc] AUTHORITY.KEYID = 5
3,115,625 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,711 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,491 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,219 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,104 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,794 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,747 UART: [afmc] --
3,158,807 UART: [cold-reset] --
3,159,769 UART: [state] Locking Datavault
3,160,670 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,274 UART: [state] Locking ICCM
3,161,722 UART: [exit] Launching FMC @ 0x40000130
3,167,051 UART:
3,167,067 UART: Running Caliptra FMC ...
3,167,475 UART:
3,167,618 UART: [state] CFI Enabled
3,178,411 UART: [fht] FMC Alias Private Key: 7
3,286,776 UART: [art] Extend RT PCRs Done
3,287,204 UART: [art] Lock RT PCRs Done
3,288,372 UART: [art] Populate DV Done
3,296,611 UART: [fht] FMC Alias Private Key: 7
3,297,595 UART: [art] Derive CDI
3,297,875 UART: [art] Store in in slot 0x4
3,383,564 UART: [art] Derive Key Pair
3,383,924 UART: [art] Store priv key in slot 0x5
3,397,038 UART: [art] Derive Key Pair - Done
3,411,741 UART: [art] Signing Cert with AUTHO
3,412,221 UART: RITY.KEYID = 7
3,427,867 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,632 UART: [art] PUB.X = 1E205174DE2213015B53CD2E436D137184AA7DD25F8D148C164B9083A29D6FDB5A42A7A8DB66BA61C0517F037600CD1F
3,435,378 UART: [art] PUB.Y = D2BE9B28D33F4B4E30A713DF1DA3CCD1DF04D2BB0661B1CAF23FFE167CDAFC0A8CFB8FA824C095E266F718EB3EC4CC7C
3,442,355 UART: [art] SIG.R = 682920481C9AFC6BFBB9F09267F3324C44D245871565547B28622B7D69143968A6DF423FCCD858C8D17C1959CE1FF8E3
3,449,123 UART: [art] SIG.S = A567672BD42879698D7B934C296DBEAC2A591B0FCA46088B07B036D2DB2B27517B9ED6A1F287196DADD7C4DED95BCF2D
3,472,635 UART: Caliptra RT
3,472,980 UART: [state] CFI Enabled
3,580,867 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,445 UART: [rt]cmd =0x50435251, len=36
3,778,762 >>> mbox cmd response data (1848 bytes)
3,778,763 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,808,304 UART: [rt]cmd =0x50435245, len=56
3,812,144 >>> mbox cmd response data (8 bytes)
3,812,145 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,841,642 UART: [rt]cmd =0x50435251, len=36
4,009,133 >>> mbox cmd response data (1848 bytes)
4,009,134 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,038,787 UART: [rt]cmd =0x50435245, len=56
4,042,459 >>> mbox cmd response data (8 bytes)
4,042,460 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,071,837 UART: [rt]cmd =0x50435251, len=36
4,238,850 >>> mbox cmd response data (1848 bytes)
4,238,851 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,268,468 UART: [rt]cmd =0x50435245, len=56
4,272,136 >>> mbox cmd response data (8 bytes)
4,272,137 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,301,878 UART: [rt]cmd =0x50435251, len=36
4,469,163 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,462 ready_for_fw is high
1,362,462 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,429 >>> mbox cmd response: success
2,927,429 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,989,159 UART:
2,989,175 UART: Running Caliptra FMC ...
2,989,583 UART:
2,989,726 UART: [state] CFI Enabled
3,000,333 UART: [fht] FMC Alias Private Key: 7
3,108,094 UART: [art] Extend RT PCRs Done
3,108,522 UART: [art] Lock RT PCRs Done
3,109,844 UART: [art] Populate DV Done
3,117,929 UART: [fht] FMC Alias Private Key: 7
3,119,055 UART: [art] Derive CDI
3,119,335 UART: [art] Store in in slot 0x4
3,205,122 UART: [art] Derive Key Pair
3,205,482 UART: [art] Store priv key in slot 0x5
3,218,966 UART: [art] Derive Key Pair - Done
3,233,653 UART: [art] Signing Cert with AUTHO
3,234,133 UART: RITY.KEYID = 7
3,249,099 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,864 UART: [art] PUB.X = 76E208C5D97D538A7648555C3540D2AA8B2CE9F45700049EED4FA9B85D770A0232EEA523A36017F46A1368B6C12E3E36
3,256,600 UART: [art] PUB.Y = 760EA12A1F0114EDA3EC0E50668864E46CBBA63036E252CB0C21CF468ED9D2BA5E5A74A91A0780F2AF00927FD9431DB1
3,263,525 UART: [art] SIG.R = 980469A7EBA79BF54F3B78B781CD4690BD5A97A5A62462721E6CC0FCD4BCC0E2C824121472C926DBFEEE19B40EC968F8
3,270,303 UART: [art] SIG.S = D59F1F96FE547D074050EDC3DC77BA08C195CB99EA9D55BE34228258E0C9A97B1E97032AAA5C2D39B4B4F7A2AED79596
3,293,773 UART: Caliptra RT
3,294,118 UART: [state] CFI Enabled
3,402,970 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,428 UART: [rt]cmd =0x50435251, len=36
3,600,751 >>> mbox cmd response data (1848 bytes)
3,600,752 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,485 UART: [rt]cmd =0x50435245, len=56
3,633,843 >>> mbox cmd response data (8 bytes)
3,633,844 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,645 UART: [rt]cmd =0x50435251, len=36
3,831,340 >>> mbox cmd response data (1848 bytes)
3,831,341 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,112 UART: [rt]cmd =0x50435245, len=56
3,864,788 >>> mbox cmd response data (8 bytes)
3,864,789 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,266 UART: [rt]cmd =0x50435251, len=36
4,061,797 >>> mbox cmd response data (1848 bytes)
4,061,798 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,091,265 UART: [rt]cmd =0x50435245, len=56
4,094,945 >>> mbox cmd response data (8 bytes)
4,094,946 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,124,791 UART: [rt]cmd =0x50435251, len=36
4,292,348 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,404 UART: [kat] SHA2-256
893,054 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,179 UART: [kat] ++
897,331 UART: [kat] sha1
901,573 UART: [kat] SHA2-256
903,513 UART: [kat] SHA2-384
906,438 UART: [kat] SHA2-512-ACC
908,339 UART: [kat] ECC-384
917,986 UART: [kat] HMAC-384Kdf
922,340 UART: [kat] LMS
1,170,668 UART: [kat] --
1,171,301 UART: [cold-reset] ++
1,171,815 UART: [fht] FHT @ 0x50003400
1,174,386 UART: [idev] ++
1,174,554 UART: [idev] CDI.KEYID = 6
1,174,914 UART: [idev] SUBJECT.KEYID = 7
1,175,338 UART: [idev] UDS.KEYID = 0
1,175,683 ready_for_fw is high
1,175,683 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,536 UART: [idev] Erasing UDS.KEYID = 0
1,200,549 UART: [idev] Sha1 KeyId Algorithm
1,209,099 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,724 UART: [ldev] SUBJECT.KEYID = 5
1,211,150 UART: [ldev] AUTHORITY.KEYID = 7
1,211,613 UART: [ldev] FE.KEYID = 1
1,216,855 UART: [ldev] Erasing FE.KEYID = 1
1,243,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,779 UART: [ldev] --
1,282,154 UART: [fwproc] Wait for Commands...
1,282,782 UART: [fwproc] Recv command 0x46574c44
1,283,510 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,824 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,897 >>> mbox cmd response: success
2,774,897 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,776,059 UART: [afmc] ++
2,776,227 UART: [afmc] CDI.KEYID = 6
2,776,589 UART: [afmc] SUBJECT.KEYID = 7
2,777,014 UART: [afmc] AUTHORITY.KEYID = 5
2,812,365 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,650 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,398 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,126 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,011 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,730 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,530 UART: [afmc] --
2,855,554 UART: [cold-reset] --
2,856,128 UART: [state] Locking Datavault
2,857,021 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,625 UART: [state] Locking ICCM
2,858,045 UART: [exit] Launching FMC @ 0x40000130
2,863,374 UART:
2,863,390 UART: Running Caliptra FMC ...
2,863,798 UART:
2,863,852 UART: [state] CFI Enabled
2,874,433 UART: [fht] FMC Alias Private Key: 7
2,981,956 UART: [art] Extend RT PCRs Done
2,982,384 UART: [art] Lock RT PCRs Done
2,983,994 UART: [art] Populate DV Done
2,992,399 UART: [fht] FMC Alias Private Key: 7
2,993,503 UART: [art] Derive CDI
2,993,783 UART: [art] Store in in slot 0x4
3,079,434 UART: [art] Derive Key Pair
3,079,794 UART: [art] Store priv key in slot 0x5
3,092,280 UART: [art] Derive Key Pair - Done
3,106,809 UART: [art] Signing Cert with AUTHO
3,107,289 UART: RITY.KEYID = 7
3,122,605 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,370 UART: [art] PUB.X = 8F99DB8F20D54077462132771517BD84E3E473FADCE5F5633A9DE3A4F746696CAB403C95B72FAC04A4980106984BF23C
3,130,133 UART: [art] PUB.Y = EA0E74D7215548903C9A47FB1620E8DE3A4DB89574245716E612E2A0808E0BE139B1778BC7FBC51FC2B78F818684FDF1
3,137,081 UART: [art] SIG.R = E9FFF7D1E15825819AD9363E2B8AE9504445699D4127678A61EAB152408D5BC334B2AF2617DC92EA6DE5436EF924DE2F
3,143,857 UART: [art] SIG.S = 5A4EFB855A00556FA8CC24E2A11E213E5DA08822DDEFFCC313353EE95BD1418EDA264418C26974132E9C917DC05BF12B
3,167,796 UART: Caliptra RT
3,168,049 UART: [state] CFI Enabled
3,275,430 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,834 UART: [rt]cmd =0x50435251, len=36
3,473,083 >>> mbox cmd response data (1848 bytes)
3,473,084 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,587 UART: [rt]cmd =0x50435245, len=56
3,506,269 >>> mbox cmd response data (8 bytes)
3,506,270 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,659 UART: [rt]cmd =0x50435251, len=36
3,702,982 >>> mbox cmd response data (1848 bytes)
3,702,983 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,732,902 UART: [rt]cmd =0x50435245, len=56
3,736,414 >>> mbox cmd response data (8 bytes)
3,736,415 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,842 UART: [rt]cmd =0x50435251, len=36
3,933,343 >>> mbox cmd response data (1848 bytes)
3,933,344 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,962,971 UART: [rt]cmd =0x50435245, len=56
3,966,615 >>> mbox cmd response data (8 bytes)
3,966,616 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,996,077 UART: [rt]cmd =0x50435251, len=36
4,163,748 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,583 ready_for_fw is high
1,060,583 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,916 >>> mbox cmd response: success
2,626,916 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,688,790 UART:
2,688,806 UART: Running Caliptra FMC ...
2,689,214 UART:
2,689,268 UART: [state] CFI Enabled
2,699,773 UART: [fht] FMC Alias Private Key: 7
2,807,480 UART: [art] Extend RT PCRs Done
2,807,908 UART: [art] Lock RT PCRs Done
2,809,630 UART: [art] Populate DV Done
2,817,897 UART: [fht] FMC Alias Private Key: 7
2,818,887 UART: [art] Derive CDI
2,819,167 UART: [art] Store in in slot 0x4
2,904,748 UART: [art] Derive Key Pair
2,905,108 UART: [art] Store priv key in slot 0x5
2,918,084 UART: [art] Derive Key Pair - Done
2,932,975 UART: [art] Signing Cert with AUTHO
2,933,455 UART: RITY.KEYID = 7
2,948,549 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,314 UART: [art] PUB.X = 888D063BF8DDA608E7BAC746F3FFDBE574E3901BACF72898AF9FFD17815CBBBF3EAEC892EE3011442A626FD8FABC3816
2,956,104 UART: [art] PUB.Y = 780555C66E0530C46AF9307A42892C606395E59CA50B65B5B71E522707EE811F9A43B202055E0A98D095A2FC89CD19A9
2,963,027 UART: [art] SIG.R = 5ECDD7DE77301B39C820D832EACF73894F9CAFC35A46FDEA1B427F7B418A9BCA3E75AD1D11AAD36EE2EEDAE849EEC0AF
2,969,833 UART: [art] SIG.S = C1072D305015AAB934D9B0A7EB2AC940FCAB4BC5F5F6D34B67DAA0F4AFF1E97E886A8A78F94734128AE85C16C6E41903
2,993,432 UART: Caliptra RT
2,993,685 UART: [state] CFI Enabled
3,102,020 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,984 UART: [rt]cmd =0x50435251, len=36
3,300,433 >>> mbox cmd response data (1848 bytes)
3,300,434 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,137 UART: [rt]cmd =0x50435245, len=56
3,333,847 >>> mbox cmd response data (8 bytes)
3,333,848 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,519 UART: [rt]cmd =0x50435251, len=36
3,530,986 >>> mbox cmd response data (1848 bytes)
3,530,987 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,704 UART: [rt]cmd =0x50435245, len=56
3,564,276 >>> mbox cmd response data (8 bytes)
3,564,277 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,594,000 UART: [rt]cmd =0x50435251, len=36
3,761,267 >>> mbox cmd response data (1848 bytes)
3,761,268 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,873 UART: [rt]cmd =0x50435245, len=56
3,794,419 >>> mbox cmd response data (8 bytes)
3,794,420 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,017 UART: [rt]cmd =0x50435251, len=36
3,991,554 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
893,663 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,788 UART: [kat] ++
897,940 UART: [kat] sha1
902,260 UART: [kat] SHA2-256
904,200 UART: [kat] SHA2-384
907,057 UART: [kat] SHA2-512-ACC
908,958 UART: [kat] ECC-384
918,681 UART: [kat] HMAC-384Kdf
923,381 UART: [kat] LMS
1,171,709 UART: [kat] --
1,172,622 UART: [cold-reset] ++
1,173,018 UART: [fht] FHT @ 0x50003400
1,175,761 UART: [idev] ++
1,175,929 UART: [idev] CDI.KEYID = 6
1,176,289 UART: [idev] SUBJECT.KEYID = 7
1,176,713 UART: [idev] UDS.KEYID = 0
1,177,058 ready_for_fw is high
1,177,058 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,951 UART: [idev] Erasing UDS.KEYID = 0
1,201,560 UART: [idev] Sha1 KeyId Algorithm
1,209,878 UART: [idev] --
1,211,048 UART: [ldev] ++
1,211,216 UART: [ldev] CDI.KEYID = 6
1,211,579 UART: [ldev] SUBJECT.KEYID = 5
1,212,005 UART: [ldev] AUTHORITY.KEYID = 7
1,212,468 UART: [ldev] FE.KEYID = 1
1,217,718 UART: [ldev] Erasing FE.KEYID = 1
1,243,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,680 UART: [ldev] --
1,283,159 UART: [fwproc] Wait for Commands...
1,283,827 UART: [fwproc] Recv command 0x46574c44
1,284,555 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,603 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,907 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,694 >>> mbox cmd response: success
2,773,694 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,774,778 UART: [afmc] ++
2,774,946 UART: [afmc] CDI.KEYID = 6
2,775,308 UART: [afmc] SUBJECT.KEYID = 7
2,775,733 UART: [afmc] AUTHORITY.KEYID = 5
2,811,298 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,661 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,409 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,137 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,022 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,741 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,499 UART: [afmc] --
2,854,479 UART: [cold-reset] --
2,855,095 UART: [state] Locking Datavault
2,856,302 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,906 UART: [state] Locking ICCM
2,857,396 UART: [exit] Launching FMC @ 0x40000130
2,862,725 UART:
2,862,741 UART: Running Caliptra FMC ...
2,863,149 UART:
2,863,292 UART: [state] CFI Enabled
2,873,645 UART: [fht] FMC Alias Private Key: 7
2,981,238 UART: [art] Extend RT PCRs Done
2,981,666 UART: [art] Lock RT PCRs Done
2,983,324 UART: [art] Populate DV Done
2,991,235 UART: [fht] FMC Alias Private Key: 7
2,992,379 UART: [art] Derive CDI
2,992,659 UART: [art] Store in in slot 0x4
3,078,736 UART: [art] Derive Key Pair
3,079,096 UART: [art] Store priv key in slot 0x5
3,092,522 UART: [art] Derive Key Pair - Done
3,107,287 UART: [art] Signing Cert with AUTHO
3,107,767 UART: RITY.KEYID = 7
3,123,197 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,962 UART: [art] PUB.X = 92CFF42336E63873398A8B40E28B532FACF4DF36F530B241C13A6573A3D19309FB12FA64E30F417AE16D4FFC54EE3B13
3,130,734 UART: [art] PUB.Y = 67BC23AD79C52A5A98FDD2B3D703B2C7A40C937DE3D5C063ADFD2303251D0BC6006675E8FB9056C8211BC2C750669699
3,137,656 UART: [art] SIG.R = 08B0EEB8659CEB4A249E0CE1474484FB55D69DF3038CBED67E9E34581D0EB9A7322855DAAE0541C2029F224BD8BA77FF
3,144,422 UART: [art] SIG.S = 75328CA8BF126A25E4FE86F6F1BFF8F801A806C13FC08E455CE52EB6AE5DAC5DB97AA5390C74A5FC4755383262C21521
3,168,288 UART: Caliptra RT
3,168,633 UART: [state] CFI Enabled
3,276,938 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,566 UART: [rt]cmd =0x50435251, len=36
3,475,233 >>> mbox cmd response data (1848 bytes)
3,475,234 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,177 UART: [rt]cmd =0x50435245, len=56
3,508,703 >>> mbox cmd response data (8 bytes)
3,508,704 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,311 UART: [rt]cmd =0x50435251, len=36
3,705,610 >>> mbox cmd response data (1848 bytes)
3,705,611 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,318 UART: [rt]cmd =0x50435245, len=56
3,739,044 >>> mbox cmd response data (8 bytes)
3,739,045 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,736 UART: [rt]cmd =0x50435251, len=36
3,936,281 >>> mbox cmd response data (1848 bytes)
3,936,282 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,965,837 UART: [rt]cmd =0x50435245, len=56
3,969,381 >>> mbox cmd response data (8 bytes)
3,969,382 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,999,119 UART: [rt]cmd =0x50435251, len=36
4,166,478 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,846 ready_for_fw is high
1,060,846 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,583 >>> mbox cmd response: success
2,627,583 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,690,015 UART:
2,690,031 UART: Running Caliptra FMC ...
2,690,439 UART:
2,690,582 UART: [state] CFI Enabled
2,701,443 UART: [fht] FMC Alias Private Key: 7
2,808,826 UART: [art] Extend RT PCRs Done
2,809,254 UART: [art] Lock RT PCRs Done
2,810,782 UART: [art] Populate DV Done
2,818,939 UART: [fht] FMC Alias Private Key: 7
2,819,901 UART: [art] Derive CDI
2,820,181 UART: [art] Store in in slot 0x4
2,906,118 UART: [art] Derive Key Pair
2,906,478 UART: [art] Store priv key in slot 0x5
2,919,540 UART: [art] Derive Key Pair - Done
2,934,290 UART: [art] Signing Cert with AUTHO
2,934,770 UART: RITY.KEYID = 7
2,950,194 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,959 UART: [art] PUB.X = C63E9BF32DDCF4FD2A506B0C788443DFC91A27082685518001C36170EF745606534E0027F08988C49CD79935DF4428E3
2,957,689 UART: [art] PUB.Y = 01B25B0576CA39CE5BE9FC6C2C3E300F6DBD2F5CD08A5AC5F73997D4FE34A57210DEABB8762B857EE064136650764AE9
2,964,644 UART: [art] SIG.R = EC6D8EC0DACA7059BD54B9EB20FD18F706F54D8D51D54103FA39F22F343343EA5D741B9038D6CFE3F4FDCA8CED27C0AE
2,971,434 UART: [art] SIG.S = A4123E563F62CE51935DB313D9D4199E965FCE990783979D118DE9C296ECE16069ECF6BA7E5212AA525170DC1C317DB4
2,995,354 UART: Caliptra RT
2,995,699 UART: [state] CFI Enabled
3,103,677 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,257 UART: [rt]cmd =0x50435251, len=36
3,301,696 >>> mbox cmd response data (1848 bytes)
3,301,697 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,444 UART: [rt]cmd =0x50435245, len=56
3,334,928 >>> mbox cmd response data (8 bytes)
3,334,929 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,510 UART: [rt]cmd =0x50435251, len=36
3,532,119 >>> mbox cmd response data (1848 bytes)
3,532,120 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,695 UART: [rt]cmd =0x50435245, len=56
3,565,261 >>> mbox cmd response data (8 bytes)
3,565,262 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,594,857 UART: [rt]cmd =0x50435251, len=36
3,762,088 >>> mbox cmd response data (1848 bytes)
3,762,089 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,791,610 UART: [rt]cmd =0x50435245, len=56
3,795,220 >>> mbox cmd response data (8 bytes)
3,795,221 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,618 UART: [rt]cmd =0x50435251, len=36
3,992,099 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Unprovisioned
86,023 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,982 UART: [kat] SHA2-256
891,532 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,661 UART: [kat] ++
895,813 UART: [kat] sha1
899,963 UART: [kat] SHA2-256
901,903 UART: [kat] SHA2-384
904,734 UART: [kat] SHA2-512-ACC
906,635 UART: [kat] ECC-384
916,574 UART: [kat] HMAC-384Kdf
921,160 UART: [kat] LMS
1,169,472 UART: [kat] --
1,170,547 UART: [cold-reset] ++
1,170,929 UART: [fht] FHT @ 0x50003400
1,173,603 UART: [idev] ++
1,173,771 UART: [idev] CDI.KEYID = 6
1,174,132 UART: [idev] SUBJECT.KEYID = 7
1,174,557 UART: [idev] UDS.KEYID = 0
1,174,903 ready_for_fw is high
1,174,903 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,505 UART: [idev] Erasing UDS.KEYID = 0
1,199,815 UART: [idev] Sha1 KeyId Algorithm
1,208,715 UART: [idev] --
1,209,740 UART: [ldev] ++
1,209,908 UART: [ldev] CDI.KEYID = 6
1,210,272 UART: [ldev] SUBJECT.KEYID = 5
1,210,699 UART: [ldev] AUTHORITY.KEYID = 7
1,211,162 UART: [ldev] FE.KEYID = 1
1,216,344 UART: [ldev] Erasing FE.KEYID = 1
1,242,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,346 UART: [ldev] --
1,281,784 UART: [fwproc] Wait for Commands...
1,282,457 UART: [fwproc] Recv command 0x46574c44
1,283,190 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,534 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,843 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,599 >>> mbox cmd response: success
2,771,599 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,772,804 UART: [afmc] ++
2,772,972 UART: [afmc] CDI.KEYID = 6
2,773,335 UART: [afmc] SUBJECT.KEYID = 7
2,773,761 UART: [afmc] AUTHORITY.KEYID = 5
2,810,170 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,878 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,629 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,358 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,241 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,960 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,841 UART: [afmc] --
2,853,745 UART: [cold-reset] --
2,854,441 UART: [state] Locking Datavault
2,855,594 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,198 UART: [state] Locking ICCM
2,856,850 UART: [exit] Launching FMC @ 0x40000130
2,862,179 UART:
2,862,195 UART: Running Caliptra FMC ...
2,862,603 UART:
2,862,657 UART: [state] CFI Enabled
2,872,752 UART: [fht] FMC Alias Private Key: 7
2,980,351 UART: [art] Extend RT PCRs Done
2,980,779 UART: [art] Lock RT PCRs Done
2,982,375 UART: [art] Populate DV Done
2,990,362 UART: [fht] FMC Alias Private Key: 7
2,991,396 UART: [art] Derive CDI
2,991,676 UART: [art] Store in in slot 0x4
3,077,663 UART: [art] Derive Key Pair
3,078,023 UART: [art] Store priv key in slot 0x5
3,091,697 UART: [art] Derive Key Pair - Done
3,106,259 UART: [art] Signing Cert with AUTHO
3,106,739 UART: RITY.KEYID = 7
3,121,717 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,482 UART: [art] PUB.X = DBBDF53464CD4904370DBFDF2BBB01140494E90D75A985D416A39CBB18B54A90052B75F8256AF0EE5DC6F2F422B1EA31
3,129,248 UART: [art] PUB.Y = ECF346C7FA540D845447ED6CD9B2146186484FD3A3A40A7D9C4FF07B45E2FDAC81976FE5B2DBE1254338845C53C19C92
3,136,202 UART: [art] SIG.R = BFCD2B01F7D773DACCA3B6118F0B39ED51C3CE9869A1383DCBBBAB6B840AFFC417B611F0F2CC8A503097413C7281DE69
3,142,985 UART: [art] SIG.S = FA736FF37613F4DB85A91C5E477B1C4772393C135D1DFE3C2652BD56458072D117FDCC2396D6ABC3F6AD6525952DD6C2
3,166,734 UART: Caliptra RT
3,166,987 UART: [state] CFI Enabled
3,274,863 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,811 UART: [rt]cmd =0x50435251, len=36
3,473,114 >>> mbox cmd response data (1848 bytes)
3,473,115 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,770 UART: [rt]cmd =0x50435245, len=56
3,506,534 >>> mbox cmd response data (8 bytes)
3,506,535 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,348 UART: [rt]cmd =0x50435251, len=36
3,703,607 >>> mbox cmd response data (1848 bytes)
3,703,608 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,733,347 UART: [rt]cmd =0x50435245, len=56
3,737,207 >>> mbox cmd response data (8 bytes)
3,737,208 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,793 UART: [rt]cmd =0x50435251, len=36
3,934,012 >>> mbox cmd response data (1848 bytes)
3,934,013 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,802 UART: [rt]cmd =0x50435245, len=56
3,967,518 >>> mbox cmd response data (8 bytes)
3,967,519 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,997,066 UART: [rt]cmd =0x50435251, len=36
4,164,329 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,482 ready_for_fw is high
1,056,482 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,765 >>> mbox cmd response: success
2,621,765 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,684,411 UART:
2,684,427 UART: Running Caliptra FMC ...
2,684,835 UART:
2,684,889 UART: [state] CFI Enabled
2,695,602 UART: [fht] FMC Alias Private Key: 7
2,803,063 UART: [art] Extend RT PCRs Done
2,803,491 UART: [art] Lock RT PCRs Done
2,805,203 UART: [art] Populate DV Done
2,813,428 UART: [fht] FMC Alias Private Key: 7
2,814,440 UART: [art] Derive CDI
2,814,720 UART: [art] Store in in slot 0x4
2,900,611 UART: [art] Derive Key Pair
2,900,971 UART: [art] Store priv key in slot 0x5
2,914,181 UART: [art] Derive Key Pair - Done
2,928,750 UART: [art] Signing Cert with AUTHO
2,929,230 UART: RITY.KEYID = 7
2,944,884 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,649 UART: [art] PUB.X = 61D64C58BD76EB4D58A7352111FE93F10CD30E92AFB807FA37CDBED2887BE123EB77FBEF60AC3B54E7A60D901371BE14
2,952,425 UART: [art] PUB.Y = D5BB4A4AF638C20877BFCF434E9B2C324660713509650EB842C7FE18D9BBCA63A9156C34039B1B74BC556605C8DC6A60
2,959,366 UART: [art] SIG.R = 2E84E3C2571A083832F8459FC7A4175421CF3D87509575B7AA30E4F31DDB1742234ECA93444BB21DB0917B369ED60680
2,966,126 UART: [art] SIG.S = DDB888371240ECA71107B2E8361C5C793AA3A6D979F22C0EF426F7DDAC4B1AB9B232B765330101020926D970DAAE094F
2,989,168 UART: Caliptra RT
2,989,421 UART: [state] CFI Enabled
3,097,924 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,668 UART: [rt]cmd =0x50435251, len=36
3,296,005 >>> mbox cmd response data (1848 bytes)
3,296,006 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,573 UART: [rt]cmd =0x50435245, len=56
3,329,299 >>> mbox cmd response data (8 bytes)
3,329,300 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,671 UART: [rt]cmd =0x50435251, len=36
3,526,144 >>> mbox cmd response data (1848 bytes)
3,526,145 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,555,628 UART: [rt]cmd =0x50435245, len=56
3,559,124 >>> mbox cmd response data (8 bytes)
3,559,125 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,426 UART: [rt]cmd =0x50435251, len=36
3,755,779 >>> mbox cmd response data (1848 bytes)
3,755,780 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,785,251 UART: [rt]cmd =0x50435245, len=56
3,788,817 >>> mbox cmd response data (8 bytes)
3,788,818 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,818,391 UART: [rt]cmd =0x50435251, len=36
3,985,534 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,301 UART: [kat] SHA2-256
891,851 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,980 UART: [kat] ++
896,132 UART: [kat] sha1
900,264 UART: [kat] SHA2-256
902,204 UART: [kat] SHA2-384
905,081 UART: [kat] SHA2-512-ACC
906,982 UART: [kat] ECC-384
916,403 UART: [kat] HMAC-384Kdf
921,009 UART: [kat] LMS
1,169,321 UART: [kat] --
1,169,998 UART: [cold-reset] ++
1,170,402 UART: [fht] FHT @ 0x50003400
1,173,050 UART: [idev] ++
1,173,218 UART: [idev] CDI.KEYID = 6
1,173,579 UART: [idev] SUBJECT.KEYID = 7
1,174,004 UART: [idev] UDS.KEYID = 0
1,174,350 ready_for_fw is high
1,174,350 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,212 UART: [idev] Erasing UDS.KEYID = 0
1,199,504 UART: [idev] Sha1 KeyId Algorithm
1,208,542 UART: [idev] --
1,209,597 UART: [ldev] ++
1,209,765 UART: [ldev] CDI.KEYID = 6
1,210,129 UART: [ldev] SUBJECT.KEYID = 5
1,210,556 UART: [ldev] AUTHORITY.KEYID = 7
1,211,019 UART: [ldev] FE.KEYID = 1
1,216,071 UART: [ldev] Erasing FE.KEYID = 1
1,242,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,037 UART: [ldev] --
1,282,539 UART: [fwproc] Wait for Commands...
1,283,210 UART: [fwproc] Recv command 0x46574c44
1,283,943 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,417 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,726 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,614 >>> mbox cmd response: success
2,774,614 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,775,747 UART: [afmc] ++
2,775,915 UART: [afmc] CDI.KEYID = 6
2,776,278 UART: [afmc] SUBJECT.KEYID = 7
2,776,704 UART: [afmc] AUTHORITY.KEYID = 5
2,812,363 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,183 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,934 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,663 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,546 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,265 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,950 UART: [afmc] --
2,856,010 UART: [cold-reset] --
2,856,896 UART: [state] Locking Datavault
2,858,215 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,819 UART: [state] Locking ICCM
2,859,393 UART: [exit] Launching FMC @ 0x40000130
2,864,722 UART:
2,864,738 UART: Running Caliptra FMC ...
2,865,146 UART:
2,865,289 UART: [state] CFI Enabled
2,875,698 UART: [fht] FMC Alias Private Key: 7
2,983,369 UART: [art] Extend RT PCRs Done
2,983,797 UART: [art] Lock RT PCRs Done
2,985,275 UART: [art] Populate DV Done
2,993,434 UART: [fht] FMC Alias Private Key: 7
2,994,578 UART: [art] Derive CDI
2,994,858 UART: [art] Store in in slot 0x4
3,080,559 UART: [art] Derive Key Pair
3,080,919 UART: [art] Store priv key in slot 0x5
3,093,949 UART: [art] Derive Key Pair - Done
3,108,635 UART: [art] Signing Cert with AUTHO
3,109,115 UART: RITY.KEYID = 7
3,124,381 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,146 UART: [art] PUB.X = CCF32ABC98C47EC19D482A5EE188A14F5F0E19FCE2FF5E25C795E3B4EDF0FB0C43C3BAD8F091F6F44B619E2225B68D22
3,131,934 UART: [art] PUB.Y = 1F974808B1846EDA8C418AE62C4492B2B99759D3F29585BEFCD1C284FA487D6F4DB2AE99410A4EFE8494F6CD38E03496
3,138,886 UART: [art] SIG.R = 62CEFAEBF4341D8083A5E7BBC79C2A5858869FF8E73F6DEAE8E695F71084032D00B5043287605E84EE7A3D358831AF27
3,145,634 UART: [art] SIG.S = EE966FFA241166D2FED9BF741E1A8F45AA9862838882EB0DDE9164D3F090487371BC9AD6520681E1E962A6AA830FC29F
3,168,938 UART: Caliptra RT
3,169,283 UART: [state] CFI Enabled
3,278,296 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,948 UART: [rt]cmd =0x50435251, len=36
3,476,457 >>> mbox cmd response data (1848 bytes)
3,476,458 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,227 UART: [rt]cmd =0x50435245, len=56
3,509,579 >>> mbox cmd response data (8 bytes)
3,509,580 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,143 UART: [rt]cmd =0x50435251, len=36
3,706,520 >>> mbox cmd response data (1848 bytes)
3,706,521 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,012 UART: [rt]cmd =0x50435245, len=56
3,739,578 >>> mbox cmd response data (8 bytes)
3,739,579 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,198 UART: [rt]cmd =0x50435251, len=36
3,936,315 >>> mbox cmd response data (1848 bytes)
3,936,316 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,965,955 UART: [rt]cmd =0x50435245, len=56
3,969,581 >>> mbox cmd response data (8 bytes)
3,969,582 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,999,387 UART: [rt]cmd =0x50435251, len=36
4,166,508 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,573 ready_for_fw is high
1,056,573 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,826 >>> mbox cmd response: success
2,623,826 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,685,440 UART:
2,685,456 UART: Running Caliptra FMC ...
2,685,864 UART:
2,686,007 UART: [state] CFI Enabled
2,696,580 UART: [fht] FMC Alias Private Key: 7
2,804,211 UART: [art] Extend RT PCRs Done
2,804,639 UART: [art] Lock RT PCRs Done
2,806,345 UART: [art] Populate DV Done
2,814,500 UART: [fht] FMC Alias Private Key: 7
2,815,566 UART: [art] Derive CDI
2,815,846 UART: [art] Store in in slot 0x4
2,901,721 UART: [art] Derive Key Pair
2,902,081 UART: [art] Store priv key in slot 0x5
2,915,311 UART: [art] Derive Key Pair - Done
2,930,165 UART: [art] Signing Cert with AUTHO
2,930,645 UART: RITY.KEYID = 7
2,946,091 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,856 UART: [art] PUB.X = B3E4258F57758EC69A5887D78681F5CD8F079C96710E8FCAC6C22971F64C3DEAAA23BB621E5A9EC9E1EEA37657DA8004
2,953,629 UART: [art] PUB.Y = CC0BA88CA24F629ADE84F3EC3A058BA586E4F6BAFFF8D561B4FB61DE0FCE89DD142B8A3BCACF17621A0BEAC157A46470
2,960,599 UART: [art] SIG.R = 44E76C2A2C99AEC00232068FC0018604CB7BA3691A95D3F7D565DFAA94DA5CD168450F457C97E0A1A21E38B7478710E9
2,967,358 UART: [art] SIG.S = DFABCE8F38F698FE707D83A47E6C24977177F8B197716A9BDC3838B834142C0C8785C49D7841F5A8E9411A6820208899
2,991,366 UART: Caliptra RT
2,991,711 UART: [state] CFI Enabled
3,098,860 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,448 UART: [rt]cmd =0x50435251, len=36
3,296,789 >>> mbox cmd response data (1848 bytes)
3,296,790 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,461 UART: [rt]cmd =0x50435245, len=56
3,329,941 >>> mbox cmd response data (8 bytes)
3,329,942 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,349 UART: [rt]cmd =0x50435251, len=36
3,526,388 >>> mbox cmd response data (1848 bytes)
3,526,389 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,556,074 UART: [rt]cmd =0x50435245, len=56
3,559,572 >>> mbox cmd response data (8 bytes)
3,559,573 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,589,114 UART: [rt]cmd =0x50435251, len=36
3,756,641 >>> mbox cmd response data (1848 bytes)
3,756,642 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,786,599 UART: [rt]cmd =0x50435245, len=56
3,789,955 >>> mbox cmd response data (8 bytes)
3,789,956 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,819,699 UART: [rt]cmd =0x50435251, len=36
3,987,470 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,890 UART: [state] LifecycleState = Unprovisioned
85,545 UART: [state] DebugLocked = No
86,181 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,905 UART: [kat] SHA2-256
881,836 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,951 UART: [kat] ++
886,103 UART: [kat] sha1
890,267 UART: [kat] SHA2-256
892,205 UART: [kat] SHA2-384
894,970 UART: [kat] SHA2-512-ACC
896,871 UART: [kat] ECC-384
902,326 UART: [kat] HMAC-384Kdf
907,008 UART: [kat] LMS
1,475,204 UART: [kat] --
1,476,425 UART: [cold-reset] ++
1,476,981 UART: [fht] Storing FHT @ 0x50003400
1,479,646 UART: [idev] ++
1,479,814 UART: [idev] CDI.KEYID = 6
1,480,174 UART: [idev] SUBJECT.KEYID = 7
1,480,598 UART: [idev] UDS.KEYID = 0
1,480,943 ready_for_fw is high
1,480,943 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,396 UART: [idev] Erasing UDS.KEYID = 0
1,504,944 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,664 UART: [idev] --
1,514,817 UART: [ldev] ++
1,514,985 UART: [ldev] CDI.KEYID = 6
1,515,348 UART: [ldev] SUBJECT.KEYID = 5
1,515,774 UART: [ldev] AUTHORITY.KEYID = 7
1,516,237 UART: [ldev] FE.KEYID = 1
1,521,555 UART: [ldev] Erasing FE.KEYID = 1
1,546,398 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,466 UART: [ldev] --
1,585,813 UART: [fwproc] Waiting for Commands...
1,586,566 UART: [fwproc] Received command 0x46574c44
1,587,357 UART: [fwproc] Received Image of size 114332 bytes
2,883,793 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,855 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,207 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,118 >>> mbox cmd response: success
3,076,118 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,077,234 UART: [afmc] ++
3,077,402 UART: [afmc] CDI.KEYID = 6
3,077,764 UART: [afmc] SUBJECT.KEYID = 7
3,078,189 UART: [afmc] AUTHORITY.KEYID = 5
3,113,530 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,906 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,686 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,414 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,299 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,989 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,958 UART: [afmc] --
3,156,870 UART: [cold-reset] --
3,157,668 UART: [state] Locking Datavault
3,158,853 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,457 UART: [state] Locking ICCM
3,159,979 UART: [exit] Launching FMC @ 0x40000130
3,165,308 UART:
3,165,324 UART: Running Caliptra FMC ...
3,165,732 UART:
3,165,786 UART: [state] CFI Enabled
3,176,437 UART: [fht] FMC Alias Private Key: 7
3,284,048 UART: [art] Extend RT PCRs Done
3,284,476 UART: [art] Lock RT PCRs Done
3,285,972 UART: [art] Populate DV Done
3,294,145 UART: [fht] FMC Alias Private Key: 7
3,295,267 UART: [art] Derive CDI
3,295,547 UART: [art] Store in in slot 0x4
3,380,610 UART: [art] Derive Key Pair
3,380,970 UART: [art] Store priv key in slot 0x5
3,394,316 UART: [art] Derive Key Pair - Done
3,409,200 UART: [art] Signing Cert with AUTHO
3,409,680 UART: RITY.KEYID = 7
3,424,378 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,143 UART: [art] PUB.X = B2ABD9AD8CEC7CED92E0343C87C790D2289EC23353CC6D494465E56AC3D3F5ACE10C8681E52D0D7F2DF1C6E50C98EB9F
3,431,926 UART: [art] PUB.Y = 2CEEE21431D5422963648E7758DF11F746C1CCCDB77DB563E63677C4E38D5047A503B320FC131E24ACBF78C77DA15BA3
3,438,881 UART: [art] SIG.R = 13A7B939DBBCBF4385A04FAD2ADBFFB434241E8C25FD9E362F50CACF7B6E1656B128CAFF1EF958800FB2613362B68FA5
3,445,670 UART: [art] SIG.S = D3CBEB4CC5E22779D4275803A3AD9D8F999A35447C0344D7BB28D82FFCB4794D3DB61EEBE58A544CDB3B505FEC322FC3
3,469,793 UART: Caliptra RT
3,470,046 UART: [state] CFI Enabled
3,577,729 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,517 UART: [rt]cmd =0x50435245, len=56
3,609,762 >>> mbox cmd response: failed
3,609,762 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,710 UART: [rt]cmd =0x50435245, len=56
3,640,973 >>> mbox cmd response: failed
3,640,973 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,670,827 UART: [rt]cmd =0x50435245, len=56
3,672,296 >>> mbox cmd response: failed
3,672,296 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,040 UART: [rt]cmd =0x50435245, len=56
3,703,441 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,381 ready_for_fw is high
1,362,381 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,760 >>> mbox cmd response: success
2,927,760 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,989,302 UART:
2,989,318 UART: Running Caliptra FMC ...
2,989,726 UART:
2,989,780 UART: [state] CFI Enabled
3,000,271 UART: [fht] FMC Alias Private Key: 7
3,108,268 UART: [art] Extend RT PCRs Done
3,108,696 UART: [art] Lock RT PCRs Done
3,110,444 UART: [art] Populate DV Done
3,118,745 UART: [fht] FMC Alias Private Key: 7
3,119,829 UART: [art] Derive CDI
3,120,109 UART: [art] Store in in slot 0x4
3,205,382 UART: [art] Derive Key Pair
3,205,742 UART: [art] Store priv key in slot 0x5
3,219,152 UART: [art] Derive Key Pair - Done
3,233,780 UART: [art] Signing Cert with AUTHO
3,234,260 UART: RITY.KEYID = 7
3,249,458 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,223 UART: [art] PUB.X = 9DAA1C1498E43FF305A54241EA4EA596AE904680527C021E5B19F0DFAE06BB4BBF2D72636CE739B9DB1A185247E7D017
3,256,994 UART: [art] PUB.Y = 88FB42E539D32856CDFA808725AF3C6EBE7A420545B331CD8EDA6AF8122F7159F3806B015DDC7EB6BAD70AB02834D13D
3,263,949 UART: [art] SIG.R = 288223A33A3B56488E930519C5C9AA7AC3083C352E6D00E37FAB8D6A47187ECC482BD6CE80A1CA56C8747D0AE2FAFAB7
3,270,702 UART: [art] SIG.S = 61C6CAC233910E1899361BC39E9C35F191BA590452AC71AAD981D109A9B20C8EC9856C9B43AA0A9DABBE85B59F839F2C
3,294,252 UART: Caliptra RT
3,294,505 UART: [state] CFI Enabled
3,402,231 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,861 UART: [rt]cmd =0x50435245, len=56
3,434,060 >>> mbox cmd response: failed
3,434,060 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,463,840 UART: [rt]cmd =0x50435245, len=56
3,465,289 >>> mbox cmd response: failed
3,465,289 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,495,053 UART: [rt]cmd =0x50435245, len=56
3,496,474 >>> mbox cmd response: failed
3,496,474 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,022 UART: [rt]cmd =0x50435245, len=56
3,527,583 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,178 UART: [kat] SHA2-256
882,109 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,224 UART: [kat] ++
886,376 UART: [kat] sha1
890,698 UART: [kat] SHA2-256
892,636 UART: [kat] SHA2-384
895,421 UART: [kat] SHA2-512-ACC
897,322 UART: [kat] ECC-384
902,987 UART: [kat] HMAC-384Kdf
907,683 UART: [kat] LMS
1,475,879 UART: [kat] --
1,476,748 UART: [cold-reset] ++
1,477,082 UART: [fht] Storing FHT @ 0x50003400
1,479,801 UART: [idev] ++
1,479,969 UART: [idev] CDI.KEYID = 6
1,480,329 UART: [idev] SUBJECT.KEYID = 7
1,480,753 UART: [idev] UDS.KEYID = 0
1,481,098 ready_for_fw is high
1,481,098 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,811 UART: [idev] Erasing UDS.KEYID = 0
1,505,565 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,033 UART: [idev] --
1,515,054 UART: [ldev] ++
1,515,222 UART: [ldev] CDI.KEYID = 6
1,515,585 UART: [ldev] SUBJECT.KEYID = 5
1,516,011 UART: [ldev] AUTHORITY.KEYID = 7
1,516,474 UART: [ldev] FE.KEYID = 1
1,521,888 UART: [ldev] Erasing FE.KEYID = 1
1,547,349 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,289 UART: [ldev] --
1,586,668 UART: [fwproc] Waiting for Commands...
1,587,505 UART: [fwproc] Received command 0x46574c44
1,588,296 UART: [fwproc] Received Image of size 114332 bytes
2,886,064 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,834 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,186 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,135 >>> mbox cmd response: success
3,078,135 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,079,189 UART: [afmc] ++
3,079,357 UART: [afmc] CDI.KEYID = 6
3,079,719 UART: [afmc] SUBJECT.KEYID = 7
3,080,144 UART: [afmc] AUTHORITY.KEYID = 5
3,115,157 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,193 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,973 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,701 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,586 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,276 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,021 UART: [afmc] --
3,158,065 UART: [cold-reset] --
3,159,119 UART: [state] Locking Datavault
3,160,346 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,950 UART: [state] Locking ICCM
3,161,446 UART: [exit] Launching FMC @ 0x40000130
3,166,775 UART:
3,166,791 UART: Running Caliptra FMC ...
3,167,199 UART:
3,167,342 UART: [state] CFI Enabled
3,177,967 UART: [fht] FMC Alias Private Key: 7
3,286,368 UART: [art] Extend RT PCRs Done
3,286,796 UART: [art] Lock RT PCRs Done
3,287,850 UART: [art] Populate DV Done
3,296,211 UART: [fht] FMC Alias Private Key: 7
3,297,263 UART: [art] Derive CDI
3,297,543 UART: [art] Store in in slot 0x4
3,383,570 UART: [art] Derive Key Pair
3,383,930 UART: [art] Store priv key in slot 0x5
3,398,142 UART: [art] Derive Key Pair - Done
3,413,096 UART: [art] Signing Cert with AUTHO
3,413,576 UART: RITY.KEYID = 7
3,428,698 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,463 UART: [art] PUB.X = FB49C9DCE57A32F93B97F9210227A87E882E3A57AB88D3E487CEF5F63C8C8DBBF77D8D09302D7A4C12ED4956B60A053F
3,436,235 UART: [art] PUB.Y = 62D2414E3BCB56B2A78377D757AE77141A8DFE45877277EEA3E04FA47811C5FA4D704D52079E78008F2620340ACB08BB
3,443,156 UART: [art] SIG.R = 56E9014439B503CAB2CEC002C2FA47F1C249969DE7E42AD811DDAF14E3496959F7F997CC9B2F66D80DC0B5505DB620A9
3,449,924 UART: [art] SIG.S = 00C40DFD72B40CE8F2B94052B9ED1D103374F6F67667034504FAB671D722B16F4E015309B43BAD4DDDE18896805F337E
3,474,093 UART: Caliptra RT
3,474,438 UART: [state] CFI Enabled
3,582,805 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,675 UART: [rt]cmd =0x50435245, len=56
3,615,210 >>> mbox cmd response: failed
3,615,210 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,964 UART: [rt]cmd =0x50435245, len=56
3,646,527 >>> mbox cmd response: failed
3,646,527 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,676,043 UART: [rt]cmd =0x50435245, len=56
3,677,288 >>> mbox cmd response: failed
3,677,288 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,068 UART: [rt]cmd =0x50435245, len=56
3,708,357 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,914 ready_for_fw is high
1,362,914 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,235 >>> mbox cmd response: success
2,928,235 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,990,401 UART:
2,990,417 UART: Running Caliptra FMC ...
2,990,825 UART:
2,990,968 UART: [state] CFI Enabled
3,001,831 UART: [fht] FMC Alias Private Key: 7
3,109,110 UART: [art] Extend RT PCRs Done
3,109,538 UART: [art] Lock RT PCRs Done
3,111,244 UART: [art] Populate DV Done
3,119,343 UART: [fht] FMC Alias Private Key: 7
3,120,381 UART: [art] Derive CDI
3,120,661 UART: [art] Store in in slot 0x4
3,206,854 UART: [art] Derive Key Pair
3,207,214 UART: [art] Store priv key in slot 0x5
3,219,928 UART: [art] Derive Key Pair - Done
3,234,720 UART: [art] Signing Cert with AUTHO
3,235,200 UART: RITY.KEYID = 7
3,250,668 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,433 UART: [art] PUB.X = 3B9FD319F4DC19CA0CD2F6E3385D71AA0AB4FBD14E2C899BA06CA567F2314003D3B3BFF59B900CD573298852C3BE9019
3,258,205 UART: [art] PUB.Y = 05B702CB8814417F4F8AADEF7AEEDBD59658DE9C30C2738E3F54354A7F48AB6636057936649E2A62B6397613ED4470D7
3,265,148 UART: [art] SIG.R = 2D3E2D3B392D15B3F013118E893549EE30E2CDFBF6B0233672FCF29FDD3A53B6633557D2B8EBAD98AC614FBE12730F00
3,271,905 UART: [art] SIG.S = F6C10CA1B6EE341177D977E0687B4D1199C23FD4DBDA6CFCE0DE0801FA3A9B284FFECAD7445363A0B080026116A97B09
3,295,467 UART: Caliptra RT
3,295,812 UART: [state] CFI Enabled
3,403,949 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,647 UART: [rt]cmd =0x50435245, len=56
3,436,158 >>> mbox cmd response: failed
3,436,158 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,794 UART: [rt]cmd =0x50435245, len=56
3,467,091 >>> mbox cmd response: failed
3,467,091 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,496,863 UART: [rt]cmd =0x50435245, len=56
3,498,234 >>> mbox cmd response: failed
3,498,234 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,836 UART: [rt]cmd =0x50435245, len=56
3,529,331 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
893,344 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,469 UART: [kat] ++
897,621 UART: [kat] sha1
901,967 UART: [kat] SHA2-256
903,907 UART: [kat] SHA2-384
906,680 UART: [kat] SHA2-512-ACC
908,581 UART: [kat] ECC-384
918,474 UART: [kat] HMAC-384Kdf
923,098 UART: [kat] LMS
1,171,426 UART: [kat] --
1,172,447 UART: [cold-reset] ++
1,172,801 UART: [fht] FHT @ 0x50003400
1,175,610 UART: [idev] ++
1,175,778 UART: [idev] CDI.KEYID = 6
1,176,138 UART: [idev] SUBJECT.KEYID = 7
1,176,562 UART: [idev] UDS.KEYID = 0
1,176,907 ready_for_fw is high
1,176,907 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,764 UART: [idev] Erasing UDS.KEYID = 0
1,202,045 UART: [idev] Sha1 KeyId Algorithm
1,210,659 UART: [idev] --
1,211,767 UART: [ldev] ++
1,211,935 UART: [ldev] CDI.KEYID = 6
1,212,298 UART: [ldev] SUBJECT.KEYID = 5
1,212,724 UART: [ldev] AUTHORITY.KEYID = 7
1,213,187 UART: [ldev] FE.KEYID = 1
1,218,251 UART: [ldev] Erasing FE.KEYID = 1
1,243,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,751 UART: [ldev] --
1,283,186 UART: [fwproc] Wait for Commands...
1,283,936 UART: [fwproc] Recv command 0x46574c44
1,284,664 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,682 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,986 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,735 >>> mbox cmd response: success
2,774,735 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,775,969 UART: [afmc] ++
2,776,137 UART: [afmc] CDI.KEYID = 6
2,776,499 UART: [afmc] SUBJECT.KEYID = 7
2,776,924 UART: [afmc] AUTHORITY.KEYID = 5
2,812,059 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,578 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,326 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,054 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,939 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,658 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,516 UART: [afmc] --
2,855,428 UART: [cold-reset] --
2,856,326 UART: [state] Locking Datavault
2,857,395 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,999 UART: [state] Locking ICCM
2,858,645 UART: [exit] Launching FMC @ 0x40000130
2,863,974 UART:
2,863,990 UART: Running Caliptra FMC ...
2,864,398 UART:
2,864,452 UART: [state] CFI Enabled
2,875,291 UART: [fht] FMC Alias Private Key: 7
2,983,874 UART: [art] Extend RT PCRs Done
2,984,302 UART: [art] Lock RT PCRs Done
2,985,792 UART: [art] Populate DV Done
2,993,963 UART: [fht] FMC Alias Private Key: 7
2,995,039 UART: [art] Derive CDI
2,995,319 UART: [art] Store in in slot 0x4
3,080,746 UART: [art] Derive Key Pair
3,081,106 UART: [art] Store priv key in slot 0x5
3,094,216 UART: [art] Derive Key Pair - Done
3,109,190 UART: [art] Signing Cert with AUTHO
3,109,670 UART: RITY.KEYID = 7
3,124,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,663 UART: [art] PUB.X = 17379BF668BCAF7661A97324A81E68541C28762D7EBDC6E757C93D0F2888B4F476B566B079CE1C0E2AE8C5AA101A1844
3,132,431 UART: [art] PUB.Y = F5427355CBBA8A9C964984B67EF5B236C5E02BB9D0450ED6F2D31D6D9089222C4034897AD40158768A4D19907F11A100
3,139,349 UART: [art] SIG.R = E842193CE36AFAD27E0FBDD89AD21BDACA2D39C0D703DD7165CFED405B07F0AB7268D69B971CAF816BE625F4D6AD1A5E
3,146,138 UART: [art] SIG.S = 69D17A8DA81911D86A0EDD6CD5DBE534DE46BD21F8F1508DB981EA6E87F22E0FF9EA70536E1FD0DB55589487EA1B96D1
3,170,127 UART: Caliptra RT
3,170,380 UART: [state] CFI Enabled
3,278,009 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,739 UART: [rt]cmd =0x50435245, len=56
3,310,022 >>> mbox cmd response: failed
3,310,022 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,654 UART: [rt]cmd =0x50435245, len=56
3,341,177 >>> mbox cmd response: failed
3,341,177 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,370,719 UART: [rt]cmd =0x50435245, len=56
3,372,082 >>> mbox cmd response: failed
3,372,082 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,720 UART: [rt]cmd =0x50435245, len=56
3,403,499 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,781 ready_for_fw is high
1,060,781 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,530 >>> mbox cmd response: success
2,625,530 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,686,690 UART:
2,686,706 UART: Running Caliptra FMC ...
2,687,114 UART:
2,687,168 UART: [state] CFI Enabled
2,697,925 UART: [fht] FMC Alias Private Key: 7
2,805,664 UART: [art] Extend RT PCRs Done
2,806,092 UART: [art] Lock RT PCRs Done
2,807,558 UART: [art] Populate DV Done
2,815,587 UART: [fht] FMC Alias Private Key: 7
2,816,757 UART: [art] Derive CDI
2,817,037 UART: [art] Store in in slot 0x4
2,902,498 UART: [art] Derive Key Pair
2,902,858 UART: [art] Store priv key in slot 0x5
2,916,194 UART: [art] Derive Key Pair - Done
2,931,033 UART: [art] Signing Cert with AUTHO
2,931,513 UART: RITY.KEYID = 7
2,946,253 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,018 UART: [art] PUB.X = ED8641B947FBB4EFB7B0DB16B96C2989F8F72183E772225C3107771F848F3AF03B262508553E61E185D6C218EFBD8A50
2,953,784 UART: [art] PUB.Y = 25AFFC149DE71B114C54FE65B7D3DECCA391B33F8AAE7BC9A237DCCF6DFBA2B55D6532B12CF80F73A44B322109FB3636
2,960,752 UART: [art] SIG.R = AFA3F7B77CEF91DE950D45349ECE1DD02D013141B24993EC9EC8D785277A3926F3A2C324D94D1D4947D205821518A174
2,967,515 UART: [art] SIG.S = 446F6BC28B9AB7505ADEA304FB3F76B6261107BA0D972BA2CFD03D6BBD9AAE11A4FF2CCFFACBBAD5881EEA15A9E5C413
2,990,901 UART: Caliptra RT
2,991,154 UART: [state] CFI Enabled
3,099,333 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,281 UART: [rt]cmd =0x50435245, len=56
3,131,636 >>> mbox cmd response: failed
3,131,636 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,548 UART: [rt]cmd =0x50435245, len=56
3,162,813 >>> mbox cmd response: failed
3,162,813 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,192,301 UART: [rt]cmd =0x50435245, len=56
3,193,868 >>> mbox cmd response: failed
3,193,868 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,476 UART: [rt]cmd =0x50435245, len=56
3,224,829 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,215 UART: [state] LifecycleState = Unprovisioned
85,870 UART: [state] DebugLocked = No
86,426 UART: [state] WD Timer not started. Device not locked for debugging
87,599 UART: [kat] SHA2-256
893,249 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,374 UART: [kat] ++
897,526 UART: [kat] sha1
901,642 UART: [kat] SHA2-256
903,582 UART: [kat] SHA2-384
906,357 UART: [kat] SHA2-512-ACC
908,258 UART: [kat] ECC-384
918,103 UART: [kat] HMAC-384Kdf
922,737 UART: [kat] LMS
1,171,065 UART: [kat] --
1,171,794 UART: [cold-reset] ++
1,172,170 UART: [fht] FHT @ 0x50003400
1,174,821 UART: [idev] ++
1,174,989 UART: [idev] CDI.KEYID = 6
1,175,349 UART: [idev] SUBJECT.KEYID = 7
1,175,773 UART: [idev] UDS.KEYID = 0
1,176,118 ready_for_fw is high
1,176,118 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,575 UART: [idev] Erasing UDS.KEYID = 0
1,200,958 UART: [idev] Sha1 KeyId Algorithm
1,209,308 UART: [idev] --
1,210,450 UART: [ldev] ++
1,210,618 UART: [ldev] CDI.KEYID = 6
1,210,981 UART: [ldev] SUBJECT.KEYID = 5
1,211,407 UART: [ldev] AUTHORITY.KEYID = 7
1,211,870 UART: [ldev] FE.KEYID = 1
1,217,284 UART: [ldev] Erasing FE.KEYID = 1
1,243,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,236 UART: [ldev] --
1,282,633 UART: [fwproc] Wait for Commands...
1,283,241 UART: [fwproc] Recv command 0x46574c44
1,283,969 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,861 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,165 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,030 >>> mbox cmd response: success
2,775,030 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,776,050 UART: [afmc] ++
2,776,218 UART: [afmc] CDI.KEYID = 6
2,776,580 UART: [afmc] SUBJECT.KEYID = 7
2,777,005 UART: [afmc] AUTHORITY.KEYID = 5
2,812,734 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,853 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,581 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,466 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,185 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,129 UART: [afmc] --
2,856,177 UART: [cold-reset] --
2,856,811 UART: [state] Locking Datavault
2,858,134 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,738 UART: [state] Locking ICCM
2,859,314 UART: [exit] Launching FMC @ 0x40000130
2,864,643 UART:
2,864,659 UART: Running Caliptra FMC ...
2,865,067 UART:
2,865,210 UART: [state] CFI Enabled
2,875,449 UART: [fht] FMC Alias Private Key: 7
2,983,354 UART: [art] Extend RT PCRs Done
2,983,782 UART: [art] Lock RT PCRs Done
2,985,338 UART: [art] Populate DV Done
2,993,641 UART: [fht] FMC Alias Private Key: 7
2,994,593 UART: [art] Derive CDI
2,994,873 UART: [art] Store in in slot 0x4
3,080,470 UART: [art] Derive Key Pair
3,080,830 UART: [art] Store priv key in slot 0x5
3,095,156 UART: [art] Derive Key Pair - Done
3,110,168 UART: [art] Signing Cert with AUTHO
3,110,648 UART: RITY.KEYID = 7
3,125,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,483 UART: [art] PUB.X = BE0DD8C740C3379A6B1ECF64FF491374F3E408DE9432D144A7E601DD0C02A691A4CCDF920DC937001DD5686604ECDD90
3,133,222 UART: [art] PUB.Y = DCBB502679BB08DBB51E10A67FF5B1753E73A0F97952A10171BBDF51086F3DA6A9AE4DA921B055D121791E0645494F3F
3,140,168 UART: [art] SIG.R = B8F9A281D53F27FC2E132946A208922ECD178440F6D7D594644BE4EFE3CF11367D6028624AE72945E39543433A75C6A8
3,146,931 UART: [art] SIG.S = 670ACDC97CED1C09DAB1E6B95124E02D39C087685D3D62BFF20B22F5545DC0E888459A1FBA7F5FEBA2CDA2B698573828
3,170,961 UART: Caliptra RT
3,171,306 UART: [state] CFI Enabled
3,278,295 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,095 UART: [rt]cmd =0x50435245, len=56
3,310,858 >>> mbox cmd response: failed
3,310,858 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,492 UART: [rt]cmd =0x50435245, len=56
3,341,859 >>> mbox cmd response: failed
3,341,859 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,553 UART: [rt]cmd =0x50435245, len=56
3,372,898 >>> mbox cmd response: failed
3,372,898 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,318 UART: [rt]cmd =0x50435245, len=56
3,403,471 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,016 ready_for_fw is high
1,061,016 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,593 >>> mbox cmd response: success
2,625,593 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,687,731 UART:
2,687,747 UART: Running Caliptra FMC ...
2,688,155 UART:
2,688,298 UART: [state] CFI Enabled
2,698,879 UART: [fht] FMC Alias Private Key: 7
2,807,602 UART: [art] Extend RT PCRs Done
2,808,030 UART: [art] Lock RT PCRs Done
2,809,584 UART: [art] Populate DV Done
2,817,829 UART: [fht] FMC Alias Private Key: 7
2,818,795 UART: [art] Derive CDI
2,819,075 UART: [art] Store in in slot 0x4
2,904,734 UART: [art] Derive Key Pair
2,905,094 UART: [art] Store priv key in slot 0x5
2,917,542 UART: [art] Derive Key Pair - Done
2,932,696 UART: [art] Signing Cert with AUTHO
2,933,176 UART: RITY.KEYID = 7
2,948,256 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,021 UART: [art] PUB.X = 7B2C8A284E3B004B068D37CBE69CF2B338EA57ACB3EA971779DE0B053EF50F9B9D7145D26599E6136D2533E0F39AF51E
2,955,767 UART: [art] PUB.Y = 897645E6A7E45C52EA2EAB88A954149DE19057CD2B577C413197F3FEB945BCC17C409E8B6BC918E05B385FC34B3AD054
2,962,725 UART: [art] SIG.R = 7F1F824F4AC126C31458B712AEB69CBCC245002A32C753B57F49ADC827C32F0712997B19AC9E45D9B0CE5554F7104F85
2,969,474 UART: [art] SIG.S = 88C370A1DA5C8D73EDF70AEAFE9AE09BF9FF94BA14E81A5E1E2756D823B9B4AC47EA486C5F3E1AB7751F5C01BB96D9F1
2,993,117 UART: Caliptra RT
2,993,462 UART: [state] CFI Enabled
3,101,535 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,261 UART: [rt]cmd =0x50435245, len=56
3,133,870 >>> mbox cmd response: failed
3,133,870 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,580 UART: [rt]cmd =0x50435245, len=56
3,164,933 >>> mbox cmd response: failed
3,164,933 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,194,557 UART: [rt]cmd =0x50435245, len=56
3,195,740 >>> mbox cmd response: failed
3,195,740 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,294 UART: [rt]cmd =0x50435245, len=56
3,226,323 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,117 UART: [state] WD Timer not started. Device not locked for debugging
87,292 UART: [kat] SHA2-256
890,842 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,971 UART: [kat] ++
895,123 UART: [kat] sha1
899,361 UART: [kat] SHA2-256
901,301 UART: [kat] SHA2-384
904,074 UART: [kat] SHA2-512-ACC
905,975 UART: [kat] ECC-384
915,898 UART: [kat] HMAC-384Kdf
920,622 UART: [kat] LMS
1,168,934 UART: [kat] --
1,169,835 UART: [cold-reset] ++
1,170,241 UART: [fht] FHT @ 0x50003400
1,172,811 UART: [idev] ++
1,172,979 UART: [idev] CDI.KEYID = 6
1,173,340 UART: [idev] SUBJECT.KEYID = 7
1,173,765 UART: [idev] UDS.KEYID = 0
1,174,111 ready_for_fw is high
1,174,111 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,023 UART: [idev] Erasing UDS.KEYID = 0
1,199,563 UART: [idev] Sha1 KeyId Algorithm
1,208,451 UART: [idev] --
1,209,498 UART: [ldev] ++
1,209,666 UART: [ldev] CDI.KEYID = 6
1,210,030 UART: [ldev] SUBJECT.KEYID = 5
1,210,457 UART: [ldev] AUTHORITY.KEYID = 7
1,210,920 UART: [ldev] FE.KEYID = 1
1,216,158 UART: [ldev] Erasing FE.KEYID = 1
1,242,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,502 UART: [ldev] --
1,282,010 UART: [fwproc] Wait for Commands...
1,282,809 UART: [fwproc] Recv command 0x46574c44
1,283,542 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,846 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,155 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,959 >>> mbox cmd response: success
2,773,959 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,774,988 UART: [afmc] ++
2,775,156 UART: [afmc] CDI.KEYID = 6
2,775,519 UART: [afmc] SUBJECT.KEYID = 7
2,775,945 UART: [afmc] AUTHORITY.KEYID = 5
2,811,304 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,449 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,178 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,061 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,780 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,415 UART: [afmc] --
2,854,547 UART: [cold-reset] --
2,855,311 UART: [state] Locking Datavault
2,856,410 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,014 UART: [state] Locking ICCM
2,857,524 UART: [exit] Launching FMC @ 0x40000130
2,862,853 UART:
2,862,869 UART: Running Caliptra FMC ...
2,863,277 UART:
2,863,331 UART: [state] CFI Enabled
2,873,812 UART: [fht] FMC Alias Private Key: 7
2,981,131 UART: [art] Extend RT PCRs Done
2,981,559 UART: [art] Lock RT PCRs Done
2,983,173 UART: [art] Populate DV Done
2,991,306 UART: [fht] FMC Alias Private Key: 7
2,992,424 UART: [art] Derive CDI
2,992,704 UART: [art] Store in in slot 0x4
3,078,335 UART: [art] Derive Key Pair
3,078,695 UART: [art] Store priv key in slot 0x5
3,091,319 UART: [art] Derive Key Pair - Done
3,106,376 UART: [art] Signing Cert with AUTHO
3,106,856 UART: RITY.KEYID = 7
3,122,378 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,143 UART: [art] PUB.X = FD2FB0075DC0FB1F419662F3B305473B5694AEF721BCD1EDFDE760D7BE02ED9FECEDAE3DC525A1C1F3F11C709B5349CE
3,129,932 UART: [art] PUB.Y = C836EF58EB3A8090EEEE532B7A4094CD0AD4A9F9C8D67ED46638AF45C9453956C40F0ADC100A1EB606DD5ABCAD59AC75
3,136,889 UART: [art] SIG.R = 1853141D4B48837F5C1999BF0CD49EF0DD62CE92C4B72C7B235BD82EA4C6F3B1D07D64E3955E0E91CAE1EB424FBB8D3D
3,143,671 UART: [art] SIG.S = 22AF92FFD7097DC47E359403A411AC4FB71D0822CBAF55F9E3790D9207E1CC6B268428AADA962B36ADC22CADCC7BCB0E
3,167,352 UART: Caliptra RT
3,167,605 UART: [state] CFI Enabled
3,275,212 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,812 UART: [rt]cmd =0x50435245, len=56
3,307,245 >>> mbox cmd response: failed
3,307,245 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,887 UART: [rt]cmd =0x50435245, len=56
3,338,246 >>> mbox cmd response: failed
3,338,246 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,898 UART: [rt]cmd =0x50435245, len=56
3,369,369 >>> mbox cmd response: failed
3,369,369 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,211 UART: [rt]cmd =0x50435245, len=56
3,400,496 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,772 ready_for_fw is high
1,055,772 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,455 >>> mbox cmd response: success
2,621,455 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,682,719 UART:
2,682,735 UART: Running Caliptra FMC ...
2,683,143 UART:
2,683,197 UART: [state] CFI Enabled
2,694,074 UART: [fht] FMC Alias Private Key: 7
2,802,599 UART: [art] Extend RT PCRs Done
2,803,027 UART: [art] Lock RT PCRs Done
2,804,529 UART: [art] Populate DV Done
2,812,842 UART: [fht] FMC Alias Private Key: 7
2,813,932 UART: [art] Derive CDI
2,814,212 UART: [art] Store in in slot 0x4
2,899,575 UART: [art] Derive Key Pair
2,899,935 UART: [art] Store priv key in slot 0x5
2,912,535 UART: [art] Derive Key Pair - Done
2,927,023 UART: [art] Signing Cert with AUTHO
2,927,503 UART: RITY.KEYID = 7
2,942,627 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,392 UART: [art] PUB.X = 12F3236FE46AE0DAFA6BECC795398A5A6D1E97FCB588212D4D721EFCB7809F04AF0408CF4A3CF2C61AD32AA713BFE0BD
2,950,179 UART: [art] PUB.Y = 0B8FF09D666B6F344DD7A675DFCA28FD567693E39AF2B6F6F9230E9BD7FFF376022348780A392B81A30E3B025E15720D
2,957,114 UART: [art] SIG.R = 159795B8B3588B627987F778E2B5041100C950888B5A8748E909722A7C602EF2EC3688FDD45FEBC9BE29067984360EAA
2,963,844 UART: [art] SIG.S = 05EF734620C3D0A474CA88ECF60A871D2BE95C497AF576CAD0CD8DA4834A5F77AC8783533E1DC5F8AA62686FE4FDC927
2,987,767 UART: Caliptra RT
2,988,020 UART: [state] CFI Enabled
3,095,671 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,207 UART: [rt]cmd =0x50435245, len=56
3,127,464 >>> mbox cmd response: failed
3,127,464 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,157,028 UART: [rt]cmd =0x50435245, len=56
3,158,339 >>> mbox cmd response: failed
3,158,339 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,833 UART: [rt]cmd =0x50435245, len=56
3,189,262 >>> mbox cmd response: failed
3,189,262 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,946 UART: [rt]cmd =0x50435245, len=56
3,220,565 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,017 UART: [state] LifecycleState = Unprovisioned
85,672 UART: [state] DebugLocked = No
86,390 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,382 UART: [kat] ++
895,534 UART: [kat] sha1
899,814 UART: [kat] SHA2-256
901,754 UART: [kat] SHA2-384
904,459 UART: [kat] SHA2-512-ACC
906,360 UART: [kat] ECC-384
915,859 UART: [kat] HMAC-384Kdf
920,507 UART: [kat] LMS
1,168,819 UART: [kat] --
1,169,536 UART: [cold-reset] ++
1,170,098 UART: [fht] FHT @ 0x50003400
1,172,770 UART: [idev] ++
1,172,938 UART: [idev] CDI.KEYID = 6
1,173,299 UART: [idev] SUBJECT.KEYID = 7
1,173,724 UART: [idev] UDS.KEYID = 0
1,174,070 ready_for_fw is high
1,174,070 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,728 UART: [idev] Erasing UDS.KEYID = 0
1,199,348 UART: [idev] Sha1 KeyId Algorithm
1,208,402 UART: [idev] --
1,209,393 UART: [ldev] ++
1,209,561 UART: [ldev] CDI.KEYID = 6
1,209,925 UART: [ldev] SUBJECT.KEYID = 5
1,210,352 UART: [ldev] AUTHORITY.KEYID = 7
1,210,815 UART: [ldev] FE.KEYID = 1
1,216,157 UART: [ldev] Erasing FE.KEYID = 1
1,242,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,145 UART: [ldev] --
1,282,419 UART: [fwproc] Wait for Commands...
1,283,004 UART: [fwproc] Recv command 0x46574c44
1,283,737 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,905 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,214 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,932 >>> mbox cmd response: success
2,773,932 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,775,145 UART: [afmc] ++
2,775,313 UART: [afmc] CDI.KEYID = 6
2,775,676 UART: [afmc] SUBJECT.KEYID = 7
2,776,102 UART: [afmc] AUTHORITY.KEYID = 5
2,811,673 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,724 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,453 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,336 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,055 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,844 UART: [afmc] --
2,854,812 UART: [cold-reset] --
2,855,684 UART: [state] Locking Datavault
2,856,919 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,523 UART: [state] Locking ICCM
2,858,055 UART: [exit] Launching FMC @ 0x40000130
2,863,384 UART:
2,863,400 UART: Running Caliptra FMC ...
2,863,808 UART:
2,863,951 UART: [state] CFI Enabled
2,874,850 UART: [fht] FMC Alias Private Key: 7
2,982,783 UART: [art] Extend RT PCRs Done
2,983,211 UART: [art] Lock RT PCRs Done
2,984,439 UART: [art] Populate DV Done
2,992,858 UART: [fht] FMC Alias Private Key: 7
2,993,996 UART: [art] Derive CDI
2,994,276 UART: [art] Store in in slot 0x4
3,080,365 UART: [art] Derive Key Pair
3,080,725 UART: [art] Store priv key in slot 0x5
3,093,985 UART: [art] Derive Key Pair - Done
3,108,590 UART: [art] Signing Cert with AUTHO
3,109,070 UART: RITY.KEYID = 7
3,124,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,021 UART: [art] PUB.X = 8EF9DCE9336C46DB73E41CF74240D0D357327AE9CC2AC4CE5EC8437676ED5F883757CB830BB2AFEA602F80C2E70ECF51
3,131,803 UART: [art] PUB.Y = FDC8C949C9A665A8384B5F171F9B1A40E227F0F8234ED5711143EA8EBA881CC18FF4244A77633774D612803F4D5A569E
3,138,755 UART: [art] SIG.R = 821C41AADE216D979458B15BB9470EC9FC97CD2F80100572F16C2F2F72E9500B55C789DE6DE9E01D8F597E50F38696FB
3,145,522 UART: [art] SIG.S = DD5A616277BB78FC18CEE821E928B9358B3E545E35942579FB7746E4425BE0F59325352B8C7F8AFC0488724978EC368D
3,168,814 UART: Caliptra RT
3,169,159 UART: [state] CFI Enabled
3,276,585 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,225 UART: [rt]cmd =0x50435245, len=56
3,308,686 >>> mbox cmd response: failed
3,308,686 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,360 UART: [rt]cmd =0x50435245, len=56
3,339,477 >>> mbox cmd response: failed
3,339,477 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,369,185 UART: [rt]cmd =0x50435245, len=56
3,370,518 >>> mbox cmd response: failed
3,370,518 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,362 UART: [rt]cmd =0x50435245, len=56
3,401,667 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,737 ready_for_fw is high
1,056,737 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,134 >>> mbox cmd response: success
2,627,134 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,688,736 UART:
2,688,752 UART: Running Caliptra FMC ...
2,689,160 UART:
2,689,303 UART: [state] CFI Enabled
2,699,576 UART: [fht] FMC Alias Private Key: 7
2,807,791 UART: [art] Extend RT PCRs Done
2,808,219 UART: [art] Lock RT PCRs Done
2,809,499 UART: [art] Populate DV Done
2,817,896 UART: [fht] FMC Alias Private Key: 7
2,818,860 UART: [art] Derive CDI
2,819,140 UART: [art] Store in in slot 0x4
2,904,719 UART: [art] Derive Key Pair
2,905,079 UART: [art] Store priv key in slot 0x5
2,918,911 UART: [art] Derive Key Pair - Done
2,933,752 UART: [art] Signing Cert with AUTHO
2,934,232 UART: RITY.KEYID = 7
2,949,222 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,987 UART: [art] PUB.X = 57F0F0D4E06AA71B3E1A0E9E64A641F1189C7B3CB9567C6028C45441E31CBF3D9DD93CB7278DD435F9861B8456C846B2
2,956,760 UART: [art] PUB.Y = D2546C414029BE5579E227A0754C25E0D4EC2C5E3F6DDB726B36B89335D2E772DC3078131F0851E5FAFEA4896D4549D3
2,963,709 UART: [art] SIG.R = C15B0C2DD2D7AE7B811BA12CBF2E63E12FA9A8003B38F863F67E167E4565DA5E0960864F5B45A5B25332123285D1583C
2,970,455 UART: [art] SIG.S = 0F5EB0BE26EC7865F05CE0B81AC4C8DB75E76284BF621E0FB28CF93C836241B9EC6821AD1BE01D3D4CB3CBA899EFEA37
2,994,314 UART: Caliptra RT
2,994,659 UART: [state] CFI Enabled
3,101,524 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,450 UART: [rt]cmd =0x50435245, len=56
3,134,093 >>> mbox cmd response: failed
3,134,093 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,849 UART: [rt]cmd =0x50435245, len=56
3,165,504 >>> mbox cmd response: failed
3,165,504 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,195,140 UART: [rt]cmd =0x50435245, len=56
3,196,283 >>> mbox cmd response: failed
3,196,283 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,083 UART: [rt]cmd =0x50435245, len=56
3,227,366 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,509 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,003 UART: [kat] SHA2-256
881,934 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,049 UART: [kat] ++
886,201 UART: [kat] sha1
890,375 UART: [kat] SHA2-256
892,313 UART: [kat] SHA2-384
894,890 UART: [kat] SHA2-512-ACC
896,791 UART: [kat] ECC-384
902,460 UART: [kat] HMAC-384Kdf
906,960 UART: [kat] LMS
1,475,156 UART: [kat] --
1,475,877 UART: [cold-reset] ++
1,476,315 UART: [fht] Storing FHT @ 0x50003400
1,479,304 UART: [idev] ++
1,479,472 UART: [idev] CDI.KEYID = 6
1,479,832 UART: [idev] SUBJECT.KEYID = 7
1,480,256 UART: [idev] UDS.KEYID = 0
1,480,601 ready_for_fw is high
1,480,601 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,194 UART: [idev] Erasing UDS.KEYID = 0
1,504,970 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,408 UART: [idev] --
1,514,621 UART: [ldev] ++
1,514,789 UART: [ldev] CDI.KEYID = 6
1,515,152 UART: [ldev] SUBJECT.KEYID = 5
1,515,578 UART: [ldev] AUTHORITY.KEYID = 7
1,516,041 UART: [ldev] FE.KEYID = 1
1,520,977 UART: [ldev] Erasing FE.KEYID = 1
1,546,472 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,120 UART: [ldev] --
1,585,583 UART: [fwproc] Waiting for Commands...
1,586,342 UART: [fwproc] Received command 0x46574c44
1,587,133 UART: [fwproc] Received Image of size 114332 bytes
2,884,707 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,567 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,919 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,728 >>> mbox cmd response: success
3,076,728 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,077,760 UART: [afmc] ++
3,077,928 UART: [afmc] CDI.KEYID = 6
3,078,290 UART: [afmc] SUBJECT.KEYID = 7
3,078,715 UART: [afmc] AUTHORITY.KEYID = 5
3,113,672 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,824 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,604 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,332 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,217 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,907 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,726 UART: [afmc] --
3,156,828 UART: [cold-reset] --
3,157,694 UART: [state] Locking Datavault
3,159,001 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,605 UART: [state] Locking ICCM
3,160,261 UART: [exit] Launching FMC @ 0x40000130
3,165,590 UART:
3,165,606 UART: Running Caliptra FMC ...
3,166,014 UART:
3,166,068 UART: [state] CFI Enabled
3,176,981 UART: [fht] FMC Alias Private Key: 7
3,284,976 UART: [art] Extend RT PCRs Done
3,285,404 UART: [art] Lock RT PCRs Done
3,287,114 UART: [art] Populate DV Done
3,295,469 UART: [fht] FMC Alias Private Key: 7
3,296,417 UART: [art] Derive CDI
3,296,697 UART: [art] Store in in slot 0x4
3,382,598 UART: [art] Derive Key Pair
3,382,958 UART: [art] Store priv key in slot 0x5
3,395,912 UART: [art] Derive Key Pair - Done
3,410,763 UART: [art] Signing Cert with AUTHO
3,411,243 UART: RITY.KEYID = 7
3,426,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,844 UART: [art] PUB.X = EFFB2CE823D45E0A9F0F267D106F24A6B5D24649683BF0D085C5C550637ACD6EC42107993692E83D0645C53375AAD157
3,433,604 UART: [art] PUB.Y = F5BDE58E7B945AD973F00868432E359D018725B7FD7EE93D15DA2C35FD1F049F306B62AEB10A02585F7AFE239CCD4F63
3,440,551 UART: [art] SIG.R = 057C011F22837D759C303AC407B7C16CCB79066E31C44E0626481A8F365E0B87055A32CC3FE9F813B41C67814CA6D75D
3,447,298 UART: [art] SIG.S = BD87DA7C3DCFB7BCBE7CC9DB888A696A34FA247EBBE0C51FBC328E3E897A1186E882BE1E83202E47674957D5F6B95B06
3,470,688 UART: Caliptra RT
3,470,941 UART: [state] CFI Enabled
3,578,630 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,194 UART: [rt]cmd =0x50435252, len=8
3,610,696 >>> mbox cmd response data (8 bytes)
3,610,697 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,940 UART: [rt]cmd =0x50435251, len=36
3,807,315 >>> mbox cmd response data (1848 bytes)
3,807,316 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,836,617 UART: [rt]cmd =0x43455246, len=4
3,848,934 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,401 ready_for_fw is high
1,362,401 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,292 >>> mbox cmd response: success
2,927,292 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,987,582 UART:
2,987,598 UART: Running Caliptra FMC ...
2,988,006 UART:
2,988,060 UART: [state] CFI Enabled
2,998,599 UART: [fht] FMC Alias Private Key: 7
3,105,904 UART: [art] Extend RT PCRs Done
3,106,332 UART: [art] Lock RT PCRs Done
3,107,988 UART: [art] Populate DV Done
3,116,319 UART: [fht] FMC Alias Private Key: 7
3,117,257 UART: [art] Derive CDI
3,117,537 UART: [art] Store in in slot 0x4
3,203,148 UART: [art] Derive Key Pair
3,203,508 UART: [art] Store priv key in slot 0x5
3,216,612 UART: [art] Derive Key Pair - Done
3,231,828 UART: [art] Signing Cert with AUTHO
3,232,308 UART: RITY.KEYID = 7
3,247,410 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,175 UART: [art] PUB.X = DE7FFAAFB947FB7E28257920761F9D2A7639C8309D655DCE9DE7FADC5891B858600DA69C6E97BB04F2BECD0EA2132386
3,254,952 UART: [art] PUB.Y = 3BF69095B13790CF19EAB84B43714A031795FE29E64E5CDBA5EFF763FCAF97A1AD4BA3FD8BA1867881982D926620DE8B
3,261,913 UART: [art] SIG.R = 1807C0BCFC0F1510E4E3B05A249B769D30573F7C91763C21A62250CAC9A3343CA8B515135983365C0DA73C6AE144454C
3,268,672 UART: [art] SIG.S = 673C0FFACF1A335984FD08CC0F40075AE2312E21F2D2CD9DC3E3401E9AA034FC7D5235F9BF71A0FAD163CAE10E7A6753
3,292,974 UART: Caliptra RT
3,293,227 UART: [state] CFI Enabled
3,400,851 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,223 UART: [rt]cmd =0x50435252, len=8
3,432,767 >>> mbox cmd response data (8 bytes)
3,432,768 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,409 UART: [rt]cmd =0x50435251, len=36
3,629,318 >>> mbox cmd response data (1848 bytes)
3,629,319 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,658,792 UART: [rt]cmd =0x43455246, len=4
3,671,079 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,846 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,484 UART: [kat] SHA2-256
882,415 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,530 UART: [kat] ++
886,682 UART: [kat] sha1
890,834 UART: [kat] SHA2-256
892,772 UART: [kat] SHA2-384
895,511 UART: [kat] SHA2-512-ACC
897,412 UART: [kat] ECC-384
903,179 UART: [kat] HMAC-384Kdf
907,677 UART: [kat] LMS
1,475,873 UART: [kat] --
1,476,728 UART: [cold-reset] ++
1,477,272 UART: [fht] Storing FHT @ 0x50003400
1,480,057 UART: [idev] ++
1,480,225 UART: [idev] CDI.KEYID = 6
1,480,585 UART: [idev] SUBJECT.KEYID = 7
1,481,009 UART: [idev] UDS.KEYID = 0
1,481,354 ready_for_fw is high
1,481,354 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,811 UART: [idev] Erasing UDS.KEYID = 0
1,505,293 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,873 UART: [idev] --
1,515,052 UART: [ldev] ++
1,515,220 UART: [ldev] CDI.KEYID = 6
1,515,583 UART: [ldev] SUBJECT.KEYID = 5
1,516,009 UART: [ldev] AUTHORITY.KEYID = 7
1,516,472 UART: [ldev] FE.KEYID = 1
1,521,806 UART: [ldev] Erasing FE.KEYID = 1
1,546,747 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,947 UART: [ldev] --
1,586,330 UART: [fwproc] Waiting for Commands...
1,587,179 UART: [fwproc] Received command 0x46574c44
1,587,970 UART: [fwproc] Received Image of size 114332 bytes
2,886,084 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,142 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,494 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,447 >>> mbox cmd response: success
3,079,447 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,080,575 UART: [afmc] ++
3,080,743 UART: [afmc] CDI.KEYID = 6
3,081,105 UART: [afmc] SUBJECT.KEYID = 7
3,081,530 UART: [afmc] AUTHORITY.KEYID = 5
3,116,671 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,701 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,481 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,209 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,094 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,784 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,731 UART: [afmc] --
3,159,721 UART: [cold-reset] --
3,160,659 UART: [state] Locking Datavault
3,161,698 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,302 UART: [state] Locking ICCM
3,162,880 UART: [exit] Launching FMC @ 0x40000130
3,168,209 UART:
3,168,225 UART: Running Caliptra FMC ...
3,168,633 UART:
3,168,776 UART: [state] CFI Enabled
3,179,171 UART: [fht] FMC Alias Private Key: 7
3,286,724 UART: [art] Extend RT PCRs Done
3,287,152 UART: [art] Lock RT PCRs Done
3,288,684 UART: [art] Populate DV Done
3,296,871 UART: [fht] FMC Alias Private Key: 7
3,297,825 UART: [art] Derive CDI
3,298,105 UART: [art] Store in in slot 0x4
3,384,014 UART: [art] Derive Key Pair
3,384,374 UART: [art] Store priv key in slot 0x5
3,397,578 UART: [art] Derive Key Pair - Done
3,412,379 UART: [art] Signing Cert with AUTHO
3,412,859 UART: RITY.KEYID = 7
3,428,395 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,160 UART: [art] PUB.X = FF45432A89BFC9451627F7424D4A6C671F8D56895BC46E4978974FA5FA049F25E3E9ACCA91D8A6E287F008A2B8A2710E
3,435,927 UART: [art] PUB.Y = 746FBA1553D80827B9AA20D4A6F38B0627C8A8D83F45112F2FEC72D8D7785987D1F836E4D209E3622314F5E23337E966
3,442,864 UART: [art] SIG.R = 62E7BCB674DB08A626D68D8FC7AAAA07E9BD67DB3BCEBB2A53510C70EF9B8E472DF5A94E7D209C44D8ACBD83B5F1C360
3,449,653 UART: [art] SIG.S = CBE7DD24C58432E08281F2D29542B4B4A17615B5968F727B9059257767DFEE1482073FB0343A1E096941400CD4780BEB
3,473,180 UART: Caliptra RT
3,473,525 UART: [state] CFI Enabled
3,580,898 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,548 UART: [rt]cmd =0x50435252, len=8
3,613,038 >>> mbox cmd response data (8 bytes)
3,613,039 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,418 UART: [rt]cmd =0x50435251, len=36
3,809,851 >>> mbox cmd response data (1848 bytes)
3,809,852 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,839,109 UART: [rt]cmd =0x43455246, len=4
3,851,470 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,178 ready_for_fw is high
1,363,178 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,601 >>> mbox cmd response: success
2,929,601 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,991,783 UART:
2,991,799 UART: Running Caliptra FMC ...
2,992,207 UART:
2,992,350 UART: [state] CFI Enabled
3,003,045 UART: [fht] FMC Alias Private Key: 7
3,111,306 UART: [art] Extend RT PCRs Done
3,111,734 UART: [art] Lock RT PCRs Done
3,113,416 UART: [art] Populate DV Done
3,121,583 UART: [fht] FMC Alias Private Key: 7
3,122,687 UART: [art] Derive CDI
3,122,967 UART: [art] Store in in slot 0x4
3,208,500 UART: [art] Derive Key Pair
3,208,860 UART: [art] Store priv key in slot 0x5
3,222,122 UART: [art] Derive Key Pair - Done
3,236,784 UART: [art] Signing Cert with AUTHO
3,237,264 UART: RITY.KEYID = 7
3,252,816 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,581 UART: [art] PUB.X = 6589DF50A2C30A0ABE9ABBD7E273F067DDBB15DFA5EA1763EABBDE5BFB38DDF09C0D22EF3FD7BB87A2F6F90B945CABDD
3,260,381 UART: [art] PUB.Y = 266032C4F0B9BDCBADEF5C0FE74C0984DF42E63E70E0A476DCC803DA61218A3E7EF3802CA044568266C985BB8768028D
3,267,329 UART: [art] SIG.R = CB189EFBFD241D3F507170AA8048B0E302B031A68AF1DC079FE5351AE65915C24050D62FCABE9B6566932A7B80C7AE0B
3,274,102 UART: [art] SIG.S = 3D95EE3F70416BBB9712DAF021B20CB02760D72C72B2EF31D8FF99C51B595EFE012322C9A7FB3736F18D1316021A547E
3,296,624 UART: Caliptra RT
3,296,969 UART: [state] CFI Enabled
3,405,688 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,912 UART: [rt]cmd =0x50435252, len=8
3,437,458 >>> mbox cmd response data (8 bytes)
3,437,459 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,968 UART: [rt]cmd =0x50435251, len=36
3,634,523 >>> mbox cmd response data (1848 bytes)
3,634,524 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,873 UART: [rt]cmd =0x43455246, len=4
3,676,238 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,424 UART: [state] LifecycleState = Unprovisioned
85,079 UART: [state] DebugLocked = No
85,777 UART: [state] WD Timer not started. Device not locked for debugging
86,912 UART: [kat] SHA2-256
892,562 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,687 UART: [kat] ++
896,839 UART: [kat] sha1
901,191 UART: [kat] SHA2-256
903,131 UART: [kat] SHA2-384
905,816 UART: [kat] SHA2-512-ACC
907,717 UART: [kat] ECC-384
917,286 UART: [kat] HMAC-384Kdf
921,952 UART: [kat] LMS
1,170,280 UART: [kat] --
1,171,073 UART: [cold-reset] ++
1,171,621 UART: [fht] FHT @ 0x50003400
1,174,446 UART: [idev] ++
1,174,614 UART: [idev] CDI.KEYID = 6
1,174,974 UART: [idev] SUBJECT.KEYID = 7
1,175,398 UART: [idev] UDS.KEYID = 0
1,175,743 ready_for_fw is high
1,175,743 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,550 UART: [idev] Erasing UDS.KEYID = 0
1,200,701 UART: [idev] Sha1 KeyId Algorithm
1,209,001 UART: [idev] --
1,210,183 UART: [ldev] ++
1,210,351 UART: [ldev] CDI.KEYID = 6
1,210,714 UART: [ldev] SUBJECT.KEYID = 5
1,211,140 UART: [ldev] AUTHORITY.KEYID = 7
1,211,603 UART: [ldev] FE.KEYID = 1
1,216,787 UART: [ldev] Erasing FE.KEYID = 1
1,243,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,821 UART: [ldev] --
1,282,142 UART: [fwproc] Wait for Commands...
1,282,892 UART: [fwproc] Recv command 0x46574c44
1,283,620 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,303 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,846 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,150 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,063 >>> mbox cmd response: success
2,773,063 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,774,109 UART: [afmc] ++
2,774,277 UART: [afmc] CDI.KEYID = 6
2,774,639 UART: [afmc] SUBJECT.KEYID = 7
2,775,064 UART: [afmc] AUTHORITY.KEYID = 5
2,811,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,936 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,684 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,412 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,297 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,016 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,894 UART: [afmc] --
2,854,834 UART: [cold-reset] --
2,855,702 UART: [state] Locking Datavault
2,856,675 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,279 UART: [state] Locking ICCM
2,857,767 UART: [exit] Launching FMC @ 0x40000130
2,863,096 UART:
2,863,112 UART: Running Caliptra FMC ...
2,863,520 UART:
2,863,574 UART: [state] CFI Enabled
2,873,999 UART: [fht] FMC Alias Private Key: 7
2,982,148 UART: [art] Extend RT PCRs Done
2,982,576 UART: [art] Lock RT PCRs Done
2,984,036 UART: [art] Populate DV Done
2,991,929 UART: [fht] FMC Alias Private Key: 7
2,993,027 UART: [art] Derive CDI
2,993,307 UART: [art] Store in in slot 0x4
3,078,926 UART: [art] Derive Key Pair
3,079,286 UART: [art] Store priv key in slot 0x5
3,092,862 UART: [art] Derive Key Pair - Done
3,107,581 UART: [art] Signing Cert with AUTHO
3,108,061 UART: RITY.KEYID = 7
3,123,331 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,096 UART: [art] PUB.X = 67FD841CEBA440499D57888CE079447B2767EAA4D7FE4AFE0AA3B4F418D5844F9EC6AF8E4D1A504869ADC3B9A62BB38D
3,130,881 UART: [art] PUB.Y = E502F03C5734AEACBA579C15C547E4A2074434F901D81069421B0409C1EB75C1EB5C9A8906EB6676D74AA527F4D3DE16
3,137,817 UART: [art] SIG.R = 98C023E6CE8D4609BFB954CFB92ED49F3AAD7BD170DEE68D74C30414BA5A7F9D08D3EEBB95BAFFFE84915ADF9DB07DCB
3,144,612 UART: [art] SIG.S = 7EF3CE3E945462F938A8337D1F72EE673F3EA672D8980283D1268712758BCED546F47A4851467FE05AB8D80FA631FC84
3,169,007 UART: Caliptra RT
3,169,260 UART: [state] CFI Enabled
3,277,523 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,179 UART: [rt]cmd =0x50435252, len=8
3,309,853 >>> mbox cmd response data (8 bytes)
3,309,854 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,231 UART: [rt]cmd =0x50435251, len=36
3,506,212 >>> mbox cmd response data (1848 bytes)
3,506,213 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,804 UART: [rt]cmd =0x43455246, len=4
3,547,841 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,705 ready_for_fw is high
1,059,705 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,012 >>> mbox cmd response: success
2,625,012 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,687,630 UART:
2,687,646 UART: Running Caliptra FMC ...
2,688,054 UART:
2,688,108 UART: [state] CFI Enabled
2,698,775 UART: [fht] FMC Alias Private Key: 7
2,806,410 UART: [art] Extend RT PCRs Done
2,806,838 UART: [art] Lock RT PCRs Done
2,808,228 UART: [art] Populate DV Done
2,816,503 UART: [fht] FMC Alias Private Key: 7
2,817,659 UART: [art] Derive CDI
2,817,939 UART: [art] Store in in slot 0x4
2,903,238 UART: [art] Derive Key Pair
2,903,598 UART: [art] Store priv key in slot 0x5
2,916,622 UART: [art] Derive Key Pair - Done
2,931,364 UART: [art] Signing Cert with AUTHO
2,931,844 UART: RITY.KEYID = 7
2,947,348 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,113 UART: [art] PUB.X = 240ED7AFF4622D67A768A164130C4AAA1E42A7302B3558CD2085912A693F9CF5CD3D500F2E9CBA01443F67572948B8CA
2,954,875 UART: [art] PUB.Y = 199D37A1F562AAED6B3AC2B897A9983484C66DE857A956ACDEB2F1CA5E66005CF94BDA6C5EF1675975CDDE44656171FE
2,961,819 UART: [art] SIG.R = 34682861646A95AD730AE567CCAAF4F83CF98A64DD0DF6C7B1CEA7ACC861A97BAB25B07007C4F34C3FF73296546AB8B2
2,968,596 UART: [art] SIG.S = A61ACEC7141BB9614E0399A7C2EBE016E63480D5FF246FCF4DDA390F6269035BF0D6A420C73EF124AD76429F0EB05698
2,993,075 UART: Caliptra RT
2,993,328 UART: [state] CFI Enabled
3,102,045 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,617 UART: [rt]cmd =0x50435252, len=8
3,134,237 >>> mbox cmd response data (8 bytes)
3,134,238 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,919 UART: [rt]cmd =0x50435251, len=36
3,331,156 >>> mbox cmd response data (1848 bytes)
3,331,157 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,426 UART: [rt]cmd =0x43455246, len=4
3,372,435 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
893,547 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,672 UART: [kat] ++
897,824 UART: [kat] sha1
902,044 UART: [kat] SHA2-256
903,984 UART: [kat] SHA2-384
906,729 UART: [kat] SHA2-512-ACC
908,630 UART: [kat] ECC-384
918,341 UART: [kat] HMAC-384Kdf
923,007 UART: [kat] LMS
1,171,335 UART: [kat] --
1,172,358 UART: [cold-reset] ++
1,172,912 UART: [fht] FHT @ 0x50003400
1,175,523 UART: [idev] ++
1,175,691 UART: [idev] CDI.KEYID = 6
1,176,051 UART: [idev] SUBJECT.KEYID = 7
1,176,475 UART: [idev] UDS.KEYID = 0
1,176,820 ready_for_fw is high
1,176,820 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,525 UART: [idev] Erasing UDS.KEYID = 0
1,201,296 UART: [idev] Sha1 KeyId Algorithm
1,209,666 UART: [idev] --
1,210,908 UART: [ldev] ++
1,211,076 UART: [ldev] CDI.KEYID = 6
1,211,439 UART: [ldev] SUBJECT.KEYID = 5
1,211,865 UART: [ldev] AUTHORITY.KEYID = 7
1,212,328 UART: [ldev] FE.KEYID = 1
1,217,522 UART: [ldev] Erasing FE.KEYID = 1
1,244,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,166 UART: [ldev] --
1,283,507 UART: [fwproc] Wait for Commands...
1,284,131 UART: [fwproc] Recv command 0x46574c44
1,284,859 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,940 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,797 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,796 >>> mbox cmd response: success
2,774,796 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,775,918 UART: [afmc] ++
2,776,086 UART: [afmc] CDI.KEYID = 6
2,776,448 UART: [afmc] SUBJECT.KEYID = 7
2,776,873 UART: [afmc] AUTHORITY.KEYID = 5
2,812,286 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,639 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,367 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,252 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,971 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,845 UART: [afmc] --
2,855,963 UART: [cold-reset] --
2,856,967 UART: [state] Locking Datavault
2,858,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,734 UART: [state] Locking ICCM
2,859,330 UART: [exit] Launching FMC @ 0x40000130
2,864,659 UART:
2,864,675 UART: Running Caliptra FMC ...
2,865,083 UART:
2,865,226 UART: [state] CFI Enabled
2,875,851 UART: [fht] FMC Alias Private Key: 7
2,983,556 UART: [art] Extend RT PCRs Done
2,983,984 UART: [art] Lock RT PCRs Done
2,985,302 UART: [art] Populate DV Done
2,993,625 UART: [fht] FMC Alias Private Key: 7
2,994,557 UART: [art] Derive CDI
2,994,837 UART: [art] Store in in slot 0x4
3,080,334 UART: [art] Derive Key Pair
3,080,694 UART: [art] Store priv key in slot 0x5
3,094,082 UART: [art] Derive Key Pair - Done
3,108,769 UART: [art] Signing Cert with AUTHO
3,109,249 UART: RITY.KEYID = 7
3,124,339 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,104 UART: [art] PUB.X = CE35DE2664AC1A58F8E14268CC274AB04BBFD10D1ACAC57812CBA6C6B9C6FF35AC0B20502A96FCB4F86055D05CA43766
3,131,888 UART: [art] PUB.Y = 71D86A79BEBCED8DF185343FF485068A87C80E82732878C50378DC2001F5D9A9FC16A2C2461D22B0E645CF63A7C19944
3,138,828 UART: [art] SIG.R = 1FA6C14DBBF43156ECCAE332B275602DF43B12A084D0081D13BDB406802E262F8FEDDF310EFC10EC04BB6FFC10960E3B
3,145,603 UART: [art] SIG.S = 96F4D199B760C0879B4E83B87B1E2308D2BCC3909E87FE48749F749649BE27D7D34F4108637400686465D3D98962F9EE
3,169,834 UART: Caliptra RT
3,170,179 UART: [state] CFI Enabled
3,279,118 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,608 UART: [rt]cmd =0x50435252, len=8
3,311,294 >>> mbox cmd response data (8 bytes)
3,311,295 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,898 UART: [rt]cmd =0x50435251, len=36
3,508,161 >>> mbox cmd response data (1848 bytes)
3,508,162 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,511 UART: [rt]cmd =0x43455246, len=4
3,549,642 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,680 ready_for_fw is high
1,060,680 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,473 >>> mbox cmd response: success
2,628,473 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,691,075 UART:
2,691,091 UART: Running Caliptra FMC ...
2,691,499 UART:
2,691,642 UART: [state] CFI Enabled
2,702,555 UART: [fht] FMC Alias Private Key: 7
2,809,664 UART: [art] Extend RT PCRs Done
2,810,092 UART: [art] Lock RT PCRs Done
2,811,418 UART: [art] Populate DV Done
2,819,523 UART: [fht] FMC Alias Private Key: 7
2,820,593 UART: [art] Derive CDI
2,820,873 UART: [art] Store in in slot 0x4
2,906,258 UART: [art] Derive Key Pair
2,906,618 UART: [art] Store priv key in slot 0x5
2,920,588 UART: [art] Derive Key Pair - Done
2,935,529 UART: [art] Signing Cert with AUTHO
2,936,009 UART: RITY.KEYID = 7
2,951,823 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,588 UART: [art] PUB.X = DE2F3F273A0A22C0F30EC867013470257515CE8C4B4760E85BDB9D5654853258CB62181FD6969DBE3BE20E5D0628CF9E
2,959,347 UART: [art] PUB.Y = 115F814E2EE22BDA207299AB1A69129746FCEA7D1280D97ABE9DE314958FDF27BEB1F450D0EF7F2F6D61F445817329D0
2,966,307 UART: [art] SIG.R = 31761284B311578A3BB7DF1029C25E07C97585FEE87618C15E0968F7607040BF425BB31FEE08F529485256E685794386
2,973,054 UART: [art] SIG.S = F1F104BDCD7E13804A38EA86EA2ABB6BA1A5B50B8D116469FBF2E523F600B434110EB5386A77EECC8E098CD8E6759F24
2,997,239 UART: Caliptra RT
2,997,584 UART: [state] CFI Enabled
3,105,581 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,213 UART: [rt]cmd =0x50435252, len=8
3,137,985 >>> mbox cmd response data (8 bytes)
3,137,986 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,637 UART: [rt]cmd =0x50435251, len=36
3,335,200 >>> mbox cmd response data (1848 bytes)
3,335,201 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,590 UART: [rt]cmd =0x43455246, len=4
3,376,587 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,720 UART: [state] LifecycleState = Unprovisioned
85,375 UART: [state] DebugLocked = No
85,873 UART: [state] WD Timer not started. Device not locked for debugging
87,134 UART: [kat] SHA2-256
890,684 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,813 UART: [kat] ++
894,965 UART: [kat] sha1
899,101 UART: [kat] SHA2-256
901,041 UART: [kat] SHA2-384
903,838 UART: [kat] SHA2-512-ACC
905,739 UART: [kat] ECC-384
915,510 UART: [kat] HMAC-384Kdf
919,990 UART: [kat] LMS
1,168,302 UART: [kat] --
1,169,351 UART: [cold-reset] ++
1,169,711 UART: [fht] FHT @ 0x50003400
1,172,387 UART: [idev] ++
1,172,555 UART: [idev] CDI.KEYID = 6
1,172,916 UART: [idev] SUBJECT.KEYID = 7
1,173,341 UART: [idev] UDS.KEYID = 0
1,173,687 ready_for_fw is high
1,173,687 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,673 UART: [idev] Erasing UDS.KEYID = 0
1,198,299 UART: [idev] Sha1 KeyId Algorithm
1,207,067 UART: [idev] --
1,207,900 UART: [ldev] ++
1,208,068 UART: [ldev] CDI.KEYID = 6
1,208,432 UART: [ldev] SUBJECT.KEYID = 5
1,208,859 UART: [ldev] AUTHORITY.KEYID = 7
1,209,322 UART: [ldev] FE.KEYID = 1
1,214,810 UART: [ldev] Erasing FE.KEYID = 1
1,241,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,174 UART: [ldev] --
1,280,600 UART: [fwproc] Wait for Commands...
1,281,285 UART: [fwproc] Recv command 0x46574c44
1,282,018 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,404 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,713 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,557 >>> mbox cmd response: success
2,771,557 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,772,704 UART: [afmc] ++
2,772,872 UART: [afmc] CDI.KEYID = 6
2,773,235 UART: [afmc] SUBJECT.KEYID = 7
2,773,661 UART: [afmc] AUTHORITY.KEYID = 5
2,808,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,228 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,979 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,708 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,591 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,310 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,989 UART: [afmc] --
2,851,997 UART: [cold-reset] --
2,853,137 UART: [state] Locking Datavault
2,854,324 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,928 UART: [state] Locking ICCM
2,855,490 UART: [exit] Launching FMC @ 0x40000130
2,860,819 UART:
2,860,835 UART: Running Caliptra FMC ...
2,861,243 UART:
2,861,297 UART: [state] CFI Enabled
2,871,534 UART: [fht] FMC Alias Private Key: 7
2,978,833 UART: [art] Extend RT PCRs Done
2,979,261 UART: [art] Lock RT PCRs Done
2,981,009 UART: [art] Populate DV Done
2,989,202 UART: [fht] FMC Alias Private Key: 7
2,990,242 UART: [art] Derive CDI
2,990,522 UART: [art] Store in in slot 0x4
3,076,153 UART: [art] Derive Key Pair
3,076,513 UART: [art] Store priv key in slot 0x5
3,089,673 UART: [art] Derive Key Pair - Done
3,104,649 UART: [art] Signing Cert with AUTHO
3,105,129 UART: RITY.KEYID = 7
3,120,757 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,522 UART: [art] PUB.X = AFF5549DC297860D187CDBEAA00E8CB508969C6299D73631B776E25DFC662D239F04F7D357428CB3FB1944A75F802D98
3,128,284 UART: [art] PUB.Y = 0435F6C849FC6E961A2F2DB18CA93A8E54C1F5811B36CB17AF12B0838C7B494A1B5D03377FEA7D833CDE6985CD41FBA9
3,135,242 UART: [art] SIG.R = 925017C899D5ABA526D35E7C2CC9C495AF2A0706FD0A4F4BDAE6E78C3A204BDB1001F45DD678143E4A54559A0A71A39E
3,142,009 UART: [art] SIG.S = 6DFFCD7210B6B2254FD7EE36BA95DFDC9F8137046F3E6AAFE634EBE0D25AEE3F5ECDF98979C10B174C51FC112F74C086
3,165,430 UART: Caliptra RT
3,165,683 UART: [state] CFI Enabled
3,271,210 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,864 UART: [rt]cmd =0x50435252, len=8
3,303,508 >>> mbox cmd response data (8 bytes)
3,303,509 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,333,258 UART: [rt]cmd =0x50435251, len=36
3,500,711 >>> mbox cmd response data (1848 bytes)
3,500,712 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,175 UART: [rt]cmd =0x43455246, len=4
3,542,188 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,284 ready_for_fw is high
1,056,284 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,469 >>> mbox cmd response: success
2,623,469 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,685,039 UART:
2,685,055 UART: Running Caliptra FMC ...
2,685,463 UART:
2,685,517 UART: [state] CFI Enabled
2,695,936 UART: [fht] FMC Alias Private Key: 7
2,803,599 UART: [art] Extend RT PCRs Done
2,804,027 UART: [art] Lock RT PCRs Done
2,805,505 UART: [art] Populate DV Done
2,813,684 UART: [fht] FMC Alias Private Key: 7
2,814,612 UART: [art] Derive CDI
2,814,892 UART: [art] Store in in slot 0x4
2,900,417 UART: [art] Derive Key Pair
2,900,777 UART: [art] Store priv key in slot 0x5
2,913,547 UART: [art] Derive Key Pair - Done
2,928,542 UART: [art] Signing Cert with AUTHO
2,929,022 UART: RITY.KEYID = 7
2,944,200 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,965 UART: [art] PUB.X = 6B99E82CC5AD10F18BCA8A1E422D9D0C1AE6AD096AD4DC2B1F2BE9A3450885116D809CCAC37786F2F5558345E0EE8503
2,951,737 UART: [art] PUB.Y = 9962651ABB2DC3D5B090B734410312E0D17D6886F85600F4CC19FE5C020209CE9E0FA769CB0D5A4622F2A298EAF283DE
2,958,653 UART: [art] SIG.R = B1623731604D75F448C9D24A635B3CA4579DD2013762760871AA71E6952C74597A3E702D5C339FF8B40C31474DECB241
2,965,406 UART: [art] SIG.S = 97D9772D47FA090CE55E21CE3AB30BB7FD6128BD848B087AC6FFCB8A10C1CBB8ED63671B3417657DF959C75E4B92EC47
2,989,183 UART: Caliptra RT
2,989,436 UART: [state] CFI Enabled
3,097,708 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,154 UART: [rt]cmd =0x50435252, len=8
3,129,696 >>> mbox cmd response data (8 bytes)
3,129,697 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,230 UART: [rt]cmd =0x50435251, len=36
3,326,509 >>> mbox cmd response data (1848 bytes)
3,326,510 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,355,627 UART: [rt]cmd =0x43455246, len=4
3,367,882 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,704 UART: [kat] ++
895,856 UART: [kat] sha1
900,034 UART: [kat] SHA2-256
901,974 UART: [kat] SHA2-384
904,495 UART: [kat] SHA2-512-ACC
906,396 UART: [kat] ECC-384
916,355 UART: [kat] HMAC-384Kdf
921,011 UART: [kat] LMS
1,169,323 UART: [kat] --
1,170,192 UART: [cold-reset] ++
1,170,704 UART: [fht] FHT @ 0x50003400
1,173,218 UART: [idev] ++
1,173,386 UART: [idev] CDI.KEYID = 6
1,173,747 UART: [idev] SUBJECT.KEYID = 7
1,174,172 UART: [idev] UDS.KEYID = 0
1,174,518 ready_for_fw is high
1,174,518 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,030 UART: [idev] Erasing UDS.KEYID = 0
1,199,138 UART: [idev] Sha1 KeyId Algorithm
1,208,096 UART: [idev] --
1,209,073 UART: [ldev] ++
1,209,241 UART: [ldev] CDI.KEYID = 6
1,209,605 UART: [ldev] SUBJECT.KEYID = 5
1,210,032 UART: [ldev] AUTHORITY.KEYID = 7
1,210,495 UART: [ldev] FE.KEYID = 1
1,215,937 UART: [ldev] Erasing FE.KEYID = 1
1,241,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,807 UART: [ldev] --
1,281,127 UART: [fwproc] Wait for Commands...
1,281,842 UART: [fwproc] Recv command 0x46574c44
1,282,575 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,453 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,762 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,682 >>> mbox cmd response: success
2,772,682 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,773,849 UART: [afmc] ++
2,774,017 UART: [afmc] CDI.KEYID = 6
2,774,380 UART: [afmc] SUBJECT.KEYID = 7
2,774,806 UART: [afmc] AUTHORITY.KEYID = 5
2,810,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,282 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,011 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,894 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,613 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,574 UART: [afmc] --
2,853,640 UART: [cold-reset] --
2,854,604 UART: [state] Locking Datavault
2,856,021 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,625 UART: [state] Locking ICCM
2,857,057 UART: [exit] Launching FMC @ 0x40000130
2,862,386 UART:
2,862,402 UART: Running Caliptra FMC ...
2,862,810 UART:
2,862,953 UART: [state] CFI Enabled
2,873,738 UART: [fht] FMC Alias Private Key: 7
2,981,135 UART: [art] Extend RT PCRs Done
2,981,563 UART: [art] Lock RT PCRs Done
2,983,117 UART: [art] Populate DV Done
2,991,326 UART: [fht] FMC Alias Private Key: 7
2,992,460 UART: [art] Derive CDI
2,992,740 UART: [art] Store in in slot 0x4
3,078,439 UART: [art] Derive Key Pair
3,078,799 UART: [art] Store priv key in slot 0x5
3,092,339 UART: [art] Derive Key Pair - Done
3,107,024 UART: [art] Signing Cert with AUTHO
3,107,504 UART: RITY.KEYID = 7
3,122,886 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,651 UART: [art] PUB.X = D549D1E366B8B62DC701A76622DF6D6024F870321BF0D5A0E6DFE4CE2D65DD16EE82827E0E7AAA896D5401841149AE00
3,130,398 UART: [art] PUB.Y = 6B32E4AF1AF56FA5E95902D3F6742EFC3D7E95CC13715549059D28C61EA03E05741572A547D4000FC8C3AE2B63A61528
3,137,316 UART: [art] SIG.R = 1D531462F0F20455E5BAB68739E53F3B244D2667B9FDEEB7FFC3993AD4CA32B29740481CE90FAD5D3EBF2A2DC5CD77D7
3,144,098 UART: [art] SIG.S = 9D0C4831361B817C749457BC06782EC87BB78DD96F053BF0F98C121015A40BFF8CEDA1FD696F451B0CDA4CAA607EDBD6
3,167,686 UART: Caliptra RT
3,168,031 UART: [state] CFI Enabled
3,275,212 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,658 UART: [rt]cmd =0x50435252, len=8
3,307,156 >>> mbox cmd response data (8 bytes)
3,307,157 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,886 UART: [rt]cmd =0x50435251, len=36
3,504,177 >>> mbox cmd response data (1848 bytes)
3,504,178 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,711 UART: [rt]cmd =0x43455246, len=4
3,545,666 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,945 ready_for_fw is high
1,056,945 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,564 >>> mbox cmd response: success
2,623,564 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,685,386 UART:
2,685,402 UART: Running Caliptra FMC ...
2,685,810 UART:
2,685,953 UART: [state] CFI Enabled
2,696,566 UART: [fht] FMC Alias Private Key: 7
2,804,203 UART: [art] Extend RT PCRs Done
2,804,631 UART: [art] Lock RT PCRs Done
2,806,083 UART: [art] Populate DV Done
2,814,368 UART: [fht] FMC Alias Private Key: 7
2,815,402 UART: [art] Derive CDI
2,815,682 UART: [art] Store in in slot 0x4
2,901,145 UART: [art] Derive Key Pair
2,901,505 UART: [art] Store priv key in slot 0x5
2,914,937 UART: [art] Derive Key Pair - Done
2,929,526 UART: [art] Signing Cert with AUTHO
2,930,006 UART: RITY.KEYID = 7
2,945,206 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,971 UART: [art] PUB.X = ABFB4E7E4DF98B21C590900961428BE7537E4E6575554FFD15627A08A3E32C4ADE3AF3B2246D9D1D34E6949807B2717A
2,952,736 UART: [art] PUB.Y = 3C904384CF9062300C7D517D56B71253968A702B7DBE3167CB92AAD4F3B4E7D7E66F53502E941BB88E598FFC0A787968
2,959,680 UART: [art] SIG.R = 73E1558C0F245E39C6401DDFB337F38F807B6ADDD4729334098770645C4DED4C9CAB87F066D47F7605011B2B74F06809
2,966,433 UART: [art] SIG.S = F514725B3535C8C8AB11E2E580C641F350EB0A017B9782FCEC38317B72E80DA099084D7A351B1FC35248A9F95149CA24
2,989,956 UART: Caliptra RT
2,990,301 UART: [state] CFI Enabled
3,097,838 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,284 UART: [rt]cmd =0x50435252, len=8
3,129,810 >>> mbox cmd response data (8 bytes)
3,129,811 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,264 UART: [rt]cmd =0x50435251, len=36
3,326,937 >>> mbox cmd response data (1848 bytes)
3,326,938 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,249 UART: [rt]cmd =0x43455246, len=4
3,368,378 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,141 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,769 UART: [kat] SHA2-256
881,700 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,815 UART: [kat] ++
885,967 UART: [kat] sha1
890,197 UART: [kat] SHA2-256
892,135 UART: [kat] SHA2-384
894,770 UART: [kat] SHA2-512-ACC
896,671 UART: [kat] ECC-384
902,132 UART: [kat] HMAC-384Kdf
906,608 UART: [kat] LMS
1,474,804 UART: [kat] --
1,475,885 UART: [cold-reset] ++
1,476,401 UART: [fht] Storing FHT @ 0x50003400
1,479,228 UART: [idev] ++
1,479,396 UART: [idev] CDI.KEYID = 6
1,479,756 UART: [idev] SUBJECT.KEYID = 7
1,480,180 UART: [idev] UDS.KEYID = 0
1,480,525 ready_for_fw is high
1,480,525 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,078 UART: [idev] Erasing UDS.KEYID = 0
1,504,746 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,374 UART: [idev] --
1,514,559 UART: [ldev] ++
1,514,727 UART: [ldev] CDI.KEYID = 6
1,515,090 UART: [ldev] SUBJECT.KEYID = 5
1,515,516 UART: [ldev] AUTHORITY.KEYID = 7
1,515,979 UART: [ldev] FE.KEYID = 1
1,521,287 UART: [ldev] Erasing FE.KEYID = 1
1,546,622 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,014 UART: [ldev] --
1,585,521 UART: [fwproc] Waiting for Commands...
1,586,214 UART: [fwproc] Received command 0x46574c44
1,587,005 UART: [fwproc] Received Image of size 114332 bytes
2,884,007 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,465 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,817 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,712 >>> mbox cmd response: success
3,077,924 UART: [afmc] ++
3,078,092 UART: [afmc] CDI.KEYID = 6
3,078,454 UART: [afmc] SUBJECT.KEYID = 7
3,078,879 UART: [afmc] AUTHORITY.KEYID = 5
3,113,982 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,926 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,706 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,434 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,319 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,009 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,768 UART: [afmc] --
3,156,788 UART: [cold-reset] --
3,157,644 UART: [state] Locking Datavault
3,158,901 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,505 UART: [state] Locking ICCM
3,160,129 UART: [exit] Launching FMC @ 0x40000130
3,165,458 UART:
3,165,474 UART: Running Caliptra FMC ...
3,165,882 UART:
3,165,936 UART: [state] CFI Enabled
3,176,439 UART: [fht] FMC Alias Private Key: 7
3,283,520 UART: [art] Extend RT PCRs Done
3,283,948 UART: [art] Lock RT PCRs Done
3,285,420 UART: [art] Populate DV Done
3,293,627 UART: [fht] FMC Alias Private Key: 7
3,294,605 UART: [art] Derive CDI
3,294,885 UART: [art] Store in in slot 0x4
3,380,224 UART: [art] Derive Key Pair
3,380,584 UART: [art] Store priv key in slot 0x5
3,393,160 UART: [art] Derive Key Pair - Done
3,407,849 UART: [art] Signing Cert with AUTHO
3,408,329 UART: RITY.KEYID = 7
3,423,101 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,866 UART: [art] PUB.X = C5CF2C9B9355F60D250C8969C21487C1C5DE555981F20998888B640B94A9E5509804DA8EAE3A34F34364FD7DB66B7F82
3,430,621 UART: [art] PUB.Y = 9A2232A35B8C070C3652AB7F7A550D66B55DFAB0E835F4F0D5E18381E7C2F07DF6EEBD49C6E71C4F35F1365E7A3FEE35
3,437,578 UART: [art] SIG.R = 9CE48F6BF84C3C72ED5B553BF8582628C5FE7352A555C24518E10C00AB8E3854034DCF530D33C65D4108B2599D5AD250
3,444,316 UART: [art] SIG.S = 8091ABBDEF661143CD855E6E0C3E93B64B63D5EF1C13D86CD6B95BA810617CE81A1A945E9F9E88FBA1B8C859B959B75A
3,468,182 UART: Caliptra RT
3,468,435 UART: [state] CFI Enabled
3,576,091 UART: [rt] RT listening for mailbox commands...
3,576,761 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,875 UART: [rt]cmd =0x44504543, len=28
3,649,887 >>> mbox cmd response data (2076 bytes)
3,649,888 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,679,227 UART: [rt]cmd =0x44504543, len=28
3,720,475 >>> mbox cmd response data (2076 bytes)
3,720,476 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,025 UART: [rt]cmd =0x49444550, len=352
3,762,852 >>> mbox cmd response data (8 bytes)
3,762,853 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,404 UART: [rt]cmd =0x44504543, len=28
3,835,608 >>> mbox cmd response data (2076 bytes)
3,835,609 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,126 UART: [rt]cmd =0x44504543, len=28
3,906,460 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,857 ready_for_fw is high
1,361,857 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,214 >>> mbox cmd response: success
2,988,442 UART:
2,988,458 UART: Running Caliptra FMC ...
2,988,866 UART:
2,988,920 UART: [state] CFI Enabled
2,999,573 UART: [fht] FMC Alias Private Key: 7
3,107,718 UART: [art] Extend RT PCRs Done
3,108,146 UART: [art] Lock RT PCRs Done
3,109,424 UART: [art] Populate DV Done
3,117,381 UART: [fht] FMC Alias Private Key: 7
3,118,527 UART: [art] Derive CDI
3,118,807 UART: [art] Store in in slot 0x4
3,204,312 UART: [art] Derive Key Pair
3,204,672 UART: [art] Store priv key in slot 0x5
3,217,440 UART: [art] Derive Key Pair - Done
3,231,958 UART: [art] Signing Cert with AUTHO
3,232,438 UART: RITY.KEYID = 7
3,247,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,371 UART: [art] PUB.X = BB6501A5F57950B0D673D0BAA678FEED9BAB02D4B618E40C91DEE5C869F9DE12F2AF53A7ED4CBEF65CF3E0D2A65FDF86
3,255,162 UART: [art] PUB.Y = CE707D4CA209FEA0742CEFB758EE3B619E33F03C410ACA2874262AAE75BAD69AE691516BDD285042668403131A4C3A71
3,262,111 UART: [art] SIG.R = 36C73B2CC66719461EC0FB30126D17EF48F6E78BC55030FE83112B0905DA1D2424D99C9F91D046700A23E6257C85B0AD
3,268,872 UART: [art] SIG.S = FB2C8FAE8F8E3FD7FFB7473C62FBEAD5D1C4F39B33D3EFDE42F38629A8E6551C644BF6C7FEB075C1ED880F6FDAD81B73
3,292,716 UART: Caliptra RT
3,292,969 UART: [state] CFI Enabled
3,401,334 UART: [rt] RT listening for mailbox commands...
3,402,004 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,960 UART: [rt]cmd =0x44504543, len=28
3,474,950 >>> mbox cmd response data (2076 bytes)
3,474,951 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,504,420 UART: [rt]cmd =0x44504543, len=28
3,546,169 >>> mbox cmd response data (2076 bytes)
3,546,170 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,710 UART: [rt]cmd =0x49444550, len=353
3,590,838 >>> mbox cmd response data (8 bytes)
3,590,839 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,416 UART: [rt]cmd =0x44504543, len=28
3,663,798 >>> mbox cmd response data (2076 bytes)
3,663,799 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,693,432 UART: [rt]cmd =0x44504543, len=28
3,735,142 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,496 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,044 UART: [kat] SHA2-256
881,975 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,090 UART: [kat] ++
886,242 UART: [kat] sha1
890,660 UART: [kat] SHA2-256
892,598 UART: [kat] SHA2-384
895,431 UART: [kat] SHA2-512-ACC
897,332 UART: [kat] ECC-384
903,223 UART: [kat] HMAC-384Kdf
907,977 UART: [kat] LMS
1,476,173 UART: [kat] --
1,477,242 UART: [cold-reset] ++
1,477,584 UART: [fht] Storing FHT @ 0x50003400
1,480,357 UART: [idev] ++
1,480,525 UART: [idev] CDI.KEYID = 6
1,480,885 UART: [idev] SUBJECT.KEYID = 7
1,481,309 UART: [idev] UDS.KEYID = 0
1,481,654 ready_for_fw is high
1,481,654 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,753 UART: [idev] Erasing UDS.KEYID = 0
1,506,077 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,771 UART: [idev] --
1,515,656 UART: [ldev] ++
1,515,824 UART: [ldev] CDI.KEYID = 6
1,516,187 UART: [ldev] SUBJECT.KEYID = 5
1,516,613 UART: [ldev] AUTHORITY.KEYID = 7
1,517,076 UART: [ldev] FE.KEYID = 1
1,522,458 UART: [ldev] Erasing FE.KEYID = 1
1,547,865 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,875 UART: [ldev] --
1,587,358 UART: [fwproc] Waiting for Commands...
1,587,993 UART: [fwproc] Received command 0x46574c44
1,588,784 UART: [fwproc] Received Image of size 114332 bytes
2,885,860 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,912 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,264 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,011 >>> mbox cmd response: success
3,079,107 UART: [afmc] ++
3,079,275 UART: [afmc] CDI.KEYID = 6
3,079,637 UART: [afmc] SUBJECT.KEYID = 7
3,080,062 UART: [afmc] AUTHORITY.KEYID = 5
3,115,715 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,909 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,689 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,417 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,302 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,992 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,029 UART: [afmc] --
3,159,043 UART: [cold-reset] --
3,159,917 UART: [state] Locking Datavault
3,160,928 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,532 UART: [state] Locking ICCM
3,162,018 UART: [exit] Launching FMC @ 0x40000130
3,167,347 UART:
3,167,363 UART: Running Caliptra FMC ...
3,167,771 UART:
3,167,914 UART: [state] CFI Enabled
3,178,661 UART: [fht] FMC Alias Private Key: 7
3,286,340 UART: [art] Extend RT PCRs Done
3,286,768 UART: [art] Lock RT PCRs Done
3,288,084 UART: [art] Populate DV Done
3,296,537 UART: [fht] FMC Alias Private Key: 7
3,297,529 UART: [art] Derive CDI
3,297,809 UART: [art] Store in in slot 0x4
3,383,626 UART: [art] Derive Key Pair
3,383,986 UART: [art] Store priv key in slot 0x5
3,398,178 UART: [art] Derive Key Pair - Done
3,412,876 UART: [art] Signing Cert with AUTHO
3,413,356 UART: RITY.KEYID = 7
3,428,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,285 UART: [art] PUB.X = DF50CBDC65DAAFBDC40D70285C9DF53779E162135780A11EE3A277C586DE2EAEA809B31CC4055F807BED6F94D6119B6C
3,436,064 UART: [art] PUB.Y = 222C6D976762E98FA46C06E7D1CE5D909C0048523F6AD89CE7BC91BFF782D571F9E86BD15C3407A7083F190FFE8D62CA
3,442,990 UART: [art] SIG.R = A1542472CE785FFE25CFFC55A528C17D977747AB01AB4A7A312E2D03761517D4612609466630C84520811D1A68EF65BF
3,449,747 UART: [art] SIG.S = 6BA3AF40C1CD466E5F621E7C0E7E96B4E58FB0FF0E0267786B941262E44A4E433C157CA4D91FC99405928C945F6D519E
3,473,122 UART: Caliptra RT
3,473,467 UART: [state] CFI Enabled
3,582,442 UART: [rt] RT listening for mailbox commands...
3,583,112 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,422 UART: [rt]cmd =0x44504543, len=28
3,656,348 >>> mbox cmd response data (2076 bytes)
3,656,349 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,602 UART: [rt]cmd =0x44504543, len=28
3,726,645 >>> mbox cmd response data (2076 bytes)
3,726,646 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,253 UART: [rt]cmd =0x49444550, len=352
3,769,197 >>> mbox cmd response data (8 bytes)
3,769,198 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,798,595 UART: [rt]cmd =0x44504543, len=28
3,841,737 >>> mbox cmd response data (2076 bytes)
3,841,738 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,871,109 UART: [rt]cmd =0x44504543, len=28
3,912,408 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,812 ready_for_fw is high
1,362,812 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,917 >>> mbox cmd response: success
2,991,417 UART:
2,991,433 UART: Running Caliptra FMC ...
2,991,841 UART:
2,991,984 UART: [state] CFI Enabled
3,002,579 UART: [fht] FMC Alias Private Key: 7
3,110,692 UART: [art] Extend RT PCRs Done
3,111,120 UART: [art] Lock RT PCRs Done
3,112,650 UART: [art] Populate DV Done
3,121,043 UART: [fht] FMC Alias Private Key: 7
3,122,195 UART: [art] Derive CDI
3,122,475 UART: [art] Store in in slot 0x4
3,207,776 UART: [art] Derive Key Pair
3,208,136 UART: [art] Store priv key in slot 0x5
3,221,962 UART: [art] Derive Key Pair - Done
3,237,492 UART: [art] Signing Cert with AUTHO
3,237,972 UART: RITY.KEYID = 7
3,253,238 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,003 UART: [art] PUB.X = 0159B7EA99F7A3785FF9131C7ACFA8305B8C1D23C62F1F7294E04675C64B0BB6449E90D4D49E41E396D2A327CA6DDD7E
3,260,777 UART: [art] PUB.Y = 78176BAAAA47FECD2741A4A04DA066B9ECA12199DB1C1957835881BCD520BE8943E7F129F12291243B94F4AC3AC59A5E
3,267,737 UART: [art] SIG.R = E0E22CAED714A0ABA4FFE8C1D35E88E7DE0DFCCDB9411F058122C8305FA9F47DC0C423FD30E9B22809ED13389C862737
3,274,516 UART: [art] SIG.S = B3E9C3B25357AFA94C7891A0B5BC26B2D3A2CB6AEFC86005B87DB2AB15711BDE7F18A231B3921EB52EE45BA4492BC5F6
3,298,816 UART: Caliptra RT
3,299,161 UART: [state] CFI Enabled
3,408,249 UART: [rt] RT listening for mailbox commands...
3,408,919 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,051 UART: [rt]cmd =0x44504543, len=28
3,482,221 >>> mbox cmd response data (2076 bytes)
3,482,222 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,511,759 UART: [rt]cmd =0x44504543, len=28
3,552,793 >>> mbox cmd response data (2076 bytes)
3,552,794 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,368 UART: [rt]cmd =0x49444550, len=353
3,597,449 >>> mbox cmd response data (8 bytes)
3,597,450 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,915 UART: [rt]cmd =0x44504543, len=28
3,669,619 >>> mbox cmd response data (2076 bytes)
3,669,620 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,179 UART: [rt]cmd =0x44504543, len=28
3,740,522 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Unprovisioned
86,057 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
893,420 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,545 UART: [kat] ++
897,697 UART: [kat] sha1
901,951 UART: [kat] SHA2-256
903,891 UART: [kat] SHA2-384
906,470 UART: [kat] SHA2-512-ACC
908,371 UART: [kat] ECC-384
917,884 UART: [kat] HMAC-384Kdf
922,560 UART: [kat] LMS
1,170,888 UART: [kat] --
1,171,593 UART: [cold-reset] ++
1,171,971 UART: [fht] FHT @ 0x50003400
1,174,692 UART: [idev] ++
1,174,860 UART: [idev] CDI.KEYID = 6
1,175,220 UART: [idev] SUBJECT.KEYID = 7
1,175,644 UART: [idev] UDS.KEYID = 0
1,175,989 ready_for_fw is high
1,175,989 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,300 UART: [idev] Erasing UDS.KEYID = 0
1,200,563 UART: [idev] Sha1 KeyId Algorithm
1,208,983 UART: [idev] --
1,210,043 UART: [ldev] ++
1,210,211 UART: [ldev] CDI.KEYID = 6
1,210,574 UART: [ldev] SUBJECT.KEYID = 5
1,211,000 UART: [ldev] AUTHORITY.KEYID = 7
1,211,463 UART: [ldev] FE.KEYID = 1
1,216,785 UART: [ldev] Erasing FE.KEYID = 1
1,242,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,699 UART: [ldev] --
1,282,006 UART: [fwproc] Wait for Commands...
1,282,740 UART: [fwproc] Recv command 0x46574c44
1,283,468 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,674 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,978 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,915 >>> mbox cmd response: success
2,775,163 UART: [afmc] ++
2,775,331 UART: [afmc] CDI.KEYID = 6
2,775,693 UART: [afmc] SUBJECT.KEYID = 7
2,776,118 UART: [afmc] AUTHORITY.KEYID = 5
2,811,485 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,872 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,620 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,348 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,233 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,952 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,822 UART: [afmc] --
2,854,900 UART: [cold-reset] --
2,855,612 UART: [state] Locking Datavault
2,856,993 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,597 UART: [state] Locking ICCM
2,858,025 UART: [exit] Launching FMC @ 0x40000130
2,863,354 UART:
2,863,370 UART: Running Caliptra FMC ...
2,863,778 UART:
2,863,832 UART: [state] CFI Enabled
2,874,317 UART: [fht] FMC Alias Private Key: 7
2,982,718 UART: [art] Extend RT PCRs Done
2,983,146 UART: [art] Lock RT PCRs Done
2,984,554 UART: [art] Populate DV Done
2,992,809 UART: [fht] FMC Alias Private Key: 7
2,993,771 UART: [art] Derive CDI
2,994,051 UART: [art] Store in in slot 0x4
3,080,078 UART: [art] Derive Key Pair
3,080,438 UART: [art] Store priv key in slot 0x5
3,093,716 UART: [art] Derive Key Pair - Done
3,108,432 UART: [art] Signing Cert with AUTHO
3,108,912 UART: RITY.KEYID = 7
3,123,888 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,653 UART: [art] PUB.X = F1493439BD611BE4451DE72FDE9462E00EB6D6A3F6933E22E2406F85A28E44DC45B10429357A908CAB35D3EF35C3A816
3,131,421 UART: [art] PUB.Y = 75CFFE17E6B41070605B96790D99907F17740D7FE62C273F70AE5B90CCB8E36DE41964CC41FD862B9877B58B2337EB6F
3,138,369 UART: [art] SIG.R = 72A52F5F05EA2FB67B39BE9A6C91FA24A9398A7A15C638C3FB652DFB282EC766243773B367321D552AC697564C2E8E95
3,145,140 UART: [art] SIG.S = 4B774706BEE359F439BB452D87F38E4AA3FDE1DD3C10960A9F6A40B21D819D03671B1E5A803DA7BEE40FCE2BAFC4433E
3,168,215 UART: Caliptra RT
3,168,468 UART: [state] CFI Enabled
3,276,499 UART: [rt] RT listening for mailbox commands...
3,277,169 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,205 UART: [rt]cmd =0x44504543, len=28
3,350,737 >>> mbox cmd response data (2076 bytes)
3,350,738 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,380,091 UART: [rt]cmd =0x44504543, len=28
3,421,059 >>> mbox cmd response data (2076 bytes)
3,421,060 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,452,860 UART: [rt]cmd =0x49444550, len=353
3,465,802 >>> mbox cmd response data (8 bytes)
3,465,803 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,495,164 UART: [rt]cmd =0x44504543, len=28
3,538,274 >>> mbox cmd response data (2076 bytes)
3,538,275 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,568,010 UART: [rt]cmd =0x44504543, len=28
3,609,768 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,587 ready_for_fw is high
1,059,587 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,016 >>> mbox cmd response: success
2,686,310 UART:
2,686,326 UART: Running Caliptra FMC ...
2,686,734 UART:
2,686,788 UART: [state] CFI Enabled
2,697,099 UART: [fht] FMC Alias Private Key: 7
2,805,144 UART: [art] Extend RT PCRs Done
2,805,572 UART: [art] Lock RT PCRs Done
2,807,232 UART: [art] Populate DV Done
2,815,391 UART: [fht] FMC Alias Private Key: 7
2,816,461 UART: [art] Derive CDI
2,816,741 UART: [art] Store in in slot 0x4
2,902,684 UART: [art] Derive Key Pair
2,903,044 UART: [art] Store priv key in slot 0x5
2,916,466 UART: [art] Derive Key Pair - Done
2,931,497 UART: [art] Signing Cert with AUTHO
2,931,977 UART: RITY.KEYID = 7
2,947,307 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,072 UART: [art] PUB.X = CEB04EEA223AD710BEC58A23F0C8DA9AFC9DE108A68527C5F53AA1BBB3515EBD1A27ACBE82CA988C35E1173CE3568198
2,954,863 UART: [art] PUB.Y = A865D01BE1F5290BC0B1390875770D6256937513576F6075274AD295CC7571FDBD406E6729B6807BDABED8EC22D568FB
2,961,804 UART: [art] SIG.R = B3D18B1762B7612E57BA4B4D9FC3CE05AE66DA9DDD21217F7CC1E3533CCF41BE6C35CEF5899C158EB6A8D2E403EC506B
2,968,590 UART: [art] SIG.S = 021B6E09B5B19B47D716C5BA87BBFE47C22059AE69D9DC61653D27C3ADD224B149903D01657CFA1569DC617C7ECEA5CB
2,992,448 UART: Caliptra RT
2,992,701 UART: [state] CFI Enabled
3,100,168 UART: [rt] RT listening for mailbox commands...
3,100,838 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,932 UART: [rt]cmd =0x44504543, len=28
3,174,474 >>> mbox cmd response data (2076 bytes)
3,174,475 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,204,162 UART: [rt]cmd =0x44504543, len=28
3,245,262 >>> mbox cmd response data (2076 bytes)
3,245,263 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,276,895 UART: [rt]cmd =0x49444550, len=353
3,289,848 >>> mbox cmd response data (8 bytes)
3,289,849 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,220 UART: [rt]cmd =0x44504543, len=28
3,362,350 >>> mbox cmd response data (2076 bytes)
3,362,351 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,391,518 UART: [rt]cmd =0x44504543, len=28
3,433,347 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
893,585 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,710 UART: [kat] ++
897,862 UART: [kat] sha1
902,258 UART: [kat] SHA2-256
904,198 UART: [kat] SHA2-384
906,837 UART: [kat] SHA2-512-ACC
908,738 UART: [kat] ECC-384
918,601 UART: [kat] HMAC-384Kdf
923,271 UART: [kat] LMS
1,171,599 UART: [kat] --
1,172,766 UART: [cold-reset] ++
1,173,194 UART: [fht] FHT @ 0x50003400
1,175,737 UART: [idev] ++
1,175,905 UART: [idev] CDI.KEYID = 6
1,176,265 UART: [idev] SUBJECT.KEYID = 7
1,176,689 UART: [idev] UDS.KEYID = 0
1,177,034 ready_for_fw is high
1,177,034 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,753 UART: [idev] Erasing UDS.KEYID = 0
1,201,734 UART: [idev] Sha1 KeyId Algorithm
1,210,148 UART: [idev] --
1,211,062 UART: [ldev] ++
1,211,230 UART: [ldev] CDI.KEYID = 6
1,211,593 UART: [ldev] SUBJECT.KEYID = 5
1,212,019 UART: [ldev] AUTHORITY.KEYID = 7
1,212,482 UART: [ldev] FE.KEYID = 1
1,217,706 UART: [ldev] Erasing FE.KEYID = 1
1,244,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,832 UART: [ldev] --
1,283,093 UART: [fwproc] Wait for Commands...
1,283,677 UART: [fwproc] Recv command 0x46574c44
1,284,405 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,863 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,886 >>> mbox cmd response: success
2,773,902 UART: [afmc] ++
2,774,070 UART: [afmc] CDI.KEYID = 6
2,774,432 UART: [afmc] SUBJECT.KEYID = 7
2,774,857 UART: [afmc] AUTHORITY.KEYID = 5
2,811,194 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,609 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,357 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,085 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,970 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,689 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,563 UART: [afmc] --
2,854,643 UART: [cold-reset] --
2,855,357 UART: [state] Locking Datavault
2,856,454 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,058 UART: [state] Locking ICCM
2,857,632 UART: [exit] Launching FMC @ 0x40000130
2,862,961 UART:
2,862,977 UART: Running Caliptra FMC ...
2,863,385 UART:
2,863,528 UART: [state] CFI Enabled
2,873,813 UART: [fht] FMC Alias Private Key: 7
2,981,524 UART: [art] Extend RT PCRs Done
2,981,952 UART: [art] Lock RT PCRs Done
2,983,584 UART: [art] Populate DV Done
2,992,007 UART: [fht] FMC Alias Private Key: 7
2,992,987 UART: [art] Derive CDI
2,993,267 UART: [art] Store in in slot 0x4
3,079,022 UART: [art] Derive Key Pair
3,079,382 UART: [art] Store priv key in slot 0x5
3,092,612 UART: [art] Derive Key Pair - Done
3,107,510 UART: [art] Signing Cert with AUTHO
3,107,990 UART: RITY.KEYID = 7
3,122,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,505 UART: [art] PUB.X = F396B79E687E7ADE79025F3B01081097F67E9AE588344E0CBB889F6902562CCFFA692EF4F4CA52AE7726F4BF89568282
3,130,264 UART: [art] PUB.Y = A5224F2AAB904D37446ED4916794B5FCD3F9C078E993BD395E67D2509978E0F0DDF06A0CAF06AE4A988B407F5482497A
3,137,214 UART: [art] SIG.R = D2A45F315D94400E7D07BDB329AC6B4D7CEB86AC839B0A543F18728F1587187B11D37A87B489B31D92DBB637065AFB27
3,143,978 UART: [art] SIG.S = 5DE8375FBFC8173F0CDCAAEE21E619140B709F261876F571B5819E199E823873B16CF0067C4E776460EF27E0DC429484
3,168,484 UART: Caliptra RT
3,168,829 UART: [state] CFI Enabled
3,276,078 UART: [rt] RT listening for mailbox commands...
3,276,748 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,686 UART: [rt]cmd =0x44504543, len=28
3,350,216 >>> mbox cmd response data (2076 bytes)
3,350,217 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,379,954 UART: [rt]cmd =0x44504543, len=28
3,421,252 >>> mbox cmd response data (2076 bytes)
3,421,253 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,452,815 UART: [rt]cmd =0x49444550, len=353
3,465,778 >>> mbox cmd response data (8 bytes)
3,465,779 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,495,150 UART: [rt]cmd =0x44504543, len=28
3,538,274 >>> mbox cmd response data (2076 bytes)
3,538,275 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,568,002 UART: [rt]cmd =0x44504543, len=28
3,609,311 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,796 ready_for_fw is high
1,060,796 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,343 >>> mbox cmd response: success
2,689,685 UART:
2,689,701 UART: Running Caliptra FMC ...
2,690,109 UART:
2,690,252 UART: [state] CFI Enabled
2,701,069 UART: [fht] FMC Alias Private Key: 7
2,809,616 UART: [art] Extend RT PCRs Done
2,810,044 UART: [art] Lock RT PCRs Done
2,811,572 UART: [art] Populate DV Done
2,819,977 UART: [fht] FMC Alias Private Key: 7
2,821,019 UART: [art] Derive CDI
2,821,299 UART: [art] Store in in slot 0x4
2,907,154 UART: [art] Derive Key Pair
2,907,514 UART: [art] Store priv key in slot 0x5
2,920,970 UART: [art] Derive Key Pair - Done
2,935,747 UART: [art] Signing Cert with AUTHO
2,936,227 UART: RITY.KEYID = 7
2,951,115 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,880 UART: [art] PUB.X = DD7E94519B9946EFEF373217878FFA96243B0163C551136B30E3DB41C0E38A3F4DDF4B48E3D7D4A9372EEF5C48A8ED24
2,958,657 UART: [art] PUB.Y = 5100C2E148AA3776FE269AD343380261274B5F9C96FA25A36D069D323111915AE304AC7F48C7A87A058E1BC81EA41BA1
2,965,573 UART: [art] SIG.R = 192AB1B6A7BD88E722CB8C6B1BCFEDB99B18916E3CBDEC9F79D89A9277E6937D62ADF26270405E82D56D1EC90C248322
2,972,354 UART: [art] SIG.S = 033A7D2137879DFE0D669FBE9F40F3246697BBB18F40FE638414B0F41A87D7562D27AE07D7BA838FACC6CFAE8FF72EAA
2,996,314 UART: Caliptra RT
2,996,659 UART: [state] CFI Enabled
3,105,304 UART: [rt] RT listening for mailbox commands...
3,105,974 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,966 UART: [rt]cmd =0x44504543, len=28
3,178,962 >>> mbox cmd response data (2076 bytes)
3,178,963 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,208,342 UART: [rt]cmd =0x44504543, len=28
3,249,270 >>> mbox cmd response data (2076 bytes)
3,249,271 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,921 UART: [rt]cmd =0x49444550, len=353
3,294,107 >>> mbox cmd response data (8 bytes)
3,294,108 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,553 UART: [rt]cmd =0x44504543, len=28
3,366,983 >>> mbox cmd response data (2076 bytes)
3,366,984 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,471 UART: [rt]cmd =0x44504543, len=28
3,437,635 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,764 UART: [state] LifecycleState = Unprovisioned
85,419 UART: [state] DebugLocked = No
86,005 UART: [state] WD Timer not started. Device not locked for debugging
87,294 UART: [kat] SHA2-256
890,844 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,973 UART: [kat] ++
895,125 UART: [kat] sha1
899,139 UART: [kat] SHA2-256
901,079 UART: [kat] SHA2-384
903,624 UART: [kat] SHA2-512-ACC
905,525 UART: [kat] ECC-384
914,700 UART: [kat] HMAC-384Kdf
919,176 UART: [kat] LMS
1,167,488 UART: [kat] --
1,168,633 UART: [cold-reset] ++
1,169,051 UART: [fht] FHT @ 0x50003400
1,171,699 UART: [idev] ++
1,171,867 UART: [idev] CDI.KEYID = 6
1,172,228 UART: [idev] SUBJECT.KEYID = 7
1,172,653 UART: [idev] UDS.KEYID = 0
1,172,999 ready_for_fw is high
1,172,999 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,877 UART: [idev] Erasing UDS.KEYID = 0
1,197,559 UART: [idev] Sha1 KeyId Algorithm
1,206,249 UART: [idev] --
1,207,410 UART: [ldev] ++
1,207,578 UART: [ldev] CDI.KEYID = 6
1,207,942 UART: [ldev] SUBJECT.KEYID = 5
1,208,369 UART: [ldev] AUTHORITY.KEYID = 7
1,208,832 UART: [ldev] FE.KEYID = 1
1,214,078 UART: [ldev] Erasing FE.KEYID = 1
1,240,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,244 UART: [ldev] --
1,279,524 UART: [fwproc] Wait for Commands...
1,280,239 UART: [fwproc] Recv command 0x46574c44
1,280,972 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,928 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,237 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,101 >>> mbox cmd response: success
2,773,258 UART: [afmc] ++
2,773,426 UART: [afmc] CDI.KEYID = 6
2,773,789 UART: [afmc] SUBJECT.KEYID = 7
2,774,215 UART: [afmc] AUTHORITY.KEYID = 5
2,809,314 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,365 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,094 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,977 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,696 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,377 UART: [afmc] --
2,852,419 UART: [cold-reset] --
2,853,357 UART: [state] Locking Datavault
2,854,562 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,166 UART: [state] Locking ICCM
2,855,802 UART: [exit] Launching FMC @ 0x40000130
2,861,131 UART:
2,861,147 UART: Running Caliptra FMC ...
2,861,555 UART:
2,861,609 UART: [state] CFI Enabled
2,871,926 UART: [fht] FMC Alias Private Key: 7
2,980,075 UART: [art] Extend RT PCRs Done
2,980,503 UART: [art] Lock RT PCRs Done
2,982,253 UART: [art] Populate DV Done
2,990,438 UART: [fht] FMC Alias Private Key: 7
2,991,432 UART: [art] Derive CDI
2,991,712 UART: [art] Store in in slot 0x4
3,077,311 UART: [art] Derive Key Pair
3,077,671 UART: [art] Store priv key in slot 0x5
3,091,153 UART: [art] Derive Key Pair - Done
3,105,983 UART: [art] Signing Cert with AUTHO
3,106,463 UART: RITY.KEYID = 7
3,121,577 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,342 UART: [art] PUB.X = D65CAE070310CBCE0EDBC58BF8106EF0EE1E18CBBB0182FD3FDAC93CFFE1B152486363B7E6E25C1242E0C773446F515C
3,129,122 UART: [art] PUB.Y = 3565DB7DC30AF9D6641678585D7E6FE3BA452DD42894CF02F6D922843F2B593A07BEF7C633B66F948CD2761E1596FAB0
3,136,069 UART: [art] SIG.R = D5B4770957AC1FE196B2459FD1C802784B65D5EF6CBD7D05888FBFD58A220FCEC51FC82BAD0D30112980634EA4C68FA0
3,142,838 UART: [art] SIG.S = B1A4BC901D00DC266F28D135755F32CF4E6EB8F4496A244F57C1E536DADC60487C675257047B1C90E8BA9FF578035058
3,167,447 UART: Caliptra RT
3,167,700 UART: [state] CFI Enabled
3,275,314 UART: [rt] RT listening for mailbox commands...
3,275,984 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,926 UART: [rt]cmd =0x44504543, len=28
3,349,250 >>> mbox cmd response data (2076 bytes)
3,349,251 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,378,802 UART: [rt]cmd =0x44504543, len=28
3,419,473 >>> mbox cmd response data (2076 bytes)
3,419,474 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,451,054 UART: [rt]cmd =0x49444550, len=353
3,464,158 >>> mbox cmd response data (8 bytes)
3,464,159 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,493,750 UART: [rt]cmd =0x44504543, len=28
3,536,816 >>> mbox cmd response data (2076 bytes)
3,536,817 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,566,330 UART: [rt]cmd =0x44504543, len=28
3,607,684 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,048 ready_for_fw is high
1,055,048 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,457 >>> mbox cmd response: success
2,684,779 UART:
2,684,795 UART: Running Caliptra FMC ...
2,685,203 UART:
2,685,257 UART: [state] CFI Enabled
2,695,988 UART: [fht] FMC Alias Private Key: 7
2,804,039 UART: [art] Extend RT PCRs Done
2,804,467 UART: [art] Lock RT PCRs Done
2,806,051 UART: [art] Populate DV Done
2,814,188 UART: [fht] FMC Alias Private Key: 7
2,815,350 UART: [art] Derive CDI
2,815,630 UART: [art] Store in in slot 0x4
2,901,323 UART: [art] Derive Key Pair
2,901,683 UART: [art] Store priv key in slot 0x5
2,914,785 UART: [art] Derive Key Pair - Done
2,929,613 UART: [art] Signing Cert with AUTHO
2,930,093 UART: RITY.KEYID = 7
2,945,023 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,788 UART: [art] PUB.X = 5D45D9F9E45C71199C98970C02C7A78E328FD2FD9B93F58B44125C2DF34C20B7D74A27EBF1EA1133729E4BCC46A5A08C
2,952,562 UART: [art] PUB.Y = 3F8128A6F4C4C69258ECBF8ACA0B0E9C015B0892C993BFDDAE87113DADE5C7148597B9D604044769F9DC48BCC5D4AFB7
2,959,512 UART: [art] SIG.R = DFE2BD3CAD15691D64ECB6E0A2145DF7E4773524FA5503C5093DF74BD810DFD39BBEEDEFEDF8B43EDD1CD6BB8532568D
2,966,306 UART: [art] SIG.S = C5AFCD74B0388EF4103453DAF286B96518B125D2CEDF156B9B2467E4BFD7B24171D1C7563DCE2470334E40D15D608594
2,990,019 UART: Caliptra RT
2,990,272 UART: [state] CFI Enabled
3,098,270 UART: [rt] RT listening for mailbox commands...
3,098,940 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,046 UART: [rt]cmd =0x44504543, len=28
3,172,108 >>> mbox cmd response data (2076 bytes)
3,172,109 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,201,752 UART: [rt]cmd =0x44504543, len=28
3,243,141 >>> mbox cmd response data (2076 bytes)
3,243,142 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,531 UART: [rt]cmd =0x49444550, len=352
3,285,323 >>> mbox cmd response data (8 bytes)
3,285,324 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,805 UART: [rt]cmd =0x44504543, len=28
3,357,815 >>> mbox cmd response data (2076 bytes)
3,357,816 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,387,181 UART: [rt]cmd =0x44504543, len=28
3,428,510 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,797 UART: [state] LifecycleState = Unprovisioned
86,452 UART: [state] DebugLocked = No
87,128 UART: [state] WD Timer not started. Device not locked for debugging
88,263 UART: [kat] SHA2-256
891,813 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,942 UART: [kat] ++
896,094 UART: [kat] sha1
900,484 UART: [kat] SHA2-256
902,424 UART: [kat] SHA2-384
905,151 UART: [kat] SHA2-512-ACC
907,052 UART: [kat] ECC-384
917,059 UART: [kat] HMAC-384Kdf
921,701 UART: [kat] LMS
1,170,013 UART: [kat] --
1,171,228 UART: [cold-reset] ++
1,171,764 UART: [fht] FHT @ 0x50003400
1,174,564 UART: [idev] ++
1,174,732 UART: [idev] CDI.KEYID = 6
1,175,093 UART: [idev] SUBJECT.KEYID = 7
1,175,518 UART: [idev] UDS.KEYID = 0
1,175,864 ready_for_fw is high
1,175,864 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,112 UART: [idev] Erasing UDS.KEYID = 0
1,200,208 UART: [idev] Sha1 KeyId Algorithm
1,209,100 UART: [idev] --
1,210,185 UART: [ldev] ++
1,210,353 UART: [ldev] CDI.KEYID = 6
1,210,717 UART: [ldev] SUBJECT.KEYID = 5
1,211,144 UART: [ldev] AUTHORITY.KEYID = 7
1,211,607 UART: [ldev] FE.KEYID = 1
1,216,983 UART: [ldev] Erasing FE.KEYID = 1
1,243,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,079 UART: [ldev] --
1,282,479 UART: [fwproc] Wait for Commands...
1,283,292 UART: [fwproc] Recv command 0x46574c44
1,284,025 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,727 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,036 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,758 >>> mbox cmd response: success
2,773,807 UART: [afmc] ++
2,773,975 UART: [afmc] CDI.KEYID = 6
2,774,338 UART: [afmc] SUBJECT.KEYID = 7
2,774,764 UART: [afmc] AUTHORITY.KEYID = 5
2,810,491 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,848 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,577 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,460 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,179 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,006 UART: [afmc] --
2,853,966 UART: [cold-reset] --
2,854,734 UART: [state] Locking Datavault
2,856,065 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,669 UART: [state] Locking ICCM
2,857,319 UART: [exit] Launching FMC @ 0x40000130
2,862,648 UART:
2,862,664 UART: Running Caliptra FMC ...
2,863,072 UART:
2,863,215 UART: [state] CFI Enabled
2,874,396 UART: [fht] FMC Alias Private Key: 7
2,982,545 UART: [art] Extend RT PCRs Done
2,982,973 UART: [art] Lock RT PCRs Done
2,984,271 UART: [art] Populate DV Done
2,992,384 UART: [fht] FMC Alias Private Key: 7
2,993,550 UART: [art] Derive CDI
2,993,830 UART: [art] Store in in slot 0x4
3,079,695 UART: [art] Derive Key Pair
3,080,055 UART: [art] Store priv key in slot 0x5
3,093,289 UART: [art] Derive Key Pair - Done
3,108,279 UART: [art] Signing Cert with AUTHO
3,108,759 UART: RITY.KEYID = 7
3,123,853 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,618 UART: [art] PUB.X = 776635EA4B526FAD1A8FBCD5C38ADF3DB321952D176AFF28960F65FC739B9EB52FA73F269D3F6467A515A7B4A24946EC
3,131,399 UART: [art] PUB.Y = 44857B0540CB2526558973B581AA3FB9599434495526CE5950312E56C9407391D1921154C9C2A284E4D207FDE2F9C54A
3,138,329 UART: [art] SIG.R = 034B4DCFB96AF186778E73423CE5711111E6D72C70933939A0A586A52B4CCC4B3C159C9DD5AD829510B361811AAE8C04
3,145,095 UART: [art] SIG.S = CE02D7BCC1686BE24989DA82831E3A3A39D5782FC009A691DAB2ADF4A69934C4B6A40EBDECF757A1DC657E55C3396EF2
3,169,071 UART: Caliptra RT
3,169,416 UART: [state] CFI Enabled
3,277,727 UART: [rt] RT listening for mailbox commands...
3,278,397 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,617 UART: [rt]cmd =0x44504543, len=28
3,351,603 >>> mbox cmd response data (2076 bytes)
3,351,604 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,381,069 UART: [rt]cmd =0x44504543, len=28
3,422,009 >>> mbox cmd response data (2076 bytes)
3,422,010 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,453,641 UART: [rt]cmd =0x49444550, len=354
3,466,833 >>> mbox cmd response data (8 bytes)
3,466,834 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,496,459 UART: [rt]cmd =0x44504543, len=28
3,539,945 >>> mbox cmd response data (2076 bytes)
3,539,946 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,569,385 UART: [rt]cmd =0x44504543, len=28
3,610,893 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,545 ready_for_fw is high
1,057,545 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,276 >>> mbox cmd response: success
2,686,406 UART:
2,686,422 UART: Running Caliptra FMC ...
2,686,830 UART:
2,686,973 UART: [state] CFI Enabled
2,697,504 UART: [fht] FMC Alias Private Key: 7
2,805,373 UART: [art] Extend RT PCRs Done
2,805,801 UART: [art] Lock RT PCRs Done
2,807,277 UART: [art] Populate DV Done
2,815,326 UART: [fht] FMC Alias Private Key: 7
2,816,478 UART: [art] Derive CDI
2,816,758 UART: [art] Store in in slot 0x4
2,902,839 UART: [art] Derive Key Pair
2,903,199 UART: [art] Store priv key in slot 0x5
2,916,219 UART: [art] Derive Key Pair - Done
2,931,267 UART: [art] Signing Cert with AUTHO
2,931,747 UART: RITY.KEYID = 7
2,947,217 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,982 UART: [art] PUB.X = C11E5FEA63839D6EAAC78CB2137767AFE4F7953A23AB7657D88EE945620C012662553A7B9EECAB3FB7D67BA2827035FA
2,954,758 UART: [art] PUB.Y = CB7205907AF1E7C3383B2666317524EF06DDD7575E27AE2BD8C54A8D45F0288DBFD6312FE7EBA27C23C2129966350CA3
2,961,705 UART: [art] SIG.R = 4FC4DAE78DFC552D99B53A6F7299A0E9E71BC17AFD0687AFFCD80262BBEC234411F5E0FCD9EAAB7C3E829F72F6F7E6B0
2,968,497 UART: [art] SIG.S = 39DE00682AC6C0B5077B5B3EA294B73042AA51E9D67F5B56CADFC38B4D99C3536875B23E30EA731D32200F9418AA3C34
2,992,140 UART: Caliptra RT
2,992,485 UART: [state] CFI Enabled
3,100,204 UART: [rt] RT listening for mailbox commands...
3,100,874 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,872 UART: [rt]cmd =0x44504543, len=28
3,174,076 >>> mbox cmd response data (2076 bytes)
3,174,077 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,203,694 UART: [rt]cmd =0x44504543, len=28
3,244,896 >>> mbox cmd response data (2076 bytes)
3,244,897 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,276,486 UART: [rt]cmd =0x49444550, len=352
3,287,293 >>> mbox cmd response data (8 bytes)
3,287,294 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,737 UART: [rt]cmd =0x44504543, len=28
3,360,269 >>> mbox cmd response data (2076 bytes)
3,360,270 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,389,757 UART: [rt]cmd =0x44504543, len=28
3,431,129 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,416 UART: [state] LifecycleState = Unprovisioned
86,071 UART: [state] DebugLocked = No
86,789 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,301 UART: [kat] SHA2-256
882,232 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,347 UART: [kat] ++
886,499 UART: [kat] sha1
890,793 UART: [kat] SHA2-256
892,731 UART: [kat] SHA2-384
895,522 UART: [kat] SHA2-512-ACC
897,423 UART: [kat] ECC-384
902,692 UART: [kat] HMAC-384Kdf
907,232 UART: [kat] LMS
1,475,428 UART: [kat] --
1,476,381 UART: [cold-reset] ++
1,476,947 UART: [fht] Storing FHT @ 0x50003400
1,479,742 UART: [idev] ++
1,479,910 UART: [idev] CDI.KEYID = 6
1,480,270 UART: [idev] SUBJECT.KEYID = 7
1,480,694 UART: [idev] UDS.KEYID = 0
1,481,039 ready_for_fw is high
1,481,039 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,264 UART: [idev] Erasing UDS.KEYID = 0
1,504,696 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,234 UART: [idev] --
1,514,421 UART: [ldev] ++
1,514,589 UART: [ldev] CDI.KEYID = 6
1,514,952 UART: [ldev] SUBJECT.KEYID = 5
1,515,378 UART: [ldev] AUTHORITY.KEYID = 7
1,515,841 UART: [ldev] FE.KEYID = 1
1,520,979 UART: [ldev] Erasing FE.KEYID = 1
1,546,152 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,752 UART: [ldev] --
1,585,259 UART: [fwproc] Waiting for Commands...
1,585,884 UART: [fwproc] Received command 0x46574c44
1,586,675 UART: [fwproc] Received Image of size 114332 bytes
2,884,777 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,115 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,467 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,336 >>> mbox cmd response: success
3,078,388 UART: [afmc] ++
3,078,556 UART: [afmc] CDI.KEYID = 6
3,078,918 UART: [afmc] SUBJECT.KEYID = 7
3,079,343 UART: [afmc] AUTHORITY.KEYID = 5
3,114,644 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,028 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,808 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,536 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,421 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,111 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,836 UART: [afmc] --
3,157,936 UART: [cold-reset] --
3,158,786 UART: [state] Locking Datavault
3,160,135 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,739 UART: [state] Locking ICCM
3,161,389 UART: [exit] Launching FMC @ 0x40000130
3,166,718 UART:
3,166,734 UART: Running Caliptra FMC ...
3,167,142 UART:
3,167,196 UART: [state] CFI Enabled
3,177,811 UART: [fht] FMC Alias Private Key: 7
3,286,318 UART: [art] Extend RT PCRs Done
3,286,746 UART: [art] Lock RT PCRs Done
3,288,172 UART: [art] Populate DV Done
3,296,403 UART: [fht] FMC Alias Private Key: 7
3,297,569 UART: [art] Derive CDI
3,297,849 UART: [art] Store in in slot 0x4
3,383,478 UART: [art] Derive Key Pair
3,383,838 UART: [art] Store priv key in slot 0x5
3,397,304 UART: [art] Derive Key Pair - Done
3,412,292 UART: [art] Signing Cert with AUTHO
3,412,772 UART: RITY.KEYID = 7
3,428,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,777 UART: [art] PUB.X = D60599B51188D103CCA2DFCD9955C659706277C6304847D6B91C1266F89216E207A76F058B4585CB8B4CC1117E1E560B
3,435,526 UART: [art] PUB.Y = F4FB6D2943DD65F0264A0251ED1851F6F452D71D62474705F9CB422584FE742C32B4268A6FA8860C9D67DF61AED23CD9
3,442,471 UART: [art] SIG.R = 62D6870A1781BAE7F9B08ABEFE4D0EC444D9C742D68D0A8AB376ADDA0F507642D60E17EAAF7DBF4605E2A41624EC4EF9
3,449,245 UART: [art] SIG.S = 0968AA26C6192ABD1217C03A223208CE6E2C9461BCF2797869E5B8A0818AC3D674A9D4A229AFC9B08E812C6E43AB41BB
3,472,814 UART: Caliptra RT
3,473,067 UART: [state] CFI Enabled
3,580,811 UART: [rt] RT listening for mailbox commands...
3,581,481 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,601 UART: [rt]cmd =0x44504543, len=96
3,792,790 >>> mbox cmd response data (6236 bytes)
3,792,791 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,324 UART: [rt]cmd =0x52564348, len=36
3,824,709 >>> mbox cmd response data (8 bytes)
3,824,710 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,854,585 UART: [rt]cmd =0x44504543, len=96
4,035,314 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,737 ready_for_fw is high
1,362,737 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,066 >>> mbox cmd response: success
2,988,898 UART:
2,988,914 UART: Running Caliptra FMC ...
2,989,322 UART:
2,989,376 UART: [state] CFI Enabled
2,999,851 UART: [fht] FMC Alias Private Key: 7
3,107,790 UART: [art] Extend RT PCRs Done
3,108,218 UART: [art] Lock RT PCRs Done
3,109,942 UART: [art] Populate DV Done
3,117,905 UART: [fht] FMC Alias Private Key: 7
3,118,855 UART: [art] Derive CDI
3,119,135 UART: [art] Store in in slot 0x4
3,204,892 UART: [art] Derive Key Pair
3,205,252 UART: [art] Store priv key in slot 0x5
3,218,350 UART: [art] Derive Key Pair - Done
3,233,270 UART: [art] Signing Cert with AUTHO
3,233,750 UART: RITY.KEYID = 7
3,248,940 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,705 UART: [art] PUB.X = B03F754E2176DAD8E17032D0509C95C5B0BB3B558244FA0AA5C99DB5A0263FC5E81B5C1A04482D70BE0B18B2E7BA1EF7
3,256,480 UART: [art] PUB.Y = 636DF7E81EC17210B2E328B1B6D0523503283CD932BB2C4D665C28D10F0CA8A1BA747442CA464549AA366DD497F85562
3,263,421 UART: [art] SIG.R = D54A946A98961AAB686A7DD610EC89303B0908365F49EB6B4D2359BE888BC6C4E0065D49D3E624A7DA47D819045BEAA6
3,270,185 UART: [art] SIG.S = D3414DD70C7E86EF891FB9647469660A91FF18BBD94100867C1913C79FA80BF2DD3105D39F3DCC28B2AC65070B94274C
3,294,300 UART: Caliptra RT
3,294,553 UART: [state] CFI Enabled
3,403,303 UART: [rt] RT listening for mailbox commands...
3,403,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,547 UART: [rt]cmd =0x44504543, len=96
3,614,486 >>> mbox cmd response data (6236 bytes)
3,614,487 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,950 UART: [rt]cmd =0x52564348, len=36
3,646,253 >>> mbox cmd response data (8 bytes)
3,646,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,676,335 UART: [rt]cmd =0x44504543, len=96
3,856,868 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,792 UART: [state] DebugLocked = No
86,366 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,914 UART: [kat] SHA2-256
881,845 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,960 UART: [kat] ++
886,112 UART: [kat] sha1
890,320 UART: [kat] SHA2-256
892,258 UART: [kat] SHA2-384
895,117 UART: [kat] SHA2-512-ACC
897,018 UART: [kat] ECC-384
902,551 UART: [kat] HMAC-384Kdf
907,259 UART: [kat] LMS
1,475,455 UART: [kat] --
1,476,594 UART: [cold-reset] ++
1,477,062 UART: [fht] Storing FHT @ 0x50003400
1,479,967 UART: [idev] ++
1,480,135 UART: [idev] CDI.KEYID = 6
1,480,495 UART: [idev] SUBJECT.KEYID = 7
1,480,919 UART: [idev] UDS.KEYID = 0
1,481,264 ready_for_fw is high
1,481,264 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,967 UART: [idev] Erasing UDS.KEYID = 0
1,506,323 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,905 UART: [idev] --
1,515,994 UART: [ldev] ++
1,516,162 UART: [ldev] CDI.KEYID = 6
1,516,525 UART: [ldev] SUBJECT.KEYID = 5
1,516,951 UART: [ldev] AUTHORITY.KEYID = 7
1,517,414 UART: [ldev] FE.KEYID = 1
1,522,624 UART: [ldev] Erasing FE.KEYID = 1
1,548,577 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,489 UART: [ldev] --
1,587,770 UART: [fwproc] Waiting for Commands...
1,588,451 UART: [fwproc] Received command 0x46574c44
1,589,242 UART: [fwproc] Received Image of size 114332 bytes
2,887,362 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,540 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,892 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,729 >>> mbox cmd response: success
3,080,869 UART: [afmc] ++
3,081,037 UART: [afmc] CDI.KEYID = 6
3,081,399 UART: [afmc] SUBJECT.KEYID = 7
3,081,824 UART: [afmc] AUTHORITY.KEYID = 5
3,116,489 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,975 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,755 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,483 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,368 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,058 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,897 UART: [afmc] --
3,159,925 UART: [cold-reset] --
3,160,539 UART: [state] Locking Datavault
3,161,534 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,138 UART: [state] Locking ICCM
3,162,592 UART: [exit] Launching FMC @ 0x40000130
3,167,921 UART:
3,167,937 UART: Running Caliptra FMC ...
3,168,345 UART:
3,168,488 UART: [state] CFI Enabled
3,179,177 UART: [fht] FMC Alias Private Key: 7
3,287,344 UART: [art] Extend RT PCRs Done
3,287,772 UART: [art] Lock RT PCRs Done
3,289,448 UART: [art] Populate DV Done
3,297,517 UART: [fht] FMC Alias Private Key: 7
3,298,683 UART: [art] Derive CDI
3,298,963 UART: [art] Store in in slot 0x4
3,385,018 UART: [art] Derive Key Pair
3,385,378 UART: [art] Store priv key in slot 0x5
3,398,938 UART: [art] Derive Key Pair - Done
3,413,938 UART: [art] Signing Cert with AUTHO
3,414,418 UART: RITY.KEYID = 7
3,430,104 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,869 UART: [art] PUB.X = 8834BFF78A191101AD1D019E3E6245BBB7068671316FFC57656A7A49CE55012C495EA6B7666C76DD6D77FFBBF8ABCBD1
3,437,639 UART: [art] PUB.Y = D9471DDFAF3BA62ABCFE0F211FDA668BC1DD817226C1D449518D404AF5480115CA95F37870D68933D81A494D3825F624
3,444,589 UART: [art] SIG.R = EAF069BECC3A180C91FA616D6CF681EBB6ED1CA9CB82B93D789F7E41B79D632437D39CDDF34D0DDE110902A3D35624E1
3,451,367 UART: [art] SIG.S = DE675768F1A7AD80C62CDA0B977467660014E6B32B2A11E4CD5218F41F9AF6F741EABF10689E0029F2EB368F26813827
3,475,039 UART: Caliptra RT
3,475,384 UART: [state] CFI Enabled
3,582,982 UART: [rt] RT listening for mailbox commands...
3,583,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,856 UART: [rt]cmd =0x44504543, len=96
3,795,488 >>> mbox cmd response data (6236 bytes)
3,795,489 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,030 UART: [rt]cmd =0x52564348, len=36
3,827,059 >>> mbox cmd response data (8 bytes)
3,827,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,856,955 UART: [rt]cmd =0x44504543, len=96
4,037,777 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,818 ready_for_fw is high
1,362,818 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,761 >>> mbox cmd response: success
2,990,065 UART:
2,990,081 UART: Running Caliptra FMC ...
2,990,489 UART:
2,990,632 UART: [state] CFI Enabled
3,001,423 UART: [fht] FMC Alias Private Key: 7
3,108,918 UART: [art] Extend RT PCRs Done
3,109,346 UART: [art] Lock RT PCRs Done
3,110,966 UART: [art] Populate DV Done
3,119,209 UART: [fht] FMC Alias Private Key: 7
3,120,207 UART: [art] Derive CDI
3,120,487 UART: [art] Store in in slot 0x4
3,205,982 UART: [art] Derive Key Pair
3,206,342 UART: [art] Store priv key in slot 0x5
3,219,770 UART: [art] Derive Key Pair - Done
3,234,634 UART: [art] Signing Cert with AUTHO
3,235,114 UART: RITY.KEYID = 7
3,250,070 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,835 UART: [art] PUB.X = 09E750CEAED6363A46A2E48718E3506C5AF906AD364F88FD63E596E451A23635E934B41BAAF0DC29171FE09F542FAB5F
3,257,609 UART: [art] PUB.Y = 48E585447F0D25096C00835A4362F26C916B31AEEF115037D2A8FD1772BAE469D4597992806D05F95CC6B3E437B819D7
3,264,522 UART: [art] SIG.R = AF1A1B3391C44A8BE67F759265045B3D11B562CE0795F5ACFA5C8F02E3B973E7CBFDBCD183EE38E0684886026803D8B5
3,271,287 UART: [art] SIG.S = 7ED45D83B66D66D21E24257D525D51D11845855CDFF0EB2AF6B4CEF11A2D48F8CEB0D1688F6C29297C2C83C57D6C7D17
3,295,064 UART: Caliptra RT
3,295,409 UART: [state] CFI Enabled
3,404,236 UART: [rt] RT listening for mailbox commands...
3,404,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,320 UART: [rt]cmd =0x44504543, len=96
3,615,827 >>> mbox cmd response data (6236 bytes)
3,615,828 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,509 UART: [rt]cmd =0x52564348, len=36
3,647,828 >>> mbox cmd response data (8 bytes)
3,647,829 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,677,818 UART: [rt]cmd =0x44504543, len=96
3,858,271 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,832 UART: [state] LifecycleState = Unprovisioned
85,487 UART: [state] DebugLocked = No
86,149 UART: [state] WD Timer not started. Device not locked for debugging
87,492 UART: [kat] SHA2-256
893,142 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,267 UART: [kat] ++
897,419 UART: [kat] sha1
901,543 UART: [kat] SHA2-256
903,483 UART: [kat] SHA2-384
906,442 UART: [kat] SHA2-512-ACC
908,343 UART: [kat] ECC-384
917,514 UART: [kat] HMAC-384Kdf
921,886 UART: [kat] LMS
1,170,214 UART: [kat] --
1,170,775 UART: [cold-reset] ++
1,171,291 UART: [fht] FHT @ 0x50003400
1,173,962 UART: [idev] ++
1,174,130 UART: [idev] CDI.KEYID = 6
1,174,490 UART: [idev] SUBJECT.KEYID = 7
1,174,914 UART: [idev] UDS.KEYID = 0
1,175,259 ready_for_fw is high
1,175,259 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,846 UART: [idev] Erasing UDS.KEYID = 0
1,199,665 UART: [idev] Sha1 KeyId Algorithm
1,208,113 UART: [idev] --
1,209,113 UART: [ldev] ++
1,209,281 UART: [ldev] CDI.KEYID = 6
1,209,644 UART: [ldev] SUBJECT.KEYID = 5
1,210,070 UART: [ldev] AUTHORITY.KEYID = 7
1,210,533 UART: [ldev] FE.KEYID = 1
1,215,527 UART: [ldev] Erasing FE.KEYID = 1
1,241,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,999 UART: [ldev] --
1,281,436 UART: [fwproc] Wait for Commands...
1,282,156 UART: [fwproc] Recv command 0x46574c44
1,282,884 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,590 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,894 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,627 >>> mbox cmd response: success
2,774,747 UART: [afmc] ++
2,774,915 UART: [afmc] CDI.KEYID = 6
2,775,277 UART: [afmc] SUBJECT.KEYID = 7
2,775,702 UART: [afmc] AUTHORITY.KEYID = 5
2,810,785 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,168 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,896 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,781 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,500 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,330 UART: [afmc] --
2,854,422 UART: [cold-reset] --
2,855,386 UART: [state] Locking Datavault
2,856,497 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,101 UART: [state] Locking ICCM
2,857,759 UART: [exit] Launching FMC @ 0x40000130
2,863,088 UART:
2,863,104 UART: Running Caliptra FMC ...
2,863,512 UART:
2,863,566 UART: [state] CFI Enabled
2,874,071 UART: [fht] FMC Alias Private Key: 7
2,982,146 UART: [art] Extend RT PCRs Done
2,982,574 UART: [art] Lock RT PCRs Done
2,984,036 UART: [art] Populate DV Done
2,992,207 UART: [fht] FMC Alias Private Key: 7
2,993,307 UART: [art] Derive CDI
2,993,587 UART: [art] Store in in slot 0x4
3,079,286 UART: [art] Derive Key Pair
3,079,646 UART: [art] Store priv key in slot 0x5
3,093,458 UART: [art] Derive Key Pair - Done
3,108,179 UART: [art] Signing Cert with AUTHO
3,108,659 UART: RITY.KEYID = 7
3,123,963 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,728 UART: [art] PUB.X = 733479AF76AE2C5A25C5042D302C1652B258169D77ABD9431BD481932CCA4FF74BC39A14397790D876113572E5B2F3CB
3,131,493 UART: [art] PUB.Y = 617C4C4E8762555256754DF484696EB14472CB4FBC712C9FD4D4F7C98BA6F0929CE5EC236C73D1B9579D418004BCC21B
3,138,444 UART: [art] SIG.R = BA08847548D83E43136C0845F154A2440E830ABCBB94155D4A298AC2213B471D363B71379528BFB600905021DDC30C83
3,145,169 UART: [art] SIG.S = DF82C80416D9D2E1F80D9A6B03E0DC35A9A5A8A6D47F41736A3293D3B81C640C8BF7C22716B598BCFDE6259CACABAC00
3,168,630 UART: Caliptra RT
3,168,883 UART: [state] CFI Enabled
3,276,411 UART: [rt] RT listening for mailbox commands...
3,277,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,655 UART: [rt]cmd =0x44504543, len=96
3,488,263 >>> mbox cmd response data (6236 bytes)
3,488,264 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,581 UART: [rt]cmd =0x52564348, len=36
3,519,938 >>> mbox cmd response data (8 bytes)
3,519,939 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,549,846 UART: [rt]cmd =0x44504543, len=96
3,730,452 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,381 ready_for_fw is high
1,061,381 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,038 >>> mbox cmd response: success
2,688,740 UART:
2,688,756 UART: Running Caliptra FMC ...
2,689,164 UART:
2,689,218 UART: [state] CFI Enabled
2,699,647 UART: [fht] FMC Alias Private Key: 7
2,807,534 UART: [art] Extend RT PCRs Done
2,807,962 UART: [art] Lock RT PCRs Done
2,809,058 UART: [art] Populate DV Done
2,817,447 UART: [fht] FMC Alias Private Key: 7
2,818,617 UART: [art] Derive CDI
2,818,897 UART: [art] Store in in slot 0x4
2,904,832 UART: [art] Derive Key Pair
2,905,192 UART: [art] Store priv key in slot 0x5
2,918,280 UART: [art] Derive Key Pair - Done
2,932,987 UART: [art] Signing Cert with AUTHO
2,933,467 UART: RITY.KEYID = 7
2,948,533 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,298 UART: [art] PUB.X = 92E448FDF81E29F4FC742D9FF83FF40B9C7490E97FE1C1A6B8B493C3ED4D050E81A8A2B0DC06DD9404197A46A8C67F4D
2,956,069 UART: [art] PUB.Y = 3819F42296591E76EEE5114090ADEBC67A6535534991487B0A95F6CFBE1279ABCA1E61BDD457E8E5F9C82BA70C06B9B9
2,963,018 UART: [art] SIG.R = 14C161518429423D20145A6F2FD4644A02D2EBD7C024BB7915C00D64C16794E645A3C5D4730E9618F775B60E3572D9C6
2,969,768 UART: [art] SIG.S = 6E5FE55D12B315D6D9F50078F4770B6ECCBCA61C457A8C4913FC52066432086515BCBD4334DE8CEAA734B82307F9C48A
2,993,981 UART: Caliptra RT
2,994,234 UART: [state] CFI Enabled
3,102,333 UART: [rt] RT listening for mailbox commands...
3,103,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,319 UART: [rt]cmd =0x44504543, len=96
3,314,412 >>> mbox cmd response data (6236 bytes)
3,314,413 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,928 UART: [rt]cmd =0x52564348, len=36
3,346,095 >>> mbox cmd response data (8 bytes)
3,346,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,375,851 UART: [rt]cmd =0x44504543, len=96
3,556,426 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,193 UART: [kat] SHA2-256
893,843 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,968 UART: [kat] ++
898,120 UART: [kat] sha1
902,226 UART: [kat] SHA2-256
904,166 UART: [kat] SHA2-384
907,013 UART: [kat] SHA2-512-ACC
908,914 UART: [kat] ECC-384
918,535 UART: [kat] HMAC-384Kdf
923,235 UART: [kat] LMS
1,171,563 UART: [kat] --
1,172,284 UART: [cold-reset] ++
1,172,722 UART: [fht] FHT @ 0x50003400
1,175,403 UART: [idev] ++
1,175,571 UART: [idev] CDI.KEYID = 6
1,175,931 UART: [idev] SUBJECT.KEYID = 7
1,176,355 UART: [idev] UDS.KEYID = 0
1,176,700 ready_for_fw is high
1,176,700 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,461 UART: [idev] Erasing UDS.KEYID = 0
1,202,070 UART: [idev] Sha1 KeyId Algorithm
1,210,566 UART: [idev] --
1,211,616 UART: [ldev] ++
1,211,784 UART: [ldev] CDI.KEYID = 6
1,212,147 UART: [ldev] SUBJECT.KEYID = 5
1,212,573 UART: [ldev] AUTHORITY.KEYID = 7
1,213,036 UART: [ldev] FE.KEYID = 1
1,218,308 UART: [ldev] Erasing FE.KEYID = 1
1,244,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,958 UART: [ldev] --
1,284,451 UART: [fwproc] Wait for Commands...
1,285,243 UART: [fwproc] Recv command 0x46574c44
1,285,971 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,893 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,197 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,084 >>> mbox cmd response: success
2,777,192 UART: [afmc] ++
2,777,360 UART: [afmc] CDI.KEYID = 6
2,777,722 UART: [afmc] SUBJECT.KEYID = 7
2,778,147 UART: [afmc] AUTHORITY.KEYID = 5
2,813,748 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,945 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,673 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,558 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,277 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,151 UART: [afmc] --
2,857,211 UART: [cold-reset] --
2,858,049 UART: [state] Locking Datavault
2,858,868 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,472 UART: [state] Locking ICCM
2,859,972 UART: [exit] Launching FMC @ 0x40000130
2,865,301 UART:
2,865,317 UART: Running Caliptra FMC ...
2,865,725 UART:
2,865,868 UART: [state] CFI Enabled
2,876,501 UART: [fht] FMC Alias Private Key: 7
2,984,020 UART: [art] Extend RT PCRs Done
2,984,448 UART: [art] Lock RT PCRs Done
2,986,152 UART: [art] Populate DV Done
2,994,273 UART: [fht] FMC Alias Private Key: 7
2,995,421 UART: [art] Derive CDI
2,995,701 UART: [art] Store in in slot 0x4
3,081,110 UART: [art] Derive Key Pair
3,081,470 UART: [art] Store priv key in slot 0x5
3,094,938 UART: [art] Derive Key Pair - Done
3,109,927 UART: [art] Signing Cert with AUTHO
3,110,407 UART: RITY.KEYID = 7
3,125,165 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,930 UART: [art] PUB.X = 4309CC1FE64C69600606FFCB59347511F2142E68117706EB0441EDD6D19377073F12D315EC918798DDD852452E5D7CAF
3,132,678 UART: [art] PUB.Y = DD6D091FF58E2BCBE0EE305104FD87EF745977AF9BA20D6638FFD285DA170AB4857139735FDDF0D4724CEF916BBDC7A4
3,139,636 UART: [art] SIG.R = 2277AD7374863B901F188E73F9951BD9AC91D5D44171F6B3400D1A4D86C0DA88A0C0C059516FFFB737A643A316056355
3,146,396 UART: [art] SIG.S = 8185EA32C4A77B4116E6EF58125CFB67EE7AA7B8F58CB07E320CCADA079DB1482E3E42F5C1DA9DE3E2109F3A3D1AD6BD
3,170,361 UART: Caliptra RT
3,170,706 UART: [state] CFI Enabled
3,278,449 UART: [rt] RT listening for mailbox commands...
3,279,119 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,727 UART: [rt]cmd =0x44504543, len=96
3,489,720 >>> mbox cmd response data (6236 bytes)
3,489,721 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,352 UART: [rt]cmd =0x52564348, len=36
3,521,649 >>> mbox cmd response data (8 bytes)
3,521,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,551,609 UART: [rt]cmd =0x44504543, len=96
3,732,800 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,264 ready_for_fw is high
1,060,264 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,475 >>> mbox cmd response: success
2,689,505 UART:
2,689,521 UART: Running Caliptra FMC ...
2,689,929 UART:
2,690,072 UART: [state] CFI Enabled
2,700,907 UART: [fht] FMC Alias Private Key: 7
2,808,752 UART: [art] Extend RT PCRs Done
2,809,180 UART: [art] Lock RT PCRs Done
2,810,818 UART: [art] Populate DV Done
2,819,307 UART: [fht] FMC Alias Private Key: 7
2,820,295 UART: [art] Derive CDI
2,820,575 UART: [art] Store in in slot 0x4
2,906,272 UART: [art] Derive Key Pair
2,906,632 UART: [art] Store priv key in slot 0x5
2,919,432 UART: [art] Derive Key Pair - Done
2,933,997 UART: [art] Signing Cert with AUTHO
2,934,477 UART: RITY.KEYID = 7
2,950,059 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,824 UART: [art] PUB.X = AEF6B6F7B97D68D6BD00B432C59107E8CE8F4FCAC25D9C7C452CCC592E416F917C2E82102F7A0C5F8FAB004CE8CD3144
2,957,564 UART: [art] PUB.Y = 2F4B4B2BCB5CA2266C23F3DFE747B03CA395D70EBC9466DF7223856306A222EC7A757D7D496AD0C36D42C776424D523C
2,964,516 UART: [art] SIG.R = F540D4D14702A4688C8F30DE1D1BA5D0D010147A5FB958CA4C1F403D61783433AE512E251000AF0C0186F1D91A55C397
2,971,255 UART: [art] SIG.S = 0415D8A4A2DDB175A0B95A6DD0FC552950070DA5C02D8668B79633EDBC18D078F871A15C56D9C92B64D5705F66CCF11B
2,995,351 UART: Caliptra RT
2,995,696 UART: [state] CFI Enabled
3,102,951 UART: [rt] RT listening for mailbox commands...
3,103,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,063 UART: [rt]cmd =0x44504543, len=96
3,314,856 >>> mbox cmd response data (6236 bytes)
3,314,857 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,406 UART: [rt]cmd =0x52564348, len=36
3,346,645 >>> mbox cmd response data (8 bytes)
3,346,646 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,376,651 UART: [rt]cmd =0x44504543, len=96
3,557,728 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,191 UART: [state] WD Timer not started. Device not locked for debugging
87,372 UART: [kat] SHA2-256
890,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,051 UART: [kat] ++
895,203 UART: [kat] sha1
899,483 UART: [kat] SHA2-256
901,423 UART: [kat] SHA2-384
904,268 UART: [kat] SHA2-512-ACC
906,169 UART: [kat] ECC-384
915,632 UART: [kat] HMAC-384Kdf
920,110 UART: [kat] LMS
1,168,422 UART: [kat] --
1,169,461 UART: [cold-reset] ++
1,169,795 UART: [fht] FHT @ 0x50003400
1,172,507 UART: [idev] ++
1,172,675 UART: [idev] CDI.KEYID = 6
1,173,036 UART: [idev] SUBJECT.KEYID = 7
1,173,461 UART: [idev] UDS.KEYID = 0
1,173,807 ready_for_fw is high
1,173,807 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,561 UART: [idev] Erasing UDS.KEYID = 0
1,198,581 UART: [idev] Sha1 KeyId Algorithm
1,207,333 UART: [idev] --
1,208,298 UART: [ldev] ++
1,208,466 UART: [ldev] CDI.KEYID = 6
1,208,830 UART: [ldev] SUBJECT.KEYID = 5
1,209,257 UART: [ldev] AUTHORITY.KEYID = 7
1,209,720 UART: [ldev] FE.KEYID = 1
1,215,090 UART: [ldev] Erasing FE.KEYID = 1
1,240,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,874 UART: [ldev] --
1,280,338 UART: [fwproc] Wait for Commands...
1,280,937 UART: [fwproc] Recv command 0x46574c44
1,281,670 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,124 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,597 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,493 >>> mbox cmd response: success
2,772,560 UART: [afmc] ++
2,772,728 UART: [afmc] CDI.KEYID = 6
2,773,091 UART: [afmc] SUBJECT.KEYID = 7
2,773,517 UART: [afmc] AUTHORITY.KEYID = 5
2,808,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,009 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,738 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,621 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,340 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,327 UART: [afmc] --
2,852,417 UART: [cold-reset] --
2,853,229 UART: [state] Locking Datavault
2,854,324 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,928 UART: [state] Locking ICCM
2,855,558 UART: [exit] Launching FMC @ 0x40000130
2,860,887 UART:
2,860,903 UART: Running Caliptra FMC ...
2,861,311 UART:
2,861,365 UART: [state] CFI Enabled
2,872,082 UART: [fht] FMC Alias Private Key: 7
2,980,071 UART: [art] Extend RT PCRs Done
2,980,499 UART: [art] Lock RT PCRs Done
2,981,979 UART: [art] Populate DV Done
2,990,388 UART: [fht] FMC Alias Private Key: 7
2,991,366 UART: [art] Derive CDI
2,991,646 UART: [art] Store in in slot 0x4
3,077,323 UART: [art] Derive Key Pair
3,077,683 UART: [art] Store priv key in slot 0x5
3,090,649 UART: [art] Derive Key Pair - Done
3,105,478 UART: [art] Signing Cert with AUTHO
3,105,958 UART: RITY.KEYID = 7
3,120,984 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,749 UART: [art] PUB.X = 5B69FCBAE90A5C2CA9A6E611030463F97501F7625B7351FDEF5FA9B9864141D88AEF51E2FDD2F21F6DC444463BD02248
3,128,517 UART: [art] PUB.Y = 57946E79C5D889318BEE879B16DA3DE4EA5457DF4A64892AC84E379C9D3033B3CA426FE428190ED457778DFBFD0A7710
3,135,467 UART: [art] SIG.R = 1D173E8DD1DC70D45F1AAF1ED411734A66E5DE5D162DC00418ED371805F9BEF0AB6943E0B699CE9E1C8A2E9095822955
3,142,241 UART: [art] SIG.S = 7D66E0EC6342AFB0A028A733E92E46065D8213422C0D09954FFD20FC6AE6834BFF4C299335E2F80377BFDA2EEBF7883A
3,166,330 UART: Caliptra RT
3,166,583 UART: [state] CFI Enabled
3,274,236 UART: [rt] RT listening for mailbox commands...
3,274,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,420 UART: [rt]cmd =0x44504543, len=96
3,485,919 >>> mbox cmd response data (6236 bytes)
3,485,920 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,573 UART: [rt]cmd =0x52564348, len=36
3,517,826 >>> mbox cmd response data (8 bytes)
3,517,827 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,547,912 UART: [rt]cmd =0x44504543, len=96
3,728,343 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,296 ready_for_fw is high
1,056,296 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,031 >>> mbox cmd response: success
2,684,561 UART:
2,684,577 UART: Running Caliptra FMC ...
2,684,985 UART:
2,685,039 UART: [state] CFI Enabled
2,695,554 UART: [fht] FMC Alias Private Key: 7
2,804,045 UART: [art] Extend RT PCRs Done
2,804,473 UART: [art] Lock RT PCRs Done
2,805,999 UART: [art] Populate DV Done
2,814,452 UART: [fht] FMC Alias Private Key: 7
2,815,482 UART: [art] Derive CDI
2,815,762 UART: [art] Store in in slot 0x4
2,900,825 UART: [art] Derive Key Pair
2,901,185 UART: [art] Store priv key in slot 0x5
2,914,229 UART: [art] Derive Key Pair - Done
2,929,103 UART: [art] Signing Cert with AUTHO
2,929,583 UART: RITY.KEYID = 7
2,945,071 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,836 UART: [art] PUB.X = B4F87750F53142F5CC7C561F552648F1FCA3BA7FE4CF67B5216C8BD4E64BBBCFC59B0F1287A4AB0C549EC0DA71B53618
2,952,618 UART: [art] PUB.Y = 0E522D48E04023EB12D859BA504FE5078A93360C3F0A08E2A5FE4C83EAA5BAD8DBCC785ED9E2D131994DB3FE2483F810
2,959,567 UART: [art] SIG.R = A8F25E6F1AB1222DADFC75E58177E20E20D87C7DFCF35500D047AB3A0A38EC4E19E7155D91ED9E85FE870A57758BC897
2,966,320 UART: [art] SIG.S = E1C478CB7734F1B785C6D99852EA55C9C0F9FE800FF758A18274E218AFF4A7315BA0E09D2BEC267E87A25B61745B095B
2,989,705 UART: Caliptra RT
2,989,958 UART: [state] CFI Enabled
3,097,714 UART: [rt] RT listening for mailbox commands...
3,098,384 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,978 UART: [rt]cmd =0x44504543, len=96
3,309,805 >>> mbox cmd response data (6236 bytes)
3,309,806 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,421 UART: [rt]cmd =0x52564348, len=36
3,341,460 >>> mbox cmd response data (8 bytes)
3,341,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,412 UART: [rt]cmd =0x44504543, len=96
3,551,993 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
899,976 UART: [kat] SHA2-256
901,916 UART: [kat] SHA2-384
904,619 UART: [kat] SHA2-512-ACC
906,520 UART: [kat] ECC-384
916,601 UART: [kat] HMAC-384Kdf
921,255 UART: [kat] LMS
1,169,567 UART: [kat] --
1,170,326 UART: [cold-reset] ++
1,170,844 UART: [fht] FHT @ 0x50003400
1,173,340 UART: [idev] ++
1,173,508 UART: [idev] CDI.KEYID = 6
1,173,869 UART: [idev] SUBJECT.KEYID = 7
1,174,294 UART: [idev] UDS.KEYID = 0
1,174,640 ready_for_fw is high
1,174,640 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,360 UART: [idev] Erasing UDS.KEYID = 0
1,199,992 UART: [idev] Sha1 KeyId Algorithm
1,208,714 UART: [idev] --
1,209,755 UART: [ldev] ++
1,209,923 UART: [ldev] CDI.KEYID = 6
1,210,287 UART: [ldev] SUBJECT.KEYID = 5
1,210,714 UART: [ldev] AUTHORITY.KEYID = 7
1,211,177 UART: [ldev] FE.KEYID = 1
1,216,559 UART: [ldev] Erasing FE.KEYID = 1
1,243,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,257 UART: [ldev] --
1,282,729 UART: [fwproc] Wait for Commands...
1,283,336 UART: [fwproc] Recv command 0x46574c44
1,284,069 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,185 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,494 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,206 >>> mbox cmd response: success
2,773,283 UART: [afmc] ++
2,773,451 UART: [afmc] CDI.KEYID = 6
2,773,814 UART: [afmc] SUBJECT.KEYID = 7
2,774,240 UART: [afmc] AUTHORITY.KEYID = 5
2,810,153 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,733 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,484 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,213 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,096 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,815 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,612 UART: [afmc] --
2,853,706 UART: [cold-reset] --
2,854,576 UART: [state] Locking Datavault
2,855,443 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,047 UART: [state] Locking ICCM
2,856,719 UART: [exit] Launching FMC @ 0x40000130
2,862,048 UART:
2,862,064 UART: Running Caliptra FMC ...
2,862,472 UART:
2,862,615 UART: [state] CFI Enabled
2,873,464 UART: [fht] FMC Alias Private Key: 7
2,981,723 UART: [art] Extend RT PCRs Done
2,982,151 UART: [art] Lock RT PCRs Done
2,983,773 UART: [art] Populate DV Done
2,992,192 UART: [fht] FMC Alias Private Key: 7
2,993,328 UART: [art] Derive CDI
2,993,608 UART: [art] Store in in slot 0x4
3,079,229 UART: [art] Derive Key Pair
3,079,589 UART: [art] Store priv key in slot 0x5
3,093,217 UART: [art] Derive Key Pair - Done
3,107,908 UART: [art] Signing Cert with AUTHO
3,108,388 UART: RITY.KEYID = 7
3,123,968 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,733 UART: [art] PUB.X = E4CA2FCFBBEEBEF8E5BE079083F3D2142F3C88A5C27B5F4531D853E7D884D43AFD7C095C7F149B58FB31950941421091
3,131,506 UART: [art] PUB.Y = 4A08EF2735FD322DDB28ABBFECF00BC0205ED6A19AD4A33F037F169D250B46987F30DE356BD3013F2DD7BF8853AEF211
3,138,459 UART: [art] SIG.R = C6ABA223798A2161921C3229840869578A970F81016AFD64C6FF053BCD86188FAFA3E8A4902E1CB0DE17EBFADBBE262C
3,145,229 UART: [art] SIG.S = E94810ACF357D2BB67F853B152AF5975886291B871ECD521B35CC548EA43B57F326C539306EBB1BE106DE74C5D852679
3,169,383 UART: Caliptra RT
3,169,728 UART: [state] CFI Enabled
3,277,562 UART: [rt] RT listening for mailbox commands...
3,278,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,768 UART: [rt]cmd =0x44504543, len=96
3,490,566 >>> mbox cmd response data (6236 bytes)
3,490,567 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,080 UART: [rt]cmd =0x52564348, len=36
3,522,405 >>> mbox cmd response data (8 bytes)
3,522,406 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,552,439 UART: [rt]cmd =0x44504543, len=96
3,733,509 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,645 ready_for_fw is high
1,056,645 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,602 >>> mbox cmd response: success
2,687,218 UART:
2,687,234 UART: Running Caliptra FMC ...
2,687,642 UART:
2,687,785 UART: [state] CFI Enabled
2,698,800 UART: [fht] FMC Alias Private Key: 7
2,806,499 UART: [art] Extend RT PCRs Done
2,806,927 UART: [art] Lock RT PCRs Done
2,808,439 UART: [art] Populate DV Done
2,816,700 UART: [fht] FMC Alias Private Key: 7
2,817,644 UART: [art] Derive CDI
2,817,924 UART: [art] Store in in slot 0x4
2,903,319 UART: [art] Derive Key Pair
2,903,679 UART: [art] Store priv key in slot 0x5
2,916,925 UART: [art] Derive Key Pair - Done
2,931,958 UART: [art] Signing Cert with AUTHO
2,932,438 UART: RITY.KEYID = 7
2,947,976 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,741 UART: [art] PUB.X = 0DB6AA9234907A2AC384CF6E2AC3039D148DCC4538A19248065EFADF5447C533B2B145C03624A6CDE7DDD51DA37AB044
2,955,514 UART: [art] PUB.Y = 221914F0028AAC70E4ECA0498E53EFFB8E4CE7301D3E355819010DB28F75D6FAC4054F5E15A7F824D6047E6DE78AE158
2,962,457 UART: [art] SIG.R = FD23C40753A6B4E7401EA05355820F36E8494F1F44A47A138FCF5F2973EB69F3137DBA66757EE1D9C41D4EDAAD679F95
2,969,229 UART: [art] SIG.S = 5F26F644B074B0A04A2951CE8E5EFFCA2A05240D0967206763297012533BFD64518D1CE964066D3730530C6EFA6FD2A9
2,992,951 UART: Caliptra RT
2,993,296 UART: [state] CFI Enabled
3,101,131 UART: [rt] RT listening for mailbox commands...
3,101,801 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,967 UART: [rt]cmd =0x44504543, len=96
3,312,840 >>> mbox cmd response data (6236 bytes)
3,312,841 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,584 UART: [rt]cmd =0x52564348, len=36
3,344,823 >>> mbox cmd response data (8 bytes)
3,344,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,374,773 UART: [rt]cmd =0x44504543, len=96
3,555,776 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,605 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,253 UART: [kat] SHA2-256
882,184 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,299 UART: [kat] ++
886,451 UART: [kat] sha1
890,841 UART: [kat] SHA2-256
892,779 UART: [kat] SHA2-384
895,512 UART: [kat] SHA2-512-ACC
897,413 UART: [kat] ECC-384
903,116 UART: [kat] HMAC-384Kdf
907,728 UART: [kat] LMS
1,475,924 UART: [kat] --
1,476,953 UART: [cold-reset] ++
1,477,437 UART: [fht] Storing FHT @ 0x50003400
1,480,152 UART: [idev] ++
1,480,320 UART: [idev] CDI.KEYID = 6
1,480,680 UART: [idev] SUBJECT.KEYID = 7
1,481,104 UART: [idev] UDS.KEYID = 0
1,481,449 ready_for_fw is high
1,481,449 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,906 UART: [idev] Erasing UDS.KEYID = 0
1,505,746 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,270 UART: [idev] --
1,515,347 UART: [ldev] ++
1,515,515 UART: [ldev] CDI.KEYID = 6
1,515,878 UART: [ldev] SUBJECT.KEYID = 5
1,516,304 UART: [ldev] AUTHORITY.KEYID = 7
1,516,767 UART: [ldev] FE.KEYID = 1
1,522,175 UART: [ldev] Erasing FE.KEYID = 1
1,547,682 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,758 UART: [ldev] --
1,587,065 UART: [fwproc] Waiting for Commands...
1,587,820 UART: [fwproc] Received command 0x46574c44
1,588,611 UART: [fwproc] Received Image of size 114332 bytes
2,886,247 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,139 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,491 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,238 >>> mbox cmd response: success
3,079,386 UART: [afmc] ++
3,079,554 UART: [afmc] CDI.KEYID = 6
3,079,916 UART: [afmc] SUBJECT.KEYID = 7
3,080,341 UART: [afmc] AUTHORITY.KEYID = 5
3,116,054 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,492 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,272 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,000 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,885 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,575 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,568 UART: [afmc] --
3,159,462 UART: [cold-reset] --
3,160,176 UART: [state] Locking Datavault
3,161,307 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,911 UART: [state] Locking ICCM
3,162,539 UART: [exit] Launching FMC @ 0x40000130
3,167,868 UART:
3,167,884 UART: Running Caliptra FMC ...
3,168,292 UART:
3,168,346 UART: [state] CFI Enabled
3,178,637 UART: [fht] FMC Alias Private Key: 7
3,286,300 UART: [art] Extend RT PCRs Done
3,286,728 UART: [art] Lock RT PCRs Done
3,288,324 UART: [art] Populate DV Done
3,296,495 UART: [fht] FMC Alias Private Key: 7
3,297,669 UART: [art] Derive CDI
3,297,949 UART: [art] Store in in slot 0x4
3,383,692 UART: [art] Derive Key Pair
3,384,052 UART: [art] Store priv key in slot 0x5
3,397,728 UART: [art] Derive Key Pair - Done
3,412,532 UART: [art] Signing Cert with AUTHO
3,413,012 UART: RITY.KEYID = 7
3,428,142 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,907 UART: [art] PUB.X = 201FFBBB869691786E3B4AFD2ACFA7B71D9E65DB10693757538488269BA0F8231C13C56EEF83984A7FE2E3EF8F53A789
3,435,685 UART: [art] PUB.Y = 8E317B8F59E0C289A4191B42641156EAA826674440B47FD6D6AAB1980001AD3DBACA567ED2743D941C24FBF762AE4871
3,442,614 UART: [art] SIG.R = F967F6094D8D40DFC1D3991BBB4B7F0DB5BB9EC40B22912C09FB063E514D1AF7738D8C5C1C28F5550E3715BC267DC22F
3,449,380 UART: [art] SIG.S = D01E5D7C9B75B4F524A088E7B7BAC0709C4ED65E83CB8ADFC42E63BEE17A51859FC84E2562507F758A47EE302A4DE286
3,472,979 UART: Caliptra RT
3,473,232 UART: [state] CFI Enabled
3,582,060 UART: [rt] RT listening for mailbox commands...
3,582,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,926 UART: [rt]cmd =0x44504543, len=96
3,792,173 >>> mbox cmd response data (6236 bytes)
3,792,174 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,977 UART: [rt]cmd =0x52564348, len=36
3,823,980 >>> mbox cmd response data (8 bytes)
3,823,981 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,853,686 UART: [rt]cmd =0x52564348, len=36
3,855,244 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,751 ready_for_fw is high
1,362,751 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,780 >>> mbox cmd response: success
2,989,072 UART:
2,989,088 UART: Running Caliptra FMC ...
2,989,496 UART:
2,989,550 UART: [state] CFI Enabled
3,000,251 UART: [fht] FMC Alias Private Key: 7
3,108,202 UART: [art] Extend RT PCRs Done
3,108,630 UART: [art] Lock RT PCRs Done
3,110,068 UART: [art] Populate DV Done
3,118,511 UART: [fht] FMC Alias Private Key: 7
3,119,653 UART: [art] Derive CDI
3,119,933 UART: [art] Store in in slot 0x4
3,205,566 UART: [art] Derive Key Pair
3,205,926 UART: [art] Store priv key in slot 0x5
3,219,012 UART: [art] Derive Key Pair - Done
3,234,013 UART: [art] Signing Cert with AUTHO
3,234,493 UART: RITY.KEYID = 7
3,249,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,516 UART: [art] PUB.X = 9A2B64438F0C8E26312B0537EF2E20F097C9E31BCF0FC6B3C1E30F07B1A8DA9D870EE285F5C964B4BB531B7EEECB06F4
3,257,283 UART: [art] PUB.Y = 0F1F9158B5113BBE073876F30A5BCA7A506F1B42CF02593DF83F3B06C1DDDE48A115A669034DD0A8BB745B1369AD7F78
3,264,225 UART: [art] SIG.R = 150528D1F03A0BB8EB334CE54F4E766B6018D229845354F4F197BC8CD886CF0B10D8D5C79B7C7AF4213C1885AE3C28CD
3,270,994 UART: [art] SIG.S = C93D517E9338CBD5FD80291E6BF377E7E47544BD4F67BD2B307071313AE2F8F069DD74F157B2C65AA626B6E427EA70E5
3,294,543 UART: Caliptra RT
3,294,796 UART: [state] CFI Enabled
3,403,205 UART: [rt] RT listening for mailbox commands...
3,403,875 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,437 UART: [rt]cmd =0x44504543, len=96
3,615,350 >>> mbox cmd response data (6236 bytes)
3,615,351 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,030 UART: [rt]cmd =0x52564348, len=36
3,646,825 >>> mbox cmd response data (8 bytes)
3,646,826 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,676,629 UART: [rt]cmd =0x52564348, len=36
3,678,271 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,758 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,480 UART: [kat] SHA2-256
882,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,526 UART: [kat] ++
886,678 UART: [kat] sha1
890,706 UART: [kat] SHA2-256
892,644 UART: [kat] SHA2-384
895,311 UART: [kat] SHA2-512-ACC
897,212 UART: [kat] ECC-384
902,705 UART: [kat] HMAC-384Kdf
907,299 UART: [kat] LMS
1,475,495 UART: [kat] --
1,476,246 UART: [cold-reset] ++
1,476,668 UART: [fht] Storing FHT @ 0x50003400
1,479,565 UART: [idev] ++
1,479,733 UART: [idev] CDI.KEYID = 6
1,480,093 UART: [idev] SUBJECT.KEYID = 7
1,480,517 UART: [idev] UDS.KEYID = 0
1,480,862 ready_for_fw is high
1,480,862 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,619 UART: [idev] Erasing UDS.KEYID = 0
1,505,647 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,191 UART: [idev] --
1,515,314 UART: [ldev] ++
1,515,482 UART: [ldev] CDI.KEYID = 6
1,515,845 UART: [ldev] SUBJECT.KEYID = 5
1,516,271 UART: [ldev] AUTHORITY.KEYID = 7
1,516,734 UART: [ldev] FE.KEYID = 1
1,521,852 UART: [ldev] Erasing FE.KEYID = 1
1,547,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,161 UART: [ldev] --
1,586,524 UART: [fwproc] Waiting for Commands...
1,587,239 UART: [fwproc] Received command 0x46574c44
1,588,030 UART: [fwproc] Received Image of size 114332 bytes
2,884,584 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,142 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,494 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,339 >>> mbox cmd response: success
3,078,365 UART: [afmc] ++
3,078,533 UART: [afmc] CDI.KEYID = 6
3,078,895 UART: [afmc] SUBJECT.KEYID = 7
3,079,320 UART: [afmc] AUTHORITY.KEYID = 5
3,114,103 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,213 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,993 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,721 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,606 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,296 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,225 UART: [afmc] --
3,157,317 UART: [cold-reset] --
3,158,261 UART: [state] Locking Datavault
3,159,616 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,220 UART: [state] Locking ICCM
3,160,828 UART: [exit] Launching FMC @ 0x40000130
3,166,157 UART:
3,166,173 UART: Running Caliptra FMC ...
3,166,581 UART:
3,166,724 UART: [state] CFI Enabled
3,177,177 UART: [fht] FMC Alias Private Key: 7
3,284,964 UART: [art] Extend RT PCRs Done
3,285,392 UART: [art] Lock RT PCRs Done
3,286,974 UART: [art] Populate DV Done
3,295,239 UART: [fht] FMC Alias Private Key: 7
3,296,347 UART: [art] Derive CDI
3,296,627 UART: [art] Store in in slot 0x4
3,382,222 UART: [art] Derive Key Pair
3,382,582 UART: [art] Store priv key in slot 0x5
3,395,594 UART: [art] Derive Key Pair - Done
3,410,696 UART: [art] Signing Cert with AUTHO
3,411,176 UART: RITY.KEYID = 7
3,426,562 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,327 UART: [art] PUB.X = 702ACCD3CC4EB7E242E48223C594F550087773CBD76E67DE0C9A64AF897F8ECC251D44FFD3E35EC51FCDE74D230350BF
3,434,106 UART: [art] PUB.Y = B4F68F18E2BD3F045E6BB7632EDCDD4005FB4F3717387D66F5C12A5D653F0441BC82C7D83700AB791AD21CD0CAD5A653
3,441,039 UART: [art] SIG.R = E96A552F8FBF893534BE64D7BFE1D1C5A299FB9F3383BDB3AD5AAA3EE54F7C62D9BAE934360824E4EA1B66C6ED0F596E
3,447,827 UART: [art] SIG.S = 574DBDA37A376F077CCC283482D0946AFBE6FD67DE250230DC15A58B702006CE1031E79D31330A6013CA59F3FBA9FE00
3,471,698 UART: Caliptra RT
3,472,043 UART: [state] CFI Enabled
3,579,518 UART: [rt] RT listening for mailbox commands...
3,580,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,304 UART: [rt]cmd =0x44504543, len=96
3,791,160 >>> mbox cmd response data (6236 bytes)
3,791,161 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,820,826 UART: [rt]cmd =0x52564348, len=36
3,823,467 >>> mbox cmd response data (8 bytes)
3,823,468 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,852,951 UART: [rt]cmd =0x52564348, len=36
3,854,241 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,062 ready_for_fw is high
1,362,062 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,599 >>> mbox cmd response: success
2,989,711 UART:
2,989,727 UART: Running Caliptra FMC ...
2,990,135 UART:
2,990,278 UART: [state] CFI Enabled
3,000,885 UART: [fht] FMC Alias Private Key: 7
3,108,746 UART: [art] Extend RT PCRs Done
3,109,174 UART: [art] Lock RT PCRs Done
3,110,570 UART: [art] Populate DV Done
3,118,831 UART: [fht] FMC Alias Private Key: 7
3,120,009 UART: [art] Derive CDI
3,120,289 UART: [art] Store in in slot 0x4
3,205,918 UART: [art] Derive Key Pair
3,206,278 UART: [art] Store priv key in slot 0x5
3,219,424 UART: [art] Derive Key Pair - Done
3,234,183 UART: [art] Signing Cert with AUTHO
3,234,663 UART: RITY.KEYID = 7
3,249,993 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,758 UART: [art] PUB.X = 13554EAAAEAD4143BCF7E5E13323A995A9D27370BAA3FFB13104AA9492A16E78B1FDB74C55A9629544753CD6AD80BFFD
3,257,541 UART: [art] PUB.Y = E43854E272AE648BCED2F692F4983DA6F456CF6619E042F50C1EF412F82ADB73710AE0B9F72E07113FCD912E01D59708
3,264,482 UART: [art] SIG.R = 83426BD70526576276426945CCFC46DBA8CC6B476A896A3A439B6CDEFE74E6DE237C059FE0D564A4C1155CDE41C28BA0
3,271,256 UART: [art] SIG.S = 0BD9E4412624D03686CC2CEA7EFC44FEC6719FC780E5464547FF1FA97B695DA5179D5FA115200EDB3150F9304A905641
3,294,533 UART: Caliptra RT
3,294,878 UART: [state] CFI Enabled
3,404,027 UART: [rt] RT listening for mailbox commands...
3,404,697 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,173 UART: [rt]cmd =0x44504543, len=96
3,615,607 >>> mbox cmd response data (6236 bytes)
3,615,608 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,237 UART: [rt]cmd =0x52564348, len=36
3,647,422 >>> mbox cmd response data (8 bytes)
3,647,423 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,677,044 UART: [rt]cmd =0x52564348, len=36
3,678,360 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,751 UART: [state] WD Timer not started. Device not locked for debugging
87,978 UART: [kat] SHA2-256
893,628 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,753 UART: [kat] ++
897,905 UART: [kat] sha1
902,125 UART: [kat] SHA2-256
904,065 UART: [kat] SHA2-384
906,658 UART: [kat] SHA2-512-ACC
908,559 UART: [kat] ECC-384
918,028 UART: [kat] HMAC-384Kdf
922,682 UART: [kat] LMS
1,171,010 UART: [kat] --
1,171,745 UART: [cold-reset] ++
1,172,299 UART: [fht] FHT @ 0x50003400
1,175,096 UART: [idev] ++
1,175,264 UART: [idev] CDI.KEYID = 6
1,175,624 UART: [idev] SUBJECT.KEYID = 7
1,176,048 UART: [idev] UDS.KEYID = 0
1,176,393 ready_for_fw is high
1,176,393 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,926 UART: [idev] Erasing UDS.KEYID = 0
1,201,029 UART: [idev] Sha1 KeyId Algorithm
1,209,377 UART: [idev] --
1,210,183 UART: [ldev] ++
1,210,351 UART: [ldev] CDI.KEYID = 6
1,210,714 UART: [ldev] SUBJECT.KEYID = 5
1,211,140 UART: [ldev] AUTHORITY.KEYID = 7
1,211,603 UART: [ldev] FE.KEYID = 1
1,216,627 UART: [ldev] Erasing FE.KEYID = 1
1,242,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,363 UART: [ldev] --
1,281,718 UART: [fwproc] Wait for Commands...
1,282,306 UART: [fwproc] Recv command 0x46574c44
1,283,034 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,866 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,170 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,883 >>> mbox cmd response: success
2,773,943 UART: [afmc] ++
2,774,111 UART: [afmc] CDI.KEYID = 6
2,774,473 UART: [afmc] SUBJECT.KEYID = 7
2,774,898 UART: [afmc] AUTHORITY.KEYID = 5
2,810,521 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,246 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,994 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,722 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,607 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,326 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,108 UART: [afmc] --
2,854,238 UART: [cold-reset] --
2,855,118 UART: [state] Locking Datavault
2,856,519 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,123 UART: [state] Locking ICCM
2,857,713 UART: [exit] Launching FMC @ 0x40000130
2,863,042 UART:
2,863,058 UART: Running Caliptra FMC ...
2,863,466 UART:
2,863,520 UART: [state] CFI Enabled
2,874,325 UART: [fht] FMC Alias Private Key: 7
2,982,308 UART: [art] Extend RT PCRs Done
2,982,736 UART: [art] Lock RT PCRs Done
2,983,984 UART: [art] Populate DV Done
2,991,899 UART: [fht] FMC Alias Private Key: 7
2,992,831 UART: [art] Derive CDI
2,993,111 UART: [art] Store in in slot 0x4
3,078,736 UART: [art] Derive Key Pair
3,079,096 UART: [art] Store priv key in slot 0x5
3,091,518 UART: [art] Derive Key Pair - Done
3,106,313 UART: [art] Signing Cert with AUTHO
3,106,793 UART: RITY.KEYID = 7
3,121,801 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,566 UART: [art] PUB.X = F5DAC9084158D0D9267D1FC7328A71728012B5380BA3A9246868E9EFBD5223A5985D54BDE44DE72430F512C32D218E53
3,129,328 UART: [art] PUB.Y = AB32BD20054D1D5D838B93CF6F99D249AD2747AFDB24CE7911B475E39FB26A6D61AB542524CDC796A1A3EDDD9F5AC438
3,136,293 UART: [art] SIG.R = 30F51AE550DA1A3CF8A9399DFB2023D028B9E4DC4BD9C7ACFD6C9BD6FBEE2CC53821FF1738E527E8A443EB04EF1447B5
3,143,084 UART: [art] SIG.S = FD9C67239D2E70E7987492EEDBFBBC58909193619573F7CB7DED3C00CBAA45F3EF6DE6348ACF4548CBE5AB0665B47B43
3,166,380 UART: Caliptra RT
3,166,633 UART: [state] CFI Enabled
3,273,636 UART: [rt] RT listening for mailbox commands...
3,274,306 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,488 UART: [rt]cmd =0x44504543, len=96
3,484,625 >>> mbox cmd response data (6236 bytes)
3,484,626 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,513,995 UART: [rt]cmd =0x52564348, len=36
3,516,322 >>> mbox cmd response data (8 bytes)
3,516,323 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,545,934 UART: [rt]cmd =0x52564348, len=36
3,547,302 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,295 ready_for_fw is high
1,060,295 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,196 >>> mbox cmd response: success
2,687,490 UART:
2,687,506 UART: Running Caliptra FMC ...
2,687,914 UART:
2,687,968 UART: [state] CFI Enabled
2,698,299 UART: [fht] FMC Alias Private Key: 7
2,806,084 UART: [art] Extend RT PCRs Done
2,806,512 UART: [art] Lock RT PCRs Done
2,808,194 UART: [art] Populate DV Done
2,816,627 UART: [fht] FMC Alias Private Key: 7
2,817,559 UART: [art] Derive CDI
2,817,839 UART: [art] Store in in slot 0x4
2,903,304 UART: [art] Derive Key Pair
2,903,664 UART: [art] Store priv key in slot 0x5
2,916,754 UART: [art] Derive Key Pair - Done
2,931,331 UART: [art] Signing Cert with AUTHO
2,931,811 UART: RITY.KEYID = 7
2,947,307 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,072 UART: [art] PUB.X = 8AF2213E854BB0AA171A02BCB39D1FA6B2F00F58B96B7C912F4883112BF54EAF6D5DCA1AAE331DA624A20E12BE5DD745
2,954,853 UART: [art] PUB.Y = BB39C0632184BD05C567460BE08F47DD82FA3AC462E8E066E23C542FC1CAD33CC8F3494CA932B3F7EBFE7F8019D6089D
2,961,808 UART: [art] SIG.R = 43FBAA45FCC59DCBCD12304B5742A794A316AA5D11306D642245E5324B0343C54F9D55B921F3ED94642FF9BDCFD1486D
2,968,585 UART: [art] SIG.S = CBD70BF838A27FE663E7D701F5DFDA02DFB9F90D89A3D285475A40ACFCDD26F0A4C8C86E34F470939078AD7C5F5F710C
2,992,597 UART: Caliptra RT
2,992,850 UART: [state] CFI Enabled
3,100,703 UART: [rt] RT listening for mailbox commands...
3,101,373 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,645 UART: [rt]cmd =0x44504543, len=96
3,311,432 >>> mbox cmd response data (6236 bytes)
3,311,433 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,906 UART: [rt]cmd =0x52564348, len=36
3,343,073 >>> mbox cmd response data (8 bytes)
3,343,074 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,609 UART: [rt]cmd =0x52564348, len=36
3,374,127 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,743 UART: [state] LifecycleState = Unprovisioned
86,398 UART: [state] DebugLocked = No
87,038 UART: [state] WD Timer not started. Device not locked for debugging
88,269 UART: [kat] SHA2-256
893,919 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,044 UART: [kat] ++
898,196 UART: [kat] sha1
902,494 UART: [kat] SHA2-256
904,434 UART: [kat] SHA2-384
907,223 UART: [kat] SHA2-512-ACC
909,124 UART: [kat] ECC-384
919,201 UART: [kat] HMAC-384Kdf
923,837 UART: [kat] LMS
1,172,165 UART: [kat] --
1,172,974 UART: [cold-reset] ++
1,173,518 UART: [fht] FHT @ 0x50003400
1,176,207 UART: [idev] ++
1,176,375 UART: [idev] CDI.KEYID = 6
1,176,735 UART: [idev] SUBJECT.KEYID = 7
1,177,159 UART: [idev] UDS.KEYID = 0
1,177,504 ready_for_fw is high
1,177,504 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,301 UART: [idev] Erasing UDS.KEYID = 0
1,202,424 UART: [idev] Sha1 KeyId Algorithm
1,210,908 UART: [idev] --
1,211,968 UART: [ldev] ++
1,212,136 UART: [ldev] CDI.KEYID = 6
1,212,499 UART: [ldev] SUBJECT.KEYID = 5
1,212,925 UART: [ldev] AUTHORITY.KEYID = 7
1,213,388 UART: [ldev] FE.KEYID = 1
1,218,470 UART: [ldev] Erasing FE.KEYID = 1
1,245,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,404 UART: [ldev] --
1,284,827 UART: [fwproc] Wait for Commands...
1,285,529 UART: [fwproc] Recv command 0x46574c44
1,286,257 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,995 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,299 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,104 >>> mbox cmd response: success
2,777,290 UART: [afmc] ++
2,777,458 UART: [afmc] CDI.KEYID = 6
2,777,820 UART: [afmc] SUBJECT.KEYID = 7
2,778,245 UART: [afmc] AUTHORITY.KEYID = 5
2,814,210 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,897 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,625 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,510 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,229 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,039 UART: [afmc] --
2,858,071 UART: [cold-reset] --
2,858,921 UART: [state] Locking Datavault
2,859,982 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,586 UART: [state] Locking ICCM
2,861,152 UART: [exit] Launching FMC @ 0x40000130
2,866,481 UART:
2,866,497 UART: Running Caliptra FMC ...
2,866,905 UART:
2,867,048 UART: [state] CFI Enabled
2,877,673 UART: [fht] FMC Alias Private Key: 7
2,985,172 UART: [art] Extend RT PCRs Done
2,985,600 UART: [art] Lock RT PCRs Done
2,987,032 UART: [art] Populate DV Done
2,995,211 UART: [fht] FMC Alias Private Key: 7
2,996,215 UART: [art] Derive CDI
2,996,495 UART: [art] Store in in slot 0x4
3,082,316 UART: [art] Derive Key Pair
3,082,676 UART: [art] Store priv key in slot 0x5
3,095,536 UART: [art] Derive Key Pair - Done
3,109,970 UART: [art] Signing Cert with AUTHO
3,110,450 UART: RITY.KEYID = 7
3,125,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,513 UART: [art] PUB.X = 59C451556F6DA380BA3129ABC92D7882EB4A5B93DBF408F1CCC28D88CC7CF7E00F9D9E6F7F2B61A297E78193CFE7F89E
3,133,295 UART: [art] PUB.Y = B0FD33D0C9B8E24849B768D8CB9EC54BD184E3157DFB96650C39BBEF56D51A9DDDE8F0839504B1AC1CC98C8C8815CBAB
3,140,261 UART: [art] SIG.R = 4C7A4B97CDCA06B332456C70F5A436FAF10D83EDAD1F84EBABC7620A80E725D11F1761F8E4591873620CB349F33F5A7F
3,147,031 UART: [art] SIG.S = 770573E0C84655B623A2D1E1C9CEE5A143A1B80D375436625809D0F9682DA0BBFE0300AD508DA4192E88717843333F59
3,171,018 UART: Caliptra RT
3,171,363 UART: [state] CFI Enabled
3,279,610 UART: [rt] RT listening for mailbox commands...
3,280,280 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,474 UART: [rt]cmd =0x44504543, len=96
3,491,390 >>> mbox cmd response data (6236 bytes)
3,491,391 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,521,040 UART: [rt]cmd =0x52564348, len=36
3,523,559 >>> mbox cmd response data (8 bytes)
3,523,560 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,552,991 UART: [rt]cmd =0x52564348, len=36
3,554,489 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,792 ready_for_fw is high
1,060,792 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,265 >>> mbox cmd response: success
2,689,477 UART:
2,689,493 UART: Running Caliptra FMC ...
2,689,901 UART:
2,690,044 UART: [state] CFI Enabled
2,700,481 UART: [fht] FMC Alias Private Key: 7
2,808,796 UART: [art] Extend RT PCRs Done
2,809,224 UART: [art] Lock RT PCRs Done
2,810,792 UART: [art] Populate DV Done
2,818,931 UART: [fht] FMC Alias Private Key: 7
2,819,927 UART: [art] Derive CDI
2,820,207 UART: [art] Store in in slot 0x4
2,906,114 UART: [art] Derive Key Pair
2,906,474 UART: [art] Store priv key in slot 0x5
2,919,860 UART: [art] Derive Key Pair - Done
2,934,844 UART: [art] Signing Cert with AUTHO
2,935,324 UART: RITY.KEYID = 7
2,950,448 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,213 UART: [art] PUB.X = 5BDC1714FBBF8EC398715F93515DCDEA7FE790F702CD21B95AA6E624E68A743E735E53415C7F6619CC5FB26CBD0112A7
2,957,991 UART: [art] PUB.Y = 461E07A3AC8723F89BBC62ED53B0612850C174F2FCA325941F6E1B004A590CB11E61660AF82AD00AD79BF67C60458C36
2,964,911 UART: [art] SIG.R = 25699BC6E634C74BCB645611DE76D9B6A59FC73F65EA7B4BFC87870610A049FD6EA4D1DB408B7621D7683D6042FD69A8
2,971,686 UART: [art] SIG.S = 2F6098678F3D867C2A5D37D9754B1240048DD4EA36987DF0AD74A184FDB8D7CD098AA9DFE839061405901FFBD656F0D0
2,995,773 UART: Caliptra RT
2,996,118 UART: [state] CFI Enabled
3,103,929 UART: [rt] RT listening for mailbox commands...
3,104,599 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,829 UART: [rt]cmd =0x44504543, len=96
3,316,134 >>> mbox cmd response data (6236 bytes)
3,316,135 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,658 UART: [rt]cmd =0x52564348, len=36
3,347,849 >>> mbox cmd response data (8 bytes)
3,347,850 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,377,367 UART: [rt]cmd =0x52564348, len=36
3,378,725 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
891,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,309 UART: [kat] ++
895,461 UART: [kat] sha1
899,821 UART: [kat] SHA2-256
901,761 UART: [kat] SHA2-384
904,692 UART: [kat] SHA2-512-ACC
906,593 UART: [kat] ECC-384
916,620 UART: [kat] HMAC-384Kdf
921,248 UART: [kat] LMS
1,169,560 UART: [kat] --
1,170,633 UART: [cold-reset] ++
1,171,017 UART: [fht] FHT @ 0x50003400
1,173,585 UART: [idev] ++
1,173,753 UART: [idev] CDI.KEYID = 6
1,174,114 UART: [idev] SUBJECT.KEYID = 7
1,174,539 UART: [idev] UDS.KEYID = 0
1,174,885 ready_for_fw is high
1,174,885 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,763 UART: [idev] Erasing UDS.KEYID = 0
1,199,223 UART: [idev] Sha1 KeyId Algorithm
1,208,217 UART: [idev] --
1,209,384 UART: [ldev] ++
1,209,552 UART: [ldev] CDI.KEYID = 6
1,209,916 UART: [ldev] SUBJECT.KEYID = 5
1,210,343 UART: [ldev] AUTHORITY.KEYID = 7
1,210,806 UART: [ldev] FE.KEYID = 1
1,215,586 UART: [ldev] Erasing FE.KEYID = 1
1,241,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,622 UART: [ldev] --
1,280,898 UART: [fwproc] Wait for Commands...
1,281,647 UART: [fwproc] Recv command 0x46574c44
1,282,380 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,072 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,381 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,271 >>> mbox cmd response: success
2,773,402 UART: [afmc] ++
2,773,570 UART: [afmc] CDI.KEYID = 6
2,773,933 UART: [afmc] SUBJECT.KEYID = 7
2,774,359 UART: [afmc] AUTHORITY.KEYID = 5
2,809,196 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,135 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,864 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,747 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,466 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,449 UART: [afmc] --
2,852,435 UART: [cold-reset] --
2,853,281 UART: [state] Locking Datavault
2,854,336 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,940 UART: [state] Locking ICCM
2,855,536 UART: [exit] Launching FMC @ 0x40000130
2,860,865 UART:
2,860,881 UART: Running Caliptra FMC ...
2,861,289 UART:
2,861,343 UART: [state] CFI Enabled
2,872,046 UART: [fht] FMC Alias Private Key: 7
2,979,461 UART: [art] Extend RT PCRs Done
2,979,889 UART: [art] Lock RT PCRs Done
2,981,489 UART: [art] Populate DV Done
2,989,976 UART: [fht] FMC Alias Private Key: 7
2,991,050 UART: [art] Derive CDI
2,991,330 UART: [art] Store in in slot 0x4
3,077,033 UART: [art] Derive Key Pair
3,077,393 UART: [art] Store priv key in slot 0x5
3,090,659 UART: [art] Derive Key Pair - Done
3,105,379 UART: [art] Signing Cert with AUTHO
3,105,859 UART: RITY.KEYID = 7
3,121,323 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,088 UART: [art] PUB.X = E84997BDD308F6278AF6BE3D1C0F2821932917709ECBD9B73F698D97976D989912E7487DB556E461DC17DDC04831686E
3,128,850 UART: [art] PUB.Y = E257D40789D809BB4CF785C09599B1C8A5A00C939E66C37D9DD119E9E5FF83DF5A88236C60122C70B6CFABF6E41E7160
3,135,799 UART: [art] SIG.R = 16C7AFA3CEE5B02A052A55C566CFDEE4D676B92C2A53E119D73707D4498547D85EDAB26AF309FD640111685BC3548A56
3,142,565 UART: [art] SIG.S = B95F9FD78B504423B67704D5D94A171AC402A0444339C850BEE429818E9D14B6F6BB98D24CBFB66C30E31247D78298AC
3,166,200 UART: Caliptra RT
3,166,453 UART: [state] CFI Enabled
3,273,654 UART: [rt] RT listening for mailbox commands...
3,274,324 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,474 UART: [rt]cmd =0x44504543, len=96
3,483,620 >>> mbox cmd response data (6236 bytes)
3,483,621 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,513,010 UART: [rt]cmd =0x52564348, len=36
3,515,557 >>> mbox cmd response data (8 bytes)
3,515,558 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,545,103 UART: [rt]cmd =0x52564348, len=36
3,546,693 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,634 ready_for_fw is high
1,056,634 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,953 >>> mbox cmd response: success
2,684,405 UART:
2,684,421 UART: Running Caliptra FMC ...
2,684,829 UART:
2,684,883 UART: [state] CFI Enabled
2,694,992 UART: [fht] FMC Alias Private Key: 7
2,803,067 UART: [art] Extend RT PCRs Done
2,803,495 UART: [art] Lock RT PCRs Done
2,805,193 UART: [art] Populate DV Done
2,813,362 UART: [fht] FMC Alias Private Key: 7
2,814,384 UART: [art] Derive CDI
2,814,664 UART: [art] Store in in slot 0x4
2,900,193 UART: [art] Derive Key Pair
2,900,553 UART: [art] Store priv key in slot 0x5
2,913,511 UART: [art] Derive Key Pair - Done
2,928,424 UART: [art] Signing Cert with AUTHO
2,928,904 UART: RITY.KEYID = 7
2,944,132 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,897 UART: [art] PUB.X = E1EB9C6FAD9CFE615349D8DFB3BF4F2F6A66368D0A5EBB02D9DF7401A3E91355F0E45E02EA07EF1558FE1194C6AB0A1A
2,951,673 UART: [art] PUB.Y = 9F0198C7A47B1DC89374D3E851CAB2052BA17B64C3A4D814F153C8CEE6FD36595A82A64A3E067CAD3F78A12307AF20CD
2,958,623 UART: [art] SIG.R = F4E7D007450B4E23C0CBE4F60F85936C0E654963CBC5E7390950E991214A67A099242EAC80E1F6CC14C36AF30B7EC42E
2,965,381 UART: [art] SIG.S = 2BCFC2F225D89AF7535AE6FEA2F3C685C6A7E8C7B1B93AAF7D5548599DA0BD9BB665193F9F94FFB73C33362518C2E1D4
2,989,836 UART: Caliptra RT
2,990,089 UART: [state] CFI Enabled
3,097,218 UART: [rt] RT listening for mailbox commands...
3,097,888 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,450 UART: [rt]cmd =0x44504543, len=96
3,308,255 >>> mbox cmd response data (6236 bytes)
3,308,256 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,923 UART: [rt]cmd =0x52564348, len=36
3,340,156 >>> mbox cmd response data (8 bytes)
3,340,157 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,369,870 UART: [rt]cmd =0x52564348, len=36
3,371,036 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,829 UART: [state] LifecycleState = Unprovisioned
86,484 UART: [state] DebugLocked = No
87,166 UART: [state] WD Timer not started. Device not locked for debugging
88,415 UART: [kat] SHA2-256
891,965 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,094 UART: [kat] ++
896,246 UART: [kat] sha1
900,530 UART: [kat] SHA2-256
902,470 UART: [kat] SHA2-384
905,259 UART: [kat] SHA2-512-ACC
907,160 UART: [kat] ECC-384
916,637 UART: [kat] HMAC-384Kdf
921,065 UART: [kat] LMS
1,169,377 UART: [kat] --
1,170,398 UART: [cold-reset] ++
1,170,728 UART: [fht] FHT @ 0x50003400
1,173,388 UART: [idev] ++
1,173,556 UART: [idev] CDI.KEYID = 6
1,173,917 UART: [idev] SUBJECT.KEYID = 7
1,174,342 UART: [idev] UDS.KEYID = 0
1,174,688 ready_for_fw is high
1,174,688 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,468 UART: [idev] Erasing UDS.KEYID = 0
1,200,472 UART: [idev] Sha1 KeyId Algorithm
1,209,268 UART: [idev] --
1,210,423 UART: [ldev] ++
1,210,591 UART: [ldev] CDI.KEYID = 6
1,210,955 UART: [ldev] SUBJECT.KEYID = 5
1,211,382 UART: [ldev] AUTHORITY.KEYID = 7
1,211,845 UART: [ldev] FE.KEYID = 1
1,217,437 UART: [ldev] Erasing FE.KEYID = 1
1,243,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,857 UART: [ldev] --
1,283,317 UART: [fwproc] Wait for Commands...
1,283,958 UART: [fwproc] Recv command 0x46574c44
1,284,691 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,037 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,346 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,122 >>> mbox cmd response: success
2,776,375 UART: [afmc] ++
2,776,543 UART: [afmc] CDI.KEYID = 6
2,776,906 UART: [afmc] SUBJECT.KEYID = 7
2,777,332 UART: [afmc] AUTHORITY.KEYID = 5
2,812,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,475 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,226 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,955 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,838 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,557 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,362 UART: [afmc] --
2,856,410 UART: [cold-reset] --
2,857,140 UART: [state] Locking Datavault
2,858,299 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,903 UART: [state] Locking ICCM
2,859,409 UART: [exit] Launching FMC @ 0x40000130
2,864,738 UART:
2,864,754 UART: Running Caliptra FMC ...
2,865,162 UART:
2,865,305 UART: [state] CFI Enabled
2,875,926 UART: [fht] FMC Alias Private Key: 7
2,984,095 UART: [art] Extend RT PCRs Done
2,984,523 UART: [art] Lock RT PCRs Done
2,986,279 UART: [art] Populate DV Done
2,994,560 UART: [fht] FMC Alias Private Key: 7
2,995,652 UART: [art] Derive CDI
2,995,932 UART: [art] Store in in slot 0x4
3,081,857 UART: [art] Derive Key Pair
3,082,217 UART: [art] Store priv key in slot 0x5
3,095,627 UART: [art] Derive Key Pair - Done
3,110,301 UART: [art] Signing Cert with AUTHO
3,110,781 UART: RITY.KEYID = 7
3,126,071 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,836 UART: [art] PUB.X = 4356538E73DE6F0F847AC036A592478C5C4D8A8D3F9C729224D96ABD0B930E49BC46D4C7EAD49D96255A2954CA4333FB
3,133,603 UART: [art] PUB.Y = F3ED10017210CD1F066DB8792134D96951D6EFB53EF4ADFDDCA9386CDDE22A4A78C02C4386C548610041B3DEC10A0AD5
3,140,533 UART: [art] SIG.R = 72DC2B5D32190CD76221BF71536AA098EB4DB25F0DCEFF1C8B44DD6E0D29B6C920F4D172B447798413649F7CCA8727E5
3,147,304 UART: [art] SIG.S = 36B6EF310F91972B95CD5BC86585388612BF1359B0BF976344B02029D8DD8F8C7DE0EBFAE9486DC129E427FCE83D1CF4
3,171,028 UART: Caliptra RT
3,171,373 UART: [state] CFI Enabled
3,279,368 UART: [rt] RT listening for mailbox commands...
3,280,038 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,504 UART: [rt]cmd =0x44504543, len=96
3,490,599 >>> mbox cmd response data (6236 bytes)
3,490,600 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,215 UART: [rt]cmd =0x52564348, len=36
3,522,446 >>> mbox cmd response data (8 bytes)
3,522,447 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,552,012 UART: [rt]cmd =0x52564348, len=36
3,553,320 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,323 ready_for_fw is high
1,056,323 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,816 >>> mbox cmd response: success
2,686,284 UART:
2,686,300 UART: Running Caliptra FMC ...
2,686,708 UART:
2,686,851 UART: [state] CFI Enabled
2,697,608 UART: [fht] FMC Alias Private Key: 7
2,805,615 UART: [art] Extend RT PCRs Done
2,806,043 UART: [art] Lock RT PCRs Done
2,807,397 UART: [art] Populate DV Done
2,815,364 UART: [fht] FMC Alias Private Key: 7
2,816,438 UART: [art] Derive CDI
2,816,718 UART: [art] Store in in slot 0x4
2,902,357 UART: [art] Derive Key Pair
2,902,717 UART: [art] Store priv key in slot 0x5
2,915,839 UART: [art] Derive Key Pair - Done
2,930,274 UART: [art] Signing Cert with AUTHO
2,930,754 UART: RITY.KEYID = 7
2,946,028 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,793 UART: [art] PUB.X = 79B79C8588B204E9EF6018B260CB81BCEA0437F314FE5FD6743A088F863610E4469219C7CA04E9B3FEA472B6B1EEFC8C
2,953,561 UART: [art] PUB.Y = 00E2B286774F8F1CEBDFE30BC71D98A5A4359B692969F91C2ACD79F7DAFEF3AB201483B04D85C2638552EC39886520AA
2,960,496 UART: [art] SIG.R = 6E0D953028CF64525D2F008A7E8142B4843FDFCA549BE75081D13FB83E8388DA9C620BF617E6154A6484D4BC593E8452
2,967,238 UART: [art] SIG.S = 4A17050C73CBCBE0B3BE102657AD8FA3C68FB8CAE932F96E0ABE629F27444101C94558FF2C168A9B33834D3DA4D406AD
2,991,104 UART: Caliptra RT
2,991,449 UART: [state] CFI Enabled
3,098,840 UART: [rt] RT listening for mailbox commands...
3,099,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,654 UART: [rt]cmd =0x44504543, len=96
3,310,709 >>> mbox cmd response data (6236 bytes)
3,310,710 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,379 UART: [rt]cmd =0x52564348, len=36
3,342,760 >>> mbox cmd response data (8 bytes)
3,342,761 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,140 UART: [rt]cmd =0x52564348, len=36
3,373,684 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,155 UART: [kat] SHA2-256
882,086 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,201 UART: [kat] ++
886,353 UART: [kat] sha1
890,603 UART: [kat] SHA2-256
892,541 UART: [kat] SHA2-384
895,334 UART: [kat] SHA2-512-ACC
897,235 UART: [kat] ECC-384
902,830 UART: [kat] HMAC-384Kdf
907,426 UART: [kat] LMS
1,475,622 UART: [kat] --
1,476,543 UART: [cold-reset] ++
1,476,965 UART: [fht] Storing FHT @ 0x50003400
1,479,784 UART: [idev] ++
1,479,952 UART: [idev] CDI.KEYID = 6
1,480,312 UART: [idev] SUBJECT.KEYID = 7
1,480,736 UART: [idev] UDS.KEYID = 0
1,481,081 ready_for_fw is high
1,481,081 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,658 UART: [idev] Erasing UDS.KEYID = 0
1,505,334 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,782 UART: [idev] --
1,514,909 UART: [ldev] ++
1,515,077 UART: [ldev] CDI.KEYID = 6
1,515,440 UART: [ldev] SUBJECT.KEYID = 5
1,515,866 UART: [ldev] AUTHORITY.KEYID = 7
1,516,329 UART: [ldev] FE.KEYID = 1
1,521,613 UART: [ldev] Erasing FE.KEYID = 1
1,547,024 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,086 UART: [ldev] --
1,586,457 UART: [fwproc] Waiting for Commands...
1,587,272 UART: [fwproc] Received command 0x46574c44
1,588,063 UART: [fwproc] Received Image of size 114332 bytes
2,885,305 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,625 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,977 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,808 >>> mbox cmd response: success
3,078,976 UART: [afmc] ++
3,079,144 UART: [afmc] CDI.KEYID = 6
3,079,506 UART: [afmc] SUBJECT.KEYID = 7
3,079,931 UART: [afmc] AUTHORITY.KEYID = 5
3,114,598 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,558 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,338 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,066 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,951 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,641 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,518 UART: [afmc] --
3,157,568 UART: [cold-reset] --
3,158,382 UART: [state] Locking Datavault
3,159,571 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,175 UART: [state] Locking ICCM
3,160,815 UART: [exit] Launching FMC @ 0x40000130
3,166,144 UART:
3,166,160 UART: Running Caliptra FMC ...
3,166,568 UART:
3,166,622 UART: [state] CFI Enabled
3,176,999 UART: [fht] FMC Alias Private Key: 7
3,284,842 UART: [art] Extend RT PCRs Done
3,285,270 UART: [art] Lock RT PCRs Done
3,286,556 UART: [art] Populate DV Done
3,294,685 UART: [fht] FMC Alias Private Key: 7
3,295,867 UART: [art] Derive CDI
3,296,147 UART: [art] Store in in slot 0x4
3,381,376 UART: [art] Derive Key Pair
3,381,736 UART: [art] Store priv key in slot 0x5
3,394,698 UART: [art] Derive Key Pair - Done
3,409,453 UART: [art] Signing Cert with AUTHO
3,409,933 UART: RITY.KEYID = 7
3,425,055 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,820 UART: [art] PUB.X = A85F6A6E76F6B405A1D5614FFE6B0FE8AD600BAD108BCE54093E45774CE796CE98D6D1117347348AA735860ACBB7AFD4
3,432,589 UART: [art] PUB.Y = C68FAFC74C67E4D369E379F123C93EF00567D781100BC93C0DA3D3C6664C88CA7628EA81652E8C4EC22D192BCA0FE90D
3,439,536 UART: [art] SIG.R = 6DEC776829CD32DBDA8BD4F0FC7A58413E50BC0C96334C6FD679C2651B70FB90B8C7316F61068BD160D063E81A18F724
3,446,308 UART: [art] SIG.S = 458186AD43EA15B980FFC02E065A38AC5941EA7D285425C7CADE952060FD87CC52529023B0EFDDDBDF3DCEFBFD349A1D
3,470,344 UART: Caliptra RT
3,470,597 UART: [state] CFI Enabled
3,577,951 UART: [rt] RT listening for mailbox commands...
3,578,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,071 UART: [rt]cmd =0x44504543, len=96
3,788,632 >>> mbox cmd response data (6236 bytes)
3,788,633 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,818,418 UART: [rt]cmd =0x52564348, len=36
3,820,407 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,289 ready_for_fw is high
1,362,289 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,470 >>> mbox cmd response: success
2,990,254 UART:
2,990,270 UART: Running Caliptra FMC ...
2,990,678 UART:
2,990,732 UART: [state] CFI Enabled
3,001,119 UART: [fht] FMC Alias Private Key: 7
3,109,222 UART: [art] Extend RT PCRs Done
3,109,650 UART: [art] Lock RT PCRs Done
3,111,214 UART: [art] Populate DV Done
3,119,303 UART: [fht] FMC Alias Private Key: 7
3,120,331 UART: [art] Derive CDI
3,120,611 UART: [art] Store in in slot 0x4
3,206,360 UART: [art] Derive Key Pair
3,206,720 UART: [art] Store priv key in slot 0x5
3,220,092 UART: [art] Derive Key Pair - Done
3,234,720 UART: [art] Signing Cert with AUTHO
3,235,200 UART: RITY.KEYID = 7
3,250,318 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,083 UART: [art] PUB.X = 6334DDAB2012B297117C5A655FE47396075E25541AFC8524996BFDE14F6A8EB70BDF7F69DD7EFA1DDD211BD089C8CC69
3,257,861 UART: [art] PUB.Y = ED54824F61B159D18671128EACABE56DD551D55ECF0D5C4573E73C1FD591456A7426CA4A5A7DC7193AA772607CCE7547
3,264,816 UART: [art] SIG.R = 25E557FD8D123D448B17035B1C1D72DA18F03D2DCC9EF617DB6DFB68A28F7E663DE06AD8573E7F6769E56112E9C4A7AF
3,271,597 UART: [art] SIG.S = 0A76CE5141F3A83E3B3558A6E117818F5FB3C495FE777270A4CFC9906979D4BCCF7A2EEE439E67CFF1849E2A11F7BFFA
3,296,001 UART: Caliptra RT
3,296,254 UART: [state] CFI Enabled
3,404,910 UART: [rt] RT listening for mailbox commands...
3,405,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,902 UART: [rt]cmd =0x44504543, len=96
3,616,863 >>> mbox cmd response data (6236 bytes)
3,616,864 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,197 UART: [rt]cmd =0x52564348, len=36
3,648,022 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,977 UART: [state] LifecycleState = Unprovisioned
85,632 UART: [state] DebugLocked = No
86,290 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,924 UART: [kat] SHA2-256
881,855 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,970 UART: [kat] ++
886,122 UART: [kat] sha1
890,432 UART: [kat] SHA2-256
892,370 UART: [kat] SHA2-384
895,013 UART: [kat] SHA2-512-ACC
896,914 UART: [kat] ECC-384
902,535 UART: [kat] HMAC-384Kdf
907,303 UART: [kat] LMS
1,475,499 UART: [kat] --
1,476,354 UART: [cold-reset] ++
1,476,838 UART: [fht] Storing FHT @ 0x50003400
1,479,683 UART: [idev] ++
1,479,851 UART: [idev] CDI.KEYID = 6
1,480,211 UART: [idev] SUBJECT.KEYID = 7
1,480,635 UART: [idev] UDS.KEYID = 0
1,480,980 ready_for_fw is high
1,480,980 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,379 UART: [idev] Erasing UDS.KEYID = 0
1,504,471 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,111 UART: [idev] --
1,513,978 UART: [ldev] ++
1,514,146 UART: [ldev] CDI.KEYID = 6
1,514,509 UART: [ldev] SUBJECT.KEYID = 5
1,514,935 UART: [ldev] AUTHORITY.KEYID = 7
1,515,398 UART: [ldev] FE.KEYID = 1
1,520,758 UART: [ldev] Erasing FE.KEYID = 1
1,546,243 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,273 UART: [ldev] --
1,585,656 UART: [fwproc] Waiting for Commands...
1,586,429 UART: [fwproc] Received command 0x46574c44
1,587,220 UART: [fwproc] Received Image of size 114332 bytes
2,884,540 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,778 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,130 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,001 >>> mbox cmd response: success
3,078,251 UART: [afmc] ++
3,078,419 UART: [afmc] CDI.KEYID = 6
3,078,781 UART: [afmc] SUBJECT.KEYID = 7
3,079,206 UART: [afmc] AUTHORITY.KEYID = 5
3,114,519 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,963 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,743 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,471 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,356 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,046 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,955 UART: [afmc] --
3,157,927 UART: [cold-reset] --
3,158,691 UART: [state] Locking Datavault
3,159,874 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,478 UART: [state] Locking ICCM
3,160,964 UART: [exit] Launching FMC @ 0x40000130
3,166,293 UART:
3,166,309 UART: Running Caliptra FMC ...
3,166,717 UART:
3,166,860 UART: [state] CFI Enabled
3,177,609 UART: [fht] FMC Alias Private Key: 7
3,285,596 UART: [art] Extend RT PCRs Done
3,286,024 UART: [art] Lock RT PCRs Done
3,287,532 UART: [art] Populate DV Done
3,295,869 UART: [fht] FMC Alias Private Key: 7
3,296,815 UART: [art] Derive CDI
3,297,095 UART: [art] Store in in slot 0x4
3,382,814 UART: [art] Derive Key Pair
3,383,174 UART: [art] Store priv key in slot 0x5
3,396,538 UART: [art] Derive Key Pair - Done
3,410,927 UART: [art] Signing Cert with AUTHO
3,411,407 UART: RITY.KEYID = 7
3,426,483 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,248 UART: [art] PUB.X = 5CDA15F6496AFC428FC57F757214A06F74377EF2BDF48EDA96B66F4A3EFD31880DF52E1B92135D85A1E2445329C187C4
3,434,023 UART: [art] PUB.Y = 85EE3C94FEA276627FB4185241B2B537FE17A498B2C31967B4C6B1BE5CC91AA1126EE6AC4D237C92770C42DB58397D78
3,440,976 UART: [art] SIG.R = AC4D3BB321AB4444595323541239265540D1F55DB3CF8E998D761C06E3FEDFAC1CEA4F3FF7408E100A0F7FD43A9AA19D
3,447,751 UART: [art] SIG.S = 7F21BFC56BC99CADA6E4853EDE65C3B2F56DA618EFCC48C3513607237C7069FBB584D29F632F7381F999F45A817D19AF
3,471,815 UART: Caliptra RT
3,472,160 UART: [state] CFI Enabled
3,580,873 UART: [rt] RT listening for mailbox commands...
3,581,543 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,209 UART: [rt]cmd =0x44504543, len=96
3,792,566 >>> mbox cmd response data (6236 bytes)
3,792,567 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,318 UART: [rt]cmd =0x52564348, len=36
3,824,153 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,236 ready_for_fw is high
1,362,236 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,919 >>> mbox cmd response: success
2,989,743 UART:
2,989,759 UART: Running Caliptra FMC ...
2,990,167 UART:
2,990,310 UART: [state] CFI Enabled
3,000,809 UART: [fht] FMC Alias Private Key: 7
3,108,800 UART: [art] Extend RT PCRs Done
3,109,228 UART: [art] Lock RT PCRs Done
3,110,912 UART: [art] Populate DV Done
3,119,125 UART: [fht] FMC Alias Private Key: 7
3,120,231 UART: [art] Derive CDI
3,120,511 UART: [art] Store in in slot 0x4
3,206,434 UART: [art] Derive Key Pair
3,206,794 UART: [art] Store priv key in slot 0x5
3,219,916 UART: [art] Derive Key Pair - Done
3,234,527 UART: [art] Signing Cert with AUTHO
3,235,007 UART: RITY.KEYID = 7
3,250,339 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,104 UART: [art] PUB.X = 137E96D2B9068C691707D83140D6A31380D72A9E16C9EFE580CFDE8DD0BDF26F73C086F1728F7F2E3C38649629FE300F
3,257,869 UART: [art] PUB.Y = B1392389C4A798D7DB9041E5B3705F59DA8BFFD2AE9DAFE691559A93F8EAA8B0091CFE40947E6A62A95E1D7F140E7B09
3,264,824 UART: [art] SIG.R = 0D54F58253350394B58F065A66738F4B6455DF5356FEC7C6120F1EE76BF7C54800CABF3F372BB8080E5CC6EFD695CF0C
3,271,559 UART: [art] SIG.S = 84B7E93CE8FA98AEDD83F06061AE1B4D1B73DEA554BA8635AEBEFC51B2E927A5E59C0781BCBD06A0224A55E5F277AC8E
3,295,704 UART: Caliptra RT
3,296,049 UART: [state] CFI Enabled
3,403,804 UART: [rt] RT listening for mailbox commands...
3,404,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,052 UART: [rt]cmd =0x44504543, len=96
3,615,152 >>> mbox cmd response data (6236 bytes)
3,615,153 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,680 UART: [rt]cmd =0x52564348, len=36
3,646,891 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,652 UART: [state] LifecycleState = Unprovisioned
86,307 UART: [state] DebugLocked = No
86,833 UART: [state] WD Timer not started. Device not locked for debugging
88,132 UART: [kat] SHA2-256
893,782 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,907 UART: [kat] ++
898,059 UART: [kat] sha1
902,423 UART: [kat] SHA2-256
904,363 UART: [kat] SHA2-384
907,034 UART: [kat] SHA2-512-ACC
908,935 UART: [kat] ECC-384
918,474 UART: [kat] HMAC-384Kdf
923,142 UART: [kat] LMS
1,171,470 UART: [kat] --
1,172,391 UART: [cold-reset] ++
1,172,833 UART: [fht] FHT @ 0x50003400
1,175,514 UART: [idev] ++
1,175,682 UART: [idev] CDI.KEYID = 6
1,176,042 UART: [idev] SUBJECT.KEYID = 7
1,176,466 UART: [idev] UDS.KEYID = 0
1,176,811 ready_for_fw is high
1,176,811 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,748 UART: [idev] Erasing UDS.KEYID = 0
1,201,529 UART: [idev] Sha1 KeyId Algorithm
1,209,957 UART: [idev] --
1,210,833 UART: [ldev] ++
1,211,001 UART: [ldev] CDI.KEYID = 6
1,211,364 UART: [ldev] SUBJECT.KEYID = 5
1,211,790 UART: [ldev] AUTHORITY.KEYID = 7
1,212,253 UART: [ldev] FE.KEYID = 1
1,217,515 UART: [ldev] Erasing FE.KEYID = 1
1,243,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,179 UART: [ldev] --
1,282,488 UART: [fwproc] Wait for Commands...
1,283,208 UART: [fwproc] Recv command 0x46574c44
1,283,936 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,653 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,090 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,394 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,313 >>> mbox cmd response: success
2,775,547 UART: [afmc] ++
2,775,715 UART: [afmc] CDI.KEYID = 6
2,776,077 UART: [afmc] SUBJECT.KEYID = 7
2,776,502 UART: [afmc] AUTHORITY.KEYID = 5
2,811,729 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,492 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,240 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,968 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,853 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,572 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,622 UART: [afmc] --
2,855,724 UART: [cold-reset] --
2,856,604 UART: [state] Locking Datavault
2,857,531 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,135 UART: [state] Locking ICCM
2,858,709 UART: [exit] Launching FMC @ 0x40000130
2,864,038 UART:
2,864,054 UART: Running Caliptra FMC ...
2,864,462 UART:
2,864,516 UART: [state] CFI Enabled
2,874,777 UART: [fht] FMC Alias Private Key: 7
2,982,718 UART: [art] Extend RT PCRs Done
2,983,146 UART: [art] Lock RT PCRs Done
2,984,738 UART: [art] Populate DV Done
2,993,079 UART: [fht] FMC Alias Private Key: 7
2,994,151 UART: [art] Derive CDI
2,994,431 UART: [art] Store in in slot 0x4
3,080,016 UART: [art] Derive Key Pair
3,080,376 UART: [art] Store priv key in slot 0x5
3,094,294 UART: [art] Derive Key Pair - Done
3,108,851 UART: [art] Signing Cert with AUTHO
3,109,331 UART: RITY.KEYID = 7
3,124,523 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,288 UART: [art] PUB.X = FD0200084A497261676D27E237B91A220EFA0B9F984D013CFF6289DA1A96505D0CBDAD086CA83C34F284C08AAE1FD90E
3,132,022 UART: [art] PUB.Y = 8C18283711364B50BDB58D42B6711A0944A2F742E57251AF1C2613C137F8C0B442448916BFD351DCC196A64CC6CB61F1
3,138,967 UART: [art] SIG.R = CEC2EDD900B890C0EAFF8BD40C53E597F628C7C7B1425AF1CC3F39E485BA5E7AE54E31936A28A483495EEDCC440F50E1
3,145,729 UART: [art] SIG.S = 341790B227C40C73E27380474F9F64E00E2C634C6B4C11E9A64B05CA8C84A5F21526D109FEBD96F4EC11A38406623778
3,169,257 UART: Caliptra RT
3,169,510 UART: [state] CFI Enabled
3,277,049 UART: [rt] RT listening for mailbox commands...
3,277,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,841 UART: [rt]cmd =0x44504543, len=96
3,488,792 >>> mbox cmd response data (6236 bytes)
3,488,793 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,284 UART: [rt]cmd =0x52564348, len=36
3,520,339 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,187 ready_for_fw is high
1,060,187 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,130 >>> mbox cmd response: success
2,689,112 UART:
2,689,128 UART: Running Caliptra FMC ...
2,689,536 UART:
2,689,590 UART: [state] CFI Enabled
2,700,139 UART: [fht] FMC Alias Private Key: 7
2,808,090 UART: [art] Extend RT PCRs Done
2,808,518 UART: [art] Lock RT PCRs Done
2,809,984 UART: [art] Populate DV Done
2,818,395 UART: [fht] FMC Alias Private Key: 7
2,819,345 UART: [art] Derive CDI
2,819,625 UART: [art] Store in in slot 0x4
2,905,060 UART: [art] Derive Key Pair
2,905,420 UART: [art] Store priv key in slot 0x5
2,918,330 UART: [art] Derive Key Pair - Done
2,933,397 UART: [art] Signing Cert with AUTHO
2,933,877 UART: RITY.KEYID = 7
2,948,795 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,560 UART: [art] PUB.X = 9943C8EEFDF7DBBFD9AB07D07CC1564B1C735B06BC3028E3FDA2954234B93F968D0E1EC02E0A7229ABFA3CD604BC77C4
2,956,337 UART: [art] PUB.Y = CA76E1C3FFA2617C0358D0EEED283EC6BFF504C07DAFEC39A3A0595C5ED33C9E4FE453280C6C666690C6375A00D3A3D7
2,963,274 UART: [art] SIG.R = D46921A916B2AA2335C66B06B2B8B47C52F59AA0BC6DAA2C2F743427E008F0C03CC49647373B323B0FD352BE3586304C
2,970,039 UART: [art] SIG.S = 59A3A0633259E49CDB54836A667F1D67FC29F8338820501C2C3E6291266CB0472B77114CE31AFD0AEA7569AE90FDCED3
2,993,675 UART: Caliptra RT
2,993,928 UART: [state] CFI Enabled
3,102,157 UART: [rt] RT listening for mailbox commands...
3,102,827 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,195 UART: [rt]cmd =0x44504543, len=96
3,313,338 >>> mbox cmd response data (6236 bytes)
3,313,339 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,008 UART: [rt]cmd =0x52564348, len=36
3,345,303 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,924 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
893,567 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,692 UART: [kat] ++
897,844 UART: [kat] sha1
902,026 UART: [kat] SHA2-256
903,966 UART: [kat] SHA2-384
906,681 UART: [kat] SHA2-512-ACC
908,582 UART: [kat] ECC-384
918,725 UART: [kat] HMAC-384Kdf
923,465 UART: [kat] LMS
1,171,793 UART: [kat] --
1,172,430 UART: [cold-reset] ++
1,172,856 UART: [fht] FHT @ 0x50003400
1,175,347 UART: [idev] ++
1,175,515 UART: [idev] CDI.KEYID = 6
1,175,875 UART: [idev] SUBJECT.KEYID = 7
1,176,299 UART: [idev] UDS.KEYID = 0
1,176,644 ready_for_fw is high
1,176,644 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,399 UART: [idev] Erasing UDS.KEYID = 0
1,201,358 UART: [idev] Sha1 KeyId Algorithm
1,209,640 UART: [idev] --
1,210,660 UART: [ldev] ++
1,210,828 UART: [ldev] CDI.KEYID = 6
1,211,191 UART: [ldev] SUBJECT.KEYID = 5
1,211,617 UART: [ldev] AUTHORITY.KEYID = 7
1,212,080 UART: [ldev] FE.KEYID = 1
1,217,470 UART: [ldev] Erasing FE.KEYID = 1
1,243,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,564 UART: [ldev] --
1,283,011 UART: [fwproc] Wait for Commands...
1,283,827 UART: [fwproc] Recv command 0x46574c44
1,284,555 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,557 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,861 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,742 >>> mbox cmd response: success
2,775,988 UART: [afmc] ++
2,776,156 UART: [afmc] CDI.KEYID = 6
2,776,518 UART: [afmc] SUBJECT.KEYID = 7
2,776,943 UART: [afmc] AUTHORITY.KEYID = 5
2,812,656 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,831 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,559 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,444 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,163 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,903 UART: [afmc] --
2,855,807 UART: [cold-reset] --
2,856,825 UART: [state] Locking Datavault
2,858,110 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,714 UART: [state] Locking ICCM
2,859,296 UART: [exit] Launching FMC @ 0x40000130
2,864,625 UART:
2,864,641 UART: Running Caliptra FMC ...
2,865,049 UART:
2,865,192 UART: [state] CFI Enabled
2,875,645 UART: [fht] FMC Alias Private Key: 7
2,984,250 UART: [art] Extend RT PCRs Done
2,984,678 UART: [art] Lock RT PCRs Done
2,986,210 UART: [art] Populate DV Done
2,994,475 UART: [fht] FMC Alias Private Key: 7
2,995,581 UART: [art] Derive CDI
2,995,861 UART: [art] Store in in slot 0x4
3,081,782 UART: [art] Derive Key Pair
3,082,142 UART: [art] Store priv key in slot 0x5
3,094,982 UART: [art] Derive Key Pair - Done
3,109,692 UART: [art] Signing Cert with AUTHO
3,110,172 UART: RITY.KEYID = 7
3,125,394 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,159 UART: [art] PUB.X = 970C0D76B5BBF460FEFCE925BEB14AD5A9332E4F6B43025F77DE123C715633B1A88F6902BA006717FB4062809A9E3AB7
3,132,903 UART: [art] PUB.Y = 9211F5C723E19B9669D18C5C4F77CEE0C0D39842740E9CF99BD418F0A04D5BD0D774A07BB78F5A19BBDDBE81795BAEA7
3,139,866 UART: [art] SIG.R = 0CD557F3D3B7265038C9D74872AC4E344A3284C5D23B58CDF1A7B5598B5A1985A2AFB5E1DC2333DB451E4271DE1442B3
3,146,639 UART: [art] SIG.S = 33B7B4521044ABBAF96CC777BB0997F63D9474610008F1F316F71B1ED50EEB5BE42BA31E5C69809450565F184CB58E1A
3,170,091 UART: Caliptra RT
3,170,436 UART: [state] CFI Enabled
3,278,451 UART: [rt] RT listening for mailbox commands...
3,279,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,615 UART: [rt]cmd =0x44504543, len=96
3,490,348 >>> mbox cmd response data (6236 bytes)
3,490,349 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,998 UART: [rt]cmd =0x52564348, len=36
3,522,297 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,832 ready_for_fw is high
1,060,832 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,319 >>> mbox cmd response: success
2,688,989 UART:
2,689,005 UART: Running Caliptra FMC ...
2,689,413 UART:
2,689,556 UART: [state] CFI Enabled
2,700,103 UART: [fht] FMC Alias Private Key: 7
2,807,974 UART: [art] Extend RT PCRs Done
2,808,402 UART: [art] Lock RT PCRs Done
2,809,748 UART: [art] Populate DV Done
2,817,909 UART: [fht] FMC Alias Private Key: 7
2,819,031 UART: [art] Derive CDI
2,819,311 UART: [art] Store in in slot 0x4
2,904,846 UART: [art] Derive Key Pair
2,905,206 UART: [art] Store priv key in slot 0x5
2,918,220 UART: [art] Derive Key Pair - Done
2,933,140 UART: [art] Signing Cert with AUTHO
2,933,620 UART: RITY.KEYID = 7
2,948,320 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,085 UART: [art] PUB.X = 279757CEFF0AF644DC676A02635006933BB1E7128F423CBBE511395953911E334049DF701F371C337434778FC0BF47B4
2,955,838 UART: [art] PUB.Y = D6A9D8D3C53B8F1D4A46D8997577E5E054C6B66C79CE8C388A0699A0C4C3D1B62E39E6A659A0D105AE3994B325D112EC
2,962,790 UART: [art] SIG.R = 593B14590B66F569CD01AC0CF1717643E3CB47EAA38123ECE2687E288A8967A2D0750C50012D23205F273C7E52DE1B09
2,969,540 UART: [art] SIG.S = 57FB525511D67A91A38ADE539372AA368E3EC90314303A2D36EB704AB265E6A88C7A084CF01D572E43F4B97B7CE7FA41
2,994,009 UART: Caliptra RT
2,994,354 UART: [state] CFI Enabled
3,102,227 UART: [rt] RT listening for mailbox commands...
3,102,897 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,251 UART: [rt]cmd =0x44504543, len=96
3,313,569 >>> mbox cmd response data (6236 bytes)
3,313,570 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,127 UART: [rt]cmd =0x52564348, len=36
3,345,270 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,500 UART: [state] LifecycleState = Unprovisioned
86,155 UART: [state] DebugLocked = No
86,691 UART: [state] WD Timer not started. Device not locked for debugging
87,890 UART: [kat] SHA2-256
891,440 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,569 UART: [kat] ++
895,721 UART: [kat] sha1
899,803 UART: [kat] SHA2-256
901,743 UART: [kat] SHA2-384
904,590 UART: [kat] SHA2-512-ACC
906,491 UART: [kat] ECC-384
916,288 UART: [kat] HMAC-384Kdf
921,008 UART: [kat] LMS
1,169,320 UART: [kat] --
1,170,117 UART: [cold-reset] ++
1,170,473 UART: [fht] FHT @ 0x50003400
1,172,963 UART: [idev] ++
1,173,131 UART: [idev] CDI.KEYID = 6
1,173,492 UART: [idev] SUBJECT.KEYID = 7
1,173,917 UART: [idev] UDS.KEYID = 0
1,174,263 ready_for_fw is high
1,174,263 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,729 UART: [idev] Erasing UDS.KEYID = 0
1,198,589 UART: [idev] Sha1 KeyId Algorithm
1,207,385 UART: [idev] --
1,208,440 UART: [ldev] ++
1,208,608 UART: [ldev] CDI.KEYID = 6
1,208,972 UART: [ldev] SUBJECT.KEYID = 5
1,209,399 UART: [ldev] AUTHORITY.KEYID = 7
1,209,862 UART: [ldev] FE.KEYID = 1
1,214,922 UART: [ldev] Erasing FE.KEYID = 1
1,240,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,834 UART: [ldev] --
1,280,164 UART: [fwproc] Wait for Commands...
1,280,855 UART: [fwproc] Recv command 0x46574c44
1,281,588 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,268 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,577 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,429 >>> mbox cmd response: success
2,772,682 UART: [afmc] ++
2,772,850 UART: [afmc] CDI.KEYID = 6
2,773,213 UART: [afmc] SUBJECT.KEYID = 7
2,773,639 UART: [afmc] AUTHORITY.KEYID = 5
2,809,010 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,017 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,746 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,629 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,348 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,285 UART: [afmc] --
2,852,313 UART: [cold-reset] --
2,853,067 UART: [state] Locking Datavault
2,854,144 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,748 UART: [state] Locking ICCM
2,855,322 UART: [exit] Launching FMC @ 0x40000130
2,860,651 UART:
2,860,667 UART: Running Caliptra FMC ...
2,861,075 UART:
2,861,129 UART: [state] CFI Enabled
2,871,756 UART: [fht] FMC Alias Private Key: 7
2,979,749 UART: [art] Extend RT PCRs Done
2,980,177 UART: [art] Lock RT PCRs Done
2,981,763 UART: [art] Populate DV Done
2,990,224 UART: [fht] FMC Alias Private Key: 7
2,991,404 UART: [art] Derive CDI
2,991,684 UART: [art] Store in in slot 0x4
3,077,337 UART: [art] Derive Key Pair
3,077,697 UART: [art] Store priv key in slot 0x5
3,091,423 UART: [art] Derive Key Pair - Done
3,106,418 UART: [art] Signing Cert with AUTHO
3,106,898 UART: RITY.KEYID = 7
3,121,650 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,415 UART: [art] PUB.X = FF5B7B87761C3713E249182101CADD8726D582924FA9FCF1623EB2B5D755D8620808A69BA1784FC44ADC325F49B3CFB0
3,129,182 UART: [art] PUB.Y = 077A0356288F18F5AD35AD4C043146AE02BCC59A5A80469BB8B98CB10C0A202F97EA1549A0A469B5E977ECA4F70C3C01
3,136,116 UART: [art] SIG.R = BCBF7CD722FA8D3C919FCD877B1EF90DB1E653E61582382F9278B4F76BC3430A4E025AE67A7A167D4E46F232274C0CEA
3,142,888 UART: [art] SIG.S = 7ADD8BA02D931BAB19C6BFA34247381810CBE74609821C719C49D4F3E1C06AD6933799712F06AAF900F21DAB25016CEE
3,166,936 UART: Caliptra RT
3,167,189 UART: [state] CFI Enabled
3,274,738 UART: [rt] RT listening for mailbox commands...
3,275,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,964 UART: [rt]cmd =0x44504543, len=96
3,485,671 >>> mbox cmd response data (6236 bytes)
3,485,672 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,999 UART: [rt]cmd =0x52564348, len=36
3,517,246 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,480 ready_for_fw is high
1,055,480 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,491 >>> mbox cmd response: success
2,684,619 UART:
2,684,635 UART: Running Caliptra FMC ...
2,685,043 UART:
2,685,097 UART: [state] CFI Enabled
2,695,532 UART: [fht] FMC Alias Private Key: 7
2,803,329 UART: [art] Extend RT PCRs Done
2,803,757 UART: [art] Lock RT PCRs Done
2,805,273 UART: [art] Populate DV Done
2,813,732 UART: [fht] FMC Alias Private Key: 7
2,814,716 UART: [art] Derive CDI
2,814,996 UART: [art] Store in in slot 0x4
2,900,617 UART: [art] Derive Key Pair
2,900,977 UART: [art] Store priv key in slot 0x5
2,913,735 UART: [art] Derive Key Pair - Done
2,928,331 UART: [art] Signing Cert with AUTHO
2,928,811 UART: RITY.KEYID = 7
2,943,835 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,600 UART: [art] PUB.X = B59ADA79CB48A75E27C697322968A0F788B8205522BAFA425658C3BF4BC542897489478299CDD8475912C4764F9F931B
2,951,364 UART: [art] PUB.Y = 638E29D9CBEC236233143D67080A2878C834B8316D4EB8F67DBD3549DC3C65AFDA909FAD8E6FC8640BED15A5D4209A13
2,958,315 UART: [art] SIG.R = EE20AD29F1034E7D1B382F61D3DE70E5A1EF287392A08BC65B5845D25A5F329B8FB2F1999175D48F4D262BD2698C594B
2,965,088 UART: [art] SIG.S = 66A0874687AF64CFCE3925D4D6AA22170662D8406CE46937813534AE08BD895D2BE0EEA2799930744734FE63AADCE198
2,988,761 UART: Caliptra RT
2,989,014 UART: [state] CFI Enabled
3,097,025 UART: [rt] RT listening for mailbox commands...
3,097,695 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,205 UART: [rt]cmd =0x44504543, len=96
3,308,802 >>> mbox cmd response data (6236 bytes)
3,308,803 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,356 UART: [rt]cmd =0x52564348, len=36
3,340,359 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
891,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
900,014 UART: [kat] SHA2-256
901,954 UART: [kat] SHA2-384
904,775 UART: [kat] SHA2-512-ACC
906,676 UART: [kat] ECC-384
916,429 UART: [kat] HMAC-384Kdf
920,943 UART: [kat] LMS
1,169,255 UART: [kat] --
1,170,220 UART: [cold-reset] ++
1,170,660 UART: [fht] FHT @ 0x50003400
1,173,384 UART: [idev] ++
1,173,552 UART: [idev] CDI.KEYID = 6
1,173,913 UART: [idev] SUBJECT.KEYID = 7
1,174,338 UART: [idev] UDS.KEYID = 0
1,174,684 ready_for_fw is high
1,174,684 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,250 UART: [idev] Erasing UDS.KEYID = 0
1,199,056 UART: [idev] Sha1 KeyId Algorithm
1,207,918 UART: [idev] --
1,208,947 UART: [ldev] ++
1,209,115 UART: [ldev] CDI.KEYID = 6
1,209,479 UART: [ldev] SUBJECT.KEYID = 5
1,209,906 UART: [ldev] AUTHORITY.KEYID = 7
1,210,369 UART: [ldev] FE.KEYID = 1
1,215,795 UART: [ldev] Erasing FE.KEYID = 1
1,242,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,363 UART: [ldev] --
1,281,755 UART: [fwproc] Wait for Commands...
1,282,476 UART: [fwproc] Recv command 0x46574c44
1,283,209 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,785 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,094 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,042 >>> mbox cmd response: success
2,774,125 UART: [afmc] ++
2,774,293 UART: [afmc] CDI.KEYID = 6
2,774,656 UART: [afmc] SUBJECT.KEYID = 7
2,775,082 UART: [afmc] AUTHORITY.KEYID = 5
2,811,325 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,666 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,395 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,278 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,997 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,816 UART: [afmc] --
2,854,766 UART: [cold-reset] --
2,855,842 UART: [state] Locking Datavault
2,856,999 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,603 UART: [state] Locking ICCM
2,858,103 UART: [exit] Launching FMC @ 0x40000130
2,863,432 UART:
2,863,448 UART: Running Caliptra FMC ...
2,863,856 UART:
2,863,999 UART: [state] CFI Enabled
2,874,554 UART: [fht] FMC Alias Private Key: 7
2,982,655 UART: [art] Extend RT PCRs Done
2,983,083 UART: [art] Lock RT PCRs Done
2,984,723 UART: [art] Populate DV Done
2,993,018 UART: [fht] FMC Alias Private Key: 7
2,993,982 UART: [art] Derive CDI
2,994,262 UART: [art] Store in in slot 0x4
3,079,935 UART: [art] Derive Key Pair
3,080,295 UART: [art] Store priv key in slot 0x5
3,093,153 UART: [art] Derive Key Pair - Done
3,107,584 UART: [art] Signing Cert with AUTHO
3,108,064 UART: RITY.KEYID = 7
3,123,428 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,193 UART: [art] PUB.X = B38A739D206663FDF7FF6F0435F94EA4B275E494EFBF6EA6FB085CF9F144087D609FD7DC76867DEC7F66B54D72229695
3,130,964 UART: [art] PUB.Y = B1EB7AEB24E252B72070C063D1DBB939912D642FE06EEF1D61218E5763A83F3880E23379AECC71117CA7B163783F8BFB
3,137,922 UART: [art] SIG.R = 7AE7EABC19FCD6F4B8EFDBE629A9468E67F41042249676B27CC22D65CD347B8F0AED48004A308E6A0289A3573E47E2D8
3,144,676 UART: [art] SIG.S = 129B8635A9247FF3D228B118ADEC16E1C9B8A50B7F9ADDA7B8147E4ACCA377B7450B3518BE156C443917A828BA82BA92
3,168,025 UART: Caliptra RT
3,168,370 UART: [state] CFI Enabled
3,275,527 UART: [rt] RT listening for mailbox commands...
3,276,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,451 UART: [rt]cmd =0x44504543, len=96
3,487,210 >>> mbox cmd response data (6236 bytes)
3,487,211 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,748 UART: [rt]cmd =0x52564348, len=36
3,519,073 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,483 ready_for_fw is high
1,055,483 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,216 >>> mbox cmd response: success
2,682,176 UART:
2,682,192 UART: Running Caliptra FMC ...
2,682,600 UART:
2,682,743 UART: [state] CFI Enabled
2,693,396 UART: [fht] FMC Alias Private Key: 7
2,801,907 UART: [art] Extend RT PCRs Done
2,802,335 UART: [art] Lock RT PCRs Done
2,803,789 UART: [art] Populate DV Done
2,811,986 UART: [fht] FMC Alias Private Key: 7
2,813,078 UART: [art] Derive CDI
2,813,358 UART: [art] Store in in slot 0x4
2,899,241 UART: [art] Derive Key Pair
2,899,601 UART: [art] Store priv key in slot 0x5
2,913,327 UART: [art] Derive Key Pair - Done
2,928,088 UART: [art] Signing Cert with AUTHO
2,928,568 UART: RITY.KEYID = 7
2,944,030 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,795 UART: [art] PUB.X = ACB91F21F1973C6CF5D5628774C400C728993A054B6E6F9F9CD0AA0404788A6921E02525A85F46BA75F6B181308F215B
2,951,532 UART: [art] PUB.Y = 7012A6905C8DA53BE7AF5D2BD96E2A6C36D484300CC719E90CA0828C992F5C982087C6084D140215A763DDD93D5209B4
2,958,467 UART: [art] SIG.R = A16179044075E7C92DC2FBE7D2FEAD546C32790DD7B103498F592CE530819D3FDFD4A64DB28C1D95CBACC2B5014A1D56
2,965,239 UART: [art] SIG.S = 74D7A3DC76AC9937EF456F6CA2225DF5FD9C4D4773DE81262E203685D5E408C3A4F82700F257FC82BD26F63CF281D007
2,988,948 UART: Caliptra RT
2,989,293 UART: [state] CFI Enabled
3,097,214 UART: [rt] RT listening for mailbox commands...
3,097,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,072 UART: [rt]cmd =0x44504543, len=96
3,308,037 >>> mbox cmd response data (6236 bytes)
3,308,038 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,557 UART: [rt]cmd =0x52564348, len=36
3,339,740 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,103 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,601 UART: [kat] SHA2-256
881,532 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,647 UART: [kat] ++
885,799 UART: [kat] sha1
889,971 UART: [kat] SHA2-256
891,909 UART: [kat] SHA2-384
894,534 UART: [kat] SHA2-512-ACC
896,435 UART: [kat] ECC-384
902,296 UART: [kat] HMAC-384Kdf
906,938 UART: [kat] LMS
1,475,134 UART: [kat] --
1,476,009 UART: [cold-reset] ++
1,476,399 UART: [fht] Storing FHT @ 0x50003400
1,479,166 UART: [idev] ++
1,479,334 UART: [idev] CDI.KEYID = 6
1,479,694 UART: [idev] SUBJECT.KEYID = 7
1,480,118 UART: [idev] UDS.KEYID = 0
1,480,463 ready_for_fw is high
1,480,463 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,258 UART: [idev] Erasing UDS.KEYID = 0
1,504,776 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,403 UART: [ldev] ++
1,514,571 UART: [ldev] CDI.KEYID = 6
1,514,934 UART: [ldev] SUBJECT.KEYID = 5
1,515,360 UART: [ldev] AUTHORITY.KEYID = 7
1,515,823 UART: [ldev] FE.KEYID = 1
1,521,061 UART: [ldev] Erasing FE.KEYID = 1
1,545,902 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,176 UART: [ldev] --
1,585,477 UART: [fwproc] Waiting for Commands...
1,586,270 UART: [fwproc] Received command 0x46574c44
1,587,061 UART: [fwproc] Received Image of size 114332 bytes
2,884,305 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,341 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,693 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,556 >>> mbox cmd response: success
3,077,646 UART: [afmc] ++
3,077,814 UART: [afmc] CDI.KEYID = 6
3,078,176 UART: [afmc] SUBJECT.KEYID = 7
3,078,601 UART: [afmc] AUTHORITY.KEYID = 5
3,113,502 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,462 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,242 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,970 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,855 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,545 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,278 UART: [afmc] --
3,156,260 UART: [cold-reset] --
3,157,150 UART: [state] Locking Datavault
3,158,279 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,883 UART: [state] Locking ICCM
3,159,549 UART: [exit] Launching FMC @ 0x40000130
3,164,878 UART:
3,164,894 UART: Running Caliptra FMC ...
3,165,302 UART:
3,165,356 UART: [state] CFI Enabled
3,176,005 UART: [fht] FMC Alias Private Key: 7
3,283,960 UART: [art] Extend RT PCRs Done
3,284,388 UART: [art] Lock RT PCRs Done
3,285,686 UART: [art] Populate DV Done
3,293,791 UART: [fht] FMC Alias Private Key: 7
3,294,899 UART: [art] Derive CDI
3,295,179 UART: [art] Store in in slot 0x4
3,380,738 UART: [art] Derive Key Pair
3,381,098 UART: [art] Store priv key in slot 0x5
3,394,126 UART: [art] Derive Key Pair - Done
3,409,189 UART: [art] Signing Cert with AUTHO
3,409,669 UART: RITY.KEYID = 7
3,424,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,646 UART: [art] PUB.X = A70069D21FAA59231E0D290D0838C27FF460E06681CCA03D3DF3C060288E4DB51A215F2CDB830AFA78D575B484A6CDC2
3,432,392 UART: [art] PUB.Y = A4BEA7B1578EA91C916485DCA5E7C08027063A0CE5C90B730355A1620EEEDE238E28C472FB698FD705A819D789DE0C56
3,439,329 UART: [art] SIG.R = 39EDC95553CF3CBCA04D614C6F85507B43CFDD2948B20D66049F488337554431AC4540690746ECBD804C356380FE5B1D
3,446,090 UART: [art] SIG.S = 13C30F1B6EE687290F024D14B760CF6A1F6D2EF69999E8BA993742E1BC5DA148ADF56803777E02D8F69B0F8B117C3B11
3,470,075 UART: Caliptra RT
3,470,328 UART: [state] CFI Enabled
3,578,576 UART: [rt] RT listening for mailbox commands...
3,579,246 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,138 UART: [rt]cmd =0x52564348, len=36
3,610,738 >>> mbox cmd response: failed
3,610,738 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,342 UART: [rt]cmd =0x52564348, len=36
3,641,812 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,259 ready_for_fw is high
1,362,259 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,934 >>> mbox cmd response: success
2,989,702 UART:
2,989,718 UART: Running Caliptra FMC ...
2,990,126 UART:
2,990,180 UART: [state] CFI Enabled
3,000,543 UART: [fht] FMC Alias Private Key: 7
3,107,964 UART: [art] Extend RT PCRs Done
3,108,392 UART: [art] Lock RT PCRs Done
3,109,988 UART: [art] Populate DV Done
3,118,485 UART: [fht] FMC Alias Private Key: 7
3,119,629 UART: [art] Derive CDI
3,119,909 UART: [art] Store in in slot 0x4
3,205,802 UART: [art] Derive Key Pair
3,206,162 UART: [art] Store priv key in slot 0x5
3,219,808 UART: [art] Derive Key Pair - Done
3,234,523 UART: [art] Signing Cert with AUTHO
3,235,003 UART: RITY.KEYID = 7
3,250,229 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,994 UART: [art] PUB.X = 440FAB5F111106A06AAC3E9C2F07D6910F2BA2550015EC2DEAC88D6C3EA869C6A4DDB97FFB6D43387A4781FD6AA373CF
3,257,750 UART: [art] PUB.Y = F34BF74E8318FCA043D6AD12081733CF2D881E76EC139AD0495F7A229FDC1BEFF794C6CB80ED0A3E9A240399D742FFA3
3,264,707 UART: [art] SIG.R = ACC418DFA782AF0F6A97969AC75FC36B6EE30E213FCD638560979BE8C9D233EAA386AD90B8D7A56A6F330BF4DE496FB2
3,271,488 UART: [art] SIG.S = D1E941C1994B439D8AA4B705A15715456B9E0437F6F7F923B82E8F6F2C359593FC81D485A3137E80F9D6C2D18A8F8F35
3,295,091 UART: Caliptra RT
3,295,344 UART: [state] CFI Enabled
3,402,958 UART: [rt] RT listening for mailbox commands...
3,403,628 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,696 UART: [rt]cmd =0x52564348, len=36
3,435,244 >>> mbox cmd response: failed
3,435,244 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,980 UART: [rt]cmd =0x52564348, len=36
3,466,360 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,392 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,016 UART: [kat] SHA2-256
881,947 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,062 UART: [kat] ++
886,214 UART: [kat] sha1
890,398 UART: [kat] SHA2-256
892,336 UART: [kat] SHA2-384
895,141 UART: [kat] SHA2-512-ACC
897,042 UART: [kat] ECC-384
902,625 UART: [kat] HMAC-384Kdf
907,447 UART: [kat] LMS
1,475,643 UART: [kat] --
1,476,688 UART: [cold-reset] ++
1,477,070 UART: [fht] Storing FHT @ 0x50003400
1,479,829 UART: [idev] ++
1,479,997 UART: [idev] CDI.KEYID = 6
1,480,357 UART: [idev] SUBJECT.KEYID = 7
1,480,781 UART: [idev] UDS.KEYID = 0
1,481,126 ready_for_fw is high
1,481,126 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,667 UART: [idev] Erasing UDS.KEYID = 0
1,505,259 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,665 UART: [idev] --
1,514,642 UART: [ldev] ++
1,514,810 UART: [ldev] CDI.KEYID = 6
1,515,173 UART: [ldev] SUBJECT.KEYID = 5
1,515,599 UART: [ldev] AUTHORITY.KEYID = 7
1,516,062 UART: [ldev] FE.KEYID = 1
1,521,400 UART: [ldev] Erasing FE.KEYID = 1
1,547,189 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,629 UART: [ldev] --
1,586,004 UART: [fwproc] Waiting for Commands...
1,586,729 UART: [fwproc] Received command 0x46574c44
1,587,520 UART: [fwproc] Received Image of size 114332 bytes
2,885,718 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,664 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,016 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,989 >>> mbox cmd response: success
3,080,231 UART: [afmc] ++
3,080,399 UART: [afmc] CDI.KEYID = 6
3,080,761 UART: [afmc] SUBJECT.KEYID = 7
3,081,186 UART: [afmc] AUTHORITY.KEYID = 5
3,115,843 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,131 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,911 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,639 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,524 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,214 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,937 UART: [afmc] --
3,159,019 UART: [cold-reset] --
3,159,803 UART: [state] Locking Datavault
3,160,932 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,536 UART: [state] Locking ICCM
3,161,980 UART: [exit] Launching FMC @ 0x40000130
3,167,309 UART:
3,167,325 UART: Running Caliptra FMC ...
3,167,733 UART:
3,167,876 UART: [state] CFI Enabled
3,178,645 UART: [fht] FMC Alias Private Key: 7
3,286,712 UART: [art] Extend RT PCRs Done
3,287,140 UART: [art] Lock RT PCRs Done
3,288,664 UART: [art] Populate DV Done
3,296,997 UART: [fht] FMC Alias Private Key: 7
3,297,955 UART: [art] Derive CDI
3,298,235 UART: [art] Store in in slot 0x4
3,383,830 UART: [art] Derive Key Pair
3,384,190 UART: [art] Store priv key in slot 0x5
3,397,218 UART: [art] Derive Key Pair - Done
3,411,806 UART: [art] Signing Cert with AUTHO
3,412,286 UART: RITY.KEYID = 7
3,427,164 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,929 UART: [art] PUB.X = E45BA7B2757D1A86D7B607E1518EF2FD6B7D27C555A386C9C58337F286507F2D78E3DA16F842E99015CC721621DDD75C
3,434,700 UART: [art] PUB.Y = D0CBF854F82F16DF788CC63E2AA969A268A5636270D0D0175ACC5E1A21DC9988DAAD551956D693D8559EC2E4AF91CAD9
3,441,664 UART: [art] SIG.R = C767DBB1399C734162B7A58A664EAD8E4AAE164E511451C2653FD5D7C0A6E8F85660035D00A2C121190CB924E5C8CBAE
3,448,414 UART: [art] SIG.S = F4CE4E256847B24E7EEE47E5EF1AFEA86F4383B5147021BBE1A8D92EB88B3A52B771CC12279271E9F0900F06C3FC100F
3,472,338 UART: Caliptra RT
3,472,683 UART: [state] CFI Enabled
3,581,263 UART: [rt] RT listening for mailbox commands...
3,581,933 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,107 UART: [rt]cmd =0x52564348, len=36
3,613,869 >>> mbox cmd response: failed
3,613,869 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,359 UART: [rt]cmd =0x52564348, len=36
3,644,487 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,490 ready_for_fw is high
1,363,490 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,683 >>> mbox cmd response: success
2,988,195 UART:
2,988,211 UART: Running Caliptra FMC ...
2,988,619 UART:
2,988,762 UART: [state] CFI Enabled
2,999,193 UART: [fht] FMC Alias Private Key: 7
3,107,578 UART: [art] Extend RT PCRs Done
3,108,006 UART: [art] Lock RT PCRs Done
3,109,534 UART: [art] Populate DV Done
3,118,017 UART: [fht] FMC Alias Private Key: 7
3,119,029 UART: [art] Derive CDI
3,119,309 UART: [art] Store in in slot 0x4
3,204,590 UART: [art] Derive Key Pair
3,204,950 UART: [art] Store priv key in slot 0x5
3,218,988 UART: [art] Derive Key Pair - Done
3,233,361 UART: [art] Signing Cert with AUTHO
3,233,841 UART: RITY.KEYID = 7
3,249,487 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,252 UART: [art] PUB.X = 28CEC20AC77DC84F0C2A231E9AC57FBC3EEDEFFBC5AF3F690D68F2BD0C88138946D309D0F2DECFDBD13C2DB5CDBDF4B4
3,257,047 UART: [art] PUB.Y = E7C69A8F4009E35594DE256E253075231C7EBE31D181629F6EF85552C642C7F51221AFD6876D5A810DE6E6D094D45F96
3,263,989 UART: [art] SIG.R = A8C41AD0C0F0508350B0BC73777A69EBDDDE11A8A26C508A7E4F02BD655312798EFE55A08E7A7FBA30D5DCDF4183DDDA
3,270,778 UART: [art] SIG.S = 2D0414D041D1F04CE9C15ECB51E07873AD8E25A24BBC0FE1D9EDE4D327B7BB6C5E22453CD6DB114C0D50A15C6316123B
3,294,622 UART: Caliptra RT
3,294,967 UART: [state] CFI Enabled
3,403,258 UART: [rt] RT listening for mailbox commands...
3,403,928 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,820 UART: [rt]cmd =0x52564348, len=36
3,435,358 >>> mbox cmd response: failed
3,435,358 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,810 UART: [rt]cmd =0x52564348, len=36
3,466,188 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
893,272 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,397 UART: [kat] ++
897,549 UART: [kat] sha1
901,761 UART: [kat] SHA2-256
903,701 UART: [kat] SHA2-384
906,664 UART: [kat] SHA2-512-ACC
908,565 UART: [kat] ECC-384
918,490 UART: [kat] HMAC-384Kdf
923,076 UART: [kat] LMS
1,171,404 UART: [kat] --
1,172,269 UART: [cold-reset] ++
1,172,815 UART: [fht] FHT @ 0x50003400
1,175,478 UART: [idev] ++
1,175,646 UART: [idev] CDI.KEYID = 6
1,176,006 UART: [idev] SUBJECT.KEYID = 7
1,176,430 UART: [idev] UDS.KEYID = 0
1,176,775 ready_for_fw is high
1,176,775 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,748 UART: [idev] Erasing UDS.KEYID = 0
1,201,219 UART: [idev] Sha1 KeyId Algorithm
1,209,803 UART: [idev] --
1,210,913 UART: [ldev] ++
1,211,081 UART: [ldev] CDI.KEYID = 6
1,211,444 UART: [ldev] SUBJECT.KEYID = 5
1,211,870 UART: [ldev] AUTHORITY.KEYID = 7
1,212,333 UART: [ldev] FE.KEYID = 1
1,217,403 UART: [ldev] Erasing FE.KEYID = 1
1,243,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,479 UART: [ldev] --
1,282,922 UART: [fwproc] Wait for Commands...
1,283,548 UART: [fwproc] Recv command 0x46574c44
1,284,276 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,132 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,436 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,351 >>> mbox cmd response: success
2,775,441 UART: [afmc] ++
2,775,609 UART: [afmc] CDI.KEYID = 6
2,775,971 UART: [afmc] SUBJECT.KEYID = 7
2,776,396 UART: [afmc] AUTHORITY.KEYID = 5
2,811,499 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,870 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,618 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,346 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,231 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,950 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,858 UART: [afmc] --
2,854,798 UART: [cold-reset] --
2,855,400 UART: [state] Locking Datavault
2,856,919 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,523 UART: [state] Locking ICCM
2,858,169 UART: [exit] Launching FMC @ 0x40000130
2,863,498 UART:
2,863,514 UART: Running Caliptra FMC ...
2,863,922 UART:
2,863,976 UART: [state] CFI Enabled
2,874,563 UART: [fht] FMC Alias Private Key: 7
2,982,184 UART: [art] Extend RT PCRs Done
2,982,612 UART: [art] Lock RT PCRs Done
2,984,268 UART: [art] Populate DV Done
2,992,495 UART: [fht] FMC Alias Private Key: 7
2,993,593 UART: [art] Derive CDI
2,993,873 UART: [art] Store in in slot 0x4
3,079,134 UART: [art] Derive Key Pair
3,079,494 UART: [art] Store priv key in slot 0x5
3,092,348 UART: [art] Derive Key Pair - Done
3,107,358 UART: [art] Signing Cert with AUTHO
3,107,838 UART: RITY.KEYID = 7
3,123,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,807 UART: [art] PUB.X = 0535445132064EF81F43A78E3D2253BE7017097F1C2697010F1481B0F2F0B96D05B5F37645A4EE0D455635637947059F
3,130,537 UART: [art] PUB.Y = 69D261AD12FC8FCF2F21E349692E3B723A2B135FD8FDBC036DCFFCDF2FC3BFE224DE6800C41C2FDAB1726BACE4D86375
3,137,490 UART: [art] SIG.R = 63D3E698147AF6C9064FFBC49C965EDF49BA4F9A3E2712CB89A0B0014C5BCC66CBA192FA114240BF134EFBAC89D887C2
3,144,272 UART: [art] SIG.S = 9B0C706E9A9E30E007CE697396950748DCE8F5F7F4E7A0560E8B0D38A8D2916335E8797E7792BB105F540FB92F17C666
3,167,817 UART: Caliptra RT
3,168,070 UART: [state] CFI Enabled
3,276,405 UART: [rt] RT listening for mailbox commands...
3,277,075 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,073 UART: [rt]cmd =0x52564348, len=36
3,308,797 >>> mbox cmd response: failed
3,308,797 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,315 UART: [rt]cmd =0x52564348, len=36
3,339,927 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,233 ready_for_fw is high
1,060,233 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,398 >>> mbox cmd response: success
2,686,524 UART:
2,686,540 UART: Running Caliptra FMC ...
2,686,948 UART:
2,687,002 UART: [state] CFI Enabled
2,697,371 UART: [fht] FMC Alias Private Key: 7
2,805,348 UART: [art] Extend RT PCRs Done
2,805,776 UART: [art] Lock RT PCRs Done
2,807,422 UART: [art] Populate DV Done
2,815,327 UART: [fht] FMC Alias Private Key: 7
2,816,313 UART: [art] Derive CDI
2,816,593 UART: [art] Store in in slot 0x4
2,902,038 UART: [art] Derive Key Pair
2,902,398 UART: [art] Store priv key in slot 0x5
2,915,526 UART: [art] Derive Key Pair - Done
2,930,742 UART: [art] Signing Cert with AUTHO
2,931,222 UART: RITY.KEYID = 7
2,946,582 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,347 UART: [art] PUB.X = 805AA4A590C1690FDADF68E40782B58FD3828C1EF6EC04C8044DE0F238F756B1466BF3A44A0624C61F185174DEEF25BB
2,954,112 UART: [art] PUB.Y = C6C669344EF4703B36CADB515FCC69EB630A107AFF2CE1A62A6DF0791EDD11F8000B9E01994857C06CF3DAA983D223C4
2,961,045 UART: [art] SIG.R = 6EE9016B0E264243A0430B9C0CAB9CA074A84F781C64ABC07EB052A3BFAC6A51DEAF6D4506D02A48A85E1ADB10F484A9
2,967,818 UART: [art] SIG.S = CFE4851FE9E5276C8765D27AAFC2306FE3376F07DEDA236255D905DD73360C6C54A687D827F0A44946D5E86D7A6F701E
2,992,206 UART: Caliptra RT
2,992,459 UART: [state] CFI Enabled
3,101,102 UART: [rt] RT listening for mailbox commands...
3,101,772 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,956 UART: [rt]cmd =0x52564348, len=36
3,133,280 >>> mbox cmd response: failed
3,133,280 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,000 UART: [rt]cmd =0x52564348, len=36
3,164,092 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
893,605 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,730 UART: [kat] ++
897,882 UART: [kat] sha1
902,210 UART: [kat] SHA2-256
904,150 UART: [kat] SHA2-384
906,885 UART: [kat] SHA2-512-ACC
908,786 UART: [kat] ECC-384
918,461 UART: [kat] HMAC-384Kdf
923,047 UART: [kat] LMS
1,171,375 UART: [kat] --
1,172,352 UART: [cold-reset] ++
1,172,878 UART: [fht] FHT @ 0x50003400
1,175,533 UART: [idev] ++
1,175,701 UART: [idev] CDI.KEYID = 6
1,176,061 UART: [idev] SUBJECT.KEYID = 7
1,176,485 UART: [idev] UDS.KEYID = 0
1,176,830 ready_for_fw is high
1,176,830 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,597 UART: [idev] Erasing UDS.KEYID = 0
1,201,572 UART: [idev] Sha1 KeyId Algorithm
1,210,060 UART: [idev] --
1,211,256 UART: [ldev] ++
1,211,424 UART: [ldev] CDI.KEYID = 6
1,211,787 UART: [ldev] SUBJECT.KEYID = 5
1,212,213 UART: [ldev] AUTHORITY.KEYID = 7
1,212,676 UART: [ldev] FE.KEYID = 1
1,217,798 UART: [ldev] Erasing FE.KEYID = 1
1,244,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,214 UART: [ldev] --
1,283,639 UART: [fwproc] Wait for Commands...
1,284,301 UART: [fwproc] Recv command 0x46574c44
1,285,029 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,446 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,231 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,535 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,338 >>> mbox cmd response: success
2,775,522 UART: [afmc] ++
2,775,690 UART: [afmc] CDI.KEYID = 6
2,776,052 UART: [afmc] SUBJECT.KEYID = 7
2,776,477 UART: [afmc] AUTHORITY.KEYID = 5
2,812,554 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,279 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,027 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,755 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,640 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,359 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,015 UART: [afmc] --
2,855,907 UART: [cold-reset] --
2,856,617 UART: [state] Locking Datavault
2,857,732 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,336 UART: [state] Locking ICCM
2,858,810 UART: [exit] Launching FMC @ 0x40000130
2,864,139 UART:
2,864,155 UART: Running Caliptra FMC ...
2,864,563 UART:
2,864,706 UART: [state] CFI Enabled
2,875,197 UART: [fht] FMC Alias Private Key: 7
2,983,018 UART: [art] Extend RT PCRs Done
2,983,446 UART: [art] Lock RT PCRs Done
2,984,970 UART: [art] Populate DV Done
2,992,867 UART: [fht] FMC Alias Private Key: 7
2,993,931 UART: [art] Derive CDI
2,994,211 UART: [art] Store in in slot 0x4
3,079,820 UART: [art] Derive Key Pair
3,080,180 UART: [art] Store priv key in slot 0x5
3,093,428 UART: [art] Derive Key Pair - Done
3,108,206 UART: [art] Signing Cert with AUTHO
3,108,686 UART: RITY.KEYID = 7
3,123,808 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,573 UART: [art] PUB.X = 66E2383409E1A8085031AC461CD243714DA0CA790CE467F15B8734C7400EFC0A47D6E55E7105173DC6A37A8254D8983D
3,131,321 UART: [art] PUB.Y = 9C8BAA19F824B5D70C8CC8E1D4FED6054D7629C29132A4D49F1A435FEEC7FA4ABA901381561D17B9B56DDF67CA9480FE
3,138,283 UART: [art] SIG.R = 9AD26FC2D2DD89584CB5335FAD116F7E80B97D518A7028B1ADCACE27B91EC470C10AEEFE82B405C7EA06F12C44CD38A8
3,145,066 UART: [art] SIG.S = A978563409F91DB5E3D9BE03CAA99123B290C1064CBA93C5E6C181D2C8AC28BD11F355E94769BED89A48EBD15ADCCF42
3,168,408 UART: Caliptra RT
3,168,753 UART: [state] CFI Enabled
3,276,647 UART: [rt] RT listening for mailbox commands...
3,277,317 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,327 UART: [rt]cmd =0x52564348, len=36
3,309,015 >>> mbox cmd response: failed
3,309,015 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,801 UART: [rt]cmd =0x52564348, len=36
3,340,291 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,770 ready_for_fw is high
1,061,770 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,731 >>> mbox cmd response: success
2,689,947 UART:
2,689,963 UART: Running Caliptra FMC ...
2,690,371 UART:
2,690,514 UART: [state] CFI Enabled
2,701,057 UART: [fht] FMC Alias Private Key: 7
2,809,118 UART: [art] Extend RT PCRs Done
2,809,546 UART: [art] Lock RT PCRs Done
2,810,668 UART: [art] Populate DV Done
2,818,883 UART: [fht] FMC Alias Private Key: 7
2,819,839 UART: [art] Derive CDI
2,820,119 UART: [art] Store in in slot 0x4
2,905,726 UART: [art] Derive Key Pair
2,906,086 UART: [art] Store priv key in slot 0x5
2,919,408 UART: [art] Derive Key Pair - Done
2,934,404 UART: [art] Signing Cert with AUTHO
2,934,884 UART: RITY.KEYID = 7
2,950,500 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,265 UART: [art] PUB.X = 757580D8646079B47D5701834143A0FE5AB2A903E2136FDF8ABA0CC1AC48A68B9F9E418392AC9E8A33A73F1A8C9036B4
2,958,030 UART: [art] PUB.Y = C6F2CE0EA58E4E495202EF7E7AD6AAC214088050C38F4786BBD05B7AE6AB613FAC0AAF8912E8511B7C76ED3F2313FE00
2,964,964 UART: [art] SIG.R = 907EE56BE6E8B67DD9C96C032210D6787207DE863EFDD9CE45D242828AD2C8D7DFC8A19728B7A698B4FC9274E1AB7EAF
2,971,744 UART: [art] SIG.S = 81628AF89178F21B68BBF6D5220DB5E2BA196C878950E9AFC7A6BA786FFCBCBD4A81C61C06C4641022F0DE7FB3FD03C4
2,995,962 UART: Caliptra RT
2,996,307 UART: [state] CFI Enabled
3,104,147 UART: [rt] RT listening for mailbox commands...
3,104,817 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,915 UART: [rt]cmd =0x52564348, len=36
3,136,539 >>> mbox cmd response: failed
3,136,539 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,065 UART: [rt]cmd =0x52564348, len=36
3,167,531 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,159 UART: [kat] ++
895,311 UART: [kat] sha1
899,645 UART: [kat] SHA2-256
901,585 UART: [kat] SHA2-384
904,218 UART: [kat] SHA2-512-ACC
906,119 UART: [kat] ECC-384
915,618 UART: [kat] HMAC-384Kdf
920,174 UART: [kat] LMS
1,168,486 UART: [kat] --
1,169,207 UART: [cold-reset] ++
1,169,533 UART: [fht] FHT @ 0x50003400
1,172,181 UART: [idev] ++
1,172,349 UART: [idev] CDI.KEYID = 6
1,172,710 UART: [idev] SUBJECT.KEYID = 7
1,173,135 UART: [idev] UDS.KEYID = 0
1,173,481 ready_for_fw is high
1,173,481 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,909 UART: [idev] Erasing UDS.KEYID = 0
1,197,613 UART: [idev] Sha1 KeyId Algorithm
1,206,515 UART: [idev] --
1,207,422 UART: [ldev] ++
1,207,590 UART: [ldev] CDI.KEYID = 6
1,207,954 UART: [ldev] SUBJECT.KEYID = 5
1,208,381 UART: [ldev] AUTHORITY.KEYID = 7
1,208,844 UART: [ldev] FE.KEYID = 1
1,213,850 UART: [ldev] Erasing FE.KEYID = 1
1,240,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,094 UART: [ldev] --
1,279,554 UART: [fwproc] Wait for Commands...
1,280,281 UART: [fwproc] Recv command 0x46574c44
1,281,014 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,718 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,975 >>> mbox cmd response: success
2,772,030 UART: [afmc] ++
2,772,198 UART: [afmc] CDI.KEYID = 6
2,772,561 UART: [afmc] SUBJECT.KEYID = 7
2,772,987 UART: [afmc] AUTHORITY.KEYID = 5
2,808,162 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,316 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,067 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,796 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,679 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,398 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,211 UART: [afmc] --
2,851,225 UART: [cold-reset] --
2,852,025 UART: [state] Locking Datavault
2,853,194 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,798 UART: [state] Locking ICCM
2,854,462 UART: [exit] Launching FMC @ 0x40000130
2,859,791 UART:
2,859,807 UART: Running Caliptra FMC ...
2,860,215 UART:
2,860,269 UART: [state] CFI Enabled
2,870,950 UART: [fht] FMC Alias Private Key: 7
2,978,803 UART: [art] Extend RT PCRs Done
2,979,231 UART: [art] Lock RT PCRs Done
2,981,015 UART: [art] Populate DV Done
2,989,280 UART: [fht] FMC Alias Private Key: 7
2,990,270 UART: [art] Derive CDI
2,990,550 UART: [art] Store in in slot 0x4
3,075,877 UART: [art] Derive Key Pair
3,076,237 UART: [art] Store priv key in slot 0x5
3,089,345 UART: [art] Derive Key Pair - Done
3,103,833 UART: [art] Signing Cert with AUTHO
3,104,313 UART: RITY.KEYID = 7
3,119,611 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,376 UART: [art] PUB.X = CFD30AE3AAEE4A93EFC45B95A66778338569D9E1B7D46513CE5CF824B5ABEE590B8F4B8E9C44D19C314A73765D4149D7
3,127,154 UART: [art] PUB.Y = F23D1C93A2A63D5E967776222B90CC1177E936219CEDE066D51829F563E32FB99820AC773B800D1FC0D4210D22FD90CE
3,134,100 UART: [art] SIG.R = 40BA894F8FE460CD361A121D883A46E3CF15B21771BABBB81E23F4E0B6F878770CAEC92532B71FE96BD9C5B7916B126F
3,140,879 UART: [art] SIG.S = B2ECBDBA76FD16DD01770ED926BAD539AA38A5B3A7EB40293C3C225E84222BE9E3C769AF33C8EF0218A4A2030C2011DD
3,165,007 UART: Caliptra RT
3,165,260 UART: [state] CFI Enabled
3,272,775 UART: [rt] RT listening for mailbox commands...
3,273,445 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,531 UART: [rt]cmd =0x52564348, len=36
3,305,155 >>> mbox cmd response: failed
3,305,155 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,891 UART: [rt]cmd =0x52564348, len=36
3,336,207 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,292 ready_for_fw is high
1,056,292 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,103 >>> mbox cmd response: success
2,684,165 UART:
2,684,181 UART: Running Caliptra FMC ...
2,684,589 UART:
2,684,643 UART: [state] CFI Enabled
2,695,278 UART: [fht] FMC Alias Private Key: 7
2,802,987 UART: [art] Extend RT PCRs Done
2,803,415 UART: [art] Lock RT PCRs Done
2,804,701 UART: [art] Populate DV Done
2,813,010 UART: [fht] FMC Alias Private Key: 7
2,814,028 UART: [art] Derive CDI
2,814,308 UART: [art] Store in in slot 0x4
2,900,205 UART: [art] Derive Key Pair
2,900,565 UART: [art] Store priv key in slot 0x5
2,913,959 UART: [art] Derive Key Pair - Done
2,928,573 UART: [art] Signing Cert with AUTHO
2,929,053 UART: RITY.KEYID = 7
2,944,757 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,522 UART: [art] PUB.X = EF8714DF9364FBC60439E161AC48ADF43466AECB85C74F190E261A563BE6890F29EB73E4A454651015A542DB1A722C69
2,952,287 UART: [art] PUB.Y = 402A909AE522776455237450B370F0211E4A9F2D71497CE121E353939CD6B4E9220EEC400BB28EC20A570F098D8EB4F3
2,959,218 UART: [art] SIG.R = CAFCF197A49EB726A3826765E49D42523677D6EAA2587A6DF8A15BF4B752473F41810F34CD1F426B792DEA9FD9868AFB
2,965,995 UART: [art] SIG.S = 3163645CE6A7E8FE919DBE458F5CCCD48DB9ACCFFD7A0FEF5031805255D2C0A5A385A156F42FA889D1E48C9A2937332A
2,989,861 UART: Caliptra RT
2,990,114 UART: [state] CFI Enabled
3,098,445 UART: [rt] RT listening for mailbox commands...
3,099,115 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,025 UART: [rt]cmd =0x52564348, len=36
3,130,567 >>> mbox cmd response: failed
3,130,567 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,217 UART: [rt]cmd =0x52564348, len=36
3,161,443 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
891,535 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,664 UART: [kat] ++
895,816 UART: [kat] sha1
899,998 UART: [kat] SHA2-256
901,938 UART: [kat] SHA2-384
904,711 UART: [kat] SHA2-512-ACC
906,612 UART: [kat] ECC-384
916,285 UART: [kat] HMAC-384Kdf
921,043 UART: [kat] LMS
1,169,355 UART: [kat] --
1,170,232 UART: [cold-reset] ++
1,170,576 UART: [fht] FHT @ 0x50003400
1,173,186 UART: [idev] ++
1,173,354 UART: [idev] CDI.KEYID = 6
1,173,715 UART: [idev] SUBJECT.KEYID = 7
1,174,140 UART: [idev] UDS.KEYID = 0
1,174,486 ready_for_fw is high
1,174,486 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,286 UART: [idev] Erasing UDS.KEYID = 0
1,199,434 UART: [idev] Sha1 KeyId Algorithm
1,208,458 UART: [idev] --
1,209,531 UART: [ldev] ++
1,209,699 UART: [ldev] CDI.KEYID = 6
1,210,063 UART: [ldev] SUBJECT.KEYID = 5
1,210,490 UART: [ldev] AUTHORITY.KEYID = 7
1,210,953 UART: [ldev] FE.KEYID = 1
1,216,189 UART: [ldev] Erasing FE.KEYID = 1
1,242,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,745 UART: [ldev] --
1,282,017 UART: [fwproc] Wait for Commands...
1,282,620 UART: [fwproc] Recv command 0x46574c44
1,283,353 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,367 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,676 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,584 >>> mbox cmd response: success
2,774,825 UART: [afmc] ++
2,774,993 UART: [afmc] CDI.KEYID = 6
2,775,356 UART: [afmc] SUBJECT.KEYID = 7
2,775,782 UART: [afmc] AUTHORITY.KEYID = 5
2,811,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,925 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,676 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,405 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,288 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,007 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,908 UART: [afmc] --
2,855,000 UART: [cold-reset] --
2,855,712 UART: [state] Locking Datavault
2,856,959 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,563 UART: [state] Locking ICCM
2,858,189 UART: [exit] Launching FMC @ 0x40000130
2,863,518 UART:
2,863,534 UART: Running Caliptra FMC ...
2,863,942 UART:
2,864,085 UART: [state] CFI Enabled
2,874,724 UART: [fht] FMC Alias Private Key: 7
2,982,737 UART: [art] Extend RT PCRs Done
2,983,165 UART: [art] Lock RT PCRs Done
2,984,639 UART: [art] Populate DV Done
2,992,786 UART: [fht] FMC Alias Private Key: 7
2,993,820 UART: [art] Derive CDI
2,994,100 UART: [art] Store in in slot 0x4
3,079,743 UART: [art] Derive Key Pair
3,080,103 UART: [art] Store priv key in slot 0x5
3,093,621 UART: [art] Derive Key Pair - Done
3,108,559 UART: [art] Signing Cert with AUTHO
3,109,039 UART: RITY.KEYID = 7
3,124,043 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,808 UART: [art] PUB.X = 1240923C8A4DA040084E0A593C0BECD3D29EEC89F57075A3C26A18D64ED18D0AB647A424C9AFE4867B804AE4F5826A07
3,131,571 UART: [art] PUB.Y = 6A301644B751D1D8950D953A392B6CC235636A6A49D4585D251F208AAEEB692F56C35AC5100F03D1D72257C2DD537342
3,138,508 UART: [art] SIG.R = 2372926C537528182413CB7D30C0098C9382CBEAEF34D45D007270FED0082123C9F79FBA43860C519B110DF2F35F8173
3,145,238 UART: [art] SIG.S = 81B207C7E1371F0E1367572E5FE39F9E11DC2BC11CED71EF8C4B0996AF7B21AB706E33A39A2718F28B7698112C848B18
3,169,318 UART: Caliptra RT
3,169,663 UART: [state] CFI Enabled
3,277,670 UART: [rt] RT listening for mailbox commands...
3,278,340 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,258 UART: [rt]cmd =0x52564348, len=36
3,309,706 >>> mbox cmd response: failed
3,309,706 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,354 UART: [rt]cmd =0x52564348, len=36
3,340,776 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,237 ready_for_fw is high
1,055,237 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,128 >>> mbox cmd response: success
2,683,064 UART:
2,683,080 UART: Running Caliptra FMC ...
2,683,488 UART:
2,683,631 UART: [state] CFI Enabled
2,694,266 UART: [fht] FMC Alias Private Key: 7
2,801,873 UART: [art] Extend RT PCRs Done
2,802,301 UART: [art] Lock RT PCRs Done
2,803,871 UART: [art] Populate DV Done
2,812,096 UART: [fht] FMC Alias Private Key: 7
2,813,152 UART: [art] Derive CDI
2,813,432 UART: [art] Store in in slot 0x4
2,898,943 UART: [art] Derive Key Pair
2,899,303 UART: [art] Store priv key in slot 0x5
2,912,453 UART: [art] Derive Key Pair - Done
2,927,380 UART: [art] Signing Cert with AUTHO
2,927,860 UART: RITY.KEYID = 7
2,943,282 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,047 UART: [art] PUB.X = 49FBE45ACD18C698767EBBDC3E5372C45D97BDF58FA751BD4D7391FAFCD94C2FE8774EE4F61D4501834AB88FE0E20C63
2,950,831 UART: [art] PUB.Y = 1839FCF17F65677ED1ADBD46D17906657902DB790D321D90056E40ABA06A0B21A9E71DCD06E607C3AA3C1F0FDD19941D
2,957,767 UART: [art] SIG.R = CD4C62A6EF577797DA81661B134571091109D10E71AA196584B86586E7CAA668907155FC70D755F332B64CA14E638A3B
2,964,522 UART: [art] SIG.S = DB3C75BCB31EA5DEFCB88163A085F7ADDD45AE7AB07A953950B7617A218134F0693FE7851420B34789538B9CED67B210
2,988,661 UART: Caliptra RT
2,989,006 UART: [state] CFI Enabled
3,096,812 UART: [rt] RT listening for mailbox commands...
3,097,482 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,894 UART: [rt]cmd =0x52564348, len=36
3,129,308 >>> mbox cmd response: failed
3,129,308 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,702 UART: [rt]cmd =0x52564348, len=36
3,160,238 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,706 UART: [state] LifecycleState = Unprovisioned
86,361 UART: [state] DebugLocked = No
86,993 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,597 UART: [kat] SHA2-256
882,528 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,643 UART: [kat] ++
886,795 UART: [kat] sha1
890,997 UART: [kat] SHA2-256
892,935 UART: [kat] SHA2-384
895,684 UART: [kat] SHA2-512-ACC
897,585 UART: [kat] ECC-384
903,126 UART: [kat] HMAC-384Kdf
907,648 UART: [kat] LMS
1,475,844 UART: [kat] --
1,476,705 UART: [cold-reset] ++
1,477,119 UART: [fht] Storing FHT @ 0x50003400
1,479,858 UART: [idev] ++
1,480,026 UART: [idev] CDI.KEYID = 6
1,480,386 UART: [idev] SUBJECT.KEYID = 7
1,480,810 UART: [idev] UDS.KEYID = 0
1,481,155 ready_for_fw is high
1,481,155 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,306 UART: [idev] Erasing UDS.KEYID = 0
1,504,758 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,528 UART: [idev] --
1,514,523 UART: [ldev] ++
1,514,691 UART: [ldev] CDI.KEYID = 6
1,515,054 UART: [ldev] SUBJECT.KEYID = 5
1,515,480 UART: [ldev] AUTHORITY.KEYID = 7
1,515,943 UART: [ldev] FE.KEYID = 1
1,521,063 UART: [ldev] Erasing FE.KEYID = 1
1,545,966 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,084 UART: [ldev] --
1,585,515 UART: [fwproc] Waiting for Commands...
1,586,382 UART: [fwproc] Received command 0x46574c44
1,587,173 UART: [fwproc] Received Image of size 114332 bytes
5,346,848 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,375,280 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,404,632 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,540,581 >>> mbox cmd response: success
5,541,663 UART: [afmc] ++
5,541,831 UART: [afmc] CDI.KEYID = 6
5,542,193 UART: [afmc] SUBJECT.KEYID = 7
5,542,618 UART: [afmc] AUTHORITY.KEYID = 5
5,577,806 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,593,648 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,594,428 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,600,137 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,606,029 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,611,730 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,619,636 UART: [afmc] --
5,620,674 UART: [cold-reset] --
5,621,520 UART: [state] Locking Datavault
5,622,933 UART: [state] Locking PCR0, PCR1 and PCR31
5,623,537 UART: [state] Locking ICCM
5,624,013 UART: [exit] Launching FMC @ 0x40000130
5,629,342 UART:
5,629,358 UART: Running Caliptra FMC ...
5,629,766 UART:
5,629,820 UART: [state] CFI Enabled
5,639,986 UART: [fht] FMC Alias Private Key: 7
5,747,372 UART: [art] Extend RT PCRs Done
5,747,800 UART: [art] Lock RT PCRs Done
5,749,372 UART: [art] Populate DV Done
5,757,274 UART: [fht] FMC Alias Private Key: 7
5,758,364 UART: [art] Derive CDI
5,758,644 UART: [art] Store in in slot 0x4
5,843,845 UART: [art] Derive Key Pair
5,844,205 UART: [art] Store priv key in slot 0x5
5,856,989 UART: [art] Derive Key Pair - Done
5,871,546 UART: [art] Signing Cert with AUTHO
5,872,026 UART: RITY.KEYID = 7
5,886,800 UART: [art] Erasing AUTHORITY.KEYID = 7
5,887,565 UART: [art] PUB.X = 8107A2091520607E4C6D4BD9202D383BC6A21CD0C833CD80AE8EF9DF991ACFD88AA6C0745B0AF900C267C2E5334710E6
5,894,312 UART: [art] PUB.Y = 2B2B94359855A4F4C93C9AA22EFE82BCE0B7C320EBDFD973E6FC4BD0D11B0454CB5D82DE2B5CD22090FE51F7912C74FF
5,901,281 UART: [art] SIG.R = 12D4F8DC46F2B964CC3042B5C9A2AA4F44CFAA95BB566589916A5CE69662896F8757BC20FCA17216BCF30D6C9249F7C7
5,908,058 UART: [art] SIG.S = 2F72D484FDDB3B72FF784D6E13489D118A1E76C4A1B3FE03F445A5FFF52D1AB46B4B39BE7E9C163DEFE2780596B4F5A0
5,932,051 UART: Caliptra RT
5,932,304 UART: [state] CFI Enabled
6,040,106 UART: [rt] RT listening for mailbox commands...
6,040,776 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,163,886 UART: [rt]cmd =0x41544d4e, len=14344
7,564,605 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,475 ready_for_fw is high
1,362,475 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,239,229 >>> mbox cmd response: success
5,300,856 UART:
5,300,872 UART: Running Caliptra FMC ...
5,301,280 UART:
5,301,334 UART: [state] CFI Enabled
5,311,866 UART: [fht] FMC Alias Private Key: 7
5,420,792 UART: [art] Extend RT PCRs Done
5,421,220 UART: [art] Lock RT PCRs Done
5,422,898 UART: [art] Populate DV Done
5,430,858 UART: [fht] FMC Alias Private Key: 7
5,431,876 UART: [art] Derive CDI
5,432,156 UART: [art] Store in in slot 0x4
5,518,105 UART: [art] Derive Key Pair
5,518,465 UART: [art] Store priv key in slot 0x5
5,531,035 UART: [art] Derive Key Pair - Done
5,545,886 UART: [art] Signing Cert with AUTHO
5,546,366 UART: RITY.KEYID = 7
5,561,282 UART: [art] Erasing AUTHORITY.KEYID = 7
5,562,047 UART: [art] PUB.X = A6CF1775A7352A858F272AD50F1E37C5683D651B055B3822566BEDF12FBB1447CBCB00EEF93430C345E92BD0ED7D2E4C
5,568,801 UART: [art] PUB.Y = A6B865985843CD5638E501F289DD037E9E04BDA8C9B6D72033838904D71D3D698DA12063015C0B73168273896AE4FD39
5,575,725 UART: [art] SIG.R = 1152AAF54374C6BA7961191402B79011E0BBCF61CDAF7B4C7015817C2490A2425DBC7178CA9A36843D8616EF55E9B7EE
5,582,496 UART: [art] SIG.S = 4F037C5A3453B1BDB5FADB381231C28590FA95A96B1D1FD2FCE87C4F060244B738DF8947FF52168138CD8149C62CEEC1
5,606,540 UART: Caliptra RT
5,606,793 UART: [state] CFI Enabled
5,714,589 UART: [rt] RT listening for mailbox commands...
5,715,259 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,838,371 UART: [rt]cmd =0x41544d4e, len=14344
7,229,708 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,789 UART: [state] LifecycleState = Unprovisioned
86,444 UART: [state] DebugLocked = No
87,064 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,578 UART: [kat] SHA2-256
882,509 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,624 UART: [kat] ++
886,776 UART: [kat] sha1
891,028 UART: [kat] SHA2-256
892,966 UART: [kat] SHA2-384
895,541 UART: [kat] SHA2-512-ACC
897,442 UART: [kat] ECC-384
903,213 UART: [kat] HMAC-384Kdf
907,739 UART: [kat] LMS
1,475,935 UART: [kat] --
1,476,708 UART: [cold-reset] ++
1,477,102 UART: [fht] Storing FHT @ 0x50003400
1,479,661 UART: [idev] ++
1,479,829 UART: [idev] CDI.KEYID = 6
1,480,189 UART: [idev] SUBJECT.KEYID = 7
1,480,613 UART: [idev] UDS.KEYID = 0
1,480,958 ready_for_fw is high
1,480,958 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,331 UART: [idev] Erasing UDS.KEYID = 0
1,504,593 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,347 UART: [idev] --
1,514,374 UART: [ldev] ++
1,514,542 UART: [ldev] CDI.KEYID = 6
1,514,905 UART: [ldev] SUBJECT.KEYID = 5
1,515,331 UART: [ldev] AUTHORITY.KEYID = 7
1,515,794 UART: [ldev] FE.KEYID = 1
1,521,020 UART: [ldev] Erasing FE.KEYID = 1
1,546,481 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,627 UART: [ldev] --
1,585,938 UART: [fwproc] Waiting for Commands...
1,586,769 UART: [fwproc] Received command 0x46574c44
1,587,560 UART: [fwproc] Received Image of size 114332 bytes
5,272,129 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,300,121 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,329,473 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,465,372 >>> mbox cmd response: success
5,466,444 UART: [afmc] ++
5,466,612 UART: [afmc] CDI.KEYID = 6
5,466,974 UART: [afmc] SUBJECT.KEYID = 7
5,467,399 UART: [afmc] AUTHORITY.KEYID = 5
5,502,789 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,519,091 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,519,871 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,525,580 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,531,472 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,537,173 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,545,081 UART: [afmc] --
5,546,055 UART: [cold-reset] --
5,547,091 UART: [state] Locking Datavault
5,548,394 UART: [state] Locking PCR0, PCR1 and PCR31
5,548,998 UART: [state] Locking ICCM
5,549,546 UART: [exit] Launching FMC @ 0x40000130
5,554,875 UART:
5,554,891 UART: Running Caliptra FMC ...
5,555,299 UART:
5,555,442 UART: [state] CFI Enabled
5,565,940 UART: [fht] FMC Alias Private Key: 7
5,674,332 UART: [art] Extend RT PCRs Done
5,674,760 UART: [art] Lock RT PCRs Done
5,676,376 UART: [art] Populate DV Done
5,684,430 UART: [fht] FMC Alias Private Key: 7
5,685,554 UART: [art] Derive CDI
5,685,834 UART: [art] Store in in slot 0x4
5,771,633 UART: [art] Derive Key Pair
5,771,993 UART: [art] Store priv key in slot 0x5
5,784,815 UART: [art] Derive Key Pair - Done
5,799,250 UART: [art] Signing Cert with AUTHO
5,799,730 UART: RITY.KEYID = 7
5,814,906 UART: [art] Erasing AUTHORITY.KEYID = 7
5,815,671 UART: [art] PUB.X = 08E4DB27A8FC5082C453F56D35D0C2CF3182FAF0E72E37A16F58485B382BFF6CEE8B8A4F50C6510453856544EC739F68
5,822,441 UART: [art] PUB.Y = C40E899A235B076D749F133B5199B3157E4F905F28F7599619D9E09A47E33238EDF8330A34B93A13DD4B48C63E899085
5,829,374 UART: [art] SIG.R = 1C5C629A4EFC40881795E0C241B0F58C79B1ECFB5295283234100692F54451EB58237BC518BD2D2DB39B8313A87623A3
5,836,137 UART: [art] SIG.S = 6FB15A6AC5369ED94EAEEF32168152C8958A03F2551740E4ABCA204C5F3519A60DF1968B7655610AA04C87A89ED3645C
5,860,081 UART: Caliptra RT
5,860,426 UART: [state] CFI Enabled
5,968,528 UART: [rt] RT listening for mailbox commands...
5,969,198 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,092,232 UART: [rt]cmd =0x41544d4e, len=14344
7,485,592 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,648 ready_for_fw is high
1,362,648 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,201,355 >>> mbox cmd response: success
5,262,552 UART:
5,262,568 UART: Running Caliptra FMC ...
5,262,976 UART:
5,263,119 UART: [state] CFI Enabled
5,273,981 UART: [fht] FMC Alias Private Key: 7
5,381,941 UART: [art] Extend RT PCRs Done
5,382,369 UART: [art] Lock RT PCRs Done
5,384,181 UART: [art] Populate DV Done
5,392,617 UART: [fht] FMC Alias Private Key: 7
5,393,731 UART: [art] Derive CDI
5,394,011 UART: [art] Store in in slot 0x4
5,479,454 UART: [art] Derive Key Pair
5,479,814 UART: [art] Store priv key in slot 0x5
5,492,758 UART: [art] Derive Key Pair - Done
5,507,523 UART: [art] Signing Cert with AUTHO
5,508,003 UART: RITY.KEYID = 7
5,523,495 UART: [art] Erasing AUTHORITY.KEYID = 7
5,524,260 UART: [art] PUB.X = 41CF597BE4851DE69A1F4457D105754A409F2F9C29DFFCB809724C68B51F2906A5FFDE05C91D1DCC2B91C042FD237F47
5,531,028 UART: [art] PUB.Y = F7DF7ECECD2A818EB96ADDB400A9639AA4865BF58584B0995148CD80A73248CA4E12884854CD6DF7D47798543C65ACF3
5,537,966 UART: [art] SIG.R = 815DED1926F8228AF9D9461D7C136340D493AD5A4791424C566128BAE0EC4CEDA7670295C06EDA9FE04C50A251AF8FC5
5,544,741 UART: [art] SIG.S = F1E70C092199E1FAA21A7824E40B002023AE621C4B584D37604082E38DEADE6302E6F6D0E91A1DBAC5CC0C6D1C5E315B
5,568,829 UART: Caliptra RT
5,569,174 UART: [state] CFI Enabled
5,676,848 UART: [rt] RT listening for mailbox commands...
5,677,518 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,800,808 UART: [rt]cmd =0x41544d4e, len=14344
7,203,598 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,776 UART: [state] LifecycleState = Unprovisioned
85,431 UART: [state] DebugLocked = No
86,051 UART: [state] WD Timer not started. Device not locked for debugging
87,344 UART: [kat] SHA2-256
892,994 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,119 UART: [kat] ++
897,271 UART: [kat] sha1
901,593 UART: [kat] SHA2-256
903,533 UART: [kat] SHA2-384
906,360 UART: [kat] SHA2-512-ACC
908,261 UART: [kat] ECC-384
918,166 UART: [kat] HMAC-384Kdf
922,788 UART: [kat] LMS
1,171,116 UART: [kat] --
1,171,877 UART: [cold-reset] ++
1,172,363 UART: [fht] FHT @ 0x50003400
1,175,030 UART: [idev] ++
1,175,198 UART: [idev] CDI.KEYID = 6
1,175,558 UART: [idev] SUBJECT.KEYID = 7
1,175,982 UART: [idev] UDS.KEYID = 0
1,176,327 ready_for_fw is high
1,176,327 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,932 UART: [idev] Erasing UDS.KEYID = 0
1,200,759 UART: [idev] Sha1 KeyId Algorithm
1,209,237 UART: [idev] --
1,210,311 UART: [ldev] ++
1,210,479 UART: [ldev] CDI.KEYID = 6
1,210,842 UART: [ldev] SUBJECT.KEYID = 5
1,211,268 UART: [ldev] AUTHORITY.KEYID = 7
1,211,731 UART: [ldev] FE.KEYID = 1
1,216,991 UART: [ldev] Erasing FE.KEYID = 1
1,242,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,069 UART: [ldev] --
1,282,448 UART: [fwproc] Wait for Commands...
1,283,032 UART: [fwproc] Recv command 0x46574c44
1,283,760 UART: [fwproc] Recv'd Img size: 114332 bytes
3,125,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,270 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,574 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,318,503 >>> mbox cmd response: success
3,319,743 UART: [afmc] ++
3,319,911 UART: [afmc] CDI.KEYID = 6
3,320,273 UART: [afmc] SUBJECT.KEYID = 7
3,320,698 UART: [afmc] AUTHORITY.KEYID = 5
3,355,706 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,543 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,291 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,000 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,892 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,603 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,486 UART: [afmc] --
3,399,466 UART: [cold-reset] --
3,400,388 UART: [state] Locking Datavault
3,401,381 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,985 UART: [state] Locking ICCM
3,402,451 UART: [exit] Launching FMC @ 0x40000130
3,407,780 UART:
3,407,796 UART: Running Caliptra FMC ...
3,408,204 UART:
3,408,258 UART: [state] CFI Enabled
3,418,472 UART: [fht] FMC Alias Private Key: 7
3,526,572 UART: [art] Extend RT PCRs Done
3,527,000 UART: [art] Lock RT PCRs Done
3,528,418 UART: [art] Populate DV Done
3,536,760 UART: [fht] FMC Alias Private Key: 7
3,537,858 UART: [art] Derive CDI
3,538,138 UART: [art] Store in in slot 0x4
3,623,847 UART: [art] Derive Key Pair
3,624,207 UART: [art] Store priv key in slot 0x5
3,637,433 UART: [art] Derive Key Pair - Done
3,652,280 UART: [art] Signing Cert with AUTHO
3,652,760 UART: RITY.KEYID = 7
3,667,884 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,649 UART: [art] PUB.X = ADC0B947A0D690EDF40DBFCE0390A457BFD2495A252DC78A389493619EE4B9FF42C8F000A03B6EC6533361F4ACB5E642
3,675,405 UART: [art] PUB.Y = 553F84E49F7EE21782E4CD486A11F822BBE6DF603E98D674D5BAD053A1C35F16E40BC8EEDFDCC02B39AF758E9A1CD78F
3,682,374 UART: [art] SIG.R = D466261A1282ABCAD190B9D58E9CED611FDDE6B492B86228CB9B995BD3F4A5D089A45234A83DD834EEF14E38633BD559
3,689,156 UART: [art] SIG.S = 71F3F372B88B922FAB2EAF68479FD827497480AAF0AAB4E62490063C81563999DDF6DD58235B371EDD49CE543BB41BDD
3,712,824 UART: Caliptra RT
3,713,077 UART: [state] CFI Enabled
3,821,239 UART: [rt] RT listening for mailbox commands...
3,821,909 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,011 UART: [rt]cmd =0x41544d4e, len=14344
5,353,461 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,799 ready_for_fw is high
1,059,799 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,165,398 >>> mbox cmd response: success
3,226,453 UART:
3,226,469 UART: Running Caliptra FMC ...
3,226,877 UART:
3,226,931 UART: [state] CFI Enabled
3,237,467 UART: [fht] FMC Alias Private Key: 7
3,345,333 UART: [art] Extend RT PCRs Done
3,345,761 UART: [art] Lock RT PCRs Done
3,347,281 UART: [art] Populate DV Done
3,355,423 UART: [fht] FMC Alias Private Key: 7
3,356,433 UART: [art] Derive CDI
3,356,713 UART: [art] Store in in slot 0x4
3,442,352 UART: [art] Derive Key Pair
3,442,712 UART: [art] Store priv key in slot 0x5
3,456,264 UART: [art] Derive Key Pair - Done
3,471,140 UART: [art] Signing Cert with AUTHO
3,471,620 UART: RITY.KEYID = 7
3,486,696 UART: [art] Erasing AUTHORITY.KEYID = 7
3,487,461 UART: [art] PUB.X = FF50A33F87F25CAABACFBC233060A5226DE048F573CD448E3AE6B89694C0DEB1931AF3972635738463BB88BF399B99B9
3,494,241 UART: [art] PUB.Y = 9EC56AC04996CDB3A1D75D000E80F970D1A0002A51A19DD5499807CA54AE79D873C2A3DB07A1BF72B86C5D7918761D99
3,501,144 UART: [art] SIG.R = C7F05C5E8D22F26B9ECD27D4291FD8C644CC0A69CEDF55568136F5066DE7A3647FA9EC32CC9BF538AB70DEBBC18B8F96
3,507,930 UART: [art] SIG.S = F5C3FBE7CF54F82E1AAE4E2242CD8B46D8388D33C5A66DCFE6CC9B824EAF1614DA125B4578A8D8D924D41C4CAF807370
3,531,461 UART: Caliptra RT
3,531,714 UART: [state] CFI Enabled
3,639,757 UART: [rt] RT listening for mailbox commands...
3,640,427 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,553 UART: [rt]cmd =0x41544d4e, len=14344
5,174,450 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,568 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
893,387 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,512 UART: [kat] ++
897,664 UART: [kat] sha1
901,750 UART: [kat] SHA2-256
903,690 UART: [kat] SHA2-384
906,299 UART: [kat] SHA2-512-ACC
908,200 UART: [kat] ECC-384
918,415 UART: [kat] HMAC-384Kdf
923,035 UART: [kat] LMS
1,171,363 UART: [kat] --
1,172,354 UART: [cold-reset] ++
1,172,774 UART: [fht] FHT @ 0x50003400
1,175,231 UART: [idev] ++
1,175,399 UART: [idev] CDI.KEYID = 6
1,175,759 UART: [idev] SUBJECT.KEYID = 7
1,176,183 UART: [idev] UDS.KEYID = 0
1,176,528 ready_for_fw is high
1,176,528 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,023 UART: [idev] Erasing UDS.KEYID = 0
1,201,880 UART: [idev] Sha1 KeyId Algorithm
1,210,254 UART: [idev] --
1,211,298 UART: [ldev] ++
1,211,466 UART: [ldev] CDI.KEYID = 6
1,211,829 UART: [ldev] SUBJECT.KEYID = 5
1,212,255 UART: [ldev] AUTHORITY.KEYID = 7
1,212,718 UART: [ldev] FE.KEYID = 1
1,217,932 UART: [ldev] Erasing FE.KEYID = 1
1,244,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,212 UART: [ldev] --
1,283,531 UART: [fwproc] Wait for Commands...
1,284,307 UART: [fwproc] Recv command 0x46574c44
1,285,035 UART: [fwproc] Recv'd Img size: 114332 bytes
3,134,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,162,148 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,191,452 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,327,169 >>> mbox cmd response: success
3,328,405 UART: [afmc] ++
3,328,573 UART: [afmc] CDI.KEYID = 6
3,328,935 UART: [afmc] SUBJECT.KEYID = 7
3,329,360 UART: [afmc] AUTHORITY.KEYID = 5
3,365,032 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,381,437 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,382,185 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,387,894 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,393,786 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,399,497 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,407,196 UART: [afmc] --
3,408,294 UART: [cold-reset] --
3,409,178 UART: [state] Locking Datavault
3,410,399 UART: [state] Locking PCR0, PCR1 and PCR31
3,411,003 UART: [state] Locking ICCM
3,411,497 UART: [exit] Launching FMC @ 0x40000130
3,416,826 UART:
3,416,842 UART: Running Caliptra FMC ...
3,417,250 UART:
3,417,393 UART: [state] CFI Enabled
3,427,941 UART: [fht] FMC Alias Private Key: 7
3,536,367 UART: [art] Extend RT PCRs Done
3,536,795 UART: [art] Lock RT PCRs Done
3,538,597 UART: [art] Populate DV Done
3,546,707 UART: [fht] FMC Alias Private Key: 7
3,547,769 UART: [art] Derive CDI
3,548,049 UART: [art] Store in in slot 0x4
3,633,806 UART: [art] Derive Key Pair
3,634,166 UART: [art] Store priv key in slot 0x5
3,647,152 UART: [art] Derive Key Pair - Done
3,661,809 UART: [art] Signing Cert with AUTHO
3,662,289 UART: RITY.KEYID = 7
3,677,939 UART: [art] Erasing AUTHORITY.KEYID = 7
3,678,704 UART: [art] PUB.X = 3660BD72BF8940EF162022FD3ABD60A379CF600415272E0AAC51DFECC96232812A8BAE6CAC890768ECF1236B44DD804A
3,685,477 UART: [art] PUB.Y = 950B870AEA0704909E6D715934F2C3754C7684B13C3BDB6D3490BAEF21CC87BD7F0C8BA0D98A81F7DDCB5CC43BA0D80A
3,692,427 UART: [art] SIG.R = 238BDCBDA8E9EA87E46A883BF976A8E0676F760DB2F89D2C9272550234A12E1D4D76A436BFF710522B5AC768E70C3AA6
3,699,198 UART: [art] SIG.S = DB3EE236F79DCAAF3AADB48559A6007D28E9D71DDD287E8A8E1712DD491C5E920262AC24B4765AC3A7CD17D208378F17
3,723,093 UART: Caliptra RT
3,723,438 UART: [state] CFI Enabled
3,831,286 UART: [rt] RT listening for mailbox commands...
3,831,956 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,954,814 UART: [rt]cmd =0x41544d4e, len=14344
5,358,340 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,772 ready_for_fw is high
1,060,772 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,164,294 >>> mbox cmd response: success
3,227,155 UART:
3,227,171 UART: Running Caliptra FMC ...
3,227,579 UART:
3,227,722 UART: [state] CFI Enabled
3,238,348 UART: [fht] FMC Alias Private Key: 7
3,345,840 UART: [art] Extend RT PCRs Done
3,346,268 UART: [art] Lock RT PCRs Done
3,347,658 UART: [art] Populate DV Done
3,355,950 UART: [fht] FMC Alias Private Key: 7
3,356,880 UART: [art] Derive CDI
3,357,160 UART: [art] Store in in slot 0x4
3,443,471 UART: [art] Derive Key Pair
3,443,831 UART: [art] Store priv key in slot 0x5
3,456,853 UART: [art] Derive Key Pair - Done
3,471,871 UART: [art] Signing Cert with AUTHO
3,472,351 UART: RITY.KEYID = 7
3,487,411 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,176 UART: [art] PUB.X = B0632365CED67E90F5CCFFF58C134DCD6B578068C6C4D07752DAAFF4D23C9FAB46EF6E3EA4B2752158E1164BC5167097
3,494,960 UART: [art] PUB.Y = A7A548EEA080DCB68400C2E81ABF53EE51027FF404B29EE9B9BB24C59BA0250ECA344C2A77B57C270A0110CEA33B0908
3,501,881 UART: [art] SIG.R = 65AA8C7042A1A8DDE5810B4717B504AB31BA23F642F8734DD83C7ECB2F13FD12785927611331AE491929D7A718970024
3,508,619 UART: [art] SIG.S = 4FF90EC459159BBCFD191A5EE78EC8B02850C7FA9FEE6B17E47CF59D0491DED66C4A5D6A1448615A100E122C77E43B76
3,532,933 UART: Caliptra RT
3,533,278 UART: [state] CFI Enabled
3,640,721 UART: [rt] RT listening for mailbox commands...
3,641,391 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,287 UART: [rt]cmd =0x41544d4e, len=14344
5,169,676 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
891,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,415 UART: [kat] ++
895,567 UART: [kat] sha1
899,993 UART: [kat] SHA2-256
901,933 UART: [kat] SHA2-384
904,584 UART: [kat] SHA2-512-ACC
906,485 UART: [kat] ECC-384
916,332 UART: [kat] HMAC-384Kdf
920,770 UART: [kat] LMS
1,169,082 UART: [kat] --
1,169,687 UART: [cold-reset] ++
1,170,049 UART: [fht] FHT @ 0x50003400
1,172,685 UART: [idev] ++
1,172,853 UART: [idev] CDI.KEYID = 6
1,173,214 UART: [idev] SUBJECT.KEYID = 7
1,173,639 UART: [idev] UDS.KEYID = 0
1,173,985 ready_for_fw is high
1,173,985 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,659 UART: [idev] Erasing UDS.KEYID = 0
1,197,957 UART: [idev] Sha1 KeyId Algorithm
1,206,749 UART: [idev] --
1,207,652 UART: [ldev] ++
1,207,820 UART: [ldev] CDI.KEYID = 6
1,208,184 UART: [ldev] SUBJECT.KEYID = 5
1,208,611 UART: [ldev] AUTHORITY.KEYID = 7
1,209,074 UART: [ldev] FE.KEYID = 1
1,214,070 UART: [ldev] Erasing FE.KEYID = 1
1,240,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,666 UART: [ldev] --
1,279,942 UART: [fwproc] Wait for Commands...
1,280,719 UART: [fwproc] Recv command 0x46574c44
1,281,452 UART: [fwproc] Recv'd Img size: 114332 bytes
3,113,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,141,785 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,171,094 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,306,794 >>> mbox cmd response: success
3,307,835 UART: [afmc] ++
3,308,003 UART: [afmc] CDI.KEYID = 6
3,308,366 UART: [afmc] SUBJECT.KEYID = 7
3,308,792 UART: [afmc] AUTHORITY.KEYID = 5
3,343,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,360,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,361,171 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,366,881 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,372,771 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,378,482 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,386,316 UART: [afmc] --
3,387,224 UART: [cold-reset] --
3,387,942 UART: [state] Locking Datavault
3,388,929 UART: [state] Locking PCR0, PCR1 and PCR31
3,389,533 UART: [state] Locking ICCM
3,390,067 UART: [exit] Launching FMC @ 0x40000130
3,395,396 UART:
3,395,412 UART: Running Caliptra FMC ...
3,395,820 UART:
3,395,874 UART: [state] CFI Enabled
3,406,792 UART: [fht] FMC Alias Private Key: 7
3,514,670 UART: [art] Extend RT PCRs Done
3,515,098 UART: [art] Lock RT PCRs Done
3,516,472 UART: [art] Populate DV Done
3,524,566 UART: [fht] FMC Alias Private Key: 7
3,525,498 UART: [art] Derive CDI
3,525,778 UART: [art] Store in in slot 0x4
3,611,477 UART: [art] Derive Key Pair
3,611,837 UART: [art] Store priv key in slot 0x5
3,624,557 UART: [art] Derive Key Pair - Done
3,639,520 UART: [art] Signing Cert with AUTHO
3,640,000 UART: RITY.KEYID = 7
3,654,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,655,493 UART: [art] PUB.X = C6934F6F323AFE8EDD5216D40BA0D1EE281B8C5AEF37E53B050288B94BD2D8C1F41D606FDEA5044FE9707B8009CBE5ED
3,662,268 UART: [art] PUB.Y = 3018443A1E83097D3811464D338158B7625194DAA01DD706D401EEAC160930FF5E097C7E111B3FA4494E3A7EA8CE8F7E
3,669,203 UART: [art] SIG.R = 8CE44FB3172EEFE82DED81F7FFAD7129E41AE229EF06284DF5E91B3F8F29D2177288E1D55AF1CC1241952B0729D53A92
3,675,979 UART: [art] SIG.S = FB9222247AC3403330E136E4CDAB02E4440E5C0599BDC9DD77A0BDF13C4D081C84C293C88C50EF69D52F54BEBFF261BD
3,699,614 UART: Caliptra RT
3,699,867 UART: [state] CFI Enabled
3,807,426 UART: [rt] RT listening for mailbox commands...
3,808,096 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,931,168 UART: [rt]cmd =0x41544d4e, len=14344
5,339,862 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,004 ready_for_fw is high
1,056,004 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,169,887 >>> mbox cmd response: success
3,232,100 UART:
3,232,116 UART: Running Caliptra FMC ...
3,232,524 UART:
3,232,578 UART: [state] CFI Enabled
3,243,082 UART: [fht] FMC Alias Private Key: 7
3,351,122 UART: [art] Extend RT PCRs Done
3,351,550 UART: [art] Lock RT PCRs Done
3,353,072 UART: [art] Populate DV Done
3,361,032 UART: [fht] FMC Alias Private Key: 7
3,362,208 UART: [art] Derive CDI
3,362,488 UART: [art] Store in in slot 0x4
3,447,999 UART: [art] Derive Key Pair
3,448,359 UART: [art] Store priv key in slot 0x5
3,460,805 UART: [art] Derive Key Pair - Done
3,475,435 UART: [art] Signing Cert with AUTHO
3,475,915 UART: RITY.KEYID = 7
3,491,351 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,116 UART: [art] PUB.X = A33A22CC57ED5D40B0344A1C949A49EB8AFD54CD82978C34250515B1E0B10574912E7211F074A9649097F87452D5549E
3,498,874 UART: [art] PUB.Y = A0D171DFD0E6A5A2B05C1801EEA060A32A5618F33C17B2EF44842D758A5BD9E9A06132309600ECD0514F3C43EB4AB3EF
3,505,811 UART: [art] SIG.R = D58E8BED3BA8D3B74AD4F09D6A6A95F40A64F359BB8CC8BDD4F5072E8780E713B19D1B0E8AEB67BBFC4B61034A97B82C
3,512,593 UART: [art] SIG.S = 97DCEE8E18DAA4ECD07935781110F5F39D7734F4A67A506525941DFCCAC0175740479AB621E68615CF9F8ECA422682D6
3,536,798 UART: Caliptra RT
3,537,051 UART: [state] CFI Enabled
3,644,640 UART: [rt] RT listening for mailbox commands...
3,645,310 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,546 UART: [rt]cmd =0x41544d4e, len=14344
5,166,836 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
891,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,608 UART: [kat] ++
895,760 UART: [kat] sha1
900,034 UART: [kat] SHA2-256
901,974 UART: [kat] SHA2-384
904,767 UART: [kat] SHA2-512-ACC
906,668 UART: [kat] ECC-384
916,613 UART: [kat] HMAC-384Kdf
921,211 UART: [kat] LMS
1,169,523 UART: [kat] --
1,170,478 UART: [cold-reset] ++
1,170,854 UART: [fht] FHT @ 0x50003400
1,173,494 UART: [idev] ++
1,173,662 UART: [idev] CDI.KEYID = 6
1,174,023 UART: [idev] SUBJECT.KEYID = 7
1,174,448 UART: [idev] UDS.KEYID = 0
1,174,794 ready_for_fw is high
1,174,794 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,556 UART: [idev] Erasing UDS.KEYID = 0
1,199,552 UART: [idev] Sha1 KeyId Algorithm
1,208,518 UART: [idev] --
1,209,479 UART: [ldev] ++
1,209,647 UART: [ldev] CDI.KEYID = 6
1,210,011 UART: [ldev] SUBJECT.KEYID = 5
1,210,438 UART: [ldev] AUTHORITY.KEYID = 7
1,210,901 UART: [ldev] FE.KEYID = 1
1,216,197 UART: [ldev] Erasing FE.KEYID = 1
1,242,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,401 UART: [ldev] --
1,281,783 UART: [fwproc] Wait for Commands...
1,282,604 UART: [fwproc] Recv command 0x46574c44
1,283,337 UART: [fwproc] Recv'd Img size: 114332 bytes
3,130,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,258 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,567 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,323,379 >>> mbox cmd response: success
3,324,534 UART: [afmc] ++
3,324,702 UART: [afmc] CDI.KEYID = 6
3,325,065 UART: [afmc] SUBJECT.KEYID = 7
3,325,491 UART: [afmc] AUTHORITY.KEYID = 5
3,361,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,403 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,154 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,864 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,754 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,465 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,253 UART: [afmc] --
3,404,281 UART: [cold-reset] --
3,405,095 UART: [state] Locking Datavault
3,406,282 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,886 UART: [state] Locking ICCM
3,407,424 UART: [exit] Launching FMC @ 0x40000130
3,412,753 UART:
3,412,769 UART: Running Caliptra FMC ...
3,413,177 UART:
3,413,320 UART: [state] CFI Enabled
3,424,042 UART: [fht] FMC Alias Private Key: 7
3,531,440 UART: [art] Extend RT PCRs Done
3,531,868 UART: [art] Lock RT PCRs Done
3,533,196 UART: [art] Populate DV Done
3,541,622 UART: [fht] FMC Alias Private Key: 7
3,542,598 UART: [art] Derive CDI
3,542,878 UART: [art] Store in in slot 0x4
3,628,805 UART: [art] Derive Key Pair
3,629,165 UART: [art] Store priv key in slot 0x5
3,642,459 UART: [art] Derive Key Pair - Done
3,657,308 UART: [art] Signing Cert with AUTHO
3,657,788 UART: RITY.KEYID = 7
3,673,096 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,861 UART: [art] PUB.X = B88BC26D8A4B90F07BFBF2D065046D745C7FB378DFF3025AD4FFB1D13D02AD9CC147B9A9508C64F80EF7D7AD09235CCA
3,680,638 UART: [art] PUB.Y = 9F7373C98BBFF6914A23F61396CDF857FA386F9FAB3C80F26FCD241590035279F00B7E3609B93BFA3DF8AE7964AB2AC4
3,687,591 UART: [art] SIG.R = EF99A98A3B737723A8554BC5DD16B972DD24419597E0CC534A1E985A345B88979414E3BD92F433B4A2BE4357389B2A33
3,694,359 UART: [art] SIG.S = 8B15523848C0F86FD3B4074BEE39635AF4A76684CE9D556B4CF3DFA410C4755FC1DE5BC71A18433B7E3D66E2DDB795C9
3,718,325 UART: Caliptra RT
3,718,670 UART: [state] CFI Enabled
3,826,919 UART: [rt] RT listening for mailbox commands...
3,827,589 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,541 UART: [rt]cmd =0x41544d4e, len=14344
5,346,644 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,891 ready_for_fw is high
1,056,891 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,172,425 >>> mbox cmd response: success
3,235,356 UART:
3,235,372 UART: Running Caliptra FMC ...
3,235,780 UART:
3,235,923 UART: [state] CFI Enabled
3,246,561 UART: [fht] FMC Alias Private Key: 7
3,354,933 UART: [art] Extend RT PCRs Done
3,355,361 UART: [art] Lock RT PCRs Done
3,357,069 UART: [art] Populate DV Done
3,365,647 UART: [fht] FMC Alias Private Key: 7
3,366,709 UART: [art] Derive CDI
3,366,989 UART: [art] Store in in slot 0x4
3,452,708 UART: [art] Derive Key Pair
3,453,068 UART: [art] Store priv key in slot 0x5
3,466,634 UART: [art] Derive Key Pair - Done
3,481,216 UART: [art] Signing Cert with AUTHO
3,481,696 UART: RITY.KEYID = 7
3,497,156 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,921 UART: [art] PUB.X = 035C8C04DCA62F2882AFDBC1E22C43B5D0A9736665969AE58D06B5F066FD30366EA45E51F8407CBE6DBFADB29294BE42
3,504,696 UART: [art] PUB.Y = E371880CF23FAC8F65E31297893011BC188181D3888D9ED52C60FFEFD99757BF90A52658BB083A31F990657CAFFF01DD
3,511,643 UART: [art] SIG.R = 8131B98FCD0197D9E6C47C87A5D2AD4A115554485768E0E75985E0F35A98F65F444AE733E757221BA1A0648BFFCE004C
3,518,390 UART: [art] SIG.S = EECCEA1B62821A1CA73EAEDBD04A92143DF8E1E4631D6642DD56DC808272408E7097CECE18AA3E02A78F7F56DCF8013D
3,542,155 UART: Caliptra RT
3,542,500 UART: [state] CFI Enabled
3,650,445 UART: [rt] RT listening for mailbox commands...
3,651,115 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,305 UART: [rt]cmd =0x41544d4e, len=14344
5,159,556 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,251 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,829 UART: [kat] SHA2-256
881,760 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,875 UART: [kat] ++
886,027 UART: [kat] sha1
890,333 UART: [kat] SHA2-256
892,271 UART: [kat] SHA2-384
895,056 UART: [kat] SHA2-512-ACC
896,957 UART: [kat] ECC-384
902,556 UART: [kat] HMAC-384Kdf
907,036 UART: [kat] LMS
1,475,232 UART: [kat] --
1,476,111 UART: [cold-reset] ++
1,476,613 UART: [fht] Storing FHT @ 0x50003400
1,479,388 UART: [idev] ++
1,479,556 UART: [idev] CDI.KEYID = 6
1,479,916 UART: [idev] SUBJECT.KEYID = 7
1,480,340 UART: [idev] UDS.KEYID = 0
1,480,685 ready_for_fw is high
1,480,685 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,816 UART: [idev] Erasing UDS.KEYID = 0
1,505,490 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,212 UART: [idev] --
1,515,115 UART: [ldev] ++
1,515,283 UART: [ldev] CDI.KEYID = 6
1,515,646 UART: [ldev] SUBJECT.KEYID = 5
1,516,072 UART: [ldev] AUTHORITY.KEYID = 7
1,516,535 UART: [ldev] FE.KEYID = 1
1,521,371 UART: [ldev] Erasing FE.KEYID = 1
1,546,476 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,402 UART: [ldev] --
1,585,681 UART: [fwproc] Waiting for Commands...
1,586,494 UART: [fwproc] Received command 0x46574c44
1,587,285 UART: [fwproc] Received Image of size 114332 bytes
5,196,972 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,225,866 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,255,218 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,390,999 >>> mbox cmd response: success
5,392,017 UART: [afmc] ++
5,392,185 UART: [afmc] CDI.KEYID = 6
5,392,547 UART: [afmc] SUBJECT.KEYID = 7
5,392,972 UART: [afmc] AUTHORITY.KEYID = 5
5,427,676 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,444,266 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,445,046 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,450,755 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,456,647 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,462,348 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,470,210 UART: [afmc] --
5,471,096 UART: [cold-reset] --
5,472,008 UART: [state] Locking Datavault
5,473,225 UART: [state] Locking PCR0, PCR1 and PCR31
5,473,829 UART: [state] Locking ICCM
5,474,341 UART: [exit] Launching FMC @ 0x40000130
5,479,670 UART:
5,479,686 UART: Running Caliptra FMC ...
5,480,094 UART:
5,480,148 UART: [state] CFI Enabled
5,490,832 UART: [fht] FMC Alias Private Key: 7
5,598,176 UART: [art] Extend RT PCRs Done
5,598,604 UART: [art] Lock RT PCRs Done
5,600,258 UART: [art] Populate DV Done
5,608,502 UART: [fht] FMC Alias Private Key: 7
5,609,666 UART: [art] Derive CDI
5,609,946 UART: [art] Store in in slot 0x4
5,695,431 UART: [art] Derive Key Pair
5,695,791 UART: [art] Store priv key in slot 0x5
5,708,813 UART: [art] Derive Key Pair - Done
5,723,595 UART: [art] Signing Cert with AUTHO
5,724,075 UART: RITY.KEYID = 7
5,739,099 UART: [art] Erasing AUTHORITY.KEYID = 7
5,739,864 UART: [art] PUB.X = DE15AB21F98390FA430063631D320E8FB6CF48BCC82A99F5CF48E3BB7DF793535443939803D0FE0718C567FE4F434402
5,746,602 UART: [art] PUB.Y = D146A25FC0BAC1A4295FC55082F5312B4603CDD9953B8E9B12CD9778A1A6884C3F0F04222E77371A17BDD190511E724D
5,753,545 UART: [art] SIG.R = 5B2D3B6FB55A31037D3FB8D4386893679A312158DF803AC49DA5043B0AD50D2A94FA4E18622C52F8B67C8677B28EE6AA
5,760,309 UART: [art] SIG.S = 94E7613BC6B9319D5F5DA92131DFDDF43DF3FA411ED46553360BA82830FABAB7C0A9A26D151A7EC95E9A119C48FFD21C
5,784,493 UART: Caliptra RT
5,784,746 UART: [state] CFI Enabled
5,893,709 UART: [rt] RT listening for mailbox commands...
5,894,379 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,017,381 UART: [rt]cmd =0x41544d4e, len=14344
7,140,221 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,149 ready_for_fw is high
1,362,149 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,202,038 >>> mbox cmd response: success
5,262,869 UART:
5,262,885 UART: Running Caliptra FMC ...
5,263,293 UART:
5,263,347 UART: [state] CFI Enabled
5,273,747 UART: [fht] FMC Alias Private Key: 7
5,382,247 UART: [art] Extend RT PCRs Done
5,382,675 UART: [art] Lock RT PCRs Done
5,384,189 UART: [art] Populate DV Done
5,392,449 UART: [fht] FMC Alias Private Key: 7
5,393,411 UART: [art] Derive CDI
5,393,691 UART: [art] Store in in slot 0x4
5,479,406 UART: [art] Derive Key Pair
5,479,766 UART: [art] Store priv key in slot 0x5
5,492,950 UART: [art] Derive Key Pair - Done
5,507,805 UART: [art] Signing Cert with AUTHO
5,508,285 UART: RITY.KEYID = 7
5,523,753 UART: [art] Erasing AUTHORITY.KEYID = 7
5,524,518 UART: [art] PUB.X = 59151FF29355AB83D7F5BBD76BC00572E6DD046066DC80567EF07F775212D9409939FB5C1A897A75E25D1F4DDB0F5515
5,531,281 UART: [art] PUB.Y = 2AD21F3DE7AB5AA108B6E19F8FBF4805E37627E5C6D432A315DFB5AFA6021461AAA93D10CC609C8A42FD73D6126C4E92
5,538,238 UART: [art] SIG.R = 226FDC07FB753A6774E047716FD370B833CE7180405FCDE5D03DF6981C659F623A574517D5EB3D740D084AC1720357F6
5,544,994 UART: [art] SIG.S = 669A331EA8CA9E21E0A700DBE373BB9F84B0211282964F18BB234696847095753D52737B3ABA2C01A7532733DDEB14B8
5,568,256 UART: Caliptra RT
5,568,509 UART: [state] CFI Enabled
5,675,721 UART: [rt] RT listening for mailbox commands...
5,676,391 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,799,521 UART: [rt]cmd =0x41544d4e, len=14344
6,929,598 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,732 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,408 UART: [kat] SHA2-256
882,339 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,454 UART: [kat] ++
886,606 UART: [kat] sha1
890,956 UART: [kat] SHA2-256
892,894 UART: [kat] SHA2-384
895,507 UART: [kat] SHA2-512-ACC
897,408 UART: [kat] ECC-384
902,965 UART: [kat] HMAC-384Kdf
907,675 UART: [kat] LMS
1,475,871 UART: [kat] --
1,476,600 UART: [cold-reset] ++
1,477,100 UART: [fht] Storing FHT @ 0x50003400
1,479,879 UART: [idev] ++
1,480,047 UART: [idev] CDI.KEYID = 6
1,480,407 UART: [idev] SUBJECT.KEYID = 7
1,480,831 UART: [idev] UDS.KEYID = 0
1,481,176 ready_for_fw is high
1,481,176 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,641 UART: [idev] Erasing UDS.KEYID = 0
1,505,245 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,741 UART: [idev] --
1,514,604 UART: [ldev] ++
1,514,772 UART: [ldev] CDI.KEYID = 6
1,515,135 UART: [ldev] SUBJECT.KEYID = 5
1,515,561 UART: [ldev] AUTHORITY.KEYID = 7
1,516,024 UART: [ldev] FE.KEYID = 1
1,521,058 UART: [ldev] Erasing FE.KEYID = 1
1,545,997 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,289 UART: [ldev] --
1,585,718 UART: [fwproc] Waiting for Commands...
1,586,547 UART: [fwproc] Received command 0x46574c44
1,587,338 UART: [fwproc] Received Image of size 114332 bytes
5,045,077 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,072,611 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,101,963 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,237,910 >>> mbox cmd response: success
5,238,928 UART: [afmc] ++
5,239,096 UART: [afmc] CDI.KEYID = 6
5,239,458 UART: [afmc] SUBJECT.KEYID = 7
5,239,883 UART: [afmc] AUTHORITY.KEYID = 5
5,274,727 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,291,085 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,291,865 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,297,574 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,303,466 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,309,167 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,316,997 UART: [afmc] --
5,317,885 UART: [cold-reset] --
5,318,859 UART: [state] Locking Datavault
5,319,986 UART: [state] Locking PCR0, PCR1 and PCR31
5,320,590 UART: [state] Locking ICCM
5,321,216 UART: [exit] Launching FMC @ 0x40000130
5,326,545 UART:
5,326,561 UART: Running Caliptra FMC ...
5,326,969 UART:
5,327,112 UART: [state] CFI Enabled
5,338,110 UART: [fht] FMC Alias Private Key: 7
5,446,086 UART: [art] Extend RT PCRs Done
5,446,514 UART: [art] Lock RT PCRs Done
5,447,826 UART: [art] Populate DV Done
5,456,268 UART: [fht] FMC Alias Private Key: 7
5,457,302 UART: [art] Derive CDI
5,457,582 UART: [art] Store in in slot 0x4
5,543,097 UART: [art] Derive Key Pair
5,543,457 UART: [art] Store priv key in slot 0x5
5,556,953 UART: [art] Derive Key Pair - Done
5,571,953 UART: [art] Signing Cert with AUTHO
5,572,433 UART: RITY.KEYID = 7
5,587,613 UART: [art] Erasing AUTHORITY.KEYID = 7
5,588,378 UART: [art] PUB.X = 420CE84EFC09DB67929AA748E874A79031407F679AAAA588A92E153D22C5E9792399C0A84BEA5622359233570F8A7C71
5,595,135 UART: [art] PUB.Y = 728D3E03F3F8DF11A86A0378620C92B8EE7EA5144F178AD24A28E7A76088717AC3FFEC218053970F81782C6A0061A025
5,602,049 UART: [art] SIG.R = 20DF4748C88B06F714EB31B1375248374ED0DFE6D7AFD87391A7B1A0F9F127EC335EA5855C92D34D16A036A1EA89A7C0
5,608,824 UART: [art] SIG.S = 691B22B5C6A2DBC15740E8211A76A1BB07BFAFAF0F646F22897EE760A93C91DD845378942B024841B442DFB4DC6E33C0
5,632,772 UART: Caliptra RT
5,633,117 UART: [state] CFI Enabled
5,742,459 UART: [rt] RT listening for mailbox commands...
5,743,129 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,865,855 UART: [rt]cmd =0x41544d4e, len=14344
6,991,510 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,774 ready_for_fw is high
1,363,774 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,127,415 >>> mbox cmd response: success
5,188,744 UART:
5,188,760 UART: Running Caliptra FMC ...
5,189,168 UART:
5,189,311 UART: [state] CFI Enabled
5,200,131 UART: [fht] FMC Alias Private Key: 7
5,308,469 UART: [art] Extend RT PCRs Done
5,308,897 UART: [art] Lock RT PCRs Done
5,310,421 UART: [art] Populate DV Done
5,318,527 UART: [fht] FMC Alias Private Key: 7
5,319,695 UART: [art] Derive CDI
5,319,975 UART: [art] Store in in slot 0x4
5,405,358 UART: [art] Derive Key Pair
5,405,718 UART: [art] Store priv key in slot 0x5
5,418,618 UART: [art] Derive Key Pair - Done
5,433,578 UART: [art] Signing Cert with AUTHO
5,434,058 UART: RITY.KEYID = 7
5,449,338 UART: [art] Erasing AUTHORITY.KEYID = 7
5,450,103 UART: [art] PUB.X = 31ECEC0A0F66A427A9BB2F8CE66E38A9340B9A631BFF45BBF1CD0B30BBFE43516E51F17195379FCBC9B1F0B7326A35EB
5,456,883 UART: [art] PUB.Y = A02F0486ED5F23902ABF4BF6D0F133EBDEE00C1CAB91E4B5CBDDEAD6F6892C0B4EA0AAE83A74235F5A98E1BCAF941A51
5,463,856 UART: [art] SIG.R = 2DA3627A0F3E1CB860A225ABB4807335717C0A318979A1D0B905F9073AB76AB352B865984CB5F227DA7EE750BB625D1A
5,470,618 UART: [art] SIG.S = 982CE8B0B0BA11F246300CB49D257CA3805941926F46DE14BED3E51620DCB366965D03C6AB72F2D4019F906128E28958
5,494,286 UART: Caliptra RT
5,494,631 UART: [state] CFI Enabled
5,602,338 UART: [rt] RT listening for mailbox commands...
5,603,008 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,725,890 UART: [rt]cmd =0x41544d4e, len=14344
6,858,096 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,455 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
893,424 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,549 UART: [kat] ++
897,701 UART: [kat] sha1
902,027 UART: [kat] SHA2-256
903,967 UART: [kat] SHA2-384
906,640 UART: [kat] SHA2-512-ACC
908,541 UART: [kat] ECC-384
918,698 UART: [kat] HMAC-384Kdf
923,326 UART: [kat] LMS
1,171,654 UART: [kat] --
1,172,699 UART: [cold-reset] ++
1,173,225 UART: [fht] FHT @ 0x50003400
1,175,952 UART: [idev] ++
1,176,120 UART: [idev] CDI.KEYID = 6
1,176,480 UART: [idev] SUBJECT.KEYID = 7
1,176,904 UART: [idev] UDS.KEYID = 0
1,177,249 ready_for_fw is high
1,177,249 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,826 UART: [idev] Erasing UDS.KEYID = 0
1,202,145 UART: [idev] Sha1 KeyId Algorithm
1,210,497 UART: [idev] --
1,211,513 UART: [ldev] ++
1,211,681 UART: [ldev] CDI.KEYID = 6
1,212,044 UART: [ldev] SUBJECT.KEYID = 5
1,212,470 UART: [ldev] AUTHORITY.KEYID = 7
1,212,933 UART: [ldev] FE.KEYID = 1
1,218,113 UART: [ldev] Erasing FE.KEYID = 1
1,244,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,237 UART: [ldev] --
1,283,592 UART: [fwproc] Wait for Commands...
1,284,322 UART: [fwproc] Recv command 0x46574c44
1,285,050 UART: [fwproc] Recv'd Img size: 114332 bytes
3,127,897 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,428 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,320,371 >>> mbox cmd response: success
3,321,463 UART: [afmc] ++
3,321,631 UART: [afmc] CDI.KEYID = 6
3,321,993 UART: [afmc] SUBJECT.KEYID = 7
3,322,418 UART: [afmc] AUTHORITY.KEYID = 5
3,358,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,245 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,993 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,702 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,594 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,305 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,190 UART: [afmc] --
3,402,214 UART: [cold-reset] --
3,402,892 UART: [state] Locking Datavault
3,404,271 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,875 UART: [state] Locking ICCM
3,405,329 UART: [exit] Launching FMC @ 0x40000130
3,410,658 UART:
3,410,674 UART: Running Caliptra FMC ...
3,411,082 UART:
3,411,136 UART: [state] CFI Enabled
3,421,832 UART: [fht] FMC Alias Private Key: 7
3,529,954 UART: [art] Extend RT PCRs Done
3,530,382 UART: [art] Lock RT PCRs Done
3,531,812 UART: [art] Populate DV Done
3,540,068 UART: [fht] FMC Alias Private Key: 7
3,541,110 UART: [art] Derive CDI
3,541,390 UART: [art] Store in in slot 0x4
3,626,663 UART: [art] Derive Key Pair
3,627,023 UART: [art] Store priv key in slot 0x5
3,640,199 UART: [art] Derive Key Pair - Done
3,654,850 UART: [art] Signing Cert with AUTHO
3,655,330 UART: RITY.KEYID = 7
3,670,780 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,545 UART: [art] PUB.X = E705FDB2BCF000623E28C43F95C90F25107267CB6F67F6D94D65078AB98B0BE0FB81945C03D1E57C9916E5C92D6C63BE
3,678,286 UART: [art] PUB.Y = AF1FA5FE5B83C7FE0617558D336E1699FA64E26CA579515F65C7354F4FAAB491E6534E28E20F0A8375D7109140BB10DB
3,685,233 UART: [art] SIG.R = 4925C747722BF72EBCF106FD72EA6E260F2AECAD175D90DA0177D56171B6061BF585F518ED234A7401C727C020770140
3,691,985 UART: [art] SIG.S = DE6DAD14E15E951D4421C23B99A02A303028EFA3BA45C34603ED7B276AD482668A875814D36FF390F366F3C00A3F69D9
3,715,596 UART: Caliptra RT
3,715,849 UART: [state] CFI Enabled
3,823,881 UART: [rt] RT listening for mailbox commands...
3,824,551 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,553 UART: [rt]cmd =0x41544d4e, len=14344
5,077,262 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,353 ready_for_fw is high
1,059,353 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,165,482 >>> mbox cmd response: success
3,227,711 UART:
3,227,727 UART: Running Caliptra FMC ...
3,228,135 UART:
3,228,189 UART: [state] CFI Enabled
3,238,929 UART: [fht] FMC Alias Private Key: 7
3,346,601 UART: [art] Extend RT PCRs Done
3,347,029 UART: [art] Lock RT PCRs Done
3,348,327 UART: [art] Populate DV Done
3,356,513 UART: [fht] FMC Alias Private Key: 7
3,357,625 UART: [art] Derive CDI
3,357,905 UART: [art] Store in in slot 0x4
3,443,370 UART: [art] Derive Key Pair
3,443,730 UART: [art] Store priv key in slot 0x5
3,457,068 UART: [art] Derive Key Pair - Done
3,471,812 UART: [art] Signing Cert with AUTHO
3,472,292 UART: RITY.KEYID = 7
3,487,384 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,149 UART: [art] PUB.X = 5DE0E41365B56B0E7D3EB0931690A0F74BE507B1111A0D76C987759D1960A0E0EA3DDFCF9E4DA81B7D522A9A5C9550C1
3,494,920 UART: [art] PUB.Y = 6C09667FF04904E456AF06F4A7D0C2C286D3D5288633F3B0145F3353F03ED6E2ED94C8D007513F91553F17F731A031DA
3,501,856 UART: [art] SIG.R = 96310BCC3530FA642BBDC98628E703EDE4BEA9D688DF3AF9EEA23DF0B20C64D3107C914A6C3E2C5FBD13D89B3221AEEF
3,508,641 UART: [art] SIG.S = 299A1CD98567092E635056700F1A6BCA124EF8E38E5263312269F024AF49CC74EC9552A9EBD33251EEEB55336CF3D90C
3,532,567 UART: Caliptra RT
3,532,820 UART: [state] CFI Enabled
3,640,322 UART: [rt] RT listening for mailbox commands...
3,640,992 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,106 UART: [rt]cmd =0x41544d4e, len=14344
4,904,133 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,846 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
893,737 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,862 UART: [kat] ++
898,014 UART: [kat] sha1
902,172 UART: [kat] SHA2-256
904,112 UART: [kat] SHA2-384
906,733 UART: [kat] SHA2-512-ACC
908,634 UART: [kat] ECC-384
918,161 UART: [kat] HMAC-384Kdf
922,885 UART: [kat] LMS
1,171,213 UART: [kat] --
1,172,206 UART: [cold-reset] ++
1,172,782 UART: [fht] FHT @ 0x50003400
1,175,301 UART: [idev] ++
1,175,469 UART: [idev] CDI.KEYID = 6
1,175,829 UART: [idev] SUBJECT.KEYID = 7
1,176,253 UART: [idev] UDS.KEYID = 0
1,176,598 ready_for_fw is high
1,176,598 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,505 UART: [idev] Erasing UDS.KEYID = 0
1,201,410 UART: [idev] Sha1 KeyId Algorithm
1,209,874 UART: [idev] --
1,210,836 UART: [ldev] ++
1,211,004 UART: [ldev] CDI.KEYID = 6
1,211,367 UART: [ldev] SUBJECT.KEYID = 5
1,211,793 UART: [ldev] AUTHORITY.KEYID = 7
1,212,256 UART: [ldev] FE.KEYID = 1
1,217,572 UART: [ldev] Erasing FE.KEYID = 1
1,243,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,530 UART: [ldev] --
1,282,859 UART: [fwproc] Wait for Commands...
1,283,433 UART: [fwproc] Recv command 0x46574c44
1,284,161 UART: [fwproc] Recv'd Img size: 114332 bytes
3,132,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,952 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,189,256 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,325,067 >>> mbox cmd response: success
3,326,095 UART: [afmc] ++
3,326,263 UART: [afmc] CDI.KEYID = 6
3,326,625 UART: [afmc] SUBJECT.KEYID = 7
3,327,050 UART: [afmc] AUTHORITY.KEYID = 5
3,362,980 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,405 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,153 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,385,862 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,391,754 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,397,465 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,405,326 UART: [afmc] --
3,406,378 UART: [cold-reset] --
3,407,090 UART: [state] Locking Datavault
3,408,405 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,009 UART: [state] Locking ICCM
3,409,565 UART: [exit] Launching FMC @ 0x40000130
3,414,894 UART:
3,414,910 UART: Running Caliptra FMC ...
3,415,318 UART:
3,415,461 UART: [state] CFI Enabled
3,425,833 UART: [fht] FMC Alias Private Key: 7
3,533,435 UART: [art] Extend RT PCRs Done
3,533,863 UART: [art] Lock RT PCRs Done
3,535,197 UART: [art] Populate DV Done
3,543,203 UART: [fht] FMC Alias Private Key: 7
3,544,265 UART: [art] Derive CDI
3,544,545 UART: [art] Store in in slot 0x4
3,629,744 UART: [art] Derive Key Pair
3,630,104 UART: [art] Store priv key in slot 0x5
3,643,190 UART: [art] Derive Key Pair - Done
3,657,695 UART: [art] Signing Cert with AUTHO
3,658,175 UART: RITY.KEYID = 7
3,673,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,574 UART: [art] PUB.X = 845D49EFD56A55D868EFDF96E5FF4271B18420AD04BFAB8555DE173F6CAC5535622FFEC4CD17FF28E7F0D3C6137C2682
3,681,357 UART: [art] PUB.Y = 72C2DE482866E907C919845BA821963FA4158F6D4A8C9BC4B6629130BEAC1AE22F81576A1AD454109D36BB31CD063B44
3,688,303 UART: [art] SIG.R = 49E7A63F2A3A0B3AC715227C977F1A72BB9C31540FE131342AAC5DDF5789EA0858CB973079AE0168A85748C4E44AA573
3,695,065 UART: [art] SIG.S = AE0674E4A3C45588BBC1168597E7A35359F7E91063FDD83EC799B84AB7F20B0C88FFB7FB66FC86543832D63812701CD5
3,718,575 UART: Caliptra RT
3,718,920 UART: [state] CFI Enabled
3,826,394 UART: [rt] RT listening for mailbox commands...
3,827,064 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,930 UART: [rt]cmd =0x41544d4e, len=14344
5,075,403 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,788 ready_for_fw is high
1,060,788 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,165,279 >>> mbox cmd response: success
3,227,326 UART:
3,227,342 UART: Running Caliptra FMC ...
3,227,750 UART:
3,227,893 UART: [state] CFI Enabled
3,238,701 UART: [fht] FMC Alias Private Key: 7
3,346,157 UART: [art] Extend RT PCRs Done
3,346,585 UART: [art] Lock RT PCRs Done
3,348,283 UART: [art] Populate DV Done
3,356,363 UART: [fht] FMC Alias Private Key: 7
3,357,447 UART: [art] Derive CDI
3,357,727 UART: [art] Store in in slot 0x4
3,443,500 UART: [art] Derive Key Pair
3,443,860 UART: [art] Store priv key in slot 0x5
3,457,844 UART: [art] Derive Key Pair - Done
3,472,388 UART: [art] Signing Cert with AUTHO
3,472,868 UART: RITY.KEYID = 7
3,487,852 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,617 UART: [art] PUB.X = E7492A04A85B863BB3D94C21690CC0B11981CB4465EE81DDF090D5E2F39F0DE57BF21095713F332C7389743294290BE0
3,495,373 UART: [art] PUB.Y = 49D12F94EF5A09E789D409E59AEA41D54A2724D53C80DAF7C1CD1B5DC7B64B585111D73644A2FC0397603247B717967A
3,502,316 UART: [art] SIG.R = E3A589899650475437436FD87C7757549B3B9037296B6AD82D6BBF0CA2348CB0F8207AB1E6C9B2B0DA3F721DD249CA53
3,509,085 UART: [art] SIG.S = 1DEDA11D3AC936AC583346943DB8AE796464705B463985E230BE1ABEB9A28AF52331BF0E1E4944E3D42F8D247E986EF4
3,533,123 UART: Caliptra RT
3,533,468 UART: [state] CFI Enabled
3,641,508 UART: [rt] RT listening for mailbox commands...
3,642,178 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,428 UART: [rt]cmd =0x41544d4e, len=14344
4,890,303 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,115 UART: [state] WD Timer not started. Device not locked for debugging
87,360 UART: [kat] SHA2-256
890,910 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,039 UART: [kat] ++
895,191 UART: [kat] sha1
899,315 UART: [kat] SHA2-256
901,255 UART: [kat] SHA2-384
903,910 UART: [kat] SHA2-512-ACC
905,811 UART: [kat] ECC-384
915,156 UART: [kat] HMAC-384Kdf
919,908 UART: [kat] LMS
1,168,220 UART: [kat] --
1,168,855 UART: [cold-reset] ++
1,169,377 UART: [fht] FHT @ 0x50003400
1,172,081 UART: [idev] ++
1,172,249 UART: [idev] CDI.KEYID = 6
1,172,610 UART: [idev] SUBJECT.KEYID = 7
1,173,035 UART: [idev] UDS.KEYID = 0
1,173,381 ready_for_fw is high
1,173,381 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,169 UART: [idev] Erasing UDS.KEYID = 0
1,198,349 UART: [idev] Sha1 KeyId Algorithm
1,207,243 UART: [idev] --
1,208,238 UART: [ldev] ++
1,208,406 UART: [ldev] CDI.KEYID = 6
1,208,770 UART: [ldev] SUBJECT.KEYID = 5
1,209,197 UART: [ldev] AUTHORITY.KEYID = 7
1,209,660 UART: [ldev] FE.KEYID = 1
1,214,696 UART: [ldev] Erasing FE.KEYID = 1
1,241,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,356 UART: [ldev] --
1,280,698 UART: [fwproc] Wait for Commands...
1,281,497 UART: [fwproc] Recv command 0x46574c44
1,282,230 UART: [fwproc] Recv'd Img size: 114332 bytes
3,127,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,844 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,153 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,319,931 >>> mbox cmd response: success
3,321,114 UART: [afmc] ++
3,321,282 UART: [afmc] CDI.KEYID = 6
3,321,645 UART: [afmc] SUBJECT.KEYID = 7
3,322,071 UART: [afmc] AUTHORITY.KEYID = 5
3,358,067 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,505 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,256 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,966 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,856 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,567 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,505 UART: [afmc] --
3,401,559 UART: [cold-reset] --
3,402,387 UART: [state] Locking Datavault
3,403,362 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,966 UART: [state] Locking ICCM
3,404,474 UART: [exit] Launching FMC @ 0x40000130
3,409,803 UART:
3,409,819 UART: Running Caliptra FMC ...
3,410,227 UART:
3,410,281 UART: [state] CFI Enabled
3,421,025 UART: [fht] FMC Alias Private Key: 7
3,529,385 UART: [art] Extend RT PCRs Done
3,529,813 UART: [art] Lock RT PCRs Done
3,531,527 UART: [art] Populate DV Done
3,539,863 UART: [fht] FMC Alias Private Key: 7
3,540,823 UART: [art] Derive CDI
3,541,103 UART: [art] Store in in slot 0x4
3,627,074 UART: [art] Derive Key Pair
3,627,434 UART: [art] Store priv key in slot 0x5
3,640,560 UART: [art] Derive Key Pair - Done
3,655,512 UART: [art] Signing Cert with AUTHO
3,655,992 UART: RITY.KEYID = 7
3,671,174 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,939 UART: [art] PUB.X = 5AC12E4AE164AF2B26B6DD4F7B9D35BD163B2E1CD07B8295D1A4316A3579FA165DB100F0B297ADED5FCF47DEAAC80805
3,678,703 UART: [art] PUB.Y = 4DF2883CF258466E7A03DC25CB87F01775317B53E783327786D5C647C288A5A1DCB807791BB4AAE6466B7CCC2D053E83
3,685,646 UART: [art] SIG.R = 2DC6CAFA76EC6BE650B73C50E5160AA009EB045A48B2EEAB330D5BC2E82C6D9B17955DFCFF5AC5EAD243DB6E12418A5A
3,692,432 UART: [art] SIG.S = 4EB2F9B567FF243A3BB4D30FB362629CEF919F5BDAD40C68F9BB35E60E541793CADF08E7B28872CDEB0035A5237852A3
3,716,393 UART: Caliptra RT
3,716,646 UART: [state] CFI Enabled
3,824,099 UART: [rt] RT listening for mailbox commands...
3,824,769 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,891 UART: [rt]cmd =0x41544d4e, len=14344
5,060,431 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,758 ready_for_fw is high
1,055,758 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,167,346 >>> mbox cmd response: success
3,229,355 UART:
3,229,371 UART: Running Caliptra FMC ...
3,229,779 UART:
3,229,833 UART: [state] CFI Enabled
3,240,415 UART: [fht] FMC Alias Private Key: 7
3,347,985 UART: [art] Extend RT PCRs Done
3,348,413 UART: [art] Lock RT PCRs Done
3,349,801 UART: [art] Populate DV Done
3,357,695 UART: [fht] FMC Alias Private Key: 7
3,358,693 UART: [art] Derive CDI
3,358,973 UART: [art] Store in in slot 0x4
3,444,654 UART: [art] Derive Key Pair
3,445,014 UART: [art] Store priv key in slot 0x5
3,458,844 UART: [art] Derive Key Pair - Done
3,473,350 UART: [art] Signing Cert with AUTHO
3,473,830 UART: RITY.KEYID = 7
3,488,986 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,751 UART: [art] PUB.X = 7E57205635427223388891735BB83BE05C37F0D5DE8F898C961C5D120A953611D103113C81655E8AAA5A0F4B7BF07A17
3,496,504 UART: [art] PUB.Y = E308DAA2974251FD075B9A9BD495FD9A03F9A627DFD99C1C56109352351558BF90E659FF7942D42961D91BBDC84088BA
3,503,449 UART: [art] SIG.R = 2BEDEBCA27977066E71D05617F255076D1AB7642E98647C395DD7EB9F2779B50656367269EDAC41C5E3B280841D7CAEF
3,510,217 UART: [art] SIG.S = 1C72C7E0C27F7FDBBB501698B6E8F892A62929984FB85259960F833F94FD75CA506FD6030C6296DF79D27E1D1240FAEB
3,534,145 UART: Caliptra RT
3,534,398 UART: [state] CFI Enabled
3,642,349 UART: [rt] RT listening for mailbox commands...
3,643,019 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,049 UART: [rt]cmd =0x41544d4e, len=14344
4,898,839 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
891,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,578 UART: [kat] ++
895,730 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,553 UART: [kat] SHA2-512-ACC
906,454 UART: [kat] ECC-384
916,531 UART: [kat] HMAC-384Kdf
921,103 UART: [kat] LMS
1,169,415 UART: [kat] --
1,170,316 UART: [cold-reset] ++
1,170,816 UART: [fht] FHT @ 0x50003400
1,173,476 UART: [idev] ++
1,173,644 UART: [idev] CDI.KEYID = 6
1,174,005 UART: [idev] SUBJECT.KEYID = 7
1,174,430 UART: [idev] UDS.KEYID = 0
1,174,776 ready_for_fw is high
1,174,776 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,536 UART: [idev] Erasing UDS.KEYID = 0
1,199,132 UART: [idev] Sha1 KeyId Algorithm
1,208,166 UART: [idev] --
1,209,133 UART: [ldev] ++
1,209,301 UART: [ldev] CDI.KEYID = 6
1,209,665 UART: [ldev] SUBJECT.KEYID = 5
1,210,092 UART: [ldev] AUTHORITY.KEYID = 7
1,210,555 UART: [ldev] FE.KEYID = 1
1,215,847 UART: [ldev] Erasing FE.KEYID = 1
1,242,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,433 UART: [ldev] --
1,281,931 UART: [fwproc] Wait for Commands...
1,282,522 UART: [fwproc] Recv command 0x46574c44
1,283,255 UART: [fwproc] Recv'd Img size: 114332 bytes
3,127,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,379 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,688 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,320,386 >>> mbox cmd response: success
3,321,551 UART: [afmc] ++
3,321,719 UART: [afmc] CDI.KEYID = 6
3,322,082 UART: [afmc] SUBJECT.KEYID = 7
3,322,508 UART: [afmc] AUTHORITY.KEYID = 5
3,357,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,114 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,865 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,575 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,465 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,176 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,956 UART: [afmc] --
3,400,962 UART: [cold-reset] --
3,401,998 UART: [state] Locking Datavault
3,403,291 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,895 UART: [state] Locking ICCM
3,404,389 UART: [exit] Launching FMC @ 0x40000130
3,409,718 UART:
3,409,734 UART: Running Caliptra FMC ...
3,410,142 UART:
3,410,285 UART: [state] CFI Enabled
3,420,945 UART: [fht] FMC Alias Private Key: 7
3,529,205 UART: [art] Extend RT PCRs Done
3,529,633 UART: [art] Lock RT PCRs Done
3,531,169 UART: [art] Populate DV Done
3,539,337 UART: [fht] FMC Alias Private Key: 7
3,540,415 UART: [art] Derive CDI
3,540,695 UART: [art] Store in in slot 0x4
3,626,630 UART: [art] Derive Key Pair
3,626,990 UART: [art] Store priv key in slot 0x5
3,640,210 UART: [art] Derive Key Pair - Done
3,654,740 UART: [art] Signing Cert with AUTHO
3,655,220 UART: RITY.KEYID = 7
3,670,306 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,071 UART: [art] PUB.X = 835CD8FD9C8217DAABBEE8E694DE3F9B44B13028DAA9282B0E25EB2622A0C7F88E9A8D9CCD8C63EDE2D8364D87B42490
3,677,858 UART: [art] PUB.Y = 97AE34C19BB9F5CE69B8F1D11501619E46E4DB95D0AD521F5B95571F0BFAE3BB2B0490C918CFAFBB6B24D0D760FEE311
3,684,819 UART: [art] SIG.R = 954DC84C4D0C9EEF46B68BC75C73312C2C477CF664B1C2932842BDDD98D3BDBDE71563EFBF542A5E38AC26CBC1343EC2
3,691,606 UART: [art] SIG.S = 27B17E0E5A8A90A0AA3DB12FFF904DA9AD156A2F863E92391102512E25B7B0C245C102213EAD163486DE1CBD9FA870C6
3,715,406 UART: Caliptra RT
3,715,751 UART: [state] CFI Enabled
3,824,115 UART: [rt] RT listening for mailbox commands...
3,824,785 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,923 UART: [rt]cmd =0x41544d4e, len=14344
5,063,112 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,835 ready_for_fw is high
1,056,835 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,172,306 >>> mbox cmd response: success
3,234,457 UART:
3,234,473 UART: Running Caliptra FMC ...
3,234,881 UART:
3,235,024 UART: [state] CFI Enabled
3,245,558 UART: [fht] FMC Alias Private Key: 7
3,352,724 UART: [art] Extend RT PCRs Done
3,353,152 UART: [art] Lock RT PCRs Done
3,354,832 UART: [art] Populate DV Done
3,362,806 UART: [fht] FMC Alias Private Key: 7
3,363,740 UART: [art] Derive CDI
3,364,020 UART: [art] Store in in slot 0x4
3,449,967 UART: [art] Derive Key Pair
3,450,327 UART: [art] Store priv key in slot 0x5
3,463,645 UART: [art] Derive Key Pair - Done
3,478,153 UART: [art] Signing Cert with AUTHO
3,478,633 UART: RITY.KEYID = 7
3,494,029 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,794 UART: [art] PUB.X = 3376AB22E18F30ADD1FAE99BDA4787A94ED1C71905A7C7B07D04D712FFD0639936779EA8C3FCA5B9FD76241E7BEAF856
3,501,574 UART: [art] PUB.Y = 9A07FD8CBA21940C7901E583D43E7B2EC2F024354598207A0BFCA7133A651CCC8BAB92F87386A3487C221312243ACD4E
3,508,516 UART: [art] SIG.R = 8603032B66EA6AAEF782EBB0A0BD0D9B81D3AA7F4D7773B0E135D151906646FAFFD39F745B54A449CD4472C92CA82F12
3,515,289 UART: [art] SIG.S = A2E20C3959EF01E2AA688008E913CCED307CDE6B9B15F310DB933DD3B357D5B3A31D14D297D1B716A0CDE89625CA7E33
3,539,295 UART: Caliptra RT
3,539,640 UART: [state] CFI Enabled
3,646,679 UART: [rt] RT listening for mailbox commands...
3,647,349 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,491 UART: [rt]cmd =0x41544d4e, len=14344
4,910,510 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,375 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,033 UART: [kat] SHA2-256
881,964 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,079 UART: [kat] ++
886,231 UART: [kat] sha1
890,509 UART: [kat] SHA2-256
892,447 UART: [kat] SHA2-384
895,126 UART: [kat] SHA2-512-ACC
897,027 UART: [kat] ECC-384
902,648 UART: [kat] HMAC-384Kdf
907,108 UART: [kat] LMS
1,475,304 UART: [kat] --
1,476,167 UART: [cold-reset] ++
1,476,669 UART: [fht] Storing FHT @ 0x50003400
1,479,404 UART: [idev] ++
1,479,572 UART: [idev] CDI.KEYID = 6
1,479,932 UART: [idev] SUBJECT.KEYID = 7
1,480,356 UART: [idev] UDS.KEYID = 0
1,480,701 ready_for_fw is high
1,480,701 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,840 UART: [idev] Erasing UDS.KEYID = 0
1,506,020 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,568 UART: [idev] --
1,515,679 UART: [ldev] ++
1,515,847 UART: [ldev] CDI.KEYID = 6
1,516,210 UART: [ldev] SUBJECT.KEYID = 5
1,516,636 UART: [ldev] AUTHORITY.KEYID = 7
1,517,099 UART: [ldev] FE.KEYID = 1
1,521,999 UART: [ldev] Erasing FE.KEYID = 1
1,547,572 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,598 UART: [ldev] --
1,587,007 UART: [fwproc] Waiting for Commands...
1,587,854 UART: [fwproc] Received command 0x46574c44
1,588,645 UART: [fwproc] Received Image of size 114332 bytes
5,197,452 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,225,336 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,254,688 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,390,499 >>> mbox cmd response: success
5,391,629 UART: [afmc] ++
5,391,797 UART: [afmc] CDI.KEYID = 6
5,392,159 UART: [afmc] SUBJECT.KEYID = 7
5,392,584 UART: [afmc] AUTHORITY.KEYID = 5
5,427,306 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,443,622 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,444,402 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,450,111 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,456,003 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,461,704 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,469,536 UART: [afmc] --
5,470,506 UART: [cold-reset] --
5,471,414 UART: [state] Locking Datavault
5,472,685 UART: [state] Locking PCR0, PCR1 and PCR31
5,473,289 UART: [state] Locking ICCM
5,473,827 UART: [exit] Launching FMC @ 0x40000130
5,479,156 UART:
5,479,172 UART: Running Caliptra FMC ...
5,479,580 UART:
5,479,634 UART: [state] CFI Enabled
5,489,832 UART: [fht] FMC Alias Private Key: 7
5,597,878 UART: [art] Extend RT PCRs Done
5,598,306 UART: [art] Lock RT PCRs Done
5,600,168 UART: [art] Populate DV Done
5,608,096 UART: [fht] FMC Alias Private Key: 7
5,609,058 UART: [art] Derive CDI
5,609,338 UART: [art] Store in in slot 0x4
5,694,945 UART: [art] Derive Key Pair
5,695,305 UART: [art] Store priv key in slot 0x5
5,707,817 UART: [art] Derive Key Pair - Done
5,722,726 UART: [art] Signing Cert with AUTHO
5,723,206 UART: RITY.KEYID = 7
5,738,536 UART: [art] Erasing AUTHORITY.KEYID = 7
5,739,301 UART: [art] PUB.X = 1A5D06752F67C8408C10CB36234E8839DACACB45EB787192B6AB9CF5EEB9DBF6D87E22F088570C6BBE1385DB7B82509A
5,746,079 UART: [art] PUB.Y = 1CA9ED1E25504261707D9D0480328570D35E22179A9F8CE36B9625A8ED48B1E99A20424F51DAF106EB7D2F9889B37D9B
5,753,023 UART: [art] SIG.R = C31DA32626F4422994067EB34BA92FD304095C43C486A7DE10D32C88E02C36544F62F8CD15D0AC6295BD81DD1A62D609
5,759,783 UART: [art] SIG.S = DDFFFAF718D5E0886834C26FFB2A0D110FA7080877699BB6094F1AA42FA658D2142A79FF49A0345C50F012F91150A7B0
5,784,045 UART: Caliptra RT
5,784,298 UART: [state] CFI Enabled
5,892,452 UART: [rt] RT listening for mailbox commands...
5,893,122 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,016,424 UART: [rt]cmd =0x41544d4e, len=14344
7,131,645 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,415 ready_for_fw is high
1,361,415 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,010,645 >>> mbox cmd response: success
5,071,976 UART:
5,071,992 UART: Running Caliptra FMC ...
5,072,400 UART:
5,072,454 UART: [state] CFI Enabled
5,083,138 UART: [fht] FMC Alias Private Key: 7
5,190,906 UART: [art] Extend RT PCRs Done
5,191,334 UART: [art] Lock RT PCRs Done
5,193,018 UART: [art] Populate DV Done
5,201,090 UART: [fht] FMC Alias Private Key: 7
5,202,090 UART: [art] Derive CDI
5,202,370 UART: [art] Store in in slot 0x4
5,288,321 UART: [art] Derive Key Pair
5,288,681 UART: [art] Store priv key in slot 0x5
5,301,367 UART: [art] Derive Key Pair - Done
5,316,197 UART: [art] Signing Cert with AUTHO
5,316,677 UART: RITY.KEYID = 7
5,331,673 UART: [art] Erasing AUTHORITY.KEYID = 7
5,332,438 UART: [art] PUB.X = B0841E7AA75F6E7284B081AB779E86A9CDDE852441787A62DEBCA3F7403440466C7C16FBB4C155F7809031A3AF0DF57F
5,339,213 UART: [art] PUB.Y = DD9595CE58906E48805F6950E822C805B41629C541CE303D703DE69A7E14C930FD36C05977883A888F6A418247ED6FF1
5,346,154 UART: [art] SIG.R = 64C1B36E04AFF2BD1B7C9D4A55016DC409C8B0BF1AF11726DC9A6746EDF05A73B62B5902544C03F990865D75004B2643
5,352,891 UART: [art] SIG.S = 4289ACC1C5867C179A68F0B9AF4E43558940F5034229D718537EC3F2A132ADAD597577D3CC7EA0BCA088F5DAAF770321
5,376,542 UART: Caliptra RT
5,376,795 UART: [state] CFI Enabled
5,485,363 UART: [rt] RT listening for mailbox commands...
5,486,033 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,609,167 UART: [rt]cmd =0x41544d4e, len=14344
6,729,432 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,768 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,368 UART: [kat] SHA2-256
882,299 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,414 UART: [kat] ++
886,566 UART: [kat] sha1
890,736 UART: [kat] SHA2-256
892,674 UART: [kat] SHA2-384
895,399 UART: [kat] SHA2-512-ACC
897,300 UART: [kat] ECC-384
903,089 UART: [kat] HMAC-384Kdf
907,607 UART: [kat] LMS
1,475,803 UART: [kat] --
1,476,606 UART: [cold-reset] ++
1,477,054 UART: [fht] Storing FHT @ 0x50003400
1,479,837 UART: [idev] ++
1,480,005 UART: [idev] CDI.KEYID = 6
1,480,365 UART: [idev] SUBJECT.KEYID = 7
1,480,789 UART: [idev] UDS.KEYID = 0
1,481,134 ready_for_fw is high
1,481,134 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,589 UART: [idev] Erasing UDS.KEYID = 0
1,505,059 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,617 UART: [idev] --
1,514,614 UART: [ldev] ++
1,514,782 UART: [ldev] CDI.KEYID = 6
1,515,145 UART: [ldev] SUBJECT.KEYID = 5
1,515,571 UART: [ldev] AUTHORITY.KEYID = 7
1,516,034 UART: [ldev] FE.KEYID = 1
1,521,322 UART: [ldev] Erasing FE.KEYID = 1
1,546,199 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,271 UART: [ldev] --
1,585,750 UART: [fwproc] Waiting for Commands...
1,586,503 UART: [fwproc] Received command 0x46574c44
1,587,294 UART: [fwproc] Received Image of size 114332 bytes
5,158,234 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,186,920 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,216,272 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,352,073 >>> mbox cmd response: success
5,353,327 UART: [afmc] ++
5,353,495 UART: [afmc] CDI.KEYID = 6
5,353,857 UART: [afmc] SUBJECT.KEYID = 7
5,354,282 UART: [afmc] AUTHORITY.KEYID = 5
5,390,210 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,406,410 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,407,190 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,412,899 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,418,791 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,424,492 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,432,264 UART: [afmc] --
5,433,156 UART: [cold-reset] --
5,433,966 UART: [state] Locking Datavault
5,435,055 UART: [state] Locking PCR0, PCR1 and PCR31
5,435,659 UART: [state] Locking ICCM
5,436,289 UART: [exit] Launching FMC @ 0x40000130
5,441,618 UART:
5,441,634 UART: Running Caliptra FMC ...
5,442,042 UART:
5,442,185 UART: [state] CFI Enabled
5,452,981 UART: [fht] FMC Alias Private Key: 7
5,560,449 UART: [art] Extend RT PCRs Done
5,560,877 UART: [art] Lock RT PCRs Done
5,562,501 UART: [art] Populate DV Done
5,570,943 UART: [fht] FMC Alias Private Key: 7
5,572,051 UART: [art] Derive CDI
5,572,331 UART: [art] Store in in slot 0x4
5,657,806 UART: [art] Derive Key Pair
5,658,166 UART: [art] Store priv key in slot 0x5
5,671,854 UART: [art] Derive Key Pair - Done
5,686,875 UART: [art] Signing Cert with AUTHO
5,687,355 UART: RITY.KEYID = 7
5,702,489 UART: [art] Erasing AUTHORITY.KEYID = 7
5,703,254 UART: [art] PUB.X = 45079ED472259CA18784F00213B5C9D7A3813FAE7937BB3FD6D79E5E5D1734F72C8AC7570361DDAF7BC02F49E417DA5E
5,710,023 UART: [art] PUB.Y = 4E408602818528434B10A58A5AF9E7055E3C365BAA91BA5B020A5E3EA837C94D6DA4E0326E8B4457B285A3106C41C498
5,716,959 UART: [art] SIG.R = 20059E1D70056CF0890F34182D730C8BB10C7D3998F7D4BD18D692B888CDF4D74265BE48FA0A9769535E0E331A6FF191
5,723,708 UART: [art] SIG.S = C99ADA4D2F018407861A008F63A1DB1D124D2A2809D85CE7D33613F11CD6AB580F8F0D5B6C6C0AD69EABFDE6686AF1B6
5,747,213 UART: Caliptra RT
5,747,558 UART: [state] CFI Enabled
5,856,165 UART: [rt] RT listening for mailbox commands...
5,856,835 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,979,801 UART: [rt]cmd =0x41544d4e, len=14344
7,102,231 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,216 ready_for_fw is high
1,363,216 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,201,279 >>> mbox cmd response: success
5,261,710 UART:
5,261,726 UART: Running Caliptra FMC ...
5,262,134 UART:
5,262,277 UART: [state] CFI Enabled
5,272,615 UART: [fht] FMC Alias Private Key: 7
5,380,057 UART: [art] Extend RT PCRs Done
5,380,485 UART: [art] Lock RT PCRs Done
5,382,213 UART: [art] Populate DV Done
5,390,343 UART: [fht] FMC Alias Private Key: 7
5,391,435 UART: [art] Derive CDI
5,391,715 UART: [art] Store in in slot 0x4
5,477,632 UART: [art] Derive Key Pair
5,477,992 UART: [art] Store priv key in slot 0x5
5,491,338 UART: [art] Derive Key Pair - Done
5,506,298 UART: [art] Signing Cert with AUTHO
5,506,778 UART: RITY.KEYID = 7
5,521,992 UART: [art] Erasing AUTHORITY.KEYID = 7
5,522,757 UART: [art] PUB.X = 5301FDC0CE4086CBEF3C5A04508BD6821E6E298E1F646D09CB36E3116D1734FE59081588347355BBE57D75D52E52C3A0
5,529,517 UART: [art] PUB.Y = 593F15C3A09C32E6D080D931375B3A14B5664EE4BE98ED6F52EA8E2680814228AAB26B77BC1A4EB0BDF16A539167DAF7
5,536,477 UART: [art] SIG.R = 12E14A63D6FF38F757568E88A472E0F2ECAD6813B42748203DC4C76B3A8FFB58766402B0785DE14AE492ACF591EE3483
5,543,248 UART: [art] SIG.S = 3AF8AD0689602954E23935D93390AF5B9ACA0D12A7A616D394DEF96DE9E9AABCFDFC019800C6D69834F5C77697818C52
5,566,940 UART: Caliptra RT
5,567,285 UART: [state] CFI Enabled
5,675,771 UART: [rt] RT listening for mailbox commands...
5,676,441 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,799,573 UART: [rt]cmd =0x41544d4e, len=14344
6,926,927 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
893,400 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,525 UART: [kat] ++
897,677 UART: [kat] sha1
901,929 UART: [kat] SHA2-256
903,869 UART: [kat] SHA2-384
906,570 UART: [kat] SHA2-512-ACC
908,471 UART: [kat] ECC-384
918,092 UART: [kat] HMAC-384Kdf
922,658 UART: [kat] LMS
1,170,986 UART: [kat] --
1,171,735 UART: [cold-reset] ++
1,172,061 UART: [fht] FHT @ 0x50003400
1,174,694 UART: [idev] ++
1,174,862 UART: [idev] CDI.KEYID = 6
1,175,222 UART: [idev] SUBJECT.KEYID = 7
1,175,646 UART: [idev] UDS.KEYID = 0
1,175,991 ready_for_fw is high
1,175,991 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,700 UART: [idev] Erasing UDS.KEYID = 0
1,200,641 UART: [idev] Sha1 KeyId Algorithm
1,209,079 UART: [idev] --
1,210,065 UART: [ldev] ++
1,210,233 UART: [ldev] CDI.KEYID = 6
1,210,596 UART: [ldev] SUBJECT.KEYID = 5
1,211,022 UART: [ldev] AUTHORITY.KEYID = 7
1,211,485 UART: [ldev] FE.KEYID = 1
1,216,683 UART: [ldev] Erasing FE.KEYID = 1
1,242,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,547 UART: [ldev] --
1,281,828 UART: [fwproc] Wait for Commands...
1,282,450 UART: [fwproc] Recv command 0x46574c44
1,283,178 UART: [fwproc] Recv'd Img size: 114332 bytes
3,131,918 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,599 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,903 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,324,756 >>> mbox cmd response: success
3,325,792 UART: [afmc] ++
3,325,960 UART: [afmc] CDI.KEYID = 6
3,326,322 UART: [afmc] SUBJECT.KEYID = 7
3,326,747 UART: [afmc] AUTHORITY.KEYID = 5
3,361,799 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,868 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,616 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,325 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,217 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,928 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,639 UART: [afmc] --
3,404,521 UART: [cold-reset] --
3,405,537 UART: [state] Locking Datavault
3,406,478 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,082 UART: [state] Locking ICCM
3,407,536 UART: [exit] Launching FMC @ 0x40000130
3,412,865 UART:
3,412,881 UART: Running Caliptra FMC ...
3,413,289 UART:
3,413,343 UART: [state] CFI Enabled
3,424,145 UART: [fht] FMC Alias Private Key: 7
3,531,825 UART: [art] Extend RT PCRs Done
3,532,253 UART: [art] Lock RT PCRs Done
3,533,467 UART: [art] Populate DV Done
3,541,643 UART: [fht] FMC Alias Private Key: 7
3,542,725 UART: [art] Derive CDI
3,543,005 UART: [art] Store in in slot 0x4
3,628,636 UART: [art] Derive Key Pair
3,628,996 UART: [art] Store priv key in slot 0x5
3,642,122 UART: [art] Derive Key Pair - Done
3,657,142 UART: [art] Signing Cert with AUTHO
3,657,622 UART: RITY.KEYID = 7
3,672,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,371 UART: [art] PUB.X = 6D46F6D20C95E593A219E4A0BB97AD633776FEC64ADEBDBEB70139A90C8DA97358048076F02EE9A88AF885E04B803803
3,680,134 UART: [art] PUB.Y = A3A03253787056C7BA19723694FAF549D0CC87BDF461D6D8180379A093175E3E8BC7E2B27C76B2544636A6AE373C98ED
3,687,081 UART: [art] SIG.R = 0DFE17AD8EDE835208EB5B0B37B9C5479FD91ECF61EF3971FA515B23708B20913879046A86E4F64A19CB3F6E0E3241D4
3,693,844 UART: [art] SIG.S = 27D7DCB8124A02D163BCC1449735DF75CA2E2772299A5BACDB6B9EF308CD5F685B67333C566B69FB48625F516B8E60BF
3,717,367 UART: Caliptra RT
3,717,620 UART: [state] CFI Enabled
3,824,961 UART: [rt] RT listening for mailbox commands...
3,825,631 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,663 UART: [rt]cmd =0x41544d4e, len=14344
5,068,952 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,333 ready_for_fw is high
1,060,333 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,170,330 >>> mbox cmd response: success
3,232,677 UART:
3,232,693 UART: Running Caliptra FMC ...
3,233,101 UART:
3,233,155 UART: [state] CFI Enabled
3,243,653 UART: [fht] FMC Alias Private Key: 7
3,351,637 UART: [art] Extend RT PCRs Done
3,352,065 UART: [art] Lock RT PCRs Done
3,353,393 UART: [art] Populate DV Done
3,361,799 UART: [fht] FMC Alias Private Key: 7
3,362,731 UART: [art] Derive CDI
3,363,011 UART: [art] Store in in slot 0x4
3,448,538 UART: [art] Derive Key Pair
3,448,898 UART: [art] Store priv key in slot 0x5
3,461,980 UART: [art] Derive Key Pair - Done
3,476,713 UART: [art] Signing Cert with AUTHO
3,477,193 UART: RITY.KEYID = 7
3,492,423 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,188 UART: [art] PUB.X = 7ADC6D4F29C00DE31DB9E9B81A3F9F6B07903B897B59CAEA9F546CB48BB43284184AAA4350757544CB5DE8B0E963050A
3,499,958 UART: [art] PUB.Y = D3EBD2DC104097557858298429CC1D4944F560E4D2620606805C764FFF69705ACE2F5ABFBDDE9C33B111EE9786014CC5
3,506,903 UART: [art] SIG.R = AEA102B050A8D265EAB9FA254B5DA7C7355FA7BC95848329F728DE9CC2F9479F28305B6EEC0CECE61F1FA48EAFAD60FC
3,513,693 UART: [art] SIG.S = 08F3A8BCEC1D0C6B7A9A57402C86960DBF48F55DD622297B312E81B25B31779E47AD2E7CCFCE50859F149B0F8C0483CE
3,537,615 UART: Caliptra RT
3,537,868 UART: [state] CFI Enabled
3,645,638 UART: [rt] RT listening for mailbox commands...
3,646,308 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,360 UART: [rt]cmd =0x41544d4e, len=14344
4,894,483 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,854 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
893,717 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,842 UART: [kat] ++
897,994 UART: [kat] sha1
902,078 UART: [kat] SHA2-256
904,018 UART: [kat] SHA2-384
906,705 UART: [kat] SHA2-512-ACC
908,606 UART: [kat] ECC-384
918,247 UART: [kat] HMAC-384Kdf
922,845 UART: [kat] LMS
1,171,173 UART: [kat] --
1,172,306 UART: [cold-reset] ++
1,172,776 UART: [fht] FHT @ 0x50003400
1,175,485 UART: [idev] ++
1,175,653 UART: [idev] CDI.KEYID = 6
1,176,013 UART: [idev] SUBJECT.KEYID = 7
1,176,437 UART: [idev] UDS.KEYID = 0
1,176,782 ready_for_fw is high
1,176,782 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,257 UART: [idev] Erasing UDS.KEYID = 0
1,201,894 UART: [idev] Sha1 KeyId Algorithm
1,210,384 UART: [idev] --
1,211,366 UART: [ldev] ++
1,211,534 UART: [ldev] CDI.KEYID = 6
1,211,897 UART: [ldev] SUBJECT.KEYID = 5
1,212,323 UART: [ldev] AUTHORITY.KEYID = 7
1,212,786 UART: [ldev] FE.KEYID = 1
1,217,942 UART: [ldev] Erasing FE.KEYID = 1
1,244,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,710 UART: [ldev] --
1,284,017 UART: [fwproc] Wait for Commands...
1,284,591 UART: [fwproc] Recv command 0x46574c44
1,285,319 UART: [fwproc] Recv'd Img size: 114332 bytes
3,126,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,337 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,319,242 >>> mbox cmd response: success
3,320,368 UART: [afmc] ++
3,320,536 UART: [afmc] CDI.KEYID = 6
3,320,898 UART: [afmc] SUBJECT.KEYID = 7
3,321,323 UART: [afmc] AUTHORITY.KEYID = 5
3,356,707 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,006 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,715 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,607 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,318 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,157 UART: [afmc] --
3,400,253 UART: [cold-reset] --
3,401,111 UART: [state] Locking Datavault
3,402,492 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,096 UART: [state] Locking ICCM
3,403,662 UART: [exit] Launching FMC @ 0x40000130
3,408,991 UART:
3,409,007 UART: Running Caliptra FMC ...
3,409,415 UART:
3,409,558 UART: [state] CFI Enabled
3,420,384 UART: [fht] FMC Alias Private Key: 7
3,528,262 UART: [art] Extend RT PCRs Done
3,528,690 UART: [art] Lock RT PCRs Done
3,530,476 UART: [art] Populate DV Done
3,538,560 UART: [fht] FMC Alias Private Key: 7
3,539,594 UART: [art] Derive CDI
3,539,874 UART: [art] Store in in slot 0x4
3,625,705 UART: [art] Derive Key Pair
3,626,065 UART: [art] Store priv key in slot 0x5
3,639,017 UART: [art] Derive Key Pair - Done
3,653,842 UART: [art] Signing Cert with AUTHO
3,654,322 UART: RITY.KEYID = 7
3,669,594 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,359 UART: [art] PUB.X = 12E9433C125B39C19F79E7852968771A41309CA2AC0F18EE1FB1A81CB05BE59177648DF879E9F80D9EF1115F065D7416
3,677,118 UART: [art] PUB.Y = EB287F377B8D6034229644297EA982DFAB7796FB3AC2E8AA8C61FDDA59BBF8FE298433D45E4CA00D68BEA2C56DCBC2E7
3,684,087 UART: [art] SIG.R = AE5379D7A9E6858DECA22214EA6E329B1D1E7438E5E88C98FA817310B0F13AEB33D2515CFEF390C616C4BDFB702712B3
3,690,869 UART: [art] SIG.S = F54680A70EC9BB600BB5411647B06F7285319BDB63027187434BF2A775BE23CDE8FD453AD67F7D808E3F027783B98FF5
3,714,590 UART: Caliptra RT
3,714,935 UART: [state] CFI Enabled
3,822,204 UART: [rt] RT listening for mailbox commands...
3,822,874 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,870 UART: [rt]cmd =0x41544d4e, len=14344
5,081,171 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,820 ready_for_fw is high
1,061,820 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,184,133 >>> mbox cmd response: success
3,247,394 UART:
3,247,410 UART: Running Caliptra FMC ...
3,247,818 UART:
3,247,961 UART: [state] CFI Enabled
3,258,781 UART: [fht] FMC Alias Private Key: 7
3,366,975 UART: [art] Extend RT PCRs Done
3,367,403 UART: [art] Lock RT PCRs Done
3,369,191 UART: [art] Populate DV Done
3,377,519 UART: [fht] FMC Alias Private Key: 7
3,378,517 UART: [art] Derive CDI
3,378,797 UART: [art] Store in in slot 0x4
3,464,644 UART: [art] Derive Key Pair
3,465,004 UART: [art] Store priv key in slot 0x5
3,478,690 UART: [art] Derive Key Pair - Done
3,493,184 UART: [art] Signing Cert with AUTHO
3,493,664 UART: RITY.KEYID = 7
3,508,918 UART: [art] Erasing AUTHORITY.KEYID = 7
3,509,683 UART: [art] PUB.X = 2838A9389E07839F8FB2F3AB7207648A00099D70FA0FADC61356F4D37B454F3239C0CE6A2A19C0180329ED4FDA49ACCE
3,516,424 UART: [art] PUB.Y = D6B86CC4D7FFC125D1EB8EC74BC3CBB801FCCDF435F6499883810C88B06D762FBE26D4D54CB8AD62200A703666909666
3,523,377 UART: [art] SIG.R = 0275055116CF5B65BFF3FFDFB95714BDCBC395E41B1319B38C0E0549B7065E7544058A86B266B7B8A3D8B0088D1A9AE4
3,530,132 UART: [art] SIG.S = E821B90BFC671460F2757290A16846C27E1579862A7BE3950AEB54295D7EB11AF6654FD92606EAE2C2FF12114448CFBF
3,553,770 UART: Caliptra RT
3,554,115 UART: [state] CFI Enabled
3,661,539 UART: [rt] RT listening for mailbox commands...
3,662,209 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,785,091 UART: [rt]cmd =0x41544d4e, len=14344
4,925,022 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,063 UART: [state] WD Timer not started. Device not locked for debugging
87,274 UART: [kat] SHA2-256
890,824 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,953 UART: [kat] ++
895,105 UART: [kat] sha1
899,491 UART: [kat] SHA2-256
901,431 UART: [kat] SHA2-384
904,156 UART: [kat] SHA2-512-ACC
906,057 UART: [kat] ECC-384
915,912 UART: [kat] HMAC-384Kdf
920,500 UART: [kat] LMS
1,168,812 UART: [kat] --
1,169,699 UART: [cold-reset] ++
1,170,273 UART: [fht] FHT @ 0x50003400
1,172,809 UART: [idev] ++
1,172,977 UART: [idev] CDI.KEYID = 6
1,173,338 UART: [idev] SUBJECT.KEYID = 7
1,173,763 UART: [idev] UDS.KEYID = 0
1,174,109 ready_for_fw is high
1,174,109 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,041 UART: [idev] Erasing UDS.KEYID = 0
1,199,077 UART: [idev] Sha1 KeyId Algorithm
1,208,003 UART: [idev] --
1,208,992 UART: [ldev] ++
1,209,160 UART: [ldev] CDI.KEYID = 6
1,209,524 UART: [ldev] SUBJECT.KEYID = 5
1,209,951 UART: [ldev] AUTHORITY.KEYID = 7
1,210,414 UART: [ldev] FE.KEYID = 1
1,215,590 UART: [ldev] Erasing FE.KEYID = 1
1,241,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,376 UART: [ldev] --
1,280,840 UART: [fwproc] Wait for Commands...
1,281,585 UART: [fwproc] Recv command 0x46574c44
1,282,318 UART: [fwproc] Recv'd Img size: 114332 bytes
3,117,678 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,572 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,881 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,311,753 >>> mbox cmd response: success
3,312,986 UART: [afmc] ++
3,313,154 UART: [afmc] CDI.KEYID = 6
3,313,517 UART: [afmc] SUBJECT.KEYID = 7
3,313,943 UART: [afmc] AUTHORITY.KEYID = 5
3,349,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,160 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,870 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,760 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,471 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,283 UART: [afmc] --
3,392,233 UART: [cold-reset] --
3,393,019 UART: [state] Locking Datavault
3,394,248 UART: [state] Locking PCR0, PCR1 and PCR31
3,394,852 UART: [state] Locking ICCM
3,395,454 UART: [exit] Launching FMC @ 0x40000130
3,400,783 UART:
3,400,799 UART: Running Caliptra FMC ...
3,401,207 UART:
3,401,261 UART: [state] CFI Enabled
3,412,051 UART: [fht] FMC Alias Private Key: 7
3,520,305 UART: [art] Extend RT PCRs Done
3,520,733 UART: [art] Lock RT PCRs Done
3,522,053 UART: [art] Populate DV Done
3,530,265 UART: [fht] FMC Alias Private Key: 7
3,531,323 UART: [art] Derive CDI
3,531,603 UART: [art] Store in in slot 0x4
3,617,492 UART: [art] Derive Key Pair
3,617,852 UART: [art] Store priv key in slot 0x5
3,631,024 UART: [art] Derive Key Pair - Done
3,645,980 UART: [art] Signing Cert with AUTHO
3,646,460 UART: RITY.KEYID = 7
3,661,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,655 UART: [art] PUB.X = C7B4FC2080B4E61C8D942689396C4713CF28A1876769CC19FE1ACE033119D1847ACC0A83601C2D5BD052A2FC4833F8FB
3,669,425 UART: [art] PUB.Y = 7D4425918276D0FC5F167E8DE6EC369B26E1C45162C6C1C6C75875BB2EBC507CF582F634D983E9E0E48B5A4E37EED92E
3,676,385 UART: [art] SIG.R = 0A5C4293A0B0938983293B67A42A325EA7D41725595CA86699FB7E7DD36C24763B96E62692C43BF7FCD4DEE686DEB459
3,683,154 UART: [art] SIG.S = 9B45E414EFC0592A08E0611B22070C7B36299A2A550D1AB6ABAF0CAA595B93DC9FE88491ABC5B67C5C53C4574F7A6042
3,707,538 UART: Caliptra RT
3,707,791 UART: [state] CFI Enabled
3,815,175 UART: [rt] RT listening for mailbox commands...
3,815,845 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,687 UART: [rt]cmd =0x41544d4e, len=14344
5,058,618 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,788 ready_for_fw is high
1,055,788 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,158,034 >>> mbox cmd response: success
3,220,233 UART:
3,220,249 UART: Running Caliptra FMC ...
3,220,657 UART:
3,220,711 UART: [state] CFI Enabled
3,230,859 UART: [fht] FMC Alias Private Key: 7
3,339,255 UART: [art] Extend RT PCRs Done
3,339,683 UART: [art] Lock RT PCRs Done
3,341,139 UART: [art] Populate DV Done
3,349,055 UART: [fht] FMC Alias Private Key: 7
3,350,055 UART: [art] Derive CDI
3,350,335 UART: [art] Store in in slot 0x4
3,435,490 UART: [art] Derive Key Pair
3,435,850 UART: [art] Store priv key in slot 0x5
3,448,782 UART: [art] Derive Key Pair - Done
3,463,293 UART: [art] Signing Cert with AUTHO
3,463,773 UART: RITY.KEYID = 7
3,479,111 UART: [art] Erasing AUTHORITY.KEYID = 7
3,479,876 UART: [art] PUB.X = FF348E9DC7F0361905EA9FD02322B8CBA061BFF3B5B857284599B898884DFAE71DC9ABFEED5CA82A8311E5F2799D1701
3,486,654 UART: [art] PUB.Y = F6B10BB25CA4F0A1E2F6D19A624C5D1973581A41CD19EA35EE38601027EAE70691B1240C77331F3AB62573ED0D875E38
3,493,596 UART: [art] SIG.R = 5D03093732D72DC8C99F79B10FAFD02EA713F2688AE9A9ED951B321D8498B584D6A56DEEAF5BC272CF1FFA4A3D2CC4B0
3,500,377 UART: [art] SIG.S = DEFFB2CFED3B45173C927C545694DBFDC2E3C8118CD97202CE44D6B37DCAA4DEB170CD8486964750E57C06711C2B5376
3,523,890 UART: Caliptra RT
3,524,143 UART: [state] CFI Enabled
3,632,233 UART: [rt] RT listening for mailbox commands...
3,632,903 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,941 UART: [rt]cmd =0x41544d4e, len=14344
4,873,231 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
891,375 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,504 UART: [kat] ++
895,656 UART: [kat] sha1
899,742 UART: [kat] SHA2-256
901,682 UART: [kat] SHA2-384
904,473 UART: [kat] SHA2-512-ACC
906,374 UART: [kat] ECC-384
916,101 UART: [kat] HMAC-384Kdf
920,823 UART: [kat] LMS
1,169,135 UART: [kat] --
1,169,994 UART: [cold-reset] ++
1,170,498 UART: [fht] FHT @ 0x50003400
1,173,364 UART: [idev] ++
1,173,532 UART: [idev] CDI.KEYID = 6
1,173,893 UART: [idev] SUBJECT.KEYID = 7
1,174,318 UART: [idev] UDS.KEYID = 0
1,174,664 ready_for_fw is high
1,174,664 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,708 UART: [idev] Erasing UDS.KEYID = 0
1,199,810 UART: [idev] Sha1 KeyId Algorithm
1,208,712 UART: [idev] --
1,209,883 UART: [ldev] ++
1,210,051 UART: [ldev] CDI.KEYID = 6
1,210,415 UART: [ldev] SUBJECT.KEYID = 5
1,210,842 UART: [ldev] AUTHORITY.KEYID = 7
1,211,305 UART: [ldev] FE.KEYID = 1
1,216,475 UART: [ldev] Erasing FE.KEYID = 1
1,243,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,805 UART: [ldev] --
1,282,089 UART: [fwproc] Wait for Commands...
1,282,910 UART: [fwproc] Recv command 0x46574c44
1,283,643 UART: [fwproc] Recv'd Img size: 114332 bytes
3,130,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,070 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,379 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,324,085 >>> mbox cmd response: success
3,325,138 UART: [afmc] ++
3,325,306 UART: [afmc] CDI.KEYID = 6
3,325,669 UART: [afmc] SUBJECT.KEYID = 7
3,326,095 UART: [afmc] AUTHORITY.KEYID = 5
3,361,431 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,672 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,382 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,272 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,983 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,675 UART: [afmc] --
3,404,709 UART: [cold-reset] --
3,405,495 UART: [state] Locking Datavault
3,406,718 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,322 UART: [state] Locking ICCM
3,407,764 UART: [exit] Launching FMC @ 0x40000130
3,413,093 UART:
3,413,109 UART: Running Caliptra FMC ...
3,413,517 UART:
3,413,660 UART: [state] CFI Enabled
3,424,280 UART: [fht] FMC Alias Private Key: 7
3,532,358 UART: [art] Extend RT PCRs Done
3,532,786 UART: [art] Lock RT PCRs Done
3,534,172 UART: [art] Populate DV Done
3,542,128 UART: [fht] FMC Alias Private Key: 7
3,543,072 UART: [art] Derive CDI
3,543,352 UART: [art] Store in in slot 0x4
3,629,179 UART: [art] Derive Key Pair
3,629,539 UART: [art] Store priv key in slot 0x5
3,642,665 UART: [art] Derive Key Pair - Done
3,657,345 UART: [art] Signing Cert with AUTHO
3,657,825 UART: RITY.KEYID = 7
3,672,975 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,740 UART: [art] PUB.X = 5ED22174FB470F511BFA612674F2AE18ED3DA52C5F0CB48417D2076DCE7147DC74DFA875CF01D2E9D34CA938D929EF5C
3,680,514 UART: [art] PUB.Y = 797D038B78FC8D0C56CFD2B16189FD779C18B7B30B820BAEACC423CB09E6F174A85132AF06F42ADD8F6A1D42179A2C93
3,687,460 UART: [art] SIG.R = C86A7F4C47450618148EF670B6EE073B9D9C000FEAB8E87483472F127394872AF90A519204AF530DA2D0F5A8E67CB051
3,694,190 UART: [art] SIG.S = AEE3E6E7EF4A40C67EAD67C80BBD7F7A865F75827A795F7D32C1850FDFFA7506B1E1A690BA6ACE7553943E3E1DC3CE75
3,718,666 UART: Caliptra RT
3,719,011 UART: [state] CFI Enabled
3,825,816 UART: [rt] RT listening for mailbox commands...
3,826,486 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,760 UART: [rt]cmd =0x41544d4e, len=14344
5,087,152 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,215 ready_for_fw is high
1,056,215 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,167,666 >>> mbox cmd response: success
3,229,379 UART:
3,229,395 UART: Running Caliptra FMC ...
3,229,803 UART:
3,229,946 UART: [state] CFI Enabled
3,240,282 UART: [fht] FMC Alias Private Key: 7
3,348,258 UART: [art] Extend RT PCRs Done
3,348,686 UART: [art] Lock RT PCRs Done
3,350,232 UART: [art] Populate DV Done
3,358,508 UART: [fht] FMC Alias Private Key: 7
3,359,448 UART: [art] Derive CDI
3,359,728 UART: [art] Store in in slot 0x4
3,445,279 UART: [art] Derive Key Pair
3,445,639 UART: [art] Store priv key in slot 0x5
3,459,379 UART: [art] Derive Key Pair - Done
3,474,151 UART: [art] Signing Cert with AUTHO
3,474,631 UART: RITY.KEYID = 7
3,489,783 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,548 UART: [art] PUB.X = FCE5B0B1A99CD3CC2A14BF776AFB2C924C408D7625C3838F7AF96834BABB65A11754F2C71CBDD1BB07E897D5A244227B
3,497,333 UART: [art] PUB.Y = 60D8CE875F48B2977136E6EC430C27566A1E54DEBB941D932806271F4FBD5755B8CDBBAE03C3965D35CD2C17B9C7FCC5
3,504,286 UART: [art] SIG.R = 27FD84A985A6E12E690C9FF2B5026D4B39694995466BF21542C24842FF67EC31CA4099EB31B89C545D223BD19BD6F4B1
3,511,052 UART: [art] SIG.S = 8E069C5D3E685D790DADA472F0602D74ECA725A1640A76E290B5CA22AA145DE4C9ADDC063765E3B45354E70C574CB367
3,535,172 UART: Caliptra RT
3,535,517 UART: [state] CFI Enabled
3,643,205 UART: [rt] RT listening for mailbox commands...
3,643,875 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,907 UART: [rt]cmd =0x41544d4e, len=14344
4,896,904 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,259 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,985 UART: [kat] SHA2-256
881,916 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,031 UART: [kat] ++
886,183 UART: [kat] sha1
890,253 UART: [kat] SHA2-256
892,191 UART: [kat] SHA2-384
895,042 UART: [kat] SHA2-512-ACC
896,943 UART: [kat] ECC-384
902,226 UART: [kat] HMAC-384Kdf
906,864 UART: [kat] LMS
1,475,060 UART: [kat] --
1,475,847 UART: [cold-reset] ++
1,476,189 UART: [fht] Storing FHT @ 0x50003400
1,479,032 UART: [idev] ++
1,479,200 UART: [idev] CDI.KEYID = 6
1,479,560 UART: [idev] SUBJECT.KEYID = 7
1,479,984 UART: [idev] UDS.KEYID = 0
1,480,329 ready_for_fw is high
1,480,329 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,806 UART: [idev] Erasing UDS.KEYID = 0
1,504,340 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,980 UART: [idev] --
1,514,045 UART: [ldev] ++
1,514,213 UART: [ldev] CDI.KEYID = 6
1,514,576 UART: [ldev] SUBJECT.KEYID = 5
1,515,002 UART: [ldev] AUTHORITY.KEYID = 7
1,515,465 UART: [ldev] FE.KEYID = 1
1,520,749 UART: [ldev] Erasing FE.KEYID = 1
1,545,786 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,782 UART: [ldev] --
1,585,185 UART: [fwproc] Waiting for Commands...
1,585,940 UART: [fwproc] Received command 0x46574c44
1,586,731 UART: [fwproc] Received Image of size 114332 bytes
5,006,671 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,036,051 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,065,403 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,201,288 >>> mbox cmd response: success
5,202,500 UART: [afmc] ++
5,202,668 UART: [afmc] CDI.KEYID = 6
5,203,030 UART: [afmc] SUBJECT.KEYID = 7
5,203,455 UART: [afmc] AUTHORITY.KEYID = 5
5,238,911 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,254,943 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,255,723 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,261,432 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,267,324 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,273,025 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,280,673 UART: [afmc] --
5,281,731 UART: [cold-reset] --
5,282,497 UART: [state] Locking Datavault
5,283,554 UART: [state] Locking PCR0, PCR1 and PCR31
5,284,158 UART: [state] Locking ICCM
5,284,768 UART: [exit] Launching FMC @ 0x40000130
5,290,097 UART:
5,290,113 UART: Running Caliptra FMC ...
5,290,521 UART:
5,290,575 UART: [state] CFI Enabled
5,301,005 UART: [fht] FMC Alias Private Key: 7
5,408,701 UART: [art] Extend RT PCRs Done
5,409,129 UART: [art] Lock RT PCRs Done
5,410,811 UART: [art] Populate DV Done
5,419,131 UART: [fht] FMC Alias Private Key: 7
5,420,141 UART: [art] Derive CDI
5,420,421 UART: [art] Store in in slot 0x4
5,506,010 UART: [art] Derive Key Pair
5,506,370 UART: [art] Store priv key in slot 0x5
5,519,536 UART: [art] Derive Key Pair - Done
5,534,418 UART: [art] Signing Cert with AUTHO
5,534,898 UART: RITY.KEYID = 7
5,550,286 UART: [art] Erasing AUTHORITY.KEYID = 7
5,551,051 UART: [art] PUB.X = ACC3E9C7DF8F0445343F934CF7BAD9E9DE8AFB3390D418E8B4C19AFB6E4DB233C2C0F54B4504683C88C32BD99233EFF6
5,557,835 UART: [art] PUB.Y = 1E6510CBC5C2596D0459479747442655951F90FC1AF79D9EE6FB307E2F76BCB7B1EBDC62435628F39879FB49B13B28AB
5,564,786 UART: [art] SIG.R = E7431FE0A07FBE94C6FD4C021FF958A1FB70C8240F88F548878DCF53DB67C5B40E57A42037AB0AEA3DD8A82B1D505685
5,571,558 UART: [art] SIG.S = 6052A47C3BC4C85F6806AB6D9AD26629E1300254A8711BB3C5F121FD27B90C4FA5F77DA39D74ECC2E1522175D90E1C06
5,595,002 UART: Caliptra RT
5,595,255 UART: [state] CFI Enabled
5,702,662 UART: [rt] RT listening for mailbox commands...
5,703,332 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,826,490 UART: [rt]cmd =0x41544d4e, len=14344
5,827,973 >>> mbox cmd response: failed
5,827,973 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,950,349 UART: [rt]cmd =0x41544d4e, len=14344
5,951,894 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,807 ready_for_fw is high
1,362,807 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,237,939 >>> mbox cmd response: success
5,299,574 UART:
5,299,590 UART: Running Caliptra FMC ...
5,299,998 UART:
5,300,052 UART: [state] CFI Enabled
5,310,572 UART: [fht] FMC Alias Private Key: 7
5,418,760 UART: [art] Extend RT PCRs Done
5,419,188 UART: [art] Lock RT PCRs Done
5,420,764 UART: [art] Populate DV Done
5,429,120 UART: [fht] FMC Alias Private Key: 7
5,430,066 UART: [art] Derive CDI
5,430,346 UART: [art] Store in in slot 0x4
5,515,585 UART: [art] Derive Key Pair
5,515,945 UART: [art] Store priv key in slot 0x5
5,529,305 UART: [art] Derive Key Pair - Done
5,543,848 UART: [art] Signing Cert with AUTHO
5,544,328 UART: RITY.KEYID = 7
5,559,782 UART: [art] Erasing AUTHORITY.KEYID = 7
5,560,547 UART: [art] PUB.X = A474BD79E73F56036766E250E0514381F60A70F51B730004C052FE3556BCD81A415D83D306FD81DF7B37F9357EDE45CF
5,567,283 UART: [art] PUB.Y = 4732B01F874A4BF0C5DC96A239E78D444D6C4712D44FDDDF0D79D71A3E2EB349F5ADBE635F19D6FEEC97396D7E6B2F7B
5,574,250 UART: [art] SIG.R = DCD38058C4D30B9C54B1E18CE9C55633F0453F5A1E84AA7469B01AAF13E22ABF5404A1AA85673D5F0EEA8ACE4E01B3CD
5,581,028 UART: [art] SIG.S = FDCCA75E5FF8CE845B4B4ADCC192EB42ABB9768D9ECF570DDF0320D4EE29E7630CE7DAA8BB5D13F956185B15722DE5AA
5,604,900 UART: Caliptra RT
5,605,153 UART: [state] CFI Enabled
5,713,649 UART: [rt] RT listening for mailbox commands...
5,714,319 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,837,417 UART: [rt]cmd =0x41544d4e, len=14344
5,838,682 >>> mbox cmd response: failed
5,838,682 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,961,040 UART: [rt]cmd =0x41544d4e, len=14344
5,962,447 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,816 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,300 UART: [kat] SHA2-256
882,231 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,346 UART: [kat] ++
886,498 UART: [kat] sha1
890,822 UART: [kat] SHA2-256
892,760 UART: [kat] SHA2-384
895,321 UART: [kat] SHA2-512-ACC
897,222 UART: [kat] ECC-384
903,099 UART: [kat] HMAC-384Kdf
907,681 UART: [kat] LMS
1,475,877 UART: [kat] --
1,476,776 UART: [cold-reset] ++
1,477,214 UART: [fht] Storing FHT @ 0x50003400
1,479,881 UART: [idev] ++
1,480,049 UART: [idev] CDI.KEYID = 6
1,480,409 UART: [idev] SUBJECT.KEYID = 7
1,480,833 UART: [idev] UDS.KEYID = 0
1,481,178 ready_for_fw is high
1,481,178 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,137 UART: [idev] Erasing UDS.KEYID = 0
1,505,629 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,177 UART: [idev] --
1,515,014 UART: [ldev] ++
1,515,182 UART: [ldev] CDI.KEYID = 6
1,515,545 UART: [ldev] SUBJECT.KEYID = 5
1,515,971 UART: [ldev] AUTHORITY.KEYID = 7
1,516,434 UART: [ldev] FE.KEYID = 1
1,521,472 UART: [ldev] Erasing FE.KEYID = 1
1,546,869 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,803 UART: [ldev] --
1,586,092 UART: [fwproc] Waiting for Commands...
1,586,725 UART: [fwproc] Received command 0x46574c44
1,587,516 UART: [fwproc] Received Image of size 114332 bytes
5,309,748 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,338,306 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,367,658 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,503,561 >>> mbox cmd response: success
5,504,779 UART: [afmc] ++
5,504,947 UART: [afmc] CDI.KEYID = 6
5,505,309 UART: [afmc] SUBJECT.KEYID = 7
5,505,734 UART: [afmc] AUTHORITY.KEYID = 5
5,540,998 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,557,268 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,558,048 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,563,757 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,569,649 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,575,350 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,583,320 UART: [afmc] --
5,584,308 UART: [cold-reset] --
5,585,200 UART: [state] Locking Datavault
5,586,219 UART: [state] Locking PCR0, PCR1 and PCR31
5,586,823 UART: [state] Locking ICCM
5,587,453 UART: [exit] Launching FMC @ 0x40000130
5,592,782 UART:
5,592,798 UART: Running Caliptra FMC ...
5,593,206 UART:
5,593,349 UART: [state] CFI Enabled
5,604,091 UART: [fht] FMC Alias Private Key: 7
5,712,075 UART: [art] Extend RT PCRs Done
5,712,503 UART: [art] Lock RT PCRs Done
5,714,117 UART: [art] Populate DV Done
5,722,475 UART: [fht] FMC Alias Private Key: 7
5,723,529 UART: [art] Derive CDI
5,723,809 UART: [art] Store in in slot 0x4
5,809,070 UART: [art] Derive Key Pair
5,809,430 UART: [art] Store priv key in slot 0x5
5,822,934 UART: [art] Derive Key Pair - Done
5,837,206 UART: [art] Signing Cert with AUTHO
5,837,686 UART: RITY.KEYID = 7
5,852,664 UART: [art] Erasing AUTHORITY.KEYID = 7
5,853,429 UART: [art] PUB.X = A5A50EDE6ADF7E9D4C54CEC2446E801125FC221B888BBDF79C7E2610605414CFC4138B5974ABE4D80BDBCF9E97D93212
5,860,209 UART: [art] PUB.Y = 001CF89C39969CD9134D60A76902AF738429787220C45FD8E8000436D4BB66A6DE4F0213D1D0BA9F5970DA19E2CD0136
5,867,101 UART: [art] SIG.R = FBDCB42DEE994683A1F1AD8815A61F601DCBF5353F0497BA61185D62AEDF4057EBE2F901E7E62C765685FA4FC01657C6
5,873,879 UART: [art] SIG.S = E8045D644DF187F7C885841FE83BDFA4AD8E637FF0E2406B1226456647EAAF03B767A570B847233CCF2BF4F1D80A77E9
5,897,589 UART: Caliptra RT
5,897,934 UART: [state] CFI Enabled
6,005,392 UART: [rt] RT listening for mailbox commands...
6,006,062 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,129,452 UART: [rt]cmd =0x41544d4e, len=14344
6,130,757 >>> mbox cmd response: failed
6,130,757 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,253,471 UART: [rt]cmd =0x41544d4e, len=14344
6,254,980 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,460 ready_for_fw is high
1,362,460 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,277,767 >>> mbox cmd response: success
5,340,554 UART:
5,340,570 UART: Running Caliptra FMC ...
5,340,978 UART:
5,341,121 UART: [state] CFI Enabled
5,351,781 UART: [fht] FMC Alias Private Key: 7
5,459,239 UART: [art] Extend RT PCRs Done
5,459,667 UART: [art] Lock RT PCRs Done
5,461,297 UART: [art] Populate DV Done
5,469,423 UART: [fht] FMC Alias Private Key: 7
5,470,355 UART: [art] Derive CDI
5,470,635 UART: [art] Store in in slot 0x4
5,556,176 UART: [art] Derive Key Pair
5,556,536 UART: [art] Store priv key in slot 0x5
5,569,710 UART: [art] Derive Key Pair - Done
5,584,409 UART: [art] Signing Cert with AUTHO
5,584,889 UART: RITY.KEYID = 7
5,600,019 UART: [art] Erasing AUTHORITY.KEYID = 7
5,600,784 UART: [art] PUB.X = 6973D435C16A37C17AE6CE879C65872CADB49EA1C861099A4EB2B190DDE4AC877652AD389BC306235AC1991854C9C4F5
5,607,554 UART: [art] PUB.Y = 192286D47EBE65072513B13245949AE37639443C21AFAC02FED048934775F040EA87C2927DED254AFF4F230EA93F59DD
5,614,495 UART: [art] SIG.R = 58432284BB9EDF4F1228FE66FE3ED1EA9CB762B09D34D9EB5ECA7B85583145AD7C37C1B31BC8DD9E68C2F08C2221E8F6
5,621,283 UART: [art] SIG.S = 6D2174027B93A7F75D6074E633A733AB5B404D0E4E9ABDB26A8EE7C48F068797F8019A7D5A33303CA54EDADF3BA486F1
5,645,116 UART: Caliptra RT
5,645,461 UART: [state] CFI Enabled
5,753,929 UART: [rt] RT listening for mailbox commands...
5,754,599 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,877,661 UART: [rt]cmd =0x41544d4e, len=14344
5,879,054 >>> mbox cmd response: failed
5,879,054 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,001,590 UART: [rt]cmd =0x41544d4e, len=14344
6,003,161 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
893,296 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,421 UART: [kat] ++
897,573 UART: [kat] sha1
901,835 UART: [kat] SHA2-256
903,775 UART: [kat] SHA2-384
906,590 UART: [kat] SHA2-512-ACC
908,491 UART: [kat] ECC-384
917,880 UART: [kat] HMAC-384Kdf
922,464 UART: [kat] LMS
1,170,792 UART: [kat] --
1,171,699 UART: [cold-reset] ++
1,172,169 UART: [fht] FHT @ 0x50003400
1,174,674 UART: [idev] ++
1,174,842 UART: [idev] CDI.KEYID = 6
1,175,202 UART: [idev] SUBJECT.KEYID = 7
1,175,626 UART: [idev] UDS.KEYID = 0
1,175,971 ready_for_fw is high
1,175,971 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,392 UART: [idev] Erasing UDS.KEYID = 0
1,199,879 UART: [idev] Sha1 KeyId Algorithm
1,208,303 UART: [idev] --
1,209,481 UART: [ldev] ++
1,209,649 UART: [ldev] CDI.KEYID = 6
1,210,012 UART: [ldev] SUBJECT.KEYID = 5
1,210,438 UART: [ldev] AUTHORITY.KEYID = 7
1,210,901 UART: [ldev] FE.KEYID = 1
1,216,315 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,597 UART: [ldev] --
1,281,868 UART: [fwproc] Wait for Commands...
1,282,582 UART: [fwproc] Recv command 0x46574c44
1,283,310 UART: [fwproc] Recv'd Img size: 114332 bytes
3,122,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,385 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,689 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,316,388 >>> mbox cmd response: success
3,317,472 UART: [afmc] ++
3,317,640 UART: [afmc] CDI.KEYID = 6
3,318,002 UART: [afmc] SUBJECT.KEYID = 7
3,318,427 UART: [afmc] AUTHORITY.KEYID = 5
3,353,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,644 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,353 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,245 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,956 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,771 UART: [afmc] --
3,396,875 UART: [cold-reset] --
3,397,677 UART: [state] Locking Datavault
3,398,836 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,440 UART: [state] Locking ICCM
3,400,042 UART: [exit] Launching FMC @ 0x40000130
3,405,371 UART:
3,405,387 UART: Running Caliptra FMC ...
3,405,795 UART:
3,405,849 UART: [state] CFI Enabled
3,416,089 UART: [fht] FMC Alias Private Key: 7
3,523,823 UART: [art] Extend RT PCRs Done
3,524,251 UART: [art] Lock RT PCRs Done
3,525,893 UART: [art] Populate DV Done
3,534,037 UART: [fht] FMC Alias Private Key: 7
3,534,971 UART: [art] Derive CDI
3,535,251 UART: [art] Store in in slot 0x4
3,620,586 UART: [art] Derive Key Pair
3,620,946 UART: [art] Store priv key in slot 0x5
3,634,412 UART: [art] Derive Key Pair - Done
3,649,255 UART: [art] Signing Cert with AUTHO
3,649,735 UART: RITY.KEYID = 7
3,664,773 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,538 UART: [art] PUB.X = 0575FB0F397AABE48CF8750C83685079D20A274836ECBF64B77AF7E08D6937AC0EBCF5E93782A79833709C3E94D4260B
3,672,294 UART: [art] PUB.Y = E25ACB4C2C449C8F2FA957427F23BE5F9F08211D30D836428C63BF9343DEC6E40D43EA9EF3B365E36FBBAC930C1019D5
3,679,249 UART: [art] SIG.R = A27EFD1E069B9CED5F5DBBC55A35445DFA4C2AC238AD5BC8D63AA3070A3DEE52E137F8CED83ADB008B02638CB88D1213
3,686,011 UART: [art] SIG.S = 9AA571ED4D40F258256964118E57C35AAF5CF96EF210EE027921365B74C347C763DB0C3811AB56B2000C2E69CB8F500A
3,709,752 UART: Caliptra RT
3,710,005 UART: [state] CFI Enabled
3,816,950 UART: [rt] RT listening for mailbox commands...
3,817,620 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,474 UART: [rt]cmd =0x41544d4e, len=14344
3,942,127 >>> mbox cmd response: failed
3,942,127 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,064,711 UART: [rt]cmd =0x41544d4e, len=14344
4,066,288 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,401 ready_for_fw is high
1,060,401 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,170,666 >>> mbox cmd response: success
3,232,449 UART:
3,232,465 UART: Running Caliptra FMC ...
3,232,873 UART:
3,232,927 UART: [state] CFI Enabled
3,243,717 UART: [fht] FMC Alias Private Key: 7
3,351,139 UART: [art] Extend RT PCRs Done
3,351,567 UART: [art] Lock RT PCRs Done
3,353,017 UART: [art] Populate DV Done
3,361,343 UART: [fht] FMC Alias Private Key: 7
3,362,461 UART: [art] Derive CDI
3,362,741 UART: [art] Store in in slot 0x4
3,448,318 UART: [art] Derive Key Pair
3,448,678 UART: [art] Store priv key in slot 0x5
3,462,298 UART: [art] Derive Key Pair - Done
3,476,953 UART: [art] Signing Cert with AUTHO
3,477,433 UART: RITY.KEYID = 7
3,492,625 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,390 UART: [art] PUB.X = BE64FA3ADC37BF7A9640C526B6FDBF904468F0BB06A5432D7A8197BA4CDB4AF975A1874FDE97A7510A950070A261F4DF
3,500,148 UART: [art] PUB.Y = 4BE6982E4748A181D2AE2A70CB1F7CD32361127818B971906D916CC600ABC22951B3CA6BB011EEECA34528FAB9B852E4
3,507,084 UART: [art] SIG.R = C3429CA90AD0FCB13F5E13AAC4A148B4B302E442F8319F84127B823F18844C9CE3F92524D449F464885BC0A1524AE19B
3,513,852 UART: [art] SIG.S = 40657AA7B916BCD0B82E0DC4A228FFAD3888D040EA7846919764DE1E350663BB7A967B7E59D179C42DE7C5AB1A562F61
3,537,713 UART: Caliptra RT
3,537,966 UART: [state] CFI Enabled
3,645,248 UART: [rt] RT listening for mailbox commands...
3,645,918 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,894 UART: [rt]cmd =0x41544d4e, len=14344
3,770,597 >>> mbox cmd response: failed
3,770,597 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,893,273 UART: [rt]cmd =0x41544d4e, len=14344
3,894,656 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
893,539 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,664 UART: [kat] ++
897,816 UART: [kat] sha1
901,948 UART: [kat] SHA2-256
903,888 UART: [kat] SHA2-384
906,455 UART: [kat] SHA2-512-ACC
908,356 UART: [kat] ECC-384
918,397 UART: [kat] HMAC-384Kdf
922,873 UART: [kat] LMS
1,171,201 UART: [kat] --
1,172,196 UART: [cold-reset] ++
1,172,652 UART: [fht] FHT @ 0x50003400
1,175,257 UART: [idev] ++
1,175,425 UART: [idev] CDI.KEYID = 6
1,175,785 UART: [idev] SUBJECT.KEYID = 7
1,176,209 UART: [idev] UDS.KEYID = 0
1,176,554 ready_for_fw is high
1,176,554 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,183 UART: [idev] Erasing UDS.KEYID = 0
1,201,398 UART: [idev] Sha1 KeyId Algorithm
1,209,774 UART: [idev] --
1,210,916 UART: [ldev] ++
1,211,084 UART: [ldev] CDI.KEYID = 6
1,211,447 UART: [ldev] SUBJECT.KEYID = 5
1,211,873 UART: [ldev] AUTHORITY.KEYID = 7
1,212,336 UART: [ldev] FE.KEYID = 1
1,217,274 UART: [ldev] Erasing FE.KEYID = 1
1,244,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,002 UART: [ldev] --
1,283,375 UART: [fwproc] Wait for Commands...
1,284,043 UART: [fwproc] Recv command 0x46574c44
1,284,771 UART: [fwproc] Recv'd Img size: 114332 bytes
3,128,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,544 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,848 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,321,547 >>> mbox cmd response: success
3,322,803 UART: [afmc] ++
3,322,971 UART: [afmc] CDI.KEYID = 6
3,323,333 UART: [afmc] SUBJECT.KEYID = 7
3,323,758 UART: [afmc] AUTHORITY.KEYID = 5
3,359,614 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,975 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,723 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,432 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,324 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,035 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,924 UART: [afmc] --
3,402,824 UART: [cold-reset] --
3,403,844 UART: [state] Locking Datavault
3,404,807 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,411 UART: [state] Locking ICCM
3,405,853 UART: [exit] Launching FMC @ 0x40000130
3,411,182 UART:
3,411,198 UART: Running Caliptra FMC ...
3,411,606 UART:
3,411,749 UART: [state] CFI Enabled
3,422,433 UART: [fht] FMC Alias Private Key: 7
3,530,251 UART: [art] Extend RT PCRs Done
3,530,679 UART: [art] Lock RT PCRs Done
3,532,223 UART: [art] Populate DV Done
3,540,319 UART: [fht] FMC Alias Private Key: 7
3,541,307 UART: [art] Derive CDI
3,541,587 UART: [art] Store in in slot 0x4
3,627,654 UART: [art] Derive Key Pair
3,628,014 UART: [art] Store priv key in slot 0x5
3,641,530 UART: [art] Derive Key Pair - Done
3,656,215 UART: [art] Signing Cert with AUTHO
3,656,695 UART: RITY.KEYID = 7
3,671,275 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,040 UART: [art] PUB.X = 4B15548580A96AE779C0D848132D3CA8F8C1F8437D196279E21789F09EB392CA794C3B1C2122A82FCC2AEDD4F741CBD0
3,678,816 UART: [art] PUB.Y = 691DDB7C13E5B0876477A5447BF863E6ED9ED65A1456B9A2E2F9DFC06CAEC595A933829F00EB4EBA471255695BDF4C1B
3,685,758 UART: [art] SIG.R = 0BFF7AF791FC9098DB9E3BE34E2D6A696B89F4390C212306F664C6D7CDD20F85C1AAAE7A5FBC6BAF8BB7B496BB7BE3CD
3,692,546 UART: [art] SIG.S = 83504422DF6D9E0149A3539B5D022686375A40FB72A7AE597B3BBDF7743DF4B82F9C975A3E467867B32648D16FBE4432
3,716,161 UART: Caliptra RT
3,716,506 UART: [state] CFI Enabled
3,824,582 UART: [rt] RT listening for mailbox commands...
3,825,252 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,378 UART: [rt]cmd =0x41544d4e, len=14344
3,949,799 >>> mbox cmd response: failed
3,949,799 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,072,125 UART: [rt]cmd =0x41544d4e, len=14344
4,073,492 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,608 ready_for_fw is high
1,060,608 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,172,541 >>> mbox cmd response: success
3,235,344 UART:
3,235,360 UART: Running Caliptra FMC ...
3,235,768 UART:
3,235,911 UART: [state] CFI Enabled
3,246,647 UART: [fht] FMC Alias Private Key: 7
3,354,765 UART: [art] Extend RT PCRs Done
3,355,193 UART: [art] Lock RT PCRs Done
3,356,543 UART: [art] Populate DV Done
3,364,753 UART: [fht] FMC Alias Private Key: 7
3,365,699 UART: [art] Derive CDI
3,365,979 UART: [art] Store in in slot 0x4
3,451,442 UART: [art] Derive Key Pair
3,451,802 UART: [art] Store priv key in slot 0x5
3,465,114 UART: [art] Derive Key Pair - Done
3,479,389 UART: [art] Signing Cert with AUTHO
3,479,869 UART: RITY.KEYID = 7
3,495,183 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,948 UART: [art] PUB.X = D83BA7B7806E0714F8BB12E2F3E87593418DAB516D1955355FEADA7390E53884A6514B1104D9EB4C011A93ABED6E4E03
3,502,712 UART: [art] PUB.Y = 808DD4613CB20EBA36BB07C7E913130B89839155A6104525E9F6A0A5CE03055B4F824C1B7D9AC26F917B7FE52DB1C4D2
3,509,653 UART: [art] SIG.R = 28D63B3A2BDD60503DF124286F8ECC86A1837D90FD2FD2A62A3B261B6E2E9D69D6F1BC5B526634ED32E714914633C516
3,516,429 UART: [art] SIG.S = 3C83535F76CA9D5F22FB9A08B806EA21F43040A52E8FF6E03E4D99B6019BD0AED2262EB489548771DCBFD46BC6DD5C75
3,540,327 UART: Caliptra RT
3,540,672 UART: [state] CFI Enabled
3,648,199 UART: [rt] RT listening for mailbox commands...
3,648,869 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,775 UART: [rt]cmd =0x41544d4e, len=14344
3,773,298 >>> mbox cmd response: failed
3,773,298 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,895,934 UART: [rt]cmd =0x41544d4e, len=14344
3,897,313 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,330 UART: [kat] SHA2-256
890,880 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,009 UART: [kat] ++
895,161 UART: [kat] sha1
899,441 UART: [kat] SHA2-256
901,381 UART: [kat] SHA2-384
903,938 UART: [kat] SHA2-512-ACC
905,839 UART: [kat] ECC-384
915,432 UART: [kat] HMAC-384Kdf
920,006 UART: [kat] LMS
1,168,318 UART: [kat] --
1,169,063 UART: [cold-reset] ++
1,169,431 UART: [fht] FHT @ 0x50003400
1,172,029 UART: [idev] ++
1,172,197 UART: [idev] CDI.KEYID = 6
1,172,558 UART: [idev] SUBJECT.KEYID = 7
1,172,983 UART: [idev] UDS.KEYID = 0
1,173,329 ready_for_fw is high
1,173,329 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,087 UART: [idev] Erasing UDS.KEYID = 0
1,197,867 UART: [idev] Sha1 KeyId Algorithm
1,206,729 UART: [idev] --
1,207,724 UART: [ldev] ++
1,207,892 UART: [ldev] CDI.KEYID = 6
1,208,256 UART: [ldev] SUBJECT.KEYID = 5
1,208,683 UART: [ldev] AUTHORITY.KEYID = 7
1,209,146 UART: [ldev] FE.KEYID = 1
1,214,308 UART: [ldev] Erasing FE.KEYID = 1
1,241,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,168 UART: [ldev] --
1,280,628 UART: [fwproc] Wait for Commands...
1,281,417 UART: [fwproc] Recv command 0x46574c44
1,282,150 UART: [fwproc] Recv'd Img size: 114332 bytes
3,123,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,355 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,664 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,316,424 >>> mbox cmd response: success
3,317,563 UART: [afmc] ++
3,317,731 UART: [afmc] CDI.KEYID = 6
3,318,094 UART: [afmc] SUBJECT.KEYID = 7
3,318,520 UART: [afmc] AUTHORITY.KEYID = 5
3,354,092 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,508 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,259 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,969 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,859 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,570 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,374 UART: [afmc] --
3,397,456 UART: [cold-reset] --
3,398,280 UART: [state] Locking Datavault
3,399,325 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,929 UART: [state] Locking ICCM
3,400,381 UART: [exit] Launching FMC @ 0x40000130
3,405,710 UART:
3,405,726 UART: Running Caliptra FMC ...
3,406,134 UART:
3,406,188 UART: [state] CFI Enabled
3,416,558 UART: [fht] FMC Alias Private Key: 7
3,524,728 UART: [art] Extend RT PCRs Done
3,525,156 UART: [art] Lock RT PCRs Done
3,526,570 UART: [art] Populate DV Done
3,534,820 UART: [fht] FMC Alias Private Key: 7
3,535,790 UART: [art] Derive CDI
3,536,070 UART: [art] Store in in slot 0x4
3,621,829 UART: [art] Derive Key Pair
3,622,189 UART: [art] Store priv key in slot 0x5
3,634,887 UART: [art] Derive Key Pair - Done
3,649,417 UART: [art] Signing Cert with AUTHO
3,649,897 UART: RITY.KEYID = 7
3,664,947 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,712 UART: [art] PUB.X = 11CD8188DCDD612BA945A26C854AB972BBA9D896A37F8AC4DBCAC6D5BF4BA8B8655E31F5C79CF81C305C1FA0AD3499EF
3,672,508 UART: [art] PUB.Y = 33D1BA9B64BECCFB275268E104A5F0B86160424A69EA6F1693AE6AFBB178D1EFDF90D29EE7739390DDC8DBA9A246FF58
3,679,475 UART: [art] SIG.R = 9CD57E1FBCF75D0AC107E7E18F5278298B3EE9AD387163FC43DFB7526880820472ACBB060BB639BE37439240361B45C8
3,686,234 UART: [art] SIG.S = C728CD2F22393F9476C845CFD9B777E8EB305D6D2205031CC3F692FC3CC9B55291C00A20142F97C1D40EA5A3DC8BEA00
3,709,719 UART: Caliptra RT
3,709,972 UART: [state] CFI Enabled
3,816,767 UART: [rt] RT listening for mailbox commands...
3,817,437 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,583 UART: [rt]cmd =0x41544d4e, len=14344
3,941,960 >>> mbox cmd response: failed
3,941,960 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,064,654 UART: [rt]cmd =0x41544d4e, len=14344
4,066,017 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,724 ready_for_fw is high
1,055,724 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,175,185 >>> mbox cmd response: success
3,236,918 UART:
3,236,934 UART: Running Caliptra FMC ...
3,237,342 UART:
3,237,396 UART: [state] CFI Enabled
3,247,348 UART: [fht] FMC Alias Private Key: 7
3,354,996 UART: [art] Extend RT PCRs Done
3,355,424 UART: [art] Lock RT PCRs Done
3,357,274 UART: [art] Populate DV Done
3,365,710 UART: [fht] FMC Alias Private Key: 7
3,366,646 UART: [art] Derive CDI
3,366,926 UART: [art] Store in in slot 0x4
3,452,263 UART: [art] Derive Key Pair
3,452,623 UART: [art] Store priv key in slot 0x5
3,465,535 UART: [art] Derive Key Pair - Done
3,480,451 UART: [art] Signing Cert with AUTHO
3,480,931 UART: RITY.KEYID = 7
3,495,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,732 UART: [art] PUB.X = F9A4DA6283605ECFBFD1486B3CA69EDA290A84CD24D899522A8FFC274442F3F92EF621DED980B1BDBB19E1A9AE38160B
3,503,516 UART: [art] PUB.Y = 3F1E6C12ECDF5BA77062C2DFDD7FFF78861711D94B57E8FAC08172BFFCDFB50197568121B678B15F748668181E5E05A1
3,510,470 UART: [art] SIG.R = 71D42FE065EA85F817712619F1DB9B4B744A3F38DB63223427463891EB8736063D995421CB6C3A8C6D01E747B7EADAC5
3,517,234 UART: [art] SIG.S = 0B4D6ED6B4DC2B8C7BE8B4451D6752612C6BA7B03747A3E1A0B40381E1ECC245336E41728FC2F9AC4A76C718F74FECB7
3,540,549 UART: Caliptra RT
3,540,802 UART: [state] CFI Enabled
3,648,219 UART: [rt] RT listening for mailbox commands...
3,648,889 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,999 UART: [rt]cmd =0x41544d4e, len=14344
3,773,506 >>> mbox cmd response: failed
3,773,506 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,896,060 UART: [rt]cmd =0x41544d4e, len=14344
3,897,443 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
891,181 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,310 UART: [kat] ++
895,462 UART: [kat] sha1
899,848 UART: [kat] SHA2-256
901,788 UART: [kat] SHA2-384
904,371 UART: [kat] SHA2-512-ACC
906,272 UART: [kat] ECC-384
915,875 UART: [kat] HMAC-384Kdf
920,493 UART: [kat] LMS
1,168,805 UART: [kat] --
1,169,820 UART: [cold-reset] ++
1,170,240 UART: [fht] FHT @ 0x50003400
1,173,112 UART: [idev] ++
1,173,280 UART: [idev] CDI.KEYID = 6
1,173,641 UART: [idev] SUBJECT.KEYID = 7
1,174,066 UART: [idev] UDS.KEYID = 0
1,174,412 ready_for_fw is high
1,174,412 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,824 UART: [idev] Erasing UDS.KEYID = 0
1,198,536 UART: [idev] Sha1 KeyId Algorithm
1,207,310 UART: [idev] --
1,208,379 UART: [ldev] ++
1,208,547 UART: [ldev] CDI.KEYID = 6
1,208,911 UART: [ldev] SUBJECT.KEYID = 5
1,209,338 UART: [ldev] AUTHORITY.KEYID = 7
1,209,801 UART: [ldev] FE.KEYID = 1
1,214,647 UART: [ldev] Erasing FE.KEYID = 1
1,240,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,479 UART: [ldev] --
1,279,965 UART: [fwproc] Wait for Commands...
1,280,550 UART: [fwproc] Recv command 0x46574c44
1,281,283 UART: [fwproc] Recv'd Img size: 114332 bytes
3,132,926 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,161,154 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,463 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,326,279 >>> mbox cmd response: success
3,327,316 UART: [afmc] ++
3,327,484 UART: [afmc] CDI.KEYID = 6
3,327,847 UART: [afmc] SUBJECT.KEYID = 7
3,328,273 UART: [afmc] AUTHORITY.KEYID = 5
3,363,669 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,744 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,454 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,344 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,055 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,405,685 UART: [afmc] --
3,406,697 UART: [cold-reset] --
3,407,303 UART: [state] Locking Datavault
3,408,572 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,176 UART: [state] Locking ICCM
3,409,706 UART: [exit] Launching FMC @ 0x40000130
3,415,035 UART:
3,415,051 UART: Running Caliptra FMC ...
3,415,459 UART:
3,415,602 UART: [state] CFI Enabled
3,426,486 UART: [fht] FMC Alias Private Key: 7
3,534,326 UART: [art] Extend RT PCRs Done
3,534,754 UART: [art] Lock RT PCRs Done
3,536,384 UART: [art] Populate DV Done
3,544,518 UART: [fht] FMC Alias Private Key: 7
3,545,668 UART: [art] Derive CDI
3,545,948 UART: [art] Store in in slot 0x4
3,631,253 UART: [art] Derive Key Pair
3,631,613 UART: [art] Store priv key in slot 0x5
3,644,797 UART: [art] Derive Key Pair - Done
3,659,709 UART: [art] Signing Cert with AUTHO
3,660,189 UART: RITY.KEYID = 7
3,675,391 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,156 UART: [art] PUB.X = 138B8F432818934FE18ECDAA3ED40B9A5E8992B9A1284577A7AFF9145966CDD97041875ED7C5B70698A445FB1572137E
3,682,920 UART: [art] PUB.Y = 4FAA1BBC0A9D35675953F83FB1974CC889C697AB46642DC1E6E7BD245DDD1D426C260C79A75AA574553191EE6F1D81DD
3,689,876 UART: [art] SIG.R = 9579DB2C965599E873FD40440F70DB7092F9F3FC622ACAA6A579627651EDA73835961692452FA4EBD1CBBFF270DE91F4
3,696,649 UART: [art] SIG.S = 36842EC21B49FF8A66324972DB9AFC5DA89500B9FC942FE37358775D7540F6A344F933BDF1CD85F8721F8C7F10C58F33
3,720,462 UART: Caliptra RT
3,720,807 UART: [state] CFI Enabled
3,828,703 UART: [rt] RT listening for mailbox commands...
3,829,373 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,745 UART: [rt]cmd =0x41544d4e, len=14344
3,953,928 >>> mbox cmd response: failed
3,953,928 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,076,334 UART: [rt]cmd =0x41544d4e, len=14344
4,077,683 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,243 ready_for_fw is high
1,056,243 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,165,446 >>> mbox cmd response: success
3,227,321 UART:
3,227,337 UART: Running Caliptra FMC ...
3,227,745 UART:
3,227,888 UART: [state] CFI Enabled
3,238,912 UART: [fht] FMC Alias Private Key: 7
3,346,752 UART: [art] Extend RT PCRs Done
3,347,180 UART: [art] Lock RT PCRs Done
3,348,784 UART: [art] Populate DV Done
3,356,910 UART: [fht] FMC Alias Private Key: 7
3,358,020 UART: [art] Derive CDI
3,358,300 UART: [art] Store in in slot 0x4
3,444,483 UART: [art] Derive Key Pair
3,444,843 UART: [art] Store priv key in slot 0x5
3,458,219 UART: [art] Derive Key Pair - Done
3,472,634 UART: [art] Signing Cert with AUTHO
3,473,114 UART: RITY.KEYID = 7
3,488,110 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,875 UART: [art] PUB.X = BFB10A7D3C8A1970B20916CBFE8C31A0AF3CB41017AF6F11EBD4328ACFC017FDFC5AF58DB5202197839D825A1EA3FB83
3,495,661 UART: [art] PUB.Y = 96163D703AB98545FF54142ED6863B3E5D1CAB41C5D9F2EC1595D899D7D17ED6E953F185C988C936EACAC2164151758E
3,502,615 UART: [art] SIG.R = E6060CE2556AF77BE8BE46226D3F5C53B3DB61EC2ED4CCCA1060A61BA484523F6BDAD6E450F1CA0E8D3046B640B99C8D
3,509,396 UART: [art] SIG.S = EEF774E4796B7CAC77ECDFF46E236EE7603E3D27C013899B880C55EBD10F29371AFBF4124EB18BFF21BAD81ACC80A834
3,533,125 UART: Caliptra RT
3,533,470 UART: [state] CFI Enabled
3,641,551 UART: [rt] RT listening for mailbox commands...
3,642,221 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,375 UART: [rt]cmd =0x41544d4e, len=14344
3,766,882 >>> mbox cmd response: failed
3,766,882 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,316 UART: [rt]cmd =0x41544d4e, len=14344
3,891,115 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,414 UART: [state] LifecycleState = Unprovisioned
86,069 UART: [state] DebugLocked = No
86,699 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,295 UART: [kat] SHA2-256
882,226 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,341 UART: [kat] ++
886,493 UART: [kat] sha1
890,683 UART: [kat] SHA2-256
892,621 UART: [kat] SHA2-384
895,418 UART: [kat] SHA2-512-ACC
897,319 UART: [kat] ECC-384
902,746 UART: [kat] HMAC-384Kdf
907,194 UART: [kat] LMS
1,475,390 UART: [kat] --
1,476,459 UART: [cold-reset] ++
1,477,003 UART: [fht] Storing FHT @ 0x50003400
1,479,776 UART: [idev] ++
1,479,944 UART: [idev] CDI.KEYID = 6
1,480,304 UART: [idev] SUBJECT.KEYID = 7
1,480,728 UART: [idev] UDS.KEYID = 0
1,481,073 ready_for_fw is high
1,481,073 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,622 UART: [idev] Erasing UDS.KEYID = 0
1,505,386 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,968 UART: [idev] --
1,515,155 UART: [ldev] ++
1,515,323 UART: [ldev] CDI.KEYID = 6
1,515,686 UART: [ldev] SUBJECT.KEYID = 5
1,516,112 UART: [ldev] AUTHORITY.KEYID = 7
1,516,575 UART: [ldev] FE.KEYID = 1
1,521,527 UART: [ldev] Erasing FE.KEYID = 1
1,546,754 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,762 UART: [ldev] --
1,586,231 UART: [fwproc] Waiting for Commands...
1,587,062 UART: [fwproc] Received command 0x46574c44
1,587,853 UART: [fwproc] Received Image of size 114332 bytes
5,045,316 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,074,260 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,103,612 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,239,563 >>> mbox cmd response: success
5,240,675 UART: [afmc] ++
5,240,843 UART: [afmc] CDI.KEYID = 6
5,241,205 UART: [afmc] SUBJECT.KEYID = 7
5,241,630 UART: [afmc] AUTHORITY.KEYID = 5
5,276,306 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,292,530 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,293,310 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,299,019 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,304,911 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,310,612 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,318,396 UART: [afmc] --
5,319,388 UART: [cold-reset] --
5,320,178 UART: [state] Locking Datavault
5,321,415 UART: [state] Locking PCR0, PCR1 and PCR31
5,322,019 UART: [state] Locking ICCM
5,322,659 UART: [exit] Launching FMC @ 0x40000130
5,327,988 UART:
5,328,004 UART: Running Caliptra FMC ...
5,328,412 UART:
5,328,466 UART: [state] CFI Enabled
5,339,086 UART: [fht] FMC Alias Private Key: 7
5,448,076 UART: [art] Extend RT PCRs Done
5,448,504 UART: [art] Lock RT PCRs Done
5,450,146 UART: [art] Populate DV Done
5,458,424 UART: [fht] FMC Alias Private Key: 7
5,459,496 UART: [art] Derive CDI
5,459,776 UART: [art] Store in in slot 0x4
5,545,287 UART: [art] Derive Key Pair
5,545,647 UART: [art] Store priv key in slot 0x5
5,558,675 UART: [art] Derive Key Pair - Done
5,573,129 UART: [art] Signing Cert with AUTHO
5,573,609 UART: RITY.KEYID = 7
5,588,827 UART: [art] Erasing AUTHORITY.KEYID = 7
5,589,592 UART: [art] PUB.X = D658DA3085895E7C9F5090F5B8D91B72C4824A226BCAA4C3508B3840A14E94F250FDFDA85BEF36A60DA6F1BB12D04689
5,596,369 UART: [art] PUB.Y = 246DED612640F458118101D130F8DED63346265ED869FB7B330B97F2620A9ACE921415ECC92102B69F2B99B0EDED50FF
5,603,311 UART: [art] SIG.R = 6CCB2D6F15FC0BD8EC3DA4DD0701DEA3B8CD3D2C8D95D4477D5AD093469CAA360460ABB155348ED1FD3CD8B43D410808
5,610,085 UART: [art] SIG.S = AF96FC0549321893B3A7517A1BCC10691DB1E799D0259EE1B0A0E035D26113AD5D3F90F57F28444211DF520B6E575C1C
5,633,760 UART: Caliptra RT
5,634,013 UART: [state] CFI Enabled
5,742,210 UART: [rt] RT listening for mailbox commands...
5,742,880 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,866,270 UART: [rt]cmd =0x41544d4e, len=14344
7,265,800 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,109 ready_for_fw is high
1,362,109 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,085,399 >>> mbox cmd response: success
5,147,038 UART:
5,147,054 UART: Running Caliptra FMC ...
5,147,462 UART:
5,147,516 UART: [state] CFI Enabled
5,157,978 UART: [fht] FMC Alias Private Key: 7
5,266,058 UART: [art] Extend RT PCRs Done
5,266,486 UART: [art] Lock RT PCRs Done
5,268,080 UART: [art] Populate DV Done
5,276,394 UART: [fht] FMC Alias Private Key: 7
5,277,394 UART: [art] Derive CDI
5,277,674 UART: [art] Store in in slot 0x4
5,363,391 UART: [art] Derive Key Pair
5,363,751 UART: [art] Store priv key in slot 0x5
5,376,303 UART: [art] Derive Key Pair - Done
5,391,191 UART: [art] Signing Cert with AUTHO
5,391,671 UART: RITY.KEYID = 7
5,406,571 UART: [art] Erasing AUTHORITY.KEYID = 7
5,407,336 UART: [art] PUB.X = 7A12DDCB67502D5B1C7DA39D375AD8890150212E69A3B956C7448A1DA9EADD774B1F015D75AB3229BF7B42D400827B2B
5,414,086 UART: [art] PUB.Y = 2741CCF460B5E73AAAF0D3EAEA3CFF4C1DED06167B1949ECC4D97F75BD8EF44DD4287C05AF95627EFA99958254167650
5,421,046 UART: [art] SIG.R = 406964429FEAEDE64396389D8D6A285653CE89A14DD64212B2A753E3575CDA6770B443D1CA79C881BCC95D382FCB1D1F
5,427,822 UART: [art] SIG.S = A185894F195E00D498DF98DFFC0F6D0B2B58001C73CC7CC44D8EDB4A329AAF0327C71505484871CAB35F5F8EA327B9C8
5,451,209 UART: Caliptra RT
5,451,462 UART: [state] CFI Enabled
5,559,017 UART: [rt] RT listening for mailbox commands...
5,559,687 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,683,027 UART: [rt]cmd =0x41544d4e, len=14344
7,071,100 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,582 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,110 UART: [kat] SHA2-256
882,041 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,156 UART: [kat] ++
886,308 UART: [kat] sha1
890,532 UART: [kat] SHA2-256
892,470 UART: [kat] SHA2-384
895,165 UART: [kat] SHA2-512-ACC
897,066 UART: [kat] ECC-384
902,731 UART: [kat] HMAC-384Kdf
907,409 UART: [kat] LMS
1,475,605 UART: [kat] --
1,476,606 UART: [cold-reset] ++
1,476,962 UART: [fht] Storing FHT @ 0x50003400
1,479,889 UART: [idev] ++
1,480,057 UART: [idev] CDI.KEYID = 6
1,480,417 UART: [idev] SUBJECT.KEYID = 7
1,480,841 UART: [idev] UDS.KEYID = 0
1,481,186 ready_for_fw is high
1,481,186 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,935 UART: [idev] Erasing UDS.KEYID = 0
1,506,143 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,555 UART: [idev] --
1,515,814 UART: [ldev] ++
1,515,982 UART: [ldev] CDI.KEYID = 6
1,516,345 UART: [ldev] SUBJECT.KEYID = 5
1,516,771 UART: [ldev] AUTHORITY.KEYID = 7
1,517,234 UART: [ldev] FE.KEYID = 1
1,522,272 UART: [ldev] Erasing FE.KEYID = 1
1,547,225 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,327 UART: [ldev] --
1,586,594 UART: [fwproc] Waiting for Commands...
1,587,319 UART: [fwproc] Received command 0x46574c44
1,588,110 UART: [fwproc] Received Image of size 114332 bytes
5,083,026 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,112,054 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,141,406 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,277,257 >>> mbox cmd response: success
5,278,331 UART: [afmc] ++
5,278,499 UART: [afmc] CDI.KEYID = 6
5,278,861 UART: [afmc] SUBJECT.KEYID = 7
5,279,286 UART: [afmc] AUTHORITY.KEYID = 5
5,314,668 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,331,054 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,331,834 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,337,543 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,343,435 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,349,136 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,356,814 UART: [afmc] --
5,357,846 UART: [cold-reset] --
5,358,634 UART: [state] Locking Datavault
5,359,597 UART: [state] Locking PCR0, PCR1 and PCR31
5,360,201 UART: [state] Locking ICCM
5,360,623 UART: [exit] Launching FMC @ 0x40000130
5,365,952 UART:
5,365,968 UART: Running Caliptra FMC ...
5,366,376 UART:
5,366,519 UART: [state] CFI Enabled
5,377,551 UART: [fht] FMC Alias Private Key: 7
5,485,397 UART: [art] Extend RT PCRs Done
5,485,825 UART: [art] Lock RT PCRs Done
5,487,073 UART: [art] Populate DV Done
5,495,157 UART: [fht] FMC Alias Private Key: 7
5,496,209 UART: [art] Derive CDI
5,496,489 UART: [art] Store in in slot 0x4
5,582,174 UART: [art] Derive Key Pair
5,582,534 UART: [art] Store priv key in slot 0x5
5,596,194 UART: [art] Derive Key Pair - Done
5,610,790 UART: [art] Signing Cert with AUTHO
5,611,270 UART: RITY.KEYID = 7
5,626,326 UART: [art] Erasing AUTHORITY.KEYID = 7
5,627,091 UART: [art] PUB.X = 3808094AE1833FC9CE66C11292F185356E67036A764969A53C855F82E694B02A1A1F50CFB4942DAC108F063DED15DED5
5,633,849 UART: [art] PUB.Y = C18236ACC885D1581C18139F3246E0EFB818828BD5C76A20622720B801750CFBF456F166299FC4FC3B99B4652A545E52
5,640,789 UART: [art] SIG.R = 072F9BA5E2FAF21681735218086E2A78BC78E6CE3F35807881CFB55ECA8F2B2F9716A64F9238E797D625F755E808E136
5,647,550 UART: [art] SIG.S = 945647639100BEC6F20A6F5BD1576034DB9450A7280EBFD2C7D1CAE7367F2C68FE6D45457A8CE7AC425395843A093A66
5,671,460 UART: Caliptra RT
5,671,805 UART: [state] CFI Enabled
5,780,440 UART: [rt] RT listening for mailbox commands...
5,781,110 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,903,954 UART: [rt]cmd =0x41544d4e, len=14344
7,301,565 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,782 ready_for_fw is high
1,362,782 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,202,779 >>> mbox cmd response: success
5,264,474 UART:
5,264,490 UART: Running Caliptra FMC ...
5,264,898 UART:
5,265,041 UART: [state] CFI Enabled
5,275,841 UART: [fht] FMC Alias Private Key: 7
5,384,039 UART: [art] Extend RT PCRs Done
5,384,467 UART: [art] Lock RT PCRs Done
5,386,181 UART: [art] Populate DV Done
5,394,237 UART: [fht] FMC Alias Private Key: 7
5,395,189 UART: [art] Derive CDI
5,395,469 UART: [art] Store in in slot 0x4
5,480,378 UART: [art] Derive Key Pair
5,480,738 UART: [art] Store priv key in slot 0x5
5,493,972 UART: [art] Derive Key Pair - Done
5,508,791 UART: [art] Signing Cert with AUTHO
5,509,271 UART: RITY.KEYID = 7
5,524,071 UART: [art] Erasing AUTHORITY.KEYID = 7
5,524,836 UART: [art] PUB.X = F1C07B4F35A96B4BD170CE912F96263D73873DBF2C30B2EFC2410D2EEF9426DAF869B6ECEA091C667C2ECA25D2760BEC
5,531,617 UART: [art] PUB.Y = 9F33C5B8BFFDD27B22A7A8EF77F40FC5D5F8D32D36F4DD218E2A17A68D6E9B67368CB6E2A093EDEA75EBF3988AC57232
5,538,586 UART: [art] SIG.R = 7E242061475255FE3FAEF6BD401665EAACA3C43A46D8BBC75498DE5364787D4EC3B562DE9EF3D0853F5353FC2E84580F
5,545,363 UART: [art] SIG.S = EBC0E4958518B6E5FB0EF781E33CAB437087AE22FEA794687D8174FC5044554F46037AABAEC5107EFE1DE6DBA259AB6B
5,569,484 UART: Caliptra RT
5,569,829 UART: [state] CFI Enabled
5,677,400 UART: [rt] RT listening for mailbox commands...
5,678,070 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,800,930 UART: [rt]cmd =0x41544d4e, len=14344
7,194,393 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,302 UART: [state] LifecycleState = Unprovisioned
84,957 UART: [state] DebugLocked = No
85,441 UART: [state] WD Timer not started. Device not locked for debugging
86,670 UART: [kat] SHA2-256
892,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,445 UART: [kat] ++
896,597 UART: [kat] sha1
900,909 UART: [kat] SHA2-256
902,849 UART: [kat] SHA2-384
905,460 UART: [kat] SHA2-512-ACC
907,361 UART: [kat] ECC-384
916,950 UART: [kat] HMAC-384Kdf
921,528 UART: [kat] LMS
1,169,856 UART: [kat] --
1,170,659 UART: [cold-reset] ++
1,171,035 UART: [fht] FHT @ 0x50003400
1,173,674 UART: [idev] ++
1,173,842 UART: [idev] CDI.KEYID = 6
1,174,202 UART: [idev] SUBJECT.KEYID = 7
1,174,626 UART: [idev] UDS.KEYID = 0
1,174,971 ready_for_fw is high
1,174,971 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,528 UART: [idev] Erasing UDS.KEYID = 0
1,199,159 UART: [idev] Sha1 KeyId Algorithm
1,207,621 UART: [idev] --
1,208,849 UART: [ldev] ++
1,209,017 UART: [ldev] CDI.KEYID = 6
1,209,380 UART: [ldev] SUBJECT.KEYID = 5
1,209,806 UART: [ldev] AUTHORITY.KEYID = 7
1,210,269 UART: [ldev] FE.KEYID = 1
1,215,107 UART: [ldev] Erasing FE.KEYID = 1
1,241,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,453 UART: [ldev] --
1,280,744 UART: [fwproc] Wait for Commands...
1,281,524 UART: [fwproc] Recv command 0x46574c44
1,282,252 UART: [fwproc] Recv'd Img size: 114332 bytes
3,124,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,120 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,424 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,317,231 >>> mbox cmd response: success
3,318,487 UART: [afmc] ++
3,318,655 UART: [afmc] CDI.KEYID = 6
3,319,017 UART: [afmc] SUBJECT.KEYID = 7
3,319,442 UART: [afmc] AUTHORITY.KEYID = 5
3,354,696 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,637 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,385 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,094 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,986 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,697 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,450 UART: [afmc] --
3,397,432 UART: [cold-reset] --
3,398,420 UART: [state] Locking Datavault
3,399,419 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,023 UART: [state] Locking ICCM
3,400,605 UART: [exit] Launching FMC @ 0x40000130
3,405,934 UART:
3,405,950 UART: Running Caliptra FMC ...
3,406,358 UART:
3,406,412 UART: [state] CFI Enabled
3,416,866 UART: [fht] FMC Alias Private Key: 7
3,525,594 UART: [art] Extend RT PCRs Done
3,526,022 UART: [art] Lock RT PCRs Done
3,527,854 UART: [art] Populate DV Done
3,536,192 UART: [fht] FMC Alias Private Key: 7
3,537,362 UART: [art] Derive CDI
3,537,642 UART: [art] Store in in slot 0x4
3,623,293 UART: [art] Derive Key Pair
3,623,653 UART: [art] Store priv key in slot 0x5
3,636,895 UART: [art] Derive Key Pair - Done
3,651,578 UART: [art] Signing Cert with AUTHO
3,652,058 UART: RITY.KEYID = 7
3,667,100 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,865 UART: [art] PUB.X = 0D91BE9FF4F27AD0F17F73578E02F576790BC2E79FD2363B06BEEEAE863003020A0E1FA13ACAF7D3897ACDA11382952D
3,674,625 UART: [art] PUB.Y = DA969F2DC9AD4BF34879BFA020439C01A1B3E5C41F9AA36274330D3C321BD8F0C373553BB70F17E72ECBC28DDC81F3D1
3,681,582 UART: [art] SIG.R = EF6CA1D719481972C0707FFFA8FB29D4D8ADF5AB9715B594CE8D4790254BADBB9AE50F0B01FEB380FD4D7ED6FD54301A
3,688,367 UART: [art] SIG.S = 5527673952F11F91188C7F7207049F5185103FD07C3BE2C9FD5DB344CB45B631804F805D8E74594329D0D04D016D439B
3,711,885 UART: Caliptra RT
3,712,138 UART: [state] CFI Enabled
3,819,324 UART: [rt] RT listening for mailbox commands...
3,819,994 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,990 UART: [rt]cmd =0x41544d4e, len=14344
5,353,694 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,747 ready_for_fw is high
1,059,747 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,167,513 >>> mbox cmd response: success
3,229,676 UART:
3,229,692 UART: Running Caliptra FMC ...
3,230,100 UART:
3,230,154 UART: [state] CFI Enabled
3,240,784 UART: [fht] FMC Alias Private Key: 7
3,348,690 UART: [art] Extend RT PCRs Done
3,349,118 UART: [art] Lock RT PCRs Done
3,350,702 UART: [art] Populate DV Done
3,359,074 UART: [fht] FMC Alias Private Key: 7
3,360,066 UART: [art] Derive CDI
3,360,346 UART: [art] Store in in slot 0x4
3,445,863 UART: [art] Derive Key Pair
3,446,223 UART: [art] Store priv key in slot 0x5
3,459,507 UART: [art] Derive Key Pair - Done
3,474,492 UART: [art] Signing Cert with AUTHO
3,474,972 UART: RITY.KEYID = 7
3,490,032 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,797 UART: [art] PUB.X = 27FD96EF11BE445C0C57BE57D15F45D72D1E727C04387991CA17DB02A8F4994A762E350C087F60AE5EF90B27436D74EA
3,497,555 UART: [art] PUB.Y = 911398D8247BD84F51D27BEE18662B8ABB5B9142AC43C9657AF950378D5D0BB662C7C72879084160E4D50EC01517608E
3,504,492 UART: [art] SIG.R = 9D6B099C2BF77FED7D44C9EE8DFB7EE0044ABA2B6D5EFCEAA3EF364A5CD3F94085293A417C7D49740F77EDE36ED38532
3,511,277 UART: [art] SIG.S = 0DD75CE3DCFF64F9199788973BAA4FC83318CB4B6287246C0A38FE2472DE056E6CAD6465512F8C545C088030F6EFDEC2
3,534,596 UART: Caliptra RT
3,534,849 UART: [state] CFI Enabled
3,641,991 UART: [rt] RT listening for mailbox commands...
3,642,661 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,503 UART: [rt]cmd =0x41544d4e, len=14344
5,166,133 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
87,058 UART: [state] WD Timer not started. Device not locked for debugging
88,419 UART: [kat] SHA2-256
894,069 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,194 UART: [kat] ++
898,346 UART: [kat] sha1
902,692 UART: [kat] SHA2-256
904,632 UART: [kat] SHA2-384
907,365 UART: [kat] SHA2-512-ACC
909,266 UART: [kat] ECC-384
919,123 UART: [kat] HMAC-384Kdf
923,763 UART: [kat] LMS
1,172,091 UART: [kat] --
1,173,010 UART: [cold-reset] ++
1,173,502 UART: [fht] FHT @ 0x50003400
1,176,233 UART: [idev] ++
1,176,401 UART: [idev] CDI.KEYID = 6
1,176,761 UART: [idev] SUBJECT.KEYID = 7
1,177,185 UART: [idev] UDS.KEYID = 0
1,177,530 ready_for_fw is high
1,177,530 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,969 UART: [idev] Erasing UDS.KEYID = 0
1,202,070 UART: [idev] Sha1 KeyId Algorithm
1,210,586 UART: [idev] --
1,211,708 UART: [ldev] ++
1,211,876 UART: [ldev] CDI.KEYID = 6
1,212,239 UART: [ldev] SUBJECT.KEYID = 5
1,212,665 UART: [ldev] AUTHORITY.KEYID = 7
1,213,128 UART: [ldev] FE.KEYID = 1
1,218,476 UART: [ldev] Erasing FE.KEYID = 1
1,245,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,264 UART: [ldev] --
1,284,527 UART: [fwproc] Wait for Commands...
1,285,175 UART: [fwproc] Recv command 0x46574c44
1,285,903 UART: [fwproc] Recv'd Img size: 114332 bytes
3,130,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,948 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,252 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,323,953 >>> mbox cmd response: success
3,324,985 UART: [afmc] ++
3,325,153 UART: [afmc] CDI.KEYID = 6
3,325,515 UART: [afmc] SUBJECT.KEYID = 7
3,325,940 UART: [afmc] AUTHORITY.KEYID = 5
3,361,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,025 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,773 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,482 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,374 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,085 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,958 UART: [afmc] --
3,404,994 UART: [cold-reset] --
3,405,704 UART: [state] Locking Datavault
3,406,891 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,495 UART: [state] Locking ICCM
3,408,071 UART: [exit] Launching FMC @ 0x40000130
3,413,400 UART:
3,413,416 UART: Running Caliptra FMC ...
3,413,824 UART:
3,413,967 UART: [state] CFI Enabled
3,424,537 UART: [fht] FMC Alias Private Key: 7
3,532,529 UART: [art] Extend RT PCRs Done
3,532,957 UART: [art] Lock RT PCRs Done
3,534,699 UART: [art] Populate DV Done
3,542,747 UART: [fht] FMC Alias Private Key: 7
3,543,849 UART: [art] Derive CDI
3,544,129 UART: [art] Store in in slot 0x4
3,629,880 UART: [art] Derive Key Pair
3,630,240 UART: [art] Store priv key in slot 0x5
3,643,396 UART: [art] Derive Key Pair - Done
3,658,669 UART: [art] Signing Cert with AUTHO
3,659,149 UART: RITY.KEYID = 7
3,674,689 UART: [art] Erasing AUTHORITY.KEYID = 7
3,675,454 UART: [art] PUB.X = 389CC6BBB357A187C02D15D463E765327F76A0EF47825D991BC7CABA90CFCEEE69555B885AAD2C98F1DF011D2DCEB601
3,682,236 UART: [art] PUB.Y = 014623371289C1DBF75461121AF11717CF849E4ACEAB235854D04DDE9B3353EA77E0DDB85CF2DA79DDF4E79A23CAA99F
3,689,197 UART: [art] SIG.R = B65FDC186BF2AFF16D6C9807F94DB225451BF7E56F73C0CC8BBA542B07EA79B4101352E7D1F6FB35AAEDA9CC817BE2BF
3,695,987 UART: [art] SIG.S = 447A08E096CBE88E717C67D50664B9B5E56207EBB109BEE19939205DED533304FF8667EFE2E236C3A5CF97FFFAC22DE1
3,719,337 UART: Caliptra RT
3,719,682 UART: [state] CFI Enabled
3,828,402 UART: [rt] RT listening for mailbox commands...
3,829,072 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,028 UART: [rt]cmd =0x41544d4e, len=14344
5,371,982 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,694 ready_for_fw is high
1,060,694 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,161,354 >>> mbox cmd response: success
3,223,833 UART:
3,223,849 UART: Running Caliptra FMC ...
3,224,257 UART:
3,224,400 UART: [state] CFI Enabled
3,235,236 UART: [fht] FMC Alias Private Key: 7
3,343,416 UART: [art] Extend RT PCRs Done
3,343,844 UART: [art] Lock RT PCRs Done
3,345,256 UART: [art] Populate DV Done
3,353,650 UART: [fht] FMC Alias Private Key: 7
3,354,822 UART: [art] Derive CDI
3,355,102 UART: [art] Store in in slot 0x4
3,440,559 UART: [art] Derive Key Pair
3,440,919 UART: [art] Store priv key in slot 0x5
3,453,991 UART: [art] Derive Key Pair - Done
3,468,590 UART: [art] Signing Cert with AUTHO
3,469,070 UART: RITY.KEYID = 7
3,484,292 UART: [art] Erasing AUTHORITY.KEYID = 7
3,485,057 UART: [art] PUB.X = AE2D1F021284640B2D43D56B52A05EAB0E9276E3773B449B591DF22C2CD994D1B2541A8F6C342B504416C3AC34CD9871
3,491,820 UART: [art] PUB.Y = 6DB349F74720E4C752309C0764B3FED1BAA598D1C89634D9E22AF03E5517BC74EAFD0E3A772D254F72BBA77184CA0A91
3,498,771 UART: [art] SIG.R = B3E4085A0A1A0C535FF314CA8537A260EB9C2A079C79B3BB3893C228B6B4C44FEE4C8968016C4F04C328F749A78A5142
3,505,527 UART: [art] SIG.S = 6C524B5781215320E02AA9B86D451AF4B506411D8074E5717291A473D6A0F6AAE8B1C898A0159F4EF7C34311D8EE4184
3,529,441 UART: Caliptra RT
3,529,786 UART: [state] CFI Enabled
3,637,214 UART: [rt] RT listening for mailbox commands...
3,637,884 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,866 UART: [rt]cmd =0x41544d4e, len=14344
5,161,062 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
891,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,397 UART: [kat] ++
895,549 UART: [kat] sha1
899,859 UART: [kat] SHA2-256
901,799 UART: [kat] SHA2-384
904,424 UART: [kat] SHA2-512-ACC
906,325 UART: [kat] ECC-384
916,040 UART: [kat] HMAC-384Kdf
920,824 UART: [kat] LMS
1,169,136 UART: [kat] --
1,170,391 UART: [cold-reset] ++
1,170,911 UART: [fht] FHT @ 0x50003400
1,173,427 UART: [idev] ++
1,173,595 UART: [idev] CDI.KEYID = 6
1,173,956 UART: [idev] SUBJECT.KEYID = 7
1,174,381 UART: [idev] UDS.KEYID = 0
1,174,727 ready_for_fw is high
1,174,727 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,447 UART: [idev] Erasing UDS.KEYID = 0
1,199,505 UART: [idev] Sha1 KeyId Algorithm
1,208,501 UART: [idev] --
1,209,498 UART: [ldev] ++
1,209,666 UART: [ldev] CDI.KEYID = 6
1,210,030 UART: [ldev] SUBJECT.KEYID = 5
1,210,457 UART: [ldev] AUTHORITY.KEYID = 7
1,210,920 UART: [ldev] FE.KEYID = 1
1,216,110 UART: [ldev] Erasing FE.KEYID = 1
1,241,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,972 UART: [ldev] --
1,281,390 UART: [fwproc] Wait for Commands...
1,281,995 UART: [fwproc] Recv command 0x46574c44
1,282,728 UART: [fwproc] Recv'd Img size: 114332 bytes
3,130,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,281 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,590 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,323,320 >>> mbox cmd response: success
3,324,387 UART: [afmc] ++
3,324,555 UART: [afmc] CDI.KEYID = 6
3,324,918 UART: [afmc] SUBJECT.KEYID = 7
3,325,344 UART: [afmc] AUTHORITY.KEYID = 5
3,361,002 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,528 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,279 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,989 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,879 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,590 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,428 UART: [afmc] --
3,404,450 UART: [cold-reset] --
3,405,108 UART: [state] Locking Datavault
3,406,519 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,123 UART: [state] Locking ICCM
3,407,575 UART: [exit] Launching FMC @ 0x40000130
3,412,904 UART:
3,412,920 UART: Running Caliptra FMC ...
3,413,328 UART:
3,413,382 UART: [state] CFI Enabled
3,424,038 UART: [fht] FMC Alias Private Key: 7
3,531,788 UART: [art] Extend RT PCRs Done
3,532,216 UART: [art] Lock RT PCRs Done
3,534,078 UART: [art] Populate DV Done
3,542,482 UART: [fht] FMC Alias Private Key: 7
3,543,412 UART: [art] Derive CDI
3,543,692 UART: [art] Store in in slot 0x4
3,629,091 UART: [art] Derive Key Pair
3,629,451 UART: [art] Store priv key in slot 0x5
3,641,989 UART: [art] Derive Key Pair - Done
3,656,870 UART: [art] Signing Cert with AUTHO
3,657,350 UART: RITY.KEYID = 7
3,672,646 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,411 UART: [art] PUB.X = 85DC9D866D1B0300562107611D06A018A0529AE2BF9D27E6A54AA1DFE7173B92599717D0B16A7AA4FC0AA209CC46CEDC
3,680,154 UART: [art] PUB.Y = 672882BAD287B5D493E43FECFED9BF5126A4595A9771ED34E3203BAD7F01803F915AF11D2867189C799ED30BA26C5C03
3,687,101 UART: [art] SIG.R = 0B4FB425990AFD872321CCAEC2968A971FC6E875EF7A69E30D64CF492DEFA423A78D5566089D6896668BF0B7869278AD
3,693,865 UART: [art] SIG.S = FCB18CB4DB082B7963D63F61AD567990731D00A70477022B2582D44601B884F322DB6A35B612961425D625B5238E4BC4
3,717,662 UART: Caliptra RT
3,717,915 UART: [state] CFI Enabled
3,826,345 UART: [rt] RT listening for mailbox commands...
3,827,015 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,903 UART: [rt]cmd =0x41544d4e, len=14344
5,360,545 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,610 ready_for_fw is high
1,055,610 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,164,342 >>> mbox cmd response: success
3,225,999 UART:
3,226,015 UART: Running Caliptra FMC ...
3,226,423 UART:
3,226,477 UART: [state] CFI Enabled
3,237,227 UART: [fht] FMC Alias Private Key: 7
3,344,771 UART: [art] Extend RT PCRs Done
3,345,199 UART: [art] Lock RT PCRs Done
3,346,543 UART: [art] Populate DV Done
3,354,829 UART: [fht] FMC Alias Private Key: 7
3,355,987 UART: [art] Derive CDI
3,356,267 UART: [art] Store in in slot 0x4
3,442,006 UART: [art] Derive Key Pair
3,442,366 UART: [art] Store priv key in slot 0x5
3,456,014 UART: [art] Derive Key Pair - Done
3,471,049 UART: [art] Signing Cert with AUTHO
3,471,529 UART: RITY.KEYID = 7
3,486,849 UART: [art] Erasing AUTHORITY.KEYID = 7
3,487,614 UART: [art] PUB.X = 1160C1B1416592A36272784D402F2054D707C8E6C433866A2FCFDE2E81120FB15EDB432C7A5CEA7438A7AB0A24CAF123
3,494,379 UART: [art] PUB.Y = 0F1E548D418B69E4945E4FEBAA3FB0E5C94C9D5AEECC69150140980ACE668B90EFE21C21DBFA61FF57EE5F328FC180D6
3,501,342 UART: [art] SIG.R = 42008ED545F67AC2332B0827444079724404E868A5F34C0530D42551BB42E18006D1434899E7AA2B5528CBD02ABCCF68
3,508,070 UART: [art] SIG.S = 86A63B2A63AAC21DA5490B46A25E3123781ECBD76C9D3244BA0CDCDCC8BB7E915DABE85F1F68D83649B24D83044441A8
3,531,708 UART: Caliptra RT
3,531,961 UART: [state] CFI Enabled
3,639,049 UART: [rt] RT listening for mailbox commands...
3,639,719 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,581 UART: [rt]cmd =0x41544d4e, len=14344
5,175,812 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
87,016 UART: [state] WD Timer not started. Device not locked for debugging
88,333 UART: [kat] SHA2-256
891,883 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,012 UART: [kat] ++
896,164 UART: [kat] sha1
900,600 UART: [kat] SHA2-256
902,540 UART: [kat] SHA2-384
905,393 UART: [kat] SHA2-512-ACC
907,294 UART: [kat] ECC-384
916,911 UART: [kat] HMAC-384Kdf
921,649 UART: [kat] LMS
1,169,961 UART: [kat] --
1,170,686 UART: [cold-reset] ++
1,171,262 UART: [fht] FHT @ 0x50003400
1,173,952 UART: [idev] ++
1,174,120 UART: [idev] CDI.KEYID = 6
1,174,481 UART: [idev] SUBJECT.KEYID = 7
1,174,906 UART: [idev] UDS.KEYID = 0
1,175,252 ready_for_fw is high
1,175,252 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,262 UART: [idev] Erasing UDS.KEYID = 0
1,200,460 UART: [idev] Sha1 KeyId Algorithm
1,209,394 UART: [idev] --
1,210,503 UART: [ldev] ++
1,210,671 UART: [ldev] CDI.KEYID = 6
1,211,035 UART: [ldev] SUBJECT.KEYID = 5
1,211,462 UART: [ldev] AUTHORITY.KEYID = 7
1,211,925 UART: [ldev] FE.KEYID = 1
1,217,257 UART: [ldev] Erasing FE.KEYID = 1
1,243,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,053 UART: [ldev] --
1,283,453 UART: [fwproc] Wait for Commands...
1,284,264 UART: [fwproc] Recv command 0x46574c44
1,284,997 UART: [fwproc] Recv'd Img size: 114332 bytes
3,122,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,426 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,735 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,315,511 >>> mbox cmd response: success
3,316,584 UART: [afmc] ++
3,316,752 UART: [afmc] CDI.KEYID = 6
3,317,115 UART: [afmc] SUBJECT.KEYID = 7
3,317,541 UART: [afmc] AUTHORITY.KEYID = 5
3,353,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,698 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,408 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,298 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,009 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,689 UART: [afmc] --
3,396,795 UART: [cold-reset] --
3,397,603 UART: [state] Locking Datavault
3,398,868 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,472 UART: [state] Locking ICCM
3,400,050 UART: [exit] Launching FMC @ 0x40000130
3,405,379 UART:
3,405,395 UART: Running Caliptra FMC ...
3,405,803 UART:
3,405,946 UART: [state] CFI Enabled
3,416,534 UART: [fht] FMC Alias Private Key: 7
3,524,948 UART: [art] Extend RT PCRs Done
3,525,376 UART: [art] Lock RT PCRs Done
3,527,120 UART: [art] Populate DV Done
3,535,410 UART: [fht] FMC Alias Private Key: 7
3,536,428 UART: [art] Derive CDI
3,536,708 UART: [art] Store in in slot 0x4
3,622,599 UART: [art] Derive Key Pair
3,622,959 UART: [art] Store priv key in slot 0x5
3,636,381 UART: [art] Derive Key Pair - Done
3,651,109 UART: [art] Signing Cert with AUTHO
3,651,589 UART: RITY.KEYID = 7
3,666,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,516 UART: [art] PUB.X = DEC8A741360BB5FE71A2D3A9E08AFEFB45DBCB59133CA5471AFB7954C9ADD640B3AFBB1439A22060CA7A8151A362DC27
3,674,305 UART: [art] PUB.Y = A323A1F914E5328A80DC623D23F3F8D96412154B21095817B536B82E1696D0A09787450CE5B04707DA5DB697A25AC57D
3,681,240 UART: [art] SIG.R = 9B07909F2AD3B98914C6D7CEEBF646DBD7CD1FC0C48049D9380B989EDAF5AFA4B2C51846F7A52B32B4599A430A7702C5
3,688,012 UART: [art] SIG.S = BA4E49270E186369A27AE1BDC7E86B688A3973E689A5C15466BF0F50C82A69BF425D6F78CB060E5E2FB01545FAD90B1C
3,711,602 UART: Caliptra RT
3,711,947 UART: [state] CFI Enabled
3,819,354 UART: [rt] RT listening for mailbox commands...
3,820,024 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,184 UART: [rt]cmd =0x41544d4e, len=14344
5,352,638 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,563 ready_for_fw is high
1,056,563 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,162,807 >>> mbox cmd response: success
3,224,672 UART:
3,224,688 UART: Running Caliptra FMC ...
3,225,096 UART:
3,225,239 UART: [state] CFI Enabled
3,236,133 UART: [fht] FMC Alias Private Key: 7
3,344,355 UART: [art] Extend RT PCRs Done
3,344,783 UART: [art] Lock RT PCRs Done
3,346,479 UART: [art] Populate DV Done
3,354,671 UART: [fht] FMC Alias Private Key: 7
3,355,843 UART: [art] Derive CDI
3,356,123 UART: [art] Store in in slot 0x4
3,441,816 UART: [art] Derive Key Pair
3,442,176 UART: [art] Store priv key in slot 0x5
3,455,394 UART: [art] Derive Key Pair - Done
3,469,896 UART: [art] Signing Cert with AUTHO
3,470,376 UART: RITY.KEYID = 7
3,485,764 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,529 UART: [art] PUB.X = E153DC3806F02E3ACB4C2BB5589B29D07FA69E12153E2FF1D76BCBE3DCC08243BA9DAAF56B8235F6580090AACC705E77
3,493,292 UART: [art] PUB.Y = FEE2A4EA27BC67F584B62CBBF1DA1AD3C8B4985198DAA2AF74DC41CAF4308A00B2FA879E39024FB2821C33A82B538416
3,500,235 UART: [art] SIG.R = E5ABF2156FF0B039DC5E5B10EDF71FF62C9EB70CD20F16F39DFABC05964F0CA86842A625A04D50C9A0593FB162AB1F6D
3,507,015 UART: [art] SIG.S = 922B4ECCC89DA4E59770DD1BAD28D6AC5169FE0D670E643CF8302E9E3D8E54EFE2EE1C54B7E9CAF04F0FA58CAA1F3BA3
3,530,663 UART: Caliptra RT
3,531,008 UART: [state] CFI Enabled
3,639,159 UART: [rt] RT listening for mailbox commands...
3,639,829 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,923 UART: [rt]cmd =0x41544d4e, len=14344
5,178,491 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,559 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,163 UART: [kat] SHA2-256
882,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,209 UART: [kat] ++
886,361 UART: [kat] sha1
890,493 UART: [kat] SHA2-256
892,431 UART: [kat] SHA2-384
895,110 UART: [kat] SHA2-512-ACC
897,011 UART: [kat] ECC-384
902,366 UART: [kat] HMAC-384Kdf
906,862 UART: [kat] LMS
1,475,058 UART: [kat] --
1,475,943 UART: [cold-reset] ++
1,476,317 UART: [fht] Storing FHT @ 0x50003400
1,479,154 UART: [idev] ++
1,479,322 UART: [idev] CDI.KEYID = 6
1,479,682 UART: [idev] SUBJECT.KEYID = 7
1,480,106 UART: [idev] UDS.KEYID = 0
1,480,451 ready_for_fw is high
1,480,451 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,530 UART: [idev] Erasing UDS.KEYID = 0
1,505,368 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,024 UART: [idev] --
1,514,955 UART: [ldev] ++
1,515,123 UART: [ldev] CDI.KEYID = 6
1,515,486 UART: [ldev] SUBJECT.KEYID = 5
1,515,912 UART: [ldev] AUTHORITY.KEYID = 7
1,516,375 UART: [ldev] FE.KEYID = 1
1,521,383 UART: [ldev] Erasing FE.KEYID = 1
1,547,316 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,262 UART: [ldev] --
1,586,657 UART: [fwproc] Waiting for Commands...
1,587,430 UART: [fwproc] Received command 0x46574c44
1,588,221 UART: [fwproc] Received Image of size 114332 bytes
5,120,576 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,148,224 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,177,576 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,313,537 >>> mbox cmd response: success
5,314,797 UART: [afmc] ++
5,314,965 UART: [afmc] CDI.KEYID = 6
5,315,327 UART: [afmc] SUBJECT.KEYID = 7
5,315,752 UART: [afmc] AUTHORITY.KEYID = 5
5,350,632 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,366,666 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,367,446 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,373,155 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,379,047 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,384,748 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,392,560 UART: [afmc] --
5,393,670 UART: [cold-reset] --
5,394,670 UART: [state] Locking Datavault
5,395,921 UART: [state] Locking PCR0, PCR1 and PCR31
5,396,525 UART: [state] Locking ICCM
5,397,023 UART: [exit] Launching FMC @ 0x40000130
5,402,352 UART:
5,402,368 UART: Running Caliptra FMC ...
5,402,776 UART:
5,402,830 UART: [state] CFI Enabled
5,413,344 UART: [fht] FMC Alias Private Key: 7
5,521,994 UART: [art] Extend RT PCRs Done
5,522,422 UART: [art] Lock RT PCRs Done
5,524,008 UART: [art] Populate DV Done
5,531,940 UART: [fht] FMC Alias Private Key: 7
5,533,074 UART: [art] Derive CDI
5,533,354 UART: [art] Store in in slot 0x4
5,618,973 UART: [art] Derive Key Pair
5,619,333 UART: [art] Store priv key in slot 0x5
5,631,915 UART: [art] Derive Key Pair - Done
5,646,678 UART: [art] Signing Cert with AUTHO
5,647,158 UART: RITY.KEYID = 7
5,662,428 UART: [art] Erasing AUTHORITY.KEYID = 7
5,663,193 UART: [art] PUB.X = 119EE87596411397D1F1C1D05988D4E8C8F5141790DDF00E3A1779BE8761E61161945BBC240430D56E9AD1205E1752A2
5,669,949 UART: [art] PUB.Y = C58A3757FABB6215BB068D6DC739FCE9D52E72B4B64558FD731263C79B68F90882E9BC5EA5401048304EFAE05A3F85EC
5,676,903 UART: [art] SIG.R = 220F0BDA28ACADB6DA55EAB656DC8E59CF6096C0B4B72BDC6150EA0C1B6B0A76B51A85C0DC9C4B65CC8D256247BA111D
5,683,687 UART: [art] SIG.S = D03BD2768F1FFE7236DF087F5AE82DD5389998A932BDE8C32C559A288AEC6C557C9CA25C30B8C9D0A88756CF65F09081
5,707,461 UART: Caliptra RT
5,707,714 UART: [state] CFI Enabled
5,815,449 UART: [rt] RT listening for mailbox commands...
5,816,119 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,939,177 UART: [rt]cmd =0x41544d4e, len=14344
6,504,720 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,037 ready_for_fw is high
1,362,037 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,275,042 >>> mbox cmd response: success
5,336,711 UART:
5,336,727 UART: Running Caliptra FMC ...
5,337,135 UART:
5,337,189 UART: [state] CFI Enabled
5,347,643 UART: [fht] FMC Alias Private Key: 7
5,455,827 UART: [art] Extend RT PCRs Done
5,456,255 UART: [art] Lock RT PCRs Done
5,457,731 UART: [art] Populate DV Done
5,466,039 UART: [fht] FMC Alias Private Key: 7
5,467,151 UART: [art] Derive CDI
5,467,431 UART: [art] Store in in slot 0x4
5,552,894 UART: [art] Derive Key Pair
5,553,254 UART: [art] Store priv key in slot 0x5
5,566,018 UART: [art] Derive Key Pair - Done
5,580,589 UART: [art] Signing Cert with AUTHO
5,581,069 UART: RITY.KEYID = 7
5,596,113 UART: [art] Erasing AUTHORITY.KEYID = 7
5,596,878 UART: [art] PUB.X = 3A4E0824CE43CDDD831057F610D1062E48F7F3448641EFB49821B15726BA7FF14D1DD55D1FA41B5135BA365A576E63C4
5,603,646 UART: [art] PUB.Y = 1C39C057CA6A6775E1C69E013FC6FA190DCEE4462CB3CB0E157D397AADB5E20A8BD779AC5736E39AC4F33D82B090C43A
5,610,602 UART: [art] SIG.R = D795190ABED20514EC554C85C9F63BC454B0377F5D994AC63E42D46139A3D04E33BFBDDA9846BA0B0FA0F03EB9C15368
5,617,372 UART: [art] SIG.S = 2C73C8D01A421A6CF4A0E3A09201A70DB4701DE1241D54B44B1DA618FF7850C41C0A3A22811DB2D94B8DCABCCF3FB918
5,641,262 UART: Caliptra RT
5,641,515 UART: [state] CFI Enabled
5,749,630 UART: [rt] RT listening for mailbox commands...
5,750,300 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,873,432 UART: [rt]cmd =0x41544d4e, len=14344
6,436,474 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,548 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,054 UART: [kat] SHA2-256
881,985 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,100 UART: [kat] ++
886,252 UART: [kat] sha1
890,684 UART: [kat] SHA2-256
892,622 UART: [kat] SHA2-384
895,453 UART: [kat] SHA2-512-ACC
897,354 UART: [kat] ECC-384
902,941 UART: [kat] HMAC-384Kdf
907,473 UART: [kat] LMS
1,475,669 UART: [kat] --
1,476,490 UART: [cold-reset] ++
1,477,020 UART: [fht] Storing FHT @ 0x50003400
1,479,629 UART: [idev] ++
1,479,797 UART: [idev] CDI.KEYID = 6
1,480,157 UART: [idev] SUBJECT.KEYID = 7
1,480,581 UART: [idev] UDS.KEYID = 0
1,480,926 ready_for_fw is high
1,480,926 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,473 UART: [idev] Erasing UDS.KEYID = 0
1,505,583 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,217 UART: [idev] --
1,515,322 UART: [ldev] ++
1,515,490 UART: [ldev] CDI.KEYID = 6
1,515,853 UART: [ldev] SUBJECT.KEYID = 5
1,516,279 UART: [ldev] AUTHORITY.KEYID = 7
1,516,742 UART: [ldev] FE.KEYID = 1
1,521,806 UART: [ldev] Erasing FE.KEYID = 1
1,547,221 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,113 UART: [ldev] --
1,586,624 UART: [fwproc] Waiting for Commands...
1,587,379 UART: [fwproc] Received command 0x46574c44
1,588,170 UART: [fwproc] Received Image of size 114332 bytes
5,120,411 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,148,523 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,177,875 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,313,622 >>> mbox cmd response: success
5,314,736 UART: [afmc] ++
5,314,904 UART: [afmc] CDI.KEYID = 6
5,315,266 UART: [afmc] SUBJECT.KEYID = 7
5,315,691 UART: [afmc] AUTHORITY.KEYID = 5
5,350,977 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,367,363 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,368,143 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,373,852 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,379,744 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,385,445 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,393,341 UART: [afmc] --
5,394,413 UART: [cold-reset] --
5,395,253 UART: [state] Locking Datavault
5,396,418 UART: [state] Locking PCR0, PCR1 and PCR31
5,397,022 UART: [state] Locking ICCM
5,397,562 UART: [exit] Launching FMC @ 0x40000130
5,402,891 UART:
5,402,907 UART: Running Caliptra FMC ...
5,403,315 UART:
5,403,458 UART: [state] CFI Enabled
5,413,984 UART: [fht] FMC Alias Private Key: 7
5,522,148 UART: [art] Extend RT PCRs Done
5,522,576 UART: [art] Lock RT PCRs Done
5,524,024 UART: [art] Populate DV Done
5,532,500 UART: [fht] FMC Alias Private Key: 7
5,533,548 UART: [art] Derive CDI
5,533,828 UART: [art] Store in in slot 0x4
5,619,417 UART: [art] Derive Key Pair
5,619,777 UART: [art] Store priv key in slot 0x5
5,633,255 UART: [art] Derive Key Pair - Done
5,647,949 UART: [art] Signing Cert with AUTHO
5,648,429 UART: RITY.KEYID = 7
5,663,691 UART: [art] Erasing AUTHORITY.KEYID = 7
5,664,456 UART: [art] PUB.X = 5FA56DABC50DE42FAF42C6399F43CB6D1274AC594286D7E10178062069F5290F6667A3B8F31FCBE6859558115A74271F
5,671,214 UART: [art] PUB.Y = 19021F42B7BD3BACF3042945678772ABB4A785665BDBAB645CADA5BDAD91600ABD9F781A2C5680B4A842A86F0A75B49E
5,678,166 UART: [art] SIG.R = CB9D3050869D3A992BB77B8819DDC99CBC88EAA57D7CF19D6B04522A4EBC1EBC53B5AF68A1DBC3977D2FCB78228AB4FE
5,684,959 UART: [art] SIG.S = F31696999DA1807722C095AD0AD8D6DB13D19E0195CF73E7933CA5C11A9B4295767A6843747CA7498A85CC4AD0AB9353
5,709,038 UART: Caliptra RT
5,709,383 UART: [state] CFI Enabled
5,818,095 UART: [rt] RT listening for mailbox commands...
5,818,765 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,941,625 UART: [rt]cmd =0x41544d4e, len=14344
6,494,441 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,492 ready_for_fw is high
1,362,492 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,164,492 >>> mbox cmd response: success
5,226,417 UART:
5,226,433 UART: Running Caliptra FMC ...
5,226,841 UART:
5,226,984 UART: [state] CFI Enabled
5,237,616 UART: [fht] FMC Alias Private Key: 7
5,345,860 UART: [art] Extend RT PCRs Done
5,346,288 UART: [art] Lock RT PCRs Done
5,347,550 UART: [art] Populate DV Done
5,355,764 UART: [fht] FMC Alias Private Key: 7
5,356,716 UART: [art] Derive CDI
5,356,996 UART: [art] Store in in slot 0x4
5,442,669 UART: [art] Derive Key Pair
5,443,029 UART: [art] Store priv key in slot 0x5
5,456,399 UART: [art] Derive Key Pair - Done
5,471,374 UART: [art] Signing Cert with AUTHO
5,471,854 UART: RITY.KEYID = 7
5,487,024 UART: [art] Erasing AUTHORITY.KEYID = 7
5,487,789 UART: [art] PUB.X = 8C907828584CD8725B4B731ABD18DCF6426CD62DB395567BED8E0CD34DFF4C65138C834A35D6644E8FC40B0C43563081
5,494,554 UART: [art] PUB.Y = 0053C0759066D23D465CD2099946FE4E14302800A6B871BD471789A08A1A6C3F36549532BD4F96374B1EF66C9E651024
5,501,445 UART: [art] SIG.R = 7946BA112CF6459124B227F9D97238F201FE46123D599A2F75017D60E45D05475AD83480D4C79933F8C847E559513864
5,508,190 UART: [art] SIG.S = 837EB9E84A36EF62B8821E244F6007C8D3ACB7A799D874A6501EF6ACF02CAAA830D975B904771A9B3EBEDCFD12288EC2
5,532,097 UART: Caliptra RT
5,532,442 UART: [state] CFI Enabled
5,641,429 UART: [rt] RT listening for mailbox commands...
5,642,099 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,765,203 UART: [rt]cmd =0x41544d4e, len=14344
6,323,759 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,280 UART: [kat] SHA2-256
892,930 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,055 UART: [kat] ++
897,207 UART: [kat] sha1
901,425 UART: [kat] SHA2-256
903,365 UART: [kat] SHA2-384
906,112 UART: [kat] SHA2-512-ACC
908,013 UART: [kat] ECC-384
917,604 UART: [kat] HMAC-384Kdf
922,194 UART: [kat] LMS
1,170,522 UART: [kat] --
1,171,691 UART: [cold-reset] ++
1,172,063 UART: [fht] FHT @ 0x50003400
1,174,730 UART: [idev] ++
1,174,898 UART: [idev] CDI.KEYID = 6
1,175,258 UART: [idev] SUBJECT.KEYID = 7
1,175,682 UART: [idev] UDS.KEYID = 0
1,176,027 ready_for_fw is high
1,176,027 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,820 UART: [idev] Erasing UDS.KEYID = 0
1,200,899 UART: [idev] Sha1 KeyId Algorithm
1,209,461 UART: [idev] --
1,210,427 UART: [ldev] ++
1,210,595 UART: [ldev] CDI.KEYID = 6
1,210,958 UART: [ldev] SUBJECT.KEYID = 5
1,211,384 UART: [ldev] AUTHORITY.KEYID = 7
1,211,847 UART: [ldev] FE.KEYID = 1
1,217,297 UART: [ldev] Erasing FE.KEYID = 1
1,243,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,271 UART: [ldev] --
1,282,742 UART: [fwproc] Wait for Commands...
1,283,516 UART: [fwproc] Recv command 0x46574c44
1,284,244 UART: [fwproc] Recv'd Img size: 114332 bytes
3,119,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,147,693 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,997 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,312,798 >>> mbox cmd response: success
3,313,956 UART: [afmc] ++
3,314,124 UART: [afmc] CDI.KEYID = 6
3,314,486 UART: [afmc] SUBJECT.KEYID = 7
3,314,911 UART: [afmc] AUTHORITY.KEYID = 5
3,350,619 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,730 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,439 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,331 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,042 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,039 UART: [afmc] --
3,393,921 UART: [cold-reset] --
3,394,765 UART: [state] Locking Datavault
3,395,756 UART: [state] Locking PCR0, PCR1 and PCR31
3,396,360 UART: [state] Locking ICCM
3,396,954 UART: [exit] Launching FMC @ 0x40000130
3,402,283 UART:
3,402,299 UART: Running Caliptra FMC ...
3,402,707 UART:
3,402,761 UART: [state] CFI Enabled
3,412,867 UART: [fht] FMC Alias Private Key: 7
3,520,987 UART: [art] Extend RT PCRs Done
3,521,415 UART: [art] Lock RT PCRs Done
3,523,335 UART: [art] Populate DV Done
3,531,705 UART: [fht] FMC Alias Private Key: 7
3,532,635 UART: [art] Derive CDI
3,532,915 UART: [art] Store in in slot 0x4
3,618,142 UART: [art] Derive Key Pair
3,618,502 UART: [art] Store priv key in slot 0x5
3,631,608 UART: [art] Derive Key Pair - Done
3,646,048 UART: [art] Signing Cert with AUTHO
3,646,528 UART: RITY.KEYID = 7
3,661,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,517 UART: [art] PUB.X = 6EE8C1627161026B7545FC61E20E2EFB73EA3DF615665FDEA2444257F55490DDF214884B1FE1B1DFE1D2E0B46B08411B
3,669,286 UART: [art] PUB.Y = 895B0C97E48014282A175A338CC365A0EF54103D7E8771353A0AAEBB8479470983503DD546DA9104FAF6E86FD4900DBD
3,676,221 UART: [art] SIG.R = 32FD344CA559AF7F05113268A74AB7A69328EDACC2AE9DA17FCBDF1025178B0953C0CBE99B0DC8213BC6394A6B1B09BC
3,682,997 UART: [art] SIG.S = A7424685AAD3F8EA34520534D7A9FAB91401B31323EBB69A25F996530C07BA9472FA9F245738019DDFD0942B47BB756E
3,706,897 UART: Caliptra RT
3,707,150 UART: [state] CFI Enabled
3,814,130 UART: [rt] RT listening for mailbox commands...
3,814,800 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,828 UART: [rt]cmd =0x41544d4e, len=14344
4,503,133 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,359 ready_for_fw is high
1,060,359 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,164,222 >>> mbox cmd response: success
3,226,213 UART:
3,226,229 UART: Running Caliptra FMC ...
3,226,637 UART:
3,226,691 UART: [state] CFI Enabled
3,237,133 UART: [fht] FMC Alias Private Key: 7
3,345,175 UART: [art] Extend RT PCRs Done
3,345,603 UART: [art] Lock RT PCRs Done
3,347,477 UART: [art] Populate DV Done
3,355,847 UART: [fht] FMC Alias Private Key: 7
3,357,009 UART: [art] Derive CDI
3,357,289 UART: [art] Store in in slot 0x4
3,443,490 UART: [art] Derive Key Pair
3,443,850 UART: [art] Store priv key in slot 0x5
3,457,538 UART: [art] Derive Key Pair - Done
3,472,185 UART: [art] Signing Cert with AUTHO
3,472,665 UART: RITY.KEYID = 7
3,487,913 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,678 UART: [art] PUB.X = 5F6918E6892B5A432257514CBAE657CBD135703DAA3599B69E212AA462441F99A2E8635CC9452817E663B1F53DE7C0C9
3,495,446 UART: [art] PUB.Y = E2EAB9D40ADEE75D956A4EEC0CEC5CE3C976A8C0E6E98D1D3B081FA1350FCC9930C17372D254F7430C15BBF77B67C3B6
3,502,403 UART: [art] SIG.R = 4BF5444AD67C6FA55D898B7CDE16FAD91C26132520E877CCB802235AEDE679C752F478B79148217198B8D19CE9F423B0
3,509,174 UART: [art] SIG.S = D4FFCBD277C9137545396F75F05AFEE9D6A26CEE9A40504AC3C9398FF26947B9865C2650E3C579E25EFC8FFE3862E38E
3,533,203 UART: Caliptra RT
3,533,456 UART: [state] CFI Enabled
3,641,260 UART: [rt] RT listening for mailbox commands...
3,641,930 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,900 UART: [rt]cmd =0x41544d4e, len=14344
4,322,950 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
893,519 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,644 UART: [kat] ++
897,796 UART: [kat] sha1
902,078 UART: [kat] SHA2-256
904,018 UART: [kat] SHA2-384
906,807 UART: [kat] SHA2-512-ACC
908,708 UART: [kat] ECC-384
918,653 UART: [kat] HMAC-384Kdf
923,329 UART: [kat] LMS
1,171,657 UART: [kat] --
1,172,332 UART: [cold-reset] ++
1,172,676 UART: [fht] FHT @ 0x50003400
1,175,369 UART: [idev] ++
1,175,537 UART: [idev] CDI.KEYID = 6
1,175,897 UART: [idev] SUBJECT.KEYID = 7
1,176,321 UART: [idev] UDS.KEYID = 0
1,176,666 ready_for_fw is high
1,176,666 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,363 UART: [idev] Erasing UDS.KEYID = 0
1,201,672 UART: [idev] Sha1 KeyId Algorithm
1,210,280 UART: [idev] --
1,211,362 UART: [ldev] ++
1,211,530 UART: [ldev] CDI.KEYID = 6
1,211,893 UART: [ldev] SUBJECT.KEYID = 5
1,212,319 UART: [ldev] AUTHORITY.KEYID = 7
1,212,782 UART: [ldev] FE.KEYID = 1
1,218,126 UART: [ldev] Erasing FE.KEYID = 1
1,244,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,572 UART: [ldev] --
1,284,055 UART: [fwproc] Wait for Commands...
1,284,777 UART: [fwproc] Recv command 0x46574c44
1,285,505 UART: [fwproc] Recv'd Img size: 114332 bytes
3,129,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,206 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,510 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,322,225 >>> mbox cmd response: success
3,323,289 UART: [afmc] ++
3,323,457 UART: [afmc] CDI.KEYID = 6
3,323,819 UART: [afmc] SUBJECT.KEYID = 7
3,324,244 UART: [afmc] AUTHORITY.KEYID = 5
3,360,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,731 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,479 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,188 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,080 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,791 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,578 UART: [afmc] --
3,403,540 UART: [cold-reset] --
3,404,376 UART: [state] Locking Datavault
3,405,623 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,227 UART: [state] Locking ICCM
3,406,807 UART: [exit] Launching FMC @ 0x40000130
3,412,136 UART:
3,412,152 UART: Running Caliptra FMC ...
3,412,560 UART:
3,412,703 UART: [state] CFI Enabled
3,423,533 UART: [fht] FMC Alias Private Key: 7
3,531,017 UART: [art] Extend RT PCRs Done
3,531,445 UART: [art] Lock RT PCRs Done
3,532,893 UART: [art] Populate DV Done
3,541,147 UART: [fht] FMC Alias Private Key: 7
3,542,117 UART: [art] Derive CDI
3,542,397 UART: [art] Store in in slot 0x4
3,628,118 UART: [art] Derive Key Pair
3,628,478 UART: [art] Store priv key in slot 0x5
3,641,652 UART: [art] Derive Key Pair - Done
3,656,599 UART: [art] Signing Cert with AUTHO
3,657,079 UART: RITY.KEYID = 7
3,672,725 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,490 UART: [art] PUB.X = A91AEAAFB37947C9D13B8B80AB4F241099A382D1137044906372D0DF1AAE6DF423A6FF29994BA8288A7E022E2354F1C5
3,680,263 UART: [art] PUB.Y = 474EE9584D947864A0E881E30C6FCCAD114E3659A39701B989072DF5B455803B86EE6188AC5CA1D8B04E2EB2EDC6637A
3,687,210 UART: [art] SIG.R = 8B2891804902822EA28D0CB9E066E6FAEE1B846A098CE05D6ED271C403BE1C1BD05B1116C99D08015DA6C9E91E328B9C
3,693,970 UART: [art] SIG.S = 4147F3AFBDB3D824D9A99283AE92587987B8BCEDCCCC5BA68C0B41A357899D3634E558AC88DF9E08765CCDB11DED0D20
3,717,556 UART: Caliptra RT
3,717,901 UART: [state] CFI Enabled
3,826,127 UART: [rt] RT listening for mailbox commands...
3,826,797 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,725 UART: [rt]cmd =0x41544d4e, len=14344
4,508,271 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,460 ready_for_fw is high
1,060,460 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,175,490 >>> mbox cmd response: success
3,238,207 UART:
3,238,223 UART: Running Caliptra FMC ...
3,238,631 UART:
3,238,774 UART: [state] CFI Enabled
3,249,562 UART: [fht] FMC Alias Private Key: 7
3,357,212 UART: [art] Extend RT PCRs Done
3,357,640 UART: [art] Lock RT PCRs Done
3,359,020 UART: [art] Populate DV Done
3,367,220 UART: [fht] FMC Alias Private Key: 7
3,368,356 UART: [art] Derive CDI
3,368,636 UART: [art] Store in in slot 0x4
3,454,449 UART: [art] Derive Key Pair
3,454,809 UART: [art] Store priv key in slot 0x5
3,468,163 UART: [art] Derive Key Pair - Done
3,483,112 UART: [art] Signing Cert with AUTHO
3,483,592 UART: RITY.KEYID = 7
3,498,998 UART: [art] Erasing AUTHORITY.KEYID = 7
3,499,763 UART: [art] PUB.X = F21FA081E5F035CC7D60CF5FB67CF58859FC758D860620113B138F666E050EAACDD7DA3A1E74810B2D74EA04FEE5C672
3,506,532 UART: [art] PUB.Y = BAAAB87A17F2E5991D0EC6EA06664FDEEF6979DADF3259FEE06C2072588E811BAB79C742DBE01FFFB40D2946209B7F7A
3,513,495 UART: [art] SIG.R = E38E95335DC486E3D04A78A92122D8D51DB7A5E15CA1A07114A064A964835722508CB2D65A16F6E5A03B507E0A1B0815
3,520,257 UART: [art] SIG.S = EC08FCF8253689CA6B880018759167CA79D8F0C7278AF0DA041892D76F2C3FC7F8BC4035BC4102FD6B57C505B0C605D6
3,544,533 UART: Caliptra RT
3,544,878 UART: [state] CFI Enabled
3,651,359 UART: [rt] RT listening for mailbox commands...
3,652,029 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,131 UART: [rt]cmd =0x41544d4e, len=14344
4,335,716 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,235 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,143 UART: [kat] ++
895,295 UART: [kat] sha1
899,571 UART: [kat] SHA2-256
901,511 UART: [kat] SHA2-384
904,340 UART: [kat] SHA2-512-ACC
906,241 UART: [kat] ECC-384
915,652 UART: [kat] HMAC-384Kdf
920,398 UART: [kat] LMS
1,168,710 UART: [kat] --
1,169,599 UART: [cold-reset] ++
1,170,111 UART: [fht] FHT @ 0x50003400
1,172,785 UART: [idev] ++
1,172,953 UART: [idev] CDI.KEYID = 6
1,173,314 UART: [idev] SUBJECT.KEYID = 7
1,173,739 UART: [idev] UDS.KEYID = 0
1,174,085 ready_for_fw is high
1,174,085 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,801 UART: [idev] Erasing UDS.KEYID = 0
1,199,611 UART: [idev] Sha1 KeyId Algorithm
1,208,433 UART: [idev] --
1,209,560 UART: [ldev] ++
1,209,728 UART: [ldev] CDI.KEYID = 6
1,210,092 UART: [ldev] SUBJECT.KEYID = 5
1,210,519 UART: [ldev] AUTHORITY.KEYID = 7
1,210,982 UART: [ldev] FE.KEYID = 1
1,216,158 UART: [ldev] Erasing FE.KEYID = 1
1,243,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,200 UART: [ldev] --
1,282,502 UART: [fwproc] Wait for Commands...
1,283,077 UART: [fwproc] Recv command 0x46574c44
1,283,810 UART: [fwproc] Recv'd Img size: 114332 bytes
3,127,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,872 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,181 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,321,045 >>> mbox cmd response: success
3,322,082 UART: [afmc] ++
3,322,250 UART: [afmc] CDI.KEYID = 6
3,322,613 UART: [afmc] SUBJECT.KEYID = 7
3,323,039 UART: [afmc] AUTHORITY.KEYID = 5
3,358,611 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,789 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,540 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,250 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,140 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,851 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,787 UART: [afmc] --
3,401,679 UART: [cold-reset] --
3,402,637 UART: [state] Locking Datavault
3,403,890 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,494 UART: [state] Locking ICCM
3,404,990 UART: [exit] Launching FMC @ 0x40000130
3,410,319 UART:
3,410,335 UART: Running Caliptra FMC ...
3,410,743 UART:
3,410,797 UART: [state] CFI Enabled
3,421,431 UART: [fht] FMC Alias Private Key: 7
3,529,163 UART: [art] Extend RT PCRs Done
3,529,591 UART: [art] Lock RT PCRs Done
3,531,243 UART: [art] Populate DV Done
3,539,537 UART: [fht] FMC Alias Private Key: 7
3,540,521 UART: [art] Derive CDI
3,540,801 UART: [art] Store in in slot 0x4
3,626,606 UART: [art] Derive Key Pair
3,626,966 UART: [art] Store priv key in slot 0x5
3,639,488 UART: [art] Derive Key Pair - Done
3,654,382 UART: [art] Signing Cert with AUTHO
3,654,862 UART: RITY.KEYID = 7
3,670,140 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,905 UART: [art] PUB.X = 303C88351DFF052B20890D90437351C403587EC6C5109E2569F37EAEBB2F2E03A868FD1C0C6856937B6AC1B3787B1057
3,677,656 UART: [art] PUB.Y = E1F815583A6329F669908B6553DB640634449E5F1C38E33F04F226BCEF498197F0D49C568BF62B519C66FED3451D25E6
3,684,596 UART: [art] SIG.R = 1BECE4FB9519E22FD0497408165E10C4F2ED1F72C1659FC7FBD4B691864868FAFB25A77E6FC293BB1D934566BFE048A5
3,691,375 UART: [art] SIG.S = 35CD7157D1C3D69D23E986C98AFC0B5EDE5B7AE68020F003487AE29A0EA5775F033EB9704BB34E4A094B3F79CAA5B8AD
3,715,525 UART: Caliptra RT
3,715,778 UART: [state] CFI Enabled
3,823,819 UART: [rt] RT listening for mailbox commands...
3,824,489 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,361 UART: [rt]cmd =0x41544d4e, len=14344
4,518,258 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,214 ready_for_fw is high
1,056,214 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,174,875 >>> mbox cmd response: success
3,236,716 UART:
3,236,732 UART: Running Caliptra FMC ...
3,237,140 UART:
3,237,194 UART: [state] CFI Enabled
3,247,656 UART: [fht] FMC Alias Private Key: 7
3,355,554 UART: [art] Extend RT PCRs Done
3,355,982 UART: [art] Lock RT PCRs Done
3,357,636 UART: [art] Populate DV Done
3,365,946 UART: [fht] FMC Alias Private Key: 7
3,366,956 UART: [art] Derive CDI
3,367,236 UART: [art] Store in in slot 0x4
3,452,911 UART: [art] Derive Key Pair
3,453,271 UART: [art] Store priv key in slot 0x5
3,466,297 UART: [art] Derive Key Pair - Done
3,481,088 UART: [art] Signing Cert with AUTHO
3,481,568 UART: RITY.KEYID = 7
3,496,622 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,387 UART: [art] PUB.X = 1990E1EA1FA9FACFEC85F65953949B740C71CA083C434B9E161BB4DFFCE26759B79C5144440585979C8C8738A81F766A
3,504,152 UART: [art] PUB.Y = 75D9ACFFFB32DB073FFEF03B25C5F2B648C2E6D879B8A2622948D369B3E12452A5801B7D87A020BAB21D9626A239E29C
3,511,109 UART: [art] SIG.R = 1962FF497DABC63622A766706E2740E3D4FEC743B0566F1626DA7AADDEB71846F8DF15C2C92C43EFADA318A57B4F4FFE
3,517,897 UART: [art] SIG.S = 19E1308011901A69E76E16277CD3BE872E8A359781ECF7481CACFCFF4435C1D672DA3EDBD172FBC7C80F15C8CFFE6B28
3,542,187 UART: Caliptra RT
3,542,440 UART: [state] CFI Enabled
3,650,273 UART: [rt] RT listening for mailbox commands...
3,650,943 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,181 UART: [rt]cmd =0x41544d4e, len=14344
4,332,315 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,189 UART: [state] LifecycleState = Unprovisioned
85,844 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,601 UART: [kat] SHA2-256
891,151 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,280 UART: [kat] ++
895,432 UART: [kat] sha1
899,648 UART: [kat] SHA2-256
901,588 UART: [kat] SHA2-384
904,253 UART: [kat] SHA2-512-ACC
906,154 UART: [kat] ECC-384
915,885 UART: [kat] HMAC-384Kdf
920,557 UART: [kat] LMS
1,168,869 UART: [kat] --
1,169,668 UART: [cold-reset] ++
1,170,116 UART: [fht] FHT @ 0x50003400
1,172,658 UART: [idev] ++
1,172,826 UART: [idev] CDI.KEYID = 6
1,173,187 UART: [idev] SUBJECT.KEYID = 7
1,173,612 UART: [idev] UDS.KEYID = 0
1,173,958 ready_for_fw is high
1,173,958 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,736 UART: [idev] Erasing UDS.KEYID = 0
1,198,456 UART: [idev] Sha1 KeyId Algorithm
1,207,456 UART: [idev] --
1,208,517 UART: [ldev] ++
1,208,685 UART: [ldev] CDI.KEYID = 6
1,209,049 UART: [ldev] SUBJECT.KEYID = 5
1,209,476 UART: [ldev] AUTHORITY.KEYID = 7
1,209,939 UART: [ldev] FE.KEYID = 1
1,215,243 UART: [ldev] Erasing FE.KEYID = 1
1,241,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,041 UART: [ldev] --
1,281,413 UART: [fwproc] Wait for Commands...
1,282,110 UART: [fwproc] Recv command 0x46574c44
1,282,843 UART: [fwproc] Recv'd Img size: 114332 bytes
3,131,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,361 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,189,670 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,325,430 >>> mbox cmd response: success
3,326,445 UART: [afmc] ++
3,326,613 UART: [afmc] CDI.KEYID = 6
3,326,976 UART: [afmc] SUBJECT.KEYID = 7
3,327,402 UART: [afmc] AUTHORITY.KEYID = 5
3,362,342 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,444 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,195 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,905 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,795 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,506 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,440 UART: [afmc] --
3,405,424 UART: [cold-reset] --
3,405,926 UART: [state] Locking Datavault
3,407,201 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,805 UART: [state] Locking ICCM
3,408,443 UART: [exit] Launching FMC @ 0x40000130
3,413,772 UART:
3,413,788 UART: Running Caliptra FMC ...
3,414,196 UART:
3,414,339 UART: [state] CFI Enabled
3,424,815 UART: [fht] FMC Alias Private Key: 7
3,532,021 UART: [art] Extend RT PCRs Done
3,532,449 UART: [art] Lock RT PCRs Done
3,533,671 UART: [art] Populate DV Done
3,541,999 UART: [fht] FMC Alias Private Key: 7
3,543,035 UART: [art] Derive CDI
3,543,315 UART: [art] Store in in slot 0x4
3,629,222 UART: [art] Derive Key Pair
3,629,582 UART: [art] Store priv key in slot 0x5
3,642,186 UART: [art] Derive Key Pair - Done
3,656,706 UART: [art] Signing Cert with AUTHO
3,657,186 UART: RITY.KEYID = 7
3,672,652 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,417 UART: [art] PUB.X = FD03078F24D3A2E579CB6D958FFF984464EFC4899BF0AC5DE61F21669E9EF50B0A6F02EB4CB312A92F4789A26C677A6C
3,680,186 UART: [art] PUB.Y = 24E360797C47919C6AB01B91C10EB066BA9D5FD3DF24B8FD16968A3F8B1680A609D5599EEB244C6335B8D550AE03F7AA
3,687,135 UART: [art] SIG.R = 88CCDEC4207F38A403DC71331EA30F631107F9690C9B194D1DA16CBFB6FB9DCD8A34D1148C0BAC71DFD5B6A7493BB747
3,693,908 UART: [art] SIG.S = 858AE058317E3267C6E1C15DC4B5E7337EAD52DAC683CBC8AF61D7DFB3484C6EF5597DE1D6638034110F1EF22B08B6CA
3,718,031 UART: Caliptra RT
3,718,376 UART: [state] CFI Enabled
3,825,405 UART: [rt] RT listening for mailbox commands...
3,826,075 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,361 UART: [rt]cmd =0x41544d4e, len=14344
4,505,142 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,849 ready_for_fw is high
1,056,849 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,159,421 >>> mbox cmd response: success
3,220,978 UART:
3,220,994 UART: Running Caliptra FMC ...
3,221,402 UART:
3,221,545 UART: [state] CFI Enabled
3,232,339 UART: [fht] FMC Alias Private Key: 7
3,340,815 UART: [art] Extend RT PCRs Done
3,341,243 UART: [art] Lock RT PCRs Done
3,342,737 UART: [art] Populate DV Done
3,350,779 UART: [fht] FMC Alias Private Key: 7
3,351,849 UART: [art] Derive CDI
3,352,129 UART: [art] Store in in slot 0x4
3,437,844 UART: [art] Derive Key Pair
3,438,204 UART: [art] Store priv key in slot 0x5
3,451,324 UART: [art] Derive Key Pair - Done
3,466,043 UART: [art] Signing Cert with AUTHO
3,466,523 UART: RITY.KEYID = 7
3,481,813 UART: [art] Erasing AUTHORITY.KEYID = 7
3,482,578 UART: [art] PUB.X = 1D1E2CBB527C240FB098C99235E0B2A61792A9B09600412B6672A534F5170EF575BB90D823F1C6958453B2729B1A4B41
3,489,314 UART: [art] PUB.Y = 84DC591445D50C33B84D611EB6F674F0FAE58D6F8F5834AEC34C46EBEB7B970F7CD4772F4BC48B926CFADB1A291497B3
3,496,274 UART: [art] SIG.R = F5336A6605EB001641AD8806EDB111DD0E7982AAE31DE92D226237DF0D329462413A5882528B1ABB9FF2448138525588
3,503,004 UART: [art] SIG.S = 128F0E1178564A0A880563AFD7C57665C308AC6A1C63A59DD73B09B1A24F83AE9F39E788B5F4CAEEA3FA68323F532626
3,527,072 UART: Caliptra RT
3,527,417 UART: [state] CFI Enabled
3,636,189 UART: [rt] RT listening for mailbox commands...
3,636,859 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,907 UART: [rt]cmd =0x41544d4e, len=14344
4,332,533 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,624 UART: [state] LifecycleState = Unprovisioned
85,279 UART: [state] DebugLocked = No
85,953 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,583 UART: [kat] SHA2-256
881,514 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,629 UART: [kat] ++
885,781 UART: [kat] sha1
889,967 UART: [kat] SHA2-256
891,905 UART: [kat] SHA2-384
894,660 UART: [kat] SHA2-512-ACC
896,561 UART: [kat] ECC-384
902,268 UART: [kat] HMAC-384Kdf
906,702 UART: [kat] LMS
1,474,898 UART: [kat] --
1,475,513 UART: [cold-reset] ++
1,475,929 UART: [fht] Storing FHT @ 0x50003400
1,478,740 UART: [idev] ++
1,478,908 UART: [idev] CDI.KEYID = 6
1,479,268 UART: [idev] SUBJECT.KEYID = 7
1,479,692 UART: [idev] UDS.KEYID = 0
1,480,037 ready_for_fw is high
1,480,037 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,378 UART: [idev] Erasing UDS.KEYID = 0
1,503,376 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,018 UART: [idev] --
1,512,873 UART: [ldev] ++
1,513,041 UART: [ldev] CDI.KEYID = 6
1,513,404 UART: [ldev] SUBJECT.KEYID = 5
1,513,830 UART: [ldev] AUTHORITY.KEYID = 7
1,514,293 UART: [ldev] FE.KEYID = 1
1,519,611 UART: [ldev] Erasing FE.KEYID = 1
1,544,916 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,744 UART: [ldev] --
1,584,045 UART: [fwproc] Waiting for Commands...
1,584,704 UART: [fwproc] Received command 0x46574c44
1,585,495 UART: [fwproc] Received Image of size 114332 bytes
5,157,169 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,184,711 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,214,063 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,349,826 >>> mbox cmd response: success
5,350,868 UART: [afmc] ++
5,351,036 UART: [afmc] CDI.KEYID = 6
5,351,398 UART: [afmc] SUBJECT.KEYID = 7
5,351,823 UART: [afmc] AUTHORITY.KEYID = 5
5,386,325 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,402,741 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,403,521 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,409,230 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,415,122 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,420,823 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,428,779 UART: [afmc] --
5,429,795 UART: [cold-reset] --
5,430,579 UART: [state] Locking Datavault
5,432,026 UART: [state] Locking PCR0, PCR1 and PCR31
5,432,630 UART: [state] Locking ICCM
5,433,246 UART: [exit] Launching FMC @ 0x40000130
5,438,575 UART:
5,438,591 UART: Running Caliptra FMC ...
5,438,999 UART:
5,439,053 UART: [state] CFI Enabled
5,449,503 UART: [fht] FMC Alias Private Key: 7
5,557,461 UART: [art] Extend RT PCRs Done
5,557,889 UART: [art] Lock RT PCRs Done
5,559,263 UART: [art] Populate DV Done
5,567,357 UART: [fht] FMC Alias Private Key: 7
5,568,517 UART: [art] Derive CDI
5,568,797 UART: [art] Store in in slot 0x4
5,654,270 UART: [art] Derive Key Pair
5,654,630 UART: [art] Store priv key in slot 0x5
5,667,464 UART: [art] Derive Key Pair - Done
5,682,291 UART: [art] Signing Cert with AUTHO
5,682,771 UART: RITY.KEYID = 7
5,698,241 UART: [art] Erasing AUTHORITY.KEYID = 7
5,699,006 UART: [art] PUB.X = 15A3F29458B6C1CB176FD14A11FDC61A10C86034A58A0C64860E54481E5824A41A9A968903B88A76BBA9456B53E7AD37
5,705,767 UART: [art] PUB.Y = EE8411CC2E2AAA63C33177C5FF5559683C6A9CD8FCF75CEC0F7EEBDBF6110BC37BAD12B25D1BFBFDE7F45810265DCDEA
5,712,745 UART: [art] SIG.R = 4C4F18BC7A64FEB4FF1C3BA773E7346EC7B838D4940112B321B07D7140903FE89159458F5DBFF17ACF98B737B3FF4E31
5,719,522 UART: [art] SIG.S = 1C5625BA097D8DB87DB723D9F4E93E5E5C9178DA220BFDB5C1D6A06F26A489DC9720B956484128B1B85B375FDC343176
5,743,687 UART: Caliptra RT
5,743,940 UART: [state] CFI Enabled
5,852,304 UART: [rt] RT listening for mailbox commands...
5,852,974 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,976,220 UART: [rt]cmd =0x41544d4e, len=14344
6,530,006 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,611 ready_for_fw is high
1,362,611 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,163,911 >>> mbox cmd response: success
5,225,408 UART:
5,225,424 UART: Running Caliptra FMC ...
5,225,832 UART:
5,225,886 UART: [state] CFI Enabled
5,236,162 UART: [fht] FMC Alias Private Key: 7
5,344,184 UART: [art] Extend RT PCRs Done
5,344,612 UART: [art] Lock RT PCRs Done
5,346,082 UART: [art] Populate DV Done
5,354,460 UART: [fht] FMC Alias Private Key: 7
5,355,456 UART: [art] Derive CDI
5,355,736 UART: [art] Store in in slot 0x4
5,441,449 UART: [art] Derive Key Pair
5,441,809 UART: [art] Store priv key in slot 0x5
5,454,953 UART: [art] Derive Key Pair - Done
5,469,897 UART: [art] Signing Cert with AUTHO
5,470,377 UART: RITY.KEYID = 7
5,485,293 UART: [art] Erasing AUTHORITY.KEYID = 7
5,486,058 UART: [art] PUB.X = F8B20A89E440C1AFE766AC43709AF2D98242F2F1F0463E0139ABE341222EF6541F0D723BD0537E2F2964A6AA6E1A1818
5,492,823 UART: [art] PUB.Y = C2042196FA424DB4ED6FB3A195D82ADE2D1645D2DB081F954237399782B9EB5AE84FE69910DA5453BCB7B8653E0BBBD3
5,499,776 UART: [art] SIG.R = FC06A29378A9F23570E15D2348CB4433FFAA852B88F950B58C76B8E20E04DFA6F0315C3A63057D3857C9768933B09091
5,506,530 UART: [art] SIG.S = 793559E4A6077993D35E47D17B5B81C0722E0ECB925A2ACD286C7B1B4D3EE1F4E2D85619F909871092F9B28E3872B9A3
5,530,300 UART: Caliptra RT
5,530,553 UART: [state] CFI Enabled
5,639,572 UART: [rt] RT listening for mailbox commands...
5,640,242 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,763,128 UART: [rt]cmd =0x41544d4e, len=14344
6,321,784 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,710 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,322 UART: [kat] SHA2-256
882,253 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,368 UART: [kat] ++
886,520 UART: [kat] sha1
890,886 UART: [kat] SHA2-256
892,824 UART: [kat] SHA2-384
895,709 UART: [kat] SHA2-512-ACC
897,610 UART: [kat] ECC-384
903,167 UART: [kat] HMAC-384Kdf
907,873 UART: [kat] LMS
1,476,069 UART: [kat] --
1,477,014 UART: [cold-reset] ++
1,477,494 UART: [fht] Storing FHT @ 0x50003400
1,480,139 UART: [idev] ++
1,480,307 UART: [idev] CDI.KEYID = 6
1,480,667 UART: [idev] SUBJECT.KEYID = 7
1,481,091 UART: [idev] UDS.KEYID = 0
1,481,436 ready_for_fw is high
1,481,436 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,941 UART: [idev] Erasing UDS.KEYID = 0
1,505,073 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,709 UART: [idev] --
1,514,940 UART: [ldev] ++
1,515,108 UART: [ldev] CDI.KEYID = 6
1,515,471 UART: [ldev] SUBJECT.KEYID = 5
1,515,897 UART: [ldev] AUTHORITY.KEYID = 7
1,516,360 UART: [ldev] FE.KEYID = 1
1,521,454 UART: [ldev] Erasing FE.KEYID = 1
1,546,313 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,505 UART: [ldev] --
1,585,800 UART: [fwproc] Waiting for Commands...
1,586,545 UART: [fwproc] Received command 0x46574c44
1,587,336 UART: [fwproc] Received Image of size 114332 bytes
5,272,203 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,300,771 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,330,123 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,465,968 >>> mbox cmd response: success
5,467,210 UART: [afmc] ++
5,467,378 UART: [afmc] CDI.KEYID = 6
5,467,740 UART: [afmc] SUBJECT.KEYID = 7
5,468,165 UART: [afmc] AUTHORITY.KEYID = 5
5,503,383 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,519,757 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,520,537 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,526,246 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,532,138 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,537,839 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,545,615 UART: [afmc] --
5,546,597 UART: [cold-reset] --
5,547,501 UART: [state] Locking Datavault
5,548,626 UART: [state] Locking PCR0, PCR1 and PCR31
5,549,230 UART: [state] Locking ICCM
5,549,806 UART: [exit] Launching FMC @ 0x40000130
5,555,135 UART:
5,555,151 UART: Running Caliptra FMC ...
5,555,559 UART:
5,555,702 UART: [state] CFI Enabled
5,566,374 UART: [fht] FMC Alias Private Key: 7
5,674,454 UART: [art] Extend RT PCRs Done
5,674,882 UART: [art] Lock RT PCRs Done
5,676,310 UART: [art] Populate DV Done
5,684,514 UART: [fht] FMC Alias Private Key: 7
5,685,656 UART: [art] Derive CDI
5,685,936 UART: [art] Store in in slot 0x4
5,771,683 UART: [art] Derive Key Pair
5,772,043 UART: [art] Store priv key in slot 0x5
5,785,577 UART: [art] Derive Key Pair - Done
5,800,641 UART: [art] Signing Cert with AUTHO
5,801,121 UART: RITY.KEYID = 7
5,816,413 UART: [art] Erasing AUTHORITY.KEYID = 7
5,817,178 UART: [art] PUB.X = 72B4A2110A4B7124913814F1BBBF1384E0714F0045BF2C7121136537489EC544BDCF957DB5D526A1AA3ECF2C4AFDF636
5,823,929 UART: [art] PUB.Y = CA66C26A2A5A4A1A0B8B8090C4581001B4AD03D1407CB6EA40D083AC37A9D0CA43FCC5FDA7836178B461AA48CD5BC0FB
5,830,890 UART: [art] SIG.R = F82C21ED449214E150BDD89D56740BC543995F7DBFED854FFB2A224D066E801EBC8E67F1A51701DC417C597CE63EB12A
5,837,663 UART: [art] SIG.S = CF4C32CF05AB5357997F956E76BF6EF472139E47CA311F1F94C4B82B20F6320331367BD5CAED1558F77DEDEEF321F92F
5,860,622 UART: Caliptra RT
5,860,967 UART: [state] CFI Enabled
5,968,939 UART: [rt] RT listening for mailbox commands...
5,969,609 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,092,641 UART: [rt]cmd =0x41544d4e, len=14344
6,658,448 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,044 ready_for_fw is high
1,363,044 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,939,508 >>> mbox cmd response: success
5,001,263 UART:
5,001,279 UART: Running Caliptra FMC ...
5,001,687 UART:
5,001,830 UART: [state] CFI Enabled
5,012,840 UART: [fht] FMC Alias Private Key: 7
5,120,824 UART: [art] Extend RT PCRs Done
5,121,252 UART: [art] Lock RT PCRs Done
5,122,852 UART: [art] Populate DV Done
5,131,196 UART: [fht] FMC Alias Private Key: 7
5,132,222 UART: [art] Derive CDI
5,132,502 UART: [art] Store in in slot 0x4
5,218,245 UART: [art] Derive Key Pair
5,218,605 UART: [art] Store priv key in slot 0x5
5,232,317 UART: [art] Derive Key Pair - Done
5,246,986 UART: [art] Signing Cert with AUTHO
5,247,466 UART: RITY.KEYID = 7
5,262,898 UART: [art] Erasing AUTHORITY.KEYID = 7
5,263,663 UART: [art] PUB.X = C78426F86F085BCF853AF9D28770697249978942827328196C821C5E4D0C9FDFB656BF6EF4001385299FE12B0404E8AB
5,270,393 UART: [art] PUB.Y = A70B45AC679A0AA8E1C61F52016D173ED4183A1C0E203B48DA41D4A96ABE12B1114A47E241BDE0AC0B3C02D288B99F3F
5,277,339 UART: [art] SIG.R = 9A5F0D9955015A78190BCA1175EA865B5EC7799B4FB89B0C6E1581762E7458F966315DDC9FE8B429BFBBCDCE16748C5B
5,284,107 UART: [art] SIG.S = 1BE3D23FB026508A395D0F70DB673E4849919415DC6E4A1824787390142C7D3BD73A3E4AFBD60FA6FC7F169BACD62287
5,308,040 UART: Caliptra RT
5,308,385 UART: [state] CFI Enabled
5,415,756 UART: [rt] RT listening for mailbox commands...
5,416,426 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,539,622 UART: [rt]cmd =0x41544d4e, len=14344
6,097,948 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
893,372 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,497 UART: [kat] ++
897,649 UART: [kat] sha1
901,977 UART: [kat] SHA2-256
903,917 UART: [kat] SHA2-384
906,776 UART: [kat] SHA2-512-ACC
908,677 UART: [kat] ECC-384
918,162 UART: [kat] HMAC-384Kdf
922,854 UART: [kat] LMS
1,171,182 UART: [kat] --
1,172,245 UART: [cold-reset] ++
1,172,611 UART: [fht] FHT @ 0x50003400
1,175,442 UART: [idev] ++
1,175,610 UART: [idev] CDI.KEYID = 6
1,175,970 UART: [idev] SUBJECT.KEYID = 7
1,176,394 UART: [idev] UDS.KEYID = 0
1,176,739 ready_for_fw is high
1,176,739 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,714 UART: [idev] Erasing UDS.KEYID = 0
1,202,097 UART: [idev] Sha1 KeyId Algorithm
1,210,463 UART: [idev] --
1,211,535 UART: [ldev] ++
1,211,703 UART: [ldev] CDI.KEYID = 6
1,212,066 UART: [ldev] SUBJECT.KEYID = 5
1,212,492 UART: [ldev] AUTHORITY.KEYID = 7
1,212,955 UART: [ldev] FE.KEYID = 1
1,218,017 UART: [ldev] Erasing FE.KEYID = 1
1,244,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,815 UART: [ldev] --
1,284,160 UART: [fwproc] Wait for Commands...
1,284,768 UART: [fwproc] Recv command 0x46574c44
1,285,496 UART: [fwproc] Recv'd Img size: 114332 bytes
3,130,250 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,605 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,909 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,322,826 >>> mbox cmd response: success
3,323,840 UART: [afmc] ++
3,324,008 UART: [afmc] CDI.KEYID = 6
3,324,370 UART: [afmc] SUBJECT.KEYID = 7
3,324,795 UART: [afmc] AUTHORITY.KEYID = 5
3,360,409 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,918 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,666 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,375 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,267 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,978 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,949 UART: [afmc] --
3,404,035 UART: [cold-reset] --
3,404,791 UART: [state] Locking Datavault
3,406,060 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,664 UART: [state] Locking ICCM
3,407,304 UART: [exit] Launching FMC @ 0x40000130
3,412,633 UART:
3,412,649 UART: Running Caliptra FMC ...
3,413,057 UART:
3,413,111 UART: [state] CFI Enabled
3,423,667 UART: [fht] FMC Alias Private Key: 7
3,531,987 UART: [art] Extend RT PCRs Done
3,532,415 UART: [art] Lock RT PCRs Done
3,534,015 UART: [art] Populate DV Done
3,542,025 UART: [fht] FMC Alias Private Key: 7
3,543,049 UART: [art] Derive CDI
3,543,329 UART: [art] Store in in slot 0x4
3,629,294 UART: [art] Derive Key Pair
3,629,654 UART: [art] Store priv key in slot 0x5
3,642,666 UART: [art] Derive Key Pair - Done
3,657,636 UART: [art] Signing Cert with AUTHO
3,658,116 UART: RITY.KEYID = 7
3,673,186 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,951 UART: [art] PUB.X = 2EE607191126C4B78F350BFD91CAC201B65DF219E7AF4092210309D0B371FD53BD1FC0671B9AF91EA867AF5451AFBA04
3,680,713 UART: [art] PUB.Y = 92DAEBF0C41AD82060CA06BA7F10E1F47E0D45326F0105312B33E1CCB5D23C4985C95A7461CA8BF1B793D675D71E618F
3,687,661 UART: [art] SIG.R = BE93FD921AFFAD9B23729D9580FCA9F143E930EEC8DCB98F0D3CCA693E86E8D71F235A003F745AE7DF697B11DE6DFD29
3,694,430 UART: [art] SIG.S = EE53900E208CE68F3E7253150A8CCAFECFFE139C67B1D5FCFFE7FECBB504C6BEFF596B7469A88CD17CE87E6503F1B38F
3,718,083 UART: Caliptra RT
3,718,336 UART: [state] CFI Enabled
3,826,843 UART: [rt] RT listening for mailbox commands...
3,827,513 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,391 UART: [rt]cmd =0x41544d4e, len=14344
4,513,487 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,209 ready_for_fw is high
1,060,209 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,169,053 >>> mbox cmd response: success
3,231,624 UART:
3,231,640 UART: Running Caliptra FMC ...
3,232,048 UART:
3,232,102 UART: [state] CFI Enabled
3,242,364 UART: [fht] FMC Alias Private Key: 7
3,349,984 UART: [art] Extend RT PCRs Done
3,350,412 UART: [art] Lock RT PCRs Done
3,352,028 UART: [art] Populate DV Done
3,360,212 UART: [fht] FMC Alias Private Key: 7
3,361,250 UART: [art] Derive CDI
3,361,530 UART: [art] Store in in slot 0x4
3,447,071 UART: [art] Derive Key Pair
3,447,431 UART: [art] Store priv key in slot 0x5
3,460,321 UART: [art] Derive Key Pair - Done
3,474,758 UART: [art] Signing Cert with AUTHO
3,475,238 UART: RITY.KEYID = 7
3,490,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,663 UART: [art] PUB.X = 5050C31DAFF1050773B915E6302BE57670C23937926ABC739777A564B0834BC2369BF2CA362652188B5EC332CD2F83CA
3,498,423 UART: [art] PUB.Y = B1A10AE2932E30ABDED4E31DACB628F8EE9BC5EC5890ADCF26DF307489A1EC5584156242745F9D0698D1639360DA5E96
3,505,379 UART: [art] SIG.R = 9F024C8406841D798ECB0E08B94942F0C57A31486CCCB8B4B6E840875F535E6428F033ADC92C4AF8BCB538EBD221FD07
3,512,142 UART: [art] SIG.S = B965F3E6CE71EC0440F1A7199EB3FF38B2429DBCA347F3DCCEDF0740DD76560FBF6538993A4F3E8A16EC826DB029D054
3,536,104 UART: Caliptra RT
3,536,357 UART: [state] CFI Enabled
3,643,316 UART: [rt] RT listening for mailbox commands...
3,643,986 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,862 UART: [rt]cmd =0x41544d4e, len=14344
4,324,716 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
88,073 UART: [kat] SHA2-256
893,723 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,848 UART: [kat] ++
898,000 UART: [kat] sha1
902,192 UART: [kat] SHA2-256
904,132 UART: [kat] SHA2-384
906,967 UART: [kat] SHA2-512-ACC
908,868 UART: [kat] ECC-384
918,721 UART: [kat] HMAC-384Kdf
923,263 UART: [kat] LMS
1,171,591 UART: [kat] --
1,172,454 UART: [cold-reset] ++
1,172,842 UART: [fht] FHT @ 0x50003400
1,175,379 UART: [idev] ++
1,175,547 UART: [idev] CDI.KEYID = 6
1,175,907 UART: [idev] SUBJECT.KEYID = 7
1,176,331 UART: [idev] UDS.KEYID = 0
1,176,676 ready_for_fw is high
1,176,676 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,443 UART: [idev] Erasing UDS.KEYID = 0
1,201,362 UART: [idev] Sha1 KeyId Algorithm
1,209,806 UART: [idev] --
1,210,746 UART: [ldev] ++
1,210,914 UART: [ldev] CDI.KEYID = 6
1,211,277 UART: [ldev] SUBJECT.KEYID = 5
1,211,703 UART: [ldev] AUTHORITY.KEYID = 7
1,212,166 UART: [ldev] FE.KEYID = 1
1,217,516 UART: [ldev] Erasing FE.KEYID = 1
1,243,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,482 UART: [ldev] --
1,282,971 UART: [fwproc] Wait for Commands...
1,283,655 UART: [fwproc] Recv command 0x46574c44
1,284,383 UART: [fwproc] Recv'd Img size: 114332 bytes
3,132,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,523 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,827 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,324,538 >>> mbox cmd response: success
3,325,606 UART: [afmc] ++
3,325,774 UART: [afmc] CDI.KEYID = 6
3,326,136 UART: [afmc] SUBJECT.KEYID = 7
3,326,561 UART: [afmc] AUTHORITY.KEYID = 5
3,363,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,170 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,918 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,627 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,519 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,230 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,405,979 UART: [afmc] --
3,406,973 UART: [cold-reset] --
3,407,917 UART: [state] Locking Datavault
3,409,224 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,828 UART: [state] Locking ICCM
3,410,470 UART: [exit] Launching FMC @ 0x40000130
3,415,799 UART:
3,415,815 UART: Running Caliptra FMC ...
3,416,223 UART:
3,416,366 UART: [state] CFI Enabled
3,426,572 UART: [fht] FMC Alias Private Key: 7
3,533,786 UART: [art] Extend RT PCRs Done
3,534,214 UART: [art] Lock RT PCRs Done
3,535,604 UART: [art] Populate DV Done
3,544,074 UART: [fht] FMC Alias Private Key: 7
3,545,254 UART: [art] Derive CDI
3,545,534 UART: [art] Store in in slot 0x4
3,631,309 UART: [art] Derive Key Pair
3,631,669 UART: [art] Store priv key in slot 0x5
3,645,535 UART: [art] Derive Key Pair - Done
3,660,554 UART: [art] Signing Cert with AUTHO
3,661,034 UART: RITY.KEYID = 7
3,675,716 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,481 UART: [art] PUB.X = FDC2D2FE5DDF36C22604808F034378F2B966A3FE5B7071853BC4C6E9BBA95C762F812C946BCAFD5BC5DB96F334317DA3
3,683,261 UART: [art] PUB.Y = 2B2346EB4AAC4FF32087320769BF519B7F2C88B6DD33CC473698F8E4FBB30D43D90FE530617268FA3752EF80A14893EB
3,690,208 UART: [art] SIG.R = 33F5D20EB290EF965AF710DFEEDCFEAD2661CEB5823947130BB94D511E11CD8550A18CE58ACA213007BEA5271ACEF273
3,696,987 UART: [art] SIG.S = FF2CB52A6519FE2AD97E86C56DAAF9459E7ECFFAE492FB78D0E54BE143D96D88C36D99671C4F7FBB10B12E05685B198F
3,721,031 UART: Caliptra RT
3,721,376 UART: [state] CFI Enabled
3,828,732 UART: [rt] RT listening for mailbox commands...
3,829,402 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,424 UART: [rt]cmd =0x41544d4e, len=14344
4,515,294 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,164 ready_for_fw is high
1,060,164 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,156,053 >>> mbox cmd response: success
3,219,104 UART:
3,219,120 UART: Running Caliptra FMC ...
3,219,528 UART:
3,219,671 UART: [state] CFI Enabled
3,229,933 UART: [fht] FMC Alias Private Key: 7
3,338,111 UART: [art] Extend RT PCRs Done
3,338,539 UART: [art] Lock RT PCRs Done
3,340,123 UART: [art] Populate DV Done
3,348,399 UART: [fht] FMC Alias Private Key: 7
3,349,441 UART: [art] Derive CDI
3,349,721 UART: [art] Store in in slot 0x4
3,435,310 UART: [art] Derive Key Pair
3,435,670 UART: [art] Store priv key in slot 0x5
3,449,378 UART: [art] Derive Key Pair - Done
3,464,119 UART: [art] Signing Cert with AUTHO
3,464,599 UART: RITY.KEYID = 7
3,479,607 UART: [art] Erasing AUTHORITY.KEYID = 7
3,480,372 UART: [art] PUB.X = 155D38CC9AE3BF03F88A57966DAEB10EF44DFE031B11FF0D4FBFD0E6326B0F916793F436756FA1ECCCC4A95D0BA96EE3
3,487,148 UART: [art] PUB.Y = B16E9FA9A661FA4BFF6094FC540000591F2B515C9BE7F238107D382B34F5A3ED5FF694A940205D64683B7B4A2EC48B24
3,494,060 UART: [art] SIG.R = FF26346D209175EB2A5D6958C69E55ED2AEC928A1E134EE0AA1FC210BFE62E86FF0220570CEB85F2B32AC0F9884A8B9A
3,500,840 UART: [art] SIG.S = AAF611F01A8AE0EC505EEE6B9B908BB322B55FC9E1B7FB0E256A073D01DE1591E3AD5BE7CBBAAA243A0E0F01DEDBCA34
3,524,979 UART: Caliptra RT
3,525,324 UART: [state] CFI Enabled
3,632,865 UART: [rt] RT listening for mailbox commands...
3,633,535 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,283 UART: [rt]cmd =0x41544d4e, len=14344
4,321,566 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,624 UART: [state] LifecycleState = Unprovisioned
85,279 UART: [state] DebugLocked = No
85,991 UART: [state] WD Timer not started. Device not locked for debugging
87,338 UART: [kat] SHA2-256
890,888 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,017 UART: [kat] ++
895,169 UART: [kat] sha1
899,413 UART: [kat] SHA2-256
901,353 UART: [kat] SHA2-384
903,874 UART: [kat] SHA2-512-ACC
905,775 UART: [kat] ECC-384
915,286 UART: [kat] HMAC-384Kdf
919,776 UART: [kat] LMS
1,168,088 UART: [kat] --
1,169,151 UART: [cold-reset] ++
1,169,517 UART: [fht] FHT @ 0x50003400
1,172,315 UART: [idev] ++
1,172,483 UART: [idev] CDI.KEYID = 6
1,172,844 UART: [idev] SUBJECT.KEYID = 7
1,173,269 UART: [idev] UDS.KEYID = 0
1,173,615 ready_for_fw is high
1,173,615 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,975 UART: [idev] Erasing UDS.KEYID = 0
1,197,943 UART: [idev] Sha1 KeyId Algorithm
1,206,937 UART: [idev] --
1,207,950 UART: [ldev] ++
1,208,118 UART: [ldev] CDI.KEYID = 6
1,208,482 UART: [ldev] SUBJECT.KEYID = 5
1,208,909 UART: [ldev] AUTHORITY.KEYID = 7
1,209,372 UART: [ldev] FE.KEYID = 1
1,214,624 UART: [ldev] Erasing FE.KEYID = 1
1,241,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,960 UART: [ldev] --
1,280,416 UART: [fwproc] Wait for Commands...
1,281,217 UART: [fwproc] Recv command 0x46574c44
1,281,950 UART: [fwproc] Recv'd Img size: 114332 bytes
3,113,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,140,645 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,169,954 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,305,692 >>> mbox cmd response: success
3,306,711 UART: [afmc] ++
3,306,879 UART: [afmc] CDI.KEYID = 6
3,307,242 UART: [afmc] SUBJECT.KEYID = 7
3,307,668 UART: [afmc] AUTHORITY.KEYID = 5
3,343,314 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,360,082 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,360,833 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,366,543 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,372,433 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,378,144 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,385,962 UART: [afmc] --
3,386,918 UART: [cold-reset] --
3,387,798 UART: [state] Locking Datavault
3,389,165 UART: [state] Locking PCR0, PCR1 and PCR31
3,389,769 UART: [state] Locking ICCM
3,390,233 UART: [exit] Launching FMC @ 0x40000130
3,395,562 UART:
3,395,578 UART: Running Caliptra FMC ...
3,395,986 UART:
3,396,040 UART: [state] CFI Enabled
3,406,320 UART: [fht] FMC Alias Private Key: 7
3,514,686 UART: [art] Extend RT PCRs Done
3,515,114 UART: [art] Lock RT PCRs Done
3,516,950 UART: [art] Populate DV Done
3,525,214 UART: [fht] FMC Alias Private Key: 7
3,526,166 UART: [art] Derive CDI
3,526,446 UART: [art] Store in in slot 0x4
3,612,659 UART: [art] Derive Key Pair
3,613,019 UART: [art] Store priv key in slot 0x5
3,625,899 UART: [art] Derive Key Pair - Done
3,640,655 UART: [art] Signing Cert with AUTHO
3,641,135 UART: RITY.KEYID = 7
3,656,627 UART: [art] Erasing AUTHORITY.KEYID = 7
3,657,392 UART: [art] PUB.X = 8C605304BEDB776FB8D799C74A9D7EEB4CE67601B9F741ED983D3601B6EF4A466E44DDD7C3CCFB3A3BEA2691E18FD88F
3,664,175 UART: [art] PUB.Y = D9ADCB976F42A238D5DBBB076C84CE2752BC9F5DC229B98E92DEDA5DC7F28A75F2923639937ED5558EE35C3C95B9B018
3,671,138 UART: [art] SIG.R = F6E6E1806AAA75E6BBF560E6420F811400BA3F03604657C64B6ACB4CDAFFF09A19237F4E10C41395B2DD5E08F14333A7
3,677,887 UART: [art] SIG.S = 5E75E845EDF2BDB330750E2CE7BB86FA611CC0A6986713AEAD7B9B02632D3D5239797B434C0CF9513AB1AB6DCD0614F7
3,701,596 UART: Caliptra RT
3,701,849 UART: [state] CFI Enabled
3,808,113 UART: [rt] RT listening for mailbox commands...
3,808,783 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,931,777 UART: [rt]cmd =0x41544d4e, len=14344
4,482,646 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,886 ready_for_fw is high
1,055,886 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,175,589 >>> mbox cmd response: success
3,237,652 UART:
3,237,668 UART: Running Caliptra FMC ...
3,238,076 UART:
3,238,130 UART: [state] CFI Enabled
3,248,442 UART: [fht] FMC Alias Private Key: 7
3,356,778 UART: [art] Extend RT PCRs Done
3,357,206 UART: [art] Lock RT PCRs Done
3,358,904 UART: [art] Populate DV Done
3,367,130 UART: [fht] FMC Alias Private Key: 7
3,368,272 UART: [art] Derive CDI
3,368,552 UART: [art] Store in in slot 0x4
3,454,247 UART: [art] Derive Key Pair
3,454,607 UART: [art] Store priv key in slot 0x5
3,467,173 UART: [art] Derive Key Pair - Done
3,482,184 UART: [art] Signing Cert with AUTHO
3,482,664 UART: RITY.KEYID = 7
3,497,804 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,569 UART: [art] PUB.X = 3FA6BA3D3DBDDE138EEE7D6B7D3D6DAC59C0657031CD36C830B86CE351617B6812C26223BCC596154A9510920CAFDF24
3,505,350 UART: [art] PUB.Y = DBE769BC035D3C352C60C51344BE101211B7243CDC892D9DB1D4C04B0A4FCFACE3FF83EFED7E0DBE422B113A57BDBD60
3,512,317 UART: [art] SIG.R = D3CF152BCB75B8339B71446E4F87D62D29817FCBBE1D0FE0E3CADC2159C5A43B1CC18044EEBE271032852E71056E6415
3,519,091 UART: [art] SIG.S = A4DB63D7749C8C75636FEDBA86B8A81CBB26B9934217F8F6F74A23C4670693D561C7E633E14E93254BE9A6BF7CAB72C6
3,543,697 UART: Caliptra RT
3,543,950 UART: [state] CFI Enabled
3,651,513 UART: [rt] RT listening for mailbox commands...
3,652,183 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,303 UART: [rt]cmd =0x41544d4e, len=14344
4,336,354 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,554 UART: [kat] ++
895,706 UART: [kat] sha1
899,890 UART: [kat] SHA2-256
901,830 UART: [kat] SHA2-384
904,593 UART: [kat] SHA2-512-ACC
906,494 UART: [kat] ECC-384
916,239 UART: [kat] HMAC-384Kdf
920,903 UART: [kat] LMS
1,169,215 UART: [kat] --
1,170,176 UART: [cold-reset] ++
1,170,614 UART: [fht] FHT @ 0x50003400
1,173,276 UART: [idev] ++
1,173,444 UART: [idev] CDI.KEYID = 6
1,173,805 UART: [idev] SUBJECT.KEYID = 7
1,174,230 UART: [idev] UDS.KEYID = 0
1,174,576 ready_for_fw is high
1,174,576 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,900 UART: [idev] Erasing UDS.KEYID = 0
1,199,074 UART: [idev] Sha1 KeyId Algorithm
1,208,010 UART: [idev] --
1,209,123 UART: [ldev] ++
1,209,291 UART: [ldev] CDI.KEYID = 6
1,209,655 UART: [ldev] SUBJECT.KEYID = 5
1,210,082 UART: [ldev] AUTHORITY.KEYID = 7
1,210,545 UART: [ldev] FE.KEYID = 1
1,215,923 UART: [ldev] Erasing FE.KEYID = 1
1,242,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,007 UART: [ldev] --
1,281,491 UART: [fwproc] Wait for Commands...
1,282,188 UART: [fwproc] Recv command 0x46574c44
1,282,921 UART: [fwproc] Recv'd Img size: 114332 bytes
3,122,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,061 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,370 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,315,238 >>> mbox cmd response: success
3,316,411 UART: [afmc] ++
3,316,579 UART: [afmc] CDI.KEYID = 6
3,316,942 UART: [afmc] SUBJECT.KEYID = 7
3,317,368 UART: [afmc] AUTHORITY.KEYID = 5
3,352,820 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,152 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,903 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,613 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,503 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,214 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,172 UART: [afmc] --
3,396,206 UART: [cold-reset] --
3,396,894 UART: [state] Locking Datavault
3,398,013 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,617 UART: [state] Locking ICCM
3,399,109 UART: [exit] Launching FMC @ 0x40000130
3,404,438 UART:
3,404,454 UART: Running Caliptra FMC ...
3,404,862 UART:
3,405,005 UART: [state] CFI Enabled
3,415,539 UART: [fht] FMC Alias Private Key: 7
3,523,115 UART: [art] Extend RT PCRs Done
3,523,543 UART: [art] Lock RT PCRs Done
3,525,439 UART: [art] Populate DV Done
3,533,363 UART: [fht] FMC Alias Private Key: 7
3,534,501 UART: [art] Derive CDI
3,534,781 UART: [art] Store in in slot 0x4
3,620,398 UART: [art] Derive Key Pair
3,620,758 UART: [art] Store priv key in slot 0x5
3,634,136 UART: [art] Derive Key Pair - Done
3,648,852 UART: [art] Signing Cert with AUTHO
3,649,332 UART: RITY.KEYID = 7
3,664,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,285 UART: [art] PUB.X = FCE6B94000D5930478A0840E287A6BC85F6C9F525B694B84F5229309245F4C14A9BB9A02433259140E32651581348AF7
3,672,006 UART: [art] PUB.Y = 40AF41E0729A3916C2ED9AB7B7B97104E8BE3DB70E7FCD89B1B7228950469B437E81612BCBE2D92B8F5E3D5191823580
3,678,954 UART: [art] SIG.R = D922E16E7A721B365C9C4C0A573608EC8D33A6F79D4F9EDB16C233F98E1D7187CEF7A976E7179651A81253BB3E4309BE
3,685,721 UART: [art] SIG.S = DF520084A3046E15747CE56D8EB90E8CCCAF0C5C9757B0F1296426F5A93E6723875A3021C21FD07FDE6E8AF921351BEE
3,709,175 UART: Caliptra RT
3,709,520 UART: [state] CFI Enabled
3,817,349 UART: [rt] RT listening for mailbox commands...
3,818,019 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,521 UART: [rt]cmd =0x41544d4e, len=14344
4,504,825 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,135 ready_for_fw is high
1,056,135 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,169,406 >>> mbox cmd response: success
3,231,429 UART:
3,231,445 UART: Running Caliptra FMC ...
3,231,853 UART:
3,231,996 UART: [state] CFI Enabled
3,242,714 UART: [fht] FMC Alias Private Key: 7
3,351,166 UART: [art] Extend RT PCRs Done
3,351,594 UART: [art] Lock RT PCRs Done
3,353,204 UART: [art] Populate DV Done
3,361,248 UART: [fht] FMC Alias Private Key: 7
3,362,388 UART: [art] Derive CDI
3,362,668 UART: [art] Store in in slot 0x4
3,448,683 UART: [art] Derive Key Pair
3,449,043 UART: [art] Store priv key in slot 0x5
3,462,637 UART: [art] Derive Key Pair - Done
3,477,474 UART: [art] Signing Cert with AUTHO
3,477,954 UART: RITY.KEYID = 7
3,493,186 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,951 UART: [art] PUB.X = BA1A803FD78592740DBBE6FE3E5DAF357B4F23DC44C9B83DC87F81D0B36BAA416A9F87D10967BBF5206C73566B7372F6
3,500,729 UART: [art] PUB.Y = E24D41FED90F14D1F22C86A7AE6D018E0E78F24CE6EE9B224C92002E1ACD7625180626396EF06C3EF91D20BDB0D189E7
3,507,657 UART: [art] SIG.R = FF4FA3DA1FEA73FFC095E9F1C6E283C657F4C56EDF467FB41A18652BBBA843BCDFF8EAE3BB61DFCA5567E9D1EF9718EC
3,514,463 UART: [art] SIG.S = F76CDCDC1CD2C0633A6A14A132F43B3F647FF8DF5807F24809CD491E0D947C9CC05A2AA98DCBB9E3575FDF33546B9FBC
3,538,083 UART: Caliptra RT
3,538,428 UART: [state] CFI Enabled
3,646,459 UART: [rt] RT listening for mailbox commands...
3,647,129 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,293 UART: [rt]cmd =0x41544d4e, len=14344
4,335,930 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = No
86,209 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,853 UART: [kat] SHA2-256
881,784 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,899 UART: [kat] ++
886,051 UART: [kat] sha1
890,191 UART: [kat] SHA2-256
892,129 UART: [kat] SHA2-384
894,764 UART: [kat] SHA2-512-ACC
896,665 UART: [kat] ECC-384
901,928 UART: [kat] HMAC-384Kdf
906,760 UART: [kat] LMS
1,474,956 UART: [kat] --
1,475,937 UART: [cold-reset] ++
1,476,503 UART: [fht] Storing FHT @ 0x50003400
1,479,308 UART: [idev] ++
1,479,476 UART: [idev] CDI.KEYID = 6
1,479,836 UART: [idev] SUBJECT.KEYID = 7
1,480,260 UART: [idev] UDS.KEYID = 0
1,480,605 ready_for_fw is high
1,480,605 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,552 UART: [idev] Erasing UDS.KEYID = 0
1,505,160 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,842 UART: [idev] --
1,515,115 UART: [ldev] ++
1,515,283 UART: [ldev] CDI.KEYID = 6
1,515,646 UART: [ldev] SUBJECT.KEYID = 5
1,516,072 UART: [ldev] AUTHORITY.KEYID = 7
1,516,535 UART: [ldev] FE.KEYID = 1
1,521,775 UART: [ldev] Erasing FE.KEYID = 1
1,547,064 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,028 UART: [ldev] --
1,586,421 UART: [fwproc] Waiting for Commands...
1,587,276 UART: [fwproc] Received command 0x46574c44
1,588,067 UART: [fwproc] Received Image of size 114332 bytes
5,197,184 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,224,608 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,253,960 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,389,785 >>> mbox cmd response: success
5,390,893 UART: [afmc] ++
5,391,061 UART: [afmc] CDI.KEYID = 6
5,391,423 UART: [afmc] SUBJECT.KEYID = 7
5,391,848 UART: [afmc] AUTHORITY.KEYID = 5
5,426,084 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,442,448 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,443,228 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,448,937 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,454,829 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,460,530 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,468,214 UART: [afmc] --
5,469,242 UART: [cold-reset] --
5,470,006 UART: [state] Locking Datavault
5,470,949 UART: [state] Locking PCR0, PCR1 and PCR31
5,471,553 UART: [state] Locking ICCM
5,472,009 UART: [exit] Launching FMC @ 0x40000130
5,477,338 UART:
5,477,354 UART: Running Caliptra FMC ...
5,477,762 UART:
5,477,816 UART: [state] CFI Enabled
5,488,226 UART: [fht] FMC Alias Private Key: 7
5,596,188 UART: [art] Extend RT PCRs Done
5,596,616 UART: [art] Lock RT PCRs Done
5,598,352 UART: [art] Populate DV Done
5,606,440 UART: [fht] FMC Alias Private Key: 7
5,607,564 UART: [art] Derive CDI
5,607,844 UART: [art] Store in in slot 0x4
5,693,533 UART: [art] Derive Key Pair
5,693,893 UART: [art] Store priv key in slot 0x5
5,706,497 UART: [art] Derive Key Pair - Done
5,721,781 UART: [art] Signing Cert with AUTHO
5,722,261 UART: RITY.KEYID = 7
5,737,165 UART: [art] Erasing AUTHORITY.KEYID = 7
5,737,930 UART: [art] PUB.X = C74A7CB72DF2134329DF26D1A3F04367694CBFC96D0A9209A76E073A1168E88E24B2B2DAC1EAB9115AB3526E17D17DB7
5,744,701 UART: [art] PUB.Y = 63142E07836397F7BDF5A65D941ACFEA96BEFB321A3584601A55F9064EE142F4CAAA27AC52E34ACC4FEBB741CA497EBC
5,751,665 UART: [art] SIG.R = 3336590F8CE264125112D556D1BDBCFC4DB8B208399BA62E3D8DCBC7E322AD129B02C940C4EA852D1380DA6211D6F800
5,758,412 UART: [art] SIG.S = 852EDBB3CD46B853260D261CF16C1A3CED768D9929A343615C632BDBE45319B5CC050535AEBBF1857210E68A41707D82
5,782,740 UART: Caliptra RT
5,782,993 UART: [state] CFI Enabled
5,890,324 UART: [rt] RT listening for mailbox commands...
5,890,994 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,013,848 UART: [rt]cmd =0x41544d4e, len=14344
7,397,478 >>> mbox cmd response data (8 bytes)
7,397,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,426,850 UART: [rt]cmd =0x494e464f, len=4
7,430,463 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,507 ready_for_fw is high
1,362,507 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,276,580 >>> mbox cmd response: success
5,338,119 UART:
5,338,135 UART: Running Caliptra FMC ...
5,338,543 UART:
5,338,597 UART: [state] CFI Enabled
5,348,979 UART: [fht] FMC Alias Private Key: 7
5,457,705 UART: [art] Extend RT PCRs Done
5,458,133 UART: [art] Lock RT PCRs Done
5,459,641 UART: [art] Populate DV Done
5,467,875 UART: [fht] FMC Alias Private Key: 7
5,468,827 UART: [art] Derive CDI
5,469,107 UART: [art] Store in in slot 0x4
5,555,176 UART: [art] Derive Key Pair
5,555,536 UART: [art] Store priv key in slot 0x5
5,568,634 UART: [art] Derive Key Pair - Done
5,583,417 UART: [art] Signing Cert with AUTHO
5,583,897 UART: RITY.KEYID = 7
5,599,187 UART: [art] Erasing AUTHORITY.KEYID = 7
5,599,952 UART: [art] PUB.X = 44E5774E02BFF096DD169F9AF398456285BC7004CF1EDB03AF4DD336A09EFA8FCACD88EBE3D4CB2CDB1C521AB15EA474
5,606,739 UART: [art] PUB.Y = 23CA04BB269A931CF979A0751A749ABCE1C5C184034C2720051F869D4E1D84A9955FEF670B0DC7FCB96715336274DE2C
5,613,678 UART: [art] SIG.R = 87B22EEB2075AE20A0F59FC9C859A593B863D55D053E1D6BB976F7DC2810E132A580D75C033BC3E3ADE8A49182BA7E7B
5,620,454 UART: [art] SIG.S = 3349BC269EC7D4737D3AD217629A547E931FCA448AE9842FE308101E9FA39AFBECFBF7DF0B9CD6208BDE21CE4C92E3C7
5,644,263 UART: Caliptra RT
5,644,516 UART: [state] CFI Enabled
5,753,449 UART: [rt] RT listening for mailbox commands...
5,754,119 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,877,349 UART: [rt]cmd =0x41544d4e, len=14344
7,290,051 >>> mbox cmd response data (8 bytes)
7,290,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,319,463 UART: [rt]cmd =0x494e464f, len=4
7,323,262 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,761 UART: [state] LifecycleState = Unprovisioned
86,416 UART: [state] DebugLocked = No
87,044 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,698 UART: [kat] SHA2-256
882,629 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,744 UART: [kat] ++
886,896 UART: [kat] sha1
891,172 UART: [kat] SHA2-256
893,110 UART: [kat] SHA2-384
895,829 UART: [kat] SHA2-512-ACC
897,730 UART: [kat] ECC-384
903,207 UART: [kat] HMAC-384Kdf
907,869 UART: [kat] LMS
1,476,065 UART: [kat] --
1,477,100 UART: [cold-reset] ++
1,477,578 UART: [fht] Storing FHT @ 0x50003400
1,480,351 UART: [idev] ++
1,480,519 UART: [idev] CDI.KEYID = 6
1,480,879 UART: [idev] SUBJECT.KEYID = 7
1,481,303 UART: [idev] UDS.KEYID = 0
1,481,648 ready_for_fw is high
1,481,648 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,527 UART: [idev] Erasing UDS.KEYID = 0
1,506,215 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,877 UART: [idev] --
1,515,818 UART: [ldev] ++
1,515,986 UART: [ldev] CDI.KEYID = 6
1,516,349 UART: [ldev] SUBJECT.KEYID = 5
1,516,775 UART: [ldev] AUTHORITY.KEYID = 7
1,517,238 UART: [ldev] FE.KEYID = 1
1,522,480 UART: [ldev] Erasing FE.KEYID = 1
1,547,585 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,603 UART: [ldev] --
1,586,914 UART: [fwproc] Waiting for Commands...
1,587,765 UART: [fwproc] Received command 0x46574c44
1,588,556 UART: [fwproc] Received Image of size 114332 bytes
5,197,923 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,225,065 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,254,417 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,390,298 >>> mbox cmd response: success
5,391,542 UART: [afmc] ++
5,391,710 UART: [afmc] CDI.KEYID = 6
5,392,072 UART: [afmc] SUBJECT.KEYID = 7
5,392,497 UART: [afmc] AUTHORITY.KEYID = 5
5,428,103 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,444,353 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,445,133 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,450,842 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,456,734 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,462,435 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,470,321 UART: [afmc] --
5,471,263 UART: [cold-reset] --
5,472,281 UART: [state] Locking Datavault
5,473,312 UART: [state] Locking PCR0, PCR1 and PCR31
5,473,916 UART: [state] Locking ICCM
5,474,432 UART: [exit] Launching FMC @ 0x40000130
5,479,761 UART:
5,479,777 UART: Running Caliptra FMC ...
5,480,185 UART:
5,480,328 UART: [state] CFI Enabled
5,490,994 UART: [fht] FMC Alias Private Key: 7
5,598,834 UART: [art] Extend RT PCRs Done
5,599,262 UART: [art] Lock RT PCRs Done
5,600,400 UART: [art] Populate DV Done
5,608,796 UART: [fht] FMC Alias Private Key: 7
5,609,968 UART: [art] Derive CDI
5,610,248 UART: [art] Store in in slot 0x4
5,695,773 UART: [art] Derive Key Pair
5,696,133 UART: [art] Store priv key in slot 0x5
5,709,615 UART: [art] Derive Key Pair - Done
5,724,937 UART: [art] Signing Cert with AUTHO
5,725,417 UART: RITY.KEYID = 7
5,740,553 UART: [art] Erasing AUTHORITY.KEYID = 7
5,741,318 UART: [art] PUB.X = 965B5EFD1DEC55759ECF586B7B80231B048BBB977A4A659C7307AC13646FC78DF7D63928231C68817FF7008567D647BB
5,748,062 UART: [art] PUB.Y = 0BF790766D583718F6F4DA0CAADDDB35DC014CD45C27FB346FD3F65D67CE2CD269D4E84BEA5C4BB108E1BCA1BF77E3E7
5,755,028 UART: [art] SIG.R = F5D762CA47C7C4E652E1CFD2E9EE8C9F1F686E98049C5EFF0786429750618263F7576CB190561C9D9753DC313A4F380F
5,761,791 UART: [art] SIG.S = 16D7C1E6C1EB88CE5B790DC5A45C63D66EE7FB814872A0A40E0B3D4E6780B247FAE06025C69216E65B7857E44C1D51A3
5,785,407 UART: Caliptra RT
5,785,752 UART: [state] CFI Enabled
5,894,147 UART: [rt] RT listening for mailbox commands...
5,894,817 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,017,999 UART: [rt]cmd =0x41544d4e, len=14344
7,407,015 >>> mbox cmd response data (8 bytes)
7,407,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,436,443 UART: [rt]cmd =0x494e464f, len=4
7,440,042 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,308 ready_for_fw is high
1,362,308 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,201,331 >>> mbox cmd response: success
5,262,918 UART:
5,262,934 UART: Running Caliptra FMC ...
5,263,342 UART:
5,263,485 UART: [state] CFI Enabled
5,274,097 UART: [fht] FMC Alias Private Key: 7
5,382,267 UART: [art] Extend RT PCRs Done
5,382,695 UART: [art] Lock RT PCRs Done
5,384,211 UART: [art] Populate DV Done
5,392,859 UART: [fht] FMC Alias Private Key: 7
5,393,989 UART: [art] Derive CDI
5,394,269 UART: [art] Store in in slot 0x4
5,479,624 UART: [art] Derive Key Pair
5,479,984 UART: [art] Store priv key in slot 0x5
5,493,094 UART: [art] Derive Key Pair - Done
5,507,679 UART: [art] Signing Cert with AUTHO
5,508,159 UART: RITY.KEYID = 7
5,523,231 UART: [art] Erasing AUTHORITY.KEYID = 7
5,523,996 UART: [art] PUB.X = AAE0629142301E69BDFA3B215BC6123DC4F2AEDB564BFFF54882C1B0DA44AF9E4B490B26867AA36B31A4DC91BDFB9D53
5,530,785 UART: [art] PUB.Y = 0CC61C247BD75857F4025435EE6E3FF4FDAE5A0ADD519075108C31F7ABFB9221DDE34B149E07B6630BBA00F5475561B9
5,537,708 UART: [art] SIG.R = 1831DB3E776FA99DB48FCB7E9431480821A906F5AEE13E73D4AAFA7C5D27FF9D465A3FE886D14CC3FC4B1B2CDE698A21
5,544,492 UART: [art] SIG.S = 513DF8B994D48B906B4B5223C80649241F4003BC5AC865AAAD0565D0ADB08FDFB806C84679FD9DF651BB43D8FF463E7E
5,568,609 UART: Caliptra RT
5,568,954 UART: [state] CFI Enabled
5,678,554 UART: [rt] RT listening for mailbox commands...
5,679,224 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,802,224 UART: [rt]cmd =0x41544d4e, len=14344
7,217,975 >>> mbox cmd response data (8 bytes)
7,217,976 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,247,499 UART: [rt]cmd =0x494e464f, len=4
7,251,218 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
893,492 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,617 UART: [kat] ++
897,769 UART: [kat] sha1
901,977 UART: [kat] SHA2-256
903,917 UART: [kat] SHA2-384
906,690 UART: [kat] SHA2-512-ACC
908,591 UART: [kat] ECC-384
918,324 UART: [kat] HMAC-384Kdf
923,092 UART: [kat] LMS
1,171,420 UART: [kat] --
1,172,205 UART: [cold-reset] ++
1,172,643 UART: [fht] FHT @ 0x50003400
1,175,244 UART: [idev] ++
1,175,412 UART: [idev] CDI.KEYID = 6
1,175,772 UART: [idev] SUBJECT.KEYID = 7
1,176,196 UART: [idev] UDS.KEYID = 0
1,176,541 ready_for_fw is high
1,176,541 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,088 UART: [idev] Erasing UDS.KEYID = 0
1,201,023 UART: [idev] Sha1 KeyId Algorithm
1,209,417 UART: [idev] --
1,210,527 UART: [ldev] ++
1,210,695 UART: [ldev] CDI.KEYID = 6
1,211,058 UART: [ldev] SUBJECT.KEYID = 5
1,211,484 UART: [ldev] AUTHORITY.KEYID = 7
1,211,947 UART: [ldev] FE.KEYID = 1
1,216,929 UART: [ldev] Erasing FE.KEYID = 1
1,243,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,599 UART: [ldev] --
1,282,040 UART: [fwproc] Wait for Commands...
1,282,848 UART: [fwproc] Recv command 0x46574c44
1,283,576 UART: [fwproc] Recv'd Img size: 114332 bytes
3,115,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,143,566 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,172,870 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,308,775 >>> mbox cmd response: success
3,309,971 UART: [afmc] ++
3,310,139 UART: [afmc] CDI.KEYID = 6
3,310,501 UART: [afmc] SUBJECT.KEYID = 7
3,310,926 UART: [afmc] AUTHORITY.KEYID = 5
3,345,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,362,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,363,105 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,368,814 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,374,706 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,380,417 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,388,084 UART: [afmc] --
3,389,150 UART: [cold-reset] --
3,389,954 UART: [state] Locking Datavault
3,390,861 UART: [state] Locking PCR0, PCR1 and PCR31
3,391,465 UART: [state] Locking ICCM
3,392,025 UART: [exit] Launching FMC @ 0x40000130
3,397,354 UART:
3,397,370 UART: Running Caliptra FMC ...
3,397,778 UART:
3,397,832 UART: [state] CFI Enabled
3,408,666 UART: [fht] FMC Alias Private Key: 7
3,516,604 UART: [art] Extend RT PCRs Done
3,517,032 UART: [art] Lock RT PCRs Done
3,518,676 UART: [art] Populate DV Done
3,526,984 UART: [fht] FMC Alias Private Key: 7
3,527,920 UART: [art] Derive CDI
3,528,200 UART: [art] Store in in slot 0x4
3,613,767 UART: [art] Derive Key Pair
3,614,127 UART: [art] Store priv key in slot 0x5
3,626,547 UART: [art] Derive Key Pair - Done
3,641,185 UART: [art] Signing Cert with AUTHO
3,641,665 UART: RITY.KEYID = 7
3,656,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,657,702 UART: [art] PUB.X = 04FD76C34BEB810F1B788B9D05E66D340FABC834B7DFE1C166C7D3E847E4A4757CFD147C16271CD58052A62C98C4CBEF
3,664,476 UART: [art] PUB.Y = C6D1DB7855F6F6E9A50575D6C4701779FE47B732598540C069B62AE910AB913E9105FE310F340E6DCAB1D8FAEDD1CC66
3,671,424 UART: [art] SIG.R = 839624AE3453DA6B3A304ACE2D412018F1C59988A7D52759D7C385D2AA90827AE6CA0D347C7FF21F5AAB66C9DF8A4E71
3,678,201 UART: [art] SIG.S = 8631E4DCCD43BA91C12B05CDB3F389D0938DD8BCB66F27F33CF310CF53AD0ED6F2421B3C1A3C6A75956E8124FB1BBB83
3,701,752 UART: Caliptra RT
3,702,005 UART: [state] CFI Enabled
3,810,198 UART: [rt] RT listening for mailbox commands...
3,810,868 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,933,840 UART: [rt]cmd =0x41544d4e, len=14344
5,344,925 >>> mbox cmd response data (8 bytes)
5,344,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,374,359 UART: [rt]cmd =0x494e464f, len=4
5,378,040 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,003 ready_for_fw is high
1,060,003 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,174,747 >>> mbox cmd response: success
3,236,888 UART:
3,236,904 UART: Running Caliptra FMC ...
3,237,312 UART:
3,237,366 UART: [state] CFI Enabled
3,247,646 UART: [fht] FMC Alias Private Key: 7
3,355,888 UART: [art] Extend RT PCRs Done
3,356,316 UART: [art] Lock RT PCRs Done
3,358,094 UART: [art] Populate DV Done
3,366,306 UART: [fht] FMC Alias Private Key: 7
3,367,426 UART: [art] Derive CDI
3,367,706 UART: [art] Store in in slot 0x4
3,453,487 UART: [art] Derive Key Pair
3,453,847 UART: [art] Store priv key in slot 0x5
3,467,531 UART: [art] Derive Key Pair - Done
3,482,327 UART: [art] Signing Cert with AUTHO
3,482,807 UART: RITY.KEYID = 7
3,498,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,499,332 UART: [art] PUB.X = 7CBFB11A4AB2459183AEAF7CDF7EF7AFBB3BC07E2FBA700FCA052D36D8DE786F18ABBDD9FC87AE7B4E6585F49137E450
3,506,128 UART: [art] PUB.Y = 7AFF77759BA3183159BE3DC9CC9F6F9B7F318E1670DA7679CB40907945DB75CF048C20A3B4354D407ABBB978321EBA91
3,513,083 UART: [art] SIG.R = 764A5C8802F3C39278C2FB6C9E450DB0689E4C68693D0909B91D715E51563A34E27488F408661214C28E12697E8B4203
3,519,821 UART: [art] SIG.S = B79F55F2761CFACB569F60AC6506F8B0BD93800871D266CEE2C7497201389D2CE8ECE7A640580F88B7E2061C8A7618F7
3,543,669 UART: Caliptra RT
3,543,922 UART: [state] CFI Enabled
3,651,838 UART: [rt] RT listening for mailbox commands...
3,652,508 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,768 UART: [rt]cmd =0x41544d4e, len=14344
5,189,262 >>> mbox cmd response data (8 bytes)
5,189,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,218,768 UART: [rt]cmd =0x494e464f, len=4
5,222,657 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
893,551 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,676 UART: [kat] ++
897,828 UART: [kat] sha1
901,884 UART: [kat] SHA2-256
903,824 UART: [kat] SHA2-384
906,663 UART: [kat] SHA2-512-ACC
908,564 UART: [kat] ECC-384
918,849 UART: [kat] HMAC-384Kdf
923,555 UART: [kat] LMS
1,171,883 UART: [kat] --
1,172,658 UART: [cold-reset] ++
1,173,102 UART: [fht] FHT @ 0x50003400
1,175,817 UART: [idev] ++
1,175,985 UART: [idev] CDI.KEYID = 6
1,176,345 UART: [idev] SUBJECT.KEYID = 7
1,176,769 UART: [idev] UDS.KEYID = 0
1,177,114 ready_for_fw is high
1,177,114 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,615 UART: [idev] Erasing UDS.KEYID = 0
1,201,380 UART: [idev] Sha1 KeyId Algorithm
1,209,804 UART: [idev] --
1,210,810 UART: [ldev] ++
1,210,978 UART: [ldev] CDI.KEYID = 6
1,211,341 UART: [ldev] SUBJECT.KEYID = 5
1,211,767 UART: [ldev] AUTHORITY.KEYID = 7
1,212,230 UART: [ldev] FE.KEYID = 1
1,217,510 UART: [ldev] Erasing FE.KEYID = 1
1,243,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,650 UART: [ldev] --
1,283,135 UART: [fwproc] Wait for Commands...
1,283,805 UART: [fwproc] Recv command 0x46574c44
1,284,533 UART: [fwproc] Recv'd Img size: 114332 bytes
3,125,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,235 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,539 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,319,436 >>> mbox cmd response: success
3,320,600 UART: [afmc] ++
3,320,768 UART: [afmc] CDI.KEYID = 6
3,321,130 UART: [afmc] SUBJECT.KEYID = 7
3,321,555 UART: [afmc] AUTHORITY.KEYID = 5
3,356,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,694 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,403 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,295 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,006 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,861 UART: [afmc] --
3,399,983 UART: [cold-reset] --
3,400,789 UART: [state] Locking Datavault
3,401,958 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,562 UART: [state] Locking ICCM
3,403,106 UART: [exit] Launching FMC @ 0x40000130
3,408,435 UART:
3,408,451 UART: Running Caliptra FMC ...
3,408,859 UART:
3,409,002 UART: [state] CFI Enabled
3,419,864 UART: [fht] FMC Alias Private Key: 7
3,527,314 UART: [art] Extend RT PCRs Done
3,527,742 UART: [art] Lock RT PCRs Done
3,529,432 UART: [art] Populate DV Done
3,537,586 UART: [fht] FMC Alias Private Key: 7
3,538,706 UART: [art] Derive CDI
3,538,986 UART: [art] Store in in slot 0x4
3,624,639 UART: [art] Derive Key Pair
3,624,999 UART: [art] Store priv key in slot 0x5
3,638,473 UART: [art] Derive Key Pair - Done
3,653,522 UART: [art] Signing Cert with AUTHO
3,654,002 UART: RITY.KEYID = 7
3,669,276 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,041 UART: [art] PUB.X = 1E9A3E00D78128B2B62B80C61781C7B3102B6A8AEB6F4822AF2AABA3C031E4F38614D39C859647AF12C17ABAC8E232FD
3,676,801 UART: [art] PUB.Y = DFF738D54E6B7A70DFBCDAD0C8D67A86FE45B446044666A0D95A618C59FECF6F70876761F2664EDABF5570E938B27D35
3,683,762 UART: [art] SIG.R = 6D16C0A453374BA69F4CBEDEFC9EAB8C03A2AEA01DB7D4538927530268309D2CC1DA621549364E0041544D6C247C0CA0
3,690,509 UART: [art] SIG.S = F10432A9DB1D54648732E9D022AFEFEFC3C100F8B8783CEF1B467F6BCA7FEEE6081E084FAFFD4BE6F5382D0D2B96643D
3,713,820 UART: Caliptra RT
3,714,165 UART: [state] CFI Enabled
3,821,691 UART: [rt] RT listening for mailbox commands...
3,822,361 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,541 UART: [rt]cmd =0x41544d4e, len=14344
5,351,548 >>> mbox cmd response data (8 bytes)
5,351,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,380,940 UART: [rt]cmd =0x494e464f, len=4
5,384,491 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,886 ready_for_fw is high
1,060,886 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,178,195 >>> mbox cmd response: success
3,240,646 UART:
3,240,662 UART: Running Caliptra FMC ...
3,241,070 UART:
3,241,213 UART: [state] CFI Enabled
3,251,645 UART: [fht] FMC Alias Private Key: 7
3,359,733 UART: [art] Extend RT PCRs Done
3,360,161 UART: [art] Lock RT PCRs Done
3,361,723 UART: [art] Populate DV Done
3,369,975 UART: [fht] FMC Alias Private Key: 7
3,370,951 UART: [art] Derive CDI
3,371,231 UART: [art] Store in in slot 0x4
3,457,210 UART: [art] Derive Key Pair
3,457,570 UART: [art] Store priv key in slot 0x5
3,471,174 UART: [art] Derive Key Pair - Done
3,486,165 UART: [art] Signing Cert with AUTHO
3,486,645 UART: RITY.KEYID = 7
3,501,925 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,690 UART: [art] PUB.X = 2E65141A1AD334B4AFEF669423A80775665BE9AFD1872F794116FCC61D6B7D2EE066757A9A8F69791B26C6942243E665
3,509,455 UART: [art] PUB.Y = 24AEEE788B437606BEBB0D96071351B06B1C243B863D01FC0E17D9711971F440222A4DB7CA0F0E22DDE37C60C257058A
3,516,385 UART: [art] SIG.R = 2C0DEFB594C97CC9088244079F8C1F8938EA9972F68A9A81CF18BB33B2AF49775F4D937C03660F625B334F7956AF3603
3,523,137 UART: [art] SIG.S = C5773FD4BD236210DF4674DD3967B439BB69DBD24747E7ECF63AC88033CE29F3470BE397F05AF7B0202FAC123C81BA35
3,546,833 UART: Caliptra RT
3,547,178 UART: [state] CFI Enabled
3,656,210 UART: [rt] RT listening for mailbox commands...
3,656,880 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,779,954 UART: [rt]cmd =0x41544d4e, len=14344
5,185,203 >>> mbox cmd response data (8 bytes)
5,185,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,214,445 UART: [rt]cmd =0x494e464f, len=4
5,218,182 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,786 UART: [state] LifecycleState = Unprovisioned
85,441 UART: [state] DebugLocked = No
86,015 UART: [state] WD Timer not started. Device not locked for debugging
87,286 UART: [kat] SHA2-256
890,836 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,965 UART: [kat] ++
895,117 UART: [kat] sha1
899,215 UART: [kat] SHA2-256
901,155 UART: [kat] SHA2-384
904,082 UART: [kat] SHA2-512-ACC
905,983 UART: [kat] ECC-384
915,546 UART: [kat] HMAC-384Kdf
920,166 UART: [kat] LMS
1,168,478 UART: [kat] --
1,169,407 UART: [cold-reset] ++
1,169,963 UART: [fht] FHT @ 0x50003400
1,172,735 UART: [idev] ++
1,172,903 UART: [idev] CDI.KEYID = 6
1,173,264 UART: [idev] SUBJECT.KEYID = 7
1,173,689 UART: [idev] UDS.KEYID = 0
1,174,035 ready_for_fw is high
1,174,035 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,567 UART: [idev] Erasing UDS.KEYID = 0
1,198,823 UART: [idev] Sha1 KeyId Algorithm
1,207,729 UART: [idev] --
1,208,744 UART: [ldev] ++
1,208,912 UART: [ldev] CDI.KEYID = 6
1,209,276 UART: [ldev] SUBJECT.KEYID = 5
1,209,703 UART: [ldev] AUTHORITY.KEYID = 7
1,210,166 UART: [ldev] FE.KEYID = 1
1,215,492 UART: [ldev] Erasing FE.KEYID = 1
1,241,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,126 UART: [ldev] --
1,280,476 UART: [fwproc] Wait for Commands...
1,281,083 UART: [fwproc] Recv command 0x46574c44
1,281,816 UART: [fwproc] Recv'd Img size: 114332 bytes
3,128,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,257 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,566 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,322,514 >>> mbox cmd response: success
3,323,645 UART: [afmc] ++
3,323,813 UART: [afmc] CDI.KEYID = 6
3,324,176 UART: [afmc] SUBJECT.KEYID = 7
3,324,602 UART: [afmc] AUTHORITY.KEYID = 5
3,360,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,636 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,387 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,097 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,987 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,698 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,470 UART: [afmc] --
3,403,362 UART: [cold-reset] --
3,404,282 UART: [state] Locking Datavault
3,405,391 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,995 UART: [state] Locking ICCM
3,406,425 UART: [exit] Launching FMC @ 0x40000130
3,411,754 UART:
3,411,770 UART: Running Caliptra FMC ...
3,412,178 UART:
3,412,232 UART: [state] CFI Enabled
3,422,770 UART: [fht] FMC Alias Private Key: 7
3,530,496 UART: [art] Extend RT PCRs Done
3,530,924 UART: [art] Lock RT PCRs Done
3,532,578 UART: [art] Populate DV Done
3,540,954 UART: [fht] FMC Alias Private Key: 7
3,542,130 UART: [art] Derive CDI
3,542,410 UART: [art] Store in in slot 0x4
3,628,063 UART: [art] Derive Key Pair
3,628,423 UART: [art] Store priv key in slot 0x5
3,641,841 UART: [art] Derive Key Pair - Done
3,656,495 UART: [art] Signing Cert with AUTHO
3,656,975 UART: RITY.KEYID = 7
3,671,443 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,208 UART: [art] PUB.X = AD3B8190433E66643EB8356A8F626E5E54A557D47A79285E2A6B1708D3A21988FC35B39E984380C202F207AF5700CD87
3,678,941 UART: [art] PUB.Y = 67BBCBC6F12B62901C6C7A7F5A1751CF8B2A4DF31EF9572FC83D359F3592D794C1470E73B58ADF324F99DB0D59D95A72
3,685,897 UART: [art] SIG.R = EB2758E2A5879D9CDE716111DC3464ABC4004ECFC264471105477FBB6E4B4DDC88D2D7085A05BF03E4B06AD7E98E20A4
3,692,645 UART: [art] SIG.S = 4602371AA641797B20428C9663663A3C405BC9507E7EB3730110B6D2755A1E74E71B179CA94DF9B2F9288123A5B949AF
3,716,574 UART: Caliptra RT
3,716,827 UART: [state] CFI Enabled
3,824,207 UART: [rt] RT listening for mailbox commands...
3,824,877 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,801 UART: [rt]cmd =0x41544d4e, len=14344
5,348,628 >>> mbox cmd response data (8 bytes)
5,348,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,377,976 UART: [rt]cmd =0x494e464f, len=4
5,381,679 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,870 ready_for_fw is high
1,055,870 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,157,753 >>> mbox cmd response: success
3,220,098 UART:
3,220,114 UART: Running Caliptra FMC ...
3,220,522 UART:
3,220,576 UART: [state] CFI Enabled
3,230,956 UART: [fht] FMC Alias Private Key: 7
3,338,328 UART: [art] Extend RT PCRs Done
3,338,756 UART: [art] Lock RT PCRs Done
3,340,034 UART: [art] Populate DV Done
3,348,244 UART: [fht] FMC Alias Private Key: 7
3,349,336 UART: [art] Derive CDI
3,349,616 UART: [art] Store in in slot 0x4
3,434,729 UART: [art] Derive Key Pair
3,435,089 UART: [art] Store priv key in slot 0x5
3,448,955 UART: [art] Derive Key Pair - Done
3,463,479 UART: [art] Signing Cert with AUTHO
3,463,959 UART: RITY.KEYID = 7
3,479,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,479,830 UART: [art] PUB.X = 77DC94FBBA4ECAD2116C70062C26DE15C89035890A812C9BD159437491012DCAF4AA745C44AF2099F5F0983F976AF693
3,486,595 UART: [art] PUB.Y = 4A257C9ED7795040E043A2EA4313D7C7FBBCE3FC1A0565FCC97A94C6B8424F058A7F8C0ADA5262C52B429BB60B0D4208
3,493,539 UART: [art] SIG.R = 5BE5912B0ED771F79AD3D32464D1D26AB4A595ACC1A14F95E741061ED4C3867F38F9C5E13CCA8C0DE6874D48712F3B3A
3,500,312 UART: [art] SIG.S = 19B37874E6F0B61304CBD86585A9E3499B9633CF40CB13EAC5297763AE79F214E734FA266F822492CF937D258933E321
3,523,336 UART: Caliptra RT
3,523,589 UART: [state] CFI Enabled
3,631,268 UART: [rt] RT listening for mailbox commands...
3,631,938 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,832 UART: [rt]cmd =0x41544d4e, len=14344
5,138,728 >>> mbox cmd response data (8 bytes)
5,138,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,168,246 UART: [rt]cmd =0x494e464f, len=4
5,172,105 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,025 UART: [state] LifecycleState = Unprovisioned
85,680 UART: [state] DebugLocked = No
86,176 UART: [state] WD Timer not started. Device not locked for debugging
87,513 UART: [kat] SHA2-256
891,063 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,192 UART: [kat] ++
895,344 UART: [kat] sha1
899,790 UART: [kat] SHA2-256
901,730 UART: [kat] SHA2-384
904,359 UART: [kat] SHA2-512-ACC
906,260 UART: [kat] ECC-384
916,103 UART: [kat] HMAC-384Kdf
920,785 UART: [kat] LMS
1,169,097 UART: [kat] --
1,169,798 UART: [cold-reset] ++
1,170,232 UART: [fht] FHT @ 0x50003400
1,172,912 UART: [idev] ++
1,173,080 UART: [idev] CDI.KEYID = 6
1,173,441 UART: [idev] SUBJECT.KEYID = 7
1,173,866 UART: [idev] UDS.KEYID = 0
1,174,212 ready_for_fw is high
1,174,212 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,160 UART: [idev] Erasing UDS.KEYID = 0
1,198,996 UART: [idev] Sha1 KeyId Algorithm
1,207,908 UART: [idev] --
1,209,043 UART: [ldev] ++
1,209,211 UART: [ldev] CDI.KEYID = 6
1,209,575 UART: [ldev] SUBJECT.KEYID = 5
1,210,002 UART: [ldev] AUTHORITY.KEYID = 7
1,210,465 UART: [ldev] FE.KEYID = 1
1,215,641 UART: [ldev] Erasing FE.KEYID = 1
1,242,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,229 UART: [ldev] --
1,281,495 UART: [fwproc] Wait for Commands...
1,282,142 UART: [fwproc] Recv command 0x46574c44
1,282,875 UART: [fwproc] Recv'd Img size: 114332 bytes
3,121,967 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,625 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,934 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,314,854 >>> mbox cmd response: success
3,315,915 UART: [afmc] ++
3,316,083 UART: [afmc] CDI.KEYID = 6
3,316,446 UART: [afmc] SUBJECT.KEYID = 7
3,316,872 UART: [afmc] AUTHORITY.KEYID = 5
3,352,996 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,087 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,797 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,687 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,398 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,354 UART: [afmc] --
3,396,434 UART: [cold-reset] --
3,397,334 UART: [state] Locking Datavault
3,398,293 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,897 UART: [state] Locking ICCM
3,399,529 UART: [exit] Launching FMC @ 0x40000130
3,404,858 UART:
3,404,874 UART: Running Caliptra FMC ...
3,405,282 UART:
3,405,425 UART: [state] CFI Enabled
3,416,147 UART: [fht] FMC Alias Private Key: 7
3,523,631 UART: [art] Extend RT PCRs Done
3,524,059 UART: [art] Lock RT PCRs Done
3,525,293 UART: [art] Populate DV Done
3,533,357 UART: [fht] FMC Alias Private Key: 7
3,534,395 UART: [art] Derive CDI
3,534,675 UART: [art] Store in in slot 0x4
3,620,312 UART: [art] Derive Key Pair
3,620,672 UART: [art] Store priv key in slot 0x5
3,633,966 UART: [art] Derive Key Pair - Done
3,648,846 UART: [art] Signing Cert with AUTHO
3,649,326 UART: RITY.KEYID = 7
3,664,030 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,795 UART: [art] PUB.X = 851B2A34647085F9597C139D37907205423F8FB9B23079F63216E84B1C5E0F445B765746B499F868514869B4FB4B07A9
3,671,540 UART: [art] PUB.Y = CA1359A7406361AABD42A9DEC339D1867258203333E1C7C5B5BA7DFCDE231E7E08FC7925D7144DA612233A78C0FC67A9
3,678,495 UART: [art] SIG.R = E39C2E0BC82840C9453148C93A24AF9D25119D8D468AD8C8D179AF60FED39665C42E38F657F3B8586B99085F336AC30B
3,685,258 UART: [art] SIG.S = 888E58AC2309C697D9C3F55441AD227DDD40F8D88267694CC3F142EC8C86496EF3D39AF2F2B65659249303C5F1CE858D
3,709,303 UART: Caliptra RT
3,709,648 UART: [state] CFI Enabled
3,817,619 UART: [rt] RT listening for mailbox commands...
3,818,289 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,417 UART: [rt]cmd =0x41544d4e, len=14344
5,352,516 >>> mbox cmd response data (8 bytes)
5,352,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,381,978 UART: [rt]cmd =0x494e464f, len=4
5,385,677 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,273 ready_for_fw is high
1,056,273 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,166,459 >>> mbox cmd response: success
3,230,124 UART:
3,230,140 UART: Running Caliptra FMC ...
3,230,548 UART:
3,230,691 UART: [state] CFI Enabled
3,241,145 UART: [fht] FMC Alias Private Key: 7
3,348,371 UART: [art] Extend RT PCRs Done
3,348,799 UART: [art] Lock RT PCRs Done
3,350,341 UART: [art] Populate DV Done
3,358,477 UART: [fht] FMC Alias Private Key: 7
3,359,547 UART: [art] Derive CDI
3,359,827 UART: [art] Store in in slot 0x4
3,445,410 UART: [art] Derive Key Pair
3,445,770 UART: [art] Store priv key in slot 0x5
3,459,296 UART: [art] Derive Key Pair - Done
3,473,829 UART: [art] Signing Cert with AUTHO
3,474,309 UART: RITY.KEYID = 7
3,489,757 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,522 UART: [art] PUB.X = C637A5CBFEDC21601D9637810C866FF7EBBEF71058E33AEF4FB3B6CDFDC7512879CC6B890526A7B0B727089482AE6580
3,497,295 UART: [art] PUB.Y = EFC86F2583229955AED59F08661D556D7905F8C11E78BE62174F1A83ACA6F82295B2A1FC91A56ECC9A3D1EFB05C2B000
3,504,224 UART: [art] SIG.R = 57D7795AFDC37A76B92A4D4A339B5AE0FA5176A2A26618B5B3AF10BA490EF49CF8B22AAC0AEEDA6C66637C881F91E402
3,511,003 UART: [art] SIG.S = 1DE9D6D3875FFAF10A77E0731C77B8764A558A18E744A2F0063F282315F8BE7B1380B8D98D0661595F406726DB4FA47E
3,534,593 UART: Caliptra RT
3,534,938 UART: [state] CFI Enabled
3,642,657 UART: [rt] RT listening for mailbox commands...
3,643,327 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,129 UART: [rt]cmd =0x41544d4e, len=14344
5,159,505 >>> mbox cmd response data (8 bytes)
5,159,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,188,871 UART: [rt]cmd =0x494e464f, len=4
5,192,486 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,327 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,931 UART: [kat] SHA2-256
881,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,977 UART: [kat] ++
886,129 UART: [kat] sha1
890,401 UART: [kat] SHA2-256
892,339 UART: [kat] SHA2-384
895,034 UART: [kat] SHA2-512-ACC
896,935 UART: [kat] ECC-384
902,212 UART: [kat] HMAC-384Kdf
906,718 UART: [kat] LMS
1,474,914 UART: [kat] --
1,475,929 UART: [cold-reset] ++
1,476,487 UART: [fht] Storing FHT @ 0x50003400
1,479,380 UART: [idev] ++
1,479,548 UART: [idev] CDI.KEYID = 6
1,479,908 UART: [idev] SUBJECT.KEYID = 7
1,480,332 UART: [idev] UDS.KEYID = 0
1,480,677 ready_for_fw is high
1,480,677 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,098 UART: [idev] Erasing UDS.KEYID = 0
1,504,408 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,796 UART: [idev] --
1,513,721 UART: [ldev] ++
1,513,889 UART: [ldev] CDI.KEYID = 6
1,514,252 UART: [ldev] SUBJECT.KEYID = 5
1,514,678 UART: [ldev] AUTHORITY.KEYID = 7
1,515,141 UART: [ldev] FE.KEYID = 1
1,520,321 UART: [ldev] Erasing FE.KEYID = 1
1,545,580 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,188 UART: [ldev] --
1,584,485 UART: [fwproc] Waiting for Commands...
1,585,268 UART: [fwproc] Received command 0x46574c44
1,586,059 UART: [fwproc] Received Image of size 114332 bytes
5,043,498 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,071,432 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,100,784 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,236,747 >>> mbox cmd response: success
5,237,779 UART: [afmc] ++
5,237,947 UART: [afmc] CDI.KEYID = 6
5,238,309 UART: [afmc] SUBJECT.KEYID = 7
5,238,734 UART: [afmc] AUTHORITY.KEYID = 5
5,273,404 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,289,712 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,290,492 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,296,201 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,302,093 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,307,794 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,315,680 UART: [afmc] --
5,316,780 UART: [cold-reset] --
5,317,650 UART: [state] Locking Datavault
5,318,927 UART: [state] Locking PCR0, PCR1 and PCR31
5,319,531 UART: [state] Locking ICCM
5,319,951 UART: [exit] Launching FMC @ 0x40000130
5,325,280 UART:
5,325,296 UART: Running Caliptra FMC ...
5,325,704 UART:
5,325,758 UART: [state] CFI Enabled
5,336,474 UART: [fht] FMC Alias Private Key: 7
5,444,386 UART: [art] Extend RT PCRs Done
5,444,814 UART: [art] Lock RT PCRs Done
5,446,344 UART: [art] Populate DV Done
5,454,356 UART: [fht] FMC Alias Private Key: 7
5,455,450 UART: [art] Derive CDI
5,455,730 UART: [art] Store in in slot 0x4
5,541,887 UART: [art] Derive Key Pair
5,542,247 UART: [art] Store priv key in slot 0x5
5,555,385 UART: [art] Derive Key Pair - Done
5,570,351 UART: [art] Signing Cert with AUTHO
5,570,831 UART: RITY.KEYID = 7
5,585,957 UART: [art] Erasing AUTHORITY.KEYID = 7
5,586,722 UART: [art] PUB.X = 1B63D241C3CA2E5ED6EEE4E89FD08B78EE81C102B2DF06ED596403BE541B8BC9BCFFAD9B20B514650169AEF00EA7AE65
5,593,501 UART: [art] PUB.Y = E353D51A4D8144A4D4B0E472017EDF5739F9B2BEA13E90D3C78B0C2CD0D9C94E8770848B5F87B5F77E537429684F1D8C
5,600,451 UART: [art] SIG.R = 6F2C6317655822BBBC7AE4C8BB1CD1C5EBC53E48CF7F48C56974B663C02DB1537815B98EFA0E39DB9BB9BC9FDB26AB8E
5,607,242 UART: [art] SIG.S = 825A5C9C4BAF25FF2B030E1B0C0A5FECAFE0E7EA19A9508EC9CC40018ED6A9498CADC578B7110F27E53565A8F55446E2
5,631,097 UART: Caliptra RT
5,631,350 UART: [state] CFI Enabled
5,739,719 UART: [rt] RT listening for mailbox commands...
5,740,389 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,863,555 UART: [rt]cmd =0x41544d4e, len=14344
6,433,784 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,471 ready_for_fw is high
1,363,471 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,202,294 >>> mbox cmd response: success
5,264,231 UART:
5,264,247 UART: Running Caliptra FMC ...
5,264,655 UART:
5,264,709 UART: [state] CFI Enabled
5,275,407 UART: [fht] FMC Alias Private Key: 7
5,383,547 UART: [art] Extend RT PCRs Done
5,383,975 UART: [art] Lock RT PCRs Done
5,385,503 UART: [art] Populate DV Done
5,393,375 UART: [fht] FMC Alias Private Key: 7
5,394,401 UART: [art] Derive CDI
5,394,681 UART: [art] Store in in slot 0x4
5,480,514 UART: [art] Derive Key Pair
5,480,874 UART: [art] Store priv key in slot 0x5
5,493,504 UART: [art] Derive Key Pair - Done
5,508,060 UART: [art] Signing Cert with AUTHO
5,508,540 UART: RITY.KEYID = 7
5,523,660 UART: [art] Erasing AUTHORITY.KEYID = 7
5,524,425 UART: [art] PUB.X = 3B75915D0A2B2AE5181CA769B1DB11194B36AD4C187825838287FF98D7D6F9A6AF78AFAE2A21F43142CFE73703EEC18D
5,531,199 UART: [art] PUB.Y = 54FE9F3750CC682632A178DD8F3C25985C9DBC62D2618F91C0ABD88BDC96570FAA8CF7148E28D0755965B1015083B39B
5,538,147 UART: [art] SIG.R = 678F2C3F84D207D23BCAA67809C31C397F3BF69C26FD6259D4958B09E7E2F84AA46C73B1C6C788978B20B60295FE9E28
5,544,909 UART: [art] SIG.S = FEA01EBBA59A034CA927D6D67B1C84AA1B62A9909C34F0031D2E2DE7EC7DCF84A061853D4AF16C4CBC59BDF935BA335E
5,568,894 UART: Caliptra RT
5,569,147 UART: [state] CFI Enabled
5,677,964 UART: [rt] RT listening for mailbox commands...
5,678,634 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,801,816 UART: [rt]cmd =0x41544d4e, len=14344
6,359,908 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,878 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,412 UART: [kat] SHA2-256
882,343 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,458 UART: [kat] ++
886,610 UART: [kat] sha1
890,708 UART: [kat] SHA2-256
892,646 UART: [kat] SHA2-384
895,423 UART: [kat] SHA2-512-ACC
897,324 UART: [kat] ECC-384
902,435 UART: [kat] HMAC-384Kdf
907,247 UART: [kat] LMS
1,475,443 UART: [kat] --
1,476,424 UART: [cold-reset] ++
1,476,776 UART: [fht] Storing FHT @ 0x50003400
1,479,565 UART: [idev] ++
1,479,733 UART: [idev] CDI.KEYID = 6
1,480,093 UART: [idev] SUBJECT.KEYID = 7
1,480,517 UART: [idev] UDS.KEYID = 0
1,480,862 ready_for_fw is high
1,480,862 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,329 UART: [idev] Erasing UDS.KEYID = 0
1,504,839 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,555 UART: [idev] --
1,514,556 UART: [ldev] ++
1,514,724 UART: [ldev] CDI.KEYID = 6
1,515,087 UART: [ldev] SUBJECT.KEYID = 5
1,515,513 UART: [ldev] AUTHORITY.KEYID = 7
1,515,976 UART: [ldev] FE.KEYID = 1
1,521,356 UART: [ldev] Erasing FE.KEYID = 1
1,546,657 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,457 UART: [ldev] --
1,585,754 UART: [fwproc] Waiting for Commands...
1,586,491 UART: [fwproc] Received command 0x46574c44
1,587,282 UART: [fwproc] Received Image of size 114332 bytes
5,158,622 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,187,106 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,216,458 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,352,363 >>> mbox cmd response: success
5,353,411 UART: [afmc] ++
5,353,579 UART: [afmc] CDI.KEYID = 6
5,353,941 UART: [afmc] SUBJECT.KEYID = 7
5,354,366 UART: [afmc] AUTHORITY.KEYID = 5
5,388,552 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,404,882 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,405,662 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,411,371 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,417,263 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,422,964 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,430,820 UART: [afmc] --
5,431,912 UART: [cold-reset] --
5,432,598 UART: [state] Locking Datavault
5,433,735 UART: [state] Locking PCR0, PCR1 and PCR31
5,434,339 UART: [state] Locking ICCM
5,434,837 UART: [exit] Launching FMC @ 0x40000130
5,440,166 UART:
5,440,182 UART: Running Caliptra FMC ...
5,440,590 UART:
5,440,733 UART: [state] CFI Enabled
5,451,493 UART: [fht] FMC Alias Private Key: 7
5,558,599 UART: [art] Extend RT PCRs Done
5,559,027 UART: [art] Lock RT PCRs Done
5,560,895 UART: [art] Populate DV Done
5,569,031 UART: [fht] FMC Alias Private Key: 7
5,570,159 UART: [art] Derive CDI
5,570,439 UART: [art] Store in in slot 0x4
5,656,062 UART: [art] Derive Key Pair
5,656,422 UART: [art] Store priv key in slot 0x5
5,670,088 UART: [art] Derive Key Pair - Done
5,684,991 UART: [art] Signing Cert with AUTHO
5,685,471 UART: RITY.KEYID = 7
5,700,823 UART: [art] Erasing AUTHORITY.KEYID = 7
5,701,588 UART: [art] PUB.X = AD47830F930EE6072DC0E98316CB0DE0EDDB97D77D7476BBFFE5D6E18190BC6C07CDC6AC358A148D6C0DFF9560778AA1
5,708,360 UART: [art] PUB.Y = FA29332A217A32B128873B66D463F248A135ED8B4800E97BF1E2168A9E9C9E7FEC9F0A4B2DEA02516038E7F91B590EF5
5,715,285 UART: [art] SIG.R = E2F9E1E880C803F0A47E82870DF5E6B3BA455ECD94096FBED2E34AA7852298FF344D5A865C3F45B214BBFB25E859E6D9
5,722,060 UART: [art] SIG.S = C159DBBA21A47A9DC68F66EC23DA703CF405B35121ECF774711966E25BB362602372C888DFCDF85D3147E4EA13FD1FFA
5,746,296 UART: Caliptra RT
5,746,641 UART: [state] CFI Enabled
5,855,057 UART: [rt] RT listening for mailbox commands...
5,855,727 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,978,809 UART: [rt]cmd =0x41544d4e, len=14344
6,536,717 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,986 ready_for_fw is high
1,362,986 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,165,102 >>> mbox cmd response: success
5,226,343 UART:
5,226,359 UART: Running Caliptra FMC ...
5,226,767 UART:
5,226,910 UART: [state] CFI Enabled
5,237,668 UART: [fht] FMC Alias Private Key: 7
5,346,254 UART: [art] Extend RT PCRs Done
5,346,682 UART: [art] Lock RT PCRs Done
5,348,332 UART: [art] Populate DV Done
5,356,326 UART: [fht] FMC Alias Private Key: 7
5,357,418 UART: [art] Derive CDI
5,357,698 UART: [art] Store in in slot 0x4
5,443,431 UART: [art] Derive Key Pair
5,443,791 UART: [art] Store priv key in slot 0x5
5,456,411 UART: [art] Derive Key Pair - Done
5,471,108 UART: [art] Signing Cert with AUTHO
5,471,588 UART: RITY.KEYID = 7
5,486,634 UART: [art] Erasing AUTHORITY.KEYID = 7
5,487,399 UART: [art] PUB.X = 773B2A9558663B1FE58F71FC54B235D07CF66339C709D337294E50215FC25A71187BA93D57BDD35E1A797DBC8A6F22A7
5,494,168 UART: [art] PUB.Y = EFF45B13B2B458C2328386340BCE5758D75DCE9EA5130F36AC219BF0F82BB51BA0DD7E94CF9211E85B078A22865D1569
5,501,117 UART: [art] SIG.R = 1C151B8A243B15C16FC184C2B96AE0CC01325622CC05DA5440D9FA60150F51B1A24AD0BB476E239DBFDB3F7314A452E1
5,507,888 UART: [art] SIG.S = EEA9B69BC3A495769638119D9DF09B3E903F0DC499DAE9D1ECFFAB97EB005D5A0987723C0CED12776A360933F003314C
5,531,900 UART: Caliptra RT
5,532,245 UART: [state] CFI Enabled
5,640,310 UART: [rt] RT listening for mailbox commands...
5,640,980 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,764,158 UART: [rt]cmd =0x41544d4e, len=14344
6,319,681 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,676 UART: [state] LifecycleState = Unprovisioned
85,331 UART: [state] DebugLocked = No
86,035 UART: [state] WD Timer not started. Device not locked for debugging
87,240 UART: [kat] SHA2-256
892,890 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,015 UART: [kat] ++
897,167 UART: [kat] sha1
901,337 UART: [kat] SHA2-256
903,277 UART: [kat] SHA2-384
905,966 UART: [kat] SHA2-512-ACC
907,867 UART: [kat] ECC-384
917,278 UART: [kat] HMAC-384Kdf
921,764 UART: [kat] LMS
1,170,092 UART: [kat] --
1,171,019 UART: [cold-reset] ++
1,171,545 UART: [fht] FHT @ 0x50003400
1,174,124 UART: [idev] ++
1,174,292 UART: [idev] CDI.KEYID = 6
1,174,652 UART: [idev] SUBJECT.KEYID = 7
1,175,076 UART: [idev] UDS.KEYID = 0
1,175,421 ready_for_fw is high
1,175,421 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,856 UART: [idev] Erasing UDS.KEYID = 0
1,199,327 UART: [idev] Sha1 KeyId Algorithm
1,207,731 UART: [idev] --
1,208,723 UART: [ldev] ++
1,208,891 UART: [ldev] CDI.KEYID = 6
1,209,254 UART: [ldev] SUBJECT.KEYID = 5
1,209,680 UART: [ldev] AUTHORITY.KEYID = 7
1,210,143 UART: [ldev] FE.KEYID = 1
1,215,363 UART: [ldev] Erasing FE.KEYID = 1
1,241,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,637 UART: [ldev] --
1,281,054 UART: [fwproc] Wait for Commands...
1,281,672 UART: [fwproc] Recv command 0x46574c44
1,282,400 UART: [fwproc] Recv'd Img size: 114332 bytes
3,129,705 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,286 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,590 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,322,411 >>> mbox cmd response: success
3,323,553 UART: [afmc] ++
3,323,721 UART: [afmc] CDI.KEYID = 6
3,324,083 UART: [afmc] SUBJECT.KEYID = 7
3,324,508 UART: [afmc] AUTHORITY.KEYID = 5
3,359,858 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,727 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,436 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,328 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,039 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,958 UART: [afmc] --
3,403,010 UART: [cold-reset] --
3,404,142 UART: [state] Locking Datavault
3,405,389 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,993 UART: [state] Locking ICCM
3,406,419 UART: [exit] Launching FMC @ 0x40000130
3,411,748 UART:
3,411,764 UART: Running Caliptra FMC ...
3,412,172 UART:
3,412,226 UART: [state] CFI Enabled
3,422,450 UART: [fht] FMC Alias Private Key: 7
3,530,296 UART: [art] Extend RT PCRs Done
3,530,724 UART: [art] Lock RT PCRs Done
3,532,546 UART: [art] Populate DV Done
3,540,774 UART: [fht] FMC Alias Private Key: 7
3,541,926 UART: [art] Derive CDI
3,542,206 UART: [art] Store in in slot 0x4
3,627,965 UART: [art] Derive Key Pair
3,628,325 UART: [art] Store priv key in slot 0x5
3,641,745 UART: [art] Derive Key Pair - Done
3,656,630 UART: [art] Signing Cert with AUTHO
3,657,110 UART: RITY.KEYID = 7
3,672,400 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,165 UART: [art] PUB.X = 549FB39F7B75F06391154CF3827464891C2866CA3B11AA9EC8909090C16E1A225F0ABF775B46F574E246A50EF0696228
3,679,923 UART: [art] PUB.Y = F96A3E7BCBDBBFBC755E3316F7D5F3D06465BA2799F2766E517C752425DE0B4946A8EA811BFC6F2FBB4333BE0166A2F0
3,686,883 UART: [art] SIG.R = 182ACE3EE5439826682584BF2993EF8E9FE6A2DACCA5ACEE8A33293A9339526E801F60BA9F80AF6A2D48384B3FEFBACA
3,693,673 UART: [art] SIG.S = A0A195C12267ED38CE660598F073C5FB41454DC73A33CCC93277634B79B748823A89CB1407FA7DF551EA16B05921F924
3,717,348 UART: Caliptra RT
3,717,601 UART: [state] CFI Enabled
3,825,895 UART: [rt] RT listening for mailbox commands...
3,826,565 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,933 UART: [rt]cmd =0x41544d4e, len=14344
4,505,662 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,489 ready_for_fw is high
1,060,489 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,176,374 >>> mbox cmd response: success
3,237,857 UART:
3,237,873 UART: Running Caliptra FMC ...
3,238,281 UART:
3,238,335 UART: [state] CFI Enabled
3,248,979 UART: [fht] FMC Alias Private Key: 7
3,356,731 UART: [art] Extend RT PCRs Done
3,357,159 UART: [art] Lock RT PCRs Done
3,358,463 UART: [art] Populate DV Done
3,366,571 UART: [fht] FMC Alias Private Key: 7
3,367,751 UART: [art] Derive CDI
3,368,031 UART: [art] Store in in slot 0x4
3,453,310 UART: [art] Derive Key Pair
3,453,670 UART: [art] Store priv key in slot 0x5
3,466,554 UART: [art] Derive Key Pair - Done
3,481,563 UART: [art] Signing Cert with AUTHO
3,482,043 UART: RITY.KEYID = 7
3,497,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,844 UART: [art] PUB.X = AF11A0BEF12B4C25A5614BDB03ADF5583DA6FC8483625B1D2EC6B598D14C667362958520D2C5497162D94A7FADD3D7EB
3,504,623 UART: [art] PUB.Y = 664EA5C8EBE5B183E12579509CC1E91BA4A35DBD06B2137C6A3861CB3300AF19CE3694BF730FF587385C5888EADE6F3F
3,511,557 UART: [art] SIG.R = 296C8900F1D771494D0E815001F3FBC5A91D76A76A01024A11D26A39C87331C46209BE7FC440571A70DC43503CBC7BFA
3,518,290 UART: [art] SIG.S = 0E719FF43B8FCC786D6419B2DBD418CD19845751BDA56711C5F4BB8043A9CA470BB73F5B8987FBC8F24BC27106686F21
3,542,176 UART: Caliptra RT
3,542,429 UART: [state] CFI Enabled
3,649,578 UART: [rt] RT listening for mailbox commands...
3,650,248 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,464 UART: [rt]cmd =0x41544d4e, len=14344
4,338,733 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,910 UART: [state] WD Timer not started. Device not locked for debugging
88,255 UART: [kat] SHA2-256
893,905 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,030 UART: [kat] ++
898,182 UART: [kat] sha1
902,368 UART: [kat] SHA2-256
904,308 UART: [kat] SHA2-384
907,107 UART: [kat] SHA2-512-ACC
909,008 UART: [kat] ECC-384
918,845 UART: [kat] HMAC-384Kdf
923,435 UART: [kat] LMS
1,171,763 UART: [kat] --
1,172,446 UART: [cold-reset] ++
1,172,806 UART: [fht] FHT @ 0x50003400
1,175,479 UART: [idev] ++
1,175,647 UART: [idev] CDI.KEYID = 6
1,176,007 UART: [idev] SUBJECT.KEYID = 7
1,176,431 UART: [idev] UDS.KEYID = 0
1,176,776 ready_for_fw is high
1,176,776 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,807 UART: [idev] Erasing UDS.KEYID = 0
1,201,980 UART: [idev] Sha1 KeyId Algorithm
1,210,556 UART: [idev] --
1,211,704 UART: [ldev] ++
1,211,872 UART: [ldev] CDI.KEYID = 6
1,212,235 UART: [ldev] SUBJECT.KEYID = 5
1,212,661 UART: [ldev] AUTHORITY.KEYID = 7
1,213,124 UART: [ldev] FE.KEYID = 1
1,218,258 UART: [ldev] Erasing FE.KEYID = 1
1,244,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,704 UART: [ldev] --
1,284,027 UART: [fwproc] Wait for Commands...
1,284,677 UART: [fwproc] Recv command 0x46574c44
1,285,405 UART: [fwproc] Recv'd Img size: 114332 bytes
3,121,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,813 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,117 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,314,844 >>> mbox cmd response: success
3,315,938 UART: [afmc] ++
3,316,106 UART: [afmc] CDI.KEYID = 6
3,316,468 UART: [afmc] SUBJECT.KEYID = 7
3,316,893 UART: [afmc] AUTHORITY.KEYID = 5
3,352,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,804 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,552 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,261 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,153 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,864 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,651 UART: [afmc] --
3,395,607 UART: [cold-reset] --
3,396,357 UART: [state] Locking Datavault
3,397,638 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,242 UART: [state] Locking ICCM
3,398,850 UART: [exit] Launching FMC @ 0x40000130
3,404,179 UART:
3,404,195 UART: Running Caliptra FMC ...
3,404,603 UART:
3,404,746 UART: [state] CFI Enabled
3,415,248 UART: [fht] FMC Alias Private Key: 7
3,522,684 UART: [art] Extend RT PCRs Done
3,523,112 UART: [art] Lock RT PCRs Done
3,524,542 UART: [art] Populate DV Done
3,532,898 UART: [fht] FMC Alias Private Key: 7
3,534,026 UART: [art] Derive CDI
3,534,306 UART: [art] Store in in slot 0x4
3,620,185 UART: [art] Derive Key Pair
3,620,545 UART: [art] Store priv key in slot 0x5
3,633,807 UART: [art] Derive Key Pair - Done
3,648,860 UART: [art] Signing Cert with AUTHO
3,649,340 UART: RITY.KEYID = 7
3,664,856 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,621 UART: [art] PUB.X = A180A6DF185084E761FCCA9762999767062255E17E41E530C27944EC71DCF76D7DB68B6B5C2A50FF0E37DA8570B58CEA
3,672,391 UART: [art] PUB.Y = D1C4D4E08A378A33446ECCAB8D7B1563EF1B60FB395E57FC8646101988AE246C7EA41D35C54B41FDA584CD32F395FA6A
3,679,355 UART: [art] SIG.R = 2D6557D08AFB9AC02BBE06158281B02761F7BE8F49F0974E0AC5DDF6B1799E855C0C57221213E12C626F3A11283C5447
3,686,116 UART: [art] SIG.S = 63494BCB668D034F100D22EAA59A78BBE4FB318A4E9C284F2EC69711D671ADCB5C941BD87F997D633AEDE270684F2ECC
3,709,971 UART: Caliptra RT
3,710,316 UART: [state] CFI Enabled
3,817,837 UART: [rt] RT listening for mailbox commands...
3,818,507 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,389 UART: [rt]cmd =0x41544d4e, len=14344
4,506,728 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,576 ready_for_fw is high
1,060,576 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,168,416 >>> mbox cmd response: success
3,230,053 UART:
3,230,069 UART: Running Caliptra FMC ...
3,230,477 UART:
3,230,620 UART: [state] CFI Enabled
3,241,158 UART: [fht] FMC Alias Private Key: 7
3,349,174 UART: [art] Extend RT PCRs Done
3,349,602 UART: [art] Lock RT PCRs Done
3,351,206 UART: [art] Populate DV Done
3,359,448 UART: [fht] FMC Alias Private Key: 7
3,360,432 UART: [art] Derive CDI
3,360,712 UART: [art] Store in in slot 0x4
3,446,003 UART: [art] Derive Key Pair
3,446,363 UART: [art] Store priv key in slot 0x5
3,459,813 UART: [art] Derive Key Pair - Done
3,474,694 UART: [art] Signing Cert with AUTHO
3,475,174 UART: RITY.KEYID = 7
3,490,796 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,561 UART: [art] PUB.X = 5CD08064C30B26665444B54FD1CC231D46C7C6DA63CAB22888590F652389320847A2DB2CFB347B76F961CC25251B7293
3,498,318 UART: [art] PUB.Y = EB782AC419C21E9F51577E0A7F6D11CC56F6BD1BBB4461D8ABF825BB0B342688D206AB51FEE27406341D6BDCFFF2E94E
3,505,276 UART: [art] SIG.R = 1D4BD8C80125A3EDD6D874536EED327B859DDE1F0E8EF92606CFAF554235D147A6AA6F592D5F3F439AB9F2DF9FAF2782
3,512,055 UART: [art] SIG.S = C3AA79DEF39B8BE6D778D8B9EED7FA63B6F61F2EDB66398E12859FCB4293CAD673C113AB4703000867F822A46A008531
3,536,838 UART: Caliptra RT
3,537,183 UART: [state] CFI Enabled
3,645,779 UART: [rt] RT listening for mailbox commands...
3,646,449 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,577 UART: [rt]cmd =0x41544d4e, len=14344
4,337,861 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,498 UART: [kat] SHA2-256
891,048 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,177 UART: [kat] ++
895,329 UART: [kat] sha1
899,475 UART: [kat] SHA2-256
901,415 UART: [kat] SHA2-384
904,072 UART: [kat] SHA2-512-ACC
905,973 UART: [kat] ECC-384
915,442 UART: [kat] HMAC-384Kdf
919,930 UART: [kat] LMS
1,168,242 UART: [kat] --
1,169,359 UART: [cold-reset] ++
1,169,797 UART: [fht] FHT @ 0x50003400
1,172,383 UART: [idev] ++
1,172,551 UART: [idev] CDI.KEYID = 6
1,172,912 UART: [idev] SUBJECT.KEYID = 7
1,173,337 UART: [idev] UDS.KEYID = 0
1,173,683 ready_for_fw is high
1,173,683 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,155 UART: [idev] Erasing UDS.KEYID = 0
1,198,165 UART: [idev] Sha1 KeyId Algorithm
1,207,021 UART: [idev] --
1,208,238 UART: [ldev] ++
1,208,406 UART: [ldev] CDI.KEYID = 6
1,208,770 UART: [ldev] SUBJECT.KEYID = 5
1,209,197 UART: [ldev] AUTHORITY.KEYID = 7
1,209,660 UART: [ldev] FE.KEYID = 1
1,214,476 UART: [ldev] Erasing FE.KEYID = 1
1,240,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,544 UART: [ldev] --
1,279,884 UART: [fwproc] Wait for Commands...
1,280,595 UART: [fwproc] Recv command 0x46574c44
1,281,328 UART: [fwproc] Recv'd Img size: 114332 bytes
3,131,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,442 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,751 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,324,547 >>> mbox cmd response: success
3,325,798 UART: [afmc] ++
3,325,966 UART: [afmc] CDI.KEYID = 6
3,326,329 UART: [afmc] SUBJECT.KEYID = 7
3,326,755 UART: [afmc] AUTHORITY.KEYID = 5
3,361,953 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,131 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,882 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,592 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,482 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,193 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,035 UART: [afmc] --
3,405,029 UART: [cold-reset] --
3,406,067 UART: [state] Locking Datavault
3,407,086 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,690 UART: [state] Locking ICCM
3,408,304 UART: [exit] Launching FMC @ 0x40000130
3,413,633 UART:
3,413,649 UART: Running Caliptra FMC ...
3,414,057 UART:
3,414,111 UART: [state] CFI Enabled
3,424,599 UART: [fht] FMC Alias Private Key: 7
3,532,641 UART: [art] Extend RT PCRs Done
3,533,069 UART: [art] Lock RT PCRs Done
3,534,791 UART: [art] Populate DV Done
3,543,163 UART: [fht] FMC Alias Private Key: 7
3,544,215 UART: [art] Derive CDI
3,544,495 UART: [art] Store in in slot 0x4
3,629,742 UART: [art] Derive Key Pair
3,630,102 UART: [art] Store priv key in slot 0x5
3,642,500 UART: [art] Derive Key Pair - Done
3,656,887 UART: [art] Signing Cert with AUTHO
3,657,367 UART: RITY.KEYID = 7
3,672,149 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,914 UART: [art] PUB.X = 7065F5B61EA91130D385D1748BF269C234ADFDDB6C6698562C88DF4DF8DE592F5B15436B85B329818A1FE0FC03445D5A
3,679,687 UART: [art] PUB.Y = 140890CAEC354416C531B349E1AE6CD9D446689DDB16353A1237C22503A2B70AB2FC49497D151944126DAC6E86CFA99B
3,686,630 UART: [art] SIG.R = C7E5441CB5427C4DE6636034A930B4B17DD5D3894786015148DF2776222EA232D629BB6B7E0C8EF2B7964D0B59BEF9BB
3,693,395 UART: [art] SIG.S = EE4D900DCA29A716B299941D8ABC0ACB2B7850ED8A0951B7178038580E09A3741F97A106220CE2482425B5296AD5AFA2
3,717,129 UART: Caliptra RT
3,717,382 UART: [state] CFI Enabled
3,825,533 UART: [rt] RT listening for mailbox commands...
3,826,203 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,485 UART: [rt]cmd =0x41544d4e, len=14344
4,510,034 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,236 ready_for_fw is high
1,055,236 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,150,616 >>> mbox cmd response: success
3,212,239 UART:
3,212,255 UART: Running Caliptra FMC ...
3,212,663 UART:
3,212,717 UART: [state] CFI Enabled
3,223,217 UART: [fht] FMC Alias Private Key: 7
3,330,115 UART: [art] Extend RT PCRs Done
3,330,543 UART: [art] Lock RT PCRs Done
3,331,889 UART: [art] Populate DV Done
3,340,083 UART: [fht] FMC Alias Private Key: 7
3,341,163 UART: [art] Derive CDI
3,341,443 UART: [art] Store in in slot 0x4
3,427,042 UART: [art] Derive Key Pair
3,427,402 UART: [art] Store priv key in slot 0x5
3,440,384 UART: [art] Derive Key Pair - Done
3,454,871 UART: [art] Signing Cert with AUTHO
3,455,351 UART: RITY.KEYID = 7
3,470,151 UART: [art] Erasing AUTHORITY.KEYID = 7
3,470,916 UART: [art] PUB.X = 4D2C9AB073AED55E93603277C9C44280AD6A63039B72184E364E248BD98B0973F6D02090887BE6CB55F1D0BEFE57BE0C
3,477,683 UART: [art] PUB.Y = 842591947B7CB0A9CF8C27D1DA5C1B33C776BF5109B0767043F8D589DFC94EF26F19E6F06AAB3E12FDCDAB79C21B1199
3,484,644 UART: [art] SIG.R = A722A300A2F91ADB9E4D049443CEEA98488AC50AC00B15747283378FDBD34089E7F7AA05F5BCA09922E682E07C384C5D
3,491,388 UART: [art] SIG.S = ADAEA7E1F450AC707D34AC726CF49B22136DA478A13958ACEFE93EF540F1E34CBFCC9AD8CA4A7586C7F41FEF7279E568
3,515,105 UART: Caliptra RT
3,515,358 UART: [state] CFI Enabled
3,622,767 UART: [rt] RT listening for mailbox commands...
3,623,437 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,746,761 UART: [rt]cmd =0x41544d4e, len=14344
4,312,594 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,758 UART: [kat] SHA2-256
901,698 UART: [kat] SHA2-384
904,449 UART: [kat] SHA2-512-ACC
906,350 UART: [kat] ECC-384
916,289 UART: [kat] HMAC-384Kdf
921,071 UART: [kat] LMS
1,169,383 UART: [kat] --
1,170,328 UART: [cold-reset] ++
1,170,686 UART: [fht] FHT @ 0x50003400
1,173,242 UART: [idev] ++
1,173,410 UART: [idev] CDI.KEYID = 6
1,173,771 UART: [idev] SUBJECT.KEYID = 7
1,174,196 UART: [idev] UDS.KEYID = 0
1,174,542 ready_for_fw is high
1,174,542 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,090 UART: [idev] Erasing UDS.KEYID = 0
1,199,022 UART: [idev] Sha1 KeyId Algorithm
1,207,834 UART: [idev] --
1,208,809 UART: [ldev] ++
1,208,977 UART: [ldev] CDI.KEYID = 6
1,209,341 UART: [ldev] SUBJECT.KEYID = 5
1,209,768 UART: [ldev] AUTHORITY.KEYID = 7
1,210,231 UART: [ldev] FE.KEYID = 1
1,215,463 UART: [ldev] Erasing FE.KEYID = 1
1,242,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,011 UART: [ldev] --
1,281,511 UART: [fwproc] Wait for Commands...
1,282,258 UART: [fwproc] Recv command 0x46574c44
1,282,991 UART: [fwproc] Recv'd Img size: 114332 bytes
3,129,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,420 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,729 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,322,625 >>> mbox cmd response: success
3,323,766 UART: [afmc] ++
3,323,934 UART: [afmc] CDI.KEYID = 6
3,324,297 UART: [afmc] SUBJECT.KEYID = 7
3,324,723 UART: [afmc] AUTHORITY.KEYID = 5
3,360,523 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,463 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,214 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,924 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,814 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,525 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,125 UART: [afmc] --
3,404,233 UART: [cold-reset] --
3,405,055 UART: [state] Locking Datavault
3,406,138 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,742 UART: [state] Locking ICCM
3,407,166 UART: [exit] Launching FMC @ 0x40000130
3,412,495 UART:
3,412,511 UART: Running Caliptra FMC ...
3,412,919 UART:
3,413,062 UART: [state] CFI Enabled
3,423,550 UART: [fht] FMC Alias Private Key: 7
3,531,424 UART: [art] Extend RT PCRs Done
3,531,852 UART: [art] Lock RT PCRs Done
3,533,406 UART: [art] Populate DV Done
3,541,458 UART: [fht] FMC Alias Private Key: 7
3,542,510 UART: [art] Derive CDI
3,542,790 UART: [art] Store in in slot 0x4
3,628,555 UART: [art] Derive Key Pair
3,628,915 UART: [art] Store priv key in slot 0x5
3,641,971 UART: [art] Derive Key Pair - Done
3,656,434 UART: [art] Signing Cert with AUTHO
3,656,914 UART: RITY.KEYID = 7
3,671,714 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,479 UART: [art] PUB.X = 656BCB8151952181758C2CDEDC23032CB518ED8451860B4C52F3F4C630DD1D3CC49752AF69F8C4EC79186E9D27904773
3,679,243 UART: [art] PUB.Y = 00A9800477F2458929509E6CC1D2DA6233AD9117BF9A69010A690704F1F8D9E4E0038599B71FC81009AEAD7C17ED6F08
3,686,145 UART: [art] SIG.R = 5DCF78E48A66C2353581D6A67C253118501186722C31086BD703803D28F54F54C4B3CB49B16959489D841B9C97C7AA87
3,692,899 UART: [art] SIG.S = 73980A5D085031C62FA1877886CD4945E7471D9D7F993DE55DCDC870A44386345E77E03793445D6468755C57493394D2
3,716,388 UART: Caliptra RT
3,716,733 UART: [state] CFI Enabled
3,825,352 UART: [rt] RT listening for mailbox commands...
3,826,022 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,320 UART: [rt]cmd =0x41544d4e, len=14344
4,509,823 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,947 ready_for_fw is high
1,055,947 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,164,260 >>> mbox cmd response: success
3,227,383 UART:
3,227,399 UART: Running Caliptra FMC ...
3,227,807 UART:
3,227,950 UART: [state] CFI Enabled
3,238,572 UART: [fht] FMC Alias Private Key: 7
3,346,114 UART: [art] Extend RT PCRs Done
3,346,542 UART: [art] Lock RT PCRs Done
3,348,420 UART: [art] Populate DV Done
3,356,736 UART: [fht] FMC Alias Private Key: 7
3,357,692 UART: [art] Derive CDI
3,357,972 UART: [art] Store in in slot 0x4
3,443,291 UART: [art] Derive Key Pair
3,443,651 UART: [art] Store priv key in slot 0x5
3,457,741 UART: [art] Derive Key Pair - Done
3,472,436 UART: [art] Signing Cert with AUTHO
3,472,916 UART: RITY.KEYID = 7
3,487,832 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,597 UART: [art] PUB.X = 41C33267E4504CE12C2E6FFA9D1BB7BCA6547334B58E08B563E109FB01EC672B69DCDA4562212A2C755B2D6A9CA32E5F
3,495,370 UART: [art] PUB.Y = 282E2C46B536C2D88903F980F767F001FC4E86B98E8455AF18A18873948AD5E9DF2339FF92F8E1EB7813A67B1610A62B
3,502,314 UART: [art] SIG.R = A599513C9120374F8822EE3F3B7CB5082A465B71D2C14C913739096D5DC2987346EEEA672BA45301AA97F68A544E6A69
3,509,071 UART: [art] SIG.S = B6A1AADDB2270912DD9ACDC4131967D253F353B1948C86D8962D1752E00A6E0310760FC9554C52624A312A39CF36B067
3,533,270 UART: Caliptra RT
3,533,615 UART: [state] CFI Enabled
3,641,588 UART: [rt] RT listening for mailbox commands...
3,642,258 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,058 UART: [rt]cmd =0x41544d4e, len=14344
4,316,047 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Unprovisioned
85,541 UART: [state] DebugLocked = No
86,039 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,695 UART: [kat] SHA2-256
881,626 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,741 UART: [kat] ++
885,893 UART: [kat] sha1
889,981 UART: [kat] SHA2-256
891,919 UART: [kat] SHA2-384
894,642 UART: [kat] SHA2-512-ACC
896,543 UART: [kat] ECC-384
902,118 UART: [kat] HMAC-384Kdf
906,766 UART: [kat] LMS
1,474,962 UART: [kat] --
1,476,137 UART: [cold-reset] ++
1,476,671 UART: [fht] Storing FHT @ 0x50003400
1,479,468 UART: [idev] ++
1,479,636 UART: [idev] CDI.KEYID = 6
1,479,996 UART: [idev] SUBJECT.KEYID = 7
1,480,420 UART: [idev] UDS.KEYID = 0
1,480,765 ready_for_fw is high
1,480,765 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,414 UART: [idev] Erasing UDS.KEYID = 0
1,504,458 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,054 UART: [idev] --
1,514,315 UART: [ldev] ++
1,514,483 UART: [ldev] CDI.KEYID = 6
1,514,846 UART: [ldev] SUBJECT.KEYID = 5
1,515,272 UART: [ldev] AUTHORITY.KEYID = 7
1,515,735 UART: [ldev] FE.KEYID = 1
1,521,035 UART: [ldev] Erasing FE.KEYID = 1
1,546,522 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,084 UART: [ldev] --
1,585,445 UART: [fwproc] Waiting for Commands...
1,586,256 UART: [fwproc] Received command 0x46574c44
1,587,047 UART: [fwproc] Received Image of size 114332 bytes
5,233,609 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,261,269 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,290,621 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,426,418 >>> mbox cmd response: success
5,427,666 UART: [afmc] ++
5,427,834 UART: [afmc] CDI.KEYID = 6
5,428,196 UART: [afmc] SUBJECT.KEYID = 7
5,428,621 UART: [afmc] AUTHORITY.KEYID = 5
5,463,541 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,480,201 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,480,981 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,486,690 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,492,582 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,498,283 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,506,231 UART: [afmc] --
5,507,321 UART: [cold-reset] --
5,508,201 UART: [state] Locking Datavault
5,509,224 UART: [state] Locking PCR0, PCR1 and PCR31
5,509,828 UART: [state] Locking ICCM
5,510,364 UART: [exit] Launching FMC @ 0x40000130
5,515,693 UART:
5,515,709 UART: Running Caliptra FMC ...
5,516,117 UART:
5,516,171 UART: [state] CFI Enabled
5,526,547 UART: [fht] FMC Alias Private Key: 7
5,634,719 UART: [art] Extend RT PCRs Done
5,635,147 UART: [art] Lock RT PCRs Done
5,636,847 UART: [art] Populate DV Done
5,644,905 UART: [fht] FMC Alias Private Key: 7
5,645,953 UART: [art] Derive CDI
5,646,233 UART: [art] Store in in slot 0x4
5,731,700 UART: [art] Derive Key Pair
5,732,060 UART: [art] Store priv key in slot 0x5
5,745,240 UART: [art] Derive Key Pair - Done
5,759,925 UART: [art] Signing Cert with AUTHO
5,760,405 UART: RITY.KEYID = 7
5,775,813 UART: [art] Erasing AUTHORITY.KEYID = 7
5,776,578 UART: [art] PUB.X = 8D5F664533E10BA6A37FE5545E0476955E25FDA187B92656D1C972B6276EE515AE99F0713CC029F69053461E4829A950
5,783,334 UART: [art] PUB.Y = 08FD7146E0728FFA1DE64E88B501E5D2814865C18AC1EF3CA878111DB66B7E463E943D29906FF831131A485C250FE81F
5,790,277 UART: [art] SIG.R = A226FBD39840446681CF49D81BC9BD7F3C54FC7AC136B1981C7A2FD69F096E23BF7E1779D0A01E4FECED535DD74B4C57
5,797,060 UART: [art] SIG.S = CBDD39BC2A77EDAE5E426741BA830E90F6EC3F19BFA84040A15CE8F4C233AE1C32027CBB22070F1F06E9987EF4A8B3AB
5,820,670 UART: Caliptra RT
5,820,923 UART: [state] CFI Enabled
5,928,311 UART: [rt] RT listening for mailbox commands...
5,928,981 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,051,713 UART: [rt]cmd =0x41544d4e, len=14344
6,332,397 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,289 ready_for_fw is high
1,362,289 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,011,841 >>> mbox cmd response: success
5,073,240 UART:
5,073,256 UART: Running Caliptra FMC ...
5,073,664 UART:
5,073,718 UART: [state] CFI Enabled
5,084,132 UART: [fht] FMC Alias Private Key: 7
5,192,334 UART: [art] Extend RT PCRs Done
5,192,762 UART: [art] Lock RT PCRs Done
5,194,468 UART: [art] Populate DV Done
5,202,744 UART: [fht] FMC Alias Private Key: 7
5,203,674 UART: [art] Derive CDI
5,203,954 UART: [art] Store in in slot 0x4
5,289,921 UART: [art] Derive Key Pair
5,290,281 UART: [art] Store priv key in slot 0x5
5,303,059 UART: [art] Derive Key Pair - Done
5,317,830 UART: [art] Signing Cert with AUTHO
5,318,310 UART: RITY.KEYID = 7
5,333,502 UART: [art] Erasing AUTHORITY.KEYID = 7
5,334,267 UART: [art] PUB.X = 5A41EEAF8663CE748B201282A2F81C56E95A35B1310A95B8087D9C6F7B7563509AACBB8F1AD7FC72D6105D8A04EADE01
5,341,037 UART: [art] PUB.Y = 6A2D78F13CF9E1F083B51853DAEEE5BD6F5B76C2F6F2003A9C642D7990AD7634277BB8D02BD3E10550506E82238F3564
5,347,966 UART: [art] SIG.R = F4571479FD17915D1C4A94ECEB1C36FA5B4EFD1A2255DDBA8E2F700EF52F21168B775E58E88820E488DAC12181B3153C
5,354,743 UART: [art] SIG.S = A6AC9373E3491F3813F0AB1A21FD929965B2DB4449AB6E54AC6EEED064D2EF6467BA0D0E8F7182B952343E0478CD5E93
5,378,615 UART: Caliptra RT
5,378,868 UART: [state] CFI Enabled
5,487,270 UART: [rt] RT listening for mailbox commands...
5,487,940 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,610,794 UART: [rt]cmd =0x41544d4e, len=14344
5,899,033 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
87,044 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,650 UART: [kat] SHA2-256
882,581 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,696 UART: [kat] ++
886,848 UART: [kat] sha1
890,978 UART: [kat] SHA2-256
892,916 UART: [kat] SHA2-384
895,703 UART: [kat] SHA2-512-ACC
897,604 UART: [kat] ECC-384
903,453 UART: [kat] HMAC-384Kdf
907,969 UART: [kat] LMS
1,476,165 UART: [kat] --
1,477,008 UART: [cold-reset] ++
1,477,506 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,481,704 ready_for_fw is high
1,481,704 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,587 UART: [idev] Erasing UDS.KEYID = 0
1,506,333 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,117 UART: [idev] --
1,516,204 UART: [ldev] ++
1,516,372 UART: [ldev] CDI.KEYID = 6
1,516,735 UART: [ldev] SUBJECT.KEYID = 5
1,517,161 UART: [ldev] AUTHORITY.KEYID = 7
1,517,624 UART: [ldev] FE.KEYID = 1
1,522,924 UART: [ldev] Erasing FE.KEYID = 1
1,548,905 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,621 UART: [ldev] --
1,588,046 UART: [fwproc] Waiting for Commands...
1,588,701 UART: [fwproc] Received command 0x46574c44
1,589,492 UART: [fwproc] Received Image of size 114332 bytes
5,085,628 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,113,900 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,143,252 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,279,055 >>> mbox cmd response: success
5,280,231 UART: [afmc] ++
5,280,399 UART: [afmc] CDI.KEYID = 6
5,280,761 UART: [afmc] SUBJECT.KEYID = 7
5,281,186 UART: [afmc] AUTHORITY.KEYID = 5
5,315,680 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,331,744 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,332,524 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,338,233 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,344,125 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,349,826 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,357,630 UART: [afmc] --
5,358,716 UART: [cold-reset] --
5,359,436 UART: [state] Locking Datavault
5,360,673 UART: [state] Locking PCR0, PCR1 and PCR31
5,361,277 UART: [state] Locking ICCM
5,361,915 UART: [exit] Launching FMC @ 0x40000130
5,367,244 UART:
5,367,260 UART: Running Caliptra FMC ...
5,367,668 UART:
5,367,811 UART: [state] CFI Enabled
5,378,363 UART: [fht] FMC Alias Private Key: 7
5,485,895 UART: [art] Extend RT PCRs Done
5,486,323 UART: [art] Lock RT PCRs Done
5,487,897 UART: [art] Populate DV Done
5,496,447 UART: [fht] FMC Alias Private Key: 7
5,497,539 UART: [art] Derive CDI
5,497,819 UART: [art] Store in in slot 0x4
5,583,778 UART: [art] Derive Key Pair
5,584,138 UART: [art] Store priv key in slot 0x5
5,597,532 UART: [art] Derive Key Pair - Done
5,612,318 UART: [art] Signing Cert with AUTHO
5,612,798 UART: RITY.KEYID = 7
5,628,010 UART: [art] Erasing AUTHORITY.KEYID = 7
5,628,775 UART: [art] PUB.X = 056D130AC4CCC7927E96666BD7AA22A749651ABD2C4A9D26398EDDE6739CBC36852C4206C4F3EDF9A0714A601990AD02
5,635,541 UART: [art] PUB.Y = F10DBADF2FEBA8D6D2792E4F72C05EC357ACEE79172E24616BF1945CCD76E15CC70FFD5AFFDB52AD6F2DC6520EFA761F
5,642,514 UART: [art] SIG.R = BF31B3EC56D7863122D3F1A593F29C059641C15039CFE9C03F48B32E8CA4FF9855CD1AA2F33B068237D73AC893EFE49C
5,649,288 UART: [art] SIG.S = 59230B37F88A7D30709308CEBBED8FFB1363A6BCA5499F8DB83246828177AD07A2FD6411A9832FA95FF90C3D4A49B691
5,672,985 UART: Caliptra RT
5,673,330 UART: [state] CFI Enabled
5,781,471 UART: [rt] RT listening for mailbox commands...
5,782,141 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,904,961 UART: [rt]cmd =0x41544d4e, len=14344
6,193,304 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,388 ready_for_fw is high
1,363,388 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,089,358 >>> mbox cmd response: success
5,150,481 UART:
5,150,497 UART: Running Caliptra FMC ...
5,150,905 UART:
5,151,048 UART: [state] CFI Enabled
5,161,646 UART: [fht] FMC Alias Private Key: 7
5,269,014 UART: [art] Extend RT PCRs Done
5,269,442 UART: [art] Lock RT PCRs Done
5,270,888 UART: [art] Populate DV Done
5,279,160 UART: [fht] FMC Alias Private Key: 7
5,280,146 UART: [art] Derive CDI
5,280,426 UART: [art] Store in in slot 0x4
5,366,037 UART: [art] Derive Key Pair
5,366,397 UART: [art] Store priv key in slot 0x5
5,379,789 UART: [art] Derive Key Pair - Done
5,394,787 UART: [art] Signing Cert with AUTHO
5,395,267 UART: RITY.KEYID = 7
5,410,607 UART: [art] Erasing AUTHORITY.KEYID = 7
5,411,372 UART: [art] PUB.X = 51393511FE4568068A3CCBAE6F9B99B251924EC6CAFA9C2C79D973C98D010F2A47B3DDFC1935797E983BCBE4051730BE
5,418,140 UART: [art] PUB.Y = 6E247C6CFD82B957E8BE75C81CB5E9BF4205450FCB4CAEFC7FF936F49E81226CD7DA08CFE94933AF509A357F0C4F46D7
5,425,098 UART: [art] SIG.R = 7A101EA09867C4ED7B4454A48C37A7867C08FE543651481B1C96D9BBE93F9E0DE5A8F66134ED4941C8878E555B5A9C92
5,431,864 UART: [art] SIG.S = 82AC6678870AA6E8945C204F5948F2B3B9C0494BD15F4B2EB844FB0AF5FAB624E80F8AFF946C78C1542C608A5464C77C
5,455,378 UART: Caliptra RT
5,455,723 UART: [state] CFI Enabled
5,563,596 UART: [rt] RT listening for mailbox commands...
5,564,266 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,686,930 UART: [rt]cmd =0x41544d4e, len=14344
5,967,860 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Unprovisioned
86,137 UART: [state] DebugLocked = No
86,849 UART: [state] WD Timer not started. Device not locked for debugging
88,094 UART: [kat] SHA2-256
893,744 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,869 UART: [kat] ++
898,021 UART: [kat] sha1
902,117 UART: [kat] SHA2-256
904,057 UART: [kat] SHA2-384
906,856 UART: [kat] SHA2-512-ACC
908,757 UART: [kat] ECC-384
918,576 UART: [kat] HMAC-384Kdf
922,984 UART: [kat] LMS
1,171,312 UART: [kat] --
1,172,129 UART: [cold-reset] ++
1,172,599 UART: [fht] FHT @ 0x50003400
1,175,240 UART: [idev] ++
1,175,408 UART: [idev] CDI.KEYID = 6
1,175,768 UART: [idev] SUBJECT.KEYID = 7
1,176,192 UART: [idev] UDS.KEYID = 0
1,176,537 ready_for_fw is high
1,176,537 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,148 UART: [idev] Erasing UDS.KEYID = 0
1,201,247 UART: [idev] Sha1 KeyId Algorithm
1,209,721 UART: [idev] --
1,210,895 UART: [ldev] ++
1,211,063 UART: [ldev] CDI.KEYID = 6
1,211,426 UART: [ldev] SUBJECT.KEYID = 5
1,211,852 UART: [ldev] AUTHORITY.KEYID = 7
1,212,315 UART: [ldev] FE.KEYID = 1
1,217,337 UART: [ldev] Erasing FE.KEYID = 1
1,243,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,995 UART: [ldev] --
1,282,360 UART: [fwproc] Wait for Commands...
1,282,940 UART: [fwproc] Recv command 0x46574c44
1,283,668 UART: [fwproc] Recv'd Img size: 114332 bytes
3,125,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,262 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,566 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,318,315 >>> mbox cmd response: success
3,319,557 UART: [afmc] ++
3,319,725 UART: [afmc] CDI.KEYID = 6
3,320,087 UART: [afmc] SUBJECT.KEYID = 7
3,320,512 UART: [afmc] AUTHORITY.KEYID = 5
3,355,810 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,071 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,780 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,672 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,383 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,122 UART: [afmc] --
3,399,038 UART: [cold-reset] --
3,399,830 UART: [state] Locking Datavault
3,401,013 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,617 UART: [state] Locking ICCM
3,402,101 UART: [exit] Launching FMC @ 0x40000130
3,407,430 UART:
3,407,446 UART: Running Caliptra FMC ...
3,407,854 UART:
3,407,908 UART: [state] CFI Enabled
3,418,802 UART: [fht] FMC Alias Private Key: 7
3,526,708 UART: [art] Extend RT PCRs Done
3,527,136 UART: [art] Lock RT PCRs Done
3,528,774 UART: [art] Populate DV Done
3,536,912 UART: [fht] FMC Alias Private Key: 7
3,537,864 UART: [art] Derive CDI
3,538,144 UART: [art] Store in in slot 0x4
3,623,051 UART: [art] Derive Key Pair
3,623,411 UART: [art] Store priv key in slot 0x5
3,636,197 UART: [art] Derive Key Pair - Done
3,651,210 UART: [art] Signing Cert with AUTHO
3,651,690 UART: RITY.KEYID = 7
3,666,612 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,377 UART: [art] PUB.X = F9D6650F2872A17BBAC09EEBEDAE60D224F8B985191AF88557E28FD07706EA95D48E9672AEB3A52037A1D21D0CDD4840
3,674,150 UART: [art] PUB.Y = B5222A3B1836B283EF3911E72D16A1B9971CE7A0C0F8459D794101DC3254890AC713E1B072BB0853E37F456F8D045A75
3,681,084 UART: [art] SIG.R = CEE8C399CFCC291B9B86AB1947ACEEDB794FB4DD5F716602E120022D98002EC657C2A49B96F4C0A4337FDFDB08E92FC3
3,687,843 UART: [art] SIG.S = 0C7FAEDAC817664C1567E981FB990BE22B89B5BDDCC9542005C082262EE87EFD265A216A652273DE6278E39978EDE551
3,712,337 UART: Caliptra RT
3,712,590 UART: [state] CFI Enabled
3,819,670 UART: [rt] RT listening for mailbox commands...
3,820,340 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,208 UART: [rt]cmd =0x41544d4e, len=14344
4,229,182 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,847 ready_for_fw is high
1,059,847 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,172,813 >>> mbox cmd response: success
3,234,114 UART:
3,234,130 UART: Running Caliptra FMC ...
3,234,538 UART:
3,234,592 UART: [state] CFI Enabled
3,245,088 UART: [fht] FMC Alias Private Key: 7
3,352,970 UART: [art] Extend RT PCRs Done
3,353,398 UART: [art] Lock RT PCRs Done
3,354,932 UART: [art] Populate DV Done
3,363,222 UART: [fht] FMC Alias Private Key: 7
3,364,286 UART: [art] Derive CDI
3,364,566 UART: [art] Store in in slot 0x4
3,450,279 UART: [art] Derive Key Pair
3,450,639 UART: [art] Store priv key in slot 0x5
3,463,655 UART: [art] Derive Key Pair - Done
3,478,392 UART: [art] Signing Cert with AUTHO
3,478,872 UART: RITY.KEYID = 7
3,494,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,137 UART: [art] PUB.X = 986E2C6AD0C55F9C48126AD3775B0131904E61796C24B8B3B6DB8F2D4C29635C424C7AC3C9E0F9D8621F18DE196FD1DA
3,501,912 UART: [art] PUB.Y = CEAC015CA9B2117D7FF6AFAF79096F7C06B02E17E09397916BB8050D25F23D5D52CF55BDC2B98DB279484689C8F27A5E
3,508,859 UART: [art] SIG.R = 3F4F00F13BEDE7EF3DAF295CDFA4C66AC6EF9F5D55829EAFBC4481B6FA0ACF1B114C125840FEBD680F3669032F19B1F9
3,515,624 UART: [art] SIG.S = 0F5AB64A1EF650B1BB63EA5A545326A597ECF148C3B07313852BAD1F6840C83E6D189F34E1FB6CAAE53B8FDD461B9DF2
3,539,314 UART: Caliptra RT
3,539,567 UART: [state] CFI Enabled
3,647,766 UART: [rt] RT listening for mailbox commands...
3,648,436 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,416 UART: [rt]cmd =0x41544d4e, len=14344
4,050,063 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,914 UART: [state] WD Timer not started. Device not locked for debugging
88,259 UART: [kat] SHA2-256
893,909 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,034 UART: [kat] ++
898,186 UART: [kat] sha1
902,478 UART: [kat] SHA2-256
904,418 UART: [kat] SHA2-384
907,121 UART: [kat] SHA2-512-ACC
909,022 UART: [kat] ECC-384
918,549 UART: [kat] HMAC-384Kdf
923,231 UART: [kat] LMS
1,171,559 UART: [kat] --
1,172,278 UART: [cold-reset] ++
1,172,800 UART: [fht] FHT @ 0x50003400
1,175,483 UART: [idev] ++
1,175,651 UART: [idev] CDI.KEYID = 6
1,176,011 UART: [idev] SUBJECT.KEYID = 7
1,176,435 UART: [idev] UDS.KEYID = 0
1,176,780 ready_for_fw is high
1,176,780 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,411 UART: [idev] Erasing UDS.KEYID = 0
1,201,724 UART: [idev] Sha1 KeyId Algorithm
1,210,060 UART: [idev] --
1,211,024 UART: [ldev] ++
1,211,192 UART: [ldev] CDI.KEYID = 6
1,211,555 UART: [ldev] SUBJECT.KEYID = 5
1,211,981 UART: [ldev] AUTHORITY.KEYID = 7
1,212,444 UART: [ldev] FE.KEYID = 1
1,217,676 UART: [ldev] Erasing FE.KEYID = 1
1,243,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,260 UART: [ldev] --
1,282,615 UART: [fwproc] Wait for Commands...
1,283,405 UART: [fwproc] Recv command 0x46574c44
1,284,133 UART: [fwproc] Recv'd Img size: 114332 bytes
3,118,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,147,070 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,374 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,312,147 >>> mbox cmd response: success
3,313,329 UART: [afmc] ++
3,313,497 UART: [afmc] CDI.KEYID = 6
3,313,859 UART: [afmc] SUBJECT.KEYID = 7
3,314,284 UART: [afmc] AUTHORITY.KEYID = 5
3,350,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,525 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,273 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,372,982 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,378,874 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,384,585 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,270 UART: [afmc] --
3,393,208 UART: [cold-reset] --
3,394,008 UART: [state] Locking Datavault
3,395,231 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,835 UART: [state] Locking ICCM
3,396,325 UART: [exit] Launching FMC @ 0x40000130
3,401,654 UART:
3,401,670 UART: Running Caliptra FMC ...
3,402,078 UART:
3,402,221 UART: [state] CFI Enabled
3,413,005 UART: [fht] FMC Alias Private Key: 7
3,521,287 UART: [art] Extend RT PCRs Done
3,521,715 UART: [art] Lock RT PCRs Done
3,523,227 UART: [art] Populate DV Done
3,531,357 UART: [fht] FMC Alias Private Key: 7
3,532,525 UART: [art] Derive CDI
3,532,805 UART: [art] Store in in slot 0x4
3,618,516 UART: [art] Derive Key Pair
3,618,876 UART: [art] Store priv key in slot 0x5
3,632,064 UART: [art] Derive Key Pair - Done
3,646,875 UART: [art] Signing Cert with AUTHO
3,647,355 UART: RITY.KEYID = 7
3,662,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,408 UART: [art] PUB.X = C757C90EE5315E4654ADD31DD87EAFDBD3C470087E8FAF887270F6CBA5CD1B7F2D67E20251CA3BC5E4117D8B4E4E6537
3,670,187 UART: [art] PUB.Y = F3E1F551217D751133CB37DA95538483A26F9EE8429982E1F0BBBCACFB3190E490A3DD75011B6FFAFD2F1EDC239CA2AB
3,677,152 UART: [art] SIG.R = 15F7D821E8B2F54862D6E0A9DE26CF68D95E788930F3A757474CA4C90B9F8E5F665EA7C22AC763D4405843BCAE1F065A
3,683,924 UART: [art] SIG.S = 9DE2B028A36668FC2388CB2C3BAA5BBB018A6A11E5DE0F250D3D69C851B87E71FC4EBAAF2F29CC0D4F80673524AA829C
3,707,491 UART: Caliptra RT
3,707,836 UART: [state] CFI Enabled
3,814,776 UART: [rt] RT listening for mailbox commands...
3,815,446 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,698 UART: [rt]cmd =0x41544d4e, len=14344
4,214,960 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,120 ready_for_fw is high
1,061,120 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,169,887 >>> mbox cmd response: success
3,232,426 UART:
3,232,442 UART: Running Caliptra FMC ...
3,232,850 UART:
3,232,993 UART: [state] CFI Enabled
3,243,891 UART: [fht] FMC Alias Private Key: 7
3,352,777 UART: [art] Extend RT PCRs Done
3,353,205 UART: [art] Lock RT PCRs Done
3,354,623 UART: [art] Populate DV Done
3,363,071 UART: [fht] FMC Alias Private Key: 7
3,364,171 UART: [art] Derive CDI
3,364,451 UART: [art] Store in in slot 0x4
3,449,944 UART: [art] Derive Key Pair
3,450,304 UART: [art] Store priv key in slot 0x5
3,464,124 UART: [art] Derive Key Pair - Done
3,478,776 UART: [art] Signing Cert with AUTHO
3,479,256 UART: RITY.KEYID = 7
3,494,516 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,281 UART: [art] PUB.X = 621048ABF51A5859E205AAE6E7DE4AD165A7709EE97532DF5AB33B1C770FF79CAA93CA8376565E6DB9674AF73E99A441
3,502,055 UART: [art] PUB.Y = A3F9EDA255DD0E28F9E7CF808CB4380A71101CD082F57D80933A495E259AA71561E57C5640355B24FB73A3248609C6E3
3,508,996 UART: [art] SIG.R = 7D68915CAEFEEA29FAF2212FA6A37D27F34AA2149F12335C8768CB43646D253536B02E95EAFA3E8C6E4978FFED9FD5EF
3,515,784 UART: [art] SIG.S = F21D0B22FFADD8EAA7BE465190C84C7AA6001ACF5CB335848DC742F6AF27BF55268590D478DDC5A6AE265BA7D683C04B
3,539,728 UART: Caliptra RT
3,540,073 UART: [state] CFI Enabled
3,647,269 UART: [rt] RT listening for mailbox commands...
3,647,939 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,931 UART: [rt]cmd =0x41544d4e, len=14344
4,054,186 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Unprovisioned
86,099 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
891,360 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,489 UART: [kat] ++
895,641 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,568 UART: [kat] SHA2-512-ACC
906,469 UART: [kat] ECC-384
916,540 UART: [kat] HMAC-384Kdf
921,074 UART: [kat] LMS
1,169,386 UART: [kat] --
1,170,221 UART: [cold-reset] ++
1,170,689 UART: [fht] FHT @ 0x50003400
1,173,145 UART: [idev] ++
1,173,313 UART: [idev] CDI.KEYID = 6
1,173,674 UART: [idev] SUBJECT.KEYID = 7
1,174,099 UART: [idev] UDS.KEYID = 0
1,174,445 ready_for_fw is high
1,174,445 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,467 UART: [idev] Erasing UDS.KEYID = 0
1,199,355 UART: [idev] Sha1 KeyId Algorithm
1,208,255 UART: [idev] --
1,209,236 UART: [ldev] ++
1,209,404 UART: [ldev] CDI.KEYID = 6
1,209,768 UART: [ldev] SUBJECT.KEYID = 5
1,210,195 UART: [ldev] AUTHORITY.KEYID = 7
1,210,658 UART: [ldev] FE.KEYID = 1
1,215,856 UART: [ldev] Erasing FE.KEYID = 1
1,241,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,880 UART: [ldev] --
1,281,162 UART: [fwproc] Wait for Commands...
1,281,955 UART: [fwproc] Recv command 0x46574c44
1,282,688 UART: [fwproc] Recv'd Img size: 114332 bytes
3,129,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,827 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,136 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,323,060 >>> mbox cmd response: success
3,324,153 UART: [afmc] ++
3,324,321 UART: [afmc] CDI.KEYID = 6
3,324,684 UART: [afmc] SUBJECT.KEYID = 7
3,325,110 UART: [afmc] AUTHORITY.KEYID = 5
3,360,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,287 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,997 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,887 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,598 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,610 UART: [afmc] --
3,403,660 UART: [cold-reset] --
3,404,584 UART: [state] Locking Datavault
3,405,657 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,261 UART: [state] Locking ICCM
3,406,931 UART: [exit] Launching FMC @ 0x40000130
3,412,260 UART:
3,412,276 UART: Running Caliptra FMC ...
3,412,684 UART:
3,412,738 UART: [state] CFI Enabled
3,422,886 UART: [fht] FMC Alias Private Key: 7
3,530,392 UART: [art] Extend RT PCRs Done
3,530,820 UART: [art] Lock RT PCRs Done
3,532,432 UART: [art] Populate DV Done
3,540,600 UART: [fht] FMC Alias Private Key: 7
3,541,538 UART: [art] Derive CDI
3,541,818 UART: [art] Store in in slot 0x4
3,627,619 UART: [art] Derive Key Pair
3,627,979 UART: [art] Store priv key in slot 0x5
3,641,353 UART: [art] Derive Key Pair - Done
3,656,371 UART: [art] Signing Cert with AUTHO
3,656,851 UART: RITY.KEYID = 7
3,671,963 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,728 UART: [art] PUB.X = 1C6E22F30C9005BEF0019D01292B08BC358F8C9195B0283A602877CCE87129D9E2857C75166C21D3BCA575DF4AE9EDE1
3,679,487 UART: [art] PUB.Y = 7CF8E07672AE7206D863ACBB0D09AAA29070FCC5D7ABE76FE4C221043020283711D65D456C1B53B31D276205EB746E98
3,686,426 UART: [art] SIG.R = 2949A5B3C553D0CBBA099291575FCA489968A73D97BA181E52F7867E1BFC381700A6DCCCCBB431C67DBAA9ABE23AA110
3,693,187 UART: [art] SIG.S = 420C41B7D047DC732CF64253F7BC3BFBE42B5260D9B05D514C1FCF09C87167E68134EFFBD790766C6A3BCF080AE7BE13
3,717,846 UART: Caliptra RT
3,718,099 UART: [state] CFI Enabled
3,825,762 UART: [rt] RT listening for mailbox commands...
3,826,432 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,522 UART: [rt]cmd =0x41544d4e, len=14344
4,240,446 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,648 ready_for_fw is high
1,056,648 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,168,024 >>> mbox cmd response: success
3,230,515 UART:
3,230,531 UART: Running Caliptra FMC ...
3,230,939 UART:
3,230,993 UART: [state] CFI Enabled
3,241,467 UART: [fht] FMC Alias Private Key: 7
3,348,983 UART: [art] Extend RT PCRs Done
3,349,411 UART: [art] Lock RT PCRs Done
3,350,887 UART: [art] Populate DV Done
3,359,051 UART: [fht] FMC Alias Private Key: 7
3,360,077 UART: [art] Derive CDI
3,360,357 UART: [art] Store in in slot 0x4
3,445,854 UART: [art] Derive Key Pair
3,446,214 UART: [art] Store priv key in slot 0x5
3,459,298 UART: [art] Derive Key Pair - Done
3,473,896 UART: [art] Signing Cert with AUTHO
3,474,376 UART: RITY.KEYID = 7
3,489,938 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,703 UART: [art] PUB.X = 09E5FB25822F18FC7924B11F0F408BD848D5F77B7D68FC08B1A3EB2C9236D33678EA56F01A7FFE2529DC90E60E45E2F2
3,497,471 UART: [art] PUB.Y = 5B266A619F0DBCCF9681433AA5930DB31CCFAFAE17337BA5DB8D5D5166CD1EEE77FFB5E25D0931D7B84BAF262B9155FD
3,504,436 UART: [art] SIG.R = AAE0929BE09E88C48E3E0FC778248C8F2F7DEA29FE89A25FDABCF49028BAB3125E3DA52AEFE842E4BA5CE776F5023707
3,511,219 UART: [art] SIG.S = DA7FDFEA5488E09E221909B21FA8CAAED57B2CFFCCF03DDF643F721EA4DEC46D9C64E200E993D1E6468D012CFF38FD05
3,535,301 UART: Caliptra RT
3,535,554 UART: [state] CFI Enabled
3,643,135 UART: [rt] RT listening for mailbox commands...
3,643,805 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,939 UART: [rt]cmd =0x41544d4e, len=14344
4,055,320 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,466 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
891,247 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,376 UART: [kat] ++
895,528 UART: [kat] sha1
899,792 UART: [kat] SHA2-256
901,732 UART: [kat] SHA2-384
904,279 UART: [kat] SHA2-512-ACC
906,180 UART: [kat] ECC-384
916,293 UART: [kat] HMAC-384Kdf
921,003 UART: [kat] LMS
1,169,315 UART: [kat] --
1,170,046 UART: [cold-reset] ++
1,170,514 UART: [fht] FHT @ 0x50003400
1,173,336 UART: [idev] ++
1,173,504 UART: [idev] CDI.KEYID = 6
1,173,865 UART: [idev] SUBJECT.KEYID = 7
1,174,290 UART: [idev] UDS.KEYID = 0
1,174,636 ready_for_fw is high
1,174,636 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,920 UART: [idev] Erasing UDS.KEYID = 0
1,199,020 UART: [idev] Sha1 KeyId Algorithm
1,207,936 UART: [idev] --
1,209,071 UART: [ldev] ++
1,209,239 UART: [ldev] CDI.KEYID = 6
1,209,603 UART: [ldev] SUBJECT.KEYID = 5
1,210,030 UART: [ldev] AUTHORITY.KEYID = 7
1,210,493 UART: [ldev] FE.KEYID = 1
1,215,925 UART: [ldev] Erasing FE.KEYID = 1
1,242,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,263 UART: [ldev] --
1,282,719 UART: [fwproc] Wait for Commands...
1,283,474 UART: [fwproc] Recv command 0x46574c44
1,284,207 UART: [fwproc] Recv'd Img size: 114332 bytes
3,133,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,161,363 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,672 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,326,608 >>> mbox cmd response: success
3,327,707 UART: [afmc] ++
3,327,875 UART: [afmc] CDI.KEYID = 6
3,328,238 UART: [afmc] SUBJECT.KEYID = 7
3,328,664 UART: [afmc] AUTHORITY.KEYID = 5
3,364,074 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,696 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,381,447 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,387,157 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,393,047 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,758 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,406,454 UART: [afmc] --
3,407,408 UART: [cold-reset] --
3,408,310 UART: [state] Locking Datavault
3,409,369 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,973 UART: [state] Locking ICCM
3,410,421 UART: [exit] Launching FMC @ 0x40000130
3,415,750 UART:
3,415,766 UART: Running Caliptra FMC ...
3,416,174 UART:
3,416,317 UART: [state] CFI Enabled
3,426,607 UART: [fht] FMC Alias Private Key: 7
3,534,821 UART: [art] Extend RT PCRs Done
3,535,249 UART: [art] Lock RT PCRs Done
3,536,805 UART: [art] Populate DV Done
3,544,957 UART: [fht] FMC Alias Private Key: 7
3,546,067 UART: [art] Derive CDI
3,546,347 UART: [art] Store in in slot 0x4
3,632,208 UART: [art] Derive Key Pair
3,632,568 UART: [art] Store priv key in slot 0x5
3,645,906 UART: [art] Derive Key Pair - Done
3,660,888 UART: [art] Signing Cert with AUTHO
3,661,368 UART: RITY.KEYID = 7
3,676,364 UART: [art] Erasing AUTHORITY.KEYID = 7
3,677,129 UART: [art] PUB.X = F05C33D84A524B78323C7845640EB9398A696541D619A516EDE198830B203D3F924D067ED52005AB61C42FA4CF299942
3,683,879 UART: [art] PUB.Y = 37FCA9AA1D7C4AF3179D9AA231FECFEC6E32BCEDC92E7B7E8F798A85E1D550DE8E62A91136C7E4EBFE7A0C32381B8206
3,690,849 UART: [art] SIG.R = 8249491E43A4BE4EE255F2F257C70A63305C5FBF7566EE7DC6401BB616D7965B7974256BED1E1C12C5D0C5D189703F6F
3,697,620 UART: [art] SIG.S = 9029E558AE63F36FD719AF47F4ECBD5157F4CEFFA6377F55469E3FA87EAFBE3E393B5997F24963C93E554DCE5C8C36A0
3,721,443 UART: Caliptra RT
3,721,788 UART: [state] CFI Enabled
3,830,261 UART: [rt] RT listening for mailbox commands...
3,830,931 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,954,167 UART: [rt]cmd =0x41544d4e, len=14344
4,244,979 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,121 ready_for_fw is high
1,056,121 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,172,709 >>> mbox cmd response: success
3,235,184 UART:
3,235,200 UART: Running Caliptra FMC ...
3,235,608 UART:
3,235,751 UART: [state] CFI Enabled
3,246,461 UART: [fht] FMC Alias Private Key: 7
3,353,951 UART: [art] Extend RT PCRs Done
3,354,379 UART: [art] Lock RT PCRs Done
3,356,077 UART: [art] Populate DV Done
3,364,349 UART: [fht] FMC Alias Private Key: 7
3,365,433 UART: [art] Derive CDI
3,365,713 UART: [art] Store in in slot 0x4
3,451,608 UART: [art] Derive Key Pair
3,451,968 UART: [art] Store priv key in slot 0x5
3,465,252 UART: [art] Derive Key Pair - Done
3,479,941 UART: [art] Signing Cert with AUTHO
3,480,421 UART: RITY.KEYID = 7
3,495,865 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,630 UART: [art] PUB.X = 2BF447C27BFCF9264DAAAE58C8725C083DD2922045891BD782C8BAFAF2D274511A9CCC07754740940FD3A885D2D32639
3,503,397 UART: [art] PUB.Y = 1E31622DB6B8C6E2C8B5AE97C47D2B4A7A9A4917D5CFBBDBF17E1F30624277D496E56147128019A1D88ECD867997D008
3,510,350 UART: [art] SIG.R = 2DEF57B756449C56BA9C68C5FECAC00FCDC94592210367CF2773299176413B16720EEB1C3BB08DE1D95BC590EFB72E62
3,517,121 UART: [art] SIG.S = 1CFA7E4C92D0F2736016D2C8897405F073C8E87F4256E2A687C85D42CCA7A2C2FF5C253D06B848A502F8CF32D97FDFC2
3,541,165 UART: Caliptra RT
3,541,510 UART: [state] CFI Enabled
3,648,933 UART: [rt] RT listening for mailbox commands...
3,649,603 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,497 UART: [rt]cmd =0x41544d4e, len=14344
4,065,554 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,497 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,185 UART: [kat] SHA2-256
882,116 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,231 UART: [kat] ++
886,383 UART: [kat] sha1
890,595 UART: [kat] SHA2-256
892,533 UART: [kat] SHA2-384
895,190 UART: [kat] SHA2-512-ACC
897,091 UART: [kat] ECC-384
902,836 UART: [kat] HMAC-384Kdf
907,408 UART: [kat] LMS
1,475,604 UART: [kat] --
1,476,557 UART: [cold-reset] ++
1,476,985 UART: [fht] Storing FHT @ 0x50003400
1,479,822 UART: [idev] ++
1,479,990 UART: [idev] CDI.KEYID = 6
1,480,350 UART: [idev] SUBJECT.KEYID = 7
1,480,774 UART: [idev] UDS.KEYID = 0
1,481,119 ready_for_fw is high
1,481,119 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,452 UART: [idev] Erasing UDS.KEYID = 0
1,504,386 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,816 UART: [idev] --
1,513,901 UART: [ldev] ++
1,514,069 UART: [ldev] CDI.KEYID = 6
1,514,432 UART: [ldev] SUBJECT.KEYID = 5
1,514,858 UART: [ldev] AUTHORITY.KEYID = 7
1,515,321 UART: [ldev] FE.KEYID = 1
1,520,451 UART: [ldev] Erasing FE.KEYID = 1
1,545,864 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,868 UART: [ldev] --
1,585,315 UART: [fwproc] Waiting for Commands...
1,585,968 UART: [fwproc] Received command 0x46574c44
1,586,759 UART: [fwproc] Received Image of size 114332 bytes
5,308,163 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,335,847 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,365,199 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,501,066 >>> mbox cmd response: success
5,502,306 UART: [afmc] ++
5,502,474 UART: [afmc] CDI.KEYID = 6
5,502,836 UART: [afmc] SUBJECT.KEYID = 7
5,503,261 UART: [afmc] AUTHORITY.KEYID = 5
5,538,485 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,554,817 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,555,597 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,561,306 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,567,198 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,572,899 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,580,725 UART: [afmc] --
5,581,853 UART: [cold-reset] --
5,582,547 UART: [state] Locking Datavault
5,583,610 UART: [state] Locking PCR0, PCR1 and PCR31
5,584,214 UART: [state] Locking ICCM
5,584,888 UART: [exit] Launching FMC @ 0x40000130
5,590,217 UART:
5,590,233 UART: Running Caliptra FMC ...
5,590,641 UART:
5,590,695 UART: [state] CFI Enabled
5,601,441 UART: [fht] FMC Alias Private Key: 7
5,709,433 UART: [art] Extend RT PCRs Done
5,709,861 UART: [art] Lock RT PCRs Done
5,711,309 UART: [art] Populate DV Done
5,719,475 UART: [fht] FMC Alias Private Key: 7
5,720,573 UART: [art] Derive CDI
5,720,853 UART: [art] Store in in slot 0x4
5,806,642 UART: [art] Derive Key Pair
5,807,002 UART: [art] Store priv key in slot 0x5
5,819,498 UART: [art] Derive Key Pair - Done
5,834,140 UART: [art] Signing Cert with AUTHO
5,834,620 UART: RITY.KEYID = 7
5,849,600 UART: [art] Erasing AUTHORITY.KEYID = 7
5,850,365 UART: [art] PUB.X = 8E59A1E89799813A9440C8B5175692C1F9148D3F1AC21F083760EC3B92C1F09D0CE6BABC4E50465B55ED8653931F0E72
5,857,126 UART: [art] PUB.Y = EFB334F47D8A186A74E7FBA54318BA7EC5B896DA73A8C6C4005B739EF8D0CF17A381C6436DD7D5E3119EDE668C8FF3F2
5,864,072 UART: [art] SIG.R = AA84284DDC74543BC10384E8C89F523AFFF54D02815DDE0C983B0335F45C01482EF9D95C55B70B98CDCDE7DBFFBF28FD
5,870,844 UART: [art] SIG.S = 762C860ECE9B969873DA2CAAF34E2F1E8F03F4F5165A03FAEE229A76423D7F2C5F87E938254999E846483510DD2E0095
5,894,270 UART: Caliptra RT
5,894,523 UART: [state] CFI Enabled
6,002,908 UART: [rt] RT listening for mailbox commands...
6,003,578 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,126,604 UART: [rt]cmd =0x41544d4e, len=14344
6,412,574 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,969 ready_for_fw is high
1,361,969 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,086,025 >>> mbox cmd response: success
5,147,796 UART:
5,147,812 UART: Running Caliptra FMC ...
5,148,220 UART:
5,148,274 UART: [state] CFI Enabled
5,158,620 UART: [fht] FMC Alias Private Key: 7
5,265,920 UART: [art] Extend RT PCRs Done
5,266,348 UART: [art] Lock RT PCRs Done
5,267,908 UART: [art] Populate DV Done
5,276,260 UART: [fht] FMC Alias Private Key: 7
5,277,320 UART: [art] Derive CDI
5,277,600 UART: [art] Store in in slot 0x4
5,363,487 UART: [art] Derive Key Pair
5,363,847 UART: [art] Store priv key in slot 0x5
5,377,309 UART: [art] Derive Key Pair - Done
5,392,161 UART: [art] Signing Cert with AUTHO
5,392,641 UART: RITY.KEYID = 7
5,408,367 UART: [art] Erasing AUTHORITY.KEYID = 7
5,409,132 UART: [art] PUB.X = 04B472E8FB64EB619958F89B25FF1D66DCB6185026B8FE9737E1BD629226340BD6C96024E2894274D9FF87706285096C
5,415,887 UART: [art] PUB.Y = AB668340B28E09BAB698C7589A351DCF89EAD6755E2DCFC2D7A7DFAD531BBD27BBAC1B6A60AD01E4757C5F98BB1A48EE
5,422,859 UART: [art] SIG.R = D36574A5B34CC6372C95F9907FEA727B3188D4AD4DB7BE504FE87F71067576267250BC5E1F8B460C8AE7B81ACC574155
5,429,627 UART: [art] SIG.S = DD7E1D124064033C306B0FDACD0F601689741FCA4B2A4F869427071DB2942681C9EED15218310244C5873B84D395B056
5,453,679 UART: Caliptra RT
5,453,932 UART: [state] CFI Enabled
5,561,664 UART: [rt] RT listening for mailbox commands...
5,562,334 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,685,582 UART: [rt]cmd =0x41544d4e, len=14344
5,976,284 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,904 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,420 UART: [kat] SHA2-256
882,351 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,466 UART: [kat] ++
886,618 UART: [kat] sha1
890,842 UART: [kat] SHA2-256
892,780 UART: [kat] SHA2-384
895,473 UART: [kat] SHA2-512-ACC
897,374 UART: [kat] ECC-384
903,127 UART: [kat] HMAC-384Kdf
907,661 UART: [kat] LMS
1,475,857 UART: [kat] --
1,476,600 UART: [cold-reset] ++
1,477,108 UART: [fht] Storing FHT @ 0x50003400
1,479,927 UART: [idev] ++
1,480,095 UART: [idev] CDI.KEYID = 6
1,480,455 UART: [idev] SUBJECT.KEYID = 7
1,480,879 UART: [idev] UDS.KEYID = 0
1,481,224 ready_for_fw is high
1,481,224 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,759 UART: [idev] Erasing UDS.KEYID = 0
1,505,531 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,369 UART: [idev] --
1,515,412 UART: [ldev] ++
1,515,580 UART: [ldev] CDI.KEYID = 6
1,515,943 UART: [ldev] SUBJECT.KEYID = 5
1,516,369 UART: [ldev] AUTHORITY.KEYID = 7
1,516,832 UART: [ldev] FE.KEYID = 1
1,522,060 UART: [ldev] Erasing FE.KEYID = 1
1,547,595 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,705 UART: [ldev] --
1,587,014 UART: [fwproc] Waiting for Commands...
1,587,709 UART: [fwproc] Received command 0x46574c44
1,588,500 UART: [fwproc] Received Image of size 114332 bytes
5,084,384 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,113,242 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,142,594 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,278,349 >>> mbox cmd response: success
5,279,519 UART: [afmc] ++
5,279,687 UART: [afmc] CDI.KEYID = 6
5,280,049 UART: [afmc] SUBJECT.KEYID = 7
5,280,474 UART: [afmc] AUTHORITY.KEYID = 5
5,315,416 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,331,588 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,332,368 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,338,077 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,343,969 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,349,670 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,357,652 UART: [afmc] --
5,358,682 UART: [cold-reset] --
5,359,244 UART: [state] Locking Datavault
5,360,625 UART: [state] Locking PCR0, PCR1 and PCR31
5,361,229 UART: [state] Locking ICCM
5,361,725 UART: [exit] Launching FMC @ 0x40000130
5,367,054 UART:
5,367,070 UART: Running Caliptra FMC ...
5,367,478 UART:
5,367,621 UART: [state] CFI Enabled
5,378,281 UART: [fht] FMC Alias Private Key: 7
5,485,867 UART: [art] Extend RT PCRs Done
5,486,295 UART: [art] Lock RT PCRs Done
5,487,533 UART: [art] Populate DV Done
5,495,571 UART: [fht] FMC Alias Private Key: 7
5,496,681 UART: [art] Derive CDI
5,496,961 UART: [art] Store in in slot 0x4
5,582,680 UART: [art] Derive Key Pair
5,583,040 UART: [art] Store priv key in slot 0x5
5,596,388 UART: [art] Derive Key Pair - Done
5,611,430 UART: [art] Signing Cert with AUTHO
5,611,910 UART: RITY.KEYID = 7
5,626,758 UART: [art] Erasing AUTHORITY.KEYID = 7
5,627,523 UART: [art] PUB.X = B6D8CEEB5E7E477EDB79734083F2712E4DBCAF7F00156459BA5ABDD395CDC01784F401D386CE79DD93763DCE7778AF85
5,634,284 UART: [art] PUB.Y = 991146C814FFC6A7C6CC4FE6B9FD3B4D6307F9E9EEF64982A64525B073933BAB854A85C210748BF58C72EE729800BD3F
5,641,217 UART: [art] SIG.R = 8E3034BE348483DAFC2A44E14767EE5701D26C3E8BDB7CFA5976BCE572426E7B297F9597CEB25F791A527916DEE0BDB1
5,647,996 UART: [art] SIG.S = 1064AF0A3A24D395C4B024672D62AD6235FA70EA91C8ED75B3CDE3210CB6CAE230CCA4ABFDE8B2E5C7AC54C69EA3A364
5,671,747 UART: Caliptra RT
5,672,092 UART: [state] CFI Enabled
5,780,079 UART: [rt] RT listening for mailbox commands...
5,780,749 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,903,777 UART: [rt]cmd =0x41544d4e, len=14344
6,192,308 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,580 ready_for_fw is high
1,362,580 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,241,056 >>> mbox cmd response: success
5,302,341 UART:
5,302,357 UART: Running Caliptra FMC ...
5,302,765 UART:
5,302,908 UART: [state] CFI Enabled
5,313,630 UART: [fht] FMC Alias Private Key: 7
5,421,788 UART: [art] Extend RT PCRs Done
5,422,216 UART: [art] Lock RT PCRs Done
5,423,464 UART: [art] Populate DV Done
5,431,588 UART: [fht] FMC Alias Private Key: 7
5,432,656 UART: [art] Derive CDI
5,432,936 UART: [art] Store in in slot 0x4
5,518,563 UART: [art] Derive Key Pair
5,518,923 UART: [art] Store priv key in slot 0x5
5,532,573 UART: [art] Derive Key Pair - Done
5,546,922 UART: [art] Signing Cert with AUTHO
5,547,402 UART: RITY.KEYID = 7
5,562,610 UART: [art] Erasing AUTHORITY.KEYID = 7
5,563,375 UART: [art] PUB.X = 2FA4CB2161139AC585F9ECC6D6EAE79BD7DC2CAFE47AB43C0E917FA537422E75A4A647D6BA12BFF12AEA099139558A26
5,570,159 UART: [art] PUB.Y = 2950593BB1C6819AB15B7FE42B6F45F845E9E44397354F037C6BB1BBC456643E863827C43AFD039D6E2791684CBFDF27
5,577,105 UART: [art] SIG.R = 74E4DCDE5F2D382F68DE1D87CE216607E5A51CD1842CDE6A11F5EC5020DF24978840EC0ED3C9E4ED8791834937BEF6C9
5,583,883 UART: [art] SIG.S = 600766257F985F451D0BB10ED7CED1650F4322C5AFDEEF4C376F468DF53E875C1175A9BC36441CAC9E8FAF9CA0B71C2F
5,607,830 UART: Caliptra RT
5,608,175 UART: [state] CFI Enabled
5,716,861 UART: [rt] RT listening for mailbox commands...
5,717,531 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,840,519 UART: [rt]cmd =0x41544d4e, len=14344
6,133,564 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,668 UART: [state] LifecycleState = Unprovisioned
86,323 UART: [state] DebugLocked = No
86,969 UART: [state] WD Timer not started. Device not locked for debugging
88,276 UART: [kat] SHA2-256
893,926 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,051 UART: [kat] ++
898,203 UART: [kat] sha1
902,241 UART: [kat] SHA2-256
904,181 UART: [kat] SHA2-384
906,786 UART: [kat] SHA2-512-ACC
908,687 UART: [kat] ECC-384
918,118 UART: [kat] HMAC-384Kdf
922,772 UART: [kat] LMS
1,171,100 UART: [kat] --
1,171,935 UART: [cold-reset] ++
1,172,383 UART: [fht] FHT @ 0x50003400
1,175,110 UART: [idev] ++
1,175,278 UART: [idev] CDI.KEYID = 6
1,175,638 UART: [idev] SUBJECT.KEYID = 7
1,176,062 UART: [idev] UDS.KEYID = 0
1,176,407 ready_for_fw is high
1,176,407 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,208 UART: [idev] Erasing UDS.KEYID = 0
1,200,981 UART: [idev] Sha1 KeyId Algorithm
1,209,375 UART: [idev] --
1,210,553 UART: [ldev] ++
1,210,721 UART: [ldev] CDI.KEYID = 6
1,211,084 UART: [ldev] SUBJECT.KEYID = 5
1,211,510 UART: [ldev] AUTHORITY.KEYID = 7
1,211,973 UART: [ldev] FE.KEYID = 1
1,216,913 UART: [ldev] Erasing FE.KEYID = 1
1,243,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,471 UART: [ldev] --
1,282,958 UART: [fwproc] Wait for Commands...
1,283,632 UART: [fwproc] Recv command 0x46574c44
1,284,360 UART: [fwproc] Recv'd Img size: 114332 bytes
3,117,918 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,311,330 >>> mbox cmd response: success
3,312,552 UART: [afmc] ++
3,312,720 UART: [afmc] CDI.KEYID = 6
3,313,082 UART: [afmc] SUBJECT.KEYID = 7
3,313,507 UART: [afmc] AUTHORITY.KEYID = 5
3,349,005 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,782 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,530 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,372,239 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,378,131 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,842 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,669 UART: [afmc] --
3,392,605 UART: [cold-reset] --
3,393,763 UART: [state] Locking Datavault
3,394,678 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,282 UART: [state] Locking ICCM
3,395,836 UART: [exit] Launching FMC @ 0x40000130
3,401,165 UART:
3,401,181 UART: Running Caliptra FMC ...
3,401,589 UART:
3,401,643 UART: [state] CFI Enabled
3,412,047 UART: [fht] FMC Alias Private Key: 7
3,519,191 UART: [art] Extend RT PCRs Done
3,519,619 UART: [art] Lock RT PCRs Done
3,521,215 UART: [art] Populate DV Done
3,529,393 UART: [fht] FMC Alias Private Key: 7
3,530,331 UART: [art] Derive CDI
3,530,611 UART: [art] Store in in slot 0x4
3,616,294 UART: [art] Derive Key Pair
3,616,654 UART: [art] Store priv key in slot 0x5
3,629,476 UART: [art] Derive Key Pair - Done
3,643,845 UART: [art] Signing Cert with AUTHO
3,644,325 UART: RITY.KEYID = 7
3,659,433 UART: [art] Erasing AUTHORITY.KEYID = 7
3,660,198 UART: [art] PUB.X = 1A2D48901595481EC656788E12B45ACE717503F5A1C1677A309776A69128FC9D1B164943E2111C6B81D77B864BFD9F7E
3,666,959 UART: [art] PUB.Y = 9AAAA9F368881C76AA7241DA11F4B92DEC47CA8341E28E8808E1A318AD1093F4B200784890ACDD6147887EB5AD0B8BD3
3,673,891 UART: [art] SIG.R = 5C1C6732F9A66AA48F67ADCF06BB5AF7EB18147704161B82A965194B70EF4331BBC17EAD30538E6A55F5B58FEF256043
3,680,663 UART: [art] SIG.S = 74A65CC5CCFE4D4FC3F93A85459D37D1463F305C837359B4875B2C799F6BE29AA77B0EEDF7E42897E8ADCBBEB3356490
3,704,713 UART: Caliptra RT
3,704,966 UART: [state] CFI Enabled
3,812,019 UART: [rt] RT listening for mailbox commands...
3,812,689 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,885 UART: [rt]cmd =0x41544d4e, len=14344
4,216,225 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,185 ready_for_fw is high
1,061,185 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,172,284 >>> mbox cmd response: success
3,234,039 UART:
3,234,055 UART: Running Caliptra FMC ...
3,234,463 UART:
3,234,517 UART: [state] CFI Enabled
3,245,187 UART: [fht] FMC Alias Private Key: 7
3,352,689 UART: [art] Extend RT PCRs Done
3,353,117 UART: [art] Lock RT PCRs Done
3,354,689 UART: [art] Populate DV Done
3,363,009 UART: [fht] FMC Alias Private Key: 7
3,364,159 UART: [art] Derive CDI
3,364,439 UART: [art] Store in in slot 0x4
3,449,952 UART: [art] Derive Key Pair
3,450,312 UART: [art] Store priv key in slot 0x5
3,462,992 UART: [art] Derive Key Pair - Done
3,477,951 UART: [art] Signing Cert with AUTHO
3,478,431 UART: RITY.KEYID = 7
3,493,203 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,968 UART: [art] PUB.X = 640CDF113387A36A593C89AD6B456BED6B49FA807A569BE9CD9C55D5B6E5154D452CB31A2A02ABC68CFCBCE479A5EC1C
3,500,754 UART: [art] PUB.Y = 644784D74D4B60C8067C74462FB4347D496C507C8DFEC75EACA0C24B4205F8C0517D4696D7B3E0B2316D80B5CE1B7397
3,507,700 UART: [art] SIG.R = FAEDC9FEE964C2A466386DBC811E3234C0E420684F42084F97983B68B28D9A3E821FDA9DB78EFDEE3D06C8E1DE4BC27C
3,514,484 UART: [art] SIG.S = C5312C94F1B1FC9D8F53C12BB67AB5820F222252FB82B4BEC858D9131A68D77859F74B22835971638AE2903BA3258864
3,538,164 UART: Caliptra RT
3,538,417 UART: [state] CFI Enabled
3,645,824 UART: [rt] RT listening for mailbox commands...
3,646,494 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,806 UART: [rt]cmd =0x41544d4e, len=14344
4,065,260 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
893,725 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,850 UART: [kat] ++
898,002 UART: [kat] sha1
902,388 UART: [kat] SHA2-256
904,328 UART: [kat] SHA2-384
907,139 UART: [kat] SHA2-512-ACC
909,040 UART: [kat] ECC-384
918,935 UART: [kat] HMAC-384Kdf
923,583 UART: [kat] LMS
1,171,911 UART: [kat] --
1,172,796 UART: [cold-reset] ++
1,173,140 UART: [fht] FHT @ 0x50003400
1,175,769 UART: [idev] ++
1,175,937 UART: [idev] CDI.KEYID = 6
1,176,297 UART: [idev] SUBJECT.KEYID = 7
1,176,721 UART: [idev] UDS.KEYID = 0
1,177,066 ready_for_fw is high
1,177,066 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,799 UART: [idev] Erasing UDS.KEYID = 0
1,201,946 UART: [idev] Sha1 KeyId Algorithm
1,210,544 UART: [idev] --
1,211,770 UART: [ldev] ++
1,211,938 UART: [ldev] CDI.KEYID = 6
1,212,301 UART: [ldev] SUBJECT.KEYID = 5
1,212,727 UART: [ldev] AUTHORITY.KEYID = 7
1,213,190 UART: [ldev] FE.KEYID = 1
1,218,294 UART: [ldev] Erasing FE.KEYID = 1
1,244,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,950 UART: [ldev] --
1,284,421 UART: [fwproc] Wait for Commands...
1,285,029 UART: [fwproc] Recv command 0x46574c44
1,285,757 UART: [fwproc] Recv'd Img size: 114332 bytes
3,119,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,147,924 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,228 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,313,033 >>> mbox cmd response: success
3,314,175 UART: [afmc] ++
3,314,343 UART: [afmc] CDI.KEYID = 6
3,314,705 UART: [afmc] SUBJECT.KEYID = 7
3,315,130 UART: [afmc] AUTHORITY.KEYID = 5
3,350,132 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,189 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,372,898 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,378,790 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,384,501 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,378 UART: [afmc] --
3,393,394 UART: [cold-reset] --
3,394,092 UART: [state] Locking Datavault
3,395,313 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,917 UART: [state] Locking ICCM
3,396,467 UART: [exit] Launching FMC @ 0x40000130
3,401,796 UART:
3,401,812 UART: Running Caliptra FMC ...
3,402,220 UART:
3,402,363 UART: [state] CFI Enabled
3,413,131 UART: [fht] FMC Alias Private Key: 7
3,520,917 UART: [art] Extend RT PCRs Done
3,521,345 UART: [art] Lock RT PCRs Done
3,522,789 UART: [art] Populate DV Done
3,530,881 UART: [fht] FMC Alias Private Key: 7
3,532,027 UART: [art] Derive CDI
3,532,307 UART: [art] Store in in slot 0x4
3,617,926 UART: [art] Derive Key Pair
3,618,286 UART: [art] Store priv key in slot 0x5
3,631,686 UART: [art] Derive Key Pair - Done
3,646,395 UART: [art] Signing Cert with AUTHO
3,646,875 UART: RITY.KEYID = 7
3,662,043 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,808 UART: [art] PUB.X = 5F50124957BC8C28E25524BB6FD97E5734F2113A294CF22935B89EFE61DC26578E38B5CE8202C27791808B349381C13C
3,669,569 UART: [art] PUB.Y = 4B01C676FEF357743E9BCA7A415B73B724207E826A88E8E0439C72C6987EED60979B472D292C31905B9680C64D114909
3,676,505 UART: [art] SIG.R = 77D25E3A27C7096CF17AF1C3E356F15C1B00AF7BAD059CD4398F6FF778E84A54AAE1C304F8301806210ECA426D9105CE
3,683,245 UART: [art] SIG.S = 45894173253E714DBA2028DBF23D953800CBCEDA02049091B91B3346C65F39DC1A4CC62428F8B8328F3EFAEB2559A004
3,707,099 UART: Caliptra RT
3,707,444 UART: [state] CFI Enabled
3,814,853 UART: [rt] RT listening for mailbox commands...
3,815,523 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,423 UART: [rt]cmd =0x41544d4e, len=14344
4,229,059 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,830 ready_for_fw is high
1,059,830 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,176,437 >>> mbox cmd response: success
3,237,956 UART:
3,237,972 UART: Running Caliptra FMC ...
3,238,380 UART:
3,238,523 UART: [state] CFI Enabled
3,248,869 UART: [fht] FMC Alias Private Key: 7
3,356,561 UART: [art] Extend RT PCRs Done
3,356,989 UART: [art] Lock RT PCRs Done
3,358,625 UART: [art] Populate DV Done
3,366,899 UART: [fht] FMC Alias Private Key: 7
3,368,013 UART: [art] Derive CDI
3,368,293 UART: [art] Store in in slot 0x4
3,454,124 UART: [art] Derive Key Pair
3,454,484 UART: [art] Store priv key in slot 0x5
3,468,344 UART: [art] Derive Key Pair - Done
3,482,860 UART: [art] Signing Cert with AUTHO
3,483,340 UART: RITY.KEYID = 7
3,498,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,935 UART: [art] PUB.X = AF2AB3AF82EF6BCEA33C74F4B4013A9125ED5C7D17DE11A25D19B8BDF59BA5C96CA75AF31F68746EC3A7C71A6093AF85
3,505,726 UART: [art] PUB.Y = 9C93CC8823A3CD2D6F95134AAB96FEF3615B3E8C5E6BF862E54EF0108E9BDF0DC09E4B4A8D44F57FA96C00F3CC0EF34E
3,512,672 UART: [art] SIG.R = 8C4599167A1749DCDC9773A38542A746FEAF087AB63510D54C45F72EFCCD965E2896C374828950217D7FEC95AD3D6E7D
3,519,443 UART: [art] SIG.S = 5DF2D111387E0EAB3155738847B9738D186CF5194AAF210803EBC67E15273FA9811DB668B100ECD60A80FF2F6D7E2A14
3,543,654 UART: Caliptra RT
3,543,999 UART: [state] CFI Enabled
3,651,125 UART: [rt] RT listening for mailbox commands...
3,651,795 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,745 UART: [rt]cmd =0x41544d4e, len=14344
4,062,860 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,633 UART: [state] WD Timer not started. Device not locked for debugging
87,988 UART: [kat] SHA2-256
891,538 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,667 UART: [kat] ++
895,819 UART: [kat] sha1
900,071 UART: [kat] SHA2-256
902,011 UART: [kat] SHA2-384
904,706 UART: [kat] SHA2-512-ACC
906,607 UART: [kat] ECC-384
916,182 UART: [kat] HMAC-384Kdf
920,984 UART: [kat] LMS
1,169,296 UART: [kat] --
1,170,123 UART: [cold-reset] ++
1,170,701 UART: [fht] FHT @ 0x50003400
1,173,287 UART: [idev] ++
1,173,455 UART: [idev] CDI.KEYID = 6
1,173,816 UART: [idev] SUBJECT.KEYID = 7
1,174,241 UART: [idev] UDS.KEYID = 0
1,174,587 ready_for_fw is high
1,174,587 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,805 UART: [idev] Erasing UDS.KEYID = 0
1,198,463 UART: [idev] Sha1 KeyId Algorithm
1,207,555 UART: [idev] --
1,208,626 UART: [ldev] ++
1,208,794 UART: [ldev] CDI.KEYID = 6
1,209,158 UART: [ldev] SUBJECT.KEYID = 5
1,209,585 UART: [ldev] AUTHORITY.KEYID = 7
1,210,048 UART: [ldev] FE.KEYID = 1
1,215,420 UART: [ldev] Erasing FE.KEYID = 1
1,241,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,816 UART: [ldev] --
1,281,134 UART: [fwproc] Wait for Commands...
1,281,763 UART: [fwproc] Recv command 0x46574c44
1,282,496 UART: [fwproc] Recv'd Img size: 114332 bytes
3,126,858 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,098 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,407 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,320,169 >>> mbox cmd response: success
3,321,404 UART: [afmc] ++
3,321,572 UART: [afmc] CDI.KEYID = 6
3,321,935 UART: [afmc] SUBJECT.KEYID = 7
3,322,361 UART: [afmc] AUTHORITY.KEYID = 5
3,357,579 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,500 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,210 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,100 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,811 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,603 UART: [afmc] --
3,400,599 UART: [cold-reset] --
3,401,355 UART: [state] Locking Datavault
3,402,452 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,056 UART: [state] Locking ICCM
3,403,550 UART: [exit] Launching FMC @ 0x40000130
3,408,879 UART:
3,408,895 UART: Running Caliptra FMC ...
3,409,303 UART:
3,409,357 UART: [state] CFI Enabled
3,420,055 UART: [fht] FMC Alias Private Key: 7
3,528,055 UART: [art] Extend RT PCRs Done
3,528,483 UART: [art] Lock RT PCRs Done
3,529,791 UART: [art] Populate DV Done
3,537,765 UART: [fht] FMC Alias Private Key: 7
3,538,845 UART: [art] Derive CDI
3,539,125 UART: [art] Store in in slot 0x4
3,624,980 UART: [art] Derive Key Pair
3,625,340 UART: [art] Store priv key in slot 0x5
3,638,988 UART: [art] Derive Key Pair - Done
3,654,122 UART: [art] Signing Cert with AUTHO
3,654,602 UART: RITY.KEYID = 7
3,669,800 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,565 UART: [art] PUB.X = EB5B7E6D1BA08600B258529E1461B53B0892DD8AB217F3440B1A9A03439138B8606A9E2E6CC222F1C48CF97301DC599B
3,677,303 UART: [art] PUB.Y = 37A3FB2567CB20182B1F40AE7C712F41E56D432850AF198A699850A27866E923BB86E6503C35305ED747BDD41EEE6EA8
3,684,255 UART: [art] SIG.R = 7637B52357815DD9BFB06730E3D4A9BD032A129B2E3747A01A6A18FDB158902E58052746BB9F687E1AC8A68B4FBE94B8
3,691,023 UART: [art] SIG.S = 4B3B31897ECE13454E36DD3DBC21AE39D3CB212179C7A5FFCD6D0DF4B8B706695D5C4C77FF98E6946B519B9DB4D9D086
3,715,388 UART: Caliptra RT
3,715,641 UART: [state] CFI Enabled
3,823,408 UART: [rt] RT listening for mailbox commands...
3,824,078 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,938 UART: [rt]cmd =0x41544d4e, len=14344
4,232,478 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,176 ready_for_fw is high
1,056,176 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,168,701 >>> mbox cmd response: success
3,230,780 UART:
3,230,796 UART: Running Caliptra FMC ...
3,231,204 UART:
3,231,258 UART: [state] CFI Enabled
3,241,466 UART: [fht] FMC Alias Private Key: 7
3,349,706 UART: [art] Extend RT PCRs Done
3,350,134 UART: [art] Lock RT PCRs Done
3,351,862 UART: [art] Populate DV Done
3,360,034 UART: [fht] FMC Alias Private Key: 7
3,361,204 UART: [art] Derive CDI
3,361,484 UART: [art] Store in in slot 0x4
3,447,541 UART: [art] Derive Key Pair
3,447,901 UART: [art] Store priv key in slot 0x5
3,461,321 UART: [art] Derive Key Pair - Done
3,475,846 UART: [art] Signing Cert with AUTHO
3,476,326 UART: RITY.KEYID = 7
3,491,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,385 UART: [art] PUB.X = E8D67B8A64F94AB77F989A2221643AC7F149A131738C3EF9F779EC910B64B3626DEDD7819CE3C23E1CD243D7386D4592
3,499,156 UART: [art] PUB.Y = A7607C41B68D66BFC2B2FA94EA5586E69AFBE00F6FC1B6C7DB076C9F01122FAF8F007BBB8AFF8F3644DCEC48F778F2D2
3,506,101 UART: [art] SIG.R = 8D6D003114C466B11629577CA7C31614FA52F70E9EA5B78B7E8965941CDF8483B5BA57AD58A19187129841D581B97587
3,512,838 UART: [art] SIG.S = 1CD0B5E79FA9AF91333A947BE098CE5ED0F57751041C76B95C88BEA8D473ADBFA155D28DAB4491A33567E4804091C6B2
3,536,428 UART: Caliptra RT
3,536,681 UART: [state] CFI Enabled
3,644,061 UART: [rt] RT listening for mailbox commands...
3,644,731 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,455 UART: [rt]cmd =0x41544d4e, len=14344
4,055,372 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,424 UART: [state] WD Timer not started. Device not locked for debugging
87,585 UART: [kat] SHA2-256
891,135 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,264 UART: [kat] ++
895,416 UART: [kat] sha1
899,510 UART: [kat] SHA2-256
901,450 UART: [kat] SHA2-384
904,159 UART: [kat] SHA2-512-ACC
906,060 UART: [kat] ECC-384
916,017 UART: [kat] HMAC-384Kdf
920,581 UART: [kat] LMS
1,168,893 UART: [kat] --
1,169,812 UART: [cold-reset] ++
1,170,280 UART: [fht] FHT @ 0x50003400
1,173,040 UART: [idev] ++
1,173,208 UART: [idev] CDI.KEYID = 6
1,173,569 UART: [idev] SUBJECT.KEYID = 7
1,173,994 UART: [idev] UDS.KEYID = 0
1,174,340 ready_for_fw is high
1,174,340 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,186 UART: [idev] Erasing UDS.KEYID = 0
1,199,586 UART: [idev] Sha1 KeyId Algorithm
1,208,442 UART: [idev] --
1,209,467 UART: [ldev] ++
1,209,635 UART: [ldev] CDI.KEYID = 6
1,209,999 UART: [ldev] SUBJECT.KEYID = 5
1,210,426 UART: [ldev] AUTHORITY.KEYID = 7
1,210,889 UART: [ldev] FE.KEYID = 1
1,216,217 UART: [ldev] Erasing FE.KEYID = 1
1,242,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,969 UART: [ldev] --
1,281,389 UART: [fwproc] Wait for Commands...
1,282,094 UART: [fwproc] Recv command 0x46574c44
1,282,827 UART: [fwproc] Recv'd Img size: 114332 bytes
3,126,311 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,041 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,350 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,320,296 >>> mbox cmd response: success
3,321,489 UART: [afmc] ++
3,321,657 UART: [afmc] CDI.KEYID = 6
3,322,020 UART: [afmc] SUBJECT.KEYID = 7
3,322,446 UART: [afmc] AUTHORITY.KEYID = 5
3,358,510 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,192 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,943 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,653 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,543 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,254 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,930 UART: [afmc] --
3,401,970 UART: [cold-reset] --
3,402,766 UART: [state] Locking Datavault
3,403,987 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,591 UART: [state] Locking ICCM
3,405,187 UART: [exit] Launching FMC @ 0x40000130
3,410,516 UART:
3,410,532 UART: Running Caliptra FMC ...
3,410,940 UART:
3,411,083 UART: [state] CFI Enabled
3,421,979 UART: [fht] FMC Alias Private Key: 7
3,529,569 UART: [art] Extend RT PCRs Done
3,529,997 UART: [art] Lock RT PCRs Done
3,531,625 UART: [art] Populate DV Done
3,539,851 UART: [fht] FMC Alias Private Key: 7
3,541,021 UART: [art] Derive CDI
3,541,301 UART: [art] Store in in slot 0x4
3,626,828 UART: [art] Derive Key Pair
3,627,188 UART: [art] Store priv key in slot 0x5
3,640,816 UART: [art] Derive Key Pair - Done
3,655,331 UART: [art] Signing Cert with AUTHO
3,655,811 UART: RITY.KEYID = 7
3,670,837 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,602 UART: [art] PUB.X = 2460F36C1FD6184F4740CE687A41690E423936B5F886934FBBBEF2CA193C020B4D87BC999EB00DA635D074709CF0E58C
3,678,364 UART: [art] PUB.Y = B079CEE524F3BCB1368578B115F495A82755215850D2B496414CF13F8E562897EAA01BE2A1CD6157B8F8AE40298ED4F3
3,685,316 UART: [art] SIG.R = 2BA4286330E732D9BD0DF0620F7B9E639B28B592DD21CD155DF1969AA86774AAA3FD5DA354CC99042F220BDF1FED61D8
3,692,088 UART: [art] SIG.S = 6DCF3078FD9367886BD867E50BB58774408B950683F5D4E51692DEE7B16B6F2D2BEBB210A1017371C9F33577ADCE2F2A
3,715,236 UART: Caliptra RT
3,715,581 UART: [state] CFI Enabled
3,822,348 UART: [rt] RT listening for mailbox commands...
3,823,018 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,114 UART: [rt]cmd =0x41544d4e, len=14344
4,236,248 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,399 ready_for_fw is high
1,056,399 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,180,288 >>> mbox cmd response: success
3,243,647 UART:
3,243,663 UART: Running Caliptra FMC ...
3,244,071 UART:
3,244,214 UART: [state] CFI Enabled
3,254,792 UART: [fht] FMC Alias Private Key: 7
3,362,546 UART: [art] Extend RT PCRs Done
3,362,974 UART: [art] Lock RT PCRs Done
3,364,488 UART: [art] Populate DV Done
3,372,692 UART: [fht] FMC Alias Private Key: 7
3,373,750 UART: [art] Derive CDI
3,374,030 UART: [art] Store in in slot 0x4
3,459,745 UART: [art] Derive Key Pair
3,460,105 UART: [art] Store priv key in slot 0x5
3,473,605 UART: [art] Derive Key Pair - Done
3,488,182 UART: [art] Signing Cert with AUTHO
3,488,662 UART: RITY.KEYID = 7
3,503,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,197 UART: [art] PUB.X = 1F8CB747BA4BA817205A61947F4AEE9893D03ECC952950A5C8578918EF49D827FA22EE41FD4476C54155B607FBA0B378
3,510,968 UART: [art] PUB.Y = B7495668F2D4D69D6F61506D79AE4F29CC1E70B05A10A02D960AFBE90AE6F1876FDEBFAD965A252D0D5358E146042E32
3,517,916 UART: [art] SIG.R = EC8B77226D6075546001B959B1F37EA9C6B4C76D0584CB58FB77460AFE1A22FBD1CCCB8A180B6730346A6A95A830713E
3,524,680 UART: [art] SIG.S = 4EF78EB54592BD1FE6FABEBF03398A0743A9F95502E2F122301DBA09B456C22A8BECEFF0DE98C365872963DA2E9FDB8E
3,548,723 UART: Caliptra RT
3,549,068 UART: [state] CFI Enabled
3,657,150 UART: [rt] RT listening for mailbox commands...
3,657,820 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,780,938 UART: [rt]cmd =0x41544d4e, len=14344
4,061,690 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,487 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,061 UART: [kat] SHA2-256
881,992 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,107 UART: [kat] ++
886,259 UART: [kat] sha1
890,335 UART: [kat] SHA2-256
892,273 UART: [kat] SHA2-384
895,098 UART: [kat] SHA2-512-ACC
896,999 UART: [kat] ECC-384
902,464 UART: [kat] HMAC-384Kdf
906,990 UART: [kat] LMS
1,475,186 UART: [kat] --
1,476,211 UART: [cold-reset] ++
1,476,747 UART: [fht] Storing FHT @ 0x50003400
1,479,576 UART: [idev] ++
1,479,744 UART: [idev] CDI.KEYID = 6
1,480,104 UART: [idev] SUBJECT.KEYID = 7
1,480,528 UART: [idev] UDS.KEYID = 0
1,480,873 ready_for_fw is high
1,480,873 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,854 UART: [idev] Erasing UDS.KEYID = 0
1,505,596 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,194 UART: [idev] --
1,515,255 UART: [ldev] ++
1,515,423 UART: [ldev] CDI.KEYID = 6
1,515,786 UART: [ldev] SUBJECT.KEYID = 5
1,516,212 UART: [ldev] AUTHORITY.KEYID = 7
1,516,675 UART: [ldev] FE.KEYID = 1
1,521,743 UART: [ldev] Erasing FE.KEYID = 1
1,546,426 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,494 UART: [ldev] --
1,585,827 UART: [fwproc] Waiting for Commands...
1,586,688 UART: [fwproc] Received command 0x46574c44
1,587,479 UART: [fwproc] Received Image of size 114332 bytes
2,885,557 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,329 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,681 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,536 >>> mbox cmd response: success
3,079,680 UART: [afmc] ++
3,079,848 UART: [afmc] CDI.KEYID = 6
3,080,210 UART: [afmc] SUBJECT.KEYID = 7
3,080,635 UART: [afmc] AUTHORITY.KEYID = 5
3,116,538 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,114 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,894 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,622 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,507 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,197 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,166 UART: [afmc] --
3,160,216 UART: [cold-reset] --
3,160,936 UART: [state] Locking Datavault
3,162,031 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,635 UART: [state] Locking ICCM
3,163,227 UART: [exit] Launching FMC @ 0x40000130
3,168,556 UART:
3,168,572 UART: Running Caliptra FMC ...
3,168,980 UART:
3,169,034 UART: [state] CFI Enabled
3,179,623 UART: [fht] FMC Alias Private Key: 7
3,287,094 UART: [art] Extend RT PCRs Done
3,287,522 UART: [art] Lock RT PCRs Done
3,289,142 UART: [art] Populate DV Done
3,297,319 UART: [fht] FMC Alias Private Key: 7
3,298,255 UART: [art] Derive CDI
3,298,535 UART: [art] Store in in slot 0x4
3,383,876 UART: [art] Derive Key Pair
3,384,236 UART: [art] Store priv key in slot 0x5
3,397,390 UART: [art] Derive Key Pair - Done
3,412,749 UART: [art] Signing Cert with AUTHO
3,413,229 UART: RITY.KEYID = 7
3,428,753 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,518 UART: [art] PUB.X = F14C987B3F0D48362E4CC0118CA6ED66A6D621857183487B8311E7684280D9D5AD89387F22A39B4A7D58664CCE2398E8
3,436,281 UART: [art] PUB.Y = 4A032F3983467D47382D2A7DCCA7A6A5CF319F900058862E48DB857050C1F031A90061561C9A9B1C7A020C51DEEFFA8C
3,443,182 UART: [art] SIG.R = 65D2E32E87F5E73944530808F004044F87140FF6EBCE2E58906DFDFB4A89E6346C1D1BDF22601100FBF2CE530C75375F
3,449,916 UART: [art] SIG.S = D78BCC4E1DF178A892B3CF4A4646B088BB47404D67CEC6991C8224BE5983BB1C57EBCE86FD14B3EAE1C08107E4C70F54
3,473,615 UART: Caliptra RT
3,473,868 UART: [state] CFI Enabled
3,581,421 UART: [rt] RT listening for mailbox commands...
3,582,091 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,045 UART: [rt]cmd =0x41544d4e, len=14344
4,015,086 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,315 ready_for_fw is high
1,362,315 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,812 >>> mbox cmd response: success
2,987,596 UART:
2,987,612 UART: Running Caliptra FMC ...
2,988,020 UART:
2,988,074 UART: [state] CFI Enabled
2,998,509 UART: [fht] FMC Alias Private Key: 7
3,106,296 UART: [art] Extend RT PCRs Done
3,106,724 UART: [art] Lock RT PCRs Done
3,108,254 UART: [art] Populate DV Done
3,116,437 UART: [fht] FMC Alias Private Key: 7
3,117,493 UART: [art] Derive CDI
3,117,773 UART: [art] Store in in slot 0x4
3,203,238 UART: [art] Derive Key Pair
3,203,598 UART: [art] Store priv key in slot 0x5
3,216,880 UART: [art] Derive Key Pair - Done
3,231,518 UART: [art] Signing Cert with AUTHO
3,231,998 UART: RITY.KEYID = 7
3,247,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,081 UART: [art] PUB.X = 09D395100AD42B78EA55DF9F405FFD53E41A3E8C2056DB49880074946FD866E5D1B6750ADC4458DB92244F8BE874107E
3,254,822 UART: [art] PUB.Y = 87DD0F5AF346E1D36684480DF54DFEECDBAA4EA72CA66B9EA6799EC51E8F56646322C22821D0F83A0D6E6247E05528F8
3,261,775 UART: [art] SIG.R = 8878964101DEF769D58C4F348D88B23F6F748AC8732218AAB209F125620306E8C991009ABA5FA2470924EAB8E5181ADB
3,268,506 UART: [art] SIG.S = 2C10046927D46F0F4C1920AAA28971A459F81CE9CC9EE092C44738F59C6CEB19ABF780EF2AC219E6E54BBA5716CF5967
3,292,471 UART: Caliptra RT
3,292,724 UART: [state] CFI Enabled
3,400,201 UART: [rt] RT listening for mailbox commands...
3,400,871 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,751 UART: [rt]cmd =0x41544d4e, len=14344
3,833,850 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,548 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,222 UART: [kat] SHA2-256
882,153 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,268 UART: [kat] ++
886,420 UART: [kat] sha1
890,732 UART: [kat] SHA2-256
892,670 UART: [kat] SHA2-384
895,379 UART: [kat] SHA2-512-ACC
897,280 UART: [kat] ECC-384
902,787 UART: [kat] HMAC-384Kdf
907,395 UART: [kat] LMS
1,475,591 UART: [kat] --
1,476,624 UART: [cold-reset] ++
1,477,188 UART: [fht] Storing FHT @ 0x50003400
1,480,045 UART: [idev] ++
1,480,213 UART: [idev] CDI.KEYID = 6
1,480,573 UART: [idev] SUBJECT.KEYID = 7
1,480,997 UART: [idev] UDS.KEYID = 0
1,481,342 ready_for_fw is high
1,481,342 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,907 UART: [idev] Erasing UDS.KEYID = 0
1,505,139 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,615 UART: [idev] --
1,514,662 UART: [ldev] ++
1,514,830 UART: [ldev] CDI.KEYID = 6
1,515,193 UART: [ldev] SUBJECT.KEYID = 5
1,515,619 UART: [ldev] AUTHORITY.KEYID = 7
1,516,082 UART: [ldev] FE.KEYID = 1
1,521,522 UART: [ldev] Erasing FE.KEYID = 1
1,547,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,407 UART: [ldev] --
1,586,792 UART: [fwproc] Waiting for Commands...
1,587,527 UART: [fwproc] Received command 0x46574c44
1,588,318 UART: [fwproc] Received Image of size 114332 bytes
2,885,978 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,356 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,708 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,637 >>> mbox cmd response: success
3,079,711 UART: [afmc] ++
3,079,879 UART: [afmc] CDI.KEYID = 6
3,080,241 UART: [afmc] SUBJECT.KEYID = 7
3,080,666 UART: [afmc] AUTHORITY.KEYID = 5
3,116,171 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,287 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,067 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,795 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,680 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,370 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,329 UART: [afmc] --
3,159,293 UART: [cold-reset] --
3,160,251 UART: [state] Locking Datavault
3,161,606 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,210 UART: [state] Locking ICCM
3,162,766 UART: [exit] Launching FMC @ 0x40000130
3,168,095 UART:
3,168,111 UART: Running Caliptra FMC ...
3,168,519 UART:
3,168,662 UART: [state] CFI Enabled
3,179,455 UART: [fht] FMC Alias Private Key: 7
3,287,078 UART: [art] Extend RT PCRs Done
3,287,506 UART: [art] Lock RT PCRs Done
3,289,230 UART: [art] Populate DV Done
3,297,741 UART: [fht] FMC Alias Private Key: 7
3,298,725 UART: [art] Derive CDI
3,299,005 UART: [art] Store in in slot 0x4
3,384,406 UART: [art] Derive Key Pair
3,384,766 UART: [art] Store priv key in slot 0x5
3,397,920 UART: [art] Derive Key Pair - Done
3,412,576 UART: [art] Signing Cert with AUTHO
3,413,056 UART: RITY.KEYID = 7
3,428,134 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,899 UART: [art] PUB.X = 679EE3B131903914276AE41BAC976D9A7D84E769129AA18AF01A7E1047F045999B170B7103B5A8FCBF2781E39BC82954
3,435,661 UART: [art] PUB.Y = 5E4BD896807D462DB3FDC569DD149EE176ABA731690CC4D0009D42E108F8B6C57267D3F48ACDC3697B50FC1BF7A8D8C1
3,442,597 UART: [art] SIG.R = 6539577E0227C891C34FDD3B17CAEC385CDD6FA6FED4B5C42833670288A461C151D10744CEA40442AADA3185FCCC6295
3,449,363 UART: [art] SIG.S = 8BD28A08750AE762C7E7ED478C0224C9DBB0E9722C9915219C0A4DCF0C7393A9AA1552BFA99CA91652CE6A4D96766343
3,472,961 UART: Caliptra RT
3,473,306 UART: [state] CFI Enabled
3,581,817 UART: [rt] RT listening for mailbox commands...
3,582,487 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,523 UART: [rt]cmd =0x41544d4e, len=14344
4,015,292 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,156 ready_for_fw is high
1,362,156 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,251 >>> mbox cmd response: success
2,988,369 UART:
2,988,385 UART: Running Caliptra FMC ...
2,988,793 UART:
2,988,936 UART: [state] CFI Enabled
2,999,485 UART: [fht] FMC Alias Private Key: 7
3,107,634 UART: [art] Extend RT PCRs Done
3,108,062 UART: [art] Lock RT PCRs Done
3,109,576 UART: [art] Populate DV Done
3,117,807 UART: [fht] FMC Alias Private Key: 7
3,118,803 UART: [art] Derive CDI
3,119,083 UART: [art] Store in in slot 0x4
3,205,294 UART: [art] Derive Key Pair
3,205,654 UART: [art] Store priv key in slot 0x5
3,218,946 UART: [art] Derive Key Pair - Done
3,233,846 UART: [art] Signing Cert with AUTHO
3,234,326 UART: RITY.KEYID = 7
3,249,304 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,069 UART: [art] PUB.X = 46FEAAE3034F194024B512872C21BC306A5B9700106AEFCB70259A868FF376319940610BCAF27573E779FA94EF81CEC0
3,256,813 UART: [art] PUB.Y = 9C0F6627DCCD545AA9E6E73E48301FA89CC867156B033EFB0CD194DC675AA71199FA0C2457E109B5F0ABB64E1B41E146
3,263,760 UART: [art] SIG.R = 6CAD6A25E9FB42F3F7F9D9E1729F953F570A12EAAAE0D0369576703F3748EA619DA4A1AF0A634572BA4EB20A049E3168
3,270,528 UART: [art] SIG.S = 8569E78A107EC179DC169714E3B5A7BF7B32ECAE489E0C430079CAFAA2B853B83AECC045006329D18798AC4C69BEC2B2
3,294,302 UART: Caliptra RT
3,294,647 UART: [state] CFI Enabled
3,402,710 UART: [rt] RT listening for mailbox commands...
3,403,380 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,272 UART: [rt]cmd =0x41544d4e, len=14344
3,836,821 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,822 UART: [state] LifecycleState = Unprovisioned
85,477 UART: [state] DebugLocked = No
86,165 UART: [state] WD Timer not started. Device not locked for debugging
87,352 UART: [kat] SHA2-256
893,002 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,127 UART: [kat] ++
897,279 UART: [kat] sha1
901,429 UART: [kat] SHA2-256
903,369 UART: [kat] SHA2-384
906,102 UART: [kat] SHA2-512-ACC
908,003 UART: [kat] ECC-384
917,824 UART: [kat] HMAC-384Kdf
922,252 UART: [kat] LMS
1,170,580 UART: [kat] --
1,171,367 UART: [cold-reset] ++
1,171,701 UART: [fht] FHT @ 0x50003400
1,174,556 UART: [idev] ++
1,174,724 UART: [idev] CDI.KEYID = 6
1,175,084 UART: [idev] SUBJECT.KEYID = 7
1,175,508 UART: [idev] UDS.KEYID = 0
1,175,853 ready_for_fw is high
1,175,853 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,366 UART: [idev] Erasing UDS.KEYID = 0
1,200,313 UART: [idev] Sha1 KeyId Algorithm
1,208,909 UART: [idev] --
1,210,007 UART: [ldev] ++
1,210,175 UART: [ldev] CDI.KEYID = 6
1,210,538 UART: [ldev] SUBJECT.KEYID = 5
1,210,964 UART: [ldev] AUTHORITY.KEYID = 7
1,211,427 UART: [ldev] FE.KEYID = 1
1,216,575 UART: [ldev] Erasing FE.KEYID = 1
1,243,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,067 UART: [ldev] --
1,282,350 UART: [fwproc] Wait for Commands...
1,283,014 UART: [fwproc] Recv command 0x46574c44
1,283,742 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,740 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,044 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,781 >>> mbox cmd response: success
2,774,799 UART: [afmc] ++
2,774,967 UART: [afmc] CDI.KEYID = 6
2,775,329 UART: [afmc] SUBJECT.KEYID = 7
2,775,754 UART: [afmc] AUTHORITY.KEYID = 5
2,810,505 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,116 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,864 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,592 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,477 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,196 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,996 UART: [afmc] --
2,854,022 UART: [cold-reset] --
2,854,978 UART: [state] Locking Datavault
2,855,923 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,527 UART: [state] Locking ICCM
2,856,981 UART: [exit] Launching FMC @ 0x40000130
2,862,310 UART:
2,862,326 UART: Running Caliptra FMC ...
2,862,734 UART:
2,862,788 UART: [state] CFI Enabled
2,873,471 UART: [fht] FMC Alias Private Key: 7
2,981,450 UART: [art] Extend RT PCRs Done
2,981,878 UART: [art] Lock RT PCRs Done
2,983,560 UART: [art] Populate DV Done
2,991,487 UART: [fht] FMC Alias Private Key: 7
2,992,665 UART: [art] Derive CDI
2,992,945 UART: [art] Store in in slot 0x4
3,079,008 UART: [art] Derive Key Pair
3,079,368 UART: [art] Store priv key in slot 0x5
3,092,472 UART: [art] Derive Key Pair - Done
3,107,241 UART: [art] Signing Cert with AUTHO
3,107,721 UART: RITY.KEYID = 7
3,123,109 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,874 UART: [art] PUB.X = F1F21739A9D13DAF3662DBC1A5AB0D2D39D1BC13F28D005EEA39AF2D748A21FCFF4800A350EF55C30A0B0E9BF7B61660
3,130,608 UART: [art] PUB.Y = 9AD32DBAC69AD0E4E564240CCB99E9AE2FFB2BD24AAB42C6E742FC72E60125BC751BFA0BF919291528FECD1CDCE56C28
3,137,577 UART: [art] SIG.R = ECFE3893898615DD8E76EF39082AA64099710A9D4AF936C5644D430BDEDCB3F4829940F693CD5DE9414444D91482C455
3,144,338 UART: [art] SIG.S = FE1547D010BACB04653A18A94956A178E28D5286179DD69B13C294BD99669796122EEF9587567ECB676CF80CE963F1F9
3,167,675 UART: Caliptra RT
3,167,928 UART: [state] CFI Enabled
3,275,152 UART: [rt] RT listening for mailbox commands...
3,275,822 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,822 UART: [rt]cmd =0x41544d4e, len=14344
3,709,013 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,039 ready_for_fw is high
1,060,039 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,080 >>> mbox cmd response: success
2,690,964 UART:
2,690,980 UART: Running Caliptra FMC ...
2,691,388 UART:
2,691,442 UART: [state] CFI Enabled
2,702,033 UART: [fht] FMC Alias Private Key: 7
2,810,680 UART: [art] Extend RT PCRs Done
2,811,108 UART: [art] Lock RT PCRs Done
2,812,808 UART: [art] Populate DV Done
2,820,885 UART: [fht] FMC Alias Private Key: 7
2,821,911 UART: [art] Derive CDI
2,822,191 UART: [art] Store in in slot 0x4
2,907,984 UART: [art] Derive Key Pair
2,908,344 UART: [art] Store priv key in slot 0x5
2,921,636 UART: [art] Derive Key Pair - Done
2,936,358 UART: [art] Signing Cert with AUTHO
2,936,838 UART: RITY.KEYID = 7
2,951,788 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,553 UART: [art] PUB.X = 16E50B3DFC9B10BC6F918621AD1625EA07FCA7B42D0C78AE26CEDDCDCA0E3262433B4AB120DA06605E521B1E4DFAFB4A
2,959,334 UART: [art] PUB.Y = 062BC2E96406E1B403D50C8D0AD35CDBA416D870575850D3C05069157C4A9362EAA2899F8C14CEDE22E1F81EBC68F661
2,966,275 UART: [art] SIG.R = 90FD4A5EB7FF7B9C64F3BFBBFB813A687933B5A19E5EE2C2232B41728BEF5CF3032641044A1D994137073A6833269DEF
2,973,044 UART: [art] SIG.S = E7DFF6337579D774B6B48AFABE53A3F32FB2DE0C4492A162799A8CE37F6B2A93B3B2148C96638E580B5114FB09699034
2,996,000 UART: Caliptra RT
2,996,253 UART: [state] CFI Enabled
3,104,337 UART: [rt] RT listening for mailbox commands...
3,105,007 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,413 UART: [rt]cmd =0x41544d4e, len=14344
3,538,328 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,826 UART: [state] WD Timer not started. Device not locked for debugging
88,061 UART: [kat] SHA2-256
893,711 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,836 UART: [kat] ++
897,988 UART: [kat] sha1
902,236 UART: [kat] SHA2-256
904,176 UART: [kat] SHA2-384
906,925 UART: [kat] SHA2-512-ACC
908,826 UART: [kat] ECC-384
918,677 UART: [kat] HMAC-384Kdf
923,333 UART: [kat] LMS
1,171,661 UART: [kat] --
1,172,692 UART: [cold-reset] ++
1,173,268 UART: [fht] FHT @ 0x50003400
1,175,713 UART: [idev] ++
1,175,881 UART: [idev] CDI.KEYID = 6
1,176,241 UART: [idev] SUBJECT.KEYID = 7
1,176,665 UART: [idev] UDS.KEYID = 0
1,177,010 ready_for_fw is high
1,177,010 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,671 UART: [idev] Erasing UDS.KEYID = 0
1,201,510 UART: [idev] Sha1 KeyId Algorithm
1,209,896 UART: [idev] --
1,210,946 UART: [ldev] ++
1,211,114 UART: [ldev] CDI.KEYID = 6
1,211,477 UART: [ldev] SUBJECT.KEYID = 5
1,211,903 UART: [ldev] AUTHORITY.KEYID = 7
1,212,366 UART: [ldev] FE.KEYID = 1
1,217,728 UART: [ldev] Erasing FE.KEYID = 1
1,244,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,192 UART: [ldev] --
1,283,589 UART: [fwproc] Wait for Commands...
1,284,235 UART: [fwproc] Recv command 0x46574c44
1,284,963 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,231 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,535 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,442 >>> mbox cmd response: success
2,775,586 UART: [afmc] ++
2,775,754 UART: [afmc] CDI.KEYID = 6
2,776,116 UART: [afmc] SUBJECT.KEYID = 7
2,776,541 UART: [afmc] AUTHORITY.KEYID = 5
2,811,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,181 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,909 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,794 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,513 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,441 UART: [afmc] --
2,855,381 UART: [cold-reset] --
2,856,247 UART: [state] Locking Datavault
2,857,354 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,958 UART: [state] Locking ICCM
2,858,394 UART: [exit] Launching FMC @ 0x40000130
2,863,723 UART:
2,863,739 UART: Running Caliptra FMC ...
2,864,147 UART:
2,864,290 UART: [state] CFI Enabled
2,874,795 UART: [fht] FMC Alias Private Key: 7
2,983,276 UART: [art] Extend RT PCRs Done
2,983,704 UART: [art] Lock RT PCRs Done
2,985,168 UART: [art] Populate DV Done
2,993,425 UART: [fht] FMC Alias Private Key: 7
2,994,433 UART: [art] Derive CDI
2,994,713 UART: [art] Store in in slot 0x4
3,080,530 UART: [art] Derive Key Pair
3,080,890 UART: [art] Store priv key in slot 0x5
3,094,006 UART: [art] Derive Key Pair - Done
3,108,635 UART: [art] Signing Cert with AUTHO
3,109,115 UART: RITY.KEYID = 7
3,124,685 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,450 UART: [art] PUB.X = 494C6A0FAD03685D3461A7342CA212DCB5D305BC166C75A97F0AD6104B11D3EDBF708B4B0CF75903D42A8F0D6D285DD5
3,132,211 UART: [art] PUB.Y = DC6D57C0D1ED711FC84F2A37EB20022696475B3C9621AFD1B42102399DE972D9CDCA09A289B6BBE80DA12BE7B529F88A
3,139,163 UART: [art] SIG.R = 32EF075895E1BA4D189F06F784967B8F87CD1C8D9637FDC3DA89D05A5F25FF6795CDAA3C646C763678737750743FC13D
3,145,931 UART: [art] SIG.S = F6500826236586CE67121586DF591EE41C8F2FA22367B16C46EE2B14C76298B84C501543957809C98909CB49E704E29F
3,169,932 UART: Caliptra RT
3,170,277 UART: [state] CFI Enabled
3,278,098 UART: [rt] RT listening for mailbox commands...
3,278,768 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,054 UART: [rt]cmd =0x41544d4e, len=14344
3,712,545 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,306 ready_for_fw is high
1,061,306 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,431 >>> mbox cmd response: success
2,689,817 UART:
2,689,833 UART: Running Caliptra FMC ...
2,690,241 UART:
2,690,384 UART: [state] CFI Enabled
2,700,835 UART: [fht] FMC Alias Private Key: 7
2,809,126 UART: [art] Extend RT PCRs Done
2,809,554 UART: [art] Lock RT PCRs Done
2,811,000 UART: [art] Populate DV Done
2,819,177 UART: [fht] FMC Alias Private Key: 7
2,820,157 UART: [art] Derive CDI
2,820,437 UART: [art] Store in in slot 0x4
2,905,758 UART: [art] Derive Key Pair
2,906,118 UART: [art] Store priv key in slot 0x5
2,919,202 UART: [art] Derive Key Pair - Done
2,933,580 UART: [art] Signing Cert with AUTHO
2,934,060 UART: RITY.KEYID = 7
2,949,030 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,795 UART: [art] PUB.X = 97D68C6520E651795D268299E1F83653280097DB620385EE1D8FF7D24C0B800DF54D9F6939380E29B1A8943959DE9A9A
2,956,523 UART: [art] PUB.Y = 513BA174778B7D29087031F7BF054D5D249FFFEDBFFCFE99B0E41E7B679D915B0D375F0CB056EE32602345FB7E36ABF3
2,963,475 UART: [art] SIG.R = 7C5BF912C16E70350EE3E55D8AFA5DBF2E99CBF7A724CF412885C35C1EAEE0A99DEE1B42050647C0D2868E3F297357A6
2,970,250 UART: [art] SIG.S = 4E1C7241257A37A5A96AF22096C7A42ECF7478BB8C6836BD76C0ED71F540D48C02CDB45575E16BF7452BAECFC76A5621
2,993,896 UART: Caliptra RT
2,994,241 UART: [state] CFI Enabled
3,102,158 UART: [rt] RT listening for mailbox commands...
3,102,828 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,986 UART: [rt]cmd =0x41544d4e, len=14344
3,535,981 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
891,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,361 UART: [kat] ++
895,513 UART: [kat] sha1
899,845 UART: [kat] SHA2-256
901,785 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,266 UART: [kat] HMAC-384Kdf
920,870 UART: [kat] LMS
1,169,182 UART: [kat] --
1,169,895 UART: [cold-reset] ++
1,170,371 UART: [fht] FHT @ 0x50003400
1,173,077 UART: [idev] ++
1,173,245 UART: [idev] CDI.KEYID = 6
1,173,606 UART: [idev] SUBJECT.KEYID = 7
1,174,031 UART: [idev] UDS.KEYID = 0
1,174,377 ready_for_fw is high
1,174,377 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,461 UART: [idev] Erasing UDS.KEYID = 0
1,199,287 UART: [idev] Sha1 KeyId Algorithm
1,208,115 UART: [idev] --
1,209,142 UART: [ldev] ++
1,209,310 UART: [ldev] CDI.KEYID = 6
1,209,674 UART: [ldev] SUBJECT.KEYID = 5
1,210,101 UART: [ldev] AUTHORITY.KEYID = 7
1,210,564 UART: [ldev] FE.KEYID = 1
1,215,700 UART: [ldev] Erasing FE.KEYID = 1
1,241,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,488 UART: [ldev] --
1,280,832 UART: [fwproc] Wait for Commands...
1,281,523 UART: [fwproc] Recv command 0x46574c44
1,282,256 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,354 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,868 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,177 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,897 >>> mbox cmd response: success
2,773,926 UART: [afmc] ++
2,774,094 UART: [afmc] CDI.KEYID = 6
2,774,457 UART: [afmc] SUBJECT.KEYID = 7
2,774,883 UART: [afmc] AUTHORITY.KEYID = 5
2,810,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,185 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,914 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,797 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,516 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,203 UART: [afmc] --
2,853,285 UART: [cold-reset] --
2,854,147 UART: [state] Locking Datavault
2,855,332 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,936 UART: [state] Locking ICCM
2,856,504 UART: [exit] Launching FMC @ 0x40000130
2,861,833 UART:
2,861,849 UART: Running Caliptra FMC ...
2,862,257 UART:
2,862,311 UART: [state] CFI Enabled
2,872,444 UART: [fht] FMC Alias Private Key: 7
2,980,367 UART: [art] Extend RT PCRs Done
2,980,795 UART: [art] Lock RT PCRs Done
2,982,303 UART: [art] Populate DV Done
2,990,324 UART: [fht] FMC Alias Private Key: 7
2,991,498 UART: [art] Derive CDI
2,991,778 UART: [art] Store in in slot 0x4
3,077,333 UART: [art] Derive Key Pair
3,077,693 UART: [art] Store priv key in slot 0x5
3,091,245 UART: [art] Derive Key Pair - Done
3,106,098 UART: [art] Signing Cert with AUTHO
3,106,578 UART: RITY.KEYID = 7
3,121,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,179 UART: [art] PUB.X = 9BE7D1E89C3B97E87BB19F8AB7B7ADD329C574C34D0C569A08B0FBBDF0C4522D5BB0E6B8BBBC389BEE80D4F905A99EF4
3,128,968 UART: [art] PUB.Y = C83FB5355EE319CE4E766E8D56BED3F6173FD8B6FEC64E7785C4B10B3827DC7045523E0675F6BD457B3014D1B3B1F327
3,135,920 UART: [art] SIG.R = DABE8C8D620DB7CA08D6A5B11E85992BF8708D76A29FB3E37765EF9C4E67A1762B1275381652EC97BA5324BCB04217D8
3,142,692 UART: [art] SIG.S = F1F0BFE9A6C42D9C96D212276E6455CB28EF5A25C1AB49E32A94C7C59775EE9E0D4C1B9B51C2204DD839916786F19B8D
3,166,624 UART: Caliptra RT
3,166,877 UART: [state] CFI Enabled
3,275,319 UART: [rt] RT listening for mailbox commands...
3,275,989 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,221 UART: [rt]cmd =0x41544d4e, len=14344
3,709,006 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,040 ready_for_fw is high
1,056,040 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,911 >>> mbox cmd response: success
2,683,489 UART:
2,683,505 UART: Running Caliptra FMC ...
2,683,913 UART:
2,683,967 UART: [state] CFI Enabled
2,694,462 UART: [fht] FMC Alias Private Key: 7
2,802,445 UART: [art] Extend RT PCRs Done
2,802,873 UART: [art] Lock RT PCRs Done
2,804,075 UART: [art] Populate DV Done
2,812,408 UART: [fht] FMC Alias Private Key: 7
2,813,510 UART: [art] Derive CDI
2,813,790 UART: [art] Store in in slot 0x4
2,899,201 UART: [art] Derive Key Pair
2,899,561 UART: [art] Store priv key in slot 0x5
2,912,945 UART: [art] Derive Key Pair - Done
2,927,841 UART: [art] Signing Cert with AUTHO
2,928,321 UART: RITY.KEYID = 7
2,943,229 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,994 UART: [art] PUB.X = E965D6CF36CC78EF776E95191C54DD427CCE959F423246C0B83A2F19AD3105D7A493EF6D9C185DA52D31DE199D0632B5
2,950,766 UART: [art] PUB.Y = FB329048ABCF7971D0F2BE6C7E0FFCA62A92157A5D4DD79D4C331F84A96625D1D83E2F4ABC424B3EB8C3807BEFE8E129
2,957,733 UART: [art] SIG.R = D7D8FE3C99B56038720A6756D063FF1B1BC3F07545965D04369ECAC53D64291DABC09AB80650C4679B957A27DD9D89F1
2,964,498 UART: [art] SIG.S = CEAE3A7533021D2AA9A111A5380D15B5AC7EF782F4AC83A127C5D3E67CB8747271C8BAFA1B30DDC6E4973F4421F3F454
2,987,961 UART: Caliptra RT
2,988,214 UART: [state] CFI Enabled
3,096,544 UART: [rt] RT listening for mailbox commands...
3,097,214 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,052 UART: [rt]cmd =0x41544d4e, len=14344
3,530,407 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
891,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,624 UART: [kat] ++
895,776 UART: [kat] sha1
899,904 UART: [kat] SHA2-256
901,844 UART: [kat] SHA2-384
904,515 UART: [kat] SHA2-512-ACC
906,416 UART: [kat] ECC-384
916,251 UART: [kat] HMAC-384Kdf
920,745 UART: [kat] LMS
1,169,057 UART: [kat] --
1,169,764 UART: [cold-reset] ++
1,170,310 UART: [fht] FHT @ 0x50003400
1,173,018 UART: [idev] ++
1,173,186 UART: [idev] CDI.KEYID = 6
1,173,547 UART: [idev] SUBJECT.KEYID = 7
1,173,972 UART: [idev] UDS.KEYID = 0
1,174,318 ready_for_fw is high
1,174,318 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,054 UART: [idev] Erasing UDS.KEYID = 0
1,199,004 UART: [idev] Sha1 KeyId Algorithm
1,207,864 UART: [idev] --
1,208,999 UART: [ldev] ++
1,209,167 UART: [ldev] CDI.KEYID = 6
1,209,531 UART: [ldev] SUBJECT.KEYID = 5
1,209,958 UART: [ldev] AUTHORITY.KEYID = 7
1,210,421 UART: [ldev] FE.KEYID = 1
1,215,681 UART: [ldev] Erasing FE.KEYID = 1
1,242,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,199 UART: [ldev] --
1,281,577 UART: [fwproc] Wait for Commands...
1,282,238 UART: [fwproc] Recv command 0x46574c44
1,282,971 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,513 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,003 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,312 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,044 >>> mbox cmd response: success
2,773,193 UART: [afmc] ++
2,773,361 UART: [afmc] CDI.KEYID = 6
2,773,724 UART: [afmc] SUBJECT.KEYID = 7
2,774,150 UART: [afmc] AUTHORITY.KEYID = 5
2,809,871 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,038 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,767 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,650 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,369 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,222 UART: [afmc] --
2,853,328 UART: [cold-reset] --
2,854,160 UART: [state] Locking Datavault
2,855,455 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,059 UART: [state] Locking ICCM
2,856,731 UART: [exit] Launching FMC @ 0x40000130
2,862,060 UART:
2,862,076 UART: Running Caliptra FMC ...
2,862,484 UART:
2,862,627 UART: [state] CFI Enabled
2,873,328 UART: [fht] FMC Alias Private Key: 7
2,981,425 UART: [art] Extend RT PCRs Done
2,981,853 UART: [art] Lock RT PCRs Done
2,983,487 UART: [art] Populate DV Done
2,991,784 UART: [fht] FMC Alias Private Key: 7
2,992,784 UART: [art] Derive CDI
2,993,064 UART: [art] Store in in slot 0x4
3,078,821 UART: [art] Derive Key Pair
3,079,181 UART: [art] Store priv key in slot 0x5
3,092,517 UART: [art] Derive Key Pair - Done
3,107,268 UART: [art] Signing Cert with AUTHO
3,107,748 UART: RITY.KEYID = 7
3,123,354 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,119 UART: [art] PUB.X = 8A6F69A29E10F39E9E35A4CF2D148BDBA7288C07700DCA9CC8DF6FFEB6243AA6D1DCEAD5A50808C761D3373F9A5BE688
3,130,899 UART: [art] PUB.Y = 6B03572613C4A1135EB11A54E2944C4A05758F2B3A8B18B1489F7D87A55C52B7870E58966EBB621EE06EF1A8AD64B1CC
3,137,844 UART: [art] SIG.R = E822D8146F9580F9B97380FD64BB02CC4B31C43E9A993D2D1F6CFB25A4A8700DDED5C5B6052059730D8D4B66B55A0B81
3,144,607 UART: [art] SIG.S = B13D018B4C78EFC70E5FE06947213A7E35A477C072002644035D5080682814362FA383DA631B684CA363A6441256F1F3
3,168,005 UART: Caliptra RT
3,168,350 UART: [state] CFI Enabled
3,275,648 UART: [rt] RT listening for mailbox commands...
3,276,318 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,270 UART: [rt]cmd =0x41544d4e, len=14344
3,709,069 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,119 ready_for_fw is high
1,056,119 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,314 >>> mbox cmd response: success
2,683,604 UART:
2,683,620 UART: Running Caliptra FMC ...
2,684,028 UART:
2,684,171 UART: [state] CFI Enabled
2,694,490 UART: [fht] FMC Alias Private Key: 7
2,803,403 UART: [art] Extend RT PCRs Done
2,803,831 UART: [art] Lock RT PCRs Done
2,805,267 UART: [art] Populate DV Done
2,813,482 UART: [fht] FMC Alias Private Key: 7
2,814,556 UART: [art] Derive CDI
2,814,836 UART: [art] Store in in slot 0x4
2,900,369 UART: [art] Derive Key Pair
2,900,729 UART: [art] Store priv key in slot 0x5
2,914,067 UART: [art] Derive Key Pair - Done
2,928,660 UART: [art] Signing Cert with AUTHO
2,929,140 UART: RITY.KEYID = 7
2,944,276 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,041 UART: [art] PUB.X = 12B5FCC4C66C15A4496F3BEBA4B268133307465CEE0E77BE5CFD095C4E9A893869FE9E5D9CEC35A6264B1C15F8BAFC31
2,951,820 UART: [art] PUB.Y = DABF9616147AB62D28FA57A07506D4B0896B31B20B09F626D447F90503BAFEBD0A962169326B14D4AA464C1047138DF6
2,958,754 UART: [art] SIG.R = ED845F46F7BA549F78B61AD6362DC9E4D9F407B2F2E3101F4BBA4C19140A1AA98BA5AF149C64304817A3EEB98089C4FC
2,965,532 UART: [art] SIG.S = 977AF0545C98E085DE78BD275D38F20FA79B9FA19F3E5827D0BFEF432F780ACB750FAB8D4F37E16FF09C608157DAB6A7
2,989,466 UART: Caliptra RT
2,989,811 UART: [state] CFI Enabled
3,097,723 UART: [rt] RT listening for mailbox commands...
3,098,393 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,423 UART: [rt]cmd =0x41544d4e, len=14344
3,531,980 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,091 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,809 UART: [kat] SHA2-256
881,740 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,855 UART: [kat] ++
886,007 UART: [kat] sha1
890,063 UART: [kat] SHA2-256
892,001 UART: [kat] SHA2-384
894,910 UART: [kat] SHA2-512-ACC
896,811 UART: [kat] ECC-384
902,500 UART: [kat] HMAC-384Kdf
907,216 UART: [kat] LMS
1,475,412 UART: [kat] --
1,476,203 UART: [cold-reset] ++
1,476,557 UART: [fht] Storing FHT @ 0x50003400
1,479,474 UART: [idev] ++
1,479,642 UART: [idev] CDI.KEYID = 6
1,480,002 UART: [idev] SUBJECT.KEYID = 7
1,480,426 UART: [idev] UDS.KEYID = 0
1,480,771 ready_for_fw is high
1,480,771 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,318 UART: [idev] Erasing UDS.KEYID = 0
1,504,356 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,032 UART: [idev] --
1,514,063 UART: [ldev] ++
1,514,231 UART: [ldev] CDI.KEYID = 6
1,514,594 UART: [ldev] SUBJECT.KEYID = 5
1,515,020 UART: [ldev] AUTHORITY.KEYID = 7
1,515,483 UART: [ldev] FE.KEYID = 1
1,520,547 UART: [ldev] Erasing FE.KEYID = 1
1,546,244 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,914 UART: [ldev] --
1,585,397 UART: [fwproc] Waiting for Commands...
1,586,152 UART: [fwproc] Received command 0x46574c44
1,586,943 UART: [fwproc] Received Image of size 114332 bytes
5,233,727 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,261,505 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,290,857 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,426,818 >>> mbox cmd response: success
5,428,036 UART: [afmc] ++
5,428,204 UART: [afmc] CDI.KEYID = 6
5,428,566 UART: [afmc] SUBJECT.KEYID = 7
5,428,991 UART: [afmc] AUTHORITY.KEYID = 5
5,463,891 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,480,333 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,481,113 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,486,822 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,492,714 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,498,415 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,506,205 UART: [afmc] --
5,507,267 UART: [cold-reset] --
5,507,931 UART: [state] Locking Datavault
5,508,994 UART: [state] Locking PCR0, PCR1 and PCR31
5,509,598 UART: [state] Locking ICCM
5,510,246 UART: [exit] Launching FMC @ 0x40000130
5,515,575 UART:
5,515,591 UART: Running Caliptra FMC ...
5,515,999 UART:
5,516,053 UART: [state] CFI Enabled
5,525,953 UART: [fht] FMC Alias Private Key: 7
5,633,833 UART: [art] Extend RT PCRs Done
5,634,261 UART: [art] Lock RT PCRs Done
5,635,937 UART: [art] Populate DV Done
5,643,963 UART: [fht] FMC Alias Private Key: 7
5,645,071 UART: [art] Derive CDI
5,645,351 UART: [art] Store in in slot 0x4
5,731,038 UART: [art] Derive Key Pair
5,731,398 UART: [art] Store priv key in slot 0x5
5,744,324 UART: [art] Derive Key Pair - Done
5,759,106 UART: [art] Signing Cert with AUTHO
5,759,586 UART: RITY.KEYID = 7
5,774,776 UART: [art] Erasing AUTHORITY.KEYID = 7
5,775,541 UART: [art] PUB.X = B851BF943D0AC576404A74C35A5A56975E8E2281718A99B2C97C98CEF61F20C2FB6C42348D47F3A005DA0C54B6D59CCA
5,782,310 UART: [art] PUB.Y = 30EFECB9036AD50182320AA80348CE640BFEB4877731E2547DE64055FE17BB019B9FAF3F6A95B15E881794DEF595B15A
5,789,250 UART: [art] SIG.R = 1E0E4BE3BA6A51B52C3769F31E90220D8A9210968E9C75F83DDD69F2E33600ADDA66212B799E0015C394B5D91B99EDB5
5,795,976 UART: [art] SIG.S = 5085CD12B4E641BEFD2C014521FDAD87E278C5B84C3D501BA9B2131A2F5E86362F5119625F47E2E41E4FCEAB5D3C00FC
5,819,840 UART: Caliptra RT
5,820,093 UART: [state] CFI Enabled
5,927,077 UART: [rt] RT listening for mailbox commands...
5,927,747 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,050,805 UART: [rt]cmd =0x41544d4e, len=14344
6,973,806 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,769 ready_for_fw is high
1,362,769 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,200,612 >>> mbox cmd response: success
5,261,617 UART:
5,261,633 UART: Running Caliptra FMC ...
5,262,041 UART:
5,262,095 UART: [state] CFI Enabled
5,272,563 UART: [fht] FMC Alias Private Key: 7
5,380,039 UART: [art] Extend RT PCRs Done
5,380,467 UART: [art] Lock RT PCRs Done
5,381,887 UART: [art] Populate DV Done
5,390,279 UART: [fht] FMC Alias Private Key: 7
5,391,237 UART: [art] Derive CDI
5,391,517 UART: [art] Store in in slot 0x4
5,477,224 UART: [art] Derive Key Pair
5,477,584 UART: [art] Store priv key in slot 0x5
5,490,822 UART: [art] Derive Key Pair - Done
5,505,583 UART: [art] Signing Cert with AUTHO
5,506,063 UART: RITY.KEYID = 7
5,520,901 UART: [art] Erasing AUTHORITY.KEYID = 7
5,521,666 UART: [art] PUB.X = AB132D358750ABF31D518DB62E26F7E603692C19C3FAE14EF192E11048F9A942FAE0EE65E622B7A68DAEC9F59A1D82E5
5,528,447 UART: [art] PUB.Y = 5C97743358FFED0CFDF8505D732B43C99A7DFE807E6C12307AB6249A8DB65790387923125DD13F6282ECDAF5BF9A249A
5,535,402 UART: [art] SIG.R = 6E45E555F3D66E0F3746E54ED53A28E22CA86F33390E95D6F443AE09A9F49559695CC1322213EF6982E94C2623FDEB72
5,542,163 UART: [art] SIG.S = C2D07DB35ABE3E3C085E8801271BAF61118710D5B250DC44F1456954151F72058F54F5A7C2072AF2AFBC1FFA4355B006
5,566,069 UART: Caliptra RT
5,566,322 UART: [state] CFI Enabled
5,674,827 UART: [rt] RT listening for mailbox commands...
5,675,497 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,798,509 UART: [rt]cmd =0x41544d4e, len=14344
6,726,434 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,115 UART: [state] LifecycleState = Unprovisioned
85,770 UART: [state] DebugLocked = No
86,298 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,962 UART: [kat] SHA2-256
881,893 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,008 UART: [kat] ++
886,160 UART: [kat] sha1
890,484 UART: [kat] SHA2-256
892,422 UART: [kat] SHA2-384
895,163 UART: [kat] SHA2-512-ACC
897,064 UART: [kat] ECC-384
902,527 UART: [kat] HMAC-384Kdf
907,047 UART: [kat] LMS
1,475,243 UART: [kat] --
1,475,960 UART: [cold-reset] ++
1,476,370 UART: [fht] Storing FHT @ 0x50003400
1,479,073 UART: [idev] ++
1,479,241 UART: [idev] CDI.KEYID = 6
1,479,601 UART: [idev] SUBJECT.KEYID = 7
1,480,025 UART: [idev] UDS.KEYID = 0
1,480,370 ready_for_fw is high
1,480,370 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,581 UART: [idev] Erasing UDS.KEYID = 0
1,504,083 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,787 UART: [idev] --
1,514,024 UART: [ldev] ++
1,514,192 UART: [ldev] CDI.KEYID = 6
1,514,555 UART: [ldev] SUBJECT.KEYID = 5
1,514,981 UART: [ldev] AUTHORITY.KEYID = 7
1,515,444 UART: [ldev] FE.KEYID = 1
1,520,886 UART: [ldev] Erasing FE.KEYID = 1
1,546,067 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,975 UART: [ldev] --
1,585,310 UART: [fwproc] Waiting for Commands...
1,586,019 UART: [fwproc] Received command 0x46574c44
1,586,810 UART: [fwproc] Received Image of size 114332 bytes
5,120,135 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,149,227 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,178,579 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,314,524 >>> mbox cmd response: success
5,315,674 UART: [afmc] ++
5,315,842 UART: [afmc] CDI.KEYID = 6
5,316,204 UART: [afmc] SUBJECT.KEYID = 7
5,316,629 UART: [afmc] AUTHORITY.KEYID = 5
5,351,603 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,367,947 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,368,727 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,374,436 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,380,328 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,386,029 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,393,839 UART: [afmc] --
5,394,907 UART: [cold-reset] --
5,395,623 UART: [state] Locking Datavault
5,396,762 UART: [state] Locking PCR0, PCR1 and PCR31
5,397,366 UART: [state] Locking ICCM
5,397,802 UART: [exit] Launching FMC @ 0x40000130
5,403,131 UART:
5,403,147 UART: Running Caliptra FMC ...
5,403,555 UART:
5,403,698 UART: [state] CFI Enabled
5,414,092 UART: [fht] FMC Alias Private Key: 7
5,521,828 UART: [art] Extend RT PCRs Done
5,522,256 UART: [art] Lock RT PCRs Done
5,523,712 UART: [art] Populate DV Done
5,531,990 UART: [fht] FMC Alias Private Key: 7
5,532,992 UART: [art] Derive CDI
5,533,272 UART: [art] Store in in slot 0x4
5,618,859 UART: [art] Derive Key Pair
5,619,219 UART: [art] Store priv key in slot 0x5
5,632,541 UART: [art] Derive Key Pair - Done
5,647,263 UART: [art] Signing Cert with AUTHO
5,647,743 UART: RITY.KEYID = 7
5,662,789 UART: [art] Erasing AUTHORITY.KEYID = 7
5,663,554 UART: [art] PUB.X = D04F87B707723D0AEC08C8E2429B389BAF54759168FC97B134FA8104AFE8202D1BDEF69A7159B272958CD5456C30D156
5,670,314 UART: [art] PUB.Y = 1790114BCB12339AE39FB3A23C5481A2AB4F94E37C82BCF179A0585BE4381685066046A7E290A07E082CB473376401D1
5,677,249 UART: [art] SIG.R = 27DF453C78E00B35CF55F4332316AA03C5AC1E202E60F70A5130B4F2FA5C1BB1502A4ECF08185EE8ABE4F19FA7ACC8DE
5,684,027 UART: [art] SIG.S = A0E66723E3BC17FC7CC29B001C9EFA6C803E91E4002296EC9545175CAF3B398110CF163F18BAF334513155C581652D59
5,708,400 UART: Caliptra RT
5,708,745 UART: [state] CFI Enabled
5,816,712 UART: [rt] RT listening for mailbox commands...
5,817,382 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,940,546 UART: [rt]cmd =0x41544d4e, len=14344
6,848,661 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,190 ready_for_fw is high
1,363,190 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,203,629 >>> mbox cmd response: success
5,266,660 UART:
5,266,676 UART: Running Caliptra FMC ...
5,267,084 UART:
5,267,227 UART: [state] CFI Enabled
5,277,813 UART: [fht] FMC Alias Private Key: 7
5,385,335 UART: [art] Extend RT PCRs Done
5,385,763 UART: [art] Lock RT PCRs Done
5,387,517 UART: [art] Populate DV Done
5,395,841 UART: [fht] FMC Alias Private Key: 7
5,396,893 UART: [art] Derive CDI
5,397,173 UART: [art] Store in in slot 0x4
5,483,034 UART: [art] Derive Key Pair
5,483,394 UART: [art] Store priv key in slot 0x5
5,496,814 UART: [art] Derive Key Pair - Done
5,511,680 UART: [art] Signing Cert with AUTHO
5,512,160 UART: RITY.KEYID = 7
5,527,200 UART: [art] Erasing AUTHORITY.KEYID = 7
5,527,965 UART: [art] PUB.X = 4C343D3A9EBA1DA0251147A99A18B0CB4545AA931D6FF7CB6C350417A9961340600FD3B2CDF761F6758678CE4C018347
5,534,728 UART: [art] PUB.Y = E1B497BD58F5C270130D5310767B5490B89023EB3AA32A280F57157C7FF4A63B60654F5ADFDC28659E48E20AB2D4AF01
5,541,670 UART: [art] SIG.R = 45C78DE02E993A067A36468AC0C478654C1F3B7FB2279396227D1C9A016D9B71B89786D84B9576EA1D1836BB3CF3818B
5,548,432 UART: [art] SIG.S = 5BCF2224097D06FAF8C4D4EA08BE3D3044C19F6D25AFEF1FDF468FEE9677D0E3374B896F6E4A44B3BC86AD578C5003C5
5,572,129 UART: Caliptra RT
5,572,474 UART: [state] CFI Enabled
5,680,686 UART: [rt] RT listening for mailbox commands...
5,681,356 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,804,494 UART: [rt]cmd =0x41544d4e, len=14344
6,722,539 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Unprovisioned
85,519 UART: [state] DebugLocked = No
86,105 UART: [state] WD Timer not started. Device not locked for debugging
87,284 UART: [kat] SHA2-256
892,934 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,059 UART: [kat] ++
897,211 UART: [kat] sha1
901,473 UART: [kat] SHA2-256
903,413 UART: [kat] SHA2-384
906,140 UART: [kat] SHA2-512-ACC
908,041 UART: [kat] ECC-384
917,280 UART: [kat] HMAC-384Kdf
921,794 UART: [kat] LMS
1,170,122 UART: [kat] --
1,170,931 UART: [cold-reset] ++
1,171,465 UART: [fht] FHT @ 0x50003400
1,174,068 UART: [idev] ++
1,174,236 UART: [idev] CDI.KEYID = 6
1,174,596 UART: [idev] SUBJECT.KEYID = 7
1,175,020 UART: [idev] UDS.KEYID = 0
1,175,365 ready_for_fw is high
1,175,365 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,028 UART: [idev] Erasing UDS.KEYID = 0
1,199,695 UART: [idev] Sha1 KeyId Algorithm
1,208,173 UART: [idev] --
1,209,371 UART: [ldev] ++
1,209,539 UART: [ldev] CDI.KEYID = 6
1,209,902 UART: [ldev] SUBJECT.KEYID = 5
1,210,328 UART: [ldev] AUTHORITY.KEYID = 7
1,210,791 UART: [ldev] FE.KEYID = 1
1,215,897 UART: [ldev] Erasing FE.KEYID = 1
1,241,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,755 UART: [ldev] --
1,281,138 UART: [fwproc] Wait for Commands...
1,281,846 UART: [fwproc] Recv command 0x46574c44
1,282,574 UART: [fwproc] Recv'd Img size: 114332 bytes
3,124,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,230 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,534 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,316,399 >>> mbox cmd response: success
3,317,561 UART: [afmc] ++
3,317,729 UART: [afmc] CDI.KEYID = 6
3,318,091 UART: [afmc] SUBJECT.KEYID = 7
3,318,516 UART: [afmc] AUTHORITY.KEYID = 5
3,353,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,711 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,420 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,312 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,023 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,910 UART: [afmc] --
3,396,838 UART: [cold-reset] --
3,397,744 UART: [state] Locking Datavault
3,398,901 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,505 UART: [state] Locking ICCM
3,400,109 UART: [exit] Launching FMC @ 0x40000130
3,405,438 UART:
3,405,454 UART: Running Caliptra FMC ...
3,405,862 UART:
3,405,916 UART: [state] CFI Enabled
3,416,146 UART: [fht] FMC Alias Private Key: 7
3,523,746 UART: [art] Extend RT PCRs Done
3,524,174 UART: [art] Lock RT PCRs Done
3,525,878 UART: [art] Populate DV Done
3,533,942 UART: [fht] FMC Alias Private Key: 7
3,534,926 UART: [art] Derive CDI
3,535,206 UART: [art] Store in in slot 0x4
3,620,643 UART: [art] Derive Key Pair
3,621,003 UART: [art] Store priv key in slot 0x5
3,633,965 UART: [art] Derive Key Pair - Done
3,649,139 UART: [art] Signing Cert with AUTHO
3,649,619 UART: RITY.KEYID = 7
3,665,205 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,970 UART: [art] PUB.X = 5E2D3FF9F74F0362AA9FB6BC865F1F370766E8B9C67234D3F4D63B50B832234F090997F59BA72305E55517EB80B5494C
3,672,725 UART: [art] PUB.Y = 78C5B8CDE2691B5723A9FE6C4A6C7AF1E2CCA15C1E47AD1CCE729AA1578A3965384AB89F89C5741DC814882A52D5E5E3
3,679,689 UART: [art] SIG.R = 84B542E38C88A593FE1FAA3440AB0ED4F47C4F65D1D94ABA7CDC55C04BF42746A153D150EA900C54D9A517434330E0D9
3,686,463 UART: [art] SIG.S = A712739B184D4DB414A0B19321E17598FE64C5F4F9EB409DB7F96AABC46BE54C7FD2887CD3ECF741593ABF0A339FEBF1
3,709,941 UART: Caliptra RT
3,710,194 UART: [state] CFI Enabled
3,817,699 UART: [rt] RT listening for mailbox commands...
3,818,369 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,293 UART: [rt]cmd =0x41544d4e, len=14344
4,862,107 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,615 ready_for_fw is high
1,060,615 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,176,700 >>> mbox cmd response: success
3,238,615 UART:
3,238,631 UART: Running Caliptra FMC ...
3,239,039 UART:
3,239,093 UART: [state] CFI Enabled
3,249,529 UART: [fht] FMC Alias Private Key: 7
3,357,031 UART: [art] Extend RT PCRs Done
3,357,459 UART: [art] Lock RT PCRs Done
3,358,557 UART: [art] Populate DV Done
3,366,545 UART: [fht] FMC Alias Private Key: 7
3,367,639 UART: [art] Derive CDI
3,367,919 UART: [art] Store in in slot 0x4
3,453,734 UART: [art] Derive Key Pair
3,454,094 UART: [art] Store priv key in slot 0x5
3,467,228 UART: [art] Derive Key Pair - Done
3,481,930 UART: [art] Signing Cert with AUTHO
3,482,410 UART: RITY.KEYID = 7
3,497,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,301 UART: [art] PUB.X = AC52D8018B719B414614E3A4768288138A9B3FD3BD9C3D935276A3FEE2EC18616D8EFD6A01556F37EF4E1B700FC7CF5B
3,505,072 UART: [art] PUB.Y = 2AE841C8BA9EC3FE9164760B238BBE6B606F57C6E71BBD326DE809730BF2F3C67B3EA3A850C2F63209D178A5F854D2BC
3,512,024 UART: [art] SIG.R = 2943601A60EB92B89699555F7C0A6622C3AEFA131B795FE63DBC9EC94EF38B50CFE29BDDD874880BB002D307D6A5A75B
3,518,794 UART: [art] SIG.S = 6E1F36D159CBBADBE0E9A855DA26195F8252B50FF0944869E3D6ADEAB273D8BE0BDD5DA3C58BE72017869E61422C7D42
3,542,317 UART: Caliptra RT
3,542,570 UART: [state] CFI Enabled
3,650,511 UART: [rt] RT listening for mailbox commands...
3,651,181 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,859 UART: [rt]cmd =0x41544d4e, len=14344
4,699,353 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,826 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
893,629 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,754 UART: [kat] ++
897,906 UART: [kat] sha1
902,122 UART: [kat] SHA2-256
904,062 UART: [kat] SHA2-384
906,785 UART: [kat] SHA2-512-ACC
908,686 UART: [kat] ECC-384
918,651 UART: [kat] HMAC-384Kdf
923,421 UART: [kat] LMS
1,171,749 UART: [kat] --
1,172,340 UART: [cold-reset] ++
1,172,706 UART: [fht] FHT @ 0x50003400
1,175,343 UART: [idev] ++
1,175,511 UART: [idev] CDI.KEYID = 6
1,175,871 UART: [idev] SUBJECT.KEYID = 7
1,176,295 UART: [idev] UDS.KEYID = 0
1,176,640 ready_for_fw is high
1,176,640 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,845 UART: [idev] Erasing UDS.KEYID = 0
1,201,646 UART: [idev] Sha1 KeyId Algorithm
1,210,226 UART: [idev] --
1,211,284 UART: [ldev] ++
1,211,452 UART: [ldev] CDI.KEYID = 6
1,211,815 UART: [ldev] SUBJECT.KEYID = 5
1,212,241 UART: [ldev] AUTHORITY.KEYID = 7
1,212,704 UART: [ldev] FE.KEYID = 1
1,217,912 UART: [ldev] Erasing FE.KEYID = 1
1,244,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,494 UART: [ldev] --
1,283,807 UART: [fwproc] Wait for Commands...
1,284,425 UART: [fwproc] Recv command 0x46574c44
1,285,153 UART: [fwproc] Recv'd Img size: 114332 bytes
3,129,893 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,562 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,866 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,323,599 >>> mbox cmd response: success
3,324,659 UART: [afmc] ++
3,324,827 UART: [afmc] CDI.KEYID = 6
3,325,189 UART: [afmc] SUBJECT.KEYID = 7
3,325,614 UART: [afmc] AUTHORITY.KEYID = 5
3,361,340 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,115 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,824 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,716 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,427 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,272 UART: [afmc] --
3,405,176 UART: [cold-reset] --
3,406,024 UART: [state] Locking Datavault
3,407,273 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,877 UART: [state] Locking ICCM
3,408,489 UART: [exit] Launching FMC @ 0x40000130
3,413,818 UART:
3,413,834 UART: Running Caliptra FMC ...
3,414,242 UART:
3,414,385 UART: [state] CFI Enabled
3,424,747 UART: [fht] FMC Alias Private Key: 7
3,532,763 UART: [art] Extend RT PCRs Done
3,533,191 UART: [art] Lock RT PCRs Done
3,534,455 UART: [art] Populate DV Done
3,542,557 UART: [fht] FMC Alias Private Key: 7
3,543,567 UART: [art] Derive CDI
3,543,847 UART: [art] Store in in slot 0x4
3,629,424 UART: [art] Derive Key Pair
3,629,784 UART: [art] Store priv key in slot 0x5
3,642,626 UART: [art] Derive Key Pair - Done
3,657,754 UART: [art] Signing Cert with AUTHO
3,658,234 UART: RITY.KEYID = 7
3,673,438 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,203 UART: [art] PUB.X = A9AF9C8FB67DBB9D8E7FC286A03010DA5C2D739953BFBEF3CAD8A86EA8D1E93D8D5C7F5772993588D23380E2B342BE44
3,680,991 UART: [art] PUB.Y = 3142FFBBA50B38AF12AAF90D2481FB672C986D4A3DBB78406F7D0684EB2062E37936A6D0AA8CEBAD892E71DCCE254FAE
3,687,954 UART: [art] SIG.R = D82287A439B4217C17F103398F17D7875A994CCB532BBABE8896039E2032486C9D14FE7F6CD76D99451453C3AEFF79A1
3,694,718 UART: [art] SIG.S = E4B696BEF96CF7EC03EF43EB7D370CFC9D60DFA98955308ADF3F72D58176EFC19E4FCF8273BC02282A967A318D45175A
3,718,684 UART: Caliptra RT
3,719,029 UART: [state] CFI Enabled
3,826,926 UART: [rt] RT listening for mailbox commands...
3,827,596 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,698 UART: [rt]cmd =0x41544d4e, len=14344
4,871,844 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,146 ready_for_fw is high
1,061,146 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,179,523 >>> mbox cmd response: success
3,241,508 UART:
3,241,524 UART: Running Caliptra FMC ...
3,241,932 UART:
3,242,075 UART: [state] CFI Enabled
3,252,621 UART: [fht] FMC Alias Private Key: 7
3,360,349 UART: [art] Extend RT PCRs Done
3,360,777 UART: [art] Lock RT PCRs Done
3,362,181 UART: [art] Populate DV Done
3,370,119 UART: [fht] FMC Alias Private Key: 7
3,371,251 UART: [art] Derive CDI
3,371,531 UART: [art] Store in in slot 0x4
3,457,042 UART: [art] Derive Key Pair
3,457,402 UART: [art] Store priv key in slot 0x5
3,470,522 UART: [art] Derive Key Pair - Done
3,485,228 UART: [art] Signing Cert with AUTHO
3,485,708 UART: RITY.KEYID = 7
3,501,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,781 UART: [art] PUB.X = 0413D3CD570A0D2BEF7A82B909CAB9E23FDC10DAC134C0B6CB3E999D9B441274B4C744599C9E97D6AC32FAA486071A04
3,508,547 UART: [art] PUB.Y = E6108708FA1B913EC521A4FB984B9547C18F73013CAFD2A11900699B0D5E8E9F54378BB41BD02C2E805D249F5C8CD67C
3,515,472 UART: [art] SIG.R = 8BC6518D0FEAFEF19EDF81E9B4FEC0CA41FC55CE98174931F51892758BEA6A8ECE28005F256A304E1C7D2B1FB03373D8
3,522,235 UART: [art] SIG.S = FE412FFAB924D7E6F890166B0EC27B7540E5E62ED2A5D7759B12F2C208F15759AED49C28FDA08E2457F832315CE859C2
3,545,766 UART: Caliptra RT
3,546,111 UART: [state] CFI Enabled
3,653,562 UART: [rt] RT listening for mailbox commands...
3,654,232 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,777,032 UART: [rt]cmd =0x41544d4e, len=14344
4,700,111 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,263 UART: [state] WD Timer not started. Device not locked for debugging
87,378 UART: [kat] SHA2-256
890,928 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,057 UART: [kat] ++
895,209 UART: [kat] sha1
899,613 UART: [kat] SHA2-256
901,553 UART: [kat] SHA2-384
904,236 UART: [kat] SHA2-512-ACC
906,137 UART: [kat] ECC-384
915,678 UART: [kat] HMAC-384Kdf
920,284 UART: [kat] LMS
1,168,596 UART: [kat] --
1,169,245 UART: [cold-reset] ++
1,169,755 UART: [fht] FHT @ 0x50003400
1,172,389 UART: [idev] ++
1,172,557 UART: [idev] CDI.KEYID = 6
1,172,918 UART: [idev] SUBJECT.KEYID = 7
1,173,343 UART: [idev] UDS.KEYID = 0
1,173,689 ready_for_fw is high
1,173,689 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,013 UART: [idev] Erasing UDS.KEYID = 0
1,199,107 UART: [idev] Sha1 KeyId Algorithm
1,207,943 UART: [idev] --
1,209,150 UART: [ldev] ++
1,209,318 UART: [ldev] CDI.KEYID = 6
1,209,682 UART: [ldev] SUBJECT.KEYID = 5
1,210,109 UART: [ldev] AUTHORITY.KEYID = 7
1,210,572 UART: [ldev] FE.KEYID = 1
1,215,806 UART: [ldev] Erasing FE.KEYID = 1
1,242,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,716 UART: [ldev] --
1,282,018 UART: [fwproc] Wait for Commands...
1,282,683 UART: [fwproc] Recv command 0x46574c44
1,283,416 UART: [fwproc] Recv'd Img size: 114332 bytes
3,119,915 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,147,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,184 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,313,056 >>> mbox cmd response: success
3,314,309 UART: [afmc] ++
3,314,477 UART: [afmc] CDI.KEYID = 6
3,314,840 UART: [afmc] SUBJECT.KEYID = 7
3,315,266 UART: [afmc] AUTHORITY.KEYID = 5
3,351,022 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,001 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,711 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,601 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,312 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,146 UART: [afmc] --
3,394,242 UART: [cold-reset] --
3,394,948 UART: [state] Locking Datavault
3,396,157 UART: [state] Locking PCR0, PCR1 and PCR31
3,396,761 UART: [state] Locking ICCM
3,397,389 UART: [exit] Launching FMC @ 0x40000130
3,402,718 UART:
3,402,734 UART: Running Caliptra FMC ...
3,403,142 UART:
3,403,196 UART: [state] CFI Enabled
3,413,416 UART: [fht] FMC Alias Private Key: 7
3,521,102 UART: [art] Extend RT PCRs Done
3,521,530 UART: [art] Lock RT PCRs Done
3,523,276 UART: [art] Populate DV Done
3,531,256 UART: [fht] FMC Alias Private Key: 7
3,532,284 UART: [art] Derive CDI
3,532,564 UART: [art] Store in in slot 0x4
3,618,507 UART: [art] Derive Key Pair
3,618,867 UART: [art] Store priv key in slot 0x5
3,631,599 UART: [art] Derive Key Pair - Done
3,646,596 UART: [art] Signing Cert with AUTHO
3,647,076 UART: RITY.KEYID = 7
3,662,384 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,149 UART: [art] PUB.X = 127E8582824F6A3720B2B409F5BBB92241C097E926A84D11E63B6C4995A31C46A54D8B2D8DAC062F3CF3083FDF3E852E
3,669,914 UART: [art] PUB.Y = F9EAF46A467A4E31C617EF8C7CB09C8D3ADA5571D9C2DB90070160F330670D26B3228067DA3E8987D43A4CC5DE21D847
3,676,863 UART: [art] SIG.R = C465F7677D3E903656EF43B047AF0FE73345A76F7957AA8F1A05821D7D183B06612AD10DAA0D75BB161C453E831AA1E8
3,683,622 UART: [art] SIG.S = 6C55B53E9F1DE2815EC22FBF7CFD45E2A4A79E45239ED6F7241868CE40FB898899B280D874B730AC6629F821893AB2E2
3,706,681 UART: Caliptra RT
3,706,934 UART: [state] CFI Enabled
3,814,252 UART: [rt] RT listening for mailbox commands...
3,814,922 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,106 UART: [rt]cmd =0x41544d4e, len=14344
4,863,376 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,930 ready_for_fw is high
1,055,930 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,175,927 >>> mbox cmd response: success
3,237,838 UART:
3,237,854 UART: Running Caliptra FMC ...
3,238,262 UART:
3,238,316 UART: [state] CFI Enabled
3,249,068 UART: [fht] FMC Alias Private Key: 7
3,357,294 UART: [art] Extend RT PCRs Done
3,357,722 UART: [art] Lock RT PCRs Done
3,358,940 UART: [art] Populate DV Done
3,367,010 UART: [fht] FMC Alias Private Key: 7
3,368,060 UART: [art] Derive CDI
3,368,340 UART: [art] Store in in slot 0x4
3,453,981 UART: [art] Derive Key Pair
3,454,341 UART: [art] Store priv key in slot 0x5
3,467,161 UART: [art] Derive Key Pair - Done
3,481,707 UART: [art] Signing Cert with AUTHO
3,482,187 UART: RITY.KEYID = 7
3,497,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,058 UART: [art] PUB.X = 1D6BFBE89FA13AA31B961B5942E67E835B716F4B472224828692E9F30A34FA741D38A9609ED9A9C79A132BFB50DECC80
3,504,833 UART: [art] PUB.Y = 7867D982262120CDAC23ABB5CDC46297E27E074F4CCFA81C276DE772D81C213D8CF0669CAF76B977CE6610778578FF8D
3,511,788 UART: [art] SIG.R = 2575A369CB1DA1FC26AD88100B07F5D0058003AF8692CBEA2DA521AEEA68C1FAC391F678B34E119B40205D83752C31F3
3,518,554 UART: [art] SIG.S = C97C889589C06DB5D436ED3CDD46EB880C2620AFBB8FECF9E696603B985107E589193CCFFAECD4F43CCF04A88D424AAC
3,541,990 UART: Caliptra RT
3,542,243 UART: [state] CFI Enabled
3,649,199 UART: [rt] RT listening for mailbox commands...
3,649,869 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,835 UART: [rt]cmd =0x41544d4e, len=14344
4,690,600 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,930 UART: [state] WD Timer not started. Device not locked for debugging
88,103 UART: [kat] SHA2-256
891,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,782 UART: [kat] ++
895,934 UART: [kat] sha1
900,128 UART: [kat] SHA2-256
902,068 UART: [kat] SHA2-384
904,901 UART: [kat] SHA2-512-ACC
906,802 UART: [kat] ECC-384
917,045 UART: [kat] HMAC-384Kdf
921,715 UART: [kat] LMS
1,170,027 UART: [kat] --
1,170,798 UART: [cold-reset] ++
1,171,364 UART: [fht] FHT @ 0x50003400
1,173,982 UART: [idev] ++
1,174,150 UART: [idev] CDI.KEYID = 6
1,174,511 UART: [idev] SUBJECT.KEYID = 7
1,174,936 UART: [idev] UDS.KEYID = 0
1,175,282 ready_for_fw is high
1,175,282 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,174 UART: [idev] Erasing UDS.KEYID = 0
1,200,308 UART: [idev] Sha1 KeyId Algorithm
1,209,324 UART: [idev] --
1,210,327 UART: [ldev] ++
1,210,495 UART: [ldev] CDI.KEYID = 6
1,210,859 UART: [ldev] SUBJECT.KEYID = 5
1,211,286 UART: [ldev] AUTHORITY.KEYID = 7
1,211,749 UART: [ldev] FE.KEYID = 1
1,216,797 UART: [ldev] Erasing FE.KEYID = 1
1,242,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,015 UART: [ldev] --
1,282,521 UART: [fwproc] Wait for Commands...
1,283,224 UART: [fwproc] Recv command 0x46574c44
1,283,957 UART: [fwproc] Recv'd Img size: 114332 bytes
3,123,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,459 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,768 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,316,664 >>> mbox cmd response: success
3,317,737 UART: [afmc] ++
3,317,905 UART: [afmc] CDI.KEYID = 6
3,318,268 UART: [afmc] SUBJECT.KEYID = 7
3,318,694 UART: [afmc] AUTHORITY.KEYID = 5
3,354,600 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,087 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,797 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,687 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,398 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,364 UART: [afmc] --
3,398,492 UART: [cold-reset] --
3,399,398 UART: [state] Locking Datavault
3,400,511 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,115 UART: [state] Locking ICCM
3,401,553 UART: [exit] Launching FMC @ 0x40000130
3,406,882 UART:
3,406,898 UART: Running Caliptra FMC ...
3,407,306 UART:
3,407,449 UART: [state] CFI Enabled
3,417,685 UART: [fht] FMC Alias Private Key: 7
3,526,227 UART: [art] Extend RT PCRs Done
3,526,655 UART: [art] Lock RT PCRs Done
3,528,415 UART: [art] Populate DV Done
3,536,939 UART: [fht] FMC Alias Private Key: 7
3,537,965 UART: [art] Derive CDI
3,538,245 UART: [art] Store in in slot 0x4
3,624,034 UART: [art] Derive Key Pair
3,624,394 UART: [art] Store priv key in slot 0x5
3,638,246 UART: [art] Derive Key Pair - Done
3,653,330 UART: [art] Signing Cert with AUTHO
3,653,810 UART: RITY.KEYID = 7
3,669,286 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,051 UART: [art] PUB.X = 0075359585C5B465098B5E5B28258591A747EF88E884C99448B7EF703F3703C8E5768BF4C46DFB94D26B84A0F55D612E
3,676,787 UART: [art] PUB.Y = 8003669816CC75B2E3959CE92B0E9B603B022C781FD249FEC4C74F9121B82DEA678822CA613470E69B7AAE7B833AF298
3,683,730 UART: [art] SIG.R = DD164C9AAE6F1755B991D5F2A7E55AF06BDB0879163508C35DEDB7EB13DC6C545B2B5A663D2B86FE4752E17E3A4EB587
3,690,510 UART: [art] SIG.S = D931FD7A6E60C74628C50C425C2FF9CB9C0D4D83BCDC02A653E0244B5E405A79E555EC0C70CC67C3039D387FC31849D8
3,714,444 UART: Caliptra RT
3,714,789 UART: [state] CFI Enabled
3,823,184 UART: [rt] RT listening for mailbox commands...
3,823,854 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,054 UART: [rt]cmd =0x41544d4e, len=14344
4,864,705 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,547 ready_for_fw is high
1,055,547 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,157,613 >>> mbox cmd response: success
3,219,638 UART:
3,219,654 UART: Running Caliptra FMC ...
3,220,062 UART:
3,220,205 UART: [state] CFI Enabled
3,231,289 UART: [fht] FMC Alias Private Key: 7
3,339,769 UART: [art] Extend RT PCRs Done
3,340,197 UART: [art] Lock RT PCRs Done
3,341,635 UART: [art] Populate DV Done
3,349,707 UART: [fht] FMC Alias Private Key: 7
3,350,811 UART: [art] Derive CDI
3,351,091 UART: [art] Store in in slot 0x4
3,436,762 UART: [art] Derive Key Pair
3,437,122 UART: [art] Store priv key in slot 0x5
3,449,618 UART: [art] Derive Key Pair - Done
3,464,444 UART: [art] Signing Cert with AUTHO
3,464,924 UART: RITY.KEYID = 7
3,480,150 UART: [art] Erasing AUTHORITY.KEYID = 7
3,480,915 UART: [art] PUB.X = E2EE969A89FA0D586DFCD5FD5DC36C118F50A46230763E6A8CB106F40B03E9B037BDB68E5820481A29CF0C8192F17EDA
3,487,684 UART: [art] PUB.Y = 2FD83E6F8AEAEEBD706DA2648BA9E73B4C7D323A2BD1AEEE16621B5841B202444EFC90DDD5D819E892FBDDDFB3ACC509
3,494,658 UART: [art] SIG.R = 6B87633F215D1245B0CB0ACA23B6BABF2EF65661D28AB76867E67711FA278FFDDB3649999E6B459393CFB3351027333D
3,501,429 UART: [art] SIG.S = 23CDF67B342A3E4B44A37881A3CFFC6EA2BE0F2D9B0D9B35F439E42B14F2B8B58912B1B97F08D4988338F59E7BDE65C6
3,525,505 UART: Caliptra RT
3,525,850 UART: [state] CFI Enabled
3,632,869 UART: [rt] RT listening for mailbox commands...
3,633,539 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,699 UART: [rt]cmd =0x41544d4e, len=14344
4,676,831 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,516 UART: [state] LifecycleState = Unprovisioned
86,171 UART: [state] DebugLocked = No
86,751 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,283 UART: [kat] SHA2-256
882,214 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,329 UART: [kat] ++
886,481 UART: [kat] sha1
890,609 UART: [kat] SHA2-256
892,547 UART: [kat] SHA2-384
895,406 UART: [kat] SHA2-512-ACC
897,307 UART: [kat] ECC-384
902,686 UART: [kat] HMAC-384Kdf
907,382 UART: [kat] LMS
1,475,578 UART: [kat] --
1,476,437 UART: [cold-reset] ++
1,477,001 UART: [fht] Storing FHT @ 0x50003400
1,479,794 UART: [idev] ++
1,479,962 UART: [idev] CDI.KEYID = 6
1,480,322 UART: [idev] SUBJECT.KEYID = 7
1,480,746 UART: [idev] UDS.KEYID = 0
1,481,091 ready_for_fw is high
1,481,091 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,658 UART: [idev] Erasing UDS.KEYID = 0
1,505,312 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,996 UART: [idev] --
1,514,919 UART: [ldev] ++
1,515,087 UART: [ldev] CDI.KEYID = 6
1,515,450 UART: [ldev] SUBJECT.KEYID = 5
1,515,876 UART: [ldev] AUTHORITY.KEYID = 7
1,516,339 UART: [ldev] FE.KEYID = 1
1,521,729 UART: [ldev] Erasing FE.KEYID = 1
1,546,976 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,054 UART: [ldev] --
1,586,319 UART: [fwproc] Waiting for Commands...
1,587,012 UART: [fwproc] Received command 0x46574c44
1,587,803 UART: [fwproc] Received Image of size 114332 bytes
5,234,691 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,262,455 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,291,807 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,427,592 >>> mbox cmd response: success
5,428,682 UART: [afmc] ++
5,428,850 UART: [afmc] CDI.KEYID = 6
5,429,212 UART: [afmc] SUBJECT.KEYID = 7
5,429,637 UART: [afmc] AUTHORITY.KEYID = 5
5,463,723 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,480,129 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,480,909 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,486,618 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,492,510 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,498,211 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,506,045 UART: [afmc] --
5,507,051 UART: [cold-reset] --
5,508,095 UART: [state] Locking Datavault
5,509,040 UART: [state] Locking PCR0, PCR1 and PCR31
5,509,644 UART: [state] Locking ICCM
5,510,228 UART: [exit] Launching FMC @ 0x40000130
5,515,557 UART:
5,515,573 UART: Running Caliptra FMC ...
5,515,981 UART:
5,516,035 UART: [state] CFI Enabled
5,526,785 UART: [fht] FMC Alias Private Key: 7
5,634,963 UART: [art] Extend RT PCRs Done
5,635,391 UART: [art] Lock RT PCRs Done
5,636,867 UART: [art] Populate DV Done
5,644,995 UART: [fht] FMC Alias Private Key: 7
5,646,049 UART: [art] Derive CDI
5,646,329 UART: [art] Store in in slot 0x4
5,732,150 UART: [art] Derive Key Pair
5,732,510 UART: [art] Store priv key in slot 0x5
5,745,924 UART: [art] Derive Key Pair - Done
5,760,960 UART: [art] Signing Cert with AUTHO
5,761,440 UART: RITY.KEYID = 7
5,776,888 UART: [art] Erasing AUTHORITY.KEYID = 7
5,777,653 UART: [art] PUB.X = 860A9D2A39513EE8CED13E95B77090024D2B5F4F0771CE2EF600618308FF28C4662DC715F09F26138067DFD052C365E3
5,784,387 UART: [art] PUB.Y = 0ABC1DCF5E4680D2D8A9B0AF492F32D3D03588ABE9891FF55B215E7425BE59408046EAE3B823C53CF3178E34AE837111
5,791,342 UART: [art] SIG.R = 66C68F13118E6DD59092CBB7FA37ED739FB5FBFCA4F349F82E2586A78F581829131A33AF915314E06B62471C73E2F84B
5,798,116 UART: [art] SIG.S = BCF4B08CB2EAC5CE5BACD463B98DCA42772B09F4AA25BDA3A1217A2F2A54F931C3BAEE8B0841ED972FC04A74EC26CF69
5,822,249 UART: Caliptra RT
5,822,502 UART: [state] CFI Enabled
5,929,935 UART: [rt] RT listening for mailbox commands...
5,930,605 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,053,469 UART: [rt]cmd =0x41544d4e, len=14344
6,976,459 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,639 ready_for_fw is high
1,362,639 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,314,905 >>> mbox cmd response: success
5,376,564 UART:
5,376,580 UART: Running Caliptra FMC ...
5,376,988 UART:
5,377,042 UART: [state] CFI Enabled
5,387,784 UART: [fht] FMC Alias Private Key: 7
5,495,930 UART: [art] Extend RT PCRs Done
5,496,358 UART: [art] Lock RT PCRs Done
5,497,876 UART: [art] Populate DV Done
5,505,948 UART: [fht] FMC Alias Private Key: 7
5,507,016 UART: [art] Derive CDI
5,507,296 UART: [art] Store in in slot 0x4
5,592,961 UART: [art] Derive Key Pair
5,593,321 UART: [art] Store priv key in slot 0x5
5,606,151 UART: [art] Derive Key Pair - Done
5,621,125 UART: [art] Signing Cert with AUTHO
5,621,605 UART: RITY.KEYID = 7
5,636,483 UART: [art] Erasing AUTHORITY.KEYID = 7
5,637,248 UART: [art] PUB.X = D98100BA32264FA24B4AB1FFB2E69E2637931181A00C7ADDDFAA4FA34219B7BA723AB94862080527069470DBFBEE7560
5,643,992 UART: [art] PUB.Y = 58BD8EFBBC10D2F1BB1F120CD0F2A03CCD0C261416AB5F25A76E3EC104AAA756236B994B393F8233315BD38ED2F3CCF3
5,650,953 UART: [art] SIG.R = F06C016D119D5E05683261F1DC21BC55A9F7F775C2474588BBE146963C0B39BBF1843928B628571F8771044A32D89A9A
5,657,705 UART: [art] SIG.S = A60DCAA14A087C715CE2BF9B0EC73D0D989E3500DB7BCAEFB7B8AE0F7F9CBB0CA424D0FE8CBF169B404576B8A9080615
5,682,018 UART: Caliptra RT
5,682,271 UART: [state] CFI Enabled
5,789,473 UART: [rt] RT listening for mailbox commands...
5,790,143 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,912,841 UART: [rt]cmd =0x41544d4e, len=14344
6,833,114 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,756 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,398 UART: [kat] SHA2-256
882,329 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,444 UART: [kat] ++
886,596 UART: [kat] sha1
890,700 UART: [kat] SHA2-256
892,638 UART: [kat] SHA2-384
895,459 UART: [kat] SHA2-512-ACC
897,360 UART: [kat] ECC-384
903,123 UART: [kat] HMAC-384Kdf
907,765 UART: [kat] LMS
1,475,961 UART: [kat] --
1,476,664 UART: [cold-reset] ++
1,477,210 UART: [fht] Storing FHT @ 0x50003400
1,479,925 UART: [idev] ++
1,480,093 UART: [idev] CDI.KEYID = 6
1,480,453 UART: [idev] SUBJECT.KEYID = 7
1,480,877 UART: [idev] UDS.KEYID = 0
1,481,222 ready_for_fw is high
1,481,222 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,015 UART: [idev] Erasing UDS.KEYID = 0
1,506,369 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,959 UART: [idev] --
1,515,988 UART: [ldev] ++
1,516,156 UART: [ldev] CDI.KEYID = 6
1,516,519 UART: [ldev] SUBJECT.KEYID = 5
1,516,945 UART: [ldev] AUTHORITY.KEYID = 7
1,517,408 UART: [ldev] FE.KEYID = 1
1,522,502 UART: [ldev] Erasing FE.KEYID = 1
1,547,777 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,969 UART: [ldev] --
1,587,484 UART: [fwproc] Waiting for Commands...
1,588,321 UART: [fwproc] Received command 0x46574c44
1,589,112 UART: [fwproc] Received Image of size 114332 bytes
5,235,390 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,262,762 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,292,114 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,427,861 >>> mbox cmd response: success
5,428,939 UART: [afmc] ++
5,429,107 UART: [afmc] CDI.KEYID = 6
5,429,469 UART: [afmc] SUBJECT.KEYID = 7
5,429,894 UART: [afmc] AUTHORITY.KEYID = 5
5,465,532 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,481,906 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,482,686 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,488,395 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,494,287 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,499,988 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,507,884 UART: [afmc] --
5,508,900 UART: [cold-reset] --
5,509,802 UART: [state] Locking Datavault
5,510,881 UART: [state] Locking PCR0, PCR1 and PCR31
5,511,485 UART: [state] Locking ICCM
5,512,107 UART: [exit] Launching FMC @ 0x40000130
5,517,436 UART:
5,517,452 UART: Running Caliptra FMC ...
5,517,860 UART:
5,518,003 UART: [state] CFI Enabled
5,529,001 UART: [fht] FMC Alias Private Key: 7
5,637,161 UART: [art] Extend RT PCRs Done
5,637,589 UART: [art] Lock RT PCRs Done
5,639,261 UART: [art] Populate DV Done
5,647,581 UART: [fht] FMC Alias Private Key: 7
5,648,589 UART: [art] Derive CDI
5,648,869 UART: [art] Store in in slot 0x4
5,734,126 UART: [art] Derive Key Pair
5,734,486 UART: [art] Store priv key in slot 0x5
5,747,722 UART: [art] Derive Key Pair - Done
5,762,406 UART: [art] Signing Cert with AUTHO
5,762,886 UART: RITY.KEYID = 7
5,778,836 UART: [art] Erasing AUTHORITY.KEYID = 7
5,779,601 UART: [art] PUB.X = 9B0A2035BE2974D3443248C410344D9696B5B583EFCEC48D3291AF75488D02EE2BDAEBAC0D9E8A008AE571B0ED6BE3A3
5,786,354 UART: [art] PUB.Y = A24131E204763B1375662D64D2B03340FBF8C4F9AC0C8B698CDBBB561B8513D4B049D940C60A04BAE44DCDD16ECFCDDB
5,793,310 UART: [art] SIG.R = A39549183F6BB3FCC656D3947312B0C554CC156813EFB42BA451ED3D714BE100C45F77E56EC00CD344E71F1FCB48AD20
5,800,065 UART: [art] SIG.S = 063EA7B14571E4659D7389AEB48AA9A9F9F7D6C380AD5FC98C44D3C4A07A62392904CFCAE710EC7DD91EAE6FF4332393
5,823,682 UART: Caliptra RT
5,824,027 UART: [state] CFI Enabled
5,932,920 UART: [rt] RT listening for mailbox commands...
5,933,590 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,056,814 UART: [rt]cmd =0x41544d4e, len=14344
6,974,456 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,080 ready_for_fw is high
1,363,080 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,976,275 >>> mbox cmd response: success
5,038,080 UART:
5,038,096 UART: Running Caliptra FMC ...
5,038,504 UART:
5,038,647 UART: [state] CFI Enabled
5,049,195 UART: [fht] FMC Alias Private Key: 7
5,157,511 UART: [art] Extend RT PCRs Done
5,157,939 UART: [art] Lock RT PCRs Done
5,159,277 UART: [art] Populate DV Done
5,167,449 UART: [fht] FMC Alias Private Key: 7
5,168,391 UART: [art] Derive CDI
5,168,671 UART: [art] Store in in slot 0x4
5,254,478 UART: [art] Derive Key Pair
5,254,838 UART: [art] Store priv key in slot 0x5
5,268,228 UART: [art] Derive Key Pair - Done
5,283,094 UART: [art] Signing Cert with AUTHO
5,283,574 UART: RITY.KEYID = 7
5,298,702 UART: [art] Erasing AUTHORITY.KEYID = 7
5,299,467 UART: [art] PUB.X = 9D1AC0B5A82B5856658BC1066C5F6C3A7726939850FB6F4CB6A64ECC4C5F0E1A685740615343EE67E022767623A7E812
5,306,229 UART: [art] PUB.Y = B14781F55E9F03063B3B84D57FBF59D570046A2E2BA580CE6B79E778A6FEEF0BAA7DDC0866A0659AF19FE2A59D1A387B
5,313,180 UART: [art] SIG.R = D0CE564A8C505CA9632C5CF46C04F39AAD951D458F00811B75A39ACF3A2291513B49F20ED6142BDC31DEEAA2FA501AD2
5,319,938 UART: [art] SIG.S = 118AD39446ADC69988A4A3F8C9412366405B84BCF9023885F5B3312CF6754B64627E980DBDD6CA6C09A6BCB3687CADCF
5,343,386 UART: Caliptra RT
5,343,731 UART: [state] CFI Enabled
5,452,478 UART: [rt] RT listening for mailbox commands...
5,453,148 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,576,082 UART: [rt]cmd =0x41544d4e, len=14344
6,498,902 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,417 UART: [state] WD Timer not started. Device not locked for debugging
87,666 UART: [kat] SHA2-256
893,316 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,441 UART: [kat] ++
897,593 UART: [kat] sha1
901,937 UART: [kat] SHA2-256
903,877 UART: [kat] SHA2-384
906,560 UART: [kat] SHA2-512-ACC
908,461 UART: [kat] ECC-384
917,992 UART: [kat] HMAC-384Kdf
922,576 UART: [kat] LMS
1,170,904 UART: [kat] --
1,171,667 UART: [cold-reset] ++
1,172,175 UART: [fht] FHT @ 0x50003400
1,174,630 UART: [idev] ++
1,174,798 UART: [idev] CDI.KEYID = 6
1,175,158 UART: [idev] SUBJECT.KEYID = 7
1,175,582 UART: [idev] UDS.KEYID = 0
1,175,927 ready_for_fw is high
1,175,927 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,688 UART: [idev] Erasing UDS.KEYID = 0
1,200,435 UART: [idev] Sha1 KeyId Algorithm
1,208,745 UART: [idev] --
1,209,839 UART: [ldev] ++
1,210,007 UART: [ldev] CDI.KEYID = 6
1,210,370 UART: [ldev] SUBJECT.KEYID = 5
1,210,796 UART: [ldev] AUTHORITY.KEYID = 7
1,211,259 UART: [ldev] FE.KEYID = 1
1,216,345 UART: [ldev] Erasing FE.KEYID = 1
1,243,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,937 UART: [ldev] --
1,282,232 UART: [fwproc] Wait for Commands...
1,282,982 UART: [fwproc] Recv command 0x46574c44
1,283,710 UART: [fwproc] Recv'd Img size: 114332 bytes
3,136,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,164,152 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,193,456 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,329,269 >>> mbox cmd response: success
3,330,421 UART: [afmc] ++
3,330,589 UART: [afmc] CDI.KEYID = 6
3,330,951 UART: [afmc] SUBJECT.KEYID = 7
3,331,376 UART: [afmc] AUTHORITY.KEYID = 5
3,367,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,383,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,384,437 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,390,146 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,396,038 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,401,749 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,409,706 UART: [afmc] --
3,410,776 UART: [cold-reset] --
3,411,452 UART: [state] Locking Datavault
3,412,755 UART: [state] Locking PCR0, PCR1 and PCR31
3,413,359 UART: [state] Locking ICCM
3,413,807 UART: [exit] Launching FMC @ 0x40000130
3,419,136 UART:
3,419,152 UART: Running Caliptra FMC ...
3,419,560 UART:
3,419,614 UART: [state] CFI Enabled
3,429,858 UART: [fht] FMC Alias Private Key: 7
3,537,856 UART: [art] Extend RT PCRs Done
3,538,284 UART: [art] Lock RT PCRs Done
3,539,520 UART: [art] Populate DV Done
3,547,686 UART: [fht] FMC Alias Private Key: 7
3,548,620 UART: [art] Derive CDI
3,548,900 UART: [art] Store in in slot 0x4
3,634,487 UART: [art] Derive Key Pair
3,634,847 UART: [art] Store priv key in slot 0x5
3,648,241 UART: [art] Derive Key Pair - Done
3,662,782 UART: [art] Signing Cert with AUTHO
3,663,262 UART: RITY.KEYID = 7
3,678,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,678,973 UART: [art] PUB.X = FCCE29855C8AF8F37BACBA1E18D83DC68F6A32FCC1A467ED2A9423BB859430E6D60992DAC47900881196022292E5D761
3,685,723 UART: [art] PUB.Y = 5D0148700921F78C2D1CDC137F5BCACC17BFB087FBB5818D40830034262A15277AD31732521C8557EC7A33FF16648954
3,692,641 UART: [art] SIG.R = 94CDABFDE554CB5265C7EA2263D4A0D27A2911556182DA85FFD5661A3DE67448DFCE0F42CA9928DC17D5A447602F49E4
3,699,420 UART: [art] SIG.S = 0CBD2B6C5B724E2870B22B9F7CC121756DEACCF867C0CF5B828D6333B559A35C665BC52EFDBB37516722D7668E0C1052
3,722,965 UART: Caliptra RT
3,723,218 UART: [state] CFI Enabled
3,830,988 UART: [rt] RT listening for mailbox commands...
3,831,658 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,954,784 UART: [rt]cmd =0x41544d4e, len=14344
4,880,167 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,391 ready_for_fw is high
1,059,391 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,178,814 >>> mbox cmd response: success
3,241,553 UART:
3,241,569 UART: Running Caliptra FMC ...
3,241,977 UART:
3,242,031 UART: [state] CFI Enabled
3,252,717 UART: [fht] FMC Alias Private Key: 7
3,360,689 UART: [art] Extend RT PCRs Done
3,361,117 UART: [art] Lock RT PCRs Done
3,362,799 UART: [art] Populate DV Done
3,370,993 UART: [fht] FMC Alias Private Key: 7
3,372,033 UART: [art] Derive CDI
3,372,313 UART: [art] Store in in slot 0x4
3,457,780 UART: [art] Derive Key Pair
3,458,140 UART: [art] Store priv key in slot 0x5
3,470,948 UART: [art] Derive Key Pair - Done
3,486,086 UART: [art] Signing Cert with AUTHO
3,486,566 UART: RITY.KEYID = 7
3,502,340 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,105 UART: [art] PUB.X = EDCD640755E66863601CAAC8CBEEBDBD3CCC5B7F12F64421088318E8AFBC9D24695EE7700A9117D4DA0B14D60E8FC335
3,509,878 UART: [art] PUB.Y = 139218B2C7C22EB77F59C68CE2711BBF414882AC37207CEFDD13047F32D6265DE5E6276DD4B201C1FC91FC8895D420F8
3,516,828 UART: [art] SIG.R = 72C58A84ADE9A15164FF512313D1BB662243F12239050A18BD42B6AEBF6CB06B1AC47091B5E90E7A3A7BFF612D81B1DB
3,523,601 UART: [art] SIG.S = 8D32925551BA7FB6864D7B1ADE88D709F504381D6326F8040E5E4ADE36CFE05DA35104B771A4DE01319447266588A865
3,547,088 UART: Caliptra RT
3,547,341 UART: [state] CFI Enabled
3,653,805 UART: [rt] RT listening for mailbox commands...
3,654,475 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,777,681 UART: [rt]cmd =0x41544d4e, len=14344
4,710,081 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
893,677 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,802 UART: [kat] ++
897,954 UART: [kat] sha1
902,288 UART: [kat] SHA2-256
904,228 UART: [kat] SHA2-384
907,011 UART: [kat] SHA2-512-ACC
908,912 UART: [kat] ECC-384
918,523 UART: [kat] HMAC-384Kdf
923,047 UART: [kat] LMS
1,171,375 UART: [kat] --
1,172,144 UART: [cold-reset] ++
1,172,628 UART: [fht] FHT @ 0x50003400
1,175,171 UART: [idev] ++
1,175,339 UART: [idev] CDI.KEYID = 6
1,175,699 UART: [idev] SUBJECT.KEYID = 7
1,176,123 UART: [idev] UDS.KEYID = 0
1,176,468 ready_for_fw is high
1,176,468 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,107 UART: [idev] Erasing UDS.KEYID = 0
1,201,654 UART: [idev] Sha1 KeyId Algorithm
1,210,274 UART: [idev] --
1,211,182 UART: [ldev] ++
1,211,350 UART: [ldev] CDI.KEYID = 6
1,211,713 UART: [ldev] SUBJECT.KEYID = 5
1,212,139 UART: [ldev] AUTHORITY.KEYID = 7
1,212,602 UART: [ldev] FE.KEYID = 1
1,217,784 UART: [ldev] Erasing FE.KEYID = 1
1,244,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,364 UART: [ldev] --
1,284,819 UART: [fwproc] Wait for Commands...
1,285,575 UART: [fwproc] Recv command 0x46574c44
1,286,303 UART: [fwproc] Recv'd Img size: 114332 bytes
3,118,456 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,813 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,117 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,311,914 >>> mbox cmd response: success
3,313,044 UART: [afmc] ++
3,313,212 UART: [afmc] CDI.KEYID = 6
3,313,574 UART: [afmc] SUBJECT.KEYID = 7
3,313,999 UART: [afmc] AUTHORITY.KEYID = 5
3,348,959 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,322 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,070 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,779 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,671 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,382 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,069 UART: [afmc] --
3,392,141 UART: [cold-reset] --
3,392,721 UART: [state] Locking Datavault
3,393,706 UART: [state] Locking PCR0, PCR1 and PCR31
3,394,310 UART: [state] Locking ICCM
3,394,834 UART: [exit] Launching FMC @ 0x40000130
3,400,163 UART:
3,400,179 UART: Running Caliptra FMC ...
3,400,587 UART:
3,400,730 UART: [state] CFI Enabled
3,411,508 UART: [fht] FMC Alias Private Key: 7
3,519,582 UART: [art] Extend RT PCRs Done
3,520,010 UART: [art] Lock RT PCRs Done
3,521,550 UART: [art] Populate DV Done
3,529,640 UART: [fht] FMC Alias Private Key: 7
3,530,630 UART: [art] Derive CDI
3,530,910 UART: [art] Store in in slot 0x4
3,616,065 UART: [art] Derive Key Pair
3,616,425 UART: [art] Store priv key in slot 0x5
3,630,101 UART: [art] Derive Key Pair - Done
3,645,048 UART: [art] Signing Cert with AUTHO
3,645,528 UART: RITY.KEYID = 7
3,661,128 UART: [art] Erasing AUTHORITY.KEYID = 7
3,661,893 UART: [art] PUB.X = AD0CA147EFB895E21EB8FC32CDC9CAB4EA8C2B5B96EBEB4A0764614D4C54FA26DAD5251B00269D2E1CE7C5C456A83252
3,668,659 UART: [art] PUB.Y = 063C3FB3BA8C5AFC36D72A6FC71B1C17B828C5452A5FC6C090BBD39B5755E3D74A08652F688F76A076D6BB5242CB2AAD
3,675,619 UART: [art] SIG.R = 80FF0D4B580ECCB78BA4C3D09E7E59C9CC15A90560630F390A41006AD2090C6B8CA4D88AD0ECA0E5C82791AE8E0C09A4
3,682,356 UART: [art] SIG.S = 4082CF1D95AFB003912F7D3A9CD397A595B7C0C34F2F344D1DB84CCBC4E424ECE2C6C73C7A849FB0603ADF63289BDDAE
3,706,208 UART: Caliptra RT
3,706,553 UART: [state] CFI Enabled
3,814,365 UART: [rt] RT listening for mailbox commands...
3,815,035 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,093 UART: [rt]cmd =0x41544d4e, len=14344
4,865,929 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,776 ready_for_fw is high
1,060,776 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,163,092 >>> mbox cmd response: success
3,224,727 UART:
3,224,743 UART: Running Caliptra FMC ...
3,225,151 UART:
3,225,294 UART: [state] CFI Enabled
3,236,084 UART: [fht] FMC Alias Private Key: 7
3,343,628 UART: [art] Extend RT PCRs Done
3,344,056 UART: [art] Lock RT PCRs Done
3,345,318 UART: [art] Populate DV Done
3,353,582 UART: [fht] FMC Alias Private Key: 7
3,354,698 UART: [art] Derive CDI
3,354,978 UART: [art] Store in in slot 0x4
3,440,637 UART: [art] Derive Key Pair
3,440,997 UART: [art] Store priv key in slot 0x5
3,454,039 UART: [art] Derive Key Pair - Done
3,468,758 UART: [art] Signing Cert with AUTHO
3,469,238 UART: RITY.KEYID = 7
3,484,466 UART: [art] Erasing AUTHORITY.KEYID = 7
3,485,231 UART: [art] PUB.X = 5EE03B27AF8BC40F7139E5FA4E213F51520B63B4F7D80F3D594B3177B689DAB783103D0DC69EF9BE2BDC2712AAA84146
3,492,001 UART: [art] PUB.Y = 4DB5B6E3EE3096B547058D6C4D224558B0D073E8C34202801F3A4E8F158801BDDE4531D978176A2A3B6AA3C8B9C13A97
3,498,944 UART: [art] SIG.R = 011EAC6A9CA6E7F958B174003D54DCDDD22CB5018BE42AE5145301632CBA9721062A0045DCB9BF3FC077D98F765DA055
3,505,668 UART: [art] SIG.S = 867F8CE4F05DA70294B08494CE5353DE2C710934236B565D85FE962BCE82990806148B1D70A33EC9C7C3E65F96222CB5
3,529,649 UART: Caliptra RT
3,529,994 UART: [state] CFI Enabled
3,638,124 UART: [rt] RT listening for mailbox commands...
3,638,794 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,678 UART: [rt]cmd =0x41544d4e, len=14344
4,664,494 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,856 UART: [state] LifecycleState = Unprovisioned
85,511 UART: [state] DebugLocked = No
85,999 UART: [state] WD Timer not started. Device not locked for debugging
87,354 UART: [kat] SHA2-256
890,904 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,033 UART: [kat] ++
895,185 UART: [kat] sha1
899,339 UART: [kat] SHA2-256
901,279 UART: [kat] SHA2-384
903,950 UART: [kat] SHA2-512-ACC
905,851 UART: [kat] ECC-384
915,532 UART: [kat] HMAC-384Kdf
920,062 UART: [kat] LMS
1,168,374 UART: [kat] --
1,169,297 UART: [cold-reset] ++
1,169,645 UART: [fht] FHT @ 0x50003400
1,172,109 UART: [idev] ++
1,172,277 UART: [idev] CDI.KEYID = 6
1,172,638 UART: [idev] SUBJECT.KEYID = 7
1,173,063 UART: [idev] UDS.KEYID = 0
1,173,409 ready_for_fw is high
1,173,409 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,285 UART: [idev] Erasing UDS.KEYID = 0
1,197,709 UART: [idev] Sha1 KeyId Algorithm
1,206,593 UART: [idev] --
1,207,828 UART: [ldev] ++
1,207,996 UART: [ldev] CDI.KEYID = 6
1,208,360 UART: [ldev] SUBJECT.KEYID = 5
1,208,787 UART: [ldev] AUTHORITY.KEYID = 7
1,209,250 UART: [ldev] FE.KEYID = 1
1,214,522 UART: [ldev] Erasing FE.KEYID = 1
1,240,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,526 UART: [ldev] --
1,279,954 UART: [fwproc] Wait for Commands...
1,280,557 UART: [fwproc] Recv command 0x46574c44
1,281,290 UART: [fwproc] Recv'd Img size: 114332 bytes
3,125,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,332 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,641 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,317,433 >>> mbox cmd response: success
3,318,630 UART: [afmc] ++
3,318,798 UART: [afmc] CDI.KEYID = 6
3,319,161 UART: [afmc] SUBJECT.KEYID = 7
3,319,587 UART: [afmc] AUTHORITY.KEYID = 5
3,354,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,705 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,456 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,166 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,056 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,767 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,649 UART: [afmc] --
3,397,531 UART: [cold-reset] --
3,398,431 UART: [state] Locking Datavault
3,399,602 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,206 UART: [state] Locking ICCM
3,400,880 UART: [exit] Launching FMC @ 0x40000130
3,406,209 UART:
3,406,225 UART: Running Caliptra FMC ...
3,406,633 UART:
3,406,687 UART: [state] CFI Enabled
3,417,043 UART: [fht] FMC Alias Private Key: 7
3,525,673 UART: [art] Extend RT PCRs Done
3,526,101 UART: [art] Lock RT PCRs Done
3,527,633 UART: [art] Populate DV Done
3,535,765 UART: [fht] FMC Alias Private Key: 7
3,536,749 UART: [art] Derive CDI
3,537,029 UART: [art] Store in in slot 0x4
3,622,736 UART: [art] Derive Key Pair
3,623,096 UART: [art] Store priv key in slot 0x5
3,635,388 UART: [art] Derive Key Pair - Done
3,650,278 UART: [art] Signing Cert with AUTHO
3,650,758 UART: RITY.KEYID = 7
3,665,920 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,685 UART: [art] PUB.X = EAD782ED1813C782E79286ABB709BABB63A5C013563358BCB9A502EAB6E44416628B5180642577B8388D3DB3C791C8EC
3,673,453 UART: [art] PUB.Y = 05CF5AB02F404EC8D87C755E9440BF38CEE8A4DFD57403FDD4C2FDF2454E0D76D506B29ABD6B861F216EE9B24A661AFB
3,680,413 UART: [art] SIG.R = CED8F33415A3225B31D74A006546AA913F716797A11894AE3B3867368D64F73FBC3B43E4D206039332EDB17916C44163
3,687,147 UART: [art] SIG.S = FF989E5469D520863CDBBE0D45D7B995D5ECB169970387D589754F07D2C95A4222C923D8A1AB9B8D0E49FEE3591D6E97
3,711,542 UART: Caliptra RT
3,711,795 UART: [state] CFI Enabled
3,819,006 UART: [rt] RT listening for mailbox commands...
3,819,676 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,992 UART: [rt]cmd =0x41544d4e, len=14344
4,866,486 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,168 ready_for_fw is high
1,056,168 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,165,588 >>> mbox cmd response: success
3,227,489 UART:
3,227,505 UART: Running Caliptra FMC ...
3,227,913 UART:
3,227,967 UART: [state] CFI Enabled
3,238,431 UART: [fht] FMC Alias Private Key: 7
3,346,843 UART: [art] Extend RT PCRs Done
3,347,271 UART: [art] Lock RT PCRs Done
3,348,597 UART: [art] Populate DV Done
3,356,975 UART: [fht] FMC Alias Private Key: 7
3,358,113 UART: [art] Derive CDI
3,358,393 UART: [art] Store in in slot 0x4
3,444,264 UART: [art] Derive Key Pair
3,444,624 UART: [art] Store priv key in slot 0x5
3,457,692 UART: [art] Derive Key Pair - Done
3,472,191 UART: [art] Signing Cert with AUTHO
3,472,671 UART: RITY.KEYID = 7
3,487,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,254 UART: [art] PUB.X = 4E8646683117F7E9117212C566A35A29548701D05A3AC0D4F75578265979744C38318C34F0437F04B1808974A6A0FBD7
3,495,000 UART: [art] PUB.Y = E199FC62E0BA90FF0D90275C50C6856A15FECE3C7F2EE72F41885D47CE786A91D7454D1EFCEC0E387CA74F7F4784072F
3,501,955 UART: [art] SIG.R = 7F566BE6BEE5E61B289E562843B0A0F746F81CE435402E77168247CFD789E0BE03ED0E1D0B8D6436112830FB8C9B8574
3,508,718 UART: [art] SIG.S = 25543386969063260392F3F99EF09734A1FB8474D021C26EEB54CEF7D97186D699672CC25A38CAAF0A633F2AC3DAE6FC
3,532,331 UART: Caliptra RT
3,532,584 UART: [state] CFI Enabled
3,639,635 UART: [rt] RT listening for mailbox commands...
3,640,305 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,195 UART: [rt]cmd =0x41544d4e, len=14344
4,680,105 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,743 UART: [state] LifecycleState = Unprovisioned
86,398 UART: [state] DebugLocked = No
87,032 UART: [state] WD Timer not started. Device not locked for debugging
88,371 UART: [kat] SHA2-256
891,921 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,050 UART: [kat] ++
896,202 UART: [kat] sha1
900,424 UART: [kat] SHA2-256
902,364 UART: [kat] SHA2-384
905,145 UART: [kat] SHA2-512-ACC
907,046 UART: [kat] ECC-384
916,619 UART: [kat] HMAC-384Kdf
921,047 UART: [kat] LMS
1,169,359 UART: [kat] --
1,170,324 UART: [cold-reset] ++
1,170,708 UART: [fht] FHT @ 0x50003400
1,173,418 UART: [idev] ++
1,173,586 UART: [idev] CDI.KEYID = 6
1,173,947 UART: [idev] SUBJECT.KEYID = 7
1,174,372 UART: [idev] UDS.KEYID = 0
1,174,718 ready_for_fw is high
1,174,718 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,536 UART: [idev] Erasing UDS.KEYID = 0
1,199,626 UART: [idev] Sha1 KeyId Algorithm
1,208,566 UART: [idev] --
1,209,575 UART: [ldev] ++
1,209,743 UART: [ldev] CDI.KEYID = 6
1,210,107 UART: [ldev] SUBJECT.KEYID = 5
1,210,534 UART: [ldev] AUTHORITY.KEYID = 7
1,210,997 UART: [ldev] FE.KEYID = 1
1,216,277 UART: [ldev] Erasing FE.KEYID = 1
1,242,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,907 UART: [ldev] --
1,281,269 UART: [fwproc] Wait for Commands...
1,282,030 UART: [fwproc] Recv command 0x46574c44
1,282,763 UART: [fwproc] Recv'd Img size: 114332 bytes
3,112,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,140,675 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,169,984 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,305,886 >>> mbox cmd response: success
3,306,925 UART: [afmc] ++
3,307,093 UART: [afmc] CDI.KEYID = 6
3,307,456 UART: [afmc] SUBJECT.KEYID = 7
3,307,882 UART: [afmc] AUTHORITY.KEYID = 5
3,344,048 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,360,782 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,361,533 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,367,243 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,373,133 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,378,844 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,386,456 UART: [afmc] --
3,387,418 UART: [cold-reset] --
3,388,364 UART: [state] Locking Datavault
3,389,495 UART: [state] Locking PCR0, PCR1 and PCR31
3,390,099 UART: [state] Locking ICCM
3,390,643 UART: [exit] Launching FMC @ 0x40000130
3,395,972 UART:
3,395,988 UART: Running Caliptra FMC ...
3,396,396 UART:
3,396,539 UART: [state] CFI Enabled
3,407,011 UART: [fht] FMC Alias Private Key: 7
3,514,445 UART: [art] Extend RT PCRs Done
3,514,873 UART: [art] Lock RT PCRs Done
3,516,503 UART: [art] Populate DV Done
3,524,627 UART: [fht] FMC Alias Private Key: 7
3,525,725 UART: [art] Derive CDI
3,526,005 UART: [art] Store in in slot 0x4
3,611,276 UART: [art] Derive Key Pair
3,611,636 UART: [art] Store priv key in slot 0x5
3,624,558 UART: [art] Derive Key Pair - Done
3,639,451 UART: [art] Signing Cert with AUTHO
3,639,931 UART: RITY.KEYID = 7
3,655,115 UART: [art] Erasing AUTHORITY.KEYID = 7
3,655,880 UART: [art] PUB.X = 0B4DA5E79436E44972FA2B2849401183C740F25D120F115ED961FC1FAAD6BD8BBC613D7EEBF686312C36B68BCE72C433
3,662,654 UART: [art] PUB.Y = 3D57C78F91CC32264C2CD8CC5A99361B2D56D290ED51AD527E65B2425582CD1847867A8237E4DE81B10B096077E939F8
3,669,596 UART: [art] SIG.R = 93DBDE88D20DB27F77D7F6D4CB91F1AAE2623380BD45C65F79521AF611DABD49CB2C2671FBEC5D8E104DE64077A04972
3,676,379 UART: [art] SIG.S = CB62C5F33B541413F444C4B2E4B4AC30555BEFDD4A8CF467440C0D56C07F7489920DCD88DD282B976E3C8ED32954070E
3,699,685 UART: Caliptra RT
3,700,030 UART: [state] CFI Enabled
3,807,939 UART: [rt] RT listening for mailbox commands...
3,808,609 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,931,731 UART: [rt]cmd =0x41544d4e, len=14344
4,859,463 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,805 ready_for_fw is high
1,056,805 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,164,275 >>> mbox cmd response: success
3,226,978 UART:
3,226,994 UART: Running Caliptra FMC ...
3,227,402 UART:
3,227,545 UART: [state] CFI Enabled
3,238,379 UART: [fht] FMC Alias Private Key: 7
3,346,193 UART: [art] Extend RT PCRs Done
3,346,621 UART: [art] Lock RT PCRs Done
3,348,401 UART: [art] Populate DV Done
3,356,513 UART: [fht] FMC Alias Private Key: 7
3,357,647 UART: [art] Derive CDI
3,357,927 UART: [art] Store in in slot 0x4
3,443,482 UART: [art] Derive Key Pair
3,443,842 UART: [art] Store priv key in slot 0x5
3,458,008 UART: [art] Derive Key Pair - Done
3,472,795 UART: [art] Signing Cert with AUTHO
3,473,275 UART: RITY.KEYID = 7
3,488,695 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,460 UART: [art] PUB.X = 94F289D6F3405C28D782881C84C19C71B3B883E057EE3C924B9B6D0D693827F18D2ED341D1F442ADB689AC0C4E322D0C
3,496,225 UART: [art] PUB.Y = 3E9F555B8A8191174A52CBC9521689D5CAD6EEC1129B75A7D357EDF95CC2DE27C9F64282E18A0EF35515B9C112604CD6
3,503,180 UART: [art] SIG.R = 4751E3EADBB2DEE6F84BCD4C88A4DE15987FAD752763A46E5A3EC51C203F1B767D2929A8655D829D7692FFAE8C89579D
3,509,964 UART: [art] SIG.S = D7CD888EC9B922EFAA90DAB43600425DCAEDDBEAD8C3B436AE6A057F941C3E0767108C835164989302FF613317D49F18
3,533,478 UART: Caliptra RT
3,533,823 UART: [state] CFI Enabled
3,642,111 UART: [rt] RT listening for mailbox commands...
3,642,781 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,999 UART: [rt]cmd =0x41544d4e, len=14344
4,681,418 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,441 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,107 UART: [kat] SHA2-256
882,038 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,153 UART: [kat] ++
886,305 UART: [kat] sha1
890,509 UART: [kat] SHA2-256
892,447 UART: [kat] SHA2-384
895,144 UART: [kat] SHA2-512-ACC
897,045 UART: [kat] ECC-384
902,644 UART: [kat] HMAC-384Kdf
907,214 UART: [kat] LMS
1,475,410 UART: [kat] --
1,476,409 UART: [cold-reset] ++
1,476,849 UART: [fht] Storing FHT @ 0x50003400
1,479,602 UART: [idev] ++
1,479,770 UART: [idev] CDI.KEYID = 6
1,480,130 UART: [idev] SUBJECT.KEYID = 7
1,480,554 UART: [idev] UDS.KEYID = 0
1,480,899 ready_for_fw is high
1,480,899 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,736 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,420 UART: [idev] --
1,514,457 UART: [ldev] ++
1,514,625 UART: [ldev] CDI.KEYID = 6
1,514,988 UART: [ldev] SUBJECT.KEYID = 5
1,515,414 UART: [ldev] AUTHORITY.KEYID = 7
1,515,877 UART: [ldev] FE.KEYID = 1
1,521,233 UART: [ldev] Erasing FE.KEYID = 1
1,546,684 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,408 UART: [ldev] --
1,585,743 UART: [fwproc] Waiting for Commands...
1,586,612 UART: [fwproc] Received command 0x46574c44
1,587,403 UART: [fwproc] Received Image of size 114332 bytes
2,885,483 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,981 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,333 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,100 >>> mbox cmd response: success
3,079,320 UART: [afmc] ++
3,079,488 UART: [afmc] CDI.KEYID = 6
3,079,850 UART: [afmc] SUBJECT.KEYID = 7
3,080,275 UART: [afmc] AUTHORITY.KEYID = 5
3,115,264 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,050 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,830 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,558 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,443 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,133 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,042 UART: [afmc] --
3,158,076 UART: [cold-reset] --
3,158,838 UART: [state] Locking Datavault
3,160,119 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,723 UART: [state] Locking ICCM
3,161,371 UART: [exit] Launching FMC @ 0x40000130
3,166,700 UART:
3,166,716 UART: Running Caliptra FMC ...
3,167,124 UART:
3,167,178 UART: [state] CFI Enabled
3,177,675 UART: [fht] FMC Alias Private Key: 7
3,285,674 UART: [art] Extend RT PCRs Done
3,286,102 UART: [art] Lock RT PCRs Done
3,287,546 UART: [art] Populate DV Done
3,295,733 UART: [fht] FMC Alias Private Key: 7
3,296,671 UART: [art] Derive CDI
3,296,951 UART: [art] Store in in slot 0x4
3,382,452 UART: [art] Derive Key Pair
3,382,812 UART: [art] Store priv key in slot 0x5
3,395,840 UART: [art] Derive Key Pair - Done
3,410,759 UART: [art] Signing Cert with AUTHO
3,411,239 UART: RITY.KEYID = 7
3,426,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,374 UART: [art] PUB.X = 5D46BA6B1C6E571EAB35B563A58938F9E64CDDE52E853362F608D55644DCC3C06177E77A74303D935DFE482BEFDC309E
3,434,151 UART: [art] PUB.Y = 39EC90D66E05E961481D3BB4A41A46948881F5D14E4E4E6081AD2EF290B17DCEF6AF211E0DD8EC9BF4C4887B2A9ABACD
3,441,115 UART: [art] SIG.R = 505AF5C82CC7D8CF953EFFD2A39ADFF9209029C8568B4501D029DD4D0EE8DC67BDA2DF25FA966D69F58F6EB18EE5E906
3,447,898 UART: [art] SIG.S = 0D3C2530DCC0CDA68886F36A0CCCFE824AF5E5A3B76F9EFB94C392A1D3BE541D14557BBDB30765CADAED3F07A8652E94
3,471,883 UART: Caliptra RT
3,472,136 UART: [state] CFI Enabled
3,581,070 UART: [rt] RT listening for mailbox commands...
3,581,740 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,986 UART: [rt]cmd =0x41544d4e, len=14344
4,014,661 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,673 ready_for_fw is high
1,361,673 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,032 >>> mbox cmd response: success
2,987,458 UART:
2,987,474 UART: Running Caliptra FMC ...
2,987,882 UART:
2,987,936 UART: [state] CFI Enabled
2,998,671 UART: [fht] FMC Alias Private Key: 7
3,106,520 UART: [art] Extend RT PCRs Done
3,106,948 UART: [art] Lock RT PCRs Done
3,108,310 UART: [art] Populate DV Done
3,116,637 UART: [fht] FMC Alias Private Key: 7
3,117,807 UART: [art] Derive CDI
3,118,087 UART: [art] Store in in slot 0x4
3,203,640 UART: [art] Derive Key Pair
3,204,000 UART: [art] Store priv key in slot 0x5
3,217,030 UART: [art] Derive Key Pair - Done
3,232,091 UART: [art] Signing Cert with AUTHO
3,232,571 UART: RITY.KEYID = 7
3,247,779 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,544 UART: [art] PUB.X = 7284D6945854C8CE5F24D10AA0A6BCDFAD38C890005DD728456629E04B782541EC7EE15D660C6B8A1AE74601018512C8
3,255,280 UART: [art] PUB.Y = D78979B5778D3AE01FA33FB353D23CFA1706351C06379E53978BBCAB4F49A270FB320A57087BFA4B90446C16F73F753B
3,262,222 UART: [art] SIG.R = 7D7B5D4CD8A886E3A7FF640E5965F8FFEE73A93B30BDC0F68CF22D90061245BABF683A7D2C04A41C989A69A8F780242A
3,268,997 UART: [art] SIG.S = 343AC65F880395A0D9628B83826BC17CD8632DA9121A818D9D9F3E7D25D63322F9A89FB878693F47DF42BB2CD2CEC7D2
3,292,657 UART: Caliptra RT
3,292,910 UART: [state] CFI Enabled
3,401,816 UART: [rt] RT listening for mailbox commands...
3,402,486 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,692 UART: [rt]cmd =0x41544d4e, len=14344
3,835,141 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,706 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,374 UART: [kat] SHA2-256
882,305 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,420 UART: [kat] ++
886,572 UART: [kat] sha1
890,716 UART: [kat] SHA2-256
892,654 UART: [kat] SHA2-384
895,451 UART: [kat] SHA2-512-ACC
897,352 UART: [kat] ECC-384
903,305 UART: [kat] HMAC-384Kdf
908,107 UART: [kat] LMS
1,476,303 UART: [kat] --
1,477,400 UART: [cold-reset] ++
1,477,844 UART: [fht] Storing FHT @ 0x50003400
1,480,669 UART: [idev] ++
1,480,837 UART: [idev] CDI.KEYID = 6
1,481,197 UART: [idev] SUBJECT.KEYID = 7
1,481,621 UART: [idev] UDS.KEYID = 0
1,481,966 ready_for_fw is high
1,481,966 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,847 UART: [idev] Erasing UDS.KEYID = 0
1,507,077 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,571 UART: [idev] --
1,516,626 UART: [ldev] ++
1,516,794 UART: [ldev] CDI.KEYID = 6
1,517,157 UART: [ldev] SUBJECT.KEYID = 5
1,517,583 UART: [ldev] AUTHORITY.KEYID = 7
1,518,046 UART: [ldev] FE.KEYID = 1
1,523,072 UART: [ldev] Erasing FE.KEYID = 1
1,548,307 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,857 UART: [ldev] --
1,587,118 UART: [fwproc] Waiting for Commands...
1,587,859 UART: [fwproc] Received command 0x46574c44
1,588,650 UART: [fwproc] Received Image of size 114332 bytes
2,886,718 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,610 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,962 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,857 >>> mbox cmd response: success
3,080,109 UART: [afmc] ++
3,080,277 UART: [afmc] CDI.KEYID = 6
3,080,639 UART: [afmc] SUBJECT.KEYID = 7
3,081,064 UART: [afmc] AUTHORITY.KEYID = 5
3,115,821 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,661 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,441 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,169 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,054 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,744 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,573 UART: [afmc] --
3,158,473 UART: [cold-reset] --
3,159,155 UART: [state] Locking Datavault
3,160,406 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,010 UART: [state] Locking ICCM
3,161,546 UART: [exit] Launching FMC @ 0x40000130
3,166,875 UART:
3,166,891 UART: Running Caliptra FMC ...
3,167,299 UART:
3,167,442 UART: [state] CFI Enabled
3,177,881 UART: [fht] FMC Alias Private Key: 7
3,285,868 UART: [art] Extend RT PCRs Done
3,286,296 UART: [art] Lock RT PCRs Done
3,287,454 UART: [art] Populate DV Done
3,295,751 UART: [fht] FMC Alias Private Key: 7
3,296,679 UART: [art] Derive CDI
3,296,959 UART: [art] Store in in slot 0x4
3,382,086 UART: [art] Derive Key Pair
3,382,446 UART: [art] Store priv key in slot 0x5
3,396,252 UART: [art] Derive Key Pair - Done
3,411,218 UART: [art] Signing Cert with AUTHO
3,411,698 UART: RITY.KEYID = 7
3,426,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,385 UART: [art] PUB.X = 906031061ACD8F5FB0C8676C0E5EBBDBCFB5EE33A74CC5A0B4BC2DADEFE29D07E190D2E47A59DA0CCC48DE653207DE63
3,434,170 UART: [art] PUB.Y = 13F12CDA96DE2000A7A2BE288226E17B82DBF06FCEB4F32C58E3DB200E74F65712957717A69B66468947C95B67BE94B5
3,441,099 UART: [art] SIG.R = 41AB8A810A1B619EA1E0FDCF469427FF3B3F354FD8640AE9228FB818DCA01B92C521E863C11B550BC6DE2BEF7DF82FC0
3,447,880 UART: [art] SIG.S = 3CC0C5993A49EF6590A60C2DAD6BDB519BAB27300809E82EADFBDBBED46A7CDF6F6EC9EEE3B29B2D3999AE9A259EF3DB
3,471,590 UART: Caliptra RT
3,471,935 UART: [state] CFI Enabled
3,579,823 UART: [rt] RT listening for mailbox commands...
3,580,493 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,781 UART: [rt]cmd =0x41544d4e, len=14344
4,013,878 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,276 ready_for_fw is high
1,363,276 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,761 >>> mbox cmd response: success
2,991,269 UART:
2,991,285 UART: Running Caliptra FMC ...
2,991,693 UART:
2,991,836 UART: [state] CFI Enabled
3,002,303 UART: [fht] FMC Alias Private Key: 7
3,110,194 UART: [art] Extend RT PCRs Done
3,110,622 UART: [art] Lock RT PCRs Done
3,112,074 UART: [art] Populate DV Done
3,120,125 UART: [fht] FMC Alias Private Key: 7
3,121,193 UART: [art] Derive CDI
3,121,473 UART: [art] Store in in slot 0x4
3,207,516 UART: [art] Derive Key Pair
3,207,876 UART: [art] Store priv key in slot 0x5
3,221,178 UART: [art] Derive Key Pair - Done
3,236,108 UART: [art] Signing Cert with AUTHO
3,236,588 UART: RITY.KEYID = 7
3,252,352 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,117 UART: [art] PUB.X = E2B939F17C8090966571492475D5CF62BC4E1CB30931A5B3B161A3C7F87016500C2E1948A5B2844491DEC25DA1A6C43F
3,259,879 UART: [art] PUB.Y = 26D5E00BDD7B34793081CB5298B7649421A523769BEC5273C155755214B8FCC8C45AA6C5A9D48C397B7E5E9B0E12864B
3,266,823 UART: [art] SIG.R = C2B14E9B31D98F1C9CB89B80419214F05A4D6494D0F4D78281C9F6EE1452B11BF1B0C6962252311255D175A9DCA5C934
3,273,593 UART: [art] SIG.S = 5B235E62719D1FEA7623D674062043E458AABF35143C769CB5DCCC74B87BED942340F0B6AA82A8E8B3D4EA3CD4CF5CCB
3,297,563 UART: Caliptra RT
3,297,908 UART: [state] CFI Enabled
3,406,071 UART: [rt] RT listening for mailbox commands...
3,406,741 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,841 UART: [rt]cmd =0x41544d4e, len=14344
3,840,098 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,578 UART: [state] LifecycleState = Unprovisioned
86,233 UART: [state] DebugLocked = No
86,829 UART: [state] WD Timer not started. Device not locked for debugging
88,016 UART: [kat] SHA2-256
893,666 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,791 UART: [kat] ++
897,943 UART: [kat] sha1
902,143 UART: [kat] SHA2-256
904,083 UART: [kat] SHA2-384
906,804 UART: [kat] SHA2-512-ACC
908,705 UART: [kat] ECC-384
918,882 UART: [kat] HMAC-384Kdf
923,404 UART: [kat] LMS
1,171,732 UART: [kat] --
1,172,305 UART: [cold-reset] ++
1,172,651 UART: [fht] FHT @ 0x50003400
1,175,302 UART: [idev] ++
1,175,470 UART: [idev] CDI.KEYID = 6
1,175,830 UART: [idev] SUBJECT.KEYID = 7
1,176,254 UART: [idev] UDS.KEYID = 0
1,176,599 ready_for_fw is high
1,176,599 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,254 UART: [idev] Erasing UDS.KEYID = 0
1,201,363 UART: [idev] Sha1 KeyId Algorithm
1,209,663 UART: [idev] --
1,210,691 UART: [ldev] ++
1,210,859 UART: [ldev] CDI.KEYID = 6
1,211,222 UART: [ldev] SUBJECT.KEYID = 5
1,211,648 UART: [ldev] AUTHORITY.KEYID = 7
1,212,111 UART: [ldev] FE.KEYID = 1
1,217,157 UART: [ldev] Erasing FE.KEYID = 1
1,243,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,313 UART: [ldev] --
1,282,678 UART: [fwproc] Wait for Commands...
1,283,268 UART: [fwproc] Recv command 0x46574c44
1,283,996 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,086 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,390 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,115 >>> mbox cmd response: success
2,776,167 UART: [afmc] ++
2,776,335 UART: [afmc] CDI.KEYID = 6
2,776,697 UART: [afmc] SUBJECT.KEYID = 7
2,777,122 UART: [afmc] AUTHORITY.KEYID = 5
2,812,511 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,524 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,272 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,000 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,885 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,604 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,430 UART: [afmc] --
2,855,428 UART: [cold-reset] --
2,856,460 UART: [state] Locking Datavault
2,857,715 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,319 UART: [state] Locking ICCM
2,858,977 UART: [exit] Launching FMC @ 0x40000130
2,864,306 UART:
2,864,322 UART: Running Caliptra FMC ...
2,864,730 UART:
2,864,784 UART: [state] CFI Enabled
2,875,445 UART: [fht] FMC Alias Private Key: 7
2,983,988 UART: [art] Extend RT PCRs Done
2,984,416 UART: [art] Lock RT PCRs Done
2,986,004 UART: [art] Populate DV Done
2,994,151 UART: [fht] FMC Alias Private Key: 7
2,995,125 UART: [art] Derive CDI
2,995,405 UART: [art] Store in in slot 0x4
3,080,904 UART: [art] Derive Key Pair
3,081,264 UART: [art] Store priv key in slot 0x5
3,095,096 UART: [art] Derive Key Pair - Done
3,109,647 UART: [art] Signing Cert with AUTHO
3,110,127 UART: RITY.KEYID = 7
3,125,331 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,096 UART: [art] PUB.X = 313FA201113CAB112C45084BFC263EAFDB5F3DEC28D73CCC2A513017F560D4BC0B8A854AE3E3A46C847C823DDA56A98B
3,132,875 UART: [art] PUB.Y = CF977D1BDA79781FBD2294AD47CCD89BCE83FF19BCE57F7FB00B76F2EFEBA2EB95E5F7439BE53A68226F0B0819AA41E4
3,139,842 UART: [art] SIG.R = F3509E667FD22FE18D30B7DBEF495D6614424B7DCF8AC73CC2F2B5330076FA7A86CD488DF168F56A9EA6A4E512566B03
3,146,599 UART: [art] SIG.S = 5A53675BD354D05922AC2F208283724BFA5E94BFFB53C5EC923ECABBAF569C7C379EEA47848E95AC1F130C062D10C4ED
3,170,046 UART: Caliptra RT
3,170,299 UART: [state] CFI Enabled
3,277,564 UART: [rt] RT listening for mailbox commands...
3,278,234 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,350 UART: [rt]cmd =0x41544d4e, len=14344
3,710,889 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,499 ready_for_fw is high
1,060,499 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,240 >>> mbox cmd response: success
2,689,556 UART:
2,689,572 UART: Running Caliptra FMC ...
2,689,980 UART:
2,690,034 UART: [state] CFI Enabled
2,700,331 UART: [fht] FMC Alias Private Key: 7
2,808,458 UART: [art] Extend RT PCRs Done
2,808,886 UART: [art] Lock RT PCRs Done
2,810,424 UART: [art] Populate DV Done
2,818,971 UART: [fht] FMC Alias Private Key: 7
2,820,101 UART: [art] Derive CDI
2,820,381 UART: [art] Store in in slot 0x4
2,906,100 UART: [art] Derive Key Pair
2,906,460 UART: [art] Store priv key in slot 0x5
2,920,292 UART: [art] Derive Key Pair - Done
2,934,866 UART: [art] Signing Cert with AUTHO
2,935,346 UART: RITY.KEYID = 7
2,950,784 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,549 UART: [art] PUB.X = 48A99DBD18CC955D90395038C180F5FB3A1BA31EB4632E0550358E7CCBF1DECD58FC9DB07F95BB70BD5B4E6A7C5B7429
2,958,334 UART: [art] PUB.Y = 9A6E36B0C648E88B8897D8D6CB29B2451705F10E88D32CC214EED129ABFF020065A7D0E42F84E41498A4A8093AAF9FE0
2,965,258 UART: [art] SIG.R = B98E13C4FBF5E9084A296BDB22391BA6B449B467F2092C5CC7937CDD714B497D288EBA21171BB319B857DBC8371E3072
2,972,028 UART: [art] SIG.S = 17C9DE19B9620390EE29278F9CEAD2A19B0A0E3183B7A4698D4E9A7AC3AA1ECFB858BE371B380FEE66D69190C90E7B4D
2,996,252 UART: Caliptra RT
2,996,505 UART: [state] CFI Enabled
3,104,536 UART: [rt] RT listening for mailbox commands...
3,105,206 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,140 UART: [rt]cmd =0x41544d4e, len=14344
3,537,495 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,810 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
893,605 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,730 UART: [kat] ++
897,882 UART: [kat] sha1
902,204 UART: [kat] SHA2-256
904,144 UART: [kat] SHA2-384
906,671 UART: [kat] SHA2-512-ACC
908,572 UART: [kat] ECC-384
918,395 UART: [kat] HMAC-384Kdf
923,005 UART: [kat] LMS
1,171,333 UART: [kat] --
1,171,924 UART: [cold-reset] ++
1,172,282 UART: [fht] FHT @ 0x50003400
1,175,037 UART: [idev] ++
1,175,205 UART: [idev] CDI.KEYID = 6
1,175,565 UART: [idev] SUBJECT.KEYID = 7
1,175,989 UART: [idev] UDS.KEYID = 0
1,176,334 ready_for_fw is high
1,176,334 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,483 UART: [idev] Erasing UDS.KEYID = 0
1,200,620 UART: [idev] Sha1 KeyId Algorithm
1,209,112 UART: [idev] --
1,210,142 UART: [ldev] ++
1,210,310 UART: [ldev] CDI.KEYID = 6
1,210,673 UART: [ldev] SUBJECT.KEYID = 5
1,211,099 UART: [ldev] AUTHORITY.KEYID = 7
1,211,562 UART: [ldev] FE.KEYID = 1
1,216,716 UART: [ldev] Erasing FE.KEYID = 1
1,242,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,676 UART: [ldev] --
1,281,969 UART: [fwproc] Wait for Commands...
1,282,625 UART: [fwproc] Recv command 0x46574c44
1,283,353 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,289 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,593 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,468 >>> mbox cmd response: success
2,774,650 UART: [afmc] ++
2,774,818 UART: [afmc] CDI.KEYID = 6
2,775,180 UART: [afmc] SUBJECT.KEYID = 7
2,775,605 UART: [afmc] AUTHORITY.KEYID = 5
2,810,876 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,789 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,517 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,402 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,121 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,757 UART: [afmc] --
2,853,821 UART: [cold-reset] --
2,854,603 UART: [state] Locking Datavault
2,855,642 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,246 UART: [state] Locking ICCM
2,856,818 UART: [exit] Launching FMC @ 0x40000130
2,862,147 UART:
2,862,163 UART: Running Caliptra FMC ...
2,862,571 UART:
2,862,714 UART: [state] CFI Enabled
2,873,551 UART: [fht] FMC Alias Private Key: 7
2,981,754 UART: [art] Extend RT PCRs Done
2,982,182 UART: [art] Lock RT PCRs Done
2,983,700 UART: [art] Populate DV Done
2,992,017 UART: [fht] FMC Alias Private Key: 7
2,993,003 UART: [art] Derive CDI
2,993,283 UART: [art] Store in in slot 0x4
3,078,742 UART: [art] Derive Key Pair
3,079,102 UART: [art] Store priv key in slot 0x5
3,092,222 UART: [art] Derive Key Pair - Done
3,106,648 UART: [art] Signing Cert with AUTHO
3,107,128 UART: RITY.KEYID = 7
3,122,018 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,783 UART: [art] PUB.X = 7FBD050501681FC7A5C7DD85953D1B340A0B18E268DA98D182B36E4AA9DF0D600C04D74B37F9D6CF49C70506213B15C1
3,129,529 UART: [art] PUB.Y = 73381E0D1C2E2302A9191B0AB357414E2575CB45CDD3264BB452C5BB94B546616B5BAC5013C9AC43A58C02EE0E6096BE
3,136,470 UART: [art] SIG.R = B776FF858AE844D1B4DE903B030D74EB370511077B30AD620D6681E97C3DB5DF63E7C8BDEACAC16BC324AD9CADAB204F
3,143,247 UART: [art] SIG.S = 06C03A9F39E156103AD9EA007CF5752E8CCBD74BF6D1FD3D7292D058F2CF0D43513A01E10819E347A02C2D8C8145E09F
3,166,374 UART: Caliptra RT
3,166,719 UART: [state] CFI Enabled
3,275,144 UART: [rt] RT listening for mailbox commands...
3,275,814 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,752 UART: [rt]cmd =0x41544d4e, len=14344
3,709,091 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,388 ready_for_fw is high
1,060,388 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,731 >>> mbox cmd response: success
2,688,833 UART:
2,688,849 UART: Running Caliptra FMC ...
2,689,257 UART:
2,689,400 UART: [state] CFI Enabled
2,699,687 UART: [fht] FMC Alias Private Key: 7
2,808,068 UART: [art] Extend RT PCRs Done
2,808,496 UART: [art] Lock RT PCRs Done
2,809,802 UART: [art] Populate DV Done
2,818,039 UART: [fht] FMC Alias Private Key: 7
2,819,219 UART: [art] Derive CDI
2,819,499 UART: [art] Store in in slot 0x4
2,905,792 UART: [art] Derive Key Pair
2,906,152 UART: [art] Store priv key in slot 0x5
2,919,574 UART: [art] Derive Key Pair - Done
2,934,267 UART: [art] Signing Cert with AUTHO
2,934,747 UART: RITY.KEYID = 7
2,950,031 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,796 UART: [art] PUB.X = AD3CF2BFBFF41919909A0C7D792F5ABE49FDCE8DC642551A0AA980D0C337E5F28028CBE2AD46F8304665301E4CD1CFD4
2,957,580 UART: [art] PUB.Y = 7A277F90B059DC4DB67258C54C89EE4AEE20E9BA0AFF60F0E8FEEE545B2842F5D58A0229BE21B84BC8B2F2427795BF00
2,964,518 UART: [art] SIG.R = B0964CF628A6AD2E1BEBAD9F7C9DE3CB853452110C2FA03BBE1D1B8FA76EE735F14B1480105AE7147C7679543D75F1E0
2,971,299 UART: [art] SIG.S = DD4E39DBCF7AAF9EC9A1242D812CCB57C1DD15361C5FDB378BB115257DB9C005CC62AA1876974CF51511EE14C69E33D7
2,995,633 UART: Caliptra RT
2,995,978 UART: [state] CFI Enabled
3,103,684 UART: [rt] RT listening for mailbox commands...
3,104,354 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,112 UART: [rt]cmd =0x41544d4e, len=14344
3,537,229 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,137 UART: [state] WD Timer not started. Device not locked for debugging
87,344 UART: [kat] SHA2-256
890,894 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,023 UART: [kat] ++
895,175 UART: [kat] sha1
899,523 UART: [kat] SHA2-256
901,463 UART: [kat] SHA2-384
904,234 UART: [kat] SHA2-512-ACC
906,135 UART: [kat] ECC-384
915,838 UART: [kat] HMAC-384Kdf
920,530 UART: [kat] LMS
1,168,842 UART: [kat] --
1,169,567 UART: [cold-reset] ++
1,169,929 UART: [fht] FHT @ 0x50003400
1,172,655 UART: [idev] ++
1,172,823 UART: [idev] CDI.KEYID = 6
1,173,184 UART: [idev] SUBJECT.KEYID = 7
1,173,609 UART: [idev] UDS.KEYID = 0
1,173,955 ready_for_fw is high
1,173,955 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,253 UART: [idev] Erasing UDS.KEYID = 0
1,198,143 UART: [idev] Sha1 KeyId Algorithm
1,207,119 UART: [idev] --
1,208,346 UART: [ldev] ++
1,208,514 UART: [ldev] CDI.KEYID = 6
1,208,878 UART: [ldev] SUBJECT.KEYID = 5
1,209,305 UART: [ldev] AUTHORITY.KEYID = 7
1,209,768 UART: [ldev] FE.KEYID = 1
1,215,262 UART: [ldev] Erasing FE.KEYID = 1
1,241,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,232 UART: [ldev] --
1,280,584 UART: [fwproc] Wait for Commands...
1,281,259 UART: [fwproc] Recv command 0x46574c44
1,281,992 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,708 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,017 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,763 >>> mbox cmd response: success
2,772,816 UART: [afmc] ++
2,772,984 UART: [afmc] CDI.KEYID = 6
2,773,347 UART: [afmc] SUBJECT.KEYID = 7
2,773,773 UART: [afmc] AUTHORITY.KEYID = 5
2,809,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,584 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,335 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,064 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,947 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,666 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,693 UART: [afmc] --
2,852,823 UART: [cold-reset] --
2,853,611 UART: [state] Locking Datavault
2,854,838 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,442 UART: [state] Locking ICCM
2,856,020 UART: [exit] Launching FMC @ 0x40000130
2,861,349 UART:
2,861,365 UART: Running Caliptra FMC ...
2,861,773 UART:
2,861,827 UART: [state] CFI Enabled
2,872,400 UART: [fht] FMC Alias Private Key: 7
2,980,269 UART: [art] Extend RT PCRs Done
2,980,697 UART: [art] Lock RT PCRs Done
2,982,157 UART: [art] Populate DV Done
2,990,398 UART: [fht] FMC Alias Private Key: 7
2,991,430 UART: [art] Derive CDI
2,991,710 UART: [art] Store in in slot 0x4
3,076,913 UART: [art] Derive Key Pair
3,077,273 UART: [art] Store priv key in slot 0x5
3,090,683 UART: [art] Derive Key Pair - Done
3,105,202 UART: [art] Signing Cert with AUTHO
3,105,682 UART: RITY.KEYID = 7
3,120,628 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,393 UART: [art] PUB.X = 3484E507E145CDD9113B8475E51BE614197E546FF0BE02D44840CA85B59DBD6D963E56EC74FFAFA6E8A912988028FAE8
3,128,165 UART: [art] PUB.Y = 0C179A3D8486B5A503F6AD710640E4E8DA8DD51E8C6CA525D6C3B5205C37BCE9FE63418A566982A4DBE5638205477870
3,135,105 UART: [art] SIG.R = ABE1D7BD53FCE53DA44B30A94877A23B101900373D41328F0C12905678F5859DEE7C51A5765B0110BD7EEFA473CF8CCC
3,141,857 UART: [art] SIG.S = D69ECF815D604332A726B49AE5B6162EDC63D2DAABBF852D143DA7C364FC3DE5B315D8DA458033AE889DF3CB568B019D
3,165,333 UART: Caliptra RT
3,165,586 UART: [state] CFI Enabled
3,273,156 UART: [rt] RT listening for mailbox commands...
3,273,826 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,678 UART: [rt]cmd =0x41544d4e, len=14344
3,706,403 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,298 ready_for_fw is high
1,055,298 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,259 >>> mbox cmd response: success
2,681,981 UART:
2,681,997 UART: Running Caliptra FMC ...
2,682,405 UART:
2,682,459 UART: [state] CFI Enabled
2,693,122 UART: [fht] FMC Alias Private Key: 7
2,800,845 UART: [art] Extend RT PCRs Done
2,801,273 UART: [art] Lock RT PCRs Done
2,803,029 UART: [art] Populate DV Done
2,811,234 UART: [fht] FMC Alias Private Key: 7
2,812,384 UART: [art] Derive CDI
2,812,664 UART: [art] Store in in slot 0x4
2,898,459 UART: [art] Derive Key Pair
2,898,819 UART: [art] Store priv key in slot 0x5
2,911,997 UART: [art] Derive Key Pair - Done
2,926,611 UART: [art] Signing Cert with AUTHO
2,927,091 UART: RITY.KEYID = 7
2,942,151 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,916 UART: [art] PUB.X = 1ED3D338181FF5EB40B3254777A2B9222F05C147B540C5EB1559E06B7943C8A1212F3A4DAC30733C02DCEEE4610E0587
2,949,676 UART: [art] PUB.Y = AA65B64A22C53892314614BA5F780A0602FA98C272E7686F95F867E288FEE7C48E302107DF1CEDFC24257FB8C5081B21
2,956,613 UART: [art] SIG.R = 208D135109DC17B337D2693987A0462C9D6BD5595D4924481400C8A7310E39AE16EE961FD1A79049E7937B96DAC7ED31
2,963,349 UART: [art] SIG.S = 7BB7EEBB4616A021896E95478A4C8D5335C25DFA0AF61E4E8707D93BFE28E67E10825DC1EDBD1B294A6A7CA24A657065
2,986,866 UART: Caliptra RT
2,987,119 UART: [state] CFI Enabled
3,094,998 UART: [rt] RT listening for mailbox commands...
3,095,668 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,676 UART: [rt]cmd =0x41544d4e, len=14344
3,528,287 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,630 UART: [kat] ++
895,782 UART: [kat] sha1
900,030 UART: [kat] SHA2-256
901,970 UART: [kat] SHA2-384
904,827 UART: [kat] SHA2-512-ACC
906,728 UART: [kat] ECC-384
916,519 UART: [kat] HMAC-384Kdf
921,177 UART: [kat] LMS
1,169,489 UART: [kat] --
1,170,390 UART: [cold-reset] ++
1,170,798 UART: [fht] FHT @ 0x50003400
1,173,348 UART: [idev] ++
1,173,516 UART: [idev] CDI.KEYID = 6
1,173,877 UART: [idev] SUBJECT.KEYID = 7
1,174,302 UART: [idev] UDS.KEYID = 0
1,174,648 ready_for_fw is high
1,174,648 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,376 UART: [idev] Erasing UDS.KEYID = 0
1,199,410 UART: [idev] Sha1 KeyId Algorithm
1,208,168 UART: [idev] --
1,209,393 UART: [ldev] ++
1,209,561 UART: [ldev] CDI.KEYID = 6
1,209,925 UART: [ldev] SUBJECT.KEYID = 5
1,210,352 UART: [ldev] AUTHORITY.KEYID = 7
1,210,815 UART: [ldev] FE.KEYID = 1
1,216,319 UART: [ldev] Erasing FE.KEYID = 1
1,242,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,355 UART: [ldev] --
1,281,871 UART: [fwproc] Wait for Commands...
1,282,598 UART: [fwproc] Recv command 0x46574c44
1,283,331 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,253 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,562 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,358 >>> mbox cmd response: success
2,772,569 UART: [afmc] ++
2,772,737 UART: [afmc] CDI.KEYID = 6
2,773,100 UART: [afmc] SUBJECT.KEYID = 7
2,773,526 UART: [afmc] AUTHORITY.KEYID = 5
2,809,401 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,109 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,860 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,589 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,472 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,191 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,080 UART: [afmc] --
2,853,064 UART: [cold-reset] --
2,853,972 UART: [state] Locking Datavault
2,854,943 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,547 UART: [state] Locking ICCM
2,856,149 UART: [exit] Launching FMC @ 0x40000130
2,861,478 UART:
2,861,494 UART: Running Caliptra FMC ...
2,861,902 UART:
2,862,045 UART: [state] CFI Enabled
2,872,504 UART: [fht] FMC Alias Private Key: 7
2,980,097 UART: [art] Extend RT PCRs Done
2,980,525 UART: [art] Lock RT PCRs Done
2,982,193 UART: [art] Populate DV Done
2,990,380 UART: [fht] FMC Alias Private Key: 7
2,991,526 UART: [art] Derive CDI
2,991,806 UART: [art] Store in in slot 0x4
3,077,733 UART: [art] Derive Key Pair
3,078,093 UART: [art] Store priv key in slot 0x5
3,091,155 UART: [art] Derive Key Pair - Done
3,105,801 UART: [art] Signing Cert with AUTHO
3,106,281 UART: RITY.KEYID = 7
3,121,287 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,052 UART: [art] PUB.X = 6CCFAE5C0ADBF53615E510D6EFE8F9ABC9524B4EA9200EF97F5BC17412170CA14632A97B00C182D8D5364CEBE61CF72A
3,128,811 UART: [art] PUB.Y = DCF9F4CCCAB777D0BB8F89A6E355FC63BCD002B1C57D33EDE709B75D64015E452329C2E06B2CA1DD2C8FC4487FC96E2D
3,135,776 UART: [art] SIG.R = 258758281D514222091AA69C8BB071FE81C60EEA5F12F84610C5024F4ADAD3A5E0E9D2DF5F72E59986F120D8C2461752
3,142,537 UART: [art] SIG.S = 66B28FCF7765A9E4A30FF70F389726D32447094D0A933FAF345276ADF83C282CA1185BA0F348D40F8DE04D3E145D4A00
3,166,169 UART: Caliptra RT
3,166,514 UART: [state] CFI Enabled
3,274,777 UART: [rt] RT listening for mailbox commands...
3,275,447 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,449 UART: [rt]cmd =0x41544d4e, len=14344
3,708,306 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,583 ready_for_fw is high
1,057,583 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,454 >>> mbox cmd response: success
2,685,430 UART:
2,685,446 UART: Running Caliptra FMC ...
2,685,854 UART:
2,685,997 UART: [state] CFI Enabled
2,696,808 UART: [fht] FMC Alias Private Key: 7
2,804,635 UART: [art] Extend RT PCRs Done
2,805,063 UART: [art] Lock RT PCRs Done
2,806,669 UART: [art] Populate DV Done
2,814,882 UART: [fht] FMC Alias Private Key: 7
2,816,012 UART: [art] Derive CDI
2,816,292 UART: [art] Store in in slot 0x4
2,902,171 UART: [art] Derive Key Pair
2,902,531 UART: [art] Store priv key in slot 0x5
2,916,031 UART: [art] Derive Key Pair - Done
2,930,938 UART: [art] Signing Cert with AUTHO
2,931,418 UART: RITY.KEYID = 7
2,946,294 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,059 UART: [art] PUB.X = B26940E4B0DE3FF205258CED176F5DB0D97752DD3CE16E860F784793F98E66D5107151BCF703BD7F3509AB1B0EC49994
2,953,820 UART: [art] PUB.Y = 6805E7AA5B3CC860DC7ECF138121E7CADBC53FA4C47A83AAE76040ED4890AAF00AF579EE1B6792BC13F7753ED91A5005
2,960,779 UART: [art] SIG.R = 1559B4615FF40E72F89FFBD0906F7840862D941FF902F75B1D99E02351288C9B0CCE62D8A8350CA68C9C75B2172B8CC8
2,967,539 UART: [art] SIG.S = 68B49B8614DAF4064EA6FB31CED0ED0ABD78A3EC399D2BCEFA73173EB69517DC3BE6C5C40F52C21A37A19136AD02D439
2,991,246 UART: Caliptra RT
2,991,591 UART: [state] CFI Enabled
3,099,574 UART: [rt] RT listening for mailbox commands...
3,100,244 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,086 UART: [rt]cmd =0x41544d4e, len=14344
3,533,709 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,533 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,197 UART: [kat] SHA2-256
882,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,243 UART: [kat] ++
886,395 UART: [kat] sha1
890,771 UART: [kat] SHA2-256
892,709 UART: [kat] SHA2-384
895,292 UART: [kat] SHA2-512-ACC
897,193 UART: [kat] ECC-384
902,844 UART: [kat] HMAC-384Kdf
907,324 UART: [kat] LMS
1,475,520 UART: [kat] --
1,476,283 UART: [cold-reset] ++
1,476,625 UART: [fht] Storing FHT @ 0x50003400
1,479,400 UART: [idev] ++
1,479,568 UART: [idev] CDI.KEYID = 6
1,479,928 UART: [idev] SUBJECT.KEYID = 7
1,480,352 UART: [idev] UDS.KEYID = 0
1,480,697 ready_for_fw is high
1,480,697 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,910 UART: [idev] Erasing UDS.KEYID = 0
1,504,576 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,198 UART: [idev] --
1,514,137 UART: [ldev] ++
1,514,305 UART: [ldev] CDI.KEYID = 6
1,514,668 UART: [ldev] SUBJECT.KEYID = 5
1,515,094 UART: [ldev] AUTHORITY.KEYID = 7
1,515,557 UART: [ldev] FE.KEYID = 1
1,520,689 UART: [ldev] Erasing FE.KEYID = 1
1,545,744 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,688 UART: [ldev] --
1,585,203 UART: [fwproc] Waiting for Commands...
1,586,046 UART: [fwproc] Received command 0x46574c44
1,586,837 UART: [fwproc] Received Image of size 114332 bytes
5,081,043 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,109,301 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,138,653 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,274,410 >>> mbox cmd response: success
5,275,612 UART: [afmc] ++
5,275,780 UART: [afmc] CDI.KEYID = 6
5,276,142 UART: [afmc] SUBJECT.KEYID = 7
5,276,567 UART: [afmc] AUTHORITY.KEYID = 5
5,310,873 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,327,067 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,327,847 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,333,556 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,339,448 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,345,149 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,353,163 UART: [afmc] --
5,354,161 UART: [cold-reset] --
5,354,697 UART: [state] Locking Datavault
5,355,972 UART: [state] Locking PCR0, PCR1 and PCR31
5,356,576 UART: [state] Locking ICCM
5,357,080 UART: [exit] Launching FMC @ 0x40000130
5,362,409 UART:
5,362,425 UART: Running Caliptra FMC ...
5,362,833 UART:
5,362,887 UART: [state] CFI Enabled
5,372,893 UART: [fht] FMC Alias Private Key: 7
5,480,559 UART: [art] Extend RT PCRs Done
5,480,987 UART: [art] Lock RT PCRs Done
5,482,643 UART: [art] Populate DV Done
5,491,061 UART: [fht] FMC Alias Private Key: 7
5,491,997 UART: [art] Derive CDI
5,492,277 UART: [art] Store in in slot 0x4
5,577,864 UART: [art] Derive Key Pair
5,578,224 UART: [art] Store priv key in slot 0x5
5,591,722 UART: [art] Derive Key Pair - Done
5,606,414 UART: [art] Signing Cert with AUTHO
5,606,894 UART: RITY.KEYID = 7
5,622,376 UART: [art] Erasing AUTHORITY.KEYID = 7
5,623,141 UART: [art] PUB.X = 7B3B8BCB74D95AD709C9CA332A50FFA7BD38DB1437C91584A8A492FD1C831ED2A6CAC3581A2EEF0001CB8C40B9815349
5,629,899 UART: [art] PUB.Y = 4E2CCBB24FE214C59AE3B787AF89B8F7592BE9D0152CFFC4E8520E155A6FF798F5013B4E452BB418382C443F754D6F20
5,636,853 UART: [art] SIG.R = C48CF2EE60DB8ED6470FF45FB08AC1455546A99E9A7F9B053DA5BD56C5AD4D4FA8AB24CB0056EEDDA6ACAFEF18985DDF
5,643,629 UART: [art] SIG.S = 7C1AF2B3379E0D4A5A93D62732A23DCF90E5C67D8CA74D22D13389A1B3E0C86946B1AF35950FBF7ED6317BEFE2E555D7
5,667,760 UART: Caliptra RT
5,668,013 UART: [state] CFI Enabled
5,776,108 UART: [rt] RT listening for mailbox commands...
5,776,778 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,899,698 UART: [rt]cmd =0x41544d4e, len=14344
5,901,365 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,381 ready_for_fw is high
1,362,381 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,428,046 >>> mbox cmd response: success
5,489,263 UART:
5,489,279 UART: Running Caliptra FMC ...
5,489,687 UART:
5,489,741 UART: [state] CFI Enabled
5,500,293 UART: [fht] FMC Alias Private Key: 7
5,608,903 UART: [art] Extend RT PCRs Done
5,609,331 UART: [art] Lock RT PCRs Done
5,610,951 UART: [art] Populate DV Done
5,619,261 UART: [fht] FMC Alias Private Key: 7
5,620,439 UART: [art] Derive CDI
5,620,719 UART: [art] Store in in slot 0x4
5,706,456 UART: [art] Derive Key Pair
5,706,816 UART: [art] Store priv key in slot 0x5
5,719,788 UART: [art] Derive Key Pair - Done
5,734,714 UART: [art] Signing Cert with AUTHO
5,735,194 UART: RITY.KEYID = 7
5,750,480 UART: [art] Erasing AUTHORITY.KEYID = 7
5,751,245 UART: [art] PUB.X = 03230FADB0FFB4E7501EAD2D7BB7F09FC5A344E9C07D2BA88531ED280F49940ECA23A7FC71BAE89B11DDDC95210CBB5B
5,758,026 UART: [art] PUB.Y = 8284F45B6BD2752FB05D7F2388DEBE1FFF6E53D9EEA848222BB92585BCE0495465E59A072EA0C8798AA2D36B346E4CD0
5,764,985 UART: [art] SIG.R = 3C382FEA2AEA38AE4F5BFDB3928DAB5D0F419FF88E8CF4666201CA0986D38C78D9BB178E5FD4E97DA12800B5522B958F
5,771,742 UART: [art] SIG.S = 04D1F5715EDB6F481A637825C03FD9FCB097F6EB6323451158520FB8EC0572BF76A1F0A1004B562F05D8029BDD0E56C6
5,795,215 UART: Caliptra RT
5,795,468 UART: [state] CFI Enabled
5,903,852 UART: [rt] RT listening for mailbox commands...
5,904,522 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,027,370 UART: [rt]cmd =0x41544d4e, len=14344
6,028,977 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,690 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,298 UART: [kat] SHA2-256
882,229 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,344 UART: [kat] ++
886,496 UART: [kat] sha1
890,786 UART: [kat] SHA2-256
892,724 UART: [kat] SHA2-384
895,333 UART: [kat] SHA2-512-ACC
897,234 UART: [kat] ECC-384
903,097 UART: [kat] HMAC-384Kdf
907,693 UART: [kat] LMS
1,475,889 UART: [kat] --
1,476,876 UART: [cold-reset] ++
1,477,418 UART: [fht] Storing FHT @ 0x50003400
1,480,143 UART: [idev] ++
1,480,311 UART: [idev] CDI.KEYID = 6
1,480,671 UART: [idev] SUBJECT.KEYID = 7
1,481,095 UART: [idev] UDS.KEYID = 0
1,481,440 ready_for_fw is high
1,481,440 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,079 UART: [idev] Erasing UDS.KEYID = 0
1,505,613 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,349 UART: [idev] --
1,515,542 UART: [ldev] ++
1,515,710 UART: [ldev] CDI.KEYID = 6
1,516,073 UART: [ldev] SUBJECT.KEYID = 5
1,516,499 UART: [ldev] AUTHORITY.KEYID = 7
1,516,962 UART: [ldev] FE.KEYID = 1
1,521,928 UART: [ldev] Erasing FE.KEYID = 1
1,546,811 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,639 UART: [ldev] --
1,585,918 UART: [fwproc] Waiting for Commands...
1,586,719 UART: [fwproc] Received command 0x46574c44
1,587,510 UART: [fwproc] Received Image of size 114332 bytes
5,046,107 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,074,143 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,103,495 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,239,372 >>> mbox cmd response: success
5,240,602 UART: [afmc] ++
5,240,770 UART: [afmc] CDI.KEYID = 6
5,241,132 UART: [afmc] SUBJECT.KEYID = 7
5,241,557 UART: [afmc] AUTHORITY.KEYID = 5
5,276,717 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,293,197 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,293,977 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,299,686 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,305,578 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,311,279 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,319,069 UART: [afmc] --
5,320,183 UART: [cold-reset] --
5,321,007 UART: [state] Locking Datavault
5,322,442 UART: [state] Locking PCR0, PCR1 and PCR31
5,323,046 UART: [state] Locking ICCM
5,323,576 UART: [exit] Launching FMC @ 0x40000130
5,328,905 UART:
5,328,921 UART: Running Caliptra FMC ...
5,329,329 UART:
5,329,472 UART: [state] CFI Enabled
5,339,916 UART: [fht] FMC Alias Private Key: 7
5,448,116 UART: [art] Extend RT PCRs Done
5,448,544 UART: [art] Lock RT PCRs Done
5,450,342 UART: [art] Populate DV Done
5,458,364 UART: [fht] FMC Alias Private Key: 7
5,459,298 UART: [art] Derive CDI
5,459,578 UART: [art] Store in in slot 0x4
5,545,111 UART: [art] Derive Key Pair
5,545,471 UART: [art] Store priv key in slot 0x5
5,558,795 UART: [art] Derive Key Pair - Done
5,573,784 UART: [art] Signing Cert with AUTHO
5,574,264 UART: RITY.KEYID = 7
5,589,270 UART: [art] Erasing AUTHORITY.KEYID = 7
5,590,035 UART: [art] PUB.X = CCDEF974683D7CA1B4F58DB7F98E65EC3C834BEB13750D70DF47B4B0EF65929AC5B6C6557CA56C8734B186782DC76468
5,596,814 UART: [art] PUB.Y = 31C6816169A3C213D1B799A492A84DB907CA2FF85A29379D3C92700199FD346BAE0AE4BBDD04810F831DF93DD4AFDEE3
5,603,761 UART: [art] SIG.R = E5057EF562B5D776CC4B81DFBFFCEBCA3B918898150B3A490044F302D38F7666235BC2BC2BCBAAFD1C1B03C78C7BFD6D
5,610,521 UART: [art] SIG.S = C172229A506498464EDFD1A4BDAE0FB3CD46BF38D72D5D03378947CE22CB9AD5B0838396329EA7D867073C2D585B73CC
5,634,221 UART: Caliptra RT
5,634,566 UART: [state] CFI Enabled
5,741,754 UART: [rt] RT listening for mailbox commands...
5,742,424 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,865,292 UART: [rt]cmd =0x41544d4e, len=14344
5,866,837 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,332 ready_for_fw is high
1,362,332 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,202,141 >>> mbox cmd response: success
5,264,034 UART:
5,264,050 UART: Running Caliptra FMC ...
5,264,458 UART:
5,264,601 UART: [state] CFI Enabled
5,275,331 UART: [fht] FMC Alias Private Key: 7
5,382,649 UART: [art] Extend RT PCRs Done
5,383,077 UART: [art] Lock RT PCRs Done
5,384,485 UART: [art] Populate DV Done
5,392,667 UART: [fht] FMC Alias Private Key: 7
5,393,597 UART: [art] Derive CDI
5,393,877 UART: [art] Store in in slot 0x4
5,479,540 UART: [art] Derive Key Pair
5,479,900 UART: [art] Store priv key in slot 0x5
5,493,148 UART: [art] Derive Key Pair - Done
5,507,730 UART: [art] Signing Cert with AUTHO
5,508,210 UART: RITY.KEYID = 7
5,523,948 UART: [art] Erasing AUTHORITY.KEYID = 7
5,524,713 UART: [art] PUB.X = 4F685B00C68D9150F051F7046619B792BD57751D0DBCBB2EDE559BB7F5D3DD4DD798007E31B2A592C5CCD252CC4937B1
5,531,443 UART: [art] PUB.Y = 5D8DB0AF4E74BFEF151D9768F53D3914BC0998C029726BB74158985126B4403D37D9E38573618BC12C591571D2E37317
5,538,382 UART: [art] SIG.R = 17C68991510B70F6D7A2193352A77BEDB8E5F0BB7A1F835D0F4D7BB6CEA491D896228DDC490948D13E3240D06E340944
5,545,142 UART: [art] SIG.S = 21E04ACFFC95815B4A780A003184CA2B8A3F4154D2A30EA5163D2A8B130F7B66DFD36F61218F224D592845BA91CCE5E1
5,568,860 UART: Caliptra RT
5,569,205 UART: [state] CFI Enabled
5,677,007 UART: [rt] RT listening for mailbox commands...
5,677,677 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,800,747 UART: [rt]cmd =0x41544d4e, len=14344
5,802,062 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,734 UART: [state] LifecycleState = Unprovisioned
85,389 UART: [state] DebugLocked = No
85,979 UART: [state] WD Timer not started. Device not locked for debugging
87,116 UART: [kat] SHA2-256
892,766 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,891 UART: [kat] ++
897,043 UART: [kat] sha1
901,241 UART: [kat] SHA2-256
903,181 UART: [kat] SHA2-384
905,960 UART: [kat] SHA2-512-ACC
907,861 UART: [kat] ECC-384
917,570 UART: [kat] HMAC-384Kdf
922,214 UART: [kat] LMS
1,170,542 UART: [kat] --
1,171,379 UART: [cold-reset] ++
1,171,879 UART: [fht] FHT @ 0x50003400
1,174,328 UART: [idev] ++
1,174,496 UART: [idev] CDI.KEYID = 6
1,174,856 UART: [idev] SUBJECT.KEYID = 7
1,175,280 UART: [idev] UDS.KEYID = 0
1,175,625 ready_for_fw is high
1,175,625 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,190 UART: [idev] Erasing UDS.KEYID = 0
1,199,547 UART: [idev] Sha1 KeyId Algorithm
1,208,105 UART: [idev] --
1,209,247 UART: [ldev] ++
1,209,415 UART: [ldev] CDI.KEYID = 6
1,209,778 UART: [ldev] SUBJECT.KEYID = 5
1,210,204 UART: [ldev] AUTHORITY.KEYID = 7
1,210,667 UART: [ldev] FE.KEYID = 1
1,215,685 UART: [ldev] Erasing FE.KEYID = 1
1,242,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,625 UART: [ldev] --
1,281,020 UART: [fwproc] Wait for Commands...
1,281,778 UART: [fwproc] Recv command 0x46574c44
1,282,506 UART: [fwproc] Recv'd Img size: 114332 bytes
3,129,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,044 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,348 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,322,043 >>> mbox cmd response: success
3,323,291 UART: [afmc] ++
3,323,459 UART: [afmc] CDI.KEYID = 6
3,323,821 UART: [afmc] SUBJECT.KEYID = 7
3,324,246 UART: [afmc] AUTHORITY.KEYID = 5
3,359,988 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,195 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,904 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,796 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,507 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,326 UART: [afmc] --
3,403,308 UART: [cold-reset] --
3,403,928 UART: [state] Locking Datavault
3,405,211 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,815 UART: [state] Locking ICCM
3,406,239 UART: [exit] Launching FMC @ 0x40000130
3,411,568 UART:
3,411,584 UART: Running Caliptra FMC ...
3,411,992 UART:
3,412,046 UART: [state] CFI Enabled
3,422,588 UART: [fht] FMC Alias Private Key: 7
3,530,192 UART: [art] Extend RT PCRs Done
3,530,620 UART: [art] Lock RT PCRs Done
3,531,722 UART: [art] Populate DV Done
3,540,182 UART: [fht] FMC Alias Private Key: 7
3,541,126 UART: [art] Derive CDI
3,541,406 UART: [art] Store in in slot 0x4
3,626,889 UART: [art] Derive Key Pair
3,627,249 UART: [art] Store priv key in slot 0x5
3,640,241 UART: [art] Derive Key Pair - Done
3,654,941 UART: [art] Signing Cert with AUTHO
3,655,421 UART: RITY.KEYID = 7
3,670,863 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,628 UART: [art] PUB.X = AF6CB88C6543D04A636EF973D77999304C2C7B367CEF66BF10ADEBD77E0C55A658CD246A09F7000180FE2EBA48C393E7
3,678,379 UART: [art] PUB.Y = 705DD6709EAC9A1B6E1F20F510BBD5C0BC7C132EBFFBD8EAEA8ED5F8D78CA1E203AB406649C53923570B42D88705F177
3,685,338 UART: [art] SIG.R = C8B7A1B998DFED9C37257862D72D7BD6CB765F72DB4794636067D6608C9C0193F5499C4028D3644E8607424A9CCD1CC7
3,692,102 UART: [art] SIG.S = C6D9F033D69A4DB83714079B0A40440959D69081F6EFF8E35F3AD18F3313A5CAE0E8DBF99F0EB11126E8A529D9658123
3,715,665 UART: Caliptra RT
3,715,918 UART: [state] CFI Enabled
3,823,189 UART: [rt] RT listening for mailbox commands...
3,823,859 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,107 UART: [rt]cmd =0x41544d4e, len=14344
3,948,754 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,961 ready_for_fw is high
1,059,961 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,157,874 >>> mbox cmd response: success
3,219,423 UART:
3,219,439 UART: Running Caliptra FMC ...
3,219,847 UART:
3,219,901 UART: [state] CFI Enabled
3,230,367 UART: [fht] FMC Alias Private Key: 7
3,337,737 UART: [art] Extend RT PCRs Done
3,338,165 UART: [art] Lock RT PCRs Done
3,339,947 UART: [art] Populate DV Done
3,348,179 UART: [fht] FMC Alias Private Key: 7
3,349,305 UART: [art] Derive CDI
3,349,585 UART: [art] Store in in slot 0x4
3,435,418 UART: [art] Derive Key Pair
3,435,778 UART: [art] Store priv key in slot 0x5
3,449,522 UART: [art] Derive Key Pair - Done
3,464,147 UART: [art] Signing Cert with AUTHO
3,464,627 UART: RITY.KEYID = 7
3,479,641 UART: [art] Erasing AUTHORITY.KEYID = 7
3,480,406 UART: [art] PUB.X = 64DC3FB9779F94833D5C81FA9870FEF48944AF90B31380E698FA931D101002A9E7A658DDF026583065F992C1AAB7CB4C
3,487,177 UART: [art] PUB.Y = D36333E4FCCBF24A3535502169045629321003F6C1AC5B340F1CBBD1C8A7FD28183E644AE46F4FAC95AC38A6D6A6FD72
3,494,128 UART: [art] SIG.R = 8F431634A7EAF531484AEB2DC5CE239C42E6A49C5E8F454F065C531D84B2BA1145D3A5E85F4C32726A9B64D464EDCAAF
3,500,909 UART: [art] SIG.S = 44C9E224CFE174A7F7A3D2EB464AE6681A45098FCB43F720052994352928A07C4829034EAA651D7D19A0B4AA4B89C877
3,524,551 UART: Caliptra RT
3,524,804 UART: [state] CFI Enabled
3,632,478 UART: [rt] RT listening for mailbox commands...
3,633,148 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,216 UART: [rt]cmd =0x41544d4e, len=14344
3,757,641 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
893,483 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,608 UART: [kat] ++
897,760 UART: [kat] sha1
902,138 UART: [kat] SHA2-256
904,078 UART: [kat] SHA2-384
906,719 UART: [kat] SHA2-512-ACC
908,620 UART: [kat] ECC-384
918,467 UART: [kat] HMAC-384Kdf
923,117 UART: [kat] LMS
1,171,445 UART: [kat] --
1,172,188 UART: [cold-reset] ++
1,172,572 UART: [fht] FHT @ 0x50003400
1,175,129 UART: [idev] ++
1,175,297 UART: [idev] CDI.KEYID = 6
1,175,657 UART: [idev] SUBJECT.KEYID = 7
1,176,081 UART: [idev] UDS.KEYID = 0
1,176,426 ready_for_fw is high
1,176,426 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,925 UART: [idev] Erasing UDS.KEYID = 0
1,200,822 UART: [idev] Sha1 KeyId Algorithm
1,209,328 UART: [idev] --
1,210,308 UART: [ldev] ++
1,210,476 UART: [ldev] CDI.KEYID = 6
1,210,839 UART: [ldev] SUBJECT.KEYID = 5
1,211,265 UART: [ldev] AUTHORITY.KEYID = 7
1,211,728 UART: [ldev] FE.KEYID = 1
1,216,938 UART: [ldev] Erasing FE.KEYID = 1
1,243,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,686 UART: [ldev] --
1,283,039 UART: [fwproc] Wait for Commands...
1,283,767 UART: [fwproc] Recv command 0x46574c44
1,284,495 UART: [fwproc] Recv'd Img size: 114332 bytes
3,124,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,532 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,836 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,317,767 >>> mbox cmd response: success
3,318,879 UART: [afmc] ++
3,319,047 UART: [afmc] CDI.KEYID = 6
3,319,409 UART: [afmc] SUBJECT.KEYID = 7
3,319,834 UART: [afmc] AUTHORITY.KEYID = 5
3,355,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,977 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,686 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,578 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,289 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,094 UART: [afmc] --
3,399,092 UART: [cold-reset] --
3,399,822 UART: [state] Locking Datavault
3,401,121 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,725 UART: [state] Locking ICCM
3,402,379 UART: [exit] Launching FMC @ 0x40000130
3,407,708 UART:
3,407,724 UART: Running Caliptra FMC ...
3,408,132 UART:
3,408,275 UART: [state] CFI Enabled
3,419,169 UART: [fht] FMC Alias Private Key: 7
3,527,607 UART: [art] Extend RT PCRs Done
3,528,035 UART: [art] Lock RT PCRs Done
3,529,589 UART: [art] Populate DV Done
3,538,035 UART: [fht] FMC Alias Private Key: 7
3,539,181 UART: [art] Derive CDI
3,539,461 UART: [art] Store in in slot 0x4
3,625,064 UART: [art] Derive Key Pair
3,625,424 UART: [art] Store priv key in slot 0x5
3,639,136 UART: [art] Derive Key Pair - Done
3,654,212 UART: [art] Signing Cert with AUTHO
3,654,692 UART: RITY.KEYID = 7
3,670,276 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,041 UART: [art] PUB.X = E9A70FA710D6C9D9023A7E194B96C70FDA5DD665DE864E707E9738ABF5B691A2823E85906CF4660196688D663B558956
3,677,797 UART: [art] PUB.Y = 3EDDA39BA2ACCE24E39DC87C92F8670B8A1B822D434AD365775C48EBDA21D9494E506377961FEBF175986360C831F48F
3,684,752 UART: [art] SIG.R = C7A0BED950A4F23536DB208EEE155D52B6D7487BCA5A2AD1EEDDA3184F06184004E9873B9133899BE0544FFC4CEDD25D
3,691,532 UART: [art] SIG.S = F99E81269F5984E3845C6E1AADF9C8515AE5144CEE7F5F4B5FB750D11A4BB0ABDDB5B7D4FCC90F39F2942E0C46B58511
3,714,857 UART: Caliptra RT
3,715,202 UART: [state] CFI Enabled
3,821,743 UART: [rt] RT listening for mailbox commands...
3,822,413 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,561 UART: [rt]cmd =0x41544d4e, len=14344
3,947,080 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,946 ready_for_fw is high
1,059,946 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,169,814 >>> mbox cmd response: success
3,231,011 UART:
3,231,027 UART: Running Caliptra FMC ...
3,231,435 UART:
3,231,578 UART: [state] CFI Enabled
3,241,948 UART: [fht] FMC Alias Private Key: 7
3,350,184 UART: [art] Extend RT PCRs Done
3,350,612 UART: [art] Lock RT PCRs Done
3,352,194 UART: [art] Populate DV Done
3,360,228 UART: [fht] FMC Alias Private Key: 7
3,361,216 UART: [art] Derive CDI
3,361,496 UART: [art] Store in in slot 0x4
3,447,247 UART: [art] Derive Key Pair
3,447,607 UART: [art] Store priv key in slot 0x5
3,461,123 UART: [art] Derive Key Pair - Done
3,475,988 UART: [art] Signing Cert with AUTHO
3,476,468 UART: RITY.KEYID = 7
3,491,844 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,609 UART: [art] PUB.X = 0CEBEC85354F8B1C80BA69FCBD42ACF1084C5EA84EDD0F395E7885827196A2586A726F0CD74D2E36CD964F6E462AE3DA
3,499,385 UART: [art] PUB.Y = 54749A826145D5CB31D2E9C027BF55E4DAB810FFB229145AE355ACA019A70B44FD72E416BF2BB3992889EC98886660D1
3,506,336 UART: [art] SIG.R = 7DC1B04DBAC441B1D6EF914001872BE287AEFE49B9BA9505C5D90B2B4C1A600A0A791982C65D937A4893AB9EFA88C55D
3,513,105 UART: [art] SIG.S = 639718287B9AECEDF5AC13A4C07A898F9C3DA9A9A30BE165C2E010A44654BFF4AFF4C392FC721444AA3E877781BDFAE1
3,536,929 UART: Caliptra RT
3,537,274 UART: [state] CFI Enabled
3,646,011 UART: [rt] RT listening for mailbox commands...
3,646,681 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,437 UART: [rt]cmd =0x41544d4e, len=14344
3,770,940 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,281 UART: [kat] ++
895,433 UART: [kat] sha1
899,527 UART: [kat] SHA2-256
901,467 UART: [kat] SHA2-384
904,186 UART: [kat] SHA2-512-ACC
906,087 UART: [kat] ECC-384
915,946 UART: [kat] HMAC-384Kdf
920,516 UART: [kat] LMS
1,168,828 UART: [kat] --
1,169,533 UART: [cold-reset] ++
1,170,025 UART: [fht] FHT @ 0x50003400
1,172,613 UART: [idev] ++
1,172,781 UART: [idev] CDI.KEYID = 6
1,173,142 UART: [idev] SUBJECT.KEYID = 7
1,173,567 UART: [idev] UDS.KEYID = 0
1,173,913 ready_for_fw is high
1,173,913 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,825 UART: [idev] Erasing UDS.KEYID = 0
1,198,773 UART: [idev] Sha1 KeyId Algorithm
1,207,745 UART: [idev] --
1,208,872 UART: [ldev] ++
1,209,040 UART: [ldev] CDI.KEYID = 6
1,209,404 UART: [ldev] SUBJECT.KEYID = 5
1,209,831 UART: [ldev] AUTHORITY.KEYID = 7
1,210,294 UART: [ldev] FE.KEYID = 1
1,215,390 UART: [ldev] Erasing FE.KEYID = 1
1,242,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,734 UART: [ldev] --
1,281,104 UART: [fwproc] Wait for Commands...
1,281,759 UART: [fwproc] Recv command 0x46574c44
1,282,492 UART: [fwproc] Recv'd Img size: 114332 bytes
3,111,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,139,708 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,169,017 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,304,721 >>> mbox cmd response: success
3,305,846 UART: [afmc] ++
3,306,014 UART: [afmc] CDI.KEYID = 6
3,306,377 UART: [afmc] SUBJECT.KEYID = 7
3,306,803 UART: [afmc] AUTHORITY.KEYID = 5
3,341,913 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,358,147 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,358,898 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,364,608 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,370,498 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,376,209 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,384,129 UART: [afmc] --
3,385,261 UART: [cold-reset] --
3,386,235 UART: [state] Locking Datavault
3,387,344 UART: [state] Locking PCR0, PCR1 and PCR31
3,387,948 UART: [state] Locking ICCM
3,388,530 UART: [exit] Launching FMC @ 0x40000130
3,393,859 UART:
3,393,875 UART: Running Caliptra FMC ...
3,394,283 UART:
3,394,337 UART: [state] CFI Enabled
3,404,505 UART: [fht] FMC Alias Private Key: 7
3,512,749 UART: [art] Extend RT PCRs Done
3,513,177 UART: [art] Lock RT PCRs Done
3,514,511 UART: [art] Populate DV Done
3,522,739 UART: [fht] FMC Alias Private Key: 7
3,523,693 UART: [art] Derive CDI
3,523,973 UART: [art] Store in in slot 0x4
3,609,426 UART: [art] Derive Key Pair
3,609,786 UART: [art] Store priv key in slot 0x5
3,623,034 UART: [art] Derive Key Pair - Done
3,637,938 UART: [art] Signing Cert with AUTHO
3,638,418 UART: RITY.KEYID = 7
3,653,576 UART: [art] Erasing AUTHORITY.KEYID = 7
3,654,341 UART: [art] PUB.X = CE3347B69864D423D1570550E9C542C598021C0283854052F65F2CBAECDC5E132AB905EBB2A95D567253CC9E9DD41B99
3,661,101 UART: [art] PUB.Y = 1FE015B15C67A271ABE755566FB1DA5C905D1C8AE72082EC0D2D4877FFBEA670E7158D1800D738CCD5B0EAD4C798ACE3
3,668,044 UART: [art] SIG.R = 0CCC6B944ADF4FB597A809D4C472F409EEBDCF70B6FD27AD344CD04A62E4D0A9D496FADE05A03FEDDEAFE262A56987B9
3,674,832 UART: [art] SIG.S = 34B8E8460EC1245961DD56145D3118021C76A61AE8AA2A35AE81C84C8E331CA6D013D793E617279A854AB3EC26CEFF08
3,699,022 UART: Caliptra RT
3,699,275 UART: [state] CFI Enabled
3,806,628 UART: [rt] RT listening for mailbox commands...
3,807,298 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,930,032 UART: [rt]cmd =0x41544d4e, len=14344
3,931,691 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,420 ready_for_fw is high
1,055,420 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,164,703 >>> mbox cmd response: success
3,226,928 UART:
3,226,944 UART: Running Caliptra FMC ...
3,227,352 UART:
3,227,406 UART: [state] CFI Enabled
3,237,810 UART: [fht] FMC Alias Private Key: 7
3,345,654 UART: [art] Extend RT PCRs Done
3,346,082 UART: [art] Lock RT PCRs Done
3,347,538 UART: [art] Populate DV Done
3,355,900 UART: [fht] FMC Alias Private Key: 7
3,356,846 UART: [art] Derive CDI
3,357,126 UART: [art] Store in in slot 0x4
3,442,923 UART: [art] Derive Key Pair
3,443,283 UART: [art] Store priv key in slot 0x5
3,455,841 UART: [art] Derive Key Pair - Done
3,470,440 UART: [art] Signing Cert with AUTHO
3,470,920 UART: RITY.KEYID = 7
3,486,022 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,787 UART: [art] PUB.X = 1479CB9A7B70232B4D00378F9F41DBEE0411DBCF3B0734CA33BE94BEA42E18C8EC55EF5E0B35C99B9C17264883D6334C
3,493,538 UART: [art] PUB.Y = 940708B2B674157828996FF5E52EDF46A725B10FEB1873286541CFA91244934697AA8D000AF9E24874B2A6C7B18722C6
3,500,446 UART: [art] SIG.R = 7CC4E75E6ED5544A3561D95C36A098ECE0E8A5E9A176BF3C0F214EA3B01BAA2C1C16DE4136E6095F68CCD54FCF617032
3,507,226 UART: [art] SIG.S = 1C19232A2331E79C47E8EA40CE6DC1922E60816811D14879881A18313A14C7B228CDA82DC1FFEB6CFA5F4F570B8351A9
3,530,764 UART: Caliptra RT
3,531,017 UART: [state] CFI Enabled
3,638,352 UART: [rt] RT listening for mailbox commands...
3,639,022 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,982 UART: [rt]cmd =0x41544d4e, len=14344
3,763,257 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,935 UART: [state] LifecycleState = Unprovisioned
86,590 UART: [state] DebugLocked = No
87,092 UART: [state] WD Timer not started. Device not locked for debugging
88,327 UART: [kat] SHA2-256
891,877 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,006 UART: [kat] ++
896,158 UART: [kat] sha1
900,592 UART: [kat] SHA2-256
902,532 UART: [kat] SHA2-384
905,347 UART: [kat] SHA2-512-ACC
907,248 UART: [kat] ECC-384
916,751 UART: [kat] HMAC-384Kdf
921,223 UART: [kat] LMS
1,169,535 UART: [kat] --
1,170,562 UART: [cold-reset] ++
1,171,084 UART: [fht] FHT @ 0x50003400
1,173,636 UART: [idev] ++
1,173,804 UART: [idev] CDI.KEYID = 6
1,174,165 UART: [idev] SUBJECT.KEYID = 7
1,174,590 UART: [idev] UDS.KEYID = 0
1,174,936 ready_for_fw is high
1,174,936 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,916 UART: [idev] Erasing UDS.KEYID = 0
1,199,666 UART: [idev] Sha1 KeyId Algorithm
1,208,786 UART: [idev] --
1,209,755 UART: [ldev] ++
1,209,923 UART: [ldev] CDI.KEYID = 6
1,210,287 UART: [ldev] SUBJECT.KEYID = 5
1,210,714 UART: [ldev] AUTHORITY.KEYID = 7
1,211,177 UART: [ldev] FE.KEYID = 1
1,216,481 UART: [ldev] Erasing FE.KEYID = 1
1,243,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,491 UART: [ldev] --
1,282,859 UART: [fwproc] Wait for Commands...
1,283,598 UART: [fwproc] Recv command 0x46574c44
1,284,331 UART: [fwproc] Recv'd Img size: 114332 bytes
3,122,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,315,380 >>> mbox cmd response: success
3,316,565 UART: [afmc] ++
3,316,733 UART: [afmc] CDI.KEYID = 6
3,317,096 UART: [afmc] SUBJECT.KEYID = 7
3,317,522 UART: [afmc] AUTHORITY.KEYID = 5
3,353,656 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,030 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,781 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,491 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,381 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,092 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,744 UART: [afmc] --
3,396,800 UART: [cold-reset] --
3,397,430 UART: [state] Locking Datavault
3,398,445 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,049 UART: [state] Locking ICCM
3,399,543 UART: [exit] Launching FMC @ 0x40000130
3,404,872 UART:
3,404,888 UART: Running Caliptra FMC ...
3,405,296 UART:
3,405,439 UART: [state] CFI Enabled
3,416,013 UART: [fht] FMC Alias Private Key: 7
3,524,373 UART: [art] Extend RT PCRs Done
3,524,801 UART: [art] Lock RT PCRs Done
3,526,221 UART: [art] Populate DV Done
3,534,135 UART: [fht] FMC Alias Private Key: 7
3,535,239 UART: [art] Derive CDI
3,535,519 UART: [art] Store in in slot 0x4
3,621,270 UART: [art] Derive Key Pair
3,621,630 UART: [art] Store priv key in slot 0x5
3,635,296 UART: [art] Derive Key Pair - Done
3,649,828 UART: [art] Signing Cert with AUTHO
3,650,308 UART: RITY.KEYID = 7
3,665,396 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,161 UART: [art] PUB.X = 7ED9B384B323102AF37F5E2EE9EF2DCA310CF41852BF1460A55EC8B6DB9867E46C53963450199383F0800745ADFC2067
3,672,927 UART: [art] PUB.Y = BB2B7C30C574743AD489217CC39A1629DCF7CECC8C24F28631792BC5650B1EE8E7AB3BFAA32F898FDEFBBEC6D2BF51AC
3,679,902 UART: [art] SIG.R = 1A37EE491EB6D45B747A439CCD9668E3BD155259A51BFB326B326F08F35C639C7295C10DCADB57DD6BC68422547FFBA1
3,686,678 UART: [art] SIG.S = 493B7049E90B7CC2292E0A045DA99BF80E42DB502EF5C766439AA4565553FB3564158BF8462D3C8C8DD9A6FBDDF0CEA1
3,710,645 UART: Caliptra RT
3,710,990 UART: [state] CFI Enabled
3,819,189 UART: [rt] RT listening for mailbox commands...
3,819,859 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,177 UART: [rt]cmd =0x41544d4e, len=14344
3,944,766 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,541 ready_for_fw is high
1,055,541 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,155,441 >>> mbox cmd response: success
3,218,326 UART:
3,218,342 UART: Running Caliptra FMC ...
3,218,750 UART:
3,218,893 UART: [state] CFI Enabled
3,229,447 UART: [fht] FMC Alias Private Key: 7
3,337,261 UART: [art] Extend RT PCRs Done
3,337,689 UART: [art] Lock RT PCRs Done
3,339,315 UART: [art] Populate DV Done
3,347,629 UART: [fht] FMC Alias Private Key: 7
3,348,783 UART: [art] Derive CDI
3,349,063 UART: [art] Store in in slot 0x4
3,435,008 UART: [art] Derive Key Pair
3,435,368 UART: [art] Store priv key in slot 0x5
3,448,810 UART: [art] Derive Key Pair - Done
3,463,766 UART: [art] Signing Cert with AUTHO
3,464,246 UART: RITY.KEYID = 7
3,479,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,480,425 UART: [art] PUB.X = D0A30FF7791EE7973E3C95BBD94432AB1FF6462204E385BAA0A180FC98A8F4B19DDC965498AD47ED0C7C59C4BA1EE3F5
3,487,204 UART: [art] PUB.Y = AC748EDF541D3E16DCA2BF24EE09B2304DE4DDD418D99320BE04E86DB440CD40485763D89344507632CE28DD2CD47440
3,494,156 UART: [art] SIG.R = 75907A875826D6362280F226586C8447B23F9A4ACDEDF4B89BA9FAD033773A69C38754735884F5EDE8CBA7C7503C8EA3
3,500,928 UART: [art] SIG.S = B4B1F1BE414462B270263BB2584213100926CC0E335AB1FD076DF55020E91826EFD0D32F05A5B83062ED07C960FBB45B
3,524,756 UART: Caliptra RT
3,525,101 UART: [state] CFI Enabled
3,632,609 UART: [rt] RT listening for mailbox commands...
3,633,279 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,231 UART: [rt]cmd =0x41544d4e, len=14344
3,757,538 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,596 UART: [state] LifecycleState = Unprovisioned
86,251 UART: [state] DebugLocked = No
86,737 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,213 UART: [kat] SHA2-256
882,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,259 UART: [kat] ++
886,411 UART: [kat] sha1
890,719 UART: [kat] SHA2-256
892,657 UART: [kat] SHA2-384
895,168 UART: [kat] SHA2-512-ACC
897,069 UART: [kat] ECC-384
902,742 UART: [kat] HMAC-384Kdf
907,278 UART: [kat] LMS
1,475,474 UART: [kat] --
1,476,455 UART: [cold-reset] ++
1,476,921 UART: [fht] Storing FHT @ 0x50003400
1,479,796 UART: [idev] ++
1,479,964 UART: [idev] CDI.KEYID = 6
1,480,324 UART: [idev] SUBJECT.KEYID = 7
1,480,748 UART: [idev] UDS.KEYID = 0
1,481,093 ready_for_fw is high
1,481,093 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,536 UART: [idev] Erasing UDS.KEYID = 0
1,504,360 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,070 UART: [idev] --
1,514,073 UART: [ldev] ++
1,514,241 UART: [ldev] CDI.KEYID = 6
1,514,604 UART: [ldev] SUBJECT.KEYID = 5
1,515,030 UART: [ldev] AUTHORITY.KEYID = 7
1,515,493 UART: [ldev] FE.KEYID = 1
1,520,923 UART: [ldev] Erasing FE.KEYID = 1
1,546,028 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,834 UART: [ldev] --
1,585,191 UART: [fwproc] Waiting for Commands...
1,586,006 UART: [fwproc] Received command 0x46574c44
1,586,797 UART: [fwproc] Received Image of size 114332 bytes
5,385,067 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,413,349 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,442,701 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,578,558 >>> mbox cmd response: success
5,579,616 UART: [afmc] ++
5,579,784 UART: [afmc] CDI.KEYID = 6
5,580,146 UART: [afmc] SUBJECT.KEYID = 7
5,580,571 UART: [afmc] AUTHORITY.KEYID = 5
5,615,515 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,631,573 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,632,353 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,638,062 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,643,954 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,649,655 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,657,525 UART: [afmc] --
5,658,585 UART: [cold-reset] --
5,659,401 UART: [state] Locking Datavault
5,660,324 UART: [state] Locking PCR0, PCR1 and PCR31
5,660,928 UART: [state] Locking ICCM
5,661,402 UART: [exit] Launching FMC @ 0x40000130
5,666,731 UART:
5,666,747 UART: Running Caliptra FMC ...
5,667,155 UART:
5,667,209 UART: [state] CFI Enabled
5,677,793 UART: [fht] FMC Alias Private Key: 7
5,784,927 UART: [art] Extend RT PCRs Done
5,785,355 UART: [art] Lock RT PCRs Done
5,787,017 UART: [art] Populate DV Done
5,795,021 UART: [fht] FMC Alias Private Key: 7
5,796,105 UART: [art] Derive CDI
5,796,385 UART: [art] Store in in slot 0x4
5,882,220 UART: [art] Derive Key Pair
5,882,580 UART: [art] Store priv key in slot 0x5
5,895,800 UART: [art] Derive Key Pair - Done
5,910,483 UART: [art] Signing Cert with AUTHO
5,910,963 UART: RITY.KEYID = 7
5,926,213 UART: [art] Erasing AUTHORITY.KEYID = 7
5,926,978 UART: [art] PUB.X = EA416FDE4A7600443B9E10F4839DF96DDCA782EB3D23537BC6BEBACD493979E2D4E4A1A18696E829C503DDD75A41F645
5,933,737 UART: [art] PUB.Y = ECD3F696D56E61F2F67C6BAD4ACA917792BA340D32AB5254B7B029384F0F952445C45E0B17673BB82AE7F49F433D0A46
5,940,683 UART: [art] SIG.R = D7671439189E636AE16048D15D63E749C010756E73CABA5C155E9D723D0B6371DB92FD0E84F163E3046EF7B4395F958F
5,947,442 UART: [art] SIG.S = B66B922CA5A57290DC889232493D22D4F453C146B1EEDC3F9A3BBA722B4C2FC0C046DCF64FD57A9CEE1B99A277306665
5,971,767 UART: Caliptra RT
5,972,020 UART: [state] CFI Enabled
6,080,098 UART: [rt] RT listening for mailbox commands...
6,080,768 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,203,812 UART: [rt]cmd =0x41544d4e, len=14344
6,205,339 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,575 ready_for_fw is high
1,361,575 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,201,226 >>> mbox cmd response: success
5,262,607 UART:
5,262,623 UART: Running Caliptra FMC ...
5,263,031 UART:
5,263,085 UART: [state] CFI Enabled
5,273,733 UART: [fht] FMC Alias Private Key: 7
5,382,007 UART: [art] Extend RT PCRs Done
5,382,435 UART: [art] Lock RT PCRs Done
5,384,033 UART: [art] Populate DV Done
5,392,347 UART: [fht] FMC Alias Private Key: 7
5,393,387 UART: [art] Derive CDI
5,393,667 UART: [art] Store in in slot 0x4
5,479,590 UART: [art] Derive Key Pair
5,479,950 UART: [art] Store priv key in slot 0x5
5,493,038 UART: [art] Derive Key Pair - Done
5,507,916 UART: [art] Signing Cert with AUTHO
5,508,396 UART: RITY.KEYID = 7
5,523,088 UART: [art] Erasing AUTHORITY.KEYID = 7
5,523,853 UART: [art] PUB.X = 8936BE50574514DD7B606CCA28201BDB27E432FBB44127E88E355F23F3F364D112EFC2A521E84570B08093E0EC50CDC5
5,530,627 UART: [art] PUB.Y = 029E14545B24196FA5899517EBCAE5F38C11D3A7571C184BEB5EC12713C903C342B052C8D31C43259728E73BB7378B33
5,537,567 UART: [art] SIG.R = 0361B96EFFE167A24693D317955E4816E68092B6D7945D73548A80ECE524DDDECC556CE61DAE13E5B1C2AD7C61AE2070
5,544,342 UART: [art] SIG.S = DEF258774E8908603724DE805DF4931E06122DF1A5CDE434577D05AE8C6BFD41015E85E65A8C462B9C41D2A5D4A2E536
5,567,999 UART: Caliptra RT
5,568,252 UART: [state] CFI Enabled
5,676,373 UART: [rt] RT listening for mailbox commands...
5,677,043 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,800,057 UART: [rt]cmd =0x41544d4e, len=14344
5,801,262 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,720 UART: [state] DebugLocked = No
86,226 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,710 UART: [kat] SHA2-256
881,641 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,756 UART: [kat] ++
885,908 UART: [kat] sha1
890,294 UART: [kat] SHA2-256
892,232 UART: [kat] SHA2-384
894,987 UART: [kat] SHA2-512-ACC
896,888 UART: [kat] ECC-384
902,573 UART: [kat] HMAC-384Kdf
907,039 UART: [kat] LMS
1,475,235 UART: [kat] --
1,476,056 UART: [cold-reset] ++
1,476,390 UART: [fht] Storing FHT @ 0x50003400
1,479,165 UART: [idev] ++
1,479,333 UART: [idev] CDI.KEYID = 6
1,479,693 UART: [idev] SUBJECT.KEYID = 7
1,480,117 UART: [idev] UDS.KEYID = 0
1,480,462 ready_for_fw is high
1,480,462 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,463 UART: [idev] Erasing UDS.KEYID = 0
1,504,869 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,457 UART: [idev] --
1,514,604 UART: [ldev] ++
1,514,772 UART: [ldev] CDI.KEYID = 6
1,515,135 UART: [ldev] SUBJECT.KEYID = 5
1,515,561 UART: [ldev] AUTHORITY.KEYID = 7
1,516,024 UART: [ldev] FE.KEYID = 1
1,521,252 UART: [ldev] Erasing FE.KEYID = 1
1,546,357 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,495 UART: [ldev] --
1,585,954 UART: [fwproc] Waiting for Commands...
1,586,613 UART: [fwproc] Received command 0x46574c44
1,587,404 UART: [fwproc] Received Image of size 114332 bytes
5,121,969 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,151,079 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,180,431 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,316,336 >>> mbox cmd response: success
5,317,580 UART: [afmc] ++
5,317,748 UART: [afmc] CDI.KEYID = 6
5,318,110 UART: [afmc] SUBJECT.KEYID = 7
5,318,535 UART: [afmc] AUTHORITY.KEYID = 5
5,353,977 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,370,109 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,370,889 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,376,598 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,382,490 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,388,191 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,395,919 UART: [afmc] --
5,397,019 UART: [cold-reset] --
5,397,783 UART: [state] Locking Datavault
5,398,944 UART: [state] Locking PCR0, PCR1 and PCR31
5,399,548 UART: [state] Locking ICCM
5,400,046 UART: [exit] Launching FMC @ 0x40000130
5,405,375 UART:
5,405,391 UART: Running Caliptra FMC ...
5,405,799 UART:
5,405,942 UART: [state] CFI Enabled
5,416,638 UART: [fht] FMC Alias Private Key: 7
5,525,266 UART: [art] Extend RT PCRs Done
5,525,694 UART: [art] Lock RT PCRs Done
5,527,212 UART: [art] Populate DV Done
5,535,490 UART: [fht] FMC Alias Private Key: 7
5,536,436 UART: [art] Derive CDI
5,536,716 UART: [art] Store in in slot 0x4
5,622,535 UART: [art] Derive Key Pair
5,622,895 UART: [art] Store priv key in slot 0x5
5,636,365 UART: [art] Derive Key Pair - Done
5,650,737 UART: [art] Signing Cert with AUTHO
5,651,217 UART: RITY.KEYID = 7
5,666,813 UART: [art] Erasing AUTHORITY.KEYID = 7
5,667,578 UART: [art] PUB.X = 36580A9B05272B27C62F2EA9DBD765DFCDFD77B72DEFCCE6DAD42E66243DB184BFEA3ADBD544DCDD4DBA1377C44912F7
5,674,372 UART: [art] PUB.Y = EEE88799315D265BF80A645DD71BD3D8CB9D8962044086596E042D2541C0E85FC7C770F0580990D22B86BF3FBCCC1B57
5,681,314 UART: [art] SIG.R = E758E0FDF3E48C235AF0C6972CAAAE2EB8F7B9661DDEA4452D37186229E15AD27900B1FF05A550C16BFEE09B150327FC
5,688,072 UART: [art] SIG.S = 5868AA24E889C76C249C76896BE6703434EE12E6B85B063D0336FFF78E2CDDDB7962BD443C6EFE9C51C9BDFD5CF10749
5,712,104 UART: Caliptra RT
5,712,449 UART: [state] CFI Enabled
5,820,034 UART: [rt] RT listening for mailbox commands...
5,820,704 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,943,544 UART: [rt]cmd =0x41544d4e, len=14344
5,945,055 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,286 ready_for_fw is high
1,363,286 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,391,036 >>> mbox cmd response: success
5,452,627 UART:
5,452,643 UART: Running Caliptra FMC ...
5,453,051 UART:
5,453,194 UART: [state] CFI Enabled
5,463,792 UART: [fht] FMC Alias Private Key: 7
5,571,916 UART: [art] Extend RT PCRs Done
5,572,344 UART: [art] Lock RT PCRs Done
5,573,796 UART: [art] Populate DV Done
5,581,982 UART: [fht] FMC Alias Private Key: 7
5,583,138 UART: [art] Derive CDI
5,583,418 UART: [art] Store in in slot 0x4
5,669,271 UART: [art] Derive Key Pair
5,669,631 UART: [art] Store priv key in slot 0x5
5,682,613 UART: [art] Derive Key Pair - Done
5,697,301 UART: [art] Signing Cert with AUTHO
5,697,781 UART: RITY.KEYID = 7
5,713,065 UART: [art] Erasing AUTHORITY.KEYID = 7
5,713,830 UART: [art] PUB.X = 65CFD461621BE8CEF86A4DE6921B217E6F880CC7AD25F87707278D5E6A61EFF0D7F7F31F0FEE23B520278539D88477F3
5,720,599 UART: [art] PUB.Y = 0B0F04C0DEB0EE16833653B4BBD4EF350A71FEDCB950A840CB41934D4FD6AC95150B9714660A126EA0FD6E281A83345D
5,727,543 UART: [art] SIG.R = 996FD89E47F7D056D4A9A84E8933315C740B65FCD1AC911030B98948D4B48C2FE23428D2C97A6A7ADDCC31928EE1078D
5,734,313 UART: [art] SIG.S = 282E2BA45573FE979591B4E7D355432BA9163CEE5EB7AAE123CD34B4A44B43F3500AB71B0AEF1245EC43B67638342276
5,758,566 UART: Caliptra RT
5,758,911 UART: [state] CFI Enabled
5,867,074 UART: [rt] RT listening for mailbox commands...
5,867,744 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,990,730 UART: [rt]cmd =0x41544d4e, len=14344
5,992,261 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,319 UART: [state] WD Timer not started. Device not locked for debugging
87,492 UART: [kat] SHA2-256
893,142 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,267 UART: [kat] ++
897,419 UART: [kat] sha1
901,609 UART: [kat] SHA2-256
903,549 UART: [kat] SHA2-384
906,198 UART: [kat] SHA2-512-ACC
908,099 UART: [kat] ECC-384
918,336 UART: [kat] HMAC-384Kdf
923,016 UART: [kat] LMS
1,171,344 UART: [kat] --
1,172,353 UART: [cold-reset] ++
1,172,849 UART: [fht] FHT @ 0x50003400
1,175,614 UART: [idev] ++
1,175,782 UART: [idev] CDI.KEYID = 6
1,176,142 UART: [idev] SUBJECT.KEYID = 7
1,176,566 UART: [idev] UDS.KEYID = 0
1,176,911 ready_for_fw is high
1,176,911 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,580 UART: [idev] Erasing UDS.KEYID = 0
1,201,913 UART: [idev] Sha1 KeyId Algorithm
1,210,327 UART: [idev] --
1,211,335 UART: [ldev] ++
1,211,503 UART: [ldev] CDI.KEYID = 6
1,211,866 UART: [ldev] SUBJECT.KEYID = 5
1,212,292 UART: [ldev] AUTHORITY.KEYID = 7
1,212,755 UART: [ldev] FE.KEYID = 1
1,218,045 UART: [ldev] Erasing FE.KEYID = 1
1,244,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,985 UART: [ldev] --
1,283,300 UART: [fwproc] Wait for Commands...
1,283,912 UART: [fwproc] Recv command 0x46574c44
1,284,640 UART: [fwproc] Recv'd Img size: 114332 bytes
3,128,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,341 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,645 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,321,434 >>> mbox cmd response: success
3,322,688 UART: [afmc] ++
3,322,856 UART: [afmc] CDI.KEYID = 6
3,323,218 UART: [afmc] SUBJECT.KEYID = 7
3,323,643 UART: [afmc] AUTHORITY.KEYID = 5
3,359,023 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,612 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,321 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,213 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,924 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,737 UART: [afmc] --
3,402,805 UART: [cold-reset] --
3,403,685 UART: [state] Locking Datavault
3,404,812 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,416 UART: [state] Locking ICCM
3,405,966 UART: [exit] Launching FMC @ 0x40000130
3,411,295 UART:
3,411,311 UART: Running Caliptra FMC ...
3,411,719 UART:
3,411,773 UART: [state] CFI Enabled
3,421,999 UART: [fht] FMC Alias Private Key: 7
3,529,705 UART: [art] Extend RT PCRs Done
3,530,133 UART: [art] Lock RT PCRs Done
3,531,383 UART: [art] Populate DV Done
3,539,723 UART: [fht] FMC Alias Private Key: 7
3,540,777 UART: [art] Derive CDI
3,541,057 UART: [art] Store in in slot 0x4
3,626,854 UART: [art] Derive Key Pair
3,627,214 UART: [art] Store priv key in slot 0x5
3,639,770 UART: [art] Derive Key Pair - Done
3,654,356 UART: [art] Signing Cert with AUTHO
3,654,836 UART: RITY.KEYID = 7
3,670,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,021 UART: [art] PUB.X = 7F6C869366CE81B6192B454A6A095DED9D4E9CBF9D45C15B0210C48F3F6F63CC67A0E7593EF9C442EE36DB3839BE3296
3,677,795 UART: [art] PUB.Y = 70C3B05A943779E23246857EA289107D7A8711CC50A249947F0C3FA4050BA21283DE4EB01F031580D41B6F75B61A5C04
3,684,724 UART: [art] SIG.R = 7DC81978A3FB9F1F010130EF96BA0C1EFD68A86547E3CD96B7AC8AED158C47FB0A926A20C8AAC1A5E039221B36F56065
3,691,496 UART: [art] SIG.S = 49DC6A386BEBD934C4C52D76ADBFA46BC8612E2CF0A39FBD5A3256549181640DBD0FD6BDE9C3AB7444FBDA1AF74762FA
3,715,473 UART: Caliptra RT
3,715,726 UART: [state] CFI Enabled
3,823,287 UART: [rt] RT listening for mailbox commands...
3,823,957 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,895 UART: [rt]cmd =0x41544d4e, len=14344
3,948,252 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,847 ready_for_fw is high
1,059,847 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,166,459 >>> mbox cmd response: success
3,229,226 UART:
3,229,242 UART: Running Caliptra FMC ...
3,229,650 UART:
3,229,704 UART: [state] CFI Enabled
3,240,058 UART: [fht] FMC Alias Private Key: 7
3,347,242 UART: [art] Extend RT PCRs Done
3,347,670 UART: [art] Lock RT PCRs Done
3,348,890 UART: [art] Populate DV Done
3,357,148 UART: [fht] FMC Alias Private Key: 7
3,358,164 UART: [art] Derive CDI
3,358,444 UART: [art] Store in in slot 0x4
3,444,061 UART: [art] Derive Key Pair
3,444,421 UART: [art] Store priv key in slot 0x5
3,458,025 UART: [art] Derive Key Pair - Done
3,472,887 UART: [art] Signing Cert with AUTHO
3,473,367 UART: RITY.KEYID = 7
3,488,833 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,598 UART: [art] PUB.X = 2B85F10FB9DFA5322C40960DAF3A729E93C1693789CADDF4F07258E2308384C3D00C26949F9BF43277F6F410D58D2F63
3,496,361 UART: [art] PUB.Y = 15A678FFD678D5E746E225A0160F5AEF44E09D9A95F20D5538CD4AED46433DC776C351D566F3EC6D04DB309C6C1A79B6
3,503,312 UART: [art] SIG.R = 9CCEDDAC03089897D2EC3111DCBCB442E14630280E8C80B637FF767184A68B2E2A7ECF57876C20C209167E3C05250B57
3,510,068 UART: [art] SIG.S = 708F40AD184AEBA70B0A46CE6033B4E6DA9CA3905FE0A2B6DBA8F3D91CF756FA17ABC3491CE3F634EE83055272DBA53E
3,533,632 UART: Caliptra RT
3,533,885 UART: [state] CFI Enabled
3,642,781 UART: [rt] RT listening for mailbox commands...
3,643,451 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,637 UART: [rt]cmd =0x41544d4e, len=14344
3,768,078 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,061 UART: [kat] SHA2-256
893,711 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,836 UART: [kat] ++
897,988 UART: [kat] sha1
902,184 UART: [kat] SHA2-256
904,124 UART: [kat] SHA2-384
906,811 UART: [kat] SHA2-512-ACC
908,712 UART: [kat] ECC-384
918,207 UART: [kat] HMAC-384Kdf
922,873 UART: [kat] LMS
1,171,201 UART: [kat] --
1,172,014 UART: [cold-reset] ++
1,172,530 UART: [fht] FHT @ 0x50003400
1,175,239 UART: [idev] ++
1,175,407 UART: [idev] CDI.KEYID = 6
1,175,767 UART: [idev] SUBJECT.KEYID = 7
1,176,191 UART: [idev] UDS.KEYID = 0
1,176,536 ready_for_fw is high
1,176,536 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,549 UART: [idev] Erasing UDS.KEYID = 0
1,201,466 UART: [idev] Sha1 KeyId Algorithm
1,209,870 UART: [idev] --
1,210,902 UART: [ldev] ++
1,211,070 UART: [ldev] CDI.KEYID = 6
1,211,433 UART: [ldev] SUBJECT.KEYID = 5
1,211,859 UART: [ldev] AUTHORITY.KEYID = 7
1,212,322 UART: [ldev] FE.KEYID = 1
1,217,452 UART: [ldev] Erasing FE.KEYID = 1
1,243,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,748 UART: [ldev] --
1,283,067 UART: [fwproc] Wait for Commands...
1,283,869 UART: [fwproc] Recv command 0x46574c44
1,284,597 UART: [fwproc] Recv'd Img size: 114332 bytes
3,126,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,029 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,333 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,319,036 >>> mbox cmd response: success
3,320,214 UART: [afmc] ++
3,320,382 UART: [afmc] CDI.KEYID = 6
3,320,744 UART: [afmc] SUBJECT.KEYID = 7
3,321,169 UART: [afmc] AUTHORITY.KEYID = 5
3,356,525 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,744 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,453 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,345 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,056 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,791 UART: [afmc] --
3,399,817 UART: [cold-reset] --
3,400,441 UART: [state] Locking Datavault
3,401,366 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,970 UART: [state] Locking ICCM
3,402,424 UART: [exit] Launching FMC @ 0x40000130
3,407,753 UART:
3,407,769 UART: Running Caliptra FMC ...
3,408,177 UART:
3,408,320 UART: [state] CFI Enabled
3,419,070 UART: [fht] FMC Alias Private Key: 7
3,526,672 UART: [art] Extend RT PCRs Done
3,527,100 UART: [art] Lock RT PCRs Done
3,528,414 UART: [art] Populate DV Done
3,536,582 UART: [fht] FMC Alias Private Key: 7
3,537,764 UART: [art] Derive CDI
3,538,044 UART: [art] Store in in slot 0x4
3,623,623 UART: [art] Derive Key Pair
3,623,983 UART: [art] Store priv key in slot 0x5
3,636,967 UART: [art] Derive Key Pair - Done
3,651,475 UART: [art] Signing Cert with AUTHO
3,651,955 UART: RITY.KEYID = 7
3,667,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,998 UART: [art] PUB.X = 1C644AFE43DA453818A329F5FD397B07D1888123D5AAE6C5DCB7C1CB2FF5E35F083C049FC30F8E13D88E12F1F1277480
3,674,766 UART: [art] PUB.Y = ACECFCC5906333D31D16A5D0E6CD88A4CCC4D40D6EEDF280D7C34D112F7F51648612A4F873185B40D03417EDE6DB8E9F
3,681,731 UART: [art] SIG.R = C5C138C66544A90F631F4FB7C5481FE1A618A732FF2C09C09550AFA9854208BBA6B75364C927484A3E5FABF0E14647C6
3,688,496 UART: [art] SIG.S = DEA348532C7973B0ACE2DF601643C4B508228868DA98848EFE524912357D8CE20E23686665DB9A5FEA898B1AB72327E1
3,712,473 UART: Caliptra RT
3,712,818 UART: [state] CFI Enabled
3,820,719 UART: [rt] RT listening for mailbox commands...
3,821,389 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,555 UART: [rt]cmd =0x41544d4e, len=14344
3,945,896 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,414 ready_for_fw is high
1,060,414 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,174,536 >>> mbox cmd response: success
3,236,649 UART:
3,236,665 UART: Running Caliptra FMC ...
3,237,073 UART:
3,237,216 UART: [state] CFI Enabled
3,247,718 UART: [fht] FMC Alias Private Key: 7
3,355,758 UART: [art] Extend RT PCRs Done
3,356,186 UART: [art] Lock RT PCRs Done
3,357,866 UART: [art] Populate DV Done
3,366,288 UART: [fht] FMC Alias Private Key: 7
3,367,370 UART: [art] Derive CDI
3,367,650 UART: [art] Store in in slot 0x4
3,453,427 UART: [art] Derive Key Pair
3,453,787 UART: [art] Store priv key in slot 0x5
3,466,937 UART: [art] Derive Key Pair - Done
3,481,611 UART: [art] Signing Cert with AUTHO
3,482,091 UART: RITY.KEYID = 7
3,497,753 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,518 UART: [art] PUB.X = 6054E1AA18B0821AE00BF195B3978574F1AFD3AD952E58A8BB2A222C094F0729D0998E90CBC3D58EECFEB0A5A8307EAF
3,505,295 UART: [art] PUB.Y = 6DD8FC171580284F04D5A4761203CE66E5371DD23F2DF3BD02C8B56C5F0381A33AE5C360C88807D502A82911444238FC
3,512,225 UART: [art] SIG.R = A889F4C55846484F4D8B3CE286E2815FC46CAE23DBDEC37088DE7B5BD4464AEE203616127E7DEC5AB488B75EAF12D5E1
3,519,011 UART: [art] SIG.S = E0F31121A5421FC8EFA3F8849A93DDEEC5481A833AC74FE9D6DDF33D48F47D6AFDA8B8ECAEC8EFFC9EF4297057FC9D5A
3,542,638 UART: Caliptra RT
3,542,983 UART: [state] CFI Enabled
3,650,028 UART: [rt] RT listening for mailbox commands...
3,650,698 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,746 UART: [rt]cmd =0x41544d4e, len=14344
3,775,505 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
891,360 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,489 UART: [kat] ++
895,641 UART: [kat] sha1
900,001 UART: [kat] SHA2-256
901,941 UART: [kat] SHA2-384
904,656 UART: [kat] SHA2-512-ACC
906,557 UART: [kat] ECC-384
916,192 UART: [kat] HMAC-384Kdf
920,602 UART: [kat] LMS
1,168,914 UART: [kat] --
1,169,677 UART: [cold-reset] ++
1,170,173 UART: [fht] FHT @ 0x50003400
1,172,833 UART: [idev] ++
1,173,001 UART: [idev] CDI.KEYID = 6
1,173,362 UART: [idev] SUBJECT.KEYID = 7
1,173,787 UART: [idev] UDS.KEYID = 0
1,174,133 ready_for_fw is high
1,174,133 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,813 UART: [idev] Erasing UDS.KEYID = 0
1,199,083 UART: [idev] Sha1 KeyId Algorithm
1,207,863 UART: [idev] --
1,208,828 UART: [ldev] ++
1,208,996 UART: [ldev] CDI.KEYID = 6
1,209,360 UART: [ldev] SUBJECT.KEYID = 5
1,209,787 UART: [ldev] AUTHORITY.KEYID = 7
1,210,250 UART: [ldev] FE.KEYID = 1
1,215,566 UART: [ldev] Erasing FE.KEYID = 1
1,242,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,738 UART: [ldev] --
1,282,090 UART: [fwproc] Wait for Commands...
1,282,667 UART: [fwproc] Recv command 0x46574c44
1,283,400 UART: [fwproc] Recv'd Img size: 114332 bytes
3,122,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,410 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,719 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,316,523 >>> mbox cmd response: success
3,317,640 UART: [afmc] ++
3,317,808 UART: [afmc] CDI.KEYID = 6
3,318,171 UART: [afmc] SUBJECT.KEYID = 7
3,318,597 UART: [afmc] AUTHORITY.KEYID = 5
3,353,725 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,953 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,704 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,414 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,304 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,015 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,737 UART: [afmc] --
3,396,691 UART: [cold-reset] --
3,397,669 UART: [state] Locking Datavault
3,398,816 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,420 UART: [state] Locking ICCM
3,399,944 UART: [exit] Launching FMC @ 0x40000130
3,405,273 UART:
3,405,289 UART: Running Caliptra FMC ...
3,405,697 UART:
3,405,751 UART: [state] CFI Enabled
3,416,053 UART: [fht] FMC Alias Private Key: 7
3,523,969 UART: [art] Extend RT PCRs Done
3,524,397 UART: [art] Lock RT PCRs Done
3,526,223 UART: [art] Populate DV Done
3,534,537 UART: [fht] FMC Alias Private Key: 7
3,535,601 UART: [art] Derive CDI
3,535,881 UART: [art] Store in in slot 0x4
3,621,696 UART: [art] Derive Key Pair
3,622,056 UART: [art] Store priv key in slot 0x5
3,635,710 UART: [art] Derive Key Pair - Done
3,650,133 UART: [art] Signing Cert with AUTHO
3,650,613 UART: RITY.KEYID = 7
3,665,659 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,424 UART: [art] PUB.X = E362AC96BC073F13A8E288E61B5F6AFC274849BA4DCF5395CDACB6C97038D6788603E4BD4B07AC64C00AC30DEE7CD2B1
3,673,199 UART: [art] PUB.Y = AC72CBE9593E98D7DDC7506BB908B9E4985F21C0A4204D983AFE2482B12D7E21A83FDE0C046694A480250D8A4CF2EA7C
3,680,149 UART: [art] SIG.R = 6B000C35B5FDFB51F3BBE26CF16D1F763F5B33ADA007D7F4F2F5AE14A3CF3FF8A24F9AA034298A74C774716C91C70FAA
3,686,910 UART: [art] SIG.S = 683B3873870957BC45DBBE3291576B5390FB394728064DACB94000BC7625981F64DE0B31EA76FF8F4A95D1A864B0F156
3,710,682 UART: Caliptra RT
3,710,935 UART: [state] CFI Enabled
3,818,944 UART: [rt] RT listening for mailbox commands...
3,819,614 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,368 UART: [rt]cmd =0x41544d4e, len=14344
3,943,925 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,020 ready_for_fw is high
1,056,020 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,149,803 >>> mbox cmd response: success
3,211,790 UART:
3,211,806 UART: Running Caliptra FMC ...
3,212,214 UART:
3,212,268 UART: [state] CFI Enabled
3,222,520 UART: [fht] FMC Alias Private Key: 7
3,330,266 UART: [art] Extend RT PCRs Done
3,330,694 UART: [art] Lock RT PCRs Done
3,332,328 UART: [art] Populate DV Done
3,340,578 UART: [fht] FMC Alias Private Key: 7
3,341,754 UART: [art] Derive CDI
3,342,034 UART: [art] Store in in slot 0x4
3,427,887 UART: [art] Derive Key Pair
3,428,247 UART: [art] Store priv key in slot 0x5
3,441,269 UART: [art] Derive Key Pair - Done
3,456,228 UART: [art] Signing Cert with AUTHO
3,456,708 UART: RITY.KEYID = 7
3,472,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,473,127 UART: [art] PUB.X = 8B5B12BCBD2D87889FFF9502058567961E2535B32DB1DFC5339D590AC9937685AC24928C9FEAEE03937AE67EBAD3FA66
3,479,895 UART: [art] PUB.Y = 6BA813E4F3840E2D1E1A56AD6635548FC68F55A5E5E2374A4E2B1A9D5D8BA1D3722B9361D8A09E4A15E04879CCE02557
3,486,848 UART: [art] SIG.R = C98B8E8E63EB6444E6BAFCF65D33C768AA28804D28EDDF95F701E4FC5FF3F6293198696F72BAE308D607AC7159728D2E
3,493,621 UART: [art] SIG.S = D5F837B2E4F86695BE9434875045E40450E5ACBF33D808031A442DEA66F5D8F77C26414311CA6376E9C0707F8B5D68B3
3,517,695 UART: Caliptra RT
3,517,948 UART: [state] CFI Enabled
3,624,841 UART: [rt] RT listening for mailbox commands...
3,625,511 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,748,435 UART: [rt]cmd =0x41544d4e, len=14344
3,749,808 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,408 UART: [state] WD Timer not started. Device not locked for debugging
87,619 UART: [kat] SHA2-256
891,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,298 UART: [kat] ++
895,450 UART: [kat] sha1
899,762 UART: [kat] SHA2-256
901,702 UART: [kat] SHA2-384
904,631 UART: [kat] SHA2-512-ACC
906,532 UART: [kat] ECC-384
916,137 UART: [kat] HMAC-384Kdf
920,775 UART: [kat] LMS
1,169,087 UART: [kat] --
1,170,156 UART: [cold-reset] ++
1,170,680 UART: [fht] FHT @ 0x50003400
1,173,136 UART: [idev] ++
1,173,304 UART: [idev] CDI.KEYID = 6
1,173,665 UART: [idev] SUBJECT.KEYID = 7
1,174,090 UART: [idev] UDS.KEYID = 0
1,174,436 ready_for_fw is high
1,174,436 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,146 UART: [idev] Erasing UDS.KEYID = 0
1,199,382 UART: [idev] Sha1 KeyId Algorithm
1,208,176 UART: [idev] --
1,209,175 UART: [ldev] ++
1,209,343 UART: [ldev] CDI.KEYID = 6
1,209,707 UART: [ldev] SUBJECT.KEYID = 5
1,210,134 UART: [ldev] AUTHORITY.KEYID = 7
1,210,597 UART: [ldev] FE.KEYID = 1
1,215,793 UART: [ldev] Erasing FE.KEYID = 1
1,242,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,011 UART: [ldev] --
1,282,453 UART: [fwproc] Wait for Commands...
1,283,108 UART: [fwproc] Recv command 0x46574c44
1,283,841 UART: [fwproc] Recv'd Img size: 114332 bytes
3,129,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,848 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,157 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,322,997 >>> mbox cmd response: success
3,324,070 UART: [afmc] ++
3,324,238 UART: [afmc] CDI.KEYID = 6
3,324,601 UART: [afmc] SUBJECT.KEYID = 7
3,325,027 UART: [afmc] AUTHORITY.KEYID = 5
3,360,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,589 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,340 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,050 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,940 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,651 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,395 UART: [afmc] --
3,404,429 UART: [cold-reset] --
3,405,379 UART: [state] Locking Datavault
3,406,612 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,216 UART: [state] Locking ICCM
3,407,736 UART: [exit] Launching FMC @ 0x40000130
3,413,065 UART:
3,413,081 UART: Running Caliptra FMC ...
3,413,489 UART:
3,413,632 UART: [state] CFI Enabled
3,424,370 UART: [fht] FMC Alias Private Key: 7
3,532,590 UART: [art] Extend RT PCRs Done
3,533,018 UART: [art] Lock RT PCRs Done
3,534,620 UART: [art] Populate DV Done
3,542,538 UART: [fht] FMC Alias Private Key: 7
3,543,624 UART: [art] Derive CDI
3,543,904 UART: [art] Store in in slot 0x4
3,629,441 UART: [art] Derive Key Pair
3,629,801 UART: [art] Store priv key in slot 0x5
3,643,203 UART: [art] Derive Key Pair - Done
3,657,863 UART: [art] Signing Cert with AUTHO
3,658,343 UART: RITY.KEYID = 7
3,673,667 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,432 UART: [art] PUB.X = C8857950B17069DBC636191AF29F6F9D3967C28234A93AF24C84608329CEA110C253A75C100641DBFAD0BED14256EE2D
3,681,201 UART: [art] PUB.Y = EEA5958125628C03033689D7CBF24F1D6CB17FB5786D637571BD59E0DB8A4C06A9FE200F39F2C3FD6202A44AD605CD7F
3,688,143 UART: [art] SIG.R = 1790221E6A8A8C91BF9E3EA6CF4AC377222A00CF81F39DD898B07EDC9EC4A221927A4AD3F2B8272AE0DF6968077CB460
3,694,900 UART: [art] SIG.S = BBDF01FEA1EA6AE2E924FBE4EE021AA7C0125A33124EC5D002AF3F05D10E325D7D2E68D01A97B7A6D20D838918C7B931
3,718,731 UART: Caliptra RT
3,719,076 UART: [state] CFI Enabled
3,826,382 UART: [rt] RT listening for mailbox commands...
3,827,052 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,236 UART: [rt]cmd =0x41544d4e, len=14344
3,951,575 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,967 ready_for_fw is high
1,056,967 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,168,129 >>> mbox cmd response: success
3,231,314 UART:
3,231,330 UART: Running Caliptra FMC ...
3,231,738 UART:
3,231,881 UART: [state] CFI Enabled
3,242,397 UART: [fht] FMC Alias Private Key: 7
3,350,151 UART: [art] Extend RT PCRs Done
3,350,579 UART: [art] Lock RT PCRs Done
3,352,343 UART: [art] Populate DV Done
3,360,667 UART: [fht] FMC Alias Private Key: 7
3,361,789 UART: [art] Derive CDI
3,362,069 UART: [art] Store in in slot 0x4
3,447,786 UART: [art] Derive Key Pair
3,448,146 UART: [art] Store priv key in slot 0x5
3,461,480 UART: [art] Derive Key Pair - Done
3,476,419 UART: [art] Signing Cert with AUTHO
3,476,899 UART: RITY.KEYID = 7
3,492,035 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,800 UART: [art] PUB.X = 4C6700B741C1941F86DAF7C340411F8ED6A5D73B3C3E2D05903B1A29C30846916F78F888C332DF0986D8DDC00EF61F7A
3,499,540 UART: [art] PUB.Y = 79B341AD1158BD6787FECCEBCE56713CF18D477B435223B2354F783A3600ACC2F45CC4BC9AC7690EEFDFBD15626E0361
3,506,476 UART: [art] SIG.R = 276D4ED19456A607DD459E4052346EFE370447E6624129C9C627EFCEB3BBA56966021F90A0A52D890AFF835EC9C2C208
3,513,233 UART: [art] SIG.S = 5F48E8FBBABA34590FB44402D4C78292179D5BE549B3C8D26141A6016B062CE4F599C88BFFCD0D615AD5F76A3F7BD8DC
3,536,757 UART: Caliptra RT
3,537,102 UART: [state] CFI Enabled
3,644,727 UART: [rt] RT listening for mailbox commands...
3,645,397 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,367 UART: [rt]cmd =0x41544d4e, len=14344
3,769,976 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,305 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,969 UART: [kat] SHA2-256
881,900 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,015 UART: [kat] ++
886,167 UART: [kat] sha1
890,439 UART: [kat] SHA2-256
892,377 UART: [kat] SHA2-384
895,160 UART: [kat] SHA2-512-ACC
897,061 UART: [kat] ECC-384
902,548 UART: [kat] HMAC-384Kdf
907,084 UART: [kat] LMS
1,475,280 UART: [kat] --
1,476,259 UART: [cold-reset] ++
1,476,647 UART: [fht] Storing FHT @ 0x50003400
1,479,270 UART: [idev] ++
1,479,438 UART: [idev] CDI.KEYID = 6
1,479,798 UART: [idev] SUBJECT.KEYID = 7
1,480,222 UART: [idev] UDS.KEYID = 0
1,480,567 ready_for_fw is high
1,480,567 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,106 UART: [idev] Erasing UDS.KEYID = 0
1,504,610 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,086 UART: [idev] --
1,514,203 UART: [ldev] ++
1,514,371 UART: [ldev] CDI.KEYID = 6
1,514,734 UART: [ldev] SUBJECT.KEYID = 5
1,515,160 UART: [ldev] AUTHORITY.KEYID = 7
1,515,623 UART: [ldev] FE.KEYID = 1
1,520,717 UART: [ldev] Erasing FE.KEYID = 1
1,546,838 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,452 UART: [ldev] --
1,585,873 UART: [fwproc] Waiting for Commands...
1,586,680 UART: [fwproc] Received command 0x46574c44
1,587,471 UART: [fwproc] Received Image of size 114332 bytes
5,120,256 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,148,886 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,178,238 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,314,195 >>> mbox cmd response: success
5,315,431 UART: [afmc] ++
5,315,599 UART: [afmc] CDI.KEYID = 6
5,315,961 UART: [afmc] SUBJECT.KEYID = 7
5,316,386 UART: [afmc] AUTHORITY.KEYID = 5
5,351,818 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,368,184 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,368,964 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,374,673 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,380,565 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,386,266 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,394,140 UART: [afmc] --
5,395,078 UART: [cold-reset] --
5,395,898 UART: [state] Locking Datavault
5,397,291 UART: [state] Locking PCR0, PCR1 and PCR31
5,397,895 UART: [state] Locking ICCM
5,398,327 UART: [exit] Launching FMC @ 0x40000130
5,403,656 UART:
5,403,672 UART: Running Caliptra FMC ...
5,404,080 UART:
5,404,134 UART: [state] CFI Enabled
5,414,308 UART: [fht] FMC Alias Private Key: 7
5,522,296 UART: [art] Extend RT PCRs Done
5,522,724 UART: [art] Lock RT PCRs Done
5,524,204 UART: [art] Populate DV Done
5,532,386 UART: [fht] FMC Alias Private Key: 7
5,533,498 UART: [art] Derive CDI
5,533,778 UART: [art] Store in in slot 0x4
5,619,305 UART: [art] Derive Key Pair
5,619,665 UART: [art] Store priv key in slot 0x5
5,632,011 UART: [art] Derive Key Pair - Done
5,646,676 UART: [art] Signing Cert with AUTHO
5,647,156 UART: RITY.KEYID = 7
5,662,592 UART: [art] Erasing AUTHORITY.KEYID = 7
5,663,357 UART: [art] PUB.X = 616C6F5CF8B97B76C46A6506041B04FEAA0E9987398C441996B82A6B9B31F7BF928CCF16389C682240B12B94082EE8AE
5,670,114 UART: [art] PUB.Y = DDE83061DA703FEA26B3DE8ABD6ABBE52BA7780EA1AE5740726E5690D97CA1E94D244051589B429DCE5DB06B46F7CE7A
5,677,081 UART: [art] SIG.R = AB6F252D727407F441852274B6012D9C7E91AD99A759F565C6649A69A786C59C470ACBA9B2CAAD66DB04988041078E2A
5,683,836 UART: [art] SIG.S = 6F6CEB74777ADC4A23386614AAEEDA417A7F07DF8C4580DE2970FEC28B0438A5FD1BBCC8194AC1647686345BD9744A70
5,707,709 UART: Caliptra RT
5,707,962 UART: [state] CFI Enabled
5,815,909 UART: [rt] RT listening for mailbox commands...
5,816,579 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,939,303 UART: [rt]cmd =0x41544d4e, len=14344
5,945,942 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,919 ready_for_fw is high
1,362,919 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,164,061 >>> mbox cmd response: success
5,225,478 UART:
5,225,494 UART: Running Caliptra FMC ...
5,225,902 UART:
5,225,956 UART: [state] CFI Enabled
5,236,714 UART: [fht] FMC Alias Private Key: 7
5,344,340 UART: [art] Extend RT PCRs Done
5,344,768 UART: [art] Lock RT PCRs Done
5,346,342 UART: [art] Populate DV Done
5,354,682 UART: [fht] FMC Alias Private Key: 7
5,355,800 UART: [art] Derive CDI
5,356,080 UART: [art] Store in in slot 0x4
5,441,629 UART: [art] Derive Key Pair
5,441,989 UART: [art] Store priv key in slot 0x5
5,454,221 UART: [art] Derive Key Pair - Done
5,469,455 UART: [art] Signing Cert with AUTHO
5,469,935 UART: RITY.KEYID = 7
5,485,331 UART: [art] Erasing AUTHORITY.KEYID = 7
5,486,096 UART: [art] PUB.X = E1B53F57546F3E035E03EE77C4ABA78C4BF0FE678BFCDAAF34BC94341DCBE3778AF52246599A352725F7A2CB481F801A
5,492,876 UART: [art] PUB.Y = 141847AE30B9B0C1A182B1D89FE439B3BA772A55EB87426464721AE5CEB62F0074E25DF89AE44B3C84C781B7E163B17D
5,499,810 UART: [art] SIG.R = 0151653AB22374FCF460CABB61185F207466DB763FAB5E25AD97B788CC9793D2602F6B2F401A673755D119BE68EC26E2
5,506,579 UART: [art] SIG.S = F65AFA045F4FE2EC2146C51F564257F8AD6CF3EDD3224E232B06F37F472EA385A9C1EE09B681BB3F5B84D6053B18E4A7
5,530,064 UART: Caliptra RT
5,530,317 UART: [state] CFI Enabled
5,638,500 UART: [rt] RT listening for mailbox commands...
5,639,170 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,762,230 UART: [rt]cmd =0x41544d4e, len=14344
5,768,625 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,946 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,632 UART: [kat] SHA2-256
882,563 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,678 UART: [kat] ++
886,830 UART: [kat] sha1
891,162 UART: [kat] SHA2-256
893,100 UART: [kat] SHA2-384
895,763 UART: [kat] SHA2-512-ACC
897,664 UART: [kat] ECC-384
903,347 UART: [kat] HMAC-384Kdf
908,109 UART: [kat] LMS
1,476,305 UART: [kat] --
1,477,224 UART: [cold-reset] ++
1,477,728 UART: [fht] Storing FHT @ 0x50003400
1,480,645 UART: [idev] ++
1,480,813 UART: [idev] CDI.KEYID = 6
1,481,173 UART: [idev] SUBJECT.KEYID = 7
1,481,597 UART: [idev] UDS.KEYID = 0
1,481,942 ready_for_fw is high
1,481,942 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,829 UART: [idev] Erasing UDS.KEYID = 0
1,506,027 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,819 UART: [idev] --
1,516,018 UART: [ldev] ++
1,516,186 UART: [ldev] CDI.KEYID = 6
1,516,549 UART: [ldev] SUBJECT.KEYID = 5
1,516,975 UART: [ldev] AUTHORITY.KEYID = 7
1,517,438 UART: [ldev] FE.KEYID = 1
1,522,618 UART: [ldev] Erasing FE.KEYID = 1
1,547,813 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,435 UART: [ldev] --
1,586,926 UART: [fwproc] Waiting for Commands...
1,587,637 UART: [fwproc] Received command 0x46574c44
1,588,428 UART: [fwproc] Received Image of size 114332 bytes
5,272,707 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,301,211 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,330,563 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,466,484 >>> mbox cmd response: success
5,467,626 UART: [afmc] ++
5,467,794 UART: [afmc] CDI.KEYID = 6
5,468,156 UART: [afmc] SUBJECT.KEYID = 7
5,468,581 UART: [afmc] AUTHORITY.KEYID = 5
5,503,387 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,519,881 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,520,661 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,526,370 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,532,262 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,537,963 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,545,757 UART: [afmc] --
5,546,769 UART: [cold-reset] --
5,547,759 UART: [state] Locking Datavault
5,548,748 UART: [state] Locking PCR0, PCR1 and PCR31
5,549,352 UART: [state] Locking ICCM
5,550,000 UART: [exit] Launching FMC @ 0x40000130
5,555,329 UART:
5,555,345 UART: Running Caliptra FMC ...
5,555,753 UART:
5,555,896 UART: [state] CFI Enabled
5,566,588 UART: [fht] FMC Alias Private Key: 7
5,673,736 UART: [art] Extend RT PCRs Done
5,674,164 UART: [art] Lock RT PCRs Done
5,675,752 UART: [art] Populate DV Done
5,683,968 UART: [fht] FMC Alias Private Key: 7
5,684,954 UART: [art] Derive CDI
5,685,234 UART: [art] Store in in slot 0x4
5,770,685 UART: [art] Derive Key Pair
5,771,045 UART: [art] Store priv key in slot 0x5
5,784,467 UART: [art] Derive Key Pair - Done
5,799,094 UART: [art] Signing Cert with AUTHO
5,799,574 UART: RITY.KEYID = 7
5,814,526 UART: [art] Erasing AUTHORITY.KEYID = 7
5,815,291 UART: [art] PUB.X = C12799889E3B12FF4855BA186C51F3589BCD3D019C1130C0EDF0F8D4D686905E8BCEFD1B928DFBFA6901488731DB0CED
5,822,066 UART: [art] PUB.Y = F97A2A56861761E707C7B1CE70E4904982E236445DE9B90603F47336545108D216A8250ED0FE34C18DE30BF20BB3037B
5,828,986 UART: [art] SIG.R = 2010F926CCA356C924C734F25E129D8304D9AA19F0344824E5F24D37D0531F4F1FC46EB88E55F65CAB504F35F931216E
5,835,753 UART: [art] SIG.S = D9E235EDEE4E042013300943DE1F792CB79099E35DDE862747527D269B065CFA9DA8EE1872739DE2708AA7C6ECC5E9BE
5,859,363 UART: Caliptra RT
5,859,708 UART: [state] CFI Enabled
5,968,483 UART: [rt] RT listening for mailbox commands...
5,969,153 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,091,943 UART: [rt]cmd =0x41544d4e, len=14344
6,098,334 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,900 ready_for_fw is high
1,362,900 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,127,823 >>> mbox cmd response: success
5,189,108 UART:
5,189,124 UART: Running Caliptra FMC ...
5,189,532 UART:
5,189,675 UART: [state] CFI Enabled
5,200,227 UART: [fht] FMC Alias Private Key: 7
5,307,601 UART: [art] Extend RT PCRs Done
5,308,029 UART: [art] Lock RT PCRs Done
5,309,409 UART: [art] Populate DV Done
5,317,437 UART: [fht] FMC Alias Private Key: 7
5,318,511 UART: [art] Derive CDI
5,318,791 UART: [art] Store in in slot 0x4
5,404,608 UART: [art] Derive Key Pair
5,404,968 UART: [art] Store priv key in slot 0x5
5,418,530 UART: [art] Derive Key Pair - Done
5,433,051 UART: [art] Signing Cert with AUTHO
5,433,531 UART: RITY.KEYID = 7
5,449,077 UART: [art] Erasing AUTHORITY.KEYID = 7
5,449,842 UART: [art] PUB.X = B88239BEC4674840F88F7152178E71CD91B4EE8FAA0A0D0B0FC677280D820C007B86B61BB84199174EABC5E8F601D132
5,456,573 UART: [art] PUB.Y = 70654247A8CA6E16FF7A2D77073252C20B99E43C8145E77B1F72A6B6EAE98A166C9B62A13C448C60B1F2EAC67CEFBC90
5,463,527 UART: [art] SIG.R = 133D1F64DF08C040C58045BFF6F191FAE1FFBBB411D5C0F450E0E755535EC6399CA04928EBDE686DD82C7BB8A083A6B3
5,470,310 UART: [art] SIG.S = E9611ADE24DB856375E77DE3226DF869C8C1A0677D63705CB2B34E917EA88AFDC8BA5B87BBE9DCCFB0DF9AFE54E52A9B
5,494,021 UART: Caliptra RT
5,494,366 UART: [state] CFI Enabled
5,602,821 UART: [rt] RT listening for mailbox commands...
5,603,491 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,726,593 UART: [rt]cmd =0x41544d4e, len=14344
5,732,868 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
893,262 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,387 UART: [kat] ++
897,539 UART: [kat] sha1
901,755 UART: [kat] SHA2-256
903,695 UART: [kat] SHA2-384
906,516 UART: [kat] SHA2-512-ACC
908,417 UART: [kat] ECC-384
918,162 UART: [kat] HMAC-384Kdf
922,772 UART: [kat] LMS
1,171,100 UART: [kat] --
1,172,235 UART: [cold-reset] ++
1,172,669 UART: [fht] FHT @ 0x50003400
1,175,188 UART: [idev] ++
1,175,356 UART: [idev] CDI.KEYID = 6
1,175,716 UART: [idev] SUBJECT.KEYID = 7
1,176,140 UART: [idev] UDS.KEYID = 0
1,176,485 ready_for_fw is high
1,176,485 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,416 UART: [idev] Erasing UDS.KEYID = 0
1,201,291 UART: [idev] Sha1 KeyId Algorithm
1,209,727 UART: [idev] --
1,210,769 UART: [ldev] ++
1,210,937 UART: [ldev] CDI.KEYID = 6
1,211,300 UART: [ldev] SUBJECT.KEYID = 5
1,211,726 UART: [ldev] AUTHORITY.KEYID = 7
1,212,189 UART: [ldev] FE.KEYID = 1
1,217,507 UART: [ldev] Erasing FE.KEYID = 1
1,244,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,357 UART: [ldev] --
1,283,630 UART: [fwproc] Wait for Commands...
1,284,314 UART: [fwproc] Recv command 0x46574c44
1,285,042 UART: [fwproc] Recv'd Img size: 114332 bytes
3,127,657 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,130 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,434 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,320,341 >>> mbox cmd response: success
3,321,393 UART: [afmc] ++
3,321,561 UART: [afmc] CDI.KEYID = 6
3,321,923 UART: [afmc] SUBJECT.KEYID = 7
3,322,348 UART: [afmc] AUTHORITY.KEYID = 5
3,357,602 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,135 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,883 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,592 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,484 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,195 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,254 UART: [afmc] --
3,401,280 UART: [cold-reset] --
3,402,208 UART: [state] Locking Datavault
3,403,173 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,777 UART: [state] Locking ICCM
3,404,225 UART: [exit] Launching FMC @ 0x40000130
3,409,554 UART:
3,409,570 UART: Running Caliptra FMC ...
3,409,978 UART:
3,410,032 UART: [state] CFI Enabled
3,420,422 UART: [fht] FMC Alias Private Key: 7
3,527,786 UART: [art] Extend RT PCRs Done
3,528,214 UART: [art] Lock RT PCRs Done
3,530,068 UART: [art] Populate DV Done
3,538,070 UART: [fht] FMC Alias Private Key: 7
3,539,102 UART: [art] Derive CDI
3,539,382 UART: [art] Store in in slot 0x4
3,625,173 UART: [art] Derive Key Pair
3,625,533 UART: [art] Store priv key in slot 0x5
3,638,423 UART: [art] Derive Key Pair - Done
3,653,108 UART: [art] Signing Cert with AUTHO
3,653,588 UART: RITY.KEYID = 7
3,669,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,791 UART: [art] PUB.X = 21A13F227AFE65FD635DCDBC388CBFBA156CDC0CD907A84BD1C71A28087B0DE483BDAFA97E16855C9EC16B6D0643964E
3,676,568 UART: [art] PUB.Y = E5652B69E8F78581A9DC76FE5D28193509F7309809ED06BAD129B2B7F0FFEBBC2E4615314854BF08260FD1FC319623D2
3,683,507 UART: [art] SIG.R = 7F67F8B95B9B0A3501AD4CCC0D053A72B152BE45C664836E4564F6D8AFD95E3E17680AAF7E073E4F39B7F3884BDA98C3
3,690,271 UART: [art] SIG.S = A510245612F714E5B97488A2929483FE5183EE00CD0A0D59CAD06D519E4B40827EA3BC2CEE6D3F21CCEE7BC5001DD179
3,714,080 UART: Caliptra RT
3,714,333 UART: [state] CFI Enabled
3,821,787 UART: [rt] RT listening for mailbox commands...
3,822,457 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,501 UART: [rt]cmd =0x41544d4e, len=14344
3,951,796 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,805 ready_for_fw is high
1,060,805 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,174,319 >>> mbox cmd response: success
3,236,010 UART:
3,236,026 UART: Running Caliptra FMC ...
3,236,434 UART:
3,236,488 UART: [state] CFI Enabled
3,247,156 UART: [fht] FMC Alias Private Key: 7
3,354,194 UART: [art] Extend RT PCRs Done
3,354,622 UART: [art] Lock RT PCRs Done
3,356,134 UART: [art] Populate DV Done
3,364,684 UART: [fht] FMC Alias Private Key: 7
3,365,856 UART: [art] Derive CDI
3,366,136 UART: [art] Store in in slot 0x4
3,451,643 UART: [art] Derive Key Pair
3,452,003 UART: [art] Store priv key in slot 0x5
3,465,737 UART: [art] Derive Key Pair - Done
3,480,458 UART: [art] Signing Cert with AUTHO
3,480,938 UART: RITY.KEYID = 7
3,495,808 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,573 UART: [art] PUB.X = FF97BF439EC4D7A04731357B3E980A9C547DF66F903E81DB63DB499A01C08B36327E9ACDBACCD54B831B71F77B568CCA
3,503,353 UART: [art] PUB.Y = AA1870A4145DF3A1DCE12E4D12017DB5FA6B4B5EA35CB07293EB09AAA8645001CA2CE9F2D890F8D776DAD3C1915F888A
3,510,312 UART: [art] SIG.R = 482403FB2564D9C8F019DF9B4CF6B87964A3E566F06E35FE818765C68EAD677FE76BFEE3927AEFD64FCE87A50BAD6797
3,517,090 UART: [art] SIG.S = 6A9234718420B7BACCFA6104951458EAE7F53C08829E1A0E6C5F0C4A14CEC2C5133599925073BA15E38899F52406B55B
3,541,680 UART: Caliptra RT
3,541,933 UART: [state] CFI Enabled
3,649,184 UART: [rt] RT listening for mailbox commands...
3,649,854 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,006 UART: [rt]cmd =0x41544d4e, len=14344
3,779,417 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,827 UART: [state] LifecycleState = Unprovisioned
86,482 UART: [state] DebugLocked = No
87,004 UART: [state] WD Timer not started. Device not locked for debugging
88,189 UART: [kat] SHA2-256
893,839 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,964 UART: [kat] ++
898,116 UART: [kat] sha1
902,278 UART: [kat] SHA2-256
904,218 UART: [kat] SHA2-384
906,983 UART: [kat] SHA2-512-ACC
908,884 UART: [kat] ECC-384
918,609 UART: [kat] HMAC-384Kdf
923,181 UART: [kat] LMS
1,171,509 UART: [kat] --
1,172,398 UART: [cold-reset] ++
1,172,812 UART: [fht] FHT @ 0x50003400
1,175,635 UART: [idev] ++
1,175,803 UART: [idev] CDI.KEYID = 6
1,176,163 UART: [idev] SUBJECT.KEYID = 7
1,176,587 UART: [idev] UDS.KEYID = 0
1,176,932 ready_for_fw is high
1,176,932 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,435 UART: [idev] Erasing UDS.KEYID = 0
1,201,440 UART: [idev] Sha1 KeyId Algorithm
1,210,040 UART: [idev] --
1,211,240 UART: [ldev] ++
1,211,408 UART: [ldev] CDI.KEYID = 6
1,211,771 UART: [ldev] SUBJECT.KEYID = 5
1,212,197 UART: [ldev] AUTHORITY.KEYID = 7
1,212,660 UART: [ldev] FE.KEYID = 1
1,217,836 UART: [ldev] Erasing FE.KEYID = 1
1,244,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,536 UART: [ldev] --
1,282,963 UART: [fwproc] Wait for Commands...
1,283,731 UART: [fwproc] Recv command 0x46574c44
1,284,459 UART: [fwproc] Recv'd Img size: 114332 bytes
3,121,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,510 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,814 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,313,581 >>> mbox cmd response: success
3,314,773 UART: [afmc] ++
3,314,941 UART: [afmc] CDI.KEYID = 6
3,315,303 UART: [afmc] SUBJECT.KEYID = 7
3,315,728 UART: [afmc] AUTHORITY.KEYID = 5
3,351,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,865 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,613 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,322 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,214 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,925 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,554 UART: [afmc] --
3,395,598 UART: [cold-reset] --
3,396,492 UART: [state] Locking Datavault
3,397,623 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,227 UART: [state] Locking ICCM
3,398,805 UART: [exit] Launching FMC @ 0x40000130
3,404,134 UART:
3,404,150 UART: Running Caliptra FMC ...
3,404,558 UART:
3,404,701 UART: [state] CFI Enabled
3,415,507 UART: [fht] FMC Alias Private Key: 7
3,523,581 UART: [art] Extend RT PCRs Done
3,524,009 UART: [art] Lock RT PCRs Done
3,525,427 UART: [art] Populate DV Done
3,533,963 UART: [fht] FMC Alias Private Key: 7
3,535,097 UART: [art] Derive CDI
3,535,377 UART: [art] Store in in slot 0x4
3,620,848 UART: [art] Derive Key Pair
3,621,208 UART: [art] Store priv key in slot 0x5
3,635,194 UART: [art] Derive Key Pair - Done
3,650,265 UART: [art] Signing Cert with AUTHO
3,650,745 UART: RITY.KEYID = 7
3,665,903 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,668 UART: [art] PUB.X = 750C6830BC85C772DCA99529BF6FEB863C59912CDE4ABE48F85A8B412888634DE916B68FDD0189E60FD52A2383916683
3,673,431 UART: [art] PUB.Y = 90A03C6369852097E55A68F30CA8086E1DE699E7AA2D9E3B6C10732D12D2CB315E67287E9381F5D00984E0D129CB8E21
3,680,370 UART: [art] SIG.R = 2B79D49B4C826E170164674E6C84E878EF873E187BED07432AE20F9277C2CEEBA11ED121FD22B7B2DADDE66E1D6EB8D6
3,687,147 UART: [art] SIG.S = 7AFE413C7E7D35D9B1B394D4FD627F9D50D05D0A6AE0DC09DFC7D6091C20F5244DEBB0E905B04E64F7164BDC5383B506
3,711,017 UART: Caliptra RT
3,711,362 UART: [state] CFI Enabled
3,819,521 UART: [rt] RT listening for mailbox commands...
3,820,191 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,289 UART: [rt]cmd =0x41544d4e, len=14344
3,949,288 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,316 ready_for_fw is high
1,060,316 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,168,390 >>> mbox cmd response: success
3,230,667 UART:
3,230,683 UART: Running Caliptra FMC ...
3,231,091 UART:
3,231,234 UART: [state] CFI Enabled
3,241,738 UART: [fht] FMC Alias Private Key: 7
3,350,218 UART: [art] Extend RT PCRs Done
3,350,646 UART: [art] Lock RT PCRs Done
3,352,298 UART: [art] Populate DV Done
3,360,388 UART: [fht] FMC Alias Private Key: 7
3,361,522 UART: [art] Derive CDI
3,361,802 UART: [art] Store in in slot 0x4
3,447,735 UART: [art] Derive Key Pair
3,448,095 UART: [art] Store priv key in slot 0x5
3,461,311 UART: [art] Derive Key Pair - Done
3,475,764 UART: [art] Signing Cert with AUTHO
3,476,244 UART: RITY.KEYID = 7
3,491,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,021 UART: [art] PUB.X = 0FDCBEFE8DB64B796489F900614765B38897531F512540C7C6DD121FDBA9F679786984F99E183035A780E1BB54A68AC5
3,498,766 UART: [art] PUB.Y = 775A0AFD69D020D121D29D0B5DE8E88B02C3B43C56DC47A86B8C99297D8154CD98B6CC543D9EA90B7CFD7EA556364646
3,505,714 UART: [art] SIG.R = 98A593C3A5F9DCE3646CB03F9BED1CC098C8BCCF1730AC16A8C1ADD4CCC7384455D1BFA708AC3046C2C227C093D0A69B
3,512,503 UART: [art] SIG.S = 43CE36FF7A7C7E32490594FB8A53EF25E38B4C0234C6F27240F160F094B8432A54EB244F21005209EEFD37A0CD79F8A8
3,536,719 UART: Caliptra RT
3,537,064 UART: [state] CFI Enabled
3,644,646 UART: [rt] RT listening for mailbox commands...
3,645,316 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,326 UART: [rt]cmd =0x41544d4e, len=14344
3,774,401 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Unprovisioned
85,949 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,888 UART: [kat] SHA2-256
891,438 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,567 UART: [kat] ++
895,719 UART: [kat] sha1
899,907 UART: [kat] SHA2-256
901,847 UART: [kat] SHA2-384
904,716 UART: [kat] SHA2-512-ACC
906,617 UART: [kat] ECC-384
916,740 UART: [kat] HMAC-384Kdf
921,296 UART: [kat] LMS
1,169,608 UART: [kat] --
1,170,531 UART: [cold-reset] ++
1,171,001 UART: [fht] FHT @ 0x50003400
1,173,513 UART: [idev] ++
1,173,681 UART: [idev] CDI.KEYID = 6
1,174,042 UART: [idev] SUBJECT.KEYID = 7
1,174,467 UART: [idev] UDS.KEYID = 0
1,174,813 ready_for_fw is high
1,174,813 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,109 UART: [idev] Erasing UDS.KEYID = 0
1,198,819 UART: [idev] Sha1 KeyId Algorithm
1,207,531 UART: [idev] --
1,208,650 UART: [ldev] ++
1,208,818 UART: [ldev] CDI.KEYID = 6
1,209,182 UART: [ldev] SUBJECT.KEYID = 5
1,209,609 UART: [ldev] AUTHORITY.KEYID = 7
1,210,072 UART: [ldev] FE.KEYID = 1
1,215,648 UART: [ldev] Erasing FE.KEYID = 1
1,241,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,524 UART: [ldev] --
1,280,890 UART: [fwproc] Wait for Commands...
1,281,639 UART: [fwproc] Recv command 0x46574c44
1,282,372 UART: [fwproc] Recv'd Img size: 114332 bytes
3,126,560 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,884 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,193 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,320,139 >>> mbox cmd response: success
3,321,356 UART: [afmc] ++
3,321,524 UART: [afmc] CDI.KEYID = 6
3,321,887 UART: [afmc] SUBJECT.KEYID = 7
3,322,313 UART: [afmc] AUTHORITY.KEYID = 5
3,357,575 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,235 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,986 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,696 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,586 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,297 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,279 UART: [afmc] --
3,401,345 UART: [cold-reset] --
3,402,493 UART: [state] Locking Datavault
3,403,936 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,540 UART: [state] Locking ICCM
3,405,128 UART: [exit] Launching FMC @ 0x40000130
3,410,457 UART:
3,410,473 UART: Running Caliptra FMC ...
3,410,881 UART:
3,410,935 UART: [state] CFI Enabled
3,420,915 UART: [fht] FMC Alias Private Key: 7
3,528,713 UART: [art] Extend RT PCRs Done
3,529,141 UART: [art] Lock RT PCRs Done
3,530,907 UART: [art] Populate DV Done
3,539,003 UART: [fht] FMC Alias Private Key: 7
3,539,983 UART: [art] Derive CDI
3,540,263 UART: [art] Store in in slot 0x4
3,625,848 UART: [art] Derive Key Pair
3,626,208 UART: [art] Store priv key in slot 0x5
3,639,242 UART: [art] Derive Key Pair - Done
3,653,726 UART: [art] Signing Cert with AUTHO
3,654,206 UART: RITY.KEYID = 7
3,669,572 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,337 UART: [art] PUB.X = 2CA69A8B23717B546E9C3F112FCC0E20695A3EEABC4120D3B80BA63B792149C0AE1BC32DC7A84E9F8C3519C045DEDBD1
3,677,119 UART: [art] PUB.Y = 3977BD26FBAA26422594120E5A77370454AF2E293859674CE4A7035F2D4858443D6C6FE1722C127C61B5E229232CDCBF
3,684,056 UART: [art] SIG.R = 3E2FE938679F3D23BC861071E5B14F66798748D6826CC64B1DC457C652EA0591BD792936F18D16E7D84D2A53F9A7A792
3,690,821 UART: [art] SIG.S = 2D8415F1A0FAD564D198F14C44E83BCDEC0D1A3B333625788E96F0F005013C2BF1E440DA7419E2C68F8CE72CDF05B2C3
3,714,514 UART: Caliptra RT
3,714,767 UART: [state] CFI Enabled
3,822,424 UART: [rt] RT listening for mailbox commands...
3,823,094 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,016 UART: [rt]cmd =0x41544d4e, len=14344
3,952,417 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,930 ready_for_fw is high
1,055,930 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,161,076 >>> mbox cmd response: success
3,222,825 UART:
3,222,841 UART: Running Caliptra FMC ...
3,223,249 UART:
3,223,303 UART: [state] CFI Enabled
3,233,685 UART: [fht] FMC Alias Private Key: 7
3,341,605 UART: [art] Extend RT PCRs Done
3,342,033 UART: [art] Lock RT PCRs Done
3,343,813 UART: [art] Populate DV Done
3,352,177 UART: [fht] FMC Alias Private Key: 7
3,353,125 UART: [art] Derive CDI
3,353,405 UART: [art] Store in in slot 0x4
3,438,816 UART: [art] Derive Key Pair
3,439,176 UART: [art] Store priv key in slot 0x5
3,452,984 UART: [art] Derive Key Pair - Done
3,467,855 UART: [art] Signing Cert with AUTHO
3,468,335 UART: RITY.KEYID = 7
3,483,597 UART: [art] Erasing AUTHORITY.KEYID = 7
3,484,362 UART: [art] PUB.X = B963D6DF8C108969EE569F536648826A67EFB4DF25B3A7DEF650DEE177CDC00613670974EE491FA0B8E5701F4ED38F24
3,491,134 UART: [art] PUB.Y = 8D3BD7346B96E2BECAFF38D365E7A0494F40329BF068183807E23420B6EE4734C33CAF6D80E3C309E9CF17AF6D18F9C0
3,498,088 UART: [art] SIG.R = 8CDCFBD90093E2A92D3A4EECCF39AF71A22B53580631542DB4AF025BEADB4BAE2F3BFB73CAAD2752E6CEFAC0DEC55FE0
3,504,868 UART: [art] SIG.S = 1E57C891C3804164DC8C50AABC5F20A46CE230F1574F4A7C84C239A252CA838916377B0488811F1AC84F64647DD37952
3,528,370 UART: Caliptra RT
3,528,623 UART: [state] CFI Enabled
3,636,647 UART: [rt] RT listening for mailbox commands...
3,637,317 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,751 UART: [rt]cmd =0x41544d4e, len=14344
3,767,314 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,056 UART: [state] WD Timer not started. Device not locked for debugging
88,227 UART: [kat] SHA2-256
891,777 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,906 UART: [kat] ++
896,058 UART: [kat] sha1
900,184 UART: [kat] SHA2-256
902,124 UART: [kat] SHA2-384
904,723 UART: [kat] SHA2-512-ACC
906,624 UART: [kat] ECC-384
916,473 UART: [kat] HMAC-384Kdf
921,049 UART: [kat] LMS
1,169,361 UART: [kat] --
1,169,950 UART: [cold-reset] ++
1,170,280 UART: [fht] FHT @ 0x50003400
1,173,054 UART: [idev] ++
1,173,222 UART: [idev] CDI.KEYID = 6
1,173,583 UART: [idev] SUBJECT.KEYID = 7
1,174,008 UART: [idev] UDS.KEYID = 0
1,174,354 ready_for_fw is high
1,174,354 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,210 UART: [idev] Erasing UDS.KEYID = 0
1,199,366 UART: [idev] Sha1 KeyId Algorithm
1,208,276 UART: [idev] --
1,209,329 UART: [ldev] ++
1,209,497 UART: [ldev] CDI.KEYID = 6
1,209,861 UART: [ldev] SUBJECT.KEYID = 5
1,210,288 UART: [ldev] AUTHORITY.KEYID = 7
1,210,751 UART: [ldev] FE.KEYID = 1
1,215,979 UART: [ldev] Erasing FE.KEYID = 1
1,242,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,529 UART: [ldev] --
1,281,987 UART: [fwproc] Wait for Commands...
1,282,722 UART: [fwproc] Recv command 0x46574c44
1,283,455 UART: [fwproc] Recv'd Img size: 114332 bytes
3,117,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,145,837 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,146 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,310,892 >>> mbox cmd response: success
3,312,125 UART: [afmc] ++
3,312,293 UART: [afmc] CDI.KEYID = 6
3,312,656 UART: [afmc] SUBJECT.KEYID = 7
3,313,082 UART: [afmc] AUTHORITY.KEYID = 5
3,348,412 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,365,803 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,513 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,403 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,114 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,390,954 UART: [afmc] --
3,391,862 UART: [cold-reset] --
3,392,996 UART: [state] Locking Datavault
3,394,079 UART: [state] Locking PCR0, PCR1 and PCR31
3,394,683 UART: [state] Locking ICCM
3,395,161 UART: [exit] Launching FMC @ 0x40000130
3,400,490 UART:
3,400,506 UART: Running Caliptra FMC ...
3,400,914 UART:
3,401,057 UART: [state] CFI Enabled
3,411,723 UART: [fht] FMC Alias Private Key: 7
3,519,993 UART: [art] Extend RT PCRs Done
3,520,421 UART: [art] Lock RT PCRs Done
3,521,995 UART: [art] Populate DV Done
3,530,123 UART: [fht] FMC Alias Private Key: 7
3,531,197 UART: [art] Derive CDI
3,531,477 UART: [art] Store in in slot 0x4
3,617,280 UART: [art] Derive Key Pair
3,617,640 UART: [art] Store priv key in slot 0x5
3,630,706 UART: [art] Derive Key Pair - Done
3,645,395 UART: [art] Signing Cert with AUTHO
3,645,875 UART: RITY.KEYID = 7
3,660,813 UART: [art] Erasing AUTHORITY.KEYID = 7
3,661,578 UART: [art] PUB.X = 72BBEC8CE9EF96BFCDFFB40EE21884EE7E61D582E8BC0A2D279F806C33308A0D6CE5DFE46A8B286C2558E733EE1406B4
3,668,358 UART: [art] PUB.Y = A288731070629CFFD040098F4C08B95B3C940DB365B522784B744977EE307E74E2FDDFF01616DF144ACDACDA3970F60C
3,675,302 UART: [art] SIG.R = 02F2ECA237252B22720E56AB07AC937D8D748F874F7DED2EC471140E0D3781B8AEF04AC6FEA4121743D4317C41C24FFF
3,682,067 UART: [art] SIG.S = E4FEAA5D748D31475112725E9ED8AD779B24D7FB0E5BDD7C5A5167C28366B8C05D60FC16A8DB37525D5DBEB8FC5BB225
3,705,553 UART: Caliptra RT
3,705,898 UART: [state] CFI Enabled
3,814,528 UART: [rt] RT listening for mailbox commands...
3,815,198 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,692 UART: [rt]cmd =0x41544d4e, len=14344
3,944,101 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,121 ready_for_fw is high
1,056,121 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,174,032 >>> mbox cmd response: success
3,236,073 UART:
3,236,089 UART: Running Caliptra FMC ...
3,236,497 UART:
3,236,640 UART: [state] CFI Enabled
3,247,018 UART: [fht] FMC Alias Private Key: 7
3,354,078 UART: [art] Extend RT PCRs Done
3,354,506 UART: [art] Lock RT PCRs Done
3,356,076 UART: [art] Populate DV Done
3,364,580 UART: [fht] FMC Alias Private Key: 7
3,365,554 UART: [art] Derive CDI
3,365,834 UART: [art] Store in in slot 0x4
3,451,457 UART: [art] Derive Key Pair
3,451,817 UART: [art] Store priv key in slot 0x5
3,465,899 UART: [art] Derive Key Pair - Done
3,480,900 UART: [art] Signing Cert with AUTHO
3,481,380 UART: RITY.KEYID = 7
3,496,530 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,295 UART: [art] PUB.X = 87FC6F0DC48A58D819731200691BC7908B80121E05352C496C0BF321FAAF29E0A76B25F9CA6396E3BE8C4C28773EE180
3,504,036 UART: [art] PUB.Y = 2F17DE4AC472EAF811A2B65361DAADD1930384B1513A5E1A704615ADF50DF0B8F0F062810ECA81FB98A5CE81A617CCCA
3,510,995 UART: [art] SIG.R = 83D59B7FB9AE41159B7B325B6B03821C9D1B625D561AF8A921CC4F3414DBF9446E05D33B2C0C0B4881F4F5C3FE7E38E5
3,517,763 UART: [art] SIG.S = C6014CF05CB521070E57D074904FEF446D918004E49950DC34CD007BD7E27C21C50BB2BC12C73F3C3399EF81C17B2AA2
3,541,723 UART: Caliptra RT
3,542,068 UART: [state] CFI Enabled
3,651,097 UART: [rt] RT listening for mailbox commands...
3,651,767 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,861 UART: [rt]cmd =0x41544d4e, len=14344
3,781,758 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,427 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,947 UART: [kat] SHA2-256
881,878 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,993 UART: [kat] ++
886,145 UART: [kat] sha1
890,441 UART: [kat] SHA2-256
892,379 UART: [kat] SHA2-384
895,148 UART: [kat] SHA2-512-ACC
897,049 UART: [kat] ECC-384
902,502 UART: [kat] HMAC-384Kdf
906,888 UART: [kat] LMS
1,475,084 UART: [kat] --
1,475,921 UART: [cold-reset] ++
1,476,273 UART: [fht] Storing FHT @ 0x50003400
1,479,036 UART: [idev] ++
1,479,204 UART: [idev] CDI.KEYID = 6
1,479,564 UART: [idev] SUBJECT.KEYID = 7
1,479,988 UART: [idev] UDS.KEYID = 0
1,480,333 ready_for_fw is high
1,480,333 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,184 UART: [idev] Erasing UDS.KEYID = 0
1,505,024 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,672 UART: [idev] --
1,514,751 UART: [ldev] ++
1,514,919 UART: [ldev] CDI.KEYID = 6
1,515,282 UART: [ldev] SUBJECT.KEYID = 5
1,515,708 UART: [ldev] AUTHORITY.KEYID = 7
1,516,171 UART: [ldev] FE.KEYID = 1
1,521,271 UART: [ldev] Erasing FE.KEYID = 1
1,546,506 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,232 UART: [ldev] --
1,585,579 UART: [fwproc] Waiting for Commands...
1,586,206 UART: [fwproc] Received command 0x46574c44
1,586,997 UART: [fwproc] Received Image of size 114332 bytes
5,158,571 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,186,907 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,216,259 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,352,116 >>> mbox cmd response: success
5,353,336 UART: [afmc] ++
5,353,504 UART: [afmc] CDI.KEYID = 6
5,353,866 UART: [afmc] SUBJECT.KEYID = 7
5,354,291 UART: [afmc] AUTHORITY.KEYID = 5
5,389,391 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,405,683 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,406,463 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,412,172 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,418,064 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,423,765 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,431,617 UART: [afmc] --
5,432,591 UART: [cold-reset] --
5,433,465 UART: [state] Locking Datavault
5,434,846 UART: [state] Locking PCR0, PCR1 and PCR31
5,435,450 UART: [state] Locking ICCM
5,435,916 UART: [exit] Launching FMC @ 0x40000130
5,441,245 UART:
5,441,261 UART: Running Caliptra FMC ...
5,441,669 UART:
5,441,723 UART: [state] CFI Enabled
5,452,163 UART: [fht] FMC Alias Private Key: 7
5,560,247 UART: [art] Extend RT PCRs Done
5,560,675 UART: [art] Lock RT PCRs Done
5,562,477 UART: [art] Populate DV Done
5,570,585 UART: [fht] FMC Alias Private Key: 7
5,571,717 UART: [art] Derive CDI
5,571,997 UART: [art] Store in in slot 0x4
5,657,922 UART: [art] Derive Key Pair
5,658,282 UART: [art] Store priv key in slot 0x5
5,671,504 UART: [art] Derive Key Pair - Done
5,686,176 UART: [art] Signing Cert with AUTHO
5,686,656 UART: RITY.KEYID = 7
5,702,116 UART: [art] Erasing AUTHORITY.KEYID = 7
5,702,881 UART: [art] PUB.X = 3904482CBE214F6ACA90D51959E5C66A8344E589B1C3A4FA5BC56999F8A35837C01704B72A11708F6C47CA2206C2D074
5,709,640 UART: [art] PUB.Y = 7D24F1EF9FBA50BB5DB70F52178BEBA3CF8E197C2D6F53E421D4E7EA3485A68DA62B8496B7E1DE175CB4A7D17A2F4498
5,716,607 UART: [art] SIG.R = 9C9C67BB90C059A763A795CB8FCB589026E93A69F95DBCB71CD41AF99CBC4C63081DEF5BA1A3DBB9382BAC47DC5325A0
5,723,396 UART: [art] SIG.S = 047D3A484FDB60C187ED24F8B27AB277A0E09E93860CD50947D67EDBC6E6A7E68885910E54755445CD0D6F715FF72B4A
5,747,710 UART: Caliptra RT
5,747,963 UART: [state] CFI Enabled
5,856,568 UART: [rt] RT listening for mailbox commands...
5,857,238 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,980,224 UART: [rt]cmd =0x41544d4e, len=14344
5,988,880 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,739 ready_for_fw is high
1,362,739 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,237,831 >>> mbox cmd response: success
5,299,586 UART:
5,299,602 UART: Running Caliptra FMC ...
5,300,010 UART:
5,300,064 UART: [state] CFI Enabled
5,310,206 UART: [fht] FMC Alias Private Key: 7
5,417,974 UART: [art] Extend RT PCRs Done
5,418,402 UART: [art] Lock RT PCRs Done
5,420,016 UART: [art] Populate DV Done
5,428,054 UART: [fht] FMC Alias Private Key: 7
5,429,106 UART: [art] Derive CDI
5,429,386 UART: [art] Store in in slot 0x4
5,514,769 UART: [art] Derive Key Pair
5,515,129 UART: [art] Store priv key in slot 0x5
5,528,157 UART: [art] Derive Key Pair - Done
5,542,820 UART: [art] Signing Cert with AUTHO
5,543,300 UART: RITY.KEYID = 7
5,558,346 UART: [art] Erasing AUTHORITY.KEYID = 7
5,559,111 UART: [art] PUB.X = 933CFE3D77D314B6DD4AC9EB816DB09FC86FE1F6719E7B2530BEF4D4071240B2B640177E084D0906B2E6EE0C25CA8FF7
5,565,880 UART: [art] PUB.Y = 7D016723CE3558F7023A3548E565E3BD55F55E2513FED75F9A9768B18AD87AE910BE0EE2283C56BC83B340A81F86D971
5,572,823 UART: [art] SIG.R = 02B9F6B33F1DF950E7BF6AE66BB2B785C83E4DC9D0F5B3411E1B6EA5BCA07E2C5166E511452A0DF1AD080190C028E821
5,579,595 UART: [art] SIG.S = 7CAC0EC65545E958F79E238B9BCD02E3E3E453933DB91DA8B2AE6F5B3766CBA07FC1FBFB2D802AC16179347D09E78BD2
5,603,315 UART: Caliptra RT
5,603,568 UART: [state] CFI Enabled
5,712,488 UART: [rt] RT listening for mailbox commands...
5,713,158 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,836,054 UART: [rt]cmd =0x41544d4e, len=14344
5,844,686 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Unprovisioned
85,850 UART: [state] DebugLocked = No
86,502 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,996 UART: [kat] SHA2-256
881,927 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,042 UART: [kat] ++
886,194 UART: [kat] sha1
890,448 UART: [kat] SHA2-256
892,386 UART: [kat] SHA2-384
895,205 UART: [kat] SHA2-512-ACC
897,106 UART: [kat] ECC-384
902,497 UART: [kat] HMAC-384Kdf
907,063 UART: [kat] LMS
1,475,259 UART: [kat] --
1,476,270 UART: [cold-reset] ++
1,476,786 UART: [fht] Storing FHT @ 0x50003400
1,479,465 UART: [idev] ++
1,479,633 UART: [idev] CDI.KEYID = 6
1,479,993 UART: [idev] SUBJECT.KEYID = 7
1,480,417 UART: [idev] UDS.KEYID = 0
1,480,762 ready_for_fw is high
1,480,762 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,627 UART: [idev] Erasing UDS.KEYID = 0
1,504,953 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,527 UART: [idev] --
1,514,522 UART: [ldev] ++
1,514,690 UART: [ldev] CDI.KEYID = 6
1,515,053 UART: [ldev] SUBJECT.KEYID = 5
1,515,479 UART: [ldev] AUTHORITY.KEYID = 7
1,515,942 UART: [ldev] FE.KEYID = 1
1,521,186 UART: [ldev] Erasing FE.KEYID = 1
1,546,633 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,315 UART: [ldev] --
1,586,660 UART: [fwproc] Waiting for Commands...
1,587,455 UART: [fwproc] Received command 0x46574c44
1,588,246 UART: [fwproc] Received Image of size 114332 bytes
5,008,202 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,036,170 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,065,522 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,201,279 >>> mbox cmd response: success
5,202,341 UART: [afmc] ++
5,202,509 UART: [afmc] CDI.KEYID = 6
5,202,871 UART: [afmc] SUBJECT.KEYID = 7
5,203,296 UART: [afmc] AUTHORITY.KEYID = 5
5,237,946 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,254,740 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,255,520 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,261,229 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,267,121 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,272,822 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,280,436 UART: [afmc] --
5,281,414 UART: [cold-reset] --
5,282,052 UART: [state] Locking Datavault
5,283,161 UART: [state] Locking PCR0, PCR1 and PCR31
5,283,765 UART: [state] Locking ICCM
5,284,229 UART: [exit] Launching FMC @ 0x40000130
5,289,558 UART:
5,289,574 UART: Running Caliptra FMC ...
5,289,982 UART:
5,290,125 UART: [state] CFI Enabled
5,300,581 UART: [fht] FMC Alias Private Key: 7
5,408,351 UART: [art] Extend RT PCRs Done
5,408,779 UART: [art] Lock RT PCRs Done
5,410,133 UART: [art] Populate DV Done
5,418,333 UART: [fht] FMC Alias Private Key: 7
5,419,435 UART: [art] Derive CDI
5,419,715 UART: [art] Store in in slot 0x4
5,505,336 UART: [art] Derive Key Pair
5,505,696 UART: [art] Store priv key in slot 0x5
5,519,496 UART: [art] Derive Key Pair - Done
5,534,078 UART: [art] Signing Cert with AUTHO
5,534,558 UART: RITY.KEYID = 7
5,550,010 UART: [art] Erasing AUTHORITY.KEYID = 7
5,550,775 UART: [art] PUB.X = E39883A8493C4B0C83E25C15AE949D23DE68DB45333EFAF26BDB275EC0769262D289AAAAA08863F1621A16E5948DF852
5,557,548 UART: [art] PUB.Y = 401FD2AEEB9E2402FE620312D0D4BABF0CE541E3C822B974BBEC319BF4A7E38BB126F3C5E08A0A11BE0DC4AF34E413FC
5,564,509 UART: [art] SIG.R = 2D89E49D7C98B24E1FD43951356DDEA8C5D49B7125F2E2BE2BBA9624D1EC73E3D7F09C74278DBE580853A1F863C5DE5C
5,571,290 UART: [art] SIG.S = 91C50F5DC41A60C6EABCD6397020B5DEF487B5B86EA64AD191252B8B64FB0993CB4D48BF7D8ABB9BE802CD05D2E6541D
5,595,521 UART: Caliptra RT
5,595,866 UART: [state] CFI Enabled
5,704,133 UART: [rt] RT listening for mailbox commands...
5,704,803 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,827,763 UART: [rt]cmd =0x41544d4e, len=14344
5,836,497 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,178 ready_for_fw is high
1,363,178 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,090,390 >>> mbox cmd response: success
5,151,725 UART:
5,151,741 UART: Running Caliptra FMC ...
5,152,149 UART:
5,152,292 UART: [state] CFI Enabled
5,163,084 UART: [fht] FMC Alias Private Key: 7
5,271,260 UART: [art] Extend RT PCRs Done
5,271,688 UART: [art] Lock RT PCRs Done
5,273,166 UART: [art] Populate DV Done
5,281,612 UART: [fht] FMC Alias Private Key: 7
5,282,614 UART: [art] Derive CDI
5,282,894 UART: [art] Store in in slot 0x4
5,368,283 UART: [art] Derive Key Pair
5,368,643 UART: [art] Store priv key in slot 0x5
5,382,005 UART: [art] Derive Key Pair - Done
5,396,766 UART: [art] Signing Cert with AUTHO
5,397,246 UART: RITY.KEYID = 7
5,412,622 UART: [art] Erasing AUTHORITY.KEYID = 7
5,413,387 UART: [art] PUB.X = 9DE9C08301A430D91B2E7B1CCF18DA6A0E7F8218B46932F8283ECC22426EE040EC7BE5B1A039B0FD1D348F60057289C4
5,420,156 UART: [art] PUB.Y = 966298ACB531CF5D00B5E89A80C4BD8151CEF83C3ED47064C784F161AE392BA036E870F8A6CFCE51110E8B25401B138F
5,427,089 UART: [art] SIG.R = EE379B49410478EFE7D77D4017CE285564BC1837794A33898D65A5D25B94F6DF0DB0C89E0DC510B57BB1B7696EC88A91
5,433,854 UART: [art] SIG.S = 49D03F180B12DE85383A4A77FF17C757049BB16AAB2BBB5FCEC2D3ECE3D5AC92DCB998677B5A153AD0E20A97005287B4
5,457,274 UART: Caliptra RT
5,457,619 UART: [state] CFI Enabled
5,565,350 UART: [rt] RT listening for mailbox commands...
5,566,020 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,688,970 UART: [rt]cmd =0x41544d4e, len=14344
5,697,204 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
893,282 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,407 UART: [kat] ++
897,559 UART: [kat] sha1
901,875 UART: [kat] SHA2-256
903,815 UART: [kat] SHA2-384
906,534 UART: [kat] SHA2-512-ACC
908,435 UART: [kat] ECC-384
918,044 UART: [kat] HMAC-384Kdf
922,776 UART: [kat] LMS
1,171,104 UART: [kat] --
1,172,045 UART: [cold-reset] ++
1,172,509 UART: [fht] FHT @ 0x50003400
1,175,062 UART: [idev] ++
1,175,230 UART: [idev] CDI.KEYID = 6
1,175,590 UART: [idev] SUBJECT.KEYID = 7
1,176,014 UART: [idev] UDS.KEYID = 0
1,176,359 ready_for_fw is high
1,176,359 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,278 UART: [idev] Erasing UDS.KEYID = 0
1,200,723 UART: [idev] Sha1 KeyId Algorithm
1,209,261 UART: [idev] --
1,210,319 UART: [ldev] ++
1,210,487 UART: [ldev] CDI.KEYID = 6
1,210,850 UART: [ldev] SUBJECT.KEYID = 5
1,211,276 UART: [ldev] AUTHORITY.KEYID = 7
1,211,739 UART: [ldev] FE.KEYID = 1
1,216,819 UART: [ldev] Erasing FE.KEYID = 1
1,242,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,563 UART: [ldev] --
1,282,058 UART: [fwproc] Wait for Commands...
1,282,822 UART: [fwproc] Recv command 0x46574c44
1,283,550 UART: [fwproc] Recv'd Img size: 114332 bytes
3,135,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,163,652 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,192,956 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,328,777 >>> mbox cmd response: success
3,329,925 UART: [afmc] ++
3,330,093 UART: [afmc] CDI.KEYID = 6
3,330,455 UART: [afmc] SUBJECT.KEYID = 7
3,330,880 UART: [afmc] AUTHORITY.KEYID = 5
3,365,356 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,381,659 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,382,407 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,388,116 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,394,008 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,399,719 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,407,692 UART: [afmc] --
3,408,718 UART: [cold-reset] --
3,409,542 UART: [state] Locking Datavault
3,410,871 UART: [state] Locking PCR0, PCR1 and PCR31
3,411,475 UART: [state] Locking ICCM
3,411,901 UART: [exit] Launching FMC @ 0x40000130
3,417,230 UART:
3,417,246 UART: Running Caliptra FMC ...
3,417,654 UART:
3,417,708 UART: [state] CFI Enabled
3,428,440 UART: [fht] FMC Alias Private Key: 7
3,536,312 UART: [art] Extend RT PCRs Done
3,536,740 UART: [art] Lock RT PCRs Done
3,538,056 UART: [art] Populate DV Done
3,546,462 UART: [fht] FMC Alias Private Key: 7
3,547,592 UART: [art] Derive CDI
3,547,872 UART: [art] Store in in slot 0x4
3,633,293 UART: [art] Derive Key Pair
3,633,653 UART: [art] Store priv key in slot 0x5
3,646,847 UART: [art] Derive Key Pair - Done
3,661,623 UART: [art] Signing Cert with AUTHO
3,662,103 UART: RITY.KEYID = 7
3,677,453 UART: [art] Erasing AUTHORITY.KEYID = 7
3,678,218 UART: [art] PUB.X = ADE65F868F6D27EEC7048D7C349F7C2734C29994E5781156CACF72827D919D6EE3CB356FB6A269B214F8D0D30D1D509A
3,684,990 UART: [art] PUB.Y = 2CC473D7A9A60729455554CFF9945F2777C5B1B68231973860D75E9D61DDA56F2C73A07BCE09F019AA9A905F19BD6BAC
3,691,940 UART: [art] SIG.R = B94ED2A6863B895EA4C6C810F3CF1598C0CEB699ABC7C3A51DBED21F7DBE77F561616D57EFBC9489C9CFC07C659213C8
3,698,730 UART: [art] SIG.S = 61D0E4FB4B731F5B44E7A33C9BD75A6C0B12BE372398B9A14E11F62C137BC3B2209EE2C4598604EBF7D88FD02D31B855
3,722,765 UART: Caliptra RT
3,723,018 UART: [state] CFI Enabled
3,829,676 UART: [rt] RT listening for mailbox commands...
3,830,346 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,953,312 UART: [rt]cmd =0x41544d4e, len=14344
3,961,688 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,111 ready_for_fw is high
1,060,111 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,174,922 >>> mbox cmd response: success
3,238,019 UART:
3,238,035 UART: Running Caliptra FMC ...
3,238,443 UART:
3,238,497 UART: [state] CFI Enabled
3,248,921 UART: [fht] FMC Alias Private Key: 7
3,356,523 UART: [art] Extend RT PCRs Done
3,356,951 UART: [art] Lock RT PCRs Done
3,358,803 UART: [art] Populate DV Done
3,367,233 UART: [fht] FMC Alias Private Key: 7
3,368,293 UART: [art] Derive CDI
3,368,573 UART: [art] Store in in slot 0x4
3,454,042 UART: [art] Derive Key Pair
3,454,402 UART: [art] Store priv key in slot 0x5
3,467,118 UART: [art] Derive Key Pair - Done
3,481,711 UART: [art] Signing Cert with AUTHO
3,482,191 UART: RITY.KEYID = 7
3,497,251 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,016 UART: [art] PUB.X = 437FD51030B6A8754DE61BD612A787E66F1DBAABB3E059C5DB41FA2E34731517D36223C074A15FA946862B82CEDC6C1B
3,504,796 UART: [art] PUB.Y = BDB3C11AED879777ED0F1EB54ABAF76AD84DBFB75BC00FF70D3FA3AA22CF4887AFBCCF2918DE407B19A32FFDB872EB17
3,511,773 UART: [art] SIG.R = 6C6A7CC448506CF0E73C289305E3F3478553EB27E1E5EF0DD0DE9DE8E3175EFACD2BF4FE2125596C866E1EE615E81472
3,518,549 UART: [art] SIG.S = D88C889DB295450593675AB72A541450C10742253C958A945CB7930D8BB007109BE55296DF7970AB5B0796A1267001EB
3,542,178 UART: Caliptra RT
3,542,431 UART: [state] CFI Enabled
3,650,913 UART: [rt] RT listening for mailbox commands...
3,651,583 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,931 UART: [rt]cmd =0x41544d4e, len=14344
3,783,847 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Unprovisioned
85,726 UART: [state] DebugLocked = No
86,210 UART: [state] WD Timer not started. Device not locked for debugging
87,427 UART: [kat] SHA2-256
893,077 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,202 UART: [kat] ++
897,354 UART: [kat] sha1
901,676 UART: [kat] SHA2-256
903,616 UART: [kat] SHA2-384
906,485 UART: [kat] SHA2-512-ACC
908,386 UART: [kat] ECC-384
917,969 UART: [kat] HMAC-384Kdf
922,827 UART: [kat] LMS
1,171,155 UART: [kat] --
1,171,952 UART: [cold-reset] ++
1,172,360 UART: [fht] FHT @ 0x50003400
1,174,835 UART: [idev] ++
1,175,003 UART: [idev] CDI.KEYID = 6
1,175,363 UART: [idev] SUBJECT.KEYID = 7
1,175,787 UART: [idev] UDS.KEYID = 0
1,176,132 ready_for_fw is high
1,176,132 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,931 UART: [idev] Erasing UDS.KEYID = 0
1,201,454 UART: [idev] Sha1 KeyId Algorithm
1,209,998 UART: [idev] --
1,211,012 UART: [ldev] ++
1,211,180 UART: [ldev] CDI.KEYID = 6
1,211,543 UART: [ldev] SUBJECT.KEYID = 5
1,211,969 UART: [ldev] AUTHORITY.KEYID = 7
1,212,432 UART: [ldev] FE.KEYID = 1
1,217,426 UART: [ldev] Erasing FE.KEYID = 1
1,243,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,262 UART: [ldev] --
1,282,639 UART: [fwproc] Wait for Commands...
1,283,427 UART: [fwproc] Recv command 0x46574c44
1,284,155 UART: [fwproc] Recv'd Img size: 114332 bytes
3,119,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,147,342 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,646 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,312,565 >>> mbox cmd response: success
3,313,605 UART: [afmc] ++
3,313,773 UART: [afmc] CDI.KEYID = 6
3,314,135 UART: [afmc] SUBJECT.KEYID = 7
3,314,560 UART: [afmc] AUTHORITY.KEYID = 5
3,350,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,815 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,563 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,272 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,164 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,384,875 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,510 UART: [afmc] --
3,393,634 UART: [cold-reset] --
3,394,320 UART: [state] Locking Datavault
3,395,339 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,943 UART: [state] Locking ICCM
3,396,511 UART: [exit] Launching FMC @ 0x40000130
3,401,840 UART:
3,401,856 UART: Running Caliptra FMC ...
3,402,264 UART:
3,402,407 UART: [state] CFI Enabled
3,413,023 UART: [fht] FMC Alias Private Key: 7
3,521,111 UART: [art] Extend RT PCRs Done
3,521,539 UART: [art] Lock RT PCRs Done
3,523,017 UART: [art] Populate DV Done
3,531,383 UART: [fht] FMC Alias Private Key: 7
3,532,327 UART: [art] Derive CDI
3,532,607 UART: [art] Store in in slot 0x4
3,617,960 UART: [art] Derive Key Pair
3,618,320 UART: [art] Store priv key in slot 0x5
3,631,426 UART: [art] Derive Key Pair - Done
3,646,194 UART: [art] Signing Cert with AUTHO
3,646,674 UART: RITY.KEYID = 7
3,662,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,973 UART: [art] PUB.X = C7ED4D6E4D228C7C2C4AD9928B08B0958B90F3DE17A4A9A78E84A732D5A735C65858564C474955D76320A1F15240748E
3,669,738 UART: [art] PUB.Y = 2899A683C76827B6E2771647A2C67B63FAC33F6A6F2491625DD024A831ED1E33D9314A31F96BFC2FA3117537F1DFBFB0
3,676,692 UART: [art] SIG.R = 4F20414FC399713AD7D154C1B3823E92EC2D009A0C3FCA55F58DF10E1AA04E8925B1B16C7338EA2AC434B981A05C987C
3,683,442 UART: [art] SIG.S = F8035BA3AEB57CF0E2739F5019EADA7654D3BC81C1143F05785389CE9E41B55B4D986664A9C625AF9A7C784B92C448D2
3,707,299 UART: Caliptra RT
3,707,644 UART: [state] CFI Enabled
3,814,538 UART: [rt] RT listening for mailbox commands...
3,815,208 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,146 UART: [rt]cmd =0x41544d4e, len=14344
3,946,916 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,300 ready_for_fw is high
1,060,300 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,173,294 >>> mbox cmd response: success
3,235,285 UART:
3,235,301 UART: Running Caliptra FMC ...
3,235,709 UART:
3,235,852 UART: [state] CFI Enabled
3,246,210 UART: [fht] FMC Alias Private Key: 7
3,354,020 UART: [art] Extend RT PCRs Done
3,354,448 UART: [art] Lock RT PCRs Done
3,356,096 UART: [art] Populate DV Done
3,364,334 UART: [fht] FMC Alias Private Key: 7
3,365,324 UART: [art] Derive CDI
3,365,604 UART: [art] Store in in slot 0x4
3,451,517 UART: [art] Derive Key Pair
3,451,877 UART: [art] Store priv key in slot 0x5
3,465,097 UART: [art] Derive Key Pair - Done
3,479,758 UART: [art] Signing Cert with AUTHO
3,480,238 UART: RITY.KEYID = 7
3,495,426 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,191 UART: [art] PUB.X = 15C66705EC8B7044319762037D77699C3797265D4D64EF5692A41F62E31EB747C201FD5D4162EFF5CA5E2C21FFD037FC
3,502,952 UART: [art] PUB.Y = 0D722A4131DA66D1A29FBE24F39FEF18E87118B7841E501617F57F30C45BE1F7F99853E6B69FBE3D31F6337D3885CD18
3,509,903 UART: [art] SIG.R = F70D597E347CD6E4B6802AEFE916C04029DD9BE4AADEF6A221A5F032D777DA51937306DCF90D8D22FF9560E0E4BC6215
3,516,678 UART: [art] SIG.S = F7A437D007F60C59AC1FA91D9F44AFDCA307DCAC037699EA49ADBBDBC4A0E67CB39653FF4520EE2683B26763E46FC5DC
3,540,289 UART: Caliptra RT
3,540,634 UART: [state] CFI Enabled
3,648,101 UART: [rt] RT listening for mailbox commands...
3,648,771 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,023 UART: [rt]cmd =0x41544d4e, len=14344
3,780,505 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
891,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
899,855 UART: [kat] SHA2-256
901,795 UART: [kat] SHA2-384
904,460 UART: [kat] SHA2-512-ACC
906,361 UART: [kat] ECC-384
916,080 UART: [kat] HMAC-384Kdf
920,624 UART: [kat] LMS
1,168,936 UART: [kat] --
1,169,999 UART: [cold-reset] ++
1,170,445 UART: [fht] FHT @ 0x50003400
1,173,119 UART: [idev] ++
1,173,287 UART: [idev] CDI.KEYID = 6
1,173,648 UART: [idev] SUBJECT.KEYID = 7
1,174,073 UART: [idev] UDS.KEYID = 0
1,174,419 ready_for_fw is high
1,174,419 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,257 UART: [idev] Erasing UDS.KEYID = 0
1,199,113 UART: [idev] Sha1 KeyId Algorithm
1,208,123 UART: [idev] --
1,208,992 UART: [ldev] ++
1,209,160 UART: [ldev] CDI.KEYID = 6
1,209,524 UART: [ldev] SUBJECT.KEYID = 5
1,209,951 UART: [ldev] AUTHORITY.KEYID = 7
1,210,414 UART: [ldev] FE.KEYID = 1
1,215,794 UART: [ldev] Erasing FE.KEYID = 1
1,242,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,588 UART: [ldev] --
1,281,010 UART: [fwproc] Wait for Commands...
1,281,819 UART: [fwproc] Recv command 0x46574c44
1,282,552 UART: [fwproc] Recv'd Img size: 114332 bytes
3,124,761 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,041 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,350 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,317,216 >>> mbox cmd response: success
3,318,355 UART: [afmc] ++
3,318,523 UART: [afmc] CDI.KEYID = 6
3,318,886 UART: [afmc] SUBJECT.KEYID = 7
3,319,312 UART: [afmc] AUTHORITY.KEYID = 5
3,355,670 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,198 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,949 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,659 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,549 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,260 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,936 UART: [afmc] --
3,398,902 UART: [cold-reset] --
3,399,714 UART: [state] Locking Datavault
3,401,037 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,641 UART: [state] Locking ICCM
3,402,085 UART: [exit] Launching FMC @ 0x40000130
3,407,414 UART:
3,407,430 UART: Running Caliptra FMC ...
3,407,838 UART:
3,407,892 UART: [state] CFI Enabled
3,418,208 UART: [fht] FMC Alias Private Key: 7
3,524,884 UART: [art] Extend RT PCRs Done
3,525,312 UART: [art] Lock RT PCRs Done
3,526,642 UART: [art] Populate DV Done
3,534,840 UART: [fht] FMC Alias Private Key: 7
3,535,988 UART: [art] Derive CDI
3,536,268 UART: [art] Store in in slot 0x4
3,622,235 UART: [art] Derive Key Pair
3,622,595 UART: [art] Store priv key in slot 0x5
3,635,443 UART: [art] Derive Key Pair - Done
3,650,149 UART: [art] Signing Cert with AUTHO
3,650,629 UART: RITY.KEYID = 7
3,665,811 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,576 UART: [art] PUB.X = C5E93EB08E1449E5FEDB3CF203BE3D0447362C4B281C294351F665CC184F2F7EF68E38D728E6FB60E726D628836D4604
3,673,341 UART: [art] PUB.Y = 976FD7EF6E1919DBD27BCEE867FCDAC4A6C6E68E676275AEFFE51E1156BAC5972062B5778CE0AAA4A5F11DCA16029A4B
3,680,312 UART: [art] SIG.R = 349D49D8F9A7C28659479FB7D9DB278852E4AA86894B32983B57972C9914CE1E9F8EFCAFE82467D49511756D1E8A3DDC
3,687,086 UART: [art] SIG.S = 4EAE684833F8EA38D3AC6BC05504B3A092FCE2E2B83B30E3EAD02D587DF585805825F32CD2CBC9DCC0C8B02F82DB09F8
3,710,943 UART: Caliptra RT
3,711,196 UART: [state] CFI Enabled
3,818,261 UART: [rt] RT listening for mailbox commands...
3,818,931 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,877 UART: [rt]cmd =0x41544d4e, len=14344
3,950,767 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,486 ready_for_fw is high
1,055,486 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,164,535 >>> mbox cmd response: success
3,226,886 UART:
3,226,902 UART: Running Caliptra FMC ...
3,227,310 UART:
3,227,364 UART: [state] CFI Enabled
3,237,852 UART: [fht] FMC Alias Private Key: 7
3,345,266 UART: [art] Extend RT PCRs Done
3,345,694 UART: [art] Lock RT PCRs Done
3,347,300 UART: [art] Populate DV Done
3,355,604 UART: [fht] FMC Alias Private Key: 7
3,356,652 UART: [art] Derive CDI
3,356,932 UART: [art] Store in in slot 0x4
3,442,325 UART: [art] Derive Key Pair
3,442,685 UART: [art] Store priv key in slot 0x5
3,455,939 UART: [art] Derive Key Pair - Done
3,470,541 UART: [art] Signing Cert with AUTHO
3,471,021 UART: RITY.KEYID = 7
3,486,163 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,928 UART: [art] PUB.X = B1D2ED3FE35C422392584FEE3FE1949A06978452E5B8D22308B2966B170118B831BBDF2AEFBBB20B3F5E236BD072B80C
3,493,693 UART: [art] PUB.Y = 8E46F62ABD6F09146DE2CC5718888BB65F839309685518BC6952FB67872476DB31029B891DC908A0432519427DAF1963
3,500,621 UART: [art] SIG.R = 5606E60BD8BF246BD7E9988F4E0369A14ED0BF925F50948B30F3499F28C9C37D4CF4F2620E305AAC921509796B6F50BF
3,507,380 UART: [art] SIG.S = 05D885048E58A91232A1A370CEC5BE92E10CCB5474988B7D74390FC6816587B7BA85FA3A34C28BABFE916492A1611964
3,531,389 UART: Caliptra RT
3,531,642 UART: [state] CFI Enabled
3,639,811 UART: [rt] RT listening for mailbox commands...
3,640,481 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,677 UART: [rt]cmd =0x41544d4e, len=14344
3,772,007 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,524 UART: [state] WD Timer not started. Device not locked for debugging
87,661 UART: [kat] SHA2-256
891,211 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,340 UART: [kat] ++
895,492 UART: [kat] sha1
899,710 UART: [kat] SHA2-256
901,650 UART: [kat] SHA2-384
904,175 UART: [kat] SHA2-512-ACC
906,076 UART: [kat] ECC-384
915,821 UART: [kat] HMAC-384Kdf
920,357 UART: [kat] LMS
1,168,669 UART: [kat] --
1,169,882 UART: [cold-reset] ++
1,170,416 UART: [fht] FHT @ 0x50003400
1,172,938 UART: [idev] ++
1,173,106 UART: [idev] CDI.KEYID = 6
1,173,467 UART: [idev] SUBJECT.KEYID = 7
1,173,892 UART: [idev] UDS.KEYID = 0
1,174,238 ready_for_fw is high
1,174,238 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,224 UART: [idev] Erasing UDS.KEYID = 0
1,199,216 UART: [idev] Sha1 KeyId Algorithm
1,208,192 UART: [idev] --
1,209,197 UART: [ldev] ++
1,209,365 UART: [ldev] CDI.KEYID = 6
1,209,729 UART: [ldev] SUBJECT.KEYID = 5
1,210,156 UART: [ldev] AUTHORITY.KEYID = 7
1,210,619 UART: [ldev] FE.KEYID = 1
1,215,767 UART: [ldev] Erasing FE.KEYID = 1
1,242,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,395 UART: [ldev] --
1,281,729 UART: [fwproc] Wait for Commands...
1,282,434 UART: [fwproc] Recv command 0x46574c44
1,283,167 UART: [fwproc] Recv'd Img size: 114332 bytes
3,122,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,221 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,530 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,314,360 >>> mbox cmd response: success
3,315,407 UART: [afmc] ++
3,315,575 UART: [afmc] CDI.KEYID = 6
3,315,938 UART: [afmc] SUBJECT.KEYID = 7
3,316,364 UART: [afmc] AUTHORITY.KEYID = 5
3,352,130 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,688 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,439 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,149 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,039 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,750 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,582 UART: [afmc] --
3,395,588 UART: [cold-reset] --
3,396,440 UART: [state] Locking Datavault
3,397,491 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,095 UART: [state] Locking ICCM
3,398,723 UART: [exit] Launching FMC @ 0x40000130
3,404,052 UART:
3,404,068 UART: Running Caliptra FMC ...
3,404,476 UART:
3,404,619 UART: [state] CFI Enabled
3,415,159 UART: [fht] FMC Alias Private Key: 7
3,523,209 UART: [art] Extend RT PCRs Done
3,523,637 UART: [art] Lock RT PCRs Done
3,525,239 UART: [art] Populate DV Done
3,533,181 UART: [fht] FMC Alias Private Key: 7
3,534,297 UART: [art] Derive CDI
3,534,577 UART: [art] Store in in slot 0x4
3,620,436 UART: [art] Derive Key Pair
3,620,796 UART: [art] Store priv key in slot 0x5
3,634,012 UART: [art] Derive Key Pair - Done
3,648,987 UART: [art] Signing Cert with AUTHO
3,649,467 UART: RITY.KEYID = 7
3,664,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,082 UART: [art] PUB.X = 0BA2221C2A63B723127E85282D26CEA2F30C39F7D988BAF342BE20427393692C2A96CCAA94ADE0E4A57783CD015AEE4B
3,671,853 UART: [art] PUB.Y = 3B060A1C3FAF2BB95F158E1DC92B6FDD2FBA1BA8ACB9C22A1867E6D27DD2D24F9071F3E6B902054B96FF6AFFEDC4DD21
3,678,821 UART: [art] SIG.R = EEDD22D09149A641E9A7D5B27F52B696B0B26AC9DE26DFDA264AB33EB7C3FF9B372C8E5FACD8BCC543597AC95ADF1CBD
3,685,623 UART: [art] SIG.S = 571005C948ED4A6ACF2C42C87E563E1AC4CD9D5F52C315DF96200215CB9963E96E2C87DE5E310953080C1AEE9C8336B4
3,709,655 UART: Caliptra RT
3,710,000 UART: [state] CFI Enabled
3,816,624 UART: [rt] RT listening for mailbox commands...
3,817,294 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,592 UART: [rt]cmd =0x41544d4e, len=14344
3,948,616 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,689 ready_for_fw is high
1,056,689 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,173,168 >>> mbox cmd response: success
3,235,211 UART:
3,235,227 UART: Running Caliptra FMC ...
3,235,635 UART:
3,235,778 UART: [state] CFI Enabled
3,246,204 UART: [fht] FMC Alias Private Key: 7
3,354,386 UART: [art] Extend RT PCRs Done
3,354,814 UART: [art] Lock RT PCRs Done
3,356,380 UART: [art] Populate DV Done
3,364,774 UART: [fht] FMC Alias Private Key: 7
3,365,750 UART: [art] Derive CDI
3,366,030 UART: [art] Store in in slot 0x4
3,451,745 UART: [art] Derive Key Pair
3,452,105 UART: [art] Store priv key in slot 0x5
3,465,281 UART: [art] Derive Key Pair - Done
3,479,785 UART: [art] Signing Cert with AUTHO
3,480,265 UART: RITY.KEYID = 7
3,495,415 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,180 UART: [art] PUB.X = B7FBE55B6A593EDF57D61126652366FAE3621B8CECF7CC4E79A5EB202F1C5AF7E883F1A2BDAECCA7F39DEDF70C04D7F7
3,502,974 UART: [art] PUB.Y = 52D896D59D47624474E8D45A85E5FA882A7395562B1142577440167DB1EF2F853B8A8A10DF46720BFA7930B93F39C8A4
3,509,915 UART: [art] SIG.R = C3500CF574D3CDC2670EA410250350B6C3F2C3F87EA53291E5CF1B2F5461EF23314F98076DA42EF6893AE7889172F1A6
3,516,675 UART: [art] SIG.S = 7B6C7772CC92A84575043B3F901E67CBB66BF70A108EA42EC505C3C5660744B75F44724E68CE98843651AEBEA460E807
3,540,853 UART: Caliptra RT
3,541,198 UART: [state] CFI Enabled
3,648,010 UART: [rt] RT listening for mailbox commands...
3,648,680 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,714 UART: [rt]cmd =0x41544d4e, len=14344
3,780,342 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,535 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,159 UART: [kat] SHA2-256
882,090 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,205 UART: [kat] ++
886,357 UART: [kat] sha1
890,587 UART: [kat] SHA2-256
892,525 UART: [kat] SHA2-384
895,242 UART: [kat] SHA2-512-ACC
897,143 UART: [kat] ECC-384
902,830 UART: [kat] HMAC-384Kdf
907,484 UART: [kat] LMS
1,475,680 UART: [kat] --
1,476,469 UART: [cold-reset] ++
1,476,939 UART: [fht] Storing FHT @ 0x50003400
1,479,634 UART: [idev] ++
1,479,802 UART: [idev] CDI.KEYID = 6
1,480,162 UART: [idev] SUBJECT.KEYID = 7
1,480,586 UART: [idev] UDS.KEYID = 0
1,480,931 ready_for_fw is high
1,480,931 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,436 UART: [idev] Erasing UDS.KEYID = 0
1,504,722 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,260 UART: [idev] --
1,514,423 UART: [ldev] ++
1,514,591 UART: [ldev] CDI.KEYID = 6
1,514,954 UART: [ldev] SUBJECT.KEYID = 5
1,515,380 UART: [ldev] AUTHORITY.KEYID = 7
1,515,843 UART: [ldev] FE.KEYID = 1
1,520,987 UART: [ldev] Erasing FE.KEYID = 1
1,546,692 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,966 UART: [ldev] --
1,586,269 UART: [fwproc] Waiting for Commands...
1,587,118 UART: [fwproc] Received command 0x46574c44
1,587,909 UART: [fwproc] Received Image of size 114332 bytes
2,886,015 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,575 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,927 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,690 >>> mbox cmd response: success
3,079,856 UART: [afmc] ++
3,080,024 UART: [afmc] CDI.KEYID = 6
3,080,386 UART: [afmc] SUBJECT.KEYID = 7
3,080,811 UART: [afmc] AUTHORITY.KEYID = 5
3,115,800 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,988 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,768 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,496 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,381 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,071 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,122 UART: [afmc] --
3,159,048 UART: [cold-reset] --
3,159,598 UART: [state] Locking Datavault
3,160,835 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,439 UART: [state] Locking ICCM
3,162,091 UART: [exit] Launching FMC @ 0x40000130
3,167,420 UART:
3,167,436 UART: Running Caliptra FMC ...
3,167,844 UART:
3,167,898 UART: [state] CFI Enabled
3,178,197 UART: [fht] FMC Alias Private Key: 7
3,286,358 UART: [art] Extend RT PCRs Done
3,286,786 UART: [art] Lock RT PCRs Done
3,288,246 UART: [art] Populate DV Done
3,296,389 UART: [fht] FMC Alias Private Key: 7
3,297,565 UART: [art] Derive CDI
3,297,845 UART: [art] Store in in slot 0x4
3,383,500 UART: [art] Derive Key Pair
3,383,860 UART: [art] Store priv key in slot 0x5
3,397,198 UART: [art] Derive Key Pair - Done
3,411,529 UART: [art] Signing Cert with AUTHO
3,412,009 UART: RITY.KEYID = 7
3,427,189 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,954 UART: [art] PUB.X = B16B0D97DDFEC8C2F6B9E1D8665879C5321803EF6AFA96809795056E2BB3C48928358EE3272C73C74BAF2790AA49C6D8
3,434,721 UART: [art] PUB.Y = B8C7982E5581091C19CD4178761DF2F4149C02F5BCA761D1FD8F7CE39F6AD089CBB3F577014E0B912FC4A8A9A9CA5393
3,441,669 UART: [art] SIG.R = 0B3C86DFD931B2EA9E7E5DF596325B972ECC8A0E23902BF7FEC80F8E70B8FC749D1C23CD9E41BC2A9C1FE6BA6096F5A2
3,448,454 UART: [art] SIG.S = 675F5B137F77EACDFA1E9BFE037D3D6031F43B6DFD29A644F85E2CC66377ED8AF4BD638835C62724C736B5F4D0D8E0FC
3,472,152 UART: Caliptra RT
3,472,405 UART: [state] CFI Enabled
3,579,873 UART: [rt] RT listening for mailbox commands...
3,580,543 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,271 UART: [rt]cmd =0x41544d4e, len=14344
4,013,286 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,163 ready_for_fw is high
1,363,163 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,288 >>> mbox cmd response: success
2,989,866 UART:
2,989,882 UART: Running Caliptra FMC ...
2,990,290 UART:
2,990,344 UART: [state] CFI Enabled
3,000,879 UART: [fht] FMC Alias Private Key: 7
3,108,956 UART: [art] Extend RT PCRs Done
3,109,384 UART: [art] Lock RT PCRs Done
3,111,042 UART: [art] Populate DV Done
3,119,323 UART: [fht] FMC Alias Private Key: 7
3,120,283 UART: [art] Derive CDI
3,120,563 UART: [art] Store in in slot 0x4
3,206,584 UART: [art] Derive Key Pair
3,206,944 UART: [art] Store priv key in slot 0x5
3,220,214 UART: [art] Derive Key Pair - Done
3,234,919 UART: [art] Signing Cert with AUTHO
3,235,399 UART: RITY.KEYID = 7
3,250,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,322 UART: [art] PUB.X = 8B8B5DF459A5685096EE80BB91F3BEDB08163E7920A5CE840654AEB65D5D589257EC888D1C2D971FDE09E9510052C038
3,258,065 UART: [art] PUB.Y = 6BC54511D30A9C53A44394654EFEDBD9AAB4DFD0EB9CBDD5EE5A9C834153936D9A5C35BDEDDD8CB3BF2768CF7633C9E3
3,265,040 UART: [art] SIG.R = 6B8A4392BB5DA6F69E28A0B794D994AE333849DD956C637FE3C03D9715749740FC62140B9FAFC3D22EFF7F69600B4DC3
3,271,812 UART: [art] SIG.S = 84E4B0A0637718C2B8E9DD5676AE6E893A890BAB8D0AAD9C8D22ADEE2967F646D6B55280B2936B14C35032185461483F
3,295,553 UART: Caliptra RT
3,295,806 UART: [state] CFI Enabled
3,403,703 UART: [rt] RT listening for mailbox commands...
3,404,373 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,519 UART: [rt]cmd =0x41544d4e, len=14344
3,837,872 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,079 UART: [state] LifecycleState = Unprovisioned
85,734 UART: [state] DebugLocked = No
86,422 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,104 UART: [kat] SHA2-256
882,035 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,150 UART: [kat] ++
886,302 UART: [kat] sha1
890,498 UART: [kat] SHA2-256
892,436 UART: [kat] SHA2-384
895,003 UART: [kat] SHA2-512-ACC
896,904 UART: [kat] ECC-384
902,811 UART: [kat] HMAC-384Kdf
907,307 UART: [kat] LMS
1,475,503 UART: [kat] --
1,476,224 UART: [cold-reset] ++
1,476,754 UART: [fht] Storing FHT @ 0x50003400
1,479,527 UART: [idev] ++
1,479,695 UART: [idev] CDI.KEYID = 6
1,480,055 UART: [idev] SUBJECT.KEYID = 7
1,480,479 UART: [idev] UDS.KEYID = 0
1,480,824 ready_for_fw is high
1,480,824 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,845 UART: [idev] Erasing UDS.KEYID = 0
1,505,439 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,905 UART: [idev] --
1,515,122 UART: [ldev] ++
1,515,290 UART: [ldev] CDI.KEYID = 6
1,515,653 UART: [ldev] SUBJECT.KEYID = 5
1,516,079 UART: [ldev] AUTHORITY.KEYID = 7
1,516,542 UART: [ldev] FE.KEYID = 1
1,521,768 UART: [ldev] Erasing FE.KEYID = 1
1,547,559 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,709 UART: [ldev] --
1,587,128 UART: [fwproc] Waiting for Commands...
1,587,845 UART: [fwproc] Received command 0x46574c44
1,588,636 UART: [fwproc] Received Image of size 114332 bytes
2,887,040 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,934 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,286 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,079 >>> mbox cmd response: success
3,080,129 UART: [afmc] ++
3,080,297 UART: [afmc] CDI.KEYID = 6
3,080,659 UART: [afmc] SUBJECT.KEYID = 7
3,081,084 UART: [afmc] AUTHORITY.KEYID = 5
3,117,047 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,161 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,941 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,669 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,554 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,244 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,967 UART: [afmc] --
3,160,003 UART: [cold-reset] --
3,160,977 UART: [state] Locking Datavault
3,162,240 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,844 UART: [state] Locking ICCM
3,163,300 UART: [exit] Launching FMC @ 0x40000130
3,168,629 UART:
3,168,645 UART: Running Caliptra FMC ...
3,169,053 UART:
3,169,196 UART: [state] CFI Enabled
3,179,981 UART: [fht] FMC Alias Private Key: 7
3,288,280 UART: [art] Extend RT PCRs Done
3,288,708 UART: [art] Lock RT PCRs Done
3,290,376 UART: [art] Populate DV Done
3,298,585 UART: [fht] FMC Alias Private Key: 7
3,299,559 UART: [art] Derive CDI
3,299,839 UART: [art] Store in in slot 0x4
3,385,630 UART: [art] Derive Key Pair
3,385,990 UART: [art] Store priv key in slot 0x5
3,399,144 UART: [art] Derive Key Pair - Done
3,413,891 UART: [art] Signing Cert with AUTHO
3,414,371 UART: RITY.KEYID = 7
3,429,439 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,204 UART: [art] PUB.X = 31787A04532150EF8E8F8758144D5A0C4F6AD43ABD5D60C60F3BC28B00F9FEA8B4561392F8265274A0849EE6BB22E9B5
3,436,947 UART: [art] PUB.Y = 6FA8B9F92B179204A737EA27D383DF64863FBB5A96E0920BCD6D4933A6045D507380C39AC674D08279F49242A280F550
3,443,884 UART: [art] SIG.R = 33294614904E6C6F1A3AEA1726C29BB2FD988BDD0F3067E8346D34A1226A120970847E9F87B941EB1D6E6B2E3EAB6179
3,450,650 UART: [art] SIG.S = B1763A4E3FD0B8D9E4F7B1363A8801E2939E32C035F08DCD66734C2F16EEFA73B52F01A9B13B2BA2C9E50CB2F469CBB0
3,474,272 UART: Caliptra RT
3,474,617 UART: [state] CFI Enabled
3,583,376 UART: [rt] RT listening for mailbox commands...
3,584,046 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,062 UART: [rt]cmd =0x41544d4e, len=14344
4,017,835 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,980 ready_for_fw is high
1,362,980 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,779 >>> mbox cmd response: success
2,990,317 UART:
2,990,333 UART: Running Caliptra FMC ...
2,990,741 UART:
2,990,884 UART: [state] CFI Enabled
3,001,509 UART: [fht] FMC Alias Private Key: 7
3,109,950 UART: [art] Extend RT PCRs Done
3,110,378 UART: [art] Lock RT PCRs Done
3,111,952 UART: [art] Populate DV Done
3,119,971 UART: [fht] FMC Alias Private Key: 7
3,120,935 UART: [art] Derive CDI
3,121,215 UART: [art] Store in in slot 0x4
3,206,754 UART: [art] Derive Key Pair
3,207,114 UART: [art] Store priv key in slot 0x5
3,220,220 UART: [art] Derive Key Pair - Done
3,234,939 UART: [art] Signing Cert with AUTHO
3,235,419 UART: RITY.KEYID = 7
3,250,157 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,922 UART: [art] PUB.X = D1AA62EE9DA953053006C70A82CC6EAEB6CB37834F8C80DE042490FF3A674B3F40E6BA312EA6BCEA581438E19C1631BD
3,257,696 UART: [art] PUB.Y = A24CCAF9E3FAF0ED1B34AED12860F8760943115D1BDF4007E1D8CE4FA15E7D461EF4276892E0A77A37F694F89066A6F3
3,264,652 UART: [art] SIG.R = FA09C65EEF458E2245EFF2DC85D6A4C76FC71DAF0B834D5027BF97A09217F9FC712D2499559EA98C37576FCBE7BF07F1
3,271,429 UART: [art] SIG.S = 7177AABE72D56E2EC082109D1A88917C883490A9B1D22D4D23C49CE6BF42A664743C4A6825D0B135B3DDE052B67732AC
3,294,858 UART: Caliptra RT
3,295,203 UART: [state] CFI Enabled
3,404,272 UART: [rt] RT listening for mailbox commands...
3,404,942 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,220 UART: [rt]cmd =0x41544d4e, len=14344
3,838,359 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,227 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
893,230 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,355 UART: [kat] ++
897,507 UART: [kat] sha1
901,801 UART: [kat] SHA2-256
903,741 UART: [kat] SHA2-384
906,560 UART: [kat] SHA2-512-ACC
908,461 UART: [kat] ECC-384
917,828 UART: [kat] HMAC-384Kdf
922,356 UART: [kat] LMS
1,170,684 UART: [kat] --
1,171,667 UART: [cold-reset] ++
1,172,229 UART: [fht] FHT @ 0x50003400
1,174,886 UART: [idev] ++
1,175,054 UART: [idev] CDI.KEYID = 6
1,175,414 UART: [idev] SUBJECT.KEYID = 7
1,175,838 UART: [idev] UDS.KEYID = 0
1,176,183 ready_for_fw is high
1,176,183 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,538 UART: [idev] Erasing UDS.KEYID = 0
1,200,683 UART: [idev] Sha1 KeyId Algorithm
1,209,167 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,971 UART: [ldev] Erasing FE.KEYID = 1
1,243,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,401 UART: [ldev] --
1,282,720 UART: [fwproc] Wait for Commands...
1,283,320 UART: [fwproc] Recv command 0x46574c44
1,284,048 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,358 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,662 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,531 >>> mbox cmd response: success
2,775,685 UART: [afmc] ++
2,775,853 UART: [afmc] CDI.KEYID = 6
2,776,215 UART: [afmc] SUBJECT.KEYID = 7
2,776,640 UART: [afmc] AUTHORITY.KEYID = 5
2,812,253 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,626 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,374 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,102 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,987 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,706 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,462 UART: [afmc] --
2,855,514 UART: [cold-reset] --
2,856,408 UART: [state] Locking Datavault
2,857,701 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,305 UART: [state] Locking ICCM
2,858,857 UART: [exit] Launching FMC @ 0x40000130
2,864,186 UART:
2,864,202 UART: Running Caliptra FMC ...
2,864,610 UART:
2,864,664 UART: [state] CFI Enabled
2,875,255 UART: [fht] FMC Alias Private Key: 7
2,983,370 UART: [art] Extend RT PCRs Done
2,983,798 UART: [art] Lock RT PCRs Done
2,985,562 UART: [art] Populate DV Done
2,993,575 UART: [fht] FMC Alias Private Key: 7
2,994,603 UART: [art] Derive CDI
2,994,883 UART: [art] Store in in slot 0x4
3,080,440 UART: [art] Derive Key Pair
3,080,800 UART: [art] Store priv key in slot 0x5
3,094,022 UART: [art] Derive Key Pair - Done
3,108,683 UART: [art] Signing Cert with AUTHO
3,109,163 UART: RITY.KEYID = 7
3,124,033 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,798 UART: [art] PUB.X = 7F0D3ACFA5C0C4EF0B0A689DF2B2D9A3C21C40F11CA2A6C09659550CD110561CDB8F849CB9A00F6BB3119912FC6156B8
3,131,569 UART: [art] PUB.Y = B10C24778D5760F0AF598836EBACBF73DEEA4FB9C38A8FDB888AE636247716FEA0364F51D966BC3B559E61A01FEFDA11
3,138,534 UART: [art] SIG.R = 30BEA188AFEB2224EBF4FCEF6A52CF01D0480E657C43ED9DD75DB53E5CB56D9CD675C26296249292D43645292D787317
3,145,306 UART: [art] SIG.S = 32A480F90345DDDE70074BEA43D19D5ED996E4A9D56A50B141CD9958BFE848FFA9FB3B20AA6241DD5BEEF4F2215A2E0F
3,168,512 UART: Caliptra RT
3,168,765 UART: [state] CFI Enabled
3,277,184 UART: [rt] RT listening for mailbox commands...
3,277,854 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,664 UART: [rt]cmd =0x41544d4e, len=14344
3,711,095 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,479 ready_for_fw is high
1,059,479 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,554 >>> mbox cmd response: success
2,687,862 UART:
2,687,878 UART: Running Caliptra FMC ...
2,688,286 UART:
2,688,340 UART: [state] CFI Enabled
2,699,161 UART: [fht] FMC Alias Private Key: 7
2,807,662 UART: [art] Extend RT PCRs Done
2,808,090 UART: [art] Lock RT PCRs Done
2,809,794 UART: [art] Populate DV Done
2,818,055 UART: [fht] FMC Alias Private Key: 7
2,819,165 UART: [art] Derive CDI
2,819,445 UART: [art] Store in in slot 0x4
2,904,650 UART: [art] Derive Key Pair
2,905,010 UART: [art] Store priv key in slot 0x5
2,918,276 UART: [art] Derive Key Pair - Done
2,932,843 UART: [art] Signing Cert with AUTHO
2,933,323 UART: RITY.KEYID = 7
2,948,523 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,288 UART: [art] PUB.X = 3994B8CF31EC558E5BAF1BA634F4A2F5AC46147826D346AC0C78AC471D0717F55FCA4952B95A8F0AB2FC30C1D4A6391D
2,956,063 UART: [art] PUB.Y = D2670857358E013F1800D07363C3FFB5D349CB7EA231D39E25504ABC8AE83B716A1E9FB4F4F98A6F440F647EA9B4397A
2,962,988 UART: [art] SIG.R = 68A45EE736A87D6EB38E5CE945F2980B5CE972466B23CAB26D31CFCD98E2555AA901D08EBF2DCCE9A8066936D8BB08CD
2,969,764 UART: [art] SIG.S = 1ECE821B66E228597F7382753DE604684F7DDA599BF9D35739DA8419273B2DA6E5F894F3B5053CA34656606B1685A0F2
2,993,201 UART: Caliptra RT
2,993,454 UART: [state] CFI Enabled
3,100,771 UART: [rt] RT listening for mailbox commands...
3,101,441 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,905 UART: [rt]cmd =0x41544d4e, len=14344
3,535,118 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,724 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
893,493 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,618 UART: [kat] ++
897,770 UART: [kat] sha1
902,064 UART: [kat] SHA2-256
904,004 UART: [kat] SHA2-384
906,647 UART: [kat] SHA2-512-ACC
908,548 UART: [kat] ECC-384
918,297 UART: [kat] HMAC-384Kdf
922,963 UART: [kat] LMS
1,171,291 UART: [kat] --
1,172,074 UART: [cold-reset] ++
1,172,488 UART: [fht] FHT @ 0x50003400
1,175,223 UART: [idev] ++
1,175,391 UART: [idev] CDI.KEYID = 6
1,175,751 UART: [idev] SUBJECT.KEYID = 7
1,176,175 UART: [idev] UDS.KEYID = 0
1,176,520 ready_for_fw is high
1,176,520 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,013 UART: [idev] Erasing UDS.KEYID = 0
1,200,590 UART: [idev] Sha1 KeyId Algorithm
1,209,144 UART: [idev] --
1,210,128 UART: [ldev] ++
1,210,296 UART: [ldev] CDI.KEYID = 6
1,210,659 UART: [ldev] SUBJECT.KEYID = 5
1,211,085 UART: [ldev] AUTHORITY.KEYID = 7
1,211,548 UART: [ldev] FE.KEYID = 1
1,216,664 UART: [ldev] Erasing FE.KEYID = 1
1,243,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,738 UART: [ldev] --
1,282,083 UART: [fwproc] Wait for Commands...
1,282,719 UART: [fwproc] Recv command 0x46574c44
1,283,447 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,333 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,637 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,436 >>> mbox cmd response: success
2,774,460 UART: [afmc] ++
2,774,628 UART: [afmc] CDI.KEYID = 6
2,774,990 UART: [afmc] SUBJECT.KEYID = 7
2,775,415 UART: [afmc] AUTHORITY.KEYID = 5
2,810,640 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,153 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,901 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,629 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,514 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,233 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,055 UART: [afmc] --
2,854,119 UART: [cold-reset] --
2,854,929 UART: [state] Locking Datavault
2,855,852 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,456 UART: [state] Locking ICCM
2,856,978 UART: [exit] Launching FMC @ 0x40000130
2,862,307 UART:
2,862,323 UART: Running Caliptra FMC ...
2,862,731 UART:
2,862,874 UART: [state] CFI Enabled
2,873,685 UART: [fht] FMC Alias Private Key: 7
2,982,130 UART: [art] Extend RT PCRs Done
2,982,558 UART: [art] Lock RT PCRs Done
2,983,998 UART: [art] Populate DV Done
2,992,041 UART: [fht] FMC Alias Private Key: 7
2,993,021 UART: [art] Derive CDI
2,993,301 UART: [art] Store in in slot 0x4
3,078,498 UART: [art] Derive Key Pair
3,078,858 UART: [art] Store priv key in slot 0x5
3,092,392 UART: [art] Derive Key Pair - Done
3,107,190 UART: [art] Signing Cert with AUTHO
3,107,670 UART: RITY.KEYID = 7
3,123,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,931 UART: [art] PUB.X = DFB6502CA8446396D348E925FB56A33FEC1B79027F6AD0603E77C147C52E5DB543D91A3538FF3D0E73E5991AF081C344
3,130,699 UART: [art] PUB.Y = 254110E0C1D28AB3E07AB585C10C7628276818AD16C82589D0EF556E1D1CDA19A0DB9CBC8A36CE94D7AE37EE2D0BA268
3,137,657 UART: [art] SIG.R = C37342F7A075903E55D514B43D57C4F16944B8B8DC212E174DE69858BD81481C8D9577EB5655A6148F5F0CA3FBD329B2
3,144,424 UART: [art] SIG.S = 3F8EDAC0A33A33E04C12D48812F24920CE45AFCFEFF393C2E9FF4DCD56D3AC24B7C4349A750C4D7AA9BC2933DC1ED7DC
3,168,622 UART: Caliptra RT
3,168,967 UART: [state] CFI Enabled
3,277,390 UART: [rt] RT listening for mailbox commands...
3,278,060 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,016 UART: [rt]cmd =0x41544d4e, len=14344
3,710,873 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,744 ready_for_fw is high
1,060,744 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,895 >>> mbox cmd response: success
2,689,007 UART:
2,689,023 UART: Running Caliptra FMC ...
2,689,431 UART:
2,689,574 UART: [state] CFI Enabled
2,700,137 UART: [fht] FMC Alias Private Key: 7
2,807,246 UART: [art] Extend RT PCRs Done
2,807,674 UART: [art] Lock RT PCRs Done
2,809,600 UART: [art] Populate DV Done
2,817,595 UART: [fht] FMC Alias Private Key: 7
2,818,625 UART: [art] Derive CDI
2,818,905 UART: [art] Store in in slot 0x4
2,904,202 UART: [art] Derive Key Pair
2,904,562 UART: [art] Store priv key in slot 0x5
2,918,310 UART: [art] Derive Key Pair - Done
2,933,191 UART: [art] Signing Cert with AUTHO
2,933,671 UART: RITY.KEYID = 7
2,948,857 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,622 UART: [art] PUB.X = B47A9385A5962D529DEA01DD1583C0BE8ABAA63A9639AA7EF40990B765DACE272B1A057A6EDD089FB7C7278F24E5E830
2,956,394 UART: [art] PUB.Y = 35306C06EF606BBCFE8AB67C5E892A28D475A7D6B5D33A954F0592986B7F224A2F249448CF7BC4B812687AE3BBAC3726
2,963,346 UART: [art] SIG.R = 288874F5DDD7858E915AEF951FBD56F42DE6A1E8E7875CCB93FD987BCDCA1808BCD863F830DEB28D2D2BDD7246C25DF0
2,970,135 UART: [art] SIG.S = 15AC8C6DBA05877261BCC620AF6B34D3A47AEC259CE02F125F37E6BC8DEA936455188E46A14C43AA9FFADB2023923607
2,994,042 UART: Caliptra RT
2,994,387 UART: [state] CFI Enabled
3,102,378 UART: [rt] RT listening for mailbox commands...
3,103,048 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,050 UART: [rt]cmd =0x41544d4e, len=14344
3,535,943 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,544 UART: [state] LifecycleState = Unprovisioned
86,199 UART: [state] DebugLocked = No
86,815 UART: [state] WD Timer not started. Device not locked for debugging
88,176 UART: [kat] SHA2-256
891,726 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,855 UART: [kat] ++
896,007 UART: [kat] sha1
900,333 UART: [kat] SHA2-256
902,273 UART: [kat] SHA2-384
904,794 UART: [kat] SHA2-512-ACC
906,695 UART: [kat] ECC-384
916,122 UART: [kat] HMAC-384Kdf
920,632 UART: [kat] LMS
1,168,944 UART: [kat] --
1,169,837 UART: [cold-reset] ++
1,170,187 UART: [fht] FHT @ 0x50003400
1,172,901 UART: [idev] ++
1,173,069 UART: [idev] CDI.KEYID = 6
1,173,430 UART: [idev] SUBJECT.KEYID = 7
1,173,855 UART: [idev] UDS.KEYID = 0
1,174,201 ready_for_fw is high
1,174,201 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,917 UART: [idev] Erasing UDS.KEYID = 0
1,198,985 UART: [idev] Sha1 KeyId Algorithm
1,207,691 UART: [idev] --
1,208,682 UART: [ldev] ++
1,208,850 UART: [ldev] CDI.KEYID = 6
1,209,214 UART: [ldev] SUBJECT.KEYID = 5
1,209,641 UART: [ldev] AUTHORITY.KEYID = 7
1,210,104 UART: [ldev] FE.KEYID = 1
1,215,564 UART: [ldev] Erasing FE.KEYID = 1
1,241,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,848 UART: [ldev] --
1,280,302 UART: [fwproc] Wait for Commands...
1,281,101 UART: [fwproc] Recv command 0x46574c44
1,281,834 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,678 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,016 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,325 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,025 >>> mbox cmd response: success
2,773,186 UART: [afmc] ++
2,773,354 UART: [afmc] CDI.KEYID = 6
2,773,717 UART: [afmc] SUBJECT.KEYID = 7
2,774,143 UART: [afmc] AUTHORITY.KEYID = 5
2,809,142 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,582 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,333 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,062 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,945 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,664 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,559 UART: [afmc] --
2,852,665 UART: [cold-reset] --
2,853,501 UART: [state] Locking Datavault
2,854,740 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,344 UART: [state] Locking ICCM
2,855,882 UART: [exit] Launching FMC @ 0x40000130
2,861,211 UART:
2,861,227 UART: Running Caliptra FMC ...
2,861,635 UART:
2,861,689 UART: [state] CFI Enabled
2,872,142 UART: [fht] FMC Alias Private Key: 7
2,979,955 UART: [art] Extend RT PCRs Done
2,980,383 UART: [art] Lock RT PCRs Done
2,981,843 UART: [art] Populate DV Done
2,989,936 UART: [fht] FMC Alias Private Key: 7
2,991,016 UART: [art] Derive CDI
2,991,296 UART: [art] Store in in slot 0x4
3,077,285 UART: [art] Derive Key Pair
3,077,645 UART: [art] Store priv key in slot 0x5
3,090,545 UART: [art] Derive Key Pair - Done
3,105,194 UART: [art] Signing Cert with AUTHO
3,105,674 UART: RITY.KEYID = 7
3,120,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,371 UART: [art] PUB.X = 56CAEB80B2C0635E8C0E5EDB587834B57CBD797BF73866FC8EA88438D0066784408DF66CD3D4C6E67F7DD30D4EE19BFF
3,128,148 UART: [art] PUB.Y = 8E230396F3D80A0D9B94205DE7721ED35F85450F1C2C6B40EFEF0007384A1C29F5BE4C135C117C65C86BE9DAC936778C
3,135,067 UART: [art] SIG.R = 42485C5190EA06896C6C532C2A5A51D249301CF112CBE123BF29ADCC6CD761F57EC5133CCAAEC5B85DB003B216241D8A
3,141,843 UART: [art] SIG.S = D17EED185CCF890A45D75F21E12E86469CE6A9D66D81650973D6F86F485B42AB64C5648643174D12CFF51AF4711093F4
3,165,798 UART: Caliptra RT
3,166,051 UART: [state] CFI Enabled
3,273,960 UART: [rt] RT listening for mailbox commands...
3,274,630 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,916 UART: [rt]cmd =0x41544d4e, len=14344
3,707,557 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,404 ready_for_fw is high
1,056,404 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,805 >>> mbox cmd response: success
2,684,237 UART:
2,684,253 UART: Running Caliptra FMC ...
2,684,661 UART:
2,684,715 UART: [state] CFI Enabled
2,695,012 UART: [fht] FMC Alias Private Key: 7
2,802,653 UART: [art] Extend RT PCRs Done
2,803,081 UART: [art] Lock RT PCRs Done
2,804,861 UART: [art] Populate DV Done
2,813,182 UART: [fht] FMC Alias Private Key: 7
2,814,278 UART: [art] Derive CDI
2,814,558 UART: [art] Store in in slot 0x4
2,899,923 UART: [art] Derive Key Pair
2,900,283 UART: [art] Store priv key in slot 0x5
2,913,587 UART: [art] Derive Key Pair - Done
2,928,475 UART: [art] Signing Cert with AUTHO
2,928,955 UART: RITY.KEYID = 7
2,944,121 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,886 UART: [art] PUB.X = 0F68E9C41882969480064251DB6854A781CA53F649D3335B0B155A3CEA246C651AA45117F5F76BC5B29C1BFC7445EA0F
2,951,644 UART: [art] PUB.Y = E9DD2C49DE6CC308596FA805D4C3497E108CC516041A42D1BCBA507A37227C86A32669A15E698E6E405CAB6593CC63BA
2,958,593 UART: [art] SIG.R = 30DB6EBF8B28EE82D7EF534EFAB704644942B6F71B310E574C930562C9565D1A360CAD607B9C85CEC6D0A5181ABFE6DD
2,965,367 UART: [art] SIG.S = 8C2B4A9226A1791E2A6E2D6142D3F5B5043D51D19E670F9FE5841E2B5B5AAACE94953DF2718847D29B89EB4CA3FFA84E
2,989,166 UART: Caliptra RT
2,989,419 UART: [state] CFI Enabled
3,097,498 UART: [rt] RT listening for mailbox commands...
3,098,168 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,030 UART: [rt]cmd =0x41544d4e, len=14344
3,531,035 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,846 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
891,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,708 UART: [kat] ++
895,860 UART: [kat] sha1
900,024 UART: [kat] SHA2-256
901,964 UART: [kat] SHA2-384
904,683 UART: [kat] SHA2-512-ACC
906,584 UART: [kat] ECC-384
916,025 UART: [kat] HMAC-384Kdf
920,585 UART: [kat] LMS
1,168,897 UART: [kat] --
1,169,904 UART: [cold-reset] ++
1,170,310 UART: [fht] FHT @ 0x50003400
1,173,160 UART: [idev] ++
1,173,328 UART: [idev] CDI.KEYID = 6
1,173,689 UART: [idev] SUBJECT.KEYID = 7
1,174,114 UART: [idev] UDS.KEYID = 0
1,174,460 ready_for_fw is high
1,174,460 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,002 UART: [idev] Erasing UDS.KEYID = 0
1,198,858 UART: [idev] Sha1 KeyId Algorithm
1,207,704 UART: [idev] --
1,208,691 UART: [ldev] ++
1,208,859 UART: [ldev] CDI.KEYID = 6
1,209,223 UART: [ldev] SUBJECT.KEYID = 5
1,209,650 UART: [ldev] AUTHORITY.KEYID = 7
1,210,113 UART: [ldev] FE.KEYID = 1
1,215,085 UART: [ldev] Erasing FE.KEYID = 1
1,241,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,655 UART: [ldev] --
1,281,019 UART: [fwproc] Wait for Commands...
1,281,770 UART: [fwproc] Recv command 0x46574c44
1,282,503 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,715 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,024 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,972 >>> mbox cmd response: success
2,773,989 UART: [afmc] ++
2,774,157 UART: [afmc] CDI.KEYID = 6
2,774,520 UART: [afmc] SUBJECT.KEYID = 7
2,774,946 UART: [afmc] AUTHORITY.KEYID = 5
2,810,785 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,159 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,910 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,639 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,522 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,241 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,906 UART: [afmc] --
2,853,858 UART: [cold-reset] --
2,854,838 UART: [state] Locking Datavault
2,855,885 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,489 UART: [state] Locking ICCM
2,857,127 UART: [exit] Launching FMC @ 0x40000130
2,862,456 UART:
2,862,472 UART: Running Caliptra FMC ...
2,862,880 UART:
2,863,023 UART: [state] CFI Enabled
2,873,870 UART: [fht] FMC Alias Private Key: 7
2,982,153 UART: [art] Extend RT PCRs Done
2,982,581 UART: [art] Lock RT PCRs Done
2,984,121 UART: [art] Populate DV Done
2,992,242 UART: [fht] FMC Alias Private Key: 7
2,993,236 UART: [art] Derive CDI
2,993,516 UART: [art] Store in in slot 0x4
3,079,131 UART: [art] Derive Key Pair
3,079,491 UART: [art] Store priv key in slot 0x5
3,093,399 UART: [art] Derive Key Pair - Done
3,107,951 UART: [art] Signing Cert with AUTHO
3,108,431 UART: RITY.KEYID = 7
3,124,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,888 UART: [art] PUB.X = D5AF41D4665840AA45C01F88610E991ECFD2237A1B0F52B8143A700A48F93063BBAD60263A4A830475886EB7BB6FF30C
3,131,647 UART: [art] PUB.Y = CC4E67F86069F3A894BEA98BF45AF55DB964BC574B5B3913EED09E446ABEDA94D9CE45A63CBA241BBCE49827C7683600
3,138,593 UART: [art] SIG.R = 6A97358896DFA0CD2A966F644F5E309E9C574333969057C4C698EF803BEF13BB7480AC3741BB5EE801FC23F95121B33B
3,145,362 UART: [art] SIG.S = 6FC45591794C768B9E8465AA921C01438B89F6EFCEA2EB85A659F85014636FF1B9049322B5D4D7D627538E5306471217
3,168,776 UART: Caliptra RT
3,169,121 UART: [state] CFI Enabled
3,276,746 UART: [rt] RT listening for mailbox commands...
3,277,416 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,308 UART: [rt]cmd =0x41544d4e, len=14344
3,709,851 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,693 ready_for_fw is high
1,055,693 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,782 >>> mbox cmd response: success
2,685,476 UART:
2,685,492 UART: Running Caliptra FMC ...
2,685,900 UART:
2,686,043 UART: [state] CFI Enabled
2,696,576 UART: [fht] FMC Alias Private Key: 7
2,804,727 UART: [art] Extend RT PCRs Done
2,805,155 UART: [art] Lock RT PCRs Done
2,806,731 UART: [art] Populate DV Done
2,815,168 UART: [fht] FMC Alias Private Key: 7
2,816,278 UART: [art] Derive CDI
2,816,558 UART: [art] Store in in slot 0x4
2,902,503 UART: [art] Derive Key Pair
2,902,863 UART: [art] Store priv key in slot 0x5
2,916,171 UART: [art] Derive Key Pair - Done
2,930,819 UART: [art] Signing Cert with AUTHO
2,931,299 UART: RITY.KEYID = 7
2,946,333 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,098 UART: [art] PUB.X = EC3EDF529F1D51CE02C412661659E4CBF7C0E6809381BFB79B33F64BCB61E7C157923C945FFF5DB0A566817BF13B4A5C
2,953,879 UART: [art] PUB.Y = 504A2B57C12E48C17DABC915748B8959BF14328F92CF71693C27EEE5A8A77B3013ECB20B02E170EE0CAE0AD2E0CEC833
2,960,831 UART: [art] SIG.R = 22BA229B25AF1422CADDFE56FF80C19E90F33572EF3C3E31BCFCD3A44292EB248EE7C25D2E65D1CFDA52924014FFF296
2,967,621 UART: [art] SIG.S = F258C46E8C8DB0CF07BCF765014E96E156263445B97558910882DBD73F79E31000E7DCB8E127936E255D03398F060106
2,990,953 UART: Caliptra RT
2,991,298 UART: [state] CFI Enabled
3,098,929 UART: [rt] RT listening for mailbox commands...
3,099,599 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,419 UART: [rt]cmd =0x41544d4e, len=14344
3,531,792 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,449 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,149 UART: [kat] SHA2-256
882,080 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,195 UART: [kat] ++
886,347 UART: [kat] sha1
890,769 UART: [kat] SHA2-256
892,707 UART: [kat] SHA2-384
895,522 UART: [kat] SHA2-512-ACC
897,423 UART: [kat] ECC-384
903,052 UART: [kat] HMAC-384Kdf
907,510 UART: [kat] LMS
1,475,706 UART: [kat] --
1,476,281 UART: [cold-reset] ++
1,476,859 UART: [fht] Storing FHT @ 0x50003400
1,479,596 UART: [idev] ++
1,479,764 UART: [idev] CDI.KEYID = 6
1,480,124 UART: [idev] SUBJECT.KEYID = 7
1,480,548 UART: [idev] UDS.KEYID = 0
1,480,893 ready_for_fw is high
1,480,893 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,364 UART: [idev] Erasing UDS.KEYID = 0
1,505,474 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,290 UART: [idev] --
1,515,159 UART: [ldev] ++
1,515,327 UART: [ldev] CDI.KEYID = 6
1,515,690 UART: [ldev] SUBJECT.KEYID = 5
1,516,116 UART: [ldev] AUTHORITY.KEYID = 7
1,516,579 UART: [ldev] FE.KEYID = 1
1,521,955 UART: [ldev] Erasing FE.KEYID = 1
1,547,624 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,782 UART: [ldev] --
1,587,189 UART: [fwproc] Waiting for Commands...
1,587,896 UART: [fwproc] Received command 0x46574c44
1,588,687 UART: [fwproc] Received Image of size 114332 bytes
5,311,597 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,338,905 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,368,257 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,504,058 >>> mbox cmd response: success
5,505,180 UART: [afmc] ++
5,505,348 UART: [afmc] CDI.KEYID = 6
5,505,710 UART: [afmc] SUBJECT.KEYID = 7
5,506,135 UART: [afmc] AUTHORITY.KEYID = 5
5,541,041 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,557,527 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,558,307 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,564,016 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,569,908 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,575,609 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,583,577 UART: [afmc] --
5,584,579 UART: [cold-reset] --
5,585,341 UART: [state] Locking Datavault
5,586,340 UART: [state] Locking PCR0, PCR1 and PCR31
5,586,944 UART: [state] Locking ICCM
5,587,468 UART: [exit] Launching FMC @ 0x40000130
5,592,797 UART:
5,592,813 UART: Running Caliptra FMC ...
5,593,221 UART:
5,593,275 UART: [state] CFI Enabled
5,603,545 UART: [fht] FMC Alias Private Key: 7
5,711,079 UART: [art] Extend RT PCRs Done
5,711,507 UART: [art] Lock RT PCRs Done
5,713,033 UART: [art] Populate DV Done
5,721,101 UART: [fht] FMC Alias Private Key: 7
5,722,057 UART: [art] Derive CDI
5,722,337 UART: [art] Store in in slot 0x4
5,808,012 UART: [art] Derive Key Pair
5,808,372 UART: [art] Store priv key in slot 0x5
5,821,412 UART: [art] Derive Key Pair - Done
5,836,337 UART: [art] Signing Cert with AUTHO
5,836,817 UART: RITY.KEYID = 7
5,852,465 UART: [art] Erasing AUTHORITY.KEYID = 7
5,853,230 UART: [art] PUB.X = A6CAF3CCCC26861B7CD8698EDDF0A4717A8BDC6B9A621477571385F944BE21A3510D4B600CBFEC73CE4D7E5551686EC7
5,860,010 UART: [art] PUB.Y = 74187BA0EC15E520BA961614C836F6E52372DD585BBC478758281B5B295E7305A11235E53D166F070C30649BEDFAC1A6
5,866,949 UART: [art] SIG.R = E446CB51D911F8388A0C87FD60FA2B31CF051A317EB3E63084C5C2883F1226AE7E0432119BFE650D31FCB212870655F0
5,873,706 UART: [art] SIG.S = FD30192DCABEACB723A84AD93BCA50AC5E69436766852CC73518355196C88B01A33B4CD792926B273BDAD9628EBB0C9C
5,897,497 UART: Caliptra RT
5,897,750 UART: [state] CFI Enabled
6,005,998 UART: [rt] RT listening for mailbox commands...
6,006,668 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,130,020 UART: [rt]cmd =0x41544d4e, len=14344
6,767,912 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,931 ready_for_fw is high
1,362,931 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,316,437 >>> mbox cmd response: success
5,377,658 UART:
5,377,674 UART: Running Caliptra FMC ...
5,378,082 UART:
5,378,136 UART: [state] CFI Enabled
5,388,550 UART: [fht] FMC Alias Private Key: 7
5,496,480 UART: [art] Extend RT PCRs Done
5,496,908 UART: [art] Lock RT PCRs Done
5,498,430 UART: [art] Populate DV Done
5,506,628 UART: [fht] FMC Alias Private Key: 7
5,507,788 UART: [art] Derive CDI
5,508,068 UART: [art] Store in in slot 0x4
5,594,055 UART: [art] Derive Key Pair
5,594,415 UART: [art] Store priv key in slot 0x5
5,607,905 UART: [art] Derive Key Pair - Done
5,622,728 UART: [art] Signing Cert with AUTHO
5,623,208 UART: RITY.KEYID = 7
5,638,240 UART: [art] Erasing AUTHORITY.KEYID = 7
5,639,005 UART: [art] PUB.X = D9DAAF316407B7BD828AAB40E3F8794C8541DB6AEEB9566FF3CD3104E8F18587F83EBA9283D800E8287F15908FDAC1E4
5,645,761 UART: [art] PUB.Y = B9E9D8D225D53C2743FBEC8E61B0CA0BE3F25DF624FC0E35A6EE91017CDE502D80E41DD7CFA354F69B54BD4D95353B0E
5,652,721 UART: [art] SIG.R = 6A2FFC247F47DD616289D177CEAAF9790AF7E1F5DA7DA9375F8DC85B83E742EFDED3DA8A80925C40FC01F3AFB04BD06A
5,659,511 UART: [art] SIG.S = 54E307053AB69C20CB02D9F219413D71C5D9C0A69B0C10A9320B8778F04361198422CC433883906303BE31625BE2BC90
5,683,314 UART: Caliptra RT
5,683,567 UART: [state] CFI Enabled
5,790,879 UART: [rt] RT listening for mailbox commands...
5,791,549 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,914,691 UART: [rt]cmd =0x41544d4e, len=14344
6,557,039 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,769 UART: [state] LifecycleState = Unprovisioned
86,424 UART: [state] DebugLocked = No
86,994 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,518 UART: [kat] SHA2-256
882,449 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,564 UART: [kat] ++
886,716 UART: [kat] sha1
890,998 UART: [kat] SHA2-256
892,936 UART: [kat] SHA2-384
895,659 UART: [kat] SHA2-512-ACC
897,560 UART: [kat] ECC-384
903,021 UART: [kat] HMAC-384Kdf
907,439 UART: [kat] LMS
1,475,635 UART: [kat] --
1,476,768 UART: [cold-reset] ++
1,477,162 UART: [fht] Storing FHT @ 0x50003400
1,480,019 UART: [idev] ++
1,480,187 UART: [idev] CDI.KEYID = 6
1,480,547 UART: [idev] SUBJECT.KEYID = 7
1,480,971 UART: [idev] UDS.KEYID = 0
1,481,316 ready_for_fw is high
1,481,316 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,957 UART: [idev] Erasing UDS.KEYID = 0
1,505,979 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,521 UART: [idev] --
1,515,628 UART: [ldev] ++
1,515,796 UART: [ldev] CDI.KEYID = 6
1,516,159 UART: [ldev] SUBJECT.KEYID = 5
1,516,585 UART: [ldev] AUTHORITY.KEYID = 7
1,517,048 UART: [ldev] FE.KEYID = 1
1,522,182 UART: [ldev] Erasing FE.KEYID = 1
1,548,079 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,251 UART: [ldev] --
1,587,558 UART: [fwproc] Waiting for Commands...
1,588,193 UART: [fwproc] Received command 0x46574c44
1,588,984 UART: [fwproc] Received Image of size 114332 bytes
4,971,185 UART: [fwproc] Image verified using Vendor ECC Key Index 0
4,999,149 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,028,501 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,164,476 >>> mbox cmd response: success
5,165,518 UART: [afmc] ++
5,165,686 UART: [afmc] CDI.KEYID = 6
5,166,048 UART: [afmc] SUBJECT.KEYID = 7
5,166,473 UART: [afmc] AUTHORITY.KEYID = 5
5,202,097 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,218,199 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,218,979 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,224,688 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,230,580 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,236,281 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,243,985 UART: [afmc] --
5,245,045 UART: [cold-reset] --
5,246,041 UART: [state] Locking Datavault
5,247,454 UART: [state] Locking PCR0, PCR1 and PCR31
5,248,058 UART: [state] Locking ICCM
5,248,530 UART: [exit] Launching FMC @ 0x40000130
5,253,859 UART:
5,253,875 UART: Running Caliptra FMC ...
5,254,283 UART:
5,254,426 UART: [state] CFI Enabled
5,264,894 UART: [fht] FMC Alias Private Key: 7
5,372,068 UART: [art] Extend RT PCRs Done
5,372,496 UART: [art] Lock RT PCRs Done
5,374,310 UART: [art] Populate DV Done
5,382,646 UART: [fht] FMC Alias Private Key: 7
5,383,780 UART: [art] Derive CDI
5,384,060 UART: [art] Store in in slot 0x4
5,469,301 UART: [art] Derive Key Pair
5,469,661 UART: [art] Store priv key in slot 0x5
5,482,299 UART: [art] Derive Key Pair - Done
5,497,018 UART: [art] Signing Cert with AUTHO
5,497,498 UART: RITY.KEYID = 7
5,512,858 UART: [art] Erasing AUTHORITY.KEYID = 7
5,513,623 UART: [art] PUB.X = 17DFBF12CC35CA5321DD4647F06ED463C0893A097732DDCD99312B06C808AA27FE6624B1E001DC9DFC5D65EAD772CE05
5,520,392 UART: [art] PUB.Y = B90E2F070C4C932C3F33153233C930AFA033C4FC0F618613860CD3635392EFFA5E6BA9D36B2255F5C594A02A5B11A0F6
5,527,331 UART: [art] SIG.R = 8503BCEBD85EF17999922105C9310D690804CAAEC726BB64E0859EC57ECD5AA055C60C095F0097CD58291A898916C9C2
5,534,060 UART: [art] SIG.S = 5B82DACDBA327751D1C9233B8264B05FA3F1D7D22263BC5C6009381BC3BADFBC3A75D550B1B48F964B0FB3E9DD4B9B41
5,556,865 UART: Caliptra RT
5,557,210 UART: [state] CFI Enabled
5,665,507 UART: [rt] RT listening for mailbox commands...
5,666,177 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,788,951 UART: [rt]cmd =0x41544d4e, len=14344
6,428,414 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,534 ready_for_fw is high
1,362,534 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,390,064 >>> mbox cmd response: success
5,451,967 UART:
5,451,983 UART: Running Caliptra FMC ...
5,452,391 UART:
5,452,534 UART: [state] CFI Enabled
5,463,166 UART: [fht] FMC Alias Private Key: 7
5,570,446 UART: [art] Extend RT PCRs Done
5,570,874 UART: [art] Lock RT PCRs Done
5,572,600 UART: [art] Populate DV Done
5,580,940 UART: [fht] FMC Alias Private Key: 7
5,582,006 UART: [art] Derive CDI
5,582,286 UART: [art] Store in in slot 0x4
5,668,105 UART: [art] Derive Key Pair
5,668,465 UART: [art] Store priv key in slot 0x5
5,681,687 UART: [art] Derive Key Pair - Done
5,696,154 UART: [art] Signing Cert with AUTHO
5,696,634 UART: RITY.KEYID = 7
5,711,546 UART: [art] Erasing AUTHORITY.KEYID = 7
5,712,311 UART: [art] PUB.X = 77DC6373BFAF9A1D24F316D896B35528E22C7273CF18E8285D61AF697E320EBC3F7C28812C543F2CF67D0B3CD8DE456D
5,719,085 UART: [art] PUB.Y = F1A146F692427622D3C029583F46B9762FA55007A393B6B4EC456393134399C866DFA007EF0A1DF7DF1613DAB7AE1F85
5,726,026 UART: [art] SIG.R = 3DEED1F34CBFA4265FD9A0DA9F2EDEB8A1B2FC90ADDC09B6BE510802731E005F7CDC3B000859D804F983E04079ABF157
5,732,759 UART: [art] SIG.S = 466CA360AA9A301894139014DA864B706A904D21A9867607BB7B5716EAD778A27FE68956F87B650DA07B13E83169F907
5,757,325 UART: Caliptra RT
5,757,670 UART: [state] CFI Enabled
5,865,282 UART: [rt] RT listening for mailbox commands...
5,865,952 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,988,948 UART: [rt]cmd =0x41544d4e, len=14344
6,633,389 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
893,276 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,401 UART: [kat] ++
897,553 UART: [kat] sha1
901,767 UART: [kat] SHA2-256
903,707 UART: [kat] SHA2-384
906,524 UART: [kat] SHA2-512-ACC
908,425 UART: [kat] ECC-384
917,978 UART: [kat] HMAC-384Kdf
922,584 UART: [kat] LMS
1,170,912 UART: [kat] --
1,172,137 UART: [cold-reset] ++
1,172,587 UART: [fht] FHT @ 0x50003400
1,175,084 UART: [idev] ++
1,175,252 UART: [idev] CDI.KEYID = 6
1,175,612 UART: [idev] SUBJECT.KEYID = 7
1,176,036 UART: [idev] UDS.KEYID = 0
1,176,381 ready_for_fw is high
1,176,381 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,248 UART: [idev] Erasing UDS.KEYID = 0
1,201,641 UART: [idev] Sha1 KeyId Algorithm
1,210,221 UART: [idev] --
1,211,337 UART: [ldev] ++
1,211,505 UART: [ldev] CDI.KEYID = 6
1,211,868 UART: [ldev] SUBJECT.KEYID = 5
1,212,294 UART: [ldev] AUTHORITY.KEYID = 7
1,212,757 UART: [ldev] FE.KEYID = 1
1,217,875 UART: [ldev] Erasing FE.KEYID = 1
1,244,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,619 UART: [ldev] --
1,284,126 UART: [fwproc] Wait for Commands...
1,284,928 UART: [fwproc] Recv command 0x46574c44
1,285,656 UART: [fwproc] Recv'd Img size: 114332 bytes
3,132,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,280 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,189,584 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,325,393 >>> mbox cmd response: success
3,326,611 UART: [afmc] ++
3,326,779 UART: [afmc] CDI.KEYID = 6
3,327,141 UART: [afmc] SUBJECT.KEYID = 7
3,327,566 UART: [afmc] AUTHORITY.KEYID = 5
3,363,022 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,949 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,385,658 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,391,550 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,397,261 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,405,196 UART: [afmc] --
3,406,256 UART: [cold-reset] --
3,407,122 UART: [state] Locking Datavault
3,408,557 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,161 UART: [state] Locking ICCM
3,409,641 UART: [exit] Launching FMC @ 0x40000130
3,414,970 UART:
3,414,986 UART: Running Caliptra FMC ...
3,415,394 UART:
3,415,448 UART: [state] CFI Enabled
3,426,008 UART: [fht] FMC Alias Private Key: 7
3,534,016 UART: [art] Extend RT PCRs Done
3,534,444 UART: [art] Lock RT PCRs Done
3,535,696 UART: [art] Populate DV Done
3,544,054 UART: [fht] FMC Alias Private Key: 7
3,545,008 UART: [art] Derive CDI
3,545,288 UART: [art] Store in in slot 0x4
3,631,407 UART: [art] Derive Key Pair
3,631,767 UART: [art] Store priv key in slot 0x5
3,644,855 UART: [art] Derive Key Pair - Done
3,659,595 UART: [art] Signing Cert with AUTHO
3,660,075 UART: RITY.KEYID = 7
3,675,117 UART: [art] Erasing AUTHORITY.KEYID = 7
3,675,882 UART: [art] PUB.X = FAE8A73A3C9E41B407A85C8FB740789C2B681EC7E14EA750DD905CA2A0B2F402A3C21F612AFD0C4E9E5CA80AB008EF35
3,682,657 UART: [art] PUB.Y = 1FED3B88F630F07D9B5D50FC148157FB262037CFD983C0A27A42D4B7B557B31DFA1340C87ED4EA5E7D144B10AF5818CC
3,689,621 UART: [art] SIG.R = DCD73D022376FC67D7C2D762B6A27E0B3E53F6BF6D786BFC2C744159A0516054F7E4ED1B4098FB669715C4BEBB04410E
3,696,389 UART: [art] SIG.S = F8860622AA832DD9F31F57867792581D65CF484B605D7D3010E3865CE84CBAECEEA26779E72795A92F492257D81A7968
3,720,789 UART: Caliptra RT
3,721,042 UART: [state] CFI Enabled
3,828,175 UART: [rt] RT listening for mailbox commands...
3,828,845 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,951,761 UART: [rt]cmd =0x41544d4e, len=14344
4,594,297 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,263 ready_for_fw is high
1,060,263 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,162,467 >>> mbox cmd response: success
3,223,014 UART:
3,223,030 UART: Running Caliptra FMC ...
3,223,438 UART:
3,223,492 UART: [state] CFI Enabled
3,234,314 UART: [fht] FMC Alias Private Key: 7
3,342,664 UART: [art] Extend RT PCRs Done
3,343,092 UART: [art] Lock RT PCRs Done
3,344,684 UART: [art] Populate DV Done
3,352,942 UART: [fht] FMC Alias Private Key: 7
3,354,092 UART: [art] Derive CDI
3,354,372 UART: [art] Store in in slot 0x4
3,440,283 UART: [art] Derive Key Pair
3,440,643 UART: [art] Store priv key in slot 0x5
3,453,505 UART: [art] Derive Key Pair - Done
3,468,377 UART: [art] Signing Cert with AUTHO
3,468,857 UART: RITY.KEYID = 7
3,483,837 UART: [art] Erasing AUTHORITY.KEYID = 7
3,484,602 UART: [art] PUB.X = 663AF0696C671673BD3238EC4381D0B538542F4720715B2D41893EF709C0190C3B602FA48E6911F3B2332F6BA551970A
3,491,353 UART: [art] PUB.Y = 149C9DFC67B6BA8C122608CDF6E4D5BC64DAB4B8DC52970B64DD71BCD36457997AC2BBDBCF1526346A391058AF296040
3,498,311 UART: [art] SIG.R = 8E0D188AFBA2A7CB259EE29AE72DF9862A1877B62E9C04962000488ED28FCB01C2FA2C597E5A663596720F6BF189599D
3,505,053 UART: [art] SIG.S = 4E208AF0960BAB8D560397D15D3C5506CE20B123BE14D97579F443408B657CCE6191F448330A9593E75B8BA113EF5BA6
3,528,728 UART: Caliptra RT
3,528,981 UART: [state] CFI Enabled
3,635,641 UART: [rt] RT listening for mailbox commands...
3,636,311 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,525 UART: [rt]cmd =0x41544d4e, len=14344
4,394,144 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,821 UART: [state] LifecycleState = Unprovisioned
86,476 UART: [state] DebugLocked = No
87,042 UART: [state] WD Timer not started. Device not locked for debugging
88,309 UART: [kat] SHA2-256
893,959 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,084 UART: [kat] ++
898,236 UART: [kat] sha1
902,424 UART: [kat] SHA2-256
904,364 UART: [kat] SHA2-384
907,127 UART: [kat] SHA2-512-ACC
909,028 UART: [kat] ECC-384
918,797 UART: [kat] HMAC-384Kdf
923,353 UART: [kat] LMS
1,171,681 UART: [kat] --
1,172,420 UART: [cold-reset] ++
1,172,816 UART: [fht] FHT @ 0x50003400
1,175,645 UART: [idev] ++
1,175,813 UART: [idev] CDI.KEYID = 6
1,176,173 UART: [idev] SUBJECT.KEYID = 7
1,176,597 UART: [idev] UDS.KEYID = 0
1,176,942 ready_for_fw is high
1,176,942 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,371 UART: [idev] Erasing UDS.KEYID = 0
1,201,074 UART: [idev] Sha1 KeyId Algorithm
1,209,326 UART: [idev] --
1,210,308 UART: [ldev] ++
1,210,476 UART: [ldev] CDI.KEYID = 6
1,210,839 UART: [ldev] SUBJECT.KEYID = 5
1,211,265 UART: [ldev] AUTHORITY.KEYID = 7
1,211,728 UART: [ldev] FE.KEYID = 1
1,217,154 UART: [ldev] Erasing FE.KEYID = 1
1,243,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,484 UART: [ldev] --
1,282,795 UART: [fwproc] Wait for Commands...
1,283,375 UART: [fwproc] Recv command 0x46574c44
1,284,103 UART: [fwproc] Recv'd Img size: 114332 bytes
3,130,138 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,439 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,743 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,322,526 >>> mbox cmd response: success
3,323,732 UART: [afmc] ++
3,323,900 UART: [afmc] CDI.KEYID = 6
3,324,262 UART: [afmc] SUBJECT.KEYID = 7
3,324,687 UART: [afmc] AUTHORITY.KEYID = 5
3,360,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,658 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,406 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,115 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,007 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,718 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,475 UART: [afmc] --
3,403,373 UART: [cold-reset] --
3,404,023 UART: [state] Locking Datavault
3,405,116 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,720 UART: [state] Locking ICCM
3,406,386 UART: [exit] Launching FMC @ 0x40000130
3,411,715 UART:
3,411,731 UART: Running Caliptra FMC ...
3,412,139 UART:
3,412,282 UART: [state] CFI Enabled
3,422,906 UART: [fht] FMC Alias Private Key: 7
3,530,376 UART: [art] Extend RT PCRs Done
3,530,804 UART: [art] Lock RT PCRs Done
3,532,320 UART: [art] Populate DV Done
3,540,552 UART: [fht] FMC Alias Private Key: 7
3,541,656 UART: [art] Derive CDI
3,541,936 UART: [art] Store in in slot 0x4
3,627,949 UART: [art] Derive Key Pair
3,628,309 UART: [art] Store priv key in slot 0x5
3,641,771 UART: [art] Derive Key Pair - Done
3,656,753 UART: [art] Signing Cert with AUTHO
3,657,233 UART: RITY.KEYID = 7
3,672,889 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,654 UART: [art] PUB.X = 590DBE77851CEE2A9D14BCAB4E917EC180022BED69E462C4CC57B1A8CF9C8C34A82588A2D23CE04D12F9434441FF7E41
3,680,432 UART: [art] PUB.Y = 3C6462AAAC1B01451F405572D14DBB95A7BAE20993431BD0F95EB4780E2C48FAD3CAB1C73D804218CF2065864BCF3814
3,687,381 UART: [art] SIG.R = 97C42AF26C942A5DA629BC23E718D3F11F01B1A1869C426E7D70B6E99D7903E3E63BFCD6EB0BEFBC47067D5991DB8317
3,694,151 UART: [art] SIG.S = CAE7BB2825D939B14A0584668B2836E936FE5DB019EFCBEFD46C2C78E3C1C86C40565F0A8D8AF01EFA4B53120E8D9257
3,717,613 UART: Caliptra RT
3,717,958 UART: [state] CFI Enabled
3,825,021 UART: [rt] RT listening for mailbox commands...
3,825,691 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,503 UART: [rt]cmd =0x41544d4e, len=14344
4,576,089 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,414 ready_for_fw is high
1,060,414 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,179,556 >>> mbox cmd response: success
3,241,981 UART:
3,241,997 UART: Running Caliptra FMC ...
3,242,405 UART:
3,242,548 UART: [state] CFI Enabled
3,253,222 UART: [fht] FMC Alias Private Key: 7
3,361,094 UART: [art] Extend RT PCRs Done
3,361,522 UART: [art] Lock RT PCRs Done
3,362,948 UART: [art] Populate DV Done
3,371,108 UART: [fht] FMC Alias Private Key: 7
3,372,092 UART: [art] Derive CDI
3,372,372 UART: [art] Store in in slot 0x4
3,457,779 UART: [art] Derive Key Pair
3,458,139 UART: [art] Store priv key in slot 0x5
3,471,435 UART: [art] Derive Key Pair - Done
3,486,166 UART: [art] Signing Cert with AUTHO
3,486,646 UART: RITY.KEYID = 7
3,501,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,647 UART: [art] PUB.X = CDE424737730620002D57CCEBE29C85A6B1C2250F3FBACDF5CF9B1023C7E301605314ECB0C978F1D43EC1E5451D155E9
3,509,393 UART: [art] PUB.Y = C1E9A6B5EFDA6E5560C1EFB9222A421891F909944CD74AF576632D3B2607233982286E4651CD1F113B0A072E206E238C
3,516,329 UART: [art] SIG.R = 1ACD320DF26759C85608EEFB0AF011A1C46AEF7A847DB299440C3917C4E2C9B52DF20317DC7E163990313F19A8D76CD4
3,523,092 UART: [art] SIG.S = E9BE020178D6384F3A1ED1997701EC99E676DA58C9428C163809C3CD19E8AAF2F5B685C868561DA7F7C9A96D56F723A2
3,547,103 UART: Caliptra RT
3,547,448 UART: [state] CFI Enabled
3,655,706 UART: [rt] RT listening for mailbox commands...
3,656,376 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,779,636 UART: [rt]cmd =0x41544d4e, len=14344
4,417,112 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,472 UART: [kat] SHA2-256
891,022 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,151 UART: [kat] ++
895,303 UART: [kat] sha1
899,477 UART: [kat] SHA2-256
901,417 UART: [kat] SHA2-384
904,104 UART: [kat] SHA2-512-ACC
906,005 UART: [kat] ECC-384
915,654 UART: [kat] HMAC-384Kdf
920,180 UART: [kat] LMS
1,168,492 UART: [kat] --
1,169,433 UART: [cold-reset] ++
1,169,955 UART: [fht] FHT @ 0x50003400
1,172,695 UART: [idev] ++
1,172,863 UART: [idev] CDI.KEYID = 6
1,173,224 UART: [idev] SUBJECT.KEYID = 7
1,173,649 UART: [idev] UDS.KEYID = 0
1,173,995 ready_for_fw is high
1,173,995 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,595 UART: [idev] Erasing UDS.KEYID = 0
1,198,455 UART: [idev] Sha1 KeyId Algorithm
1,207,345 UART: [idev] --
1,208,286 UART: [ldev] ++
1,208,454 UART: [ldev] CDI.KEYID = 6
1,208,818 UART: [ldev] SUBJECT.KEYID = 5
1,209,245 UART: [ldev] AUTHORITY.KEYID = 7
1,209,708 UART: [ldev] FE.KEYID = 1
1,214,928 UART: [ldev] Erasing FE.KEYID = 1
1,241,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,054 UART: [ldev] --
1,280,420 UART: [fwproc] Wait for Commands...
1,281,055 UART: [fwproc] Recv command 0x46574c44
1,281,788 UART: [fwproc] Recv'd Img size: 114332 bytes
3,134,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,162,594 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,191,903 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,327,597 >>> mbox cmd response: success
3,328,844 UART: [afmc] ++
3,329,012 UART: [afmc] CDI.KEYID = 6
3,329,375 UART: [afmc] SUBJECT.KEYID = 7
3,329,801 UART: [afmc] AUTHORITY.KEYID = 5
3,364,985 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,381,603 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,382,354 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,388,064 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,393,954 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,399,665 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,407,365 UART: [afmc] --
3,408,409 UART: [cold-reset] --
3,409,341 UART: [state] Locking Datavault
3,410,508 UART: [state] Locking PCR0, PCR1 and PCR31
3,411,112 UART: [state] Locking ICCM
3,411,770 UART: [exit] Launching FMC @ 0x40000130
3,417,099 UART:
3,417,115 UART: Running Caliptra FMC ...
3,417,523 UART:
3,417,577 UART: [state] CFI Enabled
3,428,063 UART: [fht] FMC Alias Private Key: 7
3,536,231 UART: [art] Extend RT PCRs Done
3,536,659 UART: [art] Lock RT PCRs Done
3,538,311 UART: [art] Populate DV Done
3,546,713 UART: [fht] FMC Alias Private Key: 7
3,547,763 UART: [art] Derive CDI
3,548,043 UART: [art] Store in in slot 0x4
3,634,032 UART: [art] Derive Key Pair
3,634,392 UART: [art] Store priv key in slot 0x5
3,647,584 UART: [art] Derive Key Pair - Done
3,662,663 UART: [art] Signing Cert with AUTHO
3,663,143 UART: RITY.KEYID = 7
3,678,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,679,380 UART: [art] PUB.X = F4AA59737228502B1F767EDBA5B453124090FABFEB42C1F345C2BBE02AD73B119712D5C4B4E7154419A0341D55E42FFB
3,686,158 UART: [art] PUB.Y = DC9E36C0921CD3B7502F6FDDDF6697CE8A7441858E113D62B94AC87B23CC2C7974541E4B719D8CB80CAA02055F508526
3,693,105 UART: [art] SIG.R = C2056F6CC6B230AC4335AB5A1F400E35EFCC4B4B89A5830C77C16E3E658DEDDF914EACD8C08A5C5A116DADE1564D4FCF
3,699,892 UART: [art] SIG.S = 7C89C914CBD11FA0676FF33A1065318F727AF5019587D5F9B28669AF642B2F1C543E79AD1BBD98C7A48E6B188A276D98
3,723,834 UART: Caliptra RT
3,724,087 UART: [state] CFI Enabled
3,832,545 UART: [rt] RT listening for mailbox commands...
3,833,215 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,956,293 UART: [rt]cmd =0x41544d4e, len=14344
4,611,050 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,528 ready_for_fw is high
1,055,528 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,167,691 >>> mbox cmd response: success
3,228,604 UART:
3,228,620 UART: Running Caliptra FMC ...
3,229,028 UART:
3,229,082 UART: [state] CFI Enabled
3,239,548 UART: [fht] FMC Alias Private Key: 7
3,347,278 UART: [art] Extend RT PCRs Done
3,347,706 UART: [art] Lock RT PCRs Done
3,349,282 UART: [art] Populate DV Done
3,357,590 UART: [fht] FMC Alias Private Key: 7
3,358,554 UART: [art] Derive CDI
3,358,834 UART: [art] Store in in slot 0x4
3,444,387 UART: [art] Derive Key Pair
3,444,747 UART: [art] Store priv key in slot 0x5
3,457,629 UART: [art] Derive Key Pair - Done
3,472,686 UART: [art] Signing Cert with AUTHO
3,473,166 UART: RITY.KEYID = 7
3,488,348 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,113 UART: [art] PUB.X = D54C82D84F0E3064F8ACEED421EB1406CF7201E7DD7E56D9BB404409500CA7D62052FE5F1551888CBA88B4010CFFA9D1
3,495,874 UART: [art] PUB.Y = 55128A4FE0928C9C5FF4FE5387C679F2AAC71C92283E90E8133AD0FB4408007C78DF6F91FCD99C0803B42D7BAFB4BCFD
3,502,809 UART: [art] SIG.R = 9D387476A0CE017F422623D7B5DBDD61B7732AB24C512539ACE31E57482AA6AA7E533BF04472A9B58E913EAE672AB2F0
3,509,584 UART: [art] SIG.S = 7BB0B0D7F3617D2C2797DD85930ED1137D6197C563E481C68EF77335CD14ABE2B415A3192176DE068197A9B63B812E2B
3,534,005 UART: Caliptra RT
3,534,258 UART: [state] CFI Enabled
3,641,396 UART: [rt] RT listening for mailbox commands...
3,642,066 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,078 UART: [rt]cmd =0x41544d4e, len=14344
4,390,097 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
891,607 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,736 UART: [kat] ++
895,888 UART: [kat] sha1
900,028 UART: [kat] SHA2-256
901,968 UART: [kat] SHA2-384
904,863 UART: [kat] SHA2-512-ACC
906,764 UART: [kat] ECC-384
916,961 UART: [kat] HMAC-384Kdf
921,545 UART: [kat] LMS
1,169,857 UART: [kat] --
1,170,866 UART: [cold-reset] ++
1,171,410 UART: [fht] FHT @ 0x50003400
1,174,134 UART: [idev] ++
1,174,302 UART: [idev] CDI.KEYID = 6
1,174,663 UART: [idev] SUBJECT.KEYID = 7
1,175,088 UART: [idev] UDS.KEYID = 0
1,175,434 ready_for_fw is high
1,175,434 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,596 UART: [idev] Erasing UDS.KEYID = 0
1,200,050 UART: [idev] Sha1 KeyId Algorithm
1,208,728 UART: [idev] --
1,209,635 UART: [ldev] ++
1,209,803 UART: [ldev] CDI.KEYID = 6
1,210,167 UART: [ldev] SUBJECT.KEYID = 5
1,210,594 UART: [ldev] AUTHORITY.KEYID = 7
1,211,057 UART: [ldev] FE.KEYID = 1
1,216,307 UART: [ldev] Erasing FE.KEYID = 1
1,242,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,215 UART: [ldev] --
1,281,619 UART: [fwproc] Wait for Commands...
1,282,298 UART: [fwproc] Recv command 0x46574c44
1,283,031 UART: [fwproc] Recv'd Img size: 114332 bytes
3,123,876 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,524 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,833 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,316,617 >>> mbox cmd response: success
3,317,794 UART: [afmc] ++
3,317,962 UART: [afmc] CDI.KEYID = 6
3,318,325 UART: [afmc] SUBJECT.KEYID = 7
3,318,751 UART: [afmc] AUTHORITY.KEYID = 5
3,354,783 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,187 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,938 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,648 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,538 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,249 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,981 UART: [afmc] --
3,397,981 UART: [cold-reset] --
3,398,925 UART: [state] Locking Datavault
3,399,980 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,584 UART: [state] Locking ICCM
3,401,058 UART: [exit] Launching FMC @ 0x40000130
3,406,387 UART:
3,406,403 UART: Running Caliptra FMC ...
3,406,811 UART:
3,406,954 UART: [state] CFI Enabled
3,417,672 UART: [fht] FMC Alias Private Key: 7
3,525,588 UART: [art] Extend RT PCRs Done
3,526,016 UART: [art] Lock RT PCRs Done
3,528,008 UART: [art] Populate DV Done
3,536,182 UART: [fht] FMC Alias Private Key: 7
3,537,220 UART: [art] Derive CDI
3,537,500 UART: [art] Store in in slot 0x4
3,623,047 UART: [art] Derive Key Pair
3,623,407 UART: [art] Store priv key in slot 0x5
3,636,563 UART: [art] Derive Key Pair - Done
3,651,328 UART: [art] Signing Cert with AUTHO
3,651,808 UART: RITY.KEYID = 7
3,666,784 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,549 UART: [art] PUB.X = FF861CE2DFBF2677D967C1A9826E55920B87BDAB277923E6A7A108D3B077A6053BDAC38B7E1AB59595A62F28B7729A1F
3,674,320 UART: [art] PUB.Y = 9DB37E94D8CC451FCC0BA697D7BECCBAA9F87991022142BF65C725B1157EBE1B6BCD855F146C61BBE088A57BBABCB2E3
3,681,290 UART: [art] SIG.R = EFE7609B13D75111508EA38819C662DE76164BC6F2820BD7C51D66D0AEFDE118AA3CC94FADF0526EA3C59E6DFEE59A82
3,688,075 UART: [art] SIG.S = 6359DD86D5611D1185E7F35BCA143BB900AD596D17776DAA268AED97DCDBA7D7B94D6CCA00D3772C9A8DB1CB78DAF16A
3,711,970 UART: Caliptra RT
3,712,315 UART: [state] CFI Enabled
3,819,197 UART: [rt] RT listening for mailbox commands...
3,819,867 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,879 UART: [rt]cmd =0x41544d4e, len=14344
4,592,268 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,167 ready_for_fw is high
1,057,167 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,161,374 >>> mbox cmd response: success
3,224,099 UART:
3,224,115 UART: Running Caliptra FMC ...
3,224,523 UART:
3,224,666 UART: [state] CFI Enabled
3,235,284 UART: [fht] FMC Alias Private Key: 7
3,343,722 UART: [art] Extend RT PCRs Done
3,344,150 UART: [art] Lock RT PCRs Done
3,345,674 UART: [art] Populate DV Done
3,353,862 UART: [fht] FMC Alias Private Key: 7
3,355,000 UART: [art] Derive CDI
3,355,280 UART: [art] Store in in slot 0x4
3,441,153 UART: [art] Derive Key Pair
3,441,513 UART: [art] Store priv key in slot 0x5
3,454,819 UART: [art] Derive Key Pair - Done
3,469,291 UART: [art] Signing Cert with AUTHO
3,469,771 UART: RITY.KEYID = 7
3,484,581 UART: [art] Erasing AUTHORITY.KEYID = 7
3,485,346 UART: [art] PUB.X = EA1CFAC0CE9773FB5B0A9C58BE0AB9CE6A5A134C66624421E5FCB2630F65A369DE293E5B1BA8092AEB572B135F26D12A
3,492,124 UART: [art] PUB.Y = 3749EE28D6DE951FC97126B6C8ED070A51A9BEED04E4E6FE1652C8A572A5CF07405CA9E14D83DF0569DFAA3D897594C6
3,499,073 UART: [art] SIG.R = BAB2790AC5BC3F0C832DF35124F2E36B241C69247D5168AF3D0C9C4C6234DA0A574392CF77066D486C46C24110B9FCB2
3,505,834 UART: [art] SIG.S = 51284F64A2FFB2EAEADADBA39A4D7EC66C6879CAB622CAFEA5774EB51149DA45703E10528C7272FE24DD94695839644B
3,530,087 UART: Caliptra RT
3,530,432 UART: [state] CFI Enabled
3,638,508 UART: [rt] RT listening for mailbox commands...
3,639,178 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,108 UART: [rt]cmd =0x41544d4e, len=14344
4,404,476 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Unprovisioned
86,053 UART: [state] DebugLocked = No
86,745 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,297 UART: [kat] SHA2-256
882,228 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,343 UART: [kat] ++
886,495 UART: [kat] sha1
890,807 UART: [kat] SHA2-256
892,745 UART: [kat] SHA2-384
895,614 UART: [kat] SHA2-512-ACC
897,515 UART: [kat] ECC-384
903,214 UART: [kat] HMAC-384Kdf
907,806 UART: [kat] LMS
1,476,002 UART: [kat] --
1,476,781 UART: [cold-reset] ++
1,477,311 UART: [fht] Storing FHT @ 0x50003400
1,480,064 UART: [idev] ++
1,480,232 UART: [idev] CDI.KEYID = 6
1,480,592 UART: [idev] SUBJECT.KEYID = 7
1,481,016 UART: [idev] UDS.KEYID = 0
1,481,361 ready_for_fw is high
1,481,361 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,590 UART: [idev] Erasing UDS.KEYID = 0
1,505,288 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,934 UART: [idev] --
1,514,935 UART: [ldev] ++
1,515,103 UART: [ldev] CDI.KEYID = 6
1,515,466 UART: [ldev] SUBJECT.KEYID = 5
1,515,892 UART: [ldev] AUTHORITY.KEYID = 7
1,516,355 UART: [ldev] FE.KEYID = 1
1,521,823 UART: [ldev] Erasing FE.KEYID = 1
1,547,422 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,548 UART: [ldev] --
1,587,053 UART: [fwproc] Waiting for Commands...
1,587,786 UART: [fwproc] Received command 0x46574c44
1,588,577 UART: [fwproc] Received Image of size 114332 bytes
5,235,575 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,263,129 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,292,481 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,428,450 >>> mbox cmd response: success
5,429,662 UART: [afmc] ++
5,429,830 UART: [afmc] CDI.KEYID = 6
5,430,192 UART: [afmc] SUBJECT.KEYID = 7
5,430,617 UART: [afmc] AUTHORITY.KEYID = 5
5,465,707 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,481,771 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,482,551 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,488,260 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,494,152 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,499,853 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,507,837 UART: [afmc] --
5,508,931 UART: [cold-reset] --
5,509,779 UART: [state] Locking Datavault
5,510,800 UART: [state] Locking PCR0, PCR1 and PCR31
5,511,404 UART: [state] Locking ICCM
5,511,866 UART: [exit] Launching FMC @ 0x40000130
5,517,195 UART:
5,517,211 UART: Running Caliptra FMC ...
5,517,619 UART:
5,517,673 UART: [state] CFI Enabled
5,528,139 UART: [fht] FMC Alias Private Key: 7
5,636,389 UART: [art] Extend RT PCRs Done
5,636,817 UART: [art] Lock RT PCRs Done
5,637,865 UART: [art] Populate DV Done
5,645,965 UART: [fht] FMC Alias Private Key: 7
5,646,983 UART: [art] Derive CDI
5,647,263 UART: [art] Store in in slot 0x4
5,733,064 UART: [art] Derive Key Pair
5,733,424 UART: [art] Store priv key in slot 0x5
5,746,400 UART: [art] Derive Key Pair - Done
5,761,410 UART: [art] Signing Cert with AUTHO
5,761,890 UART: RITY.KEYID = 7
5,777,450 UART: [art] Erasing AUTHORITY.KEYID = 7
5,778,215 UART: [art] PUB.X = 7E4738AF5CC593032E1FFCD00BA7897EC6446B4FEF52296F4F89F7C69E5C83031D8173451C3B5C4FBBA67B786872CA36
5,784,984 UART: [art] PUB.Y = 2D0F808860871C1FD3C01B96FFBED8AE66BC0D66C1459F3BA83BDA912CC663223496ABE0F5773054876E606B48A462D1
5,791,934 UART: [art] SIG.R = A14BB2828D928697001255080E4A7584904633042F84E17438886BEA9B4A1B2554870B5D4EBFCBC318F0EBF9E17ADBAD
5,798,672 UART: [art] SIG.S = 052F9BDC0C0E07E761FE3FE81473A0FB71C3742305168FDD43218DC6B7A6A2B4D4CD32A28D782360C793509CD6A7511C
5,822,020 UART: Caliptra RT
5,822,273 UART: [state] CFI Enabled
5,929,940 UART: [rt] RT listening for mailbox commands...
5,930,610 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,053,732 UART: [rt]cmd =0x41544d4e, len=14344
6,707,820 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,215 ready_for_fw is high
1,362,215 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,238,089 >>> mbox cmd response: success
5,299,284 UART:
5,299,300 UART: Running Caliptra FMC ...
5,299,708 UART:
5,299,762 UART: [state] CFI Enabled
5,309,982 UART: [fht] FMC Alias Private Key: 7
5,417,490 UART: [art] Extend RT PCRs Done
5,417,918 UART: [art] Lock RT PCRs Done
5,419,094 UART: [art] Populate DV Done
5,427,068 UART: [fht] FMC Alias Private Key: 7
5,428,242 UART: [art] Derive CDI
5,428,522 UART: [art] Store in in slot 0x4
5,514,071 UART: [art] Derive Key Pair
5,514,431 UART: [art] Store priv key in slot 0x5
5,527,811 UART: [art] Derive Key Pair - Done
5,542,697 UART: [art] Signing Cert with AUTHO
5,543,177 UART: RITY.KEYID = 7
5,558,195 UART: [art] Erasing AUTHORITY.KEYID = 7
5,558,960 UART: [art] PUB.X = 8C82D9AF25EFE115BE18C6E13242B7EC06F1AD803559AA67A7388467E8CF75A63FB2FBCE81A137A83F6068082719CBAC
5,565,736 UART: [art] PUB.Y = BEF826D2C28B3CF05EA0AB539DF60558CF2781335128CE56BDB5B753BD4FFDDCDD219304CEE60470AFC608089599A7F1
5,572,687 UART: [art] SIG.R = 225378690A4B51CEDD0F3FB51A01E9F038B1AD2191B3E1B4B5F677083700428925476C37BCBCD1DBAC9E75F829A84323
5,579,427 UART: [art] SIG.S = 674C5C7E41C79CD867EC85F47FC5C10B10860C6077BB9DEAE876AFD24A2A7A81A2D6B2E9309A474F2AAEB7BA8104520D
5,602,764 UART: Caliptra RT
5,603,017 UART: [state] CFI Enabled
5,711,665 UART: [rt] RT listening for mailbox commands...
5,712,335 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,835,581 UART: [rt]cmd =0x41544d4e, len=14344
6,492,422 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,230 UART: [kat] SHA2-256
882,161 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,276 UART: [kat] ++
886,428 UART: [kat] sha1
890,622 UART: [kat] SHA2-256
892,560 UART: [kat] SHA2-384
895,183 UART: [kat] SHA2-512-ACC
897,084 UART: [kat] ECC-384
902,785 UART: [kat] HMAC-384Kdf
907,559 UART: [kat] LMS
1,475,755 UART: [kat] --
1,476,340 UART: [cold-reset] ++
1,476,856 UART: [fht] Storing FHT @ 0x50003400
1,479,685 UART: [idev] ++
1,479,853 UART: [idev] CDI.KEYID = 6
1,480,213 UART: [idev] SUBJECT.KEYID = 7
1,480,637 UART: [idev] UDS.KEYID = 0
1,480,982 ready_for_fw is high
1,480,982 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,825 UART: [idev] Erasing UDS.KEYID = 0
1,505,251 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,817 UART: [idev] --
1,514,834 UART: [ldev] ++
1,515,002 UART: [ldev] CDI.KEYID = 6
1,515,365 UART: [ldev] SUBJECT.KEYID = 5
1,515,791 UART: [ldev] AUTHORITY.KEYID = 7
1,516,254 UART: [ldev] FE.KEYID = 1
1,521,564 UART: [ldev] Erasing FE.KEYID = 1
1,546,367 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,227 UART: [ldev] --
1,585,732 UART: [fwproc] Waiting for Commands...
1,586,441 UART: [fwproc] Received command 0x46574c44
1,587,232 UART: [fwproc] Received Image of size 114332 bytes
5,347,807 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,376,227 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,405,579 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,541,562 >>> mbox cmd response: success
5,542,752 UART: [afmc] ++
5,542,920 UART: [afmc] CDI.KEYID = 6
5,543,282 UART: [afmc] SUBJECT.KEYID = 7
5,543,707 UART: [afmc] AUTHORITY.KEYID = 5
5,578,595 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,594,651 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,595,431 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,601,140 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,607,032 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,612,733 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,620,529 UART: [afmc] --
5,621,543 UART: [cold-reset] --
5,622,597 UART: [state] Locking Datavault
5,623,968 UART: [state] Locking PCR0, PCR1 and PCR31
5,624,572 UART: [state] Locking ICCM
5,625,120 UART: [exit] Launching FMC @ 0x40000130
5,630,449 UART:
5,630,465 UART: Running Caliptra FMC ...
5,630,873 UART:
5,631,016 UART: [state] CFI Enabled
5,641,496 UART: [fht] FMC Alias Private Key: 7
5,749,220 UART: [art] Extend RT PCRs Done
5,749,648 UART: [art] Lock RT PCRs Done
5,751,020 UART: [art] Populate DV Done
5,759,312 UART: [fht] FMC Alias Private Key: 7
5,760,434 UART: [art] Derive CDI
5,760,714 UART: [art] Store in in slot 0x4
5,846,713 UART: [art] Derive Key Pair
5,847,073 UART: [art] Store priv key in slot 0x5
5,860,477 UART: [art] Derive Key Pair - Done
5,875,165 UART: [art] Signing Cert with AUTHO
5,875,645 UART: RITY.KEYID = 7
5,890,809 UART: [art] Erasing AUTHORITY.KEYID = 7
5,891,574 UART: [art] PUB.X = F59B58BDA45C1AD77FB4E19D96F3977496DDDE539354ADE9B8368F2DD83AF17659D04175FC4F123BCC3D1BC1074BDE17
5,898,357 UART: [art] PUB.Y = 174024B0BD38B8D7136162AE73B7EC03FF5D9A8A99BF2DA7C1668A0D4BFF6111AE1D73CF5014C203631E51CA11B5700D
5,905,305 UART: [art] SIG.R = A41E36C17236C572B04462B83D254439E79DCFB90CD3A1A6F590861BA4DD907AB0BA07EDF4FE400DF6A8742CC630BCEA
5,912,082 UART: [art] SIG.S = 58C0C1B3F1AE870C54BAE85816830CD2A1F104623EAE03AB223093A44E19BE70ECE2A4F5F405B94737B5DAE7D26D96A3
5,935,864 UART: Caliptra RT
5,936,209 UART: [state] CFI Enabled
6,043,572 UART: [rt] RT listening for mailbox commands...
6,044,242 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,167,166 UART: [rt]cmd =0x41544d4e, len=14344
6,809,485 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,216 ready_for_fw is high
1,363,216 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,277,853 >>> mbox cmd response: success
5,338,906 UART:
5,338,922 UART: Running Caliptra FMC ...
5,339,330 UART:
5,339,473 UART: [state] CFI Enabled
5,350,505 UART: [fht] FMC Alias Private Key: 7
5,458,801 UART: [art] Extend RT PCRs Done
5,459,229 UART: [art] Lock RT PCRs Done
5,460,787 UART: [art] Populate DV Done
5,469,035 UART: [fht] FMC Alias Private Key: 7
5,470,165 UART: [art] Derive CDI
5,470,445 UART: [art] Store in in slot 0x4
5,556,432 UART: [art] Derive Key Pair
5,556,792 UART: [art] Store priv key in slot 0x5
5,570,160 UART: [art] Derive Key Pair - Done
5,584,963 UART: [art] Signing Cert with AUTHO
5,585,443 UART: RITY.KEYID = 7
5,600,851 UART: [art] Erasing AUTHORITY.KEYID = 7
5,601,616 UART: [art] PUB.X = B21E8E184CBE4DA6891C8C3CECD7B2FFDA4FCC885DCCE1BA2D3CA669184217B74DA4C984510E52662779657DD48809D6
5,608,396 UART: [art] PUB.Y = 329301002DF7CEB2B878E40C2B8294130F5CE31F5143497FEC4D6FE0F81B5B842B597C84967023CF44671C185816B2B1
5,615,311 UART: [art] SIG.R = 84882B51C5F9B462E1D2ACE2C5450EFAA470C813CB063D2A6E07DB8755EEAFA3C684283AD09B6E11C08D15F9515513F0
5,622,082 UART: [art] SIG.S = 85FF990BB5E359EECC9F1208E59E305228871E02AB74BBD3042010E0F2015B35D2C5D6551993CC2A352ADE7D5260F606
5,645,801 UART: Caliptra RT
5,646,146 UART: [state] CFI Enabled
5,754,174 UART: [rt] RT listening for mailbox commands...
5,754,844 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,877,720 UART: [rt]cmd =0x41544d4e, len=14344
6,529,289 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,406 UART: [kat] SHA2-256
893,056 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,181 UART: [kat] ++
897,333 UART: [kat] sha1
901,623 UART: [kat] SHA2-256
903,563 UART: [kat] SHA2-384
906,256 UART: [kat] SHA2-512-ACC
908,157 UART: [kat] ECC-384
917,860 UART: [kat] HMAC-384Kdf
922,434 UART: [kat] LMS
1,170,762 UART: [kat] --
1,171,487 UART: [cold-reset] ++
1,171,847 UART: [fht] FHT @ 0x50003400
1,174,410 UART: [idev] ++
1,174,578 UART: [idev] CDI.KEYID = 6
1,174,938 UART: [idev] SUBJECT.KEYID = 7
1,175,362 UART: [idev] UDS.KEYID = 0
1,175,707 ready_for_fw is high
1,175,707 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,330 UART: [idev] Erasing UDS.KEYID = 0
1,200,731 UART: [idev] Sha1 KeyId Algorithm
1,209,389 UART: [idev] --
1,210,257 UART: [ldev] ++
1,210,425 UART: [ldev] CDI.KEYID = 6
1,210,788 UART: [ldev] SUBJECT.KEYID = 5
1,211,214 UART: [ldev] AUTHORITY.KEYID = 7
1,211,677 UART: [ldev] FE.KEYID = 1
1,216,735 UART: [ldev] Erasing FE.KEYID = 1
1,243,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,289 UART: [ldev] --
1,282,632 UART: [fwproc] Wait for Commands...
1,283,342 UART: [fwproc] Recv command 0x46574c44
1,284,070 UART: [fwproc] Recv'd Img size: 114332 bytes
3,129,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,313 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,617 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,323,406 >>> mbox cmd response: success
3,324,428 UART: [afmc] ++
3,324,596 UART: [afmc] CDI.KEYID = 6
3,324,958 UART: [afmc] SUBJECT.KEYID = 7
3,325,383 UART: [afmc] AUTHORITY.KEYID = 5
3,361,007 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,278 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,026 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,735 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,627 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,338 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,245 UART: [afmc] --
3,404,187 UART: [cold-reset] --
3,405,123 UART: [state] Locking Datavault
3,406,544 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,148 UART: [state] Locking ICCM
3,407,698 UART: [exit] Launching FMC @ 0x40000130
3,413,027 UART:
3,413,043 UART: Running Caliptra FMC ...
3,413,451 UART:
3,413,505 UART: [state] CFI Enabled
3,424,237 UART: [fht] FMC Alias Private Key: 7
3,532,133 UART: [art] Extend RT PCRs Done
3,532,561 UART: [art] Lock RT PCRs Done
3,534,307 UART: [art] Populate DV Done
3,542,369 UART: [fht] FMC Alias Private Key: 7
3,543,531 UART: [art] Derive CDI
3,543,811 UART: [art] Store in in slot 0x4
3,630,106 UART: [art] Derive Key Pair
3,630,466 UART: [art] Store priv key in slot 0x5
3,643,666 UART: [art] Derive Key Pair - Done
3,658,432 UART: [art] Signing Cert with AUTHO
3,658,912 UART: RITY.KEYID = 7
3,674,014 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,779 UART: [art] PUB.X = 39CAB6E273B14020992A7895FC3B2E882F19ABD47891593C41D45FE581D83F7D5BEB17165390E5FC713DE7AA7A4D3ABD
3,681,559 UART: [art] PUB.Y = 43FF03C40657B8F346111C92AB5696A1C0985D19AF45BDC322F2109AE25682FC503983DBB9E2548EF57F5A032808A6DA
3,688,499 UART: [art] SIG.R = 68FDC9BAD1DCB66D1FEADE6CDB73CA4DD6BB870626E7BB33A1EED19A51B3E2D2BA07BE1C747653B154214D1D91DC97E7
3,695,293 UART: [art] SIG.S = 68349DCAD0E1D15ED8A3587060424F4CDA2EF885F9C9802D189CDFF2729D6F87C97812F9FC9C7E22ED4C0BDD713F4357
3,719,177 UART: Caliptra RT
3,719,430 UART: [state] CFI Enabled
3,827,219 UART: [rt] RT listening for mailbox commands...
3,827,889 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,867 UART: [rt]cmd =0x41544d4e, len=14344
4,607,078 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,007 ready_for_fw is high
1,060,007 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,165,506 >>> mbox cmd response: success
3,228,313 UART:
3,228,329 UART: Running Caliptra FMC ...
3,228,737 UART:
3,228,791 UART: [state] CFI Enabled
3,239,279 UART: [fht] FMC Alias Private Key: 7
3,347,785 UART: [art] Extend RT PCRs Done
3,348,213 UART: [art] Lock RT PCRs Done
3,349,873 UART: [art] Populate DV Done
3,357,979 UART: [fht] FMC Alias Private Key: 7
3,359,063 UART: [art] Derive CDI
3,359,343 UART: [art] Store in in slot 0x4
3,444,806 UART: [art] Derive Key Pair
3,445,166 UART: [art] Store priv key in slot 0x5
3,458,554 UART: [art] Derive Key Pair - Done
3,473,177 UART: [art] Signing Cert with AUTHO
3,473,657 UART: RITY.KEYID = 7
3,489,093 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,858 UART: [art] PUB.X = C5BD297BE6AD6CB3488DAF05F57A40A4DB550535F53253713EE9054928560554CFCEBEB1B7ED78BC79C2EB43CBC44B4E
3,496,634 UART: [art] PUB.Y = E5AC0BC07BABD820C4A86010262AF538EC5C06ABF2DD4EBE8DEF41E17E1612E7D6F231E9B61C0E2F47A8E38021134769
3,503,591 UART: [art] SIG.R = 39FE879D8ECEA46D385FD2DBB26F7FAB02EBBFCD07FCBDD3C46631E3951B9F464B5F6A145E04533FEBDF7DAA1181E2FC
3,510,384 UART: [art] SIG.S = A6B5523EAC8223C3AB7B70085046065C85746CF1732CBB7F6A6F5C6C9565DE3807CBAC7C9B2DD45F4CC8FF715D4CC426
3,534,328 UART: Caliptra RT
3,534,581 UART: [state] CFI Enabled
3,642,577 UART: [rt] RT listening for mailbox commands...
3,643,247 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,501 UART: [rt]cmd =0x41544d4e, len=14344
4,420,497 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [kat] SHA2-256
893,721 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,846 UART: [kat] ++
897,998 UART: [kat] sha1
902,108 UART: [kat] SHA2-256
904,048 UART: [kat] SHA2-384
906,739 UART: [kat] SHA2-512-ACC
908,640 UART: [kat] ECC-384
918,041 UART: [kat] HMAC-384Kdf
922,691 UART: [kat] LMS
1,171,019 UART: [kat] --
1,171,856 UART: [cold-reset] ++
1,172,256 UART: [fht] FHT @ 0x50003400
1,174,955 UART: [idev] ++
1,175,123 UART: [idev] CDI.KEYID = 6
1,175,483 UART: [idev] SUBJECT.KEYID = 7
1,175,907 UART: [idev] UDS.KEYID = 0
1,176,252 ready_for_fw is high
1,176,252 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,813 UART: [idev] Erasing UDS.KEYID = 0
1,201,332 UART: [idev] Sha1 KeyId Algorithm
1,209,966 UART: [idev] --
1,210,936 UART: [ldev] ++
1,211,104 UART: [ldev] CDI.KEYID = 6
1,211,467 UART: [ldev] SUBJECT.KEYID = 5
1,211,893 UART: [ldev] AUTHORITY.KEYID = 7
1,212,356 UART: [ldev] FE.KEYID = 1
1,217,552 UART: [ldev] Erasing FE.KEYID = 1
1,243,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,728 UART: [ldev] --
1,283,207 UART: [fwproc] Wait for Commands...
1,283,973 UART: [fwproc] Recv command 0x46574c44
1,284,701 UART: [fwproc] Recv'd Img size: 114332 bytes
3,122,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,257 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,561 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,315,408 >>> mbox cmd response: success
3,316,576 UART: [afmc] ++
3,316,744 UART: [afmc] CDI.KEYID = 6
3,317,106 UART: [afmc] SUBJECT.KEYID = 7
3,317,531 UART: [afmc] AUTHORITY.KEYID = 5
3,353,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,788 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,536 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,245 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,137 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,848 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,621 UART: [afmc] --
3,396,525 UART: [cold-reset] --
3,397,547 UART: [state] Locking Datavault
3,398,720 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,324 UART: [state] Locking ICCM
3,399,836 UART: [exit] Launching FMC @ 0x40000130
3,405,165 UART:
3,405,181 UART: Running Caliptra FMC ...
3,405,589 UART:
3,405,732 UART: [state] CFI Enabled
3,416,720 UART: [fht] FMC Alias Private Key: 7
3,524,094 UART: [art] Extend RT PCRs Done
3,524,522 UART: [art] Lock RT PCRs Done
3,525,976 UART: [art] Populate DV Done
3,534,110 UART: [fht] FMC Alias Private Key: 7
3,535,048 UART: [art] Derive CDI
3,535,328 UART: [art] Store in in slot 0x4
3,621,299 UART: [art] Derive Key Pair
3,621,659 UART: [art] Store priv key in slot 0x5
3,634,845 UART: [art] Derive Key Pair - Done
3,649,692 UART: [art] Signing Cert with AUTHO
3,650,172 UART: RITY.KEYID = 7
3,665,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,201 UART: [art] PUB.X = 4E6BD51B13A887A7E65D168F22AD5C7C0CBA479436443730446F603CE3B2206232944BECFA3FC87C7763BA686B56F794
3,672,970 UART: [art] PUB.Y = 2E738F37B8983E94162DFF81D41C990B3BA089F28B09B777E3F4366F1E115175921FAF8B64AC7228482B81E4A76373F4
3,679,910 UART: [art] SIG.R = 18D588447D8541C4B0E7BDE0631EB1149E0FB45935227AC247E12D3A52BAFB03DB2271C96B9248B5CAAADA59211DFD8A
3,686,686 UART: [art] SIG.S = 32985D851129C45F242CF0F00D8F425E7FB2CA5FE1C9523F00ECBF4529A0EBDB09023BE12CD61FFCDBBFFF3138F7295D
3,710,696 UART: Caliptra RT
3,711,041 UART: [state] CFI Enabled
3,818,640 UART: [rt] RT listening for mailbox commands...
3,819,310 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,022 UART: [rt]cmd =0x41544d4e, len=14344
4,586,336 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,450 ready_for_fw is high
1,061,450 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,165,562 >>> mbox cmd response: success
3,228,129 UART:
3,228,145 UART: Running Caliptra FMC ...
3,228,553 UART:
3,228,696 UART: [state] CFI Enabled
3,239,274 UART: [fht] FMC Alias Private Key: 7
3,347,502 UART: [art] Extend RT PCRs Done
3,347,930 UART: [art] Lock RT PCRs Done
3,349,952 UART: [art] Populate DV Done
3,358,014 UART: [fht] FMC Alias Private Key: 7
3,359,006 UART: [art] Derive CDI
3,359,286 UART: [art] Store in in slot 0x4
3,445,139 UART: [art] Derive Key Pair
3,445,499 UART: [art] Store priv key in slot 0x5
3,458,917 UART: [art] Derive Key Pair - Done
3,473,842 UART: [art] Signing Cert with AUTHO
3,474,322 UART: RITY.KEYID = 7
3,489,664 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,429 UART: [art] PUB.X = 139270E53AA752A10579A3C392E68005D3C7FFDFB7603A3ED92170251DF7B468476CC24F6452DEFF587CB2803CB6DE82
3,497,197 UART: [art] PUB.Y = B94CF772FE36A86D571F5E930451095486D55A8D23F1606F2871405C93B7752FCA1783952A2632F2032BA2D6EFF974B0
3,504,132 UART: [art] SIG.R = 3BCBBF727DBC325AD24A9631BA6250E9F11FF9D50EC14E7AA26369ED595BA48F2698BC1CC5F2E54072FCBB87A1DD0DC6
3,510,920 UART: [art] SIG.S = 0AA820FCDD6C06E8C4EB993C4147CF47EA4E0E68BE689F91859786B54357F974C780AC2781B19B4A62E0DF5E32C4062B
3,535,163 UART: Caliptra RT
3,535,508 UART: [state] CFI Enabled
3,643,499 UART: [rt] RT listening for mailbox commands...
3,644,169 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,277 UART: [rt]cmd =0x41544d4e, len=14344
4,412,031 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
890,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,127 UART: [kat] ++
895,279 UART: [kat] sha1
899,507 UART: [kat] SHA2-256
901,447 UART: [kat] SHA2-384
904,138 UART: [kat] SHA2-512-ACC
906,039 UART: [kat] ECC-384
915,566 UART: [kat] HMAC-384Kdf
920,154 UART: [kat] LMS
1,168,466 UART: [kat] --
1,169,427 UART: [cold-reset] ++
1,170,001 UART: [fht] FHT @ 0x50003400
1,172,639 UART: [idev] ++
1,172,807 UART: [idev] CDI.KEYID = 6
1,173,168 UART: [idev] SUBJECT.KEYID = 7
1,173,593 UART: [idev] UDS.KEYID = 0
1,173,939 ready_for_fw is high
1,173,939 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,487 UART: [idev] Erasing UDS.KEYID = 0
1,198,599 UART: [idev] Sha1 KeyId Algorithm
1,207,451 UART: [idev] --
1,208,406 UART: [ldev] ++
1,208,574 UART: [ldev] CDI.KEYID = 6
1,208,938 UART: [ldev] SUBJECT.KEYID = 5
1,209,365 UART: [ldev] AUTHORITY.KEYID = 7
1,209,828 UART: [ldev] FE.KEYID = 1
1,215,512 UART: [ldev] Erasing FE.KEYID = 1
1,241,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,148 UART: [ldev] --
1,280,478 UART: [fwproc] Wait for Commands...
1,281,267 UART: [fwproc] Recv command 0x46574c44
1,282,000 UART: [fwproc] Recv'd Img size: 114332 bytes
3,113,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,141,497 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,170,806 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,306,738 >>> mbox cmd response: success
3,307,897 UART: [afmc] ++
3,308,065 UART: [afmc] CDI.KEYID = 6
3,308,428 UART: [afmc] SUBJECT.KEYID = 7
3,308,854 UART: [afmc] AUTHORITY.KEYID = 5
3,344,106 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,360,554 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,361,305 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,367,015 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,372,905 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,378,616 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,386,488 UART: [afmc] --
3,387,438 UART: [cold-reset] --
3,388,222 UART: [state] Locking Datavault
3,389,595 UART: [state] Locking PCR0, PCR1 and PCR31
3,390,199 UART: [state] Locking ICCM
3,390,685 UART: [exit] Launching FMC @ 0x40000130
3,396,014 UART:
3,396,030 UART: Running Caliptra FMC ...
3,396,438 UART:
3,396,492 UART: [state] CFI Enabled
3,406,768 UART: [fht] FMC Alias Private Key: 7
3,515,278 UART: [art] Extend RT PCRs Done
3,515,706 UART: [art] Lock RT PCRs Done
3,517,174 UART: [art] Populate DV Done
3,525,612 UART: [fht] FMC Alias Private Key: 7
3,526,750 UART: [art] Derive CDI
3,527,030 UART: [art] Store in in slot 0x4
3,612,985 UART: [art] Derive Key Pair
3,613,345 UART: [art] Store priv key in slot 0x5
3,626,029 UART: [art] Derive Key Pair - Done
3,640,976 UART: [art] Signing Cert with AUTHO
3,641,456 UART: RITY.KEYID = 7
3,656,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,657,737 UART: [art] PUB.X = 4CCADFB98DBF9F7F8B26A82D1FD5A1184BB8133CC0BD28D76F2F4FB593B56D45C9CA3A40E600DD3C8AFD78CDB83C2768
3,664,513 UART: [art] PUB.Y = 6112F4D0847F34ACF425EAD84E5BD3A753B0CCB2C312BB331E4D3102BABFA2B618C2DB849938A61C2C2D4E94EA762252
3,671,474 UART: [art] SIG.R = EE5E0B231DA0E10956C647C1B8BA71EFC6B7885833B4002B4194F3CA67A8F5E0FF86AD777D8D1F1A664CBF086F75D9B4
3,678,227 UART: [art] SIG.S = 90CA62EBE737E67EA8EEB05254CB0EBEAE98CEA6576220794336AB899D6E94276C67046542BDD72A32130B6E679B227B
3,702,329 UART: Caliptra RT
3,702,582 UART: [state] CFI Enabled
3,809,693 UART: [rt] RT listening for mailbox commands...
3,810,363 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,933,483 UART: [rt]cmd =0x41544d4e, len=14344
4,584,830 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,298 ready_for_fw is high
1,055,298 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,168,665 >>> mbox cmd response: success
3,230,672 UART:
3,230,688 UART: Running Caliptra FMC ...
3,231,096 UART:
3,231,150 UART: [state] CFI Enabled
3,241,740 UART: [fht] FMC Alias Private Key: 7
3,350,022 UART: [art] Extend RT PCRs Done
3,350,450 UART: [art] Lock RT PCRs Done
3,352,148 UART: [art] Populate DV Done
3,360,438 UART: [fht] FMC Alias Private Key: 7
3,361,388 UART: [art] Derive CDI
3,361,668 UART: [art] Store in in slot 0x4
3,447,541 UART: [art] Derive Key Pair
3,447,901 UART: [art] Store priv key in slot 0x5
3,460,763 UART: [art] Derive Key Pair - Done
3,475,698 UART: [art] Signing Cert with AUTHO
3,476,178 UART: RITY.KEYID = 7
3,491,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,973 UART: [art] PUB.X = 1444E8A617D2B35A982B3CDD4B6C4B1DD1C0A7BC621273099011952F1145CA7F49B8003759941D579147EA0BADC77DEB
3,498,719 UART: [art] PUB.Y = DE3DEB0218F7BA04DE8F042507CF917EDD3431555FCAA6ACA8B3CEA0203D5DC98BC05C57B6DE4AD794BB87235490EBF2
3,505,681 UART: [art] SIG.R = E23098129DACC97E79D5FC0293CDB98404CA8EC7E7AC4C9CEEE804B10FB36FF5E75C3A98F87D9DADC2708AAD19EEAC7A
3,512,469 UART: [art] SIG.S = 7D2459ECAE14C69EE4C2CCB0ACEEDC9DA32D12B3EC79A8596E7A3BC071978DF3D33AFCE9FA2775B402641D28016312AF
3,536,436 UART: Caliptra RT
3,536,689 UART: [state] CFI Enabled
3,643,983 UART: [rt] RT listening for mailbox commands...
3,644,653 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,651 UART: [rt]cmd =0x41544d4e, len=14344
4,410,118 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
891,509 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,638 UART: [kat] ++
895,790 UART: [kat] sha1
899,902 UART: [kat] SHA2-256
901,842 UART: [kat] SHA2-384
904,451 UART: [kat] SHA2-512-ACC
906,352 UART: [kat] ECC-384
915,757 UART: [kat] HMAC-384Kdf
920,425 UART: [kat] LMS
1,168,737 UART: [kat] --
1,169,490 UART: [cold-reset] ++
1,170,068 UART: [fht] FHT @ 0x50003400
1,172,942 UART: [idev] ++
1,173,110 UART: [idev] CDI.KEYID = 6
1,173,471 UART: [idev] SUBJECT.KEYID = 7
1,173,896 UART: [idev] UDS.KEYID = 0
1,174,242 ready_for_fw is high
1,174,242 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,302 UART: [idev] Erasing UDS.KEYID = 0
1,199,358 UART: [idev] Sha1 KeyId Algorithm
1,208,280 UART: [idev] --
1,209,355 UART: [ldev] ++
1,209,523 UART: [ldev] CDI.KEYID = 6
1,209,887 UART: [ldev] SUBJECT.KEYID = 5
1,210,314 UART: [ldev] AUTHORITY.KEYID = 7
1,210,777 UART: [ldev] FE.KEYID = 1
1,215,889 UART: [ldev] Erasing FE.KEYID = 1
1,242,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,257 UART: [ldev] --
1,281,635 UART: [fwproc] Wait for Commands...
1,282,298 UART: [fwproc] Recv command 0x46574c44
1,283,031 UART: [fwproc] Recv'd Img size: 114332 bytes
3,121,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,847 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,156 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,314,042 >>> mbox cmd response: success
3,315,093 UART: [afmc] ++
3,315,261 UART: [afmc] CDI.KEYID = 6
3,315,624 UART: [afmc] SUBJECT.KEYID = 7
3,316,050 UART: [afmc] AUTHORITY.KEYID = 5
3,350,760 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,124 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,875 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,585 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,475 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,186 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,098 UART: [afmc] --
3,394,014 UART: [cold-reset] --
3,394,860 UART: [state] Locking Datavault
3,395,919 UART: [state] Locking PCR0, PCR1 and PCR31
3,396,523 UART: [state] Locking ICCM
3,397,189 UART: [exit] Launching FMC @ 0x40000130
3,402,518 UART:
3,402,534 UART: Running Caliptra FMC ...
3,402,942 UART:
3,403,085 UART: [state] CFI Enabled
3,413,777 UART: [fht] FMC Alias Private Key: 7
3,522,379 UART: [art] Extend RT PCRs Done
3,522,807 UART: [art] Lock RT PCRs Done
3,524,129 UART: [art] Populate DV Done
3,532,091 UART: [fht] FMC Alias Private Key: 7
3,533,137 UART: [art] Derive CDI
3,533,417 UART: [art] Store in in slot 0x4
3,619,012 UART: [art] Derive Key Pair
3,619,372 UART: [art] Store priv key in slot 0x5
3,632,970 UART: [art] Derive Key Pair - Done
3,647,666 UART: [art] Signing Cert with AUTHO
3,648,146 UART: RITY.KEYID = 7
3,663,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,807 UART: [art] PUB.X = 22E7E466508746DD98A2B30269F8BBB1D50A144C67B21A0CB540E3E1C920CBDA673E029945E3FA57492C8D002A1D8F2C
3,670,549 UART: [art] PUB.Y = 2E647F31E878D536D193C22D65BA96E6C63F87E6B418E2931E93FCED9113949BDA5892E972679B8629CCFCF83D55EF1F
3,677,505 UART: [art] SIG.R = 7CF98B5DB271B9E88BAC2F6121E2602EE65E16B18BBB8ABDE9BC196E8EC63E355A009224CFEB063E17C1D36C0ECDD3CC
3,684,273 UART: [art] SIG.S = 6D0D0ADE96D4CA4BA5AB0F7A574C7CB186CBDFFD942B0B03E6559B464F47ED4AEBEBC8F0305CF0134D41E155CDB1EB92
3,708,461 UART: Caliptra RT
3,708,806 UART: [state] CFI Enabled
3,816,265 UART: [rt] RT listening for mailbox commands...
3,816,935 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,855 UART: [rt]cmd =0x41544d4e, len=14344
4,586,550 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,783 ready_for_fw is high
1,056,783 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,168,499 >>> mbox cmd response: success
3,229,964 UART:
3,229,980 UART: Running Caliptra FMC ...
3,230,388 UART:
3,230,531 UART: [state] CFI Enabled
3,241,069 UART: [fht] FMC Alias Private Key: 7
3,348,693 UART: [art] Extend RT PCRs Done
3,349,121 UART: [art] Lock RT PCRs Done
3,350,549 UART: [art] Populate DV Done
3,358,593 UART: [fht] FMC Alias Private Key: 7
3,359,625 UART: [art] Derive CDI
3,359,905 UART: [art] Store in in slot 0x4
3,445,290 UART: [art] Derive Key Pair
3,445,650 UART: [art] Store priv key in slot 0x5
3,458,848 UART: [art] Derive Key Pair - Done
3,473,753 UART: [art] Signing Cert with AUTHO
3,474,233 UART: RITY.KEYID = 7
3,489,605 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,370 UART: [art] PUB.X = E6FC7ED5C72A07FAEEDAD15DA55A8F9A02333002245F6DC0C906A7A35289D187929F955CF96F9C21DB5668275995DDA7
3,497,138 UART: [art] PUB.Y = 45EE7E6E36F415D0BB5A0145A5F9864664CDC286B6E6F1ADBC5EB99CE049949122608D8F642AF69F3A2505EECD4E6698
3,504,092 UART: [art] SIG.R = 31E81A9119687FC181128D576065DEFD9E0CEAB95DEB57FC6D70098F8034E8903FD810C659FA60D43C0973BEC630235B
3,510,857 UART: [art] SIG.S = EBD5621DC9B4388F3579B871551BB10182D0E476070A4F3B4345D191F7A8DC04836E5C7DC4DFB2AEA9F8089B044C310C
3,534,863 UART: Caliptra RT
3,535,208 UART: [state] CFI Enabled
3,642,546 UART: [rt] RT listening for mailbox commands...
3,643,216 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,284 UART: [rt]cmd =0x41544d4e, len=14344
4,415,510 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,327 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,949 UART: [kat] SHA2-256
881,880 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,995 UART: [kat] ++
886,147 UART: [kat] sha1
890,607 UART: [kat] SHA2-256
892,545 UART: [kat] SHA2-384
895,372 UART: [kat] SHA2-512-ACC
897,273 UART: [kat] ECC-384
902,632 UART: [kat] HMAC-384Kdf
907,060 UART: [kat] LMS
1,475,256 UART: [kat] --
1,476,047 UART: [cold-reset] ++
1,476,509 UART: [fht] Storing FHT @ 0x50003400
1,479,444 UART: [idev] ++
1,479,612 UART: [idev] CDI.KEYID = 6
1,479,972 UART: [idev] SUBJECT.KEYID = 7
1,480,396 UART: [idev] UDS.KEYID = 0
1,480,741 ready_for_fw is high
1,480,741 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,104 UART: [idev] Erasing UDS.KEYID = 0
1,504,730 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,234 UART: [idev] --
1,514,317 UART: [ldev] ++
1,514,485 UART: [ldev] CDI.KEYID = 6
1,514,848 UART: [ldev] SUBJECT.KEYID = 5
1,515,274 UART: [ldev] AUTHORITY.KEYID = 7
1,515,737 UART: [ldev] FE.KEYID = 1
1,520,853 UART: [ldev] Erasing FE.KEYID = 1
1,545,956 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,802 UART: [ldev] --
1,585,243 UART: [fwproc] Waiting for Commands...
1,586,022 UART: [fwproc] Received command 0x46574c44
1,586,813 UART: [fwproc] Received Image of size 114332 bytes
2,884,441 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,577 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,929 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,688 >>> mbox cmd response: success
3,077,936 UART: [afmc] ++
3,078,104 UART: [afmc] CDI.KEYID = 6
3,078,466 UART: [afmc] SUBJECT.KEYID = 7
3,078,891 UART: [afmc] AUTHORITY.KEYID = 5
3,114,494 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,600 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,380 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,108 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,993 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,683 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,652 UART: [afmc] --
3,157,586 UART: [cold-reset] --
3,158,392 UART: [state] Locking Datavault
3,159,371 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,975 UART: [state] Locking ICCM
3,160,395 UART: [exit] Launching FMC @ 0x40000130
3,165,724 UART:
3,165,740 UART: Running Caliptra FMC ...
3,166,148 UART:
3,166,202 UART: [state] CFI Enabled
3,176,719 UART: [fht] FMC Alias Private Key: 7
3,284,472 UART: [art] Extend RT PCRs Done
3,284,900 UART: [art] Lock RT PCRs Done
3,286,264 UART: [art] Populate DV Done
3,294,411 UART: [fht] FMC Alias Private Key: 7
3,295,501 UART: [art] Derive CDI
3,295,781 UART: [art] Store in in slot 0x4
3,381,204 UART: [art] Derive Key Pair
3,381,564 UART: [art] Store priv key in slot 0x5
3,394,618 UART: [art] Derive Key Pair - Done
3,409,266 UART: [art] Signing Cert with AUTHO
3,409,746 UART: RITY.KEYID = 7
3,424,856 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,621 UART: [art] PUB.X = CF59B38027A7BF0756F3161AEC2DDAA4F44F489AEAF96CE8A88142C7DB23802BC12BC5DCD0E030E97556FE743D35286F
3,432,404 UART: [art] PUB.Y = 32B92FFC1F0C7FF6CE79AC527A18485445FED14BC3BF9D62422E696609E559757C75B500881467AC4F8C52601C27D059
3,439,326 UART: [art] SIG.R = DF3F6FAAD4309D8F884764891A98F3087C82626900C35B1FF5F2282595A7938E0A49A89ECAB9ADE3201584DA12A0A925
3,446,070 UART: [art] SIG.S = B641DD3CFE55BCAF8BD8537E3EF57DB8BF1F681104D9E58F27C7A46FFE1D985A0907F46FB37353080A7C8CE482E69EFA
3,469,824 UART: Caliptra RT
3,470,077 UART: [state] CFI Enabled
3,578,441 UART: [rt] RT listening for mailbox commands...
3,579,111 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,309 UART: [rt]cmd =0x41544d4e, len=14344
4,012,276 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,119 ready_for_fw is high
1,362,119 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,412 >>> mbox cmd response: success
2,989,246 UART:
2,989,262 UART: Running Caliptra FMC ...
2,989,670 UART:
2,989,724 UART: [state] CFI Enabled
3,000,081 UART: [fht] FMC Alias Private Key: 7
3,108,086 UART: [art] Extend RT PCRs Done
3,108,514 UART: [art] Lock RT PCRs Done
3,109,826 UART: [art] Populate DV Done
3,117,941 UART: [fht] FMC Alias Private Key: 7
3,119,031 UART: [art] Derive CDI
3,119,311 UART: [art] Store in in slot 0x4
3,205,438 UART: [art] Derive Key Pair
3,205,798 UART: [art] Store priv key in slot 0x5
3,218,942 UART: [art] Derive Key Pair - Done
3,233,936 UART: [art] Signing Cert with AUTHO
3,234,416 UART: RITY.KEYID = 7
3,249,172 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,937 UART: [art] PUB.X = FBAA245A2449AD9EDD1B9201F1349D8EEE024D336652542E26B87819150F34984425F171C60ED636168ABC86CBF0549A
3,256,695 UART: [art] PUB.Y = 0932796633DC276D1DD0C91E9B8C3156717DC6948FD6AA97C9AD4763F45FBBFBAAF3041BDC86307AD09AB93D3A6B9166
3,263,651 UART: [art] SIG.R = 9590B85B526F7EEE00D2038E5FA47E4F101B1C6EF6F7A8A0092111E7B11CB803347AB8A576A3ABD1DE2C9DD447C707E1
3,270,399 UART: [art] SIG.S = 057AF19756E47699FB05C0D737916B52520CBF3B1A25871B7AE5D21BDB7FE1840AF8921274FAF4964A549E38593FE16B
3,294,362 UART: Caliptra RT
3,294,615 UART: [state] CFI Enabled
3,403,480 UART: [rt] RT listening for mailbox commands...
3,404,150 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,148 UART: [rt]cmd =0x41544d4e, len=14344
3,837,521 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,468 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,014 UART: [kat] SHA2-256
881,945 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,060 UART: [kat] ++
886,212 UART: [kat] sha1
890,464 UART: [kat] SHA2-256
892,402 UART: [kat] SHA2-384
895,257 UART: [kat] SHA2-512-ACC
897,158 UART: [kat] ECC-384
902,891 UART: [kat] HMAC-384Kdf
907,539 UART: [kat] LMS
1,475,735 UART: [kat] --
1,476,462 UART: [cold-reset] ++
1,476,838 UART: [fht] Storing FHT @ 0x50003400
1,479,721 UART: [idev] ++
1,479,889 UART: [idev] CDI.KEYID = 6
1,480,249 UART: [idev] SUBJECT.KEYID = 7
1,480,673 UART: [idev] UDS.KEYID = 0
1,481,018 ready_for_fw is high
1,481,018 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,561 UART: [idev] Erasing UDS.KEYID = 0
1,505,261 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,941 UART: [idev] --
1,514,938 UART: [ldev] ++
1,515,106 UART: [ldev] CDI.KEYID = 6
1,515,469 UART: [ldev] SUBJECT.KEYID = 5
1,515,895 UART: [ldev] AUTHORITY.KEYID = 7
1,516,358 UART: [ldev] FE.KEYID = 1
1,521,542 UART: [ldev] Erasing FE.KEYID = 1
1,547,047 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,961 UART: [ldev] --
1,586,390 UART: [fwproc] Waiting for Commands...
1,587,185 UART: [fwproc] Received command 0x46574c44
1,587,976 UART: [fwproc] Received Image of size 114332 bytes
2,885,182 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,992 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,344 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,205 >>> mbox cmd response: success
3,078,297 UART: [afmc] ++
3,078,465 UART: [afmc] CDI.KEYID = 6
3,078,827 UART: [afmc] SUBJECT.KEYID = 7
3,079,252 UART: [afmc] AUTHORITY.KEYID = 5
3,114,217 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,617 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,397 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,125 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,010 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,700 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,607 UART: [afmc] --
3,157,651 UART: [cold-reset] --
3,158,401 UART: [state] Locking Datavault
3,159,846 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,450 UART: [state] Locking ICCM
3,160,926 UART: [exit] Launching FMC @ 0x40000130
3,166,255 UART:
3,166,271 UART: Running Caliptra FMC ...
3,166,679 UART:
3,166,822 UART: [state] CFI Enabled
3,177,705 UART: [fht] FMC Alias Private Key: 7
3,285,624 UART: [art] Extend RT PCRs Done
3,286,052 UART: [art] Lock RT PCRs Done
3,287,466 UART: [art] Populate DV Done
3,295,397 UART: [fht] FMC Alias Private Key: 7
3,296,361 UART: [art] Derive CDI
3,296,641 UART: [art] Store in in slot 0x4
3,382,254 UART: [art] Derive Key Pair
3,382,614 UART: [art] Store priv key in slot 0x5
3,395,336 UART: [art] Derive Key Pair - Done
3,410,027 UART: [art] Signing Cert with AUTHO
3,410,507 UART: RITY.KEYID = 7
3,425,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,702 UART: [art] PUB.X = 59EA235F5091EFD37EA71072DD24AC1C1F50D27AA37690FD1118CEC68A9EEE2E49F92178CA6FEF432860D8801C3CD78B
3,433,486 UART: [art] PUB.Y = 673D262F31F23BA304CA3BDB1F413809676D56EFBFBA2A14F128876380BEA2D608EE5265C33DA0D3FBBFB308A2975454
3,440,434 UART: [art] SIG.R = 5FDB4BA9A2A64253A12981F8C206957399D3407003FCA84754A2AF7E9C14DAD67CE4513A4CE7063582FD3E98FD27DF05
3,447,198 UART: [art] SIG.S = EC8C57A0A57176195BF9F92CFC48F74978650BADBC8F6E6847AE649D0441214A76D3C1A91A5AE5A89B1EDCB51966B7CA
3,470,973 UART: Caliptra RT
3,471,318 UART: [state] CFI Enabled
3,580,029 UART: [rt] RT listening for mailbox commands...
3,580,699 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,833 UART: [rt]cmd =0x41544d4e, len=14344
4,014,084 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,390 ready_for_fw is high
1,362,390 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,785 >>> mbox cmd response: success
2,991,873 UART:
2,991,889 UART: Running Caliptra FMC ...
2,992,297 UART:
2,992,440 UART: [state] CFI Enabled
3,002,767 UART: [fht] FMC Alias Private Key: 7
3,111,258 UART: [art] Extend RT PCRs Done
3,111,686 UART: [art] Lock RT PCRs Done
3,112,652 UART: [art] Populate DV Done
3,120,823 UART: [fht] FMC Alias Private Key: 7
3,121,757 UART: [art] Derive CDI
3,122,037 UART: [art] Store in in slot 0x4
3,207,974 UART: [art] Derive Key Pair
3,208,334 UART: [art] Store priv key in slot 0x5
3,221,540 UART: [art] Derive Key Pair - Done
3,236,388 UART: [art] Signing Cert with AUTHO
3,236,868 UART: RITY.KEYID = 7
3,252,500 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,265 UART: [art] PUB.X = 410AC44C61DCF46243A64984889DB727C0F0023F819DFEA6723AC5E51E167352419ED210D2D432EC826260D4C10A8535
3,260,022 UART: [art] PUB.Y = D9E76AF50A79E9963DB9DC8037B545F1873AA86A5C4C4C5A941D4960F1EF3087F8684B78AF9CAE3E3E63A7106CE2D4F4
3,266,981 UART: [art] SIG.R = 927E7D3A4CC7FB2DACC65950050C45C5C014F888EBEC1C33D8AD6BFDF6B7033E192943B43B140E8106C11A292B8EAFF1
3,273,752 UART: [art] SIG.S = 3AA933954CD636FEBF81B92BAA675CF7D2AA5917AF8CEF206AF4A8F204A8E682ECEBA1D58BD1F45E608F4DD73720F7B2
3,297,948 UART: Caliptra RT
3,298,293 UART: [state] CFI Enabled
3,405,810 UART: [rt] RT listening for mailbox commands...
3,406,480 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,616 UART: [rt]cmd =0x41544d4e, len=14344
3,839,517 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
893,454 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,579 UART: [kat] ++
897,731 UART: [kat] sha1
902,075 UART: [kat] SHA2-256
904,015 UART: [kat] SHA2-384
906,660 UART: [kat] SHA2-512-ACC
908,561 UART: [kat] ECC-384
918,180 UART: [kat] HMAC-384Kdf
922,772 UART: [kat] LMS
1,171,100 UART: [kat] --
1,171,927 UART: [cold-reset] ++
1,172,409 UART: [fht] FHT @ 0x50003400
1,175,186 UART: [idev] ++
1,175,354 UART: [idev] CDI.KEYID = 6
1,175,714 UART: [idev] SUBJECT.KEYID = 7
1,176,138 UART: [idev] UDS.KEYID = 0
1,176,483 ready_for_fw is high
1,176,483 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,268 UART: [idev] Erasing UDS.KEYID = 0
1,201,287 UART: [idev] Sha1 KeyId Algorithm
1,209,819 UART: [idev] --
1,210,919 UART: [ldev] ++
1,211,087 UART: [ldev] CDI.KEYID = 6
1,211,450 UART: [ldev] SUBJECT.KEYID = 5
1,211,876 UART: [ldev] AUTHORITY.KEYID = 7
1,212,339 UART: [ldev] FE.KEYID = 1
1,217,457 UART: [ldev] Erasing FE.KEYID = 1
1,243,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,799 UART: [ldev] --
1,283,128 UART: [fwproc] Wait for Commands...
1,283,852 UART: [fwproc] Recv command 0x46574c44
1,284,580 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,793 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,404 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,708 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,465 >>> mbox cmd response: success
2,775,487 UART: [afmc] ++
2,775,655 UART: [afmc] CDI.KEYID = 6
2,776,017 UART: [afmc] SUBJECT.KEYID = 7
2,776,442 UART: [afmc] AUTHORITY.KEYID = 5
2,812,111 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,716 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,464 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,192 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,077 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,796 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,558 UART: [afmc] --
2,855,564 UART: [cold-reset] --
2,856,158 UART: [state] Locking Datavault
2,857,379 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,983 UART: [state] Locking ICCM
2,858,411 UART: [exit] Launching FMC @ 0x40000130
2,863,740 UART:
2,863,756 UART: Running Caliptra FMC ...
2,864,164 UART:
2,864,218 UART: [state] CFI Enabled
2,874,711 UART: [fht] FMC Alias Private Key: 7
2,982,006 UART: [art] Extend RT PCRs Done
2,982,434 UART: [art] Lock RT PCRs Done
2,983,952 UART: [art] Populate DV Done
2,992,133 UART: [fht] FMC Alias Private Key: 7
2,993,305 UART: [art] Derive CDI
2,993,585 UART: [art] Store in in slot 0x4
3,079,254 UART: [art] Derive Key Pair
3,079,614 UART: [art] Store priv key in slot 0x5
3,092,258 UART: [art] Derive Key Pair - Done
3,106,930 UART: [art] Signing Cert with AUTHO
3,107,410 UART: RITY.KEYID = 7
3,122,466 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,231 UART: [art] PUB.X = 1F3E9917DBC07638092E63542A84556FE14A529ED0E08B70FEA1C1F8002639FFE583DD6AC1FEDA4212EC2581019B7A9F
3,129,981 UART: [art] PUB.Y = E28ECF7011FB1578703C3EFE573906CCE3AB7F036121B518916F71831889446103A6A1E81E2F16B67E0803C815CD4615
3,136,910 UART: [art] SIG.R = DFF62E27291FF4F4FBD9F859414CCD415A156D8A9CE55B999A4D5D4787ADF6E3A5CAFD7C438C439518C9F16F983C22EB
3,143,698 UART: [art] SIG.S = 501C4DCD3509549616AE5DFB2613A88A02EA86E4220DCAD57FDD177DB09DD7423727391454906720A357456EB9531828
3,167,680 UART: Caliptra RT
3,167,933 UART: [state] CFI Enabled
3,275,526 UART: [rt] RT listening for mailbox commands...
3,276,196 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,050 UART: [rt]cmd =0x41544d4e, len=14344
3,708,573 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,377 ready_for_fw is high
1,060,377 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,620 >>> mbox cmd response: success
2,688,796 UART:
2,688,812 UART: Running Caliptra FMC ...
2,689,220 UART:
2,689,274 UART: [state] CFI Enabled
2,699,627 UART: [fht] FMC Alias Private Key: 7
2,807,748 UART: [art] Extend RT PCRs Done
2,808,176 UART: [art] Lock RT PCRs Done
2,809,796 UART: [art] Populate DV Done
2,818,221 UART: [fht] FMC Alias Private Key: 7
2,819,167 UART: [art] Derive CDI
2,819,447 UART: [art] Store in in slot 0x4
2,905,248 UART: [art] Derive Key Pair
2,905,608 UART: [art] Store priv key in slot 0x5
2,918,574 UART: [art] Derive Key Pair - Done
2,933,444 UART: [art] Signing Cert with AUTHO
2,933,924 UART: RITY.KEYID = 7
2,949,548 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,313 UART: [art] PUB.X = 98A34BA8ACD3B5DC0C7A1E6A415A89AF6317EA3EAC20288A80666D5B770434A96B75273F1A32885A8B27AB5E426BE519
2,957,085 UART: [art] PUB.Y = 81872DC429FC52E8EC957694B4D94D5B23957607922D0EA570462A270531B8FA44B24771C35884ED7C6064D70E00E6C6
2,963,993 UART: [art] SIG.R = 5B0EECB28C951A2B62754A453E2B80D4381A160548ACBBEA92380776780BFF5FF48FA708BB49CCC267AECA11653EA385
2,970,760 UART: [art] SIG.S = 8D371DA4B78B71F4904401CAC1BAE4A75FCD793313E626966A2E86A419B0D5B8E71B26B094F3A3F5AD358FC30C7220BC
2,995,493 UART: Caliptra RT
2,995,746 UART: [state] CFI Enabled
3,103,835 UART: [rt] RT listening for mailbox commands...
3,104,505 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,591 UART: [rt]cmd =0x41544d4e, len=14344
3,537,330 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,773 UART: [state] LifecycleState = Unprovisioned
86,428 UART: [state] DebugLocked = No
86,942 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
893,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,876 UART: [kat] ++
898,028 UART: [kat] sha1
902,472 UART: [kat] SHA2-256
904,412 UART: [kat] SHA2-384
907,133 UART: [kat] SHA2-512-ACC
909,034 UART: [kat] ECC-384
918,475 UART: [kat] HMAC-384Kdf
923,295 UART: [kat] LMS
1,171,623 UART: [kat] --
1,172,492 UART: [cold-reset] ++
1,172,898 UART: [fht] FHT @ 0x50003400
1,175,623 UART: [idev] ++
1,175,791 UART: [idev] CDI.KEYID = 6
1,176,151 UART: [idev] SUBJECT.KEYID = 7
1,176,575 UART: [idev] UDS.KEYID = 0
1,176,920 ready_for_fw is high
1,176,920 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,753 UART: [idev] Erasing UDS.KEYID = 0
1,201,872 UART: [idev] Sha1 KeyId Algorithm
1,210,468 UART: [idev] --
1,211,598 UART: [ldev] ++
1,211,766 UART: [ldev] CDI.KEYID = 6
1,212,129 UART: [ldev] SUBJECT.KEYID = 5
1,212,555 UART: [ldev] AUTHORITY.KEYID = 7
1,213,018 UART: [ldev] FE.KEYID = 1
1,218,278 UART: [ldev] Erasing FE.KEYID = 1
1,244,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,552 UART: [ldev] --
1,284,061 UART: [fwproc] Wait for Commands...
1,284,843 UART: [fwproc] Recv command 0x46574c44
1,285,571 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,482 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,971 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,200 >>> mbox cmd response: success
2,777,338 UART: [afmc] ++
2,777,506 UART: [afmc] CDI.KEYID = 6
2,777,868 UART: [afmc] SUBJECT.KEYID = 7
2,778,293 UART: [afmc] AUTHORITY.KEYID = 5
2,813,990 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,067 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,815 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,543 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,428 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,147 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,923 UART: [afmc] --
2,857,913 UART: [cold-reset] --
2,858,893 UART: [state] Locking Datavault
2,859,876 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,480 UART: [state] Locking ICCM
2,861,108 UART: [exit] Launching FMC @ 0x40000130
2,866,437 UART:
2,866,453 UART: Running Caliptra FMC ...
2,866,861 UART:
2,867,004 UART: [state] CFI Enabled
2,877,615 UART: [fht] FMC Alias Private Key: 7
2,985,594 UART: [art] Extend RT PCRs Done
2,986,022 UART: [art] Lock RT PCRs Done
2,987,654 UART: [art] Populate DV Done
2,996,099 UART: [fht] FMC Alias Private Key: 7
2,997,133 UART: [art] Derive CDI
2,997,413 UART: [art] Store in in slot 0x4
3,082,906 UART: [art] Derive Key Pair
3,083,266 UART: [art] Store priv key in slot 0x5
3,096,152 UART: [art] Derive Key Pair - Done
3,110,850 UART: [art] Signing Cert with AUTHO
3,111,330 UART: RITY.KEYID = 7
3,126,278 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,043 UART: [art] PUB.X = 7F8556F23B203343BA49AA62FCB9AC8528E4D6E79BCE1DE987D4A6225F15D34E3D381547FCA1CB9231A2E6BB9EBBB5F0
3,133,831 UART: [art] PUB.Y = 0985007E47A0FB73C96DE2DF2AF6069E2E5797D4791B94636B38F242E21572AAD21E1E3D9166A0E38E320286BD062DD5
3,140,747 UART: [art] SIG.R = 5FEC342F3D356D0833256B2A46B4A72EA6B34E32C9B1824B23169685195AB349C2FF4673054381F70C7190F1156F553B
3,147,500 UART: [art] SIG.S = FD04788F843B12E12B55A8DEA43DACBEAB2EC293F3A9C4DDB78D94707F4157624E091543CB9331D863EB1504D1CAAB1A
3,170,812 UART: Caliptra RT
3,171,157 UART: [state] CFI Enabled
3,279,638 UART: [rt] RT listening for mailbox commands...
3,280,308 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,324 UART: [rt]cmd =0x41544d4e, len=14344
3,713,553 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,056 ready_for_fw is high
1,060,056 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,725 >>> mbox cmd response: success
2,687,433 UART:
2,687,449 UART: Running Caliptra FMC ...
2,687,857 UART:
2,688,000 UART: [state] CFI Enabled
2,698,257 UART: [fht] FMC Alias Private Key: 7
2,806,492 UART: [art] Extend RT PCRs Done
2,806,920 UART: [art] Lock RT PCRs Done
2,808,430 UART: [art] Populate DV Done
2,816,817 UART: [fht] FMC Alias Private Key: 7
2,817,989 UART: [art] Derive CDI
2,818,269 UART: [art] Store in in slot 0x4
2,903,662 UART: [art] Derive Key Pair
2,904,022 UART: [art] Store priv key in slot 0x5
2,917,102 UART: [art] Derive Key Pair - Done
2,931,683 UART: [art] Signing Cert with AUTHO
2,932,163 UART: RITY.KEYID = 7
2,947,329 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,094 UART: [art] PUB.X = 99DAE36F8F3B02374B841C56D482BCFB409746577740F69E586547869C26CBC751D1CC26674DE7A0A4EEE0B4B1A4A033
2,954,865 UART: [art] PUB.Y = 2415F4DE284293FF2F20B5F879E29A2AD08243AF965141AE426CD0D6F202E8C1A95ECBCBDBDB9307633B674E0F618692
2,961,814 UART: [art] SIG.R = 8C7E1EDB1A6D67CFC8DE8B74CE35070D4E9E85C3993A35EA3DE9DAF67EA0A412D98C8B73CCEDF2FC957323F4E5CB1DE3
2,968,608 UART: [art] SIG.S = 82D4EDD0F13247646DB43ADBB5D193F479B071483A2438C3789C0BA1917D34BF38A40F8C8B817B50C24EBD2D530E8FB7
2,991,652 UART: Caliptra RT
2,991,997 UART: [state] CFI Enabled
3,099,691 UART: [rt] RT listening for mailbox commands...
3,100,361 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,583 UART: [rt]cmd =0x41544d4e, len=14344
3,533,654 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
891,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
899,923 UART: [kat] SHA2-256
901,863 UART: [kat] SHA2-384
904,532 UART: [kat] SHA2-512-ACC
906,433 UART: [kat] ECC-384
915,970 UART: [kat] HMAC-384Kdf
920,350 UART: [kat] LMS
1,168,662 UART: [kat] --
1,169,607 UART: [cold-reset] ++
1,170,135 UART: [fht] FHT @ 0x50003400
1,172,843 UART: [idev] ++
1,173,011 UART: [idev] CDI.KEYID = 6
1,173,372 UART: [idev] SUBJECT.KEYID = 7
1,173,797 UART: [idev] UDS.KEYID = 0
1,174,143 ready_for_fw is high
1,174,143 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,045 UART: [idev] Erasing UDS.KEYID = 0
1,198,921 UART: [idev] Sha1 KeyId Algorithm
1,207,729 UART: [idev] --
1,208,748 UART: [ldev] ++
1,208,916 UART: [ldev] CDI.KEYID = 6
1,209,280 UART: [ldev] SUBJECT.KEYID = 5
1,209,707 UART: [ldev] AUTHORITY.KEYID = 7
1,210,170 UART: [ldev] FE.KEYID = 1
1,215,330 UART: [ldev] Erasing FE.KEYID = 1
1,240,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,734 UART: [ldev] --
1,280,098 UART: [fwproc] Wait for Commands...
1,280,695 UART: [fwproc] Recv command 0x46574c44
1,281,428 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,254 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,563 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,359 >>> mbox cmd response: success
2,772,550 UART: [afmc] ++
2,772,718 UART: [afmc] CDI.KEYID = 6
2,773,081 UART: [afmc] SUBJECT.KEYID = 7
2,773,507 UART: [afmc] AUTHORITY.KEYID = 5
2,809,066 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,594 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,345 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,074 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,957 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,676 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,493 UART: [afmc] --
2,852,447 UART: [cold-reset] --
2,853,429 UART: [state] Locking Datavault
2,854,718 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,322 UART: [state] Locking ICCM
2,855,968 UART: [exit] Launching FMC @ 0x40000130
2,861,297 UART:
2,861,313 UART: Running Caliptra FMC ...
2,861,721 UART:
2,861,775 UART: [state] CFI Enabled
2,872,312 UART: [fht] FMC Alias Private Key: 7
2,980,911 UART: [art] Extend RT PCRs Done
2,981,339 UART: [art] Lock RT PCRs Done
2,983,033 UART: [art] Populate DV Done
2,991,364 UART: [fht] FMC Alias Private Key: 7
2,992,544 UART: [art] Derive CDI
2,992,824 UART: [art] Store in in slot 0x4
3,078,205 UART: [art] Derive Key Pair
3,078,565 UART: [art] Store priv key in slot 0x5
3,091,371 UART: [art] Derive Key Pair - Done
3,106,018 UART: [art] Signing Cert with AUTHO
3,106,498 UART: RITY.KEYID = 7
3,121,252 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,017 UART: [art] PUB.X = C1501A88EE50DD9F9922A75907CEB92F40F218A3435B88527B9111A3596174656AEC48588CCB8FA35CE0E422424856D1
3,128,780 UART: [art] PUB.Y = 402C81677EA2FA670E5100051C5F9F1D9589E6F680F3BD61732B8AEFB6AD2D0B3AAA17F9E22EA930AF99311D80A1B7DB
3,135,713 UART: [art] SIG.R = AFDD629F485384B418D21F8E93E23B99D62E76B19F79A43EC38502D2B0CD26038F303EA1E9DA3AFAE74DFD43254DF5D6
3,142,491 UART: [art] SIG.S = 2D1748F39FF57FF145BFCCDF4F5AE075E6E5941693DF43F6C202064DFF2A7C60865DADE2C632F50F56F04E630FC3DAF0
3,165,894 UART: Caliptra RT
3,166,147 UART: [state] CFI Enabled
3,273,768 UART: [rt] RT listening for mailbox commands...
3,274,438 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,570 UART: [rt]cmd =0x41544d4e, len=14344
3,706,793 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,158 ready_for_fw is high
1,056,158 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,379 >>> mbox cmd response: success
2,684,653 UART:
2,684,669 UART: Running Caliptra FMC ...
2,685,077 UART:
2,685,131 UART: [state] CFI Enabled
2,695,362 UART: [fht] FMC Alias Private Key: 7
2,803,089 UART: [art] Extend RT PCRs Done
2,803,517 UART: [art] Lock RT PCRs Done
2,804,975 UART: [art] Populate DV Done
2,813,158 UART: [fht] FMC Alias Private Key: 7
2,814,220 UART: [art] Derive CDI
2,814,500 UART: [art] Store in in slot 0x4
2,899,849 UART: [art] Derive Key Pair
2,900,209 UART: [art] Store priv key in slot 0x5
2,913,265 UART: [art] Derive Key Pair - Done
2,928,321 UART: [art] Signing Cert with AUTHO
2,928,801 UART: RITY.KEYID = 7
2,944,091 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,856 UART: [art] PUB.X = A2433E760B228BF53AD0C0AC88ABCFBF4DC93F79879D647078FF26BB137B799DDDF1690E83A803B6630CB0C72E5EBC06
2,951,627 UART: [art] PUB.Y = 2CD1C62D7976BE046A3DF4145DBC09C521F6518B3165CBB74FC74EB089A411DB0E5B5CC7330D6F5F8176FAA211EC33A0
2,958,579 UART: [art] SIG.R = F760F7AFD0AF1DD82DCA9AFD6013A29B77A2E2DE11A67BE56A52AEAEED4151BBDB629EB2B94AF4553538609EACC6B5EC
2,965,381 UART: [art] SIG.S = 5645F428736FC60C0A741344291C4546C6BF6A6E536823792C12D67AB56F01DC2E4E5622606A8F1E0DB692940CECED7B
2,989,053 UART: Caliptra RT
2,989,306 UART: [state] CFI Enabled
3,096,551 UART: [rt] RT listening for mailbox commands...
3,097,221 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,149 UART: [rt]cmd =0x41544d4e, len=14344
3,530,132 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
891,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,446 UART: [kat] ++
895,598 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,609 UART: [kat] SHA2-512-ACC
906,510 UART: [kat] ECC-384
916,433 UART: [kat] HMAC-384Kdf
921,233 UART: [kat] LMS
1,169,545 UART: [kat] --
1,170,472 UART: [cold-reset] ++
1,170,900 UART: [fht] FHT @ 0x50003400
1,173,730 UART: [idev] ++
1,173,898 UART: [idev] CDI.KEYID = 6
1,174,259 UART: [idev] SUBJECT.KEYID = 7
1,174,684 UART: [idev] UDS.KEYID = 0
1,175,030 ready_for_fw is high
1,175,030 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,700 UART: [idev] Erasing UDS.KEYID = 0
1,199,738 UART: [idev] Sha1 KeyId Algorithm
1,208,482 UART: [idev] --
1,209,399 UART: [ldev] ++
1,209,567 UART: [ldev] CDI.KEYID = 6
1,209,931 UART: [ldev] SUBJECT.KEYID = 5
1,210,358 UART: [ldev] AUTHORITY.KEYID = 7
1,210,821 UART: [ldev] FE.KEYID = 1
1,216,269 UART: [ldev] Erasing FE.KEYID = 1
1,242,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,053 UART: [ldev] --
1,281,419 UART: [fwproc] Wait for Commands...
1,282,126 UART: [fwproc] Recv command 0x46574c44
1,282,859 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,761 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,713 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,022 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,932 >>> mbox cmd response: success
2,773,153 UART: [afmc] ++
2,773,321 UART: [afmc] CDI.KEYID = 6
2,773,684 UART: [afmc] SUBJECT.KEYID = 7
2,774,110 UART: [afmc] AUTHORITY.KEYID = 5
2,809,823 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,730 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,459 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,342 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,061 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,008 UART: [afmc] --
2,853,106 UART: [cold-reset] --
2,854,008 UART: [state] Locking Datavault
2,855,203 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,807 UART: [state] Locking ICCM
2,856,243 UART: [exit] Launching FMC @ 0x40000130
2,861,572 UART:
2,861,588 UART: Running Caliptra FMC ...
2,861,996 UART:
2,862,139 UART: [state] CFI Enabled
2,872,716 UART: [fht] FMC Alias Private Key: 7
2,981,139 UART: [art] Extend RT PCRs Done
2,981,567 UART: [art] Lock RT PCRs Done
2,983,045 UART: [art] Populate DV Done
2,991,052 UART: [fht] FMC Alias Private Key: 7
2,992,192 UART: [art] Derive CDI
2,992,472 UART: [art] Store in in slot 0x4
3,078,373 UART: [art] Derive Key Pair
3,078,733 UART: [art] Store priv key in slot 0x5
3,092,023 UART: [art] Derive Key Pair - Done
3,106,747 UART: [art] Signing Cert with AUTHO
3,107,227 UART: RITY.KEYID = 7
3,122,195 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,960 UART: [art] PUB.X = C0907729C4F4304BD44BD64433E825DE0AF857BA10AF1DF5BE7AB8316AF21C0C617BEABF63BB2F0D303E007F7DAEF43D
3,129,721 UART: [art] PUB.Y = F4A61E05FA6895B4C8373345E217F2FFFEEED58510D63303DD02881CCEC91E57783A7F294F9D7DF0CC5E03541CE1E45E
3,136,671 UART: [art] SIG.R = 33EBF44AA20DFBA87768BFFABCCC0F996B60C37FF443E71FB170BF248A7B529CB8E5D0D364B573D5FBE24475CA335DDC
3,143,461 UART: [art] SIG.S = 0059FBAF9CC7B1FBB1EF1770091EC06947EB4493410D5112A348C622782FEA6B758F13F1974CABEE14D553F5B2DC3E13
3,167,124 UART: Caliptra RT
3,167,469 UART: [state] CFI Enabled
3,275,013 UART: [rt] RT listening for mailbox commands...
3,275,683 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,857 UART: [rt]cmd =0x41544d4e, len=14344
3,709,108 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,583 ready_for_fw is high
1,056,583 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,016 >>> mbox cmd response: success
2,685,866 UART:
2,685,882 UART: Running Caliptra FMC ...
2,686,290 UART:
2,686,433 UART: [state] CFI Enabled
2,697,240 UART: [fht] FMC Alias Private Key: 7
2,805,457 UART: [art] Extend RT PCRs Done
2,805,885 UART: [art] Lock RT PCRs Done
2,807,311 UART: [art] Populate DV Done
2,815,408 UART: [fht] FMC Alias Private Key: 7
2,816,564 UART: [art] Derive CDI
2,816,844 UART: [art] Store in in slot 0x4
2,902,887 UART: [art] Derive Key Pair
2,903,247 UART: [art] Store priv key in slot 0x5
2,916,211 UART: [art] Derive Key Pair - Done
2,930,678 UART: [art] Signing Cert with AUTHO
2,931,158 UART: RITY.KEYID = 7
2,946,350 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,115 UART: [art] PUB.X = 6D4AA31DE5728B417C51F321188BEC5A1E163274F8760190C52EB6EACF6E62EEE4169A3FBA070D20A3DA280BB97F4100
2,953,861 UART: [art] PUB.Y = 8B82D61EDCFB3A31233C57E87D67242B6D77EC973BBBCA8C48A78FA52BFE8F7693148EF0832B7ECE23C9286555D7DB6C
2,960,827 UART: [art] SIG.R = FD9E4B8A194C04904F91453BCFDDBBBE9A576C92874EAD45FDFFF5F83CC8FB90FEEEC22114630B22C3E888E11D198DF1
2,967,615 UART: [art] SIG.S = F6298BCA0F1C1C1CF5477DC3AED0790DEA28376C74766A19E17F96D2E68A3B256E27A06BB4E4CFE5121C96051A3DE754
2,991,463 UART: Caliptra RT
2,991,808 UART: [state] CFI Enabled
3,100,660 UART: [rt] RT listening for mailbox commands...
3,101,330 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,234 UART: [rt]cmd =0x41544d4e, len=14344
3,533,649 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,610 UART: [state] LifecycleState = Unprovisioned
86,265 UART: [state] DebugLocked = No
86,953 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,559 UART: [kat] SHA2-256
882,490 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,605 UART: [kat] ++
886,757 UART: [kat] sha1
890,771 UART: [kat] SHA2-256
892,709 UART: [kat] SHA2-384
895,456 UART: [kat] SHA2-512-ACC
897,357 UART: [kat] ECC-384
902,920 UART: [kat] HMAC-384Kdf
907,512 UART: [kat] LMS
1,475,708 UART: [kat] --
1,476,417 UART: [cold-reset] ++
1,476,913 UART: [fht] Storing FHT @ 0x50003400
1,479,496 UART: [idev] ++
1,479,664 UART: [idev] CDI.KEYID = 6
1,480,024 UART: [idev] SUBJECT.KEYID = 7
1,480,448 UART: [idev] UDS.KEYID = 0
1,480,793 ready_for_fw is high
1,480,793 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,592 UART: [idev] Erasing UDS.KEYID = 0
1,505,104 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,766 UART: [idev] --
1,514,841 UART: [ldev] ++
1,515,009 UART: [ldev] CDI.KEYID = 6
1,515,372 UART: [ldev] SUBJECT.KEYID = 5
1,515,798 UART: [ldev] AUTHORITY.KEYID = 7
1,516,261 UART: [ldev] FE.KEYID = 1
1,521,509 UART: [ldev] Erasing FE.KEYID = 1
1,546,736 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,122 UART: [ldev] --
1,586,539 UART: [fwproc] Waiting for Commands...
1,587,216 UART: [fwproc] Received command 0x46574c44
1,588,007 UART: [fwproc] Received Image of size 114332 bytes
2,885,869 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,743 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,095 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,922 >>> mbox cmd response: success
3,078,966 UART: [afmc] ++
3,079,134 UART: [afmc] CDI.KEYID = 6
3,079,496 UART: [afmc] SUBJECT.KEYID = 7
3,079,921 UART: [afmc] AUTHORITY.KEYID = 5
3,114,952 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,912 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,692 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,420 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,305 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,995 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,968 UART: [afmc] --
3,157,950 UART: [cold-reset] --
3,158,586 UART: [state] Locking Datavault
3,159,723 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,327 UART: [state] Locking ICCM
3,160,847 UART: [exit] Launching FMC @ 0x40000130
3,166,176 UART:
3,166,192 UART: Running Caliptra FMC ...
3,166,600 UART:
3,166,654 UART: [state] CFI Enabled
3,176,591 UART: [fht] FMC Alias Private Key: 7
3,284,752 UART: [art] Extend RT PCRs Done
3,285,180 UART: [art] Lock RT PCRs Done
3,286,838 UART: [art] Populate DV Done
3,295,025 UART: [fht] FMC Alias Private Key: 7
3,295,979 UART: [art] Derive CDI
3,296,259 UART: [art] Store in in slot 0x4
3,381,368 UART: [art] Derive Key Pair
3,381,728 UART: [art] Store priv key in slot 0x5
3,394,570 UART: [art] Derive Key Pair - Done
3,409,162 UART: [art] Signing Cert with AUTHO
3,409,642 UART: RITY.KEYID = 7
3,424,936 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,701 UART: [art] PUB.X = 7F318D5DF527849FFF00733B60AB1B1A27495AD45F0D28D1D9FC3EF6E6F98137ACC59017490511812C1B3CE04F4B1B7E
3,432,451 UART: [art] PUB.Y = 6407E43E0FA3422E9A646247F8217C1F3DCB0273C590B9D55C84319F958A7001D8E0BB20EA998AE5B9BC2419D24C2DB8
3,439,393 UART: [art] SIG.R = 105C648BF26C315D0034CFFC1A7A81D769F27105DF3C8A26A034940817C08A2F6AA2D30655BCDCDDE5CC9332E4131DC1
3,446,142 UART: [art] SIG.S = 019D3C328437D76F12A131801D8C633AA9B72661542064C4F8049682426D05A33219FAB03B5D55775B10D627F491A968
3,469,638 UART: Caliptra RT
3,469,891 UART: [state] CFI Enabled
3,576,477 UART: [rt] RT listening for mailbox commands...
3,577,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,753 UART: [rt]cmd =0x44504543, len=96
3,787,703 >>> mbox cmd response data (6236 bytes)
3,787,704 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,817,723 UART: [rt]cmd =0x53574545, len=84
3,843,812 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,651 ready_for_fw is high
1,362,651 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,782 >>> mbox cmd response: success
2,987,770 UART:
2,987,786 UART: Running Caliptra FMC ...
2,988,194 UART:
2,988,248 UART: [state] CFI Enabled
2,999,131 UART: [fht] FMC Alias Private Key: 7
3,107,470 UART: [art] Extend RT PCRs Done
3,107,898 UART: [art] Lock RT PCRs Done
3,109,484 UART: [art] Populate DV Done
3,117,565 UART: [fht] FMC Alias Private Key: 7
3,118,645 UART: [art] Derive CDI
3,118,925 UART: [art] Store in in slot 0x4
3,204,518 UART: [art] Derive Key Pair
3,204,878 UART: [art] Store priv key in slot 0x5
3,217,628 UART: [art] Derive Key Pair - Done
3,232,309 UART: [art] Signing Cert with AUTHO
3,232,789 UART: RITY.KEYID = 7
3,248,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,772 UART: [art] PUB.X = 52DD1AAEE2014B84ECFE254AA12F2F6EACF27CCB3C07AEDC78956899E1B03374386F0D5740EE6F72A967437AAE23B7AA
3,255,553 UART: [art] PUB.Y = BCDBE62605A6F23267A36CCBDD42F0F58DD97E5618C895AACBF2ECA970BE162B79BE1932B194CEB6141C7C3C6F7FD588
3,262,522 UART: [art] SIG.R = 6F2D89B2D5EF2D0FC7EA021EEF3F986036E436306256C7C96BD58C4283ABB9CD3180AD43E061430837B60E5E60F3F50E
3,269,285 UART: [art] SIG.S = 1D9553FAD3E332D59E295A5A0C238AC9CAADEED9CE3FACC2421F5873013B096C380CCE28766DED75DBC2D1A7797D265F
3,293,238 UART: Caliptra RT
3,293,491 UART: [state] CFI Enabled
3,402,019 UART: [rt] RT listening for mailbox commands...
3,402,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,129 UART: [rt]cmd =0x44504543, len=96
3,613,824 >>> mbox cmd response data (6236 bytes)
3,613,825 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,848 UART: [rt]cmd =0x53574545, len=84
3,669,285 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,852 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,480 UART: [kat] SHA2-256
882,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,526 UART: [kat] ++
886,678 UART: [kat] sha1
890,886 UART: [kat] SHA2-256
892,824 UART: [kat] SHA2-384
895,399 UART: [kat] SHA2-512-ACC
897,300 UART: [kat] ECC-384
902,867 UART: [kat] HMAC-384Kdf
907,469 UART: [kat] LMS
1,475,665 UART: [kat] --
1,476,716 UART: [cold-reset] ++
1,477,154 UART: [fht] Storing FHT @ 0x50003400
1,479,931 UART: [idev] ++
1,480,099 UART: [idev] CDI.KEYID = 6
1,480,459 UART: [idev] SUBJECT.KEYID = 7
1,480,883 UART: [idev] UDS.KEYID = 0
1,481,228 ready_for_fw is high
1,481,228 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,617 UART: [idev] Erasing UDS.KEYID = 0
1,506,061 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,643 UART: [idev] --
1,515,824 UART: [ldev] ++
1,515,992 UART: [ldev] CDI.KEYID = 6
1,516,355 UART: [ldev] SUBJECT.KEYID = 5
1,516,781 UART: [ldev] AUTHORITY.KEYID = 7
1,517,244 UART: [ldev] FE.KEYID = 1
1,522,622 UART: [ldev] Erasing FE.KEYID = 1
1,548,171 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,257 UART: [ldev] --
1,587,698 UART: [fwproc] Waiting for Commands...
1,588,543 UART: [fwproc] Received command 0x46574c44
1,589,334 UART: [fwproc] Received Image of size 114332 bytes
2,887,500 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,530 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,882 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,865 >>> mbox cmd response: success
3,081,047 UART: [afmc] ++
3,081,215 UART: [afmc] CDI.KEYID = 6
3,081,577 UART: [afmc] SUBJECT.KEYID = 7
3,082,002 UART: [afmc] AUTHORITY.KEYID = 5
3,117,963 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,967 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,747 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,475 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,360 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,050 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,009 UART: [afmc] --
3,160,997 UART: [cold-reset] --
3,161,903 UART: [state] Locking Datavault
3,163,026 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,630 UART: [state] Locking ICCM
3,164,274 UART: [exit] Launching FMC @ 0x40000130
3,169,603 UART:
3,169,619 UART: Running Caliptra FMC ...
3,170,027 UART:
3,170,170 UART: [state] CFI Enabled
3,181,225 UART: [fht] FMC Alias Private Key: 7
3,289,436 UART: [art] Extend RT PCRs Done
3,289,864 UART: [art] Lock RT PCRs Done
3,291,338 UART: [art] Populate DV Done
3,299,671 UART: [fht] FMC Alias Private Key: 7
3,300,751 UART: [art] Derive CDI
3,301,031 UART: [art] Store in in slot 0x4
3,386,928 UART: [art] Derive Key Pair
3,387,288 UART: [art] Store priv key in slot 0x5
3,400,726 UART: [art] Derive Key Pair - Done
3,415,726 UART: [art] Signing Cert with AUTHO
3,416,206 UART: RITY.KEYID = 7
3,431,154 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,919 UART: [art] PUB.X = 382658797CD86EE64E95B8C040C1405B784916CFB83B74103A746BA309666EB6D0DCBE538EB18E79327FE824F7319567
3,438,682 UART: [art] PUB.Y = 7E1937FE5DF5FA174D2200DE6F10B5D833FEF46A1FF32B64B214556E37DA850A08151408E892C948EA6A5DA0CA20DE34
3,445,611 UART: [art] SIG.R = E7DC07249C97DB92DB779F752CFB1B7A516D0484499BAD8294B19F5C2B828755D9F063860FAD4A0D941CDB8D259D606C
3,452,377 UART: [art] SIG.S = 64B918FC2356D0B1E6FB62B30943D998E0937C7CCB51C344B5D11F80DCE2CF58C3907790B96DA46A9282B6E01744905A
3,476,365 UART: Caliptra RT
3,476,710 UART: [state] CFI Enabled
3,584,755 UART: [rt] RT listening for mailbox commands...
3,585,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,803 UART: [rt]cmd =0x44504543, len=96
3,797,464 >>> mbox cmd response data (6236 bytes)
3,797,465 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,827,572 UART: [rt]cmd =0x53574545, len=84
3,853,465 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,942 ready_for_fw is high
1,362,942 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,281 >>> mbox cmd response: success
2,991,111 UART:
2,991,127 UART: Running Caliptra FMC ...
2,991,535 UART:
2,991,678 UART: [state] CFI Enabled
3,002,041 UART: [fht] FMC Alias Private Key: 7
3,110,184 UART: [art] Extend RT PCRs Done
3,110,612 UART: [art] Lock RT PCRs Done
3,112,276 UART: [art] Populate DV Done
3,120,595 UART: [fht] FMC Alias Private Key: 7
3,121,693 UART: [art] Derive CDI
3,121,973 UART: [art] Store in in slot 0x4
3,207,620 UART: [art] Derive Key Pair
3,207,980 UART: [art] Store priv key in slot 0x5
3,221,128 UART: [art] Derive Key Pair - Done
3,236,197 UART: [art] Signing Cert with AUTHO
3,236,677 UART: RITY.KEYID = 7
3,251,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,464 UART: [art] PUB.X = C314786599217F3D9383C2558FAC02F1173FCDCDDF24A9D2ED69C411EE2473D9F03F5489893477323E190640CCE9B506
3,259,223 UART: [art] PUB.Y = 61EB2CCB1B55BD46B3D90DA390EFF2281DFF4A8B99E52071438C5129646B3E70877CE6CCE38F3D493F4512F07C480E52
3,266,175 UART: [art] SIG.R = 1766DBE1712A334D7AB0F7D9D9312482C5D261E5DA1FBF5318B93D0E5F91D494EDB159FAF5D5B639E8695CDC8C0993B3
3,272,951 UART: [art] SIG.S = 5F23E44C883E67D9CCF869FF289D0C391AF0B292C5341051ADB2EC87AF24BA09A677D85EF138E95571FB4308A8FDB695
3,297,031 UART: Caliptra RT
3,297,376 UART: [state] CFI Enabled
3,406,208 UART: [rt] RT listening for mailbox commands...
3,406,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,750 UART: [rt]cmd =0x44504543, len=96
3,618,294 >>> mbox cmd response data (6236 bytes)
3,618,295 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,254 UART: [rt]cmd =0x53574545, len=84
3,674,145 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Unprovisioned
86,051 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,870 UART: [kat] SHA2-256
893,520 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,645 UART: [kat] ++
897,797 UART: [kat] sha1
901,939 UART: [kat] SHA2-256
903,879 UART: [kat] SHA2-384
906,434 UART: [kat] SHA2-512-ACC
908,335 UART: [kat] ECC-384
918,166 UART: [kat] HMAC-384Kdf
922,640 UART: [kat] LMS
1,170,968 UART: [kat] --
1,171,765 UART: [cold-reset] ++
1,172,137 UART: [fht] FHT @ 0x50003400
1,174,728 UART: [idev] ++
1,174,896 UART: [idev] CDI.KEYID = 6
1,175,256 UART: [idev] SUBJECT.KEYID = 7
1,175,680 UART: [idev] UDS.KEYID = 0
1,176,025 ready_for_fw is high
1,176,025 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,533 UART: [idev] Sha1 KeyId Algorithm
1,209,047 UART: [idev] --
1,210,259 UART: [ldev] ++
1,210,427 UART: [ldev] CDI.KEYID = 6
1,210,790 UART: [ldev] SUBJECT.KEYID = 5
1,211,216 UART: [ldev] AUTHORITY.KEYID = 7
1,211,679 UART: [ldev] FE.KEYID = 1
1,216,721 UART: [ldev] Erasing FE.KEYID = 1
1,242,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,797 UART: [ldev] --
1,282,242 UART: [fwproc] Wait for Commands...
1,282,856 UART: [fwproc] Recv command 0x46574c44
1,283,584 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,744 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,048 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,751 >>> mbox cmd response: success
2,774,767 UART: [afmc] ++
2,774,935 UART: [afmc] CDI.KEYID = 6
2,775,297 UART: [afmc] SUBJECT.KEYID = 7
2,775,722 UART: [afmc] AUTHORITY.KEYID = 5
2,811,201 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,588 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,316 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,201 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,920 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,600 UART: [afmc] --
2,854,550 UART: [cold-reset] --
2,855,394 UART: [state] Locking Datavault
2,856,677 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,281 UART: [state] Locking ICCM
2,857,873 UART: [exit] Launching FMC @ 0x40000130
2,863,202 UART:
2,863,218 UART: Running Caliptra FMC ...
2,863,626 UART:
2,863,680 UART: [state] CFI Enabled
2,874,313 UART: [fht] FMC Alias Private Key: 7
2,981,830 UART: [art] Extend RT PCRs Done
2,982,258 UART: [art] Lock RT PCRs Done
2,983,442 UART: [art] Populate DV Done
2,991,709 UART: [fht] FMC Alias Private Key: 7
2,992,809 UART: [art] Derive CDI
2,993,089 UART: [art] Store in in slot 0x4
3,078,368 UART: [art] Derive Key Pair
3,078,728 UART: [art] Store priv key in slot 0x5
3,091,718 UART: [art] Derive Key Pair - Done
3,106,624 UART: [art] Signing Cert with AUTHO
3,107,104 UART: RITY.KEYID = 7
3,122,094 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,859 UART: [art] PUB.X = 1194ADD5067AD27B5EFD460320178C99282BE11781298B06C455F4976A22D162056FBA997677AA8998783E2E63509BFB
3,129,609 UART: [art] PUB.Y = 5B096EA0BB28C16A2615BB54A33B8B9190FDD9F638C4CAD4AEB39A0D54A38095A4252DEB6B68CB74B6BAA81113834CCA
3,136,571 UART: [art] SIG.R = C7C9977520682D29518609E08A83D7B71C5F1DD3365195786F93518A0B806C6A8EF07447A3D7CAEA2EAFEF8116B04D55
3,143,335 UART: [art] SIG.S = 47ECB47D147AAF3DCF240CD55F55EBCE5D2CCB4102A04917FF78EF1BF43E481025D160267DB29FC39A45077A62CF2654
3,166,735 UART: Caliptra RT
3,166,988 UART: [state] CFI Enabled
3,275,175 UART: [rt] RT listening for mailbox commands...
3,275,845 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,053 UART: [rt]cmd =0x44504543, len=96
3,486,347 >>> mbox cmd response data (6236 bytes)
3,486,348 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,357 UART: [rt]cmd =0x53574545, len=84
3,541,704 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,351 ready_for_fw is high
1,060,351 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,144 >>> mbox cmd response: success
2,689,798 UART:
2,689,814 UART: Running Caliptra FMC ...
2,690,222 UART:
2,690,276 UART: [state] CFI Enabled
2,700,707 UART: [fht] FMC Alias Private Key: 7
2,808,806 UART: [art] Extend RT PCRs Done
2,809,234 UART: [art] Lock RT PCRs Done
2,810,630 UART: [art] Populate DV Done
2,818,937 UART: [fht] FMC Alias Private Key: 7
2,819,955 UART: [art] Derive CDI
2,820,235 UART: [art] Store in in slot 0x4
2,905,828 UART: [art] Derive Key Pair
2,906,188 UART: [art] Store priv key in slot 0x5
2,919,234 UART: [art] Derive Key Pair - Done
2,934,077 UART: [art] Signing Cert with AUTHO
2,934,557 UART: RITY.KEYID = 7
2,949,911 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,676 UART: [art] PUB.X = 18D07502248953E2D37DA474290D95327873DC6D8384CA51199D72AEF22AC2C0C932EFE8FA763E67B7FE4C11DAC58DCA
2,957,448 UART: [art] PUB.Y = B66281DFF4DEA51F7C69E6AB139338EE8C5692575138E1FC34978E7F022E96F0B8AD5176BB7F74BABFCBA049A048A111
2,964,407 UART: [art] SIG.R = 8ED14AD11026926CEB9E4F43239F57FD2CF2E2E64A5F3024832758D304D3E94E87BDF3C8332D6B11B95CC1D42A1E7495
2,971,180 UART: [art] SIG.S = 063926716A9DE8D10F4BF9F5F854E9263AFD34BF70A10712691BC46BB4438E1E95BE4E70113E9885D566BBE3381828BB
2,994,162 UART: Caliptra RT
2,994,415 UART: [state] CFI Enabled
3,102,244 UART: [rt] RT listening for mailbox commands...
3,102,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,288 UART: [rt]cmd =0x44504543, len=96
3,313,074 >>> mbox cmd response data (6236 bytes)
3,313,075 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,054 UART: [rt]cmd =0x53574545, len=84
3,368,549 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
893,671 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,796 UART: [kat] ++
897,948 UART: [kat] sha1
902,034 UART: [kat] SHA2-256
903,974 UART: [kat] SHA2-384
906,755 UART: [kat] SHA2-512-ACC
908,656 UART: [kat] ECC-384
918,349 UART: [kat] HMAC-384Kdf
923,015 UART: [kat] LMS
1,171,343 UART: [kat] --
1,172,376 UART: [cold-reset] ++
1,172,776 UART: [fht] FHT @ 0x50003400
1,175,573 UART: [idev] ++
1,175,741 UART: [idev] CDI.KEYID = 6
1,176,101 UART: [idev] SUBJECT.KEYID = 7
1,176,525 UART: [idev] UDS.KEYID = 0
1,176,870 ready_for_fw is high
1,176,870 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,547 UART: [idev] Erasing UDS.KEYID = 0
1,202,232 UART: [idev] Sha1 KeyId Algorithm
1,210,596 UART: [idev] --
1,211,522 UART: [ldev] ++
1,211,690 UART: [ldev] CDI.KEYID = 6
1,212,053 UART: [ldev] SUBJECT.KEYID = 5
1,212,479 UART: [ldev] AUTHORITY.KEYID = 7
1,212,942 UART: [ldev] FE.KEYID = 1
1,218,412 UART: [ldev] Erasing FE.KEYID = 1
1,244,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,170 UART: [ldev] --
1,283,593 UART: [fwproc] Wait for Commands...
1,284,197 UART: [fwproc] Recv command 0x46574c44
1,284,925 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,139 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,443 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,312 >>> mbox cmd response: success
2,776,508 UART: [afmc] ++
2,776,676 UART: [afmc] CDI.KEYID = 6
2,777,038 UART: [afmc] SUBJECT.KEYID = 7
2,777,463 UART: [afmc] AUTHORITY.KEYID = 5
2,813,270 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,019 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,767 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,495 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,380 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,099 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,029 UART: [afmc] --
2,857,115 UART: [cold-reset] --
2,857,931 UART: [state] Locking Datavault
2,859,100 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,704 UART: [state] Locking ICCM
2,860,212 UART: [exit] Launching FMC @ 0x40000130
2,865,541 UART:
2,865,557 UART: Running Caliptra FMC ...
2,865,965 UART:
2,866,108 UART: [state] CFI Enabled
2,876,763 UART: [fht] FMC Alias Private Key: 7
2,984,204 UART: [art] Extend RT PCRs Done
2,984,632 UART: [art] Lock RT PCRs Done
2,986,146 UART: [art] Populate DV Done
2,994,433 UART: [fht] FMC Alias Private Key: 7
2,995,383 UART: [art] Derive CDI
2,995,663 UART: [art] Store in in slot 0x4
3,081,556 UART: [art] Derive Key Pair
3,081,916 UART: [art] Store priv key in slot 0x5
3,095,224 UART: [art] Derive Key Pair - Done
3,110,006 UART: [art] Signing Cert with AUTHO
3,110,486 UART: RITY.KEYID = 7
3,125,586 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,351 UART: [art] PUB.X = 1FB42208CFE99F5262B534A704F6CDE3E78D4B8D4E6CA222F62331A66DF0DB0C1E9798A8FF7AAF2FF6D69706375C4046
3,133,121 UART: [art] PUB.Y = 5E4E18A129D948F442F0D35776BE8E707546BF55698588662D52AFDBFAD343AD7CADE29E41CF2E024B4F2DA89144D1A1
3,140,078 UART: [art] SIG.R = F6114349B607AB87E7CC3BD595B275F5802B24F97F4A2ED563E9EA6F4ED2E36210429701875895B8685FC52C6296B253
3,146,838 UART: [art] SIG.S = B539444F72B3A3F10ABAE3415C7C62FD01D63157C04EC08A5ADCBEE183DAE9EE024DB3F5E47856B1694635E5A7A8FDEB
3,169,874 UART: Caliptra RT
3,170,219 UART: [state] CFI Enabled
3,278,835 UART: [rt] RT listening for mailbox commands...
3,279,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,899 UART: [rt]cmd =0x44504543, len=96
3,491,170 >>> mbox cmd response data (6236 bytes)
3,491,171 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,768 UART: [rt]cmd =0x53574545, len=84
3,546,625 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,586 ready_for_fw is high
1,060,586 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,649 >>> mbox cmd response: success
2,687,585 UART:
2,687,601 UART: Running Caliptra FMC ...
2,688,009 UART:
2,688,152 UART: [state] CFI Enabled
2,698,631 UART: [fht] FMC Alias Private Key: 7
2,805,836 UART: [art] Extend RT PCRs Done
2,806,264 UART: [art] Lock RT PCRs Done
2,807,834 UART: [art] Populate DV Done
2,816,049 UART: [fht] FMC Alias Private Key: 7
2,817,209 UART: [art] Derive CDI
2,817,489 UART: [art] Store in in slot 0x4
2,902,766 UART: [art] Derive Key Pair
2,903,126 UART: [art] Store priv key in slot 0x5
2,916,428 UART: [art] Derive Key Pair - Done
2,931,260 UART: [art] Signing Cert with AUTHO
2,931,740 UART: RITY.KEYID = 7
2,946,992 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,757 UART: [art] PUB.X = 1903511837A8A2CF2E82B8A2E87725CC41131F10AE6807B139FE9FD24778EEE4E27D300081090DE1D47493C16417FA39
2,954,489 UART: [art] PUB.Y = 649F5EA133E15DE7E8B9A609C46598A1098EA03D83BA747570EB8D92C581C0BFA41F8B59027CD361FE82D6BE6FF8C185
2,961,440 UART: [art] SIG.R = FAD141CE9988F4C2F257814310D156BCBDA0CB7CBDA897FF3D07E50DAF14C48D313B8D21B443851EAD0E6DE6952EC04C
2,968,221 UART: [art] SIG.S = 25BE0468075E4990A493B5ADAB751E9DA77F249F857DF80C3E7B7ACBBE4FDB0BA08B5C38267269CBE275A1323140FAEF
2,991,822 UART: Caliptra RT
2,992,167 UART: [state] CFI Enabled
3,100,268 UART: [rt] RT listening for mailbox commands...
3,100,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,310 UART: [rt]cmd =0x44504543, len=96
3,311,798 >>> mbox cmd response data (6236 bytes)
3,311,799 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,708 UART: [rt]cmd =0x53574545, len=84
3,367,355 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
86,075 UART: [state] WD Timer not started. Device not locked for debugging
87,246 UART: [kat] SHA2-256
890,796 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,925 UART: [kat] ++
895,077 UART: [kat] sha1
899,233 UART: [kat] SHA2-256
901,173 UART: [kat] SHA2-384
903,784 UART: [kat] SHA2-512-ACC
905,685 UART: [kat] ECC-384
915,718 UART: [kat] HMAC-384Kdf
920,196 UART: [kat] LMS
1,168,508 UART: [kat] --
1,169,457 UART: [cold-reset] ++
1,169,789 UART: [fht] FHT @ 0x50003400
1,172,493 UART: [idev] ++
1,172,661 UART: [idev] CDI.KEYID = 6
1,173,022 UART: [idev] SUBJECT.KEYID = 7
1,173,447 UART: [idev] UDS.KEYID = 0
1,173,793 ready_for_fw is high
1,173,793 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,547 UART: [idev] Erasing UDS.KEYID = 0
1,198,113 UART: [idev] Sha1 KeyId Algorithm
1,207,061 UART: [idev] --
1,208,090 UART: [ldev] ++
1,208,258 UART: [ldev] CDI.KEYID = 6
1,208,622 UART: [ldev] SUBJECT.KEYID = 5
1,209,049 UART: [ldev] AUTHORITY.KEYID = 7
1,209,512 UART: [ldev] FE.KEYID = 1
1,214,394 UART: [ldev] Erasing FE.KEYID = 1
1,240,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,260 UART: [ldev] --
1,280,638 UART: [fwproc] Wait for Commands...
1,281,439 UART: [fwproc] Recv command 0x46574c44
1,282,172 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,754 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,063 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,783 >>> mbox cmd response: success
2,773,044 UART: [afmc] ++
2,773,212 UART: [afmc] CDI.KEYID = 6
2,773,575 UART: [afmc] SUBJECT.KEYID = 7
2,774,001 UART: [afmc] AUTHORITY.KEYID = 5
2,809,454 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,770 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,521 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,250 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,133 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,852 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,507 UART: [afmc] --
2,852,615 UART: [cold-reset] --
2,853,463 UART: [state] Locking Datavault
2,854,466 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,070 UART: [state] Locking ICCM
2,855,690 UART: [exit] Launching FMC @ 0x40000130
2,861,019 UART:
2,861,035 UART: Running Caliptra FMC ...
2,861,443 UART:
2,861,497 UART: [state] CFI Enabled
2,872,062 UART: [fht] FMC Alias Private Key: 7
2,980,305 UART: [art] Extend RT PCRs Done
2,980,733 UART: [art] Lock RT PCRs Done
2,982,353 UART: [art] Populate DV Done
2,990,698 UART: [fht] FMC Alias Private Key: 7
2,991,758 UART: [art] Derive CDI
2,992,038 UART: [art] Store in in slot 0x4
3,077,609 UART: [art] Derive Key Pair
3,077,969 UART: [art] Store priv key in slot 0x5
3,091,819 UART: [art] Derive Key Pair - Done
3,106,347 UART: [art] Signing Cert with AUTHO
3,106,827 UART: RITY.KEYID = 7
3,121,169 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,934 UART: [art] PUB.X = DDD0DCF9A0EE96BFD37354756640B86D74B50A7F0744220E7B17C370CC400A0AB1752196F1B11896A0BD46CAF87E3A2E
3,128,699 UART: [art] PUB.Y = 008FA6B2688707852E3807B8877BF0F65B8705023A9D208C62AF88A2A13E346AFD14739EFA7821D74F4981FB26AA4AC2
3,135,615 UART: [art] SIG.R = D68FDDED72681A2ED5FE5C889AE1B6CEF70436BF508948D0573ACBFDA0205AADD174E44AC91622FC575872472F356DB4
3,142,398 UART: [art] SIG.S = 56BD6A6B250E8185434D3EDB842176E022E521D3718DAAC637F80B46499B4C1E2C73BF5D02D6F88AF33FD78A6FEAB340
3,165,992 UART: Caliptra RT
3,166,245 UART: [state] CFI Enabled
3,273,596 UART: [rt] RT listening for mailbox commands...
3,274,266 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,572 UART: [rt]cmd =0x44504543, len=96
3,485,509 >>> mbox cmd response data (6236 bytes)
3,485,510 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,469 UART: [rt]cmd =0x53574545, len=84
3,541,774 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,698 ready_for_fw is high
1,055,698 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,869 >>> mbox cmd response: success
2,686,245 UART:
2,686,261 UART: Running Caliptra FMC ...
2,686,669 UART:
2,686,723 UART: [state] CFI Enabled
2,697,160 UART: [fht] FMC Alias Private Key: 7
2,804,897 UART: [art] Extend RT PCRs Done
2,805,325 UART: [art] Lock RT PCRs Done
2,806,649 UART: [art] Populate DV Done
2,815,014 UART: [fht] FMC Alias Private Key: 7
2,816,122 UART: [art] Derive CDI
2,816,402 UART: [art] Store in in slot 0x4
2,902,009 UART: [art] Derive Key Pair
2,902,369 UART: [art] Store priv key in slot 0x5
2,915,099 UART: [art] Derive Key Pair - Done
2,929,692 UART: [art] Signing Cert with AUTHO
2,930,172 UART: RITY.KEYID = 7
2,945,526 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,291 UART: [art] PUB.X = CF0D19E119F6611CC95DD3D6AA995FCB89648D02BE4C1CBB18689FB7CC8F9BF36EE55CD78FE8E86DECED18444A82A328
2,953,079 UART: [art] PUB.Y = 27CAD807677D73D84DA412A2582A707CBBA38CCFDFECC370012FFFCEB04A1C9584771FFA70550A50F20EB4EA3A5A4E60
2,960,037 UART: [art] SIG.R = 1F6BB0F5AF9BD27C704A472F74BE7B0CFA7AD9F2AAF4AC63983892BAE4D82583314A67F21E0BB58BD41B4321E137D772
2,966,817 UART: [art] SIG.S = D5FA109BF6D78939B8F838EA0248532132A805E0B357E79303DA1D003494A0EC31B5483D382F083E0479D79840EBB486
2,990,177 UART: Caliptra RT
2,990,430 UART: [state] CFI Enabled
3,098,051 UART: [rt] RT listening for mailbox commands...
3,098,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,027 UART: [rt]cmd =0x44504543, len=96
3,308,965 >>> mbox cmd response data (6236 bytes)
3,308,966 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,707 UART: [rt]cmd =0x53574545, len=84
3,364,168 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,007 UART: [state] LifecycleState = Unprovisioned
85,662 UART: [state] DebugLocked = No
86,222 UART: [state] WD Timer not started. Device not locked for debugging
87,507 UART: [kat] SHA2-256
891,057 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,186 UART: [kat] ++
895,338 UART: [kat] sha1
899,616 UART: [kat] SHA2-256
901,556 UART: [kat] SHA2-384
904,301 UART: [kat] SHA2-512-ACC
906,202 UART: [kat] ECC-384
916,265 UART: [kat] HMAC-384Kdf
920,815 UART: [kat] LMS
1,169,127 UART: [kat] --
1,169,938 UART: [cold-reset] ++
1,170,352 UART: [fht] FHT @ 0x50003400
1,173,028 UART: [idev] ++
1,173,196 UART: [idev] CDI.KEYID = 6
1,173,557 UART: [idev] SUBJECT.KEYID = 7
1,173,982 UART: [idev] UDS.KEYID = 0
1,174,328 ready_for_fw is high
1,174,328 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,042 UART: [idev] Erasing UDS.KEYID = 0
1,198,918 UART: [idev] Sha1 KeyId Algorithm
1,207,752 UART: [idev] --
1,208,873 UART: [ldev] ++
1,209,041 UART: [ldev] CDI.KEYID = 6
1,209,405 UART: [ldev] SUBJECT.KEYID = 5
1,209,832 UART: [ldev] AUTHORITY.KEYID = 7
1,210,295 UART: [ldev] FE.KEYID = 1
1,215,567 UART: [ldev] Erasing FE.KEYID = 1
1,242,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,883 UART: [ldev] --
1,281,389 UART: [fwproc] Wait for Commands...
1,282,186 UART: [fwproc] Recv command 0x46574c44
1,282,919 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,695 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,004 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,912 >>> mbox cmd response: success
2,774,047 UART: [afmc] ++
2,774,215 UART: [afmc] CDI.KEYID = 6
2,774,578 UART: [afmc] SUBJECT.KEYID = 7
2,775,004 UART: [afmc] AUTHORITY.KEYID = 5
2,810,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,169 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,920 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,649 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,532 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,251 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,158 UART: [afmc] --
2,854,196 UART: [cold-reset] --
2,854,910 UART: [state] Locking Datavault
2,856,181 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,785 UART: [state] Locking ICCM
2,857,317 UART: [exit] Launching FMC @ 0x40000130
2,862,646 UART:
2,862,662 UART: Running Caliptra FMC ...
2,863,070 UART:
2,863,213 UART: [state] CFI Enabled
2,873,814 UART: [fht] FMC Alias Private Key: 7
2,981,645 UART: [art] Extend RT PCRs Done
2,982,073 UART: [art] Lock RT PCRs Done
2,983,605 UART: [art] Populate DV Done
2,991,912 UART: [fht] FMC Alias Private Key: 7
2,993,018 UART: [art] Derive CDI
2,993,298 UART: [art] Store in in slot 0x4
3,079,203 UART: [art] Derive Key Pair
3,079,563 UART: [art] Store priv key in slot 0x5
3,092,397 UART: [art] Derive Key Pair - Done
3,107,200 UART: [art] Signing Cert with AUTHO
3,107,680 UART: RITY.KEYID = 7
3,123,052 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,817 UART: [art] PUB.X = 0378CF4E8A2B64982E1F0C0F409AB353B0C9F5CCB1E22B5DAA0A5E98B35A03117E518E5DACCF40EF9205B2D2DE15600F
3,130,584 UART: [art] PUB.Y = BCCFDA2D382D27891339ADF0295ECB7CBEEC83E0FE1E5840D4FBC6D09B4FD5BB6F4177F95A6C363188A0E1335B210E57
3,137,551 UART: [art] SIG.R = 9A23802D7043F122A7B1EAF2DFA874B2C5351C39EF0B8AEF7261D488A83193B90512E668729D122584B28B9DABD5A48E
3,144,319 UART: [art] SIG.S = E3CE964E587ADD9E39199CAE10AFC7E7F8323C8DB31582F641C99024AA68351E75852DB546570F3F24FC681346A06CFD
3,168,093 UART: Caliptra RT
3,168,438 UART: [state] CFI Enabled
3,276,738 UART: [rt] RT listening for mailbox commands...
3,277,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,602 UART: [rt]cmd =0x44504543, len=96
3,487,563 >>> mbox cmd response data (6236 bytes)
3,487,564 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,433 UART: [rt]cmd =0x53574545, len=84
3,542,516 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,349 ready_for_fw is high
1,056,349 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,120 >>> mbox cmd response: success
2,684,292 UART:
2,684,308 UART: Running Caliptra FMC ...
2,684,716 UART:
2,684,859 UART: [state] CFI Enabled
2,695,676 UART: [fht] FMC Alias Private Key: 7
2,803,739 UART: [art] Extend RT PCRs Done
2,804,167 UART: [art] Lock RT PCRs Done
2,805,437 UART: [art] Populate DV Done
2,813,772 UART: [fht] FMC Alias Private Key: 7
2,814,762 UART: [art] Derive CDI
2,815,042 UART: [art] Store in in slot 0x4
2,900,567 UART: [art] Derive Key Pair
2,900,927 UART: [art] Store priv key in slot 0x5
2,914,107 UART: [art] Derive Key Pair - Done
2,929,180 UART: [art] Signing Cert with AUTHO
2,929,660 UART: RITY.KEYID = 7
2,945,056 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,821 UART: [art] PUB.X = B70366E455312DE7E51ADF5EDFF9D9F9C6ADDC3EE8BEABAF26849E88149AB8FF02CC694DB15A0D67276C0D1BAA672F33
2,952,605 UART: [art] PUB.Y = 1EDEF901E5F39D2D917853180FF87E9D9622E5B747237CCA66BCFD1AF47C5D608BCC1F8A193343FAD0642459D3A20B41
2,959,556 UART: [art] SIG.R = F1F546F082F569967D090376FEE825454EA82ED7A1BACBDE5068C5982C9E643D19312187A0C6EF414954735A0D5227C7
2,966,315 UART: [art] SIG.S = 5D05847FBBE01FF34950B4AFFA16121807ACDDC520BF7BB99B1D2B6206CA78E69F3B7D247FD3DBEA7B3A23F863549781
2,989,981 UART: Caliptra RT
2,990,326 UART: [state] CFI Enabled
3,098,499 UART: [rt] RT listening for mailbox commands...
3,099,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,381 UART: [rt]cmd =0x44504543, len=96
3,309,609 >>> mbox cmd response data (6236 bytes)
3,309,610 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,399 UART: [rt]cmd =0x53574545, len=84
3,364,976 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,149 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,687 UART: [kat] SHA2-256
881,618 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,733 UART: [kat] ++
885,885 UART: [kat] sha1
890,151 UART: [kat] SHA2-256
892,089 UART: [kat] SHA2-384
894,676 UART: [kat] SHA2-512-ACC
896,577 UART: [kat] ECC-384
902,102 UART: [kat] HMAC-384Kdf
906,822 UART: [kat] LMS
1,475,018 UART: [kat] --
1,476,059 UART: [cold-reset] ++
1,476,463 UART: [fht] Storing FHT @ 0x50003400
1,479,464 UART: [idev] ++
1,479,632 UART: [idev] CDI.KEYID = 6
1,479,992 UART: [idev] SUBJECT.KEYID = 7
1,480,416 UART: [idev] UDS.KEYID = 0
1,480,761 ready_for_fw is high
1,480,761 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,522 UART: [idev] Erasing UDS.KEYID = 0
1,505,070 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,708 UART: [idev] --
1,514,833 UART: [ldev] ++
1,515,001 UART: [ldev] CDI.KEYID = 6
1,515,364 UART: [ldev] SUBJECT.KEYID = 5
1,515,790 UART: [ldev] AUTHORITY.KEYID = 7
1,516,253 UART: [ldev] FE.KEYID = 1
1,521,331 UART: [ldev] Erasing FE.KEYID = 1
1,546,790 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,616 UART: [ldev] --
1,585,879 UART: [fwproc] Waiting for Commands...
1,586,642 UART: [fwproc] Received command 0x46574c44
1,587,433 UART: [fwproc] Received Image of size 114332 bytes
2,885,459 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,951 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,303 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,240 >>> mbox cmd response: success
3,079,474 UART: [afmc] ++
3,079,642 UART: [afmc] CDI.KEYID = 6
3,080,004 UART: [afmc] SUBJECT.KEYID = 7
3,080,429 UART: [afmc] AUTHORITY.KEYID = 5
3,114,764 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,992 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,772 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,500 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,385 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,075 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,952 UART: [afmc] --
3,157,988 UART: [cold-reset] --
3,158,746 UART: [state] Locking Datavault
3,159,773 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,377 UART: [state] Locking ICCM
3,160,947 UART: [exit] Launching FMC @ 0x40000130
3,166,276 UART:
3,166,292 UART: Running Caliptra FMC ...
3,166,700 UART:
3,166,754 UART: [state] CFI Enabled
3,177,589 UART: [fht] FMC Alias Private Key: 7
3,286,184 UART: [art] Extend RT PCRs Done
3,286,612 UART: [art] Lock RT PCRs Done
3,288,156 UART: [art] Populate DV Done
3,296,485 UART: [fht] FMC Alias Private Key: 7
3,297,567 UART: [art] Derive CDI
3,297,847 UART: [art] Store in in slot 0x4
3,383,660 UART: [art] Derive Key Pair
3,384,020 UART: [art] Store priv key in slot 0x5
3,396,768 UART: [art] Derive Key Pair - Done
3,411,250 UART: [art] Signing Cert with AUTHO
3,411,730 UART: RITY.KEYID = 7
3,427,408 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,173 UART: [art] PUB.X = 3D1E8432963A45856879E695D598761D89362CA76B9A8B23DBD0A50F876A2299FA709F923D2F4B04968D060A125D4ABD
3,434,927 UART: [art] PUB.Y = 251DB21A2531FF415F0D4DE580199B2E8DDEEF6A28988B83F420AED81F37B9902EBB5C6C2C4A1AAAD967F1DD07CD0F1A
3,441,890 UART: [art] SIG.R = 4907E63C87C5C949A44026AB4249C9DEF4138B67C3BE802860B7B4FE4B2D1C496725952E91BFA47A3787F865FFD01A28
3,448,659 UART: [art] SIG.S = CE55B83E5E9E4C00D0780BB294A785C26C34FAC168EB6EB3247525D22D90CC443EB527CC89E83BC713D60F628B486A3B
3,472,482 UART: Caliptra RT
3,472,735 UART: [state] CFI Enabled
3,580,814 UART: [rt] RT listening for mailbox commands...
3,581,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,932 UART: [rt]cmd =0x44504543, len=96
3,792,937 >>> mbox cmd response data (6236 bytes)
3,792,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,993 UART: [rt]cmd =0x44504543, len=96
3,855,100 >>> mbox cmd response data (56 bytes)
3,855,101 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,884,710 UART: [rt]cmd =0x52564348, len=36
3,886,975 >>> mbox cmd response data (8 bytes)
3,886,976 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,917,011 UART: [rt]cmd =0x44504543, len=96
4,097,681 >>> mbox cmd response data (6236 bytes)
4,097,682 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,127,631 UART: [rt]cmd =0x53574545, len=84
4,152,532 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,619 ready_for_fw is high
1,362,619 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,236 >>> mbox cmd response: success
2,990,704 UART:
2,990,720 UART: Running Caliptra FMC ...
2,991,128 UART:
2,991,182 UART: [state] CFI Enabled
3,001,973 UART: [fht] FMC Alias Private Key: 7
3,109,862 UART: [art] Extend RT PCRs Done
3,110,290 UART: [art] Lock RT PCRs Done
3,111,826 UART: [art] Populate DV Done
3,120,095 UART: [fht] FMC Alias Private Key: 7
3,121,119 UART: [art] Derive CDI
3,121,399 UART: [art] Store in in slot 0x4
3,207,260 UART: [art] Derive Key Pair
3,207,620 UART: [art] Store priv key in slot 0x5
3,220,414 UART: [art] Derive Key Pair - Done
3,235,462 UART: [art] Signing Cert with AUTHO
3,235,942 UART: RITY.KEYID = 7
3,251,118 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,883 UART: [art] PUB.X = 35F5889129A98A1B5B02510F7EB36A9AC112994A625CABE71602146FF3C438BE5AFA63EB054C6BD62ECB7740A2D20085
3,258,625 UART: [art] PUB.Y = 1C7097F1E4C48CA4B19C4EB91F8934061B44794E2BF7FAF74F4E870980425DC13BC13048446635CBC8071B7D808FC49F
3,265,568 UART: [art] SIG.R = 719044C6101A36E2611DE355D0248FC26D5C2C42F3C82A7BB7DCCFE90213B68544DECF679E7B8ADDCDD3AF2DF7239E21
3,272,351 UART: [art] SIG.S = FBE863020C01B14ADA0DC93C0F75FD4D19177B587092BA4EE09BAF12BF08ED618EC0432F85FF292D35019A6830A821F1
3,296,103 UART: Caliptra RT
3,296,356 UART: [state] CFI Enabled
3,405,733 UART: [rt] RT listening for mailbox commands...
3,406,403 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,161 UART: [rt]cmd =0x44504543, len=96
3,619,390 >>> mbox cmd response data (6236 bytes)
3,619,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,086 UART: [rt]cmd =0x44504543, len=96
3,680,545 >>> mbox cmd response data (56 bytes)
3,680,546 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,973 UART: [rt]cmd =0x52564348, len=36
3,712,150 >>> mbox cmd response data (8 bytes)
3,712,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,226 UART: [rt]cmd =0x44504543, len=96
3,923,675 >>> mbox cmd response data (6236 bytes)
3,923,676 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,953,359 UART: [rt]cmd =0x53574545, len=84
3,978,254 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,952 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,518 UART: [kat] SHA2-256
882,449 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,564 UART: [kat] ++
886,716 UART: [kat] sha1
890,960 UART: [kat] SHA2-256
892,898 UART: [kat] SHA2-384
895,625 UART: [kat] SHA2-512-ACC
897,526 UART: [kat] ECC-384
903,197 UART: [kat] HMAC-384Kdf
907,885 UART: [kat] LMS
1,476,081 UART: [kat] --
1,477,072 UART: [cold-reset] ++
1,477,400 UART: [fht] Storing FHT @ 0x50003400
1,479,985 UART: [idev] ++
1,480,153 UART: [idev] CDI.KEYID = 6
1,480,513 UART: [idev] SUBJECT.KEYID = 7
1,480,937 UART: [idev] UDS.KEYID = 0
1,481,282 ready_for_fw is high
1,481,282 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,083 UART: [idev] Erasing UDS.KEYID = 0
1,506,007 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,677 UART: [idev] --
1,515,600 UART: [ldev] ++
1,515,768 UART: [ldev] CDI.KEYID = 6
1,516,131 UART: [ldev] SUBJECT.KEYID = 5
1,516,557 UART: [ldev] AUTHORITY.KEYID = 7
1,517,020 UART: [ldev] FE.KEYID = 1
1,522,440 UART: [ldev] Erasing FE.KEYID = 1
1,548,017 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,977 UART: [ldev] --
1,587,324 UART: [fwproc] Waiting for Commands...
1,588,141 UART: [fwproc] Received command 0x46574c44
1,588,932 UART: [fwproc] Received Image of size 114332 bytes
2,886,584 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,642 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,994 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,833 >>> mbox cmd response: success
3,080,077 UART: [afmc] ++
3,080,245 UART: [afmc] CDI.KEYID = 6
3,080,607 UART: [afmc] SUBJECT.KEYID = 7
3,081,032 UART: [afmc] AUTHORITY.KEYID = 5
3,116,129 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,901 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,681 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,409 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,294 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,984 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,869 UART: [afmc] --
3,159,933 UART: [cold-reset] --
3,160,609 UART: [state] Locking Datavault
3,161,912 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,516 UART: [state] Locking ICCM
3,163,104 UART: [exit] Launching FMC @ 0x40000130
3,168,433 UART:
3,168,449 UART: Running Caliptra FMC ...
3,168,857 UART:
3,169,000 UART: [state] CFI Enabled
3,179,363 UART: [fht] FMC Alias Private Key: 7
3,287,392 UART: [art] Extend RT PCRs Done
3,287,820 UART: [art] Lock RT PCRs Done
3,289,382 UART: [art] Populate DV Done
3,297,561 UART: [fht] FMC Alias Private Key: 7
3,298,673 UART: [art] Derive CDI
3,298,953 UART: [art] Store in in slot 0x4
3,384,656 UART: [art] Derive Key Pair
3,385,016 UART: [art] Store priv key in slot 0x5
3,398,012 UART: [art] Derive Key Pair - Done
3,412,947 UART: [art] Signing Cert with AUTHO
3,413,427 UART: RITY.KEYID = 7
3,428,961 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,726 UART: [art] PUB.X = 30749C8D4E6EB0A9F85898E7590B6B46C36A384EFC1E3A41FCCE3FDAD26CCB98FB54B042AE14A99570FDBD84A4AE4B9B
3,436,517 UART: [art] PUB.Y = F4F3DE5A74A4AA1372505B3831ED22C5EF010D7F30CE78133D898FC0087558B50D76643EDF602EAB3B7B3D28D97B26C1
3,443,463 UART: [art] SIG.R = EA45FC58399A053F7745D8432508AC7A1CAEF3A7522160943BE0BA04D2DE2AADEA4635302A80DFCFD33B414BDB603806
3,450,233 UART: [art] SIG.S = CB6B0B97D6E09300511B88E6AF61B9BEE4A09471F50DF0A688178527140DDA7886A94F7020D18D4D00C21B29A6C3C284
3,473,645 UART: Caliptra RT
3,473,990 UART: [state] CFI Enabled
3,582,894 UART: [rt] RT listening for mailbox commands...
3,583,564 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,230 UART: [rt]cmd =0x44504543, len=96
3,795,751 >>> mbox cmd response data (6236 bytes)
3,795,752 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,667 UART: [rt]cmd =0x44504543, len=96
3,857,674 >>> mbox cmd response data (56 bytes)
3,857,675 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,887,202 UART: [rt]cmd =0x52564348, len=36
3,889,341 >>> mbox cmd response data (8 bytes)
3,889,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,235 UART: [rt]cmd =0x44504543, len=96
4,100,242 >>> mbox cmd response data (6236 bytes)
4,100,243 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,130,120 UART: [rt]cmd =0x53574545, len=84
4,156,035 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,936 ready_for_fw is high
1,362,936 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,707 >>> mbox cmd response: success
2,987,881 UART:
2,987,897 UART: Running Caliptra FMC ...
2,988,305 UART:
2,988,448 UART: [state] CFI Enabled
2,998,603 UART: [fht] FMC Alias Private Key: 7
3,106,620 UART: [art] Extend RT PCRs Done
3,107,048 UART: [art] Lock RT PCRs Done
3,108,824 UART: [art] Populate DV Done
3,117,007 UART: [fht] FMC Alias Private Key: 7
3,117,983 UART: [art] Derive CDI
3,118,263 UART: [art] Store in in slot 0x4
3,204,462 UART: [art] Derive Key Pair
3,204,822 UART: [art] Store priv key in slot 0x5
3,218,620 UART: [art] Derive Key Pair - Done
3,233,625 UART: [art] Signing Cert with AUTHO
3,234,105 UART: RITY.KEYID = 7
3,249,381 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,146 UART: [art] PUB.X = 7A5F3DD0A6B04436954B1931E00C1064417667533C545F26DFC7157983341F61A0484BFFA8132CC65BFB75DECA2AD0B7
3,256,915 UART: [art] PUB.Y = E6687B4CEBEED2681C54288C0DF7774966E26A23F45CFC789405AAB17F763923CCEAC0531B1B7E147CE631AA0EDDDD96
3,263,872 UART: [art] SIG.R = 10F7835142C65B6B4193B4A786E77B3793103B489A9FAFF25765D3B3A92B967B5D16555FC0CA0E514A9EA105CCEDBE4B
3,270,644 UART: [art] SIG.S = 6E02BC8BB3727AFC50BFE8865B06403648FB21B02847AFCAEB21D6487BFAD001AE9D8EE17F32730BC80029D7F9C3073E
3,294,264 UART: Caliptra RT
3,294,609 UART: [state] CFI Enabled
3,402,795 UART: [rt] RT listening for mailbox commands...
3,403,465 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,061 UART: [rt]cmd =0x44504543, len=96
3,615,674 >>> mbox cmd response data (6236 bytes)
3,615,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,576 UART: [rt]cmd =0x44504543, len=96
3,677,555 >>> mbox cmd response data (56 bytes)
3,677,556 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,101 UART: [rt]cmd =0x52564348, len=36
3,709,006 >>> mbox cmd response data (8 bytes)
3,709,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,922 UART: [rt]cmd =0x44504543, len=96
3,920,640 >>> mbox cmd response data (6236 bytes)
3,920,641 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,406 UART: [rt]cmd =0x53574545, len=84
3,976,779 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,890 UART: [state] LifecycleState = Unprovisioned
85,545 UART: [state] DebugLocked = No
86,155 UART: [state] WD Timer not started. Device not locked for debugging
87,354 UART: [kat] SHA2-256
893,004 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,129 UART: [kat] ++
897,281 UART: [kat] sha1
901,563 UART: [kat] SHA2-256
903,503 UART: [kat] SHA2-384
906,340 UART: [kat] SHA2-512-ACC
908,241 UART: [kat] ECC-384
917,800 UART: [kat] HMAC-384Kdf
922,338 UART: [kat] LMS
1,170,666 UART: [kat] --
1,171,597 UART: [cold-reset] ++
1,172,145 UART: [fht] FHT @ 0x50003400
1,174,678 UART: [idev] ++
1,174,846 UART: [idev] CDI.KEYID = 6
1,175,206 UART: [idev] SUBJECT.KEYID = 7
1,175,630 UART: [idev] UDS.KEYID = 0
1,175,975 ready_for_fw is high
1,175,975 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,894 UART: [idev] Erasing UDS.KEYID = 0
1,200,863 UART: [idev] Sha1 KeyId Algorithm
1,209,331 UART: [idev] --
1,210,357 UART: [ldev] ++
1,210,525 UART: [ldev] CDI.KEYID = 6
1,210,888 UART: [ldev] SUBJECT.KEYID = 5
1,211,314 UART: [ldev] AUTHORITY.KEYID = 7
1,211,777 UART: [ldev] FE.KEYID = 1
1,217,131 UART: [ldev] Erasing FE.KEYID = 1
1,244,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,881 UART: [ldev] --
1,283,228 UART: [fwproc] Wait for Commands...
1,283,972 UART: [fwproc] Recv command 0x46574c44
1,284,700 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,240 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,544 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,385 >>> mbox cmd response: success
2,775,467 UART: [afmc] ++
2,775,635 UART: [afmc] CDI.KEYID = 6
2,775,997 UART: [afmc] SUBJECT.KEYID = 7
2,776,422 UART: [afmc] AUTHORITY.KEYID = 5
2,811,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,714 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,462 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,190 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,075 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,794 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,678 UART: [afmc] --
2,854,756 UART: [cold-reset] --
2,855,656 UART: [state] Locking Datavault
2,856,643 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,247 UART: [state] Locking ICCM
2,857,679 UART: [exit] Launching FMC @ 0x40000130
2,863,008 UART:
2,863,024 UART: Running Caliptra FMC ...
2,863,432 UART:
2,863,486 UART: [state] CFI Enabled
2,873,901 UART: [fht] FMC Alias Private Key: 7
2,981,726 UART: [art] Extend RT PCRs Done
2,982,154 UART: [art] Lock RT PCRs Done
2,983,698 UART: [art] Populate DV Done
2,991,881 UART: [fht] FMC Alias Private Key: 7
2,992,821 UART: [art] Derive CDI
2,993,101 UART: [art] Store in in slot 0x4
3,078,768 UART: [art] Derive Key Pair
3,079,128 UART: [art] Store priv key in slot 0x5
3,092,166 UART: [art] Derive Key Pair - Done
3,106,781 UART: [art] Signing Cert with AUTHO
3,107,261 UART: RITY.KEYID = 7
3,122,841 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,606 UART: [art] PUB.X = 3FB5B6D702AB5B7A7384D812C443B4EAB42595D68DFFA26BC1611EE41FAB7100F0D39018B842C298256722B35E35FF79
3,130,357 UART: [art] PUB.Y = C389BA964236B13CA77613747C5E785643E770531A368FEC03677088E39AF1A0A895D666F870A443ABD724E69DD02D76
3,137,298 UART: [art] SIG.R = 353C1416459EDC46A78C65E3BD2C2A352291672C0D9ECFAD57DAF01546ECEA825204CD9183E138DF74F66B595925EFF2
3,144,070 UART: [art] SIG.S = 3BE00AECD6A330E33018860C2ED799A2C99044959EB63C34E9FB1A1932375399464CEB1D0BA3C54A21FE8101C7C762CB
3,167,565 UART: Caliptra RT
3,167,818 UART: [state] CFI Enabled
3,276,677 UART: [rt] RT listening for mailbox commands...
3,277,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,617 UART: [rt]cmd =0x44504543, len=96
3,487,912 >>> mbox cmd response data (6236 bytes)
3,487,913 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,822 UART: [rt]cmd =0x44504543, len=96
3,550,277 >>> mbox cmd response data (56 bytes)
3,550,278 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,743 UART: [rt]cmd =0x52564348, len=36
3,582,004 >>> mbox cmd response data (8 bytes)
3,582,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,974 UART: [rt]cmd =0x44504543, len=96
3,792,162 >>> mbox cmd response data (6236 bytes)
3,792,163 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,058 UART: [rt]cmd =0x53574545, len=84
3,847,741 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,285 ready_for_fw is high
1,060,285 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,892 >>> mbox cmd response: success
2,687,476 UART:
2,687,492 UART: Running Caliptra FMC ...
2,687,900 UART:
2,687,954 UART: [state] CFI Enabled
2,698,585 UART: [fht] FMC Alias Private Key: 7
2,806,050 UART: [art] Extend RT PCRs Done
2,806,478 UART: [art] Lock RT PCRs Done
2,808,290 UART: [art] Populate DV Done
2,816,773 UART: [fht] FMC Alias Private Key: 7
2,817,881 UART: [art] Derive CDI
2,818,161 UART: [art] Store in in slot 0x4
2,903,964 UART: [art] Derive Key Pair
2,904,324 UART: [art] Store priv key in slot 0x5
2,917,588 UART: [art] Derive Key Pair - Done
2,932,468 UART: [art] Signing Cert with AUTHO
2,932,948 UART: RITY.KEYID = 7
2,948,000 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,765 UART: [art] PUB.X = CF57683ACCA87C0BD19AB162F7C5F31ECE30F69577678F916FD61A8D866DD620A76D28401C10948CF29AF4E3CEDF4ED3
2,955,548 UART: [art] PUB.Y = A7836206200DE6B9FA6274E3D016056F938AB4C1C1D17403077AB136D030D738064AEB866DD7729DB16F92A95DD8E751
2,962,478 UART: [art] SIG.R = 95408CA3F5F8D09019D5F882A213DC86E28639307D8CF052C255E35C5A59B0DDFE9CB1A685DC88D6BFF881CCEF0B7B78
2,969,259 UART: [art] SIG.S = 41A71C54229E55DBC2767E36CE36AC6CDB68DE3A151C0AC6D0D87D2BBE1973E1113C3C4573F2A9BE2EE2AC8FF3D19398
2,992,969 UART: Caliptra RT
2,993,222 UART: [state] CFI Enabled
3,100,517 UART: [rt] RT listening for mailbox commands...
3,101,187 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,455 UART: [rt]cmd =0x44504543, len=96
3,313,914 >>> mbox cmd response data (6236 bytes)
3,313,915 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,668 UART: [rt]cmd =0x44504543, len=96
3,375,543 >>> mbox cmd response data (56 bytes)
3,375,544 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,009 UART: [rt]cmd =0x52564348, len=36
3,407,248 >>> mbox cmd response data (8 bytes)
3,407,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,070 UART: [rt]cmd =0x44504543, len=96
3,618,354 >>> mbox cmd response data (6236 bytes)
3,618,355 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,896 UART: [rt]cmd =0x53574545, len=84
3,673,565 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,089 UART: [state] LifecycleState = Unprovisioned
85,744 UART: [state] DebugLocked = No
86,362 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
893,353 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,478 UART: [kat] ++
897,630 UART: [kat] sha1
901,918 UART: [kat] SHA2-256
903,858 UART: [kat] SHA2-384
906,685 UART: [kat] SHA2-512-ACC
908,586 UART: [kat] ECC-384
918,231 UART: [kat] HMAC-384Kdf
922,873 UART: [kat] LMS
1,171,201 UART: [kat] --
1,171,964 UART: [cold-reset] ++
1,172,488 UART: [fht] FHT @ 0x50003400
1,175,007 UART: [idev] ++
1,175,175 UART: [idev] CDI.KEYID = 6
1,175,535 UART: [idev] SUBJECT.KEYID = 7
1,175,959 UART: [idev] UDS.KEYID = 0
1,176,304 ready_for_fw is high
1,176,304 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,819 UART: [idev] Erasing UDS.KEYID = 0
1,201,088 UART: [idev] Sha1 KeyId Algorithm
1,209,552 UART: [idev] --
1,210,550 UART: [ldev] ++
1,210,718 UART: [ldev] CDI.KEYID = 6
1,211,081 UART: [ldev] SUBJECT.KEYID = 5
1,211,507 UART: [ldev] AUTHORITY.KEYID = 7
1,211,970 UART: [ldev] FE.KEYID = 1
1,217,634 UART: [ldev] Erasing FE.KEYID = 1
1,244,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,348 UART: [ldev] --
1,283,789 UART: [fwproc] Wait for Commands...
1,284,477 UART: [fwproc] Recv command 0x46574c44
1,285,205 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,827 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,131 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,020 >>> mbox cmd response: success
2,777,146 UART: [afmc] ++
2,777,314 UART: [afmc] CDI.KEYID = 6
2,777,676 UART: [afmc] SUBJECT.KEYID = 7
2,778,101 UART: [afmc] AUTHORITY.KEYID = 5
2,814,242 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,559 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,307 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,035 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,920 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,639 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,445 UART: [afmc] --
2,857,393 UART: [cold-reset] --
2,858,349 UART: [state] Locking Datavault
2,859,788 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,392 UART: [state] Locking ICCM
2,860,848 UART: [exit] Launching FMC @ 0x40000130
2,866,177 UART:
2,866,193 UART: Running Caliptra FMC ...
2,866,601 UART:
2,866,744 UART: [state] CFI Enabled
2,877,153 UART: [fht] FMC Alias Private Key: 7
2,986,022 UART: [art] Extend RT PCRs Done
2,986,450 UART: [art] Lock RT PCRs Done
2,988,036 UART: [art] Populate DV Done
2,996,199 UART: [fht] FMC Alias Private Key: 7
2,997,165 UART: [art] Derive CDI
2,997,445 UART: [art] Store in in slot 0x4
3,082,770 UART: [art] Derive Key Pair
3,083,130 UART: [art] Store priv key in slot 0x5
3,096,732 UART: [art] Derive Key Pair - Done
3,111,757 UART: [art] Signing Cert with AUTHO
3,112,237 UART: RITY.KEYID = 7
3,127,297 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,062 UART: [art] PUB.X = 6A858CDC80C757BAD8C17903531D0F75E6A097E091941CFDE32087285758C8C1068CA9EC561031619EC67A5D1A5694BF
3,134,823 UART: [art] PUB.Y = 942B10918FBE7AF501633DC132B4A10541238C3AEA75DD497BE872B42817D032725D254B93522007F984AF853C42E414
3,141,756 UART: [art] SIG.R = E6D7658A385752AA99667F88A5A2331FDBD948CCDCD2C8C3E745B0458E30ECC74891A9857954B9C984B604CFB56D11C8
3,148,529 UART: [art] SIG.S = 19D3D1A46B75C62F16EB4213CDA798240075BC21069097FA0E8833074D479BB297149B147F3C32653979964543A4FA76
3,172,189 UART: Caliptra RT
3,172,534 UART: [state] CFI Enabled
3,279,673 UART: [rt] RT listening for mailbox commands...
3,280,343 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,625 UART: [rt]cmd =0x44504543, len=96
3,491,501 >>> mbox cmd response data (6236 bytes)
3,491,502 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,521,445 UART: [rt]cmd =0x44504543, len=96
3,552,802 >>> mbox cmd response data (56 bytes)
3,552,803 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,216 UART: [rt]cmd =0x52564348, len=36
3,584,417 >>> mbox cmd response data (8 bytes)
3,584,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,273 UART: [rt]cmd =0x44504543, len=96
3,795,777 >>> mbox cmd response data (6236 bytes)
3,795,778 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,855 UART: [rt]cmd =0x53574545, len=84
3,851,564 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,288 ready_for_fw is high
1,060,288 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,217 >>> mbox cmd response: success
2,686,989 UART:
2,687,005 UART: Running Caliptra FMC ...
2,687,413 UART:
2,687,556 UART: [state] CFI Enabled
2,697,801 UART: [fht] FMC Alias Private Key: 7
2,805,906 UART: [art] Extend RT PCRs Done
2,806,334 UART: [art] Lock RT PCRs Done
2,807,962 UART: [art] Populate DV Done
2,816,163 UART: [fht] FMC Alias Private Key: 7
2,817,249 UART: [art] Derive CDI
2,817,529 UART: [art] Store in in slot 0x4
2,903,304 UART: [art] Derive Key Pair
2,903,664 UART: [art] Store priv key in slot 0x5
2,916,058 UART: [art] Derive Key Pair - Done
2,930,970 UART: [art] Signing Cert with AUTHO
2,931,450 UART: RITY.KEYID = 7
2,946,404 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,169 UART: [art] PUB.X = CBAE59E7E5E80F604C52E2E1A7892B10852650775BCC09669093536581E77EB55749E60B33EDEA78CE697DC5BE6C9B8B
2,953,936 UART: [art] PUB.Y = B8197D0805905C4CF91A8EE044A122EA10B22D8883157CEA3EEE37AFEBA20B79C90CC1684F471CE316F11B1E2B2B7FC8
2,960,888 UART: [art] SIG.R = 63DA915BAF2DBD07826F285A5190E0FC85CFCB63297DF32CECCE29DB1FB619ACC6F39A1CA405E8924ED8BB61F5E4A1D3
2,967,678 UART: [art] SIG.S = D0B82C5EEB11A011DBAB87E48893654822700A2190DA4E4EA3C936A3CCEC1B50FC3AC7622EC0CA2033D4C0685F7A7483
2,991,640 UART: Caliptra RT
2,991,985 UART: [state] CFI Enabled
3,099,896 UART: [rt] RT listening for mailbox commands...
3,100,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,118 UART: [rt]cmd =0x44504543, len=96
3,311,729 >>> mbox cmd response data (6236 bytes)
3,311,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,505 UART: [rt]cmd =0x44504543, len=96
3,373,152 >>> mbox cmd response data (56 bytes)
3,373,153 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,672 UART: [rt]cmd =0x52564348, len=36
3,404,883 >>> mbox cmd response data (8 bytes)
3,404,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,973 UART: [rt]cmd =0x44504543, len=96
3,616,607 >>> mbox cmd response data (6236 bytes)
3,616,608 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,519 UART: [rt]cmd =0x53574545, len=84
3,672,162 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,191 UART: [state] WD Timer not started. Device not locked for debugging
87,332 UART: [kat] SHA2-256
890,882 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,011 UART: [kat] ++
895,163 UART: [kat] sha1
899,357 UART: [kat] SHA2-256
901,297 UART: [kat] SHA2-384
904,136 UART: [kat] SHA2-512-ACC
906,037 UART: [kat] ECC-384
915,712 UART: [kat] HMAC-384Kdf
920,234 UART: [kat] LMS
1,168,546 UART: [kat] --
1,169,441 UART: [cold-reset] ++
1,169,973 UART: [fht] FHT @ 0x50003400
1,172,507 UART: [idev] ++
1,172,675 UART: [idev] CDI.KEYID = 6
1,173,036 UART: [idev] SUBJECT.KEYID = 7
1,173,461 UART: [idev] UDS.KEYID = 0
1,173,807 ready_for_fw is high
1,173,807 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,191 UART: [idev] Erasing UDS.KEYID = 0
1,197,949 UART: [idev] Sha1 KeyId Algorithm
1,206,833 UART: [idev] --
1,207,946 UART: [ldev] ++
1,208,114 UART: [ldev] CDI.KEYID = 6
1,208,478 UART: [ldev] SUBJECT.KEYID = 5
1,208,905 UART: [ldev] AUTHORITY.KEYID = 7
1,209,368 UART: [ldev] FE.KEYID = 1
1,214,472 UART: [ldev] Erasing FE.KEYID = 1
1,240,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,182 UART: [ldev] --
1,279,670 UART: [fwproc] Wait for Commands...
1,280,325 UART: [fwproc] Recv command 0x46574c44
1,281,058 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,696 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,005 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,949 >>> mbox cmd response: success
2,772,028 UART: [afmc] ++
2,772,196 UART: [afmc] CDI.KEYID = 6
2,772,559 UART: [afmc] SUBJECT.KEYID = 7
2,772,985 UART: [afmc] AUTHORITY.KEYID = 5
2,808,226 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,527 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,139 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,858 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,855 UART: [afmc] --
2,851,983 UART: [cold-reset] --
2,852,909 UART: [state] Locking Datavault
2,853,860 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,464 UART: [state] Locking ICCM
2,855,074 UART: [exit] Launching FMC @ 0x40000130
2,860,403 UART:
2,860,419 UART: Running Caliptra FMC ...
2,860,827 UART:
2,860,881 UART: [state] CFI Enabled
2,871,256 UART: [fht] FMC Alias Private Key: 7
2,979,271 UART: [art] Extend RT PCRs Done
2,979,699 UART: [art] Lock RT PCRs Done
2,980,813 UART: [art] Populate DV Done
2,988,998 UART: [fht] FMC Alias Private Key: 7
2,990,168 UART: [art] Derive CDI
2,990,448 UART: [art] Store in in slot 0x4
3,076,151 UART: [art] Derive Key Pair
3,076,511 UART: [art] Store priv key in slot 0x5
3,090,075 UART: [art] Derive Key Pair - Done
3,104,987 UART: [art] Signing Cert with AUTHO
3,105,467 UART: RITY.KEYID = 7
3,120,823 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,588 UART: [art] PUB.X = 2EAB487C344374B48A84915FBAB31C29E4FAE7946F3AD72C40365A180EB88E489DCAC91BEBBA610B8EA97D6F3FFD5BB8
3,128,374 UART: [art] PUB.Y = 9C411D1091BADF54B0EC641D7760C8012E5B3AE30B24B2BDF9A47310A25DD2EE1CBA5F4C17A54A94F27C5646B30E8870
3,135,327 UART: [art] SIG.R = FA4EEFB8DCE3E06B6C5048696FCF74D399C59727B76C930E217D82E990F35260F51C878642CFCA1668E0E2C53FFD19BD
3,142,106 UART: [art] SIG.S = A6648119D4D485BCAC766152FF982AA601A63B65E319344DCBF133B00E18DE82D03F6F249E08FF1F538743BFD113866E
3,166,300 UART: Caliptra RT
3,166,553 UART: [state] CFI Enabled
3,273,541 UART: [rt] RT listening for mailbox commands...
3,274,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,547 UART: [rt]cmd =0x44504543, len=96
3,485,444 >>> mbox cmd response data (6236 bytes)
3,485,445 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,370 UART: [rt]cmd =0x44504543, len=96
3,547,197 >>> mbox cmd response data (56 bytes)
3,547,198 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,713 UART: [rt]cmd =0x52564348, len=36
3,578,762 >>> mbox cmd response data (8 bytes)
3,578,763 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,662 UART: [rt]cmd =0x44504543, len=96
3,790,228 >>> mbox cmd response data (6236 bytes)
3,790,229 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,820,002 UART: [rt]cmd =0x53574545, len=84
3,846,065 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,644 ready_for_fw is high
1,055,644 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,883 >>> mbox cmd response: success
2,682,325 UART:
2,682,341 UART: Running Caliptra FMC ...
2,682,749 UART:
2,682,803 UART: [state] CFI Enabled
2,692,900 UART: [fht] FMC Alias Private Key: 7
2,800,153 UART: [art] Extend RT PCRs Done
2,800,581 UART: [art] Lock RT PCRs Done
2,802,327 UART: [art] Populate DV Done
2,810,640 UART: [fht] FMC Alias Private Key: 7
2,811,670 UART: [art] Derive CDI
2,811,950 UART: [art] Store in in slot 0x4
2,897,377 UART: [art] Derive Key Pair
2,897,737 UART: [art] Store priv key in slot 0x5
2,910,923 UART: [art] Derive Key Pair - Done
2,925,561 UART: [art] Signing Cert with AUTHO
2,926,041 UART: RITY.KEYID = 7
2,940,927 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,692 UART: [art] PUB.X = 53E881B1EA5D85E7A9435D31562B345988D6D0CE0E74C4ED7128F36D0716AC843A3DBDAA64D7DA2BFDFE620C62D0DBC7
2,948,471 UART: [art] PUB.Y = C3CC63C805D9FFC012970E3CB4653150217E7A7B60FB1104EA8F7DF223D17B9611121C5638A27304E009E7EF2F4EBDCB
2,955,414 UART: [art] SIG.R = D45F8FBC8EED7CCCC8CD90B2367711CACA214C9BE4FF217AC148E0A29A1565ADEBE17879C1129A84B1597C2C5709DD01
2,962,198 UART: [art] SIG.S = 210CCA7219A553BB1543B426B8A1297874ABC405E22E897F2F75230DB10FB30B250A4D03B7295AC51F71AE6D54D513B0
2,986,176 UART: Caliptra RT
2,986,429 UART: [state] CFI Enabled
3,093,032 UART: [rt] RT listening for mailbox commands...
3,093,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,088 UART: [rt]cmd =0x44504543, len=96
3,304,631 >>> mbox cmd response data (6236 bytes)
3,304,632 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,687 UART: [rt]cmd =0x44504543, len=96
3,366,746 >>> mbox cmd response data (56 bytes)
3,366,747 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,410 UART: [rt]cmd =0x52564348, len=36
3,398,855 >>> mbox cmd response data (8 bytes)
3,398,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,723 UART: [rt]cmd =0x44504543, len=96
3,609,350 >>> mbox cmd response data (6236 bytes)
3,609,351 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,292 UART: [rt]cmd =0x53574545, len=84
3,665,329 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
891,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,706 UART: [kat] ++
895,858 UART: [kat] sha1
900,062 UART: [kat] SHA2-256
902,002 UART: [kat] SHA2-384
904,731 UART: [kat] SHA2-512-ACC
906,632 UART: [kat] ECC-384
916,665 UART: [kat] HMAC-384Kdf
921,425 UART: [kat] LMS
1,169,737 UART: [kat] --
1,170,638 UART: [cold-reset] ++
1,171,208 UART: [fht] FHT @ 0x50003400
1,173,884 UART: [idev] ++
1,174,052 UART: [idev] CDI.KEYID = 6
1,174,413 UART: [idev] SUBJECT.KEYID = 7
1,174,838 UART: [idev] UDS.KEYID = 0
1,175,184 ready_for_fw is high
1,175,184 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,016 UART: [idev] Erasing UDS.KEYID = 0
1,199,740 UART: [idev] Sha1 KeyId Algorithm
1,208,558 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,075 UART: [ldev] SUBJECT.KEYID = 5
1,210,502 UART: [ldev] AUTHORITY.KEYID = 7
1,210,965 UART: [ldev] FE.KEYID = 1
1,216,499 UART: [ldev] Erasing FE.KEYID = 1
1,243,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,271 UART: [ldev] --
1,282,781 UART: [fwproc] Wait for Commands...
1,283,564 UART: [fwproc] Recv command 0x46574c44
1,284,297 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,396 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,246 >>> mbox cmd response: success
2,775,279 UART: [afmc] ++
2,775,447 UART: [afmc] CDI.KEYID = 6
2,775,810 UART: [afmc] SUBJECT.KEYID = 7
2,776,236 UART: [afmc] AUTHORITY.KEYID = 5
2,812,385 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,714 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,443 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,326 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,045 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,964 UART: [afmc] --
2,856,010 UART: [cold-reset] --
2,856,780 UART: [state] Locking Datavault
2,858,113 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,717 UART: [state] Locking ICCM
2,859,141 UART: [exit] Launching FMC @ 0x40000130
2,864,470 UART:
2,864,486 UART: Running Caliptra FMC ...
2,864,894 UART:
2,865,037 UART: [state] CFI Enabled
2,875,564 UART: [fht] FMC Alias Private Key: 7
2,983,425 UART: [art] Extend RT PCRs Done
2,983,853 UART: [art] Lock RT PCRs Done
2,985,143 UART: [art] Populate DV Done
2,993,234 UART: [fht] FMC Alias Private Key: 7
2,994,278 UART: [art] Derive CDI
2,994,558 UART: [art] Store in in slot 0x4
3,079,935 UART: [art] Derive Key Pair
3,080,295 UART: [art] Store priv key in slot 0x5
3,093,913 UART: [art] Derive Key Pair - Done
3,108,778 UART: [art] Signing Cert with AUTHO
3,109,258 UART: RITY.KEYID = 7
3,124,834 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,599 UART: [art] PUB.X = 0C54698CFD2F3F6BEF5DBB6CBDFB93A7983C6AE86423CE7169D9C12FD0FE31E5106CDB9CD49DA7D84C441F51A190AC55
3,132,390 UART: [art] PUB.Y = 82AC66C27554FE48FBCCA98152B6BBCFF960BD9BD8DDA0C2855047760DA5CCE84C6612E045444B5B69C95343DF10CB8C
3,139,353 UART: [art] SIG.R = 3471D1854789B893EF6CE881CF87AE241F1E1B8AE2C4987536E36097B77584BF4AB8474D6B587678BB779CE71579FEFF
3,146,125 UART: [art] SIG.S = BBEF683D4D62D08DA7012B149ABB0F5FB622DCFD833AA03E93D52488ED6EFD3AA50E2F416123C8B2511F27A9606FEDE1
3,170,331 UART: Caliptra RT
3,170,676 UART: [state] CFI Enabled
3,277,969 UART: [rt] RT listening for mailbox commands...
3,278,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,877 UART: [rt]cmd =0x44504543, len=96
3,489,402 >>> mbox cmd response data (6236 bytes)
3,489,403 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,230 UART: [rt]cmd =0x44504543, len=96
3,551,433 >>> mbox cmd response data (56 bytes)
3,551,434 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,965 UART: [rt]cmd =0x52564348, len=36
3,583,018 >>> mbox cmd response data (8 bytes)
3,583,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,808 UART: [rt]cmd =0x44504543, len=96
3,794,030 >>> mbox cmd response data (6236 bytes)
3,794,031 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,850 UART: [rt]cmd =0x53574545, len=84
3,849,183 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,247 ready_for_fw is high
1,056,247 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,978 >>> mbox cmd response: success
2,686,180 UART:
2,686,196 UART: Running Caliptra FMC ...
2,686,604 UART:
2,686,747 UART: [state] CFI Enabled
2,697,658 UART: [fht] FMC Alias Private Key: 7
2,805,541 UART: [art] Extend RT PCRs Done
2,805,969 UART: [art] Lock RT PCRs Done
2,807,749 UART: [art] Populate DV Done
2,815,934 UART: [fht] FMC Alias Private Key: 7
2,817,068 UART: [art] Derive CDI
2,817,348 UART: [art] Store in in slot 0x4
2,903,211 UART: [art] Derive Key Pair
2,903,571 UART: [art] Store priv key in slot 0x5
2,916,341 UART: [art] Derive Key Pair - Done
2,931,177 UART: [art] Signing Cert with AUTHO
2,931,657 UART: RITY.KEYID = 7
2,946,525 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,290 UART: [art] PUB.X = BB2CF571050D2FED42F54721142BC71547B115352B57C3B49612734831F98763631D415231998199866EE30542D9B999
2,954,031 UART: [art] PUB.Y = F63487B98D1267D989DEE84F190185D461D753670744DC5A972BB96712600F970D288DF9A00C94B978D3FF4E7B7E6972
2,960,960 UART: [art] SIG.R = 6794969755000F34E0034BB62A8DF83678321ADCD8E736F29B4528B421037D68D871C73098B9FEE0C914DB0CB1C0DB5C
2,967,696 UART: [art] SIG.S = 579F21BC0D4C24F5E7F1DE0D912A9CF0FD03F1C66A5E3CA04853FE991D58801B9A5C416D88147D70E585927F71D29C0D
2,991,431 UART: Caliptra RT
2,991,776 UART: [state] CFI Enabled
3,099,583 UART: [rt] RT listening for mailbox commands...
3,100,253 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,939 UART: [rt]cmd =0x44504543, len=96
3,311,813 >>> mbox cmd response data (6236 bytes)
3,311,814 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,715 UART: [rt]cmd =0x44504543, len=96
3,373,556 >>> mbox cmd response data (56 bytes)
3,373,557 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,016 UART: [rt]cmd =0x52564348, len=36
3,404,891 >>> mbox cmd response data (8 bytes)
3,404,892 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,753 UART: [rt]cmd =0x44504543, len=96
3,615,628 >>> mbox cmd response data (6236 bytes)
3,615,629 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,384 UART: [rt]cmd =0x53574545, len=84
3,671,423 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,774 UART: [state] LifecycleState = Unprovisioned
85,429 UART: [state] DebugLocked = No
86,077 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,569 UART: [kat] SHA2-256
881,500 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,615 UART: [kat] ++
885,767 UART: [kat] sha1
890,019 UART: [kat] SHA2-256
891,957 UART: [kat] SHA2-384
894,872 UART: [kat] SHA2-512-ACC
896,773 UART: [kat] ECC-384
902,272 UART: [kat] HMAC-384Kdf
906,878 UART: [kat] LMS
1,475,074 UART: [kat] --
1,475,949 UART: [cold-reset] ++
1,476,403 UART: [fht] Storing FHT @ 0x50003400
1,479,164 UART: [idev] ++
1,479,332 UART: [idev] CDI.KEYID = 6
1,479,692 UART: [idev] SUBJECT.KEYID = 7
1,480,116 UART: [idev] UDS.KEYID = 0
1,480,461 ready_for_fw is high
1,480,461 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,940 UART: [idev] Erasing UDS.KEYID = 0
1,504,724 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,368 UART: [idev] --
1,514,445 UART: [ldev] ++
1,514,613 UART: [ldev] CDI.KEYID = 6
1,514,976 UART: [ldev] SUBJECT.KEYID = 5
1,515,402 UART: [ldev] AUTHORITY.KEYID = 7
1,515,865 UART: [ldev] FE.KEYID = 1
1,521,065 UART: [ldev] Erasing FE.KEYID = 1
1,546,548 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,394 UART: [ldev] --
1,585,777 UART: [fwproc] Waiting for Commands...
1,586,420 UART: [fwproc] Received command 0x46574c44
1,587,211 UART: [fwproc] Received Image of size 114332 bytes
2,884,185 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,051 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,403 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,220 >>> mbox cmd response: success
3,077,292 UART: [afmc] ++
3,077,460 UART: [afmc] CDI.KEYID = 6
3,077,822 UART: [afmc] SUBJECT.KEYID = 7
3,078,247 UART: [afmc] AUTHORITY.KEYID = 5
3,113,820 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,946 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,726 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,454 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,339 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,029 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,956 UART: [afmc] --
3,156,868 UART: [cold-reset] --
3,157,532 UART: [state] Locking Datavault
3,158,847 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,451 UART: [state] Locking ICCM
3,159,889 UART: [exit] Launching FMC @ 0x40000130
3,165,218 UART:
3,165,234 UART: Running Caliptra FMC ...
3,165,642 UART:
3,165,696 UART: [state] CFI Enabled
3,176,487 UART: [fht] FMC Alias Private Key: 7
3,284,238 UART: [art] Extend RT PCRs Done
3,284,666 UART: [art] Lock RT PCRs Done
3,286,446 UART: [art] Populate DV Done
3,294,745 UART: [fht] FMC Alias Private Key: 7
3,295,927 UART: [art] Derive CDI
3,296,207 UART: [art] Store in in slot 0x4
3,381,352 UART: [art] Derive Key Pair
3,381,712 UART: [art] Store priv key in slot 0x5
3,394,074 UART: [art] Derive Key Pair - Done
3,408,752 UART: [art] Signing Cert with AUTHO
3,409,232 UART: RITY.KEYID = 7
3,424,458 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,223 UART: [art] PUB.X = AE3BFFDB91B29FAA83FDB198AAD846A4785CA817E46C96B1CB7A2123BAF4A29E20CDE7BA606D1800BA6A71E86E1FC72F
3,431,999 UART: [art] PUB.Y = 9A03A33140449DEEC80AF7928F98AA2232F78642E528BF89F012BB1F9A6609342DC75FCDE29D2BD131DD226F3713559A
3,438,944 UART: [art] SIG.R = 5FABBA50618FEB871277EAADB8F96307CA6BCE633DBB742AF8A83BB552399BE9C657EEEA4B1F3E437F59F337BF3CA738
3,445,735 UART: [art] SIG.S = D9EFE690B6B441C07CA984F4B3562009522DFC9CFB44475714E73C8D2CEE44CA975B091E2443F5098F060E915963EC15
3,468,743 UART: Caliptra RT
3,468,996 UART: [state] CFI Enabled
3,576,909 UART: [rt] RT listening for mailbox commands...
3,577,579 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,179 UART: [rt]cmd =0x44504543, len=96
3,788,137 >>> mbox cmd response data (6236 bytes)
3,788,138 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,818,067 UART: [rt]cmd =0x53574545, len=84
3,844,332 >>> mbox cmd response data (200 bytes)
3,844,333 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,874,218 UART: [rt]cmd =0x44504543, len=96
3,906,451 >>> mbox cmd response data (56 bytes)
3,906,452 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,279 UART: [rt]cmd =0x44504543, len=96
3,975,645 >>> mbox cmd response data (24 bytes)
3,975,646 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,005,479 UART: [rt]cmd =0x53574545, len=84
4,031,082 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,535 ready_for_fw is high
1,362,535 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,126 >>> mbox cmd response: success
2,989,114 UART:
2,989,130 UART: Running Caliptra FMC ...
2,989,538 UART:
2,989,592 UART: [state] CFI Enabled
2,999,993 UART: [fht] FMC Alias Private Key: 7
3,108,750 UART: [art] Extend RT PCRs Done
3,109,178 UART: [art] Lock RT PCRs Done
3,110,666 UART: [art] Populate DV Done
3,118,917 UART: [fht] FMC Alias Private Key: 7
3,119,899 UART: [art] Derive CDI
3,120,179 UART: [art] Store in in slot 0x4
3,205,736 UART: [art] Derive Key Pair
3,206,096 UART: [art] Store priv key in slot 0x5
3,219,442 UART: [art] Derive Key Pair - Done
3,233,971 UART: [art] Signing Cert with AUTHO
3,234,451 UART: RITY.KEYID = 7
3,249,607 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,372 UART: [art] PUB.X = 94C11D94D664AA528E847B41065ACAFCAAE5F7478D57A1623BEEAB378D6E85E147443B80AC10E3F728ADC1B8239DB199
3,257,151 UART: [art] PUB.Y = 5F2C7C0B7263D239B59D721C2386F12F09398CD652CE90E95E2E4F2403C0E658F906977BFBFEF02C0635E717170D7B1F
3,264,085 UART: [art] SIG.R = 4AAA9B095F810204B6C783BEE9AF9406B289714DBFC645B9B7D45AF49D9CEB9FB123BE926508B4C6FDE6296009766602
3,270,842 UART: [art] SIG.S = F4A96ED613EDCFC5A3BA3015967BDC9442AF7E5B3A5DA4FA58EE4619AD80B2DFFADD6C9D9C08E1D018CB9E6D9798F044
3,294,948 UART: Caliptra RT
3,295,201 UART: [state] CFI Enabled
3,404,012 UART: [rt] RT listening for mailbox commands...
3,404,682 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,176 UART: [rt]cmd =0x44504543, len=96
3,616,199 >>> mbox cmd response data (6236 bytes)
3,616,200 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,189 UART: [rt]cmd =0x53574545, len=84
3,671,732 >>> mbox cmd response data (200 bytes)
3,671,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,554 UART: [rt]cmd =0x44504543, len=96
3,732,883 >>> mbox cmd response data (56 bytes)
3,732,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,607 UART: [rt]cmd =0x44504543, len=96
3,801,939 >>> mbox cmd response data (24 bytes)
3,801,940 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,831,883 UART: [rt]cmd =0x53574545, len=84
3,857,146 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,933 UART: [state] LifecycleState = Unprovisioned
86,588 UART: [state] DebugLocked = No
87,160 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,884 UART: [kat] SHA2-256
882,815 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,930 UART: [kat] ++
887,082 UART: [kat] sha1
891,488 UART: [kat] SHA2-256
893,426 UART: [kat] SHA2-384
896,161 UART: [kat] SHA2-512-ACC
898,062 UART: [kat] ECC-384
903,505 UART: [kat] HMAC-384Kdf
908,291 UART: [kat] LMS
1,476,487 UART: [kat] --
1,477,366 UART: [cold-reset] ++
1,477,850 UART: [fht] Storing FHT @ 0x50003400
1,480,581 UART: [idev] ++
1,480,749 UART: [idev] CDI.KEYID = 6
1,481,109 UART: [idev] SUBJECT.KEYID = 7
1,481,533 UART: [idev] UDS.KEYID = 0
1,481,878 ready_for_fw is high
1,481,878 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,789 UART: [idev] Erasing UDS.KEYID = 0
1,506,501 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,125 UART: [idev] --
1,516,108 UART: [ldev] ++
1,516,276 UART: [ldev] CDI.KEYID = 6
1,516,639 UART: [ldev] SUBJECT.KEYID = 5
1,517,065 UART: [ldev] AUTHORITY.KEYID = 7
1,517,528 UART: [ldev] FE.KEYID = 1
1,522,548 UART: [ldev] Erasing FE.KEYID = 1
1,547,301 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,051 UART: [ldev] --
1,586,370 UART: [fwproc] Waiting for Commands...
1,587,077 UART: [fwproc] Received command 0x46574c44
1,587,868 UART: [fwproc] Received Image of size 114332 bytes
2,885,227 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,593 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,945 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,688 >>> mbox cmd response: success
3,078,710 UART: [afmc] ++
3,078,878 UART: [afmc] CDI.KEYID = 6
3,079,240 UART: [afmc] SUBJECT.KEYID = 7
3,079,665 UART: [afmc] AUTHORITY.KEYID = 5
3,115,136 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,456 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,236 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,964 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,849 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,539 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,248 UART: [afmc] --
3,158,220 UART: [cold-reset] --
3,159,100 UART: [state] Locking Datavault
3,160,459 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,063 UART: [state] Locking ICCM
3,161,625 UART: [exit] Launching FMC @ 0x40000130
3,166,954 UART:
3,166,970 UART: Running Caliptra FMC ...
3,167,378 UART:
3,167,521 UART: [state] CFI Enabled
3,178,088 UART: [fht] FMC Alias Private Key: 7
3,286,123 UART: [art] Extend RT PCRs Done
3,286,551 UART: [art] Lock RT PCRs Done
3,288,347 UART: [art] Populate DV Done
3,296,236 UART: [fht] FMC Alias Private Key: 7
3,297,164 UART: [art] Derive CDI
3,297,444 UART: [art] Store in in slot 0x4
3,383,407 UART: [art] Derive Key Pair
3,383,767 UART: [art] Store priv key in slot 0x5
3,397,105 UART: [art] Derive Key Pair - Done
3,411,618 UART: [art] Signing Cert with AUTHO
3,412,098 UART: RITY.KEYID = 7
3,427,346 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,111 UART: [art] PUB.X = E4BB9AEEAEB4868AF253D1975D31788F008EFAFD235DE45C00EA71153E21B5F5CD8099FF1402946C6784D8D7FF49B031
3,434,846 UART: [art] PUB.Y = 10075CA26460D41E681F44FD46EEF732C7267CC089276B436EBA0CBA1CDBC9812CEB48B6DBE56C067CE2A45BA24A70EA
3,441,805 UART: [art] SIG.R = 24EDFAC51F3F11AAD45B7DEEFD35B3D1D611E281BABF892329C9734454692479D3AD3666ADABACF875C7AA320D0ECC74
3,448,591 UART: [art] SIG.S = 102145A484AFDE473325A48C7036A48B5E85F0A70D668C1DDB41DFF3747B84A528A50F8B3D4CCDD483D50B8C02990494
3,472,455 UART: Caliptra RT
3,472,800 UART: [state] CFI Enabled
3,581,966 UART: [rt] RT listening for mailbox commands...
3,582,636 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,028 UART: [rt]cmd =0x44504543, len=96
3,794,227 >>> mbox cmd response data (6236 bytes)
3,794,228 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,917 UART: [rt]cmd =0x53574545, len=84
3,849,838 >>> mbox cmd response data (200 bytes)
3,849,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,686 UART: [rt]cmd =0x44504543, len=96
3,911,749 >>> mbox cmd response data (56 bytes)
3,911,750 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,641 UART: [rt]cmd =0x44504543, len=96
3,981,465 >>> mbox cmd response data (24 bytes)
3,981,466 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,011,275 UART: [rt]cmd =0x53574545, len=84
4,036,350 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,184 ready_for_fw is high
1,362,184 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,383 >>> mbox cmd response: success
2,988,687 UART:
2,988,703 UART: Running Caliptra FMC ...
2,989,111 UART:
2,989,254 UART: [state] CFI Enabled
3,000,017 UART: [fht] FMC Alias Private Key: 7
3,108,660 UART: [art] Extend RT PCRs Done
3,109,088 UART: [art] Lock RT PCRs Done
3,110,490 UART: [art] Populate DV Done
3,118,593 UART: [fht] FMC Alias Private Key: 7
3,119,521 UART: [art] Derive CDI
3,119,801 UART: [art] Store in in slot 0x4
3,205,178 UART: [art] Derive Key Pair
3,205,538 UART: [art] Store priv key in slot 0x5
3,219,100 UART: [art] Derive Key Pair - Done
3,233,905 UART: [art] Signing Cert with AUTHO
3,234,385 UART: RITY.KEYID = 7
3,249,985 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,750 UART: [art] PUB.X = D42581F2B69BC9EA6CA0B8FBA9027B6BDBE0633B50CEE0DC09A8795FB799F181F2FFEFB902836145988EA9B0A3CC9FCF
3,257,535 UART: [art] PUB.Y = F157D253244A00823385BF95C6B626FFAB31161472284FF02754E45249E518E41A1501FBF51AFA197714AC72FAB3AB55
3,264,458 UART: [art] SIG.R = D9A5A3228A5E9B4D5AA42298583816A9C3D8C813D206CA86FD424C1940035B80904C381EFD31FC8721AC5D27713722AC
3,271,222 UART: [art] SIG.S = 74586DDA675869062BBCB931B59F596524B437EC92452942992DF105E8124E70EFD4C2B6D5A67C9B44FFC342E82FB903
3,294,678 UART: Caliptra RT
3,295,023 UART: [state] CFI Enabled
3,403,570 UART: [rt] RT listening for mailbox commands...
3,404,240 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,794 UART: [rt]cmd =0x44504543, len=96
3,616,094 >>> mbox cmd response data (6236 bytes)
3,616,095 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,902 UART: [rt]cmd =0x53574545, len=84
3,670,941 >>> mbox cmd response data (200 bytes)
3,670,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,895 UART: [rt]cmd =0x44504543, len=96
3,732,758 >>> mbox cmd response data (56 bytes)
3,732,759 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,656 UART: [rt]cmd =0x44504543, len=96
3,802,234 >>> mbox cmd response data (24 bytes)
3,802,235 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,832,258 UART: [rt]cmd =0x53574545, len=84
3,857,779 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,207 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
893,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,239 UART: [kat] ++
897,391 UART: [kat] sha1
901,829 UART: [kat] SHA2-256
903,769 UART: [kat] SHA2-384
906,428 UART: [kat] SHA2-512-ACC
908,329 UART: [kat] ECC-384
917,846 UART: [kat] HMAC-384Kdf
922,520 UART: [kat] LMS
1,170,848 UART: [kat] --
1,171,603 UART: [cold-reset] ++
1,172,141 UART: [fht] FHT @ 0x50003400
1,174,720 UART: [idev] ++
1,174,888 UART: [idev] CDI.KEYID = 6
1,175,248 UART: [idev] SUBJECT.KEYID = 7
1,175,672 UART: [idev] UDS.KEYID = 0
1,176,017 ready_for_fw is high
1,176,017 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,760 UART: [idev] Erasing UDS.KEYID = 0
1,201,055 UART: [idev] Sha1 KeyId Algorithm
1,209,647 UART: [idev] --
1,210,587 UART: [ldev] ++
1,210,755 UART: [ldev] CDI.KEYID = 6
1,211,118 UART: [ldev] SUBJECT.KEYID = 5
1,211,544 UART: [ldev] AUTHORITY.KEYID = 7
1,212,007 UART: [ldev] FE.KEYID = 1
1,217,369 UART: [ldev] Erasing FE.KEYID = 1
1,243,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,529 UART: [ldev] --
1,282,952 UART: [fwproc] Wait for Commands...
1,283,532 UART: [fwproc] Recv command 0x46574c44
1,284,260 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,568 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,872 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,809 >>> mbox cmd response: success
2,774,033 UART: [afmc] ++
2,774,201 UART: [afmc] CDI.KEYID = 6
2,774,563 UART: [afmc] SUBJECT.KEYID = 7
2,774,988 UART: [afmc] AUTHORITY.KEYID = 5
2,810,197 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,760 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,508 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,236 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,121 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,840 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,792 UART: [afmc] --
2,853,826 UART: [cold-reset] --
2,854,746 UART: [state] Locking Datavault
2,855,851 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,455 UART: [state] Locking ICCM
2,857,045 UART: [exit] Launching FMC @ 0x40000130
2,862,374 UART:
2,862,390 UART: Running Caliptra FMC ...
2,862,798 UART:
2,862,852 UART: [state] CFI Enabled
2,872,797 UART: [fht] FMC Alias Private Key: 7
2,981,286 UART: [art] Extend RT PCRs Done
2,981,714 UART: [art] Lock RT PCRs Done
2,983,204 UART: [art] Populate DV Done
2,991,637 UART: [fht] FMC Alias Private Key: 7
2,992,707 UART: [art] Derive CDI
2,992,987 UART: [art] Store in in slot 0x4
3,078,254 UART: [art] Derive Key Pair
3,078,614 UART: [art] Store priv key in slot 0x5
3,092,192 UART: [art] Derive Key Pair - Done
3,106,958 UART: [art] Signing Cert with AUTHO
3,107,438 UART: RITY.KEYID = 7
3,122,222 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,987 UART: [art] PUB.X = D289E166C920E2DA7B9F2457B3CE6F2F7E35705E8019ED947344F92190411046E505AC9B2C2DDC8E33BF88827A66B518
3,129,754 UART: [art] PUB.Y = 2FE07EF6540C05A98B4D6CA5A801D1A78CC6C0C9786CE5C56DD6E4D0DF690846EF54F1A5402D37625758F57C6FD443B7
3,136,702 UART: [art] SIG.R = B827DB7F1BA173B91B4663BD69182BEA0FB1BB60295524B829803A135F7396A7ADA89486C7BC3EF15B9D97A292D0A45D
3,143,477 UART: [art] SIG.S = F29DB4B7D073C779AACDD2E8E526E7ADEB5A191D9B30A34C335AC28AA0072ACDB0FEFAB75ACFCF3A9AEE61432E5BFD19
3,166,663 UART: Caliptra RT
3,166,916 UART: [state] CFI Enabled
3,274,898 UART: [rt] RT listening for mailbox commands...
3,275,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,052 UART: [rt]cmd =0x44504543, len=96
3,486,630 >>> mbox cmd response data (6236 bytes)
3,486,631 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,692 UART: [rt]cmd =0x53574545, len=84
3,542,109 >>> mbox cmd response data (200 bytes)
3,542,110 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,147 UART: [rt]cmd =0x44504543, len=96
3,603,178 >>> mbox cmd response data (56 bytes)
3,603,179 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,182 UART: [rt]cmd =0x44504543, len=96
3,672,664 >>> mbox cmd response data (24 bytes)
3,672,665 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,448 UART: [rt]cmd =0x53574545, len=84
3,728,107 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,125 ready_for_fw is high
1,061,125 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,764 >>> mbox cmd response: success
2,690,374 UART:
2,690,390 UART: Running Caliptra FMC ...
2,690,798 UART:
2,690,852 UART: [state] CFI Enabled
2,701,599 UART: [fht] FMC Alias Private Key: 7
2,809,686 UART: [art] Extend RT PCRs Done
2,810,114 UART: [art] Lock RT PCRs Done
2,811,660 UART: [art] Populate DV Done
2,819,625 UART: [fht] FMC Alias Private Key: 7
2,820,781 UART: [art] Derive CDI
2,821,061 UART: [art] Store in in slot 0x4
2,906,504 UART: [art] Derive Key Pair
2,906,864 UART: [art] Store priv key in slot 0x5
2,919,918 UART: [art] Derive Key Pair - Done
2,934,794 UART: [art] Signing Cert with AUTHO
2,935,274 UART: RITY.KEYID = 7
2,950,116 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,881 UART: [art] PUB.X = 32A967A42DAAEE202F778ADC38879AAC6D2AF56E3BED2D5D6BB4C0E7B8C83B90EF94D72A6F3C4DC65D22DCF1574C4399
2,957,675 UART: [art] PUB.Y = E239CC4EA0E81674A2D295E3311E048C47B39506D091B7FFC989881D0D8398C7F8A82FDE04BC3E6B3528FA9352CE3260
2,964,617 UART: [art] SIG.R = 0C625A19E261FFEAD524591B3893888A3BD45ED697F3F41056F7C24B5D2267D1CEE4EF7917A264FD6372C15AB8C05C9C
2,971,392 UART: [art] SIG.S = A51B401A768D104D0AF8D7AD528D9D79AFF37403B76FF2F86B6ED7885584CDA27C3B6D35F6D1751FB9E980AA3EA949F6
2,995,637 UART: Caliptra RT
2,995,890 UART: [state] CFI Enabled
3,103,757 UART: [rt] RT listening for mailbox commands...
3,104,427 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,621 UART: [rt]cmd =0x44504543, len=96
3,315,703 >>> mbox cmd response data (6236 bytes)
3,315,704 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,643 UART: [rt]cmd =0x53574545, len=84
3,371,658 >>> mbox cmd response data (200 bytes)
3,371,659 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,496 UART: [rt]cmd =0x44504543, len=96
3,433,731 >>> mbox cmd response data (56 bytes)
3,433,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,463,691 UART: [rt]cmd =0x44504543, len=96
3,503,567 >>> mbox cmd response data (24 bytes)
3,503,568 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,413 UART: [rt]cmd =0x53574545, len=84
3,558,766 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,753 UART: [state] LifecycleState = Unprovisioned
86,408 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,247 UART: [kat] SHA2-256
893,897 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,022 UART: [kat] ++
898,174 UART: [kat] sha1
902,532 UART: [kat] SHA2-256
904,472 UART: [kat] SHA2-384
907,265 UART: [kat] SHA2-512-ACC
909,166 UART: [kat] ECC-384
919,181 UART: [kat] HMAC-384Kdf
923,801 UART: [kat] LMS
1,172,129 UART: [kat] --
1,172,844 UART: [cold-reset] ++
1,173,312 UART: [fht] FHT @ 0x50003400
1,175,835 UART: [idev] ++
1,176,003 UART: [idev] CDI.KEYID = 6
1,176,363 UART: [idev] SUBJECT.KEYID = 7
1,176,787 UART: [idev] UDS.KEYID = 0
1,177,132 ready_for_fw is high
1,177,132 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,891 UART: [idev] Erasing UDS.KEYID = 0
1,202,480 UART: [idev] Sha1 KeyId Algorithm
1,211,146 UART: [idev] --
1,211,980 UART: [ldev] ++
1,212,148 UART: [ldev] CDI.KEYID = 6
1,212,511 UART: [ldev] SUBJECT.KEYID = 5
1,212,937 UART: [ldev] AUTHORITY.KEYID = 7
1,213,400 UART: [ldev] FE.KEYID = 1
1,218,628 UART: [ldev] Erasing FE.KEYID = 1
1,244,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,986 UART: [ldev] --
1,284,379 UART: [fwproc] Wait for Commands...
1,285,027 UART: [fwproc] Recv command 0x46574c44
1,285,755 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,752 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,389 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,693 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,450 >>> mbox cmd response: success
2,776,660 UART: [afmc] ++
2,776,828 UART: [afmc] CDI.KEYID = 6
2,777,190 UART: [afmc] SUBJECT.KEYID = 7
2,777,615 UART: [afmc] AUTHORITY.KEYID = 5
2,812,942 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,807 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,555 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,283 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,168 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,887 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,845 UART: [afmc] --
2,856,913 UART: [cold-reset] --
2,857,777 UART: [state] Locking Datavault
2,859,192 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,796 UART: [state] Locking ICCM
2,860,378 UART: [exit] Launching FMC @ 0x40000130
2,865,707 UART:
2,865,723 UART: Running Caliptra FMC ...
2,866,131 UART:
2,866,274 UART: [state] CFI Enabled
2,876,981 UART: [fht] FMC Alias Private Key: 7
2,985,930 UART: [art] Extend RT PCRs Done
2,986,358 UART: [art] Lock RT PCRs Done
2,987,938 UART: [art] Populate DV Done
2,995,967 UART: [fht] FMC Alias Private Key: 7
2,997,021 UART: [art] Derive CDI
2,997,301 UART: [art] Store in in slot 0x4
3,083,022 UART: [art] Derive Key Pair
3,083,382 UART: [art] Store priv key in slot 0x5
3,097,002 UART: [art] Derive Key Pair - Done
3,111,861 UART: [art] Signing Cert with AUTHO
3,112,341 UART: RITY.KEYID = 7
3,127,447 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,212 UART: [art] PUB.X = DF313E198346FD4E8C57B1898C74CB4E7AA33EC6A97493B5C284BD103EE19C0CA79AB934ADF3EF1A32C152D52B2E7C72
3,134,995 UART: [art] PUB.Y = 0F836D9E0DF426AB4CC8F7BE93150E2A51427105DAA4ABF2E8B059E885CE48A9C222F02BE4A34D94E11053EA18880ED4
3,141,942 UART: [art] SIG.R = FE2603AE702EFCE33C080C95811578C1BE73E938DA3C237B4808EE7F6398FAE531A7FCA8F12352BAF24FDA4796662167
3,148,708 UART: [art] SIG.S = 24CA2FBA0A2EE704431E9C8A4EB25497501C01199A8E71C7C5CEE1CD4EEE0FB8AF28FFC4967C21D49AA6E6D225D9A8C6
3,172,805 UART: Caliptra RT
3,173,150 UART: [state] CFI Enabled
3,280,717 UART: [rt] RT listening for mailbox commands...
3,281,387 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,517 UART: [rt]cmd =0x44504543, len=96
3,492,615 >>> mbox cmd response data (6236 bytes)
3,492,616 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,757 UART: [rt]cmd =0x53574545, len=84
3,548,204 >>> mbox cmd response data (200 bytes)
3,548,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,328 UART: [rt]cmd =0x44504543, len=96
3,610,413 >>> mbox cmd response data (56 bytes)
3,610,414 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,477 UART: [rt]cmd =0x44504543, len=96
3,680,513 >>> mbox cmd response data (24 bytes)
3,680,514 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,661 UART: [rt]cmd =0x53574545, len=84
3,736,520 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,908 ready_for_fw is high
1,059,908 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,111 >>> mbox cmd response: success
2,688,215 UART:
2,688,231 UART: Running Caliptra FMC ...
2,688,639 UART:
2,688,782 UART: [state] CFI Enabled
2,699,143 UART: [fht] FMC Alias Private Key: 7
2,806,974 UART: [art] Extend RT PCRs Done
2,807,402 UART: [art] Lock RT PCRs Done
2,809,212 UART: [art] Populate DV Done
2,817,239 UART: [fht] FMC Alias Private Key: 7
2,818,229 UART: [art] Derive CDI
2,818,509 UART: [art] Store in in slot 0x4
2,904,582 UART: [art] Derive Key Pair
2,904,942 UART: [art] Store priv key in slot 0x5
2,918,360 UART: [art] Derive Key Pair - Done
2,933,296 UART: [art] Signing Cert with AUTHO
2,933,776 UART: RITY.KEYID = 7
2,948,976 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,741 UART: [art] PUB.X = B61A64A1232A64BEBBEEBE5F41DCA83AF46A5D29BDCB718C86682AB629EC84D80FEDD648CFB23305671E27BE9BF5FAD3
2,956,533 UART: [art] PUB.Y = 4A0FA21D401F88DB6449DCD5ED5479BBD12AAFA368DC0DD41EEEDD7DAD68CD85EDD7069976980D85618DD4C20BB2E932
2,963,492 UART: [art] SIG.R = 6F31CC2A36F0A27BBDB8037749D83ABF46790155337D888CCA1D46E3EA95A0C35272EBDB6FF74F6D226C4C36F11685DC
2,970,268 UART: [art] SIG.S = 7511A66C03F5631CB2DF8371309D3F7B66779E515D8A2D7FA347300E87FD75531A8545549AC792C6DB21B13A64D0002E
2,993,953 UART: Caliptra RT
2,994,298 UART: [state] CFI Enabled
3,101,415 UART: [rt] RT listening for mailbox commands...
3,102,085 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,471 UART: [rt]cmd =0x44504543, len=96
3,312,093 >>> mbox cmd response data (6236 bytes)
3,312,094 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,991 UART: [rt]cmd =0x53574545, len=84
3,367,486 >>> mbox cmd response data (200 bytes)
3,367,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,376 UART: [rt]cmd =0x44504543, len=96
3,430,307 >>> mbox cmd response data (56 bytes)
3,430,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,460,351 UART: [rt]cmd =0x44504543, len=96
3,500,493 >>> mbox cmd response data (24 bytes)
3,500,494 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,199 UART: [rt]cmd =0x53574545, len=84
3,556,024 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Unprovisioned
85,635 UART: [state] DebugLocked = No
86,131 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
891,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,157 UART: [kat] ++
895,309 UART: [kat] sha1
899,487 UART: [kat] SHA2-256
901,427 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
916,044 UART: [kat] HMAC-384Kdf
920,642 UART: [kat] LMS
1,168,954 UART: [kat] --
1,169,767 UART: [cold-reset] ++
1,170,347 UART: [fht] FHT @ 0x50003400
1,173,257 UART: [idev] ++
1,173,425 UART: [idev] CDI.KEYID = 6
1,173,786 UART: [idev] SUBJECT.KEYID = 7
1,174,211 UART: [idev] UDS.KEYID = 0
1,174,557 ready_for_fw is high
1,174,557 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,951 UART: [idev] Erasing UDS.KEYID = 0
1,198,979 UART: [idev] Sha1 KeyId Algorithm
1,207,831 UART: [idev] --
1,208,900 UART: [ldev] ++
1,209,068 UART: [ldev] CDI.KEYID = 6
1,209,432 UART: [ldev] SUBJECT.KEYID = 5
1,209,859 UART: [ldev] AUTHORITY.KEYID = 7
1,210,322 UART: [ldev] FE.KEYID = 1
1,215,578 UART: [ldev] Erasing FE.KEYID = 1
1,242,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,770 UART: [ldev] --
1,281,128 UART: [fwproc] Wait for Commands...
1,281,807 UART: [fwproc] Recv command 0x46574c44
1,282,540 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,212 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,521 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,465 >>> mbox cmd response: success
2,773,618 UART: [afmc] ++
2,773,786 UART: [afmc] CDI.KEYID = 6
2,774,149 UART: [afmc] SUBJECT.KEYID = 7
2,774,575 UART: [afmc] AUTHORITY.KEYID = 5
2,809,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,210 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,961 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,690 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,573 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,292 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,031 UART: [afmc] --
2,853,121 UART: [cold-reset] --
2,854,123 UART: [state] Locking Datavault
2,855,302 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,906 UART: [state] Locking ICCM
2,856,520 UART: [exit] Launching FMC @ 0x40000130
2,861,849 UART:
2,861,865 UART: Running Caliptra FMC ...
2,862,273 UART:
2,862,327 UART: [state] CFI Enabled
2,872,772 UART: [fht] FMC Alias Private Key: 7
2,980,843 UART: [art] Extend RT PCRs Done
2,981,271 UART: [art] Lock RT PCRs Done
2,982,733 UART: [art] Populate DV Done
2,990,860 UART: [fht] FMC Alias Private Key: 7
2,991,906 UART: [art] Derive CDI
2,992,186 UART: [art] Store in in slot 0x4
3,078,047 UART: [art] Derive Key Pair
3,078,407 UART: [art] Store priv key in slot 0x5
3,091,347 UART: [art] Derive Key Pair - Done
3,106,074 UART: [art] Signing Cert with AUTHO
3,106,554 UART: RITY.KEYID = 7
3,122,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,781 UART: [art] PUB.X = F0B3D61A82450BB905368219598E843BAF989E4A97DE67C610D3CAF0D76FFD988F7788A4F29AD87710D04954B3FD4FB3
3,129,551 UART: [art] PUB.Y = 1672B7FE30E6C66008D0364B1712E9BA7F7AA755E64D83CB6B7324BB2C72C627F28B6A88BB448D686B92B52D0F67D952
3,136,499 UART: [art] SIG.R = 27FB54D8F23A676640E17BF8F4A15FB96B411D97B543ECBFDA544BE2BA85FE6E4690CB009934BBD236795F80AB60E29F
3,143,261 UART: [art] SIG.S = 6C292DE11D04CE6779399D79CF77C2BBDA847BD0126D15E0334ECAC80BEE8CB8DF3471D73EF80634B52B4B19A790B367
3,166,973 UART: Caliptra RT
3,167,226 UART: [state] CFI Enabled
3,274,521 UART: [rt] RT listening for mailbox commands...
3,275,191 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,425 UART: [rt]cmd =0x44504543, len=96
3,486,866 >>> mbox cmd response data (6236 bytes)
3,486,867 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,866 UART: [rt]cmd =0x53574545, len=84
3,541,653 >>> mbox cmd response data (200 bytes)
3,541,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,571,497 UART: [rt]cmd =0x44504543, len=96
3,603,538 >>> mbox cmd response data (56 bytes)
3,603,539 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,464 UART: [rt]cmd =0x44504543, len=96
3,672,822 >>> mbox cmd response data (24 bytes)
3,672,823 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,532 UART: [rt]cmd =0x53574545, len=84
3,728,035 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,806 ready_for_fw is high
1,055,806 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,377 >>> mbox cmd response: success
2,685,071 UART:
2,685,087 UART: Running Caliptra FMC ...
2,685,495 UART:
2,685,549 UART: [state] CFI Enabled
2,695,800 UART: [fht] FMC Alias Private Key: 7
2,804,529 UART: [art] Extend RT PCRs Done
2,804,957 UART: [art] Lock RT PCRs Done
2,806,005 UART: [art] Populate DV Done
2,814,094 UART: [fht] FMC Alias Private Key: 7
2,815,198 UART: [art] Derive CDI
2,815,478 UART: [art] Store in in slot 0x4
2,901,431 UART: [art] Derive Key Pair
2,901,791 UART: [art] Store priv key in slot 0x5
2,914,539 UART: [art] Derive Key Pair - Done
2,929,299 UART: [art] Signing Cert with AUTHO
2,929,779 UART: RITY.KEYID = 7
2,944,883 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,648 UART: [art] PUB.X = C0AC28089CC54D919248B189A19AD0EBD03709FBF180AB619E2DA77E88884B04B8F31C96B180F1193A9418CC82399C71
2,952,411 UART: [art] PUB.Y = 2FE3B6EBD5293E285096074B8B35620D81C3E9B497822B80D16487553EFA4A5B657C669D10F6DEB5D09B30F469D6EA4E
2,959,359 UART: [art] SIG.R = BD600D96A20BC889B04362474FFA25DE6D43F0274FDA64E61745344B63048EED9EA20A52265C09A29B30EF379DD1AAF1
2,966,122 UART: [art] SIG.S = 2F98747E54106CB7A4CE5C58000ABD4812E2C1B98786A7C6A300086E0B4BCCA9509C4A5BD14E4B307B3FFBA78673C681
2,990,120 UART: Caliptra RT
2,990,373 UART: [state] CFI Enabled
3,098,792 UART: [rt] RT listening for mailbox commands...
3,099,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,874 UART: [rt]cmd =0x44504543, len=96
3,310,581 >>> mbox cmd response data (6236 bytes)
3,310,582 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,633 UART: [rt]cmd =0x53574545, len=84
3,365,684 >>> mbox cmd response data (200 bytes)
3,365,685 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,584 UART: [rt]cmd =0x44504543, len=96
3,427,023 >>> mbox cmd response data (56 bytes)
3,427,024 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,456,777 UART: [rt]cmd =0x44504543, len=96
3,495,835 >>> mbox cmd response data (24 bytes)
3,495,836 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,035 UART: [rt]cmd =0x53574545, len=84
3,551,636 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,610 UART: [kat] ++
895,762 UART: [kat] sha1
900,030 UART: [kat] SHA2-256
901,970 UART: [kat] SHA2-384
904,711 UART: [kat] SHA2-512-ACC
906,612 UART: [kat] ECC-384
916,523 UART: [kat] HMAC-384Kdf
921,113 UART: [kat] LMS
1,169,425 UART: [kat] --
1,170,308 UART: [cold-reset] ++
1,170,836 UART: [fht] FHT @ 0x50003400
1,173,602 UART: [idev] ++
1,173,770 UART: [idev] CDI.KEYID = 6
1,174,131 UART: [idev] SUBJECT.KEYID = 7
1,174,556 UART: [idev] UDS.KEYID = 0
1,174,902 ready_for_fw is high
1,174,902 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,500 UART: [idev] Erasing UDS.KEYID = 0
1,199,558 UART: [idev] Sha1 KeyId Algorithm
1,208,276 UART: [idev] --
1,209,481 UART: [ldev] ++
1,209,649 UART: [ldev] CDI.KEYID = 6
1,210,013 UART: [ldev] SUBJECT.KEYID = 5
1,210,440 UART: [ldev] AUTHORITY.KEYID = 7
1,210,903 UART: [ldev] FE.KEYID = 1
1,216,183 UART: [ldev] Erasing FE.KEYID = 1
1,242,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,267 UART: [ldev] --
1,281,537 UART: [fwproc] Wait for Commands...
1,282,192 UART: [fwproc] Recv command 0x46574c44
1,282,925 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,495 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,804 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,594 >>> mbox cmd response: success
2,773,675 UART: [afmc] ++
2,773,843 UART: [afmc] CDI.KEYID = 6
2,774,206 UART: [afmc] SUBJECT.KEYID = 7
2,774,632 UART: [afmc] AUTHORITY.KEYID = 5
2,810,237 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,819 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,570 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,299 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,182 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,901 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,640 UART: [afmc] --
2,853,764 UART: [cold-reset] --
2,854,446 UART: [state] Locking Datavault
2,855,521 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,125 UART: [state] Locking ICCM
2,856,745 UART: [exit] Launching FMC @ 0x40000130
2,862,074 UART:
2,862,090 UART: Running Caliptra FMC ...
2,862,498 UART:
2,862,641 UART: [state] CFI Enabled
2,873,146 UART: [fht] FMC Alias Private Key: 7
2,981,553 UART: [art] Extend RT PCRs Done
2,981,981 UART: [art] Lock RT PCRs Done
2,983,675 UART: [art] Populate DV Done
2,992,094 UART: [fht] FMC Alias Private Key: 7
2,993,246 UART: [art] Derive CDI
2,993,526 UART: [art] Store in in slot 0x4
3,079,583 UART: [art] Derive Key Pair
3,079,943 UART: [art] Store priv key in slot 0x5
3,093,353 UART: [art] Derive Key Pair - Done
3,108,039 UART: [art] Signing Cert with AUTHO
3,108,519 UART: RITY.KEYID = 7
3,123,913 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,678 UART: [art] PUB.X = CE4B2DCD567BE3F96AD2DB78C5654052A98AB6D69031570330C40C922294F3656F764B74A6FF821D8E2318243B8A554A
3,131,442 UART: [art] PUB.Y = C9FEC372B69BCE376E01496785D3CF674CA05EAC58BA495E7B776633D88F8EA447ADB06B2309171F46D2B4E08D4F7655
3,138,394 UART: [art] SIG.R = E3FE0DD5A2964A57BE4F24E198D951CF58856E8D563D811D657ABBC6F7C07B47E08660148491186F78DAC6641F3645CA
3,145,165 UART: [art] SIG.S = 815C71D6DC4CB5943E661349F3FD910CA2B228D85C6114E253E3DCCF0A8BAF90F755194FE21E87D4D1B196F01A304021
3,168,616 UART: Caliptra RT
3,168,961 UART: [state] CFI Enabled
3,276,419 UART: [rt] RT listening for mailbox commands...
3,277,089 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,443 UART: [rt]cmd =0x44504543, len=96
3,488,993 >>> mbox cmd response data (6236 bytes)
3,488,994 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,783 UART: [rt]cmd =0x53574545, len=84
3,544,488 >>> mbox cmd response data (200 bytes)
3,544,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,566 UART: [rt]cmd =0x44504543, len=96
3,606,727 >>> mbox cmd response data (56 bytes)
3,606,728 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,787 UART: [rt]cmd =0x44504543, len=96
3,677,275 >>> mbox cmd response data (24 bytes)
3,677,276 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,971 UART: [rt]cmd =0x53574545, len=84
3,733,364 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,739 ready_for_fw is high
1,055,739 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,496 >>> mbox cmd response: success
2,684,854 UART:
2,684,870 UART: Running Caliptra FMC ...
2,685,278 UART:
2,685,421 UART: [state] CFI Enabled
2,696,368 UART: [fht] FMC Alias Private Key: 7
2,804,337 UART: [art] Extend RT PCRs Done
2,804,765 UART: [art] Lock RT PCRs Done
2,806,387 UART: [art] Populate DV Done
2,814,456 UART: [fht] FMC Alias Private Key: 7
2,815,612 UART: [art] Derive CDI
2,815,892 UART: [art] Store in in slot 0x4
2,901,407 UART: [art] Derive Key Pair
2,901,767 UART: [art] Store priv key in slot 0x5
2,914,457 UART: [art] Derive Key Pair - Done
2,929,308 UART: [art] Signing Cert with AUTHO
2,929,788 UART: RITY.KEYID = 7
2,945,056 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,821 UART: [art] PUB.X = 6491D1A7C57D2FCB20D121CA39DCE97916314D696FDDBF5A7D89F11B35D523C71B0DDC1FCF793951AB66DA291E7DAC4E
2,952,608 UART: [art] PUB.Y = 7FA96904655EDF3C83A91A12583A62358C0EBB974A202880663B0C8198D4C4E5BB82D364D98C2318C570BFE9FBB139F5
2,959,551 UART: [art] SIG.R = 04EF9B66E221530C76036A6F777D7AA8D36B57EFCD1633FBAFD310E5BC0EEBA9EA5692992A2B65B06D51BB2FE7E8FDFD
2,966,333 UART: [art] SIG.S = DE45DA43B8863D6C11CEA9E1A4AA602BAE849446A763B0DCB9254E7BAEC2761F171E6FDAC0F50AD62252D736FD257146
2,990,009 UART: Caliptra RT
2,990,354 UART: [state] CFI Enabled
3,098,003 UART: [rt] RT listening for mailbox commands...
3,098,673 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,037 UART: [rt]cmd =0x44504543, len=96
3,309,741 >>> mbox cmd response data (6236 bytes)
3,309,742 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,767 UART: [rt]cmd =0x53574545, len=84
3,365,676 >>> mbox cmd response data (200 bytes)
3,365,677 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,658 UART: [rt]cmd =0x44504543, len=96
3,427,899 >>> mbox cmd response data (56 bytes)
3,427,900 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,457,975 UART: [rt]cmd =0x44504543, len=96
3,497,415 >>> mbox cmd response data (24 bytes)
3,497,416 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,041 UART: [rt]cmd =0x53574545, len=84
3,553,470 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,423 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,139 UART: [kat] SHA2-256
882,070 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,185 UART: [kat] ++
886,337 UART: [kat] sha1
890,553 UART: [kat] SHA2-256
892,491 UART: [kat] SHA2-384
895,174 UART: [kat] SHA2-512-ACC
897,075 UART: [kat] ECC-384
902,862 UART: [kat] HMAC-384Kdf
907,414 UART: [kat] LMS
1,475,610 UART: [kat] --
1,476,499 UART: [cold-reset] ++
1,476,973 UART: [fht] Storing FHT @ 0x50003400
1,479,708 UART: [idev] ++
1,479,876 UART: [idev] CDI.KEYID = 6
1,480,236 UART: [idev] SUBJECT.KEYID = 7
1,480,660 UART: [idev] UDS.KEYID = 0
1,481,005 ready_for_fw is high
1,481,005 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,644 UART: [idev] Erasing UDS.KEYID = 0
1,505,680 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,272 UART: [idev] --
1,515,445 UART: [ldev] ++
1,515,613 UART: [ldev] CDI.KEYID = 6
1,515,976 UART: [ldev] SUBJECT.KEYID = 5
1,516,402 UART: [ldev] AUTHORITY.KEYID = 7
1,516,865 UART: [ldev] FE.KEYID = 1
1,522,095 UART: [ldev] Erasing FE.KEYID = 1
1,547,590 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,092 UART: [ldev] --
1,586,547 UART: [fwproc] Waiting for Commands...
1,587,320 UART: [fwproc] Received command 0x46574c44
1,588,111 UART: [fwproc] Received Image of size 114332 bytes
2,885,017 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,731 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,083 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,940 >>> mbox cmd response: success
3,078,102 UART: [afmc] ++
3,078,270 UART: [afmc] CDI.KEYID = 6
3,078,632 UART: [afmc] SUBJECT.KEYID = 7
3,079,057 UART: [afmc] AUTHORITY.KEYID = 5
3,114,154 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,554 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,334 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,062 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,947 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,637 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,394 UART: [afmc] --
3,157,332 UART: [cold-reset] --
3,158,084 UART: [state] Locking Datavault
3,159,503 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,107 UART: [state] Locking ICCM
3,160,749 UART: [exit] Launching FMC @ 0x40000130
3,166,078 UART:
3,166,094 UART: Running Caliptra FMC ...
3,166,502 UART:
3,166,556 UART: [state] CFI Enabled
3,177,035 UART: [fht] FMC Alias Private Key: 7
3,285,318 UART: [art] Extend RT PCRs Done
3,285,746 UART: [art] Lock RT PCRs Done
3,287,412 UART: [art] Populate DV Done
3,295,349 UART: [fht] FMC Alias Private Key: 7
3,296,419 UART: [art] Derive CDI
3,296,699 UART: [art] Store in in slot 0x4
3,382,392 UART: [art] Derive Key Pair
3,382,752 UART: [art] Store priv key in slot 0x5
3,396,196 UART: [art] Derive Key Pair - Done
3,411,017 UART: [art] Signing Cert with AUTHO
3,411,497 UART: RITY.KEYID = 7
3,427,013 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,778 UART: [art] PUB.X = B5F4ECFA0CBDEF3CEC8D1A79854A2971225F86D107E0072E59FE48819CCB8A9CBC8578659ED376DBDC0098B18CCFFCDA
3,434,543 UART: [art] PUB.Y = 2A91D0E099D38B73D87E734B837E3AF169ADDDA3526A2E473610ED515FAC248DC8D410C928085B47138B5F5F595822D3
3,441,492 UART: [art] SIG.R = 24E773AE9A28C7ABEA001BA83E1A9A23A640AF065F0B4A013B48BA3E576823E6613169C1D1D8460C8C9E6574FF022F84
3,448,231 UART: [art] SIG.S = 47777C827C6B2F4C66AB56075EF12D90EB79236E79AE894406E108AB7678A00EB43884202433C2B8CFFCF9F3E0E88DFC
3,472,462 UART: Caliptra RT
3,472,715 UART: [state] CFI Enabled
3,580,407 UART: [rt] RT listening for mailbox commands...
3,581,077 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,837 UART: [rt]cmd =0x44504543, len=96
3,791,901 >>> mbox cmd response data (6236 bytes)
3,791,902 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,651 UART: [rt]cmd =0x53574545, len=84
3,824,696 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,663 ready_for_fw is high
1,362,663 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,036 >>> mbox cmd response: success
2,989,246 UART:
2,989,262 UART: Running Caliptra FMC ...
2,989,670 UART:
2,989,724 UART: [state] CFI Enabled
3,000,473 UART: [fht] FMC Alias Private Key: 7
3,108,612 UART: [art] Extend RT PCRs Done
3,109,040 UART: [art] Lock RT PCRs Done
3,110,726 UART: [art] Populate DV Done
3,119,195 UART: [fht] FMC Alias Private Key: 7
3,120,273 UART: [art] Derive CDI
3,120,553 UART: [art] Store in in slot 0x4
3,206,136 UART: [art] Derive Key Pair
3,206,496 UART: [art] Store priv key in slot 0x5
3,219,300 UART: [art] Derive Key Pair - Done
3,234,147 UART: [art] Signing Cert with AUTHO
3,234,627 UART: RITY.KEYID = 7
3,249,985 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,750 UART: [art] PUB.X = B0B0592F807F2720BBE426D70E583CD7FB970BC441C025557DE3A63BB4656D8842DEA1EAAEB839EA5908AE8AC8CB628E
3,257,527 UART: [art] PUB.Y = E1792DF122B60315D29685565AD2857B32F1C8C1909E46A2621E808240674C9F3D307336497BF062C1CB9E83D5D74B0A
3,264,463 UART: [art] SIG.R = 08B0A994141E894E9F1FFC0C025416465E4E2479C2B08A4A22F6C8AA779A0283AE2586D6E7835655EA34BDB814914AFF
3,271,223 UART: [art] SIG.S = 9FA855AFEA9039ED83E22EF30C1009C7782D445BE59E359211527645B09EC7034B6C8ED1C381D075C520241FE5F50792
3,295,228 UART: Caliptra RT
3,295,481 UART: [state] CFI Enabled
3,403,610 UART: [rt] RT listening for mailbox commands...
3,404,280 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,688 UART: [rt]cmd =0x44504543, len=96
3,615,042 >>> mbox cmd response data (6236 bytes)
3,615,043 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,888 UART: [rt]cmd =0x53574545, len=84
3,648,011 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,388 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,004 UART: [kat] SHA2-256
881,935 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,050 UART: [kat] ++
886,202 UART: [kat] sha1
890,478 UART: [kat] SHA2-256
892,416 UART: [kat] SHA2-384
895,141 UART: [kat] SHA2-512-ACC
897,042 UART: [kat] ECC-384
902,661 UART: [kat] HMAC-384Kdf
907,423 UART: [kat] LMS
1,475,619 UART: [kat] --
1,476,504 UART: [cold-reset] ++
1,476,880 UART: [fht] Storing FHT @ 0x50003400
1,479,889 UART: [idev] ++
1,480,057 UART: [idev] CDI.KEYID = 6
1,480,417 UART: [idev] SUBJECT.KEYID = 7
1,480,841 UART: [idev] UDS.KEYID = 0
1,481,186 ready_for_fw is high
1,481,186 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,605 UART: [idev] Erasing UDS.KEYID = 0
1,505,309 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,871 UART: [idev] --
1,514,942 UART: [ldev] ++
1,515,110 UART: [ldev] CDI.KEYID = 6
1,515,473 UART: [ldev] SUBJECT.KEYID = 5
1,515,899 UART: [ldev] AUTHORITY.KEYID = 7
1,516,362 UART: [ldev] FE.KEYID = 1
1,521,620 UART: [ldev] Erasing FE.KEYID = 1
1,547,265 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,353 UART: [ldev] --
1,586,628 UART: [fwproc] Waiting for Commands...
1,587,379 UART: [fwproc] Received command 0x46574c44
1,588,170 UART: [fwproc] Received Image of size 114332 bytes
2,885,420 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,260 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,612 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,475 >>> mbox cmd response: success
3,079,733 UART: [afmc] ++
3,079,901 UART: [afmc] CDI.KEYID = 6
3,080,263 UART: [afmc] SUBJECT.KEYID = 7
3,080,688 UART: [afmc] AUTHORITY.KEYID = 5
3,116,393 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,931 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,711 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,439 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,324 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,014 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,967 UART: [afmc] --
3,160,019 UART: [cold-reset] --
3,160,905 UART: [state] Locking Datavault
3,161,884 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,488 UART: [state] Locking ICCM
3,162,954 UART: [exit] Launching FMC @ 0x40000130
3,168,283 UART:
3,168,299 UART: Running Caliptra FMC ...
3,168,707 UART:
3,168,850 UART: [state] CFI Enabled
3,179,721 UART: [fht] FMC Alias Private Key: 7
3,287,948 UART: [art] Extend RT PCRs Done
3,288,376 UART: [art] Lock RT PCRs Done
3,289,676 UART: [art] Populate DV Done
3,298,031 UART: [fht] FMC Alias Private Key: 7
3,299,139 UART: [art] Derive CDI
3,299,419 UART: [art] Store in in slot 0x4
3,385,064 UART: [art] Derive Key Pair
3,385,424 UART: [art] Store priv key in slot 0x5
3,399,076 UART: [art] Derive Key Pair - Done
3,413,762 UART: [art] Signing Cert with AUTHO
3,414,242 UART: RITY.KEYID = 7
3,429,348 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,113 UART: [art] PUB.X = 0B862588375EAB4ADABCA4ACBB84C0F51F27C4CE02D44B4715B84B615C54E7621B7A2C853DC92C0D55EB16F8BDA723AD
3,436,894 UART: [art] PUB.Y = 1D92874513A0494E1725E9A42E329D1B703E523EFB2E61084399F3A4843BB9CCF85BBB927D8581C0925AB60C1A0FA8EB
3,443,839 UART: [art] SIG.R = DF4F19E7B0C1C6DD90A1F9F3FBF04E7304F4F3FB940FEC338B7BF66A9584280335F25C217FF9A25B182F901204230C11
3,450,602 UART: [art] SIG.S = 74E1FBB424AFDE970724B1C86655C9AD11A5BB41B278F6CC84876A644360C8423365B1D671D978309FFE4E663E8B1701
3,474,615 UART: Caliptra RT
3,474,960 UART: [state] CFI Enabled
3,584,365 UART: [rt] RT listening for mailbox commands...
3,585,035 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,501 UART: [rt]cmd =0x44504543, len=96
3,796,247 >>> mbox cmd response data (6236 bytes)
3,796,248 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,826,135 UART: [rt]cmd =0x53574545, len=84
3,829,096 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,946 ready_for_fw is high
1,363,946 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,825 >>> mbox cmd response: success
2,990,569 UART:
2,990,585 UART: Running Caliptra FMC ...
2,990,993 UART:
2,991,136 UART: [state] CFI Enabled
3,001,849 UART: [fht] FMC Alias Private Key: 7
3,109,720 UART: [art] Extend RT PCRs Done
3,110,148 UART: [art] Lock RT PCRs Done
3,111,432 UART: [art] Populate DV Done
3,119,669 UART: [fht] FMC Alias Private Key: 7
3,120,805 UART: [art] Derive CDI
3,121,085 UART: [art] Store in in slot 0x4
3,206,942 UART: [art] Derive Key Pair
3,207,302 UART: [art] Store priv key in slot 0x5
3,220,888 UART: [art] Derive Key Pair - Done
3,235,841 UART: [art] Signing Cert with AUTHO
3,236,321 UART: RITY.KEYID = 7
3,251,665 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,430 UART: [art] PUB.X = 2D425344367A14C1FA658D3C506D4230AD2EFD33BF00FD2730DDF042950FDF77882BAE5E8B33CEB562645A7FA76E5993
3,259,183 UART: [art] PUB.Y = 1C6BAFB61DD34812F402D6C79CA512E44E376BE7AF3C5212CE79F52622CC023D8A801DE83E13741E5DD14448F5689802
3,266,128 UART: [art] SIG.R = D391EFEE17D7BBAC3C09A6C7C06A3F6C3437D2A98BB682E90630ED7F629B898D402FDE0707DF2F206F4A4E2428A3ECE7
3,272,904 UART: [art] SIG.S = F0A38F7FF287EB04DF0E6C2FDE1BF06C93D3F6933DB80F3B429D38F76AEF322F42893CA1B4916D942A5DA111EA19FAB6
3,296,564 UART: Caliptra RT
3,296,909 UART: [state] CFI Enabled
3,405,045 UART: [rt] RT listening for mailbox commands...
3,405,715 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,289 UART: [rt]cmd =0x44504543, len=96
3,616,088 >>> mbox cmd response data (6236 bytes)
3,616,089 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,104 UART: [rt]cmd =0x53574545, len=84
3,649,313 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,806 UART: [state] LifecycleState = Unprovisioned
85,461 UART: [state] DebugLocked = No
86,113 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
893,094 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,219 UART: [kat] ++
897,371 UART: [kat] sha1
901,629 UART: [kat] SHA2-256
903,569 UART: [kat] SHA2-384
906,122 UART: [kat] SHA2-512-ACC
908,023 UART: [kat] ECC-384
917,446 UART: [kat] HMAC-384Kdf
921,838 UART: [kat] LMS
1,170,166 UART: [kat] --
1,170,899 UART: [cold-reset] ++
1,171,445 UART: [fht] FHT @ 0x50003400
1,174,086 UART: [idev] ++
1,174,254 UART: [idev] CDI.KEYID = 6
1,174,614 UART: [idev] SUBJECT.KEYID = 7
1,175,038 UART: [idev] UDS.KEYID = 0
1,175,383 ready_for_fw is high
1,175,383 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,212 UART: [idev] Erasing UDS.KEYID = 0
1,200,505 UART: [idev] Sha1 KeyId Algorithm
1,209,009 UART: [idev] --
1,209,983 UART: [ldev] ++
1,210,151 UART: [ldev] CDI.KEYID = 6
1,210,514 UART: [ldev] SUBJECT.KEYID = 5
1,210,940 UART: [ldev] AUTHORITY.KEYID = 7
1,211,403 UART: [ldev] FE.KEYID = 1
1,216,597 UART: [ldev] Erasing FE.KEYID = 1
1,242,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,407 UART: [ldev] --
1,281,888 UART: [fwproc] Wait for Commands...
1,282,506 UART: [fwproc] Recv command 0x46574c44
1,283,234 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,728 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,032 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,975 >>> mbox cmd response: success
2,774,999 UART: [afmc] ++
2,775,167 UART: [afmc] CDI.KEYID = 6
2,775,529 UART: [afmc] SUBJECT.KEYID = 7
2,775,954 UART: [afmc] AUTHORITY.KEYID = 5
2,811,351 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,862 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,610 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,338 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,223 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,942 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,692 UART: [afmc] --
2,854,726 UART: [cold-reset] --
2,855,776 UART: [state] Locking Datavault
2,857,157 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,761 UART: [state] Locking ICCM
2,858,263 UART: [exit] Launching FMC @ 0x40000130
2,863,592 UART:
2,863,608 UART: Running Caliptra FMC ...
2,864,016 UART:
2,864,070 UART: [state] CFI Enabled
2,874,667 UART: [fht] FMC Alias Private Key: 7
2,982,062 UART: [art] Extend RT PCRs Done
2,982,490 UART: [art] Lock RT PCRs Done
2,983,848 UART: [art] Populate DV Done
2,992,243 UART: [fht] FMC Alias Private Key: 7
2,993,173 UART: [art] Derive CDI
2,993,453 UART: [art] Store in in slot 0x4
3,078,950 UART: [art] Derive Key Pair
3,079,310 UART: [art] Store priv key in slot 0x5
3,092,526 UART: [art] Derive Key Pair - Done
3,107,406 UART: [art] Signing Cert with AUTHO
3,107,886 UART: RITY.KEYID = 7
3,122,950 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,715 UART: [art] PUB.X = 0E4EF341502C7C8BBD50FBFCA350D13973603B50C4B374C83DA9C4C95B9E7843F3DC06B15AAF131A9DED6AF47D546409
3,130,490 UART: [art] PUB.Y = 3306E6DF0BCE2B5178F6A0DD0A80DBA78BD5C7282A3067F34B60BFB52CDA3886609485B4D6F5591550FFBD8CE759C9CD
3,137,447 UART: [art] SIG.R = 8DB28D851DCF66B794782C9C1F08043CECF09BA1FF06D562446C4797F63F92CFCDE9EE7EA47DE362D1F8928B5327B96F
3,144,222 UART: [art] SIG.S = 0271A6BB47C84F3E7E78C4944801A2D229D4E580AB52FB300D5AADA68C4172C9844F984EE492AAD2C54724DD000E5DE8
3,168,787 UART: Caliptra RT
3,169,040 UART: [state] CFI Enabled
3,276,597 UART: [rt] RT listening for mailbox commands...
3,277,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,557 UART: [rt]cmd =0x44504543, len=96
3,487,317 >>> mbox cmd response data (6236 bytes)
3,487,318 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,267 UART: [rt]cmd =0x53574545, len=84
3,520,472 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,593 ready_for_fw is high
1,060,593 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,086 >>> mbox cmd response: success
2,686,650 UART:
2,686,666 UART: Running Caliptra FMC ...
2,687,074 UART:
2,687,128 UART: [state] CFI Enabled
2,697,849 UART: [fht] FMC Alias Private Key: 7
2,805,478 UART: [art] Extend RT PCRs Done
2,805,906 UART: [art] Lock RT PCRs Done
2,807,632 UART: [art] Populate DV Done
2,816,087 UART: [fht] FMC Alias Private Key: 7
2,817,055 UART: [art] Derive CDI
2,817,335 UART: [art] Store in in slot 0x4
2,902,936 UART: [art] Derive Key Pair
2,903,296 UART: [art] Store priv key in slot 0x5
2,916,728 UART: [art] Derive Key Pair - Done
2,931,409 UART: [art] Signing Cert with AUTHO
2,931,889 UART: RITY.KEYID = 7
2,947,369 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,134 UART: [art] PUB.X = 094AB830457436577AEE1207AB778D3C5874E040AD148A9DC3E1690B6D8F1193A178A5D138A7E3DE0A636ADB3B81597B
2,954,894 UART: [art] PUB.Y = 2DF748783C6614D7330E62CC73DE40F4C2E895A1BC9BBB69B06D73BEAD9181C6967530B991CC4AA57C6639BC2249F3F0
2,961,849 UART: [art] SIG.R = 1906E2E87C28963BEE191DBCC11A0E5436CE12BBC22639F11CF36F713FD07D4691C7EDC7DFFEFA3BA0B322043FF76274
2,968,626 UART: [art] SIG.S = 300114E6E9DA376B2E2E99F6BE82A31FBA7D41633E2ADF4097244AC2FE4701C6DE3D29FF143B5A6B027CE0F0A7D3E99C
2,992,020 UART: Caliptra RT
2,992,273 UART: [state] CFI Enabled
3,099,930 UART: [rt] RT listening for mailbox commands...
3,100,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,154 UART: [rt]cmd =0x44504543, len=96
3,310,962 >>> mbox cmd response data (6236 bytes)
3,310,963 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,918 UART: [rt]cmd =0x53574545, len=84
3,344,285 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,936 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [kat] SHA2-256
893,701 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,826 UART: [kat] ++
897,978 UART: [kat] sha1
902,442 UART: [kat] SHA2-256
904,382 UART: [kat] SHA2-384
907,291 UART: [kat] SHA2-512-ACC
909,192 UART: [kat] ECC-384
918,489 UART: [kat] HMAC-384Kdf
923,049 UART: [kat] LMS
1,171,377 UART: [kat] --
1,172,366 UART: [cold-reset] ++
1,172,924 UART: [fht] FHT @ 0x50003400
1,175,659 UART: [idev] ++
1,175,827 UART: [idev] CDI.KEYID = 6
1,176,187 UART: [idev] SUBJECT.KEYID = 7
1,176,611 UART: [idev] UDS.KEYID = 0
1,176,956 ready_for_fw is high
1,176,956 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,467 UART: [idev] Erasing UDS.KEYID = 0
1,201,700 UART: [idev] Sha1 KeyId Algorithm
1,210,344 UART: [idev] --
1,211,208 UART: [ldev] ++
1,211,376 UART: [ldev] CDI.KEYID = 6
1,211,739 UART: [ldev] SUBJECT.KEYID = 5
1,212,165 UART: [ldev] AUTHORITY.KEYID = 7
1,212,628 UART: [ldev] FE.KEYID = 1
1,217,830 UART: [ldev] Erasing FE.KEYID = 1
1,243,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,738 UART: [ldev] --
1,283,047 UART: [fwproc] Wait for Commands...
1,283,799 UART: [fwproc] Recv command 0x46574c44
1,284,527 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,513 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,817 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,542 >>> mbox cmd response: success
2,775,672 UART: [afmc] ++
2,775,840 UART: [afmc] CDI.KEYID = 6
2,776,202 UART: [afmc] SUBJECT.KEYID = 7
2,776,627 UART: [afmc] AUTHORITY.KEYID = 5
2,812,300 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,729 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,457 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,342 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,061 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,879 UART: [afmc] --
2,855,831 UART: [cold-reset] --
2,856,715 UART: [state] Locking Datavault
2,857,694 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,298 UART: [state] Locking ICCM
2,858,734 UART: [exit] Launching FMC @ 0x40000130
2,864,063 UART:
2,864,079 UART: Running Caliptra FMC ...
2,864,487 UART:
2,864,630 UART: [state] CFI Enabled
2,875,439 UART: [fht] FMC Alias Private Key: 7
2,982,792 UART: [art] Extend RT PCRs Done
2,983,220 UART: [art] Lock RT PCRs Done
2,984,580 UART: [art] Populate DV Done
2,993,037 UART: [fht] FMC Alias Private Key: 7
2,994,081 UART: [art] Derive CDI
2,994,361 UART: [art] Store in in slot 0x4
3,080,176 UART: [art] Derive Key Pair
3,080,536 UART: [art] Store priv key in slot 0x5
3,093,464 UART: [art] Derive Key Pair - Done
3,108,557 UART: [art] Signing Cert with AUTHO
3,109,037 UART: RITY.KEYID = 7
3,124,285 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,050 UART: [art] PUB.X = 71B4C90F321945D869F39CA053809F114DADA3A5DBABEF23BB3A24D807C29E1DFB181054D9A16CF20C8CE10DC6F655E4
3,131,824 UART: [art] PUB.Y = D3E57970C970AC4B0176118274468AC02782110B58F3A773A37D5D02870F2531B9B36019836150F19FA41D5B8FB0BBE7
3,138,754 UART: [art] SIG.R = 73EA477F79A4D6582D8E042E3288AAC286F18BCFB1C467CF448542DE919CA4920CB2C0DF9B745EA514AF3B56CA74DE3F
3,145,534 UART: [art] SIG.S = 3881CF9E111DC7C6AF01A3B387E24C565707493D1D6C377AA785F2BC430D31A1BC1ED68CD5357D43C0639FACC2A2B935
3,169,376 UART: Caliptra RT
3,169,721 UART: [state] CFI Enabled
3,277,034 UART: [rt] RT listening for mailbox commands...
3,277,704 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,188 UART: [rt]cmd =0x44504543, len=96
3,488,337 >>> mbox cmd response data (6236 bytes)
3,488,338 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,349 UART: [rt]cmd =0x53574545, len=84
3,521,430 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,514 ready_for_fw is high
1,060,514 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,599 >>> mbox cmd response: success
2,687,339 UART:
2,687,355 UART: Running Caliptra FMC ...
2,687,763 UART:
2,687,906 UART: [state] CFI Enabled
2,698,551 UART: [fht] FMC Alias Private Key: 7
2,806,550 UART: [art] Extend RT PCRs Done
2,806,978 UART: [art] Lock RT PCRs Done
2,808,398 UART: [art] Populate DV Done
2,816,865 UART: [fht] FMC Alias Private Key: 7
2,817,993 UART: [art] Derive CDI
2,818,273 UART: [art] Store in in slot 0x4
2,903,718 UART: [art] Derive Key Pair
2,904,078 UART: [art] Store priv key in slot 0x5
2,917,574 UART: [art] Derive Key Pair - Done
2,932,541 UART: [art] Signing Cert with AUTHO
2,933,021 UART: RITY.KEYID = 7
2,948,329 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,094 UART: [art] PUB.X = 01BB2D6EC1563703EDA502005E198CF78A7E58A43241C38B02457D7DBA1101D61932620A1A9EFB70F66359E198700465
2,955,815 UART: [art] PUB.Y = 38F12874BD12B8544EE7893399B42686077AF9886C810513EFF5953E7EEAC02D95FF039F6DEDFEF619F6DDB0116F5530
2,962,760 UART: [art] SIG.R = 68EC9330EE06DB9ED71FC27C42D447378022438659DDF087B59726BF6E18005EA02462EF108AFA80AC6FBE1278537348
2,969,505 UART: [art] SIG.S = 7DB19A33E9A69CDD98FD2D17F4001EF59B7C16EED88A678A8EFF11F79EF4512CB221F9353AAC3D14DBFDFF352BC58332
2,993,036 UART: Caliptra RT
2,993,381 UART: [state] CFI Enabled
3,101,778 UART: [rt] RT listening for mailbox commands...
3,102,448 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,094 UART: [rt]cmd =0x44504543, len=96
3,314,476 >>> mbox cmd response data (6236 bytes)
3,314,477 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,282 UART: [rt]cmd =0x53574545, len=84
3,347,677 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,337 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,533 UART: [kat] SHA2-256
901,473 UART: [kat] SHA2-384
904,218 UART: [kat] SHA2-512-ACC
906,119 UART: [kat] ECC-384
915,812 UART: [kat] HMAC-384Kdf
920,288 UART: [kat] LMS
1,168,600 UART: [kat] --
1,169,415 UART: [cold-reset] ++
1,169,947 UART: [fht] FHT @ 0x50003400
1,172,455 UART: [idev] ++
1,172,623 UART: [idev] CDI.KEYID = 6
1,172,984 UART: [idev] SUBJECT.KEYID = 7
1,173,409 UART: [idev] UDS.KEYID = 0
1,173,755 ready_for_fw is high
1,173,755 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,217 UART: [idev] Erasing UDS.KEYID = 0
1,197,831 UART: [idev] Sha1 KeyId Algorithm
1,206,709 UART: [idev] --
1,207,712 UART: [ldev] ++
1,207,880 UART: [ldev] CDI.KEYID = 6
1,208,244 UART: [ldev] SUBJECT.KEYID = 5
1,208,671 UART: [ldev] AUTHORITY.KEYID = 7
1,209,134 UART: [ldev] FE.KEYID = 1
1,214,516 UART: [ldev] Erasing FE.KEYID = 1
1,241,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,152 UART: [ldev] --
1,280,498 UART: [fwproc] Wait for Commands...
1,281,203 UART: [fwproc] Recv command 0x46574c44
1,281,936 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,040 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,349 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,083 >>> mbox cmd response: success
2,773,136 UART: [afmc] ++
2,773,304 UART: [afmc] CDI.KEYID = 6
2,773,667 UART: [afmc] SUBJECT.KEYID = 7
2,774,093 UART: [afmc] AUTHORITY.KEYID = 5
2,809,808 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,975 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,704 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,587 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,306 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,305 UART: [afmc] --
2,853,409 UART: [cold-reset] --
2,854,283 UART: [state] Locking Datavault
2,855,476 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,080 UART: [state] Locking ICCM
2,856,582 UART: [exit] Launching FMC @ 0x40000130
2,861,911 UART:
2,861,927 UART: Running Caliptra FMC ...
2,862,335 UART:
2,862,389 UART: [state] CFI Enabled
2,873,126 UART: [fht] FMC Alias Private Key: 7
2,981,445 UART: [art] Extend RT PCRs Done
2,981,873 UART: [art] Lock RT PCRs Done
2,983,281 UART: [art] Populate DV Done
2,991,480 UART: [fht] FMC Alias Private Key: 7
2,992,506 UART: [art] Derive CDI
2,992,786 UART: [art] Store in in slot 0x4
3,077,981 UART: [art] Derive Key Pair
3,078,341 UART: [art] Store priv key in slot 0x5
3,090,821 UART: [art] Derive Key Pair - Done
3,105,423 UART: [art] Signing Cert with AUTHO
3,105,903 UART: RITY.KEYID = 7
3,121,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,830 UART: [art] PUB.X = 1FAB5F39C134D58FEFE9DBC4ADC9B4EDB38046D7BCA8FB72B79D8ED02C88E9A1D036B705A8FAAAE56A98164E5692FBBC
3,128,629 UART: [art] PUB.Y = 33CEEC9A154AAD1EA983299EFA543F96A3D6DF08029E280EEBFF6599D0BB20E26A9702F572E3B64EC78B5285F9DEE56E
3,135,585 UART: [art] SIG.R = CA1BCBBD2216FC3E694E59050E099F257997D99A69333E7229E7C9CFD54D2A4F27D4EA76ACB791EC50269D9DC2886328
3,142,354 UART: [art] SIG.S = 3018225E636DF591CB892CD2662F2EC4455B7AABDA52F9D2E304EC77076C4D17C181CF0209907174F065EBA868183000
3,166,139 UART: Caliptra RT
3,166,392 UART: [state] CFI Enabled
3,274,053 UART: [rt] RT listening for mailbox commands...
3,274,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,873 UART: [rt]cmd =0x44504543, len=96
3,485,377 >>> mbox cmd response data (6236 bytes)
3,485,378 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,279 UART: [rt]cmd =0x53574545, len=84
3,518,250 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,626 ready_for_fw is high
1,055,626 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,069 >>> mbox cmd response: success
2,684,071 UART:
2,684,087 UART: Running Caliptra FMC ...
2,684,495 UART:
2,684,549 UART: [state] CFI Enabled
2,695,128 UART: [fht] FMC Alias Private Key: 7
2,803,119 UART: [art] Extend RT PCRs Done
2,803,547 UART: [art] Lock RT PCRs Done
2,804,517 UART: [art] Populate DV Done
2,812,896 UART: [fht] FMC Alias Private Key: 7
2,814,046 UART: [art] Derive CDI
2,814,326 UART: [art] Store in in slot 0x4
2,899,789 UART: [art] Derive Key Pair
2,900,149 UART: [art] Store priv key in slot 0x5
2,913,231 UART: [art] Derive Key Pair - Done
2,927,973 UART: [art] Signing Cert with AUTHO
2,928,453 UART: RITY.KEYID = 7
2,943,687 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,452 UART: [art] PUB.X = 7C6DC46FF55BCF9BE44AD220417EF27B15469CD929F60985BDF35AFA4181E6A604A8782F56DD7A24B2054D51A938D4FE
2,951,225 UART: [art] PUB.Y = 6449AB34C286195DA1ED9E95E6AA4560D4C77DCEE4A8275E4235A03117FAFF2A7C603BA63B257F0ED3EE5F2500E6B9E5
2,958,164 UART: [art] SIG.R = 2B2C77F26926165A104F44398667BD462B9D8E4D45BDCB47620046A8FB5F1571B2580E35BE62B17F6785D259DD9AE291
2,964,907 UART: [art] SIG.S = 38C96E5B674C9B3865DA482EC5B1B515FE7EC09AF1AE64A45D5CC674576F389E25A1738606111FC3B96724A66B1EBECC
2,988,287 UART: Caliptra RT
2,988,540 UART: [state] CFI Enabled
3,096,023 UART: [rt] RT listening for mailbox commands...
3,096,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,285 UART: [rt]cmd =0x44504543, len=96
3,306,809 >>> mbox cmd response data (6236 bytes)
3,306,810 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,851 UART: [rt]cmd =0x53574545, len=84
3,340,126 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,795 UART: [state] LifecycleState = Unprovisioned
86,450 UART: [state] DebugLocked = No
87,104 UART: [state] WD Timer not started. Device not locked for debugging
88,351 UART: [kat] SHA2-256
891,901 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,030 UART: [kat] ++
896,182 UART: [kat] sha1
900,482 UART: [kat] SHA2-256
902,422 UART: [kat] SHA2-384
905,141 UART: [kat] SHA2-512-ACC
907,042 UART: [kat] ECC-384
916,955 UART: [kat] HMAC-384Kdf
921,379 UART: [kat] LMS
1,169,691 UART: [kat] --
1,170,288 UART: [cold-reset] ++
1,170,768 UART: [fht] FHT @ 0x50003400
1,173,334 UART: [idev] ++
1,173,502 UART: [idev] CDI.KEYID = 6
1,173,863 UART: [idev] SUBJECT.KEYID = 7
1,174,288 UART: [idev] UDS.KEYID = 0
1,174,634 ready_for_fw is high
1,174,634 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,462 UART: [idev] Erasing UDS.KEYID = 0
1,199,476 UART: [idev] Sha1 KeyId Algorithm
1,208,416 UART: [idev] --
1,209,497 UART: [ldev] ++
1,209,665 UART: [ldev] CDI.KEYID = 6
1,210,029 UART: [ldev] SUBJECT.KEYID = 5
1,210,456 UART: [ldev] AUTHORITY.KEYID = 7
1,210,919 UART: [ldev] FE.KEYID = 1
1,216,061 UART: [ldev] Erasing FE.KEYID = 1
1,242,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,495 UART: [ldev] --
1,281,983 UART: [fwproc] Wait for Commands...
1,282,630 UART: [fwproc] Recv command 0x46574c44
1,283,363 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,473 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,782 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,666 >>> mbox cmd response: success
2,774,897 UART: [afmc] ++
2,775,065 UART: [afmc] CDI.KEYID = 6
2,775,428 UART: [afmc] SUBJECT.KEYID = 7
2,775,854 UART: [afmc] AUTHORITY.KEYID = 5
2,812,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,391 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,142 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,871 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,754 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,473 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,282 UART: [afmc] --
2,855,190 UART: [cold-reset] --
2,856,174 UART: [state] Locking Datavault
2,857,283 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,887 UART: [state] Locking ICCM
2,858,357 UART: [exit] Launching FMC @ 0x40000130
2,863,686 UART:
2,863,702 UART: Running Caliptra FMC ...
2,864,110 UART:
2,864,253 UART: [state] CFI Enabled
2,874,918 UART: [fht] FMC Alias Private Key: 7
2,982,991 UART: [art] Extend RT PCRs Done
2,983,419 UART: [art] Lock RT PCRs Done
2,985,133 UART: [art] Populate DV Done
2,993,518 UART: [fht] FMC Alias Private Key: 7
2,994,686 UART: [art] Derive CDI
2,994,966 UART: [art] Store in in slot 0x4
3,080,719 UART: [art] Derive Key Pair
3,081,079 UART: [art] Store priv key in slot 0x5
3,094,809 UART: [art] Derive Key Pair - Done
3,109,383 UART: [art] Signing Cert with AUTHO
3,109,863 UART: RITY.KEYID = 7
3,125,109 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,874 UART: [art] PUB.X = A5A37E9DBC1B0CAC8C8C286288F072DCF2DF0197A78F75EF62AD7EF415603A7A91CDD2E50CE407AC25BEB595371FAA9F
3,132,656 UART: [art] PUB.Y = EA933522021EB0ABBD2BB2017D6C92A9953656C983E335F3786448836ED486BE846FA6A5890AE50356F6F757A776A2ED
3,139,594 UART: [art] SIG.R = 20A7979F46B76EC4E014B89510CEF917D8CF8CF4174FCC859DA2804F9B4316854AB7BCCB0D60205CCB4041CD67CDA8A1
3,146,375 UART: [art] SIG.S = 0ED68C3A3DC39434788EEDF4CCD5CE241B0DDD036465E206C28FDE076284C72552DC8196A8210BA0B82CC18F931E8E3D
3,170,860 UART: Caliptra RT
3,171,205 UART: [state] CFI Enabled
3,277,902 UART: [rt] RT listening for mailbox commands...
3,278,572 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,884 UART: [rt]cmd =0x44504543, len=96
3,489,825 >>> mbox cmd response data (6236 bytes)
3,489,826 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,603 UART: [rt]cmd =0x53574545, len=84
3,522,302 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,295 ready_for_fw is high
1,057,295 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,206 >>> mbox cmd response: success
2,685,512 UART:
2,685,528 UART: Running Caliptra FMC ...
2,685,936 UART:
2,686,079 UART: [state] CFI Enabled
2,697,108 UART: [fht] FMC Alias Private Key: 7
2,804,847 UART: [art] Extend RT PCRs Done
2,805,275 UART: [art] Lock RT PCRs Done
2,806,951 UART: [art] Populate DV Done
2,815,074 UART: [fht] FMC Alias Private Key: 7
2,816,080 UART: [art] Derive CDI
2,816,360 UART: [art] Store in in slot 0x4
2,901,879 UART: [art] Derive Key Pair
2,902,239 UART: [art] Store priv key in slot 0x5
2,915,619 UART: [art] Derive Key Pair - Done
2,930,287 UART: [art] Signing Cert with AUTHO
2,930,767 UART: RITY.KEYID = 7
2,945,731 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,496 UART: [art] PUB.X = CBBC9D153F21C3D35B9F88F58E2FEE50ABE38904F2B078FC4EDE7307D54C38E0AE3B6DC5F230A9D5751D338DFFBB5736
2,953,282 UART: [art] PUB.Y = 77F0C0062CEA13FBC033808360B9610127A3E4046C5463297F52080B280E397549D10F7876839AD77322BEB1968D43D1
2,960,197 UART: [art] SIG.R = BC8F4B14C246F344D72894B739F0E7E44792C350E1D340D05720831F3DBBE0128AE712FBAD2D045105FB6628F42C2E59
2,966,963 UART: [art] SIG.S = E1348BAE0982C0490F6DBC9A4BCC8646F056785CEEBB33684B209B13A70051517FF833A8B9EB71C4BBB9238B23629B7A
2,990,590 UART: Caliptra RT
2,990,935 UART: [state] CFI Enabled
3,099,225 UART: [rt] RT listening for mailbox commands...
3,099,895 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,233 UART: [rt]cmd =0x44504543, len=96
3,310,301 >>> mbox cmd response data (6236 bytes)
3,310,302 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,117 UART: [rt]cmd =0x53574545, len=84
3,343,164 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,361 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,039 UART: [kat] SHA2-256
881,970 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,085 UART: [kat] ++
886,237 UART: [kat] sha1
890,483 UART: [kat] SHA2-256
892,421 UART: [kat] SHA2-384
895,306 UART: [kat] SHA2-512-ACC
897,207 UART: [kat] ECC-384
903,000 UART: [kat] HMAC-384Kdf
907,470 UART: [kat] LMS
1,475,666 UART: [kat] --
1,476,329 UART: [cold-reset] ++
1,476,769 UART: [fht] Storing FHT @ 0x50003400
1,479,392 UART: [idev] ++
1,479,560 UART: [idev] CDI.KEYID = 6
1,479,920 UART: [idev] SUBJECT.KEYID = 7
1,480,344 UART: [idev] UDS.KEYID = 0
1,480,689 ready_for_fw is high
1,480,689 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,232 UART: [idev] Erasing UDS.KEYID = 0
1,505,448 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,066 UART: [idev] --
1,515,167 UART: [ldev] ++
1,515,335 UART: [ldev] CDI.KEYID = 6
1,515,698 UART: [ldev] SUBJECT.KEYID = 5
1,516,124 UART: [ldev] AUTHORITY.KEYID = 7
1,516,587 UART: [ldev] FE.KEYID = 1
1,521,671 UART: [ldev] Erasing FE.KEYID = 1
1,547,188 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,224 UART: [ldev] --
1,586,603 UART: [fwproc] Waiting for Commands...
1,587,274 UART: [fwproc] Received command 0x46574c44
1,588,065 UART: [fwproc] Received Image of size 114332 bytes
2,886,667 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,109 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,461 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,270 >>> mbox cmd response: success
3,080,336 UART: [afmc] ++
3,080,504 UART: [afmc] CDI.KEYID = 6
3,080,866 UART: [afmc] SUBJECT.KEYID = 7
3,081,291 UART: [afmc] AUTHORITY.KEYID = 5
3,115,580 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,662 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,442 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,170 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,055 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,745 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,674 UART: [afmc] --
3,158,756 UART: [cold-reset] --
3,159,570 UART: [state] Locking Datavault
3,160,833 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,437 UART: [state] Locking ICCM
3,162,059 UART: [exit] Launching FMC @ 0x40000130
3,167,388 UART:
3,167,404 UART: Running Caliptra FMC ...
3,167,812 UART:
3,167,866 UART: [state] CFI Enabled
3,178,285 UART: [fht] FMC Alias Private Key: 7
3,286,370 UART: [art] Extend RT PCRs Done
3,286,798 UART: [art] Lock RT PCRs Done
3,288,462 UART: [art] Populate DV Done
3,296,809 UART: [fht] FMC Alias Private Key: 7
3,297,871 UART: [art] Derive CDI
3,298,151 UART: [art] Store in in slot 0x4
3,384,090 UART: [art] Derive Key Pair
3,384,450 UART: [art] Store priv key in slot 0x5
3,397,478 UART: [art] Derive Key Pair - Done
3,412,371 UART: [art] Signing Cert with AUTHO
3,412,851 UART: RITY.KEYID = 7
3,428,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,082 UART: [art] PUB.X = E6C1981B2DE19F3730EF387D0ABEDD11C572D24D28F4964E91E50DB6CB0FE2FDE89688F8C8FF9C8997BA224FB2657642
3,435,857 UART: [art] PUB.Y = 6181415E6ACF8BC91DE3899FC504594E02DEFA33BE77FFD066FDEA8A120C6752B399549A33C678A3BDF4D9B4A39B59D9
3,442,812 UART: [art] SIG.R = 93A9B26C5C61B4070BB07635CB9302F1C09EB02635FD04F791C8DFCA67932E41E743313981519D8A11D449BCC96FA192
3,449,570 UART: [art] SIG.S = 0A49835664CE083AFC616792183DF04DA3BDF96BE9CF86FC67E4FC27537E3764E905C06D9F327FBF2EA94E04B9B8C6E8
3,473,369 UART: Caliptra RT
3,473,622 UART: [state] CFI Enabled
3,581,505 UART: [rt] RT listening for mailbox commands...
3,582,175 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,659 UART: [rt]cmd =0x53574545, len=84
3,615,525 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,801 ready_for_fw is high
1,361,801 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,560 >>> mbox cmd response: success
2,988,370 UART:
2,988,386 UART: Running Caliptra FMC ...
2,988,794 UART:
2,988,848 UART: [state] CFI Enabled
2,999,297 UART: [fht] FMC Alias Private Key: 7
3,107,192 UART: [art] Extend RT PCRs Done
3,107,620 UART: [art] Lock RT PCRs Done
3,109,102 UART: [art] Populate DV Done
3,117,169 UART: [fht] FMC Alias Private Key: 7
3,118,341 UART: [art] Derive CDI
3,118,621 UART: [art] Store in in slot 0x4
3,204,152 UART: [art] Derive Key Pair
3,204,512 UART: [art] Store priv key in slot 0x5
3,218,078 UART: [art] Derive Key Pair - Done
3,232,691 UART: [art] Signing Cert with AUTHO
3,233,171 UART: RITY.KEYID = 7
3,248,247 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,012 UART: [art] PUB.X = 4691FC90E71B7D9F365BCD166AB554952718332E408BC49EA1486009523C3063A4356FA929AA16515760FF3F8B6C15DE
3,255,775 UART: [art] PUB.Y = 7BC68CDEE6E5AB73DE4D4A4677D69A2AAD0A27EA1A780C35EA8587EBE9765E07767B1734F2F51B701B6AEFD092402330
3,262,730 UART: [art] SIG.R = 6F1DB7E949D74C0513816A80724A92D48D55594D090574B3571C82B2000E33951BB9DDFB9858599E209F0431D4B85986
3,269,451 UART: [art] SIG.S = 6AAC34740EE865812FB78C6240BCD8E1EF3C1F6B8703AE6A43A86EAA674C7FE7C7EEF0804C8C33B1EABDC5E96769A365
3,292,846 UART: Caliptra RT
3,293,099 UART: [state] CFI Enabled
3,400,209 UART: [rt] RT listening for mailbox commands...
3,400,879 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,325 UART: [rt]cmd =0x53574545, len=84
3,434,513 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Unprovisioned
85,772 UART: [state] DebugLocked = No
86,508 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,136 UART: [kat] SHA2-256
882,067 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,182 UART: [kat] ++
886,334 UART: [kat] sha1
890,714 UART: [kat] SHA2-256
892,652 UART: [kat] SHA2-384
895,391 UART: [kat] SHA2-512-ACC
897,292 UART: [kat] ECC-384
903,243 UART: [kat] HMAC-384Kdf
907,789 UART: [kat] LMS
1,475,985 UART: [kat] --
1,476,812 UART: [cold-reset] ++
1,477,232 UART: [fht] Storing FHT @ 0x50003400
1,480,129 UART: [idev] ++
1,480,297 UART: [idev] CDI.KEYID = 6
1,480,657 UART: [idev] SUBJECT.KEYID = 7
1,481,081 UART: [idev] UDS.KEYID = 0
1,481,426 ready_for_fw is high
1,481,426 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,215 UART: [idev] Erasing UDS.KEYID = 0
1,505,997 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,745 UART: [idev] --
1,515,844 UART: [ldev] ++
1,516,012 UART: [ldev] CDI.KEYID = 6
1,516,375 UART: [ldev] SUBJECT.KEYID = 5
1,516,801 UART: [ldev] AUTHORITY.KEYID = 7
1,517,264 UART: [ldev] FE.KEYID = 1
1,522,472 UART: [ldev] Erasing FE.KEYID = 1
1,548,311 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,401 UART: [ldev] --
1,587,848 UART: [fwproc] Waiting for Commands...
1,588,573 UART: [fwproc] Received command 0x46574c44
1,589,364 UART: [fwproc] Received Image of size 114332 bytes
2,887,332 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,176 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,528 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,455 >>> mbox cmd response: success
3,080,489 UART: [afmc] ++
3,080,657 UART: [afmc] CDI.KEYID = 6
3,081,019 UART: [afmc] SUBJECT.KEYID = 7
3,081,444 UART: [afmc] AUTHORITY.KEYID = 5
3,117,087 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,391 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,171 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,899 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,784 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,474 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,469 UART: [afmc] --
3,160,501 UART: [cold-reset] --
3,161,493 UART: [state] Locking Datavault
3,162,478 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,082 UART: [state] Locking ICCM
3,163,706 UART: [exit] Launching FMC @ 0x40000130
3,169,035 UART:
3,169,051 UART: Running Caliptra FMC ...
3,169,459 UART:
3,169,602 UART: [state] CFI Enabled
3,180,169 UART: [fht] FMC Alias Private Key: 7
3,288,188 UART: [art] Extend RT PCRs Done
3,288,616 UART: [art] Lock RT PCRs Done
3,290,252 UART: [art] Populate DV Done
3,298,475 UART: [fht] FMC Alias Private Key: 7
3,299,655 UART: [art] Derive CDI
3,299,935 UART: [art] Store in in slot 0x4
3,385,520 UART: [art] Derive Key Pair
3,385,880 UART: [art] Store priv key in slot 0x5
3,399,582 UART: [art] Derive Key Pair - Done
3,414,365 UART: [art] Signing Cert with AUTHO
3,414,845 UART: RITY.KEYID = 7
3,429,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,408 UART: [art] PUB.X = E8AD2EE0865AE679CF5A165D1EE60DC2794B3E118CF0F3655F6B9C3060C0ADFC533785B5141193526BA426A6C9025F0B
3,437,177 UART: [art] PUB.Y = 1B35E18B421266A5AAE6A01C0DEA730FD0B4196A5719A7B2F683E26691ADB00E85CA6D618DAC6C255B850691561637CD
3,444,121 UART: [art] SIG.R = 9370FFC240BA98A2AB8F82B493D37D9C41D269C54D3B99C7A430E964F93F5112357CD6537C9510BD5C85BD7FE3C69CA0
3,450,899 UART: [art] SIG.S = 2636CBDF84750948D2FE357A3029E46799B820C83CAD924C39F133565A20832CEADDC54C77266131518FEE059AF459A7
3,474,502 UART: Caliptra RT
3,474,847 UART: [state] CFI Enabled
3,583,138 UART: [rt] RT listening for mailbox commands...
3,583,808 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,238 UART: [rt]cmd =0x53574545, len=84
3,617,548 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,830 ready_for_fw is high
1,363,830 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,285 >>> mbox cmd response: success
2,990,901 UART:
2,990,917 UART: Running Caliptra FMC ...
2,991,325 UART:
2,991,468 UART: [state] CFI Enabled
3,001,963 UART: [fht] FMC Alias Private Key: 7
3,109,134 UART: [art] Extend RT PCRs Done
3,109,562 UART: [art] Lock RT PCRs Done
3,111,152 UART: [art] Populate DV Done
3,119,491 UART: [fht] FMC Alias Private Key: 7
3,120,429 UART: [art] Derive CDI
3,120,709 UART: [art] Store in in slot 0x4
3,206,718 UART: [art] Derive Key Pair
3,207,078 UART: [art] Store priv key in slot 0x5
3,220,856 UART: [art] Derive Key Pair - Done
3,235,416 UART: [art] Signing Cert with AUTHO
3,235,896 UART: RITY.KEYID = 7
3,251,402 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,167 UART: [art] PUB.X = 8B675260BAD93E18E5F096C7748DE747FD89CB787A6937283C18E4A4461CF47E5F8570E7592D003D062A5B9C0746592B
3,258,905 UART: [art] PUB.Y = 79DB38476E1CFA8FFC5244CD9246F609B0693BE7A34489A08010F0D5CCF34348FCE3C3DC6C6DC82125F7498C40D4F69B
3,265,862 UART: [art] SIG.R = 3B65BCB27BDD209E6BC8746BF30810377CC13682E1246A2B9C697D30C5B4AAC18F349D286392B16EB2FF18E597C48586
3,272,633 UART: [art] SIG.S = 3DFF00A4E9605336E915B6A4E6C97CD5224835A9D058A12B3B9B983AD6D81B8223C037264C5A4CEB68DDFC3BDD409411
3,296,610 UART: Caliptra RT
3,296,955 UART: [state] CFI Enabled
3,405,741 UART: [rt] RT listening for mailbox commands...
3,406,411 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,519 UART: [rt]cmd =0x53574545, len=84
3,439,699 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,661 UART: [state] WD Timer not started. Device not locked for debugging
87,814 UART: [kat] SHA2-256
893,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,589 UART: [kat] ++
897,741 UART: [kat] sha1
901,985 UART: [kat] SHA2-256
903,925 UART: [kat] SHA2-384
906,696 UART: [kat] SHA2-512-ACC
908,597 UART: [kat] ECC-384
917,920 UART: [kat] HMAC-384Kdf
922,402 UART: [kat] LMS
1,170,730 UART: [kat] --
1,171,779 UART: [cold-reset] ++
1,172,257 UART: [fht] FHT @ 0x50003400
1,174,814 UART: [idev] ++
1,174,982 UART: [idev] CDI.KEYID = 6
1,175,342 UART: [idev] SUBJECT.KEYID = 7
1,175,766 UART: [idev] UDS.KEYID = 0
1,176,111 ready_for_fw is high
1,176,111 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,614 UART: [idev] Erasing UDS.KEYID = 0
1,200,245 UART: [idev] Sha1 KeyId Algorithm
1,208,721 UART: [idev] --
1,209,831 UART: [ldev] ++
1,209,999 UART: [ldev] CDI.KEYID = 6
1,210,362 UART: [ldev] SUBJECT.KEYID = 5
1,210,788 UART: [ldev] AUTHORITY.KEYID = 7
1,211,251 UART: [ldev] FE.KEYID = 1
1,216,733 UART: [ldev] Erasing FE.KEYID = 1
1,243,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,905 UART: [ldev] --
1,283,184 UART: [fwproc] Wait for Commands...
1,283,924 UART: [fwproc] Recv command 0x46574c44
1,284,652 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,978 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,282 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,199 >>> mbox cmd response: success
2,776,433 UART: [afmc] ++
2,776,601 UART: [afmc] CDI.KEYID = 6
2,776,963 UART: [afmc] SUBJECT.KEYID = 7
2,777,388 UART: [afmc] AUTHORITY.KEYID = 5
2,813,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,934 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,682 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,410 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,295 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,014 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,692 UART: [afmc] --
2,856,584 UART: [cold-reset] --
2,857,322 UART: [state] Locking Datavault
2,858,463 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,067 UART: [state] Locking ICCM
2,859,519 UART: [exit] Launching FMC @ 0x40000130
2,864,848 UART:
2,864,864 UART: Running Caliptra FMC ...
2,865,272 UART:
2,865,326 UART: [state] CFI Enabled
2,876,037 UART: [fht] FMC Alias Private Key: 7
2,983,544 UART: [art] Extend RT PCRs Done
2,983,972 UART: [art] Lock RT PCRs Done
2,985,330 UART: [art] Populate DV Done
2,993,687 UART: [fht] FMC Alias Private Key: 7
2,994,713 UART: [art] Derive CDI
2,994,993 UART: [art] Store in in slot 0x4
3,080,516 UART: [art] Derive Key Pair
3,080,876 UART: [art] Store priv key in slot 0x5
3,093,978 UART: [art] Derive Key Pair - Done
3,108,811 UART: [art] Signing Cert with AUTHO
3,109,291 UART: RITY.KEYID = 7
3,124,061 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,826 UART: [art] PUB.X = 3C1D4098846CB990993CE53873943D3B3B39463B0F9A8F6E93129B07B661FF98D45BA20E42C0228DF9D5F8FF7CBF8B9F
3,131,593 UART: [art] PUB.Y = 7DEFC2D475D3529929DF28D9F3E686437DB597EFF830EAF1E2C8FE6CF395EA4145E90C329EC8C9F74AD15B5217FE3CDF
3,138,560 UART: [art] SIG.R = 6C9F7E0275813CDDA20BC9A9F358CB193B24A447E4203F81DFDE2503B836D13DDF412E51EBC869F4FCCA2D39F4203330
3,145,333 UART: [art] SIG.S = 6B25B3C4AAA82D0C61342D7EAD9A48075E9C8D4E9C14DD05AD931C39A3A508AD3E8BDDBAC3CADE342BE3F83E5D608B54
3,168,396 UART: Caliptra RT
3,168,649 UART: [state] CFI Enabled
3,275,854 UART: [rt] RT listening for mailbox commands...
3,276,524 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,826 UART: [rt]cmd =0x53574545, len=84
3,309,560 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,953 ready_for_fw is high
1,059,953 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,014 >>> mbox cmd response: success
2,687,230 UART:
2,687,246 UART: Running Caliptra FMC ...
2,687,654 UART:
2,687,708 UART: [state] CFI Enabled
2,697,971 UART: [fht] FMC Alias Private Key: 7
2,805,734 UART: [art] Extend RT PCRs Done
2,806,162 UART: [art] Lock RT PCRs Done
2,807,900 UART: [art] Populate DV Done
2,816,253 UART: [fht] FMC Alias Private Key: 7
2,817,433 UART: [art] Derive CDI
2,817,713 UART: [art] Store in in slot 0x4
2,903,536 UART: [art] Derive Key Pair
2,903,896 UART: [art] Store priv key in slot 0x5
2,917,260 UART: [art] Derive Key Pair - Done
2,932,355 UART: [art] Signing Cert with AUTHO
2,932,835 UART: RITY.KEYID = 7
2,948,243 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,008 UART: [art] PUB.X = 6456E2744A9310581021F4A3AAE0D335945D0841F523D12150941E775F4DB5FB64F31A111CBFF73F92D093A569ECCE15
2,955,773 UART: [art] PUB.Y = DD05DA2BBD5F7F365EF863FD3540075834FB1743CEFF4958E9D651C13E6E131FC252A523AFB3EB2AA29C6B634ED8FD55
2,962,735 UART: [art] SIG.R = C09FAD2931BDDF3008135918292C80CE92348B06B843ABA78EEC364E413F2CC0612D93FE13D300DBAC3111660BC35F19
2,969,480 UART: [art] SIG.S = 9F78A7DE65D124350C249FAB210FA51866A6F3EE91BE4226156985F9C3124BBAD49E8BF0364230C92944CB241401E21E
2,993,404 UART: Caliptra RT
2,993,657 UART: [state] CFI Enabled
3,103,109 UART: [rt] RT listening for mailbox commands...
3,103,779 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,185 UART: [rt]cmd =0x53574545, len=84
3,137,063 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
893,697 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,822 UART: [kat] ++
897,974 UART: [kat] sha1
902,212 UART: [kat] SHA2-256
904,152 UART: [kat] SHA2-384
906,913 UART: [kat] SHA2-512-ACC
908,814 UART: [kat] ECC-384
918,931 UART: [kat] HMAC-384Kdf
923,545 UART: [kat] LMS
1,171,873 UART: [kat] --
1,172,576 UART: [cold-reset] ++
1,173,016 UART: [fht] FHT @ 0x50003400
1,175,693 UART: [idev] ++
1,175,861 UART: [idev] CDI.KEYID = 6
1,176,221 UART: [idev] SUBJECT.KEYID = 7
1,176,645 UART: [idev] UDS.KEYID = 0
1,176,990 ready_for_fw is high
1,176,990 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,929 UART: [idev] Erasing UDS.KEYID = 0
1,202,286 UART: [idev] Sha1 KeyId Algorithm
1,210,670 UART: [idev] --
1,211,662 UART: [ldev] ++
1,211,830 UART: [ldev] CDI.KEYID = 6
1,212,193 UART: [ldev] SUBJECT.KEYID = 5
1,212,619 UART: [ldev] AUTHORITY.KEYID = 7
1,213,082 UART: [ldev] FE.KEYID = 1
1,218,462 UART: [ldev] Erasing FE.KEYID = 1
1,244,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,926 UART: [ldev] --
1,284,395 UART: [fwproc] Wait for Commands...
1,285,183 UART: [fwproc] Recv command 0x46574c44
1,285,911 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,879 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,183 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,890 >>> mbox cmd response: success
2,778,022 UART: [afmc] ++
2,778,190 UART: [afmc] CDI.KEYID = 6
2,778,552 UART: [afmc] SUBJECT.KEYID = 7
2,778,977 UART: [afmc] AUTHORITY.KEYID = 5
2,815,020 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,259 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,007 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,735 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,620 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,339 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,381 UART: [afmc] --
2,858,373 UART: [cold-reset] --
2,859,361 UART: [state] Locking Datavault
2,860,460 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,064 UART: [state] Locking ICCM
2,861,578 UART: [exit] Launching FMC @ 0x40000130
2,866,907 UART:
2,866,923 UART: Running Caliptra FMC ...
2,867,331 UART:
2,867,474 UART: [state] CFI Enabled
2,878,269 UART: [fht] FMC Alias Private Key: 7
2,986,096 UART: [art] Extend RT PCRs Done
2,986,524 UART: [art] Lock RT PCRs Done
2,987,828 UART: [art] Populate DV Done
2,996,001 UART: [fht] FMC Alias Private Key: 7
2,997,157 UART: [art] Derive CDI
2,997,437 UART: [art] Store in in slot 0x4
3,083,318 UART: [art] Derive Key Pair
3,083,678 UART: [art] Store priv key in slot 0x5
3,097,210 UART: [art] Derive Key Pair - Done
3,112,045 UART: [art] Signing Cert with AUTHO
3,112,525 UART: RITY.KEYID = 7
3,127,871 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,636 UART: [art] PUB.X = 6A582F70F03972C50C54053BB2F44AF52E38776D888A390DDABACFB9F3B7D2E6770DFED1605B05B879E1B74AD2200D24
3,135,398 UART: [art] PUB.Y = C8F8D84AEBC9FA213067BF7EC348E8AB3F90721FCBC9395CE3158688148FC4FD165A4E027A089097C6986CF8A9897F8D
3,142,352 UART: [art] SIG.R = 1F6EF1C8BC552C46713466F01311E01C142EE6AC940A9FE9D52B555F42E7661CF112D4A365E05B99C3E8F10A8889C7BB
3,149,122 UART: [art] SIG.S = F0BDE3E528F07CD259FFE15065B3E8560E1896E4374E0AF4287AB4C0E1DEAB55DD5D7B2F4D78C984F17B83187A2030AC
3,172,603 UART: Caliptra RT
3,172,948 UART: [state] CFI Enabled
3,280,401 UART: [rt] RT listening for mailbox commands...
3,281,071 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,509 UART: [rt]cmd =0x53574545, len=84
3,314,579 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,110 ready_for_fw is high
1,061,110 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,671 >>> mbox cmd response: success
2,688,177 UART:
2,688,193 UART: Running Caliptra FMC ...
2,688,601 UART:
2,688,744 UART: [state] CFI Enabled
2,699,183 UART: [fht] FMC Alias Private Key: 7
2,806,674 UART: [art] Extend RT PCRs Done
2,807,102 UART: [art] Lock RT PCRs Done
2,808,120 UART: [art] Populate DV Done
2,816,283 UART: [fht] FMC Alias Private Key: 7
2,817,343 UART: [art] Derive CDI
2,817,623 UART: [art] Store in in slot 0x4
2,903,474 UART: [art] Derive Key Pair
2,903,834 UART: [art] Store priv key in slot 0x5
2,917,510 UART: [art] Derive Key Pair - Done
2,932,262 UART: [art] Signing Cert with AUTHO
2,932,742 UART: RITY.KEYID = 7
2,948,390 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,155 UART: [art] PUB.X = 017373866EFA0EA01D3ECC3599626AA8ADACB515D9EA5EB55B4D7BD34DA8E58CABF35E1CB0AD20D2277B87A998BDFAE8
2,955,947 UART: [art] PUB.Y = 789A5D92B586EAF213A368CB11622C12CDE216BF878CCA1F6AECB3D8415465006156AE16E2F4E31333B4122ADB1EA018
2,962,883 UART: [art] SIG.R = 8F7C2D9FA296ACC759F470D46038121AB25539F7F56971CAE3636C45CBE2613469A532C37CCAAC5D89C5E00D8D55862A
2,969,656 UART: [art] SIG.S = A4DB32207A10360AF23AB67DC93E037AAE98A36523E6DB6D13AD7717D53D4B4A1BC249CBD32C3D541A9919ACEB2E5A3D
2,994,145 UART: Caliptra RT
2,994,490 UART: [state] CFI Enabled
3,101,490 UART: [rt] RT listening for mailbox commands...
3,102,160 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,172 UART: [rt]cmd =0x53574545, len=84
3,135,252 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,143 UART: [kat] ++
895,295 UART: [kat] sha1
899,463 UART: [kat] SHA2-256
901,403 UART: [kat] SHA2-384
903,976 UART: [kat] SHA2-512-ACC
905,877 UART: [kat] ECC-384
915,242 UART: [kat] HMAC-384Kdf
919,952 UART: [kat] LMS
1,168,264 UART: [kat] --
1,168,947 UART: [cold-reset] ++
1,169,325 UART: [fht] FHT @ 0x50003400
1,171,861 UART: [idev] ++
1,172,029 UART: [idev] CDI.KEYID = 6
1,172,390 UART: [idev] SUBJECT.KEYID = 7
1,172,815 UART: [idev] UDS.KEYID = 0
1,173,161 ready_for_fw is high
1,173,161 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,043 UART: [idev] Erasing UDS.KEYID = 0
1,198,115 UART: [idev] Sha1 KeyId Algorithm
1,206,953 UART: [idev] --
1,208,140 UART: [ldev] ++
1,208,308 UART: [ldev] CDI.KEYID = 6
1,208,672 UART: [ldev] SUBJECT.KEYID = 5
1,209,099 UART: [ldev] AUTHORITY.KEYID = 7
1,209,562 UART: [ldev] FE.KEYID = 1
1,214,924 UART: [ldev] Erasing FE.KEYID = 1
1,240,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,266 UART: [ldev] --
1,279,774 UART: [fwproc] Wait for Commands...
1,280,509 UART: [fwproc] Recv command 0x46574c44
1,281,242 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,905 >>> mbox cmd response: success
2,773,146 UART: [afmc] ++
2,773,314 UART: [afmc] CDI.KEYID = 6
2,773,677 UART: [afmc] SUBJECT.KEYID = 7
2,774,103 UART: [afmc] AUTHORITY.KEYID = 5
2,809,898 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,364 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,115 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,844 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,727 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,446 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,217 UART: [afmc] --
2,853,247 UART: [cold-reset] --
2,853,837 UART: [state] Locking Datavault
2,854,982 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,586 UART: [state] Locking ICCM
2,856,016 UART: [exit] Launching FMC @ 0x40000130
2,861,345 UART:
2,861,361 UART: Running Caliptra FMC ...
2,861,769 UART:
2,861,823 UART: [state] CFI Enabled
2,872,198 UART: [fht] FMC Alias Private Key: 7
2,980,203 UART: [art] Extend RT PCRs Done
2,980,631 UART: [art] Lock RT PCRs Done
2,982,223 UART: [art] Populate DV Done
2,990,658 UART: [fht] FMC Alias Private Key: 7
2,991,758 UART: [art] Derive CDI
2,992,038 UART: [art] Store in in slot 0x4
3,077,605 UART: [art] Derive Key Pair
3,077,965 UART: [art] Store priv key in slot 0x5
3,091,063 UART: [art] Derive Key Pair - Done
3,105,947 UART: [art] Signing Cert with AUTHO
3,106,427 UART: RITY.KEYID = 7
3,121,119 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,884 UART: [art] PUB.X = 5332FE6CD394A5AF0D1C7FA7A959CC7855CEC699CB5B5AB94F2DE59E5675DDE8C7D81478224555C77ABB5D40B840ABBC
3,128,671 UART: [art] PUB.Y = 8DC849A6523203DEC49182845F1F3E25ACCF8CDCFE2642C57F7216E8B248EED1B4EABF03DC6C1A5759850558A155078E
3,135,619 UART: [art] SIG.R = 2EF8A1A0CB2F9EA34DBD7E67D477B912E3C55B56A681508BB7B475832AFD6971C8C3798B29E2E637A234A92C079639A8
3,142,392 UART: [art] SIG.S = F57510100D2BC350356528BF2EA5B5A0A3364574C0FF9BD720209DDAF0C7EF8431895A0A6AB58C9053938498A2F05DAD
3,166,929 UART: Caliptra RT
3,167,182 UART: [state] CFI Enabled
3,274,347 UART: [rt] RT listening for mailbox commands...
3,275,017 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,147 UART: [rt]cmd =0x53574545, len=84
3,307,915 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,570 ready_for_fw is high
1,055,570 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,163 >>> mbox cmd response: success
2,683,273 UART:
2,683,289 UART: Running Caliptra FMC ...
2,683,697 UART:
2,683,751 UART: [state] CFI Enabled
2,694,566 UART: [fht] FMC Alias Private Key: 7
2,802,519 UART: [art] Extend RT PCRs Done
2,802,947 UART: [art] Lock RT PCRs Done
2,804,671 UART: [art] Populate DV Done
2,813,100 UART: [fht] FMC Alias Private Key: 7
2,814,262 UART: [art] Derive CDI
2,814,542 UART: [art] Store in in slot 0x4
2,900,017 UART: [art] Derive Key Pair
2,900,377 UART: [art] Store priv key in slot 0x5
2,913,659 UART: [art] Derive Key Pair - Done
2,928,374 UART: [art] Signing Cert with AUTHO
2,928,854 UART: RITY.KEYID = 7
2,944,678 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,443 UART: [art] PUB.X = E4A0669ACA013737209AE6DB5141FF096E7265FD48E4E7C7A413F5190C27C1E86A0D6684489AAA0EA617DC169723764C
2,952,200 UART: [art] PUB.Y = 9B796FCB931F0360E8FB9D64F3DF89CA39786E0CFDC630EA25CA5837AC8C2D47B2998A1BBE716A4A4C244DDD88818938
2,959,158 UART: [art] SIG.R = 2D214D9CE9988F4D199832D6E5ABB9C6D93FE80C1BE557FB360BDA033A9217F1705AB64A780CBEF866CBB32B8C54718C
2,965,930 UART: [art] SIG.S = AFB9B0D1C80C95520EB209893E884B036EE14C1A4D191B15B1215D4973BED41242FAC1B891894DCEB7D025CD7621EE4E
2,989,647 UART: Caliptra RT
2,989,900 UART: [state] CFI Enabled
3,098,211 UART: [rt] RT listening for mailbox commands...
3,098,881 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,085 UART: [rt]cmd =0x53574545, len=84
3,131,891 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
891,505 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,634 UART: [kat] ++
895,786 UART: [kat] sha1
900,182 UART: [kat] SHA2-256
902,122 UART: [kat] SHA2-384
904,665 UART: [kat] SHA2-512-ACC
906,566 UART: [kat] ECC-384
916,637 UART: [kat] HMAC-384Kdf
921,291 UART: [kat] LMS
1,169,603 UART: [kat] --
1,170,712 UART: [cold-reset] ++
1,171,206 UART: [fht] FHT @ 0x50003400
1,173,732 UART: [idev] ++
1,173,900 UART: [idev] CDI.KEYID = 6
1,174,261 UART: [idev] SUBJECT.KEYID = 7
1,174,686 UART: [idev] UDS.KEYID = 0
1,175,032 ready_for_fw is high
1,175,032 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,922 UART: [idev] Erasing UDS.KEYID = 0
1,199,726 UART: [idev] Sha1 KeyId Algorithm
1,208,532 UART: [idev] --
1,209,763 UART: [ldev] ++
1,209,931 UART: [ldev] CDI.KEYID = 6
1,210,295 UART: [ldev] SUBJECT.KEYID = 5
1,210,722 UART: [ldev] AUTHORITY.KEYID = 7
1,211,185 UART: [ldev] FE.KEYID = 1
1,216,469 UART: [ldev] Erasing FE.KEYID = 1
1,243,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,345 UART: [ldev] --
1,282,619 UART: [fwproc] Wait for Commands...
1,283,246 UART: [fwproc] Recv command 0x46574c44
1,283,979 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,423 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,732 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,676 >>> mbox cmd response: success
2,774,785 UART: [afmc] ++
2,774,953 UART: [afmc] CDI.KEYID = 6
2,775,316 UART: [afmc] SUBJECT.KEYID = 7
2,775,742 UART: [afmc] AUTHORITY.KEYID = 5
2,810,905 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,144 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,873 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,756 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,475 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,524 UART: [afmc] --
2,854,590 UART: [cold-reset] --
2,855,398 UART: [state] Locking Datavault
2,856,569 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,173 UART: [state] Locking ICCM
2,857,669 UART: [exit] Launching FMC @ 0x40000130
2,862,998 UART:
2,863,014 UART: Running Caliptra FMC ...
2,863,422 UART:
2,863,565 UART: [state] CFI Enabled
2,874,086 UART: [fht] FMC Alias Private Key: 7
2,981,811 UART: [art] Extend RT PCRs Done
2,982,239 UART: [art] Lock RT PCRs Done
2,983,481 UART: [art] Populate DV Done
2,991,844 UART: [fht] FMC Alias Private Key: 7
2,992,996 UART: [art] Derive CDI
2,993,276 UART: [art] Store in in slot 0x4
3,079,081 UART: [art] Derive Key Pair
3,079,441 UART: [art] Store priv key in slot 0x5
3,092,981 UART: [art] Derive Key Pair - Done
3,107,449 UART: [art] Signing Cert with AUTHO
3,107,929 UART: RITY.KEYID = 7
3,123,075 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,840 UART: [art] PUB.X = BEF419291934615AC9EFE95B9450739BA422787CB7CDF809F246D0A2E6E92A08200D5F25744511A61CA656A1C1BF57D2
3,130,603 UART: [art] PUB.Y = 7A051E731A24BF2C2070CE6317F50E7CB6DAEA214AB9EE332966F369CA760646057A7B2FE7FA8029E1C746D9404C1119
3,137,545 UART: [art] SIG.R = B4E237197B610ECBCB08820BC76FFC3D9CE1A26400D358BCF554A7A716F74CD5E58F46A6539F2265E06D7E0045E20503
3,144,262 UART: [art] SIG.S = 3F0B5DE44AD0565D3726E8E80ECB521D979C9EFEF275A5A7132F31072BA7ABAEFCDB5C7BD97B3F798EF0C084F6FBCF57
3,167,750 UART: Caliptra RT
3,168,095 UART: [state] CFI Enabled
3,276,234 UART: [rt] RT listening for mailbox commands...
3,276,904 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,300 UART: [rt]cmd =0x53574545, len=84
3,310,640 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,451 ready_for_fw is high
1,056,451 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,490 >>> mbox cmd response: success
2,683,176 UART:
2,683,192 UART: Running Caliptra FMC ...
2,683,600 UART:
2,683,743 UART: [state] CFI Enabled
2,694,328 UART: [fht] FMC Alias Private Key: 7
2,802,369 UART: [art] Extend RT PCRs Done
2,802,797 UART: [art] Lock RT PCRs Done
2,804,469 UART: [art] Populate DV Done
2,812,790 UART: [fht] FMC Alias Private Key: 7
2,813,766 UART: [art] Derive CDI
2,814,046 UART: [art] Store in in slot 0x4
2,899,425 UART: [art] Derive Key Pair
2,899,785 UART: [art] Store priv key in slot 0x5
2,913,275 UART: [art] Derive Key Pair - Done
2,928,117 UART: [art] Signing Cert with AUTHO
2,928,597 UART: RITY.KEYID = 7
2,943,661 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,426 UART: [art] PUB.X = DD246777B95FA923A590712D6A1C9D41607A6088B12A41F9EE01A0799BE638D6629C4DA4487DE82B0D37969E278B91BA
2,951,190 UART: [art] PUB.Y = 2CED8BFEC44251A5507959A8F5224AACB340D97FFCF27894C875DAB5A392CC5EBD0542D7BD85F5C9D14011AF94D9FB05
2,958,152 UART: [art] SIG.R = AF4CAAE4A553C72A4855923488D4FA19126113D8890FF24C9F79D484DC1BAD96EE95D73E4714DC4E609A6B028A94F3B9
2,964,924 UART: [art] SIG.S = 2E1C35E14C7C306B0F6B399C137DC6A4DF7D7141AD973274BB0321B935775EE702CF72B66A31F29E5C789058292AD471
2,988,424 UART: Caliptra RT
2,988,769 UART: [state] CFI Enabled
3,097,010 UART: [rt] RT listening for mailbox commands...
3,097,680 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,718 UART: [rt]cmd =0x53574545, len=84
3,130,480 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,209 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,695 UART: [kat] SHA2-256
881,626 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,741 UART: [kat] ++
885,893 UART: [kat] sha1
890,077 UART: [kat] SHA2-256
892,015 UART: [kat] SHA2-384
894,764 UART: [kat] SHA2-512-ACC
896,665 UART: [kat] ECC-384
902,360 UART: [kat] HMAC-384Kdf
907,114 UART: [kat] LMS
1,475,310 UART: [kat] --
1,475,965 UART: [cold-reset] ++
1,476,301 UART: [fht] Storing FHT @ 0x50003400
1,479,122 UART: [idev] ++
1,479,290 UART: [idev] CDI.KEYID = 6
1,479,650 UART: [idev] SUBJECT.KEYID = 7
1,480,074 UART: [idev] UDS.KEYID = 0
1,480,419 ready_for_fw is high
1,480,419 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,778 UART: [idev] Erasing UDS.KEYID = 0
1,504,056 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,566 UART: [idev] --
1,513,695 UART: [ldev] ++
1,513,863 UART: [ldev] CDI.KEYID = 6
1,514,226 UART: [ldev] SUBJECT.KEYID = 5
1,514,652 UART: [ldev] AUTHORITY.KEYID = 7
1,515,115 UART: [ldev] FE.KEYID = 1
1,520,433 UART: [ldev] Erasing FE.KEYID = 1
1,545,936 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,802 UART: [ldev] --
1,585,095 UART: [fwproc] Waiting for Commands...
1,585,856 UART: [fwproc] Received command 0x46574c44
1,586,647 UART: [fwproc] Received Image of size 114332 bytes
2,884,993 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,929 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,281 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,272 >>> mbox cmd response: success
3,078,314 UART: [afmc] ++
3,078,482 UART: [afmc] CDI.KEYID = 6
3,078,844 UART: [afmc] SUBJECT.KEYID = 7
3,079,269 UART: [afmc] AUTHORITY.KEYID = 5
3,114,778 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,316 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,096 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,824 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,709 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,399 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,276 UART: [afmc] --
3,158,342 UART: [cold-reset] --
3,159,164 UART: [state] Locking Datavault
3,160,277 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,881 UART: [state] Locking ICCM
3,161,531 UART: [exit] Launching FMC @ 0x40000130
3,166,860 UART:
3,166,876 UART: Running Caliptra FMC ...
3,167,284 UART:
3,167,338 UART: [state] CFI Enabled
3,177,941 UART: [fht] FMC Alias Private Key: 7
3,286,018 UART: [art] Extend RT PCRs Done
3,286,446 UART: [art] Lock RT PCRs Done
3,288,268 UART: [art] Populate DV Done
3,296,539 UART: [fht] FMC Alias Private Key: 7
3,297,569 UART: [art] Derive CDI
3,297,849 UART: [art] Store in in slot 0x4
3,383,498 UART: [art] Derive Key Pair
3,383,858 UART: [art] Store priv key in slot 0x5
3,396,994 UART: [art] Derive Key Pair - Done
3,411,348 UART: [art] Signing Cert with AUTHO
3,411,828 UART: RITY.KEYID = 7
3,427,080 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,845 UART: [art] PUB.X = DC62D5D8CB86B2B081540DEEC9E65C7A63E2843B24532FDD389557305286FDD92E1CA14F31124A7E735513F5FF9CE186
3,434,618 UART: [art] PUB.Y = 63C646675B561795B2033B40B3C21DE639E82741F6B5E2A4B8D62C7EC7C92BDB84EAD226D3E6DC4CDD519EE60CC4DC10
3,441,576 UART: [art] SIG.R = 55EC095F3AEC845BA9FA064427AB28EF971E306B4D5DE641D845DA0B4BD605D26BC6C1466ED5867C28496BCD8106FFD6
3,448,345 UART: [art] SIG.S = 091BE3FD3E561AB853B14EAD4D0DAAAA35291DFCB2B7FE3CB2F7A7B5B616A3A7241FE32F5C915C20CAAC9824D43C0A3A
3,471,827 UART: Caliptra RT
3,472,080 UART: [state] CFI Enabled
3,579,120 UART: [rt] RT listening for mailbox commands...
3,579,790 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,516 UART: [rt]cmd =0x44504543, len=96
3,790,194 >>> mbox cmd response data (6236 bytes)
3,790,195 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,820,124 UART: [rt]cmd =0x53574545, len=84
3,845,753 >>> mbox cmd response data (200 bytes)
3,845,754 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,875,119 UART: [rt]cmd =0x52564348, len=36
3,877,080 >>> mbox cmd response data (8 bytes)
3,877,081 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,906,834 UART: [rt]cmd =0x53574545, len=84
3,910,290 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,575 ready_for_fw is high
1,362,575 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,394 >>> mbox cmd response: success
2,988,896 UART:
2,988,912 UART: Running Caliptra FMC ...
2,989,320 UART:
2,989,374 UART: [state] CFI Enabled
2,999,739 UART: [fht] FMC Alias Private Key: 7
3,108,030 UART: [art] Extend RT PCRs Done
3,108,458 UART: [art] Lock RT PCRs Done
3,109,836 UART: [art] Populate DV Done
3,117,983 UART: [fht] FMC Alias Private Key: 7
3,118,941 UART: [art] Derive CDI
3,119,221 UART: [art] Store in in slot 0x4
3,204,342 UART: [art] Derive Key Pair
3,204,702 UART: [art] Store priv key in slot 0x5
3,217,620 UART: [art] Derive Key Pair - Done
3,232,449 UART: [art] Signing Cert with AUTHO
3,232,929 UART: RITY.KEYID = 7
3,248,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,824 UART: [art] PUB.X = 8EEE6143F83A8DA705620321251F1847850468BB46461916FEB52E9A729EE1CF2126BC04C80FE0BB90AD08A6A75A2ABB
3,255,582 UART: [art] PUB.Y = C380B74710DC8F193CC213B6B114747CF629F7659739D36FA8102A86F4F6B871E270C00ECA54E1A731ED2F9A27C6FB28
3,262,533 UART: [art] SIG.R = CE103F1787E129A4915658C5514D0B067DE4FE3FF656A44DDF5D4DCEAF857FFD7233B6B781F7B309CBE9808D800F9819
3,269,301 UART: [art] SIG.S = 50E819501FF873E823D4F3EC2E5CE88142D62EFC14ECA15EC7A8530BDA66F10F22419A2FB1D4ED9B332DD6F2EFB77FA1
3,293,022 UART: Caliptra RT
3,293,275 UART: [state] CFI Enabled
3,401,194 UART: [rt] RT listening for mailbox commands...
3,401,864 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,128 UART: [rt]cmd =0x44504543, len=96
3,612,599 >>> mbox cmd response data (6236 bytes)
3,612,600 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,365 UART: [rt]cmd =0x53574545, len=84
3,667,862 >>> mbox cmd response data (200 bytes)
3,667,863 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,697,562 UART: [rt]cmd =0x52564348, len=36
3,699,623 >>> mbox cmd response data (8 bytes)
3,699,624 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,729,509 UART: [rt]cmd =0x53574545, len=84
3,732,601 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,111 UART: [state] LifecycleState = Unprovisioned
85,766 UART: [state] DebugLocked = No
86,316 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,990 UART: [kat] SHA2-256
881,921 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,036 UART: [kat] ++
886,188 UART: [kat] sha1
890,486 UART: [kat] SHA2-256
892,424 UART: [kat] SHA2-384
895,055 UART: [kat] SHA2-512-ACC
896,956 UART: [kat] ECC-384
902,855 UART: [kat] HMAC-384Kdf
907,575 UART: [kat] LMS
1,475,771 UART: [kat] --
1,476,616 UART: [cold-reset] ++
1,477,170 UART: [fht] Storing FHT @ 0x50003400
1,479,933 UART: [idev] ++
1,480,101 UART: [idev] CDI.KEYID = 6
1,480,461 UART: [idev] SUBJECT.KEYID = 7
1,480,885 UART: [idev] UDS.KEYID = 0
1,481,230 ready_for_fw is high
1,481,230 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,715 UART: [idev] Erasing UDS.KEYID = 0
1,505,399 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,857 UART: [idev] --
1,514,834 UART: [ldev] ++
1,515,002 UART: [ldev] CDI.KEYID = 6
1,515,365 UART: [ldev] SUBJECT.KEYID = 5
1,515,791 UART: [ldev] AUTHORITY.KEYID = 7
1,516,254 UART: [ldev] FE.KEYID = 1
1,521,572 UART: [ldev] Erasing FE.KEYID = 1
1,547,119 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,143 UART: [ldev] --
1,586,446 UART: [fwproc] Waiting for Commands...
1,587,127 UART: [fwproc] Received command 0x46574c44
1,587,918 UART: [fwproc] Received Image of size 114332 bytes
2,886,022 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,316 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,668 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,475 >>> mbox cmd response: success
3,079,487 UART: [afmc] ++
3,079,655 UART: [afmc] CDI.KEYID = 6
3,080,017 UART: [afmc] SUBJECT.KEYID = 7
3,080,442 UART: [afmc] AUTHORITY.KEYID = 5
3,115,681 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,875 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,655 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,383 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,268 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,958 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,785 UART: [afmc] --
3,158,811 UART: [cold-reset] --
3,159,767 UART: [state] Locking Datavault
3,160,828 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,432 UART: [state] Locking ICCM
3,161,922 UART: [exit] Launching FMC @ 0x40000130
3,167,251 UART:
3,167,267 UART: Running Caliptra FMC ...
3,167,675 UART:
3,167,818 UART: [state] CFI Enabled
3,178,479 UART: [fht] FMC Alias Private Key: 7
3,287,388 UART: [art] Extend RT PCRs Done
3,287,816 UART: [art] Lock RT PCRs Done
3,289,324 UART: [art] Populate DV Done
3,297,601 UART: [fht] FMC Alias Private Key: 7
3,298,623 UART: [art] Derive CDI
3,298,903 UART: [art] Store in in slot 0x4
3,384,410 UART: [art] Derive Key Pair
3,384,770 UART: [art] Store priv key in slot 0x5
3,398,342 UART: [art] Derive Key Pair - Done
3,413,380 UART: [art] Signing Cert with AUTHO
3,413,860 UART: RITY.KEYID = 7
3,428,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,299 UART: [art] PUB.X = 794578C43F10C8E5BEB81179DC69B27537CEE95885192B6CA60E39A9FF7DFA781C068D3E31B9AA17A2EE88288783247A
3,436,067 UART: [art] PUB.Y = 5AFEF8C573582D958B6BCE931A32B9F8A6B22FA0769FF243670E37E96D6610E52E1CBE34F4865A10AD1CFEEB1C0692F4
3,443,025 UART: [art] SIG.R = BF8FFFA97E1F07EAD5EF0E2D972CB37BED2E08CD5EEA028D9166F286D73FD90F4555BD8F62170CF3A1DBBBA85B558491
3,449,803 UART: [art] SIG.S = 4D88AC4690AE495EE33D1EB1FC5CA2A105C0F74FF859097EFA0AB111F810CB6D9519C9B323017DA9E11BF0F36BC54B55
3,473,720 UART: Caliptra RT
3,474,065 UART: [state] CFI Enabled
3,583,196 UART: [rt] RT listening for mailbox commands...
3,583,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,476 UART: [rt]cmd =0x44504543, len=96
3,794,684 >>> mbox cmd response data (6236 bytes)
3,794,685 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,650 UART: [rt]cmd =0x53574545, len=84
3,850,443 >>> mbox cmd response data (200 bytes)
3,850,444 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,111 UART: [rt]cmd =0x52564348, len=36
3,882,690 >>> mbox cmd response data (8 bytes)
3,882,691 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,912,600 UART: [rt]cmd =0x53574545, len=84
3,915,758 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,868 ready_for_fw is high
1,361,868 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,777 >>> mbox cmd response: success
2,987,715 UART:
2,987,731 UART: Running Caliptra FMC ...
2,988,139 UART:
2,988,282 UART: [state] CFI Enabled
2,999,145 UART: [fht] FMC Alias Private Key: 7
3,107,104 UART: [art] Extend RT PCRs Done
3,107,532 UART: [art] Lock RT PCRs Done
3,109,304 UART: [art] Populate DV Done
3,117,639 UART: [fht] FMC Alias Private Key: 7
3,118,777 UART: [art] Derive CDI
3,119,057 UART: [art] Store in in slot 0x4
3,204,604 UART: [art] Derive Key Pair
3,204,964 UART: [art] Store priv key in slot 0x5
3,218,446 UART: [art] Derive Key Pair - Done
3,233,257 UART: [art] Signing Cert with AUTHO
3,233,737 UART: RITY.KEYID = 7
3,248,993 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,758 UART: [art] PUB.X = 1920F331B088B13C9579FB15F242B468F850B57A56D58DBDB04CC59DC7B06D4D4A392F92FE1971E5D2B0B1C8A45B07E8
3,256,533 UART: [art] PUB.Y = A6B387C6211A418D3A64B3C041307365A5D13C0E3DCBFD8745799DD25BFB44549C8EFF1C380A4295C05B7B00DBDA5895
3,263,463 UART: [art] SIG.R = EF9F9137249B467202A37DC7B169BEA2A70A8DBFF7E1AF4B0A8025D24EB6A185F9B13BBA3665000FE60FB0ACF1B9BB20
3,270,216 UART: [art] SIG.S = A97B43373146AAD8548F22C4179BD8CF7FA66BC38CFAF4F454F9147B137FA9B407A9123FDE4A87BDCAC21F12F164EAB8
3,294,506 UART: Caliptra RT
3,294,851 UART: [state] CFI Enabled
3,402,977 UART: [rt] RT listening for mailbox commands...
3,403,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,117 UART: [rt]cmd =0x44504543, len=96
3,614,905 >>> mbox cmd response data (6236 bytes)
3,614,906 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,845 UART: [rt]cmd =0x53574545, len=84
3,671,224 >>> mbox cmd response data (200 bytes)
3,671,225 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,524 UART: [rt]cmd =0x52564348, len=36
3,702,915 >>> mbox cmd response data (8 bytes)
3,702,916 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,732,895 UART: [rt]cmd =0x53574545, len=84
3,736,215 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,416 UART: [kat] SHA2-256
893,066 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,191 UART: [kat] ++
897,343 UART: [kat] sha1
901,619 UART: [kat] SHA2-256
903,559 UART: [kat] SHA2-384
906,352 UART: [kat] SHA2-512-ACC
908,253 UART: [kat] ECC-384
918,032 UART: [kat] HMAC-384Kdf
922,504 UART: [kat] LMS
1,170,832 UART: [kat] --
1,171,977 UART: [cold-reset] ++
1,172,509 UART: [fht] FHT @ 0x50003400
1,175,182 UART: [idev] ++
1,175,350 UART: [idev] CDI.KEYID = 6
1,175,710 UART: [idev] SUBJECT.KEYID = 7
1,176,134 UART: [idev] UDS.KEYID = 0
1,176,479 ready_for_fw is high
1,176,479 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,252 UART: [idev] Erasing UDS.KEYID = 0
1,201,235 UART: [idev] Sha1 KeyId Algorithm
1,209,665 UART: [idev] --
1,210,675 UART: [ldev] ++
1,210,843 UART: [ldev] CDI.KEYID = 6
1,211,206 UART: [ldev] SUBJECT.KEYID = 5
1,211,632 UART: [ldev] AUTHORITY.KEYID = 7
1,212,095 UART: [ldev] FE.KEYID = 1
1,217,169 UART: [ldev] Erasing FE.KEYID = 1
1,243,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,615 UART: [ldev] --
1,283,114 UART: [fwproc] Wait for Commands...
1,283,712 UART: [fwproc] Recv command 0x46574c44
1,284,440 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,639 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,638 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,942 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,763 >>> mbox cmd response: success
2,775,809 UART: [afmc] ++
2,775,977 UART: [afmc] CDI.KEYID = 6
2,776,339 UART: [afmc] SUBJECT.KEYID = 7
2,776,764 UART: [afmc] AUTHORITY.KEYID = 5
2,812,075 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,582 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,330 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,058 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,943 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,662 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,518 UART: [afmc] --
2,855,536 UART: [cold-reset] --
2,856,362 UART: [state] Locking Datavault
2,857,591 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,195 UART: [state] Locking ICCM
2,858,665 UART: [exit] Launching FMC @ 0x40000130
2,863,994 UART:
2,864,010 UART: Running Caliptra FMC ...
2,864,418 UART:
2,864,472 UART: [state] CFI Enabled
2,875,095 UART: [fht] FMC Alias Private Key: 7
2,983,134 UART: [art] Extend RT PCRs Done
2,983,562 UART: [art] Lock RT PCRs Done
2,985,114 UART: [art] Populate DV Done
2,993,441 UART: [fht] FMC Alias Private Key: 7
2,994,491 UART: [art] Derive CDI
2,994,771 UART: [art] Store in in slot 0x4
3,080,662 UART: [art] Derive Key Pair
3,081,022 UART: [art] Store priv key in slot 0x5
3,094,260 UART: [art] Derive Key Pair - Done
3,109,134 UART: [art] Signing Cert with AUTHO
3,109,614 UART: RITY.KEYID = 7
3,124,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,505 UART: [art] PUB.X = 18BD510DD7D3730FC8077DB9D0CA34247040A24E78BD12C2F1842308B4C8B650850BA412FBEE28F65915573E91F393A9
3,132,260 UART: [art] PUB.Y = A1AAC32933743976808326C6FFB4D7BDE1CE3A8ED39D0FCB478CCF09226E3CF46ECA5629ACEC3EDDB0CAE9BBD94E7B06
3,139,231 UART: [art] SIG.R = DF8C16CDB4D2FB397F88B58CF29836CA27A8903D05AC6786CC330498A04A15705C58C0388E93D1B863D78A2D5032C03C
3,145,999 UART: [art] SIG.S = 7366CA7E22EFC3048FBF9A4C0752372105D5917D3C8798C5CDCD868334B46108DF904B7A7615C1838079956E77E21E74
3,169,416 UART: Caliptra RT
3,169,669 UART: [state] CFI Enabled
3,277,134 UART: [rt] RT listening for mailbox commands...
3,277,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,946 UART: [rt]cmd =0x44504543, len=96
3,488,680 >>> mbox cmd response data (6236 bytes)
3,488,681 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,454 UART: [rt]cmd =0x53574545, len=84
3,544,513 >>> mbox cmd response data (200 bytes)
3,544,514 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,173 UART: [rt]cmd =0x52564348, len=36
3,576,292 >>> mbox cmd response data (8 bytes)
3,576,293 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,214 UART: [rt]cmd =0x53574545, len=84
3,609,564 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,093 ready_for_fw is high
1,060,093 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,620 >>> mbox cmd response: success
2,687,610 UART:
2,687,626 UART: Running Caliptra FMC ...
2,688,034 UART:
2,688,088 UART: [state] CFI Enabled
2,698,595 UART: [fht] FMC Alias Private Key: 7
2,806,790 UART: [art] Extend RT PCRs Done
2,807,218 UART: [art] Lock RT PCRs Done
2,808,554 UART: [art] Populate DV Done
2,816,671 UART: [fht] FMC Alias Private Key: 7
2,817,839 UART: [art] Derive CDI
2,818,119 UART: [art] Store in in slot 0x4
2,903,880 UART: [art] Derive Key Pair
2,904,240 UART: [art] Store priv key in slot 0x5
2,917,050 UART: [art] Derive Key Pair - Done
2,931,425 UART: [art] Signing Cert with AUTHO
2,931,905 UART: RITY.KEYID = 7
2,946,801 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,566 UART: [art] PUB.X = 6E9C9C4F81FA3B2E6AEFC8C3BEAF8EB58E5A450C9DFB0D8C50E9E2B392B51247D60AEA22E76F23F0E2E6C9258F54F247
2,954,351 UART: [art] PUB.Y = 148F2CC81A604FC960AEAD940F5518FEF96B852B1D0CBA6C7D7781B64BC317ACD0072584C30B55E4CAA33F71521234C3
2,961,299 UART: [art] SIG.R = 4494D6535EE05092CCF8861D27F600924C12D4C1CBC2A832237CF55F0F4D4088693D26A0F9525AC9C58132853387F8F5
2,968,038 UART: [art] SIG.S = 63791DBD0ADDA95CD714491405F35E7F3EF6272BA72386A1BD765ABE30BFCEF63E1DC3D44E5ED5CAF3C498D6D9AF0FAE
2,991,780 UART: Caliptra RT
2,992,033 UART: [state] CFI Enabled
3,100,176 UART: [rt] RT listening for mailbox commands...
3,100,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,284 UART: [rt]cmd =0x44504543, len=96
3,311,526 >>> mbox cmd response data (6236 bytes)
3,311,527 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,094 UART: [rt]cmd =0x53574545, len=84
3,366,617 >>> mbox cmd response data (200 bytes)
3,366,618 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,067 UART: [rt]cmd =0x52564348, len=36
3,398,380 >>> mbox cmd response data (8 bytes)
3,398,381 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,522 UART: [rt]cmd =0x53574545, len=84
3,431,750 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,015 UART: [state] LifecycleState = Unprovisioned
85,670 UART: [state] DebugLocked = No
86,380 UART: [state] WD Timer not started. Device not locked for debugging
87,581 UART: [kat] SHA2-256
893,231 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,356 UART: [kat] ++
897,508 UART: [kat] sha1
901,750 UART: [kat] SHA2-256
903,690 UART: [kat] SHA2-384
906,459 UART: [kat] SHA2-512-ACC
908,360 UART: [kat] ECC-384
918,339 UART: [kat] HMAC-384Kdf
922,807 UART: [kat] LMS
1,171,135 UART: [kat] --
1,172,164 UART: [cold-reset] ++
1,172,582 UART: [fht] FHT @ 0x50003400
1,175,235 UART: [idev] ++
1,175,403 UART: [idev] CDI.KEYID = 6
1,175,763 UART: [idev] SUBJECT.KEYID = 7
1,176,187 UART: [idev] UDS.KEYID = 0
1,176,532 ready_for_fw is high
1,176,532 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,221 UART: [idev] Erasing UDS.KEYID = 0
1,201,990 UART: [idev] Sha1 KeyId Algorithm
1,210,402 UART: [idev] --
1,211,474 UART: [ldev] ++
1,211,642 UART: [ldev] CDI.KEYID = 6
1,212,005 UART: [ldev] SUBJECT.KEYID = 5
1,212,431 UART: [ldev] AUTHORITY.KEYID = 7
1,212,894 UART: [ldev] FE.KEYID = 1
1,218,342 UART: [ldev] Erasing FE.KEYID = 1
1,244,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,980 UART: [ldev] --
1,284,309 UART: [fwproc] Wait for Commands...
1,284,907 UART: [fwproc] Recv command 0x46574c44
1,285,635 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,889 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,193 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,984 >>> mbox cmd response: success
2,776,190 UART: [afmc] ++
2,776,358 UART: [afmc] CDI.KEYID = 6
2,776,720 UART: [afmc] SUBJECT.KEYID = 7
2,777,145 UART: [afmc] AUTHORITY.KEYID = 5
2,812,976 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,159 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,887 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,772 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,491 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,289 UART: [afmc] --
2,856,365 UART: [cold-reset] --
2,857,029 UART: [state] Locking Datavault
2,858,030 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,634 UART: [state] Locking ICCM
2,859,158 UART: [exit] Launching FMC @ 0x40000130
2,864,487 UART:
2,864,503 UART: Running Caliptra FMC ...
2,864,911 UART:
2,865,054 UART: [state] CFI Enabled
2,875,305 UART: [fht] FMC Alias Private Key: 7
2,983,180 UART: [art] Extend RT PCRs Done
2,983,608 UART: [art] Lock RT PCRs Done
2,985,180 UART: [art] Populate DV Done
2,993,185 UART: [fht] FMC Alias Private Key: 7
2,994,199 UART: [art] Derive CDI
2,994,479 UART: [art] Store in in slot 0x4
3,080,310 UART: [art] Derive Key Pair
3,080,670 UART: [art] Store priv key in slot 0x5
3,093,814 UART: [art] Derive Key Pair - Done
3,108,936 UART: [art] Signing Cert with AUTHO
3,109,416 UART: RITY.KEYID = 7
3,124,246 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,011 UART: [art] PUB.X = 30BF6A9FDD105CF6FE6C4390471962ABE40EF8799A0EE8748D74BB2D651FBD5C872E9C5FE845D963D66849697D902092
3,131,781 UART: [art] PUB.Y = 930160558D1582CC60A542020716ED169C57DA3FBF69C55EE93A4BF2FD952D6B0FA17630CF41679DE5122171CFAFEFFE
3,138,729 UART: [art] SIG.R = A72A729FB583532E4316DB75338B09325A1927AB677D2E41DB49209A2061BA629682271C04A1EBFA64EAEEE5CF57FC07
3,145,494 UART: [art] SIG.S = 3C2B5451B2DE740287EC2D3285E6981DF8100933685A148F74ED4773955D3041DA47CC32EB81F12E1295D9CE6B517197
3,169,571 UART: Caliptra RT
3,169,916 UART: [state] CFI Enabled
3,277,505 UART: [rt] RT listening for mailbox commands...
3,278,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,389 UART: [rt]cmd =0x44504543, len=96
3,489,585 >>> mbox cmd response data (6236 bytes)
3,489,586 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,283 UART: [rt]cmd =0x53574545, len=84
3,545,424 >>> mbox cmd response data (200 bytes)
3,545,425 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,082 UART: [rt]cmd =0x52564348, len=36
3,577,383 >>> mbox cmd response data (8 bytes)
3,577,384 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,297 UART: [rt]cmd =0x53574545, len=84
3,610,061 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,838 ready_for_fw is high
1,060,838 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,849 >>> mbox cmd response: success
2,689,663 UART:
2,689,679 UART: Running Caliptra FMC ...
2,690,087 UART:
2,690,230 UART: [state] CFI Enabled
2,701,381 UART: [fht] FMC Alias Private Key: 7
2,808,632 UART: [art] Extend RT PCRs Done
2,809,060 UART: [art] Lock RT PCRs Done
2,810,394 UART: [art] Populate DV Done
2,818,415 UART: [fht] FMC Alias Private Key: 7
2,819,367 UART: [art] Derive CDI
2,819,647 UART: [art] Store in in slot 0x4
2,905,540 UART: [art] Derive Key Pair
2,905,900 UART: [art] Store priv key in slot 0x5
2,919,328 UART: [art] Derive Key Pair - Done
2,933,770 UART: [art] Signing Cert with AUTHO
2,934,250 UART: RITY.KEYID = 7
2,949,722 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,487 UART: [art] PUB.X = 2B26C1EB0C6CDD8E3E7E317EA93F861AD646C82792F4C9D95B5F5CAF884955005FCA82D32BA80D4BA30EC61942A1F252
2,957,240 UART: [art] PUB.Y = 1610DE89DC5FB04CF93144A583A886DAC8631142A40BC07C0E2A01F0215DC05341EDD7D44321E3D9E43120DD1D4E49E8
2,964,187 UART: [art] SIG.R = 272D97ECA03F091E8F22B8FBB3C50147504AF84747A351B4182B227FD25B5A0D6547939AFA8CC80640317A113F0342EA
2,970,942 UART: [art] SIG.S = 54410E0BD249A68FD3AF6D7874D4A9A1D7FFE203BFE86F8AC861BEF8B4C4C7EE1727904236BE145DE0F72B8597D850C9
2,994,926 UART: Caliptra RT
2,995,271 UART: [state] CFI Enabled
3,103,126 UART: [rt] RT listening for mailbox commands...
3,103,796 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,314 UART: [rt]cmd =0x44504543, len=96
3,314,842 >>> mbox cmd response data (6236 bytes)
3,314,843 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,592 UART: [rt]cmd =0x53574545, len=84
3,370,709 >>> mbox cmd response data (200 bytes)
3,370,710 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,237 UART: [rt]cmd =0x52564348, len=36
3,402,604 >>> mbox cmd response data (8 bytes)
3,402,605 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,628 UART: [rt]cmd =0x53574545, len=84
3,435,796 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,438 UART: [kat] SHA2-256
890,988 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,117 UART: [kat] ++
895,269 UART: [kat] sha1
899,363 UART: [kat] SHA2-256
901,303 UART: [kat] SHA2-384
903,962 UART: [kat] SHA2-512-ACC
905,863 UART: [kat] ECC-384
915,386 UART: [kat] HMAC-384Kdf
919,806 UART: [kat] LMS
1,168,118 UART: [kat] --
1,168,977 UART: [cold-reset] ++
1,169,397 UART: [fht] FHT @ 0x50003400
1,171,997 UART: [idev] ++
1,172,165 UART: [idev] CDI.KEYID = 6
1,172,526 UART: [idev] SUBJECT.KEYID = 7
1,172,951 UART: [idev] UDS.KEYID = 0
1,173,297 ready_for_fw is high
1,173,297 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,689 UART: [idev] Erasing UDS.KEYID = 0
1,197,771 UART: [idev] Sha1 KeyId Algorithm
1,206,749 UART: [idev] --
1,207,766 UART: [ldev] ++
1,207,934 UART: [ldev] CDI.KEYID = 6
1,208,298 UART: [ldev] SUBJECT.KEYID = 5
1,208,725 UART: [ldev] AUTHORITY.KEYID = 7
1,209,188 UART: [ldev] FE.KEYID = 1
1,214,260 UART: [ldev] Erasing FE.KEYID = 1
1,240,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,714 UART: [ldev] --
1,280,104 UART: [fwproc] Wait for Commands...
1,280,679 UART: [fwproc] Recv command 0x46574c44
1,281,412 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,972 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,264 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,573 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,341 >>> mbox cmd response: success
2,772,608 UART: [afmc] ++
2,772,776 UART: [afmc] CDI.KEYID = 6
2,773,139 UART: [afmc] SUBJECT.KEYID = 7
2,773,565 UART: [afmc] AUTHORITY.KEYID = 5
2,809,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,100 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,851 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,580 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,463 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,182 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,959 UART: [afmc] --
2,853,055 UART: [cold-reset] --
2,853,865 UART: [state] Locking Datavault
2,855,220 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,824 UART: [state] Locking ICCM
2,856,302 UART: [exit] Launching FMC @ 0x40000130
2,861,631 UART:
2,861,647 UART: Running Caliptra FMC ...
2,862,055 UART:
2,862,109 UART: [state] CFI Enabled
2,872,172 UART: [fht] FMC Alias Private Key: 7
2,980,433 UART: [art] Extend RT PCRs Done
2,980,861 UART: [art] Lock RT PCRs Done
2,982,255 UART: [art] Populate DV Done
2,990,500 UART: [fht] FMC Alias Private Key: 7
2,991,596 UART: [art] Derive CDI
2,991,876 UART: [art] Store in in slot 0x4
3,077,321 UART: [art] Derive Key Pair
3,077,681 UART: [art] Store priv key in slot 0x5
3,091,059 UART: [art] Derive Key Pair - Done
3,105,587 UART: [art] Signing Cert with AUTHO
3,106,067 UART: RITY.KEYID = 7
3,121,193 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,958 UART: [art] PUB.X = 15530E22DFDB50B064B61AF245FC474D684BE6FC403B5FC8B69E4503228F4C70ABDAC2F735DCACDBFD821661212A827D
3,128,738 UART: [art] PUB.Y = D8A91C9B5AD0FADC73D88304732705CBB3CB8BBB56F3E7AA665AD0ABA3DC1E36153F35666AF5F64BD4B0C2941E545588
3,135,700 UART: [art] SIG.R = 1570E7AD268E3A6DA0C65CEAD2D40D42197861906B2E67A90852272C573CC8E7C8910AD8950A3DDDC28BB112E35ED2D9
3,142,466 UART: [art] SIG.S = E9094F868BE6D2411AB40BAB24A2812A61D839B9A25A1287D27898DB7097B15EB4E71F63A5CD2648E8A1A2D009F71E3E
3,165,728 UART: Caliptra RT
3,165,981 UART: [state] CFI Enabled
3,273,468 UART: [rt] RT listening for mailbox commands...
3,274,138 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,604 UART: [rt]cmd =0x44504543, len=96
3,484,834 >>> mbox cmd response data (6236 bytes)
3,484,835 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,884 UART: [rt]cmd =0x53574545, len=84
3,540,315 >>> mbox cmd response data (200 bytes)
3,540,316 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,569,997 UART: [rt]cmd =0x52564348, len=36
3,572,370 >>> mbox cmd response data (8 bytes)
3,572,371 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,602,250 UART: [rt]cmd =0x53574545, len=84
3,605,326 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,810 ready_for_fw is high
1,055,810 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,217 >>> mbox cmd response: success
2,684,487 UART:
2,684,503 UART: Running Caliptra FMC ...
2,684,911 UART:
2,684,965 UART: [state] CFI Enabled
2,695,602 UART: [fht] FMC Alias Private Key: 7
2,803,205 UART: [art] Extend RT PCRs Done
2,803,633 UART: [art] Lock RT PCRs Done
2,804,995 UART: [art] Populate DV Done
2,813,118 UART: [fht] FMC Alias Private Key: 7
2,814,116 UART: [art] Derive CDI
2,814,396 UART: [art] Store in in slot 0x4
2,900,061 UART: [art] Derive Key Pair
2,900,421 UART: [art] Store priv key in slot 0x5
2,912,973 UART: [art] Derive Key Pair - Done
2,927,708 UART: [art] Signing Cert with AUTHO
2,928,188 UART: RITY.KEYID = 7
2,943,024 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,789 UART: [art] PUB.X = A4CA0548F553B6A381F00D744F4E86B57F4F770942D50292255BEBFB9BD5AB2E460804725BB94168C0EFA76568E337B4
2,950,543 UART: [art] PUB.Y = 36551CDF7CC172229FC34E0C87A4036F6FAA6B060646D74DE5396D222B82E84C237BA0D4FE1FB1A2C401302920C2B12A
2,957,484 UART: [art] SIG.R = 0DD6389869B944243061FA356B8F4B9818C5986FB051845F175477F3F62D325E08B3668BEE9A2269FAE869798CAD3589
2,964,240 UART: [art] SIG.S = 47F16FA52470B9130E513CE043685CEA7AC50D70CB57B437E49A53649EA4C7993AC5382FAD29C9AA69CEEFABA651EEBA
2,987,313 UART: Caliptra RT
2,987,566 UART: [state] CFI Enabled
3,095,543 UART: [rt] RT listening for mailbox commands...
3,096,213 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,367 UART: [rt]cmd =0x44504543, len=96
3,306,176 >>> mbox cmd response data (6236 bytes)
3,306,177 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,112 UART: [rt]cmd =0x53574545, len=84
3,361,415 >>> mbox cmd response data (200 bytes)
3,361,416 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,391,005 UART: [rt]cmd =0x52564348, len=36
3,393,016 >>> mbox cmd response data (8 bytes)
3,393,017 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,422,848 UART: [rt]cmd =0x53574545, len=84
3,425,792 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
891,571 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,700 UART: [kat] ++
895,852 UART: [kat] sha1
900,082 UART: [kat] SHA2-256
902,022 UART: [kat] SHA2-384
904,937 UART: [kat] SHA2-512-ACC
906,838 UART: [kat] ECC-384
916,707 UART: [kat] HMAC-384Kdf
921,331 UART: [kat] LMS
1,169,643 UART: [kat] --
1,170,540 UART: [cold-reset] ++
1,170,982 UART: [fht] FHT @ 0x50003400
1,173,728 UART: [idev] ++
1,173,896 UART: [idev] CDI.KEYID = 6
1,174,257 UART: [idev] SUBJECT.KEYID = 7
1,174,682 UART: [idev] UDS.KEYID = 0
1,175,028 ready_for_fw is high
1,175,028 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,350 UART: [idev] Erasing UDS.KEYID = 0
1,199,628 UART: [idev] Sha1 KeyId Algorithm
1,208,470 UART: [idev] --
1,209,495 UART: [ldev] ++
1,209,663 UART: [ldev] CDI.KEYID = 6
1,210,027 UART: [ldev] SUBJECT.KEYID = 5
1,210,454 UART: [ldev] AUTHORITY.KEYID = 7
1,210,917 UART: [ldev] FE.KEYID = 1
1,216,493 UART: [ldev] Erasing FE.KEYID = 1
1,243,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,219 UART: [ldev] --
1,282,725 UART: [fwproc] Wait for Commands...
1,283,440 UART: [fwproc] Recv command 0x46574c44
1,284,173 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,761 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,070 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,780 >>> mbox cmd response: success
2,774,953 UART: [afmc] ++
2,775,121 UART: [afmc] CDI.KEYID = 6
2,775,484 UART: [afmc] SUBJECT.KEYID = 7
2,775,910 UART: [afmc] AUTHORITY.KEYID = 5
2,811,159 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,242 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,971 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,854 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,573 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,376 UART: [afmc] --
2,854,428 UART: [cold-reset] --
2,855,190 UART: [state] Locking Datavault
2,856,189 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,793 UART: [state] Locking ICCM
2,857,261 UART: [exit] Launching FMC @ 0x40000130
2,862,590 UART:
2,862,606 UART: Running Caliptra FMC ...
2,863,014 UART:
2,863,157 UART: [state] CFI Enabled
2,873,894 UART: [fht] FMC Alias Private Key: 7
2,981,651 UART: [art] Extend RT PCRs Done
2,982,079 UART: [art] Lock RT PCRs Done
2,983,409 UART: [art] Populate DV Done
2,991,808 UART: [fht] FMC Alias Private Key: 7
2,992,930 UART: [art] Derive CDI
2,993,210 UART: [art] Store in in slot 0x4
3,079,047 UART: [art] Derive Key Pair
3,079,407 UART: [art] Store priv key in slot 0x5
3,092,627 UART: [art] Derive Key Pair - Done
3,107,390 UART: [art] Signing Cert with AUTHO
3,107,870 UART: RITY.KEYID = 7
3,122,856 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,621 UART: [art] PUB.X = 1589FF1426BE27F524F62A75043749F8AF8ADE81F6623EB378A53513D78A4CDFDB8E90DA8B1BE88FCAE56571444B6BFB
3,130,402 UART: [art] PUB.Y = FEC7DB3EA2810B9EC756F4EC3FA578E6AE010EC1A8C3E246C5B6DFA32F0D609A18E167B50F8D7BF97627A7D69C3B7F40
3,137,359 UART: [art] SIG.R = 476967C7ED44A30D867F6C6FA9869039C9C5C3E740D7014AE78AC8AA4785B37FC4B6C7B46B74DBEF0202677E4928D88D
3,144,123 UART: [art] SIG.S = AA87C1F7F74332B98F507C139EF5664CE3CF8B9F435CA0FEECFD5C710FADB904486FD8B0723C4EB43A801744D7C21101
3,168,285 UART: Caliptra RT
3,168,630 UART: [state] CFI Enabled
3,276,389 UART: [rt] RT listening for mailbox commands...
3,277,059 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,525 UART: [rt]cmd =0x44504543, len=96
3,488,072 >>> mbox cmd response data (6236 bytes)
3,488,073 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,786 UART: [rt]cmd =0x53574545, len=84
3,543,715 >>> mbox cmd response data (200 bytes)
3,543,716 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,477 UART: [rt]cmd =0x52564348, len=36
3,575,706 >>> mbox cmd response data (8 bytes)
3,575,707 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,580 UART: [rt]cmd =0x53574545, len=84
3,608,754 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,075 ready_for_fw is high
1,056,075 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,358 >>> mbox cmd response: success
2,684,538 UART:
2,684,554 UART: Running Caliptra FMC ...
2,684,962 UART:
2,685,105 UART: [state] CFI Enabled
2,696,128 UART: [fht] FMC Alias Private Key: 7
2,803,927 UART: [art] Extend RT PCRs Done
2,804,355 UART: [art] Lock RT PCRs Done
2,805,995 UART: [art] Populate DV Done
2,814,304 UART: [fht] FMC Alias Private Key: 7
2,815,314 UART: [art] Derive CDI
2,815,594 UART: [art] Store in in slot 0x4
2,901,791 UART: [art] Derive Key Pair
2,902,151 UART: [art] Store priv key in slot 0x5
2,915,059 UART: [art] Derive Key Pair - Done
2,929,535 UART: [art] Signing Cert with AUTHO
2,930,015 UART: RITY.KEYID = 7
2,945,523 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,288 UART: [art] PUB.X = F4A10B2A5B40B0599F6CC4CE87BFDE4CBFED61E67539AD85330CCFC882134B7E03EBB558680528B08E95D265FB9F9499
2,953,060 UART: [art] PUB.Y = 84580A845ACBA93099BFC37306E2AE281EB48E61512D90FD3779CEE6C28430B8C4164C6581E3B6C195A08E6A6E44CE77
2,960,008 UART: [art] SIG.R = C3FBE548D616AE4DB94EF35C8617BEEA05CAD1D202E2476C7B2E6384E89798DDF7324C1DC4106C1C5D844C7664C21DBB
2,966,788 UART: [art] SIG.S = B4F160FEB372826A544D5E7A690E15752A8A0D69F9190649BC4AF17036A6788B20539CC9839D580C3AB50BF13965ACDF
2,990,486 UART: Caliptra RT
2,990,831 UART: [state] CFI Enabled
3,098,197 UART: [rt] RT listening for mailbox commands...
3,098,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,361 UART: [rt]cmd =0x44504543, len=96
3,309,789 >>> mbox cmd response data (6236 bytes)
3,309,790 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,611 UART: [rt]cmd =0x53574545, len=84
3,365,708 >>> mbox cmd response data (200 bytes)
3,365,709 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,228 UART: [rt]cmd =0x52564348, len=36
3,397,719 >>> mbox cmd response data (8 bytes)
3,397,720 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,427,427 UART: [rt]cmd =0x53574545, len=84
3,430,773 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
Truncated 2720 bytes from beginning
roc] Image verified using Vendor ECC Key Index 0
2,505,297 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,649 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,032 >>> mbox cmd response: success
2,617,032 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,618,156 UART: [afmc] ++
2,618,324 UART: [afmc] CDI.KEYID = 6
2,618,686 UART: [afmc] SUBJECT.KEYID = 7
2,619,111 UART: [afmc] AUTHORITY.KEYID = 5
2,654,328 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,528 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,308 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,036 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,921 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,611 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,670 UART: [afmc] --
2,697,610 UART: [cold-reset] --
2,698,578 UART: [state] Locking Datavault
2,699,555 UART: [state] Locking PCR0, PCR1 and PCR31
2,700,159 UART: [state] Locking ICCM
2,700,733 UART: [exit] Launching FMC @ 0x40000130
2,706,062 UART:
2,706,078 UART: Running Caliptra FMC ...
2,706,486 UART:
2,706,540 UART: [state] CFI Enabled
2,717,227 UART: [fht] FMC Alias Private Key: 7
2,825,286 UART: [art] Extend RT PCRs Done
2,825,714 UART: [art] Lock RT PCRs Done
2,827,232 UART: [art] Populate DV Done
2,835,585 UART: [fht] FMC Alias Private Key: 7
2,836,555 UART: [art] Derive CDI
2,836,835 UART: [art] Store in in slot 0x4
2,922,544 UART: [art] Derive Key Pair
2,922,904 UART: [art] Store priv key in slot 0x5
2,936,218 UART: [art] Derive Key Pair - Done
2,951,206 UART: [art] Signing Cert with AUTHO
2,951,686 UART: RITY.KEYID = 7
2,966,846 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,611 UART: [art] PUB.X = B887724C56F640C2B88B5FA4C00F100D4D9DBD29E5F8E7B8DC064281743CE2F1034FE8CF6FDD16939E46C12E8C2C3E30
2,974,381 UART: [art] PUB.Y = 0BCF5F256B9A2AEBB9EDC2AAFFA02111EDE2C573A7259EFE3C611C3AF57BF919B121528BE6B966624C86711B04B4E391
2,981,343 UART: [art] SIG.R = 53AED702722E8DC80B5146EAA863CDA96D4A415DA9D044CEBC03EA97395C662DBA55DA3A19B77D40ED9076826F383097
2,988,114 UART: [art] SIG.S = 5D63CB79B9E853B38B671FCA9E9A7C835BBF7DD461419E3C1F5A5F4472581F8ADA1D671C11654D03957D18196A9A7EDC
3,011,620 UART: mbox::rt_entry...
3,011,992 UART: ____ _ _ _ ____ _____
3,012,776 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,013,576 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,014,344 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,015,112 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,015,880 UART: |_|
3,016,192 UART:
3,122,729 UART: [rt] Runtime listening for mailbox commands...
3,123,916 >>> mbox cmd response data (48 bytes)
3,123,917 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,124,031 UART:
3,124,047 UART: Running Caliptra ROM ...
3,124,455 UART:
3,124,509 UART: [state] CFI Enabled
3,127,161 UART: [state] LifecycleState = Unprovisioned
3,127,816 UART: [state] DebugLocked = No
3,128,416 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,129,889 UART: [kat] SHA2-256
3,923,820 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,927,935 UART: [kat] ++
3,928,087 UART: [kat] sha1
3,932,415 UART: [kat] SHA2-256
3,934,353 UART: [kat] SHA2-384
3,937,252 UART: [kat] SHA2-512-ACC
3,939,152 UART: [kat] ECC-384
3,944,783 UART: [kat] HMAC-384Kdf
3,949,459 UART: [kat] LMS
4,517,655 UART: [kat] --
4,518,446 UART: [update-reset] ++
5,852,454 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,853,662 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,003,538 >>> mbox cmd response: success
6,003,538 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
6,003,885 UART: [update-reset] Copying MAN_2 To MAN_1
6,011,899 UART: [update-reset Success] --
6,012,762 UART: [state] Locking Datavault
6,013,716 UART: [state] Locking PCR0, PCR1 and PCR31
6,014,320 UART: [state] Locking ICCM
6,014,812 UART: [exit] Launching FMC @ 0x40000130
6,020,141 UART:
6,020,157 UART: Running Caliptra FMC ...
6,020,565 UART:
6,020,619 UART: [state] CFI Enabled
6,108,868 UART: [art] Extend RT PCRs Done
6,109,296 UART: [art] Lock RT PCRs Done
6,110,433 UART: [art] Populate DV Done
6,118,516 UART: [fht] FMC Alias Private Key: 7
6,119,476 UART: [art] Derive CDI
6,119,756 UART: [art] Store in in slot 0x4
6,205,723 UART: [art] Derive Key Pair
6,206,083 UART: [art] Store priv key in slot 0x5
6,219,681 UART: [art] Derive Key Pair - Done
6,234,463 UART: [art] Signing Cert with AUTHO
6,234,943 UART: RITY.KEYID = 7
6,250,345 UART: [art] Erasing AUTHORITY.KEYID = 7
6,251,110 UART: [art] PUB.X = E1EF1CB9146B564595F6A6FF84DB8D3D40E755017118D45A612244869175DF7A545C1DF75A901C1D6231886F8B11ADFE
6,257,879 UART: [art] PUB.Y = D28A313172A8F378AF9EE62A6B797F0CD98589975006F2A0C2611996E45674C482CB4A2A9DEE24376DDE97C1A8C77D56
6,264,825 UART: [art] SIG.R = E1F3F1C797C30E8C6B12FBB220A732DAE9AB8CBB6BCC521C013099A3C3CC02E2D2EEDA4722B8E0170EA396BEC5753DFE
6,271,609 UART: [art] SIG.S = 4C54CC043009D535AE313F318DBA4CB3A7715907271B5AC9BC56317A91ECB15F16F67C2DB21BA4533CD7E253D10E0C78
6,295,649 UART: Caliptra RT
6,295,902 UART: [state] CFI Enabled
6,584,083 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,615,493 UART: [rt]cmd =0x4d454153, len=108
6,635,970 >>> mbox cmd response data (12 bytes)
6,635,971 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,636,819 UART:
6,636,835 UART: Running Caliptra ROM ...
6,637,243 UART:
6,637,297 UART: [state] CFI Enabled
6,640,471 UART: [state] LifecycleState = Unprovisioned
6,641,126 UART: [state] DebugLocked = No
6,641,702 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,643,257 UART: [kat] SHA2-256
7,437,188 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,441,303 UART: [kat] ++
7,441,455 UART: [kat] sha1
7,445,749 UART: [kat] SHA2-256
7,447,687 UART: [kat] SHA2-384
7,450,434 UART: [kat] SHA2-512-ACC
7,452,334 UART: [kat] ECC-384
7,457,631 UART: [kat] HMAC-384Kdf
7,462,081 UART: [kat] LMS
8,030,277 UART: [kat] --
8,031,318 UART: [update-reset] ++
8,958,066 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,959,128 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,055,562 >>> mbox cmd response: success
9,055,562 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
9,055,755 UART: [update-reset] Copying MAN_2 To MAN_1
9,063,769 UART: [update-reset Success] --
9,064,482 UART: [state] Locking Datavault
9,065,340 UART: [state] Locking PCR0, PCR1 and PCR31
9,065,944 UART: [state] Locking ICCM
9,066,392 UART: [exit] Launching FMC @ 0x40000130
9,071,721 UART:
9,071,737 UART: Running Caliptra FMC ...
9,072,145 UART:
9,072,199 UART: [state] CFI Enabled
9,161,098 UART: [art] Extend RT PCRs Done
9,161,526 UART: [art] Lock RT PCRs Done
9,162,815 UART: [art] Populate DV Done
9,171,274 UART: [fht] FMC Alias Private Key: 7
9,172,224 UART: [art] Derive CDI
9,172,504 UART: [art] Store in in slot 0x4
9,258,301 UART: [art] Derive Key Pair
9,258,661 UART: [art] Store priv key in slot 0x5
9,271,797 UART: [art] Derive Key Pair - Done
9,286,619 UART: [art] Signing Cert with AUTHO
9,287,099 UART: RITY.KEYID = 7
9,301,901 UART: [art] Erasing AUTHORITY.KEYID = 7
9,302,666 UART: [art] PUB.X = 956BB06F8F0E7B2056C48AB003F4FD7B12A72B3C227F530B64B0119E60E131FB8E4952FA592A9A69B06C968E2CC23F50
9,309,433 UART: [art] PUB.Y = DD7B9DBE45A46EF16AB1D1C19CF25A11EC3E3E90F87ED99A66C9F84C12560DD84666B3DF4FD825BC8E9D9BAEB592DDF6
9,316,408 UART: [art] SIG.R = B56A24B62877BBBC0E80877CCCDB3ACFDBBDCE0E6A6BF240A859896DBC256C04AA78FA0876E19A63B519B137B87EDD0A
9,323,189 UART: [art] SIG.S = E6C6FEC3031D1EE11346431C1E9BE115E1DFF8D01BBF9DC28382264CFEEBA149821DF08B790AA92D56833EEC58FFCC2A
9,347,004 UART: mbox::rt_entry...
9,347,376 UART: ____ _ _ _ ____ _____
9,348,160 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,348,960 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,349,728 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,350,496 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,351,264 UART: |_|
9,351,576 UART:
9,631,947 UART: [rt] Runtime listening for mailbox commands...
9,632,914 UART:
9,632,930 UART: Running Caliptra ROM ...
9,633,338 UART:
9,633,392 UART: [state] CFI Enabled
9,636,192 UART: [state] LifecycleState = Unprovisioned
9,636,847 UART: [state] DebugLocked = No
9,637,459 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,639,184 UART: [kat] SHA2-256
10,433,115 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,437,230 UART: [kat] ++
10,437,382 UART: [kat] sha1
10,441,592 UART: [kat] SHA2-256
10,443,530 UART: [kat] SHA2-384
10,446,365 UART: [kat] SHA2-512-ACC
10,448,265 UART: [kat] ECC-384
10,453,822 UART: [kat] HMAC-384Kdf
10,458,224 UART: [kat] LMS
11,026,420 UART: [kat] --
11,027,139 UART: [update-reset] ++
11,954,095 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,955,321 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
12,051,755 >>> mbox cmd response: success
12,051,755 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,052,082 UART: [update-reset] Copying MAN_2 To MAN_1
12,060,096 UART: [update-reset Success] --
12,061,207 UART: [state] Locking Datavault
12,061,827 UART: [state] Locking PCR0, PCR1 and PCR31
12,062,431 UART: [state] Locking ICCM
12,062,969 UART: [exit] Launching FMC @ 0x40000130
12,068,298 UART:
12,068,314 UART: Running Caliptra FMC ...
12,068,722 UART:
12,068,776 UART: [state] CFI Enabled
12,157,931 UART: [art] Extend RT PCRs Done
12,158,359 UART: [art] Lock RT PCRs Done
12,159,484 UART: [art] Populate DV Done
12,167,669 UART: [fht] FMC Alias Private Key: 7
12,168,615 UART: [art] Derive CDI
12,168,895 UART: [art] Store in in slot 0x4
12,254,760 UART: [art] Derive Key Pair
12,255,120 UART: [art] Store priv key in slot 0x5
12,268,724 UART: [art] Derive Key Pair - Done
12,283,495 UART: [art] Signing Cert with AUTHO
12,283,975 UART: RITY.KEYID = 7
12,299,017 UART: [art] Erasing AUTHORITY.KEYID = 7
12,299,782 UART: [art] PUB.X = 77CBC55066CEB8B9B19F00EA9CE3471BF2E2C73A7C3592D94402A3E017B3E4BAC598E5A52ADDFAF72E5F4000284EFCFB
12,306,527 UART: [art] PUB.Y = 7CD7FAAD8E684CF1228AEA8B7CE79AF729E2B2B45ED854F6EC073E0D1C3C7D5C2CA8E7F38A38FBE8F419475FC3D1D78E
12,313,499 UART: [art] SIG.R = 25DE9330FEA1C149B262574EB8B4F6D6FD3BB41028651AD95B48014E986139288A18BFFA49C68DFDA4AA12D3E92D3211
12,320,274 UART: [art] SIG.S = B3F5B700C98EAB88503E7529EB95BB793C460242A7EFF992BFD5CA4B3A3E2077AEF7837E3B1F4BE872F4FE26222F8843
12,343,852 UART: mbox::rt_entry...
12,344,224 UART: ____ _ _ _ ____ _____
12,345,008 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,345,808 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,346,576 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,347,344 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,348,112 UART: |_|
12,348,424 UART:
12,629,738 UART: [rt] Runtime listening for mailbox commands...
12,630,934 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,255 ready_for_fw is high
1,362,255 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,465,138 >>> mbox cmd response: success
2,465,138 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,526,520 UART:
2,526,536 UART: Running Caliptra FMC ...
2,526,944 UART:
2,526,998 UART: [state] CFI Enabled
2,537,593 UART: [fht] FMC Alias Private Key: 7
2,645,292 UART: [art] Extend RT PCRs Done
2,645,720 UART: [art] Lock RT PCRs Done
2,647,166 UART: [art] Populate DV Done
2,655,569 UART: [fht] FMC Alias Private Key: 7
2,656,609 UART: [art] Derive CDI
2,656,889 UART: [art] Store in in slot 0x4
2,742,526 UART: [art] Derive Key Pair
2,742,886 UART: [art] Store priv key in slot 0x5
2,756,162 UART: [art] Derive Key Pair - Done
2,770,733 UART: [art] Signing Cert with AUTHO
2,771,213 UART: RITY.KEYID = 7
2,786,445 UART: [art] Erasing AUTHORITY.KEYID = 7
2,787,210 UART: [art] PUB.X = 6F378488DD1B5F3F75AB5071D83F6CE2506FD649578A2CBE8774526DAC41C047B4A0FB9F833555C6A863A8A95EB1B9A7
2,793,988 UART: [art] PUB.Y = 14E0FD41B0D4F197842BA14DEB68E666098FB5B5A357B4EBB13AD4AEDF45B1E90003C7F5461916AC59D8057B8134DA75
2,800,917 UART: [art] SIG.R = 5DDD002F511D7358F4693FF7D6C7831F10BFBE45B9034BD331707F876C02F21A67538C86377CAC1841C26CE3381E88C1
2,807,659 UART: [art] SIG.S = 1306F05D9CE2F10E56E178B4B1A5DAC0031B5A2F63754CA821ED30E42542A7556E53D475501B6D1912827E0FFBDA06A2
2,831,149 UART: mbox::rt_entry...
2,831,521 UART: ____ _ _ _ ____ _____
2,832,305 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,833,105 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,833,873 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,834,641 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,835,409 UART: |_|
2,835,721 UART:
2,942,748 UART: [rt] Runtime listening for mailbox commands...
2,943,935 >>> mbox cmd response data (48 bytes)
2,943,936 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,704,329 >>> mbox cmd response: success
5,704,329 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,717,782 UART:
5,717,798 UART: Running Caliptra FMC ...
5,718,206 UART:
5,718,260 UART: [state] CFI Enabled
5,807,479 UART: [art] Extend RT PCRs Done
5,807,907 UART: [art] Lock RT PCRs Done
5,809,038 UART: [art] Populate DV Done
5,817,119 UART: [fht] FMC Alias Private Key: 7
5,818,079 UART: [art] Derive CDI
5,818,359 UART: [art] Store in in slot 0x4
5,904,140 UART: [art] Derive Key Pair
5,904,500 UART: [art] Store priv key in slot 0x5
5,917,378 UART: [art] Derive Key Pair - Done
5,932,427 UART: [art] Signing Cert with AUTHO
5,932,907 UART: RITY.KEYID = 7
5,948,083 UART: [art] Erasing AUTHORITY.KEYID = 7
5,948,848 UART: [art] PUB.X = D2F225E73F76ED9BE32145B13A82D398FDDC39182380A0FE9955EEAC83E662BB8EFD62B7DA2D9F713940BD38CB4A6870
5,955,632 UART: [art] PUB.Y = 3C54B0B43AB7D90483881D2F84874474ABA168C2ED4AA55040F120ED29FE605AF08E4EFD1C40745FD609C214E82B75EF
5,962,584 UART: [art] SIG.R = C838C1C932EBD25D7F177C300E2FEAC5BACF44E4FC09ECB4803300CB5E7EB5DEE469083BAC5F6C4E4C4B3963CE1DC1A6
5,969,351 UART: [art] SIG.S = 93A4710F4ACB810BF9AE9727C0E158264FA27828C6FF53E46DDF8D068E0310CC14BA1ABE6ABF88812774A863C9C40BBD
5,993,491 UART: Caliptra RT
5,993,744 UART: [state] CFI Enabled
6,277,550 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,308,884 UART: [rt]cmd =0x4d454153, len=108
6,329,461 >>> mbox cmd response data (12 bytes)
6,329,462 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,631,313 >>> mbox cmd response: success
8,631,313 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,644,854 UART:
8,644,870 UART: Running Caliptra FMC ...
8,645,278 UART:
8,645,332 UART: [state] CFI Enabled
8,734,773 UART: [art] Extend RT PCRs Done
8,735,201 UART: [art] Lock RT PCRs Done
8,736,562 UART: [art] Populate DV Done
8,744,613 UART: [fht] FMC Alias Private Key: 7
8,745,573 UART: [art] Derive CDI
8,745,853 UART: [art] Store in in slot 0x4
8,831,252 UART: [art] Derive Key Pair
8,831,612 UART: [art] Store priv key in slot 0x5
8,844,648 UART: [art] Derive Key Pair - Done
8,859,606 UART: [art] Signing Cert with AUTHO
8,860,086 UART: RITY.KEYID = 7
8,875,174 UART: [art] Erasing AUTHORITY.KEYID = 7
8,875,939 UART: [art] PUB.X = 091314CF6E36B57FBC75BF777D060BC1EA35F3D10AEE4C3105353FE4F26EF27549744D6B66F9F900FB134CDF9FF0EFF5
8,882,688 UART: [art] PUB.Y = B7C04227E19D2BF155CF746DCAD4251E743747A3FB11A1527672D55CDC34E8C56F2D1DE85C6719F3834DD898711DFA3B
8,889,646 UART: [art] SIG.R = AC8487745A593909EDB0D523B7715741D232EC70C2298D56D8A7450DED67389BAF6F242526A1D7544A8C75A37132677F
8,896,404 UART: [art] SIG.S = 9AD2B9BC3EF5245237D012C9B7810568A299763C37421A23CE3F4B8906C91DCA4345C377F455A567A55CE8C777386A75
8,920,083 UART: mbox::rt_entry...
8,920,455 UART: ____ _ _ _ ____ _____
8,921,239 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,922,039 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,922,807 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,923,575 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,924,343 UART: |_|
8,924,655 UART:
9,203,024 UART: [rt] Runtime listening for mailbox commands...
11,504,552 >>> mbox cmd response: success
11,504,552 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,517,765 UART:
11,517,781 UART: Running Caliptra FMC ...
11,518,189 UART:
11,518,243 UART: [state] CFI Enabled
11,606,530 UART: [art] Extend RT PCRs Done
11,606,958 UART: [art] Lock RT PCRs Done
11,608,231 UART: [art] Populate DV Done
11,616,486 UART: [fht] FMC Alias Private Key: 7
11,617,556 UART: [art] Derive CDI
11,617,836 UART: [art] Store in in slot 0x4
11,703,315 UART: [art] Derive Key Pair
11,703,675 UART: [art] Store priv key in slot 0x5
11,717,361 UART: [art] Derive Key Pair - Done
11,732,082 UART: [art] Signing Cert with AUTHO
11,732,562 UART: RITY.KEYID = 7
11,747,530 UART: [art] Erasing AUTHORITY.KEYID = 7
11,748,295 UART: [art] PUB.X = 158C7C3D9E73F73B1599A38508BEE6D493831B9EEAA5F0B417CFBBF344BF0D28F2A64B02CBA6273997E414E5FAF829BE
11,755,072 UART: [art] PUB.Y = 93DCADD545E44BA18615D7BF18FD3443D73799DE321BA3DAD58E79E2B485E00B69ED52D63B54416DF1C1270422D9B49E
11,762,026 UART: [art] SIG.R = 35A18793005662CC80B0EDE811B0FF96BCF587A106DBB397E9DDFF85261E872C283A4A49BA2F9313890C9DB86B85808B
11,768,774 UART: [art] SIG.S = 8E5A18C90785CE63804493AC061A357BD363DBE524D75704A697FF840FEB27755B88421D03A550D15AB05A53EFE9E440
11,791,766 UART: mbox::rt_entry...
11,792,138 UART: ____ _ _ _ ____ _____
11,792,922 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,793,722 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,794,490 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,795,258 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,796,026 UART: |_|
11,796,338 UART:
12,079,224 UART: [rt] Runtime listening for mailbox commands...
12,080,420 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.58s
Truncated 2720 bytes from beginning
roc] Image verified using Vendor ECC Key Index 0
2,506,660 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,536,012 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,618,467 >>> mbox cmd response: success
2,618,467 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,619,665 UART: [afmc] ++
2,619,833 UART: [afmc] CDI.KEYID = 6
2,620,195 UART: [afmc] SUBJECT.KEYID = 7
2,620,620 UART: [afmc] AUTHORITY.KEYID = 5
2,655,459 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,671,719 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,672,499 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,678,227 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,684,112 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,689,802 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,697,727 UART: [afmc] --
2,698,849 UART: [cold-reset] --
2,699,699 UART: [state] Locking Datavault
2,700,744 UART: [state] Locking PCR0, PCR1 and PCR31
2,701,348 UART: [state] Locking ICCM
2,701,796 UART: [exit] Launching FMC @ 0x40000130
2,707,125 UART:
2,707,141 UART: Running Caliptra FMC ...
2,707,549 UART:
2,707,692 UART: [state] CFI Enabled
2,718,185 UART: [fht] FMC Alias Private Key: 7
2,825,794 UART: [art] Extend RT PCRs Done
2,826,222 UART: [art] Lock RT PCRs Done
2,827,994 UART: [art] Populate DV Done
2,835,849 UART: [fht] FMC Alias Private Key: 7
2,836,933 UART: [art] Derive CDI
2,837,213 UART: [art] Store in in slot 0x4
2,922,790 UART: [art] Derive Key Pair
2,923,150 UART: [art] Store priv key in slot 0x5
2,935,980 UART: [art] Derive Key Pair - Done
2,950,716 UART: [art] Signing Cert with AUTHO
2,951,196 UART: RITY.KEYID = 7
2,966,126 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,891 UART: [art] PUB.X = 09BF08F1AF8D9B82DD20C086EF1F2FAF7D65E8C8A2096D879DD7E9E389A165BABBB6C7808ABB6052FF6AC524FB05B0FC
2,973,675 UART: [art] PUB.Y = 49A7470ED585D18D0997C00D4DBF69F67DE9B1641D2C31BBA2E21B60CCC78FD5939163FFC0138C91187AB13D5DA731F2
2,980,626 UART: [art] SIG.R = 8E4D94B72AA25B3EAFCE612C82A9D7DCFA2E85D8DDDC08D091A011F109FCBA830421A7A64204E1F5468BE3D6A1B9DCB2
2,987,408 UART: [art] SIG.S = 652049A8F24E424FC23991781CAEF6DF9926B0D21A7191EC9BB135708E6D41E303AD1CF5BD8D543387B7F42C6F8E7340
3,010,722 UART: mbox::rt_entry...
3,011,094 UART: ____ _ _ _ ____ _____
3,011,878 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,678 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,013,446 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,014,214 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,982 UART: |_|
3,015,294 UART:
3,122,258 UART: [rt] Runtime listening for mailbox commands...
3,123,445 >>> mbox cmd response data (48 bytes)
3,123,446 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,123,560 UART:
3,123,576 UART: Running Caliptra ROM ...
3,123,984 UART:
3,124,125 UART: [state] CFI Enabled
3,127,021 UART: [state] LifecycleState = Unprovisioned
3,127,676 UART: [state] DebugLocked = No
3,128,390 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,129,887 UART: [kat] SHA2-256
3,923,818 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,927,933 UART: [kat] ++
3,928,085 UART: [kat] sha1
3,932,237 UART: [kat] SHA2-256
3,934,175 UART: [kat] SHA2-384
3,936,898 UART: [kat] SHA2-512-ACC
3,938,798 UART: [kat] ECC-384
3,944,577 UART: [kat] HMAC-384Kdf
3,949,215 UART: [kat] LMS
4,517,411 UART: [kat] --
4,518,496 UART: [update-reset] ++
5,853,798 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,854,948 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,004,824 >>> mbox cmd response: success
6,004,824 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
6,005,093 UART: [update-reset] Copying MAN_2 To MAN_1
6,013,107 UART: [update-reset Success] --
6,014,172 UART: [state] Locking Datavault
6,014,948 UART: [state] Locking PCR0, PCR1 and PCR31
6,015,552 UART: [state] Locking ICCM
6,016,088 UART: [exit] Launching FMC @ 0x40000130
6,021,417 UART:
6,021,433 UART: Running Caliptra FMC ...
6,021,841 UART:
6,021,984 UART: [state] CFI Enabled
6,111,441 UART: [art] Extend RT PCRs Done
6,111,869 UART: [art] Lock RT PCRs Done
6,112,892 UART: [art] Populate DV Done
6,121,401 UART: [fht] FMC Alias Private Key: 7
6,122,395 UART: [art] Derive CDI
6,122,675 UART: [art] Store in in slot 0x4
6,208,514 UART: [art] Derive Key Pair
6,208,874 UART: [art] Store priv key in slot 0x5
6,222,764 UART: [art] Derive Key Pair - Done
6,237,628 UART: [art] Signing Cert with AUTHO
6,238,108 UART: RITY.KEYID = 7
6,253,400 UART: [art] Erasing AUTHORITY.KEYID = 7
6,254,165 UART: [art] PUB.X = 43D6922A0D02A12688ECEC743324227A493C0C2BB3B014DCF2EB1BA40BE3014B4267AB775018D13D3C903575C4F9E742
6,260,922 UART: [art] PUB.Y = FA9663768BBB3919B65A790970415687A0BAABC3D63DCC4C27FD33D4A06090C1E01C07C3ADB9E83B913EEB597BEF26D8
6,267,880 UART: [art] SIG.R = 384D8672C66179BC61D7377125B045A6B7AC8E10A381F9225BB03BF31E188E678C0C282B0FAA7EFBF6F17BB4E9B2F627
6,274,652 UART: [art] SIG.S = C2DF02C0BC59803D600446E96252ED9DA62D79A4C095D50E817BA7D7B69912C797DB0222454331E2BEF4BB4847060D96
6,298,801 UART: Caliptra RT
6,299,146 UART: [state] CFI Enabled
6,582,263 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,613,447 UART: [rt]cmd =0x4d454153, len=108
6,634,020 >>> mbox cmd response data (12 bytes)
6,634,021 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,634,699 UART:
6,634,715 UART: Running Caliptra ROM ...
6,635,123 UART:
6,635,264 UART: [state] CFI Enabled
6,637,952 UART: [state] LifecycleState = Unprovisioned
6,638,607 UART: [state] DebugLocked = No
6,639,311 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,641,012 UART: [kat] SHA2-256
7,434,943 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,439,058 UART: [kat] ++
7,439,210 UART: [kat] sha1
7,443,514 UART: [kat] SHA2-256
7,445,452 UART: [kat] SHA2-384
7,448,045 UART: [kat] SHA2-512-ACC
7,449,945 UART: [kat] ECC-384
7,455,600 UART: [kat] HMAC-384Kdf
7,460,356 UART: [kat] LMS
8,028,552 UART: [kat] --
8,029,427 UART: [update-reset] ++
8,956,391 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,957,563 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,053,997 >>> mbox cmd response: success
9,053,997 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
9,054,348 UART: [update-reset] Copying MAN_2 To MAN_1
9,062,362 UART: [update-reset Success] --
9,063,413 UART: [state] Locking Datavault
9,064,119 UART: [state] Locking PCR0, PCR1 and PCR31
9,064,723 UART: [state] Locking ICCM
9,065,257 UART: [exit] Launching FMC @ 0x40000130
9,070,586 UART:
9,070,602 UART: Running Caliptra FMC ...
9,071,010 UART:
9,071,153 UART: [state] CFI Enabled
9,160,220 UART: [art] Extend RT PCRs Done
9,160,648 UART: [art] Lock RT PCRs Done
9,161,849 UART: [art] Populate DV Done
9,170,226 UART: [fht] FMC Alias Private Key: 7
9,171,224 UART: [art] Derive CDI
9,171,504 UART: [art] Store in in slot 0x4
9,256,745 UART: [art] Derive Key Pair
9,257,105 UART: [art] Store priv key in slot 0x5
9,270,401 UART: [art] Derive Key Pair - Done
9,284,888 UART: [art] Signing Cert with AUTHO
9,285,368 UART: RITY.KEYID = 7
9,300,826 UART: [art] Erasing AUTHORITY.KEYID = 7
9,301,591 UART: [art] PUB.X = 073C65495EA2AD087340F20431F80C3F944117167F1DCC130D6A8BF579813A375EFB4649A51B016C7CE1E296E4695449
9,308,337 UART: [art] PUB.Y = 8A8060346172667A1B227E6ADA0167A0D2671927E7987D1C362E9178EC02BA37F3A37F58E3E953FA10FAE9562F4B03AD
9,315,278 UART: [art] SIG.R = 3BD7930495A7586DA11183059A5FD81BDFDB410D908C855350E4C75D3E2204A220CBE4F1102DB88BE267FBB4C89373B0
9,322,040 UART: [art] SIG.S = E76D0271588C4DDB12853DBCD95BBEF430B7AF95721FC3E1357A75E0AD6C89B95E49F693F63CACDDB3D11B0DE1A320F3
9,346,181 UART: mbox::rt_entry...
9,346,553 UART: ____ _ _ _ ____ _____
9,347,337 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,348,137 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,348,905 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,349,673 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,350,441 UART: |_|
9,350,753 UART:
9,629,067 UART: [rt] Runtime listening for mailbox commands...
9,630,034 UART:
9,630,050 UART: Running Caliptra ROM ...
9,630,458 UART:
9,630,599 UART: [state] CFI Enabled
9,633,157 UART: [state] LifecycleState = Unprovisioned
9,633,812 UART: [state] DebugLocked = No
9,634,440 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,636,055 UART: [kat] SHA2-256
10,429,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,434,101 UART: [kat] ++
10,434,253 UART: [kat] sha1
10,438,599 UART: [kat] SHA2-256
10,440,537 UART: [kat] SHA2-384
10,443,406 UART: [kat] SHA2-512-ACC
10,445,306 UART: [kat] ECC-384
10,450,703 UART: [kat] HMAC-384Kdf
10,455,359 UART: [kat] LMS
11,023,555 UART: [kat] --
11,024,470 UART: [update-reset] ++
11,951,474 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,952,624 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
12,049,058 >>> mbox cmd response: success
12,049,058 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,049,307 UART: [update-reset] Copying MAN_2 To MAN_1
12,057,321 UART: [update-reset Success] --
12,058,308 UART: [state] Locking Datavault
12,058,866 UART: [state] Locking PCR0, PCR1 and PCR31
12,059,470 UART: [state] Locking ICCM
12,060,114 UART: [exit] Launching FMC @ 0x40000130
12,065,443 UART:
12,065,459 UART: Running Caliptra FMC ...
12,065,867 UART:
12,066,010 UART: [state] CFI Enabled
12,154,711 UART: [art] Extend RT PCRs Done
12,155,139 UART: [art] Lock RT PCRs Done
12,156,478 UART: [art] Populate DV Done
12,164,633 UART: [fht] FMC Alias Private Key: 7
12,165,573 UART: [art] Derive CDI
12,165,853 UART: [art] Store in in slot 0x4
12,251,444 UART: [art] Derive Key Pair
12,251,804 UART: [art] Store priv key in slot 0x5
12,265,746 UART: [art] Derive Key Pair - Done
12,280,554 UART: [art] Signing Cert with AUTHO
12,281,034 UART: RITY.KEYID = 7
12,295,874 UART: [art] Erasing AUTHORITY.KEYID = 7
12,296,639 UART: [art] PUB.X = 734DC5324B664E081298725502AB0CC489E115BD52835D663EDA9F81C982558E3CA05581853F37BCFADF2AB819FE366A
12,303,402 UART: [art] PUB.Y = 23854DB293D2A105456068E54A1833D04BA37985D79A1B6A3010B69204D4023DE18E2209E5FCFA3F8DCC876C0686CC1D
12,310,337 UART: [art] SIG.R = 9EB7CD20EF6B839BE5F068EEEB1E9556FDFF3AE4229E85E8C91F3D124F509A35A2EC167606B90F9000848DFB7B0B8470
12,317,090 UART: [art] SIG.S = A1280D66AECA5718B3345A0AA62725D6C2B2E28D2FD5E3B03FCA035C98215187FED5C04631D06C43E278E4232D9736E7
12,341,092 UART: mbox::rt_entry...
12,341,464 UART: ____ _ _ _ ____ _____
12,342,248 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,343,048 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,343,816 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,344,584 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,345,352 UART: |_|
12,345,664 UART:
12,625,489 UART: [rt] Runtime listening for mailbox commands...
12,626,685 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,030 ready_for_fw is high
1,363,030 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,468,633 >>> mbox cmd response: success
2,468,633 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,531,317 UART:
2,531,333 UART: Running Caliptra FMC ...
2,531,741 UART:
2,531,884 UART: [state] CFI Enabled
2,542,743 UART: [fht] FMC Alias Private Key: 7
2,651,066 UART: [art] Extend RT PCRs Done
2,651,494 UART: [art] Lock RT PCRs Done
2,653,024 UART: [art] Populate DV Done
2,661,279 UART: [fht] FMC Alias Private Key: 7
2,662,375 UART: [art] Derive CDI
2,662,655 UART: [art] Store in in slot 0x4
2,748,160 UART: [art] Derive Key Pair
2,748,520 UART: [art] Store priv key in slot 0x5
2,762,206 UART: [art] Derive Key Pair - Done
2,776,799 UART: [art] Signing Cert with AUTHO
2,777,279 UART: RITY.KEYID = 7
2,791,769 UART: [art] Erasing AUTHORITY.KEYID = 7
2,792,534 UART: [art] PUB.X = F285CAE016E6E681E44DEAE8A5DACEBE921ABABB720BDE24CF93D537AED8C50BCF784B148A5CE3733892F1349067F366
2,799,320 UART: [art] PUB.Y = 6D37F362E6566CEA2A316910B6362E6852EDAEB1B57B4313AA36A273718F814E936DE1BC56190A40D853CE92C7E8D6AC
2,806,273 UART: [art] SIG.R = 7BBEFBD24F38EC397D767AECFFBFFFE8CA0D0EE7782E0DBAF054326A7DDBE3172D5F41FAF5D3CAE2FF9E2C9472A7E598
2,813,072 UART: [art] SIG.S = 063DF3010C058CBF0EB16B1F52337C45DCA1D99038EA37A5095D123CC4543FE3BB8570A4937380992B4F5A27D13DB7B0
2,837,179 UART: mbox::rt_entry...
2,837,551 UART: ____ _ _ _ ____ _____
2,838,335 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,839,135 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,839,903 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,840,671 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,841,439 UART: |_|
2,841,751 UART:
2,948,056 UART: [rt] Runtime listening for mailbox commands...
2,949,243 >>> mbox cmd response data (48 bytes)
2,949,244 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,710,148 >>> mbox cmd response: success
5,710,148 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,723,619 UART:
5,723,635 UART: Running Caliptra FMC ...
5,724,043 UART:
5,724,186 UART: [state] CFI Enabled
5,813,217 UART: [art] Extend RT PCRs Done
5,813,645 UART: [art] Lock RT PCRs Done
5,814,810 UART: [art] Populate DV Done
5,823,163 UART: [fht] FMC Alias Private Key: 7
5,824,211 UART: [art] Derive CDI
5,824,491 UART: [art] Store in in slot 0x4
5,910,294 UART: [art] Derive Key Pair
5,910,654 UART: [art] Store priv key in slot 0x5
5,923,232 UART: [art] Derive Key Pair - Done
5,937,721 UART: [art] Signing Cert with AUTHO
5,938,201 UART: RITY.KEYID = 7
5,953,779 UART: [art] Erasing AUTHORITY.KEYID = 7
5,954,544 UART: [art] PUB.X = 0C39D187DABA9D2CF94ED4702962013EDD083D56FD5E344028018A07F1E33D6435384346A4CD48CB690701D86D752975
5,961,289 UART: [art] PUB.Y = F0E310F0112A8CC453ED42F004AE486A7E2D476641C8B38B9A3365EE9DAEC61F761C8C5976BF6D36D24ACB3D6CE7F5AB
5,968,254 UART: [art] SIG.R = 5A76C2D0E74A3C2B59660C9F9D1832ED9D2EC2F9457B1F10831BAC16AF0DF99BF1C1772B92D6DED5A15106B697D9792E
5,975,027 UART: [art] SIG.S = 9EA80466BF4FDAA45C36885D771D5CF2F7C5F4B99613E073D50844C6F82BA9DA00FF6FE2BF5910D3C48300246FCB5750
5,999,156 UART: Caliptra RT
5,999,501 UART: [state] CFI Enabled
6,285,312 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,316,322 UART: [rt]cmd =0x4d454153, len=108
6,337,465 >>> mbox cmd response data (12 bytes)
6,337,466 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,640,396 >>> mbox cmd response: success
8,640,396 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,653,471 UART:
8,653,487 UART: Running Caliptra FMC ...
8,653,895 UART:
8,654,038 UART: [state] CFI Enabled
8,743,187 UART: [art] Extend RT PCRs Done
8,743,615 UART: [art] Lock RT PCRs Done
8,744,978 UART: [art] Populate DV Done
8,753,141 UART: [fht] FMC Alias Private Key: 7
8,754,289 UART: [art] Derive CDI
8,754,569 UART: [art] Store in in slot 0x4
8,840,292 UART: [art] Derive Key Pair
8,840,652 UART: [art] Store priv key in slot 0x5
8,854,184 UART: [art] Derive Key Pair - Done
8,869,039 UART: [art] Signing Cert with AUTHO
8,869,519 UART: RITY.KEYID = 7
8,884,907 UART: [art] Erasing AUTHORITY.KEYID = 7
8,885,672 UART: [art] PUB.X = 68F95142CCDB55C16FCA6205BB380CC11EF0B24DD6BEFEB9DA27367FF865EAAE654F269D7ADD3C2BB4C6B9D0358F07BD
8,892,461 UART: [art] PUB.Y = 87907BCCE9EB1D42264F85848F86EBBFD54654C3F7F0F739F1F9CDFE34C6BEAE134CAE2D04D22C836B6103D0A5C5BDA8
8,899,427 UART: [art] SIG.R = 3FB1BFFB616865D8B99759D0D6174027FA3488EF310FE98407DB2B1D283007DCFBF4A2EC275B1024CB0B64D2C5D6552C
8,906,195 UART: [art] SIG.S = 1D19D600EF5A5910B4416EE0C3610FCE4A3A0781E527BBEBE1F8F1C7F493E3FDBED247DB28DED2243C4AB60982353C89
8,929,845 UART: mbox::rt_entry...
8,930,217 UART: ____ _ _ _ ____ _____
8,931,001 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,931,801 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,932,569 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,933,337 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,934,105 UART: |_|
8,934,417 UART:
9,214,908 UART: [rt] Runtime listening for mailbox commands...
11,517,065 >>> mbox cmd response: success
11,517,065 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,530,426 UART:
11,530,442 UART: Running Caliptra FMC ...
11,530,850 UART:
11,530,993 UART: [state] CFI Enabled
11,620,422 UART: [art] Extend RT PCRs Done
11,620,850 UART: [art] Lock RT PCRs Done
11,622,081 UART: [art] Populate DV Done
11,630,228 UART: [fht] FMC Alias Private Key: 7
11,631,182 UART: [art] Derive CDI
11,631,462 UART: [art] Store in in slot 0x4
11,716,933 UART: [art] Derive Key Pair
11,717,293 UART: [art] Store priv key in slot 0x5
11,730,339 UART: [art] Derive Key Pair - Done
11,745,110 UART: [art] Signing Cert with AUTHO
11,745,590 UART: RITY.KEYID = 7
11,760,914 UART: [art] Erasing AUTHORITY.KEYID = 7
11,761,679 UART: [art] PUB.X = 4024A2F2F31D633E008C8F56289A12E4E9DC172EBFB142A0E5B3B360DB8218F6F71EFBC374E814CA52E146A4EA42A489
11,768,437 UART: [art] PUB.Y = B6A2918AD6008B1893685B98B31DCCC029C1B2A181447FEF6E3A282CB24776FD03F166AD212C239723827236A67D8241
11,775,358 UART: [art] SIG.R = F60143723CAD47F3B5A99607B94062007E5B6011D99E8450B411CC7D4FFEFB2015812CC19F37BF12CE3B464E3D770200
11,782,075 UART: [art] SIG.S = 16272B1EAE4BF856DDFE8469A9C4F5166C003ABAF2A9638930F20E85C3DC40310820027D828A2B705112B661759DB4BA
11,805,279 UART: mbox::rt_entry...
11,805,651 UART: ____ _ _ _ ____ _____
11,806,435 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,807,235 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,808,003 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,808,771 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,809,539 UART: |_|
11,809,851 UART:
12,086,631 UART: [rt] Runtime listening for mailbox commands...
12,087,827 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.56s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,284,934 UART: [fwproc] Recv'd Img size: 78704 bytes
2,175,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,578 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,882 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,314,147 >>> mbox cmd response: success
2,314,147 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,315,387 UART: [afmc] ++
2,315,555 UART: [afmc] CDI.KEYID = 6
2,315,917 UART: [afmc] SUBJECT.KEYID = 7
2,316,342 UART: [afmc] AUTHORITY.KEYID = 5
2,352,159 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,368,676 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,424 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,375,152 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,381,037 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,756 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,514 UART: [afmc] --
2,395,434 UART: [cold-reset] --
2,396,172 UART: [state] Locking Datavault
2,397,255 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,859 UART: [state] Locking ICCM
2,398,427 UART: [exit] Launching FMC @ 0x40000130
2,403,756 UART:
2,403,772 UART: Running Caliptra FMC ...
2,404,180 UART:
2,404,234 UART: [state] CFI Enabled
2,414,857 UART: [fht] FMC Alias Private Key: 7
2,522,628 UART: [art] Extend RT PCRs Done
2,523,056 UART: [art] Lock RT PCRs Done
2,524,978 UART: [art] Populate DV Done
2,533,475 UART: [fht] FMC Alias Private Key: 7
2,534,469 UART: [art] Derive CDI
2,534,749 UART: [art] Store in in slot 0x4
2,620,392 UART: [art] Derive Key Pair
2,620,752 UART: [art] Store priv key in slot 0x5
2,633,814 UART: [art] Derive Key Pair - Done
2,648,711 UART: [art] Signing Cert with AUTHO
2,649,191 UART: RITY.KEYID = 7
2,664,487 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,252 UART: [art] PUB.X = A2AD6F272E3BFE585CAC7CEDBD7C0566F69006368EA2A98B3AA971BA921F8890C8E8E6BD278E0629CFD4BBE259301BAD
2,672,035 UART: [art] PUB.Y = C3AAD01471FB73D559ADD5FBEF48A0A4A9AF2DB5CAD4CF271C18AE8F84D2C290F4B1882541BC85C589124A66AE89EA1C
2,679,009 UART: [art] SIG.R = F63A741C0EF5A9D43C8B6BCF75F300625D1AF9099BA4034217739C01BCE573B7C9F3BA39A2002CFCDE4130DC8E1FF1CF
2,685,741 UART: [art] SIG.S = 664238C67C266FB614944A5DE0AF2BFD09131CEE7B0F151001399802E4E70D101A94AC2DA273B294D7C892A841EEE8BE
2,709,645 UART: mbox::rt_entry...
2,710,017 UART: ____ _ _ _ ____ _____
2,710,801 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,601 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,712,369 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,713,137 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,905 UART: |_|
2,714,217 UART:
2,820,097 UART: [rt] Runtime listening for mailbox commands...
2,821,284 >>> mbox cmd response data (48 bytes)
2,821,285 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,821,396 UART:
2,821,412 UART: Running Caliptra ROM ...
2,821,820 UART:
2,821,875 UART: [state] CFI Enabled
2,824,647 UART: [state] LifecycleState = Unprovisioned
2,825,302 UART: [state] DebugLocked = No
2,825,918 UART: [state] WD Timer not started. Device not locked for debugging
2,827,164 UART: [kat] SHA2-256
3,632,814 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,636,939 UART: [kat] ++
3,637,091 UART: [kat] sha1
3,641,415 UART: [kat] SHA2-256
3,643,355 UART: [kat] SHA2-384
3,646,084 UART: [kat] SHA2-512-ACC
3,647,984 UART: [kat] ECC-384
3,657,703 UART: [kat] HMAC-384Kdf
3,662,395 UART: [kat] LMS
3,910,723 UART: [kat] --
3,911,847 UART: [update-reset] ++
5,223,743 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,224,736 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,374,560 >>> mbox cmd response: success
5,374,560 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,374,911 UART: [update-reset] Copying MAN_2 To MAN_1
5,382,925 UART: [update-reset Success] --
5,383,904 UART: [state] Locking Datavault
5,384,760 UART: [state] Locking PCR0, PCR1 and PCR31
5,385,364 UART: [state] Locking ICCM
5,385,970 UART: [exit] Launching FMC @ 0x40000130
5,391,299 UART:
5,391,315 UART: Running Caliptra FMC ...
5,391,723 UART:
5,391,777 UART: [state] CFI Enabled
5,481,250 UART: [art] Extend RT PCRs Done
5,481,678 UART: [art] Lock RT PCRs Done
5,483,005 UART: [art] Populate DV Done
5,491,468 UART: [fht] FMC Alias Private Key: 7
5,492,602 UART: [art] Derive CDI
5,492,882 UART: [art] Store in in slot 0x4
5,578,683 UART: [art] Derive Key Pair
5,579,043 UART: [art] Store priv key in slot 0x5
5,591,825 UART: [art] Derive Key Pair - Done
5,606,541 UART: [art] Signing Cert with AUTHO
5,607,021 UART: RITY.KEYID = 7
5,622,293 UART: [art] Erasing AUTHORITY.KEYID = 7
5,623,058 UART: [art] PUB.X = 4DC63500FAA23F39318E21F61A1F4AC55C289806C1331C01612087A9CBCFD1B5C6B61DE8EC776E6AA02B093EEC811712
5,629,805 UART: [art] PUB.Y = 193697FD69E64935F0D20F55D195B5A022D2B7DBB6F7AA43B447F36AE646E20B48C492024748F64FD433527C5F59C8A4
5,636,746 UART: [art] SIG.R = 6D954278CE173072B8C7D6365F2E377375A45B00C9D41E0ADFE7F1D502A81BCC59713E6F3AE3778FD8397047D333A13E
5,643,490 UART: [art] SIG.S = 5E088BE6D0E9D8047BE7504727DB9DEF5D80A0D6B0D55D73A4E1244CAC4171A7643886453D9ED7386E5DD54392F69E95
5,667,067 UART: Caliptra RT
5,667,320 UART: [state] CFI Enabled
5,947,461 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,978,695 UART: [rt]cmd =0x4d454153, len=108
5,998,648 >>> mbox cmd response data (12 bytes)
5,998,649 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,999,548 UART:
5,999,564 UART: Running Caliptra ROM ...
5,999,972 UART:
6,000,027 UART: [state] CFI Enabled
6,002,741 UART: [state] LifecycleState = Unprovisioned
6,003,396 UART: [state] DebugLocked = No
6,004,018 UART: [state] WD Timer not started. Device not locked for debugging
6,005,374 UART: [kat] SHA2-256
6,811,024 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,815,149 UART: [kat] ++
6,815,301 UART: [kat] sha1
6,819,683 UART: [kat] SHA2-256
6,821,623 UART: [kat] SHA2-384
6,824,438 UART: [kat] SHA2-512-ACC
6,826,338 UART: [kat] ECC-384
6,836,367 UART: [kat] HMAC-384Kdf
6,841,079 UART: [kat] LMS
7,089,407 UART: [kat] --
7,090,081 UART: [update-reset] ++
7,995,529 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,996,622 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,093,004 >>> mbox cmd response: success
8,093,004 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,093,229 UART: [update-reset] Copying MAN_2 To MAN_1
8,101,243 UART: [update-reset Success] --
8,102,210 UART: [state] Locking Datavault
8,103,070 UART: [state] Locking PCR0, PCR1 and PCR31
8,103,674 UART: [state] Locking ICCM
8,104,160 UART: [exit] Launching FMC @ 0x40000130
8,109,489 UART:
8,109,505 UART: Running Caliptra FMC ...
8,109,913 UART:
8,109,967 UART: [state] CFI Enabled
8,198,726 UART: [art] Extend RT PCRs Done
8,199,154 UART: [art] Lock RT PCRs Done
8,200,313 UART: [art] Populate DV Done
8,208,576 UART: [fht] FMC Alias Private Key: 7
8,209,744 UART: [art] Derive CDI
8,210,024 UART: [art] Store in in slot 0x4
8,295,665 UART: [art] Derive Key Pair
8,296,025 UART: [art] Store priv key in slot 0x5
8,309,649 UART: [art] Derive Key Pair - Done
8,324,140 UART: [art] Signing Cert with AUTHO
8,324,620 UART: RITY.KEYID = 7
8,339,696 UART: [art] Erasing AUTHORITY.KEYID = 7
8,340,461 UART: [art] PUB.X = 738B9D91B18B9757611D78BFBC1DEE4F0B798B64C6595BC4F37993E52A5AB10735D33C868A9CA7D4E53BED46B48ABB1D
8,347,239 UART: [art] PUB.Y = 955E1028D2A7F5C966ABDE7A6BBFD94EB95D509F246E66376C741B3E7F8470774CE0AFB5E0D74D3952BC8B12FB5AF5D8
8,354,205 UART: [art] SIG.R = 4EAFB1E1B6AE8B2D6E6A18B63A8288735AADECEA874AD0327B12091F4B249BFD4E5F145F90F073DB42649A5379441CF4
8,360,986 UART: [art] SIG.S = 488A05B87E4E99863F080EF6CD34784BF06B61372B42EA4768C19253C751CFF62B5550F702149B639EAC889D51868FB7
8,384,247 UART: mbox::rt_entry...
8,384,619 UART: ____ _ _ _ ____ _____
8,385,403 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,386,203 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,386,971 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,387,739 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,388,507 UART: |_|
8,388,819 UART:
8,666,471 UART: [rt] Runtime listening for mailbox commands...
8,667,435 UART:
8,667,451 UART: Running Caliptra ROM ...
8,667,859 UART:
8,667,914 UART: [state] CFI Enabled
8,670,380 UART: [state] LifecycleState = Unprovisioned
8,671,035 UART: [state] DebugLocked = No
8,671,653 UART: [state] WD Timer not started. Device not locked for debugging
8,672,785 UART: [kat] SHA2-256
9,478,435 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,482,560 UART: [kat] ++
9,482,712 UART: [kat] sha1
9,486,944 UART: [kat] SHA2-256
9,488,884 UART: [kat] SHA2-384
9,491,491 UART: [kat] SHA2-512-ACC
9,493,391 UART: [kat] ECC-384
9,502,856 UART: [kat] HMAC-384Kdf
9,507,476 UART: [kat] LMS
9,755,804 UART: [kat] --
9,756,704 UART: [update-reset] ++
10,662,054 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,663,017 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
10,759,399 >>> mbox cmd response: success
10,759,399 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,759,544 UART: [update-reset] Copying MAN_2 To MAN_1
10,767,558 UART: [update-reset Success] --
10,768,397 UART: [state] Locking Datavault
10,769,253 UART: [state] Locking PCR0, PCR1 and PCR31
10,769,857 UART: [state] Locking ICCM
10,770,529 UART: [exit] Launching FMC @ 0x40000130
10,775,858 UART:
10,775,874 UART: Running Caliptra FMC ...
10,776,282 UART:
10,776,336 UART: [state] CFI Enabled
10,865,785 UART: [art] Extend RT PCRs Done
10,866,213 UART: [art] Lock RT PCRs Done
10,867,486 UART: [art] Populate DV Done
10,875,829 UART: [fht] FMC Alias Private Key: 7
10,876,861 UART: [art] Derive CDI
10,877,141 UART: [art] Store in in slot 0x4
10,962,510 UART: [art] Derive Key Pair
10,962,870 UART: [art] Store priv key in slot 0x5
10,975,428 UART: [art] Derive Key Pair - Done
10,990,057 UART: [art] Signing Cert with AUTHO
10,990,537 UART: RITY.KEYID = 7
11,005,403 UART: [art] Erasing AUTHORITY.KEYID = 7
11,006,168 UART: [art] PUB.X = BAEA10A915C25A30177C2025B4CF0E1FB301674274470F277EC7E9CA496C59A26F1652901BA467A5EFECDA976F40AB5A
11,012,939 UART: [art] PUB.Y = 8D96DA6021278C29270B524A72EF8878FDCE8B4A9E3445DD8430735E712D2C3A362A29AFBD267900585F968BD6355D99
11,019,862 UART: [art] SIG.R = 66C5B4B61EB1F5ADB1754DFEB9CB04267F2A43C161C278BE204D81F29BA673B047DDF7EB0E58442FCBC713D18343FD8A
11,026,644 UART: [art] SIG.S = 9210E9AEC3F18890D05FC01C3311470F8A4D7D002009520A94A646BF8B148F7004716FD5C13534E805D5FDE3ADE90E9A
11,049,829 UART: mbox::rt_entry...
11,050,201 UART: ____ _ _ _ ____ _____
11,050,985 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,051,785 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,052,553 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,053,321 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,054,089 UART: |_|
11,054,401 UART:
11,334,481 UART: [rt] Runtime listening for mailbox commands...
11,335,677 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,149 ready_for_fw is high
1,060,149 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,204 >>> mbox cmd response: success
2,165,204 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,226,840 UART:
2,226,856 UART: Running Caliptra FMC ...
2,227,264 UART:
2,227,318 UART: [state] CFI Enabled
2,237,581 UART: [fht] FMC Alias Private Key: 7
2,345,800 UART: [art] Extend RT PCRs Done
2,346,228 UART: [art] Lock RT PCRs Done
2,347,892 UART: [art] Populate DV Done
2,356,167 UART: [fht] FMC Alias Private Key: 7
2,357,095 UART: [art] Derive CDI
2,357,375 UART: [art] Store in in slot 0x4
2,442,630 UART: [art] Derive Key Pair
2,442,990 UART: [art] Store priv key in slot 0x5
2,455,840 UART: [art] Derive Key Pair - Done
2,470,608 UART: [art] Signing Cert with AUTHO
2,471,088 UART: RITY.KEYID = 7
2,486,214 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,979 UART: [art] PUB.X = 7C584DB4FE0C74BAE42306CB82CF3D0BBCBE2D8204299FF64D9F8EF2602D91A51EE88B82169A2D4D89A86970F79108D9
2,493,746 UART: [art] PUB.Y = 6F76CB07A55B18DE57161533BBBE871DDB4D1DB5C40182C9D9FE4E5087BA6D5CF028EC7BE7070A72B6AD0CB7C3F88A8C
2,500,703 UART: [art] SIG.R = 3C8A7893D3138B5EE0BA13AC37E733C95AC644FCF8CF6B08ED08D3938328133D723D35F9174B595FA0C0E1B9CC5A6A65
2,507,477 UART: [art] SIG.S = 66B7F53C4DC96BC6B61E5493819F5ABBBFD531C62289373811874821FD3BEB33AA71EDDC7800367233477D8B45A61521
2,530,572 UART: mbox::rt_entry...
2,530,944 UART: ____ _ _ _ ____ _____
2,531,728 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,528 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,296 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,064 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,832 UART: |_|
2,535,144 UART:
2,640,828 UART: [rt] Runtime listening for mailbox commands...
2,642,015 >>> mbox cmd response data (48 bytes)
2,642,016 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,078,756 >>> mbox cmd response: success
5,078,756 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,092,374 UART:
5,092,390 UART: Running Caliptra FMC ...
5,092,798 UART:
5,092,852 UART: [state] CFI Enabled
5,181,383 UART: [art] Extend RT PCRs Done
5,181,811 UART: [art] Lock RT PCRs Done
5,183,038 UART: [art] Populate DV Done
5,191,249 UART: [fht] FMC Alias Private Key: 7
5,192,325 UART: [art] Derive CDI
5,192,605 UART: [art] Store in in slot 0x4
5,278,276 UART: [art] Derive Key Pair
5,278,636 UART: [art] Store priv key in slot 0x5
5,292,224 UART: [art] Derive Key Pair - Done
5,307,058 UART: [art] Signing Cert with AUTHO
5,307,538 UART: RITY.KEYID = 7
5,322,636 UART: [art] Erasing AUTHORITY.KEYID = 7
5,323,401 UART: [art] PUB.X = 33C77A9901BE29A7EC2C3CADFC425382389B547CED77B8EB93B94FE062FAB233C90A9698BE8898400D81C022793551D6
5,330,166 UART: [art] PUB.Y = 520FB94842CA298BA5953DEEE46D16607322F2F12C887D17563A68063C93C0ECC2691BF74F2D16A73C0A473FF4080785
5,337,099 UART: [art] SIG.R = 482945C7C351AFE45CAF08FE8985D4208D3C8A775EBB22AE4D1EB7BB152BAAE5FBC32BF2004DF6CFA74DAD8C51071B33
5,343,865 UART: [art] SIG.S = E88EF0350843DCBECAF0E946A87831D90475363A4B0A80855536F8554E545E71C7CF86A9F1625123C6F9F6540AD57469
5,368,076 UART: Caliptra RT
5,368,329 UART: [state] CFI Enabled
5,649,392 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,680,750 UART: [rt]cmd =0x4d454153, len=108
5,701,483 >>> mbox cmd response data (12 bytes)
5,701,484 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,677,818 >>> mbox cmd response: success
7,677,818 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,691,226 UART:
7,691,242 UART: Running Caliptra FMC ...
7,691,650 UART:
7,691,704 UART: [state] CFI Enabled
7,780,197 UART: [art] Extend RT PCRs Done
7,780,625 UART: [art] Lock RT PCRs Done
7,781,966 UART: [art] Populate DV Done
7,789,947 UART: [fht] FMC Alias Private Key: 7
7,790,963 UART: [art] Derive CDI
7,791,243 UART: [art] Store in in slot 0x4
7,877,004 UART: [art] Derive Key Pair
7,877,364 UART: [art] Store priv key in slot 0x5
7,890,596 UART: [art] Derive Key Pair - Done
7,905,142 UART: [art] Signing Cert with AUTHO
7,905,622 UART: RITY.KEYID = 7
7,920,786 UART: [art] Erasing AUTHORITY.KEYID = 7
7,921,551 UART: [art] PUB.X = FB0C45786198B2AA0D804E653606E8F2039CA890643D6DEF9AA24680F358E8CDF69A29A0295AD15BE12059BFD62ECEC5
7,928,319 UART: [art] PUB.Y = E916C4E0E5BB36F0FCFA95F6DACB337AB060C01E75AC45597E025273C6CC3E74DEA0BD7B68CDF9CFE29BCD3AB60680EE
7,935,293 UART: [art] SIG.R = F84F0A878842A04F5C966789C66FF1B19B374102DC2BFBA9463367B08DDA41B3CFAF39032B2B940E8A936309EBB68FD5
7,942,056 UART: [art] SIG.S = BD5C97738E64D1F5767E43585653CD2510522569C2D857D1F050E0E4341A8464DBE640EF2073ED7C4A77F4E54718EC23
7,966,481 UART: mbox::rt_entry...
7,966,853 UART: ____ _ _ _ ____ _____
7,967,637 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,968,437 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,969,205 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,969,973 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,970,741 UART: |_|
7,971,053 UART:
8,248,770 UART: [rt] Runtime listening for mailbox commands...
10,224,433 >>> mbox cmd response: success
10,224,433 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,238,137 UART:
10,238,153 UART: Running Caliptra FMC ...
10,238,561 UART:
10,238,615 UART: [state] CFI Enabled
10,327,620 UART: [art] Extend RT PCRs Done
10,328,048 UART: [art] Lock RT PCRs Done
10,329,315 UART: [art] Populate DV Done
10,337,446 UART: [fht] FMC Alias Private Key: 7
10,338,422 UART: [art] Derive CDI
10,338,702 UART: [art] Store in in slot 0x4
10,424,181 UART: [art] Derive Key Pair
10,424,541 UART: [art] Store priv key in slot 0x5
10,437,691 UART: [art] Derive Key Pair - Done
10,452,210 UART: [art] Signing Cert with AUTHO
10,452,690 UART: RITY.KEYID = 7
10,467,664 UART: [art] Erasing AUTHORITY.KEYID = 7
10,468,429 UART: [art] PUB.X = 832A4C49B0CF92719A56F5B80EFFF5B7062CF9C427A8A3AE0C85114953ABE58D214C69EDB96F58F0AC138B08F5F81E08
10,475,196 UART: [art] PUB.Y = FA1D10F04F9E729671D9209D26DF835FA0581F246F35A3D68CC8D98A4C9949710FCFB97A6F06FB1D6D6D731CA0C0FF74
10,482,152 UART: [art] SIG.R = 26A2175CF1CEA29F8760B7FAED2ADEAAB700D1521BE6697729539CEF9A583405DE605F049B36516376092EDAB19758D8
10,488,897 UART: [art] SIG.S = 3645257800A7C35D90078FB307E4333E4124859A1E20FAE6CBD3A9E13238B803FD118AA981727D393021CEA22FC8EA97
10,512,185 UART: mbox::rt_entry...
10,512,557 UART: ____ _ _ _ ____ _____
10,513,341 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,514,141 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,514,909 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,515,677 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,516,445 UART: |_|
10,516,757 UART:
10,797,435 UART: [rt] Runtime listening for mailbox commands...
10,798,631 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.42s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,284,451 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,876 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,063 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,367 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,722 >>> mbox cmd response: success
2,312,722 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,313,948 UART: [afmc] ++
2,314,116 UART: [afmc] CDI.KEYID = 6
2,314,478 UART: [afmc] SUBJECT.KEYID = 7
2,314,903 UART: [afmc] AUTHORITY.KEYID = 5
2,350,560 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,925 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,673 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,401 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,286 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,005 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,647 UART: [afmc] --
2,393,621 UART: [cold-reset] --
2,394,347 UART: [state] Locking Datavault
2,395,448 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,052 UART: [state] Locking ICCM
2,396,654 UART: [exit] Launching FMC @ 0x40000130
2,401,983 UART:
2,401,999 UART: Running Caliptra FMC ...
2,402,407 UART:
2,402,550 UART: [state] CFI Enabled
2,413,347 UART: [fht] FMC Alias Private Key: 7
2,521,638 UART: [art] Extend RT PCRs Done
2,522,066 UART: [art] Lock RT PCRs Done
2,523,682 UART: [art] Populate DV Done
2,531,787 UART: [fht] FMC Alias Private Key: 7
2,532,945 UART: [art] Derive CDI
2,533,225 UART: [art] Store in in slot 0x4
2,618,778 UART: [art] Derive Key Pair
2,619,138 UART: [art] Store priv key in slot 0x5
2,632,266 UART: [art] Derive Key Pair - Done
2,646,761 UART: [art] Signing Cert with AUTHO
2,647,241 UART: RITY.KEYID = 7
2,662,485 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,250 UART: [art] PUB.X = 1AD4CD2AF2AC9ED8D3B3E45EAF1FDDC58EA7CCB38904A73272B919DBB9B9F99CD62E8A6A9EFF0015A9C797B1ABAA37D7
2,670,029 UART: [art] PUB.Y = 58B8F8C524F436AED18D5576F3D1644BBF3064CF215E79E5DDC32D583FBC8AEFC85413D0812B7498D9BB3C8F0473FD6A
2,676,990 UART: [art] SIG.R = D1AC1FE022C63EABFF7C15EB134D55565937EC982F4A610E6606FA4D3E2B1B83A1141F8F64E4B789BD0274833E209DF0
2,683,761 UART: [art] SIG.S = 1CFAC1FA7C1AF972E7374ABA99A08783E7D052DC159A1353357D3F1154886E180C2BF8259257E20727893A456C2BD490
2,707,380 UART: mbox::rt_entry...
2,707,752 UART: ____ _ _ _ ____ _____
2,708,536 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,336 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,104 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,872 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,640 UART: |_|
2,711,952 UART:
2,818,708 UART: [rt] Runtime listening for mailbox commands...
2,819,895 >>> mbox cmd response data (48 bytes)
2,819,896 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,820,007 UART:
2,820,023 UART: Running Caliptra ROM ...
2,820,431 UART:
2,820,573 UART: [state] CFI Enabled
2,823,393 UART: [state] LifecycleState = Unprovisioned
2,824,048 UART: [state] DebugLocked = No
2,824,706 UART: [state] WD Timer not started. Device not locked for debugging
2,826,022 UART: [kat] SHA2-256
3,631,672 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,635,797 UART: [kat] ++
3,635,949 UART: [kat] sha1
3,640,129 UART: [kat] SHA2-256
3,642,069 UART: [kat] SHA2-384
3,644,790 UART: [kat] SHA2-512-ACC
3,646,690 UART: [kat] ECC-384
3,656,199 UART: [kat] HMAC-384Kdf
3,660,845 UART: [kat] LMS
3,909,173 UART: [kat] --
3,909,935 UART: [update-reset] ++
5,222,199 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,223,256 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,373,080 >>> mbox cmd response: success
5,373,080 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,373,363 UART: [update-reset] Copying MAN_2 To MAN_1
5,381,377 UART: [update-reset Success] --
5,382,308 UART: [state] Locking Datavault
5,383,244 UART: [state] Locking PCR0, PCR1 and PCR31
5,383,848 UART: [state] Locking ICCM
5,384,504 UART: [exit] Launching FMC @ 0x40000130
5,389,833 UART:
5,389,849 UART: Running Caliptra FMC ...
5,390,257 UART:
5,390,400 UART: [state] CFI Enabled
5,479,991 UART: [art] Extend RT PCRs Done
5,480,419 UART: [art] Lock RT PCRs Done
5,481,888 UART: [art] Populate DV Done
5,490,151 UART: [fht] FMC Alias Private Key: 7
5,491,165 UART: [art] Derive CDI
5,491,445 UART: [art] Store in in slot 0x4
5,577,578 UART: [art] Derive Key Pair
5,577,938 UART: [art] Store priv key in slot 0x5
5,591,020 UART: [art] Derive Key Pair - Done
5,606,120 UART: [art] Signing Cert with AUTHO
5,606,600 UART: RITY.KEYID = 7
5,621,572 UART: [art] Erasing AUTHORITY.KEYID = 7
5,622,337 UART: [art] PUB.X = 66FA0E096AEE05464C1FD0063261A897C19D40BD4EB97D408046F20BAF090265E61FCF164E03DB695FC16AD1E30EDB1B
5,629,092 UART: [art] PUB.Y = 526311D164396CEF278660DCC0BDF8563D0E7C7619CEF421BDCA4FFF56CECCA419015816EC2F19CEDDC7CF7A01ED9BDA
5,636,059 UART: [art] SIG.R = A0DDA87B454E5E913E986870D30F95BE1AFD15577F55EEE5C7A510F1B60C54E9AD9EB2192A33FB2F16936C42321F427A
5,642,833 UART: [art] SIG.S = 3EE7FCE203A505D92CBC2E4C4D9B759DEE808D592DD73F460E21278F83E7EE55C07F673A59CD6E37B719B4B5D89CCEAD
5,667,145 UART: Caliptra RT
5,667,490 UART: [state] CFI Enabled
5,946,787 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,978,085 UART: [rt]cmd =0x4d454153, len=108
5,998,032 >>> mbox cmd response data (12 bytes)
5,998,033 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,998,674 UART:
5,998,690 UART: Running Caliptra ROM ...
5,999,098 UART:
5,999,240 UART: [state] CFI Enabled
6,002,236 UART: [state] LifecycleState = Unprovisioned
6,002,891 UART: [state] DebugLocked = No
6,003,557 UART: [state] WD Timer not started. Device not locked for debugging
6,004,843 UART: [kat] SHA2-256
6,810,493 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,814,618 UART: [kat] ++
6,814,770 UART: [kat] sha1
6,819,116 UART: [kat] SHA2-256
6,821,056 UART: [kat] SHA2-384
6,823,773 UART: [kat] SHA2-512-ACC
6,825,673 UART: [kat] ECC-384
6,834,880 UART: [kat] HMAC-384Kdf
6,839,498 UART: [kat] LMS
7,087,826 UART: [kat] --
7,088,406 UART: [update-reset] ++
7,995,306 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,996,373 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,092,755 >>> mbox cmd response: success
8,092,755 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,093,026 UART: [update-reset] Copying MAN_2 To MAN_1
8,101,040 UART: [update-reset Success] --
8,101,915 UART: [state] Locking Datavault
8,102,537 UART: [state] Locking PCR0, PCR1 and PCR31
8,103,141 UART: [state] Locking ICCM
8,103,709 UART: [exit] Launching FMC @ 0x40000130
8,109,038 UART:
8,109,054 UART: Running Caliptra FMC ...
8,109,462 UART:
8,109,605 UART: [state] CFI Enabled
8,198,700 UART: [art] Extend RT PCRs Done
8,199,128 UART: [art] Lock RT PCRs Done
8,200,643 UART: [art] Populate DV Done
8,209,102 UART: [fht] FMC Alias Private Key: 7
8,210,140 UART: [art] Derive CDI
8,210,420 UART: [art] Store in in slot 0x4
8,296,407 UART: [art] Derive Key Pair
8,296,767 UART: [art] Store priv key in slot 0x5
8,309,989 UART: [art] Derive Key Pair - Done
8,324,679 UART: [art] Signing Cert with AUTHO
8,325,159 UART: RITY.KEYID = 7
8,340,745 UART: [art] Erasing AUTHORITY.KEYID = 7
8,341,510 UART: [art] PUB.X = BBA21D1F792D213A3F386630765CC796EADCA50EB32940C7FC05A6B0882C26BB639220FE68C43A4059E695A36E5B1BBB
8,348,284 UART: [art] PUB.Y = 656F187D3E0E28820761A3DCDCA0CC2872EAF5AD577B28BC085D79476BD9A1F9F111F71B9BCEE842B606482E3625FB08
8,355,229 UART: [art] SIG.R = 9C8ECB8C587B3F354E9CF0736D94E04F5D24F70E581B83D0E6D54342550F4A364B146F0E8087ECC23EAB92DAAAA6D947
8,362,002 UART: [art] SIG.S = 0B360D99E3C7D6BF745C9E7A3375DD43EA5B8B579283DFD3628677CFA4D32D9C0BAEC654166B5D868FA5C7E8F3A01406
8,385,837 UART: mbox::rt_entry...
8,386,209 UART: ____ _ _ _ ____ _____
8,386,993 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,387,793 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,388,561 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,389,329 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,390,097 UART: |_|
8,390,409 UART:
8,674,923 UART: [rt] Runtime listening for mailbox commands...
8,675,887 UART:
8,675,903 UART: Running Caliptra ROM ...
8,676,311 UART:
8,676,453 UART: [state] CFI Enabled
8,679,625 UART: [state] LifecycleState = Unprovisioned
8,680,280 UART: [state] DebugLocked = No
8,681,014 UART: [state] WD Timer not started. Device not locked for debugging
8,682,214 UART: [kat] SHA2-256
9,487,864 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,491,989 UART: [kat] ++
9,492,141 UART: [kat] sha1
9,496,471 UART: [kat] SHA2-256
9,498,411 UART: [kat] SHA2-384
9,501,062 UART: [kat] SHA2-512-ACC
9,502,962 UART: [kat] ECC-384
9,512,519 UART: [kat] HMAC-384Kdf
9,517,055 UART: [kat] LMS
9,765,383 UART: [kat] --
9,766,259 UART: [update-reset] ++
10,670,351 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,671,524 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
10,767,906 >>> mbox cmd response: success
10,767,906 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,768,113 UART: [update-reset] Copying MAN_2 To MAN_1
10,776,127 UART: [update-reset Success] --
10,777,110 UART: [state] Locking Datavault
10,777,798 UART: [state] Locking PCR0, PCR1 and PCR31
10,778,402 UART: [state] Locking ICCM
10,778,826 UART: [exit] Launching FMC @ 0x40000130
10,784,155 UART:
10,784,171 UART: Running Caliptra FMC ...
10,784,579 UART:
10,784,722 UART: [state] CFI Enabled
10,873,703 UART: [art] Extend RT PCRs Done
10,874,131 UART: [art] Lock RT PCRs Done
10,875,366 UART: [art] Populate DV Done
10,883,723 UART: [fht] FMC Alias Private Key: 7
10,884,799 UART: [art] Derive CDI
10,885,079 UART: [art] Store in in slot 0x4
10,970,744 UART: [art] Derive Key Pair
10,971,104 UART: [art] Store priv key in slot 0x5
10,984,300 UART: [art] Derive Key Pair - Done
10,999,284 UART: [art] Signing Cert with AUTHO
10,999,764 UART: RITY.KEYID = 7
11,015,164 UART: [art] Erasing AUTHORITY.KEYID = 7
11,015,929 UART: [art] PUB.X = 2CC56FEE99510B7CA2FA3BFF6A266DA2781499E8B8D5C30238283FBFD33EC698F3BF6F017E5055B8F29C7809823CDBE1
11,022,701 UART: [art] PUB.Y = 54AB76AD709384B5EAB7D0E205BDED6F7D510B923880228D9CFA2019942B792120144FE94BB6AC6DD9B9A00658C1F926
11,029,648 UART: [art] SIG.R = 7CF4ADCBC6B1C274B28A6E2F419A0DB22D2BCBE4F4D138BB05C8CBC296BCACE930DB0C17BCE1934B043A271FD3A4A96D
11,036,438 UART: [art] SIG.S = 73065FD903D71277CD814392DF2356B760605F4F1CD061895728FFC08B0FBC9087B4F7438F6812C7F43B465FED763173
11,060,356 UART: mbox::rt_entry...
11,060,728 UART: ____ _ _ _ ____ _____
11,061,512 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,062,312 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,063,080 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,063,848 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,064,616 UART: |_|
11,064,928 UART:
11,344,486 UART: [rt] Runtime listening for mailbox commands...
11,345,682 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,056 ready_for_fw is high
1,061,056 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,967 >>> mbox cmd response: success
2,165,967 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,227,821 UART:
2,227,837 UART: Running Caliptra FMC ...
2,228,245 UART:
2,228,388 UART: [state] CFI Enabled
2,239,215 UART: [fht] FMC Alias Private Key: 7
2,347,172 UART: [art] Extend RT PCRs Done
2,347,600 UART: [art] Lock RT PCRs Done
2,349,048 UART: [art] Populate DV Done
2,357,353 UART: [fht] FMC Alias Private Key: 7
2,358,389 UART: [art] Derive CDI
2,358,669 UART: [art] Store in in slot 0x4
2,444,100 UART: [art] Derive Key Pair
2,444,460 UART: [art] Store priv key in slot 0x5
2,457,586 UART: [art] Derive Key Pair - Done
2,472,472 UART: [art] Signing Cert with AUTHO
2,472,952 UART: RITY.KEYID = 7
2,488,188 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,953 UART: [art] PUB.X = 2F1F8C61DE8C61B893E37434A96DAD88198E8350695D903809C8C4703542B673364695FAC1DBEF944B104140D7378DF7
2,495,714 UART: [art] PUB.Y = ECEE4BBE81E6CD9CB980F1B3D6B40EECB77DBE8B500E7A5BB677AFD4FE83C74767B550145EADDC468FFAE8550B0D9A8F
2,502,686 UART: [art] SIG.R = 11469218A2ECA9021E1999D8E1A130A9AB0E6D80078C6FD5AD1948A2CFFC44F79BB37EC29AE66514A654DE3004E13EA4
2,509,454 UART: [art] SIG.S = 445FB9525F5193D94AB8AFD54AE5A514832E5F82D8AFE173CE104E8930B89AEA769CC83475066A38ABB4155FB451607D
2,532,854 UART: mbox::rt_entry...
2,533,226 UART: ____ _ _ _ ____ _____
2,534,010 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,810 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,578 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,346 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,537,114 UART: |_|
2,537,426 UART:
2,643,774 UART: [rt] Runtime listening for mailbox commands...
2,644,961 >>> mbox cmd response data (48 bytes)
2,644,962 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,082,215 >>> mbox cmd response: success
5,082,215 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,095,467 UART:
5,095,483 UART: Running Caliptra FMC ...
5,095,891 UART:
5,096,034 UART: [state] CFI Enabled
5,185,447 UART: [art] Extend RT PCRs Done
5,185,875 UART: [art] Lock RT PCRs Done
5,187,062 UART: [art] Populate DV Done
5,195,323 UART: [fht] FMC Alias Private Key: 7
5,196,307 UART: [art] Derive CDI
5,196,587 UART: [art] Store in in slot 0x4
5,282,210 UART: [art] Derive Key Pair
5,282,570 UART: [art] Store priv key in slot 0x5
5,295,630 UART: [art] Derive Key Pair - Done
5,310,172 UART: [art] Signing Cert with AUTHO
5,310,652 UART: RITY.KEYID = 7
5,325,768 UART: [art] Erasing AUTHORITY.KEYID = 7
5,326,533 UART: [art] PUB.X = F04E71ACFB5545300129A5DC108C60D7DA82F678645A62D18F4BB4231B07E6CC6463CB90E0DB1865A78973CD95CBC299
5,333,303 UART: [art] PUB.Y = 7A628D637A50E5028B19E351C6030E30D5565D6949D74B97552F28350DDC652DBC297239AC9D94B77F1C1E13C43F06DD
5,340,236 UART: [art] SIG.R = 880E3F06F3C9CADEB42FD261965921F7DEE9F2C369D6651FF4C68173F058D6C303742B6FF1661AED1BF8A60487353337
5,346,998 UART: [art] SIG.S = AA1ADA8FB39FB1D14305CBEAF600BF80AE6DC50DBD8670B8D63C7C9B093D3FFAE021530367086A5986AC88D5C86F3065
5,370,680 UART: Caliptra RT
5,371,025 UART: [state] CFI Enabled
5,655,399 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,686,301 UART: [rt]cmd =0x4d454153, len=108
5,706,652 >>> mbox cmd response data (12 bytes)
5,706,653 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,683,575 >>> mbox cmd response: success
7,683,575 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,696,861 UART:
7,696,877 UART: Running Caliptra FMC ...
7,697,285 UART:
7,697,428 UART: [state] CFI Enabled
7,786,707 UART: [art] Extend RT PCRs Done
7,787,135 UART: [art] Lock RT PCRs Done
7,788,532 UART: [art] Populate DV Done
7,796,909 UART: [fht] FMC Alias Private Key: 7
7,797,937 UART: [art] Derive CDI
7,798,217 UART: [art] Store in in slot 0x4
7,884,262 UART: [art] Derive Key Pair
7,884,622 UART: [art] Store priv key in slot 0x5
7,898,036 UART: [art] Derive Key Pair - Done
7,912,838 UART: [art] Signing Cert with AUTHO
7,913,318 UART: RITY.KEYID = 7
7,928,470 UART: [art] Erasing AUTHORITY.KEYID = 7
7,929,235 UART: [art] PUB.X = 3F6EA4C8F5D82FB49335047EA9D8729C4D1CFF16F6F45A81496F3C01C170503CD28C355CAB9593A35DBE242BD4453C10
7,936,007 UART: [art] PUB.Y = 67E54A9C0924C5A36A7D1FD918523D936F2D1D2C61CE6CA8A2211DDD5F4236076149D71F3070C56AFDE6FC2E6A8816CF
7,942,961 UART: [art] SIG.R = 8F021C91EF6D3603D23680A4EBE2AD51561821AA4B572FD82FA3B957DE403B59E92C217B28849A6E206C23A990DCFDD5
7,949,733 UART: [art] SIG.S = 824307F8CE8033016D50CAD1FAF01A307D90DA55C3F7CCDD037F52C23E00F6E20C9D7CABE3C1E2722A67F17F9F51E991
7,973,064 UART: mbox::rt_entry...
7,973,436 UART: ____ _ _ _ ____ _____
7,974,220 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,975,020 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,975,788 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,976,556 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,977,324 UART: |_|
7,977,636 UART:
8,256,461 UART: [rt] Runtime listening for mailbox commands...
10,234,497 >>> mbox cmd response: success
10,234,497 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,247,853 UART:
10,247,869 UART: Running Caliptra FMC ...
10,248,277 UART:
10,248,420 UART: [state] CFI Enabled
10,337,019 UART: [art] Extend RT PCRs Done
10,337,447 UART: [art] Lock RT PCRs Done
10,338,926 UART: [art] Populate DV Done
10,347,179 UART: [fht] FMC Alias Private Key: 7
10,348,297 UART: [art] Derive CDI
10,348,577 UART: [art] Store in in slot 0x4
10,434,474 UART: [art] Derive Key Pair
10,434,834 UART: [art] Store priv key in slot 0x5
10,448,276 UART: [art] Derive Key Pair - Done
10,463,208 UART: [art] Signing Cert with AUTHO
10,463,688 UART: RITY.KEYID = 7
10,479,348 UART: [art] Erasing AUTHORITY.KEYID = 7
10,480,113 UART: [art] PUB.X = 7BEB0922B1F53D3DA1A18254C9263FF6D3E1363F8C1FC87602F503E3F91E70C1FC2894963A072E105E033E9A934E74F7
10,486,870 UART: [art] PUB.Y = C3DE609B16D6B8A542719C15264B3117763F05F9A5E2B9800E486BBD804205E484B55B98C83823132B3F3D8A263B279B
10,493,805 UART: [art] SIG.R = 8E2B012C883E57F12FD83B57095EAAE7693E36DF9AEBB4E546B91217981C1B3DBA9953DDDF0CF547CD7A5B4C91CE4C95
10,500,584 UART: [art] SIG.S = 8719D8FEB0C9F570FCCA2BC23BC96A01271E66312CEC7383F08469E2CA410E13C0D78C71F1E47FC86705747F29DA12C0
10,524,532 UART: mbox::rt_entry...
10,524,904 UART: ____ _ _ _ ____ _____
10,525,688 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,526,488 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,527,256 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,528,024 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,528,792 UART: |_|
10,529,104 UART:
10,811,167 UART: [rt] Runtime listening for mailbox commands...
10,812,363 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.45s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,283,570 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,346 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,655 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,159 >>> mbox cmd response: success
2,312,159 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,313,414 UART: [afmc] ++
2,313,582 UART: [afmc] CDI.KEYID = 6
2,313,945 UART: [afmc] SUBJECT.KEYID = 7
2,314,371 UART: [afmc] AUTHORITY.KEYID = 5
2,349,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,779 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,508 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,391 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,110 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,989 UART: [afmc] --
2,393,027 UART: [cold-reset] --
2,393,733 UART: [state] Locking Datavault
2,395,228 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,832 UART: [state] Locking ICCM
2,396,360 UART: [exit] Launching FMC @ 0x40000130
2,401,689 UART:
2,401,705 UART: Running Caliptra FMC ...
2,402,113 UART:
2,402,167 UART: [state] CFI Enabled
2,412,578 UART: [fht] FMC Alias Private Key: 7
2,519,895 UART: [art] Extend RT PCRs Done
2,520,323 UART: [art] Lock RT PCRs Done
2,521,709 UART: [art] Populate DV Done
2,530,124 UART: [fht] FMC Alias Private Key: 7
2,531,162 UART: [art] Derive CDI
2,531,442 UART: [art] Store in in slot 0x4
2,616,893 UART: [art] Derive Key Pair
2,617,253 UART: [art] Store priv key in slot 0x5
2,630,549 UART: [art] Derive Key Pair - Done
2,645,355 UART: [art] Signing Cert with AUTHO
2,645,835 UART: RITY.KEYID = 7
2,661,155 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,920 UART: [art] PUB.X = A2A6E22BFADF33FAC21EA1659960ADC9BFF43705D57EEE2AAB693187F38F3C6BB8B5F7BE5BD65D283662E0BFBAF90022
2,668,691 UART: [art] PUB.Y = DBEE4CAD5C969DD0F483B1593D9A664FA48CEE6C2307DF63AECB8C5AC0E03E560E6DCB97883E2F90B2C30CF3B13994B0
2,675,656 UART: [art] SIG.R = 23863CE8FB9C7FD822E4248022E75C936D0A46AFDF88B75CC803002A13C77147B369727FECE2A07ED9733A37DB5C311F
2,682,404 UART: [art] SIG.S = 1CEC0A083CE632246D32E4C5BFDB25B81F948E63F87EBCE68629B9F3CD1460280C4A1D9C52AEFFD464F02FE123611083
2,705,910 UART: mbox::rt_entry...
2,706,282 UART: ____ _ _ _ ____ _____
2,707,066 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,866 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,634 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,402 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,170 UART: |_|
2,710,482 UART:
2,816,238 UART: [rt] Runtime listening for mailbox commands...
2,817,425 >>> mbox cmd response data (48 bytes)
2,817,426 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,817,537 UART:
2,817,553 UART: Running Caliptra ROM ...
2,817,961 UART:
2,818,016 UART: [state] CFI Enabled
2,820,696 UART: [state] LifecycleState = Unprovisioned
2,821,351 UART: [state] DebugLocked = No
2,822,027 UART: [state] WD Timer not started. Device not locked for debugging
2,823,143 UART: [kat] SHA2-256
3,626,693 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,630,822 UART: [kat] ++
3,630,974 UART: [kat] sha1
3,635,272 UART: [kat] SHA2-256
3,637,212 UART: [kat] SHA2-384
3,639,847 UART: [kat] SHA2-512-ACC
3,641,747 UART: [kat] ECC-384
3,651,748 UART: [kat] HMAC-384Kdf
3,656,450 UART: [kat] LMS
3,904,762 UART: [kat] --
3,905,680 UART: [update-reset] ++
5,218,069 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,219,032 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,368,856 >>> mbox cmd response: success
5,368,856 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,369,023 UART: [update-reset] Copying MAN_2 To MAN_1
5,377,037 UART: [update-reset Success] --
5,377,968 UART: [state] Locking Datavault
5,378,832 UART: [state] Locking PCR0, PCR1 and PCR31
5,379,436 UART: [state] Locking ICCM
5,380,074 UART: [exit] Launching FMC @ 0x40000130
5,385,403 UART:
5,385,419 UART: Running Caliptra FMC ...
5,385,827 UART:
5,385,881 UART: [state] CFI Enabled
5,474,902 UART: [art] Extend RT PCRs Done
5,475,330 UART: [art] Lock RT PCRs Done
5,476,769 UART: [art] Populate DV Done
5,484,866 UART: [fht] FMC Alias Private Key: 7
5,485,926 UART: [art] Derive CDI
5,486,206 UART: [art] Store in in slot 0x4
5,571,995 UART: [art] Derive Key Pair
5,572,355 UART: [art] Store priv key in slot 0x5
5,585,269 UART: [art] Derive Key Pair - Done
5,599,762 UART: [art] Signing Cert with AUTHO
5,600,242 UART: RITY.KEYID = 7
5,615,530 UART: [art] Erasing AUTHORITY.KEYID = 7
5,616,295 UART: [art] PUB.X = 84E407378ACDC90472E49AF81A7E676DFEFA569E466503E3DD8A260B581F9DF280309D734C65E94C56C31A9CE6FD9C7E
5,623,063 UART: [art] PUB.Y = C909CC4C0C26673EFCD3C327E467F64510E6B838FB9889488D0E0E20891BCFBFA31713229BC09CE4A8F3406B7151AC94
5,630,007 UART: [art] SIG.R = AF1F185447B7188B82ADC6911A54FF2A23E54397709F5CC8BCE07238760BF27391A6320E3CB4FD44B10C66FF420A6258
5,636,767 UART: [art] SIG.S = 6552D435E9F2922FDAD752B7387D317EDCCFE0B345285DEF99070343D5F3DC979352A02EF0AE85F9FAE8100B929FEB14
5,660,285 UART: Caliptra RT
5,660,538 UART: [state] CFI Enabled
5,943,421 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,974,611 UART: [rt]cmd =0x4d454153, len=108
5,994,784 >>> mbox cmd response data (12 bytes)
5,994,785 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,995,556 UART:
5,995,572 UART: Running Caliptra ROM ...
5,995,980 UART:
5,996,035 UART: [state] CFI Enabled
5,998,673 UART: [state] LifecycleState = Unprovisioned
5,999,328 UART: [state] DebugLocked = No
5,999,946 UART: [state] WD Timer not started. Device not locked for debugging
6,001,098 UART: [kat] SHA2-256
6,804,648 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,808,777 UART: [kat] ++
6,808,929 UART: [kat] sha1
6,813,137 UART: [kat] SHA2-256
6,815,077 UART: [kat] SHA2-384
6,817,886 UART: [kat] SHA2-512-ACC
6,819,786 UART: [kat] ECC-384
6,829,057 UART: [kat] HMAC-384Kdf
6,833,501 UART: [kat] LMS
7,081,813 UART: [kat] --
7,082,569 UART: [update-reset] ++
7,986,682 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,987,809 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,084,191 >>> mbox cmd response: success
8,084,191 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,084,542 UART: [update-reset] Copying MAN_2 To MAN_1
8,092,556 UART: [update-reset Success] --
8,093,587 UART: [state] Locking Datavault
8,094,263 UART: [state] Locking PCR0, PCR1 and PCR31
8,094,867 UART: [state] Locking ICCM
8,095,295 UART: [exit] Launching FMC @ 0x40000130
8,100,624 UART:
8,100,640 UART: Running Caliptra FMC ...
8,101,048 UART:
8,101,102 UART: [state] CFI Enabled
8,190,185 UART: [art] Extend RT PCRs Done
8,190,613 UART: [art] Lock RT PCRs Done
8,191,744 UART: [art] Populate DV Done
8,199,931 UART: [fht] FMC Alias Private Key: 7
8,201,091 UART: [art] Derive CDI
8,201,371 UART: [art] Store in in slot 0x4
8,287,232 UART: [art] Derive Key Pair
8,287,592 UART: [art] Store priv key in slot 0x5
8,300,688 UART: [art] Derive Key Pair - Done
8,315,400 UART: [art] Signing Cert with AUTHO
8,315,880 UART: RITY.KEYID = 7
8,330,986 UART: [art] Erasing AUTHORITY.KEYID = 7
8,331,751 UART: [art] PUB.X = 8784E1DF179C15383BB3F24F9BD569B0736449D1E313A90CDFAB5F152852A7185E255D5055F01C811C0C9AD6327170C4
8,338,513 UART: [art] PUB.Y = C95CD73D52A797F930E08B7B71512DDE5A0F546FC6698B0C6E5CDB2F61CC5B96762B97E8103C1DCF800FD8F18D9F5657
8,345,466 UART: [art] SIG.R = 3B4763405C9F591F01A95C82ED30DE28FD4C6DBA75C6757F1642CD533791F70E969DA2AAB896F759B809AF1A50DCD73E
8,352,237 UART: [art] SIG.S = 55EAF6A2232649C5EDD0E6B7C1D99FB6AE91A4F13964958F8C73FCB959AF8E50AAF1D796FD71D4A6351E007D2FAAC9EC
8,375,446 UART: mbox::rt_entry...
8,375,818 UART: ____ _ _ _ ____ _____
8,376,602 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,377,402 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,378,170 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,378,938 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,379,706 UART: |_|
8,380,018 UART:
8,660,220 UART: [rt] Runtime listening for mailbox commands...
8,661,184 UART:
8,661,200 UART: Running Caliptra ROM ...
8,661,608 UART:
8,661,663 UART: [state] CFI Enabled
8,664,263 UART: [state] LifecycleState = Unprovisioned
8,664,918 UART: [state] DebugLocked = No
8,665,552 UART: [state] WD Timer not started. Device not locked for debugging
8,666,670 UART: [kat] SHA2-256
9,470,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,474,349 UART: [kat] ++
9,474,501 UART: [kat] sha1
9,478,931 UART: [kat] SHA2-256
9,480,871 UART: [kat] SHA2-384
9,483,660 UART: [kat] SHA2-512-ACC
9,485,560 UART: [kat] ECC-384
9,495,369 UART: [kat] HMAC-384Kdf
9,500,031 UART: [kat] LMS
9,748,343 UART: [kat] --
9,748,935 UART: [update-reset] ++
10,654,318 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,655,491 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
10,751,873 >>> mbox cmd response: success
10,751,873 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,751,980 UART: [update-reset] Copying MAN_2 To MAN_1
10,759,994 UART: [update-reset Success] --
10,760,953 UART: [state] Locking Datavault
10,761,865 UART: [state] Locking PCR0, PCR1 and PCR31
10,762,469 UART: [state] Locking ICCM
10,762,917 UART: [exit] Launching FMC @ 0x40000130
10,768,246 UART:
10,768,262 UART: Running Caliptra FMC ...
10,768,670 UART:
10,768,724 UART: [state] CFI Enabled
10,857,667 UART: [art] Extend RT PCRs Done
10,858,095 UART: [art] Lock RT PCRs Done
10,859,180 UART: [art] Populate DV Done
10,867,381 UART: [fht] FMC Alias Private Key: 7
10,868,505 UART: [art] Derive CDI
10,868,785 UART: [art] Store in in slot 0x4
10,954,384 UART: [art] Derive Key Pair
10,954,744 UART: [art] Store priv key in slot 0x5
10,968,434 UART: [art] Derive Key Pair - Done
10,982,972 UART: [art] Signing Cert with AUTHO
10,983,452 UART: RITY.KEYID = 7
10,998,528 UART: [art] Erasing AUTHORITY.KEYID = 7
10,999,293 UART: [art] PUB.X = 59FFAD7EADBFF6B65F41430708BEB0D86584144A5DB0F6E53864177E2AA360E18C58401447D8BDB26C7C6B30556EAD41
11,006,067 UART: [art] PUB.Y = 528CE65B4C42CB5067EC115C060FC1FDA589AD893DED234CE348891CEE78530B538BC489569C70BDEF801F65B0D02BCC
11,013,022 UART: [art] SIG.R = FC75A91B65580928524FB8CF9E7DE61A08066166D7307825FC5CD8976A3978AF5FA992CC84E29132AD3B6105E0029AFA
11,019,779 UART: [art] SIG.S = 28FC3B4B34AEF58CB17449BE8A47ACBC7AE831EBE50336867A15639F86E8CF6B1FC6E660BF6599F0A79B28A3BE6E3EF3
11,044,237 UART: mbox::rt_entry...
11,044,609 UART: ____ _ _ _ ____ _____
11,045,393 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,046,193 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,046,961 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,047,729 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,048,497 UART: |_|
11,048,809 UART:
11,329,489 UART: [rt] Runtime listening for mailbox commands...
11,330,685 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,680 ready_for_fw is high
1,056,680 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,162,166 >>> mbox cmd response: success
2,162,166 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,223,750 UART:
2,223,766 UART: Running Caliptra FMC ...
2,224,174 UART:
2,224,228 UART: [state] CFI Enabled
2,234,331 UART: [fht] FMC Alias Private Key: 7
2,342,084 UART: [art] Extend RT PCRs Done
2,342,512 UART: [art] Lock RT PCRs Done
2,344,102 UART: [art] Populate DV Done
2,352,335 UART: [fht] FMC Alias Private Key: 7
2,353,475 UART: [art] Derive CDI
2,353,755 UART: [art] Store in in slot 0x4
2,438,796 UART: [art] Derive Key Pair
2,439,156 UART: [art] Store priv key in slot 0x5
2,452,568 UART: [art] Derive Key Pair - Done
2,467,551 UART: [art] Signing Cert with AUTHO
2,468,031 UART: RITY.KEYID = 7
2,483,103 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,868 UART: [art] PUB.X = 5BDD7F0766E4E2091B08FE4DDB156F9A1021B2771DBFD15CA3C2CE0202995C0F96C8073A02177ED0461508C849258CF8
2,490,615 UART: [art] PUB.Y = BFE266BD83A0EE4CC50BCD2EA1E235C8426ACC69184DB979D1147EF3E7C981090AC941F9F880E6C41F0ED331CFBAD443
2,497,573 UART: [art] SIG.R = BE0BA6C6FB0074263CE1F9B8C4462BCCF7A1C32DA260944941BE0533F549A08CECEB82D096676562C1EB7593F7C0DE88
2,504,327 UART: [art] SIG.S = BF74D803D5F99EF748D3227849DEAC783DCE55C385CC5D8CA0DA97F7503E608A4DEB698BB5BE45AC8AAAD31BFB1B8255
2,527,441 UART: mbox::rt_entry...
2,527,813 UART: ____ _ _ _ ____ _____
2,528,597 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,529,397 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,165 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,530,933 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,531,701 UART: |_|
2,532,013 UART:
2,637,616 UART: [rt] Runtime listening for mailbox commands...
2,638,803 >>> mbox cmd response data (48 bytes)
2,638,804 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,071,093 >>> mbox cmd response: success
5,071,093 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,084,465 UART:
5,084,481 UART: Running Caliptra FMC ...
5,084,889 UART:
5,084,943 UART: [state] CFI Enabled
5,174,230 UART: [art] Extend RT PCRs Done
5,174,658 UART: [art] Lock RT PCRs Done
5,175,767 UART: [art] Populate DV Done
5,184,016 UART: [fht] FMC Alias Private Key: 7
5,185,082 UART: [art] Derive CDI
5,185,362 UART: [art] Store in in slot 0x4
5,270,827 UART: [art] Derive Key Pair
5,271,187 UART: [art] Store priv key in slot 0x5
5,283,799 UART: [art] Derive Key Pair - Done
5,298,536 UART: [art] Signing Cert with AUTHO
5,299,016 UART: RITY.KEYID = 7
5,314,732 UART: [art] Erasing AUTHORITY.KEYID = 7
5,315,497 UART: [art] PUB.X = 7D2CDD195B72656B8193B9B7FFE174469956E55343C63D235DB92A0B5110367AC2BF70DD943B41C6042D11A4E52EEE75
5,322,263 UART: [art] PUB.Y = 6880624ED4941D1650D3E6F8475146F71BAE1B760711C207417C1AABCFE633827F8335D640AB60DD1B50799D95765253
5,329,199 UART: [art] SIG.R = 2590D3B73434559267E505C2BC1F89DEBE840DAED9CDBF130B0B6D251EBD9794F8DADB4D5345A09D5E07E207BBAE47FC
5,335,971 UART: [art] SIG.S = 436F12734838273C3470E182213908C7FC0F54ABAEE58F469BD347EEE5BF5EE4EC97B686E6A36476983A0D6FA1F13B4D
5,360,031 UART: Caliptra RT
5,360,284 UART: [state] CFI Enabled
5,639,625 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,670,827 UART: [rt]cmd =0x4d454153, len=108
5,690,908 >>> mbox cmd response data (12 bytes)
5,690,909 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,663,472 >>> mbox cmd response: success
7,663,472 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,677,156 UART:
7,677,172 UART: Running Caliptra FMC ...
7,677,580 UART:
7,677,634 UART: [state] CFI Enabled
7,767,231 UART: [art] Extend RT PCRs Done
7,767,659 UART: [art] Lock RT PCRs Done
7,769,010 UART: [art] Populate DV Done
7,776,903 UART: [fht] FMC Alias Private Key: 7
7,777,967 UART: [art] Derive CDI
7,778,247 UART: [art] Store in in slot 0x4
7,863,618 UART: [art] Derive Key Pair
7,863,978 UART: [art] Store priv key in slot 0x5
7,877,362 UART: [art] Derive Key Pair - Done
7,892,046 UART: [art] Signing Cert with AUTHO
7,892,526 UART: RITY.KEYID = 7
7,908,028 UART: [art] Erasing AUTHORITY.KEYID = 7
7,908,793 UART: [art] PUB.X = B91F36131E1FB9B1D1C0038F67B1A5B95B5EBE89DF75E975AABC4A130BB5D49AA8FDF1214C735BC98AF6B6D8351D7EF3
7,915,579 UART: [art] PUB.Y = A86A464AFF3F1563D17F90F81F1C0A4C5B0EF8B0364C4DA614BD7E89B13A9C42E5AD79529ECB52774A4EE70667F7916D
7,922,532 UART: [art] SIG.R = 30B9DBF96E3D93BA2275CEC5DDD91D0461380AC953335439BFFF177BAE2AF1E2FCF1DE36836D12C8AA90996AABB5EE5D
7,929,320 UART: [art] SIG.S = B261D7AC724F64D7BC5A6EE597045E66161B817424A8480AB13EAAC2C2B82896D4F788BF12466B250240DF3AB2D69778
7,952,796 UART: mbox::rt_entry...
7,953,168 UART: ____ _ _ _ ____ _____
7,953,952 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,954,752 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,955,520 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,956,288 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,957,056 UART: |_|
7,957,368 UART:
8,239,364 UART: [rt] Runtime listening for mailbox commands...
10,211,300 >>> mbox cmd response: success
10,211,300 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,224,414 UART:
10,224,430 UART: Running Caliptra FMC ...
10,224,838 UART:
10,224,892 UART: [state] CFI Enabled
10,313,883 UART: [art] Extend RT PCRs Done
10,314,311 UART: [art] Lock RT PCRs Done
10,315,744 UART: [art] Populate DV Done
10,323,995 UART: [fht] FMC Alias Private Key: 7
10,325,125 UART: [art] Derive CDI
10,325,405 UART: [art] Store in in slot 0x4
10,410,836 UART: [art] Derive Key Pair
10,411,196 UART: [art] Store priv key in slot 0x5
10,424,538 UART: [art] Derive Key Pair - Done
10,439,409 UART: [art] Signing Cert with AUTHO
10,439,889 UART: RITY.KEYID = 7
10,454,999 UART: [art] Erasing AUTHORITY.KEYID = 7
10,455,764 UART: [art] PUB.X = AD16C358BD1949DF88A5013BA211687012FFD27B300B7E5E89655CF2B2EFBC7297D1E10F51593166EB652F473E49074C
10,462,524 UART: [art] PUB.Y = 4F7A8E2F9C13215BE6B52879F0597DE25F92B7F313436521558219A325ACCB9D69D5C76F5F2578574CC16085492996F8
10,469,466 UART: [art] SIG.R = 93E466FFB41CDB91ADFE5C16AB7893F8CF73E7EB603DC6F0B5D89E97A44A0C5D0752242B4B1FE1CEBFACF42FF29A7F52
10,476,258 UART: [art] SIG.S = 924D953C609EBE0A522ED716A34C0B22F9888098E68D721804EA1B612C2961BB9BD077120519C180DF17796FEE240BFD
10,499,526 UART: mbox::rt_entry...
10,499,898 UART: ____ _ _ _ ____ _____
10,500,682 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,501,482 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,502,250 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,503,018 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,503,786 UART: |_|
10,504,098 UART:
10,784,551 UART: [rt] Runtime listening for mailbox commands...
10,785,747 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.40s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,283,691 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,119 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,428 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,860 >>> mbox cmd response: success
2,312,860 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,314,007 UART: [afmc] ++
2,314,175 UART: [afmc] CDI.KEYID = 6
2,314,538 UART: [afmc] SUBJECT.KEYID = 7
2,314,964 UART: [afmc] AUTHORITY.KEYID = 5
2,350,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,279 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,030 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,759 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,642 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,361 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,122 UART: [afmc] --
2,394,178 UART: [cold-reset] --
2,395,198 UART: [state] Locking Datavault
2,396,045 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,649 UART: [state] Locking ICCM
2,397,177 UART: [exit] Launching FMC @ 0x40000130
2,402,506 UART:
2,402,522 UART: Running Caliptra FMC ...
2,402,930 UART:
2,403,073 UART: [state] CFI Enabled
2,413,488 UART: [fht] FMC Alias Private Key: 7
2,522,021 UART: [art] Extend RT PCRs Done
2,522,449 UART: [art] Lock RT PCRs Done
2,523,805 UART: [art] Populate DV Done
2,531,898 UART: [fht] FMC Alias Private Key: 7
2,532,930 UART: [art] Derive CDI
2,533,210 UART: [art] Store in in slot 0x4
2,618,987 UART: [art] Derive Key Pair
2,619,347 UART: [art] Store priv key in slot 0x5
2,632,647 UART: [art] Derive Key Pair - Done
2,647,434 UART: [art] Signing Cert with AUTHO
2,647,914 UART: RITY.KEYID = 7
2,663,288 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,053 UART: [art] PUB.X = E86BC5871FABF6204DA6AC6B7E251B51832AA62402C264DCAB654031AEB5FD759A5ECD0597F1AFC2C6C12E21386B5E55
2,670,833 UART: [art] PUB.Y = 58E635A0BCEF1A69C8FE6302A3E7D53B5B29910A60E502AFC42EAAC99C9F640A830A9281FAE8DA50A973EE7344E6904C
2,677,782 UART: [art] SIG.R = EC6BC5B3A474EF144AA02A048ED0E66DC2E73547A758418F6285EDFE2D177977FB4429BBCD320EB0B6452D41138CC797
2,684,556 UART: [art] SIG.S = D24996EFED7CDC98F916D620F4F1F1164B806CE4C4F2A835C5A032A4DEB9E559F20155F1083EEAC6EEB4F23ECD29B3B0
2,708,491 UART: mbox::rt_entry...
2,708,863 UART: ____ _ _ _ ____ _____
2,709,647 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,447 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,215 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,983 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,751 UART: |_|
2,713,063 UART:
2,819,954 UART: [rt] Runtime listening for mailbox commands...
2,821,141 >>> mbox cmd response data (48 bytes)
2,821,142 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,821,253 UART:
2,821,269 UART: Running Caliptra ROM ...
2,821,677 UART:
2,821,819 UART: [state] CFI Enabled
2,824,363 UART: [state] LifecycleState = Unprovisioned
2,825,018 UART: [state] DebugLocked = No
2,825,606 UART: [state] WD Timer not started. Device not locked for debugging
2,826,942 UART: [kat] SHA2-256
3,630,492 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,634,621 UART: [kat] ++
3,634,773 UART: [kat] sha1
3,638,861 UART: [kat] SHA2-256
3,640,801 UART: [kat] SHA2-384
3,643,384 UART: [kat] SHA2-512-ACC
3,645,284 UART: [kat] ECC-384
3,654,989 UART: [kat] HMAC-384Kdf
3,659,609 UART: [kat] LMS
3,907,921 UART: [kat] --
3,908,979 UART: [update-reset] ++
5,220,356 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,221,463 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,371,287 >>> mbox cmd response: success
5,371,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,371,398 UART: [update-reset] Copying MAN_2 To MAN_1
5,379,412 UART: [update-reset Success] --
5,380,443 UART: [state] Locking Datavault
5,381,083 UART: [state] Locking PCR0, PCR1 and PCR31
5,381,687 UART: [state] Locking ICCM
5,382,249 UART: [exit] Launching FMC @ 0x40000130
5,387,578 UART:
5,387,594 UART: Running Caliptra FMC ...
5,388,002 UART:
5,388,145 UART: [state] CFI Enabled
5,477,202 UART: [art] Extend RT PCRs Done
5,477,630 UART: [art] Lock RT PCRs Done
5,478,991 UART: [art] Populate DV Done
5,487,244 UART: [fht] FMC Alias Private Key: 7
5,488,210 UART: [art] Derive CDI
5,488,490 UART: [art] Store in in slot 0x4
5,574,045 UART: [art] Derive Key Pair
5,574,405 UART: [art] Store priv key in slot 0x5
5,587,991 UART: [art] Derive Key Pair - Done
5,602,739 UART: [art] Signing Cert with AUTHO
5,603,219 UART: RITY.KEYID = 7
5,617,991 UART: [art] Erasing AUTHORITY.KEYID = 7
5,618,756 UART: [art] PUB.X = D4078557C8F8D7E70303BC52713B250901BA5893D25E8D5F5D8417C661FE63CC19AAC0CF3FA01A41A44C07FE21B522EA
5,625,516 UART: [art] PUB.Y = 6F935278D368B6A7550D821F87628EF8BCFE372823BC3F5D0EDAFDE1F01AF19A8155B994841334950CE481C8E8C23861
5,632,459 UART: [art] SIG.R = C199BC58BAE6FF1C1B7F1959FC7AF582A921C884263E3E1545EC6D37696F30B6A2CF52D69F052C6B8BF6CD592D8DDC9A
5,639,244 UART: [art] SIG.S = E21CA995D3A3A0A8B3017B1E784441764AA207CD7BDDAEA451A84FBEBA1069F063C646C1E4C46094111F51EBF8BD1BDB
5,663,137 UART: Caliptra RT
5,663,482 UART: [state] CFI Enabled
5,945,644 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,976,600 UART: [rt]cmd =0x4d454153, len=108
5,996,511 >>> mbox cmd response data (12 bytes)
5,996,512 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,997,363 UART:
5,997,379 UART: Running Caliptra ROM ...
5,997,787 UART:
5,997,929 UART: [state] CFI Enabled
6,000,461 UART: [state] LifecycleState = Unprovisioned
6,001,116 UART: [state] DebugLocked = No
6,001,696 UART: [state] WD Timer not started. Device not locked for debugging
6,002,972 UART: [kat] SHA2-256
6,806,522 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,810,651 UART: [kat] ++
6,810,803 UART: [kat] sha1
6,814,879 UART: [kat] SHA2-256
6,816,819 UART: [kat] SHA2-384
6,819,510 UART: [kat] SHA2-512-ACC
6,821,410 UART: [kat] ECC-384
6,831,127 UART: [kat] HMAC-384Kdf
6,835,591 UART: [kat] LMS
7,083,903 UART: [kat] --
7,084,615 UART: [update-reset] ++
7,989,042 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,990,199 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,086,581 >>> mbox cmd response: success
8,086,581 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,086,754 UART: [update-reset] Copying MAN_2 To MAN_1
8,094,768 UART: [update-reset Success] --
8,095,881 UART: [state] Locking Datavault
8,096,873 UART: [state] Locking PCR0, PCR1 and PCR31
8,097,477 UART: [state] Locking ICCM
8,097,943 UART: [exit] Launching FMC @ 0x40000130
8,103,272 UART:
8,103,288 UART: Running Caliptra FMC ...
8,103,696 UART:
8,103,839 UART: [state] CFI Enabled
8,193,034 UART: [art] Extend RT PCRs Done
8,193,462 UART: [art] Lock RT PCRs Done
8,194,741 UART: [art] Populate DV Done
8,203,260 UART: [fht] FMC Alias Private Key: 7
8,204,226 UART: [art] Derive CDI
8,204,506 UART: [art] Store in in slot 0x4
8,290,291 UART: [art] Derive Key Pair
8,290,651 UART: [art] Store priv key in slot 0x5
8,303,967 UART: [art] Derive Key Pair - Done
8,318,473 UART: [art] Signing Cert with AUTHO
8,318,953 UART: RITY.KEYID = 7
8,334,221 UART: [art] Erasing AUTHORITY.KEYID = 7
8,334,986 UART: [art] PUB.X = B032E7D355222508464A94391453865475E16856D82A9961C2772A0D2447AFE388369799D1DF6EF626A0B54D46CF44C2
8,341,736 UART: [art] PUB.Y = 8F88352326F4AA9EE21932102E3D9565CF223C0DA269A15C64DA6B7592F519785310DD6173F48E8EB593B0449A6DD280
8,348,679 UART: [art] SIG.R = 18379B4D00F8426EA2A24E9D20DB738F593C28539A490B02D5EEB6FCC8DE67614B9519204AA7775ADCE6AECD9FB9F128
8,355,433 UART: [art] SIG.S = EBFB3648D06A2AD185963B82D0304DFB609CE6D44FEC293C77AC106B8678FB2C2EE48FDD2D7479A6097F0673EEB5809B
8,379,354 UART: mbox::rt_entry...
8,379,726 UART: ____ _ _ _ ____ _____
8,380,510 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,381,310 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,382,078 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,382,846 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,383,614 UART: |_|
8,383,926 UART:
8,659,430 UART: [rt] Runtime listening for mailbox commands...
8,660,394 UART:
8,660,410 UART: Running Caliptra ROM ...
8,660,818 UART:
8,660,960 UART: [state] CFI Enabled
8,663,758 UART: [state] LifecycleState = Unprovisioned
8,664,413 UART: [state] DebugLocked = No
8,665,055 UART: [state] WD Timer not started. Device not locked for debugging
8,666,399 UART: [kat] SHA2-256
9,469,949 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,474,078 UART: [kat] ++
9,474,230 UART: [kat] sha1
9,478,398 UART: [kat] SHA2-256
9,480,338 UART: [kat] SHA2-384
9,483,189 UART: [kat] SHA2-512-ACC
9,485,089 UART: [kat] ECC-384
9,494,440 UART: [kat] HMAC-384Kdf
9,499,128 UART: [kat] LMS
9,747,440 UART: [kat] --
9,748,194 UART: [update-reset] ++
10,652,661 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,653,786 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
10,750,168 >>> mbox cmd response: success
10,750,168 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,750,451 UART: [update-reset] Copying MAN_2 To MAN_1
10,758,465 UART: [update-reset Success] --
10,759,432 UART: [state] Locking Datavault
10,760,172 UART: [state] Locking PCR0, PCR1 and PCR31
10,760,776 UART: [state] Locking ICCM
10,761,198 UART: [exit] Launching FMC @ 0x40000130
10,766,527 UART:
10,766,543 UART: Running Caliptra FMC ...
10,766,951 UART:
10,767,094 UART: [state] CFI Enabled
10,856,415 UART: [art] Extend RT PCRs Done
10,856,843 UART: [art] Lock RT PCRs Done
10,858,164 UART: [art] Populate DV Done
10,866,509 UART: [fht] FMC Alias Private Key: 7
10,867,629 UART: [art] Derive CDI
10,867,909 UART: [art] Store in in slot 0x4
10,953,662 UART: [art] Derive Key Pair
10,954,022 UART: [art] Store priv key in slot 0x5
10,967,340 UART: [art] Derive Key Pair - Done
10,982,395 UART: [art] Signing Cert with AUTHO
10,982,875 UART: RITY.KEYID = 7
10,998,489 UART: [art] Erasing AUTHORITY.KEYID = 7
10,999,254 UART: [art] PUB.X = F58821F82DBC6F171B95BEE48A36FB1655285C7B690E48604BA15C3D48ECC1B4AA273F64083D0D425D22B3C359105077
11,006,017 UART: [art] PUB.Y = 7425D7C297AF9359F3ED0D72BA626325E5B95436BFB0ED2897C1671A6CDA664AA43B8C18F0D4CF79B408C12284A891D7
11,012,967 UART: [art] SIG.R = 5DA50977D975A7EB5E6E2B42B5F0240F8D12834522A3E32524449F5A557B99C7E102C8DB65E4D8BD799105F1C70312EF
11,019,722 UART: [art] SIG.S = DEA5288BC42235A721BF2A1B9E56939FC3460437EE6A229D320D88EEB8590A0CEFF33490D6C104201FD69E7E82FDBEEA
11,043,780 UART: mbox::rt_entry...
11,044,152 UART: ____ _ _ _ ____ _____
11,044,936 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,045,736 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,046,504 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,047,272 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,048,040 UART: |_|
11,048,352 UART:
11,325,638 UART: [rt] Runtime listening for mailbox commands...
11,326,834 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,023 ready_for_fw is high
1,056,023 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,162,094 >>> mbox cmd response: success
2,162,094 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,223,916 UART:
2,223,932 UART: Running Caliptra FMC ...
2,224,340 UART:
2,224,483 UART: [state] CFI Enabled
2,234,848 UART: [fht] FMC Alias Private Key: 7
2,342,381 UART: [art] Extend RT PCRs Done
2,342,809 UART: [art] Lock RT PCRs Done
2,344,397 UART: [art] Populate DV Done
2,352,540 UART: [fht] FMC Alias Private Key: 7
2,353,650 UART: [art] Derive CDI
2,353,930 UART: [art] Store in in slot 0x4
2,440,081 UART: [art] Derive Key Pair
2,440,441 UART: [art] Store priv key in slot 0x5
2,453,483 UART: [art] Derive Key Pair - Done
2,468,079 UART: [art] Signing Cert with AUTHO
2,468,559 UART: RITY.KEYID = 7
2,483,769 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,534 UART: [art] PUB.X = FA7E34DE37286DB8EA3226758824EB7D1E4EF8025647DAC970965BB5138424D824DE7129BD88FC92B8A63AF7B14F669C
2,491,307 UART: [art] PUB.Y = C893D84A8C7A10D48A2F8BEB28FACB75ABCC83EB19578BC04ED22FE1C1208B39726744F7A5FDFF0B48EFC1FD78E7299C
2,498,278 UART: [art] SIG.R = 8F013036DBDF78D14BA3445FD8E91000ECD3F837EBE95AFF00193E753C35AC4D00EBC5E5AA04B552CC20486D7B12FC93
2,504,992 UART: [art] SIG.S = AE9C3964E7EAD620DCCBAF390BC3888F2568CC51DF3824D63C5B4C5EE78AF429289154EB888E144D9C62C836CFECCA03
2,528,509 UART: mbox::rt_entry...
2,528,881 UART: ____ _ _ _ ____ _____
2,529,665 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,465 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,233 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,001 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,769 UART: |_|
2,533,081 UART:
2,640,358 UART: [rt] Runtime listening for mailbox commands...
2,641,545 >>> mbox cmd response data (48 bytes)
2,641,546 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,074,568 >>> mbox cmd response: success
5,074,568 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,087,690 UART:
5,087,706 UART: Running Caliptra FMC ...
5,088,114 UART:
5,088,257 UART: [state] CFI Enabled
5,177,276 UART: [art] Extend RT PCRs Done
5,177,704 UART: [art] Lock RT PCRs Done
5,179,107 UART: [art] Populate DV Done
5,187,202 UART: [fht] FMC Alias Private Key: 7
5,188,306 UART: [art] Derive CDI
5,188,586 UART: [art] Store in in slot 0x4
5,274,277 UART: [art] Derive Key Pair
5,274,637 UART: [art] Store priv key in slot 0x5
5,287,829 UART: [art] Derive Key Pair - Done
5,302,667 UART: [art] Signing Cert with AUTHO
5,303,147 UART: RITY.KEYID = 7
5,318,427 UART: [art] Erasing AUTHORITY.KEYID = 7
5,319,192 UART: [art] PUB.X = 2FFFFF8DEED234D667A2E703ACC2E0E82B1D1150383B90EC7CCE67F529716ACC4568CD1EF3374E33DC948A6FF5C20669
5,325,974 UART: [art] PUB.Y = 05D6F7590B84B22EFD1CC1C83538A27A0A8E88443757BAD2AB223C144D8F980DBB8CE360A7C30F9BC90D7AC9649B4421
5,332,916 UART: [art] SIG.R = F473B5BCDE77AB8F929A4D093577535A0C311F5E4F43F0FBD5FCA72B2D73992824FEC142ACE6E5771A641B408B2B14ED
5,339,694 UART: [art] SIG.S = 5FB18A48517CFC1BF2B0E4A63CD34DA959430928C5C488B8CE308B8939E39D68F1F0A7D817FEBD1BDBD71B0352820B92
5,363,720 UART: Caliptra RT
5,364,065 UART: [state] CFI Enabled
5,648,014 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,679,196 UART: [rt]cmd =0x4d454153, len=108
5,699,595 >>> mbox cmd response data (12 bytes)
5,699,596 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,670,658 >>> mbox cmd response: success
7,670,658 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,683,838 UART:
7,683,854 UART: Running Caliptra FMC ...
7,684,262 UART:
7,684,405 UART: [state] CFI Enabled
7,773,214 UART: [art] Extend RT PCRs Done
7,773,642 UART: [art] Lock RT PCRs Done
7,774,585 UART: [art] Populate DV Done
7,782,824 UART: [fht] FMC Alias Private Key: 7
7,783,832 UART: [art] Derive CDI
7,784,112 UART: [art] Store in in slot 0x4
7,869,371 UART: [art] Derive Key Pair
7,869,731 UART: [art] Store priv key in slot 0x5
7,882,617 UART: [art] Derive Key Pair - Done
7,897,593 UART: [art] Signing Cert with AUTHO
7,898,073 UART: RITY.KEYID = 7
7,913,571 UART: [art] Erasing AUTHORITY.KEYID = 7
7,914,336 UART: [art] PUB.X = 37ADCA5819E5A6395E93F79D4B7986ADCFB0E2A46265DEDB6E43D60EB1449C9416E6D2E2A4FF05710014B784F98FD5DF
7,921,092 UART: [art] PUB.Y = 32931D8B7E0A4B9081E93929887645B77A3B9F5986E0DABE3C87CE581CC491188932972D6ABEF60CA5C2D05B885DF4C1
7,928,040 UART: [art] SIG.R = 4C1C66967A76B0751DB078056797DDC397169AA7D0F30C511ACEED775C3858C0F26C813BFDFEEB32F50A484B42459736
7,934,805 UART: [art] SIG.S = 3B474CFA9EF6C501D19D79F873CED96DA7CD5B71E9414274587253A6C2DD83555CB39C5F0FCDC3A15B8C24B39C549E40
7,958,620 UART: mbox::rt_entry...
7,958,992 UART: ____ _ _ _ ____ _____
7,959,776 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,960,576 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,961,344 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,962,112 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,962,880 UART: |_|
7,963,192 UART:
8,243,792 UART: [rt] Runtime listening for mailbox commands...
10,214,581 >>> mbox cmd response: success
10,214,581 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,227,943 UART:
10,227,959 UART: Running Caliptra FMC ...
10,228,367 UART:
10,228,510 UART: [state] CFI Enabled
10,317,615 UART: [art] Extend RT PCRs Done
10,318,043 UART: [art] Lock RT PCRs Done
10,319,396 UART: [art] Populate DV Done
10,327,603 UART: [fht] FMC Alias Private Key: 7
10,328,559 UART: [art] Derive CDI
10,328,839 UART: [art] Store in in slot 0x4
10,414,596 UART: [art] Derive Key Pair
10,414,956 UART: [art] Store priv key in slot 0x5
10,428,334 UART: [art] Derive Key Pair - Done
10,443,476 UART: [art] Signing Cert with AUTHO
10,443,956 UART: RITY.KEYID = 7
10,459,228 UART: [art] Erasing AUTHORITY.KEYID = 7
10,459,993 UART: [art] PUB.X = B78731DB6B94CD038FEF87A4740E00A254886BB6DDE8ED5B83E7B5BECD88EC41CCC3F1054DDE5A3AFE16BB58AE8B0E38
10,466,757 UART: [art] PUB.Y = 86E010F137C97AF7D7F0C3C28E66949E51DC83365752EF35211A6D98E5766771F3B422B4FE404DE22A1081022C14FE6C
10,473,702 UART: [art] SIG.R = 3C4F1636F1E2B3AE05B90E41D19DF9A6B7C606E9CB0DADFABB6D46948D1D5EAF3C000001154475BE953FF7B8DD450C00
10,480,406 UART: [art] SIG.S = EF347C7ACA42A73B8A2E9AEBD3C5D46DD20A31B80DBF07028D63CC517A7299564A5799A42E6D3B426E1EF2454B998772
10,503,953 UART: mbox::rt_entry...
10,504,325 UART: ____ _ _ _ ____ _____
10,505,109 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,505,909 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,506,677 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,507,445 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,508,213 UART: |_|
10,508,525 UART:
10,785,775 UART: [rt] Runtime listening for mailbox commands...
10,786,971 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,441 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,931 UART: [kat] SHA2-256
881,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,977 UART: [kat] ++
886,129 UART: [kat] sha1
890,257 UART: [kat] SHA2-256
892,195 UART: [kat] SHA2-384
894,896 UART: [kat] SHA2-512-ACC
896,797 UART: [kat] ECC-384
902,330 UART: [kat] HMAC-384Kdf
906,948 UART: [kat] LMS
1,475,144 UART: [kat] --
1,476,073 UART: [cold-reset] ++
1,476,641 UART: [fht] Storing FHT @ 0x50003400
1,479,562 UART: [idev] ++
1,479,730 UART: [idev] CDI.KEYID = 6
1,480,090 UART: [idev] SUBJECT.KEYID = 7
1,480,514 UART: [idev] UDS.KEYID = 0
1,480,859 ready_for_fw is high
1,480,859 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,498 UART: [idev] Erasing UDS.KEYID = 0
1,505,586 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,144 UART: [idev] --
1,515,043 UART: [ldev] ++
1,515,211 UART: [ldev] CDI.KEYID = 6
1,515,574 UART: [ldev] SUBJECT.KEYID = 5
1,516,000 UART: [ldev] AUTHORITY.KEYID = 7
1,516,463 UART: [ldev] FE.KEYID = 1
1,521,781 UART: [ldev] Erasing FE.KEYID = 1
1,547,642 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,486 UART: [ldev] --
1,586,825 UART: [fwproc] Waiting for Commands...
1,587,504 UART: [fwproc] Received command 0x46574c44
1,588,295 UART: [fwproc] Received Image of size 114332 bytes
2,886,119 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,349 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,701 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,574 >>> mbox cmd response: success
3,080,834 UART: [afmc] ++
3,081,002 UART: [afmc] CDI.KEYID = 6
3,081,364 UART: [afmc] SUBJECT.KEYID = 7
3,081,789 UART: [afmc] AUTHORITY.KEYID = 5
3,116,972 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,042 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,822 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,550 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,435 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,125 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,022 UART: [afmc] --
3,160,032 UART: [cold-reset] --
3,160,944 UART: [state] Locking Datavault
3,162,193 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,797 UART: [state] Locking ICCM
3,163,367 UART: [exit] Launching FMC @ 0x40000130
3,168,696 UART:
3,168,712 UART: Running Caliptra FMC ...
3,169,120 UART:
3,169,174 UART: [state] CFI Enabled
3,179,769 UART: [fht] FMC Alias Private Key: 7
3,286,946 UART: [art] Extend RT PCRs Done
3,287,374 UART: [art] Lock RT PCRs Done
3,288,926 UART: [art] Populate DV Done
3,297,045 UART: [fht] FMC Alias Private Key: 7
3,298,161 UART: [art] Derive CDI
3,298,441 UART: [art] Store in in slot 0x4
3,384,094 UART: [art] Derive Key Pair
3,384,454 UART: [art] Store priv key in slot 0x5
3,398,018 UART: [art] Derive Key Pair - Done
3,412,752 UART: [art] Signing Cert with AUTHO
3,413,232 UART: RITY.KEYID = 7
3,428,408 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,173 UART: [art] PUB.X = AA13D1DE7B45064252D80F2ECD536B869BC17081C3C2588689D63B15A6671BCB0E6EA4B5F9F9059ED50F4022AE99A3D1
3,435,936 UART: [art] PUB.Y = 914583CAF0CB1B75BEED9E8B79BD992C7697E2A02A59438C73E289EB875E2845A9473F87D2D770B98D9A38FB87B4DBB5
3,442,896 UART: [art] SIG.R = 6FF4A79A3733A50E38AD518E046BEC8F10C22E2BB25FEEE04E8BA71F4FE36535E68D5C8DF6878BBC4AD2DD5535E0A9EC
3,449,684 UART: [art] SIG.S = 0E7EE33FBA4FCF568DD29D4EEE434BAD63E7F47FE271AD9F6059D804FB78E109FF1C3C7DF0C500412FDE54364FBB348A
3,473,046 UART: Caliptra RT
3,473,299 UART: [state] CFI Enabled
3,581,361 UART: [rt] RT listening for mailbox commands...
3,582,031 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,603 UART: [rt]cmd =0x4d454153, len=108
3,632,888 >>> mbox cmd response data (12 bytes)
3,632,889 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,905 UART:
3,633,921 UART: Running Caliptra ROM ...
3,634,329 UART:
3,634,383 UART: [state] CFI Enabled
3,636,785 UART: [state] LifecycleState = Unprovisioned
3,637,440 UART: [state] DebugLocked = No
3,637,998 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,639,555 UART: [kat] SHA2-256
4,433,486 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,437,601 UART: [kat] ++
4,437,753 UART: [kat] sha1
4,442,047 UART: [kat] SHA2-256
4,443,985 UART: [kat] SHA2-384
4,446,808 UART: [kat] SHA2-512-ACC
4,448,708 UART: [kat] ECC-384
4,454,491 UART: [kat] HMAC-384Kdf
4,459,151 UART: [kat] LMS
5,027,347 UART: [kat] --
5,028,206 UART: [update-reset] ++
5,955,900 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,957,044 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,053,478 >>> mbox cmd response: success
6,053,478 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,053,645 UART: [update-reset] Copying MAN_2 To MAN_1
6,061,659 UART: [update-reset Success] --
6,062,772 UART: [state] Locking Datavault
6,063,486 UART: [state] Locking PCR0, PCR1 and PCR31
6,064,090 UART: [state] Locking ICCM
6,064,532 UART: [exit] Launching FMC @ 0x40000130
6,069,861 UART:
6,069,877 UART: Running Caliptra FMC ...
6,070,285 UART:
6,070,339 UART: [state] CFI Enabled
6,159,832 UART: [art] Extend RT PCRs Done
6,160,260 UART: [art] Lock RT PCRs Done
6,161,643 UART: [art] Populate DV Done
6,169,890 UART: [fht] FMC Alias Private Key: 7
6,171,054 UART: [art] Derive CDI
6,171,334 UART: [art] Store in in slot 0x4
6,257,155 UART: [art] Derive Key Pair
6,257,515 UART: [art] Store priv key in slot 0x5
6,270,467 UART: [art] Derive Key Pair - Done
6,285,160 UART: [art] Signing Cert with AUTHO
6,285,640 UART: RITY.KEYID = 7
6,301,106 UART: [art] Erasing AUTHORITY.KEYID = 7
6,301,871 UART: [art] PUB.X = 12499E466750CE6259479BC18F01770C571D618CFA596973BCAA2B717A0059AF4940F825A1650955DC966EDCDC5DF7CE
6,308,612 UART: [art] PUB.Y = 1A646701BD2A7C3F850271729215A6C03F8F6D1E2118361488ADB4CBA98DA84C4ABBAA8630423982C52421B3D67F8FC7
6,315,558 UART: [art] SIG.R = 83FE4306372ED9E7E8D1D8418B2A5624613F42293195DC0A775947C38EF47459299E0554AA21009C8290A99677D37F92
6,322,283 UART: [art] SIG.S = C3A2B6EE5CEEDB9818C61C2750F2B6C861AB6B7C3F8511DF93A52516C2E88C45116072BAF5C7F093C0ED13A33AD5965D
6,345,562 UART: mbox::rt_entry...
6,345,934 UART: ____ _ _ _ ____ _____
6,346,718 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,347,518 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,348,286 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,349,054 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,349,822 UART: |_|
6,350,134 UART:
6,631,131 UART: [rt] Runtime listening for mailbox commands...
6,632,321 >>> mbox cmd response data (48 bytes)
6,632,322 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,635,105 >>> mbox cmd response data (48 bytes)
6,635,106 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,650,243 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,827 ready_for_fw is high
1,362,827 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,194 >>> mbox cmd response: success
2,990,006 UART:
2,990,022 UART: Running Caliptra FMC ...
2,990,430 UART:
2,990,484 UART: [state] CFI Enabled
3,001,181 UART: [fht] FMC Alias Private Key: 7
3,109,312 UART: [art] Extend RT PCRs Done
3,109,740 UART: [art] Lock RT PCRs Done
3,111,416 UART: [art] Populate DV Done
3,119,663 UART: [fht] FMC Alias Private Key: 7
3,120,693 UART: [art] Derive CDI
3,120,973 UART: [art] Store in in slot 0x4
3,206,448 UART: [art] Derive Key Pair
3,206,808 UART: [art] Store priv key in slot 0x5
3,220,104 UART: [art] Derive Key Pair - Done
3,234,733 UART: [art] Signing Cert with AUTHO
3,235,213 UART: RITY.KEYID = 7
3,250,265 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,030 UART: [art] PUB.X = 2A5046A3254CA279434D664D4C5CF95CFE47E85D2CB2F5AEAEBFFC0882CE28CA77170512B7A314416598A59D97AD6F0A
3,257,803 UART: [art] PUB.Y = 28486E7EF37D313DE70A6A7C1B90C6D0E2F428E4C4FAD339BF4716BB062976A364DA656A534AC3697A5658E7A84B0E33
3,264,750 UART: [art] SIG.R = 1EAC8002031B3FFDE7543DF31275D863873E466303485DD2696CF1F35E4E4260C951F7115244F18536E2AD2AC5713224
3,271,503 UART: [art] SIG.S = C473878DAAA386EFF69DF6E1F214E0245CCE5ECAEA67C1306740277D6931D12E8832A527EC3A6295C5D77B52EDEA210F
3,295,695 UART: Caliptra RT
3,295,948 UART: [state] CFI Enabled
3,404,817 UART: [rt] RT listening for mailbox commands...
3,405,487 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,113 UART: [rt]cmd =0x4d454153, len=108
3,455,998 >>> mbox cmd response data (12 bytes)
3,455,999 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,756,646 >>> mbox cmd response: success
5,756,646 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,770,147 UART:
5,770,163 UART: Running Caliptra FMC ...
5,770,571 UART:
5,770,625 UART: [state] CFI Enabled
5,859,750 UART: [art] Extend RT PCRs Done
5,860,178 UART: [art] Lock RT PCRs Done
5,861,549 UART: [art] Populate DV Done
5,869,998 UART: [fht] FMC Alias Private Key: 7
5,871,110 UART: [art] Derive CDI
5,871,390 UART: [art] Store in in slot 0x4
5,957,149 UART: [art] Derive Key Pair
5,957,509 UART: [art] Store priv key in slot 0x5
5,970,273 UART: [art] Derive Key Pair - Done
5,984,720 UART: [art] Signing Cert with AUTHO
5,985,200 UART: RITY.KEYID = 7
6,000,606 UART: [art] Erasing AUTHORITY.KEYID = 7
6,001,371 UART: [art] PUB.X = 079A139EF7183D708E7D5830F366EC31F0DE793ED7900441451DAA9A5F7602F4ACC1AFC89EB94E0AE7E5935B4FED36DB
6,008,143 UART: [art] PUB.Y = 47C1F6DE4457BE03C9707E3A6B8AE829E25CABE9F251B799C4E43B1E67C48ED4C85F3F6075DA38178E73B1F4AFF1502D
6,015,104 UART: [art] SIG.R = 2CD55D6EE9566F93A7CE9F38E8512FCA5F4E2B893D6E80BD75F6BA511493D0201E3910A80272DC3C2817804F3DB9C519
6,021,877 UART: [art] SIG.S = 4154BB988E19295178CFEB88CE0626B2E3553FF85286809E9CCF39E518AE4E094EF370436621A3D7CCEC89A86BB07C3A
6,045,742 UART: mbox::rt_entry...
6,046,114 UART: ____ _ _ _ ____ _____
6,046,898 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,047,698 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,048,466 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,049,234 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,050,002 UART: |_|
6,050,314 UART:
6,330,513 UART: [rt] Runtime listening for mailbox commands...
6,331,703 >>> mbox cmd response data (48 bytes)
6,331,704 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,334,487 >>> mbox cmd response data (48 bytes)
6,334,488 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,349,625 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,704 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,374 UART: [kat] SHA2-256
882,305 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,420 UART: [kat] ++
886,572 UART: [kat] sha1
890,908 UART: [kat] SHA2-256
892,846 UART: [kat] SHA2-384
895,665 UART: [kat] SHA2-512-ACC
897,566 UART: [kat] ECC-384
903,365 UART: [kat] HMAC-384Kdf
907,963 UART: [kat] LMS
1,476,159 UART: [kat] --
1,477,020 UART: [cold-reset] ++
1,477,496 UART: [fht] Storing FHT @ 0x50003400
1,480,165 UART: [idev] ++
1,480,333 UART: [idev] CDI.KEYID = 6
1,480,693 UART: [idev] SUBJECT.KEYID = 7
1,481,117 UART: [idev] UDS.KEYID = 0
1,481,462 ready_for_fw is high
1,481,462 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,167 UART: [idev] Erasing UDS.KEYID = 0
1,505,925 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,445 UART: [idev] --
1,515,506 UART: [ldev] ++
1,515,674 UART: [ldev] CDI.KEYID = 6
1,516,037 UART: [ldev] SUBJECT.KEYID = 5
1,516,463 UART: [ldev] AUTHORITY.KEYID = 7
1,516,926 UART: [ldev] FE.KEYID = 1
1,522,158 UART: [ldev] Erasing FE.KEYID = 1
1,547,473 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,645 UART: [ldev] --
1,586,918 UART: [fwproc] Waiting for Commands...
1,587,619 UART: [fwproc] Received command 0x46574c44
1,588,410 UART: [fwproc] Received Image of size 114332 bytes
2,884,772 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,884 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,236 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,191 >>> mbox cmd response: success
3,078,251 UART: [afmc] ++
3,078,419 UART: [afmc] CDI.KEYID = 6
3,078,781 UART: [afmc] SUBJECT.KEYID = 7
3,079,206 UART: [afmc] AUTHORITY.KEYID = 5
3,114,659 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,881 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,661 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,389 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,274 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,964 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,715 UART: [afmc] --
3,157,639 UART: [cold-reset] --
3,158,383 UART: [state] Locking Datavault
3,159,418 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,022 UART: [state] Locking ICCM
3,160,476 UART: [exit] Launching FMC @ 0x40000130
3,165,805 UART:
3,165,821 UART: Running Caliptra FMC ...
3,166,229 UART:
3,166,372 UART: [state] CFI Enabled
3,177,119 UART: [fht] FMC Alias Private Key: 7
3,285,226 UART: [art] Extend RT PCRs Done
3,285,654 UART: [art] Lock RT PCRs Done
3,287,152 UART: [art] Populate DV Done
3,295,137 UART: [fht] FMC Alias Private Key: 7
3,296,175 UART: [art] Derive CDI
3,296,455 UART: [art] Store in in slot 0x4
3,382,502 UART: [art] Derive Key Pair
3,382,862 UART: [art] Store priv key in slot 0x5
3,396,292 UART: [art] Derive Key Pair - Done
3,410,948 UART: [art] Signing Cert with AUTHO
3,411,428 UART: RITY.KEYID = 7
3,426,624 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,389 UART: [art] PUB.X = 4BD8204597BD0EC5A48F619297D4841F4EF5F81103D3A17806FE1DD5D775EF780D7C2BB5A7D60084B64C869C99769E21
3,434,127 UART: [art] PUB.Y = F69553CF6E5C7FA7DFCE07AAD7E98590CED1CF83FB23A2E5F0DEA0FE2BB1956ADB6D80E16789A04C628023140C88B6E1
3,441,093 UART: [art] SIG.R = 6EF9A0423525A9643CCF8B2D03C9A27D8A679E010FCA47670822B3630C7139BAEF8523196CBF839B037760296571E5C9
3,447,841 UART: [art] SIG.S = B130A145659B7BDB309DA8A517C085C9A3BFA2E3169413410926EC1FCB58A8DB4429DB1D5D2701CD984B1389EF1D156E
3,471,544 UART: Caliptra RT
3,471,889 UART: [state] CFI Enabled
3,579,856 UART: [rt] RT listening for mailbox commands...
3,580,526 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,938 UART: [rt]cmd =0x4d454153, len=108
3,631,171 >>> mbox cmd response data (12 bytes)
3,631,172 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,806 UART:
3,631,822 UART: Running Caliptra ROM ...
3,632,230 UART:
3,632,371 UART: [state] CFI Enabled
3,634,945 UART: [state] LifecycleState = Unprovisioned
3,635,600 UART: [state] DebugLocked = No
3,636,170 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,637,813 UART: [kat] SHA2-256
4,431,744 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,435,859 UART: [kat] ++
4,436,011 UART: [kat] sha1
4,440,429 UART: [kat] SHA2-256
4,442,367 UART: [kat] SHA2-384
4,445,038 UART: [kat] SHA2-512-ACC
4,446,938 UART: [kat] ECC-384
4,452,427 UART: [kat] HMAC-384Kdf
4,457,005 UART: [kat] LMS
5,025,201 UART: [kat] --
5,025,754 UART: [update-reset] ++
5,953,416 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,954,462 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,050,896 >>> mbox cmd response: success
6,050,896 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,051,177 UART: [update-reset] Copying MAN_2 To MAN_1
6,059,191 UART: [update-reset Success] --
6,060,318 UART: [state] Locking Datavault
6,061,166 UART: [state] Locking PCR0, PCR1 and PCR31
6,061,770 UART: [state] Locking ICCM
6,062,292 UART: [exit] Launching FMC @ 0x40000130
6,067,621 UART:
6,067,637 UART: Running Caliptra FMC ...
6,068,045 UART:
6,068,188 UART: [state] CFI Enabled
6,157,075 UART: [art] Extend RT PCRs Done
6,157,503 UART: [art] Lock RT PCRs Done
6,158,718 UART: [art] Populate DV Done
6,167,015 UART: [fht] FMC Alias Private Key: 7
6,167,995 UART: [art] Derive CDI
6,168,275 UART: [art] Store in in slot 0x4
6,254,326 UART: [art] Derive Key Pair
6,254,686 UART: [art] Store priv key in slot 0x5
6,267,638 UART: [art] Derive Key Pair - Done
6,282,406 UART: [art] Signing Cert with AUTHO
6,282,886 UART: RITY.KEYID = 7
6,298,242 UART: [art] Erasing AUTHORITY.KEYID = 7
6,299,007 UART: [art] PUB.X = 712C8160D5D63E6016BBBDEF8087D1942E4E7BF57B52A7912F06CD871AFECD0ECBB38DD7E10329CEAA62D387328796CB
6,305,784 UART: [art] PUB.Y = D486239D49E7547EC58430809D736AD6CA4189AB0C3C118C74A8684B1C8D7E04B5160BE5F1EB58C380E5E26A72C16081
6,312,725 UART: [art] SIG.R = ECEC185D04D83A9E405DE1E5DBFEF8C56ADA273A36428DB182F1E9A446D01B0A91B3A4ADAD97E4BE017AC7096260FBF7
6,319,507 UART: [art] SIG.S = 386CCC6C938F198CE523F9C1A5F6E7D6B1B2AFF6FB65DB6B8CBC6EE6A46C459AFFACA766B3DA631FB2D4641C96E07632
6,343,602 UART: mbox::rt_entry...
6,343,974 UART: ____ _ _ _ ____ _____
6,344,758 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,345,558 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,346,326 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,347,094 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,347,862 UART: |_|
6,348,174 UART:
6,630,798 UART: [rt] Runtime listening for mailbox commands...
6,631,988 >>> mbox cmd response data (48 bytes)
6,631,989 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,634,772 >>> mbox cmd response data (48 bytes)
6,634,773 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,649,910 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,924 ready_for_fw is high
1,362,924 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,057 >>> mbox cmd response: success
2,990,449 UART:
2,990,465 UART: Running Caliptra FMC ...
2,990,873 UART:
2,991,016 UART: [state] CFI Enabled
3,001,401 UART: [fht] FMC Alias Private Key: 7
3,109,490 UART: [art] Extend RT PCRs Done
3,109,918 UART: [art] Lock RT PCRs Done
3,111,350 UART: [art] Populate DV Done
3,119,371 UART: [fht] FMC Alias Private Key: 7
3,120,341 UART: [art] Derive CDI
3,120,621 UART: [art] Store in in slot 0x4
3,206,306 UART: [art] Derive Key Pair
3,206,666 UART: [art] Store priv key in slot 0x5
3,220,168 UART: [art] Derive Key Pair - Done
3,235,257 UART: [art] Signing Cert with AUTHO
3,235,737 UART: RITY.KEYID = 7
3,250,991 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,756 UART: [art] PUB.X = E67E670E5204DF153A788192942E4E198987D60E36D0BAECCBFBC4E2897E82CC38C4CBA186DBEF7CFA5E97CF7541F393
3,258,533 UART: [art] PUB.Y = 24DEDEF5D08D8DF5D2CD900DE1D2801D612494CFA463D0B22447C8ACDCD242C7A81FE534CEEED8CFDF65EB6425BBA7AC
3,265,512 UART: [art] SIG.R = 2CA8801F73E74450B545CE615BA3EE431B539BC2047E983F185E03483F8A2514F01BEF8DEEC22A227848BA1E4423CF67
3,272,280 UART: [art] SIG.S = 4F414BB2DA036F7719454B0156A093852FB90DF154B8D785A6271671544F79356BDBABB206E075E3E203C8B8909455D4
3,296,618 UART: Caliptra RT
3,296,963 UART: [state] CFI Enabled
3,404,825 UART: [rt] RT listening for mailbox commands...
3,405,495 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,987 UART: [rt]cmd =0x4d454153, len=108
3,457,304 >>> mbox cmd response data (12 bytes)
3,457,305 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,758,735 >>> mbox cmd response: success
5,758,735 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,772,150 UART:
5,772,166 UART: Running Caliptra FMC ...
5,772,574 UART:
5,772,717 UART: [state] CFI Enabled
5,862,368 UART: [art] Extend RT PCRs Done
5,862,796 UART: [art] Lock RT PCRs Done
5,864,349 UART: [art] Populate DV Done
5,872,476 UART: [fht] FMC Alias Private Key: 7
5,873,426 UART: [art] Derive CDI
5,873,706 UART: [art] Store in in slot 0x4
5,958,987 UART: [art] Derive Key Pair
5,959,347 UART: [art] Store priv key in slot 0x5
5,972,527 UART: [art] Derive Key Pair - Done
5,987,356 UART: [art] Signing Cert with AUTHO
5,987,836 UART: RITY.KEYID = 7
6,002,954 UART: [art] Erasing AUTHORITY.KEYID = 7
6,003,719 UART: [art] PUB.X = 4087A46F730CE48F64889483E6C7D770F8B678FE35E1018657B3C25FEA2D5510335B7D917B8FB6312FBCFC89546FF139
6,010,483 UART: [art] PUB.Y = 9CF9FEF974284D7813E5BFD49F9B81B41E21916CD9EC01436A847383D49D1F740EDCD871249E7E03453C200E4D4DAA58
6,017,427 UART: [art] SIG.R = 0315CF3A613BE97D17592FB324A8C7DA9BD1CF23BF169F69FE79135EC88976716A76F5D31878747DF278A0413FDC1CA3
6,024,200 UART: [art] SIG.S = 98D0932F380F4A0BF8F888668F5145A95288EA240643580A9C086B7DF9EC76F394ECD20C2E337B400DB2DBFEB9A3CEDA
6,047,896 UART: mbox::rt_entry...
6,048,268 UART: ____ _ _ _ ____ _____
6,049,052 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,049,852 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,050,620 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,051,388 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,052,156 UART: |_|
6,052,468 UART:
6,334,270 UART: [rt] Runtime listening for mailbox commands...
6,335,460 >>> mbox cmd response data (48 bytes)
6,335,461 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,338,244 >>> mbox cmd response data (48 bytes)
6,338,245 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,353,382 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,662 UART: [state] LifecycleState = Unprovisioned
85,317 UART: [state] DebugLocked = No
85,943 UART: [state] WD Timer not started. Device not locked for debugging
87,094 UART: [kat] SHA2-256
892,744 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,869 UART: [kat] ++
897,021 UART: [kat] sha1
901,047 UART: [kat] SHA2-256
902,987 UART: [kat] SHA2-384
905,872 UART: [kat] SHA2-512-ACC
907,773 UART: [kat] ECC-384
917,820 UART: [kat] HMAC-384Kdf
922,550 UART: [kat] LMS
1,170,878 UART: [kat] --
1,171,829 UART: [cold-reset] ++
1,172,247 UART: [fht] FHT @ 0x50003400
1,174,692 UART: [idev] ++
1,174,860 UART: [idev] CDI.KEYID = 6
1,175,220 UART: [idev] SUBJECT.KEYID = 7
1,175,644 UART: [idev] UDS.KEYID = 0
1,175,989 ready_for_fw is high
1,175,989 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,998 UART: [idev] Erasing UDS.KEYID = 0
1,200,979 UART: [idev] Sha1 KeyId Algorithm
1,209,435 UART: [idev] --
1,210,471 UART: [ldev] ++
1,210,639 UART: [ldev] CDI.KEYID = 6
1,211,002 UART: [ldev] SUBJECT.KEYID = 5
1,211,428 UART: [ldev] AUTHORITY.KEYID = 7
1,211,891 UART: [ldev] FE.KEYID = 1
1,217,101 UART: [ldev] Erasing FE.KEYID = 1
1,244,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,913 UART: [ldev] --
1,283,246 UART: [fwproc] Wait for Commands...
1,283,936 UART: [fwproc] Recv command 0x46574c44
1,284,664 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,810 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,114 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,865 >>> mbox cmd response: success
2,774,927 UART: [afmc] ++
2,775,095 UART: [afmc] CDI.KEYID = 6
2,775,457 UART: [afmc] SUBJECT.KEYID = 7
2,775,882 UART: [afmc] AUTHORITY.KEYID = 5
2,811,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,942 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,690 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,418 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,303 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,022 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,810 UART: [afmc] --
2,854,782 UART: [cold-reset] --
2,855,820 UART: [state] Locking Datavault
2,857,053 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,657 UART: [state] Locking ICCM
2,858,171 UART: [exit] Launching FMC @ 0x40000130
2,863,500 UART:
2,863,516 UART: Running Caliptra FMC ...
2,863,924 UART:
2,863,978 UART: [state] CFI Enabled
2,874,457 UART: [fht] FMC Alias Private Key: 7
2,982,576 UART: [art] Extend RT PCRs Done
2,983,004 UART: [art] Lock RT PCRs Done
2,984,424 UART: [art] Populate DV Done
2,992,493 UART: [fht] FMC Alias Private Key: 7
2,993,443 UART: [art] Derive CDI
2,993,723 UART: [art] Store in in slot 0x4
3,079,256 UART: [art] Derive Key Pair
3,079,616 UART: [art] Store priv key in slot 0x5
3,092,782 UART: [art] Derive Key Pair - Done
3,107,373 UART: [art] Signing Cert with AUTHO
3,107,853 UART: RITY.KEYID = 7
3,123,161 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,926 UART: [art] PUB.X = 7915A0C928F9A34A5BE505E63E25E67EF293FFEDB9BFC548CDD011F801EF5D957CC8C2B93279C0ECD812641ED4844EBD
3,130,708 UART: [art] PUB.Y = 1A2ED99FBFD7FDBAF9F669A713E05DA51B5BAC299504114A838238C572426880E4F9F4FEFDB532CBE53863EE5FC2CFD2
3,137,675 UART: [art] SIG.R = E7F59E2B3E8A4E040C9367C3EF6263E5460A39095A931E58A17262680E13EC5FF7CF343D53F27D47ED201F05F33FF43A
3,144,431 UART: [art] SIG.S = 18ED1BDABF2C9A7AD54E8F92E09AEECA146BC091CB61558FCECA8B702AEF323C6A8ADC7AC1ABDC765788AEB02E6A0AFF
3,168,253 UART: Caliptra RT
3,168,506 UART: [state] CFI Enabled
3,276,515 UART: [rt] RT listening for mailbox commands...
3,277,185 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,505 UART: [rt]cmd =0x4d454153, len=108
3,327,952 >>> mbox cmd response data (12 bytes)
3,327,953 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,970 UART:
3,328,986 UART: Running Caliptra ROM ...
3,329,394 UART:
3,329,449 UART: [state] CFI Enabled
3,331,633 UART: [state] LifecycleState = Unprovisioned
3,332,288 UART: [state] DebugLocked = No
3,332,936 UART: [state] WD Timer not started. Device not locked for debugging
3,334,056 UART: [kat] SHA2-256
4,139,706 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,143,831 UART: [kat] ++
4,143,983 UART: [kat] sha1
4,148,227 UART: [kat] SHA2-256
4,150,167 UART: [kat] SHA2-384
4,152,826 UART: [kat] SHA2-512-ACC
4,154,726 UART: [kat] ECC-384
4,164,625 UART: [kat] HMAC-384Kdf
4,169,275 UART: [kat] LMS
4,417,603 UART: [kat] --
4,418,573 UART: [update-reset] ++
5,323,007 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,324,148 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,420,530 >>> mbox cmd response: success
5,420,530 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,420,817 UART: [update-reset] Copying MAN_2 To MAN_1
5,428,831 UART: [update-reset Success] --
5,429,880 UART: [state] Locking Datavault
5,430,546 UART: [state] Locking PCR0, PCR1 and PCR31
5,431,150 UART: [state] Locking ICCM
5,431,578 UART: [exit] Launching FMC @ 0x40000130
5,436,907 UART:
5,436,923 UART: Running Caliptra FMC ...
5,437,331 UART:
5,437,385 UART: [state] CFI Enabled
5,526,194 UART: [art] Extend RT PCRs Done
5,526,622 UART: [art] Lock RT PCRs Done
5,527,933 UART: [art] Populate DV Done
5,536,066 UART: [fht] FMC Alias Private Key: 7
5,537,174 UART: [art] Derive CDI
5,537,454 UART: [art] Store in in slot 0x4
5,622,811 UART: [art] Derive Key Pair
5,623,171 UART: [art] Store priv key in slot 0x5
5,636,547 UART: [art] Derive Key Pair - Done
5,651,475 UART: [art] Signing Cert with AUTHO
5,651,955 UART: RITY.KEYID = 7
5,667,273 UART: [art] Erasing AUTHORITY.KEYID = 7
5,668,038 UART: [art] PUB.X = 685357420C0429AF7154231D8A4124521E751B951D751B0F722F9DFD5B884F35697421593806B46EF91B5B2D17688B4C
5,674,782 UART: [art] PUB.Y = 9ECD52EF24DC6FFFBC2151DA075DCD311F5DBCCB55B6A9E06CA18DB904299C612C0C49F77AC167B08BFFFDE7CDE8AB0B
5,681,756 UART: [art] SIG.R = BA87D886C62F50B63DFB18D5E8FD085373FEDADB51E3407D9B480FA7F4352423A00E6BE20721A12E22F5EA5605DB4481
5,688,521 UART: [art] SIG.S = AC8B0D11ED77EF5F0F3A8D03BD1B234BED8CFEAF67D21B7D8DD9D733F0063A904B66BCC3FE916FDBC4B94235EFE53F9A
5,711,916 UART: mbox::rt_entry...
5,712,288 UART: ____ _ _ _ ____ _____
5,713,072 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,713,872 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,714,640 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,715,408 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,716,176 UART: |_|
5,716,488 UART:
5,995,699 UART: [rt] Runtime listening for mailbox commands...
5,996,889 >>> mbox cmd response data (48 bytes)
5,996,890 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,999,673 >>> mbox cmd response data (48 bytes)
5,999,674 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,014,811 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,501 ready_for_fw is high
1,059,501 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,904 >>> mbox cmd response: success
2,689,822 UART:
2,689,838 UART: Running Caliptra FMC ...
2,690,246 UART:
2,690,300 UART: [state] CFI Enabled
2,701,215 UART: [fht] FMC Alias Private Key: 7
2,809,154 UART: [art] Extend RT PCRs Done
2,809,582 UART: [art] Lock RT PCRs Done
2,810,856 UART: [art] Populate DV Done
2,819,161 UART: [fht] FMC Alias Private Key: 7
2,820,107 UART: [art] Derive CDI
2,820,387 UART: [art] Store in in slot 0x4
2,905,998 UART: [art] Derive Key Pair
2,906,358 UART: [art] Store priv key in slot 0x5
2,919,924 UART: [art] Derive Key Pair - Done
2,934,693 UART: [art] Signing Cert with AUTHO
2,935,173 UART: RITY.KEYID = 7
2,950,977 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,742 UART: [art] PUB.X = A364F367D92C3897A9441109719C7F4469E4657479083111178066CA7F717004A62C61A1C9542A74EEB546A14349736E
2,958,483 UART: [art] PUB.Y = 28038EB504667A39B52693F05AABA7B32B75D0C0F2387B024D81EBBD3CB5ADC23A984EE274246EA8FEE7073F0391724B
2,965,426 UART: [art] SIG.R = 66CCDF00D62FFDEC00B1A029D14603BF953197251F6A574098338CFF71ADF279F83794F9172A6E1907E2A6514B61DAF6
2,972,150 UART: [art] SIG.S = 286B3E8F5E6924D9B4F28869E53F58CADB2B2B438D7800C5EDB31807AFBB13D28CDA50F1848AC86BC462BC03A316D3AF
2,995,567 UART: Caliptra RT
2,995,820 UART: [state] CFI Enabled
3,103,483 UART: [rt] RT listening for mailbox commands...
3,104,153 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,687 UART: [rt]cmd =0x4d454153, len=108
3,154,930 >>> mbox cmd response data (12 bytes)
3,154,931 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,131,299 >>> mbox cmd response: success
5,131,299 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,144,515 UART:
5,144,531 UART: Running Caliptra FMC ...
5,144,939 UART:
5,144,993 UART: [state] CFI Enabled
5,234,052 UART: [art] Extend RT PCRs Done
5,234,480 UART: [art] Lock RT PCRs Done
5,235,889 UART: [art] Populate DV Done
5,244,042 UART: [fht] FMC Alias Private Key: 7
5,245,044 UART: [art] Derive CDI
5,245,324 UART: [art] Store in in slot 0x4
5,331,109 UART: [art] Derive Key Pair
5,331,469 UART: [art] Store priv key in slot 0x5
5,344,333 UART: [art] Derive Key Pair - Done
5,359,352 UART: [art] Signing Cert with AUTHO
5,359,832 UART: RITY.KEYID = 7
5,375,104 UART: [art] Erasing AUTHORITY.KEYID = 7
5,375,869 UART: [art] PUB.X = 7154C0441C2B80665ACD0573FE924C3BECA8C7369728911CCF05F758EBBCD7F1032E6B0BA38A6E7C683ED3B8E0F79D62
5,382,639 UART: [art] PUB.Y = 95C1720E39F7BA67AF253982F68C44DEC998A0B6C577C98D89462D8FCED7B34C670A22C76BB761275C3814E646C176C4
5,389,585 UART: [art] SIG.R = ACFE4B74D8798CEDF52CD6AF6248CF95D729A592315BA57AF8737F289CA3FC812D71997534AE18A9B270149434A6EEA5
5,396,365 UART: [art] SIG.S = 05396617A6DEC07D53E2483C9212D95470009FF773B8535A7BCE61B3B652F4EC693CB8A145CAF27642D3C595589DEF88
5,419,681 UART: mbox::rt_entry...
5,420,053 UART: ____ _ _ _ ____ _____
5,420,837 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,421,637 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,422,405 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,423,173 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,423,941 UART: |_|
5,424,253 UART:
5,706,611 UART: [rt] Runtime listening for mailbox commands...
5,707,801 >>> mbox cmd response data (48 bytes)
5,707,802 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,710,585 >>> mbox cmd response data (48 bytes)
5,710,586 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,725,723 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
893,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,564 UART: [kat] ++
897,716 UART: [kat] sha1
902,072 UART: [kat] SHA2-256
904,012 UART: [kat] SHA2-384
906,811 UART: [kat] SHA2-512-ACC
908,712 UART: [kat] ECC-384
918,829 UART: [kat] HMAC-384Kdf
923,333 UART: [kat] LMS
1,171,661 UART: [kat] --
1,172,582 UART: [cold-reset] ++
1,173,106 UART: [fht] FHT @ 0x50003400
1,175,697 UART: [idev] ++
1,175,865 UART: [idev] CDI.KEYID = 6
1,176,225 UART: [idev] SUBJECT.KEYID = 7
1,176,649 UART: [idev] UDS.KEYID = 0
1,176,994 ready_for_fw is high
1,176,994 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,331 UART: [idev] Erasing UDS.KEYID = 0
1,202,644 UART: [idev] Sha1 KeyId Algorithm
1,211,104 UART: [idev] --
1,212,150 UART: [ldev] ++
1,212,318 UART: [ldev] CDI.KEYID = 6
1,212,681 UART: [ldev] SUBJECT.KEYID = 5
1,213,107 UART: [ldev] AUTHORITY.KEYID = 7
1,213,570 UART: [ldev] FE.KEYID = 1
1,219,022 UART: [ldev] Erasing FE.KEYID = 1
1,244,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,750 UART: [ldev] --
1,284,091 UART: [fwproc] Wait for Commands...
1,284,735 UART: [fwproc] Recv command 0x46574c44
1,285,463 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,136 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,307 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,611 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,492 >>> mbox cmd response: success
2,777,728 UART: [afmc] ++
2,777,896 UART: [afmc] CDI.KEYID = 6
2,778,258 UART: [afmc] SUBJECT.KEYID = 7
2,778,683 UART: [afmc] AUTHORITY.KEYID = 5
2,814,654 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,917 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,665 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,393 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,278 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,997 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,701 UART: [afmc] --
2,857,727 UART: [cold-reset] --
2,858,379 UART: [state] Locking Datavault
2,859,682 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,286 UART: [state] Locking ICCM
2,860,750 UART: [exit] Launching FMC @ 0x40000130
2,866,079 UART:
2,866,095 UART: Running Caliptra FMC ...
2,866,503 UART:
2,866,646 UART: [state] CFI Enabled
2,877,229 UART: [fht] FMC Alias Private Key: 7
2,985,300 UART: [art] Extend RT PCRs Done
2,985,728 UART: [art] Lock RT PCRs Done
2,987,514 UART: [art] Populate DV Done
2,995,923 UART: [fht] FMC Alias Private Key: 7
2,997,071 UART: [art] Derive CDI
2,997,351 UART: [art] Store in in slot 0x4
3,082,798 UART: [art] Derive Key Pair
3,083,158 UART: [art] Store priv key in slot 0x5
3,096,526 UART: [art] Derive Key Pair - Done
3,111,272 UART: [art] Signing Cert with AUTHO
3,111,752 UART: RITY.KEYID = 7
3,126,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,315 UART: [art] PUB.X = 40F6EDE407E6F45953E0D026DCE4418C7AAAF3073FEA59717097AD9033C42696A7B9EFA34BB9EEB4825AD83AC4A21980
3,134,091 UART: [art] PUB.Y = 7B7F6FB730DBFB6C179AA0E00BA6EBD31F30F9E98290BF8765AEDCCD22DF1113BA69F8CFCDDE42EA62A236DA07E53619
3,141,063 UART: [art] SIG.R = CBFC99E433F51C6B3DDF56FBDDA1D03F97CBB84FC61A2774DBFCE3CDC61BFE03E8D1AD0864E4449A0809C93870E9E7D9
3,147,849 UART: [art] SIG.S = 276D8247AD1F5AA44FB1F7FC7D108E1D9651573E446787AF16BD364F19AA3BF1FF241971D76F9D5CF855FB95549E818F
3,171,222 UART: Caliptra RT
3,171,567 UART: [state] CFI Enabled
3,278,926 UART: [rt] RT listening for mailbox commands...
3,279,596 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,244 UART: [rt]cmd =0x4d454153, len=108
3,330,335 >>> mbox cmd response data (12 bytes)
3,330,336 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,257 UART:
3,331,273 UART: Running Caliptra ROM ...
3,331,681 UART:
3,331,823 UART: [state] CFI Enabled
3,335,009 UART: [state] LifecycleState = Unprovisioned
3,335,664 UART: [state] DebugLocked = No
3,336,170 UART: [state] WD Timer not started. Device not locked for debugging
3,337,412 UART: [kat] SHA2-256
4,143,062 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,147,187 UART: [kat] ++
4,147,339 UART: [kat] sha1
4,151,507 UART: [kat] SHA2-256
4,153,447 UART: [kat] SHA2-384
4,156,096 UART: [kat] SHA2-512-ACC
4,157,996 UART: [kat] ECC-384
4,167,501 UART: [kat] HMAC-384Kdf
4,172,363 UART: [kat] LMS
4,420,691 UART: [kat] --
4,421,461 UART: [update-reset] ++
5,326,309 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,327,436 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,423,818 >>> mbox cmd response: success
5,423,818 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,424,159 UART: [update-reset] Copying MAN_2 To MAN_1
5,432,173 UART: [update-reset Success] --
5,433,196 UART: [state] Locking Datavault
5,433,860 UART: [state] Locking PCR0, PCR1 and PCR31
5,434,464 UART: [state] Locking ICCM
5,435,122 UART: [exit] Launching FMC @ 0x40000130
5,440,451 UART:
5,440,467 UART: Running Caliptra FMC ...
5,440,875 UART:
5,441,018 UART: [state] CFI Enabled
5,530,077 UART: [art] Extend RT PCRs Done
5,530,505 UART: [art] Lock RT PCRs Done
5,531,788 UART: [art] Populate DV Done
5,539,909 UART: [fht] FMC Alias Private Key: 7
5,540,853 UART: [art] Derive CDI
5,541,133 UART: [art] Store in in slot 0x4
5,626,532 UART: [art] Derive Key Pair
5,626,892 UART: [art] Store priv key in slot 0x5
5,640,224 UART: [art] Derive Key Pair - Done
5,654,736 UART: [art] Signing Cert with AUTHO
5,655,216 UART: RITY.KEYID = 7
5,670,586 UART: [art] Erasing AUTHORITY.KEYID = 7
5,671,351 UART: [art] PUB.X = DE9381CC0E2BA7C25E04A01B789D3F305DA555A2C289DBD1A1BB9F7CC2D9FD7C90B8894FED3DC81646085BA101E2C8C4
5,678,129 UART: [art] PUB.Y = 49DC7868659CB331010ECDA1AA266D0EAE5B8051F94182E0A0B984EDC898236A961542D572D550C2C37EEC92D1A2A9BE
5,685,078 UART: [art] SIG.R = A3B384F4C1B59E8ABCF4A7261A2A94DBC71A3AC2193C0011C532CD49D014D2C5626EDB42BC65A78654C4051ABC45904D
5,691,835 UART: [art] SIG.S = 738D52DF921E4EF4700C36D735D5721623015ACD86ACD2A2D8567CB75F3DF1B961AA4BEE4F5450238BE394F93B8595D4
5,715,258 UART: mbox::rt_entry...
5,715,630 UART: ____ _ _ _ ____ _____
5,716,414 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,717,214 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,717,982 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,718,750 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,719,518 UART: |_|
5,719,830 UART:
6,000,424 UART: [rt] Runtime listening for mailbox commands...
6,001,614 >>> mbox cmd response data (48 bytes)
6,001,615 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,004,398 >>> mbox cmd response data (48 bytes)
6,004,399 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,019,536 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,496 ready_for_fw is high
1,060,496 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,133 >>> mbox cmd response: success
2,689,433 UART:
2,689,449 UART: Running Caliptra FMC ...
2,689,857 UART:
2,690,000 UART: [state] CFI Enabled
2,700,847 UART: [fht] FMC Alias Private Key: 7
2,808,756 UART: [art] Extend RT PCRs Done
2,809,184 UART: [art] Lock RT PCRs Done
2,810,808 UART: [art] Populate DV Done
2,819,129 UART: [fht] FMC Alias Private Key: 7
2,820,115 UART: [art] Derive CDI
2,820,395 UART: [art] Store in in slot 0x4
2,906,002 UART: [art] Derive Key Pair
2,906,362 UART: [art] Store priv key in slot 0x5
2,920,300 UART: [art] Derive Key Pair - Done
2,935,299 UART: [art] Signing Cert with AUTHO
2,935,779 UART: RITY.KEYID = 7
2,951,215 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,980 UART: [art] PUB.X = 0F98268E3CF7D4A3BB9E6008022E570B5D42A5B022C5A27F761346324ED75BCF224333B1B822DD69A9B14363F5861703
2,958,731 UART: [art] PUB.Y = 68A2B8EED18257CC6792D3FF91C78CFE1780DD97BC439849131A1930502A27864CB389F81D7786CFFD10D6AF3405F625
2,965,680 UART: [art] SIG.R = BAE13F9F4B7DF09A79BC5C6FE32CD2042A00FA4C0DDC24E1969EB7FE37BEECD12A652139E4C9A4B32719934FE2F1D8DC
2,972,448 UART: [art] SIG.S = 7C2D0390FF85D9395DCBD51CD6FAD5A9B51348803A1992094450BC2C4D36E9466171B7A59A1BB6508DFB575BAB86FF12
2,996,013 UART: Caliptra RT
2,996,358 UART: [state] CFI Enabled
3,103,943 UART: [rt] RT listening for mailbox commands...
3,104,613 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,141 UART: [rt]cmd =0x4d454153, len=108
3,155,562 >>> mbox cmd response data (12 bytes)
3,155,563 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,132,700 >>> mbox cmd response: success
5,132,700 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,146,202 UART:
5,146,218 UART: Running Caliptra FMC ...
5,146,626 UART:
5,146,769 UART: [state] CFI Enabled
5,235,812 UART: [art] Extend RT PCRs Done
5,236,240 UART: [art] Lock RT PCRs Done
5,237,615 UART: [art] Populate DV Done
5,245,902 UART: [fht] FMC Alias Private Key: 7
5,246,960 UART: [art] Derive CDI
5,247,240 UART: [art] Store in in slot 0x4
5,332,869 UART: [art] Derive Key Pair
5,333,229 UART: [art] Store priv key in slot 0x5
5,346,211 UART: [art] Derive Key Pair - Done
5,360,989 UART: [art] Signing Cert with AUTHO
5,361,469 UART: RITY.KEYID = 7
5,377,067 UART: [art] Erasing AUTHORITY.KEYID = 7
5,377,832 UART: [art] PUB.X = 1271702F83F26C55EAB4A70EAE89E458010E30FEE629ACC64481A18D1C2F6B7FA05B883A75BD7C64233110573E0CF884
5,384,594 UART: [art] PUB.Y = BE4D2624C0879E67D451CAA7C68AADABD5AF1CB4E9C6155C64E9B6BC042F3BFB5D06029016FF8ABDC40E64D9285462F4
5,391,552 UART: [art] SIG.R = D98565692A8E78F7BAFBDA69DF64F5F7FCDEAC1BAB5487D0F7EF7D8479178D39CBD007920006DC9AFB8B5B3881E31CA4
5,398,316 UART: [art] SIG.S = 44B13984B4A9C1801ED8210E98FC458FD25CC73D232A3BEE325EB37E2690756CA23C768126FF2A292C93752A83DB8275
5,421,606 UART: mbox::rt_entry...
5,421,978 UART: ____ _ _ _ ____ _____
5,422,762 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,423,562 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,424,330 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,425,098 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,425,866 UART: |_|
5,426,178 UART:
5,703,032 UART: [rt] Runtime listening for mailbox commands...
5,704,222 >>> mbox cmd response data (48 bytes)
5,704,223 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,707,006 >>> mbox cmd response data (48 bytes)
5,707,007 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,722,144 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
891,410 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,539 UART: [kat] ++
895,691 UART: [kat] sha1
899,789 UART: [kat] SHA2-256
901,729 UART: [kat] SHA2-384
904,574 UART: [kat] SHA2-512-ACC
906,475 UART: [kat] ECC-384
916,478 UART: [kat] HMAC-384Kdf
920,968 UART: [kat] LMS
1,169,280 UART: [kat] --
1,170,037 UART: [cold-reset] ++
1,170,437 UART: [fht] FHT @ 0x50003400
1,173,235 UART: [idev] ++
1,173,403 UART: [idev] CDI.KEYID = 6
1,173,764 UART: [idev] SUBJECT.KEYID = 7
1,174,189 UART: [idev] UDS.KEYID = 0
1,174,535 ready_for_fw is high
1,174,535 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,259 UART: [idev] Erasing UDS.KEYID = 0
1,199,171 UART: [idev] Sha1 KeyId Algorithm
1,208,091 UART: [idev] --
1,209,198 UART: [ldev] ++
1,209,366 UART: [ldev] CDI.KEYID = 6
1,209,730 UART: [ldev] SUBJECT.KEYID = 5
1,210,157 UART: [ldev] AUTHORITY.KEYID = 7
1,210,620 UART: [ldev] FE.KEYID = 1
1,215,606 UART: [ldev] Erasing FE.KEYID = 1
1,242,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,124 UART: [ldev] --
1,281,432 UART: [fwproc] Wait for Commands...
1,282,255 UART: [fwproc] Recv command 0x46574c44
1,282,988 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,096 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,405 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,245 >>> mbox cmd response: success
2,774,370 UART: [afmc] ++
2,774,538 UART: [afmc] CDI.KEYID = 6
2,774,901 UART: [afmc] SUBJECT.KEYID = 7
2,775,327 UART: [afmc] AUTHORITY.KEYID = 5
2,810,386 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,012 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,763 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,492 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,375 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,094 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,059 UART: [afmc] --
2,854,011 UART: [cold-reset] --
2,855,011 UART: [state] Locking Datavault
2,856,134 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,738 UART: [state] Locking ICCM
2,857,230 UART: [exit] Launching FMC @ 0x40000130
2,862,559 UART:
2,862,575 UART: Running Caliptra FMC ...
2,862,983 UART:
2,863,037 UART: [state] CFI Enabled
2,873,750 UART: [fht] FMC Alias Private Key: 7
2,982,021 UART: [art] Extend RT PCRs Done
2,982,449 UART: [art] Lock RT PCRs Done
2,983,953 UART: [art] Populate DV Done
2,992,234 UART: [fht] FMC Alias Private Key: 7
2,993,328 UART: [art] Derive CDI
2,993,608 UART: [art] Store in in slot 0x4
3,078,937 UART: [art] Derive Key Pair
3,079,297 UART: [art] Store priv key in slot 0x5
3,093,215 UART: [art] Derive Key Pair - Done
3,108,063 UART: [art] Signing Cert with AUTHO
3,108,543 UART: RITY.KEYID = 7
3,124,033 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,798 UART: [art] PUB.X = 803B3F504495ABE583E16E84A9985BD866DF32FB039BF35E51B1D1564708E13F7EEDE62DDC47D6C685C7365AF37F92EC
3,131,572 UART: [art] PUB.Y = D1F8EDF2F76C340F84367495402CCA62C0917ED4ACCED5F13145671A2C804154AD778408AAE98F6DF941223E10355B31
3,138,518 UART: [art] SIG.R = 617E63FBD543DC2B98C578AE8E0D9F3AEE414FBE39CC3EC51DF4F376B30B91710848030BA93ACB4F2117A7226B6D923A
3,145,287 UART: [art] SIG.S = 00F5FEC7727D157B240F2B2297C06E71EAC907437483B794CC6DBFF13A18BA7B92019672F0F040C27CB612212846EEC9
3,168,783 UART: Caliptra RT
3,169,036 UART: [state] CFI Enabled
3,275,750 UART: [rt] RT listening for mailbox commands...
3,276,420 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,642 UART: [rt]cmd =0x4d454153, len=108
3,327,351 >>> mbox cmd response data (12 bytes)
3,327,352 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,859 UART:
3,327,875 UART: Running Caliptra ROM ...
3,328,283 UART:
3,328,338 UART: [state] CFI Enabled
3,331,140 UART: [state] LifecycleState = Unprovisioned
3,331,795 UART: [state] DebugLocked = No
3,332,531 UART: [state] WD Timer not started. Device not locked for debugging
3,333,737 UART: [kat] SHA2-256
4,137,287 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,141,416 UART: [kat] ++
4,141,568 UART: [kat] sha1
4,145,868 UART: [kat] SHA2-256
4,147,808 UART: [kat] SHA2-384
4,150,539 UART: [kat] SHA2-512-ACC
4,152,439 UART: [kat] ECC-384
4,162,244 UART: [kat] HMAC-384Kdf
4,166,966 UART: [kat] LMS
4,415,278 UART: [kat] --
4,416,064 UART: [update-reset] ++
5,321,215 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,322,312 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,418,694 >>> mbox cmd response: success
5,418,694 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,418,939 UART: [update-reset] Copying MAN_2 To MAN_1
5,426,953 UART: [update-reset Success] --
5,428,078 UART: [state] Locking Datavault
5,428,890 UART: [state] Locking PCR0, PCR1 and PCR31
5,429,494 UART: [state] Locking ICCM
5,430,006 UART: [exit] Launching FMC @ 0x40000130
5,435,335 UART:
5,435,351 UART: Running Caliptra FMC ...
5,435,759 UART:
5,435,813 UART: [state] CFI Enabled
5,525,114 UART: [art] Extend RT PCRs Done
5,525,542 UART: [art] Lock RT PCRs Done
5,526,925 UART: [art] Populate DV Done
5,535,374 UART: [fht] FMC Alias Private Key: 7
5,536,378 UART: [art] Derive CDI
5,536,658 UART: [art] Store in in slot 0x4
5,622,201 UART: [art] Derive Key Pair
5,622,561 UART: [art] Store priv key in slot 0x5
5,635,897 UART: [art] Derive Key Pair - Done
5,650,426 UART: [art] Signing Cert with AUTHO
5,650,906 UART: RITY.KEYID = 7
5,665,732 UART: [art] Erasing AUTHORITY.KEYID = 7
5,666,497 UART: [art] PUB.X = 48E773C4CB18861E30705D1FF37EA21C8751444A8E2AE7DDD9551E3F07DDB9B2807AACE2D93D116947A9BA36498D60A0
5,673,272 UART: [art] PUB.Y = B915B8DAA62E422ABED1FB5195D57E2FD780CAB1F96B5EFC780B358FBC9EF43FE87187C52D525F4BD04DEF31FF0CCD68
5,680,244 UART: [art] SIG.R = 7C9C602F864E60307BAE9398D5BD9BEE0389F7BC870091DFDE55C7B4447769C6799FD572BA235C6A214F2DDE05096C76
5,686,989 UART: [art] SIG.S = 10D110FE2412A08E28797B9DC9D68CD4E7642A7574426727A256E435435076EC9C9139283B0AC548FF5B7981260870AC
5,710,648 UART: mbox::rt_entry...
5,711,020 UART: ____ _ _ _ ____ _____
5,711,804 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,712,604 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,713,372 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,714,140 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,714,908 UART: |_|
5,715,220 UART:
5,995,834 UART: [rt] Runtime listening for mailbox commands...
5,997,024 >>> mbox cmd response data (48 bytes)
5,997,025 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,999,808 >>> mbox cmd response data (48 bytes)
5,999,809 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,014,946 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,462 ready_for_fw is high
1,056,462 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,733 >>> mbox cmd response: success
2,683,241 UART:
2,683,257 UART: Running Caliptra FMC ...
2,683,665 UART:
2,683,719 UART: [state] CFI Enabled
2,694,118 UART: [fht] FMC Alias Private Key: 7
2,802,413 UART: [art] Extend RT PCRs Done
2,802,841 UART: [art] Lock RT PCRs Done
2,804,381 UART: [art] Populate DV Done
2,812,416 UART: [fht] FMC Alias Private Key: 7
2,813,382 UART: [art] Derive CDI
2,813,662 UART: [art] Store in in slot 0x4
2,899,139 UART: [art] Derive Key Pair
2,899,499 UART: [art] Store priv key in slot 0x5
2,912,761 UART: [art] Derive Key Pair - Done
2,927,640 UART: [art] Signing Cert with AUTHO
2,928,120 UART: RITY.KEYID = 7
2,942,806 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,571 UART: [art] PUB.X = 1ADE3DBC15735807E639B381ACC719AFA61691B2122AFF8C2FF53CB2897D3A823418AE17162CCF2DCEA787EDD6D41986
2,950,352 UART: [art] PUB.Y = C34E4829410B37AAC9723D193CCC04A59805B13FBCDEFB742BBFC9E02E79A627B2B7D8F1D2321CC514755D1DCB0F06D9
2,957,303 UART: [art] SIG.R = F59F4E84F8E7938E2972E2D1B9197E990CCD8F7975F098BBE29459B7B46DE860E248E70B188BA84C19B45D02A22E0B7A
2,964,067 UART: [art] SIG.S = 044F210BFBED421C786A5AC756F0974BDB64FD20743408F3DF3B46EA8E567B2817F360A5B6BD93712BCCD8BA2AEB211C
2,987,193 UART: Caliptra RT
2,987,446 UART: [state] CFI Enabled
3,095,377 UART: [rt] RT listening for mailbox commands...
3,096,047 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,491 UART: [rt]cmd =0x4d454153, len=108
3,146,604 >>> mbox cmd response data (12 bytes)
3,146,605 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,118,764 >>> mbox cmd response: success
5,118,764 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,132,390 UART:
5,132,406 UART: Running Caliptra FMC ...
5,132,814 UART:
5,132,868 UART: [state] CFI Enabled
5,221,957 UART: [art] Extend RT PCRs Done
5,222,385 UART: [art] Lock RT PCRs Done
5,223,838 UART: [art] Populate DV Done
5,232,047 UART: [fht] FMC Alias Private Key: 7
5,233,191 UART: [art] Derive CDI
5,233,471 UART: [art] Store in in slot 0x4
5,319,192 UART: [art] Derive Key Pair
5,319,552 UART: [art] Store priv key in slot 0x5
5,332,344 UART: [art] Derive Key Pair - Done
5,346,728 UART: [art] Signing Cert with AUTHO
5,347,208 UART: RITY.KEYID = 7
5,362,600 UART: [art] Erasing AUTHORITY.KEYID = 7
5,363,365 UART: [art] PUB.X = D6DEB87F71D63BF84B1C04AA7906EB2B1BEACF9B2E2454D425DC0BDC0B8DE6719EB7EF86077648222E43AE76F227AFE7
5,370,142 UART: [art] PUB.Y = 44D32971A46DA237B7B0B5B715331EC3A5A67B93A2FC3F7FF2A6C50FA21D121AF88562D30BEF1EBB60448C1C54EBCF78
5,377,102 UART: [art] SIG.R = D4658C1308B7869916210BA7DCCFE182BA2BAF6DD51286D198EF82698AC16EE9FA87BC802B3427574F739C427C66A03B
5,383,872 UART: [art] SIG.S = 0F5FB5963404244200C6031DE85B10935507DB5777F9343D84E18DA330EBD84691088122E8F6C9ACA822F53A9B37024F
5,407,481 UART: mbox::rt_entry...
5,407,853 UART: ____ _ _ _ ____ _____
5,408,637 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,409,437 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,410,205 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,410,973 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,411,741 UART: |_|
5,412,053 UART:
5,690,373 UART: [rt] Runtime listening for mailbox commands...
5,691,563 >>> mbox cmd response data (48 bytes)
5,691,564 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,694,347 >>> mbox cmd response data (48 bytes)
5,694,348 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,709,485 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,336 UART: [state] WD Timer not started. Device not locked for debugging
87,523 UART: [kat] SHA2-256
891,073 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,202 UART: [kat] ++
895,354 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,441 UART: [kat] SHA2-512-ACC
906,342 UART: [kat] ECC-384
916,257 UART: [kat] HMAC-384Kdf
920,771 UART: [kat] LMS
1,169,083 UART: [kat] --
1,169,918 UART: [cold-reset] ++
1,170,334 UART: [fht] FHT @ 0x50003400
1,173,124 UART: [idev] ++
1,173,292 UART: [idev] CDI.KEYID = 6
1,173,653 UART: [idev] SUBJECT.KEYID = 7
1,174,078 UART: [idev] UDS.KEYID = 0
1,174,424 ready_for_fw is high
1,174,424 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,248 UART: [idev] Erasing UDS.KEYID = 0
1,199,474 UART: [idev] Sha1 KeyId Algorithm
1,208,466 UART: [idev] --
1,209,665 UART: [ldev] ++
1,209,833 UART: [ldev] CDI.KEYID = 6
1,210,197 UART: [ldev] SUBJECT.KEYID = 5
1,210,624 UART: [ldev] AUTHORITY.KEYID = 7
1,211,087 UART: [ldev] FE.KEYID = 1
1,216,285 UART: [ldev] Erasing FE.KEYID = 1
1,242,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,739 UART: [ldev] --
1,282,117 UART: [fwproc] Wait for Commands...
1,282,922 UART: [fwproc] Recv command 0x46574c44
1,283,655 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,889 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,198 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,914 >>> mbox cmd response: success
2,773,941 UART: [afmc] ++
2,774,109 UART: [afmc] CDI.KEYID = 6
2,774,472 UART: [afmc] SUBJECT.KEYID = 7
2,774,898 UART: [afmc] AUTHORITY.KEYID = 5
2,810,913 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,108 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,837 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,720 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,439 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,424 UART: [afmc] --
2,854,538 UART: [cold-reset] --
2,855,330 UART: [state] Locking Datavault
2,856,335 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,939 UART: [state] Locking ICCM
2,857,533 UART: [exit] Launching FMC @ 0x40000130
2,862,862 UART:
2,862,878 UART: Running Caliptra FMC ...
2,863,286 UART:
2,863,429 UART: [state] CFI Enabled
2,874,184 UART: [fht] FMC Alias Private Key: 7
2,982,685 UART: [art] Extend RT PCRs Done
2,983,113 UART: [art] Lock RT PCRs Done
2,985,031 UART: [art] Populate DV Done
2,993,108 UART: [fht] FMC Alias Private Key: 7
2,994,184 UART: [art] Derive CDI
2,994,464 UART: [art] Store in in slot 0x4
3,080,243 UART: [art] Derive Key Pair
3,080,603 UART: [art] Store priv key in slot 0x5
3,094,145 UART: [art] Derive Key Pair - Done
3,108,875 UART: [art] Signing Cert with AUTHO
3,109,355 UART: RITY.KEYID = 7
3,124,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,078 UART: [art] PUB.X = 7E9E9A18E915ED27BA4F7DB912D2272246089D45A3EF44AC374153B601E6EE207B05A393A4BE5802B17EC7769283B065
3,131,836 UART: [art] PUB.Y = 314C75152766AF7AB3CC488BFCE92DBD0A9BFBA9BEBD7F20846FFDCCF4880857055B6B1B0C1D74197EB576F54C58ED69
3,138,794 UART: [art] SIG.R = E80F0BB0E33BEA1FD433CA662ACC0370362F8F3DC1D4302DDA66A945B026B7998EF80B27DD7BA0A8D579E87A86712EE4
3,145,568 UART: [art] SIG.S = BAA24993C902DAE8D8733AF34FFA087AEFB83821268B6387FB260070FB48AE495327928B49D19C37875B074E57A7D56A
3,169,566 UART: Caliptra RT
3,169,911 UART: [state] CFI Enabled
3,278,073 UART: [rt] RT listening for mailbox commands...
3,278,743 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,163 UART: [rt]cmd =0x4d454153, len=108
3,330,202 >>> mbox cmd response data (12 bytes)
3,330,203 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,018 UART:
3,331,034 UART: Running Caliptra ROM ...
3,331,442 UART:
3,331,584 UART: [state] CFI Enabled
3,334,448 UART: [state] LifecycleState = Unprovisioned
3,335,103 UART: [state] DebugLocked = No
3,335,587 UART: [state] WD Timer not started. Device not locked for debugging
3,336,861 UART: [kat] SHA2-256
4,140,411 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,144,540 UART: [kat] ++
4,144,692 UART: [kat] sha1
4,148,984 UART: [kat] SHA2-256
4,150,924 UART: [kat] SHA2-384
4,153,717 UART: [kat] SHA2-512-ACC
4,155,617 UART: [kat] ECC-384
4,164,956 UART: [kat] HMAC-384Kdf
4,169,384 UART: [kat] LMS
4,417,696 UART: [kat] --
4,418,306 UART: [update-reset] ++
5,322,395 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,323,480 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,419,862 >>> mbox cmd response: success
5,419,862 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,420,021 UART: [update-reset] Copying MAN_2 To MAN_1
5,428,035 UART: [update-reset Success] --
5,429,026 UART: [state] Locking Datavault
5,429,768 UART: [state] Locking PCR0, PCR1 and PCR31
5,430,372 UART: [state] Locking ICCM
5,430,854 UART: [exit] Launching FMC @ 0x40000130
5,436,183 UART:
5,436,199 UART: Running Caliptra FMC ...
5,436,607 UART:
5,436,750 UART: [state] CFI Enabled
5,526,145 UART: [art] Extend RT PCRs Done
5,526,573 UART: [art] Lock RT PCRs Done
5,527,804 UART: [art] Populate DV Done
5,535,843 UART: [fht] FMC Alias Private Key: 7
5,536,799 UART: [art] Derive CDI
5,537,079 UART: [art] Store in in slot 0x4
5,622,982 UART: [art] Derive Key Pair
5,623,342 UART: [art] Store priv key in slot 0x5
5,636,386 UART: [art] Derive Key Pair - Done
5,651,188 UART: [art] Signing Cert with AUTHO
5,651,668 UART: RITY.KEYID = 7
5,666,908 UART: [art] Erasing AUTHORITY.KEYID = 7
5,667,673 UART: [art] PUB.X = AD54D9A1F593CB917FEFBFA3DEBE88CDE61B68FEF2AB474A317F6A2C49C73A492990A7FE036B57ECB30C77681C89B0E6
5,674,461 UART: [art] PUB.Y = 1415EB46499A23A6435F65C093807C256B402D1E1E38402F8C3329E0EE72C138860C27ECD1E1CCC28CBD8D88CBEA5003
5,681,409 UART: [art] SIG.R = 637443D6D183370D4890570D40950AD281207AF3EC61654CC47392E9DE6513D65B418EC2B5BD9BA6959777C90131B317
5,688,157 UART: [art] SIG.S = E4D78789B95FA4C653BC69F7D8F6E08B968A447A8FD5F3E063F2EC9DA8023FCC3E922EE19E33916A098DAF77F1EBC1F9
5,711,552 UART: mbox::rt_entry...
5,711,924 UART: ____ _ _ _ ____ _____
5,712,708 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,713,508 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,714,276 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,715,044 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,715,812 UART: |_|
5,716,124 UART:
6,001,038 UART: [rt] Runtime listening for mailbox commands...
6,002,228 >>> mbox cmd response data (48 bytes)
6,002,229 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,005,012 >>> mbox cmd response data (48 bytes)
6,005,013 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,020,150 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,491 ready_for_fw is high
1,055,491 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,756 >>> mbox cmd response: success
2,684,574 UART:
2,684,590 UART: Running Caliptra FMC ...
2,684,998 UART:
2,685,141 UART: [state] CFI Enabled
2,695,418 UART: [fht] FMC Alias Private Key: 7
2,803,203 UART: [art] Extend RT PCRs Done
2,803,631 UART: [art] Lock RT PCRs Done
2,805,307 UART: [art] Populate DV Done
2,813,818 UART: [fht] FMC Alias Private Key: 7
2,814,918 UART: [art] Derive CDI
2,815,198 UART: [art] Store in in slot 0x4
2,900,953 UART: [art] Derive Key Pair
2,901,313 UART: [art] Store priv key in slot 0x5
2,915,181 UART: [art] Derive Key Pair - Done
2,930,110 UART: [art] Signing Cert with AUTHO
2,930,590 UART: RITY.KEYID = 7
2,945,596 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,361 UART: [art] PUB.X = C57C7EDBDC2B6D768F723D5AC1622F4881F723526C057A97C585042A31E6EF0A34D7D3DE10AAC30176CE36DF475B61D6
2,953,129 UART: [art] PUB.Y = E484123157591C101363B5636EE78E4215E97BF560279CD5D32364C7369F8F4374F1F0CA9B53AFD5D61D16A152E8966E
2,960,073 UART: [art] SIG.R = A993408AA553AA60A0DE39EF4446F4612CCBE041BE04B9D082689E00F900218EC4CAE4ECAC9CE19AF8AD816B79E9F260
2,966,812 UART: [art] SIG.S = C7BFBF2B179B48BB630C7A52649DF93F3B3EEC17A8397178220A362CD60FA3743A7F0F483115ECA0A8FE43D13C7D77C3
2,990,525 UART: Caliptra RT
2,990,870 UART: [state] CFI Enabled
3,098,156 UART: [rt] RT listening for mailbox commands...
3,098,826 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,218 UART: [rt]cmd =0x4d454153, len=108
3,149,191 >>> mbox cmd response data (12 bytes)
3,149,192 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,119,976 >>> mbox cmd response: success
5,119,976 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,133,422 UART:
5,133,438 UART: Running Caliptra FMC ...
5,133,846 UART:
5,133,989 UART: [state] CFI Enabled
5,223,032 UART: [art] Extend RT PCRs Done
5,223,460 UART: [art] Lock RT PCRs Done
5,225,013 UART: [art] Populate DV Done
5,233,168 UART: [fht] FMC Alias Private Key: 7
5,234,342 UART: [art] Derive CDI
5,234,622 UART: [art] Store in in slot 0x4
5,320,165 UART: [art] Derive Key Pair
5,320,525 UART: [art] Store priv key in slot 0x5
5,333,859 UART: [art] Derive Key Pair - Done
5,348,573 UART: [art] Signing Cert with AUTHO
5,349,053 UART: RITY.KEYID = 7
5,364,261 UART: [art] Erasing AUTHORITY.KEYID = 7
5,365,026 UART: [art] PUB.X = 674FA31BA5393177D8C770F5E32A8E21A5F5FA8CCBBD7979199AB01A887ABCC0660F90488B51EC9BD772D7C6767B1893
5,371,801 UART: [art] PUB.Y = B6CB2CD77CD3BE774321930FE8FCA4629F16681A02B1809E3B60FDEEC7506D2DE6840429D286D2B8AC7ED211F69B6DBF
5,378,758 UART: [art] SIG.R = 6196DF417C0D3A526951C6F20B3B7C297BF15D9382BD4951F08E40F6C5E7E9D44EC5E408E9605E5C78BD5AB0D551517F
5,385,525 UART: [art] SIG.S = 06F551C34F0C3CED5B33F3D158E6049E7996A368A5428D1A1BCC8D0BD8EC12E6A45F632FCDCCC848C3349C339974A24F
5,409,460 UART: mbox::rt_entry...
5,409,832 UART: ____ _ _ _ ____ _____
5,410,616 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,411,416 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,412,184 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,412,952 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,413,720 UART: |_|
5,414,032 UART:
5,695,218 UART: [rt] Runtime listening for mailbox commands...
5,696,408 >>> mbox cmd response data (48 bytes)
5,696,409 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,699,192 >>> mbox cmd response data (48 bytes)
5,699,193 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,714,330 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,145 UART: [kat] SHA2-256
882,076 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,191 UART: [kat] ++
886,343 UART: [kat] sha1
890,533 UART: [kat] SHA2-256
892,471 UART: [kat] SHA2-384
895,276 UART: [kat] SHA2-512-ACC
897,177 UART: [kat] ECC-384
903,086 UART: [kat] HMAC-384Kdf
907,676 UART: [kat] LMS
1,475,872 UART: [kat] --
1,476,851 UART: [cold-reset] ++
1,477,357 UART: [fht] Storing FHT @ 0x50003400
1,480,330 UART: [idev] ++
1,480,498 UART: [idev] CDI.KEYID = 6
1,480,858 UART: [idev] SUBJECT.KEYID = 7
1,481,282 UART: [idev] UDS.KEYID = 0
1,481,627 ready_for_fw is high
1,481,627 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,106 UART: [idev] Erasing UDS.KEYID = 0
1,505,948 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,672 UART: [idev] --
1,515,731 UART: [ldev] ++
1,515,899 UART: [ldev] CDI.KEYID = 6
1,516,262 UART: [ldev] SUBJECT.KEYID = 5
1,516,688 UART: [ldev] AUTHORITY.KEYID = 7
1,517,151 UART: [ldev] FE.KEYID = 1
1,522,163 UART: [ldev] Erasing FE.KEYID = 1
1,547,162 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,288 UART: [ldev] --
1,586,589 UART: [fwproc] Waiting for Commands...
1,587,284 UART: [fwproc] Received command 0x46574c44
1,588,075 UART: [fwproc] Received Image of size 114332 bytes
2,885,817 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,975 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,327 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,288 >>> mbox cmd response: success
3,078,288 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,079,528 UART: [afmc] ++
3,079,696 UART: [afmc] CDI.KEYID = 6
3,080,058 UART: [afmc] SUBJECT.KEYID = 7
3,080,483 UART: [afmc] AUTHORITY.KEYID = 5
3,115,464 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,670 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,450 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,178 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,063 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,753 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,516 UART: [afmc] --
3,158,486 UART: [cold-reset] --
3,159,448 UART: [state] Locking Datavault
3,160,487 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,091 UART: [state] Locking ICCM
3,161,541 UART: [exit] Launching FMC @ 0x40000130
3,166,870 UART:
3,166,886 UART: Running Caliptra FMC ...
3,167,294 UART:
3,167,348 UART: [state] CFI Enabled
3,177,641 UART: [fht] FMC Alias Private Key: 7
3,285,966 UART: [art] Extend RT PCRs Done
3,286,394 UART: [art] Lock RT PCRs Done
3,287,818 UART: [art] Populate DV Done
3,295,863 UART: [fht] FMC Alias Private Key: 7
3,296,909 UART: [art] Derive CDI
3,297,189 UART: [art] Store in in slot 0x4
3,382,826 UART: [art] Derive Key Pair
3,383,186 UART: [art] Store priv key in slot 0x5
3,396,144 UART: [art] Derive Key Pair - Done
3,410,800 UART: [art] Signing Cert with AUTHO
3,411,280 UART: RITY.KEYID = 7
3,426,292 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,057 UART: [art] PUB.X = 2E4A17A49A37532B8223B7A2988A965488E198101F47579C385ADE4EC17E80C94A490103463154781BC79EC9A0FDC71E
3,433,815 UART: [art] PUB.Y = 2FC9EBACD58899C3F82F011B1E74B87DABBD8B2528FEE34F4ABA8B2FA6A9890E77975D6CC592DA2E705CAED32DB9F3E8
3,440,787 UART: [art] SIG.R = 6FBA9DF9AB30D77BCB894A3031C0657F30B7DAE757B1E7ED1544DA2B3EB1FDFFCEEEB4D4BE60B1D840CE8622A9CEDDAF
3,447,595 UART: [art] SIG.S = 4A58BDA101A1D4D126C2D972B923465AD6EBC29D58410DF4BA0A9C9454F7452B1477B59BE47DCBA8032C08B1C7023E49
3,471,200 UART: Caliptra RT
3,471,453 UART: [state] CFI Enabled
3,579,245 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,961 UART: [rt]cmd =0x54514754, len=24
3,612,190 >>> mbox cmd response data (8 bytes)
3,612,191 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,418 UART: [rt]cmd =0x54514754, len=24
3,642,842 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,817 ready_for_fw is high
1,362,817 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,424 >>> mbox cmd response: success
2,927,424 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,988,664 UART:
2,988,680 UART: Running Caliptra FMC ...
2,989,088 UART:
2,989,142 UART: [state] CFI Enabled
2,999,479 UART: [fht] FMC Alias Private Key: 7
3,107,424 UART: [art] Extend RT PCRs Done
3,107,852 UART: [art] Lock RT PCRs Done
3,109,526 UART: [art] Populate DV Done
3,117,791 UART: [fht] FMC Alias Private Key: 7
3,118,795 UART: [art] Derive CDI
3,119,075 UART: [art] Store in in slot 0x4
3,204,456 UART: [art] Derive Key Pair
3,204,816 UART: [art] Store priv key in slot 0x5
3,218,056 UART: [art] Derive Key Pair - Done
3,232,786 UART: [art] Signing Cert with AUTHO
3,233,266 UART: RITY.KEYID = 7
3,248,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,349 UART: [art] PUB.X = D8EB53C172D59F5351640E1996026A25A0BBDFFFBCFB939EF2F9BF5265EDE0F32AFBFC8EA0DFCFB52608ED776614426C
3,256,134 UART: [art] PUB.Y = D74BE99AF7966380839198F7F8C491DA45A263ADB50F532B5CBC103BA7F2D49E4877C556B08E4D1B0AE429C93C18B5B1
3,263,086 UART: [art] SIG.R = FE03E87574D53D1BF17B0324E95F12166E6A6CA44694709A727E0A4D88F0D93E18899E46A31F506884E541820060B494
3,269,815 UART: [art] SIG.S = 198AEBBC2BA845745C52A4A2F063B33E26A42F67F45B5960575F92959157542EE560BE18837A5B7FE8D0738E5CFC2CEE
3,293,764 UART: Caliptra RT
3,294,017 UART: [state] CFI Enabled
3,401,200 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,956 UART: [rt]cmd =0x54514754, len=24
3,434,427 >>> mbox cmd response data (8 bytes)
3,434,428 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,463,991 UART: [rt]cmd =0x54514754, len=24
3,465,677 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,568 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,240 UART: [kat] SHA2-256
882,171 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,286 UART: [kat] ++
886,438 UART: [kat] sha1
890,748 UART: [kat] SHA2-256
892,686 UART: [kat] SHA2-384
895,453 UART: [kat] SHA2-512-ACC
897,354 UART: [kat] ECC-384
902,811 UART: [kat] HMAC-384Kdf
907,435 UART: [kat] LMS
1,475,631 UART: [kat] --
1,476,684 UART: [cold-reset] ++
1,477,116 UART: [fht] Storing FHT @ 0x50003400
1,479,877 UART: [idev] ++
1,480,045 UART: [idev] CDI.KEYID = 6
1,480,405 UART: [idev] SUBJECT.KEYID = 7
1,480,829 UART: [idev] UDS.KEYID = 0
1,481,174 ready_for_fw is high
1,481,174 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,873 UART: [idev] Erasing UDS.KEYID = 0
1,505,723 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,265 UART: [idev] --
1,515,162 UART: [ldev] ++
1,515,330 UART: [ldev] CDI.KEYID = 6
1,515,693 UART: [ldev] SUBJECT.KEYID = 5
1,516,119 UART: [ldev] AUTHORITY.KEYID = 7
1,516,582 UART: [ldev] FE.KEYID = 1
1,521,746 UART: [ldev] Erasing FE.KEYID = 1
1,547,409 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,861 UART: [ldev] --
1,587,284 UART: [fwproc] Waiting for Commands...
1,588,103 UART: [fwproc] Received command 0x46574c44
1,588,894 UART: [fwproc] Received Image of size 114332 bytes
2,886,238 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,834 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,186 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,983 >>> mbox cmd response: success
3,078,983 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,080,049 UART: [afmc] ++
3,080,217 UART: [afmc] CDI.KEYID = 6
3,080,579 UART: [afmc] SUBJECT.KEYID = 7
3,081,004 UART: [afmc] AUTHORITY.KEYID = 5
3,115,865 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,813 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,593 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,321 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,206 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,896 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,797 UART: [afmc] --
3,158,753 UART: [cold-reset] --
3,159,431 UART: [state] Locking Datavault
3,160,508 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,112 UART: [state] Locking ICCM
3,161,636 UART: [exit] Launching FMC @ 0x40000130
3,166,965 UART:
3,166,981 UART: Running Caliptra FMC ...
3,167,389 UART:
3,167,532 UART: [state] CFI Enabled
3,177,953 UART: [fht] FMC Alias Private Key: 7
3,286,568 UART: [art] Extend RT PCRs Done
3,286,996 UART: [art] Lock RT PCRs Done
3,288,600 UART: [art] Populate DV Done
3,296,865 UART: [fht] FMC Alias Private Key: 7
3,297,875 UART: [art] Derive CDI
3,298,155 UART: [art] Store in in slot 0x4
3,384,038 UART: [art] Derive Key Pair
3,384,398 UART: [art] Store priv key in slot 0x5
3,398,162 UART: [art] Derive Key Pair - Done
3,412,691 UART: [art] Signing Cert with AUTHO
3,413,171 UART: RITY.KEYID = 7
3,427,999 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,764 UART: [art] PUB.X = 7DBAE4AF523109815B3FCA5C115140660267DDAC58939B60EB489B76C77959EFB7A096D20154B79F9F0C58A24D5BE044
3,435,526 UART: [art] PUB.Y = BD68121E6D2FF9A78E36B1D52B1E03C9869EC801B7DF9A87E4B32AA761E6886F9F0D363BE9A33222CD0FF08BADD89747
3,442,478 UART: [art] SIG.R = 8598D60550304D1256A18FF92AF48EF0BED68B30486A2A9912BFC75C5DDAF1F96B679A360F99B9BB4378F7575252067D
3,449,241 UART: [art] SIG.S = 69EDFE1C9F4E41160D6295DAD9FD0660D42FE38AA96CA6993E5164690C7CC27862B9AFB8B685D8BF5CDF833B5375E6CF
3,473,691 UART: Caliptra RT
3,474,036 UART: [state] CFI Enabled
3,582,723 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,299 UART: [rt]cmd =0x54514754, len=24
3,615,290 >>> mbox cmd response data (8 bytes)
3,615,291 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,646 UART: [rt]cmd =0x54514754, len=24
3,646,328 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,792 ready_for_fw is high
1,362,792 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,923 >>> mbox cmd response: success
2,927,923 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,989,095 UART:
2,989,111 UART: Running Caliptra FMC ...
2,989,519 UART:
2,989,662 UART: [state] CFI Enabled
3,000,545 UART: [fht] FMC Alias Private Key: 7
3,108,702 UART: [art] Extend RT PCRs Done
3,109,130 UART: [art] Lock RT PCRs Done
3,110,606 UART: [art] Populate DV Done
3,118,645 UART: [fht] FMC Alias Private Key: 7
3,119,699 UART: [art] Derive CDI
3,119,979 UART: [art] Store in in slot 0x4
3,205,926 UART: [art] Derive Key Pair
3,206,286 UART: [art] Store priv key in slot 0x5
3,219,960 UART: [art] Derive Key Pair - Done
3,234,429 UART: [art] Signing Cert with AUTHO
3,234,909 UART: RITY.KEYID = 7
3,249,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,556 UART: [art] PUB.X = 25D46AF8203329E26F75A48F2A964D12D20028CB8CF79EB3A93DE111CC73E969EFB6A7863BCD9B5F8FA549BAD0EACB50
3,257,322 UART: [art] PUB.Y = A62857233F6723F70FB62B1E6FFBBD0CA7BA4F2F4B7AF556D3ABEC51B329D12907DEA832113444442047134D16F3638F
3,264,269 UART: [art] SIG.R = C695B9DFFF53CFF26CC26C3D1EE2A84C9CD7AA187C82CCF7E8387234DAB35FAC75AABC27D66F9DA00B7EF19BE98A0D2A
3,271,067 UART: [art] SIG.S = 54FD7C9C1C241110CDF8EF88FAEBDDA510A214A816543B31A2F6DC3F5625757C47116839494E41B0355867DDABF39293
3,294,236 UART: Caliptra RT
3,294,581 UART: [state] CFI Enabled
3,403,094 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,992 UART: [rt]cmd =0x54514754, len=24
3,436,343 >>> mbox cmd response data (8 bytes)
3,436,344 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,867 UART: [rt]cmd =0x54514754, len=24
3,467,517 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
893,418 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,543 UART: [kat] ++
897,695 UART: [kat] sha1
902,031 UART: [kat] SHA2-256
903,971 UART: [kat] SHA2-384
906,786 UART: [kat] SHA2-512-ACC
908,687 UART: [kat] ECC-384
917,836 UART: [kat] HMAC-384Kdf
922,452 UART: [kat] LMS
1,170,780 UART: [kat] --
1,171,901 UART: [cold-reset] ++
1,172,245 UART: [fht] FHT @ 0x50003400
1,174,862 UART: [idev] ++
1,175,030 UART: [idev] CDI.KEYID = 6
1,175,390 UART: [idev] SUBJECT.KEYID = 7
1,175,814 UART: [idev] UDS.KEYID = 0
1,176,159 ready_for_fw is high
1,176,159 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,640 UART: [idev] Erasing UDS.KEYID = 0
1,200,655 UART: [idev] Sha1 KeyId Algorithm
1,209,161 UART: [idev] --
1,210,225 UART: [ldev] ++
1,210,393 UART: [ldev] CDI.KEYID = 6
1,210,756 UART: [ldev] SUBJECT.KEYID = 5
1,211,182 UART: [ldev] AUTHORITY.KEYID = 7
1,211,645 UART: [ldev] FE.KEYID = 1
1,216,909 UART: [ldev] Erasing FE.KEYID = 1
1,242,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,721 UART: [ldev] --
1,282,036 UART: [fwproc] Wait for Commands...
1,282,650 UART: [fwproc] Recv command 0x46574c44
1,283,378 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,948 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,252 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,105 >>> mbox cmd response: success
2,773,105 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,311 UART: [afmc] ++
2,774,479 UART: [afmc] CDI.KEYID = 6
2,774,841 UART: [afmc] SUBJECT.KEYID = 7
2,775,266 UART: [afmc] AUTHORITY.KEYID = 5
2,810,445 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,434 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,162 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,047 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,766 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,460 UART: [afmc] --
2,853,382 UART: [cold-reset] --
2,854,190 UART: [state] Locking Datavault
2,855,479 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,083 UART: [state] Locking ICCM
2,856,547 UART: [exit] Launching FMC @ 0x40000130
2,861,876 UART:
2,861,892 UART: Running Caliptra FMC ...
2,862,300 UART:
2,862,354 UART: [state] CFI Enabled
2,873,011 UART: [fht] FMC Alias Private Key: 7
2,981,176 UART: [art] Extend RT PCRs Done
2,981,604 UART: [art] Lock RT PCRs Done
2,982,694 UART: [art] Populate DV Done
2,990,879 UART: [fht] FMC Alias Private Key: 7
2,992,041 UART: [art] Derive CDI
2,992,321 UART: [art] Store in in slot 0x4
3,077,688 UART: [art] Derive Key Pair
3,078,048 UART: [art] Store priv key in slot 0x5
3,091,602 UART: [art] Derive Key Pair - Done
3,106,542 UART: [art] Signing Cert with AUTHO
3,107,022 UART: RITY.KEYID = 7
3,122,674 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,439 UART: [art] PUB.X = 214AD90F60783E247074C75E78E99C90A15F7B90E7C08CB23CA16DC16F418F3934DF744720EED4E22648697C9B918AE0
3,130,206 UART: [art] PUB.Y = 9A17E14EBF79613B4B56C8A9B668D64BABF928FCC85D71194677CCD5CF6D63BF260C06F675B2BD3AA9FCDAABAFC75D26
3,137,176 UART: [art] SIG.R = A1540B564D84146CC9EA6C6EE5242109DA380DC99F8110E70FFD2884D399437C55E3B75CD5134DFC48BE1E599967C154
3,143,936 UART: [art] SIG.S = 19F3920E81BE26DBF7CF7387EFF86146CB96DF58602F02E9C5CA2F4B5FC114F5A3567959B93A22641D4B7ACD08A4046F
3,167,413 UART: Caliptra RT
3,167,666 UART: [state] CFI Enabled
3,274,389 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,235 UART: [rt]cmd =0x54514754, len=24
3,307,328 >>> mbox cmd response data (8 bytes)
3,307,329 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,850 UART: [rt]cmd =0x54514754, len=24
3,338,118 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,351 ready_for_fw is high
1,060,351 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,692 >>> mbox cmd response: success
2,625,692 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,687,266 UART:
2,687,282 UART: Running Caliptra FMC ...
2,687,690 UART:
2,687,744 UART: [state] CFI Enabled
2,697,943 UART: [fht] FMC Alias Private Key: 7
2,805,840 UART: [art] Extend RT PCRs Done
2,806,268 UART: [art] Lock RT PCRs Done
2,807,890 UART: [art] Populate DV Done
2,816,247 UART: [fht] FMC Alias Private Key: 7
2,817,227 UART: [art] Derive CDI
2,817,507 UART: [art] Store in in slot 0x4
2,903,206 UART: [art] Derive Key Pair
2,903,566 UART: [art] Store priv key in slot 0x5
2,916,482 UART: [art] Derive Key Pair - Done
2,931,432 UART: [art] Signing Cert with AUTHO
2,931,912 UART: RITY.KEYID = 7
2,947,084 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,849 UART: [art] PUB.X = 718BC08A93F7542F90F9E434FC045E540BED6636A65E45D51D45221C0B7E92A274819E494D139A34B5D0D600069062A6
2,954,579 UART: [art] PUB.Y = 2E491755ECE732B144107A2E8A4F67E9FE8CCA3F5D68E5ADB0747F4CB8A053AE13329E0CAA58BA33AC1BBA13FC7C564F
2,961,548 UART: [art] SIG.R = CF73A8BDDF249EEB465780958CED727CCF4D9773DE88891AD2108C7C39B4F327AF4A38F4E28601A1BE740D3CFE007229
2,968,302 UART: [art] SIG.S = 7DCAB54D252892541236E99CC4E39859DC7938E28D6A405B28FF80F75B11DC08E4E523606FB20585396A889851E12BAE
2,992,117 UART: Caliptra RT
2,992,370 UART: [state] CFI Enabled
3,100,679 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,117 UART: [rt]cmd =0x54514754, len=24
3,133,206 >>> mbox cmd response data (8 bytes)
3,133,207 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,750 UART: [rt]cmd =0x54514754, len=24
3,163,954 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,901 UART: [state] LifecycleState = Unprovisioned
86,556 UART: [state] DebugLocked = No
87,262 UART: [state] WD Timer not started. Device not locked for debugging
88,527 UART: [kat] SHA2-256
894,177 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,302 UART: [kat] ++
898,454 UART: [kat] sha1
902,816 UART: [kat] SHA2-256
904,756 UART: [kat] SHA2-384
907,347 UART: [kat] SHA2-512-ACC
909,248 UART: [kat] ECC-384
919,535 UART: [kat] HMAC-384Kdf
924,271 UART: [kat] LMS
1,172,599 UART: [kat] --
1,173,454 UART: [cold-reset] ++
1,173,874 UART: [fht] FHT @ 0x50003400
1,176,433 UART: [idev] ++
1,176,601 UART: [idev] CDI.KEYID = 6
1,176,961 UART: [idev] SUBJECT.KEYID = 7
1,177,385 UART: [idev] UDS.KEYID = 0
1,177,730 ready_for_fw is high
1,177,730 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,805 UART: [idev] Erasing UDS.KEYID = 0
1,202,922 UART: [idev] Sha1 KeyId Algorithm
1,211,430 UART: [idev] --
1,212,538 UART: [ldev] ++
1,212,706 UART: [ldev] CDI.KEYID = 6
1,213,069 UART: [ldev] SUBJECT.KEYID = 5
1,213,495 UART: [ldev] AUTHORITY.KEYID = 7
1,213,958 UART: [ldev] FE.KEYID = 1
1,219,212 UART: [ldev] Erasing FE.KEYID = 1
1,245,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,226 UART: [ldev] --
1,284,597 UART: [fwproc] Wait for Commands...
1,285,393 UART: [fwproc] Recv command 0x46574c44
1,286,121 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,551 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,855 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,728 >>> mbox cmd response: success
2,775,728 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,776,922 UART: [afmc] ++
2,777,090 UART: [afmc] CDI.KEYID = 6
2,777,452 UART: [afmc] SUBJECT.KEYID = 7
2,777,877 UART: [afmc] AUTHORITY.KEYID = 5
2,812,936 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,449 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,197 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,925 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,810 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,529 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,211 UART: [afmc] --
2,856,229 UART: [cold-reset] --
2,856,885 UART: [state] Locking Datavault
2,858,114 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,718 UART: [state] Locking ICCM
2,859,200 UART: [exit] Launching FMC @ 0x40000130
2,864,529 UART:
2,864,545 UART: Running Caliptra FMC ...
2,864,953 UART:
2,865,096 UART: [state] CFI Enabled
2,875,493 UART: [fht] FMC Alias Private Key: 7
2,983,598 UART: [art] Extend RT PCRs Done
2,984,026 UART: [art] Lock RT PCRs Done
2,985,440 UART: [art] Populate DV Done
2,993,641 UART: [fht] FMC Alias Private Key: 7
2,994,673 UART: [art] Derive CDI
2,994,953 UART: [art] Store in in slot 0x4
3,080,926 UART: [art] Derive Key Pair
3,081,286 UART: [art] Store priv key in slot 0x5
3,094,432 UART: [art] Derive Key Pair - Done
3,108,869 UART: [art] Signing Cert with AUTHO
3,109,349 UART: RITY.KEYID = 7
3,124,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,230 UART: [art] PUB.X = AE33E05F0BAD414C950FDDC969C28E810F60741CEDECA9BC2C95A4AB688D548D4EC44D0C2A74307C1B047592D97175F2
3,131,999 UART: [art] PUB.Y = DE9B777ACA2EF191F2DD5E1CF18C6C2ED1DD989CB775839D2699AEBF657DAF1550197AC507E06783A355441901EDB97B
3,138,957 UART: [art] SIG.R = 2FA1A5AAB7E184443A24A0C63DFF31D3A9C006D5F82E0AC57DCDD8E9FD665AE8CB28924059BBCC2C81410C9B5E6AAEF8
3,145,744 UART: [art] SIG.S = C19CCD65A8E81B69B084795F1F7FD63908AE55D3E788B261F7FEEBE72014C174BC3794C5AAFABBED039B1E9924C2F939
3,169,015 UART: Caliptra RT
3,169,360 UART: [state] CFI Enabled
3,276,807 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,481 UART: [rt]cmd =0x54514754, len=24
3,309,322 >>> mbox cmd response data (8 bytes)
3,309,323 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,820 UART: [rt]cmd =0x54514754, len=24
3,339,940 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,714 ready_for_fw is high
1,060,714 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,785 >>> mbox cmd response: success
2,624,785 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,686,809 UART:
2,686,825 UART: Running Caliptra FMC ...
2,687,233 UART:
2,687,376 UART: [state] CFI Enabled
2,698,009 UART: [fht] FMC Alias Private Key: 7
2,805,528 UART: [art] Extend RT PCRs Done
2,805,956 UART: [art] Lock RT PCRs Done
2,807,506 UART: [art] Populate DV Done
2,816,017 UART: [fht] FMC Alias Private Key: 7
2,816,969 UART: [art] Derive CDI
2,817,249 UART: [art] Store in in slot 0x4
2,902,336 UART: [art] Derive Key Pair
2,902,696 UART: [art] Store priv key in slot 0x5
2,915,770 UART: [art] Derive Key Pair - Done
2,930,592 UART: [art] Signing Cert with AUTHO
2,931,072 UART: RITY.KEYID = 7
2,945,952 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,717 UART: [art] PUB.X = AA18389FE6E80F144BA99DFBCEA087CA9618936A765BFEBE7FDAD31EB9F9F65D59B4E4E356E7E5EBC2A74CDDE77C6BE4
2,953,516 UART: [art] PUB.Y = 04EFB5688723EFF1F8FFE973EEDAA8F8628DF50322D3CA366BF9C24BCFE596E54765D6BBE0E8AF10BC3076D7FBE6B534
2,960,484 UART: [art] SIG.R = 9CB236A90B5CBFC3AA4D58C170897C8D24A580A4670C7DDB1F5A2BD329043B0529AD010334A95DCAE6752EB8B1FFE3C8
2,967,252 UART: [art] SIG.S = EA8618D269413BBE04F3509600DD94CD44B04AB331E8432B9032839D4BF1464B1CC4707B492D05B840965C5A55C776CB
2,990,427 UART: Caliptra RT
2,990,772 UART: [state] CFI Enabled
3,097,838 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,368 UART: [rt]cmd =0x54514754, len=24
3,130,523 >>> mbox cmd response data (8 bytes)
3,130,524 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,925 UART: [rt]cmd =0x54514754, len=24
3,161,327 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
891,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,319 UART: [kat] ++
895,471 UART: [kat] sha1
899,923 UART: [kat] SHA2-256
901,863 UART: [kat] SHA2-384
904,492 UART: [kat] SHA2-512-ACC
906,393 UART: [kat] ECC-384
915,970 UART: [kat] HMAC-384Kdf
920,664 UART: [kat] LMS
1,168,976 UART: [kat] --
1,169,645 UART: [cold-reset] ++
1,170,223 UART: [fht] FHT @ 0x50003400
1,172,947 UART: [idev] ++
1,173,115 UART: [idev] CDI.KEYID = 6
1,173,476 UART: [idev] SUBJECT.KEYID = 7
1,173,901 UART: [idev] UDS.KEYID = 0
1,174,247 ready_for_fw is high
1,174,247 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,685 UART: [idev] Erasing UDS.KEYID = 0
1,198,529 UART: [idev] Sha1 KeyId Algorithm
1,207,553 UART: [idev] --
1,208,644 UART: [ldev] ++
1,208,812 UART: [ldev] CDI.KEYID = 6
1,209,176 UART: [ldev] SUBJECT.KEYID = 5
1,209,603 UART: [ldev] AUTHORITY.KEYID = 7
1,210,066 UART: [ldev] FE.KEYID = 1
1,215,014 UART: [ldev] Erasing FE.KEYID = 1
1,241,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,112 UART: [ldev] --
1,280,488 UART: [fwproc] Wait for Commands...
1,281,297 UART: [fwproc] Recv command 0x46574c44
1,282,030 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,926 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,235 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,061 >>> mbox cmd response: success
2,770,061 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,771,286 UART: [afmc] ++
2,771,454 UART: [afmc] CDI.KEYID = 6
2,771,817 UART: [afmc] SUBJECT.KEYID = 7
2,772,243 UART: [afmc] AUTHORITY.KEYID = 5
2,807,446 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,346 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,097 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,826 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,709 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,428 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,131 UART: [afmc] --
2,851,235 UART: [cold-reset] --
2,851,969 UART: [state] Locking Datavault
2,852,954 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,558 UART: [state] Locking ICCM
2,854,020 UART: [exit] Launching FMC @ 0x40000130
2,859,349 UART:
2,859,365 UART: Running Caliptra FMC ...
2,859,773 UART:
2,859,827 UART: [state] CFI Enabled
2,870,406 UART: [fht] FMC Alias Private Key: 7
2,979,029 UART: [art] Extend RT PCRs Done
2,979,457 UART: [art] Lock RT PCRs Done
2,980,883 UART: [art] Populate DV Done
2,989,104 UART: [fht] FMC Alias Private Key: 7
2,990,264 UART: [art] Derive CDI
2,990,544 UART: [art] Store in in slot 0x4
3,076,309 UART: [art] Derive Key Pair
3,076,669 UART: [art] Store priv key in slot 0x5
3,089,379 UART: [art] Derive Key Pair - Done
3,104,178 UART: [art] Signing Cert with AUTHO
3,104,658 UART: RITY.KEYID = 7
3,119,586 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,351 UART: [art] PUB.X = BB72C2D190268BB77FB17ADF6D2B9F1F64AE780F0788D97EB8318CD538887BE3A8FC984F77DA5F2F3A8A78C44BA4D084
3,127,131 UART: [art] PUB.Y = 5E585D839579C7116783C83BD86193E6BB761EA02BFFECDD8BBC41024063FF803857347C7351E738A9A28669684FC52E
3,134,076 UART: [art] SIG.R = 48FCF015CC035CBC76DB3D702F70B40C62E5E610A8B7F4D4120FABD1C2C43818F95BB572CE5D8653781D234B2928665F
3,140,845 UART: [art] SIG.S = 899710AB52DCD62612CA6C039B8B62D92FE63667E0C59A48B9348849E0510A3522E8EFB9D2A4F5F687BB867E3782E2E8
3,164,158 UART: Caliptra RT
3,164,411 UART: [state] CFI Enabled
3,272,034 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,790 UART: [rt]cmd =0x54514754, len=24
3,305,025 >>> mbox cmd response data (8 bytes)
3,305,026 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,477 UART: [rt]cmd =0x54514754, len=24
3,335,957 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,736 ready_for_fw is high
1,055,736 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,403 >>> mbox cmd response: success
2,622,403 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,684,109 UART:
2,684,125 UART: Running Caliptra FMC ...
2,684,533 UART:
2,684,587 UART: [state] CFI Enabled
2,694,920 UART: [fht] FMC Alias Private Key: 7
2,802,005 UART: [art] Extend RT PCRs Done
2,802,433 UART: [art] Lock RT PCRs Done
2,803,975 UART: [art] Populate DV Done
2,812,130 UART: [fht] FMC Alias Private Key: 7
2,813,142 UART: [art] Derive CDI
2,813,422 UART: [art] Store in in slot 0x4
2,898,683 UART: [art] Derive Key Pair
2,899,043 UART: [art] Store priv key in slot 0x5
2,911,927 UART: [art] Derive Key Pair - Done
2,926,825 UART: [art] Signing Cert with AUTHO
2,927,305 UART: RITY.KEYID = 7
2,942,367 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,132 UART: [art] PUB.X = B0DCECEC84D7D6AEB2504C1FAB12E2E7D157E1F2209853A90FC0C15CC976F0779E19CA43CFBE881DEA78E013429E437A
2,949,919 UART: [art] PUB.Y = AC4909DD924688B0C4C911CB243164355889F6712B76A4AE4E24FE013BD49538B437D0B979AAF19E3B7BFBAF2514B411
2,956,867 UART: [art] SIG.R = 6D9C871EC91701ABC73967911988A5A590674D01E354596043963E1FD3B0A420BE527F12A2FA15F1DA0DCA2E0C9AC8D9
2,963,629 UART: [art] SIG.S = DAC56F94DF5E0C6D15FAF08E6F64AEC739B59FA629535F549106DA16ED4616D024A9754DED7DC8133A3F6311892EE693
2,987,450 UART: Caliptra RT
2,987,703 UART: [state] CFI Enabled
3,095,900 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,410 UART: [rt]cmd =0x54514754, len=24
3,128,545 >>> mbox cmd response data (8 bytes)
3,128,546 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,135 UART: [rt]cmd =0x54514754, len=24
3,159,691 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,647 UART: [state] LifecycleState = Unprovisioned
86,302 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
891,741 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,870 UART: [kat] ++
896,022 UART: [kat] sha1
900,402 UART: [kat] SHA2-256
902,342 UART: [kat] SHA2-384
905,087 UART: [kat] SHA2-512-ACC
906,988 UART: [kat] ECC-384
917,153 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,506 UART: [cold-reset] ++
1,171,030 UART: [fht] FHT @ 0x50003400
1,173,782 UART: [idev] ++
1,173,950 UART: [idev] CDI.KEYID = 6
1,174,311 UART: [idev] SUBJECT.KEYID = 7
1,174,736 UART: [idev] UDS.KEYID = 0
1,175,082 ready_for_fw is high
1,175,082 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,654 UART: [idev] Erasing UDS.KEYID = 0
1,199,612 UART: [idev] Sha1 KeyId Algorithm
1,208,508 UART: [idev] --
1,209,571 UART: [ldev] ++
1,209,739 UART: [ldev] CDI.KEYID = 6
1,210,103 UART: [ldev] SUBJECT.KEYID = 5
1,210,530 UART: [ldev] AUTHORITY.KEYID = 7
1,210,993 UART: [ldev] FE.KEYID = 1
1,216,173 UART: [ldev] Erasing FE.KEYID = 1
1,242,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,411 UART: [ldev] --
1,281,843 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,333 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,637 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,981 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,290 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,990 >>> mbox cmd response: success
2,772,990 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,205 UART: [afmc] ++
2,774,373 UART: [afmc] CDI.KEYID = 6
2,774,736 UART: [afmc] SUBJECT.KEYID = 7
2,775,162 UART: [afmc] AUTHORITY.KEYID = 5
2,810,543 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,003 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,754 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,483 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,366 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,085 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,992 UART: [afmc] --
2,854,044 UART: [cold-reset] --
2,854,752 UART: [state] Locking Datavault
2,855,997 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,601 UART: [state] Locking ICCM
2,857,061 UART: [exit] Launching FMC @ 0x40000130
2,862,390 UART:
2,862,406 UART: Running Caliptra FMC ...
2,862,814 UART:
2,862,957 UART: [state] CFI Enabled
2,873,290 UART: [fht] FMC Alias Private Key: 7
2,981,671 UART: [art] Extend RT PCRs Done
2,982,099 UART: [art] Lock RT PCRs Done
2,983,975 UART: [art] Populate DV Done
2,992,038 UART: [fht] FMC Alias Private Key: 7
2,993,096 UART: [art] Derive CDI
2,993,376 UART: [art] Store in in slot 0x4
3,079,413 UART: [art] Derive Key Pair
3,079,773 UART: [art] Store priv key in slot 0x5
3,093,559 UART: [art] Derive Key Pair - Done
3,108,497 UART: [art] Signing Cert with AUTHO
3,108,977 UART: RITY.KEYID = 7
3,124,161 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,926 UART: [art] PUB.X = 7F26FCDAABD74A498F298E0C87FCBBEA7BC0773402DE8FFE241A5B960CA78D26D3228AC818F0F5FB04B6935A8F16401D
3,131,704 UART: [art] PUB.Y = FE59AAE44AF6EE354490D544ED79D51A6BB1197B122783DDF5861AE50BAAD608379BC543D6871323539A90B475EA6EE7
3,138,656 UART: [art] SIG.R = 94ACE88A9A4CA182AEAFE9F9B6428BC3D15211C51CD32558C8AE45A74E57DD1F9AC9052343DDE702BE1B9CAB4A4E7AA9
3,145,444 UART: [art] SIG.S = 0444868E7BAADBF2FF2C65586A74FC9B7F870EA809034D8764B9C106E466B87A710A8745B133638A2B91286D73FAC099
3,169,405 UART: Caliptra RT
3,169,750 UART: [state] CFI Enabled
3,277,343 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,767 UART: [rt]cmd =0x54514754, len=24
3,309,722 >>> mbox cmd response data (8 bytes)
3,309,723 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,068 UART: [rt]cmd =0x54514754, len=24
3,340,406 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,003 ready_for_fw is high
1,056,003 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,840 >>> mbox cmd response: success
2,623,840 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,512 UART:
2,685,528 UART: Running Caliptra FMC ...
2,685,936 UART:
2,686,079 UART: [state] CFI Enabled
2,696,852 UART: [fht] FMC Alias Private Key: 7
2,804,945 UART: [art] Extend RT PCRs Done
2,805,373 UART: [art] Lock RT PCRs Done
2,806,905 UART: [art] Populate DV Done
2,815,090 UART: [fht] FMC Alias Private Key: 7
2,816,062 UART: [art] Derive CDI
2,816,342 UART: [art] Store in in slot 0x4
2,902,129 UART: [art] Derive Key Pair
2,902,489 UART: [art] Store priv key in slot 0x5
2,915,823 UART: [art] Derive Key Pair - Done
2,930,423 UART: [art] Signing Cert with AUTHO
2,930,903 UART: RITY.KEYID = 7
2,945,857 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,622 UART: [art] PUB.X = 62F12DC6446BD017F3ABF540EE83F9E49549C7FA9029D6AE9F88EB64370CB9BBAA4EC329601A763477B4F3D043621D54
2,953,397 UART: [art] PUB.Y = 565C6A0F54833CE8A9F80860CCE6288D425E2F97A84F15DC52C21577F53EE51563748208741FAF90802347147F4A7D20
2,960,330 UART: [art] SIG.R = 6DF90DF71DFA893B6DCCE8F0DA721746D70761201CC59ACF6F967776FA681561663326F4031897F984DA0700FE268E68
2,967,066 UART: [art] SIG.S = 798A12CF5D4E3D8B07AAD715D6CB3DFD827365D21291CE6D76C9C29618CDBFDDB751270909695797BC4C98C94D20D93E
2,991,126 UART: Caliptra RT
2,991,471 UART: [state] CFI Enabled
3,099,500 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,016 UART: [rt]cmd =0x54514754, len=24
3,132,199 >>> mbox cmd response data (8 bytes)
3,132,200 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,761 UART: [rt]cmd =0x54514754, len=24
3,163,303 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,153 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,731 UART: [kat] SHA2-256
881,662 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,777 UART: [kat] ++
885,929 UART: [kat] sha1
890,175 UART: [kat] SHA2-256
892,113 UART: [kat] SHA2-384
894,816 UART: [kat] SHA2-512-ACC
896,717 UART: [kat] ECC-384
902,436 UART: [kat] HMAC-384Kdf
907,080 UART: [kat] LMS
1,475,276 UART: [kat] --
1,476,029 UART: [cold-reset] ++
1,476,557 UART: [fht] Storing FHT @ 0x50003400
1,479,322 UART: [idev] ++
1,479,490 UART: [idev] CDI.KEYID = 6
1,479,850 UART: [idev] SUBJECT.KEYID = 7
1,480,274 UART: [idev] UDS.KEYID = 0
1,480,619 ready_for_fw is high
1,480,619 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,042 UART: [idev] Erasing UDS.KEYID = 0
1,504,378 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,806 UART: [idev] --
1,513,609 UART: [ldev] ++
1,513,777 UART: [ldev] CDI.KEYID = 6
1,514,140 UART: [ldev] SUBJECT.KEYID = 5
1,514,566 UART: [ldev] AUTHORITY.KEYID = 7
1,515,029 UART: [ldev] FE.KEYID = 1
1,520,265 UART: [ldev] Erasing FE.KEYID = 1
1,545,466 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,406 UART: [ldev] --
1,584,921 UART: [fwproc] Waiting for Commands...
1,585,760 UART: [fwproc] Received command 0x46574c44
1,586,551 UART: [fwproc] Received Image of size 114332 bytes
2,884,429 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,085 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,437 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,376 >>> mbox cmd response: success
3,077,376 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,078,434 UART: [afmc] ++
3,078,602 UART: [afmc] CDI.KEYID = 6
3,078,964 UART: [afmc] SUBJECT.KEYID = 7
3,079,389 UART: [afmc] AUTHORITY.KEYID = 5
3,114,472 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,884 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,664 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,392 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,277 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,967 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,834 UART: [afmc] --
3,157,802 UART: [cold-reset] --
3,158,564 UART: [state] Locking Datavault
3,159,677 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,281 UART: [state] Locking ICCM
3,160,723 UART: [exit] Launching FMC @ 0x40000130
3,166,052 UART:
3,166,068 UART: Running Caliptra FMC ...
3,166,476 UART:
3,166,530 UART: [state] CFI Enabled
3,176,925 UART: [fht] FMC Alias Private Key: 7
3,284,802 UART: [art] Extend RT PCRs Done
3,285,230 UART: [art] Lock RT PCRs Done
3,287,032 UART: [art] Populate DV Done
3,295,451 UART: [fht] FMC Alias Private Key: 7
3,296,421 UART: [art] Derive CDI
3,296,701 UART: [art] Store in in slot 0x4
3,382,424 UART: [art] Derive Key Pair
3,382,784 UART: [art] Store priv key in slot 0x5
3,395,508 UART: [art] Derive Key Pair - Done
3,410,093 UART: [art] Signing Cert with AUTHO
3,410,573 UART: RITY.KEYID = 7
3,425,575 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,340 UART: [art] PUB.X = 1A4DBAE4AAB61A3AF83C20DF76990CEE82C3165D13FD46C2E0DA29AD41B741AF7FCA84291730709192B196CA6D230A10
3,433,118 UART: [art] PUB.Y = DFEF27788FE92D181A268837C97E4B00888DB57FCEF8C82D48DDF0E699535ED72C6D217441F0FF2C0BCA8CE088C86C37
3,440,057 UART: [art] SIG.R = 4B5D41A6C75B182358680890A2281F1B18B78A8CF0D9357F96D37C2C227E8093E25C33F25AE86DAFF717A09A117F02AB
3,446,823 UART: [art] SIG.S = 7BC4019AAC0F1A327D716717B5F9305B6D1540FA6FFFBDFCD4571484581F39D03AE95AEF8C9CA5F668C71E24E4770144
3,470,999 UART: Caliptra RT
3,471,252 UART: [state] CFI Enabled
3,579,552 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,086 UART: [rt]cmd =0x47544744, len=8
3,611,787 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,629 ready_for_fw is high
1,362,629 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,964 >>> mbox cmd response: success
2,925,964 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,988,000 UART:
2,988,016 UART: Running Caliptra FMC ...
2,988,424 UART:
2,988,478 UART: [state] CFI Enabled
2,998,891 UART: [fht] FMC Alias Private Key: 7
3,106,570 UART: [art] Extend RT PCRs Done
3,106,998 UART: [art] Lock RT PCRs Done
3,108,840 UART: [art] Populate DV Done
3,117,149 UART: [fht] FMC Alias Private Key: 7
3,118,215 UART: [art] Derive CDI
3,118,495 UART: [art] Store in in slot 0x4
3,203,930 UART: [art] Derive Key Pair
3,204,290 UART: [art] Store priv key in slot 0x5
3,217,260 UART: [art] Derive Key Pair - Done
3,232,042 UART: [art] Signing Cert with AUTHO
3,232,522 UART: RITY.KEYID = 7
3,248,190 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,955 UART: [art] PUB.X = B8F7DD0DBE93A08819923E814066B85F6EBCDA8DDFB47E32F820502FDEB03A56780D6C15E2E7846339F55DF7E8ABCCA5
3,255,737 UART: [art] PUB.Y = 2373A33B2B25A7A7507AD6CFB4B7A013EE3CB4270E1ECC1678A35B8A4BFA17E82A4575DC93373A1B8027BE08459EE014
3,262,691 UART: [art] SIG.R = 9292746793F94C9C44AF12E0445C8BB5CCB397D1E16E22BB12164B954E32FCAFFF4BBA0B9761E7F53144A2CCE7A84981
3,269,468 UART: [art] SIG.S = 03982EF9FB67FAB9339F89A92CAED43E93E84CF339EB39DEF81A4CBB86497E15C1126239D3984F2A80B48F59D969FB94
3,293,376 UART: Caliptra RT
3,293,629 UART: [state] CFI Enabled
3,401,726 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,142 UART: [rt]cmd =0x47544744, len=8
3,433,955 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,756 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,332 UART: [kat] SHA2-256
882,263 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,378 UART: [kat] ++
886,530 UART: [kat] sha1
890,798 UART: [kat] SHA2-256
892,736 UART: [kat] SHA2-384
895,339 UART: [kat] SHA2-512-ACC
897,240 UART: [kat] ECC-384
903,001 UART: [kat] HMAC-384Kdf
907,607 UART: [kat] LMS
1,475,803 UART: [kat] --
1,476,570 UART: [cold-reset] ++
1,477,018 UART: [fht] Storing FHT @ 0x50003400
1,479,903 UART: [idev] ++
1,480,071 UART: [idev] CDI.KEYID = 6
1,480,431 UART: [idev] SUBJECT.KEYID = 7
1,480,855 UART: [idev] UDS.KEYID = 0
1,481,200 ready_for_fw is high
1,481,200 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,849 UART: [idev] Erasing UDS.KEYID = 0
1,504,971 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,621 UART: [idev] --
1,514,728 UART: [ldev] ++
1,514,896 UART: [ldev] CDI.KEYID = 6
1,515,259 UART: [ldev] SUBJECT.KEYID = 5
1,515,685 UART: [ldev] AUTHORITY.KEYID = 7
1,516,148 UART: [ldev] FE.KEYID = 1
1,521,388 UART: [ldev] Erasing FE.KEYID = 1
1,546,847 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,025 UART: [ldev] --
1,586,466 UART: [fwproc] Waiting for Commands...
1,587,217 UART: [fwproc] Received command 0x46574c44
1,588,008 UART: [fwproc] Received Image of size 114332 bytes
2,885,898 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,298 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,650 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,573 >>> mbox cmd response: success
3,078,573 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,079,739 UART: [afmc] ++
3,079,907 UART: [afmc] CDI.KEYID = 6
3,080,269 UART: [afmc] SUBJECT.KEYID = 7
3,080,694 UART: [afmc] AUTHORITY.KEYID = 5
3,115,897 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,017 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,797 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,525 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,410 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,100 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,199 UART: [afmc] --
3,159,255 UART: [cold-reset] --
3,160,017 UART: [state] Locking Datavault
3,161,234 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,838 UART: [state] Locking ICCM
3,162,428 UART: [exit] Launching FMC @ 0x40000130
3,167,757 UART:
3,167,773 UART: Running Caliptra FMC ...
3,168,181 UART:
3,168,324 UART: [state] CFI Enabled
3,179,283 UART: [fht] FMC Alias Private Key: 7
3,286,788 UART: [art] Extend RT PCRs Done
3,287,216 UART: [art] Lock RT PCRs Done
3,288,690 UART: [art] Populate DV Done
3,296,805 UART: [fht] FMC Alias Private Key: 7
3,297,945 UART: [art] Derive CDI
3,298,225 UART: [art] Store in in slot 0x4
3,383,836 UART: [art] Derive Key Pair
3,384,196 UART: [art] Store priv key in slot 0x5
3,397,644 UART: [art] Derive Key Pair - Done
3,412,516 UART: [art] Signing Cert with AUTHO
3,412,996 UART: RITY.KEYID = 7
3,428,148 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,913 UART: [art] PUB.X = 5E1D104E9F91F83D54BB7418C028F6D74B340B24CC967E04FCEF8E0E658AF6568201E7883E1C29FBE2AA14EC0C6CF22B
3,435,682 UART: [art] PUB.Y = 93255F4750AA6FABFD17D03A7F1821DBE77A6477A3126913E8CAB12FFE33F57D731BB5817F78B988AE93A35121E9A8C4
3,442,640 UART: [art] SIG.R = 2C6A3B3C9DB58110EF3B8C1DBE0D65760A3FAE1F9C7CDED927C61E2A017783CE227C046AC52040722D1DEE2A78D0D9CC
3,449,418 UART: [art] SIG.S = EB3FE5E32BC3E4D3A326A6A2C351A6C96BE042B70AA8C995747ACFD66CA8602963F7A35514CE13583DD56D191694394F
3,473,718 UART: Caliptra RT
3,474,063 UART: [state] CFI Enabled
3,582,224 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,474 UART: [rt]cmd =0x47544744, len=8
3,613,859 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,890 ready_for_fw is high
1,362,890 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,930,251 >>> mbox cmd response: success
2,930,251 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,992,427 UART:
2,992,443 UART: Running Caliptra FMC ...
2,992,851 UART:
2,992,994 UART: [state] CFI Enabled
3,003,699 UART: [fht] FMC Alias Private Key: 7
3,111,930 UART: [art] Extend RT PCRs Done
3,112,358 UART: [art] Lock RT PCRs Done
3,113,752 UART: [art] Populate DV Done
3,122,145 UART: [fht] FMC Alias Private Key: 7
3,123,269 UART: [art] Derive CDI
3,123,549 UART: [art] Store in in slot 0x4
3,209,186 UART: [art] Derive Key Pair
3,209,546 UART: [art] Store priv key in slot 0x5
3,222,450 UART: [art] Derive Key Pair - Done
3,237,170 UART: [art] Signing Cert with AUTHO
3,237,650 UART: RITY.KEYID = 7
3,253,060 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,825 UART: [art] PUB.X = 358146407CAB2B944A57A634AEFB58ED3270675172F777B61255FDFFDE438538296568EDF15797B5BB43C6F9D9A1212F
3,260,595 UART: [art] PUB.Y = DFF79DCDE6D301D71F50D5AB930AD26DCF2E0D9216E33A406B7BAA276740D3300FFC13DB2AF5B2601F4DF304A076DFD3
3,267,552 UART: [art] SIG.R = 4E535B2B97C404DF2CC8E90E052FA22728C45E969811C68624D12588D1FF5F30E0FD108F70625121BCD9FA1F128C7C5A
3,274,317 UART: [art] SIG.S = B6468398ABB81C04CB5241C272678E1F1951AF01121404B79BF358CD9939FBE4DF88AD71749A31D1FBF37308ACC157CF
3,298,158 UART: Caliptra RT
3,298,503 UART: [state] CFI Enabled
3,407,344 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,652 UART: [rt]cmd =0x47544744, len=8
3,439,123 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,699 UART: [state] WD Timer not started. Device not locked for debugging
87,994 UART: [kat] SHA2-256
893,644 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,769 UART: [kat] ++
897,921 UART: [kat] sha1
902,121 UART: [kat] SHA2-256
904,061 UART: [kat] SHA2-384
906,710 UART: [kat] SHA2-512-ACC
908,611 UART: [kat] ECC-384
917,876 UART: [kat] HMAC-384Kdf
922,522 UART: [kat] LMS
1,170,850 UART: [kat] --
1,171,579 UART: [cold-reset] ++
1,172,133 UART: [fht] FHT @ 0x50003400
1,174,570 UART: [idev] ++
1,174,738 UART: [idev] CDI.KEYID = 6
1,175,098 UART: [idev] SUBJECT.KEYID = 7
1,175,522 UART: [idev] UDS.KEYID = 0
1,175,867 ready_for_fw is high
1,175,867 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,440 UART: [idev] Erasing UDS.KEYID = 0
1,200,321 UART: [idev] Sha1 KeyId Algorithm
1,208,821 UART: [idev] --
1,209,765 UART: [ldev] ++
1,209,933 UART: [ldev] CDI.KEYID = 6
1,210,296 UART: [ldev] SUBJECT.KEYID = 5
1,210,722 UART: [ldev] AUTHORITY.KEYID = 7
1,211,185 UART: [ldev] FE.KEYID = 1
1,216,551 UART: [ldev] Erasing FE.KEYID = 1
1,243,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,343 UART: [ldev] --
1,282,778 UART: [fwproc] Wait for Commands...
1,283,596 UART: [fwproc] Recv command 0x46574c44
1,284,324 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,512 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,816 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,661 >>> mbox cmd response: success
2,773,661 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,774,717 UART: [afmc] ++
2,774,885 UART: [afmc] CDI.KEYID = 6
2,775,247 UART: [afmc] SUBJECT.KEYID = 7
2,775,672 UART: [afmc] AUTHORITY.KEYID = 5
2,810,811 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,858 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,606 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,334 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,219 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,938 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,570 UART: [afmc] --
2,853,562 UART: [cold-reset] --
2,854,196 UART: [state] Locking Datavault
2,855,509 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,113 UART: [state] Locking ICCM
2,856,719 UART: [exit] Launching FMC @ 0x40000130
2,862,048 UART:
2,862,064 UART: Running Caliptra FMC ...
2,862,472 UART:
2,862,526 UART: [state] CFI Enabled
2,873,049 UART: [fht] FMC Alias Private Key: 7
2,981,736 UART: [art] Extend RT PCRs Done
2,982,164 UART: [art] Lock RT PCRs Done
2,983,684 UART: [art] Populate DV Done
2,991,879 UART: [fht] FMC Alias Private Key: 7
2,993,033 UART: [art] Derive CDI
2,993,313 UART: [art] Store in in slot 0x4
3,078,828 UART: [art] Derive Key Pair
3,079,188 UART: [art] Store priv key in slot 0x5
3,092,362 UART: [art] Derive Key Pair - Done
3,107,419 UART: [art] Signing Cert with AUTHO
3,107,899 UART: RITY.KEYID = 7
3,123,201 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,966 UART: [art] PUB.X = 0CB1F28A069BB5C4FAE66F2741E63E5769894E0BE0542BCC0AC5815DDF6FB06BFB41B27E0B552DD0DD8635482327776B
3,130,733 UART: [art] PUB.Y = 2216D5BCCF05BAB10690E3F0F3D4549606513C09434AD607CAFB7B815BA0B1683976A37C0D8BE54F93B768ACA7D4DDD6
3,137,677 UART: [art] SIG.R = 6CC1461E87E30FC764D3CA320F383CFD0DC22C9113E62749156A7B55C1F8F2B1440EA7F3405D2521AF69F3FCF85646D7
3,144,441 UART: [art] SIG.S = F5F316573E0C10E6587B6759417F3D85CA6099D2C76A660BC1E743EF739638FC361BB4E59FD4F0F31CB3A04E0DEDDF31
3,167,799 UART: Caliptra RT
3,168,052 UART: [state] CFI Enabled
3,275,647 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,189 UART: [rt]cmd =0x47544744, len=8
3,307,650 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,459 ready_for_fw is high
1,059,459 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,220 >>> mbox cmd response: success
2,625,220 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,688,224 UART:
2,688,240 UART: Running Caliptra FMC ...
2,688,648 UART:
2,688,702 UART: [state] CFI Enabled
2,699,351 UART: [fht] FMC Alias Private Key: 7
2,808,334 UART: [art] Extend RT PCRs Done
2,808,762 UART: [art] Lock RT PCRs Done
2,810,220 UART: [art] Populate DV Done
2,818,301 UART: [fht] FMC Alias Private Key: 7
2,819,245 UART: [art] Derive CDI
2,819,525 UART: [art] Store in in slot 0x4
2,905,544 UART: [art] Derive Key Pair
2,905,904 UART: [art] Store priv key in slot 0x5
2,919,372 UART: [art] Derive Key Pair - Done
2,934,038 UART: [art] Signing Cert with AUTHO
2,934,518 UART: RITY.KEYID = 7
2,949,676 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,441 UART: [art] PUB.X = 2129F2642F1A221E52AEDC61CBE4065FD28F1CE2FF419D50ADC5CF187B81DB1D2863AAA2646093C9CDC479729981CA3C
2,957,222 UART: [art] PUB.Y = CFDB5CEC9A78AE0E41F5E1872C6E75DD022AA6AE921652B816814A9AFD061354AC355C1C789A45EFD53F24D669B31D9A
2,964,179 UART: [art] SIG.R = F324F9917718BE460C8D083EF3D3A111D93E306D1EEFE4FEB992CD409C6BA1E9B81CE067E9A562C7A9F95622B5AFAC6C
2,970,961 UART: [art] SIG.S = 1D6D8361A6C08B37B6F9834CECD6AF260A88FF3C28AF6F622D2E24A14DFB3744AAB474BA4CF8A077DE86D5ED8B959ADC
2,994,663 UART: Caliptra RT
2,994,916 UART: [state] CFI Enabled
3,102,821 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,275 UART: [rt]cmd =0x47544744, len=8
3,134,754 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,874 UART: [state] WD Timer not started. Device not locked for debugging
88,135 UART: [kat] SHA2-256
893,785 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,910 UART: [kat] ++
898,062 UART: [kat] sha1
902,496 UART: [kat] SHA2-256
904,436 UART: [kat] SHA2-384
907,283 UART: [kat] SHA2-512-ACC
909,184 UART: [kat] ECC-384
919,091 UART: [kat] HMAC-384Kdf
923,683 UART: [kat] LMS
1,172,011 UART: [kat] --
1,172,808 UART: [cold-reset] ++
1,173,216 UART: [fht] FHT @ 0x50003400
1,175,953 UART: [idev] ++
1,176,121 UART: [idev] CDI.KEYID = 6
1,176,481 UART: [idev] SUBJECT.KEYID = 7
1,176,905 UART: [idev] UDS.KEYID = 0
1,177,250 ready_for_fw is high
1,177,250 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,107 UART: [idev] Erasing UDS.KEYID = 0
1,202,618 UART: [idev] Sha1 KeyId Algorithm
1,211,066 UART: [idev] --
1,212,064 UART: [ldev] ++
1,212,232 UART: [ldev] CDI.KEYID = 6
1,212,595 UART: [ldev] SUBJECT.KEYID = 5
1,213,021 UART: [ldev] AUTHORITY.KEYID = 7
1,213,484 UART: [ldev] FE.KEYID = 1
1,219,010 UART: [ldev] Erasing FE.KEYID = 1
1,245,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,282 UART: [ldev] --
1,284,581 UART: [fwproc] Wait for Commands...
1,285,161 UART: [fwproc] Recv command 0x46574c44
1,285,889 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,703 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,007 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,756 >>> mbox cmd response: success
2,775,756 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,776,910 UART: [afmc] ++
2,777,078 UART: [afmc] CDI.KEYID = 6
2,777,440 UART: [afmc] SUBJECT.KEYID = 7
2,777,865 UART: [afmc] AUTHORITY.KEYID = 5
2,813,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,669 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,397 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,282 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,001 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,697 UART: [afmc] --
2,856,825 UART: [cold-reset] --
2,857,847 UART: [state] Locking Datavault
2,858,874 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,478 UART: [state] Locking ICCM
2,860,070 UART: [exit] Launching FMC @ 0x40000130
2,865,399 UART:
2,865,415 UART: Running Caliptra FMC ...
2,865,823 UART:
2,865,966 UART: [state] CFI Enabled
2,876,465 UART: [fht] FMC Alias Private Key: 7
2,985,072 UART: [art] Extend RT PCRs Done
2,985,500 UART: [art] Lock RT PCRs Done
2,987,032 UART: [art] Populate DV Done
2,995,479 UART: [fht] FMC Alias Private Key: 7
2,996,583 UART: [art] Derive CDI
2,996,863 UART: [art] Store in in slot 0x4
3,082,838 UART: [art] Derive Key Pair
3,083,198 UART: [art] Store priv key in slot 0x5
3,096,336 UART: [art] Derive Key Pair - Done
3,111,132 UART: [art] Signing Cert with AUTHO
3,111,612 UART: RITY.KEYID = 7
3,126,946 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,711 UART: [art] PUB.X = A455484816D9CBEF199C114FAEC4186FCDD9317680EAA68DC282917974FB8DEE2D041B6ECD02509A81003CBB614D37C3
3,134,463 UART: [art] PUB.Y = 9709BFC205EDB8EF38C2ED48D918D2F205F2A405174061E0416B2D5AF78BC7B660BBF57C9D697C9B86B2FEDF874A37AA
3,141,417 UART: [art] SIG.R = 195DB5312494EB265B5C791FBA7A19A21D8ADC2AA1EF67EE7DC711F5269CFBDD0CECC3590554B3CF9562D1B282560BC2
3,148,196 UART: [art] SIG.S = D369EC85AC12301CB74389FA0E6702952F9E6D40A174BB1A79CC378A434F4DDFA4919C77A65AB150ED24FEEA80D020DB
3,172,489 UART: Caliptra RT
3,172,834 UART: [state] CFI Enabled
3,280,143 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,707 UART: [rt]cmd =0x47544744, len=8
3,312,252 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,444 ready_for_fw is high
1,060,444 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,309 >>> mbox cmd response: success
2,626,309 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,688,929 UART:
2,688,945 UART: Running Caliptra FMC ...
2,689,353 UART:
2,689,496 UART: [state] CFI Enabled
2,700,425 UART: [fht] FMC Alias Private Key: 7
2,808,664 UART: [art] Extend RT PCRs Done
2,809,092 UART: [art] Lock RT PCRs Done
2,810,364 UART: [art] Populate DV Done
2,818,441 UART: [fht] FMC Alias Private Key: 7
2,819,583 UART: [art] Derive CDI
2,819,863 UART: [art] Store in in slot 0x4
2,905,622 UART: [art] Derive Key Pair
2,905,982 UART: [art] Store priv key in slot 0x5
2,919,678 UART: [art] Derive Key Pair - Done
2,934,917 UART: [art] Signing Cert with AUTHO
2,935,397 UART: RITY.KEYID = 7
2,950,387 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,152 UART: [art] PUB.X = 29AF4CA85E6A24BAF3B754E8D3EEEB2700D7539F0BE79780CC6A1F4D6C66C915A7EEBA4A5F82F5DAAEA6CBFE44501CE2
2,957,927 UART: [art] PUB.Y = 0BDADC28E36F04968AABC6E721ECABDBEB8C69478FFAD99365A9AB3815C6B6A69D7C382D85F6D88E0AD69FC29289BE8A
2,964,894 UART: [art] SIG.R = 003C4643566B2CEF15438FC7507376FDD70A840D9BCDBE9DB37732945B19239EE693D498B9DCFD70AA836E9D5C786F0C
2,971,641 UART: [art] SIG.S = B5886F04A6DAE2F41B86E38ACCBFF24B65FD0BDDA64C0213C49E538B0C6FC791F7D4BAAE6C09C62F92544279D51ABF67
2,995,683 UART: Caliptra RT
2,996,028 UART: [state] CFI Enabled
3,104,878 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,588 UART: [rt]cmd =0x47544744, len=8
3,137,211 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,609 UART: [state] WD Timer not started. Device not locked for debugging
87,926 UART: [kat] SHA2-256
891,476 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,605 UART: [kat] ++
895,757 UART: [kat] sha1
899,925 UART: [kat] SHA2-256
901,865 UART: [kat] SHA2-384
904,570 UART: [kat] SHA2-512-ACC
906,471 UART: [kat] ECC-384
916,190 UART: [kat] HMAC-384Kdf
920,586 UART: [kat] LMS
1,168,898 UART: [kat] --
1,169,677 UART: [cold-reset] ++
1,170,075 UART: [fht] FHT @ 0x50003400
1,172,657 UART: [idev] ++
1,172,825 UART: [idev] CDI.KEYID = 6
1,173,186 UART: [idev] SUBJECT.KEYID = 7
1,173,611 UART: [idev] UDS.KEYID = 0
1,173,957 ready_for_fw is high
1,173,957 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,483 UART: [idev] Erasing UDS.KEYID = 0
1,198,529 UART: [idev] Sha1 KeyId Algorithm
1,207,393 UART: [idev] --
1,208,564 UART: [ldev] ++
1,208,732 UART: [ldev] CDI.KEYID = 6
1,209,096 UART: [ldev] SUBJECT.KEYID = 5
1,209,523 UART: [ldev] AUTHORITY.KEYID = 7
1,209,986 UART: [ldev] FE.KEYID = 1
1,215,106 UART: [ldev] Erasing FE.KEYID = 1
1,241,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,232 UART: [ldev] --
1,280,516 UART: [fwproc] Wait for Commands...
1,281,245 UART: [fwproc] Recv command 0x46574c44
1,281,978 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,796 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,105 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,877 >>> mbox cmd response: success
2,770,877 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,772,072 UART: [afmc] ++
2,772,240 UART: [afmc] CDI.KEYID = 6
2,772,603 UART: [afmc] SUBJECT.KEYID = 7
2,773,029 UART: [afmc] AUTHORITY.KEYID = 5
2,808,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,696 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,447 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,176 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,059 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,778 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,811 UART: [afmc] --
2,851,717 UART: [cold-reset] --
2,852,717 UART: [state] Locking Datavault
2,854,132 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,736 UART: [state] Locking ICCM
2,855,370 UART: [exit] Launching FMC @ 0x40000130
2,860,699 UART:
2,860,715 UART: Running Caliptra FMC ...
2,861,123 UART:
2,861,177 UART: [state] CFI Enabled
2,871,676 UART: [fht] FMC Alias Private Key: 7
2,979,885 UART: [art] Extend RT PCRs Done
2,980,313 UART: [art] Lock RT PCRs Done
2,981,711 UART: [art] Populate DV Done
2,989,894 UART: [fht] FMC Alias Private Key: 7
2,991,046 UART: [art] Derive CDI
2,991,326 UART: [art] Store in in slot 0x4
3,076,913 UART: [art] Derive Key Pair
3,077,273 UART: [art] Store priv key in slot 0x5
3,089,895 UART: [art] Derive Key Pair - Done
3,104,966 UART: [art] Signing Cert with AUTHO
3,105,446 UART: RITY.KEYID = 7
3,120,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,301 UART: [art] PUB.X = D3D68D4F0E2E364B45A5C540CB061F9F11049FD9C2A564578C283C8C4748362732BF09E623E4642455E99A22D37CBF01
3,128,054 UART: [art] PUB.Y = 5415D53A91CF26ECE12B650825E87A799E33705A25DB38E7EE67D378D598C95E35B49147BFB0AD0D7AE02DB27A4F25A0
3,135,006 UART: [art] SIG.R = 2B3D55B918603B0286C6A9FECD86C0F7904570DB37DB44EF324BE59B2C0FFF90C59BA436E457D719D14809B558146BD2
3,141,773 UART: [art] SIG.S = 3623C61A8FA6D987536B91C4309F18C5ACB5D18D9C6D31FD3C92A6FF6142FE0F40D1B1C395A97B6CE94F673B077003F1
3,165,667 UART: Caliptra RT
3,165,920 UART: [state] CFI Enabled
3,273,233 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,525 UART: [rt]cmd =0x47544744, len=8
3,305,226 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,936 ready_for_fw is high
1,055,936 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,761 >>> mbox cmd response: success
2,621,761 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,683,717 UART:
2,683,733 UART: Running Caliptra FMC ...
2,684,141 UART:
2,684,195 UART: [state] CFI Enabled
2,694,576 UART: [fht] FMC Alias Private Key: 7
2,802,737 UART: [art] Extend RT PCRs Done
2,803,165 UART: [art] Lock RT PCRs Done
2,804,457 UART: [art] Populate DV Done
2,812,594 UART: [fht] FMC Alias Private Key: 7
2,813,698 UART: [art] Derive CDI
2,813,978 UART: [art] Store in in slot 0x4
2,899,659 UART: [art] Derive Key Pair
2,900,019 UART: [art] Store priv key in slot 0x5
2,913,321 UART: [art] Derive Key Pair - Done
2,927,597 UART: [art] Signing Cert with AUTHO
2,928,077 UART: RITY.KEYID = 7
2,943,259 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,024 UART: [art] PUB.X = 6EA5AC057F25C42D24EB53D468C19E324E0EFF4FE07D28DAF8D76BBB449FAF03769EB85518D6D2940E10ED046FFF6F2E
2,950,799 UART: [art] PUB.Y = 1ACDA921D7F9A41073530E5AA50742D6EE43A90A0BCD1D0396EF971496F61D6029A40AA14337CE596E266BE421DA5900
2,957,713 UART: [art] SIG.R = 8D6A3BC7937FDE16B64925906435006275A1092A1CCD2871ED49BC76B1F79071928A9B950A9B948165E354F569324287
2,964,443 UART: [art] SIG.S = 7AEB2D9CF6718B9588302D6C32CE1F1E16D5B8F109AC1789D59213236C9142169001D1F0A1466CD8C6211D4A79513BBD
2,988,590 UART: Caliptra RT
2,988,843 UART: [state] CFI Enabled
3,096,766 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,188 UART: [rt]cmd =0x47544744, len=8
3,128,715 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,001 UART: [state] LifecycleState = Unprovisioned
85,656 UART: [state] DebugLocked = No
86,286 UART: [state] WD Timer not started. Device not locked for debugging
87,399 UART: [kat] SHA2-256
890,949 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,078 UART: [kat] ++
895,230 UART: [kat] sha1
899,524 UART: [kat] SHA2-256
901,464 UART: [kat] SHA2-384
904,117 UART: [kat] SHA2-512-ACC
906,018 UART: [kat] ECC-384
915,511 UART: [kat] HMAC-384Kdf
920,099 UART: [kat] LMS
1,168,411 UART: [kat] --
1,169,222 UART: [cold-reset] ++
1,169,556 UART: [fht] FHT @ 0x50003400
1,172,420 UART: [idev] ++
1,172,588 UART: [idev] CDI.KEYID = 6
1,172,949 UART: [idev] SUBJECT.KEYID = 7
1,173,374 UART: [idev] UDS.KEYID = 0
1,173,720 ready_for_fw is high
1,173,720 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,178 UART: [idev] Erasing UDS.KEYID = 0
1,198,252 UART: [idev] Sha1 KeyId Algorithm
1,207,124 UART: [idev] --
1,208,043 UART: [ldev] ++
1,208,211 UART: [ldev] CDI.KEYID = 6
1,208,575 UART: [ldev] SUBJECT.KEYID = 5
1,209,002 UART: [ldev] AUTHORITY.KEYID = 7
1,209,465 UART: [ldev] FE.KEYID = 1
1,215,061 UART: [ldev] Erasing FE.KEYID = 1
1,241,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,553 UART: [ldev] --
1,280,997 UART: [fwproc] Wait for Commands...
1,281,718 UART: [fwproc] Recv command 0x46574c44
1,282,451 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,175 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,484 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,404 >>> mbox cmd response: success
2,773,404 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,774,423 UART: [afmc] ++
2,774,591 UART: [afmc] CDI.KEYID = 6
2,774,954 UART: [afmc] SUBJECT.KEYID = 7
2,775,380 UART: [afmc] AUTHORITY.KEYID = 5
2,811,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,631 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,382 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,111 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,994 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,713 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,532 UART: [afmc] --
2,854,454 UART: [cold-reset] --
2,855,504 UART: [state] Locking Datavault
2,856,747 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,351 UART: [state] Locking ICCM
2,857,963 UART: [exit] Launching FMC @ 0x40000130
2,863,292 UART:
2,863,308 UART: Running Caliptra FMC ...
2,863,716 UART:
2,863,859 UART: [state] CFI Enabled
2,874,672 UART: [fht] FMC Alias Private Key: 7
2,982,727 UART: [art] Extend RT PCRs Done
2,983,155 UART: [art] Lock RT PCRs Done
2,984,703 UART: [art] Populate DV Done
2,993,176 UART: [fht] FMC Alias Private Key: 7
2,994,164 UART: [art] Derive CDI
2,994,444 UART: [art] Store in in slot 0x4
3,080,091 UART: [art] Derive Key Pair
3,080,451 UART: [art] Store priv key in slot 0x5
3,094,217 UART: [art] Derive Key Pair - Done
3,108,830 UART: [art] Signing Cert with AUTHO
3,109,310 UART: RITY.KEYID = 7
3,124,798 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,563 UART: [art] PUB.X = 450CDFE7F9C7B12087C09506274951CF10320EE667A92B23A8660DE1E733C622C198761F11D67870CA55DAAB68DE809A
3,132,321 UART: [art] PUB.Y = 5D581772B93C43140AD0A4D05A3CA5379F488F5621B214DCB8DF015DA1F70A480D19D1B8EFB8E7D847B22DBDE7A7CA83
3,139,273 UART: [art] SIG.R = 69013073FEEAC61D44A3130F64383132C983D5F1CB87D55C2416B4F2E3C993536387BEE3494C8EC53A085D836393C30E
3,146,027 UART: [art] SIG.S = 0CA9D0F7E32892E741A8A1892C4FC486B14033DA4BCEBDBAB0C629B1A2BD199FFA85ABA25DDB9EAB12184FD05B3D2A9C
3,170,343 UART: Caliptra RT
3,170,688 UART: [state] CFI Enabled
3,277,295 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,719 UART: [rt]cmd =0x47544744, len=8
3,309,502 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,465 ready_for_fw is high
1,057,465 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,878 >>> mbox cmd response: success
2,624,878 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,687,128 UART:
2,687,144 UART: Running Caliptra FMC ...
2,687,552 UART:
2,687,695 UART: [state] CFI Enabled
2,698,364 UART: [fht] FMC Alias Private Key: 7
2,805,873 UART: [art] Extend RT PCRs Done
2,806,301 UART: [art] Lock RT PCRs Done
2,807,825 UART: [art] Populate DV Done
2,815,884 UART: [fht] FMC Alias Private Key: 7
2,816,890 UART: [art] Derive CDI
2,817,170 UART: [art] Store in in slot 0x4
2,902,861 UART: [art] Derive Key Pair
2,903,221 UART: [art] Store priv key in slot 0x5
2,917,005 UART: [art] Derive Key Pair - Done
2,931,970 UART: [art] Signing Cert with AUTHO
2,932,450 UART: RITY.KEYID = 7
2,947,928 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,693 UART: [art] PUB.X = 775112E816A184888A5E9648CC593B228DD52BD4511FED38252CD18B2E4C949C71ADB201576F17CDBB08150BE2420520
2,955,449 UART: [art] PUB.Y = 4968BD106EF6EDDB878CF2299FBAF93FA60B30D70CE1BA0AD54F56D4354D5828C5845EFB4768B2033384C39EA9D4166E
2,962,399 UART: [art] SIG.R = 5A65566560952164516D6F1D347B7D09A6B5DEA005A3F533AF3DB613B365848C64A6DAE28F491AA0418D4C208743A210
2,969,159 UART: [art] SIG.S = 0367167E43ED97889BBC10910D566A089498E427DCE14D816CB394EC24B122752AA8ABEE44FEB2454A89CE1A7F50A2D6
2,992,937 UART: Caliptra RT
2,993,282 UART: [state] CFI Enabled
3,101,327 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,061 UART: [rt]cmd =0x47544744, len=8
3,133,594 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
85,977 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,605 UART: [kat] SHA2-256
881,536 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,651 UART: [kat] ++
885,803 UART: [kat] sha1
889,871 UART: [kat] SHA2-256
891,809 UART: [kat] SHA2-384
894,338 UART: [kat] SHA2-512-ACC
896,239 UART: [kat] ECC-384
901,784 UART: [kat] HMAC-384Kdf
906,512 UART: [kat] LMS
1,474,708 UART: [kat] --
1,475,725 UART: [cold-reset] ++
1,476,115 UART: [fht] Storing FHT @ 0x50003400
1,478,904 UART: [idev] ++
1,479,072 UART: [idev] CDI.KEYID = 6
1,479,432 UART: [idev] SUBJECT.KEYID = 7
1,479,856 UART: [idev] UDS.KEYID = 0
1,480,201 ready_for_fw is high
1,480,201 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,616 UART: [idev] Erasing UDS.KEYID = 0
1,504,318 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,872 UART: [idev] --
1,513,755 UART: [ldev] ++
1,513,923 UART: [ldev] CDI.KEYID = 6
1,514,286 UART: [ldev] SUBJECT.KEYID = 5
1,514,712 UART: [ldev] AUTHORITY.KEYID = 7
1,515,175 UART: [ldev] FE.KEYID = 1
1,520,229 UART: [ldev] Erasing FE.KEYID = 1
1,545,236 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,768 UART: [ldev] --
1,584,161 UART: [fwproc] Waiting for Commands...
1,585,026 UART: [fwproc] Received command 0x46574c44
1,585,817 UART: [fwproc] Received Image of size 114332 bytes
2,883,311 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,717 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,069 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,032 >>> mbox cmd response: success
3,076,032 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,077,136 UART: [afmc] ++
3,077,304 UART: [afmc] CDI.KEYID = 6
3,077,666 UART: [afmc] SUBJECT.KEYID = 7
3,078,091 UART: [afmc] AUTHORITY.KEYID = 5
3,112,934 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,160 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,940 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,668 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,553 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,243 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,964 UART: [afmc] --
3,155,974 UART: [cold-reset] --
3,156,864 UART: [state] Locking Datavault
3,158,071 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,675 UART: [state] Locking ICCM
3,159,307 UART: [exit] Launching FMC @ 0x40000130
3,164,636 UART:
3,164,652 UART: Running Caliptra FMC ...
3,165,060 UART:
3,165,114 UART: [state] CFI Enabled
3,175,339 UART: [fht] FMC Alias Private Key: 7
3,283,926 UART: [art] Extend RT PCRs Done
3,284,354 UART: [art] Lock RT PCRs Done
3,286,078 UART: [art] Populate DV Done
3,294,317 UART: [fht] FMC Alias Private Key: 7
3,295,297 UART: [art] Derive CDI
3,295,577 UART: [art] Store in in slot 0x4
3,381,018 UART: [art] Derive Key Pair
3,381,378 UART: [art] Store priv key in slot 0x5
3,394,398 UART: [art] Derive Key Pair - Done
3,409,208 UART: [art] Signing Cert with AUTHO
3,409,688 UART: RITY.KEYID = 7
3,424,914 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,679 UART: [art] PUB.X = E3E2674C7E0CC0FAEBD83477CDD6E6E5E7332F4F15C1ACF59C2861D64977FE374F769D9D37205BD7B7675227A34DC4B0
3,432,458 UART: [art] PUB.Y = 209C3108A7964FCCD73B0E8F616B28A96F4CED59A07A4096C914E2C7DE37514BE0D6F9E65742D21BFB3A3B6A45BD135F
3,439,414 UART: [art] SIG.R = F118AAFD1B859283178D066B1AEE7C1DB23CE4FDF885D8747E0887CAB506DDA9A6503644E0630191CCB52E4EAA550B23
3,446,181 UART: [art] SIG.S = 9BC986B780B4A041321A4311A5507A677B74CA23E770A9E46EBFCF6C3AA00A8AEAD5AE8F37D2011244216D0B713FADD1
3,469,905 UART: Caliptra RT
3,470,158 UART: [state] CFI Enabled
3,578,040 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,772 UART: [rt]cmd =0x54514754, len=24
3,611,097 >>> mbox cmd response data (8 bytes)
3,611,098 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,263 UART: [rt]cmd =0x54514754, len=24
3,642,552 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,213 ready_for_fw is high
1,362,213 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,518 >>> mbox cmd response: success
2,927,518 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,988,540 UART:
2,988,556 UART: Running Caliptra FMC ...
2,988,964 UART:
2,989,018 UART: [state] CFI Enabled
2,999,591 UART: [fht] FMC Alias Private Key: 7
3,108,228 UART: [art] Extend RT PCRs Done
3,108,656 UART: [art] Lock RT PCRs Done
3,110,046 UART: [art] Populate DV Done
3,118,133 UART: [fht] FMC Alias Private Key: 7
3,119,207 UART: [art] Derive CDI
3,119,487 UART: [art] Store in in slot 0x4
3,205,060 UART: [art] Derive Key Pair
3,205,420 UART: [art] Store priv key in slot 0x5
3,218,256 UART: [art] Derive Key Pair - Done
3,232,873 UART: [art] Signing Cert with AUTHO
3,233,353 UART: RITY.KEYID = 7
3,248,735 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,500 UART: [art] PUB.X = 001E3F44108330D629213D80A87772122E5C409A4BDD2958E01DD0BD9D537F4778931FC24BC1B0A238396CD73C92D232
3,256,242 UART: [art] PUB.Y = 3331CACDC4BA6978C2711948A37550E777CFF38A40A6076B74F3D33E257EFC08B34DBFB05078157BBFE4EDDE1E467604
3,263,193 UART: [art] SIG.R = 0F8EEABC6065487FAEFD6B82AFB7086A7A28B1AB44EF47DC65D572CFBF9F03EF393A35A876376A6849D62DF23A411525
3,269,970 UART: [art] SIG.S = F21C763286E335897A4D64E4E164D62570747C07C8976568F12034C46662846A23ACA2050FF1896B2B9C094B62C6690B
3,293,964 UART: Caliptra RT
3,294,217 UART: [state] CFI Enabled
3,401,788 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,684 UART: [rt]cmd =0x54514754, len=24
3,434,721 >>> mbox cmd response data (8 bytes)
3,434,722 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,155 UART: [rt]cmd =0x54514754, len=24
3,466,214 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,704 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,264 UART: [kat] SHA2-256
882,195 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,310 UART: [kat] ++
886,462 UART: [kat] sha1
890,510 UART: [kat] SHA2-256
892,448 UART: [kat] SHA2-384
895,159 UART: [kat] SHA2-512-ACC
897,060 UART: [kat] ECC-384
902,753 UART: [kat] HMAC-384Kdf
907,421 UART: [kat] LMS
1,475,617 UART: [kat] --
1,476,432 UART: [cold-reset] ++
1,476,760 UART: [fht] Storing FHT @ 0x50003400
1,479,405 UART: [idev] ++
1,479,573 UART: [idev] CDI.KEYID = 6
1,479,933 UART: [idev] SUBJECT.KEYID = 7
1,480,357 UART: [idev] UDS.KEYID = 0
1,480,702 ready_for_fw is high
1,480,702 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,443 UART: [idev] Erasing UDS.KEYID = 0
1,505,107 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,911 UART: [idev] --
1,515,082 UART: [ldev] ++
1,515,250 UART: [ldev] CDI.KEYID = 6
1,515,613 UART: [ldev] SUBJECT.KEYID = 5
1,516,039 UART: [ldev] AUTHORITY.KEYID = 7
1,516,502 UART: [ldev] FE.KEYID = 1
1,521,946 UART: [ldev] Erasing FE.KEYID = 1
1,547,635 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,097 UART: [ldev] --
1,587,590 UART: [fwproc] Waiting for Commands...
1,588,339 UART: [fwproc] Received command 0x46574c44
1,589,130 UART: [fwproc] Received Image of size 114332 bytes
2,887,788 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,754 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,106 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,875 >>> mbox cmd response: success
3,080,875 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,082,131 UART: [afmc] ++
3,082,299 UART: [afmc] CDI.KEYID = 6
3,082,661 UART: [afmc] SUBJECT.KEYID = 7
3,083,086 UART: [afmc] AUTHORITY.KEYID = 5
3,118,309 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,651 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,431 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,159 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,044 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,734 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,659 UART: [afmc] --
3,161,773 UART: [cold-reset] --
3,162,605 UART: [state] Locking Datavault
3,163,788 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,392 UART: [state] Locking ICCM
3,164,812 UART: [exit] Launching FMC @ 0x40000130
3,170,141 UART:
3,170,157 UART: Running Caliptra FMC ...
3,170,565 UART:
3,170,708 UART: [state] CFI Enabled
3,181,405 UART: [fht] FMC Alias Private Key: 7
3,289,634 UART: [art] Extend RT PCRs Done
3,290,062 UART: [art] Lock RT PCRs Done
3,291,740 UART: [art] Populate DV Done
3,299,749 UART: [fht] FMC Alias Private Key: 7
3,300,769 UART: [art] Derive CDI
3,301,049 UART: [art] Store in in slot 0x4
3,386,706 UART: [art] Derive Key Pair
3,387,066 UART: [art] Store priv key in slot 0x5
3,400,598 UART: [art] Derive Key Pair - Done
3,415,254 UART: [art] Signing Cert with AUTHO
3,415,734 UART: RITY.KEYID = 7
3,430,684 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,449 UART: [art] PUB.X = 30BC281E907E262CA9B27FF766FE0AD9408848930CC9EE2CD25DB72146463DBF7EEC7F5D594AF447B26DE54C8BD58344
3,438,225 UART: [art] PUB.Y = 32F565A36D4234BFE19E832A576E7179D86CA152F3FD2AC88BBE535541A3D4746DDC5CD479EB0D109DF567746D5018F8
3,445,178 UART: [art] SIG.R = 0D72E8DFF3861AA0B25279A4028A8CF8B5E6130D36513D80A160971FA901FAAB7CC4B0FFE696CC19A393321FC89A521C
3,451,946 UART: [art] SIG.S = 979DB4968B2681E073DF602C78EC840BF40BAA80810D574911A64CC8830182E259FA73010CB8A789957BDB5C5C3C57A4
3,475,923 UART: Caliptra RT
3,476,268 UART: [state] CFI Enabled
3,584,571 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,173 UART: [rt]cmd =0x54514754, len=24
3,617,244 >>> mbox cmd response data (8 bytes)
3,617,245 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,838 UART: [rt]cmd =0x54514754, len=24
3,648,875 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,364 ready_for_fw is high
1,363,364 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,711 >>> mbox cmd response: success
2,927,711 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,990,265 UART:
2,990,281 UART: Running Caliptra FMC ...
2,990,689 UART:
2,990,832 UART: [state] CFI Enabled
3,001,231 UART: [fht] FMC Alias Private Key: 7
3,109,454 UART: [art] Extend RT PCRs Done
3,109,882 UART: [art] Lock RT PCRs Done
3,111,388 UART: [art] Populate DV Done
3,119,605 UART: [fht] FMC Alias Private Key: 7
3,120,723 UART: [art] Derive CDI
3,121,003 UART: [art] Store in in slot 0x4
3,206,804 UART: [art] Derive Key Pair
3,207,164 UART: [art] Store priv key in slot 0x5
3,220,006 UART: [art] Derive Key Pair - Done
3,235,081 UART: [art] Signing Cert with AUTHO
3,235,561 UART: RITY.KEYID = 7
3,250,835 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,600 UART: [art] PUB.X = 44CA8BC2C8F9EA659D9434FF142B90F63A75CC227B956859699D89C51114A50A60FDEF0F5F651CDF863C0CAD95E0D09E
3,258,373 UART: [art] PUB.Y = 4D959F38850E51FA2776B506C7D17350812F790EB43B499283D462FA5B5FBA4A5C1D8A05294984DEAD34F1B7B6286373
3,265,309 UART: [art] SIG.R = A2FF803CF8A86DF7F7D4388EA1A8DD792DC6F313CE5BD2ECB95154D318A23D2EBCF28ABA7956021CD12C2791FAB8C5E3
3,272,100 UART: [art] SIG.S = 037569C97260578B2D307A89226009B65D956852D1C5EABDF6A689CAA606D76B49CC31927C0E891299A756689A494FD0
3,295,893 UART: Caliptra RT
3,296,238 UART: [state] CFI Enabled
3,405,201 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,777 UART: [rt]cmd =0x54514754, len=24
3,437,932 >>> mbox cmd response data (8 bytes)
3,437,933 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,314 UART: [rt]cmd =0x54514754, len=24
3,469,311 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
893,222 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,347 UART: [kat] ++
897,499 UART: [kat] sha1
901,599 UART: [kat] SHA2-256
903,539 UART: [kat] SHA2-384
906,354 UART: [kat] SHA2-512-ACC
908,255 UART: [kat] ECC-384
918,112 UART: [kat] HMAC-384Kdf
922,568 UART: [kat] LMS
1,170,896 UART: [kat] --
1,172,071 UART: [cold-reset] ++
1,172,525 UART: [fht] FHT @ 0x50003400
1,175,306 UART: [idev] ++
1,175,474 UART: [idev] CDI.KEYID = 6
1,175,834 UART: [idev] SUBJECT.KEYID = 7
1,176,258 UART: [idev] UDS.KEYID = 0
1,176,603 ready_for_fw is high
1,176,603 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,406 UART: [idev] Erasing UDS.KEYID = 0
1,201,007 UART: [idev] Sha1 KeyId Algorithm
1,209,431 UART: [idev] --
1,210,573 UART: [ldev] ++
1,210,741 UART: [ldev] CDI.KEYID = 6
1,211,104 UART: [ldev] SUBJECT.KEYID = 5
1,211,530 UART: [ldev] AUTHORITY.KEYID = 7
1,211,993 UART: [ldev] FE.KEYID = 1
1,217,561 UART: [ldev] Erasing FE.KEYID = 1
1,244,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,397 UART: [ldev] --
1,283,748 UART: [fwproc] Wait for Commands...
1,284,486 UART: [fwproc] Recv command 0x46574c44
1,285,214 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,577 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,682 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,986 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,735 >>> mbox cmd response: success
2,775,735 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,776,761 UART: [afmc] ++
2,776,929 UART: [afmc] CDI.KEYID = 6
2,777,291 UART: [afmc] SUBJECT.KEYID = 7
2,777,716 UART: [afmc] AUTHORITY.KEYID = 5
2,813,005 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,474 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,202 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,087 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,806 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,714 UART: [afmc] --
2,856,778 UART: [cold-reset] --
2,857,848 UART: [state] Locking Datavault
2,859,087 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,691 UART: [state] Locking ICCM
2,860,247 UART: [exit] Launching FMC @ 0x40000130
2,865,576 UART:
2,865,592 UART: Running Caliptra FMC ...
2,866,000 UART:
2,866,054 UART: [state] CFI Enabled
2,876,431 UART: [fht] FMC Alias Private Key: 7
2,985,040 UART: [art] Extend RT PCRs Done
2,985,468 UART: [art] Lock RT PCRs Done
2,986,984 UART: [art] Populate DV Done
2,995,145 UART: [fht] FMC Alias Private Key: 7
2,996,315 UART: [art] Derive CDI
2,996,595 UART: [art] Store in in slot 0x4
3,082,050 UART: [art] Derive Key Pair
3,082,410 UART: [art] Store priv key in slot 0x5
3,094,718 UART: [art] Derive Key Pair - Done
3,109,701 UART: [art] Signing Cert with AUTHO
3,110,181 UART: RITY.KEYID = 7
3,125,515 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,280 UART: [art] PUB.X = 2809EC4CC8B3EB0D5F7AD7DFBD641F8366BC42230C7A86C9BBA1E0312F7A64F8F7696F69AFFEDF821A4BE8F0909C76A4
3,133,063 UART: [art] PUB.Y = 98ABAE6FBF3ECBB8284695755DC0E600E3AAB40D1D48AD363A3433D5C6B5DA17990CA6F596944757942D04FDC5EB3340
3,139,994 UART: [art] SIG.R = 06F740B71108D7AD9CE603C9D8A4F4B66AD88252370956FA55C5F14DB98C37AB22974E12D76C9EE201798B7EEE1A030F
3,146,749 UART: [art] SIG.S = CF09DAB53C6C5A05FA26E67CEF78E3ED6991268A4C3F4A7D870BA484D765AB20D7F2931E214D3B26D6E68549063E31ED
3,170,424 UART: Caliptra RT
3,170,677 UART: [state] CFI Enabled
3,278,354 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,854 UART: [rt]cmd =0x54514754, len=24
3,311,195 >>> mbox cmd response data (8 bytes)
3,311,196 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,591 UART: [rt]cmd =0x54514754, len=24
3,342,592 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,873 ready_for_fw is high
1,059,873 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,996 >>> mbox cmd response: success
2,624,996 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,686,682 UART:
2,686,698 UART: Running Caliptra FMC ...
2,687,106 UART:
2,687,160 UART: [state] CFI Enabled
2,697,799 UART: [fht] FMC Alias Private Key: 7
2,805,660 UART: [art] Extend RT PCRs Done
2,806,088 UART: [art] Lock RT PCRs Done
2,807,476 UART: [art] Populate DV Done
2,815,559 UART: [fht] FMC Alias Private Key: 7
2,816,737 UART: [art] Derive CDI
2,817,017 UART: [art] Store in in slot 0x4
2,902,792 UART: [art] Derive Key Pair
2,903,152 UART: [art] Store priv key in slot 0x5
2,915,994 UART: [art] Derive Key Pair - Done
2,930,969 UART: [art] Signing Cert with AUTHO
2,931,449 UART: RITY.KEYID = 7
2,946,987 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,752 UART: [art] PUB.X = FA8CA97DDC63A42725CFBA8B9C0F525785800192D1D1DC0CA328268FE0867C19921999EF796A872349DB32AA196CDC1E
2,954,521 UART: [art] PUB.Y = DF1933184C0EEBDE4026C50A372CC698B5C487C56BA45806235AB6C217D868CD3B0E267CF7E9E429AD2FF5AD8CCEB373
2,961,475 UART: [art] SIG.R = 2F4D44F95E00CC328576A7C88FDECEC9EC4AB85977887303EC364B6104D931B6693A49F4A7539F1CC489BA319A544068
2,968,219 UART: [art] SIG.S = 3A09208EA4417B1D4EB9830C3AF52098249A48D16924FEF95DBACCFC0D19AF927B5D65387DADAAB2E9DC587070989A3C
2,992,767 UART: Caliptra RT
2,993,020 UART: [state] CFI Enabled
3,102,065 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,701 UART: [rt]cmd =0x54514754, len=24
3,134,516 >>> mbox cmd response data (8 bytes)
3,134,517 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,800 UART: [rt]cmd =0x54514754, len=24
3,165,401 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,911 UART: [state] LifecycleState = Unprovisioned
86,566 UART: [state] DebugLocked = No
87,146 UART: [state] WD Timer not started. Device not locked for debugging
88,273 UART: [kat] SHA2-256
893,923 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,048 UART: [kat] ++
898,200 UART: [kat] sha1
902,356 UART: [kat] SHA2-256
904,296 UART: [kat] SHA2-384
906,917 UART: [kat] SHA2-512-ACC
908,818 UART: [kat] ECC-384
918,421 UART: [kat] HMAC-384Kdf
923,209 UART: [kat] LMS
1,171,537 UART: [kat] --
1,172,482 UART: [cold-reset] ++
1,172,906 UART: [fht] FHT @ 0x50003400
1,175,407 UART: [idev] ++
1,175,575 UART: [idev] CDI.KEYID = 6
1,175,935 UART: [idev] SUBJECT.KEYID = 7
1,176,359 UART: [idev] UDS.KEYID = 0
1,176,704 ready_for_fw is high
1,176,704 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,765 UART: [idev] Erasing UDS.KEYID = 0
1,201,958 UART: [idev] Sha1 KeyId Algorithm
1,210,352 UART: [idev] --
1,211,510 UART: [ldev] ++
1,211,678 UART: [ldev] CDI.KEYID = 6
1,212,041 UART: [ldev] SUBJECT.KEYID = 5
1,212,467 UART: [ldev] AUTHORITY.KEYID = 7
1,212,930 UART: [ldev] FE.KEYID = 1
1,218,284 UART: [ldev] Erasing FE.KEYID = 1
1,244,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,106 UART: [ldev] --
1,284,505 UART: [fwproc] Wait for Commands...
1,285,165 UART: [fwproc] Recv command 0x46574c44
1,285,893 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,714 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,731 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,035 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,762 >>> mbox cmd response: success
2,775,762 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,776,854 UART: [afmc] ++
2,777,022 UART: [afmc] CDI.KEYID = 6
2,777,384 UART: [afmc] SUBJECT.KEYID = 7
2,777,809 UART: [afmc] AUTHORITY.KEYID = 5
2,812,756 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,707 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,455 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,183 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,068 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,787 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,485 UART: [afmc] --
2,855,565 UART: [cold-reset] --
2,856,221 UART: [state] Locking Datavault
2,857,440 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,044 UART: [state] Locking ICCM
2,858,698 UART: [exit] Launching FMC @ 0x40000130
2,864,027 UART:
2,864,043 UART: Running Caliptra FMC ...
2,864,451 UART:
2,864,594 UART: [state] CFI Enabled
2,875,155 UART: [fht] FMC Alias Private Key: 7
2,983,840 UART: [art] Extend RT PCRs Done
2,984,268 UART: [art] Lock RT PCRs Done
2,985,750 UART: [art] Populate DV Done
2,993,837 UART: [fht] FMC Alias Private Key: 7
2,995,005 UART: [art] Derive CDI
2,995,285 UART: [art] Store in in slot 0x4
3,081,304 UART: [art] Derive Key Pair
3,081,664 UART: [art] Store priv key in slot 0x5
3,095,058 UART: [art] Derive Key Pair - Done
3,109,933 UART: [art] Signing Cert with AUTHO
3,110,413 UART: RITY.KEYID = 7
3,125,407 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,172 UART: [art] PUB.X = 4A8CCD55F93285D6FA3B50D4B1C755B4D981A69E7B1DCD8D9A0D2E8A81301685652AF19D81E7223ADA2DF193834C3234
3,132,947 UART: [art] PUB.Y = 030ACF6DE1705602898B1DC1B5421FC15D833E764ECD0F7C014F40D7979A71F2E952526A8A71611C23E2AE555DD3A900
3,139,862 UART: [art] SIG.R = 3852ECDB24C48604C38D5B692F3634F0D7F04ABB7A07A5E8991B0962F56EFE32DD9EAC0CAE7B66DA323B7C27EBABB045
3,146,640 UART: [art] SIG.S = DE75E368CA3F4F0B787024E7EABAB2F04A36AF730B663DAD431D816FABE239977517AF4B66499EA2ABC2196DEE5D34D6
3,170,311 UART: Caliptra RT
3,170,656 UART: [state] CFI Enabled
3,277,011 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,971 UART: [rt]cmd =0x54514754, len=24
3,310,402 >>> mbox cmd response data (8 bytes)
3,310,403 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,970 UART: [rt]cmd =0x54514754, len=24
3,342,229 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,812 ready_for_fw is high
1,060,812 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,779 >>> mbox cmd response: success
2,626,779 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,689,267 UART:
2,689,283 UART: Running Caliptra FMC ...
2,689,691 UART:
2,689,834 UART: [state] CFI Enabled
2,700,519 UART: [fht] FMC Alias Private Key: 7
2,808,178 UART: [art] Extend RT PCRs Done
2,808,606 UART: [art] Lock RT PCRs Done
2,810,222 UART: [art] Populate DV Done
2,818,409 UART: [fht] FMC Alias Private Key: 7
2,819,499 UART: [art] Derive CDI
2,819,779 UART: [art] Store in in slot 0x4
2,905,216 UART: [art] Derive Key Pair
2,905,576 UART: [art] Store priv key in slot 0x5
2,918,752 UART: [art] Derive Key Pair - Done
2,933,274 UART: [art] Signing Cert with AUTHO
2,933,754 UART: RITY.KEYID = 7
2,949,222 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,987 UART: [art] PUB.X = 88879678AF680821E84684198F4FC527973DEB37904508F595C6C840BF202AD1BF00FF5A33244ABBF573FE220E342F48
2,956,722 UART: [art] PUB.Y = 849BA1B2A54F51D30558562F4A7756FD76968EF37F837F3CF33DDE77E6FD97A8590844ED05AE22FBEC30134C38152A67
2,963,667 UART: [art] SIG.R = 25EEC274104EC19676FD03B76337A7FB797CB85A6DC8125CC19448C49005A220FB51B9716283E3124E102394FB290394
2,970,420 UART: [art] SIG.S = E0DD8F24B06067ECBBE238E3CAA5B967A38BDDF73B0E079E88151DA3640FB76F22F2079D0F33B8F575B853DA6CBB7F6C
2,994,408 UART: Caliptra RT
2,994,753 UART: [state] CFI Enabled
3,103,394 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,106 UART: [rt]cmd =0x54514754, len=24
3,136,221 >>> mbox cmd response data (8 bytes)
3,136,222 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,611 UART: [rt]cmd =0x54514754, len=24
3,167,552 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,625 UART: [kat] SHA2-256
901,565 UART: [kat] SHA2-384
904,320 UART: [kat] SHA2-512-ACC
906,221 UART: [kat] ECC-384
916,024 UART: [kat] HMAC-384Kdf
920,484 UART: [kat] LMS
1,168,796 UART: [kat] --
1,169,725 UART: [cold-reset] ++
1,170,255 UART: [fht] FHT @ 0x50003400
1,173,047 UART: [idev] ++
1,173,215 UART: [idev] CDI.KEYID = 6
1,173,576 UART: [idev] SUBJECT.KEYID = 7
1,174,001 UART: [idev] UDS.KEYID = 0
1,174,347 ready_for_fw is high
1,174,347 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,163 UART: [idev] Erasing UDS.KEYID = 0
1,199,295 UART: [idev] Sha1 KeyId Algorithm
1,208,289 UART: [idev] --
1,209,402 UART: [ldev] ++
1,209,570 UART: [ldev] CDI.KEYID = 6
1,209,934 UART: [ldev] SUBJECT.KEYID = 5
1,210,361 UART: [ldev] AUTHORITY.KEYID = 7
1,210,824 UART: [ldev] FE.KEYID = 1
1,215,960 UART: [ldev] Erasing FE.KEYID = 1
1,242,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,394 UART: [ldev] --
1,281,820 UART: [fwproc] Wait for Commands...
1,282,491 UART: [fwproc] Recv command 0x46574c44
1,283,224 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,846 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,155 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,895 >>> mbox cmd response: success
2,771,895 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,772,966 UART: [afmc] ++
2,773,134 UART: [afmc] CDI.KEYID = 6
2,773,497 UART: [afmc] SUBJECT.KEYID = 7
2,773,923 UART: [afmc] AUTHORITY.KEYID = 5
2,809,418 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,632 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,383 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,112 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,995 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,714 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,381 UART: [afmc] --
2,852,417 UART: [cold-reset] --
2,853,345 UART: [state] Locking Datavault
2,854,546 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,150 UART: [state] Locking ICCM
2,855,818 UART: [exit] Launching FMC @ 0x40000130
2,861,147 UART:
2,861,163 UART: Running Caliptra FMC ...
2,861,571 UART:
2,861,625 UART: [state] CFI Enabled
2,872,106 UART: [fht] FMC Alias Private Key: 7
2,980,631 UART: [art] Extend RT PCRs Done
2,981,059 UART: [art] Lock RT PCRs Done
2,982,933 UART: [art] Populate DV Done
2,990,982 UART: [fht] FMC Alias Private Key: 7
2,992,142 UART: [art] Derive CDI
2,992,422 UART: [art] Store in in slot 0x4
3,077,783 UART: [art] Derive Key Pair
3,078,143 UART: [art] Store priv key in slot 0x5
3,091,749 UART: [art] Derive Key Pair - Done
3,106,319 UART: [art] Signing Cert with AUTHO
3,106,799 UART: RITY.KEYID = 7
3,122,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,862 UART: [art] PUB.X = A9A367632348C4245F630E57A693DDD5628434CCDBBE60243312A3D7E37FA6590A0A5C605307AD0ECC427A7138B116C4
3,129,617 UART: [art] PUB.Y = 025C752DA98C60A7F73D41B2B055D5951344078CBC5EA5D20D52E95B555BBD5C95903970BAB19DF9287C52D065EA875E
3,136,562 UART: [art] SIG.R = 0220BB0B13457BCAD71CA8E9CFB7056DACE5515794ADC51E7234CD7C638247A8CDADCB6BFBE9200434AAB3DC54E57CF9
3,143,344 UART: [art] SIG.S = C771560AB3EE2EBE72524583B39F131113778D962BE963F43F865AF2E13AF710253776A328F455A2DBF317BBF6D49B7B
3,167,302 UART: Caliptra RT
3,167,555 UART: [state] CFI Enabled
3,275,814 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,358 UART: [rt]cmd =0x54514754, len=24
3,308,237 >>> mbox cmd response data (8 bytes)
3,308,238 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,741 UART: [rt]cmd =0x54514754, len=24
3,339,646 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,888 ready_for_fw is high
1,055,888 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,421 >>> mbox cmd response: success
2,620,421 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,681,757 UART:
2,681,773 UART: Running Caliptra FMC ...
2,682,181 UART:
2,682,235 UART: [state] CFI Enabled
2,692,364 UART: [fht] FMC Alias Private Key: 7
2,799,881 UART: [art] Extend RT PCRs Done
2,800,309 UART: [art] Lock RT PCRs Done
2,801,905 UART: [art] Populate DV Done
2,810,140 UART: [fht] FMC Alias Private Key: 7
2,811,130 UART: [art] Derive CDI
2,811,410 UART: [art] Store in in slot 0x4
2,896,931 UART: [art] Derive Key Pair
2,897,291 UART: [art] Store priv key in slot 0x5
2,910,133 UART: [art] Derive Key Pair - Done
2,925,143 UART: [art] Signing Cert with AUTHO
2,925,623 UART: RITY.KEYID = 7
2,940,789 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,554 UART: [art] PUB.X = 9EE495D895A9E22D2994ED23A95F6CFEB1553FF6BEDA08BD33355202E322637A85232D10D424054D657A18CE4EFC3187
2,948,319 UART: [art] PUB.Y = ADF4B9F2D702413BD79556B6EDC01FC655D707ACEB81A2111AFBBF5CAE9856037B62CE866487F25D5B24FFD1EAF52E64
2,955,280 UART: [art] SIG.R = 8DEC0B1726FF1F80CD263A231C2ABA985CB052C1417D4FEDE66ADFA9A6F6A335E060442CC84826C7121169C22D58DB3C
2,962,061 UART: [art] SIG.S = 7AC033B435EFD2DC02A94B50DE33158737F6F3DFF1DA994BE8EADB440168A4A9B5D598F1BD0ACB000E37FC15A9FD455C
2,985,758 UART: Caliptra RT
2,986,011 UART: [state] CFI Enabled
3,093,802 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,500 UART: [rt]cmd =0x54514754, len=24
3,126,661 >>> mbox cmd response data (8 bytes)
3,126,662 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,156,029 UART: [rt]cmd =0x54514754, len=24
3,157,798 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,697 UART: [state] LifecycleState = Unprovisioned
86,352 UART: [state] DebugLocked = No
87,020 UART: [state] WD Timer not started. Device not locked for debugging
88,175 UART: [kat] SHA2-256
891,725 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,854 UART: [kat] ++
896,006 UART: [kat] sha1
900,118 UART: [kat] SHA2-256
902,058 UART: [kat] SHA2-384
904,901 UART: [kat] SHA2-512-ACC
906,802 UART: [kat] ECC-384
916,415 UART: [kat] HMAC-384Kdf
921,131 UART: [kat] LMS
1,169,443 UART: [kat] --
1,170,258 UART: [cold-reset] ++
1,170,670 UART: [fht] FHT @ 0x50003400
1,173,306 UART: [idev] ++
1,173,474 UART: [idev] CDI.KEYID = 6
1,173,835 UART: [idev] SUBJECT.KEYID = 7
1,174,260 UART: [idev] UDS.KEYID = 0
1,174,606 ready_for_fw is high
1,174,606 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,244 UART: [idev] Erasing UDS.KEYID = 0
1,199,440 UART: [idev] Sha1 KeyId Algorithm
1,208,198 UART: [idev] --
1,209,439 UART: [ldev] ++
1,209,607 UART: [ldev] CDI.KEYID = 6
1,209,971 UART: [ldev] SUBJECT.KEYID = 5
1,210,398 UART: [ldev] AUTHORITY.KEYID = 7
1,210,861 UART: [ldev] FE.KEYID = 1
1,215,855 UART: [ldev] Erasing FE.KEYID = 1
1,242,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,431 UART: [ldev] --
1,281,831 UART: [fwproc] Wait for Commands...
1,282,636 UART: [fwproc] Recv command 0x46574c44
1,283,369 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,597 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,906 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,774 >>> mbox cmd response: success
2,771,774 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,772,893 UART: [afmc] ++
2,773,061 UART: [afmc] CDI.KEYID = 6
2,773,424 UART: [afmc] SUBJECT.KEYID = 7
2,773,850 UART: [afmc] AUTHORITY.KEYID = 5
2,809,221 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,117 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,868 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,597 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,480 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,199 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,036 UART: [afmc] --
2,852,990 UART: [cold-reset] --
2,853,648 UART: [state] Locking Datavault
2,854,885 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,489 UART: [state] Locking ICCM
2,856,149 UART: [exit] Launching FMC @ 0x40000130
2,861,478 UART:
2,861,494 UART: Running Caliptra FMC ...
2,861,902 UART:
2,862,045 UART: [state] CFI Enabled
2,872,310 UART: [fht] FMC Alias Private Key: 7
2,979,617 UART: [art] Extend RT PCRs Done
2,980,045 UART: [art] Lock RT PCRs Done
2,981,617 UART: [art] Populate DV Done
2,990,022 UART: [fht] FMC Alias Private Key: 7
2,991,118 UART: [art] Derive CDI
2,991,398 UART: [art] Store in in slot 0x4
3,077,053 UART: [art] Derive Key Pair
3,077,413 UART: [art] Store priv key in slot 0x5
3,091,409 UART: [art] Derive Key Pair - Done
3,106,290 UART: [art] Signing Cert with AUTHO
3,106,770 UART: RITY.KEYID = 7
3,121,756 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,521 UART: [art] PUB.X = 723231E2451CF3A26864D0FD1C1EECD41D5F355AC271645CC5BE34D9F001AAE3ABA7A86087349D9B6D97A8552A6303CD
3,129,295 UART: [art] PUB.Y = 8EBBCA8148C38110554DE31DC69248B2ADE8B58BD4119737F82E60DC07AE8904D5B845B6CDC8911F63D005BC802E65F6
3,136,244 UART: [art] SIG.R = A562961CA1D7DEBE3B81036557795C7C1D2484D18180C3F9A00EB16116AF6916C05C97F003F71C087319890189295A0C
3,142,988 UART: [art] SIG.S = 7A1347D6BEEE8FD5EB8D3CDBFDC03907FCC45AF93E7D71B53780A41BBCCA891F1B20F227EB0EBE9A1C04898E33DD1D0A
3,166,567 UART: Caliptra RT
3,166,912 UART: [state] CFI Enabled
3,274,307 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,917 UART: [rt]cmd =0x54514754, len=24
3,306,968 >>> mbox cmd response data (8 bytes)
3,306,969 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,482 UART: [rt]cmd =0x54514754, len=24
3,338,489 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,027 ready_for_fw is high
1,056,027 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,566 >>> mbox cmd response: success
2,621,566 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,683,638 UART:
2,683,654 UART: Running Caliptra FMC ...
2,684,062 UART:
2,684,205 UART: [state] CFI Enabled
2,694,544 UART: [fht] FMC Alias Private Key: 7
2,803,231 UART: [art] Extend RT PCRs Done
2,803,659 UART: [art] Lock RT PCRs Done
2,805,333 UART: [art] Populate DV Done
2,813,614 UART: [fht] FMC Alias Private Key: 7
2,814,716 UART: [art] Derive CDI
2,814,996 UART: [art] Store in in slot 0x4
2,900,357 UART: [art] Derive Key Pair
2,900,717 UART: [art] Store priv key in slot 0x5
2,913,755 UART: [art] Derive Key Pair - Done
2,928,636 UART: [art] Signing Cert with AUTHO
2,929,116 UART: RITY.KEYID = 7
2,944,206 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,971 UART: [art] PUB.X = 3FCD99A354935F2396B661C8B8DFFC58FCD46BE7527CE99564CE056337FE5DA4E78637CDDAF4E8E0266692BC88701CCE
2,951,752 UART: [art] PUB.Y = CA1000540D3EF28C2B9537E56F479EC0CD2D4EB46A4B5BEBD46A7C6252C1B2D4B53FAB8718EB2DF0DE36655D16C655E7
2,958,695 UART: [art] SIG.R = 73A97D2C1BCD9BE63DAD4F261ACB7624F994DF7A258DB201A89D0126D821F4BA2D5471874E407DF09DFA0E373A85A8F2
2,965,470 UART: [art] SIG.S = F2DFCFBCA459908B0D097119DA8B674C6469C0C8D1F65C5BA02B34C1DC0BFCDCEE11070BCA69CECEDE6BAC5FA8EE7E63
2,989,630 UART: Caliptra RT
2,989,975 UART: [state] CFI Enabled
3,097,972 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,808 UART: [rt]cmd =0x54514754, len=24
3,130,847 >>> mbox cmd response data (8 bytes)
3,130,848 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,385 UART: [rt]cmd =0x54514754, len=24
3,162,484 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,628 UART: [state] LifecycleState = Unprovisioned
85,283 UART: [state] DebugLocked = No
85,943 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,653 UART: [kat] SHA2-256
881,584 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,699 UART: [kat] ++
885,851 UART: [kat] sha1
890,211 UART: [kat] SHA2-256
892,149 UART: [kat] SHA2-384
894,954 UART: [kat] SHA2-512-ACC
896,855 UART: [kat] ECC-384
902,506 UART: [kat] HMAC-384Kdf
906,944 UART: [kat] LMS
1,475,140 UART: [kat] --
1,475,873 UART: [cold-reset] ++
1,476,211 UART: [fht] Storing FHT @ 0x50003400
1,478,998 UART: [idev] ++
1,479,166 UART: [idev] CDI.KEYID = 6
1,479,526 UART: [idev] SUBJECT.KEYID = 7
1,479,950 UART: [idev] UDS.KEYID = 0
1,480,295 ready_for_fw is high
1,480,295 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,914 UART: [idev] Erasing UDS.KEYID = 0
1,504,648 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,232 UART: [idev] --
1,514,311 UART: [ldev] ++
1,514,479 UART: [ldev] CDI.KEYID = 6
1,514,842 UART: [ldev] SUBJECT.KEYID = 5
1,515,268 UART: [ldev] AUTHORITY.KEYID = 7
1,515,731 UART: [ldev] FE.KEYID = 1
1,520,951 UART: [ldev] Erasing FE.KEYID = 1
1,546,048 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,114 UART: [ldev] --
1,585,491 UART: [fwproc] Waiting for Commands...
1,586,238 UART: [fwproc] Received command 0x46574c44
1,587,029 UART: [fwproc] Received Image of size 114332 bytes
2,884,511 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,825 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,177 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,934 >>> mbox cmd response: success
3,077,934 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,079,024 UART: [afmc] ++
3,079,192 UART: [afmc] CDI.KEYID = 6
3,079,554 UART: [afmc] SUBJECT.KEYID = 7
3,079,979 UART: [afmc] AUTHORITY.KEYID = 5
3,114,690 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,192 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,972 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,700 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,585 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,275 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,178 UART: [afmc] --
3,158,110 UART: [cold-reset] --
3,159,068 UART: [state] Locking Datavault
3,160,123 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,727 UART: [state] Locking ICCM
3,161,181 UART: [exit] Launching FMC @ 0x40000130
3,166,510 UART:
3,166,526 UART: Running Caliptra FMC ...
3,166,934 UART:
3,166,988 UART: [state] CFI Enabled
3,177,591 UART: [fht] FMC Alias Private Key: 7
3,285,550 UART: [art] Extend RT PCRs Done
3,285,978 UART: [art] Lock RT PCRs Done
3,287,676 UART: [art] Populate DV Done
3,295,849 UART: [fht] FMC Alias Private Key: 7
3,296,967 UART: [art] Derive CDI
3,297,247 UART: [art] Store in in slot 0x4
3,383,304 UART: [art] Derive Key Pair
3,383,664 UART: [art] Store priv key in slot 0x5
3,396,474 UART: [art] Derive Key Pair - Done
3,411,153 UART: [art] Signing Cert with AUTHO
3,411,633 UART: RITY.KEYID = 7
3,426,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,380 UART: [art] PUB.X = 5C5CFED5BA8334A4F9A08CF387D0691D0D2D163202A3F176483271E1CA38BA58FC5AEB165DC3A5B17B6DF83492572013
3,434,152 UART: [art] PUB.Y = 4172AC0E18B3D8ABD132145B53421754318CDEA6EF451DB9086C17E98D4F79894B7A85E26F8EDF8D34CE484C263B0FB1
3,441,101 UART: [art] SIG.R = 76F8CBE5792A199DFD13EA7FD2091B711359BEE286B85781C6E446D374F24A4302428D0B94DF1CCDA52FED3C3B0B8B8A
3,447,873 UART: [art] SIG.S = 21CFC1AE7B88AB33C8D98F7A8C29D5C7AA110D256622017AA614FFFC563CD66D6034CF3DB6653CFDC0A4212930767871
3,471,972 UART: Caliptra RT
3,472,225 UART: [state] CFI Enabled
3,580,165 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,597 UART: [rt]cmd =0x54514754, len=24
3,612,746 >>> mbox cmd response data (8 bytes)
3,612,747 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,292 UART: [rt]cmd =0x47544744, len=8
3,644,760 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,845 ready_for_fw is high
1,362,845 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,433 >>> mbox cmd response: success
2,926,433 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,988,491 UART:
2,988,507 UART: Running Caliptra FMC ...
2,988,915 UART:
2,988,969 UART: [state] CFI Enabled
2,999,380 UART: [fht] FMC Alias Private Key: 7
3,107,103 UART: [art] Extend RT PCRs Done
3,107,531 UART: [art] Lock RT PCRs Done
3,108,645 UART: [art] Populate DV Done
3,117,072 UART: [fht] FMC Alias Private Key: 7
3,118,106 UART: [art] Derive CDI
3,118,386 UART: [art] Store in in slot 0x4
3,204,003 UART: [art] Derive Key Pair
3,204,363 UART: [art] Store priv key in slot 0x5
3,217,945 UART: [art] Derive Key Pair - Done
3,232,594 UART: [art] Signing Cert with AUTHO
3,233,074 UART: RITY.KEYID = 7
3,248,188 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,953 UART: [art] PUB.X = F20C627944368A14BF63C1C4FD26C360B9109D5DAE5969CBB9FBE01A5E5E1111338D940418FC6A729BA3DBC1394C598D
3,255,725 UART: [art] PUB.Y = F926157F1331DA43C1ED6511A44D285983F94CA72F9894A908D5BFF8E20C9C0B4A7707A70F283C24401D715820F092C6
3,262,656 UART: [art] SIG.R = 169213CA239B59AD3049AAB799AC192C84D6656F229E02C14F931CE655A6FFE145E4A52BE32D436D3283DCEA670EB793
3,269,426 UART: [art] SIG.S = 160FDBBBA8F77E55A95AE50F69AD4A11A5DC6C7914FBAD33EA40A59F09A4EE308F7C31CA05E910FDBD9F727CC441B71E
3,293,701 UART: Caliptra RT
3,293,954 UART: [state] CFI Enabled
3,402,678 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,290 UART: [rt]cmd =0x54514754, len=24
3,435,251 >>> mbox cmd response data (8 bytes)
3,435,252 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,635 UART: [rt]cmd =0x47544744, len=8
3,467,275 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,730 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,226 UART: [kat] SHA2-256
882,157 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,272 UART: [kat] ++
886,424 UART: [kat] sha1
890,624 UART: [kat] SHA2-256
892,562 UART: [kat] SHA2-384
895,223 UART: [kat] SHA2-512-ACC
897,124 UART: [kat] ECC-384
902,619 UART: [kat] HMAC-384Kdf
907,381 UART: [kat] LMS
1,475,577 UART: [kat] --
1,476,544 UART: [cold-reset] ++
1,477,090 UART: [fht] Storing FHT @ 0x50003400
1,479,669 UART: [idev] ++
1,479,837 UART: [idev] CDI.KEYID = 6
1,480,197 UART: [idev] SUBJECT.KEYID = 7
1,480,621 UART: [idev] UDS.KEYID = 0
1,480,966 ready_for_fw is high
1,480,966 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,521 UART: [idev] Erasing UDS.KEYID = 0
1,505,293 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,895 UART: [idev] --
1,514,808 UART: [ldev] ++
1,514,976 UART: [ldev] CDI.KEYID = 6
1,515,339 UART: [ldev] SUBJECT.KEYID = 5
1,515,765 UART: [ldev] AUTHORITY.KEYID = 7
1,516,228 UART: [ldev] FE.KEYID = 1
1,521,416 UART: [ldev] Erasing FE.KEYID = 1
1,546,367 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,589 UART: [ldev] --
1,586,056 UART: [fwproc] Waiting for Commands...
1,586,901 UART: [fwproc] Received command 0x46574c44
1,587,692 UART: [fwproc] Received Image of size 114332 bytes
2,884,978 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,694 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,046 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,867 >>> mbox cmd response: success
3,077,867 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,078,939 UART: [afmc] ++
3,079,107 UART: [afmc] CDI.KEYID = 6
3,079,469 UART: [afmc] SUBJECT.KEYID = 7
3,079,894 UART: [afmc] AUTHORITY.KEYID = 5
3,115,417 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,315 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,095 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,823 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,708 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,398 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,239 UART: [afmc] --
3,158,123 UART: [cold-reset] --
3,159,155 UART: [state] Locking Datavault
3,160,132 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,736 UART: [state] Locking ICCM
3,161,326 UART: [exit] Launching FMC @ 0x40000130
3,166,655 UART:
3,166,671 UART: Running Caliptra FMC ...
3,167,079 UART:
3,167,222 UART: [state] CFI Enabled
3,177,567 UART: [fht] FMC Alias Private Key: 7
3,285,804 UART: [art] Extend RT PCRs Done
3,286,232 UART: [art] Lock RT PCRs Done
3,287,852 UART: [art] Populate DV Done
3,296,111 UART: [fht] FMC Alias Private Key: 7
3,297,279 UART: [art] Derive CDI
3,297,559 UART: [art] Store in in slot 0x4
3,383,038 UART: [art] Derive Key Pair
3,383,398 UART: [art] Store priv key in slot 0x5
3,396,718 UART: [art] Derive Key Pair - Done
3,411,414 UART: [art] Signing Cert with AUTHO
3,411,894 UART: RITY.KEYID = 7
3,426,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,483 UART: [art] PUB.X = 87DC9D3A66CF2754E0362558AE7D04FFF0E111CE722914F6F17675BF478F880C2E3C3381E62B64F5E357E5769A220D06
3,434,241 UART: [art] PUB.Y = C8EFE68DC20D5B2878245E63CE495E1C0DBD88FBCB6B0E704455C249D638AC15C9F6D9EB0AAF072003F04559DF2EA41A
3,441,191 UART: [art] SIG.R = 39C863D58A91B08E54468D12C5FF58FBBE0A0689848DB071D39CC2F40A4B776397D7A7558025C8C7506FC64CD356871F
3,447,952 UART: [art] SIG.S = 499DE9A19C074CBE6371AD8938B6968115B433B402FB34E341214BDD0004FB15AC8F43E06703F4828482C0ABC225B0C8
3,471,897 UART: Caliptra RT
3,472,242 UART: [state] CFI Enabled
3,580,472 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,078 UART: [rt]cmd =0x54514754, len=24
3,613,073 >>> mbox cmd response data (8 bytes)
3,613,074 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,339 UART: [rt]cmd =0x47544744, len=8
3,645,113 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,646 ready_for_fw is high
1,362,646 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,785 >>> mbox cmd response: success
2,928,785 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,990,791 UART:
2,990,807 UART: Running Caliptra FMC ...
2,991,215 UART:
2,991,358 UART: [state] CFI Enabled
3,001,997 UART: [fht] FMC Alias Private Key: 7
3,110,190 UART: [art] Extend RT PCRs Done
3,110,618 UART: [art] Lock RT PCRs Done
3,112,400 UART: [art] Populate DV Done
3,120,483 UART: [fht] FMC Alias Private Key: 7
3,121,573 UART: [art] Derive CDI
3,121,853 UART: [art] Store in in slot 0x4
3,207,524 UART: [art] Derive Key Pair
3,207,884 UART: [art] Store priv key in slot 0x5
3,222,070 UART: [art] Derive Key Pair - Done
3,236,954 UART: [art] Signing Cert with AUTHO
3,237,434 UART: RITY.KEYID = 7
3,252,798 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,563 UART: [art] PUB.X = 8781CBC29A90856202F01374D5CDFB9296CF55A31E9B551875345C574738E9E72E7380BEAD7CE023D78FD3FB13232ABB
3,260,334 UART: [art] PUB.Y = 86A2AE52E247F5FBCDF7158CAD44AC199AE8ACB1578F5E862101E5FB5C4209EA0EA21490ED741C3C4ED9FF81485576EC
3,267,293 UART: [art] SIG.R = 94BF0F26BFF54BB8157B40736E9D493665DE1DDA5AC59E0D9A7994E77E8D7A1436F6F94F326A4C861061A4C6A3DA6590
3,274,065 UART: [art] SIG.S = 994193076AA6671B12F55B7609EE919318AB4607128A2DAC2EDDC6ECFDFEFE7607AD179A3A9A2E008D161015BAE01B27
3,297,718 UART: Caliptra RT
3,298,063 UART: [state] CFI Enabled
3,406,907 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,605 UART: [rt]cmd =0x54514754, len=24
3,439,620 >>> mbox cmd response data (8 bytes)
3,439,621 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,916 UART: [rt]cmd =0x47544744, len=8
3,471,360 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,681 UART: [state] WD Timer not started. Device not locked for debugging
88,026 UART: [kat] SHA2-256
893,676 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,801 UART: [kat] ++
897,953 UART: [kat] sha1
902,359 UART: [kat] SHA2-256
904,299 UART: [kat] SHA2-384
907,130 UART: [kat] SHA2-512-ACC
909,031 UART: [kat] ECC-384
918,938 UART: [kat] HMAC-384Kdf
923,448 UART: [kat] LMS
1,171,776 UART: [kat] --
1,172,397 UART: [cold-reset] ++
1,172,907 UART: [fht] FHT @ 0x50003400
1,175,536 UART: [idev] ++
1,175,704 UART: [idev] CDI.KEYID = 6
1,176,064 UART: [idev] SUBJECT.KEYID = 7
1,176,488 UART: [idev] UDS.KEYID = 0
1,176,833 ready_for_fw is high
1,176,833 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,608 UART: [idev] Erasing UDS.KEYID = 0
1,202,163 UART: [idev] Sha1 KeyId Algorithm
1,210,621 UART: [idev] --
1,211,683 UART: [ldev] ++
1,211,851 UART: [ldev] CDI.KEYID = 6
1,212,214 UART: [ldev] SUBJECT.KEYID = 5
1,212,640 UART: [ldev] AUTHORITY.KEYID = 7
1,213,103 UART: [ldev] FE.KEYID = 1
1,218,277 UART: [ldev] Erasing FE.KEYID = 1
1,244,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,479 UART: [ldev] --
1,283,960 UART: [fwproc] Wait for Commands...
1,284,606 UART: [fwproc] Recv command 0x46574c44
1,285,334 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,698 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,002 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,713 >>> mbox cmd response: success
2,774,713 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,775,831 UART: [afmc] ++
2,775,999 UART: [afmc] CDI.KEYID = 6
2,776,361 UART: [afmc] SUBJECT.KEYID = 7
2,776,786 UART: [afmc] AUTHORITY.KEYID = 5
2,812,411 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,282 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,030 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,758 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,643 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,362 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,320 UART: [afmc] --
2,856,442 UART: [cold-reset] --
2,857,122 UART: [state] Locking Datavault
2,858,331 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,935 UART: [state] Locking ICCM
2,859,441 UART: [exit] Launching FMC @ 0x40000130
2,864,770 UART:
2,864,786 UART: Running Caliptra FMC ...
2,865,194 UART:
2,865,248 UART: [state] CFI Enabled
2,875,471 UART: [fht] FMC Alias Private Key: 7
2,983,962 UART: [art] Extend RT PCRs Done
2,984,390 UART: [art] Lock RT PCRs Done
2,986,020 UART: [art] Populate DV Done
2,994,503 UART: [fht] FMC Alias Private Key: 7
2,995,525 UART: [art] Derive CDI
2,995,805 UART: [art] Store in in slot 0x4
3,081,454 UART: [art] Derive Key Pair
3,081,814 UART: [art] Store priv key in slot 0x5
3,094,878 UART: [art] Derive Key Pair - Done
3,109,568 UART: [art] Signing Cert with AUTHO
3,110,048 UART: RITY.KEYID = 7
3,125,192 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,957 UART: [art] PUB.X = E1DD3B51EAAE1468D7146229E92992CE9CC14DDAA84AA8544D3145388A80B010D3DFE92FD2BBA7E67D5112FC198DC15E
3,132,743 UART: [art] PUB.Y = 8FD003403518C3010054D44543207BB70D1A2444A943A29A5E42AADE99DFA9AC2824627E9C41B02B2D7514F074ACA490
3,139,660 UART: [art] SIG.R = 29CF7BB15E918CC533F0238001C1C5A89558FF843136B79AB76D97A019ECFC9C3864C1AB2FC2659D42B1EEF81E0C0EF7
3,146,433 UART: [art] SIG.S = 61A9B9B2FE7E2A8E9259596DC68A86658E2AC3A86C9537DAF529BE7D15349029666FAC702E65177FE0E8511E24F309D5
3,170,449 UART: Caliptra RT
3,170,702 UART: [state] CFI Enabled
3,278,055 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,379 UART: [rt]cmd =0x54514754, len=24
3,310,502 >>> mbox cmd response data (8 bytes)
3,310,503 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,984 UART: [rt]cmd =0x47544744, len=8
3,342,606 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,029 ready_for_fw is high
1,060,029 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,756 >>> mbox cmd response: success
2,626,756 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,689,132 UART:
2,689,148 UART: Running Caliptra FMC ...
2,689,556 UART:
2,689,610 UART: [state] CFI Enabled
2,700,123 UART: [fht] FMC Alias Private Key: 7
2,808,634 UART: [art] Extend RT PCRs Done
2,809,062 UART: [art] Lock RT PCRs Done
2,810,608 UART: [art] Populate DV Done
2,819,077 UART: [fht] FMC Alias Private Key: 7
2,820,085 UART: [art] Derive CDI
2,820,365 UART: [art] Store in in slot 0x4
2,906,310 UART: [art] Derive Key Pair
2,906,670 UART: [art] Store priv key in slot 0x5
2,919,882 UART: [art] Derive Key Pair - Done
2,934,478 UART: [art] Signing Cert with AUTHO
2,934,958 UART: RITY.KEYID = 7
2,950,830 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,595 UART: [art] PUB.X = FFDD208D9A6982FD25CDC1EA5EB0746E6E59099DDB97C6467C6D46997B9EC5F40583E0FDF62CC9CC45F377774F19F8D4
2,958,375 UART: [art] PUB.Y = 42E34EC94D840A3A441B0319CFF1CB433847DB5FC99844203892CCFE3ED6C47B9587FECF794E69C16216F00D890F2D9F
2,965,321 UART: [art] SIG.R = 27C92D59D4910156474D3AD6A3ED90BE1BBAA9B7AC20547C09935A33D0A5CB58D75452C51632495A63AD9F55C2FFA5B8
2,972,093 UART: [art] SIG.S = 3DF595237DB424ED7C4971B758431C77A812E9E80F8894531EAED62A9C54EB8683DA186939800D1E7CC740EA81056D30
2,995,293 UART: Caliptra RT
2,995,546 UART: [state] CFI Enabled
3,103,247 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,849 UART: [rt]cmd =0x54514754, len=24
3,135,948 >>> mbox cmd response data (8 bytes)
3,135,949 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,360 UART: [rt]cmd =0x47544744, len=8
3,167,754 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,115 UART: [state] LifecycleState = Unprovisioned
85,770 UART: [state] DebugLocked = No
86,444 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
893,445 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,570 UART: [kat] ++
897,722 UART: [kat] sha1
901,948 UART: [kat] SHA2-256
903,888 UART: [kat] SHA2-384
906,709 UART: [kat] SHA2-512-ACC
908,610 UART: [kat] ECC-384
918,257 UART: [kat] HMAC-384Kdf
922,889 UART: [kat] LMS
1,171,217 UART: [kat] --
1,172,180 UART: [cold-reset] ++
1,172,738 UART: [fht] FHT @ 0x50003400
1,175,445 UART: [idev] ++
1,175,613 UART: [idev] CDI.KEYID = 6
1,175,973 UART: [idev] SUBJECT.KEYID = 7
1,176,397 UART: [idev] UDS.KEYID = 0
1,176,742 ready_for_fw is high
1,176,742 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,655 UART: [idev] Erasing UDS.KEYID = 0
1,201,246 UART: [idev] Sha1 KeyId Algorithm
1,209,658 UART: [idev] --
1,210,816 UART: [ldev] ++
1,210,984 UART: [ldev] CDI.KEYID = 6
1,211,347 UART: [ldev] SUBJECT.KEYID = 5
1,211,773 UART: [ldev] AUTHORITY.KEYID = 7
1,212,236 UART: [ldev] FE.KEYID = 1
1,217,476 UART: [ldev] Erasing FE.KEYID = 1
1,243,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,536 UART: [ldev] --
1,282,951 UART: [fwproc] Wait for Commands...
1,283,713 UART: [fwproc] Recv command 0x46574c44
1,284,441 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,735 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,039 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,850 >>> mbox cmd response: success
2,773,850 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,775,110 UART: [afmc] ++
2,775,278 UART: [afmc] CDI.KEYID = 6
2,775,640 UART: [afmc] SUBJECT.KEYID = 7
2,776,065 UART: [afmc] AUTHORITY.KEYID = 5
2,812,276 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,775 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,503 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,388 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,107 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,865 UART: [afmc] --
2,855,771 UART: [cold-reset] --
2,856,721 UART: [state] Locking Datavault
2,857,762 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,366 UART: [state] Locking ICCM
2,858,842 UART: [exit] Launching FMC @ 0x40000130
2,864,171 UART:
2,864,187 UART: Running Caliptra FMC ...
2,864,595 UART:
2,864,738 UART: [state] CFI Enabled
2,874,827 UART: [fht] FMC Alias Private Key: 7
2,983,466 UART: [art] Extend RT PCRs Done
2,983,894 UART: [art] Lock RT PCRs Done
2,985,346 UART: [art] Populate DV Done
2,993,925 UART: [fht] FMC Alias Private Key: 7
2,994,901 UART: [art] Derive CDI
2,995,181 UART: [art] Store in in slot 0x4
3,081,150 UART: [art] Derive Key Pair
3,081,510 UART: [art] Store priv key in slot 0x5
3,095,026 UART: [art] Derive Key Pair - Done
3,109,771 UART: [art] Signing Cert with AUTHO
3,110,251 UART: RITY.KEYID = 7
3,125,817 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,582 UART: [art] PUB.X = 36CD0AA6A18361912B51E33ED52D13615832EB352E437256368471C2139140415BA2C7EAEB5D17FC03ADC11997562933
3,133,338 UART: [art] PUB.Y = 8434E7C4C65E2F95480FAA6B950B0889D979CC109A936C07A1D73D74EF62CB6BE25B6662D639F1A3766021A683ADB7BD
3,140,282 UART: [art] SIG.R = E327FD955DF4F94558E2CE786A13F2595D8579A92B3F8FA67FE19327A0415AFF10FCD2D4B6BE319E526F3CB0D7DD128A
3,147,066 UART: [art] SIG.S = 3319DF444670F6BC030B5E61E0B97E9AB1AD93378C0B276B734483738C030A83F654DAF54292ACDFC825557BC7EB5F6D
3,170,766 UART: Caliptra RT
3,171,111 UART: [state] CFI Enabled
3,278,752 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,532 UART: [rt]cmd =0x54514754, len=24
3,311,717 >>> mbox cmd response data (8 bytes)
3,311,718 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,317 UART: [rt]cmd =0x47544744, len=8
3,343,783 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,892 ready_for_fw is high
1,060,892 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,361 >>> mbox cmd response: success
2,628,361 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,690,869 UART:
2,690,885 UART: Running Caliptra FMC ...
2,691,293 UART:
2,691,436 UART: [state] CFI Enabled
2,702,075 UART: [fht] FMC Alias Private Key: 7
2,810,172 UART: [art] Extend RT PCRs Done
2,810,600 UART: [art] Lock RT PCRs Done
2,811,974 UART: [art] Populate DV Done
2,820,109 UART: [fht] FMC Alias Private Key: 7
2,821,161 UART: [art] Derive CDI
2,821,441 UART: [art] Store in in slot 0x4
2,906,792 UART: [art] Derive Key Pair
2,907,152 UART: [art] Store priv key in slot 0x5
2,920,712 UART: [art] Derive Key Pair - Done
2,935,568 UART: [art] Signing Cert with AUTHO
2,936,048 UART: RITY.KEYID = 7
2,951,372 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,137 UART: [art] PUB.X = 6287791B13843CBF60C5AE55EE2B1FF04804C86F351F537DC2A003A35B715741871178A4560E3E6950E03C682A6FF7FA
2,958,896 UART: [art] PUB.Y = 0385DDFFDAAB8243B2CB944ABEBE84274802552751AA5D59A2DAD89BB3D63B5731BD1F29A9161230EA8A3B33A630A3F0
2,965,854 UART: [art] SIG.R = B9E74C03FC03F730749E701D8C349781E99E0BA400A7B726C62BCFF7185245978F7EBFD2C76D181CE5F3C75070C8DF0F
2,972,598 UART: [art] SIG.S = D599D9F5AE961D3F1C58C0097E059470C1761C9581BE3EF0D15BADD02650D787D84D0B9EDF4A00AF597C0291187D0961
2,996,362 UART: Caliptra RT
2,996,707 UART: [state] CFI Enabled
3,104,215 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,897 UART: [rt]cmd =0x54514754, len=24
3,137,004 >>> mbox cmd response data (8 bytes)
3,137,005 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,234 UART: [rt]cmd =0x47544744, len=8
3,168,708 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,548 UART: [state] LifecycleState = Unprovisioned
86,203 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,896 UART: [kat] SHA2-256
891,446 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,575 UART: [kat] ++
895,727 UART: [kat] sha1
900,049 UART: [kat] SHA2-256
901,989 UART: [kat] SHA2-384
904,874 UART: [kat] SHA2-512-ACC
906,775 UART: [kat] ECC-384
916,582 UART: [kat] HMAC-384Kdf
920,986 UART: [kat] LMS
1,169,298 UART: [kat] --
1,170,049 UART: [cold-reset] ++
1,170,523 UART: [fht] FHT @ 0x50003400
1,173,151 UART: [idev] ++
1,173,319 UART: [idev] CDI.KEYID = 6
1,173,680 UART: [idev] SUBJECT.KEYID = 7
1,174,105 UART: [idev] UDS.KEYID = 0
1,174,451 ready_for_fw is high
1,174,451 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,127 UART: [idev] Erasing UDS.KEYID = 0
1,199,163 UART: [idev] Sha1 KeyId Algorithm
1,207,845 UART: [idev] --
1,208,958 UART: [ldev] ++
1,209,126 UART: [ldev] CDI.KEYID = 6
1,209,490 UART: [ldev] SUBJECT.KEYID = 5
1,209,917 UART: [ldev] AUTHORITY.KEYID = 7
1,210,380 UART: [ldev] FE.KEYID = 1
1,215,882 UART: [ldev] Erasing FE.KEYID = 1
1,242,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,252 UART: [ldev] --
1,281,554 UART: [fwproc] Wait for Commands...
1,282,199 UART: [fwproc] Recv command 0x46574c44
1,282,932 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,156 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,784 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,093 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,017 >>> mbox cmd response: success
2,773,017 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,150 UART: [afmc] ++
2,774,318 UART: [afmc] CDI.KEYID = 6
2,774,681 UART: [afmc] SUBJECT.KEYID = 7
2,775,107 UART: [afmc] AUTHORITY.KEYID = 5
2,810,740 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,474 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,225 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,954 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,837 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,556 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,263 UART: [afmc] --
2,854,363 UART: [cold-reset] --
2,855,091 UART: [state] Locking Datavault
2,856,262 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,866 UART: [state] Locking ICCM
2,857,442 UART: [exit] Launching FMC @ 0x40000130
2,862,771 UART:
2,862,787 UART: Running Caliptra FMC ...
2,863,195 UART:
2,863,249 UART: [state] CFI Enabled
2,873,686 UART: [fht] FMC Alias Private Key: 7
2,981,579 UART: [art] Extend RT PCRs Done
2,982,007 UART: [art] Lock RT PCRs Done
2,983,383 UART: [art] Populate DV Done
2,991,804 UART: [fht] FMC Alias Private Key: 7
2,992,794 UART: [art] Derive CDI
2,993,074 UART: [art] Store in in slot 0x4
3,078,889 UART: [art] Derive Key Pair
3,079,249 UART: [art] Store priv key in slot 0x5
3,092,353 UART: [art] Derive Key Pair - Done
3,107,308 UART: [art] Signing Cert with AUTHO
3,107,788 UART: RITY.KEYID = 7
3,123,286 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,051 UART: [art] PUB.X = 6E3DB5CB66BC5B19876A89D1BD93F0B691DAC38BA6AC209097B6EF268934E18AC97917CED6E19E23592E418B4597BC77
3,130,831 UART: [art] PUB.Y = 47966F8121DD19706D4E54B848BD5062495EB077D03C0BDF34D6B806157A24DC1FDE1EC133F6FA5C8359596602E501B8
3,137,769 UART: [art] SIG.R = C55FFD5D3148F400518240D7BDA5DBCF9D7DC6E8BA523E17A766DBD9D98B31406464DBD1A56CC7AE8D59C5C36C0189DC
3,144,534 UART: [art] SIG.S = 064823CFC9414034B449881AC0430CD4B5FCD14D9CB027FEEEBC97920123831AF3E6AA24030C1AB29611F5E593D0DC2D
3,167,946 UART: Caliptra RT
3,168,199 UART: [state] CFI Enabled
3,275,446 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,466 UART: [rt]cmd =0x54514754, len=24
3,308,643 >>> mbox cmd response data (8 bytes)
3,308,644 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,043 UART: [rt]cmd =0x47544744, len=8
3,340,483 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,780 ready_for_fw is high
1,055,780 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,397 >>> mbox cmd response: success
2,623,397 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,243 UART:
2,685,259 UART: Running Caliptra FMC ...
2,685,667 UART:
2,685,721 UART: [state] CFI Enabled
2,695,982 UART: [fht] FMC Alias Private Key: 7
2,803,591 UART: [art] Extend RT PCRs Done
2,804,019 UART: [art] Lock RT PCRs Done
2,805,515 UART: [art] Populate DV Done
2,813,396 UART: [fht] FMC Alias Private Key: 7
2,814,548 UART: [art] Derive CDI
2,814,828 UART: [art] Store in in slot 0x4
2,900,785 UART: [art] Derive Key Pair
2,901,145 UART: [art] Store priv key in slot 0x5
2,914,159 UART: [art] Derive Key Pair - Done
2,929,074 UART: [art] Signing Cert with AUTHO
2,929,554 UART: RITY.KEYID = 7
2,945,054 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,819 UART: [art] PUB.X = F3E945D061F3C54000AC644ADB7CB4AB08BC6318310A677FB139E7449189E3D9B449E95CDC79D87B08E2FCF7ACB2D8AD
2,952,574 UART: [art] PUB.Y = 61873706984CC16E98744FDEC581E2206A73B71DAF80CB3DE507ADE86226B5807D3717F9FE9D8DF4D61C5251C8718C30
2,959,520 UART: [art] SIG.R = 53CEB2AFA62DF733825890B668EC1FF0E8FC49EE8F954FEB9051626525EBC6137497F944005B6CBD37A96FC462D8E4FA
2,966,280 UART: [art] SIG.S = 4D6CDF5B9BF99B82A763AC2D8E8AC31BA74550820057F1D27788885EBDE758461655B6BEB3481FE0A956E5325CBBE34E
2,990,297 UART: Caliptra RT
2,990,550 UART: [state] CFI Enabled
3,098,243 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,821 UART: [rt]cmd =0x54514754, len=24
3,130,820 >>> mbox cmd response data (8 bytes)
3,130,821 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,278 UART: [rt]cmd =0x47544744, len=8
3,162,972 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,955 UART: [state] LifecycleState = Unprovisioned
86,610 UART: [state] DebugLocked = No
87,314 UART: [state] WD Timer not started. Device not locked for debugging
88,597 UART: [kat] SHA2-256
892,147 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,276 UART: [kat] ++
896,428 UART: [kat] sha1
900,846 UART: [kat] SHA2-256
902,786 UART: [kat] SHA2-384
905,585 UART: [kat] SHA2-512-ACC
907,486 UART: [kat] ECC-384
917,123 UART: [kat] HMAC-384Kdf
921,903 UART: [kat] LMS
1,170,215 UART: [kat] --
1,171,002 UART: [cold-reset] ++
1,171,564 UART: [fht] FHT @ 0x50003400
1,174,086 UART: [idev] ++
1,174,254 UART: [idev] CDI.KEYID = 6
1,174,615 UART: [idev] SUBJECT.KEYID = 7
1,175,040 UART: [idev] UDS.KEYID = 0
1,175,386 ready_for_fw is high
1,175,386 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,126 UART: [idev] Erasing UDS.KEYID = 0
1,200,100 UART: [idev] Sha1 KeyId Algorithm
1,208,892 UART: [idev] --
1,209,981 UART: [ldev] ++
1,210,149 UART: [ldev] CDI.KEYID = 6
1,210,513 UART: [ldev] SUBJECT.KEYID = 5
1,210,940 UART: [ldev] AUTHORITY.KEYID = 7
1,211,403 UART: [ldev] FE.KEYID = 1
1,216,285 UART: [ldev] Erasing FE.KEYID = 1
1,242,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,955 UART: [ldev] --
1,282,413 UART: [fwproc] Wait for Commands...
1,283,048 UART: [fwproc] Recv command 0x46574c44
1,283,781 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,661 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,970 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,812 >>> mbox cmd response: success
2,774,812 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,776,081 UART: [afmc] ++
2,776,249 UART: [afmc] CDI.KEYID = 6
2,776,612 UART: [afmc] SUBJECT.KEYID = 7
2,777,038 UART: [afmc] AUTHORITY.KEYID = 5
2,812,769 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,724 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,453 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,336 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,055 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,788 UART: [afmc] --
2,855,762 UART: [cold-reset] --
2,856,796 UART: [state] Locking Datavault
2,857,919 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,523 UART: [state] Locking ICCM
2,859,101 UART: [exit] Launching FMC @ 0x40000130
2,864,430 UART:
2,864,446 UART: Running Caliptra FMC ...
2,864,854 UART:
2,864,997 UART: [state] CFI Enabled
2,875,514 UART: [fht] FMC Alias Private Key: 7
2,983,333 UART: [art] Extend RT PCRs Done
2,983,761 UART: [art] Lock RT PCRs Done
2,985,311 UART: [art] Populate DV Done
2,993,512 UART: [fht] FMC Alias Private Key: 7
2,994,652 UART: [art] Derive CDI
2,994,932 UART: [art] Store in in slot 0x4
3,080,649 UART: [art] Derive Key Pair
3,081,009 UART: [art] Store priv key in slot 0x5
3,094,025 UART: [art] Derive Key Pair - Done
3,108,491 UART: [art] Signing Cert with AUTHO
3,108,971 UART: RITY.KEYID = 7
3,124,165 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,930 UART: [art] PUB.X = C8204D3EF589D5ED823E30E291176DC03EC71EC31835A0DFF488CF85E56FA48C5F3BA8982A81B58171A4CE277DFAC4D6
3,131,714 UART: [art] PUB.Y = B84A41318F137A11C40ADFA3738D77E9E287A2E18D3C85734FF5AE0D20D4CDE2B60688622F44E225093B58886202AA76
3,138,649 UART: [art] SIG.R = F064041F28D64F9F6A8D7B300313DC8639321DC5DD17B6D5B68E8D12EDDCDE28FBBCBBEF23B9C2B8A4F46ED5EB9EDB13
3,145,441 UART: [art] SIG.S = B944BCD897A5A37B538CE4E8A1BEA8B683219DE58CF790086C2F48053A30D121AE0EFE6860AAC342A4EF8BA5410C4553
3,169,048 UART: Caliptra RT
3,169,393 UART: [state] CFI Enabled
3,278,587 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,301 UART: [rt]cmd =0x54514754, len=24
3,311,432 >>> mbox cmd response data (8 bytes)
3,311,433 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,856 UART: [rt]cmd =0x47544744, len=8
3,343,388 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,565 ready_for_fw is high
1,056,565 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,760 >>> mbox cmd response: success
2,621,760 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,683,384 UART:
2,683,400 UART: Running Caliptra FMC ...
2,683,808 UART:
2,683,951 UART: [state] CFI Enabled
2,694,542 UART: [fht] FMC Alias Private Key: 7
2,802,805 UART: [art] Extend RT PCRs Done
2,803,233 UART: [art] Lock RT PCRs Done
2,804,983 UART: [art] Populate DV Done
2,813,572 UART: [fht] FMC Alias Private Key: 7
2,814,664 UART: [art] Derive CDI
2,814,944 UART: [art] Store in in slot 0x4
2,900,713 UART: [art] Derive Key Pair
2,901,073 UART: [art] Store priv key in slot 0x5
2,914,509 UART: [art] Derive Key Pair - Done
2,929,392 UART: [art] Signing Cert with AUTHO
2,929,872 UART: RITY.KEYID = 7
2,945,138 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,903 UART: [art] PUB.X = 0CBDDF1FCD8382C2F926BFE512019D04EB46E2027929C64AEA023B9A164894D8E1002CAFD172B449E26ED7F89F2A7B8A
2,952,650 UART: [art] PUB.Y = EA7C73340F38920C92A5E1EC0AF416818241138717384B4614A85A41B80CFA25736EE21723E216B28185F30C9A80C8C8
2,959,577 UART: [art] SIG.R = FBAAAF792F86F848A4CDF3DFAC31F11778B8EDFBFFEAC8DFAD9AD4E8718B538553ED4E1EBA50636BCDF19B1399D7E091
2,966,381 UART: [art] SIG.S = AD3B61534ABC0CCCC45A20D879EDA0D9E7CCE2C585204833F018C326A71164EFB4736106051DFCB9EBEE6D459DD6AC1F
2,990,077 UART: Caliptra RT
2,990,422 UART: [state] CFI Enabled
3,098,656 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,460 UART: [rt]cmd =0x54514754, len=24
3,131,555 >>> mbox cmd response data (8 bytes)
3,131,556 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,977 UART: [rt]cmd =0x47544744, len=8
3,163,655 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,865 UART: [kat] SHA2-256
881,796 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,911 UART: [kat] ++
886,063 UART: [kat] sha1
890,221 UART: [kat] SHA2-256
892,159 UART: [kat] SHA2-384
895,004 UART: [kat] SHA2-512-ACC
896,905 UART: [kat] ECC-384
902,418 UART: [kat] HMAC-384Kdf
906,932 UART: [kat] LMS
1,475,128 UART: [kat] --
1,475,825 UART: [cold-reset] ++
1,476,261 UART: [fht] Storing FHT @ 0x50003400
1,479,128 UART: [idev] ++
1,479,296 UART: [idev] CDI.KEYID = 6
1,479,656 UART: [idev] SUBJECT.KEYID = 7
1,480,080 UART: [idev] UDS.KEYID = 0
1,480,425 ready_for_fw is high
1,480,425 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,256 UART: [idev] Erasing UDS.KEYID = 0
1,504,934 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,380 UART: [idev] --
1,514,189 UART: [ldev] ++
1,514,357 UART: [ldev] CDI.KEYID = 6
1,514,720 UART: [ldev] SUBJECT.KEYID = 5
1,515,146 UART: [ldev] AUTHORITY.KEYID = 7
1,515,609 UART: [ldev] FE.KEYID = 1
1,521,061 UART: [ldev] Erasing FE.KEYID = 1
1,546,222 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,276 UART: [ldev] --
1,585,675 UART: [fwproc] Waiting for Commands...
1,586,414 UART: [fwproc] Received command 0x46574c44
1,587,205 UART: [fwproc] Received Image of size 114332 bytes
2,884,587 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,993 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,345 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,094 >>> mbox cmd response: success
3,077,094 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,078,116 UART: [afmc] ++
3,078,284 UART: [afmc] CDI.KEYID = 6
3,078,646 UART: [afmc] SUBJECT.KEYID = 7
3,079,071 UART: [afmc] AUTHORITY.KEYID = 5
3,113,542 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,800 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,580 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,308 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,193 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,883 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,680 UART: [afmc] --
3,156,774 UART: [cold-reset] --
3,157,724 UART: [state] Locking Datavault
3,158,955 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,559 UART: [state] Locking ICCM
3,160,129 UART: [exit] Launching FMC @ 0x40000130
3,165,458 UART:
3,165,474 UART: Running Caliptra FMC ...
3,165,882 UART:
3,165,936 UART: [state] CFI Enabled
3,176,791 UART: [fht] FMC Alias Private Key: 7
3,284,892 UART: [art] Extend RT PCRs Done
3,285,320 UART: [art] Lock RT PCRs Done
3,286,956 UART: [art] Populate DV Done
3,295,117 UART: [fht] FMC Alias Private Key: 7
3,296,109 UART: [art] Derive CDI
3,296,389 UART: [art] Store in in slot 0x4
3,382,240 UART: [art] Derive Key Pair
3,382,600 UART: [art] Store priv key in slot 0x5
3,396,182 UART: [art] Derive Key Pair - Done
3,410,430 UART: [art] Signing Cert with AUTHO
3,410,910 UART: RITY.KEYID = 7
3,426,118 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,883 UART: [art] PUB.X = 4A75967257217683C2F461C1B14CC20BFB3EB5694CC349A3D0C219268DCE233698889C2F07520E34E37F5742B62DE096
3,433,638 UART: [art] PUB.Y = F6F257B12E725DD2DF90978364E3BA125727B78A1C4099BE24F6D45197B6CF81C2247B420D287D505AD888EB7042E8E4
3,440,585 UART: [art] SIG.R = 0AD1689E6C0803F900C1E93FF1C8F5F697D8E6FA62D40F7376F3ED3D3965C55EBFDE97C154184D44DCD8D4C2A132D2A5
3,447,335 UART: [art] SIG.S = 5CF693EAB1BCFB50A691D86BE62066CE16A095A5CB464CBF554474FB1F20589FE1487A32F2DA78132D2BD74B918AA8C3
3,470,904 UART: Caliptra RT
3,471,157 UART: [state] CFI Enabled
3,579,327 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,997 UART: [rt]cmd =0x54514754, len=24
3,612,120 >>> mbox cmd response data (8 bytes)
3,612,121 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,804 UART: [rt]cmd =0x44504543, len=36
3,679,437 >>> mbox cmd response data (24 bytes)
3,679,438 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,991 UART: [rt]cmd =0x47544744, len=8
3,710,534 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,417 ready_for_fw is high
1,362,417 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,650 >>> mbox cmd response: success
2,927,650 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,989,006 UART:
2,989,022 UART: Running Caliptra FMC ...
2,989,430 UART:
2,989,484 UART: [state] CFI Enabled
2,999,975 UART: [fht] FMC Alias Private Key: 7
3,107,458 UART: [art] Extend RT PCRs Done
3,107,886 UART: [art] Lock RT PCRs Done
3,109,778 UART: [art] Populate DV Done
3,117,881 UART: [fht] FMC Alias Private Key: 7
3,119,055 UART: [art] Derive CDI
3,119,335 UART: [art] Store in in slot 0x4
3,205,080 UART: [art] Derive Key Pair
3,205,440 UART: [art] Store priv key in slot 0x5
3,218,980 UART: [art] Derive Key Pair - Done
3,233,871 UART: [art] Signing Cert with AUTHO
3,234,351 UART: RITY.KEYID = 7
3,249,691 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,456 UART: [art] PUB.X = 6C9FEBE5981DCC06E9EEC20A83FD0ED7CAE4A9D6B7000C3214F8493EA9CFF49EBC958BD134056A68486F7D82C6FC85E1
3,257,211 UART: [art] PUB.Y = BC8515C23E30FACBC7CD0DDAE068779905A077FA2C42543FB6250D5CCA282F957263A64700825B1EB12D906D00655E31
3,264,112 UART: [art] SIG.R = CA1274021FFCCD2FDE01E9E219F415AA8978ED909A011A8BC016BDDD245948E1565F6167895F0F1E394B55501A0EECAC
3,270,879 UART: [art] SIG.S = FE0F1443B664D0A4AF5C2A86734C77C0AF93CFC464F01FF70328374F31D2D75B7B44AD70D623D7ED94E27EEE8DDA4023
3,294,658 UART: Caliptra RT
3,294,911 UART: [state] CFI Enabled
3,403,133 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,739 UART: [rt]cmd =0x54514754, len=24
3,435,734 >>> mbox cmd response data (8 bytes)
3,435,735 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,278 UART: [rt]cmd =0x44504543, len=36
3,503,131 >>> mbox cmd response data (24 bytes)
3,503,132 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,532,593 UART: [rt]cmd =0x47544744, len=8
3,534,280 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,522 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,208 UART: [kat] SHA2-256
882,139 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,254 UART: [kat] ++
886,406 UART: [kat] sha1
890,566 UART: [kat] SHA2-256
892,504 UART: [kat] SHA2-384
895,391 UART: [kat] SHA2-512-ACC
897,292 UART: [kat] ECC-384
902,827 UART: [kat] HMAC-384Kdf
907,537 UART: [kat] LMS
1,475,733 UART: [kat] --
1,476,610 UART: [cold-reset] ++
1,476,980 UART: [fht] Storing FHT @ 0x50003400
1,479,739 UART: [idev] ++
1,479,907 UART: [idev] CDI.KEYID = 6
1,480,267 UART: [idev] SUBJECT.KEYID = 7
1,480,691 UART: [idev] UDS.KEYID = 0
1,481,036 ready_for_fw is high
1,481,036 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,387 UART: [idev] Erasing UDS.KEYID = 0
1,504,775 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,387 UART: [idev] --
1,514,374 UART: [ldev] ++
1,514,542 UART: [ldev] CDI.KEYID = 6
1,514,905 UART: [ldev] SUBJECT.KEYID = 5
1,515,331 UART: [ldev] AUTHORITY.KEYID = 7
1,515,794 UART: [ldev] FE.KEYID = 1
1,521,108 UART: [ldev] Erasing FE.KEYID = 1
1,546,495 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,261 UART: [ldev] --
1,585,540 UART: [fwproc] Waiting for Commands...
1,586,305 UART: [fwproc] Received command 0x46574c44
1,587,096 UART: [fwproc] Received Image of size 114332 bytes
2,885,966 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,926 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,278 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,183 >>> mbox cmd response: success
3,078,183 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,079,251 UART: [afmc] ++
3,079,419 UART: [afmc] CDI.KEYID = 6
3,079,781 UART: [afmc] SUBJECT.KEYID = 7
3,080,206 UART: [afmc] AUTHORITY.KEYID = 5
3,115,345 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,527 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,307 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,035 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,920 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,610 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,613 UART: [afmc] --
3,158,509 UART: [cold-reset] --
3,159,571 UART: [state] Locking Datavault
3,160,652 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,256 UART: [state] Locking ICCM
3,161,828 UART: [exit] Launching FMC @ 0x40000130
3,167,157 UART:
3,167,173 UART: Running Caliptra FMC ...
3,167,581 UART:
3,167,724 UART: [state] CFI Enabled
3,178,565 UART: [fht] FMC Alias Private Key: 7
3,287,370 UART: [art] Extend RT PCRs Done
3,287,798 UART: [art] Lock RT PCRs Done
3,289,126 UART: [art] Populate DV Done
3,297,261 UART: [fht] FMC Alias Private Key: 7
3,298,379 UART: [art] Derive CDI
3,298,659 UART: [art] Store in in slot 0x4
3,384,074 UART: [art] Derive Key Pair
3,384,434 UART: [art] Store priv key in slot 0x5
3,398,274 UART: [art] Derive Key Pair - Done
3,412,907 UART: [art] Signing Cert with AUTHO
3,413,387 UART: RITY.KEYID = 7
3,428,621 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,386 UART: [art] PUB.X = 12DAFEF2FC4F9EDE93412A58C2B521E04E3F5DE1E6997E9A5189F541867B80F2032C9EA437C253BD9C6FD236B53BA1A6
3,436,167 UART: [art] PUB.Y = 5D83DED4B704CA63A49313DAF01BD9EABD74F653D6E3F839270D824D97EAC5155D10E78E5418115BBF5B10BAD99E4D78
3,443,125 UART: [art] SIG.R = 42E44EF2375446FA63AFB70F9A6DEB38299C49AADAE2612165272788BDD98FF6F6FEF20E397FC8166BFD1C10A937FB6E
3,449,905 UART: [art] SIG.S = 86B61E39AD045E05BCE550C44207184439040A4DB374A2A43D874B4044EEB55D8805296010BA9C612BD21B0C69ECF109
3,473,462 UART: Caliptra RT
3,473,807 UART: [state] CFI Enabled
3,582,774 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,174 UART: [rt]cmd =0x54514754, len=24
3,615,257 >>> mbox cmd response data (8 bytes)
3,615,258 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,639 UART: [rt]cmd =0x44504543, len=36
3,682,188 >>> mbox cmd response data (24 bytes)
3,682,189 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,690 UART: [rt]cmd =0x47544744, len=8
3,713,327 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,894 ready_for_fw is high
1,362,894 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,930,339 >>> mbox cmd response: success
2,930,339 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,992,121 UART:
2,992,137 UART: Running Caliptra FMC ...
2,992,545 UART:
2,992,688 UART: [state] CFI Enabled
3,003,231 UART: [fht] FMC Alias Private Key: 7
3,111,716 UART: [art] Extend RT PCRs Done
3,112,144 UART: [art] Lock RT PCRs Done
3,113,484 UART: [art] Populate DV Done
3,121,751 UART: [fht] FMC Alias Private Key: 7
3,122,821 UART: [art] Derive CDI
3,123,101 UART: [art] Store in in slot 0x4
3,208,764 UART: [art] Derive Key Pair
3,209,124 UART: [art] Store priv key in slot 0x5
3,222,034 UART: [art] Derive Key Pair - Done
3,236,760 UART: [art] Signing Cert with AUTHO
3,237,240 UART: RITY.KEYID = 7
3,252,730 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,495 UART: [art] PUB.X = C8D8B24C5625518C8886A2A72F846A66CA77CDF94E1F09AFE9B8A1D56B4D0FB95E6AF9E27E22FBC4157BDFE7E6994BD3
3,260,279 UART: [art] PUB.Y = 0A963515CBB6F99AC222C837BAB8573C670AC0C7FB2D30E08E83711F001B895C27B1B86010A5718F8E46CE3A941A6470
3,267,203 UART: [art] SIG.R = F010765A39DF0418D53CE8337A7D0885C860F07C93BF0AB34F28BD97534647DE8AC84B3D724A6512295102119065BAC3
3,273,957 UART: [art] SIG.S = 0CE2753E924A0714650BB0F4573AF50BD7269129BFFCA7340930400F9D6E81D3C919E2236C44A7538FAF3E07B6030731
3,297,477 UART: Caliptra RT
3,297,822 UART: [state] CFI Enabled
3,405,039 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,599 UART: [rt]cmd =0x54514754, len=24
3,437,960 >>> mbox cmd response data (8 bytes)
3,437,961 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,502 UART: [rt]cmd =0x44504543, len=36
3,505,589 >>> mbox cmd response data (24 bytes)
3,505,590 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,149 UART: [rt]cmd =0x47544744, len=8
3,536,712 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,570 UART: [state] LifecycleState = Unprovisioned
86,225 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
87,934 UART: [kat] SHA2-256
893,584 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,709 UART: [kat] ++
897,861 UART: [kat] sha1
901,993 UART: [kat] SHA2-256
903,933 UART: [kat] SHA2-384
906,792 UART: [kat] SHA2-512-ACC
908,693 UART: [kat] ECC-384
918,726 UART: [kat] HMAC-384Kdf
923,352 UART: [kat] LMS
1,171,680 UART: [kat] --
1,172,297 UART: [cold-reset] ++
1,172,831 UART: [fht] FHT @ 0x50003400
1,175,432 UART: [idev] ++
1,175,600 UART: [idev] CDI.KEYID = 6
1,175,960 UART: [idev] SUBJECT.KEYID = 7
1,176,384 UART: [idev] UDS.KEYID = 0
1,176,729 ready_for_fw is high
1,176,729 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,176 UART: [idev] Erasing UDS.KEYID = 0
1,200,669 UART: [idev] Sha1 KeyId Algorithm
1,209,231 UART: [idev] --
1,210,417 UART: [ldev] ++
1,210,585 UART: [ldev] CDI.KEYID = 6
1,210,948 UART: [ldev] SUBJECT.KEYID = 5
1,211,374 UART: [ldev] AUTHORITY.KEYID = 7
1,211,837 UART: [ldev] FE.KEYID = 1
1,216,717 UART: [ldev] Erasing FE.KEYID = 1
1,243,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,581 UART: [ldev] --
1,282,952 UART: [fwproc] Wait for Commands...
1,283,684 UART: [fwproc] Recv command 0x46574c44
1,284,412 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,184 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,488 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,321 >>> mbox cmd response: success
2,773,321 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,355 UART: [afmc] ++
2,774,523 UART: [afmc] CDI.KEYID = 6
2,774,885 UART: [afmc] SUBJECT.KEYID = 7
2,775,310 UART: [afmc] AUTHORITY.KEYID = 5
2,811,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,498 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,226 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,111 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,830 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,518 UART: [afmc] --
2,854,636 UART: [cold-reset] --
2,855,398 UART: [state] Locking Datavault
2,856,249 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,853 UART: [state] Locking ICCM
2,857,283 UART: [exit] Launching FMC @ 0x40000130
2,862,612 UART:
2,862,628 UART: Running Caliptra FMC ...
2,863,036 UART:
2,863,090 UART: [state] CFI Enabled
2,873,427 UART: [fht] FMC Alias Private Key: 7
2,981,400 UART: [art] Extend RT PCRs Done
2,981,828 UART: [art] Lock RT PCRs Done
2,983,600 UART: [art] Populate DV Done
2,991,849 UART: [fht] FMC Alias Private Key: 7
2,992,839 UART: [art] Derive CDI
2,993,119 UART: [art] Store in in slot 0x4
3,078,630 UART: [art] Derive Key Pair
3,078,990 UART: [art] Store priv key in slot 0x5
3,092,628 UART: [art] Derive Key Pair - Done
3,107,138 UART: [art] Signing Cert with AUTHO
3,107,618 UART: RITY.KEYID = 7
3,122,862 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,627 UART: [art] PUB.X = 186BFBCF2AA88F559D822AF1C0F2A0A40D99BD8758E78D0B0098C0BE6ACED80B300B8E914FC7D3BB407BCBEDDD614E84
3,130,389 UART: [art] PUB.Y = DE30793F6FD50E47D41045A7924FE7CA81100C7270999602C982D3D849D711A8F4EE2747754FB7C3CDFDA1C541835FE9
3,137,332 UART: [art] SIG.R = 401B882805519ECAF02A4736B8CB90ED1D9197453E1FE22CED80C83A7192577AF4341734A6D4530E4C6E92DBD6C85902
3,144,093 UART: [art] SIG.S = D92888C01FDF46FA088CBC8156450FAF8EEACDA1EC8E1B0D3C041BF138A7DE02D328CE4D9C9822DC2DDAB80C505B4985
3,167,992 UART: Caliptra RT
3,168,245 UART: [state] CFI Enabled
3,276,592 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,424 UART: [rt]cmd =0x54514754, len=24
3,309,495 >>> mbox cmd response data (8 bytes)
3,309,496 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,047 UART: [rt]cmd =0x44504543, len=36
3,377,182 >>> mbox cmd response data (24 bytes)
3,377,183 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,554 UART: [rt]cmd =0x47544744, len=8
3,408,033 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,211 ready_for_fw is high
1,060,211 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,058 >>> mbox cmd response: success
2,625,058 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,687,398 UART:
2,687,414 UART: Running Caliptra FMC ...
2,687,822 UART:
2,687,876 UART: [state] CFI Enabled
2,698,213 UART: [fht] FMC Alias Private Key: 7
2,806,664 UART: [art] Extend RT PCRs Done
2,807,092 UART: [art] Lock RT PCRs Done
2,808,650 UART: [art] Populate DV Done
2,816,893 UART: [fht] FMC Alias Private Key: 7
2,818,041 UART: [art] Derive CDI
2,818,321 UART: [art] Store in in slot 0x4
2,903,582 UART: [art] Derive Key Pair
2,903,942 UART: [art] Store priv key in slot 0x5
2,916,906 UART: [art] Derive Key Pair - Done
2,931,609 UART: [art] Signing Cert with AUTHO
2,932,089 UART: RITY.KEYID = 7
2,947,255 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,020 UART: [art] PUB.X = A67C22CD3D25EDE92BB1A7D6220A6E1E1F8310E0236B2887C2B719C2BFCE8829E7781B6F3E5302921C5CD4BCF20E715C
2,954,793 UART: [art] PUB.Y = E70C582C5D93961DDBB27B8468F9700E7E44C44B185CF146DC805448CCACDBF1655C0FF4FCC7ED44CB3BBD8208981990
2,961,745 UART: [art] SIG.R = E25EE9E92077D7AF73484EC49617ABE84278EA4010C8DB739A7C3BD2D277512897400E243B9877CEC1C78F4E49A9A46B
2,968,516 UART: [art] SIG.S = CB45F14097EBF0B192D54217237BC1105EF511ECA6F1AD11EAD2D3123F9A13C2E2315A2F111F3FBD443519D913385C6D
2,992,875 UART: Caliptra RT
2,993,128 UART: [state] CFI Enabled
3,100,724 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,400 UART: [rt]cmd =0x54514754, len=24
3,133,409 >>> mbox cmd response data (8 bytes)
3,133,410 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,617 UART: [rt]cmd =0x44504543, len=36
3,200,942 >>> mbox cmd response data (24 bytes)
3,200,943 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,532 UART: [rt]cmd =0x47544744, len=8
3,231,879 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,037 UART: [state] LifecycleState = Unprovisioned
85,692 UART: [state] DebugLocked = No
86,320 UART: [state] WD Timer not started. Device not locked for debugging
87,495 UART: [kat] SHA2-256
893,145 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,270 UART: [kat] ++
897,422 UART: [kat] sha1
901,530 UART: [kat] SHA2-256
903,470 UART: [kat] SHA2-384
906,121 UART: [kat] SHA2-512-ACC
908,022 UART: [kat] ECC-384
917,971 UART: [kat] HMAC-384Kdf
922,457 UART: [kat] LMS
1,170,785 UART: [kat] --
1,171,742 UART: [cold-reset] ++
1,172,290 UART: [fht] FHT @ 0x50003400
1,174,777 UART: [idev] ++
1,174,945 UART: [idev] CDI.KEYID = 6
1,175,305 UART: [idev] SUBJECT.KEYID = 7
1,175,729 UART: [idev] UDS.KEYID = 0
1,176,074 ready_for_fw is high
1,176,074 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,527 UART: [idev] Erasing UDS.KEYID = 0
1,200,368 UART: [idev] Sha1 KeyId Algorithm
1,209,018 UART: [idev] --
1,210,006 UART: [ldev] ++
1,210,174 UART: [ldev] CDI.KEYID = 6
1,210,537 UART: [ldev] SUBJECT.KEYID = 5
1,210,963 UART: [ldev] AUTHORITY.KEYID = 7
1,211,426 UART: [ldev] FE.KEYID = 1
1,216,586 UART: [ldev] Erasing FE.KEYID = 1
1,242,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,874 UART: [ldev] --
1,282,383 UART: [fwproc] Wait for Commands...
1,283,043 UART: [fwproc] Recv command 0x46574c44
1,283,771 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,751 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,055 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,852 >>> mbox cmd response: success
2,773,852 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,984 UART: [afmc] ++
2,775,152 UART: [afmc] CDI.KEYID = 6
2,775,514 UART: [afmc] SUBJECT.KEYID = 7
2,775,939 UART: [afmc] AUTHORITY.KEYID = 5
2,811,820 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,071 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,819 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,547 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,432 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,151 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,035 UART: [afmc] --
2,855,023 UART: [cold-reset] --
2,856,021 UART: [state] Locking Datavault
2,857,164 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,768 UART: [state] Locking ICCM
2,858,400 UART: [exit] Launching FMC @ 0x40000130
2,863,729 UART:
2,863,745 UART: Running Caliptra FMC ...
2,864,153 UART:
2,864,296 UART: [state] CFI Enabled
2,874,961 UART: [fht] FMC Alias Private Key: 7
2,982,854 UART: [art] Extend RT PCRs Done
2,983,282 UART: [art] Lock RT PCRs Done
2,984,764 UART: [art] Populate DV Done
2,993,291 UART: [fht] FMC Alias Private Key: 7
2,994,329 UART: [art] Derive CDI
2,994,609 UART: [art] Store in in slot 0x4
3,080,068 UART: [art] Derive Key Pair
3,080,428 UART: [art] Store priv key in slot 0x5
3,094,022 UART: [art] Derive Key Pair - Done
3,108,633 UART: [art] Signing Cert with AUTHO
3,109,113 UART: RITY.KEYID = 7
3,124,057 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,822 UART: [art] PUB.X = 05944B20BC18F22DC6EE743B929A79B011950FD4B1871710A280CC82D15D5B0AECAE6C159A7B6B798D76AA064F37B744
3,131,586 UART: [art] PUB.Y = FE4894C5D224AEF71E8381873535CC8DF79ED6ECD2E0AB220C02D1C61A15BE89415D37E35F224403E2E0864B160F9C0B
3,138,529 UART: [art] SIG.R = DA9CF9D2BA3E466175616C0DC9901A463A24BFC7FDADD8BE4BE3FA29D542CB2C6C9EA8A19D6D5198111D4464CF93BC28
3,145,318 UART: [art] SIG.S = A8AFCFB304721E028BB7E5B66ACB664B9433C534B1BE1717A7F655D48A788EF939BD4B47D2DFBFDFB525EBB2F10B43B3
3,169,436 UART: Caliptra RT
3,169,781 UART: [state] CFI Enabled
3,276,601 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,421 UART: [rt]cmd =0x54514754, len=24
3,309,614 >>> mbox cmd response data (8 bytes)
3,309,615 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,410 UART: [rt]cmd =0x44504543, len=36
3,376,543 >>> mbox cmd response data (24 bytes)
3,376,544 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,827 UART: [rt]cmd =0x47544744, len=8
3,407,192 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,872 ready_for_fw is high
1,060,872 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,501 >>> mbox cmd response: success
2,627,501 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,689,523 UART:
2,689,539 UART: Running Caliptra FMC ...
2,689,947 UART:
2,690,090 UART: [state] CFI Enabled
2,700,823 UART: [fht] FMC Alias Private Key: 7
2,809,578 UART: [art] Extend RT PCRs Done
2,810,006 UART: [art] Lock RT PCRs Done
2,811,768 UART: [art] Populate DV Done
2,820,143 UART: [fht] FMC Alias Private Key: 7
2,821,077 UART: [art] Derive CDI
2,821,357 UART: [art] Store in in slot 0x4
2,907,044 UART: [art] Derive Key Pair
2,907,404 UART: [art] Store priv key in slot 0x5
2,920,570 UART: [art] Derive Key Pair - Done
2,935,457 UART: [art] Signing Cert with AUTHO
2,935,937 UART: RITY.KEYID = 7
2,951,333 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,098 UART: [art] PUB.X = A9B99FF999A3460D74C752F1B79EA9F3E147A1419900A68856AE0F582F84FF021A85D0C92BF36D2D245ECF0336374DB7
2,958,838 UART: [art] PUB.Y = 7116AFE8BF88A0D096A9C995DFF993E0EB92FEFB6DFA35440F0D6364DDAA3D0247939A1C758A4DB9642D3A3A08232A18
2,965,790 UART: [art] SIG.R = 49BE1D6FC1C89FEB4685E79B14042CA6F5CA2588093D0838F93637A08954282D89ED9E1F2F611121AADEEC39B9439483
2,972,553 UART: [art] SIG.S = C2E48E936A8A0DFA42245B961E998F396A572DC1400FE7D7022D99FB715E0011D7E5E39046E42F654FA7EC0A777F697A
2,996,430 UART: Caliptra RT
2,996,775 UART: [state] CFI Enabled
3,104,078 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,770 UART: [rt]cmd =0x54514754, len=24
3,136,771 >>> mbox cmd response data (8 bytes)
3,136,772 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,475 UART: [rt]cmd =0x44504543, len=36
3,203,392 >>> mbox cmd response data (24 bytes)
3,203,393 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,922 UART: [rt]cmd =0x47544744, len=8
3,234,761 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
891,188 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,317 UART: [kat] ++
895,469 UART: [kat] sha1
899,635 UART: [kat] SHA2-256
901,575 UART: [kat] SHA2-384
904,236 UART: [kat] SHA2-512-ACC
906,137 UART: [kat] ECC-384
915,546 UART: [kat] HMAC-384Kdf
920,014 UART: [kat] LMS
1,168,326 UART: [kat] --
1,169,433 UART: [cold-reset] ++
1,169,883 UART: [fht] FHT @ 0x50003400
1,172,571 UART: [idev] ++
1,172,739 UART: [idev] CDI.KEYID = 6
1,173,100 UART: [idev] SUBJECT.KEYID = 7
1,173,525 UART: [idev] UDS.KEYID = 0
1,173,871 ready_for_fw is high
1,173,871 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,577 UART: [idev] Erasing UDS.KEYID = 0
1,198,423 UART: [idev] Sha1 KeyId Algorithm
1,207,273 UART: [idev] --
1,208,228 UART: [ldev] ++
1,208,396 UART: [ldev] CDI.KEYID = 6
1,208,760 UART: [ldev] SUBJECT.KEYID = 5
1,209,187 UART: [ldev] AUTHORITY.KEYID = 7
1,209,650 UART: [ldev] FE.KEYID = 1
1,214,840 UART: [ldev] Erasing FE.KEYID = 1
1,241,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,136 UART: [ldev] --
1,280,588 UART: [fwproc] Wait for Commands...
1,281,227 UART: [fwproc] Recv command 0x46574c44
1,281,960 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,776 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,085 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,807 >>> mbox cmd response: success
2,771,807 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,773,002 UART: [afmc] ++
2,773,170 UART: [afmc] CDI.KEYID = 6
2,773,533 UART: [afmc] SUBJECT.KEYID = 7
2,773,959 UART: [afmc] AUTHORITY.KEYID = 5
2,809,952 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,175 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,904 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,787 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,506 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,371 UART: [afmc] --
2,853,307 UART: [cold-reset] --
2,854,349 UART: [state] Locking Datavault
2,855,398 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,002 UART: [state] Locking ICCM
2,856,622 UART: [exit] Launching FMC @ 0x40000130
2,861,951 UART:
2,861,967 UART: Running Caliptra FMC ...
2,862,375 UART:
2,862,429 UART: [state] CFI Enabled
2,872,972 UART: [fht] FMC Alias Private Key: 7
2,981,477 UART: [art] Extend RT PCRs Done
2,981,905 UART: [art] Lock RT PCRs Done
2,983,371 UART: [art] Populate DV Done
2,991,604 UART: [fht] FMC Alias Private Key: 7
2,992,678 UART: [art] Derive CDI
2,992,958 UART: [art] Store in in slot 0x4
3,078,993 UART: [art] Derive Key Pair
3,079,353 UART: [art] Store priv key in slot 0x5
3,092,005 UART: [art] Derive Key Pair - Done
3,106,840 UART: [art] Signing Cert with AUTHO
3,107,320 UART: RITY.KEYID = 7
3,122,394 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,159 UART: [art] PUB.X = F0A4DF7571DDE882AE993235FAE50FA0A3C73AD84C18130931B8CC90CD73F3D5AF608747F38D68B8DA9A1BAC1F37B0B7
3,129,941 UART: [art] PUB.Y = ECB663D35AA2C746A327B044C6BE29BA098EC8627DB8CD6C6911B9B9043581BE2E7948B9192930C03F583B4C0693A244
3,136,884 UART: [art] SIG.R = B9F7C0699C4694F106D445483F7625E43791D13BA826316D91B1ADE651BA2D969D8FDABEAA4EDB4A368424CA4F1817DA
3,143,661 UART: [art] SIG.S = 0981EE8DA82DCA3CB97A0A60CAA4E62CDFE2EFC71082CDB482CD7610DE0482DCABC5C38720E2A93C3204BE186FDD42CA
3,167,934 UART: Caliptra RT
3,168,187 UART: [state] CFI Enabled
3,275,826 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,474 UART: [rt]cmd =0x54514754, len=24
3,308,793 >>> mbox cmd response data (8 bytes)
3,308,794 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,133 UART: [rt]cmd =0x44504543, len=36
3,376,310 >>> mbox cmd response data (24 bytes)
3,376,311 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,876 UART: [rt]cmd =0x47544744, len=8
3,407,567 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,826 ready_for_fw is high
1,055,826 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,273 >>> mbox cmd response: success
2,621,273 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,683,595 UART:
2,683,611 UART: Running Caliptra FMC ...
2,684,019 UART:
2,684,073 UART: [state] CFI Enabled
2,694,724 UART: [fht] FMC Alias Private Key: 7
2,803,253 UART: [art] Extend RT PCRs Done
2,803,681 UART: [art] Lock RT PCRs Done
2,805,227 UART: [art] Populate DV Done
2,813,540 UART: [fht] FMC Alias Private Key: 7
2,814,488 UART: [art] Derive CDI
2,814,768 UART: [art] Store in in slot 0x4
2,900,493 UART: [art] Derive Key Pair
2,900,853 UART: [art] Store priv key in slot 0x5
2,914,337 UART: [art] Derive Key Pair - Done
2,929,045 UART: [art] Signing Cert with AUTHO
2,929,525 UART: RITY.KEYID = 7
2,944,615 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,380 UART: [art] PUB.X = EEE2BAC4A0750315965459CC60537DFED7164E4FDFBBBA95F164FAFC54853D2498D151FBBBD56F319DBCD86C3525109B
2,952,165 UART: [art] PUB.Y = F14B7168D8C4C06EB17EE1165CDA254BA8E9AE3994A0702BD49A05A12318DFDC83430AE9D0CEB59B7141D168A27F6C3B
2,959,123 UART: [art] SIG.R = F59E393F5D0766DA60AC5C245CA0DF2F4AF7C37EB164C6FA8CAE5D49DF46BD1B00D4965A026271766C685C352020DF36
2,965,877 UART: [art] SIG.S = 835C1374CCD9377827684A935713DDA1565E7C66DA084DC038C4339F7CA4F2F9A0FED7EE85E1C16509B932FF353C87FA
2,989,348 UART: Caliptra RT
2,989,601 UART: [state] CFI Enabled
3,097,735 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,223 UART: [rt]cmd =0x54514754, len=24
3,130,278 >>> mbox cmd response data (8 bytes)
3,130,279 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,702 UART: [rt]cmd =0x44504543, len=36
3,197,357 >>> mbox cmd response data (24 bytes)
3,197,358 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,805 UART: [rt]cmd =0x47544744, len=8
3,228,312 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,356 UART: [state] WD Timer not started. Device not locked for debugging
87,589 UART: [kat] SHA2-256
891,139 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,268 UART: [kat] ++
895,420 UART: [kat] sha1
899,504 UART: [kat] SHA2-256
901,444 UART: [kat] SHA2-384
904,319 UART: [kat] SHA2-512-ACC
906,220 UART: [kat] ECC-384
915,925 UART: [kat] HMAC-384Kdf
920,509 UART: [kat] LMS
1,168,821 UART: [kat] --
1,169,482 UART: [cold-reset] ++
1,169,852 UART: [fht] FHT @ 0x50003400
1,172,424 UART: [idev] ++
1,172,592 UART: [idev] CDI.KEYID = 6
1,172,953 UART: [idev] SUBJECT.KEYID = 7
1,173,378 UART: [idev] UDS.KEYID = 0
1,173,724 ready_for_fw is high
1,173,724 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,632 UART: [idev] Erasing UDS.KEYID = 0
1,199,100 UART: [idev] Sha1 KeyId Algorithm
1,207,814 UART: [idev] --
1,208,959 UART: [ldev] ++
1,209,127 UART: [ldev] CDI.KEYID = 6
1,209,491 UART: [ldev] SUBJECT.KEYID = 5
1,209,918 UART: [ldev] AUTHORITY.KEYID = 7
1,210,381 UART: [ldev] FE.KEYID = 1
1,215,619 UART: [ldev] Erasing FE.KEYID = 1
1,241,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,103 UART: [ldev] --
1,280,511 UART: [fwproc] Wait for Commands...
1,281,164 UART: [fwproc] Recv command 0x46574c44
1,281,897 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,389 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,698 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,446 >>> mbox cmd response: success
2,771,446 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,772,683 UART: [afmc] ++
2,772,851 UART: [afmc] CDI.KEYID = 6
2,773,214 UART: [afmc] SUBJECT.KEYID = 7
2,773,640 UART: [afmc] AUTHORITY.KEYID = 5
2,809,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,787 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,538 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,267 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,150 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,869 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,818 UART: [afmc] --
2,852,912 UART: [cold-reset] --
2,853,886 UART: [state] Locking Datavault
2,855,333 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,937 UART: [state] Locking ICCM
2,856,359 UART: [exit] Launching FMC @ 0x40000130
2,861,688 UART:
2,861,704 UART: Running Caliptra FMC ...
2,862,112 UART:
2,862,255 UART: [state] CFI Enabled
2,873,316 UART: [fht] FMC Alias Private Key: 7
2,980,847 UART: [art] Extend RT PCRs Done
2,981,275 UART: [art] Lock RT PCRs Done
2,982,895 UART: [art] Populate DV Done
2,991,054 UART: [fht] FMC Alias Private Key: 7
2,992,218 UART: [art] Derive CDI
2,992,498 UART: [art] Store in in slot 0x4
3,077,817 UART: [art] Derive Key Pair
3,078,177 UART: [art] Store priv key in slot 0x5
3,091,243 UART: [art] Derive Key Pair - Done
3,106,114 UART: [art] Signing Cert with AUTHO
3,106,594 UART: RITY.KEYID = 7
3,122,074 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,839 UART: [art] PUB.X = 2C9EF4466E0D7519DD3F5B77419C6438C3B87E6716AAD97D58D030ADC998CE9542585FF9F81F157DFD0CDD045486B0BE
3,129,610 UART: [art] PUB.Y = 207FB5F98D6872729884FF4C15C36E075743C161735F75559A75E3AB7E37CD2F4AB9A3DFF558D5A19E9DEC0FD1109885
3,136,558 UART: [art] SIG.R = 8DDF23A76B38B2E2091AF05D5FD17C4F6ED2955ABFC49182BCDAF6379E75769D0096931866AA32C1DD7007C00488DDA0
3,143,307 UART: [art] SIG.S = 8C08FE3C5B4ED9E2EDB542DDBDC65F4F1E6939C442548B791C1915F81C9C96428F9D270BDC7080E11C47D313230A9712
3,166,999 UART: Caliptra RT
3,167,344 UART: [state] CFI Enabled
3,275,256 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,656 UART: [rt]cmd =0x54514754, len=24
3,307,717 >>> mbox cmd response data (8 bytes)
3,307,718 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,165 UART: [rt]cmd =0x44504543, len=36
3,374,596 >>> mbox cmd response data (24 bytes)
3,374,597 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,054 UART: [rt]cmd =0x47544744, len=8
3,405,521 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,041 ready_for_fw is high
1,056,041 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,852 >>> mbox cmd response: success
2,623,852 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,922 UART:
2,685,938 UART: Running Caliptra FMC ...
2,686,346 UART:
2,686,489 UART: [state] CFI Enabled
2,696,998 UART: [fht] FMC Alias Private Key: 7
2,805,177 UART: [art] Extend RT PCRs Done
2,805,605 UART: [art] Lock RT PCRs Done
2,807,159 UART: [art] Populate DV Done
2,815,684 UART: [fht] FMC Alias Private Key: 7
2,816,806 UART: [art] Derive CDI
2,817,086 UART: [art] Store in in slot 0x4
2,902,585 UART: [art] Derive Key Pair
2,902,945 UART: [art] Store priv key in slot 0x5
2,916,473 UART: [art] Derive Key Pair - Done
2,931,288 UART: [art] Signing Cert with AUTHO
2,931,768 UART: RITY.KEYID = 7
2,946,864 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,629 UART: [art] PUB.X = AA58C72343EDF12AEC7EA45C44B248C542F95EDE58D70A08A3B39004964D43B3C69B7AB5D0CBD6C41CC8A3522AF52CBB
2,954,410 UART: [art] PUB.Y = 462C9BC2B1EFFEFA53CEBC0958B257F8584C51FE46BC73C7FA504A503AAB6ACF0397011D94400093BFDA79C062F4163C
2,961,345 UART: [art] SIG.R = 7982802BA37E8F9E1AF1BA16A8AF7EC6674F3DCFC9114B3503F4B4F033A18A28D9B67C5D0BB6B1D9BC8B7ADEC3DDEAEB
2,968,139 UART: [art] SIG.S = 7F216FABCEBA601AFA67A52CAC61886BC1BF606E8A6128CB41D2B26E03861605EEB3F2809B9209AAD9F80CC08F5E9ABF
2,992,468 UART: Caliptra RT
2,992,813 UART: [state] CFI Enabled
3,100,178 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,906 UART: [rt]cmd =0x54514754, len=24
3,133,047 >>> mbox cmd response data (8 bytes)
3,133,048 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,465 UART: [rt]cmd =0x44504543, len=36
3,200,386 >>> mbox cmd response data (24 bytes)
3,200,387 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,658 UART: [rt]cmd =0x47544744, len=8
3,231,419 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,517 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,061 UART: [kat] SHA2-256
881,992 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,107 UART: [kat] ++
886,259 UART: [kat] sha1
890,387 UART: [kat] SHA2-256
892,325 UART: [kat] SHA2-384
895,102 UART: [kat] SHA2-512-ACC
897,003 UART: [kat] ECC-384
902,736 UART: [kat] HMAC-384Kdf
907,284 UART: [kat] LMS
1,475,480 UART: [kat] --
1,476,219 UART: [cold-reset] ++
1,476,657 UART: [fht] Storing FHT @ 0x50003400
1,479,520 UART: [idev] ++
1,479,688 UART: [idev] CDI.KEYID = 6
1,480,048 UART: [idev] SUBJECT.KEYID = 7
1,480,472 UART: [idev] UDS.KEYID = 0
1,480,817 ready_for_fw is high
1,480,817 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,670 UART: [idev] Erasing UDS.KEYID = 0
1,505,132 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,820 UART: [idev] --
1,514,801 UART: [ldev] ++
1,514,969 UART: [ldev] CDI.KEYID = 6
1,515,332 UART: [ldev] SUBJECT.KEYID = 5
1,515,758 UART: [ldev] AUTHORITY.KEYID = 7
1,516,221 UART: [ldev] FE.KEYID = 1
1,521,251 UART: [ldev] Erasing FE.KEYID = 1
1,546,380 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,372 UART: [ldev] --
1,585,843 UART: [fwproc] Waiting for Commands...
1,586,708 UART: [fwproc] Received command 0x46574c44
1,587,499 UART: [fwproc] Received Image of size 114332 bytes
2,884,589 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,839 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,191 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,970 >>> mbox cmd response: success
3,076,970 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,077,978 UART: [afmc] ++
3,078,146 UART: [afmc] CDI.KEYID = 6
3,078,508 UART: [afmc] SUBJECT.KEYID = 7
3,078,933 UART: [afmc] AUTHORITY.KEYID = 5
3,114,012 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,504 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,284 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,012 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,897 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,587 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,624 UART: [afmc] --
3,157,612 UART: [cold-reset] --
3,158,390 UART: [state] Locking Datavault
3,159,637 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,241 UART: [state] Locking ICCM
3,160,837 UART: [exit] Launching FMC @ 0x40000130
3,166,166 UART:
3,166,182 UART: Running Caliptra FMC ...
3,166,590 UART:
3,166,644 UART: [state] CFI Enabled
3,177,289 UART: [fht] FMC Alias Private Key: 7
3,284,350 UART: [art] Extend RT PCRs Done
3,284,778 UART: [art] Lock RT PCRs Done
3,286,188 UART: [art] Populate DV Done
3,294,321 UART: [fht] FMC Alias Private Key: 7
3,295,487 UART: [art] Derive CDI
3,295,767 UART: [art] Store in in slot 0x4
3,381,776 UART: [art] Derive Key Pair
3,382,136 UART: [art] Store priv key in slot 0x5
3,395,530 UART: [art] Derive Key Pair - Done
3,409,930 UART: [art] Signing Cert with AUTHO
3,410,410 UART: RITY.KEYID = 7
3,425,698 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,463 UART: [art] PUB.X = F8801EDC394F618C11E0CD7446864B9A11ED5A1D289AD9282C4CEC21BBBE3E328D7108F39371E89037B031E99C3960BE
3,433,236 UART: [art] PUB.Y = 7DCF79D8BC38C544DB635B360E3B6861C6C12409ECE4771A9343ACF2DD2959837511547A569258384334F5CA058DE41A
3,440,175 UART: [art] SIG.R = 2D417E00D9354DD62D4725A9FEE40D9C0D68E37B44663E2740307B5DB59C605BD6F36B77D30DC240809C1CC0A1582AB1
3,446,918 UART: [art] SIG.S = FABE38F60FFF1B559740858A71C8A40CFE61FB001C2D8A368133E7734D5C90595A7ADBF775AC242F94A3E7F982B6DDA8
3,470,535 UART: Caliptra RT
3,470,788 UART: [state] CFI Enabled
3,579,175 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,781 UART: [rt]cmd =0x54514754, len=24
3,611,581 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,765 ready_for_fw is high
1,362,765 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,088 >>> mbox cmd response: success
2,928,088 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,989,648 UART:
2,989,664 UART: Running Caliptra FMC ...
2,990,072 UART:
2,990,126 UART: [state] CFI Enabled
3,000,629 UART: [fht] FMC Alias Private Key: 7
3,108,746 UART: [art] Extend RT PCRs Done
3,109,174 UART: [art] Lock RT PCRs Done
3,111,252 UART: [art] Populate DV Done
3,119,791 UART: [fht] FMC Alias Private Key: 7
3,120,803 UART: [art] Derive CDI
3,121,083 UART: [art] Store in in slot 0x4
3,206,642 UART: [art] Derive Key Pair
3,207,002 UART: [art] Store priv key in slot 0x5
3,220,536 UART: [art] Derive Key Pair - Done
3,235,502 UART: [art] Signing Cert with AUTHO
3,235,982 UART: RITY.KEYID = 7
3,250,804 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,569 UART: [art] PUB.X = 7279B779C25B458873E71645AECA79D60BA54F93B8F1AC0B5BFC15BB1684E4C4254CA1891BDC93BFD510AB74C6E9034A
3,258,342 UART: [art] PUB.Y = C7261EEDBD1FA940C05B127EDD93BA1452E85078577D1F46C4064416811A0437160F3A4917AEBB37FB6BB1E699E65741
3,265,285 UART: [art] SIG.R = 95C6B72620CEF1895745FF826993EE9EEB18F3C1691E48880A11491332FD544539E8EC64B3C238BD43F75469D756E629
3,272,046 UART: [art] SIG.S = DA46DD0A51ACC1EF26853D95122264A2189284A95EDAB8111D3BFC04CCAAAB44204728B14EBBD726238DB37315E0F44F
3,296,265 UART: Caliptra RT
3,296,518 UART: [state] CFI Enabled
3,404,194 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,944 UART: [rt]cmd =0x54514754, len=24
3,436,720 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,802 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,468 UART: [kat] SHA2-256
882,399 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,514 UART: [kat] ++
886,666 UART: [kat] sha1
890,954 UART: [kat] SHA2-256
892,892 UART: [kat] SHA2-384
895,507 UART: [kat] SHA2-512-ACC
897,408 UART: [kat] ECC-384
902,913 UART: [kat] HMAC-384Kdf
907,645 UART: [kat] LMS
1,475,841 UART: [kat] --
1,476,834 UART: [cold-reset] ++
1,477,296 UART: [fht] Storing FHT @ 0x50003400
1,480,283 UART: [idev] ++
1,480,451 UART: [idev] CDI.KEYID = 6
1,480,811 UART: [idev] SUBJECT.KEYID = 7
1,481,235 UART: [idev] UDS.KEYID = 0
1,481,580 ready_for_fw is high
1,481,580 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,281 UART: [idev] Erasing UDS.KEYID = 0
1,505,905 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,671 UART: [idev] --
1,515,678 UART: [ldev] ++
1,515,846 UART: [ldev] CDI.KEYID = 6
1,516,209 UART: [ldev] SUBJECT.KEYID = 5
1,516,635 UART: [ldev] AUTHORITY.KEYID = 7
1,517,098 UART: [ldev] FE.KEYID = 1
1,522,388 UART: [ldev] Erasing FE.KEYID = 1
1,547,503 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,195 UART: [ldev] --
1,586,692 UART: [fwproc] Waiting for Commands...
1,587,471 UART: [fwproc] Received command 0x46574c44
1,588,262 UART: [fwproc] Received Image of size 114332 bytes
2,885,916 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,656 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,008 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,855 >>> mbox cmd response: success
3,078,855 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,079,893 UART: [afmc] ++
3,080,061 UART: [afmc] CDI.KEYID = 6
3,080,423 UART: [afmc] SUBJECT.KEYID = 7
3,080,848 UART: [afmc] AUTHORITY.KEYID = 5
3,116,251 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,907 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,687 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,415 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,300 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,990 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,975 UART: [afmc] --
3,160,041 UART: [cold-reset] --
3,161,031 UART: [state] Locking Datavault
3,162,068 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,672 UART: [state] Locking ICCM
3,163,298 UART: [exit] Launching FMC @ 0x40000130
3,168,627 UART:
3,168,643 UART: Running Caliptra FMC ...
3,169,051 UART:
3,169,194 UART: [state] CFI Enabled
3,179,723 UART: [fht] FMC Alias Private Key: 7
3,287,344 UART: [art] Extend RT PCRs Done
3,287,772 UART: [art] Lock RT PCRs Done
3,289,400 UART: [art] Populate DV Done
3,297,789 UART: [fht] FMC Alias Private Key: 7
3,298,749 UART: [art] Derive CDI
3,299,029 UART: [art] Store in in slot 0x4
3,384,816 UART: [art] Derive Key Pair
3,385,176 UART: [art] Store priv key in slot 0x5
3,398,612 UART: [art] Derive Key Pair - Done
3,413,538 UART: [art] Signing Cert with AUTHO
3,414,018 UART: RITY.KEYID = 7
3,429,212 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,977 UART: [art] PUB.X = FF8ABD310C25A1A46C6DBF54C6AC8B30A5F1B3F69789E911D7C35519F19BAE65D1915DC1AF0CA57FBF24843641D23071
3,436,755 UART: [art] PUB.Y = 4A634D556687C7218DFE70BF6EA3F2504C4B56C11EF1A0FF55F4D25FCECE9B1F4FF51EE91DE0A426336E8BB545E6ECCB
3,443,729 UART: [art] SIG.R = 1E92A9075D745AD53D2CBB014B28C2EAEBF71BC743BCB47E30D3C2D969E533EB0E4EB6BE9B3AFE3AA5B87A173966F1A4
3,450,514 UART: [art] SIG.S = 0DEC96FCA7987E6C45C67CA83FCC090FEE540732E40386407C2F312B20371F8AF2FF230B0ACA613BE7D4D8942F8407EA
3,473,951 UART: Caliptra RT
3,474,296 UART: [state] CFI Enabled
3,581,680 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,252 UART: [rt]cmd =0x54514754, len=24
3,614,048 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,406 ready_for_fw is high
1,362,406 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,509 >>> mbox cmd response: success
2,928,509 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,990,239 UART:
2,990,255 UART: Running Caliptra FMC ...
2,990,663 UART:
2,990,806 UART: [state] CFI Enabled
3,001,433 UART: [fht] FMC Alias Private Key: 7
3,108,332 UART: [art] Extend RT PCRs Done
3,108,760 UART: [art] Lock RT PCRs Done
3,110,184 UART: [art] Populate DV Done
3,118,277 UART: [fht] FMC Alias Private Key: 7
3,119,353 UART: [art] Derive CDI
3,119,633 UART: [art] Store in in slot 0x4
3,205,466 UART: [art] Derive Key Pair
3,205,826 UART: [art] Store priv key in slot 0x5
3,219,020 UART: [art] Derive Key Pair - Done
3,233,861 UART: [art] Signing Cert with AUTHO
3,234,341 UART: RITY.KEYID = 7
3,249,497 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,262 UART: [art] PUB.X = 8C04C359E9CD7261B2BA98776D66CEB363DDA0D7C60F8A4AFF6A5264353423C643E06C5C5469EA0C9433698D00BECF06
3,257,006 UART: [art] PUB.Y = 69BDDBBD8B2FB3F5178139D445BCF033562EE59DC047B8A70EEB3A807099279902CC184CD6912F981EAED4E96F7662EB
3,263,962 UART: [art] SIG.R = 1B21675350806FD78B67DF5CFF18E87DAD6ACA053D0501BA71A3ED8EA05918C29F31F224E0739ACF452E455E4D9C3913
3,270,731 UART: [art] SIG.S = 47B30A6E84FE3029005702378D05B58317C5D4F81224CB2091EB898EA07251DD7DAE4AF30C867A6B9A8CABB3E789B516
3,293,964 UART: Caliptra RT
3,294,309 UART: [state] CFI Enabled
3,403,349 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,039 UART: [rt]cmd =0x54514754, len=24
3,436,215 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
893,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,445 UART: [kat] ++
897,597 UART: [kat] sha1
901,841 UART: [kat] SHA2-256
903,781 UART: [kat] SHA2-384
906,428 UART: [kat] SHA2-512-ACC
908,329 UART: [kat] ECC-384
918,068 UART: [kat] HMAC-384Kdf
922,680 UART: [kat] LMS
1,171,008 UART: [kat] --
1,171,827 UART: [cold-reset] ++
1,172,257 UART: [fht] FHT @ 0x50003400
1,175,004 UART: [idev] ++
1,175,172 UART: [idev] CDI.KEYID = 6
1,175,532 UART: [idev] SUBJECT.KEYID = 7
1,175,956 UART: [idev] UDS.KEYID = 0
1,176,301 ready_for_fw is high
1,176,301 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,364 UART: [idev] Erasing UDS.KEYID = 0
1,201,397 UART: [idev] Sha1 KeyId Algorithm
1,209,855 UART: [idev] --
1,210,825 UART: [ldev] ++
1,210,993 UART: [ldev] CDI.KEYID = 6
1,211,356 UART: [ldev] SUBJECT.KEYID = 5
1,211,782 UART: [ldev] AUTHORITY.KEYID = 7
1,212,245 UART: [ldev] FE.KEYID = 1
1,217,445 UART: [ldev] Erasing FE.KEYID = 1
1,243,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,251 UART: [ldev] --
1,282,588 UART: [fwproc] Wait for Commands...
1,283,320 UART: [fwproc] Recv command 0x46574c44
1,284,048 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,146 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,450 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,285 >>> mbox cmd response: success
2,774,285 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,775,545 UART: [afmc] ++
2,775,713 UART: [afmc] CDI.KEYID = 6
2,776,075 UART: [afmc] SUBJECT.KEYID = 7
2,776,500 UART: [afmc] AUTHORITY.KEYID = 5
2,812,347 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,600 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,348 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,076 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,961 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,680 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,694 UART: [afmc] --
2,855,762 UART: [cold-reset] --
2,856,556 UART: [state] Locking Datavault
2,857,739 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,343 UART: [state] Locking ICCM
2,858,813 UART: [exit] Launching FMC @ 0x40000130
2,864,142 UART:
2,864,158 UART: Running Caliptra FMC ...
2,864,566 UART:
2,864,620 UART: [state] CFI Enabled
2,875,363 UART: [fht] FMC Alias Private Key: 7
2,983,180 UART: [art] Extend RT PCRs Done
2,983,608 UART: [art] Lock RT PCRs Done
2,985,058 UART: [art] Populate DV Done
2,993,373 UART: [fht] FMC Alias Private Key: 7
2,994,417 UART: [art] Derive CDI
2,994,697 UART: [art] Store in in slot 0x4
3,080,354 UART: [art] Derive Key Pair
3,080,714 UART: [art] Store priv key in slot 0x5
3,093,466 UART: [art] Derive Key Pair - Done
3,107,990 UART: [art] Signing Cert with AUTHO
3,108,470 UART: RITY.KEYID = 7
3,123,662 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,427 UART: [art] PUB.X = 449D6C3EC1C7F32AB45F6335CE05BA58CEF52E2F1E9B52DE1A1166A89E8C18E4C5237919BBCF4398E2762C81B51861C6
3,131,204 UART: [art] PUB.Y = D9E1EF8959C635E95EDCA6AD17194D0009F8D02B1EA08CACA8068456442E1072D763E1CD5C86FAB0CFB9F850E4FE54BD
3,138,144 UART: [art] SIG.R = 639B49B2B933DC4AC85DB87C1B28ADCD8D2820F04F56C1AE10FA65812F9EB370EC49A849747FB0C24F3D1666D2FB805E
3,144,928 UART: [art] SIG.S = 4008C7D92699547CF0377353653B41830ABF5EC745E94DA95BD53F9AA5C847FC50CB34FA0C6A003DB1241A2C54F9BFB8
3,168,724 UART: Caliptra RT
3,168,977 UART: [state] CFI Enabled
3,276,134 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,902 UART: [rt]cmd =0x54514754, len=24
3,309,084 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,405 ready_for_fw is high
1,060,405 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,904 >>> mbox cmd response: success
2,626,904 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,690,124 UART:
2,690,140 UART: Running Caliptra FMC ...
2,690,548 UART:
2,690,602 UART: [state] CFI Enabled
2,701,141 UART: [fht] FMC Alias Private Key: 7
2,809,210 UART: [art] Extend RT PCRs Done
2,809,638 UART: [art] Lock RT PCRs Done
2,811,138 UART: [art] Populate DV Done
2,819,529 UART: [fht] FMC Alias Private Key: 7
2,820,681 UART: [art] Derive CDI
2,820,961 UART: [art] Store in in slot 0x4
2,906,500 UART: [art] Derive Key Pair
2,906,860 UART: [art] Store priv key in slot 0x5
2,919,718 UART: [art] Derive Key Pair - Done
2,934,467 UART: [art] Signing Cert with AUTHO
2,934,947 UART: RITY.KEYID = 7
2,950,061 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,826 UART: [art] PUB.X = 966B9B4841731F99C12D04A5DD5DCFFA95423166517B8AF32DC17A447B5F3B7E1DED22788896B91A7B0B24D2F1142FBE
2,957,598 UART: [art] PUB.Y = C46B5E154DD6A919C96C71E6E658E07F9B7A72A2E5648A1747EB980B2D9ABE47D7607713A33679F884A4325040B5D86A
2,964,545 UART: [art] SIG.R = 23749DFE89610FB52FBDD237108601840CE378C505E2A8FFBFEEA2C864E4BE30D4F3A1929D820EEA6B54890BE7E7F710
2,971,309 UART: [art] SIG.S = 2402AAFC339220D317BE22412BCB579D353640AB4FFD395BCB933E1E61FC5D7D19B21314D56E48014CFE9FF8729959C3
2,994,698 UART: Caliptra RT
2,994,951 UART: [state] CFI Enabled
3,102,790 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,496 UART: [rt]cmd =0x54514754, len=24
3,135,594 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
893,487 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,612 UART: [kat] ++
897,764 UART: [kat] sha1
901,940 UART: [kat] SHA2-256
903,880 UART: [kat] SHA2-384
906,625 UART: [kat] SHA2-512-ACC
908,526 UART: [kat] ECC-384
918,287 UART: [kat] HMAC-384Kdf
922,877 UART: [kat] LMS
1,171,205 UART: [kat] --
1,172,130 UART: [cold-reset] ++
1,172,696 UART: [fht] FHT @ 0x50003400
1,175,509 UART: [idev] ++
1,175,677 UART: [idev] CDI.KEYID = 6
1,176,037 UART: [idev] SUBJECT.KEYID = 7
1,176,461 UART: [idev] UDS.KEYID = 0
1,176,806 ready_for_fw is high
1,176,806 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,861 UART: [idev] Erasing UDS.KEYID = 0
1,201,554 UART: [idev] Sha1 KeyId Algorithm
1,210,056 UART: [idev] --
1,211,262 UART: [ldev] ++
1,211,430 UART: [ldev] CDI.KEYID = 6
1,211,793 UART: [ldev] SUBJECT.KEYID = 5
1,212,219 UART: [ldev] AUTHORITY.KEYID = 7
1,212,682 UART: [ldev] FE.KEYID = 1
1,217,968 UART: [ldev] Erasing FE.KEYID = 1
1,244,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,306 UART: [ldev] --
1,283,577 UART: [fwproc] Wait for Commands...
1,284,369 UART: [fwproc] Recv command 0x46574c44
1,285,097 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,763 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,067 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,962 >>> mbox cmd response: success
2,775,962 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,777,104 UART: [afmc] ++
2,777,272 UART: [afmc] CDI.KEYID = 6
2,777,634 UART: [afmc] SUBJECT.KEYID = 7
2,778,059 UART: [afmc] AUTHORITY.KEYID = 5
2,813,758 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,977 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,705 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,590 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,309 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,041 UART: [afmc] --
2,857,015 UART: [cold-reset] --
2,857,863 UART: [state] Locking Datavault
2,859,132 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,736 UART: [state] Locking ICCM
2,860,162 UART: [exit] Launching FMC @ 0x40000130
2,865,491 UART:
2,865,507 UART: Running Caliptra FMC ...
2,865,915 UART:
2,866,058 UART: [state] CFI Enabled
2,876,845 UART: [fht] FMC Alias Private Key: 7
2,984,810 UART: [art] Extend RT PCRs Done
2,985,238 UART: [art] Lock RT PCRs Done
2,986,662 UART: [art] Populate DV Done
2,995,129 UART: [fht] FMC Alias Private Key: 7
2,996,167 UART: [art] Derive CDI
2,996,447 UART: [art] Store in in slot 0x4
3,082,038 UART: [art] Derive Key Pair
3,082,398 UART: [art] Store priv key in slot 0x5
3,095,106 UART: [art] Derive Key Pair - Done
3,109,819 UART: [art] Signing Cert with AUTHO
3,110,299 UART: RITY.KEYID = 7
3,125,841 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,606 UART: [art] PUB.X = A119155E0897631D489C1A3B2F6D25B285B10059267D7B7FC9A580D4CDAF9A5968F1B01A6C9D9B3475D75A6E741AEC99
3,133,355 UART: [art] PUB.Y = 5199380DE3FE2D2383690296B6A667F4CF8D67965C5D239DB6B59676F8B524A15B9F273E1A908C2B9DED6CFB47E923DE
3,140,305 UART: [art] SIG.R = 4D18BB10C3FBEF7A317EDE1D2C5F1DB50DFA9E96252D11449E97B563B439B88959F050A8305EA3498F9C601D23F9D256
3,147,080 UART: [art] SIG.S = A0FA4B678F94E134ACCA5F381A09D5CB9C722FE0602D8211E7B7007433E54193F935E8A4C2526D88DA18A442E33191E0
3,170,964 UART: Caliptra RT
3,171,309 UART: [state] CFI Enabled
3,278,866 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,306 UART: [rt]cmd =0x54514754, len=24
3,311,430 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,784 ready_for_fw is high
1,060,784 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,981 >>> mbox cmd response: success
2,626,981 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,689,225 UART:
2,689,241 UART: Running Caliptra FMC ...
2,689,649 UART:
2,689,792 UART: [state] CFI Enabled
2,700,411 UART: [fht] FMC Alias Private Key: 7
2,808,520 UART: [art] Extend RT PCRs Done
2,808,948 UART: [art] Lock RT PCRs Done
2,810,278 UART: [art] Populate DV Done
2,818,659 UART: [fht] FMC Alias Private Key: 7
2,819,791 UART: [art] Derive CDI
2,820,071 UART: [art] Store in in slot 0x4
2,905,528 UART: [art] Derive Key Pair
2,905,888 UART: [art] Store priv key in slot 0x5
2,918,984 UART: [art] Derive Key Pair - Done
2,934,048 UART: [art] Signing Cert with AUTHO
2,934,528 UART: RITY.KEYID = 7
2,949,690 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,455 UART: [art] PUB.X = AFF8486334CE248987B36395DBA3C995DE7C8A59AF5DEE0A4B001C3BE611FD54A01D4E9A4C6AD0CD8C420C3A85F1617F
2,957,215 UART: [art] PUB.Y = C368262FA9A2AC2CA8F69F799579035B3A95668432D0D759B320432C22D9E014EA3BA0BDEBB931361C573A053CAABFF5
2,964,167 UART: [art] SIG.R = 715B38E7FFF0AD57AE1EB18877B77BF49C034F66A2CA0A7FF76768C89C973731AEA34DD4265A2B4CBCC0C0CEA215BE12
2,970,951 UART: [art] SIG.S = 4D134A47DD8C7E3C2456D97229B0706A09575A2525E794781509D539FE350ABDC63BDC01E2FF84E5630774885413407F
2,995,299 UART: Caliptra RT
2,995,644 UART: [state] CFI Enabled
3,103,221 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,385 UART: [rt]cmd =0x54514754, len=24
3,135,173 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,546 UART: [state] LifecycleState = Unprovisioned
86,201 UART: [state] DebugLocked = No
86,821 UART: [state] WD Timer not started. Device not locked for debugging
88,150 UART: [kat] SHA2-256
891,700 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,829 UART: [kat] ++
895,981 UART: [kat] sha1
900,165 UART: [kat] SHA2-256
902,105 UART: [kat] SHA2-384
904,760 UART: [kat] SHA2-512-ACC
906,661 UART: [kat] ECC-384
915,908 UART: [kat] HMAC-384Kdf
920,466 UART: [kat] LMS
1,168,778 UART: [kat] --
1,169,569 UART: [cold-reset] ++
1,169,913 UART: [fht] FHT @ 0x50003400
1,172,597 UART: [idev] ++
1,172,765 UART: [idev] CDI.KEYID = 6
1,173,126 UART: [idev] SUBJECT.KEYID = 7
1,173,551 UART: [idev] UDS.KEYID = 0
1,173,897 ready_for_fw is high
1,173,897 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,481 UART: [idev] Erasing UDS.KEYID = 0
1,198,327 UART: [idev] Sha1 KeyId Algorithm
1,207,243 UART: [idev] --
1,208,470 UART: [ldev] ++
1,208,638 UART: [ldev] CDI.KEYID = 6
1,209,002 UART: [ldev] SUBJECT.KEYID = 5
1,209,429 UART: [ldev] AUTHORITY.KEYID = 7
1,209,892 UART: [ldev] FE.KEYID = 1
1,215,264 UART: [ldev] Erasing FE.KEYID = 1
1,241,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,934 UART: [ldev] --
1,280,308 UART: [fwproc] Wait for Commands...
1,280,919 UART: [fwproc] Recv command 0x46574c44
1,281,652 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,518 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,827 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,693 >>> mbox cmd response: success
2,772,693 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,773,854 UART: [afmc] ++
2,774,022 UART: [afmc] CDI.KEYID = 6
2,774,385 UART: [afmc] SUBJECT.KEYID = 7
2,774,811 UART: [afmc] AUTHORITY.KEYID = 5
2,810,252 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,480 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,231 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,960 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,843 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,562 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,547 UART: [afmc] --
2,853,507 UART: [cold-reset] --
2,854,107 UART: [state] Locking Datavault
2,855,172 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,776 UART: [state] Locking ICCM
2,856,362 UART: [exit] Launching FMC @ 0x40000130
2,861,691 UART:
2,861,707 UART: Running Caliptra FMC ...
2,862,115 UART:
2,862,169 UART: [state] CFI Enabled
2,872,696 UART: [fht] FMC Alias Private Key: 7
2,980,799 UART: [art] Extend RT PCRs Done
2,981,227 UART: [art] Lock RT PCRs Done
2,983,045 UART: [art] Populate DV Done
2,991,336 UART: [fht] FMC Alias Private Key: 7
2,992,416 UART: [art] Derive CDI
2,992,696 UART: [art] Store in in slot 0x4
3,078,333 UART: [art] Derive Key Pair
3,078,693 UART: [art] Store priv key in slot 0x5
3,092,079 UART: [art] Derive Key Pair - Done
3,106,697 UART: [art] Signing Cert with AUTHO
3,107,177 UART: RITY.KEYID = 7
3,122,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,996 UART: [art] PUB.X = 2D80FB235F600B24E9ADBB76D5C42D93D0459488F94D1A588842239F6304FA006F255470A5A62F4D3096B3C5F144049B
3,129,731 UART: [art] PUB.Y = 9C04C9CFCDE480DBAFF779385C7359CB3564A3327C17142C5AF84F8D01BE5252A1E4A101B93B77F267174E10838F9167
3,136,674 UART: [art] SIG.R = F5BA39FCA24EB970E40F4981CC3352B7E9A66DC0780A6829530E39DEAE5C67F871EF57E4C77F564B336D4E506434B937
3,143,441 UART: [art] SIG.S = 7010E9BC4B7FBB48E365953B1AE9B631DE2CC24E5E5AFA5258E1006908D18D6D41DC239639705AD1145CA4E9E25482E0
3,167,109 UART: Caliptra RT
3,167,362 UART: [state] CFI Enabled
3,275,499 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,885 UART: [rt]cmd =0x54514754, len=24
3,307,785 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,412 ready_for_fw is high
1,055,412 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,271 >>> mbox cmd response: success
2,622,271 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,684,309 UART:
2,684,325 UART: Running Caliptra FMC ...
2,684,733 UART:
2,684,787 UART: [state] CFI Enabled
2,695,342 UART: [fht] FMC Alias Private Key: 7
2,803,879 UART: [art] Extend RT PCRs Done
2,804,307 UART: [art] Lock RT PCRs Done
2,806,003 UART: [art] Populate DV Done
2,813,992 UART: [fht] FMC Alias Private Key: 7
2,814,946 UART: [art] Derive CDI
2,815,226 UART: [art] Store in in slot 0x4
2,900,465 UART: [art] Derive Key Pair
2,900,825 UART: [art] Store priv key in slot 0x5
2,914,507 UART: [art] Derive Key Pair - Done
2,929,243 UART: [art] Signing Cert with AUTHO
2,929,723 UART: RITY.KEYID = 7
2,944,993 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,758 UART: [art] PUB.X = 3846E1E6618B088E455E50FAE98A151D06FB39B31FC6EFF49B62BA17DB5C6B0C11479DB765D325CD0D968516AE0B2E64
2,952,523 UART: [art] PUB.Y = 34227A6D5971C44E30173CE09662676024CC627DEB1B543BF0F95E792A29E0FC224158D21C4982E45BE9921A2C191CC7
2,959,469 UART: [art] SIG.R = 59B82334A0D2DF0830C52AFB9FB9B19BFF02B3CD4458A5F8292371B0570F1CCD83ED84A4FA46F0AA97A7A56204D52DEE
2,966,243 UART: [art] SIG.S = FA4B9D2D42730465A88DB1EDA41D8395CA6524E6135909395ADBEF20A06F86F0175DBE6766034E54C6D3432499AF5A30
2,990,005 UART: Caliptra RT
2,990,258 UART: [state] CFI Enabled
3,098,191 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,829 UART: [rt]cmd =0x54514754, len=24
3,130,725 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,638 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
899,922 UART: [kat] SHA2-256
901,862 UART: [kat] SHA2-384
904,519 UART: [kat] SHA2-512-ACC
906,420 UART: [kat] ECC-384
916,285 UART: [kat] HMAC-384Kdf
921,067 UART: [kat] LMS
1,169,379 UART: [kat] --
1,170,050 UART: [cold-reset] ++
1,170,458 UART: [fht] FHT @ 0x50003400
1,173,216 UART: [idev] ++
1,173,384 UART: [idev] CDI.KEYID = 6
1,173,745 UART: [idev] SUBJECT.KEYID = 7
1,174,170 UART: [idev] UDS.KEYID = 0
1,174,516 ready_for_fw is high
1,174,516 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,250 UART: [idev] Erasing UDS.KEYID = 0
1,198,846 UART: [idev] Sha1 KeyId Algorithm
1,207,804 UART: [idev] --
1,208,797 UART: [ldev] ++
1,208,965 UART: [ldev] CDI.KEYID = 6
1,209,329 UART: [ldev] SUBJECT.KEYID = 5
1,209,756 UART: [ldev] AUTHORITY.KEYID = 7
1,210,219 UART: [ldev] FE.KEYID = 1
1,215,619 UART: [ldev] Erasing FE.KEYID = 1
1,241,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,871 UART: [ldev] --
1,281,367 UART: [fwproc] Wait for Commands...
1,282,004 UART: [fwproc] Recv command 0x46574c44
1,282,737 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,555 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,864 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,720 >>> mbox cmd response: success
2,772,720 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,773,773 UART: [afmc] ++
2,773,941 UART: [afmc] CDI.KEYID = 6
2,774,304 UART: [afmc] SUBJECT.KEYID = 7
2,774,730 UART: [afmc] AUTHORITY.KEYID = 5
2,810,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,177 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,928 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,657 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,540 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,259 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,014 UART: [afmc] --
2,854,130 UART: [cold-reset] --
2,855,124 UART: [state] Locking Datavault
2,856,229 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,833 UART: [state] Locking ICCM
2,857,497 UART: [exit] Launching FMC @ 0x40000130
2,862,826 UART:
2,862,842 UART: Running Caliptra FMC ...
2,863,250 UART:
2,863,393 UART: [state] CFI Enabled
2,873,880 UART: [fht] FMC Alias Private Key: 7
2,981,023 UART: [art] Extend RT PCRs Done
2,981,451 UART: [art] Lock RT PCRs Done
2,983,069 UART: [art] Populate DV Done
2,991,544 UART: [fht] FMC Alias Private Key: 7
2,992,658 UART: [art] Derive CDI
2,992,938 UART: [art] Store in in slot 0x4
3,078,637 UART: [art] Derive Key Pair
3,078,997 UART: [art] Store priv key in slot 0x5
3,092,589 UART: [art] Derive Key Pair - Done
3,107,265 UART: [art] Signing Cert with AUTHO
3,107,745 UART: RITY.KEYID = 7
3,123,485 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,250 UART: [art] PUB.X = 3D8D7D309F08EB9FBFD97313EAE004D210F4CDE3E61028C279EA61280948D3E49F07A323AB801E3C8A5DA9B2A87C7C46
3,131,020 UART: [art] PUB.Y = 143BF98D14B2C605DA5FF9C655237563092138684B27FE869DF8B3ABCF1CC985C6E0039C906026005FF6EDE55D6C9913
3,137,941 UART: [art] SIG.R = E69AE1922B9D8F918784943E2171C0F6D54E067F79974DCBD6AA705EFA9FA2002D807328829064340D67B44EBA519139
3,144,679 UART: [art] SIG.S = 99553642E097C85C1407AF96C5E3A47AE85BF246D29B7BD5D082F982BA5CD077F303172B18A035975D77EA3A0E855B22
3,168,373 UART: Caliptra RT
3,168,718 UART: [state] CFI Enabled
3,277,358 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,110 UART: [rt]cmd =0x54514754, len=24
3,310,080 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,345 ready_for_fw is high
1,056,345 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,540 >>> mbox cmd response: success
2,622,540 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,684,914 UART:
2,684,930 UART: Running Caliptra FMC ...
2,685,338 UART:
2,685,481 UART: [state] CFI Enabled
2,695,758 UART: [fht] FMC Alias Private Key: 7
2,804,147 UART: [art] Extend RT PCRs Done
2,804,575 UART: [art] Lock RT PCRs Done
2,806,135 UART: [art] Populate DV Done
2,814,386 UART: [fht] FMC Alias Private Key: 7
2,815,516 UART: [art] Derive CDI
2,815,796 UART: [art] Store in in slot 0x4
2,901,321 UART: [art] Derive Key Pair
2,901,681 UART: [art] Store priv key in slot 0x5
2,915,185 UART: [art] Derive Key Pair - Done
2,930,005 UART: [art] Signing Cert with AUTHO
2,930,485 UART: RITY.KEYID = 7
2,945,613 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,378 UART: [art] PUB.X = FE32248C7D3A0AB0DFC4CCAF16F144CD000F7AF55C0D713F265BBB88A481395B4264C8D1DC82AA60121FBD7A0D19C1B1
2,953,134 UART: [art] PUB.Y = CEF89AB2AC84BC68F68EA6124B4398747B391363C28007AC59BD8FD8576DA43B079E1B7E0DCC8EE425699A5BD71DBC66
2,960,089 UART: [art] SIG.R = A9730702BF08085A29372C273AD0ED225059BCFC3C316E909F3E8FD890FDC347E766D367A181CAF377B4B7CA14399E61
2,966,851 UART: [art] SIG.S = 56CD73E4E0EA4D5D1BB0CA14EAC9E4ACC765251187912DD60005E9F1FAB0E5F78E6EF5CA4394A78857F1657064D420E0
2,990,873 UART: Caliptra RT
2,991,218 UART: [state] CFI Enabled
3,098,923 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,551 UART: [rt]cmd =0x54514754, len=24
3,131,421 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,639 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,237 UART: [kat] SHA2-256
882,168 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,283 UART: [kat] ++
886,435 UART: [kat] sha1
890,767 UART: [kat] SHA2-256
892,705 UART: [kat] SHA2-384
895,570 UART: [kat] SHA2-512-ACC
897,471 UART: [kat] ECC-384
902,974 UART: [kat] HMAC-384Kdf
907,426 UART: [kat] LMS
1,475,622 UART: [kat] --
1,476,455 UART: [cold-reset] ++
1,477,035 UART: [fht] Storing FHT @ 0x50003400
1,479,900 UART: [idev] ++
1,480,068 UART: [idev] CDI.KEYID = 6
1,480,428 UART: [idev] SUBJECT.KEYID = 7
1,480,852 UART: [idev] UDS.KEYID = 0
1,481,197 ready_for_fw is high
1,481,197 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,040 UART: [idev] Erasing UDS.KEYID = 0
1,505,282 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,852 UART: [idev] --
1,514,973 UART: [ldev] ++
1,515,141 UART: [ldev] CDI.KEYID = 6
1,515,504 UART: [ldev] SUBJECT.KEYID = 5
1,515,930 UART: [ldev] AUTHORITY.KEYID = 7
1,516,393 UART: [ldev] FE.KEYID = 1
1,521,521 UART: [ldev] Erasing FE.KEYID = 1
1,546,490 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,334 UART: [ldev] --
1,585,835 UART: [fwproc] Waiting for Commands...
1,586,542 UART: [fwproc] Received command 0x46574c44
1,587,333 UART: [fwproc] Received Image of size 114332 bytes
2,885,143 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,019 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,371 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,186 >>> mbox cmd response: success
3,077,186 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,078,290 UART: [afmc] ++
3,078,458 UART: [afmc] CDI.KEYID = 6
3,078,820 UART: [afmc] SUBJECT.KEYID = 7
3,079,245 UART: [afmc] AUTHORITY.KEYID = 5
3,114,566 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,962 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,742 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,470 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,355 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,045 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,958 UART: [afmc] --
3,157,858 UART: [cold-reset] --
3,158,672 UART: [state] Locking Datavault
3,160,005 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,609 UART: [state] Locking ICCM
3,161,267 UART: [exit] Launching FMC @ 0x40000130
3,166,596 UART:
3,166,612 UART: Running Caliptra FMC ...
3,167,020 UART:
3,167,074 UART: [state] CFI Enabled
3,177,627 UART: [fht] FMC Alias Private Key: 7
3,285,870 UART: [art] Extend RT PCRs Done
3,286,298 UART: [art] Lock RT PCRs Done
3,287,900 UART: [art] Populate DV Done
3,296,167 UART: [fht] FMC Alias Private Key: 7
3,297,129 UART: [art] Derive CDI
3,297,409 UART: [art] Store in in slot 0x4
3,382,934 UART: [art] Derive Key Pair
3,383,294 UART: [art] Store priv key in slot 0x5
3,396,388 UART: [art] Derive Key Pair - Done
3,411,609 UART: [art] Signing Cert with AUTHO
3,412,089 UART: RITY.KEYID = 7
3,427,329 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,094 UART: [art] PUB.X = 223CB154691ACF7BA61BDFF5E3CB9BADA525932BB82EDC23C32F8B45E7339EC9CB54B908C8A5E69DA8E13D2D0D9246B9
3,434,880 UART: [art] PUB.Y = 8AC7072F574E22A1E1E82B8E8FA446AD6FF5EA11F494F679BDC473D3DE7A1162585292686A27F7DEF960D097CE83F6CA
3,441,839 UART: [art] SIG.R = A33A8235775A34576F5C64E4BBED5DC3A653E74DF6B31045B71E03F7E955278B8BEC014C718943508498C1B10CC0381D
3,448,600 UART: [art] SIG.S = EBD52133F1EB54728D0F57C2831AB45C27E5F7B1A1A005C92716E50A79A993367DF712F2CB746D5AA1C888383570A842
3,472,362 UART: Caliptra RT
3,472,615 UART: [state] CFI Enabled
3,581,557 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,889 UART: [rt]cmd =0x44504543, len=96
3,649,503 >>> mbox cmd response data (56 bytes)
3,649,504 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,678,891 UART: [rt]cmd =0x54514754, len=24
3,680,721 >>> mbox cmd response: failed
3,680,721 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,057 UART: [rt]cmd =0x54514754, len=24
3,711,971 >>> mbox cmd response data (8 bytes)
3,711,972 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,123 UART: [rt]cmd =0x44504543, len=96
3,778,730 >>> mbox cmd response data (56 bytes)
3,778,731 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,808,060 UART: [rt]cmd =0x47544744, len=8
3,810,442 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,225 ready_for_fw is high
1,362,225 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,586 >>> mbox cmd response: success
2,928,586 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,990,688 UART:
2,990,704 UART: Running Caliptra FMC ...
2,991,112 UART:
2,991,166 UART: [state] CFI Enabled
3,001,415 UART: [fht] FMC Alias Private Key: 7
3,109,558 UART: [art] Extend RT PCRs Done
3,109,986 UART: [art] Lock RT PCRs Done
3,112,064 UART: [art] Populate DV Done
3,120,101 UART: [fht] FMC Alias Private Key: 7
3,121,199 UART: [art] Derive CDI
3,121,479 UART: [art] Store in in slot 0x4
3,206,946 UART: [art] Derive Key Pair
3,207,306 UART: [art] Store priv key in slot 0x5
3,220,036 UART: [art] Derive Key Pair - Done
3,234,754 UART: [art] Signing Cert with AUTHO
3,235,234 UART: RITY.KEYID = 7
3,250,554 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,319 UART: [art] PUB.X = 1A000614EEDB4EEFDC6368D6967D5D869FF5E13B4E46F4BE0C6A5FC36EF28CB2B94053A71850B1A9F4754F02BDDAEAA3
3,258,080 UART: [art] PUB.Y = E5785E46A5C9D7D01B37F8401B04C5994AC85097D9EA55DAD4E22EA6D202D6EDD776574548B8FBBDABCEB19B3AB3F0FE
3,265,046 UART: [art] SIG.R = F2D837010A044D388B9F367E2CC5BCB50194C0D27796F5FFC2E00699CD7B118315DE59D60CA5D6746BB3F3189CCAEFA3
3,271,810 UART: [art] SIG.S = 0E5D8D3282DC84D3D0CD5BB3CD603B149889CC9329C2859DC0AAAB3DB6D21157A3FDED218DBDF7C44731443DB51F34F0
3,295,432 UART: Caliptra RT
3,295,685 UART: [state] CFI Enabled
3,404,570 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,700 UART: [rt]cmd =0x44504543, len=96
3,472,170 >>> mbox cmd response data (56 bytes)
3,472,171 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,501,518 UART: [rt]cmd =0x54514754, len=24
3,503,666 >>> mbox cmd response: failed
3,503,666 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,088 UART: [rt]cmd =0x54514754, len=24
3,535,308 >>> mbox cmd response data (8 bytes)
3,535,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,242 UART: [rt]cmd =0x44504543, len=96
3,601,909 >>> mbox cmd response data (56 bytes)
3,601,910 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,193 UART: [rt]cmd =0x47544744, len=8
3,634,111 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,474 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,104 UART: [kat] SHA2-256
882,035 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,150 UART: [kat] ++
886,302 UART: [kat] sha1
890,588 UART: [kat] SHA2-256
892,526 UART: [kat] SHA2-384
895,271 UART: [kat] SHA2-512-ACC
897,172 UART: [kat] ECC-384
902,709 UART: [kat] HMAC-384Kdf
907,513 UART: [kat] LMS
1,475,709 UART: [kat] --
1,476,738 UART: [cold-reset] ++
1,477,308 UART: [fht] Storing FHT @ 0x50003400
1,480,165 UART: [idev] ++
1,480,333 UART: [idev] CDI.KEYID = 6
1,480,693 UART: [idev] SUBJECT.KEYID = 7
1,481,117 UART: [idev] UDS.KEYID = 0
1,481,462 ready_for_fw is high
1,481,462 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,911 UART: [idev] Erasing UDS.KEYID = 0
1,505,199 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,905 UART: [idev] --
1,514,734 UART: [ldev] ++
1,514,902 UART: [ldev] CDI.KEYID = 6
1,515,265 UART: [ldev] SUBJECT.KEYID = 5
1,515,691 UART: [ldev] AUTHORITY.KEYID = 7
1,516,154 UART: [ldev] FE.KEYID = 1
1,521,302 UART: [ldev] Erasing FE.KEYID = 1
1,547,163 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,715 UART: [ldev] --
1,586,222 UART: [fwproc] Waiting for Commands...
1,587,015 UART: [fwproc] Received command 0x46574c44
1,587,806 UART: [fwproc] Received Image of size 114332 bytes
2,885,622 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,688 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,040 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,789 >>> mbox cmd response: success
3,077,789 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,078,849 UART: [afmc] ++
3,079,017 UART: [afmc] CDI.KEYID = 6
3,079,379 UART: [afmc] SUBJECT.KEYID = 7
3,079,804 UART: [afmc] AUTHORITY.KEYID = 5
3,115,497 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,861 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,641 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,369 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,254 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,944 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,731 UART: [afmc] --
3,158,701 UART: [cold-reset] --
3,159,785 UART: [state] Locking Datavault
3,161,050 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,654 UART: [state] Locking ICCM
3,162,170 UART: [exit] Launching FMC @ 0x40000130
3,167,499 UART:
3,167,515 UART: Running Caliptra FMC ...
3,167,923 UART:
3,168,066 UART: [state] CFI Enabled
3,178,703 UART: [fht] FMC Alias Private Key: 7
3,286,892 UART: [art] Extend RT PCRs Done
3,287,320 UART: [art] Lock RT PCRs Done
3,288,978 UART: [art] Populate DV Done
3,297,093 UART: [fht] FMC Alias Private Key: 7
3,298,235 UART: [art] Derive CDI
3,298,515 UART: [art] Store in in slot 0x4
3,384,212 UART: [art] Derive Key Pair
3,384,572 UART: [art] Store priv key in slot 0x5
3,397,448 UART: [art] Derive Key Pair - Done
3,412,168 UART: [art] Signing Cert with AUTHO
3,412,648 UART: RITY.KEYID = 7
3,427,418 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,183 UART: [art] PUB.X = DC9283A328C306E2AB7A1A114EB0B284B1A442D7229F5319C4655B965A43F265A3F165ECFC44BA1B2E84C8C7A64EE7BD
3,434,962 UART: [art] PUB.Y = DC911B4180359C569FF6A68659D5F3B4EE6BA2B25AD5251E8E92CA84781E1E75FA5414F27B9391890792D9822CC07C95
3,441,909 UART: [art] SIG.R = 85CDC5E04F79C56CCB86EBCCAE8BF2211C91A5406A1EBE97030CFABEBAF73C47CAC6E05DA41FE7819865097E447E4DF7
3,448,696 UART: [art] SIG.S = 89C69D1B83B010F122186EC2423BE35683141D7D64F4E3205B5B6C2C5BD94A1B789CB2CC684BD09087BA785081680B76
3,472,120 UART: Caliptra RT
3,472,465 UART: [state] CFI Enabled
3,580,295 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,531 UART: [rt]cmd =0x44504543, len=96
3,648,423 >>> mbox cmd response data (56 bytes)
3,648,424 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,677,779 UART: [rt]cmd =0x54514754, len=24
3,679,775 >>> mbox cmd response: failed
3,679,775 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,161 UART: [rt]cmd =0x54514754, len=24
3,711,195 >>> mbox cmd response data (8 bytes)
3,711,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,965 UART: [rt]cmd =0x44504543, len=96
3,777,496 >>> mbox cmd response data (56 bytes)
3,777,497 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,806,774 UART: [rt]cmd =0x47544744, len=8
3,809,416 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,962 ready_for_fw is high
1,362,962 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,803 >>> mbox cmd response: success
2,927,803 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,988,823 UART:
2,988,839 UART: Running Caliptra FMC ...
2,989,247 UART:
2,989,390 UART: [state] CFI Enabled
3,000,083 UART: [fht] FMC Alias Private Key: 7
3,108,694 UART: [art] Extend RT PCRs Done
3,109,122 UART: [art] Lock RT PCRs Done
3,110,388 UART: [art] Populate DV Done
3,118,755 UART: [fht] FMC Alias Private Key: 7
3,119,885 UART: [art] Derive CDI
3,120,165 UART: [art] Store in in slot 0x4
3,205,734 UART: [art] Derive Key Pair
3,206,094 UART: [art] Store priv key in slot 0x5
3,219,480 UART: [art] Derive Key Pair - Done
3,234,568 UART: [art] Signing Cert with AUTHO
3,235,048 UART: RITY.KEYID = 7
3,250,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,777 UART: [art] PUB.X = EF3FF5768A46238798D0A87D51D8B5E946DF8B1ADABC80F894FD686E2098A355A14913BD81A9CA32957879A488E768D4
3,257,551 UART: [art] PUB.Y = 42368C4741456B64583FF5FD992E0AB50578D7DBE0FC40786F0781409FB0C19FA53E4F25EEA94D009A41D4E6FD64AB22
3,264,476 UART: [art] SIG.R = 38C25F2E3139470177B3E6856F43E469799BBD1B90678F1A725A523E07E53F90CB145975719BECBCE904660AABAC2840
3,271,232 UART: [art] SIG.S = 58F45A971B2C882AF44E3C252B156171BAF67E4BB09A3F663DADB336C342419F909271B0767224BE36AC7D8578C338A3
3,294,569 UART: Caliptra RT
3,294,914 UART: [state] CFI Enabled
3,403,026 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,394 UART: [rt]cmd =0x44504543, len=96
3,470,514 >>> mbox cmd response data (56 bytes)
3,470,515 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,499,936 UART: [rt]cmd =0x54514754, len=24
3,501,948 >>> mbox cmd response: failed
3,501,948 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,296 UART: [rt]cmd =0x54514754, len=24
3,533,270 >>> mbox cmd response data (8 bytes)
3,533,271 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,174 UART: [rt]cmd =0x44504543, len=96
3,600,081 >>> mbox cmd response data (56 bytes)
3,600,082 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,499 UART: [rt]cmd =0x47544744, len=8
3,631,779 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,434 UART: [kat] SHA2-256
893,084 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,209 UART: [kat] ++
897,361 UART: [kat] sha1
901,523 UART: [kat] SHA2-256
903,463 UART: [kat] SHA2-384
906,050 UART: [kat] SHA2-512-ACC
907,951 UART: [kat] ECC-384
917,052 UART: [kat] HMAC-384Kdf
921,510 UART: [kat] LMS
1,169,838 UART: [kat] --
1,170,619 UART: [cold-reset] ++
1,171,199 UART: [fht] FHT @ 0x50003400
1,173,802 UART: [idev] ++
1,173,970 UART: [idev] CDI.KEYID = 6
1,174,330 UART: [idev] SUBJECT.KEYID = 7
1,174,754 UART: [idev] UDS.KEYID = 0
1,175,099 ready_for_fw is high
1,175,099 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,690 UART: [idev] Erasing UDS.KEYID = 0
1,199,777 UART: [idev] Sha1 KeyId Algorithm
1,208,397 UART: [idev] --
1,209,541 UART: [ldev] ++
1,209,709 UART: [ldev] CDI.KEYID = 6
1,210,072 UART: [ldev] SUBJECT.KEYID = 5
1,210,498 UART: [ldev] AUTHORITY.KEYID = 7
1,210,961 UART: [ldev] FE.KEYID = 1
1,216,305 UART: [ldev] Erasing FE.KEYID = 1
1,242,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,031 UART: [ldev] --
1,281,324 UART: [fwproc] Wait for Commands...
1,282,132 UART: [fwproc] Recv command 0x46574c44
1,282,860 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,694 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,998 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,739 >>> mbox cmd response: success
2,773,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,774,769 UART: [afmc] ++
2,774,937 UART: [afmc] CDI.KEYID = 6
2,775,299 UART: [afmc] SUBJECT.KEYID = 7
2,775,724 UART: [afmc] AUTHORITY.KEYID = 5
2,811,343 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,362 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,090 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,975 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,694 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,632 UART: [afmc] --
2,854,544 UART: [cold-reset] --
2,855,294 UART: [state] Locking Datavault
2,856,327 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,931 UART: [state] Locking ICCM
2,857,493 UART: [exit] Launching FMC @ 0x40000130
2,862,822 UART:
2,862,838 UART: Running Caliptra FMC ...
2,863,246 UART:
2,863,300 UART: [state] CFI Enabled
2,873,525 UART: [fht] FMC Alias Private Key: 7
2,981,640 UART: [art] Extend RT PCRs Done
2,982,068 UART: [art] Lock RT PCRs Done
2,983,424 UART: [art] Populate DV Done
2,991,629 UART: [fht] FMC Alias Private Key: 7
2,992,705 UART: [art] Derive CDI
2,992,985 UART: [art] Store in in slot 0x4
3,078,390 UART: [art] Derive Key Pair
3,078,750 UART: [art] Store priv key in slot 0x5
3,091,962 UART: [art] Derive Key Pair - Done
3,106,961 UART: [art] Signing Cert with AUTHO
3,107,441 UART: RITY.KEYID = 7
3,122,469 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,234 UART: [art] PUB.X = 74525B7C1695C21E319B2D6B0AA7BB862636419AFB465B03D892B3A1E2FF0BB844AFCBC2AF4646E19FB914A8DD87A9B1
3,130,009 UART: [art] PUB.Y = 2CD4D24BD0D65ED9198D08AA2308D4D2096797C6D2F155E4E9A12962CBC638ABE80CE9AA314BF2C2A99D7FE760A2D7D6
3,136,963 UART: [art] SIG.R = AA81EA61A0A32D99853F335839FEB296F1AD1A64C6919D2C3ECF84E6D54AE48CF19E8B67823BE89AEF1A792C8E930525
3,143,742 UART: [art] SIG.S = 5B19DF16FF4A8CC22B89C4817FED60C96D5D45B2AEEB9081D4A4999B260E09B1F6C036CF3E78E1851E9B5BD1A1FA628A
3,166,729 UART: Caliptra RT
3,166,982 UART: [state] CFI Enabled
3,274,325 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,327 UART: [rt]cmd =0x44504543, len=96
3,341,821 >>> mbox cmd response data (56 bytes)
3,341,822 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,271 UART: [rt]cmd =0x54514754, len=24
3,373,321 >>> mbox cmd response: failed
3,373,321 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,961 UART: [rt]cmd =0x54514754, len=24
3,404,863 >>> mbox cmd response data (8 bytes)
3,404,864 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,859 UART: [rt]cmd =0x44504543, len=96
3,471,506 >>> mbox cmd response data (56 bytes)
3,471,507 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,501,038 UART: [rt]cmd =0x47544744, len=8
3,503,546 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,901 ready_for_fw is high
1,060,901 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,280 >>> mbox cmd response: success
2,624,280 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,687,074 UART:
2,687,090 UART: Running Caliptra FMC ...
2,687,498 UART:
2,687,552 UART: [state] CFI Enabled
2,698,251 UART: [fht] FMC Alias Private Key: 7
2,805,858 UART: [art] Extend RT PCRs Done
2,806,286 UART: [art] Lock RT PCRs Done
2,807,956 UART: [art] Populate DV Done
2,816,009 UART: [fht] FMC Alias Private Key: 7
2,817,159 UART: [art] Derive CDI
2,817,439 UART: [art] Store in in slot 0x4
2,903,150 UART: [art] Derive Key Pair
2,903,510 UART: [art] Store priv key in slot 0x5
2,916,472 UART: [art] Derive Key Pair - Done
2,931,499 UART: [art] Signing Cert with AUTHO
2,931,979 UART: RITY.KEYID = 7
2,946,543 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,308 UART: [art] PUB.X = B44D4A02A9F534BE54080F8B5EC641359270F4D5D2B3AEDF8D161D1B7467770824F0B7F7B3E7CDA61C38E3BF04D99C14
2,954,073 UART: [art] PUB.Y = C895EE6F564F9CE89F3CF5BF68DC724E635B8904B7BA5CC42C985DF6D14BEBEE2CAE9221B06E310E230DBE72C8625333
2,961,032 UART: [art] SIG.R = 568E157B9DB3315DE417A33538EC764933BCC8C3A13F09161D5488F3BAB1DE6AAD1A81D5E5F1DAB8E6D7DBD17580A024
2,967,813 UART: [art] SIG.S = 6A256679F5B6CA68984E57DE233A3D6F030724721E55553EF9FF72EA01437A3473893C609F5E469D7DF716E5EE6DD425
2,990,985 UART: Caliptra RT
2,991,238 UART: [state] CFI Enabled
3,099,123 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,463 UART: [rt]cmd =0x44504543, len=96
3,166,933 >>> mbox cmd response data (56 bytes)
3,166,934 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,196,407 UART: [rt]cmd =0x54514754, len=24
3,198,377 >>> mbox cmd response: failed
3,198,377 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,971 UART: [rt]cmd =0x54514754, len=24
3,230,249 >>> mbox cmd response data (8 bytes)
3,230,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,260,251 UART: [rt]cmd =0x44504543, len=96
3,296,664 >>> mbox cmd response data (56 bytes)
3,296,665 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,222 UART: [rt]cmd =0x47544744, len=8
3,328,788 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
893,725 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,850 UART: [kat] ++
898,002 UART: [kat] sha1
902,278 UART: [kat] SHA2-256
904,218 UART: [kat] SHA2-384
906,897 UART: [kat] SHA2-512-ACC
908,798 UART: [kat] ECC-384
918,701 UART: [kat] HMAC-384Kdf
923,421 UART: [kat] LMS
1,171,749 UART: [kat] --
1,172,456 UART: [cold-reset] ++
1,172,900 UART: [fht] FHT @ 0x50003400
1,175,625 UART: [idev] ++
1,175,793 UART: [idev] CDI.KEYID = 6
1,176,153 UART: [idev] SUBJECT.KEYID = 7
1,176,577 UART: [idev] UDS.KEYID = 0
1,176,922 ready_for_fw is high
1,176,922 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,985 UART: [idev] Erasing UDS.KEYID = 0
1,201,926 UART: [idev] Sha1 KeyId Algorithm
1,210,234 UART: [idev] --
1,211,296 UART: [ldev] ++
1,211,464 UART: [ldev] CDI.KEYID = 6
1,211,827 UART: [ldev] SUBJECT.KEYID = 5
1,212,253 UART: [ldev] AUTHORITY.KEYID = 7
1,212,716 UART: [ldev] FE.KEYID = 1
1,218,000 UART: [ldev] Erasing FE.KEYID = 1
1,244,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,188 UART: [ldev] --
1,283,665 UART: [fwproc] Wait for Commands...
1,284,483 UART: [fwproc] Recv command 0x46574c44
1,285,211 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,430 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,037 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,341 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,094 >>> mbox cmd response: success
2,776,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,777,260 UART: [afmc] ++
2,777,428 UART: [afmc] CDI.KEYID = 6
2,777,790 UART: [afmc] SUBJECT.KEYID = 7
2,778,215 UART: [afmc] AUTHORITY.KEYID = 5
2,813,922 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,481 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,229 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,957 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,842 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,561 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,559 UART: [afmc] --
2,857,543 UART: [cold-reset] --
2,858,423 UART: [state] Locking Datavault
2,859,512 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,116 UART: [state] Locking ICCM
2,860,628 UART: [exit] Launching FMC @ 0x40000130
2,865,957 UART:
2,865,973 UART: Running Caliptra FMC ...
2,866,381 UART:
2,866,524 UART: [state] CFI Enabled
2,876,903 UART: [fht] FMC Alias Private Key: 7
2,984,714 UART: [art] Extend RT PCRs Done
2,985,142 UART: [art] Lock RT PCRs Done
2,986,416 UART: [art] Populate DV Done
2,994,673 UART: [fht] FMC Alias Private Key: 7
2,995,709 UART: [art] Derive CDI
2,995,989 UART: [art] Store in in slot 0x4
3,081,682 UART: [art] Derive Key Pair
3,082,042 UART: [art] Store priv key in slot 0x5
3,095,476 UART: [art] Derive Key Pair - Done
3,110,199 UART: [art] Signing Cert with AUTHO
3,110,679 UART: RITY.KEYID = 7
3,126,323 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,088 UART: [art] PUB.X = 89E3D05D7BC4C0D795DDAA00A98F62674F8224488E82654503F3D6CBA7AC7BAFC024CA3844AD282497D79756794C0770
3,133,832 UART: [art] PUB.Y = 5233632A131799E9436CAB9B8F940D5FC933F4D437CC1BE57837A9E2D860B054482F42AE933FBDCBAB0B6848AC60356F
3,140,782 UART: [art] SIG.R = 7659AB994A0DEFA216A8FC0C21EEEDC72D86197C3D065B314C9D4648509EBAABC3B7380A8D788A0E2C013B8CF900274F
3,147,526 UART: [art] SIG.S = 1A86B7334EF717A270C2184C99116FA32A5F38A09E70C69BEC1C97C53DD088CED96109C200F6CCFFB456D38A25E85188
3,171,248 UART: Caliptra RT
3,171,593 UART: [state] CFI Enabled
3,279,838 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,840 UART: [rt]cmd =0x44504543, len=96
3,347,258 >>> mbox cmd response data (56 bytes)
3,347,259 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,376,930 UART: [rt]cmd =0x54514754, len=24
3,379,160 >>> mbox cmd response: failed
3,379,160 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,408,718 UART: [rt]cmd =0x54514754, len=24
3,410,748 >>> mbox cmd response data (8 bytes)
3,410,749 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,714 UART: [rt]cmd =0x44504543, len=96
3,477,579 >>> mbox cmd response data (56 bytes)
3,477,580 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,507,057 UART: [rt]cmd =0x47544744, len=8
3,509,673 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,678 ready_for_fw is high
1,060,678 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,465 >>> mbox cmd response: success
2,626,465 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,688,021 UART:
2,688,037 UART: Running Caliptra FMC ...
2,688,445 UART:
2,688,588 UART: [state] CFI Enabled
2,699,315 UART: [fht] FMC Alias Private Key: 7
2,807,462 UART: [art] Extend RT PCRs Done
2,807,890 UART: [art] Lock RT PCRs Done
2,809,618 UART: [art] Populate DV Done
2,817,583 UART: [fht] FMC Alias Private Key: 7
2,818,585 UART: [art] Derive CDI
2,818,865 UART: [art] Store in in slot 0x4
2,904,476 UART: [art] Derive Key Pair
2,904,836 UART: [art] Store priv key in slot 0x5
2,918,184 UART: [art] Derive Key Pair - Done
2,932,944 UART: [art] Signing Cert with AUTHO
2,933,424 UART: RITY.KEYID = 7
2,948,706 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,471 UART: [art] PUB.X = 7C80E3C0E64034CC9D9A83744D243B4DA9B7B5049FB4FD0FDF76016A74E6AD4D5308DCA09F62726AD417B799493DA1A0
2,956,239 UART: [art] PUB.Y = FFC16032BD70484CB767B09EEDA73FD74431D97F9305CBCFD93E2A9A5EA549A6EEFDE0082386C2DAA04C50A046672D7C
2,963,201 UART: [art] SIG.R = 85E11E36C7304706EC9DC5790EFFE3A0825C03489C727DD2E7B9311BE6D3B44B18E75A0F94319DFCE0C6104990DA58F5
2,969,965 UART: [art] SIG.S = 672FD371409A5119EA3120B5DB6C16B85DD26680B624A1019FFD5DE635334D0A0E0B1D241B4E216403C5D08DFC9CC613
2,992,963 UART: Caliptra RT
2,993,308 UART: [state] CFI Enabled
3,101,183 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,201 UART: [rt]cmd =0x44504543, len=96
3,168,899 >>> mbox cmd response data (56 bytes)
3,168,900 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,198,187 UART: [rt]cmd =0x54514754, len=24
3,199,959 >>> mbox cmd response: failed
3,199,959 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,489 UART: [rt]cmd =0x54514754, len=24
3,231,597 >>> mbox cmd response data (8 bytes)
3,231,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,261,577 UART: [rt]cmd =0x44504543, len=96
3,298,380 >>> mbox cmd response data (56 bytes)
3,298,381 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,686 UART: [rt]cmd =0x47544744, len=8
3,330,470 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,247 UART: [kat] ++
895,399 UART: [kat] sha1
899,769 UART: [kat] SHA2-256
901,709 UART: [kat] SHA2-384
904,270 UART: [kat] SHA2-512-ACC
906,171 UART: [kat] ECC-384
915,720 UART: [kat] HMAC-384Kdf
920,270 UART: [kat] LMS
1,168,582 UART: [kat] --
1,169,523 UART: [cold-reset] ++
1,170,027 UART: [fht] FHT @ 0x50003400
1,172,637 UART: [idev] ++
1,172,805 UART: [idev] CDI.KEYID = 6
1,173,166 UART: [idev] SUBJECT.KEYID = 7
1,173,591 UART: [idev] UDS.KEYID = 0
1,173,937 ready_for_fw is high
1,173,937 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,475 UART: [idev] Erasing UDS.KEYID = 0
1,198,111 UART: [idev] Sha1 KeyId Algorithm
1,206,983 UART: [idev] --
1,207,934 UART: [ldev] ++
1,208,102 UART: [ldev] CDI.KEYID = 6
1,208,466 UART: [ldev] SUBJECT.KEYID = 5
1,208,893 UART: [ldev] AUTHORITY.KEYID = 7
1,209,356 UART: [ldev] FE.KEYID = 1
1,214,778 UART: [ldev] Erasing FE.KEYID = 1
1,241,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,100 UART: [ldev] --
1,280,484 UART: [fwproc] Wait for Commands...
1,281,281 UART: [fwproc] Recv command 0x46574c44
1,282,014 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,884 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,193 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,931 >>> mbox cmd response: success
2,772,931 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,773,970 UART: [afmc] ++
2,774,138 UART: [afmc] CDI.KEYID = 6
2,774,501 UART: [afmc] SUBJECT.KEYID = 7
2,774,927 UART: [afmc] AUTHORITY.KEYID = 5
2,810,078 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,194 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,945 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,674 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,557 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,276 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,065 UART: [afmc] --
2,853,045 UART: [cold-reset] --
2,854,145 UART: [state] Locking Datavault
2,855,330 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,934 UART: [state] Locking ICCM
2,856,600 UART: [exit] Launching FMC @ 0x40000130
2,861,929 UART:
2,861,945 UART: Running Caliptra FMC ...
2,862,353 UART:
2,862,407 UART: [state] CFI Enabled
2,872,966 UART: [fht] FMC Alias Private Key: 7
2,981,027 UART: [art] Extend RT PCRs Done
2,981,455 UART: [art] Lock RT PCRs Done
2,982,967 UART: [art] Populate DV Done
2,990,974 UART: [fht] FMC Alias Private Key: 7
2,992,138 UART: [art] Derive CDI
2,992,418 UART: [art] Store in in slot 0x4
3,078,247 UART: [art] Derive Key Pair
3,078,607 UART: [art] Store priv key in slot 0x5
3,091,341 UART: [art] Derive Key Pair - Done
3,105,889 UART: [art] Signing Cert with AUTHO
3,106,369 UART: RITY.KEYID = 7
3,121,189 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,954 UART: [art] PUB.X = A120B61575ED15BA27AB8A4E8C6251AFF3C29EB5A8D3BD923B33CC20CCCF16CB24FFB986C1DEA6472E29E7AF65A0DA31
3,128,750 UART: [art] PUB.Y = A54CFB8B40B051F148617C2042EA93C3B7D5A690666A669B226D81530556918709EDC1B10F2B119B22AE3405038F71C2
3,135,679 UART: [art] SIG.R = 973EBF89B3B51E3F94976181C1A7B177D52AF229AD54E1B8DC632BBFBA99A74F24408D9C9B0D34F8C62632359FFCD6DA
3,142,460 UART: [art] SIG.S = ED6D6172971B84DCCF6465F4D689E31C34C8CD688D05D0F46C15FF4A5B9F9368630EF69689E4F7D262DECE9F0F26DF97
3,166,502 UART: Caliptra RT
3,166,755 UART: [state] CFI Enabled
3,274,241 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,947 UART: [rt]cmd =0x44504543, len=96
3,341,259 >>> mbox cmd response data (56 bytes)
3,341,260 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,370,775 UART: [rt]cmd =0x54514754, len=24
3,372,643 >>> mbox cmd response: failed
3,372,643 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,045 UART: [rt]cmd =0x54514754, len=24
3,404,155 >>> mbox cmd response data (8 bytes)
3,404,156 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,983 UART: [rt]cmd =0x44504543, len=96
3,470,884 >>> mbox cmd response data (56 bytes)
3,470,885 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,500,468 UART: [rt]cmd =0x47544744, len=8
3,502,720 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,396 ready_for_fw is high
1,056,396 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,981 >>> mbox cmd response: success
2,621,981 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,684,463 UART:
2,684,479 UART: Running Caliptra FMC ...
2,684,887 UART:
2,684,941 UART: [state] CFI Enabled
2,695,166 UART: [fht] FMC Alias Private Key: 7
2,803,867 UART: [art] Extend RT PCRs Done
2,804,295 UART: [art] Lock RT PCRs Done
2,805,491 UART: [art] Populate DV Done
2,813,404 UART: [fht] FMC Alias Private Key: 7
2,814,568 UART: [art] Derive CDI
2,814,848 UART: [art] Store in in slot 0x4
2,900,289 UART: [art] Derive Key Pair
2,900,649 UART: [art] Store priv key in slot 0x5
2,913,875 UART: [art] Derive Key Pair - Done
2,928,472 UART: [art] Signing Cert with AUTHO
2,928,952 UART: RITY.KEYID = 7
2,944,034 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,799 UART: [art] PUB.X = 6ACE2DA122259A13EE224615742FA0F2C7909ED65FE1656E81EC647C81800BF0DA84B8A065F0B998D196724EF86A6A1A
2,951,572 UART: [art] PUB.Y = 9AFB5B857A6082F54F4C74C054C7EC8D29099699E4D6414BD3EDC3C0A2D512DBFFAD2B115B07807E34320348BD8AB052
2,958,523 UART: [art] SIG.R = D82C181FC6732F9BED942C519193967FDFDDEDC01856465609BDF636B218972F70FAA98F024CD4583F4666A510BC1225
2,965,289 UART: [art] SIG.S = 564BBEC4B7003DA93C808DD99027228C282BB9038713A1D7075011C865ECBD9CC2BB49F5E2717E3D83A4661F50B005A3
2,989,331 UART: Caliptra RT
2,989,584 UART: [state] CFI Enabled
3,096,895 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,379 UART: [rt]cmd =0x44504543, len=96
3,164,377 >>> mbox cmd response data (56 bytes)
3,164,378 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,193,961 UART: [rt]cmd =0x54514754, len=24
3,195,929 >>> mbox cmd response: failed
3,195,929 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,397 UART: [rt]cmd =0x54514754, len=24
3,227,471 >>> mbox cmd response data (8 bytes)
3,227,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,257,495 UART: [rt]cmd =0x44504543, len=96
3,294,222 >>> mbox cmd response data (56 bytes)
3,294,223 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,674 UART: [rt]cmd =0x47544744, len=8
3,325,876 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Unprovisioned
85,814 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,382 UART: [kat] ++
895,534 UART: [kat] sha1
899,784 UART: [kat] SHA2-256
901,724 UART: [kat] SHA2-384
904,317 UART: [kat] SHA2-512-ACC
906,218 UART: [kat] ECC-384
916,079 UART: [kat] HMAC-384Kdf
920,883 UART: [kat] LMS
1,169,195 UART: [kat] --
1,170,228 UART: [cold-reset] ++
1,170,616 UART: [fht] FHT @ 0x50003400
1,173,330 UART: [idev] ++
1,173,498 UART: [idev] CDI.KEYID = 6
1,173,859 UART: [idev] SUBJECT.KEYID = 7
1,174,284 UART: [idev] UDS.KEYID = 0
1,174,630 ready_for_fw is high
1,174,630 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,554 UART: [idev] Erasing UDS.KEYID = 0
1,199,690 UART: [idev] Sha1 KeyId Algorithm
1,208,574 UART: [idev] --
1,209,787 UART: [ldev] ++
1,209,955 UART: [ldev] CDI.KEYID = 6
1,210,319 UART: [ldev] SUBJECT.KEYID = 5
1,210,746 UART: [ldev] AUTHORITY.KEYID = 7
1,211,209 UART: [ldev] FE.KEYID = 1
1,216,505 UART: [ldev] Erasing FE.KEYID = 1
1,243,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,189 UART: [ldev] --
1,282,573 UART: [fwproc] Wait for Commands...
1,283,162 UART: [fwproc] Recv command 0x46574c44
1,283,895 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,673 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,037 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,346 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,168 >>> mbox cmd response: success
2,773,168 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,774,267 UART: [afmc] ++
2,774,435 UART: [afmc] CDI.KEYID = 6
2,774,798 UART: [afmc] SUBJECT.KEYID = 7
2,775,224 UART: [afmc] AUTHORITY.KEYID = 5
2,811,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,383 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,134 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,863 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,746 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,465 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,326 UART: [afmc] --
2,854,392 UART: [cold-reset] --
2,855,404 UART: [state] Locking Datavault
2,856,431 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,035 UART: [state] Locking ICCM
2,857,653 UART: [exit] Launching FMC @ 0x40000130
2,862,982 UART:
2,862,998 UART: Running Caliptra FMC ...
2,863,406 UART:
2,863,549 UART: [state] CFI Enabled
2,874,208 UART: [fht] FMC Alias Private Key: 7
2,981,557 UART: [art] Extend RT PCRs Done
2,981,985 UART: [art] Lock RT PCRs Done
2,983,425 UART: [art] Populate DV Done
2,991,576 UART: [fht] FMC Alias Private Key: 7
2,992,604 UART: [art] Derive CDI
2,992,884 UART: [art] Store in in slot 0x4
3,078,773 UART: [art] Derive Key Pair
3,079,133 UART: [art] Store priv key in slot 0x5
3,092,251 UART: [art] Derive Key Pair - Done
3,106,996 UART: [art] Signing Cert with AUTHO
3,107,476 UART: RITY.KEYID = 7
3,122,786 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,551 UART: [art] PUB.X = 90C2184A19692A3307790868A9EEDE74B90DFEA6163FFBA59F304D40151E9D04DE40761CA8D3684970CD1042EDABF686
3,130,313 UART: [art] PUB.Y = C5E1C8AC17118DD0DD8AFBAA2DC6E53D7E7B3F40585CAE19A37CB586D4BC0EEC22F5DBBB585D283F7E82E358DE9E1490
3,137,288 UART: [art] SIG.R = 4804CDC863A30C65D3531B7B4C4F83A39E81642BEC53275C5DF554B5588793FCE146C8BC74215BC9FD0C18AEAD374969
3,144,055 UART: [art] SIG.S = AB1033069873DB0CB009C2E1A25BECB3DB001F3AC4E8937B01F661E6C7E5D0A17C1DDF550835D66A48AD431B7E28E3AD
3,168,029 UART: Caliptra RT
3,168,374 UART: [state] CFI Enabled
3,276,637 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,917 UART: [rt]cmd =0x44504543, len=96
3,343,465 >>> mbox cmd response data (56 bytes)
3,343,466 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,373,107 UART: [rt]cmd =0x54514754, len=24
3,374,971 >>> mbox cmd response: failed
3,374,971 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,571 UART: [rt]cmd =0x54514754, len=24
3,406,669 >>> mbox cmd response data (8 bytes)
3,406,670 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,619 UART: [rt]cmd =0x44504543, len=96
3,473,824 >>> mbox cmd response data (56 bytes)
3,473,825 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,162 UART: [rt]cmd =0x47544744, len=8
3,505,648 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,991 ready_for_fw is high
1,055,991 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,486 >>> mbox cmd response: success
2,623,486 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,685,756 UART:
2,685,772 UART: Running Caliptra FMC ...
2,686,180 UART:
2,686,323 UART: [state] CFI Enabled
2,696,990 UART: [fht] FMC Alias Private Key: 7
2,805,251 UART: [art] Extend RT PCRs Done
2,805,679 UART: [art] Lock RT PCRs Done
2,807,647 UART: [art] Populate DV Done
2,815,872 UART: [fht] FMC Alias Private Key: 7
2,817,028 UART: [art] Derive CDI
2,817,308 UART: [art] Store in in slot 0x4
2,903,299 UART: [art] Derive Key Pair
2,903,659 UART: [art] Store priv key in slot 0x5
2,917,315 UART: [art] Derive Key Pair - Done
2,932,227 UART: [art] Signing Cert with AUTHO
2,932,707 UART: RITY.KEYID = 7
2,947,505 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,270 UART: [art] PUB.X = AEF4E5F10F5E8EA2B1873B83F4030D52646F272B52B9A505870A509710D1BA8C2DF03868B164C06238AEE2534EFF6110
2,955,027 UART: [art] PUB.Y = 9BBE13C3076596DF938839FF175DC728F68A2A0C915CECFA79376CDF8B12B2321023ECE33207C35CA36B918A32700E6F
2,961,971 UART: [art] SIG.R = C9C6A0C1C9403F7EC6AF28534F1469A0126743174B571A9A32777267654ED77AF530E13FE2511314004E9F00A3C017F0
2,968,689 UART: [art] SIG.S = 5224958AA0063DE24FCF0630B5E2F67469ECCE9D02263330FFB81C1C2997E7531110B590F77A3F90DEE7C3EEDCFB5CAF
2,992,309 UART: Caliptra RT
2,992,654 UART: [state] CFI Enabled
3,100,019 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,077 UART: [rt]cmd =0x44504543, len=96
3,167,655 >>> mbox cmd response data (56 bytes)
3,167,656 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,197,131 UART: [rt]cmd =0x54514754, len=24
3,199,159 >>> mbox cmd response: failed
3,199,159 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,509 UART: [rt]cmd =0x54514754, len=24
3,230,755 >>> mbox cmd response data (8 bytes)
3,230,756 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,260,601 UART: [rt]cmd =0x44504543, len=96
3,296,756 >>> mbox cmd response data (56 bytes)
3,296,757 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,114 UART: [rt]cmd =0x47544744, len=8
3,328,396 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,659 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,255 UART: [kat] SHA2-256
882,186 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,301 UART: [kat] ++
886,453 UART: [kat] sha1
890,903 UART: [kat] SHA2-256
892,841 UART: [kat] SHA2-384
895,620 UART: [kat] SHA2-512-ACC
897,521 UART: [kat] ECC-384
903,156 UART: [kat] HMAC-384Kdf
907,678 UART: [kat] LMS
1,475,874 UART: [kat] --
1,476,541 UART: [cold-reset] ++
1,476,897 UART: [fht] Storing FHT @ 0x50003400
1,479,646 UART: [idev] ++
1,479,814 UART: [idev] CDI.KEYID = 6
1,480,174 UART: [idev] SUBJECT.KEYID = 7
1,480,598 UART: [idev] UDS.KEYID = 0
1,480,943 ready_for_fw is high
1,480,943 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,356 UART: [idev] Erasing UDS.KEYID = 0
1,504,726 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,512 UART: [idev] --
1,514,441 UART: [ldev] ++
1,514,609 UART: [ldev] CDI.KEYID = 6
1,514,972 UART: [ldev] SUBJECT.KEYID = 5
1,515,398 UART: [ldev] AUTHORITY.KEYID = 7
1,515,861 UART: [ldev] FE.KEYID = 1
1,520,901 UART: [ldev] Erasing FE.KEYID = 1
1,546,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,012 UART: [ldev] --
1,585,463 UART: [fwproc] Waiting for Commands...
1,586,188 UART: [fwproc] Received command 0x46574c44
1,586,979 UART: [fwproc] Received Image of size 78704 bytes
2,477,901 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,037 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,389 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,616,886 >>> mbox cmd response: success
2,616,886 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,618,048 UART: [afmc] ++
2,618,216 UART: [afmc] CDI.KEYID = 6
2,618,578 UART: [afmc] SUBJECT.KEYID = 7
2,619,003 UART: [afmc] AUTHORITY.KEYID = 5
2,654,240 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,570 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,350 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,078 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,963 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,653 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,372 UART: [afmc] --
2,697,282 UART: [cold-reset] --
2,698,154 UART: [state] Locking Datavault
2,699,445 UART: [state] Locking PCR0, PCR1 and PCR31
2,700,049 UART: [state] Locking ICCM
2,700,511 UART: [exit] Launching FMC @ 0x40000130
2,705,840 UART:
2,705,856 UART: Running Caliptra FMC ...
2,706,264 UART:
2,706,318 UART: [state] CFI Enabled
2,717,069 UART: [fht] FMC Alias Private Key: 7
2,824,838 UART: [art] Extend RT PCRs Done
2,825,266 UART: [art] Lock RT PCRs Done
2,826,864 UART: [art] Populate DV Done
2,835,039 UART: [fht] FMC Alias Private Key: 7
2,836,061 UART: [art] Derive CDI
2,836,341 UART: [art] Store in in slot 0x4
2,921,862 UART: [art] Derive Key Pair
2,922,222 UART: [art] Store priv key in slot 0x5
2,935,536 UART: [art] Derive Key Pair - Done
2,950,365 UART: [art] Signing Cert with AUTHO
2,950,845 UART: RITY.KEYID = 7
2,965,891 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,656 UART: [art] PUB.X = 89865F9177FCAC21E7008BA5DE1F9F3D0400EE48B4C8FEFE521B37741E2B41816D1F708E262063E95FC834F6568B2A90
2,973,383 UART: [art] PUB.Y = 6727D625519651A14B4E9CD5B608B990830FFA955E1DD43861A47B463C1D8533B2F80C86D9FBE61DDA9E31BDB74A93C0
2,980,330 UART: [art] SIG.R = FB3AA0B60B47F7B2E1D58D5170AA8977A6FC0C74E6BF4B241DC1367A5D24823ACAFA9D85526E6A8452E697195881F4EE
2,987,106 UART: [art] SIG.S = 35DBBB62A4BC8E921D4556AFE8C61D1ED57C6FB0EE4EE08860C1EB8A5BE39ABAB82C0A1201AA64EB5A8C121CE3B01FCA
3,011,071 UART: mbox::rt_entry...
3,011,443 UART: ____ _ _ _ ____ _____
3,012,227 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,013,027 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,013,795 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,014,563 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,015,331 UART: |_|
3,015,643 UART:
3,123,139 UART: [rt] Runtime listening for mailbox commands...
3,124,073 >>> mbox cmd response data (0 bytes)
3,124,074 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,124,188 UART:
3,124,204 UART: Running Caliptra ROM ...
3,124,612 UART:
3,124,666 UART: [state] CFI Enabled
3,127,198 UART: [state] LifecycleState = Unprovisioned
3,127,853 UART: [state] DebugLocked = No
3,128,565 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,130,280 UART: [kat] SHA2-256
3,924,211 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,928,326 UART: [kat] ++
3,928,478 UART: [kat] sha1
3,932,596 UART: [kat] SHA2-256
3,934,534 UART: [kat] SHA2-384
3,937,189 UART: [kat] SHA2-512-ACC
3,939,089 UART: [kat] ECC-384
3,944,604 UART: [kat] HMAC-384Kdf
3,949,134 UART: [kat] LMS
4,517,330 UART: [kat] --
4,518,149 UART: [update-reset] ++
5,852,729 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,853,839 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,003,715 >>> mbox cmd response: success
6,003,838 UART: [update-reset] Copying MAN_2 To MAN_1
6,011,852 UART: [update-reset Success] --
6,012,699 UART: [state] Locking Datavault
6,013,531 UART: [state] Locking PCR0, PCR1 and PCR31
6,014,135 UART: [state] Locking ICCM
6,014,567 UART: [exit] Launching FMC @ 0x40000130
6,019,896 UART:
6,019,912 UART: Running Caliptra FMC ...
6,020,320 UART:
6,020,374 UART: [state] CFI Enabled
6,109,131 UART: [art] Extend RT PCRs Done
6,109,559 UART: [art] Lock RT PCRs Done
6,110,706 UART: [art] Populate DV Done
6,118,707 UART: [fht] FMC Alias Private Key: 7
6,119,663 UART: [art] Derive CDI
6,119,943 UART: [art] Store in in slot 0x4
6,205,286 UART: [art] Derive Key Pair
6,205,646 UART: [art] Store priv key in slot 0x5
6,218,392 UART: [art] Derive Key Pair - Done
6,232,912 UART: [art] Signing Cert with AUTHO
6,233,392 UART: RITY.KEYID = 7
6,248,198 UART: [art] Erasing AUTHORITY.KEYID = 7
6,248,963 UART: [art] PUB.X = 706C8563CD1B3D2A2069A630A05D51DBB7C4E3B7CDB30B7DD3132727EE2AAC6FDFE8F7ED64FA5F3E9C2B41F856C47F22
6,255,752 UART: [art] PUB.Y = 45737AC501FEADD6264071A3FDCC9FFC9159838C2410AF2E4B464059C79D59F1E42A7020D8FC97CA7DF06CAE894A5838
6,262,709 UART: [art] SIG.R = 7F2094442F7F6D05091AD3604197DFB1F2667B1E54CAE7BAAC063F7F94AB6547A7250DCBF5C850561A5B1046DC9FB052
6,269,475 UART: [art] SIG.S = 119DC1EAEF46C03C3B226E60EF782FB9A77B790CE6438F9BBA9FA796ACB3E3700C4A110CF83DA2868F827ACB45EABA06
6,293,604 UART: Caliptra RT
6,293,857 UART: [state] CFI Enabled
6,574,902 UART: [rt] RT failed reset flow
6,575,333 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,123 ready_for_fw is high
1,362,123 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,466,436 >>> mbox cmd response: success
2,466,436 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,528,242 UART:
2,528,258 UART: Running Caliptra FMC ...
2,528,666 UART:
2,528,720 UART: [state] CFI Enabled
2,539,245 UART: [fht] FMC Alias Private Key: 7
2,647,006 UART: [art] Extend RT PCRs Done
2,647,434 UART: [art] Lock RT PCRs Done
2,648,996 UART: [art] Populate DV Done
2,657,313 UART: [fht] FMC Alias Private Key: 7
2,658,493 UART: [art] Derive CDI
2,658,773 UART: [art] Store in in slot 0x4
2,744,084 UART: [art] Derive Key Pair
2,744,444 UART: [art] Store priv key in slot 0x5
2,757,240 UART: [art] Derive Key Pair - Done
2,771,711 UART: [art] Signing Cert with AUTHO
2,772,191 UART: RITY.KEYID = 7
2,787,239 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,004 UART: [art] PUB.X = 06538AE6146287EA9AE957252FEAED5D1B76E0D8064AA03F111DA5F1067BDB5C24E2A7B08FEA04757EB4288FC028D98B
2,794,774 UART: [art] PUB.Y = DDD8B3BF3D03410AAC6B65B32D73F1CFC5AF05896B5112E62653B1D9E0CE54422FC217DE6D1B56F0539B1C117CDB9EC8
2,801,733 UART: [art] SIG.R = 170E72702745AF3B30D2E6D866CD29577D3C88F756EE8DBE6FC6AC88FFE4715F1D805FCC6A10221E92C5B4C4520CDB8B
2,808,511 UART: [art] SIG.S = A23B66B81B44A72F69C08798BBB8DE5471B123A44711A1D2B99006D9E59957561ABE5A9BC59BC3029F92977D5ECDD13D
2,831,898 UART: mbox::rt_entry...
2,832,270 UART: ____ _ _ _ ____ _____
2,833,054 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,833,854 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,834,622 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,835,390 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,836,158 UART: |_|
2,836,470 UART:
2,942,866 UART: [rt] Runtime listening for mailbox commands...
2,943,800 >>> mbox cmd response data (0 bytes)
2,943,801 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,705,576 >>> mbox cmd response: success
5,719,187 UART:
5,719,203 UART: Running Caliptra FMC ...
5,719,611 UART:
5,719,665 UART: [state] CFI Enabled
5,808,650 UART: [art] Extend RT PCRs Done
5,809,078 UART: [art] Lock RT PCRs Done
5,810,245 UART: [art] Populate DV Done
5,818,634 UART: [fht] FMC Alias Private Key: 7
5,819,600 UART: [art] Derive CDI
5,819,880 UART: [art] Store in in slot 0x4
5,905,527 UART: [art] Derive Key Pair
5,905,887 UART: [art] Store priv key in slot 0x5
5,918,593 UART: [art] Derive Key Pair - Done
5,933,497 UART: [art] Signing Cert with AUTHO
5,933,977 UART: RITY.KEYID = 7
5,949,585 UART: [art] Erasing AUTHORITY.KEYID = 7
5,950,350 UART: [art] PUB.X = BD2AAB3D00B8EB329FFAAA2FB07EE4A27675FB6E188CA544DD07B0F1F4F6E197D5A9C74AED0BC420E9A076FE6C22775A
5,957,120 UART: [art] PUB.Y = 2CA1C0AF627852FF1B2738AFFDEB344B1FBF86DD2033C1B0831E25A6ED4CB003EFCE2277D4520A010727B5291FDCAF79
5,964,076 UART: [art] SIG.R = A23863DAB299D741030B16F7F0161204B788F329D793BFB220C572B54F765F7B14419D9A9B58545D62A68AD0517B1B96
5,970,831 UART: [art] SIG.S = B401D3E61115A7E611331F2E1D567D3E7DB2FF7A6601424197A78BC0B56A295DE0A712F412CA40825FE6D5DB4B14BAA0
5,994,810 UART: Caliptra RT
5,995,063 UART: [state] CFI Enabled
6,274,430 UART: [rt] RT failed reset flow
6,274,861 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,833 UART: [state] LifecycleState = Unprovisioned
86,488 UART: [state] DebugLocked = No
87,106 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,630 UART: [kat] SHA2-256
882,561 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,676 UART: [kat] ++
886,828 UART: [kat] sha1
890,870 UART: [kat] SHA2-256
892,808 UART: [kat] SHA2-384
895,539 UART: [kat] SHA2-512-ACC
897,440 UART: [kat] ECC-384
902,925 UART: [kat] HMAC-384Kdf
907,449 UART: [kat] LMS
1,475,645 UART: [kat] --
1,476,362 UART: [cold-reset] ++
1,476,834 UART: [fht] Storing FHT @ 0x50003400
1,479,579 UART: [idev] ++
1,479,747 UART: [idev] CDI.KEYID = 6
1,480,107 UART: [idev] SUBJECT.KEYID = 7
1,480,531 UART: [idev] UDS.KEYID = 0
1,480,876 ready_for_fw is high
1,480,876 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,961 UART: [idev] Erasing UDS.KEYID = 0
1,505,655 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,261 UART: [idev] --
1,515,368 UART: [ldev] ++
1,515,536 UART: [ldev] CDI.KEYID = 6
1,515,899 UART: [ldev] SUBJECT.KEYID = 5
1,516,325 UART: [ldev] AUTHORITY.KEYID = 7
1,516,788 UART: [ldev] FE.KEYID = 1
1,521,970 UART: [ldev] Erasing FE.KEYID = 1
1,547,337 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,273 UART: [ldev] --
1,586,660 UART: [fwproc] Waiting for Commands...
1,587,365 UART: [fwproc] Received command 0x46574c44
1,588,156 UART: [fwproc] Received Image of size 78704 bytes
2,478,630 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,770 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,535,122 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,479 >>> mbox cmd response: success
2,617,479 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,618,569 UART: [afmc] ++
2,618,737 UART: [afmc] CDI.KEYID = 6
2,619,099 UART: [afmc] SUBJECT.KEYID = 7
2,619,524 UART: [afmc] AUTHORITY.KEYID = 5
2,655,469 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,672,121 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,672,901 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,678,629 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,684,514 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,690,204 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,698,089 UART: [afmc] --
2,699,159 UART: [cold-reset] --
2,700,005 UART: [state] Locking Datavault
2,701,308 UART: [state] Locking PCR0, PCR1 and PCR31
2,701,912 UART: [state] Locking ICCM
2,702,390 UART: [exit] Launching FMC @ 0x40000130
2,707,719 UART:
2,707,735 UART: Running Caliptra FMC ...
2,708,143 UART:
2,708,286 UART: [state] CFI Enabled
2,718,721 UART: [fht] FMC Alias Private Key: 7
2,826,636 UART: [art] Extend RT PCRs Done
2,827,064 UART: [art] Lock RT PCRs Done
2,828,532 UART: [art] Populate DV Done
2,836,801 UART: [fht] FMC Alias Private Key: 7
2,837,937 UART: [art] Derive CDI
2,838,217 UART: [art] Store in in slot 0x4
2,924,020 UART: [art] Derive Key Pair
2,924,380 UART: [art] Store priv key in slot 0x5
2,937,194 UART: [art] Derive Key Pair - Done
2,952,113 UART: [art] Signing Cert with AUTHO
2,952,593 UART: RITY.KEYID = 7
2,967,957 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,722 UART: [art] PUB.X = 5E5662C74160F8CE8B732387D9FEAFC1256EAB5501BB7C45F0FA01B14CACBED457D78AD78DD3DD81B1D23C24D7AC39B1
2,975,508 UART: [art] PUB.Y = BEFBB3EE4A2950657A122F4EF12DCBDFF221B45241D0D2BDFC78C6B2AB5D6C04DFB76E2983879FE6E3630B9A41230089
2,982,448 UART: [art] SIG.R = C07033159F3DBB5A02335A5191829754A1C81585D716A45F97E0173ACDE08E790FF1ED6E11F16099CD70C3F568C4FD72
2,989,212 UART: [art] SIG.S = C5715AC63D6E80EAF68AEC8670BA6E745C7636228B7B67C65C7EF498B2BA9CC64DF5A64965E47EBBA24E7A07F6A1AA99
3,012,864 UART: mbox::rt_entry...
3,013,236 UART: ____ _ _ _ ____ _____
3,014,020 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,014,820 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,015,588 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,016,356 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,017,124 UART: |_|
3,017,436 UART:
3,124,993 UART: [rt] Runtime listening for mailbox commands...
3,125,927 >>> mbox cmd response data (0 bytes)
3,125,928 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,126,042 UART:
3,126,058 UART: Running Caliptra ROM ...
3,126,466 UART:
3,126,607 UART: [state] CFI Enabled
3,129,127 UART: [state] LifecycleState = Unprovisioned
3,129,782 UART: [state] DebugLocked = No
3,130,288 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,131,893 UART: [kat] SHA2-256
3,925,824 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,929,939 UART: [kat] ++
3,930,091 UART: [kat] sha1
3,934,425 UART: [kat] SHA2-256
3,936,363 UART: [kat] SHA2-384
3,939,000 UART: [kat] SHA2-512-ACC
3,940,900 UART: [kat] ECC-384
3,946,501 UART: [kat] HMAC-384Kdf
3,951,191 UART: [kat] LMS
4,519,387 UART: [kat] --
4,520,268 UART: [update-reset] ++
5,855,774 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,856,970 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,006,846 >>> mbox cmd response: success
6,007,067 UART: [update-reset] Copying MAN_2 To MAN_1
6,015,081 UART: [update-reset Success] --
6,016,022 UART: [state] Locking Datavault
6,016,912 UART: [state] Locking PCR0, PCR1 and PCR31
6,017,516 UART: [state] Locking ICCM
6,017,996 UART: [exit] Launching FMC @ 0x40000130
6,023,325 UART:
6,023,341 UART: Running Caliptra FMC ...
6,023,749 UART:
6,023,892 UART: [state] CFI Enabled
6,113,435 UART: [art] Extend RT PCRs Done
6,113,863 UART: [art] Lock RT PCRs Done
6,115,362 UART: [art] Populate DV Done
6,123,683 UART: [fht] FMC Alias Private Key: 7
6,124,849 UART: [art] Derive CDI
6,125,129 UART: [art] Store in in slot 0x4
6,210,672 UART: [art] Derive Key Pair
6,211,032 UART: [art] Store priv key in slot 0x5
6,224,608 UART: [art] Derive Key Pair - Done
6,239,779 UART: [art] Signing Cert with AUTHO
6,240,259 UART: RITY.KEYID = 7
6,255,551 UART: [art] Erasing AUTHORITY.KEYID = 7
6,256,316 UART: [art] PUB.X = 5DE107FFFDD8CADB84C5EB44BACA3341761AC9E56BA5635EB4158A7FF5C680CBC016B38601ADDA1C5F2F159528596A42
6,263,100 UART: [art] PUB.Y = B5A02FEECABBEB1DE415A6B540CC326734938F34EC39EEB45121AF5E547A1CB8FC475BEC6521D0F418F84B6694EBE4FD
6,270,074 UART: [art] SIG.R = 153B2C5F7CC425907E4D96CBF042BD190EA56A98FB87E30BA61E5C4FA27849D1913FF255B5E8A67E1D7845B07998DA96
6,276,846 UART: [art] SIG.S = 16EAC6B0B6BD7BDD516C39CE4054880B1AC5977EC09A24B8FC890BC7D5AC05A8E5879BBE26AA38AFE3502A34BDE7B35A
6,300,380 UART: Caliptra RT
6,300,725 UART: [state] CFI Enabled
6,583,768 UART: [rt] RT failed reset flow
6,584,199 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,952 ready_for_fw is high
1,362,952 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,466,271 >>> mbox cmd response: success
2,466,271 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,527,977 UART:
2,527,993 UART: Running Caliptra FMC ...
2,528,401 UART:
2,528,544 UART: [state] CFI Enabled
2,539,431 UART: [fht] FMC Alias Private Key: 7
2,647,924 UART: [art] Extend RT PCRs Done
2,648,352 UART: [art] Lock RT PCRs Done
2,649,720 UART: [art] Populate DV Done
2,657,817 UART: [fht] FMC Alias Private Key: 7
2,658,755 UART: [art] Derive CDI
2,659,035 UART: [art] Store in in slot 0x4
2,744,500 UART: [art] Derive Key Pair
2,744,860 UART: [art] Store priv key in slot 0x5
2,758,154 UART: [art] Derive Key Pair - Done
2,773,031 UART: [art] Signing Cert with AUTHO
2,773,511 UART: RITY.KEYID = 7
2,788,677 UART: [art] Erasing AUTHORITY.KEYID = 7
2,789,442 UART: [art] PUB.X = AC3D80A2C36A9C2C7A46F65DCF27FEA0920D42387DAF04BE5F57277682941BCB40EF8287B50932FBFC2226044FE77C8C
2,796,212 UART: [art] PUB.Y = 47589BC3EE5C3D2192BC015FEFC89F32D8991ADCE6E3A67C05DF3E4CD61436B067E41C51769E4BE2ED821717C3C6B32A
2,803,170 UART: [art] SIG.R = 559CEC857D699B917ED836D366313120C72F82BEDDC4BE278E9F56716362806E27A3D4C46396014BECE42E38732A58AA
2,809,937 UART: [art] SIG.S = 38AB9513F0553390069E2973F87F4489464D4A1C60E64052A3A9B5A3BB3EAF36EF42AA918D925E37B29BE299BB59EEB9
2,834,469 UART: mbox::rt_entry...
2,834,841 UART: ____ _ _ _ ____ _____
2,835,625 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,836,425 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,837,193 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,837,961 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,838,729 UART: |_|
2,839,041 UART:
2,945,840 UART: [rt] Runtime listening for mailbox commands...
2,946,774 >>> mbox cmd response data (0 bytes)
2,946,775 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,709,569 >>> mbox cmd response: success
5,722,922 UART:
5,722,938 UART: Running Caliptra FMC ...
5,723,346 UART:
5,723,489 UART: [state] CFI Enabled
5,813,034 UART: [art] Extend RT PCRs Done
5,813,462 UART: [art] Lock RT PCRs Done
5,814,983 UART: [art] Populate DV Done
5,823,004 UART: [fht] FMC Alias Private Key: 7
5,824,168 UART: [art] Derive CDI
5,824,448 UART: [art] Store in in slot 0x4
5,909,807 UART: [art] Derive Key Pair
5,910,167 UART: [art] Store priv key in slot 0x5
5,923,147 UART: [art] Derive Key Pair - Done
5,937,736 UART: [art] Signing Cert with AUTHO
5,938,216 UART: RITY.KEYID = 7
5,953,578 UART: [art] Erasing AUTHORITY.KEYID = 7
5,954,343 UART: [art] PUB.X = 55256780C49303930448A277F9437D82B5AF42E9FEDA37BD2FE081B744BE7F38243EF5EE72E5AF4E1AF5D7CC1F67F3F8
5,961,117 UART: [art] PUB.Y = DF811E6FA2DB01D0FE71B6676414AC7CEEBC92B5A282E42223DCFE5CAFB457FD9A1FD2961E0E647C141097656D2B6AA5
5,968,081 UART: [art] SIG.R = 720758D8127B52908A128CD18B9FA94258FF9D36474FF0B2CC0D39A4CAA23A1BB28C68B9270F1AF1FCC7F7E3F2962F1E
5,974,854 UART: [art] SIG.S = 19FAA0625E0A8526C6382A97F888130B5366C3B9E1C08DF8EE130F1A68EE7E49954D375440C584F61268EF26D7D55C3E
5,999,032 UART: Caliptra RT
5,999,377 UART: [state] CFI Enabled
6,279,490 UART: [rt] RT failed reset flow
6,279,921 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,727 UART: [state] WD Timer not started. Device not locked for debugging
87,906 UART: [kat] SHA2-256
893,556 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,681 UART: [kat] ++
897,833 UART: [kat] sha1
902,047 UART: [kat] SHA2-256
903,987 UART: [kat] SHA2-384
906,552 UART: [kat] SHA2-512-ACC
908,453 UART: [kat] ECC-384
918,268 UART: [kat] HMAC-384Kdf
922,820 UART: [kat] LMS
1,171,148 UART: [kat] --
1,172,027 UART: [cold-reset] ++
1,172,365 UART: [fht] FHT @ 0x50003400
1,175,036 UART: [idev] ++
1,175,204 UART: [idev] CDI.KEYID = 6
1,175,564 UART: [idev] SUBJECT.KEYID = 7
1,175,988 UART: [idev] UDS.KEYID = 0
1,176,333 ready_for_fw is high
1,176,333 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,244 UART: [idev] Erasing UDS.KEYID = 0
1,201,369 UART: [idev] Sha1 KeyId Algorithm
1,209,917 UART: [idev] --
1,210,975 UART: [ldev] ++
1,211,143 UART: [ldev] CDI.KEYID = 6
1,211,506 UART: [ldev] SUBJECT.KEYID = 5
1,211,932 UART: [ldev] AUTHORITY.KEYID = 7
1,212,395 UART: [ldev] FE.KEYID = 1
1,217,707 UART: [ldev] Erasing FE.KEYID = 1
1,243,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,229 UART: [ldev] --
1,282,618 UART: [fwproc] Wait for Commands...
1,283,266 UART: [fwproc] Recv command 0x46574c44
1,283,994 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,292 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,596 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,095 >>> mbox cmd response: success
2,313,095 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,314,355 UART: [afmc] ++
2,314,523 UART: [afmc] CDI.KEYID = 6
2,314,885 UART: [afmc] SUBJECT.KEYID = 7
2,315,310 UART: [afmc] AUTHORITY.KEYID = 5
2,350,585 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,040 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,788 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,516 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,401 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,120 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,040 UART: [afmc] --
2,393,952 UART: [cold-reset] --
2,395,138 UART: [state] Locking Datavault
2,396,509 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,113 UART: [state] Locking ICCM
2,397,763 UART: [exit] Launching FMC @ 0x40000130
2,403,092 UART:
2,403,108 UART: Running Caliptra FMC ...
2,403,516 UART:
2,403,570 UART: [state] CFI Enabled
2,413,801 UART: [fht] FMC Alias Private Key: 7
2,521,298 UART: [art] Extend RT PCRs Done
2,521,726 UART: [art] Lock RT PCRs Done
2,523,242 UART: [art] Populate DV Done
2,531,657 UART: [fht] FMC Alias Private Key: 7
2,532,617 UART: [art] Derive CDI
2,532,897 UART: [art] Store in in slot 0x4
2,618,826 UART: [art] Derive Key Pair
2,619,186 UART: [art] Store priv key in slot 0x5
2,632,902 UART: [art] Derive Key Pair - Done
2,647,350 UART: [art] Signing Cert with AUTHO
2,647,830 UART: RITY.KEYID = 7
2,663,112 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,877 UART: [art] PUB.X = A247A2F3E2C8573726DE7E030A4766086A21FB46593FCCD045318E92573D3AA6C55EE67B3FC45BCD24A0EF6C94E70992
2,670,641 UART: [art] PUB.Y = 376341C84A9D2E297910CE253C78617C20FFE20B46EB3EC348DFB038D1C4387A5D5BEFD7FDDADF496774A18D8FF302DC
2,677,601 UART: [art] SIG.R = 154E43C3B0C255FD8B3379B50C1C89BC4D010CBDBA15AE6DD2BBEC855308CCA5CB82D33798BA3133FAEB8C85D57C826F
2,684,381 UART: [art] SIG.S = DC49099CBCA989B69294EBCD9617B051EE4E6611B850F8DBE3FC568891E93ADE16C1FF5BD16C05B302C6C9E49363E208
2,708,090 UART: mbox::rt_entry...
2,708,462 UART: ____ _ _ _ ____ _____
2,709,246 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,046 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,814 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,582 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,350 UART: |_|
2,712,662 UART:
2,820,198 UART: [rt] Runtime listening for mailbox commands...
2,821,132 >>> mbox cmd response data (0 bytes)
2,821,133 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,821,244 UART:
2,821,260 UART: Running Caliptra ROM ...
2,821,668 UART:
2,821,723 UART: [state] CFI Enabled
2,824,633 UART: [state] LifecycleState = Unprovisioned
2,825,288 UART: [state] DebugLocked = No
2,825,802 UART: [state] WD Timer not started. Device not locked for debugging
2,827,100 UART: [kat] SHA2-256
3,632,750 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,636,875 UART: [kat] ++
3,637,027 UART: [kat] sha1
3,641,359 UART: [kat] SHA2-256
3,643,299 UART: [kat] SHA2-384
3,645,930 UART: [kat] SHA2-512-ACC
3,647,830 UART: [kat] ECC-384
3,657,813 UART: [kat] HMAC-384Kdf
3,662,379 UART: [kat] LMS
3,910,707 UART: [kat] --
3,911,643 UART: [update-reset] ++
5,224,609 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,225,774 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,375,598 >>> mbox cmd response: success
5,375,849 UART: [update-reset] Copying MAN_2 To MAN_1
5,383,863 UART: [update-reset Success] --
5,384,780 UART: [state] Locking Datavault
5,385,572 UART: [state] Locking PCR0, PCR1 and PCR31
5,386,176 UART: [state] Locking ICCM
5,386,652 UART: [exit] Launching FMC @ 0x40000130
5,391,981 UART:
5,391,997 UART: Running Caliptra FMC ...
5,392,405 UART:
5,392,459 UART: [state] CFI Enabled
5,481,638 UART: [art] Extend RT PCRs Done
5,482,066 UART: [art] Lock RT PCRs Done
5,483,535 UART: [art] Populate DV Done
5,491,770 UART: [fht] FMC Alias Private Key: 7
5,492,740 UART: [art] Derive CDI
5,493,020 UART: [art] Store in in slot 0x4
5,578,423 UART: [art] Derive Key Pair
5,578,783 UART: [art] Store priv key in slot 0x5
5,592,049 UART: [art] Derive Key Pair - Done
5,607,195 UART: [art] Signing Cert with AUTHO
5,607,675 UART: RITY.KEYID = 7
5,622,899 UART: [art] Erasing AUTHORITY.KEYID = 7
5,623,664 UART: [art] PUB.X = DBA60E2C40115E45B66942183EA9A0F159B23618B0D5233E1A3EAAA6B3AD01BF261324FAB2F15FA2E9978E3DDF6729E3
5,630,440 UART: [art] PUB.Y = 21F306B2CDCBA7301C98F027F8B0B6949E24BC797EC83B30EEEEEA92D1340BD8998F15E254CDF52F04E1AE53B437711A
5,637,395 UART: [art] SIG.R = FDA642703198818D1676FB3F32979293B293A5C40D868A21544D1BA5BB0BB6F9E2A5A2E65FB9A7B8736147987A3E2132
5,644,157 UART: [art] SIG.S = C1FBE74D8ABB5C791AF52F71242593A8B74D6E1AD8182C6179FC2E5C19C890936FF3DB4E9E6BCCA5AB203B3FDB43F569
5,668,066 UART: Caliptra RT
5,668,319 UART: [state] CFI Enabled
5,950,514 UART: [rt] RT failed reset flow
5,950,945 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,493 ready_for_fw is high
1,060,493 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,794 >>> mbox cmd response: success
2,165,794 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,228,090 UART:
2,228,106 UART: Running Caliptra FMC ...
2,228,514 UART:
2,228,568 UART: [state] CFI Enabled
2,239,019 UART: [fht] FMC Alias Private Key: 7
2,346,642 UART: [art] Extend RT PCRs Done
2,347,070 UART: [art] Lock RT PCRs Done
2,348,552 UART: [art] Populate DV Done
2,356,665 UART: [fht] FMC Alias Private Key: 7
2,357,823 UART: [art] Derive CDI
2,358,103 UART: [art] Store in in slot 0x4
2,444,094 UART: [art] Derive Key Pair
2,444,454 UART: [art] Store priv key in slot 0x5
2,457,940 UART: [art] Derive Key Pair - Done
2,472,774 UART: [art] Signing Cert with AUTHO
2,473,254 UART: RITY.KEYID = 7
2,488,454 UART: [art] Erasing AUTHORITY.KEYID = 7
2,489,219 UART: [art] PUB.X = F673C66046127C5D5DFC05EF4BE7313F8717B941B943A57E71F0389BCC698065EC4A09F107C3AEBFC975AE277248D73D
2,495,986 UART: [art] PUB.Y = D8FFC490B5FD1F9E56768D6F6317718C63C2811AED763D40ED0E907340386D4440424359E7EBAC7DB5F8ED15122E392B
2,502,937 UART: [art] SIG.R = 5D722C468FC01A246529BB5EA78329B7B95A34EF0766BB727C647C526E479C7367EDE0102F26F604E374561238D0E328
2,509,695 UART: [art] SIG.S = B5C30F02DDAC48297B0AA2B40B81C689BAAD3111759EBAB6FDE1B38CB390EEF9AF870157FDD99EA2577BB88D3504D404
2,533,373 UART: mbox::rt_entry...
2,533,745 UART: ____ _ _ _ ____ _____
2,534,529 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,535,329 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,536,097 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,865 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,537,633 UART: |_|
2,537,945 UART:
2,644,909 UART: [rt] Runtime listening for mailbox commands...
2,645,843 >>> mbox cmd response data (0 bytes)
2,645,844 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,082,672 >>> mbox cmd response: success
5,095,934 UART:
5,095,950 UART: Running Caliptra FMC ...
5,096,358 UART:
5,096,412 UART: [state] CFI Enabled
5,185,263 UART: [art] Extend RT PCRs Done
5,185,691 UART: [art] Lock RT PCRs Done
5,187,156 UART: [art] Populate DV Done
5,195,527 UART: [fht] FMC Alias Private Key: 7
5,196,701 UART: [art] Derive CDI
5,196,981 UART: [art] Store in in slot 0x4
5,283,204 UART: [art] Derive Key Pair
5,283,564 UART: [art] Store priv key in slot 0x5
5,296,688 UART: [art] Derive Key Pair - Done
5,311,383 UART: [art] Signing Cert with AUTHO
5,311,863 UART: RITY.KEYID = 7
5,326,691 UART: [art] Erasing AUTHORITY.KEYID = 7
5,327,456 UART: [art] PUB.X = 07CDEE32C5EA3878FF9B15F03844176C11C315EFFB51702BBC554D253F64291E851D9370260947B8B7B3A0B23D383FB7
5,334,222 UART: [art] PUB.Y = 23E6C04E22C1F2ACF64E7E90644FD63C4265EEB0A31B946569891489C99E9DA308F92C8F60F5BFE90BE501FABC653F64
5,341,173 UART: [art] SIG.R = 313BB41B161C3AEAC2F00B128A340DD8F2D5F7AADBD24DEF15DAFDD858690F67C3548673783C13BB81FBA7CB01981D1B
5,347,951 UART: [art] SIG.S = 768023E47BC95D10D65380A39B610058E4C10BA9273D86DE75B52C833770C254A9D603E6D7086A97CD219FD5F22C0866
5,371,992 UART: Caliptra RT
5,372,245 UART: [state] CFI Enabled
5,653,403 UART: [rt] RT failed reset flow
5,653,834 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,767 UART: [state] LifecycleState = Unprovisioned
86,422 UART: [state] DebugLocked = No
87,122 UART: [state] WD Timer not started. Device not locked for debugging
88,387 UART: [kat] SHA2-256
894,037 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,162 UART: [kat] ++
898,314 UART: [kat] sha1
902,610 UART: [kat] SHA2-256
904,550 UART: [kat] SHA2-384
907,301 UART: [kat] SHA2-512-ACC
909,202 UART: [kat] ECC-384
919,143 UART: [kat] HMAC-384Kdf
923,863 UART: [kat] LMS
1,172,191 UART: [kat] --
1,173,310 UART: [cold-reset] ++
1,173,750 UART: [fht] FHT @ 0x50003400
1,176,321 UART: [idev] ++
1,176,489 UART: [idev] CDI.KEYID = 6
1,176,849 UART: [idev] SUBJECT.KEYID = 7
1,177,273 UART: [idev] UDS.KEYID = 0
1,177,618 ready_for_fw is high
1,177,618 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,185,297 UART: [idev] Erasing UDS.KEYID = 0
1,202,302 UART: [idev] Sha1 KeyId Algorithm
1,210,770 UART: [idev] --
1,211,780 UART: [ldev] ++
1,211,948 UART: [ldev] CDI.KEYID = 6
1,212,311 UART: [ldev] SUBJECT.KEYID = 5
1,212,737 UART: [ldev] AUTHORITY.KEYID = 7
1,213,200 UART: [ldev] FE.KEYID = 1
1,218,374 UART: [ldev] Erasing FE.KEYID = 1
1,244,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,414 UART: [ldev] --
1,283,675 UART: [fwproc] Wait for Commands...
1,284,435 UART: [fwproc] Recv command 0x46574c44
1,285,163 UART: [fwproc] Recv'd Img size: 78704 bytes
2,176,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,203,173 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,232,477 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,314,936 >>> mbox cmd response: success
2,314,936 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,316,096 UART: [afmc] ++
2,316,264 UART: [afmc] CDI.KEYID = 6
2,316,626 UART: [afmc] SUBJECT.KEYID = 7
2,317,051 UART: [afmc] AUTHORITY.KEYID = 5
2,352,524 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,369,007 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,755 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,375,483 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,381,368 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,387,087 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,395,093 UART: [afmc] --
2,396,137 UART: [cold-reset] --
2,397,033 UART: [state] Locking Datavault
2,398,174 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,778 UART: [state] Locking ICCM
2,399,388 UART: [exit] Launching FMC @ 0x40000130
2,404,717 UART:
2,404,733 UART: Running Caliptra FMC ...
2,405,141 UART:
2,405,284 UART: [state] CFI Enabled
2,415,871 UART: [fht] FMC Alias Private Key: 7
2,523,816 UART: [art] Extend RT PCRs Done
2,524,244 UART: [art] Lock RT PCRs Done
2,525,854 UART: [art] Populate DV Done
2,534,079 UART: [fht] FMC Alias Private Key: 7
2,535,041 UART: [art] Derive CDI
2,535,321 UART: [art] Store in in slot 0x4
2,621,084 UART: [art] Derive Key Pair
2,621,444 UART: [art] Store priv key in slot 0x5
2,634,970 UART: [art] Derive Key Pair - Done
2,649,686 UART: [art] Signing Cert with AUTHO
2,650,166 UART: RITY.KEYID = 7
2,665,630 UART: [art] Erasing AUTHORITY.KEYID = 7
2,666,395 UART: [art] PUB.X = F6D22FBA575D67F5248C5881824E3EF3FA53B9782C518EBB2129A562B2026D116801B101CA91E3539EA9DC36FCABA91F
2,673,164 UART: [art] PUB.Y = 1DD783DD7D136D008465E04F2C6FB9051AA754F6E84F4FF91087DECC43E97D36CD213B492B6E308D898AF9E963D078E4
2,680,097 UART: [art] SIG.R = FF501D8949BCD72AA635BBF7FA8E6665C39CE633BBA290F8D11674340498952134552985B9DA4A456E3E63677042306C
2,686,860 UART: [art] SIG.S = ECE5C7B084D1CB17B500714FAD226D191F92539ED5A693705E98C7D4470DF24AD7CFC4D5FE86FE3F1AD91EB14E915815
2,710,518 UART: mbox::rt_entry...
2,710,890 UART: ____ _ _ _ ____ _____
2,711,674 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,712,474 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,713,242 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,714,010 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,714,778 UART: |_|
2,715,090 UART:
2,821,931 UART: [rt] Runtime listening for mailbox commands...
2,822,865 >>> mbox cmd response data (0 bytes)
2,822,866 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,822,977 UART:
2,822,993 UART: Running Caliptra ROM ...
2,823,401 UART:
2,823,543 UART: [state] CFI Enabled
2,825,935 UART: [state] LifecycleState = Unprovisioned
2,826,590 UART: [state] DebugLocked = No
2,827,218 UART: [state] WD Timer not started. Device not locked for debugging
2,828,540 UART: [kat] SHA2-256
3,634,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,638,315 UART: [kat] ++
3,638,467 UART: [kat] sha1
3,642,647 UART: [kat] SHA2-256
3,644,587 UART: [kat] SHA2-384
3,647,452 UART: [kat] SHA2-512-ACC
3,649,352 UART: [kat] ECC-384
3,659,531 UART: [kat] HMAC-384Kdf
3,664,315 UART: [kat] LMS
3,912,643 UART: [kat] --
3,913,443 UART: [update-reset] ++
5,226,083 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,227,194 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,377,018 >>> mbox cmd response: success
5,377,183 UART: [update-reset] Copying MAN_2 To MAN_1
5,385,197 UART: [update-reset Success] --
5,386,378 UART: [state] Locking Datavault
5,387,372 UART: [state] Locking PCR0, PCR1 and PCR31
5,387,976 UART: [state] Locking ICCM
5,388,556 UART: [exit] Launching FMC @ 0x40000130
5,393,885 UART:
5,393,901 UART: Running Caliptra FMC ...
5,394,309 UART:
5,394,452 UART: [state] CFI Enabled
5,483,361 UART: [art] Extend RT PCRs Done
5,483,789 UART: [art] Lock RT PCRs Done
5,485,114 UART: [art] Populate DV Done
5,493,457 UART: [fht] FMC Alias Private Key: 7
5,494,483 UART: [art] Derive CDI
5,494,763 UART: [art] Store in in slot 0x4
5,580,118 UART: [art] Derive Key Pair
5,580,478 UART: [art] Store priv key in slot 0x5
5,594,044 UART: [art] Derive Key Pair - Done
5,608,799 UART: [art] Signing Cert with AUTHO
5,609,279 UART: RITY.KEYID = 7
5,624,605 UART: [art] Erasing AUTHORITY.KEYID = 7
5,625,370 UART: [art] PUB.X = 2F2E7869C337D6C98E9C685CBD3839E606E1158B585059D90095D726B4F5F8DE268D95FC9CC7A9180FA97AAC790C904B
5,632,113 UART: [art] PUB.Y = 0C12574CFAD14C62E636B6FB4FCB9E044D08464FBDD640DA7041D5E4AD895B44B6FC801E33911CD063863C42DCFAE028
5,639,068 UART: [art] SIG.R = F4418C1626BCD5F2682483BE313922B5B8E1F621594552ADF8CB50057DF63D716D80BB1BDE7F4CC20A917DA7FE31B2CE
5,645,844 UART: [art] SIG.S = 2C6C54DEFABABF4AC0E66E4B80DB9EFA6C5254CBB17EC285FD70185348ECEDE9BABCCF707616BDD79C776C66137A24E9
5,669,385 UART: Caliptra RT
5,669,730 UART: [state] CFI Enabled
5,946,520 UART: [rt] RT failed reset flow
5,946,951 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,182 ready_for_fw is high
1,061,182 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,166,275 >>> mbox cmd response: success
2,166,275 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,227,611 UART:
2,227,627 UART: Running Caliptra FMC ...
2,228,035 UART:
2,228,178 UART: [state] CFI Enabled
2,238,609 UART: [fht] FMC Alias Private Key: 7
2,346,554 UART: [art] Extend RT PCRs Done
2,346,982 UART: [art] Lock RT PCRs Done
2,348,290 UART: [art] Populate DV Done
2,356,713 UART: [fht] FMC Alias Private Key: 7
2,357,763 UART: [art] Derive CDI
2,358,043 UART: [art] Store in in slot 0x4
2,443,722 UART: [art] Derive Key Pair
2,444,082 UART: [art] Store priv key in slot 0x5
2,457,734 UART: [art] Derive Key Pair - Done
2,472,672 UART: [art] Signing Cert with AUTHO
2,473,152 UART: RITY.KEYID = 7
2,487,880 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,645 UART: [art] PUB.X = B9F716B9EE313995F70FD31FA1427B673BD6FDE6E56073234AB8CF69B6440B2807F448BEE7E2BF9B7AD2CF4A9F147D36
2,495,420 UART: [art] PUB.Y = AD483259D5789265B2EB6DE3ECFDDF80341228C7010AA41D7F9EEB643E41CBB3673E45A5BD8C5C51A24521009935F471
2,502,348 UART: [art] SIG.R = 0FDB670ED949D6B9DECF88471109A71D40A04C119085FA3E8142A3AC6754EFF6C56E8D3A25330E91B60E9F30F18081D7
2,509,109 UART: [art] SIG.S = B0C81192FD173D1A7C3B2A759C73F275C2BF3CC0FD611369854FAC97F58F5FE5F9F26BB319461F76F8AEC380A8A63348
2,532,516 UART: mbox::rt_entry...
2,532,888 UART: ____ _ _ _ ____ _____
2,533,672 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,472 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,240 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,008 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,776 UART: |_|
2,537,088 UART:
2,643,696 UART: [rt] Runtime listening for mailbox commands...
2,644,630 >>> mbox cmd response data (0 bytes)
2,644,631 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,082,988 >>> mbox cmd response: success
5,096,906 UART:
5,096,922 UART: Running Caliptra FMC ...
5,097,330 UART:
5,097,473 UART: [state] CFI Enabled
5,186,842 UART: [art] Extend RT PCRs Done
5,187,270 UART: [art] Lock RT PCRs Done
5,188,383 UART: [art] Populate DV Done
5,196,596 UART: [fht] FMC Alias Private Key: 7
5,197,618 UART: [art] Derive CDI
5,197,898 UART: [art] Store in in slot 0x4
5,283,965 UART: [art] Derive Key Pair
5,284,325 UART: [art] Store priv key in slot 0x5
5,297,259 UART: [art] Derive Key Pair - Done
5,312,002 UART: [art] Signing Cert with AUTHO
5,312,482 UART: RITY.KEYID = 7
5,327,856 UART: [art] Erasing AUTHORITY.KEYID = 7
5,328,621 UART: [art] PUB.X = A7F156F6C28E4FF27DA88D94BFFE3498A34F370DCC2F663E123FCE1DA0B11FA09CBBBA9A60E84D41322AF6FEEC44F886
5,335,414 UART: [art] PUB.Y = D8B924F2907E9BDE994CBF93CF807891379EBA5677023F6FE32AE104D9086F22D017C2E36AC0198932BF2F54AF39EE9F
5,342,363 UART: [art] SIG.R = 6171BEC5157F63250B92394C7329F992E2D36B224AFFA9D22D1CF6F7AE6FE331DF285B48B4BFC6D6DD7C24F77BC8D676
5,349,144 UART: [art] SIG.S = 2385FE0277FD987D526BD61FEE9D2B7BDDE05F8476BB30F26A0F78F78BB71A3C220DDA0BC7491EDEF71A9D03692C675E
5,372,994 UART: Caliptra RT
5,373,339 UART: [state] CFI Enabled
5,656,341 UART: [rt] RT failed reset flow
5,656,772 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,103 UART: [state] WD Timer not started. Device not locked for debugging
87,212 UART: [kat] SHA2-256
890,762 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,891 UART: [kat] ++
895,043 UART: [kat] sha1
899,369 UART: [kat] SHA2-256
901,309 UART: [kat] SHA2-384
904,174 UART: [kat] SHA2-512-ACC
906,075 UART: [kat] ECC-384
915,756 UART: [kat] HMAC-384Kdf
920,406 UART: [kat] LMS
1,168,718 UART: [kat] --
1,169,759 UART: [cold-reset] ++
1,170,313 UART: [fht] FHT @ 0x50003400
1,172,863 UART: [idev] ++
1,173,031 UART: [idev] CDI.KEYID = 6
1,173,392 UART: [idev] SUBJECT.KEYID = 7
1,173,817 UART: [idev] UDS.KEYID = 0
1,174,163 ready_for_fw is high
1,174,163 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,695 UART: [idev] Erasing UDS.KEYID = 0
1,198,425 UART: [idev] Sha1 KeyId Algorithm
1,207,417 UART: [idev] --
1,208,534 UART: [ldev] ++
1,208,702 UART: [ldev] CDI.KEYID = 6
1,209,066 UART: [ldev] SUBJECT.KEYID = 5
1,209,493 UART: [ldev] AUTHORITY.KEYID = 7
1,209,956 UART: [ldev] FE.KEYID = 1
1,215,226 UART: [ldev] Erasing FE.KEYID = 1
1,241,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,746 UART: [ldev] --
1,281,052 UART: [fwproc] Wait for Commands...
1,281,631 UART: [fwproc] Recv command 0x46574c44
1,282,364 UART: [fwproc] Recv'd Img size: 78704 bytes
2,172,296 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,580 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,889 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,165 >>> mbox cmd response: success
2,311,165 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,312,388 UART: [afmc] ++
2,312,556 UART: [afmc] CDI.KEYID = 6
2,312,919 UART: [afmc] SUBJECT.KEYID = 7
2,313,345 UART: [afmc] AUTHORITY.KEYID = 5
2,348,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,760 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,511 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,240 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,123 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,842 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,739 UART: [afmc] --
2,391,633 UART: [cold-reset] --
2,392,267 UART: [state] Locking Datavault
2,393,550 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,154 UART: [state] Locking ICCM
2,394,612 UART: [exit] Launching FMC @ 0x40000130
2,399,941 UART:
2,399,957 UART: Running Caliptra FMC ...
2,400,365 UART:
2,400,419 UART: [state] CFI Enabled
2,410,724 UART: [fht] FMC Alias Private Key: 7
2,518,547 UART: [art] Extend RT PCRs Done
2,518,975 UART: [art] Lock RT PCRs Done
2,520,707 UART: [art] Populate DV Done
2,528,982 UART: [fht] FMC Alias Private Key: 7
2,530,052 UART: [art] Derive CDI
2,530,332 UART: [art] Store in in slot 0x4
2,616,117 UART: [art] Derive Key Pair
2,616,477 UART: [art] Store priv key in slot 0x5
2,630,013 UART: [art] Derive Key Pair - Done
2,644,624 UART: [art] Signing Cert with AUTHO
2,645,104 UART: RITY.KEYID = 7
2,660,298 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,063 UART: [art] PUB.X = 426F8EF08718F4A3C832480B17548551F02CE9366AC14DAFADED91270AF711C24527ACFF8B577C7A19500A149326161A
2,667,824 UART: [art] PUB.Y = F821666A4ABEE35CB6D7C0853B27DF853618527016E2B246C51DEA18335B6927826839850EA174CCF610504F44F874BE
2,674,767 UART: [art] SIG.R = 0BFF5FE711600DB8FC5B0A9C9E92A173693D0217C071D5331D7E161F92135CF5D3A4800BB5BB4E77A11F7FA318C11A7E
2,681,532 UART: [art] SIG.S = F560AF07F0C1260736227A92677AEC261650888E2B73E2BD84DCAFBB528D970B3EFB07C84BF7B3F2276F3CEAC3C7AE9E
2,705,437 UART: mbox::rt_entry...
2,705,809 UART: ____ _ _ _ ____ _____
2,706,593 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,393 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,161 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,929 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,697 UART: |_|
2,710,009 UART:
2,816,331 UART: [rt] Runtime listening for mailbox commands...
2,817,265 >>> mbox cmd response data (0 bytes)
2,817,266 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,817,377 UART:
2,817,393 UART: Running Caliptra ROM ...
2,817,801 UART:
2,817,856 UART: [state] CFI Enabled
2,820,112 UART: [state] LifecycleState = Unprovisioned
2,820,767 UART: [state] DebugLocked = No
2,821,347 UART: [state] WD Timer not started. Device not locked for debugging
2,822,483 UART: [kat] SHA2-256
3,626,033 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,630,162 UART: [kat] ++
3,630,314 UART: [kat] sha1
3,634,644 UART: [kat] SHA2-256
3,636,584 UART: [kat] SHA2-384
3,639,203 UART: [kat] SHA2-512-ACC
3,641,103 UART: [kat] ECC-384
3,650,606 UART: [kat] HMAC-384Kdf
3,655,244 UART: [kat] LMS
3,903,556 UART: [kat] --
3,904,596 UART: [update-reset] ++
5,216,723 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,217,786 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,367,610 >>> mbox cmd response: success
5,367,915 UART: [update-reset] Copying MAN_2 To MAN_1
5,375,929 UART: [update-reset Success] --
5,377,076 UART: [state] Locking Datavault
5,377,806 UART: [state] Locking PCR0, PCR1 and PCR31
5,378,410 UART: [state] Locking ICCM
5,379,070 UART: [exit] Launching FMC @ 0x40000130
5,384,399 UART:
5,384,415 UART: Running Caliptra FMC ...
5,384,823 UART:
5,384,877 UART: [state] CFI Enabled
5,473,884 UART: [art] Extend RT PCRs Done
5,474,312 UART: [art] Lock RT PCRs Done
5,475,645 UART: [art] Populate DV Done
5,483,946 UART: [fht] FMC Alias Private Key: 7
5,485,042 UART: [art] Derive CDI
5,485,322 UART: [art] Store in in slot 0x4
5,570,635 UART: [art] Derive Key Pair
5,570,995 UART: [art] Store priv key in slot 0x5
5,583,659 UART: [art] Derive Key Pair - Done
5,598,676 UART: [art] Signing Cert with AUTHO
5,599,156 UART: RITY.KEYID = 7
5,614,420 UART: [art] Erasing AUTHORITY.KEYID = 7
5,615,185 UART: [art] PUB.X = 8C93D9CC70A2D01E5B0FE7CDC51369F39453D42153687B39DB2A5D6399B9990B15B54DE8DC032785BCC1CB1C5A75D6ED
5,621,958 UART: [art] PUB.Y = E381A69F4071EB594B41E39107A46B2E3B4C58B551A7AFDC7CB5D13E0B258C4B97171F604C47D8D8257D6DC6447CAE66
5,628,910 UART: [art] SIG.R = 6450F75D57EEF4A9B26E47AAB118E99FD1265191E25468A2C10D9433EB900D397DE8BC7FC1C9600F7AAEE0FBEEDB73FC
5,635,691 UART: [art] SIG.S = A1EFFC6D9971CC6DA87E78E4905D2B317D1B202DC9CA87A12F2F7180D494F23C29B24EE5880FE7CDFD69C492D2C43641
5,659,193 UART: Caliptra RT
5,659,446 UART: [state] CFI Enabled
5,939,420 UART: [rt] RT failed reset flow
5,939,851 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,398 ready_for_fw is high
1,055,398 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,160,683 >>> mbox cmd response: success
2,160,683 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,223,235 UART:
2,223,251 UART: Running Caliptra FMC ...
2,223,659 UART:
2,223,713 UART: [state] CFI Enabled
2,234,210 UART: [fht] FMC Alias Private Key: 7
2,342,341 UART: [art] Extend RT PCRs Done
2,342,769 UART: [art] Lock RT PCRs Done
2,344,101 UART: [art] Populate DV Done
2,352,214 UART: [fht] FMC Alias Private Key: 7
2,353,160 UART: [art] Derive CDI
2,353,440 UART: [art] Store in in slot 0x4
2,439,107 UART: [art] Derive Key Pair
2,439,467 UART: [art] Store priv key in slot 0x5
2,453,169 UART: [art] Derive Key Pair - Done
2,467,860 UART: [art] Signing Cert with AUTHO
2,468,340 UART: RITY.KEYID = 7
2,483,502 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,267 UART: [art] PUB.X = 56C05600B07D6676435E589529B2DACF8F7C9D2673EE73127B42C7CDFAAD2988A8233286758388F6EB7B3CEE6E25ED72
2,491,019 UART: [art] PUB.Y = 2F983AA1E27D3835884510710239812A361E8E465D51D6C758A53B03BE25876BBD94A86D42D01303A6C03FD0B40065EB
2,497,932 UART: [art] SIG.R = 587BA07EF62061EFE119C5D53847AC7DAB2BE7F2391BA7C13BC46D39E35F2F95C134E8C15F6D8851D3B9D9A988134034
2,504,710 UART: [art] SIG.S = A3182C00E5BC6104C220DFBE1421351585DEF1147BF07B5476809B7AB989D46390F6A44873FF2467D243D2F864A67810
2,528,568 UART: mbox::rt_entry...
2,528,940 UART: ____ _ _ _ ____ _____
2,529,724 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,524 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,292 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,060 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,828 UART: |_|
2,533,140 UART:
2,639,754 UART: [rt] Runtime listening for mailbox commands...
2,640,688 >>> mbox cmd response data (0 bytes)
2,640,689 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,074,132 >>> mbox cmd response: success
5,087,596 UART:
5,087,612 UART: Running Caliptra FMC ...
5,088,020 UART:
5,088,074 UART: [state] CFI Enabled
5,177,333 UART: [art] Extend RT PCRs Done
5,177,761 UART: [art] Lock RT PCRs Done
5,178,850 UART: [art] Populate DV Done
5,187,107 UART: [fht] FMC Alias Private Key: 7
5,188,229 UART: [art] Derive CDI
5,188,509 UART: [art] Store in in slot 0x4
5,274,498 UART: [art] Derive Key Pair
5,274,858 UART: [art] Store priv key in slot 0x5
5,287,594 UART: [art] Derive Key Pair - Done
5,302,464 UART: [art] Signing Cert with AUTHO
5,302,944 UART: RITY.KEYID = 7
5,318,050 UART: [art] Erasing AUTHORITY.KEYID = 7
5,318,815 UART: [art] PUB.X = 41C2C4FF126E47DD41369402972BA1981E7E02EA6B58EB2701DFDB842F0FF1AD105E2AFD8035C2E66ED65C2570E0AF3C
5,325,587 UART: [art] PUB.Y = D3AA310A9EA5419504EF5C55B1D47387BFC0317419E27F9A9848A99A751A650320C9F00426E1C4BFC1D7B3F96286DDA9
5,332,529 UART: [art] SIG.R = 3B46495AC591DD9F3FB4AAC07A6A84E69B045B436256E63AFE4C9723BC99D3F90F21AC0A5580B31EE9CF3BD950A25A96
5,339,304 UART: [art] SIG.S = BD572586F8955ED2F1148797A09AB15A59715A7367031CBD4ED71A1341EC25F078ADD3A0A02469A1381FD5A6C80C0F5A
5,363,234 UART: Caliptra RT
5,363,487 UART: [state] CFI Enabled
5,647,381 UART: [rt] RT failed reset flow
5,647,812 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
88,133 UART: [kat] SHA2-256
891,683 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,812 UART: [kat] ++
895,964 UART: [kat] sha1
900,120 UART: [kat] SHA2-256
902,060 UART: [kat] SHA2-384
904,833 UART: [kat] SHA2-512-ACC
906,734 UART: [kat] ECC-384
916,643 UART: [kat] HMAC-384Kdf
921,377 UART: [kat] LMS
1,169,689 UART: [kat] --
1,170,580 UART: [cold-reset] ++
1,171,004 UART: [fht] FHT @ 0x50003400
1,173,682 UART: [idev] ++
1,173,850 UART: [idev] CDI.KEYID = 6
1,174,211 UART: [idev] SUBJECT.KEYID = 7
1,174,636 UART: [idev] UDS.KEYID = 0
1,174,982 ready_for_fw is high
1,174,982 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,058 UART: [idev] Erasing UDS.KEYID = 0
1,199,854 UART: [idev] Sha1 KeyId Algorithm
1,208,832 UART: [idev] --
1,209,963 UART: [ldev] ++
1,210,131 UART: [ldev] CDI.KEYID = 6
1,210,495 UART: [ldev] SUBJECT.KEYID = 5
1,210,922 UART: [ldev] AUTHORITY.KEYID = 7
1,211,385 UART: [ldev] FE.KEYID = 1
1,216,847 UART: [ldev] Erasing FE.KEYID = 1
1,243,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,421 UART: [ldev] --
1,282,843 UART: [fwproc] Wait for Commands...
1,283,538 UART: [fwproc] Recv command 0x46574c44
1,284,271 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,781 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,090 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,506 >>> mbox cmd response: success
2,313,506 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,314,579 UART: [afmc] ++
2,314,747 UART: [afmc] CDI.KEYID = 6
2,315,110 UART: [afmc] SUBJECT.KEYID = 7
2,315,536 UART: [afmc] AUTHORITY.KEYID = 5
2,351,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,985 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,736 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,465 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,348 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,067 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,884 UART: [afmc] --
2,394,780 UART: [cold-reset] --
2,395,482 UART: [state] Locking Datavault
2,396,703 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,307 UART: [state] Locking ICCM
2,397,943 UART: [exit] Launching FMC @ 0x40000130
2,403,272 UART:
2,403,288 UART: Running Caliptra FMC ...
2,403,696 UART:
2,403,839 UART: [state] CFI Enabled
2,414,762 UART: [fht] FMC Alias Private Key: 7
2,522,357 UART: [art] Extend RT PCRs Done
2,522,785 UART: [art] Lock RT PCRs Done
2,524,437 UART: [art] Populate DV Done
2,532,806 UART: [fht] FMC Alias Private Key: 7
2,533,768 UART: [art] Derive CDI
2,534,048 UART: [art] Store in in slot 0x4
2,619,881 UART: [art] Derive Key Pair
2,620,241 UART: [art] Store priv key in slot 0x5
2,633,619 UART: [art] Derive Key Pair - Done
2,648,569 UART: [art] Signing Cert with AUTHO
2,649,049 UART: RITY.KEYID = 7
2,664,319 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,084 UART: [art] PUB.X = 02BA7AC602DE96001A532D92E88E01411ACD9308DB0404B403C51942CD25D74FAAB88A6C2FA5389E8004644978ECA67B
2,671,812 UART: [art] PUB.Y = 31072623047F1749FE91991CD658C48E49DDE8736D23D1386CBDDD538E5B04DFBA528C355BFAB4ACC01470499535A2A8
2,678,757 UART: [art] SIG.R = C7CD21A8A94DCB0BDAB8C06EBCDF45C413BAF12216B5E97DEA74BA2B556D96BC66105C8D818BC2EBED08B0A1FCBBFE6B
2,685,559 UART: [art] SIG.S = B0BBE179E58A149FD8013E94C7051F8A64EAC9A61BA82E13B6525F63B8B8DCC0863549D1A6DE649877FECC7FF2FEECF1
2,708,866 UART: mbox::rt_entry...
2,709,238 UART: ____ _ _ _ ____ _____
2,710,022 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,822 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,590 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,358 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,126 UART: |_|
2,713,438 UART:
2,820,187 UART: [rt] Runtime listening for mailbox commands...
2,821,121 >>> mbox cmd response data (0 bytes)
2,821,122 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,821,233 UART:
2,821,249 UART: Running Caliptra ROM ...
2,821,657 UART:
2,821,799 UART: [state] CFI Enabled
2,824,639 UART: [state] LifecycleState = Unprovisioned
2,825,294 UART: [state] DebugLocked = No
2,825,794 UART: [state] WD Timer not started. Device not locked for debugging
2,826,944 UART: [kat] SHA2-256
3,630,494 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,634,623 UART: [kat] ++
3,634,775 UART: [kat] sha1
3,639,063 UART: [kat] SHA2-256
3,641,003 UART: [kat] SHA2-384
3,643,720 UART: [kat] SHA2-512-ACC
3,645,620 UART: [kat] ECC-384
3,655,487 UART: [kat] HMAC-384Kdf
3,660,173 UART: [kat] LMS
3,908,485 UART: [kat] --
3,909,451 UART: [update-reset] ++
5,221,988 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,222,957 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,372,781 >>> mbox cmd response: success
5,373,006 UART: [update-reset] Copying MAN_2 To MAN_1
5,381,020 UART: [update-reset Success] --
5,382,029 UART: [state] Locking Datavault
5,383,003 UART: [state] Locking PCR0, PCR1 and PCR31
5,383,607 UART: [state] Locking ICCM
5,384,125 UART: [exit] Launching FMC @ 0x40000130
5,389,454 UART:
5,389,470 UART: Running Caliptra FMC ...
5,389,878 UART:
5,390,021 UART: [state] CFI Enabled
5,479,250 UART: [art] Extend RT PCRs Done
5,479,678 UART: [art] Lock RT PCRs Done
5,480,659 UART: [art] Populate DV Done
5,488,652 UART: [fht] FMC Alias Private Key: 7
5,489,674 UART: [art] Derive CDI
5,489,954 UART: [art] Store in in slot 0x4
5,575,571 UART: [art] Derive Key Pair
5,575,931 UART: [art] Store priv key in slot 0x5
5,589,353 UART: [art] Derive Key Pair - Done
5,603,952 UART: [art] Signing Cert with AUTHO
5,604,432 UART: RITY.KEYID = 7
5,619,516 UART: [art] Erasing AUTHORITY.KEYID = 7
5,620,281 UART: [art] PUB.X = 6130FDDE61F1CE70BBE3FAB987CC47D8CE134C8EB42E5857632339A844B58C22413C1AB5B42A0AF3911C796870532EFC
5,627,058 UART: [art] PUB.Y = 21ED358232AFE573A8A4C09B6CCF7ACA939A41B8B1637C94A9C112DD3D59B7F5EAF083B8734FCF88921DDBE7C221989E
5,634,024 UART: [art] SIG.R = 63C5A1B23B867732F630CEB74425D8102445862D0479838A753BC72BCAAE221E74DA2CD8592CB7B34041D1FC833798F3
5,640,789 UART: [art] SIG.S = E8D08E57C8AE437986FA6DF81455ACF0559F50EF3FE35559C020B3C7C60326446FAB4FB3AB932AD126B6A086CF71969B
5,664,985 UART: Caliptra RT
5,665,330 UART: [state] CFI Enabled
5,946,218 UART: [rt] RT failed reset flow
5,946,649 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,061 ready_for_fw is high
1,056,061 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,162,576 >>> mbox cmd response: success
2,162,576 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,224,908 UART:
2,224,924 UART: Running Caliptra FMC ...
2,225,332 UART:
2,225,475 UART: [state] CFI Enabled
2,236,196 UART: [fht] FMC Alias Private Key: 7
2,344,531 UART: [art] Extend RT PCRs Done
2,344,959 UART: [art] Lock RT PCRs Done
2,346,167 UART: [art] Populate DV Done
2,354,194 UART: [fht] FMC Alias Private Key: 7
2,355,172 UART: [art] Derive CDI
2,355,452 UART: [art] Store in in slot 0x4
2,440,941 UART: [art] Derive Key Pair
2,441,301 UART: [art] Store priv key in slot 0x5
2,454,693 UART: [art] Derive Key Pair - Done
2,469,117 UART: [art] Signing Cert with AUTHO
2,469,597 UART: RITY.KEYID = 7
2,484,819 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,584 UART: [art] PUB.X = D44B96BB9645195E3DB3189E844FC9EDA8FAE1B15BFB178C7742AF2ADDF4D19E313C2861459492DA0EFD1982E3B484E1
2,492,365 UART: [art] PUB.Y = 2035E1EEE9AD0A088368B2DAA8BEA3D9E06E3D056031E74E588B696008A32EC24D9F81A66BC3226699A45D74E44306DC
2,499,306 UART: [art] SIG.R = 3E428347D24A8F79E361F603DA9934C3B3FEF76D294C49464228E920468E57D8BF350D91288D41C754C1C4A750F0896E
2,506,064 UART: [art] SIG.S = 8E926CB0E525436CF78AA2598AA8D42CD9851EFF0827631D099921F614E5DD2E3F4546D6C87FA99C7F3987AB9ECFBBD4
2,529,977 UART: mbox::rt_entry...
2,530,349 UART: ____ _ _ _ ____ _____
2,531,133 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,933 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,701 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,469 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,237 UART: |_|
2,534,549 UART:
2,642,175 UART: [rt] Runtime listening for mailbox commands...
2,643,109 >>> mbox cmd response data (0 bytes)
2,643,110 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,075,902 >>> mbox cmd response: success
5,089,260 UART:
5,089,276 UART: Running Caliptra FMC ...
5,089,684 UART:
5,089,827 UART: [state] CFI Enabled
5,179,676 UART: [art] Extend RT PCRs Done
5,180,104 UART: [art] Lock RT PCRs Done
5,181,575 UART: [art] Populate DV Done
5,189,790 UART: [fht] FMC Alias Private Key: 7
5,190,726 UART: [art] Derive CDI
5,191,006 UART: [art] Store in in slot 0x4
5,277,083 UART: [art] Derive Key Pair
5,277,443 UART: [art] Store priv key in slot 0x5
5,290,625 UART: [art] Derive Key Pair - Done
5,305,703 UART: [art] Signing Cert with AUTHO
5,306,183 UART: RITY.KEYID = 7
5,321,483 UART: [art] Erasing AUTHORITY.KEYID = 7
5,322,248 UART: [art] PUB.X = 800B861F31AD47C5F96B0BC5F95E9F89E3F62591BFAD34D0C78F65E8ECC017A8C78D9E84A34185F0D7B9D818349F5714
5,329,020 UART: [art] PUB.Y = 67D6291823AB585F71B7711AC2FDA3CE19EC6C5CFA7725A3EB0966C91DAB51471965FBE822BFB4BF6B7B7A94261EC3F1
5,335,983 UART: [art] SIG.R = F2A8CB918341E18676327A16320C34E6712E165728BB2976E6451E5C695519598A77F69FC84A565D622C5F01B28ECC6F
5,342,739 UART: [art] SIG.S = A4DE62E09DB5B0C68F149473368ED35DCA774377FAFABE857BBA503F19698F30279E01D2EDE92184D748BAA5E05225C7
5,366,947 UART: Caliptra RT
5,367,292 UART: [state] CFI Enabled
5,647,985 UART: [rt] RT failed reset flow
5,648,416 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Unprovisioned
85,949 UART: [state] DebugLocked = No
86,441 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,101 UART: [kat] SHA2-256
882,032 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,147 UART: [kat] ++
886,299 UART: [kat] sha1
890,667 UART: [kat] SHA2-256
892,605 UART: [kat] SHA2-384
895,400 UART: [kat] SHA2-512-ACC
897,301 UART: [kat] ECC-384
902,824 UART: [kat] HMAC-384Kdf
907,368 UART: [kat] LMS
1,475,564 UART: [kat] --
1,476,357 UART: [cold-reset] ++
1,476,711 UART: [fht] Storing FHT @ 0x50003400
1,479,428 UART: [idev] ++
1,479,596 UART: [idev] CDI.KEYID = 6
1,479,956 UART: [idev] SUBJECT.KEYID = 7
1,480,380 UART: [idev] UDS.KEYID = 0
1,480,725 ready_for_fw is high
1,480,725 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,948 UART: [idev] Erasing UDS.KEYID = 0
1,505,544 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,118 UART: [idev] --
1,515,081 UART: [ldev] ++
1,515,249 UART: [ldev] CDI.KEYID = 6
1,515,612 UART: [ldev] SUBJECT.KEYID = 5
1,516,038 UART: [ldev] AUTHORITY.KEYID = 7
1,516,501 UART: [ldev] FE.KEYID = 1
1,521,701 UART: [ldev] Erasing FE.KEYID = 1
1,547,056 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,824 UART: [ldev] --
1,586,229 UART: [fwproc] Waiting for Commands...
1,586,976 UART: [fwproc] Received command 0x46574c44
1,587,767 UART: [fwproc] Received Image of size 78704 bytes
2,478,474 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,598 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,950 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,439 >>> mbox cmd response: success
2,617,439 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,618,481 UART: [afmc] ++
2,618,649 UART: [afmc] CDI.KEYID = 6
2,619,011 UART: [afmc] SUBJECT.KEYID = 7
2,619,436 UART: [afmc] AUTHORITY.KEYID = 5
2,654,159 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,253 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,033 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,761 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,646 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,336 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,407 UART: [afmc] --
2,697,289 UART: [cold-reset] --
2,698,153 UART: [state] Locking Datavault
2,699,356 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,960 UART: [state] Locking ICCM
2,700,488 UART: [exit] Launching FMC @ 0x40000130
2,705,817 UART:
2,705,833 UART: Running Caliptra FMC ...
2,706,241 UART:
2,706,295 UART: [state] CFI Enabled
2,717,038 UART: [fht] FMC Alias Private Key: 7
2,825,443 UART: [art] Extend RT PCRs Done
2,825,871 UART: [art] Lock RT PCRs Done
2,827,603 UART: [art] Populate DV Done
2,835,870 UART: [fht] FMC Alias Private Key: 7
2,836,816 UART: [art] Derive CDI
2,837,096 UART: [art] Store in in slot 0x4
2,923,093 UART: [art] Derive Key Pair
2,923,453 UART: [art] Store priv key in slot 0x5
2,937,233 UART: [art] Derive Key Pair - Done
2,951,779 UART: [art] Signing Cert with AUTHO
2,952,259 UART: RITY.KEYID = 7
2,967,277 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,042 UART: [art] PUB.X = 64E584061DA1A8C4470C23C0E80944CF50DE328AD345D7F56A910DA8953C6DED7145D085E782D1CADAA811AE94B51186
2,974,806 UART: [art] PUB.Y = 00B30F4CC96537BEE149F63D6AF9E6300953BF203E2A7F845BBA0064897053B89A63F3F8921E3515A79C0EAD89DD5788
2,981,705 UART: [art] SIG.R = 01F44DE0953DB4357DE097F96707B52B30AEE995FD0B424F6E28148CFEEB289B92ABC55ECA6D8014787553D7A020407F
2,988,472 UART: [art] SIG.S = 72A4D1009C4F1CA581C5A02966B4351F9C9EC7364FA6A8124B02C84F1F8F79CAFA6969D54FF2E868E5854D1D2F3A1A1F
3,012,164 UART: mbox::rt_entry...
3,012,536 UART: ____ _ _ _ ____ _____
3,013,320 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,014,120 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,014,888 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,015,656 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,016,424 UART: |_|
3,016,736 UART:
3,123,713 UART: [rt] Runtime listening for mailbox commands...
3,124,864 >>> mbox cmd response data (0 bytes)
3,124,865 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,124,980 UART:
3,124,996 UART: Running Caliptra ROM ...
3,125,404 UART:
3,125,458 UART: [state] CFI Enabled
3,128,248 UART: [state] LifecycleState = Unprovisioned
3,128,903 UART: [state] DebugLocked = No
3,129,585 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,131,220 UART: [kat] SHA2-256
3,925,151 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,929,266 UART: [kat] ++
3,929,418 UART: [kat] sha1
3,933,748 UART: [kat] SHA2-256
3,935,686 UART: [kat] SHA2-384
3,938,401 UART: [kat] SHA2-512-ACC
3,940,301 UART: [kat] ECC-384
3,945,644 UART: [kat] HMAC-384Kdf
3,950,300 UART: [kat] LMS
4,518,496 UART: [kat] --
4,519,501 UART: [update-reset] ++
5,854,657 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,855,695 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,005,571 >>> mbox cmd response: success
6,005,868 UART: [update-reset] Copying MAN_2 To MAN_1
6,013,882 UART: [update-reset Success] --
6,014,703 UART: [state] Locking Datavault
6,015,435 UART: [state] Locking PCR0, PCR1 and PCR31
6,016,039 UART: [state] Locking ICCM
6,016,591 UART: [exit] Launching FMC @ 0x40000130
6,021,920 UART:
6,021,936 UART: Running Caliptra FMC ...
6,022,344 UART:
6,022,398 UART: [state] CFI Enabled
6,111,373 UART: [art] Extend RT PCRs Done
6,111,801 UART: [art] Lock RT PCRs Done
6,113,332 UART: [art] Populate DV Done
6,121,483 UART: [fht] FMC Alias Private Key: 7
6,122,527 UART: [art] Derive CDI
6,122,807 UART: [art] Store in in slot 0x4
6,208,062 UART: [art] Derive Key Pair
6,208,422 UART: [art] Store priv key in slot 0x5
6,221,600 UART: [art] Derive Key Pair - Done
6,236,676 UART: [art] Signing Cert with AUTHO
6,237,156 UART: RITY.KEYID = 7
6,252,784 UART: [art] Erasing AUTHORITY.KEYID = 7
6,253,549 UART: [art] PUB.X = 31962888EDDD9106105A4462ABCD1D9CDF597632DF45AAFCC3B05A04463D46AE7F9376352B94836FA454695171493710
6,260,309 UART: [art] PUB.Y = 4CF8AF353512A5EFD24D0DF51B3F09EEB4D38B554CC85C2884A6D80DCDD7FFD5B69A4B3F0D964AD2C41DFE1C14D14EA0
6,267,275 UART: [art] SIG.R = D8A8DC73F71BC6FDBBBDE30385962B93C5268485F87D5096C4A1D42A94118DAC4A463C474525683558F160DEB0D72885
6,274,044 UART: [art] SIG.S = BC68F9961A55596D409DE61889DC55BE8821E895BD91C5C0F637E85A557E2D5CF76D94BBA214A4012470EEFD152B25F8
6,297,868 UART: Caliptra RT
6,298,121 UART: [state] CFI Enabled
6,583,082 UART: [rt] RT failed reset flow
6,583,513 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,071 ready_for_fw is high
1,362,071 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,464,738 >>> mbox cmd response: success
2,464,738 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,526,044 UART:
2,526,060 UART: Running Caliptra FMC ...
2,526,468 UART:
2,526,522 UART: [state] CFI Enabled
2,536,899 UART: [fht] FMC Alias Private Key: 7
2,644,844 UART: [art] Extend RT PCRs Done
2,645,272 UART: [art] Lock RT PCRs Done
2,646,926 UART: [art] Populate DV Done
2,654,991 UART: [fht] FMC Alias Private Key: 7
2,655,919 UART: [art] Derive CDI
2,656,199 UART: [art] Store in in slot 0x4
2,742,132 UART: [art] Derive Key Pair
2,742,492 UART: [art] Store priv key in slot 0x5
2,755,504 UART: [art] Derive Key Pair - Done
2,770,347 UART: [art] Signing Cert with AUTHO
2,770,827 UART: RITY.KEYID = 7
2,786,009 UART: [art] Erasing AUTHORITY.KEYID = 7
2,786,774 UART: [art] PUB.X = BE7EE5F1081CC0544250827F1347BE44E6BCB3A779B7DEDD976D06EE5FBA1069B22C425796309DA0BEA8CB4D1C46E05C
2,793,554 UART: [art] PUB.Y = 4EBAB00AD4669C9349A87376C139A0865FD0E719E840420A67FBCEADB16BC0AF0F057C10CCB6FDF6801C996490D90904
2,800,496 UART: [art] SIG.R = A4F7C6998CA406CBA8652742900BDA44D474D0C281FAA88DF63CCAC5120D19AB7F959E3432F9B35250C82E8A75F30BF9
2,807,264 UART: [art] SIG.S = FFC6C1BBBCAA75AF410BAE8E21E1ED936CA8469773991CB5675182827E98676E05BC56B604C42F9C89C962401797BD44
2,830,962 UART: mbox::rt_entry...
2,831,334 UART: ____ _ _ _ ____ _____
2,832,118 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,832,918 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,833,686 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,834,454 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,835,222 UART: |_|
2,835,534 UART:
2,943,113 UART: [rt] Runtime listening for mailbox commands...
2,944,264 >>> mbox cmd response data (0 bytes)
2,944,265 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,704,435 >>> mbox cmd response: success
5,717,826 UART:
5,717,842 UART: Running Caliptra FMC ...
5,718,250 UART:
5,718,304 UART: [state] CFI Enabled
5,807,315 UART: [art] Extend RT PCRs Done
5,807,743 UART: [art] Lock RT PCRs Done
5,809,066 UART: [art] Populate DV Done
5,817,421 UART: [fht] FMC Alias Private Key: 7
5,818,427 UART: [art] Derive CDI
5,818,707 UART: [art] Store in in slot 0x4
5,904,486 UART: [art] Derive Key Pair
5,904,846 UART: [art] Store priv key in slot 0x5
5,918,580 UART: [art] Derive Key Pair - Done
5,933,072 UART: [art] Signing Cert with AUTHO
5,933,552 UART: RITY.KEYID = 7
5,948,426 UART: [art] Erasing AUTHORITY.KEYID = 7
5,949,191 UART: [art] PUB.X = A6C6CFD710D61900F54ED43426302FFEACB791DAB465689FE7FCDE312204F9BE55AAF8DF90BAC9EC29ABACBC0A202EA2
5,955,963 UART: [art] PUB.Y = DFD76623FC9B13C6C05676A9E82022D66640D0919B73F2FB2A2911DFBC20ADF02ADF315FAF498EC87C9C1596FB4368BC
5,962,927 UART: [art] SIG.R = F7980E180DE225DC2AFF69B3F820CB3EE8D95957A51482CE066A56951560762F254A1E2B9EF887DC8A6D20F5B9521C79
5,969,692 UART: [art] SIG.S = 022AC0ED2784876893E00B87B8C5509404E9038DAAAE974476F29D3ECA15AD8D421EC0954BF1FE365696B50DB29ABB47
5,993,238 UART: Caliptra RT
5,993,491 UART: [state] CFI Enabled
6,272,735 UART: [rt] RT failed reset flow
6,273,166 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,558 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,124 UART: [kat] SHA2-256
882,055 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,170 UART: [kat] ++
886,322 UART: [kat] sha1
890,512 UART: [kat] SHA2-256
892,450 UART: [kat] SHA2-384
895,179 UART: [kat] SHA2-512-ACC
897,080 UART: [kat] ECC-384
902,519 UART: [kat] HMAC-384Kdf
907,145 UART: [kat] LMS
1,475,341 UART: [kat] --
1,476,154 UART: [cold-reset] ++
1,476,734 UART: [fht] Storing FHT @ 0x50003400
1,479,577 UART: [idev] ++
1,479,745 UART: [idev] CDI.KEYID = 6
1,480,105 UART: [idev] SUBJECT.KEYID = 7
1,480,529 UART: [idev] UDS.KEYID = 0
1,480,874 ready_for_fw is high
1,480,874 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,769 UART: [idev] Erasing UDS.KEYID = 0
1,505,797 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,471 UART: [idev] --
1,515,472 UART: [ldev] ++
1,515,640 UART: [ldev] CDI.KEYID = 6
1,516,003 UART: [ldev] SUBJECT.KEYID = 5
1,516,429 UART: [ldev] AUTHORITY.KEYID = 7
1,516,892 UART: [ldev] FE.KEYID = 1
1,522,136 UART: [ldev] Erasing FE.KEYID = 1
1,547,623 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,413 UART: [ldev] --
1,586,748 UART: [fwproc] Waiting for Commands...
1,587,607 UART: [fwproc] Received command 0x46574c44
1,588,398 UART: [fwproc] Received Image of size 78704 bytes
2,479,226 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,506,324 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,535,676 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,618,021 >>> mbox cmd response: success
2,618,021 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,619,243 UART: [afmc] ++
2,619,411 UART: [afmc] CDI.KEYID = 6
2,619,773 UART: [afmc] SUBJECT.KEYID = 7
2,620,198 UART: [afmc] AUTHORITY.KEYID = 5
2,656,007 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,672,077 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,672,857 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,678,585 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,684,470 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,690,160 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,698,287 UART: [afmc] --
2,699,391 UART: [cold-reset] --
2,700,335 UART: [state] Locking Datavault
2,701,574 UART: [state] Locking PCR0, PCR1 and PCR31
2,702,178 UART: [state] Locking ICCM
2,702,822 UART: [exit] Launching FMC @ 0x40000130
2,708,151 UART:
2,708,167 UART: Running Caliptra FMC ...
2,708,575 UART:
2,708,718 UART: [state] CFI Enabled
2,719,049 UART: [fht] FMC Alias Private Key: 7
2,827,136 UART: [art] Extend RT PCRs Done
2,827,564 UART: [art] Lock RT PCRs Done
2,829,224 UART: [art] Populate DV Done
2,837,377 UART: [fht] FMC Alias Private Key: 7
2,838,531 UART: [art] Derive CDI
2,838,811 UART: [art] Store in in slot 0x4
2,924,800 UART: [art] Derive Key Pair
2,925,160 UART: [art] Store priv key in slot 0x5
2,938,946 UART: [art] Derive Key Pair - Done
2,953,559 UART: [art] Signing Cert with AUTHO
2,954,039 UART: RITY.KEYID = 7
2,968,929 UART: [art] Erasing AUTHORITY.KEYID = 7
2,969,694 UART: [art] PUB.X = 25F7A2695C4E98BD8D4ED087D1F3AC84A948DC9AF975C4BBDE353C7B0257123E0B2DB7B8FCC905D70414FA2A34A30DE9
2,976,467 UART: [art] PUB.Y = 94D73952EE69DF4BB453EBA2FF96A4F8D70D922FC3320EDE0153D9CB5E999FB8E1E9E53A94509FC3E6F857A8F790A0F0
2,983,424 UART: [art] SIG.R = 94D7E7137CF7A4C29C5ABB9773A7CBC3F7E048D7E37B120E17B7DCD69B4A0CB8451B23A9D42036D22D2A1A6EB09FC09A
2,990,206 UART: [art] SIG.S = D3C988E8DEAD2D86010C56CB3F82C321C58C76EB0537D9698002C368B89A811C62D66816FC8F13777204E64AF18E67CF
3,014,220 UART: mbox::rt_entry...
3,014,592 UART: ____ _ _ _ ____ _____
3,015,376 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,016,176 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,016,944 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,017,712 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,018,480 UART: |_|
3,018,792 UART:
3,125,783 UART: [rt] Runtime listening for mailbox commands...
3,126,934 >>> mbox cmd response data (0 bytes)
3,126,935 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,127,050 UART:
3,127,066 UART: Running Caliptra ROM ...
3,127,474 UART:
3,127,615 UART: [state] CFI Enabled
3,130,727 UART: [state] LifecycleState = Unprovisioned
3,131,382 UART: [state] DebugLocked = No
3,131,896 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,133,603 UART: [kat] SHA2-256
3,927,534 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,931,649 UART: [kat] ++
3,931,801 UART: [kat] sha1
3,935,933 UART: [kat] SHA2-256
3,937,871 UART: [kat] SHA2-384
3,940,512 UART: [kat] SHA2-512-ACC
3,942,412 UART: [kat] ECC-384
3,948,001 UART: [kat] HMAC-384Kdf
3,952,819 UART: [kat] LMS
4,521,015 UART: [kat] --
4,521,774 UART: [update-reset] ++
5,858,524 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,859,600 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,009,476 >>> mbox cmd response: success
6,009,689 UART: [update-reset] Copying MAN_2 To MAN_1
6,017,703 UART: [update-reset Success] --
6,018,512 UART: [state] Locking Datavault
6,019,284 UART: [state] Locking PCR0, PCR1 and PCR31
6,019,888 UART: [state] Locking ICCM
6,020,332 UART: [exit] Launching FMC @ 0x40000130
6,025,661 UART:
6,025,677 UART: Running Caliptra FMC ...
6,026,085 UART:
6,026,228 UART: [state] CFI Enabled
6,115,443 UART: [art] Extend RT PCRs Done
6,115,871 UART: [art] Lock RT PCRs Done
6,116,948 UART: [art] Populate DV Done
6,125,075 UART: [fht] FMC Alias Private Key: 7
6,126,093 UART: [art] Derive CDI
6,126,373 UART: [art] Store in in slot 0x4
6,212,272 UART: [art] Derive Key Pair
6,212,632 UART: [art] Store priv key in slot 0x5
6,225,928 UART: [art] Derive Key Pair - Done
6,240,640 UART: [art] Signing Cert with AUTHO
6,241,120 UART: RITY.KEYID = 7
6,256,422 UART: [art] Erasing AUTHORITY.KEYID = 7
6,257,187 UART: [art] PUB.X = 78C5E11542B75353CF2BA1499B14E6D35A30E74978BEC4E03EF7A02839FE51410078359E900894F43E7B72649876C480
6,263,922 UART: [art] PUB.Y = 7B717FD1DE43979326A7587AA96560FF42CA4ACDAAB7A78B08907D2BA80B3B35E65C88F3F96C611186D732E0FE39AF05
6,270,873 UART: [art] SIG.R = FEBDC766D918C1967BFE6229C4B0D098B75D5A95AE58AB09982A3744CE3CD6A96F8EFD2BD8B22DF11F58AF2FDC311F53
6,277,662 UART: [art] SIG.S = E826AE07FF1F3D287FE3370D0FDC504B96863CC2783DCB17CE534E29F2C1A8AB3804B6A29C9EC77B4696185406A52EAA
6,302,338 UART: Caliptra RT
6,302,683 UART: [state] CFI Enabled
6,588,330 UART: [rt] RT failed reset flow
6,588,761 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,984 ready_for_fw is high
1,362,984 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,467,031 >>> mbox cmd response: success
2,467,031 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,528,957 UART:
2,528,973 UART: Running Caliptra FMC ...
2,529,381 UART:
2,529,524 UART: [state] CFI Enabled
2,540,075 UART: [fht] FMC Alias Private Key: 7
2,648,624 UART: [art] Extend RT PCRs Done
2,649,052 UART: [art] Lock RT PCRs Done
2,650,536 UART: [art] Populate DV Done
2,658,663 UART: [fht] FMC Alias Private Key: 7
2,659,745 UART: [art] Derive CDI
2,660,025 UART: [art] Store in in slot 0x4
2,745,476 UART: [art] Derive Key Pair
2,745,836 UART: [art] Store priv key in slot 0x5
2,759,046 UART: [art] Derive Key Pair - Done
2,773,891 UART: [art] Signing Cert with AUTHO
2,774,371 UART: RITY.KEYID = 7
2,789,577 UART: [art] Erasing AUTHORITY.KEYID = 7
2,790,342 UART: [art] PUB.X = 059FD839C87572267AC5CD62F9109F05D78F0B36B6938CF31D8B740516BE0B9467AF99EAC7DDE9F7B17C8A9B3AB31735
2,797,105 UART: [art] PUB.Y = 22C65693DAD9D6F52FBFB2B0E10FFA53D1A4937CD5D0730450431E88BE61E1A65036B69C8941A37A2BFD1F892E56E64D
2,804,059 UART: [art] SIG.R = 159B18AFB3E883CA835B2EC638F3F486CA3A3B54FACBB3E688BACF8599B64161F217D891AD4B139777D550A728AC4F50
2,810,841 UART: [art] SIG.S = AB29023C7FBA17B9FD4CAD119FEBD2209F9E51F91B367B30F664EDF2436D29F52B2241734D5118A5A4E3FB78FA077C96
2,834,288 UART: mbox::rt_entry...
2,834,660 UART: ____ _ _ _ ____ _____
2,835,444 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,836,244 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,837,012 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,837,780 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,838,548 UART: |_|
2,838,860 UART:
2,946,408 UART: [rt] Runtime listening for mailbox commands...
2,947,559 >>> mbox cmd response data (0 bytes)
2,947,560 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,708,883 >>> mbox cmd response: success
5,722,184 UART:
5,722,200 UART: Running Caliptra FMC ...
5,722,608 UART:
5,722,751 UART: [state] CFI Enabled
5,811,818 UART: [art] Extend RT PCRs Done
5,812,246 UART: [art] Lock RT PCRs Done
5,813,539 UART: [art] Populate DV Done
5,821,552 UART: [fht] FMC Alias Private Key: 7
5,822,722 UART: [art] Derive CDI
5,823,002 UART: [art] Store in in slot 0x4
5,908,403 UART: [art] Derive Key Pair
5,908,763 UART: [art] Store priv key in slot 0x5
5,922,039 UART: [art] Derive Key Pair - Done
5,936,931 UART: [art] Signing Cert with AUTHO
5,937,411 UART: RITY.KEYID = 7
5,952,359 UART: [art] Erasing AUTHORITY.KEYID = 7
5,953,124 UART: [art] PUB.X = C00EB5251BC7551B0A91E128D0DB159BD771D42DFCC3854093FE0D15678370D7406A47909E465FD1B48C7A4D5570DDEA
5,959,891 UART: [art] PUB.Y = 0620D60A5649C7DFB56E0404644690A6BB4DAF60C47EA79985A7987DB4E7ECAE07AAE8DE3364BFC309D629A0C7ED8A10
5,966,837 UART: [art] SIG.R = 022BED6CF76C2EF16AA3DBAA12B799282F00D204206894EBCF9CCE1B8A9DED8DB5AEA35AD7526319DD3E206C3CA70457
5,973,598 UART: [art] SIG.S = 5F06E676A2198B0AFE4B80F578E67136A737C6E824B9B856A92DC5F534D03A3F3EDF31804AFE7315839F3EF9C31F19CD
5,997,563 UART: Caliptra RT
5,997,908 UART: [state] CFI Enabled
6,275,209 UART: [rt] RT failed reset flow
6,275,640 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
893,254 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,379 UART: [kat] ++
897,531 UART: [kat] sha1
901,853 UART: [kat] SHA2-256
903,793 UART: [kat] SHA2-384
906,430 UART: [kat] SHA2-512-ACC
908,331 UART: [kat] ECC-384
917,568 UART: [kat] HMAC-384Kdf
922,050 UART: [kat] LMS
1,170,378 UART: [kat] --
1,171,081 UART: [cold-reset] ++
1,171,471 UART: [fht] FHT @ 0x50003400
1,174,182 UART: [idev] ++
1,174,350 UART: [idev] CDI.KEYID = 6
1,174,710 UART: [idev] SUBJECT.KEYID = 7
1,175,134 UART: [idev] UDS.KEYID = 0
1,175,479 ready_for_fw is high
1,175,479 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,972 UART: [idev] Erasing UDS.KEYID = 0
1,199,635 UART: [idev] Sha1 KeyId Algorithm
1,208,129 UART: [idev] --
1,209,309 UART: [ldev] ++
1,209,477 UART: [ldev] CDI.KEYID = 6
1,209,840 UART: [ldev] SUBJECT.KEYID = 5
1,210,266 UART: [ldev] AUTHORITY.KEYID = 7
1,210,729 UART: [ldev] FE.KEYID = 1
1,216,317 UART: [ldev] Erasing FE.KEYID = 1
1,242,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,631 UART: [ldev] --
1,282,126 UART: [fwproc] Wait for Commands...
1,282,714 UART: [fwproc] Recv command 0x46574c44
1,283,442 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,170 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,474 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,887 >>> mbox cmd response: success
2,312,887 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,314,103 UART: [afmc] ++
2,314,271 UART: [afmc] CDI.KEYID = 6
2,314,633 UART: [afmc] SUBJECT.KEYID = 7
2,315,058 UART: [afmc] AUTHORITY.KEYID = 5
2,350,737 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,164 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,912 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,640 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,525 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,244 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,988 UART: [afmc] --
2,394,094 UART: [cold-reset] --
2,394,872 UART: [state] Locking Datavault
2,396,081 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,685 UART: [state] Locking ICCM
2,397,323 UART: [exit] Launching FMC @ 0x40000130
2,402,652 UART:
2,402,668 UART: Running Caliptra FMC ...
2,403,076 UART:
2,403,130 UART: [state] CFI Enabled
2,413,517 UART: [fht] FMC Alias Private Key: 7
2,521,568 UART: [art] Extend RT PCRs Done
2,521,996 UART: [art] Lock RT PCRs Done
2,523,288 UART: [art] Populate DV Done
2,531,381 UART: [fht] FMC Alias Private Key: 7
2,532,563 UART: [art] Derive CDI
2,532,843 UART: [art] Store in in slot 0x4
2,618,422 UART: [art] Derive Key Pair
2,618,782 UART: [art] Store priv key in slot 0x5
2,631,586 UART: [art] Derive Key Pair - Done
2,646,719 UART: [art] Signing Cert with AUTHO
2,647,199 UART: RITY.KEYID = 7
2,662,621 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,386 UART: [art] PUB.X = 721A7E626D2BE1397E83A6FCCD49FCACED2CEC6704D6073DF7CA8757491C5E32C0457ABA9E06D9875E6DA2119FCD9042
2,670,163 UART: [art] PUB.Y = B4C0777C7446CB1A628422B37E50855CBC4C7FD24A32CD4A05850308BCE0F21C53C2A0FAF35AE7173D7462A4AF77FA4E
2,677,116 UART: [art] SIG.R = 271E1E37F0EB2253E84151F6BDA4065A191EE8AB3F3A038AE2C94AFBBCAE64267630179061498F523B080635869A5A69
2,683,874 UART: [art] SIG.S = 39A92E293875F2FC845561A607A28B7305CB6BD7E9D4DA28EB661300C5CE360BE452E07242C3EA2D94BD0D70E96F0B3E
2,707,756 UART: mbox::rt_entry...
2,708,128 UART: ____ _ _ _ ____ _____
2,708,912 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,712 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,480 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,248 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,016 UART: |_|
2,712,328 UART:
2,820,312 UART: [rt] Runtime listening for mailbox commands...
2,821,463 >>> mbox cmd response data (0 bytes)
2,821,464 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,821,576 UART:
2,821,592 UART: Running Caliptra ROM ...
2,822,000 UART:
2,822,055 UART: [state] CFI Enabled
2,825,023 UART: [state] LifecycleState = Unprovisioned
2,825,678 UART: [state] DebugLocked = No
2,826,248 UART: [state] WD Timer not started. Device not locked for debugging
2,827,568 UART: [kat] SHA2-256
3,633,218 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,637,343 UART: [kat] ++
3,637,495 UART: [kat] sha1
3,641,729 UART: [kat] SHA2-256
3,643,669 UART: [kat] SHA2-384
3,646,632 UART: [kat] SHA2-512-ACC
3,648,532 UART: [kat] ECC-384
3,658,343 UART: [kat] HMAC-384Kdf
3,662,883 UART: [kat] LMS
3,911,211 UART: [kat] --
3,912,221 UART: [update-reset] ++
5,224,529 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,225,724 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,375,548 >>> mbox cmd response: success
5,375,845 UART: [update-reset] Copying MAN_2 To MAN_1
5,383,859 UART: [update-reset Success] --
5,384,578 UART: [state] Locking Datavault
5,385,250 UART: [state] Locking PCR0, PCR1 and PCR31
5,385,854 UART: [state] Locking ICCM
5,386,326 UART: [exit] Launching FMC @ 0x40000130
5,391,655 UART:
5,391,671 UART: Running Caliptra FMC ...
5,392,079 UART:
5,392,133 UART: [state] CFI Enabled
5,481,784 UART: [art] Extend RT PCRs Done
5,482,212 UART: [art] Lock RT PCRs Done
5,483,325 UART: [art] Populate DV Done
5,491,548 UART: [fht] FMC Alias Private Key: 7
5,492,512 UART: [art] Derive CDI
5,492,792 UART: [art] Store in in slot 0x4
5,578,555 UART: [art] Derive Key Pair
5,578,915 UART: [art] Store priv key in slot 0x5
5,592,023 UART: [art] Derive Key Pair - Done
5,606,449 UART: [art] Signing Cert with AUTHO
5,606,929 UART: RITY.KEYID = 7
5,621,859 UART: [art] Erasing AUTHORITY.KEYID = 7
5,622,624 UART: [art] PUB.X = D57051DC1030ECBB5E0E4F47D210011094C4717FE753445C8D82A66FDB023BFA2312686D8B4C417D1D40CDEFC19D7FD4
5,629,395 UART: [art] PUB.Y = 67242AD730C331C612AF5BD91D0FAD8E79E2D70D05BDA037BA6232AA1D0C83FF8F9ADC89E1203F193D5C15F6563FE2D5
5,636,349 UART: [art] SIG.R = 510C638D0D504986D32C13A928E5BA78E0361DB67772F1E5F0F2A53B53CBBBFABA83FA0E9D859AEAE47DC3BBAA50ED19
5,643,132 UART: [art] SIG.S = BA47A62D6523882908058035C3F6F4BEBFB4C1E6E590282541B8F8B37A2114F756538BDAB897BA1B23B7298274838FDA
5,666,129 UART: Caliptra RT
5,666,382 UART: [state] CFI Enabled
5,946,938 UART: [rt] RT failed reset flow
5,947,369 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,899 ready_for_fw is high
1,059,899 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,163,994 >>> mbox cmd response: success
2,163,994 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,226,052 UART:
2,226,068 UART: Running Caliptra FMC ...
2,226,476 UART:
2,226,530 UART: [state] CFI Enabled
2,236,933 UART: [fht] FMC Alias Private Key: 7
2,345,050 UART: [art] Extend RT PCRs Done
2,345,478 UART: [art] Lock RT PCRs Done
2,347,170 UART: [art] Populate DV Done
2,355,239 UART: [fht] FMC Alias Private Key: 7
2,356,255 UART: [art] Derive CDI
2,356,535 UART: [art] Store in in slot 0x4
2,442,204 UART: [art] Derive Key Pair
2,442,564 UART: [art] Store priv key in slot 0x5
2,456,032 UART: [art] Derive Key Pair - Done
2,470,992 UART: [art] Signing Cert with AUTHO
2,471,472 UART: RITY.KEYID = 7
2,486,572 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,337 UART: [art] PUB.X = CCEBC92754DA6AF741110917185839721AF1D0A0DF4921D461016B28AE9C620ACAAF70B47164FE930AB6B385A3BABF81
2,494,105 UART: [art] PUB.Y = BB64BB0747AC6F584DDABD4925A22C12C94895DB519C182D739942C860CD25D0256D09F49ED4E8A3CD0C5707B2250657
2,501,044 UART: [art] SIG.R = 22290208D98CE97961C2F08DB16430144376552E381732D1612E41AF3ED08B617882A2055CB41B02574BE1826CE9D174
2,507,788 UART: [art] SIG.S = 7EA671426B3189746F3808F2DA7B45FD52269B2A0950B22AFD153C1DAB01FA041C6CF9447E4E1F93ABB565C4AE11DBD3
2,531,531 UART: mbox::rt_entry...
2,531,903 UART: ____ _ _ _ ____ _____
2,532,687 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,487 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,255 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,023 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,791 UART: |_|
2,536,103 UART:
2,643,117 UART: [rt] Runtime listening for mailbox commands...
2,644,268 >>> mbox cmd response data (0 bytes)
2,644,269 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,081,686 >>> mbox cmd response: success
5,095,230 UART:
5,095,246 UART: Running Caliptra FMC ...
5,095,654 UART:
5,095,708 UART: [state] CFI Enabled
5,185,201 UART: [art] Extend RT PCRs Done
5,185,629 UART: [art] Lock RT PCRs Done
5,187,130 UART: [art] Populate DV Done
5,195,223 UART: [fht] FMC Alias Private Key: 7
5,196,287 UART: [art] Derive CDI
5,196,567 UART: [art] Store in in slot 0x4
5,282,170 UART: [art] Derive Key Pair
5,282,530 UART: [art] Store priv key in slot 0x5
5,295,982 UART: [art] Derive Key Pair - Done
5,310,645 UART: [art] Signing Cert with AUTHO
5,311,125 UART: RITY.KEYID = 7
5,326,639 UART: [art] Erasing AUTHORITY.KEYID = 7
5,327,404 UART: [art] PUB.X = 5263D586BEBAC69CB4972F8D9965C7C839214567A7823BDE4D2A60389398217A30F7CBFF156EFF6B5D2BED44D3A41EFD
5,334,186 UART: [art] PUB.Y = B2C52D38EAA85051407FB7A79160C8F44B031BE914C4811214C5BCF6EF3F2155BE08074E65E87A0E2A4351DAA0948E7E
5,341,130 UART: [art] SIG.R = 34C0FC3917F3F2BF0F5A3CB1AA5283764C21EB9DAB0DD51FB3CE8D192FD6BE2694DEDDF7445204E8AC19F838081FCE33
5,347,910 UART: [art] SIG.S = 671C285593454E986311B8DE31B6F5D3FDB8699D6DE8B37C2BC1A6C3253213C4BDA2D15BCC1702EF491EAF0C439FE550
5,371,755 UART: Caliptra RT
5,372,008 UART: [state] CFI Enabled
5,652,054 UART: [rt] RT failed reset flow
5,652,485 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
893,365 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,490 UART: [kat] ++
897,642 UART: [kat] sha1
901,980 UART: [kat] SHA2-256
903,920 UART: [kat] SHA2-384
906,663 UART: [kat] SHA2-512-ACC
908,564 UART: [kat] ECC-384
918,233 UART: [kat] HMAC-384Kdf
923,049 UART: [kat] LMS
1,171,377 UART: [kat] --
1,172,390 UART: [cold-reset] ++
1,172,914 UART: [fht] FHT @ 0x50003400
1,175,533 UART: [idev] ++
1,175,701 UART: [idev] CDI.KEYID = 6
1,176,061 UART: [idev] SUBJECT.KEYID = 7
1,176,485 UART: [idev] UDS.KEYID = 0
1,176,830 ready_for_fw is high
1,176,830 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,569 UART: [idev] Erasing UDS.KEYID = 0
1,201,338 UART: [idev] Sha1 KeyId Algorithm
1,209,816 UART: [idev] --
1,210,714 UART: [ldev] ++
1,210,882 UART: [ldev] CDI.KEYID = 6
1,211,245 UART: [ldev] SUBJECT.KEYID = 5
1,211,671 UART: [ldev] AUTHORITY.KEYID = 7
1,212,134 UART: [ldev] FE.KEYID = 1
1,217,616 UART: [ldev] Erasing FE.KEYID = 1
1,244,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,662 UART: [ldev] --
1,283,171 UART: [fwproc] Wait for Commands...
1,283,841 UART: [fwproc] Recv command 0x46574c44
1,284,569 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,731 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,035 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,328 >>> mbox cmd response: success
2,313,328 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,314,538 UART: [afmc] ++
2,314,706 UART: [afmc] CDI.KEYID = 6
2,315,068 UART: [afmc] SUBJECT.KEYID = 7
2,315,493 UART: [afmc] AUTHORITY.KEYID = 5
2,351,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,931 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,679 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,407 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,292 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,011 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,865 UART: [afmc] --
2,394,895 UART: [cold-reset] --
2,395,809 UART: [state] Locking Datavault
2,396,948 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,552 UART: [state] Locking ICCM
2,398,098 UART: [exit] Launching FMC @ 0x40000130
2,403,427 UART:
2,403,443 UART: Running Caliptra FMC ...
2,403,851 UART:
2,403,994 UART: [state] CFI Enabled
2,414,905 UART: [fht] FMC Alias Private Key: 7
2,523,460 UART: [art] Extend RT PCRs Done
2,523,888 UART: [art] Lock RT PCRs Done
2,525,020 UART: [art] Populate DV Done
2,533,331 UART: [fht] FMC Alias Private Key: 7
2,534,269 UART: [art] Derive CDI
2,534,549 UART: [art] Store in in slot 0x4
2,620,226 UART: [art] Derive Key Pair
2,620,586 UART: [art] Store priv key in slot 0x5
2,634,094 UART: [art] Derive Key Pair - Done
2,648,891 UART: [art] Signing Cert with AUTHO
2,649,371 UART: RITY.KEYID = 7
2,664,615 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,380 UART: [art] PUB.X = E26AA98DAA4A12C926156E479C944DCBCB02EC7CDF943DA6FF8FF0F2F97B07CF95C53D0A307EAB1EF15513E9E13CEAB0
2,672,169 UART: [art] PUB.Y = F8739DAB8F7E1B82994F855DD0C8EFCB2905148F1E7A344CDB97AB9A78F018CA01B11ABC5B6A290A942AFFBCAA7D919B
2,679,134 UART: [art] SIG.R = 788CD553E6324B2AF45BD14721D3B4AE448BA4FAB86635AF16B13C6D9500950D95E24AAC481D28D7AF668C127BE17D0F
2,685,886 UART: [art] SIG.S = E27A41C19BB41FEFD39B3A351601C5EC7729E688E7610610B3F0E681720CEAC4150A42FDB967E01FE9FD9555610DCABC
2,710,162 UART: mbox::rt_entry...
2,710,534 UART: ____ _ _ _ ____ _____
2,711,318 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,712,118 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,712,886 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,713,654 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,714,422 UART: |_|
2,714,734 UART:
2,821,310 UART: [rt] Runtime listening for mailbox commands...
2,822,461 >>> mbox cmd response data (0 bytes)
2,822,462 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,822,574 UART:
2,822,590 UART: Running Caliptra ROM ...
2,822,998 UART:
2,823,140 UART: [state] CFI Enabled
2,826,046 UART: [state] LifecycleState = Unprovisioned
2,826,701 UART: [state] DebugLocked = No
2,827,375 UART: [state] WD Timer not started. Device not locked for debugging
2,828,487 UART: [kat] SHA2-256
3,634,137 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,638,262 UART: [kat] ++
3,638,414 UART: [kat] sha1
3,642,666 UART: [kat] SHA2-256
3,644,606 UART: [kat] SHA2-384
3,647,347 UART: [kat] SHA2-512-ACC
3,649,247 UART: [kat] ECC-384
3,659,018 UART: [kat] HMAC-384Kdf
3,663,674 UART: [kat] LMS
3,912,002 UART: [kat] --
3,912,580 UART: [update-reset] ++
5,224,566 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,225,559 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,375,383 >>> mbox cmd response: success
5,375,726 UART: [update-reset] Copying MAN_2 To MAN_1
5,383,740 UART: [update-reset Success] --
5,384,701 UART: [state] Locking Datavault
5,385,533 UART: [state] Locking PCR0, PCR1 and PCR31
5,386,137 UART: [state] Locking ICCM
5,386,579 UART: [exit] Launching FMC @ 0x40000130
5,391,908 UART:
5,391,924 UART: Running Caliptra FMC ...
5,392,332 UART:
5,392,475 UART: [state] CFI Enabled
5,481,334 UART: [art] Extend RT PCRs Done
5,481,762 UART: [art] Lock RT PCRs Done
5,483,097 UART: [art] Populate DV Done
5,491,156 UART: [fht] FMC Alias Private Key: 7
5,492,136 UART: [art] Derive CDI
5,492,416 UART: [art] Store in in slot 0x4
5,577,975 UART: [art] Derive Key Pair
5,578,335 UART: [art] Store priv key in slot 0x5
5,592,101 UART: [art] Derive Key Pair - Done
5,606,606 UART: [art] Signing Cert with AUTHO
5,607,086 UART: RITY.KEYID = 7
5,622,264 UART: [art] Erasing AUTHORITY.KEYID = 7
5,623,029 UART: [art] PUB.X = B78836CC4C12EFA9A4B0A70BE19115E074C5F738DF71AFE61B9873CD7BB1D2790C6072B38DD311669BD73082663A2AD0
5,629,801 UART: [art] PUB.Y = 78C3D2E8CAF3B8843EBBBC0843338678E2D9774D071D8A81BF873A806900CC4A27C3991C9E07B7BF54116CAEEE7668B8
5,636,728 UART: [art] SIG.R = DE57CDC35C30EB4797F41F8A8EDA5D10EB5ED63172EB07E2ED9F9460E8137271BD516B29F8260BA108607D7054C41CFE
5,643,501 UART: [art] SIG.S = 5074A8E134D98A75347C49BA7855080A31A08CF5FF72105C9582605192606A95B80B44F6330500A5FFA599CB991F4B6D
5,667,162 UART: Caliptra RT
5,667,507 UART: [state] CFI Enabled
5,950,371 UART: [rt] RT failed reset flow
5,950,802 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,538 ready_for_fw is high
1,060,538 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,167,189 >>> mbox cmd response: success
2,167,189 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,229,189 UART:
2,229,205 UART: Running Caliptra FMC ...
2,229,613 UART:
2,229,756 UART: [state] CFI Enabled
2,240,445 UART: [fht] FMC Alias Private Key: 7
2,348,246 UART: [art] Extend RT PCRs Done
2,348,674 UART: [art] Lock RT PCRs Done
2,350,054 UART: [art] Populate DV Done
2,358,139 UART: [fht] FMC Alias Private Key: 7
2,359,087 UART: [art] Derive CDI
2,359,367 UART: [art] Store in in slot 0x4
2,445,202 UART: [art] Derive Key Pair
2,445,562 UART: [art] Store priv key in slot 0x5
2,459,138 UART: [art] Derive Key Pair - Done
2,473,607 UART: [art] Signing Cert with AUTHO
2,474,087 UART: RITY.KEYID = 7
2,489,335 UART: [art] Erasing AUTHORITY.KEYID = 7
2,490,100 UART: [art] PUB.X = 3E9B647B9C0654C596A2F25B5622AFF4CA3158ECC3285E446564E6500D2D1F6C4515E12E4F0DDADC08D4CB8242150A8A
2,496,863 UART: [art] PUB.Y = C5FFBDE418958E74DD8842863EB11EB5EBD5AA078F2144DD512EDD7B6E672D94AC74EE17E42669E5B93639678EC93B3E
2,503,824 UART: [art] SIG.R = 99CE3C7C4E8C2340AB42DA08AFB8999BA85B71D50DBE2C08B44FBF447FB33F380B1B7412080C6A148EA26E442412BAFB
2,510,592 UART: [art] SIG.S = 75EB701C11A7390A92EB959911C3E7FDBAEDBB40DF5D7AE9C67763EF7F58081F7173A812F12CF010284A26FF8CD1B370
2,534,519 UART: mbox::rt_entry...
2,534,891 UART: ____ _ _ _ ____ _____
2,535,675 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,536,475 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,537,243 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,538,011 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,538,779 UART: |_|
2,539,091 UART:
2,645,877 UART: [rt] Runtime listening for mailbox commands...
2,647,028 >>> mbox cmd response data (0 bytes)
2,647,029 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,084,253 >>> mbox cmd response: success
5,097,813 UART:
5,097,829 UART: Running Caliptra FMC ...
5,098,237 UART:
5,098,380 UART: [state] CFI Enabled
5,187,409 UART: [art] Extend RT PCRs Done
5,187,837 UART: [art] Lock RT PCRs Done
5,189,244 UART: [art] Populate DV Done
5,197,383 UART: [fht] FMC Alias Private Key: 7
5,198,443 UART: [art] Derive CDI
5,198,723 UART: [art] Store in in slot 0x4
5,284,202 UART: [art] Derive Key Pair
5,284,562 UART: [art] Store priv key in slot 0x5
5,297,372 UART: [art] Derive Key Pair - Done
5,312,559 UART: [art] Signing Cert with AUTHO
5,313,039 UART: RITY.KEYID = 7
5,328,063 UART: [art] Erasing AUTHORITY.KEYID = 7
5,328,828 UART: [art] PUB.X = 35F412AD2DF153D681F4216141567716B1F7BC957CCAE2676D25FB02010CE262FAA56D12517D4A8C8AF8BCFA0184EDC4
5,335,596 UART: [art] PUB.Y = 344417BE8DBC1FC64203CF24C23F895D98AC7EA7552EB6E40DA9C1AC66A699A74BCEF278B0B6453D2A1372C9B06CE4A7
5,342,556 UART: [art] SIG.R = 2DC8C0B257AD194EA952770A964307C24E7319B86E7CA4E087B017983E8C050D78A8761BE5593410520535E86768C33E
5,349,301 UART: [art] SIG.S = D2EAA399CC6F8FD26507796A76CE69ECA6EF9AE8D1902F66F32C8692B7C37383057C888BD1D844865B03E655AF86827D
5,373,883 UART: Caliptra RT
5,374,228 UART: [state] CFI Enabled
5,653,406 UART: [rt] RT failed reset flow
5,653,837 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
899,799 UART: [kat] SHA2-256
901,739 UART: [kat] SHA2-384
904,280 UART: [kat] SHA2-512-ACC
906,181 UART: [kat] ECC-384
915,892 UART: [kat] HMAC-384Kdf
920,442 UART: [kat] LMS
1,168,754 UART: [kat] --
1,169,515 UART: [cold-reset] ++
1,170,063 UART: [fht] FHT @ 0x50003400
1,172,859 UART: [idev] ++
1,173,027 UART: [idev] CDI.KEYID = 6
1,173,388 UART: [idev] SUBJECT.KEYID = 7
1,173,813 UART: [idev] UDS.KEYID = 0
1,174,159 ready_for_fw is high
1,174,159 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,141 UART: [idev] Erasing UDS.KEYID = 0
1,198,947 UART: [idev] Sha1 KeyId Algorithm
1,207,819 UART: [idev] --
1,208,758 UART: [ldev] ++
1,208,926 UART: [ldev] CDI.KEYID = 6
1,209,290 UART: [ldev] SUBJECT.KEYID = 5
1,209,717 UART: [ldev] AUTHORITY.KEYID = 7
1,210,180 UART: [ldev] FE.KEYID = 1
1,215,290 UART: [ldev] Erasing FE.KEYID = 1
1,241,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,692 UART: [ldev] --
1,281,204 UART: [fwproc] Wait for Commands...
1,281,811 UART: [fwproc] Recv command 0x46574c44
1,282,544 UART: [fwproc] Recv'd Img size: 78704 bytes
2,172,838 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,470 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,779 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,137 >>> mbox cmd response: success
2,313,137 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,314,224 UART: [afmc] ++
2,314,392 UART: [afmc] CDI.KEYID = 6
2,314,755 UART: [afmc] SUBJECT.KEYID = 7
2,315,181 UART: [afmc] AUTHORITY.KEYID = 5
2,350,858 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,524 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,275 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,004 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,887 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,606 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,295 UART: [afmc] --
2,394,305 UART: [cold-reset] --
2,395,161 UART: [state] Locking Datavault
2,396,422 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,026 UART: [state] Locking ICCM
2,397,594 UART: [exit] Launching FMC @ 0x40000130
2,402,923 UART:
2,402,939 UART: Running Caliptra FMC ...
2,403,347 UART:
2,403,401 UART: [state] CFI Enabled
2,413,864 UART: [fht] FMC Alias Private Key: 7
2,522,503 UART: [art] Extend RT PCRs Done
2,522,931 UART: [art] Lock RT PCRs Done
2,524,363 UART: [art] Populate DV Done
2,532,746 UART: [fht] FMC Alias Private Key: 7
2,533,878 UART: [art] Derive CDI
2,534,158 UART: [art] Store in in slot 0x4
2,619,393 UART: [art] Derive Key Pair
2,619,753 UART: [art] Store priv key in slot 0x5
2,633,123 UART: [art] Derive Key Pair - Done
2,648,175 UART: [art] Signing Cert with AUTHO
2,648,655 UART: RITY.KEYID = 7
2,663,603 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,368 UART: [art] PUB.X = 16D49E44912771AB624D2AFBF0E856A5337761C6E528DFC39078EB1894B2B315F425C2C1A875407D22CE18302C62C502
2,671,131 UART: [art] PUB.Y = B34D5CC0FE3386CB10EFADC1CE053129A4488655EE2D075490B3826F0F81A190CBC915BC45F749E25EDB403253D3C377
2,678,080 UART: [art] SIG.R = 4E7B8F6FC8F1F44B3699CB00C3B89595169ECAE98AC99AFF2E181EA1CFDC5A27A4FCDD70D42CC3642DDB051BC72DFA3F
2,684,855 UART: [art] SIG.S = 4047BAD893D227071E624CF797E6BDCEA99E7481A49D02BCA555CF8035449BA5DDE3C5DAC5DAC98C0BB2B221D93ECF9B
2,708,197 UART: mbox::rt_entry...
2,708,569 UART: ____ _ _ _ ____ _____
2,709,353 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,153 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,921 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,689 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,457 UART: |_|
2,712,769 UART:
2,819,707 UART: [rt] Runtime listening for mailbox commands...
2,820,858 >>> mbox cmd response data (0 bytes)
2,820,859 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,820,971 UART:
2,820,987 UART: Running Caliptra ROM ...
2,821,395 UART:
2,821,450 UART: [state] CFI Enabled
2,823,664 UART: [state] LifecycleState = Unprovisioned
2,824,319 UART: [state] DebugLocked = No
2,824,901 UART: [state] WD Timer not started. Device not locked for debugging
2,826,083 UART: [kat] SHA2-256
3,629,633 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,633,762 UART: [kat] ++
3,633,914 UART: [kat] sha1
3,638,220 UART: [kat] SHA2-256
3,640,160 UART: [kat] SHA2-384
3,642,793 UART: [kat] SHA2-512-ACC
3,644,693 UART: [kat] ECC-384
3,654,750 UART: [kat] HMAC-384Kdf
3,659,468 UART: [kat] LMS
3,907,780 UART: [kat] --
3,908,522 UART: [update-reset] ++
5,220,821 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,222,028 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,371,852 >>> mbox cmd response: success
5,372,123 UART: [update-reset] Copying MAN_2 To MAN_1
5,380,137 UART: [update-reset Success] --
5,381,054 UART: [state] Locking Datavault
5,381,754 UART: [state] Locking PCR0, PCR1 and PCR31
5,382,358 UART: [state] Locking ICCM
5,382,932 UART: [exit] Launching FMC @ 0x40000130
5,388,261 UART:
5,388,277 UART: Running Caliptra FMC ...
5,388,685 UART:
5,388,739 UART: [state] CFI Enabled
5,477,772 UART: [art] Extend RT PCRs Done
5,478,200 UART: [art] Lock RT PCRs Done
5,479,401 UART: [art] Populate DV Done
5,487,580 UART: [fht] FMC Alias Private Key: 7
5,488,532 UART: [art] Derive CDI
5,488,812 UART: [art] Store in in slot 0x4
5,574,665 UART: [art] Derive Key Pair
5,575,025 UART: [art] Store priv key in slot 0x5
5,588,605 UART: [art] Derive Key Pair - Done
5,603,277 UART: [art] Signing Cert with AUTHO
5,603,757 UART: RITY.KEYID = 7
5,618,971 UART: [art] Erasing AUTHORITY.KEYID = 7
5,619,736 UART: [art] PUB.X = 5AF88DA3F237EBE392C46D713EF09E44F580182E293C7DEE6D5165DE0F21DC2CEE5B66C1FE082B9886D8FDEAD6FF966D
5,626,522 UART: [art] PUB.Y = 5AB3582B8473D77DDAB1FAC2FC6A79C442D11F1BCCB7326B879589764657EA62EA5FE2834EC12E1C572389826600941E
5,633,454 UART: [art] SIG.R = 7E26868C8F79E2400FFA9432C4C3F8949D7FC806DE24D947DEB46A748DFEF8E92F6B0D51D3F8B2670F377E6C836B4ECE
5,640,226 UART: [art] SIG.S = EB896376AC9B22757565E93D4D10C6293936B72CAFC9AD04E1F2542505EB7CC27B1FF4CAEB161E5792ADCB6EFFC2EE09
5,663,746 UART: Caliptra RT
5,663,999 UART: [state] CFI Enabled
5,947,617 UART: [rt] RT failed reset flow
5,948,048 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,396 ready_for_fw is high
1,055,396 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,161,607 >>> mbox cmd response: success
2,161,607 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,224,233 UART:
2,224,249 UART: Running Caliptra FMC ...
2,224,657 UART:
2,224,711 UART: [state] CFI Enabled
2,235,322 UART: [fht] FMC Alias Private Key: 7
2,343,673 UART: [art] Extend RT PCRs Done
2,344,101 UART: [art] Lock RT PCRs Done
2,345,663 UART: [art] Populate DV Done
2,353,578 UART: [fht] FMC Alias Private Key: 7
2,354,706 UART: [art] Derive CDI
2,354,986 UART: [art] Store in in slot 0x4
2,440,633 UART: [art] Derive Key Pair
2,440,993 UART: [art] Store priv key in slot 0x5
2,454,239 UART: [art] Derive Key Pair - Done
2,468,856 UART: [art] Signing Cert with AUTHO
2,469,336 UART: RITY.KEYID = 7
2,484,224 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,989 UART: [art] PUB.X = AE3022017F1F8B7C1C10C7E932EA93BB07477762BA0E78441CF69ACD576234AB68A764E1A1F713A16C458A0A48A35344
2,491,749 UART: [art] PUB.Y = F6B20CBED56AAA63992118C610A10F298DD01A54055FA5ECA8AD7AB9273172D90EE98DBA66723ADF533AC47A9F537F96
2,498,701 UART: [art] SIG.R = D344EF657AEA1EE486D57D4D56349F2322A7A01912B690D48A51BF8A4E6A8338604342C14327F58D812DDD374250AF70
2,505,469 UART: [art] SIG.S = AE9FDC239ECFB83D6386221139171E49E24E715CE7A92EF0F0D73935DE061741261E9DFFEFFF0C19D85C90253670FA93
2,529,728 UART: mbox::rt_entry...
2,530,100 UART: ____ _ _ _ ____ _____
2,530,884 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,684 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,452 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,220 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,988 UART: |_|
2,534,300 UART:
2,641,207 UART: [rt] Runtime listening for mailbox commands...
2,642,358 >>> mbox cmd response data (0 bytes)
2,642,359 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,075,347 >>> mbox cmd response: success
5,088,345 UART:
5,088,361 UART: Running Caliptra FMC ...
5,088,769 UART:
5,088,823 UART: [state] CFI Enabled
5,178,088 UART: [art] Extend RT PCRs Done
5,178,516 UART: [art] Lock RT PCRs Done
5,179,699 UART: [art] Populate DV Done
5,187,688 UART: [fht] FMC Alias Private Key: 7
5,188,828 UART: [art] Derive CDI
5,189,108 UART: [art] Store in in slot 0x4
5,275,063 UART: [art] Derive Key Pair
5,275,423 UART: [art] Store priv key in slot 0x5
5,287,865 UART: [art] Derive Key Pair - Done
5,302,428 UART: [art] Signing Cert with AUTHO
5,302,908 UART: RITY.KEYID = 7
5,318,466 UART: [art] Erasing AUTHORITY.KEYID = 7
5,319,231 UART: [art] PUB.X = C6569A6449F481E57E830C78078FF74176C6FC32CABE1DFF16ADEA9B031F7730E4C09D98E3B12D5A8DB757DB9BF70020
5,325,982 UART: [art] PUB.Y = E0BD6F1817E0CE5AB9EDDB24149D844E9D27F6BAB326319B63EE6193F8163742A400A66DBFEF6CFF2426DA5561165BA0
5,332,924 UART: [art] SIG.R = 554E8D8C0594EDF49FFA7DA97B866CA2AB946C86C9A92E38DFFDE0C024544638496B229DA05B885CB09634384EC92714
5,339,697 UART: [art] SIG.S = A8E237F3955D700BC5B0C21764FDF7EB4C204AAAC84DF3AF6356647C90D83076FBE7537D5F4CE0CAFFBCD3907EE1A322
5,363,443 UART: Caliptra RT
5,363,696 UART: [state] CFI Enabled
5,643,898 UART: [rt] RT failed reset flow
5,644,329 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,608 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,508 UART: [kat] ++
895,660 UART: [kat] sha1
899,874 UART: [kat] SHA2-256
901,814 UART: [kat] SHA2-384
904,619 UART: [kat] SHA2-512-ACC
906,520 UART: [kat] ECC-384
916,307 UART: [kat] HMAC-384Kdf
920,987 UART: [kat] LMS
1,169,299 UART: [kat] --
1,170,344 UART: [cold-reset] ++
1,170,880 UART: [fht] FHT @ 0x50003400
1,173,430 UART: [idev] ++
1,173,598 UART: [idev] CDI.KEYID = 6
1,173,959 UART: [idev] SUBJECT.KEYID = 7
1,174,384 UART: [idev] UDS.KEYID = 0
1,174,730 ready_for_fw is high
1,174,730 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,302 UART: [idev] Erasing UDS.KEYID = 0
1,199,434 UART: [idev] Sha1 KeyId Algorithm
1,208,454 UART: [idev] --
1,209,445 UART: [ldev] ++
1,209,613 UART: [ldev] CDI.KEYID = 6
1,209,977 UART: [ldev] SUBJECT.KEYID = 5
1,210,404 UART: [ldev] AUTHORITY.KEYID = 7
1,210,867 UART: [ldev] FE.KEYID = 1
1,216,165 UART: [ldev] Erasing FE.KEYID = 1
1,242,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,825 UART: [ldev] --
1,282,167 UART: [fwproc] Wait for Commands...
1,282,986 UART: [fwproc] Recv command 0x46574c44
1,283,719 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,703 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,012 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,510 >>> mbox cmd response: success
2,313,510 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,314,777 UART: [afmc] ++
2,314,945 UART: [afmc] CDI.KEYID = 6
2,315,308 UART: [afmc] SUBJECT.KEYID = 7
2,315,734 UART: [afmc] AUTHORITY.KEYID = 5
2,351,085 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,751 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,502 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,231 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,114 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,833 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,852 UART: [afmc] --
2,394,952 UART: [cold-reset] --
2,395,784 UART: [state] Locking Datavault
2,396,751 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,355 UART: [state] Locking ICCM
2,397,881 UART: [exit] Launching FMC @ 0x40000130
2,403,210 UART:
2,403,226 UART: Running Caliptra FMC ...
2,403,634 UART:
2,403,777 UART: [state] CFI Enabled
2,414,386 UART: [fht] FMC Alias Private Key: 7
2,522,393 UART: [art] Extend RT PCRs Done
2,522,821 UART: [art] Lock RT PCRs Done
2,524,507 UART: [art] Populate DV Done
2,532,802 UART: [fht] FMC Alias Private Key: 7
2,533,906 UART: [art] Derive CDI
2,534,186 UART: [art] Store in in slot 0x4
2,619,917 UART: [art] Derive Key Pair
2,620,277 UART: [art] Store priv key in slot 0x5
2,633,379 UART: [art] Derive Key Pair - Done
2,648,186 UART: [art] Signing Cert with AUTHO
2,648,666 UART: RITY.KEYID = 7
2,664,292 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,057 UART: [art] PUB.X = 61A875AEF2CE845781C2AD13163C07DE91FDEE1A8B6BF58B3811D14F03EE541FF3E20647B746DCA704536BBD79CB8EBC
2,671,833 UART: [art] PUB.Y = D0932CD00094D1503DC67EFE7CAA24B0F195FA60A388A2E112052D425500ED95CCF96A43C31A59A51D4FCF66579ACF78
2,678,746 UART: [art] SIG.R = 69B9C2CEBD31D72527E28CE11A721644F5F88AF3B549C689D7EB045DB006BA0AB2441B098D52CB100E78CF53ADA9FDF6
2,685,517 UART: [art] SIG.S = 934AD8302D3DA63628C493B61D81931713D8F7E6B3EDAF704324B18D8F2789C3B199D92F62D64A4E054EAF8C647BD22C
2,708,839 UART: mbox::rt_entry...
2,709,211 UART: ____ _ _ _ ____ _____
2,709,995 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,795 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,563 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,331 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,099 UART: |_|
2,713,411 UART:
2,820,335 UART: [rt] Runtime listening for mailbox commands...
2,821,486 >>> mbox cmd response data (0 bytes)
2,821,487 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,821,599 UART:
2,821,615 UART: Running Caliptra ROM ...
2,822,023 UART:
2,822,165 UART: [state] CFI Enabled
2,824,877 UART: [state] LifecycleState = Unprovisioned
2,825,532 UART: [state] DebugLocked = No
2,826,198 UART: [state] WD Timer not started. Device not locked for debugging
2,827,462 UART: [kat] SHA2-256
3,631,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,635,141 UART: [kat] ++
3,635,293 UART: [kat] sha1
3,639,483 UART: [kat] SHA2-256
3,641,423 UART: [kat] SHA2-384
3,644,194 UART: [kat] SHA2-512-ACC
3,646,094 UART: [kat] ECC-384
3,655,885 UART: [kat] HMAC-384Kdf
3,660,551 UART: [kat] LMS
3,908,863 UART: [kat] --
3,909,863 UART: [update-reset] ++
5,221,858 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,222,935 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,372,759 >>> mbox cmd response: success
5,373,026 UART: [update-reset] Copying MAN_2 To MAN_1
5,381,040 UART: [update-reset Success] --
5,381,897 UART: [state] Locking Datavault
5,382,631 UART: [state] Locking PCR0, PCR1 and PCR31
5,383,235 UART: [state] Locking ICCM
5,383,899 UART: [exit] Launching FMC @ 0x40000130
5,389,228 UART:
5,389,244 UART: Running Caliptra FMC ...
5,389,652 UART:
5,389,795 UART: [state] CFI Enabled
5,479,374 UART: [art] Extend RT PCRs Done
5,479,802 UART: [art] Lock RT PCRs Done
5,480,941 UART: [art] Populate DV Done
5,489,296 UART: [fht] FMC Alias Private Key: 7
5,490,384 UART: [art] Derive CDI
5,490,664 UART: [art] Store in in slot 0x4
5,576,519 UART: [art] Derive Key Pair
5,576,879 UART: [art] Store priv key in slot 0x5
5,590,049 UART: [art] Derive Key Pair - Done
5,605,095 UART: [art] Signing Cert with AUTHO
5,605,575 UART: RITY.KEYID = 7
5,621,097 UART: [art] Erasing AUTHORITY.KEYID = 7
5,621,862 UART: [art] PUB.X = 566BB85BFD04A19EAADAD96F6067C0D557126D06187CF671B33907687C5E266CEFFC4DED3ABF71697939F7A8F895C9BA
5,628,637 UART: [art] PUB.Y = 83A3795C9A90E486497496E88124390E2207B20C2BE53BAD349D2743B739580A7FF3E23EDF08C1F1C7C948730C605D9C
5,635,565 UART: [art] SIG.R = D566F6D046838C68E93E6E9584A70593727136FFFE09B721AF49577F8436A8F119E2EF000B47A81245804772B18479B6
5,642,292 UART: [art] SIG.S = 2480D602B37DB9AC7F5B7D37B6258DC50911775BFDFBCDF11DE70E52B479ABB0755AFAB4A40F20ED1C0C939EBA0203BC
5,665,448 UART: Caliptra RT
5,665,793 UART: [state] CFI Enabled
5,949,975 UART: [rt] RT failed reset flow
5,950,406 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,375 ready_for_fw is high
1,056,375 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,161,468 >>> mbox cmd response: success
2,161,468 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,223,754 UART:
2,223,770 UART: Running Caliptra FMC ...
2,224,178 UART:
2,224,321 UART: [state] CFI Enabled
2,235,100 UART: [fht] FMC Alias Private Key: 7
2,343,079 UART: [art] Extend RT PCRs Done
2,343,507 UART: [art] Lock RT PCRs Done
2,345,045 UART: [art] Populate DV Done
2,352,990 UART: [fht] FMC Alias Private Key: 7
2,354,158 UART: [art] Derive CDI
2,354,438 UART: [art] Store in in slot 0x4
2,440,443 UART: [art] Derive Key Pair
2,440,803 UART: [art] Store priv key in slot 0x5
2,454,203 UART: [art] Derive Key Pair - Done
2,468,759 UART: [art] Signing Cert with AUTHO
2,469,239 UART: RITY.KEYID = 7
2,484,179 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,944 UART: [art] PUB.X = 1D4434F980D0E0DDA92EAF55AA0B4D5E5C31112C214D5045AA4B648543D12577991DA8558B20FD31BBAE56B4F586AE11
2,491,719 UART: [art] PUB.Y = 4264556F197FE1DFE42882A4A4810A2B17D9A2F999EB5AACCB52A13D2196096B754794FC9895D8FE821CDB5785BAD045
2,498,669 UART: [art] SIG.R = 3A821E5E47F94AEBC2317EF64FB51ECE6521F619DDA1B0A411A3677C48A8856AAF49B81F1B01691875905328115B931C
2,505,438 UART: [art] SIG.S = 7D8F001C6963DDB6A159B179D1762700C7600959D2F62E9E451927EAABF3C3ECEE35C6D46FF8DD7E0C2C09CD170E39ED
2,528,997 UART: mbox::rt_entry...
2,529,369 UART: ____ _ _ _ ____ _____
2,530,153 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,953 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,721 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,489 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,257 UART: |_|
2,533,569 UART:
2,640,631 UART: [rt] Runtime listening for mailbox commands...
2,641,782 >>> mbox cmd response data (0 bytes)
2,641,783 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,073,810 >>> mbox cmd response: success
5,087,520 UART:
5,087,536 UART: Running Caliptra FMC ...
5,087,944 UART:
5,088,087 UART: [state] CFI Enabled
5,177,296 UART: [art] Extend RT PCRs Done
5,177,724 UART: [art] Lock RT PCRs Done
5,179,147 UART: [art] Populate DV Done
5,187,400 UART: [fht] FMC Alias Private Key: 7
5,188,556 UART: [art] Derive CDI
5,188,836 UART: [art] Store in in slot 0x4
5,273,929 UART: [art] Derive Key Pair
5,274,289 UART: [art] Store priv key in slot 0x5
5,287,481 UART: [art] Derive Key Pair - Done
5,302,242 UART: [art] Signing Cert with AUTHO
5,302,722 UART: RITY.KEYID = 7
5,317,960 UART: [art] Erasing AUTHORITY.KEYID = 7
5,318,725 UART: [art] PUB.X = D1C8C7B254B14B829B2506A0026DE3AF7D0C955DB6A34FBABCD3187E26CD9F81DFEE932D5A8B05AC012C7B05026331C4
5,325,490 UART: [art] PUB.Y = B5ACF9D65762FC0C842225683E8F988DF92628E0B689F49BF38901254C55E7C84792519F8BE2D0DA1B6C1065358BA952
5,332,432 UART: [art] SIG.R = B234E9B16A7597EF9C534F4CA8A22D8EE14A3D36DF886F0DEB5F516B8E171C6457895C743010090117C64A7D9E49B73E
5,339,197 UART: [art] SIG.S = 20BACFE476345B566B3C6B2A6DD701F6615915821385CCE6DA32322D03644470A555389410F2A2AC918C18248502E374
5,363,339 UART: Caliptra RT
5,363,684 UART: [state] CFI Enabled
5,641,696 UART: [rt] RT failed reset flow
5,642,127 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,706 UART: [state] LifecycleState = Unprovisioned
86,361 UART: [state] DebugLocked = No
87,047 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,535 UART: [kat] SHA2-256
882,466 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,581 UART: [kat] ++
886,733 UART: [kat] sha1
890,985 UART: [kat] SHA2-256
892,923 UART: [kat] SHA2-384
895,638 UART: [kat] SHA2-512-ACC
897,539 UART: [kat] ECC-384
903,108 UART: [kat] HMAC-384Kdf
907,702 UART: [kat] LMS
1,475,898 UART: [kat] --
1,476,821 UART: [cold-reset] ++
1,477,223 UART: [fht] Storing FHT @ 0x50003400
1,479,960 UART: [idev] ++
1,480,128 UART: [idev] CDI.KEYID = 6
1,480,488 UART: [idev] SUBJECT.KEYID = 7
1,480,912 UART: [idev] UDS.KEYID = 0
1,481,257 ready_for_fw is high
1,481,257 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,750 UART: [idev] Erasing UDS.KEYID = 0
1,506,194 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,902 UART: [idev] --
1,515,805 UART: [ldev] ++
1,515,973 UART: [ldev] CDI.KEYID = 6
1,516,336 UART: [ldev] SUBJECT.KEYID = 5
1,516,762 UART: [ldev] AUTHORITY.KEYID = 7
1,517,225 UART: [ldev] FE.KEYID = 1
1,522,287 UART: [ldev] Erasing FE.KEYID = 1
1,547,182 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,300 UART: [ldev] --
1,586,797 UART: [fwproc] Waiting for Commands...
1,587,458 UART: [fwproc] Received command 0x46574c44
1,588,249 UART: [fwproc] Received Image of size 78704 bytes
2,478,365 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,259 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,611 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,070 >>> mbox cmd response: success
2,617,070 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,618,302 UART: [afmc] ++
2,618,470 UART: [afmc] CDI.KEYID = 6
2,618,832 UART: [afmc] SUBJECT.KEYID = 7
2,619,257 UART: [afmc] AUTHORITY.KEYID = 5
2,654,822 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,818 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,598 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,326 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,683,211 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,901 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,836 UART: [afmc] --
2,697,854 UART: [cold-reset] --
2,698,736 UART: [state] Locking Datavault
2,700,079 UART: [state] Locking PCR0, PCR1 and PCR31
2,700,683 UART: [state] Locking ICCM
2,701,247 UART: [exit] Launching FMC @ 0x40000130
2,706,576 UART:
2,706,592 UART: Running Caliptra FMC ...
2,707,000 UART:
2,707,054 UART: [state] CFI Enabled
2,717,439 UART: [fht] FMC Alias Private Key: 7
2,825,120 UART: [art] Extend RT PCRs Done
2,825,548 UART: [art] Lock RT PCRs Done
2,826,808 UART: [art] Populate DV Done
2,835,217 UART: [fht] FMC Alias Private Key: 7
2,836,355 UART: [art] Derive CDI
2,836,635 UART: [art] Store in in slot 0x4
2,922,192 UART: [art] Derive Key Pair
2,922,552 UART: [art] Store priv key in slot 0x5
2,935,800 UART: [art] Derive Key Pair - Done
2,950,691 UART: [art] Signing Cert with AUTHO
2,951,171 UART: RITY.KEYID = 7
2,966,515 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,280 UART: [art] PUB.X = 8D5874675C1438A08FEBB7B5A40D73C25BB32377670A2000129E20D48B8092A4373AA4D4F170FFDD5E30679AE7C76689
2,974,020 UART: [art] PUB.Y = B5BA72E183704E6B88452C43A18565EE8EDE9E5DAB978C8E1174DE61759B4C0093CB15FD08BE057425F48EE22284A810
2,980,946 UART: [art] SIG.R = D81D4141812766A42E56274BBE79102DCFE75CAE69247B90F7CDA74E6AE7D5C5C72188203AC7D3C26E9E61958D3D9DBB
2,987,726 UART: [art] SIG.S = 7C9DD7EB980D96F0AC12DDC75223EEA0149E7CB18419D8E374C97AEDB16EA14365E3AFA5F4D4081D9376DAADA032CEEE
3,011,173 UART: mbox::rt_entry...
3,011,545 UART: ____ _ _ _ ____ _____
3,012,329 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,013,129 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,013,897 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,014,665 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,015,433 UART: |_|
3,015,745 UART:
3,123,065 UART: [rt] Runtime listening for mailbox commands...
3,128,033 >>> mbox cmd response data (3272 bytes)
3,128,034 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,151,120 >>> mbox cmd response data (0 bytes)
3,151,121 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,151,241 UART:
3,151,257 UART: Running Caliptra ROM ...
3,151,665 UART:
3,151,719 UART: [state] CFI Enabled
3,153,899 UART: [state] LifecycleState = Unprovisioned
3,154,554 UART: [state] DebugLocked = No
3,155,188 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,156,779 UART: [kat] SHA2-256
3,950,710 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,954,825 UART: [kat] ++
3,954,977 UART: [kat] sha1
3,959,097 UART: [kat] SHA2-256
3,961,035 UART: [kat] SHA2-384
3,963,978 UART: [kat] SHA2-512-ACC
3,965,878 UART: [kat] ECC-384
3,971,245 UART: [kat] HMAC-384Kdf
3,975,671 UART: [kat] LMS
4,543,867 UART: [kat] --
4,544,788 UART: [update-reset] ++
5,879,240 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,880,334 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,030,210 >>> mbox cmd response: success
6,030,445 UART: [update-reset] Copying MAN_2 To MAN_1
6,038,459 UART: [update-reset Success] --
6,039,310 UART: [state] Locking Datavault
6,039,996 UART: [state] Locking PCR0, PCR1 and PCR31
6,040,600 UART: [state] Locking ICCM
6,041,156 UART: [exit] Launching FMC @ 0x40000130
6,046,485 UART:
6,046,501 UART: Running Caliptra FMC ...
6,046,909 UART:
6,046,963 UART: [state] CFI Enabled
6,135,818 UART: [art] Extend RT PCRs Done
6,136,246 UART: [art] Lock RT PCRs Done
6,137,591 UART: [art] Populate DV Done
6,145,822 UART: [fht] FMC Alias Private Key: 7
6,146,778 UART: [art] Derive CDI
6,147,058 UART: [art] Store in in slot 0x4
6,233,223 UART: [art] Derive Key Pair
6,233,583 UART: [art] Store priv key in slot 0x5
6,247,069 UART: [art] Derive Key Pair - Done
6,261,925 UART: [art] Signing Cert with AUTHO
6,262,405 UART: RITY.KEYID = 7
6,277,819 UART: [art] Erasing AUTHORITY.KEYID = 7
6,278,584 UART: [art] PUB.X = 293011828DB11A5A45B0AEFEEB83A1F899065151B4F5FF0366EDAAB56DB83679F54C9CDF2F6017B16C1C6AAFC8AA74F6
6,285,366 UART: [art] PUB.Y = 9DAEECB0E9CFEADCBF5EBA73E0F9779EBD0746971A1FAAB295DEB2FF828F7D7BEDB5BAE55F20E2B23F758B215C5A844D
6,292,351 UART: [art] SIG.R = 96DD67FD88848EEC7A650D0643AB943C4816CC1CE39541BACA628F4B966CB4A4B40AF93004FB5A72C3A4ADB2AB97D5EF
6,299,129 UART: [art] SIG.S = 144AF65A8CF39EAAF6870DC747D779A6607827B62F8DDCF6A8BAA05F6AA6A669A6FF72300C67AA26B56B08BB1866C06E
6,323,137 UART: Caliptra RT
6,323,390 UART: [state] CFI Enabled
6,603,647 UART: Disabled attest: DPE valid fail
6,604,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,605,591 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,636,081 UART: [rt]cmd =0x494e464f, len=4
6,639,810 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,569 ready_for_fw is high
1,362,569 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,466,734 >>> mbox cmd response: success
2,466,734 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,528,250 UART:
2,528,266 UART: Running Caliptra FMC ...
2,528,674 UART:
2,528,728 UART: [state] CFI Enabled
2,539,693 UART: [fht] FMC Alias Private Key: 7
2,647,090 UART: [art] Extend RT PCRs Done
2,647,518 UART: [art] Lock RT PCRs Done
2,648,932 UART: [art] Populate DV Done
2,657,301 UART: [fht] FMC Alias Private Key: 7
2,658,425 UART: [art] Derive CDI
2,658,705 UART: [art] Store in in slot 0x4
2,744,404 UART: [art] Derive Key Pair
2,744,764 UART: [art] Store priv key in slot 0x5
2,757,914 UART: [art] Derive Key Pair - Done
2,772,375 UART: [art] Signing Cert with AUTHO
2,772,855 UART: RITY.KEYID = 7
2,787,811 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,576 UART: [art] PUB.X = 85743CEB40BA5F813C065858DCD59BC30A9D4C651B8F6125E93355505906F71AF156F0CA56103399AE18794C26E482DD
2,795,335 UART: [art] PUB.Y = 5C10DD12181C08C84A39B662BEEB707A5FB4AB2648E3706D697B26AFB5D4E551C8ACE01D18159853AD7E4A101CC9DC0D
2,802,293 UART: [art] SIG.R = 73B285BA1F570D04243DBFF68EA36ECCC5EF6208316C81A31ACC3B7E17558AD800C36D9C26075BF63808CD6E2C0EA303
2,809,032 UART: [art] SIG.S = DE90E50339123C271830A85F2B4BE26FE55C364719F7FF78829B76AAB76E5AA6F37E11D5F12C39A3C2105287AF1FF63D
2,832,244 UART: mbox::rt_entry...
2,832,616 UART: ____ _ _ _ ____ _____
2,833,400 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,834,200 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,834,968 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,835,736 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,836,504 UART: |_|
2,836,816 UART:
2,944,826 UART: [rt] Runtime listening for mailbox commands...
2,949,794 >>> mbox cmd response data (3272 bytes)
2,949,795 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,972,881 >>> mbox cmd response data (0 bytes)
2,972,882 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,732,851 >>> mbox cmd response: success
5,746,116 UART:
5,746,132 UART: Running Caliptra FMC ...
5,746,540 UART:
5,746,594 UART: [state] CFI Enabled
5,835,373 UART: [art] Extend RT PCRs Done
5,835,801 UART: [art] Lock RT PCRs Done
5,837,266 UART: [art] Populate DV Done
5,845,403 UART: [fht] FMC Alias Private Key: 7
5,846,343 UART: [art] Derive CDI
5,846,623 UART: [art] Store in in slot 0x4
5,932,566 UART: [art] Derive Key Pair
5,932,926 UART: [art] Store priv key in slot 0x5
5,946,092 UART: [art] Derive Key Pair - Done
5,961,013 UART: [art] Signing Cert with AUTHO
5,961,493 UART: RITY.KEYID = 7
5,976,541 UART: [art] Erasing AUTHORITY.KEYID = 7
5,977,306 UART: [art] PUB.X = 9B96208F3F5F4980EC48D2960EBCE8A57E5E1D9383507BF9F2C62129994C7083E5E8165FBBB12021D29804BFE30B959D
5,984,069 UART: [art] PUB.Y = 67EEF7386C6C86DA23D737663EF0A4E50880A80E7814EA8C727650CE43EB7CEBFA15CE03366558FDFA3BE2101274CB07
5,991,017 UART: [art] SIG.R = 3C872A9AA43871C24372C8BF16D558886380B20B31701FF5ED925ADDB834ACAAD3007D86C0FE1CD7C628B33C16220C89
5,997,765 UART: [art] SIG.S = 4E3EFF8F2639EE5FFB681DD6D9382132947030B57D66A71A71588A3313F1B4A5A0E570AF34E73287B6F435AC8971D33D
6,021,486 UART: Caliptra RT
6,021,739 UART: [state] CFI Enabled
6,307,523 UART: Disabled attest: DPE valid fail
6,308,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,309,375 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,339,675 UART: [rt]cmd =0x494e464f, len=4
6,343,348 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,677 UART: [state] LifecycleState = Unprovisioned
85,332 UART: [state] DebugLocked = No
85,844 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,322 UART: [kat] SHA2-256
881,253 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,368 UART: [kat] ++
885,520 UART: [kat] sha1
889,752 UART: [kat] SHA2-256
891,690 UART: [kat] SHA2-384
894,459 UART: [kat] SHA2-512-ACC
896,360 UART: [kat] ECC-384
902,229 UART: [kat] HMAC-384Kdf
906,657 UART: [kat] LMS
1,474,853 UART: [kat] --
1,475,646 UART: [cold-reset] ++
1,476,122 UART: [fht] Storing FHT @ 0x50003400
1,478,823 UART: [idev] ++
1,478,991 UART: [idev] CDI.KEYID = 6
1,479,351 UART: [idev] SUBJECT.KEYID = 7
1,479,775 UART: [idev] UDS.KEYID = 0
1,480,120 ready_for_fw is high
1,480,120 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,487,681 UART: [idev] Erasing UDS.KEYID = 0
1,504,647 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,269 UART: [idev] --
1,514,318 UART: [ldev] ++
1,514,486 UART: [ldev] CDI.KEYID = 6
1,514,849 UART: [ldev] SUBJECT.KEYID = 5
1,515,275 UART: [ldev] AUTHORITY.KEYID = 7
1,515,738 UART: [ldev] FE.KEYID = 1
1,521,022 UART: [ldev] Erasing FE.KEYID = 1
1,546,257 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,921 UART: [ldev] --
1,585,424 UART: [fwproc] Waiting for Commands...
1,586,141 UART: [fwproc] Received command 0x46574c44
1,586,932 UART: [fwproc] Received Image of size 78704 bytes
2,477,174 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,504,856 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,208 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,616,633 >>> mbox cmd response: success
2,616,633 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,617,681 UART: [afmc] ++
2,617,849 UART: [afmc] CDI.KEYID = 6
2,618,211 UART: [afmc] SUBJECT.KEYID = 7
2,618,636 UART: [afmc] AUTHORITY.KEYID = 5
2,654,059 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,321 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,101 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,829 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,714 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,404 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,329 UART: [afmc] --
2,697,211 UART: [cold-reset] --
2,697,891 UART: [state] Locking Datavault
2,699,098 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,702 UART: [state] Locking ICCM
2,700,332 UART: [exit] Launching FMC @ 0x40000130
2,705,661 UART:
2,705,677 UART: Running Caliptra FMC ...
2,706,085 UART:
2,706,228 UART: [state] CFI Enabled
2,716,807 UART: [fht] FMC Alias Private Key: 7
2,824,392 UART: [art] Extend RT PCRs Done
2,824,820 UART: [art] Lock RT PCRs Done
2,826,560 UART: [art] Populate DV Done
2,834,695 UART: [fht] FMC Alias Private Key: 7
2,835,839 UART: [art] Derive CDI
2,836,119 UART: [art] Store in in slot 0x4
2,921,492 UART: [art] Derive Key Pair
2,921,852 UART: [art] Store priv key in slot 0x5
2,935,308 UART: [art] Derive Key Pair - Done
2,949,636 UART: [art] Signing Cert with AUTHO
2,950,116 UART: RITY.KEYID = 7
2,965,468 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,233 UART: [art] PUB.X = AC5BB22B172CD99920AE50B0A622BF003E954C9F84F5E306FC0D55D4A9946BF79C69A2B19E0AA0E5C256614A0A72DE61
2,972,981 UART: [art] PUB.Y = 884753100CE4FDF9A8402BD79783BFF5AB56AE18A55519DDE2FAD1E28C25ECAE340255AFEE97778A072674A27D1FAF54
2,979,936 UART: [art] SIG.R = 41801C99CA445BCDF1B2AC99A98BF57CE839AEEB619C7965BA2E499B325B3605570883DCDB5DFB0CC9344EA751AD2F25
2,986,713 UART: [art] SIG.S = 1717C04115B5C1AAF3A99C7F4DD441668F7C8D4CEEC8E648E73B6223AFFC66C5BF7FA8AFBB2191FFC746DB17DA31221E
3,010,182 UART: mbox::rt_entry...
3,010,554 UART: ____ _ _ _ ____ _____
3,011,338 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,138 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,012,906 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,013,674 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,442 UART: |_|
3,014,754 UART:
3,121,645 UART: [rt] Runtime listening for mailbox commands...
3,126,613 >>> mbox cmd response data (3272 bytes)
3,126,614 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,149,700 >>> mbox cmd response data (0 bytes)
3,149,701 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,149,821 UART:
3,149,837 UART: Running Caliptra ROM ...
3,150,245 UART:
3,150,386 UART: [state] CFI Enabled
3,153,148 UART: [state] LifecycleState = Unprovisioned
3,153,803 UART: [state] DebugLocked = No
3,154,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,156,006 UART: [kat] SHA2-256
3,949,937 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,954,052 UART: [kat] ++
3,954,204 UART: [kat] sha1
3,958,448 UART: [kat] SHA2-256
3,960,386 UART: [kat] SHA2-384
3,963,235 UART: [kat] SHA2-512-ACC
3,965,135 UART: [kat] ECC-384
3,970,512 UART: [kat] HMAC-384Kdf
3,974,998 UART: [kat] LMS
4,543,194 UART: [kat] --
4,544,349 UART: [update-reset] ++
5,880,055 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,881,311 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,031,187 >>> mbox cmd response: success
6,031,430 UART: [update-reset] Copying MAN_2 To MAN_1
6,039,444 UART: [update-reset Success] --
6,040,483 UART: [state] Locking Datavault
6,041,099 UART: [state] Locking PCR0, PCR1 and PCR31
6,041,703 UART: [state] Locking ICCM
6,042,187 UART: [exit] Launching FMC @ 0x40000130
6,047,516 UART:
6,047,532 UART: Running Caliptra FMC ...
6,047,940 UART:
6,048,083 UART: [state] CFI Enabled
6,137,184 UART: [art] Extend RT PCRs Done
6,137,612 UART: [art] Lock RT PCRs Done
6,138,871 UART: [art] Populate DV Done
6,147,088 UART: [fht] FMC Alias Private Key: 7
6,148,232 UART: [art] Derive CDI
6,148,512 UART: [art] Store in in slot 0x4
6,234,079 UART: [art] Derive Key Pair
6,234,439 UART: [art] Store priv key in slot 0x5
6,247,251 UART: [art] Derive Key Pair - Done
6,261,706 UART: [art] Signing Cert with AUTHO
6,262,186 UART: RITY.KEYID = 7
6,277,262 UART: [art] Erasing AUTHORITY.KEYID = 7
6,278,027 UART: [art] PUB.X = F5E4D77C06FDEB08A0EF66D22006630AB1EFC2A209A251EC2784AB71F34F5E5F9F0FA451BCA288EE95DE753D238EA25B
6,284,799 UART: [art] PUB.Y = 9F53FE0569EE40EEAECB62A0B84B36F7A96CBEE811058279448F5FBD9739E16389F907A64932DB73EE7B4A033E6DEB90
6,291,749 UART: [art] SIG.R = 1E1222D4BD449F610C068F23F7C9CC957986F222CCF512CC664DDCABDB1E5BA5811991522CC5DD3786D32D5C08587D35
6,298,518 UART: [art] SIG.S = 49F0A6F5348595159BFC4BDB4275E4B98602142CC244998308AB1B16E95119C6305355FB31C61A2B9040A3716DECDA7A
6,321,865 UART: Caliptra RT
6,322,210 UART: [state] CFI Enabled
6,602,728 UART: Disabled attest: DPE valid fail
6,603,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,604,860 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,635,346 UART: [rt]cmd =0x494e464f, len=4
6,639,231 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,884 ready_for_fw is high
1,362,884 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,468,125 >>> mbox cmd response: success
2,468,125 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,530,223 UART:
2,530,239 UART: Running Caliptra FMC ...
2,530,647 UART:
2,530,790 UART: [state] CFI Enabled
2,541,207 UART: [fht] FMC Alias Private Key: 7
2,648,700 UART: [art] Extend RT PCRs Done
2,649,128 UART: [art] Lock RT PCRs Done
2,650,748 UART: [art] Populate DV Done
2,658,759 UART: [fht] FMC Alias Private Key: 7
2,659,879 UART: [art] Derive CDI
2,660,159 UART: [art] Store in in slot 0x4
2,746,156 UART: [art] Derive Key Pair
2,746,516 UART: [art] Store priv key in slot 0x5
2,760,364 UART: [art] Derive Key Pair - Done
2,775,080 UART: [art] Signing Cert with AUTHO
2,775,560 UART: RITY.KEYID = 7
2,790,986 UART: [art] Erasing AUTHORITY.KEYID = 7
2,791,751 UART: [art] PUB.X = 55B6AB036049B806C494DFDDE9E1BD1250B3DEA3540B4E253CCD1347571DC08B6BF3821E99880B688A7D59119D06B708
2,798,507 UART: [art] PUB.Y = F9A4DED5C0873A93E54097DA76DF35C7723FE7DD8A40DF7F2CF5ECD944F312D88CE5170B5A89EE06045186C67F7A74E9
2,805,462 UART: [art] SIG.R = 7B4E4C11E3D3500DE00C08322FFDFBF1E1B728FAF67BD5E7DE8567878B5C1C2308CBCD5CE946FA6C009D144B28044296
2,812,209 UART: [art] SIG.S = DE061B44E854C6848373C04C5D040234158E54601B3853A5CDB355310ADEB054E8FC0694A262286DDA1C116B66B1494E
2,835,747 UART: mbox::rt_entry...
2,836,119 UART: ____ _ _ _ ____ _____
2,836,903 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,837,703 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,838,471 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,839,239 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,840,007 UART: |_|
2,840,319 UART:
2,946,491 UART: [rt] Runtime listening for mailbox commands...
2,951,459 >>> mbox cmd response data (3272 bytes)
2,951,460 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,974,546 >>> mbox cmd response data (0 bytes)
2,974,547 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,736,961 >>> mbox cmd response: success
5,750,458 UART:
5,750,474 UART: Running Caliptra FMC ...
5,750,882 UART:
5,751,025 UART: [state] CFI Enabled
5,840,516 UART: [art] Extend RT PCRs Done
5,840,944 UART: [art] Lock RT PCRs Done
5,842,151 UART: [art] Populate DV Done
5,850,492 UART: [fht] FMC Alias Private Key: 7
5,851,530 UART: [art] Derive CDI
5,851,810 UART: [art] Store in in slot 0x4
5,937,609 UART: [art] Derive Key Pair
5,937,969 UART: [art] Store priv key in slot 0x5
5,951,769 UART: [art] Derive Key Pair - Done
5,966,461 UART: [art] Signing Cert with AUTHO
5,966,941 UART: RITY.KEYID = 7
5,982,503 UART: [art] Erasing AUTHORITY.KEYID = 7
5,983,268 UART: [art] PUB.X = 57C6B2CD46D5A20B2E31F28CAE0478389EB8B8E45A8FE7D9D83E7DE2513B5430068E585DDE43B201C205F9E84096B6EA
5,990,033 UART: [art] PUB.Y = 8A9AFE98BA015A51072E543624489B421041ED775758699449C06FEDA8C75988CD797FCB7536EBE086337E363487EDB2
5,996,973 UART: [art] SIG.R = 55B7129E6111A7CDF5C92EDE8930404163EF0FD1C4FBE3659D5C610A7A8F56CBD25AC4AFC1F829F419EF2191D66CA6F9
6,003,753 UART: [art] SIG.S = 178083101DF6BFC13D0FE54EB0CC31E665CECCD26C6A02F8137AEF1BC37283F64C1B7FC4B907E84348ED3B854F85DC5A
6,027,601 UART: Caliptra RT
6,027,946 UART: [state] CFI Enabled
6,306,626 UART: Disabled attest: DPE valid fail
6,307,132 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,308,544 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,339,302 UART: [rt]cmd =0x494e464f, len=4
6,342,989 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
893,444 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,569 UART: [kat] ++
897,721 UART: [kat] sha1
902,089 UART: [kat] SHA2-256
904,029 UART: [kat] SHA2-384
906,892 UART: [kat] SHA2-512-ACC
908,793 UART: [kat] ECC-384
918,604 UART: [kat] HMAC-384Kdf
923,202 UART: [kat] LMS
1,171,530 UART: [kat] --
1,172,711 UART: [cold-reset] ++
1,173,199 UART: [fht] FHT @ 0x50003400
1,176,078 UART: [idev] ++
1,176,246 UART: [idev] CDI.KEYID = 6
1,176,606 UART: [idev] SUBJECT.KEYID = 7
1,177,030 UART: [idev] UDS.KEYID = 0
1,177,375 ready_for_fw is high
1,177,375 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,185,214 UART: [idev] Erasing UDS.KEYID = 0
1,202,509 UART: [idev] Sha1 KeyId Algorithm
1,211,095 UART: [idev] --
1,212,167 UART: [ldev] ++
1,212,335 UART: [ldev] CDI.KEYID = 6
1,212,698 UART: [ldev] SUBJECT.KEYID = 5
1,213,124 UART: [ldev] AUTHORITY.KEYID = 7
1,213,587 UART: [ldev] FE.KEYID = 1
1,219,177 UART: [ldev] Erasing FE.KEYID = 1
1,244,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,181 UART: [ldev] --
1,284,578 UART: [fwproc] Wait for Commands...
1,285,168 UART: [fwproc] Recv command 0x46574c44
1,285,896 UART: [fwproc] Recv'd Img size: 78704 bytes
2,176,571 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,203,886 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,233,190 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,315,639 >>> mbox cmd response: success
2,315,639 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,316,827 UART: [afmc] ++
2,316,995 UART: [afmc] CDI.KEYID = 6
2,317,357 UART: [afmc] SUBJECT.KEYID = 7
2,317,782 UART: [afmc] AUTHORITY.KEYID = 5
2,353,757 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,370,504 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,371,252 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,376,980 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,382,865 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,388,584 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,396,342 UART: [afmc] --
2,397,322 UART: [cold-reset] --
2,398,140 UART: [state] Locking Datavault
2,399,429 UART: [state] Locking PCR0, PCR1 and PCR31
2,400,033 UART: [state] Locking ICCM
2,400,489 UART: [exit] Launching FMC @ 0x40000130
2,405,818 UART:
2,405,834 UART: Running Caliptra FMC ...
2,406,242 UART:
2,406,296 UART: [state] CFI Enabled
2,416,719 UART: [fht] FMC Alias Private Key: 7
2,524,578 UART: [art] Extend RT PCRs Done
2,525,006 UART: [art] Lock RT PCRs Done
2,526,366 UART: [art] Populate DV Done
2,534,525 UART: [fht] FMC Alias Private Key: 7
2,535,601 UART: [art] Derive CDI
2,535,881 UART: [art] Store in in slot 0x4
2,621,224 UART: [art] Derive Key Pair
2,621,584 UART: [art] Store priv key in slot 0x5
2,634,876 UART: [art] Derive Key Pair - Done
2,650,116 UART: [art] Signing Cert with AUTHO
2,650,596 UART: RITY.KEYID = 7
2,665,576 UART: [art] Erasing AUTHORITY.KEYID = 7
2,666,341 UART: [art] PUB.X = 6672B863C2264737EDE1216E88F8084EC67A578AE7762563AFCF2CDB11F06188C59FEEA87457B552C69283070EEC7486
2,673,100 UART: [art] PUB.Y = 1F3F853FAD3A030273A1872694AC2A53538DB162F824FB3D8C412064963C313B8DECA877F73097AC69CD4103300180D8
2,680,034 UART: [art] SIG.R = 72B738C92076C07197E29A7A0512F1CFD92ACB509AC2BA2BD2D36C0C23DB64621B6475E614897F8EED1BEFF0CCF63CAB
2,686,816 UART: [art] SIG.S = ECF2A5843097BEB22D9C5B22A6192CF9D53EF632BE775D9A0E63C73817A1389B1EF8DD0CF9AF4E4C8FEF5F0217F24BC0
2,709,652 UART: mbox::rt_entry...
2,710,024 UART: ____ _ _ _ ____ _____
2,710,808 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,608 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,712,376 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,713,144 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,912 UART: |_|
2,714,224 UART:
2,820,756 UART: [rt] Runtime listening for mailbox commands...
2,825,724 >>> mbox cmd response data (3272 bytes)
2,825,725 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,848,811 >>> mbox cmd response data (0 bytes)
2,848,812 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,848,929 UART:
2,848,945 UART: Running Caliptra ROM ...
2,849,353 UART:
2,849,408 UART: [state] CFI Enabled
2,852,372 UART: [state] LifecycleState = Unprovisioned
2,853,027 UART: [state] DebugLocked = No
2,853,699 UART: [state] WD Timer not started. Device not locked for debugging
2,854,905 UART: [kat] SHA2-256
3,660,555 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,664,680 UART: [kat] ++
3,664,832 UART: [kat] sha1
3,669,072 UART: [kat] SHA2-256
3,671,012 UART: [kat] SHA2-384
3,673,575 UART: [kat] SHA2-512-ACC
3,675,475 UART: [kat] ECC-384
3,685,222 UART: [kat] HMAC-384Kdf
3,689,702 UART: [kat] LMS
3,938,030 UART: [kat] --
3,938,830 UART: [update-reset] ++
5,250,514 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,251,689 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,401,513 >>> mbox cmd response: success
5,401,776 UART: [update-reset] Copying MAN_2 To MAN_1
5,409,790 UART: [update-reset Success] --
5,410,775 UART: [state] Locking Datavault
5,411,523 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,127 UART: [state] Locking ICCM
5,412,695 UART: [exit] Launching FMC @ 0x40000130
5,418,024 UART:
5,418,040 UART: Running Caliptra FMC ...
5,418,448 UART:
5,418,502 UART: [state] CFI Enabled
5,507,637 UART: [art] Extend RT PCRs Done
5,508,065 UART: [art] Lock RT PCRs Done
5,509,234 UART: [art] Populate DV Done
5,517,369 UART: [fht] FMC Alias Private Key: 7
5,518,299 UART: [art] Derive CDI
5,518,579 UART: [art] Store in in slot 0x4
5,604,212 UART: [art] Derive Key Pair
5,604,572 UART: [art] Store priv key in slot 0x5
5,617,454 UART: [art] Derive Key Pair - Done
5,632,671 UART: [art] Signing Cert with AUTHO
5,633,151 UART: RITY.KEYID = 7
5,648,021 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,786 UART: [art] PUB.X = 04D5B409D73141E3AD6542227575CAAB7F8351A9ED5E5351D04DFA179FB498D1777A6ED0516131E5BE64A5749631107D
5,655,548 UART: [art] PUB.Y = 36613941D0B9266F5ABA16A2A486F58155922BBD495D2C801AF62FB27C94BB7DC945A6EB4C45C55B35DB0BA7F372A6E4
5,662,505 UART: [art] SIG.R = 2BF82B48A5AA5883992E3F01201F5F35F794B8952EDFEF42F43B3579AF106FA3E4D35CAC73E2619840BAD9401C434CF4
5,669,280 UART: [art] SIG.S = 94107199031D09BD1C53C07F45712061FFBD42357A122E12DBC363220D0F00198F52E0AF9C13AC4ABCF5984DA3583747
5,693,307 UART: Caliptra RT
5,693,560 UART: [state] CFI Enabled
5,972,033 UART: Disabled attest: DPE valid fail
5,972,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,973,941 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,004,619 UART: [rt]cmd =0x494e464f, len=4
6,008,374 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,253 ready_for_fw is high
1,060,253 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,164,950 >>> mbox cmd response: success
2,164,950 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,227,156 UART:
2,227,172 UART: Running Caliptra FMC ...
2,227,580 UART:
2,227,634 UART: [state] CFI Enabled
2,238,657 UART: [fht] FMC Alias Private Key: 7
2,346,420 UART: [art] Extend RT PCRs Done
2,346,848 UART: [art] Lock RT PCRs Done
2,348,438 UART: [art] Populate DV Done
2,356,695 UART: [fht] FMC Alias Private Key: 7
2,357,835 UART: [art] Derive CDI
2,358,115 UART: [art] Store in in slot 0x4
2,443,602 UART: [art] Derive Key Pair
2,443,962 UART: [art] Store priv key in slot 0x5
2,456,394 UART: [art] Derive Key Pair - Done
2,470,740 UART: [art] Signing Cert with AUTHO
2,471,220 UART: RITY.KEYID = 7
2,486,432 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,197 UART: [art] PUB.X = 217DC9CFB4CBF398A43BC7635A7DE2DA7C2297BCEF2A50AC576A130F3D597C01462C64D23FEA2D7B50343961AD469D70
2,493,975 UART: [art] PUB.Y = 002ABEC13BA7EAD243841788CB2B76647EF0BD4FF7DAE27CEA6B38239CBCE4C519F2DCAB044B8F23843AD8FCB2DD2340
2,500,926 UART: [art] SIG.R = 2035E7B6ADB0EF38F1E871AE8421D92DE0F74DA367B4D7C69827C8C90327D85883E7CF4CB1E77A89D841745C5A6D41BA
2,507,703 UART: [art] SIG.S = E50B06AC6D49B4C5F5BE1F265593778E7DFA1DB63F9363DBC4CE20AD48992908F1F68C113A6A60259DAF1609054A6547
2,531,449 UART: mbox::rt_entry...
2,531,821 UART: ____ _ _ _ ____ _____
2,532,605 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,405 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,173 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,941 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,709 UART: |_|
2,536,021 UART:
2,643,007 UART: [rt] Runtime listening for mailbox commands...
2,647,975 >>> mbox cmd response data (3272 bytes)
2,647,976 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,671,062 >>> mbox cmd response data (0 bytes)
2,671,063 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,106,985 >>> mbox cmd response: success
5,119,907 UART:
5,119,923 UART: Running Caliptra FMC ...
5,120,331 UART:
5,120,385 UART: [state] CFI Enabled
5,209,790 UART: [art] Extend RT PCRs Done
5,210,218 UART: [art] Lock RT PCRs Done
5,211,451 UART: [art] Populate DV Done
5,219,674 UART: [fht] FMC Alias Private Key: 7
5,220,814 UART: [art] Derive CDI
5,221,094 UART: [art] Store in in slot 0x4
5,306,427 UART: [art] Derive Key Pair
5,306,787 UART: [art] Store priv key in slot 0x5
5,320,109 UART: [art] Derive Key Pair - Done
5,335,023 UART: [art] Signing Cert with AUTHO
5,335,503 UART: RITY.KEYID = 7
5,350,129 UART: [art] Erasing AUTHORITY.KEYID = 7
5,350,894 UART: [art] PUB.X = 2A5DE59B4797CCDF685ADDFA0AD619E0150A715895B2B1D88B0A8AA71BB130DD9753D2F1285E72E9AC623333ADDC25F6
5,357,671 UART: [art] PUB.Y = C77846E93405231E20391239A859AAFAA4221F1C190EBE9FB63999DB719984EEBFC1F4A467398D5DE3064CCDE018BEB0
5,364,620 UART: [art] SIG.R = ED2C6E3948234ACBDC07EBD14082C0969CE3B8E742A2492669D8204434D7C0EF1F2815DD8C9164FE15A932FDB97A9A87
5,371,395 UART: [art] SIG.S = A9E378EEE6871A9ACBC69CBEDCCDE725835AE386E944E9EB57A49604699394DC3E09388A68DD8183FDD4581C0C55817B
5,394,741 UART: Caliptra RT
5,394,994 UART: [state] CFI Enabled
5,677,480 UART: Disabled attest: DPE valid fail
5,677,986 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,679,552 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,710,002 UART: [rt]cmd =0x494e464f, len=4
5,713,671 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
893,767 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,892 UART: [kat] ++
898,044 UART: [kat] sha1
902,288 UART: [kat] SHA2-256
904,228 UART: [kat] SHA2-384
907,109 UART: [kat] SHA2-512-ACC
909,010 UART: [kat] ECC-384
918,767 UART: [kat] HMAC-384Kdf
923,231 UART: [kat] LMS
1,171,559 UART: [kat] --
1,172,420 UART: [cold-reset] ++
1,172,814 UART: [fht] FHT @ 0x50003400
1,175,327 UART: [idev] ++
1,175,495 UART: [idev] CDI.KEYID = 6
1,175,855 UART: [idev] SUBJECT.KEYID = 7
1,176,279 UART: [idev] UDS.KEYID = 0
1,176,624 ready_for_fw is high
1,176,624 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,415 UART: [idev] Erasing UDS.KEYID = 0
1,201,904 UART: [idev] Sha1 KeyId Algorithm
1,210,444 UART: [idev] --
1,211,482 UART: [ldev] ++
1,211,650 UART: [ldev] CDI.KEYID = 6
1,212,013 UART: [ldev] SUBJECT.KEYID = 5
1,212,439 UART: [ldev] AUTHORITY.KEYID = 7
1,212,902 UART: [ldev] FE.KEYID = 1
1,218,028 UART: [ldev] Erasing FE.KEYID = 1
1,244,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,588 UART: [ldev] --
1,283,941 UART: [fwproc] Wait for Commands...
1,284,551 UART: [fwproc] Recv command 0x46574c44
1,285,279 UART: [fwproc] Recv'd Img size: 78704 bytes
2,175,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,953 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,257 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,706 >>> mbox cmd response: success
2,313,706 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,314,852 UART: [afmc] ++
2,315,020 UART: [afmc] CDI.KEYID = 6
2,315,382 UART: [afmc] SUBJECT.KEYID = 7
2,315,807 UART: [afmc] AUTHORITY.KEYID = 5
2,350,890 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,485 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,233 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,961 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,846 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,565 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,481 UART: [afmc] --
2,394,489 UART: [cold-reset] --
2,395,135 UART: [state] Locking Datavault
2,396,206 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,810 UART: [state] Locking ICCM
2,397,370 UART: [exit] Launching FMC @ 0x40000130
2,402,699 UART:
2,402,715 UART: Running Caliptra FMC ...
2,403,123 UART:
2,403,266 UART: [state] CFI Enabled
2,414,151 UART: [fht] FMC Alias Private Key: 7
2,522,214 UART: [art] Extend RT PCRs Done
2,522,642 UART: [art] Lock RT PCRs Done
2,524,384 UART: [art] Populate DV Done
2,532,513 UART: [fht] FMC Alias Private Key: 7
2,533,623 UART: [art] Derive CDI
2,533,903 UART: [art] Store in in slot 0x4
2,619,438 UART: [art] Derive Key Pair
2,619,798 UART: [art] Store priv key in slot 0x5
2,633,142 UART: [art] Derive Key Pair - Done
2,647,873 UART: [art] Signing Cert with AUTHO
2,648,353 UART: RITY.KEYID = 7
2,663,669 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,434 UART: [art] PUB.X = C6AEDEC22C80F7D8F86770F21ED9C254D854FF929FA1C7941F792EDE58724B64177B9770187A8216E596A21B48EA5965
2,671,206 UART: [art] PUB.Y = DF6D15CED2AF1E5296C9E4ECCF545C1E55396A140E6829969D7A827AA4064EA0E0067C1309EDEA2B3C8040FC55D030C4
2,678,156 UART: [art] SIG.R = 3D30CC866AF1838C135E78ADFAD2CB526FB5BE46584EC0E1A0DCE372D91618FC8E48A54057EB3C38501CE346798A7C29
2,684,938 UART: [art] SIG.S = 06A6D4A930209D4BC365E8FF8E622373B5FDF46D23DB115B4826D82939CB7DD3EC0341C8703AB9869D5876413DFF3A02
2,708,716 UART: mbox::rt_entry...
2,709,088 UART: ____ _ _ _ ____ _____
2,709,872 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,672 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,440 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,208 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,976 UART: |_|
2,713,288 UART:
2,820,432 UART: [rt] Runtime listening for mailbox commands...
2,825,400 >>> mbox cmd response data (3272 bytes)
2,825,401 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,848,487 >>> mbox cmd response data (0 bytes)
2,848,488 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,848,605 UART:
2,848,621 UART: Running Caliptra ROM ...
2,849,029 UART:
2,849,171 UART: [state] CFI Enabled
2,851,655 UART: [state] LifecycleState = Unprovisioned
2,852,310 UART: [state] DebugLocked = No
2,853,024 UART: [state] WD Timer not started. Device not locked for debugging
2,854,296 UART: [kat] SHA2-256
3,659,946 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,664,071 UART: [kat] ++
3,664,223 UART: [kat] sha1
3,668,459 UART: [kat] SHA2-256
3,670,399 UART: [kat] SHA2-384
3,673,338 UART: [kat] SHA2-512-ACC
3,675,238 UART: [kat] ECC-384
3,684,673 UART: [kat] HMAC-384Kdf
3,689,337 UART: [kat] LMS
3,937,665 UART: [kat] --
3,938,497 UART: [update-reset] ++
5,249,871 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,251,026 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,400,850 >>> mbox cmd response: success
5,401,125 UART: [update-reset] Copying MAN_2 To MAN_1
5,409,139 UART: [update-reset Success] --
5,410,214 UART: [state] Locking Datavault
5,411,028 UART: [state] Locking PCR0, PCR1 and PCR31
5,411,632 UART: [state] Locking ICCM
5,412,136 UART: [exit] Launching FMC @ 0x40000130
5,417,465 UART:
5,417,481 UART: Running Caliptra FMC ...
5,417,889 UART:
5,418,032 UART: [state] CFI Enabled
5,507,547 UART: [art] Extend RT PCRs Done
5,507,975 UART: [art] Lock RT PCRs Done
5,509,352 UART: [art] Populate DV Done
5,517,611 UART: [fht] FMC Alias Private Key: 7
5,518,545 UART: [art] Derive CDI
5,518,825 UART: [art] Store in in slot 0x4
5,604,520 UART: [art] Derive Key Pair
5,604,880 UART: [art] Store priv key in slot 0x5
5,618,044 UART: [art] Derive Key Pair - Done
5,632,940 UART: [art] Signing Cert with AUTHO
5,633,420 UART: RITY.KEYID = 7
5,649,102 UART: [art] Erasing AUTHORITY.KEYID = 7
5,649,867 UART: [art] PUB.X = B48BB044941F4126B80E7780A7B3E2239ED189CCF9A56AAE3660E16569F545CC9FD42D2E7892EFCE6ECC04D998D349F5
5,656,641 UART: [art] PUB.Y = 63D62AF17573DB444F863417B9D8018C3AFEB474AA86A057DAB73FD0A2A35888E7C895204F506DE17F79C813454B914C
5,663,590 UART: [art] SIG.R = E1605EDC1402F7EB68003D85D0A9346E77E795FA177BF7D458282A3A03E4C92F26393C57CC266196B91CDAB203AF97D2
5,670,333 UART: [art] SIG.S = 9552B3DC999C834D58BEE34D8ABCB718CA880F243851F441B2DE0B5284FE7259CD10D4EEA0D0CE0FDC1EC744D25135E7
5,694,539 UART: Caliptra RT
5,694,884 UART: [state] CFI Enabled
5,976,720 UART: Disabled attest: DPE valid fail
5,977,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,978,518 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,008,930 UART: [rt]cmd =0x494e464f, len=4
6,012,657 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,130 ready_for_fw is high
1,061,130 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,167,089 >>> mbox cmd response: success
2,167,089 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,229,547 UART:
2,229,563 UART: Running Caliptra FMC ...
2,229,971 UART:
2,230,114 UART: [state] CFI Enabled
2,240,989 UART: [fht] FMC Alias Private Key: 7
2,348,614 UART: [art] Extend RT PCRs Done
2,349,042 UART: [art] Lock RT PCRs Done
2,350,348 UART: [art] Populate DV Done
2,358,825 UART: [fht] FMC Alias Private Key: 7
2,359,889 UART: [art] Derive CDI
2,360,169 UART: [art] Store in in slot 0x4
2,445,978 UART: [art] Derive Key Pair
2,446,338 UART: [art] Store priv key in slot 0x5
2,459,102 UART: [art] Derive Key Pair - Done
2,474,092 UART: [art] Signing Cert with AUTHO
2,474,572 UART: RITY.KEYID = 7
2,489,974 UART: [art] Erasing AUTHORITY.KEYID = 7
2,490,739 UART: [art] PUB.X = 6733D7146495D66CD2C6B444C02FBA6D1B5E349806BA7A5932ECCE752AD78A65FBAFCBB461FC0E7CC3222D4D060FCE24
2,497,515 UART: [art] PUB.Y = E219E58FBAF58CC70F3C5B0724B5A0B441D40BB6E1FF7DD9F57851A735F60D3B9E7952C8C217AFEA50D330E4DA309007
2,504,464 UART: [art] SIG.R = 73CC0F880BD7409F8E1B5667DB6C1A14D6F81B096BB531D9B9F224EFB289376214117B6ED9E1A9E943A834B40623A164
2,511,224 UART: [art] SIG.S = 271A170BB6F53602A19F72DEFAFEDC6D03B3AF8DE6D64B49ABFB5C8A7528282230740DD575A65E2840B44867BF0AB0A2
2,534,934 UART: mbox::rt_entry...
2,535,306 UART: ____ _ _ _ ____ _____
2,536,090 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,536,890 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,537,658 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,538,426 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,539,194 UART: |_|
2,539,506 UART:
2,646,886 UART: [rt] Runtime listening for mailbox commands...
2,651,854 >>> mbox cmd response data (3272 bytes)
2,651,855 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,674,941 >>> mbox cmd response data (0 bytes)
2,674,942 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,113,543 >>> mbox cmd response: success
5,127,327 UART:
5,127,343 UART: Running Caliptra FMC ...
5,127,751 UART:
5,127,894 UART: [state] CFI Enabled
5,216,777 UART: [art] Extend RT PCRs Done
5,217,205 UART: [art] Lock RT PCRs Done
5,218,508 UART: [art] Populate DV Done
5,226,679 UART: [fht] FMC Alias Private Key: 7
5,227,747 UART: [art] Derive CDI
5,228,027 UART: [art] Store in in slot 0x4
5,313,628 UART: [art] Derive Key Pair
5,313,988 UART: [art] Store priv key in slot 0x5
5,327,708 UART: [art] Derive Key Pair - Done
5,342,759 UART: [art] Signing Cert with AUTHO
5,343,239 UART: RITY.KEYID = 7
5,358,421 UART: [art] Erasing AUTHORITY.KEYID = 7
5,359,186 UART: [art] PUB.X = 83EE60490FE9640BDABE2BF6F129CBE6B807B757CD8D5CA09ADE8CA02EAD2A276CE184FD3063FFD635C466DEF76C5041
5,365,971 UART: [art] PUB.Y = 1F5AAF08DA0289FC9B07FDDB827A91BFF6BD1FACBD48A82B9018E4527AACE98A8BFB90F773AFD227DF450709505FDBF7
5,372,934 UART: [art] SIG.R = 334F4CDE6AE5094668803665C57C5C71B6A764E1D47017CD249BE9160AC70FA19D04A336697ECE2C830A6D4E346818DF
5,379,691 UART: [art] SIG.S = 83E908F73B542A1CB1D25070327ED505AFC81AC166A01F54A119A0DE9C7F1778F485894F72CFAACAC7CBA149246E2067
5,403,750 UART: Caliptra RT
5,404,095 UART: [state] CFI Enabled
5,688,782 UART: Disabled attest: DPE valid fail
5,689,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,690,424 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,720,578 UART: [rt]cmd =0x494e464f, len=4
5,724,185 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,342 UART: [state] LifecycleState = Unprovisioned
85,997 UART: [state] DebugLocked = No
86,671 UART: [state] WD Timer not started. Device not locked for debugging
87,968 UART: [kat] SHA2-256
891,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,647 UART: [kat] ++
895,799 UART: [kat] sha1
900,245 UART: [kat] SHA2-256
902,185 UART: [kat] SHA2-384
904,882 UART: [kat] SHA2-512-ACC
906,783 UART: [kat] ECC-384
916,974 UART: [kat] HMAC-384Kdf
921,408 UART: [kat] LMS
1,169,720 UART: [kat] --
1,170,305 UART: [cold-reset] ++
1,170,725 UART: [fht] FHT @ 0x50003400
1,173,569 UART: [idev] ++
1,173,737 UART: [idev] CDI.KEYID = 6
1,174,098 UART: [idev] SUBJECT.KEYID = 7
1,174,523 UART: [idev] UDS.KEYID = 0
1,174,869 ready_for_fw is high
1,174,869 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,415 UART: [idev] Erasing UDS.KEYID = 0
1,200,129 UART: [idev] Sha1 KeyId Algorithm
1,209,023 UART: [idev] --
1,210,046 UART: [ldev] ++
1,210,214 UART: [ldev] CDI.KEYID = 6
1,210,578 UART: [ldev] SUBJECT.KEYID = 5
1,211,005 UART: [ldev] AUTHORITY.KEYID = 7
1,211,468 UART: [ldev] FE.KEYID = 1
1,216,474 UART: [ldev] Erasing FE.KEYID = 1
1,241,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,742 UART: [ldev] --
1,281,108 UART: [fwproc] Wait for Commands...
1,281,887 UART: [fwproc] Recv command 0x46574c44
1,282,620 UART: [fwproc] Recv'd Img size: 78704 bytes
2,172,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,226 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,535 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,967 >>> mbox cmd response: success
2,311,967 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,313,046 UART: [afmc] ++
2,313,214 UART: [afmc] CDI.KEYID = 6
2,313,577 UART: [afmc] SUBJECT.KEYID = 7
2,314,003 UART: [afmc] AUTHORITY.KEYID = 5
2,349,706 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,863 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,592 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,475 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,194 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,207 UART: [afmc] --
2,393,321 UART: [cold-reset] --
2,394,251 UART: [state] Locking Datavault
2,395,502 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,106 UART: [state] Locking ICCM
2,396,602 UART: [exit] Launching FMC @ 0x40000130
2,401,931 UART:
2,401,947 UART: Running Caliptra FMC ...
2,402,355 UART:
2,402,409 UART: [state] CFI Enabled
2,412,232 UART: [fht] FMC Alias Private Key: 7
2,520,203 UART: [art] Extend RT PCRs Done
2,520,631 UART: [art] Lock RT PCRs Done
2,522,279 UART: [art] Populate DV Done
2,530,502 UART: [fht] FMC Alias Private Key: 7
2,531,466 UART: [art] Derive CDI
2,531,746 UART: [art] Store in in slot 0x4
2,617,493 UART: [art] Derive Key Pair
2,617,853 UART: [art] Store priv key in slot 0x5
2,631,371 UART: [art] Derive Key Pair - Done
2,646,240 UART: [art] Signing Cert with AUTHO
2,646,720 UART: RITY.KEYID = 7
2,662,154 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,919 UART: [art] PUB.X = 0E549EC94D489EAFD3A482B1671C01C9E0AD776161E0818B4941DBFDFC0C7969A80CC4281F8ED5EB6037D70648722FE6
2,669,682 UART: [art] PUB.Y = 17377FC8D0F7280D54D1560928185DD5ACDCB90E045AD590EE0B043A5D8CF2CBB41EDACA1D00DF9D838D167F7AF3BC56
2,676,612 UART: [art] SIG.R = 17B382BEDB94BF4499EBEFEB66618A80C1696E1EBD08D112EA0EB3854EB6645795165C546EEE6BC0A26C45BC997FBA04
2,683,389 UART: [art] SIG.S = 3BB03ECDBE4BDA7688A0B30B333812EBAC39FC5C6C30E8A11ABC06CD202240F79A3C752D2283E1DCA5877E6DEA9207CF
2,707,013 UART: mbox::rt_entry...
2,707,385 UART: ____ _ _ _ ____ _____
2,708,169 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,969 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,737 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,505 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,273 UART: |_|
2,711,585 UART:
2,817,867 UART: [rt] Runtime listening for mailbox commands...
2,822,835 >>> mbox cmd response data (3272 bytes)
2,822,836 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,845,922 >>> mbox cmd response data (0 bytes)
2,845,923 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,846,040 UART:
2,846,056 UART: Running Caliptra ROM ...
2,846,464 UART:
2,846,519 UART: [state] CFI Enabled
2,849,587 UART: [state] LifecycleState = Unprovisioned
2,850,242 UART: [state] DebugLocked = No
2,850,890 UART: [state] WD Timer not started. Device not locked for debugging
2,852,138 UART: [kat] SHA2-256
3,655,688 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,659,817 UART: [kat] ++
3,659,969 UART: [kat] sha1
3,664,155 UART: [kat] SHA2-256
3,666,095 UART: [kat] SHA2-384
3,668,842 UART: [kat] SHA2-512-ACC
3,670,742 UART: [kat] ECC-384
3,680,965 UART: [kat] HMAC-384Kdf
3,685,499 UART: [kat] LMS
3,933,811 UART: [kat] --
3,934,831 UART: [update-reset] ++
5,246,768 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,247,759 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,397,583 >>> mbox cmd response: success
5,397,828 UART: [update-reset] Copying MAN_2 To MAN_1
5,405,842 UART: [update-reset Success] --
5,406,773 UART: [state] Locking Datavault
5,407,505 UART: [state] Locking PCR0, PCR1 and PCR31
5,408,109 UART: [state] Locking ICCM
5,408,597 UART: [exit] Launching FMC @ 0x40000130
5,413,926 UART:
5,413,942 UART: Running Caliptra FMC ...
5,414,350 UART:
5,414,404 UART: [state] CFI Enabled
5,503,241 UART: [art] Extend RT PCRs Done
5,503,669 UART: [art] Lock RT PCRs Done
5,505,006 UART: [art] Populate DV Done
5,513,125 UART: [fht] FMC Alias Private Key: 7
5,514,085 UART: [art] Derive CDI
5,514,365 UART: [art] Store in in slot 0x4
5,600,132 UART: [art] Derive Key Pair
5,600,492 UART: [art] Store priv key in slot 0x5
5,613,490 UART: [art] Derive Key Pair - Done
5,628,711 UART: [art] Signing Cert with AUTHO
5,629,191 UART: RITY.KEYID = 7
5,644,497 UART: [art] Erasing AUTHORITY.KEYID = 7
5,645,262 UART: [art] PUB.X = 907F3C1BA9B0B8753B286357F0F52D610EB34BEC5E1877FD87B31D354DB397619D1FFA16B3D2764B7D3914A442623293
5,652,029 UART: [art] PUB.Y = 12DB13731B71AB8CA2AF9A021A371F6E6CDB50408D793624B4140BCCD7DE2FD02DF67CA6C55115E0F65F4D1FE3520547
5,658,982 UART: [art] SIG.R = 9EF003D89F7BA44F314F6F7B5EB39B9CA50D588D2C56914DDE365D5F97EC2634CB2EB8EEB73686000474A9CC1781B426
5,665,731 UART: [art] SIG.S = 7AFC9B955BB7742E4894A53B639A76A37710B0B473BCF52C1A0D1C8FA1564D932383278D29F02E6998829868E4B15DE4
5,689,995 UART: Caliptra RT
5,690,248 UART: [state] CFI Enabled
5,973,617 UART: Disabled attest: DPE valid fail
5,974,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,975,435 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,006,071 UART: [rt]cmd =0x494e464f, len=4
6,009,670 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,314 ready_for_fw is high
1,056,314 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,161,751 >>> mbox cmd response: success
2,161,751 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,223,899 UART:
2,223,915 UART: Running Caliptra FMC ...
2,224,323 UART:
2,224,377 UART: [state] CFI Enabled
2,234,706 UART: [fht] FMC Alias Private Key: 7
2,343,725 UART: [art] Extend RT PCRs Done
2,344,153 UART: [art] Lock RT PCRs Done
2,345,469 UART: [art] Populate DV Done
2,353,528 UART: [fht] FMC Alias Private Key: 7
2,354,484 UART: [art] Derive CDI
2,354,764 UART: [art] Store in in slot 0x4
2,439,919 UART: [art] Derive Key Pair
2,440,279 UART: [art] Store priv key in slot 0x5
2,453,077 UART: [art] Derive Key Pair - Done
2,468,177 UART: [art] Signing Cert with AUTHO
2,468,657 UART: RITY.KEYID = 7
2,483,531 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,296 UART: [art] PUB.X = 4075B254BB61D3F1A3C7C3B0EF9346206D40363A016E6A741DFE7294A03861F88EC28406C2EC486F01B47DB604D04107
2,491,049 UART: [art] PUB.Y = BE593A73D0D1B5F7E5B6C7339F26CE84E409D5DCF5D119410B1EBF6F0BB1AA4F00A98BF9D21A003F174C3ABC5E5013C2
2,497,966 UART: [art] SIG.R = 1142BF91CF50B9AA3CB547F9EC95ADDCA99E6276F661D77216682262F3AE92690C82E421D6EAB5CAEEA005B881F62E62
2,504,742 UART: [art] SIG.S = F19FDD2B6795BEF71B24B87C9625E2D1996779BCBD234E7800994877E265065BCC0099EE26150C54E4B6C3AF25B581A1
2,529,019 UART: mbox::rt_entry...
2,529,391 UART: ____ _ _ _ ____ _____
2,530,175 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,975 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,743 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,511 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,279 UART: |_|
2,533,591 UART:
2,639,445 UART: [rt] Runtime listening for mailbox commands...
2,644,413 >>> mbox cmd response data (3272 bytes)
2,644,414 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,667,500 >>> mbox cmd response data (0 bytes)
2,667,501 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,100,630 >>> mbox cmd response: success
5,114,324 UART:
5,114,340 UART: Running Caliptra FMC ...
5,114,748 UART:
5,114,802 UART: [state] CFI Enabled
5,204,231 UART: [art] Extend RT PCRs Done
5,204,659 UART: [art] Lock RT PCRs Done
5,206,054 UART: [art] Populate DV Done
5,214,455 UART: [fht] FMC Alias Private Key: 7
5,215,449 UART: [art] Derive CDI
5,215,729 UART: [art] Store in in slot 0x4
5,301,158 UART: [art] Derive Key Pair
5,301,518 UART: [art] Store priv key in slot 0x5
5,315,222 UART: [art] Derive Key Pair - Done
5,330,384 UART: [art] Signing Cert with AUTHO
5,330,864 UART: RITY.KEYID = 7
5,346,028 UART: [art] Erasing AUTHORITY.KEYID = 7
5,346,793 UART: [art] PUB.X = A4EA60CB152594D4CE2699E3FCC1AF8794599E5A1B00CE5982771DFCD1DB25DDFAD8B87609F08FC6BABA1D4BC703AE30
5,353,559 UART: [art] PUB.Y = 4374A75C13B0BBDE08E1FD15ADC51121C5AFF35C3B1C51A201916B90C851839AB83D544E67FE0355877B97B22CCFE9CC
5,360,512 UART: [art] SIG.R = 21DD2EF7B9FE1B132A5D8655E6BDE1C8A605896B5B3640077D0ED50263E91E3319C4F23F9E3D947C01DFE16EBB0DC33A
5,367,278 UART: [art] SIG.S = A16BE0548585D39E3E24213FF22275F64A1E9D5021169B0CB344130E4DB51C6A91BCF772DE86F329169D63B1516F6A85
5,391,157 UART: Caliptra RT
5,391,410 UART: [state] CFI Enabled
5,678,101 UART: Disabled attest: DPE valid fail
5,678,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,680,129 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,710,603 UART: [rt]cmd =0x494e464f, len=4
5,714,292 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
899,848 UART: [kat] SHA2-256
901,788 UART: [kat] SHA2-384
904,701 UART: [kat] SHA2-512-ACC
906,602 UART: [kat] ECC-384
916,755 UART: [kat] HMAC-384Kdf
921,233 UART: [kat] LMS
1,169,545 UART: [kat] --
1,170,658 UART: [cold-reset] ++
1,171,154 UART: [fht] FHT @ 0x50003400
1,173,894 UART: [idev] ++
1,174,062 UART: [idev] CDI.KEYID = 6
1,174,423 UART: [idev] SUBJECT.KEYID = 7
1,174,848 UART: [idev] UDS.KEYID = 0
1,175,194 ready_for_fw is high
1,175,194 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,796 UART: [idev] Erasing UDS.KEYID = 0
1,200,040 UART: [idev] Sha1 KeyId Algorithm
1,208,796 UART: [idev] --
1,209,835 UART: [ldev] ++
1,210,003 UART: [ldev] CDI.KEYID = 6
1,210,367 UART: [ldev] SUBJECT.KEYID = 5
1,210,794 UART: [ldev] AUTHORITY.KEYID = 7
1,211,257 UART: [ldev] FE.KEYID = 1
1,216,613 UART: [ldev] Erasing FE.KEYID = 1
1,242,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,989 UART: [ldev] --
1,282,295 UART: [fwproc] Wait for Commands...
1,282,976 UART: [fwproc] Recv command 0x46574c44
1,283,709 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,653 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,791 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,100 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,484 >>> mbox cmd response: success
2,312,484 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,313,539 UART: [afmc] ++
2,313,707 UART: [afmc] CDI.KEYID = 6
2,314,070 UART: [afmc] SUBJECT.KEYID = 7
2,314,496 UART: [afmc] AUTHORITY.KEYID = 5
2,350,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,150 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,879 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,762 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,481 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,288 UART: [afmc] --
2,393,302 UART: [cold-reset] --
2,393,952 UART: [state] Locking Datavault
2,394,955 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,559 UART: [state] Locking ICCM
2,396,013 UART: [exit] Launching FMC @ 0x40000130
2,401,342 UART:
2,401,358 UART: Running Caliptra FMC ...
2,401,766 UART:
2,401,909 UART: [state] CFI Enabled
2,412,676 UART: [fht] FMC Alias Private Key: 7
2,521,109 UART: [art] Extend RT PCRs Done
2,521,537 UART: [art] Lock RT PCRs Done
2,523,115 UART: [art] Populate DV Done
2,531,228 UART: [fht] FMC Alias Private Key: 7
2,532,376 UART: [art] Derive CDI
2,532,656 UART: [art] Store in in slot 0x4
2,618,331 UART: [art] Derive Key Pair
2,618,691 UART: [art] Store priv key in slot 0x5
2,631,495 UART: [art] Derive Key Pair - Done
2,646,537 UART: [art] Signing Cert with AUTHO
2,647,017 UART: RITY.KEYID = 7
2,662,495 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,260 UART: [art] PUB.X = F54001C74091CA90282409FEB23ECDB3E497BED542708FCEFA6D7008D6E32F6117527BB4C2475E00B750F11F00148B83
2,669,979 UART: [art] PUB.Y = D8C21EFC7A4267CCCA5AAA181220AAA4FF359B29DCFF06501B42A5D4E587B6AD77A4122BDF66DD763A57BE17E2D18D08
2,676,945 UART: [art] SIG.R = 416598411EB03274F82E3576E414655AC4458D96239A90AF1C13D44B8CA2CC332690C505A5D813D53CEACAC0BC3C21D9
2,683,714 UART: [art] SIG.S = 8EEFC40A58E16F9F8DCE369375A24D42BB94EAF6227A7CC56E7003BEB9A85381EC1F60DC7EDCACA0511968357112E62A
2,707,783 UART: mbox::rt_entry...
2,708,155 UART: ____ _ _ _ ____ _____
2,708,939 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,739 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,507 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,275 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,043 UART: |_|
2,712,355 UART:
2,819,485 UART: [rt] Runtime listening for mailbox commands...
2,824,453 >>> mbox cmd response data (3272 bytes)
2,824,454 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,847,540 >>> mbox cmd response data (0 bytes)
2,847,541 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,847,658 UART:
2,847,674 UART: Running Caliptra ROM ...
2,848,082 UART:
2,848,224 UART: [state] CFI Enabled
2,850,966 UART: [state] LifecycleState = Unprovisioned
2,851,621 UART: [state] DebugLocked = No
2,852,293 UART: [state] WD Timer not started. Device not locked for debugging
2,853,439 UART: [kat] SHA2-256
3,656,989 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,661,118 UART: [kat] ++
3,661,270 UART: [kat] sha1
3,665,436 UART: [kat] SHA2-256
3,667,376 UART: [kat] SHA2-384
3,669,977 UART: [kat] SHA2-512-ACC
3,671,877 UART: [kat] ECC-384
3,681,498 UART: [kat] HMAC-384Kdf
3,686,264 UART: [kat] LMS
3,934,576 UART: [kat] --
3,935,394 UART: [update-reset] ++
5,246,821 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,247,862 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,397,686 >>> mbox cmd response: success
5,397,933 UART: [update-reset] Copying MAN_2 To MAN_1
5,405,947 UART: [update-reset Success] --
5,407,030 UART: [state] Locking Datavault
5,407,752 UART: [state] Locking PCR0, PCR1 and PCR31
5,408,356 UART: [state] Locking ICCM
5,408,986 UART: [exit] Launching FMC @ 0x40000130
5,414,315 UART:
5,414,331 UART: Running Caliptra FMC ...
5,414,739 UART:
5,414,882 UART: [state] CFI Enabled
5,503,529 UART: [art] Extend RT PCRs Done
5,503,957 UART: [art] Lock RT PCRs Done
5,505,054 UART: [art] Populate DV Done
5,513,313 UART: [fht] FMC Alias Private Key: 7
5,514,399 UART: [art] Derive CDI
5,514,679 UART: [art] Store in in slot 0x4
5,600,366 UART: [art] Derive Key Pair
5,600,726 UART: [art] Store priv key in slot 0x5
5,614,050 UART: [art] Derive Key Pair - Done
5,628,689 UART: [art] Signing Cert with AUTHO
5,629,169 UART: RITY.KEYID = 7
5,644,249 UART: [art] Erasing AUTHORITY.KEYID = 7
5,645,014 UART: [art] PUB.X = C92F34BC6CF9ECA64D1451C37760526BD88E1077DB0C43E43C5A3287CC5A0E32355C48EF89E51FAE52DE7553DB8ED63E
5,651,792 UART: [art] PUB.Y = 9ECF7135456D7062D2229DAEFFCA739132576E3FC7C35DA6C76E21AFB5AFDBD8113CE9BFB83F67ECF46D403F646E7961
5,658,760 UART: [art] SIG.R = 061957D14A49133CB8AC96753CCE3790F685FC798817E7CEDB4F4F29D278730E69021CE70A4320F1C900B952E83CE451
5,665,494 UART: [art] SIG.S = 2C6C3F83A111E70166591BDF29226FDAA40D2BA405DBDC088E115E7ABCE3A163051C436762CA52C7C80F4075E1B1E840
5,689,531 UART: Caliptra RT
5,689,876 UART: [state] CFI Enabled
5,973,603 UART: Disabled attest: DPE valid fail
5,974,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,975,495 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,005,591 UART: [rt]cmd =0x494e464f, len=4
6,009,298 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,523 ready_for_fw is high
1,056,523 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,161,072 >>> mbox cmd response: success
2,161,072 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,223,366 UART:
2,223,382 UART: Running Caliptra FMC ...
2,223,790 UART:
2,223,933 UART: [state] CFI Enabled
2,234,774 UART: [fht] FMC Alias Private Key: 7
2,342,571 UART: [art] Extend RT PCRs Done
2,342,999 UART: [art] Lock RT PCRs Done
2,344,685 UART: [art] Populate DV Done
2,353,012 UART: [fht] FMC Alias Private Key: 7
2,354,118 UART: [art] Derive CDI
2,354,398 UART: [art] Store in in slot 0x4
2,440,141 UART: [art] Derive Key Pair
2,440,501 UART: [art] Store priv key in slot 0x5
2,454,897 UART: [art] Derive Key Pair - Done
2,469,801 UART: [art] Signing Cert with AUTHO
2,470,281 UART: RITY.KEYID = 7
2,485,471 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,236 UART: [art] PUB.X = B146A53356AB63823738D7C8A5F47F3E8EEC9FE5EFEA20230054E57BA1441F70FDCC303147C92016F05F65E3F3C1B1D3
2,492,992 UART: [art] PUB.Y = 1F3086C1DA7B84E89E6ABD822C0AF7AB1E47EA0D278B2D5565513928A4568722CC2DDF5B4E1D771AE19EEC7AEC7664A1
2,499,952 UART: [art] SIG.R = 5D7313291BEAEC1E1CED975727CB0CAB48165141F85D8F5FE483311F066607D85A44FF0C4B5F5E4468462058A40A4266
2,506,707 UART: [art] SIG.S = D48F2DB6518A6E65A0563D3E2529A069BADBCE78FF5DE56A336BFBF74D61B9800E7FB12099B77765CD2B6161FDB1288A
2,530,595 UART: mbox::rt_entry...
2,530,967 UART: ____ _ _ _ ____ _____
2,531,751 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,551 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,319 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,087 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,855 UART: |_|
2,535,167 UART:
2,641,337 UART: [rt] Runtime listening for mailbox commands...
2,646,305 >>> mbox cmd response data (3272 bytes)
2,646,306 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,669,392 >>> mbox cmd response data (0 bytes)
2,669,393 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,100,879 >>> mbox cmd response: success
5,114,261 UART:
5,114,277 UART: Running Caliptra FMC ...
5,114,685 UART:
5,114,828 UART: [state] CFI Enabled
5,204,193 UART: [art] Extend RT PCRs Done
5,204,621 UART: [art] Lock RT PCRs Done
5,205,838 UART: [art] Populate DV Done
5,214,127 UART: [fht] FMC Alias Private Key: 7
5,215,083 UART: [art] Derive CDI
5,215,363 UART: [art] Store in in slot 0x4
5,300,828 UART: [art] Derive Key Pair
5,301,188 UART: [art] Store priv key in slot 0x5
5,313,850 UART: [art] Derive Key Pair - Done
5,328,485 UART: [art] Signing Cert with AUTHO
5,328,965 UART: RITY.KEYID = 7
5,344,037 UART: [art] Erasing AUTHORITY.KEYID = 7
5,344,802 UART: [art] PUB.X = 9F1352ED8410CCF6AA795BED6034E64FF664563B04C90654F0B6279F43586794CC1C915B48B3CEF9C02D36239C8F6C0B
5,351,567 UART: [art] PUB.Y = 1F9EDE1FC54043322348AFC9C587458116996F4DEBA9DDA5F8A0650CD42BAF807F79216DE668FB50E254094FC128CB73
5,358,519 UART: [art] SIG.R = D4118782B04775E5469BCD3C73A79F47FB3EA7F6CA5810F75B23EA19245A3E3E9159E8A4FFBC785712CBE0723E48ED20
5,365,297 UART: [art] SIG.S = AC808B11C2836037663358787F9384AAB99E97AF410605523A35AB624A30F2C9224F4DA794A7E22DC41938E172AB3ACC
5,389,488 UART: Caliptra RT
5,389,833 UART: [state] CFI Enabled
5,676,635 UART: Disabled attest: DPE valid fail
5,677,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,678,585 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,709,157 UART: [rt]cmd =0x494e464f, len=4
5,712,828 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,494 UART: [state] LifecycleState = Unprovisioned
86,149 UART: [state] DebugLocked = No
86,639 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,185 UART: [kat] SHA2-256
882,116 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,231 UART: [kat] ++
886,383 UART: [kat] sha1
890,491 UART: [kat] SHA2-256
892,429 UART: [kat] SHA2-384
895,242 UART: [kat] SHA2-512-ACC
897,143 UART: [kat] ECC-384
902,704 UART: [kat] HMAC-384Kdf
907,360 UART: [kat] LMS
1,475,556 UART: [kat] --
1,476,561 UART: [cold-reset] ++
1,477,049 UART: [fht] Storing FHT @ 0x50003400
1,479,862 UART: [idev] ++
1,480,030 UART: [idev] CDI.KEYID = 6
1,480,390 UART: [idev] SUBJECT.KEYID = 7
1,480,814 UART: [idev] UDS.KEYID = 0
1,481,159 ready_for_fw is high
1,481,159 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,489,206 UART: [idev] Erasing UDS.KEYID = 0
1,506,508 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,266 UART: [idev] --
1,516,433 UART: [ldev] ++
1,516,601 UART: [ldev] CDI.KEYID = 6
1,516,964 UART: [ldev] SUBJECT.KEYID = 5
1,517,390 UART: [ldev] AUTHORITY.KEYID = 7
1,517,853 UART: [ldev] FE.KEYID = 1
1,523,037 UART: [ldev] Erasing FE.KEYID = 1
1,548,148 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,956 UART: [ldev] --
1,587,463 UART: [fwproc] Waiting for Commands...
1,588,114 UART: [fwproc] Received command 0x46574c44
1,588,905 UART: [fwproc] Received Image of size 78704 bytes
2,479,787 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,506,497 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,535,849 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,618,324 >>> mbox cmd response: success
2,618,324 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,619,468 UART: [afmc] ++
2,619,636 UART: [afmc] CDI.KEYID = 6
2,619,998 UART: [afmc] SUBJECT.KEYID = 7
2,620,423 UART: [afmc] AUTHORITY.KEYID = 5
2,655,576 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,671,588 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,672,368 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,678,096 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,683,981 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,689,671 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,697,702 UART: [afmc] --
2,698,594 UART: [cold-reset] --
2,699,452 UART: [state] Locking Datavault
2,700,871 UART: [state] Locking PCR0, PCR1 and PCR31
2,701,475 UART: [state] Locking ICCM
2,702,083 UART: [exit] Launching FMC @ 0x40000130
2,707,412 UART:
2,707,428 UART: Running Caliptra FMC ...
2,707,836 UART:
2,707,890 UART: [state] CFI Enabled
2,718,397 UART: [fht] FMC Alias Private Key: 7
2,826,246 UART: [art] Extend RT PCRs Done
2,826,674 UART: [art] Lock RT PCRs Done
2,827,990 UART: [art] Populate DV Done
2,836,245 UART: [fht] FMC Alias Private Key: 7
2,837,413 UART: [art] Derive CDI
2,837,693 UART: [art] Store in in slot 0x4
2,923,484 UART: [art] Derive Key Pair
2,923,844 UART: [art] Store priv key in slot 0x5
2,937,124 UART: [art] Derive Key Pair - Done
2,952,011 UART: [art] Signing Cert with AUTHO
2,952,491 UART: RITY.KEYID = 7
2,968,015 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,780 UART: [art] PUB.X = 796910BEC1256B4A5C3964E07DFB0D643E06AA82F5E7A07B5E2D9875F3E672A4B9C8C2C1B4850E43016C2EA46EF5CAAD
2,975,552 UART: [art] PUB.Y = 26EA83A3A80A6ABBEBA78058985AB859C7C2EF8A297A8BC1498C768805AAAFCC0028E00349108C577C1E195DF7420AF9
2,982,478 UART: [art] SIG.R = EF0B213B4739FC78D242CF2BBB2CD3C6403850DD5C1695120211FF90A37D3A8BC4968B94CD9334204B533232D1B9441F
2,989,244 UART: [art] SIG.S = 128D70E4942378CE5457CDD3751DC8E664D5A7C8634E032FFF157DA8EFE81B7FBFF522E2F197112A80BAF4840A8A2712
3,013,555 UART: mbox::rt_entry...
3,013,927 UART: ____ _ _ _ ____ _____
3,014,711 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,015,511 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,016,279 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,017,047 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,017,815 UART: |_|
3,018,127 UART:
3,125,123 UART: [rt] Runtime listening for mailbox commands...
3,130,091 >>> mbox cmd response data (3272 bytes)
3,130,092 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,153,178 >>> mbox cmd response data (0 bytes)
3,153,179 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,153,299 UART:
3,153,315 UART: Running Caliptra ROM ...
3,153,723 UART:
3,153,777 UART: [state] CFI Enabled
3,156,617 UART: [state] LifecycleState = Unprovisioned
3,157,272 UART: [state] DebugLocked = No
3,158,008 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,159,573 UART: [kat] SHA2-256
3,953,504 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,957,619 UART: [kat] ++
3,957,771 UART: [kat] sha1
3,962,119 UART: [kat] SHA2-256
3,964,057 UART: [kat] SHA2-384
3,966,626 UART: [kat] SHA2-512-ACC
3,968,526 UART: [kat] ECC-384
3,974,195 UART: [kat] HMAC-384Kdf
3,978,639 UART: [kat] LMS
4,546,835 UART: [kat] --
4,547,726 UART: [update-reset] ++
5,882,348 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,883,476 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,033,352 >>> mbox cmd response: success
6,033,701 UART: [update-reset] Copying MAN_2 To MAN_1
6,041,715 UART: [update-reset Success] --
6,042,678 UART: [state] Locking Datavault
6,043,516 UART: [state] Locking PCR0, PCR1 and PCR31
6,044,120 UART: [state] Locking ICCM
6,044,794 UART: [exit] Launching FMC @ 0x40000130
6,050,123 UART:
6,050,139 UART: Running Caliptra FMC ...
6,050,547 UART:
6,050,601 UART: [state] CFI Enabled
6,139,390 UART: [art] Extend RT PCRs Done
6,139,818 UART: [art] Lock RT PCRs Done
6,141,005 UART: [art] Populate DV Done
6,149,084 UART: [fht] FMC Alias Private Key: 7
6,150,168 UART: [art] Derive CDI
6,150,448 UART: [art] Store in in slot 0x4
6,235,851 UART: [art] Derive Key Pair
6,236,211 UART: [art] Store priv key in slot 0x5
6,249,501 UART: [art] Derive Key Pair - Done
6,264,268 UART: [art] Signing Cert with AUTHO
6,264,748 UART: RITY.KEYID = 7
6,280,020 UART: [art] Erasing AUTHORITY.KEYID = 7
6,280,785 UART: [art] PUB.X = 3CD5380FC17124079660E916FEC09EFBD9A993798F78C4A08493A5971DADC30EBA5695C986FDD339A6D44A5800100B0E
6,287,522 UART: [art] PUB.Y = 6BA3F14382A6C728EB3D9AFE6DAAE9CEA41EFADE1F6C54EBE9D2530A3EE03E8017EDC31357E45180461F298981309126
6,294,483 UART: [art] SIG.R = 6D788F8A91D825175C3E4DE1404B1A6AC9A7710B3BF2A633193E11BCABDA9574A97CCC1C2E20916B587D3639D4FDD4D8
6,301,262 UART: [art] SIG.S = 3D3D5817145A7108774D480C2A8FBF7145F5D1F6F3657F54572604DB2CD62B6EFA9FC873EDC12D2F81F31D35EA8AEE9B
6,325,004 UART: Caliptra RT
6,325,257 UART: [state] CFI Enabled
6,389,833 UART: Disabled attest: DPE valid fail
6,390,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,391,697 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,422,483 UART: [rt]cmd =0x494e464f, len=4
6,426,168 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,127 ready_for_fw is high
1,362,127 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,466,164 >>> mbox cmd response: success
2,466,164 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,527,680 UART:
2,527,696 UART: Running Caliptra FMC ...
2,528,104 UART:
2,528,158 UART: [state] CFI Enabled
2,538,537 UART: [fht] FMC Alias Private Key: 7
2,646,510 UART: [art] Extend RT PCRs Done
2,646,938 UART: [art] Lock RT PCRs Done
2,648,524 UART: [art] Populate DV Done
2,656,561 UART: [fht] FMC Alias Private Key: 7
2,657,499 UART: [art] Derive CDI
2,657,779 UART: [art] Store in in slot 0x4
2,743,274 UART: [art] Derive Key Pair
2,743,634 UART: [art] Store priv key in slot 0x5
2,757,362 UART: [art] Derive Key Pair - Done
2,771,864 UART: [art] Signing Cert with AUTHO
2,772,344 UART: RITY.KEYID = 7
2,787,456 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,221 UART: [art] PUB.X = 2116F67A14635DF261324CCDD29FB6DCE6B18DC741B2257359FD219D77E9B775F31D2676C2DA698132EC5D6A7B4DBE55
2,794,999 UART: [art] PUB.Y = EDDE1FFDFE3BE14125B8D1C9F37B0EFD8712EACBAB2A5BEFDC98921C0398EFDCE18DA3640B690170C191D766D2B91C2C
2,801,967 UART: [art] SIG.R = E7EC994DEDFDF11A3F7B4FB200BD7FA31150C4D957FD057BC000BF9243523F06FC2CAAF1C2E4BA4CA6C77CDB97E39AC3
2,808,717 UART: [art] SIG.S = 962020959775B4DED6FD8895C89F78CE5308C9936418D4C40D121F02251196BC9B736E715E6421375ABAFA84B08508AB
2,832,954 UART: mbox::rt_entry...
2,833,326 UART: ____ _ _ _ ____ _____
2,834,110 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,834,910 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,835,678 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,446 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,214 UART: |_|
2,837,526 UART:
2,943,477 UART: [rt] Runtime listening for mailbox commands...
2,948,445 >>> mbox cmd response data (3272 bytes)
2,948,446 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,971,532 >>> mbox cmd response data (0 bytes)
2,971,533 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,732,774 >>> mbox cmd response: success
5,746,089 UART:
5,746,105 UART: Running Caliptra FMC ...
5,746,513 UART:
5,746,567 UART: [state] CFI Enabled
5,834,918 UART: [art] Extend RT PCRs Done
5,835,346 UART: [art] Lock RT PCRs Done
5,836,443 UART: [art] Populate DV Done
5,844,622 UART: [fht] FMC Alias Private Key: 7
5,845,736 UART: [art] Derive CDI
5,846,016 UART: [art] Store in in slot 0x4
5,931,605 UART: [art] Derive Key Pair
5,931,965 UART: [art] Store priv key in slot 0x5
5,945,195 UART: [art] Derive Key Pair - Done
5,960,075 UART: [art] Signing Cert with AUTHO
5,960,555 UART: RITY.KEYID = 7
5,976,093 UART: [art] Erasing AUTHORITY.KEYID = 7
5,976,858 UART: [art] PUB.X = A4138F7F329965045553B7AB829C8E1367CC8662331F43CB53E9BBB21A02DF4FD34DC5151E67684C86218A5859F82549
5,983,616 UART: [art] PUB.Y = 73D4D6E13E3A853AE570873222ADFFB90422BD3ABC0C3B1B92828025C4D80A167CDED57CC264581FEA00B548CF1954BA
5,990,547 UART: [art] SIG.R = A7CF4D61F9313E81D6BC560A339890564AE06B584D72C948EEF0A8E8ADF88B61EBD98BDBBC7FBE2F57B06C2213D41F23
5,997,332 UART: [art] SIG.S = 2012E24F4852267DFCEDCD5933DA28E5E6BF6CB27FE787415466C1B70DCF73BF619A890F6D7F7E16EF065A0E39470A6F
6,021,822 UART: Caliptra RT
6,022,075 UART: [state] CFI Enabled
6,086,180 UART: Disabled attest: DPE valid fail
6,086,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,088,140 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,118,892 UART: [rt]cmd =0x494e464f, len=4
6,122,579 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,107 UART: [state] LifecycleState = Unprovisioned
85,762 UART: [state] DebugLocked = No
86,414 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,140 UART: [kat] SHA2-256
882,071 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,186 UART: [kat] ++
886,338 UART: [kat] sha1
890,764 UART: [kat] SHA2-256
892,702 UART: [kat] SHA2-384
895,313 UART: [kat] SHA2-512-ACC
897,214 UART: [kat] ECC-384
902,885 UART: [kat] HMAC-384Kdf
907,477 UART: [kat] LMS
1,475,673 UART: [kat] --
1,476,716 UART: [cold-reset] ++
1,477,250 UART: [fht] Storing FHT @ 0x50003400
1,480,265 UART: [idev] ++
1,480,433 UART: [idev] CDI.KEYID = 6
1,480,793 UART: [idev] SUBJECT.KEYID = 7
1,481,217 UART: [idev] UDS.KEYID = 0
1,481,562 ready_for_fw is high
1,481,562 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,489,215 UART: [idev] Erasing UDS.KEYID = 0
1,505,969 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,453 UART: [idev] --
1,515,612 UART: [ldev] ++
1,515,780 UART: [ldev] CDI.KEYID = 6
1,516,143 UART: [ldev] SUBJECT.KEYID = 5
1,516,569 UART: [ldev] AUTHORITY.KEYID = 7
1,517,032 UART: [ldev] FE.KEYID = 1
1,522,280 UART: [ldev] Erasing FE.KEYID = 1
1,547,533 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,633 UART: [ldev] --
1,586,996 UART: [fwproc] Waiting for Commands...
1,587,689 UART: [fwproc] Received command 0x46574c44
1,588,480 UART: [fwproc] Received Image of size 78704 bytes
2,479,186 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,506,110 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,535,462 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,937 >>> mbox cmd response: success
2,617,937 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,619,003 UART: [afmc] ++
2,619,171 UART: [afmc] CDI.KEYID = 6
2,619,533 UART: [afmc] SUBJECT.KEYID = 7
2,619,958 UART: [afmc] AUTHORITY.KEYID = 5
2,654,985 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,671,299 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,672,079 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,807 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,683,692 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,689,382 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,697,385 UART: [afmc] --
2,698,299 UART: [cold-reset] --
2,699,281 UART: [state] Locking Datavault
2,700,500 UART: [state] Locking PCR0, PCR1 and PCR31
2,701,104 UART: [state] Locking ICCM
2,701,676 UART: [exit] Launching FMC @ 0x40000130
2,707,005 UART:
2,707,021 UART: Running Caliptra FMC ...
2,707,429 UART:
2,707,572 UART: [state] CFI Enabled
2,718,635 UART: [fht] FMC Alias Private Key: 7
2,826,758 UART: [art] Extend RT PCRs Done
2,827,186 UART: [art] Lock RT PCRs Done
2,828,586 UART: [art] Populate DV Done
2,836,921 UART: [fht] FMC Alias Private Key: 7
2,838,023 UART: [art] Derive CDI
2,838,303 UART: [art] Store in in slot 0x4
2,923,690 UART: [art] Derive Key Pair
2,924,050 UART: [art] Store priv key in slot 0x5
2,937,362 UART: [art] Derive Key Pair - Done
2,952,199 UART: [art] Signing Cert with AUTHO
2,952,679 UART: RITY.KEYID = 7
2,967,975 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,740 UART: [art] PUB.X = 159FD0FF3D508B072B089CC36F9F581B6DA9496F781ACB13BD6CB7D248EA3E4567612E68E46C57C7E2BCB1A2001CFB18
2,975,496 UART: [art] PUB.Y = 2B3A088B67B500F9361E6A8BB7278F7CF2710A7D66C625A5D47527A8C1940077A7011DDB00F25FFA482970A0C822BCBF
2,982,375 UART: [art] SIG.R = 298E2DA4FE19ACFB7B4C30F6927064A84EC6E2D658C93173AF7DC9CA473C72CBE92625E251D51E595B55D53F9BBCD63B
2,989,161 UART: [art] SIG.S = 5F3333C9C3ACCCD33882B11A59F9AA05D0C0A25A724DD5873DCAD36E07E159CA29D511E43EF1084DDCEAA6759EC775B3
3,012,449 UART: mbox::rt_entry...
3,012,821 UART: ____ _ _ _ ____ _____
3,013,605 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,014,405 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,015,173 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,015,941 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,016,709 UART: |_|
3,017,021 UART:
3,124,750 UART: [rt] Runtime listening for mailbox commands...
3,129,718 >>> mbox cmd response data (3272 bytes)
3,129,719 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,152,805 >>> mbox cmd response data (0 bytes)
3,152,806 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,152,926 UART:
3,152,942 UART: Running Caliptra ROM ...
3,153,350 UART:
3,153,491 UART: [state] CFI Enabled
3,156,639 UART: [state] LifecycleState = Unprovisioned
3,157,294 UART: [state] DebugLocked = No
3,157,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,159,369 UART: [kat] SHA2-256
3,953,300 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,957,415 UART: [kat] ++
3,957,567 UART: [kat] sha1
3,961,871 UART: [kat] SHA2-256
3,963,809 UART: [kat] SHA2-384
3,966,318 UART: [kat] SHA2-512-ACC
3,968,218 UART: [kat] ECC-384
3,974,105 UART: [kat] HMAC-384Kdf
3,978,713 UART: [kat] LMS
4,546,909 UART: [kat] --
4,547,952 UART: [update-reset] ++
5,881,734 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,882,990 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,032,866 >>> mbox cmd response: success
6,033,217 UART: [update-reset] Copying MAN_2 To MAN_1
6,041,231 UART: [update-reset Success] --
6,042,232 UART: [state] Locking Datavault
6,042,880 UART: [state] Locking PCR0, PCR1 and PCR31
6,043,484 UART: [state] Locking ICCM
6,044,128 UART: [exit] Launching FMC @ 0x40000130
6,049,457 UART:
6,049,473 UART: Running Caliptra FMC ...
6,049,881 UART:
6,050,024 UART: [state] CFI Enabled
6,139,055 UART: [art] Extend RT PCRs Done
6,139,483 UART: [art] Lock RT PCRs Done
6,140,886 UART: [art] Populate DV Done
6,149,251 UART: [fht] FMC Alias Private Key: 7
6,150,229 UART: [art] Derive CDI
6,150,509 UART: [art] Store in in slot 0x4
6,236,324 UART: [art] Derive Key Pair
6,236,684 UART: [art] Store priv key in slot 0x5
6,249,876 UART: [art] Derive Key Pair - Done
6,264,588 UART: [art] Signing Cert with AUTHO
6,265,068 UART: RITY.KEYID = 7
6,280,050 UART: [art] Erasing AUTHORITY.KEYID = 7
6,280,815 UART: [art] PUB.X = D903B39D9AC4BC09C7DD94049834AA473CA6C848E469467B43C37B78B334A20E4C124BCE5C7E021FD70F28D073122B7E
6,287,573 UART: [art] PUB.Y = 6544C6977788356667B3B164EBE9CC0109A88BCA7C4797E356E7144A0AE5C65294C2C37961A9A2CE0B6A806A1CCD4A8B
6,294,515 UART: [art] SIG.R = B88A6F3CF6EE369C82F5A588B1C4FEC3D8288CA48FF8D710FC238D1BB659534BAFB4FAF5773A153714DDB9FFBBC90684
6,301,304 UART: [art] SIG.S = EC728833F3F3EE2F62AF3AC8D082AA20FE1930FBA2664CCD9DCEF5F6B9EEFA8BBBB4CD3A08D1EEAFC625B40E5967197A
6,325,271 UART: Caliptra RT
6,325,616 UART: [state] CFI Enabled
6,389,842 UART: Disabled attest: DPE valid fail
6,390,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,391,678 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,422,090 UART: [rt]cmd =0x494e464f, len=4
6,425,811 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,578 ready_for_fw is high
1,362,578 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,465,947 >>> mbox cmd response: success
2,465,947 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,527,299 UART:
2,527,315 UART: Running Caliptra FMC ...
2,527,723 UART:
2,527,866 UART: [state] CFI Enabled
2,538,183 UART: [fht] FMC Alias Private Key: 7
2,646,066 UART: [art] Extend RT PCRs Done
2,646,494 UART: [art] Lock RT PCRs Done
2,648,222 UART: [art] Populate DV Done
2,656,461 UART: [fht] FMC Alias Private Key: 7
2,657,411 UART: [art] Derive CDI
2,657,691 UART: [art] Store in in slot 0x4
2,743,412 UART: [art] Derive Key Pair
2,743,772 UART: [art] Store priv key in slot 0x5
2,757,162 UART: [art] Derive Key Pair - Done
2,772,297 UART: [art] Signing Cert with AUTHO
2,772,777 UART: RITY.KEYID = 7
2,788,105 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,870 UART: [art] PUB.X = 929EE6E210DDC589149DDF79747BC5250F6D31F61463C1BDAC15B84210380691FACDEA7D1E768C5936D9EC650AD05E8A
2,795,641 UART: [art] PUB.Y = A08AE700CDF3E837D9540DEB79CA8B11CEDF9BF44007FD4EF85EC7EA7A9943E37706A9B91B04452E0FE8C5FFC48C51F6
2,802,576 UART: [art] SIG.R = C42D266C5264E4607364702EEB2C229076017192164729CC05442CB53A49B7F1E8202470F2278233D6518893B2B46BDA
2,809,324 UART: [art] SIG.S = 699795CED230D97EDF50B6F0A3EF2460CE12AB68CBF50F9169C10CB845EAD17D958D88D1A77C2C3B38BD78BE091DE9E0
2,833,532 UART: mbox::rt_entry...
2,833,904 UART: ____ _ _ _ ____ _____
2,834,688 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,835,488 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,836,256 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,837,024 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,792 UART: |_|
2,838,104 UART:
2,944,578 UART: [rt] Runtime listening for mailbox commands...
2,949,546 >>> mbox cmd response data (3272 bytes)
2,949,547 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,972,633 >>> mbox cmd response data (0 bytes)
2,972,634 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,734,228 >>> mbox cmd response: success
5,747,791 UART:
5,747,807 UART: Running Caliptra FMC ...
5,748,215 UART:
5,748,358 UART: [state] CFI Enabled
5,837,157 UART: [art] Extend RT PCRs Done
5,837,585 UART: [art] Lock RT PCRs Done
5,838,778 UART: [art] Populate DV Done
5,846,991 UART: [fht] FMC Alias Private Key: 7
5,847,989 UART: [art] Derive CDI
5,848,269 UART: [art] Store in in slot 0x4
5,933,890 UART: [art] Derive Key Pair
5,934,250 UART: [art] Store priv key in slot 0x5
5,947,662 UART: [art] Derive Key Pair - Done
5,962,657 UART: [art] Signing Cert with AUTHO
5,963,137 UART: RITY.KEYID = 7
5,978,807 UART: [art] Erasing AUTHORITY.KEYID = 7
5,979,572 UART: [art] PUB.X = 3238BEAB466B1744010D1EC70D57A39EC96D901A1768A4B285C5457CCE5C50E88EB3E9515299B65BD97AD0BF3FDC18D2
5,986,343 UART: [art] PUB.Y = A57BC3434D7C047F9C79C527B677BD849E07882F624487DA7F2356D113A522089A8A17E810A092E325F7084DEE958FD1
5,993,277 UART: [art] SIG.R = 984C90F755AF8761ABACD42CD7C5BA7F5380442D5894C0FFACCBA59815F853A0960D80E3B8802D810BFE480D3D387B98
6,000,048 UART: [art] SIG.S = 52063DBDB5863BAB33534FDEB31E3689D88462A9637E573C2BEBCAC40B01AB5369A7A6A1A6FEF3E89F670613A26E12F9
6,023,777 UART: Caliptra RT
6,024,122 UART: [state] CFI Enabled
6,086,191 UART: Disabled attest: DPE valid fail
6,086,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,088,175 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,118,951 UART: [rt]cmd =0x494e464f, len=4
6,122,720 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
893,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,445 UART: [kat] ++
897,597 UART: [kat] sha1
901,933 UART: [kat] SHA2-256
903,873 UART: [kat] SHA2-384
906,634 UART: [kat] SHA2-512-ACC
908,535 UART: [kat] ECC-384
918,444 UART: [kat] HMAC-384Kdf
923,094 UART: [kat] LMS
1,171,422 UART: [kat] --
1,172,089 UART: [cold-reset] ++
1,172,443 UART: [fht] FHT @ 0x50003400
1,175,040 UART: [idev] ++
1,175,208 UART: [idev] CDI.KEYID = 6
1,175,568 UART: [idev] SUBJECT.KEYID = 7
1,175,992 UART: [idev] UDS.KEYID = 0
1,176,337 ready_for_fw is high
1,176,337 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,098 UART: [idev] Erasing UDS.KEYID = 0
1,201,131 UART: [idev] Sha1 KeyId Algorithm
1,209,705 UART: [idev] --
1,210,737 UART: [ldev] ++
1,210,905 UART: [ldev] CDI.KEYID = 6
1,211,268 UART: [ldev] SUBJECT.KEYID = 5
1,211,694 UART: [ldev] AUTHORITY.KEYID = 7
1,212,157 UART: [ldev] FE.KEYID = 1
1,217,371 UART: [ldev] Erasing FE.KEYID = 1
1,243,986 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,601 UART: [ldev] --
1,283,086 UART: [fwproc] Wait for Commands...
1,283,668 UART: [fwproc] Recv command 0x46574c44
1,284,396 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,272 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,576 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,857 >>> mbox cmd response: success
2,312,857 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,313,881 UART: [afmc] ++
2,314,049 UART: [afmc] CDI.KEYID = 6
2,314,411 UART: [afmc] SUBJECT.KEYID = 7
2,314,836 UART: [afmc] AUTHORITY.KEYID = 5
2,350,167 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,584 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,332 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,060 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,945 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,664 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,534 UART: [afmc] --
2,393,582 UART: [cold-reset] --
2,394,350 UART: [state] Locking Datavault
2,395,643 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,247 UART: [state] Locking ICCM
2,396,875 UART: [exit] Launching FMC @ 0x40000130
2,402,204 UART:
2,402,220 UART: Running Caliptra FMC ...
2,402,628 UART:
2,402,682 UART: [state] CFI Enabled
2,412,815 UART: [fht] FMC Alias Private Key: 7
2,521,228 UART: [art] Extend RT PCRs Done
2,521,656 UART: [art] Lock RT PCRs Done
2,523,450 UART: [art] Populate DV Done
2,531,659 UART: [fht] FMC Alias Private Key: 7
2,532,813 UART: [art] Derive CDI
2,533,093 UART: [art] Store in in slot 0x4
2,618,696 UART: [art] Derive Key Pair
2,619,056 UART: [art] Store priv key in slot 0x5
2,632,774 UART: [art] Derive Key Pair - Done
2,647,657 UART: [art] Signing Cert with AUTHO
2,648,137 UART: RITY.KEYID = 7
2,663,681 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,446 UART: [art] PUB.X = C4408E174FC0412997AAB13D4B155A7F32A592E0BE17945DE100643B8A04CAAC8B44EC3F7A3853D778C61D0894DA6C75
2,671,194 UART: [art] PUB.Y = EA62D6935C2175E2F2AFE938BAF52FD1B5AD1B7884EA1403849B082A01567B6F4E8D8D55D113DBEE2DEBAA5960902EE0
2,678,151 UART: [art] SIG.R = 1B73B633D5AA142916823E1D82FA5B1284A85D660145D949081A5DDCC43B1A754936786BD6F044750158BD16E0A3DE4A
2,684,910 UART: [art] SIG.S = 3887ED0F1C1A8E1BB89C3044BD8DCC174F436CF6A9C021E7B1CFCDB17A57116BABC40DE44639EE9E78DBC7F0697E27BE
2,708,677 UART: mbox::rt_entry...
2,709,049 UART: ____ _ _ _ ____ _____
2,709,833 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,633 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,401 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,169 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,937 UART: |_|
2,713,249 UART:
2,819,549 UART: [rt] Runtime listening for mailbox commands...
2,824,517 >>> mbox cmd response data (3272 bytes)
2,824,518 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,847,604 >>> mbox cmd response data (0 bytes)
2,847,605 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,847,722 UART:
2,847,738 UART: Running Caliptra ROM ...
2,848,146 UART:
2,848,201 UART: [state] CFI Enabled
2,850,755 UART: [state] LifecycleState = Unprovisioned
2,851,410 UART: [state] DebugLocked = No
2,852,050 UART: [state] WD Timer not started. Device not locked for debugging
2,853,226 UART: [kat] SHA2-256
3,658,876 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,663,001 UART: [kat] ++
3,663,153 UART: [kat] sha1
3,667,211 UART: [kat] SHA2-256
3,669,151 UART: [kat] SHA2-384
3,671,920 UART: [kat] SHA2-512-ACC
3,673,820 UART: [kat] ECC-384
3,683,343 UART: [kat] HMAC-384Kdf
3,687,931 UART: [kat] LMS
3,936,259 UART: [kat] --
3,937,173 UART: [update-reset] ++
5,249,143 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,250,150 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,399,974 >>> mbox cmd response: success
5,400,273 UART: [update-reset] Copying MAN_2 To MAN_1
5,408,287 UART: [update-reset Success] --
5,409,258 UART: [state] Locking Datavault
5,409,990 UART: [state] Locking PCR0, PCR1 and PCR31
5,410,594 UART: [state] Locking ICCM
5,411,200 UART: [exit] Launching FMC @ 0x40000130
5,416,529 UART:
5,416,545 UART: Running Caliptra FMC ...
5,416,953 UART:
5,417,007 UART: [state] CFI Enabled
5,505,042 UART: [art] Extend RT PCRs Done
5,505,470 UART: [art] Lock RT PCRs Done
5,506,843 UART: [art] Populate DV Done
5,514,920 UART: [fht] FMC Alias Private Key: 7
5,515,910 UART: [art] Derive CDI
5,516,190 UART: [art] Store in in slot 0x4
5,601,703 UART: [art] Derive Key Pair
5,602,063 UART: [art] Store priv key in slot 0x5
5,615,423 UART: [art] Derive Key Pair - Done
5,630,342 UART: [art] Signing Cert with AUTHO
5,630,822 UART: RITY.KEYID = 7
5,645,808 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,573 UART: [art] PUB.X = 61E36FE7A4589E59875ADC2945BF86D89B72A7A868E3DB7963EF93A3538AABFC0481245BA3BAEAF9D58C6FBE893FF679
5,653,356 UART: [art] PUB.Y = E6A9F4D3FFB20EE0794E8262CCC5E80318633F3D24ED2B01A887EA6B4CD74AAF76BC3698DD6E0DD0385CE443603BF1D2
5,660,312 UART: [art] SIG.R = D58D3E005902E525FC8DA610CC593B40EA828F01714D6B897C40FC54EE331F6EA150EF9557FCA4C15DAE90B3D18EB391
5,667,066 UART: [art] SIG.S = E8B9C5D117891E73AB78D5484C4E016070F79B74369A77CC7E561281BE0F040F07C97E6D1FEB8B4D6AC8AE5EE83ECDD8
5,691,436 UART: Caliptra RT
5,691,689 UART: [state] CFI Enabled
5,753,521 UART: Disabled attest: DPE valid fail
5,754,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,755,571 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,786,117 UART: [rt]cmd =0x494e464f, len=4
5,789,708 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,949 ready_for_fw is high
1,060,949 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,518 >>> mbox cmd response: success
2,165,518 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,227,556 UART:
2,227,572 UART: Running Caliptra FMC ...
2,227,980 UART:
2,228,034 UART: [state] CFI Enabled
2,238,709 UART: [fht] FMC Alias Private Key: 7
2,346,172 UART: [art] Extend RT PCRs Done
2,346,600 UART: [art] Lock RT PCRs Done
2,347,894 UART: [art] Populate DV Done
2,356,137 UART: [fht] FMC Alias Private Key: 7
2,357,317 UART: [art] Derive CDI
2,357,597 UART: [art] Store in in slot 0x4
2,443,428 UART: [art] Derive Key Pair
2,443,788 UART: [art] Store priv key in slot 0x5
2,457,582 UART: [art] Derive Key Pair - Done
2,472,128 UART: [art] Signing Cert with AUTHO
2,472,608 UART: RITY.KEYID = 7
2,488,004 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,769 UART: [art] PUB.X = EF34D39B9D1E03580B7F879686CFD67DD75542FCE66861B4E2D84A06D3AAF89CF591F49521B975F91F7BC7D8660FC818
2,495,535 UART: [art] PUB.Y = 8FC60D32EF12E979F00D085C173B78C0C9A054062FE9FEBBD7ACA5DBEBD4F7A81EDB15ECCF8DFA5B6116593FF8CDD3BA
2,502,507 UART: [art] SIG.R = 12C8CE035A4A32CCD63B994AA0C058E771DF364BDB871CBF9762F0D350DA973F08CD4CC1E04CE9E8551F5BF28FF3745F
2,509,289 UART: [art] SIG.S = 53F7E943FEE123F0FC06EF06E55CDC23C71843B0829F503F4D95C8B26F5326E623084748DA164D7FE4704EE7A0FFCD4D
2,533,131 UART: mbox::rt_entry...
2,533,503 UART: ____ _ _ _ ____ _____
2,534,287 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,535,087 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,855 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,623 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,537,391 UART: |_|
2,537,703 UART:
2,644,011 UART: [rt] Runtime listening for mailbox commands...
2,648,979 >>> mbox cmd response data (3272 bytes)
2,648,980 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,672,066 >>> mbox cmd response data (0 bytes)
2,672,067 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,108,583 >>> mbox cmd response: success
5,121,975 UART:
5,121,991 UART: Running Caliptra FMC ...
5,122,399 UART:
5,122,453 UART: [state] CFI Enabled
5,211,294 UART: [art] Extend RT PCRs Done
5,211,722 UART: [art] Lock RT PCRs Done
5,213,255 UART: [art] Populate DV Done
5,221,330 UART: [fht] FMC Alias Private Key: 7
5,222,414 UART: [art] Derive CDI
5,222,694 UART: [art] Store in in slot 0x4
5,308,645 UART: [art] Derive Key Pair
5,309,005 UART: [art] Store priv key in slot 0x5
5,321,637 UART: [art] Derive Key Pair - Done
5,336,376 UART: [art] Signing Cert with AUTHO
5,336,856 UART: RITY.KEYID = 7
5,352,006 UART: [art] Erasing AUTHORITY.KEYID = 7
5,352,771 UART: [art] PUB.X = B11E5189ABB8011709C36A99E5A46C0FF250783B71DA0589E1761C85990B36683AAE5588E2F49D1C7240E61A265DD81D
5,359,524 UART: [art] PUB.Y = C6068D2349AC00F80C0908528077D88C1B0605FEE62340747FF376A95F947F37B66742B8560CBC50A3017A0580F23730
5,366,413 UART: [art] SIG.R = 0C9F8E257DEF5C2E0F2B7CA764B0009487B4EF28619EE08BA6E00AC87EDE40BBFBD15D914FEE1CD8D0ACEAF83D9CE6BD
5,373,186 UART: [art] SIG.S = F03AEA85F191648E2CE9E9B2964ADCD75D3F8A958B5892DA6D37AA635CA5D85AFF336A1FFC97E751A1001D16F7C3528F
5,396,919 UART: Caliptra RT
5,397,172 UART: [state] CFI Enabled
5,459,951 UART: Disabled attest: DPE valid fail
5,460,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,461,797 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,492,131 UART: [rt]cmd =0x494e464f, len=4
5,495,708 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,822 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [kat] SHA2-256
893,613 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,738 UART: [kat] ++
897,890 UART: [kat] sha1
902,094 UART: [kat] SHA2-256
904,034 UART: [kat] SHA2-384
906,929 UART: [kat] SHA2-512-ACC
908,830 UART: [kat] ECC-384
918,363 UART: [kat] HMAC-384Kdf
922,945 UART: [kat] LMS
1,171,273 UART: [kat] --
1,172,322 UART: [cold-reset] ++
1,172,854 UART: [fht] FHT @ 0x50003400
1,175,375 UART: [idev] ++
1,175,543 UART: [idev] CDI.KEYID = 6
1,175,903 UART: [idev] SUBJECT.KEYID = 7
1,176,327 UART: [idev] UDS.KEYID = 0
1,176,672 ready_for_fw is high
1,176,672 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,461 UART: [idev] Erasing UDS.KEYID = 0
1,201,598 UART: [idev] Sha1 KeyId Algorithm
1,210,148 UART: [idev] --
1,211,264 UART: [ldev] ++
1,211,432 UART: [ldev] CDI.KEYID = 6
1,211,795 UART: [ldev] SUBJECT.KEYID = 5
1,212,221 UART: [ldev] AUTHORITY.KEYID = 7
1,212,684 UART: [ldev] FE.KEYID = 1
1,218,042 UART: [ldev] Erasing FE.KEYID = 1
1,244,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,978 UART: [ldev] --
1,284,281 UART: [fwproc] Wait for Commands...
1,285,011 UART: [fwproc] Recv command 0x46574c44
1,285,739 UART: [fwproc] Recv'd Img size: 78704 bytes
2,176,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,203,067 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,232,371 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,314,798 >>> mbox cmd response: success
2,314,798 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,315,932 UART: [afmc] ++
2,316,100 UART: [afmc] CDI.KEYID = 6
2,316,462 UART: [afmc] SUBJECT.KEYID = 7
2,316,887 UART: [afmc] AUTHORITY.KEYID = 5
2,351,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,368,231 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,979 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,707 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,592 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,311 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,051 UART: [afmc] --
2,395,173 UART: [cold-reset] --
2,396,131 UART: [state] Locking Datavault
2,397,258 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,862 UART: [state] Locking ICCM
2,398,506 UART: [exit] Launching FMC @ 0x40000130
2,403,835 UART:
2,403,851 UART: Running Caliptra FMC ...
2,404,259 UART:
2,404,402 UART: [state] CFI Enabled
2,415,051 UART: [fht] FMC Alias Private Key: 7
2,523,194 UART: [art] Extend RT PCRs Done
2,523,622 UART: [art] Lock RT PCRs Done
2,525,136 UART: [art] Populate DV Done
2,533,423 UART: [fht] FMC Alias Private Key: 7
2,534,475 UART: [art] Derive CDI
2,534,755 UART: [art] Store in in slot 0x4
2,620,574 UART: [art] Derive Key Pair
2,620,934 UART: [art] Store priv key in slot 0x5
2,633,648 UART: [art] Derive Key Pair - Done
2,648,345 UART: [art] Signing Cert with AUTHO
2,648,825 UART: RITY.KEYID = 7
2,664,391 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,156 UART: [art] PUB.X = A9C1B48DA55F38AB328E5D6FFA84F5BF30BE5DE543B8CD4C25C5B607890EB7B478011DA0C49C5597FC6117A3CF85DA3D
2,671,937 UART: [art] PUB.Y = 8655698EDC5E73C1BC8883D9A040D2EDD0D6E78FE031A534F4C9B3131E8BA59C8075672E86468DC051AD26D1F19A5B46
2,678,893 UART: [art] SIG.R = F52B67E42BACD98C807AB88720C5F8C5D2B0C9E4A996C2CB2859A57A4F49BF12D2EAC196D6C27C8BF59B08F3459BADF5
2,685,680 UART: [art] SIG.S = 0E1976EE652E1104CB7C89920DC0504DACFB9363BDFD43D3E85C21AD3A441A2B7E524F30E105C32663DB7A9BC4954A70
2,709,121 UART: mbox::rt_entry...
2,709,493 UART: ____ _ _ _ ____ _____
2,710,277 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,077 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,845 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,613 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,381 UART: |_|
2,713,693 UART:
2,820,333 UART: [rt] Runtime listening for mailbox commands...
2,825,301 >>> mbox cmd response data (3272 bytes)
2,825,302 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,848,388 >>> mbox cmd response data (0 bytes)
2,848,389 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,848,506 UART:
2,848,522 UART: Running Caliptra ROM ...
2,848,930 UART:
2,849,072 UART: [state] CFI Enabled
2,852,080 UART: [state] LifecycleState = Unprovisioned
2,852,735 UART: [state] DebugLocked = No
2,853,333 UART: [state] WD Timer not started. Device not locked for debugging
2,854,535 UART: [kat] SHA2-256
3,660,185 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,664,310 UART: [kat] ++
3,664,462 UART: [kat] sha1
3,668,528 UART: [kat] SHA2-256
3,670,468 UART: [kat] SHA2-384
3,673,307 UART: [kat] SHA2-512-ACC
3,675,207 UART: [kat] ECC-384
3,684,662 UART: [kat] HMAC-384Kdf
3,689,486 UART: [kat] LMS
3,937,814 UART: [kat] --
3,938,802 UART: [update-reset] ++
5,250,904 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,251,871 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,401,695 >>> mbox cmd response: success
5,401,958 UART: [update-reset] Copying MAN_2 To MAN_1
5,409,972 UART: [update-reset Success] --
5,410,885 UART: [state] Locking Datavault
5,411,693 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,297 UART: [state] Locking ICCM
5,412,955 UART: [exit] Launching FMC @ 0x40000130
5,418,284 UART:
5,418,300 UART: Running Caliptra FMC ...
5,418,708 UART:
5,418,851 UART: [state] CFI Enabled
5,507,986 UART: [art] Extend RT PCRs Done
5,508,414 UART: [art] Lock RT PCRs Done
5,509,483 UART: [art] Populate DV Done
5,517,636 UART: [fht] FMC Alias Private Key: 7
5,518,722 UART: [art] Derive CDI
5,519,002 UART: [art] Store in in slot 0x4
5,604,615 UART: [art] Derive Key Pair
5,604,975 UART: [art] Store priv key in slot 0x5
5,618,217 UART: [art] Derive Key Pair - Done
5,633,252 UART: [art] Signing Cert with AUTHO
5,633,732 UART: RITY.KEYID = 7
5,648,736 UART: [art] Erasing AUTHORITY.KEYID = 7
5,649,501 UART: [art] PUB.X = C58CB10FB79CCF102B3F0F02036925E6E9E8244991B088CAA2D1DB9EFCF6E6EE771D9ECA9C7B2A24F918A840D8DDF57B
5,656,281 UART: [art] PUB.Y = 0F44BE371035177BD178520CE37A5CD482590681F29DEF52FDE4EF938746F4C2BABD6D2DC8B886107C401730860B7A8E
5,663,223 UART: [art] SIG.R = B7B0274294513CE7187A8D130F34E72540D7C57E1859025FEE0A108470657561623B81B82BB8B10EFF01CE2EFECA0B43
5,669,975 UART: [art] SIG.S = 98911146418185A62EB5197E8B4EBD12D4956F72F0CFE5E9BA166A845B6C3EE146BF822E7BC1719BA07E15254AD9D4C6
5,693,956 UART: Caliptra RT
5,694,301 UART: [state] CFI Enabled
5,759,089 UART: Disabled attest: DPE valid fail
5,759,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,760,885 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,791,101 UART: [rt]cmd =0x494e464f, len=4
5,794,842 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,228 ready_for_fw is high
1,060,228 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,827 >>> mbox cmd response: success
2,165,827 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,228,077 UART:
2,228,093 UART: Running Caliptra FMC ...
2,228,501 UART:
2,228,644 UART: [state] CFI Enabled
2,239,383 UART: [fht] FMC Alias Private Key: 7
2,347,840 UART: [art] Extend RT PCRs Done
2,348,268 UART: [art] Lock RT PCRs Done
2,350,190 UART: [art] Populate DV Done
2,358,217 UART: [fht] FMC Alias Private Key: 7
2,359,341 UART: [art] Derive CDI
2,359,621 UART: [art] Store in in slot 0x4
2,445,478 UART: [art] Derive Key Pair
2,445,838 UART: [art] Store priv key in slot 0x5
2,459,340 UART: [art] Derive Key Pair - Done
2,473,917 UART: [art] Signing Cert with AUTHO
2,474,397 UART: RITY.KEYID = 7
2,490,139 UART: [art] Erasing AUTHORITY.KEYID = 7
2,490,904 UART: [art] PUB.X = 6CEE94A6C38702156505F449402520B57A9260CF89628E2C0D6207F8744FCA963A74387F64892AC161E75BDAD0DD7A50
2,497,658 UART: [art] PUB.Y = 2C7DEA8F3300288EB1D49F644555A579B783420B770FA5511D5C99B7BFDB59D41822933E056B5BAAF5224986CB178CF0
2,504,579 UART: [art] SIG.R = 71C7BBEC8A35D677202EE6389F8516D35B62C61CE6BD96EA7E438ADA6495F393DE4E2F77E945440C176C57B1111C5ACB
2,511,356 UART: [art] SIG.S = 54C2EFC585AA7D2E20FFE768043ECC48BC6C6751403C3F39C95280A92FA01D48C6F13A0F9DF8F75A6D4ECA3B5DD51B93
2,534,799 UART: mbox::rt_entry...
2,535,171 UART: ____ _ _ _ ____ _____
2,535,955 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,536,755 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,537,523 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,538,291 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,539,059 UART: |_|
2,539,371 UART:
2,646,673 UART: [rt] Runtime listening for mailbox commands...
2,651,641 >>> mbox cmd response data (3272 bytes)
2,651,642 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,674,728 >>> mbox cmd response data (0 bytes)
2,674,729 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,113,298 >>> mbox cmd response: success
5,126,588 UART:
5,126,604 UART: Running Caliptra FMC ...
5,127,012 UART:
5,127,155 UART: [state] CFI Enabled
5,216,754 UART: [art] Extend RT PCRs Done
5,217,182 UART: [art] Lock RT PCRs Done
5,218,419 UART: [art] Populate DV Done
5,226,652 UART: [fht] FMC Alias Private Key: 7
5,227,812 UART: [art] Derive CDI
5,228,092 UART: [art] Store in in slot 0x4
5,313,803 UART: [art] Derive Key Pair
5,314,163 UART: [art] Store priv key in slot 0x5
5,327,815 UART: [art] Derive Key Pair - Done
5,342,614 UART: [art] Signing Cert with AUTHO
5,343,094 UART: RITY.KEYID = 7
5,358,172 UART: [art] Erasing AUTHORITY.KEYID = 7
5,358,937 UART: [art] PUB.X = 3E19BEB2CF0913FBD633A602ABC2160AD074010F59DD45C753690381FD1CAF24B3419521AD820005383414E7A70C6697
5,365,659 UART: [art] PUB.Y = 7736E75D5B87A106F6F8724A1D787C9C5DB01CB235690DD75549452FB3530F227F38F806DB6FF95B71D143BFEBAABDC9
5,372,607 UART: [art] SIG.R = 6F8C6D9B4F611944EF6A825FF5E4C16E6E52C4BA64B03E424D276942DC76BB63971E7A869E1E5C245140A74B15589067
5,379,377 UART: [art] SIG.S = 8382BE8F9ADF779D62C3AAA57CFA1BB413AD99715DEA01AAE9C0AE00A349B03871DE3793906F65DC807B66C3BA666199
5,403,395 UART: Caliptra RT
5,403,740 UART: [state] CFI Enabled
5,467,377 UART: Disabled attest: DPE valid fail
5,467,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,469,361 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,499,965 UART: [rt]cmd =0x494e464f, len=4
5,503,672 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,484 UART: [state] LifecycleState = Unprovisioned
85,139 UART: [state] DebugLocked = No
85,777 UART: [state] WD Timer not started. Device not locked for debugging
87,132 UART: [kat] SHA2-256
890,682 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,811 UART: [kat] ++
894,963 UART: [kat] sha1
899,165 UART: [kat] SHA2-256
901,105 UART: [kat] SHA2-384
903,646 UART: [kat] SHA2-512-ACC
905,547 UART: [kat] ECC-384
915,028 UART: [kat] HMAC-384Kdf
919,596 UART: [kat] LMS
1,167,908 UART: [kat] --
1,168,819 UART: [cold-reset] ++
1,169,299 UART: [fht] FHT @ 0x50003400
1,171,795 UART: [idev] ++
1,171,963 UART: [idev] CDI.KEYID = 6
1,172,324 UART: [idev] SUBJECT.KEYID = 7
1,172,749 UART: [idev] UDS.KEYID = 0
1,173,095 ready_for_fw is high
1,173,095 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,180,931 UART: [idev] Erasing UDS.KEYID = 0
1,198,023 UART: [idev] Sha1 KeyId Algorithm
1,207,045 UART: [idev] --
1,208,128 UART: [ldev] ++
1,208,296 UART: [ldev] CDI.KEYID = 6
1,208,660 UART: [ldev] SUBJECT.KEYID = 5
1,209,087 UART: [ldev] AUTHORITY.KEYID = 7
1,209,550 UART: [ldev] FE.KEYID = 1
1,214,784 UART: [ldev] Erasing FE.KEYID = 1
1,241,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,260 UART: [ldev] --
1,280,708 UART: [fwproc] Wait for Commands...
1,281,527 UART: [fwproc] Recv command 0x46574c44
1,282,260 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,128 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,814 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,123 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,589 >>> mbox cmd response: success
2,311,589 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,312,838 UART: [afmc] ++
2,313,006 UART: [afmc] CDI.KEYID = 6
2,313,369 UART: [afmc] SUBJECT.KEYID = 7
2,313,795 UART: [afmc] AUTHORITY.KEYID = 5
2,349,722 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,316 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,067 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,796 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,679 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,398 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,201 UART: [afmc] --
2,393,329 UART: [cold-reset] --
2,394,149 UART: [state] Locking Datavault
2,394,974 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,578 UART: [state] Locking ICCM
2,396,046 UART: [exit] Launching FMC @ 0x40000130
2,401,375 UART:
2,401,391 UART: Running Caliptra FMC ...
2,401,799 UART:
2,401,853 UART: [state] CFI Enabled
2,412,334 UART: [fht] FMC Alias Private Key: 7
2,520,463 UART: [art] Extend RT PCRs Done
2,520,891 UART: [art] Lock RT PCRs Done
2,522,273 UART: [art] Populate DV Done
2,530,358 UART: [fht] FMC Alias Private Key: 7
2,531,384 UART: [art] Derive CDI
2,531,664 UART: [art] Store in in slot 0x4
2,617,467 UART: [art] Derive Key Pair
2,617,827 UART: [art] Store priv key in slot 0x5
2,631,071 UART: [art] Derive Key Pair - Done
2,645,841 UART: [art] Signing Cert with AUTHO
2,646,321 UART: RITY.KEYID = 7
2,661,231 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,996 UART: [art] PUB.X = 07E0A10F3F18DF8A44C918633751AF223B649F49A9FE3DD3CD055C536F1E46D13C7171D128B7FCDD3313D9FFC5C1DDB8
2,668,771 UART: [art] PUB.Y = B874023B58ED03B704A12077C44A289B8ACF80874C36ECDF8B744582AB054697122996F190CFDB6F0F67C89589BA09CF
2,675,705 UART: [art] SIG.R = E53D69DEC4E8FBF7316B48AC42F04DEFEABAF812AA0ADE40CB202D46C7354DC82040A96A32AF4836DEE35CE9FB7DA878
2,682,500 UART: [art] SIG.S = EF59291E78FF08B1216C055BFB17E11A096A72E480AFF2B92F2DC4F019CB2FE92AF6FB3BADB39C414E54E3427380AEB5
2,706,158 UART: mbox::rt_entry...
2,706,530 UART: ____ _ _ _ ____ _____
2,707,314 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,114 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,882 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,650 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,418 UART: |_|
2,710,730 UART:
2,817,445 UART: [rt] Runtime listening for mailbox commands...
2,822,413 >>> mbox cmd response data (3272 bytes)
2,822,414 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,845,500 >>> mbox cmd response data (0 bytes)
2,845,501 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,845,618 UART:
2,845,634 UART: Running Caliptra ROM ...
2,846,042 UART:
2,846,097 UART: [state] CFI Enabled
2,848,783 UART: [state] LifecycleState = Unprovisioned
2,849,438 UART: [state] DebugLocked = No
2,850,170 UART: [state] WD Timer not started. Device not locked for debugging
2,851,436 UART: [kat] SHA2-256
3,654,986 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,659,115 UART: [kat] ++
3,659,267 UART: [kat] sha1
3,663,317 UART: [kat] SHA2-256
3,665,257 UART: [kat] SHA2-384
3,667,988 UART: [kat] SHA2-512-ACC
3,669,888 UART: [kat] ECC-384
3,679,629 UART: [kat] HMAC-384Kdf
3,684,149 UART: [kat] LMS
3,932,461 UART: [kat] --
3,933,165 UART: [update-reset] ++
5,245,716 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,246,829 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,396,653 >>> mbox cmd response: success
5,396,894 UART: [update-reset] Copying MAN_2 To MAN_1
5,404,908 UART: [update-reset Success] --
5,406,037 UART: [state] Locking Datavault
5,406,785 UART: [state] Locking PCR0, PCR1 and PCR31
5,407,389 UART: [state] Locking ICCM
5,408,025 UART: [exit] Launching FMC @ 0x40000130
5,413,354 UART:
5,413,370 UART: Running Caliptra FMC ...
5,413,778 UART:
5,413,832 UART: [state] CFI Enabled
5,503,615 UART: [art] Extend RT PCRs Done
5,504,043 UART: [art] Lock RT PCRs Done
5,505,232 UART: [art] Populate DV Done
5,513,701 UART: [fht] FMC Alias Private Key: 7
5,514,875 UART: [art] Derive CDI
5,515,155 UART: [art] Store in in slot 0x4
5,600,492 UART: [art] Derive Key Pair
5,600,852 UART: [art] Store priv key in slot 0x5
5,613,442 UART: [art] Derive Key Pair - Done
5,628,431 UART: [art] Signing Cert with AUTHO
5,628,911 UART: RITY.KEYID = 7
5,644,301 UART: [art] Erasing AUTHORITY.KEYID = 7
5,645,066 UART: [art] PUB.X = 851D9517D80ED1C114A0044AC587AEB59870A7C56815E3062D8C8131FCE43D9286BB3D513561FD6DB572CA1839E7F6FE
5,651,831 UART: [art] PUB.Y = 5D9669222BAF6AFCB3E15124202FD74FECB7355280C4FB5A57054EF7F8D74B300C076C95A9B982D65FB693494F2DB464
5,658,778 UART: [art] SIG.R = D86FF36CCC457EF65431B15887AA07847344477DAD8915250A75420FB655FDEFD8776B484390D748F9D01A89263A2355
5,665,533 UART: [art] SIG.S = 0DB433EBD8FE7052CD85B2750F84F657D3388E1B9FEB0FCEC03025D12E6CBA98F51A83B7361B43800438B77D447CF9F6
5,689,290 UART: Caliptra RT
5,689,543 UART: [state] CFI Enabled
5,752,064 UART: Disabled attest: DPE valid fail
5,752,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,753,984 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,784,324 UART: [rt]cmd =0x494e464f, len=4
5,788,063 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,038 ready_for_fw is high
1,056,038 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,160,689 >>> mbox cmd response: success
2,160,689 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,223,499 UART:
2,223,515 UART: Running Caliptra FMC ...
2,223,923 UART:
2,223,977 UART: [state] CFI Enabled
2,234,734 UART: [fht] FMC Alias Private Key: 7
2,342,335 UART: [art] Extend RT PCRs Done
2,342,763 UART: [art] Lock RT PCRs Done
2,344,249 UART: [art] Populate DV Done
2,352,704 UART: [fht] FMC Alias Private Key: 7
2,353,760 UART: [art] Derive CDI
2,354,040 UART: [art] Store in in slot 0x4
2,440,239 UART: [art] Derive Key Pair
2,440,599 UART: [art] Store priv key in slot 0x5
2,453,733 UART: [art] Derive Key Pair - Done
2,468,670 UART: [art] Signing Cert with AUTHO
2,469,150 UART: RITY.KEYID = 7
2,484,656 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,421 UART: [art] PUB.X = BD5758C070452C286F14593E2599BCD6AEB02E8CF672E856304A15F4265D5CAD9389C3B4E05D4FD2324128000CDDA24B
2,492,170 UART: [art] PUB.Y = 3E8CCDAF1CBDDE943959E1C472E89DCCCEABA87E35F735D931565E6A262F659179240AD431AE842AA30C290AC934823E
2,499,125 UART: [art] SIG.R = 7C6DFDDA0505D15BC7A70E40609C20B3195DB8ADF7BC051661809BD8284D7F496E8AA0E488E06213735D72F43D43DBFF
2,505,893 UART: [art] SIG.S = A11750D3B279A3CB10377DC34051013DE76F5090A753772BFC4982478A3F909F79B59BA5199FC6D6F314182DC65CF565
2,529,765 UART: mbox::rt_entry...
2,530,137 UART: ____ _ _ _ ____ _____
2,530,921 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,721 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,489 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,257 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,025 UART: |_|
2,534,337 UART:
2,641,327 UART: [rt] Runtime listening for mailbox commands...
2,646,295 >>> mbox cmd response data (3272 bytes)
2,646,296 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,669,382 >>> mbox cmd response data (0 bytes)
2,669,383 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,101,206 >>> mbox cmd response: success
5,114,466 UART:
5,114,482 UART: Running Caliptra FMC ...
5,114,890 UART:
5,114,944 UART: [state] CFI Enabled
5,203,431 UART: [art] Extend RT PCRs Done
5,203,859 UART: [art] Lock RT PCRs Done
5,205,156 UART: [art] Populate DV Done
5,213,377 UART: [fht] FMC Alias Private Key: 7
5,214,387 UART: [art] Derive CDI
5,214,667 UART: [art] Store in in slot 0x4
5,300,304 UART: [art] Derive Key Pair
5,300,664 UART: [art] Store priv key in slot 0x5
5,314,122 UART: [art] Derive Key Pair - Done
5,328,907 UART: [art] Signing Cert with AUTHO
5,329,387 UART: RITY.KEYID = 7
5,344,677 UART: [art] Erasing AUTHORITY.KEYID = 7
5,345,442 UART: [art] PUB.X = 86832B22A4FDCF6376AD79C8D82AF95C192E04D240094C10298D485AF5659ADB13233594F9B4BA8CE7E81F1739576E80
5,352,206 UART: [art] PUB.Y = ED4E2E03D2191DE3794B9CA76B16E6E3782658447EDC5B8C9B97E6E0C5F03C88D9F35363CEC0ABF5A9EC89A04995819A
5,359,165 UART: [art] SIG.R = 6A9B10EB611B2EC81D48C503990BDC68D46D30C660745700EB9EE9E8E507C360EF05FF8D471567D7152BF90E1FB71C1E
5,365,906 UART: [art] SIG.S = 15AB0B067EE214231E20A95D0DBC7E104484735154394D5E738E0D62BCF029A48B58EE72EBFD2ED101BE499837A6DEAC
5,389,962 UART: Caliptra RT
5,390,215 UART: [state] CFI Enabled
5,453,318 UART: Disabled attest: DPE valid fail
5,453,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,455,304 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,485,878 UART: [rt]cmd =0x494e464f, len=4
5,489,559 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,318 UART: [kat] ++
895,470 UART: [kat] sha1
899,850 UART: [kat] SHA2-256
901,790 UART: [kat] SHA2-384
904,545 UART: [kat] SHA2-512-ACC
906,446 UART: [kat] ECC-384
916,281 UART: [kat] HMAC-384Kdf
921,011 UART: [kat] LMS
1,169,323 UART: [kat] --
1,170,150 UART: [cold-reset] ++
1,170,574 UART: [fht] FHT @ 0x50003400
1,173,398 UART: [idev] ++
1,173,566 UART: [idev] CDI.KEYID = 6
1,173,927 UART: [idev] SUBJECT.KEYID = 7
1,174,352 UART: [idev] UDS.KEYID = 0
1,174,698 ready_for_fw is high
1,174,698 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,974 UART: [idev] Erasing UDS.KEYID = 0
1,199,402 UART: [idev] Sha1 KeyId Algorithm
1,208,414 UART: [idev] --
1,209,513 UART: [ldev] ++
1,209,681 UART: [ldev] CDI.KEYID = 6
1,210,045 UART: [ldev] SUBJECT.KEYID = 5
1,210,472 UART: [ldev] AUTHORITY.KEYID = 7
1,210,935 UART: [ldev] FE.KEYID = 1
1,216,257 UART: [ldev] Erasing FE.KEYID = 1
1,242,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,629 UART: [ldev] --
1,281,893 UART: [fwproc] Wait for Commands...
1,282,654 UART: [fwproc] Recv command 0x46574c44
1,283,387 UART: [fwproc] Recv'd Img size: 78704 bytes
2,172,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,019 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,328 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,770 >>> mbox cmd response: success
2,312,770 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,313,807 UART: [afmc] ++
2,313,975 UART: [afmc] CDI.KEYID = 6
2,314,338 UART: [afmc] SUBJECT.KEYID = 7
2,314,764 UART: [afmc] AUTHORITY.KEYID = 5
2,350,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,617 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,368 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,097 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,980 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,699 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,492 UART: [afmc] --
2,393,388 UART: [cold-reset] --
2,394,398 UART: [state] Locking Datavault
2,395,557 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,161 UART: [state] Locking ICCM
2,396,679 UART: [exit] Launching FMC @ 0x40000130
2,402,008 UART:
2,402,024 UART: Running Caliptra FMC ...
2,402,432 UART:
2,402,575 UART: [state] CFI Enabled
2,413,530 UART: [fht] FMC Alias Private Key: 7
2,521,265 UART: [art] Extend RT PCRs Done
2,521,693 UART: [art] Lock RT PCRs Done
2,523,155 UART: [art] Populate DV Done
2,531,520 UART: [fht] FMC Alias Private Key: 7
2,532,502 UART: [art] Derive CDI
2,532,782 UART: [art] Store in in slot 0x4
2,618,565 UART: [art] Derive Key Pair
2,618,925 UART: [art] Store priv key in slot 0x5
2,632,279 UART: [art] Derive Key Pair - Done
2,647,225 UART: [art] Signing Cert with AUTHO
2,647,705 UART: RITY.KEYID = 7
2,662,941 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,706 UART: [art] PUB.X = 65D8A987E776B9D166A25AEE7050A419DD460BB7C6E99741710DD4D05957BE15C75801A22AB7BA2620DCED0BE143AB4D
2,670,474 UART: [art] PUB.Y = E4A091D2DC3CAC986913FE545F7B1D6F5DC6707AC7DD231A323B2BFACD175EF5E2C93B2B9FC00D74D8B8B89C7633C9CB
2,677,445 UART: [art] SIG.R = 5928EF7069F5BF274DE98FE4BC5AEBD4C41F39C912593A180E3B0F29788A04018353D1A7A4DD80435E5F1BD2D7E5B557
2,684,211 UART: [art] SIG.S = 5C5FC7C5F482222F2E68E98B70266795FD491C98E01F90E42DA1147C9C5FB4D0015991E6C0730EEB214DF56BC65ADA80
2,707,830 UART: mbox::rt_entry...
2,708,202 UART: ____ _ _ _ ____ _____
2,708,986 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,786 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,554 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,322 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,090 UART: |_|
2,712,402 UART:
2,818,828 UART: [rt] Runtime listening for mailbox commands...
2,823,796 >>> mbox cmd response data (3272 bytes)
2,823,797 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,846,883 >>> mbox cmd response data (0 bytes)
2,846,884 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,847,001 UART:
2,847,017 UART: Running Caliptra ROM ...
2,847,425 UART:
2,847,567 UART: [state] CFI Enabled
2,850,301 UART: [state] LifecycleState = Unprovisioned
2,850,956 UART: [state] DebugLocked = No
2,851,518 UART: [state] WD Timer not started. Device not locked for debugging
2,852,708 UART: [kat] SHA2-256
3,656,258 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,660,387 UART: [kat] ++
3,660,539 UART: [kat] sha1
3,664,909 UART: [kat] SHA2-256
3,666,849 UART: [kat] SHA2-384
3,669,656 UART: [kat] SHA2-512-ACC
3,671,556 UART: [kat] ECC-384
3,681,141 UART: [kat] HMAC-384Kdf
3,685,697 UART: [kat] LMS
3,934,009 UART: [kat] --
3,934,953 UART: [update-reset] ++
5,247,300 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,248,433 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,398,257 >>> mbox cmd response: success
5,398,530 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,544 UART: [update-reset Success] --
5,407,473 UART: [state] Locking Datavault
5,408,439 UART: [state] Locking PCR0, PCR1 and PCR31
5,409,043 UART: [state] Locking ICCM
5,409,521 UART: [exit] Launching FMC @ 0x40000130
5,414,850 UART:
5,414,866 UART: Running Caliptra FMC ...
5,415,274 UART:
5,415,417 UART: [state] CFI Enabled
5,504,388 UART: [art] Extend RT PCRs Done
5,504,816 UART: [art] Lock RT PCRs Done
5,505,849 UART: [art] Populate DV Done
5,514,216 UART: [fht] FMC Alias Private Key: 7
5,515,392 UART: [art] Derive CDI
5,515,672 UART: [art] Store in in slot 0x4
5,601,517 UART: [art] Derive Key Pair
5,601,877 UART: [art] Store priv key in slot 0x5
5,615,029 UART: [art] Derive Key Pair - Done
5,629,538 UART: [art] Signing Cert with AUTHO
5,630,018 UART: RITY.KEYID = 7
5,645,374 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,139 UART: [art] PUB.X = AED655713799BE23C1C6325B301D1C3B51DC047C80BAC24FAF3BA9CE1A61CF67C70BC22DC28A78EE245259295808AD5E
5,652,914 UART: [art] PUB.Y = 40492667716B1BD531937A8CA1A5708BBEEF9D338C5AE06D66F28C8233079A693C1AC3CFEF3318981A92CA4175F4CBFB
5,659,869 UART: [art] SIG.R = 0E3E5BB8A2F0366344DD8D4D987555DFA824458D97CDAF0EA7E557C9E099C08F8CFD75CFDA9ACF94E1A7A3DBB5DEC49D
5,666,661 UART: [art] SIG.S = FCF0967F7A2D7A936A5152027860C4CA82A49B62C24E8E906F47F5FA918A81314C866E2CC9D43B81AA3AC2B0B702D92F
5,691,042 UART: Caliptra RT
5,691,387 UART: [state] CFI Enabled
5,754,726 UART: Disabled attest: DPE valid fail
5,755,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,756,506 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,787,202 UART: [rt]cmd =0x494e464f, len=4
5,791,043 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,551 ready_for_fw is high
1,056,551 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,161,178 >>> mbox cmd response: success
2,161,178 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,223,300 UART:
2,223,316 UART: Running Caliptra FMC ...
2,223,724 UART:
2,223,867 UART: [state] CFI Enabled
2,234,702 UART: [fht] FMC Alias Private Key: 7
2,343,035 UART: [art] Extend RT PCRs Done
2,343,463 UART: [art] Lock RT PCRs Done
2,344,965 UART: [art] Populate DV Done
2,353,272 UART: [fht] FMC Alias Private Key: 7
2,354,322 UART: [art] Derive CDI
2,354,602 UART: [art] Store in in slot 0x4
2,440,135 UART: [art] Derive Key Pair
2,440,495 UART: [art] Store priv key in slot 0x5
2,453,815 UART: [art] Derive Key Pair - Done
2,468,406 UART: [art] Signing Cert with AUTHO
2,468,886 UART: RITY.KEYID = 7
2,484,334 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,099 UART: [art] PUB.X = 55CDBEFB17F7B27D6BEF24F787567475C20DE786E0F4180A3206C3C1E3A1F56F80EECFC5ED1B4DEC5855AB2E2E756C7B
2,491,882 UART: [art] PUB.Y = E4B3FC619B8E1C36EF7C885BE82ADAF82716FD3C658A06B33FB108419DDBCFC41211FCB472C258017BC1C06AB65C8A8D
2,498,843 UART: [art] SIG.R = 50AB72DE989612D314B4694AECBE9649348266FDC8D764756A7E7A5B608AD190F98ABA4F2F7B6B68FD1198B1072A5917
2,505,614 UART: [art] SIG.S = A9825980A80B83A9549E58549B4E2BBABDB22CF675C7FD96E21CF62E471737800A71905B31A96AE24404B72EAA2A487D
2,529,346 UART: mbox::rt_entry...
2,529,718 UART: ____ _ _ _ ____ _____
2,530,502 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,302 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,070 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,838 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,606 UART: |_|
2,533,918 UART:
2,639,426 UART: [rt] Runtime listening for mailbox commands...
2,644,394 >>> mbox cmd response data (3272 bytes)
2,644,395 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,667,481 >>> mbox cmd response data (0 bytes)
2,667,482 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,099,356 >>> mbox cmd response: success
5,112,736 UART:
5,112,752 UART: Running Caliptra FMC ...
5,113,160 UART:
5,113,303 UART: [state] CFI Enabled
5,202,042 UART: [art] Extend RT PCRs Done
5,202,470 UART: [art] Lock RT PCRs Done
5,203,685 UART: [art] Populate DV Done
5,211,886 UART: [fht] FMC Alias Private Key: 7
5,212,888 UART: [art] Derive CDI
5,213,168 UART: [art] Store in in slot 0x4
5,299,011 UART: [art] Derive Key Pair
5,299,371 UART: [art] Store priv key in slot 0x5
5,313,083 UART: [art] Derive Key Pair - Done
5,327,671 UART: [art] Signing Cert with AUTHO
5,328,151 UART: RITY.KEYID = 7
5,343,243 UART: [art] Erasing AUTHORITY.KEYID = 7
5,344,008 UART: [art] PUB.X = F020066003815EE9D3B4C9B3D393254869FE7D7DC4001E7D759D2671749461C20EA8ABE702B13B886C9075D47622C878
5,350,736 UART: [art] PUB.Y = 27B9633653F0C6164253979C565337FA10FC41A1E01666F64C0C28E0A95FB021D7004B756224966FED907961598E6C2F
5,357,649 UART: [art] SIG.R = 04B74E0FA1953BBB34DE8E17FDFF506E44FF1983C355D5A7842C018C3EE74118937784049B85F39CAA35E80C4D3D9091
5,364,408 UART: [art] SIG.S = 135A3412052C267218EF4055B16FA56A70F0811D8E38CE34095DD342756A1BE75C51B7B5EDB97153E4E9492CC0E07B1F
5,388,269 UART: Caliptra RT
5,388,614 UART: [state] CFI Enabled
5,452,857 UART: Disabled attest: DPE valid fail
5,453,363 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,454,853 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,485,311 UART: [rt]cmd =0x494e464f, len=4
5,488,872 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,531 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,207 UART: [kat] SHA2-256
882,138 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,253 UART: [kat] ++
886,405 UART: [kat] sha1
890,701 UART: [kat] SHA2-256
892,639 UART: [kat] SHA2-384
895,364 UART: [kat] SHA2-512-ACC
897,265 UART: [kat] ECC-384
902,778 UART: [kat] HMAC-384Kdf
907,398 UART: [kat] LMS
1,475,594 UART: [kat] --
1,476,417 UART: [cold-reset] ++
1,476,921 UART: [fht] Storing FHT @ 0x50003400
1,479,756 UART: [idev] ++
1,479,924 UART: [idev] CDI.KEYID = 6
1,480,284 UART: [idev] SUBJECT.KEYID = 7
1,480,708 UART: [idev] UDS.KEYID = 0
1,481,053 ready_for_fw is high
1,481,053 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,744 UART: [idev] Erasing UDS.KEYID = 0
1,505,278 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,852 UART: [idev] --
1,514,963 UART: [ldev] ++
1,515,131 UART: [ldev] CDI.KEYID = 6
1,515,494 UART: [ldev] SUBJECT.KEYID = 5
1,515,920 UART: [ldev] AUTHORITY.KEYID = 7
1,516,383 UART: [ldev] FE.KEYID = 1
1,521,285 UART: [ldev] Erasing FE.KEYID = 1
1,546,484 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,528 UART: [ldev] --
1,585,913 UART: [fwproc] Waiting for Commands...
1,586,766 UART: [fwproc] Received command 0x46574c44
1,587,557 UART: [fwproc] Received Image of size 78704 bytes
2,477,477 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,257 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,609 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,116 >>> mbox cmd response: success
2,617,116 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,618,176 UART: [afmc] ++
2,618,344 UART: [afmc] CDI.KEYID = 6
2,618,706 UART: [afmc] SUBJECT.KEYID = 7
2,619,131 UART: [afmc] AUTHORITY.KEYID = 5
2,654,284 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,900 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,680 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,408 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,683,293 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,983 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,697,112 UART: [afmc] --
2,698,166 UART: [cold-reset] --
2,698,994 UART: [state] Locking Datavault
2,700,403 UART: [state] Locking PCR0, PCR1 and PCR31
2,701,007 UART: [state] Locking ICCM
2,701,639 UART: [exit] Launching FMC @ 0x40000130
2,706,968 UART:
2,706,984 UART: Running Caliptra FMC ...
2,707,392 UART:
2,707,446 UART: [state] CFI Enabled
2,717,885 UART: [fht] FMC Alias Private Key: 7
2,825,346 UART: [art] Extend RT PCRs Done
2,825,774 UART: [art] Lock RT PCRs Done
2,826,952 UART: [art] Populate DV Done
2,835,061 UART: [fht] FMC Alias Private Key: 7
2,836,031 UART: [art] Derive CDI
2,836,311 UART: [art] Store in in slot 0x4
2,921,766 UART: [art] Derive Key Pair
2,922,126 UART: [art] Store priv key in slot 0x5
2,936,254 UART: [art] Derive Key Pair - Done
2,951,130 UART: [art] Signing Cert with AUTHO
2,951,610 UART: RITY.KEYID = 7
2,966,776 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,541 UART: [art] PUB.X = 7A07C6462C3EF7BC7E474FA667E761B5CD06EC929DEDCAC47AD19C3DE27D1625B1E078C6646E0A39E1B0B70DC4CE44C5
2,974,319 UART: [art] PUB.Y = 0ED74269F40D42872755F82970D1435A47A581BDA5E05B1E8ACED92D0929679C15A9F161EE88587F49F050046A445835
2,981,249 UART: [art] SIG.R = 1EE5D17CEF75FA255B8FAD39081C231992CFCE01676A5CDDDAE5AE6592277B306A930448D5D8070ED1302B751B107B81
2,988,012 UART: [art] SIG.S = B77EA4CBBA912B611AA3F563987C4CA7AFABE76BE844A5B3ACE83F50D1077FCEF296E0DCBF96768A03B40B6459705C5D
3,011,786 UART: mbox::rt_entry...
3,012,158 UART: ____ _ _ _ ____ _____
3,012,942 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,013,742 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,014,510 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,015,278 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,016,046 UART: |_|
3,016,358 UART:
3,123,198 UART: [rt] Runtime listening for mailbox commands...
3,128,166 >>> mbox cmd response data (3272 bytes)
3,128,167 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,151,253 >>> mbox cmd response data (0 bytes)
3,151,254 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,151,374 UART:
3,151,390 UART: Running Caliptra ROM ...
3,151,798 UART:
3,151,852 UART: [state] CFI Enabled
3,154,224 UART: [state] LifecycleState = Unprovisioned
3,154,879 UART: [state] DebugLocked = No
3,155,437 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,156,970 UART: [kat] SHA2-256
3,950,901 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,955,016 UART: [kat] ++
3,955,168 UART: [kat] sha1
3,959,386 UART: [kat] SHA2-256
3,961,324 UART: [kat] SHA2-384
3,963,967 UART: [kat] SHA2-512-ACC
3,965,867 UART: [kat] ECC-384
3,971,304 UART: [kat] HMAC-384Kdf
3,976,104 UART: [kat] LMS
4,544,300 UART: [kat] --
4,545,491 UART: [update-reset] ++
5,880,057 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,881,161 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,031,037 >>> mbox cmd response: success
6,031,142 UART: [update-reset] Copying MAN_2 To MAN_1
6,039,156 UART: [update-reset Success] --
6,040,171 UART: [state] Locking Datavault
6,040,831 UART: [state] Locking PCR0, PCR1 and PCR31
6,041,435 UART: [state] Locking ICCM
6,042,055 UART: [exit] Launching FMC @ 0x40000130
6,047,384 UART:
6,047,400 UART: Running Caliptra FMC ...
6,047,808 UART:
6,047,862 UART: [state] CFI Enabled
6,136,649 UART: [art] Extend RT PCRs Done
6,137,077 UART: [art] Lock RT PCRs Done
6,138,328 UART: [art] Populate DV Done
6,146,407 UART: [fht] FMC Alias Private Key: 7
6,147,499 UART: [art] Derive CDI
6,147,779 UART: [art] Store in in slot 0x4
6,233,572 UART: [art] Derive Key Pair
6,233,932 UART: [art] Store priv key in slot 0x5
6,247,786 UART: [art] Derive Key Pair - Done
6,262,634 UART: [art] Signing Cert with AUTHO
6,263,114 UART: RITY.KEYID = 7
6,278,512 UART: [art] Erasing AUTHORITY.KEYID = 7
6,279,277 UART: [art] PUB.X = 60D67EC5F13B5B9FAAF8551AD446C67AF5D0A39C567C10321D54C2663FCA1E195D19821DEAAC0B22C381B4060AA1AD85
6,286,052 UART: [art] PUB.Y = F4AF588C5E290B6393FF72D60DF46F648164992D7C6C965644EFF9357D44C91283A65633A41C9821FFD5F2AA15F24CF6
6,292,998 UART: [art] SIG.R = C5E6A3C87EE381E4119F552B3539D8D78311775962C9C86A202473B5556570E65CF5DC729F31EAE76E8B50F945B00FF4
6,299,763 UART: [art] SIG.S = 655C322A099E82BE51494D175CBF5248E615BAE1E8CA447028535877DB5E4028D4C79158CDF7A5C4BF72FFD732E3D14A
6,323,901 UART: Caliptra RT
6,324,154 UART: [state] CFI Enabled
6,610,419 UART: Disable attest DPE used context limit breach
6,611,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,612,422 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,643,000 UART: [rt]cmd =0x494e464f, len=4
6,646,559 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,907 ready_for_fw is high
1,362,907 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,468,546 >>> mbox cmd response: success
2,468,546 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,531,026 UART:
2,531,042 UART: Running Caliptra FMC ...
2,531,450 UART:
2,531,504 UART: [state] CFI Enabled
2,542,017 UART: [fht] FMC Alias Private Key: 7
2,650,668 UART: [art] Extend RT PCRs Done
2,651,096 UART: [art] Lock RT PCRs Done
2,652,412 UART: [art] Populate DV Done
2,660,401 UART: [fht] FMC Alias Private Key: 7
2,661,471 UART: [art] Derive CDI
2,661,751 UART: [art] Store in in slot 0x4
2,747,456 UART: [art] Derive Key Pair
2,747,816 UART: [art] Store priv key in slot 0x5
2,761,192 UART: [art] Derive Key Pair - Done
2,776,059 UART: [art] Signing Cert with AUTHO
2,776,539 UART: RITY.KEYID = 7
2,791,845 UART: [art] Erasing AUTHORITY.KEYID = 7
2,792,610 UART: [art] PUB.X = 9625CFF192536C152CCD9F4203F1DCF6561FB06C4CC1C2F414D00E1C43861B497125B4E61DA5F376630C2FE749F025BB
2,799,377 UART: [art] PUB.Y = 32045551D8F321F33FA5773A61AED615F3441099BAF41BC2E4D4F28E886ABFDC72AFB0B8984D119A27B35EC6DA17093D
2,806,331 UART: [art] SIG.R = BB25E6CD119083D849B7E8786A935FF93DC0832895895D8DC6ADC6E256E5CE9B71AB50253C77372BA324A755D696ADEB
2,813,109 UART: [art] SIG.S = 0823700E34231EFE6A8CE40E0B81DD3D79BC0D6B6D9045C0B7D993B3EE4D41FF7869E4D149154F024C42F8CC96BC6EC7
2,837,240 UART: mbox::rt_entry...
2,837,612 UART: ____ _ _ _ ____ _____
2,838,396 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,839,196 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,839,964 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,840,732 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,841,500 UART: |_|
2,841,812 UART:
2,948,840 UART: [rt] Runtime listening for mailbox commands...
2,953,808 >>> mbox cmd response data (3272 bytes)
2,953,809 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,976,895 >>> mbox cmd response data (0 bytes)
2,976,896 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,737,055 >>> mbox cmd response: success
5,750,272 UART:
5,750,288 UART: Running Caliptra FMC ...
5,750,696 UART:
5,750,750 UART: [state] CFI Enabled
5,840,169 UART: [art] Extend RT PCRs Done
5,840,597 UART: [art] Lock RT PCRs Done
5,842,098 UART: [art] Populate DV Done
5,850,301 UART: [fht] FMC Alias Private Key: 7
5,851,249 UART: [art] Derive CDI
5,851,529 UART: [art] Store in in slot 0x4
5,937,504 UART: [art] Derive Key Pair
5,937,864 UART: [art] Store priv key in slot 0x5
5,950,828 UART: [art] Derive Key Pair - Done
5,965,469 UART: [art] Signing Cert with AUTHO
5,965,949 UART: RITY.KEYID = 7
5,981,223 UART: [art] Erasing AUTHORITY.KEYID = 7
5,981,988 UART: [art] PUB.X = 330466947D8DDFC880C82613EF12C4FEFD078A6CB795D43B312E7356BA1876333B45BCCFCAF4E31DE04BC11982A5A020
5,988,762 UART: [art] PUB.Y = 26F406EDC5C256A6679BE9533F0A00959FB5B38C32BFE278FD792F06184B8F8B87D8B4411A7FD9477EA27CEC2AC2E1C8
5,995,693 UART: [art] SIG.R = 34535FE3E3A8845E13018EEABEE026456FAE93A07605A0E5F5DBEEB1D016353BEAAFE0404D909FCCD7EBA8C9D88BCAFE
6,002,485 UART: [art] SIG.S = ED173F156C9B796A9150E62D166D5CAF96B21949BCB2835B485265D317FF59066B0D409FCB44DECA060C783780F7FF81
6,025,954 UART: Caliptra RT
6,026,207 UART: [state] CFI Enabled
6,315,918 UART: Disable attest DPE used context limit breach
6,316,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,318,217 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,348,473 UART: [rt]cmd =0x494e464f, len=4
6,352,258 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,666 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,190 UART: [kat] SHA2-256
882,121 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,236 UART: [kat] ++
886,388 UART: [kat] sha1
890,526 UART: [kat] SHA2-256
892,464 UART: [kat] SHA2-384
895,287 UART: [kat] SHA2-512-ACC
897,188 UART: [kat] ECC-384
902,979 UART: [kat] HMAC-384Kdf
907,713 UART: [kat] LMS
1,475,909 UART: [kat] --
1,476,642 UART: [cold-reset] ++
1,477,042 UART: [fht] Storing FHT @ 0x50003400
1,479,993 UART: [idev] ++
1,480,161 UART: [idev] CDI.KEYID = 6
1,480,521 UART: [idev] SUBJECT.KEYID = 7
1,480,945 UART: [idev] UDS.KEYID = 0
1,481,290 ready_for_fw is high
1,481,290 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,695 UART: [idev] Erasing UDS.KEYID = 0
1,504,993 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,679 UART: [idev] --
1,514,756 UART: [ldev] ++
1,514,924 UART: [ldev] CDI.KEYID = 6
1,515,287 UART: [ldev] SUBJECT.KEYID = 5
1,515,713 UART: [ldev] AUTHORITY.KEYID = 7
1,516,176 UART: [ldev] FE.KEYID = 1
1,521,564 UART: [ldev] Erasing FE.KEYID = 1
1,546,633 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,521 UART: [ldev] --
1,585,824 UART: [fwproc] Waiting for Commands...
1,586,673 UART: [fwproc] Received command 0x46574c44
1,587,464 UART: [fwproc] Received Image of size 78704 bytes
2,478,128 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,506,066 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,535,418 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,927 >>> mbox cmd response: success
2,617,927 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,619,153 UART: [afmc] ++
2,619,321 UART: [afmc] CDI.KEYID = 6
2,619,683 UART: [afmc] SUBJECT.KEYID = 7
2,620,108 UART: [afmc] AUTHORITY.KEYID = 5
2,655,541 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,671,957 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,672,737 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,678,465 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,684,350 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,690,040 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,698,119 UART: [afmc] --
2,699,061 UART: [cold-reset] --
2,700,107 UART: [state] Locking Datavault
2,701,264 UART: [state] Locking PCR0, PCR1 and PCR31
2,701,868 UART: [state] Locking ICCM
2,702,356 UART: [exit] Launching FMC @ 0x40000130
2,707,685 UART:
2,707,701 UART: Running Caliptra FMC ...
2,708,109 UART:
2,708,252 UART: [state] CFI Enabled
2,719,041 UART: [fht] FMC Alias Private Key: 7
2,827,212 UART: [art] Extend RT PCRs Done
2,827,640 UART: [art] Lock RT PCRs Done
2,829,010 UART: [art] Populate DV Done
2,837,107 UART: [fht] FMC Alias Private Key: 7
2,838,119 UART: [art] Derive CDI
2,838,399 UART: [art] Store in in slot 0x4
2,924,178 UART: [art] Derive Key Pair
2,924,538 UART: [art] Store priv key in slot 0x5
2,937,824 UART: [art] Derive Key Pair - Done
2,952,256 UART: [art] Signing Cert with AUTHO
2,952,736 UART: RITY.KEYID = 7
2,968,394 UART: [art] Erasing AUTHORITY.KEYID = 7
2,969,159 UART: [art] PUB.X = 8C3BAB4457A793A6E3DA50CEBB67F0661559841AB7D214D1360AECAA605F4070155ADCADD78D4C23036BF057ACCE1612
2,975,937 UART: [art] PUB.Y = 265E50BBBB377EF6C35A5DADF557AC9DE14701D4A9FC54549BB1A4214D2BB045E25AC5E152484A765B7EDA46FD434A01
2,982,897 UART: [art] SIG.R = 999CF17036385182F028B7A89E56946BE252EB973AE682BC60FD9A3B4C261CB69A888F700C3153112A56CBDB221AB226
2,989,664 UART: [art] SIG.S = D8EBA70AC25B660AD06202E82A27F83930CD32C628C75480CAD73D487BDB07B7D5113601CE3E3AEBC46022973D365723
3,014,252 UART: mbox::rt_entry...
3,014,624 UART: ____ _ _ _ ____ _____
3,015,408 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,016,208 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,016,976 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,017,744 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,018,512 UART: |_|
3,018,824 UART:
3,125,983 UART: [rt] Runtime listening for mailbox commands...
3,130,951 >>> mbox cmd response data (3272 bytes)
3,130,952 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,154,038 >>> mbox cmd response data (0 bytes)
3,154,039 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,154,159 UART:
3,154,175 UART: Running Caliptra ROM ...
3,154,583 UART:
3,154,724 UART: [state] CFI Enabled
3,157,350 UART: [state] LifecycleState = Unprovisioned
3,158,005 UART: [state] DebugLocked = No
3,158,561 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,160,262 UART: [kat] SHA2-256
3,954,193 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,958,308 UART: [kat] ++
3,958,460 UART: [kat] sha1
3,962,850 UART: [kat] SHA2-256
3,964,788 UART: [kat] SHA2-384
3,967,573 UART: [kat] SHA2-512-ACC
3,969,473 UART: [kat] ECC-384
3,975,102 UART: [kat] HMAC-384Kdf
3,979,852 UART: [kat] LMS
4,548,048 UART: [kat] --
4,549,231 UART: [update-reset] ++
5,883,547 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,884,635 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
6,034,511 >>> mbox cmd response: success
6,034,836 UART: [update-reset] Copying MAN_2 To MAN_1
6,042,850 UART: [update-reset Success] --
6,043,705 UART: [state] Locking Datavault
6,044,621 UART: [state] Locking PCR0, PCR1 and PCR31
6,045,225 UART: [state] Locking ICCM
6,045,695 UART: [exit] Launching FMC @ 0x40000130
6,051,024 UART:
6,051,040 UART: Running Caliptra FMC ...
6,051,448 UART:
6,051,591 UART: [state] CFI Enabled
6,140,752 UART: [art] Extend RT PCRs Done
6,141,180 UART: [art] Lock RT PCRs Done
6,142,567 UART: [art] Populate DV Done
6,151,022 UART: [fht] FMC Alias Private Key: 7
6,152,018 UART: [art] Derive CDI
6,152,298 UART: [art] Store in in slot 0x4
6,237,805 UART: [art] Derive Key Pair
6,238,165 UART: [art] Store priv key in slot 0x5
6,251,299 UART: [art] Derive Key Pair - Done
6,265,813 UART: [art] Signing Cert with AUTHO
6,266,293 UART: RITY.KEYID = 7
6,281,521 UART: [art] Erasing AUTHORITY.KEYID = 7
6,282,286 UART: [art] PUB.X = E53C68CC51A6CFBCBB164D504F4B1B62617B41AA7A46A10AFB746B0A1243935D984D7F71202DC04607345EEE5DFDCDD0
6,289,063 UART: [art] PUB.Y = 4002845E66139B27F13714DBAF5E805AB46227C03129D5374E0FABB0FA3CFB281094DAF3A9F49D60CEF54D2B77E57E3D
6,296,017 UART: [art] SIG.R = 1C69A226F5F9EC35E4B6A964C3CE54E19149397264D7FE79BE100D3CDB31BD2ACF717101247D0C0A8E0B134BF632E385
6,302,780 UART: [art] SIG.S = 58753DB8EFF7B4D282BA28CF4EDF7EB4188C3F414A347E65C09E841762A066CC4B9CA9A18DE5B70D042969E567C5FB03
6,326,582 UART: Caliptra RT
6,326,927 UART: [state] CFI Enabled
6,622,335 UART: Disable attest DPE used context limit breach
6,623,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,624,228 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,654,822 UART: [rt]cmd =0x494e464f, len=4
6,658,697 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,542 ready_for_fw is high
1,362,542 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,466,899 >>> mbox cmd response: success
2,466,899 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,528,519 UART:
2,528,535 UART: Running Caliptra FMC ...
2,528,943 UART:
2,529,086 UART: [state] CFI Enabled
2,539,597 UART: [fht] FMC Alias Private Key: 7
2,647,330 UART: [art] Extend RT PCRs Done
2,647,758 UART: [art] Lock RT PCRs Done
2,649,106 UART: [art] Populate DV Done
2,657,515 UART: [fht] FMC Alias Private Key: 7
2,658,601 UART: [art] Derive CDI
2,658,881 UART: [art] Store in in slot 0x4
2,744,786 UART: [art] Derive Key Pair
2,745,146 UART: [art] Store priv key in slot 0x5
2,759,088 UART: [art] Derive Key Pair - Done
2,773,755 UART: [art] Signing Cert with AUTHO
2,774,235 UART: RITY.KEYID = 7
2,789,789 UART: [art] Erasing AUTHORITY.KEYID = 7
2,790,554 UART: [art] PUB.X = 2562178BEED0DBE3171E59C0288D7FCA452EBA9FB9108AF1DEF2A7A6EA4F4F6E8CD41A9CAD5D17FE873201DA1BDC2437
2,797,347 UART: [art] PUB.Y = E149F639D8246DEB1FB0813E038C5123AD9436A211B8CF5E07999A2961B462FC126186B54DFDAA49B18ADB4767EE946A
2,804,297 UART: [art] SIG.R = D8C6F5612D33E3164C797ADBCF44EF9E653F1BD97A6315419C7DEEBF51F05FEBD561AA89D8BB6A578F9FD921F233BEE7
2,811,089 UART: [art] SIG.S = A1A86655A9D0F0EC655DE822AC687F5C034913A30B0207FF7DBC5A9ED3F21185509A311ED5422211425EEF5300A763F0
2,835,342 UART: mbox::rt_entry...
2,835,714 UART: ____ _ _ _ ____ _____
2,836,498 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,837,298 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,838,066 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,838,834 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,839,602 UART: |_|
2,839,914 UART:
2,947,241 UART: [rt] Runtime listening for mailbox commands...
2,952,209 >>> mbox cmd response data (3272 bytes)
2,952,210 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,975,296 >>> mbox cmd response data (0 bytes)
2,975,297 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,737,251 >>> mbox cmd response: success
5,750,726 UART:
5,750,742 UART: Running Caliptra FMC ...
5,751,150 UART:
5,751,293 UART: [state] CFI Enabled
5,840,816 UART: [art] Extend RT PCRs Done
5,841,244 UART: [art] Lock RT PCRs Done
5,842,531 UART: [art] Populate DV Done
5,850,962 UART: [fht] FMC Alias Private Key: 7
5,851,978 UART: [art] Derive CDI
5,852,258 UART: [art] Store in in slot 0x4
5,938,279 UART: [art] Derive Key Pair
5,938,639 UART: [art] Store priv key in slot 0x5
5,952,381 UART: [art] Derive Key Pair - Done
5,967,242 UART: [art] Signing Cert with AUTHO
5,967,722 UART: RITY.KEYID = 7
5,982,956 UART: [art] Erasing AUTHORITY.KEYID = 7
5,983,721 UART: [art] PUB.X = DCE0DA636358DA634A32F28581EC0D407DF84FCD39D65FAD0C0A69DB74C67DD8BCE854703A11741D5ACD4FA76A78EA38
5,990,502 UART: [art] PUB.Y = EB2B9E588229DDFC957D5D27C21B839EE4979918655893A14737302B911D2D21E15FFEA2643FD3FD27F4158447BE029E
5,997,449 UART: [art] SIG.R = ABBE84E6B4D2779E3F8509DBDA1534F809E6B810708BB913678CB907E28FC7FF480AFCC3DA47DE5BEF1BF93480ECDFD6
6,004,231 UART: [art] SIG.S = E2A79C9297BF9B6AF9E8C40D89E2C96303B9A775BEC5B93467009F8670FE1B541DFF13E0684A114D68CF4C5E8FB2CF90
6,027,910 UART: Caliptra RT
6,028,255 UART: [state] CFI Enabled
6,318,829 UART: Disable attest DPE used context limit breach
6,319,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,320,832 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,351,232 UART: [rt]cmd =0x494e464f, len=4
6,354,865 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,677 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
893,558 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,683 UART: [kat] ++
897,835 UART: [kat] sha1
902,167 UART: [kat] SHA2-256
904,107 UART: [kat] SHA2-384
906,668 UART: [kat] SHA2-512-ACC
908,569 UART: [kat] ECC-384
918,450 UART: [kat] HMAC-384Kdf
923,240 UART: [kat] LMS
1,171,568 UART: [kat] --
1,172,545 UART: [cold-reset] ++
1,173,049 UART: [fht] FHT @ 0x50003400
1,175,766 UART: [idev] ++
1,175,934 UART: [idev] CDI.KEYID = 6
1,176,294 UART: [idev] SUBJECT.KEYID = 7
1,176,718 UART: [idev] UDS.KEYID = 0
1,177,063 ready_for_fw is high
1,177,063 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,546 UART: [idev] Erasing UDS.KEYID = 0
1,201,523 UART: [idev] Sha1 KeyId Algorithm
1,210,193 UART: [idev] --
1,211,129 UART: [ldev] ++
1,211,297 UART: [ldev] CDI.KEYID = 6
1,211,660 UART: [ldev] SUBJECT.KEYID = 5
1,212,086 UART: [ldev] AUTHORITY.KEYID = 7
1,212,549 UART: [ldev] FE.KEYID = 1
1,217,533 UART: [ldev] Erasing FE.KEYID = 1
1,243,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,589 UART: [ldev] --
1,283,058 UART: [fwproc] Wait for Commands...
1,283,724 UART: [fwproc] Recv command 0x46574c44
1,284,452 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,738 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,042 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,331 >>> mbox cmd response: success
2,313,331 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,314,447 UART: [afmc] ++
2,314,615 UART: [afmc] CDI.KEYID = 6
2,314,977 UART: [afmc] SUBJECT.KEYID = 7
2,315,402 UART: [afmc] AUTHORITY.KEYID = 5
2,350,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,278 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,006 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,891 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,610 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,452 UART: [afmc] --
2,394,500 UART: [cold-reset] --
2,395,540 UART: [state] Locking Datavault
2,396,515 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,119 UART: [state] Locking ICCM
2,397,583 UART: [exit] Launching FMC @ 0x40000130
2,402,912 UART:
2,402,928 UART: Running Caliptra FMC ...
2,403,336 UART:
2,403,390 UART: [state] CFI Enabled
2,413,763 UART: [fht] FMC Alias Private Key: 7
2,521,922 UART: [art] Extend RT PCRs Done
2,522,350 UART: [art] Lock RT PCRs Done
2,523,884 UART: [art] Populate DV Done
2,532,259 UART: [fht] FMC Alias Private Key: 7
2,533,323 UART: [art] Derive CDI
2,533,603 UART: [art] Store in in slot 0x4
2,619,200 UART: [art] Derive Key Pair
2,619,560 UART: [art] Store priv key in slot 0x5
2,633,166 UART: [art] Derive Key Pair - Done
2,647,815 UART: [art] Signing Cert with AUTHO
2,648,295 UART: RITY.KEYID = 7
2,663,763 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,528 UART: [art] PUB.X = F72A4288938055D83D5F66BF453688D05ADE5B535E29216BC5035F457D0FB8D082F6B139CCFFEEE22C10540A7E640B81
2,671,290 UART: [art] PUB.Y = 00F4297E30F5FA691600B1E87E592625B61DBA1FFFBDC59048F871ED4A54852651C1C757C5BECF2DBEE0BD0178A7C7DA
2,678,209 UART: [art] SIG.R = D1ED257FC688D7F262986BB06BE70ED61504426256C3EEADCA85CA7C4F9EC58EFCFE7FB0087BF237F69375E983BE2FDB
2,684,992 UART: [art] SIG.S = 45D4B624040BD181CECB5D825151E2877B9246C5E20F3B4DD01F3F73B0C9ABC45C6A51AA11A48178EC8190CFD0ED8D17
2,708,910 UART: mbox::rt_entry...
2,709,282 UART: ____ _ _ _ ____ _____
2,710,066 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,866 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,634 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,402 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,170 UART: |_|
2,713,482 UART:
2,819,704 UART: [rt] Runtime listening for mailbox commands...
2,824,672 >>> mbox cmd response data (3272 bytes)
2,824,673 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,847,759 >>> mbox cmd response data (0 bytes)
2,847,760 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,847,877 UART:
2,847,893 UART: Running Caliptra ROM ...
2,848,301 UART:
2,848,356 UART: [state] CFI Enabled
2,850,840 UART: [state] LifecycleState = Unprovisioned
2,851,495 UART: [state] DebugLocked = No
2,852,047 UART: [state] WD Timer not started. Device not locked for debugging
2,853,307 UART: [kat] SHA2-256
3,658,957 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,663,082 UART: [kat] ++
3,663,234 UART: [kat] sha1
3,667,310 UART: [kat] SHA2-256
3,669,250 UART: [kat] SHA2-384
3,672,051 UART: [kat] SHA2-512-ACC
3,673,951 UART: [kat] ECC-384
3,683,442 UART: [kat] HMAC-384Kdf
3,687,992 UART: [kat] LMS
3,936,320 UART: [kat] --
3,937,210 UART: [update-reset] ++
5,248,272 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,249,275 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,399,099 >>> mbox cmd response: success
5,399,434 UART: [update-reset] Copying MAN_2 To MAN_1
5,407,448 UART: [update-reset Success] --
5,408,623 UART: [state] Locking Datavault
5,409,433 UART: [state] Locking PCR0, PCR1 and PCR31
5,410,037 UART: [state] Locking ICCM
5,410,613 UART: [exit] Launching FMC @ 0x40000130
5,415,942 UART:
5,415,958 UART: Running Caliptra FMC ...
5,416,366 UART:
5,416,420 UART: [state] CFI Enabled
5,505,539 UART: [art] Extend RT PCRs Done
5,505,967 UART: [art] Lock RT PCRs Done
5,507,202 UART: [art] Populate DV Done
5,515,503 UART: [fht] FMC Alias Private Key: 7
5,516,547 UART: [art] Derive CDI
5,516,827 UART: [art] Store in in slot 0x4
5,602,962 UART: [art] Derive Key Pair
5,603,322 UART: [art] Store priv key in slot 0x5
5,616,262 UART: [art] Derive Key Pair - Done
5,631,372 UART: [art] Signing Cert with AUTHO
5,631,852 UART: RITY.KEYID = 7
5,647,332 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,097 UART: [art] PUB.X = 39E8897F102D5AF78482DF5CD866E616E06871F01536EDF23C252B5F0A2C1FDFDB7483B0B30178119162FE3DBAF35617
5,654,865 UART: [art] PUB.Y = F72130B10DF54EEE26659F7763F4EAF845F9249C05A637C0D3EBBD5AB8887422552EB88289D93A9F173A908C1E2713E2
5,661,811 UART: [art] SIG.R = 1978B05873F8858B9AEBF833D41728E83BBB60A753208D1E6FE77A485945B691322329AF553D73DB018B9BCE2888270E
5,668,571 UART: [art] SIG.S = AB361BA05198EF0C1A3B06EE4F93E12B5ADB64E8D52D84D25EAE9594D33610644CE5CB3B3976FFB624CA0C81DEADF937
5,692,693 UART: Caliptra RT
5,692,946 UART: [state] CFI Enabled
5,986,467 UART: Disable attest DPE used context limit breach
5,987,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,988,626 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,019,132 UART: [rt]cmd =0x494e464f, len=4
6,022,903 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,049 ready_for_fw is high
1,060,049 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,164,536 >>> mbox cmd response: success
2,164,536 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,226,080 UART:
2,226,096 UART: Running Caliptra FMC ...
2,226,504 UART:
2,226,558 UART: [state] CFI Enabled
2,237,169 UART: [fht] FMC Alias Private Key: 7
2,345,556 UART: [art] Extend RT PCRs Done
2,345,984 UART: [art] Lock RT PCRs Done
2,347,750 UART: [art] Populate DV Done
2,356,109 UART: [fht] FMC Alias Private Key: 7
2,357,115 UART: [art] Derive CDI
2,357,395 UART: [art] Store in in slot 0x4
2,443,088 UART: [art] Derive Key Pair
2,443,448 UART: [art] Store priv key in slot 0x5
2,456,392 UART: [art] Derive Key Pair - Done
2,471,256 UART: [art] Signing Cert with AUTHO
2,471,736 UART: RITY.KEYID = 7
2,487,236 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,001 UART: [art] PUB.X = D1E2FABC60A76EC12764211FC2109C26BA8D46F9AC97FB038E6954C3378E07CE93E12296FB328D498ADE140A2B5D07F6
2,494,769 UART: [art] PUB.Y = 4BF85468ABC56C3239C6226D08BBA333022106C22F9F9F60CFE418CADAEBC1B5EAF0B18F51058CB1CA807824D3DBBE2C
2,501,727 UART: [art] SIG.R = A17313DDD0504E823CC0EF57E0DD6940ACD5A5E4C0C7CE53A5E87CB65944C81A988F957C55D2B9BCFF45CDA2767C75B9
2,508,515 UART: [art] SIG.S = 5DEC2566202DAE4EAB36CF6661563F0AA8D6BD204C68D48E0AEA2C61DA4B727259217FC2B7983294E7DD6E780EE18BA8
2,532,603 UART: mbox::rt_entry...
2,532,975 UART: ____ _ _ _ ____ _____
2,533,759 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,559 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,327 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,095 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,863 UART: |_|
2,537,175 UART:
2,643,983 UART: [rt] Runtime listening for mailbox commands...
2,648,951 >>> mbox cmd response data (3272 bytes)
2,648,952 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,672,038 >>> mbox cmd response data (0 bytes)
2,672,039 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,110,413 >>> mbox cmd response: success
5,123,711 UART:
5,123,727 UART: Running Caliptra FMC ...
5,124,135 UART:
5,124,189 UART: [state] CFI Enabled
5,213,346 UART: [art] Extend RT PCRs Done
5,213,774 UART: [art] Lock RT PCRs Done
5,215,191 UART: [art] Populate DV Done
5,223,542 UART: [fht] FMC Alias Private Key: 7
5,224,606 UART: [art] Derive CDI
5,224,886 UART: [art] Store in in slot 0x4
5,310,139 UART: [art] Derive Key Pair
5,310,499 UART: [art] Store priv key in slot 0x5
5,324,077 UART: [art] Derive Key Pair - Done
5,338,846 UART: [art] Signing Cert with AUTHO
5,339,326 UART: RITY.KEYID = 7
5,354,244 UART: [art] Erasing AUTHORITY.KEYID = 7
5,355,009 UART: [art] PUB.X = 154A46890F2D0DB5F7401C3AED37DDE9A6A38DE994F6DAA051AE727F54BA53D2908AC470AA678C83B5F7ECA07980F184
5,361,787 UART: [art] PUB.Y = EFD57682648B994F33DD3DA0057DE43229E29B0D518392C387CE5091AFACCB82DFDC5EF2A27EA5742FD8BBC5DC1BA6F6
5,368,753 UART: [art] SIG.R = AC1BC067059E1B0ED5D84CB70736D65DFBD987D7E0B37929BE94F52CFF7F47A10E69941C11AF3E8B0B0ED59E92A5EA01
5,375,520 UART: [art] SIG.S = F2C30B7E06B87EE770BEE5D536836296301696A0066F720707CCCA1F95D463267646C28AEB4C45E0733A14F66DDA66F5
5,400,068 UART: Caliptra RT
5,400,321 UART: [state] CFI Enabled
5,688,203 UART: Disable attest DPE used context limit breach
5,688,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,690,126 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,720,856 UART: [rt]cmd =0x494e464f, len=4
5,724,507 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,723 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
87,086 UART: [state] WD Timer not started. Device not locked for debugging
88,353 UART: [kat] SHA2-256
894,003 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,128 UART: [kat] ++
898,280 UART: [kat] sha1
902,604 UART: [kat] SHA2-256
904,544 UART: [kat] SHA2-384
907,271 UART: [kat] SHA2-512-ACC
909,172 UART: [kat] ECC-384
919,603 UART: [kat] HMAC-384Kdf
924,267 UART: [kat] LMS
1,172,595 UART: [kat] --
1,173,452 UART: [cold-reset] ++
1,173,940 UART: [fht] FHT @ 0x50003400
1,176,739 UART: [idev] ++
1,176,907 UART: [idev] CDI.KEYID = 6
1,177,267 UART: [idev] SUBJECT.KEYID = 7
1,177,691 UART: [idev] UDS.KEYID = 0
1,178,036 ready_for_fw is high
1,178,036 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,185,767 UART: [idev] Erasing UDS.KEYID = 0
1,202,702 UART: [idev] Sha1 KeyId Algorithm
1,211,240 UART: [idev] --
1,212,250 UART: [ldev] ++
1,212,418 UART: [ldev] CDI.KEYID = 6
1,212,781 UART: [ldev] SUBJECT.KEYID = 5
1,213,207 UART: [ldev] AUTHORITY.KEYID = 7
1,213,670 UART: [ldev] FE.KEYID = 1
1,218,542 UART: [ldev] Erasing FE.KEYID = 1
1,244,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,562 UART: [ldev] --
1,283,833 UART: [fwproc] Wait for Commands...
1,284,623 UART: [fwproc] Recv command 0x46574c44
1,285,351 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,592 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,021 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,325 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,662 >>> mbox cmd response: success
2,312,662 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,313,756 UART: [afmc] ++
2,313,924 UART: [afmc] CDI.KEYID = 6
2,314,286 UART: [afmc] SUBJECT.KEYID = 7
2,314,711 UART: [afmc] AUTHORITY.KEYID = 5
2,350,602 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,815 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,563 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,291 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,176 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,895 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,643 UART: [afmc] --
2,393,657 UART: [cold-reset] --
2,394,551 UART: [state] Locking Datavault
2,395,584 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,188 UART: [state] Locking ICCM
2,396,738 UART: [exit] Launching FMC @ 0x40000130
2,402,067 UART:
2,402,083 UART: Running Caliptra FMC ...
2,402,491 UART:
2,402,634 UART: [state] CFI Enabled
2,413,193 UART: [fht] FMC Alias Private Key: 7
2,521,362 UART: [art] Extend RT PCRs Done
2,521,790 UART: [art] Lock RT PCRs Done
2,523,342 UART: [art] Populate DV Done
2,531,261 UART: [fht] FMC Alias Private Key: 7
2,532,251 UART: [art] Derive CDI
2,532,531 UART: [art] Store in in slot 0x4
2,618,328 UART: [art] Derive Key Pair
2,618,688 UART: [art] Store priv key in slot 0x5
2,631,840 UART: [art] Derive Key Pair - Done
2,646,665 UART: [art] Signing Cert with AUTHO
2,647,145 UART: RITY.KEYID = 7
2,662,723 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,488 UART: [art] PUB.X = 451AD177B581AD62B17F49098A30C4DB4DCEC1A74945B17D0E71F98BB044404968A4C288F41D9AC83DE63256220B3C2C
2,670,253 UART: [art] PUB.Y = 4349AC6AB92DD75A5B514D68CDEC523532F7DD2356FF567D11E8AB7B7D82D0254D84B6A7684B738A26912A4A95894531
2,677,205 UART: [art] SIG.R = 584F7BA0F5459362BC518AE573A7C4D24F6D4AD9059841E707C0AD0A081B88073BD42CD11DC3995156E9170F44A0751B
2,683,957 UART: [art] SIG.S = 3DBA831E010A6191551520754B6D2FD29875984FB0AF80433C7FE72CF574565AB8A4EF551E926C51D9EF3D19A88E29B6
2,707,174 UART: mbox::rt_entry...
2,707,546 UART: ____ _ _ _ ____ _____
2,708,330 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,130 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,898 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,666 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,434 UART: |_|
2,711,746 UART:
2,817,012 UART: [rt] Runtime listening for mailbox commands...
2,821,980 >>> mbox cmd response data (3272 bytes)
2,821,981 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,845,067 >>> mbox cmd response data (0 bytes)
2,845,068 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,845,185 UART:
2,845,201 UART: Running Caliptra ROM ...
2,845,609 UART:
2,845,751 UART: [state] CFI Enabled
2,848,319 UART: [state] LifecycleState = Unprovisioned
2,848,974 UART: [state] DebugLocked = No
2,849,626 UART: [state] WD Timer not started. Device not locked for debugging
2,850,798 UART: [kat] SHA2-256
3,656,448 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,660,573 UART: [kat] ++
3,660,725 UART: [kat] sha1
3,664,819 UART: [kat] SHA2-256
3,666,759 UART: [kat] SHA2-384
3,669,482 UART: [kat] SHA2-512-ACC
3,671,382 UART: [kat] ECC-384
3,681,367 UART: [kat] HMAC-384Kdf
3,685,961 UART: [kat] LMS
3,934,289 UART: [kat] --
3,935,235 UART: [update-reset] ++
5,247,147 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,248,178 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,398,002 >>> mbox cmd response: success
5,398,311 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,325 UART: [update-reset Success] --
5,407,260 UART: [state] Locking Datavault
5,408,042 UART: [state] Locking PCR0, PCR1 and PCR31
5,408,646 UART: [state] Locking ICCM
5,409,152 UART: [exit] Launching FMC @ 0x40000130
5,414,481 UART:
5,414,497 UART: Running Caliptra FMC ...
5,414,905 UART:
5,415,048 UART: [state] CFI Enabled
5,504,109 UART: [art] Extend RT PCRs Done
5,504,537 UART: [art] Lock RT PCRs Done
5,505,984 UART: [art] Populate DV Done
5,514,403 UART: [fht] FMC Alias Private Key: 7
5,515,545 UART: [art] Derive CDI
5,515,825 UART: [art] Store in in slot 0x4
5,601,550 UART: [art] Derive Key Pair
5,601,910 UART: [art] Store priv key in slot 0x5
5,614,944 UART: [art] Derive Key Pair - Done
5,629,660 UART: [art] Signing Cert with AUTHO
5,630,140 UART: RITY.KEYID = 7
5,645,740 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,505 UART: [art] PUB.X = 4DE0114F987BC27F0466C9ACB3C371F6D54E113B499637EEA9096C71D637BF742998166021CF038C758676AC3F64A7CC
5,653,266 UART: [art] PUB.Y = 674C218E6CA33BF478D8288BE7BD9F77AAB4A63D77143172200ED9EBF63AC176345EF2C2EB0CF82A6828460B63EAC8FE
5,660,221 UART: [art] SIG.R = 3AB7EF8241887AC47D99205F50D70AA6F6B561E2A527BBC4CF6086981734E4941CEDDAB221014FA59AA2DEE07D739C38
5,666,995 UART: [art] SIG.S = DC49FC65CF2DAE59595C29843AC21EB02DE4748BDFD06C3BC32C24A51A3348E5B30922AAF86073D3FCDCA74CB74063DF
5,691,491 UART: Caliptra RT
5,691,836 UART: [state] CFI Enabled
5,981,507 UART: Disable attest DPE used context limit breach
5,982,215 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,983,470 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,014,306 UART: [rt]cmd =0x494e464f, len=4
6,017,925 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,172 ready_for_fw is high
1,061,172 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,166,747 >>> mbox cmd response: success
2,166,747 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,229,601 UART:
2,229,617 UART: Running Caliptra FMC ...
2,230,025 UART:
2,230,168 UART: [state] CFI Enabled
2,241,227 UART: [fht] FMC Alias Private Key: 7
2,349,164 UART: [art] Extend RT PCRs Done
2,349,592 UART: [art] Lock RT PCRs Done
2,350,758 UART: [art] Populate DV Done
2,358,819 UART: [fht] FMC Alias Private Key: 7
2,359,945 UART: [art] Derive CDI
2,360,225 UART: [art] Store in in slot 0x4
2,446,272 UART: [art] Derive Key Pair
2,446,632 UART: [art] Store priv key in slot 0x5
2,460,090 UART: [art] Derive Key Pair - Done
2,475,068 UART: [art] Signing Cert with AUTHO
2,475,548 UART: RITY.KEYID = 7
2,490,188 UART: [art] Erasing AUTHORITY.KEYID = 7
2,490,953 UART: [art] PUB.X = AF63D3070D0CD91D9F818A6327F0C49483684F5D39F26A66E78B3BCB74488CB1129E995C6743352E176F31FE0F5ADBA3
2,497,715 UART: [art] PUB.Y = 1339003CBD2BA78187CF241062423B1B194A42AEC3A421F3C07A9A5713CF6F1E85CA0E22EDE510087DEDB60FA317BD4A
2,504,646 UART: [art] SIG.R = C8F3216A9465CB14587C4C471AA3FF468037633E6E8D3961A9DB0EE916573E67A33DC1411DFBA80879A80852B3B3525B
2,511,407 UART: [art] SIG.S = E214F85E5C3C57CD45E66917B930CB13FE0A3CFDEC1A8BC84E33D2E4FC7F7EF4FE6DA0CD3F9322201537E02A8A46DC6B
2,535,283 UART: mbox::rt_entry...
2,535,655 UART: ____ _ _ _ ____ _____
2,536,439 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,537,239 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,538,007 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,538,775 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,539,543 UART: |_|
2,539,855 UART:
2,646,644 UART: [rt] Runtime listening for mailbox commands...
2,651,612 >>> mbox cmd response data (3272 bytes)
2,651,613 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,674,699 >>> mbox cmd response data (0 bytes)
2,674,700 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,111,227 >>> mbox cmd response: success
5,124,749 UART:
5,124,765 UART: Running Caliptra FMC ...
5,125,173 UART:
5,125,316 UART: [state] CFI Enabled
5,214,427 UART: [art] Extend RT PCRs Done
5,214,855 UART: [art] Lock RT PCRs Done
5,216,184 UART: [art] Populate DV Done
5,224,413 UART: [fht] FMC Alias Private Key: 7
5,225,559 UART: [art] Derive CDI
5,225,839 UART: [art] Store in in slot 0x4
5,311,998 UART: [art] Derive Key Pair
5,312,358 UART: [art] Store priv key in slot 0x5
5,325,310 UART: [art] Derive Key Pair - Done
5,340,055 UART: [art] Signing Cert with AUTHO
5,340,535 UART: RITY.KEYID = 7
5,355,727 UART: [art] Erasing AUTHORITY.KEYID = 7
5,356,492 UART: [art] PUB.X = 8B65A03C4BF0C1F9D2D427694B72387353B0919DFB584C90298F98488C8E77A0225FB0FA752EB5356EF0C0FB626C0919
5,363,259 UART: [art] PUB.Y = AA351530D0BCF4FEBD9062EDCBAD6E5DCF48301B8D2FB3DD132CFF8B3460453DD17C0E84A62EBCE0BE12576DEAFDF9D5
5,370,240 UART: [art] SIG.R = 754A1EB6602302E220681890BE669D98A36654D4609C58B485F031F2AE5D4595654544F7B7E9F0A59728629FD4DA1884
5,376,995 UART: [art] SIG.S = 924FB2CDD7CD8837FC13BE1333890E766C2D8048945DD54C9A790D0B9257A93C9A4DFC3492EDCB2E1C901109C1F3096E
5,400,865 UART: Caliptra RT
5,401,210 UART: [state] CFI Enabled
5,690,151 UART: Disable attest DPE used context limit breach
5,690,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,692,220 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,722,926 UART: [rt]cmd =0x494e464f, len=4
5,726,721 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,496 UART: [state] LifecycleState = Unprovisioned
86,151 UART: [state] DebugLocked = No
86,805 UART: [state] WD Timer not started. Device not locked for debugging
88,068 UART: [kat] SHA2-256
891,618 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,747 UART: [kat] ++
895,899 UART: [kat] sha1
900,063 UART: [kat] SHA2-256
902,003 UART: [kat] SHA2-384
904,666 UART: [kat] SHA2-512-ACC
906,567 UART: [kat] ECC-384
916,300 UART: [kat] HMAC-384Kdf
920,930 UART: [kat] LMS
1,169,242 UART: [kat] --
1,170,181 UART: [cold-reset] ++
1,170,549 UART: [fht] FHT @ 0x50003400
1,173,343 UART: [idev] ++
1,173,511 UART: [idev] CDI.KEYID = 6
1,173,872 UART: [idev] SUBJECT.KEYID = 7
1,174,297 UART: [idev] UDS.KEYID = 0
1,174,643 ready_for_fw is high
1,174,643 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,539 UART: [idev] Erasing UDS.KEYID = 0
1,200,103 UART: [idev] Sha1 KeyId Algorithm
1,209,007 UART: [idev] --
1,210,172 UART: [ldev] ++
1,210,340 UART: [ldev] CDI.KEYID = 6
1,210,704 UART: [ldev] SUBJECT.KEYID = 5
1,211,131 UART: [ldev] AUTHORITY.KEYID = 7
1,211,594 UART: [ldev] FE.KEYID = 1
1,216,570 UART: [ldev] Erasing FE.KEYID = 1
1,243,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,684 UART: [ldev] --
1,282,032 UART: [fwproc] Wait for Commands...
1,282,771 UART: [fwproc] Recv command 0x46574c44
1,283,504 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,074 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,202 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,511 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,827 >>> mbox cmd response: success
2,312,827 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,313,972 UART: [afmc] ++
2,314,140 UART: [afmc] CDI.KEYID = 6
2,314,503 UART: [afmc] SUBJECT.KEYID = 7
2,314,929 UART: [afmc] AUTHORITY.KEYID = 5
2,350,302 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,788 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,539 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,268 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,151 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,870 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,811 UART: [afmc] --
2,393,847 UART: [cold-reset] --
2,394,541 UART: [state] Locking Datavault
2,395,518 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,122 UART: [state] Locking ICCM
2,396,704 UART: [exit] Launching FMC @ 0x40000130
2,402,033 UART:
2,402,049 UART: Running Caliptra FMC ...
2,402,457 UART:
2,402,511 UART: [state] CFI Enabled
2,413,070 UART: [fht] FMC Alias Private Key: 7
2,521,305 UART: [art] Extend RT PCRs Done
2,521,733 UART: [art] Lock RT PCRs Done
2,523,287 UART: [art] Populate DV Done
2,531,530 UART: [fht] FMC Alias Private Key: 7
2,532,690 UART: [art] Derive CDI
2,532,970 UART: [art] Store in in slot 0x4
2,618,357 UART: [art] Derive Key Pair
2,618,717 UART: [art] Store priv key in slot 0x5
2,631,289 UART: [art] Derive Key Pair - Done
2,645,860 UART: [art] Signing Cert with AUTHO
2,646,340 UART: RITY.KEYID = 7
2,661,722 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,487 UART: [art] PUB.X = 6DA53802284EE4E2EB8EA8B0074F2B833C2BA923129698F532EF359EAB41A5ECFDE9CB969F595AEEC9B6328A63795851
2,669,261 UART: [art] PUB.Y = 01B0B2226C25E45CD3615B73D5D3F72E5E0F7C4B49492BF7B9D0D44D61E05B723FBE6D2A80BEA62E3CCF0E8F0AA94AB3
2,676,219 UART: [art] SIG.R = E1AEC03A415B82CBE3F14031EFD4CC7146E878B4D774A9F729E6075802522DF5B0C51DF4CC46553B1A0C99DAC74E197D
2,682,992 UART: [art] SIG.S = E195BFC64B28F96A8B39954BC645E94FAFCC199331B65E0BEBBDE1412BAA22048AAEB7F71402FF618670D8B65FF2FC09
2,706,579 UART: mbox::rt_entry...
2,706,951 UART: ____ _ _ _ ____ _____
2,707,735 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,535 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,303 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,071 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,839 UART: |_|
2,711,151 UART:
2,818,180 UART: [rt] Runtime listening for mailbox commands...
2,823,148 >>> mbox cmd response data (3272 bytes)
2,823,149 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,846,235 >>> mbox cmd response data (0 bytes)
2,846,236 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,846,353 UART:
2,846,369 UART: Running Caliptra ROM ...
2,846,777 UART:
2,846,832 UART: [state] CFI Enabled
2,849,346 UART: [state] LifecycleState = Unprovisioned
2,850,001 UART: [state] DebugLocked = No
2,850,659 UART: [state] WD Timer not started. Device not locked for debugging
2,851,881 UART: [kat] SHA2-256
3,655,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,659,560 UART: [kat] ++
3,659,712 UART: [kat] sha1
3,663,788 UART: [kat] SHA2-256
3,665,728 UART: [kat] SHA2-384
3,668,407 UART: [kat] SHA2-512-ACC
3,670,307 UART: [kat] ECC-384
3,680,232 UART: [kat] HMAC-384Kdf
3,684,662 UART: [kat] LMS
3,932,974 UART: [kat] --
3,933,724 UART: [update-reset] ++
5,246,093 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,247,184 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,397,008 >>> mbox cmd response: success
5,397,237 UART: [update-reset] Copying MAN_2 To MAN_1
5,405,251 UART: [update-reset Success] --
5,406,206 UART: [state] Locking Datavault
5,407,042 UART: [state] Locking PCR0, PCR1 and PCR31
5,407,646 UART: [state] Locking ICCM
5,408,304 UART: [exit] Launching FMC @ 0x40000130
5,413,633 UART:
5,413,649 UART: Running Caliptra FMC ...
5,414,057 UART:
5,414,111 UART: [state] CFI Enabled
5,502,690 UART: [art] Extend RT PCRs Done
5,503,118 UART: [art] Lock RT PCRs Done
5,504,283 UART: [art] Populate DV Done
5,512,730 UART: [fht] FMC Alias Private Key: 7
5,513,762 UART: [art] Derive CDI
5,514,042 UART: [art] Store in in slot 0x4
5,599,275 UART: [art] Derive Key Pair
5,599,635 UART: [art] Store priv key in slot 0x5
5,612,725 UART: [art] Derive Key Pair - Done
5,627,723 UART: [art] Signing Cert with AUTHO
5,628,203 UART: RITY.KEYID = 7
5,643,589 UART: [art] Erasing AUTHORITY.KEYID = 7
5,644,354 UART: [art] PUB.X = 8DBA974EB99F169E0EA0DC55377C075355ADCE97C09BB99E8775EE4875642E577B663995647D630B403A2E2663AE91BD
5,651,117 UART: [art] PUB.Y = 9CBFCED34BA543B5241EC7BE14D708D6BF13A697D75C2D25C4EB5C64FA150830D292763917F5C88351B7836B71C9191F
5,658,067 UART: [art] SIG.R = 32C187D64E35572D98B5E2D62FDB0914D5E7582D7DB7D0E2F403E5E9F5F6EA7F628CDF34E02A36B49B4C0EFE12E7591C
5,664,842 UART: [art] SIG.S = AF06DBF59BE8A4E47F8FA9D885874CEA8F94BAA6A37D7654926FB67E7C5F7BAF46764B4AA13419ED77A0662E51B77B1B
5,689,016 UART: Caliptra RT
5,689,269 UART: [state] CFI Enabled
5,981,584 UART: Disable attest DPE used context limit breach
5,982,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,983,593 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,014,307 UART: [rt]cmd =0x494e464f, len=4
6,017,930 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,228 ready_for_fw is high
1,056,228 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,161,235 >>> mbox cmd response: success
2,161,235 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,222,905 UART:
2,222,921 UART: Running Caliptra FMC ...
2,223,329 UART:
2,223,383 UART: [state] CFI Enabled
2,233,548 UART: [fht] FMC Alias Private Key: 7
2,341,395 UART: [art] Extend RT PCRs Done
2,341,823 UART: [art] Lock RT PCRs Done
2,343,407 UART: [art] Populate DV Done
2,351,568 UART: [fht] FMC Alias Private Key: 7
2,352,580 UART: [art] Derive CDI
2,352,860 UART: [art] Store in in slot 0x4
2,438,383 UART: [art] Derive Key Pair
2,438,743 UART: [art] Store priv key in slot 0x5
2,451,965 UART: [art] Derive Key Pair - Done
2,466,667 UART: [art] Signing Cert with AUTHO
2,467,147 UART: RITY.KEYID = 7
2,481,841 UART: [art] Erasing AUTHORITY.KEYID = 7
2,482,606 UART: [art] PUB.X = 3E31BCC56971B7FF0A2557DBF0DD23F0E3A244742E2AC4CF84159176FB7044A93F81A4052E3294C47EE71A81D45C4525
2,489,374 UART: [art] PUB.Y = 59D66F5E22405BBA5C7BAD14FB3C0874460F4EE41183D5B0048AB915D963C8596C7207774DAF006704757AD15BC42BAB
2,496,291 UART: [art] SIG.R = 2795EA8F1C444C8E493287796E793231162292E3C12A3EA65FED08B1A34B022CC18345D5968756F50CAFF32ED75D4939
2,503,048 UART: [art] SIG.S = F5590C4ABFCEB205C94DE93CAA5AF027C5DFA99EB8F89D3A048E4957D09D7A1D25012F5D3C283168AD31504B93F3CC09
2,526,656 UART: mbox::rt_entry...
2,527,028 UART: ____ _ _ _ ____ _____
2,527,812 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,528,612 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,529,380 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,530,148 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,530,916 UART: |_|
2,531,228 UART:
2,637,762 UART: [rt] Runtime listening for mailbox commands...
2,642,730 >>> mbox cmd response data (3272 bytes)
2,642,731 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,665,817 >>> mbox cmd response data (0 bytes)
2,665,818 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,098,885 >>> mbox cmd response: success
5,111,677 UART:
5,111,693 UART: Running Caliptra FMC ...
5,112,101 UART:
5,112,155 UART: [state] CFI Enabled
5,200,994 UART: [art] Extend RT PCRs Done
5,201,422 UART: [art] Lock RT PCRs Done
5,202,707 UART: [art] Populate DV Done
5,210,924 UART: [fht] FMC Alias Private Key: 7
5,211,928 UART: [art] Derive CDI
5,212,208 UART: [art] Store in in slot 0x4
5,297,789 UART: [art] Derive Key Pair
5,298,149 UART: [art] Store priv key in slot 0x5
5,311,361 UART: [art] Derive Key Pair - Done
5,326,040 UART: [art] Signing Cert with AUTHO
5,326,520 UART: RITY.KEYID = 7
5,341,684 UART: [art] Erasing AUTHORITY.KEYID = 7
5,342,449 UART: [art] PUB.X = 81D3298979DE6B54CCCAC220E56B6DEDCCDAE19BC9F60DFA0D4E029D1B89D039E3AFB30F4C86351A9AE9747B12B910ED
5,349,231 UART: [art] PUB.Y = 39C5838F93EEE1A385C40EFA525C6C355F38C0AD4C4BC1AE809A854EFD52E672668F9A9B52824A708A28D2745A8975B8
5,356,184 UART: [art] SIG.R = ADEFF316049E28116178002289D8F84EAABA9A8BC3F7362E86C952CD6E9FE71CE1C98740480621098142D31BF03EEF8F
5,362,929 UART: [art] SIG.S = EB427E7792F75870F1BEA73193C72593D7A6A55A06255DF133816933ADFAA60B8C9433EA8C1BE4668654F2222395BCE5
5,386,682 UART: Caliptra RT
5,386,935 UART: [state] CFI Enabled
5,676,607 UART: Disable attest DPE used context limit breach
5,677,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,678,748 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,709,254 UART: [rt]cmd =0x494e464f, len=4
5,713,135 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
891,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,614 UART: [kat] ++
895,766 UART: [kat] sha1
899,988 UART: [kat] SHA2-256
901,928 UART: [kat] SHA2-384
904,769 UART: [kat] SHA2-512-ACC
906,670 UART: [kat] ECC-384
916,589 UART: [kat] HMAC-384Kdf
921,267 UART: [kat] LMS
1,169,579 UART: [kat] --
1,170,394 UART: [cold-reset] ++
1,170,814 UART: [fht] FHT @ 0x50003400
1,173,594 UART: [idev] ++
1,173,762 UART: [idev] CDI.KEYID = 6
1,174,123 UART: [idev] SUBJECT.KEYID = 7
1,174,548 UART: [idev] UDS.KEYID = 0
1,174,894 ready_for_fw is high
1,174,894 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,360 UART: [idev] Erasing UDS.KEYID = 0
1,199,612 UART: [idev] Sha1 KeyId Algorithm
1,208,528 UART: [idev] --
1,209,617 UART: [ldev] ++
1,209,785 UART: [ldev] CDI.KEYID = 6
1,210,149 UART: [ldev] SUBJECT.KEYID = 5
1,210,576 UART: [ldev] AUTHORITY.KEYID = 7
1,211,039 UART: [ldev] FE.KEYID = 1
1,216,367 UART: [ldev] Erasing FE.KEYID = 1
1,242,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,509 UART: [ldev] --
1,281,805 UART: [fwproc] Wait for Commands...
1,282,616 UART: [fwproc] Recv command 0x46574c44
1,283,349 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,333 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,642 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,082 >>> mbox cmd response: success
2,313,082 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,314,325 UART: [afmc] ++
2,314,493 UART: [afmc] CDI.KEYID = 6
2,314,856 UART: [afmc] SUBJECT.KEYID = 7
2,315,282 UART: [afmc] AUTHORITY.KEYID = 5
2,350,761 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,871 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,622 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,351 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,234 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,953 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,664 UART: [afmc] --
2,393,650 UART: [cold-reset] --
2,394,526 UART: [state] Locking Datavault
2,395,721 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,325 UART: [state] Locking ICCM
2,396,911 UART: [exit] Launching FMC @ 0x40000130
2,402,240 UART:
2,402,256 UART: Running Caliptra FMC ...
2,402,664 UART:
2,402,807 UART: [state] CFI Enabled
2,413,586 UART: [fht] FMC Alias Private Key: 7
2,521,597 UART: [art] Extend RT PCRs Done
2,522,025 UART: [art] Lock RT PCRs Done
2,523,281 UART: [art] Populate DV Done
2,531,484 UART: [fht] FMC Alias Private Key: 7
2,532,494 UART: [art] Derive CDI
2,532,774 UART: [art] Store in in slot 0x4
2,618,659 UART: [art] Derive Key Pair
2,619,019 UART: [art] Store priv key in slot 0x5
2,632,567 UART: [art] Derive Key Pair - Done
2,647,358 UART: [art] Signing Cert with AUTHO
2,647,838 UART: RITY.KEYID = 7
2,663,562 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,327 UART: [art] PUB.X = 46DCFFC7C2D348F229B615EFD87EFDCF2C52188F085D3F09AF4C5A010AAE4CEDEEF38757C1EF59B63C3065E565DD9999
2,671,107 UART: [art] PUB.Y = CBC5F022A4ECF0DBA620368FFA953D912ED1D3A68567165AC879FC93A56D30484B87B532873CBF39DC6DB5C9FCFCF7E1
2,678,077 UART: [art] SIG.R = 3898D428263BB3901569F1290548D18CFCDFE57ED45EE738246541551C28CAE9ADD7FE5FCC96664B0DC1891721E54A2D
2,684,845 UART: [art] SIG.S = A2B10F61D57D30AF4DE464BEDD1D5946DC888D1874945C8C21BAB3F62DD9411465283D867F9FDEA3073DC5D6CB61540A
2,708,559 UART: mbox::rt_entry...
2,708,931 UART: ____ _ _ _ ____ _____
2,709,715 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,515 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,283 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,051 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,819 UART: |_|
2,713,131 UART:
2,820,235 UART: [rt] Runtime listening for mailbox commands...
2,825,203 >>> mbox cmd response data (3272 bytes)
2,825,204 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,848,290 >>> mbox cmd response data (0 bytes)
2,848,291 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,848,408 UART:
2,848,424 UART: Running Caliptra ROM ...
2,848,832 UART:
2,848,974 UART: [state] CFI Enabled
2,851,506 UART: [state] LifecycleState = Unprovisioned
2,852,161 UART: [state] DebugLocked = No
2,852,737 UART: [state] WD Timer not started. Device not locked for debugging
2,853,843 UART: [kat] SHA2-256
3,657,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,661,522 UART: [kat] ++
3,661,674 UART: [kat] sha1
3,665,896 UART: [kat] SHA2-256
3,667,836 UART: [kat] SHA2-384
3,670,767 UART: [kat] SHA2-512-ACC
3,672,667 UART: [kat] ECC-384
3,682,452 UART: [kat] HMAC-384Kdf
3,687,108 UART: [kat] LMS
3,935,420 UART: [kat] --
3,936,088 UART: [update-reset] ++
5,247,993 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,249,048 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
5,398,872 >>> mbox cmd response: success
5,399,029 UART: [update-reset] Copying MAN_2 To MAN_1
5,407,043 UART: [update-reset Success] --
5,407,984 UART: [state] Locking Datavault
5,408,722 UART: [state] Locking PCR0, PCR1 and PCR31
5,409,326 UART: [state] Locking ICCM
5,409,774 UART: [exit] Launching FMC @ 0x40000130
5,415,103 UART:
5,415,119 UART: Running Caliptra FMC ...
5,415,527 UART:
5,415,670 UART: [state] CFI Enabled
5,504,687 UART: [art] Extend RT PCRs Done
5,505,115 UART: [art] Lock RT PCRs Done
5,506,262 UART: [art] Populate DV Done
5,514,413 UART: [fht] FMC Alias Private Key: 7
5,515,551 UART: [art] Derive CDI
5,515,831 UART: [art] Store in in slot 0x4
5,601,356 UART: [art] Derive Key Pair
5,601,716 UART: [art] Store priv key in slot 0x5
5,615,362 UART: [art] Derive Key Pair - Done
5,630,137 UART: [art] Signing Cert with AUTHO
5,630,617 UART: RITY.KEYID = 7
5,646,023 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,788 UART: [art] PUB.X = 8E01970429DCBFC95E6ADB9D68EA2E3E0D187C067D4B475FDEB2BB07DBE6C9596AB7D4778D9F0AC7AD31F2412D47E5AF
5,653,564 UART: [art] PUB.Y = 2A18D613E4330B78AF85FB7B41B032E2B22133BDC8680537652B9ADF930D9BDF066A8E60CCDDB48A03CC014F43C2714E
5,660,506 UART: [art] SIG.R = E3131245929C0E60A485BFE042FF8C89F267F998C95F0703E19923C0906693892AA6D5C7041A304BD58DD37B2B19312E
5,667,258 UART: [art] SIG.S = 290A02414CC8FE11E7CE5BEF5709205A8A94FF2EF4F160DD675583A9C688B8F48CC8E2020E873CACA048EAA4F0DD4EBD
5,691,120 UART: Caliptra RT
5,691,465 UART: [state] CFI Enabled
5,985,908 UART: Disable attest DPE used context limit breach
5,986,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,988,011 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,018,809 UART: [rt]cmd =0x494e464f, len=4
6,022,542 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,841 ready_for_fw is high
1,055,841 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,162,110 >>> mbox cmd response: success
2,162,110 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,224,240 UART:
2,224,256 UART: Running Caliptra FMC ...
2,224,664 UART:
2,224,807 UART: [state] CFI Enabled
2,235,568 UART: [fht] FMC Alias Private Key: 7
2,343,589 UART: [art] Extend RT PCRs Done
2,344,017 UART: [art] Lock RT PCRs Done
2,345,659 UART: [art] Populate DV Done
2,353,884 UART: [fht] FMC Alias Private Key: 7
2,354,816 UART: [art] Derive CDI
2,355,096 UART: [art] Store in in slot 0x4
2,440,661 UART: [art] Derive Key Pair
2,441,021 UART: [art] Store priv key in slot 0x5
2,454,195 UART: [art] Derive Key Pair - Done
2,468,859 UART: [art] Signing Cert with AUTHO
2,469,339 UART: RITY.KEYID = 7
2,484,761 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,526 UART: [art] PUB.X = A96A5DAAB5F74C44E22C7D71C63C7350EA8FB32A15FFE42F196C17D2FA199F2568324146CE58D15C4C07F87453150275
2,492,294 UART: [art] PUB.Y = C3A34494BCAB0FFFF2F5A1B53E7738F2F222F2F6372897879AC222D0ED56F01E9F940CC864001318D103F71B98A63FCF
2,499,221 UART: [art] SIG.R = 701AFE1D94CB4EE247330C10C72CEF718DA22DB91B67FF6186565CEDAF44543B5103961F0981334098C8DF62C754B930
2,505,984 UART: [art] SIG.S = B2739486DDFEA142DAAD12829405567D5F74E0C5DFD889BA8A672A3B1A45474C5300ECB3B988072C552D630C89EA1163
2,529,590 UART: mbox::rt_entry...
2,529,962 UART: ____ _ _ _ ____ _____
2,530,746 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,546 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,314 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,082 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,850 UART: |_|
2,534,162 UART:
2,641,248 UART: [rt] Runtime listening for mailbox commands...
2,646,216 >>> mbox cmd response data (3272 bytes)
2,646,217 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,669,303 >>> mbox cmd response data (0 bytes)
2,669,304 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,103,760 >>> mbox cmd response: success
5,117,120 UART:
5,117,136 UART: Running Caliptra FMC ...
5,117,544 UART:
5,117,687 UART: [state] CFI Enabled
5,206,570 UART: [art] Extend RT PCRs Done
5,206,998 UART: [art] Lock RT PCRs Done
5,208,223 UART: [art] Populate DV Done
5,216,584 UART: [fht] FMC Alias Private Key: 7
5,217,628 UART: [art] Derive CDI
5,217,908 UART: [art] Store in in slot 0x4
5,303,721 UART: [art] Derive Key Pair
5,304,081 UART: [art] Store priv key in slot 0x5
5,317,695 UART: [art] Derive Key Pair - Done
5,332,281 UART: [art] Signing Cert with AUTHO
5,332,761 UART: RITY.KEYID = 7
5,347,649 UART: [art] Erasing AUTHORITY.KEYID = 7
5,348,414 UART: [art] PUB.X = 73D3B75B625F0CF4BD88E1FA310392F918935BB3B982207C11FE0BCB150B1AA573658904A750E4E07E3A93E27CF0C5AD
5,355,177 UART: [art] PUB.Y = CFFFF8DEE01FD073BC008BF558513F5F8E3285420D5E40C8ECC3960F35B4FC80700CA6D1DCEC1AF193B67F8BEA058079
5,362,113 UART: [art] SIG.R = 1C2AAE821DE11887178C4114B1FE6F69E2C4EE6779135F833C2B04BF5EE76EEC38CFBAE778ECCC5756E84DA98E824953
5,368,894 UART: [art] SIG.S = 2B78C9AC955C80A26B4C73A44A5D55B8D1083BD653BD6575232ED134667698F4089C65804FEC90FCB764FD539D7CEDE7
5,393,045 UART: Caliptra RT
5,393,390 UART: [state] CFI Enabled
5,685,087 UART: Disable attest DPE used context limit breach
5,685,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,687,112 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,717,284 UART: [rt]cmd =0x494e464f, len=4
5,720,929 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Unprovisioned
85,515 UART: [state] DebugLocked = No
86,041 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,747 UART: [kat] SHA2-256
881,678 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,793 UART: [kat] ++
885,945 UART: [kat] sha1
889,987 UART: [kat] SHA2-256
891,925 UART: [kat] SHA2-384
894,840 UART: [kat] SHA2-512-ACC
896,741 UART: [kat] ECC-384
902,242 UART: [kat] HMAC-384Kdf
906,984 UART: [kat] LMS
1,475,180 UART: [kat] --
1,476,059 UART: [cold-reset] ++
1,476,481 UART: [fht] Storing FHT @ 0x50003400
1,479,134 UART: [idev] ++
1,479,302 UART: [idev] CDI.KEYID = 6
1,479,662 UART: [idev] SUBJECT.KEYID = 7
1,480,086 UART: [idev] UDS.KEYID = 0
1,480,431 ready_for_fw is high
1,480,431 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,892 UART: [idev] Erasing UDS.KEYID = 0
1,504,110 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,924 UART: [idev] --
1,514,023 UART: [ldev] ++
1,514,191 UART: [ldev] CDI.KEYID = 6
1,514,554 UART: [ldev] SUBJECT.KEYID = 5
1,514,980 UART: [ldev] AUTHORITY.KEYID = 7
1,515,443 UART: [ldev] FE.KEYID = 1
1,520,749 UART: [ldev] Erasing FE.KEYID = 1
1,545,794 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,686 UART: [ldev] --
1,585,087 UART: [fwproc] Waiting for Commands...
1,585,704 UART: [fwproc] Received command 0x46574c44
1,586,495 UART: [fwproc] Received Image of size 114332 bytes
2,884,346 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,606 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,958 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,945 >>> mbox cmd response: success
3,078,109 UART: [afmc] ++
3,078,277 UART: [afmc] CDI.KEYID = 6
3,078,639 UART: [afmc] SUBJECT.KEYID = 7
3,079,064 UART: [afmc] AUTHORITY.KEYID = 5
3,114,145 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,455 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,235 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,963 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,848 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,538 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,455 UART: [afmc] --
3,157,579 UART: [cold-reset] --
3,158,559 UART: [state] Locking Datavault
3,159,550 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,154 UART: [state] Locking ICCM
3,160,624 UART: [exit] Launching FMC @ 0x40000130
3,165,953 UART:
3,165,969 UART: Running Caliptra FMC ...
3,166,377 UART:
3,166,431 UART: [state] CFI Enabled
3,176,848 UART: [fht] FMC Alias Private Key: 7
3,285,625 UART: [art] Extend RT PCRs Done
3,286,053 UART: [art] Lock RT PCRs Done
3,287,455 UART: [art] Populate DV Done
3,295,738 UART: [fht] FMC Alias Private Key: 7
3,296,698 UART: [art] Derive CDI
3,296,978 UART: [art] Store in in slot 0x4
3,382,671 UART: [art] Derive Key Pair
3,383,031 UART: [art] Store priv key in slot 0x5
3,395,399 UART: [art] Derive Key Pair - Done
3,410,590 UART: [art] Signing Cert with AUTHO
3,411,070 UART: RITY.KEYID = 7
3,426,570 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,335 UART: [art] PUB.X = 3665E07A95486112371E4D22A18D39E74190376C33B3EC9EE59F8A214A72586B5501C1B364C562247020521327BAB81F
3,434,088 UART: [art] PUB.Y = 121C56E564EC1C16F2ED1230718ABAECA4CEDDE5F03E4447285982FF50652A55E4894A4239E13B0CD4E80E4C22626ABA
3,441,042 UART: [art] SIG.R = ED9219D6CE4882E6C30205CF76309E79606C83628E112DD674AEFC2DC539D0F414E51AAB91771497DC4DE94EBEAABA7E
3,447,820 UART: [art] SIG.S = 130A9B2DC17DF5BE823ECAE0FDADF3D6DAD8EA339081F88F119CD40206934174CB02C4F0113C1B62D02839ACAC7AC269
3,471,721 UART: Caliptra RT
3,471,974 UART: [state] CFI Enabled
3,580,619 UART: [rt] RT listening for mailbox commands...
3,581,289 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,391 UART: [rt]cmd =0x50435252, len=8
3,613,037 >>> mbox cmd response data (8 bytes)
3,613,038 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,876 UART:
3,613,892 UART: Running Caliptra ROM ...
3,614,300 UART:
3,614,354 UART: [state] CFI Enabled
3,617,052 UART: [state] LifecycleState = Unprovisioned
3,617,707 UART: [state] DebugLocked = No
3,618,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,619,934 UART: [kat] SHA2-256
4,413,865 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,417,980 UART: [kat] ++
4,418,132 UART: [kat] sha1
4,422,404 UART: [kat] SHA2-256
4,424,342 UART: [kat] SHA2-384
4,427,043 UART: [kat] SHA2-512-ACC
4,428,943 UART: [kat] ECC-384
4,434,826 UART: [kat] HMAC-384Kdf
4,439,484 UART: [kat] LMS
5,007,680 UART: [kat] --
5,008,571 UART: [update-reset] ++
5,936,257 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,937,363 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,033,797 >>> mbox cmd response: success
6,033,797 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,034,044 UART: [update-reset] Copying MAN_2 To MAN_1
6,042,058 UART: [update-reset Success] --
6,043,189 UART: [state] Locking Datavault
6,044,083 UART: [state] Locking PCR0, PCR1 and PCR31
6,044,687 UART: [state] Locking ICCM
6,045,343 UART: [exit] Launching FMC @ 0x40000130
6,050,672 UART:
6,050,688 UART: Running Caliptra FMC ...
6,051,096 UART:
6,051,150 UART: [state] CFI Enabled
6,140,055 UART: [art] Extend RT PCRs Done
6,140,483 UART: [art] Lock RT PCRs Done
6,141,728 UART: [art] Populate DV Done
6,150,057 UART: [fht] FMC Alias Private Key: 7
6,151,173 UART: [art] Derive CDI
6,151,453 UART: [art] Store in in slot 0x4
6,236,994 UART: [art] Derive Key Pair
6,237,354 UART: [art] Store priv key in slot 0x5
6,250,878 UART: [art] Derive Key Pair - Done
6,265,696 UART: [art] Signing Cert with AUTHO
6,266,176 UART: RITY.KEYID = 7
6,280,918 UART: [art] Erasing AUTHORITY.KEYID = 7
6,281,683 UART: [art] PUB.X = 48F4DFE5FB21C60417BC92BAD74A4CB1DAAFC7B4E92C6D837F8F496A972BA3FB2E62D01FCC8806B73759CB9977E63870
6,288,465 UART: [art] PUB.Y = D7417C30418EFE9EB3F6FA93AABFF86BE6D624F5D7BD343887ADCD8B8C4045847272C9ED9BFD9FFA5180E5DBE45E3B87
6,295,439 UART: [art] SIG.R = 756B9915CDDC585A3F2D51B41A00EC043293401D99D7040683AF4F539499C594B25574CB81FC4EED80C432E09851A07B
6,302,176 UART: [art] SIG.S = 126E93C6FA6CD213F0F3E62F362860A1D240252A6158C848C1FF49397C5CE5CF84BC07261449BAA5A48F237D9BA25620
6,325,934 UART: mbox::rt_entry...
6,326,306 UART: ____ _ _ _ ____ _____
6,327,090 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,327,890 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,328,658 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,329,426 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,330,194 UART: |_|
6,330,506 UART:
6,611,163 UART: [rt] Runtime listening for mailbox commands...
6,612,210 >>> mbox cmd response data (128 bytes)
6,612,211 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
6,612,325 UART:
6,612,341 UART: Running Caliptra ROM ...
6,612,749 UART:
6,612,803 UART: [state] CFI Enabled
6,615,699 UART: [state] LifecycleState = Unprovisioned
6,616,354 UART: [state] DebugLocked = No
6,617,004 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,618,697 UART: [kat] SHA2-256
7,412,628 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,416,743 UART: [kat] ++
7,416,895 UART: [kat] sha1
7,421,141 UART: [kat] SHA2-256
7,423,079 UART: [kat] SHA2-384
7,425,794 UART: [kat] SHA2-512-ACC
7,427,694 UART: [kat] ECC-384
7,433,269 UART: [kat] HMAC-384Kdf
7,437,731 UART: [kat] LMS
8,005,927 UART: [kat] --
8,006,708 UART: [update-reset] ++
8,934,356 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,935,622 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,032,056 >>> mbox cmd response: success
9,032,056 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,032,251 UART: [update-reset] Copying MAN_2 To MAN_1
9,040,265 UART: [update-reset Success] --
9,041,372 UART: [state] Locking Datavault
9,042,364 UART: [state] Locking PCR0, PCR1 and PCR31
9,042,968 UART: [state] Locking ICCM
9,043,604 UART: [exit] Launching FMC @ 0x40000130
9,048,933 UART:
9,048,949 UART: Running Caliptra FMC ...
9,049,357 UART:
9,049,411 UART: [state] CFI Enabled
9,138,154 UART: [art] Extend RT PCRs Done
9,138,582 UART: [art] Lock RT PCRs Done
9,139,773 UART: [art] Populate DV Done
9,147,984 UART: [fht] FMC Alias Private Key: 7
9,149,120 UART: [art] Derive CDI
9,149,400 UART: [art] Store in in slot 0x4
9,235,617 UART: [art] Derive Key Pair
9,235,977 UART: [art] Store priv key in slot 0x5
9,248,693 UART: [art] Derive Key Pair - Done
9,263,151 UART: [art] Signing Cert with AUTHO
9,263,631 UART: RITY.KEYID = 7
9,278,995 UART: [art] Erasing AUTHORITY.KEYID = 7
9,279,760 UART: [art] PUB.X = 5F30E5C72EAE1155C7EB5B3E82A4838AA5286D2101C90F14A0C72060C07AFFA9D06701B533521B02C53BABFBAD2F87ED
9,286,532 UART: [art] PUB.Y = ECAC3AD6451207AAD970696E4E88A4A057DB659E4857E66DE50C72BE5D47B1BDF349C247529EDF5487B770F3CF6786C6
9,293,486 UART: [art] SIG.R = 14786715B3607F4E2BB8FAC1579A9C941023822B40CAF1CF97D114FA750C9A11F890FA2728A527B9A8B4688FD54D3F3D
9,300,257 UART: [art] SIG.S = 460ABBB65F1FB5DE960D21E6B8071D80E83D9FA915B767CE891C37ABFB110B31CC3B2E4C490F85DF9A2D1A5BE0EE5E9C
9,323,761 UART: mbox::rt_entry...
9,324,133 UART: ____ _ _ _ ____ _____
9,324,917 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,325,717 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,326,485 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,327,253 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,328,021 UART: |_|
9,328,333 UART:
9,611,110 UART: [rt] Runtime listening for mailbox commands...
9,612,157 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,025 ready_for_fw is high
1,362,025 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,330 >>> mbox cmd response: success
2,989,270 UART:
2,989,286 UART: Running Caliptra FMC ...
2,989,694 UART:
2,989,748 UART: [state] CFI Enabled
3,000,501 UART: [fht] FMC Alias Private Key: 7
3,108,194 UART: [art] Extend RT PCRs Done
3,108,622 UART: [art] Lock RT PCRs Done
3,110,358 UART: [art] Populate DV Done
3,118,425 UART: [fht] FMC Alias Private Key: 7
3,119,447 UART: [art] Derive CDI
3,119,727 UART: [art] Store in in slot 0x4
3,205,420 UART: [art] Derive Key Pair
3,205,780 UART: [art] Store priv key in slot 0x5
3,219,218 UART: [art] Derive Key Pair - Done
3,233,741 UART: [art] Signing Cert with AUTHO
3,234,221 UART: RITY.KEYID = 7
3,249,311 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,076 UART: [art] PUB.X = 9848045182432B72634B236148B9DB87A303ABC1D8024A04CB23E63D3A89E11CFC081942423817EDECDDE144AF61931E
3,256,829 UART: [art] PUB.Y = EF8A904D2C1EEF7938B3D32FEFA16EC18F65C0A86899CC775AB6890978D139A4B4C2D36079F6ADB916F2BFEF4C1D15AB
3,263,796 UART: [art] SIG.R = AB062CD8BC6E24F9A26C94776BE5F06E11ECF2316C329A05698996DEF3116438C94148C142AA8E97C7ADEBDFCF0F35F6
3,270,571 UART: [art] SIG.S = 5F2717FE06EF53CDCFD36C6161DEC37D885F3E77F5233165BC5966AA111B1C0845DBFD69298EECD64ABC3E273351B05D
3,294,580 UART: Caliptra RT
3,294,833 UART: [state] CFI Enabled
3,403,282 UART: [rt] RT listening for mailbox commands...
3,403,952 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,988 UART: [rt]cmd =0x50435252, len=8
3,435,518 >>> mbox cmd response data (8 bytes)
3,435,519 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,736,994 >>> mbox cmd response: success
5,736,994 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,750,329 UART:
5,750,345 UART: Running Caliptra FMC ...
5,750,753 UART:
5,750,807 UART: [state] CFI Enabled
5,840,052 UART: [art] Extend RT PCRs Done
5,840,480 UART: [art] Lock RT PCRs Done
5,841,749 UART: [art] Populate DV Done
5,850,010 UART: [fht] FMC Alias Private Key: 7
5,851,158 UART: [art] Derive CDI
5,851,438 UART: [art] Store in in slot 0x4
5,937,283 UART: [art] Derive Key Pair
5,937,643 UART: [art] Store priv key in slot 0x5
5,950,527 UART: [art] Derive Key Pair - Done
5,965,347 UART: [art] Signing Cert with AUTHO
5,965,827 UART: RITY.KEYID = 7
5,981,373 UART: [art] Erasing AUTHORITY.KEYID = 7
5,982,138 UART: [art] PUB.X = 0B0C18FF6F6445CF9D75E1D0FF53EAF8663EC8C6A45B4A22946C98DAFB46B7194689E481F2AFC542309E54314D301208
5,988,905 UART: [art] PUB.Y = 6FD29DD303436F75A0FE66D9D58214FBA5C88BB0A1559CAE4915D3DDE70D442BBF1F1B20C729B25C5BD918180085D927
5,995,837 UART: [art] SIG.R = CA4DA1271F2F58CEC965494B1CDEF0A8D8BFD0078A448357DE4BF06F44D899EB7C48B4A536CB0168F86A23CA866C7379
6,002,615 UART: [art] SIG.S = 5F849B7B3AD30C161E560199D853CC1FA037D1EAC92677E8970D7D71D8827D6E9CF61C415C12080961B7250BB1D9AE7C
6,026,220 UART: mbox::rt_entry...
6,026,592 UART: ____ _ _ _ ____ _____
6,027,376 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,028,176 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,028,944 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,029,712 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,030,480 UART: |_|
6,030,792 UART:
6,312,078 UART: [rt] Runtime listening for mailbox commands...
6,313,125 >>> mbox cmd response data (128 bytes)
6,313,126 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,613,825 >>> mbox cmd response: success
8,613,825 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,627,012 UART:
8,627,028 UART: Running Caliptra FMC ...
8,627,436 UART:
8,627,490 UART: [state] CFI Enabled
8,716,589 UART: [art] Extend RT PCRs Done
8,717,017 UART: [art] Lock RT PCRs Done
8,718,188 UART: [art] Populate DV Done
8,726,215 UART: [fht] FMC Alias Private Key: 7
8,727,391 UART: [art] Derive CDI
8,727,671 UART: [art] Store in in slot 0x4
8,813,016 UART: [art] Derive Key Pair
8,813,376 UART: [art] Store priv key in slot 0x5
8,826,594 UART: [art] Derive Key Pair - Done
8,841,411 UART: [art] Signing Cert with AUTHO
8,841,891 UART: RITY.KEYID = 7
8,857,333 UART: [art] Erasing AUTHORITY.KEYID = 7
8,858,098 UART: [art] PUB.X = 7E878C54D7513E814021971B37449E6F82E495B6D6C19BD76045649FB1C1D81EF6FA05ED38BA52724C3F1961D47031BC
8,864,863 UART: [art] PUB.Y = 4635476E5E776D0E9087017FBB78EDE37BD48442B0ACDE4C4F45C4D5EC48C8B1FDA0E970BDDF6CAABF14078AFA4C322E
8,871,828 UART: [art] SIG.R = DFDA3629150E4A0C969F5D3202C353727D82D7D16E419A421B8EC12EF7F0DAF3B3DDDE72EAEAF2763C89F7AF1EDFBAB8
8,878,615 UART: [art] SIG.S = 57DC84F3C967B8D2ABAAF39383D167FAC0829CD6D224441A70D0F36940BF941FE645010F2A71D78198F0857FF9809A4C
8,902,398 UART: mbox::rt_entry...
8,902,770 UART: ____ _ _ _ ____ _____
8,903,554 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,904,354 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,905,122 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,905,890 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,906,658 UART: |_|
8,906,970 UART:
9,187,522 UART: [rt] Runtime listening for mailbox commands...
9,188,569 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,508 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,040 UART: [kat] SHA2-256
881,971 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,086 UART: [kat] ++
886,238 UART: [kat] sha1
890,646 UART: [kat] SHA2-256
892,584 UART: [kat] SHA2-384
895,135 UART: [kat] SHA2-512-ACC
897,036 UART: [kat] ECC-384
902,675 UART: [kat] HMAC-384Kdf
907,401 UART: [kat] LMS
1,475,597 UART: [kat] --
1,476,758 UART: [cold-reset] ++
1,477,322 UART: [fht] Storing FHT @ 0x50003400
1,480,199 UART: [idev] ++
1,480,367 UART: [idev] CDI.KEYID = 6
1,480,727 UART: [idev] SUBJECT.KEYID = 7
1,481,151 UART: [idev] UDS.KEYID = 0
1,481,496 ready_for_fw is high
1,481,496 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,129 UART: [idev] Erasing UDS.KEYID = 0
1,506,151 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,769 UART: [idev] --
1,515,852 UART: [ldev] ++
1,516,020 UART: [ldev] CDI.KEYID = 6
1,516,383 UART: [ldev] SUBJECT.KEYID = 5
1,516,809 UART: [ldev] AUTHORITY.KEYID = 7
1,517,272 UART: [ldev] FE.KEYID = 1
1,522,732 UART: [ldev] Erasing FE.KEYID = 1
1,547,735 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,599 UART: [ldev] --
1,587,080 UART: [fwproc] Waiting for Commands...
1,587,749 UART: [fwproc] Received command 0x46574c44
1,588,540 UART: [fwproc] Received Image of size 114332 bytes
2,887,118 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,246 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,598 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,495 >>> mbox cmd response: success
3,080,745 UART: [afmc] ++
3,080,913 UART: [afmc] CDI.KEYID = 6
3,081,275 UART: [afmc] SUBJECT.KEYID = 7
3,081,700 UART: [afmc] AUTHORITY.KEYID = 5
3,116,795 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,991 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,771 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,499 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,384 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,074 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,885 UART: [afmc] --
3,159,889 UART: [cold-reset] --
3,160,755 UART: [state] Locking Datavault
3,162,136 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,740 UART: [state] Locking ICCM
3,163,334 UART: [exit] Launching FMC @ 0x40000130
3,168,663 UART:
3,168,679 UART: Running Caliptra FMC ...
3,169,087 UART:
3,169,230 UART: [state] CFI Enabled
3,180,205 UART: [fht] FMC Alias Private Key: 7
3,288,424 UART: [art] Extend RT PCRs Done
3,288,852 UART: [art] Lock RT PCRs Done
3,290,478 UART: [art] Populate DV Done
3,298,589 UART: [fht] FMC Alias Private Key: 7
3,299,591 UART: [art] Derive CDI
3,299,871 UART: [art] Store in in slot 0x4
3,385,472 UART: [art] Derive Key Pair
3,385,832 UART: [art] Store priv key in slot 0x5
3,399,772 UART: [art] Derive Key Pair - Done
3,414,434 UART: [art] Signing Cert with AUTHO
3,414,914 UART: RITY.KEYID = 7
3,430,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,009 UART: [art] PUB.X = 7EA53EA89F32C30C1F09C84E2F9E954091F49123CB5176A55C34DFDC2FB60F6A597FD534E1F93D59584B8937B3676B22
3,437,774 UART: [art] PUB.Y = 54CEEF97A9FB86B291A621254E37B918B3B157F74BF1E834C23C26702B3A0FAE7ECBB49248B055D1AFD0DF6F999DB8C1
3,444,737 UART: [art] SIG.R = B1C1C09E9F7E8CA5ACB638389EBB2FEFFFE128FE284FEC373DCF7908749339534108FEFD34386FEB125CF5DD29D41C51
3,451,521 UART: [art] SIG.S = E3363D8CEB9CE2202DD968B9A7E0FAAE1ECBC3B4C95832BCD42B0A2ACF94EBC33B420223002EE22C8DE7BEC799D1471C
3,475,370 UART: Caliptra RT
3,475,715 UART: [state] CFI Enabled
3,583,293 UART: [rt] RT listening for mailbox commands...
3,583,963 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,631 UART: [rt]cmd =0x50435252, len=8
3,615,175 >>> mbox cmd response data (8 bytes)
3,615,176 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,910 UART:
3,615,926 UART: Running Caliptra ROM ...
3,616,334 UART:
3,616,475 UART: [state] CFI Enabled
3,619,177 UART: [state] LifecycleState = Unprovisioned
3,619,832 UART: [state] DebugLocked = No
3,620,526 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,622,249 UART: [kat] SHA2-256
4,416,180 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,420,295 UART: [kat] ++
4,420,447 UART: [kat] sha1
4,424,671 UART: [kat] SHA2-256
4,426,609 UART: [kat] SHA2-384
4,429,330 UART: [kat] SHA2-512-ACC
4,431,230 UART: [kat] ECC-384
4,436,691 UART: [kat] HMAC-384Kdf
4,441,339 UART: [kat] LMS
5,009,535 UART: [kat] --
5,010,548 UART: [update-reset] ++
5,937,108 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,938,332 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,034,766 >>> mbox cmd response: success
6,034,766 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,034,901 UART: [update-reset] Copying MAN_2 To MAN_1
6,042,915 UART: [update-reset Success] --
6,043,880 UART: [state] Locking Datavault
6,044,604 UART: [state] Locking PCR0, PCR1 and PCR31
6,045,208 UART: [state] Locking ICCM
6,045,812 UART: [exit] Launching FMC @ 0x40000130
6,051,141 UART:
6,051,157 UART: Running Caliptra FMC ...
6,051,565 UART:
6,051,708 UART: [state] CFI Enabled
6,141,333 UART: [art] Extend RT PCRs Done
6,141,761 UART: [art] Lock RT PCRs Done
6,143,036 UART: [art] Populate DV Done
6,151,283 UART: [fht] FMC Alias Private Key: 7
6,152,315 UART: [art] Derive CDI
6,152,595 UART: [art] Store in in slot 0x4
6,238,420 UART: [art] Derive Key Pair
6,238,780 UART: [art] Store priv key in slot 0x5
6,252,266 UART: [art] Derive Key Pair - Done
6,266,592 UART: [art] Signing Cert with AUTHO
6,267,072 UART: RITY.KEYID = 7
6,281,866 UART: [art] Erasing AUTHORITY.KEYID = 7
6,282,631 UART: [art] PUB.X = 6C609DE549C3EC5F2E19400F882FA6DB0E22ED0A955461FD6734FE3A70BBDB22CDBCBA580C83668CF043E2850DD46721
6,289,400 UART: [art] PUB.Y = 3CDF93C3EB1C930C3487A5D74EA81853B934DB74713C2B5E726FE678967B07039DFD22C0FC8D8B8C8E9368139CAB24B0
6,296,349 UART: [art] SIG.R = 463DE2C3E220147A1E7881E2E14FA95F973BDF964A482F41F9D88819299972E9FDEA066FF7EFD41102C859DE969BA003
6,303,114 UART: [art] SIG.S = 525FBDBCC1890CD8325027BDCFE709E088EEFA164404B5A629595EC67FAEFACF2D709A4BD9DAC6D9B7DADBA7569FDAC2
6,327,032 UART: mbox::rt_entry...
6,327,404 UART: ____ _ _ _ ____ _____
6,328,188 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,328,988 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,329,756 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,330,524 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,331,292 UART: |_|
6,331,604 UART:
6,612,649 UART: [rt] Runtime listening for mailbox commands...
6,613,696 >>> mbox cmd response data (128 bytes)
6,613,697 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
6,613,811 UART:
6,613,827 UART: Running Caliptra ROM ...
6,614,235 UART:
6,614,376 UART: [state] CFI Enabled
6,617,020 UART: [state] LifecycleState = Unprovisioned
6,617,675 UART: [state] DebugLocked = No
6,618,349 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,619,926 UART: [kat] SHA2-256
7,413,857 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,417,972 UART: [kat] ++
7,418,124 UART: [kat] sha1
7,422,446 UART: [kat] SHA2-256
7,424,384 UART: [kat] SHA2-384
7,427,025 UART: [kat] SHA2-512-ACC
7,428,925 UART: [kat] ECC-384
7,434,604 UART: [kat] HMAC-384Kdf
7,439,310 UART: [kat] LMS
8,007,506 UART: [kat] --
8,008,373 UART: [update-reset] ++
8,934,713 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,935,931 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,032,365 >>> mbox cmd response: success
9,032,365 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,032,666 UART: [update-reset] Copying MAN_2 To MAN_1
9,040,680 UART: [update-reset Success] --
9,041,753 UART: [state] Locking Datavault
9,042,491 UART: [state] Locking PCR0, PCR1 and PCR31
9,043,095 UART: [state] Locking ICCM
9,043,679 UART: [exit] Launching FMC @ 0x40000130
9,049,008 UART:
9,049,024 UART: Running Caliptra FMC ...
9,049,432 UART:
9,049,575 UART: [state] CFI Enabled
9,138,344 UART: [art] Extend RT PCRs Done
9,138,772 UART: [art] Lock RT PCRs Done
9,140,029 UART: [art] Populate DV Done
9,148,194 UART: [fht] FMC Alias Private Key: 7
9,149,312 UART: [art] Derive CDI
9,149,592 UART: [art] Store in in slot 0x4
9,234,959 UART: [art] Derive Key Pair
9,235,319 UART: [art] Store priv key in slot 0x5
9,248,975 UART: [art] Derive Key Pair - Done
9,263,808 UART: [art] Signing Cert with AUTHO
9,264,288 UART: RITY.KEYID = 7
9,279,372 UART: [art] Erasing AUTHORITY.KEYID = 7
9,280,137 UART: [art] PUB.X = 8D6F3F6E541CCF9956C1B23D2CA37C4DB09C305CF38B4B9FDF653A04E4DFB7D916A2C560240D8C3EDFAE3663CD6A15D2
9,286,923 UART: [art] PUB.Y = 5635953060EED42D7D45B4D4ECB15E2FD65E12EB14FF11E43906AD253838B669E1C09DA26409D872CB8DB6A2FCC8566F
9,293,877 UART: [art] SIG.R = F5F1C8168360ED3C1556E2374C9EC18AFA7CB881EE296161BA36E43952E73986A638397852DBCD2E1E94450B677C7B71
9,300,644 UART: [art] SIG.S = 5205186A65748A30F9855436BA0E07C957C1B99DDD2AF764D2D85558C3E63FA5E4D785ECBFD3AE17C09CF740AEDF1D84
9,324,880 UART: mbox::rt_entry...
9,325,252 UART: ____ _ _ _ ____ _____
9,326,036 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,326,836 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,327,604 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,328,372 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,329,140 UART: |_|
9,329,452 UART:
9,610,416 UART: [rt] Runtime listening for mailbox commands...
9,611,463 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,190 ready_for_fw is high
1,363,190 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,257 >>> mbox cmd response: success
2,988,707 UART:
2,988,723 UART: Running Caliptra FMC ...
2,989,131 UART:
2,989,274 UART: [state] CFI Enabled
2,999,901 UART: [fht] FMC Alias Private Key: 7
3,108,244 UART: [art] Extend RT PCRs Done
3,108,672 UART: [art] Lock RT PCRs Done
3,110,350 UART: [art] Populate DV Done
3,118,441 UART: [fht] FMC Alias Private Key: 7
3,119,529 UART: [art] Derive CDI
3,119,809 UART: [art] Store in in slot 0x4
3,205,952 UART: [art] Derive Key Pair
3,206,312 UART: [art] Store priv key in slot 0x5
3,219,596 UART: [art] Derive Key Pair - Done
3,234,413 UART: [art] Signing Cert with AUTHO
3,234,893 UART: RITY.KEYID = 7
3,249,913 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,678 UART: [art] PUB.X = F45FE3744F79B321E90A17953F87131398BF87383B7000D9BF3D3A4DC5A638C28EB4178E26080B6AFE8A809E156C030A
3,257,411 UART: [art] PUB.Y = BC14D7F51CCDD6D2B923947F35CC6305604030DAB72E646D7AFA126E68D16C730348F924B8B9469891360348407E2CB0
3,264,350 UART: [art] SIG.R = 1E5189B7450C0511E0435FF15E0098C9254675147AC10D8C910B677D3FDAA6C67E60E9C8C86D2BB7A422AADFFFE3E861
3,271,094 UART: [art] SIG.S = D548C0D5EAA8192BBBE56BD2A5F0781A8F5EAB65EFB36C839F0BAC857CADDC4A87AD59B1AA47E5F2891E3362949ABAC1
3,294,418 UART: Caliptra RT
3,294,763 UART: [state] CFI Enabled
3,403,028 UART: [rt] RT listening for mailbox commands...
3,403,698 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,564 UART: [rt]cmd =0x50435252, len=8
3,435,016 >>> mbox cmd response data (8 bytes)
3,435,017 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,738,321 >>> mbox cmd response: success
5,738,321 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,751,804 UART:
5,751,820 UART: Running Caliptra FMC ...
5,752,228 UART:
5,752,371 UART: [state] CFI Enabled
5,840,958 UART: [art] Extend RT PCRs Done
5,841,386 UART: [art] Lock RT PCRs Done
5,842,837 UART: [art] Populate DV Done
5,851,168 UART: [fht] FMC Alias Private Key: 7
5,852,144 UART: [art] Derive CDI
5,852,424 UART: [art] Store in in slot 0x4
5,938,051 UART: [art] Derive Key Pair
5,938,411 UART: [art] Store priv key in slot 0x5
5,951,759 UART: [art] Derive Key Pair - Done
5,966,454 UART: [art] Signing Cert with AUTHO
5,966,934 UART: RITY.KEYID = 7
5,982,170 UART: [art] Erasing AUTHORITY.KEYID = 7
5,982,935 UART: [art] PUB.X = D91A13D9450C5D91FF8DA6086FBF001E91E7D6628E2E82F4F8752C94930C7F6C046941B75D72C660589E0F262020568E
5,989,664 UART: [art] PUB.Y = 10EC1E1D5796FB47393B99C26AB8EB402D1B1F8BE96EB564C2324D3A2E76EEA785E1FD1CDCCB92EADE18C78C1E6E1188
5,996,636 UART: [art] SIG.R = 3CAA55D839E969A0015713A12BC682DDA4A0D06204E914E3A9D5B1131B5D4519AC4A5609678C4711DD83CF1AD4DD2205
6,003,398 UART: [art] SIG.S = 9AFC44B522F17606F2F29C73F1C80165770BF1AB02F8F4EE4066870941912A32379BE500AE6CFC1896EF796032653A47
6,026,434 UART: mbox::rt_entry...
6,026,806 UART: ____ _ _ _ ____ _____
6,027,590 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,028,390 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,029,158 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,029,926 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,030,694 UART: |_|
6,031,006 UART:
6,313,268 UART: [rt] Runtime listening for mailbox commands...
6,314,315 >>> mbox cmd response data (128 bytes)
6,314,316 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,614,184 >>> mbox cmd response: success
8,614,184 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,627,777 UART:
8,627,793 UART: Running Caliptra FMC ...
8,628,201 UART:
8,628,344 UART: [state] CFI Enabled
8,717,707 UART: [art] Extend RT PCRs Done
8,718,135 UART: [art] Lock RT PCRs Done
8,719,538 UART: [art] Populate DV Done
8,727,729 UART: [fht] FMC Alias Private Key: 7
8,728,875 UART: [art] Derive CDI
8,729,155 UART: [art] Store in in slot 0x4
8,815,266 UART: [art] Derive Key Pair
8,815,626 UART: [art] Store priv key in slot 0x5
8,829,194 UART: [art] Derive Key Pair - Done
8,843,881 UART: [art] Signing Cert with AUTHO
8,844,361 UART: RITY.KEYID = 7
8,859,555 UART: [art] Erasing AUTHORITY.KEYID = 7
8,860,320 UART: [art] PUB.X = 6326CB06E8D4A4A14518FEF72DF3B2D485175D9DEF8CFFDB39458B7BF88EB6EF0FB588816E83D10B0BD68ABA9CED0888
8,867,097 UART: [art] PUB.Y = 80DAE3E6C6D01A107ADFF13721C9EA9232C6DBF770CA59CCB3C890AF4A0DD89EF5251A97FF89D6AAF1440FC0D87B152E
8,874,065 UART: [art] SIG.R = 8906A9A15CC02649C08A375C71206B4D97118FDAD08A8F10076C782FE17E05FF0CC50366BA5237BBCC4094A4E465A7B7
8,880,824 UART: [art] SIG.S = 9AF5BB413083AED498878CDC96FD2ECFF55E8B53A9207CFACA60B804BE8A505AF143BAFD094C03713154146904C17355
8,904,451 UART: mbox::rt_entry...
8,904,823 UART: ____ _ _ _ ____ _____
8,905,607 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,906,407 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,907,175 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,907,943 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,908,711 UART: |_|
8,909,023 UART:
9,189,164 UART: [rt] Runtime listening for mailbox commands...
9,190,211 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,402 UART: [kat] SHA2-256
893,052 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,177 UART: [kat] ++
897,329 UART: [kat] sha1
901,677 UART: [kat] SHA2-256
903,617 UART: [kat] SHA2-384
906,376 UART: [kat] SHA2-512-ACC
908,277 UART: [kat] ECC-384
918,200 UART: [kat] HMAC-384Kdf
923,012 UART: [kat] LMS
1,171,340 UART: [kat] --
1,172,319 UART: [cold-reset] ++
1,172,797 UART: [fht] FHT @ 0x50003400
1,175,588 UART: [idev] ++
1,175,756 UART: [idev] CDI.KEYID = 6
1,176,116 UART: [idev] SUBJECT.KEYID = 7
1,176,540 UART: [idev] UDS.KEYID = 0
1,176,885 ready_for_fw is high
1,176,885 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,578 UART: [idev] Erasing UDS.KEYID = 0
1,201,257 UART: [idev] Sha1 KeyId Algorithm
1,209,613 UART: [idev] --
1,210,545 UART: [ldev] ++
1,210,713 UART: [ldev] CDI.KEYID = 6
1,211,076 UART: [ldev] SUBJECT.KEYID = 5
1,211,502 UART: [ldev] AUTHORITY.KEYID = 7
1,211,965 UART: [ldev] FE.KEYID = 1
1,217,313 UART: [ldev] Erasing FE.KEYID = 1
1,243,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,325 UART: [ldev] --
1,282,792 UART: [fwproc] Wait for Commands...
1,283,366 UART: [fwproc] Recv command 0x46574c44
1,284,094 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,342 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,646 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,527 >>> mbox cmd response: success
2,776,747 UART: [afmc] ++
2,776,915 UART: [afmc] CDI.KEYID = 6
2,777,277 UART: [afmc] SUBJECT.KEYID = 7
2,777,702 UART: [afmc] AUTHORITY.KEYID = 5
2,813,311 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,640 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,388 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,116 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,001 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,720 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,434 UART: [afmc] --
2,856,348 UART: [cold-reset] --
2,857,140 UART: [state] Locking Datavault
2,858,321 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,925 UART: [state] Locking ICCM
2,859,525 UART: [exit] Launching FMC @ 0x40000130
2,864,854 UART:
2,864,870 UART: Running Caliptra FMC ...
2,865,278 UART:
2,865,332 UART: [state] CFI Enabled
2,875,613 UART: [fht] FMC Alias Private Key: 7
2,983,266 UART: [art] Extend RT PCRs Done
2,983,694 UART: [art] Lock RT PCRs Done
2,984,756 UART: [art] Populate DV Done
2,992,999 UART: [fht] FMC Alias Private Key: 7
2,994,047 UART: [art] Derive CDI
2,994,327 UART: [art] Store in in slot 0x4
3,079,836 UART: [art] Derive Key Pair
3,080,196 UART: [art] Store priv key in slot 0x5
3,092,822 UART: [art] Derive Key Pair - Done
3,107,840 UART: [art] Signing Cert with AUTHO
3,108,320 UART: RITY.KEYID = 7
3,124,158 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,923 UART: [art] PUB.X = 6316C2C85A3B41F699EAE1597907F2FF61956313FEA70E8CF4F48BA330B1116054A81C83939F2AAD0DF5317D1E49245E
3,131,686 UART: [art] PUB.Y = D7C3F0A3901B0E52CFB6C262FCC77D92D806C1014F6B38ADB511B88E7C9C02F9FEA256DD902A30F2ED7BB515BE17C8E0
3,138,644 UART: [art] SIG.R = 1CD0E20CA20729E3649B6D1DA0CBDC7CD9641E7ACDE71CB6DA842F0716EB37E2AE5D3D44B2393CD6A1B7C992E4C08D9B
3,145,429 UART: [art] SIG.S = B23C5C4D87C387142F962B1A894FAE38E9C4BCD67F330D315258695A458EA026C435060F8D2AEE49BF980883E4528CE0
3,169,478 UART: Caliptra RT
3,169,731 UART: [state] CFI Enabled
3,277,340 UART: [rt] RT listening for mailbox commands...
3,278,010 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,006 UART: [rt]cmd =0x50435252, len=8
3,309,760 >>> mbox cmd response data (8 bytes)
3,309,761 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,522 UART:
3,310,538 UART: Running Caliptra ROM ...
3,310,946 UART:
3,311,001 UART: [state] CFI Enabled
3,313,831 UART: [state] LifecycleState = Unprovisioned
3,314,486 UART: [state] DebugLocked = No
3,314,970 UART: [state] WD Timer not started. Device not locked for debugging
3,316,116 UART: [kat] SHA2-256
4,121,766 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,125,891 UART: [kat] ++
4,126,043 UART: [kat] sha1
4,130,265 UART: [kat] SHA2-256
4,132,205 UART: [kat] SHA2-384
4,134,882 UART: [kat] SHA2-512-ACC
4,136,782 UART: [kat] ECC-384
4,146,581 UART: [kat] HMAC-384Kdf
4,151,099 UART: [kat] LMS
4,399,427 UART: [kat] --
4,400,067 UART: [update-reset] ++
5,304,809 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,305,952 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,402,334 >>> mbox cmd response: success
5,402,334 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,402,543 UART: [update-reset] Copying MAN_2 To MAN_1
5,410,557 UART: [update-reset Success] --
5,411,470 UART: [state] Locking Datavault
5,412,314 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,918 UART: [state] Locking ICCM
5,413,526 UART: [exit] Launching FMC @ 0x40000130
5,418,855 UART:
5,418,871 UART: Running Caliptra FMC ...
5,419,279 UART:
5,419,333 UART: [state] CFI Enabled
5,508,198 UART: [art] Extend RT PCRs Done
5,508,626 UART: [art] Lock RT PCRs Done
5,509,709 UART: [art] Populate DV Done
5,518,022 UART: [fht] FMC Alias Private Key: 7
5,519,000 UART: [art] Derive CDI
5,519,280 UART: [art] Store in in slot 0x4
5,605,189 UART: [art] Derive Key Pair
5,605,549 UART: [art] Store priv key in slot 0x5
5,618,491 UART: [art] Derive Key Pair - Done
5,633,033 UART: [art] Signing Cert with AUTHO
5,633,513 UART: RITY.KEYID = 7
5,648,559 UART: [art] Erasing AUTHORITY.KEYID = 7
5,649,324 UART: [art] PUB.X = 6CC8C1B3D62139134CCC4DDF497D9B9D70C871C63CF95DA3CAAE32B02B1B899F75264B9C232760B626D152D593AF1EB8
5,656,106 UART: [art] PUB.Y = 1A78077A394E45C57AE099DF99A1426320FF186434B8DE64F4C59DD8B1B703A121AC41D6CF29F37370CC48764F8626A8
5,663,050 UART: [art] SIG.R = F135BB8979329713EB557F437E340F9DFB35D3DAB6DBE3C9A7E2668E36946B18E9B0AE199E331D69CC4231AAC12737DC
5,669,827 UART: [art] SIG.S = D6A3DAE0FECE43B462FA39EA62CE92B7C717B7B5555D861A31CA7C1D5A9D286A1AA73DE0F7F31A09187AC7CEE060694E
5,693,409 UART: mbox::rt_entry...
5,693,781 UART: ____ _ _ _ ____ _____
5,694,565 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,695,365 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,696,133 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,696,901 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,697,669 UART: |_|
5,697,981 UART:
5,981,578 UART: [rt] Runtime listening for mailbox commands...
5,982,625 >>> mbox cmd response data (128 bytes)
5,982,626 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,982,737 UART:
5,982,753 UART: Running Caliptra ROM ...
5,983,161 UART:
5,983,216 UART: [state] CFI Enabled
5,986,154 UART: [state] LifecycleState = Unprovisioned
5,986,809 UART: [state] DebugLocked = No
5,987,447 UART: [state] WD Timer not started. Device not locked for debugging
5,988,693 UART: [kat] SHA2-256
6,794,343 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,798,468 UART: [kat] ++
6,798,620 UART: [kat] sha1
6,802,836 UART: [kat] SHA2-256
6,804,776 UART: [kat] SHA2-384
6,807,647 UART: [kat] SHA2-512-ACC
6,809,547 UART: [kat] ECC-384
6,819,180 UART: [kat] HMAC-384Kdf
6,823,644 UART: [kat] LMS
7,071,972 UART: [kat] --
7,072,978 UART: [update-reset] ++
7,976,620 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,977,757 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,074,139 >>> mbox cmd response: success
8,074,139 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,074,296 UART: [update-reset] Copying MAN_2 To MAN_1
8,082,310 UART: [update-reset Success] --
8,083,317 UART: [state] Locking Datavault
8,084,207 UART: [state] Locking PCR0, PCR1 and PCR31
8,084,811 UART: [state] Locking ICCM
8,085,333 UART: [exit] Launching FMC @ 0x40000130
8,090,662 UART:
8,090,678 UART: Running Caliptra FMC ...
8,091,086 UART:
8,091,140 UART: [state] CFI Enabled
8,180,131 UART: [art] Extend RT PCRs Done
8,180,559 UART: [art] Lock RT PCRs Done
8,181,866 UART: [art] Populate DV Done
8,189,985 UART: [fht] FMC Alias Private Key: 7
8,191,145 UART: [art] Derive CDI
8,191,425 UART: [art] Store in in slot 0x4
8,276,792 UART: [art] Derive Key Pair
8,277,152 UART: [art] Store priv key in slot 0x5
8,290,558 UART: [art] Derive Key Pair - Done
8,305,398 UART: [art] Signing Cert with AUTHO
8,305,878 UART: RITY.KEYID = 7
8,321,552 UART: [art] Erasing AUTHORITY.KEYID = 7
8,322,317 UART: [art] PUB.X = 1F50F167499FA9314F1FA0E906F0355DAF6896C5D0A3B84A907A2E982ACC53E9F9E7E2798B539E6682EE3F23EE20DFAC
8,329,096 UART: [art] PUB.Y = EA783E556EBB997792407AC152EC8BFBD4A6498D1FC409CCC130C17C1F6ADAE7AA0B19FB9EF304772FA6E35F19BCB7B3
8,336,061 UART: [art] SIG.R = 62CB169B3ED1F4875D0C0DB4801BABD6EECFA3E4344403F5DDEAAB1FD1745BABA8A4EFE1AB75353F04539DF8BF788F9C
8,342,849 UART: [art] SIG.S = 7C06A7AD017FFEBEBD709AF54B88DD9E196E31A2CDBCF79B93DB75C18B73EAEF1DA0C700C6653B66E127D08ADC5283C8
8,366,278 UART: mbox::rt_entry...
8,366,650 UART: ____ _ _ _ ____ _____
8,367,434 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,368,234 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,369,002 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,369,770 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,370,538 UART: |_|
8,370,850 UART:
8,654,482 UART: [rt] Runtime listening for mailbox commands...
8,655,529 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,887 ready_for_fw is high
1,058,887 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,380 >>> mbox cmd response: success
2,686,794 UART:
2,686,810 UART: Running Caliptra FMC ...
2,687,218 UART:
2,687,272 UART: [state] CFI Enabled
2,697,877 UART: [fht] FMC Alias Private Key: 7
2,806,130 UART: [art] Extend RT PCRs Done
2,806,558 UART: [art] Lock RT PCRs Done
2,808,258 UART: [art] Populate DV Done
2,816,671 UART: [fht] FMC Alias Private Key: 7
2,817,811 UART: [art] Derive CDI
2,818,091 UART: [art] Store in in slot 0x4
2,904,118 UART: [art] Derive Key Pair
2,904,478 UART: [art] Store priv key in slot 0x5
2,917,634 UART: [art] Derive Key Pair - Done
2,932,342 UART: [art] Signing Cert with AUTHO
2,932,822 UART: RITY.KEYID = 7
2,948,078 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,843 UART: [art] PUB.X = 802CAF7F797E8E108A686F7A8F56CB877D37DF7CBE87FB9395A30316F887923EA5FA0049E3537A6C1DE26F593A158F22
2,955,594 UART: [art] PUB.Y = 0BB6CB4B76B19D19D56D46B2C9102EE363625B2CFA0C7FC11F2818417B5539C7DE0F433532E7E56366760F3EE1404352
2,962,532 UART: [art] SIG.R = C602620B1D4DEFA549E550948D2C2E598CD7401D1788EC1E1EF6884DF7A0D542E504ABFAA5A6921D34690592EDF44534
2,969,296 UART: [art] SIG.S = 37D07C115EF72042F44541FA1653942F786F681E4AEB00FE9302A163D56E6DE11EBA6D6AA7B601E50B6792DB25AAB088
2,994,068 UART: Caliptra RT
2,994,321 UART: [state] CFI Enabled
3,101,720 UART: [rt] RT listening for mailbox commands...
3,102,390 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,232 UART: [rt]cmd =0x50435252, len=8
3,133,698 >>> mbox cmd response data (8 bytes)
3,133,699 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,110,555 >>> mbox cmd response: success
5,110,555 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,123,587 UART:
5,123,603 UART: Running Caliptra FMC ...
5,124,011 UART:
5,124,065 UART: [state] CFI Enabled
5,213,134 UART: [art] Extend RT PCRs Done
5,213,562 UART: [art] Lock RT PCRs Done
5,215,025 UART: [art] Populate DV Done
5,223,152 UART: [fht] FMC Alias Private Key: 7
5,224,086 UART: [art] Derive CDI
5,224,366 UART: [art] Store in in slot 0x4
5,309,747 UART: [art] Derive Key Pair
5,310,107 UART: [art] Store priv key in slot 0x5
5,322,963 UART: [art] Derive Key Pair - Done
5,337,669 UART: [art] Signing Cert with AUTHO
5,338,149 UART: RITY.KEYID = 7
5,353,689 UART: [art] Erasing AUTHORITY.KEYID = 7
5,354,454 UART: [art] PUB.X = 5D80C743EE65F75E48375D4753FDD9E1D835AFE86A61E473780E1BC75C20909386F0CF2CC98A829AAB586BCEF9D33B7B
5,361,233 UART: [art] PUB.Y = 0F798F820F85222BF485B560A4C4EA90E245F8070AD05696176A3550FCC607D5DB54B422CB26E83D8CDCD526EE72208D
5,368,172 UART: [art] SIG.R = 547A4C2B74B19EFCD4AAF30BFBF0238A82C4915544EF0B873B2CB04A217CC3AE319C4EC6BE43CB210F36C2647414A219
5,374,947 UART: [art] SIG.S = ACC11493181F6701D9D5D1C11777B5AA34A3C151B0898E3CB9470A70DF520CEB4CFFC47F2F5BCFF9D02819016161E328
5,398,596 UART: mbox::rt_entry...
5,398,968 UART: ____ _ _ _ ____ _____
5,399,752 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,400,552 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,401,320 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,402,088 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,402,856 UART: |_|
5,403,168 UART:
5,688,248 UART: [rt] Runtime listening for mailbox commands...
5,689,295 >>> mbox cmd response data (128 bytes)
5,689,296 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,665,056 >>> mbox cmd response: success
7,665,056 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,678,336 UART:
7,678,352 UART: Running Caliptra FMC ...
7,678,760 UART:
7,678,814 UART: [state] CFI Enabled
7,768,025 UART: [art] Extend RT PCRs Done
7,768,453 UART: [art] Lock RT PCRs Done
7,769,624 UART: [art] Populate DV Done
7,777,811 UART: [fht] FMC Alias Private Key: 7
7,778,929 UART: [art] Derive CDI
7,779,209 UART: [art] Store in in slot 0x4
7,865,010 UART: [art] Derive Key Pair
7,865,370 UART: [art] Store priv key in slot 0x5
7,878,304 UART: [art] Derive Key Pair - Done
7,893,196 UART: [art] Signing Cert with AUTHO
7,893,676 UART: RITY.KEYID = 7
7,908,642 UART: [art] Erasing AUTHORITY.KEYID = 7
7,909,407 UART: [art] PUB.X = 1F3E1CB52D14A10205D541547284AD0C0D622B577112A0786B4919B7976D1BE433ADB820230925547F9202D6083D45B7
7,916,144 UART: [art] PUB.Y = 7FD3042D2D385B411F2F006B83C097994B320D9049A0A0D9E4489AA0EA4EB90E36F2F0D10F44031BEAAA71994D344DAF
7,923,065 UART: [art] SIG.R = 961760858C8DD0B59BB9BF55A87B1D228529D71124CEE655FE2378B3988FF5385CE2821483BC168BAD74327FFA4C49D5
7,929,837 UART: [art] SIG.S = 0BD5F897ADB22B7D6A26E846404A7840D42929B8E35ACA66D867360EEECB91F141C302281B849FE7F68BA0767BAEF1F4
7,953,703 UART: mbox::rt_entry...
7,954,075 UART: ____ _ _ _ ____ _____
7,954,859 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,955,659 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,956,427 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,957,195 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,957,963 UART: |_|
7,958,275 UART:
8,242,059 UART: [rt] Runtime listening for mailbox commands...
8,243,106 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
88,141 UART: [kat] SHA2-256
893,791 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,916 UART: [kat] ++
898,068 UART: [kat] sha1
902,444 UART: [kat] SHA2-256
904,384 UART: [kat] SHA2-384
907,077 UART: [kat] SHA2-512-ACC
908,978 UART: [kat] ECC-384
918,713 UART: [kat] HMAC-384Kdf
923,371 UART: [kat] LMS
1,171,699 UART: [kat] --
1,172,524 UART: [cold-reset] ++
1,172,988 UART: [fht] FHT @ 0x50003400
1,175,707 UART: [idev] ++
1,175,875 UART: [idev] CDI.KEYID = 6
1,176,235 UART: [idev] SUBJECT.KEYID = 7
1,176,659 UART: [idev] UDS.KEYID = 0
1,177,004 ready_for_fw is high
1,177,004 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,535 UART: [idev] Erasing UDS.KEYID = 0
1,201,664 UART: [idev] Sha1 KeyId Algorithm
1,210,064 UART: [idev] --
1,211,124 UART: [ldev] ++
1,211,292 UART: [ldev] CDI.KEYID = 6
1,211,655 UART: [ldev] SUBJECT.KEYID = 5
1,212,081 UART: [ldev] AUTHORITY.KEYID = 7
1,212,544 UART: [ldev] FE.KEYID = 1
1,217,464 UART: [ldev] Erasing FE.KEYID = 1
1,243,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,222 UART: [ldev] --
1,282,687 UART: [fwproc] Wait for Commands...
1,283,479 UART: [fwproc] Recv command 0x46574c44
1,284,207 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,171 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,475 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,296 >>> mbox cmd response: success
2,775,540 UART: [afmc] ++
2,775,708 UART: [afmc] CDI.KEYID = 6
2,776,070 UART: [afmc] SUBJECT.KEYID = 7
2,776,495 UART: [afmc] AUTHORITY.KEYID = 5
2,812,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,067 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,815 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,543 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,428 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,147 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,037 UART: [afmc] --
2,856,013 UART: [cold-reset] --
2,856,945 UART: [state] Locking Datavault
2,857,726 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,330 UART: [state] Locking ICCM
2,858,958 UART: [exit] Launching FMC @ 0x40000130
2,864,287 UART:
2,864,303 UART: Running Caliptra FMC ...
2,864,711 UART:
2,864,854 UART: [state] CFI Enabled
2,875,413 UART: [fht] FMC Alias Private Key: 7
2,983,180 UART: [art] Extend RT PCRs Done
2,983,608 UART: [art] Lock RT PCRs Done
2,984,870 UART: [art] Populate DV Done
2,993,041 UART: [fht] FMC Alias Private Key: 7
2,994,213 UART: [art] Derive CDI
2,994,493 UART: [art] Store in in slot 0x4
3,079,884 UART: [art] Derive Key Pair
3,080,244 UART: [art] Store priv key in slot 0x5
3,093,782 UART: [art] Derive Key Pair - Done
3,108,764 UART: [art] Signing Cert with AUTHO
3,109,244 UART: RITY.KEYID = 7
3,124,650 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,415 UART: [art] PUB.X = 52B154FA109C80CA30A49F4F22176A8C35A2E800E9DEEF419A7032446D3FD6BBF8DC5E133BBBF575965A9AFCEB78C190
3,132,179 UART: [art] PUB.Y = 2FD0C2DAA9B456775F4E811B52F4E82EB5ACEFA8CD7EA85A2C1CD72C5619D0BFEE0CB30A40D126654888B845171117BD
3,139,141 UART: [art] SIG.R = 36130C15084A48F85900A31F2AC08FD2C9A3F0AF16394498FDDEED597F61E343F9E5E1F7C50878BE20A8B7408FECFC79
3,145,890 UART: [art] SIG.S = 802C9DEACA52CD3E46A16263F4387D53D9D5B8D3FD332EC2CABE5E895DD7A57A3AA5FFEB3B0433EF1FA98E7FFEC46CA5
3,169,688 UART: Caliptra RT
3,170,033 UART: [state] CFI Enabled
3,278,874 UART: [rt] RT listening for mailbox commands...
3,279,544 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,514 UART: [rt]cmd =0x50435252, len=8
3,311,022 >>> mbox cmd response data (8 bytes)
3,311,023 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,068 UART:
3,312,084 UART: Running Caliptra ROM ...
3,312,492 UART:
3,312,634 UART: [state] CFI Enabled
3,315,872 UART: [state] LifecycleState = Unprovisioned
3,316,527 UART: [state] DebugLocked = No
3,317,045 UART: [state] WD Timer not started. Device not locked for debugging
3,318,371 UART: [kat] SHA2-256
4,124,021 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,128,146 UART: [kat] ++
4,128,298 UART: [kat] sha1
4,132,640 UART: [kat] SHA2-256
4,134,580 UART: [kat] SHA2-384
4,137,331 UART: [kat] SHA2-512-ACC
4,139,231 UART: [kat] ECC-384
4,148,762 UART: [kat] HMAC-384Kdf
4,153,444 UART: [kat] LMS
4,401,772 UART: [kat] --
4,402,720 UART: [update-reset] ++
5,307,996 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,309,037 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,405,419 >>> mbox cmd response: success
5,405,419 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,405,692 UART: [update-reset] Copying MAN_2 To MAN_1
5,413,706 UART: [update-reset Success] --
5,414,651 UART: [state] Locking Datavault
5,415,639 UART: [state] Locking PCR0, PCR1 and PCR31
5,416,243 UART: [state] Locking ICCM
5,416,859 UART: [exit] Launching FMC @ 0x40000130
5,422,188 UART:
5,422,204 UART: Running Caliptra FMC ...
5,422,612 UART:
5,422,755 UART: [state] CFI Enabled
5,512,016 UART: [art] Extend RT PCRs Done
5,512,444 UART: [art] Lock RT PCRs Done
5,513,687 UART: [art] Populate DV Done
5,521,866 UART: [fht] FMC Alias Private Key: 7
5,522,906 UART: [art] Derive CDI
5,523,186 UART: [art] Store in in slot 0x4
5,608,601 UART: [art] Derive Key Pair
5,608,961 UART: [art] Store priv key in slot 0x5
5,622,077 UART: [art] Derive Key Pair - Done
5,636,623 UART: [art] Signing Cert with AUTHO
5,637,103 UART: RITY.KEYID = 7
5,652,281 UART: [art] Erasing AUTHORITY.KEYID = 7
5,653,046 UART: [art] PUB.X = D99E642558974443AEEF4B4E63048DD4E5AC746382A12CCBD3AC18CC9923B4D7D5D19F529BF0B5BB98A31E51A0059BB8
5,659,822 UART: [art] PUB.Y = 57C9F60FFC29B45B8406D8982E446A15A6EF2D00B30045A3146CD5C0195970D776F3836FD6D4A1266A82648C1EABC4B8
5,666,724 UART: [art] SIG.R = 932C48BE82DDF5B00C419C50F1A91A462E14F500290A409B984AB44533D106768D9A67706D8443DFD493C89B69CFCAD6
5,673,465 UART: [art] SIG.S = 4A6EBF0E6B09F1DE38D5DC7DD4E43832E077686669CDBF8CFE4CBCFF13EE2AF0F9FC9602599C952FC153E39A1FF542E1
5,697,175 UART: mbox::rt_entry...
5,697,547 UART: ____ _ _ _ ____ _____
5,698,331 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,699,131 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,699,899 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,700,667 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,701,435 UART: |_|
5,701,747 UART:
5,982,055 UART: [rt] Runtime listening for mailbox commands...
5,983,102 >>> mbox cmd response data (128 bytes)
5,983,103 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,983,214 UART:
5,983,230 UART: Running Caliptra ROM ...
5,983,638 UART:
5,983,780 UART: [state] CFI Enabled
5,986,594 UART: [state] LifecycleState = Unprovisioned
5,987,249 UART: [state] DebugLocked = No
5,987,965 UART: [state] WD Timer not started. Device not locked for debugging
5,989,315 UART: [kat] SHA2-256
6,794,965 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,799,090 UART: [kat] ++
6,799,242 UART: [kat] sha1
6,803,500 UART: [kat] SHA2-256
6,805,440 UART: [kat] SHA2-384
6,808,089 UART: [kat] SHA2-512-ACC
6,809,989 UART: [kat] ECC-384
6,819,690 UART: [kat] HMAC-384Kdf
6,824,308 UART: [kat] LMS
7,072,636 UART: [kat] --
7,073,714 UART: [update-reset] ++
7,977,650 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,978,669 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,075,051 >>> mbox cmd response: success
8,075,051 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,075,262 UART: [update-reset] Copying MAN_2 To MAN_1
8,083,276 UART: [update-reset Success] --
8,084,375 UART: [state] Locking Datavault
8,085,287 UART: [state] Locking PCR0, PCR1 and PCR31
8,085,891 UART: [state] Locking ICCM
8,086,561 UART: [exit] Launching FMC @ 0x40000130
8,091,890 UART:
8,091,906 UART: Running Caliptra FMC ...
8,092,314 UART:
8,092,457 UART: [state] CFI Enabled
8,182,058 UART: [art] Extend RT PCRs Done
8,182,486 UART: [art] Lock RT PCRs Done
8,183,639 UART: [art] Populate DV Done
8,192,092 UART: [fht] FMC Alias Private Key: 7
8,193,062 UART: [art] Derive CDI
8,193,342 UART: [art] Store in in slot 0x4
8,279,307 UART: [art] Derive Key Pair
8,279,667 UART: [art] Store priv key in slot 0x5
8,292,801 UART: [art] Derive Key Pair - Done
8,307,655 UART: [art] Signing Cert with AUTHO
8,308,135 UART: RITY.KEYID = 7
8,323,317 UART: [art] Erasing AUTHORITY.KEYID = 7
8,324,082 UART: [art] PUB.X = EBF35CAA307137C19CAE145AC24776EF755DA1A1B6F8B5AFA37332305612610B4E4EB4404EC2AE02222E0540C1A17174
8,330,849 UART: [art] PUB.Y = D18C0EE5F17F6D04EDD5F106CF59B193AFF180EE697D6A729C34C02753E1C20A0CCBF6F0C10E494DC9E8B76452549B6F
8,337,797 UART: [art] SIG.R = 9543A854DA43891C5B64FA5D42C5E3CF221C663B2D0B15E0641A8B81CD561D2A42C83065F156F581DE5946F0EA969CD6
8,344,568 UART: [art] SIG.S = E6E724BDEAA980A2EF40CDCEBD9201AD4B66B2A993716136A52DDBFC0B06D3799689789D41AB0A8E2F49B79BE9C615D1
8,368,427 UART: mbox::rt_entry...
8,368,799 UART: ____ _ _ _ ____ _____
8,369,583 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,370,383 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,371,151 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,371,919 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,372,687 UART: |_|
8,372,999 UART:
8,655,248 UART: [rt] Runtime listening for mailbox commands...
8,656,295 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,420 ready_for_fw is high
1,060,420 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,583 >>> mbox cmd response: success
2,688,569 UART:
2,688,585 UART: Running Caliptra FMC ...
2,688,993 UART:
2,689,136 UART: [state] CFI Enabled
2,699,787 UART: [fht] FMC Alias Private Key: 7
2,808,112 UART: [art] Extend RT PCRs Done
2,808,540 UART: [art] Lock RT PCRs Done
2,810,154 UART: [art] Populate DV Done
2,818,279 UART: [fht] FMC Alias Private Key: 7
2,819,439 UART: [art] Derive CDI
2,819,719 UART: [art] Store in in slot 0x4
2,905,454 UART: [art] Derive Key Pair
2,905,814 UART: [art] Store priv key in slot 0x5
2,919,382 UART: [art] Derive Key Pair - Done
2,934,439 UART: [art] Signing Cert with AUTHO
2,934,919 UART: RITY.KEYID = 7
2,950,127 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,892 UART: [art] PUB.X = D5FD750BB3F9CE14FEA60551748C92092A60906877AEA32EDEB81FF092C5D503E814A857BBF66F5BFDB62399DF04EE9C
2,957,663 UART: [art] PUB.Y = C8EF6F887A4CE6B6EF2538B61407B4F2C8BAACDDC5F5CFCDB29A76D6E01519A0EB4D1AEE4A26CA0CE4B0755648CA99D2
2,964,637 UART: [art] SIG.R = 19612A7D9375A77B669E43DBA6A84259195727CBD873BD4AF84F9F829025B5F4357AC107EBFA9E5AF59ABAA3824A2169
2,971,410 UART: [art] SIG.S = 7F7A5EA485328A4DD6F1B9D637D82CB3B29A6A5750C150313929292FD4BFA583DB4A2E2C20AA4BE499E3FDB1C3D11B5E
2,994,987 UART: Caliptra RT
2,995,332 UART: [state] CFI Enabled
3,103,135 UART: [rt] RT listening for mailbox commands...
3,103,805 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,387 UART: [rt]cmd =0x50435252, len=8
3,134,927 >>> mbox cmd response data (8 bytes)
3,134,928 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,112,763 >>> mbox cmd response: success
5,112,763 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,125,709 UART:
5,125,725 UART: Running Caliptra FMC ...
5,126,133 UART:
5,126,276 UART: [state] CFI Enabled
5,215,743 UART: [art] Extend RT PCRs Done
5,216,171 UART: [art] Lock RT PCRs Done
5,217,696 UART: [art] Populate DV Done
5,226,121 UART: [fht] FMC Alias Private Key: 7
5,227,127 UART: [art] Derive CDI
5,227,407 UART: [art] Store in in slot 0x4
5,313,218 UART: [art] Derive Key Pair
5,313,578 UART: [art] Store priv key in slot 0x5
5,326,650 UART: [art] Derive Key Pair - Done
5,341,455 UART: [art] Signing Cert with AUTHO
5,341,935 UART: RITY.KEYID = 7
5,357,147 UART: [art] Erasing AUTHORITY.KEYID = 7
5,357,912 UART: [art] PUB.X = 3CF12BB528F21460520093FF477CEC3BA03FD91BBDA94487FE40300D7F73D72D6C32A22629AF6D14C277C4F097B4CBC9
5,364,667 UART: [art] PUB.Y = 264B7142677D9021CF0550060E0BE980622CD72F49EC5F709A042A10F6F5D5C77F5144355552E310AA4F1AF2EDEA3C7F
5,371,604 UART: [art] SIG.R = A8BA31331914751F44E19EE1E51536DE7897F151EA5F1D6112204857E1732C4B961F84D031845FA98B2C7EB4C22F2A0F
5,378,369 UART: [art] SIG.S = 5F8F7FF3C916DC6147E1F7DDBD3D37AA67DA3F827AFDC84A306F14FB02EA46E0C2172952866FC842737D535DE4421574
5,401,507 UART: mbox::rt_entry...
5,401,879 UART: ____ _ _ _ ____ _____
5,402,663 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,403,463 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,404,231 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,404,999 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,405,767 UART: |_|
5,406,079 UART:
5,691,221 UART: [rt] Runtime listening for mailbox commands...
5,692,268 >>> mbox cmd response data (128 bytes)
5,692,269 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,668,988 >>> mbox cmd response: success
7,668,988 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,682,132 UART:
7,682,148 UART: Running Caliptra FMC ...
7,682,556 UART:
7,682,699 UART: [state] CFI Enabled
7,771,870 UART: [art] Extend RT PCRs Done
7,772,298 UART: [art] Lock RT PCRs Done
7,773,625 UART: [art] Populate DV Done
7,781,794 UART: [fht] FMC Alias Private Key: 7
7,782,868 UART: [art] Derive CDI
7,783,148 UART: [art] Store in in slot 0x4
7,868,979 UART: [art] Derive Key Pair
7,869,339 UART: [art] Store priv key in slot 0x5
7,883,047 UART: [art] Derive Key Pair - Done
7,897,459 UART: [art] Signing Cert with AUTHO
7,897,939 UART: RITY.KEYID = 7
7,913,043 UART: [art] Erasing AUTHORITY.KEYID = 7
7,913,808 UART: [art] PUB.X = 3F1AF50A43E4CD33E9E83A4A6CE6AEAACEC2A59D99E9110DD595CF79B9D2855A5DE2221F81933E45510DA3DCD86768CF
7,920,589 UART: [art] PUB.Y = F8409636D8E850B62CBF2A319E802CDD41143667A96C99A0EED5BAE2FD973B0CE98E36F83DE28DBAFB2218BE07C1690F
7,927,546 UART: [art] SIG.R = 9DF9F78ECE25781CF15A75550E097B65D104EB314B4D25897B550260A67D978408C31CAADE4C8CB0380578B88979894D
7,934,296 UART: [art] SIG.S = DCDCB13FADBAF47DA057430C91517D4A35F7B14F33F3E380FBCDC3571ADD8D7F9F063C8F8544BF41EFCBFA3CB6094902
7,958,191 UART: mbox::rt_entry...
7,958,563 UART: ____ _ _ _ ____ _____
7,959,347 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,960,147 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,960,915 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,961,683 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,962,451 UART: |_|
7,962,763 UART:
8,244,970 UART: [rt] Runtime listening for mailbox commands...
8,246,017 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,646 UART: [state] LifecycleState = Unprovisioned
85,301 UART: [state] DebugLocked = No
85,857 UART: [state] WD Timer not started. Device not locked for debugging
87,108 UART: [kat] SHA2-256
890,658 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,787 UART: [kat] ++
894,939 UART: [kat] sha1
899,243 UART: [kat] SHA2-256
901,183 UART: [kat] SHA2-384
904,006 UART: [kat] SHA2-512-ACC
905,907 UART: [kat] ECC-384
915,230 UART: [kat] HMAC-384Kdf
919,814 UART: [kat] LMS
1,168,126 UART: [kat] --
1,168,995 UART: [cold-reset] ++
1,169,515 UART: [fht] FHT @ 0x50003400
1,172,113 UART: [idev] ++
1,172,281 UART: [idev] CDI.KEYID = 6
1,172,642 UART: [idev] SUBJECT.KEYID = 7
1,173,067 UART: [idev] UDS.KEYID = 0
1,173,413 ready_for_fw is high
1,173,413 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,745 UART: [idev] Erasing UDS.KEYID = 0
1,198,129 UART: [idev] Sha1 KeyId Algorithm
1,207,079 UART: [idev] --
1,208,232 UART: [ldev] ++
1,208,400 UART: [ldev] CDI.KEYID = 6
1,208,764 UART: [ldev] SUBJECT.KEYID = 5
1,209,191 UART: [ldev] AUTHORITY.KEYID = 7
1,209,654 UART: [ldev] FE.KEYID = 1
1,214,948 UART: [ldev] Erasing FE.KEYID = 1
1,241,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,198 UART: [ldev] --
1,280,672 UART: [fwproc] Wait for Commands...
1,281,367 UART: [fwproc] Recv command 0x46574c44
1,282,100 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,450 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,759 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,555 >>> mbox cmd response: success
2,773,636 UART: [afmc] ++
2,773,804 UART: [afmc] CDI.KEYID = 6
2,774,167 UART: [afmc] SUBJECT.KEYID = 7
2,774,593 UART: [afmc] AUTHORITY.KEYID = 5
2,810,154 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,394 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,145 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,874 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,757 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,476 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,345 UART: [afmc] --
2,853,423 UART: [cold-reset] --
2,854,457 UART: [state] Locking Datavault
2,855,682 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,286 UART: [state] Locking ICCM
2,856,934 UART: [exit] Launching FMC @ 0x40000130
2,862,263 UART:
2,862,279 UART: Running Caliptra FMC ...
2,862,687 UART:
2,862,741 UART: [state] CFI Enabled
2,872,998 UART: [fht] FMC Alias Private Key: 7
2,980,453 UART: [art] Extend RT PCRs Done
2,980,881 UART: [art] Lock RT PCRs Done
2,982,755 UART: [art] Populate DV Done
2,991,132 UART: [fht] FMC Alias Private Key: 7
2,992,222 UART: [art] Derive CDI
2,992,502 UART: [art] Store in in slot 0x4
3,078,131 UART: [art] Derive Key Pair
3,078,491 UART: [art] Store priv key in slot 0x5
3,091,815 UART: [art] Derive Key Pair - Done
3,106,269 UART: [art] Signing Cert with AUTHO
3,106,749 UART: RITY.KEYID = 7
3,122,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,830 UART: [art] PUB.X = 66D7746CEAC17402AF8CEBA5F46F4632392B7D89FE421218668BB197A246B0ADA7771E1971A8D672C47165ABCDED5BF3
3,129,607 UART: [art] PUB.Y = 4E12885DEF3AA61C3074ED5CCBA30647E2F9E514ECED82B666DDD14FE3B99CD455DE80A7F35FDB48E4E4EB23D550BEB1
3,136,580 UART: [art] SIG.R = EF55BAB7CCE5A42B1C3E81D9B003CC2590106FB3305200600B836B603D01F77C672EEE30D0E26FDC30C10A0796E6529B
3,143,321 UART: [art] SIG.S = 9B53FF2234CE1A29AD5E3CC1B9BD90A028195935A447CA7044E77E8A70E1AD388C3F238809F15664491CDE45B270138A
3,167,157 UART: Caliptra RT
3,167,410 UART: [state] CFI Enabled
3,275,662 UART: [rt] RT listening for mailbox commands...
3,276,332 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,320 UART: [rt]cmd =0x50435252, len=8
3,307,742 >>> mbox cmd response data (8 bytes)
3,307,743 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,554 UART:
3,308,570 UART: Running Caliptra ROM ...
3,308,978 UART:
3,309,033 UART: [state] CFI Enabled
3,311,513 UART: [state] LifecycleState = Unprovisioned
3,312,168 UART: [state] DebugLocked = No
3,312,824 UART: [state] WD Timer not started. Device not locked for debugging
3,314,070 UART: [kat] SHA2-256
4,117,620 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,121,749 UART: [kat] ++
4,121,901 UART: [kat] sha1
4,126,005 UART: [kat] SHA2-256
4,127,945 UART: [kat] SHA2-384
4,130,854 UART: [kat] SHA2-512-ACC
4,132,754 UART: [kat] ECC-384
4,142,747 UART: [kat] HMAC-384Kdf
4,147,265 UART: [kat] LMS
4,395,577 UART: [kat] --
4,396,437 UART: [update-reset] ++
5,300,438 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,301,463 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,397,845 >>> mbox cmd response: success
5,397,845 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,398,048 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,062 UART: [update-reset Success] --
5,406,987 UART: [state] Locking Datavault
5,407,627 UART: [state] Locking PCR0, PCR1 and PCR31
5,408,231 UART: [state] Locking ICCM
5,408,849 UART: [exit] Launching FMC @ 0x40000130
5,414,178 UART:
5,414,194 UART: Running Caliptra FMC ...
5,414,602 UART:
5,414,656 UART: [state] CFI Enabled
5,503,965 UART: [art] Extend RT PCRs Done
5,504,393 UART: [art] Lock RT PCRs Done
5,505,740 UART: [art] Populate DV Done
5,514,213 UART: [fht] FMC Alias Private Key: 7
5,515,313 UART: [art] Derive CDI
5,515,593 UART: [art] Store in in slot 0x4
5,601,278 UART: [art] Derive Key Pair
5,601,638 UART: [art] Store priv key in slot 0x5
5,615,464 UART: [art] Derive Key Pair - Done
5,630,222 UART: [art] Signing Cert with AUTHO
5,630,702 UART: RITY.KEYID = 7
5,645,398 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,163 UART: [art] PUB.X = CD073E915E119F6D952E655379A32C289FFD3061CBAE091998E446B7945A5E1A2CC9F3B11047A395DABDFBA358A0C4D7
5,652,937 UART: [art] PUB.Y = 523C9F90C41A224EDBAD2DBC08114F04F705E2569BE79EBEF0E7F46E8E9DBCC5A20404018E08C2736EAC20983E25614F
5,659,878 UART: [art] SIG.R = 28A0D5A8E7CCA38E139C880DF64E37F06CC78A419FE32CCAD632AA665681D7CD0AA25DFCE308344DF7BCFEDF55F5F394
5,666,663 UART: [art] SIG.S = 12AD5C0854BD530B0410DED3DD36DE963648272C953A75A6BDE0E1833A8D1DCE5CC20E4F20FADD89837E7DA1BAC113D0
5,690,438 UART: mbox::rt_entry...
5,690,810 UART: ____ _ _ _ ____ _____
5,691,594 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,692,394 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,693,162 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,693,930 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,694,698 UART: |_|
5,695,010 UART:
5,976,600 UART: [rt] Runtime listening for mailbox commands...
5,977,647 >>> mbox cmd response data (128 bytes)
5,977,648 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,977,759 UART:
5,977,775 UART: Running Caliptra ROM ...
5,978,183 UART:
5,978,238 UART: [state] CFI Enabled
5,981,218 UART: [state] LifecycleState = Unprovisioned
5,981,873 UART: [state] DebugLocked = No
5,982,553 UART: [state] WD Timer not started. Device not locked for debugging
5,983,827 UART: [kat] SHA2-256
6,787,377 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,791,506 UART: [kat] ++
6,791,658 UART: [kat] sha1
6,795,856 UART: [kat] SHA2-256
6,797,796 UART: [kat] SHA2-384
6,800,593 UART: [kat] SHA2-512-ACC
6,802,493 UART: [kat] ECC-384
6,811,952 UART: [kat] HMAC-384Kdf
6,816,604 UART: [kat] LMS
7,064,916 UART: [kat] --
7,065,852 UART: [update-reset] ++
7,971,463 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,972,532 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,068,914 >>> mbox cmd response: success
8,068,914 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,069,175 UART: [update-reset] Copying MAN_2 To MAN_1
8,077,189 UART: [update-reset Success] --
8,078,352 UART: [state] Locking Datavault
8,079,148 UART: [state] Locking PCR0, PCR1 and PCR31
8,079,752 UART: [state] Locking ICCM
8,080,392 UART: [exit] Launching FMC @ 0x40000130
8,085,721 UART:
8,085,737 UART: Running Caliptra FMC ...
8,086,145 UART:
8,086,199 UART: [state] CFI Enabled
8,174,836 UART: [art] Extend RT PCRs Done
8,175,264 UART: [art] Lock RT PCRs Done
8,176,575 UART: [art] Populate DV Done
8,184,660 UART: [fht] FMC Alias Private Key: 7
8,185,824 UART: [art] Derive CDI
8,186,104 UART: [art] Store in in slot 0x4
8,271,829 UART: [art] Derive Key Pair
8,272,189 UART: [art] Store priv key in slot 0x5
8,285,405 UART: [art] Derive Key Pair - Done
8,300,128 UART: [art] Signing Cert with AUTHO
8,300,608 UART: RITY.KEYID = 7
8,315,840 UART: [art] Erasing AUTHORITY.KEYID = 7
8,316,605 UART: [art] PUB.X = 7C302AE08D800E9B7C60416C9D7E0ED793613C3123FB1BB546F2A37DE404F84BEFBA5D067D99BD7F32A7FC48A4A268F0
8,323,377 UART: [art] PUB.Y = 63EC841B89189ACB5FD8A0B4C85EE0F18FDF4907975BB0193CFEFCD6C2EFE630D613D4B9C47D05F98A48FA347E9E8525
8,330,339 UART: [art] SIG.R = E8583326FA24B836811792871A9E576392BD65ADEF878235B82C02AD2F5C931F9F6B7CE81555903DF77328ED84609300
8,337,076 UART: [art] SIG.S = 93981AAC27049DF0BAF15452901B42DA289F07A277F9CD21D73F0677498E58EC194E77BBDDDB7B9221A84CAF729C5D81
8,360,638 UART: mbox::rt_entry...
8,361,010 UART: ____ _ _ _ ____ _____
8,361,794 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,362,594 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,363,362 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,364,130 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,364,898 UART: |_|
8,365,210 UART:
8,644,405 UART: [rt] Runtime listening for mailbox commands...
8,645,452 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,586 ready_for_fw is high
1,056,586 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,119 >>> mbox cmd response: success
2,685,491 UART:
2,685,507 UART: Running Caliptra FMC ...
2,685,915 UART:
2,685,969 UART: [state] CFI Enabled
2,696,534 UART: [fht] FMC Alias Private Key: 7
2,804,583 UART: [art] Extend RT PCRs Done
2,805,011 UART: [art] Lock RT PCRs Done
2,806,787 UART: [art] Populate DV Done
2,814,782 UART: [fht] FMC Alias Private Key: 7
2,815,760 UART: [art] Derive CDI
2,816,040 UART: [art] Store in in slot 0x4
2,902,095 UART: [art] Derive Key Pair
2,902,455 UART: [art] Store priv key in slot 0x5
2,915,503 UART: [art] Derive Key Pair - Done
2,930,025 UART: [art] Signing Cert with AUTHO
2,930,505 UART: RITY.KEYID = 7
2,945,271 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,036 UART: [art] PUB.X = E2698A27FDE8A85DB909C66F6A123EC92AE83111901CB2F2152F14A77C8F2A79629BE9E7BA07990E95DB3CFE77A81710
2,952,805 UART: [art] PUB.Y = FFCC77895CFF22058151E99A6967AAA9494124FB5E81264EC9E3CEAFB418952659BC91A33F78EB81C240342F486EEA56
2,959,758 UART: [art] SIG.R = 8D14E8BBA5356184342C3430F3C55A4596964E6F5512FA741BE86CDF11F8DF02F269FD14FE437B335F80AA82C7FF888E
2,966,531 UART: [art] SIG.S = 22E7C18ABF10937A0739EA0668B32757CC8D448ADD10FB469DE5639A1A4220F7C2BFFDE0CDDFB77A16E44982F719DA02
2,990,695 UART: Caliptra RT
2,990,948 UART: [state] CFI Enabled
3,099,207 UART: [rt] RT listening for mailbox commands...
3,099,877 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,663 UART: [rt]cmd =0x50435252, len=8
3,131,321 >>> mbox cmd response data (8 bytes)
3,131,322 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,103,043 >>> mbox cmd response: success
5,103,043 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,116,711 UART:
5,116,727 UART: Running Caliptra FMC ...
5,117,135 UART:
5,117,189 UART: [state] CFI Enabled
5,206,078 UART: [art] Extend RT PCRs Done
5,206,506 UART: [art] Lock RT PCRs Done
5,207,605 UART: [art] Populate DV Done
5,215,808 UART: [fht] FMC Alias Private Key: 7
5,216,968 UART: [art] Derive CDI
5,217,248 UART: [art] Store in in slot 0x4
5,302,439 UART: [art] Derive Key Pair
5,302,799 UART: [art] Store priv key in slot 0x5
5,316,227 UART: [art] Derive Key Pair - Done
5,331,080 UART: [art] Signing Cert with AUTHO
5,331,560 UART: RITY.KEYID = 7
5,346,330 UART: [art] Erasing AUTHORITY.KEYID = 7
5,347,095 UART: [art] PUB.X = 2F82621165FD4399080A0CD5C3161F649B158BBCC2EBCADB7792763D6C90C05E8FA16DF36A9F7F853860E7DC6B0DBB57
5,353,865 UART: [art] PUB.Y = FF4C05E5DD044D74E5E75C0F2FACC660AD7814E0835F7550E1E27D68957500582B11802A6FF70FF214DB37BBA58B8C62
5,360,789 UART: [art] SIG.R = 726EC0D949A254DA89D00B8857E036D498E5E5D47499786E9CBF24A1352FA6675348938E01943D7B57F453824D2D34F6
5,367,545 UART: [art] SIG.S = 1A6C5577192E4933B4205320DC64DCE02EA3B60E8703C76206CC8E29D15C4DED1B12DF3A64981C1EA66483818B5E7D6E
5,390,937 UART: mbox::rt_entry...
5,391,309 UART: ____ _ _ _ ____ _____
5,392,093 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,392,893 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,393,661 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,394,429 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,395,197 UART: |_|
5,395,509 UART:
5,681,307 UART: [rt] Runtime listening for mailbox commands...
5,682,354 >>> mbox cmd response data (128 bytes)
5,682,355 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,653,852 >>> mbox cmd response: success
7,653,852 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,667,322 UART:
7,667,338 UART: Running Caliptra FMC ...
7,667,746 UART:
7,667,800 UART: [state] CFI Enabled
7,756,897 UART: [art] Extend RT PCRs Done
7,757,325 UART: [art] Lock RT PCRs Done
7,758,696 UART: [art] Populate DV Done
7,766,663 UART: [fht] FMC Alias Private Key: 7
7,767,683 UART: [art] Derive CDI
7,767,963 UART: [art] Store in in slot 0x4
7,853,222 UART: [art] Derive Key Pair
7,853,582 UART: [art] Store priv key in slot 0x5
7,866,706 UART: [art] Derive Key Pair - Done
7,881,452 UART: [art] Signing Cert with AUTHO
7,881,932 UART: RITY.KEYID = 7
7,897,758 UART: [art] Erasing AUTHORITY.KEYID = 7
7,898,523 UART: [art] PUB.X = 89C8D4E77264B2660569691C9B3560B3072843364D8848D4F1C6947521D62BA2122CE2EF67CA8C3E7C235796E9CD22B8
7,905,279 UART: [art] PUB.Y = F192CF4319C074755162150EBE7BB2EF3DB1E679570414EAE98E0866BE4DABD9AC8641151C242ECA256600049687B939
7,912,195 UART: [art] SIG.R = 105D0CF921A64203E3E0AE0AEA75326896A93D33AE9BC8A7A42C56E4D410ECA907EE0EFE8A3E10F78A6015D4B6831ACE
7,918,966 UART: [art] SIG.S = 41A5104ECC7C9379B6DCA2D14B82FDACD0255577C22294905673DF0BBAF62066FDBB6AE343FEE88126D459CF066FEC5A
7,943,001 UART: mbox::rt_entry...
7,943,373 UART: ____ _ _ _ ____ _____
7,944,157 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,944,957 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,945,725 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,946,493 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,947,261 UART: |_|
7,947,573 UART:
8,227,809 UART: [rt] Runtime listening for mailbox commands...
8,228,856 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,656 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
891,395 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,524 UART: [kat] ++
895,676 UART: [kat] sha1
899,980 UART: [kat] SHA2-256
901,920 UART: [kat] SHA2-384
904,859 UART: [kat] SHA2-512-ACC
906,760 UART: [kat] ECC-384
916,247 UART: [kat] HMAC-384Kdf
920,995 UART: [kat] LMS
1,169,307 UART: [kat] --
1,170,300 UART: [cold-reset] ++
1,170,694 UART: [fht] FHT @ 0x50003400
1,173,186 UART: [idev] ++
1,173,354 UART: [idev] CDI.KEYID = 6
1,173,715 UART: [idev] SUBJECT.KEYID = 7
1,174,140 UART: [idev] UDS.KEYID = 0
1,174,486 ready_for_fw is high
1,174,486 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,488 UART: [idev] Erasing UDS.KEYID = 0
1,199,446 UART: [idev] Sha1 KeyId Algorithm
1,208,246 UART: [idev] --
1,209,285 UART: [ldev] ++
1,209,453 UART: [ldev] CDI.KEYID = 6
1,209,817 UART: [ldev] SUBJECT.KEYID = 5
1,210,244 UART: [ldev] AUTHORITY.KEYID = 7
1,210,707 UART: [ldev] FE.KEYID = 1
1,215,851 UART: [ldev] Erasing FE.KEYID = 1
1,242,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,957 UART: [ldev] --
1,281,403 UART: [fwproc] Wait for Commands...
1,282,128 UART: [fwproc] Recv command 0x46574c44
1,282,861 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,201 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,510 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,448 >>> mbox cmd response: success
2,773,537 UART: [afmc] ++
2,773,705 UART: [afmc] CDI.KEYID = 6
2,774,068 UART: [afmc] SUBJECT.KEYID = 7
2,774,494 UART: [afmc] AUTHORITY.KEYID = 5
2,810,607 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,203 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,954 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,683 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,566 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,285 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,144 UART: [afmc] --
2,854,044 UART: [cold-reset] --
2,854,882 UART: [state] Locking Datavault
2,856,019 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,623 UART: [state] Locking ICCM
2,857,257 UART: [exit] Launching FMC @ 0x40000130
2,862,586 UART:
2,862,602 UART: Running Caliptra FMC ...
2,863,010 UART:
2,863,153 UART: [state] CFI Enabled
2,874,038 UART: [fht] FMC Alias Private Key: 7
2,982,753 UART: [art] Extend RT PCRs Done
2,983,181 UART: [art] Lock RT PCRs Done
2,984,859 UART: [art] Populate DV Done
2,993,222 UART: [fht] FMC Alias Private Key: 7
2,994,252 UART: [art] Derive CDI
2,994,532 UART: [art] Store in in slot 0x4
3,080,189 UART: [art] Derive Key Pair
3,080,549 UART: [art] Store priv key in slot 0x5
3,093,743 UART: [art] Derive Key Pair - Done
3,108,581 UART: [art] Signing Cert with AUTHO
3,109,061 UART: RITY.KEYID = 7
3,124,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,292 UART: [art] PUB.X = 137EE95E4A4912880514A65D9643652603F813EE76994A34C4849FD50714C580A5AF4AAE96F57B55F957D8B04D436BC5
3,132,047 UART: [art] PUB.Y = CB41F669B946D783A758538DA67C7C57FA0C13F768101DFEB3EF387743AA4527FEC3443C51024446DD2C91D534DD0BB1
3,138,994 UART: [art] SIG.R = 1EB0F3EFBAA538E782D84D825C7005D3234AC13283E0882C39E464D9CF21B6558006A15BACF07AD32E24FF493A4A0943
3,145,761 UART: [art] SIG.S = 0C438B5401F3886BD0BD30DEE4084D967EB21845365AC199668E3F22FBFC7D839E6E908F26E23CBCDE18DB1B315110B5
3,169,665 UART: Caliptra RT
3,170,010 UART: [state] CFI Enabled
3,278,355 UART: [rt] RT listening for mailbox commands...
3,279,025 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,833 UART: [rt]cmd =0x50435252, len=8
3,310,505 >>> mbox cmd response data (8 bytes)
3,310,506 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,229 UART:
3,311,245 UART: Running Caliptra ROM ...
3,311,653 UART:
3,311,795 UART: [state] CFI Enabled
3,314,345 UART: [state] LifecycleState = Unprovisioned
3,315,000 UART: [state] DebugLocked = No
3,315,614 UART: [state] WD Timer not started. Device not locked for debugging
3,316,964 UART: [kat] SHA2-256
4,120,514 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,124,643 UART: [kat] ++
4,124,795 UART: [kat] sha1
4,128,915 UART: [kat] SHA2-256
4,130,855 UART: [kat] SHA2-384
4,133,572 UART: [kat] SHA2-512-ACC
4,135,472 UART: [kat] ECC-384
4,145,113 UART: [kat] HMAC-384Kdf
4,149,775 UART: [kat] LMS
4,398,087 UART: [kat] --
4,399,025 UART: [update-reset] ++
5,304,760 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,305,727 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,402,109 >>> mbox cmd response: success
5,402,109 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,402,286 UART: [update-reset] Copying MAN_2 To MAN_1
5,410,300 UART: [update-reset Success] --
5,411,381 UART: [state] Locking Datavault
5,412,089 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,693 UART: [state] Locking ICCM
5,413,309 UART: [exit] Launching FMC @ 0x40000130
5,418,638 UART:
5,418,654 UART: Running Caliptra FMC ...
5,419,062 UART:
5,419,205 UART: [state] CFI Enabled
5,508,054 UART: [art] Extend RT PCRs Done
5,508,482 UART: [art] Lock RT PCRs Done
5,509,599 UART: [art] Populate DV Done
5,518,002 UART: [fht] FMC Alias Private Key: 7
5,519,060 UART: [art] Derive CDI
5,519,340 UART: [art] Store in in slot 0x4
5,605,395 UART: [art] Derive Key Pair
5,605,755 UART: [art] Store priv key in slot 0x5
5,619,487 UART: [art] Derive Key Pair - Done
5,634,408 UART: [art] Signing Cert with AUTHO
5,634,888 UART: RITY.KEYID = 7
5,650,256 UART: [art] Erasing AUTHORITY.KEYID = 7
5,651,021 UART: [art] PUB.X = CF915C4C42E89F1C7C4BC8A148E694863BF964B6414A686D9295D7E3A227303A16019CC5B0A69C2C962BE4D7230AD4C6
5,657,789 UART: [art] PUB.Y = 7E83DD1D1A7F87A269A2CE6009C7F51AA49E5E5E57194ADC417BAB255299DDB9DCE39F25EBCB66E3D5D762CB928BD747
5,664,756 UART: [art] SIG.R = 13C6D89405878F5CE4D4056D20BAF8B3C96ACD9387FB2BF7F1D5B03F871356DEF4A73B33311F6A5338EE1DFBB90BD92E
5,671,533 UART: [art] SIG.S = 189BA464EB0638B3E48C5A7C513E9D5B0BE318E8370069AEDD86C44DCFF50CE22164D3B90EAD64E90F4762F0013DE68B
5,695,596 UART: mbox::rt_entry...
5,695,968 UART: ____ _ _ _ ____ _____
5,696,752 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,697,552 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,698,320 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,699,088 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,699,856 UART: |_|
5,700,168 UART:
5,979,940 UART: [rt] Runtime listening for mailbox commands...
5,980,987 >>> mbox cmd response data (128 bytes)
5,980,988 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,981,099 UART:
5,981,115 UART: Running Caliptra ROM ...
5,981,523 UART:
5,981,665 UART: [state] CFI Enabled
5,984,889 UART: [state] LifecycleState = Unprovisioned
5,985,544 UART: [state] DebugLocked = No
5,986,038 UART: [state] WD Timer not started. Device not locked for debugging
5,987,170 UART: [kat] SHA2-256
6,790,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,794,849 UART: [kat] ++
6,795,001 UART: [kat] sha1
6,799,241 UART: [kat] SHA2-256
6,801,181 UART: [kat] SHA2-384
6,803,926 UART: [kat] SHA2-512-ACC
6,805,826 UART: [kat] ECC-384
6,815,739 UART: [kat] HMAC-384Kdf
6,820,291 UART: [kat] LMS
7,068,603 UART: [kat] --
7,069,533 UART: [update-reset] ++
7,974,404 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,975,591 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,071,973 >>> mbox cmd response: success
8,071,973 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,072,248 UART: [update-reset] Copying MAN_2 To MAN_1
8,080,262 UART: [update-reset Success] --
8,081,017 UART: [state] Locking Datavault
8,081,815 UART: [state] Locking PCR0, PCR1 and PCR31
8,082,419 UART: [state] Locking ICCM
8,082,923 UART: [exit] Launching FMC @ 0x40000130
8,088,252 UART:
8,088,268 UART: Running Caliptra FMC ...
8,088,676 UART:
8,088,819 UART: [state] CFI Enabled
8,178,008 UART: [art] Extend RT PCRs Done
8,178,436 UART: [art] Lock RT PCRs Done
8,179,889 UART: [art] Populate DV Done
8,188,082 UART: [fht] FMC Alias Private Key: 7
8,189,198 UART: [art] Derive CDI
8,189,478 UART: [art] Store in in slot 0x4
8,274,607 UART: [art] Derive Key Pair
8,274,967 UART: [art] Store priv key in slot 0x5
8,288,591 UART: [art] Derive Key Pair - Done
8,303,263 UART: [art] Signing Cert with AUTHO
8,303,743 UART: RITY.KEYID = 7
8,318,681 UART: [art] Erasing AUTHORITY.KEYID = 7
8,319,446 UART: [art] PUB.X = D60EA311F4C1147EBE0D1D2A96EB7510AFDBC4B4D1120B10EC2D54AACCB364578ED0AB790B295721755752F1AFAD9118
8,326,220 UART: [art] PUB.Y = 39500FC4F282E5037BB166F7E65677FCD6EF075F092B10F02A2AAC2F43E1D98060B2728EEA62AABA0B7C1F96B40E830B
8,333,161 UART: [art] SIG.R = DEFB5E18D1A26D77E1BFF8092D0B33E885C8CA66B7D8C408F5C17CEDC47592DBFC98EA6E2E830356D3C5E8A75CC6487A
8,339,941 UART: [art] SIG.S = AE219050090EDF3E82B81454CD975F4ED46781A4B8B5986E6B32A794389D15BFE70D41FDEDD1525E6F56BC228596FB53
8,363,739 UART: mbox::rt_entry...
8,364,111 UART: ____ _ _ _ ____ _____
8,364,895 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,365,695 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,366,463 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,367,231 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,367,999 UART: |_|
8,368,311 UART:
8,650,648 UART: [rt] Runtime listening for mailbox commands...
8,651,695 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,493 ready_for_fw is high
1,056,493 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,032 >>> mbox cmd response: success
2,686,080 UART:
2,686,096 UART: Running Caliptra FMC ...
2,686,504 UART:
2,686,647 UART: [state] CFI Enabled
2,697,406 UART: [fht] FMC Alias Private Key: 7
2,805,075 UART: [art] Extend RT PCRs Done
2,805,503 UART: [art] Lock RT PCRs Done
2,806,537 UART: [art] Populate DV Done
2,814,518 UART: [fht] FMC Alias Private Key: 7
2,815,482 UART: [art] Derive CDI
2,815,762 UART: [art] Store in in slot 0x4
2,901,643 UART: [art] Derive Key Pair
2,902,003 UART: [art] Store priv key in slot 0x5
2,915,439 UART: [art] Derive Key Pair - Done
2,929,940 UART: [art] Signing Cert with AUTHO
2,930,420 UART: RITY.KEYID = 7
2,945,528 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,293 UART: [art] PUB.X = F1E693A66CEE0419CF7214B85965AF68729E4A38BCC244794C858EFE1FF49703016356DCBAA250D765028810FDFC55BA
2,953,057 UART: [art] PUB.Y = 54643C1AB6BADDD0579630D470BA1E90FA7AAB8BBCFA9EAA2BFF54A620E3B4DCA24DEDCEB448236E2ECBFD9C7C26B911
2,960,043 UART: [art] SIG.R = 7D7E211E5D2F35775F6295E677A5336B1163FD424A7904DBC791CEFFB100295EDA60D857B8377C90085171BA712EFF2B
2,966,787 UART: [art] SIG.S = 4986019E2D9C6EC33CC5F1A86D4F8D658EA26B0FF6094EF9900C0BF175259F20000F52AB438AD2B6A39D65B6BEBEC3B9
2,990,180 UART: Caliptra RT
2,990,525 UART: [state] CFI Enabled
3,097,944 UART: [rt] RT listening for mailbox commands...
3,098,614 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,380 UART: [rt]cmd =0x50435252, len=8
3,129,926 >>> mbox cmd response data (8 bytes)
3,129,927 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,103,217 >>> mbox cmd response: success
5,103,217 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,116,457 UART:
5,116,473 UART: Running Caliptra FMC ...
5,116,881 UART:
5,117,024 UART: [state] CFI Enabled
5,206,079 UART: [art] Extend RT PCRs Done
5,206,507 UART: [art] Lock RT PCRs Done
5,207,870 UART: [art] Populate DV Done
5,216,345 UART: [fht] FMC Alias Private Key: 7
5,217,375 UART: [art] Derive CDI
5,217,655 UART: [art] Store in in slot 0x4
5,303,694 UART: [art] Derive Key Pair
5,304,054 UART: [art] Store priv key in slot 0x5
5,317,234 UART: [art] Derive Key Pair - Done
5,332,351 UART: [art] Signing Cert with AUTHO
5,332,831 UART: RITY.KEYID = 7
5,347,801 UART: [art] Erasing AUTHORITY.KEYID = 7
5,348,566 UART: [art] PUB.X = 9B7CB897562570E2FC93FF7E2B132F293D217D3C8F986AF817A61E85521BF461DCF8B6CD6C8FBE37004F1B79E85B0F8A
5,355,323 UART: [art] PUB.Y = 22665B4915005602E458BE924E77E017EEC70D3F923F81EA2C1B2E4DA872A8647CE5D02CA1B6FDA071B7FD5DD1359336
5,362,251 UART: [art] SIG.R = 6BE76DA1460E0A67980EBF26CE35161E522ED83B91E72CC42C355D16BDF21980295F2D35ED416D6B3EC1ECE55A5A1DA4
5,369,026 UART: [art] SIG.S = C78E28A878149AAED0B90167F92909C6FF52B3F18001A67DFE9CE6FBF66DEB62FE301F79A4BF97DB556EE00D36A5A959
5,392,027 UART: mbox::rt_entry...
5,392,399 UART: ____ _ _ _ ____ _____
5,393,183 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,393,983 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,394,751 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,395,519 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,396,287 UART: |_|
5,396,599 UART:
5,677,745 UART: [rt] Runtime listening for mailbox commands...
5,678,792 >>> mbox cmd response data (128 bytes)
5,678,793 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,650,255 >>> mbox cmd response: success
7,650,255 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,663,499 UART:
7,663,515 UART: Running Caliptra FMC ...
7,663,923 UART:
7,664,066 UART: [state] CFI Enabled
7,752,463 UART: [art] Extend RT PCRs Done
7,752,891 UART: [art] Lock RT PCRs Done
7,754,138 UART: [art] Populate DV Done
7,762,543 UART: [fht] FMC Alias Private Key: 7
7,763,705 UART: [art] Derive CDI
7,763,985 UART: [art] Store in in slot 0x4
7,849,850 UART: [art] Derive Key Pair
7,850,210 UART: [art] Store priv key in slot 0x5
7,863,524 UART: [art] Derive Key Pair - Done
7,878,257 UART: [art] Signing Cert with AUTHO
7,878,737 UART: RITY.KEYID = 7
7,894,061 UART: [art] Erasing AUTHORITY.KEYID = 7
7,894,826 UART: [art] PUB.X = F4E2C9E67395B405649765A4A38DE5721E39E06F5FA8083C3E0665645A4CB2AD06A2444E640040118CFF2BCEE007C019
7,901,559 UART: [art] PUB.Y = 8573E2F21ED537D0D2670E0B7E1D053B801FD4B0C82C769E8ED309513C1B65659CAED7568710146C2E0D37E91B88CBEF
7,908,500 UART: [art] SIG.R = D236FD417E44E1A20A76A8877ABDEF0D2C7482AE51FE3FA72F63185F2247AB7A6778B6FBCA89C3114ADFD99544415CD0
7,915,278 UART: [art] SIG.S = B4668E4766CA745791F582475FA0980933D063F0E1F19E87B0F612B7D599F8ADF78940279B3601E34429E0DF31E54274
7,938,823 UART: mbox::rt_entry...
7,939,195 UART: ____ _ _ _ ____ _____
7,939,979 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,940,779 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,941,547 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,942,315 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,943,083 UART: |_|
7,943,395 UART:
8,224,802 UART: [rt] Runtime listening for mailbox commands...
8,225,849 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,265 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,783 UART: [kat] SHA2-256
881,714 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,829 UART: [kat] ++
885,981 UART: [kat] sha1
890,129 UART: [kat] SHA2-256
892,067 UART: [kat] SHA2-384
894,826 UART: [kat] SHA2-512-ACC
896,727 UART: [kat] ECC-384
902,274 UART: [kat] HMAC-384Kdf
906,904 UART: [kat] LMS
1,475,100 UART: [kat] --
1,475,953 UART: [cold-reset] ++
1,476,313 UART: [fht] Storing FHT @ 0x50003400
1,479,154 UART: [idev] ++
1,479,322 UART: [idev] CDI.KEYID = 6
1,479,682 UART: [idev] SUBJECT.KEYID = 7
1,480,106 UART: [idev] UDS.KEYID = 0
1,480,451 ready_for_fw is high
1,480,451 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,118 UART: [idev] Erasing UDS.KEYID = 0
1,504,838 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,504 UART: [idev] --
1,514,629 UART: [ldev] ++
1,514,797 UART: [ldev] CDI.KEYID = 6
1,515,160 UART: [ldev] SUBJECT.KEYID = 5
1,515,586 UART: [ldev] AUTHORITY.KEYID = 7
1,516,049 UART: [ldev] FE.KEYID = 1
1,521,093 UART: [ldev] Erasing FE.KEYID = 1
1,546,754 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,564 UART: [ldev] --
1,585,881 UART: [fwproc] Waiting for Commands...
1,586,740 UART: [fwproc] Received command 0x46574c44
1,587,531 UART: [fwproc] Received Image of size 114332 bytes
2,885,501 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,023 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,375 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,132 >>> mbox cmd response: success
3,079,374 UART: [afmc] ++
3,079,542 UART: [afmc] CDI.KEYID = 6
3,079,904 UART: [afmc] SUBJECT.KEYID = 7
3,080,329 UART: [afmc] AUTHORITY.KEYID = 5
3,116,054 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,404 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,184 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,912 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,797 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,487 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,488 UART: [afmc] --
3,159,436 UART: [cold-reset] --
3,160,410 UART: [state] Locking Datavault
3,161,699 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,303 UART: [state] Locking ICCM
3,162,845 UART: [exit] Launching FMC @ 0x40000130
3,168,174 UART:
3,168,190 UART: Running Caliptra FMC ...
3,168,598 UART:
3,168,652 UART: [state] CFI Enabled
3,179,009 UART: [fht] FMC Alias Private Key: 7
3,286,828 UART: [art] Extend RT PCRs Done
3,287,256 UART: [art] Lock RT PCRs Done
3,288,874 UART: [art] Populate DV Done
3,296,901 UART: [fht] FMC Alias Private Key: 7
3,297,995 UART: [art] Derive CDI
3,298,275 UART: [art] Store in in slot 0x4
3,383,730 UART: [art] Derive Key Pair
3,384,090 UART: [art] Store priv key in slot 0x5
3,397,316 UART: [art] Derive Key Pair - Done
3,412,007 UART: [art] Signing Cert with AUTHO
3,412,487 UART: RITY.KEYID = 7
3,427,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,332 UART: [art] PUB.X = 87C87C4B0E9D2155362AF4A59D2D272FE53375D5027AFBB36E164428FB1DB0F9143DEBAC13F27A347DA8DDFE932CBAA1
3,435,114 UART: [art] PUB.Y = C40A3E948AC4EC6256D8DB06B84F6F67C7BC5C1B4869BEA025821DAB4FEF2B9A2C71F4F8E4FDD67BC8ADC111919010BB
3,442,082 UART: [art] SIG.R = 8F81429BF9E431E2A6B3CA96D859D8F2149CA86794DE8CBFCF0565D2F6E50EFAFFCA1B9FD5BE87FAD8FC5BEE7E820B57
3,448,873 UART: [art] SIG.S = 540A684C52B6E207647C9472651826EB43A4804BB14D56C078E3EC1712CBF3B74F9F52DC4AF84561AC16D4101591A998
3,473,294 UART: Caliptra RT
3,473,547 UART: [state] CFI Enabled
3,581,564 UART: [rt] RT listening for mailbox commands...
3,582,234 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,643 UART:
3,583,659 UART: Running Caliptra ROM ...
3,584,067 UART:
3,584,121 UART: [state] CFI Enabled
3,587,045 UART: [state] LifecycleState = Unprovisioned
3,587,700 UART: [state] DebugLocked = No
3,588,314 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,589,999 UART: [kat] SHA2-256
4,383,930 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,388,045 UART: [kat] ++
4,388,197 UART: [kat] sha1
4,392,501 UART: [kat] SHA2-256
4,394,439 UART: [kat] SHA2-384
4,397,230 UART: [kat] SHA2-512-ACC
4,399,130 UART: [kat] ECC-384
4,404,601 UART: [kat] HMAC-384Kdf
4,409,249 UART: [kat] LMS
4,977,445 UART: [kat] --
4,978,718 UART: [update-reset] ++
5,904,454 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,905,702 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,002,136 >>> mbox cmd response: success
6,002,136 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,002,435 UART: [update-reset] Copying MAN_2 To MAN_1
6,010,449 UART: [update-reset Success] --
6,011,318 UART: [state] Locking Datavault
6,012,086 UART: [state] Locking PCR0, PCR1 and PCR31
6,012,690 UART: [state] Locking ICCM
6,013,196 UART: [exit] Launching FMC @ 0x40000130
6,018,525 UART:
6,018,541 UART: Running Caliptra FMC ...
6,018,949 UART:
6,019,003 UART: [state] CFI Enabled
6,108,058 UART: [art] Extend RT PCRs Done
6,108,486 UART: [art] Lock RT PCRs Done
6,109,607 UART: [art] Populate DV Done
6,117,894 UART: [fht] FMC Alias Private Key: 7
6,118,974 UART: [art] Derive CDI
6,119,254 UART: [art] Store in in slot 0x4
6,204,805 UART: [art] Derive Key Pair
6,205,165 UART: [art] Store priv key in slot 0x5
6,218,005 UART: [art] Derive Key Pair - Done
6,232,761 UART: [art] Signing Cert with AUTHO
6,233,241 UART: RITY.KEYID = 7
6,248,397 UART: [art] Erasing AUTHORITY.KEYID = 7
6,249,162 UART: [art] PUB.X = EF1253982A3EA56B2D4C910CA9A8100A2B8C5CF7E6132FA34C959E5E5E2678E5D64669FD3BD5B4EF616A06C8AC7FC4E0
6,255,939 UART: [art] PUB.Y = 104B19E33FFDD8544A1198ACA2105D1EA6C76435A05FC73004036D592EABD5D6537D01B9C03E2FA91DBECCC867E498B5
6,262,892 UART: [art] SIG.R = DE63D0F74EC3F0B3EDBAB2629487EDECBE19FBB4C5A9BA8B2E45BE4C1336DA38D529807E6AC123D0868C0C2A2DCA3095
6,269,685 UART: [art] SIG.S = 1DBC90850CEFFBF987B743909636E5E2B32D17C3BF795663759DDED87A24CEB020E00CC8274C7E7E396D6CF2FC94F6E5
6,293,902 UART: mbox::rt_entry...
6,294,274 UART: ____ _ _ _ ____ _____
6,295,058 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,295,858 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,296,626 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,297,394 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,298,162 UART: |_|
6,298,474 UART:
6,580,182 UART: [rt] Runtime listening for mailbox commands...
6,581,372 >>> mbox cmd response data (48 bytes)
6,581,373 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,581,481 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,815 ready_for_fw is high
1,362,815 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,242 >>> mbox cmd response: success
2,988,426 UART:
2,988,442 UART: Running Caliptra FMC ...
2,988,850 UART:
2,988,904 UART: [state] CFI Enabled
2,999,371 UART: [fht] FMC Alias Private Key: 7
3,106,972 UART: [art] Extend RT PCRs Done
3,107,400 UART: [art] Lock RT PCRs Done
3,108,894 UART: [art] Populate DV Done
3,116,995 UART: [fht] FMC Alias Private Key: 7
3,117,923 UART: [art] Derive CDI
3,118,203 UART: [art] Store in in slot 0x4
3,203,802 UART: [art] Derive Key Pair
3,204,162 UART: [art] Store priv key in slot 0x5
3,217,582 UART: [art] Derive Key Pair - Done
3,232,470 UART: [art] Signing Cert with AUTHO
3,232,950 UART: RITY.KEYID = 7
3,248,284 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,049 UART: [art] PUB.X = F68D9E3E2BD9C5B80D432E2BE53E9C653CD1ABAAEC5780A82AD91E3D5B7BDEDF1B31C546E9357A8546267DF6A9F5FE74
3,255,840 UART: [art] PUB.Y = 241F51E8DF7E0F88FBD09121C1B0A020B7C0CA718C733F8714E7ADA8ED285D857D483B993A9AF57F530041DAA68E7157
3,262,773 UART: [art] SIG.R = 718D62D637BD67FF84A7E23D643EE2807FB47396F640D4E93D92F3B58302DF5A65BD50A722B7688F2CDF0E80680B7526
3,269,536 UART: [art] SIG.S = 2F11F9FB1A8C89869A3D97EBA5E54098DB9095F2D5C9FE0BC50ADF4F237C7028C03D82CBF3E98D23EAB3239F3E0D60CA
3,293,702 UART: Caliptra RT
3,293,955 UART: [state] CFI Enabled
3,402,891 UART: [rt] RT listening for mailbox commands...
3,403,561 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,705,137 >>> mbox cmd response: success
5,705,137 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,718,228 UART:
5,718,244 UART: Running Caliptra FMC ...
5,718,652 UART:
5,718,706 UART: [state] CFI Enabled
5,807,913 UART: [art] Extend RT PCRs Done
5,808,341 UART: [art] Lock RT PCRs Done
5,809,420 UART: [art] Populate DV Done
5,817,527 UART: [fht] FMC Alias Private Key: 7
5,818,617 UART: [art] Derive CDI
5,818,897 UART: [art] Store in in slot 0x4
5,904,410 UART: [art] Derive Key Pair
5,904,770 UART: [art] Store priv key in slot 0x5
5,917,908 UART: [art] Derive Key Pair - Done
5,932,328 UART: [art] Signing Cert with AUTHO
5,932,808 UART: RITY.KEYID = 7
5,948,092 UART: [art] Erasing AUTHORITY.KEYID = 7
5,948,857 UART: [art] PUB.X = 73F4A5229B392EAD2BDD14BC80FA6B64A4BE59AC8B1EA02AD444CF8474964F4B3A662EE292637A0E90D78FDB6CFAD068
5,955,644 UART: [art] PUB.Y = 01F3081FB169C21C908576015744A7A4E9AEB7C3B765892E0AD83067C7A86A880AF038AB99F957FBE5A57E6D6BC473F6
5,962,583 UART: [art] SIG.R = EF54F44408F39D0DBC3B9A1002D97BDA3059CC5D5118D328A6AFDAB95E0CC5B3A9807AD3FBCC4BACDA66C48144B71972
5,969,363 UART: [art] SIG.S = C2855DA9C1C154C1E943BE03CEB95AF78DAF2E49CFE661B251FB14719C3745FF8ACA2A2317B326821BB4D12DC015F6C8
5,993,221 UART: mbox::rt_entry...
5,993,593 UART: ____ _ _ _ ____ _____
5,994,377 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,995,177 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,995,945 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,996,713 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,997,481 UART: |_|
5,997,793 UART:
6,283,380 UART: [rt] Runtime listening for mailbox commands...
6,284,570 >>> mbox cmd response data (48 bytes)
6,284,571 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,284,679 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
86,916 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,512 UART: [kat] SHA2-256
882,443 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,558 UART: [kat] ++
886,710 UART: [kat] sha1
890,868 UART: [kat] SHA2-256
892,806 UART: [kat] SHA2-384
895,553 UART: [kat] SHA2-512-ACC
897,454 UART: [kat] ECC-384
903,445 UART: [kat] HMAC-384Kdf
908,127 UART: [kat] LMS
1,476,323 UART: [kat] --
1,477,284 UART: [cold-reset] ++
1,477,724 UART: [fht] Storing FHT @ 0x50003400
1,480,471 UART: [idev] ++
1,480,639 UART: [idev] CDI.KEYID = 6
1,480,999 UART: [idev] SUBJECT.KEYID = 7
1,481,423 UART: [idev] UDS.KEYID = 0
1,481,768 ready_for_fw is high
1,481,768 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,495 UART: [idev] Erasing UDS.KEYID = 0
1,506,333 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,175 UART: [idev] --
1,516,302 UART: [ldev] ++
1,516,470 UART: [ldev] CDI.KEYID = 6
1,516,833 UART: [ldev] SUBJECT.KEYID = 5
1,517,259 UART: [ldev] AUTHORITY.KEYID = 7
1,517,722 UART: [ldev] FE.KEYID = 1
1,522,866 UART: [ldev] Erasing FE.KEYID = 1
1,548,277 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,295 UART: [ldev] --
1,587,714 UART: [fwproc] Waiting for Commands...
1,588,537 UART: [fwproc] Received command 0x46574c44
1,589,328 UART: [fwproc] Received Image of size 114332 bytes
2,886,960 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,350 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,702 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,597 >>> mbox cmd response: success
3,080,847 UART: [afmc] ++
3,081,015 UART: [afmc] CDI.KEYID = 6
3,081,377 UART: [afmc] SUBJECT.KEYID = 7
3,081,802 UART: [afmc] AUTHORITY.KEYID = 5
3,117,445 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,929 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,709 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,437 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,322 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,012 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,121 UART: [afmc] --
3,161,113 UART: [cold-reset] --
3,162,075 UART: [state] Locking Datavault
3,163,356 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,960 UART: [state] Locking ICCM
3,164,418 UART: [exit] Launching FMC @ 0x40000130
3,169,747 UART:
3,169,763 UART: Running Caliptra FMC ...
3,170,171 UART:
3,170,314 UART: [state] CFI Enabled
3,180,825 UART: [fht] FMC Alias Private Key: 7
3,289,434 UART: [art] Extend RT PCRs Done
3,289,862 UART: [art] Lock RT PCRs Done
3,291,122 UART: [art] Populate DV Done
3,299,685 UART: [fht] FMC Alias Private Key: 7
3,300,613 UART: [art] Derive CDI
3,300,893 UART: [art] Store in in slot 0x4
3,386,506 UART: [art] Derive Key Pair
3,386,866 UART: [art] Store priv key in slot 0x5
3,399,674 UART: [art] Derive Key Pair - Done
3,414,126 UART: [art] Signing Cert with AUTHO
3,414,606 UART: RITY.KEYID = 7
3,429,942 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,707 UART: [art] PUB.X = 2B5180385512425D198AF7ADB4F8AAEA5C1CB0D093062DBD4C6E2327D7903AD02903122859CE4D8C737425044DDC5723
3,437,468 UART: [art] PUB.Y = 23457C611E288809CEC6BA7F6B0A2B73C8A86FB25CD0910E2A39BF3BE9B5AC07BD1318ADA38F4A25D3E9F05DCFDCF5CE
3,444,432 UART: [art] SIG.R = CEE57066383B80A96454865E8B76AF52E587897DD2BCF77C2894FE816E7D7E9E47E0E0BDAC6F642405CDE8103B09E0AC
3,451,206 UART: [art] SIG.S = 85FCDEA05C0FC4B6E1D75E9E48F4FB7243E82EAE5D8CBC35FEA367A6E8DC8B442CBB2ABABD8F89C86CF4BB487ADC6CA3
3,475,252 UART: Caliptra RT
3,475,597 UART: [state] CFI Enabled
3,583,473 UART: [rt] RT listening for mailbox commands...
3,584,143 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,316 UART:
3,585,332 UART: Running Caliptra ROM ...
3,585,740 UART:
3,585,881 UART: [state] CFI Enabled
3,588,661 UART: [state] LifecycleState = Unprovisioned
3,589,316 UART: [state] DebugLocked = No
3,589,976 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,591,499 UART: [kat] SHA2-256
4,385,430 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,389,545 UART: [kat] ++
4,389,697 UART: [kat] sha1
4,393,985 UART: [kat] SHA2-256
4,395,923 UART: [kat] SHA2-384
4,398,504 UART: [kat] SHA2-512-ACC
4,400,404 UART: [kat] ECC-384
4,406,311 UART: [kat] HMAC-384Kdf
4,410,961 UART: [kat] LMS
4,979,157 UART: [kat] --
4,980,204 UART: [update-reset] ++
5,907,548 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,908,586 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,005,020 >>> mbox cmd response: success
6,005,020 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,005,369 UART: [update-reset] Copying MAN_2 To MAN_1
6,013,383 UART: [update-reset Success] --
6,014,242 UART: [state] Locking Datavault
6,015,182 UART: [state] Locking PCR0, PCR1 and PCR31
6,015,786 UART: [state] Locking ICCM
6,016,244 UART: [exit] Launching FMC @ 0x40000130
6,021,573 UART:
6,021,589 UART: Running Caliptra FMC ...
6,021,997 UART:
6,022,140 UART: [state] CFI Enabled
6,111,171 UART: [art] Extend RT PCRs Done
6,111,599 UART: [art] Lock RT PCRs Done
6,112,818 UART: [art] Populate DV Done
6,121,223 UART: [fht] FMC Alias Private Key: 7
6,122,317 UART: [art] Derive CDI
6,122,597 UART: [art] Store in in slot 0x4
6,208,526 UART: [art] Derive Key Pair
6,208,886 UART: [art] Store priv key in slot 0x5
6,222,280 UART: [art] Derive Key Pair - Done
6,237,135 UART: [art] Signing Cert with AUTHO
6,237,615 UART: RITY.KEYID = 7
6,253,045 UART: [art] Erasing AUTHORITY.KEYID = 7
6,253,810 UART: [art] PUB.X = 1DE5AEB23AA9458B3B9E3FECC2F38CC21D8222098B8D749A3876982F3B31BA60D6C62523B382E93736425E57CDFFC887
6,260,585 UART: [art] PUB.Y = 7A20A8651F9B310A07422D5D79DB54AA8BA2D0410D207DECDE8610B6B5EEADEDA2EDD8F39E58D5B7CCDAAEE1FA611492
6,267,554 UART: [art] SIG.R = 324AF0E4B79F3E19B35C76EB1AE3A5B935F912F8D232B2A48F85C1FE79225F235BFBF13630F3F647786F61AC73280A2C
6,274,329 UART: [art] SIG.S = 4E291D690F07FD06B44391F90FC7877F8FDE6D0B68422BE1E32BFF77280E4650C6F4FCB7B65E9E3B49B97EC5A108AB41
6,297,575 UART: mbox::rt_entry...
6,297,947 UART: ____ _ _ _ ____ _____
6,298,731 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,299,531 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,300,299 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,301,067 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,301,835 UART: |_|
6,302,147 UART:
6,583,460 UART: [rt] Runtime listening for mailbox commands...
6,584,650 >>> mbox cmd response data (48 bytes)
6,584,651 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,584,759 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,410 ready_for_fw is high
1,363,410 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,734 >>> mbox cmd response: success
2,991,478 UART:
2,991,494 UART: Running Caliptra FMC ...
2,991,902 UART:
2,992,045 UART: [state] CFI Enabled
3,002,576 UART: [fht] FMC Alias Private Key: 7
3,110,467 UART: [art] Extend RT PCRs Done
3,110,895 UART: [art] Lock RT PCRs Done
3,112,549 UART: [art] Populate DV Done
3,120,650 UART: [fht] FMC Alias Private Key: 7
3,121,646 UART: [art] Derive CDI
3,121,926 UART: [art] Store in in slot 0x4
3,207,425 UART: [art] Derive Key Pair
3,207,785 UART: [art] Store priv key in slot 0x5
3,221,483 UART: [art] Derive Key Pair - Done
3,235,945 UART: [art] Signing Cert with AUTHO
3,236,425 UART: RITY.KEYID = 7
3,252,061 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,826 UART: [art] PUB.X = DEE1E97D02699368E221BFC8F5843836886A8DC44F184B3EBB377BD3B86F0B22D9D9C6D5A4FE5CBF512E62E93FCCB434
3,259,606 UART: [art] PUB.Y = 0CD85DB2A51FA8B5F16091A4EF32E5276D2E933224F3C8E234302D9A259969D1073EC740DD763C5F4529D19104D843D9
3,266,545 UART: [art] SIG.R = 637A7722EF897470C9744CF00CFE244D43016821C51B49CAFD48476BBE9F35B0E9BF6FE6C7C65E21DDAA8532702465FA
3,273,317 UART: [art] SIG.S = 0876E58914EDFB95E5208C89DC7B0E572490A76DC1A257DA258C48DEEB24A3D415DF2E8F16362DE718CD4DC98BC86642
3,297,202 UART: Caliptra RT
3,297,547 UART: [state] CFI Enabled
3,404,375 UART: [rt] RT listening for mailbox commands...
3,405,045 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,706,234 >>> mbox cmd response: success
5,706,234 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,719,425 UART:
5,719,441 UART: Running Caliptra FMC ...
5,719,849 UART:
5,719,992 UART: [state] CFI Enabled
5,808,747 UART: [art] Extend RT PCRs Done
5,809,175 UART: [art] Lock RT PCRs Done
5,810,170 UART: [art] Populate DV Done
5,817,997 UART: [fht] FMC Alias Private Key: 7
5,819,131 UART: [art] Derive CDI
5,819,411 UART: [art] Store in in slot 0x4
5,904,964 UART: [art] Derive Key Pair
5,905,324 UART: [art] Store priv key in slot 0x5
5,918,850 UART: [art] Derive Key Pair - Done
5,933,935 UART: [art] Signing Cert with AUTHO
5,934,415 UART: RITY.KEYID = 7
5,949,163 UART: [art] Erasing AUTHORITY.KEYID = 7
5,949,928 UART: [art] PUB.X = BCC34F1BE650174A3CB4A11069EBAB20C512599D6F30AB60C67A7655F8673ED02830EC325D10155E91ED0770264FE1FA
5,956,701 UART: [art] PUB.Y = 07CF483DC00337D71D4A67CB1203BB82A964E8312C7D77E25A1D76AA1108EB4D022DD0DBD97C217014D36672D26FEB58
5,963,642 UART: [art] SIG.R = CDE9D6C50795C9AB2563CE67EACE44C9F3AAE35FADD5E39B2A0B8639D3FABA80C1887F453D2F93BA4177EB135E0CED72
5,970,429 UART: [art] SIG.S = 284D5D3B36F6D8F04A4B30FEC26197AD3F003F07232C40CB81DF6DE0911602073CF6B5631F1D91A7AF785FBC31AB0182
5,994,130 UART: mbox::rt_entry...
5,994,502 UART: ____ _ _ _ ____ _____
5,995,286 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,996,086 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,996,854 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,997,622 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,998,390 UART: |_|
5,998,702 UART:
6,282,762 UART: [rt] Runtime listening for mailbox commands...
6,283,952 >>> mbox cmd response data (48 bytes)
6,283,953 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,284,061 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,798 UART: [state] LifecycleState = Unprovisioned
85,453 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,260 UART: [kat] SHA2-256
892,910 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,035 UART: [kat] ++
897,187 UART: [kat] sha1
901,467 UART: [kat] SHA2-256
903,407 UART: [kat] SHA2-384
905,962 UART: [kat] SHA2-512-ACC
907,863 UART: [kat] ECC-384
917,594 UART: [kat] HMAC-384Kdf
921,998 UART: [kat] LMS
1,170,326 UART: [kat] --
1,171,405 UART: [cold-reset] ++
1,171,821 UART: [fht] FHT @ 0x50003400
1,174,386 UART: [idev] ++
1,174,554 UART: [idev] CDI.KEYID = 6
1,174,914 UART: [idev] SUBJECT.KEYID = 7
1,175,338 UART: [idev] UDS.KEYID = 0
1,175,683 ready_for_fw is high
1,175,683 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,534 UART: [idev] Erasing UDS.KEYID = 0
1,200,391 UART: [idev] Sha1 KeyId Algorithm
1,208,959 UART: [idev] --
1,210,039 UART: [ldev] ++
1,210,207 UART: [ldev] CDI.KEYID = 6
1,210,570 UART: [ldev] SUBJECT.KEYID = 5
1,210,996 UART: [ldev] AUTHORITY.KEYID = 7
1,211,459 UART: [ldev] FE.KEYID = 1
1,216,581 UART: [ldev] Erasing FE.KEYID = 1
1,242,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,219 UART: [ldev] --
1,281,570 UART: [fwproc] Wait for Commands...
1,282,312 UART: [fwproc] Recv command 0x46574c44
1,283,040 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,523 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,168 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,983 >>> mbox cmd response: success
2,774,141 UART: [afmc] ++
2,774,309 UART: [afmc] CDI.KEYID = 6
2,774,671 UART: [afmc] SUBJECT.KEYID = 7
2,775,096 UART: [afmc] AUTHORITY.KEYID = 5
2,810,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,678 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,426 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,154 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,039 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,758 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,696 UART: [afmc] --
2,853,740 UART: [cold-reset] --
2,854,514 UART: [state] Locking Datavault
2,855,797 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,401 UART: [state] Locking ICCM
2,856,915 UART: [exit] Launching FMC @ 0x40000130
2,862,244 UART:
2,862,260 UART: Running Caliptra FMC ...
2,862,668 UART:
2,862,722 UART: [state] CFI Enabled
2,873,073 UART: [fht] FMC Alias Private Key: 7
2,980,382 UART: [art] Extend RT PCRs Done
2,980,810 UART: [art] Lock RT PCRs Done
2,982,334 UART: [art] Populate DV Done
2,990,953 UART: [fht] FMC Alias Private Key: 7
2,991,957 UART: [art] Derive CDI
2,992,237 UART: [art] Store in in slot 0x4
3,077,780 UART: [art] Derive Key Pair
3,078,140 UART: [art] Store priv key in slot 0x5
3,091,260 UART: [art] Derive Key Pair - Done
3,106,311 UART: [art] Signing Cert with AUTHO
3,106,791 UART: RITY.KEYID = 7
3,122,323 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,088 UART: [art] PUB.X = 05A9F141E005AD7DD19DEE8D00BC218C5ED95868138E118F042AD4CA67BB48F8CC422D826956057B42D7FA7751338B4B
3,129,830 UART: [art] PUB.Y = 0795CEB38C5FBE92136704B90192E2F64781FE2D85F7A2C054F511AC2C00047101ACF79A18276067D82ECA5DA90AD0C4
3,136,744 UART: [art] SIG.R = 05C0B8F4AAE7C17ED826819E29F297D6530517433A875DDA6E68BB15B73480FFF7021D3B88CBADE404E4C4259EDBDE7B
3,143,516 UART: [art] SIG.S = CA1DFBE24136EAAED93B2A390E8AD1D72E20CFF5731251491C1AF9C95614EFD0D0F35CF3BF7F52F2A73E749230F87DAA
3,167,322 UART: Caliptra RT
3,167,575 UART: [state] CFI Enabled
3,275,446 UART: [rt] RT listening for mailbox commands...
3,276,116 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,660 UART:
3,277,676 UART: Running Caliptra ROM ...
3,278,084 UART:
3,278,139 UART: [state] CFI Enabled
3,280,209 UART: [state] LifecycleState = Unprovisioned
3,280,864 UART: [state] DebugLocked = No
3,281,528 UART: [state] WD Timer not started. Device not locked for debugging
3,282,680 UART: [kat] SHA2-256
4,088,330 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,092,455 UART: [kat] ++
4,092,607 UART: [kat] sha1
4,096,869 UART: [kat] SHA2-256
4,098,809 UART: [kat] SHA2-384
4,101,472 UART: [kat] SHA2-512-ACC
4,103,372 UART: [kat] ECC-384
4,113,163 UART: [kat] HMAC-384Kdf
4,117,719 UART: [kat] LMS
4,366,047 UART: [kat] --
4,366,911 UART: [update-reset] ++
5,270,447 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,271,614 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,367,996 >>> mbox cmd response: success
5,367,996 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,368,339 UART: [update-reset] Copying MAN_2 To MAN_1
5,376,353 UART: [update-reset Success] --
5,377,116 UART: [state] Locking Datavault
5,377,948 UART: [state] Locking PCR0, PCR1 and PCR31
5,378,552 UART: [state] Locking ICCM
5,378,990 UART: [exit] Launching FMC @ 0x40000130
5,384,319 UART:
5,384,335 UART: Running Caliptra FMC ...
5,384,743 UART:
5,384,797 UART: [state] CFI Enabled
5,473,310 UART: [art] Extend RT PCRs Done
5,473,738 UART: [art] Lock RT PCRs Done
5,475,133 UART: [art] Populate DV Done
5,483,314 UART: [fht] FMC Alias Private Key: 7
5,484,362 UART: [art] Derive CDI
5,484,642 UART: [art] Store in in slot 0x4
5,570,459 UART: [art] Derive Key Pair
5,570,819 UART: [art] Store priv key in slot 0x5
5,584,463 UART: [art] Derive Key Pair - Done
5,599,610 UART: [art] Signing Cert with AUTHO
5,600,090 UART: RITY.KEYID = 7
5,615,186 UART: [art] Erasing AUTHORITY.KEYID = 7
5,615,951 UART: [art] PUB.X = B76B7323705A7552B76581703232589775A425422D99C185815BFD371F7ABA261D0214EB57C8481ED83D3B067ABC6BD2
5,622,707 UART: [art] PUB.Y = 989E424B01756B5EDF8103522D858D6A56D7B3A4F13DBED4F486F96B8E3043880358E6A0DE9AB0C7EAFB055A750A3A1C
5,629,652 UART: [art] SIG.R = 66687A71E5B2C30BD542A5B36FC7C06B87E2E851E7A9D166035D01D1E9F4B43383C03C9FFFC6833D3BE0FDD712667D96
5,636,421 UART: [art] SIG.S = 7659C408FE99177D13E19A98448DE82FE0253ECA02342BEAC4D6AF8FD4796FF84E2FA2B2B6F0789DC5C97FF3025ED0C6
5,660,737 UART: mbox::rt_entry...
5,661,109 UART: ____ _ _ _ ____ _____
5,661,893 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,662,693 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,663,461 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,664,229 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,664,997 UART: |_|
5,665,309 UART:
5,949,935 UART: [rt] Runtime listening for mailbox commands...
5,951,125 >>> mbox cmd response data (48 bytes)
5,951,126 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,951,234 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,853 ready_for_fw is high
1,060,853 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,478 >>> mbox cmd response: success
2,688,138 UART:
2,688,154 UART: Running Caliptra FMC ...
2,688,562 UART:
2,688,616 UART: [state] CFI Enabled
2,699,207 UART: [fht] FMC Alias Private Key: 7
2,807,352 UART: [art] Extend RT PCRs Done
2,807,780 UART: [art] Lock RT PCRs Done
2,809,246 UART: [art] Populate DV Done
2,817,403 UART: [fht] FMC Alias Private Key: 7
2,818,573 UART: [art] Derive CDI
2,818,853 UART: [art] Store in in slot 0x4
2,904,532 UART: [art] Derive Key Pair
2,904,892 UART: [art] Store priv key in slot 0x5
2,917,556 UART: [art] Derive Key Pair - Done
2,932,254 UART: [art] Signing Cert with AUTHO
2,932,734 UART: RITY.KEYID = 7
2,947,382 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,147 UART: [art] PUB.X = 8FE48813B3608E092649FCB7293A540E316F073E7CFFDE80D33FF71567E0278ACD7A08BFBB5719F5A9791857AF82D8BE
2,954,913 UART: [art] PUB.Y = F6FAD464E69B9A733427A43580D33C13D7D20DAADC11939BC0E630D62B878B95A8D4E641A1839E301429530855C4E114
2,961,855 UART: [art] SIG.R = DEA28194BA2F0115B0BFAE7A60A7164144027765488EB82626F2A4DCF35AA1CDA239D7EC4BED9DAF05AFA49225A3B15E
2,968,634 UART: [art] SIG.S = A2F57AF17692F022AA45D03934BF4B6C83DD001C255A6B6B466035EA9FB8892B65A02A5438488CABEFBD6CF85C35BA7E
2,992,551 UART: Caliptra RT
2,992,804 UART: [state] CFI Enabled
3,099,854 UART: [rt] RT listening for mailbox commands...
3,100,524 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,078,267 >>> mbox cmd response: success
5,078,267 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,091,279 UART:
5,091,295 UART: Running Caliptra FMC ...
5,091,703 UART:
5,091,757 UART: [state] CFI Enabled
5,180,974 UART: [art] Extend RT PCRs Done
5,181,402 UART: [art] Lock RT PCRs Done
5,182,677 UART: [art] Populate DV Done
5,191,168 UART: [fht] FMC Alias Private Key: 7
5,192,184 UART: [art] Derive CDI
5,192,464 UART: [art] Store in in slot 0x4
5,277,891 UART: [art] Derive Key Pair
5,278,251 UART: [art] Store priv key in slot 0x5
5,291,707 UART: [art] Derive Key Pair - Done
5,306,837 UART: [art] Signing Cert with AUTHO
5,307,317 UART: RITY.KEYID = 7
5,322,297 UART: [art] Erasing AUTHORITY.KEYID = 7
5,323,062 UART: [art] PUB.X = 2CD8CBC815FE5EA9BCD606E927E01FE1D1E0ADF6EA00431BAEDB935C878D829E48C1C948E6FE055F1D7F3F763FE98B29
5,329,828 UART: [art] PUB.Y = A9FE1BD217781C0EE8DFE48090267ADD42CB0FCFDC106C03531D07BF272B2443C213DF3F40E1AA439D783E119FC6FA14
5,336,782 UART: [art] SIG.R = B3A66F9037A1AF0C176C6BB958FC2C075ED05F5BD4C03CD20FDC6EEB33386996E1576EEAB3D715FA92CFB9C6F9FC64F1
5,343,567 UART: [art] SIG.S = 5699AF2079F5B3EE23A222EC785EB850F75275991DC93EE63337287EF6274C202A28B8F49DDBBC68A4934A341AF43EB3
5,367,316 UART: mbox::rt_entry...
5,367,688 UART: ____ _ _ _ ____ _____
5,368,472 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,369,272 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,370,040 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,370,808 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,371,576 UART: |_|
5,371,888 UART:
5,655,654 UART: [rt] Runtime listening for mailbox commands...
5,656,844 >>> mbox cmd response data (48 bytes)
5,656,845 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,656,953 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
86,914 UART: [state] WD Timer not started. Device not locked for debugging
88,161 UART: [kat] SHA2-256
893,811 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,936 UART: [kat] ++
898,088 UART: [kat] sha1
902,420 UART: [kat] SHA2-256
904,360 UART: [kat] SHA2-384
907,199 UART: [kat] SHA2-512-ACC
909,100 UART: [kat] ECC-384
919,105 UART: [kat] HMAC-384Kdf
923,711 UART: [kat] LMS
1,172,039 UART: [kat] --
1,172,784 UART: [cold-reset] ++
1,173,342 UART: [fht] FHT @ 0x50003400
1,175,933 UART: [idev] ++
1,176,101 UART: [idev] CDI.KEYID = 6
1,176,461 UART: [idev] SUBJECT.KEYID = 7
1,176,885 UART: [idev] UDS.KEYID = 0
1,177,230 ready_for_fw is high
1,177,230 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,727 UART: [idev] Erasing UDS.KEYID = 0
1,201,726 UART: [idev] Sha1 KeyId Algorithm
1,210,172 UART: [idev] --
1,211,224 UART: [ldev] ++
1,211,392 UART: [ldev] CDI.KEYID = 6
1,211,755 UART: [ldev] SUBJECT.KEYID = 5
1,212,181 UART: [ldev] AUTHORITY.KEYID = 7
1,212,644 UART: [ldev] FE.KEYID = 1
1,218,030 UART: [ldev] Erasing FE.KEYID = 1
1,244,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,326 UART: [ldev] --
1,283,759 UART: [fwproc] Wait for Commands...
1,284,405 UART: [fwproc] Recv command 0x46574c44
1,285,133 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,651 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,955 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,662 >>> mbox cmd response: success
2,775,832 UART: [afmc] ++
2,776,000 UART: [afmc] CDI.KEYID = 6
2,776,362 UART: [afmc] SUBJECT.KEYID = 7
2,776,787 UART: [afmc] AUTHORITY.KEYID = 5
2,812,296 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,933 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,681 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,409 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,294 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,013 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,905 UART: [afmc] --
2,855,783 UART: [cold-reset] --
2,856,395 UART: [state] Locking Datavault
2,857,606 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,210 UART: [state] Locking ICCM
2,858,684 UART: [exit] Launching FMC @ 0x40000130
2,864,013 UART:
2,864,029 UART: Running Caliptra FMC ...
2,864,437 UART:
2,864,580 UART: [state] CFI Enabled
2,875,219 UART: [fht] FMC Alias Private Key: 7
2,983,346 UART: [art] Extend RT PCRs Done
2,983,774 UART: [art] Lock RT PCRs Done
2,985,020 UART: [art] Populate DV Done
2,993,065 UART: [fht] FMC Alias Private Key: 7
2,994,017 UART: [art] Derive CDI
2,994,297 UART: [art] Store in in slot 0x4
3,079,834 UART: [art] Derive Key Pair
3,080,194 UART: [art] Store priv key in slot 0x5
3,093,624 UART: [art] Derive Key Pair - Done
3,108,407 UART: [art] Signing Cert with AUTHO
3,108,887 UART: RITY.KEYID = 7
3,123,989 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,754 UART: [art] PUB.X = EE3D9BE27D716DE835DE190E425DFD05ED693598F874C1E59DCC5450A3115BB112442C5091D0531DD561DA2FD84A73D9
3,131,526 UART: [art] PUB.Y = 00CE93D59E2B68B902E0A9CF2D0DAA82769DBA5A3E047B433863B9FF7C0545F044817E36C13D1E1C530CD2CBB701D3F9
3,138,448 UART: [art] SIG.R = 12E7709DF3E1E43B46C514BC76A6D832159AABC0FEC7AE49A110498EAF19864EB3EAB19845B4B710342AEDC15046F610
3,145,228 UART: [art] SIG.S = CD6BC1150756C497F585C4723673B6CE31499725067A4F02E25F943CABD37C4141B3682244196527F8CC986F2569B157
3,169,034 UART: Caliptra RT
3,169,379 UART: [state] CFI Enabled
3,276,074 UART: [rt] RT listening for mailbox commands...
3,276,744 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,896 UART:
3,277,912 UART: Running Caliptra ROM ...
3,278,320 UART:
3,278,462 UART: [state] CFI Enabled
3,280,854 UART: [state] LifecycleState = Unprovisioned
3,281,509 UART: [state] DebugLocked = No
3,282,197 UART: [state] WD Timer not started. Device not locked for debugging
3,283,399 UART: [kat] SHA2-256
4,089,049 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,093,174 UART: [kat] ++
4,093,326 UART: [kat] sha1
4,097,618 UART: [kat] SHA2-256
4,099,558 UART: [kat] SHA2-384
4,102,109 UART: [kat] SHA2-512-ACC
4,104,009 UART: [kat] ECC-384
4,113,492 UART: [kat] HMAC-384Kdf
4,117,976 UART: [kat] LMS
4,366,304 UART: [kat] --
4,367,236 UART: [update-reset] ++
5,273,498 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,274,603 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,370,985 >>> mbox cmd response: success
5,370,985 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,371,102 UART: [update-reset] Copying MAN_2 To MAN_1
5,379,116 UART: [update-reset Success] --
5,380,219 UART: [state] Locking Datavault
5,381,093 UART: [state] Locking PCR0, PCR1 and PCR31
5,381,697 UART: [state] Locking ICCM
5,382,213 UART: [exit] Launching FMC @ 0x40000130
5,387,542 UART:
5,387,558 UART: Running Caliptra FMC ...
5,387,966 UART:
5,388,109 UART: [state] CFI Enabled
5,477,738 UART: [art] Extend RT PCRs Done
5,478,166 UART: [art] Lock RT PCRs Done
5,479,429 UART: [art] Populate DV Done
5,487,662 UART: [fht] FMC Alias Private Key: 7
5,488,596 UART: [art] Derive CDI
5,488,876 UART: [art] Store in in slot 0x4
5,574,651 UART: [art] Derive Key Pair
5,575,011 UART: [art] Store priv key in slot 0x5
5,587,953 UART: [art] Derive Key Pair - Done
5,602,665 UART: [art] Signing Cert with AUTHO
5,603,145 UART: RITY.KEYID = 7
5,618,369 UART: [art] Erasing AUTHORITY.KEYID = 7
5,619,134 UART: [art] PUB.X = A14A51AA1E1A032AD0260D779AB5924DC58038283FB3204D710CCEE9D36D667730AD542B9248F0D249698C95E5F15DC9
5,625,897 UART: [art] PUB.Y = 6B4B3F18D714A9D13EDBE33932823A583B61CF9C2D1C11126B78058D1A9B7C6AFA02D2DA0E3C0041F3BD14E41F94C1B3
5,632,828 UART: [art] SIG.R = C73AF3210D93F6AE73F7D8D0BE8F7C67081918F266D703C60132C965C26622A730E873E6B599A17CD13141437DC8F6C0
5,639,584 UART: [art] SIG.S = E827B11E618ABB6026A1FADE1EDBC22DF9D42D38E128770E5794211CE408A7C36312C7A35DAD55C9BE41933F21CF718D
5,663,099 UART: mbox::rt_entry...
5,663,471 UART: ____ _ _ _ ____ _____
5,664,255 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,665,055 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,665,823 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,666,591 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,667,359 UART: |_|
5,667,671 UART:
5,949,672 UART: [rt] Runtime listening for mailbox commands...
5,950,862 >>> mbox cmd response data (48 bytes)
5,950,863 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,950,971 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,184 ready_for_fw is high
1,060,184 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,787 >>> mbox cmd response: success
2,687,633 UART:
2,687,649 UART: Running Caliptra FMC ...
2,688,057 UART:
2,688,200 UART: [state] CFI Enabled
2,698,705 UART: [fht] FMC Alias Private Key: 7
2,806,500 UART: [art] Extend RT PCRs Done
2,806,928 UART: [art] Lock RT PCRs Done
2,808,360 UART: [art] Populate DV Done
2,816,409 UART: [fht] FMC Alias Private Key: 7
2,817,517 UART: [art] Derive CDI
2,817,797 UART: [art] Store in in slot 0x4
2,903,670 UART: [art] Derive Key Pair
2,904,030 UART: [art] Store priv key in slot 0x5
2,917,606 UART: [art] Derive Key Pair - Done
2,931,931 UART: [art] Signing Cert with AUTHO
2,932,411 UART: RITY.KEYID = 7
2,947,515 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,280 UART: [art] PUB.X = EDD5B51575D5F5B3ABAA5FF28520A4DF532A84252896DEC5E0F9F4BE432ADBED3739FBCC783A06388CE6055661803743
2,955,056 UART: [art] PUB.Y = 7BD31F74B0AEA1EFEDC1D03305B4E890297B818B3444B97346AB365F209E03A699396F02E3DD269D5B34C7C79EFB9E9C
2,962,007 UART: [art] SIG.R = D2CEB96CBB1118A2E24CE81B8F64BF66D48818B56BD41C2A7C43EEE40147360C0A6C94FE29BCE82A92F3C7940CC28FD6
2,968,783 UART: [art] SIG.S = C207F4BA6F1E63ECE858B161385FBF5F800A1D373E8D23D12E3D5A433B573EFD47A7AF8B559794946D922C57289B5D22
2,992,188 UART: Caliptra RT
2,992,533 UART: [state] CFI Enabled
3,099,929 UART: [rt] RT listening for mailbox commands...
3,100,599 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,077,101 >>> mbox cmd response: success
5,077,101 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,090,483 UART:
5,090,499 UART: Running Caliptra FMC ...
5,090,907 UART:
5,091,050 UART: [state] CFI Enabled
5,179,685 UART: [art] Extend RT PCRs Done
5,180,113 UART: [art] Lock RT PCRs Done
5,181,352 UART: [art] Populate DV Done
5,189,475 UART: [fht] FMC Alias Private Key: 7
5,190,577 UART: [art] Derive CDI
5,190,857 UART: [art] Store in in slot 0x4
5,276,432 UART: [art] Derive Key Pair
5,276,792 UART: [art] Store priv key in slot 0x5
5,290,386 UART: [art] Derive Key Pair - Done
5,304,963 UART: [art] Signing Cert with AUTHO
5,305,443 UART: RITY.KEYID = 7
5,320,565 UART: [art] Erasing AUTHORITY.KEYID = 7
5,321,330 UART: [art] PUB.X = A1BE7F05F1DD568948C65C6C7BA596E7BFC223834CCC483F3F628ED7564DCB1D2F52A74B652B7DC35E61CF89B8A7BAAB
5,328,119 UART: [art] PUB.Y = 4D22BC467F708046A070C49CE60894338F1D57F66F4D1F68CABC9589F5A594B9331635F3707413A88F2483AD5A9A08F1
5,335,059 UART: [art] SIG.R = 787D48FE1C2ACA819AEA0ED0F48ADB413B4D9B4AE59B2584E30E4044052A3F366F53EFF3696805EB58F85B23757D19B7
5,341,827 UART: [art] SIG.S = D4C9965CF76AAEE24F5D42A301FC2B30063C9D9FB38ECA4736EC4E8CBD00C880B250E1A72F119DAF5969071393D92B99
5,365,927 UART: mbox::rt_entry...
5,366,299 UART: ____ _ _ _ ____ _____
5,367,083 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,367,883 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,368,651 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,369,419 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,370,187 UART: |_|
5,370,499 UART:
5,651,343 UART: [rt] Runtime listening for mailbox commands...
5,652,533 >>> mbox cmd response data (48 bytes)
5,652,534 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,652,642 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,625 UART: [state] WD Timer not started. Device not locked for debugging
87,966 UART: [kat] SHA2-256
891,516 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,645 UART: [kat] ++
895,797 UART: [kat] sha1
900,023 UART: [kat] SHA2-256
901,963 UART: [kat] SHA2-384
904,794 UART: [kat] SHA2-512-ACC
906,695 UART: [kat] ECC-384
916,228 UART: [kat] HMAC-384Kdf
920,896 UART: [kat] LMS
1,169,208 UART: [kat] --
1,170,025 UART: [cold-reset] ++
1,170,393 UART: [fht] FHT @ 0x50003400
1,173,073 UART: [idev] ++
1,173,241 UART: [idev] CDI.KEYID = 6
1,173,602 UART: [idev] SUBJECT.KEYID = 7
1,174,027 UART: [idev] UDS.KEYID = 0
1,174,373 ready_for_fw is high
1,174,373 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,109 UART: [idev] Erasing UDS.KEYID = 0
1,199,591 UART: [idev] Sha1 KeyId Algorithm
1,208,461 UART: [idev] --
1,209,344 UART: [ldev] ++
1,209,512 UART: [ldev] CDI.KEYID = 6
1,209,876 UART: [ldev] SUBJECT.KEYID = 5
1,210,303 UART: [ldev] AUTHORITY.KEYID = 7
1,210,766 UART: [ldev] FE.KEYID = 1
1,216,130 UART: [ldev] Erasing FE.KEYID = 1
1,242,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,366 UART: [ldev] --
1,281,780 UART: [fwproc] Wait for Commands...
1,282,439 UART: [fwproc] Recv command 0x46574c44
1,283,172 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,954 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,080 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,389 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,207 >>> mbox cmd response: success
2,775,324 UART: [afmc] ++
2,775,492 UART: [afmc] CDI.KEYID = 6
2,775,855 UART: [afmc] SUBJECT.KEYID = 7
2,776,281 UART: [afmc] AUTHORITY.KEYID = 5
2,812,148 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,396 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,147 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,876 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,759 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,478 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,403 UART: [afmc] --
2,855,427 UART: [cold-reset] --
2,856,151 UART: [state] Locking Datavault
2,857,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,734 UART: [state] Locking ICCM
2,858,234 UART: [exit] Launching FMC @ 0x40000130
2,863,563 UART:
2,863,579 UART: Running Caliptra FMC ...
2,863,987 UART:
2,864,041 UART: [state] CFI Enabled
2,874,738 UART: [fht] FMC Alias Private Key: 7
2,982,799 UART: [art] Extend RT PCRs Done
2,983,227 UART: [art] Lock RT PCRs Done
2,984,475 UART: [art] Populate DV Done
2,992,414 UART: [fht] FMC Alias Private Key: 7
2,993,380 UART: [art] Derive CDI
2,993,660 UART: [art] Store in in slot 0x4
3,079,245 UART: [art] Derive Key Pair
3,079,605 UART: [art] Store priv key in slot 0x5
3,092,809 UART: [art] Derive Key Pair - Done
3,107,358 UART: [art] Signing Cert with AUTHO
3,107,838 UART: RITY.KEYID = 7
3,123,186 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,951 UART: [art] PUB.X = DC6E43402A63843B59CEFB9A56DC360A94E687775831966BC7A40DF9DB3CFED39A0BEEF7AE657680284E4C5201F3B5D3
3,130,721 UART: [art] PUB.Y = 00AE390C5C5FCA0002F1DF71E4E86C3F1D8CB408CBC6B0C600F3051EDF13B340627FF8BB0F5666FED9982C13F3F9621F
3,137,606 UART: [art] SIG.R = 4245AB82A830A6A1AC9656C8D25BF57F37F15A0AC03C3717B0111C17EBFD5605E22C74284D40CB4720A993B7FBF2CE2A
3,144,380 UART: [art] SIG.S = 6F4C2A253D8AF008375BE1DF56200BC72621A2D29166FB32368B520EBE5C063159034125910C9B748EFD46194D0DBEF4
3,167,920 UART: Caliptra RT
3,168,173 UART: [state] CFI Enabled
3,275,656 UART: [rt] RT listening for mailbox commands...
3,276,326 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,248 UART:
3,277,264 UART: Running Caliptra ROM ...
3,277,672 UART:
3,277,727 UART: [state] CFI Enabled
3,279,877 UART: [state] LifecycleState = Unprovisioned
3,280,532 UART: [state] DebugLocked = No
3,281,226 UART: [state] WD Timer not started. Device not locked for debugging
3,282,414 UART: [kat] SHA2-256
4,085,964 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,090,093 UART: [kat] ++
4,090,245 UART: [kat] sha1
4,094,473 UART: [kat] SHA2-256
4,096,413 UART: [kat] SHA2-384
4,099,204 UART: [kat] SHA2-512-ACC
4,101,104 UART: [kat] ECC-384
4,110,887 UART: [kat] HMAC-384Kdf
4,115,559 UART: [kat] LMS
4,363,871 UART: [kat] --
4,364,829 UART: [update-reset] ++
5,269,806 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,270,909 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,367,291 >>> mbox cmd response: success
5,367,291 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,367,428 UART: [update-reset] Copying MAN_2 To MAN_1
5,375,442 UART: [update-reset Success] --
5,376,459 UART: [state] Locking Datavault
5,377,289 UART: [state] Locking PCR0, PCR1 and PCR31
5,377,893 UART: [state] Locking ICCM
5,378,559 UART: [exit] Launching FMC @ 0x40000130
5,383,888 UART:
5,383,904 UART: Running Caliptra FMC ...
5,384,312 UART:
5,384,366 UART: [state] CFI Enabled
5,473,353 UART: [art] Extend RT PCRs Done
5,473,781 UART: [art] Lock RT PCRs Done
5,475,188 UART: [art] Populate DV Done
5,483,345 UART: [fht] FMC Alias Private Key: 7
5,484,481 UART: [art] Derive CDI
5,484,761 UART: [art] Store in in slot 0x4
5,570,582 UART: [art] Derive Key Pair
5,570,942 UART: [art] Store priv key in slot 0x5
5,583,424 UART: [art] Derive Key Pair - Done
5,598,299 UART: [art] Signing Cert with AUTHO
5,598,779 UART: RITY.KEYID = 7
5,613,563 UART: [art] Erasing AUTHORITY.KEYID = 7
5,614,328 UART: [art] PUB.X = 52D58AADC74B676A2D785A13F6EB7A2155214138F4461FF6EE2B464B93A0777955A582EDDED92D5CCC3E4F3CF556AD45
5,621,110 UART: [art] PUB.Y = 2197C68571CD27563E161C03CD969C95E53313E440AA7205B160A2E94887D834D0E96AB36DD5580C393ED1C8A6430025
5,628,021 UART: [art] SIG.R = 456F3CBEEF68E0D895C1BCF4738BD82C36A7A58889F6E63AF5BEF0453D7DBF9F29484FF5071929781CDAC940A240FFCA
5,634,806 UART: [art] SIG.S = 77A9D4D59CD1D6C334EFA82987B1B7E33519330E75BF1837BDB7B2F4F0BDEB7B4BE4E3E9195BFF73F80FFAE7A750D770
5,657,817 UART: mbox::rt_entry...
5,658,189 UART: ____ _ _ _ ____ _____
5,658,973 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,659,773 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,660,541 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,661,309 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,662,077 UART: |_|
5,662,389 UART:
5,939,261 UART: [rt] Runtime listening for mailbox commands...
5,940,451 >>> mbox cmd response data (48 bytes)
5,940,452 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,940,560 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,084 ready_for_fw is high
1,056,084 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,367 >>> mbox cmd response: success
2,686,589 UART:
2,686,605 UART: Running Caliptra FMC ...
2,687,013 UART:
2,687,067 UART: [state] CFI Enabled
2,697,556 UART: [fht] FMC Alias Private Key: 7
2,805,603 UART: [art] Extend RT PCRs Done
2,806,031 UART: [art] Lock RT PCRs Done
2,807,611 UART: [art] Populate DV Done
2,816,020 UART: [fht] FMC Alias Private Key: 7
2,817,010 UART: [art] Derive CDI
2,817,290 UART: [art] Store in in slot 0x4
2,902,689 UART: [art] Derive Key Pair
2,903,049 UART: [art] Store priv key in slot 0x5
2,916,167 UART: [art] Derive Key Pair - Done
2,931,051 UART: [art] Signing Cert with AUTHO
2,931,531 UART: RITY.KEYID = 7
2,947,185 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,950 UART: [art] PUB.X = B368FA3148D9DA0AFA40229613543858257038245F054AB899F7DAB5A4B73B54B7C66A214B1A63D600F4E719A29CA0F1
2,954,692 UART: [art] PUB.Y = 75F8964BD78955637B46F152E398D7B6325BC9169BDD06E04E277F8F24841D97BB0BC2C408F32753FD2BA942A15C8A7A
2,961,635 UART: [art] SIG.R = 244AB9BBED17BF5B7D60C8230194A8AFBD2E1A8B2FAC8CED4C1F80B02D906EA333F40A98A4254E62E66AC5F3E0B747EA
2,968,423 UART: [art] SIG.S = 94A629F25919F09853CAD8F436E694BD994A8FFED3D5C89556617C6721C276C67CF2897025DD8852FC99FC1D3BE381CD
2,992,104 UART: Caliptra RT
2,992,357 UART: [state] CFI Enabled
3,099,972 UART: [rt] RT listening for mailbox commands...
3,100,642 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,074,602 >>> mbox cmd response: success
5,074,602 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,088,196 UART:
5,088,212 UART: Running Caliptra FMC ...
5,088,620 UART:
5,088,674 UART: [state] CFI Enabled
5,177,563 UART: [art] Extend RT PCRs Done
5,177,991 UART: [art] Lock RT PCRs Done
5,179,344 UART: [art] Populate DV Done
5,187,411 UART: [fht] FMC Alias Private Key: 7
5,188,423 UART: [art] Derive CDI
5,188,703 UART: [art] Store in in slot 0x4
5,274,300 UART: [art] Derive Key Pair
5,274,660 UART: [art] Store priv key in slot 0x5
5,287,260 UART: [art] Derive Key Pair - Done
5,301,866 UART: [art] Signing Cert with AUTHO
5,302,346 UART: RITY.KEYID = 7
5,317,754 UART: [art] Erasing AUTHORITY.KEYID = 7
5,318,519 UART: [art] PUB.X = 1A661A5929136E632B178EDF190A1BCCA7EEA6B02F770D7E1FBF682F9A8F8BC318DE4E116781FFB3833D822732F7C064
5,325,293 UART: [art] PUB.Y = C35A36EA5A5E7295C4AACEB6716C70FA164A05C3679F5C0BB6AA17A5229BB9590C29E495F6B8EB79AD31CC3ABD2015DA
5,332,254 UART: [art] SIG.R = 16B41FAA545503A4348668C19E0B85E71377EB1310C28332DBC87C15E6E32E1407B037DB778B111AA599EC80A38FF830
5,339,013 UART: [art] SIG.S = 9F8332E1E3A7A5F96ABFE6D590DC480F064A8E92E58588166A9579AC10A54FCC1F08BC81AA1167831FD48DBD6C3EE3FF
5,363,411 UART: mbox::rt_entry...
5,363,783 UART: ____ _ _ _ ____ _____
5,364,567 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,365,367 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,366,135 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,366,903 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,367,671 UART: |_|
5,367,983 UART:
5,645,237 UART: [rt] Runtime listening for mailbox commands...
5,646,427 >>> mbox cmd response data (48 bytes)
5,646,428 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,646,536 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,995 UART: [state] LifecycleState = Unprovisioned
85,650 UART: [state] DebugLocked = No
86,210 UART: [state] WD Timer not started. Device not locked for debugging
87,485 UART: [kat] SHA2-256
891,035 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,164 UART: [kat] ++
895,316 UART: [kat] sha1
899,610 UART: [kat] SHA2-256
901,550 UART: [kat] SHA2-384
904,197 UART: [kat] SHA2-512-ACC
906,098 UART: [kat] ECC-384
915,471 UART: [kat] HMAC-384Kdf
920,051 UART: [kat] LMS
1,168,363 UART: [kat] --
1,169,316 UART: [cold-reset] ++
1,169,746 UART: [fht] FHT @ 0x50003400
1,172,336 UART: [idev] ++
1,172,504 UART: [idev] CDI.KEYID = 6
1,172,865 UART: [idev] SUBJECT.KEYID = 7
1,173,290 UART: [idev] UDS.KEYID = 0
1,173,636 ready_for_fw is high
1,173,636 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,066 UART: [idev] Erasing UDS.KEYID = 0
1,197,928 UART: [idev] Sha1 KeyId Algorithm
1,206,726 UART: [idev] --
1,207,827 UART: [ldev] ++
1,207,995 UART: [ldev] CDI.KEYID = 6
1,208,359 UART: [ldev] SUBJECT.KEYID = 5
1,208,786 UART: [ldev] AUTHORITY.KEYID = 7
1,209,249 UART: [ldev] FE.KEYID = 1
1,214,717 UART: [ldev] Erasing FE.KEYID = 1
1,240,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,257 UART: [ldev] --
1,279,589 UART: [fwproc] Wait for Commands...
1,280,198 UART: [fwproc] Recv command 0x46574c44
1,280,931 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,929 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,238 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,769,952 >>> mbox cmd response: success
2,771,209 UART: [afmc] ++
2,771,377 UART: [afmc] CDI.KEYID = 6
2,771,740 UART: [afmc] SUBJECT.KEYID = 7
2,772,166 UART: [afmc] AUTHORITY.KEYID = 5
2,807,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,948 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,677 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,560 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,279 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,042 UART: [afmc] --
2,850,954 UART: [cold-reset] --
2,851,894 UART: [state] Locking Datavault
2,853,455 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,059 UART: [state] Locking ICCM
2,854,509 UART: [exit] Launching FMC @ 0x40000130
2,859,838 UART:
2,859,854 UART: Running Caliptra FMC ...
2,860,262 UART:
2,860,405 UART: [state] CFI Enabled
2,871,648 UART: [fht] FMC Alias Private Key: 7
2,979,975 UART: [art] Extend RT PCRs Done
2,980,403 UART: [art] Lock RT PCRs Done
2,981,875 UART: [art] Populate DV Done
2,990,168 UART: [fht] FMC Alias Private Key: 7
2,991,236 UART: [art] Derive CDI
2,991,516 UART: [art] Store in in slot 0x4
3,077,709 UART: [art] Derive Key Pair
3,078,069 UART: [art] Store priv key in slot 0x5
3,091,517 UART: [art] Derive Key Pair - Done
3,106,336 UART: [art] Signing Cert with AUTHO
3,106,816 UART: RITY.KEYID = 7
3,121,876 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,641 UART: [art] PUB.X = 77D83DCCA4744DF7C4727D6743D2F8F39B0604A4915EF0856411A10B684ADE65F1AD8ECF284D86E8CE57B33871EA34FC
3,129,412 UART: [art] PUB.Y = F6F85570356214F80EC5A9CF737D8705FBB650F2A93B4CE6EBAC3F036E675F351BBE36F0414CFB264FBDAD5A739B9DB3
3,136,371 UART: [art] SIG.R = 7176D92C23712FB06E468640AD0308D7D478B32AF3569DBEFF03F5E1ECBC7C61F92B08C71EA3C6C2D745C540FAD9A6E6
3,143,143 UART: [art] SIG.S = 9296AC7C310601EC1ACCD089FB78EA6843AA3CC061FF21A92BF1B3EBE581F7A8D4EF663662C6D2681693AEF6331B0334
3,166,617 UART: Caliptra RT
3,166,962 UART: [state] CFI Enabled
3,274,621 UART: [rt] RT listening for mailbox commands...
3,275,291 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,276,727 UART:
3,276,743 UART: Running Caliptra ROM ...
3,277,151 UART:
3,277,293 UART: [state] CFI Enabled
3,279,997 UART: [state] LifecycleState = Unprovisioned
3,280,652 UART: [state] DebugLocked = No
3,281,140 UART: [state] WD Timer not started. Device not locked for debugging
3,282,356 UART: [kat] SHA2-256
4,085,906 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,090,035 UART: [kat] ++
4,090,187 UART: [kat] sha1
4,094,457 UART: [kat] SHA2-256
4,096,397 UART: [kat] SHA2-384
4,099,066 UART: [kat] SHA2-512-ACC
4,100,966 UART: [kat] ECC-384
4,110,897 UART: [kat] HMAC-384Kdf
4,115,607 UART: [kat] LMS
4,363,919 UART: [kat] --
4,364,709 UART: [update-reset] ++
5,269,830 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,270,939 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,367,321 >>> mbox cmd response: success
5,367,321 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,367,608 UART: [update-reset] Copying MAN_2 To MAN_1
5,375,622 UART: [update-reset Success] --
5,376,811 UART: [state] Locking Datavault
5,377,565 UART: [state] Locking PCR0, PCR1 and PCR31
5,378,169 UART: [state] Locking ICCM
5,378,643 UART: [exit] Launching FMC @ 0x40000130
5,383,972 UART:
5,383,988 UART: Running Caliptra FMC ...
5,384,396 UART:
5,384,539 UART: [state] CFI Enabled
5,473,266 UART: [art] Extend RT PCRs Done
5,473,694 UART: [art] Lock RT PCRs Done
5,474,975 UART: [art] Populate DV Done
5,483,200 UART: [fht] FMC Alias Private Key: 7
5,484,370 UART: [art] Derive CDI
5,484,650 UART: [art] Store in in slot 0x4
5,570,323 UART: [art] Derive Key Pair
5,570,683 UART: [art] Store priv key in slot 0x5
5,583,563 UART: [art] Derive Key Pair - Done
5,598,686 UART: [art] Signing Cert with AUTHO
5,599,166 UART: RITY.KEYID = 7
5,614,338 UART: [art] Erasing AUTHORITY.KEYID = 7
5,615,103 UART: [art] PUB.X = 60B456D12E3A01E15E428D984BF52F3D61D3AEA6F106ED11764D94C47FAE19D72FCC97BAB8E57B4CB11B1FBA38FBE03A
5,621,889 UART: [art] PUB.Y = 5ADDE7D6D4BFDEC3138E1BEC55D37E46058EA6AC79FAA1C272EAA8F7E1D8705247985CFDBCF8C82BEDB13185EFF74A1B
5,628,868 UART: [art] SIG.R = 328C21E4CC5C64573ED162BDE012FB224A8DF3B5C7C12C8FB02AFB91BBEE3E4FCAA8B26AF90143CC5F997ED30CA5DB2F
5,635,662 UART: [art] SIG.S = 13CD09091E1FB0DD88213A20061CE1A65D5B4C64B8821D2ED65F6CF37FD6CCFC68A3330AE96DA29998A8D8037E1B152B
5,658,968 UART: mbox::rt_entry...
5,659,340 UART: ____ _ _ _ ____ _____
5,660,124 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,660,924 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,661,692 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,662,460 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,663,228 UART: |_|
5,663,540 UART:
5,945,204 UART: [rt] Runtime listening for mailbox commands...
5,946,394 >>> mbox cmd response data (48 bytes)
5,946,395 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,946,503 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,739 ready_for_fw is high
1,056,739 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,160 >>> mbox cmd response: success
2,686,026 UART:
2,686,042 UART: Running Caliptra FMC ...
2,686,450 UART:
2,686,593 UART: [state] CFI Enabled
2,697,062 UART: [fht] FMC Alias Private Key: 7
2,805,383 UART: [art] Extend RT PCRs Done
2,805,811 UART: [art] Lock RT PCRs Done
2,807,513 UART: [art] Populate DV Done
2,815,780 UART: [fht] FMC Alias Private Key: 7
2,816,736 UART: [art] Derive CDI
2,817,016 UART: [art] Store in in slot 0x4
2,902,831 UART: [art] Derive Key Pair
2,903,191 UART: [art] Store priv key in slot 0x5
2,916,425 UART: [art] Derive Key Pair - Done
2,930,985 UART: [art] Signing Cert with AUTHO
2,931,465 UART: RITY.KEYID = 7
2,946,677 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,442 UART: [art] PUB.X = 6E2213D7227E08DA37B1090DC184F95CD37BFD8E9F6109E0228FE04E693292A5A4B6EE090C066141345146297B2D4EF8
2,954,189 UART: [art] PUB.Y = 525DEF7EE7333540120A53013C90AE91BCF797FDB09A0316212334EB143207484E2744B69264C3767014A531158090C9
2,961,111 UART: [art] SIG.R = A0E657BECBC33B069F2557E198C20B2AAD623726760BC488D079CB5D8098C7EDAE5F902AFCA049E1BAEA86DB918B4B97
2,967,890 UART: [art] SIG.S = F6A938CB182F83E630D9BED038937491EEC3EFA4811AF71A5F4D072D22D7EAE08016AA5D092899D393D2264037249821
2,992,031 UART: Caliptra RT
2,992,376 UART: [state] CFI Enabled
3,100,284 UART: [rt] RT listening for mailbox commands...
3,100,954 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,072,583 >>> mbox cmd response: success
5,072,583 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,086,323 UART:
5,086,339 UART: Running Caliptra FMC ...
5,086,747 UART:
5,086,890 UART: [state] CFI Enabled
5,175,863 UART: [art] Extend RT PCRs Done
5,176,291 UART: [art] Lock RT PCRs Done
5,177,742 UART: [art] Populate DV Done
5,185,955 UART: [fht] FMC Alias Private Key: 7
5,187,003 UART: [art] Derive CDI
5,187,283 UART: [art] Store in in slot 0x4
5,272,922 UART: [art] Derive Key Pair
5,273,282 UART: [art] Store priv key in slot 0x5
5,287,408 UART: [art] Derive Key Pair - Done
5,301,896 UART: [art] Signing Cert with AUTHO
5,302,376 UART: RITY.KEYID = 7
5,317,802 UART: [art] Erasing AUTHORITY.KEYID = 7
5,318,567 UART: [art] PUB.X = 41A6072DD2A91381568056417DE0A6E8C04DE3B470282B252A3A07A25481629740814EDBCEE27D27B2D0FA563921A8B8
5,325,327 UART: [art] PUB.Y = 06EFFB384D985B65358CC571FF7545AEB1C150DF2C09C495261B6CE1BC109AFD7E6DE6E2E5A43C95923E797D372434BA
5,332,283 UART: [art] SIG.R = 54C035FF63155F310646601385ECA900E6620DF52314A5DDBE0B5E39378F7331F7DE42466FDC1652F5F3C1DB22E1A5EF
5,339,026 UART: [art] SIG.S = 022C9C8E6697B9990BE9F950CD144FC210A357BFAFDCC534D22B6D8B1A25EC8DEDDDE3DBA9C4BA6E417CE21674468D30
5,362,807 UART: mbox::rt_entry...
5,363,179 UART: ____ _ _ _ ____ _____
5,363,963 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,364,763 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,365,531 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,366,299 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,367,067 UART: |_|
5,367,379 UART:
5,645,343 UART: [rt] Runtime listening for mailbox commands...
5,646,533 >>> mbox cmd response data (48 bytes)
5,646,534 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,646,642 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,794 UART: [state] LifecycleState = Unprovisioned
85,449 UART: [state] DebugLocked = No
86,055 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,571 UART: [kat] SHA2-256
881,502 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,617 UART: [kat] ++
885,769 UART: [kat] sha1
890,029 UART: [kat] SHA2-256
891,967 UART: [kat] SHA2-384
894,714 UART: [kat] SHA2-512-ACC
896,615 UART: [kat] ECC-384
902,002 UART: [kat] HMAC-384Kdf
906,622 UART: [kat] LMS
1,474,818 UART: [kat] --
1,475,537 UART: [cold-reset] ++
1,475,947 UART: [fht] Storing FHT @ 0x50003400
1,478,806 UART: [idev] ++
1,478,974 UART: [idev] CDI.KEYID = 6
1,479,334 UART: [idev] SUBJECT.KEYID = 7
1,479,758 UART: [idev] UDS.KEYID = 0
1,480,103 ready_for_fw is high
1,480,103 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,792 UART: [idev] Erasing UDS.KEYID = 0
1,504,456 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,158 UART: [idev] --
1,514,321 UART: [ldev] ++
1,514,489 UART: [ldev] CDI.KEYID = 6
1,514,852 UART: [ldev] SUBJECT.KEYID = 5
1,515,278 UART: [ldev] AUTHORITY.KEYID = 7
1,515,741 UART: [ldev] FE.KEYID = 1
1,520,965 UART: [ldev] Erasing FE.KEYID = 1
1,545,732 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,766 UART: [ldev] --
1,585,241 UART: [fwproc] Waiting for Commands...
1,586,000 UART: [fwproc] Received command 0x46574c44
1,586,791 UART: [fwproc] Received Image of size 114332 bytes
2,884,123 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,181 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,533 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,282 >>> mbox cmd response: success
3,077,406 UART: [afmc] ++
3,077,574 UART: [afmc] CDI.KEYID = 6
3,077,936 UART: [afmc] SUBJECT.KEYID = 7
3,078,361 UART: [afmc] AUTHORITY.KEYID = 5
3,113,728 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,024 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,804 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,532 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,417 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,107 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,152 UART: [afmc] --
3,157,044 UART: [cold-reset] --
3,157,676 UART: [state] Locking Datavault
3,158,711 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,315 UART: [state] Locking ICCM
3,159,985 UART: [exit] Launching FMC @ 0x40000130
3,165,314 UART:
3,165,330 UART: Running Caliptra FMC ...
3,165,738 UART:
3,165,792 UART: [state] CFI Enabled
3,176,351 UART: [fht] FMC Alias Private Key: 7
3,284,190 UART: [art] Extend RT PCRs Done
3,284,618 UART: [art] Lock RT PCRs Done
3,286,222 UART: [art] Populate DV Done
3,294,349 UART: [fht] FMC Alias Private Key: 7
3,295,443 UART: [art] Derive CDI
3,295,723 UART: [art] Store in in slot 0x4
3,380,958 UART: [art] Derive Key Pair
3,381,318 UART: [art] Store priv key in slot 0x5
3,394,222 UART: [art] Derive Key Pair - Done
3,408,946 UART: [art] Signing Cert with AUTHO
3,409,426 UART: RITY.KEYID = 7
3,424,380 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,145 UART: [art] PUB.X = 83C155A6E44EF9E9C69074E6C6654D01E9A387FCB455815338BC2EEE38D926E52C7C5701B178E637796D913AF5BC42A0
3,431,911 UART: [art] PUB.Y = DFB30216151A21F5A091DB6CA1AAF849D452EDDC9FF0853BD377453DD67B3DDE1AA25DC8367FC9F9B4901A4FF1C4A6BF
3,438,882 UART: [art] SIG.R = 484A610C1C447EAF2DA3952250F3838C0BF228769BFC0A1E98818D86438BCCC425ED524E4117B703BF2524BFD0B26EE9
3,445,646 UART: [art] SIG.S = DB2D0E9A4F33675B70CF2ECE118885208BBE8260E0F62506F5F529884203873ABC441C790CBDFEAE313A6CBBF9734835
3,469,207 UART: Caliptra RT
3,469,460 UART: [state] CFI Enabled
3,577,923 UART: [rt] RT listening for mailbox commands...
3,578,593 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,843 UART: [rt]cmd =0x54514754, len=24
3,610,736 >>> mbox cmd response data (8 bytes)
3,610,737 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,581 UART:
3,611,597 UART: Running Caliptra ROM ...
3,612,005 UART:
3,612,059 UART: [state] CFI Enabled
3,614,653 UART: [state] LifecycleState = Unprovisioned
3,615,308 UART: [state] DebugLocked = No
3,615,910 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,617,417 UART: [kat] SHA2-256
4,411,348 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,415,463 UART: [kat] ++
4,415,615 UART: [kat] sha1
4,419,821 UART: [kat] SHA2-256
4,421,759 UART: [kat] SHA2-384
4,424,718 UART: [kat] SHA2-512-ACC
4,426,618 UART: [kat] ECC-384
4,432,345 UART: [kat] HMAC-384Kdf
4,436,949 UART: [kat] LMS
5,005,145 UART: [kat] --
5,006,282 UART: [update-reset] ++
5,932,144 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,933,240 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,029,674 >>> mbox cmd response: success
6,029,674 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,029,963 UART: [update-reset] Copying MAN_2 To MAN_1
6,037,977 UART: [update-reset Success] --
6,038,772 UART: [state] Locking Datavault
6,039,588 UART: [state] Locking PCR0, PCR1 and PCR31
6,040,192 UART: [state] Locking ICCM
6,040,808 UART: [exit] Launching FMC @ 0x40000130
6,046,137 UART:
6,046,153 UART: Running Caliptra FMC ...
6,046,561 UART:
6,046,615 UART: [state] CFI Enabled
6,135,474 UART: [art] Extend RT PCRs Done
6,135,902 UART: [art] Lock RT PCRs Done
6,137,337 UART: [art] Populate DV Done
6,145,642 UART: [fht] FMC Alias Private Key: 7
6,146,694 UART: [art] Derive CDI
6,146,974 UART: [art] Store in in slot 0x4
6,232,677 UART: [art] Derive Key Pair
6,233,037 UART: [art] Store priv key in slot 0x5
6,246,357 UART: [art] Derive Key Pair - Done
6,261,243 UART: [art] Signing Cert with AUTHO
6,261,723 UART: RITY.KEYID = 7
6,276,945 UART: [art] Erasing AUTHORITY.KEYID = 7
6,277,710 UART: [art] PUB.X = E165F93C2AAE2CA89E4F71A2C708E477FC02A07DD42A8BCE626084B15BD40E554F520A680ECA234B3677EF74C954CB33
6,284,477 UART: [art] PUB.Y = 72C483DB8663F030AAB0B9E4A5E3D1641DBE02BD89433BD2789A450B5B216F0D14F5629B83AEB1BD538300046FC2CC44
6,291,401 UART: [art] SIG.R = 7208BF823B1052D79FEABB1B375D5D04371244703DD82723F99F9710B2D7EBA0EC8C63F5E19B639DB11D550F77CE238E
6,298,168 UART: [art] SIG.S = D607A51FD26B3E3E1E0BF475B53C7C121FA91DE362204D6B7158ED902A5E72EB65AE3231084D547F276FC23E2444E3BB
6,322,206 UART: mbox::rt_entry...
6,322,578 UART: ____ _ _ _ ____ _____
6,323,362 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,324,162 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,324,930 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,325,698 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,326,466 UART: |_|
6,326,778 UART:
6,610,184 UART: [rt] Runtime listening for mailbox commands...
6,611,421 >>> mbox cmd response data (120 bytes)
6,611,422 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
6,611,536 UART:
6,611,552 UART: Running Caliptra ROM ...
6,611,960 UART:
6,612,014 UART: [state] CFI Enabled
6,614,424 UART: [state] LifecycleState = Unprovisioned
6,615,079 UART: [state] DebugLocked = No
6,615,605 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,617,226 UART: [kat] SHA2-256
7,411,157 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,415,272 UART: [kat] ++
7,415,424 UART: [kat] sha1
7,419,648 UART: [kat] SHA2-256
7,421,586 UART: [kat] SHA2-384
7,424,323 UART: [kat] SHA2-512-ACC
7,426,223 UART: [kat] ECC-384
7,431,878 UART: [kat] HMAC-384Kdf
7,436,450 UART: [kat] LMS
8,004,646 UART: [kat] --
8,005,379 UART: [update-reset] ++
8,931,529 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,932,569 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,029,003 >>> mbox cmd response: success
9,029,003 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,029,216 UART: [update-reset] Copying MAN_2 To MAN_1
9,037,230 UART: [update-reset Success] --
9,038,189 UART: [state] Locking Datavault
9,038,903 UART: [state] Locking PCR0, PCR1 and PCR31
9,039,507 UART: [state] Locking ICCM
9,040,135 UART: [exit] Launching FMC @ 0x40000130
9,045,464 UART:
9,045,480 UART: Running Caliptra FMC ...
9,045,888 UART:
9,045,942 UART: [state] CFI Enabled
9,134,659 UART: [art] Extend RT PCRs Done
9,135,087 UART: [art] Lock RT PCRs Done
9,136,142 UART: [art] Populate DV Done
9,144,387 UART: [fht] FMC Alias Private Key: 7
9,145,527 UART: [art] Derive CDI
9,145,807 UART: [art] Store in in slot 0x4
9,231,090 UART: [art] Derive Key Pair
9,231,450 UART: [art] Store priv key in slot 0x5
9,244,418 UART: [art] Derive Key Pair - Done
9,259,137 UART: [art] Signing Cert with AUTHO
9,259,617 UART: RITY.KEYID = 7
9,274,667 UART: [art] Erasing AUTHORITY.KEYID = 7
9,275,432 UART: [art] PUB.X = 8A7795C5C61F1AFC90EE2A1C18BEDDBAEF942018376CBDAF6D0DFE38736554A97107E6142C1357C3EF976180D5852DD9
9,282,208 UART: [art] PUB.Y = D6C0E39816076D462B3D0BE629A1F3F2A8E276A36DACF5F75C7EA21110902E9AB9E4A5BDFE2AAEFBFD9EAF8318092AE7
9,289,173 UART: [art] SIG.R = E491C5652AB607A903C5A63707474455BCB31221FB5F10CC3ED31543EF3CFE57F978A54222E2E923A3C10414DC39947D
9,295,931 UART: [art] SIG.S = 8AF224548D0DEE2FC238BD52B39A2FDBEEB9E8856887B02984484D114BD9EBA70FABA5FD44D7C6C30A22DB26D76ECF49
9,319,845 UART: mbox::rt_entry...
9,320,217 UART: ____ _ _ _ ____ _____
9,321,001 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,321,801 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,322,569 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,323,337 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,324,105 UART: |_|
9,324,417 UART:
9,602,166 UART: [rt] Runtime listening for mailbox commands...
9,603,403 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,507 ready_for_fw is high
1,363,507 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,626 >>> mbox cmd response: success
2,987,956 UART:
2,987,972 UART: Running Caliptra FMC ...
2,988,380 UART:
2,988,434 UART: [state] CFI Enabled
2,998,723 UART: [fht] FMC Alias Private Key: 7
3,106,870 UART: [art] Extend RT PCRs Done
3,107,298 UART: [art] Lock RT PCRs Done
3,108,888 UART: [art] Populate DV Done
3,117,093 UART: [fht] FMC Alias Private Key: 7
3,118,265 UART: [art] Derive CDI
3,118,545 UART: [art] Store in in slot 0x4
3,204,236 UART: [art] Derive Key Pair
3,204,596 UART: [art] Store priv key in slot 0x5
3,218,310 UART: [art] Derive Key Pair - Done
3,233,169 UART: [art] Signing Cert with AUTHO
3,233,649 UART: RITY.KEYID = 7
3,248,539 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,304 UART: [art] PUB.X = 579A743B94AE15F61DD0CD98D640BDAE390DD6283389C9130A05C71FEC85FA9A6A2253E577AD3F5F21C236C75EBF1B86
3,256,077 UART: [art] PUB.Y = B119EAB38BD04E89E92783EEBA166811FD29579078E0882B09C96FF5BAEDAA035DFF1AC50414D199887F6403A8317B71
3,263,021 UART: [art] SIG.R = 6A32DCC9F406B154ABF374CA8951E0A50FE89BA9893A02D7C3BB9FC2AA393338FECAED3FDCC51A463515E54F5090E393
3,269,800 UART: [art] SIG.S = F1235CD273C94922975B8D1CA6C1EF60BF474E4883F16F144FBB965588F5125A555036B1C5B85B5E5A5A0E69498BB15B
3,293,540 UART: Caliptra RT
3,293,793 UART: [state] CFI Enabled
3,402,562 UART: [rt] RT listening for mailbox commands...
3,403,232 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,082 UART: [rt]cmd =0x54514754, len=24
3,435,065 >>> mbox cmd response data (8 bytes)
3,435,066 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,736,303 >>> mbox cmd response: success
5,736,303 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,749,372 UART:
5,749,388 UART: Running Caliptra FMC ...
5,749,796 UART:
5,749,850 UART: [state] CFI Enabled
5,838,949 UART: [art] Extend RT PCRs Done
5,839,377 UART: [art] Lock RT PCRs Done
5,840,298 UART: [art] Populate DV Done
5,848,545 UART: [fht] FMC Alias Private Key: 7
5,849,551 UART: [art] Derive CDI
5,849,831 UART: [art] Store in in slot 0x4
5,935,470 UART: [art] Derive Key Pair
5,935,830 UART: [art] Store priv key in slot 0x5
5,948,910 UART: [art] Derive Key Pair - Done
5,963,484 UART: [art] Signing Cert with AUTHO
5,963,964 UART: RITY.KEYID = 7
5,979,194 UART: [art] Erasing AUTHORITY.KEYID = 7
5,979,959 UART: [art] PUB.X = 3A948AE6C1AB237F7737C64DAD4318260725F05A0B9D8226201507D392B006324CA841333B29B4C2EC5FEC73E81E4EC4
5,986,717 UART: [art] PUB.Y = F02E671DE8B348A726A14B9C1F77FA09F55F391CEF310F21701DC9FB03D1F371C4F0B087102F568077D3F4B42CD2050C
5,993,658 UART: [art] SIG.R = 688EEDFAD80463609C30D548389D43B0447CFF740DFB02A4C9BFF7D989F5557158625B6D49533D309159D4FFEF8AE492
6,000,423 UART: [art] SIG.S = 238B5E9BBD3A3B2A72F47C2604900EAEB250474A4DAE38E0F9EBD930919F07A554F2CC25F9C4FAA242E69EC3A75B1BD3
6,024,235 UART: mbox::rt_entry...
6,024,607 UART: ____ _ _ _ ____ _____
6,025,391 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,026,191 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,026,959 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,027,727 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,028,495 UART: |_|
6,028,807 UART:
6,313,896 UART: [rt] Runtime listening for mailbox commands...
6,315,133 >>> mbox cmd response data (120 bytes)
6,315,134 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,615,285 >>> mbox cmd response: success
8,615,285 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,628,408 UART:
8,628,424 UART: Running Caliptra FMC ...
8,628,832 UART:
8,628,886 UART: [state] CFI Enabled
8,717,715 UART: [art] Extend RT PCRs Done
8,718,143 UART: [art] Lock RT PCRs Done
8,719,374 UART: [art] Populate DV Done
8,727,543 UART: [fht] FMC Alias Private Key: 7
8,728,587 UART: [art] Derive CDI
8,728,867 UART: [art] Store in in slot 0x4
8,814,476 UART: [art] Derive Key Pair
8,814,836 UART: [art] Store priv key in slot 0x5
8,827,736 UART: [art] Derive Key Pair - Done
8,842,470 UART: [art] Signing Cert with AUTHO
8,842,950 UART: RITY.KEYID = 7
8,858,332 UART: [art] Erasing AUTHORITY.KEYID = 7
8,859,097 UART: [art] PUB.X = F87754B1E849AE8C16D766B94B4719155A34D351D4DB02DD25540215655095273AD77E07A6CBE4F4B54455E76816B14F
8,865,852 UART: [art] PUB.Y = D46EFD3926DF026BCF7F3AB7DB39E1119FC1DB897074E870D4260D7D7C7F274E6B94FBC5975175F70802463653F420B4
8,872,794 UART: [art] SIG.R = 3B674E183A1F0E74D6E2F2FA1B1D3D1C1708566632717A8BECBCE8C08781390B9961B8E0F9666932A00364C003BAD646
8,879,549 UART: [art] SIG.S = 3981FAB637844DEF4721F075E3CA1968C41ECC4F462BC6C52081E0945F80CFF50CFD9EF71B9DDB31E13FC6B3BAD2D639
8,903,485 UART: mbox::rt_entry...
8,903,857 UART: ____ _ _ _ ____ _____
8,904,641 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,905,441 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,906,209 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,906,977 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,907,745 UART: |_|
8,908,057 UART:
9,188,070 UART: [rt] Runtime listening for mailbox commands...
9,189,307 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,482 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,152 UART: [kat] SHA2-256
882,083 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,198 UART: [kat] ++
886,350 UART: [kat] sha1
890,440 UART: [kat] SHA2-256
892,378 UART: [kat] SHA2-384
895,141 UART: [kat] SHA2-512-ACC
897,042 UART: [kat] ECC-384
902,785 UART: [kat] HMAC-384Kdf
907,351 UART: [kat] LMS
1,475,547 UART: [kat] --
1,476,414 UART: [cold-reset] ++
1,476,768 UART: [fht] Storing FHT @ 0x50003400
1,479,457 UART: [idev] ++
1,479,625 UART: [idev] CDI.KEYID = 6
1,479,985 UART: [idev] SUBJECT.KEYID = 7
1,480,409 UART: [idev] UDS.KEYID = 0
1,480,754 ready_for_fw is high
1,480,754 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,185 UART: [idev] Erasing UDS.KEYID = 0
1,504,517 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,117 UART: [idev] --
1,514,176 UART: [ldev] ++
1,514,344 UART: [ldev] CDI.KEYID = 6
1,514,707 UART: [ldev] SUBJECT.KEYID = 5
1,515,133 UART: [ldev] AUTHORITY.KEYID = 7
1,515,596 UART: [ldev] FE.KEYID = 1
1,520,792 UART: [ldev] Erasing FE.KEYID = 1
1,546,407 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,223 UART: [ldev] --
1,585,724 UART: [fwproc] Waiting for Commands...
1,586,409 UART: [fwproc] Received command 0x46574c44
1,587,200 UART: [fwproc] Received Image of size 114332 bytes
2,884,904 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,480 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,832 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,649 >>> mbox cmd response: success
3,078,795 UART: [afmc] ++
3,078,963 UART: [afmc] CDI.KEYID = 6
3,079,325 UART: [afmc] SUBJECT.KEYID = 7
3,079,750 UART: [afmc] AUTHORITY.KEYID = 5
3,114,999 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,257 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,037 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,765 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,650 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,340 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,325 UART: [afmc] --
3,158,243 UART: [cold-reset] --
3,159,235 UART: [state] Locking Datavault
3,160,502 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,106 UART: [state] Locking ICCM
3,161,658 UART: [exit] Launching FMC @ 0x40000130
3,166,987 UART:
3,167,003 UART: Running Caliptra FMC ...
3,167,411 UART:
3,167,554 UART: [state] CFI Enabled
3,178,187 UART: [fht] FMC Alias Private Key: 7
3,286,228 UART: [art] Extend RT PCRs Done
3,286,656 UART: [art] Lock RT PCRs Done
3,288,074 UART: [art] Populate DV Done
3,296,317 UART: [fht] FMC Alias Private Key: 7
3,297,447 UART: [art] Derive CDI
3,297,727 UART: [art] Store in in slot 0x4
3,383,136 UART: [art] Derive Key Pair
3,383,496 UART: [art] Store priv key in slot 0x5
3,396,632 UART: [art] Derive Key Pair - Done
3,411,337 UART: [art] Signing Cert with AUTHO
3,411,817 UART: RITY.KEYID = 7
3,427,445 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,210 UART: [art] PUB.X = FCD70241BD11C70B0FCF0B266DA60976E0CD0E13E72773CB0FE9EF2A54D5B282083C9080D850522D727ACCB21177A1CB
3,434,968 UART: [art] PUB.Y = E4209FB4D1D2401B1FC136DE43764D6A687328649AA07FCBEFA5B645014953572B6918A0E3EAEC27D86A197CB8A436BF
3,441,923 UART: [art] SIG.R = FFB8402443C032B2361F9690CF6066367C474FF0DA9A6733A30103CEB0C68D9222F43B2EE95FD2C3DFFA576156BD76E3
3,448,693 UART: [art] SIG.S = 80D202FD33FDE8EE6F68529EBB84C2E3869423C0A7B7BFC5C6DB5A5796027508BE4CA8E6F9C9C4FFE0C392BDC78F59C8
3,472,645 UART: Caliptra RT
3,472,990 UART: [state] CFI Enabled
3,581,902 UART: [rt] RT listening for mailbox commands...
3,582,572 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,498 UART: [rt]cmd =0x54514754, len=24
3,614,613 >>> mbox cmd response data (8 bytes)
3,614,614 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,612 UART:
3,615,628 UART: Running Caliptra ROM ...
3,616,036 UART:
3,616,177 UART: [state] CFI Enabled
3,618,991 UART: [state] LifecycleState = Unprovisioned
3,619,646 UART: [state] DebugLocked = No
3,620,196 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,621,871 UART: [kat] SHA2-256
4,415,802 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,419,917 UART: [kat] ++
4,420,069 UART: [kat] sha1
4,424,367 UART: [kat] SHA2-256
4,426,305 UART: [kat] SHA2-384
4,429,204 UART: [kat] SHA2-512-ACC
4,431,104 UART: [kat] ECC-384
4,436,735 UART: [kat] HMAC-384Kdf
4,441,429 UART: [kat] LMS
5,009,625 UART: [kat] --
5,010,568 UART: [update-reset] ++
5,937,006 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,938,218 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,034,652 >>> mbox cmd response: success
6,034,652 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,034,997 UART: [update-reset] Copying MAN_2 To MAN_1
6,043,011 UART: [update-reset Success] --
6,043,902 UART: [state] Locking Datavault
6,044,636 UART: [state] Locking PCR0, PCR1 and PCR31
6,045,240 UART: [state] Locking ICCM
6,045,678 UART: [exit] Launching FMC @ 0x40000130
6,051,007 UART:
6,051,023 UART: Running Caliptra FMC ...
6,051,431 UART:
6,051,574 UART: [state] CFI Enabled
6,140,733 UART: [art] Extend RT PCRs Done
6,141,161 UART: [art] Lock RT PCRs Done
6,142,584 UART: [art] Populate DV Done
6,150,687 UART: [fht] FMC Alias Private Key: 7
6,151,823 UART: [art] Derive CDI
6,152,103 UART: [art] Store in in slot 0x4
6,237,996 UART: [art] Derive Key Pair
6,238,356 UART: [art] Store priv key in slot 0x5
6,251,976 UART: [art] Derive Key Pair - Done
6,266,685 UART: [art] Signing Cert with AUTHO
6,267,165 UART: RITY.KEYID = 7
6,282,359 UART: [art] Erasing AUTHORITY.KEYID = 7
6,283,124 UART: [art] PUB.X = 2FD44ED80B4C8569ECBDF16D366B3CDCBAA8A09891A215E08CA1979BCDA993F4C514249D9488E5FDDA85C926C1BAED7B
6,289,915 UART: [art] PUB.Y = D64A4CE91E68E7B4B51D5D653B7AEE584F925162EBC33697C074A8CD0B7ADF8DE3067E13A69937B4D1169F07E3A28FF6
6,296,868 UART: [art] SIG.R = 254C9D50DA92D9EFDEB27C25039210BFFB4BC431AC3834970233E18CEAC681A23DB23C8224F16A542D35745A07BE6410
6,303,635 UART: [art] SIG.S = A5E3B1FFB808C4E498126AD057A55437FE3B0E96C219A672E3D2290BFD00863D0E593333410DDADE9E5156F139AE0C79
6,327,858 UART: mbox::rt_entry...
6,328,230 UART: ____ _ _ _ ____ _____
6,329,014 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,329,814 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,330,582 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,331,350 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,332,118 UART: |_|
6,332,430 UART:
6,613,670 UART: [rt] Runtime listening for mailbox commands...
6,614,907 >>> mbox cmd response data (120 bytes)
6,614,908 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
6,615,022 UART:
6,615,038 UART: Running Caliptra ROM ...
6,615,446 UART:
6,615,587 UART: [state] CFI Enabled
6,618,421 UART: [state] LifecycleState = Unprovisioned
6,619,076 UART: [state] DebugLocked = No
6,619,724 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,621,373 UART: [kat] SHA2-256
7,415,304 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,419,419 UART: [kat] ++
7,419,571 UART: [kat] sha1
7,423,823 UART: [kat] SHA2-256
7,425,761 UART: [kat] SHA2-384
7,428,504 UART: [kat] SHA2-512-ACC
7,430,404 UART: [kat] ECC-384
7,436,497 UART: [kat] HMAC-384Kdf
7,441,317 UART: [kat] LMS
8,009,513 UART: [kat] --
8,010,488 UART: [update-reset] ++
8,936,620 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,937,726 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,034,160 >>> mbox cmd response: success
9,034,160 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,034,331 UART: [update-reset] Copying MAN_2 To MAN_1
9,042,345 UART: [update-reset Success] --
9,043,180 UART: [state] Locking Datavault
9,043,838 UART: [state] Locking PCR0, PCR1 and PCR31
9,044,442 UART: [state] Locking ICCM
9,044,934 UART: [exit] Launching FMC @ 0x40000130
9,050,263 UART:
9,050,279 UART: Running Caliptra FMC ...
9,050,687 UART:
9,050,830 UART: [state] CFI Enabled
9,139,581 UART: [art] Extend RT PCRs Done
9,140,009 UART: [art] Lock RT PCRs Done
9,141,126 UART: [art] Populate DV Done
9,149,117 UART: [fht] FMC Alias Private Key: 7
9,150,137 UART: [art] Derive CDI
9,150,417 UART: [art] Store in in slot 0x4
9,236,318 UART: [art] Derive Key Pair
9,236,678 UART: [art] Store priv key in slot 0x5
9,250,322 UART: [art] Derive Key Pair - Done
9,265,127 UART: [art] Signing Cert with AUTHO
9,265,607 UART: RITY.KEYID = 7
9,280,843 UART: [art] Erasing AUTHORITY.KEYID = 7
9,281,608 UART: [art] PUB.X = 6EFFD91067D6D1D49A62406017D431F6F06A3AA3AD85ADAA76DDC71BF1155A643A58A13CC3D8B503FCE63F5B437935B3
9,288,389 UART: [art] PUB.Y = A63895E847CDCA40D4B4B56D31BCB1A431FD7E21410F9223BE069734B7FC3614EB54609C86012785560EB0461E1DE890
9,295,327 UART: [art] SIG.R = DA0C7EE0D4B910BBCF2A7897F698815627912E40C406DD24792C5E61E890B81F42C985A3B844F0AD1E81B3BBBDFA14C1
9,302,103 UART: [art] SIG.S = 172EC5B5CC04BB45FBA07AFEE92D679EA6D4160F581D60D2C79D38BA704818A4F9D8C5204EF92FD9D94FE6E9C3B5198C
9,326,004 UART: mbox::rt_entry...
9,326,376 UART: ____ _ _ _ ____ _____
9,327,160 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,327,960 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,328,728 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,329,496 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,330,264 UART: |_|
9,330,576 UART:
9,612,528 UART: [rt] Runtime listening for mailbox commands...
9,613,765 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,656 ready_for_fw is high
1,362,656 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,930,155 >>> mbox cmd response: success
2,991,913 UART:
2,991,929 UART: Running Caliptra FMC ...
2,992,337 UART:
2,992,480 UART: [state] CFI Enabled
3,003,193 UART: [fht] FMC Alias Private Key: 7
3,111,092 UART: [art] Extend RT PCRs Done
3,111,520 UART: [art] Lock RT PCRs Done
3,113,040 UART: [art] Populate DV Done
3,121,219 UART: [fht] FMC Alias Private Key: 7
3,122,347 UART: [art] Derive CDI
3,122,627 UART: [art] Store in in slot 0x4
3,207,920 UART: [art] Derive Key Pair
3,208,280 UART: [art] Store priv key in slot 0x5
3,221,354 UART: [art] Derive Key Pair - Done
3,236,080 UART: [art] Signing Cert with AUTHO
3,236,560 UART: RITY.KEYID = 7
3,251,774 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,539 UART: [art] PUB.X = 36E31A8B4F1C6D33E3D3607483842822B51E96C99922D5C880D5F27F09512445269A890C3D81DBDDB397EF2AD6D86CC9
3,259,303 UART: [art] PUB.Y = 1459A7BAD379930462D8192E2A6BB85AE8BFEDEA657BBA16A793CC79A499470CE6A75771CE03ABBF6C5528C2D473751C
3,266,256 UART: [art] SIG.R = 1080DDE24AB5CDE76D67FBC81BF937BBFBDBDF7B8002572E7697445B13297C47E5C757F1042C5C3EB90ACBF98B09103E
3,273,030 UART: [art] SIG.S = C15390D9EC169BC438A8FA7DFBAE8022E3AB8B3702185F01379EEAD40585662621BF4623A164682780712319BBDD3885
3,297,222 UART: Caliptra RT
3,297,567 UART: [state] CFI Enabled
3,405,890 UART: [rt] RT listening for mailbox commands...
3,406,560 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,392 UART: [rt]cmd =0x54514754, len=24
3,438,539 >>> mbox cmd response data (8 bytes)
3,438,540 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,740,222 >>> mbox cmd response: success
5,740,222 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,753,847 UART:
5,753,863 UART: Running Caliptra FMC ...
5,754,271 UART:
5,754,414 UART: [state] CFI Enabled
5,843,779 UART: [art] Extend RT PCRs Done
5,844,207 UART: [art] Lock RT PCRs Done
5,845,556 UART: [art] Populate DV Done
5,853,935 UART: [fht] FMC Alias Private Key: 7
5,855,043 UART: [art] Derive CDI
5,855,323 UART: [art] Store in in slot 0x4
5,941,128 UART: [art] Derive Key Pair
5,941,488 UART: [art] Store priv key in slot 0x5
5,955,084 UART: [art] Derive Key Pair - Done
5,969,594 UART: [art] Signing Cert with AUTHO
5,970,074 UART: RITY.KEYID = 7
5,985,182 UART: [art] Erasing AUTHORITY.KEYID = 7
5,985,947 UART: [art] PUB.X = 4E1E2031188F072A631BA71D1A1994C6F5DF1E925B1D5CB7E33E690D8F15A259ADBDD93927DA10E6121BD9E91A795827
5,992,717 UART: [art] PUB.Y = 536C8855CB46D6AF5AEE83D2CF81EC8F9C88BEA8AEA3C75AE74161CF24FE64BCD87B48431917880B84F812041446A38C
5,999,673 UART: [art] SIG.R = 6A8D5F1DBCA3F9A9189F11AB111D3E9276352F0EF1E4B23ADC78E5AE7AB8D35F400CD7529797A721BCAD408F2AB5FC38
6,006,457 UART: [art] SIG.S = 82C09DBCEB9F3427A88F24265FCFDEB2F3E81711F20CEE53CD0E69AE2D976B0335A89D4FFEC17AAE2D927890A32BEEA9
6,030,029 UART: mbox::rt_entry...
6,030,401 UART: ____ _ _ _ ____ _____
6,031,185 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,031,985 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,032,753 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,033,521 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,034,289 UART: |_|
6,034,601 UART:
6,313,981 UART: [rt] Runtime listening for mailbox commands...
6,315,218 >>> mbox cmd response data (120 bytes)
6,315,219 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,617,163 >>> mbox cmd response: success
8,617,163 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,630,774 UART:
8,630,790 UART: Running Caliptra FMC ...
8,631,198 UART:
8,631,341 UART: [state] CFI Enabled
8,720,928 UART: [art] Extend RT PCRs Done
8,721,356 UART: [art] Lock RT PCRs Done
8,722,897 UART: [art] Populate DV Done
8,731,338 UART: [fht] FMC Alias Private Key: 7
8,732,308 UART: [art] Derive CDI
8,732,588 UART: [art] Store in in slot 0x4
8,818,541 UART: [art] Derive Key Pair
8,818,901 UART: [art] Store priv key in slot 0x5
8,832,341 UART: [art] Derive Key Pair - Done
8,846,710 UART: [art] Signing Cert with AUTHO
8,847,190 UART: RITY.KEYID = 7
8,862,458 UART: [art] Erasing AUTHORITY.KEYID = 7
8,863,223 UART: [art] PUB.X = A4FC36074C43BA57793531B6DC4540A6983BA43CE697A714F34B4D640C7D4DA41CFD030E8B28225B260C9C735FFB23D5
8,869,984 UART: [art] PUB.Y = CA9B6343E34C70A429A3771BD793E19DAA0E38684F1E17A5CA74191A6463CE02336F235AC8191FE2F387E27D6A1F1D2E
8,876,934 UART: [art] SIG.R = CB558A528C41075A37B5A8E27D5267B3BE478F7338FA1EBB665428034DD5E8717ED91171E3AB2BBC5BE7E7CB7B732C2D
8,883,710 UART: [art] SIG.S = 648D2B65E6D1D5AEEA7A93B213622B0E18BB0449F5F63C7A29D05BD19998F2012C33225CDF0617866002CCA3CC793AD0
8,907,022 UART: mbox::rt_entry...
8,907,394 UART: ____ _ _ _ ____ _____
8,908,178 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,908,978 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,909,746 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,910,514 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,911,282 UART: |_|
8,911,594 UART:
9,192,036 UART: [rt] Runtime listening for mailbox commands...
9,193,273 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
893,470 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,595 UART: [kat] ++
897,747 UART: [kat] sha1
901,889 UART: [kat] SHA2-256
903,829 UART: [kat] SHA2-384
906,586 UART: [kat] SHA2-512-ACC
908,487 UART: [kat] ECC-384
918,354 UART: [kat] HMAC-384Kdf
922,920 UART: [kat] LMS
1,171,248 UART: [kat] --
1,172,051 UART: [cold-reset] ++
1,172,501 UART: [fht] FHT @ 0x50003400
1,175,034 UART: [idev] ++
1,175,202 UART: [idev] CDI.KEYID = 6
1,175,562 UART: [idev] SUBJECT.KEYID = 7
1,175,986 UART: [idev] UDS.KEYID = 0
1,176,331 ready_for_fw is high
1,176,331 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,016 UART: [idev] Erasing UDS.KEYID = 0
1,201,225 UART: [idev] Sha1 KeyId Algorithm
1,209,627 UART: [idev] --
1,210,603 UART: [ldev] ++
1,210,771 UART: [ldev] CDI.KEYID = 6
1,211,134 UART: [ldev] SUBJECT.KEYID = 5
1,211,560 UART: [ldev] AUTHORITY.KEYID = 7
1,212,023 UART: [ldev] FE.KEYID = 1
1,217,243 UART: [ldev] Erasing FE.KEYID = 1
1,243,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,463 UART: [ldev] --
1,282,866 UART: [fwproc] Wait for Commands...
1,283,478 UART: [fwproc] Recv command 0x46574c44
1,284,206 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,412 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,716 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,461 >>> mbox cmd response: success
2,775,493 UART: [afmc] ++
2,775,661 UART: [afmc] CDI.KEYID = 6
2,776,023 UART: [afmc] SUBJECT.KEYID = 7
2,776,448 UART: [afmc] AUTHORITY.KEYID = 5
2,811,383 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,894 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,622 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,507 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,226 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,116 UART: [afmc] --
2,855,088 UART: [cold-reset] --
2,855,912 UART: [state] Locking Datavault
2,857,063 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,667 UART: [state] Locking ICCM
2,858,293 UART: [exit] Launching FMC @ 0x40000130
2,863,622 UART:
2,863,638 UART: Running Caliptra FMC ...
2,864,046 UART:
2,864,100 UART: [state] CFI Enabled
2,874,955 UART: [fht] FMC Alias Private Key: 7
2,982,932 UART: [art] Extend RT PCRs Done
2,983,360 UART: [art] Lock RT PCRs Done
2,984,712 UART: [art] Populate DV Done
2,992,955 UART: [fht] FMC Alias Private Key: 7
2,994,035 UART: [art] Derive CDI
2,994,315 UART: [art] Store in in slot 0x4
3,079,598 UART: [art] Derive Key Pair
3,079,958 UART: [art] Store priv key in slot 0x5
3,092,934 UART: [art] Derive Key Pair - Done
3,107,899 UART: [art] Signing Cert with AUTHO
3,108,379 UART: RITY.KEYID = 7
3,123,677 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,442 UART: [art] PUB.X = A169838EE5660C9BC60FDC641133C74C601921EC64C435EA27D4224EE48867915DFDE4F197A8EC74B35258802F7FD189
3,131,206 UART: [art] PUB.Y = 6A6E1EBC67C76CF1619C40CF06146560402FA6028CF743FA309D1FE6A6893506524CB56E082EDAA5007E48B4F6B21B56
3,138,126 UART: [art] SIG.R = CA64490C76DD9B6244297AD945C84B9F00198368FC34C6ED3EA24CB617B972B7BDA411184C0E7B802A01E83E81EA3233
3,144,869 UART: [art] SIG.S = 9B3E8548ECBA84A12A1DEBFC822F709DE411334FEA9954297A0D364D5F94C07DEA17C29850E2C4323E14CC01E9DE20CE
3,168,946 UART: Caliptra RT
3,169,199 UART: [state] CFI Enabled
3,276,263 UART: [rt] RT listening for mailbox commands...
3,276,933 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,663 UART: [rt]cmd =0x54514754, len=24
3,308,834 >>> mbox cmd response data (8 bytes)
3,308,835 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,428 UART:
3,309,444 UART: Running Caliptra ROM ...
3,309,852 UART:
3,309,907 UART: [state] CFI Enabled
3,312,371 UART: [state] LifecycleState = Unprovisioned
3,313,026 UART: [state] DebugLocked = No
3,313,654 UART: [state] WD Timer not started. Device not locked for debugging
3,315,000 UART: [kat] SHA2-256
4,120,650 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,124,775 UART: [kat] ++
4,124,927 UART: [kat] sha1
4,129,095 UART: [kat] SHA2-256
4,131,035 UART: [kat] SHA2-384
4,133,836 UART: [kat] SHA2-512-ACC
4,135,736 UART: [kat] ECC-384
4,145,211 UART: [kat] HMAC-384Kdf
4,149,809 UART: [kat] LMS
4,398,137 UART: [kat] --
4,399,059 UART: [update-reset] ++
5,303,805 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,304,850 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,401,232 >>> mbox cmd response: success
5,401,232 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,401,489 UART: [update-reset] Copying MAN_2 To MAN_1
5,409,503 UART: [update-reset Success] --
5,410,520 UART: [state] Locking Datavault
5,411,358 UART: [state] Locking PCR0, PCR1 and PCR31
5,411,962 UART: [state] Locking ICCM
5,412,596 UART: [exit] Launching FMC @ 0x40000130
5,417,925 UART:
5,417,941 UART: Running Caliptra FMC ...
5,418,349 UART:
5,418,403 UART: [state] CFI Enabled
5,507,680 UART: [art] Extend RT PCRs Done
5,508,108 UART: [art] Lock RT PCRs Done
5,509,411 UART: [art] Populate DV Done
5,517,732 UART: [fht] FMC Alias Private Key: 7
5,518,740 UART: [art] Derive CDI
5,519,020 UART: [art] Store in in slot 0x4
5,604,799 UART: [art] Derive Key Pair
5,605,159 UART: [art] Store priv key in slot 0x5
5,618,367 UART: [art] Derive Key Pair - Done
5,633,012 UART: [art] Signing Cert with AUTHO
5,633,492 UART: RITY.KEYID = 7
5,648,762 UART: [art] Erasing AUTHORITY.KEYID = 7
5,649,527 UART: [art] PUB.X = 8CD55F67335684EC238DF5A448A52688F00D3C0D3BA91B4C325753505DFC359807249CE9638881E916006BDD25734886
5,656,256 UART: [art] PUB.Y = 39D0C77F8C97B1AAC2AB307BC2E5BC05D512BC91B51909F2DF532C06E3CF227B8578B5CE5C5EB216E4329B19E499F032
5,663,209 UART: [art] SIG.R = 6C308BA76DEDE773AE820A802013CDA0F03F1746282DFB7C0F1094F2B0956AC990BADC054CAAC296519D692EEF6375CD
5,669,984 UART: [art] SIG.S = 6559472DC14818F6AE8E51DAE33C86091A45D25AF2833375D582A8868EAC56CE12885561678193AADD858DC12CA74D61
5,693,528 UART: mbox::rt_entry...
5,693,900 UART: ____ _ _ _ ____ _____
5,694,684 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,695,484 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,696,252 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,697,020 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,697,788 UART: |_|
5,698,100 UART:
5,979,442 UART: [rt] Runtime listening for mailbox commands...
5,980,679 >>> mbox cmd response data (120 bytes)
5,980,680 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,980,791 UART:
5,980,807 UART: Running Caliptra ROM ...
5,981,215 UART:
5,981,270 UART: [state] CFI Enabled
5,984,028 UART: [state] LifecycleState = Unprovisioned
5,984,683 UART: [state] DebugLocked = No
5,985,199 UART: [state] WD Timer not started. Device not locked for debugging
5,986,307 UART: [kat] SHA2-256
6,791,957 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,796,082 UART: [kat] ++
6,796,234 UART: [kat] sha1
6,800,370 UART: [kat] SHA2-256
6,802,310 UART: [kat] SHA2-384
6,805,151 UART: [kat] SHA2-512-ACC
6,807,051 UART: [kat] ECC-384
6,816,622 UART: [kat] HMAC-384Kdf
6,821,288 UART: [kat] LMS
7,069,616 UART: [kat] --
7,070,742 UART: [update-reset] ++
7,975,804 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,976,869 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,073,251 >>> mbox cmd response: success
8,073,251 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,073,572 UART: [update-reset] Copying MAN_2 To MAN_1
8,081,586 UART: [update-reset Success] --
8,082,767 UART: [state] Locking Datavault
8,083,503 UART: [state] Locking PCR0, PCR1 and PCR31
8,084,107 UART: [state] Locking ICCM
8,084,665 UART: [exit] Launching FMC @ 0x40000130
8,089,994 UART:
8,090,010 UART: Running Caliptra FMC ...
8,090,418 UART:
8,090,472 UART: [state] CFI Enabled
8,179,375 UART: [art] Extend RT PCRs Done
8,179,803 UART: [art] Lock RT PCRs Done
8,181,192 UART: [art] Populate DV Done
8,189,403 UART: [fht] FMC Alias Private Key: 7
8,190,565 UART: [art] Derive CDI
8,190,845 UART: [art] Store in in slot 0x4
8,276,524 UART: [art] Derive Key Pair
8,276,884 UART: [art] Store priv key in slot 0x5
8,289,550 UART: [art] Derive Key Pair - Done
8,304,049 UART: [art] Signing Cert with AUTHO
8,304,529 UART: RITY.KEYID = 7
8,319,161 UART: [art] Erasing AUTHORITY.KEYID = 7
8,319,926 UART: [art] PUB.X = 5FD0A5305E1F3F172145A5F3ABD0397DBACA32F0E328BADF3221E8F238B63128BCB3BC264A2AF54258BE2D477D974E30
8,326,710 UART: [art] PUB.Y = 070C8F9B072A9CC68C56B38697536DB3231BCA8BC25FD5F43413FB723D3BC127CBD5EFC567FDA2D2E2BFD605595E8994
8,333,662 UART: [art] SIG.R = 0728FE49FD7925E6FFE5920503B55C21F7E28423F702C035FB49B9708F9040B66DBE71E5898DF1BCF65F578EC4B275DC
8,340,426 UART: [art] SIG.S = 902D6E397FCDB77A7840B2B9B38A59293719B7A0977EE0BDE07AAD55654960799733B866EF7C49CF542DAE14260C7932
8,363,930 UART: mbox::rt_entry...
8,364,302 UART: ____ _ _ _ ____ _____
8,365,086 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,365,886 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,366,654 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,367,422 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,368,190 UART: |_|
8,368,502 UART:
8,649,474 UART: [rt] Runtime listening for mailbox commands...
8,650,711 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,775 ready_for_fw is high
1,059,775 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,132 >>> mbox cmd response: success
2,687,548 UART:
2,687,564 UART: Running Caliptra FMC ...
2,687,972 UART:
2,688,026 UART: [state] CFI Enabled
2,698,951 UART: [fht] FMC Alias Private Key: 7
2,806,640 UART: [art] Extend RT PCRs Done
2,807,068 UART: [art] Lock RT PCRs Done
2,808,554 UART: [art] Populate DV Done
2,817,085 UART: [fht] FMC Alias Private Key: 7
2,818,229 UART: [art] Derive CDI
2,818,509 UART: [art] Store in in slot 0x4
2,904,326 UART: [art] Derive Key Pair
2,904,686 UART: [art] Store priv key in slot 0x5
2,917,258 UART: [art] Derive Key Pair - Done
2,931,908 UART: [art] Signing Cert with AUTHO
2,932,388 UART: RITY.KEYID = 7
2,947,398 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,163 UART: [art] PUB.X = B00D89BF9EA47577F916650F408BA84E042FB9052163038A7CF6ECD4B7A81E9E3CB684AF86F083549EC16851BF9DD634
2,954,924 UART: [art] PUB.Y = AB27A917FAAC738041865E4AA2FDE3151B263D290863BFFB4B1F97ED80A435812283AABF32BB349D3C15BC1480193A00
2,961,857 UART: [art] SIG.R = 906BCB6A42E13A199F95C03F02A218E7FD27C0875D976FAE9D79861061CE660F07FF74ACFEF286FCDED6D78831662950
2,968,626 UART: [art] SIG.S = A1BF42488E350A7E29DDBAC9F37939A0E788E7280C194A54422FB3B95F47C8F34E186E371FE2DE731937185602E05ACA
2,992,364 UART: Caliptra RT
2,992,617 UART: [state] CFI Enabled
3,101,279 UART: [rt] RT listening for mailbox commands...
3,101,949 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,779 UART: [rt]cmd =0x54514754, len=24
3,134,136 >>> mbox cmd response data (8 bytes)
3,134,137 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,109,503 >>> mbox cmd response: success
5,109,503 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,122,915 UART:
5,122,931 UART: Running Caliptra FMC ...
5,123,339 UART:
5,123,393 UART: [state] CFI Enabled
5,211,896 UART: [art] Extend RT PCRs Done
5,212,324 UART: [art] Lock RT PCRs Done
5,213,653 UART: [art] Populate DV Done
5,221,798 UART: [fht] FMC Alias Private Key: 7
5,222,970 UART: [art] Derive CDI
5,223,250 UART: [art] Store in in slot 0x4
5,308,797 UART: [art] Derive Key Pair
5,309,157 UART: [art] Store priv key in slot 0x5
5,322,333 UART: [art] Derive Key Pair - Done
5,337,079 UART: [art] Signing Cert with AUTHO
5,337,559 UART: RITY.KEYID = 7
5,352,999 UART: [art] Erasing AUTHORITY.KEYID = 7
5,353,764 UART: [art] PUB.X = B5CB088EAD4F794BF6FF364795A515C2DCAF798946C86DC8B3AC010ABC4AA1BAA7711071AF17F69BE6F216582942C573
5,360,539 UART: [art] PUB.Y = 8E5D04F0979D25CF9F029CC5BB5D76A5B723A68F3A4FA83C005D13FC1513799B8D21091D7E58388A7FB62C62C05C15C3
5,367,464 UART: [art] SIG.R = 30AA35C7530B1CCA992AA23A2D52593869AF94028BFCE67BF032AF987164538A07705D51B7D6D774A5888A2735D6DAD1
5,374,227 UART: [art] SIG.S = FC6549737001E441734365C546E98420538C1B5DA186DF6EE48342889B4A2A6D48D7418C273211663B9DBF2CD63DC116
5,397,605 UART: mbox::rt_entry...
5,397,977 UART: ____ _ _ _ ____ _____
5,398,761 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,399,561 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,400,329 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,401,097 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,401,865 UART: |_|
5,402,177 UART:
5,683,569 UART: [rt] Runtime listening for mailbox commands...
5,684,806 >>> mbox cmd response data (120 bytes)
5,684,807 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,658,677 >>> mbox cmd response: success
7,658,677 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,672,057 UART:
7,672,073 UART: Running Caliptra FMC ...
7,672,481 UART:
7,672,535 UART: [state] CFI Enabled
7,761,540 UART: [art] Extend RT PCRs Done
7,761,968 UART: [art] Lock RT PCRs Done
7,763,231 UART: [art] Populate DV Done
7,771,408 UART: [fht] FMC Alias Private Key: 7
7,772,552 UART: [art] Derive CDI
7,772,832 UART: [art] Store in in slot 0x4
7,858,429 UART: [art] Derive Key Pair
7,858,789 UART: [art] Store priv key in slot 0x5
7,871,313 UART: [art] Derive Key Pair - Done
7,886,116 UART: [art] Signing Cert with AUTHO
7,886,596 UART: RITY.KEYID = 7
7,901,324 UART: [art] Erasing AUTHORITY.KEYID = 7
7,902,089 UART: [art] PUB.X = C3D7C424923FBC12065280358CCEB49102B66E0C7D10AFD79F1FE3EFFBAA934A6B0D634F4EFC6A4DE31AEDB8D1AE399F
7,908,873 UART: [art] PUB.Y = EA50EAE6FC3CC6F74E682EDAF49EC6A42908505ACEC47DA77C7A924AA28E9A454C4E7230B22D95365A3F73BC32376151
7,915,834 UART: [art] SIG.R = 12CFBE2A996680CCE3A48B0DF69C86AC594A5BD791A5E63C2270D52F8A729E922472805E8288BEE3383D3C457386D4A9
7,922,605 UART: [art] SIG.S = 2DD56CE4ED59E5A0C3922DF50656F37855F7E7DA5BAF99BEE483ADD552D8E54009256424D38E02FBF477AF2ACBF4E2FC
7,946,497 UART: mbox::rt_entry...
7,946,869 UART: ____ _ _ _ ____ _____
7,947,653 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,948,453 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,949,221 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,949,989 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,950,757 UART: |_|
7,951,069 UART:
8,230,413 UART: [rt] Runtime listening for mailbox commands...
8,231,650 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,109 UART: [kat] SHA2-256
893,759 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,884 UART: [kat] ++
898,036 UART: [kat] sha1
902,206 UART: [kat] SHA2-256
904,146 UART: [kat] SHA2-384
906,799 UART: [kat] SHA2-512-ACC
908,700 UART: [kat] ECC-384
918,129 UART: [kat] HMAC-384Kdf
922,763 UART: [kat] LMS
1,171,091 UART: [kat] --
1,171,826 UART: [cold-reset] ++
1,172,384 UART: [fht] FHT @ 0x50003400
1,175,081 UART: [idev] ++
1,175,249 UART: [idev] CDI.KEYID = 6
1,175,609 UART: [idev] SUBJECT.KEYID = 7
1,176,033 UART: [idev] UDS.KEYID = 0
1,176,378 ready_for_fw is high
1,176,378 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,725 UART: [idev] Erasing UDS.KEYID = 0
1,200,884 UART: [idev] Sha1 KeyId Algorithm
1,209,436 UART: [idev] --
1,210,514 UART: [ldev] ++
1,210,682 UART: [ldev] CDI.KEYID = 6
1,211,045 UART: [ldev] SUBJECT.KEYID = 5
1,211,471 UART: [ldev] AUTHORITY.KEYID = 7
1,211,934 UART: [ldev] FE.KEYID = 1
1,217,128 UART: [ldev] Erasing FE.KEYID = 1
1,243,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,112 UART: [ldev] --
1,283,531 UART: [fwproc] Wait for Commands...
1,284,225 UART: [fwproc] Recv command 0x46574c44
1,284,953 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,043 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,347 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,206 >>> mbox cmd response: success
2,776,216 UART: [afmc] ++
2,776,384 UART: [afmc] CDI.KEYID = 6
2,776,746 UART: [afmc] SUBJECT.KEYID = 7
2,777,171 UART: [afmc] AUTHORITY.KEYID = 5
2,812,524 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,619 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,367 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,095 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,980 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,699 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,419 UART: [afmc] --
2,855,361 UART: [cold-reset] --
2,856,207 UART: [state] Locking Datavault
2,857,046 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,650 UART: [state] Locking ICCM
2,858,316 UART: [exit] Launching FMC @ 0x40000130
2,863,645 UART:
2,863,661 UART: Running Caliptra FMC ...
2,864,069 UART:
2,864,212 UART: [state] CFI Enabled
2,875,447 UART: [fht] FMC Alias Private Key: 7
2,983,730 UART: [art] Extend RT PCRs Done
2,984,158 UART: [art] Lock RT PCRs Done
2,985,882 UART: [art] Populate DV Done
2,994,163 UART: [fht] FMC Alias Private Key: 7
2,995,185 UART: [art] Derive CDI
2,995,465 UART: [art] Store in in slot 0x4
3,081,346 UART: [art] Derive Key Pair
3,081,706 UART: [art] Store priv key in slot 0x5
3,095,476 UART: [art] Derive Key Pair - Done
3,110,066 UART: [art] Signing Cert with AUTHO
3,110,546 UART: RITY.KEYID = 7
3,125,704 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,469 UART: [art] PUB.X = 9A82ACA1AD9B047A7E6F3A50BC77A0E56CBE3885E04BFE1D90C283822C0A8408568FFC2163EADEBA7B95C6A2EFAA351D
3,133,254 UART: [art] PUB.Y = 6EFA94AA41E6D263F571132592D4D1E92BB06FCE5F7B18983DB20FCA6818C6E0936949550A183E674095F568BADC766F
3,140,202 UART: [art] SIG.R = 2E72794B7AB6B39B7E202AB2BEAD8A9C8139AFE4411D9427D55032085DB5F4F6CA2BA76177DCB2552B601953DD2A2C61
3,146,979 UART: [art] SIG.S = F5635D799681033FD7D6ADDDC4E423C1CD4D68666AE10ECB20CAD972E8ED8CFE92A0E672F673DE16DE8360A3849DB151
3,170,840 UART: Caliptra RT
3,171,185 UART: [state] CFI Enabled
3,279,096 UART: [rt] RT listening for mailbox commands...
3,279,766 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,754 UART: [rt]cmd =0x54514754, len=24
3,312,107 >>> mbox cmd response data (8 bytes)
3,312,108 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,895 UART:
3,312,911 UART: Running Caliptra ROM ...
3,313,319 UART:
3,313,461 UART: [state] CFI Enabled
3,316,231 UART: [state] LifecycleState = Unprovisioned
3,316,886 UART: [state] DebugLocked = No
3,317,472 UART: [state] WD Timer not started. Device not locked for debugging
3,318,722 UART: [kat] SHA2-256
4,124,372 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,128,497 UART: [kat] ++
4,128,649 UART: [kat] sha1
4,133,047 UART: [kat] SHA2-256
4,134,987 UART: [kat] SHA2-384
4,137,658 UART: [kat] SHA2-512-ACC
4,139,558 UART: [kat] ECC-384
4,149,067 UART: [kat] HMAC-384Kdf
4,153,695 UART: [kat] LMS
4,402,023 UART: [kat] --
4,402,859 UART: [update-reset] ++
5,308,275 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,309,488 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,405,870 >>> mbox cmd response: success
5,405,870 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,406,221 UART: [update-reset] Copying MAN_2 To MAN_1
5,414,235 UART: [update-reset Success] --
5,415,336 UART: [state] Locking Datavault
5,416,120 UART: [state] Locking PCR0, PCR1 and PCR31
5,416,724 UART: [state] Locking ICCM
5,417,150 UART: [exit] Launching FMC @ 0x40000130
5,422,479 UART:
5,422,495 UART: Running Caliptra FMC ...
5,422,903 UART:
5,423,046 UART: [state] CFI Enabled
5,511,835 UART: [art] Extend RT PCRs Done
5,512,263 UART: [art] Lock RT PCRs Done
5,513,310 UART: [art] Populate DV Done
5,521,451 UART: [fht] FMC Alias Private Key: 7
5,522,583 UART: [art] Derive CDI
5,522,863 UART: [art] Store in in slot 0x4
5,608,462 UART: [art] Derive Key Pair
5,608,822 UART: [art] Store priv key in slot 0x5
5,622,088 UART: [art] Derive Key Pair - Done
5,636,627 UART: [art] Signing Cert with AUTHO
5,637,107 UART: RITY.KEYID = 7
5,652,329 UART: [art] Erasing AUTHORITY.KEYID = 7
5,653,094 UART: [art] PUB.X = 1972392905ED1EF1D4975887162F62A4A46499CD52A8BC3ABD84855FCDB5FE582857B38BE903284EF80EBC7C4196C304
5,659,854 UART: [art] PUB.Y = A742A312C4CADE06976C2D428ADD7E777935FC81A16DDD7F5338ECA11F795A0FE7C10CA88D3647C0EC385D4312F64574
5,666,805 UART: [art] SIG.R = F94B4DD92FC4D1E42A218E16FDC306A94AB9986475C24E7C2DC8596A9C5A574D3A8BD6E97AD626364C0DC40D2E9CEA11
5,673,582 UART: [art] SIG.S = 0984B08E502FCD69C43164F09628F69444D7FF944A609881934E62CE272CCA6610736927F20F1C69B7B9261DA7A6EC8E
5,697,803 UART: mbox::rt_entry...
5,698,175 UART: ____ _ _ _ ____ _____
5,698,959 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,699,759 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,700,527 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,701,295 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,702,063 UART: |_|
5,702,375 UART:
5,983,991 UART: [rt] Runtime listening for mailbox commands...
5,985,228 >>> mbox cmd response data (120 bytes)
5,985,229 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,985,340 UART:
5,985,356 UART: Running Caliptra ROM ...
5,985,764 UART:
5,985,906 UART: [state] CFI Enabled
5,988,586 UART: [state] LifecycleState = Unprovisioned
5,989,241 UART: [state] DebugLocked = No
5,989,883 UART: [state] WD Timer not started. Device not locked for debugging
5,991,229 UART: [kat] SHA2-256
6,796,879 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,801,004 UART: [kat] ++
6,801,156 UART: [kat] sha1
6,805,440 UART: [kat] SHA2-256
6,807,380 UART: [kat] SHA2-384
6,809,949 UART: [kat] SHA2-512-ACC
6,811,849 UART: [kat] ECC-384
6,821,718 UART: [kat] HMAC-384Kdf
6,826,378 UART: [kat] LMS
7,074,706 UART: [kat] --
7,075,694 UART: [update-reset] ++
7,980,228 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,981,433 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,077,815 >>> mbox cmd response: success
8,077,815 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,078,102 UART: [update-reset] Copying MAN_2 To MAN_1
8,086,116 UART: [update-reset Success] --
8,086,979 UART: [state] Locking Datavault
8,087,687 UART: [state] Locking PCR0, PCR1 and PCR31
8,088,291 UART: [state] Locking ICCM
8,088,915 UART: [exit] Launching FMC @ 0x40000130
8,094,244 UART:
8,094,260 UART: Running Caliptra FMC ...
8,094,668 UART:
8,094,811 UART: [state] CFI Enabled
8,184,236 UART: [art] Extend RT PCRs Done
8,184,664 UART: [art] Lock RT PCRs Done
8,185,881 UART: [art] Populate DV Done
8,194,200 UART: [fht] FMC Alias Private Key: 7
8,195,328 UART: [art] Derive CDI
8,195,608 UART: [art] Store in in slot 0x4
8,281,197 UART: [art] Derive Key Pair
8,281,557 UART: [art] Store priv key in slot 0x5
8,294,771 UART: [art] Derive Key Pair - Done
8,309,465 UART: [art] Signing Cert with AUTHO
8,309,945 UART: RITY.KEYID = 7
8,325,199 UART: [art] Erasing AUTHORITY.KEYID = 7
8,325,964 UART: [art] PUB.X = 96BC33EFFB4B1CF1CAEBE13F8142A783D5D08CAAC3BA0B05E9207004BE3561FC780A3AB1DB8B72D77B612CEBCD98F0AE
8,332,752 UART: [art] PUB.Y = 33549C847FED12A64E8FABCE6B099186E2256C8B750B81C1056B53C468CEDCFB2DB08777B5EF8566A07C9612F3DEDB10
8,339,705 UART: [art] SIG.R = CE3B914737C129F8A58BDB5056120FF00D1B9D8114E4C6FF39802F0916457A12D519A9346EF5D59862B5054EEEFDD974
8,346,465 UART: [art] SIG.S = 2CC3FD1FCA4BD891C96E7187E5B6E4061177847A8AB34C1A3120C6A93072B3C2354059A479D7C2B55CC213B3D785420C
8,370,640 UART: mbox::rt_entry...
8,371,012 UART: ____ _ _ _ ____ _____
8,371,796 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,372,596 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,373,364 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,374,132 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,374,900 UART: |_|
8,375,212 UART:
8,654,910 UART: [rt] Runtime listening for mailbox commands...
8,656,147 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,960 ready_for_fw is high
1,060,960 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,691 >>> mbox cmd response: success
2,687,717 UART:
2,687,733 UART: Running Caliptra FMC ...
2,688,141 UART:
2,688,284 UART: [state] CFI Enabled
2,699,095 UART: [fht] FMC Alias Private Key: 7
2,807,108 UART: [art] Extend RT PCRs Done
2,807,536 UART: [art] Lock RT PCRs Done
2,809,412 UART: [art] Populate DV Done
2,817,475 UART: [fht] FMC Alias Private Key: 7
2,818,613 UART: [art] Derive CDI
2,818,893 UART: [art] Store in in slot 0x4
2,904,910 UART: [art] Derive Key Pair
2,905,270 UART: [art] Store priv key in slot 0x5
2,918,396 UART: [art] Derive Key Pair - Done
2,933,153 UART: [art] Signing Cert with AUTHO
2,933,633 UART: RITY.KEYID = 7
2,949,003 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,768 UART: [art] PUB.X = D52AE5CE41BC6C5508F5E200A65016EEDBAEE9704C53295A070975E5978BAD03441338B8FBC09DB8DC0400C0520B93BE
2,956,486 UART: [art] PUB.Y = 4A4C8BBEAF51781F1E24AAE7A623C0C3751C7D110BE9F2194033643DFEB32676193FA417CE0DEC204992318EED8B0387
2,963,435 UART: [art] SIG.R = 418DE56847BC77A847C20F2971B8A128B5AAAD244A96AAC70196C63BC43DA9004ADA4A9D62AA8A9F16309099298A47A3
2,970,183 UART: [art] SIG.S = D207A4E79E33DDCCDFBC08B100C70E47B199AA39577CEF1F8464131A1FBAB168A251FA45E421D8EF61E38FC026301E1C
2,993,673 UART: Caliptra RT
2,994,018 UART: [state] CFI Enabled
3,102,647 UART: [rt] RT listening for mailbox commands...
3,103,317 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,477 UART: [rt]cmd =0x54514754, len=24
3,135,546 >>> mbox cmd response data (8 bytes)
3,135,547 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,111,754 >>> mbox cmd response: success
5,111,754 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,125,462 UART:
5,125,478 UART: Running Caliptra FMC ...
5,125,886 UART:
5,126,029 UART: [state] CFI Enabled
5,215,158 UART: [art] Extend RT PCRs Done
5,215,586 UART: [art] Lock RT PCRs Done
5,216,775 UART: [art] Populate DV Done
5,224,944 UART: [fht] FMC Alias Private Key: 7
5,225,964 UART: [art] Derive CDI
5,226,244 UART: [art] Store in in slot 0x4
5,312,017 UART: [art] Derive Key Pair
5,312,377 UART: [art] Store priv key in slot 0x5
5,325,603 UART: [art] Derive Key Pair - Done
5,340,227 UART: [art] Signing Cert with AUTHO
5,340,707 UART: RITY.KEYID = 7
5,356,335 UART: [art] Erasing AUTHORITY.KEYID = 7
5,357,100 UART: [art] PUB.X = 035EA349FCF7BDCA891ED087B31477EADEF5A6CA707CF3147399C0C32CB237D75F1414404AC52224509601F3B9C86C97
5,363,870 UART: [art] PUB.Y = 20053C57AF926A5A314C1714AB6C605099DF37E7671B412C143830CB5447AB28448F458AD5CDFEC05256A572598F3895
5,370,811 UART: [art] SIG.R = 09A942F43BB01A46A507CE1FA349073D0010A5B1965331E23D3D17C0E9D7B2AA23E7D8F15C08490A871AC92345F9EBAD
5,377,550 UART: [art] SIG.S = A6170D98CFDB9FCDF8F1D4F8CF17B09162C6B5490378DCEEE76A8647073932EDCC966445D971B8B172CC3E4BAD190843
5,401,431 UART: mbox::rt_entry...
5,401,803 UART: ____ _ _ _ ____ _____
5,402,587 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,403,387 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,404,155 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,404,923 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,405,691 UART: |_|
5,406,003 UART:
5,688,587 UART: [rt] Runtime listening for mailbox commands...
5,689,824 >>> mbox cmd response data (120 bytes)
5,689,825 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,664,448 >>> mbox cmd response: success
7,664,448 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,677,794 UART:
7,677,810 UART: Running Caliptra FMC ...
7,678,218 UART:
7,678,361 UART: [state] CFI Enabled
7,767,564 UART: [art] Extend RT PCRs Done
7,767,992 UART: [art] Lock RT PCRs Done
7,769,205 UART: [art] Populate DV Done
7,777,316 UART: [fht] FMC Alias Private Key: 7
7,778,362 UART: [art] Derive CDI
7,778,642 UART: [art] Store in in slot 0x4
7,864,539 UART: [art] Derive Key Pair
7,864,899 UART: [art] Store priv key in slot 0x5
7,877,997 UART: [art] Derive Key Pair - Done
7,892,952 UART: [art] Signing Cert with AUTHO
7,893,432 UART: RITY.KEYID = 7
7,908,772 UART: [art] Erasing AUTHORITY.KEYID = 7
7,909,537 UART: [art] PUB.X = 4918D15F0865B82101942EE8C4AD119B250824D6ED7FEAB526ECBBF039B265E484E4ED55749C70C6B501D4CFA5A21401
7,916,298 UART: [art] PUB.Y = DCC4FFB395AA940DCD85B5897543A57B6D57FC061D3CF197E8D53F3113BB2A25496D6205E1C4122AF3A1DCA4A9969C0F
7,923,250 UART: [art] SIG.R = 6E801704F0FA6BD3C2CB83FFE6B2001A16B79B0C94997A69E1526370FC3204229AF8F62ACC144A2B220A7293BCC51119
7,929,990 UART: [art] SIG.S = 05C65B7B339C85509F92ED6ED9F0E13B5D4E911D5461D70F05058C22FCE805C6C228CFE0292F7C4451E018AD7C4A57C2
7,953,400 UART: mbox::rt_entry...
7,953,772 UART: ____ _ _ _ ____ _____
7,954,556 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,955,356 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,956,124 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,956,892 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,957,660 UART: |_|
7,957,972 UART:
8,239,794 UART: [rt] Runtime listening for mailbox commands...
8,241,031 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,680 UART: [state] LifecycleState = Unprovisioned
86,335 UART: [state] DebugLocked = No
86,933 UART: [state] WD Timer not started. Device not locked for debugging
88,084 UART: [kat] SHA2-256
891,634 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,763 UART: [kat] ++
895,915 UART: [kat] sha1
900,115 UART: [kat] SHA2-256
902,055 UART: [kat] SHA2-384
904,878 UART: [kat] SHA2-512-ACC
906,779 UART: [kat] ECC-384
916,668 UART: [kat] HMAC-384Kdf
921,400 UART: [kat] LMS
1,169,712 UART: [kat] --
1,170,641 UART: [cold-reset] ++
1,171,083 UART: [fht] FHT @ 0x50003400
1,173,871 UART: [idev] ++
1,174,039 UART: [idev] CDI.KEYID = 6
1,174,400 UART: [idev] SUBJECT.KEYID = 7
1,174,825 UART: [idev] UDS.KEYID = 0
1,175,171 ready_for_fw is high
1,175,171 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,591 UART: [idev] Erasing UDS.KEYID = 0
1,199,635 UART: [idev] Sha1 KeyId Algorithm
1,208,331 UART: [idev] --
1,209,332 UART: [ldev] ++
1,209,500 UART: [ldev] CDI.KEYID = 6
1,209,864 UART: [ldev] SUBJECT.KEYID = 5
1,210,291 UART: [ldev] AUTHORITY.KEYID = 7
1,210,754 UART: [ldev] FE.KEYID = 1
1,215,834 UART: [ldev] Erasing FE.KEYID = 1
1,241,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,100 UART: [ldev] --
1,281,560 UART: [fwproc] Wait for Commands...
1,282,245 UART: [fwproc] Recv command 0x46574c44
1,282,978 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,974 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,283 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,003 >>> mbox cmd response: success
2,773,116 UART: [afmc] ++
2,773,284 UART: [afmc] CDI.KEYID = 6
2,773,647 UART: [afmc] SUBJECT.KEYID = 7
2,774,073 UART: [afmc] AUTHORITY.KEYID = 5
2,810,204 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,502 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,253 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,982 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,865 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,584 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,383 UART: [afmc] --
2,853,507 UART: [cold-reset] --
2,854,291 UART: [state] Locking Datavault
2,855,530 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,134 UART: [state] Locking ICCM
2,856,592 UART: [exit] Launching FMC @ 0x40000130
2,861,921 UART:
2,861,937 UART: Running Caliptra FMC ...
2,862,345 UART:
2,862,399 UART: [state] CFI Enabled
2,873,152 UART: [fht] FMC Alias Private Key: 7
2,981,437 UART: [art] Extend RT PCRs Done
2,981,865 UART: [art] Lock RT PCRs Done
2,983,147 UART: [art] Populate DV Done
2,991,508 UART: [fht] FMC Alias Private Key: 7
2,992,558 UART: [art] Derive CDI
2,992,838 UART: [art] Store in in slot 0x4
3,078,619 UART: [art] Derive Key Pair
3,078,979 UART: [art] Store priv key in slot 0x5
3,091,761 UART: [art] Derive Key Pair - Done
3,106,736 UART: [art] Signing Cert with AUTHO
3,107,216 UART: RITY.KEYID = 7
3,122,612 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,377 UART: [art] PUB.X = 197E8E9D2DD3ADE5596C70569CA3E0B8591E1B403A2E46F30B81C85BAB0A38332CF189A181CAD05DCEFCB9F4C6A9EFF5
3,130,163 UART: [art] PUB.Y = AA711D68882D0520C69A2F7BACCE93DA51F7107C9A118B075A21A80BC87D0EDAD73AD4588FCD649F9EDEDEB3F245CB01
3,137,120 UART: [art] SIG.R = 148A5416EC8E8743C8640EFABDC1034C0BCBAE8185B87AD19132D92E825597A090D534C95309A2104B0B6457F6099AEA
3,143,874 UART: [art] SIG.S = 1F8BF5412D5317705DC57B2F99A747E987C303F44FC9AF31890D66781E92A15E734DB05C293A23F7C9DC9520289F4C69
3,167,817 UART: Caliptra RT
3,168,070 UART: [state] CFI Enabled
3,275,183 UART: [rt] RT listening for mailbox commands...
3,275,853 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,669 UART: [rt]cmd =0x54514754, len=24
3,307,962 >>> mbox cmd response data (8 bytes)
3,307,963 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,876 UART:
3,308,892 UART: Running Caliptra ROM ...
3,309,300 UART:
3,309,355 UART: [state] CFI Enabled
3,312,053 UART: [state] LifecycleState = Unprovisioned
3,312,708 UART: [state] DebugLocked = No
3,313,354 UART: [state] WD Timer not started. Device not locked for debugging
3,314,668 UART: [kat] SHA2-256
4,118,218 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,122,347 UART: [kat] ++
4,122,499 UART: [kat] sha1
4,126,795 UART: [kat] SHA2-256
4,128,735 UART: [kat] SHA2-384
4,131,434 UART: [kat] SHA2-512-ACC
4,133,334 UART: [kat] ECC-384
4,142,963 UART: [kat] HMAC-384Kdf
4,147,663 UART: [kat] LMS
4,395,975 UART: [kat] --
4,396,855 UART: [update-reset] ++
5,301,190 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,302,313 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,398,695 >>> mbox cmd response: success
5,398,695 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,398,900 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,914 UART: [update-reset Success] --
5,407,853 UART: [state] Locking Datavault
5,408,547 UART: [state] Locking PCR0, PCR1 and PCR31
5,409,151 UART: [state] Locking ICCM
5,409,633 UART: [exit] Launching FMC @ 0x40000130
5,414,962 UART:
5,414,978 UART: Running Caliptra FMC ...
5,415,386 UART:
5,415,440 UART: [state] CFI Enabled
5,504,735 UART: [art] Extend RT PCRs Done
5,505,163 UART: [art] Lock RT PCRs Done
5,506,304 UART: [art] Populate DV Done
5,514,591 UART: [fht] FMC Alias Private Key: 7
5,515,717 UART: [art] Derive CDI
5,515,997 UART: [art] Store in in slot 0x4
5,601,416 UART: [art] Derive Key Pair
5,601,776 UART: [art] Store priv key in slot 0x5
5,615,058 UART: [art] Derive Key Pair - Done
5,629,873 UART: [art] Signing Cert with AUTHO
5,630,353 UART: RITY.KEYID = 7
5,645,629 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,394 UART: [art] PUB.X = 1E183D36B4FAF7C07E068427EA95357A61D059F86C9A41029D952A4E6B9443D1DD0DA5377ECBA4A87ED52215F2378E7F
5,653,161 UART: [art] PUB.Y = 33C9702A3F9E8435DA4A23AD6F41E44ADAC494807BA9ABF05C01A34786EE9C65FEFE8BB6D25F054174603EA91B207D50
5,660,117 UART: [art] SIG.R = C0CDFE0CB976F007D5D881A1F4F2B88B31651BEF9474F709AD93C1B5390EC38AA916CA8824E0F4B2ECC5C2BDC4E45CA0
5,666,897 UART: [art] SIG.S = F1984218E23E6DFFBAF16E673D04256FCCA0B802007DE7FEE0E8367FD984B70893ABDD599510DEB3FD48754215100FE2
5,690,652 UART: mbox::rt_entry...
5,691,024 UART: ____ _ _ _ ____ _____
5,691,808 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,692,608 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,693,376 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,694,144 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,694,912 UART: |_|
5,695,224 UART:
5,978,103 UART: [rt] Runtime listening for mailbox commands...
5,979,340 >>> mbox cmd response data (120 bytes)
5,979,341 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,979,452 UART:
5,979,468 UART: Running Caliptra ROM ...
5,979,876 UART:
5,979,931 UART: [state] CFI Enabled
5,982,539 UART: [state] LifecycleState = Unprovisioned
5,983,194 UART: [state] DebugLocked = No
5,983,716 UART: [state] WD Timer not started. Device not locked for debugging
5,984,882 UART: [kat] SHA2-256
6,788,432 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,792,561 UART: [kat] ++
6,792,713 UART: [kat] sha1
6,796,963 UART: [kat] SHA2-256
6,798,903 UART: [kat] SHA2-384
6,801,740 UART: [kat] SHA2-512-ACC
6,803,640 UART: [kat] ECC-384
6,813,291 UART: [kat] HMAC-384Kdf
6,817,745 UART: [kat] LMS
7,066,057 UART: [kat] --
7,066,953 UART: [update-reset] ++
7,972,396 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,973,601 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,069,983 >>> mbox cmd response: success
8,069,983 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,070,128 UART: [update-reset] Copying MAN_2 To MAN_1
8,078,142 UART: [update-reset Success] --
8,078,929 UART: [state] Locking Datavault
8,079,773 UART: [state] Locking PCR0, PCR1 and PCR31
8,080,377 UART: [state] Locking ICCM
8,080,985 UART: [exit] Launching FMC @ 0x40000130
8,086,314 UART:
8,086,330 UART: Running Caliptra FMC ...
8,086,738 UART:
8,086,792 UART: [state] CFI Enabled
8,175,903 UART: [art] Extend RT PCRs Done
8,176,331 UART: [art] Lock RT PCRs Done
8,177,776 UART: [art] Populate DV Done
8,186,143 UART: [fht] FMC Alias Private Key: 7
8,187,183 UART: [art] Derive CDI
8,187,463 UART: [art] Store in in slot 0x4
8,272,774 UART: [art] Derive Key Pair
8,273,134 UART: [art] Store priv key in slot 0x5
8,286,162 UART: [art] Derive Key Pair - Done
8,301,004 UART: [art] Signing Cert with AUTHO
8,301,484 UART: RITY.KEYID = 7
8,316,444 UART: [art] Erasing AUTHORITY.KEYID = 7
8,317,209 UART: [art] PUB.X = B2F5D8278D31CD6F31D73D07005D1C0F74915F400E96A85E268125C6FE21005A474E01D59B3DCC44E3B8E0D9DBF180BA
8,323,931 UART: [art] PUB.Y = 1A34B5E64703FA2FE53B07FDCA8DD9CF039753B5CC80A4EB20111392BEF45605EE4C4D63CE0156549FED48AA87A5083B
8,330,877 UART: [art] SIG.R = 58D9D04216F8EA2693C1053CEF9703EBF20AE69CCA4BB22F648271185850543A4AB67E0CB2E7CD541CB5BA1999E20A08
8,337,637 UART: [art] SIG.S = 0BD169CDA435268355A38738B789BA38BC5DFD3357805F9940CA57DF657F7A1A14E02408AAB0CEAF06071213788F3DAC
8,360,932 UART: mbox::rt_entry...
8,361,304 UART: ____ _ _ _ ____ _____
8,362,088 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,362,888 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,363,656 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,364,424 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,365,192 UART: |_|
8,365,504 UART:
8,644,180 UART: [rt] Runtime listening for mailbox commands...
8,645,417 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,778 ready_for_fw is high
1,055,778 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,185 >>> mbox cmd response: success
2,682,605 UART:
2,682,621 UART: Running Caliptra FMC ...
2,683,029 UART:
2,683,083 UART: [state] CFI Enabled
2,693,414 UART: [fht] FMC Alias Private Key: 7
2,801,433 UART: [art] Extend RT PCRs Done
2,801,861 UART: [art] Lock RT PCRs Done
2,803,109 UART: [art] Populate DV Done
2,811,534 UART: [fht] FMC Alias Private Key: 7
2,812,682 UART: [art] Derive CDI
2,812,962 UART: [art] Store in in slot 0x4
2,899,021 UART: [art] Derive Key Pair
2,899,381 UART: [art] Store priv key in slot 0x5
2,912,931 UART: [art] Derive Key Pair - Done
2,927,628 UART: [art] Signing Cert with AUTHO
2,928,108 UART: RITY.KEYID = 7
2,942,982 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,747 UART: [art] PUB.X = DC5D49D7D886EEEE4DF96BDDF382139C3009D3CB0275855FEE06CC7CE8325A119B9FE5B74E71C644A060667138988F0B
2,950,515 UART: [art] PUB.Y = 28192F65C287AFA775D4609D367E280162947BD11E72617248BE52A2F8BEB8B8D54A63074495B188235FE734EC699FB5
2,957,453 UART: [art] SIG.R = 0FB610372AB7E79DE5F91776E5EA689FEE43F3A93987741EF8CBADE7C551492E70C9687603BE0A95B22A9226193FB965
2,964,218 UART: [art] SIG.S = 1A788AE47A52718B1224F653A96BABBF51F39478670B1639B9D312513B12AADF84147D5FA3A1508DED0FC42C7DB00317
2,988,218 UART: Caliptra RT
2,988,471 UART: [state] CFI Enabled
3,095,208 UART: [rt] RT listening for mailbox commands...
3,095,878 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,814 UART: [rt]cmd =0x54514754, len=24
3,128,173 >>> mbox cmd response data (8 bytes)
3,128,174 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,101,021 >>> mbox cmd response: success
5,101,021 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,114,283 UART:
5,114,299 UART: Running Caliptra FMC ...
5,114,707 UART:
5,114,761 UART: [state] CFI Enabled
5,203,760 UART: [art] Extend RT PCRs Done
5,204,188 UART: [art] Lock RT PCRs Done
5,205,267 UART: [art] Populate DV Done
5,213,208 UART: [fht] FMC Alias Private Key: 7
5,214,224 UART: [art] Derive CDI
5,214,504 UART: [art] Store in in slot 0x4
5,300,121 UART: [art] Derive Key Pair
5,300,481 UART: [art] Store priv key in slot 0x5
5,313,949 UART: [art] Derive Key Pair - Done
5,328,899 UART: [art] Signing Cert with AUTHO
5,329,379 UART: RITY.KEYID = 7
5,344,345 UART: [art] Erasing AUTHORITY.KEYID = 7
5,345,110 UART: [art] PUB.X = 83C3500F938AE3E7200CA99C7BC2321566209096F0EFEE44683E027316E4625822F2EA5D781E6EE0147B142920E0988B
5,351,863 UART: [art] PUB.Y = A5D2207CF152DDF40F2014F714AEDB756092B1A835DE1B1E06BC2E266729E5CD9E11944ACEC29A9F4FBF0FDFF76060F9
5,358,822 UART: [art] SIG.R = B2EEA46A3CACD84F73DD4ED26D71B9023707AA981212F88A18564C099785F1B4185E679FFE4AC2C19850E53BF7B67CF3
5,365,593 UART: [art] SIG.S = 27F09AFCB75E9B541C8F83D07CA3A12679E8BCD2694896D17252631A3E47A019B52F4A19681CD38909CBF8706C6BF46D
5,389,159 UART: mbox::rt_entry...
5,389,531 UART: ____ _ _ _ ____ _____
5,390,315 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,391,115 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,391,883 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,392,651 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,393,419 UART: |_|
5,393,731 UART:
5,674,007 UART: [rt] Runtime listening for mailbox commands...
5,675,244 >>> mbox cmd response data (120 bytes)
5,675,245 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,646,814 >>> mbox cmd response: success
7,646,814 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,659,906 UART:
7,659,922 UART: Running Caliptra FMC ...
7,660,330 UART:
7,660,384 UART: [state] CFI Enabled
7,749,593 UART: [art] Extend RT PCRs Done
7,750,021 UART: [art] Lock RT PCRs Done
7,751,220 UART: [art] Populate DV Done
7,759,589 UART: [fht] FMC Alias Private Key: 7
7,760,765 UART: [art] Derive CDI
7,761,045 UART: [art] Store in in slot 0x4
7,846,452 UART: [art] Derive Key Pair
7,846,812 UART: [art] Store priv key in slot 0x5
7,860,426 UART: [art] Derive Key Pair - Done
7,874,972 UART: [art] Signing Cert with AUTHO
7,875,452 UART: RITY.KEYID = 7
7,890,992 UART: [art] Erasing AUTHORITY.KEYID = 7
7,891,757 UART: [art] PUB.X = 7D547870AF69B7D6BF872014EF39525711417129A24B76F214E2D53BD5A5EDC7A29B676F971B054AB88021379F5BE7D8
7,898,522 UART: [art] PUB.Y = C93251394A634EE7635425F4BF43E5E4811A855700628F57B624BF652B181DF7782CAD842D784FEF1D919DDB76E5E229
7,905,448 UART: [art] SIG.R = 49E0F753F6B59681B298B1BDB6233CBD6396F1E3F5B1525B7C418A2CAFC37AB8401814CCB3088C45B29516E70A3F84BC
7,912,220 UART: [art] SIG.S = 527989D245842521E686882359FC6A969D38CA154F38FF2435DE30DFB1B813AF04961A68595956B1FAD72743E8780A74
7,935,775 UART: mbox::rt_entry...
7,936,147 UART: ____ _ _ _ ____ _____
7,936,931 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,937,731 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,938,499 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,939,267 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,940,035 UART: |_|
7,940,347 UART:
8,219,689 UART: [rt] Runtime listening for mailbox commands...
8,220,926 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,896 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
891,721 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,850 UART: [kat] ++
896,002 UART: [kat] sha1
900,238 UART: [kat] SHA2-256
902,178 UART: [kat] SHA2-384
904,769 UART: [kat] SHA2-512-ACC
906,670 UART: [kat] ECC-384
916,625 UART: [kat] HMAC-384Kdf
921,395 UART: [kat] LMS
1,169,707 UART: [kat] --
1,170,938 UART: [cold-reset] ++
1,171,324 UART: [fht] FHT @ 0x50003400
1,173,938 UART: [idev] ++
1,174,106 UART: [idev] CDI.KEYID = 6
1,174,467 UART: [idev] SUBJECT.KEYID = 7
1,174,892 UART: [idev] UDS.KEYID = 0
1,175,238 ready_for_fw is high
1,175,238 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,578 UART: [idev] Erasing UDS.KEYID = 0
1,199,958 UART: [idev] Sha1 KeyId Algorithm
1,208,994 UART: [idev] --
1,209,925 UART: [ldev] ++
1,210,093 UART: [ldev] CDI.KEYID = 6
1,210,457 UART: [ldev] SUBJECT.KEYID = 5
1,210,884 UART: [ldev] AUTHORITY.KEYID = 7
1,211,347 UART: [ldev] FE.KEYID = 1
1,216,831 UART: [ldev] Erasing FE.KEYID = 1
1,243,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,595 UART: [ldev] --
1,283,017 UART: [fwproc] Wait for Commands...
1,283,680 UART: [fwproc] Recv command 0x46574c44
1,284,413 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,087 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,491 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,800 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,580 >>> mbox cmd response: success
2,775,661 UART: [afmc] ++
2,775,829 UART: [afmc] CDI.KEYID = 6
2,776,192 UART: [afmc] SUBJECT.KEYID = 7
2,776,618 UART: [afmc] AUTHORITY.KEYID = 5
2,812,247 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,727 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,478 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,207 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,090 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,809 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,534 UART: [afmc] --
2,855,446 UART: [cold-reset] --
2,856,410 UART: [state] Locking Datavault
2,857,883 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,487 UART: [state] Locking ICCM
2,858,967 UART: [exit] Launching FMC @ 0x40000130
2,864,296 UART:
2,864,312 UART: Running Caliptra FMC ...
2,864,720 UART:
2,864,863 UART: [state] CFI Enabled
2,875,562 UART: [fht] FMC Alias Private Key: 7
2,983,341 UART: [art] Extend RT PCRs Done
2,983,769 UART: [art] Lock RT PCRs Done
2,985,397 UART: [art] Populate DV Done
2,993,814 UART: [fht] FMC Alias Private Key: 7
2,994,990 UART: [art] Derive CDI
2,995,270 UART: [art] Store in in slot 0x4
3,080,701 UART: [art] Derive Key Pair
3,081,061 UART: [art] Store priv key in slot 0x5
3,094,761 UART: [art] Derive Key Pair - Done
3,109,666 UART: [art] Signing Cert with AUTHO
3,110,146 UART: RITY.KEYID = 7
3,125,704 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,469 UART: [art] PUB.X = C4048659701464A24DC8EB49016B12F58B3776582F6023B9B6DDB5AF7C39EF6DB9FA490A3D043A9368B84DA13F08E25D
3,133,228 UART: [art] PUB.Y = 83973B89B849B19B5FF084591DC8B63ADCB2481C2C04A695807D3A4187A093131FDD132E3E723C00C3D824CDE12B334F
3,140,155 UART: [art] SIG.R = 812E8BAF2D93D068741775890AC1799A3633DDC692A0C578A60F18708525C7943C26520392A9C71D6F532FC8C2A3D4D8
3,146,910 UART: [art] SIG.S = EAF9F23D00AB4740035E3F809A1FC236F38D21E8313063FF6D3D564D9221AFF2A21A74AF588ECFBA1B93A034A94DB873
3,170,750 UART: Caliptra RT
3,171,095 UART: [state] CFI Enabled
3,279,537 UART: [rt] RT listening for mailbox commands...
3,280,207 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,067 UART: [rt]cmd =0x54514754, len=24
3,312,210 >>> mbox cmd response data (8 bytes)
3,312,211 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,916 UART:
3,312,932 UART: Running Caliptra ROM ...
3,313,340 UART:
3,313,482 UART: [state] CFI Enabled
3,316,152 UART: [state] LifecycleState = Unprovisioned
3,316,807 UART: [state] DebugLocked = No
3,317,477 UART: [state] WD Timer not started. Device not locked for debugging
3,318,735 UART: [kat] SHA2-256
4,122,285 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,126,414 UART: [kat] ++
4,126,566 UART: [kat] sha1
4,130,858 UART: [kat] SHA2-256
4,132,798 UART: [kat] SHA2-384
4,135,477 UART: [kat] SHA2-512-ACC
4,137,377 UART: [kat] ECC-384
4,147,148 UART: [kat] HMAC-384Kdf
4,151,890 UART: [kat] LMS
4,400,202 UART: [kat] --
4,401,026 UART: [update-reset] ++
5,305,037 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,306,226 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,402,608 >>> mbox cmd response: success
5,402,608 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,402,839 UART: [update-reset] Copying MAN_2 To MAN_1
5,410,853 UART: [update-reset Success] --
5,412,032 UART: [state] Locking Datavault
5,412,750 UART: [state] Locking PCR0, PCR1 and PCR31
5,413,354 UART: [state] Locking ICCM
5,413,942 UART: [exit] Launching FMC @ 0x40000130
5,419,271 UART:
5,419,287 UART: Running Caliptra FMC ...
5,419,695 UART:
5,419,838 UART: [state] CFI Enabled
5,509,203 UART: [art] Extend RT PCRs Done
5,509,631 UART: [art] Lock RT PCRs Done
5,510,912 UART: [art] Populate DV Done
5,519,191 UART: [fht] FMC Alias Private Key: 7
5,520,365 UART: [art] Derive CDI
5,520,645 UART: [art] Store in in slot 0x4
5,606,138 UART: [art] Derive Key Pair
5,606,498 UART: [art] Store priv key in slot 0x5
5,619,868 UART: [art] Derive Key Pair - Done
5,634,989 UART: [art] Signing Cert with AUTHO
5,635,469 UART: RITY.KEYID = 7
5,650,965 UART: [art] Erasing AUTHORITY.KEYID = 7
5,651,730 UART: [art] PUB.X = 2649C194E24FC9F377A4DDF826EE82EB6379C5B28E997344CA93B6DD3A5D807BED212E2DFB80B15AB9A0B5D0A145E550
5,658,514 UART: [art] PUB.Y = 89D66B11BCF75E2C471B48612CE2E8D102A8702B5D42C998238E2CF3E9124E2D16223D7C1BD6D21C50F781DB51B07680
5,665,463 UART: [art] SIG.R = F278E38D1EA8F2708FAA9E8706A4FCFF8E1848549D8A261279A9DC1D55B678928B0F1EAE1E947E55D87BCB53EACEE97C
5,672,245 UART: [art] SIG.S = 24D512DD70DAFBDDE937E002F1A3C491F1A6BDFB20B426FFE31E433A79623BB6A58CA0D92801FDB296B804A606B9246E
5,696,288 UART: mbox::rt_entry...
5,696,660 UART: ____ _ _ _ ____ _____
5,697,444 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,698,244 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,699,012 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,699,780 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,700,548 UART: |_|
5,700,860 UART:
5,983,318 UART: [rt] Runtime listening for mailbox commands...
5,984,555 >>> mbox cmd response data (120 bytes)
5,984,556 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,984,667 UART:
5,984,683 UART: Running Caliptra ROM ...
5,985,091 UART:
5,985,233 UART: [state] CFI Enabled
5,987,801 UART: [state] LifecycleState = Unprovisioned
5,988,456 UART: [state] DebugLocked = No
5,989,136 UART: [state] WD Timer not started. Device not locked for debugging
5,990,302 UART: [kat] SHA2-256
6,793,852 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,797,981 UART: [kat] ++
6,798,133 UART: [kat] sha1
6,802,317 UART: [kat] SHA2-256
6,804,257 UART: [kat] SHA2-384
6,806,990 UART: [kat] SHA2-512-ACC
6,808,890 UART: [kat] ECC-384
6,819,079 UART: [kat] HMAC-384Kdf
6,823,725 UART: [kat] LMS
7,072,037 UART: [kat] --
7,072,999 UART: [update-reset] ++
7,977,946 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,978,975 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,075,357 >>> mbox cmd response: success
8,075,357 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,075,524 UART: [update-reset] Copying MAN_2 To MAN_1
8,083,538 UART: [update-reset Success] --
8,084,431 UART: [state] Locking Datavault
8,085,235 UART: [state] Locking PCR0, PCR1 and PCR31
8,085,839 UART: [state] Locking ICCM
8,086,411 UART: [exit] Launching FMC @ 0x40000130
8,091,740 UART:
8,091,756 UART: Running Caliptra FMC ...
8,092,164 UART:
8,092,307 UART: [state] CFI Enabled
8,181,452 UART: [art] Extend RT PCRs Done
8,181,880 UART: [art] Lock RT PCRs Done
8,183,311 UART: [art] Populate DV Done
8,191,596 UART: [fht] FMC Alias Private Key: 7
8,192,620 UART: [art] Derive CDI
8,192,900 UART: [art] Store in in slot 0x4
8,278,575 UART: [art] Derive Key Pair
8,278,935 UART: [art] Store priv key in slot 0x5
8,291,969 UART: [art] Derive Key Pair - Done
8,306,706 UART: [art] Signing Cert with AUTHO
8,307,186 UART: RITY.KEYID = 7
8,322,272 UART: [art] Erasing AUTHORITY.KEYID = 7
8,323,037 UART: [art] PUB.X = 3EC1214C4DD3D20904C98681ABE895DA4488F8FB651771335009D4A3B4BF5F2B49A55A5386234940A0F0F822DC60B8EB
8,329,800 UART: [art] PUB.Y = 75656720E1BE5E2C9B0427527FA444DC685E3639F4CFCE74290814DBF11E8BA0952FEC23A20C9553EBDBF33F0970FC83
8,336,746 UART: [art] SIG.R = 564E70DB397FAE6A2741E830E970FF37711D80F687FFB29AFBE071CF2F09C4D90631C10F638FF00435799A758C7D22C4
8,343,508 UART: [art] SIG.S = 0F73BF23DFF6C268DF42F49AE2684C4B7D4F736678F6AA9840378890F0E38097B25CB2934B683E3DE3F2F88EE03811ED
8,367,200 UART: mbox::rt_entry...
8,367,572 UART: ____ _ _ _ ____ _____
8,368,356 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,369,156 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,369,924 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,370,692 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,371,460 UART: |_|
8,371,772 UART:
8,653,900 UART: [rt] Runtime listening for mailbox commands...
8,655,137 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,105 ready_for_fw is high
1,057,105 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,704 >>> mbox cmd response: success
2,687,470 UART:
2,687,486 UART: Running Caliptra FMC ...
2,687,894 UART:
2,688,037 UART: [state] CFI Enabled
2,698,598 UART: [fht] FMC Alias Private Key: 7
2,806,683 UART: [art] Extend RT PCRs Done
2,807,111 UART: [art] Lock RT PCRs Done
2,808,813 UART: [art] Populate DV Done
2,816,996 UART: [fht] FMC Alias Private Key: 7
2,817,968 UART: [art] Derive CDI
2,818,248 UART: [art] Store in in slot 0x4
2,904,085 UART: [art] Derive Key Pair
2,904,445 UART: [art] Store priv key in slot 0x5
2,917,771 UART: [art] Derive Key Pair - Done
2,932,400 UART: [art] Signing Cert with AUTHO
2,932,880 UART: RITY.KEYID = 7
2,948,260 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,025 UART: [art] PUB.X = 8115E4DA7B95BEEF0173798682CA9EB5B4FC03C0A6CDA3861EEFB3577EA89E06F1A419CFB76A81F7EFD05B1875636036
2,955,800 UART: [art] PUB.Y = 84ADDF4E3F88038CA8E7AC80D2C88AFDE328D3BA898F378534EB49AEFDFCA916D5C47F3DA7B45D912A638DA0A6628E3A
2,962,771 UART: [art] SIG.R = 5B7D52EEA2C95F722AD0C714D18567DFF9C466585E9FA545A862554637795B5F1D550C6A1483E34D8A0E63DB5C7E3503
2,969,534 UART: [art] SIG.S = CAA679C024BC9C2CDBD8C086259C9CA1AF097B0D981093E3A84B3E4967E34E9A65A45C01AA2A4A5ED9D6A3DFCE816810
2,993,494 UART: Caliptra RT
2,993,839 UART: [state] CFI Enabled
3,102,250 UART: [rt] RT listening for mailbox commands...
3,102,920 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,070 UART: [rt]cmd =0x54514754, len=24
3,135,093 >>> mbox cmd response data (8 bytes)
3,135,094 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,107,524 >>> mbox cmd response: success
5,107,524 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,120,732 UART:
5,120,748 UART: Running Caliptra FMC ...
5,121,156 UART:
5,121,299 UART: [state] CFI Enabled
5,210,644 UART: [art] Extend RT PCRs Done
5,211,072 UART: [art] Lock RT PCRs Done
5,212,367 UART: [art] Populate DV Done
5,220,628 UART: [fht] FMC Alias Private Key: 7
5,221,688 UART: [art] Derive CDI
5,221,968 UART: [art] Store in in slot 0x4
5,307,617 UART: [art] Derive Key Pair
5,307,977 UART: [art] Store priv key in slot 0x5
5,321,105 UART: [art] Derive Key Pair - Done
5,335,754 UART: [art] Signing Cert with AUTHO
5,336,234 UART: RITY.KEYID = 7
5,351,550 UART: [art] Erasing AUTHORITY.KEYID = 7
5,352,315 UART: [art] PUB.X = 80B665E04E5D29580C2993770CD4F109B1987BCB8E66DAA9E577AF7A31FE8D8E71700164FC12504974288382EB0E5EBA
5,359,072 UART: [art] PUB.Y = 1361A66E1EA3CAB1F9968198BDC8162255E22267FDFC8329E9B7EFEEEA6474B1B2B76F916CFA94E2675C7BC8D47C1DF1
5,366,038 UART: [art] SIG.R = E25A055D0E537503C2909C0CCA8F6A2F76649DA7B997F37AA3CDC7FFEEF406B8B31FEF9D1F3AAC732FC0CE2D95DCA7F8
5,372,821 UART: [art] SIG.S = 2D506ED83CA78A00861D5E3F0D8069B42F4B28FD2173EE5B83713CDD0288FC739967A920C0937190D90EBDF1C0915D1B
5,396,627 UART: mbox::rt_entry...
5,396,999 UART: ____ _ _ _ ____ _____
5,397,783 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,398,583 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,399,351 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,400,119 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,400,887 UART: |_|
5,401,199 UART:
5,682,335 UART: [rt] Runtime listening for mailbox commands...
5,683,572 >>> mbox cmd response data (120 bytes)
5,683,573 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,654,731 >>> mbox cmd response: success
7,654,731 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,668,069 UART:
7,668,085 UART: Running Caliptra FMC ...
7,668,493 UART:
7,668,636 UART: [state] CFI Enabled
7,758,201 UART: [art] Extend RT PCRs Done
7,758,629 UART: [art] Lock RT PCRs Done
7,759,782 UART: [art] Populate DV Done
7,767,855 UART: [fht] FMC Alias Private Key: 7
7,769,037 UART: [art] Derive CDI
7,769,317 UART: [art] Store in in slot 0x4
7,855,132 UART: [art] Derive Key Pair
7,855,492 UART: [art] Store priv key in slot 0x5
7,868,748 UART: [art] Derive Key Pair - Done
7,883,352 UART: [art] Signing Cert with AUTHO
7,883,832 UART: RITY.KEYID = 7
7,898,834 UART: [art] Erasing AUTHORITY.KEYID = 7
7,899,599 UART: [art] PUB.X = 7C45F2F53ED930B56BA6423CB65CE2BFB98711E5D95CFD8FB59A035DE28CF2129AFA9AF490829FA5C95017CBC20E2A33
7,906,381 UART: [art] PUB.Y = 23FB3A15503FD0A4D18E8C13D3A89802614B68C6C0745B95771DF745933D3E3DF279534580B7EAEBC033C9B50A79C469
7,913,325 UART: [art] SIG.R = 0BAAB2907492741E6EBA00AE54062E66F9985368C7B550C101EEFE7D7C29210B5235216D076E612DF4C815486F651992
7,920,052 UART: [art] SIG.S = A059B7CF06E131E7B593D2E278B9F54BCF0936ABD15B2B9E021AA0E30A087A8765AF7BFB6FD8CAEC75B69A58B8D381D6
7,943,500 UART: mbox::rt_entry...
7,943,872 UART: ____ _ _ _ ____ _____
7,944,656 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,945,456 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,946,224 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,946,992 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,947,760 UART: |_|
7,948,072 UART:
8,233,170 UART: [rt] Runtime listening for mailbox commands...
8,234,407 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Production
85,845 UART: [state] DebugLocked = Yes
86,471 UART: [state] Starting the WD Timer 40000000 cycles
88,046 UART: [kat] SHA2-256
891,596 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,725 UART: [kat] ++
895,877 UART: [kat] sha1
900,135 UART: [kat] SHA2-256
902,075 UART: [kat] SHA2-384
904,666 UART: [kat] SHA2-512-ACC
906,567 UART: [kat] ECC-384
915,986 UART: [kat] HMAC-384Kdf
920,682 UART: [kat] LMS
1,168,994 UART: [kat] --
1,169,825 UART: [cold-reset] ++
1,170,388 UART: [fht] FHT @ 0x50003400
1,173,086 UART: [idev] ++
1,173,254 UART: [idev] CDI.KEYID = 6
1,173,615 UART: [idev] SUBJECT.KEYID = 7
1,174,040 UART: [idev] UDS.KEYID = 0
1,174,386 ready_for_fw is high
1,174,386 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,939 UART: [idev] Erasing UDS.KEYID = 0
1,198,450 UART: [idev] Sha1 KeyId Algorithm
1,207,267 UART: [idev] --
1,208,368 UART: [ldev] ++
1,208,536 UART: [ldev] CDI.KEYID = 6
1,208,900 UART: [ldev] SUBJECT.KEYID = 5
1,209,327 UART: [ldev] AUTHORITY.KEYID = 7
1,209,790 UART: [ldev] FE.KEYID = 1
1,214,764 UART: [ldev] Erasing FE.KEYID = 1
1,241,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,927 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,621 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,491 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,197 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,161 UART: [ldev] --
1,280,633 UART: [fwproc] Wait for Commands...
1,281,456 UART: [fwproc] Recv command 0x46574c44
1,282,189 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,258 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,567 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,335,916 >>> mbox cmd response: success
2,337,006 UART: [afmc] ++
2,337,174 UART: [afmc] CDI.KEYID = 6
2,337,537 UART: [afmc] SUBJECT.KEYID = 7
2,337,963 UART: [afmc] AUTHORITY.KEYID = 5
2,373,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,410 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,161 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,880 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,773 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,480 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,233 UART: [afmc] --
2,417,142 UART: [cold-reset] --
2,417,910 UART: [state] Locking Datavault
2,418,837 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,441 UART: [state] Locking ICCM
2,420,029 UART: [exit] Launching FMC @ 0x40000130
2,425,358 UART:
2,425,374 UART: Running Caliptra FMC ...
2,425,782 UART:
2,425,836 UART: [state] CFI Enabled
2,436,335 UART: [fht] FMC Alias Private Key: 7
2,544,038 UART: [art] Extend RT PCRs Done
2,544,466 UART: [art] Lock RT PCRs Done
2,545,984 UART: [art] Populate DV Done
2,554,158 UART: [fht] FMC Alias Private Key: 7
2,555,282 UART: [art] Derive CDI
2,555,562 UART: [art] Store in in slot 0x4
2,641,235 UART: [art] Derive Key Pair
2,641,595 UART: [art] Store priv key in slot 0x5
2,655,221 UART: [art] Derive Key Pair - Done
2,669,934 UART: [art] Signing Cert with AUTHO
2,670,414 UART: RITY.KEYID = 7
2,685,392 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,157 UART: [art] PUB.X = 39003629C8372BED587A21396D4DCC6576DCC345EB338E2BC0711A3B4E31F7987DFEAB72CDB24266AD719AF10EB8FC9A
2,692,916 UART: [art] PUB.Y = EA6CCBBDD485262855F4797DE28CD9948089A3429D70EC85892C17FFB527371F27DC0FF28711A0B452FD08F02B431EE9
2,699,866 UART: [art] SIG.R = 4E544B92FBB39C1CE28C17E02C9075D016F22FE63B582DC4B02E668B8B2BB9ADD1F5BCB94DEE12E1210648BEF47AE6A3
2,706,653 UART: [art] SIG.S = 68CF140852654B55C18B9A9E35A64F4061FFC9828AA97AD8256703FCA9D3115BC788FC0C75ED1A371F6474D36D276CA6
2,730,405 UART: mbox::rt_entry...
2,730,777 UART: ____ _ _ _ ____ _____
2,731,561 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,361 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,129 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,897 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,665 UART: |_|
2,734,977 UART:
2,841,726 UART: [rt] Runtime listening for mailbox commands...
2,842,488 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,842,603 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,697 UART:
2,842,713 UART: Running Caliptra ROM ...
2,843,121 UART:
2,843,176 UART: [state] CFI Enabled
2,845,469 UART: [state] LifecycleState = Production
2,846,077 UART: [state] DebugLocked = Yes
2,846,735 UART: [state] Starting the WD Timer 40000000 cycles
2,848,428 UART: [kat] SHA2-256
3,651,978 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,107 UART: [kat] ++
3,656,259 UART: [kat] sha1
3,660,491 UART: [kat] SHA2-256
3,662,431 UART: [kat] SHA2-384
3,665,208 UART: [kat] SHA2-512-ACC
3,667,109 UART: [kat] ECC-384
3,676,596 UART: [kat] HMAC-384Kdf
3,681,216 UART: [kat] LMS
3,929,528 UART: [kat] --
3,930,380 UART: [warm-reset] ++
3,931,251 UART: [warm-reset] --
3,932,092 UART: [state] Locking Datavault
3,932,686 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,290 UART: [state] Locking ICCM
3,933,732 UART: [exit] Launching FMC @ 0x40000130
3,939,061 UART:
3,939,077 UART: Running Caliptra FMC ...
3,939,485 UART:
3,939,539 UART: [state] CFI Enabled
3,940,752 UART: [aliasrt :skip pcr extension
3,941,225 UART: [art] Extend RT PCRs Done
3,941,653 UART: [art] Lock RT PCRs Done
3,942,878 UART: [art] Populate DV Done
3,951,144 UART: [fht] FMC Alias Private Key: 7
3,952,122 UART: [art] Derive CDI
3,952,402 UART: [art] Store in in slot 0x4
4,037,675 UART: [art] Derive Key Pair
4,038,035 UART: [art] Store priv key in slot 0x5
4,050,975 UART: [art] Derive Key Pair - Done
4,065,518 UART: [art] Signing Cert with AUTHO
4,065,998 UART: RITY.KEYID = 7
4,081,290 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,055 UART: [art] PUB.X = 39003629C8372BED587A21396D4DCC6576DCC345EB338E2BC0711A3B4E31F7987DFEAB72CDB24266AD719AF10EB8FC9A
4,088,814 UART: [art] PUB.Y = EA6CCBBDD485262855F4797DE28CD9948089A3429D70EC85892C17FFB527371F27DC0FF28711A0B452FD08F02B431EE9
4,095,764 UART: [art] SIG.R = 4E544B92FBB39C1CE28C17E02C9075D016F22FE63B582DC4B02E668B8B2BB9ADD1F5BCB94DEE12E1210648BEF47AE6A3
4,102,551 UART: [art] SIG.S = 68CF140852654B55C18B9A9E35A64F4061FFC9828AA97AD8256703FCA9D3115BC788FC0C75ED1A371F6474D36D276CA6
4,126,275 UART: mbox::rt_entry...
4,126,647 UART: ____ _ _ _ ____ _____
4,127,431 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,128,231 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,128,999 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,129,767 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,130,535 UART: |_|
4,130,847 UART:
4,412,956 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Production
85,757 UART: [state] DebugLocked = Yes
86,503 UART: [state] Starting the WD Timer 40000000 cycles
88,124 UART: [kat] SHA2-256
891,674 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,803 UART: [kat] ++
895,955 UART: [kat] sha1
900,213 UART: [kat] SHA2-256
902,153 UART: [kat] SHA2-384
904,974 UART: [kat] SHA2-512-ACC
906,875 UART: [kat] ECC-384
916,458 UART: [kat] HMAC-384Kdf
920,960 UART: [kat] LMS
1,169,272 UART: [kat] --
1,170,259 UART: [cold-reset] ++
1,170,744 UART: [fht] FHT @ 0x50003400
1,173,232 UART: [idev] ++
1,173,400 UART: [idev] CDI.KEYID = 6
1,173,761 UART: [idev] SUBJECT.KEYID = 7
1,174,186 UART: [idev] UDS.KEYID = 0
1,174,532 ready_for_fw is high
1,174,532 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,103 UART: [idev] Erasing UDS.KEYID = 0
1,198,938 UART: [idev] Sha1 KeyId Algorithm
1,207,767 UART: [idev] --
1,208,968 UART: [ldev] ++
1,209,136 UART: [ldev] CDI.KEYID = 6
1,209,500 UART: [ldev] SUBJECT.KEYID = 5
1,209,927 UART: [ldev] AUTHORITY.KEYID = 7
1,210,390 UART: [ldev] FE.KEYID = 1
1,215,640 UART: [ldev] Erasing FE.KEYID = 1
1,241,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,021 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,715 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,585 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,291 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,429 UART: [ldev] --
1,281,825 UART: [fwproc] Wait for Commands...
1,282,440 UART: [fwproc] Recv command 0x46574c44
1,283,173 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,541 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,778 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,087 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,550 >>> mbox cmd response: success
2,338,688 UART: [afmc] ++
2,338,856 UART: [afmc] CDI.KEYID = 6
2,339,219 UART: [afmc] SUBJECT.KEYID = 7
2,339,645 UART: [afmc] AUTHORITY.KEYID = 5
2,374,554 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,942 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,693 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,412 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,305 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,012 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,063 UART: [afmc] --
2,417,998 UART: [cold-reset] --
2,418,766 UART: [state] Locking Datavault
2,419,855 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,459 UART: [state] Locking ICCM
2,420,895 UART: [exit] Launching FMC @ 0x40000130
2,426,224 UART:
2,426,240 UART: Running Caliptra FMC ...
2,426,648 UART:
2,426,702 UART: [state] CFI Enabled
2,437,333 UART: [fht] FMC Alias Private Key: 7
2,545,726 UART: [art] Extend RT PCRs Done
2,546,154 UART: [art] Lock RT PCRs Done
2,547,586 UART: [art] Populate DV Done
2,555,774 UART: [fht] FMC Alias Private Key: 7
2,556,926 UART: [art] Derive CDI
2,557,206 UART: [art] Store in in slot 0x4
2,643,081 UART: [art] Derive Key Pair
2,643,441 UART: [art] Store priv key in slot 0x5
2,656,529 UART: [art] Derive Key Pair - Done
2,671,358 UART: [art] Signing Cert with AUTHO
2,671,838 UART: RITY.KEYID = 7
2,687,118 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,883 UART: [art] PUB.X = D06E78FAAFB319C9F64133C39EE3582E2C64B4FE6D5C19F52C600400A9D54DAB637417856D0C84C64986206A83B0744F
2,694,627 UART: [art] PUB.Y = AB734EE33B2A734B477377864769D59F8895453E45242E28CEDEF636025901106490C701F29111261DBC238050210840
2,701,545 UART: [art] SIG.R = 91869FF13BEF79B585AD0B34A0A6B7D871CB6D572E6E97238BAF3AA95F4838D0BE65A84293EC671584A4F97D0494ABC6
2,708,319 UART: [art] SIG.S = 896E1694C594036F8E34AC2EE62288928C75EC899351CDED40C959CF180F6CD1573B5AF1882321BEF65BF4A5CEF8628E
2,732,374 UART: mbox::rt_entry...
2,732,746 UART: ____ _ _ _ ____ _____
2,733,530 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,330 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,735,098 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,866 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,634 UART: |_|
2,736,946 UART:
2,843,344 UART: [rt] Runtime listening for mailbox commands...
2,844,106 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,844,221 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,844,315 UART:
2,844,331 UART: Running Caliptra ROM ...
2,844,739 UART:
2,844,794 UART: [state] CFI Enabled
2,847,485 UART: [state] LifecycleState = Production
2,848,093 UART: [state] DebugLocked = Yes
2,848,685 UART: [state] Starting the WD Timer 40000000 cycles
2,850,178 UART: [kat] SHA2-256
3,653,728 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,857 UART: [kat] ++
3,658,009 UART: [kat] sha1
3,662,089 UART: [kat] SHA2-256
3,664,029 UART: [kat] SHA2-384
3,666,644 UART: [kat] SHA2-512-ACC
3,668,545 UART: [kat] ECC-384
3,678,270 UART: [kat] HMAC-384Kdf
3,682,820 UART: [kat] LMS
3,931,132 UART: [kat] --
3,931,994 UART: [warm-reset] ++
3,932,881 UART: [warm-reset] --
3,933,774 UART: [state] Locking Datavault
3,934,542 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,146 UART: [state] Locking ICCM
3,935,612 UART: [exit] Launching FMC @ 0x40000130
3,940,941 UART:
3,940,957 UART: Running Caliptra FMC ...
3,941,365 UART:
3,941,419 UART: [state] CFI Enabled
3,942,580 UART: [aliasrt :skip pcr extension
3,943,053 UART: [art] Extend RT PCRs Done
3,943,481 UART: [art] Lock RT PCRs Done
3,944,906 UART: [art] Populate DV Done
3,953,000 UART: [fht] FMC Alias Private Key: 7
3,953,982 UART: [art] Derive CDI
3,954,262 UART: [art] Store in in slot 0x4
4,039,861 UART: [art] Derive Key Pair
4,040,221 UART: [art] Store priv key in slot 0x5
4,053,351 UART: [art] Derive Key Pair - Done
4,067,820 UART: [art] Signing Cert with AUTHO
4,068,300 UART: RITY.KEYID = 7
4,083,394 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,159 UART: [art] PUB.X = D06E78FAAFB319C9F64133C39EE3582E2C64B4FE6D5C19F52C600400A9D54DAB637417856D0C84C64986206A83B0744F
4,090,903 UART: [art] PUB.Y = AB734EE33B2A734B477377864769D59F8895453E45242E28CEDEF636025901106490C701F29111261DBC238050210840
4,097,821 UART: [art] SIG.R = 91869FF13BEF79B585AD0B34A0A6B7D871CB6D572E6E97238BAF3AA95F4838D0BE65A84293EC671584A4F97D0494ABC6
4,104,595 UART: [art] SIG.S = 896E1694C594036F8E34AC2EE62288928C75EC899351CDED40C959CF180F6CD1573B5AF1882321BEF65BF4A5CEF8628E
4,128,616 UART: mbox::rt_entry...
4,128,988 UART: ____ _ _ _ ____ _____
4,129,772 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,572 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,340 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,108 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,876 UART: |_|
4,133,188 UART:
4,414,276 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Production
85,796 UART: [state] DebugLocked = Yes
86,316 UART: [state] Starting the WD Timer 40000000 cycles
87,833 UART: [kat] SHA2-256
891,383 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,512 UART: [kat] ++
895,664 UART: [kat] sha1
899,770 UART: [kat] SHA2-256
901,710 UART: [kat] SHA2-384
904,451 UART: [kat] SHA2-512-ACC
906,352 UART: [kat] ECC-384
916,525 UART: [kat] HMAC-384Kdf
920,977 UART: [kat] LMS
1,169,289 UART: [kat] --
1,170,068 UART: [cold-reset] ++
1,170,557 UART: [fht] FHT @ 0x50003400
1,173,067 UART: [idev] ++
1,173,235 UART: [idev] CDI.KEYID = 6
1,173,596 UART: [idev] SUBJECT.KEYID = 7
1,174,021 UART: [idev] UDS.KEYID = 0
1,174,367 ready_for_fw is high
1,174,367 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,946 UART: [idev] Erasing UDS.KEYID = 0
1,198,931 UART: [idev] Sha1 KeyId Algorithm
1,207,718 UART: [idev] --
1,208,597 UART: [ldev] ++
1,208,765 UART: [ldev] CDI.KEYID = 6
1,209,129 UART: [ldev] SUBJECT.KEYID = 5
1,209,556 UART: [ldev] AUTHORITY.KEYID = 7
1,210,019 UART: [ldev] FE.KEYID = 1
1,215,171 UART: [ldev] Erasing FE.KEYID = 1
1,241,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,360 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,054 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,924 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,630 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,726 UART: [ldev] --
1,281,174 UART: [fwproc] Wait for Commands...
1,281,865 UART: [fwproc] Recv command 0x46574c44
1,282,598 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,301 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,610 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,335,943 >>> mbox cmd response: success
2,337,139 UART: [afmc] ++
2,337,307 UART: [afmc] CDI.KEYID = 6
2,337,670 UART: [afmc] SUBJECT.KEYID = 7
2,338,096 UART: [afmc] AUTHORITY.KEYID = 5
2,373,891 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,561 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,312 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,031 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,924 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,631 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,424 UART: [afmc] --
2,417,395 UART: [cold-reset] --
2,418,451 UART: [state] Locking Datavault
2,419,618 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,222 UART: [state] Locking ICCM
2,420,810 UART: [exit] Launching FMC @ 0x40000130
2,426,139 UART:
2,426,155 UART: Running Caliptra FMC ...
2,426,563 UART:
2,426,706 UART: [state] CFI Enabled
2,437,219 UART: [fht] FMC Alias Private Key: 7
2,545,476 UART: [art] Extend RT PCRs Done
2,545,904 UART: [art] Lock RT PCRs Done
2,547,544 UART: [art] Populate DV Done
2,555,638 UART: [fht] FMC Alias Private Key: 7
2,556,568 UART: [art] Derive CDI
2,556,848 UART: [art] Store in in slot 0x4
2,642,691 UART: [art] Derive Key Pair
2,643,051 UART: [art] Store priv key in slot 0x5
2,656,149 UART: [art] Derive Key Pair - Done
2,670,696 UART: [art] Signing Cert with AUTHO
2,671,176 UART: RITY.KEYID = 7
2,686,048 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,813 UART: [art] PUB.X = 942C8E92F4E0BFD63470187812DD77A729C25B096E57B4F4E9BB943EAF3B0EE610C8C6200F141C8943183132A413B1F1
2,693,574 UART: [art] PUB.Y = 68CC9266C0B96B5150BB42D02014FD8AD448A4F248C86EB22391ECAD2BEDFCEFEA0149373C114F2488F6CA6408F46676
2,700,528 UART: [art] SIG.R = 17062D74276C4F19F4BE48F9E708B891E41168E357EFCD245DEF5633C8C45DFEAC7BF59BC0DFE021FCE0832DF6719779
2,707,304 UART: [art] SIG.S = 3A944E7151D64958CF5D7FF9B1AD172316F95B6E2471B980A24D0DA11CF5F8CB78D6BD5055E31C8D595BAACAA4A26246
2,730,746 UART: mbox::rt_entry...
2,731,118 UART: ____ _ _ _ ____ _____
2,731,902 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,702 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,470 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,238 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,006 UART: |_|
2,735,318 UART:
2,841,817 UART: [rt] Runtime listening for mailbox commands...
2,842,579 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,842,694 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,788 UART:
2,842,804 UART: Running Caliptra ROM ...
2,843,212 UART:
2,843,354 UART: [state] CFI Enabled
2,846,107 UART: [state] LifecycleState = Production
2,846,715 UART: [state] DebugLocked = Yes
2,847,255 UART: [state] Starting the WD Timer 40000000 cycles
2,848,846 UART: [kat] SHA2-256
3,652,396 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,525 UART: [kat] ++
3,656,677 UART: [kat] sha1
3,660,895 UART: [kat] SHA2-256
3,662,835 UART: [kat] SHA2-384
3,665,550 UART: [kat] SHA2-512-ACC
3,667,451 UART: [kat] ECC-384
3,677,444 UART: [kat] HMAC-384Kdf
3,681,964 UART: [kat] LMS
3,930,276 UART: [kat] --
3,931,400 UART: [warm-reset] ++
3,932,309 UART: [warm-reset] --
3,933,060 UART: [state] Locking Datavault
3,933,856 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,460 UART: [state] Locking ICCM
3,934,900 UART: [exit] Launching FMC @ 0x40000130
3,940,229 UART:
3,940,245 UART: Running Caliptra FMC ...
3,940,653 UART:
3,940,796 UART: [state] CFI Enabled
3,942,139 UART: [aliasrt :skip pcr extension
3,942,612 UART: [art] Extend RT PCRs Done
3,943,040 UART: [art] Lock RT PCRs Done
3,944,015 UART: [art] Populate DV Done
3,952,237 UART: [fht] FMC Alias Private Key: 7
3,953,303 UART: [art] Derive CDI
3,953,583 UART: [art] Store in in slot 0x4
4,039,506 UART: [art] Derive Key Pair
4,039,866 UART: [art] Store priv key in slot 0x5
4,052,986 UART: [art] Derive Key Pair - Done
4,067,525 UART: [art] Signing Cert with AUTHO
4,068,005 UART: RITY.KEYID = 7
4,083,521 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,286 UART: [art] PUB.X = 942C8E92F4E0BFD63470187812DD77A729C25B096E57B4F4E9BB943EAF3B0EE610C8C6200F141C8943183132A413B1F1
4,091,047 UART: [art] PUB.Y = 68CC9266C0B96B5150BB42D02014FD8AD448A4F248C86EB22391ECAD2BEDFCEFEA0149373C114F2488F6CA6408F46676
4,098,001 UART: [art] SIG.R = 17062D74276C4F19F4BE48F9E708B891E41168E357EFCD245DEF5633C8C45DFEAC7BF59BC0DFE021FCE0832DF6719779
4,104,777 UART: [art] SIG.S = 3A944E7151D64958CF5D7FF9B1AD172316F95B6E2471B980A24D0DA11CF5F8CB78D6BD5055E31C8D595BAACAA4A26246
4,128,725 UART: mbox::rt_entry...
4,129,097 UART: ____ _ _ _ ____ _____
4,129,881 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,681 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,449 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,217 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,985 UART: |_|
4,133,297 UART:
4,416,594 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Production
85,804 UART: [state] DebugLocked = Yes
86,350 UART: [state] Starting the WD Timer 40000000 cycles
87,841 UART: [kat] SHA2-256
891,391 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,520 UART: [kat] ++
895,672 UART: [kat] sha1
899,800 UART: [kat] SHA2-256
901,740 UART: [kat] SHA2-384
904,531 UART: [kat] SHA2-512-ACC
906,432 UART: [kat] ECC-384
916,101 UART: [kat] HMAC-384Kdf
920,585 UART: [kat] LMS
1,168,897 UART: [kat] --
1,169,664 UART: [cold-reset] ++
1,170,121 UART: [fht] FHT @ 0x50003400
1,172,687 UART: [idev] ++
1,172,855 UART: [idev] CDI.KEYID = 6
1,173,216 UART: [idev] SUBJECT.KEYID = 7
1,173,641 UART: [idev] UDS.KEYID = 0
1,173,987 ready_for_fw is high
1,173,987 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,516 UART: [idev] Erasing UDS.KEYID = 0
1,198,191 UART: [idev] Sha1 KeyId Algorithm
1,206,894 UART: [idev] --
1,208,033 UART: [ldev] ++
1,208,201 UART: [ldev] CDI.KEYID = 6
1,208,565 UART: [ldev] SUBJECT.KEYID = 5
1,208,992 UART: [ldev] AUTHORITY.KEYID = 7
1,209,455 UART: [ldev] FE.KEYID = 1
1,214,511 UART: [ldev] Erasing FE.KEYID = 1
1,240,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,356 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,050 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,920 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,626 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,868 UART: [ldev] --
1,280,256 UART: [fwproc] Wait for Commands...
1,280,999 UART: [fwproc] Recv command 0x46574c44
1,281,732 UART: [fwproc] Recv'd Img size: 78704 bytes
2,196,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,235 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,544 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,335,797 >>> mbox cmd response: success
2,336,927 UART: [afmc] ++
2,337,095 UART: [afmc] CDI.KEYID = 6
2,337,458 UART: [afmc] SUBJECT.KEYID = 7
2,337,884 UART: [afmc] AUTHORITY.KEYID = 5
2,373,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,131 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,882 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,601 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,494 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,201 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,080 UART: [afmc] --
2,417,055 UART: [cold-reset] --
2,417,685 UART: [state] Locking Datavault
2,418,774 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,378 UART: [state] Locking ICCM
2,420,030 UART: [exit] Launching FMC @ 0x40000130
2,425,359 UART:
2,425,375 UART: Running Caliptra FMC ...
2,425,783 UART:
2,425,926 UART: [state] CFI Enabled
2,436,339 UART: [fht] FMC Alias Private Key: 7
2,544,110 UART: [art] Extend RT PCRs Done
2,544,538 UART: [art] Lock RT PCRs Done
2,545,958 UART: [art] Populate DV Done
2,553,942 UART: [fht] FMC Alias Private Key: 7
2,554,914 UART: [art] Derive CDI
2,555,194 UART: [art] Store in in slot 0x4
2,640,709 UART: [art] Derive Key Pair
2,641,069 UART: [art] Store priv key in slot 0x5
2,654,247 UART: [art] Derive Key Pair - Done
2,668,797 UART: [art] Signing Cert with AUTHO
2,669,277 UART: RITY.KEYID = 7
2,684,765 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,530 UART: [art] PUB.X = ACF4098A1086FEF6E8420819DBB48337D735685021559F3AC53962CDE0DD5572AD2E712602BB78BB900F0AC95D308894
2,692,285 UART: [art] PUB.Y = 51DA9684532CD3AC40E479C5C11306EC4F43BC504E7A6B94E8DCDFE7792083F877212B5FEE7ECEA6EA13103F7B1A974C
2,699,246 UART: [art] SIG.R = 8F1781EF20D8F4478CC9BD9DA477298874D5E30E90D291765DDE6A6EEAE15EB2AA2132945C0D27141D7E99F77C3321ED
2,706,018 UART: [art] SIG.S = DBB101385BA431F9FF902A768D47CA4842F4E2C427E61764203367B18E8DFD5658D760C7C8A2DCB7AAE496246DDD5366
2,729,284 UART: mbox::rt_entry...
2,729,656 UART: ____ _ _ _ ____ _____
2,730,440 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,240 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,008 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,776 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,544 UART: |_|
2,733,856 UART:
2,840,628 UART: [rt] Runtime listening for mailbox commands...
2,841,390 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,841,505 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,599 UART:
2,841,615 UART: Running Caliptra ROM ...
2,842,023 UART:
2,842,165 UART: [state] CFI Enabled
2,844,666 UART: [state] LifecycleState = Production
2,845,274 UART: [state] DebugLocked = Yes
2,845,986 UART: [state] Starting the WD Timer 40000000 cycles
2,847,467 UART: [kat] SHA2-256
3,651,017 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,146 UART: [kat] ++
3,655,298 UART: [kat] sha1
3,659,608 UART: [kat] SHA2-256
3,661,548 UART: [kat] SHA2-384
3,664,281 UART: [kat] SHA2-512-ACC
3,666,182 UART: [kat] ECC-384
3,676,179 UART: [kat] HMAC-384Kdf
3,680,785 UART: [kat] LMS
3,929,097 UART: [kat] --
3,929,935 UART: [warm-reset] ++
3,931,026 UART: [warm-reset] --
3,931,689 UART: [state] Locking Datavault
3,932,399 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,003 UART: [state] Locking ICCM
3,933,557 UART: [exit] Launching FMC @ 0x40000130
3,938,886 UART:
3,938,902 UART: Running Caliptra FMC ...
3,939,310 UART:
3,939,453 UART: [state] CFI Enabled
3,940,804 UART: [aliasrt :skip pcr extension
3,941,277 UART: [art] Extend RT PCRs Done
3,941,705 UART: [art] Lock RT PCRs Done
3,942,784 UART: [art] Populate DV Done
3,951,136 UART: [fht] FMC Alias Private Key: 7
3,952,312 UART: [art] Derive CDI
3,952,592 UART: [art] Store in in slot 0x4
4,038,503 UART: [art] Derive Key Pair
4,038,863 UART: [art] Store priv key in slot 0x5
4,052,897 UART: [art] Derive Key Pair - Done
4,067,513 UART: [art] Signing Cert with AUTHO
4,067,993 UART: RITY.KEYID = 7
4,082,881 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,646 UART: [art] PUB.X = ACF4098A1086FEF6E8420819DBB48337D735685021559F3AC53962CDE0DD5572AD2E712602BB78BB900F0AC95D308894
4,090,401 UART: [art] PUB.Y = 51DA9684532CD3AC40E479C5C11306EC4F43BC504E7A6B94E8DCDFE7792083F877212B5FEE7ECEA6EA13103F7B1A974C
4,097,362 UART: [art] SIG.R = 8F1781EF20D8F4478CC9BD9DA477298874D5E30E90D291765DDE6A6EEAE15EB2AA2132945C0D27141D7E99F77C3321ED
4,104,134 UART: [art] SIG.S = DBB101385BA431F9FF902A768D47CA4842F4E2C427E61764203367B18E8DFD5658D760C7C8A2DCB7AAE496246DDD5366
4,127,380 UART: mbox::rt_entry...
4,127,752 UART: ____ _ _ _ ____ _____
4,128,536 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,336 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,104 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,872 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,640 UART: |_|
4,131,952 UART:
4,413,226 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Production
85,683 UART: [state] DebugLocked = Yes
86,429 UART: [state] Starting the WD Timer 40000000 cycles
87,910 UART: [kat] SHA2-256
891,460 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,589 UART: [kat] ++
895,741 UART: [kat] sha1
900,021 UART: [kat] SHA2-256
901,961 UART: [kat] SHA2-384
904,610 UART: [kat] SHA2-512-ACC
906,511 UART: [kat] ECC-384
916,082 UART: [kat] HMAC-384Kdf
920,752 UART: [kat] LMS
1,169,064 UART: [kat] --
1,169,779 UART: [cold-reset] ++
1,170,354 UART: [fht] FHT @ 0x50003400
1,173,194 UART: [idev] ++
1,173,362 UART: [idev] CDI.KEYID = 6
1,173,723 UART: [idev] SUBJECT.KEYID = 7
1,174,148 UART: [idev] UDS.KEYID = 0
1,174,494 ready_for_fw is high
1,174,494 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,049 UART: [idev] Erasing UDS.KEYID = 0
1,199,104 UART: [idev] Sha1 KeyId Algorithm
1,208,027 UART: [idev] --
1,209,056 UART: [ldev] ++
1,209,224 UART: [ldev] CDI.KEYID = 6
1,209,588 UART: [ldev] SUBJECT.KEYID = 5
1,210,015 UART: [ldev] AUTHORITY.KEYID = 7
1,210,478 UART: [ldev] FE.KEYID = 1
1,215,720 UART: [ldev] Erasing FE.KEYID = 1
1,241,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,033 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,727 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,597 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,303 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,547 UART: [ldev] --
1,281,007 UART: [fwproc] Wait for Commands...
1,281,622 UART: [fwproc] Recv command 0x46574c44
1,282,355 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,490 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,799 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,296 >>> mbox cmd response: success
2,338,494 UART: [afmc] ++
2,338,662 UART: [afmc] CDI.KEYID = 6
2,339,025 UART: [afmc] SUBJECT.KEYID = 7
2,339,451 UART: [afmc] AUTHORITY.KEYID = 5
2,374,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,634 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,385 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,104 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,997 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,704 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,581 UART: [afmc] --
2,417,602 UART: [cold-reset] --
2,418,394 UART: [state] Locking Datavault
2,419,613 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,217 UART: [state] Locking ICCM
2,420,667 UART: [exit] Launching FMC @ 0x40000130
2,425,996 UART:
2,426,012 UART: Running Caliptra FMC ...
2,426,420 UART:
2,426,474 UART: [state] CFI Enabled
2,436,721 UART: [fht] FMC Alias Private Key: 7
2,544,714 UART: [art] Extend RT PCRs Done
2,545,142 UART: [art] Lock RT PCRs Done
2,546,514 UART: [art] Populate DV Done
2,554,808 UART: [fht] FMC Alias Private Key: 7
2,555,984 UART: [art] Derive CDI
2,556,264 UART: [art] Store in in slot 0x4
2,641,659 UART: [art] Derive Key Pair
2,642,019 UART: [art] Store priv key in slot 0x5
2,655,623 UART: [art] Derive Key Pair - Done
2,670,309 UART: [art] Signing Cert with AUTHO
2,670,789 UART: RITY.KEYID = 7
2,685,631 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,396 UART: [art] PUB.X = 9972FB552891742FEBA3B67DE330C21E218E0F999735D68797690D5B67183C7650AC8943DC0C23D37FDECA7548C474BF
2,693,157 UART: [art] PUB.Y = 6D15A34637A0098CB8070586B9162BDAB062A78E15917D59645A3B06D9B4446F4A7E6721DC0D400C6E3CE1ACD007F214
2,700,086 UART: [art] SIG.R = 1ACACBD1EF391A4E30B647E27F7C6C9981BCE3E90E5B0ED6402C12D993C965E38DDC3722C157CC6AFB92CFE698F40BEB
2,706,871 UART: [art] SIG.S = 7D411587E1C5DA17F1D5587028D51F95E37BE23A4F661AB60BBF2534E5AFEC34733F9E8954DF4881C05216BD0B751673
2,730,736 UART: mbox::rt_entry...
2,731,108 UART: ____ _ _ _ ____ _____
2,731,892 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,692 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,460 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,228 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,996 UART: |_|
2,735,308 UART:
2,842,183 UART: [rt] Runtime listening for mailbox commands...
2,842,945 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,843,060 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,154 UART:
2,843,170 UART: Running Caliptra ROM ...
2,843,578 UART:
2,843,633 UART: [state] CFI Enabled
2,845,924 UART: [state] LifecycleState = Production
2,846,532 UART: [state] DebugLocked = Yes
2,847,170 UART: [state] Starting the WD Timer 40000000 cycles
2,848,733 UART: [kat] SHA2-256
3,652,283 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,412 UART: [kat] ++
3,656,564 UART: [kat] sha1
3,660,744 UART: [kat] SHA2-256
3,662,684 UART: [kat] SHA2-384
3,665,463 UART: [kat] SHA2-512-ACC
3,667,364 UART: [kat] ECC-384
3,676,889 UART: [kat] HMAC-384Kdf
3,681,583 UART: [kat] LMS
3,929,895 UART: [kat] --
3,930,675 UART: [warm-reset] ++
3,931,698 UART: [warm-reset] --
3,932,683 UART: [state] Locking Datavault
3,933,417 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,021 UART: [state] Locking ICCM
3,934,673 UART: [exit] Launching FMC @ 0x40000130
3,940,002 UART:
3,940,018 UART: Running Caliptra FMC ...
3,940,426 UART:
3,940,480 UART: [state] CFI Enabled
3,941,803 UART: [aliasrt :skip pcr extension
3,942,276 UART: [art] Extend RT PCRs Done
3,942,704 UART: [art] Lock RT PCRs Done
3,944,023 UART: [art] Populate DV Done
3,951,823 UART: [fht] FMC Alias Private Key: 7
3,952,937 UART: [art] Derive CDI
3,953,217 UART: [art] Store in in slot 0x4
4,038,736 UART: [art] Derive Key Pair
4,039,096 UART: [art] Store priv key in slot 0x5
4,052,432 UART: [art] Derive Key Pair - Done
4,067,028 UART: [art] Signing Cert with AUTHO
4,067,508 UART: RITY.KEYID = 7
4,082,760 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,525 UART: [art] PUB.X = 9972FB552891742FEBA3B67DE330C21E218E0F999735D68797690D5B67183C7650AC8943DC0C23D37FDECA7548C474BF
4,090,286 UART: [art] PUB.Y = 6D15A34637A0098CB8070586B9162BDAB062A78E15917D59645A3B06D9B4446F4A7E6721DC0D400C6E3CE1ACD007F214
4,097,215 UART: [art] SIG.R = 1ACACBD1EF391A4E30B647E27F7C6C9981BCE3E90E5B0ED6402C12D993C965E38DDC3722C157CC6AFB92CFE698F40BEB
4,104,000 UART: [art] SIG.S = 7D411587E1C5DA17F1D5587028D51F95E37BE23A4F661AB60BBF2534E5AFEC34733F9E8954DF4881C05216BD0B751673
4,127,623 UART: mbox::rt_entry...
4,127,995 UART: ____ _ _ _ ____ _____
4,128,779 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,579 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,347 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,115 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,883 UART: |_|
4,132,195 UART:
4,412,766 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Production
85,807 UART: [state] DebugLocked = Yes
86,399 UART: [state] Starting the WD Timer 40000000 cycles
88,062 UART: [kat] SHA2-256
891,612 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,741 UART: [kat] ++
895,893 UART: [kat] sha1
900,131 UART: [kat] SHA2-256
902,071 UART: [kat] SHA2-384
904,770 UART: [kat] SHA2-512-ACC
906,671 UART: [kat] ECC-384
916,296 UART: [kat] HMAC-384Kdf
920,908 UART: [kat] LMS
1,169,220 UART: [kat] --
1,170,071 UART: [cold-reset] ++
1,170,572 UART: [fht] FHT @ 0x50003400
1,173,420 UART: [idev] ++
1,173,588 UART: [idev] CDI.KEYID = 6
1,173,949 UART: [idev] SUBJECT.KEYID = 7
1,174,374 UART: [idev] UDS.KEYID = 0
1,174,720 ready_for_fw is high
1,174,720 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,509 UART: [idev] Erasing UDS.KEYID = 0
1,199,508 UART: [idev] Sha1 KeyId Algorithm
1,208,265 UART: [idev] --
1,209,280 UART: [ldev] ++
1,209,448 UART: [ldev] CDI.KEYID = 6
1,209,812 UART: [ldev] SUBJECT.KEYID = 5
1,210,239 UART: [ldev] AUTHORITY.KEYID = 7
1,210,702 UART: [ldev] FE.KEYID = 1
1,215,702 UART: [ldev] Erasing FE.KEYID = 1
1,241,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,997 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,691 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,561 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,267 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,357 UART: [ldev] --
1,280,657 UART: [fwproc] Wait for Commands...
1,281,418 UART: [fwproc] Recv command 0x46574c44
1,282,151 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,293 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,496 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,805 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,074 >>> mbox cmd response: success
2,338,162 UART: [afmc] ++
2,338,330 UART: [afmc] CDI.KEYID = 6
2,338,693 UART: [afmc] SUBJECT.KEYID = 7
2,339,119 UART: [afmc] AUTHORITY.KEYID = 5
2,374,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,060 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,811 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,530 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,423 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,130 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,999 UART: [afmc] --
2,417,880 UART: [cold-reset] --
2,418,568 UART: [state] Locking Datavault
2,419,757 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,361 UART: [state] Locking ICCM
2,420,809 UART: [exit] Launching FMC @ 0x40000130
2,426,138 UART:
2,426,154 UART: Running Caliptra FMC ...
2,426,562 UART:
2,426,616 UART: [state] CFI Enabled
2,436,957 UART: [fht] FMC Alias Private Key: 7
2,545,134 UART: [art] Extend RT PCRs Done
2,545,562 UART: [art] Lock RT PCRs Done
2,546,822 UART: [art] Populate DV Done
2,554,922 UART: [fht] FMC Alias Private Key: 7
2,556,100 UART: [art] Derive CDI
2,556,380 UART: [art] Store in in slot 0x4
2,642,041 UART: [art] Derive Key Pair
2,642,401 UART: [art] Store priv key in slot 0x5
2,655,193 UART: [art] Derive Key Pair - Done
2,670,063 UART: [art] Signing Cert with AUTHO
2,670,543 UART: RITY.KEYID = 7
2,686,099 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,864 UART: [art] PUB.X = 4DDFFCBE22551AAA31C35B1004FCA2F370A6173F4E194DD646AFAF71A5790F3F5B83B434BD2A45EF2A132F59AD53C26B
2,693,648 UART: [art] PUB.Y = BEFCC0C31763CB621FE7FEDFE784C067CD041D598F8EB9103D6BDB15EC812DA86B6E9A94AB2B57B180CBF72260ED2158
2,700,617 UART: [art] SIG.R = BFF444DA957DFEDE5CD8131AC3D6124991038EB96322AB01D213A49AE8AB329C22B9F465F02AA5E96DDFDE6BE13A929A
2,707,401 UART: [art] SIG.S = FD55E8D029C9296F1A0BA9EB1F2C795E94DC077EF65917AFA448AC6D8D7E6447611D43E5128703D700C8E3A9099BDCFD
2,731,048 UART: mbox::rt_entry...
2,731,420 UART: ____ _ _ _ ____ _____
2,732,204 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,004 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,772 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,540 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,308 UART: |_|
2,735,620 UART:
2,842,238 UART: [rt] Runtime listening for mailbox commands...
2,843,000 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,843,115 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,209 UART:
2,843,225 UART: Running Caliptra ROM ...
2,843,633 UART:
2,843,688 UART: [state] CFI Enabled
2,846,373 UART: [state] LifecycleState = Production
2,846,981 UART: [state] DebugLocked = Yes
2,847,579 UART: [state] Starting the WD Timer 40000000 cycles
2,849,074 UART: [kat] SHA2-256
3,652,624 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,753 UART: [kat] ++
3,656,905 UART: [kat] sha1
3,661,155 UART: [kat] SHA2-256
3,663,095 UART: [kat] SHA2-384
3,665,922 UART: [kat] SHA2-512-ACC
3,667,823 UART: [kat] ECC-384
3,677,564 UART: [kat] HMAC-384Kdf
3,682,228 UART: [kat] LMS
3,930,540 UART: [kat] --
3,931,396 UART: [warm-reset] ++
3,932,251 UART: [warm-reset] --
3,932,882 UART: [state] Locking Datavault
3,933,760 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,364 UART: [state] Locking ICCM
3,934,936 UART: [exit] Launching FMC @ 0x40000130
3,940,265 UART:
3,940,281 UART: Running Caliptra FMC ...
3,940,689 UART:
3,940,743 UART: [state] CFI Enabled
3,942,034 UART: [aliasrt :skip pcr extension
3,942,507 UART: [art] Extend RT PCRs Done
3,942,935 UART: [art] Lock RT PCRs Done
3,944,454 UART: [art] Populate DV Done
3,952,682 UART: [fht] FMC Alias Private Key: 7
3,953,834 UART: [art] Derive CDI
3,954,114 UART: [art] Store in in slot 0x4
4,039,747 UART: [art] Derive Key Pair
4,040,107 UART: [art] Store priv key in slot 0x5
4,053,273 UART: [art] Derive Key Pair - Done
4,068,223 UART: [art] Signing Cert with AUTHO
4,068,703 UART: RITY.KEYID = 7
4,083,901 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,666 UART: [art] PUB.X = 4DDFFCBE22551AAA31C35B1004FCA2F370A6173F4E194DD646AFAF71A5790F3F5B83B434BD2A45EF2A132F59AD53C26B
4,091,450 UART: [art] PUB.Y = BEFCC0C31763CB621FE7FEDFE784C067CD041D598F8EB9103D6BDB15EC812DA86B6E9A94AB2B57B180CBF72260ED2158
4,098,419 UART: [art] SIG.R = BFF444DA957DFEDE5CD8131AC3D6124991038EB96322AB01D213A49AE8AB329C22B9F465F02AA5E96DDFDE6BE13A929A
4,105,203 UART: [art] SIG.S = FD55E8D029C9296F1A0BA9EB1F2C795E94DC077EF65917AFA448AC6D8D7E6447611D43E5128703D700C8E3A9099BDCFD
4,128,348 UART: mbox::rt_entry...
4,128,720 UART: ____ _ _ _ ____ _____
4,129,504 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,304 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,072 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,840 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,608 UART: |_|
4,132,920 UART:
4,417,154 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,652 UART: [state] LifecycleState = Production
86,260 UART: [state] DebugLocked = Yes
86,964 UART: [state] Starting the WD Timer 40000000 cycles
88,655 UART: [kat] SHA2-256
892,205 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,334 UART: [kat] ++
896,486 UART: [kat] sha1
900,898 UART: [kat] SHA2-256
902,838 UART: [kat] SHA2-384
905,493 UART: [kat] SHA2-512-ACC
907,394 UART: [kat] ECC-384
917,133 UART: [kat] HMAC-384Kdf
921,713 UART: [kat] LMS
1,170,025 UART: [kat] --
1,170,784 UART: [cold-reset] ++
1,171,315 UART: [fht] FHT @ 0x50003400
1,173,945 UART: [idev] ++
1,174,113 UART: [idev] CDI.KEYID = 6
1,174,474 UART: [idev] SUBJECT.KEYID = 7
1,174,899 UART: [idev] UDS.KEYID = 0
1,175,245 ready_for_fw is high
1,175,245 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,174 UART: [idev] Erasing UDS.KEYID = 0
1,200,457 UART: [idev] Sha1 KeyId Algorithm
1,209,128 UART: [idev] --
1,210,237 UART: [ldev] ++
1,210,405 UART: [ldev] CDI.KEYID = 6
1,210,769 UART: [ldev] SUBJECT.KEYID = 5
1,211,196 UART: [ldev] AUTHORITY.KEYID = 7
1,211,659 UART: [ldev] FE.KEYID = 1
1,216,915 UART: [ldev] Erasing FE.KEYID = 1
1,243,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,356 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,050 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,920 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,626 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,862 UART: [ldev] --
1,283,262 UART: [fwproc] Wait for Commands...
1,283,973 UART: [fwproc] Recv command 0x46574c44
1,284,706 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,926 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,729 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,038 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,531 >>> mbox cmd response: success
2,338,707 UART: [afmc] ++
2,338,875 UART: [afmc] CDI.KEYID = 6
2,339,238 UART: [afmc] SUBJECT.KEYID = 7
2,339,664 UART: [afmc] AUTHORITY.KEYID = 5
2,375,265 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,416 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,398,135 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,404,028 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,735 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,528 UART: [afmc] --
2,418,473 UART: [cold-reset] --
2,419,481 UART: [state] Locking Datavault
2,420,600 UART: [state] Locking PCR0, PCR1 and PCR31
2,421,204 UART: [state] Locking ICCM
2,421,734 UART: [exit] Launching FMC @ 0x40000130
2,427,063 UART:
2,427,079 UART: Running Caliptra FMC ...
2,427,487 UART:
2,427,630 UART: [state] CFI Enabled
2,438,601 UART: [fht] FMC Alias Private Key: 7
2,546,324 UART: [art] Extend RT PCRs Done
2,546,752 UART: [art] Lock RT PCRs Done
2,548,080 UART: [art] Populate DV Done
2,556,446 UART: [fht] FMC Alias Private Key: 7
2,557,390 UART: [art] Derive CDI
2,557,670 UART: [art] Store in in slot 0x4
2,643,569 UART: [art] Derive Key Pair
2,643,929 UART: [art] Store priv key in slot 0x5
2,657,061 UART: [art] Derive Key Pair - Done
2,671,569 UART: [art] Signing Cert with AUTHO
2,672,049 UART: RITY.KEYID = 7
2,686,701 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,466 UART: [art] PUB.X = 2F6044BE217AEF6D0C6FDA41DB54F4E0A8B6EBD662D0828EBFBAE33EE8A4B60C746B0244683FF0B40B122131DFE74878
2,694,242 UART: [art] PUB.Y = 5E0EC4AAC6C56F002DEC7570F70C89FAEDF4F94DD0A378519C4EB0C325D246A09A7B73AF83417C1B334CDA7AEAEAB6FD
2,701,192 UART: [art] SIG.R = 60842839D64A020A9705E99C7005962A416538C80DCE44010D8A955168FD871E83DB46F4CDF51B68107CDE63E6F37D40
2,707,935 UART: [art] SIG.S = 5781DD7863119ED6E102BF331C614001CB414EA1DB05F3A2B4D5B8635C4BE291CFC2CF98CD3050E660A4FF32FC0EAE38
2,732,130 UART: mbox::rt_entry...
2,732,502 UART: ____ _ _ _ ____ _____
2,733,286 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,086 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,854 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,622 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,390 UART: |_|
2,736,702 UART:
2,843,041 UART: [rt] Runtime listening for mailbox commands...
2,843,803 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,843,918 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,844,012 UART:
2,844,028 UART: Running Caliptra ROM ...
2,844,436 UART:
2,844,578 UART: [state] CFI Enabled
2,846,679 UART: [state] LifecycleState = Production
2,847,287 UART: [state] DebugLocked = Yes
2,847,843 UART: [state] Starting the WD Timer 40000000 cycles
2,849,456 UART: [kat] SHA2-256
3,653,006 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,135 UART: [kat] ++
3,657,287 UART: [kat] sha1
3,661,511 UART: [kat] SHA2-256
3,663,451 UART: [kat] SHA2-384
3,666,208 UART: [kat] SHA2-512-ACC
3,668,109 UART: [kat] ECC-384
3,677,882 UART: [kat] HMAC-384Kdf
3,682,584 UART: [kat] LMS
3,930,896 UART: [kat] --
3,931,668 UART: [warm-reset] ++
3,932,457 UART: [warm-reset] --
3,933,104 UART: [state] Locking Datavault
3,933,750 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,354 UART: [state] Locking ICCM
3,935,022 UART: [exit] Launching FMC @ 0x40000130
3,940,351 UART:
3,940,367 UART: Running Caliptra FMC ...
3,940,775 UART:
3,940,918 UART: [state] CFI Enabled
3,942,227 UART: [aliasrt :skip pcr extension
3,942,700 UART: [art] Extend RT PCRs Done
3,943,128 UART: [art] Lock RT PCRs Done
3,944,523 UART: [art] Populate DV Done
3,952,627 UART: [fht] FMC Alias Private Key: 7
3,953,739 UART: [art] Derive CDI
3,954,019 UART: [art] Store in in slot 0x4
4,039,496 UART: [art] Derive Key Pair
4,039,856 UART: [art] Store priv key in slot 0x5
4,052,694 UART: [art] Derive Key Pair - Done
4,067,518 UART: [art] Signing Cert with AUTHO
4,067,998 UART: RITY.KEYID = 7
4,083,024 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,789 UART: [art] PUB.X = 2F6044BE217AEF6D0C6FDA41DB54F4E0A8B6EBD662D0828EBFBAE33EE8A4B60C746B0244683FF0B40B122131DFE74878
4,090,565 UART: [art] PUB.Y = 5E0EC4AAC6C56F002DEC7570F70C89FAEDF4F94DD0A378519C4EB0C325D246A09A7B73AF83417C1B334CDA7AEAEAB6FD
4,097,515 UART: [art] SIG.R = 60842839D64A020A9705E99C7005962A416538C80DCE44010D8A955168FD871E83DB46F4CDF51B68107CDE63E6F37D40
4,104,258 UART: [art] SIG.S = 5781DD7863119ED6E102BF331C614001CB414EA1DB05F3A2B4D5B8635C4BE291CFC2CF98CD3050E660A4FF32FC0EAE38
4,127,757 UART: mbox::rt_entry...
4,128,129 UART: ____ _ _ _ ____ _____
4,128,913 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,713 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,481 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,249 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,017 UART: |_|
4,132,329 UART:
4,413,492 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Production
85,712 UART: [state] DebugLocked = Yes
86,468 UART: [state] Starting the WD Timer 40000000 cycles
88,123 UART: [kat] SHA2-256
891,673 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,802 UART: [kat] ++
895,954 UART: [kat] sha1
899,978 UART: [kat] SHA2-256
901,918 UART: [kat] SHA2-384
904,733 UART: [kat] SHA2-512-ACC
906,634 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,639 UART: [kat] LMS
1,168,951 UART: [kat] --
1,169,958 UART: [cold-reset] ++
1,170,393 UART: [fht] FHT @ 0x50003400
1,173,151 UART: [idev] ++
1,173,319 UART: [idev] CDI.KEYID = 6
1,173,680 UART: [idev] SUBJECT.KEYID = 7
1,174,105 UART: [idev] UDS.KEYID = 0
1,174,451 ready_for_fw is high
1,174,451 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,394 UART: [idev] Erasing UDS.KEYID = 0
1,199,829 UART: [idev] Sha1 KeyId Algorithm
1,208,566 UART: [idev] --
1,209,631 UART: [ldev] ++
1,209,799 UART: [ldev] CDI.KEYID = 6
1,210,163 UART: [ldev] SUBJECT.KEYID = 5
1,210,590 UART: [ldev] AUTHORITY.KEYID = 7
1,211,053 UART: [ldev] FE.KEYID = 1
1,216,379 UART: [ldev] Erasing FE.KEYID = 1
1,242,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,448 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,142 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,012 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,718 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,796 UART: [ldev] --
1,282,140 UART: [fwproc] Wait for Commands...
1,282,769 UART: [fwproc] Recv command 0x46574c44
1,283,502 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,353 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,662 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,019 >>> mbox cmd response: success
2,338,053 UART: [afmc] ++
2,338,221 UART: [afmc] CDI.KEYID = 6
2,338,584 UART: [afmc] SUBJECT.KEYID = 7
2,339,010 UART: [afmc] AUTHORITY.KEYID = 5
2,374,871 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,589 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,340 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,398,059 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,952 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,659 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,262 UART: [afmc] --
2,418,259 UART: [cold-reset] --
2,419,093 UART: [state] Locking Datavault
2,420,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,734 UART: [state] Locking ICCM
2,421,354 UART: [exit] Launching FMC @ 0x40000130
2,426,683 UART:
2,426,699 UART: Running Caliptra FMC ...
2,427,107 UART:
2,427,250 UART: [state] CFI Enabled
2,437,935 UART: [fht] FMC Alias Private Key: 7
2,546,184 UART: [art] Extend RT PCRs Done
2,546,612 UART: [art] Lock RT PCRs Done
2,547,640 UART: [art] Populate DV Done
2,555,846 UART: [fht] FMC Alias Private Key: 7
2,556,798 UART: [art] Derive CDI
2,557,078 UART: [art] Store in in slot 0x4
2,642,779 UART: [art] Derive Key Pair
2,643,139 UART: [art] Store priv key in slot 0x5
2,656,815 UART: [art] Derive Key Pair - Done
2,671,514 UART: [art] Signing Cert with AUTHO
2,671,994 UART: RITY.KEYID = 7
2,687,096 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,861 UART: [art] PUB.X = 453AE8328E67759B3FFD37A624962A9E86922CA0539486BC4A7C40366B1A3AA6897B2CCD2CAE29593D3F634D8406095F
2,694,625 UART: [art] PUB.Y = F56CFACF22A428EE4EA60B1FC0634B0E254083D526B45A12D7F949BA599280D9836D95E9F347F353868CEA8E4A943DD1
2,701,577 UART: [art] SIG.R = 1141C705581B26524A305AA743BA24D8C8C4EF9025835B3629F8C69FA030A87486CA2562EAFC27EB48EC3785C7FCE6CA
2,708,350 UART: [art] SIG.S = 93411EB32EC19087BB11E9B74276ED9AE97FFE6D2489CF05EA48ED34913DAF0BE286B453C8C5F6C935239F8E4AA8A172
2,732,217 UART: mbox::rt_entry...
2,732,589 UART: ____ _ _ _ ____ _____
2,733,373 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,173 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,941 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,709 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,477 UART: |_|
2,736,789 UART:
2,842,561 UART: [rt] Runtime listening for mailbox commands...
2,843,323 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,843,438 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,532 UART:
2,843,548 UART: Running Caliptra ROM ...
2,843,956 UART:
2,844,098 UART: [state] CFI Enabled
2,847,221 UART: [state] LifecycleState = Production
2,847,829 UART: [state] DebugLocked = Yes
2,848,533 UART: [state] Starting the WD Timer 40000000 cycles
2,850,168 UART: [kat] SHA2-256
3,653,718 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,847 UART: [kat] ++
3,657,999 UART: [kat] sha1
3,662,161 UART: [kat] SHA2-256
3,664,101 UART: [kat] SHA2-384
3,666,724 UART: [kat] SHA2-512-ACC
3,668,625 UART: [kat] ECC-384
3,678,916 UART: [kat] HMAC-384Kdf
3,683,720 UART: [kat] LMS
3,932,032 UART: [kat] --
3,932,958 UART: [warm-reset] ++
3,934,077 UART: [warm-reset] --
3,935,034 UART: [state] Locking Datavault
3,935,824 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,428 UART: [state] Locking ICCM
3,936,958 UART: [exit] Launching FMC @ 0x40000130
3,942,287 UART:
3,942,303 UART: Running Caliptra FMC ...
3,942,711 UART:
3,942,854 UART: [state] CFI Enabled
3,944,323 UART: [aliasrt :skip pcr extension
3,944,796 UART: [art] Extend RT PCRs Done
3,945,224 UART: [art] Lock RT PCRs Done
3,946,375 UART: [art] Populate DV Done
3,954,379 UART: [fht] FMC Alias Private Key: 7
3,955,325 UART: [art] Derive CDI
3,955,605 UART: [art] Store in in slot 0x4
4,041,512 UART: [art] Derive Key Pair
4,041,872 UART: [art] Store priv key in slot 0x5
4,055,174 UART: [art] Derive Key Pair - Done
4,070,315 UART: [art] Signing Cert with AUTHO
4,070,795 UART: RITY.KEYID = 7
4,086,153 UART: [art] Erasing AUTHORITY.KEYID = 7
4,086,918 UART: [art] PUB.X = 453AE8328E67759B3FFD37A624962A9E86922CA0539486BC4A7C40366B1A3AA6897B2CCD2CAE29593D3F634D8406095F
4,093,682 UART: [art] PUB.Y = F56CFACF22A428EE4EA60B1FC0634B0E254083D526B45A12D7F949BA599280D9836D95E9F347F353868CEA8E4A943DD1
4,100,634 UART: [art] SIG.R = 1141C705581B26524A305AA743BA24D8C8C4EF9025835B3629F8C69FA030A87486CA2562EAFC27EB48EC3785C7FCE6CA
4,107,407 UART: [art] SIG.S = 93411EB32EC19087BB11E9B74276ED9AE97FFE6D2489CF05EA48ED34913DAF0BE286B453C8C5F6C935239F8E4AA8A172
4,131,084 UART: mbox::rt_entry...
4,131,456 UART: ____ _ _ _ ____ _____
4,132,240 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,133,040 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,133,808 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,134,576 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,135,344 UART: |_|
4,135,656 UART:
4,417,916 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,767 UART: [state] LifecycleState = Production
85,375 UART: [state] DebugLocked = Yes
85,977 UART: [state] Starting the WD Timer 40000000 cycles
87,498 UART: [kat] SHA2-256
891,048 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,177 UART: [kat] ++
895,329 UART: [kat] sha1
899,395 UART: [kat] SHA2-256
901,335 UART: [kat] SHA2-384
904,236 UART: [kat] SHA2-512-ACC
906,137 UART: [kat] ECC-384
916,088 UART: [kat] HMAC-384Kdf
920,656 UART: [kat] LMS
1,168,968 UART: [kat] --
1,169,747 UART: [cold-reset] ++
1,170,190 UART: [fht] FHT @ 0x50003400
1,173,008 UART: [idev] ++
1,173,176 UART: [idev] CDI.KEYID = 6
1,173,537 UART: [idev] SUBJECT.KEYID = 7
1,173,962 UART: [idev] UDS.KEYID = 0
1,174,308 ready_for_fw is high
1,174,308 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,969 UART: [idev] Erasing UDS.KEYID = 0
1,198,600 UART: [idev] Sha1 KeyId Algorithm
1,207,605 UART: [idev] --
1,208,806 UART: [ldev] ++
1,208,974 UART: [ldev] CDI.KEYID = 6
1,209,338 UART: [ldev] SUBJECT.KEYID = 5
1,209,765 UART: [ldev] AUTHORITY.KEYID = 7
1,210,228 UART: [ldev] FE.KEYID = 1
1,215,244 UART: [ldev] Erasing FE.KEYID = 1
1,241,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,867 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,561 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,431 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,137 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,157 UART: [ldev] --
1,280,615 UART: [fwproc] Wait for Commands...
1,281,306 UART: [fwproc] Recv command 0x46574c44
1,282,039 UART: [fwproc] Recv'd Img size: 78704 bytes
2,196,505 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,032 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,341 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,334,630 >>> mbox cmd response: success
2,335,850 UART: [afmc] ++
2,336,018 UART: [afmc] CDI.KEYID = 6
2,336,381 UART: [afmc] SUBJECT.KEYID = 7
2,336,807 UART: [afmc] AUTHORITY.KEYID = 5
2,372,240 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,964 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,715 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,434 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,327 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,034 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,011 UART: [afmc] --
2,416,120 UART: [cold-reset] --
2,416,966 UART: [state] Locking Datavault
2,417,889 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,493 UART: [state] Locking ICCM
2,419,157 UART: [exit] Launching FMC @ 0x40000130
2,424,486 UART:
2,424,502 UART: Running Caliptra FMC ...
2,424,910 UART:
2,424,964 UART: [state] CFI Enabled
2,435,461 UART: [fht] FMC Alias Private Key: 7
2,543,420 UART: [art] Extend RT PCRs Done
2,543,848 UART: [art] Lock RT PCRs Done
2,545,110 UART: [art] Populate DV Done
2,553,232 UART: [fht] FMC Alias Private Key: 7
2,554,400 UART: [art] Derive CDI
2,554,680 UART: [art] Store in in slot 0x4
2,640,483 UART: [art] Derive Key Pair
2,640,843 UART: [art] Store priv key in slot 0x5
2,654,461 UART: [art] Derive Key Pair - Done
2,669,040 UART: [art] Signing Cert with AUTHO
2,669,520 UART: RITY.KEYID = 7
2,684,700 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,465 UART: [art] PUB.X = 4F7C55764E1209E7EBED31B4CD9684126EFD15CAA84774B1843E4A06F07D04C308DC74DF77ACA80698BA3580DB4445DF
2,692,230 UART: [art] PUB.Y = 2DACA3C32B3531B29E6BDE6622958F721052DAF1A30299A1A3D17A764FB9BD6B4E8D5FDA319EF8B0DF6167F188089F9E
2,699,188 UART: [art] SIG.R = CAA3CA047A0DA99A113840A0001AAFD2C990FCCFF96AB50F4EF6A66B5FC6324BAFD7E17552DB6894E2E01B52A472D195
2,705,947 UART: [art] SIG.S = B3C3B76EBE4D630A4DCAE67B278A31309909377387EC7D2853E9EDBB3444FFD77782AE2C89D62ADC3A8B3902BF0FC7E4
2,729,062 UART: mbox::rt_entry...
2,729,434 UART: ____ _ _ _ ____ _____
2,730,218 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,018 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,786 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,554 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,322 UART: |_|
2,733,634 UART:
2,840,160 UART: [rt] Runtime listening for mailbox commands...
2,840,922 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,841,037 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,131 UART:
2,841,147 UART: Running Caliptra ROM ...
2,841,555 UART:
2,841,610 UART: [state] CFI Enabled
2,844,005 UART: [state] LifecycleState = Production
2,844,613 UART: [state] DebugLocked = Yes
2,845,165 UART: [state] Starting the WD Timer 40000000 cycles
2,846,876 UART: [kat] SHA2-256
3,650,426 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,654,555 UART: [kat] ++
3,654,707 UART: [kat] sha1
3,658,997 UART: [kat] SHA2-256
3,660,937 UART: [kat] SHA2-384
3,663,824 UART: [kat] SHA2-512-ACC
3,665,725 UART: [kat] ECC-384
3,675,240 UART: [kat] HMAC-384Kdf
3,680,012 UART: [kat] LMS
3,928,324 UART: [kat] --
3,929,226 UART: [warm-reset] ++
3,930,161 UART: [warm-reset] --
3,931,114 UART: [state] Locking Datavault
3,931,972 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,576 UART: [state] Locking ICCM
3,933,044 UART: [exit] Launching FMC @ 0x40000130
3,938,373 UART:
3,938,389 UART: Running Caliptra FMC ...
3,938,797 UART:
3,938,851 UART: [state] CFI Enabled
3,939,832 UART: [aliasrt :skip pcr extension
3,940,305 UART: [art] Extend RT PCRs Done
3,940,733 UART: [art] Lock RT PCRs Done
3,941,994 UART: [art] Populate DV Done
3,950,066 UART: [fht] FMC Alias Private Key: 7
3,951,234 UART: [art] Derive CDI
3,951,514 UART: [art] Store in in slot 0x4
4,037,109 UART: [art] Derive Key Pair
4,037,469 UART: [art] Store priv key in slot 0x5
4,050,507 UART: [art] Derive Key Pair - Done
4,065,206 UART: [art] Signing Cert with AUTHO
4,065,686 UART: RITY.KEYID = 7
4,081,074 UART: [art] Erasing AUTHORITY.KEYID = 7
4,081,839 UART: [art] PUB.X = 4F7C55764E1209E7EBED31B4CD9684126EFD15CAA84774B1843E4A06F07D04C308DC74DF77ACA80698BA3580DB4445DF
4,088,604 UART: [art] PUB.Y = 2DACA3C32B3531B29E6BDE6622958F721052DAF1A30299A1A3D17A764FB9BD6B4E8D5FDA319EF8B0DF6167F188089F9E
4,095,562 UART: [art] SIG.R = CAA3CA047A0DA99A113840A0001AAFD2C990FCCFF96AB50F4EF6A66B5FC6324BAFD7E17552DB6894E2E01B52A472D195
4,102,321 UART: [art] SIG.S = B3C3B76EBE4D630A4DCAE67B278A31309909377387EC7D2853E9EDBB3444FFD77782AE2C89D62ADC3A8B3902BF0FC7E4
4,126,290 UART: mbox::rt_entry...
4,126,662 UART: ____ _ _ _ ____ _____
4,127,446 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,128,246 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,129,014 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,129,782 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,130,550 UART: |_|
4,130,862 UART:
4,412,224 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,033 UART: [state] LifecycleState = Production
85,641 UART: [state] DebugLocked = Yes
86,195 UART: [state] Starting the WD Timer 40000000 cycles
87,878 UART: [kat] SHA2-256
891,428 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,557 UART: [kat] ++
895,709 UART: [kat] sha1
899,835 UART: [kat] SHA2-256
901,775 UART: [kat] SHA2-384
904,486 UART: [kat] SHA2-512-ACC
906,387 UART: [kat] ECC-384
916,014 UART: [kat] HMAC-384Kdf
920,696 UART: [kat] LMS
1,169,008 UART: [kat] --
1,169,753 UART: [cold-reset] ++
1,170,192 UART: [fht] FHT @ 0x50003400
1,172,950 UART: [idev] ++
1,173,118 UART: [idev] CDI.KEYID = 6
1,173,479 UART: [idev] SUBJECT.KEYID = 7
1,173,904 UART: [idev] UDS.KEYID = 0
1,174,250 ready_for_fw is high
1,174,250 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,851 UART: [idev] Erasing UDS.KEYID = 0
1,198,456 UART: [idev] Sha1 KeyId Algorithm
1,207,491 UART: [idev] --
1,208,724 UART: [ldev] ++
1,208,892 UART: [ldev] CDI.KEYID = 6
1,209,256 UART: [ldev] SUBJECT.KEYID = 5
1,209,683 UART: [ldev] AUTHORITY.KEYID = 7
1,210,146 UART: [ldev] FE.KEYID = 1
1,215,122 UART: [ldev] Erasing FE.KEYID = 1
1,241,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,627 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,321 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,191 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,897 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,001 UART: [ldev] --
1,280,263 UART: [fwproc] Wait for Commands...
1,281,072 UART: [fwproc] Recv command 0x46574c44
1,281,805 UART: [fwproc] Recv'd Img size: 78704 bytes
2,196,407 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,020 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,329 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,334,736 >>> mbox cmd response: success
2,335,900 UART: [afmc] ++
2,336,068 UART: [afmc] CDI.KEYID = 6
2,336,431 UART: [afmc] SUBJECT.KEYID = 7
2,336,857 UART: [afmc] AUTHORITY.KEYID = 5
2,372,648 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,936 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,687 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,406 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,299 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,006 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,957 UART: [afmc] --
2,416,002 UART: [cold-reset] --
2,416,872 UART: [state] Locking Datavault
2,418,067 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,671 UART: [state] Locking ICCM
2,419,135 UART: [exit] Launching FMC @ 0x40000130
2,424,464 UART:
2,424,480 UART: Running Caliptra FMC ...
2,424,888 UART:
2,424,942 UART: [state] CFI Enabled
2,435,553 UART: [fht] FMC Alias Private Key: 7
2,543,000 UART: [art] Extend RT PCRs Done
2,543,428 UART: [art] Lock RT PCRs Done
2,545,114 UART: [art] Populate DV Done
2,553,338 UART: [fht] FMC Alias Private Key: 7
2,554,464 UART: [art] Derive CDI
2,554,744 UART: [art] Store in in slot 0x4
2,640,195 UART: [art] Derive Key Pair
2,640,555 UART: [art] Store priv key in slot 0x5
2,653,679 UART: [art] Derive Key Pair - Done
2,668,593 UART: [art] Signing Cert with AUTHO
2,669,073 UART: RITY.KEYID = 7
2,684,447 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,212 UART: [art] PUB.X = C03CC7D2A7D6E90614F1803D1A4C48ECD0505CEF79CEF1819F8DBA367A09DEB07BB4263EB342646ED9C673FC12CD3A94
2,691,994 UART: [art] PUB.Y = 0762F774602CCF90E9EBE92D27C06F90B5F03EA177B976D5EFD28B789CD37C82C3B9CAB3B03657F481EF873BAE5B384F
2,698,955 UART: [art] SIG.R = 93DF4A006293FBE01B526686BE56D8C7CC76A2ADC7D0B4CEB23980E1CC54885E9325BB7ACB2B2B85EA3414C6A57D418A
2,705,719 UART: [art] SIG.S = 6C8FE17FE42B5B6D6675360816C86B8B52EC5ADA4F4A9DA791F9E603A61C1E83B268796FB3E577CE27FEBF77CB97F0C8
2,729,256 UART: mbox::rt_entry...
2,729,628 UART: ____ _ _ _ ____ _____
2,730,412 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,212 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,980 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,748 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,516 UART: |_|
2,733,828 UART:
2,840,198 UART: [rt] Runtime listening for mailbox commands...
2,840,960 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,841,075 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,169 UART:
2,841,185 UART: Running Caliptra ROM ...
2,841,593 UART:
2,841,648 UART: [state] CFI Enabled
2,843,899 UART: [state] LifecycleState = Production
2,844,507 UART: [state] DebugLocked = Yes
2,845,127 UART: [state] Starting the WD Timer 40000000 cycles
2,846,708 UART: [kat] SHA2-256
3,650,258 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,654,387 UART: [kat] ++
3,654,539 UART: [kat] sha1
3,658,587 UART: [kat] SHA2-256
3,660,527 UART: [kat] SHA2-384
3,663,434 UART: [kat] SHA2-512-ACC
3,665,335 UART: [kat] ECC-384
3,675,204 UART: [kat] HMAC-384Kdf
3,679,900 UART: [kat] LMS
3,928,212 UART: [kat] --
3,928,970 UART: [warm-reset] ++
3,929,885 UART: [warm-reset] --
3,930,898 UART: [state] Locking Datavault
3,931,714 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,318 UART: [state] Locking ICCM
3,932,912 UART: [exit] Launching FMC @ 0x40000130
3,938,241 UART:
3,938,257 UART: Running Caliptra FMC ...
3,938,665 UART:
3,938,719 UART: [state] CFI Enabled
3,940,038 UART: [aliasrt :skip pcr extension
3,940,511 UART: [art] Extend RT PCRs Done
3,940,939 UART: [art] Lock RT PCRs Done
3,942,260 UART: [art] Populate DV Done
3,950,588 UART: [fht] FMC Alias Private Key: 7
3,951,534 UART: [art] Derive CDI
3,951,814 UART: [art] Store in in slot 0x4
4,037,547 UART: [art] Derive Key Pair
4,037,907 UART: [art] Store priv key in slot 0x5
4,050,957 UART: [art] Derive Key Pair - Done
4,065,793 UART: [art] Signing Cert with AUTHO
4,066,273 UART: RITY.KEYID = 7
4,081,717 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,482 UART: [art] PUB.X = C03CC7D2A7D6E90614F1803D1A4C48ECD0505CEF79CEF1819F8DBA367A09DEB07BB4263EB342646ED9C673FC12CD3A94
4,089,264 UART: [art] PUB.Y = 0762F774602CCF90E9EBE92D27C06F90B5F03EA177B976D5EFD28B789CD37C82C3B9CAB3B03657F481EF873BAE5B384F
4,096,225 UART: [art] SIG.R = 93DF4A006293FBE01B526686BE56D8C7CC76A2ADC7D0B4CEB23980E1CC54885E9325BB7ACB2B2B85EA3414C6A57D418A
4,102,989 UART: [art] SIG.S = 6C8FE17FE42B5B6D6675360816C86B8B52EC5ADA4F4A9DA791F9E603A61C1E83B268796FB3E577CE27FEBF77CB97F0C8
4,127,082 UART: mbox::rt_entry...
4,127,454 UART: ____ _ _ _ ____ _____
4,128,238 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,038 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,129,806 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,574 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,342 UART: |_|
4,131,654 UART:
4,410,176 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,686 UART: [state] LifecycleState = Production
85,294 UART: [state] DebugLocked = Yes
85,984 UART: [state] Starting the WD Timer 40000000 cycles
87,643 UART: [kat] SHA2-256
891,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,322 UART: [kat] ++
895,474 UART: [kat] sha1
899,704 UART: [kat] SHA2-256
901,644 UART: [kat] SHA2-384
904,333 UART: [kat] SHA2-512-ACC
906,234 UART: [kat] ECC-384
916,289 UART: [kat] HMAC-384Kdf
920,961 UART: [kat] LMS
1,169,273 UART: [kat] --
1,170,210 UART: [cold-reset] ++
1,170,679 UART: [fht] FHT @ 0x50003400
1,173,421 UART: [idev] ++
1,173,589 UART: [idev] CDI.KEYID = 6
1,173,950 UART: [idev] SUBJECT.KEYID = 7
1,174,375 UART: [idev] UDS.KEYID = 0
1,174,721 ready_for_fw is high
1,174,721 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,238 UART: [idev] Erasing UDS.KEYID = 0
1,199,289 UART: [idev] Sha1 KeyId Algorithm
1,208,312 UART: [idev] --
1,209,345 UART: [ldev] ++
1,209,513 UART: [ldev] CDI.KEYID = 6
1,209,877 UART: [ldev] SUBJECT.KEYID = 5
1,210,304 UART: [ldev] AUTHORITY.KEYID = 7
1,210,767 UART: [ldev] FE.KEYID = 1
1,216,047 UART: [ldev] Erasing FE.KEYID = 1
1,242,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,830 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,524 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,394 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,100 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,264 UART: [ldev] --
1,281,728 UART: [fwproc] Wait for Commands...
1,282,489 UART: [fwproc] Recv command 0x46574c44
1,283,222 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,226,031 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,340 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,645 >>> mbox cmd response: success
2,338,765 UART: [afmc] ++
2,338,933 UART: [afmc] CDI.KEYID = 6
2,339,296 UART: [afmc] SUBJECT.KEYID = 7
2,339,722 UART: [afmc] AUTHORITY.KEYID = 5
2,374,669 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,869 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,620 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,339 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,232 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,939 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,730 UART: [afmc] --
2,417,743 UART: [cold-reset] --
2,418,383 UART: [state] Locking Datavault
2,419,528 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,132 UART: [state] Locking ICCM
2,420,738 UART: [exit] Launching FMC @ 0x40000130
2,426,067 UART:
2,426,083 UART: Running Caliptra FMC ...
2,426,491 UART:
2,426,634 UART: [state] CFI Enabled
2,437,295 UART: [fht] FMC Alias Private Key: 7
2,545,174 UART: [art] Extend RT PCRs Done
2,545,602 UART: [art] Lock RT PCRs Done
2,547,300 UART: [art] Populate DV Done
2,555,618 UART: [fht] FMC Alias Private Key: 7
2,556,640 UART: [art] Derive CDI
2,556,920 UART: [art] Store in in slot 0x4
2,642,489 UART: [art] Derive Key Pair
2,642,849 UART: [art] Store priv key in slot 0x5
2,656,733 UART: [art] Derive Key Pair - Done
2,671,584 UART: [art] Signing Cert with AUTHO
2,672,064 UART: RITY.KEYID = 7
2,687,536 UART: [art] Erasing AUTHORITY.KEYID = 7
2,688,301 UART: [art] PUB.X = 558A6F428E56889D1D1ED9FE2A9725BA35381513B4992FF82FC3B04400EA775155DB48F18CFFA49B72FD6567BAF5C98A
2,695,057 UART: [art] PUB.Y = 880CEA379A1A7365C38838D9D7547F021BA10F1C6C41659B1F1D6D017DC0C075456235A2887E7BBEA67C0FF7D807C3DA
2,701,995 UART: [art] SIG.R = 93D69555C43EF77FDBA303EE492D1A5F69BE84A2934D7B67148610DE6ABD41FF8D0E27E084F97274E72EC008D0720565
2,708,757 UART: [art] SIG.S = 9C52FD51587441464E8E800EE09B05B7155201FF6FC30A9A0C576DC1ACFE01D8834249101151036E2FC6B1CD46CFEDE4
2,732,547 UART: mbox::rt_entry...
2,732,919 UART: ____ _ _ _ ____ _____
2,733,703 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,503 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,735,271 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,736,039 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,807 UART: |_|
2,737,119 UART:
2,843,853 UART: [rt] Runtime listening for mailbox commands...
2,844,615 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,844,730 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,844,824 UART:
2,844,840 UART: Running Caliptra ROM ...
2,845,248 UART:
2,845,390 UART: [state] CFI Enabled
2,848,581 UART: [state] LifecycleState = Production
2,849,189 UART: [state] DebugLocked = Yes
2,849,723 UART: [state] Starting the WD Timer 40000000 cycles
2,851,312 UART: [kat] SHA2-256
3,654,862 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,991 UART: [kat] ++
3,659,143 UART: [kat] sha1
3,663,193 UART: [kat] SHA2-256
3,665,133 UART: [kat] SHA2-384
3,667,784 UART: [kat] SHA2-512-ACC
3,669,685 UART: [kat] ECC-384
3,679,636 UART: [kat] HMAC-384Kdf
3,684,366 UART: [kat] LMS
3,932,678 UART: [kat] --
3,933,630 UART: [warm-reset] ++
3,934,435 UART: [warm-reset] --
3,935,240 UART: [state] Locking Datavault
3,935,936 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,540 UART: [state] Locking ICCM
3,937,046 UART: [exit] Launching FMC @ 0x40000130
3,942,375 UART:
3,942,391 UART: Running Caliptra FMC ...
3,942,799 UART:
3,942,942 UART: [state] CFI Enabled
3,944,383 UART: [aliasrt :skip pcr extension
3,944,856 UART: [art] Extend RT PCRs Done
3,945,284 UART: [art] Lock RT PCRs Done
3,946,737 UART: [art] Populate DV Done
3,954,867 UART: [fht] FMC Alias Private Key: 7
3,955,849 UART: [art] Derive CDI
3,956,129 UART: [art] Store in in slot 0x4
4,041,628 UART: [art] Derive Key Pair
4,041,988 UART: [art] Store priv key in slot 0x5
4,055,156 UART: [art] Derive Key Pair - Done
4,070,053 UART: [art] Signing Cert with AUTHO
4,070,533 UART: RITY.KEYID = 7
4,085,849 UART: [art] Erasing AUTHORITY.KEYID = 7
4,086,614 UART: [art] PUB.X = 558A6F428E56889D1D1ED9FE2A9725BA35381513B4992FF82FC3B04400EA775155DB48F18CFFA49B72FD6567BAF5C98A
4,093,370 UART: [art] PUB.Y = 880CEA379A1A7365C38838D9D7547F021BA10F1C6C41659B1F1D6D017DC0C075456235A2887E7BBEA67C0FF7D807C3DA
4,100,308 UART: [art] SIG.R = 93D69555C43EF77FDBA303EE492D1A5F69BE84A2934D7B67148610DE6ABD41FF8D0E27E084F97274E72EC008D0720565
4,107,070 UART: [art] SIG.S = 9C52FD51587441464E8E800EE09B05B7155201FF6FC30A9A0C576DC1ACFE01D8834249101151036E2FC6B1CD46CFEDE4
4,130,774 UART: mbox::rt_entry...
4,131,146 UART: ____ _ _ _ ____ _____
4,131,930 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,132,730 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,133,498 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,134,266 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,135,034 UART: |_|
4,135,346 UART:
4,412,720 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Production
85,982 UART: [state] DebugLocked = Yes
86,600 UART: [state] Starting the WD Timer 40000000 cycles
88,137 UART: [kat] SHA2-256
891,687 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,816 UART: [kat] ++
895,968 UART: [kat] sha1
900,178 UART: [kat] SHA2-256
902,118 UART: [kat] SHA2-384
904,845 UART: [kat] SHA2-512-ACC
906,746 UART: [kat] ECC-384
916,393 UART: [kat] HMAC-384Kdf
921,183 UART: [kat] LMS
1,169,495 UART: [kat] --
1,170,544 UART: [cold-reset] ++
1,171,001 UART: [fht] FHT @ 0x50003400
1,173,581 UART: [idev] ++
1,173,749 UART: [idev] CDI.KEYID = 6
1,174,110 UART: [idev] SUBJECT.KEYID = 7
1,174,535 UART: [idev] UDS.KEYID = 0
1,174,881 ready_for_fw is high
1,174,881 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,480 UART: [idev] Erasing UDS.KEYID = 0
1,199,655 UART: [idev] Sha1 KeyId Algorithm
1,208,448 UART: [idev] --
1,209,479 UART: [ldev] ++
1,209,647 UART: [ldev] CDI.KEYID = 6
1,210,011 UART: [ldev] SUBJECT.KEYID = 5
1,210,438 UART: [ldev] AUTHORITY.KEYID = 7
1,210,901 UART: [ldev] FE.KEYID = 1
1,216,267 UART: [ldev] Erasing FE.KEYID = 1
1,242,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,802 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,496 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,366 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,072 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,994 UART: [ldev] --
1,282,398 UART: [fwproc] Wait for Commands...
1,283,165 UART: [fwproc] Recv command 0x46574c44
1,283,898 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,226,167 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,476 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,753 >>> mbox cmd response: success
2,338,913 UART: [afmc] ++
2,339,081 UART: [afmc] CDI.KEYID = 6
2,339,444 UART: [afmc] SUBJECT.KEYID = 7
2,339,870 UART: [afmc] AUTHORITY.KEYID = 5
2,375,347 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,430 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,398,149 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,404,042 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,749 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,616 UART: [afmc] --
2,418,701 UART: [cold-reset] --
2,419,363 UART: [state] Locking Datavault
2,420,314 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,918 UART: [state] Locking ICCM
2,421,412 UART: [exit] Launching FMC @ 0x40000130
2,426,741 UART:
2,426,757 UART: Running Caliptra FMC ...
2,427,165 UART:
2,427,308 UART: [state] CFI Enabled
2,437,899 UART: [fht] FMC Alias Private Key: 7
2,546,540 UART: [art] Extend RT PCRs Done
2,546,968 UART: [art] Lock RT PCRs Done
2,548,464 UART: [art] Populate DV Done
2,556,858 UART: [fht] FMC Alias Private Key: 7
2,558,038 UART: [art] Derive CDI
2,558,318 UART: [art] Store in in slot 0x4
2,643,659 UART: [art] Derive Key Pair
2,644,019 UART: [art] Store priv key in slot 0x5
2,657,611 UART: [art] Derive Key Pair - Done
2,672,636 UART: [art] Signing Cert with AUTHO
2,673,116 UART: RITY.KEYID = 7
2,688,306 UART: [art] Erasing AUTHORITY.KEYID = 7
2,689,071 UART: [art] PUB.X = 02FC172445185A42741C836F13F9789E332D0D29FA1D1760E6B594DCB123F2386AD901008B49CFFECBB0C14FA37CBB6F
2,695,818 UART: [art] PUB.Y = D2E7B04ACB480E6E4850D3BB8393A24A36C9FB8A2069A3C49860C70F3AFEA75078FE8F2B610562BC4F8CEAC59E6A7D72
2,702,775 UART: [art] SIG.R = 22915CF93C1478F70102FAB3CB88732344E4EE835E05C9F977819C7908B5CE8E3E8AE66871A11EDBD265E9E3FD53D3DA
2,709,541 UART: [art] SIG.S = B8D38A7F3D319002EFC9E5367A4826EE2D523C16E7169F4B39464D625BFB4D49B4791430873F4E33AD5D398F58B7A6D7
2,732,471 UART: mbox::rt_entry...
2,732,843 UART: ____ _ _ _ ____ _____
2,733,627 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,427 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,735,195 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,963 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,731 UART: |_|
2,737,043 UART:
2,844,043 UART: [rt] Runtime listening for mailbox commands...
2,844,805 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,844,920 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,845,014 UART:
2,845,030 UART: Running Caliptra ROM ...
2,845,438 UART:
2,845,580 UART: [state] CFI Enabled
2,848,249 UART: [state] LifecycleState = Production
2,848,857 UART: [state] DebugLocked = Yes
2,849,399 UART: [state] Starting the WD Timer 40000000 cycles
2,850,888 UART: [kat] SHA2-256
3,654,438 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,567 UART: [kat] ++
3,658,719 UART: [kat] sha1
3,663,007 UART: [kat] SHA2-256
3,664,947 UART: [kat] SHA2-384
3,667,882 UART: [kat] SHA2-512-ACC
3,669,783 UART: [kat] ECC-384
3,679,716 UART: [kat] HMAC-384Kdf
3,684,364 UART: [kat] LMS
3,932,676 UART: [kat] --
3,933,532 UART: [warm-reset] ++
3,934,569 UART: [warm-reset] --
3,935,318 UART: [state] Locking Datavault
3,936,250 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,854 UART: [state] Locking ICCM
3,937,422 UART: [exit] Launching FMC @ 0x40000130
3,942,751 UART:
3,942,767 UART: Running Caliptra FMC ...
3,943,175 UART:
3,943,318 UART: [state] CFI Enabled
3,944,663 UART: [aliasrt :skip pcr extension
3,945,136 UART: [art] Extend RT PCRs Done
3,945,564 UART: [art] Lock RT PCRs Done
3,946,827 UART: [art] Populate DV Done
3,954,965 UART: [fht] FMC Alias Private Key: 7
3,955,977 UART: [art] Derive CDI
3,956,257 UART: [art] Store in in slot 0x4
4,042,060 UART: [art] Derive Key Pair
4,042,420 UART: [art] Store priv key in slot 0x5
4,056,156 UART: [art] Derive Key Pair - Done
4,070,745 UART: [art] Signing Cert with AUTHO
4,071,225 UART: RITY.KEYID = 7
4,086,375 UART: [art] Erasing AUTHORITY.KEYID = 7
4,087,140 UART: [art] PUB.X = 02FC172445185A42741C836F13F9789E332D0D29FA1D1760E6B594DCB123F2386AD901008B49CFFECBB0C14FA37CBB6F
4,093,887 UART: [art] PUB.Y = D2E7B04ACB480E6E4850D3BB8393A24A36C9FB8A2069A3C49860C70F3AFEA75078FE8F2B610562BC4F8CEAC59E6A7D72
4,100,844 UART: [art] SIG.R = 22915CF93C1478F70102FAB3CB88732344E4EE835E05C9F977819C7908B5CE8E3E8AE66871A11EDBD265E9E3FD53D3DA
4,107,610 UART: [art] SIG.S = B8D38A7F3D319002EFC9E5367A4826EE2D523C16E7169F4B39464D625BFB4D49B4791430873F4E33AD5D398F58B7A6D7
4,131,602 UART: mbox::rt_entry...
4,131,974 UART: ____ _ _ _ ____ _____
4,132,758 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,133,558 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,134,326 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,135,094 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,135,862 UART: |_|
4,136,174 UART:
4,417,442 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Production
85,971 UART: [state] DebugLocked = Yes
86,655 UART: [state] Starting the WD Timer 40000000 cycles
88,354 UART: [kat] SHA2-256
891,904 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,033 UART: [kat] ++
896,185 UART: [kat] sha1
900,387 UART: [kat] SHA2-256
902,327 UART: [kat] SHA2-384
905,280 UART: [kat] SHA2-512-ACC
907,181 UART: [kat] ECC-384
916,752 UART: [kat] HMAC-384Kdf
921,232 UART: [kat] LMS
1,169,544 UART: [kat] --
1,170,387 UART: [cold-reset] ++
1,170,716 UART: [fht] FHT @ 0x50003400
1,173,474 UART: [idev] ++
1,173,642 UART: [idev] CDI.KEYID = 6
1,174,003 UART: [idev] SUBJECT.KEYID = 7
1,174,428 UART: [idev] UDS.KEYID = 0
1,174,774 ready_for_fw is high
1,174,774 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,389 UART: [idev] Erasing UDS.KEYID = 0
1,199,690 UART: [idev] Sha1 KeyId Algorithm
1,208,523 UART: [idev] --
1,209,576 UART: [ldev] ++
1,209,744 UART: [ldev] CDI.KEYID = 6
1,210,108 UART: [ldev] SUBJECT.KEYID = 5
1,210,535 UART: [ldev] AUTHORITY.KEYID = 7
1,210,998 UART: [ldev] FE.KEYID = 1
1,215,968 UART: [ldev] Erasing FE.KEYID = 1
1,242,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,817 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,511 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,381 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,087 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,287 UART: [ldev] --
1,281,663 UART: [fwproc] Wait for Commands...
1,282,318 UART: [fwproc] Recv command 0x46574c44
1,283,051 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,345 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,132 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,441 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,288 >>> mbox cmd response: success
2,799,492 UART: [afmc] ++
2,799,660 UART: [afmc] CDI.KEYID = 6
2,800,023 UART: [afmc] SUBJECT.KEYID = 7
2,800,449 UART: [afmc] AUTHORITY.KEYID = 5
2,836,264 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,477 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,196 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,089 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,796 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,541 UART: [afmc] --
2,879,644 UART: [cold-reset] --
2,880,392 UART: [state] Locking Datavault
2,881,555 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,159 UART: [state] Locking ICCM
2,882,779 UART: [exit] Launching FMC @ 0x40000130
2,888,108 UART:
2,888,124 UART: Running Caliptra FMC ...
2,888,532 UART:
2,888,586 UART: [state] CFI Enabled
2,899,029 UART: [fht] FMC Alias Private Key: 7
3,007,100 UART: [art] Extend RT PCRs Done
3,007,528 UART: [art] Lock RT PCRs Done
3,009,450 UART: [art] Populate DV Done
3,017,796 UART: [fht] FMC Alias Private Key: 7
3,018,730 UART: [art] Derive CDI
3,019,010 UART: [art] Store in in slot 0x4
3,104,511 UART: [art] Derive Key Pair
3,104,871 UART: [art] Store priv key in slot 0x5
3,117,735 UART: [art] Derive Key Pair - Done
3,132,201 UART: [art] Signing Cert with AUTHO
3,132,681 UART: RITY.KEYID = 7
3,147,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,292 UART: [art] PUB.X = A84E5D9167E884B705F0F6CF6424C0469B9630F0D31DA9413EECC4DC851A0D35A113D6A732B0F00F4C9466C7913E4C5C
3,155,059 UART: [art] PUB.Y = E4A782FB0DD7BAA63EC0575597DE02BFAFDD8DF2A7A4A4D2081DD7F20D24605CF47081D132161EAEE08BBEFC6C6075A5
3,162,021 UART: [art] SIG.R = 1D47BF69E5858E2290808CC6D4C70903D0AB4CB6F3D8389711910110A4DC933E3AF055686906F1E9D1BDEEE74EC7571A
3,168,783 UART: [art] SIG.S = 53E0EAB2912323D4E3BF083706F865724963DEA82D91BDC77066AFFDFC5D83624E7077F0E27A23A9E6587EED44D7A457
3,192,888 UART: Caliptra RT
3,193,141 UART: [state] CFI Enabled
3,301,123 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,879 UART:
3,301,895 UART: Running Caliptra ROM ...
3,302,303 UART:
3,302,358 UART: [state] CFI Enabled
3,305,209 UART: [state] LifecycleState = Production
3,305,817 UART: [state] DebugLocked = Yes
3,306,565 UART: [state] Starting the WD Timer 40000000 cycles
3,308,030 UART: [kat] SHA2-256
4,111,580 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,709 UART: [kat] ++
4,115,861 UART: [kat] sha1
4,120,247 UART: [kat] SHA2-256
4,122,187 UART: [kat] SHA2-384
4,124,974 UART: [kat] SHA2-512-ACC
4,126,875 UART: [kat] ECC-384
4,136,622 UART: [kat] HMAC-384Kdf
4,141,404 UART: [kat] LMS
4,389,716 UART: [kat] --
4,390,358 UART: [warm-reset] ++
4,390,993 UART: [warm-reset] --
4,391,912 UART: [state] Locking Datavault
4,392,582 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,186 UART: [state] Locking ICCM
4,393,640 UART: [exit] Launching FMC @ 0x40000130
4,398,969 UART:
4,398,985 UART: Running Caliptra FMC ...
4,399,393 UART:
4,399,447 UART: [state] CFI Enabled
4,400,704 UART: [aliasrt :skip pcr extension
4,401,177 UART: [art] Extend RT PCRs Done
4,401,605 UART: [art] Lock RT PCRs Done
4,402,840 UART: [art] Populate DV Done
4,411,112 UART: [fht] FMC Alias Private Key: 7
4,412,080 UART: [art] Derive CDI
4,412,360 UART: [art] Store in in slot 0x4
4,498,213 UART: [art] Derive Key Pair
4,498,573 UART: [art] Store priv key in slot 0x5
4,511,363 UART: [art] Derive Key Pair - Done
4,526,129 UART: [art] Signing Cert with AUTHO
4,526,609 UART: RITY.KEYID = 7
4,541,575 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,340 UART: [art] PUB.X = A84E5D9167E884B705F0F6CF6424C0469B9630F0D31DA9413EECC4DC851A0D35A113D6A732B0F00F4C9466C7913E4C5C
4,549,107 UART: [art] PUB.Y = E4A782FB0DD7BAA63EC0575597DE02BFAFDD8DF2A7A4A4D2081DD7F20D24605CF47081D132161EAEE08BBEFC6C6075A5
4,556,069 UART: [art] SIG.R = 1D47BF69E5858E2290808CC6D4C70903D0AB4CB6F3D8389711910110A4DC933E3AF055686906F1E9D1BDEEE74EC7571A
4,562,831 UART: [art] SIG.S = 53E0EAB2912323D4E3BF083706F865724963DEA82D91BDC77066AFFDFC5D83624E7077F0E27A23A9E6587EED44D7A457
4,587,294 UART: Caliptra RT
4,587,547 UART: [state] CFI Enabled
4,865,643 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Production
85,761 UART: [state] DebugLocked = Yes
86,519 UART: [state] Starting the WD Timer 40000000 cycles
87,984 UART: [kat] SHA2-256
891,534 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,663 UART: [kat] ++
895,815 UART: [kat] sha1
899,955 UART: [kat] SHA2-256
901,895 UART: [kat] SHA2-384
904,744 UART: [kat] SHA2-512-ACC
906,645 UART: [kat] ECC-384
916,098 UART: [kat] HMAC-384Kdf
920,734 UART: [kat] LMS
1,169,046 UART: [kat] --
1,170,169 UART: [cold-reset] ++
1,170,586 UART: [fht] FHT @ 0x50003400
1,173,408 UART: [idev] ++
1,173,576 UART: [idev] CDI.KEYID = 6
1,173,937 UART: [idev] SUBJECT.KEYID = 7
1,174,362 UART: [idev] UDS.KEYID = 0
1,174,708 ready_for_fw is high
1,174,708 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,005 UART: [idev] Erasing UDS.KEYID = 0
1,199,188 UART: [idev] Sha1 KeyId Algorithm
1,207,979 UART: [idev] --
1,209,164 UART: [ldev] ++
1,209,332 UART: [ldev] CDI.KEYID = 6
1,209,696 UART: [ldev] SUBJECT.KEYID = 5
1,210,123 UART: [ldev] AUTHORITY.KEYID = 7
1,210,586 UART: [ldev] FE.KEYID = 1
1,215,926 UART: [ldev] Erasing FE.KEYID = 1
1,242,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,639 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,333 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,203 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,909 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,035 UART: [ldev] --
1,281,499 UART: [fwproc] Wait for Commands...
1,282,294 UART: [fwproc] Recv command 0x46574c44
1,283,027 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,152 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,461 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,318 >>> mbox cmd response: success
2,799,564 UART: [afmc] ++
2,799,732 UART: [afmc] CDI.KEYID = 6
2,800,095 UART: [afmc] SUBJECT.KEYID = 7
2,800,521 UART: [afmc] AUTHORITY.KEYID = 5
2,836,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,973 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,692 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,585 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,292 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,031 UART: [afmc] --
2,879,978 UART: [cold-reset] --
2,881,014 UART: [state] Locking Datavault
2,882,371 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,975 UART: [state] Locking ICCM
2,883,645 UART: [exit] Launching FMC @ 0x40000130
2,888,974 UART:
2,888,990 UART: Running Caliptra FMC ...
2,889,398 UART:
2,889,452 UART: [state] CFI Enabled
2,899,881 UART: [fht] FMC Alias Private Key: 7
3,007,426 UART: [art] Extend RT PCRs Done
3,007,854 UART: [art] Lock RT PCRs Done
3,009,480 UART: [art] Populate DV Done
3,018,058 UART: [fht] FMC Alias Private Key: 7
3,019,160 UART: [art] Derive CDI
3,019,440 UART: [art] Store in in slot 0x4
3,105,351 UART: [art] Derive Key Pair
3,105,711 UART: [art] Store priv key in slot 0x5
3,118,851 UART: [art] Derive Key Pair - Done
3,133,458 UART: [art] Signing Cert with AUTHO
3,133,938 UART: RITY.KEYID = 7
3,149,210 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,975 UART: [art] PUB.X = 8C382E5372CFB82CF9F3C73C972437468051F8E02465F07E16CF3501540736261AE545761F9CD3A6B9E6116D5D383B6C
3,156,733 UART: [art] PUB.Y = 9EC07E728CE88846963E8D6E871F757802AE4D52C24BF7A5046BA1F2933E5584B2187DBF27A450ADB935BFB19FD6FD80
3,163,685 UART: [art] SIG.R = CB2F7BC53E507CF406C3D370BF471E03E42B9A47174A04EA51005C4466B77C954637A3B60BC51530F5CC36C2972ECF9F
3,170,427 UART: [art] SIG.S = D442FCA12AB32559CB516E5067EEA6B8A032FF9402D14BE2CE51760F3E2853327A4A42B56A9879D224EE08BD883B4232
3,194,255 UART: Caliptra RT
3,194,508 UART: [state] CFI Enabled
3,301,885 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,641 UART:
3,302,657 UART: Running Caliptra ROM ...
3,303,065 UART:
3,303,120 UART: [state] CFI Enabled
3,305,885 UART: [state] LifecycleState = Production
3,306,493 UART: [state] DebugLocked = Yes
3,307,091 UART: [state] Starting the WD Timer 40000000 cycles
3,308,594 UART: [kat] SHA2-256
4,112,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,273 UART: [kat] ++
4,116,425 UART: [kat] sha1
4,120,639 UART: [kat] SHA2-256
4,122,579 UART: [kat] SHA2-384
4,125,464 UART: [kat] SHA2-512-ACC
4,127,365 UART: [kat] ECC-384
4,136,816 UART: [kat] HMAC-384Kdf
4,141,296 UART: [kat] LMS
4,389,608 UART: [kat] --
4,390,562 UART: [warm-reset] ++
4,391,187 UART: [warm-reset] --
4,391,994 UART: [state] Locking Datavault
4,392,958 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,562 UART: [state] Locking ICCM
4,394,210 UART: [exit] Launching FMC @ 0x40000130
4,399,539 UART:
4,399,555 UART: Running Caliptra FMC ...
4,399,963 UART:
4,400,017 UART: [state] CFI Enabled
4,401,218 UART: [aliasrt :skip pcr extension
4,401,691 UART: [art] Extend RT PCRs Done
4,402,119 UART: [art] Lock RT PCRs Done
4,403,358 UART: [art] Populate DV Done
4,411,822 UART: [fht] FMC Alias Private Key: 7
4,412,788 UART: [art] Derive CDI
4,413,068 UART: [art] Store in in slot 0x4
4,498,833 UART: [art] Derive Key Pair
4,499,193 UART: [art] Store priv key in slot 0x5
4,512,325 UART: [art] Derive Key Pair - Done
4,527,100 UART: [art] Signing Cert with AUTHO
4,527,580 UART: RITY.KEYID = 7
4,542,728 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,493 UART: [art] PUB.X = 8C382E5372CFB82CF9F3C73C972437468051F8E02465F07E16CF3501540736261AE545761F9CD3A6B9E6116D5D383B6C
4,550,251 UART: [art] PUB.Y = 9EC07E728CE88846963E8D6E871F757802AE4D52C24BF7A5046BA1F2933E5584B2187DBF27A450ADB935BFB19FD6FD80
4,557,203 UART: [art] SIG.R = CB2F7BC53E507CF406C3D370BF471E03E42B9A47174A04EA51005C4466B77C954637A3B60BC51530F5CC36C2972ECF9F
4,563,945 UART: [art] SIG.S = D442FCA12AB32559CB516E5067EEA6B8A032FF9402D14BE2CE51760F3E2853327A4A42B56A9879D224EE08BD883B4232
4,587,407 UART: Caliptra RT
4,587,660 UART: [state] CFI Enabled
4,874,131 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Production
85,936 UART: [state] DebugLocked = Yes
86,598 UART: [state] Starting the WD Timer 40000000 cycles
88,279 UART: [kat] SHA2-256
891,829 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,958 UART: [kat] ++
896,110 UART: [kat] sha1
900,290 UART: [kat] SHA2-256
902,230 UART: [kat] SHA2-384
904,961 UART: [kat] SHA2-512-ACC
906,862 UART: [kat] ECC-384
916,441 UART: [kat] HMAC-384Kdf
921,173 UART: [kat] LMS
1,169,485 UART: [kat] --
1,170,402 UART: [cold-reset] ++
1,170,955 UART: [fht] FHT @ 0x50003400
1,173,431 UART: [idev] ++
1,173,599 UART: [idev] CDI.KEYID = 6
1,173,960 UART: [idev] SUBJECT.KEYID = 7
1,174,385 UART: [idev] UDS.KEYID = 0
1,174,731 ready_for_fw is high
1,174,731 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,360 UART: [idev] Erasing UDS.KEYID = 0
1,199,517 UART: [idev] Sha1 KeyId Algorithm
1,208,336 UART: [idev] --
1,209,289 UART: [ldev] ++
1,209,457 UART: [ldev] CDI.KEYID = 6
1,209,821 UART: [ldev] SUBJECT.KEYID = 5
1,210,248 UART: [ldev] AUTHORITY.KEYID = 7
1,210,711 UART: [ldev] FE.KEYID = 1
1,215,993 UART: [ldev] Erasing FE.KEYID = 1
1,242,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,938 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,632 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,502 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,208 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,402 UART: [ldev] --
1,281,672 UART: [fwproc] Wait for Commands...
1,282,415 UART: [fwproc] Recv command 0x46574c44
1,283,148 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,848 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,097 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,406 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,269 >>> mbox cmd response: success
2,799,381 UART: [afmc] ++
2,799,549 UART: [afmc] CDI.KEYID = 6
2,799,912 UART: [afmc] SUBJECT.KEYID = 7
2,800,338 UART: [afmc] AUTHORITY.KEYID = 5
2,835,631 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,317 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,068 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,787 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,680 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,387 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,248 UART: [afmc] --
2,879,337 UART: [cold-reset] --
2,880,045 UART: [state] Locking Datavault
2,881,248 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,852 UART: [state] Locking ICCM
2,882,416 UART: [exit] Launching FMC @ 0x40000130
2,887,745 UART:
2,887,761 UART: Running Caliptra FMC ...
2,888,169 UART:
2,888,312 UART: [state] CFI Enabled
2,898,837 UART: [fht] FMC Alias Private Key: 7
3,006,490 UART: [art] Extend RT PCRs Done
3,006,918 UART: [art] Lock RT PCRs Done
3,008,554 UART: [art] Populate DV Done
3,016,606 UART: [fht] FMC Alias Private Key: 7
3,017,548 UART: [art] Derive CDI
3,017,828 UART: [art] Store in in slot 0x4
3,103,395 UART: [art] Derive Key Pair
3,103,755 UART: [art] Store priv key in slot 0x5
3,116,657 UART: [art] Derive Key Pair - Done
3,131,247 UART: [art] Signing Cert with AUTHO
3,131,727 UART: RITY.KEYID = 7
3,146,977 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,742 UART: [art] PUB.X = C7BBF4FE9B7EA409377ED925B965771CB0C8DDFBB6FD85A28AF33AE389A34EC36622381A75CFA32650E7E3F416DCA131
3,154,527 UART: [art] PUB.Y = 4F2889CF0F47224C2B25869CA15ADB24D4FBEB3B9FC67ED688BBC17555E45FA67C3BB8EBFD0B2CAE8C5F2587BBA0F515
3,161,497 UART: [art] SIG.R = 43AB141E493EC939FA65B696C1058D6260FEF5C03AB426D52C68B13A63E49CF9C58BA1BF024692DF2B270A5EC05D338D
3,168,268 UART: [art] SIG.S = 472289880A566336EE7AEC0F7FA0D63E534A868205020B5F509538B0A883B503EE473BCE94BF09FB6F3E49EB49071770
3,191,853 UART: Caliptra RT
3,192,198 UART: [state] CFI Enabled
3,299,814 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,570 UART:
3,300,586 UART: Running Caliptra ROM ...
3,300,994 UART:
3,301,136 UART: [state] CFI Enabled
3,303,987 UART: [state] LifecycleState = Production
3,304,595 UART: [state] DebugLocked = Yes
3,305,233 UART: [state] Starting the WD Timer 40000000 cycles
3,306,904 UART: [kat] SHA2-256
4,110,454 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,583 UART: [kat] ++
4,114,735 UART: [kat] sha1
4,119,125 UART: [kat] SHA2-256
4,121,065 UART: [kat] SHA2-384
4,123,708 UART: [kat] SHA2-512-ACC
4,125,609 UART: [kat] ECC-384
4,135,194 UART: [kat] HMAC-384Kdf
4,139,728 UART: [kat] LMS
4,388,040 UART: [kat] --
4,388,910 UART: [warm-reset] ++
4,389,751 UART: [warm-reset] --
4,390,464 UART: [state] Locking Datavault
4,391,382 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,986 UART: [state] Locking ICCM
4,392,504 UART: [exit] Launching FMC @ 0x40000130
4,397,833 UART:
4,397,849 UART: Running Caliptra FMC ...
4,398,257 UART:
4,398,400 UART: [state] CFI Enabled
4,400,027 UART: [aliasrt :skip pcr extension
4,400,500 UART: [art] Extend RT PCRs Done
4,400,928 UART: [art] Lock RT PCRs Done
4,402,221 UART: [art] Populate DV Done
4,410,379 UART: [fht] FMC Alias Private Key: 7
4,411,469 UART: [art] Derive CDI
4,411,749 UART: [art] Store in in slot 0x4
4,497,274 UART: [art] Derive Key Pair
4,497,634 UART: [art] Store priv key in slot 0x5
4,511,312 UART: [art] Derive Key Pair - Done
4,525,942 UART: [art] Signing Cert with AUTHO
4,526,422 UART: RITY.KEYID = 7
4,541,638 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,403 UART: [art] PUB.X = C7BBF4FE9B7EA409377ED925B965771CB0C8DDFBB6FD85A28AF33AE389A34EC36622381A75CFA32650E7E3F416DCA131
4,549,188 UART: [art] PUB.Y = 4F2889CF0F47224C2B25869CA15ADB24D4FBEB3B9FC67ED688BBC17555E45FA67C3BB8EBFD0B2CAE8C5F2587BBA0F515
4,556,158 UART: [art] SIG.R = 43AB141E493EC939FA65B696C1058D6260FEF5C03AB426D52C68B13A63E49CF9C58BA1BF024692DF2B270A5EC05D338D
4,562,929 UART: [art] SIG.S = 472289880A566336EE7AEC0F7FA0D63E534A868205020B5F509538B0A883B503EE473BCE94BF09FB6F3E49EB49071770
4,587,146 UART: Caliptra RT
4,587,491 UART: [state] CFI Enabled
4,869,367 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Production
85,592 UART: [state] DebugLocked = Yes
86,258 UART: [state] Starting the WD Timer 40000000 cycles
87,801 UART: [kat] SHA2-256
891,351 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,480 UART: [kat] ++
895,632 UART: [kat] sha1
899,808 UART: [kat] SHA2-256
901,748 UART: [kat] SHA2-384
904,413 UART: [kat] SHA2-512-ACC
906,314 UART: [kat] ECC-384
916,065 UART: [kat] HMAC-384Kdf
920,755 UART: [kat] LMS
1,169,067 UART: [kat] --
1,170,042 UART: [cold-reset] ++
1,170,389 UART: [fht] FHT @ 0x50003400
1,173,171 UART: [idev] ++
1,173,339 UART: [idev] CDI.KEYID = 6
1,173,700 UART: [idev] SUBJECT.KEYID = 7
1,174,125 UART: [idev] UDS.KEYID = 0
1,174,471 ready_for_fw is high
1,174,471 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,152 UART: [idev] Erasing UDS.KEYID = 0
1,198,839 UART: [idev] Sha1 KeyId Algorithm
1,207,510 UART: [idev] --
1,208,399 UART: [ldev] ++
1,208,567 UART: [ldev] CDI.KEYID = 6
1,208,931 UART: [ldev] SUBJECT.KEYID = 5
1,209,358 UART: [ldev] AUTHORITY.KEYID = 7
1,209,821 UART: [ldev] FE.KEYID = 1
1,215,367 UART: [ldev] Erasing FE.KEYID = 1
1,241,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,444 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,138 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,008 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,714 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,960 UART: [ldev] --
1,281,298 UART: [fwproc] Wait for Commands...
1,281,933 UART: [fwproc] Recv command 0x46574c44
1,282,666 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,067 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,376 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,181 >>> mbox cmd response: success
2,798,339 UART: [afmc] ++
2,798,507 UART: [afmc] CDI.KEYID = 6
2,798,870 UART: [afmc] SUBJECT.KEYID = 7
2,799,296 UART: [afmc] AUTHORITY.KEYID = 5
2,834,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,965 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,716 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,435 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,328 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,035 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,792 UART: [afmc] --
2,877,691 UART: [cold-reset] --
2,878,471 UART: [state] Locking Datavault
2,879,496 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,100 UART: [state] Locking ICCM
2,880,668 UART: [exit] Launching FMC @ 0x40000130
2,885,997 UART:
2,886,013 UART: Running Caliptra FMC ...
2,886,421 UART:
2,886,564 UART: [state] CFI Enabled
2,897,531 UART: [fht] FMC Alias Private Key: 7
3,005,674 UART: [art] Extend RT PCRs Done
3,006,102 UART: [art] Lock RT PCRs Done
3,007,790 UART: [art] Populate DV Done
3,016,094 UART: [fht] FMC Alias Private Key: 7
3,017,136 UART: [art] Derive CDI
3,017,416 UART: [art] Store in in slot 0x4
3,103,211 UART: [art] Derive Key Pair
3,103,571 UART: [art] Store priv key in slot 0x5
3,117,169 UART: [art] Derive Key Pair - Done
3,132,111 UART: [art] Signing Cert with AUTHO
3,132,591 UART: RITY.KEYID = 7
3,147,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,674 UART: [art] PUB.X = 35C1C4019CE5DCBBA1DADFDBC430F1B5EBC5D77206D42D0AE4E91A54B1310AFD21E7ECADE7C5BCDB0FC3584584E1768B
3,155,461 UART: [art] PUB.Y = BC7D044FCFBD186E0B09DDC19FA805C8E06B62DCE871560EDC34C9616F85E7C71574BB203C6EA7C14C2A5F07BB3C3B46
3,162,413 UART: [art] SIG.R = 42DD96F3D71A731F2BECBA5DEB3CD257D1766B16E77A4893E3799D73CA8E32A8910385AF3880085E5388812CCD8F199C
3,169,183 UART: [art] SIG.S = 3F2ACA106294A6771F3F09AA4427C0D273907E7114CF3A8713C4D7471DA0F1B71CA8A425C2F6F0FA5E3DA2BC8B5E7BD8
3,192,293 UART: Caliptra RT
3,192,638 UART: [state] CFI Enabled
3,301,196 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,952 UART:
3,301,968 UART: Running Caliptra ROM ...
3,302,376 UART:
3,302,518 UART: [state] CFI Enabled
3,305,549 UART: [state] LifecycleState = Production
3,306,157 UART: [state] DebugLocked = Yes
3,306,807 UART: [state] Starting the WD Timer 40000000 cycles
3,308,408 UART: [kat] SHA2-256
4,111,958 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,087 UART: [kat] ++
4,116,239 UART: [kat] sha1
4,120,603 UART: [kat] SHA2-256
4,122,543 UART: [kat] SHA2-384
4,125,252 UART: [kat] SHA2-512-ACC
4,127,153 UART: [kat] ECC-384
4,136,984 UART: [kat] HMAC-384Kdf
4,141,648 UART: [kat] LMS
4,389,960 UART: [kat] --
4,390,880 UART: [warm-reset] ++
4,391,853 UART: [warm-reset] --
4,392,750 UART: [state] Locking Datavault
4,393,552 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,156 UART: [state] Locking ICCM
4,394,598 UART: [exit] Launching FMC @ 0x40000130
4,399,927 UART:
4,399,943 UART: Running Caliptra FMC ...
4,400,351 UART:
4,400,494 UART: [state] CFI Enabled
4,401,943 UART: [aliasrt :skip pcr extension
4,402,416 UART: [art] Extend RT PCRs Done
4,402,844 UART: [art] Lock RT PCRs Done
4,404,279 UART: [art] Populate DV Done
4,412,593 UART: [fht] FMC Alias Private Key: 7
4,413,591 UART: [art] Derive CDI
4,413,871 UART: [art] Store in in slot 0x4
4,499,490 UART: [art] Derive Key Pair
4,499,850 UART: [art] Store priv key in slot 0x5
4,513,258 UART: [art] Derive Key Pair - Done
4,527,746 UART: [art] Signing Cert with AUTHO
4,528,226 UART: RITY.KEYID = 7
4,543,696 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,461 UART: [art] PUB.X = 35C1C4019CE5DCBBA1DADFDBC430F1B5EBC5D77206D42D0AE4E91A54B1310AFD21E7ECADE7C5BCDB0FC3584584E1768B
4,551,248 UART: [art] PUB.Y = BC7D044FCFBD186E0B09DDC19FA805C8E06B62DCE871560EDC34C9616F85E7C71574BB203C6EA7C14C2A5F07BB3C3B46
4,558,200 UART: [art] SIG.R = 42DD96F3D71A731F2BECBA5DEB3CD257D1766B16E77A4893E3799D73CA8E32A8910385AF3880085E5388812CCD8F199C
4,564,970 UART: [art] SIG.S = 3F2ACA106294A6771F3F09AA4427C0D273907E7114CF3A8713C4D7471DA0F1B71CA8A425C2F6F0FA5E3DA2BC8B5E7BD8
4,588,682 UART: Caliptra RT
4,589,027 UART: [state] CFI Enabled
4,872,921 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,051 UART: [state] LifecycleState = Production
85,659 UART: [state] DebugLocked = Yes
86,247 UART: [state] Starting the WD Timer 40000000 cycles
87,816 UART: [kat] SHA2-256
891,366 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,495 UART: [kat] ++
895,647 UART: [kat] sha1
899,901 UART: [kat] SHA2-256
901,841 UART: [kat] SHA2-384
904,656 UART: [kat] SHA2-512-ACC
906,557 UART: [kat] ECC-384
916,520 UART: [kat] HMAC-384Kdf
921,156 UART: [kat] LMS
1,169,468 UART: [kat] --
1,170,017 UART: [cold-reset] ++
1,170,586 UART: [fht] FHT @ 0x50003400
1,173,188 UART: [idev] ++
1,173,356 UART: [idev] CDI.KEYID = 6
1,173,717 UART: [idev] SUBJECT.KEYID = 7
1,174,142 UART: [idev] UDS.KEYID = 0
1,174,488 ready_for_fw is high
1,174,488 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,771 UART: [idev] Erasing UDS.KEYID = 0
1,198,292 UART: [idev] Sha1 KeyId Algorithm
1,207,103 UART: [idev] --
1,208,226 UART: [ldev] ++
1,208,394 UART: [ldev] CDI.KEYID = 6
1,208,758 UART: [ldev] SUBJECT.KEYID = 5
1,209,185 UART: [ldev] AUTHORITY.KEYID = 7
1,209,648 UART: [ldev] FE.KEYID = 1
1,214,762 UART: [ldev] Erasing FE.KEYID = 1
1,240,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,691 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,385 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,255 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,961 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,897 UART: [ldev] --
1,280,209 UART: [fwproc] Wait for Commands...
1,280,832 UART: [fwproc] Recv command 0x46574c44
1,281,565 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,213 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,494 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,803 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,796,628 >>> mbox cmd response: success
2,797,754 UART: [afmc] ++
2,797,922 UART: [afmc] CDI.KEYID = 6
2,798,285 UART: [afmc] SUBJECT.KEYID = 7
2,798,711 UART: [afmc] AUTHORITY.KEYID = 5
2,834,044 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,758 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,509 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,228 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,121 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,828 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,753 UART: [afmc] --
2,877,672 UART: [cold-reset] --
2,878,510 UART: [state] Locking Datavault
2,879,847 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,451 UART: [state] Locking ICCM
2,881,119 UART: [exit] Launching FMC @ 0x40000130
2,886,448 UART:
2,886,464 UART: Running Caliptra FMC ...
2,886,872 UART:
2,886,926 UART: [state] CFI Enabled
2,897,915 UART: [fht] FMC Alias Private Key: 7
3,005,990 UART: [art] Extend RT PCRs Done
3,006,418 UART: [art] Lock RT PCRs Done
3,008,022 UART: [art] Populate DV Done
3,016,136 UART: [fht] FMC Alias Private Key: 7
3,017,232 UART: [art] Derive CDI
3,017,512 UART: [art] Store in in slot 0x4
3,103,463 UART: [art] Derive Key Pair
3,103,823 UART: [art] Store priv key in slot 0x5
3,116,553 UART: [art] Derive Key Pair - Done
3,131,455 UART: [art] Signing Cert with AUTHO
3,131,935 UART: RITY.KEYID = 7
3,147,349 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,114 UART: [art] PUB.X = 605B2651DC03B32955C184F975F9F5016786758488CD6A43434137CEE404C0EBD6B068AB1B75E7527E78341047DC8773
3,154,865 UART: [art] PUB.Y = 35236D4E5B04C47A023243AFAE9E3A821562783B275225336801234CF040E68DDE70CCAD5137C5B44EC2653558632869
3,161,796 UART: [art] SIG.R = 03F662BDCA5DCAED4B4B718DAEB6EC421256B701D4F9FB5B40A7B572A55BBCBF88A8CE6824D6CD555A4883A21D824C25
3,168,582 UART: [art] SIG.S = 14E3FCE148780BCB78AA931EF9F22831F4B528146881C899A0D74D783FFEA2EA22EE9F5A1F386677B1E6DF80C8327899
3,192,094 UART: Caliptra RT
3,192,347 UART: [state] CFI Enabled
3,300,419 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,175 UART:
3,301,191 UART: Running Caliptra ROM ...
3,301,599 UART:
3,301,654 UART: [state] CFI Enabled
3,304,403 UART: [state] LifecycleState = Production
3,305,011 UART: [state] DebugLocked = Yes
3,305,535 UART: [state] Starting the WD Timer 40000000 cycles
3,307,164 UART: [kat] SHA2-256
4,110,714 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,843 UART: [kat] ++
4,114,995 UART: [kat] sha1
4,119,267 UART: [kat] SHA2-256
4,121,207 UART: [kat] SHA2-384
4,123,910 UART: [kat] SHA2-512-ACC
4,125,811 UART: [kat] ECC-384
4,135,328 UART: [kat] HMAC-384Kdf
4,140,040 UART: [kat] LMS
4,388,352 UART: [kat] --
4,389,256 UART: [warm-reset] ++
4,390,007 UART: [warm-reset] --
4,390,838 UART: [state] Locking Datavault
4,391,710 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,314 UART: [state] Locking ICCM
4,392,828 UART: [exit] Launching FMC @ 0x40000130
4,398,157 UART:
4,398,173 UART: Running Caliptra FMC ...
4,398,581 UART:
4,398,635 UART: [state] CFI Enabled
4,399,854 UART: [aliasrt :skip pcr extension
4,400,327 UART: [art] Extend RT PCRs Done
4,400,755 UART: [art] Lock RT PCRs Done
4,402,220 UART: [art] Populate DV Done
4,410,362 UART: [fht] FMC Alias Private Key: 7
4,411,384 UART: [art] Derive CDI
4,411,664 UART: [art] Store in in slot 0x4
4,497,741 UART: [art] Derive Key Pair
4,498,101 UART: [art] Store priv key in slot 0x5
4,511,449 UART: [art] Derive Key Pair - Done
4,526,357 UART: [art] Signing Cert with AUTHO
4,526,837 UART: RITY.KEYID = 7
4,541,739 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,504 UART: [art] PUB.X = 605B2651DC03B32955C184F975F9F5016786758488CD6A43434137CEE404C0EBD6B068AB1B75E7527E78341047DC8773
4,549,255 UART: [art] PUB.Y = 35236D4E5B04C47A023243AFAE9E3A821562783B275225336801234CF040E68DDE70CCAD5137C5B44EC2653558632869
4,556,186 UART: [art] SIG.R = 03F662BDCA5DCAED4B4B718DAEB6EC421256B701D4F9FB5B40A7B572A55BBCBF88A8CE6824D6CD555A4883A21D824C25
4,562,972 UART: [art] SIG.S = 14E3FCE148780BCB78AA931EF9F22831F4B528146881C899A0D74D783FFEA2EA22EE9F5A1F386677B1E6DF80C8327899
4,586,522 UART: Caliptra RT
4,586,775 UART: [state] CFI Enabled
4,870,031 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Production
86,273 UART: [state] DebugLocked = Yes
86,947 UART: [state] Starting the WD Timer 40000000 cycles
88,622 UART: [kat] SHA2-256
892,172 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,301 UART: [kat] ++
896,453 UART: [kat] sha1
900,463 UART: [kat] SHA2-256
902,403 UART: [kat] SHA2-384
905,126 UART: [kat] SHA2-512-ACC
907,027 UART: [kat] ECC-384
916,904 UART: [kat] HMAC-384Kdf
921,564 UART: [kat] LMS
1,169,876 UART: [kat] --
1,170,803 UART: [cold-reset] ++
1,171,196 UART: [fht] FHT @ 0x50003400
1,173,888 UART: [idev] ++
1,174,056 UART: [idev] CDI.KEYID = 6
1,174,417 UART: [idev] SUBJECT.KEYID = 7
1,174,842 UART: [idev] UDS.KEYID = 0
1,175,188 ready_for_fw is high
1,175,188 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,229 UART: [idev] Erasing UDS.KEYID = 0
1,200,360 UART: [idev] Sha1 KeyId Algorithm
1,209,235 UART: [idev] --
1,210,414 UART: [ldev] ++
1,210,582 UART: [ldev] CDI.KEYID = 6
1,210,946 UART: [ldev] SUBJECT.KEYID = 5
1,211,373 UART: [ldev] AUTHORITY.KEYID = 7
1,211,836 UART: [ldev] FE.KEYID = 1
1,217,236 UART: [ldev] Erasing FE.KEYID = 1
1,243,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,279 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,973 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,843 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,549 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,649 UART: [ldev] --
1,283,127 UART: [fwproc] Wait for Commands...
1,283,888 UART: [fwproc] Recv command 0x46574c44
1,284,621 UART: [fwproc] Recv'd Img size: 114332 bytes
2,608,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,274 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,583 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,799,462 >>> mbox cmd response: success
2,800,632 UART: [afmc] ++
2,800,800 UART: [afmc] CDI.KEYID = 6
2,801,163 UART: [afmc] SUBJECT.KEYID = 7
2,801,589 UART: [afmc] AUTHORITY.KEYID = 5
2,837,030 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,256 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,007 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,726 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,619 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,326 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,359 UART: [afmc] --
2,880,306 UART: [cold-reset] --
2,880,836 UART: [state] Locking Datavault
2,881,991 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,595 UART: [state] Locking ICCM
2,883,117 UART: [exit] Launching FMC @ 0x40000130
2,888,446 UART:
2,888,462 UART: Running Caliptra FMC ...
2,888,870 UART:
2,888,924 UART: [state] CFI Enabled
2,899,499 UART: [fht] FMC Alias Private Key: 7
3,007,652 UART: [art] Extend RT PCRs Done
3,008,080 UART: [art] Lock RT PCRs Done
3,009,130 UART: [art] Populate DV Done
3,017,536 UART: [fht] FMC Alias Private Key: 7
3,018,550 UART: [art] Derive CDI
3,018,830 UART: [art] Store in in slot 0x4
3,104,293 UART: [art] Derive Key Pair
3,104,653 UART: [art] Store priv key in slot 0x5
3,118,055 UART: [art] Derive Key Pair - Done
3,132,624 UART: [art] Signing Cert with AUTHO
3,133,104 UART: RITY.KEYID = 7
3,148,476 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,241 UART: [art] PUB.X = 60CB8B3A5835417A4458D52953F7B2B7315DAE666DD59F0406751D6F4B66642522FCA8AAC8DDAD3B8FE171E601A22F43
3,156,008 UART: [art] PUB.Y = 76449C1DF3CAE5F4775C2AB44146A732787807D3A4A6B5552650EE3BD6CF8FCBABAC10E95DA82798252E2EA5A0A90E79
3,162,964 UART: [art] SIG.R = A79031ECC3CDD0A87E19FCFF828458716E8A43B544A8514AD513C7B24F64A3F1A15929334738590BE7B3740B985BCBAB
3,169,734 UART: [art] SIG.S = 9D9527DB8FB1E890B8A732DFE335C241FEE9ECD2C02E3CF85E5A090E1F805F3A3F39E60EE7676F1E4A3E2DA2EB1CB517
3,193,462 UART: Caliptra RT
3,193,715 UART: [state] CFI Enabled
3,302,412 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,168 UART:
3,303,184 UART: Running Caliptra ROM ...
3,303,592 UART:
3,303,647 UART: [state] CFI Enabled
3,306,528 UART: [state] LifecycleState = Production
3,307,136 UART: [state] DebugLocked = Yes
3,307,840 UART: [state] Starting the WD Timer 40000000 cycles
3,309,437 UART: [kat] SHA2-256
4,112,987 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,116 UART: [kat] ++
4,117,268 UART: [kat] sha1
4,121,322 UART: [kat] SHA2-256
4,123,262 UART: [kat] SHA2-384
4,126,105 UART: [kat] SHA2-512-ACC
4,128,006 UART: [kat] ECC-384
4,137,593 UART: [kat] HMAC-384Kdf
4,142,239 UART: [kat] LMS
4,390,551 UART: [kat] --
4,391,457 UART: [warm-reset] ++
4,392,274 UART: [warm-reset] --
4,393,241 UART: [state] Locking Datavault
4,394,207 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,811 UART: [state] Locking ICCM
4,395,395 UART: [exit] Launching FMC @ 0x40000130
4,400,724 UART:
4,400,740 UART: Running Caliptra FMC ...
4,401,148 UART:
4,401,202 UART: [state] CFI Enabled
4,402,463 UART: [aliasrt :skip pcr extension
4,402,936 UART: [art] Extend RT PCRs Done
4,403,364 UART: [art] Lock RT PCRs Done
4,404,587 UART: [art] Populate DV Done
4,412,665 UART: [fht] FMC Alias Private Key: 7
4,413,621 UART: [art] Derive CDI
4,413,901 UART: [art] Store in in slot 0x4
4,499,486 UART: [art] Derive Key Pair
4,499,846 UART: [art] Store priv key in slot 0x5
4,513,354 UART: [art] Derive Key Pair - Done
4,527,919 UART: [art] Signing Cert with AUTHO
4,528,399 UART: RITY.KEYID = 7
4,543,733 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,498 UART: [art] PUB.X = 60CB8B3A5835417A4458D52953F7B2B7315DAE666DD59F0406751D6F4B66642522FCA8AAC8DDAD3B8FE171E601A22F43
4,551,265 UART: [art] PUB.Y = 76449C1DF3CAE5F4775C2AB44146A732787807D3A4A6B5552650EE3BD6CF8FCBABAC10E95DA82798252E2EA5A0A90E79
4,558,221 UART: [art] SIG.R = A79031ECC3CDD0A87E19FCFF828458716E8A43B544A8514AD513C7B24F64A3F1A15929334738590BE7B3740B985BCBAB
4,564,991 UART: [art] SIG.S = 9D9527DB8FB1E890B8A732DFE335C241FEE9ECD2C02E3CF85E5A090E1F805F3A3F39E60EE7676F1E4A3E2DA2EB1CB517
4,588,573 UART: Caliptra RT
4,588,826 UART: [state] CFI Enabled
4,870,119 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Production
85,784 UART: [state] DebugLocked = Yes
86,388 UART: [state] Starting the WD Timer 40000000 cycles
87,977 UART: [kat] SHA2-256
891,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,656 UART: [kat] ++
895,808 UART: [kat] sha1
899,878 UART: [kat] SHA2-256
901,818 UART: [kat] SHA2-384
904,545 UART: [kat] SHA2-512-ACC
906,446 UART: [kat] ECC-384
916,537 UART: [kat] HMAC-384Kdf
921,207 UART: [kat] LMS
1,169,519 UART: [kat] --
1,170,012 UART: [cold-reset] ++
1,170,561 UART: [fht] FHT @ 0x50003400
1,173,309 UART: [idev] ++
1,173,477 UART: [idev] CDI.KEYID = 6
1,173,838 UART: [idev] SUBJECT.KEYID = 7
1,174,263 UART: [idev] UDS.KEYID = 0
1,174,609 ready_for_fw is high
1,174,609 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,266 UART: [idev] Erasing UDS.KEYID = 0
1,199,901 UART: [idev] Sha1 KeyId Algorithm
1,208,846 UART: [idev] --
1,209,969 UART: [ldev] ++
1,210,137 UART: [ldev] CDI.KEYID = 6
1,210,501 UART: [ldev] SUBJECT.KEYID = 5
1,210,928 UART: [ldev] AUTHORITY.KEYID = 7
1,211,391 UART: [ldev] FE.KEYID = 1
1,216,569 UART: [ldev] Erasing FE.KEYID = 1
1,242,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,374 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,068 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,938 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,644 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,654 UART: [ldev] --
1,282,122 UART: [fwproc] Wait for Commands...
1,282,903 UART: [fwproc] Recv command 0x46574c44
1,283,636 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,157 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,466 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,409 >>> mbox cmd response: success
2,799,489 UART: [afmc] ++
2,799,657 UART: [afmc] CDI.KEYID = 6
2,800,020 UART: [afmc] SUBJECT.KEYID = 7
2,800,446 UART: [afmc] AUTHORITY.KEYID = 5
2,836,687 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,265 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,016 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,735 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,628 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,335 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,200 UART: [afmc] --
2,880,151 UART: [cold-reset] --
2,880,767 UART: [state] Locking Datavault
2,881,976 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,580 UART: [state] Locking ICCM
2,883,166 UART: [exit] Launching FMC @ 0x40000130
2,888,495 UART:
2,888,511 UART: Running Caliptra FMC ...
2,888,919 UART:
2,889,062 UART: [state] CFI Enabled
2,899,903 UART: [fht] FMC Alias Private Key: 7
3,007,640 UART: [art] Extend RT PCRs Done
3,008,068 UART: [art] Lock RT PCRs Done
3,009,920 UART: [art] Populate DV Done
3,018,178 UART: [fht] FMC Alias Private Key: 7
3,019,254 UART: [art] Derive CDI
3,019,534 UART: [art] Store in in slot 0x4
3,104,917 UART: [art] Derive Key Pair
3,105,277 UART: [art] Store priv key in slot 0x5
3,118,117 UART: [art] Derive Key Pair - Done
3,133,401 UART: [art] Signing Cert with AUTHO
3,133,881 UART: RITY.KEYID = 7
3,149,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,058 UART: [art] PUB.X = 6BF6BF92FB92CFA4FEB81747C94A78A15E6B289E110F8EE0B0DF2F28F7C3FE8E9587F9052862C726C2EC76501468F6CD
3,156,836 UART: [art] PUB.Y = 12F8CBC31794202B50545AAF9E7F183D12C6B2A115A8DC6650AB329202563CE7BF78EE909BEACB9B6EE7ABFD7EED7DE0
3,163,805 UART: [art] SIG.R = 0C693B42E3C98263651817BA915AE014AEABA8F4C5B8AFD72C249EE394EF87A04ED0675FEDF54D47095BC476BE4BB21A
3,170,585 UART: [art] SIG.S = 1013A81E58642CEAE7532AC6BA5804A7AE4849A9D7E0E47E9A2A7EF79F2E847E2BD32EEE3F34D9D50F8A37B9B4A18B50
3,194,400 UART: Caliptra RT
3,194,745 UART: [state] CFI Enabled
3,302,615 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,371 UART:
3,303,387 UART: Running Caliptra ROM ...
3,303,795 UART:
3,303,937 UART: [state] CFI Enabled
3,306,824 UART: [state] LifecycleState = Production
3,307,432 UART: [state] DebugLocked = Yes
3,308,164 UART: [state] Starting the WD Timer 40000000 cycles
3,309,871 UART: [kat] SHA2-256
4,113,421 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,550 UART: [kat] ++
4,117,702 UART: [kat] sha1
4,121,770 UART: [kat] SHA2-256
4,123,710 UART: [kat] SHA2-384
4,126,645 UART: [kat] SHA2-512-ACC
4,128,546 UART: [kat] ECC-384
4,138,279 UART: [kat] HMAC-384Kdf
4,142,969 UART: [kat] LMS
4,391,281 UART: [kat] --
4,392,213 UART: [warm-reset] ++
4,393,198 UART: [warm-reset] --
4,393,811 UART: [state] Locking Datavault
4,394,647 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,251 UART: [state] Locking ICCM
4,395,769 UART: [exit] Launching FMC @ 0x40000130
4,401,098 UART:
4,401,114 UART: Running Caliptra FMC ...
4,401,522 UART:
4,401,665 UART: [state] CFI Enabled
4,402,814 UART: [aliasrt :skip pcr extension
4,403,287 UART: [art] Extend RT PCRs Done
4,403,715 UART: [art] Lock RT PCRs Done
4,405,106 UART: [art] Populate DV Done
4,413,314 UART: [fht] FMC Alias Private Key: 7
4,414,456 UART: [art] Derive CDI
4,414,736 UART: [art] Store in in slot 0x4
4,500,267 UART: [art] Derive Key Pair
4,500,627 UART: [art] Store priv key in slot 0x5
4,514,227 UART: [art] Derive Key Pair - Done
4,529,337 UART: [art] Signing Cert with AUTHO
4,529,817 UART: RITY.KEYID = 7
4,545,211 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,976 UART: [art] PUB.X = 6BF6BF92FB92CFA4FEB81747C94A78A15E6B289E110F8EE0B0DF2F28F7C3FE8E9587F9052862C726C2EC76501468F6CD
4,552,754 UART: [art] PUB.Y = 12F8CBC31794202B50545AAF9E7F183D12C6B2A115A8DC6650AB329202563CE7BF78EE909BEACB9B6EE7ABFD7EED7DE0
4,559,723 UART: [art] SIG.R = 0C693B42E3C98263651817BA915AE014AEABA8F4C5B8AFD72C249EE394EF87A04ED0675FEDF54D47095BC476BE4BB21A
4,566,503 UART: [art] SIG.S = 1013A81E58642CEAE7532AC6BA5804A7AE4849A9D7E0E47E9A2A7EF79F2E847E2BD32EEE3F34D9D50F8A37B9B4A18B50
4,590,694 UART: Caliptra RT
4,591,039 UART: [state] CFI Enabled
4,873,941 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Production
85,850 UART: [state] DebugLocked = Yes
86,546 UART: [state] Starting the WD Timer 40000000 cycles
88,149 UART: [kat] SHA2-256
891,699 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,828 UART: [kat] ++
895,980 UART: [kat] sha1
900,074 UART: [kat] SHA2-256
902,014 UART: [kat] SHA2-384
904,805 UART: [kat] SHA2-512-ACC
906,706 UART: [kat] ECC-384
916,715 UART: [kat] HMAC-384Kdf
921,167 UART: [kat] LMS
1,169,479 UART: [kat] --
1,170,492 UART: [cold-reset] ++
1,170,873 UART: [fht] FHT @ 0x50003400
1,173,391 UART: [idev] ++
1,173,559 UART: [idev] CDI.KEYID = 6
1,173,920 UART: [idev] SUBJECT.KEYID = 7
1,174,345 UART: [idev] UDS.KEYID = 0
1,174,691 ready_for_fw is high
1,174,691 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,612 UART: [idev] Erasing UDS.KEYID = 0
1,199,795 UART: [idev] Sha1 KeyId Algorithm
1,208,506 UART: [idev] --
1,209,351 UART: [ldev] ++
1,209,519 UART: [ldev] CDI.KEYID = 6
1,209,883 UART: [ldev] SUBJECT.KEYID = 5
1,210,310 UART: [ldev] AUTHORITY.KEYID = 7
1,210,773 UART: [ldev] FE.KEYID = 1
1,215,845 UART: [ldev] Erasing FE.KEYID = 1
1,242,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,792 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,486 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,356 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,062 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,142 UART: [ldev] --
1,281,404 UART: [fwproc] Wait for Commands...
1,282,081 UART: [fwproc] Recv command 0x46574c44
1,282,814 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,703 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,012 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,777 >>> mbox cmd response: success
2,798,855 UART: [afmc] ++
2,799,023 UART: [afmc] CDI.KEYID = 6
2,799,386 UART: [afmc] SUBJECT.KEYID = 7
2,799,812 UART: [afmc] AUTHORITY.KEYID = 5
2,834,977 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,376 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,095 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,988 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,695 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,330 UART: [afmc] --
2,878,355 UART: [cold-reset] --
2,879,101 UART: [state] Locking Datavault
2,880,244 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,848 UART: [state] Locking ICCM
2,881,366 UART: [exit] Launching FMC @ 0x40000130
2,886,695 UART:
2,886,711 UART: Running Caliptra FMC ...
2,887,119 UART:
2,887,262 UART: [state] CFI Enabled
2,897,827 UART: [fht] FMC Alias Private Key: 7
3,005,912 UART: [art] Extend RT PCRs Done
3,006,340 UART: [art] Lock RT PCRs Done
3,007,908 UART: [art] Populate DV Done
3,015,892 UART: [fht] FMC Alias Private Key: 7
3,016,920 UART: [art] Derive CDI
3,017,200 UART: [art] Store in in slot 0x4
3,102,949 UART: [art] Derive Key Pair
3,103,309 UART: [art] Store priv key in slot 0x5
3,116,421 UART: [art] Derive Key Pair - Done
3,131,198 UART: [art] Signing Cert with AUTHO
3,131,678 UART: RITY.KEYID = 7
3,146,974 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,739 UART: [art] PUB.X = 523FF56DAB241376E62857BF63E2974D9596EEB32040040442F953EE83ED624AD85AB889A295F93628E28A7AE4509709
3,154,494 UART: [art] PUB.Y = A70719E4C3F72F513DFD41A512E197BE68DECE1439BD315D881E75A50261B7F1610D95E60B5D2C0F41155CB1220E0BF5
3,161,429 UART: [art] SIG.R = E895979D746DCD7D0A042E5F66274EF299D65948637D5C3E13225EDEA46BC21ED5042CFA682938C07B76B0434E179A93
3,168,190 UART: [art] SIG.S = AE85E97ED486CA66E9DA97D5B5A3AF15D296512F8B436D7AE679FCEB60F229E22651AB03A6F91D7762E9E64895814312
3,191,916 UART: Caliptra RT
3,192,261 UART: [state] CFI Enabled
3,300,280 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,036 UART:
3,301,052 UART: Running Caliptra ROM ...
3,301,460 UART:
3,301,602 UART: [state] CFI Enabled
3,304,923 UART: [state] LifecycleState = Production
3,305,531 UART: [state] DebugLocked = Yes
3,306,197 UART: [state] Starting the WD Timer 40000000 cycles
3,307,882 UART: [kat] SHA2-256
4,111,432 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,561 UART: [kat] ++
4,115,713 UART: [kat] sha1
4,120,005 UART: [kat] SHA2-256
4,121,945 UART: [kat] SHA2-384
4,124,802 UART: [kat] SHA2-512-ACC
4,126,703 UART: [kat] ECC-384
4,136,698 UART: [kat] HMAC-384Kdf
4,141,378 UART: [kat] LMS
4,389,690 UART: [kat] --
4,390,350 UART: [warm-reset] ++
4,391,139 UART: [warm-reset] --
4,391,816 UART: [state] Locking Datavault
4,392,694 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,298 UART: [state] Locking ICCM
4,393,872 UART: [exit] Launching FMC @ 0x40000130
4,399,201 UART:
4,399,217 UART: Running Caliptra FMC ...
4,399,625 UART:
4,399,768 UART: [state] CFI Enabled
4,401,265 UART: [aliasrt :skip pcr extension
4,401,738 UART: [art] Extend RT PCRs Done
4,402,166 UART: [art] Lock RT PCRs Done
4,403,439 UART: [art] Populate DV Done
4,411,645 UART: [fht] FMC Alias Private Key: 7
4,412,643 UART: [art] Derive CDI
4,412,923 UART: [art] Store in in slot 0x4
4,498,548 UART: [art] Derive Key Pair
4,498,908 UART: [art] Store priv key in slot 0x5
4,512,518 UART: [art] Derive Key Pair - Done
4,527,487 UART: [art] Signing Cert with AUTHO
4,527,967 UART: RITY.KEYID = 7
4,543,397 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,162 UART: [art] PUB.X = 523FF56DAB241376E62857BF63E2974D9596EEB32040040442F953EE83ED624AD85AB889A295F93628E28A7AE4509709
4,550,917 UART: [art] PUB.Y = A70719E4C3F72F513DFD41A512E197BE68DECE1439BD315D881E75A50261B7F1610D95E60B5D2C0F41155CB1220E0BF5
4,557,852 UART: [art] SIG.R = E895979D746DCD7D0A042E5F66274EF299D65948637D5C3E13225EDEA46BC21ED5042CFA682938C07B76B0434E179A93
4,564,613 UART: [art] SIG.S = AE85E97ED486CA66E9DA97D5B5A3AF15D296512F8B436D7AE679FCEB60F229E22651AB03A6F91D7762E9E64895814312
4,589,039 UART: Caliptra RT
4,589,384 UART: [state] CFI Enabled
4,870,167 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,963 UART: [state] LifecycleState = Production
85,571 UART: [state] DebugLocked = Yes
86,223 UART: [state] Starting the WD Timer 40000000 cycles
87,928 UART: [kat] SHA2-256
891,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,607 UART: [kat] ++
895,759 UART: [kat] sha1
900,069 UART: [kat] SHA2-256
902,009 UART: [kat] SHA2-384
904,544 UART: [kat] SHA2-512-ACC
906,445 UART: [kat] ECC-384
916,460 UART: [kat] HMAC-384Kdf
921,088 UART: [kat] LMS
1,169,400 UART: [kat] --
1,170,137 UART: [cold-reset] ++
1,170,542 UART: [fht] FHT @ 0x50003400
1,173,112 UART: [idev] ++
1,173,280 UART: [idev] CDI.KEYID = 6
1,173,641 UART: [idev] SUBJECT.KEYID = 7
1,174,066 UART: [idev] UDS.KEYID = 0
1,174,412 ready_for_fw is high
1,174,412 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,299 UART: [idev] Erasing UDS.KEYID = 0
1,199,350 UART: [idev] Sha1 KeyId Algorithm
1,208,093 UART: [idev] --
1,209,154 UART: [ldev] ++
1,209,322 UART: [ldev] CDI.KEYID = 6
1,209,686 UART: [ldev] SUBJECT.KEYID = 5
1,210,113 UART: [ldev] AUTHORITY.KEYID = 7
1,210,576 UART: [ldev] FE.KEYID = 1
1,215,892 UART: [ldev] Erasing FE.KEYID = 1
1,241,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,227 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,921 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,791 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,497 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,587 UART: [ldev] --
1,280,867 UART: [fwproc] Wait for Commands...
1,281,636 UART: [fwproc] Recv command 0x46574c44
1,282,369 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,186 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,495 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,796,380 >>> mbox cmd response: success
2,797,404 UART: [afmc] ++
2,797,572 UART: [afmc] CDI.KEYID = 6
2,797,935 UART: [afmc] SUBJECT.KEYID = 7
2,798,361 UART: [afmc] AUTHORITY.KEYID = 5
2,833,654 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,066 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,817 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,536 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,429 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,136 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,941 UART: [afmc] --
2,876,868 UART: [cold-reset] --
2,877,762 UART: [state] Locking Datavault
2,878,959 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,563 UART: [state] Locking ICCM
2,880,063 UART: [exit] Launching FMC @ 0x40000130
2,885,392 UART:
2,885,408 UART: Running Caliptra FMC ...
2,885,816 UART:
2,885,870 UART: [state] CFI Enabled
2,896,453 UART: [fht] FMC Alias Private Key: 7
3,004,406 UART: [art] Extend RT PCRs Done
3,004,834 UART: [art] Lock RT PCRs Done
3,006,334 UART: [art] Populate DV Done
3,014,650 UART: [fht] FMC Alias Private Key: 7
3,015,808 UART: [art] Derive CDI
3,016,088 UART: [art] Store in in slot 0x4
3,101,757 UART: [art] Derive Key Pair
3,102,117 UART: [art] Store priv key in slot 0x5
3,114,851 UART: [art] Derive Key Pair - Done
3,129,370 UART: [art] Signing Cert with AUTHO
3,129,850 UART: RITY.KEYID = 7
3,145,094 UART: [art] Erasing AUTHORITY.KEYID = 7
3,145,859 UART: [art] PUB.X = B5030FC3F8BEEA739151E5048FF801FCBEF9AA307B7CD4FDD7F51024001F6BD5645124ACD310BAA624611292C4DA8F79
3,152,609 UART: [art] PUB.Y = 6E7A85E2968BF849AFBD7DEF65EF66C1BD5AC529CF16C0BC4479F51C54C8E29312EA8C096DD0156822C0C89A4E84008A
3,159,548 UART: [art] SIG.R = 4742AD98B8E1D0FD74A3892DB2F94059147808C05E441480F5F2A8FCAE0FF955B87CCF66D590E2747C9BCFA5515DC54C
3,166,322 UART: [art] SIG.S = A5AA350C26A71FA4D17F0CB9F336BC6AAF6D23FDD1E599682577525016CD4E9F7D37E8E0649BD21BDDD8CE18AB2A95B1
3,189,185 UART: Caliptra RT
3,189,438 UART: [state] CFI Enabled
3,296,933 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,297,689 UART:
3,297,705 UART: Running Caliptra ROM ...
3,298,113 UART:
3,298,168 UART: [state] CFI Enabled
3,300,461 UART: [state] LifecycleState = Production
3,301,069 UART: [state] DebugLocked = Yes
3,301,657 UART: [state] Starting the WD Timer 40000000 cycles
3,303,158 UART: [kat] SHA2-256
4,106,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,110,837 UART: [kat] ++
4,110,989 UART: [kat] sha1
4,115,341 UART: [kat] SHA2-256
4,117,281 UART: [kat] SHA2-384
4,119,996 UART: [kat] SHA2-512-ACC
4,121,897 UART: [kat] ECC-384
4,131,768 UART: [kat] HMAC-384Kdf
4,136,448 UART: [kat] LMS
4,384,760 UART: [kat] --
4,385,576 UART: [warm-reset] ++
4,386,589 UART: [warm-reset] --
4,387,570 UART: [state] Locking Datavault
4,388,498 UART: [state] Locking PCR0, PCR1 and PCR31
4,389,102 UART: [state] Locking ICCM
4,389,566 UART: [exit] Launching FMC @ 0x40000130
4,394,895 UART:
4,394,911 UART: Running Caliptra FMC ...
4,395,319 UART:
4,395,373 UART: [state] CFI Enabled
4,396,752 UART: [aliasrt :skip pcr extension
4,397,225 UART: [art] Extend RT PCRs Done
4,397,653 UART: [art] Lock RT PCRs Done
4,398,762 UART: [art] Populate DV Done
4,406,986 UART: [fht] FMC Alias Private Key: 7
4,408,058 UART: [art] Derive CDI
4,408,338 UART: [art] Store in in slot 0x4
4,493,697 UART: [art] Derive Key Pair
4,494,057 UART: [art] Store priv key in slot 0x5
4,507,531 UART: [art] Derive Key Pair - Done
4,522,066 UART: [art] Signing Cert with AUTHO
4,522,546 UART: RITY.KEYID = 7
4,537,870 UART: [art] Erasing AUTHORITY.KEYID = 7
4,538,635 UART: [art] PUB.X = B5030FC3F8BEEA739151E5048FF801FCBEF9AA307B7CD4FDD7F51024001F6BD5645124ACD310BAA624611292C4DA8F79
4,545,385 UART: [art] PUB.Y = 6E7A85E2968BF849AFBD7DEF65EF66C1BD5AC529CF16C0BC4479F51C54C8E29312EA8C096DD0156822C0C89A4E84008A
4,552,324 UART: [art] SIG.R = 4742AD98B8E1D0FD74A3892DB2F94059147808C05E441480F5F2A8FCAE0FF955B87CCF66D590E2747C9BCFA5515DC54C
4,559,098 UART: [art] SIG.S = A5AA350C26A71FA4D17F0CB9F336BC6AAF6D23FDD1E599682577525016CD4E9F7D37E8E0649BD21BDDD8CE18AB2A95B1
4,582,801 UART: Caliptra RT
4,583,054 UART: [state] CFI Enabled
4,866,053 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,987 UART: [state] LifecycleState = Production
85,595 UART: [state] DebugLocked = Yes
86,241 UART: [state] Starting the WD Timer 40000000 cycles
87,806 UART: [kat] SHA2-256
891,356 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,485 UART: [kat] ++
895,637 UART: [kat] sha1
900,001 UART: [kat] SHA2-256
901,941 UART: [kat] SHA2-384
904,706 UART: [kat] SHA2-512-ACC
906,607 UART: [kat] ECC-384
916,180 UART: [kat] HMAC-384Kdf
920,698 UART: [kat] LMS
1,169,010 UART: [kat] --
1,170,019 UART: [cold-reset] ++
1,170,374 UART: [fht] FHT @ 0x50003400
1,173,128 UART: [idev] ++
1,173,296 UART: [idev] CDI.KEYID = 6
1,173,657 UART: [idev] SUBJECT.KEYID = 7
1,174,082 UART: [idev] UDS.KEYID = 0
1,174,428 ready_for_fw is high
1,174,428 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,771 UART: [idev] Erasing UDS.KEYID = 0
1,198,890 UART: [idev] Sha1 KeyId Algorithm
1,207,529 UART: [idev] --
1,208,544 UART: [ldev] ++
1,208,712 UART: [ldev] CDI.KEYID = 6
1,209,076 UART: [ldev] SUBJECT.KEYID = 5
1,209,503 UART: [ldev] AUTHORITY.KEYID = 7
1,209,966 UART: [ldev] FE.KEYID = 1
1,215,176 UART: [ldev] Erasing FE.KEYID = 1
1,241,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,629 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,323 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,193 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,899 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,911 UART: [ldev] --
1,281,335 UART: [fwproc] Wait for Commands...
1,281,982 UART: [fwproc] Recv command 0x46574c44
1,282,715 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,168 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,477 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,230 >>> mbox cmd response: success
2,798,302 UART: [afmc] ++
2,798,470 UART: [afmc] CDI.KEYID = 6
2,798,833 UART: [afmc] SUBJECT.KEYID = 7
2,799,259 UART: [afmc] AUTHORITY.KEYID = 5
2,834,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,784 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,535 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,254 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,147 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,854 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,527 UART: [afmc] --
2,877,512 UART: [cold-reset] --
2,878,344 UART: [state] Locking Datavault
2,879,695 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,299 UART: [state] Locking ICCM
2,880,741 UART: [exit] Launching FMC @ 0x40000130
2,886,070 UART:
2,886,086 UART: Running Caliptra FMC ...
2,886,494 UART:
2,886,548 UART: [state] CFI Enabled
2,897,179 UART: [fht] FMC Alias Private Key: 7
3,004,898 UART: [art] Extend RT PCRs Done
3,005,326 UART: [art] Lock RT PCRs Done
3,007,144 UART: [art] Populate DV Done
3,015,134 UART: [fht] FMC Alias Private Key: 7
3,016,104 UART: [art] Derive CDI
3,016,384 UART: [art] Store in in slot 0x4
3,102,109 UART: [art] Derive Key Pair
3,102,469 UART: [art] Store priv key in slot 0x5
3,115,761 UART: [art] Derive Key Pair - Done
3,130,362 UART: [art] Signing Cert with AUTHO
3,130,842 UART: RITY.KEYID = 7
3,146,314 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,079 UART: [art] PUB.X = E74D8C4FBCD1E9BFCA7FDA54A81A1F95BB8C8DB31079E9BB67F5502127505CDD79A4237AAA31066788AD7B5B55373B6C
3,153,864 UART: [art] PUB.Y = 71804B8CAA7CFF38BC42DA23CBBFB5A0996C4A3EC204F45A6D5C9FBC603FA4A5ABC366CF43DF3D4999965DF0D80ADF51
3,160,836 UART: [art] SIG.R = C70F2886E497E0F6FF29150A70295C8F29C81E2803E25C3CD7D7D78EB71FB0F70E7810619CA19989DCB10005890A4BD9
3,167,568 UART: [art] SIG.S = 3741A1A77F8D7862563B76B804BC9221D47F48B1E806432E6AC3F1B7BF7E1BBB82899C92C07A41D8F9E47DDAFC7AEEDC
3,191,529 UART: Caliptra RT
3,191,782 UART: [state] CFI Enabled
3,299,355 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,111 UART:
3,300,127 UART: Running Caliptra ROM ...
3,300,535 UART:
3,300,590 UART: [state] CFI Enabled
3,302,839 UART: [state] LifecycleState = Production
3,303,447 UART: [state] DebugLocked = Yes
3,304,059 UART: [state] Starting the WD Timer 40000000 cycles
3,305,668 UART: [kat] SHA2-256
4,109,218 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,347 UART: [kat] ++
4,113,499 UART: [kat] sha1
4,117,643 UART: [kat] SHA2-256
4,119,583 UART: [kat] SHA2-384
4,122,470 UART: [kat] SHA2-512-ACC
4,124,371 UART: [kat] ECC-384
4,134,366 UART: [kat] HMAC-384Kdf
4,139,022 UART: [kat] LMS
4,387,334 UART: [kat] --
4,388,262 UART: [warm-reset] ++
4,389,225 UART: [warm-reset] --
4,389,978 UART: [state] Locking Datavault
4,390,814 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,418 UART: [state] Locking ICCM
4,391,864 UART: [exit] Launching FMC @ 0x40000130
4,397,193 UART:
4,397,209 UART: Running Caliptra FMC ...
4,397,617 UART:
4,397,671 UART: [state] CFI Enabled
4,398,826 UART: [aliasrt :skip pcr extension
4,399,299 UART: [art] Extend RT PCRs Done
4,399,727 UART: [art] Lock RT PCRs Done
4,400,704 UART: [art] Populate DV Done
4,408,818 UART: [fht] FMC Alias Private Key: 7
4,409,932 UART: [art] Derive CDI
4,410,212 UART: [art] Store in in slot 0x4
4,496,177 UART: [art] Derive Key Pair
4,496,537 UART: [art] Store priv key in slot 0x5
4,509,533 UART: [art] Derive Key Pair - Done
4,523,940 UART: [art] Signing Cert with AUTHO
4,524,420 UART: RITY.KEYID = 7
4,539,890 UART: [art] Erasing AUTHORITY.KEYID = 7
4,540,655 UART: [art] PUB.X = E74D8C4FBCD1E9BFCA7FDA54A81A1F95BB8C8DB31079E9BB67F5502127505CDD79A4237AAA31066788AD7B5B55373B6C
4,547,440 UART: [art] PUB.Y = 71804B8CAA7CFF38BC42DA23CBBFB5A0996C4A3EC204F45A6D5C9FBC603FA4A5ABC366CF43DF3D4999965DF0D80ADF51
4,554,412 UART: [art] SIG.R = C70F2886E497E0F6FF29150A70295C8F29C81E2803E25C3CD7D7D78EB71FB0F70E7810619CA19989DCB10005890A4BD9
4,561,144 UART: [art] SIG.S = 3741A1A77F8D7862563B76B804BC9221D47F48B1E806432E6AC3F1B7BF7E1BBB82899C92C07A41D8F9E47DDAFC7AEEDC
4,584,883 UART: Caliptra RT
4,585,136 UART: [state] CFI Enabled
4,865,249 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Production
85,744 UART: [state] DebugLocked = Yes
86,362 UART: [state] Starting the WD Timer 40000000 cycles
88,039 UART: [kat] SHA2-256
891,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,718 UART: [kat] ++
895,870 UART: [kat] sha1
899,976 UART: [kat] SHA2-256
901,916 UART: [kat] SHA2-384
904,713 UART: [kat] SHA2-512-ACC
906,614 UART: [kat] ECC-384
916,019 UART: [kat] HMAC-384Kdf
920,751 UART: [kat] LMS
1,169,063 UART: [kat] --
1,169,978 UART: [cold-reset] ++
1,170,479 UART: [fht] FHT @ 0x50003400
1,173,255 UART: [idev] ++
1,173,423 UART: [idev] CDI.KEYID = 6
1,173,784 UART: [idev] SUBJECT.KEYID = 7
1,174,209 UART: [idev] UDS.KEYID = 0
1,174,555 ready_for_fw is high
1,174,555 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,146 UART: [idev] Erasing UDS.KEYID = 0
1,199,257 UART: [idev] Sha1 KeyId Algorithm
1,208,370 UART: [idev] --
1,209,323 UART: [ldev] ++
1,209,491 UART: [ldev] CDI.KEYID = 6
1,209,855 UART: [ldev] SUBJECT.KEYID = 5
1,210,282 UART: [ldev] AUTHORITY.KEYID = 7
1,210,745 UART: [ldev] FE.KEYID = 1
1,215,959 UART: [ldev] Erasing FE.KEYID = 1
1,242,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,432 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,126 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,996 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,702 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,664 UART: [ldev] --
1,281,010 UART: [fwproc] Wait for Commands...
1,281,659 UART: [fwproc] Recv command 0x46574c44
1,282,392 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,000 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,603 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,912 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,803 >>> mbox cmd response: success
2,798,839 UART: [afmc] ++
2,799,007 UART: [afmc] CDI.KEYID = 6
2,799,370 UART: [afmc] SUBJECT.KEYID = 7
2,799,796 UART: [afmc] AUTHORITY.KEYID = 5
2,835,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,221 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,972 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,691 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,584 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,291 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,996 UART: [afmc] --
2,878,973 UART: [cold-reset] --
2,879,815 UART: [state] Locking Datavault
2,880,980 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,584 UART: [state] Locking ICCM
2,882,034 UART: [exit] Launching FMC @ 0x40000130
2,887,363 UART:
2,887,379 UART: Running Caliptra FMC ...
2,887,787 UART:
2,887,930 UART: [state] CFI Enabled
2,898,337 UART: [fht] FMC Alias Private Key: 7
3,006,496 UART: [art] Extend RT PCRs Done
3,006,924 UART: [art] Lock RT PCRs Done
3,008,312 UART: [art] Populate DV Done
3,016,688 UART: [fht] FMC Alias Private Key: 7
3,017,658 UART: [art] Derive CDI
3,017,938 UART: [art] Store in in slot 0x4
3,104,063 UART: [art] Derive Key Pair
3,104,423 UART: [art] Store priv key in slot 0x5
3,118,193 UART: [art] Derive Key Pair - Done
3,132,967 UART: [art] Signing Cert with AUTHO
3,133,447 UART: RITY.KEYID = 7
3,148,413 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,178 UART: [art] PUB.X = D78AF7A5ABCAE68A1D4DD4B101E4609CABE0B49A6EC8D08D3F02699AC84E1D105703FAE055A04D1BC1956FB0B1CB486D
3,155,963 UART: [art] PUB.Y = 17229A8F662D43713881DFFADB55439358B69DB90D46016952AFE72DC8917355D56A9D2F0EDE20BFC40A8DE57EDBDACE
3,162,915 UART: [art] SIG.R = 1326B4CDEE922D8F8FAED8D7941374BDAB655DEA5DA6695E2F4B156FC5D88D2C0F7DF18AF3C0060E04F34133DD9EED9C
3,169,697 UART: [art] SIG.S = CA4C03A49D8CF9FE1781ECF9DDCCDFE8DB857EBFFCB8BEF233E25A0BBAA5E6A979709FCEB746C3544A6CEAF60DBFA197
3,193,697 UART: Caliptra RT
3,194,042 UART: [state] CFI Enabled
3,301,859 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,615 UART:
3,302,631 UART: Running Caliptra ROM ...
3,303,039 UART:
3,303,181 UART: [state] CFI Enabled
3,306,024 UART: [state] LifecycleState = Production
3,306,632 UART: [state] DebugLocked = Yes
3,307,380 UART: [state] Starting the WD Timer 40000000 cycles
3,309,019 UART: [kat] SHA2-256
4,112,569 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,698 UART: [kat] ++
4,116,850 UART: [kat] sha1
4,121,148 UART: [kat] SHA2-256
4,123,088 UART: [kat] SHA2-384
4,125,809 UART: [kat] SHA2-512-ACC
4,127,710 UART: [kat] ECC-384
4,137,257 UART: [kat] HMAC-384Kdf
4,142,075 UART: [kat] LMS
4,390,387 UART: [kat] --
4,391,225 UART: [warm-reset] ++
4,392,068 UART: [warm-reset] --
4,392,903 UART: [state] Locking Datavault
4,393,877 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,481 UART: [state] Locking ICCM
4,394,909 UART: [exit] Launching FMC @ 0x40000130
4,400,238 UART:
4,400,254 UART: Running Caliptra FMC ...
4,400,662 UART:
4,400,805 UART: [state] CFI Enabled
4,402,392 UART: [aliasrt :skip pcr extension
4,402,865 UART: [art] Extend RT PCRs Done
4,403,293 UART: [art] Lock RT PCRs Done
4,404,482 UART: [art] Populate DV Done
4,412,628 UART: [fht] FMC Alias Private Key: 7
4,413,678 UART: [art] Derive CDI
4,413,958 UART: [art] Store in in slot 0x4
4,499,367 UART: [art] Derive Key Pair
4,499,727 UART: [art] Store priv key in slot 0x5
4,512,679 UART: [art] Derive Key Pair - Done
4,527,603 UART: [art] Signing Cert with AUTHO
4,528,083 UART: RITY.KEYID = 7
4,543,711 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,476 UART: [art] PUB.X = D78AF7A5ABCAE68A1D4DD4B101E4609CABE0B49A6EC8D08D3F02699AC84E1D105703FAE055A04D1BC1956FB0B1CB486D
4,551,261 UART: [art] PUB.Y = 17229A8F662D43713881DFFADB55439358B69DB90D46016952AFE72DC8917355D56A9D2F0EDE20BFC40A8DE57EDBDACE
4,558,213 UART: [art] SIG.R = 1326B4CDEE922D8F8FAED8D7941374BDAB655DEA5DA6695E2F4B156FC5D88D2C0F7DF18AF3C0060E04F34133DD9EED9C
4,564,995 UART: [art] SIG.S = CA4C03A49D8CF9FE1781ECF9DDCCDFE8DB857EBFFCB8BEF233E25A0BBAA5E6A979709FCEB746C3544A6CEAF60DBFA197
4,588,877 UART: Caliptra RT
4,589,222 UART: [state] CFI Enabled
4,868,353 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,742 UART: [state] LifecycleState = Production
85,350 UART: [state] DebugLocked = Yes
86,018 UART: [state] Starting the WD Timer 40000000 cycles
87,537 UART: [kat] SHA2-256
891,087 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,216 UART: [kat] ++
895,368 UART: [kat] sha1
899,610 UART: [kat] SHA2-256
901,550 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
915,851 UART: [kat] HMAC-384Kdf
920,593 UART: [kat] LMS
1,168,905 UART: [kat] --
1,169,600 UART: [cold-reset] ++
1,170,171 UART: [fht] FHT @ 0x50003400
1,173,021 UART: [idev] ++
1,173,189 UART: [idev] CDI.KEYID = 6
1,173,550 UART: [idev] SUBJECT.KEYID = 7
1,173,975 UART: [idev] UDS.KEYID = 0
1,174,321 ready_for_fw is high
1,174,321 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,272 UART: [idev] Erasing UDS.KEYID = 0
1,199,475 UART: [idev] Sha1 KeyId Algorithm
1,208,224 UART: [idev] --
1,209,319 UART: [ldev] ++
1,209,487 UART: [ldev] CDI.KEYID = 6
1,209,851 UART: [ldev] SUBJECT.KEYID = 5
1,210,278 UART: [ldev] AUTHORITY.KEYID = 7
1,210,741 UART: [ldev] FE.KEYID = 1
1,216,197 UART: [ldev] Erasing FE.KEYID = 1
1,241,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,598 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,292 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,162 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,868 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,930 UART: [ldev] --
1,281,222 UART: [fwproc] Wait for Commands...
1,281,937 UART: [fwproc] Recv command 0x46574c44
1,282,670 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,808 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,331 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,640 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,437 >>> mbox cmd response: success
2,798,687 UART: [afmc] ++
2,798,855 UART: [afmc] CDI.KEYID = 6
2,799,218 UART: [afmc] SUBJECT.KEYID = 7
2,799,644 UART: [afmc] AUTHORITY.KEYID = 5
2,836,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,519 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,270 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,989 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,882 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,589 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,430 UART: [afmc] --
2,879,357 UART: [cold-reset] --
2,880,207 UART: [state] Locking Datavault
2,881,520 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,124 UART: [state] Locking ICCM
2,882,552 UART: [exit] Launching FMC @ 0x40000130
2,887,881 UART:
2,887,897 UART: Running Caliptra FMC ...
2,888,305 UART:
2,888,448 UART: [state] CFI Enabled
2,899,029 UART: [fht] FMC Alias Private Key: 7
3,007,412 UART: [art] Extend RT PCRs Done
3,007,840 UART: [art] Lock RT PCRs Done
3,009,314 UART: [art] Populate DV Done
3,017,838 UART: [fht] FMC Alias Private Key: 7
3,018,926 UART: [art] Derive CDI
3,019,206 UART: [art] Store in in slot 0x4
3,105,177 UART: [art] Derive Key Pair
3,105,537 UART: [art] Store priv key in slot 0x5
3,118,601 UART: [art] Derive Key Pair - Done
3,133,559 UART: [art] Signing Cert with AUTHO
3,134,039 UART: RITY.KEYID = 7
3,148,885 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,650 UART: [art] PUB.X = 5B75CCB1D8A3B26F592D99D420D7C04074EFC73881C5656FA8DBC63FAF7986B3BBC0FB267EC4E9696C7388C8E6277AB3
3,156,434 UART: [art] PUB.Y = 00A5B6093BCCD91D5CF34C3E6E3E23330A701369E34A9E48C795D0F723EF57C5EE67B26A8389B3BC1873D83BB31272C6
3,163,362 UART: [art] SIG.R = 444A3EE72F1B0ED9ACB4E22C9CD8A2B485C4AB7C247F9960C403EC81F5486C963CDCD11550460096A1C8154AA83E6499
3,170,112 UART: [art] SIG.S = 4AAB701F0DBA2DA653054164D2BCC7DFC2FD1AD992F1C8BCF9214E7D3695B2526BC1C03FBF1087BA91DF20D9ADEE9397
3,193,887 UART: Caliptra RT
3,194,232 UART: [state] CFI Enabled
3,302,814 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,570 UART:
3,303,586 UART: Running Caliptra ROM ...
3,303,994 UART:
3,304,136 UART: [state] CFI Enabled
3,307,435 UART: [state] LifecycleState = Production
3,308,043 UART: [state] DebugLocked = Yes
3,308,725 UART: [state] Starting the WD Timer 40000000 cycles
3,310,192 UART: [kat] SHA2-256
4,113,742 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,871 UART: [kat] ++
4,118,023 UART: [kat] sha1
4,122,339 UART: [kat] SHA2-256
4,124,279 UART: [kat] SHA2-384
4,127,098 UART: [kat] SHA2-512-ACC
4,128,999 UART: [kat] ECC-384
4,139,228 UART: [kat] HMAC-384Kdf
4,143,692 UART: [kat] LMS
4,392,004 UART: [kat] --
4,392,824 UART: [warm-reset] ++
4,393,793 UART: [warm-reset] --
4,394,832 UART: [state] Locking Datavault
4,395,628 UART: [state] Locking PCR0, PCR1 and PCR31
4,396,232 UART: [state] Locking ICCM
4,396,874 UART: [exit] Launching FMC @ 0x40000130
4,402,203 UART:
4,402,219 UART: Running Caliptra FMC ...
4,402,627 UART:
4,402,770 UART: [state] CFI Enabled
4,404,115 UART: [aliasrt :skip pcr extension
4,404,588 UART: [art] Extend RT PCRs Done
4,405,016 UART: [art] Lock RT PCRs Done
4,406,453 UART: [art] Populate DV Done
4,414,743 UART: [fht] FMC Alias Private Key: 7
4,415,703 UART: [art] Derive CDI
4,415,983 UART: [art] Store in in slot 0x4
4,501,566 UART: [art] Derive Key Pair
4,501,926 UART: [art] Store priv key in slot 0x5
4,515,338 UART: [art] Derive Key Pair - Done
4,530,284 UART: [art] Signing Cert with AUTHO
4,530,764 UART: RITY.KEYID = 7
4,546,158 UART: [art] Erasing AUTHORITY.KEYID = 7
4,546,923 UART: [art] PUB.X = 5B75CCB1D8A3B26F592D99D420D7C04074EFC73881C5656FA8DBC63FAF7986B3BBC0FB267EC4E9696C7388C8E6277AB3
4,553,707 UART: [art] PUB.Y = 00A5B6093BCCD91D5CF34C3E6E3E23330A701369E34A9E48C795D0F723EF57C5EE67B26A8389B3BC1873D83BB31272C6
4,560,635 UART: [art] SIG.R = 444A3EE72F1B0ED9ACB4E22C9CD8A2B485C4AB7C247F9960C403EC81F5486C963CDCD11550460096A1C8154AA83E6499
4,567,385 UART: [art] SIG.S = 4AAB701F0DBA2DA653054164D2BCC7DFC2FD1AD992F1C8BCF9214E7D3695B2526BC1C03FBF1087BA91DF20D9ADEE9397
4,591,522 UART: Caliptra RT
4,591,867 UART: [state] CFI Enabled
4,875,465 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Production
85,945 UART: [state] DebugLocked = Yes
86,585 UART: [state] Starting the WD Timer 40000000 cycles
88,082 UART: [kat] SHA2-256
891,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,761 UART: [kat] ++
895,913 UART: [kat] sha1
900,221 UART: [kat] SHA2-256
902,161 UART: [kat] SHA2-384
904,854 UART: [kat] SHA2-512-ACC
906,755 UART: [kat] ECC-384
916,458 UART: [kat] HMAC-384Kdf
920,920 UART: [kat] LMS
1,169,232 UART: [kat] --
1,170,237 UART: [cold-reset] ++
1,170,692 UART: [fht] FHT @ 0x50003400
1,173,390 UART: [idev] ++
1,173,558 UART: [idev] CDI.KEYID = 6
1,173,919 UART: [idev] SUBJECT.KEYID = 7
1,174,344 UART: [idev] UDS.KEYID = 0
1,174,690 ready_for_fw is high
1,174,690 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,255 UART: [idev] Erasing UDS.KEYID = 0
1,198,828 UART: [idev] Sha1 KeyId Algorithm
1,207,567 UART: [idev] --
1,208,728 UART: [ldev] ++
1,208,896 UART: [ldev] CDI.KEYID = 6
1,209,260 UART: [ldev] SUBJECT.KEYID = 5
1,209,687 UART: [ldev] AUTHORITY.KEYID = 7
1,210,150 UART: [ldev] FE.KEYID = 1
1,215,250 UART: [ldev] Erasing FE.KEYID = 1
1,241,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,455 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,149 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,019 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,725 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,817 UART: [ldev] --
1,281,159 UART: [fwproc] Wait for Commands...
1,281,746 UART: [fwproc] Recv command 0x46574c44
1,282,479 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,368 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,677 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,100 >>> mbox cmd response: success
2,337,218 UART: [afmc] ++
2,337,386 UART: [afmc] CDI.KEYID = 6
2,337,749 UART: [afmc] SUBJECT.KEYID = 7
2,338,175 UART: [afmc] AUTHORITY.KEYID = 5
2,373,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,779 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,498 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,391 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,098 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,949 UART: [afmc] --
2,416,916 UART: [cold-reset] --
2,417,594 UART: [state] Locking Datavault
2,418,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,197 UART: [state] Locking ICCM
2,419,643 UART: [exit] Launching FMC @ 0x40000130
2,424,972 UART:
2,424,988 UART: Running Caliptra FMC ...
2,425,396 UART:
2,425,450 UART: [state] CFI Enabled
2,436,001 UART: [fht] FMC Alias Private Key: 7
2,543,608 UART: [art] Extend RT PCRs Done
2,544,036 UART: [art] Lock RT PCRs Done
2,545,518 UART: [art] Populate DV Done
2,553,812 UART: [fht] FMC Alias Private Key: 7
2,554,978 UART: [art] Derive CDI
2,555,258 UART: [art] Store in in slot 0x4
2,640,749 UART: [art] Derive Key Pair
2,641,109 UART: [art] Store priv key in slot 0x5
2,654,071 UART: [art] Derive Key Pair - Done
2,668,872 UART: [art] Signing Cert with AUTHO
2,669,352 UART: RITY.KEYID = 7
2,684,610 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,375 UART: [art] PUB.X = 093AFE7B6E80DF69CA27BA15AF834214D7D08069C842D288FAAD09D7FA21A3A52A26E9820CE8062E32932A919C4EE43A
2,692,143 UART: [art] PUB.Y = E1479E18CCC4BADF1B1FD9A7FB084347CE572EDEEBCE1CEB44C5322C43B2777AA12A661A69AB8CEB0D2E238BD69A6FBA
2,699,119 UART: [art] SIG.R = 17B83F81AC4984C6CD015F3B065BCE1C5827A0103A01DB42B5F286EF42AC9EA5EF86707CE6380F29B0F9D2A6A9CFEAD9
2,705,895 UART: [art] SIG.S = 3A7935620766DEC2E10E34B945A2874309BA2C4E912AA6E744A3DD070F349537D57807E876CAE52BBEE371A2009687AA
2,729,404 UART: mbox::rt_entry...
2,729,776 UART: ____ _ _ _ ____ _____
2,730,560 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,360 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,128 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,896 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,664 UART: |_|
2,733,976 UART:
2,841,019 UART: [rt] Runtime listening for mailbox commands...
2,841,781 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,842,001 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,095 UART:
2,842,111 UART: Running Caliptra ROM ...
2,842,519 UART:
2,842,574 UART: [state] CFI Enabled
2,845,267 UART: [state] LifecycleState = Production
2,845,875 UART: [state] DebugLocked = Yes
2,846,385 UART: [state] Starting the WD Timer 40000000 cycles
2,847,876 UART: [kat] SHA2-256
3,651,426 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,555 UART: [kat] ++
3,655,707 UART: [kat] sha1
3,659,779 UART: [kat] SHA2-256
3,661,719 UART: [kat] SHA2-384
3,664,552 UART: [kat] SHA2-512-ACC
3,666,453 UART: [kat] ECC-384
3,676,126 UART: [kat] HMAC-384Kdf
3,680,708 UART: [kat] LMS
3,929,020 UART: [kat] --
3,929,850 UART: [warm-reset] ++
3,930,695 UART: [warm-reset] --
3,931,562 UART: [state] Locking Datavault
3,932,312 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,916 UART: [state] Locking ICCM
3,933,398 UART: [exit] Launching FMC @ 0x40000130
3,938,727 UART:
3,938,743 UART: Running Caliptra FMC ...
3,939,151 UART:
3,939,205 UART: [state] CFI Enabled
3,940,424 UART: [aliasrt :skip pcr extension
3,940,897 UART: [art] Extend RT PCRs Done
3,941,325 UART: [art] Lock RT PCRs Done
3,942,572 UART: [art] Populate DV Done
3,950,744 UART: [fht] FMC Alias Private Key: 7
3,951,690 UART: [art] Derive CDI
3,951,970 UART: [art] Store in in slot 0x4
4,037,153 UART: [art] Derive Key Pair
4,037,513 UART: [art] Store priv key in slot 0x5
4,050,693 UART: [art] Derive Key Pair - Done
4,065,012 UART: [art] Signing Cert with AUTHO
4,065,492 UART: RITY.KEYID = 7
4,080,596 UART: [art] Erasing AUTHORITY.KEYID = 7
4,081,361 UART: [art] PUB.X = 093AFE7B6E80DF69CA27BA15AF834214D7D08069C842D288FAAD09D7FA21A3A52A26E9820CE8062E32932A919C4EE43A
4,088,129 UART: [art] PUB.Y = E1479E18CCC4BADF1B1FD9A7FB084347CE572EDEEBCE1CEB44C5322C43B2777AA12A661A69AB8CEB0D2E238BD69A6FBA
4,095,105 UART: [art] SIG.R = 17B83F81AC4984C6CD015F3B065BCE1C5827A0103A01DB42B5F286EF42AC9EA5EF86707CE6380F29B0F9D2A6A9CFEAD9
4,101,881 UART: [art] SIG.S = 3A7935620766DEC2E10E34B945A2874309BA2C4E912AA6E744A3DD070F349537D57807E876CAE52BBEE371A2009687AA
4,125,422 UART: mbox::rt_entry...
4,125,794 UART: ____ _ _ _ ____ _____
4,126,578 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,127,378 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,128,146 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,128,914 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,129,682 UART: |_|
4,129,994 UART:
4,422,852 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,424,980 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Production
85,847 UART: [state] DebugLocked = Yes
86,391 UART: [state] Starting the WD Timer 40000000 cycles
87,926 UART: [kat] SHA2-256
891,476 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,605 UART: [kat] ++
895,757 UART: [kat] sha1
899,943 UART: [kat] SHA2-256
901,883 UART: [kat] SHA2-384
904,820 UART: [kat] SHA2-512-ACC
906,721 UART: [kat] ECC-384
916,578 UART: [kat] HMAC-384Kdf
921,326 UART: [kat] LMS
1,169,638 UART: [kat] --
1,170,627 UART: [cold-reset] ++
1,170,994 UART: [fht] FHT @ 0x50003400
1,173,420 UART: [idev] ++
1,173,588 UART: [idev] CDI.KEYID = 6
1,173,949 UART: [idev] SUBJECT.KEYID = 7
1,174,374 UART: [idev] UDS.KEYID = 0
1,174,720 ready_for_fw is high
1,174,720 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,333 UART: [idev] Erasing UDS.KEYID = 0
1,199,974 UART: [idev] Sha1 KeyId Algorithm
1,208,885 UART: [idev] --
1,210,154 UART: [ldev] ++
1,210,322 UART: [ldev] CDI.KEYID = 6
1,210,686 UART: [ldev] SUBJECT.KEYID = 5
1,211,113 UART: [ldev] AUTHORITY.KEYID = 7
1,211,576 UART: [ldev] FE.KEYID = 1
1,216,786 UART: [ldev] Erasing FE.KEYID = 1
1,243,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,999 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,693 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,563 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,269 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,453 UART: [ldev] --
1,282,921 UART: [fwproc] Wait for Commands...
1,283,614 UART: [fwproc] Recv command 0x46574c44
1,284,347 UART: [fwproc] Recv'd Img size: 78704 bytes
2,200,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,228,410 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,257,719 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,340,052 >>> mbox cmd response: success
2,341,222 UART: [afmc] ++
2,341,390 UART: [afmc] CDI.KEYID = 6
2,341,753 UART: [afmc] SUBJECT.KEYID = 7
2,342,179 UART: [afmc] AUTHORITY.KEYID = 5
2,377,728 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,393,882 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,394,633 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,400,352 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,406,245 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,411,952 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,419,783 UART: [afmc] --
2,420,830 UART: [cold-reset] --
2,421,746 UART: [state] Locking Datavault
2,422,909 UART: [state] Locking PCR0, PCR1 and PCR31
2,423,513 UART: [state] Locking ICCM
2,424,103 UART: [exit] Launching FMC @ 0x40000130
2,429,432 UART:
2,429,448 UART: Running Caliptra FMC ...
2,429,856 UART:
2,429,910 UART: [state] CFI Enabled
2,440,511 UART: [fht] FMC Alias Private Key: 7
2,548,106 UART: [art] Extend RT PCRs Done
2,548,534 UART: [art] Lock RT PCRs Done
2,550,142 UART: [art] Populate DV Done
2,558,366 UART: [fht] FMC Alias Private Key: 7
2,559,298 UART: [art] Derive CDI
2,559,578 UART: [art] Store in in slot 0x4
2,645,347 UART: [art] Derive Key Pair
2,645,707 UART: [art] Store priv key in slot 0x5
2,658,775 UART: [art] Derive Key Pair - Done
2,673,717 UART: [art] Signing Cert with AUTHO
2,674,197 UART: RITY.KEYID = 7
2,689,429 UART: [art] Erasing AUTHORITY.KEYID = 7
2,690,194 UART: [art] PUB.X = 1FF29F93D832E3264250CC025A7AAB3F8FE35CE66B98E552655320FD395C909CC97B9C72B19ACB083398B79661C93E4E
2,696,962 UART: [art] PUB.Y = 490D2C32564C220D2DA0AD2EF07BA78F58541DF97F5458838A7C18B5A47296438BBA37FDA86E9C2AC3811D17D98A8E1B
2,703,914 UART: [art] SIG.R = 1E79ACDE7DD2E495AF5E19CAFF4E33174C485F0AB6C2116A61A73B47D0C919B8E2044CB5B31EE406DA1E2186A16D637C
2,710,691 UART: [art] SIG.S = 78D2631035FE1D0D80393D50411C05C4EF7260D9AEB89BA51BC84A5FFD20D844849706CCF6C040C4F949072510207050
2,734,564 UART: mbox::rt_entry...
2,734,936 UART: ____ _ _ _ ____ _____
2,735,720 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,736,520 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,737,288 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,738,056 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,738,824 UART: |_|
2,739,136 UART:
2,846,075 UART: [rt] Runtime listening for mailbox commands...
2,846,837 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,847,057 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,847,151 UART:
2,847,167 UART: Running Caliptra ROM ...
2,847,575 UART:
2,847,630 UART: [state] CFI Enabled
2,849,991 UART: [state] LifecycleState = Production
2,850,599 UART: [state] DebugLocked = Yes
2,851,163 UART: [state] Starting the WD Timer 40000000 cycles
2,852,858 UART: [kat] SHA2-256
3,656,408 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,660,537 UART: [kat] ++
3,660,689 UART: [kat] sha1
3,665,131 UART: [kat] SHA2-256
3,667,071 UART: [kat] SHA2-384
3,669,876 UART: [kat] SHA2-512-ACC
3,671,777 UART: [kat] ECC-384
3,680,994 UART: [kat] HMAC-384Kdf
3,685,632 UART: [kat] LMS
3,933,944 UART: [kat] --
3,934,830 UART: [warm-reset] ++
3,935,927 UART: [warm-reset] --
3,936,520 UART: [state] Locking Datavault
3,937,226 UART: [state] Locking PCR0, PCR1 and PCR31
3,937,830 UART: [state] Locking ICCM
3,938,418 UART: [exit] Launching FMC @ 0x40000130
3,943,747 UART:
3,943,763 UART: Running Caliptra FMC ...
3,944,171 UART:
3,944,225 UART: [state] CFI Enabled
3,945,334 UART: [aliasrt :skip pcr extension
3,945,807 UART: [art] Extend RT PCRs Done
3,946,235 UART: [art] Lock RT PCRs Done
3,947,572 UART: [art] Populate DV Done
3,955,374 UART: [fht] FMC Alias Private Key: 7
3,956,510 UART: [art] Derive CDI
3,956,790 UART: [art] Store in in slot 0x4
4,042,119 UART: [art] Derive Key Pair
4,042,479 UART: [art] Store priv key in slot 0x5
4,055,783 UART: [art] Derive Key Pair - Done
4,070,559 UART: [art] Signing Cert with AUTHO
4,071,039 UART: RITY.KEYID = 7
4,086,035 UART: [art] Erasing AUTHORITY.KEYID = 7
4,086,800 UART: [art] PUB.X = 1FF29F93D832E3264250CC025A7AAB3F8FE35CE66B98E552655320FD395C909CC97B9C72B19ACB083398B79661C93E4E
4,093,568 UART: [art] PUB.Y = 490D2C32564C220D2DA0AD2EF07BA78F58541DF97F5458838A7C18B5A47296438BBA37FDA86E9C2AC3811D17D98A8E1B
4,100,520 UART: [art] SIG.R = 1E79ACDE7DD2E495AF5E19CAFF4E33174C485F0AB6C2116A61A73B47D0C919B8E2044CB5B31EE406DA1E2186A16D637C
4,107,297 UART: [art] SIG.S = 78D2631035FE1D0D80393D50411C05C4EF7260D9AEB89BA51BC84A5FFD20D844849706CCF6C040C4F949072510207050
4,131,420 UART: mbox::rt_entry...
4,131,792 UART: ____ _ _ _ ____ _____
4,132,576 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,133,376 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,134,144 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,134,912 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,135,680 UART: |_|
4,135,992 UART:
4,428,204 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,430,360 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Production
85,944 UART: [state] DebugLocked = Yes
86,676 UART: [state] Starting the WD Timer 40000000 cycles
88,205 UART: [kat] SHA2-256
891,755 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,884 UART: [kat] ++
896,036 UART: [kat] sha1
900,328 UART: [kat] SHA2-256
902,268 UART: [kat] SHA2-384
905,223 UART: [kat] SHA2-512-ACC
907,124 UART: [kat] ECC-384
917,145 UART: [kat] HMAC-384Kdf
921,801 UART: [kat] LMS
1,170,113 UART: [kat] --
1,170,930 UART: [cold-reset] ++
1,171,459 UART: [fht] FHT @ 0x50003400
1,174,141 UART: [idev] ++
1,174,309 UART: [idev] CDI.KEYID = 6
1,174,670 UART: [idev] SUBJECT.KEYID = 7
1,175,095 UART: [idev] UDS.KEYID = 0
1,175,441 ready_for_fw is high
1,175,441 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,934 UART: [idev] Erasing UDS.KEYID = 0
1,200,395 UART: [idev] Sha1 KeyId Algorithm
1,209,192 UART: [idev] --
1,210,199 UART: [ldev] ++
1,210,367 UART: [ldev] CDI.KEYID = 6
1,210,731 UART: [ldev] SUBJECT.KEYID = 5
1,211,158 UART: [ldev] AUTHORITY.KEYID = 7
1,211,621 UART: [ldev] FE.KEYID = 1
1,216,971 UART: [ldev] Erasing FE.KEYID = 1
1,243,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,950 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,644 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,514 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,220 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,354 UART: [ldev] --
1,282,682 UART: [fwproc] Wait for Commands...
1,283,417 UART: [fwproc] Recv command 0x46574c44
1,284,150 UART: [fwproc] Recv'd Img size: 78704 bytes
2,199,406 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,226,529 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,838 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,338,213 >>> mbox cmd response: success
2,339,239 UART: [afmc] ++
2,339,407 UART: [afmc] CDI.KEYID = 6
2,339,770 UART: [afmc] SUBJECT.KEYID = 7
2,340,196 UART: [afmc] AUTHORITY.KEYID = 5
2,375,375 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,675 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,426 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,398,145 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,404,038 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,745 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,534 UART: [afmc] --
2,418,441 UART: [cold-reset] --
2,419,383 UART: [state] Locking Datavault
2,420,516 UART: [state] Locking PCR0, PCR1 and PCR31
2,421,120 UART: [state] Locking ICCM
2,421,730 UART: [exit] Launching FMC @ 0x40000130
2,427,059 UART:
2,427,075 UART: Running Caliptra FMC ...
2,427,483 UART:
2,427,626 UART: [state] CFI Enabled
2,438,269 UART: [fht] FMC Alias Private Key: 7
2,546,208 UART: [art] Extend RT PCRs Done
2,546,636 UART: [art] Lock RT PCRs Done
2,548,144 UART: [art] Populate DV Done
2,556,228 UART: [fht] FMC Alias Private Key: 7
2,557,382 UART: [art] Derive CDI
2,557,662 UART: [art] Store in in slot 0x4
2,643,103 UART: [art] Derive Key Pair
2,643,463 UART: [art] Store priv key in slot 0x5
2,656,717 UART: [art] Derive Key Pair - Done
2,671,521 UART: [art] Signing Cert with AUTHO
2,672,001 UART: RITY.KEYID = 7
2,686,939 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,704 UART: [art] PUB.X = 7EA56F77E54B6CD0DC4AF0D696B09CA66B0A4E6677CADE5377E6642A0AF3E69BA7494033A61374B426CE2731B50AB619
2,694,475 UART: [art] PUB.Y = BFA9C54882A4D38D19796FA3C8CBC70B8FEDE2264DEECBE32AF5E19A31A139F34192BEC379F83E0750CE2EB7A42C6C85
2,701,441 UART: [art] SIG.R = AA2AB97600FF5504630CDEB0855AD83F6E8BEFD3C9455478C2A7C1EF725662ECF777B6F306C963E42DEADA017E338FE1
2,708,193 UART: [art] SIG.S = 7328C8B3174D8950FE3E4E6A2573358D1D6FB8A4BD48DFBCBAEA57E04F040DE163561864B697991A35A2774D3B77BB57
2,732,162 UART: mbox::rt_entry...
2,732,534 UART: ____ _ _ _ ____ _____
2,733,318 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,118 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,886 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,654 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,422 UART: |_|
2,736,734 UART:
2,842,800 UART: [rt] Runtime listening for mailbox commands...
2,843,562 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,843,782 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,876 UART:
2,843,892 UART: Running Caliptra ROM ...
2,844,300 UART:
2,844,442 UART: [state] CFI Enabled
2,847,349 UART: [state] LifecycleState = Production
2,847,957 UART: [state] DebugLocked = Yes
2,848,491 UART: [state] Starting the WD Timer 40000000 cycles
2,849,984 UART: [kat] SHA2-256
3,653,534 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,663 UART: [kat] ++
3,657,815 UART: [kat] sha1
3,662,057 UART: [kat] SHA2-256
3,663,997 UART: [kat] SHA2-384
3,666,812 UART: [kat] SHA2-512-ACC
3,668,713 UART: [kat] ECC-384
3,678,254 UART: [kat] HMAC-384Kdf
3,682,788 UART: [kat] LMS
3,931,100 UART: [kat] --
3,932,314 UART: [warm-reset] ++
3,932,889 UART: [warm-reset] --
3,933,710 UART: [state] Locking Datavault
3,934,618 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,222 UART: [state] Locking ICCM
3,935,776 UART: [exit] Launching FMC @ 0x40000130
3,941,105 UART:
3,941,121 UART: Running Caliptra FMC ...
3,941,529 UART:
3,941,672 UART: [state] CFI Enabled
3,942,913 UART: [aliasrt :skip pcr extension
3,943,386 UART: [art] Extend RT PCRs Done
3,943,814 UART: [art] Lock RT PCRs Done
3,944,931 UART: [art] Populate DV Done
3,953,179 UART: [fht] FMC Alias Private Key: 7
3,954,175 UART: [art] Derive CDI
3,954,455 UART: [art] Store in in slot 0x4
4,039,880 UART: [art] Derive Key Pair
4,040,240 UART: [art] Store priv key in slot 0x5
4,053,740 UART: [art] Derive Key Pair - Done
4,068,380 UART: [art] Signing Cert with AUTHO
4,068,860 UART: RITY.KEYID = 7
4,083,518 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,283 UART: [art] PUB.X = 7EA56F77E54B6CD0DC4AF0D696B09CA66B0A4E6677CADE5377E6642A0AF3E69BA7494033A61374B426CE2731B50AB619
4,091,054 UART: [art] PUB.Y = BFA9C54882A4D38D19796FA3C8CBC70B8FEDE2264DEECBE32AF5E19A31A139F34192BEC379F83E0750CE2EB7A42C6C85
4,098,020 UART: [art] SIG.R = AA2AB97600FF5504630CDEB0855AD83F6E8BEFD3C9455478C2A7C1EF725662ECF777B6F306C963E42DEADA017E338FE1
4,104,772 UART: [art] SIG.S = 7328C8B3174D8950FE3E4E6A2573358D1D6FB8A4BD48DFBCBAEA57E04F040DE163561864B697991A35A2774D3B77BB57
4,128,361 UART: mbox::rt_entry...
4,128,733 UART: ____ _ _ _ ____ _____
4,129,517 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,317 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,085 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,853 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,621 UART: |_|
4,132,933 UART:
4,425,684 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,427,834 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,866 UART: [state] LifecycleState = Production
86,474 UART: [state] DebugLocked = Yes
87,138 UART: [state] Starting the WD Timer 40000000 cycles
88,727 UART: [kat] SHA2-256
892,277 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,406 UART: [kat] ++
896,558 UART: [kat] sha1
900,586 UART: [kat] SHA2-256
902,526 UART: [kat] SHA2-384
905,441 UART: [kat] SHA2-512-ACC
907,342 UART: [kat] ECC-384
916,761 UART: [kat] HMAC-384Kdf
921,285 UART: [kat] LMS
1,169,597 UART: [kat] --
1,170,398 UART: [cold-reset] ++
1,170,887 UART: [fht] FHT @ 0x50003400
1,173,331 UART: [idev] ++
1,173,499 UART: [idev] CDI.KEYID = 6
1,173,860 UART: [idev] SUBJECT.KEYID = 7
1,174,285 UART: [idev] UDS.KEYID = 0
1,174,631 ready_for_fw is high
1,174,631 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,292 UART: [idev] Erasing UDS.KEYID = 0
1,199,069 UART: [idev] Sha1 KeyId Algorithm
1,207,916 UART: [idev] --
1,209,017 UART: [ldev] ++
1,209,185 UART: [ldev] CDI.KEYID = 6
1,209,549 UART: [ldev] SUBJECT.KEYID = 5
1,209,976 UART: [ldev] AUTHORITY.KEYID = 7
1,210,439 UART: [ldev] FE.KEYID = 1
1,215,761 UART: [ldev] Erasing FE.KEYID = 1
1,242,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,016 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,710 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,580 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,286 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,482 UART: [ldev] --
1,281,966 UART: [fwproc] Wait for Commands...
1,282,621 UART: [fwproc] Recv command 0x46574c44
1,283,354 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,933 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,242 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,635 >>> mbox cmd response: success
2,337,705 UART: [afmc] ++
2,337,873 UART: [afmc] CDI.KEYID = 6
2,338,236 UART: [afmc] SUBJECT.KEYID = 7
2,338,662 UART: [afmc] AUTHORITY.KEYID = 5
2,373,935 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,243 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,994 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,713 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,606 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,313 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,240 UART: [afmc] --
2,417,135 UART: [cold-reset] --
2,418,111 UART: [state] Locking Datavault
2,419,304 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,908 UART: [state] Locking ICCM
2,420,520 UART: [exit] Launching FMC @ 0x40000130
2,425,849 UART:
2,425,865 UART: Running Caliptra FMC ...
2,426,273 UART:
2,426,416 UART: [state] CFI Enabled
2,437,309 UART: [fht] FMC Alias Private Key: 7
2,545,354 UART: [art] Extend RT PCRs Done
2,545,782 UART: [art] Lock RT PCRs Done
2,547,272 UART: [art] Populate DV Done
2,555,696 UART: [fht] FMC Alias Private Key: 7
2,556,750 UART: [art] Derive CDI
2,557,030 UART: [art] Store in in slot 0x4
2,642,511 UART: [art] Derive Key Pair
2,642,871 UART: [art] Store priv key in slot 0x5
2,656,219 UART: [art] Derive Key Pair - Done
2,670,606 UART: [art] Signing Cert with AUTHO
2,671,086 UART: RITY.KEYID = 7
2,686,502 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,267 UART: [art] PUB.X = 0B997552E55F1A6772868EE6ED5911975446DE246BBA382B1AA3525E3B0EE8B8AD20FB4A403321BCC8027F561902F51F
2,694,027 UART: [art] PUB.Y = ECDDCD8B32AE7D03052941921EB6F8766494EDA5A6F9B6371A670E299BC8E5514C66502968D20079B6C17CBA0F3A858F
2,700,949 UART: [art] SIG.R = B9BC6BBE5D16EC7B5E26CFEBA28470CFCDAF12E808AD4F8715E7A3AD6A3F335A0D602312E9DF45CF408122FF36E8F403
2,707,734 UART: [art] SIG.S = 9FC29CD689832D9ECEA1A83D064F5E21B547E45D4D560C837A294CBEB85D102B5359A3DA04F88BB664A520F4AD4E63FC
2,731,566 UART: mbox::rt_entry...
2,731,938 UART: ____ _ _ _ ____ _____
2,732,722 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,522 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,290 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,058 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,826 UART: |_|
2,736,138 UART:
2,841,536 UART: [rt] Runtime listening for mailbox commands...
2,842,298 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,842,518 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,612 UART:
2,842,628 UART: Running Caliptra ROM ...
2,843,036 UART:
2,843,178 UART: [state] CFI Enabled
2,845,797 UART: [state] LifecycleState = Production
2,846,405 UART: [state] DebugLocked = Yes
2,847,087 UART: [state] Starting the WD Timer 40000000 cycles
2,848,632 UART: [kat] SHA2-256
3,652,182 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,311 UART: [kat] ++
3,656,463 UART: [kat] sha1
3,660,565 UART: [kat] SHA2-256
3,662,505 UART: [kat] SHA2-384
3,665,292 UART: [kat] SHA2-512-ACC
3,667,193 UART: [kat] ECC-384
3,677,384 UART: [kat] HMAC-384Kdf
3,681,978 UART: [kat] LMS
3,930,290 UART: [kat] --
3,931,030 UART: [warm-reset] ++
3,931,943 UART: [warm-reset] --
3,932,886 UART: [state] Locking Datavault
3,933,606 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,210 UART: [state] Locking ICCM
3,934,866 UART: [exit] Launching FMC @ 0x40000130
3,940,195 UART:
3,940,211 UART: Running Caliptra FMC ...
3,940,619 UART:
3,940,762 UART: [state] CFI Enabled
3,942,131 UART: [aliasrt :skip pcr extension
3,942,604 UART: [art] Extend RT PCRs Done
3,943,032 UART: [art] Lock RT PCRs Done
3,944,493 UART: [art] Populate DV Done
3,952,465 UART: [fht] FMC Alias Private Key: 7
3,953,557 UART: [art] Derive CDI
3,953,837 UART: [art] Store in in slot 0x4
4,039,416 UART: [art] Derive Key Pair
4,039,776 UART: [art] Store priv key in slot 0x5
4,053,040 UART: [art] Derive Key Pair - Done
4,067,943 UART: [art] Signing Cert with AUTHO
4,068,423 UART: RITY.KEYID = 7
4,083,839 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,604 UART: [art] PUB.X = 0B997552E55F1A6772868EE6ED5911975446DE246BBA382B1AA3525E3B0EE8B8AD20FB4A403321BCC8027F561902F51F
4,091,364 UART: [art] PUB.Y = ECDDCD8B32AE7D03052941921EB6F8766494EDA5A6F9B6371A670E299BC8E5514C66502968D20079B6C17CBA0F3A858F
4,098,286 UART: [art] SIG.R = B9BC6BBE5D16EC7B5E26CFEBA28470CFCDAF12E808AD4F8715E7A3AD6A3F335A0D602312E9DF45CF408122FF36E8F403
4,105,071 UART: [art] SIG.S = 9FC29CD689832D9ECEA1A83D064F5E21B547E45D4D560C837A294CBEB85D102B5359A3DA04F88BB664A520F4AD4E63FC
4,128,485 UART: mbox::rt_entry...
4,128,857 UART: ____ _ _ _ ____ _____
4,129,641 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,441 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,209 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,977 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,745 UART: |_|
4,133,057 UART:
4,429,364 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,431,630 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,965 UART: [state] LifecycleState = Production
85,573 UART: [state] DebugLocked = Yes
86,219 UART: [state] Starting the WD Timer 40000000 cycles
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,537 UART: [kat] SHA2-256
901,477 UART: [kat] SHA2-384
904,116 UART: [kat] SHA2-512-ACC
906,017 UART: [kat] ECC-384
915,784 UART: [kat] HMAC-384Kdf
920,412 UART: [kat] LMS
1,168,724 UART: [kat] --
1,169,961 UART: [cold-reset] ++
1,170,352 UART: [fht] FHT @ 0x50003400
1,172,800 UART: [idev] ++
1,172,968 UART: [idev] CDI.KEYID = 6
1,173,329 UART: [idev] SUBJECT.KEYID = 7
1,173,754 UART: [idev] UDS.KEYID = 0
1,174,100 ready_for_fw is high
1,174,100 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,723 UART: [idev] Erasing UDS.KEYID = 0
1,198,332 UART: [idev] Sha1 KeyId Algorithm
1,207,115 UART: [idev] --
1,208,192 UART: [ldev] ++
1,208,360 UART: [ldev] CDI.KEYID = 6
1,208,724 UART: [ldev] SUBJECT.KEYID = 5
1,209,151 UART: [ldev] AUTHORITY.KEYID = 7
1,209,614 UART: [ldev] FE.KEYID = 1
1,214,794 UART: [ldev] Erasing FE.KEYID = 1
1,241,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,063 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,757 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,627 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,333 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,329 UART: [ldev] --
1,280,753 UART: [fwproc] Wait for Commands...
1,281,554 UART: [fwproc] Recv command 0x46574c44
1,282,287 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,648 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,957 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,384 >>> mbox cmd response: success
2,337,440 UART: [afmc] ++
2,337,608 UART: [afmc] CDI.KEYID = 6
2,337,971 UART: [afmc] SUBJECT.KEYID = 7
2,338,397 UART: [afmc] AUTHORITY.KEYID = 5
2,374,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,346 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,097 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,816 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,709 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,416 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,261 UART: [afmc] --
2,417,224 UART: [cold-reset] --
2,418,172 UART: [state] Locking Datavault
2,419,463 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,067 UART: [state] Locking ICCM
2,420,531 UART: [exit] Launching FMC @ 0x40000130
2,425,860 UART:
2,425,876 UART: Running Caliptra FMC ...
2,426,284 UART:
2,426,338 UART: [state] CFI Enabled
2,436,723 UART: [fht] FMC Alias Private Key: 7
2,545,456 UART: [art] Extend RT PCRs Done
2,545,884 UART: [art] Lock RT PCRs Done
2,547,620 UART: [art] Populate DV Done
2,556,026 UART: [fht] FMC Alias Private Key: 7
2,557,200 UART: [art] Derive CDI
2,557,480 UART: [art] Store in in slot 0x4
2,643,057 UART: [art] Derive Key Pair
2,643,417 UART: [art] Store priv key in slot 0x5
2,656,427 UART: [art] Derive Key Pair - Done
2,670,977 UART: [art] Signing Cert with AUTHO
2,671,457 UART: RITY.KEYID = 7
2,687,067 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,832 UART: [art] PUB.X = 30D0D8A25804F842C93EA2C13352A49FEF94AA8CE6BFEBC5F0E344BB3ED8E5FA118BBB26D1681ED67792F090854DD962
2,694,615 UART: [art] PUB.Y = 7C5BF642F895858F6894A7E249FF9257BEBD4AE4D2A074A08DA93C412A017F3CDBA9C7F4D47D4DF24996DE5C6FCA821C
2,701,580 UART: [art] SIG.R = 54221F968105A0A3223CA6585FDB16DD6CCEBFDB0DBE6B88FBEB53E0AEFEA75B6A0D7E845FDD82C7C832466E79E8B74F
2,708,367 UART: [art] SIG.S = AB14CA5B59AFD4EA28D019D15082739CCB1357725A095E7BFD6F8F94D0254B7BD8DA28AAB620C864E76EFB624C14ABDC
2,732,119 UART: mbox::rt_entry...
2,732,491 UART: ____ _ _ _ ____ _____
2,733,275 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,075 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,843 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,611 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,379 UART: |_|
2,736,691 UART:
2,843,419 UART: [rt] Runtime listening for mailbox commands...
2,844,181 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,844,401 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,844,495 UART:
2,844,511 UART: Running Caliptra ROM ...
2,844,919 UART:
2,844,974 UART: [state] CFI Enabled
2,847,929 UART: [state] LifecycleState = Production
2,848,537 UART: [state] DebugLocked = Yes
2,849,147 UART: [state] Starting the WD Timer 40000000 cycles
2,850,624 UART: [kat] SHA2-256
3,654,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,303 UART: [kat] ++
3,658,455 UART: [kat] sha1
3,662,863 UART: [kat] SHA2-256
3,664,803 UART: [kat] SHA2-384
3,667,430 UART: [kat] SHA2-512-ACC
3,669,331 UART: [kat] ECC-384
3,679,226 UART: [kat] HMAC-384Kdf
3,683,718 UART: [kat] LMS
3,932,030 UART: [kat] --
3,932,872 UART: [warm-reset] ++
3,933,923 UART: [warm-reset] --
3,934,672 UART: [state] Locking Datavault
3,935,510 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,114 UART: [state] Locking ICCM
3,936,652 UART: [exit] Launching FMC @ 0x40000130
3,941,981 UART:
3,941,997 UART: Running Caliptra FMC ...
3,942,405 UART:
3,942,459 UART: [state] CFI Enabled
3,943,464 UART: [aliasrt :skip pcr extension
3,943,937 UART: [art] Extend RT PCRs Done
3,944,365 UART: [art] Lock RT PCRs Done
3,945,522 UART: [art] Populate DV Done
3,953,750 UART: [fht] FMC Alias Private Key: 7
3,954,710 UART: [art] Derive CDI
3,954,990 UART: [art] Store in in slot 0x4
4,040,503 UART: [art] Derive Key Pair
4,040,863 UART: [art] Store priv key in slot 0x5
4,054,279 UART: [art] Derive Key Pair - Done
4,069,083 UART: [art] Signing Cert with AUTHO
4,069,563 UART: RITY.KEYID = 7
4,084,973 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,738 UART: [art] PUB.X = 30D0D8A25804F842C93EA2C13352A49FEF94AA8CE6BFEBC5F0E344BB3ED8E5FA118BBB26D1681ED67792F090854DD962
4,092,521 UART: [art] PUB.Y = 7C5BF642F895858F6894A7E249FF9257BEBD4AE4D2A074A08DA93C412A017F3CDBA9C7F4D47D4DF24996DE5C6FCA821C
4,099,486 UART: [art] SIG.R = 54221F968105A0A3223CA6585FDB16DD6CCEBFDB0DBE6B88FBEB53E0AEFEA75B6A0D7E845FDD82C7C832466E79E8B74F
4,106,273 UART: [art] SIG.S = AB14CA5B59AFD4EA28D019D15082739CCB1357725A095E7BFD6F8F94D0254B7BD8DA28AAB620C864E76EFB624C14ABDC
4,129,583 UART: mbox::rt_entry...
4,129,955 UART: ____ _ _ _ ____ _____
4,130,739 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,131,539 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,132,307 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,133,075 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,843 UART: |_|
4,134,155 UART:
4,426,172 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,428,396 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Production
86,109 UART: [state] DebugLocked = Yes
86,757 UART: [state] Starting the WD Timer 40000000 cycles
88,446 UART: [kat] SHA2-256
891,996 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,125 UART: [kat] ++
896,277 UART: [kat] sha1
900,671 UART: [kat] SHA2-256
902,611 UART: [kat] SHA2-384
905,292 UART: [kat] SHA2-512-ACC
907,193 UART: [kat] ECC-384
917,248 UART: [kat] HMAC-384Kdf
921,694 UART: [kat] LMS
1,170,006 UART: [kat] --
1,170,831 UART: [cold-reset] ++
1,171,398 UART: [fht] FHT @ 0x50003400
1,174,048 UART: [idev] ++
1,174,216 UART: [idev] CDI.KEYID = 6
1,174,577 UART: [idev] SUBJECT.KEYID = 7
1,175,002 UART: [idev] UDS.KEYID = 0
1,175,348 ready_for_fw is high
1,175,348 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,017 UART: [idev] Erasing UDS.KEYID = 0
1,200,272 UART: [idev] Sha1 KeyId Algorithm
1,208,997 UART: [idev] --
1,210,024 UART: [ldev] ++
1,210,192 UART: [ldev] CDI.KEYID = 6
1,210,556 UART: [ldev] SUBJECT.KEYID = 5
1,210,983 UART: [ldev] AUTHORITY.KEYID = 7
1,211,446 UART: [ldev] FE.KEYID = 1
1,216,720 UART: [ldev] Erasing FE.KEYID = 1
1,242,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,091 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,785 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,655 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,361 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,513 UART: [ldev] --
1,281,879 UART: [fwproc] Wait for Commands...
1,282,526 UART: [fwproc] Recv command 0x46574c44
1,283,259 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,718 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,027 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,448 >>> mbox cmd response: success
2,338,706 UART: [afmc] ++
2,338,874 UART: [afmc] CDI.KEYID = 6
2,339,237 UART: [afmc] SUBJECT.KEYID = 7
2,339,663 UART: [afmc] AUTHORITY.KEYID = 5
2,375,464 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,950 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,701 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,398,420 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,404,313 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,410,020 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,991 UART: [afmc] --
2,418,920 UART: [cold-reset] --
2,419,644 UART: [state] Locking Datavault
2,421,055 UART: [state] Locking PCR0, PCR1 and PCR31
2,421,659 UART: [state] Locking ICCM
2,422,095 UART: [exit] Launching FMC @ 0x40000130
2,427,424 UART:
2,427,440 UART: Running Caliptra FMC ...
2,427,848 UART:
2,427,902 UART: [state] CFI Enabled
2,438,001 UART: [fht] FMC Alias Private Key: 7
2,545,356 UART: [art] Extend RT PCRs Done
2,545,784 UART: [art] Lock RT PCRs Done
2,547,514 UART: [art] Populate DV Done
2,556,018 UART: [fht] FMC Alias Private Key: 7
2,557,088 UART: [art] Derive CDI
2,557,368 UART: [art] Store in in slot 0x4
2,642,907 UART: [art] Derive Key Pair
2,643,267 UART: [art] Store priv key in slot 0x5
2,656,983 UART: [art] Derive Key Pair - Done
2,671,640 UART: [art] Signing Cert with AUTHO
2,672,120 UART: RITY.KEYID = 7
2,687,234 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,999 UART: [art] PUB.X = CA8E020345596807AF9DD7812D919A0DA128606FA717C46DE95B707F3DE3D3AC5D503B2DDC148A9CA33309FAD77F2C77
2,694,764 UART: [art] PUB.Y = 1E46572C9899719E42A1092E71C8528341839136DA4FC5F7F83F27E224D13CF662AF28E41030AA649581A102408A957A
2,701,696 UART: [art] SIG.R = 2F6EBAD8BF5E5B1FC336A6F86818785E2ACEB068DFAE9B3D14159BA93082FEEEB5EE11B599F182C90C69D88E926E369B
2,708,483 UART: [art] SIG.S = BBFBD85E947C24491A17218FF067D8BAB26FDBCC4DDDC6976D732E55CEC9708441B8460FA0EC396227409EF73040674E
2,731,995 UART: mbox::rt_entry...
2,732,367 UART: ____ _ _ _ ____ _____
2,733,151 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,951 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,719 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,487 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,255 UART: |_|
2,736,567 UART:
2,842,095 UART: [rt] Runtime listening for mailbox commands...
2,842,857 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,843,077 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,171 UART:
2,843,187 UART: Running Caliptra ROM ...
2,843,595 UART:
2,843,650 UART: [state] CFI Enabled
2,846,257 UART: [state] LifecycleState = Production
2,846,865 UART: [state] DebugLocked = Yes
2,847,409 UART: [state] Starting the WD Timer 40000000 cycles
2,848,950 UART: [kat] SHA2-256
3,652,500 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,629 UART: [kat] ++
3,656,781 UART: [kat] sha1
3,661,197 UART: [kat] SHA2-256
3,663,137 UART: [kat] SHA2-384
3,666,030 UART: [kat] SHA2-512-ACC
3,667,931 UART: [kat] ECC-384
3,677,624 UART: [kat] HMAC-384Kdf
3,682,446 UART: [kat] LMS
3,930,758 UART: [kat] --
3,931,362 UART: [warm-reset] ++
3,932,115 UART: [warm-reset] --
3,932,904 UART: [state] Locking Datavault
3,933,778 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,382 UART: [state] Locking ICCM
3,934,878 UART: [exit] Launching FMC @ 0x40000130
3,940,207 UART:
3,940,223 UART: Running Caliptra FMC ...
3,940,631 UART:
3,940,685 UART: [state] CFI Enabled
3,941,922 UART: [aliasrt :skip pcr extension
3,942,395 UART: [art] Extend RT PCRs Done
3,942,823 UART: [art] Lock RT PCRs Done
3,943,890 UART: [art] Populate DV Done
3,951,900 UART: [fht] FMC Alias Private Key: 7
3,953,000 UART: [art] Derive CDI
3,953,280 UART: [art] Store in in slot 0x4
4,039,103 UART: [art] Derive Key Pair
4,039,463 UART: [art] Store priv key in slot 0x5
4,052,671 UART: [art] Derive Key Pair - Done
4,067,290 UART: [art] Signing Cert with AUTHO
4,067,770 UART: RITY.KEYID = 7
4,082,866 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,631 UART: [art] PUB.X = CA8E020345596807AF9DD7812D919A0DA128606FA717C46DE95B707F3DE3D3AC5D503B2DDC148A9CA33309FAD77F2C77
4,090,396 UART: [art] PUB.Y = 1E46572C9899719E42A1092E71C8528341839136DA4FC5F7F83F27E224D13CF662AF28E41030AA649581A102408A957A
4,097,328 UART: [art] SIG.R = 2F6EBAD8BF5E5B1FC336A6F86818785E2ACEB068DFAE9B3D14159BA93082FEEEB5EE11B599F182C90C69D88E926E369B
4,104,115 UART: [art] SIG.S = BBFBD85E947C24491A17218FF067D8BAB26FDBCC4DDDC6976D732E55CEC9708441B8460FA0EC396227409EF73040674E
4,127,447 UART: mbox::rt_entry...
4,127,819 UART: ____ _ _ _ ____ _____
4,128,603 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,403 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,171 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,939 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,707 UART: |_|
4,132,019 UART:
4,428,660 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,430,870 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,598 UART: [state] LifecycleState = Production
86,206 UART: [state] DebugLocked = Yes
86,910 UART: [state] Starting the WD Timer 40000000 cycles
88,465 UART: [kat] SHA2-256
892,015 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,144 UART: [kat] ++
896,296 UART: [kat] sha1
900,666 UART: [kat] SHA2-256
902,606 UART: [kat] SHA2-384
905,295 UART: [kat] SHA2-512-ACC
907,196 UART: [kat] ECC-384
917,053 UART: [kat] HMAC-384Kdf
921,693 UART: [kat] LMS
1,170,005 UART: [kat] --
1,171,110 UART: [cold-reset] ++
1,171,677 UART: [fht] FHT @ 0x50003400
1,174,147 UART: [idev] ++
1,174,315 UART: [idev] CDI.KEYID = 6
1,174,676 UART: [idev] SUBJECT.KEYID = 7
1,175,101 UART: [idev] UDS.KEYID = 0
1,175,447 ready_for_fw is high
1,175,447 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,636 UART: [idev] Erasing UDS.KEYID = 0
1,199,597 UART: [idev] Sha1 KeyId Algorithm
1,208,436 UART: [idev] --
1,209,427 UART: [ldev] ++
1,209,595 UART: [ldev] CDI.KEYID = 6
1,209,959 UART: [ldev] SUBJECT.KEYID = 5
1,210,386 UART: [ldev] AUTHORITY.KEYID = 7
1,210,849 UART: [ldev] FE.KEYID = 1
1,215,921 UART: [ldev] Erasing FE.KEYID = 1
1,242,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,494 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,188 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,058 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,764 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,726 UART: [ldev] --
1,282,036 UART: [fwproc] Wait for Commands...
1,282,747 UART: [fwproc] Recv command 0x46574c44
1,283,480 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,633 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,942 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,217 >>> mbox cmd response: success
2,338,439 UART: [afmc] ++
2,338,607 UART: [afmc] CDI.KEYID = 6
2,338,970 UART: [afmc] SUBJECT.KEYID = 7
2,339,396 UART: [afmc] AUTHORITY.KEYID = 5
2,375,031 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,659 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,410 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,398,129 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,404,022 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,729 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,480 UART: [afmc] --
2,418,485 UART: [cold-reset] --
2,419,405 UART: [state] Locking Datavault
2,420,446 UART: [state] Locking PCR0, PCR1 and PCR31
2,421,050 UART: [state] Locking ICCM
2,421,692 UART: [exit] Launching FMC @ 0x40000130
2,427,021 UART:
2,427,037 UART: Running Caliptra FMC ...
2,427,445 UART:
2,427,588 UART: [state] CFI Enabled
2,437,965 UART: [fht] FMC Alias Private Key: 7
2,546,224 UART: [art] Extend RT PCRs Done
2,546,652 UART: [art] Lock RT PCRs Done
2,548,252 UART: [art] Populate DV Done
2,556,486 UART: [fht] FMC Alias Private Key: 7
2,557,636 UART: [art] Derive CDI
2,557,916 UART: [art] Store in in slot 0x4
2,643,595 UART: [art] Derive Key Pair
2,643,955 UART: [art] Store priv key in slot 0x5
2,657,197 UART: [art] Derive Key Pair - Done
2,672,307 UART: [art] Signing Cert with AUTHO
2,672,787 UART: RITY.KEYID = 7
2,687,913 UART: [art] Erasing AUTHORITY.KEYID = 7
2,688,678 UART: [art] PUB.X = 159E2667C691AC36CFE2179B358B1A89C6A8F142F837C7489C9AB314AD0B0583AD51F1DB7D3AC1CFE40E58E5DB1C039D
2,695,450 UART: [art] PUB.Y = 1AE3964F9AE1DBF6053A6615917196D94EE7B28D5BEDD5373CAD545DF4C46026F79394F07A9845409C7E478F319702C5
2,702,394 UART: [art] SIG.R = F941984E5091793509C45C5EB848727001DAA328AF254F0DC9DF5F8AA55CBBD742176605B5B077E6C941977C3FD3EC1A
2,709,156 UART: [art] SIG.S = 89D9C4566E873FD63FE5E2BA0BDD15FE072BDE4172CBA5E1343722F171FE6A30B4C264C07E9C797C88813FFAA8BC758D
2,733,047 UART: mbox::rt_entry...
2,733,419 UART: ____ _ _ _ ____ _____
2,734,203 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,735,003 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,735,771 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,736,539 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,737,307 UART: |_|
2,737,619 UART:
2,842,943 UART: [rt] Runtime listening for mailbox commands...
2,843,705 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,843,925 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,844,019 UART:
2,844,035 UART: Running Caliptra ROM ...
2,844,443 UART:
2,844,585 UART: [state] CFI Enabled
2,847,046 UART: [state] LifecycleState = Production
2,847,654 UART: [state] DebugLocked = Yes
2,848,300 UART: [state] Starting the WD Timer 40000000 cycles
2,849,763 UART: [kat] SHA2-256
3,653,313 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,442 UART: [kat] ++
3,657,594 UART: [kat] sha1
3,661,890 UART: [kat] SHA2-256
3,663,830 UART: [kat] SHA2-384
3,666,385 UART: [kat] SHA2-512-ACC
3,668,286 UART: [kat] ECC-384
3,678,053 UART: [kat] HMAC-384Kdf
3,682,657 UART: [kat] LMS
3,930,969 UART: [kat] --
3,931,691 UART: [warm-reset] ++
3,932,588 UART: [warm-reset] --
3,933,545 UART: [state] Locking Datavault
3,934,497 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,101 UART: [state] Locking ICCM
3,935,525 UART: [exit] Launching FMC @ 0x40000130
3,940,854 UART:
3,940,870 UART: Running Caliptra FMC ...
3,941,278 UART:
3,941,421 UART: [state] CFI Enabled
3,942,912 UART: [aliasrt :skip pcr extension
3,943,385 UART: [art] Extend RT PCRs Done
3,943,813 UART: [art] Lock RT PCRs Done
3,945,238 UART: [art] Populate DV Done
3,953,634 UART: [fht] FMC Alias Private Key: 7
3,954,706 UART: [art] Derive CDI
3,954,986 UART: [art] Store in in slot 0x4
4,040,739 UART: [art] Derive Key Pair
4,041,099 UART: [art] Store priv key in slot 0x5
4,053,679 UART: [art] Derive Key Pair - Done
4,068,459 UART: [art] Signing Cert with AUTHO
4,068,939 UART: RITY.KEYID = 7
4,084,461 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,226 UART: [art] PUB.X = 159E2667C691AC36CFE2179B358B1A89C6A8F142F837C7489C9AB314AD0B0583AD51F1DB7D3AC1CFE40E58E5DB1C039D
4,091,998 UART: [art] PUB.Y = 1AE3964F9AE1DBF6053A6615917196D94EE7B28D5BEDD5373CAD545DF4C46026F79394F07A9845409C7E478F319702C5
4,098,942 UART: [art] SIG.R = F941984E5091793509C45C5EB848727001DAA328AF254F0DC9DF5F8AA55CBBD742176605B5B077E6C941977C3FD3EC1A
4,105,704 UART: [art] SIG.S = 89D9C4566E873FD63FE5E2BA0BDD15FE072BDE4172CBA5E1343722F171FE6A30B4C264C07E9C797C88813FFAA8BC758D
4,129,215 UART: mbox::rt_entry...
4,129,587 UART: ____ _ _ _ ____ _____
4,130,371 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,131,171 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,939 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,707 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,475 UART: |_|
4,133,787 UART:
4,426,770 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,428,850 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Production
85,824 UART: [state] DebugLocked = Yes
86,464 UART: [state] Starting the WD Timer 40000000 cycles
88,011 UART: [kat] SHA2-256
891,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,690 UART: [kat] ++
895,842 UART: [kat] sha1
900,108 UART: [kat] SHA2-256
902,048 UART: [kat] SHA2-384
904,905 UART: [kat] SHA2-512-ACC
906,806 UART: [kat] ECC-384
916,453 UART: [kat] HMAC-384Kdf
920,935 UART: [kat] LMS
1,169,247 UART: [kat] --
1,170,294 UART: [cold-reset] ++
1,170,789 UART: [fht] FHT @ 0x50003400
1,173,589 UART: [idev] ++
1,173,757 UART: [idev] CDI.KEYID = 6
1,174,118 UART: [idev] SUBJECT.KEYID = 7
1,174,543 UART: [idev] UDS.KEYID = 0
1,174,889 ready_for_fw is high
1,174,889 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,592 UART: [idev] Erasing UDS.KEYID = 0
1,200,211 UART: [idev] Sha1 KeyId Algorithm
1,208,996 UART: [idev] --
1,210,117 UART: [ldev] ++
1,210,285 UART: [ldev] CDI.KEYID = 6
1,210,649 UART: [ldev] SUBJECT.KEYID = 5
1,211,076 UART: [ldev] AUTHORITY.KEYID = 7
1,211,539 UART: [ldev] FE.KEYID = 1
1,216,869 UART: [ldev] Erasing FE.KEYID = 1
1,243,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,834 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,528 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,398 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,104 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,124 UART: [ldev] --
1,282,534 UART: [fwproc] Wait for Commands...
1,283,319 UART: [fwproc] Recv command 0x46574c44
1,284,052 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,315 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,624 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,971 >>> mbox cmd response: success
2,338,097 UART: [afmc] ++
2,338,265 UART: [afmc] CDI.KEYID = 6
2,338,628 UART: [afmc] SUBJECT.KEYID = 7
2,339,054 UART: [afmc] AUTHORITY.KEYID = 5
2,374,287 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,581 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,332 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,051 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,944 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,651 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,526 UART: [afmc] --
2,417,583 UART: [cold-reset] --
2,418,565 UART: [state] Locking Datavault
2,419,922 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,526 UART: [state] Locking ICCM
2,420,956 UART: [exit] Launching FMC @ 0x40000130
2,426,285 UART:
2,426,301 UART: Running Caliptra FMC ...
2,426,709 UART:
2,426,852 UART: [state] CFI Enabled
2,437,389 UART: [fht] FMC Alias Private Key: 7
2,545,564 UART: [art] Extend RT PCRs Done
2,545,992 UART: [art] Lock RT PCRs Done
2,547,710 UART: [art] Populate DV Done
2,555,840 UART: [fht] FMC Alias Private Key: 7
2,556,830 UART: [art] Derive CDI
2,557,110 UART: [art] Store in in slot 0x4
2,643,145 UART: [art] Derive Key Pair
2,643,505 UART: [art] Store priv key in slot 0x5
2,656,743 UART: [art] Derive Key Pair - Done
2,671,498 UART: [art] Signing Cert with AUTHO
2,671,978 UART: RITY.KEYID = 7
2,687,336 UART: [art] Erasing AUTHORITY.KEYID = 7
2,688,101 UART: [art] PUB.X = 8BB4D21075BB868F5B1FF68EF26CBDE0C0BECD58C3B855A025E01AD43C29B4F8BD624315E80C5AC913043987BCB5862B
2,694,881 UART: [art] PUB.Y = AF987A7F4AF70BC069412DAA0D4617F5C363D37C47022EA3571ED6A978415C21089E5ED02164447BB9C41E2D5DF57E8D
2,701,825 UART: [art] SIG.R = 39E076CE3DA61AA3066B705CB6AE42AC279892F874A8C64B6AEDEC23E45A1D6688F16DBF237246EB3F195FCBADA9A489
2,708,610 UART: [art] SIG.S = E517918E61BA674440C9224C50A11136662BF75777BFE6F6DB929FB735EC9EA369265BE85243E2F33353A461F786E788
2,732,467 UART: mbox::rt_entry...
2,732,839 UART: ____ _ _ _ ____ _____
2,733,623 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,423 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,735,191 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,959 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,727 UART: |_|
2,737,039 UART:
2,844,251 UART: [rt] Runtime listening for mailbox commands...
2,845,013 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,845,233 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,845,327 UART:
2,845,343 UART: Running Caliptra ROM ...
2,845,751 UART:
2,845,893 UART: [state] CFI Enabled
2,848,906 UART: [state] LifecycleState = Production
2,849,514 UART: [state] DebugLocked = Yes
2,850,022 UART: [state] Starting the WD Timer 40000000 cycles
2,851,685 UART: [kat] SHA2-256
3,655,235 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,659,364 UART: [kat] ++
3,659,516 UART: [kat] sha1
3,663,918 UART: [kat] SHA2-256
3,665,858 UART: [kat] SHA2-384
3,668,609 UART: [kat] SHA2-512-ACC
3,670,510 UART: [kat] ECC-384
3,680,211 UART: [kat] HMAC-384Kdf
3,684,901 UART: [kat] LMS
3,933,213 UART: [kat] --
3,934,081 UART: [warm-reset] ++
3,934,662 UART: [warm-reset] --
3,935,391 UART: [state] Locking Datavault
3,936,197 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,801 UART: [state] Locking ICCM
3,937,361 UART: [exit] Launching FMC @ 0x40000130
3,942,690 UART:
3,942,706 UART: Running Caliptra FMC ...
3,943,114 UART:
3,943,257 UART: [state] CFI Enabled
3,944,552 UART: [aliasrt :skip pcr extension
3,945,025 UART: [art] Extend RT PCRs Done
3,945,453 UART: [art] Lock RT PCRs Done
3,946,502 UART: [art] Populate DV Done
3,954,734 UART: [fht] FMC Alias Private Key: 7
3,955,712 UART: [art] Derive CDI
3,955,992 UART: [art] Store in in slot 0x4
4,041,759 UART: [art] Derive Key Pair
4,042,119 UART: [art] Store priv key in slot 0x5
4,055,711 UART: [art] Derive Key Pair - Done
4,070,442 UART: [art] Signing Cert with AUTHO
4,070,922 UART: RITY.KEYID = 7
4,086,248 UART: [art] Erasing AUTHORITY.KEYID = 7
4,087,013 UART: [art] PUB.X = 8BB4D21075BB868F5B1FF68EF26CBDE0C0BECD58C3B855A025E01AD43C29B4F8BD624315E80C5AC913043987BCB5862B
4,093,793 UART: [art] PUB.Y = AF987A7F4AF70BC069412DAA0D4617F5C363D37C47022EA3571ED6A978415C21089E5ED02164447BB9C41E2D5DF57E8D
4,100,737 UART: [art] SIG.R = 39E076CE3DA61AA3066B705CB6AE42AC279892F874A8C64B6AEDEC23E45A1D6688F16DBF237246EB3F195FCBADA9A489
4,107,522 UART: [art] SIG.S = E517918E61BA674440C9224C50A11136662BF75777BFE6F6DB929FB735EC9EA369265BE85243E2F33353A461F786E788
4,131,201 UART: mbox::rt_entry...
4,131,573 UART: ____ _ _ _ ____ _____
4,132,357 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,133,157 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,133,925 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,134,693 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,135,461 UART: |_|
4,135,773 UART:
4,429,068 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,431,216 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,867 UART: [state] LifecycleState = Production
86,475 UART: [state] DebugLocked = Yes
87,111 UART: [state] Starting the WD Timer 40000000 cycles
88,746 UART: [kat] SHA2-256
892,296 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,425 UART: [kat] ++
896,577 UART: [kat] sha1
900,907 UART: [kat] SHA2-256
902,847 UART: [kat] SHA2-384
905,662 UART: [kat] SHA2-512-ACC
907,563 UART: [kat] ECC-384
917,196 UART: [kat] HMAC-384Kdf
921,860 UART: [kat] LMS
1,170,172 UART: [kat] --
1,170,965 UART: [cold-reset] ++
1,171,520 UART: [fht] FHT @ 0x50003400
1,174,150 UART: [idev] ++
1,174,318 UART: [idev] CDI.KEYID = 6
1,174,679 UART: [idev] SUBJECT.KEYID = 7
1,175,104 UART: [idev] UDS.KEYID = 0
1,175,450 ready_for_fw is high
1,175,450 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,849 UART: [idev] Erasing UDS.KEYID = 0
1,199,864 UART: [idev] Sha1 KeyId Algorithm
1,208,737 UART: [idev] --
1,209,584 UART: [ldev] ++
1,209,752 UART: [ldev] CDI.KEYID = 6
1,210,116 UART: [ldev] SUBJECT.KEYID = 5
1,210,543 UART: [ldev] AUTHORITY.KEYID = 7
1,211,006 UART: [ldev] FE.KEYID = 1
1,216,348 UART: [ldev] Erasing FE.KEYID = 1
1,243,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,717 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,411 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,281 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,987 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,143 UART: [ldev] --
1,282,487 UART: [fwproc] Wait for Commands...
1,283,242 UART: [fwproc] Recv command 0x46574c44
1,283,975 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,680 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,989 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,310 >>> mbox cmd response: success
2,338,412 UART: [afmc] ++
2,338,580 UART: [afmc] CDI.KEYID = 6
2,338,943 UART: [afmc] SUBJECT.KEYID = 7
2,339,369 UART: [afmc] AUTHORITY.KEYID = 5
2,374,212 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,942 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,693 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,412 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,305 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,012 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,047 UART: [afmc] --
2,418,024 UART: [cold-reset] --
2,418,948 UART: [state] Locking Datavault
2,420,117 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,721 UART: [state] Locking ICCM
2,421,281 UART: [exit] Launching FMC @ 0x40000130
2,426,610 UART:
2,426,626 UART: Running Caliptra FMC ...
2,427,034 UART:
2,427,088 UART: [state] CFI Enabled
2,437,323 UART: [fht] FMC Alias Private Key: 7
2,544,794 UART: [art] Extend RT PCRs Done
2,545,222 UART: [art] Lock RT PCRs Done
2,546,614 UART: [art] Populate DV Done
2,554,980 UART: [fht] FMC Alias Private Key: 7
2,556,124 UART: [art] Derive CDI
2,556,404 UART: [art] Store in in slot 0x4
2,642,037 UART: [art] Derive Key Pair
2,642,397 UART: [art] Store priv key in slot 0x5
2,655,551 UART: [art] Derive Key Pair - Done
2,670,147 UART: [art] Signing Cert with AUTHO
2,670,627 UART: RITY.KEYID = 7
2,685,597 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,362 UART: [art] PUB.X = 99AA8D0BC04E0AFE116F04BFEE1D201E8BEEC841A1AD4E074784D5BFD1A10592FAF81657FB02A7280CAE067A2699FA32
2,693,128 UART: [art] PUB.Y = 3225512FFE21CBA78F9283A0BE459C6E45AAE00CC3A63AAA319588E98048138FD032B2FAE2530ED010D76F392BB4E0DE
2,700,084 UART: [art] SIG.R = A12018FCBB0AEBB65B9AB497F910BFB1AFA17A007C6E133498AAF95AA7A1B46F3F533C4A47D4C5780374676C4C599DC3
2,706,842 UART: [art] SIG.S = 5D46F5A93AFE4AA1D24C8ADC574019D49058C287B6189F4EA5C7D40351FC0156546BF6E52FE1F77BAA2ED4D1EB21E531
2,730,611 UART: mbox::rt_entry...
2,730,983 UART: ____ _ _ _ ____ _____
2,731,767 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,567 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,335 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,103 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,871 UART: |_|
2,735,183 UART:
2,842,883 UART: [rt] Runtime listening for mailbox commands...
2,843,645 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,843,865 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,959 UART:
2,843,975 UART: Running Caliptra ROM ...
2,844,383 UART:
2,844,438 UART: [state] CFI Enabled
2,847,029 UART: [state] LifecycleState = Production
2,847,637 UART: [state] DebugLocked = Yes
2,848,291 UART: [state] Starting the WD Timer 40000000 cycles
2,849,918 UART: [kat] SHA2-256
3,653,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,597 UART: [kat] ++
3,657,749 UART: [kat] sha1
3,662,149 UART: [kat] SHA2-256
3,664,089 UART: [kat] SHA2-384
3,667,032 UART: [kat] SHA2-512-ACC
3,668,933 UART: [kat] ECC-384
3,678,724 UART: [kat] HMAC-384Kdf
3,683,518 UART: [kat] LMS
3,931,830 UART: [kat] --
3,932,764 UART: [warm-reset] ++
3,933,625 UART: [warm-reset] --
3,934,570 UART: [state] Locking Datavault
3,935,232 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,836 UART: [state] Locking ICCM
3,936,366 UART: [exit] Launching FMC @ 0x40000130
3,941,695 UART:
3,941,711 UART: Running Caliptra FMC ...
3,942,119 UART:
3,942,173 UART: [state] CFI Enabled
3,943,364 UART: [aliasrt :skip pcr extension
3,943,837 UART: [art] Extend RT PCRs Done
3,944,265 UART: [art] Lock RT PCRs Done
3,945,462 UART: [art] Populate DV Done
3,953,814 UART: [fht] FMC Alias Private Key: 7
3,954,978 UART: [art] Derive CDI
3,955,258 UART: [art] Store in in slot 0x4
4,040,871 UART: [art] Derive Key Pair
4,041,231 UART: [art] Store priv key in slot 0x5
4,054,071 UART: [art] Derive Key Pair - Done
4,069,011 UART: [art] Signing Cert with AUTHO
4,069,491 UART: RITY.KEYID = 7
4,084,973 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,738 UART: [art] PUB.X = 99AA8D0BC04E0AFE116F04BFEE1D201E8BEEC841A1AD4E074784D5BFD1A10592FAF81657FB02A7280CAE067A2699FA32
4,092,504 UART: [art] PUB.Y = 3225512FFE21CBA78F9283A0BE459C6E45AAE00CC3A63AAA319588E98048138FD032B2FAE2530ED010D76F392BB4E0DE
4,099,460 UART: [art] SIG.R = A12018FCBB0AEBB65B9AB497F910BFB1AFA17A007C6E133498AAF95AA7A1B46F3F533C4A47D4C5780374676C4C599DC3
4,106,218 UART: [art] SIG.S = 5D46F5A93AFE4AA1D24C8ADC574019D49058C287B6189F4EA5C7D40351FC0156546BF6E52FE1F77BAA2ED4D1EB21E531
4,130,491 UART: mbox::rt_entry...
4,130,863 UART: ____ _ _ _ ____ _____
4,131,647 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,132,447 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,133,215 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,133,983 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,134,751 UART: |_|
4,135,063 UART:
4,430,910 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,433,108 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Production
85,811 UART: [state] DebugLocked = Yes
86,319 UART: [state] Starting the WD Timer 40000000 cycles
87,986 UART: [kat] SHA2-256
891,536 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,665 UART: [kat] ++
895,817 UART: [kat] sha1
900,091 UART: [kat] SHA2-256
902,031 UART: [kat] SHA2-384
904,898 UART: [kat] SHA2-512-ACC
906,799 UART: [kat] ECC-384
916,442 UART: [kat] HMAC-384Kdf
920,934 UART: [kat] LMS
1,169,246 UART: [kat] --
1,170,257 UART: [cold-reset] ++
1,170,782 UART: [fht] FHT @ 0x50003400
1,173,466 UART: [idev] ++
1,173,634 UART: [idev] CDI.KEYID = 6
1,173,995 UART: [idev] SUBJECT.KEYID = 7
1,174,420 UART: [idev] UDS.KEYID = 0
1,174,766 ready_for_fw is high
1,174,766 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,993 UART: [idev] Erasing UDS.KEYID = 0
1,199,010 UART: [idev] Sha1 KeyId Algorithm
1,207,765 UART: [idev] --
1,208,924 UART: [ldev] ++
1,209,092 UART: [ldev] CDI.KEYID = 6
1,209,456 UART: [ldev] SUBJECT.KEYID = 5
1,209,883 UART: [ldev] AUTHORITY.KEYID = 7
1,210,346 UART: [ldev] FE.KEYID = 1
1,215,440 UART: [ldev] Erasing FE.KEYID = 1
1,241,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,235 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,929 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,799 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,505 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,601 UART: [ldev] --
1,281,075 UART: [fwproc] Wait for Commands...
1,281,874 UART: [fwproc] Recv command 0x46574c44
1,282,607 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,796 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,105 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,536 >>> mbox cmd response: success
2,337,634 UART: [afmc] ++
2,337,802 UART: [afmc] CDI.KEYID = 6
2,338,165 UART: [afmc] SUBJECT.KEYID = 7
2,338,591 UART: [afmc] AUTHORITY.KEYID = 5
2,373,908 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,857 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,576 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,469 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,176 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,009 UART: [afmc] --
2,417,116 UART: [cold-reset] --
2,418,050 UART: [state] Locking Datavault
2,419,021 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,625 UART: [state] Locking ICCM
2,420,223 UART: [exit] Launching FMC @ 0x40000130
2,425,552 UART:
2,425,568 UART: Running Caliptra FMC ...
2,425,976 UART:
2,426,030 UART: [state] CFI Enabled
2,436,519 UART: [fht] FMC Alias Private Key: 7
2,544,346 UART: [art] Extend RT PCRs Done
2,544,774 UART: [art] Lock RT PCRs Done
2,546,454 UART: [art] Populate DV Done
2,554,556 UART: [fht] FMC Alias Private Key: 7
2,555,632 UART: [art] Derive CDI
2,555,912 UART: [art] Store in in slot 0x4
2,641,595 UART: [art] Derive Key Pair
2,641,955 UART: [art] Store priv key in slot 0x5
2,655,135 UART: [art] Derive Key Pair - Done
2,669,955 UART: [art] Signing Cert with AUTHO
2,670,435 UART: RITY.KEYID = 7
2,685,297 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,062 UART: [art] PUB.X = C9884F7A682CB44F5DC249ACA3AB95CB219BC6251B6393B09F099FC81F23F26510A4486CC8991AB82E259CE289B6EBB4
2,692,839 UART: [art] PUB.Y = A98A7E5989997A57E63F32E72C69EE2D15786279B0182A35ED361FCEFDFE639D005C31C86DBC834D5E72BA1B2879AC63
2,699,775 UART: [art] SIG.R = AA59CBEFEB223E1F24C8157BAA7B970593E1CD9312C24317A43EFB99465AB7C6F584136473FC1A612CB316225B252482
2,706,546 UART: [art] SIG.S = 5857DD39AF9B60856E575573DA12A315A84100D68DC5949AAFF45D7816C25D802A69EC56949EEEBC654BE417A635C8AF
2,729,779 UART: mbox::rt_entry...
2,730,151 UART: ____ _ _ _ ____ _____
2,730,935 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,735 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,503 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,271 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,039 UART: |_|
2,734,351 UART:
2,840,717 UART: [rt] Runtime listening for mailbox commands...
2,841,479 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,841,699 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,793 UART:
2,841,809 UART: Running Caliptra ROM ...
2,842,217 UART:
2,842,272 UART: [state] CFI Enabled
2,844,753 UART: [state] LifecycleState = Production
2,845,361 UART: [state] DebugLocked = Yes
2,845,981 UART: [state] Starting the WD Timer 40000000 cycles
2,847,528 UART: [kat] SHA2-256
3,651,078 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,207 UART: [kat] ++
3,655,359 UART: [kat] sha1
3,659,781 UART: [kat] SHA2-256
3,661,721 UART: [kat] SHA2-384
3,664,522 UART: [kat] SHA2-512-ACC
3,666,423 UART: [kat] ECC-384
3,675,644 UART: [kat] HMAC-384Kdf
3,680,306 UART: [kat] LMS
3,928,618 UART: [kat] --
3,929,466 UART: [warm-reset] ++
3,930,431 UART: [warm-reset] --
3,931,478 UART: [state] Locking Datavault
3,932,432 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,036 UART: [state] Locking ICCM
3,933,608 UART: [exit] Launching FMC @ 0x40000130
3,938,937 UART:
3,938,953 UART: Running Caliptra FMC ...
3,939,361 UART:
3,939,415 UART: [state] CFI Enabled
3,940,830 UART: [aliasrt :skip pcr extension
3,941,303 UART: [art] Extend RT PCRs Done
3,941,731 UART: [art] Lock RT PCRs Done
3,943,144 UART: [art] Populate DV Done
3,951,618 UART: [fht] FMC Alias Private Key: 7
3,952,664 UART: [art] Derive CDI
3,952,944 UART: [art] Store in in slot 0x4
4,038,363 UART: [art] Derive Key Pair
4,038,723 UART: [art] Store priv key in slot 0x5
4,051,641 UART: [art] Derive Key Pair - Done
4,066,267 UART: [art] Signing Cert with AUTHO
4,066,747 UART: RITY.KEYID = 7
4,081,731 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,496 UART: [art] PUB.X = C9884F7A682CB44F5DC249ACA3AB95CB219BC6251B6393B09F099FC81F23F26510A4486CC8991AB82E259CE289B6EBB4
4,089,273 UART: [art] PUB.Y = A98A7E5989997A57E63F32E72C69EE2D15786279B0182A35ED361FCEFDFE639D005C31C86DBC834D5E72BA1B2879AC63
4,096,209 UART: [art] SIG.R = AA59CBEFEB223E1F24C8157BAA7B970593E1CD9312C24317A43EFB99465AB7C6F584136473FC1A612CB316225B252482
4,102,980 UART: [art] SIG.S = 5857DD39AF9B60856E575573DA12A315A84100D68DC5949AAFF45D7816C25D802A69EC56949EEEBC654BE417A635C8AF
4,126,803 UART: mbox::rt_entry...
4,127,175 UART: ____ _ _ _ ____ _____
4,127,959 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,128,759 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,129,527 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,295 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,063 UART: |_|
4,131,375 UART:
4,428,724 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,430,888 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Production
85,664 UART: [state] DebugLocked = Yes
86,184 UART: [state] Starting the WD Timer 40000000 cycles
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,990 UART: [kat] SHA2-256
901,930 UART: [kat] SHA2-384
904,667 UART: [kat] SHA2-512-ACC
906,568 UART: [kat] ECC-384
916,431 UART: [kat] HMAC-384Kdf
921,095 UART: [kat] LMS
1,169,407 UART: [kat] --
1,170,400 UART: [cold-reset] ++
1,170,801 UART: [fht] FHT @ 0x50003400
1,173,525 UART: [idev] ++
1,173,693 UART: [idev] CDI.KEYID = 6
1,174,054 UART: [idev] SUBJECT.KEYID = 7
1,174,479 UART: [idev] UDS.KEYID = 0
1,174,825 ready_for_fw is high
1,174,825 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,634 UART: [idev] Erasing UDS.KEYID = 0
1,199,415 UART: [idev] Sha1 KeyId Algorithm
1,208,244 UART: [idev] --
1,209,087 UART: [ldev] ++
1,209,255 UART: [ldev] CDI.KEYID = 6
1,209,619 UART: [ldev] SUBJECT.KEYID = 5
1,210,046 UART: [ldev] AUTHORITY.KEYID = 7
1,210,509 UART: [ldev] FE.KEYID = 1
1,215,595 UART: [ldev] Erasing FE.KEYID = 1
1,242,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,920 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,614 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,484 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,190 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,268 UART: [ldev] --
1,281,750 UART: [fwproc] Wait for Commands...
1,282,485 UART: [fwproc] Recv command 0x46574c44
1,283,218 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,501 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,810 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,217 >>> mbox cmd response: success
2,337,441 UART: [afmc] ++
2,337,609 UART: [afmc] CDI.KEYID = 6
2,337,972 UART: [afmc] SUBJECT.KEYID = 7
2,338,398 UART: [afmc] AUTHORITY.KEYID = 5
2,373,971 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,243 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,994 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,713 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,606 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,313 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,384 UART: [afmc] --
2,417,389 UART: [cold-reset] --
2,418,167 UART: [state] Locking Datavault
2,419,454 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,058 UART: [state] Locking ICCM
2,420,516 UART: [exit] Launching FMC @ 0x40000130
2,425,845 UART:
2,425,861 UART: Running Caliptra FMC ...
2,426,269 UART:
2,426,412 UART: [state] CFI Enabled
2,437,047 UART: [fht] FMC Alias Private Key: 7
2,545,054 UART: [art] Extend RT PCRs Done
2,545,482 UART: [art] Lock RT PCRs Done
2,546,830 UART: [art] Populate DV Done
2,555,076 UART: [fht] FMC Alias Private Key: 7
2,556,126 UART: [art] Derive CDI
2,556,406 UART: [art] Store in in slot 0x4
2,641,881 UART: [art] Derive Key Pair
2,642,241 UART: [art] Store priv key in slot 0x5
2,655,587 UART: [art] Derive Key Pair - Done
2,670,566 UART: [art] Signing Cert with AUTHO
2,671,046 UART: RITY.KEYID = 7
2,686,298 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,063 UART: [art] PUB.X = 1CE21BABA7D801A6FDA4E6BAEEB087747844356996791A978AE3C2785BED7375A0803CF1088A8A9D3729D77057908F47
2,693,829 UART: [art] PUB.Y = D83DCDD49626B687662CE617B0E5E61AB14C31A40669CD7E5D943C80DF09118121F9563AC54B8CF9F3309A28F92F081E
2,700,774 UART: [art] SIG.R = 02576EF9534319B4D9A67295EEAA9D4FBD7B22EFF7E4563E61DF5A7D5FE68B6F735C0C027512C38C4080961CB5F34420
2,707,541 UART: [art] SIG.S = 8F59144D0305FB5E09E057A37B14AE7E467F97915B07C0B43E277C042C994121DA242E7E4E979E366265FE1E20A3D612
2,730,655 UART: mbox::rt_entry...
2,731,027 UART: ____ _ _ _ ____ _____
2,731,811 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,611 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,379 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,147 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,915 UART: |_|
2,735,227 UART:
2,842,353 UART: [rt] Runtime listening for mailbox commands...
2,843,115 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,843,335 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,429 UART:
2,843,445 UART: Running Caliptra ROM ...
2,843,853 UART:
2,843,995 UART: [state] CFI Enabled
2,846,696 UART: [state] LifecycleState = Production
2,847,304 UART: [state] DebugLocked = Yes
2,847,818 UART: [state] Starting the WD Timer 40000000 cycles
2,849,399 UART: [kat] SHA2-256
3,652,949 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,078 UART: [kat] ++
3,657,230 UART: [kat] sha1
3,661,676 UART: [kat] SHA2-256
3,663,616 UART: [kat] SHA2-384
3,666,447 UART: [kat] SHA2-512-ACC
3,668,348 UART: [kat] ECC-384
3,677,969 UART: [kat] HMAC-384Kdf
3,682,617 UART: [kat] LMS
3,930,929 UART: [kat] --
3,931,855 UART: [warm-reset] ++
3,932,708 UART: [warm-reset] --
3,933,481 UART: [state] Locking Datavault
3,934,305 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,909 UART: [state] Locking ICCM
3,935,501 UART: [exit] Launching FMC @ 0x40000130
3,940,830 UART:
3,940,846 UART: Running Caliptra FMC ...
3,941,254 UART:
3,941,397 UART: [state] CFI Enabled
3,942,800 UART: [aliasrt :skip pcr extension
3,943,273 UART: [art] Extend RT PCRs Done
3,943,701 UART: [art] Lock RT PCRs Done
3,944,978 UART: [art] Populate DV Done
3,953,184 UART: [fht] FMC Alias Private Key: 7
3,954,286 UART: [art] Derive CDI
3,954,566 UART: [art] Store in in slot 0x4
4,040,303 UART: [art] Derive Key Pair
4,040,663 UART: [art] Store priv key in slot 0x5
4,054,559 UART: [art] Derive Key Pair - Done
4,069,456 UART: [art] Signing Cert with AUTHO
4,069,936 UART: RITY.KEYID = 7
4,085,666 UART: [art] Erasing AUTHORITY.KEYID = 7
4,086,431 UART: [art] PUB.X = 1CE21BABA7D801A6FDA4E6BAEEB087747844356996791A978AE3C2785BED7375A0803CF1088A8A9D3729D77057908F47
4,093,197 UART: [art] PUB.Y = D83DCDD49626B687662CE617B0E5E61AB14C31A40669CD7E5D943C80DF09118121F9563AC54B8CF9F3309A28F92F081E
4,100,142 UART: [art] SIG.R = 02576EF9534319B4D9A67295EEAA9D4FBD7B22EFF7E4563E61DF5A7D5FE68B6F735C0C027512C38C4080961CB5F34420
4,106,909 UART: [art] SIG.S = 8F59144D0305FB5E09E057A37B14AE7E467F97915B07C0B43E277C042C994121DA242E7E4E979E366265FE1E20A3D612
4,130,943 UART: mbox::rt_entry...
4,131,315 UART: ____ _ _ _ ____ _____
4,132,099 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,132,899 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,133,667 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,134,435 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,135,203 UART: |_|
4,135,515 UART:
4,428,510 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,430,778 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Production
86,060 UART: [state] DebugLocked = Yes
86,706 UART: [state] Starting the WD Timer 40000000 cycles
88,275 UART: [kat] SHA2-256
891,825 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,954 UART: [kat] ++
896,106 UART: [kat] sha1
900,486 UART: [kat] SHA2-256
902,426 UART: [kat] SHA2-384
905,279 UART: [kat] SHA2-512-ACC
907,180 UART: [kat] ECC-384
916,863 UART: [kat] HMAC-384Kdf
921,437 UART: [kat] LMS
1,169,749 UART: [kat] --
1,170,534 UART: [cold-reset] ++
1,171,031 UART: [fht] FHT @ 0x50003400
1,173,571 UART: [idev] ++
1,173,739 UART: [idev] CDI.KEYID = 6
1,174,100 UART: [idev] SUBJECT.KEYID = 7
1,174,525 UART: [idev] UDS.KEYID = 0
1,174,871 ready_for_fw is high
1,174,871 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,554 UART: [idev] Erasing UDS.KEYID = 0
1,199,663 UART: [idev] Sha1 KeyId Algorithm
1,208,484 UART: [idev] --
1,209,455 UART: [ldev] ++
1,209,623 UART: [ldev] CDI.KEYID = 6
1,209,987 UART: [ldev] SUBJECT.KEYID = 5
1,210,414 UART: [ldev] AUTHORITY.KEYID = 7
1,210,877 UART: [ldev] FE.KEYID = 1
1,215,865 UART: [ldev] Erasing FE.KEYID = 1
1,242,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,484 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,178 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,048 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,754 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,658 UART: [ldev] --
1,281,948 UART: [fwproc] Wait for Commands...
1,282,659 UART: [fwproc] Recv command 0x46574c44
1,283,392 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,725 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,034 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,297 >>> mbox cmd response: success
2,337,475 UART: [afmc] ++
2,337,643 UART: [afmc] CDI.KEYID = 6
2,338,006 UART: [afmc] SUBJECT.KEYID = 7
2,338,432 UART: [afmc] AUTHORITY.KEYID = 5
2,374,417 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,641 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,392 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,111 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,004 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,711 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,414 UART: [afmc] --
2,417,481 UART: [cold-reset] --
2,418,577 UART: [state] Locking Datavault
2,419,906 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,510 UART: [state] Locking ICCM
2,421,112 UART: [exit] Launching FMC @ 0x40000130
2,426,441 UART:
2,426,457 UART: Running Caliptra FMC ...
2,426,865 UART:
2,427,008 UART: [state] CFI Enabled
2,437,841 UART: [fht] FMC Alias Private Key: 7
2,545,728 UART: [art] Extend RT PCRs Done
2,546,156 UART: [art] Lock RT PCRs Done
2,547,464 UART: [art] Populate DV Done
2,555,702 UART: [fht] FMC Alias Private Key: 7
2,556,874 UART: [art] Derive CDI
2,557,154 UART: [art] Store in in slot 0x4
2,642,643 UART: [art] Derive Key Pair
2,643,003 UART: [art] Store priv key in slot 0x5
2,656,247 UART: [art] Derive Key Pair - Done
2,670,980 UART: [art] Signing Cert with AUTHO
2,671,460 UART: RITY.KEYID = 7
2,687,034 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,799 UART: [art] PUB.X = 2D21D5FA631B92793483963FD3E763D53844A9E829CD4C7B8901CB8DAF70BFB36A116B11CE2B61BE133E3DDD7CFC7793
2,694,578 UART: [art] PUB.Y = B68F468384F56EA97DDD201BCE39E6920847E9A62A3EB89DFF5BC508CDB101A4252660E537EAE9ADCC34D27BED8DCF74
2,701,539 UART: [art] SIG.R = 52F7064B498D2A8D2E53D80E7E38DF841B0A0AADC28775672AFB4A0A6EE001B52558393B059E546845E75F4045BE8777
2,708,288 UART: [art] SIG.S = 1E53621B1831A080B51743FC0B3E9F7C597AE0BD83392316CAAB4D7130AA67932AFC631B518179A729B75E7EAE51DCE6
2,732,132 UART: mbox::rt_entry...
2,732,504 UART: ____ _ _ _ ____ _____
2,733,288 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,088 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,856 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,624 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,392 UART: |_|
2,736,704 UART:
2,842,209 UART: [rt] Runtime listening for mailbox commands...
2,842,971 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,843,191 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,285 UART:
2,843,301 UART: Running Caliptra ROM ...
2,843,709 UART:
2,843,851 UART: [state] CFI Enabled
2,846,712 UART: [state] LifecycleState = Production
2,847,320 UART: [state] DebugLocked = Yes
2,847,956 UART: [state] Starting the WD Timer 40000000 cycles
2,849,583 UART: [kat] SHA2-256
3,653,133 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,262 UART: [kat] ++
3,657,414 UART: [kat] sha1
3,661,674 UART: [kat] SHA2-256
3,663,614 UART: [kat] SHA2-384
3,666,467 UART: [kat] SHA2-512-ACC
3,668,368 UART: [kat] ECC-384
3,678,029 UART: [kat] HMAC-384Kdf
3,682,849 UART: [kat] LMS
3,931,161 UART: [kat] --
3,931,963 UART: [warm-reset] ++
3,933,014 UART: [warm-reset] --
3,933,703 UART: [state] Locking Datavault
3,934,535 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,139 UART: [state] Locking ICCM
3,935,745 UART: [exit] Launching FMC @ 0x40000130
3,941,074 UART:
3,941,090 UART: Running Caliptra FMC ...
3,941,498 UART:
3,941,641 UART: [state] CFI Enabled
3,943,338 UART: [aliasrt :skip pcr extension
3,943,811 UART: [art] Extend RT PCRs Done
3,944,239 UART: [art] Lock RT PCRs Done
3,945,372 UART: [art] Populate DV Done
3,953,278 UART: [fht] FMC Alias Private Key: 7
3,954,460 UART: [art] Derive CDI
3,954,740 UART: [art] Store in in slot 0x4
4,040,253 UART: [art] Derive Key Pair
4,040,613 UART: [art] Store priv key in slot 0x5
4,053,417 UART: [art] Derive Key Pair - Done
4,068,178 UART: [art] Signing Cert with AUTHO
4,068,658 UART: RITY.KEYID = 7
4,084,216 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,981 UART: [art] PUB.X = 2D21D5FA631B92793483963FD3E763D53844A9E829CD4C7B8901CB8DAF70BFB36A116B11CE2B61BE133E3DDD7CFC7793
4,091,760 UART: [art] PUB.Y = B68F468384F56EA97DDD201BCE39E6920847E9A62A3EB89DFF5BC508CDB101A4252660E537EAE9ADCC34D27BED8DCF74
4,098,721 UART: [art] SIG.R = 52F7064B498D2A8D2E53D80E7E38DF841B0A0AADC28775672AFB4A0A6EE001B52558393B059E546845E75F4045BE8777
4,105,470 UART: [art] SIG.S = 1E53621B1831A080B51743FC0B3E9F7C597AE0BD83392316CAAB4D7130AA67932AFC631B518179A729B75E7EAE51DCE6
4,128,772 UART: mbox::rt_entry...
4,129,144 UART: ____ _ _ _ ____ _____
4,129,928 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,728 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,496 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,264 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,032 UART: |_|
4,133,344 UART:
4,426,028 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,428,180 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,678 UART: [state] LifecycleState = Unprovisioned
86,337 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,436 UART: [fake-rom-cold-reset] ++
89,364 ready_for_fw is high
89,364 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
89,442 UART: [fht] FHT @ 0x50003400
92,783 UART: [fwproc] Wait for Commands...
93,500 UART: [fwproc] Recv command 0x46574c44
94,228 UART: [fwproc] Recv'd Img size: 99632 bytes
1,217,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,243,670 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,250,898 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,386,630 >>> mbox cmd response: success
1,387,788 UART: [fake-rom-cold-reset] --
1,388,610 UART: [state] Locking Datavault
1,389,715 UART: [state] Locking PCR0, PCR1 and PCR31
1,390,319 UART: [state] Locking ICCM
1,390,887 UART: [exit] Launching FMC @ 0x40000130
1,396,209 UART:
1,396,225 UART: Running Caliptra FMC ...
1,396,633 UART:
1,396,687 UART: [state] CFI Enabled
1,399,396 UART: Caliptra RT
1,399,649 UART: [state] CFI Enabled
1,500,330 UART: [rt] RT listening for mailbox commands...
1,501,000 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,090 UART: [rt]cmd =0x4c444556, len=4
1,541,631 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,541,632 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,053 UART: [rt]cmd =0x43455246, len=4
1,583,044 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
88,200 UART: [fake-rom-cold-reset] ++
89,128 ready_for_fw is high
89,128 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
89,224 UART: [fht] FHT @ 0x50003400
92,579 UART: [fwproc] Wait for Commands...
93,328 UART: [fwproc] Recv command 0x46574c44
94,056 UART: [fwproc] Recv'd Img size: 99632 bytes
1,218,907 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,245,950 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,253,178 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,388,896 >>> mbox cmd response: success
1,390,054 UART: [fake-rom-cold-reset] --
1,390,996 UART: [state] Locking Datavault
1,392,123 UART: [state] Locking PCR0, PCR1 and PCR31
1,392,727 UART: [state] Locking ICCM
1,393,385 UART: [exit] Launching FMC @ 0x40000130
1,398,707 UART:
1,398,723 UART: Running Caliptra FMC ...
1,399,131 UART:
1,399,185 UART: [state] CFI Enabled
1,401,804 UART: Caliptra RT
1,402,057 UART: [state] CFI Enabled
1,501,400 UART: [rt] RT listening for mailbox commands...
1,502,070 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,944 UART: [rt]cmd =0x4c444556, len=4
1,542,331 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,332 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,571 UART: [rt]cmd =0x43455246, len=4
1,583,572 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [fake-rom-cold-reset] ++
88,825 ready_for_fw is high
88,825 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
89,059 UART: [fht] FHT @ 0x50003400
92,436 UART: [fwproc] Wait for Commands...
93,271 UART: [fwproc] Recv command 0x46574c44
93,999 UART: [fwproc] Recv'd Img size: 99632 bytes
1,217,876 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,243,879 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,107 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,386,935 >>> mbox cmd response: success
1,388,093 UART: [fake-rom-cold-reset] --
1,388,761 UART: [state] Locking Datavault
1,389,832 UART: [state] Locking PCR0, PCR1 and PCR31
1,390,436 UART: [state] Locking ICCM
1,391,078 UART: [exit] Launching FMC @ 0x40000130
1,396,400 UART:
1,396,416 UART: Running Caliptra FMC ...
1,396,824 UART:
1,396,965 UART: [state] CFI Enabled
1,399,693 UART: Caliptra RT
1,400,038 UART: [state] CFI Enabled
1,500,957 UART: [rt] RT listening for mailbox commands...
1,501,627 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,697 UART: [rt]cmd =0x4c444556, len=4
1,542,032 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,033 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,334 UART: [rt]cmd =0x43455246, len=4
1,583,515 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,865 UART: [state] WD Timer not started. Device not locked for debugging
88,243 UART: [fake-rom-cold-reset] ++
89,171 ready_for_fw is high
89,171 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
89,327 UART: [fht] FHT @ 0x50003400
92,610 UART: [fwproc] Wait for Commands...
93,411 UART: [fwproc] Recv command 0x46574c44
94,139 UART: [fwproc] Recv'd Img size: 99632 bytes
1,216,934 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,243,527 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,250,755 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,386,497 >>> mbox cmd response: success
1,387,655 UART: [fake-rom-cold-reset] --
1,388,607 UART: [state] Locking Datavault
1,389,860 UART: [state] Locking PCR0, PCR1 and PCR31
1,390,464 UART: [state] Locking ICCM
1,391,134 UART: [exit] Launching FMC @ 0x40000130
1,396,456 UART:
1,396,472 UART: Running Caliptra FMC ...
1,396,880 UART:
1,397,021 UART: [state] CFI Enabled
1,399,837 UART: Caliptra RT
1,400,182 UART: [state] CFI Enabled
1,499,385 UART: [rt] RT listening for mailbox commands...
1,500,055 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,529,705 UART: [rt]cmd =0x4c444556, len=4
1,540,106 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,540,107 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,569,552 UART: [rt]cmd =0x43455246, len=4
1,581,643 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,069 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
88,252 UART: [fake-rom-cold-reset] ++
89,180 ready_for_fw is high
89,180 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
89,252 UART: [fht] FHT @ 0x50003400
92,585 UART: [fwproc] Wait for Commands...
93,414 UART: [fwproc] Recv command 0x46574c44
94,142 UART: [fwproc] Recv'd Img size: 99632 bytes
1,218,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,246,220 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,253,448 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,389,180 >>> mbox cmd response: success
1,390,338 UART: [fake-rom-cold-reset] --
1,391,360 UART: [state] Locking Datavault
1,392,813 UART: [state] Locking PCR0, PCR1 and PCR31
1,393,417 UART: [state] Locking ICCM
1,394,085 UART: [exit] Launching FMC @ 0x40000130
1,399,407 UART:
1,399,423 UART: Running Caliptra FMC ...
1,399,831 UART:
1,399,885 UART: [state] CFI Enabled
1,402,454 UART: Caliptra RT
1,402,707 UART: [state] CFI Enabled
1,502,066 UART: [rt] RT listening for mailbox commands...
1,502,736 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,532,362 UART: [rt]cmd =0x4c444556, len=4
1,542,661 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,662 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,915 UART: [rt]cmd =0x43455246, len=4
1,583,872 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,956 UART: [fake-rom-cold-reset] ++
88,884 ready_for_fw is high
88,884 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
89,000 UART: [fht] FHT @ 0x50003400
92,241 UART: [fwproc] Wait for Commands...
93,044 UART: [fwproc] Recv command 0x46574c44
93,772 UART: [fwproc] Recv'd Img size: 99632 bytes
1,216,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,003 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,231 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,386,957 >>> mbox cmd response: success
1,388,115 UART: [fake-rom-cold-reset] --
1,388,847 UART: [state] Locking Datavault
1,389,972 UART: [state] Locking PCR0, PCR1 and PCR31
1,390,576 UART: [state] Locking ICCM
1,391,180 UART: [exit] Launching FMC @ 0x40000130
1,396,502 UART:
1,396,518 UART: Running Caliptra FMC ...
1,396,926 UART:
1,396,980 UART: [state] CFI Enabled
1,399,593 UART: Caliptra RT
1,399,846 UART: [state] CFI Enabled
1,499,547 UART: [rt] RT listening for mailbox commands...
1,500,217 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,530,017 UART: [rt]cmd =0x4c444556, len=4
1,540,418 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,540,419 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,569,760 UART: [rt]cmd =0x43455246, len=4
1,581,753 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Unprovisioned
86,380 UART: [state] DebugLocked = No
87,069 UART: [state] WD Timer not started. Device not locked for debugging
88,313 UART: [fake-rom-cold-reset] ++
89,241 ready_for_fw is high
89,241 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
89,473 UART: [fht] FHT @ 0x50003400
92,716 UART: [fwproc] Wait for Commands...
93,505 UART: [fwproc] Recv command 0x46574c44
94,233 UART: [fwproc] Recv'd Img size: 99632 bytes
1,217,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,167 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,395 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,387,101 >>> mbox cmd response: success
1,388,259 UART: [fake-rom-cold-reset] --
1,388,963 UART: [state] Locking Datavault
1,390,004 UART: [state] Locking PCR0, PCR1 and PCR31
1,390,608 UART: [state] Locking ICCM
1,391,196 UART: [exit] Launching FMC @ 0x40000130
1,396,518 UART:
1,396,534 UART: Running Caliptra FMC ...
1,396,942 UART:
1,397,083 UART: [state] CFI Enabled
1,400,083 UART: Caliptra RT
1,400,428 UART: [state] CFI Enabled
1,501,111 UART: [rt] RT listening for mailbox commands...
1,501,781 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,371 UART: [rt]cmd =0x4c444556, len=4
1,541,572 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,541,573 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,570,808 UART: [rt]cmd =0x43455246, len=4
1,582,977 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,302 UART: [state] DebugLocked = No
87,037 UART: [state] WD Timer not started. Device not locked for debugging
88,649 UART: [fake-rom-cold-reset] ++
89,577 ready_for_fw is high
89,577 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
89,733 UART: [fht] FHT @ 0x50003400
93,062 UART: [fwproc] Wait for Commands...
93,905 UART: [fwproc] Recv command 0x46574c44
94,633 UART: [fwproc] Recv'd Img size: 99632 bytes
1,219,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,245,243 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,252,471 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,388,313 >>> mbox cmd response: success
1,389,471 UART: [fake-rom-cold-reset] --
1,390,191 UART: [state] Locking Datavault
1,391,146 UART: [state] Locking PCR0, PCR1 and PCR31
1,391,750 UART: [state] Locking ICCM
1,392,372 UART: [exit] Launching FMC @ 0x40000130
1,397,694 UART:
1,397,710 UART: Running Caliptra FMC ...
1,398,118 UART:
1,398,259 UART: [state] CFI Enabled
1,401,083 UART: Caliptra RT
1,401,428 UART: [state] CFI Enabled
1,501,905 UART: [rt] RT listening for mailbox commands...
1,502,575 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,532,635 UART: [rt]cmd =0x4c444556, len=4
1,542,890 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,891 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,572,266 UART: [rt]cmd =0x43455246, len=4
1,584,371 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
88,004 UART: [fake-rom-cold-reset] ++
88,932 ready_for_fw is high
88,932 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
89,214 UART: [fht] FHT @ 0x50003400
92,497 UART: [fwproc] Wait for Commands...
93,330 UART: [fwproc] Recv command 0x46574c44
94,058 UART: [fwproc] Recv'd Img size: 99632 bytes
1,217,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,158 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,386 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,387,312 >>> mbox cmd response: success
1,388,470 UART: [fake-rom-cold-reset] --
1,389,262 UART: [state] Locking Datavault
1,390,427 UART: [state] Locking PCR0, PCR1 and PCR31
1,391,031 UART: [state] Locking ICCM
1,391,705 UART: [exit] Launching FMC @ 0x40000130
1,397,027 UART:
1,397,043 UART: Running Caliptra FMC ...
1,397,451 UART:
1,397,505 UART: [state] CFI Enabled
1,400,192 UART: Caliptra RT
1,400,445 UART: [state] CFI Enabled
1,498,936 UART: [rt] RT listening for mailbox commands...
1,499,606 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,529,448 UART: [rt]cmd =0x4c444556, len=4
1,539,799 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,539,800 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,569,299 UART: [rt]cmd =0x43455246, len=4
1,581,558 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Unprovisioned
86,103 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
88,396 UART: [fake-rom-cold-reset] ++
89,324 ready_for_fw is high
89,324 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
89,552 UART: [fht] FHT @ 0x50003400
93,009 UART: [fwproc] Wait for Commands...
93,714 UART: [fwproc] Recv command 0x46574c44
94,442 UART: [fwproc] Recv'd Img size: 99632 bytes
1,218,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,245,334 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,252,562 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,388,256 >>> mbox cmd response: success
1,389,414 UART: [fake-rom-cold-reset] --
1,390,026 UART: [state] Locking Datavault
1,391,149 UART: [state] Locking PCR0, PCR1 and PCR31
1,391,753 UART: [state] Locking ICCM
1,392,269 UART: [exit] Launching FMC @ 0x40000130
1,397,591 UART:
1,397,607 UART: Running Caliptra FMC ...
1,398,015 UART:
1,398,069 UART: [state] CFI Enabled
1,400,906 UART: Caliptra RT
1,401,159 UART: [state] CFI Enabled
1,501,546 UART: [rt] RT listening for mailbox commands...
1,502,216 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,532,190 UART: [rt]cmd =0x4c444556, len=4
1,542,643 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,644 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,572,025 UART: [rt]cmd =0x43455246, len=4
1,583,918 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,831 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [fake-rom-cold-reset] ++
89,029 ready_for_fw is high
89,029 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
89,235 UART: [fht] FHT @ 0x50003400
92,664 UART: [fwproc] Wait for Commands...
93,331 UART: [fwproc] Recv command 0x46574c44
94,059 UART: [fwproc] Recv'd Img size: 99632 bytes
1,217,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,245,283 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,252,511 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,388,299 >>> mbox cmd response: success
1,389,457 UART: [fake-rom-cold-reset] --
1,390,115 UART: [state] Locking Datavault
1,391,396 UART: [state] Locking PCR0, PCR1 and PCR31
1,392,000 UART: [state] Locking ICCM
1,392,580 UART: [exit] Launching FMC @ 0x40000130
1,397,902 UART:
1,397,918 UART: Running Caliptra FMC ...
1,398,326 UART:
1,398,467 UART: [state] CFI Enabled
1,401,111 UART: Caliptra RT
1,401,456 UART: [state] CFI Enabled
1,501,135 UART: [rt] RT listening for mailbox commands...
1,501,805 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,479 UART: [rt]cmd =0x4c444556, len=4
1,541,706 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,541,707 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,200 UART: [rt]cmd =0x43455246, len=4
1,583,241 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6c83bb4c50741578423cd52a40ce7fde967363407de45941de23c55142b98e70786c06b27ff58e9b8752e5f413b14d1c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,837 UART: [state] WD Timer not started. Device not locked for debugging
88,063 UART: [fake-rom-cold-reset] ++
88,991 ready_for_fw is high
88,991 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
89,233 UART: [fht] FHT @ 0x50003400
92,608 UART: [fwproc] Wait for Commands...
93,337 UART: [fwproc] Recv command 0x46574c44
94,065 UART: [fwproc] Recv'd Img size: 99632 bytes
1,217,936 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,765 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,993 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
1,387,755 >>> mbox cmd response: success
1,388,913 UART: [fake-rom-cold-reset] --
1,389,841 UART: [state] Locking Datavault
1,391,068 UART: [state] Locking PCR0, PCR1 and PCR31
1,391,672 UART: [state] Locking ICCM
1,392,244 UART: [exit] Launching FMC @ 0x40000130
1,397,566 UART:
1,397,582 UART: Running Caliptra FMC ...
1,397,990 UART:
1,398,131 UART: [state] CFI Enabled
1,401,079 UART: Caliptra RT
1,401,424 UART: [state] CFI Enabled
1,501,655 UART: [rt] RT listening for mailbox commands...
1,502,325 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,995 UART: [rt]cmd =0x4c444556, len=4
1,542,346 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,347 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,460 UART: [rt]cmd =0x43455246, len=4
1,583,563 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,111 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = Yes
86,331 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,081 UART: [kat] SHA2-256
882,012 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,127 UART: [kat] ++
886,279 UART: [kat] sha1
890,573 UART: [kat] SHA2-256
892,511 UART: [kat] SHA2-384
895,278 UART: [kat] SHA2-512-ACC
897,179 UART: [kat] ECC-384
903,074 UART: [kat] HMAC-384Kdf
907,750 UART: [kat] LMS
1,475,946 UART: [kat] --
1,476,847 UART: [cold-reset] ++
1,477,274 UART: [fht] Storing FHT @ 0x50003400
1,480,159 UART: [idev] ++
1,480,327 UART: [idev] CDI.KEYID = 6
1,480,687 UART: [idev] SUBJECT.KEYID = 7
1,481,111 UART: [idev] UDS.KEYID = 0
1,489,010 UART: [idev] Erasing UDS.KEYID = 0
1,505,517 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,971 UART: [idev] CSR upload requested
1,515,817 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,526,360 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,532,072 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,537,974 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,543,678 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,552,213 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,818 UART: [state] DebugLocked = Yes
86,328 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,136 UART: [kat] SHA2-256
882,067 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,182 UART: [kat] ++
886,334 UART: [kat] sha1
890,638 UART: [kat] SHA2-256
892,576 UART: [kat] SHA2-384
895,505 UART: [kat] SHA2-512-ACC
897,406 UART: [kat] ECC-384
902,667 UART: [kat] HMAC-384Kdf
907,435 UART: [kat] LMS
1,475,631 UART: [kat] --
1,476,546 UART: [cold-reset] ++
1,477,059 UART: [fht] Storing FHT @ 0x50003400
1,479,826 UART: [idev] ++
1,479,994 UART: [idev] CDI.KEYID = 6
1,480,354 UART: [idev] SUBJECT.KEYID = 7
1,480,778 UART: [idev] UDS.KEYID = 0
1,488,865 UART: [idev] Erasing UDS.KEYID = 0
1,505,696 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,278 UART: [idev] CSR upload requested
1,516,124 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,526,809 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,532,521 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,538,423 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,544,127 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,552,662 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,825 UART: [state] LifecycleState = Unprovisioned
85,481 UART: [state] DebugLocked = Yes
86,135 UART: [state] Starting the WD Timer 40000000 cycles
87,600 UART: [kat] SHA2-256
893,250 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,375 UART: [kat] ++
897,527 UART: [kat] sha1
901,597 UART: [kat] SHA2-256
903,537 UART: [kat] SHA2-384
906,364 UART: [kat] SHA2-512-ACC
908,265 UART: [kat] ECC-384
917,790 UART: [kat] HMAC-384Kdf
922,348 UART: [kat] LMS
1,170,676 UART: [kat] --
1,171,581 UART: [cold-reset] ++
1,172,080 UART: [fht] FHT @ 0x50003400
1,174,789 UART: [idev] ++
1,174,957 UART: [idev] CDI.KEYID = 6
1,175,317 UART: [idev] SUBJECT.KEYID = 7
1,175,741 UART: [idev] UDS.KEYID = 0
1,183,570 UART: [idev] Erasing UDS.KEYID = 0
1,200,904 UART: [idev] Sha1 KeyId Algorithm
1,209,275 UART: [idev] CSR upload begun
1,211,056 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,636 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,227,348 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,233,250 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,238,954 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,247,489 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = Yes
86,790 UART: [state] Starting the WD Timer 40000000 cycles
88,337 UART: [kat] SHA2-256
893,987 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,112 UART: [kat] ++
898,264 UART: [kat] sha1
902,346 UART: [kat] SHA2-256
904,286 UART: [kat] SHA2-384
906,941 UART: [kat] SHA2-512-ACC
908,842 UART: [kat] ECC-384
918,635 UART: [kat] HMAC-384Kdf
923,227 UART: [kat] LMS
1,171,555 UART: [kat] --
1,172,400 UART: [cold-reset] ++
1,172,961 UART: [fht] FHT @ 0x50003400
1,175,628 UART: [idev] ++
1,175,796 UART: [idev] CDI.KEYID = 6
1,176,156 UART: [idev] SUBJECT.KEYID = 7
1,176,580 UART: [idev] UDS.KEYID = 0
1,184,581 UART: [idev] Erasing UDS.KEYID = 0
1,201,839 UART: [idev] Sha1 KeyId Algorithm
1,210,266 UART: [idev] CSR upload begun
1,212,047 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,625 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,228,337 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,234,239 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,239,943 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,248,478 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,623 UART: [state] LifecycleState = Unprovisioned
85,279 UART: [state] DebugLocked = Yes
85,905 UART: [state] Starting the WD Timer 40000000 cycles
87,382 UART: [kat] SHA2-256
890,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,061 UART: [kat] ++
895,213 UART: [kat] sha1
899,499 UART: [kat] SHA2-256
901,439 UART: [kat] SHA2-384
904,318 UART: [kat] SHA2-512-ACC
906,219 UART: [kat] ECC-384
915,930 UART: [kat] HMAC-384Kdf
920,470 UART: [kat] LMS
1,168,782 UART: [kat] --
1,169,921 UART: [cold-reset] ++
1,170,324 UART: [fht] FHT @ 0x50003400
1,173,118 UART: [idev] ++
1,173,286 UART: [idev] CDI.KEYID = 6
1,173,647 UART: [idev] SUBJECT.KEYID = 7
1,174,072 UART: [idev] UDS.KEYID = 0
1,182,081 UART: [idev] Erasing UDS.KEYID = 0
1,199,020 UART: [idev] Sha1 KeyId Algorithm
1,207,311 UART: [idev] CSR upload begun
1,209,090 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,829 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,225,542 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,231,447 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,237,152 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,245,696 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,736 UART: [state] DebugLocked = Yes
86,436 UART: [state] Starting the WD Timer 40000000 cycles
88,075 UART: [kat] SHA2-256
891,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,754 UART: [kat] ++
895,906 UART: [kat] sha1
900,076 UART: [kat] SHA2-256
902,016 UART: [kat] SHA2-384
904,861 UART: [kat] SHA2-512-ACC
906,762 UART: [kat] ECC-384
916,787 UART: [kat] HMAC-384Kdf
921,531 UART: [kat] LMS
1,169,843 UART: [kat] --
1,170,934 UART: [cold-reset] ++
1,171,441 UART: [fht] FHT @ 0x50003400
1,174,201 UART: [idev] ++
1,174,369 UART: [idev] CDI.KEYID = 6
1,174,730 UART: [idev] SUBJECT.KEYID = 7
1,175,155 UART: [idev] UDS.KEYID = 0
1,183,182 UART: [idev] Erasing UDS.KEYID = 0
1,201,105 UART: [idev] Sha1 KeyId Algorithm
1,209,286 UART: [idev] CSR upload begun
1,211,065 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,920 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,227,633 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,233,538 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,239,243 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,247,787 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.41s
Truncated 5405 bytes from beginning
444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,913,907 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,955,792 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1e:4c:7b:cc:d9:b9:24:6b:46:37:3d:a1:cd:22:39:0c:2d:29:6a:c1
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9E4C7BCCD9B9246B46373DA1CD22390C2D296AC1312D1CD0EED7E1063825BC70
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:68:4b:7d:98:86:09:c4:26:0c:b9:ad:3e:1f:79:
5c:4f:da:26:1f:a7:5c:c9:06:e3:c9:53:df:18:7d:
2c:e7:af:4d:0e:27:ec:75:2f:4a:a3:de:fd:72:ec:
7d:76:e8:f7:f1:71:11:07:4a:22:8a:28:71:22:85:
e3:87:46:f1:7d:2f:16:92:58:bb:c7:74:99:44:5d:
8a:6c:b7:c9:1b:24:5c:88:15:3b:90:95:63:f5:43:
7a:64:25:70:60:80:b3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
9E:4C:7B:CC:D9:B9:24:6B:46:37:3D:A1:CD:22:39:0C:2D:29:6A:C1
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:18:ec:77:a9:7d:c2:75:de:7d:fd:28:26:1a:cd:
8a:62:a8:11:8b:6e:f4:a5:a2:6c:32:92:b1:96:8e:d3:29:01:
13:f1:b5:78:ba:ee:62:de:67:c9:92:7e:60:8d:d5:ff:02:31:
00:e2:42:37:70:e7:e0:c0:ec:af:51:6d:68:c8:6e:64:af:aa:
fe:4f:11:04:a9:56:2b:94:4e:49:15:2e:ba:b3:14:2d:6d:1b:
52:af:70:2f:f7:1b:37:5e:64:ef:78:34:23
5,966,662 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,967,261 UART:
5,967,277 UART: Running Caliptra ROM ...
5,967,685 UART:
5,967,739 UART: [state] CFI Enabled
5,970,370 UART: [state] LifecycleState = Production
5,970,978 UART: [state] DebugLocked = Yes
5,971,586 UART: [state] Starting the Watchdog Timer 40000000 cycles
5,973,343 UART: [kat] SHA2-256
6,767,274 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,771,389 UART: [kat] ++
6,771,541 UART: [kat] sha1
6,775,821 UART: [kat] SHA2-256
6,777,759 UART: [kat] SHA2-384
6,780,432 UART: [kat] SHA2-512-ACC
6,782,332 UART: [kat] ECC-384
6,787,987 UART: [kat] HMAC-384Kdf
6,792,597 UART: [kat] LMS
7,360,793 UART: [kat] --
7,361,886 UART: [update-reset] ++
10,858,243 UART: [update-reset] Image verified using Vendor ECC Key Index 0
10,859,517 UART: [update-reset] Loading Runtime at address 0x40005000 len 87624
11,006,357 >>> mbox cmd response: success
11,006,509 UART: [update-reset] Copying MAN_2 To MAN_1
11,014,521 UART: [update-reset Success] --
11,015,530 UART: [state] Locking Datavault
11,016,200 UART: [state] Locking PCR0, PCR1 and PCR31
11,016,804 UART: [state] Locking ICCM
11,017,390 UART: [exit] Launching FMC @ 0x40000130
11,022,719 UART:
11,022,735 UART: Running Caliptra FMC ...
11,023,143 UART:
11,023,197 UART: [state] CFI Enabled
11,112,056 UART: [art] Extend RT PCRs Done
11,112,484 UART: [art] Lock RT PCRs Done
11,113,469 UART: [art] Populate DV Done
11,121,671 UART: [fht] FMC Alias Private Key: 7
11,122,759 UART: [art] Derive CDI
11,123,039 UART: [art] Store in in slot 0x4
11,209,030 UART: [art] Derive Key Pair
11,209,390 UART: [art] Store priv key in slot 0x5
11,222,852 UART: [art] Derive Key Pair - Done
11,237,666 UART: [art] Signing Cert with AUTHO
11,238,146 UART: RITY.KEYID = 7
11,253,210 UART: [art] Erasing AUTHORITY.KEYID = 7
11,253,975 UART: [art] PUB.X = 1D30FAE50931EE00EEE971EC9FFC93F0CCEE79082771CAC67174CE71B9123EACEE02F41D310054BAF141AB58AC307DB7
11,260,712 UART: [art] PUB.Y = F9F5D66AB7E769FE48370C19EA5FD831B0B7FEE144EC53A47DA5AFD032AFDD4DC4E689885295FFA85E253F56D1CA6EC4
11,267,683 UART: [art] SIG.R = 3D3423C9857279FE1BCCA64529BE270B927D7DB6B72555D8168E939DC50E7B58F3FCE19EE95CB37F333332C54D4CEFCE
11,274,459 UART: [art] SIG.S = D41D45811AD84D0F3558BF772A38A78B8D4AE5C120F133827F7C472267BA4DD643F55392721C25669FA153D65C7685D6
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
15:32:e0:bc:13:4b:12:9e:19:5e:8c:2a:1d:c2:83:66:29:80:7d:80
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=1532E0BC134B129E195E8C2A1DC2836629807D8004D6398F1654F1F99834E0EB
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:1d:30:fa:e5:09:31:ee:00:ee:e9:71:ec:9f:fc:
93:f0:cc:ee:79:08:27:71:ca:c6:71:74:ce:71:b9:
12:3e:ac:ee:02:f4:1d:31:00:54:ba:f1:41:ab:58:
ac:30:7d:b7:f9:f5:d6:6a:b7:e7:69:fe:48:37:0c:
19:ea:5f:d8:31:b0:b7:fe:e1:44:ec:53:a4:7d:a5:
af:d0:32:af:dd:4d:c4:e6:89:88:52:95:ff:a8:5e:
25:3f:56:d1:ca:6e:c4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
15:32:E0:BC:13:4B:12:9E:19:5E:8C:2A:1D:C2:83:66:29:80:7D:80
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:3d:34:23:c9:85:72:79:fe:1b:cc:a6:45:29:be:
27:0b:92:7d:7d:b6:b7:25:55:d8:16:8e:93:9d:c5:0e:7b:58:
f3:fc:e1:9e:e9:5c:b3:7f:33:33:32:c5:4d:4c:ef:ce:02:31:
00:d4:1d:45:81:1a:d8:4d:0f:35:58:bf:77:2a:38:a7:8b:8d:
4a:e5:c1:20:f1:33:82:7f:7c:47:22:67:ba:4d:d6:43:f5:53:
92:72:1c:25:66:9f:a1:53:d6:5c:76:85:d6
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.73s
Truncated 882 bytes from beginning
5,447,639 UART: [art] Populate DV Done
5,456,107 UART: [fht] FMC Alias Private Key: 7
5,457,075 UART: [art] Derive CDI
5,457,355 UART: [art] Store in in slot 0x4
5,542,826 UART: [art] Derive Key Pair
5,543,186 UART: [art] Store priv key in slot 0x5
5,556,180 UART: [art] Derive Key Pair - Done
5,571,415 UART: [art] Signing Cert with AUTHO
5,571,895 UART: RITY.KEYID = 7
5,586,993 UART: [art] Erasing AUTHORITY.KEYID = 7
5,587,758 UART: [art] PUB.X = 2227FB0B6E01061434795A68E47C6035BAB044FE3FBFF5B862A8D8C2C1FDD7CD3802C2295EF2CCC706D7C6CBCDC57E65
5,594,531 UART: [art] PUB.Y = 6BF34F6C60E5BC87F7B6D21286C9B47D0A2828E5C37C729A8486897D0F79B5CB31C2D5E1B88C398D41EB0435DF09DD30
5,601,477 UART: [art] SIG.R = E56280304CF1A895F1159C67B7515BD865C6FE8E8E9D8F566B6F00C8ADF272F9E0F99F6185E49AF2C200B2B8F192DC62
5,608,211 UART: [art] SIG.S = 004BD00463E9BD105FE69527663E64D538683E9608644D8B22FCC7AFAD2EDACB5B35BE2889133AFBB7242FF74AF2B96B
5,632,152 UART: Caliptra RT
5,632,405 UART: [state] CFI Enabled
5,741,572 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,772,233 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,811,946 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,853,599 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4f:e6:f1:5d:58:6d:fa:05:e6:eb:87:4e:7f:c6:60:f3:a4:77:bb:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=CBE6F15D586DFA05E6EB874E7FC660F3A477BB699361D049C09EEA410CA008BC
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:22:27:fb:0b:6e:01:06:14:34:79:5a:68:e4:7c:
60:35:ba:b0:44:fe:3f:bf:f5:b8:62:a8:d8:c2:c1:
fd:d7:cd:38:02:c2:29:5e:f2:cc:c7:06:d7:c6:cb:
cd:c5:7e:65:6b:f3:4f:6c:60:e5:bc:87:f7:b6:d2:
12:86:c9:b4:7d:0a:28:28:e5:c3:7c:72:9a:84:86:
89:7d:0f:79:b5:cb:31:c2:d5:e1:b8:8c:39:8d:41:
eb:04:35:df:09:dd:30
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
CB:E6:F1:5D:58:6D:FA:05:E6:EB:87:4E:7F:C6:60:F3:A4:77:BB:69
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:31:00:e5:62:80:30:4c:f1:a8:95:f1:15:9c:67:b7:
51:5b:d8:65:c6:fe:8e:8e:9d:8f:56:6b:6f:00:c8:ad:f2:72:
f9:e0:f9:9f:61:85:e4:9a:f2:c2:00:b2:b8:f1:92:dc:62:02:
2f:4b:d0:04:63:e9:bd:10:5f:e6:95:27:66:3e:64:d5:38:68:
3e:96:08:64:4d:8b:22:fc:c7:af:ad:2e:da:cb:5b:35:be:28:
89:13:3a:fb:b7:24:2f:f7:4a:f2:b9:6b
5,864,358 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,671,506 >>> mbox cmd response: success
10,684,988 UART:
10,685,004 UART: Running Caliptra FMC ...
10,685,412 UART:
10,685,466 UART: [state] CFI Enabled
10,774,801 UART: [art] Extend RT PCRs Done
10,775,229 UART: [art] Lock RT PCRs Done
10,776,642 UART: [art] Populate DV Done
10,784,732 UART: [fht] FMC Alias Private Key: 7
10,785,870 UART: [art] Derive CDI
10,786,150 UART: [art] Store in in slot 0x4
10,871,777 UART: [art] Derive Key Pair
10,872,137 UART: [art] Store priv key in slot 0x5
10,885,577 UART: [art] Derive Key Pair - Done
10,900,766 UART: [art] Signing Cert with AUTHO
10,901,246 UART: RITY.KEYID = 7
10,916,576 UART: [art] Erasing AUTHORITY.KEYID = 7
10,917,341 UART: [art] PUB.X = ADE2E5174F85785D6E73F0F2C607F9A20FCD4050BD4554D577AF49E4C370D3A05BA421A6BAC484ACD27D7F0A07FE58D6
10,924,115 UART: [art] PUB.Y = AB550D97F8679E9A5EB98F7B05C421047256692E3F30EC35B118C43F8CA740EEBB23B95F383C2462F7B05F93DC118059
10,931,058 UART: [art] SIG.R = DD4DE47C168BD337424214DA2E42FF75061380100E526CBF81AF291EEF71B6C655859BDC4EB2D59A74E2338AF720908F
10,937,828 UART: [art] SIG.S = 59E3A009A1402D5796001986182F76619A7CA1E32BF5B8FA7FF6C424400C7E03823D95EC7C91314DE910E56AFF9675DD
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
37:22:6a:ac:7c:8d:29:cf:d9:d4:bc:ee:c9:c4:54:d8:8a:50:9c:01
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=33226AAC7C8D29CFD9D4BCEEC9C454D88A509C0114750AB44D4CD406D0EFCFC2
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:ad:e2:e5:17:4f:85:78:5d:6e:73:f0:f2:c6:07:
f9:a2:0f:cd:40:50:bd:45:54:d5:77:af:49:e4:c3:
70:d3:a0:5b:a4:21:a6:ba:c4:84:ac:d2:7d:7f:0a:
07:fe:58:d6:ab:55:0d:97:f8:67:9e:9a:5e:b9:8f:
7b:05:c4:21:04:72:56:69:2e:3f:30:ec:35:b1:18:
c4:3f:8c:a7:40:ee:bb:23:b9:5f:38:3c:24:62:f7:
b0:5f:93:dc:11:80:59
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
33:22:6A:AC:7C:8D:29:CF:D9:D4:BC:EE:C9:C4:54:D8:8A:50:9C:01
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:dd:4d:e4:7c:16:8b:d3:37:42:42:14:da:2e:
42:ff:75:06:13:80:10:0e:52:6c:bf:81:af:29:1e:ef:71:b6:
c6:55:85:9b:dc:4e:b2:d5:9a:74:e2:33:8a:f7:20:90:8f:02:
30:59:e3:a0:09:a1:40:2d:57:96:00:19:86:18:2f:76:61:9a:
7c:a1:e3:2b:f5:b8:fa:7f:f6:c4:24:40:0c:7e:03:82:3d:95:
ec:7c:91:31:4d:e9:10:e5:6a:ff:96:75:dd
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.85s
Truncated 5405 bytes from beginning
444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,103,818 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,145,759 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
37:0c:10:86:ed:9a:9c:98:cc:a2:1b:f4:2f:66:b7:cb:7e:87:32:cc
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=370C1086ED9A9C98CCA21BF42F66B7CB7E8732CC74157C2DF89C89B6239BCC91
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:fe:e8:d6:48:c2:e9:d3:9a:05:de:9b:d7:24:ee:
99:21:5c:6a:dd:07:4b:ad:00:0d:19:cf:e8:67:d4:
81:a1:d1:41:9d:c8:c2:e3:11:ad:54:41:b2:2e:97:
ca:fc:1c:3e:f2:1b:e3:1a:98:97:d9:58:18:6a:c2:
03:ed:d6:6c:dc:a4:95:8a:a0:fc:2a:4c:b1:a8:f4:
21:00:38:0c:f4:f4:79:a7:e3:7e:4a:b4:d4:21:c1:
4a:f6:c6:23:27:a1:fe
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
37:0C:10:86:ED:9A:9C:98:CC:A2:1B:F4:2F:66:B7:CB:7E:87:32:CC
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:6f:7b:6f:59:db:b4:63:94:23:20:5f:37:79:b9:
2d:fc:1f:e1:27:4b:e5:c7:85:c7:44:42:42:ff:c8:97:ca:53:
57:ed:7a:19:ee:7b:c2:d0:a5:13:f1:81:7e:c4:36:94:02:31:
00:d7:15:21:5a:b5:ab:8c:79:6d:8e:45:83:f8:47:b7:e9:d5:
c1:b3:3d:f9:29:bf:37:f7:9d:94:3d:39:8e:a8:fd:17:44:79:
98:44:a9:18:30:cf:11:a2:56:c3:8a:d5:56
6,156,565 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,157,582 UART:
6,157,598 UART: Running Caliptra ROM ...
6,158,006 UART:
6,158,147 UART: [state] CFI Enabled
6,161,216 UART: [state] LifecycleState = Production
6,161,824 UART: [state] DebugLocked = Yes
6,162,404 UART: [state] Starting the Watchdog Timer 40000000 cycles
6,164,205 UART: [kat] SHA2-256
6,958,136 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,962,251 UART: [kat] ++
6,962,403 UART: [kat] sha1
6,966,791 UART: [kat] SHA2-256
6,968,729 UART: [kat] SHA2-384
6,971,384 UART: [kat] SHA2-512-ACC
6,973,284 UART: [kat] ECC-384
6,978,785 UART: [kat] HMAC-384Kdf
6,983,479 UART: [kat] LMS
7,551,675 UART: [kat] --
7,552,240 UART: [update-reset] ++
11,388,756 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,389,946 UART: [update-reset] Loading Runtime at address 0x40005000 len 87624
11,536,786 >>> mbox cmd response: success
11,536,938 UART: [update-reset] Copying MAN_2 To MAN_1
11,544,950 UART: [update-reset Success] --
11,546,045 UART: [state] Locking Datavault
11,546,763 UART: [state] Locking PCR0, PCR1 and PCR31
11,547,367 UART: [state] Locking ICCM
11,547,895 UART: [exit] Launching FMC @ 0x40000130
11,553,224 UART:
11,553,240 UART: Running Caliptra FMC ...
11,553,648 UART:
11,553,791 UART: [state] CFI Enabled
11,642,590 UART: [art] Extend RT PCRs Done
11,643,018 UART: [art] Lock RT PCRs Done
11,644,247 UART: [art] Populate DV Done
11,652,235 UART: [fht] FMC Alias Private Key: 7
11,653,175 UART: [art] Derive CDI
11,653,455 UART: [art] Store in in slot 0x4
11,739,276 UART: [art] Derive Key Pair
11,739,636 UART: [art] Store priv key in slot 0x5
11,753,334 UART: [art] Derive Key Pair - Done
11,768,085 UART: [art] Signing Cert with AUTHO
11,768,565 UART: RITY.KEYID = 7
11,783,695 UART: [art] Erasing AUTHORITY.KEYID = 7
11,784,460 UART: [art] PUB.X = 63847114D974430F7B2F5F5FBEEB1E5420F0DA6C5585C708D923958E8B9068B533DACCFE35DEDE041EEBEE7F4F5AA1DB
11,791,241 UART: [art] PUB.Y = AFAC4E043FA2D27BCEC3E9649940417865318460FA09B163D2929804DE5FD923C5DAD911E91E92398FDC6EA32E270DF1
11,798,187 UART: [art] SIG.R = 65DC8CF40E7EC3A66211A001F1CF1959965C167CA68C3A4C4591E35B0DD1E35B814E382AD06DE45283CF419B2A8AC1DA
11,804,960 UART: [art] SIG.S = DECF9C582932E16FE1AB6DEC6B9A26E05A82BF2F9B89840607CE068BEC450BF08E46FD76D0B34B00133B730F70BA8F14
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:08:30:c8:8c:a6:03:4e:b2:4d:ee:f3:f3:92:5a:d2:7c:4a:4e:1a
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=440830C88CA6034EB24DEEF3F3925AD27C4A4E1AD1DB312541D479AA12166A95
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:63:84:71:14:d9:74:43:0f:7b:2f:5f:5f:be:eb:
1e:54:20:f0:da:6c:55:85:c7:08:d9:23:95:8e:8b:
90:68:b5:33:da:cc:fe:35:de:de:04:1e:eb:ee:7f:
4f:5a:a1:db:af:ac:4e:04:3f:a2:d2:7b:ce:c3:e9:
64:99:40:41:78:65:31:84:60:fa:09:b1:63:d2:92:
98:04:de:5f:d9:23:c5:da:d9:11:e9:1e:92:39:8f:
dc:6e:a3:2e:27:0d:f1
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
44:08:30:C8:8C:A6:03:4E:B2:4D:EE:F3:F3:92:5A:D2:7C:4A:4E:1A
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:65:dc:8c:f4:0e:7e:c3:a6:62:11:a0:01:f1:cf:
19:59:96:5c:16:7c:a6:8c:3a:4c:45:91:e3:5b:0d:d1:e3:5b:
81:4e:38:2a:d0:6d:e4:52:83:cf:41:9b:2a:8a:c1:da:02:31:
00:de:cf:9c:58:29:32:e1:6f:e1:ab:6d:ec:6b:9a:26:e0:5a:
82:bf:2f:9b:89:84:06:07:ce:06:8b:ec:45:0b:f0:8e:46:fd:
76:d0:b3:4b:00:13:3b:73:0f:70:ba:8f:14
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.88s
Truncated 888 bytes from beginning
09,478 UART: [art] Populate DV Done
5,417,590 UART: [fht] FMC Alias Private Key: 7
5,418,532 UART: [art] Derive CDI
5,418,812 UART: [art] Store in in slot 0x4
5,504,739 UART: [art] Derive Key Pair
5,505,099 UART: [art] Store priv key in slot 0x5
5,518,145 UART: [art] Derive Key Pair - Done
5,532,813 UART: [art] Signing Cert with AUTHO
5,533,293 UART: RITY.KEYID = 7
5,547,847 UART: [art] Erasing AUTHORITY.KEYID = 7
5,548,612 UART: [art] PUB.X = CF9D835B0F340EE9F309551870AF8E63F00A4EBDA999C9BE53FF65CD6DD497CCFCD2CAC459AE14459924B64A873BF1D6
5,555,390 UART: [art] PUB.Y = 74EB7BF0F27C67348416FAEE88257FF9303FE3F94789A1976E38823F7562C3240DE14816AF1292C0B45079C27714D122
5,562,329 UART: [art] SIG.R = 1926888DF83F053BFE45C3B9CD95836F782058CBB406EAA2D3687A4CEC77DBAE69E7C11D8658CBFF7AFCF206ED1CD41D
5,569,112 UART: [art] SIG.S = 9D62506016B0CC3A2926B1A0276A58B25C5D92729DCD705C3E7F8B34F7827F82575F388A5734E997255C7463D4F499E0
5,593,059 UART: Caliptra RT
5,593,404 UART: [state] CFI Enabled
5,702,509 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,732,890 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,772,507 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,814,256 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7c:36:d1:e9:de:42:17:c8:d8:ec:9b:ac:7a:ae:c2:9e:0e:22:ee:be
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=7C36D1E9DE4217C8D8EC9BAC7AAEC29E0E22EEBE9A100FF4F7407273A5803BBC
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:cf:9d:83:5b:0f:34:0e:e9:f3:09:55:18:70:af:
8e:63:f0:0a:4e:bd:a9:99:c9:be:53:ff:65:cd:6d:
d4:97:cc:fc:d2:ca:c4:59:ae:14:45:99:24:b6:4a:
87:3b:f1:d6:74:eb:7b:f0:f2:7c:67:34:84:16:fa:
ee:88:25:7f:f9:30:3f:e3:f9:47:89:a1:97:6e:38:
82:3f:75:62:c3:24:0d:e1:48:16:af:12:92:c0:b4:
50:79:c2:77:14:d1:22
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
7C:36:D1:E9:DE:42:17:C8:D8:EC:9B:AC:7A:AE:C2:9E:0E:22:EE:BE
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:19:26:88:8d:f8:3f:05:3b:fe:45:c3:b9:cd:95:
83:6f:78:20:58:cb:b4:06:ea:a2:d3:68:7a:4c:ec:77:db:ae:
69:e7:c1:1d:86:58:cb:ff:7a:fc:f2:06:ed:1c:d4:1d:02:31:
00:9d:62:50:60:16:b0:cc:3a:29:26:b1:a0:27:6a:58:b2:5c:
5d:92:72:9d:cd:70:5c:3e:7f:8b:34:f7:82:7f:82:57:5f:38:
8a:57:34:e9:97:25:5c:74:63:d4:f4:99:e0
5,824,994 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,973,338 >>> mbox cmd response: success
10,986,808 UART:
10,986,824 UART: Running Caliptra FMC ...
10,987,232 UART:
10,987,375 UART: [state] CFI Enabled
11,076,088 UART: [art] Extend RT PCRs Done
11,076,516 UART: [art] Lock RT PCRs Done
11,077,797 UART: [art] Populate DV Done
11,085,877 UART: [fht] FMC Alias Private Key: 7
11,086,819 UART: [art] Derive CDI
11,087,099 UART: [art] Store in in slot 0x4
11,172,800 UART: [art] Derive Key Pair
11,173,160 UART: [art] Store priv key in slot 0x5
11,187,004 UART: [art] Derive Key Pair - Done
11,202,139 UART: [art] Signing Cert with AUTHO
11,202,619 UART: RITY.KEYID = 7
11,217,757 UART: [art] Erasing AUTHORITY.KEYID = 7
11,218,522 UART: [art] PUB.X = 204282824BB6B97C93DC2C06B6223B32783EEAC7E2462FC57174A9AE995D114BCBA34A1BCA8A052057CFBCD71B567680
11,225,294 UART: [art] PUB.Y = 3878D6F05BA398E8A4FA4B4F579F8BFC64F5FD0259777E4EC207CD4AD8441CAFBAD67F94CE8DC63358D8BD6AE8FE0E60
11,232,259 UART: [art] SIG.R = 97E238B49B9DCB86FBD15AACEF9D15DDF8218CB3CC0EB7FA3544BB67EBBBF454202D04A0A4F01D43E47BD3930393BA8C
11,239,046 UART: [art] SIG.S = CFC8D7DD260C6226A5773753D5CE838E16DDEE4995AEE1952A5C7C82C833BB854E9EA8051CC4F065AE75258C9AC60FC3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4f:bb:3d:90:3e:41:b4:bf:ec:f5:3e:32:a8:6d:84:0a:48:1d:02:40
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=4BBB3D903E41B4BFECF53E32A86D840A481D0240E93554E5B495949138A5AFF8
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:20:42:82:82:4b:b6:b9:7c:93:dc:2c:06:b6:22:
3b:32:78:3e:ea:c7:e2:46:2f:c5:71:74:a9:ae:99:
5d:11:4b:cb:a3:4a:1b:ca:8a:05:20:57:cf:bc:d7:
1b:56:76:80:38:78:d6:f0:5b:a3:98:e8:a4:fa:4b:
4f:57:9f:8b:fc:64:f5:fd:02:59:77:7e:4e:c2:07:
cd:4a:d8:44:1c:af:ba:d6:7f:94:ce:8d:c6:33:58:
d8:bd:6a:e8:fe:0e:60
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
4B:BB:3D:90:3E:41:B4:BF:EC:F5:3E:32:A8:6D:84:0A:48:1D:02:40
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:97:e2:38:b4:9b:9d:cb:86:fb:d1:5a:ac:ef:
9d:15:dd:f8:21:8c:b3:cc:0e:b7:fa:35:44:bb:67:eb:bb:f4:
54:20:2d:04:a0:a4:f0:1d:43:e4:7b:d3:93:03:93:ba:8c:02:
31:00:cf:c8:d7:dd:26:0c:62:26:a5:77:37:53:d5:ce:83:8e:
16:dd:ee:49:95:ae:e1:95:2a:5c:7c:82:c8:33:bb:85:4e:9e:
a8:05:1c:c4:f0:65:ae:75:25:8c:9a:c6:0f:c3
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.93s
Truncated 5299 bytes from beginning
, next_pc=40005400
3,875,567 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,136 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,956,529 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
57:b5:ee:be:ab:cd:79:14:ef:f9:fc:60:b8:de:c8:68:3b:57:d9:d5
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=53B5EEBEABCD7914EFF9FC60B8DEC8683B57D9D5BBA951A79362B09D4EEFC4B6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:6e:c0:82:d2:a0:d3:6f:b9:f4:6a:de:48:52:33:
f9:c5:5a:af:4c:25:35:a6:15:28:bb:e8:71:c4:b7:
af:72:07:7a:24:38:47:ef:fd:56:44:c1:f0:73:b9:
47:a5:c7:00:ce:7a:60:fb:a2:51:0f:56:18:7c:75:
6f:e5:63:8d:87:9b:9b:4f:a1:1c:3d:30:1e:74:44:
bf:55:c1:ff:52:ba:8f:01:34:35:05:a3:5b:98:06:
de:b3:60:1e:be:83:45
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
53:B5:EE:BE:AB:CD:79:14:EF:F9:FC:60:B8:DE:C8:68:3B:57:D9:D5
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:82:a7:3f:4a:c3:c6:63:d1:88:55:a7:99:b3:
39:c2:ef:28:48:d8:a9:0d:10:59:0f:79:49:93:b1:9b:80:52:
f3:8c:92:b2:7b:6d:4e:75:4c:c6:3a:46:96:cb:cd:74:c5:02:
31:00:a5:91:62:fb:32:3f:b1:ba:73:c5:09:23:6d:f6:d5:66:
e2:2d:63:99:fe:b3:eb:18:04:5b:20:ca:7b:9b:45:a7:56:3c:
49:9f:69:59:02:c2:99:de:1e:e7:b0:ae:f5:33
3,967,142 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,967,980 UART:
3,967,996 UART: Running Caliptra ROM ...
3,968,404 UART:
3,968,459 UART: [state] CFI Enabled
3,970,940 UART: [state] LifecycleState = Production
3,971,548 UART: [state] DebugLocked = Yes
3,972,196 UART: [state] Starting the WD Timer 40000000 cycles
3,973,670 UART: [kat] SHA2-256
4,779,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,783,445 UART: [kat] ++
4,783,597 UART: [kat] sha1
4,787,725 UART: [kat] SHA2-256
4,789,665 UART: [kat] SHA2-384
4,792,304 UART: [kat] SHA2-512-ACC
4,794,204 UART: [kat] ECC-384
4,804,077 UART: [kat] HMAC-384Kdf
4,808,695 UART: [kat] LMS
5,057,023 UART: [kat] --
5,057,961 UART: [update-reset] ++
6,914,853 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,915,874 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87624
7,062,662 >>> mbox cmd response: success
7,063,006 UART: [update-reset] Copying MAN_2 To MAN_1
7,071,018 UART: [update-reset Success] --
7,071,837 UART: [state] Locking Datavault
7,072,569 UART: [state] Locking PCR0, PCR1 and PCR31
7,073,173 UART: [state] Locking ICCM
7,073,715 UART: [exit] Launching FMC @ 0x40000130
7,079,044 UART:
7,079,060 UART: Running Caliptra FMC ...
7,079,468 UART:
7,079,522 UART: [state] CFI Enabled
7,168,569 UART: [art] Extend RT PCRs Done
7,168,997 UART: [art] Lock RT PCRs Done
7,170,444 UART: [art] Populate DV Done
7,178,680 UART: [fht] FMC Alias Private Key: 7
7,179,684 UART: [art] Derive CDI
7,179,964 UART: [art] Store in in slot 0x4
7,265,397 UART: [art] Derive Key Pair
7,265,757 UART: [art] Store priv key in slot 0x5
7,279,089 UART: [art] Derive Key Pair - Done
7,293,813 UART: [art] Signing Cert with AUTHO
7,294,293 UART: RITY.KEYID = 7
7,309,625 UART: [art] Erasing AUTHORITY.KEYID = 7
7,310,390 UART: [art] PUB.X = 869811CD4F924DCA04CE8EF992DE191FC55EC69536EE167DA2762286725CC73A113F4C58129E2CF6325E6D58CAFA52D2
7,317,165 UART: [art] PUB.Y = A14ED28015D155485166AAF20C8D8DAA06C54BC6838AF2DC3C9F6E6987A26121CF86F96C889DD2081B6D642B4402CA97
7,324,109 UART: [art] SIG.R = 6D8C135DC42F25B6A62DEB0C3046964A586E64215F77F946011DA4679736A3BA15839344DBBE7D656C5F8F3FBB5DA4FD
7,330,881 UART: [art] SIG.S = 1B055CBFC0B6282CC1D284EEC99136981D7B7A3B79E256DF7A4EF71A75AE307E587917AD09F4FAC1CA4933429AB4B8F9
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:88:99:8b:d5:ff:48:fa:8a:28:34:3f:52:df:f2:7f:a1:39:af:f8
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9488998BD5FF48FA8A28343F52DFF27FA139AFF8E93615A91E84D0E850C117BA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:86:98:11:cd:4f:92:4d:ca:04:ce:8e:f9:92:de:
19:1f:c5:5e:c6:95:36:ee:16:7d:a2:76:22:86:72:
5c:c7:3a:11:3f:4c:58:12:9e:2c:f6:32:5e:6d:58:
ca:fa:52:d2:a1:4e:d2:80:15:d1:55:48:51:66:aa:
f2:0c:8d:8d:aa:06:c5:4b:c6:83:8a:f2:dc:3c:9f:
6e:69:87:a2:61:21:cf:86:f9:6c:88:9d:d2:08:1b:
6d:64:2b:44:02:ca:97
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
94:88:99:8B:D5:FF:48:FA:8A:28:34:3F:52:DF:F2:7F:A1:39:AF:F8
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:6d:8c:13:5d:c4:2f:25:b6:a6:2d:eb:0c:30:46:
96:4a:58:6e:64:21:5f:77:f9:46:01:1d:a4:67:97:36:a3:ba:
15:83:93:44:db:be:7d:65:6c:5f:8f:3f:bb:5d:a4:fd:02:30:
1b:05:5c:bf:c0:b6:28:2c:c1:d2:84:ee:c9:91:36:98:1d:7b:
7a:3b:79:e2:56:df:7a:4e:f7:1a:75:ae:30:7e:58:79:17:ad:
09:f4:fa:c1:ca:49:33:42:9a:b4:b8:f9
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.20s
Truncated 849 bytes from beginning
836 UART: [art] Lock RT PCRs Done
3,375,226 UART: [art] Populate DV Done
3,383,536 UART: [fht] FMC Alias Private Key: 7
3,384,698 UART: [art] Derive CDI
3,384,978 UART: [art] Store in in slot 0x4
3,470,663 UART: [art] Derive Key Pair
3,471,023 UART: [art] Store priv key in slot 0x5
3,484,039 UART: [art] Derive Key Pair - Done
3,498,902 UART: [art] Signing Cert with AUTHO
3,499,382 UART: RITY.KEYID = 7
3,515,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,515,775 UART: [art] PUB.X = 4A6CA2090B2A76B0FA06F4FEC1BF48A5D52F4B5ADF98A2D91D754ADBE675DAA5C8B48F564DDC79487A69BE192ADF6DDB
3,522,566 UART: [art] PUB.Y = E73BFEF68B1A628F102206979742B3E84B5501C20FFE0553DA239EFA44D1D3CC6377C1CB82332C61CAA707503A468A8F
3,529,507 UART: [art] SIG.R = A1F615E29C27F662A804F93998006164480030F4BAD0538B17B3B74A1F79E950C1BE86362871E7AE808E3131CEB722E4
3,536,224 UART: [art] SIG.S = A8ED00D0C0147E33D6210D34576B24422A2AB202F81B7CA95A83F52811B24C059F695DD0B974DE5662ED765CD3C7396E
3,560,508 UART: Caliptra RT
3,560,761 UART: [state] CFI Enabled
3,668,510 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,765 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,872 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,780,401 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
34:70:ac:98:a6:a1:36:cc:5d:c0:9a:60:bf:ca:c2:24:ab:ca:e3:7d
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=3070AC98A6A136CC5DC09A60BFCAC224ABCAE37D613C5A70296F6F87EF8E1371
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:4a:6c:a2:09:0b:2a:76:b0:fa:06:f4:fe:c1:bf:
48:a5:d5:2f:4b:5a:df:98:a2:d9:1d:75:4a:db:e6:
75:da:a5:c8:b4:8f:56:4d:dc:79:48:7a:69:be:19:
2a:df:6d:db:e7:3b:fe:f6:8b:1a:62:8f:10:22:06:
97:97:42:b3:e8:4b:55:01:c2:0f:fe:05:53:da:23:
9e:fa:44:d1:d3:cc:63:77:c1:cb:82:33:2c:61:ca:
a7:07:50:3a:46:8a:8f
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
30:70:AC:98:A6:A1:36:CC:5D:C0:9A:60:BF:CA:C2:24:AB:CA:E3:7D
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:a1:f6:15:e2:9c:27:f6:62:a8:04:f9:39:98:
00:61:64:48:00:30:f4:ba:d0:53:8b:17:b3:b7:4a:1f:79:e9:
50:c1:be:86:36:28:71:e7:ae:80:8e:31:31:ce:b7:22:e4:02:
31:00:a8:ed:00:d0:c0:14:7e:33:d6:21:0d:34:57:6b:24:42:
2a:2a:b2:02:f8:1b:7c:a9:5a:83:f5:28:11:b2:4c:05:9f:69:
5d:d0:b9:74:de:56:62:ed:76:5c:d3:c7:39:6e
3,791,246 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,774,588 >>> mbox cmd response: success
6,788,055 UART:
6,788,071 UART: Running Caliptra FMC ...
6,788,479 UART:
6,788,533 UART: [state] CFI Enabled
6,877,452 UART: [art] Extend RT PCRs Done
6,877,880 UART: [art] Lock RT PCRs Done
6,879,045 UART: [art] Populate DV Done
6,887,023 UART: [fht] FMC Alias Private Key: 7
6,888,187 UART: [art] Derive CDI
6,888,467 UART: [art] Store in in slot 0x4
6,973,846 UART: [art] Derive Key Pair
6,974,206 UART: [art] Store priv key in slot 0x5
6,986,828 UART: [art] Derive Key Pair - Done
7,001,572 UART: [art] Signing Cert with AUTHO
7,002,052 UART: RITY.KEYID = 7
7,017,204 UART: [art] Erasing AUTHORITY.KEYID = 7
7,017,969 UART: [art] PUB.X = 69F28C661C0AFAAC03BCE86ED3766085133EA456219EA68CF7B510F4419D46F2AB37014DD19DD24B5CEC7017903BA6AD
7,024,742 UART: [art] PUB.Y = 50D02B65AB37B4B69A216729D29F2CB7EBD2AB16D4FD5A4E1EABCBD16BD1ECBEEE1CECE7E02297526932B9D614B45009
7,031,713 UART: [art] SIG.R = 289C9C804F0840287829D8BD921007E52E82DC9C181A5588C5461BB5692C6A61C40D4CDA959E924A15A5E2A8DADD972C
7,038,476 UART: [art] SIG.S = 2778F66D520A82A32E26A0C4B9DAC0DE660876E63333EAA4AD3E34755B8844873DF79239C442825BB4E467E771C125B8
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
56:73:2c:97:df:34:96:fa:1e:b9:94:51:64:bb:de:20:20:0c:b2:4d
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=D2732C97DF3496FA1EB9945164BBDE20200CB24D6B4B816F4CABB9B1423A9280
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:69:f2:8c:66:1c:0a:fa:ac:03:bc:e8:6e:d3:76:
60:85:13:3e:a4:56:21:9e:a6:8c:f7:b5:10:f4:41:
9d:46:f2:ab:37:01:4d:d1:9d:d2:4b:5c:ec:70:17:
90:3b:a6:ad:50:d0:2b:65:ab:37:b4:b6:9a:21:67:
29:d2:9f:2c:b7:eb:d2:ab:16:d4:fd:5a:4e:1e:ab:
cb:d1:6b:d1:ec:be:ee:1c:ec:e7:e0:22:97:52:69:
32:b9:d6:14:b4:50:09
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
D2:73:2C:97:DF:34:96:FA:1E:B9:94:51:64:BB:DE:20:20:0C:B2:4D
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:28:9c:9c:80:4f:08:40:28:78:29:d8:bd:92:10:
07:e5:2e:82:dc:9c:18:1a:55:88:c5:46:1b:b5:69:2c:6a:61:
c4:0d:4c:da:95:9e:92:4a:15:a5:e2:a8:da:dd:97:2c:02:30:
27:78:f6:6d:52:0a:82:a3:2e:26:a0:c4:b9:da:c0:de:66:08:
76:e6:33:33:ea:a4:ad:3e:34:75:5b:88:44:87:3d:f7:92:39:
c4:42:82:5b:b4:e4:67:e7:71:c1:25:b8
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.15s
Truncated 5296 bytes from beginning
l=0, next_pc=40005400
3,883,855 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,923,420 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,965,207 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6f:f0:95:39:61:9d:72:9c:5c:16:33:40:dc:52:fa:e7:24:76:77:6f
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=6FF09539619D729C5C163340DC52FAE72476776F56F33C2BA89BD69EBE0ED048
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:0a:b3:91:bc:fd:10:77:36:54:53:f9:f7:8f:73:
35:49:cf:95:db:c1:02:91:74:81:a4:01:b7:cf:c5:
5d:ff:1f:bf:8d:48:44:05:23:66:08:3f:2a:68:56:
e3:22:d4:b5:f1:75:d2:00:01:6a:5f:ad:8d:13:8f:
f6:78:63:a1:df:04:e9:8e:09:fd:58:e6:a7:63:da:
04:86:01:3f:48:24:a2:dc:70:8f:6a:d1:79:35:3b:
9a:1f:20:33:a7:29:e7
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
6F:F0:95:39:61:9D:72:9C:5C:16:33:40:DC:52:FA:E7:24:76:77:6F
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:9d:84:0d:78:a6:18:5a:5b:cf:b8:61:22:31:
1d:7c:5a:63:4c:e5:4f:29:8f:3c:f0:cf:c6:23:4e:4b:b2:00:
f4:94:e0:6c:e6:9d:f4:0f:bf:d8:b6:21:e7:14:6d:8c:d2:02:
30:11:b1:71:ac:03:68:81:56:ee:c1:ca:73:97:30:bb:ed:88:
5f:bf:63:39:4b:15:9b:5a:62:1e:db:94:76:85:95:e1:93:27:
24:f4:9d:48:40:5b:56:1e:29:6a:fe:78:6b
3,976,121 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,976,897 UART:
3,976,913 UART: Running Caliptra ROM ...
3,977,321 UART:
3,977,463 UART: [state] CFI Enabled
3,980,530 UART: [state] LifecycleState = Production
3,981,138 UART: [state] DebugLocked = Yes
3,981,746 UART: [state] Starting the WD Timer 40000000 cycles
3,983,410 UART: [kat] SHA2-256
4,789,060 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,793,185 UART: [kat] ++
4,793,337 UART: [kat] sha1
4,797,513 UART: [kat] SHA2-256
4,799,453 UART: [kat] SHA2-384
4,802,304 UART: [kat] SHA2-512-ACC
4,804,204 UART: [kat] ECC-384
4,814,297 UART: [kat] HMAC-384Kdf
4,818,813 UART: [kat] LMS
5,067,141 UART: [kat] --
5,068,085 UART: [update-reset] ++
6,931,253 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,932,288 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87624
7,079,076 >>> mbox cmd response: success
7,079,368 UART: [update-reset] Copying MAN_2 To MAN_1
7,087,380 UART: [update-reset Success] --
7,088,415 UART: [state] Locking Datavault
7,089,093 UART: [state] Locking PCR0, PCR1 and PCR31
7,089,697 UART: [state] Locking ICCM
7,090,285 UART: [exit] Launching FMC @ 0x40000130
7,095,614 UART:
7,095,630 UART: Running Caliptra FMC ...
7,096,038 UART:
7,096,181 UART: [state] CFI Enabled
7,185,418 UART: [art] Extend RT PCRs Done
7,185,846 UART: [art] Lock RT PCRs Done
7,187,067 UART: [art] Populate DV Done
7,195,031 UART: [fht] FMC Alias Private Key: 7
7,196,105 UART: [art] Derive CDI
7,196,385 UART: [art] Store in in slot 0x4
7,282,148 UART: [art] Derive Key Pair
7,282,508 UART: [art] Store priv key in slot 0x5
7,295,934 UART: [art] Derive Key Pair - Done
7,310,617 UART: [art] Signing Cert with AUTHO
7,311,097 UART: RITY.KEYID = 7
7,326,405 UART: [art] Erasing AUTHORITY.KEYID = 7
7,327,170 UART: [art] PUB.X = EC18D9DA97A378384A128803CF2298E27115B972B9D1990E7D754E8136B95722B55840590A1EEEE021C7381740483259
7,333,917 UART: [art] PUB.Y = D2C516708B7BC1882C1179B0CA54A0547CBEFBB8B841EDACF402AA5844F7EF88DC1F3CCB0D73756E06DBBD7E91EEF01F
7,340,884 UART: [art] SIG.R = 5F65438E0B3E79401ABD884999B3787005332DAEA508A09AFCF8E8763A10F6E2C49E331C16026D5817BA70F49CA2CEB7
7,347,646 UART: [art] SIG.S = 44B0092DEE5B3734337C85CB16C285B5883E86825361251FD027FFCF4E7CB64ED56BB2DA293FE45579A233F2AC0570E8
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
56:ca:a1:df:22:14:fd:74:ef:71:2a:98:4e:02:20:06:0e:e3:3c:b1
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=56CAA1DF2214FD74EF712A984E0220060EE33CB10056E0B2BC88956B3CEF0847
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:ec:18:d9:da:97:a3:78:38:4a:12:88:03:cf:22:
98:e2:71:15:b9:72:b9:d1:99:0e:7d:75:4e:81:36:
b9:57:22:b5:58:40:59:0a:1e:ee:e0:21:c7:38:17:
40:48:32:59:d2:c5:16:70:8b:7b:c1:88:2c:11:79:
b0:ca:54:a0:54:7c:be:fb:b8:b8:41:ed:ac:f4:02:
aa:58:44:f7:ef:88:dc:1f:3c:cb:0d:73:75:6e:06:
db:bd:7e:91:ee:f0:1f
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
56:CA:A1:DF:22:14:FD:74:EF:71:2A:98:4E:02:20:06:0E:E3:3C:B1
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:5f:65:43:8e:0b:3e:79:40:1a:bd:88:49:99:b3:
78:70:05:33:2d:ae:a5:08:a0:9a:fc:f8:e8:76:3a:10:f6:e2:
c4:9e:33:1c:16:02:6d:58:17:ba:70:f4:9c:a2:ce:b7:02:30:
44:b0:09:2d:ee:5b:37:34:33:7c:85:cb:16:c2:85:b5:88:3e:
86:82:53:61:25:1f:d0:27:ff:cf:4e:7c:b6:4e:d5:6b:b2:da:
29:3f:e4:55:79:a2:33:f2:ac:05:70:e8
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.20s
Truncated 843 bytes from beginning
3,379,246 UART: [art] Lock RT PCRs Done
3,380,874 UART: [art] Populate DV Done
3,389,536 UART: [fht] FMC Alias Private Key: 7
3,390,664 UART: [art] Derive CDI
3,390,944 UART: [art] Store in in slot 0x4
3,476,575 UART: [art] Derive Key Pair
3,476,935 UART: [art] Store priv key in slot 0x5
3,490,449 UART: [art] Derive Key Pair - Done
3,504,964 UART: [art] Signing Cert with AUTHO
3,505,444 UART: RITY.KEYID = 7
3,520,590 UART: [art] Erasing AUTHORITY.KEYID = 7
3,521,355 UART: [art] PUB.X = 7F8161B0FCD6E61D6766EC5F8C701ECE3A00BE25D0F250BA41772EAF35CBF6E08D1F7FF8880E00781822967C11C3DB5E
3,528,092 UART: [art] PUB.Y = 53FF67F91B9B25526232E2C9B3948D923775B7AF7671B66CA088D6CED5EB7CE0DCE03133CF6B7E0660B6B21EE97937DE
3,535,049 UART: [art] SIG.R = 4F6739549FB35DD49BBBDF01F108CAE8EB81E5D8D9C4B794C3BF0CFC8D0C09CAE1D00B931A2CFC22DAFE570CC956A660
3,541,826 UART: [art] SIG.S = 170FA5999D2126EEAD14AF5B4CDA27A23E224115137FE3F4BB1DACE35DB710315226B710164D81D9430DD0F3FF113E85
3,565,733 UART: Caliptra RT
3,566,078 UART: [state] CFI Enabled
3,674,856 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,559 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,745,338 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,786,979 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2c:52:c7:6c:da:7e:aa:94:aa:5d:a0:ee:45:48:a6:48:02:48:6b:9e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=2C52C76CDA7EAA94AA5DA0EE4548A64802486B9E18D44CE706C5950E63AC2D03
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:7f:81:61:b0:fc:d6:e6:1d:67:66:ec:5f:8c:70:
1e:ce:3a:00:be:25:d0:f2:50:ba:41:77:2e:af:35:
cb:f6:e0:8d:1f:7f:f8:88:0e:00:78:18:22:96:7c:
11:c3:db:5e:53:ff:67:f9:1b:9b:25:52:62:32:e2:
c9:b3:94:8d:92:37:75:b7:af:76:71:b6:6c:a0:88:
d6:ce:d5:eb:7c:e0:dc:e0:31:33:cf:6b:7e:06:60:
b6:b2:1e:e9:79:37:de
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
2C:52:C7:6C:DA:7E:AA:94:AA:5D:A0:EE:45:48:A6:48:02:48:6B:9E
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:4f:67:39:54:9f:b3:5d:d4:9b:bb:df:01:f1:08:
ca:e8:eb:81:e5:d8:d9:c4:b7:94:c3:bf:0c:fc:8d:0c:09:ca:
e1:d0:0b:93:1a:2c:fc:22:da:fe:57:0c:c9:56:a6:60:02:30:
17:0f:a5:99:9d:21:26:ee:ad:14:af:5b:4c:da:27:a2:3e:22:
41:15:13:7f:e3:f4:bb:1d:ac:e3:5d:b7:10:31:52:26:b7:10:
16:4d:81:d9:43:0d:d0:f3:ff:11:3e:85
3,797,747 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,766,970 >>> mbox cmd response: success
6,779,889 UART:
6,779,905 UART: Running Caliptra FMC ...
6,780,313 UART:
6,780,456 UART: [state] CFI Enabled
6,869,477 UART: [art] Extend RT PCRs Done
6,869,905 UART: [art] Lock RT PCRs Done
6,871,328 UART: [art] Populate DV Done
6,879,692 UART: [fht] FMC Alias Private Key: 7
6,880,782 UART: [art] Derive CDI
6,881,062 UART: [art] Store in in slot 0x4
6,966,723 UART: [art] Derive Key Pair
6,967,083 UART: [art] Store priv key in slot 0x5
6,980,657 UART: [art] Derive Key Pair - Done
6,995,559 UART: [art] Signing Cert with AUTHO
6,996,039 UART: RITY.KEYID = 7
7,011,321 UART: [art] Erasing AUTHORITY.KEYID = 7
7,012,086 UART: [art] PUB.X = 6277FB116348666960A58A0928B5DCD8E19529E1822B2A567B23EED25283A5D6B6E1B3CCD79BB5E770A6CDB1D86C4662
7,018,857 UART: [art] PUB.Y = B6B73A23EB1598A87F1A4B9E0DBE35A0A8905CD6B7F9599520FE6CBD234874BA4FF5E7B4CBC5CF2565E194B1955CD0ED
7,025,824 UART: [art] SIG.R = 1862B6AEFFBC1F759073C5EAAED29AC489F6FA49142FC7D88CCF1C742789EAB40D6D5521AF73F298D567D8D43C47AB0E
7,032,608 UART: [art] SIG.S = 18EE00194ECAEBA0990640A323E80957A8EAFCB60E5AB45F0607E3E8A01C49CA11EF8E50BB2BE73948241901D3E06D51
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
36:5c:77:89:4b:d6:c1:5c:01:cd:19:17:a2:1d:7b:8d:da:ab:c3:d4
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B65C77894BD6C15C01CD1917A21D7B8DDAABC3D4CCA5C41F835AA5957FCC6872
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:62:77:fb:11:63:48:66:69:60:a5:8a:09:28:b5:
dc:d8:e1:95:29:e1:82:2b:2a:56:7b:23:ee:d2:52:
83:a5:d6:b6:e1:b3:cc:d7:9b:b5:e7:70:a6:cd:b1:
d8:6c:46:62:b6:b7:3a:23:eb:15:98:a8:7f:1a:4b:
9e:0d:be:35:a0:a8:90:5c:d6:b7:f9:59:95:20:fe:
6c:bd:23:48:74:ba:4f:f5:e7:b4:cb:c5:cf:25:65:
e1:94:b1:95:5c:d0:ed
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
B6:5C:77:89:4B:D6:C1:5C:01:CD:19:17:A2:1D:7B:8D:DA:AB:C3:D4
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:18:62:b6:ae:ff:bc:1f:75:90:73:c5:ea:ae:d2:
9a:c4:89:f6:fa:49:14:2f:c7:d8:8c:cf:1c:74:27:89:ea:b4:
0d:6d:55:21:af:73:f2:98:d5:67:d8:d4:3c:47:ab:0e:02:30:
18:ee:00:19:4e:ca:eb:a0:99:06:40:a3:23:e8:09:57:a8:ea:
fc:b6:0e:5a:b4:5f:06:07:e3:e8:a0:1c:49:ca:11:ef:8e:50:
bb:2b:e7:39:48:24:19:01:d3:e0:6d:51
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.22s
Truncated 5293 bytes from beginning
tval=0, next_pc=40005400
3,882,587 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,922,254 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,659 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0d:fa:e9:c1:37:81:6a:98:88:27:34:9c:f7:38:ab:09:0c:94:45:f2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=0DFAE9C137816A988827349CF738AB090C9445F2A3BA344CE948F8B2D53F9867
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:ac:a3:5a:d3:f1:40:07:c4:da:f9:b3:c4:07:b6:
e6:6c:d0:f8:ce:9e:5d:dd:dd:f3:b9:88:12:80:ba:
08:68:10:03:2a:83:9d:1d:ef:a8:f2:0d:b4:ac:3a:
ae:0c:26:0c:05:68:1a:77:ed:a3:ba:7f:6d:11:d0:
7c:32:6c:57:4a:d5:4e:d5:1c:4c:66:e6:1c:15:12:
7d:a1:82:9a:87:d1:bd:05:85:aa:5b:31:fc:fa:4c:
42:c0:58:5a:8c:33:1c
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
0D:FA:E9:C1:37:81:6A:98:88:27:34:9C:F7:38:AB:09:0C:94:45:F2
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:42:73:1b:ed:a8:fa:c5:0f:c4:09:3f:8d:ab:a6:
1a:8d:2e:4b:a4:df:5e:01:84:6c:2b:13:2f:04:47:ae:2c:dc:
e6:26:9e:b1:42:1e:2b:0a:a2:f0:bb:ce:d1:3f:24:64:02:30:
6b:d4:97:9e:d0:d4:fa:c1:56:36:d0:68:d3:76:7e:26:c1:de:
23:89:4e:fb:b6:4b:99:1d:bc:63:e9:16:e4:ee:9e:99:68:8a:
a6:ab:c4:86:1c:5a:5f:19:05:cf:46:78
3,974,619 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,059 UART:
3,975,075 UART: Running Caliptra ROM ...
3,975,483 UART:
3,975,538 UART: [state] CFI Enabled
3,978,345 UART: [state] LifecycleState = Production
3,978,953 UART: [state] DebugLocked = Yes
3,979,663 UART: [state] Starting the WD Timer 40000000 cycles
3,981,225 UART: [kat] SHA2-256
4,784,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,788,904 UART: [kat] ++
4,789,056 UART: [kat] sha1
4,793,248 UART: [kat] SHA2-256
4,795,188 UART: [kat] SHA2-384
4,797,943 UART: [kat] SHA2-512-ACC
4,799,843 UART: [kat] ECC-384
4,809,350 UART: [kat] HMAC-384Kdf
4,813,958 UART: [kat] LMS
5,062,270 UART: [kat] --
5,063,212 UART: [update-reset] ++
6,918,212 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,919,193 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87624
7,065,981 >>> mbox cmd response: success
7,066,269 UART: [update-reset] Copying MAN_2 To MAN_1
7,074,281 UART: [update-reset Success] --
7,075,440 UART: [state] Locking Datavault
7,076,242 UART: [state] Locking PCR0, PCR1 and PCR31
7,076,846 UART: [state] Locking ICCM
7,077,450 UART: [exit] Launching FMC @ 0x40000130
7,082,779 UART:
7,082,795 UART: Running Caliptra FMC ...
7,083,203 UART:
7,083,257 UART: [state] CFI Enabled
7,172,414 UART: [art] Extend RT PCRs Done
7,172,842 UART: [art] Lock RT PCRs Done
7,173,985 UART: [art] Populate DV Done
7,182,307 UART: [fht] FMC Alias Private Key: 7
7,183,245 UART: [art] Derive CDI
7,183,525 UART: [art] Store in in slot 0x4
7,269,064 UART: [art] Derive Key Pair
7,269,424 UART: [art] Store priv key in slot 0x5
7,282,754 UART: [art] Derive Key Pair - Done
7,297,576 UART: [art] Signing Cert with AUTHO
7,298,056 UART: RITY.KEYID = 7
7,313,084 UART: [art] Erasing AUTHORITY.KEYID = 7
7,313,849 UART: [art] PUB.X = 854ECE449E7991D786D92A006DBDB6348698D8315A30563A25F266D09A93ECFD4EFE47C0522A818803599F7682A9C946
7,320,590 UART: [art] PUB.Y = 255B3B14F3816C89C9635AED4AE0F292EA58603E3703C89962BF33ED030479AA48EAEBB2045DAAA893DDED9B11EB6D4F
7,327,544 UART: [art] SIG.R = 355DE9E1EB9DB45218D73A3E99759BE613DF890A6DB37C28DE7A2109422EA01ECB9CB1D97993849C78CE166A7EBB3DB0
7,334,322 UART: [art] SIG.S = 7A7E9F5FD908A67374C736B2F1AE6408B690A76E11CA16F4DDA4F934CAABD9871D4CAC5446AAC019883AC32B49266DB0
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1f:60:52:03:f1:aa:77:dc:ad:70:87:2d:8e:71:5f:21:f8:1e:0b:e5
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9F605203F1AA77DCAD70872D8E715F21F81E0BE56672CD5CA16EE0248D7DE6AE
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:85:4e:ce:44:9e:79:91:d7:86:d9:2a:00:6d:bd:
b6:34:86:98:d8:31:5a:30:56:3a:25:f2:66:d0:9a:
93:ec:fd:4e:fe:47:c0:52:2a:81:88:03:59:9f:76:
82:a9:c9:46:25:5b:3b:14:f3:81:6c:89:c9:63:5a:
ed:4a:e0:f2:92:ea:58:60:3e:37:03:c8:99:62:bf:
33:ed:03:04:79:aa:48:ea:eb:b2:04:5d:aa:a8:93:
dd:ed:9b:11:eb:6d:4f
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
9F:60:52:03:F1:AA:77:DC:AD:70:87:2D:8E:71:5F:21:F8:1E:0B:E5
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:35:5d:e9:e1:eb:9d:b4:52:18:d7:3a:3e:99:75:
9b:e6:13:df:89:0a:6d:b3:7c:28:de:7a:21:09:42:2e:a0:1e:
cb:9c:b1:d9:79:93:84:9c:78:ce:16:6a:7e:bb:3d:b0:02:30:
7a:7e:9f:5f:d9:08:a6:73:74:c7:36:b2:f1:ae:64:08:b6:90:
a7:6e:11:ca:16:f4:dd:a4:f9:34:ca:ab:d9:87:1d:4c:ac:54:
46:aa:c0:19:88:3a:c3:2b:49:26:6d:b0
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.16s
Truncated 852 bytes from beginning
UART: [art] Lock RT PCRs Done
3,382,331 UART: [art] Populate DV Done
3,390,493 UART: [fht] FMC Alias Private Key: 7
3,391,499 UART: [art] Derive CDI
3,391,779 UART: [art] Store in in slot 0x4
3,477,906 UART: [art] Derive Key Pair
3,478,266 UART: [art] Store priv key in slot 0x5
3,491,206 UART: [art] Derive Key Pair - Done
3,505,924 UART: [art] Signing Cert with AUTHO
3,506,404 UART: RITY.KEYID = 7
3,521,528 UART: [art] Erasing AUTHORITY.KEYID = 7
3,522,293 UART: [art] PUB.X = F68E8E0CFFE20DCF556A29BD1E5605D59E9ED1CEE4F54C9F23E14579B4AD0257139896E7CCD1D7BA03A4F03D597D25DF
3,529,068 UART: [art] PUB.Y = A4C2170DA3965175ECC112B1DFDAD72708FAF647CCE6305DE7E07D3848C426034B9FBE67CAA3B7E67500E6D1397E53D3
3,535,999 UART: [art] SIG.R = CBF6401AD5B09475A3B11CDD8C8236E38F51F5327A6B5EEDE1DCEBD30273F0C378EC444D3BBAC4E865DCD5F7CED4E225
3,542,792 UART: [art] SIG.S = D240BA948D098D7E5089D4C8F775968A9B69194D051C425403A3F22453CA3D0212CB770A5D4C3E8A3371745EA4F8B696
3,566,722 UART: Caliptra RT
3,566,975 UART: [state] CFI Enabled
3,674,130 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,487 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,744,224 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,785,877 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:e7:51:c7:53:0c:0d:d3:e0:f6:ec:5b:ce:47:4c:9f:70:d0:6e:b2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=94E751C7530C0DD3E0F6EC5BCE474C9F70D06EB2052CA8DF566CDD549A633C23
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:f6:8e:8e:0c:ff:e2:0d:cf:55:6a:29:bd:1e:56:
05:d5:9e:9e:d1:ce:e4:f5:4c:9f:23:e1:45:79:b4:
ad:02:57:13:98:96:e7:cc:d1:d7:ba:03:a4:f0:3d:
59:7d:25:df:a4:c2:17:0d:a3:96:51:75:ec:c1:12:
b1:df:da:d7:27:08:fa:f6:47:cc:e6:30:5d:e7:e0:
7d:38:48:c4:26:03:4b:9f:be:67:ca:a3:b7:e6:75:
00:e6:d1:39:7e:53:d3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
94:E7:51:C7:53:0C:0D:D3:E0:F6:EC:5B:CE:47:4C:9F:70:D0:6E:B2
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:cb:f6:40:1a:d5:b0:94:75:a3:b1:1c:dd:8c:
82:36:e3:8f:51:f5:32:7a:6b:5e:ed:e1:dc:eb:d3:02:73:f0:
c3:78:ec:44:4d:3b:ba:c4:e8:65:dc:d5:f7:ce:d4:e2:25:02:
31:00:d2:40:ba:94:8d:09:8d:7e:50:89:d4:c8:f7:75:96:8a:
9b:69:19:4d:05:1c:42:54:03:a3:f2:24:53:ca:3d:02:12:cb:
77:0a:5d:4c:3e:8a:33:71:74:5e:a4:f8:b6:96
3,796,470 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,769,763 >>> mbox cmd response: success
6,783,552 UART:
6,783,568 UART: Running Caliptra FMC ...
6,783,976 UART:
6,784,030 UART: [state] CFI Enabled
6,872,745 UART: [art] Extend RT PCRs Done
6,873,173 UART: [art] Lock RT PCRs Done
6,874,600 UART: [art] Populate DV Done
6,883,092 UART: [fht] FMC Alias Private Key: 7
6,884,270 UART: [art] Derive CDI
6,884,550 UART: [art] Store in in slot 0x4
6,970,171 UART: [art] Derive Key Pair
6,970,531 UART: [art] Store priv key in slot 0x5
6,983,877 UART: [art] Derive Key Pair - Done
6,998,599 UART: [art] Signing Cert with AUTHO
6,999,079 UART: RITY.KEYID = 7
7,014,231 UART: [art] Erasing AUTHORITY.KEYID = 7
7,014,996 UART: [art] PUB.X = 68736CFD8FDC387FD0D72E9DE8BE72671A5FBE434A430BA31E87BC13DE555024B9E0462205848C44DF4F451DE7539D65
7,021,768 UART: [art] PUB.Y = 9A1A2A4C5205C66D1DFF4B88CC5B8241134763321B1EF8F54D02A411F3B7BDBFF332CE261B9BB310EEA9214378ACCBBB
7,028,730 UART: [art] SIG.R = BA610BE2F2E0232F59D3CE0032A54012A347C030BDB3B704DDB10BE41108F9615DE65CB981D521BBD671F07748684583
7,035,468 UART: [art] SIG.S = 193C0D1809A1B293F09FF4C996BC8056CC50D8421F1FD9ACE78474391F5A32E1DB90287A3479728682016CB47719D05C
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:ca:86:55:9e:f0:a8:76:c2:3b:49:d6:1b:9f:46:33:d3:54:56:54
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=C4CA86559EF0A876C23B49D61B9F4633D354565463DA61B6652CFEEE2EDFE074
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:68:73:6c:fd:8f:dc:38:7f:d0:d7:2e:9d:e8:be:
72:67:1a:5f:be:43:4a:43:0b:a3:1e:87:bc:13:de:
55:50:24:b9:e0:46:22:05:84:8c:44:df:4f:45:1d:
e7:53:9d:65:9a:1a:2a:4c:52:05:c6:6d:1d:ff:4b:
88:cc:5b:82:41:13:47:63:32:1b:1e:f8:f5:4d:02:
a4:11:f3:b7:bd:bf:f3:32:ce:26:1b:9b:b3:10:ee:
a9:21:43:78:ac:cb:bb
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
C4:CA:86:55:9E:F0:A8:76:C2:3B:49:D6:1B:9F:46:33:D3:54:56:54
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:ba:61:0b:e2:f2:e0:23:2f:59:d3:ce:00:32:
a5:40:12:a3:47:c0:30:bd:b3:b7:04:dd:b1:0b:e4:11:08:f9:
61:5d:e6:5c:b9:81:d5:21:bb:d6:71:f0:77:48:68:45:83:02:
30:19:3c:0d:18:09:a1:b2:93:f0:9f:f4:c9:96:bc:80:56:cc:
50:d8:42:1f:1f:d9:ac:e7:84:74:39:1f:5a:32:e1:db:90:28:
7a:34:79:72:86:82:01:6c:b4:77:19:d0:5c
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.20s
Truncated 5302 bytes from beginning
ext_pc=40005400
3,873,458 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,913,401 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,954,796 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
55:7b:47:19:02:83:14:a3:1f:3e:99:7f:8c:d5:ed:29:da:67:7b:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=D17B4719028314A31F3E997F8CD5ED29DA677B41FC5BF299DEE91D82E44C0629
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:19:5f:22:60:d0:10:73:1c:57:bb:34:6f:9f:c8:
ef:c5:1e:d1:c5:da:36:1b:21:5a:84:88:ff:27:9e:
e1:3a:f0:cb:09:61:4b:d3:66:6d:d9:2f:c1:f5:35:
e0:a6:b4:31:a0:70:38:3c:94:98:b5:94:b9:7d:f2:
44:d0:b3:59:c4:95:27:dd:01:1a:7c:38:69:b4:d5:
57:7c:ff:0e:d2:58:ed:44:29:44:b4:d0:23:5a:32:
8d:45:41:1e:d8:c7:4a
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
D1:7B:47:19:02:83:14:A3:1F:3E:99:7F:8C:D5:ED:29:DA:67:7B:41
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:d8:96:15:8d:b9:84:40:ea:85:bd:33:10:18:
a1:b3:2d:ca:19:2f:a1:bf:30:2c:4e:06:03:ae:18:59:53:f7:
84:fd:2d:db:b1:47:34:ec:09:d0:50:69:6d:62:bd:f9:27:02:
31:00:e8:a1:f4:dd:7e:a3:b2:35:be:7d:a7:d7:cc:5b:fa:71:
bd:dc:2e:8f:7e:64:69:45:ef:65:9c:47:ab:0f:ac:2f:e3:b0:
05:9d:b9:65:14:06:1b:2b:24:be:a7:31:d6:e2
3,965,511 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,033 UART:
3,966,049 UART: Running Caliptra ROM ...
3,966,457 UART:
3,966,599 UART: [state] CFI Enabled
3,968,724 UART: [state] LifecycleState = Production
3,969,332 UART: [state] DebugLocked = Yes
3,969,938 UART: [state] Starting the WD Timer 40000000 cycles
3,971,566 UART: [kat] SHA2-256
4,775,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,779,245 UART: [kat] ++
4,779,397 UART: [kat] sha1
4,783,645 UART: [kat] SHA2-256
4,785,585 UART: [kat] SHA2-384
4,788,466 UART: [kat] SHA2-512-ACC
4,790,366 UART: [kat] ECC-384
4,800,391 UART: [kat] HMAC-384Kdf
4,805,063 UART: [kat] LMS
5,053,375 UART: [kat] --
5,054,195 UART: [update-reset] ++
6,904,205 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,905,372 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87624
7,052,160 >>> mbox cmd response: success
7,052,308 UART: [update-reset] Copying MAN_2 To MAN_1
7,060,320 UART: [update-reset Success] --
7,061,201 UART: [state] Locking Datavault
7,062,137 UART: [state] Locking PCR0, PCR1 and PCR31
7,062,741 UART: [state] Locking ICCM
7,063,205 UART: [exit] Launching FMC @ 0x40000130
7,068,534 UART:
7,068,550 UART: Running Caliptra FMC ...
7,068,958 UART:
7,069,101 UART: [state] CFI Enabled
7,157,576 UART: [art] Extend RT PCRs Done
7,158,004 UART: [art] Lock RT PCRs Done
7,159,049 UART: [art] Populate DV Done
7,167,179 UART: [fht] FMC Alias Private Key: 7
7,168,215 UART: [art] Derive CDI
7,168,495 UART: [art] Store in in slot 0x4
7,254,532 UART: [art] Derive Key Pair
7,254,892 UART: [art] Store priv key in slot 0x5
7,268,228 UART: [art] Derive Key Pair - Done
7,282,868 UART: [art] Signing Cert with AUTHO
7,283,348 UART: RITY.KEYID = 7
7,298,758 UART: [art] Erasing AUTHORITY.KEYID = 7
7,299,523 UART: [art] PUB.X = FE2A169686B6219153A29C2138D2A9868BA54A7A6297A44520B37DC754DD922011EABAD1DC60B1C16F2B6A377E37132A
7,306,295 UART: [art] PUB.Y = B70859B3CC41E54DC6E05EC7F7BB0458A2FBC4892F5AE5D18600F8673FF437F701FFD16079BBA0693FDA0E214EB14967
7,313,223 UART: [art] SIG.R = 68AD2EF05C1C8EE63C6C72B5FB2B5D1AFCD8672C66639117F75094288CC5258CF29E2293E818FC0898B1B3E680A58B74
7,319,996 UART: [art] SIG.S = BD289D9544CFE5C01751559C3E996A4D7AFCACC92A56EF0135AE7189507B293B70D6931D4ED9929BAE99F737D8B3F8E7
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
16:3e:32:97:2f:85:44:74:27:e7:29:8d:17:1a:fd:91:9f:b7:da:e7
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=923E32972F85447427E7298D171AFD919FB7DAE73FADEBCBEA806D69C38F3959
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:fe:2a:16:96:86:b6:21:91:53:a2:9c:21:38:d2:
a9:86:8b:a5:4a:7a:62:97:a4:45:20:b3:7d:c7:54:
dd:92:20:11:ea:ba:d1:dc:60:b1:c1:6f:2b:6a:37:
7e:37:13:2a:b7:08:59:b3:cc:41:e5:4d:c6:e0:5e:
c7:f7:bb:04:58:a2:fb:c4:89:2f:5a:e5:d1:86:00:
f8:67:3f:f4:37:f7:01:ff:d1:60:79:bb:a0:69:3f:
da:0e:21:4e:b1:49:67
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
92:3E:32:97:2F:85:44:74:27:E7:29:8D:17:1A:FD:91:9F:B7:DA:E7
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:68:ad:2e:f0:5c:1c:8e:e6:3c:6c:72:b5:fb:2b:
5d:1a:fc:d8:67:2c:66:63:91:17:f7:50:94:28:8c:c5:25:8c:
f2:9e:22:93:e8:18:fc:08:98:b1:b3:e6:80:a5:8b:74:02:31:
00:bd:28:9d:95:44:cf:e5:c0:17:51:55:9c:3e:99:6a:4d:7a:
fc:ac:c9:2a:56:ef:01:35:ae:71:89:50:7b:29:3b:70:d6:93:
1d:4e:d9:92:9b:ae:99:f7:37:d8:b3:f8:e7
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.22s
Truncated 849 bytes from beginning
015 UART: [art] Lock RT PCRs Done
3,377,541 UART: [art] Populate DV Done
3,385,771 UART: [fht] FMC Alias Private Key: 7
3,386,879 UART: [art] Derive CDI
3,387,159 UART: [art] Store in in slot 0x4
3,472,970 UART: [art] Derive Key Pair
3,473,330 UART: [art] Store priv key in slot 0x5
3,486,060 UART: [art] Derive Key Pair - Done
3,500,564 UART: [art] Signing Cert with AUTHO
3,501,044 UART: RITY.KEYID = 7
3,516,942 UART: [art] Erasing AUTHORITY.KEYID = 7
3,517,707 UART: [art] PUB.X = 80D0D410EF8A8906746E0378A23A71E1162E4E9F3DA1FF50FF2F29C97C14E4C1475D85F290E04505EE8ADB52674197A7
3,524,470 UART: [art] PUB.Y = DD09D2B582818DB866AF5DC0885BB554A309586F66B3762222064B2917E905E6FEEC7A3B8394BC639D1263E9760B7AF1
3,531,405 UART: [art] SIG.R = EB8133A3C25666DE45882DC7A82E3235170D4008669C7DAA81856FB1E6FA7EFE00E20580B3AD4E64324134A0C985375E
3,538,144 UART: [art] SIG.S = 9B144AD526324A13E56B0B99777D5A63846EEF3AB66554F1B253E85D0F9222713DDC583D39C6D8A7655E951C99BB916C
3,562,249 UART: Caliptra RT
3,562,594 UART: [state] CFI Enabled
3,671,229 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,558 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,333 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,782,694 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [b0, 4a, 00, 16, a0, b6, cf, c8, 49, f2, 37, 84, d4, 4d, 98, 96, 80, f2, c5, be, 95, b2, b8, 7f, 85, ea, b1, 13, d4, a5, 19, 41, 1e, e9, 20, a9, 0a, e1, 37, c6, 47, 63, 27, 39, 56, 74, ce, c9]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7c:14:fc:e8:f3:91:d3:b3:1c:fa:f4:dd:d2:9b:d2:c8:6a:f5:ea:72
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=7814FCE8F391D3B31CFAF4DDD29BD2C86AF5EA7266F291D55CB649C2BDE7C45C
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:d0:d4:10:ef:8a:89:06:74:6e:03:78:a2:3a:
71:e1:16:2e:4e:9f:3d:a1:ff:50:ff:2f:29:c9:7c:
14:e4:c1:47:5d:85:f2:90:e0:45:05:ee:8a:db:52:
67:41:97:a7:dd:09:d2:b5:82:81:8d:b8:66:af:5d:
c0:88:5b:b5:54:a3:09:58:6f:66:b3:76:22:22:06:
4b:29:17:e9:05:e6:fe:ec:7a:3b:83:94:bc:63:9d:
12:63:e9:76:0b:7a:f1
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..J......7.I..M.............A.... ...7.
9'cG..tV..RT_INFO
X509v3 Subject Key Identifier:
78:14:FC:E8:F3:91:D3:B3:1C:FA:F4:DD:D2:9B:D2:C8:6A:F5:EA:72
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:eb:81:33:a3:c2:56:66:de:45:88:2d:c7:a8:
2e:32:35:17:0d:40:08:66:9c:7d:aa:81:85:6f:b1:e6:fa:7e:
fe:00:e2:05:80:b3:ad:4e:64:32:41:34:a0:c9:85:37:5e:02:
31:00:9b:14:4a:d5:26:32:4a:13:e5:6b:0b:99:77:7d:5a:63:
84:6e:ef:3a:b6:65:54:f1:b2:53:e8:5d:0f:92:22:71:3d:dc:
58:3d:39:c6:d8:a7:65:5e:95:1c:99:bb:91:6c
3,793,631 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,769,318 >>> mbox cmd response: success
6,782,651 UART:
6,782,667 UART: Running Caliptra FMC ...
6,783,075 UART:
6,783,218 UART: [state] CFI Enabled
6,872,393 UART: [art] Extend RT PCRs Done
6,872,821 UART: [art] Lock RT PCRs Done
6,873,956 UART: [art] Populate DV Done
6,882,244 UART: [fht] FMC Alias Private Key: 7
6,883,274 UART: [art] Derive CDI
6,883,554 UART: [art] Store in in slot 0x4
6,968,907 UART: [art] Derive Key Pair
6,969,267 UART: [art] Store priv key in slot 0x5
6,982,433 UART: [art] Derive Key Pair - Done
6,997,040 UART: [art] Signing Cert with AUTHO
6,997,520 UART: RITY.KEYID = 7
7,013,310 UART: [art] Erasing AUTHORITY.KEYID = 7
7,014,075 UART: [art] PUB.X = AF94873B96D7F1F76CEC4C463B88066D266F48AF7FFDA63C946CA234F4D1C954F89B2BD6244ADFCBABB84EBF08D38339
7,020,859 UART: [art] PUB.Y = 44405CAE1523A4DDFE166CD696F3282EDC8B6265735D9CC54547FA431A1E1B2AC82FFAC21CAFCBFC7BBF9C8459C527DA
7,027,833 UART: [art] SIG.R = 1A8B5CC6D70F745F643CA333BF355579B424B7EAEA5AA87A7834D6A084225CB9FD846EC0FF9F4D7B2EB6BC9929D4394B
7,034,616 UART: [art] SIG.S = 6A71775EED18F08F3EC99F2269E42C22D49556F05B3DDA2A20FD8A939B0A9966DBA854EC5839B1A60762264D1C1CDBE7
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1e:28:8c:b0:a5:00:46:60:ca:13:26:d9:a3:87:4d:75:54:39:45:42
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9E288CB0A5004660CA1326D9A3874D75543945421ADD8F6A2086F8894C31454E
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:af:94:87:3b:96:d7:f1:f7:6c:ec:4c:46:3b:88:
06:6d:26:6f:48:af:7f:fd:a6:3c:94:6c:a2:34:f4:
d1:c9:54:f8:9b:2b:d6:24:4a:df:cb:ab:b8:4e:bf:
08:d3:83:39:44:40:5c:ae:15:23:a4:dd:fe:16:6c:
d6:96:f3:28:2e:dc:8b:62:65:73:5d:9c:c5:45:47:
fa:43:1a:1e:1b:2a:c8:2f:fa:c2:1c:af:cb:fc:7b:
bf:9c:84:59:c5:27:da
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
9E:28:8C:B0:A5:00:46:60:CA:13:26:D9:A3:87:4D:75:54:39:45:42
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:1a:8b:5c:c6:d7:0f:74:5f:64:3c:a3:33:bf:35:
55:79:b4:24:b7:ea:ea:5a:a8:7a:78:34:d6:a0:84:22:5c:b9:
fd:84:6e:c0:ff:9f:4d:7b:2e:b6:bc:99:29:d4:39:4b:02:30:
6a:71:77:5e:ed:18:f0:8f:3e:c9:9f:22:69:e4:2c:22:d4:95:
56:f0:5b:3d:da:2a:20:fd:8a:93:9b:0a:99:66:db:a8:54:ec:
58:39:b1:a6:07:62:26:4d:1c:1c:db:e7
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 114332 bytes
2,883,729 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,961 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,313 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,210 >>> mbox cmd response: success
3,077,430 UART: [afmc] ++
3,077,598 UART: [afmc] CDI.KEYID = 6
3,077,960 UART: [afmc] SUBJECT.KEYID = 7
3,078,385 UART: [afmc] AUTHORITY.KEYID = 5
3,112,794 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,342 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,122 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,850 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,735 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,425 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,512 UART: [afmc] --
3,156,520 UART: [cold-reset] --
3,157,214 UART: [state] Locking Datavault
3,158,167 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,771 UART: [state] Locking ICCM
3,159,327 UART: [exit] Launching FMC @ 0x40000130
3,164,656 UART:
3,164,672 UART: Running Caliptra FMC ...
3,165,080 UART:
3,165,134 UART: [state] CFI Enabled
3,175,499 UART: [fht] FMC Alias Private Key: 7
3,283,424 UART: [art] Extend RT PCRs Done
3,283,852 UART: [art] Lock RT PCRs Done
3,285,340 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3197843 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 114332 bytes
2,883,692 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,921 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,273 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,169 >>> mbox cmd response: success
3,077,386 UART: [afmc] ++
3,077,554 UART: [afmc] CDI.KEYID = 6
3,077,916 UART: [afmc] SUBJECT.KEYID = 7
3,078,341 UART: [afmc] AUTHORITY.KEYID = 5
3,112,746 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,294 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,074 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,135,785 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,141,685 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,147,414 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,155,488 UART: [afmc] --
3,156,495 UART: [cold-reset] --
3,157,189 UART: [state] Locking Datavault
3,158,142 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,746 UART: [state] Locking ICCM
3,159,302 UART: [exit] Launching FMC @ 0x40000130
3,164,631 UART:
3,164,647 UART: Running Caliptra FMC ...
3,165,055 UART:
3,165,109 UART: [state] CFI Enabled
3,175,475 UART: [fht] FMC Alias Private Key: 7
3,283,410 UART: [art] Extend RT PCRs Done
3,283,838 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,285,326 UART: [art] PopuFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
3,287,660 UART: WDT Expired
3,287,869 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,846 >>> mbox cmd response: success
2,986,934 UART:
2,986,950 UART: Running Caliptra FMC ...
2,987,358 UART:
2,987,412 UART: [state] CFI Enabled
2,997,777 UART: [fht] FMC Alias Private Key: 7
3,105,702 UART: [art] Extend RT PCRs Done
3,106,130 UART: [art] Lock RT PCRs Done
3,107,618 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,093 >>> mbox cmd response: success
2,987,170 UART:
2,987,186 UART: Running Caliptra FMC ...
2,987,594 UART:
2,987,648 UART: [state] CFI Enabled
2,998,014 UART: [fht] FMC Alias Private Key: 7
3,105,949 UART: [art] Extend RT PCRs Done
3,106,377 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,107,865 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028F0error_internal_intr_r=00000040
3,110,182 UART: WDT Expired
3,110,391 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 114332 bytes
2,885,082 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,026 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,378 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,369 >>> mbox cmd response: success
3,078,601 UART: [afmc] ++
3,078,769 UART: [afmc] CDI.KEYID = 6
3,079,131 UART: [afmc] SUBJECT.KEYID = 7
3,079,556 UART: [afmc] AUTHORITY.KEYID = 5
3,115,125 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,465 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,245 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,973 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,858 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,548 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,505 UART: [afmc] --
3,158,445 UART: [cold-reset] --
3,159,381 UART: [state] Locking Datavault
3,160,538 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,142 UART: [state] Locking ICCM
3,161,748 UART: [exit] Launching FMC @ 0x40000130
3,167,077 UART:
3,167,093 UART: Running Caliptra FMC ...
3,167,501 UART:
3,167,644 UART: [state] CFI Enabled
3,178,271 UART: [fht] FMC Alias Private Key: 7
3,286,020 UART: [art] Extend RT PCRs Done
3,286,448 UART: [art] Lock RT PCRs Done
3,287,750 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3199264 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 114332 bytes
2,885,045 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,986 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,338 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,328 >>> mbox cmd response: success
3,078,557 UART: [afmc] ++
3,078,725 UART: [afmc] CDI.KEYID = 6
3,079,087 UART: [afmc] SUBJECT.KEYID = 7
3,079,512 UART: [afmc] AUTHORITY.KEYID = 5
3,115,077 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,417 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,197 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,137,908 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,143,808 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,149,537 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,157,481 UART: [afmc] --
3,158,420 UART: [cold-reset] --
3,159,356 UART: [state] Locking Datavault
3,160,513 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,117 UART: [state] Locking ICCM
3,161,723 UART: [exit] Launching FMC @ 0x40000130
3,167,052 UART:
3,167,068 UART: Running Caliptra FMC ...
3,167,476 UART:
3,167,619 UART: [state] CFI Enabled
3,178,247 UART: [fht] FMC Alias Private Key: 7
3,286,006 UART: [art] Extend RT PCRs Done
3,286,434 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,287,736 UART: [art] PopuFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
3,290,060 UART: WDT Expired
3,290,269 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,005 >>> mbox cmd response: success
2,989,355 UART:
2,989,371 UART: Running Caliptra FMC ...
2,989,779 UART:
2,989,922 UART: [state] CFI Enabled
3,000,549 UART: [fht] FMC Alias Private Key: 7
3,108,298 UART: [art] Extend RT PCRs Done
3,108,726 UART: [art] Lock RT PCRs Done
3,110,028 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,252 >>> mbox cmd response: success
2,989,591 UART:
2,989,607 UART: Running Caliptra FMC ...
2,990,015 UART:
2,990,158 UART: [state] CFI Enabled
3,000,786 UART: [fht] FMC Alias Private Key: 7
3,108,545 UART: [art] Extend RT PCRs Done
3,108,973 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,110,275 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D6error_internal_intr_r=00000040
3,112,584 UART: WDT Expired
3,112,793 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,398 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,702 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,439 >>> mbox cmd response: success
2,773,595 UART: [afmc] ++
2,773,763 UART: [afmc] CDI.KEYID = 6
2,774,125 UART: [afmc] SUBJECT.KEYID = 7
2,774,550 UART: [afmc] AUTHORITY.KEYID = 5
2,809,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,728 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,456 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,341 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,060 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,810 UART: [afmc] --
2,852,882 UART: [cold-reset] --
2,853,802 UART: [state] Locking Datavault
2,854,993 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,597 UART: [state] Locking ICCM
2,856,017 UART: [exit] Launching FMC @ 0x40000130
2,861,346 UART:
2,861,362 UART: Running Caliptra FMC ...
2,861,770 UART:
2,861,824 UART: [state] CFI Enabled
2,872,409 UART: [fht] FMC Alias Private Key: 7
2,979,750 UART: [art] Extend RT PCRs Done
2,980,178 UART: [art] Lock RT PCRs Done
2,981,910 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 2894782 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,382 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,630 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,934 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,670 >>> mbox cmd response: success
2,773,823 UART: [afmc] ++
2,773,991 UART: [afmc] CDI.KEYID = 6
2,774,353 UART: [afmc] SUBJECT.KEYID = 7
2,774,778 UART: [afmc] AUTHORITY.KEYID = 5
2,810,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,204 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,952 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,832,663 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,838,563 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,844,260 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,851,995 UART: [afmc] --
2,853,066 UART: [cold-reset] --
2,853,986 UART: [state] Locking Datavault
2,855,177 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,781 UART: [state] Locking ICCM
2,856,201 UART: [exit] Launching FMC @ 0x40000130
2,861,530 UART:
2,861,546 UART: Running Caliptra FMC ...
2,861,954 UART:
2,862,008 UART: [state] CFI Enabled
2,872,594 UART: [fht] FMC Alias Private Key: 7
2,979,945 UART: [art] Extend RT PCRs Done
2,980,373 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,982,105 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028E8error_internal_intr_r=00000040
2,984,499 UART: WDT Expired
2,984,708 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,420 >>> mbox cmd response: success
2,685,990 UART:
2,686,006 UART: Running Caliptra FMC ...
2,686,414 UART:
2,686,468 UART: [state] CFI Enabled
2,697,053 UART: [fht] FMC Alias Private Key: 7
2,804,394 UART: [art] Extend RT PCRs Done
2,804,822 UART: [art] Lock RT PCRs Done
2,806,554 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,667 >>> mbox cmd response: success
2,686,226 UART:
2,686,242 UART: Running Caliptra FMC ...
2,686,650 UART:
2,686,704 UART: [state] CFI Enabled
2,697,290 UART: [fht] FMC Alias Private Key: 7
2,804,641 UART: [art] Extend RT PCRs Done
2,805,069 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,806,801 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
2,809,119 UART: WDT Expired
2,809,328 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,739 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,043 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,820 >>> mbox cmd response: success
2,774,836 UART: [afmc] ++
2,775,004 UART: [afmc] CDI.KEYID = 6
2,775,366 UART: [afmc] SUBJECT.KEYID = 7
2,775,791 UART: [afmc] AUTHORITY.KEYID = 5
2,811,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,149 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,877 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,762 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,481 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,347 UART: [afmc] --
2,855,225 UART: [cold-reset] --
2,856,269 UART: [state] Locking Datavault
2,857,612 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,216 UART: [state] Locking ICCM
2,858,690 UART: [exit] Launching FMC @ 0x40000130
2,864,019 UART:
2,864,035 UART: Running Caliptra FMC ...
2,864,443 UART:
2,864,586 UART: [state] CFI Enabled
2,875,515 UART: [fht] FMC Alias Private Key: 7
2,984,224 UART: [art] Extend RT PCRs Done
2,984,652 UART: [art] Lock RT PCRs Done
2,986,260 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 2898143 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,971 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,051 >>> mbox cmd response: success
2,775,064 UART: [afmc] ++
2,775,232 UART: [afmc] CDI.KEYID = 6
2,775,594 UART: [afmc] SUBJECT.KEYID = 7
2,776,019 UART: [afmc] AUTHORITY.KEYID = 5
2,812,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,373 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,835,084 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,840,984 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,846,681 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,854,532 UART: [afmc] --
2,855,409 UART: [cold-reset] --
2,856,453 UART: [state] Locking Datavault
2,857,796 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,400 UART: [state] Locking ICCM
2,858,874 UART: [exit] Launching FMC @ 0x40000130
2,864,203 UART:
2,864,219 UART: Running Caliptra FMC ...
2,864,627 UART:
2,864,770 UART: [state] CFI Enabled
2,875,700 UART: [fht] FMC Alias Private Key: 7
2,984,419 UART: [art] Extend RT PCRs Done
2,984,847 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,986,455 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028CAerror_internal_intr_r=00000040
2,988,843 UART: WDT Expired
2,989,052 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,801 >>> mbox cmd response: success
2,688,663 UART:
2,688,679 UART: Running Caliptra FMC ...
2,689,087 UART:
2,689,230 UART: [state] CFI Enabled
2,700,159 UART: [fht] FMC Alias Private Key: 7
2,808,868 UART: [art] Extend RT PCRs Done
2,809,296 UART: [art] Lock RT PCRs Done
2,810,904 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,048 >>> mbox cmd response: success
2,688,899 UART:
2,688,915 UART: Running Caliptra FMC ...
2,689,323 UART:
2,689,466 UART: [state] CFI Enabled
2,700,396 UART: [fht] FMC Alias Private Key: 7
2,809,115 UART: [art] Extend RT PCRs Done
2,809,543 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,811,151 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
2,813,459 UART: WDT Expired
2,813,668 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,596 UART: [kat] HMAC-384Kdf
920,080 UART: [kat] LMS
1,168,392 UART: [kat] --
1,169,253 UART: [cold-reset] ++
1,169,725 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,043 UART: [idev] --
1,208,270 UART: [ldev] ++
1,208,438 UART: [ldev] CDI.KEYID = 6
1,208,802 UART: [ldev] SUBJECT.KEYID = 5
1,209,229 UART: [ldev] AUTHORITY.KEYID = 7
1,209,692 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,240,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,852 UART: [ldev] --
1,280,198 UART: [fwproc] Wait for Commands...
1,280,887 UART: [fwproc] Recv command 0x46574c44
1,281,620 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,488 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,539 >>> mbox cmd response: success
2,771,702 UART: [afmc] ++
2,771,870 UART: [afmc] CDI.KEYID = 6
2,772,233 UART: [afmc] SUBJECT.KEYID = 7
2,772,659 UART: [afmc] AUTHORITY.KEYID = 5
2,808,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,861 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,590 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,473 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,192 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,947 UART: [afmc] --
2,851,019 UART: [cold-reset] --
2,851,939 UART: [state] Locking Datavault
2,853,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,734 UART: [state] Locking ICCM
2,854,154 UART: [exit] Launching FMC @ 0x40000130
2,859,483 UART:
2,859,499 UART: Running Caliptra FMC ...
2,859,907 UART:
2,859,961 UART: [state] CFI Enabled
2,870,546 UART: [fht] FMC Alias Private Key: 7
2,977,887 UART: [art] Extend RT PCRs Done
2,978,315 UART: [art] Lock RT PCRs Done
2,980,047 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 2892949 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,170,012 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,174,060 ready_for_fw is high
1,174,060 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,757 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,451 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,321 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,027 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,091 UART: [ldev] --
1,280,435 UART: [fwproc] Wait for Commands...
1,281,124 UART: [fwproc] Recv command 0x46574c44
1,281,857 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,770 >>> mbox cmd response: success
2,771,930 UART: [afmc] ++
2,772,098 UART: [afmc] CDI.KEYID = 6
2,772,461 UART: [afmc] SUBJECT.KEYID = 7
2,772,887 UART: [afmc] AUTHORITY.KEYID = 5
2,808,274 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,334 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,085 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,830,797 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,836,695 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,842,392 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,850,132 UART: [afmc] --
2,851,203 UART: [cold-reset] --
2,852,123 UART: [state] Locking Datavault
2,853,314 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,918 UART: [state] Locking ICCM
2,854,338 UART: [exit] Launching FMC @ 0x40000130
2,859,667 UART:
2,859,683 UART: Running Caliptra FMC ...
2,860,091 UART:
2,860,145 UART: [state] CFI Enabled
2,870,731 UART: [fht] FMC Alias Private Key: 7
2,978,082 UART: [art] Extend RT PCRs Done
2,978,510 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,980,242 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028E8error_internal_intr_r=00000040
2,982,636 UART: WDT Expired
2,982,845 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,405 >>> mbox cmd response: success
2,682,005 UART:
2,682,021 UART: Running Caliptra FMC ...
2,682,429 UART:
2,682,483 UART: [state] CFI Enabled
2,693,068 UART: [fht] FMC Alias Private Key: 7
2,800,409 UART: [art] Extend RT PCRs Done
2,800,837 UART: [art] Lock RT PCRs Done
2,802,569 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,845 ready_for_fw is high
1,055,845 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,652 >>> mbox cmd response: success
2,682,241 UART:
2,682,257 UART: Running Caliptra FMC ...
2,682,665 UART:
2,682,719 UART: [state] CFI Enabled
2,693,305 UART: [fht] FMC Alias Private Key: 7
2,800,656 UART: [art] Extend RT PCRs Done
2,801,084 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,802,816 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
2,805,134 UART: WDT Expired
2,805,343 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,150 UART: [kat] ++
896,302 UART: [kat] sha1
900,488 UART: [kat] SHA2-256
902,428 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,941 UART: [kat] HMAC-384Kdf
921,591 UART: [kat] LMS
1,169,903 UART: [kat] --
1,170,740 UART: [cold-reset] ++
1,171,160 UART: [fht] FHT @ 0x50003400
1,174,002 UART: [idev] ++
1,174,170 UART: [idev] CDI.KEYID = 6
1,174,531 UART: [idev] SUBJECT.KEYID = 7
1,174,956 UART: [idev] UDS.KEYID = 0
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,200,152 UART: [idev] Sha1 KeyId Algorithm
1,209,086 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,725 UART: [ldev] SUBJECT.KEYID = 5
1,211,152 UART: [ldev] AUTHORITY.KEYID = 7
1,211,615 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,282,852 UART: [fwproc] Recv command 0x46574c44
1,283,585 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,829 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,138 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,920 >>> mbox cmd response: success
2,772,943 UART: [afmc] ++
2,773,111 UART: [afmc] CDI.KEYID = 6
2,773,474 UART: [afmc] SUBJECT.KEYID = 7
2,773,900 UART: [afmc] AUTHORITY.KEYID = 5
2,810,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,282 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,011 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,894 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,613 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,484 UART: [afmc] --
2,853,362 UART: [cold-reset] --
2,854,406 UART: [state] Locking Datavault
2,855,749 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,353 UART: [state] Locking ICCM
2,856,827 UART: [exit] Launching FMC @ 0x40000130
2,862,156 UART:
2,862,172 UART: Running Caliptra FMC ...
2,862,580 UART:
2,862,723 UART: [state] CFI Enabled
2,873,652 UART: [fht] FMC Alias Private Key: 7
2,982,361 UART: [art] Extend RT PCRs Done
2,982,789 UART: [art] Lock RT PCRs Done
2,984,397 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 2896310 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,438 UART: [kat] ++
896,590 UART: [kat] sha1
900,776 UART: [kat] SHA2-256
902,716 UART: [kat] SHA2-384
905,421 UART: [kat] SHA2-512-ACC
907,322 UART: [kat] ECC-384
917,229 UART: [kat] HMAC-384Kdf
921,879 UART: [kat] LMS
1,170,191 UART: [kat] --
1,171,028 UART: [cold-reset] ++
1,171,447 UART: [fht] FHT @ 0x50003400
1,174,289 UART: [idev] ++
1,174,457 UART: [idev] CDI.KEYID = 6
1,174,818 UART: [idev] SUBJECT.KEYID = 7
1,175,243 UART: [idev] UDS.KEYID = 0
1,175,589 ready_for_fw is high
1,175,589 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,954 UART: [idev] Erasing UDS.KEYID = 0
1,200,437 UART: [idev] Sha1 KeyId Algorithm
1,209,370 UART: [idev] --
1,210,475 UART: [ldev] ++
1,210,643 UART: [ldev] CDI.KEYID = 6
1,211,007 UART: [ldev] SUBJECT.KEYID = 5
1,211,434 UART: [ldev] AUTHORITY.KEYID = 7
1,211,897 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,243,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,742 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,436 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,306 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,012 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,040 UART: [ldev] --
1,282,504 UART: [fwproc] Wait for Commands...
1,283,089 UART: [fwproc] Recv command 0x46574c44
1,283,822 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,061 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,370 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,151 >>> mbox cmd response: success
2,773,171 UART: [afmc] ++
2,773,339 UART: [afmc] CDI.KEYID = 6
2,773,702 UART: [afmc] SUBJECT.KEYID = 7
2,774,128 UART: [afmc] AUTHORITY.KEYID = 5
2,810,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,506 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,833,218 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,839,116 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,844,813 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,852,669 UART: [afmc] --
2,853,546 UART: [cold-reset] --
2,854,590 UART: [state] Locking Datavault
2,855,933 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,537 UART: [state] Locking ICCM
2,857,011 UART: [exit] Launching FMC @ 0x40000130
2,862,340 UART:
2,862,356 UART: Running Caliptra FMC ...
2,862,764 UART:
2,862,907 UART: [state] CFI Enabled
2,873,837 UART: [fht] FMC Alias Private Key: 7
2,982,556 UART: [art] Extend RT PCRs Done
2,982,984 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,984,592 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028CAerror_internal_intr_r=00000040
2,986,980 UART: WDT Expired
2,987,189 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,786 >>> mbox cmd response: success
2,684,678 UART:
2,684,694 UART: Running Caliptra FMC ...
2,685,102 UART:
2,685,245 UART: [state] CFI Enabled
2,696,174 UART: [fht] FMC Alias Private Key: 7
2,804,883 UART: [art] Extend RT PCRs Done
2,805,311 UART: [art] Lock RT PCRs Done
2,806,919 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,374 ready_for_fw is high
1,057,374 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,033 >>> mbox cmd response: success
2,684,914 UART:
2,684,930 UART: Running Caliptra FMC ...
2,685,338 UART:
2,685,481 UART: [state] CFI Enabled
2,696,411 UART: [fht] FMC Alias Private Key: 7
2,805,130 UART: [art] Extend RT PCRs Done
2,805,558 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,807,166 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
2,809,474 UART: WDT Expired
2,809,683 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.83s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 114332 bytes
2,883,729 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,961 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,313 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,210 >>> mbox cmd response: success
3,077,430 UART: [afmc] ++
3,077,598 UART: [afmc] CDI.KEYID = 6
3,077,960 UART: [afmc] SUBJECT.KEYID = 7
3,078,385 UART: [afmc] AUTHORITY.KEYID = 5
3,112,794 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,342 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,122 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,850 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,735 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,425 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,512 UART: [afmc] --
3,156,520 UART: [cold-reset] --
3,157,214 UART: [state] Locking Datavault
3,158,167 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,771 UART: [state] Locking ICCM
3,159,327 UART: [exit] Launching FMC @ 0x40000130
3,164,656 UART:
3,164,672 UART: Running Caliptra FMC ...
3,165,080 UART:
3,165,134 UART: [state] CFI Enabled
3,175,499 UART: [fht] FMC Alias Private Key: 7
3,283,424 UART: [art] Extend RT PCRs Done
3,283,852 UART: [art] Lock RT PCRs Done
3,285,340 UART: [art] Populate DV Done
3,293,559 UART: [fht] FMC Alias Private Key: 7
3,294,583 UART: [art] Derive CDI
3,294,863 UART: [art] Store in in slot 0x4
3,380,052 UART: [art] Derive Key Pair
3,380,412 UART: [art] Store priv key in slot 0x5
3,393,516 UART: [art] Derive Key Pair - Done
3,408,098 UART: [art] Signing Cert with AUTHO
3,408,578 UART: RITY.KEYID = 7
3,423,984 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,749 UART: [art] PUB.X = 14020763682003918D37D6131292BCEB6B306B9DC8DBD4DC3E559A4E239C7825ABD9E83DBF0B9232749DB2C2F7A1077E
3,431,508 UART: [art] PUB.Y = 2C3A3145CF6D9E2E995FEAACF2BED8847E24D2F2A56E6208118D75175492115A502F808CE115DECBE3A1D20C815F6462
3,438,460 UART: [art] SIG.R = E9D61FEA482AB37498108675D1CE3BD11A0B4A68937B9F43BC3A05F3B767FFB36F9F3572546CF81D0D5FCC5BBF5D4C86
3,445,237 UART: [art] SIG.S = A17CB66A9131E711124E751AC3EE2271BC284B572BCDD2C1B842AE7EA7AD63A1D5F78E5B60294A4306EC2F8A07B100F2
3,469,542 UART: Caliptra RT
3,469,795 UART: [state] CFI Enabled
3,577,595 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3485406 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 114332 bytes
2,883,692 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,921 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,273 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,169 >>> mbox cmd response: success
3,077,386 UART: [afmc] ++
3,077,554 UART: [afmc] CDI.KEYID = 6
3,077,916 UART: [afmc] SUBJECT.KEYID = 7
3,078,341 UART: [afmc] AUTHORITY.KEYID = 5
3,112,746 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,294 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,074 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,135,785 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,141,685 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,147,414 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,155,488 UART: [afmc] --
3,156,495 UART: [cold-reset] --
3,157,189 UART: [state] Locking Datavault
3,158,142 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,746 UART: [state] Locking ICCM
3,159,302 UART: [exit] Launching FMC @ 0x40000130
3,164,631 UART:
3,164,647 UART: Running Caliptra FMC ...
3,165,055 UART:
3,165,109 UART: [state] CFI Enabled
3,175,475 UART: [fht] FMC Alias Private Key: 7
3,283,410 UART: [art] Extend RT PCRs Done
3,283,838 UART: [art] Lock RT PCRs Done
3,285,326 UART: [art] Populate DV Done
3,293,545 UART: [fht] FMC Alias Private Key: 7
3,294,569 UART: [art] Derive CDI
3,294,849 UART: [art] Store in in slot 0x4
3,380,036 UART: [art] Derive Key Pair
3,380,396 UART: [art] Store priv key in slot 0x5
3,393,500 UART: [art] Derive Key Pair - Done
3,408,083 UART: [art] Signing Cert with AUTHO
3,408,563 UART: RITY.KEYID = 7
3,423,969 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,734 UART: [art] PUB.X = 6424CB1A501D67A672B9DD1B0596425BE7C230EDF4D3B447524B530C3F415E37DABE82323B9D7F2F7534946F7A6113CF
3,431,502 UART: [art] PUB.Y = 6CC1D997D13D56922A812E279B5D804610FE9EEAD30232FB264565A9E3C8C6C3DF7E4268C5AED9B1D3F4C1D51812D7F1
3,438,459 UART: [art] SIG.R = 3EA823717914B827E8940EF6A6A8AC02D495AA3228AC7F9C1FBDAA6AF34D2E27A4EDBC6E67BBC70B26217B75C6EA6FD6
3,445,242 UART: [art] SIG.S = EBAE854557146074FB2C3D8E0CA21503190EB84C2507BDDF41210E0D5BB1B9204B6562E225133CEC673BEFA9B9A19DDC
3,469,555 UART: Caliptra RT
3,469,808 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,573,126 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D7A ra=0x40007056 error_internal_intr_r=00000040
3,575,568 UART: [rt] WDT Expired
3,575,855 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,846 >>> mbox cmd response: success
2,986,934 UART:
2,986,950 UART: Running Caliptra FMC ...
2,987,358 UART:
2,987,412 UART: [state] CFI Enabled
2,997,777 UART: [fht] FMC Alias Private Key: 7
3,105,702 UART: [art] Extend RT PCRs Done
3,106,130 UART: [art] Lock RT PCRs Done
3,107,618 UART: [art] Populate DV Done
3,115,837 UART: [fht] FMC Alias Private Key: 7
3,116,861 UART: [art] Derive CDI
3,117,141 UART: [art] Store in in slot 0x4
3,202,330 UART: [art] Derive Key Pair
3,202,690 UART: [art] Store priv key in slot 0x5
3,215,794 UART: [art] Derive Key Pair - Done
3,230,378 UART: [art] Signing Cert with AUTHO
3,230,858 UART: RITY.KEYID = 7
3,246,264 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,029 UART: [art] PUB.X = F858184DA62884391994338F2B1B7155ECB9D5DF8AB414FC8C7DE2F6326C8B37C7D0A62F002F67FC77ADFFDBE8A7A987
3,253,791 UART: [art] PUB.Y = 2EADA62E2BCD237D636C0A2126767449F042BB05CDFE44986F7C1478ADF50CF0FCC5C10FE670EC706BB823DB5C818676
3,260,743 UART: [art] SIG.R = 91795E4EFAEB9A4504FD4A6AE26E5F6C4D6DF8128A4D9D7216BD90D20B84B3DA96E0CFFC429A21241871EF1330B50ED2
3,267,520 UART: [art] SIG.S = D220D43013B352BC404564A4E1E7E7F005250A4FA74E62DDFDACB297566150495BE9E7DF84578A19F2C4591D8616BF8E
3,291,839 UART: Caliptra RT
3,292,092 UART: [state] CFI Enabled
3,399,892 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,093 >>> mbox cmd response: success
2,987,170 UART:
2,987,186 UART: Running Caliptra FMC ...
2,987,594 UART:
2,987,648 UART: [state] CFI Enabled
2,998,014 UART: [fht] FMC Alias Private Key: 7
3,105,949 UART: [art] Extend RT PCRs Done
3,106,377 UART: [art] Lock RT PCRs Done
3,107,865 UART: [art] Populate DV Done
3,116,084 UART: [fht] FMC Alias Private Key: 7
3,117,108 UART: [art] Derive CDI
3,117,388 UART: [art] Store in in slot 0x4
3,202,575 UART: [art] Derive Key Pair
3,202,935 UART: [art] Store priv key in slot 0x5
3,216,039 UART: [art] Derive Key Pair - Done
3,230,622 UART: [art] Signing Cert with AUTHO
3,231,102 UART: RITY.KEYID = 7
3,246,508 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,273 UART: [art] PUB.X = 6844C49DD4EAF7FCB853222820367C821B0C7D29CA9A2FE6F7BED7AB96EBE04A07E01B3691F2A0B65A4AF820B4BBE96A
3,254,057 UART: [art] PUB.Y = 7BEFF830C1B3D42B18FF35096095FEF694122B798C6606DE6B813B9F1700F568718AAE26BB6220FD76F8D12834B4BA50
3,260,983 UART: [art] SIG.R = 76DB9381606B239BE78D2E4E025857783C7CFD560CD691FECCB8265EB03823D6E647895C32B6E22CC198A0FF80D92922
3,267,749 UART: [art] SIG.S = BC428FDAFD685D31F8025F47684B4EF62A26564213EF1C52862F504C07623B217527C657410DF2DA4AE06A58FBF5FD56
3,292,063 UART: Caliptra RT
3,292,316 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,395,669 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D7A ra=0x40007056 error_internal_intr_r=00000040
3,398,111 UART: [rt] WDT Expired
3,398,398 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 114332 bytes
2,885,082 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,026 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,378 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,369 >>> mbox cmd response: success
3,078,601 UART: [afmc] ++
3,078,769 UART: [afmc] CDI.KEYID = 6
3,079,131 UART: [afmc] SUBJECT.KEYID = 7
3,079,556 UART: [afmc] AUTHORITY.KEYID = 5
3,115,125 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,465 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,245 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,973 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,858 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,548 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,505 UART: [afmc] --
3,158,445 UART: [cold-reset] --
3,159,381 UART: [state] Locking Datavault
3,160,538 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,142 UART: [state] Locking ICCM
3,161,748 UART: [exit] Launching FMC @ 0x40000130
3,167,077 UART:
3,167,093 UART: Running Caliptra FMC ...
3,167,501 UART:
3,167,644 UART: [state] CFI Enabled
3,178,271 UART: [fht] FMC Alias Private Key: 7
3,286,020 UART: [art] Extend RT PCRs Done
3,286,448 UART: [art] Lock RT PCRs Done
3,287,750 UART: [art] Populate DV Done
3,295,989 UART: [fht] FMC Alias Private Key: 7
3,297,003 UART: [art] Derive CDI
3,297,283 UART: [art] Store in in slot 0x4
3,383,048 UART: [art] Derive Key Pair
3,383,408 UART: [art] Store priv key in slot 0x5
3,396,626 UART: [art] Derive Key Pair - Done
3,411,423 UART: [art] Signing Cert with AUTHO
3,411,903 UART: RITY.KEYID = 7
3,427,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,058 UART: [art] PUB.X = B3EA8CAD4A90ADEC18E476468C9A731E03E43F1B61EED6250831AD2FF1404547DFEB943E2673715CE2C7E5A02921394E
3,434,832 UART: [art] PUB.Y = 77DD08486ACD9F59FDF66070DCA83E9967AB8BC6C21673AE8B82A58CE2FE8667AC35916225CF68901EE85ED20E8C983D
3,441,788 UART: [art] SIG.R = 57BE68E973634697BFB969FD4DDE81818355349767EDDE2656D2797AAF8DD7C27BAFC93DD0FD8F7013919B14ACD48507
3,448,563 UART: [art] SIG.S = 719ED89A71A0700E03E4B44BC951058E036AEBE800A3089C5F0D855B187620D28FEB62D66C7D368E0B25F5DCAE633A91
3,472,153 UART: Caliptra RT
3,472,498 UART: [state] CFI Enabled
3,581,184 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3488006 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 114332 bytes
2,885,045 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,986 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,338 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,328 >>> mbox cmd response: success
3,078,557 UART: [afmc] ++
3,078,725 UART: [afmc] CDI.KEYID = 6
3,079,087 UART: [afmc] SUBJECT.KEYID = 7
3,079,512 UART: [afmc] AUTHORITY.KEYID = 5
3,115,077 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,417 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,197 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,137,908 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,143,808 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,149,537 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,157,481 UART: [afmc] --
3,158,420 UART: [cold-reset] --
3,159,356 UART: [state] Locking Datavault
3,160,513 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,117 UART: [state] Locking ICCM
3,161,723 UART: [exit] Launching FMC @ 0x40000130
3,167,052 UART:
3,167,068 UART: Running Caliptra FMC ...
3,167,476 UART:
3,167,619 UART: [state] CFI Enabled
3,178,247 UART: [fht] FMC Alias Private Key: 7
3,286,006 UART: [art] Extend RT PCRs Done
3,286,434 UART: [art] Lock RT PCRs Done
3,287,736 UART: [art] Populate DV Done
3,295,975 UART: [fht] FMC Alias Private Key: 7
3,296,989 UART: [art] Derive CDI
3,297,269 UART: [art] Store in in slot 0x4
3,383,032 UART: [art] Derive Key Pair
3,383,392 UART: [art] Store priv key in slot 0x5
3,396,610 UART: [art] Derive Key Pair - Done
3,411,403 UART: [art] Signing Cert with AUTHO
3,411,883 UART: RITY.KEYID = 7
3,427,273 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,038 UART: [art] PUB.X = C2EACF58F1C76F9C8D308872F3A41566FB196DB723CC87FB4F490A1FCC2C43A2A9975352F7C42699837BBD5B61EC1664
3,434,815 UART: [art] PUB.Y = F018FBBD267BEB8DCC8C5B5DB450888298BE27D2BF54AF5A0C125415A1B1A75D78EF388411E463DEACFE13EFF8816669
3,441,780 UART: [art] SIG.R = AE57E22FDB10F9BEFEC88029746C95AB976FA046E0D6FCD9B0197058CC84C76F2DAA69BE6A89C4CDC6B0414A2A1938C6
3,448,570 UART: [art] SIG.S = 6CEEB94A1F192AC263F09679C5D74A1152F7622733FD522FA4BA78799470E02A1B6F1BDDE78D02F4A9A66DB4D63100EF
3,472,180 UART: Caliptra RT
3,472,525 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,576,707 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D82 ra=0x40007056 error_internal_intr_r=00000040
3,579,147 UART: [rt] WDT Expired
3,579,434 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,005 >>> mbox cmd response: success
2,989,355 UART:
2,989,371 UART: Running Caliptra FMC ...
2,989,779 UART:
2,989,922 UART: [state] CFI Enabled
3,000,549 UART: [fht] FMC Alias Private Key: 7
3,108,298 UART: [art] Extend RT PCRs Done
3,108,726 UART: [art] Lock RT PCRs Done
3,110,028 UART: [art] Populate DV Done
3,118,267 UART: [fht] FMC Alias Private Key: 7
3,119,281 UART: [art] Derive CDI
3,119,561 UART: [art] Store in in slot 0x4
3,205,326 UART: [art] Derive Key Pair
3,205,686 UART: [art] Store priv key in slot 0x5
3,218,904 UART: [art] Derive Key Pair - Done
3,233,697 UART: [art] Signing Cert with AUTHO
3,234,177 UART: RITY.KEYID = 7
3,249,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,332 UART: [art] PUB.X = B93F85AD10C151E2173DDD0FBEB1D2E2674A52C59025A55CAC18AE9263A55906518B25C01C4284D36413F264805DBB8B
3,257,100 UART: [art] PUB.Y = D7CA38F9D818C759C60CB1B500F6487B852803A535F248C88F119FC9FD5F472C57100134637504E04C9277C735EE622E
3,264,010 UART: [art] SIG.R = FE3CB72FE29C19117417ED7C1961AF1466FCD45C12927C13E2266C92E4664CBF4A8C7F2E41A20E2914CAE0323EF27ECA
3,270,789 UART: [art] SIG.S = 60A450A6CB6472038B53B371411FC0C163ED9C3B3781530B65BF4E15301B4379560CE15E16F74E40ADFB6061FE4F8845
3,294,405 UART: Caliptra RT
3,294,750 UART: [state] CFI Enabled
3,403,385 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,252 >>> mbox cmd response: success
2,989,591 UART:
2,989,607 UART: Running Caliptra FMC ...
2,990,015 UART:
2,990,158 UART: [state] CFI Enabled
3,000,786 UART: [fht] FMC Alias Private Key: 7
3,108,545 UART: [art] Extend RT PCRs Done
3,108,973 UART: [art] Lock RT PCRs Done
3,110,275 UART: [art] Populate DV Done
3,118,514 UART: [fht] FMC Alias Private Key: 7
3,119,528 UART: [art] Derive CDI
3,119,808 UART: [art] Store in in slot 0x4
3,205,571 UART: [art] Derive Key Pair
3,205,931 UART: [art] Store priv key in slot 0x5
3,219,149 UART: [art] Derive Key Pair - Done
3,233,946 UART: [art] Signing Cert with AUTHO
3,234,426 UART: RITY.KEYID = 7
3,249,816 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,581 UART: [art] PUB.X = 63245C6D0E54E8171EE17D694A670367E6A38D4567C0EAD3775C6839B089F12046D23FD417CA848513F0D35A2C7A69AC
3,257,343 UART: [art] PUB.Y = BECEB2DCCA89D27ED0CEF36CD51A724AC6435796B5A29320A8CB7523200DB52CAEFFD6ACDE2E3A7DAA00D957A0A469B6
3,264,298 UART: [art] SIG.R = 546985F92B72A67C3080066D50683F0FCF64DDA46218014F3223C7CA84D9DCAD84B182E9726C54F54E5DEB77DE9E236D
3,271,063 UART: [art] SIG.S = CE9CAAAD407288B4CA87C55C7C9E4038496F80DD3665A6ADB55AD1A7D77175B76BE1B7CD6358C9E7DA47C52A08428E0F
3,294,698 UART: Caliptra RT
3,295,043 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,399,154 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D78 ra=0x40007056 error_internal_intr_r=00000040
3,401,594 UART: [rt] WDT Expired
3,401,881 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,398 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,702 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,439 >>> mbox cmd response: success
2,773,595 UART: [afmc] ++
2,773,763 UART: [afmc] CDI.KEYID = 6
2,774,125 UART: [afmc] SUBJECT.KEYID = 7
2,774,550 UART: [afmc] AUTHORITY.KEYID = 5
2,809,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,728 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,456 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,341 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,060 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,810 UART: [afmc] --
2,852,882 UART: [cold-reset] --
2,853,802 UART: [state] Locking Datavault
2,854,993 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,597 UART: [state] Locking ICCM
2,856,017 UART: [exit] Launching FMC @ 0x40000130
2,861,346 UART:
2,861,362 UART: Running Caliptra FMC ...
2,861,770 UART:
2,861,824 UART: [state] CFI Enabled
2,872,409 UART: [fht] FMC Alias Private Key: 7
2,979,750 UART: [art] Extend RT PCRs Done
2,980,178 UART: [art] Lock RT PCRs Done
2,981,910 UART: [art] Populate DV Done
2,990,189 UART: [fht] FMC Alias Private Key: 7
2,991,181 UART: [art] Derive CDI
2,991,461 UART: [art] Store in in slot 0x4
3,076,532 UART: [art] Derive Key Pair
3,076,892 UART: [art] Store priv key in slot 0x5
3,090,518 UART: [art] Derive Key Pair - Done
3,105,507 UART: [art] Signing Cert with AUTHO
3,105,987 UART: RITY.KEYID = 7
3,121,175 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,940 UART: [art] PUB.X = 016D2BCC7617B5DACDCB62D816935B06A58DE248D33FE36FBD3E6C219D007473CA31599AF9D551C7798140B420009D32
3,128,664 UART: [art] PUB.Y = 2CF5FDA5FD2739FEF0F49729DDA578C2A9DC66BD26D45F9E29FB2B675069E40D7A5D487DA990C980324F7A6A89E8BED5
3,135,629 UART: [art] SIG.R = D61C9368AF5580BDC7A1ECDAF600CF85E18CBBC7E7FE1E371F4FF9489FDBE423A4E41628D796A7A66492B0C0CEB2E5EA
3,142,403 UART: [art] SIG.S = CF37F95F9A42A6B9949CC62616D5E24C16BCF71F8F6B4A04B915FD8A0F2BD9B666C8C27F75A8B60166CBA38F9BCA2E3C
3,165,985 UART: Caliptra RT
3,166,238 UART: [state] CFI Enabled
3,273,974 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 3182154 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,382 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,630 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,934 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,670 >>> mbox cmd response: success
2,773,823 UART: [afmc] ++
2,773,991 UART: [afmc] CDI.KEYID = 6
2,774,353 UART: [afmc] SUBJECT.KEYID = 7
2,774,778 UART: [afmc] AUTHORITY.KEYID = 5
2,810,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,204 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,952 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,832,663 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,838,563 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,844,260 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,851,995 UART: [afmc] --
2,853,066 UART: [cold-reset] --
2,853,986 UART: [state] Locking Datavault
2,855,177 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,781 UART: [state] Locking ICCM
2,856,201 UART: [exit] Launching FMC @ 0x40000130
2,861,530 UART:
2,861,546 UART: Running Caliptra FMC ...
2,861,954 UART:
2,862,008 UART: [state] CFI Enabled
2,872,594 UART: [fht] FMC Alias Private Key: 7
2,979,945 UART: [art] Extend RT PCRs Done
2,980,373 UART: [art] Lock RT PCRs Done
2,982,105 UART: [art] Populate DV Done
2,990,384 UART: [fht] FMC Alias Private Key: 7
2,991,376 UART: [art] Derive CDI
2,991,656 UART: [art] Store in in slot 0x4
3,076,725 UART: [art] Derive Key Pair
3,077,085 UART: [art] Store priv key in slot 0x5
3,090,711 UART: [art] Derive Key Pair - Done
3,105,700 UART: [art] Signing Cert with AUTHO
3,106,180 UART: RITY.KEYID = 7
3,121,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,133 UART: [art] PUB.X = 9E48387CFE0E39F3A3B9B9B70353A5EECA40264FD88FDE6082DA725DE678D6AFD2CF237C27656FB356CDB677037303E7
3,128,903 UART: [art] PUB.Y = FC41E010449836B668BF9AB596BB582C789B32311B9A7C592D8CE0719C4868306CF7A82E6812AC3307ED6E1839048098
3,135,841 UART: [art] SIG.R = 11EA80D1F0624DD181977EC4BA15A5988F807946E3705E3E9DF3F5D2A61A37538B5589B73CA6FC43DB8A3FFAB7A95BF6
3,142,623 UART: [art] SIG.S = E8BE909FC618D207009C5A909148DCC06E104640BA32AE4AAE2E54796DD6A16DA2D3E583D1C4E24100D0E3084268D5BD
3,166,150 UART: Caliptra RT
3,166,403 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,269,776 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D78 ra=0x40007056 error_internal_intr_r=00000040
3,272,216 UART: [rt] WDT Expired
3,272,503 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,420 >>> mbox cmd response: success
2,685,990 UART:
2,686,006 UART: Running Caliptra FMC ...
2,686,414 UART:
2,686,468 UART: [state] CFI Enabled
2,697,053 UART: [fht] FMC Alias Private Key: 7
2,804,394 UART: [art] Extend RT PCRs Done
2,804,822 UART: [art] Lock RT PCRs Done
2,806,554 UART: [art] Populate DV Done
2,814,833 UART: [fht] FMC Alias Private Key: 7
2,815,825 UART: [art] Derive CDI
2,816,105 UART: [art] Store in in slot 0x4
2,901,176 UART: [art] Derive Key Pair
2,901,536 UART: [art] Store priv key in slot 0x5
2,915,162 UART: [art] Derive Key Pair - Done
2,930,153 UART: [art] Signing Cert with AUTHO
2,930,633 UART: RITY.KEYID = 7
2,945,821 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,586 UART: [art] PUB.X = CD3AE7408F21521BCD288EF76F1F072839CB93E57ED446E92551756599B22AB858552AE8BD2D5E4970B97B648F078264
2,953,348 UART: [art] PUB.Y = B24A8DA4C3D04F86D2F95BDB4A204D4D7970AB3BE3726352D3088D3C04F5970013BE8795CA026DCB915BED2F25A21DCA
2,960,281 UART: [art] SIG.R = 1F52F265C342D92270504EDB2E686699FB57EA4D0C12110366A653DF5C5EB29144F384742B62C7592D0F27510BB0DD85
2,967,035 UART: [art] SIG.S = E3B261A6D6E07C4DF316053DEF92BA67685B812E036F6F87334B8D0916691EFBD2DD30942A512FD89EF877303FA19826
2,990,599 UART: Caliptra RT
2,990,852 UART: [state] CFI Enabled
3,098,639 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,667 >>> mbox cmd response: success
2,686,226 UART:
2,686,242 UART: Running Caliptra FMC ...
2,686,650 UART:
2,686,704 UART: [state] CFI Enabled
2,697,290 UART: [fht] FMC Alias Private Key: 7
2,804,641 UART: [art] Extend RT PCRs Done
2,805,069 UART: [art] Lock RT PCRs Done
2,806,801 UART: [art] Populate DV Done
2,815,080 UART: [fht] FMC Alias Private Key: 7
2,816,072 UART: [art] Derive CDI
2,816,352 UART: [art] Store in in slot 0x4
2,901,421 UART: [art] Derive Key Pair
2,901,781 UART: [art] Store priv key in slot 0x5
2,915,407 UART: [art] Derive Key Pair - Done
2,930,390 UART: [art] Signing Cert with AUTHO
2,930,870 UART: RITY.KEYID = 7
2,946,058 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,823 UART: [art] PUB.X = 071287904A392DC4DA699F91D02817FAEAA0D88F32638435831D084BFE73CE8557794D39A2FE83FFC8C89B7F36F8F3C7
2,953,591 UART: [art] PUB.Y = CD8C8B5EE4E56AC7422AECFD06475CAE592A91951227C65827ACBEF1D2B491787F30ABD4F8D332573AF2D9D70A51F1AD
2,960,553 UART: [art] SIG.R = CA4524AFB1772E618820F3B7E7E9DD0AF45C7CBE99A74861231A5BE87F1EC7B57F1A5C93534425863ADDBD6908CCBE50
2,967,331 UART: [art] SIG.S = F43DB343437AC94DAEBD408665417C3E5D2CC145A2A24283A3814EBA2A0F645D8CFF2FD077281620892C77A8900010C8
2,990,877 UART: Caliptra RT
2,991,130 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,094,415 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D80 ra=0x40007056 error_internal_intr_r=00000040
3,096,855 UART: [rt] WDT Expired
3,097,142 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,739 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,043 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,820 >>> mbox cmd response: success
2,774,836 UART: [afmc] ++
2,775,004 UART: [afmc] CDI.KEYID = 6
2,775,366 UART: [afmc] SUBJECT.KEYID = 7
2,775,791 UART: [afmc] AUTHORITY.KEYID = 5
2,811,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,149 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,877 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,762 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,481 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,347 UART: [afmc] --
2,855,225 UART: [cold-reset] --
2,856,269 UART: [state] Locking Datavault
2,857,612 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,216 UART: [state] Locking ICCM
2,858,690 UART: [exit] Launching FMC @ 0x40000130
2,864,019 UART:
2,864,035 UART: Running Caliptra FMC ...
2,864,443 UART:
2,864,586 UART: [state] CFI Enabled
2,875,515 UART: [fht] FMC Alias Private Key: 7
2,984,224 UART: [art] Extend RT PCRs Done
2,984,652 UART: [art] Lock RT PCRs Done
2,986,260 UART: [art] Populate DV Done
2,994,335 UART: [fht] FMC Alias Private Key: 7
2,995,275 UART: [art] Derive CDI
2,995,555 UART: [art] Store in in slot 0x4
3,081,136 UART: [art] Derive Key Pair
3,081,496 UART: [art] Store priv key in slot 0x5
3,094,802 UART: [art] Derive Key Pair - Done
3,109,674 UART: [art] Signing Cert with AUTHO
3,110,154 UART: RITY.KEYID = 7
3,125,356 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,121 UART: [art] PUB.X = 1C837DCB1940E81962ED29B40D5C4A474008193571B9123875E3F030821F5BF7768263A85D76D27970CF4B54D73938C1
3,132,873 UART: [art] PUB.Y = D4C34512FD4F313927F18BD94C1B9D3A67A833B3C2BF438D9BB1CCA710E3532569C52E4DBE2B2E762D79F4C054B5E038
3,139,833 UART: [art] SIG.R = A01C3D46384D56920E37E71C44298729CEDCCB693646A5D922DB6C7BD7B46DC16BD928EDE4663B63AADC7E2C9E44D615
3,146,612 UART: [art] SIG.S = 075A2150C8BE7BB99CFA01DF70A0E3EFAAC3E6A461F0B6EEEA7DDF96F6AB108E12D7FE06C32B2501DEB6B0350CE681F4
3,170,924 UART: Caliptra RT
3,171,269 UART: [state] CFI Enabled
3,279,176 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 3186367 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,971 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,051 >>> mbox cmd response: success
2,775,064 UART: [afmc] ++
2,775,232 UART: [afmc] CDI.KEYID = 6
2,775,594 UART: [afmc] SUBJECT.KEYID = 7
2,776,019 UART: [afmc] AUTHORITY.KEYID = 5
2,812,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,373 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,835,084 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,840,984 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,846,681 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,854,532 UART: [afmc] --
2,855,409 UART: [cold-reset] --
2,856,453 UART: [state] Locking Datavault
2,857,796 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,400 UART: [state] Locking ICCM
2,858,874 UART: [exit] Launching FMC @ 0x40000130
2,864,203 UART:
2,864,219 UART: Running Caliptra FMC ...
2,864,627 UART:
2,864,770 UART: [state] CFI Enabled
2,875,700 UART: [fht] FMC Alias Private Key: 7
2,984,419 UART: [art] Extend RT PCRs Done
2,984,847 UART: [art] Lock RT PCRs Done
2,986,455 UART: [art] Populate DV Done
2,994,530 UART: [fht] FMC Alias Private Key: 7
2,995,470 UART: [art] Derive CDI
2,995,750 UART: [art] Store in in slot 0x4
3,081,329 UART: [art] Derive Key Pair
3,081,689 UART: [art] Store priv key in slot 0x5
3,094,995 UART: [art] Derive Key Pair - Done
3,109,862 UART: [art] Signing Cert with AUTHO
3,110,342 UART: RITY.KEYID = 7
3,125,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,309 UART: [art] PUB.X = 4AD88BE02E00FF99A97C1AC910A9A0FAF02F04695E76DA11B8A51F8243367C989D8040BD5137A7834B0C8459EFA0766A
3,133,057 UART: [art] PUB.Y = 97CAFEFEB71D2CF180F989BE1550EA477AD59E9DCC587A251BD365867DF0F024C3D41E4D5529537CBD7A869C667F2038
3,140,019 UART: [art] SIG.R = 700A7FE9E0DB53FA814B3BBA4F07507EB4126ECB335A79972097C8561C3EBD61456E992B3CB1518F05483B81FFBE132D
3,146,788 UART: [art] SIG.S = 69BE99729C6C7BB162EB110A756CC4D90453130151A6DDAB2CDACBD5A708B7350B8E321DE9C3954F6317313C019DDC4D
3,171,077 UART: Caliptra RT
3,171,422 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,274,970 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D7E ra=0x40007056 error_internal_intr_r=00000040
3,277,412 UART: [rt] WDT Expired
3,277,699 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,801 >>> mbox cmd response: success
2,688,663 UART:
2,688,679 UART: Running Caliptra FMC ...
2,689,087 UART:
2,689,230 UART: [state] CFI Enabled
2,700,159 UART: [fht] FMC Alias Private Key: 7
2,808,868 UART: [art] Extend RT PCRs Done
2,809,296 UART: [art] Lock RT PCRs Done
2,810,904 UART: [art] Populate DV Done
2,818,979 UART: [fht] FMC Alias Private Key: 7
2,819,919 UART: [art] Derive CDI
2,820,199 UART: [art] Store in in slot 0x4
2,905,780 UART: [art] Derive Key Pair
2,906,140 UART: [art] Store priv key in slot 0x5
2,919,446 UART: [art] Derive Key Pair - Done
2,934,313 UART: [art] Signing Cert with AUTHO
2,934,793 UART: RITY.KEYID = 7
2,949,995 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,760 UART: [art] PUB.X = 40774F97D06838848CEDF1528A441532ED66B8D704D2F21A735E463F2C0CFE8F290A0D6E98DBC6D3A6D50D1A575AA61B
2,957,523 UART: [art] PUB.Y = CB81FAB3804DF54B589C61F9862088106F04DD92603E248DEF1630D2582DC42B01B13848C158D60C9553B839895B98EB
2,964,460 UART: [art] SIG.R = EBE4E186419752EACED89701911E1E0AF58AEC0E7F128787FB2A21AA41231FB58068F3F753AEF29EAA9B780C8F9CACDD
2,971,238 UART: [art] SIG.S = 1E974B09E8AEA0B0277389EA6FA24E08F119D9FEDEF77BA7D8C891D8AED8E3C7412B624D47FEC3473A9F9681E0AFF15B
2,995,551 UART: Caliptra RT
2,995,896 UART: [state] CFI Enabled
3,103,803 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,048 >>> mbox cmd response: success
2,688,899 UART:
2,688,915 UART: Running Caliptra FMC ...
2,689,323 UART:
2,689,466 UART: [state] CFI Enabled
2,700,396 UART: [fht] FMC Alias Private Key: 7
2,809,115 UART: [art] Extend RT PCRs Done
2,809,543 UART: [art] Lock RT PCRs Done
2,811,151 UART: [art] Populate DV Done
2,819,226 UART: [fht] FMC Alias Private Key: 7
2,820,166 UART: [art] Derive CDI
2,820,446 UART: [art] Store in in slot 0x4
2,906,025 UART: [art] Derive Key Pair
2,906,385 UART: [art] Store priv key in slot 0x5
2,919,691 UART: [art] Derive Key Pair - Done
2,934,558 UART: [art] Signing Cert with AUTHO
2,935,038 UART: RITY.KEYID = 7
2,950,240 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,005 UART: [art] PUB.X = 7346FF97017804DFD88264A94FD9A5CE07C931129ACE73EF91ED5BB8C1D507920FBA51399F77807A6FB120821D0E68F6
2,957,761 UART: [art] PUB.Y = 48D9157B39E55D20B3FA268B3C0A4C0C7EC87063D72CBD8030826D1A0B44D2E957D9EA824AB594F508E5052A0FCC8FAA
2,964,705 UART: [art] SIG.R = 5AD089E089E137370638E11113171A2A713D700481AA4282079A8695B3C7859B416734BC3F37EA0CB5510B773B28759E
2,971,446 UART: [art] SIG.S = 745074A921C4D5FD94D43D4D2E560033B43A5DFF02036AE5350CA295ED9BD3A06B158BDFCCBF33F9DF8AA18C5D47E6EB
2,995,732 UART: Caliptra RT
2,996,077 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,099,571 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D80 ra=0x40007056 error_internal_intr_r=00000040
3,102,011 UART: [rt] WDT Expired
3,102,298 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,596 UART: [kat] HMAC-384Kdf
920,080 UART: [kat] LMS
1,168,392 UART: [kat] --
1,169,253 UART: [cold-reset] ++
1,169,725 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,043 UART: [idev] --
1,208,270 UART: [ldev] ++
1,208,438 UART: [ldev] CDI.KEYID = 6
1,208,802 UART: [ldev] SUBJECT.KEYID = 5
1,209,229 UART: [ldev] AUTHORITY.KEYID = 7
1,209,692 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,240,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,852 UART: [ldev] --
1,280,198 UART: [fwproc] Wait for Commands...
1,280,887 UART: [fwproc] Recv command 0x46574c44
1,281,620 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,488 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,539 >>> mbox cmd response: success
2,771,702 UART: [afmc] ++
2,771,870 UART: [afmc] CDI.KEYID = 6
2,772,233 UART: [afmc] SUBJECT.KEYID = 7
2,772,659 UART: [afmc] AUTHORITY.KEYID = 5
2,808,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,861 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,590 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,473 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,192 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,947 UART: [afmc] --
2,851,019 UART: [cold-reset] --
2,851,939 UART: [state] Locking Datavault
2,853,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,734 UART: [state] Locking ICCM
2,854,154 UART: [exit] Launching FMC @ 0x40000130
2,859,483 UART:
2,859,499 UART: Running Caliptra FMC ...
2,859,907 UART:
2,859,961 UART: [state] CFI Enabled
2,870,546 UART: [fht] FMC Alias Private Key: 7
2,977,887 UART: [art] Extend RT PCRs Done
2,978,315 UART: [art] Lock RT PCRs Done
2,980,047 UART: [art] Populate DV Done
2,988,326 UART: [fht] FMC Alias Private Key: 7
2,989,318 UART: [art] Derive CDI
2,989,598 UART: [art] Store in in slot 0x4
3,074,669 UART: [art] Derive Key Pair
3,075,029 UART: [art] Store priv key in slot 0x5
3,088,655 UART: [art] Derive Key Pair - Done
3,103,643 UART: [art] Signing Cert with AUTHO
3,104,123 UART: RITY.KEYID = 7
3,119,311 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,076 UART: [art] PUB.X = CDB7C9EA5F0C507E4764C8F8AD6530934515F998D0F057495E037504352600B34019BF82D151B60E6C84A493A0ECF1A7
3,126,810 UART: [art] PUB.Y = E7B8BE8B36A1C87D942D54738C276F3FA6B034414EFEAAE3032B14A132A65B1FFDFAA014347B80A3C107D235FB048303
3,133,758 UART: [art] SIG.R = 7A82A4B92B8CCE50E0243CCED32B3E8C20DD66B390E42344C6D978285AFFD6D3013A4FC35AAC84F5818937ECAA54A9FD
3,140,543 UART: [art] SIG.S = 31E5B73480CD74BBF644D8C02C40DA618B8A5048DD2D6C604F4E88CF6097CE9FE9C647ED5510BD930CFEDA9F9AEBF0C4
3,164,133 UART: Caliptra RT
3,164,386 UART: [state] CFI Enabled
3,272,155 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 3180365 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,170,012 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,174,060 ready_for_fw is high
1,174,060 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,757 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,451 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,321 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,027 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,091 UART: [ldev] --
1,280,435 UART: [fwproc] Wait for Commands...
1,281,124 UART: [fwproc] Recv command 0x46574c44
1,281,857 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,770 >>> mbox cmd response: success
2,771,930 UART: [afmc] ++
2,772,098 UART: [afmc] CDI.KEYID = 6
2,772,461 UART: [afmc] SUBJECT.KEYID = 7
2,772,887 UART: [afmc] AUTHORITY.KEYID = 5
2,808,274 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,334 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,085 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,830,797 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,836,695 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,842,392 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,850,132 UART: [afmc] --
2,851,203 UART: [cold-reset] --
2,852,123 UART: [state] Locking Datavault
2,853,314 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,918 UART: [state] Locking ICCM
2,854,338 UART: [exit] Launching FMC @ 0x40000130
2,859,667 UART:
2,859,683 UART: Running Caliptra FMC ...
2,860,091 UART:
2,860,145 UART: [state] CFI Enabled
2,870,731 UART: [fht] FMC Alias Private Key: 7
2,978,082 UART: [art] Extend RT PCRs Done
2,978,510 UART: [art] Lock RT PCRs Done
2,980,242 UART: [art] Populate DV Done
2,988,521 UART: [fht] FMC Alias Private Key: 7
2,989,513 UART: [art] Derive CDI
2,989,793 UART: [art] Store in in slot 0x4
3,074,862 UART: [art] Derive Key Pair
3,075,222 UART: [art] Store priv key in slot 0x5
3,088,848 UART: [art] Derive Key Pair - Done
3,103,826 UART: [art] Signing Cert with AUTHO
3,104,306 UART: RITY.KEYID = 7
3,119,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,259 UART: [art] PUB.X = 8975CAD58254BB17BD394476FDF7386FB7CC5CAAD0184A0303DA17FA2D1ACA16D553C2C09194CAA212CE79A55C7EB66A
3,127,041 UART: [art] PUB.Y = B4994119165A16EEA96ECF1C27FDF686803280EF2171E23B1871F7C94DABF78D07DA0F92E5FA17B9411958041C17FC59
3,133,986 UART: [art] SIG.R = D533F1A0560A94F035FCCE43D1BAC3910121822E148AF22126FB027BB3066553D5AC57A1D672C6FFC3B96498D34D3A2E
3,140,750 UART: [art] SIG.S = DC93AD1AED3C1217A27D2F6FC5E4001282809CE492085899116A0B63651BD50C5032DD1DF75667868B335E235BABABCC
3,164,294 UART: Caliptra RT
3,164,547 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,267,957 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D80 ra=0x40007056 error_internal_intr_r=00000040
3,270,397 UART: [rt] WDT Expired
3,270,684 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,405 >>> mbox cmd response: success
2,682,005 UART:
2,682,021 UART: Running Caliptra FMC ...
2,682,429 UART:
2,682,483 UART: [state] CFI Enabled
2,693,068 UART: [fht] FMC Alias Private Key: 7
2,800,409 UART: [art] Extend RT PCRs Done
2,800,837 UART: [art] Lock RT PCRs Done
2,802,569 UART: [art] Populate DV Done
2,810,848 UART: [fht] FMC Alias Private Key: 7
2,811,840 UART: [art] Derive CDI
2,812,120 UART: [art] Store in in slot 0x4
2,897,191 UART: [art] Derive Key Pair
2,897,551 UART: [art] Store priv key in slot 0x5
2,911,177 UART: [art] Derive Key Pair - Done
2,926,164 UART: [art] Signing Cert with AUTHO
2,926,644 UART: RITY.KEYID = 7
2,941,832 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,597 UART: [art] PUB.X = F0966B5C377DBFB31779985159F2613653176231288E255CF597EC5C9440C8C04CAC1E16DBE00BD738C2A825E71B482C
2,949,362 UART: [art] PUB.Y = 241E7E02193E7ED660C48998C3E5BDDF5862C1A26605F72EFC4DA85E9E75AE7D4F722A36D9E35936F474CB73ED9197ED
2,956,316 UART: [art] SIG.R = 60A6D40129E96693979B1814AB019B8F00334FF47593EBDFF22179BC25C9BD0EF51A682DEFDFAFB3B33F38243886EF34
2,963,063 UART: [art] SIG.S = C930693A3B8258E4E900A3C009DD5FB391A33AA15140016ED507B0202588BD65116137FC566B036C38E19002FC196098
2,986,587 UART: Caliptra RT
2,986,840 UART: [state] CFI Enabled
3,094,627 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,845 ready_for_fw is high
1,055,845 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,652 >>> mbox cmd response: success
2,682,241 UART:
2,682,257 UART: Running Caliptra FMC ...
2,682,665 UART:
2,682,719 UART: [state] CFI Enabled
2,693,305 UART: [fht] FMC Alias Private Key: 7
2,800,656 UART: [art] Extend RT PCRs Done
2,801,084 UART: [art] Lock RT PCRs Done
2,802,816 UART: [art] Populate DV Done
2,811,095 UART: [fht] FMC Alias Private Key: 7
2,812,087 UART: [art] Derive CDI
2,812,367 UART: [art] Store in in slot 0x4
2,897,436 UART: [art] Derive Key Pair
2,897,796 UART: [art] Store priv key in slot 0x5
2,911,422 UART: [art] Derive Key Pair - Done
2,926,406 UART: [art] Signing Cert with AUTHO
2,926,886 UART: RITY.KEYID = 7
2,942,074 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,839 UART: [art] PUB.X = 4F0333BF40B16E44877901D3223A3E73380FCDD29DEF30486EC3D3921882B666EEC44A07D62AA05801FCB2F1CD45A892
2,949,598 UART: [art] PUB.Y = 104763D7246D28565B95173089CADBEE16D5DF53AFC015F3928F5EA8C075D4DEAEA0B6A398EB5B4A19B0052A4F9CA0ED
2,956,561 UART: [art] SIG.R = E0CDA8EE4182366CC8EFA2DBA47070A7388B391E0FAC90645C5F6BD8CBA8DBED45B6B45BF252A87374EB461ED2B8D97C
2,963,352 UART: [art] SIG.S = 59BBC17870E5C3DBE73B5EE9511230E558B7A71E0614529000C3734B14E81E88E979D8EDA2CDF05D912626FA131A2287
2,986,896 UART: Caliptra RT
2,987,149 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,090,403 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D82 ra=0x40007056 error_internal_intr_r=00000040
3,092,843 UART: [rt] WDT Expired
3,093,130 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,150 UART: [kat] ++
896,302 UART: [kat] sha1
900,488 UART: [kat] SHA2-256
902,428 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,941 UART: [kat] HMAC-384Kdf
921,591 UART: [kat] LMS
1,169,903 UART: [kat] --
1,170,740 UART: [cold-reset] ++
1,171,160 UART: [fht] FHT @ 0x50003400
1,174,002 UART: [idev] ++
1,174,170 UART: [idev] CDI.KEYID = 6
1,174,531 UART: [idev] SUBJECT.KEYID = 7
1,174,956 UART: [idev] UDS.KEYID = 0
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,200,152 UART: [idev] Sha1 KeyId Algorithm
1,209,086 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,725 UART: [ldev] SUBJECT.KEYID = 5
1,211,152 UART: [ldev] AUTHORITY.KEYID = 7
1,211,615 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,282,852 UART: [fwproc] Recv command 0x46574c44
1,283,585 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,829 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,138 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,920 >>> mbox cmd response: success
2,772,943 UART: [afmc] ++
2,773,111 UART: [afmc] CDI.KEYID = 6
2,773,474 UART: [afmc] SUBJECT.KEYID = 7
2,773,900 UART: [afmc] AUTHORITY.KEYID = 5
2,810,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,282 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,011 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,894 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,613 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,484 UART: [afmc] --
2,853,362 UART: [cold-reset] --
2,854,406 UART: [state] Locking Datavault
2,855,749 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,353 UART: [state] Locking ICCM
2,856,827 UART: [exit] Launching FMC @ 0x40000130
2,862,156 UART:
2,862,172 UART: Running Caliptra FMC ...
2,862,580 UART:
2,862,723 UART: [state] CFI Enabled
2,873,652 UART: [fht] FMC Alias Private Key: 7
2,982,361 UART: [art] Extend RT PCRs Done
2,982,789 UART: [art] Lock RT PCRs Done
2,984,397 UART: [art] Populate DV Done
2,992,472 UART: [fht] FMC Alias Private Key: 7
2,993,412 UART: [art] Derive CDI
2,993,692 UART: [art] Store in in slot 0x4
3,079,273 UART: [art] Derive Key Pair
3,079,633 UART: [art] Store priv key in slot 0x5
3,092,939 UART: [art] Derive Key Pair - Done
3,107,819 UART: [art] Signing Cert with AUTHO
3,108,299 UART: RITY.KEYID = 7
3,123,501 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,266 UART: [art] PUB.X = 6E825F7E5B2B444C694E68CA220E1A3442AD8D032712E75B0577593D565CF4AC4E8CEC54BE3E35C38FE3A62C6B04D66E
3,131,034 UART: [art] PUB.Y = 106795C1BA81C36219E15E28C769EBFD52F3FCA61A2FE3A5961FAEA4F77B0411A627DF06A60E20723AF2110DB967ADD0
3,137,984 UART: [art] SIG.R = 35537051E3BD7F655C208E440F310166270E17B8E436D109E60FDED1E493D39E69C573C076B7A0D066165E48BD416F0F
3,144,732 UART: [art] SIG.S = AB98097A4A58F2929AB6F754AA0A2CFDFF96A472EC47451483E385192A3C1E814A95292655B1D8B7891D08E2E4849DBB
3,169,026 UART: Caliptra RT
3,169,371 UART: [state] CFI Enabled
3,277,346 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 3184567 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,438 UART: [kat] ++
896,590 UART: [kat] sha1
900,776 UART: [kat] SHA2-256
902,716 UART: [kat] SHA2-384
905,421 UART: [kat] SHA2-512-ACC
907,322 UART: [kat] ECC-384
917,229 UART: [kat] HMAC-384Kdf
921,879 UART: [kat] LMS
1,170,191 UART: [kat] --
1,171,028 UART: [cold-reset] ++
1,171,447 UART: [fht] FHT @ 0x50003400
1,174,289 UART: [idev] ++
1,174,457 UART: [idev] CDI.KEYID = 6
1,174,818 UART: [idev] SUBJECT.KEYID = 7
1,175,243 UART: [idev] UDS.KEYID = 0
1,175,589 ready_for_fw is high
1,175,589 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,954 UART: [idev] Erasing UDS.KEYID = 0
1,200,437 UART: [idev] Sha1 KeyId Algorithm
1,209,370 UART: [idev] --
1,210,475 UART: [ldev] ++
1,210,643 UART: [ldev] CDI.KEYID = 6
1,211,007 UART: [ldev] SUBJECT.KEYID = 5
1,211,434 UART: [ldev] AUTHORITY.KEYID = 7
1,211,897 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,243,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,742 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,436 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,306 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,012 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,040 UART: [ldev] --
1,282,504 UART: [fwproc] Wait for Commands...
1,283,089 UART: [fwproc] Recv command 0x46574c44
1,283,822 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,061 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,370 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,151 >>> mbox cmd response: success
2,773,171 UART: [afmc] ++
2,773,339 UART: [afmc] CDI.KEYID = 6
2,773,702 UART: [afmc] SUBJECT.KEYID = 7
2,774,128 UART: [afmc] AUTHORITY.KEYID = 5
2,810,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,506 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,833,218 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,839,116 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,844,813 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,852,669 UART: [afmc] --
2,853,546 UART: [cold-reset] --
2,854,590 UART: [state] Locking Datavault
2,855,933 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,537 UART: [state] Locking ICCM
2,857,011 UART: [exit] Launching FMC @ 0x40000130
2,862,340 UART:
2,862,356 UART: Running Caliptra FMC ...
2,862,764 UART:
2,862,907 UART: [state] CFI Enabled
2,873,837 UART: [fht] FMC Alias Private Key: 7
2,982,556 UART: [art] Extend RT PCRs Done
2,982,984 UART: [art] Lock RT PCRs Done
2,984,592 UART: [art] Populate DV Done
2,992,667 UART: [fht] FMC Alias Private Key: 7
2,993,607 UART: [art] Derive CDI
2,993,887 UART: [art] Store in in slot 0x4
3,079,466 UART: [art] Derive Key Pair
3,079,826 UART: [art] Store priv key in slot 0x5
3,093,132 UART: [art] Derive Key Pair - Done
3,107,996 UART: [art] Signing Cert with AUTHO
3,108,476 UART: RITY.KEYID = 7
3,123,678 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,443 UART: [art] PUB.X = B7831B0444B6A9760B3E688252AB549A46D1AA5453C34980728DC779DDC2BAFC3D04E6101DD1F6F7B6776BCB9FE3C0F4
3,131,214 UART: [art] PUB.Y = 05F9F75EF4741DEDB40777EEF7269F3F26132701F16F7937098CDECD0E6AA9FE66EBF9EBAEB98F1BE73C0BDCA6C954A4
3,138,170 UART: [art] SIG.R = 618EA10F9F25EEF65CC8DF2B8E5C9E995DD6F497382A3BE149EF2F16D414DCE20911599DC6BF5836BFEC2DC7C4831312
3,144,950 UART: [art] SIG.S = 4E6E9B6C4C6F0ACE4C39593DE853E052921B8816A6213742E4080D8375577C00955A9716E1412E9B42F1EFF56D203A35
3,169,210 UART: Caliptra RT
3,169,555 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,273,140 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D82 ra=0x40007056 error_internal_intr_r=00000040
3,275,580 UART: [rt] WDT Expired
3,275,867 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,786 >>> mbox cmd response: success
2,684,678 UART:
2,684,694 UART: Running Caliptra FMC ...
2,685,102 UART:
2,685,245 UART: [state] CFI Enabled
2,696,174 UART: [fht] FMC Alias Private Key: 7
2,804,883 UART: [art] Extend RT PCRs Done
2,805,311 UART: [art] Lock RT PCRs Done
2,806,919 UART: [art] Populate DV Done
2,814,994 UART: [fht] FMC Alias Private Key: 7
2,815,934 UART: [art] Derive CDI
2,816,214 UART: [art] Store in in slot 0x4
2,901,795 UART: [art] Derive Key Pair
2,902,155 UART: [art] Store priv key in slot 0x5
2,915,461 UART: [art] Derive Key Pair - Done
2,930,336 UART: [art] Signing Cert with AUTHO
2,930,816 UART: RITY.KEYID = 7
2,946,018 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,783 UART: [art] PUB.X = FA051328C2AE6D4DE043C63A5BEA73AA2496C6D7476BD20C8647533BB9CD6CCF970F873F75C544476CF96E0497C70B21
2,953,546 UART: [art] PUB.Y = A32A999A533C121C9FB0375AB11F8E4EC3DD59AF976F390F0CBFC9693293C62C3BFF5364D06B05A55F4C28E51A77F5FB
2,960,501 UART: [art] SIG.R = BE8D9287101888412EE8D212F8BDABF769727789107C86917A12A0CBE07690C0FF30137E3EEFA38C749DB3ECC8AAA92E
2,967,281 UART: [art] SIG.S = ACD35CD1AF8B54D86AA06CC0E7DDF759A8FA8F5D726D69B8088211E7BFCBD7B47135F3AB50112284775FFE9CB783BF39
2,991,597 UART: Caliptra RT
2,991,942 UART: [state] CFI Enabled
3,099,866 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,374 ready_for_fw is high
1,057,374 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,033 >>> mbox cmd response: success
2,684,914 UART:
2,684,930 UART: Running Caliptra FMC ...
2,685,338 UART:
2,685,481 UART: [state] CFI Enabled
2,696,411 UART: [fht] FMC Alias Private Key: 7
2,805,130 UART: [art] Extend RT PCRs Done
2,805,558 UART: [art] Lock RT PCRs Done
2,807,166 UART: [art] Populate DV Done
2,815,241 UART: [fht] FMC Alias Private Key: 7
2,816,181 UART: [art] Derive CDI
2,816,461 UART: [art] Store in in slot 0x4
2,902,040 UART: [art] Derive Key Pair
2,902,400 UART: [art] Store priv key in slot 0x5
2,915,706 UART: [art] Derive Key Pair - Done
2,930,569 UART: [art] Signing Cert with AUTHO
2,931,049 UART: RITY.KEYID = 7
2,946,251 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,016 UART: [art] PUB.X = CB1B11A4CFE75779A399F7A197156EDA83E9065CF95E0B98DB81D994A457DEF2460C344039CBB23B67EB0FE2EEE1205A
2,953,788 UART: [art] PUB.Y = 35B3FB724486C2D0615A62BF43E0420E0ED5217A941842CE3583E9FB9567455A97233B2B461BFE1031C96A41FC18CD26
2,960,730 UART: [art] SIG.R = 8C347FEE27CDB2C6CEE509D7BE5C34B1CC60F522851A59DD1E9B45C0B33CB54A671391681BCD34A0E27125C20ACAEC99
2,967,512 UART: [art] SIG.S = EA191BB597EB2DB5012CBB67373A015A4AB76B57E43E60988A36AE9350D850686C0AFF0BA7C3981EAC2536690CF22DE9
2,991,804 UART: Caliptra RT
2,992,149 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,095,634 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D7E ra=0x40007056 error_internal_intr_r=00000040
3,098,076 UART: [rt] WDT Expired
3,098,363 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,171 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
891,010 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,139 UART: [kat] ++
895,291 UART: [kat] sha1
899,575 UART: [kat] SHA2-256
901,515 UART: [kat] SHA2-384
904,182 UART: [kat] SHA2-512-ACC
906,083 UART: [kat] ECC-384
915,670 UART: [kat] HMAC-384Kdf
920,342 UART: [kat] LMS
1,168,654 UART: [kat] --
1,169,399 UART: [cold-reset] ++
1,169,813 UART: [fht] FHT @ 0x50003400
1,172,447 UART: [idev] ++
1,172,615 UART: [idev] CDI.KEYID = 6
1,172,976 UART: [idev] SUBJECT.KEYID = 7
1,173,401 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,687 UART: [kat] SHA2-256
891,237 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,366 UART: [kat] ++
895,518 UART: [kat] sha1
899,540 UART: [kat] SHA2-256
901,480 UART: [kat] SHA2-384
904,127 UART: [kat] SHA2-512-ACC
906,028 UART: [kat] ECC-384
915,553 UART: [kat] HMAC-384Kdf
920,391 UART: [kat] LMS
1,168,703 UART: [kat] --
1,169,780 UART: [cold-reset] ++
1,170,268 UART: [fht] FHT @ 0x50003400
1,173,080 UART: [idev] ++
1,173,248 UART: [idev] CDI.KEYID = 6
1,173,609 UART: [idev] SUBJECT.KEYID = 7
1,174,034 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
891,266 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,395 UART: [kat] ++
895,547 UART: [kat] sha1
899,953 UART: [kat] SHA2-256
901,893 UART: [kat] SHA2-384
904,520 UART: [kat] SHA2-512-ACC
906,421 UART: [kat] ECC-384
916,456 UART: [kat] HMAC-384Kdf
921,074 UART: [kat] LMS
1,169,386 UART: [kat] --
1,170,207 UART: [cold-reset] ++
1,170,577 UART: [fht] FHT @ 0x50003400
1,173,169 UART: [idev] ++
1,173,337 UART: [idev] CDI.KEYID = 6
1,173,698 UART: [idev] SUBJECT.KEYID = 7
1,174,123 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
899,872 UART: [kat] SHA2-256
901,812 UART: [kat] SHA2-384
904,565 UART: [kat] SHA2-512-ACC
906,466 UART: [kat] ECC-384
916,459 UART: [kat] HMAC-384Kdf
920,959 UART: [kat] LMS
1,169,271 UART: [kat] --
1,170,096 UART: [cold-reset] ++
1,170,510 UART: [fht] FHT @ 0x50003400
1,173,076 UART: [idev] ++
1,173,244 UART: [idev] CDI.KEYID = 6
1,173,605 UART: [idev] SUBJECT.KEYID = 7
1,174,030 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,289 UART: [kat] ++
895,441 UART: [kat] sha1
899,545 UART: [kat] SHA2-256
901,485 UART: [kat] SHA2-384
904,374 UART: [kat] SHA2-512-ACC
906,275 UART: [kat] ECC-384
915,960 UART: [kat] HMAC-384Kdf
920,478 UART: [kat] LMS
1,168,790 UART: [kat] --
1,169,617 UART: [cold-reset] ++
1,170,013 UART: [fht] FHT @ 0x50003400
1,172,639 UART: [idev] ++
1,172,807 UART: [idev] CDI.KEYID = 6
1,173,168 UART: [idev] SUBJECT.KEYID = 7
1,173,593 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,496 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
891,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,676 UART: [kat] SHA2-256
901,616 UART: [kat] SHA2-384
904,499 UART: [kat] SHA2-512-ACC
906,400 UART: [kat] ECC-384
915,889 UART: [kat] HMAC-384Kdf
920,443 UART: [kat] LMS
1,168,755 UART: [kat] --
1,169,652 UART: [cold-reset] ++
1,170,042 UART: [fht] FHT @ 0x50003400
1,172,696 UART: [idev] ++
1,172,864 UART: [idev] CDI.KEYID = 6
1,173,225 UART: [idev] SUBJECT.KEYID = 7
1,173,650 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Production
85,757 UART: [state] DebugLocked = Yes
86,491 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,257 UART: [kat] SHA2-256
882,188 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,303 UART: [kat] ++
886,455 UART: [kat] sha1
890,791 UART: [kat] SHA2-256
892,729 UART: [kat] SHA2-384
895,438 UART: [kat] SHA2-512-ACC
897,339 UART: [kat] ECC-384
903,036 UART: [kat] HMAC-384Kdf
907,520 UART: [kat] LMS
1,475,716 UART: [kat] --
1,476,801 UART: [cold-reset] ++
1,477,380 UART: [fht] Storing FHT @ 0x50003400
1,480,263 UART: [idev] ++
1,480,431 UART: [idev] CDI.KEYID = 6
1,480,791 UART: [idev] SUBJECT.KEYID = 7
1,481,215 UART: [idev] UDS.KEYID = 0
1,481,560 ready_for_fw is high
1,481,560 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,160 UART: [idev] Erasing UDS.KEYID = 0
1,505,161 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,900 UART: [idev] --
1,514,925 UART: [ldev] ++
1,515,093 UART: [ldev] CDI.KEYID = 6
1,515,456 UART: [ldev] SUBJECT.KEYID = 5
1,515,882 UART: [ldev] AUTHORITY.KEYID = 7
1,516,345 UART: [ldev] FE.KEYID = 1
1,521,661 UART: [ldev] Erasing FE.KEYID = 1
1,547,034 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,385 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,079 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,951 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,657 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,899 UART: [ldev] --
1,586,402 UART: [fwproc] Waiting for Commands...
1,587,079 UART: [fwproc] Received command 0x46574c44
1,587,870 UART: [fwproc] Received Image of size 114332 bytes
2,911,480 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,938,991 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,968,343 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,104,125 >>> mbox cmd response: success
3,105,382 UART: [afmc] ++
3,105,550 UART: [afmc] CDI.KEYID = 6
3,105,912 UART: [afmc] SUBJECT.KEYID = 7
3,106,337 UART: [afmc] AUTHORITY.KEYID = 5
3,141,200 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,157,658 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,158,438 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
3,164,156 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
3,170,051 UART: [afmc] SIG.R = 623EC468580E48F9442F3A98505805ACC48D8CCEA3B375213C8A5074ABC3A5C2FDCB24A111F0C9A172DA0CBE859EBB4A
3,175,762 UART: [afmc] SIG.S = DBE39B3C6863A87345434C51DDFD4D2E4CF8AF80FC96FA343F8F9745848E06704092BB663A7D1981CA09695E7F15145A
3,183,556 UART: [afmc] --
3,184,453 UART: [cold-reset] --
3,185,235 UART: [state] Locking Datavault
3,186,482 UART: [state] Locking PCR0, PCR1 and PCR31
3,187,086 UART: [state] Locking ICCM
3,187,626 UART: [exit] Launching FMC @ 0x40000130
3,192,955 UART:
3,192,971 UART: Running Caliptra FMC ...
3,193,379 UART:
3,193,433 UART: [state] CFI Enabled
3,203,960 UART: [fht] FMC Alias Private Key: 7
3,311,985 UART: [art] Extend RT PCRs Done
3,312,413 UART: [art] Lock RT PCRs Done
3,313,791 UART: [art] Populate DV Done
3,322,005 UART: [fht] FMC Alias Private Key: 7
3,322,937 UART: [art] Derive CDI
3,323,217 UART: [art] Store in in slot 0x4
3,408,884 UART: [art] Derive Key Pair
3,409,244 UART: [art] Store priv key in slot 0x5
3,422,934 UART: [art] Derive Key Pair - Done
3,437,544 UART: [art] Signing Cert with AUTHO
3,438,024 UART: RITY.KEYID = 7
3,453,354 UART: [art] Erasing AUTHORITY.KEYID = 7
3,454,119 UART: [art] PUB.X = 48E8BE40A6E7798A3614562ACC8A674598FE980F34615F5859D46D51F18623557D0C0F4B0FD0C7E856BAAD6893AC39F8
3,460,879 UART: [art] PUB.Y = B45E1DE3022C646A252E7CE8C0FC7A77778C66201453ECF4DB376148D1FFEBA28B29712A79E1C0F8E299F185A3A74B64
3,467,834 UART: [art] SIG.R = 5B432C1406655230EBCCF515EC0E672F90FC16A0DA5AFAFB58373DF1819758C9B1FFF137F8D07335D699481FD086424F
3,474,604 UART: [art] SIG.S = EF7EE9B4E37BF79C2B2D19F6E9E00AD8B67FBF2E2BCE0F2217F231C15C64B73873640D50B9973CEE5811A1CF1C75A8E0
3,498,386 UART: Caliptra RT
3,498,639 UART: [state] CFI Enabled
3,606,686 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,607,445 UART:
3,607,461 UART: Running Caliptra ROM ...
3,607,869 UART:
3,607,923 UART: [state] CFI Enabled
3,610,596 UART: [state] LifecycleState = Production
3,611,204 UART: [state] DebugLocked = Yes
3,611,956 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,613,680 UART: [kat] SHA2-256
4,407,611 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,411,726 UART: [kat] ++
4,411,878 UART: [kat] sha1
4,416,108 UART: [kat] SHA2-256
4,418,046 UART: [kat] SHA2-384
4,421,005 UART: [kat] SHA2-512-ACC
4,422,906 UART: [kat] ECC-384
4,428,609 UART: [kat] HMAC-384Kdf
4,433,167 UART: [kat] LMS
5,001,363 UART: [kat] --
5,002,313 UART: [warm-reset] ++
5,003,278 UART: [warm-reset] --
5,004,107 UART: [state] Locking Datavault
5,004,989 UART: [state] Locking PCR0, PCR1 and PCR31
5,005,593 UART: [state] Locking ICCM
5,006,097 UART: [exit] Launching FMC @ 0x40000130
5,011,426 UART:
5,011,442 UART: Running Caliptra FMC ...
5,011,850 UART:
5,011,904 UART: [state] CFI Enabled
5,012,997 UART: [aliasrt :skip pcr extension
5,013,470 UART: [art] Extend RT PCRs Done
5,013,898 UART: [art] Lock RT PCRs Done
5,015,177 UART: [art] Populate DV Done
5,023,469 UART: [fht] FMC Alias Private Key: 7
5,024,543 UART: [art] Derive CDI
5,024,823 UART: [art] Store in in slot 0x4
5,110,698 UART: [art] Derive Key Pair
5,111,058 UART: [art] Store priv key in slot 0x5
5,124,460 UART: [art] Derive Key Pair - Done
5,139,320 UART: [art] Signing Cert with AUTHO
5,139,800 UART: RITY.KEYID = 7
5,154,986 UART: [art] Erasing AUTHORITY.KEYID = 7
5,155,751 UART: [art] PUB.X = 48E8BE40A6E7798A3614562ACC8A674598FE980F34615F5859D46D51F18623557D0C0F4B0FD0C7E856BAAD6893AC39F8
5,162,511 UART: [art] PUB.Y = B45E1DE3022C646A252E7CE8C0FC7A77778C66201453ECF4DB376148D1FFEBA28B29712A79E1C0F8E299F185A3A74B64
5,169,466 UART: [art] SIG.R = 5B432C1406655230EBCCF515EC0E672F90FC16A0DA5AFAFB58373DF1819758C9B1FFF137F8D07335D699481FD086424F
5,176,236 UART: [art] SIG.S = EF7EE9B4E37BF79C2B2D19F6E9E00AD8B67FBF2E2BCE0F2217F231C15C64B73873640D50B9973CEE5811A1CF1C75A8E0
5,200,490 UART: Caliptra RT
5,200,743 UART: [state] CFI Enabled
5,481,468 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,192 ready_for_fw is high
1,363,192 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,953,007 >>> mbox cmd response: success
3,014,794 UART:
3,014,810 UART: Running Caliptra FMC ...
3,015,218 UART:
3,015,272 UART: [state] CFI Enabled
3,025,833 UART: [fht] FMC Alias Private Key: 7
3,134,040 UART: [art] Extend RT PCRs Done
3,134,468 UART: [art] Lock RT PCRs Done
3,135,752 UART: [art] Populate DV Done
3,143,954 UART: [fht] FMC Alias Private Key: 7
3,145,110 UART: [art] Derive CDI
3,145,390 UART: [art] Store in in slot 0x4
3,231,397 UART: [art] Derive Key Pair
3,231,757 UART: [art] Store priv key in slot 0x5
3,244,771 UART: [art] Derive Key Pair - Done
3,259,600 UART: [art] Signing Cert with AUTHO
3,260,080 UART: RITY.KEYID = 7
3,275,590 UART: [art] Erasing AUTHORITY.KEYID = 7
3,276,355 UART: [art] PUB.X = 15B5CB73F131A2EE654DEA2D726F0577689166E4ED6E17F24444EC911FBE8EFADB061C274F5ADCC67671EB144C98F53E
3,283,133 UART: [art] PUB.Y = 6F382D2C98664AEA55104A2ED4F39A3204C5D361FF3A1C70A30D03E6633F29E165B3706A53995AF3551EE1B7D6C2EA0D
3,290,077 UART: [art] SIG.R = 6AD0AF51111C5A2CBB0CBA7F63D37F70CD30B511DDAD5E3E26648E52FABA6A0B837A81733F3C3FEAFFA3BFDE56262AAF
3,296,873 UART: [art] SIG.S = E84CF85C512A33690FE0F70DB46FB01FDB948CD4FC9C692FE20F17B69410531CA5C279669079EE7FD12469F1B15E9338
3,321,003 UART: Caliptra RT
3,321,256 UART: [state] CFI Enabled
3,429,591 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,714,723 UART:
4,714,739 UART: Running Caliptra FMC ...
4,715,147 UART:
4,715,201 UART: [state] CFI Enabled
4,716,564 UART: [aliasrt :skip pcr extension
4,717,037 UART: [art] Extend RT PCRs Done
4,717,465 UART: [art] Lock RT PCRs Done
4,718,814 UART: [art] Populate DV Done
4,727,122 UART: [fht] FMC Alias Private Key: 7
4,728,112 UART: [art] Derive CDI
4,728,392 UART: [art] Store in in slot 0x4
4,813,785 UART: [art] Derive Key Pair
4,814,145 UART: [art] Store priv key in slot 0x5
4,827,781 UART: [art] Derive Key Pair - Done
4,842,576 UART: [art] Signing Cert with AUTHO
4,843,056 UART: RITY.KEYID = 7
4,858,626 UART: [art] Erasing AUTHORITY.KEYID = 7
4,859,391 UART: [art] PUB.X = 15B5CB73F131A2EE654DEA2D726F0577689166E4ED6E17F24444EC911FBE8EFADB061C274F5ADCC67671EB144C98F53E
4,866,169 UART: [art] PUB.Y = 6F382D2C98664AEA55104A2ED4F39A3204C5D361FF3A1C70A30D03E6633F29E165B3706A53995AF3551EE1B7D6C2EA0D
4,873,113 UART: [art] SIG.R = 6AD0AF51111C5A2CBB0CBA7F63D37F70CD30B511DDAD5E3E26648E52FABA6A0B837A81733F3C3FEAFFA3BFDE56262AAF
4,879,909 UART: [art] SIG.S = E84CF85C512A33690FE0F70DB46FB01FDB948CD4FC9C692FE20F17B69410531CA5C279669079EE7FD12469F1B15E9338
4,903,561 UART: Caliptra RT
4,903,814 UART: [state] CFI Enabled
5,185,251 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Production
85,754 UART: [state] DebugLocked = Yes
86,334 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,968 UART: [kat] SHA2-256
881,899 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,014 UART: [kat] ++
886,166 UART: [kat] sha1
890,402 UART: [kat] SHA2-256
892,340 UART: [kat] SHA2-384
895,063 UART: [kat] SHA2-512-ACC
896,964 UART: [kat] ECC-384
902,709 UART: [kat] HMAC-384Kdf
907,349 UART: [kat] LMS
1,475,545 UART: [kat] --
1,476,338 UART: [cold-reset] ++
1,476,777 UART: [fht] Storing FHT @ 0x50003400
1,479,660 UART: [idev] ++
1,479,828 UART: [idev] CDI.KEYID = 6
1,480,188 UART: [idev] SUBJECT.KEYID = 7
1,480,612 UART: [idev] UDS.KEYID = 0
1,480,957 ready_for_fw is high
1,480,957 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,667 UART: [idev] Erasing UDS.KEYID = 0
1,505,188 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,705 UART: [idev] --
1,514,768 UART: [ldev] ++
1,514,936 UART: [ldev] CDI.KEYID = 6
1,515,299 UART: [ldev] SUBJECT.KEYID = 5
1,515,725 UART: [ldev] AUTHORITY.KEYID = 7
1,516,188 UART: [ldev] FE.KEYID = 1
1,521,360 UART: [ldev] Erasing FE.KEYID = 1
1,546,549 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,662 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,356 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,228 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,934 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,852 UART: [ldev] --
1,586,271 UART: [fwproc] Waiting for Commands...
1,587,028 UART: [fwproc] Received command 0x46574c44
1,587,819 UART: [fwproc] Received Image of size 114332 bytes
2,910,763 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,939,510 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,968,862 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,104,630 >>> mbox cmd response: success
3,105,727 UART: [afmc] ++
3,105,895 UART: [afmc] CDI.KEYID = 6
3,106,257 UART: [afmc] SUBJECT.KEYID = 7
3,106,682 UART: [afmc] AUTHORITY.KEYID = 5
3,141,497 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,157,561 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,158,341 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
3,164,059 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
3,169,954 UART: [afmc] SIG.R = 623EC468580E48F9442F3A98505805ACC48D8CCEA3B375213C8A5074ABC3A5C2FDCB24A111F0C9A172DA0CBE859EBB4A
3,175,665 UART: [afmc] SIG.S = DBE39B3C6863A87345434C51DDFD4D2E4CF8AF80FC96FA343F8F9745848E06704092BB663A7D1981CA09695E7F15145A
3,183,465 UART: [afmc] --
3,184,500 UART: [cold-reset] --
3,185,404 UART: [state] Locking Datavault
3,186,397 UART: [state] Locking PCR0, PCR1 and PCR31
3,187,001 UART: [state] Locking ICCM
3,187,593 UART: [exit] Launching FMC @ 0x40000130
3,192,922 UART:
3,192,938 UART: Running Caliptra FMC ...
3,193,346 UART:
3,193,489 UART: [state] CFI Enabled
3,204,282 UART: [fht] FMC Alias Private Key: 7
3,312,271 UART: [art] Extend RT PCRs Done
3,312,699 UART: [art] Lock RT PCRs Done
3,314,115 UART: [art] Populate DV Done
3,322,143 UART: [fht] FMC Alias Private Key: 7
3,323,091 UART: [art] Derive CDI
3,323,371 UART: [art] Store in in slot 0x4
3,409,320 UART: [art] Derive Key Pair
3,409,680 UART: [art] Store priv key in slot 0x5
3,422,214 UART: [art] Derive Key Pair - Done
3,437,026 UART: [art] Signing Cert with AUTHO
3,437,506 UART: RITY.KEYID = 7
3,452,696 UART: [art] Erasing AUTHORITY.KEYID = 7
3,453,461 UART: [art] PUB.X = 5F76FFA294C7E47C68E7F3CC5A0FD08DC6FC53D2BB14F48B3165D481E5F06C8ED059EBBDC900F0B814C425C799F54CBE
3,460,228 UART: [art] PUB.Y = FBC9611DE97E8029AE3756CC01C74B05119007778C1A318C65E5FBBAE05E3BAE53EFDE677ADB4234633138B168500210
3,467,170 UART: [art] SIG.R = 4C1DDB929982B6D8D13520047ABCC65C868850E3618291EAFE7EAA0202971129622BE7F1E19B924604C8D92045DF71F7
3,473,926 UART: [art] SIG.S = B09708C25BA70818E1671F76698822E15B331D320592C1748959AC1A1947743A923A527269876F51FB069E32274614B4
3,497,991 UART: Caliptra RT
3,498,336 UART: [state] CFI Enabled
3,606,243 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,607,002 UART:
3,607,018 UART: Running Caliptra ROM ...
3,607,426 UART:
3,607,567 UART: [state] CFI Enabled
3,610,498 UART: [state] LifecycleState = Production
3,611,106 UART: [state] DebugLocked = Yes
3,611,830 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,613,630 UART: [kat] SHA2-256
4,407,561 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,411,676 UART: [kat] ++
4,411,828 UART: [kat] sha1
4,416,074 UART: [kat] SHA2-256
4,418,012 UART: [kat] SHA2-384
4,420,789 UART: [kat] SHA2-512-ACC
4,422,690 UART: [kat] ECC-384
4,428,553 UART: [kat] HMAC-384Kdf
4,433,369 UART: [kat] LMS
5,001,565 UART: [kat] --
5,002,405 UART: [warm-reset] ++
5,003,404 UART: [warm-reset] --
5,004,123 UART: [state] Locking Datavault
5,004,799 UART: [state] Locking PCR0, PCR1 and PCR31
5,005,403 UART: [state] Locking ICCM
5,005,969 UART: [exit] Launching FMC @ 0x40000130
5,011,298 UART:
5,011,314 UART: Running Caliptra FMC ...
5,011,722 UART:
5,011,865 UART: [state] CFI Enabled
5,013,118 UART: [aliasrt :skip pcr extension
5,013,591 UART: [art] Extend RT PCRs Done
5,014,019 UART: [art] Lock RT PCRs Done
5,015,480 UART: [art] Populate DV Done
5,023,638 UART: [fht] FMC Alias Private Key: 7
5,024,684 UART: [art] Derive CDI
5,024,964 UART: [art] Store in in slot 0x4
5,110,639 UART: [art] Derive Key Pair
5,110,999 UART: [art] Store priv key in slot 0x5
5,124,581 UART: [art] Derive Key Pair - Done
5,139,227 UART: [art] Signing Cert with AUTHO
5,139,707 UART: RITY.KEYID = 7
5,154,699 UART: [art] Erasing AUTHORITY.KEYID = 7
5,155,464 UART: [art] PUB.X = 5F76FFA294C7E47C68E7F3CC5A0FD08DC6FC53D2BB14F48B3165D481E5F06C8ED059EBBDC900F0B814C425C799F54CBE
5,162,231 UART: [art] PUB.Y = FBC9611DE97E8029AE3756CC01C74B05119007778C1A318C65E5FBBAE05E3BAE53EFDE677ADB4234633138B168500210
5,169,173 UART: [art] SIG.R = 4C1DDB929982B6D8D13520047ABCC65C868850E3618291EAFE7EAA0202971129622BE7F1E19B924604C8D92045DF71F7
5,175,929 UART: [art] SIG.S = B09708C25BA70818E1671F76698822E15B331D320592C1748959AC1A1947743A923A527269876F51FB069E32274614B4
5,200,068 UART: Caliptra RT
5,200,413 UART: [state] CFI Enabled
5,481,474 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,377 ready_for_fw is high
1,363,377 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,954,826 >>> mbox cmd response: success
3,015,865 UART:
3,015,881 UART: Running Caliptra FMC ...
3,016,289 UART:
3,016,432 UART: [state] CFI Enabled
3,027,025 UART: [fht] FMC Alias Private Key: 7
3,135,064 UART: [art] Extend RT PCRs Done
3,135,492 UART: [art] Lock RT PCRs Done
3,136,938 UART: [art] Populate DV Done
3,145,142 UART: [fht] FMC Alias Private Key: 7
3,146,260 UART: [art] Derive CDI
3,146,540 UART: [art] Store in in slot 0x4
3,232,249 UART: [art] Derive Key Pair
3,232,609 UART: [art] Store priv key in slot 0x5
3,245,383 UART: [art] Derive Key Pair - Done
3,259,951 UART: [art] Signing Cert with AUTHO
3,260,431 UART: RITY.KEYID = 7
3,275,505 UART: [art] Erasing AUTHORITY.KEYID = 7
3,276,270 UART: [art] PUB.X = 0368FC9AAB7A24039A37FCCD43CAE9B1B6F3FFDE9C2661E315A6FACE724906B2E155FF1FD6604AEF869A50EC47095B49
3,283,048 UART: [art] PUB.Y = AB4EA0690816140735B40B2001574D6219689FF92CDEC8D0DC961407600C07C941C2DD8FFAFBD877F493849F0BA4B8BA
3,289,980 UART: [art] SIG.R = 997F1C271A92C2AB276C2228D76F2B975D427D2B6B7A95831D2E0ECCD16CF2E914FC5D64F8EEEB1A493302DDF4A300DF
3,296,738 UART: [art] SIG.S = 6FCDDD990D36472B06A5796BD58DC99833A33EE366D2F2A15820036DECF7EEB7923F99E7F16EDA3B52833A0030F34478
3,320,408 UART: Caliptra RT
3,320,753 UART: [state] CFI Enabled
3,429,088 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,713,859 UART:
4,713,875 UART: Running Caliptra FMC ...
4,714,283 UART:
4,714,426 UART: [state] CFI Enabled
4,715,755 UART: [aliasrt :skip pcr extension
4,716,228 UART: [art] Extend RT PCRs Done
4,716,656 UART: [art] Lock RT PCRs Done
4,717,981 UART: [art] Populate DV Done
4,726,067 UART: [fht] FMC Alias Private Key: 7
4,727,147 UART: [art] Derive CDI
4,727,427 UART: [art] Store in in slot 0x4
4,812,658 UART: [art] Derive Key Pair
4,813,018 UART: [art] Store priv key in slot 0x5
4,826,214 UART: [art] Derive Key Pair - Done
4,840,650 UART: [art] Signing Cert with AUTHO
4,841,130 UART: RITY.KEYID = 7
4,856,420 UART: [art] Erasing AUTHORITY.KEYID = 7
4,857,185 UART: [art] PUB.X = 0368FC9AAB7A24039A37FCCD43CAE9B1B6F3FFDE9C2661E315A6FACE724906B2E155FF1FD6604AEF869A50EC47095B49
4,863,963 UART: [art] PUB.Y = AB4EA0690816140735B40B2001574D6219689FF92CDEC8D0DC961407600C07C941C2DD8FFAFBD877F493849F0BA4B8BA
4,870,895 UART: [art] SIG.R = 997F1C271A92C2AB276C2228D76F2B975D427D2B6B7A95831D2E0ECCD16CF2E914FC5D64F8EEEB1A493302DDF4A300DF
4,877,653 UART: [art] SIG.S = 6FCDDD990D36472B06A5796BD58DC99833A33EE366D2F2A15820036DECF7EEB7923F99E7F16EDA3B52833A0030F34478
4,901,523 UART: Caliptra RT
4,901,868 UART: [state] CFI Enabled
5,183,883 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Production
85,871 UART: [state] DebugLocked = Yes
86,629 UART: [state] Starting the WD Timer 40000000 cycles
88,170 UART: [kat] SHA2-256
893,820 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,945 UART: [kat] ++
898,097 UART: [kat] sha1
902,559 UART: [kat] SHA2-256
904,499 UART: [kat] SHA2-384
907,180 UART: [kat] SHA2-512-ACC
909,081 UART: [kat] ECC-384
918,372 UART: [kat] HMAC-384Kdf
923,080 UART: [kat] LMS
1,171,408 UART: [kat] --
1,172,377 UART: [cold-reset] ++
1,172,914 UART: [fht] FHT @ 0x50003400
1,175,689 UART: [idev] ++
1,175,857 UART: [idev] CDI.KEYID = 6
1,176,217 UART: [idev] SUBJECT.KEYID = 7
1,176,641 UART: [idev] UDS.KEYID = 0
1,176,986 ready_for_fw is high
1,176,986 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,722 UART: [idev] Erasing UDS.KEYID = 0
1,201,144 UART: [idev] Sha1 KeyId Algorithm
1,209,625 UART: [idev] --
1,210,573 UART: [ldev] ++
1,210,741 UART: [ldev] CDI.KEYID = 6
1,211,104 UART: [ldev] SUBJECT.KEYID = 5
1,211,530 UART: [ldev] AUTHORITY.KEYID = 7
1,211,993 UART: [ldev] FE.KEYID = 1
1,217,107 UART: [ldev] Erasing FE.KEYID = 1
1,243,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,687 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,381 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,253 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,959 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,006 UART: [ldev] --
1,283,339 UART: [fwproc] Wait for Commands...
1,284,097 UART: [fwproc] Recv command 0x46574c44
1,284,825 UART: [fwproc] Recv'd Img size: 114332 bytes
2,608,370 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,560 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,864 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,800,708 >>> mbox cmd response: success
2,801,745 UART: [afmc] ++
2,801,913 UART: [afmc] CDI.KEYID = 6
2,802,275 UART: [afmc] SUBJECT.KEYID = 7
2,802,700 UART: [afmc] AUTHORITY.KEYID = 5
2,837,881 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,206 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,954 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,860,672 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,567 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,274 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,950 UART: [afmc] --
2,880,937 UART: [cold-reset] --
2,881,775 UART: [state] Locking Datavault
2,882,906 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,510 UART: [state] Locking ICCM
2,884,116 UART: [exit] Launching FMC @ 0x40000130
2,889,445 UART:
2,889,461 UART: Running Caliptra FMC ...
2,889,869 UART:
2,889,923 UART: [state] CFI Enabled
2,900,356 UART: [fht] FMC Alias Private Key: 7
3,008,437 UART: [art] Extend RT PCRs Done
3,008,865 UART: [art] Lock RT PCRs Done
3,010,561 UART: [art] Populate DV Done
3,018,805 UART: [fht] FMC Alias Private Key: 7
3,019,955 UART: [art] Derive CDI
3,020,235 UART: [art] Store in in slot 0x4
3,106,066 UART: [art] Derive Key Pair
3,106,426 UART: [art] Store priv key in slot 0x5
3,119,686 UART: [art] Derive Key Pair - Done
3,134,445 UART: [art] Signing Cert with AUTHO
3,134,925 UART: RITY.KEYID = 7
3,150,529 UART: [art] Erasing AUTHORITY.KEYID = 7
3,151,294 UART: [art] PUB.X = FF04D5471510F744CA539103D638872D0750C508EE34E3ADA06B2086B8B96FD29676E3DCF45698E2DD415EE521A1BCAB
3,158,058 UART: [art] PUB.Y = 7FF2A7DE51D3980A30B396B96B4A879001AD29882A349A611E42E313F0A689F381E126A2FFDEF40463A16BE017011F8D
3,164,998 UART: [art] SIG.R = A11F4B9D9ABBE34A4B9CC6C99B2D4A9E3AC204DC8CFE90BCCA3A0A0292968549E5367D0308AB5FD9559C4A80A5745877
3,171,769 UART: [art] SIG.S = B86AE40BC367AD12E66F0CF0A750FAC100033932BC4F42836225F99C1E87E093ECC4F67FE817FFC1213128436DAF3A19
3,195,413 UART: Caliptra RT
3,195,666 UART: [state] CFI Enabled
3,303,367 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,304,123 UART:
3,304,139 UART: Running Caliptra ROM ...
3,304,547 UART:
3,304,602 UART: [state] CFI Enabled
3,307,015 UART: [state] LifecycleState = Production
3,307,623 UART: [state] DebugLocked = Yes
3,308,255 UART: [state] Starting the WD Timer 40000000 cycles
3,309,846 UART: [kat] SHA2-256
4,115,496 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,119,621 UART: [kat] ++
4,119,773 UART: [kat] sha1
4,124,023 UART: [kat] SHA2-256
4,125,963 UART: [kat] SHA2-384
4,128,566 UART: [kat] SHA2-512-ACC
4,130,467 UART: [kat] ECC-384
4,139,730 UART: [kat] HMAC-384Kdf
4,144,230 UART: [kat] LMS
4,392,558 UART: [kat] --
4,393,356 UART: [warm-reset] ++
4,394,221 UART: [warm-reset] --
4,395,038 UART: [state] Locking Datavault
4,395,840 UART: [state] Locking PCR0, PCR1 and PCR31
4,396,444 UART: [state] Locking ICCM
4,396,950 UART: [exit] Launching FMC @ 0x40000130
4,402,279 UART:
4,402,295 UART: Running Caliptra FMC ...
4,402,703 UART:
4,402,757 UART: [state] CFI Enabled
4,403,996 UART: [aliasrt :skip pcr extension
4,404,469 UART: [art] Extend RT PCRs Done
4,404,897 UART: [art] Lock RT PCRs Done
4,406,114 UART: [art] Populate DV Done
4,414,634 UART: [fht] FMC Alias Private Key: 7
4,415,658 UART: [art] Derive CDI
4,415,938 UART: [art] Store in in slot 0x4
4,501,599 UART: [art] Derive Key Pair
4,501,959 UART: [art] Store priv key in slot 0x5
4,515,141 UART: [art] Derive Key Pair - Done
4,529,802 UART: [art] Signing Cert with AUTHO
4,530,282 UART: RITY.KEYID = 7
4,545,204 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,969 UART: [art] PUB.X = FF04D5471510F744CA539103D638872D0750C508EE34E3ADA06B2086B8B96FD29676E3DCF45698E2DD415EE521A1BCAB
4,552,733 UART: [art] PUB.Y = 7FF2A7DE51D3980A30B396B96B4A879001AD29882A349A611E42E313F0A689F381E126A2FFDEF40463A16BE017011F8D
4,559,673 UART: [art] SIG.R = A11F4B9D9ABBE34A4B9CC6C99B2D4A9E3AC204DC8CFE90BCCA3A0A0292968549E5367D0308AB5FD9559C4A80A5745877
4,566,444 UART: [art] SIG.S = B86AE40BC367AD12E66F0CF0A750FAC100033932BC4F42836225F99C1E87E093ECC4F67FE817FFC1213128436DAF3A19
4,590,252 UART: Caliptra RT
4,590,505 UART: [state] CFI Enabled
4,871,932 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,212 ready_for_fw is high
1,060,212 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,653,029 >>> mbox cmd response: success
2,714,360 UART:
2,714,376 UART: Running Caliptra FMC ...
2,714,784 UART:
2,714,838 UART: [state] CFI Enabled
2,724,975 UART: [fht] FMC Alias Private Key: 7
2,833,292 UART: [art] Extend RT PCRs Done
2,833,720 UART: [art] Lock RT PCRs Done
2,835,108 UART: [art] Populate DV Done
2,843,396 UART: [fht] FMC Alias Private Key: 7
2,844,504 UART: [art] Derive CDI
2,844,784 UART: [art] Store in in slot 0x4
2,930,723 UART: [art] Derive Key Pair
2,931,083 UART: [art] Store priv key in slot 0x5
2,943,879 UART: [art] Derive Key Pair - Done
2,958,785 UART: [art] Signing Cert with AUTHO
2,959,265 UART: RITY.KEYID = 7
2,974,265 UART: [art] Erasing AUTHORITY.KEYID = 7
2,975,030 UART: [art] PUB.X = 4E710A6373FD5BE620D6E13DC930F832163F12455C1562A72DE895E4ED560BDCBD4CDB2DD86C6CDC45EEA70C4B90207E
2,981,807 UART: [art] PUB.Y = 0015E44655369DAA8CAFAAEF4489169069058245668FC92D103E5DEB0865113CB0EA1259BC82BFAE5458BD8B0D372A40
2,988,730 UART: [art] SIG.R = 8AFE1F2F7761D229B00A106A4D3162744879DEDFFBE1BC81C886A155D050E6D9F9134B6BCFD9CA5A7E13F0553EAC9A0B
2,995,512 UART: [art] SIG.S = E4DC1EF0DF59A98B2AD0714250E373D4C6E9EC483BB57B9A063F941EDC381D47D60548AD57AF6A97CE454A897281E78B
3,019,713 UART: Caliptra RT
3,019,966 UART: [state] CFI Enabled
3,128,205 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,111,483 UART:
4,111,499 UART: Running Caliptra FMC ...
4,111,907 UART:
4,111,961 UART: [state] CFI Enabled
4,113,060 UART: [aliasrt :skip pcr extension
4,113,533 UART: [art] Extend RT PCRs Done
4,113,961 UART: [art] Lock RT PCRs Done
4,115,136 UART: [art] Populate DV Done
4,123,386 UART: [fht] FMC Alias Private Key: 7
4,124,562 UART: [art] Derive CDI
4,124,842 UART: [art] Store in in slot 0x4
4,210,523 UART: [art] Derive Key Pair
4,210,883 UART: [art] Store priv key in slot 0x5
4,223,955 UART: [art] Derive Key Pair - Done
4,239,035 UART: [art] Signing Cert with AUTHO
4,239,515 UART: RITY.KEYID = 7
4,254,271 UART: [art] Erasing AUTHORITY.KEYID = 7
4,255,036 UART: [art] PUB.X = 4E710A6373FD5BE620D6E13DC930F832163F12455C1562A72DE895E4ED560BDCBD4CDB2DD86C6CDC45EEA70C4B90207E
4,261,813 UART: [art] PUB.Y = 0015E44655369DAA8CAFAAEF4489169069058245668FC92D103E5DEB0865113CB0EA1259BC82BFAE5458BD8B0D372A40
4,268,736 UART: [art] SIG.R = 8AFE1F2F7761D229B00A106A4D3162744879DEDFFBE1BC81C886A155D050E6D9F9134B6BCFD9CA5A7E13F0553EAC9A0B
4,275,518 UART: [art] SIG.S = E4DC1EF0DF59A98B2AD0714250E373D4C6E9EC483BB57B9A063F941EDC381D47D60548AD57AF6A97CE454A897281E78B
4,299,459 UART: Caliptra RT
4,299,712 UART: [state] CFI Enabled
4,577,615 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Production
85,714 UART: [state] DebugLocked = Yes
86,462 UART: [state] Starting the WD Timer 40000000 cycles
88,045 UART: [kat] SHA2-256
893,695 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,820 UART: [kat] ++
897,972 UART: [kat] sha1
902,346 UART: [kat] SHA2-256
904,286 UART: [kat] SHA2-384
907,111 UART: [kat] SHA2-512-ACC
909,012 UART: [kat] ECC-384
918,527 UART: [kat] HMAC-384Kdf
923,109 UART: [kat] LMS
1,171,437 UART: [kat] --
1,172,052 UART: [cold-reset] ++
1,172,431 UART: [fht] FHT @ 0x50003400
1,175,036 UART: [idev] ++
1,175,204 UART: [idev] CDI.KEYID = 6
1,175,564 UART: [idev] SUBJECT.KEYID = 7
1,175,988 UART: [idev] UDS.KEYID = 0
1,176,333 ready_for_fw is high
1,176,333 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,539 UART: [idev] Erasing UDS.KEYID = 0
1,200,757 UART: [idev] Sha1 KeyId Algorithm
1,209,184 UART: [idev] --
1,210,114 UART: [ldev] ++
1,210,282 UART: [ldev] CDI.KEYID = 6
1,210,645 UART: [ldev] SUBJECT.KEYID = 5
1,211,071 UART: [ldev] AUTHORITY.KEYID = 7
1,211,534 UART: [ldev] FE.KEYID = 1
1,216,564 UART: [ldev] Erasing FE.KEYID = 1
1,243,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,046 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,740 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,612 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,318 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,377 UART: [ldev] --
1,282,680 UART: [fwproc] Wait for Commands...
1,283,356 UART: [fwproc] Recv command 0x46574c44
1,284,084 UART: [fwproc] Recv'd Img size: 114332 bytes
2,607,295 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,279 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,583 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,799,441 >>> mbox cmd response: success
2,800,494 UART: [afmc] ++
2,800,662 UART: [afmc] CDI.KEYID = 6
2,801,024 UART: [afmc] SUBJECT.KEYID = 7
2,801,449 UART: [afmc] AUTHORITY.KEYID = 5
2,837,188 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,969 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,717 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,860,435 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,330 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,037 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,997 UART: [afmc] --
2,880,968 UART: [cold-reset] --
2,881,982 UART: [state] Locking Datavault
2,883,225 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,829 UART: [state] Locking ICCM
2,884,293 UART: [exit] Launching FMC @ 0x40000130
2,889,622 UART:
2,889,638 UART: Running Caliptra FMC ...
2,890,046 UART:
2,890,189 UART: [state] CFI Enabled
2,900,742 UART: [fht] FMC Alias Private Key: 7
3,009,079 UART: [art] Extend RT PCRs Done
3,009,507 UART: [art] Lock RT PCRs Done
3,011,105 UART: [art] Populate DV Done
3,019,475 UART: [fht] FMC Alias Private Key: 7
3,020,527 UART: [art] Derive CDI
3,020,807 UART: [art] Store in in slot 0x4
3,106,782 UART: [art] Derive Key Pair
3,107,142 UART: [art] Store priv key in slot 0x5
3,120,998 UART: [art] Derive Key Pair - Done
3,135,884 UART: [art] Signing Cert with AUTHO
3,136,364 UART: RITY.KEYID = 7
3,151,778 UART: [art] Erasing AUTHORITY.KEYID = 7
3,152,543 UART: [art] PUB.X = 423FB64BD184282204B8CB1208F987EC368F40A47B45940BBAF2A12DFD80A145DA7930FDC103024937122030C424F3C6
3,159,296 UART: [art] PUB.Y = 528598F463F6C1C6A7A648AAB548546BB9858F18795B25353DB1E6C2E8487DAE50F3C418FEAA8FD904EDD691BC0D24CD
3,166,252 UART: [art] SIG.R = BBCEF313CF3318886E118D2121972021FFBF8E445A5B6D82D9C11E02F1BF20FCC6B7E5DFA920FBED2F15735BFAABD0AB
3,173,045 UART: [art] SIG.S = 6CEF34E7E173E05CABC0379C8AFFD72C01EEB92004355B62E86035632E023602D45615115A6429E27A66D2308CBFBA5A
3,196,726 UART: Caliptra RT
3,197,071 UART: [state] CFI Enabled
3,304,870 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,305,626 UART:
3,305,642 UART: Running Caliptra ROM ...
3,306,050 UART:
3,306,192 UART: [state] CFI Enabled
3,308,761 UART: [state] LifecycleState = Production
3,309,369 UART: [state] DebugLocked = Yes
3,309,935 UART: [state] Starting the WD Timer 40000000 cycles
3,311,478 UART: [kat] SHA2-256
4,117,128 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,121,253 UART: [kat] ++
4,121,405 UART: [kat] sha1
4,125,487 UART: [kat] SHA2-256
4,127,427 UART: [kat] SHA2-384
4,130,230 UART: [kat] SHA2-512-ACC
4,132,131 UART: [kat] ECC-384
4,142,300 UART: [kat] HMAC-384Kdf
4,146,816 UART: [kat] LMS
4,395,144 UART: [kat] --
4,396,062 UART: [warm-reset] ++
4,396,929 UART: [warm-reset] --
4,397,848 UART: [state] Locking Datavault
4,398,766 UART: [state] Locking PCR0, PCR1 and PCR31
4,399,370 UART: [state] Locking ICCM
4,399,950 UART: [exit] Launching FMC @ 0x40000130
4,405,279 UART:
4,405,295 UART: Running Caliptra FMC ...
4,405,703 UART:
4,405,846 UART: [state] CFI Enabled
4,407,019 UART: [aliasrt :skip pcr extension
4,407,492 UART: [art] Extend RT PCRs Done
4,407,920 UART: [art] Lock RT PCRs Done
4,409,249 UART: [art] Populate DV Done
4,417,513 UART: [fht] FMC Alias Private Key: 7
4,418,589 UART: [art] Derive CDI
4,418,869 UART: [art] Store in in slot 0x4
4,504,376 UART: [art] Derive Key Pair
4,504,736 UART: [art] Store priv key in slot 0x5
4,517,902 UART: [art] Derive Key Pair - Done
4,532,814 UART: [art] Signing Cert with AUTHO
4,533,294 UART: RITY.KEYID = 7
4,548,944 UART: [art] Erasing AUTHORITY.KEYID = 7
4,549,709 UART: [art] PUB.X = 423FB64BD184282204B8CB1208F987EC368F40A47B45940BBAF2A12DFD80A145DA7930FDC103024937122030C424F3C6
4,556,462 UART: [art] PUB.Y = 528598F463F6C1C6A7A648AAB548546BB9858F18795B25353DB1E6C2E8487DAE50F3C418FEAA8FD904EDD691BC0D24CD
4,563,418 UART: [art] SIG.R = BBCEF313CF3318886E118D2121972021FFBF8E445A5B6D82D9C11E02F1BF20FCC6B7E5DFA920FBED2F15735BFAABD0AB
4,570,211 UART: [art] SIG.S = 6CEF34E7E173E05CABC0379C8AFFD72C01EEB92004355B62E86035632E023602D45615115A6429E27A66D2308CBFBA5A
4,594,304 UART: Caliptra RT
4,594,649 UART: [state] CFI Enabled
4,876,938 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,741 ready_for_fw is high
1,060,741 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,651,530 >>> mbox cmd response: success
2,713,943 UART:
2,713,959 UART: Running Caliptra FMC ...
2,714,367 UART:
2,714,510 UART: [state] CFI Enabled
2,725,593 UART: [fht] FMC Alias Private Key: 7
2,833,344 UART: [art] Extend RT PCRs Done
2,833,772 UART: [art] Lock RT PCRs Done
2,835,362 UART: [art] Populate DV Done
2,843,454 UART: [fht] FMC Alias Private Key: 7
2,844,408 UART: [art] Derive CDI
2,844,688 UART: [art] Store in in slot 0x4
2,930,633 UART: [art] Derive Key Pair
2,930,993 UART: [art] Store priv key in slot 0x5
2,944,279 UART: [art] Derive Key Pair - Done
2,958,863 UART: [art] Signing Cert with AUTHO
2,959,343 UART: RITY.KEYID = 7
2,974,597 UART: [art] Erasing AUTHORITY.KEYID = 7
2,975,362 UART: [art] PUB.X = 048618CB49F2B696F41D0397EFEF40E46C44B05AF7AF8A0BDC327A0C6CAC3FC345CE0E4483613C44D3B1DF6EDC30F410
2,982,135 UART: [art] PUB.Y = C68D744C7FCF134200DB58E6988D2815594F281C631318F50C6030BEE746697E56EF1D716416128890AFF4A41C4DC133
2,989,054 UART: [art] SIG.R = 846DE7E3FC65AF4B9389774BCEA0CCA9B2ACE2A7CB0F14A451F8C81D546774E992BC2D692725304495C622CD5916D52A
2,995,831 UART: [art] SIG.S = 95FB3521D0E2746E03114F3196C8C42E6EEFA6B8DEC49A8314B0609DCFD1B6AF07EF9E7E0B820A32C807724B5A4D9C08
3,020,000 UART: Caliptra RT
3,020,345 UART: [state] CFI Enabled
3,128,488 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,112,337 UART:
4,112,353 UART: Running Caliptra FMC ...
4,112,761 UART:
4,112,904 UART: [state] CFI Enabled
4,114,545 UART: [aliasrt :skip pcr extension
4,115,018 UART: [art] Extend RT PCRs Done
4,115,446 UART: [art] Lock RT PCRs Done
4,116,839 UART: [art] Populate DV Done
4,125,017 UART: [fht] FMC Alias Private Key: 7
4,126,017 UART: [art] Derive CDI
4,126,297 UART: [art] Store in in slot 0x4
4,212,170 UART: [art] Derive Key Pair
4,212,530 UART: [art] Store priv key in slot 0x5
4,225,948 UART: [art] Derive Key Pair - Done
4,240,802 UART: [art] Signing Cert with AUTHO
4,241,282 UART: RITY.KEYID = 7
4,256,704 UART: [art] Erasing AUTHORITY.KEYID = 7
4,257,469 UART: [art] PUB.X = 048618CB49F2B696F41D0397EFEF40E46C44B05AF7AF8A0BDC327A0C6CAC3FC345CE0E4483613C44D3B1DF6EDC30F410
4,264,242 UART: [art] PUB.Y = C68D744C7FCF134200DB58E6988D2815594F281C631318F50C6030BEE746697E56EF1D716416128890AFF4A41C4DC133
4,271,161 UART: [art] SIG.R = 846DE7E3FC65AF4B9389774BCEA0CCA9B2ACE2A7CB0F14A451F8C81D546774E992BC2D692725304495C622CD5916D52A
4,277,938 UART: [art] SIG.S = 95FB3521D0E2746E03114F3196C8C42E6EEFA6B8DEC49A8314B0609DCFD1B6AF07EF9E7E0B820A32C807724B5A4D9C08
4,301,709 UART: Caliptra RT
4,302,054 UART: [state] CFI Enabled
4,587,829 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,613 UART: [state] LifecycleState = Production
85,221 UART: [state] DebugLocked = Yes
85,833 UART: [state] Starting the WD Timer 40000000 cycles
87,446 UART: [kat] SHA2-256
890,996 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,125 UART: [kat] ++
895,277 UART: [kat] sha1
899,537 UART: [kat] SHA2-256
901,477 UART: [kat] SHA2-384
904,314 UART: [kat] SHA2-512-ACC
906,215 UART: [kat] ECC-384
915,504 UART: [kat] HMAC-384Kdf
920,100 UART: [kat] LMS
1,168,412 UART: [kat] --
1,169,249 UART: [cold-reset] ++
1,169,678 UART: [fht] FHT @ 0x50003400
1,172,464 UART: [idev] ++
1,172,632 UART: [idev] CDI.KEYID = 6
1,172,993 UART: [idev] SUBJECT.KEYID = 7
1,173,418 UART: [idev] UDS.KEYID = 0
1,173,764 ready_for_fw is high
1,173,764 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,545 UART: [idev] Erasing UDS.KEYID = 0
1,198,380 UART: [idev] Sha1 KeyId Algorithm
1,207,231 UART: [idev] --
1,208,288 UART: [ldev] ++
1,208,456 UART: [ldev] CDI.KEYID = 6
1,208,820 UART: [ldev] SUBJECT.KEYID = 5
1,209,247 UART: [ldev] AUTHORITY.KEYID = 7
1,209,710 UART: [ldev] FE.KEYID = 1
1,215,040 UART: [ldev] Erasing FE.KEYID = 1
1,241,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,533 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,227 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,097 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,803 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,673 UART: [ldev] --
1,280,039 UART: [fwproc] Wait for Commands...
1,280,842 UART: [fwproc] Recv command 0x46574c44
1,281,575 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,980 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,289 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,082 >>> mbox cmd response: success
2,798,168 UART: [afmc] ++
2,798,336 UART: [afmc] CDI.KEYID = 6
2,798,699 UART: [afmc] SUBJECT.KEYID = 7
2,799,125 UART: [afmc] AUTHORITY.KEYID = 5
2,834,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,186 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,937 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,656 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,549 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,256 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,213 UART: [afmc] --
2,878,302 UART: [cold-reset] --
2,879,116 UART: [state] Locking Datavault
2,880,205 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,809 UART: [state] Locking ICCM
2,881,241 UART: [exit] Launching FMC @ 0x40000130
2,886,570 UART:
2,886,586 UART: Running Caliptra FMC ...
2,886,994 UART:
2,887,048 UART: [state] CFI Enabled
2,897,235 UART: [fht] FMC Alias Private Key: 7
3,004,998 UART: [art] Extend RT PCRs Done
3,005,426 UART: [art] Lock RT PCRs Done
3,006,960 UART: [art] Populate DV Done
3,015,080 UART: [fht] FMC Alias Private Key: 7
3,016,130 UART: [art] Derive CDI
3,016,410 UART: [art] Store in in slot 0x4
3,102,025 UART: [art] Derive Key Pair
3,102,385 UART: [art] Store priv key in slot 0x5
3,115,799 UART: [art] Derive Key Pair - Done
3,130,389 UART: [art] Signing Cert with AUTHO
3,130,869 UART: RITY.KEYID = 7
3,146,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,870 UART: [art] PUB.X = 45060D5A86C0EF4EE6261F84E5FD563A78BC3E301FDE46E46AF2264BA2A8690D7C4F7777A4E9B6DB22BA2C300733736F
3,153,638 UART: [art] PUB.Y = AD8AFF0F95F896560291A60C2524EA9BAC4CFE986C2D7C923BA26DD0F50D3EDBC14EC643458D80795C5A8AD534E97F33
3,160,592 UART: [art] SIG.R = F0A888E2ED638124B28ABF6D4F5E79DB8F679F2AEDB7159F02C3F53F2FC088D9D903EB4417CA99A58CFDDA2ADEEA27E6
3,167,382 UART: [art] SIG.S = C5D3CFE2A6CD9B1DAFD231771368AC0A73D41DCB553352714A3E331FE66803E40EC260057DAD3542CF86EBDD4BFA234B
3,191,029 UART: Caliptra RT
3,191,282 UART: [state] CFI Enabled
3,299,777 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,533 UART:
3,300,549 UART: Running Caliptra ROM ...
3,300,957 UART:
3,301,012 UART: [state] CFI Enabled
3,303,247 UART: [state] LifecycleState = Production
3,303,855 UART: [state] DebugLocked = Yes
3,304,501 UART: [state] Starting the WD Timer 40000000 cycles
3,306,176 UART: [kat] SHA2-256
4,109,726 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,855 UART: [kat] ++
4,114,007 UART: [kat] sha1
4,118,201 UART: [kat] SHA2-256
4,120,141 UART: [kat] SHA2-384
4,122,844 UART: [kat] SHA2-512-ACC
4,124,745 UART: [kat] ECC-384
4,134,302 UART: [kat] HMAC-384Kdf
4,138,730 UART: [kat] LMS
4,387,042 UART: [kat] --
4,387,858 UART: [warm-reset] ++
4,388,861 UART: [warm-reset] --
4,389,766 UART: [state] Locking Datavault
4,390,484 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,088 UART: [state] Locking ICCM
4,391,682 UART: [exit] Launching FMC @ 0x40000130
4,397,011 UART:
4,397,027 UART: Running Caliptra FMC ...
4,397,435 UART:
4,397,489 UART: [state] CFI Enabled
4,398,614 UART: [aliasrt :skip pcr extension
4,399,087 UART: [art] Extend RT PCRs Done
4,399,515 UART: [art] Lock RT PCRs Done
4,400,916 UART: [art] Populate DV Done
4,408,890 UART: [fht] FMC Alias Private Key: 7
4,409,820 UART: [art] Derive CDI
4,410,100 UART: [art] Store in in slot 0x4
4,495,989 UART: [art] Derive Key Pair
4,496,349 UART: [art] Store priv key in slot 0x5
4,509,611 UART: [art] Derive Key Pair - Done
4,524,349 UART: [art] Signing Cert with AUTHO
4,524,829 UART: RITY.KEYID = 7
4,540,211 UART: [art] Erasing AUTHORITY.KEYID = 7
4,540,976 UART: [art] PUB.X = 45060D5A86C0EF4EE6261F84E5FD563A78BC3E301FDE46E46AF2264BA2A8690D7C4F7777A4E9B6DB22BA2C300733736F
4,547,744 UART: [art] PUB.Y = AD8AFF0F95F896560291A60C2524EA9BAC4CFE986C2D7C923BA26DD0F50D3EDBC14EC643458D80795C5A8AD534E97F33
4,554,698 UART: [art] SIG.R = F0A888E2ED638124B28ABF6D4F5E79DB8F679F2AEDB7159F02C3F53F2FC088D9D903EB4417CA99A58CFDDA2ADEEA27E6
4,561,488 UART: [art] SIG.S = C5D3CFE2A6CD9B1DAFD231771368AC0A73D41DCB553352714A3E331FE66803E40EC260057DAD3542CF86EBDD4BFA234B
4,584,995 UART: Caliptra RT
4,585,248 UART: [state] CFI Enabled
4,868,665 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,015 ready_for_fw is high
1,056,015 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,836 >>> mbox cmd response: success
2,707,489 UART:
2,707,505 UART: Running Caliptra FMC ...
2,707,913 UART:
2,707,967 UART: [state] CFI Enabled
2,718,294 UART: [fht] FMC Alias Private Key: 7
2,826,289 UART: [art] Extend RT PCRs Done
2,826,717 UART: [art] Lock RT PCRs Done
2,828,317 UART: [art] Populate DV Done
2,836,459 UART: [fht] FMC Alias Private Key: 7
2,837,595 UART: [art] Derive CDI
2,837,875 UART: [art] Store in in slot 0x4
2,923,568 UART: [art] Derive Key Pair
2,923,928 UART: [art] Store priv key in slot 0x5
2,936,812 UART: [art] Derive Key Pair - Done
2,951,682 UART: [art] Signing Cert with AUTHO
2,952,162 UART: RITY.KEYID = 7
2,967,474 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,239 UART: [art] PUB.X = C66AC984DE0064FC623EA5A666A8947E39F8C11515BB16D4B64F3E3FC7B3A48A5B895CBA3EC92B8D0A3313A8E2B78B3E
2,975,000 UART: [art] PUB.Y = D3CF342BF05986D10AABDD2208E12E6A1A7A50EE4AEB475A2E0F22256826B4ED62F040A28C32ACB719AA587366169CD7
2,981,953 UART: [art] SIG.R = B7C6912EE46458672360F5C050413140B68E9C7CF63878063B065B9B4AC5D88864A24DDDE6BFC02117757E84F894E6C7
2,988,713 UART: [art] SIG.S = 03308D04E657C6CC054281E062B64AB72A72554964DC6F272441D3E840E242165088B0A5122D5E0B1DA9D8C4D913FBC1
3,012,880 UART: Caliptra RT
3,013,133 UART: [state] CFI Enabled
3,120,546 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,099,342 UART:
4,099,358 UART: Running Caliptra FMC ...
4,099,766 UART:
4,099,820 UART: [state] CFI Enabled
4,101,021 UART: [aliasrt :skip pcr extension
4,101,494 UART: [art] Extend RT PCRs Done
4,101,922 UART: [art] Lock RT PCRs Done
4,103,301 UART: [art] Populate DV Done
4,111,579 UART: [fht] FMC Alias Private Key: 7
4,112,745 UART: [art] Derive CDI
4,113,025 UART: [art] Store in in slot 0x4
4,198,738 UART: [art] Derive Key Pair
4,199,098 UART: [art] Store priv key in slot 0x5
4,212,192 UART: [art] Derive Key Pair - Done
4,227,198 UART: [art] Signing Cert with AUTHO
4,227,678 UART: RITY.KEYID = 7
4,242,540 UART: [art] Erasing AUTHORITY.KEYID = 7
4,243,305 UART: [art] PUB.X = C66AC984DE0064FC623EA5A666A8947E39F8C11515BB16D4B64F3E3FC7B3A48A5B895CBA3EC92B8D0A3313A8E2B78B3E
4,250,066 UART: [art] PUB.Y = D3CF342BF05986D10AABDD2208E12E6A1A7A50EE4AEB475A2E0F22256826B4ED62F040A28C32ACB719AA587366169CD7
4,257,019 UART: [art] SIG.R = B7C6912EE46458672360F5C050413140B68E9C7CF63878063B065B9B4AC5D88864A24DDDE6BFC02117757E84F894E6C7
4,263,779 UART: [art] SIG.S = 03308D04E657C6CC054281E062B64AB72A72554964DC6F272441D3E840E242165088B0A5122D5E0B1DA9D8C4D913FBC1
4,287,518 UART: Caliptra RT
4,287,771 UART: [state] CFI Enabled
4,571,552 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Production
85,548 UART: [state] DebugLocked = Yes
86,092 UART: [state] Starting the WD Timer 40000000 cycles
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,734 UART: [kat] SHA2-256
901,674 UART: [kat] SHA2-384
904,477 UART: [kat] SHA2-512-ACC
906,378 UART: [kat] ECC-384
915,927 UART: [kat] HMAC-384Kdf
920,651 UART: [kat] LMS
1,168,963 UART: [kat] --
1,169,644 UART: [cold-reset] ++
1,170,023 UART: [fht] FHT @ 0x50003400
1,172,825 UART: [idev] ++
1,172,993 UART: [idev] CDI.KEYID = 6
1,173,354 UART: [idev] SUBJECT.KEYID = 7
1,173,779 UART: [idev] UDS.KEYID = 0
1,174,125 ready_for_fw is high
1,174,125 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,696 UART: [idev] Erasing UDS.KEYID = 0
1,198,661 UART: [idev] Sha1 KeyId Algorithm
1,207,762 UART: [idev] --
1,208,809 UART: [ldev] ++
1,208,977 UART: [ldev] CDI.KEYID = 6
1,209,341 UART: [ldev] SUBJECT.KEYID = 5
1,209,768 UART: [ldev] AUTHORITY.KEYID = 7
1,210,231 UART: [ldev] FE.KEYID = 1
1,215,527 UART: [ldev] Erasing FE.KEYID = 1
1,242,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,852 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,546 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,416 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,122 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,198 UART: [ldev] --
1,281,682 UART: [fwproc] Wait for Commands...
1,282,385 UART: [fwproc] Recv command 0x46574c44
1,283,118 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,948 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,093 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,402 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,157 >>> mbox cmd response: success
2,799,209 UART: [afmc] ++
2,799,377 UART: [afmc] CDI.KEYID = 6
2,799,740 UART: [afmc] SUBJECT.KEYID = 7
2,800,166 UART: [afmc] AUTHORITY.KEYID = 5
2,836,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,580 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,299 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,192 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,899 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,772 UART: [afmc] --
2,879,651 UART: [cold-reset] --
2,880,647 UART: [state] Locking Datavault
2,881,632 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,236 UART: [state] Locking ICCM
2,882,836 UART: [exit] Launching FMC @ 0x40000130
2,888,165 UART:
2,888,181 UART: Running Caliptra FMC ...
2,888,589 UART:
2,888,732 UART: [state] CFI Enabled
2,899,253 UART: [fht] FMC Alias Private Key: 7
3,007,170 UART: [art] Extend RT PCRs Done
3,007,598 UART: [art] Lock RT PCRs Done
3,009,094 UART: [art] Populate DV Done
3,017,268 UART: [fht] FMC Alias Private Key: 7
3,018,438 UART: [art] Derive CDI
3,018,718 UART: [art] Store in in slot 0x4
3,104,307 UART: [art] Derive Key Pair
3,104,667 UART: [art] Store priv key in slot 0x5
3,117,751 UART: [art] Derive Key Pair - Done
3,132,728 UART: [art] Signing Cert with AUTHO
3,133,208 UART: RITY.KEYID = 7
3,148,324 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,089 UART: [art] PUB.X = 5C0A4BE904823E48609ECFD33FC64820EE5B6F0C1B28DE90CE8EFB240937BBAB96ED0038D87C3FCBEE24F8639E0BAF61
3,155,844 UART: [art] PUB.Y = AC57F9C84390B4F1692EC65F3137362DCA080239D3452FE6139BA81884EA6FFE673736497C0A679CA75B7B36431126E7
3,162,781 UART: [art] SIG.R = 7DD4BF58521FBEE1E4CCC8F12F2EF589DCCE978E620CA71CBAD4C00B13B9BF32263192E89C2877B51F3B9CA3FE8FA4BD
3,169,573 UART: [art] SIG.S = 7DC9A7B614F1BEEB81C8139F6E4C1BA78260B00B70F850DA05DBA769EBDC3765560B391BDF0B53D9E9386A1DF07F73D6
3,194,036 UART: Caliptra RT
3,194,381 UART: [state] CFI Enabled
3,302,549 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,305 UART:
3,303,321 UART: Running Caliptra ROM ...
3,303,729 UART:
3,303,871 UART: [state] CFI Enabled
3,306,294 UART: [state] LifecycleState = Production
3,306,902 UART: [state] DebugLocked = Yes
3,307,600 UART: [state] Starting the WD Timer 40000000 cycles
3,309,109 UART: [kat] SHA2-256
4,112,659 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,788 UART: [kat] ++
4,116,940 UART: [kat] sha1
4,121,180 UART: [kat] SHA2-256
4,123,120 UART: [kat] SHA2-384
4,126,053 UART: [kat] SHA2-512-ACC
4,127,954 UART: [kat] ECC-384
4,137,593 UART: [kat] HMAC-384Kdf
4,142,043 UART: [kat] LMS
4,390,355 UART: [kat] --
4,391,217 UART: [warm-reset] ++
4,392,458 UART: [warm-reset] --
4,393,295 UART: [state] Locking Datavault
4,394,071 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,675 UART: [state] Locking ICCM
4,395,213 UART: [exit] Launching FMC @ 0x40000130
4,400,542 UART:
4,400,558 UART: Running Caliptra FMC ...
4,400,966 UART:
4,401,109 UART: [state] CFI Enabled
4,402,750 UART: [aliasrt :skip pcr extension
4,403,223 UART: [art] Extend RT PCRs Done
4,403,651 UART: [art] Lock RT PCRs Done
4,404,866 UART: [art] Populate DV Done
4,413,122 UART: [fht] FMC Alias Private Key: 7
4,414,064 UART: [art] Derive CDI
4,414,344 UART: [art] Store in in slot 0x4
4,500,337 UART: [art] Derive Key Pair
4,500,697 UART: [art] Store priv key in slot 0x5
4,514,053 UART: [art] Derive Key Pair - Done
4,528,434 UART: [art] Signing Cert with AUTHO
4,528,914 UART: RITY.KEYID = 7
4,544,332 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,097 UART: [art] PUB.X = 5C0A4BE904823E48609ECFD33FC64820EE5B6F0C1B28DE90CE8EFB240937BBAB96ED0038D87C3FCBEE24F8639E0BAF61
4,551,852 UART: [art] PUB.Y = AC57F9C84390B4F1692EC65F3137362DCA080239D3452FE6139BA81884EA6FFE673736497C0A679CA75B7B36431126E7
4,558,789 UART: [art] SIG.R = 7DD4BF58521FBEE1E4CCC8F12F2EF589DCCE978E620CA71CBAD4C00B13B9BF32263192E89C2877B51F3B9CA3FE8FA4BD
4,565,581 UART: [art] SIG.S = 7DC9A7B614F1BEEB81C8139F6E4C1BA78260B00B70F850DA05DBA769EBDC3765560B391BDF0B53D9E9386A1DF07F73D6
4,589,836 UART: Caliptra RT
4,590,181 UART: [state] CFI Enabled
4,870,487 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,110 ready_for_fw is high
1,056,110 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,931 >>> mbox cmd response: success
2,711,610 UART:
2,711,626 UART: Running Caliptra FMC ...
2,712,034 UART:
2,712,177 UART: [state] CFI Enabled
2,722,658 UART: [fht] FMC Alias Private Key: 7
2,830,401 UART: [art] Extend RT PCRs Done
2,830,829 UART: [art] Lock RT PCRs Done
2,832,341 UART: [art] Populate DV Done
2,840,529 UART: [fht] FMC Alias Private Key: 7
2,841,485 UART: [art] Derive CDI
2,841,765 UART: [art] Store in in slot 0x4
2,927,688 UART: [art] Derive Key Pair
2,928,048 UART: [art] Store priv key in slot 0x5
2,941,706 UART: [art] Derive Key Pair - Done
2,956,375 UART: [art] Signing Cert with AUTHO
2,956,855 UART: RITY.KEYID = 7
2,972,337 UART: [art] Erasing AUTHORITY.KEYID = 7
2,973,102 UART: [art] PUB.X = CF40863DBD8DAF3A7E3A0B7F629B3A01119DB1262D0B05656F6454AE24916A660DE7194AA0AB72136BBA4F3BEAE23BD9
2,979,873 UART: [art] PUB.Y = C0ADFDB7A58E20628686264996093AA29E4B63D28B4F13567F5E420DDA447C72DBC87FC79255D89F7859EAF2CDBB2AE2
2,986,829 UART: [art] SIG.R = 739AE930CD4FE530D4D597AC30B6B63F3B31056DAE580D1D35207FE06D635551D32E49B3088FFCF772CFFF0137CF2B8B
2,993,599 UART: [art] SIG.S = D2D06BE0D099AEE5296C87873B9BC87B80EB6454135E5AEEC8C56AFAEB1217160A632AECE2D9EFF6B4CA675C4E785D7D
3,017,529 UART: Caliptra RT
3,017,874 UART: [state] CFI Enabled
3,125,831 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,104,612 UART:
4,104,628 UART: Running Caliptra FMC ...
4,105,036 UART:
4,105,179 UART: [state] CFI Enabled
4,106,370 UART: [aliasrt :skip pcr extension
4,106,843 UART: [art] Extend RT PCRs Done
4,107,271 UART: [art] Lock RT PCRs Done
4,108,482 UART: [art] Populate DV Done
4,116,622 UART: [fht] FMC Alias Private Key: 7
4,117,696 UART: [art] Derive CDI
4,117,976 UART: [art] Store in in slot 0x4
4,203,717 UART: [art] Derive Key Pair
4,204,077 UART: [art] Store priv key in slot 0x5
4,217,277 UART: [art] Derive Key Pair - Done
4,232,082 UART: [art] Signing Cert with AUTHO
4,232,562 UART: RITY.KEYID = 7
4,247,376 UART: [art] Erasing AUTHORITY.KEYID = 7
4,248,141 UART: [art] PUB.X = CF40863DBD8DAF3A7E3A0B7F629B3A01119DB1262D0B05656F6454AE24916A660DE7194AA0AB72136BBA4F3BEAE23BD9
4,254,912 UART: [art] PUB.Y = C0ADFDB7A58E20628686264996093AA29E4B63D28B4F13567F5E420DDA447C72DBC87FC79255D89F7859EAF2CDBB2AE2
4,261,868 UART: [art] SIG.R = 739AE930CD4FE530D4D597AC30B6B63F3B31056DAE580D1D35207FE06D635551D32E49B3088FFCF772CFFF0137CF2B8B
4,268,638 UART: [art] SIG.S = D2D06BE0D099AEE5296C87873B9BC87B80EB6454135E5AEEC8C56AFAEB1217160A632AECE2D9EFF6B4CA675C4E785D7D
4,292,216 UART: Caliptra RT
4,292,561 UART: [state] CFI Enabled
4,574,856 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,903 UART: [state] LifecycleState = Production
85,511 UART: [state] DebugLocked = Yes
86,243 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,805 UART: [kat] SHA2-256
881,736 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,851 UART: [kat] ++
886,003 UART: [kat] sha1
890,219 UART: [kat] SHA2-256
892,157 UART: [kat] SHA2-384
894,746 UART: [kat] SHA2-512-ACC
896,647 UART: [kat] ECC-384
902,114 UART: [kat] HMAC-384Kdf
906,874 UART: [kat] LMS
1,475,070 UART: [kat] --
1,475,737 UART: [cold-reset] ++
1,476,232 UART: [fht] Storing FHT @ 0x50003400
1,478,989 UART: [idev] ++
1,479,157 UART: [idev] CDI.KEYID = 6
1,479,517 UART: [idev] SUBJECT.KEYID = 7
1,479,941 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,480,382 UART:
1,480,398 UART: Running Caliptra ROM ...
1,480,806 UART:
1,480,860 UART: [state] CFI Enabled
1,483,457 UART: [state] LifecycleState = Production
1,484,065 UART: [state] DebugLocked = Yes
1,484,741 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,486,451 UART: [kat] SHA2-256
2,280,382 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,284,497 UART: [kat] ++
2,284,649 UART: [kat] sha1
2,289,039 UART: [kat] SHA2-256
2,290,977 UART: [kat] SHA2-384
2,293,542 UART: [kat] SHA2-512-ACC
2,295,443 UART: [kat] ECC-384
2,301,104 UART: [kat] HMAC-384Kdf
2,305,622 UART: [kat] LMS
2,873,818 UART: [kat] --
2,874,788 UART: [warm-reset] ++
2,875,059 UART: [warm-reset] Previous Cold-Reset was not successful.
2,876,272 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Production
85,906 UART: [state] DebugLocked = Yes
86,420 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,978 UART: [kat] SHA2-256
881,909 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,024 UART: [kat] ++
886,176 UART: [kat] sha1
890,486 UART: [kat] SHA2-256
892,424 UART: [kat] SHA2-384
895,133 UART: [kat] SHA2-512-ACC
897,034 UART: [kat] ECC-384
902,751 UART: [kat] HMAC-384Kdf
907,419 UART: [kat] LMS
1,475,615 UART: [kat] --
1,476,504 UART: [cold-reset] ++
1,476,907 UART: [fht] Storing FHT @ 0x50003400
1,479,758 UART: [idev] ++
1,479,926 UART: [idev] CDI.KEYID = 6
1,480,286 UART: [idev] SUBJECT.KEYID = 7
1,480,710 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,481,151 UART:
1,481,167 UART: Running Caliptra ROM ...
1,481,575 UART:
1,481,716 UART: [state] CFI Enabled
1,484,609 UART: [state] LifecycleState = Production
1,485,217 UART: [state] DebugLocked = Yes
1,485,963 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,487,631 UART: [kat] SHA2-256
2,281,562 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,285,677 UART: [kat] ++
2,285,829 UART: [kat] sha1
2,290,211 UART: [kat] SHA2-256
2,292,149 UART: [kat] SHA2-384
2,294,978 UART: [kat] SHA2-512-ACC
2,296,879 UART: [kat] ECC-384
2,302,562 UART: [kat] HMAC-384Kdf
2,307,158 UART: [kat] LMS
2,875,354 UART: [kat] --
2,876,314 UART: [warm-reset] ++
2,876,585 UART: [warm-reset] Previous Cold-Reset was not successful.
2,877,944 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Production
85,887 UART: [state] DebugLocked = Yes
86,605 UART: [state] Starting the WD Timer 40000000 cycles
88,118 UART: [kat] SHA2-256
893,768 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,893 UART: [kat] ++
898,045 UART: [kat] sha1
902,169 UART: [kat] SHA2-256
904,109 UART: [kat] SHA2-384
906,716 UART: [kat] SHA2-512-ACC
908,617 UART: [kat] ECC-384
918,596 UART: [kat] HMAC-384Kdf
923,248 UART: [kat] LMS
1,171,576 UART: [kat] --
1,172,337 UART: [cold-reset] ++
1,172,816 UART: [fht] FHT @ 0x50003400
1,175,603 UART: [idev] ++
1,175,771 UART: [idev] CDI.KEYID = 6
1,176,131 UART: [idev] SUBJECT.KEYID = 7
1,176,555 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,176,993 UART:
1,177,009 UART: Running Caliptra ROM ...
1,177,417 UART:
1,177,472 UART: [state] CFI Enabled
1,180,833 UART: [state] LifecycleState = Production
1,181,441 UART: [state] DebugLocked = Yes
1,182,055 UART: [state] Starting the WD Timer 40000000 cycles
1,183,612 UART: [kat] SHA2-256
1,989,262 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,993,387 UART: [kat] ++
1,993,539 UART: [kat] sha1
1,997,899 UART: [kat] SHA2-256
1,999,839 UART: [kat] SHA2-384
2,002,526 UART: [kat] SHA2-512-ACC
2,004,427 UART: [kat] ECC-384
2,013,734 UART: [kat] HMAC-384Kdf
2,018,326 UART: [kat] LMS
2,266,654 UART: [kat] --
2,267,726 UART: [warm-reset] ++
2,267,997 UART: [warm-reset] Prev Cold-Reset failed
2,269,058 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,474 UART: [state] LifecycleState = Production
86,082 UART: [state] DebugLocked = Yes
86,844 UART: [state] Starting the WD Timer 40000000 cycles
88,391 UART: [kat] SHA2-256
894,041 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,166 UART: [kat] ++
898,318 UART: [kat] sha1
902,468 UART: [kat] SHA2-256
904,408 UART: [kat] SHA2-384
907,189 UART: [kat] SHA2-512-ACC
909,090 UART: [kat] ECC-384
919,217 UART: [kat] HMAC-384Kdf
923,823 UART: [kat] LMS
1,172,151 UART: [kat] --
1,172,990 UART: [cold-reset] ++
1,173,487 UART: [fht] FHT @ 0x50003400
1,176,180 UART: [idev] ++
1,176,348 UART: [idev] CDI.KEYID = 6
1,176,708 UART: [idev] SUBJECT.KEYID = 7
1,177,132 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,177,570 UART:
1,177,586 UART: Running Caliptra ROM ...
1,177,994 UART:
1,178,136 UART: [state] CFI Enabled
1,180,847 UART: [state] LifecycleState = Production
1,181,455 UART: [state] DebugLocked = Yes
1,182,183 UART: [state] Starting the WD Timer 40000000 cycles
1,183,874 UART: [kat] SHA2-256
1,989,524 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,993,649 UART: [kat] ++
1,993,801 UART: [kat] sha1
1,997,889 UART: [kat] SHA2-256
1,999,829 UART: [kat] SHA2-384
2,002,676 UART: [kat] SHA2-512-ACC
2,004,577 UART: [kat] ECC-384
2,014,302 UART: [kat] HMAC-384Kdf
2,018,816 UART: [kat] LMS
2,267,144 UART: [kat] --
2,267,944 UART: [warm-reset] ++
2,268,215 UART: [warm-reset] Prev Cold-Reset failed
2,269,074 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,993 UART: [state] LifecycleState = Production
85,601 UART: [state] DebugLocked = Yes
86,253 UART: [state] Starting the WD Timer 40000000 cycles
87,838 UART: [kat] SHA2-256
891,388 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,517 UART: [kat] ++
895,669 UART: [kat] sha1
899,909 UART: [kat] SHA2-256
901,849 UART: [kat] SHA2-384
904,460 UART: [kat] SHA2-512-ACC
906,361 UART: [kat] ECC-384
915,948 UART: [kat] HMAC-384Kdf
920,620 UART: [kat] LMS
1,168,932 UART: [kat] --
1,169,971 UART: [cold-reset] ++
1,170,390 UART: [fht] FHT @ 0x50003400
1,172,986 UART: [idev] ++
1,173,154 UART: [idev] CDI.KEYID = 6
1,173,515 UART: [idev] SUBJECT.KEYID = 7
1,173,940 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,174,379 UART:
1,174,395 UART: Running Caliptra ROM ...
1,174,803 UART:
1,174,858 UART: [state] CFI Enabled
1,176,839 UART: [state] LifecycleState = Production
1,177,447 UART: [state] DebugLocked = Yes
1,177,987 UART: [state] Starting the WD Timer 40000000 cycles
1,179,490 UART: [kat] SHA2-256
1,983,040 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,987,169 UART: [kat] ++
1,987,321 UART: [kat] sha1
1,991,459 UART: [kat] SHA2-256
1,993,399 UART: [kat] SHA2-384
1,996,296 UART: [kat] SHA2-512-ACC
1,998,197 UART: [kat] ECC-384
2,007,484 UART: [kat] HMAC-384Kdf
2,011,978 UART: [kat] LMS
2,260,290 UART: [kat] --
2,261,390 UART: [warm-reset] ++
2,261,658 UART: [warm-reset] Prev Cold-Reset failed
2,262,647 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,752 UART: [state] LifecycleState = Production
86,360 UART: [state] DebugLocked = Yes
86,954 UART: [state] Starting the WD Timer 40000000 cycles
88,649 UART: [kat] SHA2-256
892,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,328 UART: [kat] ++
896,480 UART: [kat] sha1
900,664 UART: [kat] SHA2-256
902,604 UART: [kat] SHA2-384
905,137 UART: [kat] SHA2-512-ACC
907,038 UART: [kat] ECC-384
916,643 UART: [kat] HMAC-384Kdf
921,127 UART: [kat] LMS
1,169,439 UART: [kat] --
1,170,166 UART: [cold-reset] ++
1,170,597 UART: [fht] FHT @ 0x50003400
1,173,251 UART: [idev] ++
1,173,419 UART: [idev] CDI.KEYID = 6
1,173,780 UART: [idev] SUBJECT.KEYID = 7
1,174,205 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,174,644 UART:
1,174,660 UART: Running Caliptra ROM ...
1,175,068 UART:
1,175,210 UART: [state] CFI Enabled
1,178,333 UART: [state] LifecycleState = Production
1,178,941 UART: [state] DebugLocked = Yes
1,179,547 UART: [state] Starting the WD Timer 40000000 cycles
1,181,066 UART: [kat] SHA2-256
1,984,616 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,745 UART: [kat] ++
1,988,897 UART: [kat] sha1
1,993,095 UART: [kat] SHA2-256
1,995,035 UART: [kat] SHA2-384
1,997,780 UART: [kat] SHA2-512-ACC
1,999,681 UART: [kat] ECC-384
2,009,152 UART: [kat] HMAC-384Kdf
2,013,566 UART: [kat] LMS
2,261,878 UART: [kat] --
2,262,704 UART: [warm-reset] ++
2,262,972 UART: [warm-reset] Prev Cold-Reset failed
2,263,885 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,646 UART: [state] LifecycleState = Unprovisioned
85,301 UART: [state] DebugLocked = No
85,839 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,411 UART: [kat] SHA2-256
881,342 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,457 UART: [kat] ++
885,609 UART: [kat] sha1
889,969 UART: [kat] SHA2-256
891,907 UART: [kat] SHA2-384
894,750 UART: [kat] SHA2-512-ACC
896,651 UART: [kat] ECC-384
902,424 UART: [kat] HMAC-384Kdf
907,108 UART: [kat] LMS
1,475,304 UART: [kat] --
1,476,215 UART: [cold-reset] ++
1,476,615 UART: [fht] Storing FHT @ 0x50003400
1,479,486 UART: [idev] ++
1,479,654 UART: [idev] CDI.KEYID = 6
1,480,014 UART: [idev] SUBJECT.KEYID = 7
1,480,438 UART: [idev] UDS.KEYID = 0
1,480,783 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,746 UART: [idev] Erasing UDS.KEYID = 0
1,505,254 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,784 UART: [idev] --
1,514,773 UART: [ldev] ++
1,514,941 UART: [ldev] CDI.KEYID = 6
1,515,304 UART: [ldev] SUBJECT.KEYID = 5
1,515,730 UART: [ldev] AUTHORITY.KEYID = 7
1,516,193 UART: [ldev] FE.KEYID = 1
1,521,359 UART: [ldev] Erasing FE.KEYID = 1
1,546,346 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,546 UART: [ldev] --
1,586,053 UART: [fwproc] Waiting for Commands...
1,586,874 UART: [fwproc] Received command 0x46574c44
1,587,665 UART: [fwproc] Received Image of size 114332 bytes
2,884,321 UART: ROM Fatal Error: 0x000B0016
2,885,478 >>> mbox cmd response: failed
2,885,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,484 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,853 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,738,013 >>> mbox cmd response: failed
2,738,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,019 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,910 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,596 UART: [kat] SHA2-256
882,527 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,642 UART: [kat] ++
886,794 UART: [kat] sha1
891,030 UART: [kat] SHA2-256
892,968 UART: [kat] SHA2-384
895,627 UART: [kat] SHA2-512-ACC
897,528 UART: [kat] ECC-384
903,187 UART: [kat] HMAC-384Kdf
907,893 UART: [kat] LMS
1,476,089 UART: [kat] --
1,476,812 UART: [cold-reset] ++
1,477,234 UART: [fht] Storing FHT @ 0x50003400
1,480,005 UART: [idev] ++
1,480,173 UART: [idev] CDI.KEYID = 6
1,480,533 UART: [idev] SUBJECT.KEYID = 7
1,480,957 UART: [idev] UDS.KEYID = 0
1,481,302 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,207 UART: [idev] Erasing UDS.KEYID = 0
1,505,791 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,559 UART: [idev] --
1,515,636 UART: [ldev] ++
1,515,804 UART: [ldev] CDI.KEYID = 6
1,516,167 UART: [ldev] SUBJECT.KEYID = 5
1,516,593 UART: [ldev] AUTHORITY.KEYID = 7
1,517,056 UART: [ldev] FE.KEYID = 1
1,522,188 UART: [ldev] Erasing FE.KEYID = 1
1,548,111 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,007 UART: [ldev] --
1,587,440 UART: [fwproc] Waiting for Commands...
1,588,103 UART: [fwproc] Received command 0x46574c44
1,588,894 UART: [fwproc] Received Image of size 114332 bytes
2,885,064 UART: ROM Fatal Error: 0x000B0016
2,886,221 >>> mbox cmd response: failed
2,886,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,227 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,412 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,738,284 >>> mbox cmd response: failed
2,738,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,290 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
893,254 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,379 UART: [kat] ++
897,531 UART: [kat] sha1
901,799 UART: [kat] SHA2-256
903,739 UART: [kat] SHA2-384
906,710 UART: [kat] SHA2-512-ACC
908,611 UART: [kat] ECC-384
918,558 UART: [kat] HMAC-384Kdf
923,304 UART: [kat] LMS
1,171,632 UART: [kat] --
1,172,487 UART: [cold-reset] ++
1,173,061 UART: [fht] FHT @ 0x50003400
1,175,924 UART: [idev] ++
1,176,092 UART: [idev] CDI.KEYID = 6
1,176,452 UART: [idev] SUBJECT.KEYID = 7
1,176,876 UART: [idev] UDS.KEYID = 0
1,177,221 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,984 UART: [idev] Erasing UDS.KEYID = 0
1,202,639 UART: [idev] Sha1 KeyId Algorithm
1,211,111 UART: [idev] --
1,212,195 UART: [ldev] ++
1,212,363 UART: [ldev] CDI.KEYID = 6
1,212,726 UART: [ldev] SUBJECT.KEYID = 5
1,213,152 UART: [ldev] AUTHORITY.KEYID = 7
1,213,615 UART: [ldev] FE.KEYID = 1
1,218,777 UART: [ldev] Erasing FE.KEYID = 1
1,244,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,315 UART: [ldev] --
1,283,604 UART: [fwproc] Wait for Commands...
1,284,270 UART: [fwproc] Recv command 0x46574c44
1,284,998 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,202 UART: ROM Fatal Error: 0x000B0016
2,583,359 >>> mbox cmd response: failed
2,583,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,365 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,433 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,436,690 >>> mbox cmd response: failed
2,436,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,696 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
893,395 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,520 UART: [kat] ++
897,672 UART: [kat] sha1
901,918 UART: [kat] SHA2-256
903,858 UART: [kat] SHA2-384
906,405 UART: [kat] SHA2-512-ACC
908,306 UART: [kat] ECC-384
918,401 UART: [kat] HMAC-384Kdf
923,047 UART: [kat] LMS
1,171,375 UART: [kat] --
1,172,390 UART: [cold-reset] ++
1,172,752 UART: [fht] FHT @ 0x50003400
1,175,509 UART: [idev] ++
1,175,677 UART: [idev] CDI.KEYID = 6
1,176,037 UART: [idev] SUBJECT.KEYID = 7
1,176,461 UART: [idev] UDS.KEYID = 0
1,176,806 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,357 UART: [idev] Erasing UDS.KEYID = 0
1,201,854 UART: [idev] Sha1 KeyId Algorithm
1,210,244 UART: [idev] --
1,211,072 UART: [ldev] ++
1,211,240 UART: [ldev] CDI.KEYID = 6
1,211,603 UART: [ldev] SUBJECT.KEYID = 5
1,212,029 UART: [ldev] AUTHORITY.KEYID = 7
1,212,492 UART: [ldev] FE.KEYID = 1
1,217,792 UART: [ldev] Erasing FE.KEYID = 1
1,244,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,442 UART: [ldev] --
1,283,805 UART: [fwproc] Wait for Commands...
1,284,421 UART: [fwproc] Recv command 0x46574c44
1,285,149 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,791 UART: ROM Fatal Error: 0x000B0016
2,582,948 >>> mbox cmd response: failed
2,582,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,954 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,904 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,436,347 >>> mbox cmd response: failed
2,436,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,353 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
891,444 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,573 UART: [kat] ++
895,725 UART: [kat] sha1
900,019 UART: [kat] SHA2-256
901,959 UART: [kat] SHA2-384
904,838 UART: [kat] SHA2-512-ACC
906,739 UART: [kat] ECC-384
916,434 UART: [kat] HMAC-384Kdf
920,984 UART: [kat] LMS
1,169,296 UART: [kat] --
1,170,467 UART: [cold-reset] ++
1,170,795 UART: [fht] FHT @ 0x50003400
1,173,393 UART: [idev] ++
1,173,561 UART: [idev] CDI.KEYID = 6
1,173,922 UART: [idev] SUBJECT.KEYID = 7
1,174,347 UART: [idev] UDS.KEYID = 0
1,174,693 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,513 UART: [idev] Erasing UDS.KEYID = 0
1,199,439 UART: [idev] Sha1 KeyId Algorithm
1,208,333 UART: [idev] --
1,209,428 UART: [ldev] ++
1,209,596 UART: [ldev] CDI.KEYID = 6
1,209,960 UART: [ldev] SUBJECT.KEYID = 5
1,210,387 UART: [ldev] AUTHORITY.KEYID = 7
1,210,850 UART: [ldev] FE.KEYID = 1
1,215,964 UART: [ldev] Erasing FE.KEYID = 1
1,242,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,308 UART: [ldev] --
1,281,814 UART: [fwproc] Wait for Commands...
1,282,513 UART: [fwproc] Recv command 0x46574c44
1,283,246 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,848 UART: ROM Fatal Error: 0x000B0016
2,581,005 >>> mbox cmd response: failed
2,581,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,011 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,902 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,648 >>> mbox cmd response: failed
2,431,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,654 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
899,934 UART: [kat] SHA2-256
901,874 UART: [kat] SHA2-384
904,675 UART: [kat] SHA2-512-ACC
906,576 UART: [kat] ECC-384
916,339 UART: [kat] HMAC-384Kdf
921,165 UART: [kat] LMS
1,169,477 UART: [kat] --
1,170,314 UART: [cold-reset] ++
1,170,698 UART: [fht] FHT @ 0x50003400
1,173,278 UART: [idev] ++
1,173,446 UART: [idev] CDI.KEYID = 6
1,173,807 UART: [idev] SUBJECT.KEYID = 7
1,174,232 UART: [idev] UDS.KEYID = 0
1,174,578 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,156 UART: [idev] Erasing UDS.KEYID = 0
1,199,202 UART: [idev] Sha1 KeyId Algorithm
1,208,098 UART: [idev] --
1,209,253 UART: [ldev] ++
1,209,421 UART: [ldev] CDI.KEYID = 6
1,209,785 UART: [ldev] SUBJECT.KEYID = 5
1,210,212 UART: [ldev] AUTHORITY.KEYID = 7
1,210,675 UART: [ldev] FE.KEYID = 1
1,216,093 UART: [ldev] Erasing FE.KEYID = 1
1,242,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,483 UART: [ldev] --
1,280,901 UART: [fwproc] Wait for Commands...
1,281,532 UART: [fwproc] Recv command 0x46574c44
1,282,265 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,843 UART: ROM Fatal Error: 0x000B0016
2,579,000 >>> mbox cmd response: failed
2,579,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,006 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,467 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,077 >>> mbox cmd response: failed
2,432,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,083 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Production
85,693 UART: [state] DebugLocked = No
86,195 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,683 UART: [kat] SHA2-256
881,614 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,729 UART: [kat] ++
885,881 UART: [kat] sha1
890,197 UART: [kat] SHA2-256
892,135 UART: [kat] SHA2-384
895,056 UART: [kat] SHA2-512-ACC
896,957 UART: [kat] ECC-384
902,706 UART: [kat] HMAC-384Kdf
907,314 UART: [kat] LMS
1,475,510 UART: [kat] --
1,476,443 UART: [cold-reset] ++
1,476,831 UART: [fht] Storing FHT @ 0x50003400
1,479,582 UART: [idev] ++
1,479,750 UART: [idev] CDI.KEYID = 6
1,480,110 UART: [idev] SUBJECT.KEYID = 7
1,480,534 UART: [idev] UDS.KEYID = 0
1,480,879 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,418 UART: [idev] Erasing UDS.KEYID = 0
1,504,770 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,392 UART: [idev] --
1,514,345 UART: [ldev] ++
1,514,513 UART: [ldev] CDI.KEYID = 6
1,514,876 UART: [ldev] SUBJECT.KEYID = 5
1,515,302 UART: [ldev] AUTHORITY.KEYID = 7
1,515,765 UART: [ldev] FE.KEYID = 1
1,520,945 UART: [ldev] Erasing FE.KEYID = 1
1,546,448 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,708 UART: [ldev] --
1,585,149 UART: [fwproc] Waiting for Commands...
1,585,962 UART: [fwproc] Received command 0x46574c44
1,586,753 UART: [fwproc] Received Image of size 114332 bytes
1,636,252 UART: ROM Fatal Error: 0x000B0007
1,637,409 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,679 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,786 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Production
85,766 UART: [state] DebugLocked = No
86,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,964 UART: [kat] SHA2-256
881,895 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,010 UART: [kat] ++
886,162 UART: [kat] sha1
890,438 UART: [kat] SHA2-256
892,376 UART: [kat] SHA2-384
895,073 UART: [kat] SHA2-512-ACC
896,974 UART: [kat] ECC-384
902,415 UART: [kat] HMAC-384Kdf
907,127 UART: [kat] LMS
1,475,323 UART: [kat] --
1,476,038 UART: [cold-reset] ++
1,476,478 UART: [fht] Storing FHT @ 0x50003400
1,479,051 UART: [idev] ++
1,479,219 UART: [idev] CDI.KEYID = 6
1,479,579 UART: [idev] SUBJECT.KEYID = 7
1,480,003 UART: [idev] UDS.KEYID = 0
1,480,348 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,293 UART: [idev] Erasing UDS.KEYID = 0
1,504,923 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,515 UART: [idev] --
1,514,492 UART: [ldev] ++
1,514,660 UART: [ldev] CDI.KEYID = 6
1,515,023 UART: [ldev] SUBJECT.KEYID = 5
1,515,449 UART: [ldev] AUTHORITY.KEYID = 7
1,515,912 UART: [ldev] FE.KEYID = 1
1,521,532 UART: [ldev] Erasing FE.KEYID = 1
1,546,953 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,883 UART: [ldev] --
1,586,374 UART: [fwproc] Waiting for Commands...
1,586,989 UART: [fwproc] Received command 0x46574c44
1,587,780 UART: [fwproc] Received Image of size 114332 bytes
1,637,159 UART: ROM Fatal Error: 0x000B0007
1,638,316 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,134 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,491,473 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,628 UART: [state] LifecycleState = Production
85,235 UART: [state] DebugLocked = No
85,721 UART: [state] WD Timer not started. Device not locked for debugging
87,054 UART: [kat] SHA2-256
892,704 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,829 UART: [kat] ++
896,981 UART: [kat] sha1
901,089 UART: [kat] SHA2-256
903,029 UART: [kat] SHA2-384
905,718 UART: [kat] SHA2-512-ACC
907,619 UART: [kat] ECC-384
917,494 UART: [kat] HMAC-384Kdf
922,260 UART: [kat] LMS
1,170,588 UART: [kat] --
1,171,691 UART: [cold-reset] ++
1,172,239 UART: [fht] FHT @ 0x50003400
1,174,940 UART: [idev] ++
1,175,108 UART: [idev] CDI.KEYID = 6
1,175,468 UART: [idev] SUBJECT.KEYID = 7
1,175,892 UART: [idev] UDS.KEYID = 0
1,176,237 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,212 UART: [idev] Erasing UDS.KEYID = 0
1,201,215 UART: [idev] Sha1 KeyId Algorithm
1,209,779 UART: [idev] --
1,210,855 UART: [ldev] ++
1,211,023 UART: [ldev] CDI.KEYID = 6
1,211,386 UART: [ldev] SUBJECT.KEYID = 5
1,211,812 UART: [ldev] AUTHORITY.KEYID = 7
1,212,275 UART: [ldev] FE.KEYID = 1
1,217,385 UART: [ldev] Erasing FE.KEYID = 1
1,243,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,563 UART: [ldev] --
1,283,068 UART: [fwproc] Wait for Commands...
1,283,876 UART: [fwproc] Recv command 0x46574c44
1,284,604 UART: [fwproc] Recv'd Img size: 114332 bytes
1,333,953 UART: ROM Fatal Error: 0x000B0007
1,335,110 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,703 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,188,329 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Production
85,790 UART: [state] DebugLocked = No
86,310 UART: [state] WD Timer not started. Device not locked for debugging
87,547 UART: [kat] SHA2-256
893,197 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,322 UART: [kat] ++
897,474 UART: [kat] sha1
901,678 UART: [kat] SHA2-256
903,618 UART: [kat] SHA2-384
906,365 UART: [kat] SHA2-512-ACC
908,266 UART: [kat] ECC-384
918,401 UART: [kat] HMAC-384Kdf
922,997 UART: [kat] LMS
1,171,325 UART: [kat] --
1,172,180 UART: [cold-reset] ++
1,172,676 UART: [fht] FHT @ 0x50003400
1,175,221 UART: [idev] ++
1,175,389 UART: [idev] CDI.KEYID = 6
1,175,749 UART: [idev] SUBJECT.KEYID = 7
1,176,173 UART: [idev] UDS.KEYID = 0
1,176,518 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,871 UART: [idev] Erasing UDS.KEYID = 0
1,201,154 UART: [idev] Sha1 KeyId Algorithm
1,209,804 UART: [idev] --
1,210,860 UART: [ldev] ++
1,211,028 UART: [ldev] CDI.KEYID = 6
1,211,391 UART: [ldev] SUBJECT.KEYID = 5
1,211,817 UART: [ldev] AUTHORITY.KEYID = 7
1,212,280 UART: [ldev] FE.KEYID = 1
1,217,686 UART: [ldev] Erasing FE.KEYID = 1
1,244,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,138 UART: [ldev] --
1,283,429 UART: [fwproc] Wait for Commands...
1,284,161 UART: [fwproc] Recv command 0x46574c44
1,284,889 UART: [fwproc] Recv'd Img size: 114332 bytes
1,334,058 UART: ROM Fatal Error: 0x000B0007
1,335,215 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,940 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,189,650 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Production
85,633 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
891,010 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,139 UART: [kat] ++
895,291 UART: [kat] sha1
899,695 UART: [kat] SHA2-256
901,635 UART: [kat] SHA2-384
904,270 UART: [kat] SHA2-512-ACC
906,171 UART: [kat] ECC-384
915,930 UART: [kat] HMAC-384Kdf
920,386 UART: [kat] LMS
1,168,698 UART: [kat] --
1,169,851 UART: [cold-reset] ++
1,170,323 UART: [fht] FHT @ 0x50003400
1,172,983 UART: [idev] ++
1,173,151 UART: [idev] CDI.KEYID = 6
1,173,512 UART: [idev] SUBJECT.KEYID = 7
1,173,937 UART: [idev] UDS.KEYID = 0
1,174,283 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,777 UART: [idev] Erasing UDS.KEYID = 0
1,198,775 UART: [idev] Sha1 KeyId Algorithm
1,207,715 UART: [idev] --
1,208,810 UART: [ldev] ++
1,208,978 UART: [ldev] CDI.KEYID = 6
1,209,342 UART: [ldev] SUBJECT.KEYID = 5
1,209,769 UART: [ldev] AUTHORITY.KEYID = 7
1,210,232 UART: [ldev] FE.KEYID = 1
1,215,468 UART: [ldev] Erasing FE.KEYID = 1
1,241,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,420 UART: [ldev] --
1,280,690 UART: [fwproc] Wait for Commands...
1,281,317 UART: [fwproc] Recv command 0x46574c44
1,282,050 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,995 UART: ROM Fatal Error: 0x000B0007
1,332,152 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,080 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,605 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Production
85,912 UART: [state] DebugLocked = No
86,568 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,836 UART: [kat] SHA2-256
901,776 UART: [kat] SHA2-384
904,685 UART: [kat] SHA2-512-ACC
906,586 UART: [kat] ECC-384
916,317 UART: [kat] HMAC-384Kdf
920,793 UART: [kat] LMS
1,169,105 UART: [kat] --
1,170,124 UART: [cold-reset] ++
1,170,684 UART: [fht] FHT @ 0x50003400
1,173,370 UART: [idev] ++
1,173,538 UART: [idev] CDI.KEYID = 6
1,173,899 UART: [idev] SUBJECT.KEYID = 7
1,174,324 UART: [idev] UDS.KEYID = 0
1,174,670 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,118 UART: [idev] Erasing UDS.KEYID = 0
1,199,146 UART: [idev] Sha1 KeyId Algorithm
1,208,052 UART: [idev] --
1,209,111 UART: [ldev] ++
1,209,279 UART: [ldev] CDI.KEYID = 6
1,209,643 UART: [ldev] SUBJECT.KEYID = 5
1,210,070 UART: [ldev] AUTHORITY.KEYID = 7
1,210,533 UART: [ldev] FE.KEYID = 1
1,215,929 UART: [ldev] Erasing FE.KEYID = 1
1,242,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,561 UART: [ldev] --
1,282,013 UART: [fwproc] Wait for Commands...
1,282,696 UART: [fwproc] Recv command 0x46574c44
1,283,429 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,938 UART: ROM Fatal Error: 0x000B0007
1,333,095 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,493 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,278 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Production
85,547 UART: [state] DebugLocked = No
86,051 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,713 UART: [kat] SHA2-256
881,644 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,759 UART: [kat] ++
885,911 UART: [kat] sha1
890,097 UART: [kat] SHA2-256
892,035 UART: [kat] SHA2-384
894,736 UART: [kat] SHA2-512-ACC
896,637 UART: [kat] ECC-384
902,170 UART: [kat] HMAC-384Kdf
906,954 UART: [kat] LMS
1,475,150 UART: [kat] --
1,475,861 UART: [cold-reset] ++
1,476,257 UART: [fht] Storing FHT @ 0x50003400
1,479,096 UART: [idev] ++
1,479,264 UART: [idev] CDI.KEYID = 6
1,479,624 UART: [idev] SUBJECT.KEYID = 7
1,480,048 UART: [idev] UDS.KEYID = 0
1,480,393 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,816 UART: [idev] Erasing UDS.KEYID = 0
1,504,960 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,396 UART: [idev] --
1,514,527 UART: [ldev] ++
1,514,695 UART: [ldev] CDI.KEYID = 6
1,515,058 UART: [ldev] SUBJECT.KEYID = 5
1,515,484 UART: [ldev] AUTHORITY.KEYID = 7
1,515,947 UART: [ldev] FE.KEYID = 1
1,521,063 UART: [ldev] Erasing FE.KEYID = 1
1,546,572 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,700 UART: [ldev] --
1,586,017 UART: [fwproc] Waiting for Commands...
1,586,730 UART: [fwproc] Received command 0x46574c44
1,587,521 UART: [fwproc] Received Image of size 114332 bytes
1,636,850 UART: ROM Fatal Error: 0x000B0007
1,638,007 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,463 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,610 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Production
85,794 UART: [state] DebugLocked = No
86,332 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,906 UART: [kat] SHA2-256
881,837 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,952 UART: [kat] ++
886,104 UART: [kat] sha1
890,590 UART: [kat] SHA2-256
892,528 UART: [kat] SHA2-384
895,269 UART: [kat] SHA2-512-ACC
897,170 UART: [kat] ECC-384
903,049 UART: [kat] HMAC-384Kdf
907,775 UART: [kat] LMS
1,475,971 UART: [kat] --
1,477,046 UART: [cold-reset] ++
1,477,388 UART: [fht] Storing FHT @ 0x50003400
1,480,267 UART: [idev] ++
1,480,435 UART: [idev] CDI.KEYID = 6
1,480,795 UART: [idev] SUBJECT.KEYID = 7
1,481,219 UART: [idev] UDS.KEYID = 0
1,481,564 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,231 UART: [idev] Erasing UDS.KEYID = 0
1,506,353 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,207 UART: [idev] --
1,516,138 UART: [ldev] ++
1,516,306 UART: [ldev] CDI.KEYID = 6
1,516,669 UART: [ldev] SUBJECT.KEYID = 5
1,517,095 UART: [ldev] AUTHORITY.KEYID = 7
1,517,558 UART: [ldev] FE.KEYID = 1
1,522,818 UART: [ldev] Erasing FE.KEYID = 1
1,547,755 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,683 UART: [ldev] --
1,587,108 UART: [fwproc] Waiting for Commands...
1,587,977 UART: [fwproc] Received command 0x46574c44
1,588,768 UART: [fwproc] Received Image of size 114332 bytes
1,638,401 UART: ROM Fatal Error: 0x000B0007
1,639,558 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,412 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,491,663 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Production
85,625 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,410 UART: [kat] SHA2-256
893,060 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,185 UART: [kat] ++
897,337 UART: [kat] sha1
901,597 UART: [kat] SHA2-256
903,537 UART: [kat] SHA2-384
906,280 UART: [kat] SHA2-512-ACC
908,181 UART: [kat] ECC-384
917,878 UART: [kat] HMAC-384Kdf
922,470 UART: [kat] LMS
1,170,798 UART: [kat] --
1,171,615 UART: [cold-reset] ++
1,172,125 UART: [fht] FHT @ 0x50003400
1,174,740 UART: [idev] ++
1,174,908 UART: [idev] CDI.KEYID = 6
1,175,268 UART: [idev] SUBJECT.KEYID = 7
1,175,692 UART: [idev] UDS.KEYID = 0
1,176,037 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,692 UART: [idev] Erasing UDS.KEYID = 0
1,200,757 UART: [idev] Sha1 KeyId Algorithm
1,209,311 UART: [idev] --
1,210,383 UART: [ldev] ++
1,210,551 UART: [ldev] CDI.KEYID = 6
1,210,914 UART: [ldev] SUBJECT.KEYID = 5
1,211,340 UART: [ldev] AUTHORITY.KEYID = 7
1,211,803 UART: [ldev] FE.KEYID = 1
1,216,961 UART: [ldev] Erasing FE.KEYID = 1
1,243,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,785 UART: [ldev] --
1,283,140 UART: [fwproc] Wait for Commands...
1,283,850 UART: [fwproc] Recv command 0x46574c44
1,284,578 UART: [fwproc] Recv'd Img size: 114332 bytes
1,333,873 UART: ROM Fatal Error: 0x000B0007
1,335,030 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,533 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,189,321 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Production
86,270 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
893,567 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,692 UART: [kat] ++
897,844 UART: [kat] sha1
901,912 UART: [kat] SHA2-256
903,852 UART: [kat] SHA2-384
906,705 UART: [kat] SHA2-512-ACC
908,606 UART: [kat] ECC-384
918,475 UART: [kat] HMAC-384Kdf
923,145 UART: [kat] LMS
1,171,473 UART: [kat] --
1,172,552 UART: [cold-reset] ++
1,173,040 UART: [fht] FHT @ 0x50003400
1,175,893 UART: [idev] ++
1,176,061 UART: [idev] CDI.KEYID = 6
1,176,421 UART: [idev] SUBJECT.KEYID = 7
1,176,845 UART: [idev] UDS.KEYID = 0
1,177,190 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,971 UART: [idev] Erasing UDS.KEYID = 0
1,202,172 UART: [idev] Sha1 KeyId Algorithm
1,210,614 UART: [idev] --
1,211,710 UART: [ldev] ++
1,211,878 UART: [ldev] CDI.KEYID = 6
1,212,241 UART: [ldev] SUBJECT.KEYID = 5
1,212,667 UART: [ldev] AUTHORITY.KEYID = 7
1,213,130 UART: [ldev] FE.KEYID = 1
1,218,448 UART: [ldev] Erasing FE.KEYID = 1
1,244,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,510 UART: [ldev] --
1,283,899 UART: [fwproc] Wait for Commands...
1,284,473 UART: [fwproc] Recv command 0x46574c44
1,285,201 UART: [fwproc] Recv'd Img size: 114332 bytes
1,334,262 UART: ROM Fatal Error: 0x000B0007
1,335,419 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,774 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,189,784 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Production
85,711 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
891,078 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,207 UART: [kat] ++
895,359 UART: [kat] sha1
899,599 UART: [kat] SHA2-256
901,539 UART: [kat] SHA2-384
904,180 UART: [kat] SHA2-512-ACC
906,081 UART: [kat] ECC-384
915,440 UART: [kat] HMAC-384Kdf
919,818 UART: [kat] LMS
1,168,130 UART: [kat] --
1,169,303 UART: [cold-reset] ++
1,169,827 UART: [fht] FHT @ 0x50003400
1,172,489 UART: [idev] ++
1,172,657 UART: [idev] CDI.KEYID = 6
1,173,018 UART: [idev] SUBJECT.KEYID = 7
1,173,443 UART: [idev] UDS.KEYID = 0
1,173,789 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,363 UART: [idev] Erasing UDS.KEYID = 0
1,198,409 UART: [idev] Sha1 KeyId Algorithm
1,207,225 UART: [idev] --
1,208,106 UART: [ldev] ++
1,208,274 UART: [ldev] CDI.KEYID = 6
1,208,638 UART: [ldev] SUBJECT.KEYID = 5
1,209,065 UART: [ldev] AUTHORITY.KEYID = 7
1,209,528 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,241,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,004 UART: [ldev] --
1,280,468 UART: [fwproc] Wait for Commands...
1,281,053 UART: [fwproc] Recv command 0x46574c44
1,281,786 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,279 UART: ROM Fatal Error: 0x000B0007
1,332,436 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,100 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,317 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Production
85,856 UART: [state] DebugLocked = No
86,404 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
891,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,322 UART: [kat] ++
895,474 UART: [kat] sha1
899,512 UART: [kat] SHA2-256
901,452 UART: [kat] SHA2-384
904,283 UART: [kat] SHA2-512-ACC
906,184 UART: [kat] ECC-384
916,055 UART: [kat] HMAC-384Kdf
920,801 UART: [kat] LMS
1,169,113 UART: [kat] --
1,169,796 UART: [cold-reset] ++
1,170,308 UART: [fht] FHT @ 0x50003400
1,173,022 UART: [idev] ++
1,173,190 UART: [idev] CDI.KEYID = 6
1,173,551 UART: [idev] SUBJECT.KEYID = 7
1,173,976 UART: [idev] UDS.KEYID = 0
1,174,322 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,270 UART: [idev] Erasing UDS.KEYID = 0
1,199,688 UART: [idev] Sha1 KeyId Algorithm
1,208,492 UART: [idev] --
1,209,649 UART: [ldev] ++
1,209,817 UART: [ldev] CDI.KEYID = 6
1,210,181 UART: [ldev] SUBJECT.KEYID = 5
1,210,608 UART: [ldev] AUTHORITY.KEYID = 7
1,211,071 UART: [ldev] FE.KEYID = 1
1,216,233 UART: [ldev] Erasing FE.KEYID = 1
1,242,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,955 UART: [ldev] --
1,282,337 UART: [fwproc] Wait for Commands...
1,283,132 UART: [fwproc] Recv command 0x46574c44
1,283,865 UART: [fwproc] Recv'd Img size: 114332 bytes
1,332,706 UART: ROM Fatal Error: 0x000B0007
1,333,863 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,797 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,186,234 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Production
85,715 UART: [state] DebugLocked = No
86,197 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,697 UART: [kat] SHA2-256
881,628 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,743 UART: [kat] ++
885,895 UART: [kat] sha1
890,261 UART: [kat] SHA2-256
892,199 UART: [kat] SHA2-384
894,882 UART: [kat] SHA2-512-ACC
896,783 UART: [kat] ECC-384
902,400 UART: [kat] HMAC-384Kdf
906,856 UART: [kat] LMS
1,475,052 UART: [kat] --
1,475,789 UART: [cold-reset] ++
1,476,243 UART: [fht] Storing FHT @ 0x50003400
1,479,150 UART: [idev] ++
1,479,318 UART: [idev] CDI.KEYID = 6
1,479,678 UART: [idev] SUBJECT.KEYID = 7
1,480,102 UART: [idev] UDS.KEYID = 0
1,480,447 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,134 UART: [idev] Erasing UDS.KEYID = 0
1,504,530 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,264 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,879 UART: [ldev] Erasing FE.KEYID = 1
1,546,344 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,004 UART: [ldev] --
1,585,421 UART: [fwproc] Waiting for Commands...
1,586,174 UART: [fwproc] Received command 0x46574c44
1,586,965 UART: [fwproc] Received Image of size 114332 bytes
1,632,104 UART: ROM Fatal Error: 0x000B0005
1,633,261 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,125 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,486,032 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Production
86,308 UART: [state] DebugLocked = No
87,004 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,592 UART: [kat] SHA2-256
882,523 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,638 UART: [kat] ++
886,790 UART: [kat] sha1
891,134 UART: [kat] SHA2-256
893,072 UART: [kat] SHA2-384
895,827 UART: [kat] SHA2-512-ACC
897,728 UART: [kat] ECC-384
903,283 UART: [kat] HMAC-384Kdf
908,067 UART: [kat] LMS
1,476,263 UART: [kat] --
1,476,998 UART: [cold-reset] ++
1,477,430 UART: [fht] Storing FHT @ 0x50003400
1,480,117 UART: [idev] ++
1,480,285 UART: [idev] CDI.KEYID = 6
1,480,645 UART: [idev] SUBJECT.KEYID = 7
1,481,069 UART: [idev] UDS.KEYID = 0
1,481,414 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,213 UART: [idev] Erasing UDS.KEYID = 0
1,505,685 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,191 UART: [idev] --
1,515,198 UART: [ldev] ++
1,515,366 UART: [ldev] CDI.KEYID = 6
1,515,729 UART: [ldev] SUBJECT.KEYID = 5
1,516,155 UART: [ldev] AUTHORITY.KEYID = 7
1,516,618 UART: [ldev] FE.KEYID = 1
1,521,664 UART: [ldev] Erasing FE.KEYID = 1
1,547,853 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,965 UART: [ldev] --
1,587,366 UART: [fwproc] Waiting for Commands...
1,588,087 UART: [fwproc] Received command 0x46574c44
1,588,878 UART: [fwproc] Received Image of size 114332 bytes
1,633,645 UART: ROM Fatal Error: 0x000B0005
1,634,802 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,656 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,486,213 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Production
85,669 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,308 UART: [kat] SHA2-256
892,958 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,083 UART: [kat] ++
897,235 UART: [kat] sha1
901,459 UART: [kat] SHA2-256
903,399 UART: [kat] SHA2-384
906,376 UART: [kat] SHA2-512-ACC
908,277 UART: [kat] ECC-384
918,404 UART: [kat] HMAC-384Kdf
923,008 UART: [kat] LMS
1,171,336 UART: [kat] --
1,172,173 UART: [cold-reset] ++
1,172,705 UART: [fht] FHT @ 0x50003400
1,175,260 UART: [idev] ++
1,175,428 UART: [idev] CDI.KEYID = 6
1,175,788 UART: [idev] SUBJECT.KEYID = 7
1,176,212 UART: [idev] UDS.KEYID = 0
1,176,557 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,354 UART: [idev] Erasing UDS.KEYID = 0
1,201,371 UART: [idev] Sha1 KeyId Algorithm
1,209,901 UART: [idev] --
1,210,969 UART: [ldev] ++
1,211,137 UART: [ldev] CDI.KEYID = 6
1,211,500 UART: [ldev] SUBJECT.KEYID = 5
1,211,926 UART: [ldev] AUTHORITY.KEYID = 7
1,212,389 UART: [ldev] FE.KEYID = 1
1,217,765 UART: [ldev] Erasing FE.KEYID = 1
1,244,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,071 UART: [ldev] --
1,283,482 UART: [fwproc] Wait for Commands...
1,284,102 UART: [fwproc] Recv command 0x46574c44
1,284,830 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,377 UART: ROM Fatal Error: 0x000B0005
1,330,534 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,707 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,025 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Production
86,066 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
893,611 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,736 UART: [kat] ++
897,888 UART: [kat] sha1
902,132 UART: [kat] SHA2-256
904,072 UART: [kat] SHA2-384
906,741 UART: [kat] SHA2-512-ACC
908,642 UART: [kat] ECC-384
918,105 UART: [kat] HMAC-384Kdf
922,839 UART: [kat] LMS
1,171,167 UART: [kat] --
1,171,936 UART: [cold-reset] ++
1,172,262 UART: [fht] FHT @ 0x50003400
1,174,741 UART: [idev] ++
1,174,909 UART: [idev] CDI.KEYID = 6
1,175,269 UART: [idev] SUBJECT.KEYID = 7
1,175,693 UART: [idev] UDS.KEYID = 0
1,176,038 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,747 UART: [idev] Erasing UDS.KEYID = 0
1,201,096 UART: [idev] Sha1 KeyId Algorithm
1,209,660 UART: [idev] --
1,210,682 UART: [ldev] ++
1,210,850 UART: [ldev] CDI.KEYID = 6
1,211,213 UART: [ldev] SUBJECT.KEYID = 5
1,211,639 UART: [ldev] AUTHORITY.KEYID = 7
1,212,102 UART: [ldev] FE.KEYID = 1
1,217,380 UART: [ldev] Erasing FE.KEYID = 1
1,244,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,940 UART: [ldev] --
1,283,217 UART: [fwproc] Wait for Commands...
1,283,933 UART: [fwproc] Recv command 0x46574c44
1,284,661 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,328 UART: ROM Fatal Error: 0x000B0005
1,330,485 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,382 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,546 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Production
85,755 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,269 UART: [kat] ++
895,421 UART: [kat] sha1
899,683 UART: [kat] SHA2-256
901,623 UART: [kat] SHA2-384
904,516 UART: [kat] SHA2-512-ACC
906,417 UART: [kat] ECC-384
916,292 UART: [kat] HMAC-384Kdf
920,852 UART: [kat] LMS
1,169,164 UART: [kat] --
1,169,937 UART: [cold-reset] ++
1,170,371 UART: [fht] FHT @ 0x50003400
1,172,965 UART: [idev] ++
1,173,133 UART: [idev] CDI.KEYID = 6
1,173,494 UART: [idev] SUBJECT.KEYID = 7
1,173,919 UART: [idev] UDS.KEYID = 0
1,174,265 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,707 UART: [idev] Erasing UDS.KEYID = 0
1,198,533 UART: [idev] Sha1 KeyId Algorithm
1,207,537 UART: [idev] --
1,208,600 UART: [ldev] ++
1,208,768 UART: [ldev] CDI.KEYID = 6
1,209,132 UART: [ldev] SUBJECT.KEYID = 5
1,209,559 UART: [ldev] AUTHORITY.KEYID = 7
1,210,022 UART: [ldev] FE.KEYID = 1
1,215,414 UART: [ldev] Erasing FE.KEYID = 1
1,242,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,880 UART: [ldev] --
1,281,306 UART: [fwproc] Wait for Commands...
1,281,949 UART: [fwproc] Recv command 0x46574c44
1,282,682 UART: [fwproc] Recv'd Img size: 114332 bytes
1,327,343 UART: ROM Fatal Error: 0x000B0005
1,328,500 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,522 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,595 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Production
86,028 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
891,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,590 UART: [kat] ++
895,742 UART: [kat] sha1
899,976 UART: [kat] SHA2-256
901,916 UART: [kat] SHA2-384
904,559 UART: [kat] SHA2-512-ACC
906,460 UART: [kat] ECC-384
916,113 UART: [kat] HMAC-384Kdf
920,871 UART: [kat] LMS
1,169,183 UART: [kat] --
1,170,116 UART: [cold-reset] ++
1,170,468 UART: [fht] FHT @ 0x50003400
1,173,124 UART: [idev] ++
1,173,292 UART: [idev] CDI.KEYID = 6
1,173,653 UART: [idev] SUBJECT.KEYID = 7
1,174,078 UART: [idev] UDS.KEYID = 0
1,174,424 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,320 UART: [idev] Erasing UDS.KEYID = 0
1,199,060 UART: [idev] Sha1 KeyId Algorithm
1,207,858 UART: [idev] --
1,208,865 UART: [ldev] ++
1,209,033 UART: [ldev] CDI.KEYID = 6
1,209,397 UART: [ldev] SUBJECT.KEYID = 5
1,209,824 UART: [ldev] AUTHORITY.KEYID = 7
1,210,287 UART: [ldev] FE.KEYID = 1
1,215,057 UART: [ldev] Erasing FE.KEYID = 1
1,241,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,635 UART: [ldev] --
1,281,059 UART: [fwproc] Wait for Commands...
1,281,684 UART: [fwproc] Recv command 0x46574c44
1,282,417 UART: [fwproc] Recv'd Img size: 114332 bytes
1,327,034 UART: ROM Fatal Error: 0x000B0005
1,328,191 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,003 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,354 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Production
85,895 UART: [state] DebugLocked = No
86,511 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,159 UART: [kat] SHA2-256
882,090 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,205 UART: [kat] ++
886,357 UART: [kat] sha1
890,417 UART: [kat] SHA2-256
892,355 UART: [kat] SHA2-384
895,098 UART: [kat] SHA2-512-ACC
896,999 UART: [kat] ECC-384
902,696 UART: [kat] HMAC-384Kdf
907,382 UART: [kat] LMS
1,475,578 UART: [kat] --
1,476,405 UART: [cold-reset] ++
1,476,881 UART: [fht] Storing FHT @ 0x50003400
1,479,668 UART: [idev] ++
1,479,836 UART: [idev] CDI.KEYID = 6
1,480,196 UART: [idev] SUBJECT.KEYID = 7
1,480,620 UART: [idev] UDS.KEYID = 0
1,480,965 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,700 UART: [idev] Erasing UDS.KEYID = 0
1,505,368 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,912 UART: [idev] --
1,515,001 UART: [ldev] ++
1,515,169 UART: [ldev] CDI.KEYID = 6
1,515,532 UART: [ldev] SUBJECT.KEYID = 5
1,515,958 UART: [ldev] AUTHORITY.KEYID = 7
1,516,421 UART: [ldev] FE.KEYID = 1
1,521,475 UART: [ldev] Erasing FE.KEYID = 1
1,546,318 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,362 UART: [ldev] --
1,585,729 UART: [fwproc] Waiting for Commands...
1,586,536 UART: [fwproc] Received command 0x46574c44
1,587,327 UART: [fwproc] Received Image of size 114332 bytes
1,632,608 UART: ROM Fatal Error: 0x000B0005
1,633,765 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,191 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,486,358 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Production
85,924 UART: [state] DebugLocked = No
86,554 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,106 UART: [kat] SHA2-256
882,037 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,152 UART: [kat] ++
886,304 UART: [kat] sha1
890,426 UART: [kat] SHA2-256
892,364 UART: [kat] SHA2-384
894,993 UART: [kat] SHA2-512-ACC
896,894 UART: [kat] ECC-384
902,869 UART: [kat] HMAC-384Kdf
907,559 UART: [kat] LMS
1,475,755 UART: [kat] --
1,476,324 UART: [cold-reset] ++
1,476,674 UART: [fht] Storing FHT @ 0x50003400
1,479,465 UART: [idev] ++
1,479,633 UART: [idev] CDI.KEYID = 6
1,479,993 UART: [idev] SUBJECT.KEYID = 7
1,480,417 UART: [idev] UDS.KEYID = 0
1,480,762 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,589 UART: [idev] Erasing UDS.KEYID = 0
1,504,849 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,305 UART: [idev] --
1,514,232 UART: [ldev] ++
1,514,400 UART: [ldev] CDI.KEYID = 6
1,514,763 UART: [ldev] SUBJECT.KEYID = 5
1,515,189 UART: [ldev] AUTHORITY.KEYID = 7
1,515,652 UART: [ldev] FE.KEYID = 1
1,520,944 UART: [ldev] Erasing FE.KEYID = 1
1,546,599 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,459 UART: [ldev] --
1,585,870 UART: [fwproc] Waiting for Commands...
1,586,527 UART: [fwproc] Received command 0x46574c44
1,587,318 UART: [fwproc] Received Image of size 114332 bytes
1,632,465 UART: ROM Fatal Error: 0x000B0005
1,633,622 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,468 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,486,563 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Production
86,137 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
87,846 UART: [kat] SHA2-256
893,496 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,621 UART: [kat] ++
897,773 UART: [kat] sha1
901,897 UART: [kat] SHA2-256
903,837 UART: [kat] SHA2-384
906,752 UART: [kat] SHA2-512-ACC
908,653 UART: [kat] ECC-384
917,966 UART: [kat] HMAC-384Kdf
922,618 UART: [kat] LMS
1,170,946 UART: [kat] --
1,171,609 UART: [cold-reset] ++
1,172,109 UART: [fht] FHT @ 0x50003400
1,174,720 UART: [idev] ++
1,174,888 UART: [idev] CDI.KEYID = 6
1,175,248 UART: [idev] SUBJECT.KEYID = 7
1,175,672 UART: [idev] UDS.KEYID = 0
1,176,017 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,784 UART: [idev] Erasing UDS.KEYID = 0
1,201,175 UART: [idev] Sha1 KeyId Algorithm
1,209,605 UART: [idev] --
1,210,783 UART: [ldev] ++
1,210,951 UART: [ldev] CDI.KEYID = 6
1,211,314 UART: [ldev] SUBJECT.KEYID = 5
1,211,740 UART: [ldev] AUTHORITY.KEYID = 7
1,212,203 UART: [ldev] FE.KEYID = 1
1,217,341 UART: [ldev] Erasing FE.KEYID = 1
1,243,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,901 UART: [ldev] --
1,283,186 UART: [fwproc] Wait for Commands...
1,283,932 UART: [fwproc] Recv command 0x46574c44
1,284,660 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,529 UART: ROM Fatal Error: 0x000B0005
1,330,686 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,361 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,583 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Production
85,936 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
893,513 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,638 UART: [kat] ++
897,790 UART: [kat] sha1
902,078 UART: [kat] SHA2-256
904,018 UART: [kat] SHA2-384
906,821 UART: [kat] SHA2-512-ACC
908,722 UART: [kat] ECC-384
918,455 UART: [kat] HMAC-384Kdf
923,115 UART: [kat] LMS
1,171,443 UART: [kat] --
1,172,384 UART: [cold-reset] ++
1,172,774 UART: [fht] FHT @ 0x50003400
1,175,389 UART: [idev] ++
1,175,557 UART: [idev] CDI.KEYID = 6
1,175,917 UART: [idev] SUBJECT.KEYID = 7
1,176,341 UART: [idev] UDS.KEYID = 0
1,176,686 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,219 UART: [idev] Erasing UDS.KEYID = 0
1,201,424 UART: [idev] Sha1 KeyId Algorithm
1,209,918 UART: [idev] --
1,211,170 UART: [ldev] ++
1,211,338 UART: [ldev] CDI.KEYID = 6
1,211,701 UART: [ldev] SUBJECT.KEYID = 5
1,212,127 UART: [ldev] AUTHORITY.KEYID = 7
1,212,590 UART: [ldev] FE.KEYID = 1
1,217,932 UART: [ldev] Erasing FE.KEYID = 1
1,243,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,438 UART: [ldev] --
1,282,739 UART: [fwproc] Wait for Commands...
1,283,409 UART: [fwproc] Recv command 0x46574c44
1,284,137 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,508 UART: ROM Fatal Error: 0x000B0005
1,329,665 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,302 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,620 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Production
85,855 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,625 UART: [kat] SHA2-256
901,565 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
915,576 UART: [kat] HMAC-384Kdf
920,128 UART: [kat] LMS
1,168,440 UART: [kat] --
1,169,183 UART: [cold-reset] ++
1,169,675 UART: [fht] FHT @ 0x50003400
1,172,343 UART: [idev] ++
1,172,511 UART: [idev] CDI.KEYID = 6
1,172,872 UART: [idev] SUBJECT.KEYID = 7
1,173,297 UART: [idev] UDS.KEYID = 0
1,173,643 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,333 UART: [idev] Erasing UDS.KEYID = 0
1,198,289 UART: [idev] Sha1 KeyId Algorithm
1,207,091 UART: [idev] --
1,208,042 UART: [ldev] ++
1,208,210 UART: [ldev] CDI.KEYID = 6
1,208,574 UART: [ldev] SUBJECT.KEYID = 5
1,209,001 UART: [ldev] AUTHORITY.KEYID = 7
1,209,464 UART: [ldev] FE.KEYID = 1
1,214,362 UART: [ldev] Erasing FE.KEYID = 1
1,240,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,962 UART: [ldev] --
1,280,350 UART: [fwproc] Wait for Commands...
1,280,981 UART: [fwproc] Recv command 0x46574c44
1,281,714 UART: [fwproc] Recv'd Img size: 114332 bytes
1,326,605 UART: ROM Fatal Error: 0x000B0005
1,327,762 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,802 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,207 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Production
85,800 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,627 UART: [kat] SHA2-256
891,177 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,306 UART: [kat] ++
895,458 UART: [kat] sha1
899,620 UART: [kat] SHA2-256
901,560 UART: [kat] SHA2-384
904,179 UART: [kat] SHA2-512-ACC
906,080 UART: [kat] ECC-384
916,433 UART: [kat] HMAC-384Kdf
921,167 UART: [kat] LMS
1,169,479 UART: [kat] --
1,170,500 UART: [cold-reset] ++
1,170,938 UART: [fht] FHT @ 0x50003400
1,173,532 UART: [idev] ++
1,173,700 UART: [idev] CDI.KEYID = 6
1,174,061 UART: [idev] SUBJECT.KEYID = 7
1,174,486 UART: [idev] UDS.KEYID = 0
1,174,832 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,764 UART: [idev] Erasing UDS.KEYID = 0
1,200,486 UART: [idev] Sha1 KeyId Algorithm
1,209,410 UART: [idev] --
1,210,353 UART: [ldev] ++
1,210,521 UART: [ldev] CDI.KEYID = 6
1,210,885 UART: [ldev] SUBJECT.KEYID = 5
1,211,312 UART: [ldev] AUTHORITY.KEYID = 7
1,211,775 UART: [ldev] FE.KEYID = 1
1,216,989 UART: [ldev] Erasing FE.KEYID = 1
1,243,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,709 UART: [ldev] --
1,281,997 UART: [fwproc] Wait for Commands...
1,282,762 UART: [fwproc] Recv command 0x46574c44
1,283,495 UART: [fwproc] Recv'd Img size: 114332 bytes
1,327,686 UART: ROM Fatal Error: 0x000B0005
1,328,843 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,179 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,314 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Production
85,715 UART: [state] DebugLocked = No
86,315 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,957 UART: [kat] SHA2-256
881,888 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,003 UART: [kat] ++
886,155 UART: [kat] sha1
890,315 UART: [kat] SHA2-256
892,253 UART: [kat] SHA2-384
895,098 UART: [kat] SHA2-512-ACC
896,999 UART: [kat] ECC-384
902,612 UART: [kat] HMAC-384Kdf
907,198 UART: [kat] LMS
1,475,394 UART: [kat] --
1,475,951 UART: [cold-reset] ++
1,476,499 UART: [fht] Storing FHT @ 0x50003400
1,479,144 UART: [idev] ++
1,479,312 UART: [idev] CDI.KEYID = 6
1,479,672 UART: [idev] SUBJECT.KEYID = 7
1,480,096 UART: [idev] UDS.KEYID = 0
1,480,441 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,448 UART: [idev] Erasing UDS.KEYID = 0
1,505,018 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,830 UART: [idev] --
1,514,981 UART: [ldev] ++
1,515,149 UART: [ldev] CDI.KEYID = 6
1,515,512 UART: [ldev] SUBJECT.KEYID = 5
1,515,938 UART: [ldev] AUTHORITY.KEYID = 7
1,516,401 UART: [ldev] FE.KEYID = 1
1,521,807 UART: [ldev] Erasing FE.KEYID = 1
1,547,074 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,136 UART: [ldev] --
1,586,587 UART: [fwproc] Waiting for Commands...
1,587,402 UART: [fwproc] Received command 0x46574c44
1,588,193 UART: [fwproc] Received Image of size 114332 bytes
1,608,543 UART: ROM Fatal Error: 0x000B0003
1,609,700 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,041 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,460,801 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,055 UART: [state] LifecycleState = Production
86,662 UART: [state] DebugLocked = No
87,284 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,796 UART: [kat] SHA2-256
882,727 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,842 UART: [kat] ++
886,994 UART: [kat] sha1
891,298 UART: [kat] SHA2-256
893,236 UART: [kat] SHA2-384
895,907 UART: [kat] SHA2-512-ACC
897,808 UART: [kat] ECC-384
903,517 UART: [kat] HMAC-384Kdf
908,215 UART: [kat] LMS
1,476,411 UART: [kat] --
1,477,480 UART: [cold-reset] ++
1,478,058 UART: [fht] Storing FHT @ 0x50003400
1,480,859 UART: [idev] ++
1,481,027 UART: [idev] CDI.KEYID = 6
1,481,387 UART: [idev] SUBJECT.KEYID = 7
1,481,811 UART: [idev] UDS.KEYID = 0
1,482,156 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,490,095 UART: [idev] Erasing UDS.KEYID = 0
1,507,257 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,905 UART: [idev] --
1,517,068 UART: [ldev] ++
1,517,236 UART: [ldev] CDI.KEYID = 6
1,517,599 UART: [ldev] SUBJECT.KEYID = 5
1,518,025 UART: [ldev] AUTHORITY.KEYID = 7
1,518,488 UART: [ldev] FE.KEYID = 1
1,523,640 UART: [ldev] Erasing FE.KEYID = 1
1,549,005 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,055 UART: [ldev] --
1,588,558 UART: [fwproc] Waiting for Commands...
1,589,369 UART: [fwproc] Received command 0x46574c44
1,590,160 UART: [fwproc] Received Image of size 114332 bytes
1,610,066 UART: ROM Fatal Error: 0x000B0003
1,611,223 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,734 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,462,808 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Production
85,627 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
893,214 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,339 UART: [kat] ++
897,491 UART: [kat] sha1
901,777 UART: [kat] SHA2-256
903,717 UART: [kat] SHA2-384
906,386 UART: [kat] SHA2-512-ACC
908,287 UART: [kat] ECC-384
917,738 UART: [kat] HMAC-384Kdf
922,282 UART: [kat] LMS
1,170,610 UART: [kat] --
1,171,215 UART: [cold-reset] ++
1,171,621 UART: [fht] FHT @ 0x50003400
1,174,248 UART: [idev] ++
1,174,416 UART: [idev] CDI.KEYID = 6
1,174,776 UART: [idev] SUBJECT.KEYID = 7
1,175,200 UART: [idev] UDS.KEYID = 0
1,175,545 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,142 UART: [idev] Erasing UDS.KEYID = 0
1,200,437 UART: [idev] Sha1 KeyId Algorithm
1,209,047 UART: [idev] --
1,210,235 UART: [ldev] ++
1,210,403 UART: [ldev] CDI.KEYID = 6
1,210,766 UART: [ldev] SUBJECT.KEYID = 5
1,211,192 UART: [ldev] AUTHORITY.KEYID = 7
1,211,655 UART: [ldev] FE.KEYID = 1
1,216,737 UART: [ldev] Erasing FE.KEYID = 1
1,242,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,283 UART: [ldev] --
1,282,760 UART: [fwproc] Wait for Commands...
1,283,584 UART: [fwproc] Recv command 0x46574c44
1,284,312 UART: [fwproc] Recv'd Img size: 114332 bytes
1,304,928 UART: ROM Fatal Error: 0x000B0003
1,306,085 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,791 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,678 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Production
85,852 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,735 UART: [kat] SHA2-256
893,385 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,510 UART: [kat] ++
897,662 UART: [kat] sha1
901,806 UART: [kat] SHA2-256
903,746 UART: [kat] SHA2-384
906,509 UART: [kat] SHA2-512-ACC
908,410 UART: [kat] ECC-384
918,277 UART: [kat] HMAC-384Kdf
923,085 UART: [kat] LMS
1,171,413 UART: [kat] --
1,172,362 UART: [cold-reset] ++
1,172,778 UART: [fht] FHT @ 0x50003400
1,175,499 UART: [idev] ++
1,175,667 UART: [idev] CDI.KEYID = 6
1,176,027 UART: [idev] SUBJECT.KEYID = 7
1,176,451 UART: [idev] UDS.KEYID = 0
1,176,796 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,653 UART: [idev] Erasing UDS.KEYID = 0
1,201,430 UART: [idev] Sha1 KeyId Algorithm
1,209,914 UART: [idev] --
1,210,920 UART: [ldev] ++
1,211,088 UART: [ldev] CDI.KEYID = 6
1,211,451 UART: [ldev] SUBJECT.KEYID = 5
1,211,877 UART: [ldev] AUTHORITY.KEYID = 7
1,212,340 UART: [ldev] FE.KEYID = 1
1,217,310 UART: [ldev] Erasing FE.KEYID = 1
1,243,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,386 UART: [ldev] --
1,282,839 UART: [fwproc] Wait for Commands...
1,283,459 UART: [fwproc] Recv command 0x46574c44
1,284,187 UART: [fwproc] Recv'd Img size: 114332 bytes
1,304,643 UART: ROM Fatal Error: 0x000B0003
1,305,800 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,882 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,793 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Production
85,769 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
891,284 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,413 UART: [kat] ++
895,565 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,588 UART: [kat] SHA2-512-ACC
906,489 UART: [kat] ECC-384
915,888 UART: [kat] HMAC-384Kdf
920,392 UART: [kat] LMS
1,168,704 UART: [kat] --
1,169,655 UART: [cold-reset] ++
1,170,169 UART: [fht] FHT @ 0x50003400
1,172,815 UART: [idev] ++
1,172,983 UART: [idev] CDI.KEYID = 6
1,173,344 UART: [idev] SUBJECT.KEYID = 7
1,173,769 UART: [idev] UDS.KEYID = 0
1,174,115 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,881 UART: [idev] Erasing UDS.KEYID = 0
1,199,393 UART: [idev] Sha1 KeyId Algorithm
1,208,185 UART: [idev] --
1,209,282 UART: [ldev] ++
1,209,450 UART: [ldev] CDI.KEYID = 6
1,209,814 UART: [ldev] SUBJECT.KEYID = 5
1,210,241 UART: [ldev] AUTHORITY.KEYID = 7
1,210,704 UART: [ldev] FE.KEYID = 1
1,215,992 UART: [ldev] Erasing FE.KEYID = 1
1,241,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,878 UART: [ldev] --
1,281,182 UART: [fwproc] Wait for Commands...
1,281,959 UART: [fwproc] Recv command 0x46574c44
1,282,692 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,033 UART: ROM Fatal Error: 0x000B0003
1,304,190 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,952 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,156,223 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Production
86,288 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
891,665 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,794 UART: [kat] ++
895,946 UART: [kat] sha1
900,242 UART: [kat] SHA2-256
902,182 UART: [kat] SHA2-384
904,799 UART: [kat] SHA2-512-ACC
906,700 UART: [kat] ECC-384
916,191 UART: [kat] HMAC-384Kdf
920,713 UART: [kat] LMS
1,169,025 UART: [kat] --
1,170,016 UART: [cold-reset] ++
1,170,496 UART: [fht] FHT @ 0x50003400
1,173,362 UART: [idev] ++
1,173,530 UART: [idev] CDI.KEYID = 6
1,173,891 UART: [idev] SUBJECT.KEYID = 7
1,174,316 UART: [idev] UDS.KEYID = 0
1,174,662 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,130 UART: [idev] Erasing UDS.KEYID = 0
1,198,910 UART: [idev] Sha1 KeyId Algorithm
1,207,882 UART: [idev] --
1,209,005 UART: [ldev] ++
1,209,173 UART: [ldev] CDI.KEYID = 6
1,209,537 UART: [ldev] SUBJECT.KEYID = 5
1,209,964 UART: [ldev] AUTHORITY.KEYID = 7
1,210,427 UART: [ldev] FE.KEYID = 1
1,215,411 UART: [ldev] Erasing FE.KEYID = 1
1,242,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,583 UART: [ldev] --
1,281,903 UART: [fwproc] Wait for Commands...
1,282,556 UART: [fwproc] Recv command 0x46574c44
1,283,289 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,418 UART: ROM Fatal Error: 0x000B0003
1,304,575 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,523 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,156,974 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,314 UART: [state] LifecycleState = Production
84,921 UART: [state] DebugLocked = No
85,495 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,185 UART: [kat] SHA2-256
881,116 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,231 UART: [kat] ++
885,383 UART: [kat] sha1
889,673 UART: [kat] SHA2-256
891,611 UART: [kat] SHA2-384
894,346 UART: [kat] SHA2-512-ACC
896,247 UART: [kat] ECC-384
901,944 UART: [kat] HMAC-384Kdf
906,456 UART: [kat] LMS
1,474,652 UART: [kat] --
1,475,593 UART: [cold-reset] ++
1,476,141 UART: [fht] Storing FHT @ 0x50003400
1,478,908 UART: [idev] ++
1,479,076 UART: [idev] CDI.KEYID = 6
1,479,436 UART: [idev] SUBJECT.KEYID = 7
1,479,860 UART: [idev] UDS.KEYID = 0
1,480,205 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,788 UART: [idev] Erasing UDS.KEYID = 0
1,505,426 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,146 UART: [idev] --
1,515,185 UART: [ldev] ++
1,515,353 UART: [ldev] CDI.KEYID = 6
1,515,716 UART: [ldev] SUBJECT.KEYID = 5
1,516,142 UART: [ldev] AUTHORITY.KEYID = 7
1,516,605 UART: [ldev] FE.KEYID = 1
1,521,847 UART: [ldev] Erasing FE.KEYID = 1
1,547,166 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,000 UART: [ldev] --
1,586,403 UART: [fwproc] Waiting for Commands...
1,587,096 UART: [fwproc] Received command 0x46574c44
1,587,887 UART: [fwproc] Received Image of size 114332 bytes
1,632,864 UART: ROM Fatal Error: 0x000B0005
1,634,021 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,671 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,485,534 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Production
86,328 UART: [state] DebugLocked = No
86,960 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,650 UART: [kat] SHA2-256
882,581 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,696 UART: [kat] ++
886,848 UART: [kat] sha1
891,080 UART: [kat] SHA2-256
893,018 UART: [kat] SHA2-384
895,661 UART: [kat] SHA2-512-ACC
897,562 UART: [kat] ECC-384
903,239 UART: [kat] HMAC-384Kdf
907,937 UART: [kat] LMS
1,476,133 UART: [kat] --
1,477,194 UART: [cold-reset] ++
1,477,740 UART: [fht] Storing FHT @ 0x50003400
1,480,667 UART: [idev] ++
1,480,835 UART: [idev] CDI.KEYID = 6
1,481,195 UART: [idev] SUBJECT.KEYID = 7
1,481,619 UART: [idev] UDS.KEYID = 0
1,481,964 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,839 UART: [idev] Erasing UDS.KEYID = 0
1,506,111 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,505 UART: [idev] --
1,515,606 UART: [ldev] ++
1,515,774 UART: [ldev] CDI.KEYID = 6
1,516,137 UART: [ldev] SUBJECT.KEYID = 5
1,516,563 UART: [ldev] AUTHORITY.KEYID = 7
1,517,026 UART: [ldev] FE.KEYID = 1
1,521,932 UART: [ldev] Erasing FE.KEYID = 1
1,547,715 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,575 UART: [ldev] --
1,586,888 UART: [fwproc] Waiting for Commands...
1,587,689 UART: [fwproc] Received command 0x46574c44
1,588,480 UART: [fwproc] Received Image of size 114332 bytes
1,633,673 UART: ROM Fatal Error: 0x000B0005
1,634,830 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,376 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,019 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Production
85,635 UART: [state] DebugLocked = No
86,297 UART: [state] WD Timer not started. Device not locked for debugging
87,410 UART: [kat] SHA2-256
893,060 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,185 UART: [kat] ++
897,337 UART: [kat] sha1
901,567 UART: [kat] SHA2-256
903,507 UART: [kat] SHA2-384
906,420 UART: [kat] SHA2-512-ACC
908,321 UART: [kat] ECC-384
917,976 UART: [kat] HMAC-384Kdf
922,364 UART: [kat] LMS
1,170,692 UART: [kat] --
1,171,765 UART: [cold-reset] ++
1,172,155 UART: [fht] FHT @ 0x50003400
1,174,864 UART: [idev] ++
1,175,032 UART: [idev] CDI.KEYID = 6
1,175,392 UART: [idev] SUBJECT.KEYID = 7
1,175,816 UART: [idev] UDS.KEYID = 0
1,176,161 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,526 UART: [idev] Erasing UDS.KEYID = 0
1,200,489 UART: [idev] Sha1 KeyId Algorithm
1,208,833 UART: [idev] --
1,210,065 UART: [ldev] ++
1,210,233 UART: [ldev] CDI.KEYID = 6
1,210,596 UART: [ldev] SUBJECT.KEYID = 5
1,211,022 UART: [ldev] AUTHORITY.KEYID = 7
1,211,485 UART: [ldev] FE.KEYID = 1
1,216,503 UART: [ldev] Erasing FE.KEYID = 1
1,242,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,641 UART: [ldev] --
1,281,946 UART: [fwproc] Wait for Commands...
1,282,672 UART: [fwproc] Recv command 0x46574c44
1,283,400 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,037 UART: ROM Fatal Error: 0x000B0005
1,329,194 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,243 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,687 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Production
86,252 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
88,033 UART: [kat] SHA2-256
893,683 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,808 UART: [kat] ++
897,960 UART: [kat] sha1
902,152 UART: [kat] SHA2-256
904,092 UART: [kat] SHA2-384
906,825 UART: [kat] SHA2-512-ACC
908,726 UART: [kat] ECC-384
918,649 UART: [kat] HMAC-384Kdf
923,317 UART: [kat] LMS
1,171,645 UART: [kat] --
1,172,696 UART: [cold-reset] ++
1,173,058 UART: [fht] FHT @ 0x50003400
1,175,681 UART: [idev] ++
1,175,849 UART: [idev] CDI.KEYID = 6
1,176,209 UART: [idev] SUBJECT.KEYID = 7
1,176,633 UART: [idev] UDS.KEYID = 0
1,176,978 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,605 UART: [idev] Erasing UDS.KEYID = 0
1,201,838 UART: [idev] Sha1 KeyId Algorithm
1,210,412 UART: [idev] --
1,211,452 UART: [ldev] ++
1,211,620 UART: [ldev] CDI.KEYID = 6
1,211,983 UART: [ldev] SUBJECT.KEYID = 5
1,212,409 UART: [ldev] AUTHORITY.KEYID = 7
1,212,872 UART: [ldev] FE.KEYID = 1
1,218,168 UART: [ldev] Erasing FE.KEYID = 1
1,244,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,250 UART: [ldev] --
1,283,513 UART: [fwproc] Wait for Commands...
1,284,229 UART: [fwproc] Recv command 0x46574c44
1,284,957 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,422 UART: ROM Fatal Error: 0x000B0005
1,331,579 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,564 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,430 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Production
85,835 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
891,306 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,435 UART: [kat] ++
895,587 UART: [kat] sha1
899,795 UART: [kat] SHA2-256
901,735 UART: [kat] SHA2-384
904,664 UART: [kat] SHA2-512-ACC
906,565 UART: [kat] ECC-384
915,964 UART: [kat] HMAC-384Kdf
920,494 UART: [kat] LMS
1,168,806 UART: [kat] --
1,169,711 UART: [cold-reset] ++
1,170,225 UART: [fht] FHT @ 0x50003400
1,172,849 UART: [idev] ++
1,173,017 UART: [idev] CDI.KEYID = 6
1,173,378 UART: [idev] SUBJECT.KEYID = 7
1,173,803 UART: [idev] UDS.KEYID = 0
1,174,149 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,633 UART: [idev] Erasing UDS.KEYID = 0
1,198,801 UART: [idev] Sha1 KeyId Algorithm
1,207,661 UART: [idev] --
1,208,760 UART: [ldev] ++
1,208,928 UART: [ldev] CDI.KEYID = 6
1,209,292 UART: [ldev] SUBJECT.KEYID = 5
1,209,719 UART: [ldev] AUTHORITY.KEYID = 7
1,210,182 UART: [ldev] FE.KEYID = 1
1,215,516 UART: [ldev] Erasing FE.KEYID = 1
1,242,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,110 UART: [ldev] --
1,281,544 UART: [fwproc] Wait for Commands...
1,282,281 UART: [fwproc] Recv command 0x46574c44
1,283,014 UART: [fwproc] Recv'd Img size: 114332 bytes
1,327,315 UART: ROM Fatal Error: 0x000B0005
1,328,472 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,192 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,317 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Production
85,954 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,730 UART: [kat] SHA2-256
901,670 UART: [kat] SHA2-384
904,335 UART: [kat] SHA2-512-ACC
906,236 UART: [kat] ECC-384
916,147 UART: [kat] HMAC-384Kdf
920,829 UART: [kat] LMS
1,169,141 UART: [kat] --
1,169,850 UART: [cold-reset] ++
1,170,244 UART: [fht] FHT @ 0x50003400
1,172,766 UART: [idev] ++
1,172,934 UART: [idev] CDI.KEYID = 6
1,173,295 UART: [idev] SUBJECT.KEYID = 7
1,173,720 UART: [idev] UDS.KEYID = 0
1,174,066 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,566 UART: [idev] Erasing UDS.KEYID = 0
1,198,832 UART: [idev] Sha1 KeyId Algorithm
1,207,682 UART: [idev] --
1,208,617 UART: [ldev] ++
1,208,785 UART: [ldev] CDI.KEYID = 6
1,209,149 UART: [ldev] SUBJECT.KEYID = 5
1,209,576 UART: [ldev] AUTHORITY.KEYID = 7
1,210,039 UART: [ldev] FE.KEYID = 1
1,215,355 UART: [ldev] Erasing FE.KEYID = 1
1,242,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,061 UART: [ldev] --
1,281,495 UART: [fwproc] Wait for Commands...
1,282,206 UART: [fwproc] Recv command 0x46574c44
1,282,939 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,160 UART: ROM Fatal Error: 0x000B0005
1,329,317 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,661 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,840 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,787 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,207,454 >>> mbox cmd response: failed
1,207,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,460 >>> mbox cmd response: failed
1,207,460 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,466 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,519 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,071 UART: [kat] SHA2-256
882,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,117 UART: [kat] ++
886,269 UART: [kat] sha1
890,577 UART: [kat] SHA2-256
892,515 UART: [kat] SHA2-384
895,232 UART: [kat] SHA2-512-ACC
897,133 UART: [kat] ECC-384
902,526 UART: [kat] HMAC-384Kdf
906,930 UART: [kat] LMS
1,475,126 UART: [kat] --
1,475,993 UART: [cold-reset] ++
1,476,489 UART: [fht] Storing FHT @ 0x50003400
1,479,374 UART: [idev] ++
1,479,542 UART: [idev] CDI.KEYID = 6
1,479,902 UART: [idev] SUBJECT.KEYID = 7
1,480,326 UART: [idev] UDS.KEYID = 0
1,480,671 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,718 UART: [idev] Erasing UDS.KEYID = 0
1,504,696 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,366 UART: [idev] --
1,514,441 UART: [ldev] ++
1,514,609 UART: [ldev] CDI.KEYID = 6
1,514,972 UART: [ldev] SUBJECT.KEYID = 5
1,515,398 UART: [ldev] AUTHORITY.KEYID = 7
1,515,861 UART: [ldev] FE.KEYID = 1
1,521,093 UART: [ldev] Erasing FE.KEYID = 1
1,546,722 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,084 UART: [ldev] --
1,585,569 UART: [fwproc] Waiting for Commands...
1,586,276 UART: [fwproc] Received command 0x46574c44
1,587,067 UART: [fwproc] Received Image of size 114332 bytes
2,885,010 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,898 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,250 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,207 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,073 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,207,264 >>> mbox cmd response: failed
1,207,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,270 >>> mbox cmd response: failed
1,207,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,276 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,089 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,679 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,312 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,207,485 >>> mbox cmd response: failed
1,207,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,491 >>> mbox cmd response: failed
1,207,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,497 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,914 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,404 UART: [kat] SHA2-256
882,335 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,450 UART: [kat] ++
886,602 UART: [kat] sha1
890,930 UART: [kat] SHA2-256
892,868 UART: [kat] SHA2-384
895,423 UART: [kat] SHA2-512-ACC
897,324 UART: [kat] ECC-384
902,817 UART: [kat] HMAC-384Kdf
907,371 UART: [kat] LMS
1,475,567 UART: [kat] --
1,476,726 UART: [cold-reset] ++
1,477,136 UART: [fht] Storing FHT @ 0x50003400
1,479,931 UART: [idev] ++
1,480,099 UART: [idev] CDI.KEYID = 6
1,480,459 UART: [idev] SUBJECT.KEYID = 7
1,480,883 UART: [idev] UDS.KEYID = 0
1,481,228 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,971 UART: [idev] Erasing UDS.KEYID = 0
1,505,669 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,223 UART: [idev] --
1,515,330 UART: [ldev] ++
1,515,498 UART: [ldev] CDI.KEYID = 6
1,515,861 UART: [ldev] SUBJECT.KEYID = 5
1,516,287 UART: [ldev] AUTHORITY.KEYID = 7
1,516,750 UART: [ldev] FE.KEYID = 1
1,521,756 UART: [ldev] Erasing FE.KEYID = 1
1,546,877 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,763 UART: [ldev] --
1,586,100 UART: [fwproc] Waiting for Commands...
1,586,961 UART: [fwproc] Received command 0x46574c44
1,587,752 UART: [fwproc] Received Image of size 114332 bytes
2,884,941 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,859 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,211 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,082 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,698 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,208,217 >>> mbox cmd response: failed
1,208,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,223 >>> mbox cmd response: failed
1,208,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,229 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,820 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,594 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,663 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,208,042 >>> mbox cmd response: failed
1,208,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,048 >>> mbox cmd response: failed
1,208,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,054 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Unprovisioned
86,051 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
893,394 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,519 UART: [kat] ++
897,671 UART: [kat] sha1
901,875 UART: [kat] SHA2-256
903,815 UART: [kat] SHA2-384
906,740 UART: [kat] SHA2-512-ACC
908,641 UART: [kat] ECC-384
918,308 UART: [kat] HMAC-384Kdf
922,870 UART: [kat] LMS
1,171,198 UART: [kat] --
1,171,991 UART: [cold-reset] ++
1,172,371 UART: [fht] FHT @ 0x50003400
1,174,962 UART: [idev] ++
1,175,130 UART: [idev] CDI.KEYID = 6
1,175,490 UART: [idev] SUBJECT.KEYID = 7
1,175,914 UART: [idev] UDS.KEYID = 0
1,176,259 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,648 UART: [idev] Erasing UDS.KEYID = 0
1,200,831 UART: [idev] Sha1 KeyId Algorithm
1,209,363 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,724 UART: [ldev] SUBJECT.KEYID = 5
1,211,150 UART: [ldev] AUTHORITY.KEYID = 7
1,211,613 UART: [ldev] FE.KEYID = 1
1,216,707 UART: [ldev] Erasing FE.KEYID = 1
1,243,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,591 UART: [ldev] --
1,282,916 UART: [fwproc] Wait for Commands...
1,283,730 UART: [fwproc] Recv command 0x46574c44
1,284,458 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,296 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,527 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,831 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,746 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,293 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,206,460 >>> mbox cmd response: failed
1,206,460 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,466 >>> mbox cmd response: failed
1,206,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,472 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,769 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,773 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,306 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,209,515 >>> mbox cmd response: failed
1,209,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,209,521 >>> mbox cmd response: failed
1,209,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,209,527 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,796 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
893,567 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,692 UART: [kat] ++
897,844 UART: [kat] sha1
902,020 UART: [kat] SHA2-256
903,960 UART: [kat] SHA2-384
906,915 UART: [kat] SHA2-512-ACC
908,816 UART: [kat] ECC-384
918,713 UART: [kat] HMAC-384Kdf
923,239 UART: [kat] LMS
1,171,567 UART: [kat] --
1,172,456 UART: [cold-reset] ++
1,172,796 UART: [fht] FHT @ 0x50003400
1,175,519 UART: [idev] ++
1,175,687 UART: [idev] CDI.KEYID = 6
1,176,047 UART: [idev] SUBJECT.KEYID = 7
1,176,471 UART: [idev] UDS.KEYID = 0
1,176,816 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,323 UART: [idev] Erasing UDS.KEYID = 0
1,201,134 UART: [idev] Sha1 KeyId Algorithm
1,209,770 UART: [idev] --
1,210,994 UART: [ldev] ++
1,211,162 UART: [ldev] CDI.KEYID = 6
1,211,525 UART: [ldev] SUBJECT.KEYID = 5
1,211,951 UART: [ldev] AUTHORITY.KEYID = 7
1,212,414 UART: [ldev] FE.KEYID = 1
1,217,670 UART: [ldev] Erasing FE.KEYID = 1
1,244,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,452 UART: [ldev] --
1,283,877 UART: [fwproc] Wait for Commands...
1,284,567 UART: [fwproc] Recv command 0x46574c44
1,285,295 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,440 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,681 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,080 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,207,371 >>> mbox cmd response: failed
1,207,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,377 >>> mbox cmd response: failed
1,207,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,383 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,768 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,106 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,643 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,206,574 >>> mbox cmd response: failed
1,206,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,580 >>> mbox cmd response: failed
1,206,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
891,288 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
899,829 UART: [kat] SHA2-256
901,769 UART: [kat] SHA2-384
904,374 UART: [kat] SHA2-512-ACC
906,275 UART: [kat] ECC-384
916,132 UART: [kat] HMAC-384Kdf
920,790 UART: [kat] LMS
1,169,102 UART: [kat] --
1,170,109 UART: [cold-reset] ++
1,170,493 UART: [fht] FHT @ 0x50003400
1,173,267 UART: [idev] ++
1,173,435 UART: [idev] CDI.KEYID = 6
1,173,796 UART: [idev] SUBJECT.KEYID = 7
1,174,221 UART: [idev] UDS.KEYID = 0
1,174,567 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,985 UART: [idev] Erasing UDS.KEYID = 0
1,198,831 UART: [idev] Sha1 KeyId Algorithm
1,207,539 UART: [idev] --
1,208,650 UART: [ldev] ++
1,208,818 UART: [ldev] CDI.KEYID = 6
1,209,182 UART: [ldev] SUBJECT.KEYID = 5
1,209,609 UART: [ldev] AUTHORITY.KEYID = 7
1,210,072 UART: [ldev] FE.KEYID = 1
1,214,926 UART: [ldev] Erasing FE.KEYID = 1
1,241,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,002 UART: [ldev] --
1,280,386 UART: [fwproc] Wait for Commands...
1,281,109 UART: [fwproc] Recv command 0x46574c44
1,281,842 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,029 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,585 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,894 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,714 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,521 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,208,388 >>> mbox cmd response: failed
1,208,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,394 >>> mbox cmd response: failed
1,208,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,400 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,930 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,179 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,994 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,207,951 >>> mbox cmd response: failed
1,207,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,957 >>> mbox cmd response: failed
1,207,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,963 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
891,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,636 UART: [kat] ++
895,788 UART: [kat] sha1
899,976 UART: [kat] SHA2-256
901,916 UART: [kat] SHA2-384
904,803 UART: [kat] SHA2-512-ACC
906,704 UART: [kat] ECC-384
916,235 UART: [kat] HMAC-384Kdf
920,651 UART: [kat] LMS
1,168,963 UART: [kat] --
1,169,672 UART: [cold-reset] ++
1,170,082 UART: [fht] FHT @ 0x50003400
1,172,848 UART: [idev] ++
1,173,016 UART: [idev] CDI.KEYID = 6
1,173,377 UART: [idev] SUBJECT.KEYID = 7
1,173,802 UART: [idev] UDS.KEYID = 0
1,174,148 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,700 UART: [idev] Erasing UDS.KEYID = 0
1,198,698 UART: [idev] Sha1 KeyId Algorithm
1,207,800 UART: [idev] --
1,208,711 UART: [ldev] ++
1,208,879 UART: [ldev] CDI.KEYID = 6
1,209,243 UART: [ldev] SUBJECT.KEYID = 5
1,209,670 UART: [ldev] AUTHORITY.KEYID = 7
1,210,133 UART: [ldev] FE.KEYID = 1
1,215,443 UART: [ldev] Erasing FE.KEYID = 1
1,242,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,335 UART: [ldev] --
1,281,669 UART: [fwproc] Wait for Commands...
1,282,446 UART: [fwproc] Recv command 0x46574c44
1,283,179 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,712 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,172 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,481 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,421 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,166 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,208,199 >>> mbox cmd response: failed
1,208,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,205 >>> mbox cmd response: failed
1,208,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,211 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,667 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,067 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,893 UART: [kat] SHA2-256
881,824 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,939 UART: [kat] ++
886,091 UART: [kat] sha1
890,259 UART: [kat] SHA2-256
892,197 UART: [kat] SHA2-384
895,034 UART: [kat] SHA2-512-ACC
896,935 UART: [kat] ECC-384
902,422 UART: [kat] HMAC-384Kdf
906,792 UART: [kat] LMS
1,474,988 UART: [kat] --
1,475,945 UART: [cold-reset] ++
1,476,449 UART: [fht] Storing FHT @ 0x50003400
1,479,372 UART: [idev] ++
1,479,540 UART: [idev] CDI.KEYID = 6
1,479,900 UART: [idev] SUBJECT.KEYID = 7
1,480,324 UART: [idev] UDS.KEYID = 0
1,480,669 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,126 UART: [idev] Erasing UDS.KEYID = 0
1,504,914 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,638 UART: [idev] --
1,514,921 UART: [ldev] ++
1,515,089 UART: [ldev] CDI.KEYID = 6
1,515,452 UART: [ldev] SUBJECT.KEYID = 5
1,515,878 UART: [ldev] AUTHORITY.KEYID = 7
1,516,341 UART: [ldev] FE.KEYID = 1
1,521,589 UART: [ldev] Erasing FE.KEYID = 1
1,547,432 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,454 UART: [ldev] --
1,586,937 UART: [fwproc] Waiting for Commands...
1,587,688 UART: [fwproc] Received command 0x46574c44
1,588,479 UART: [fwproc] Received Image of size 114332 bytes
1,854,415 UART: ROM Fatal Error: 0x000B0014
1,855,572 >>> mbox cmd response: failed
1,855,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,578 >>> mbox cmd response: failed
1,855,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,584 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,037 UART: [kat] SHA2-256
881,968 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,083 UART: [kat] ++
886,235 UART: [kat] sha1
890,603 UART: [kat] SHA2-256
892,541 UART: [kat] SHA2-384
895,344 UART: [kat] SHA2-512-ACC
897,245 UART: [kat] ECC-384
902,662 UART: [kat] HMAC-384Kdf
907,272 UART: [kat] LMS
1,475,468 UART: [kat] --
1,476,409 UART: [cold-reset] ++
1,476,973 UART: [fht] Storing FHT @ 0x50003400
1,479,878 UART: [idev] ++
1,480,046 UART: [idev] CDI.KEYID = 6
1,480,406 UART: [idev] SUBJECT.KEYID = 7
1,480,830 UART: [idev] UDS.KEYID = 0
1,481,175 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,522 UART: [idev] Erasing UDS.KEYID = 0
1,504,716 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,545 UART: [ldev] ++
1,514,713 UART: [ldev] CDI.KEYID = 6
1,515,076 UART: [ldev] SUBJECT.KEYID = 5
1,515,502 UART: [ldev] AUTHORITY.KEYID = 7
1,515,965 UART: [ldev] FE.KEYID = 1
1,521,181 UART: [ldev] Erasing FE.KEYID = 1
1,546,702 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,004 UART: [ldev] --
1,586,273 UART: [fwproc] Waiting for Commands...
1,586,974 UART: [fwproc] Received command 0x46574c44
1,587,765 UART: [fwproc] Received Image of size 114332 bytes
2,885,158 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,732 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,084 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,015 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,371 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,705,917 >>> mbox cmd response: failed
1,705,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,705,923 >>> mbox cmd response: failed
1,705,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,705,929 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,443 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,895 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,318 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,810 UART: [kat] SHA2-256
881,741 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,856 UART: [kat] ++
886,008 UART: [kat] sha1
890,228 UART: [kat] SHA2-256
892,166 UART: [kat] SHA2-384
894,869 UART: [kat] SHA2-512-ACC
896,770 UART: [kat] ECC-384
902,383 UART: [kat] HMAC-384Kdf
907,133 UART: [kat] LMS
1,475,329 UART: [kat] --
1,476,452 UART: [cold-reset] ++
1,476,958 UART: [fht] Storing FHT @ 0x50003400
1,479,799 UART: [idev] ++
1,479,967 UART: [idev] CDI.KEYID = 6
1,480,327 UART: [idev] SUBJECT.KEYID = 7
1,480,751 UART: [idev] UDS.KEYID = 0
1,481,096 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,169 UART: [idev] Erasing UDS.KEYID = 0
1,505,805 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,413 UART: [idev] --
1,515,302 UART: [ldev] ++
1,515,470 UART: [ldev] CDI.KEYID = 6
1,515,833 UART: [ldev] SUBJECT.KEYID = 5
1,516,259 UART: [ldev] AUTHORITY.KEYID = 7
1,516,722 UART: [ldev] FE.KEYID = 1
1,521,838 UART: [ldev] Erasing FE.KEYID = 1
1,547,567 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,329 UART: [ldev] --
1,586,754 UART: [fwproc] Waiting for Commands...
1,587,497 UART: [fwproc] Received command 0x46574c44
1,588,288 UART: [fwproc] Received Image of size 114332 bytes
1,854,942 UART: ROM Fatal Error: 0x000B0014
1,856,099 >>> mbox cmd response: failed
1,856,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,105 >>> mbox cmd response: failed
1,856,105 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,111 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,727 UART: [state] LifecycleState = Unprovisioned
86,382 UART: [state] DebugLocked = No
86,888 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,600 UART: [kat] SHA2-256
882,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,646 UART: [kat] ++
886,798 UART: [kat] sha1
890,956 UART: [kat] SHA2-256
892,894 UART: [kat] SHA2-384
895,693 UART: [kat] SHA2-512-ACC
897,594 UART: [kat] ECC-384
903,109 UART: [kat] HMAC-384Kdf
907,741 UART: [kat] LMS
1,475,937 UART: [kat] --
1,476,834 UART: [cold-reset] ++
1,477,320 UART: [fht] Storing FHT @ 0x50003400
1,480,119 UART: [idev] ++
1,480,287 UART: [idev] CDI.KEYID = 6
1,480,647 UART: [idev] SUBJECT.KEYID = 7
1,481,071 UART: [idev] UDS.KEYID = 0
1,481,416 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,543 UART: [idev] Erasing UDS.KEYID = 0
1,506,709 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,243 UART: [idev] --
1,516,140 UART: [ldev] ++
1,516,308 UART: [ldev] CDI.KEYID = 6
1,516,671 UART: [ldev] SUBJECT.KEYID = 5
1,517,097 UART: [ldev] AUTHORITY.KEYID = 7
1,517,560 UART: [ldev] FE.KEYID = 1
1,522,810 UART: [ldev] Erasing FE.KEYID = 1
1,548,831 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,883 UART: [ldev] --
1,588,236 UART: [fwproc] Waiting for Commands...
1,589,019 UART: [fwproc] Received command 0x46574c44
1,589,810 UART: [fwproc] Received Image of size 114332 bytes
2,886,805 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,799 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,151 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,112 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,946 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,707,982 >>> mbox cmd response: failed
1,707,982 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,988 >>> mbox cmd response: failed
1,707,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,994 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,376 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,756 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
893,244 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,369 UART: [kat] ++
897,521 UART: [kat] sha1
901,853 UART: [kat] SHA2-256
903,793 UART: [kat] SHA2-384
906,574 UART: [kat] SHA2-512-ACC
908,475 UART: [kat] ECC-384
918,336 UART: [kat] HMAC-384Kdf
923,018 UART: [kat] LMS
1,171,346 UART: [kat] --
1,172,103 UART: [cold-reset] ++
1,172,511 UART: [fht] FHT @ 0x50003400
1,175,166 UART: [idev] ++
1,175,334 UART: [idev] CDI.KEYID = 6
1,175,694 UART: [idev] SUBJECT.KEYID = 7
1,176,118 UART: [idev] UDS.KEYID = 0
1,176,463 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,886 UART: [idev] Erasing UDS.KEYID = 0
1,200,331 UART: [idev] Sha1 KeyId Algorithm
1,208,885 UART: [idev] --
1,210,007 UART: [ldev] ++
1,210,175 UART: [ldev] CDI.KEYID = 6
1,210,538 UART: [ldev] SUBJECT.KEYID = 5
1,210,964 UART: [ldev] AUTHORITY.KEYID = 7
1,211,427 UART: [ldev] FE.KEYID = 1
1,216,711 UART: [ldev] Erasing FE.KEYID = 1
1,242,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,543 UART: [ldev] --
1,281,976 UART: [fwproc] Wait for Commands...
1,282,562 UART: [fwproc] Recv command 0x46574c44
1,283,290 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,516 UART: ROM Fatal Error: 0x000B0014
1,550,673 >>> mbox cmd response: failed
1,550,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,679 >>> mbox cmd response: failed
1,550,679 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,685 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
893,578 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,703 UART: [kat] ++
897,855 UART: [kat] sha1
902,031 UART: [kat] SHA2-256
903,971 UART: [kat] SHA2-384
906,850 UART: [kat] SHA2-512-ACC
908,751 UART: [kat] ECC-384
918,146 UART: [kat] HMAC-384Kdf
922,832 UART: [kat] LMS
1,171,160 UART: [kat] --
1,172,183 UART: [cold-reset] ++
1,172,519 UART: [fht] FHT @ 0x50003400
1,175,126 UART: [idev] ++
1,175,294 UART: [idev] CDI.KEYID = 6
1,175,654 UART: [idev] SUBJECT.KEYID = 7
1,176,078 UART: [idev] UDS.KEYID = 0
1,176,423 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,998 UART: [idev] Erasing UDS.KEYID = 0
1,200,929 UART: [idev] Sha1 KeyId Algorithm
1,209,523 UART: [idev] --
1,210,699 UART: [ldev] ++
1,210,867 UART: [ldev] CDI.KEYID = 6
1,211,230 UART: [ldev] SUBJECT.KEYID = 5
1,211,656 UART: [ldev] AUTHORITY.KEYID = 7
1,212,119 UART: [ldev] FE.KEYID = 1
1,217,235 UART: [ldev] Erasing FE.KEYID = 1
1,243,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,807 UART: [ldev] --
1,282,174 UART: [fwproc] Wait for Commands...
1,282,794 UART: [fwproc] Recv command 0x46574c44
1,283,522 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,949 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,253 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,090 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,729 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,406,190 >>> mbox cmd response: failed
1,406,190 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,196 >>> mbox cmd response: failed
1,406,196 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,202 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,341 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,485 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,677 UART: [kat] SHA2-256
893,327 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,452 UART: [kat] ++
897,604 UART: [kat] sha1
901,852 UART: [kat] SHA2-256
903,792 UART: [kat] SHA2-384
906,681 UART: [kat] SHA2-512-ACC
908,582 UART: [kat] ECC-384
918,269 UART: [kat] HMAC-384Kdf
922,999 UART: [kat] LMS
1,171,327 UART: [kat] --
1,172,476 UART: [cold-reset] ++
1,172,920 UART: [fht] FHT @ 0x50003400
1,175,425 UART: [idev] ++
1,175,593 UART: [idev] CDI.KEYID = 6
1,175,953 UART: [idev] SUBJECT.KEYID = 7
1,176,377 UART: [idev] UDS.KEYID = 0
1,176,722 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,591 UART: [idev] Erasing UDS.KEYID = 0
1,201,258 UART: [idev] Sha1 KeyId Algorithm
1,209,676 UART: [idev] --
1,210,868 UART: [ldev] ++
1,211,036 UART: [ldev] CDI.KEYID = 6
1,211,399 UART: [ldev] SUBJECT.KEYID = 5
1,211,825 UART: [ldev] AUTHORITY.KEYID = 7
1,212,288 UART: [ldev] FE.KEYID = 1
1,217,340 UART: [ldev] Erasing FE.KEYID = 1
1,244,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,220 UART: [ldev] --
1,283,649 UART: [fwproc] Wait for Commands...
1,284,429 UART: [fwproc] Recv command 0x46574c44
1,285,157 UART: [fwproc] Recv'd Img size: 114332 bytes
1,551,031 UART: ROM Fatal Error: 0x000B0014
1,552,188 >>> mbox cmd response: failed
1,552,188 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,194 >>> mbox cmd response: failed
1,552,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,200 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,873 UART: [kat] SHA2-256
893,523 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,648 UART: [kat] ++
897,800 UART: [kat] sha1
901,804 UART: [kat] SHA2-256
903,744 UART: [kat] SHA2-384
906,705 UART: [kat] SHA2-512-ACC
908,606 UART: [kat] ECC-384
918,771 UART: [kat] HMAC-384Kdf
923,369 UART: [kat] LMS
1,171,697 UART: [kat] --
1,172,512 UART: [cold-reset] ++
1,172,912 UART: [fht] FHT @ 0x50003400
1,175,379 UART: [idev] ++
1,175,547 UART: [idev] CDI.KEYID = 6
1,175,907 UART: [idev] SUBJECT.KEYID = 7
1,176,331 UART: [idev] UDS.KEYID = 0
1,176,676 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,445 UART: [idev] Erasing UDS.KEYID = 0
1,201,650 UART: [idev] Sha1 KeyId Algorithm
1,210,132 UART: [idev] --
1,211,188 UART: [ldev] ++
1,211,356 UART: [ldev] CDI.KEYID = 6
1,211,719 UART: [ldev] SUBJECT.KEYID = 5
1,212,145 UART: [ldev] AUTHORITY.KEYID = 7
1,212,608 UART: [ldev] FE.KEYID = 1
1,217,870 UART: [ldev] Erasing FE.KEYID = 1
1,244,407 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,152 UART: [ldev] --
1,283,565 UART: [fwproc] Wait for Commands...
1,284,277 UART: [fwproc] Recv command 0x46574c44
1,285,005 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,241 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,940 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,244 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,187 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,048 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,406,379 >>> mbox cmd response: failed
1,406,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,385 >>> mbox cmd response: failed
1,406,385 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,391 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,924 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,730 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,884 UART: [kat] SHA2-256
891,434 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,563 UART: [kat] ++
895,715 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,784 UART: [kat] SHA2-512-ACC
906,685 UART: [kat] ECC-384
916,262 UART: [kat] HMAC-384Kdf
920,868 UART: [kat] LMS
1,169,180 UART: [kat] --
1,169,903 UART: [cold-reset] ++
1,170,399 UART: [fht] FHT @ 0x50003400
1,173,131 UART: [idev] ++
1,173,299 UART: [idev] CDI.KEYID = 6
1,173,660 UART: [idev] SUBJECT.KEYID = 7
1,174,085 UART: [idev] UDS.KEYID = 0
1,174,431 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,281 UART: [idev] Erasing UDS.KEYID = 0
1,199,431 UART: [idev] Sha1 KeyId Algorithm
1,208,297 UART: [idev] --
1,209,272 UART: [ldev] ++
1,209,440 UART: [ldev] CDI.KEYID = 6
1,209,804 UART: [ldev] SUBJECT.KEYID = 5
1,210,231 UART: [ldev] AUTHORITY.KEYID = 7
1,210,694 UART: [ldev] FE.KEYID = 1
1,216,012 UART: [ldev] Erasing FE.KEYID = 1
1,241,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,628 UART: [ldev] --
1,281,096 UART: [fwproc] Wait for Commands...
1,281,813 UART: [fwproc] Recv command 0x46574c44
1,282,546 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,671 UART: ROM Fatal Error: 0x000B0014
1,549,828 >>> mbox cmd response: failed
1,549,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,834 >>> mbox cmd response: failed
1,549,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,840 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,495 UART: [state] DebugLocked = No
86,131 UART: [state] WD Timer not started. Device not locked for debugging
87,398 UART: [kat] SHA2-256
890,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,077 UART: [kat] ++
895,229 UART: [kat] sha1
899,349 UART: [kat] SHA2-256
901,289 UART: [kat] SHA2-384
904,034 UART: [kat] SHA2-512-ACC
905,935 UART: [kat] ECC-384
915,614 UART: [kat] HMAC-384Kdf
920,286 UART: [kat] LMS
1,168,598 UART: [kat] --
1,169,347 UART: [cold-reset] ++
1,169,803 UART: [fht] FHT @ 0x50003400
1,172,509 UART: [idev] ++
1,172,677 UART: [idev] CDI.KEYID = 6
1,173,038 UART: [idev] SUBJECT.KEYID = 7
1,173,463 UART: [idev] UDS.KEYID = 0
1,173,809 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,709 UART: [idev] Erasing UDS.KEYID = 0
1,198,643 UART: [idev] Sha1 KeyId Algorithm
1,207,657 UART: [idev] --
1,208,614 UART: [ldev] ++
1,208,782 UART: [ldev] CDI.KEYID = 6
1,209,146 UART: [ldev] SUBJECT.KEYID = 5
1,209,573 UART: [ldev] AUTHORITY.KEYID = 7
1,210,036 UART: [ldev] FE.KEYID = 1
1,215,116 UART: [ldev] Erasing FE.KEYID = 1
1,241,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,102 UART: [ldev] --
1,280,484 UART: [fwproc] Wait for Commands...
1,281,133 UART: [fwproc] Recv command 0x46574c44
1,281,866 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,381 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,690 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,578 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,812 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,400,691 >>> mbox cmd response: failed
1,400,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,400,697 >>> mbox cmd response: failed
1,400,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,400,703 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,918 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,974 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
900,130 UART: [kat] SHA2-256
902,070 UART: [kat] SHA2-384
904,737 UART: [kat] SHA2-512-ACC
906,638 UART: [kat] ECC-384
916,457 UART: [kat] HMAC-384Kdf
921,057 UART: [kat] LMS
1,169,369 UART: [kat] --
1,170,486 UART: [cold-reset] ++
1,171,024 UART: [fht] FHT @ 0x50003400
1,173,730 UART: [idev] ++
1,173,898 UART: [idev] CDI.KEYID = 6
1,174,259 UART: [idev] SUBJECT.KEYID = 7
1,174,684 UART: [idev] UDS.KEYID = 0
1,175,030 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,146 UART: [idev] Erasing UDS.KEYID = 0
1,200,190 UART: [idev] Sha1 KeyId Algorithm
1,209,146 UART: [idev] --
1,210,167 UART: [ldev] ++
1,210,335 UART: [ldev] CDI.KEYID = 6
1,210,699 UART: [ldev] SUBJECT.KEYID = 5
1,211,126 UART: [ldev] AUTHORITY.KEYID = 7
1,211,589 UART: [ldev] FE.KEYID = 1
1,216,953 UART: [ldev] Erasing FE.KEYID = 1
1,242,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,159 UART: [ldev] --
1,281,609 UART: [fwproc] Wait for Commands...
1,282,274 UART: [fwproc] Recv command 0x46574c44
1,283,007 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,666 UART: ROM Fatal Error: 0x000B0014
1,549,823 >>> mbox cmd response: failed
1,549,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,829 >>> mbox cmd response: failed
1,549,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,835 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
891,497 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,626 UART: [kat] ++
895,778 UART: [kat] sha1
899,826 UART: [kat] SHA2-256
901,766 UART: [kat] SHA2-384
904,529 UART: [kat] SHA2-512-ACC
906,430 UART: [kat] ECC-384
916,213 UART: [kat] HMAC-384Kdf
920,923 UART: [kat] LMS
1,169,235 UART: [kat] --
1,170,260 UART: [cold-reset] ++
1,170,670 UART: [fht] FHT @ 0x50003400
1,173,260 UART: [idev] ++
1,173,428 UART: [idev] CDI.KEYID = 6
1,173,789 UART: [idev] SUBJECT.KEYID = 7
1,174,214 UART: [idev] UDS.KEYID = 0
1,174,560 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,460 UART: [idev] Erasing UDS.KEYID = 0
1,199,158 UART: [idev] Sha1 KeyId Algorithm
1,207,916 UART: [idev] --
1,209,159 UART: [ldev] ++
1,209,327 UART: [ldev] CDI.KEYID = 6
1,209,691 UART: [ldev] SUBJECT.KEYID = 5
1,210,118 UART: [ldev] AUTHORITY.KEYID = 7
1,210,581 UART: [ldev] FE.KEYID = 1
1,215,999 UART: [ldev] Erasing FE.KEYID = 1
1,242,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,215 UART: [ldev] --
1,281,665 UART: [fwproc] Wait for Commands...
1,282,246 UART: [fwproc] Recv command 0x46574c44
1,282,979 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,444 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,286 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,319 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,253 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,403,006 >>> mbox cmd response: failed
1,403,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,012 >>> mbox cmd response: failed
1,403,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,811 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,647 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,331 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,933 UART: [kat] SHA2-256
881,864 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,979 UART: [kat] ++
886,131 UART: [kat] sha1
890,365 UART: [kat] SHA2-256
892,303 UART: [kat] SHA2-384
895,206 UART: [kat] SHA2-512-ACC
897,107 UART: [kat] ECC-384
902,754 UART: [kat] HMAC-384Kdf
907,562 UART: [kat] LMS
1,475,758 UART: [kat] --
1,476,681 UART: [cold-reset] ++
1,477,085 UART: [fht] Storing FHT @ 0x50003400
1,479,864 UART: [idev] ++
1,480,032 UART: [idev] CDI.KEYID = 6
1,480,392 UART: [idev] SUBJECT.KEYID = 7
1,480,816 UART: [idev] UDS.KEYID = 0
1,481,161 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,602 UART: [idev] Erasing UDS.KEYID = 0
1,505,494 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,158 UART: [idev] --
1,515,167 UART: [ldev] ++
1,515,335 UART: [ldev] CDI.KEYID = 6
1,515,698 UART: [ldev] SUBJECT.KEYID = 5
1,516,124 UART: [ldev] AUTHORITY.KEYID = 7
1,516,587 UART: [ldev] FE.KEYID = 1
1,521,555 UART: [ldev] Erasing FE.KEYID = 1
1,546,396 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,144 UART: [ldev] --
1,585,639 UART: [fwproc] Waiting for Commands...
1,586,328 UART: [fwproc] Received command 0x46574c44
1,587,119 UART: [fwproc] Received Image of size 114332 bytes
1,853,526 UART: ROM Fatal Error: 0x000B0023
1,854,683 >>> mbox cmd response: failed
1,854,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,689 >>> mbox cmd response: failed
1,854,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,695 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,349 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,839 UART: [kat] SHA2-256
881,770 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,885 UART: [kat] ++
886,037 UART: [kat] sha1
890,439 UART: [kat] SHA2-256
892,377 UART: [kat] SHA2-384
895,328 UART: [kat] SHA2-512-ACC
897,229 UART: [kat] ECC-384
902,664 UART: [kat] HMAC-384Kdf
907,272 UART: [kat] LMS
1,475,468 UART: [kat] --
1,476,425 UART: [cold-reset] ++
1,476,955 UART: [fht] Storing FHT @ 0x50003400
1,479,546 UART: [idev] ++
1,479,714 UART: [idev] CDI.KEYID = 6
1,480,074 UART: [idev] SUBJECT.KEYID = 7
1,480,498 UART: [idev] UDS.KEYID = 0
1,480,843 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,658 UART: [idev] Erasing UDS.KEYID = 0
1,505,226 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,842 UART: [idev] --
1,515,009 UART: [ldev] ++
1,515,177 UART: [ldev] CDI.KEYID = 6
1,515,540 UART: [ldev] SUBJECT.KEYID = 5
1,515,966 UART: [ldev] AUTHORITY.KEYID = 7
1,516,429 UART: [ldev] FE.KEYID = 1
1,521,685 UART: [ldev] Erasing FE.KEYID = 1
1,546,860 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,348 UART: [ldev] --
1,585,765 UART: [fwproc] Waiting for Commands...
1,586,452 UART: [fwproc] Received command 0x46574c44
1,587,243 UART: [fwproc] Received Image of size 114332 bytes
2,883,890 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,532 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,884 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,855 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,665 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,706,654 >>> mbox cmd response: failed
1,706,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,660 >>> mbox cmd response: failed
1,706,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,666 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,901 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,257 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,971 UART: [state] LifecycleState = Unprovisioned
85,626 UART: [state] DebugLocked = No
86,206 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,876 UART: [kat] SHA2-256
881,807 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,922 UART: [kat] ++
886,074 UART: [kat] sha1
890,454 UART: [kat] SHA2-256
892,392 UART: [kat] SHA2-384
895,343 UART: [kat] SHA2-512-ACC
897,244 UART: [kat] ECC-384
902,801 UART: [kat] HMAC-384Kdf
907,425 UART: [kat] LMS
1,475,621 UART: [kat] --
1,476,710 UART: [cold-reset] ++
1,477,160 UART: [fht] Storing FHT @ 0x50003400
1,479,913 UART: [idev] ++
1,480,081 UART: [idev] CDI.KEYID = 6
1,480,441 UART: [idev] SUBJECT.KEYID = 7
1,480,865 UART: [idev] UDS.KEYID = 0
1,481,210 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,183 UART: [idev] Erasing UDS.KEYID = 0
1,505,731 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,203 UART: [idev] --
1,515,256 UART: [ldev] ++
1,515,424 UART: [ldev] CDI.KEYID = 6
1,515,787 UART: [ldev] SUBJECT.KEYID = 5
1,516,213 UART: [ldev] AUTHORITY.KEYID = 7
1,516,676 UART: [ldev] FE.KEYID = 1
1,521,978 UART: [ldev] Erasing FE.KEYID = 1
1,547,065 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,039 UART: [ldev] --
1,586,392 UART: [fwproc] Waiting for Commands...
1,587,033 UART: [fwproc] Received command 0x46574c44
1,587,824 UART: [fwproc] Received Image of size 114332 bytes
1,853,773 UART: ROM Fatal Error: 0x000B0023
1,854,930 >>> mbox cmd response: failed
1,854,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,936 >>> mbox cmd response: failed
1,854,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,942 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,884 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,518 UART: [kat] SHA2-256
882,449 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,564 UART: [kat] ++
886,716 UART: [kat] sha1
891,076 UART: [kat] SHA2-256
893,014 UART: [kat] SHA2-384
895,931 UART: [kat] SHA2-512-ACC
897,832 UART: [kat] ECC-384
903,457 UART: [kat] HMAC-384Kdf
908,195 UART: [kat] LMS
1,476,391 UART: [kat] --
1,477,342 UART: [cold-reset] ++
1,477,734 UART: [fht] Storing FHT @ 0x50003400
1,480,427 UART: [idev] ++
1,480,595 UART: [idev] CDI.KEYID = 6
1,480,955 UART: [idev] SUBJECT.KEYID = 7
1,481,379 UART: [idev] UDS.KEYID = 0
1,481,724 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,621 UART: [idev] Erasing UDS.KEYID = 0
1,506,121 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,927 UART: [idev] --
1,515,816 UART: [ldev] ++
1,515,984 UART: [ldev] CDI.KEYID = 6
1,516,347 UART: [ldev] SUBJECT.KEYID = 5
1,516,773 UART: [ldev] AUTHORITY.KEYID = 7
1,517,236 UART: [ldev] FE.KEYID = 1
1,522,636 UART: [ldev] Erasing FE.KEYID = 1
1,547,917 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,883 UART: [ldev] --
1,587,368 UART: [fwproc] Waiting for Commands...
1,588,011 UART: [fwproc] Received command 0x46574c44
1,588,802 UART: [fwproc] Received Image of size 114332 bytes
2,886,529 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,577 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,929 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,900 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,276 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,708,873 >>> mbox cmd response: failed
1,708,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,879 >>> mbox cmd response: failed
1,708,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,885 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,264 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,272 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
87,926 UART: [kat] SHA2-256
893,576 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,701 UART: [kat] ++
897,853 UART: [kat] sha1
901,925 UART: [kat] SHA2-256
903,865 UART: [kat] SHA2-384
906,606 UART: [kat] SHA2-512-ACC
908,507 UART: [kat] ECC-384
918,128 UART: [kat] HMAC-384Kdf
922,686 UART: [kat] LMS
1,171,014 UART: [kat] --
1,171,659 UART: [cold-reset] ++
1,172,135 UART: [fht] FHT @ 0x50003400
1,174,756 UART: [idev] ++
1,174,924 UART: [idev] CDI.KEYID = 6
1,175,284 UART: [idev] SUBJECT.KEYID = 7
1,175,708 UART: [idev] UDS.KEYID = 0
1,176,053 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,608 UART: [idev] Erasing UDS.KEYID = 0
1,201,175 UART: [idev] Sha1 KeyId Algorithm
1,209,615 UART: [idev] --
1,210,691 UART: [ldev] ++
1,210,859 UART: [ldev] CDI.KEYID = 6
1,211,222 UART: [ldev] SUBJECT.KEYID = 5
1,211,648 UART: [ldev] AUTHORITY.KEYID = 7
1,212,111 UART: [ldev] FE.KEYID = 1
1,217,207 UART: [ldev] Erasing FE.KEYID = 1
1,243,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,007 UART: [ldev] --
1,282,442 UART: [fwproc] Wait for Commands...
1,283,172 UART: [fwproc] Recv command 0x46574c44
1,283,900 UART: [fwproc] Recv'd Img size: 114332 bytes
1,550,089 UART: ROM Fatal Error: 0x000B0023
1,551,246 >>> mbox cmd response: failed
1,551,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,252 >>> mbox cmd response: failed
1,551,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,258 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
893,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,409 UART: [kat] ++
897,561 UART: [kat] sha1
901,821 UART: [kat] SHA2-256
903,761 UART: [kat] SHA2-384
906,620 UART: [kat] SHA2-512-ACC
908,521 UART: [kat] ECC-384
918,188 UART: [kat] HMAC-384Kdf
922,806 UART: [kat] LMS
1,171,134 UART: [kat] --
1,172,195 UART: [cold-reset] ++
1,172,617 UART: [fht] FHT @ 0x50003400
1,175,208 UART: [idev] ++
1,175,376 UART: [idev] CDI.KEYID = 6
1,175,736 UART: [idev] SUBJECT.KEYID = 7
1,176,160 UART: [idev] UDS.KEYID = 0
1,176,505 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,160 UART: [idev] Erasing UDS.KEYID = 0
1,200,941 UART: [idev] Sha1 KeyId Algorithm
1,209,417 UART: [idev] --
1,210,333 UART: [ldev] ++
1,210,501 UART: [ldev] CDI.KEYID = 6
1,210,864 UART: [ldev] SUBJECT.KEYID = 5
1,211,290 UART: [ldev] AUTHORITY.KEYID = 7
1,211,753 UART: [ldev] FE.KEYID = 1
1,216,659 UART: [ldev] Erasing FE.KEYID = 1
1,242,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,459 UART: [ldev] --
1,281,878 UART: [fwproc] Wait for Commands...
1,282,558 UART: [fwproc] Recv command 0x46574c44
1,283,286 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,901 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,205 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,928 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,487 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,405,117 >>> mbox cmd response: failed
1,405,117 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,123 >>> mbox cmd response: failed
1,405,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,129 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,183 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,889 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [kat] SHA2-256
893,599 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,724 UART: [kat] ++
897,876 UART: [kat] sha1
902,312 UART: [kat] SHA2-256
904,252 UART: [kat] SHA2-384
907,095 UART: [kat] SHA2-512-ACC
908,996 UART: [kat] ECC-384
918,451 UART: [kat] HMAC-384Kdf
923,109 UART: [kat] LMS
1,171,437 UART: [kat] --
1,172,478 UART: [cold-reset] ++
1,172,942 UART: [fht] FHT @ 0x50003400
1,175,605 UART: [idev] ++
1,175,773 UART: [idev] CDI.KEYID = 6
1,176,133 UART: [idev] SUBJECT.KEYID = 7
1,176,557 UART: [idev] UDS.KEYID = 0
1,176,902 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,497 UART: [idev] Erasing UDS.KEYID = 0
1,201,770 UART: [idev] Sha1 KeyId Algorithm
1,210,268 UART: [idev] --
1,211,140 UART: [ldev] ++
1,211,308 UART: [ldev] CDI.KEYID = 6
1,211,671 UART: [ldev] SUBJECT.KEYID = 5
1,212,097 UART: [ldev] AUTHORITY.KEYID = 7
1,212,560 UART: [ldev] FE.KEYID = 1
1,217,710 UART: [ldev] Erasing FE.KEYID = 1
1,243,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,880 UART: [ldev] --
1,283,349 UART: [fwproc] Wait for Commands...
1,284,047 UART: [fwproc] Recv command 0x46574c44
1,284,775 UART: [fwproc] Recv'd Img size: 114332 bytes
1,550,724 UART: ROM Fatal Error: 0x000B0023
1,551,881 >>> mbox cmd response: failed
1,551,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,887 >>> mbox cmd response: failed
1,551,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,893 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,041 UART: [kat] SHA2-256
893,691 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,816 UART: [kat] ++
897,968 UART: [kat] sha1
902,222 UART: [kat] SHA2-256
904,162 UART: [kat] SHA2-384
907,025 UART: [kat] SHA2-512-ACC
908,926 UART: [kat] ECC-384
918,703 UART: [kat] HMAC-384Kdf
923,265 UART: [kat] LMS
1,171,593 UART: [kat] --
1,172,568 UART: [cold-reset] ++
1,172,976 UART: [fht] FHT @ 0x50003400
1,175,741 UART: [idev] ++
1,175,909 UART: [idev] CDI.KEYID = 6
1,176,269 UART: [idev] SUBJECT.KEYID = 7
1,176,693 UART: [idev] UDS.KEYID = 0
1,177,038 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,555 UART: [idev] Erasing UDS.KEYID = 0
1,201,504 UART: [idev] Sha1 KeyId Algorithm
1,209,994 UART: [idev] --
1,211,286 UART: [ldev] ++
1,211,454 UART: [ldev] CDI.KEYID = 6
1,211,817 UART: [ldev] SUBJECT.KEYID = 5
1,212,243 UART: [ldev] AUTHORITY.KEYID = 7
1,212,706 UART: [ldev] FE.KEYID = 1
1,218,176 UART: [ldev] Erasing FE.KEYID = 1
1,244,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,526 UART: [ldev] --
1,283,883 UART: [fwproc] Wait for Commands...
1,284,551 UART: [fwproc] Recv command 0x46574c44
1,285,279 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,262 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,566 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,379 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,968 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,405,656 >>> mbox cmd response: failed
1,405,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,662 >>> mbox cmd response: failed
1,405,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,668 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,570 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,524 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,922 UART: [state] LifecycleState = Unprovisioned
85,577 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,287 UART: [kat] ++
895,439 UART: [kat] sha1
899,677 UART: [kat] SHA2-256
901,617 UART: [kat] SHA2-384
904,162 UART: [kat] SHA2-512-ACC
906,063 UART: [kat] ECC-384
915,478 UART: [kat] HMAC-384Kdf
920,172 UART: [kat] LMS
1,168,484 UART: [kat] --
1,169,293 UART: [cold-reset] ++
1,169,757 UART: [fht] FHT @ 0x50003400
1,172,499 UART: [idev] ++
1,172,667 UART: [idev] CDI.KEYID = 6
1,173,028 UART: [idev] SUBJECT.KEYID = 7
1,173,453 UART: [idev] UDS.KEYID = 0
1,173,799 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,303 UART: [idev] Erasing UDS.KEYID = 0
1,198,517 UART: [idev] Sha1 KeyId Algorithm
1,207,409 UART: [idev] --
1,208,492 UART: [ldev] ++
1,208,660 UART: [ldev] CDI.KEYID = 6
1,209,024 UART: [ldev] SUBJECT.KEYID = 5
1,209,451 UART: [ldev] AUTHORITY.KEYID = 7
1,209,914 UART: [ldev] FE.KEYID = 1
1,215,042 UART: [ldev] Erasing FE.KEYID = 1
1,241,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,344 UART: [ldev] --
1,280,636 UART: [fwproc] Wait for Commands...
1,281,225 UART: [fwproc] Recv command 0x46574c44
1,281,958 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,272 UART: ROM Fatal Error: 0x000B0023
1,549,429 >>> mbox cmd response: failed
1,549,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,435 >>> mbox cmd response: failed
1,549,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,441 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,573 UART: [kat] SHA2-256
901,513 UART: [kat] SHA2-384
904,076 UART: [kat] SHA2-512-ACC
905,977 UART: [kat] ECC-384
915,672 UART: [kat] HMAC-384Kdf
920,162 UART: [kat] LMS
1,168,474 UART: [kat] --
1,169,413 UART: [cold-reset] ++
1,169,933 UART: [fht] FHT @ 0x50003400
1,172,645 UART: [idev] ++
1,172,813 UART: [idev] CDI.KEYID = 6
1,173,174 UART: [idev] SUBJECT.KEYID = 7
1,173,599 UART: [idev] UDS.KEYID = 0
1,173,945 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,633 UART: [idev] Erasing UDS.KEYID = 0
1,198,905 UART: [idev] Sha1 KeyId Algorithm
1,207,755 UART: [idev] --
1,208,724 UART: [ldev] ++
1,208,892 UART: [ldev] CDI.KEYID = 6
1,209,256 UART: [ldev] SUBJECT.KEYID = 5
1,209,683 UART: [ldev] AUTHORITY.KEYID = 7
1,210,146 UART: [ldev] FE.KEYID = 1
1,215,214 UART: [ldev] Erasing FE.KEYID = 1
1,241,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,788 UART: [ldev] --
1,281,134 UART: [fwproc] Wait for Commands...
1,281,757 UART: [fwproc] Recv command 0x46574c44
1,282,490 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,519 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,828 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,732 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,388 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,324 >>> mbox cmd response: failed
1,401,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,330 >>> mbox cmd response: failed
1,401,330 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,336 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,752 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,802 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Unprovisioned
85,772 UART: [state] DebugLocked = No
86,390 UART: [state] WD Timer not started. Device not locked for debugging
87,641 UART: [kat] SHA2-256
891,191 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,320 UART: [kat] ++
895,472 UART: [kat] sha1
899,654 UART: [kat] SHA2-256
901,594 UART: [kat] SHA2-384
904,297 UART: [kat] SHA2-512-ACC
906,198 UART: [kat] ECC-384
916,075 UART: [kat] HMAC-384Kdf
920,733 UART: [kat] LMS
1,169,045 UART: [kat] --
1,169,574 UART: [cold-reset] ++
1,170,076 UART: [fht] FHT @ 0x50003400
1,172,586 UART: [idev] ++
1,172,754 UART: [idev] CDI.KEYID = 6
1,173,115 UART: [idev] SUBJECT.KEYID = 7
1,173,540 UART: [idev] UDS.KEYID = 0
1,173,886 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,328 UART: [idev] Erasing UDS.KEYID = 0
1,198,450 UART: [idev] Sha1 KeyId Algorithm
1,207,214 UART: [idev] --
1,208,449 UART: [ldev] ++
1,208,617 UART: [ldev] CDI.KEYID = 6
1,208,981 UART: [ldev] SUBJECT.KEYID = 5
1,209,408 UART: [ldev] AUTHORITY.KEYID = 7
1,209,871 UART: [ldev] FE.KEYID = 1
1,214,973 UART: [ldev] Erasing FE.KEYID = 1
1,240,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,059 UART: [ldev] --
1,280,497 UART: [fwproc] Wait for Commands...
1,281,210 UART: [fwproc] Recv command 0x46574c44
1,281,943 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,785 UART: ROM Fatal Error: 0x000B0023
1,549,942 >>> mbox cmd response: failed
1,549,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,948 >>> mbox cmd response: failed
1,549,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,954 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
86,938 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
891,595 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,724 UART: [kat] ++
895,876 UART: [kat] sha1
900,206 UART: [kat] SHA2-256
902,146 UART: [kat] SHA2-384
904,877 UART: [kat] SHA2-512-ACC
906,778 UART: [kat] ECC-384
916,373 UART: [kat] HMAC-384Kdf
920,879 UART: [kat] LMS
1,169,191 UART: [kat] --
1,169,936 UART: [cold-reset] ++
1,170,406 UART: [fht] FHT @ 0x50003400
1,172,992 UART: [idev] ++
1,173,160 UART: [idev] CDI.KEYID = 6
1,173,521 UART: [idev] SUBJECT.KEYID = 7
1,173,946 UART: [idev] UDS.KEYID = 0
1,174,292 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,998 UART: [idev] Erasing UDS.KEYID = 0
1,199,680 UART: [idev] Sha1 KeyId Algorithm
1,208,388 UART: [idev] --
1,209,349 UART: [ldev] ++
1,209,517 UART: [ldev] CDI.KEYID = 6
1,209,881 UART: [ldev] SUBJECT.KEYID = 5
1,210,308 UART: [ldev] AUTHORITY.KEYID = 7
1,210,771 UART: [ldev] FE.KEYID = 1
1,216,127 UART: [ldev] Erasing FE.KEYID = 1
1,242,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,073 UART: [ldev] --
1,281,573 UART: [fwproc] Wait for Commands...
1,282,164 UART: [fwproc] Recv command 0x46574c44
1,282,897 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,318 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,768 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,077 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,945 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,527 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,645 >>> mbox cmd response: failed
1,402,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,651 >>> mbox cmd response: failed
1,402,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,657 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,323 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,159 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,639 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,225 UART: [kat] SHA2-256
882,156 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,271 UART: [kat] ++
886,423 UART: [kat] sha1
890,589 UART: [kat] SHA2-256
892,527 UART: [kat] SHA2-384
895,458 UART: [kat] SHA2-512-ACC
897,359 UART: [kat] ECC-384
903,158 UART: [kat] HMAC-384Kdf
907,856 UART: [kat] LMS
1,476,052 UART: [kat] --
1,476,947 UART: [cold-reset] ++
1,477,493 UART: [fht] Storing FHT @ 0x50003400
1,480,292 UART: [idev] ++
1,480,460 UART: [idev] CDI.KEYID = 6
1,480,820 UART: [idev] SUBJECT.KEYID = 7
1,481,244 UART: [idev] UDS.KEYID = 0
1,481,589 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,126 UART: [idev] Erasing UDS.KEYID = 0
1,506,214 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,776 UART: [idev] --
1,515,671 UART: [ldev] ++
1,515,839 UART: [ldev] CDI.KEYID = 6
1,516,202 UART: [ldev] SUBJECT.KEYID = 5
1,516,628 UART: [ldev] AUTHORITY.KEYID = 7
1,517,091 UART: [ldev] FE.KEYID = 1
1,522,291 UART: [ldev] Erasing FE.KEYID = 1
1,547,450 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,788 UART: [ldev] --
1,587,249 UART: [fwproc] Waiting for Commands...
1,588,072 UART: [fwproc] Received command 0x46574c44
1,588,863 UART: [fwproc] Received Image of size 114332 bytes
1,854,465 UART: ROM Fatal Error: 0x000B0024
1,855,622 >>> mbox cmd response: failed
1,855,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,628 >>> mbox cmd response: failed
1,855,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,634 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,341 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,001 UART: [kat] SHA2-256
881,932 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,047 UART: [kat] ++
886,199 UART: [kat] sha1
890,351 UART: [kat] SHA2-256
892,289 UART: [kat] SHA2-384
895,110 UART: [kat] SHA2-512-ACC
897,011 UART: [kat] ECC-384
902,740 UART: [kat] HMAC-384Kdf
907,490 UART: [kat] LMS
1,475,686 UART: [kat] --
1,476,403 UART: [cold-reset] ++
1,476,827 UART: [fht] Storing FHT @ 0x50003400
1,479,604 UART: [idev] ++
1,479,772 UART: [idev] CDI.KEYID = 6
1,480,132 UART: [idev] SUBJECT.KEYID = 7
1,480,556 UART: [idev] UDS.KEYID = 0
1,480,901 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,336 UART: [idev] Erasing UDS.KEYID = 0
1,504,438 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,224 UART: [idev] --
1,514,099 UART: [ldev] ++
1,514,267 UART: [ldev] CDI.KEYID = 6
1,514,630 UART: [ldev] SUBJECT.KEYID = 5
1,515,056 UART: [ldev] AUTHORITY.KEYID = 7
1,515,519 UART: [ldev] FE.KEYID = 1
1,520,709 UART: [ldev] Erasing FE.KEYID = 1
1,545,790 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,084 UART: [ldev] --
1,585,535 UART: [fwproc] Waiting for Commands...
1,586,228 UART: [fwproc] Received command 0x46574c44
1,587,019 UART: [fwproc] Received Image of size 114332 bytes
2,883,228 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,242 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,594 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,075,467 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,501 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,706,901 >>> mbox cmd response: failed
1,706,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,907 >>> mbox cmd response: failed
1,706,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,913 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,083 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,487 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,650 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,364 UART: [kat] SHA2-256
882,295 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,410 UART: [kat] ++
886,562 UART: [kat] sha1
890,658 UART: [kat] SHA2-256
892,596 UART: [kat] SHA2-384
895,435 UART: [kat] SHA2-512-ACC
897,336 UART: [kat] ECC-384
902,953 UART: [kat] HMAC-384Kdf
907,763 UART: [kat] LMS
1,475,959 UART: [kat] --
1,476,768 UART: [cold-reset] ++
1,477,106 UART: [fht] Storing FHT @ 0x50003400
1,479,655 UART: [idev] ++
1,479,823 UART: [idev] CDI.KEYID = 6
1,480,183 UART: [idev] SUBJECT.KEYID = 7
1,480,607 UART: [idev] UDS.KEYID = 0
1,480,952 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,541 UART: [idev] Erasing UDS.KEYID = 0
1,505,043 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,793 UART: [idev] --
1,514,742 UART: [ldev] ++
1,514,910 UART: [ldev] CDI.KEYID = 6
1,515,273 UART: [ldev] SUBJECT.KEYID = 5
1,515,699 UART: [ldev] AUTHORITY.KEYID = 7
1,516,162 UART: [ldev] FE.KEYID = 1
1,521,426 UART: [ldev] Erasing FE.KEYID = 1
1,547,159 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,841 UART: [ldev] --
1,586,172 UART: [fwproc] Waiting for Commands...
1,586,911 UART: [fwproc] Received command 0x46574c44
1,587,702 UART: [fwproc] Received Image of size 114332 bytes
1,854,666 UART: ROM Fatal Error: 0x000B0024
1,855,823 >>> mbox cmd response: failed
1,855,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,829 >>> mbox cmd response: failed
1,855,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,835 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
86,838 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,524 UART: [kat] SHA2-256
882,455 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,570 UART: [kat] ++
886,722 UART: [kat] sha1
891,088 UART: [kat] SHA2-256
893,026 UART: [kat] SHA2-384
895,805 UART: [kat] SHA2-512-ACC
897,706 UART: [kat] ECC-384
903,351 UART: [kat] HMAC-384Kdf
908,055 UART: [kat] LMS
1,476,251 UART: [kat] --
1,477,010 UART: [cold-reset] ++
1,477,386 UART: [fht] Storing FHT @ 0x50003400
1,480,161 UART: [idev] ++
1,480,329 UART: [idev] CDI.KEYID = 6
1,480,689 UART: [idev] SUBJECT.KEYID = 7
1,481,113 UART: [idev] UDS.KEYID = 0
1,481,458 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,801 UART: [idev] Erasing UDS.KEYID = 0
1,505,975 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,645 UART: [idev] --
1,515,624 UART: [ldev] ++
1,515,792 UART: [ldev] CDI.KEYID = 6
1,516,155 UART: [ldev] SUBJECT.KEYID = 5
1,516,581 UART: [ldev] AUTHORITY.KEYID = 7
1,517,044 UART: [ldev] FE.KEYID = 1
1,522,224 UART: [ldev] Erasing FE.KEYID = 1
1,547,687 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,473 UART: [ldev] --
1,586,936 UART: [fwproc] Waiting for Commands...
1,587,725 UART: [fwproc] Received command 0x46574c44
1,588,516 UART: [fwproc] Received Image of size 114332 bytes
2,887,055 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,355 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,707 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,618 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,818 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,707,948 >>> mbox cmd response: failed
1,707,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,954 >>> mbox cmd response: failed
1,707,954 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,960 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,576 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,800 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,508 UART: [state] LifecycleState = Unprovisioned
86,163 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,978 UART: [kat] SHA2-256
893,628 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,753 UART: [kat] ++
897,905 UART: [kat] sha1
901,975 UART: [kat] SHA2-256
903,915 UART: [kat] SHA2-384
906,614 UART: [kat] SHA2-512-ACC
908,515 UART: [kat] ECC-384
918,216 UART: [kat] HMAC-384Kdf
922,850 UART: [kat] LMS
1,171,178 UART: [kat] --
1,171,937 UART: [cold-reset] ++
1,172,369 UART: [fht] FHT @ 0x50003400
1,174,992 UART: [idev] ++
1,175,160 UART: [idev] CDI.KEYID = 6
1,175,520 UART: [idev] SUBJECT.KEYID = 7
1,175,944 UART: [idev] UDS.KEYID = 0
1,176,289 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,714 UART: [idev] Erasing UDS.KEYID = 0
1,200,505 UART: [idev] Sha1 KeyId Algorithm
1,208,923 UART: [idev] --
1,210,117 UART: [ldev] ++
1,210,285 UART: [ldev] CDI.KEYID = 6
1,210,648 UART: [ldev] SUBJECT.KEYID = 5
1,211,074 UART: [ldev] AUTHORITY.KEYID = 7
1,211,537 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,243,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,225 UART: [ldev] --
1,282,694 UART: [fwproc] Wait for Commands...
1,283,270 UART: [fwproc] Recv command 0x46574c44
1,283,998 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,830 UART: ROM Fatal Error: 0x000B0024
1,550,987 >>> mbox cmd response: failed
1,550,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,993 >>> mbox cmd response: failed
1,550,993 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,999 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,726 UART: [state] LifecycleState = Unprovisioned
86,381 UART: [state] DebugLocked = No
86,961 UART: [state] WD Timer not started. Device not locked for debugging
88,258 UART: [kat] SHA2-256
893,908 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,033 UART: [kat] ++
898,185 UART: [kat] sha1
902,441 UART: [kat] SHA2-256
904,381 UART: [kat] SHA2-384
907,200 UART: [kat] SHA2-512-ACC
909,101 UART: [kat] ECC-384
918,884 UART: [kat] HMAC-384Kdf
923,668 UART: [kat] LMS
1,171,996 UART: [kat] --
1,172,981 UART: [cold-reset] ++
1,173,519 UART: [fht] FHT @ 0x50003400
1,176,170 UART: [idev] ++
1,176,338 UART: [idev] CDI.KEYID = 6
1,176,698 UART: [idev] SUBJECT.KEYID = 7
1,177,122 UART: [idev] UDS.KEYID = 0
1,177,467 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,630 UART: [idev] Erasing UDS.KEYID = 0
1,202,393 UART: [idev] Sha1 KeyId Algorithm
1,210,849 UART: [idev] --
1,211,731 UART: [ldev] ++
1,211,899 UART: [ldev] CDI.KEYID = 6
1,212,262 UART: [ldev] SUBJECT.KEYID = 5
1,212,688 UART: [ldev] AUTHORITY.KEYID = 7
1,213,151 UART: [ldev] FE.KEYID = 1
1,218,117 UART: [ldev] Erasing FE.KEYID = 1
1,244,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,533 UART: [ldev] --
1,283,862 UART: [fwproc] Wait for Commands...
1,284,652 UART: [fwproc] Recv command 0x46574c44
1,285,380 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,461 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,765 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,684 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,217 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,406,092 >>> mbox cmd response: failed
1,406,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,098 >>> mbox cmd response: failed
1,406,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,104 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,227 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,003 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,650 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
893,419 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,544 UART: [kat] ++
897,696 UART: [kat] sha1
902,074 UART: [kat] SHA2-256
904,014 UART: [kat] SHA2-384
906,641 UART: [kat] SHA2-512-ACC
908,542 UART: [kat] ECC-384
918,179 UART: [kat] HMAC-384Kdf
922,831 UART: [kat] LMS
1,171,159 UART: [kat] --
1,172,138 UART: [cold-reset] ++
1,172,586 UART: [fht] FHT @ 0x50003400
1,175,355 UART: [idev] ++
1,175,523 UART: [idev] CDI.KEYID = 6
1,175,883 UART: [idev] SUBJECT.KEYID = 7
1,176,307 UART: [idev] UDS.KEYID = 0
1,176,652 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,271 UART: [idev] Erasing UDS.KEYID = 0
1,201,686 UART: [idev] Sha1 KeyId Algorithm
1,209,956 UART: [idev] --
1,211,034 UART: [ldev] ++
1,211,202 UART: [ldev] CDI.KEYID = 6
1,211,565 UART: [ldev] SUBJECT.KEYID = 5
1,211,991 UART: [ldev] AUTHORITY.KEYID = 7
1,212,454 UART: [ldev] FE.KEYID = 1
1,217,808 UART: [ldev] Erasing FE.KEYID = 1
1,244,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,056 UART: [ldev] --
1,283,561 UART: [fwproc] Wait for Commands...
1,284,321 UART: [fwproc] Recv command 0x46574c44
1,285,049 UART: [fwproc] Recv'd Img size: 114332 bytes
1,551,065 UART: ROM Fatal Error: 0x000B0024
1,552,222 >>> mbox cmd response: failed
1,552,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,228 >>> mbox cmd response: failed
1,552,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,234 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,934 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
893,829 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,954 UART: [kat] ++
898,106 UART: [kat] sha1
902,204 UART: [kat] SHA2-256
904,144 UART: [kat] SHA2-384
906,917 UART: [kat] SHA2-512-ACC
908,818 UART: [kat] ECC-384
918,869 UART: [kat] HMAC-384Kdf
923,529 UART: [kat] LMS
1,171,857 UART: [kat] --
1,172,588 UART: [cold-reset] ++
1,172,920 UART: [fht] FHT @ 0x50003400
1,175,585 UART: [idev] ++
1,175,753 UART: [idev] CDI.KEYID = 6
1,176,113 UART: [idev] SUBJECT.KEYID = 7
1,176,537 UART: [idev] UDS.KEYID = 0
1,176,882 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,843 UART: [idev] Erasing UDS.KEYID = 0
1,201,936 UART: [idev] Sha1 KeyId Algorithm
1,210,578 UART: [idev] --
1,211,734 UART: [ldev] ++
1,211,902 UART: [ldev] CDI.KEYID = 6
1,212,265 UART: [ldev] SUBJECT.KEYID = 5
1,212,691 UART: [ldev] AUTHORITY.KEYID = 7
1,213,154 UART: [ldev] FE.KEYID = 1
1,218,374 UART: [ldev] Erasing FE.KEYID = 1
1,244,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,600 UART: [ldev] --
1,283,875 UART: [fwproc] Wait for Commands...
1,284,479 UART: [fwproc] Recv command 0x46574c44
1,285,207 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,220 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,524 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,357 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,462 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,405,421 >>> mbox cmd response: failed
1,405,421 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,427 >>> mbox cmd response: failed
1,405,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,433 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,420 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,774 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,616 UART: [state] LifecycleState = Unprovisioned
86,271 UART: [state] DebugLocked = No
87,001 UART: [state] WD Timer not started. Device not locked for debugging
88,322 UART: [kat] SHA2-256
891,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,001 UART: [kat] ++
896,153 UART: [kat] sha1
900,447 UART: [kat] SHA2-256
902,387 UART: [kat] SHA2-384
905,094 UART: [kat] SHA2-512-ACC
906,995 UART: [kat] ECC-384
916,586 UART: [kat] HMAC-384Kdf
921,188 UART: [kat] LMS
1,169,500 UART: [kat] --
1,170,595 UART: [cold-reset] ++
1,170,929 UART: [fht] FHT @ 0x50003400
1,173,713 UART: [idev] ++
1,173,881 UART: [idev] CDI.KEYID = 6
1,174,242 UART: [idev] SUBJECT.KEYID = 7
1,174,667 UART: [idev] UDS.KEYID = 0
1,175,013 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,093 UART: [idev] Erasing UDS.KEYID = 0
1,199,955 UART: [idev] Sha1 KeyId Algorithm
1,208,773 UART: [idev] --
1,209,750 UART: [ldev] ++
1,209,918 UART: [ldev] CDI.KEYID = 6
1,210,282 UART: [ldev] SUBJECT.KEYID = 5
1,210,709 UART: [ldev] AUTHORITY.KEYID = 7
1,211,172 UART: [ldev] FE.KEYID = 1
1,216,492 UART: [ldev] Erasing FE.KEYID = 1
1,242,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,804 UART: [ldev] --
1,282,158 UART: [fwproc] Wait for Commands...
1,282,881 UART: [fwproc] Recv command 0x46574c44
1,283,614 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,267 UART: ROM Fatal Error: 0x000B0024
1,550,424 >>> mbox cmd response: failed
1,550,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,430 >>> mbox cmd response: failed
1,550,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,436 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [kat] SHA2-256
891,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,543 UART: [kat] ++
895,695 UART: [kat] sha1
899,923 UART: [kat] SHA2-256
901,863 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,492 UART: [kat] HMAC-384Kdf
921,062 UART: [kat] LMS
1,169,374 UART: [kat] --
1,170,321 UART: [cold-reset] ++
1,170,741 UART: [fht] FHT @ 0x50003400
1,173,261 UART: [idev] ++
1,173,429 UART: [idev] CDI.KEYID = 6
1,173,790 UART: [idev] SUBJECT.KEYID = 7
1,174,215 UART: [idev] UDS.KEYID = 0
1,174,561 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,219 UART: [idev] Erasing UDS.KEYID = 0
1,199,121 UART: [idev] Sha1 KeyId Algorithm
1,208,013 UART: [idev] --
1,209,068 UART: [ldev] ++
1,209,236 UART: [ldev] CDI.KEYID = 6
1,209,600 UART: [ldev] SUBJECT.KEYID = 5
1,210,027 UART: [ldev] AUTHORITY.KEYID = 7
1,210,490 UART: [ldev] FE.KEYID = 1
1,215,508 UART: [ldev] Erasing FE.KEYID = 1
1,241,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,738 UART: [ldev] --
1,281,050 UART: [fwproc] Wait for Commands...
1,281,873 UART: [fwproc] Recv command 0x46574c44
1,282,606 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,625 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,934 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,664 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,972 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,401,325 >>> mbox cmd response: failed
1,401,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,331 >>> mbox cmd response: failed
1,401,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,337 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,538 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,164 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
891,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,744 UART: [kat] ++
895,896 UART: [kat] sha1
900,308 UART: [kat] SHA2-256
902,248 UART: [kat] SHA2-384
904,949 UART: [kat] SHA2-512-ACC
906,850 UART: [kat] ECC-384
916,165 UART: [kat] HMAC-384Kdf
920,823 UART: [kat] LMS
1,169,135 UART: [kat] --
1,170,122 UART: [cold-reset] ++
1,170,546 UART: [fht] FHT @ 0x50003400
1,173,134 UART: [idev] ++
1,173,302 UART: [idev] CDI.KEYID = 6
1,173,663 UART: [idev] SUBJECT.KEYID = 7
1,174,088 UART: [idev] UDS.KEYID = 0
1,174,434 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,282 UART: [idev] Erasing UDS.KEYID = 0
1,199,014 UART: [idev] Sha1 KeyId Algorithm
1,207,704 UART: [idev] --
1,208,903 UART: [ldev] ++
1,209,071 UART: [ldev] CDI.KEYID = 6
1,209,435 UART: [ldev] SUBJECT.KEYID = 5
1,209,862 UART: [ldev] AUTHORITY.KEYID = 7
1,210,325 UART: [ldev] FE.KEYID = 1
1,215,505 UART: [ldev] Erasing FE.KEYID = 1
1,242,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,697 UART: [ldev] --
1,282,169 UART: [fwproc] Wait for Commands...
1,282,838 UART: [fwproc] Recv command 0x46574c44
1,283,571 UART: [fwproc] Recv'd Img size: 114332 bytes
1,550,376 UART: ROM Fatal Error: 0x000B0024
1,551,533 >>> mbox cmd response: failed
1,551,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,539 >>> mbox cmd response: failed
1,551,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,545 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
86,950 UART: [state] WD Timer not started. Device not locked for debugging
88,199 UART: [kat] SHA2-256
891,749 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,878 UART: [kat] ++
896,030 UART: [kat] sha1
900,114 UART: [kat] SHA2-256
902,054 UART: [kat] SHA2-384
904,805 UART: [kat] SHA2-512-ACC
906,706 UART: [kat] ECC-384
916,481 UART: [kat] HMAC-384Kdf
921,077 UART: [kat] LMS
1,169,389 UART: [kat] --
1,170,268 UART: [cold-reset] ++
1,170,674 UART: [fht] FHT @ 0x50003400
1,173,346 UART: [idev] ++
1,173,514 UART: [idev] CDI.KEYID = 6
1,173,875 UART: [idev] SUBJECT.KEYID = 7
1,174,300 UART: [idev] UDS.KEYID = 0
1,174,646 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,306 UART: [idev] Erasing UDS.KEYID = 0
1,199,404 UART: [idev] Sha1 KeyId Algorithm
1,208,258 UART: [idev] --
1,209,473 UART: [ldev] ++
1,209,641 UART: [ldev] CDI.KEYID = 6
1,210,005 UART: [ldev] SUBJECT.KEYID = 5
1,210,432 UART: [ldev] AUTHORITY.KEYID = 7
1,210,895 UART: [ldev] FE.KEYID = 1
1,216,223 UART: [ldev] Erasing FE.KEYID = 1
1,242,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,777 UART: [ldev] --
1,281,191 UART: [fwproc] Wait for Commands...
1,281,974 UART: [fwproc] Recv command 0x46574c44
1,282,707 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,664 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,944 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,253 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,081 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,317 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,560 >>> mbox cmd response: failed
1,402,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,566 >>> mbox cmd response: failed
1,402,566 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,572 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,419 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,939 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,527 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,201 UART: [kat] SHA2-256
882,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,247 UART: [kat] ++
886,399 UART: [kat] sha1
890,759 UART: [kat] SHA2-256
892,697 UART: [kat] SHA2-384
895,436 UART: [kat] SHA2-512-ACC
897,337 UART: [kat] ECC-384
903,032 UART: [kat] HMAC-384Kdf
907,588 UART: [kat] LMS
1,475,784 UART: [kat] --
1,476,517 UART: [cold-reset] ++
1,476,947 UART: [fht] Storing FHT @ 0x50003400
1,479,864 UART: [idev] ++
1,480,032 UART: [idev] CDI.KEYID = 6
1,480,392 UART: [idev] SUBJECT.KEYID = 7
1,480,816 UART: [idev] UDS.KEYID = 0
1,481,161 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,662 UART: [idev] Erasing UDS.KEYID = 0
1,505,270 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,890 UART: [idev] --
1,514,959 UART: [ldev] ++
1,515,127 UART: [ldev] CDI.KEYID = 6
1,515,490 UART: [ldev] SUBJECT.KEYID = 5
1,515,916 UART: [ldev] AUTHORITY.KEYID = 7
1,516,379 UART: [ldev] FE.KEYID = 1
1,521,879 UART: [ldev] Erasing FE.KEYID = 1
1,547,006 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,792 UART: [ldev] --
1,586,305 UART: [fwproc] Waiting for Commands...
1,586,924 UART: [fwproc] Received command 0x46574c44
1,587,715 UART: [fwproc] Received Image of size 114332 bytes
1,853,819 UART: ROM Fatal Error: 0x000B0021
1,854,976 >>> mbox cmd response: failed
1,854,976 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,982 >>> mbox cmd response: failed
1,854,982 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,988 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,179 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,661 UART: [kat] SHA2-256
881,592 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,707 UART: [kat] ++
885,859 UART: [kat] sha1
890,077 UART: [kat] SHA2-256
892,015 UART: [kat] SHA2-384
894,658 UART: [kat] SHA2-512-ACC
896,559 UART: [kat] ECC-384
902,040 UART: [kat] HMAC-384Kdf
906,442 UART: [kat] LMS
1,474,638 UART: [kat] --
1,475,841 UART: [cold-reset] ++
1,476,375 UART: [fht] Storing FHT @ 0x50003400
1,479,162 UART: [idev] ++
1,479,330 UART: [idev] CDI.KEYID = 6
1,479,690 UART: [idev] SUBJECT.KEYID = 7
1,480,114 UART: [idev] UDS.KEYID = 0
1,480,459 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,166 UART: [idev] Erasing UDS.KEYID = 0
1,504,538 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,974 UART: [idev] --
1,514,053 UART: [ldev] ++
1,514,221 UART: [ldev] CDI.KEYID = 6
1,514,584 UART: [ldev] SUBJECT.KEYID = 5
1,515,010 UART: [ldev] AUTHORITY.KEYID = 7
1,515,473 UART: [ldev] FE.KEYID = 1
1,520,713 UART: [ldev] Erasing FE.KEYID = 1
1,545,688 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,412 UART: [ldev] --
1,584,689 UART: [fwproc] Waiting for Commands...
1,585,338 UART: [fwproc] Received command 0x46574c44
1,586,129 UART: [fwproc] Received Image of size 114332 bytes
2,882,776 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,062 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,414 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,075,277 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,991 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,707,579 >>> mbox cmd response: failed
1,707,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,585 >>> mbox cmd response: failed
1,707,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,591 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,607 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,523 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,328 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,936 UART: [kat] SHA2-256
881,867 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,982 UART: [kat] ++
886,134 UART: [kat] sha1
890,554 UART: [kat] SHA2-256
892,492 UART: [kat] SHA2-384
895,145 UART: [kat] SHA2-512-ACC
897,046 UART: [kat] ECC-384
902,975 UART: [kat] HMAC-384Kdf
907,499 UART: [kat] LMS
1,475,695 UART: [kat] --
1,476,562 UART: [cold-reset] ++
1,476,940 UART: [fht] Storing FHT @ 0x50003400
1,479,781 UART: [idev] ++
1,479,949 UART: [idev] CDI.KEYID = 6
1,480,309 UART: [idev] SUBJECT.KEYID = 7
1,480,733 UART: [idev] UDS.KEYID = 0
1,481,078 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,785 UART: [idev] Erasing UDS.KEYID = 0
1,504,959 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,521 UART: [idev] --
1,514,412 UART: [ldev] ++
1,514,580 UART: [ldev] CDI.KEYID = 6
1,514,943 UART: [ldev] SUBJECT.KEYID = 5
1,515,369 UART: [ldev] AUTHORITY.KEYID = 7
1,515,832 UART: [ldev] FE.KEYID = 1
1,520,912 UART: [ldev] Erasing FE.KEYID = 1
1,546,503 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,331 UART: [ldev] --
1,585,678 UART: [fwproc] Waiting for Commands...
1,586,523 UART: [fwproc] Received command 0x46574c44
1,587,314 UART: [fwproc] Received Image of size 114332 bytes
1,853,466 UART: ROM Fatal Error: 0x000B0021
1,854,623 >>> mbox cmd response: failed
1,854,623 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,629 >>> mbox cmd response: failed
1,854,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,635 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,812 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,362 UART: [kat] SHA2-256
882,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,408 UART: [kat] ++
886,560 UART: [kat] sha1
890,682 UART: [kat] SHA2-256
892,620 UART: [kat] SHA2-384
895,527 UART: [kat] SHA2-512-ACC
897,428 UART: [kat] ECC-384
902,873 UART: [kat] HMAC-384Kdf
907,327 UART: [kat] LMS
1,475,523 UART: [kat] --
1,476,496 UART: [cold-reset] ++
1,476,892 UART: [fht] Storing FHT @ 0x50003400
1,479,785 UART: [idev] ++
1,479,953 UART: [idev] CDI.KEYID = 6
1,480,313 UART: [idev] SUBJECT.KEYID = 7
1,480,737 UART: [idev] UDS.KEYID = 0
1,481,082 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,749 UART: [idev] Erasing UDS.KEYID = 0
1,505,379 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,007 UART: [idev] --
1,515,106 UART: [ldev] ++
1,515,274 UART: [ldev] CDI.KEYID = 6
1,515,637 UART: [ldev] SUBJECT.KEYID = 5
1,516,063 UART: [ldev] AUTHORITY.KEYID = 7
1,516,526 UART: [ldev] FE.KEYID = 1
1,521,502 UART: [ldev] Erasing FE.KEYID = 1
1,546,497 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,141 UART: [ldev] --
1,585,490 UART: [fwproc] Waiting for Commands...
1,586,217 UART: [fwproc] Received command 0x46574c44
1,587,008 UART: [fwproc] Received Image of size 114332 bytes
2,883,421 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,121 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,473 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,380 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,452 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,707,082 >>> mbox cmd response: failed
1,707,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,088 >>> mbox cmd response: failed
1,707,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,094 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,652 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,548 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,135 UART: [state] WD Timer not started. Device not locked for debugging
87,436 UART: [kat] SHA2-256
893,086 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,211 UART: [kat] ++
897,363 UART: [kat] sha1
901,601 UART: [kat] SHA2-256
903,541 UART: [kat] SHA2-384
906,330 UART: [kat] SHA2-512-ACC
908,231 UART: [kat] ECC-384
917,958 UART: [kat] HMAC-384Kdf
922,576 UART: [kat] LMS
1,170,904 UART: [kat] --
1,171,949 UART: [cold-reset] ++
1,172,465 UART: [fht] FHT @ 0x50003400
1,175,158 UART: [idev] ++
1,175,326 UART: [idev] CDI.KEYID = 6
1,175,686 UART: [idev] SUBJECT.KEYID = 7
1,176,110 UART: [idev] UDS.KEYID = 0
1,176,455 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,201,221 UART: [idev] Sha1 KeyId Algorithm
1,209,605 UART: [idev] --
1,210,721 UART: [ldev] ++
1,210,889 UART: [ldev] CDI.KEYID = 6
1,211,252 UART: [ldev] SUBJECT.KEYID = 5
1,211,678 UART: [ldev] AUTHORITY.KEYID = 7
1,212,141 UART: [ldev] FE.KEYID = 1
1,217,419 UART: [ldev] Erasing FE.KEYID = 1
1,244,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,945 UART: [ldev] --
1,283,320 UART: [fwproc] Wait for Commands...
1,283,940 UART: [fwproc] Recv command 0x46574c44
1,284,668 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,772 UART: ROM Fatal Error: 0x000B0021
1,550,929 >>> mbox cmd response: failed
1,550,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,935 >>> mbox cmd response: failed
1,550,935 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,941 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,979 UART: [kat] SHA2-256
903,919 UART: [kat] SHA2-384
906,482 UART: [kat] SHA2-512-ACC
908,383 UART: [kat] ECC-384
917,970 UART: [kat] HMAC-384Kdf
922,702 UART: [kat] LMS
1,171,030 UART: [kat] --
1,171,765 UART: [cold-reset] ++
1,172,233 UART: [fht] FHT @ 0x50003400
1,174,900 UART: [idev] ++
1,175,068 UART: [idev] CDI.KEYID = 6
1,175,428 UART: [idev] SUBJECT.KEYID = 7
1,175,852 UART: [idev] UDS.KEYID = 0
1,176,197 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,296 UART: [idev] Erasing UDS.KEYID = 0
1,200,923 UART: [idev] Sha1 KeyId Algorithm
1,209,247 UART: [idev] --
1,210,299 UART: [ldev] ++
1,210,467 UART: [ldev] CDI.KEYID = 6
1,210,830 UART: [ldev] SUBJECT.KEYID = 5
1,211,256 UART: [ldev] AUTHORITY.KEYID = 7
1,211,719 UART: [ldev] FE.KEYID = 1
1,217,075 UART: [ldev] Erasing FE.KEYID = 1
1,243,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,373 UART: [ldev] --
1,282,694 UART: [fwproc] Wait for Commands...
1,283,418 UART: [fwproc] Recv command 0x46574c44
1,284,146 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,373 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,677 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,406 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,131 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,405,308 >>> mbox cmd response: failed
1,405,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,314 >>> mbox cmd response: failed
1,405,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,320 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,733 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,451 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,924 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
893,767 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,892 UART: [kat] ++
898,044 UART: [kat] sha1
902,054 UART: [kat] SHA2-256
903,994 UART: [kat] SHA2-384
906,707 UART: [kat] SHA2-512-ACC
908,608 UART: [kat] ECC-384
918,509 UART: [kat] HMAC-384Kdf
923,175 UART: [kat] LMS
1,171,503 UART: [kat] --
1,172,204 UART: [cold-reset] ++
1,172,670 UART: [fht] FHT @ 0x50003400
1,175,371 UART: [idev] ++
1,175,539 UART: [idev] CDI.KEYID = 6
1,175,899 UART: [idev] SUBJECT.KEYID = 7
1,176,323 UART: [idev] UDS.KEYID = 0
1,176,668 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,457 UART: [idev] Erasing UDS.KEYID = 0
1,202,266 UART: [idev] Sha1 KeyId Algorithm
1,210,708 UART: [idev] --
1,211,760 UART: [ldev] ++
1,211,928 UART: [ldev] CDI.KEYID = 6
1,212,291 UART: [ldev] SUBJECT.KEYID = 5
1,212,717 UART: [ldev] AUTHORITY.KEYID = 7
1,213,180 UART: [ldev] FE.KEYID = 1
1,218,406 UART: [ldev] Erasing FE.KEYID = 1
1,244,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,758 UART: [ldev] --
1,284,151 UART: [fwproc] Wait for Commands...
1,284,741 UART: [fwproc] Recv command 0x46574c44
1,285,469 UART: [fwproc] Recv'd Img size: 114332 bytes
1,551,919 UART: ROM Fatal Error: 0x000B0021
1,553,076 >>> mbox cmd response: failed
1,553,076 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,553,082 >>> mbox cmd response: failed
1,553,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,553,088 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
893,695 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,820 UART: [kat] ++
897,972 UART: [kat] sha1
902,358 UART: [kat] SHA2-256
904,298 UART: [kat] SHA2-384
907,065 UART: [kat] SHA2-512-ACC
908,966 UART: [kat] ECC-384
918,935 UART: [kat] HMAC-384Kdf
923,423 UART: [kat] LMS
1,171,751 UART: [kat] --
1,172,362 UART: [cold-reset] ++
1,172,742 UART: [fht] FHT @ 0x50003400
1,175,325 UART: [idev] ++
1,175,493 UART: [idev] CDI.KEYID = 6
1,175,853 UART: [idev] SUBJECT.KEYID = 7
1,176,277 UART: [idev] UDS.KEYID = 0
1,176,622 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,271 UART: [idev] Erasing UDS.KEYID = 0
1,201,304 UART: [idev] Sha1 KeyId Algorithm
1,209,786 UART: [idev] --
1,210,820 UART: [ldev] ++
1,210,988 UART: [ldev] CDI.KEYID = 6
1,211,351 UART: [ldev] SUBJECT.KEYID = 5
1,211,777 UART: [ldev] AUTHORITY.KEYID = 7
1,212,240 UART: [ldev] FE.KEYID = 1
1,217,516 UART: [ldev] Erasing FE.KEYID = 1
1,244,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,122 UART: [ldev] --
1,283,633 UART: [fwproc] Wait for Commands...
1,284,243 UART: [fwproc] Recv command 0x46574c44
1,284,971 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,608 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,912 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,783 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,806 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,407,829 >>> mbox cmd response: failed
1,407,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,835 >>> mbox cmd response: failed
1,407,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,841 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,558 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,176 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
891,276 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,405 UART: [kat] ++
895,557 UART: [kat] sha1
899,907 UART: [kat] SHA2-256
901,847 UART: [kat] SHA2-384
904,680 UART: [kat] SHA2-512-ACC
906,581 UART: [kat] ECC-384
916,358 UART: [kat] HMAC-384Kdf
920,782 UART: [kat] LMS
1,169,094 UART: [kat] --
1,169,973 UART: [cold-reset] ++
1,170,339 UART: [fht] FHT @ 0x50003400
1,173,015 UART: [idev] ++
1,173,183 UART: [idev] CDI.KEYID = 6
1,173,544 UART: [idev] SUBJECT.KEYID = 7
1,173,969 UART: [idev] UDS.KEYID = 0
1,174,315 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,201 UART: [idev] Erasing UDS.KEYID = 0
1,198,807 UART: [idev] Sha1 KeyId Algorithm
1,207,611 UART: [idev] --
1,208,714 UART: [ldev] ++
1,208,882 UART: [ldev] CDI.KEYID = 6
1,209,246 UART: [ldev] SUBJECT.KEYID = 5
1,209,673 UART: [ldev] AUTHORITY.KEYID = 7
1,210,136 UART: [ldev] FE.KEYID = 1
1,215,258 UART: [ldev] Erasing FE.KEYID = 1
1,241,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,390 UART: [ldev] --
1,280,716 UART: [fwproc] Wait for Commands...
1,281,489 UART: [fwproc] Recv command 0x46574c44
1,282,222 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,137 UART: ROM Fatal Error: 0x000B0021
1,549,294 >>> mbox cmd response: failed
1,549,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,300 >>> mbox cmd response: failed
1,549,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,306 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,161 UART: [state] WD Timer not started. Device not locked for debugging
87,318 UART: [kat] SHA2-256
890,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,997 UART: [kat] ++
895,149 UART: [kat] sha1
899,373 UART: [kat] SHA2-256
901,313 UART: [kat] SHA2-384
904,054 UART: [kat] SHA2-512-ACC
905,955 UART: [kat] ECC-384
915,842 UART: [kat] HMAC-384Kdf
920,376 UART: [kat] LMS
1,168,688 UART: [kat] --
1,169,679 UART: [cold-reset] ++
1,170,125 UART: [fht] FHT @ 0x50003400
1,172,985 UART: [idev] ++
1,173,153 UART: [idev] CDI.KEYID = 6
1,173,514 UART: [idev] SUBJECT.KEYID = 7
1,173,939 UART: [idev] UDS.KEYID = 0
1,174,285 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,019 UART: [idev] Erasing UDS.KEYID = 0
1,198,671 UART: [idev] Sha1 KeyId Algorithm
1,207,577 UART: [idev] --
1,208,612 UART: [ldev] ++
1,208,780 UART: [ldev] CDI.KEYID = 6
1,209,144 UART: [ldev] SUBJECT.KEYID = 5
1,209,571 UART: [ldev] AUTHORITY.KEYID = 7
1,210,034 UART: [ldev] FE.KEYID = 1
1,215,622 UART: [ldev] Erasing FE.KEYID = 1
1,240,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,902 UART: [ldev] --
1,280,246 UART: [fwproc] Wait for Commands...
1,280,859 UART: [fwproc] Recv command 0x46574c44
1,281,592 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,073 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,382 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,226 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,464 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,400,579 >>> mbox cmd response: failed
1,400,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,400,585 >>> mbox cmd response: failed
1,400,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,400,591 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,144 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,994 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,536 UART: [kat] ++
895,688 UART: [kat] sha1
899,908 UART: [kat] SHA2-256
901,848 UART: [kat] SHA2-384
904,571 UART: [kat] SHA2-512-ACC
906,472 UART: [kat] ECC-384
916,293 UART: [kat] HMAC-384Kdf
920,907 UART: [kat] LMS
1,169,219 UART: [kat] --
1,170,290 UART: [cold-reset] ++
1,170,830 UART: [fht] FHT @ 0x50003400
1,173,298 UART: [idev] ++
1,173,466 UART: [idev] CDI.KEYID = 6
1,173,827 UART: [idev] SUBJECT.KEYID = 7
1,174,252 UART: [idev] UDS.KEYID = 0
1,174,598 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,762 UART: [idev] Erasing UDS.KEYID = 0
1,199,966 UART: [idev] Sha1 KeyId Algorithm
1,208,770 UART: [idev] --
1,209,755 UART: [ldev] ++
1,209,923 UART: [ldev] CDI.KEYID = 6
1,210,287 UART: [ldev] SUBJECT.KEYID = 5
1,210,714 UART: [ldev] AUTHORITY.KEYID = 7
1,211,177 UART: [ldev] FE.KEYID = 1
1,216,471 UART: [ldev] Erasing FE.KEYID = 1
1,242,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,743 UART: [ldev] --
1,281,131 UART: [fwproc] Wait for Commands...
1,281,934 UART: [fwproc] Recv command 0x46574c44
1,282,667 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,046 UART: ROM Fatal Error: 0x000B0021
1,549,203 >>> mbox cmd response: failed
1,549,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,209 >>> mbox cmd response: failed
1,549,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,215 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [kat] SHA2-256
891,601 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,730 UART: [kat] ++
895,882 UART: [kat] sha1
900,162 UART: [kat] SHA2-256
902,102 UART: [kat] SHA2-384
904,953 UART: [kat] SHA2-512-ACC
906,854 UART: [kat] ECC-384
916,823 UART: [kat] HMAC-384Kdf
921,455 UART: [kat] LMS
1,169,767 UART: [kat] --
1,170,842 UART: [cold-reset] ++
1,171,196 UART: [fht] FHT @ 0x50003400
1,173,718 UART: [idev] ++
1,173,886 UART: [idev] CDI.KEYID = 6
1,174,247 UART: [idev] SUBJECT.KEYID = 7
1,174,672 UART: [idev] UDS.KEYID = 0
1,175,018 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,908 UART: [idev] Erasing UDS.KEYID = 0
1,199,884 UART: [idev] Sha1 KeyId Algorithm
1,208,832 UART: [idev] --
1,210,023 UART: [ldev] ++
1,210,191 UART: [ldev] CDI.KEYID = 6
1,210,555 UART: [ldev] SUBJECT.KEYID = 5
1,210,982 UART: [ldev] AUTHORITY.KEYID = 7
1,211,445 UART: [ldev] FE.KEYID = 1
1,216,727 UART: [ldev] Erasing FE.KEYID = 1
1,242,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,517 UART: [ldev] --
1,281,813 UART: [fwproc] Wait for Commands...
1,282,480 UART: [fwproc] Recv command 0x46574c44
1,283,213 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,898 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,207 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,113 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,061 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,403,156 >>> mbox cmd response: failed
1,403,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,162 >>> mbox cmd response: failed
1,403,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,168 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,199 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,259 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,463 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,129 UART: [kat] SHA2-256
882,060 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,175 UART: [kat] ++
886,327 UART: [kat] sha1
890,705 UART: [kat] SHA2-256
892,643 UART: [kat] SHA2-384
895,370 UART: [kat] SHA2-512-ACC
897,271 UART: [kat] ECC-384
902,848 UART: [kat] HMAC-384Kdf
907,586 UART: [kat] LMS
1,475,782 UART: [kat] --
1,476,805 UART: [cold-reset] ++
1,477,283 UART: [fht] Storing FHT @ 0x50003400
1,480,030 UART: [idev] ++
1,480,198 UART: [idev] CDI.KEYID = 6
1,480,558 UART: [idev] SUBJECT.KEYID = 7
1,480,982 UART: [idev] UDS.KEYID = 0
1,481,327 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,702 UART: [idev] Erasing UDS.KEYID = 0
1,505,938 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,580 UART: [idev] --
1,515,635 UART: [ldev] ++
1,515,803 UART: [ldev] CDI.KEYID = 6
1,516,166 UART: [ldev] SUBJECT.KEYID = 5
1,516,592 UART: [ldev] AUTHORITY.KEYID = 7
1,517,055 UART: [ldev] FE.KEYID = 1
1,522,281 UART: [ldev] Erasing FE.KEYID = 1
1,547,998 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,312 UART: [ldev] --
1,586,585 UART: [fwproc] Waiting for Commands...
1,587,386 UART: [fwproc] Received command 0x46574c44
1,588,177 UART: [fwproc] Received Image of size 114332 bytes
1,854,269 UART: ROM Fatal Error: 0x000B0022
1,855,426 >>> mbox cmd response: failed
1,855,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,432 >>> mbox cmd response: failed
1,855,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,438 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,035 UART: [kat] SHA2-256
881,966 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,081 UART: [kat] ++
886,233 UART: [kat] sha1
890,393 UART: [kat] SHA2-256
892,331 UART: [kat] SHA2-384
894,872 UART: [kat] SHA2-512-ACC
896,773 UART: [kat] ECC-384
902,336 UART: [kat] HMAC-384Kdf
906,946 UART: [kat] LMS
1,475,142 UART: [kat] --
1,476,151 UART: [cold-reset] ++
1,476,487 UART: [fht] Storing FHT @ 0x50003400
1,479,362 UART: [idev] ++
1,479,530 UART: [idev] CDI.KEYID = 6
1,479,890 UART: [idev] SUBJECT.KEYID = 7
1,480,314 UART: [idev] UDS.KEYID = 0
1,480,659 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,356 UART: [idev] Erasing UDS.KEYID = 0
1,505,092 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,742 UART: [idev] --
1,514,853 UART: [ldev] ++
1,515,021 UART: [ldev] CDI.KEYID = 6
1,515,384 UART: [ldev] SUBJECT.KEYID = 5
1,515,810 UART: [ldev] AUTHORITY.KEYID = 7
1,516,273 UART: [ldev] FE.KEYID = 1
1,521,393 UART: [ldev] Erasing FE.KEYID = 1
1,547,088 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,242 UART: [ldev] --
1,586,531 UART: [fwproc] Waiting for Commands...
1,587,238 UART: [fwproc] Received command 0x46574c44
1,588,029 UART: [fwproc] Received Image of size 114332 bytes
2,885,694 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,924 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,276 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,225 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,679 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,706,277 >>> mbox cmd response: failed
1,706,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,283 >>> mbox cmd response: failed
1,706,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,289 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,287 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,859 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,504 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,084 UART: [kat] SHA2-256
882,015 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,130 UART: [kat] ++
886,282 UART: [kat] sha1
890,460 UART: [kat] SHA2-256
892,398 UART: [kat] SHA2-384
895,049 UART: [kat] SHA2-512-ACC
896,950 UART: [kat] ECC-384
902,805 UART: [kat] HMAC-384Kdf
907,519 UART: [kat] LMS
1,475,715 UART: [kat] --
1,476,694 UART: [cold-reset] ++
1,477,046 UART: [fht] Storing FHT @ 0x50003400
1,479,889 UART: [idev] ++
1,480,057 UART: [idev] CDI.KEYID = 6
1,480,417 UART: [idev] SUBJECT.KEYID = 7
1,480,841 UART: [idev] UDS.KEYID = 0
1,481,186 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,543 UART: [idev] Erasing UDS.KEYID = 0
1,505,481 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,297 UART: [idev] --
1,515,338 UART: [ldev] ++
1,515,506 UART: [ldev] CDI.KEYID = 6
1,515,869 UART: [ldev] SUBJECT.KEYID = 5
1,516,295 UART: [ldev] AUTHORITY.KEYID = 7
1,516,758 UART: [ldev] FE.KEYID = 1
1,521,966 UART: [ldev] Erasing FE.KEYID = 1
1,547,627 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,123 UART: [ldev] --
1,586,458 UART: [fwproc] Waiting for Commands...
1,587,115 UART: [fwproc] Received command 0x46574c44
1,587,906 UART: [fwproc] Received Image of size 114332 bytes
1,855,034 UART: ROM Fatal Error: 0x000B0022
1,856,191 >>> mbox cmd response: failed
1,856,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,197 >>> mbox cmd response: failed
1,856,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,203 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,120 UART: [kat] SHA2-256
882,051 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,166 UART: [kat] ++
886,318 UART: [kat] sha1
890,478 UART: [kat] SHA2-256
892,416 UART: [kat] SHA2-384
895,015 UART: [kat] SHA2-512-ACC
896,916 UART: [kat] ECC-384
902,639 UART: [kat] HMAC-384Kdf
907,241 UART: [kat] LMS
1,475,437 UART: [kat] --
1,476,500 UART: [cold-reset] ++
1,477,024 UART: [fht] Storing FHT @ 0x50003400
1,480,007 UART: [idev] ++
1,480,175 UART: [idev] CDI.KEYID = 6
1,480,535 UART: [idev] SUBJECT.KEYID = 7
1,480,959 UART: [idev] UDS.KEYID = 0
1,481,304 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,947 UART: [idev] Erasing UDS.KEYID = 0
1,505,601 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,387 UART: [idev] --
1,515,536 UART: [ldev] ++
1,515,704 UART: [ldev] CDI.KEYID = 6
1,516,067 UART: [ldev] SUBJECT.KEYID = 5
1,516,493 UART: [ldev] AUTHORITY.KEYID = 7
1,516,956 UART: [ldev] FE.KEYID = 1
1,522,094 UART: [ldev] Erasing FE.KEYID = 1
1,547,603 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,935 UART: [ldev] --
1,586,208 UART: [fwproc] Waiting for Commands...
1,587,049 UART: [fwproc] Received command 0x46574c44
1,587,840 UART: [fwproc] Received Image of size 114332 bytes
2,884,715 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,721 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,073 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,898 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,296 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,707,376 >>> mbox cmd response: failed
1,707,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,382 >>> mbox cmd response: failed
1,707,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,388 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,818 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,128 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
893,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,409 UART: [kat] ++
897,561 UART: [kat] sha1
901,887 UART: [kat] SHA2-256
903,827 UART: [kat] SHA2-384
906,482 UART: [kat] SHA2-512-ACC
908,383 UART: [kat] ECC-384
918,188 UART: [kat] HMAC-384Kdf
922,808 UART: [kat] LMS
1,171,136 UART: [kat] --
1,171,843 UART: [cold-reset] ++
1,172,205 UART: [fht] FHT @ 0x50003400
1,174,860 UART: [idev] ++
1,175,028 UART: [idev] CDI.KEYID = 6
1,175,388 UART: [idev] SUBJECT.KEYID = 7
1,175,812 UART: [idev] UDS.KEYID = 0
1,176,157 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,418 UART: [idev] Erasing UDS.KEYID = 0
1,200,417 UART: [idev] Sha1 KeyId Algorithm
1,208,947 UART: [idev] --
1,210,003 UART: [ldev] ++
1,210,171 UART: [ldev] CDI.KEYID = 6
1,210,534 UART: [ldev] SUBJECT.KEYID = 5
1,210,960 UART: [ldev] AUTHORITY.KEYID = 7
1,211,423 UART: [ldev] FE.KEYID = 1
1,216,723 UART: [ldev] Erasing FE.KEYID = 1
1,243,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,733 UART: [ldev] --
1,282,206 UART: [fwproc] Wait for Commands...
1,282,910 UART: [fwproc] Recv command 0x46574c44
1,283,638 UART: [fwproc] Recv'd Img size: 114332 bytes
1,549,292 UART: ROM Fatal Error: 0x000B0022
1,550,449 >>> mbox cmd response: failed
1,550,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,455 >>> mbox cmd response: failed
1,550,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,461 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,505 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
893,390 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,515 UART: [kat] ++
897,667 UART: [kat] sha1
901,997 UART: [kat] SHA2-256
903,937 UART: [kat] SHA2-384
906,656 UART: [kat] SHA2-512-ACC
908,557 UART: [kat] ECC-384
917,886 UART: [kat] HMAC-384Kdf
922,614 UART: [kat] LMS
1,170,942 UART: [kat] --
1,171,945 UART: [cold-reset] ++
1,172,509 UART: [fht] FHT @ 0x50003400
1,175,182 UART: [idev] ++
1,175,350 UART: [idev] CDI.KEYID = 6
1,175,710 UART: [idev] SUBJECT.KEYID = 7
1,176,134 UART: [idev] UDS.KEYID = 0
1,176,479 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,134 UART: [idev] Erasing UDS.KEYID = 0
1,201,159 UART: [idev] Sha1 KeyId Algorithm
1,209,783 UART: [idev] --
1,211,017 UART: [ldev] ++
1,211,185 UART: [ldev] CDI.KEYID = 6
1,211,548 UART: [ldev] SUBJECT.KEYID = 5
1,211,974 UART: [ldev] AUTHORITY.KEYID = 7
1,212,437 UART: [ldev] FE.KEYID = 1
1,217,905 UART: [ldev] Erasing FE.KEYID = 1
1,244,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,077 UART: [ldev] --
1,283,390 UART: [fwproc] Wait for Commands...
1,284,124 UART: [fwproc] Recv command 0x46574c44
1,284,852 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,433 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,737 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,542 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,927 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,406,384 >>> mbox cmd response: failed
1,406,384 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,390 >>> mbox cmd response: failed
1,406,390 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,396 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,063 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,413 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,751 UART: [state] LifecycleState = Unprovisioned
86,406 UART: [state] DebugLocked = No
87,096 UART: [state] WD Timer not started. Device not locked for debugging
88,455 UART: [kat] SHA2-256
894,105 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,230 UART: [kat] ++
898,382 UART: [kat] sha1
902,670 UART: [kat] SHA2-256
904,610 UART: [kat] SHA2-384
907,261 UART: [kat] SHA2-512-ACC
909,162 UART: [kat] ECC-384
918,835 UART: [kat] HMAC-384Kdf
923,511 UART: [kat] LMS
1,171,839 UART: [kat] --
1,172,734 UART: [cold-reset] ++
1,173,280 UART: [fht] FHT @ 0x50003400
1,176,143 UART: [idev] ++
1,176,311 UART: [idev] CDI.KEYID = 6
1,176,671 UART: [idev] SUBJECT.KEYID = 7
1,177,095 UART: [idev] UDS.KEYID = 0
1,177,440 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,435 UART: [idev] Erasing UDS.KEYID = 0
1,202,440 UART: [idev] Sha1 KeyId Algorithm
1,210,862 UART: [idev] --
1,211,958 UART: [ldev] ++
1,212,126 UART: [ldev] CDI.KEYID = 6
1,212,489 UART: [ldev] SUBJECT.KEYID = 5
1,212,915 UART: [ldev] AUTHORITY.KEYID = 7
1,213,378 UART: [ldev] FE.KEYID = 1
1,218,710 UART: [ldev] Erasing FE.KEYID = 1
1,245,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,292 UART: [ldev] --
1,284,789 UART: [fwproc] Wait for Commands...
1,285,393 UART: [fwproc] Recv command 0x46574c44
1,286,121 UART: [fwproc] Recv'd Img size: 114332 bytes
1,552,705 UART: ROM Fatal Error: 0x000B0022
1,553,862 >>> mbox cmd response: failed
1,553,862 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,553,868 >>> mbox cmd response: failed
1,553,868 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,553,874 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,724 UART: [state] WD Timer not started. Device not locked for debugging
88,063 UART: [kat] SHA2-256
893,713 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,838 UART: [kat] ++
897,990 UART: [kat] sha1
902,318 UART: [kat] SHA2-256
904,258 UART: [kat] SHA2-384
906,873 UART: [kat] SHA2-512-ACC
908,774 UART: [kat] ECC-384
918,925 UART: [kat] HMAC-384Kdf
923,491 UART: [kat] LMS
1,171,819 UART: [kat] --
1,172,618 UART: [cold-reset] ++
1,172,952 UART: [fht] FHT @ 0x50003400
1,175,635 UART: [idev] ++
1,175,803 UART: [idev] CDI.KEYID = 6
1,176,163 UART: [idev] SUBJECT.KEYID = 7
1,176,587 UART: [idev] UDS.KEYID = 0
1,176,932 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,879 UART: [idev] Erasing UDS.KEYID = 0
1,202,084 UART: [idev] Sha1 KeyId Algorithm
1,210,698 UART: [idev] --
1,211,600 UART: [ldev] ++
1,211,768 UART: [ldev] CDI.KEYID = 6
1,212,131 UART: [ldev] SUBJECT.KEYID = 5
1,212,557 UART: [ldev] AUTHORITY.KEYID = 7
1,213,020 UART: [ldev] FE.KEYID = 1
1,218,156 UART: [ldev] Erasing FE.KEYID = 1
1,244,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,632 UART: [ldev] --
1,283,989 UART: [fwproc] Wait for Commands...
1,284,569 UART: [fwproc] Recv command 0x46574c44
1,285,297 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,756 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,587 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,026 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,408,585 >>> mbox cmd response: failed
1,408,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,408,591 >>> mbox cmd response: failed
1,408,591 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,408,597 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,106 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,876 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,636 UART: [state] LifecycleState = Unprovisioned
85,291 UART: [state] DebugLocked = No
85,963 UART: [state] WD Timer not started. Device not locked for debugging
87,096 UART: [kat] SHA2-256
890,646 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,775 UART: [kat] ++
894,927 UART: [kat] sha1
899,031 UART: [kat] SHA2-256
900,971 UART: [kat] SHA2-384
903,862 UART: [kat] SHA2-512-ACC
905,763 UART: [kat] ECC-384
915,618 UART: [kat] HMAC-384Kdf
920,322 UART: [kat] LMS
1,168,634 UART: [kat] --
1,169,435 UART: [cold-reset] ++
1,169,861 UART: [fht] FHT @ 0x50003400
1,172,301 UART: [idev] ++
1,172,469 UART: [idev] CDI.KEYID = 6
1,172,830 UART: [idev] SUBJECT.KEYID = 7
1,173,255 UART: [idev] UDS.KEYID = 0
1,173,601 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,815 UART: [idev] Erasing UDS.KEYID = 0
1,197,977 UART: [idev] Sha1 KeyId Algorithm
1,206,879 UART: [idev] --
1,207,904 UART: [ldev] ++
1,208,072 UART: [ldev] CDI.KEYID = 6
1,208,436 UART: [ldev] SUBJECT.KEYID = 5
1,208,863 UART: [ldev] AUTHORITY.KEYID = 7
1,209,326 UART: [ldev] FE.KEYID = 1
1,214,774 UART: [ldev] Erasing FE.KEYID = 1
1,240,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,714 UART: [ldev] --
1,280,046 UART: [fwproc] Wait for Commands...
1,280,621 UART: [fwproc] Recv command 0x46574c44
1,281,354 UART: [fwproc] Recv'd Img size: 114332 bytes
1,547,899 UART: ROM Fatal Error: 0x000B0022
1,549,056 >>> mbox cmd response: failed
1,549,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,062 >>> mbox cmd response: failed
1,549,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,068 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,713 UART: [state] WD Timer not started. Device not locked for debugging
87,988 UART: [kat] SHA2-256
891,538 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,667 UART: [kat] ++
895,819 UART: [kat] sha1
899,937 UART: [kat] SHA2-256
901,877 UART: [kat] SHA2-384
904,766 UART: [kat] SHA2-512-ACC
906,667 UART: [kat] ECC-384
916,048 UART: [kat] HMAC-384Kdf
920,754 UART: [kat] LMS
1,169,066 UART: [kat] --
1,169,777 UART: [cold-reset] ++
1,170,257 UART: [fht] FHT @ 0x50003400
1,172,919 UART: [idev] ++
1,173,087 UART: [idev] CDI.KEYID = 6
1,173,448 UART: [idev] SUBJECT.KEYID = 7
1,173,873 UART: [idev] UDS.KEYID = 0
1,174,219 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,753 UART: [idev] Erasing UDS.KEYID = 0
1,198,955 UART: [idev] Sha1 KeyId Algorithm
1,207,873 UART: [idev] --
1,208,940 UART: [ldev] ++
1,209,108 UART: [ldev] CDI.KEYID = 6
1,209,472 UART: [ldev] SUBJECT.KEYID = 5
1,209,899 UART: [ldev] AUTHORITY.KEYID = 7
1,210,362 UART: [ldev] FE.KEYID = 1
1,215,430 UART: [ldev] Erasing FE.KEYID = 1
1,241,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,796 UART: [ldev] --
1,281,238 UART: [fwproc] Wait for Commands...
1,281,847 UART: [fwproc] Recv command 0x46574c44
1,282,580 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,991 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,300 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,026 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,418 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,400,915 >>> mbox cmd response: failed
1,400,915 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,400,921 >>> mbox cmd response: failed
1,400,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,400,927 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,508 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,830 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,328 UART: [state] WD Timer not started. Device not locked for debugging
87,535 UART: [kat] SHA2-256
891,085 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,214 UART: [kat] ++
895,366 UART: [kat] sha1
899,472 UART: [kat] SHA2-256
901,412 UART: [kat] SHA2-384
904,093 UART: [kat] SHA2-512-ACC
905,994 UART: [kat] ECC-384
915,751 UART: [kat] HMAC-384Kdf
920,357 UART: [kat] LMS
1,168,669 UART: [kat] --
1,169,814 UART: [cold-reset] ++
1,170,224 UART: [fht] FHT @ 0x50003400
1,173,088 UART: [idev] ++
1,173,256 UART: [idev] CDI.KEYID = 6
1,173,617 UART: [idev] SUBJECT.KEYID = 7
1,174,042 UART: [idev] UDS.KEYID = 0
1,174,388 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,926 UART: [idev] Erasing UDS.KEYID = 0
1,199,112 UART: [idev] Sha1 KeyId Algorithm
1,207,948 UART: [idev] --
1,209,031 UART: [ldev] ++
1,209,199 UART: [ldev] CDI.KEYID = 6
1,209,563 UART: [ldev] SUBJECT.KEYID = 5
1,209,990 UART: [ldev] AUTHORITY.KEYID = 7
1,210,453 UART: [ldev] FE.KEYID = 1
1,215,277 UART: [ldev] Erasing FE.KEYID = 1
1,241,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,537 UART: [ldev] --
1,280,949 UART: [fwproc] Wait for Commands...
1,281,686 UART: [fwproc] Recv command 0x46574c44
1,282,419 UART: [fwproc] Recv'd Img size: 114332 bytes
1,548,218 UART: ROM Fatal Error: 0x000B0022
1,549,375 >>> mbox cmd response: failed
1,549,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,381 >>> mbox cmd response: failed
1,549,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,387 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,496 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
891,223 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,352 UART: [kat] ++
895,504 UART: [kat] sha1
899,792 UART: [kat] SHA2-256
901,732 UART: [kat] SHA2-384
904,655 UART: [kat] SHA2-512-ACC
906,556 UART: [kat] ECC-384
916,691 UART: [kat] HMAC-384Kdf
921,163 UART: [kat] LMS
1,169,475 UART: [kat] --
1,170,432 UART: [cold-reset] ++
1,171,004 UART: [fht] FHT @ 0x50003400
1,173,526 UART: [idev] ++
1,173,694 UART: [idev] CDI.KEYID = 6
1,174,055 UART: [idev] SUBJECT.KEYID = 7
1,174,480 UART: [idev] UDS.KEYID = 0
1,174,826 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,170 UART: [idev] Erasing UDS.KEYID = 0
1,199,568 UART: [idev] Sha1 KeyId Algorithm
1,208,350 UART: [idev] --
1,209,549 UART: [ldev] ++
1,209,717 UART: [ldev] CDI.KEYID = 6
1,210,081 UART: [ldev] SUBJECT.KEYID = 5
1,210,508 UART: [ldev] AUTHORITY.KEYID = 7
1,210,971 UART: [ldev] FE.KEYID = 1
1,216,383 UART: [ldev] Erasing FE.KEYID = 1
1,242,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,175 UART: [ldev] --
1,282,487 UART: [fwproc] Wait for Commands...
1,283,254 UART: [fwproc] Recv command 0x46574c44
1,283,987 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,860 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,169 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,959 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,123 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,402,774 >>> mbox cmd response: failed
1,402,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,780 >>> mbox cmd response: failed
1,402,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,786 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,929 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,163 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,363 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,055 UART: [kat] SHA2-256
881,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,101 UART: [kat] ++
886,253 UART: [kat] sha1
890,413 UART: [kat] SHA2-256
892,351 UART: [kat] SHA2-384
895,200 UART: [kat] SHA2-512-ACC
897,101 UART: [kat] ECC-384
902,852 UART: [kat] HMAC-384Kdf
907,546 UART: [kat] LMS
1,475,742 UART: [kat] --
1,476,591 UART: [cold-reset] ++
1,477,095 UART: [fht] Storing FHT @ 0x50003400
1,479,976 UART: [idev] ++
1,480,144 UART: [idev] CDI.KEYID = 6
1,480,504 UART: [idev] SUBJECT.KEYID = 7
1,480,928 UART: [idev] UDS.KEYID = 0
1,481,273 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,694 UART: [idev] Erasing UDS.KEYID = 0
1,505,130 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,606 UART: [idev] --
1,514,735 UART: [ldev] ++
1,514,903 UART: [ldev] CDI.KEYID = 6
1,515,266 UART: [ldev] SUBJECT.KEYID = 5
1,515,692 UART: [ldev] AUTHORITY.KEYID = 7
1,516,155 UART: [ldev] FE.KEYID = 1
1,521,545 UART: [ldev] Erasing FE.KEYID = 1
1,546,676 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,072 UART: [ldev] --
1,586,399 UART: [fwproc] Waiting for Commands...
1,587,134 UART: [fwproc] Received command 0x46574c44
1,587,925 UART: [fwproc] Received Image of size 114332 bytes
1,635,263 UART: ROM Fatal Error: 0x000B003E
1,636,422 >>> mbox cmd response: failed
1,636,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,428 >>> mbox cmd response: failed
1,636,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,434 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,485 UART: [state] DebugLocked = No
86,125 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,847 UART: [kat] SHA2-256
881,778 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,893 UART: [kat] ++
886,045 UART: [kat] sha1
890,087 UART: [kat] SHA2-256
892,025 UART: [kat] SHA2-384
894,810 UART: [kat] SHA2-512-ACC
896,711 UART: [kat] ECC-384
902,216 UART: [kat] HMAC-384Kdf
906,730 UART: [kat] LMS
1,474,926 UART: [kat] --
1,475,859 UART: [cold-reset] ++
1,476,237 UART: [fht] Storing FHT @ 0x50003400
1,479,046 UART: [idev] ++
1,479,214 UART: [idev] CDI.KEYID = 6
1,479,574 UART: [idev] SUBJECT.KEYID = 7
1,479,998 UART: [idev] UDS.KEYID = 0
1,480,343 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,160 UART: [idev] Erasing UDS.KEYID = 0
1,504,816 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,370 UART: [idev] --
1,514,371 UART: [ldev] ++
1,514,539 UART: [ldev] CDI.KEYID = 6
1,514,902 UART: [ldev] SUBJECT.KEYID = 5
1,515,328 UART: [ldev] AUTHORITY.KEYID = 7
1,515,791 UART: [ldev] FE.KEYID = 1
1,520,825 UART: [ldev] Erasing FE.KEYID = 1
1,545,928 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,756 UART: [ldev] --
1,585,089 UART: [fwproc] Waiting for Commands...
1,585,770 UART: [fwproc] Received command 0x46574c44
1,586,561 UART: [fwproc] Received Image of size 114332 bytes
2,883,034 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,566 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,918 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,075,665 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,087 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,319 >>> mbox cmd response: failed
1,488,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,325 >>> mbox cmd response: failed
1,488,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,615 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,269 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,564 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,230 UART: [kat] SHA2-256
882,161 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,276 UART: [kat] ++
886,428 UART: [kat] sha1
890,628 UART: [kat] SHA2-256
892,566 UART: [kat] SHA2-384
895,143 UART: [kat] SHA2-512-ACC
897,044 UART: [kat] ECC-384
902,677 UART: [kat] HMAC-384Kdf
907,279 UART: [kat] LMS
1,475,475 UART: [kat] --
1,476,484 UART: [cold-reset] ++
1,477,030 UART: [fht] Storing FHT @ 0x50003400
1,479,837 UART: [idev] ++
1,480,005 UART: [idev] CDI.KEYID = 6
1,480,365 UART: [idev] SUBJECT.KEYID = 7
1,480,789 UART: [idev] UDS.KEYID = 0
1,481,134 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,965 UART: [idev] Erasing UDS.KEYID = 0
1,505,665 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,189 UART: [idev] --
1,515,252 UART: [ldev] ++
1,515,420 UART: [ldev] CDI.KEYID = 6
1,515,783 UART: [ldev] SUBJECT.KEYID = 5
1,516,209 UART: [ldev] AUTHORITY.KEYID = 7
1,516,672 UART: [ldev] FE.KEYID = 1
1,521,730 UART: [ldev] Erasing FE.KEYID = 1
1,547,381 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,225 UART: [ldev] --
1,586,604 UART: [fwproc] Waiting for Commands...
1,587,473 UART: [fwproc] Received command 0x46574c44
1,588,264 UART: [fwproc] Received Image of size 114332 bytes
1,635,742 UART: ROM Fatal Error: 0x000B003E
1,636,901 >>> mbox cmd response: failed
1,636,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,907 >>> mbox cmd response: failed
1,636,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,913 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,863 UART: [state] LifecycleState = Unprovisioned
86,518 UART: [state] DebugLocked = No
87,084 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,748 UART: [kat] SHA2-256
882,679 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,794 UART: [kat] ++
886,946 UART: [kat] sha1
891,316 UART: [kat] SHA2-256
893,254 UART: [kat] SHA2-384
896,065 UART: [kat] SHA2-512-ACC
897,966 UART: [kat] ECC-384
903,593 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,212 UART: [cold-reset] ++
1,477,570 UART: [fht] Storing FHT @ 0x50003400
1,480,207 UART: [idev] ++
1,480,375 UART: [idev] CDI.KEYID = 6
1,480,735 UART: [idev] SUBJECT.KEYID = 7
1,481,159 UART: [idev] UDS.KEYID = 0
1,481,504 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,947 UART: [idev] Erasing UDS.KEYID = 0
1,505,203 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,829 UART: [idev] --
1,514,796 UART: [ldev] ++
1,514,964 UART: [ldev] CDI.KEYID = 6
1,515,327 UART: [ldev] SUBJECT.KEYID = 5
1,515,753 UART: [ldev] AUTHORITY.KEYID = 7
1,516,216 UART: [ldev] FE.KEYID = 1
1,521,336 UART: [ldev] Erasing FE.KEYID = 1
1,546,713 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,735 UART: [ldev] --
1,586,086 UART: [fwproc] Waiting for Commands...
1,586,731 UART: [fwproc] Received command 0x46574c44
1,587,522 UART: [fwproc] Received Image of size 114332 bytes
2,884,553 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,669 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,021 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,810 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,620 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,618 >>> mbox cmd response: failed
1,488,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,624 >>> mbox cmd response: failed
1,488,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,630 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,434 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,058 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
893,360 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,485 UART: [kat] ++
897,637 UART: [kat] sha1
901,897 UART: [kat] SHA2-256
903,837 UART: [kat] SHA2-384
906,524 UART: [kat] SHA2-512-ACC
908,425 UART: [kat] ECC-384
918,158 UART: [kat] HMAC-384Kdf
922,770 UART: [kat] LMS
1,171,098 UART: [kat] --
1,172,211 UART: [cold-reset] ++
1,172,749 UART: [fht] FHT @ 0x50003400
1,175,374 UART: [idev] ++
1,175,542 UART: [idev] CDI.KEYID = 6
1,175,902 UART: [idev] SUBJECT.KEYID = 7
1,176,326 UART: [idev] UDS.KEYID = 0
1,176,671 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,316 UART: [idev] Erasing UDS.KEYID = 0
1,201,599 UART: [idev] Sha1 KeyId Algorithm
1,210,069 UART: [idev] --
1,211,215 UART: [ldev] ++
1,211,383 UART: [ldev] CDI.KEYID = 6
1,211,746 UART: [ldev] SUBJECT.KEYID = 5
1,212,172 UART: [ldev] AUTHORITY.KEYID = 7
1,212,635 UART: [ldev] FE.KEYID = 1
1,217,667 UART: [ldev] Erasing FE.KEYID = 1
1,243,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,289 UART: [ldev] --
1,282,798 UART: [fwproc] Wait for Commands...
1,283,470 UART: [fwproc] Recv command 0x46574c44
1,284,198 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,592 UART: ROM Fatal Error: 0x000B003E
1,331,751 >>> mbox cmd response: failed
1,331,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,757 >>> mbox cmd response: failed
1,331,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,763 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
893,440 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,565 UART: [kat] ++
897,717 UART: [kat] sha1
901,919 UART: [kat] SHA2-256
903,859 UART: [kat] SHA2-384
906,488 UART: [kat] SHA2-512-ACC
908,389 UART: [kat] ECC-384
918,100 UART: [kat] HMAC-384Kdf
922,530 UART: [kat] LMS
1,170,858 UART: [kat] --
1,171,841 UART: [cold-reset] ++
1,172,313 UART: [fht] FHT @ 0x50003400
1,174,898 UART: [idev] ++
1,175,066 UART: [idev] CDI.KEYID = 6
1,175,426 UART: [idev] SUBJECT.KEYID = 7
1,175,850 UART: [idev] UDS.KEYID = 0
1,176,195 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,974 UART: [idev] Erasing UDS.KEYID = 0
1,201,251 UART: [idev] Sha1 KeyId Algorithm
1,209,827 UART: [idev] --
1,210,759 UART: [ldev] ++
1,210,927 UART: [ldev] CDI.KEYID = 6
1,211,290 UART: [ldev] SUBJECT.KEYID = 5
1,211,716 UART: [ldev] AUTHORITY.KEYID = 7
1,212,179 UART: [ldev] FE.KEYID = 1
1,217,297 UART: [ldev] Erasing FE.KEYID = 1
1,243,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,997 UART: [ldev] --
1,282,392 UART: [fwproc] Wait for Commands...
1,283,052 UART: [fwproc] Recv command 0x46574c44
1,283,780 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,841 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,145 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,862 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,169 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,972 >>> mbox cmd response: failed
1,184,972 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,978 >>> mbox cmd response: failed
1,184,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,984 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,083 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,673 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,751 UART: [state] LifecycleState = Unprovisioned
86,406 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,193 UART: [kat] SHA2-256
893,843 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,968 UART: [kat] ++
898,120 UART: [kat] sha1
902,286 UART: [kat] SHA2-256
904,226 UART: [kat] SHA2-384
907,083 UART: [kat] SHA2-512-ACC
908,984 UART: [kat] ECC-384
918,489 UART: [kat] HMAC-384Kdf
923,273 UART: [kat] LMS
1,171,601 UART: [kat] --
1,172,596 UART: [cold-reset] ++
1,173,046 UART: [fht] FHT @ 0x50003400
1,175,671 UART: [idev] ++
1,175,839 UART: [idev] CDI.KEYID = 6
1,176,199 UART: [idev] SUBJECT.KEYID = 7
1,176,623 UART: [idev] UDS.KEYID = 0
1,176,968 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,243 UART: [idev] Erasing UDS.KEYID = 0
1,201,428 UART: [idev] Sha1 KeyId Algorithm
1,209,738 UART: [idev] --
1,210,792 UART: [ldev] ++
1,210,960 UART: [ldev] CDI.KEYID = 6
1,211,323 UART: [ldev] SUBJECT.KEYID = 5
1,211,749 UART: [ldev] AUTHORITY.KEYID = 7
1,212,212 UART: [ldev] FE.KEYID = 1
1,217,364 UART: [ldev] Erasing FE.KEYID = 1
1,244,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,702 UART: [ldev] --
1,283,017 UART: [fwproc] Wait for Commands...
1,283,591 UART: [fwproc] Recv command 0x46574c44
1,284,319 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,771 UART: ROM Fatal Error: 0x000B003E
1,332,930 >>> mbox cmd response: failed
1,332,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,936 >>> mbox cmd response: failed
1,332,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,942 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
893,787 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,912 UART: [kat] ++
898,064 UART: [kat] sha1
902,468 UART: [kat] SHA2-256
904,408 UART: [kat] SHA2-384
907,073 UART: [kat] SHA2-512-ACC
908,974 UART: [kat] ECC-384
918,671 UART: [kat] HMAC-384Kdf
923,255 UART: [kat] LMS
1,171,583 UART: [kat] --
1,172,498 UART: [cold-reset] ++
1,172,962 UART: [fht] FHT @ 0x50003400
1,175,653 UART: [idev] ++
1,175,821 UART: [idev] CDI.KEYID = 6
1,176,181 UART: [idev] SUBJECT.KEYID = 7
1,176,605 UART: [idev] UDS.KEYID = 0
1,176,950 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,515 UART: [idev] Erasing UDS.KEYID = 0
1,202,132 UART: [idev] Sha1 KeyId Algorithm
1,210,618 UART: [idev] --
1,211,764 UART: [ldev] ++
1,211,932 UART: [ldev] CDI.KEYID = 6
1,212,295 UART: [ldev] SUBJECT.KEYID = 5
1,212,721 UART: [ldev] AUTHORITY.KEYID = 7
1,213,184 UART: [ldev] FE.KEYID = 1
1,218,334 UART: [ldev] Erasing FE.KEYID = 1
1,244,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,464 UART: [ldev] --
1,283,881 UART: [fwproc] Wait for Commands...
1,284,539 UART: [fwproc] Recv command 0x46574c44
1,285,267 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,926 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,230 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,025 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,498 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,187,583 >>> mbox cmd response: failed
1,187,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,589 >>> mbox cmd response: failed
1,187,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,595 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,140 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,752 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,105 UART: [state] WD Timer not started. Device not locked for debugging
87,270 UART: [kat] SHA2-256
890,820 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,949 UART: [kat] ++
895,101 UART: [kat] sha1
899,465 UART: [kat] SHA2-256
901,405 UART: [kat] SHA2-384
904,266 UART: [kat] SHA2-512-ACC
906,167 UART: [kat] ECC-384
915,792 UART: [kat] HMAC-384Kdf
920,414 UART: [kat] LMS
1,168,726 UART: [kat] --
1,169,551 UART: [cold-reset] ++
1,170,051 UART: [fht] FHT @ 0x50003400
1,172,787 UART: [idev] ++
1,172,955 UART: [idev] CDI.KEYID = 6
1,173,316 UART: [idev] SUBJECT.KEYID = 7
1,173,741 UART: [idev] UDS.KEYID = 0
1,174,087 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,603 UART: [idev] Erasing UDS.KEYID = 0
1,198,151 UART: [idev] Sha1 KeyId Algorithm
1,207,183 UART: [idev] --
1,208,352 UART: [ldev] ++
1,208,520 UART: [ldev] CDI.KEYID = 6
1,208,884 UART: [ldev] SUBJECT.KEYID = 5
1,209,311 UART: [ldev] AUTHORITY.KEYID = 7
1,209,774 UART: [ldev] FE.KEYID = 1
1,214,616 UART: [ldev] Erasing FE.KEYID = 1
1,240,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,738 UART: [ldev] --
1,280,082 UART: [fwproc] Wait for Commands...
1,280,865 UART: [fwproc] Recv command 0x46574c44
1,281,598 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,847 UART: ROM Fatal Error: 0x000B003E
1,330,006 >>> mbox cmd response: failed
1,330,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,012 >>> mbox cmd response: failed
1,330,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,254 UART: [kat] SHA2-512-ACC
906,155 UART: [kat] ECC-384
915,540 UART: [kat] HMAC-384Kdf
919,886 UART: [kat] LMS
1,168,198 UART: [kat] --
1,169,123 UART: [cold-reset] ++
1,169,601 UART: [fht] FHT @ 0x50003400
1,172,433 UART: [idev] ++
1,172,601 UART: [idev] CDI.KEYID = 6
1,172,962 UART: [idev] SUBJECT.KEYID = 7
1,173,387 UART: [idev] UDS.KEYID = 0
1,173,733 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,307 UART: [idev] Erasing UDS.KEYID = 0
1,197,915 UART: [idev] Sha1 KeyId Algorithm
1,206,749 UART: [idev] --
1,207,826 UART: [ldev] ++
1,207,994 UART: [ldev] CDI.KEYID = 6
1,208,358 UART: [ldev] SUBJECT.KEYID = 5
1,208,785 UART: [ldev] AUTHORITY.KEYID = 7
1,209,248 UART: [ldev] FE.KEYID = 1
1,214,448 UART: [ldev] Erasing FE.KEYID = 1
1,240,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,650 UART: [ldev] --
1,280,038 UART: [fwproc] Wait for Commands...
1,280,777 UART: [fwproc] Recv command 0x46574c44
1,281,510 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,577 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,731 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,040 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,750 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,078 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,037 >>> mbox cmd response: failed
1,183,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,043 >>> mbox cmd response: failed
1,183,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,049 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,562 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,264 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
891,729 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,858 UART: [kat] ++
896,010 UART: [kat] sha1
900,488 UART: [kat] SHA2-256
902,428 UART: [kat] SHA2-384
905,269 UART: [kat] SHA2-512-ACC
907,170 UART: [kat] ECC-384
916,853 UART: [kat] HMAC-384Kdf
921,353 UART: [kat] LMS
1,169,665 UART: [kat] --
1,170,634 UART: [cold-reset] ++
1,171,114 UART: [fht] FHT @ 0x50003400
1,173,564 UART: [idev] ++
1,173,732 UART: [idev] CDI.KEYID = 6
1,174,093 UART: [idev] SUBJECT.KEYID = 7
1,174,518 UART: [idev] UDS.KEYID = 0
1,174,864 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,926 UART: [idev] Erasing UDS.KEYID = 0
1,200,028 UART: [idev] Sha1 KeyId Algorithm
1,208,688 UART: [idev] --
1,209,687 UART: [ldev] ++
1,209,855 UART: [ldev] CDI.KEYID = 6
1,210,219 UART: [ldev] SUBJECT.KEYID = 5
1,210,646 UART: [ldev] AUTHORITY.KEYID = 7
1,211,109 UART: [ldev] FE.KEYID = 1
1,216,421 UART: [ldev] Erasing FE.KEYID = 1
1,242,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,331 UART: [ldev] --
1,281,751 UART: [fwproc] Wait for Commands...
1,282,334 UART: [fwproc] Recv command 0x46574c44
1,283,067 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,810 UART: ROM Fatal Error: 0x000B003E
1,331,969 >>> mbox cmd response: failed
1,331,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,975 >>> mbox cmd response: failed
1,331,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,981 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,253 UART: [state] LifecycleState = Unprovisioned
85,908 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,388 UART: [kat] ++
895,540 UART: [kat] sha1
899,710 UART: [kat] SHA2-256
901,650 UART: [kat] SHA2-384
904,267 UART: [kat] SHA2-512-ACC
906,168 UART: [kat] ECC-384
915,557 UART: [kat] HMAC-384Kdf
920,189 UART: [kat] LMS
1,168,501 UART: [kat] --
1,169,612 UART: [cold-reset] ++
1,170,120 UART: [fht] FHT @ 0x50003400
1,172,800 UART: [idev] ++
1,172,968 UART: [idev] CDI.KEYID = 6
1,173,329 UART: [idev] SUBJECT.KEYID = 7
1,173,754 UART: [idev] UDS.KEYID = 0
1,174,100 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,514 UART: [idev] Erasing UDS.KEYID = 0
1,198,026 UART: [idev] Sha1 KeyId Algorithm
1,206,780 UART: [idev] --
1,207,873 UART: [ldev] ++
1,208,041 UART: [ldev] CDI.KEYID = 6
1,208,405 UART: [ldev] SUBJECT.KEYID = 5
1,208,832 UART: [ldev] AUTHORITY.KEYID = 7
1,209,295 UART: [ldev] FE.KEYID = 1
1,214,411 UART: [ldev] Erasing FE.KEYID = 1
1,240,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,455 UART: [ldev] --
1,279,835 UART: [fwproc] Wait for Commands...
1,280,620 UART: [fwproc] Recv command 0x46574c44
1,281,353 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,366 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,675 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,589 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,423 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,012 >>> mbox cmd response: failed
1,184,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,018 >>> mbox cmd response: failed
1,184,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,024 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,299 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,735 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,269 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,997 UART: [kat] SHA2-256
881,928 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,043 UART: [kat] ++
886,195 UART: [kat] sha1
890,365 UART: [kat] SHA2-256
892,303 UART: [kat] SHA2-384
895,060 UART: [kat] SHA2-512-ACC
896,961 UART: [kat] ECC-384
902,802 UART: [kat] HMAC-384Kdf
907,362 UART: [kat] LMS
1,475,558 UART: [kat] --
1,476,311 UART: [cold-reset] ++
1,476,821 UART: [fht] Storing FHT @ 0x50003400
1,479,524 UART: [idev] ++
1,479,692 UART: [idev] CDI.KEYID = 6
1,480,052 UART: [idev] SUBJECT.KEYID = 7
1,480,476 UART: [idev] UDS.KEYID = 0
1,480,821 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,312 UART: [idev] Erasing UDS.KEYID = 0
1,504,714 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,230 UART: [idev] --
1,514,271 UART: [ldev] ++
1,514,439 UART: [ldev] CDI.KEYID = 6
1,514,802 UART: [ldev] SUBJECT.KEYID = 5
1,515,228 UART: [ldev] AUTHORITY.KEYID = 7
1,515,691 UART: [ldev] FE.KEYID = 1
1,520,989 UART: [ldev] Erasing FE.KEYID = 1
1,546,500 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,666 UART: [ldev] --
1,586,175 UART: [fwproc] Waiting for Commands...
1,586,858 UART: [fwproc] Received command 0x46574c44
1,587,649 UART: [fwproc] Received Image of size 114332 bytes
1,635,260 UART: ROM Fatal Error: 0x000B0018
1,636,417 >>> mbox cmd response: failed
1,636,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,423 >>> mbox cmd response: failed
1,636,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,429 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,527 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,235 UART: [kat] SHA2-256
882,166 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,281 UART: [kat] ++
886,433 UART: [kat] sha1
890,715 UART: [kat] SHA2-256
892,653 UART: [kat] SHA2-384
895,476 UART: [kat] SHA2-512-ACC
897,377 UART: [kat] ECC-384
903,188 UART: [kat] HMAC-384Kdf
907,668 UART: [kat] LMS
1,475,864 UART: [kat] --
1,476,579 UART: [cold-reset] ++
1,476,937 UART: [fht] Storing FHT @ 0x50003400
1,479,754 UART: [idev] ++
1,479,922 UART: [idev] CDI.KEYID = 6
1,480,282 UART: [idev] SUBJECT.KEYID = 7
1,480,706 UART: [idev] UDS.KEYID = 0
1,481,051 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,782 UART: [idev] Erasing UDS.KEYID = 0
1,505,686 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,310 UART: [idev] --
1,515,309 UART: [ldev] ++
1,515,477 UART: [ldev] CDI.KEYID = 6
1,515,840 UART: [ldev] SUBJECT.KEYID = 5
1,516,266 UART: [ldev] AUTHORITY.KEYID = 7
1,516,729 UART: [ldev] FE.KEYID = 1
1,521,715 UART: [ldev] Erasing FE.KEYID = 1
1,547,122 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,108 UART: [ldev] --
1,586,499 UART: [fwproc] Waiting for Commands...
1,587,168 UART: [fwproc] Received command 0x46574c44
1,587,959 UART: [fwproc] Received Image of size 114332 bytes
2,887,246 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,842 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,194 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,021 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,971 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,188 >>> mbox cmd response: failed
1,488,188 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,194 >>> mbox cmd response: failed
1,488,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,200 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,675 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,027 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,740 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,214 UART: [kat] SHA2-256
882,145 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,260 UART: [kat] ++
886,412 UART: [kat] sha1
890,672 UART: [kat] SHA2-256
892,610 UART: [kat] SHA2-384
895,415 UART: [kat] SHA2-512-ACC
897,316 UART: [kat] ECC-384
902,631 UART: [kat] HMAC-384Kdf
907,109 UART: [kat] LMS
1,475,305 UART: [kat] --
1,476,278 UART: [cold-reset] ++
1,476,800 UART: [fht] Storing FHT @ 0x50003400
1,479,441 UART: [idev] ++
1,479,609 UART: [idev] CDI.KEYID = 6
1,479,969 UART: [idev] SUBJECT.KEYID = 7
1,480,393 UART: [idev] UDS.KEYID = 0
1,480,738 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,369 UART: [idev] Erasing UDS.KEYID = 0
1,504,969 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,745 UART: [idev] --
1,514,944 UART: [ldev] ++
1,515,112 UART: [ldev] CDI.KEYID = 6
1,515,475 UART: [ldev] SUBJECT.KEYID = 5
1,515,901 UART: [ldev] AUTHORITY.KEYID = 7
1,516,364 UART: [ldev] FE.KEYID = 1
1,521,750 UART: [ldev] Erasing FE.KEYID = 1
1,546,873 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,857 UART: [ldev] --
1,586,270 UART: [fwproc] Waiting for Commands...
1,587,041 UART: [fwproc] Received command 0x46574c44
1,587,832 UART: [fwproc] Received Image of size 114332 bytes
1,635,753 UART: ROM Fatal Error: 0x000B0018
1,636,910 >>> mbox cmd response: failed
1,636,910 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,916 >>> mbox cmd response: failed
1,636,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,922 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,848 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,470 UART: [kat] SHA2-256
882,401 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,516 UART: [kat] ++
886,668 UART: [kat] sha1
890,908 UART: [kat] SHA2-256
892,846 UART: [kat] SHA2-384
895,679 UART: [kat] SHA2-512-ACC
897,580 UART: [kat] ECC-384
903,203 UART: [kat] HMAC-384Kdf
907,837 UART: [kat] LMS
1,476,033 UART: [kat] --
1,476,848 UART: [cold-reset] ++
1,477,290 UART: [fht] Storing FHT @ 0x50003400
1,479,967 UART: [idev] ++
1,480,135 UART: [idev] CDI.KEYID = 6
1,480,495 UART: [idev] SUBJECT.KEYID = 7
1,480,919 UART: [idev] UDS.KEYID = 0
1,481,264 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,833 UART: [idev] Erasing UDS.KEYID = 0
1,505,597 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,087 UART: [idev] --
1,514,932 UART: [ldev] ++
1,515,100 UART: [ldev] CDI.KEYID = 6
1,515,463 UART: [ldev] SUBJECT.KEYID = 5
1,515,889 UART: [ldev] AUTHORITY.KEYID = 7
1,516,352 UART: [ldev] FE.KEYID = 1
1,521,662 UART: [ldev] Erasing FE.KEYID = 1
1,546,775 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,575 UART: [ldev] --
1,585,912 UART: [fwproc] Waiting for Commands...
1,586,741 UART: [fwproc] Received command 0x46574c44
1,587,532 UART: [fwproc] Received Image of size 114332 bytes
2,885,087 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,109 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,461 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,312 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,850 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,491,249 >>> mbox cmd response: failed
1,491,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,491,255 >>> mbox cmd response: failed
1,491,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,491,261 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,520 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,650 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
893,352 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,477 UART: [kat] ++
897,629 UART: [kat] sha1
901,947 UART: [kat] SHA2-256
903,887 UART: [kat] SHA2-384
906,742 UART: [kat] SHA2-512-ACC
908,643 UART: [kat] ECC-384
918,168 UART: [kat] HMAC-384Kdf
922,690 UART: [kat] LMS
1,171,018 UART: [kat] --
1,171,871 UART: [cold-reset] ++
1,172,357 UART: [fht] FHT @ 0x50003400
1,175,052 UART: [idev] ++
1,175,220 UART: [idev] CDI.KEYID = 6
1,175,580 UART: [idev] SUBJECT.KEYID = 7
1,176,004 UART: [idev] UDS.KEYID = 0
1,176,349 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,930 UART: [idev] Erasing UDS.KEYID = 0
1,200,963 UART: [idev] Sha1 KeyId Algorithm
1,209,301 UART: [idev] --
1,210,257 UART: [ldev] ++
1,210,425 UART: [ldev] CDI.KEYID = 6
1,210,788 UART: [ldev] SUBJECT.KEYID = 5
1,211,214 UART: [ldev] AUTHORITY.KEYID = 7
1,211,677 UART: [ldev] FE.KEYID = 1
1,216,719 UART: [ldev] Erasing FE.KEYID = 1
1,242,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,919 UART: [ldev] --
1,282,376 UART: [fwproc] Wait for Commands...
1,283,198 UART: [fwproc] Recv command 0x46574c44
1,283,926 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,123 UART: ROM Fatal Error: 0x000B0018
1,332,280 >>> mbox cmd response: failed
1,332,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,286 >>> mbox cmd response: failed
1,332,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,292 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,410 UART: [state] LifecycleState = Unprovisioned
85,065 UART: [state] DebugLocked = No
85,699 UART: [state] WD Timer not started. Device not locked for debugging
86,880 UART: [kat] SHA2-256
892,530 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,655 UART: [kat] ++
896,807 UART: [kat] sha1
901,017 UART: [kat] SHA2-256
902,957 UART: [kat] SHA2-384
905,820 UART: [kat] SHA2-512-ACC
907,721 UART: [kat] ECC-384
917,470 UART: [kat] HMAC-384Kdf
921,904 UART: [kat] LMS
1,170,232 UART: [kat] --
1,171,347 UART: [cold-reset] ++
1,171,865 UART: [fht] FHT @ 0x50003400
1,174,492 UART: [idev] ++
1,174,660 UART: [idev] CDI.KEYID = 6
1,175,020 UART: [idev] SUBJECT.KEYID = 7
1,175,444 UART: [idev] UDS.KEYID = 0
1,175,789 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,118 UART: [idev] Erasing UDS.KEYID = 0
1,199,521 UART: [idev] Sha1 KeyId Algorithm
1,207,933 UART: [idev] --
1,209,151 UART: [ldev] ++
1,209,319 UART: [ldev] CDI.KEYID = 6
1,209,682 UART: [ldev] SUBJECT.KEYID = 5
1,210,108 UART: [ldev] AUTHORITY.KEYID = 7
1,210,571 UART: [ldev] FE.KEYID = 1
1,215,689 UART: [ldev] Erasing FE.KEYID = 1
1,242,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,233 UART: [ldev] --
1,281,530 UART: [fwproc] Wait for Commands...
1,282,246 UART: [fwproc] Recv command 0x46574c44
1,282,974 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,046 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,105 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,409 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,250 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,139 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,187,301 >>> mbox cmd response: failed
1,187,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,307 >>> mbox cmd response: failed
1,187,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,313 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,077 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,427 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,543 UART: [kat] SHA2-256
893,193 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,318 UART: [kat] ++
897,470 UART: [kat] sha1
901,838 UART: [kat] SHA2-256
903,778 UART: [kat] SHA2-384
906,645 UART: [kat] SHA2-512-ACC
908,546 UART: [kat] ECC-384
918,777 UART: [kat] HMAC-384Kdf
923,329 UART: [kat] LMS
1,171,657 UART: [kat] --
1,172,356 UART: [cold-reset] ++
1,172,712 UART: [fht] FHT @ 0x50003400
1,175,427 UART: [idev] ++
1,175,595 UART: [idev] CDI.KEYID = 6
1,175,955 UART: [idev] SUBJECT.KEYID = 7
1,176,379 UART: [idev] UDS.KEYID = 0
1,176,724 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,547 UART: [idev] Erasing UDS.KEYID = 0
1,201,142 UART: [idev] Sha1 KeyId Algorithm
1,209,596 UART: [idev] --
1,210,484 UART: [ldev] ++
1,210,652 UART: [ldev] CDI.KEYID = 6
1,211,015 UART: [ldev] SUBJECT.KEYID = 5
1,211,441 UART: [ldev] AUTHORITY.KEYID = 7
1,211,904 UART: [ldev] FE.KEYID = 1
1,217,116 UART: [ldev] Erasing FE.KEYID = 1
1,243,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,944 UART: [ldev] --
1,283,421 UART: [fwproc] Wait for Commands...
1,284,173 UART: [fwproc] Recv command 0x46574c44
1,284,901 UART: [fwproc] Recv'd Img size: 114332 bytes
1,333,464 UART: ROM Fatal Error: 0x000B0018
1,334,621 >>> mbox cmd response: failed
1,334,621 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,627 >>> mbox cmd response: failed
1,334,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,633 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,751 UART: [state] LifecycleState = Unprovisioned
86,406 UART: [state] DebugLocked = No
87,014 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
893,799 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,924 UART: [kat] ++
898,076 UART: [kat] sha1
902,334 UART: [kat] SHA2-256
904,274 UART: [kat] SHA2-384
906,881 UART: [kat] SHA2-512-ACC
908,782 UART: [kat] ECC-384
918,499 UART: [kat] HMAC-384Kdf
922,977 UART: [kat] LMS
1,171,305 UART: [kat] --
1,172,180 UART: [cold-reset] ++
1,172,522 UART: [fht] FHT @ 0x50003400
1,175,145 UART: [idev] ++
1,175,313 UART: [idev] CDI.KEYID = 6
1,175,673 UART: [idev] SUBJECT.KEYID = 7
1,176,097 UART: [idev] UDS.KEYID = 0
1,176,442 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,989 UART: [idev] Erasing UDS.KEYID = 0
1,201,358 UART: [idev] Sha1 KeyId Algorithm
1,210,038 UART: [idev] --
1,211,048 UART: [ldev] ++
1,211,216 UART: [ldev] CDI.KEYID = 6
1,211,579 UART: [ldev] SUBJECT.KEYID = 5
1,212,005 UART: [ldev] AUTHORITY.KEYID = 7
1,212,468 UART: [ldev] FE.KEYID = 1
1,217,598 UART: [ldev] Erasing FE.KEYID = 1
1,243,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,618 UART: [ldev] --
1,283,133 UART: [fwproc] Wait for Commands...
1,283,877 UART: [fwproc] Recv command 0x46574c44
1,284,605 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,676 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,980 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,733 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,434 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,186,916 >>> mbox cmd response: failed
1,186,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,922 >>> mbox cmd response: failed
1,186,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,928 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,744 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,068 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,723 UART: [state] WD Timer not started. Device not locked for debugging
88,056 UART: [kat] SHA2-256
891,606 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,735 UART: [kat] ++
895,887 UART: [kat] sha1
900,027 UART: [kat] SHA2-256
901,967 UART: [kat] SHA2-384
904,602 UART: [kat] SHA2-512-ACC
906,503 UART: [kat] ECC-384
916,372 UART: [kat] HMAC-384Kdf
920,976 UART: [kat] LMS
1,169,288 UART: [kat] --
1,169,985 UART: [cold-reset] ++
1,170,391 UART: [fht] FHT @ 0x50003400
1,173,151 UART: [idev] ++
1,173,319 UART: [idev] CDI.KEYID = 6
1,173,680 UART: [idev] SUBJECT.KEYID = 7
1,174,105 UART: [idev] UDS.KEYID = 0
1,174,451 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,317 UART: [idev] Erasing UDS.KEYID = 0
1,199,015 UART: [idev] Sha1 KeyId Algorithm
1,208,031 UART: [idev] --
1,209,098 UART: [ldev] ++
1,209,266 UART: [ldev] CDI.KEYID = 6
1,209,630 UART: [ldev] SUBJECT.KEYID = 5
1,210,057 UART: [ldev] AUTHORITY.KEYID = 7
1,210,520 UART: [ldev] FE.KEYID = 1
1,215,760 UART: [ldev] Erasing FE.KEYID = 1
1,242,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,040 UART: [ldev] --
1,281,410 UART: [fwproc] Wait for Commands...
1,282,051 UART: [fwproc] Recv command 0x46574c44
1,282,784 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,076 UART: ROM Fatal Error: 0x000B0018
1,330,233 >>> mbox cmd response: failed
1,330,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,239 >>> mbox cmd response: failed
1,330,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,245 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,498 UART: [kat] SHA2-256
891,048 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,177 UART: [kat] ++
895,329 UART: [kat] sha1
899,473 UART: [kat] SHA2-256
901,413 UART: [kat] SHA2-384
904,360 UART: [kat] SHA2-512-ACC
906,261 UART: [kat] ECC-384
915,528 UART: [kat] HMAC-384Kdf
919,938 UART: [kat] LMS
1,168,250 UART: [kat] --
1,169,249 UART: [cold-reset] ++
1,169,723 UART: [fht] FHT @ 0x50003400
1,172,465 UART: [idev] ++
1,172,633 UART: [idev] CDI.KEYID = 6
1,172,994 UART: [idev] SUBJECT.KEYID = 7
1,173,419 UART: [idev] UDS.KEYID = 0
1,173,765 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,619 UART: [idev] Erasing UDS.KEYID = 0
1,198,765 UART: [idev] Sha1 KeyId Algorithm
1,207,613 UART: [idev] --
1,208,796 UART: [ldev] ++
1,208,964 UART: [ldev] CDI.KEYID = 6
1,209,328 UART: [ldev] SUBJECT.KEYID = 5
1,209,755 UART: [ldev] AUTHORITY.KEYID = 7
1,210,218 UART: [ldev] FE.KEYID = 1
1,215,416 UART: [ldev] Erasing FE.KEYID = 1
1,242,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,098 UART: [ldev] --
1,281,392 UART: [fwproc] Wait for Commands...
1,282,013 UART: [fwproc] Recv command 0x46574c44
1,282,746 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,981 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,290 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,132 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,350 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,208 >>> mbox cmd response: failed
1,181,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,214 >>> mbox cmd response: failed
1,181,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,650 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,155 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,424 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,382 UART: [kat] ++
895,534 UART: [kat] sha1
899,896 UART: [kat] SHA2-256
901,836 UART: [kat] SHA2-384
904,469 UART: [kat] SHA2-512-ACC
906,370 UART: [kat] ECC-384
915,947 UART: [kat] HMAC-384Kdf
920,571 UART: [kat] LMS
1,168,883 UART: [kat] --
1,169,612 UART: [cold-reset] ++
1,170,122 UART: [fht] FHT @ 0x50003400
1,172,712 UART: [idev] ++
1,172,880 UART: [idev] CDI.KEYID = 6
1,173,241 UART: [idev] SUBJECT.KEYID = 7
1,173,666 UART: [idev] UDS.KEYID = 0
1,174,012 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,854 UART: [idev] Erasing UDS.KEYID = 0
1,199,350 UART: [idev] Sha1 KeyId Algorithm
1,208,120 UART: [idev] --
1,209,145 UART: [ldev] ++
1,209,313 UART: [ldev] CDI.KEYID = 6
1,209,677 UART: [ldev] SUBJECT.KEYID = 5
1,210,104 UART: [ldev] AUTHORITY.KEYID = 7
1,210,567 UART: [ldev] FE.KEYID = 1
1,215,847 UART: [ldev] Erasing FE.KEYID = 1
1,241,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,165 UART: [ldev] --
1,281,515 UART: [fwproc] Wait for Commands...
1,282,320 UART: [fwproc] Recv command 0x46574c44
1,283,053 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,143 UART: ROM Fatal Error: 0x000B0018
1,331,300 >>> mbox cmd response: failed
1,331,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,306 >>> mbox cmd response: failed
1,331,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,312 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,720 UART: [state] DebugLocked = No
86,244 UART: [state] WD Timer not started. Device not locked for debugging
87,409 UART: [kat] SHA2-256
890,959 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,088 UART: [kat] ++
895,240 UART: [kat] sha1
899,452 UART: [kat] SHA2-256
901,392 UART: [kat] SHA2-384
903,989 UART: [kat] SHA2-512-ACC
905,890 UART: [kat] ECC-384
915,577 UART: [kat] HMAC-384Kdf
920,089 UART: [kat] LMS
1,168,401 UART: [kat] --
1,169,362 UART: [cold-reset] ++
1,169,806 UART: [fht] FHT @ 0x50003400
1,172,338 UART: [idev] ++
1,172,506 UART: [idev] CDI.KEYID = 6
1,172,867 UART: [idev] SUBJECT.KEYID = 7
1,173,292 UART: [idev] UDS.KEYID = 0
1,173,638 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,464 UART: [idev] Erasing UDS.KEYID = 0
1,198,032 UART: [idev] Sha1 KeyId Algorithm
1,206,988 UART: [idev] --
1,208,067 UART: [ldev] ++
1,208,235 UART: [ldev] CDI.KEYID = 6
1,208,599 UART: [ldev] SUBJECT.KEYID = 5
1,209,026 UART: [ldev] AUTHORITY.KEYID = 7
1,209,489 UART: [ldev] FE.KEYID = 1
1,214,883 UART: [ldev] Erasing FE.KEYID = 1
1,241,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,891 UART: [ldev] --
1,281,301 UART: [fwproc] Wait for Commands...
1,282,000 UART: [fwproc] Recv command 0x46574c44
1,282,733 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,782 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,091 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,013 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,705 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,211 >>> mbox cmd response: failed
1,183,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,217 >>> mbox cmd response: failed
1,183,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,223 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,081 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,695 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,415 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,011 UART: [kat] SHA2-256
881,942 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,057 UART: [kat] ++
886,209 UART: [kat] sha1
890,329 UART: [kat] SHA2-256
892,267 UART: [kat] SHA2-384
894,872 UART: [kat] SHA2-512-ACC
896,773 UART: [kat] ECC-384
902,502 UART: [kat] HMAC-384Kdf
907,156 UART: [kat] LMS
1,475,352 UART: [kat] --
1,476,055 UART: [cold-reset] ++
1,476,583 UART: [fht] Storing FHT @ 0x50003400
1,479,396 UART: [idev] ++
1,479,564 UART: [idev] CDI.KEYID = 6
1,479,924 UART: [idev] SUBJECT.KEYID = 7
1,480,348 UART: [idev] UDS.KEYID = 0
1,480,693 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,388 UART: [idev] Erasing UDS.KEYID = 0
1,504,784 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,550 UART: [idev] --
1,514,799 UART: [ldev] ++
1,514,967 UART: [ldev] CDI.KEYID = 6
1,515,330 UART: [ldev] SUBJECT.KEYID = 5
1,515,756 UART: [ldev] AUTHORITY.KEYID = 7
1,516,219 UART: [ldev] FE.KEYID = 1
1,521,497 UART: [ldev] Erasing FE.KEYID = 1
1,547,230 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,128 UART: [ldev] --
1,586,549 UART: [fwproc] Waiting for Commands...
1,587,310 UART: [fwproc] Received command 0x46574c44
1,588,101 UART: [fwproc] Received Image of size 114332 bytes
1,635,012 UART: ROM Fatal Error: 0x000B0034
1,636,169 >>> mbox cmd response: failed
1,636,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,175 >>> mbox cmd response: failed
1,636,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,181 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,265 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,933 UART: [kat] SHA2-256
881,864 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,979 UART: [kat] ++
886,131 UART: [kat] sha1
890,469 UART: [kat] SHA2-256
892,407 UART: [kat] SHA2-384
895,284 UART: [kat] SHA2-512-ACC
897,185 UART: [kat] ECC-384
902,636 UART: [kat] HMAC-384Kdf
907,126 UART: [kat] LMS
1,475,322 UART: [kat] --
1,476,223 UART: [cold-reset] ++
1,476,715 UART: [fht] Storing FHT @ 0x50003400
1,479,406 UART: [idev] ++
1,479,574 UART: [idev] CDI.KEYID = 6
1,479,934 UART: [idev] SUBJECT.KEYID = 7
1,480,358 UART: [idev] UDS.KEYID = 0
1,480,703 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,138 UART: [idev] Erasing UDS.KEYID = 0
1,504,540 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,148 UART: [idev] --
1,513,985 UART: [ldev] ++
1,514,153 UART: [ldev] CDI.KEYID = 6
1,514,516 UART: [ldev] SUBJECT.KEYID = 5
1,514,942 UART: [ldev] AUTHORITY.KEYID = 7
1,515,405 UART: [ldev] FE.KEYID = 1
1,520,931 UART: [ldev] Erasing FE.KEYID = 1
1,546,098 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,742 UART: [ldev] --
1,585,193 UART: [fwproc] Waiting for Commands...
1,585,828 UART: [fwproc] Received command 0x46574c44
1,586,619 UART: [fwproc] Received Image of size 114332 bytes
2,882,452 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,286 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,638 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,075,505 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,203 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,158 >>> mbox cmd response: failed
1,489,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,164 >>> mbox cmd response: failed
1,489,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,170 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,697 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,025 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,516 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,104 UART: [kat] SHA2-256
882,035 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,150 UART: [kat] ++
886,302 UART: [kat] sha1
890,428 UART: [kat] SHA2-256
892,366 UART: [kat] SHA2-384
895,103 UART: [kat] SHA2-512-ACC
897,004 UART: [kat] ECC-384
902,779 UART: [kat] HMAC-384Kdf
907,361 UART: [kat] LMS
1,475,557 UART: [kat] --
1,476,394 UART: [cold-reset] ++
1,476,844 UART: [fht] Storing FHT @ 0x50003400
1,479,811 UART: [idev] ++
1,479,979 UART: [idev] CDI.KEYID = 6
1,480,339 UART: [idev] SUBJECT.KEYID = 7
1,480,763 UART: [idev] UDS.KEYID = 0
1,481,108 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,659 UART: [idev] Erasing UDS.KEYID = 0
1,505,923 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,513 UART: [idev] --
1,515,674 UART: [ldev] ++
1,515,842 UART: [ldev] CDI.KEYID = 6
1,516,205 UART: [ldev] SUBJECT.KEYID = 5
1,516,631 UART: [ldev] AUTHORITY.KEYID = 7
1,517,094 UART: [ldev] FE.KEYID = 1
1,522,240 UART: [ldev] Erasing FE.KEYID = 1
1,548,295 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,537 UART: [ldev] --
1,587,994 UART: [fwproc] Waiting for Commands...
1,588,665 UART: [fwproc] Received command 0x46574c44
1,589,456 UART: [fwproc] Received Image of size 114332 bytes
1,636,541 UART: ROM Fatal Error: 0x000B0034
1,637,698 >>> mbox cmd response: failed
1,637,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,704 >>> mbox cmd response: failed
1,637,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,710 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,077 UART: [state] LifecycleState = Unprovisioned
86,732 UART: [state] DebugLocked = No
87,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,948 UART: [kat] SHA2-256
882,879 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,994 UART: [kat] ++
887,146 UART: [kat] sha1
891,508 UART: [kat] SHA2-256
893,446 UART: [kat] SHA2-384
896,289 UART: [kat] SHA2-512-ACC
898,190 UART: [kat] ECC-384
903,997 UART: [kat] HMAC-384Kdf
908,731 UART: [kat] LMS
1,476,927 UART: [kat] --
1,477,648 UART: [cold-reset] ++
1,477,978 UART: [fht] Storing FHT @ 0x50003400
1,480,597 UART: [idev] ++
1,480,765 UART: [idev] CDI.KEYID = 6
1,481,125 UART: [idev] SUBJECT.KEYID = 7
1,481,549 UART: [idev] UDS.KEYID = 0
1,481,894 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,969 UART: [idev] Erasing UDS.KEYID = 0
1,506,037 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,781 UART: [idev] --
1,515,666 UART: [ldev] ++
1,515,834 UART: [ldev] CDI.KEYID = 6
1,516,197 UART: [ldev] SUBJECT.KEYID = 5
1,516,623 UART: [ldev] AUTHORITY.KEYID = 7
1,517,086 UART: [ldev] FE.KEYID = 1
1,522,350 UART: [ldev] Erasing FE.KEYID = 1
1,547,693 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,953 UART: [ldev] --
1,587,304 UART: [fwproc] Waiting for Commands...
1,588,077 UART: [fwproc] Received command 0x46574c44
1,588,868 UART: [fwproc] Received Image of size 114332 bytes
2,885,357 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,679 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,031 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,980 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,944 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,490,443 >>> mbox cmd response: failed
1,490,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,449 >>> mbox cmd response: failed
1,490,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,455 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,206 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,746 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
893,410 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,535 UART: [kat] ++
897,687 UART: [kat] sha1
901,759 UART: [kat] SHA2-256
903,699 UART: [kat] SHA2-384
906,600 UART: [kat] SHA2-512-ACC
908,501 UART: [kat] ECC-384
918,008 UART: [kat] HMAC-384Kdf
922,546 UART: [kat] LMS
1,170,874 UART: [kat] --
1,171,729 UART: [cold-reset] ++
1,172,085 UART: [fht] FHT @ 0x50003400
1,174,700 UART: [idev] ++
1,174,868 UART: [idev] CDI.KEYID = 6
1,175,228 UART: [idev] SUBJECT.KEYID = 7
1,175,652 UART: [idev] UDS.KEYID = 0
1,175,997 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,278 UART: [idev] Erasing UDS.KEYID = 0
1,200,273 UART: [idev] Sha1 KeyId Algorithm
1,208,747 UART: [idev] --
1,209,657 UART: [ldev] ++
1,209,825 UART: [ldev] CDI.KEYID = 6
1,210,188 UART: [ldev] SUBJECT.KEYID = 5
1,210,614 UART: [ldev] AUTHORITY.KEYID = 7
1,211,077 UART: [ldev] FE.KEYID = 1
1,216,261 UART: [ldev] Erasing FE.KEYID = 1
1,242,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,585 UART: [ldev] --
1,282,046 UART: [fwproc] Wait for Commands...
1,282,716 UART: [fwproc] Recv command 0x46574c44
1,283,444 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,151 UART: ROM Fatal Error: 0x000B0034
1,332,308 >>> mbox cmd response: failed
1,332,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,314 >>> mbox cmd response: failed
1,332,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,320 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,332 UART: [kat] SHA2-256
892,982 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,107 UART: [kat] ++
897,259 UART: [kat] sha1
901,581 UART: [kat] SHA2-256
903,521 UART: [kat] SHA2-384
906,304 UART: [kat] SHA2-512-ACC
908,205 UART: [kat] ECC-384
917,776 UART: [kat] HMAC-384Kdf
922,378 UART: [kat] LMS
1,170,706 UART: [kat] --
1,171,579 UART: [cold-reset] ++
1,171,919 UART: [fht] FHT @ 0x50003400
1,174,630 UART: [idev] ++
1,174,798 UART: [idev] CDI.KEYID = 6
1,175,158 UART: [idev] SUBJECT.KEYID = 7
1,175,582 UART: [idev] UDS.KEYID = 0
1,175,927 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,682 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,209,003 UART: [idev] --
1,209,929 UART: [ldev] ++
1,210,097 UART: [ldev] CDI.KEYID = 6
1,210,460 UART: [ldev] SUBJECT.KEYID = 5
1,210,886 UART: [ldev] AUTHORITY.KEYID = 7
1,211,349 UART: [ldev] FE.KEYID = 1
1,216,407 UART: [ldev] Erasing FE.KEYID = 1
1,242,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,839 UART: [ldev] --
1,282,182 UART: [fwproc] Wait for Commands...
1,282,840 UART: [fwproc] Recv command 0x46574c44
1,283,568 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,501 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,805 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,656 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,967 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,186,789 >>> mbox cmd response: failed
1,186,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,795 >>> mbox cmd response: failed
1,186,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,801 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,055 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,685 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
893,621 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,746 UART: [kat] ++
897,898 UART: [kat] sha1
902,232 UART: [kat] SHA2-256
904,172 UART: [kat] SHA2-384
906,895 UART: [kat] SHA2-512-ACC
908,796 UART: [kat] ECC-384
918,755 UART: [kat] HMAC-384Kdf
923,363 UART: [kat] LMS
1,171,691 UART: [kat] --
1,172,524 UART: [cold-reset] ++
1,172,966 UART: [fht] FHT @ 0x50003400
1,175,603 UART: [idev] ++
1,175,771 UART: [idev] CDI.KEYID = 6
1,176,131 UART: [idev] SUBJECT.KEYID = 7
1,176,555 UART: [idev] UDS.KEYID = 0
1,176,900 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,621 UART: [idev] Erasing UDS.KEYID = 0
1,201,458 UART: [idev] Sha1 KeyId Algorithm
1,210,022 UART: [idev] --
1,211,122 UART: [ldev] ++
1,211,290 UART: [ldev] CDI.KEYID = 6
1,211,653 UART: [ldev] SUBJECT.KEYID = 5
1,212,079 UART: [ldev] AUTHORITY.KEYID = 7
1,212,542 UART: [ldev] FE.KEYID = 1
1,217,554 UART: [ldev] Erasing FE.KEYID = 1
1,243,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,952 UART: [ldev] --
1,283,443 UART: [fwproc] Wait for Commands...
1,284,223 UART: [fwproc] Recv command 0x46574c44
1,284,951 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,896 UART: ROM Fatal Error: 0x000B0034
1,333,053 >>> mbox cmd response: failed
1,333,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,059 >>> mbox cmd response: failed
1,333,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,065 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
893,347 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,472 UART: [kat] ++
897,624 UART: [kat] sha1
901,852 UART: [kat] SHA2-256
903,792 UART: [kat] SHA2-384
906,501 UART: [kat] SHA2-512-ACC
908,402 UART: [kat] ECC-384
918,521 UART: [kat] HMAC-384Kdf
923,111 UART: [kat] LMS
1,171,439 UART: [kat] --
1,172,520 UART: [cold-reset] ++
1,172,960 UART: [fht] FHT @ 0x50003400
1,175,789 UART: [idev] ++
1,175,957 UART: [idev] CDI.KEYID = 6
1,176,317 UART: [idev] SUBJECT.KEYID = 7
1,176,741 UART: [idev] UDS.KEYID = 0
1,177,086 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,715 UART: [idev] Erasing UDS.KEYID = 0
1,201,842 UART: [idev] Sha1 KeyId Algorithm
1,210,502 UART: [idev] --
1,211,504 UART: [ldev] ++
1,211,672 UART: [ldev] CDI.KEYID = 6
1,212,035 UART: [ldev] SUBJECT.KEYID = 5
1,212,461 UART: [ldev] AUTHORITY.KEYID = 7
1,212,924 UART: [ldev] FE.KEYID = 1
1,218,154 UART: [ldev] Erasing FE.KEYID = 1
1,244,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,546 UART: [ldev] --
1,284,011 UART: [fwproc] Wait for Commands...
1,284,621 UART: [fwproc] Recv command 0x46574c44
1,285,349 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,024 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,887 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,938 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,840 >>> mbox cmd response: failed
1,185,840 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,846 >>> mbox cmd response: failed
1,185,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,852 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,678 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,208 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,500 UART: [state] LifecycleState = Unprovisioned
86,155 UART: [state] DebugLocked = No
86,771 UART: [state] WD Timer not started. Device not locked for debugging
87,970 UART: [kat] SHA2-256
891,520 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,649 UART: [kat] ++
895,801 UART: [kat] sha1
900,031 UART: [kat] SHA2-256
901,971 UART: [kat] SHA2-384
904,760 UART: [kat] SHA2-512-ACC
906,661 UART: [kat] ECC-384
916,474 UART: [kat] HMAC-384Kdf
921,022 UART: [kat] LMS
1,169,334 UART: [kat] --
1,170,317 UART: [cold-reset] ++
1,170,731 UART: [fht] FHT @ 0x50003400
1,173,393 UART: [idev] ++
1,173,561 UART: [idev] CDI.KEYID = 6
1,173,922 UART: [idev] SUBJECT.KEYID = 7
1,174,347 UART: [idev] UDS.KEYID = 0
1,174,693 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,199 UART: [idev] Erasing UDS.KEYID = 0
1,198,921 UART: [idev] Sha1 KeyId Algorithm
1,207,955 UART: [idev] --
1,209,060 UART: [ldev] ++
1,209,228 UART: [ldev] CDI.KEYID = 6
1,209,592 UART: [ldev] SUBJECT.KEYID = 5
1,210,019 UART: [ldev] AUTHORITY.KEYID = 7
1,210,482 UART: [ldev] FE.KEYID = 1
1,215,960 UART: [ldev] Erasing FE.KEYID = 1
1,242,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,748 UART: [ldev] --
1,282,156 UART: [fwproc] Wait for Commands...
1,282,887 UART: [fwproc] Recv command 0x46574c44
1,283,620 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,660 UART: ROM Fatal Error: 0x000B0034
1,331,817 >>> mbox cmd response: failed
1,331,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,823 >>> mbox cmd response: failed
1,331,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,829 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,502 UART: [state] LifecycleState = Unprovisioned
86,157 UART: [state] DebugLocked = No
86,833 UART: [state] WD Timer not started. Device not locked for debugging
87,964 UART: [kat] SHA2-256
891,514 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,643 UART: [kat] ++
895,795 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,530 UART: [kat] SHA2-512-ACC
906,431 UART: [kat] ECC-384
916,080 UART: [kat] HMAC-384Kdf
920,738 UART: [kat] LMS
1,169,050 UART: [kat] --
1,169,997 UART: [cold-reset] ++
1,170,413 UART: [fht] FHT @ 0x50003400
1,173,097 UART: [idev] ++
1,173,265 UART: [idev] CDI.KEYID = 6
1,173,626 UART: [idev] SUBJECT.KEYID = 7
1,174,051 UART: [idev] UDS.KEYID = 0
1,174,397 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,063 UART: [idev] Erasing UDS.KEYID = 0
1,199,509 UART: [idev] Sha1 KeyId Algorithm
1,208,381 UART: [idev] --
1,209,374 UART: [ldev] ++
1,209,542 UART: [ldev] CDI.KEYID = 6
1,209,906 UART: [ldev] SUBJECT.KEYID = 5
1,210,333 UART: [ldev] AUTHORITY.KEYID = 7
1,210,796 UART: [ldev] FE.KEYID = 1
1,216,080 UART: [ldev] Erasing FE.KEYID = 1
1,242,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,112 UART: [ldev] --
1,281,580 UART: [fwproc] Wait for Commands...
1,282,349 UART: [fwproc] Recv command 0x46574c44
1,283,082 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,569 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,878 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,616 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,304 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,928 >>> mbox cmd response: failed
1,183,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,934 >>> mbox cmd response: failed
1,183,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,200 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,619,756 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,924 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
891,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,426 UART: [kat] ++
895,578 UART: [kat] sha1
900,026 UART: [kat] SHA2-256
901,966 UART: [kat] SHA2-384
904,715 UART: [kat] SHA2-512-ACC
906,616 UART: [kat] ECC-384
916,171 UART: [kat] HMAC-384Kdf
920,895 UART: [kat] LMS
1,169,207 UART: [kat] --
1,170,204 UART: [cold-reset] ++
1,170,784 UART: [fht] FHT @ 0x50003400
1,173,536 UART: [idev] ++
1,173,704 UART: [idev] CDI.KEYID = 6
1,174,065 UART: [idev] SUBJECT.KEYID = 7
1,174,490 UART: [idev] UDS.KEYID = 0
1,174,836 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,394 UART: [idev] Erasing UDS.KEYID = 0
1,199,634 UART: [idev] Sha1 KeyId Algorithm
1,208,336 UART: [idev] --
1,209,407 UART: [ldev] ++
1,209,575 UART: [ldev] CDI.KEYID = 6
1,209,939 UART: [ldev] SUBJECT.KEYID = 5
1,210,366 UART: [ldev] AUTHORITY.KEYID = 7
1,210,829 UART: [ldev] FE.KEYID = 1
1,216,297 UART: [ldev] Erasing FE.KEYID = 1
1,243,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,483 UART: [ldev] --
1,282,823 UART: [fwproc] Wait for Commands...
1,283,560 UART: [fwproc] Recv command 0x46574c44
1,284,293 UART: [fwproc] Recv'd Img size: 114332 bytes
1,332,001 UART: ROM Fatal Error: 0x000B0034
1,333,158 >>> mbox cmd response: failed
1,333,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,164 >>> mbox cmd response: failed
1,333,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,170 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,815 UART: [state] LifecycleState = Unprovisioned
86,470 UART: [state] DebugLocked = No
87,102 UART: [state] WD Timer not started. Device not locked for debugging
88,411 UART: [kat] SHA2-256
891,961 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,090 UART: [kat] ++
896,242 UART: [kat] sha1
900,438 UART: [kat] SHA2-256
902,378 UART: [kat] SHA2-384
905,261 UART: [kat] SHA2-512-ACC
907,162 UART: [kat] ECC-384
917,325 UART: [kat] HMAC-384Kdf
921,947 UART: [kat] LMS
1,170,259 UART: [kat] --
1,171,174 UART: [cold-reset] ++
1,171,566 UART: [fht] FHT @ 0x50003400
1,174,140 UART: [idev] ++
1,174,308 UART: [idev] CDI.KEYID = 6
1,174,669 UART: [idev] SUBJECT.KEYID = 7
1,175,094 UART: [idev] UDS.KEYID = 0
1,175,440 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,006 UART: [idev] Erasing UDS.KEYID = 0
1,199,920 UART: [idev] Sha1 KeyId Algorithm
1,208,754 UART: [idev] --
1,209,987 UART: [ldev] ++
1,210,155 UART: [ldev] CDI.KEYID = 6
1,210,519 UART: [ldev] SUBJECT.KEYID = 5
1,210,946 UART: [ldev] AUTHORITY.KEYID = 7
1,211,409 UART: [ldev] FE.KEYID = 1
1,216,881 UART: [ldev] Erasing FE.KEYID = 1
1,243,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,879 UART: [ldev] --
1,282,205 UART: [fwproc] Wait for Commands...
1,282,996 UART: [fwproc] Recv command 0x46574c44
1,283,729 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,482 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,366 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,675 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,449 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,827 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,851 >>> mbox cmd response: failed
1,183,851 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,857 >>> mbox cmd response: failed
1,183,857 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,863 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,351 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,273 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,969 UART: [kat] SHA2-256
881,900 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,015 UART: [kat] ++
886,167 UART: [kat] sha1
890,253 UART: [kat] SHA2-256
892,191 UART: [kat] SHA2-384
895,040 UART: [kat] SHA2-512-ACC
896,941 UART: [kat] ECC-384
902,338 UART: [kat] HMAC-384Kdf
906,900 UART: [kat] LMS
1,475,096 UART: [kat] --
1,475,991 UART: [cold-reset] ++
1,476,423 UART: [fht] Storing FHT @ 0x50003400
1,479,208 UART: [idev] ++
1,479,376 UART: [idev] CDI.KEYID = 6
1,479,736 UART: [idev] SUBJECT.KEYID = 7
1,480,160 UART: [idev] UDS.KEYID = 0
1,480,505 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,016 UART: [idev] Erasing UDS.KEYID = 0
1,504,586 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,294 UART: [idev] --
1,514,445 UART: [ldev] ++
1,514,613 UART: [ldev] CDI.KEYID = 6
1,514,976 UART: [ldev] SUBJECT.KEYID = 5
1,515,402 UART: [ldev] AUTHORITY.KEYID = 7
1,515,865 UART: [ldev] FE.KEYID = 1
1,521,063 UART: [ldev] Erasing FE.KEYID = 1
1,546,408 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,988 UART: [ldev] --
1,585,419 UART: [fwproc] Waiting for Commands...
1,586,196 UART: [fwproc] Received command 0x46574c44
1,586,987 UART: [fwproc] Received Image of size 114332 bytes
1,635,228 UART: ROM Fatal Error: 0x000B0017
1,636,385 >>> mbox cmd response: failed
1,636,385 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,391 >>> mbox cmd response: failed
1,636,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,397 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,563 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,207 UART: [kat] SHA2-256
882,138 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,253 UART: [kat] ++
886,405 UART: [kat] sha1
890,633 UART: [kat] SHA2-256
892,571 UART: [kat] SHA2-384
895,386 UART: [kat] SHA2-512-ACC
897,287 UART: [kat] ECC-384
903,130 UART: [kat] HMAC-384Kdf
907,634 UART: [kat] LMS
1,475,830 UART: [kat] --
1,476,731 UART: [cold-reset] ++
1,477,197 UART: [fht] Storing FHT @ 0x50003400
1,479,774 UART: [idev] ++
1,479,942 UART: [idev] CDI.KEYID = 6
1,480,302 UART: [idev] SUBJECT.KEYID = 7
1,480,726 UART: [idev] UDS.KEYID = 0
1,481,071 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,744 UART: [idev] Erasing UDS.KEYID = 0
1,505,370 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,962 UART: [idev] --
1,515,011 UART: [ldev] ++
1,515,179 UART: [ldev] CDI.KEYID = 6
1,515,542 UART: [ldev] SUBJECT.KEYID = 5
1,515,968 UART: [ldev] AUTHORITY.KEYID = 7
1,516,431 UART: [ldev] FE.KEYID = 1
1,521,697 UART: [ldev] Erasing FE.KEYID = 1
1,547,124 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,074 UART: [ldev] --
1,586,387 UART: [fwproc] Waiting for Commands...
1,587,140 UART: [fwproc] Received command 0x46574c44
1,587,931 UART: [fwproc] Received Image of size 114332 bytes
2,884,852 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,414 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,766 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,545 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,689 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,474 >>> mbox cmd response: failed
1,489,474 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,480 >>> mbox cmd response: failed
1,489,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,486 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,387 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,051 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,534 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,132 UART: [kat] SHA2-256
882,063 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,178 UART: [kat] ++
886,330 UART: [kat] sha1
890,472 UART: [kat] SHA2-256
892,410 UART: [kat] SHA2-384
895,153 UART: [kat] SHA2-512-ACC
897,054 UART: [kat] ECC-384
902,749 UART: [kat] HMAC-384Kdf
907,387 UART: [kat] LMS
1,475,583 UART: [kat] --
1,476,714 UART: [cold-reset] ++
1,477,056 UART: [fht] Storing FHT @ 0x50003400
1,479,871 UART: [idev] ++
1,480,039 UART: [idev] CDI.KEYID = 6
1,480,399 UART: [idev] SUBJECT.KEYID = 7
1,480,823 UART: [idev] UDS.KEYID = 0
1,481,168 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,471 UART: [idev] Erasing UDS.KEYID = 0
1,506,181 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,953 UART: [idev] --
1,516,102 UART: [ldev] ++
1,516,270 UART: [ldev] CDI.KEYID = 6
1,516,633 UART: [ldev] SUBJECT.KEYID = 5
1,517,059 UART: [ldev] AUTHORITY.KEYID = 7
1,517,522 UART: [ldev] FE.KEYID = 1
1,522,982 UART: [ldev] Erasing FE.KEYID = 1
1,548,283 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,125 UART: [ldev] --
1,587,518 UART: [fwproc] Waiting for Commands...
1,588,369 UART: [fwproc] Received command 0x46574c44
1,589,160 UART: [fwproc] Received Image of size 114332 bytes
1,636,681 UART: ROM Fatal Error: 0x000B0017
1,637,838 >>> mbox cmd response: failed
1,637,838 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,844 >>> mbox cmd response: failed
1,637,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,850 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,021 UART: [state] LifecycleState = Unprovisioned
86,676 UART: [state] DebugLocked = No
87,400 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,016 UART: [kat] SHA2-256
882,947 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,062 UART: [kat] ++
887,214 UART: [kat] sha1
891,326 UART: [kat] SHA2-256
893,264 UART: [kat] SHA2-384
896,043 UART: [kat] SHA2-512-ACC
897,944 UART: [kat] ECC-384
903,567 UART: [kat] HMAC-384Kdf
908,175 UART: [kat] LMS
1,476,371 UART: [kat] --
1,477,292 UART: [cold-reset] ++
1,477,830 UART: [fht] Storing FHT @ 0x50003400
1,480,481 UART: [idev] ++
1,480,649 UART: [idev] CDI.KEYID = 6
1,481,009 UART: [idev] SUBJECT.KEYID = 7
1,481,433 UART: [idev] UDS.KEYID = 0
1,481,778 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,345 UART: [idev] Erasing UDS.KEYID = 0
1,506,363 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,035 UART: [idev] --
1,515,960 UART: [ldev] ++
1,516,128 UART: [ldev] CDI.KEYID = 6
1,516,491 UART: [ldev] SUBJECT.KEYID = 5
1,516,917 UART: [ldev] AUTHORITY.KEYID = 7
1,517,380 UART: [ldev] FE.KEYID = 1
1,522,396 UART: [ldev] Erasing FE.KEYID = 1
1,547,427 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,251 UART: [ldev] --
1,586,760 UART: [fwproc] Waiting for Commands...
1,587,595 UART: [fwproc] Received command 0x46574c44
1,588,386 UART: [fwproc] Received Image of size 114332 bytes
2,885,897 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,077 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,429 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,400 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,052 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,821 >>> mbox cmd response: failed
1,487,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,827 >>> mbox cmd response: failed
1,487,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,833 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,700 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,400 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
893,230 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,355 UART: [kat] ++
897,507 UART: [kat] sha1
901,869 UART: [kat] SHA2-256
903,809 UART: [kat] SHA2-384
906,622 UART: [kat] SHA2-512-ACC
908,523 UART: [kat] ECC-384
918,008 UART: [kat] HMAC-384Kdf
922,532 UART: [kat] LMS
1,170,860 UART: [kat] --
1,171,837 UART: [cold-reset] ++
1,172,357 UART: [fht] FHT @ 0x50003400
1,175,142 UART: [idev] ++
1,175,310 UART: [idev] CDI.KEYID = 6
1,175,670 UART: [idev] SUBJECT.KEYID = 7
1,176,094 UART: [idev] UDS.KEYID = 0
1,176,439 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,012 UART: [idev] Erasing UDS.KEYID = 0
1,201,085 UART: [idev] Sha1 KeyId Algorithm
1,209,623 UART: [idev] --
1,210,757 UART: [ldev] ++
1,210,925 UART: [ldev] CDI.KEYID = 6
1,211,288 UART: [ldev] SUBJECT.KEYID = 5
1,211,714 UART: [ldev] AUTHORITY.KEYID = 7
1,212,177 UART: [ldev] FE.KEYID = 1
1,217,243 UART: [ldev] Erasing FE.KEYID = 1
1,243,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,713 UART: [ldev] --
1,283,032 UART: [fwproc] Wait for Commands...
1,283,814 UART: [fwproc] Recv command 0x46574c44
1,284,542 UART: [fwproc] Recv'd Img size: 114332 bytes
1,332,005 UART: ROM Fatal Error: 0x000B0017
1,333,162 >>> mbox cmd response: failed
1,333,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,168 >>> mbox cmd response: failed
1,333,168 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,174 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,518 UART: [state] LifecycleState = Unprovisioned
86,173 UART: [state] DebugLocked = No
86,829 UART: [state] WD Timer not started. Device not locked for debugging
88,042 UART: [kat] SHA2-256
893,692 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,817 UART: [kat] ++
897,969 UART: [kat] sha1
902,315 UART: [kat] SHA2-256
904,255 UART: [kat] SHA2-384
906,932 UART: [kat] SHA2-512-ACC
908,833 UART: [kat] ECC-384
918,426 UART: [kat] HMAC-384Kdf
923,080 UART: [kat] LMS
1,171,408 UART: [kat] --
1,172,315 UART: [cold-reset] ++
1,172,869 UART: [fht] FHT @ 0x50003400
1,175,462 UART: [idev] ++
1,175,630 UART: [idev] CDI.KEYID = 6
1,175,990 UART: [idev] SUBJECT.KEYID = 7
1,176,414 UART: [idev] UDS.KEYID = 0
1,176,759 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,612 UART: [idev] Erasing UDS.KEYID = 0
1,201,821 UART: [idev] Sha1 KeyId Algorithm
1,210,129 UART: [idev] --
1,211,123 UART: [ldev] ++
1,211,291 UART: [ldev] CDI.KEYID = 6
1,211,654 UART: [ldev] SUBJECT.KEYID = 5
1,212,080 UART: [ldev] AUTHORITY.KEYID = 7
1,212,543 UART: [ldev] FE.KEYID = 1
1,217,641 UART: [ldev] Erasing FE.KEYID = 1
1,243,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,767 UART: [ldev] --
1,283,116 UART: [fwproc] Wait for Commands...
1,283,736 UART: [fwproc] Recv command 0x46574c44
1,284,464 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,479 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,783 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,586 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,589 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,187,749 >>> mbox cmd response: failed
1,187,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,755 >>> mbox cmd response: failed
1,187,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,761 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,565 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,545 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
893,715 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,840 UART: [kat] ++
897,992 UART: [kat] sha1
902,214 UART: [kat] SHA2-256
904,154 UART: [kat] SHA2-384
906,969 UART: [kat] SHA2-512-ACC
908,870 UART: [kat] ECC-384
918,249 UART: [kat] HMAC-384Kdf
922,969 UART: [kat] LMS
1,171,297 UART: [kat] --
1,172,214 UART: [cold-reset] ++
1,172,692 UART: [fht] FHT @ 0x50003400
1,175,459 UART: [idev] ++
1,175,627 UART: [idev] CDI.KEYID = 6
1,175,987 UART: [idev] SUBJECT.KEYID = 7
1,176,411 UART: [idev] UDS.KEYID = 0
1,176,756 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,367 UART: [idev] Erasing UDS.KEYID = 0
1,201,586 UART: [idev] Sha1 KeyId Algorithm
1,210,152 UART: [idev] --
1,211,096 UART: [ldev] ++
1,211,264 UART: [ldev] CDI.KEYID = 6
1,211,627 UART: [ldev] SUBJECT.KEYID = 5
1,212,053 UART: [ldev] AUTHORITY.KEYID = 7
1,212,516 UART: [ldev] FE.KEYID = 1
1,217,832 UART: [ldev] Erasing FE.KEYID = 1
1,244,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,488 UART: [ldev] --
1,283,797 UART: [fwproc] Wait for Commands...
1,284,511 UART: [fwproc] Recv command 0x46574c44
1,285,239 UART: [fwproc] Recv'd Img size: 114332 bytes
1,332,288 UART: ROM Fatal Error: 0x000B0017
1,333,445 >>> mbox cmd response: failed
1,333,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,451 >>> mbox cmd response: failed
1,333,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,457 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
893,413 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,538 UART: [kat] ++
897,690 UART: [kat] sha1
901,858 UART: [kat] SHA2-256
903,798 UART: [kat] SHA2-384
906,617 UART: [kat] SHA2-512-ACC
908,518 UART: [kat] ECC-384
918,299 UART: [kat] HMAC-384Kdf
922,987 UART: [kat] LMS
1,171,315 UART: [kat] --
1,172,116 UART: [cold-reset] ++
1,172,468 UART: [fht] FHT @ 0x50003400
1,175,143 UART: [idev] ++
1,175,311 UART: [idev] CDI.KEYID = 6
1,175,671 UART: [idev] SUBJECT.KEYID = 7
1,176,095 UART: [idev] UDS.KEYID = 0
1,176,440 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,071 UART: [idev] Erasing UDS.KEYID = 0
1,201,534 UART: [idev] Sha1 KeyId Algorithm
1,210,008 UART: [idev] --
1,211,216 UART: [ldev] ++
1,211,384 UART: [ldev] CDI.KEYID = 6
1,211,747 UART: [ldev] SUBJECT.KEYID = 5
1,212,173 UART: [ldev] AUTHORITY.KEYID = 7
1,212,636 UART: [ldev] FE.KEYID = 1
1,217,778 UART: [ldev] Erasing FE.KEYID = 1
1,243,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,482 UART: [ldev] --
1,282,755 UART: [fwproc] Wait for Commands...
1,283,529 UART: [fwproc] Recv command 0x46574c44
1,284,257 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,614 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,918 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,789 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,084 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,188,256 >>> mbox cmd response: failed
1,188,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,262 >>> mbox cmd response: failed
1,188,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,268 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,690 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,142 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,752 UART: [state] LifecycleState = Unprovisioned
85,407 UART: [state] DebugLocked = No
86,047 UART: [state] WD Timer not started. Device not locked for debugging
87,154 UART: [kat] SHA2-256
890,704 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,833 UART: [kat] ++
894,985 UART: [kat] sha1
899,233 UART: [kat] SHA2-256
901,173 UART: [kat] SHA2-384
904,010 UART: [kat] SHA2-512-ACC
905,911 UART: [kat] ECC-384
915,630 UART: [kat] HMAC-384Kdf
920,122 UART: [kat] LMS
1,168,434 UART: [kat] --
1,169,129 UART: [cold-reset] ++
1,169,479 UART: [fht] FHT @ 0x50003400
1,172,191 UART: [idev] ++
1,172,359 UART: [idev] CDI.KEYID = 6
1,172,720 UART: [idev] SUBJECT.KEYID = 7
1,173,145 UART: [idev] UDS.KEYID = 0
1,173,491 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,311 UART: [idev] Erasing UDS.KEYID = 0
1,198,071 UART: [idev] Sha1 KeyId Algorithm
1,206,833 UART: [idev] --
1,207,888 UART: [ldev] ++
1,208,056 UART: [ldev] CDI.KEYID = 6
1,208,420 UART: [ldev] SUBJECT.KEYID = 5
1,208,847 UART: [ldev] AUTHORITY.KEYID = 7
1,209,310 UART: [ldev] FE.KEYID = 1
1,214,384 UART: [ldev] Erasing FE.KEYID = 1
1,240,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,170 UART: [ldev] --
1,279,578 UART: [fwproc] Wait for Commands...
1,280,331 UART: [fwproc] Recv command 0x46574c44
1,281,064 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,652 UART: ROM Fatal Error: 0x000B0017
1,329,809 >>> mbox cmd response: failed
1,329,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,815 >>> mbox cmd response: failed
1,329,815 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,821 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
891,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,415 UART: [kat] ++
895,567 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,630 UART: [kat] SHA2-512-ACC
906,531 UART: [kat] ECC-384
915,990 UART: [kat] HMAC-384Kdf
920,690 UART: [kat] LMS
1,169,002 UART: [kat] --
1,169,891 UART: [cold-reset] ++
1,170,267 UART: [fht] FHT @ 0x50003400
1,172,721 UART: [idev] ++
1,172,889 UART: [idev] CDI.KEYID = 6
1,173,250 UART: [idev] SUBJECT.KEYID = 7
1,173,675 UART: [idev] UDS.KEYID = 0
1,174,021 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,713 UART: [idev] Erasing UDS.KEYID = 0
1,198,755 UART: [idev] Sha1 KeyId Algorithm
1,207,715 UART: [idev] --
1,208,802 UART: [ldev] ++
1,208,970 UART: [ldev] CDI.KEYID = 6
1,209,334 UART: [ldev] SUBJECT.KEYID = 5
1,209,761 UART: [ldev] AUTHORITY.KEYID = 7
1,210,224 UART: [ldev] FE.KEYID = 1
1,215,302 UART: [ldev] Erasing FE.KEYID = 1
1,241,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,106 UART: [ldev] --
1,280,444 UART: [fwproc] Wait for Commands...
1,281,179 UART: [fwproc] Recv command 0x46574c44
1,281,912 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,917 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,226 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,042 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,124 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,066 >>> mbox cmd response: failed
1,183,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,072 >>> mbox cmd response: failed
1,183,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,078 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,676 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,144 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
891,411 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,540 UART: [kat] ++
895,692 UART: [kat] sha1
899,924 UART: [kat] SHA2-256
901,864 UART: [kat] SHA2-384
904,613 UART: [kat] SHA2-512-ACC
906,514 UART: [kat] ECC-384
916,215 UART: [kat] HMAC-384Kdf
921,001 UART: [kat] LMS
1,169,313 UART: [kat] --
1,170,166 UART: [cold-reset] ++
1,170,592 UART: [fht] FHT @ 0x50003400
1,173,200 UART: [idev] ++
1,173,368 UART: [idev] CDI.KEYID = 6
1,173,729 UART: [idev] SUBJECT.KEYID = 7
1,174,154 UART: [idev] UDS.KEYID = 0
1,174,500 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,676 UART: [idev] Erasing UDS.KEYID = 0
1,199,498 UART: [idev] Sha1 KeyId Algorithm
1,208,466 UART: [idev] --
1,209,577 UART: [ldev] ++
1,209,745 UART: [ldev] CDI.KEYID = 6
1,210,109 UART: [ldev] SUBJECT.KEYID = 5
1,210,536 UART: [ldev] AUTHORITY.KEYID = 7
1,210,999 UART: [ldev] FE.KEYID = 1
1,216,421 UART: [ldev] Erasing FE.KEYID = 1
1,242,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,459 UART: [ldev] --
1,281,899 UART: [fwproc] Wait for Commands...
1,282,716 UART: [fwproc] Recv command 0x46574c44
1,283,449 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,039 UART: ROM Fatal Error: 0x000B0017
1,332,196 >>> mbox cmd response: failed
1,332,196 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,202 >>> mbox cmd response: failed
1,332,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,208 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,934 UART: [state] WD Timer not started. Device not locked for debugging
88,213 UART: [kat] SHA2-256
891,763 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,892 UART: [kat] ++
896,044 UART: [kat] sha1
900,200 UART: [kat] SHA2-256
902,140 UART: [kat] SHA2-384
905,047 UART: [kat] SHA2-512-ACC
906,948 UART: [kat] ECC-384
916,821 UART: [kat] HMAC-384Kdf
921,397 UART: [kat] LMS
1,169,709 UART: [kat] --
1,170,560 UART: [cold-reset] ++
1,171,064 UART: [fht] FHT @ 0x50003400
1,173,674 UART: [idev] ++
1,173,842 UART: [idev] CDI.KEYID = 6
1,174,203 UART: [idev] SUBJECT.KEYID = 7
1,174,628 UART: [idev] UDS.KEYID = 0
1,174,974 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,312 UART: [idev] Erasing UDS.KEYID = 0
1,199,570 UART: [idev] Sha1 KeyId Algorithm
1,208,454 UART: [idev] --
1,209,549 UART: [ldev] ++
1,209,717 UART: [ldev] CDI.KEYID = 6
1,210,081 UART: [ldev] SUBJECT.KEYID = 5
1,210,508 UART: [ldev] AUTHORITY.KEYID = 7
1,210,971 UART: [ldev] FE.KEYID = 1
1,216,451 UART: [ldev] Erasing FE.KEYID = 1
1,243,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,831 UART: [ldev] --
1,282,171 UART: [fwproc] Wait for Commands...
1,282,750 UART: [fwproc] Recv command 0x46574c44
1,283,483 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,464 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,773 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,653 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,315 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,627 >>> mbox cmd response: failed
1,183,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,633 >>> mbox cmd response: failed
1,183,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,639 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,875 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,925 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,571 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,177 UART: [kat] SHA2-256
882,108 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,223 UART: [kat] ++
886,375 UART: [kat] sha1
890,495 UART: [kat] SHA2-256
892,433 UART: [kat] SHA2-384
895,092 UART: [kat] SHA2-512-ACC
896,993 UART: [kat] ECC-384
902,560 UART: [kat] HMAC-384Kdf
907,262 UART: [kat] LMS
1,475,458 UART: [kat] --
1,476,489 UART: [cold-reset] ++
1,476,829 UART: [fht] Storing FHT @ 0x50003400
1,479,662 UART: [idev] ++
1,479,830 UART: [idev] CDI.KEYID = 6
1,480,190 UART: [idev] SUBJECT.KEYID = 7
1,480,614 UART: [idev] UDS.KEYID = 0
1,480,959 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,790 UART: [idev] Erasing UDS.KEYID = 0
1,505,066 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,786 UART: [idev] --
1,514,763 UART: [ldev] ++
1,514,931 UART: [ldev] CDI.KEYID = 6
1,515,294 UART: [ldev] SUBJECT.KEYID = 5
1,515,720 UART: [ldev] AUTHORITY.KEYID = 7
1,516,183 UART: [ldev] FE.KEYID = 1
1,521,537 UART: [ldev] Erasing FE.KEYID = 1
1,546,294 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,188 UART: [ldev] --
1,585,627 UART: [fwproc] Waiting for Commands...
1,586,280 UART: [fwproc] Received command 0x46574c44
1,587,071 UART: [fwproc] Received Image of size 114332 bytes
1,633,614 UART: ROM Fatal Error: 0x000B003B
1,634,773 >>> mbox cmd response: failed
1,634,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,779 >>> mbox cmd response: failed
1,634,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,785 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,630 UART: [state] LifecycleState = Unprovisioned
86,285 UART: [state] DebugLocked = No
86,999 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,655 UART: [kat] SHA2-256
882,586 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,701 UART: [kat] ++
886,853 UART: [kat] sha1
891,197 UART: [kat] SHA2-256
893,135 UART: [kat] SHA2-384
895,886 UART: [kat] SHA2-512-ACC
897,787 UART: [kat] ECC-384
903,228 UART: [kat] HMAC-384Kdf
907,846 UART: [kat] LMS
1,476,042 UART: [kat] --
1,476,685 UART: [cold-reset] ++
1,477,165 UART: [fht] Storing FHT @ 0x50003400
1,479,738 UART: [idev] ++
1,479,906 UART: [idev] CDI.KEYID = 6
1,480,266 UART: [idev] SUBJECT.KEYID = 7
1,480,690 UART: [idev] UDS.KEYID = 0
1,481,035 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,672 UART: [idev] Erasing UDS.KEYID = 0
1,505,092 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,584 UART: [idev] --
1,514,641 UART: [ldev] ++
1,514,809 UART: [ldev] CDI.KEYID = 6
1,515,172 UART: [ldev] SUBJECT.KEYID = 5
1,515,598 UART: [ldev] AUTHORITY.KEYID = 7
1,516,061 UART: [ldev] FE.KEYID = 1
1,521,267 UART: [ldev] Erasing FE.KEYID = 1
1,547,756 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,758 UART: [ldev] --
1,587,097 UART: [fwproc] Waiting for Commands...
1,587,908 UART: [fwproc] Received command 0x46574c44
1,588,699 UART: [fwproc] Received Image of size 114332 bytes
2,886,890 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,402 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,754 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,533 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,669 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,486,572 >>> mbox cmd response: failed
1,486,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,578 >>> mbox cmd response: failed
1,486,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,584 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,451 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,379 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,710 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,384 UART: [kat] SHA2-256
882,315 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,430 UART: [kat] ++
886,582 UART: [kat] sha1
890,882 UART: [kat] SHA2-256
892,820 UART: [kat] SHA2-384
895,547 UART: [kat] SHA2-512-ACC
897,448 UART: [kat] ECC-384
903,137 UART: [kat] HMAC-384Kdf
907,763 UART: [kat] LMS
1,475,959 UART: [kat] --
1,476,718 UART: [cold-reset] ++
1,477,294 UART: [fht] Storing FHT @ 0x50003400
1,480,167 UART: [idev] ++
1,480,335 UART: [idev] CDI.KEYID = 6
1,480,695 UART: [idev] SUBJECT.KEYID = 7
1,481,119 UART: [idev] UDS.KEYID = 0
1,481,464 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,863 UART: [idev] Erasing UDS.KEYID = 0
1,505,939 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,479 UART: [idev] --
1,515,512 UART: [ldev] ++
1,515,680 UART: [ldev] CDI.KEYID = 6
1,516,043 UART: [ldev] SUBJECT.KEYID = 5
1,516,469 UART: [ldev] AUTHORITY.KEYID = 7
1,516,932 UART: [ldev] FE.KEYID = 1
1,522,126 UART: [ldev] Erasing FE.KEYID = 1
1,547,711 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,629 UART: [ldev] --
1,587,060 UART: [fwproc] Waiting for Commands...
1,587,927 UART: [fwproc] Received command 0x46574c44
1,588,718 UART: [fwproc] Received Image of size 114332 bytes
1,636,233 UART: ROM Fatal Error: 0x000B003B
1,637,392 >>> mbox cmd response: failed
1,637,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,398 >>> mbox cmd response: failed
1,637,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,404 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
87,022 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,570 UART: [kat] SHA2-256
882,501 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,616 UART: [kat] ++
886,768 UART: [kat] sha1
891,052 UART: [kat] SHA2-256
892,990 UART: [kat] SHA2-384
895,623 UART: [kat] SHA2-512-ACC
897,524 UART: [kat] ECC-384
902,947 UART: [kat] HMAC-384Kdf
907,793 UART: [kat] LMS
1,475,989 UART: [kat] --
1,476,702 UART: [cold-reset] ++
1,477,246 UART: [fht] Storing FHT @ 0x50003400
1,480,133 UART: [idev] ++
1,480,301 UART: [idev] CDI.KEYID = 6
1,480,661 UART: [idev] SUBJECT.KEYID = 7
1,481,085 UART: [idev] UDS.KEYID = 0
1,481,430 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,121 UART: [idev] Erasing UDS.KEYID = 0
1,506,539 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,033 UART: [idev] --
1,516,158 UART: [ldev] ++
1,516,326 UART: [ldev] CDI.KEYID = 6
1,516,689 UART: [ldev] SUBJECT.KEYID = 5
1,517,115 UART: [ldev] AUTHORITY.KEYID = 7
1,517,578 UART: [ldev] FE.KEYID = 1
1,522,838 UART: [ldev] Erasing FE.KEYID = 1
1,547,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,269 UART: [ldev] --
1,587,622 UART: [fwproc] Waiting for Commands...
1,588,323 UART: [fwproc] Received command 0x46574c44
1,589,114 UART: [fwproc] Received Image of size 114332 bytes
2,886,955 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,385 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,737 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,542 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,028 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,206 >>> mbox cmd response: failed
1,489,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,212 >>> mbox cmd response: failed
1,489,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,218 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,534 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,430 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
88,046 UART: [kat] SHA2-256
893,696 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,821 UART: [kat] ++
897,973 UART: [kat] sha1
902,263 UART: [kat] SHA2-256
904,203 UART: [kat] SHA2-384
906,932 UART: [kat] SHA2-512-ACC
908,833 UART: [kat] ECC-384
918,414 UART: [kat] HMAC-384Kdf
923,036 UART: [kat] LMS
1,171,364 UART: [kat] --
1,172,089 UART: [cold-reset] ++
1,172,597 UART: [fht] FHT @ 0x50003400
1,175,188 UART: [idev] ++
1,175,356 UART: [idev] CDI.KEYID = 6
1,175,716 UART: [idev] SUBJECT.KEYID = 7
1,176,140 UART: [idev] UDS.KEYID = 0
1,176,485 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,686 UART: [idev] Erasing UDS.KEYID = 0
1,200,203 UART: [idev] Sha1 KeyId Algorithm
1,208,817 UART: [idev] --
1,209,921 UART: [ldev] ++
1,210,089 UART: [ldev] CDI.KEYID = 6
1,210,452 UART: [ldev] SUBJECT.KEYID = 5
1,210,878 UART: [ldev] AUTHORITY.KEYID = 7
1,211,341 UART: [ldev] FE.KEYID = 1
1,216,635 UART: [ldev] Erasing FE.KEYID = 1
1,242,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,053 UART: [ldev] --
1,282,516 UART: [fwproc] Wait for Commands...
1,283,206 UART: [fwproc] Recv command 0x46574c44
1,283,934 UART: [fwproc] Recv'd Img size: 114332 bytes
1,332,679 UART: ROM Fatal Error: 0x000B003B
1,333,838 >>> mbox cmd response: failed
1,333,838 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,844 >>> mbox cmd response: failed
1,333,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,850 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
893,444 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,569 UART: [kat] ++
897,721 UART: [kat] sha1
901,947 UART: [kat] SHA2-256
903,887 UART: [kat] SHA2-384
906,456 UART: [kat] SHA2-512-ACC
908,357 UART: [kat] ECC-384
917,932 UART: [kat] HMAC-384Kdf
922,504 UART: [kat] LMS
1,170,832 UART: [kat] --
1,171,795 UART: [cold-reset] ++
1,172,195 UART: [fht] FHT @ 0x50003400
1,174,824 UART: [idev] ++
1,174,992 UART: [idev] CDI.KEYID = 6
1,175,352 UART: [idev] SUBJECT.KEYID = 7
1,175,776 UART: [idev] UDS.KEYID = 0
1,176,121 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,710 UART: [idev] Erasing UDS.KEYID = 0
1,200,939 UART: [idev] Sha1 KeyId Algorithm
1,209,495 UART: [idev] --
1,210,593 UART: [ldev] ++
1,210,761 UART: [ldev] CDI.KEYID = 6
1,211,124 UART: [ldev] SUBJECT.KEYID = 5
1,211,550 UART: [ldev] AUTHORITY.KEYID = 7
1,212,013 UART: [ldev] FE.KEYID = 1
1,216,781 UART: [ldev] Erasing FE.KEYID = 1
1,243,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,309 UART: [ldev] --
1,282,698 UART: [fwproc] Wait for Commands...
1,283,336 UART: [fwproc] Recv command 0x46574c44
1,284,064 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,581 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,424 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,757 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,753 >>> mbox cmd response: failed
1,185,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,759 >>> mbox cmd response: failed
1,185,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,765 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,829 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,815 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
893,541 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,666 UART: [kat] ++
897,818 UART: [kat] sha1
901,914 UART: [kat] SHA2-256
903,854 UART: [kat] SHA2-384
906,541 UART: [kat] SHA2-512-ACC
908,442 UART: [kat] ECC-384
918,275 UART: [kat] HMAC-384Kdf
922,829 UART: [kat] LMS
1,171,157 UART: [kat] --
1,171,984 UART: [cold-reset] ++
1,172,552 UART: [fht] FHT @ 0x50003400
1,175,175 UART: [idev] ++
1,175,343 UART: [idev] CDI.KEYID = 6
1,175,703 UART: [idev] SUBJECT.KEYID = 7
1,176,127 UART: [idev] UDS.KEYID = 0
1,176,472 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,333 UART: [idev] Erasing UDS.KEYID = 0
1,201,356 UART: [idev] Sha1 KeyId Algorithm
1,209,642 UART: [idev] --
1,210,638 UART: [ldev] ++
1,210,806 UART: [ldev] CDI.KEYID = 6
1,211,169 UART: [ldev] SUBJECT.KEYID = 5
1,211,595 UART: [ldev] AUTHORITY.KEYID = 7
1,212,058 UART: [ldev] FE.KEYID = 1
1,217,252 UART: [ldev] Erasing FE.KEYID = 1
1,243,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,172 UART: [ldev] --
1,282,601 UART: [fwproc] Wait for Commands...
1,283,413 UART: [fwproc] Recv command 0x46574c44
1,284,141 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,732 UART: ROM Fatal Error: 0x000B003B
1,332,891 >>> mbox cmd response: failed
1,332,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,897 >>> mbox cmd response: failed
1,332,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,903 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,861 UART: [state] LifecycleState = Unprovisioned
86,516 UART: [state] DebugLocked = No
87,004 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
893,821 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,946 UART: [kat] ++
898,098 UART: [kat] sha1
902,394 UART: [kat] SHA2-256
904,334 UART: [kat] SHA2-384
907,225 UART: [kat] SHA2-512-ACC
909,126 UART: [kat] ECC-384
918,693 UART: [kat] HMAC-384Kdf
923,275 UART: [kat] LMS
1,171,603 UART: [kat] --
1,172,328 UART: [cold-reset] ++
1,172,890 UART: [fht] FHT @ 0x50003400
1,175,371 UART: [idev] ++
1,175,539 UART: [idev] CDI.KEYID = 6
1,175,899 UART: [idev] SUBJECT.KEYID = 7
1,176,323 UART: [idev] UDS.KEYID = 0
1,176,668 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,145 UART: [idev] Erasing UDS.KEYID = 0
1,200,882 UART: [idev] Sha1 KeyId Algorithm
1,209,150 UART: [idev] --
1,210,240 UART: [ldev] ++
1,210,408 UART: [ldev] CDI.KEYID = 6
1,210,771 UART: [ldev] SUBJECT.KEYID = 5
1,211,197 UART: [ldev] AUTHORITY.KEYID = 7
1,211,660 UART: [ldev] FE.KEYID = 1
1,217,142 UART: [ldev] Erasing FE.KEYID = 1
1,243,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,444 UART: [ldev] --
1,282,845 UART: [fwproc] Wait for Commands...
1,283,595 UART: [fwproc] Recv command 0x46574c44
1,284,323 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,762 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,066 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,865 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,256 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,187,812 >>> mbox cmd response: failed
1,187,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,818 >>> mbox cmd response: failed
1,187,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,824 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,616 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,484 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
891,018 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,147 UART: [kat] ++
895,299 UART: [kat] sha1
899,673 UART: [kat] SHA2-256
901,613 UART: [kat] SHA2-384
904,258 UART: [kat] SHA2-512-ACC
906,159 UART: [kat] ECC-384
915,830 UART: [kat] HMAC-384Kdf
920,410 UART: [kat] LMS
1,168,722 UART: [kat] --
1,169,557 UART: [cold-reset] ++
1,169,937 UART: [fht] FHT @ 0x50003400
1,172,579 UART: [idev] ++
1,172,747 UART: [idev] CDI.KEYID = 6
1,173,108 UART: [idev] SUBJECT.KEYID = 7
1,173,533 UART: [idev] UDS.KEYID = 0
1,173,879 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,781 UART: [idev] Erasing UDS.KEYID = 0
1,199,139 UART: [idev] Sha1 KeyId Algorithm
1,208,163 UART: [idev] --
1,209,270 UART: [ldev] ++
1,209,438 UART: [ldev] CDI.KEYID = 6
1,209,802 UART: [ldev] SUBJECT.KEYID = 5
1,210,229 UART: [ldev] AUTHORITY.KEYID = 7
1,210,692 UART: [ldev] FE.KEYID = 1
1,216,106 UART: [ldev] Erasing FE.KEYID = 1
1,242,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,452 UART: [ldev] --
1,281,884 UART: [fwproc] Wait for Commands...
1,282,539 UART: [fwproc] Recv command 0x46574c44
1,283,272 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,898 UART: ROM Fatal Error: 0x000B003B
1,332,057 >>> mbox cmd response: failed
1,332,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,063 >>> mbox cmd response: failed
1,332,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,069 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,540 UART: [state] LifecycleState = Unprovisioned
85,195 UART: [state] DebugLocked = No
85,871 UART: [state] WD Timer not started. Device not locked for debugging
87,190 UART: [kat] SHA2-256
890,740 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,869 UART: [kat] ++
895,021 UART: [kat] sha1
899,353 UART: [kat] SHA2-256
901,293 UART: [kat] SHA2-384
904,206 UART: [kat] SHA2-512-ACC
906,107 UART: [kat] ECC-384
915,536 UART: [kat] HMAC-384Kdf
920,140 UART: [kat] LMS
1,168,452 UART: [kat] --
1,169,273 UART: [cold-reset] ++
1,169,613 UART: [fht] FHT @ 0x50003400
1,172,219 UART: [idev] ++
1,172,387 UART: [idev] CDI.KEYID = 6
1,172,748 UART: [idev] SUBJECT.KEYID = 7
1,173,173 UART: [idev] UDS.KEYID = 0
1,173,519 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,021 UART: [idev] Erasing UDS.KEYID = 0
1,197,691 UART: [idev] Sha1 KeyId Algorithm
1,206,505 UART: [idev] --
1,207,712 UART: [ldev] ++
1,207,880 UART: [ldev] CDI.KEYID = 6
1,208,244 UART: [ldev] SUBJECT.KEYID = 5
1,208,671 UART: [ldev] AUTHORITY.KEYID = 7
1,209,134 UART: [ldev] FE.KEYID = 1
1,214,128 UART: [ldev] Erasing FE.KEYID = 1
1,240,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,600 UART: [ldev] --
1,279,918 UART: [fwproc] Wait for Commands...
1,280,493 UART: [fwproc] Recv command 0x46574c44
1,281,226 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,419 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,728 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,640 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,212 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,842 >>> mbox cmd response: failed
1,182,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,848 >>> mbox cmd response: failed
1,182,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,226 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,260 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [kat] SHA2-256
891,757 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,886 UART: [kat] ++
896,038 UART: [kat] sha1
900,254 UART: [kat] SHA2-256
902,194 UART: [kat] SHA2-384
904,911 UART: [kat] SHA2-512-ACC
906,812 UART: [kat] ECC-384
916,669 UART: [kat] HMAC-384Kdf
921,097 UART: [kat] LMS
1,169,409 UART: [kat] --
1,170,254 UART: [cold-reset] ++
1,170,798 UART: [fht] FHT @ 0x50003400
1,173,276 UART: [idev] ++
1,173,444 UART: [idev] CDI.KEYID = 6
1,173,805 UART: [idev] SUBJECT.KEYID = 7
1,174,230 UART: [idev] UDS.KEYID = 0
1,174,576 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,522 UART: [idev] Erasing UDS.KEYID = 0
1,200,124 UART: [idev] Sha1 KeyId Algorithm
1,208,914 UART: [idev] --
1,209,935 UART: [ldev] ++
1,210,103 UART: [ldev] CDI.KEYID = 6
1,210,467 UART: [ldev] SUBJECT.KEYID = 5
1,210,894 UART: [ldev] AUTHORITY.KEYID = 7
1,211,357 UART: [ldev] FE.KEYID = 1
1,216,605 UART: [ldev] Erasing FE.KEYID = 1
1,243,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,895 UART: [ldev] --
1,282,201 UART: [fwproc] Wait for Commands...
1,282,804 UART: [fwproc] Recv command 0x46574c44
1,283,537 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,573 UART: ROM Fatal Error: 0x000B003B
1,331,732 >>> mbox cmd response: failed
1,331,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,738 >>> mbox cmd response: failed
1,331,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,744 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,059 UART: [kat] SHA2-256
891,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,738 UART: [kat] ++
895,890 UART: [kat] sha1
900,008 UART: [kat] SHA2-256
901,948 UART: [kat] SHA2-384
904,459 UART: [kat] SHA2-512-ACC
906,360 UART: [kat] ECC-384
915,949 UART: [kat] HMAC-384Kdf
920,523 UART: [kat] LMS
1,168,835 UART: [kat] --
1,169,912 UART: [cold-reset] ++
1,170,278 UART: [fht] FHT @ 0x50003400
1,172,824 UART: [idev] ++
1,172,992 UART: [idev] CDI.KEYID = 6
1,173,353 UART: [idev] SUBJECT.KEYID = 7
1,173,778 UART: [idev] UDS.KEYID = 0
1,174,124 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,960 UART: [idev] Erasing UDS.KEYID = 0
1,199,410 UART: [idev] Sha1 KeyId Algorithm
1,208,288 UART: [idev] --
1,209,335 UART: [ldev] ++
1,209,503 UART: [ldev] CDI.KEYID = 6
1,209,867 UART: [ldev] SUBJECT.KEYID = 5
1,210,294 UART: [ldev] AUTHORITY.KEYID = 7
1,210,757 UART: [ldev] FE.KEYID = 1
1,216,397 UART: [ldev] Erasing FE.KEYID = 1
1,242,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,745 UART: [ldev] --
1,282,165 UART: [fwproc] Wait for Commands...
1,282,944 UART: [fwproc] Recv command 0x46574c44
1,283,677 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,870 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,179 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,975 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,925 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,145 >>> mbox cmd response: failed
1,185,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,151 >>> mbox cmd response: failed
1,185,151 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,157 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,025 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,719 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Manufacturing
85,839 UART: [state] DebugLocked = No
86,333 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,819 UART: [kat] SHA2-256
881,750 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,865 UART: [kat] ++
886,017 UART: [kat] sha1
890,123 UART: [kat] SHA2-256
892,061 UART: [kat] SHA2-384
894,898 UART: [kat] SHA2-512-ACC
896,799 UART: [kat] ECC-384
902,384 UART: [kat] HMAC-384Kdf
907,000 UART: [kat] LMS
1,475,196 UART: [kat] --
1,475,865 UART: [cold-reset] ++
1,476,191 UART: [fht] Storing FHT @ 0x50003400
1,478,976 UART: [idev] ++
1,479,144 UART: [idev] CDI.KEYID = 6
1,479,504 UART: [idev] SUBJECT.KEYID = 7
1,479,928 UART: [idev] UDS.KEYID = 0
1,480,273 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,012 UART: [idev] Erasing UDS.KEYID = 0
1,504,970 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,682 UART: [idev] --
1,514,851 UART: [ldev] ++
1,515,019 UART: [ldev] CDI.KEYID = 6
1,515,382 UART: [ldev] SUBJECT.KEYID = 5
1,515,808 UART: [ldev] AUTHORITY.KEYID = 7
1,516,271 UART: [ldev] FE.KEYID = 1
1,521,495 UART: [ldev] Erasing FE.KEYID = 1
1,546,968 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,462 UART: [ldev] --
1,585,831 UART: [fwproc] Waiting for Commands...
1,586,560 UART: [fwproc] Received command 0x46574c44
1,587,351 UART: [fwproc] Received Image of size 114332 bytes
1,880,000 UART: ROM Fatal Error: 0x000B0025
1,881,157 >>> mbox cmd response: failed
1,881,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,163 >>> mbox cmd response: failed
1,881,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,169 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,043 UART: [state] DebugLocked = No
86,711 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,323 UART: [kat] SHA2-256
882,254 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,369 UART: [kat] ++
886,521 UART: [kat] sha1
890,725 UART: [kat] SHA2-256
892,663 UART: [kat] SHA2-384
895,430 UART: [kat] SHA2-512-ACC
897,331 UART: [kat] ECC-384
902,878 UART: [kat] HMAC-384Kdf
907,412 UART: [kat] LMS
1,475,608 UART: [kat] --
1,476,453 UART: [cold-reset] ++
1,476,933 UART: [fht] Storing FHT @ 0x50003400
1,479,852 UART: [idev] ++
1,480,020 UART: [idev] CDI.KEYID = 6
1,480,380 UART: [idev] SUBJECT.KEYID = 7
1,480,804 UART: [idev] UDS.KEYID = 0
1,481,149 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,210 UART: [idev] Erasing UDS.KEYID = 0
1,505,954 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,598 UART: [idev] --
1,515,725 UART: [ldev] ++
1,515,893 UART: [ldev] CDI.KEYID = 6
1,516,256 UART: [ldev] SUBJECT.KEYID = 5
1,516,682 UART: [ldev] AUTHORITY.KEYID = 7
1,517,145 UART: [ldev] FE.KEYID = 1
1,522,181 UART: [ldev] Erasing FE.KEYID = 1
1,547,560 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,678 UART: [ldev] --
1,587,069 UART: [fwproc] Waiting for Commands...
1,587,798 UART: [fwproc] Received command 0x46574c44
1,588,589 UART: [fwproc] Received Image of size 114332 bytes
2,885,904 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,758 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,110 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,867 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,961 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,731,399 >>> mbox cmd response: failed
1,731,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,731,405 >>> mbox cmd response: failed
1,731,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,731,411 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,293 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,061 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Manufacturing
86,020 UART: [state] DebugLocked = No
86,632 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,122 UART: [kat] SHA2-256
882,053 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,168 UART: [kat] ++
886,320 UART: [kat] sha1
890,684 UART: [kat] SHA2-256
892,622 UART: [kat] SHA2-384
895,409 UART: [kat] SHA2-512-ACC
897,310 UART: [kat] ECC-384
902,855 UART: [kat] HMAC-384Kdf
907,413 UART: [kat] LMS
1,475,609 UART: [kat] --
1,476,634 UART: [cold-reset] ++
1,477,040 UART: [fht] Storing FHT @ 0x50003400
1,479,881 UART: [idev] ++
1,480,049 UART: [idev] CDI.KEYID = 6
1,480,409 UART: [idev] SUBJECT.KEYID = 7
1,480,833 UART: [idev] UDS.KEYID = 0
1,481,178 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,085 UART: [idev] Erasing UDS.KEYID = 0
1,505,911 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,533 UART: [idev] --
1,515,670 UART: [ldev] ++
1,515,838 UART: [ldev] CDI.KEYID = 6
1,516,201 UART: [ldev] SUBJECT.KEYID = 5
1,516,627 UART: [ldev] AUTHORITY.KEYID = 7
1,517,090 UART: [ldev] FE.KEYID = 1
1,522,330 UART: [ldev] Erasing FE.KEYID = 1
1,547,887 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,019 UART: [ldev] --
1,587,412 UART: [fwproc] Waiting for Commands...
1,588,177 UART: [fwproc] Received command 0x46574c44
1,588,968 UART: [fwproc] Received Image of size 114332 bytes
1,880,896 UART: ROM Fatal Error: 0x000B0025
1,882,053 >>> mbox cmd response: failed
1,882,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,882,059 >>> mbox cmd response: failed
1,882,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,882,065 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,542 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,176 UART: [kat] SHA2-256
882,107 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,222 UART: [kat] ++
886,374 UART: [kat] sha1
890,578 UART: [kat] SHA2-256
892,516 UART: [kat] SHA2-384
895,321 UART: [kat] SHA2-512-ACC
897,222 UART: [kat] ECC-384
902,665 UART: [kat] HMAC-384Kdf
907,315 UART: [kat] LMS
1,475,511 UART: [kat] --
1,476,390 UART: [cold-reset] ++
1,476,798 UART: [fht] Storing FHT @ 0x50003400
1,479,669 UART: [idev] ++
1,479,837 UART: [idev] CDI.KEYID = 6
1,480,197 UART: [idev] SUBJECT.KEYID = 7
1,480,621 UART: [idev] UDS.KEYID = 0
1,480,966 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,697 UART: [idev] Erasing UDS.KEYID = 0
1,505,431 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,149 UART: [idev] --
1,515,132 UART: [ldev] ++
1,515,300 UART: [ldev] CDI.KEYID = 6
1,515,663 UART: [ldev] SUBJECT.KEYID = 5
1,516,089 UART: [ldev] AUTHORITY.KEYID = 7
1,516,552 UART: [ldev] FE.KEYID = 1
1,521,896 UART: [ldev] Erasing FE.KEYID = 1
1,547,527 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,267 UART: [ldev] --
1,586,750 UART: [fwproc] Waiting for Commands...
1,587,497 UART: [fwproc] Received command 0x46574c44
1,588,288 UART: [fwproc] Received Image of size 114332 bytes
2,886,783 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,157 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,509 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,322 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,708 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,734,047 >>> mbox cmd response: failed
1,734,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,734,053 >>> mbox cmd response: failed
1,734,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,734,059 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,986 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,506 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,630 UART: [state] LifecycleState = Manufacturing
86,285 UART: [state] DebugLocked = No
86,955 UART: [state] WD Timer not started. Device not locked for debugging
88,120 UART: [kat] SHA2-256
893,770 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,895 UART: [kat] ++
898,047 UART: [kat] sha1
902,239 UART: [kat] SHA2-256
904,179 UART: [kat] SHA2-384
906,916 UART: [kat] SHA2-512-ACC
908,817 UART: [kat] ECC-384
918,512 UART: [kat] HMAC-384Kdf
923,032 UART: [kat] LMS
1,171,360 UART: [kat] --
1,172,199 UART: [cold-reset] ++
1,172,709 UART: [fht] FHT @ 0x50003400
1,175,336 UART: [idev] ++
1,175,504 UART: [idev] CDI.KEYID = 6
1,175,864 UART: [idev] SUBJECT.KEYID = 7
1,176,288 UART: [idev] UDS.KEYID = 0
1,176,633 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,146 UART: [idev] Erasing UDS.KEYID = 0
1,201,387 UART: [idev] Sha1 KeyId Algorithm
1,209,957 UART: [idev] --
1,211,043 UART: [ldev] ++
1,211,211 UART: [ldev] CDI.KEYID = 6
1,211,574 UART: [ldev] SUBJECT.KEYID = 5
1,212,000 UART: [ldev] AUTHORITY.KEYID = 7
1,212,463 UART: [ldev] FE.KEYID = 1
1,217,575 UART: [ldev] Erasing FE.KEYID = 1
1,243,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,059 UART: [ldev] --
1,282,326 UART: [fwproc] Wait for Commands...
1,282,992 UART: [fwproc] Recv command 0x46574c44
1,283,720 UART: [fwproc] Recv'd Img size: 114332 bytes
1,574,741 UART: ROM Fatal Error: 0x000B0025
1,575,898 >>> mbox cmd response: failed
1,575,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,904 >>> mbox cmd response: failed
1,575,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,910 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
893,394 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,519 UART: [kat] ++
897,671 UART: [kat] sha1
902,069 UART: [kat] SHA2-256
904,009 UART: [kat] SHA2-384
906,800 UART: [kat] SHA2-512-ACC
908,701 UART: [kat] ECC-384
918,770 UART: [kat] HMAC-384Kdf
923,406 UART: [kat] LMS
1,171,734 UART: [kat] --
1,172,645 UART: [cold-reset] ++
1,172,989 UART: [fht] FHT @ 0x50003400
1,175,570 UART: [idev] ++
1,175,738 UART: [idev] CDI.KEYID = 6
1,176,098 UART: [idev] SUBJECT.KEYID = 7
1,176,522 UART: [idev] UDS.KEYID = 0
1,176,867 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,374 UART: [idev] Erasing UDS.KEYID = 0
1,200,911 UART: [idev] Sha1 KeyId Algorithm
1,209,429 UART: [idev] --
1,210,463 UART: [ldev] ++
1,210,631 UART: [ldev] CDI.KEYID = 6
1,210,994 UART: [ldev] SUBJECT.KEYID = 5
1,211,420 UART: [ldev] AUTHORITY.KEYID = 7
1,211,883 UART: [ldev] FE.KEYID = 1
1,216,785 UART: [ldev] Erasing FE.KEYID = 1
1,242,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,983 UART: [ldev] --
1,281,380 UART: [fwproc] Wait for Commands...
1,282,024 UART: [fwproc] Recv command 0x46574c44
1,282,752 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,789 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,093 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,822 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,099 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,431,271 >>> mbox cmd response: failed
1,431,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,277 >>> mbox cmd response: failed
1,431,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,283 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,853 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,809 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Manufacturing
86,032 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
893,651 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,776 UART: [kat] ++
897,928 UART: [kat] sha1
902,070 UART: [kat] SHA2-256
904,010 UART: [kat] SHA2-384
906,903 UART: [kat] SHA2-512-ACC
908,804 UART: [kat] ECC-384
918,361 UART: [kat] HMAC-384Kdf
923,067 UART: [kat] LMS
1,171,395 UART: [kat] --
1,172,444 UART: [cold-reset] ++
1,172,894 UART: [fht] FHT @ 0x50003400
1,175,603 UART: [idev] ++
1,175,771 UART: [idev] CDI.KEYID = 6
1,176,131 UART: [idev] SUBJECT.KEYID = 7
1,176,555 UART: [idev] UDS.KEYID = 0
1,176,900 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,619 UART: [idev] Erasing UDS.KEYID = 0
1,202,310 UART: [idev] Sha1 KeyId Algorithm
1,210,726 UART: [idev] --
1,211,840 UART: [ldev] ++
1,212,008 UART: [ldev] CDI.KEYID = 6
1,212,371 UART: [ldev] SUBJECT.KEYID = 5
1,212,797 UART: [ldev] AUTHORITY.KEYID = 7
1,213,260 UART: [ldev] FE.KEYID = 1
1,218,422 UART: [ldev] Erasing FE.KEYID = 1
1,244,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,210 UART: [ldev] --
1,283,543 UART: [fwproc] Wait for Commands...
1,284,163 UART: [fwproc] Recv command 0x46574c44
1,284,891 UART: [fwproc] Recv'd Img size: 114332 bytes
1,576,194 UART: ROM Fatal Error: 0x000B0025
1,577,351 >>> mbox cmd response: failed
1,577,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,577,357 >>> mbox cmd response: failed
1,577,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,577,363 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,627 UART: [kat] SHA2-256
893,277 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,402 UART: [kat] ++
897,554 UART: [kat] sha1
901,846 UART: [kat] SHA2-256
903,786 UART: [kat] SHA2-384
906,595 UART: [kat] SHA2-512-ACC
908,496 UART: [kat] ECC-384
918,295 UART: [kat] HMAC-384Kdf
923,043 UART: [kat] LMS
1,171,371 UART: [kat] --
1,171,932 UART: [cold-reset] ++
1,172,478 UART: [fht] FHT @ 0x50003400
1,175,233 UART: [idev] ++
1,175,401 UART: [idev] CDI.KEYID = 6
1,175,761 UART: [idev] SUBJECT.KEYID = 7
1,176,185 UART: [idev] UDS.KEYID = 0
1,176,530 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,271 UART: [idev] Erasing UDS.KEYID = 0
1,201,864 UART: [idev] Sha1 KeyId Algorithm
1,210,382 UART: [idev] --
1,211,480 UART: [ldev] ++
1,211,648 UART: [ldev] CDI.KEYID = 6
1,212,011 UART: [ldev] SUBJECT.KEYID = 5
1,212,437 UART: [ldev] AUTHORITY.KEYID = 7
1,212,900 UART: [ldev] FE.KEYID = 1
1,218,068 UART: [ldev] Erasing FE.KEYID = 1
1,244,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,532 UART: [ldev] --
1,283,903 UART: [fwproc] Wait for Commands...
1,284,727 UART: [fwproc] Recv command 0x46574c44
1,285,455 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,686 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,990 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,779 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,482 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,432,516 >>> mbox cmd response: failed
1,432,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,432,522 >>> mbox cmd response: failed
1,432,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,432,528 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,038 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,324 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Manufacturing
85,677 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
891,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,237 UART: [kat] ++
895,389 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,138 UART: [kat] SHA2-512-ACC
906,039 UART: [kat] ECC-384
915,716 UART: [kat] HMAC-384Kdf
920,278 UART: [kat] LMS
1,168,590 UART: [kat] --
1,169,811 UART: [cold-reset] ++
1,170,355 UART: [fht] FHT @ 0x50003400
1,173,091 UART: [idev] ++
1,173,259 UART: [idev] CDI.KEYID = 6
1,173,620 UART: [idev] SUBJECT.KEYID = 7
1,174,045 UART: [idev] UDS.KEYID = 0
1,174,391 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,673 UART: [idev] Erasing UDS.KEYID = 0
1,199,217 UART: [idev] Sha1 KeyId Algorithm
1,208,103 UART: [idev] --
1,209,088 UART: [ldev] ++
1,209,256 UART: [ldev] CDI.KEYID = 6
1,209,620 UART: [ldev] SUBJECT.KEYID = 5
1,210,047 UART: [ldev] AUTHORITY.KEYID = 7
1,210,510 UART: [ldev] FE.KEYID = 1
1,215,624 UART: [ldev] Erasing FE.KEYID = 1
1,241,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,806 UART: [ldev] --
1,281,172 UART: [fwproc] Wait for Commands...
1,281,971 UART: [fwproc] Recv command 0x46574c44
1,282,704 UART: [fwproc] Recv'd Img size: 114332 bytes
1,574,145 UART: ROM Fatal Error: 0x000B0025
1,575,302 >>> mbox cmd response: failed
1,575,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,308 >>> mbox cmd response: failed
1,575,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,314 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
891,062 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,191 UART: [kat] ++
895,343 UART: [kat] sha1
899,501 UART: [kat] SHA2-256
901,441 UART: [kat] SHA2-384
904,326 UART: [kat] SHA2-512-ACC
906,227 UART: [kat] ECC-384
915,850 UART: [kat] HMAC-384Kdf
920,396 UART: [kat] LMS
1,168,708 UART: [kat] --
1,169,639 UART: [cold-reset] ++
1,170,085 UART: [fht] FHT @ 0x50003400
1,172,725 UART: [idev] ++
1,172,893 UART: [idev] CDI.KEYID = 6
1,173,254 UART: [idev] SUBJECT.KEYID = 7
1,173,679 UART: [idev] UDS.KEYID = 0
1,174,025 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,821 UART: [idev] Erasing UDS.KEYID = 0
1,198,809 UART: [idev] Sha1 KeyId Algorithm
1,207,591 UART: [idev] --
1,208,562 UART: [ldev] ++
1,208,730 UART: [ldev] CDI.KEYID = 6
1,209,094 UART: [ldev] SUBJECT.KEYID = 5
1,209,521 UART: [ldev] AUTHORITY.KEYID = 7
1,209,984 UART: [ldev] FE.KEYID = 1
1,215,006 UART: [ldev] Erasing FE.KEYID = 1
1,240,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,440 UART: [ldev] --
1,279,778 UART: [fwproc] Wait for Commands...
1,280,355 UART: [fwproc] Recv command 0x46574c44
1,281,088 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,745 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,054 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,966 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,868 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,426,321 >>> mbox cmd response: failed
1,426,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,327 >>> mbox cmd response: failed
1,426,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,333 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,330 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,380 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Manufacturing
86,232 UART: [state] DebugLocked = No
86,962 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
891,721 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,850 UART: [kat] ++
896,002 UART: [kat] sha1
900,214 UART: [kat] SHA2-256
902,154 UART: [kat] SHA2-384
904,899 UART: [kat] SHA2-512-ACC
906,800 UART: [kat] ECC-384
916,449 UART: [kat] HMAC-384Kdf
920,915 UART: [kat] LMS
1,169,227 UART: [kat] --
1,169,908 UART: [cold-reset] ++
1,170,476 UART: [fht] FHT @ 0x50003400
1,173,286 UART: [idev] ++
1,173,454 UART: [idev] CDI.KEYID = 6
1,173,815 UART: [idev] SUBJECT.KEYID = 7
1,174,240 UART: [idev] UDS.KEYID = 0
1,174,586 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,054 UART: [idev] Erasing UDS.KEYID = 0
1,198,848 UART: [idev] Sha1 KeyId Algorithm
1,207,568 UART: [idev] --
1,208,745 UART: [ldev] ++
1,208,913 UART: [ldev] CDI.KEYID = 6
1,209,277 UART: [ldev] SUBJECT.KEYID = 5
1,209,704 UART: [ldev] AUTHORITY.KEYID = 7
1,210,167 UART: [ldev] FE.KEYID = 1
1,215,497 UART: [ldev] Erasing FE.KEYID = 1
1,242,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,949 UART: [ldev] --
1,281,407 UART: [fwproc] Wait for Commands...
1,282,168 UART: [fwproc] Recv command 0x46574c44
1,282,901 UART: [fwproc] Recv'd Img size: 114332 bytes
1,574,504 UART: ROM Fatal Error: 0x000B0025
1,575,661 >>> mbox cmd response: failed
1,575,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,667 >>> mbox cmd response: failed
1,575,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,673 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
891,753 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,882 UART: [kat] ++
896,034 UART: [kat] sha1
900,354 UART: [kat] SHA2-256
902,294 UART: [kat] SHA2-384
905,119 UART: [kat] SHA2-512-ACC
907,020 UART: [kat] ECC-384
916,769 UART: [kat] HMAC-384Kdf
921,535 UART: [kat] LMS
1,169,847 UART: [kat] --
1,170,820 UART: [cold-reset] ++
1,171,258 UART: [fht] FHT @ 0x50003400
1,173,852 UART: [idev] ++
1,174,020 UART: [idev] CDI.KEYID = 6
1,174,381 UART: [idev] SUBJECT.KEYID = 7
1,174,806 UART: [idev] UDS.KEYID = 0
1,175,152 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,742 UART: [idev] Erasing UDS.KEYID = 0
1,199,906 UART: [idev] Sha1 KeyId Algorithm
1,208,804 UART: [idev] --
1,209,741 UART: [ldev] ++
1,209,909 UART: [ldev] CDI.KEYID = 6
1,210,273 UART: [ldev] SUBJECT.KEYID = 5
1,210,700 UART: [ldev] AUTHORITY.KEYID = 7
1,211,163 UART: [ldev] FE.KEYID = 1
1,216,563 UART: [ldev] Erasing FE.KEYID = 1
1,243,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,903 UART: [ldev] --
1,282,175 UART: [fwproc] Wait for Commands...
1,282,920 UART: [fwproc] Recv command 0x46574c44
1,283,653 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,876 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,185 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,131 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,089 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,428,706 >>> mbox cmd response: failed
1,428,706 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,712 >>> mbox cmd response: failed
1,428,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,718 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,805 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,843 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Manufacturing
86,007 UART: [state] DebugLocked = No
86,663 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,139 UART: [kat] SHA2-256
882,070 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,185 UART: [kat] ++
886,337 UART: [kat] sha1
890,411 UART: [kat] SHA2-256
892,349 UART: [kat] SHA2-384
895,154 UART: [kat] SHA2-512-ACC
897,055 UART: [kat] ECC-384
902,792 UART: [kat] HMAC-384Kdf
907,396 UART: [kat] LMS
1,475,592 UART: [kat] --
1,476,205 UART: [cold-reset] ++
1,476,585 UART: [fht] Storing FHT @ 0x50003400
1,479,444 UART: [idev] ++
1,479,612 UART: [idev] CDI.KEYID = 6
1,479,972 UART: [idev] SUBJECT.KEYID = 7
1,480,396 UART: [idev] UDS.KEYID = 0
1,480,741 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,432 UART: [idev] Erasing UDS.KEYID = 0
1,504,750 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,486 UART: [idev] --
1,514,615 UART: [ldev] ++
1,514,783 UART: [ldev] CDI.KEYID = 6
1,515,146 UART: [ldev] SUBJECT.KEYID = 5
1,515,572 UART: [ldev] AUTHORITY.KEYID = 7
1,516,035 UART: [ldev] FE.KEYID = 1
1,521,051 UART: [ldev] Erasing FE.KEYID = 1
1,546,140 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,480 UART: [ldev] --
1,584,861 UART: [fwproc] Waiting for Commands...
1,585,526 UART: [fwproc] Received command 0x46574c44
1,586,317 UART: [fwproc] Received Image of size 114332 bytes
1,878,450 UART: ROM Fatal Error: 0x000B0027
1,879,607 >>> mbox cmd response: failed
1,879,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,879,613 >>> mbox cmd response: failed
1,879,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,879,619 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,888 UART: [state] LifecycleState = Unprovisioned
85,543 UART: [state] DebugLocked = No
86,159 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,695 UART: [kat] SHA2-256
881,626 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,741 UART: [kat] ++
885,893 UART: [kat] sha1
890,113 UART: [kat] SHA2-256
892,051 UART: [kat] SHA2-384
894,918 UART: [kat] SHA2-512-ACC
896,819 UART: [kat] ECC-384
902,142 UART: [kat] HMAC-384Kdf
906,622 UART: [kat] LMS
1,474,818 UART: [kat] --
1,475,671 UART: [cold-reset] ++
1,476,215 UART: [fht] Storing FHT @ 0x50003400
1,479,208 UART: [idev] ++
1,479,376 UART: [idev] CDI.KEYID = 6
1,479,736 UART: [idev] SUBJECT.KEYID = 7
1,480,160 UART: [idev] UDS.KEYID = 0
1,480,505 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,264 UART: [idev] Erasing UDS.KEYID = 0
1,504,566 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,212 UART: [idev] --
1,514,297 UART: [ldev] ++
1,514,465 UART: [ldev] CDI.KEYID = 6
1,514,828 UART: [ldev] SUBJECT.KEYID = 5
1,515,254 UART: [ldev] AUTHORITY.KEYID = 7
1,515,717 UART: [ldev] FE.KEYID = 1
1,520,995 UART: [ldev] Erasing FE.KEYID = 1
1,546,252 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,878 UART: [ldev] --
1,585,383 UART: [fwproc] Waiting for Commands...
1,586,156 UART: [fwproc] Received command 0x46574c44
1,586,947 UART: [fwproc] Received Image of size 114332 bytes
2,883,994 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,956 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,308 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,193 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,431 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,732,882 >>> mbox cmd response: failed
1,732,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,888 >>> mbox cmd response: failed
1,732,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,894 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,095 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,971 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Manufacturing
86,012 UART: [state] DebugLocked = No
86,500 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,124 UART: [kat] SHA2-256
882,055 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,170 UART: [kat] ++
886,322 UART: [kat] sha1
890,472 UART: [kat] SHA2-256
892,410 UART: [kat] SHA2-384
895,181 UART: [kat] SHA2-512-ACC
897,082 UART: [kat] ECC-384
902,589 UART: [kat] HMAC-384Kdf
907,245 UART: [kat] LMS
1,475,441 UART: [kat] --
1,476,280 UART: [cold-reset] ++
1,476,804 UART: [fht] Storing FHT @ 0x50003400
1,479,597 UART: [idev] ++
1,479,765 UART: [idev] CDI.KEYID = 6
1,480,125 UART: [idev] SUBJECT.KEYID = 7
1,480,549 UART: [idev] UDS.KEYID = 0
1,480,894 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,557 UART: [idev] Erasing UDS.KEYID = 0
1,505,529 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,123 UART: [idev] --
1,515,084 UART: [ldev] ++
1,515,252 UART: [ldev] CDI.KEYID = 6
1,515,615 UART: [ldev] SUBJECT.KEYID = 5
1,516,041 UART: [ldev] AUTHORITY.KEYID = 7
1,516,504 UART: [ldev] FE.KEYID = 1
1,521,694 UART: [ldev] Erasing FE.KEYID = 1
1,547,309 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,609 UART: [ldev] --
1,586,886 UART: [fwproc] Waiting for Commands...
1,587,713 UART: [fwproc] Received command 0x46574c44
1,588,504 UART: [fwproc] Received Image of size 114332 bytes
1,880,163 UART: ROM Fatal Error: 0x000B0027
1,881,320 >>> mbox cmd response: failed
1,881,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,326 >>> mbox cmd response: failed
1,881,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,332 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,744 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,414 UART: [kat] SHA2-256
882,345 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,460 UART: [kat] ++
886,612 UART: [kat] sha1
891,098 UART: [kat] SHA2-256
893,036 UART: [kat] SHA2-384
895,595 UART: [kat] SHA2-512-ACC
897,496 UART: [kat] ECC-384
903,473 UART: [kat] HMAC-384Kdf
908,171 UART: [kat] LMS
1,476,367 UART: [kat] --
1,477,250 UART: [cold-reset] ++
1,477,742 UART: [fht] Storing FHT @ 0x50003400
1,480,501 UART: [idev] ++
1,480,669 UART: [idev] CDI.KEYID = 6
1,481,029 UART: [idev] SUBJECT.KEYID = 7
1,481,453 UART: [idev] UDS.KEYID = 0
1,481,798 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,573 UART: [idev] Erasing UDS.KEYID = 0
1,505,823 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,227 UART: [idev] --
1,515,180 UART: [ldev] ++
1,515,348 UART: [ldev] CDI.KEYID = 6
1,515,711 UART: [ldev] SUBJECT.KEYID = 5
1,516,137 UART: [ldev] AUTHORITY.KEYID = 7
1,516,600 UART: [ldev] FE.KEYID = 1
1,521,778 UART: [ldev] Erasing FE.KEYID = 1
1,547,335 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,451 UART: [ldev] --
1,586,854 UART: [fwproc] Waiting for Commands...
1,587,505 UART: [fwproc] Received command 0x46574c44
1,588,296 UART: [fwproc] Received Image of size 114332 bytes
2,885,347 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,279 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,631 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,410 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,950 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,732,569 >>> mbox cmd response: failed
1,732,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,575 >>> mbox cmd response: failed
1,732,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,581 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,778 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,316 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,804 UART: [state] LifecycleState = Manufacturing
86,459 UART: [state] DebugLocked = No
87,167 UART: [state] WD Timer not started. Device not locked for debugging
88,412 UART: [kat] SHA2-256
894,062 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,187 UART: [kat] ++
898,339 UART: [kat] sha1
902,613 UART: [kat] SHA2-256
904,553 UART: [kat] SHA2-384
907,292 UART: [kat] SHA2-512-ACC
909,193 UART: [kat] ECC-384
918,838 UART: [kat] HMAC-384Kdf
923,438 UART: [kat] LMS
1,171,766 UART: [kat] --
1,172,681 UART: [cold-reset] ++
1,173,253 UART: [fht] FHT @ 0x50003400
1,175,994 UART: [idev] ++
1,176,162 UART: [idev] CDI.KEYID = 6
1,176,522 UART: [idev] SUBJECT.KEYID = 7
1,176,946 UART: [idev] UDS.KEYID = 0
1,177,291 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,936 UART: [idev] Erasing UDS.KEYID = 0
1,201,787 UART: [idev] Sha1 KeyId Algorithm
1,210,281 UART: [idev] --
1,211,357 UART: [ldev] ++
1,211,525 UART: [ldev] CDI.KEYID = 6
1,211,888 UART: [ldev] SUBJECT.KEYID = 5
1,212,314 UART: [ldev] AUTHORITY.KEYID = 7
1,212,777 UART: [ldev] FE.KEYID = 1
1,218,027 UART: [ldev] Erasing FE.KEYID = 1
1,244,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,401 UART: [ldev] --
1,283,700 UART: [fwproc] Wait for Commands...
1,284,506 UART: [fwproc] Recv command 0x46574c44
1,285,234 UART: [fwproc] Recv'd Img size: 114332 bytes
1,577,383 UART: ROM Fatal Error: 0x000B0027
1,578,540 >>> mbox cmd response: failed
1,578,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,578,546 >>> mbox cmd response: failed
1,578,546 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,578,552 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,585 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
893,380 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,505 UART: [kat] ++
897,657 UART: [kat] sha1
901,773 UART: [kat] SHA2-256
903,713 UART: [kat] SHA2-384
906,306 UART: [kat] SHA2-512-ACC
908,207 UART: [kat] ECC-384
917,896 UART: [kat] HMAC-384Kdf
922,546 UART: [kat] LMS
1,170,874 UART: [kat] --
1,171,517 UART: [cold-reset] ++
1,171,995 UART: [fht] FHT @ 0x50003400
1,174,708 UART: [idev] ++
1,174,876 UART: [idev] CDI.KEYID = 6
1,175,236 UART: [idev] SUBJECT.KEYID = 7
1,175,660 UART: [idev] UDS.KEYID = 0
1,176,005 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,840 UART: [idev] Erasing UDS.KEYID = 0
1,200,895 UART: [idev] Sha1 KeyId Algorithm
1,209,457 UART: [idev] --
1,210,485 UART: [ldev] ++
1,210,653 UART: [ldev] CDI.KEYID = 6
1,211,016 UART: [ldev] SUBJECT.KEYID = 5
1,211,442 UART: [ldev] AUTHORITY.KEYID = 7
1,211,905 UART: [ldev] FE.KEYID = 1
1,217,163 UART: [ldev] Erasing FE.KEYID = 1
1,243,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,399 UART: [ldev] --
1,282,830 UART: [fwproc] Wait for Commands...
1,283,502 UART: [fwproc] Recv command 0x46574c44
1,284,230 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,475 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,779 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,576 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,589 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,431,189 >>> mbox cmd response: failed
1,431,189 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,195 >>> mbox cmd response: failed
1,431,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,201 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,241 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,337 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Manufacturing
86,104 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
893,727 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,852 UART: [kat] ++
898,004 UART: [kat] sha1
902,226 UART: [kat] SHA2-256
904,166 UART: [kat] SHA2-384
907,151 UART: [kat] SHA2-512-ACC
909,052 UART: [kat] ECC-384
919,307 UART: [kat] HMAC-384Kdf
924,087 UART: [kat] LMS
1,172,415 UART: [kat] --
1,173,526 UART: [cold-reset] ++
1,173,972 UART: [fht] FHT @ 0x50003400
1,176,693 UART: [idev] ++
1,176,861 UART: [idev] CDI.KEYID = 6
1,177,221 UART: [idev] SUBJECT.KEYID = 7
1,177,645 UART: [idev] UDS.KEYID = 0
1,177,990 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,581 UART: [idev] Erasing UDS.KEYID = 0
1,203,392 UART: [idev] Sha1 KeyId Algorithm
1,212,004 UART: [idev] --
1,212,876 UART: [ldev] ++
1,213,044 UART: [ldev] CDI.KEYID = 6
1,213,407 UART: [ldev] SUBJECT.KEYID = 5
1,213,833 UART: [ldev] AUTHORITY.KEYID = 7
1,214,296 UART: [ldev] FE.KEYID = 1
1,219,358 UART: [ldev] Erasing FE.KEYID = 1
1,245,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,432 UART: [ldev] --
1,284,747 UART: [fwproc] Wait for Commands...
1,285,481 UART: [fwproc] Recv command 0x46574c44
1,286,209 UART: [fwproc] Recv'd Img size: 114332 bytes
1,578,950 UART: ROM Fatal Error: 0x000B0027
1,580,107 >>> mbox cmd response: failed
1,580,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,580,113 >>> mbox cmd response: failed
1,580,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,580,119 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,755 UART: [state] LifecycleState = Unprovisioned
86,410 UART: [state] DebugLocked = No
87,074 UART: [state] WD Timer not started. Device not locked for debugging
88,425 UART: [kat] SHA2-256
894,075 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,200 UART: [kat] ++
898,352 UART: [kat] sha1
902,746 UART: [kat] SHA2-256
904,686 UART: [kat] SHA2-384
907,463 UART: [kat] SHA2-512-ACC
909,364 UART: [kat] ECC-384
919,097 UART: [kat] HMAC-384Kdf
923,663 UART: [kat] LMS
1,171,991 UART: [kat] --
1,172,862 UART: [cold-reset] ++
1,173,346 UART: [fht] FHT @ 0x50003400
1,176,113 UART: [idev] ++
1,176,281 UART: [idev] CDI.KEYID = 6
1,176,641 UART: [idev] SUBJECT.KEYID = 7
1,177,065 UART: [idev] UDS.KEYID = 0
1,177,410 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,139 UART: [idev] Erasing UDS.KEYID = 0
1,201,956 UART: [idev] Sha1 KeyId Algorithm
1,210,376 UART: [idev] --
1,211,276 UART: [ldev] ++
1,211,444 UART: [ldev] CDI.KEYID = 6
1,211,807 UART: [ldev] SUBJECT.KEYID = 5
1,212,233 UART: [ldev] AUTHORITY.KEYID = 7
1,212,696 UART: [ldev] FE.KEYID = 1
1,218,294 UART: [ldev] Erasing FE.KEYID = 1
1,244,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,816 UART: [ldev] --
1,284,143 UART: [fwproc] Wait for Commands...
1,284,905 UART: [fwproc] Recv command 0x46574c44
1,285,633 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,018 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,215 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,048 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,433,416 >>> mbox cmd response: failed
1,433,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,433,422 >>> mbox cmd response: failed
1,433,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,433,428 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,742 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,720 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Manufacturing
85,663 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,141 UART: [kat] ++
895,293 UART: [kat] sha1
899,297 UART: [kat] SHA2-256
901,237 UART: [kat] SHA2-384
903,926 UART: [kat] SHA2-512-ACC
905,827 UART: [kat] ECC-384
915,246 UART: [kat] HMAC-384Kdf
919,772 UART: [kat] LMS
1,168,084 UART: [kat] --
1,169,245 UART: [cold-reset] ++
1,169,723 UART: [fht] FHT @ 0x50003400
1,172,563 UART: [idev] ++
1,172,731 UART: [idev] CDI.KEYID = 6
1,173,092 UART: [idev] SUBJECT.KEYID = 7
1,173,517 UART: [idev] UDS.KEYID = 0
1,173,863 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,565 UART: [idev] Erasing UDS.KEYID = 0
1,198,469 UART: [idev] Sha1 KeyId Algorithm
1,207,389 UART: [idev] --
1,208,496 UART: [ldev] ++
1,208,664 UART: [ldev] CDI.KEYID = 6
1,209,028 UART: [ldev] SUBJECT.KEYID = 5
1,209,455 UART: [ldev] AUTHORITY.KEYID = 7
1,209,918 UART: [ldev] FE.KEYID = 1
1,214,802 UART: [ldev] Erasing FE.KEYID = 1
1,241,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,138 UART: [ldev] --
1,280,470 UART: [fwproc] Wait for Commands...
1,281,153 UART: [fwproc] Recv command 0x46574c44
1,281,886 UART: [fwproc] Recv'd Img size: 114332 bytes
1,571,989 UART: ROM Fatal Error: 0x000B0027
1,573,146 >>> mbox cmd response: failed
1,573,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,573,152 >>> mbox cmd response: failed
1,573,152 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,573,158 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,398 UART: [kat] SHA2-256
890,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,077 UART: [kat] ++
895,229 UART: [kat] sha1
899,271 UART: [kat] SHA2-256
901,211 UART: [kat] SHA2-384
904,164 UART: [kat] SHA2-512-ACC
906,065 UART: [kat] ECC-384
915,692 UART: [kat] HMAC-384Kdf
920,286 UART: [kat] LMS
1,168,598 UART: [kat] --
1,169,559 UART: [cold-reset] ++
1,169,971 UART: [fht] FHT @ 0x50003400
1,172,769 UART: [idev] ++
1,172,937 UART: [idev] CDI.KEYID = 6
1,173,298 UART: [idev] SUBJECT.KEYID = 7
1,173,723 UART: [idev] UDS.KEYID = 0
1,174,069 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,977 UART: [idev] Erasing UDS.KEYID = 0
1,199,049 UART: [idev] Sha1 KeyId Algorithm
1,207,873 UART: [idev] --
1,208,924 UART: [ldev] ++
1,209,092 UART: [ldev] CDI.KEYID = 6
1,209,456 UART: [ldev] SUBJECT.KEYID = 5
1,209,883 UART: [ldev] AUTHORITY.KEYID = 7
1,210,346 UART: [ldev] FE.KEYID = 1
1,215,372 UART: [ldev] Erasing FE.KEYID = 1
1,241,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,552 UART: [ldev] --
1,281,050 UART: [fwproc] Wait for Commands...
1,281,635 UART: [fwproc] Recv command 0x46574c44
1,282,368 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,123 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,432 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,324 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,930 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,427,023 >>> mbox cmd response: failed
1,427,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,029 >>> mbox cmd response: failed
1,427,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,035 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,172 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,874 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Manufacturing
85,830 UART: [state] DebugLocked = No
86,352 UART: [state] WD Timer not started. Device not locked for debugging
87,523 UART: [kat] SHA2-256
891,073 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,202 UART: [kat] ++
895,354 UART: [kat] sha1
899,386 UART: [kat] SHA2-256
901,326 UART: [kat] SHA2-384
903,935 UART: [kat] SHA2-512-ACC
905,836 UART: [kat] ECC-384
915,699 UART: [kat] HMAC-384Kdf
920,283 UART: [kat] LMS
1,168,595 UART: [kat] --
1,169,390 UART: [cold-reset] ++
1,169,780 UART: [fht] FHT @ 0x50003400
1,172,350 UART: [idev] ++
1,172,518 UART: [idev] CDI.KEYID = 6
1,172,879 UART: [idev] SUBJECT.KEYID = 7
1,173,304 UART: [idev] UDS.KEYID = 0
1,173,650 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,364 UART: [idev] Erasing UDS.KEYID = 0
1,198,590 UART: [idev] Sha1 KeyId Algorithm
1,207,522 UART: [idev] --
1,208,417 UART: [ldev] ++
1,208,585 UART: [ldev] CDI.KEYID = 6
1,208,949 UART: [ldev] SUBJECT.KEYID = 5
1,209,376 UART: [ldev] AUTHORITY.KEYID = 7
1,209,839 UART: [ldev] FE.KEYID = 1
1,214,753 UART: [ldev] Erasing FE.KEYID = 1
1,241,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,535 UART: [ldev] --
1,280,921 UART: [fwproc] Wait for Commands...
1,281,626 UART: [fwproc] Recv command 0x46574c44
1,282,359 UART: [fwproc] Recv'd Img size: 114332 bytes
1,573,704 UART: ROM Fatal Error: 0x000B0027
1,574,861 >>> mbox cmd response: failed
1,574,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,574,867 >>> mbox cmd response: failed
1,574,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,574,873 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
916,073 UART: [kat] HMAC-384Kdf
920,725 UART: [kat] LMS
1,169,037 UART: [kat] --
1,169,972 UART: [cold-reset] ++
1,170,536 UART: [fht] FHT @ 0x50003400
1,173,154 UART: [idev] ++
1,173,322 UART: [idev] CDI.KEYID = 6
1,173,683 UART: [idev] SUBJECT.KEYID = 7
1,174,108 UART: [idev] UDS.KEYID = 0
1,174,454 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,848 UART: [idev] Erasing UDS.KEYID = 0
1,199,274 UART: [idev] Sha1 KeyId Algorithm
1,208,102 UART: [idev] --
1,209,205 UART: [ldev] ++
1,209,373 UART: [ldev] CDI.KEYID = 6
1,209,737 UART: [ldev] SUBJECT.KEYID = 5
1,210,164 UART: [ldev] AUTHORITY.KEYID = 7
1,210,627 UART: [ldev] FE.KEYID = 1
1,215,829 UART: [ldev] Erasing FE.KEYID = 1
1,242,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,585 UART: [ldev] --
1,282,035 UART: [fwproc] Wait for Commands...
1,282,736 UART: [fwproc] Recv command 0x46574c44
1,283,469 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,714 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,660 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,969 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,683 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,013 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,428,930 >>> mbox cmd response: failed
1,428,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,936 >>> mbox cmd response: failed
1,428,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,942 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,295 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,155 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,590 UART: [state] LifecycleState = Unprovisioned
86,245 UART: [state] DebugLocked = No
86,937 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,585 UART: [kat] SHA2-256
882,516 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,631 UART: [kat] ++
886,783 UART: [kat] sha1
890,921 UART: [kat] SHA2-256
892,859 UART: [kat] SHA2-384
895,752 UART: [kat] SHA2-512-ACC
897,653 UART: [kat] ECC-384
903,138 UART: [kat] HMAC-384Kdf
907,820 UART: [kat] LMS
1,476,016 UART: [kat] --
1,476,635 UART: [cold-reset] ++
1,477,215 UART: [fht] Storing FHT @ 0x50003400
1,479,822 UART: [idev] ++
1,479,990 UART: [idev] CDI.KEYID = 6
1,480,350 UART: [idev] SUBJECT.KEYID = 7
1,480,774 UART: [idev] UDS.KEYID = 0
1,481,119 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,180 UART: [idev] Erasing UDS.KEYID = 0
1,505,032 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,592 UART: [idev] --
1,514,613 UART: [ldev] ++
1,514,781 UART: [ldev] CDI.KEYID = 6
1,515,144 UART: [ldev] SUBJECT.KEYID = 5
1,515,570 UART: [ldev] AUTHORITY.KEYID = 7
1,516,033 UART: [ldev] FE.KEYID = 1
1,521,399 UART: [ldev] Erasing FE.KEYID = 1
1,546,456 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,190 UART: [ldev] --
1,585,503 UART: [fwproc] Waiting for Commands...
1,586,242 UART: [fwproc] Received command 0x46574c44
1,587,033 UART: [fwproc] Received Image of size 114332 bytes
1,634,519 UART: ROM Fatal Error: 0x000B002F
1,635,678 >>> mbox cmd response: failed
1,635,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,684 >>> mbox cmd response: failed
1,635,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,690 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,516 UART: [state] LifecycleState = Unprovisioned
86,171 UART: [state] DebugLocked = No
86,895 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,523 UART: [kat] SHA2-256
882,454 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,569 UART: [kat] ++
886,721 UART: [kat] sha1
890,983 UART: [kat] SHA2-256
892,921 UART: [kat] SHA2-384
895,432 UART: [kat] SHA2-512-ACC
897,333 UART: [kat] ECC-384
902,564 UART: [kat] HMAC-384Kdf
907,092 UART: [kat] LMS
1,475,288 UART: [kat] --
1,476,333 UART: [cold-reset] ++
1,476,699 UART: [fht] Storing FHT @ 0x50003400
1,479,344 UART: [idev] ++
1,479,512 UART: [idev] CDI.KEYID = 6
1,479,872 UART: [idev] SUBJECT.KEYID = 7
1,480,296 UART: [idev] UDS.KEYID = 0
1,480,641 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,434 UART: [idev] Erasing UDS.KEYID = 0
1,505,254 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,638 UART: [idev] --
1,514,615 UART: [ldev] ++
1,514,783 UART: [ldev] CDI.KEYID = 6
1,515,146 UART: [ldev] SUBJECT.KEYID = 5
1,515,572 UART: [ldev] AUTHORITY.KEYID = 7
1,516,035 UART: [ldev] FE.KEYID = 1
1,521,187 UART: [ldev] Erasing FE.KEYID = 1
1,547,488 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,202 UART: [ldev] --
1,586,643 UART: [fwproc] Waiting for Commands...
1,587,366 UART: [fwproc] Received command 0x46574c44
1,588,157 UART: [fwproc] Received Image of size 114332 bytes
2,885,900 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,150 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,502 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,409 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,313 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,789 >>> mbox cmd response: failed
1,487,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,795 >>> mbox cmd response: failed
1,487,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,801 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,699 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,487 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,947 UART: [state] LifecycleState = Unprovisioned
85,602 UART: [state] DebugLocked = No
86,112 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,672 UART: [kat] SHA2-256
881,603 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,718 UART: [kat] ++
885,870 UART: [kat] sha1
890,128 UART: [kat] SHA2-256
892,066 UART: [kat] SHA2-384
894,979 UART: [kat] SHA2-512-ACC
896,880 UART: [kat] ECC-384
902,317 UART: [kat] HMAC-384Kdf
906,985 UART: [kat] LMS
1,475,181 UART: [kat] --
1,475,790 UART: [cold-reset] ++
1,476,164 UART: [fht] Storing FHT @ 0x50003400
1,478,941 UART: [idev] ++
1,479,109 UART: [idev] CDI.KEYID = 6
1,479,469 UART: [idev] SUBJECT.KEYID = 7
1,479,893 UART: [idev] UDS.KEYID = 0
1,480,238 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,849 UART: [idev] Erasing UDS.KEYID = 0
1,504,887 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,601 UART: [idev] --
1,514,720 UART: [ldev] ++
1,514,888 UART: [ldev] CDI.KEYID = 6
1,515,251 UART: [ldev] SUBJECT.KEYID = 5
1,515,677 UART: [ldev] AUTHORITY.KEYID = 7
1,516,140 UART: [ldev] FE.KEYID = 1
1,521,474 UART: [ldev] Erasing FE.KEYID = 1
1,546,605 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,661 UART: [ldev] --
1,586,108 UART: [fwproc] Waiting for Commands...
1,586,941 UART: [fwproc] Received command 0x46574c44
1,587,732 UART: [fwproc] Received Image of size 114332 bytes
1,635,562 UART: ROM Fatal Error: 0x000B002F
1,636,721 >>> mbox cmd response: failed
1,636,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,727 >>> mbox cmd response: failed
1,636,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,733 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,031 UART: [state] LifecycleState = Unprovisioned
86,686 UART: [state] DebugLocked = No
87,286 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,900 UART: [kat] SHA2-256
882,831 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,946 UART: [kat] ++
887,098 UART: [kat] sha1
891,532 UART: [kat] SHA2-256
893,470 UART: [kat] SHA2-384
896,023 UART: [kat] SHA2-512-ACC
897,924 UART: [kat] ECC-384
903,677 UART: [kat] HMAC-384Kdf
908,445 UART: [kat] LMS
1,476,641 UART: [kat] --
1,477,492 UART: [cold-reset] ++
1,477,860 UART: [fht] Storing FHT @ 0x50003400
1,480,511 UART: [idev] ++
1,480,679 UART: [idev] CDI.KEYID = 6
1,481,039 UART: [idev] SUBJECT.KEYID = 7
1,481,463 UART: [idev] UDS.KEYID = 0
1,481,808 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,687 UART: [idev] Erasing UDS.KEYID = 0
1,506,127 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,803 UART: [idev] --
1,515,944 UART: [ldev] ++
1,516,112 UART: [ldev] CDI.KEYID = 6
1,516,475 UART: [ldev] SUBJECT.KEYID = 5
1,516,901 UART: [ldev] AUTHORITY.KEYID = 7
1,517,364 UART: [ldev] FE.KEYID = 1
1,522,682 UART: [ldev] Erasing FE.KEYID = 1
1,547,929 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,973 UART: [ldev] --
1,587,408 UART: [fwproc] Waiting for Commands...
1,588,041 UART: [fwproc] Received command 0x46574c44
1,588,832 UART: [fwproc] Received Image of size 114332 bytes
2,885,855 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,145 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,497 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,380 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,608 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,780 >>> mbox cmd response: failed
1,488,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,786 >>> mbox cmd response: failed
1,488,786 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,792 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,336 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,644 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,472 UART: [state] LifecycleState = Unprovisioned
86,127 UART: [state] DebugLocked = No
86,685 UART: [state] WD Timer not started. Device not locked for debugging
87,970 UART: [kat] SHA2-256
893,620 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,745 UART: [kat] ++
897,897 UART: [kat] sha1
901,951 UART: [kat] SHA2-256
903,891 UART: [kat] SHA2-384
906,644 UART: [kat] SHA2-512-ACC
908,545 UART: [kat] ECC-384
918,232 UART: [kat] HMAC-384Kdf
922,650 UART: [kat] LMS
1,170,978 UART: [kat] --
1,171,713 UART: [cold-reset] ++
1,172,109 UART: [fht] FHT @ 0x50003400
1,174,566 UART: [idev] ++
1,174,734 UART: [idev] CDI.KEYID = 6
1,175,094 UART: [idev] SUBJECT.KEYID = 7
1,175,518 UART: [idev] UDS.KEYID = 0
1,175,863 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,392 UART: [idev] Erasing UDS.KEYID = 0
1,200,615 UART: [idev] Sha1 KeyId Algorithm
1,208,929 UART: [idev] --
1,209,961 UART: [ldev] ++
1,210,129 UART: [ldev] CDI.KEYID = 6
1,210,492 UART: [ldev] SUBJECT.KEYID = 5
1,210,918 UART: [ldev] AUTHORITY.KEYID = 7
1,211,381 UART: [ldev] FE.KEYID = 1
1,216,587 UART: [ldev] Erasing FE.KEYID = 1
1,243,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,771 UART: [ldev] --
1,282,198 UART: [fwproc] Wait for Commands...
1,282,794 UART: [fwproc] Recv command 0x46574c44
1,283,522 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,856 UART: ROM Fatal Error: 0x000B002F
1,331,015 >>> mbox cmd response: failed
1,331,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,021 >>> mbox cmd response: failed
1,331,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,027 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
893,406 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,531 UART: [kat] ++
897,683 UART: [kat] sha1
901,795 UART: [kat] SHA2-256
903,735 UART: [kat] SHA2-384
906,480 UART: [kat] SHA2-512-ACC
908,381 UART: [kat] ECC-384
917,630 UART: [kat] HMAC-384Kdf
922,114 UART: [kat] LMS
1,170,442 UART: [kat] --
1,171,339 UART: [cold-reset] ++
1,171,773 UART: [fht] FHT @ 0x50003400
1,174,382 UART: [idev] ++
1,174,550 UART: [idev] CDI.KEYID = 6
1,174,910 UART: [idev] SUBJECT.KEYID = 7
1,175,334 UART: [idev] UDS.KEYID = 0
1,175,679 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,198 UART: [idev] Erasing UDS.KEYID = 0
1,200,095 UART: [idev] Sha1 KeyId Algorithm
1,208,367 UART: [idev] --
1,209,175 UART: [ldev] ++
1,209,343 UART: [ldev] CDI.KEYID = 6
1,209,706 UART: [ldev] SUBJECT.KEYID = 5
1,210,132 UART: [ldev] AUTHORITY.KEYID = 7
1,210,595 UART: [ldev] FE.KEYID = 1
1,215,891 UART: [ldev] Erasing FE.KEYID = 1
1,242,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,853 UART: [ldev] --
1,281,300 UART: [fwproc] Wait for Commands...
1,281,878 UART: [fwproc] Recv command 0x46574c44
1,282,606 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,185 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,489 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,242 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,839 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,187,778 >>> mbox cmd response: failed
1,187,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,784 >>> mbox cmd response: failed
1,187,784 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,790 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,081 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,703 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,650 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
893,637 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,762 UART: [kat] ++
897,914 UART: [kat] sha1
902,206 UART: [kat] SHA2-256
904,146 UART: [kat] SHA2-384
906,921 UART: [kat] SHA2-512-ACC
908,822 UART: [kat] ECC-384
919,253 UART: [kat] HMAC-384Kdf
924,073 UART: [kat] LMS
1,172,401 UART: [kat] --
1,173,162 UART: [cold-reset] ++
1,173,510 UART: [fht] FHT @ 0x50003400
1,176,053 UART: [idev] ++
1,176,221 UART: [idev] CDI.KEYID = 6
1,176,581 UART: [idev] SUBJECT.KEYID = 7
1,177,005 UART: [idev] UDS.KEYID = 0
1,177,350 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,301 UART: [idev] Erasing UDS.KEYID = 0
1,202,518 UART: [idev] Sha1 KeyId Algorithm
1,211,014 UART: [idev] --
1,212,056 UART: [ldev] ++
1,212,224 UART: [ldev] CDI.KEYID = 6
1,212,587 UART: [ldev] SUBJECT.KEYID = 5
1,213,013 UART: [ldev] AUTHORITY.KEYID = 7
1,213,476 UART: [ldev] FE.KEYID = 1
1,218,738 UART: [ldev] Erasing FE.KEYID = 1
1,245,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,368 UART: [ldev] --
1,284,873 UART: [fwproc] Wait for Commands...
1,285,647 UART: [fwproc] Recv command 0x46574c44
1,286,375 UART: [fwproc] Recv'd Img size: 114332 bytes
1,334,286 UART: ROM Fatal Error: 0x000B002F
1,335,445 >>> mbox cmd response: failed
1,335,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,335,451 >>> mbox cmd response: failed
1,335,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,335,457 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,376 UART: [state] WD Timer not started. Device not locked for debugging
87,581 UART: [kat] SHA2-256
893,231 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,356 UART: [kat] ++
897,508 UART: [kat] sha1
901,902 UART: [kat] SHA2-256
903,842 UART: [kat] SHA2-384
906,451 UART: [kat] SHA2-512-ACC
908,352 UART: [kat] ECC-384
917,795 UART: [kat] HMAC-384Kdf
922,457 UART: [kat] LMS
1,170,785 UART: [kat] --
1,171,616 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,797 UART: [idev] ++
1,174,965 UART: [idev] CDI.KEYID = 6
1,175,325 UART: [idev] SUBJECT.KEYID = 7
1,175,749 UART: [idev] UDS.KEYID = 0
1,176,094 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,899 UART: [idev] Erasing UDS.KEYID = 0
1,200,980 UART: [idev] Sha1 KeyId Algorithm
1,209,434 UART: [idev] --
1,210,350 UART: [ldev] ++
1,210,518 UART: [ldev] CDI.KEYID = 6
1,210,881 UART: [ldev] SUBJECT.KEYID = 5
1,211,307 UART: [ldev] AUTHORITY.KEYID = 7
1,211,770 UART: [ldev] FE.KEYID = 1
1,216,972 UART: [ldev] Erasing FE.KEYID = 1
1,242,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,422 UART: [ldev] --
1,281,785 UART: [fwproc] Wait for Commands...
1,282,499 UART: [fwproc] Recv command 0x46574c44
1,283,227 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,776 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,080 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,847 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,536 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,921 >>> mbox cmd response: failed
1,185,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,927 >>> mbox cmd response: failed
1,185,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,933 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,134 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,826 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
891,246 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,375 UART: [kat] ++
895,527 UART: [kat] sha1
899,821 UART: [kat] SHA2-256
901,761 UART: [kat] SHA2-384
904,358 UART: [kat] SHA2-512-ACC
906,259 UART: [kat] ECC-384
915,840 UART: [kat] HMAC-384Kdf
920,352 UART: [kat] LMS
1,168,664 UART: [kat] --
1,169,757 UART: [cold-reset] ++
1,170,149 UART: [fht] FHT @ 0x50003400
1,172,745 UART: [idev] ++
1,172,913 UART: [idev] CDI.KEYID = 6
1,173,274 UART: [idev] SUBJECT.KEYID = 7
1,173,699 UART: [idev] UDS.KEYID = 0
1,174,045 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,645 UART: [idev] Erasing UDS.KEYID = 0
1,198,735 UART: [idev] Sha1 KeyId Algorithm
1,207,551 UART: [idev] --
1,208,582 UART: [ldev] ++
1,208,750 UART: [ldev] CDI.KEYID = 6
1,209,114 UART: [ldev] SUBJECT.KEYID = 5
1,209,541 UART: [ldev] AUTHORITY.KEYID = 7
1,210,004 UART: [ldev] FE.KEYID = 1
1,215,012 UART: [ldev] Erasing FE.KEYID = 1
1,240,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,424 UART: [ldev] --
1,279,826 UART: [fwproc] Wait for Commands...
1,280,403 UART: [fwproc] Recv command 0x46574c44
1,281,136 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,041 UART: ROM Fatal Error: 0x000B002F
1,329,200 >>> mbox cmd response: failed
1,329,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,206 >>> mbox cmd response: failed
1,329,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,212 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,331 UART: [kat] ++
895,483 UART: [kat] sha1
899,873 UART: [kat] SHA2-256
901,813 UART: [kat] SHA2-384
904,584 UART: [kat] SHA2-512-ACC
906,485 UART: [kat] ECC-384
916,538 UART: [kat] HMAC-384Kdf
921,048 UART: [kat] LMS
1,169,360 UART: [kat] --
1,170,211 UART: [cold-reset] ++
1,170,683 UART: [fht] FHT @ 0x50003400
1,173,549 UART: [idev] ++
1,173,717 UART: [idev] CDI.KEYID = 6
1,174,078 UART: [idev] SUBJECT.KEYID = 7
1,174,503 UART: [idev] UDS.KEYID = 0
1,174,849 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,379 UART: [idev] Erasing UDS.KEYID = 0
1,199,833 UART: [idev] Sha1 KeyId Algorithm
1,208,641 UART: [idev] --
1,209,880 UART: [ldev] ++
1,210,048 UART: [ldev] CDI.KEYID = 6
1,210,412 UART: [ldev] SUBJECT.KEYID = 5
1,210,839 UART: [ldev] AUTHORITY.KEYID = 7
1,211,302 UART: [ldev] FE.KEYID = 1
1,216,448 UART: [ldev] Erasing FE.KEYID = 1
1,242,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,070 UART: [ldev] --
1,281,530 UART: [fwproc] Wait for Commands...
1,282,229 UART: [fwproc] Recv command 0x46574c44
1,282,962 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,619 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,641 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,950 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,760 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,392 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,661 >>> mbox cmd response: failed
1,182,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,667 >>> mbox cmd response: failed
1,182,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,673 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,828 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,038 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,580 UART: [kat] ++
895,732 UART: [kat] sha1
899,814 UART: [kat] SHA2-256
901,754 UART: [kat] SHA2-384
904,583 UART: [kat] SHA2-512-ACC
906,484 UART: [kat] ECC-384
916,043 UART: [kat] HMAC-384Kdf
920,759 UART: [kat] LMS
1,169,071 UART: [kat] --
1,169,992 UART: [cold-reset] ++
1,170,390 UART: [fht] FHT @ 0x50003400
1,173,056 UART: [idev] ++
1,173,224 UART: [idev] CDI.KEYID = 6
1,173,585 UART: [idev] SUBJECT.KEYID = 7
1,174,010 UART: [idev] UDS.KEYID = 0
1,174,356 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,150 UART: [idev] Erasing UDS.KEYID = 0
1,198,806 UART: [idev] Sha1 KeyId Algorithm
1,207,676 UART: [idev] --
1,208,715 UART: [ldev] ++
1,208,883 UART: [ldev] CDI.KEYID = 6
1,209,247 UART: [ldev] SUBJECT.KEYID = 5
1,209,674 UART: [ldev] AUTHORITY.KEYID = 7
1,210,137 UART: [ldev] FE.KEYID = 1
1,215,555 UART: [ldev] Erasing FE.KEYID = 1
1,241,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,945 UART: [ldev] --
1,281,243 UART: [fwproc] Wait for Commands...
1,281,856 UART: [fwproc] Recv command 0x46574c44
1,282,589 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,114 UART: ROM Fatal Error: 0x000B002F
1,331,273 >>> mbox cmd response: failed
1,331,273 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,279 >>> mbox cmd response: failed
1,331,279 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,285 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,747 UART: [state] LifecycleState = Unprovisioned
86,402 UART: [state] DebugLocked = No
87,080 UART: [state] WD Timer not started. Device not locked for debugging
88,259 UART: [kat] SHA2-256
891,809 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,938 UART: [kat] ++
896,090 UART: [kat] sha1
900,244 UART: [kat] SHA2-256
902,184 UART: [kat] SHA2-384
904,775 UART: [kat] SHA2-512-ACC
906,676 UART: [kat] ECC-384
916,353 UART: [kat] HMAC-384Kdf
921,151 UART: [kat] LMS
1,169,463 UART: [kat] --
1,170,450 UART: [cold-reset] ++
1,170,916 UART: [fht] FHT @ 0x50003400
1,173,538 UART: [idev] ++
1,173,706 UART: [idev] CDI.KEYID = 6
1,174,067 UART: [idev] SUBJECT.KEYID = 7
1,174,492 UART: [idev] UDS.KEYID = 0
1,174,838 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,506 UART: [idev] Erasing UDS.KEYID = 0
1,200,112 UART: [idev] Sha1 KeyId Algorithm
1,208,984 UART: [idev] --
1,210,085 UART: [ldev] ++
1,210,253 UART: [ldev] CDI.KEYID = 6
1,210,617 UART: [ldev] SUBJECT.KEYID = 5
1,211,044 UART: [ldev] AUTHORITY.KEYID = 7
1,211,507 UART: [ldev] FE.KEYID = 1
1,216,407 UART: [ldev] Erasing FE.KEYID = 1
1,242,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,889 UART: [ldev] --
1,281,287 UART: [fwproc] Wait for Commands...
1,281,892 UART: [fwproc] Recv command 0x46574c44
1,282,625 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,604 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,383 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,157 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,371 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,732 >>> mbox cmd response: failed
1,183,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,738 >>> mbox cmd response: failed
1,183,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,744 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,391 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,915 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,497 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,083 UART: [kat] SHA2-256
882,014 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,129 UART: [kat] ++
886,281 UART: [kat] sha1
890,355 UART: [kat] SHA2-256
892,293 UART: [kat] SHA2-384
895,164 UART: [kat] SHA2-512-ACC
897,065 UART: [kat] ECC-384
902,386 UART: [kat] HMAC-384Kdf
906,902 UART: [kat] LMS
1,475,098 UART: [kat] --
1,476,009 UART: [cold-reset] ++
1,476,487 UART: [fht] Storing FHT @ 0x50003400
1,479,160 UART: [idev] ++
1,479,328 UART: [idev] CDI.KEYID = 6
1,479,688 UART: [idev] SUBJECT.KEYID = 7
1,480,112 UART: [idev] UDS.KEYID = 0
1,480,457 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,936 UART: [idev] Erasing UDS.KEYID = 0
1,504,416 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,064 UART: [idev] --
1,514,073 UART: [ldev] ++
1,514,241 UART: [ldev] CDI.KEYID = 6
1,514,604 UART: [ldev] SUBJECT.KEYID = 5
1,515,030 UART: [ldev] AUTHORITY.KEYID = 7
1,515,493 UART: [ldev] FE.KEYID = 1
1,520,787 UART: [ldev] Erasing FE.KEYID = 1
1,546,232 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,190 UART: [ldev] --
1,585,479 UART: [fwproc] Waiting for Commands...
1,586,202 UART: [fwproc] Received command 0x46574c44
1,586,993 UART: [fwproc] Received Image of size 114332 bytes
1,606,801 UART: ROM Fatal Error: 0x000B0001
1,607,958 >>> mbox cmd response: failed
1,607,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,607,964 >>> mbox cmd response: failed
1,607,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,607,970 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,647 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,201 UART: [kat] SHA2-256
882,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,247 UART: [kat] ++
886,399 UART: [kat] sha1
890,659 UART: [kat] SHA2-256
892,597 UART: [kat] SHA2-384
895,218 UART: [kat] SHA2-512-ACC
897,119 UART: [kat] ECC-384
902,776 UART: [kat] HMAC-384Kdf
907,520 UART: [kat] LMS
1,475,716 UART: [kat] --
1,476,531 UART: [cold-reset] ++
1,476,893 UART: [fht] Storing FHT @ 0x50003400
1,479,628 UART: [idev] ++
1,479,796 UART: [idev] CDI.KEYID = 6
1,480,156 UART: [idev] SUBJECT.KEYID = 7
1,480,580 UART: [idev] UDS.KEYID = 0
1,480,925 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,672 UART: [idev] Erasing UDS.KEYID = 0
1,504,754 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,526 UART: [idev] --
1,514,685 UART: [ldev] ++
1,514,853 UART: [ldev] CDI.KEYID = 6
1,515,216 UART: [ldev] SUBJECT.KEYID = 5
1,515,642 UART: [ldev] AUTHORITY.KEYID = 7
1,516,105 UART: [ldev] FE.KEYID = 1
1,521,245 UART: [ldev] Erasing FE.KEYID = 1
1,546,854 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,720 UART: [ldev] --
1,586,181 UART: [fwproc] Waiting for Commands...
1,586,956 UART: [fwproc] Received command 0x46574c44
1,587,747 UART: [fwproc] Received Image of size 114332 bytes
2,885,542 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,604 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,956 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,945 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,173 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,460,497 >>> mbox cmd response: failed
1,460,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,503 >>> mbox cmd response: failed
1,460,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,509 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,099 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,381 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,959 UART: [state] LifecycleState = Unprovisioned
85,614 UART: [state] DebugLocked = No
86,278 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,814 UART: [kat] SHA2-256
881,745 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,860 UART: [kat] ++
886,012 UART: [kat] sha1
890,352 UART: [kat] SHA2-256
892,290 UART: [kat] SHA2-384
894,929 UART: [kat] SHA2-512-ACC
896,830 UART: [kat] ECC-384
902,577 UART: [kat] HMAC-384Kdf
907,271 UART: [kat] LMS
1,475,467 UART: [kat] --
1,476,100 UART: [cold-reset] ++
1,476,466 UART: [fht] Storing FHT @ 0x50003400
1,479,327 UART: [idev] ++
1,479,495 UART: [idev] CDI.KEYID = 6
1,479,855 UART: [idev] SUBJECT.KEYID = 7
1,480,279 UART: [idev] UDS.KEYID = 0
1,480,624 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,195 UART: [idev] Erasing UDS.KEYID = 0
1,504,583 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,057 UART: [idev] --
1,514,262 UART: [ldev] ++
1,514,430 UART: [ldev] CDI.KEYID = 6
1,514,793 UART: [ldev] SUBJECT.KEYID = 5
1,515,219 UART: [ldev] AUTHORITY.KEYID = 7
1,515,682 UART: [ldev] FE.KEYID = 1
1,520,906 UART: [ldev] Erasing FE.KEYID = 1
1,546,541 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,605 UART: [ldev] --
1,585,956 UART: [fwproc] Waiting for Commands...
1,586,629 UART: [fwproc] Received command 0x46574c44
1,587,420 UART: [fwproc] Received Image of size 114332 bytes
1,606,918 UART: ROM Fatal Error: 0x000B0001
1,608,075 >>> mbox cmd response: failed
1,608,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,081 >>> mbox cmd response: failed
1,608,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,087 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,911 UART: [state] LifecycleState = Unprovisioned
85,566 UART: [state] DebugLocked = No
86,062 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,732 UART: [kat] SHA2-256
881,663 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,778 UART: [kat] ++
885,930 UART: [kat] sha1
890,288 UART: [kat] SHA2-256
892,226 UART: [kat] SHA2-384
894,877 UART: [kat] SHA2-512-ACC
896,778 UART: [kat] ECC-384
902,397 UART: [kat] HMAC-384Kdf
907,057 UART: [kat] LMS
1,475,253 UART: [kat] --
1,476,062 UART: [cold-reset] ++
1,476,546 UART: [fht] Storing FHT @ 0x50003400
1,479,359 UART: [idev] ++
1,479,527 UART: [idev] CDI.KEYID = 6
1,479,887 UART: [idev] SUBJECT.KEYID = 7
1,480,311 UART: [idev] UDS.KEYID = 0
1,480,656 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,147 UART: [idev] Erasing UDS.KEYID = 0
1,504,843 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,341 UART: [idev] --
1,514,506 UART: [ldev] ++
1,514,674 UART: [ldev] CDI.KEYID = 6
1,515,037 UART: [ldev] SUBJECT.KEYID = 5
1,515,463 UART: [ldev] AUTHORITY.KEYID = 7
1,515,926 UART: [ldev] FE.KEYID = 1
1,520,874 UART: [ldev] Erasing FE.KEYID = 1
1,546,505 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,279 UART: [ldev] --
1,585,660 UART: [fwproc] Waiting for Commands...
1,586,393 UART: [fwproc] Received command 0x46574c44
1,587,184 UART: [fwproc] Received Image of size 114332 bytes
2,884,717 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,753 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,105 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,026 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,398 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,461,634 >>> mbox cmd response: failed
1,461,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,640 >>> mbox cmd response: failed
1,461,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,646 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,372 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,256 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
893,276 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,401 UART: [kat] ++
897,553 UART: [kat] sha1
901,893 UART: [kat] SHA2-256
903,833 UART: [kat] SHA2-384
906,520 UART: [kat] SHA2-512-ACC
908,421 UART: [kat] ECC-384
917,966 UART: [kat] HMAC-384Kdf
922,452 UART: [kat] LMS
1,170,780 UART: [kat] --
1,171,497 UART: [cold-reset] ++
1,172,025 UART: [fht] FHT @ 0x50003400
1,174,574 UART: [idev] ++
1,174,742 UART: [idev] CDI.KEYID = 6
1,175,102 UART: [idev] SUBJECT.KEYID = 7
1,175,526 UART: [idev] UDS.KEYID = 0
1,175,871 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,414 UART: [idev] Erasing UDS.KEYID = 0
1,199,995 UART: [idev] Sha1 KeyId Algorithm
1,208,277 UART: [idev] --
1,209,329 UART: [ldev] ++
1,209,497 UART: [ldev] CDI.KEYID = 6
1,209,860 UART: [ldev] SUBJECT.KEYID = 5
1,210,286 UART: [ldev] AUTHORITY.KEYID = 7
1,210,749 UART: [ldev] FE.KEYID = 1
1,216,161 UART: [ldev] Erasing FE.KEYID = 1
1,242,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,795 UART: [ldev] --
1,282,124 UART: [fwproc] Wait for Commands...
1,282,870 UART: [fwproc] Recv command 0x46574c44
1,283,598 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,612 UART: ROM Fatal Error: 0x000B0001
1,303,769 >>> mbox cmd response: failed
1,303,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,775 >>> mbox cmd response: failed
1,303,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,781 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
893,418 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,543 UART: [kat] ++
897,695 UART: [kat] sha1
902,045 UART: [kat] SHA2-256
903,985 UART: [kat] SHA2-384
906,728 UART: [kat] SHA2-512-ACC
908,629 UART: [kat] ECC-384
917,808 UART: [kat] HMAC-384Kdf
922,536 UART: [kat] LMS
1,170,864 UART: [kat] --
1,171,867 UART: [cold-reset] ++
1,172,307 UART: [fht] FHT @ 0x50003400
1,174,950 UART: [idev] ++
1,175,118 UART: [idev] CDI.KEYID = 6
1,175,478 UART: [idev] SUBJECT.KEYID = 7
1,175,902 UART: [idev] UDS.KEYID = 0
1,176,247 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,994 UART: [idev] Erasing UDS.KEYID = 0
1,200,917 UART: [idev] Sha1 KeyId Algorithm
1,209,509 UART: [idev] --
1,210,337 UART: [ldev] ++
1,210,505 UART: [ldev] CDI.KEYID = 6
1,210,868 UART: [ldev] SUBJECT.KEYID = 5
1,211,294 UART: [ldev] AUTHORITY.KEYID = 7
1,211,757 UART: [ldev] FE.KEYID = 1
1,216,857 UART: [ldev] Erasing FE.KEYID = 1
1,243,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,935 UART: [ldev] --
1,282,436 UART: [fwproc] Wait for Commands...
1,283,182 UART: [fwproc] Recv command 0x46574c44
1,283,910 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,099 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,403 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,330 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,051 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,158,072 >>> mbox cmd response: failed
1,158,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,078 >>> mbox cmd response: failed
1,158,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,084 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,241 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,233 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,045 UART: [state] LifecycleState = Unprovisioned
85,700 UART: [state] DebugLocked = No
86,366 UART: [state] WD Timer not started. Device not locked for debugging
87,541 UART: [kat] SHA2-256
893,191 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,316 UART: [kat] ++
897,468 UART: [kat] sha1
901,772 UART: [kat] SHA2-256
903,712 UART: [kat] SHA2-384
906,713 UART: [kat] SHA2-512-ACC
908,614 UART: [kat] ECC-384
918,337 UART: [kat] HMAC-384Kdf
922,811 UART: [kat] LMS
1,171,139 UART: [kat] --
1,172,026 UART: [cold-reset] ++
1,172,480 UART: [fht] FHT @ 0x50003400
1,175,119 UART: [idev] ++
1,175,287 UART: [idev] CDI.KEYID = 6
1,175,647 UART: [idev] SUBJECT.KEYID = 7
1,176,071 UART: [idev] UDS.KEYID = 0
1,176,416 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,193 UART: [idev] Erasing UDS.KEYID = 0
1,200,830 UART: [idev] Sha1 KeyId Algorithm
1,209,456 UART: [idev] --
1,210,546 UART: [ldev] ++
1,210,714 UART: [ldev] CDI.KEYID = 6
1,211,077 UART: [ldev] SUBJECT.KEYID = 5
1,211,503 UART: [ldev] AUTHORITY.KEYID = 7
1,211,966 UART: [ldev] FE.KEYID = 1
1,217,124 UART: [ldev] Erasing FE.KEYID = 1
1,243,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,168 UART: [ldev] --
1,282,527 UART: [fwproc] Wait for Commands...
1,283,261 UART: [fwproc] Recv command 0x46574c44
1,283,989 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,091 UART: ROM Fatal Error: 0x000B0001
1,304,248 >>> mbox cmd response: failed
1,304,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,254 >>> mbox cmd response: failed
1,304,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,260 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,985 UART: [state] LifecycleState = Unprovisioned
86,640 UART: [state] DebugLocked = No
87,286 UART: [state] WD Timer not started. Device not locked for debugging
88,569 UART: [kat] SHA2-256
894,219 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,344 UART: [kat] ++
898,496 UART: [kat] sha1
902,688 UART: [kat] SHA2-256
904,628 UART: [kat] SHA2-384
907,421 UART: [kat] SHA2-512-ACC
909,322 UART: [kat] ECC-384
919,205 UART: [kat] HMAC-384Kdf
923,737 UART: [kat] LMS
1,172,065 UART: [kat] --
1,172,786 UART: [cold-reset] ++
1,173,238 UART: [fht] FHT @ 0x50003400
1,175,799 UART: [idev] ++
1,175,967 UART: [idev] CDI.KEYID = 6
1,176,327 UART: [idev] SUBJECT.KEYID = 7
1,176,751 UART: [idev] UDS.KEYID = 0
1,177,096 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,415 UART: [idev] Erasing UDS.KEYID = 0
1,201,776 UART: [idev] Sha1 KeyId Algorithm
1,210,290 UART: [idev] --
1,211,310 UART: [ldev] ++
1,211,478 UART: [ldev] CDI.KEYID = 6
1,211,841 UART: [ldev] SUBJECT.KEYID = 5
1,212,267 UART: [ldev] AUTHORITY.KEYID = 7
1,212,730 UART: [ldev] FE.KEYID = 1
1,218,154 UART: [ldev] Erasing FE.KEYID = 1
1,245,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,114 UART: [ldev] --
1,284,533 UART: [fwproc] Wait for Commands...
1,285,153 UART: [fwproc] Recv command 0x46574c44
1,285,881 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,303 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,006 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,310 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,777,031 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,006 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,158,291 >>> mbox cmd response: failed
1,158,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,297 >>> mbox cmd response: failed
1,158,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,303 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,990 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,458 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,456 UART: [kat] SHA2-256
891,006 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,135 UART: [kat] ++
895,287 UART: [kat] sha1
899,435 UART: [kat] SHA2-256
901,375 UART: [kat] SHA2-384
904,116 UART: [kat] SHA2-512-ACC
906,017 UART: [kat] ECC-384
915,380 UART: [kat] HMAC-384Kdf
920,152 UART: [kat] LMS
1,168,464 UART: [kat] --
1,169,177 UART: [cold-reset] ++
1,169,703 UART: [fht] FHT @ 0x50003400
1,172,223 UART: [idev] ++
1,172,391 UART: [idev] CDI.KEYID = 6
1,172,752 UART: [idev] SUBJECT.KEYID = 7
1,173,177 UART: [idev] UDS.KEYID = 0
1,173,523 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,153 UART: [idev] Erasing UDS.KEYID = 0
1,198,067 UART: [idev] Sha1 KeyId Algorithm
1,206,881 UART: [idev] --
1,207,836 UART: [ldev] ++
1,208,004 UART: [ldev] CDI.KEYID = 6
1,208,368 UART: [ldev] SUBJECT.KEYID = 5
1,208,795 UART: [ldev] AUTHORITY.KEYID = 7
1,209,258 UART: [ldev] FE.KEYID = 1
1,214,390 UART: [ldev] Erasing FE.KEYID = 1
1,240,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,744 UART: [ldev] --
1,280,242 UART: [fwproc] Wait for Commands...
1,280,903 UART: [fwproc] Recv command 0x46574c44
1,281,636 UART: [fwproc] Recv'd Img size: 114332 bytes
1,301,223 UART: ROM Fatal Error: 0x000B0001
1,302,380 >>> mbox cmd response: failed
1,302,380 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,386 >>> mbox cmd response: failed
1,302,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,392 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,353 UART: [kat] ++
895,505 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,380 UART: [kat] SHA2-512-ACC
906,281 UART: [kat] ECC-384
916,200 UART: [kat] HMAC-384Kdf
920,810 UART: [kat] LMS
1,169,122 UART: [kat] --
1,169,901 UART: [cold-reset] ++
1,170,311 UART: [fht] FHT @ 0x50003400
1,173,151 UART: [idev] ++
1,173,319 UART: [idev] CDI.KEYID = 6
1,173,680 UART: [idev] SUBJECT.KEYID = 7
1,174,105 UART: [idev] UDS.KEYID = 0
1,174,451 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,135 UART: [idev] Erasing UDS.KEYID = 0
1,199,427 UART: [idev] Sha1 KeyId Algorithm
1,208,111 UART: [idev] --
1,209,236 UART: [ldev] ++
1,209,404 UART: [ldev] CDI.KEYID = 6
1,209,768 UART: [ldev] SUBJECT.KEYID = 5
1,210,195 UART: [ldev] AUTHORITY.KEYID = 7
1,210,658 UART: [ldev] FE.KEYID = 1
1,215,936 UART: [ldev] Erasing FE.KEYID = 1
1,242,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,316 UART: [ldev] --
1,281,612 UART: [fwproc] Wait for Commands...
1,282,229 UART: [fwproc] Recv command 0x46574c44
1,282,962 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,405 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,714 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,420 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,996 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,154,517 >>> mbox cmd response: failed
1,154,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,154,523 >>> mbox cmd response: failed
1,154,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,154,529 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,826 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,619,710 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,500 UART: [kat] ++
895,652 UART: [kat] sha1
899,704 UART: [kat] SHA2-256
901,644 UART: [kat] SHA2-384
904,305 UART: [kat] SHA2-512-ACC
906,206 UART: [kat] ECC-384
915,723 UART: [kat] HMAC-384Kdf
920,407 UART: [kat] LMS
1,168,719 UART: [kat] --
1,169,720 UART: [cold-reset] ++
1,170,246 UART: [fht] FHT @ 0x50003400
1,172,890 UART: [idev] ++
1,173,058 UART: [idev] CDI.KEYID = 6
1,173,419 UART: [idev] SUBJECT.KEYID = 7
1,173,844 UART: [idev] UDS.KEYID = 0
1,174,190 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,044 UART: [idev] Erasing UDS.KEYID = 0
1,199,472 UART: [idev] Sha1 KeyId Algorithm
1,208,452 UART: [idev] --
1,209,489 UART: [ldev] ++
1,209,657 UART: [ldev] CDI.KEYID = 6
1,210,021 UART: [ldev] SUBJECT.KEYID = 5
1,210,448 UART: [ldev] AUTHORITY.KEYID = 7
1,210,911 UART: [ldev] FE.KEYID = 1
1,216,219 UART: [ldev] Erasing FE.KEYID = 1
1,242,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,665 UART: [ldev] --
1,282,137 UART: [fwproc] Wait for Commands...
1,282,940 UART: [fwproc] Recv command 0x46574c44
1,283,673 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,794 UART: ROM Fatal Error: 0x000B0001
1,303,951 >>> mbox cmd response: failed
1,303,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,957 >>> mbox cmd response: failed
1,303,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,963 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
891,349 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,478 UART: [kat] ++
895,630 UART: [kat] sha1
899,938 UART: [kat] SHA2-256
901,878 UART: [kat] SHA2-384
904,469 UART: [kat] SHA2-512-ACC
906,370 UART: [kat] ECC-384
916,631 UART: [kat] HMAC-384Kdf
921,393 UART: [kat] LMS
1,169,705 UART: [kat] --
1,170,402 UART: [cold-reset] ++
1,170,942 UART: [fht] FHT @ 0x50003400
1,173,734 UART: [idev] ++
1,173,902 UART: [idev] CDI.KEYID = 6
1,174,263 UART: [idev] SUBJECT.KEYID = 7
1,174,688 UART: [idev] UDS.KEYID = 0
1,175,034 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,708 UART: [idev] Erasing UDS.KEYID = 0
1,200,034 UART: [idev] Sha1 KeyId Algorithm
1,208,800 UART: [idev] --
1,209,795 UART: [ldev] ++
1,209,963 UART: [ldev] CDI.KEYID = 6
1,210,327 UART: [ldev] SUBJECT.KEYID = 5
1,210,754 UART: [ldev] AUTHORITY.KEYID = 7
1,211,217 UART: [ldev] FE.KEYID = 1
1,216,337 UART: [ldev] Erasing FE.KEYID = 1
1,242,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,601 UART: [ldev] --
1,281,875 UART: [fwproc] Wait for Commands...
1,282,636 UART: [fwproc] Recv command 0x46574c44
1,283,369 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,486 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,795 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,629 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,303 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,155,298 >>> mbox cmd response: failed
1,155,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,304 >>> mbox cmd response: failed
1,155,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,310 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,919 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,215 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,091 UART: [kat] SHA2-256
882,022 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,137 UART: [kat] ++
886,289 UART: [kat] sha1
890,655 UART: [kat] SHA2-256
892,593 UART: [kat] SHA2-384
895,490 UART: [kat] SHA2-512-ACC
897,391 UART: [kat] ECC-384
903,050 UART: [kat] HMAC-384Kdf
907,846 UART: [kat] LMS
1,476,042 UART: [kat] --
1,476,793 UART: [cold-reset] ++
1,477,165 UART: [fht] Storing FHT @ 0x50003400
1,479,862 UART: [idev] ++
1,480,030 UART: [idev] CDI.KEYID = 6
1,480,390 UART: [idev] SUBJECT.KEYID = 7
1,480,814 UART: [idev] UDS.KEYID = 0
1,481,159 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,152 UART: [idev] Erasing UDS.KEYID = 0
1,505,972 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,594 UART: [idev] --
1,515,647 UART: [ldev] ++
1,515,815 UART: [ldev] CDI.KEYID = 6
1,516,178 UART: [ldev] SUBJECT.KEYID = 5
1,516,604 UART: [ldev] AUTHORITY.KEYID = 7
1,517,067 UART: [ldev] FE.KEYID = 1
1,521,765 UART: [ldev] Erasing FE.KEYID = 1
1,547,426 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,288 UART: [ldev] --
1,586,585 UART: [fwproc] Waiting for Commands...
1,587,328 UART: [fwproc] Received command 0x46574c44
1,588,119 UART: [fwproc] Received Image of size 114332 bytes
1,607,714 UART: ROM Fatal Error: 0x000B0002
1,608,871 >>> mbox cmd response: failed
1,608,871 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,877 >>> mbox cmd response: failed
1,608,877 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,883 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,511 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,061 UART: [kat] SHA2-256
881,992 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,107 UART: [kat] ++
886,259 UART: [kat] sha1
890,637 UART: [kat] SHA2-256
892,575 UART: [kat] SHA2-384
895,320 UART: [kat] SHA2-512-ACC
897,221 UART: [kat] ECC-384
902,738 UART: [kat] HMAC-384Kdf
907,478 UART: [kat] LMS
1,475,674 UART: [kat] --
1,476,791 UART: [cold-reset] ++
1,477,319 UART: [fht] Storing FHT @ 0x50003400
1,479,986 UART: [idev] ++
1,480,154 UART: [idev] CDI.KEYID = 6
1,480,514 UART: [idev] SUBJECT.KEYID = 7
1,480,938 UART: [idev] UDS.KEYID = 0
1,481,283 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,786 UART: [idev] Erasing UDS.KEYID = 0
1,505,276 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,014 UART: [idev] --
1,514,883 UART: [ldev] ++
1,515,051 UART: [ldev] CDI.KEYID = 6
1,515,414 UART: [ldev] SUBJECT.KEYID = 5
1,515,840 UART: [ldev] AUTHORITY.KEYID = 7
1,516,303 UART: [ldev] FE.KEYID = 1
1,521,351 UART: [ldev] Erasing FE.KEYID = 1
1,546,752 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,438 UART: [ldev] --
1,585,741 UART: [fwproc] Waiting for Commands...
1,586,460 UART: [fwproc] Received command 0x46574c44
1,587,251 UART: [fwproc] Received Image of size 114332 bytes
2,884,818 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,986 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,338 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,117 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,473 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,461,060 >>> mbox cmd response: failed
1,461,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,066 >>> mbox cmd response: failed
1,461,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,072 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,251 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,453 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,924 UART: [state] DebugLocked = No
86,656 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,310 UART: [kat] SHA2-256
882,241 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,356 UART: [kat] ++
886,508 UART: [kat] sha1
890,956 UART: [kat] SHA2-256
892,894 UART: [kat] SHA2-384
895,611 UART: [kat] SHA2-512-ACC
897,512 UART: [kat] ECC-384
903,093 UART: [kat] HMAC-384Kdf
907,699 UART: [kat] LMS
1,475,895 UART: [kat] --
1,476,856 UART: [cold-reset] ++
1,477,418 UART: [fht] Storing FHT @ 0x50003400
1,480,005 UART: [idev] ++
1,480,173 UART: [idev] CDI.KEYID = 6
1,480,533 UART: [idev] SUBJECT.KEYID = 7
1,480,957 UART: [idev] UDS.KEYID = 0
1,481,302 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,673 UART: [idev] Erasing UDS.KEYID = 0
1,505,717 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,513 UART: [idev] --
1,515,740 UART: [ldev] ++
1,515,908 UART: [ldev] CDI.KEYID = 6
1,516,271 UART: [ldev] SUBJECT.KEYID = 5
1,516,697 UART: [ldev] AUTHORITY.KEYID = 7
1,517,160 UART: [ldev] FE.KEYID = 1
1,522,292 UART: [ldev] Erasing FE.KEYID = 1
1,547,551 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,833 UART: [ldev] --
1,587,314 UART: [fwproc] Waiting for Commands...
1,587,993 UART: [fwproc] Received command 0x46574c44
1,588,784 UART: [fwproc] Received Image of size 114332 bytes
1,608,013 UART: ROM Fatal Error: 0x000B0002
1,609,170 >>> mbox cmd response: failed
1,609,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,176 >>> mbox cmd response: failed
1,609,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,182 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,825 UART: [state] LifecycleState = Unprovisioned
86,480 UART: [state] DebugLocked = No
87,206 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,906 UART: [kat] SHA2-256
882,837 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,952 UART: [kat] ++
887,104 UART: [kat] sha1
891,346 UART: [kat] SHA2-256
893,284 UART: [kat] SHA2-384
895,975 UART: [kat] SHA2-512-ACC
897,876 UART: [kat] ECC-384
903,681 UART: [kat] HMAC-384Kdf
908,401 UART: [kat] LMS
1,476,597 UART: [kat] --
1,477,760 UART: [cold-reset] ++
1,478,126 UART: [fht] Storing FHT @ 0x50003400
1,480,855 UART: [idev] ++
1,481,023 UART: [idev] CDI.KEYID = 6
1,481,383 UART: [idev] SUBJECT.KEYID = 7
1,481,807 UART: [idev] UDS.KEYID = 0
1,482,152 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,671 UART: [idev] Erasing UDS.KEYID = 0
1,506,623 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,447 UART: [idev] --
1,516,438 UART: [ldev] ++
1,516,606 UART: [ldev] CDI.KEYID = 6
1,516,969 UART: [ldev] SUBJECT.KEYID = 5
1,517,395 UART: [ldev] AUTHORITY.KEYID = 7
1,517,858 UART: [ldev] FE.KEYID = 1
1,522,950 UART: [ldev] Erasing FE.KEYID = 1
1,548,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,363 UART: [ldev] --
1,586,740 UART: [fwproc] Waiting for Commands...
1,587,513 UART: [fwproc] Received command 0x46574c44
1,588,304 UART: [fwproc] Received Image of size 114332 bytes
2,886,153 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,881 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,233 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,034 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,876 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,461,067 >>> mbox cmd response: failed
1,461,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,073 >>> mbox cmd response: failed
1,461,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,079 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,504 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,788 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,298 UART: [kat] SHA2-256
892,948 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,073 UART: [kat] ++
897,225 UART: [kat] sha1
901,383 UART: [kat] SHA2-256
903,323 UART: [kat] SHA2-384
906,030 UART: [kat] SHA2-512-ACC
907,931 UART: [kat] ECC-384
917,448 UART: [kat] HMAC-384Kdf
921,950 UART: [kat] LMS
1,170,278 UART: [kat] --
1,170,879 UART: [cold-reset] ++
1,171,297 UART: [fht] FHT @ 0x50003400
1,174,030 UART: [idev] ++
1,174,198 UART: [idev] CDI.KEYID = 6
1,174,558 UART: [idev] SUBJECT.KEYID = 7
1,174,982 UART: [idev] UDS.KEYID = 0
1,175,327 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,994 UART: [idev] Erasing UDS.KEYID = 0
1,199,621 UART: [idev] Sha1 KeyId Algorithm
1,208,121 UART: [idev] --
1,209,243 UART: [ldev] ++
1,209,411 UART: [ldev] CDI.KEYID = 6
1,209,774 UART: [ldev] SUBJECT.KEYID = 5
1,210,200 UART: [ldev] AUTHORITY.KEYID = 7
1,210,663 UART: [ldev] FE.KEYID = 1
1,215,907 UART: [ldev] Erasing FE.KEYID = 1
1,242,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,695 UART: [ldev] --
1,282,022 UART: [fwproc] Wait for Commands...
1,282,750 UART: [fwproc] Recv command 0x46574c44
1,283,478 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,439 UART: ROM Fatal Error: 0x000B0002
1,303,596 >>> mbox cmd response: failed
1,303,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,602 >>> mbox cmd response: failed
1,303,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,786 UART: [state] LifecycleState = Unprovisioned
85,441 UART: [state] DebugLocked = No
86,059 UART: [state] WD Timer not started. Device not locked for debugging
87,358 UART: [kat] SHA2-256
893,008 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,133 UART: [kat] ++
897,285 UART: [kat] sha1
901,513 UART: [kat] SHA2-256
903,453 UART: [kat] SHA2-384
906,194 UART: [kat] SHA2-512-ACC
908,095 UART: [kat] ECC-384
917,478 UART: [kat] HMAC-384Kdf
921,994 UART: [kat] LMS
1,170,322 UART: [kat] --
1,171,145 UART: [cold-reset] ++
1,171,567 UART: [fht] FHT @ 0x50003400
1,174,298 UART: [idev] ++
1,174,466 UART: [idev] CDI.KEYID = 6
1,174,826 UART: [idev] SUBJECT.KEYID = 7
1,175,250 UART: [idev] UDS.KEYID = 0
1,175,595 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,304 UART: [idev] Erasing UDS.KEYID = 0
1,199,919 UART: [idev] Sha1 KeyId Algorithm
1,208,457 UART: [idev] --
1,209,595 UART: [ldev] ++
1,209,763 UART: [ldev] CDI.KEYID = 6
1,210,126 UART: [ldev] SUBJECT.KEYID = 5
1,210,552 UART: [ldev] AUTHORITY.KEYID = 7
1,211,015 UART: [ldev] FE.KEYID = 1
1,215,959 UART: [ldev] Erasing FE.KEYID = 1
1,242,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,279 UART: [ldev] --
1,281,754 UART: [fwproc] Wait for Commands...
1,282,488 UART: [fwproc] Recv command 0x46574c44
1,283,216 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,023 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,327 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,208 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,227 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,158,205 >>> mbox cmd response: failed
1,158,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,211 >>> mbox cmd response: failed
1,158,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,217 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,119 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,905 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,035 UART: [kat] SHA2-256
893,685 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,810 UART: [kat] ++
897,962 UART: [kat] sha1
902,186 UART: [kat] SHA2-256
904,126 UART: [kat] SHA2-384
906,899 UART: [kat] SHA2-512-ACC
908,800 UART: [kat] ECC-384
918,395 UART: [kat] HMAC-384Kdf
922,899 UART: [kat] LMS
1,171,227 UART: [kat] --
1,172,248 UART: [cold-reset] ++
1,172,798 UART: [fht] FHT @ 0x50003400
1,175,243 UART: [idev] ++
1,175,411 UART: [idev] CDI.KEYID = 6
1,175,771 UART: [idev] SUBJECT.KEYID = 7
1,176,195 UART: [idev] UDS.KEYID = 0
1,176,540 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,349 UART: [idev] Erasing UDS.KEYID = 0
1,201,542 UART: [idev] Sha1 KeyId Algorithm
1,210,194 UART: [idev] --
1,211,266 UART: [ldev] ++
1,211,434 UART: [ldev] CDI.KEYID = 6
1,211,797 UART: [ldev] SUBJECT.KEYID = 5
1,212,223 UART: [ldev] AUTHORITY.KEYID = 7
1,212,686 UART: [ldev] FE.KEYID = 1
1,217,704 UART: [ldev] Erasing FE.KEYID = 1
1,244,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,906 UART: [ldev] --
1,283,187 UART: [fwproc] Wait for Commands...
1,283,775 UART: [fwproc] Recv command 0x46574c44
1,284,503 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,586 UART: ROM Fatal Error: 0x000B0002
1,304,743 >>> mbox cmd response: failed
1,304,743 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,749 >>> mbox cmd response: failed
1,304,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,755 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
893,615 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,740 UART: [kat] ++
897,892 UART: [kat] sha1
902,170 UART: [kat] SHA2-256
904,110 UART: [kat] SHA2-384
907,063 UART: [kat] SHA2-512-ACC
908,964 UART: [kat] ECC-384
918,611 UART: [kat] HMAC-384Kdf
923,379 UART: [kat] LMS
1,171,707 UART: [kat] --
1,172,644 UART: [cold-reset] ++
1,173,220 UART: [fht] FHT @ 0x50003400
1,175,719 UART: [idev] ++
1,175,887 UART: [idev] CDI.KEYID = 6
1,176,247 UART: [idev] SUBJECT.KEYID = 7
1,176,671 UART: [idev] UDS.KEYID = 0
1,177,016 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,717 UART: [idev] Erasing UDS.KEYID = 0
1,202,072 UART: [idev] Sha1 KeyId Algorithm
1,210,556 UART: [idev] --
1,211,360 UART: [ldev] ++
1,211,528 UART: [ldev] CDI.KEYID = 6
1,211,891 UART: [ldev] SUBJECT.KEYID = 5
1,212,317 UART: [ldev] AUTHORITY.KEYID = 7
1,212,780 UART: [ldev] FE.KEYID = 1
1,217,990 UART: [ldev] Erasing FE.KEYID = 1
1,244,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,044 UART: [ldev] --
1,284,475 UART: [fwproc] Wait for Commands...
1,285,215 UART: [fwproc] Recv command 0x46574c44
1,285,943 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,248 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,353 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,992 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,666 >>> mbox cmd response: failed
1,159,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,672 >>> mbox cmd response: failed
1,159,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,678 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,116 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,444 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,703 UART: [state] WD Timer not started. Device not locked for debugging
88,056 UART: [kat] SHA2-256
891,606 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,735 UART: [kat] ++
895,887 UART: [kat] sha1
900,133 UART: [kat] SHA2-256
902,073 UART: [kat] SHA2-384
904,704 UART: [kat] SHA2-512-ACC
906,605 UART: [kat] ECC-384
916,080 UART: [kat] HMAC-384Kdf
920,864 UART: [kat] LMS
1,169,176 UART: [kat] --
1,170,037 UART: [cold-reset] ++
1,170,607 UART: [fht] FHT @ 0x50003400
1,173,259 UART: [idev] ++
1,173,427 UART: [idev] CDI.KEYID = 6
1,173,788 UART: [idev] SUBJECT.KEYID = 7
1,174,213 UART: [idev] UDS.KEYID = 0
1,174,559 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,649 UART: [idev] Erasing UDS.KEYID = 0
1,200,331 UART: [idev] Sha1 KeyId Algorithm
1,209,313 UART: [idev] --
1,210,504 UART: [ldev] ++
1,210,672 UART: [ldev] CDI.KEYID = 6
1,211,036 UART: [ldev] SUBJECT.KEYID = 5
1,211,463 UART: [ldev] AUTHORITY.KEYID = 7
1,211,926 UART: [ldev] FE.KEYID = 1
1,217,642 UART: [ldev] Erasing FE.KEYID = 1
1,243,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,310 UART: [ldev] --
1,283,822 UART: [fwproc] Wait for Commands...
1,284,409 UART: [fwproc] Recv command 0x46574c44
1,285,142 UART: [fwproc] Recv'd Img size: 114332 bytes
1,304,448 UART: ROM Fatal Error: 0x000B0002
1,305,605 >>> mbox cmd response: failed
1,305,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,611 >>> mbox cmd response: failed
1,305,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,617 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
891,214 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,343 UART: [kat] ++
895,495 UART: [kat] sha1
899,699 UART: [kat] SHA2-256
901,639 UART: [kat] SHA2-384
904,152 UART: [kat] SHA2-512-ACC
906,053 UART: [kat] ECC-384
915,388 UART: [kat] HMAC-384Kdf
919,970 UART: [kat] LMS
1,168,282 UART: [kat] --
1,169,255 UART: [cold-reset] ++
1,169,699 UART: [fht] FHT @ 0x50003400
1,172,407 UART: [idev] ++
1,172,575 UART: [idev] CDI.KEYID = 6
1,172,936 UART: [idev] SUBJECT.KEYID = 7
1,173,361 UART: [idev] UDS.KEYID = 0
1,173,707 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,883 UART: [idev] Erasing UDS.KEYID = 0
1,197,861 UART: [idev] Sha1 KeyId Algorithm
1,206,631 UART: [idev] --
1,207,688 UART: [ldev] ++
1,207,856 UART: [ldev] CDI.KEYID = 6
1,208,220 UART: [ldev] SUBJECT.KEYID = 5
1,208,647 UART: [ldev] AUTHORITY.KEYID = 7
1,209,110 UART: [ldev] FE.KEYID = 1
1,214,372 UART: [ldev] Erasing FE.KEYID = 1
1,240,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,328 UART: [ldev] --
1,279,836 UART: [fwproc] Wait for Commands...
1,280,545 UART: [fwproc] Recv command 0x46574c44
1,281,278 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,179 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,488 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,398 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,068 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,154,800 >>> mbox cmd response: failed
1,154,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,154,806 >>> mbox cmd response: failed
1,154,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,154,812 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,982 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,394 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
891,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,662 UART: [kat] ++
895,814 UART: [kat] sha1
900,062 UART: [kat] SHA2-256
902,002 UART: [kat] SHA2-384
904,759 UART: [kat] SHA2-512-ACC
906,660 UART: [kat] ECC-384
916,359 UART: [kat] HMAC-384Kdf
920,997 UART: [kat] LMS
1,169,309 UART: [kat] --
1,170,364 UART: [cold-reset] ++
1,170,728 UART: [fht] FHT @ 0x50003400
1,173,424 UART: [idev] ++
1,173,592 UART: [idev] CDI.KEYID = 6
1,173,953 UART: [idev] SUBJECT.KEYID = 7
1,174,378 UART: [idev] UDS.KEYID = 0
1,174,724 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,270 UART: [idev] Erasing UDS.KEYID = 0
1,199,894 UART: [idev] Sha1 KeyId Algorithm
1,208,676 UART: [idev] --
1,209,773 UART: [ldev] ++
1,209,941 UART: [ldev] CDI.KEYID = 6
1,210,305 UART: [ldev] SUBJECT.KEYID = 5
1,210,732 UART: [ldev] AUTHORITY.KEYID = 7
1,211,195 UART: [ldev] FE.KEYID = 1
1,216,383 UART: [ldev] Erasing FE.KEYID = 1
1,242,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,705 UART: [ldev] --
1,281,985 UART: [fwproc] Wait for Commands...
1,282,606 UART: [fwproc] Recv command 0x46574c44
1,283,339 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,737 UART: ROM Fatal Error: 0x000B0002
1,303,894 >>> mbox cmd response: failed
1,303,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,900 >>> mbox cmd response: failed
1,303,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,906 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,887 UART: [state] LifecycleState = Unprovisioned
85,542 UART: [state] DebugLocked = No
86,042 UART: [state] WD Timer not started. Device not locked for debugging
87,249 UART: [kat] SHA2-256
890,799 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,928 UART: [kat] ++
895,080 UART: [kat] sha1
899,246 UART: [kat] SHA2-256
901,186 UART: [kat] SHA2-384
903,957 UART: [kat] SHA2-512-ACC
905,858 UART: [kat] ECC-384
915,833 UART: [kat] HMAC-384Kdf
920,425 UART: [kat] LMS
1,168,737 UART: [kat] --
1,169,430 UART: [cold-reset] ++
1,169,880 UART: [fht] FHT @ 0x50003400
1,172,572 UART: [idev] ++
1,172,740 UART: [idev] CDI.KEYID = 6
1,173,101 UART: [idev] SUBJECT.KEYID = 7
1,173,526 UART: [idev] UDS.KEYID = 0
1,173,872 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,652 UART: [idev] Erasing UDS.KEYID = 0
1,199,546 UART: [idev] Sha1 KeyId Algorithm
1,208,466 UART: [idev] --
1,209,523 UART: [ldev] ++
1,209,691 UART: [ldev] CDI.KEYID = 6
1,210,055 UART: [ldev] SUBJECT.KEYID = 5
1,210,482 UART: [ldev] AUTHORITY.KEYID = 7
1,210,945 UART: [ldev] FE.KEYID = 1
1,216,149 UART: [ldev] Erasing FE.KEYID = 1
1,242,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,851 UART: [ldev] --
1,282,337 UART: [fwproc] Wait for Commands...
1,282,926 UART: [fwproc] Recv command 0x46574c44
1,283,659 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,028 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,337 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,129 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,837 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,155,249 >>> mbox cmd response: failed
1,155,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,255 >>> mbox cmd response: failed
1,155,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,261 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,427 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,865 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,651 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,317 UART: [kat] SHA2-256
882,248 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,363 UART: [kat] ++
886,515 UART: [kat] sha1
890,783 UART: [kat] SHA2-256
892,721 UART: [kat] SHA2-384
895,674 UART: [kat] SHA2-512-ACC
897,575 UART: [kat] ECC-384
902,946 UART: [kat] HMAC-384Kdf
907,606 UART: [kat] LMS
1,475,802 UART: [kat] --
1,476,463 UART: [cold-reset] ++
1,476,803 UART: [fht] Storing FHT @ 0x50003400
1,479,670 UART: [idev] ++
1,479,838 UART: [idev] CDI.KEYID = 6
1,480,198 UART: [idev] SUBJECT.KEYID = 7
1,480,622 UART: [idev] UDS.KEYID = 0
1,480,967 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,902 UART: [idev] Erasing UDS.KEYID = 0
1,505,210 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,838 UART: [idev] --
1,515,057 UART: [ldev] ++
1,515,225 UART: [ldev] CDI.KEYID = 6
1,515,588 UART: [ldev] SUBJECT.KEYID = 5
1,516,014 UART: [ldev] AUTHORITY.KEYID = 7
1,516,477 UART: [ldev] FE.KEYID = 1
1,521,755 UART: [ldev] Erasing FE.KEYID = 1
1,547,730 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,154 UART: [ldev] --
1,586,581 UART: [fwproc] Waiting for Commands...
1,587,354 UART: [fwproc] Received command 0x46574c44
1,588,145 UART: [fwproc] Received Image of size 114332 bytes
1,626,990 UART: ROM Fatal Error: 0x000B0019
1,628,147 >>> mbox cmd response: failed
1,628,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,153 >>> mbox cmd response: failed
1,628,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,159 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,511 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,013 UART: [kat] SHA2-256
881,944 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,059 UART: [kat] ++
886,211 UART: [kat] sha1
890,257 UART: [kat] SHA2-256
892,195 UART: [kat] SHA2-384
894,888 UART: [kat] SHA2-512-ACC
896,789 UART: [kat] ECC-384
902,428 UART: [kat] HMAC-384Kdf
907,114 UART: [kat] LMS
1,475,310 UART: [kat] --
1,476,029 UART: [cold-reset] ++
1,476,511 UART: [fht] Storing FHT @ 0x50003400
1,479,432 UART: [idev] ++
1,479,600 UART: [idev] CDI.KEYID = 6
1,479,960 UART: [idev] SUBJECT.KEYID = 7
1,480,384 UART: [idev] UDS.KEYID = 0
1,480,729 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,510 UART: [idev] Erasing UDS.KEYID = 0
1,505,122 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,788 UART: [idev] --
1,514,863 UART: [ldev] ++
1,515,031 UART: [ldev] CDI.KEYID = 6
1,515,394 UART: [ldev] SUBJECT.KEYID = 5
1,515,820 UART: [ldev] AUTHORITY.KEYID = 7
1,516,283 UART: [ldev] FE.KEYID = 1
1,521,185 UART: [ldev] Erasing FE.KEYID = 1
1,546,048 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,172 UART: [ldev] --
1,585,633 UART: [fwproc] Waiting for Commands...
1,586,354 UART: [fwproc] Received command 0x46574c44
1,587,145 UART: [fwproc] Received Image of size 114332 bytes
2,885,532 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,664 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,016 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,883 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,859 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,479,806 >>> mbox cmd response: failed
1,479,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,812 >>> mbox cmd response: failed
1,479,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,818 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,743 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,383 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,785 UART: [state] LifecycleState = Unprovisioned
86,440 UART: [state] DebugLocked = No
86,980 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,560 UART: [kat] SHA2-256
882,491 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,606 UART: [kat] ++
886,758 UART: [kat] sha1
891,120 UART: [kat] SHA2-256
893,058 UART: [kat] SHA2-384
895,823 UART: [kat] SHA2-512-ACC
897,724 UART: [kat] ECC-384
903,101 UART: [kat] HMAC-384Kdf
907,715 UART: [kat] LMS
1,475,911 UART: [kat] --
1,476,784 UART: [cold-reset] ++
1,477,206 UART: [fht] Storing FHT @ 0x50003400
1,480,151 UART: [idev] ++
1,480,319 UART: [idev] CDI.KEYID = 6
1,480,679 UART: [idev] SUBJECT.KEYID = 7
1,481,103 UART: [idev] UDS.KEYID = 0
1,481,448 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,957 UART: [idev] Erasing UDS.KEYID = 0
1,505,763 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,193 UART: [idev] --
1,515,060 UART: [ldev] ++
1,515,228 UART: [ldev] CDI.KEYID = 6
1,515,591 UART: [ldev] SUBJECT.KEYID = 5
1,516,017 UART: [ldev] AUTHORITY.KEYID = 7
1,516,480 UART: [ldev] FE.KEYID = 1
1,521,892 UART: [ldev] Erasing FE.KEYID = 1
1,546,881 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,859 UART: [ldev] --
1,586,326 UART: [fwproc] Waiting for Commands...
1,587,075 UART: [fwproc] Received command 0x46574c44
1,587,866 UART: [fwproc] Received Image of size 114332 bytes
1,627,599 UART: ROM Fatal Error: 0x000B0019
1,628,756 >>> mbox cmd response: failed
1,628,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,762 >>> mbox cmd response: failed
1,628,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,768 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Unprovisioned
85,774 UART: [state] DebugLocked = No
86,446 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,080 UART: [kat] SHA2-256
882,011 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,126 UART: [kat] ++
886,278 UART: [kat] sha1
890,458 UART: [kat] SHA2-256
892,396 UART: [kat] SHA2-384
895,167 UART: [kat] SHA2-512-ACC
897,068 UART: [kat] ECC-384
902,769 UART: [kat] HMAC-384Kdf
907,401 UART: [kat] LMS
1,475,597 UART: [kat] --
1,476,694 UART: [cold-reset] ++
1,477,154 UART: [fht] Storing FHT @ 0x50003400
1,480,079 UART: [idev] ++
1,480,247 UART: [idev] CDI.KEYID = 6
1,480,607 UART: [idev] SUBJECT.KEYID = 7
1,481,031 UART: [idev] UDS.KEYID = 0
1,481,376 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,261 UART: [idev] Erasing UDS.KEYID = 0
1,506,265 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,889 UART: [idev] --
1,515,936 UART: [ldev] ++
1,516,104 UART: [ldev] CDI.KEYID = 6
1,516,467 UART: [ldev] SUBJECT.KEYID = 5
1,516,893 UART: [ldev] AUTHORITY.KEYID = 7
1,517,356 UART: [ldev] FE.KEYID = 1
1,522,856 UART: [ldev] Erasing FE.KEYID = 1
1,547,895 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,597 UART: [ldev] --
1,586,884 UART: [fwproc] Waiting for Commands...
1,587,499 UART: [fwproc] Received command 0x46574c44
1,588,290 UART: [fwproc] Received Image of size 114332 bytes
2,885,059 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,927 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,279 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,162 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,602 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,480,907 >>> mbox cmd response: failed
1,480,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,913 >>> mbox cmd response: failed
1,480,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,368 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,458 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,538 UART: [state] LifecycleState = Unprovisioned
86,193 UART: [state] DebugLocked = No
86,835 UART: [state] WD Timer not started. Device not locked for debugging
88,102 UART: [kat] SHA2-256
893,752 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,877 UART: [kat] ++
898,029 UART: [kat] sha1
902,261 UART: [kat] SHA2-256
904,201 UART: [kat] SHA2-384
906,828 UART: [kat] SHA2-512-ACC
908,729 UART: [kat] ECC-384
918,236 UART: [kat] HMAC-384Kdf
922,936 UART: [kat] LMS
1,171,264 UART: [kat] --
1,172,413 UART: [cold-reset] ++
1,172,755 UART: [fht] FHT @ 0x50003400
1,175,352 UART: [idev] ++
1,175,520 UART: [idev] CDI.KEYID = 6
1,175,880 UART: [idev] SUBJECT.KEYID = 7
1,176,304 UART: [idev] UDS.KEYID = 0
1,176,649 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,356 UART: [idev] Erasing UDS.KEYID = 0
1,201,935 UART: [idev] Sha1 KeyId Algorithm
1,210,541 UART: [idev] --
1,211,581 UART: [ldev] ++
1,211,749 UART: [ldev] CDI.KEYID = 6
1,212,112 UART: [ldev] SUBJECT.KEYID = 5
1,212,538 UART: [ldev] AUTHORITY.KEYID = 7
1,213,001 UART: [ldev] FE.KEYID = 1
1,218,265 UART: [ldev] Erasing FE.KEYID = 1
1,244,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,117 UART: [ldev] --
1,284,400 UART: [fwproc] Wait for Commands...
1,285,062 UART: [fwproc] Recv command 0x46574c44
1,285,790 UART: [fwproc] Recv'd Img size: 114332 bytes
1,325,741 UART: ROM Fatal Error: 0x000B0019
1,326,898 >>> mbox cmd response: failed
1,326,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,904 >>> mbox cmd response: failed
1,326,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,910 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,143 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
893,126 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,251 UART: [kat] ++
897,403 UART: [kat] sha1
901,697 UART: [kat] SHA2-256
903,637 UART: [kat] SHA2-384
906,442 UART: [kat] SHA2-512-ACC
908,343 UART: [kat] ECC-384
917,818 UART: [kat] HMAC-384Kdf
922,336 UART: [kat] LMS
1,170,664 UART: [kat] --
1,171,391 UART: [cold-reset] ++
1,171,877 UART: [fht] FHT @ 0x50003400
1,174,556 UART: [idev] ++
1,174,724 UART: [idev] CDI.KEYID = 6
1,175,084 UART: [idev] SUBJECT.KEYID = 7
1,175,508 UART: [idev] UDS.KEYID = 0
1,175,853 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,596 UART: [idev] Erasing UDS.KEYID = 0
1,199,943 UART: [idev] Sha1 KeyId Algorithm
1,208,453 UART: [idev] --
1,209,611 UART: [ldev] ++
1,209,779 UART: [ldev] CDI.KEYID = 6
1,210,142 UART: [ldev] SUBJECT.KEYID = 5
1,210,568 UART: [ldev] AUTHORITY.KEYID = 7
1,211,031 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,242,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,599 UART: [ldev] --
1,282,044 UART: [fwproc] Wait for Commands...
1,282,810 UART: [fwproc] Recv command 0x46574c44
1,283,538 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,713 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,017 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,832 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,125 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,177,953 >>> mbox cmd response: failed
1,177,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,959 >>> mbox cmd response: failed
1,177,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,965 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,075 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,095 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
893,531 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,656 UART: [kat] ++
897,808 UART: [kat] sha1
901,962 UART: [kat] SHA2-256
903,902 UART: [kat] SHA2-384
906,615 UART: [kat] SHA2-512-ACC
908,516 UART: [kat] ECC-384
918,261 UART: [kat] HMAC-384Kdf
922,831 UART: [kat] LMS
1,171,159 UART: [kat] --
1,171,992 UART: [cold-reset] ++
1,172,502 UART: [fht] FHT @ 0x50003400
1,175,215 UART: [idev] ++
1,175,383 UART: [idev] CDI.KEYID = 6
1,175,743 UART: [idev] SUBJECT.KEYID = 7
1,176,167 UART: [idev] UDS.KEYID = 0
1,176,512 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,713 UART: [idev] Erasing UDS.KEYID = 0
1,200,000 UART: [idev] Sha1 KeyId Algorithm
1,208,498 UART: [idev] --
1,209,486 UART: [ldev] ++
1,209,654 UART: [ldev] CDI.KEYID = 6
1,210,017 UART: [ldev] SUBJECT.KEYID = 5
1,210,443 UART: [ldev] AUTHORITY.KEYID = 7
1,210,906 UART: [ldev] FE.KEYID = 1
1,216,152 UART: [ldev] Erasing FE.KEYID = 1
1,242,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,530 UART: [ldev] --
1,281,919 UART: [fwproc] Wait for Commands...
1,282,633 UART: [fwproc] Recv command 0x46574c44
1,283,361 UART: [fwproc] Recv'd Img size: 114332 bytes
1,322,378 UART: ROM Fatal Error: 0x000B0019
1,323,535 >>> mbox cmd response: failed
1,323,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,541 >>> mbox cmd response: failed
1,323,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,547 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,778 UART: [state] DebugLocked = No
86,396 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
893,399 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,524 UART: [kat] ++
897,676 UART: [kat] sha1
901,922 UART: [kat] SHA2-256
903,862 UART: [kat] SHA2-384
906,475 UART: [kat] SHA2-512-ACC
908,376 UART: [kat] ECC-384
918,105 UART: [kat] HMAC-384Kdf
922,599 UART: [kat] LMS
1,170,927 UART: [kat] --
1,172,084 UART: [cold-reset] ++
1,172,484 UART: [fht] FHT @ 0x50003400
1,175,043 UART: [idev] ++
1,175,211 UART: [idev] CDI.KEYID = 6
1,175,571 UART: [idev] SUBJECT.KEYID = 7
1,175,995 UART: [idev] UDS.KEYID = 0
1,176,340 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,923 UART: [idev] Erasing UDS.KEYID = 0
1,200,768 UART: [idev] Sha1 KeyId Algorithm
1,209,038 UART: [idev] --
1,210,078 UART: [ldev] ++
1,210,246 UART: [ldev] CDI.KEYID = 6
1,210,609 UART: [ldev] SUBJECT.KEYID = 5
1,211,035 UART: [ldev] AUTHORITY.KEYID = 7
1,211,498 UART: [ldev] FE.KEYID = 1
1,216,664 UART: [ldev] Erasing FE.KEYID = 1
1,243,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,904 UART: [ldev] --
1,282,241 UART: [fwproc] Wait for Commands...
1,282,817 UART: [fwproc] Recv command 0x46574c44
1,283,545 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,354 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,658 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,431 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,550 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,196 >>> mbox cmd response: failed
1,180,196 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,202 >>> mbox cmd response: failed
1,180,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,208 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,382 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,124 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,760 UART: [state] LifecycleState = Unprovisioned
86,415 UART: [state] DebugLocked = No
87,101 UART: [state] WD Timer not started. Device not locked for debugging
88,344 UART: [kat] SHA2-256
891,894 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,023 UART: [kat] ++
896,175 UART: [kat] sha1
900,373 UART: [kat] SHA2-256
902,313 UART: [kat] SHA2-384
905,026 UART: [kat] SHA2-512-ACC
906,927 UART: [kat] ECC-384
916,102 UART: [kat] HMAC-384Kdf
920,780 UART: [kat] LMS
1,169,092 UART: [kat] --
1,169,917 UART: [cold-reset] ++
1,170,379 UART: [fht] FHT @ 0x50003400
1,172,989 UART: [idev] ++
1,173,157 UART: [idev] CDI.KEYID = 6
1,173,518 UART: [idev] SUBJECT.KEYID = 7
1,173,943 UART: [idev] UDS.KEYID = 0
1,174,289 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,169 UART: [idev] Erasing UDS.KEYID = 0
1,199,275 UART: [idev] Sha1 KeyId Algorithm
1,208,139 UART: [idev] --
1,209,196 UART: [ldev] ++
1,209,364 UART: [ldev] CDI.KEYID = 6
1,209,728 UART: [ldev] SUBJECT.KEYID = 5
1,210,155 UART: [ldev] AUTHORITY.KEYID = 7
1,210,618 UART: [ldev] FE.KEYID = 1
1,215,756 UART: [ldev] Erasing FE.KEYID = 1
1,242,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,120 UART: [ldev] --
1,281,486 UART: [fwproc] Wait for Commands...
1,282,083 UART: [fwproc] Recv command 0x46574c44
1,282,816 UART: [fwproc] Recv'd Img size: 114332 bytes
1,321,834 UART: ROM Fatal Error: 0x000B0019
1,322,991 >>> mbox cmd response: failed
1,322,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,997 >>> mbox cmd response: failed
1,322,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,003 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
891,264 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,393 UART: [kat] ++
895,545 UART: [kat] sha1
899,771 UART: [kat] SHA2-256
901,711 UART: [kat] SHA2-384
904,532 UART: [kat] SHA2-512-ACC
906,433 UART: [kat] ECC-384
915,994 UART: [kat] HMAC-384Kdf
920,578 UART: [kat] LMS
1,168,890 UART: [kat] --
1,169,679 UART: [cold-reset] ++
1,170,233 UART: [fht] FHT @ 0x50003400
1,173,077 UART: [idev] ++
1,173,245 UART: [idev] CDI.KEYID = 6
1,173,606 UART: [idev] SUBJECT.KEYID = 7
1,174,031 UART: [idev] UDS.KEYID = 0
1,174,377 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,783 UART: [idev] Erasing UDS.KEYID = 0
1,198,599 UART: [idev] Sha1 KeyId Algorithm
1,207,457 UART: [idev] --
1,208,496 UART: [ldev] ++
1,208,664 UART: [ldev] CDI.KEYID = 6
1,209,028 UART: [ldev] SUBJECT.KEYID = 5
1,209,455 UART: [ldev] AUTHORITY.KEYID = 7
1,209,918 UART: [ldev] FE.KEYID = 1
1,214,926 UART: [ldev] Erasing FE.KEYID = 1
1,241,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,338 UART: [ldev] --
1,280,828 UART: [fwproc] Wait for Commands...
1,281,477 UART: [fwproc] Recv command 0x46574c44
1,282,210 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,361 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,670 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,492 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,696 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,175,822 >>> mbox cmd response: failed
1,175,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,828 >>> mbox cmd response: failed
1,175,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,834 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,736 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,802 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,767 UART: [state] LifecycleState = Unprovisioned
86,422 UART: [state] DebugLocked = No
86,996 UART: [state] WD Timer not started. Device not locked for debugging
88,241 UART: [kat] SHA2-256
891,791 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,920 UART: [kat] ++
896,072 UART: [kat] sha1
900,350 UART: [kat] SHA2-256
902,290 UART: [kat] SHA2-384
905,001 UART: [kat] SHA2-512-ACC
906,902 UART: [kat] ECC-384
916,737 UART: [kat] HMAC-384Kdf
921,391 UART: [kat] LMS
1,169,703 UART: [kat] --
1,170,782 UART: [cold-reset] ++
1,171,232 UART: [fht] FHT @ 0x50003400
1,173,772 UART: [idev] ++
1,173,940 UART: [idev] CDI.KEYID = 6
1,174,301 UART: [idev] SUBJECT.KEYID = 7
1,174,726 UART: [idev] UDS.KEYID = 0
1,175,072 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,676 UART: [idev] Erasing UDS.KEYID = 0
1,199,212 UART: [idev] Sha1 KeyId Algorithm
1,208,244 UART: [idev] --
1,209,433 UART: [ldev] ++
1,209,601 UART: [ldev] CDI.KEYID = 6
1,209,965 UART: [ldev] SUBJECT.KEYID = 5
1,210,392 UART: [ldev] AUTHORITY.KEYID = 7
1,210,855 UART: [ldev] FE.KEYID = 1
1,216,193 UART: [ldev] Erasing FE.KEYID = 1
1,242,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,399 UART: [ldev] --
1,281,823 UART: [fwproc] Wait for Commands...
1,282,480 UART: [fwproc] Recv command 0x46574c44
1,283,213 UART: [fwproc] Recv'd Img size: 114332 bytes
1,320,881 UART: ROM Fatal Error: 0x000B0019
1,322,038 >>> mbox cmd response: failed
1,322,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,044 >>> mbox cmd response: failed
1,322,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,050 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,536 UART: [kat] ++
895,688 UART: [kat] sha1
900,110 UART: [kat] SHA2-256
902,050 UART: [kat] SHA2-384
904,799 UART: [kat] SHA2-512-ACC
906,700 UART: [kat] ECC-384
916,249 UART: [kat] HMAC-384Kdf
920,933 UART: [kat] LMS
1,169,245 UART: [kat] --
1,170,164 UART: [cold-reset] ++
1,170,686 UART: [fht] FHT @ 0x50003400
1,173,306 UART: [idev] ++
1,173,474 UART: [idev] CDI.KEYID = 6
1,173,835 UART: [idev] SUBJECT.KEYID = 7
1,174,260 UART: [idev] UDS.KEYID = 0
1,174,606 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,984 UART: [idev] Erasing UDS.KEYID = 0
1,198,660 UART: [idev] Sha1 KeyId Algorithm
1,207,374 UART: [idev] --
1,208,413 UART: [ldev] ++
1,208,581 UART: [ldev] CDI.KEYID = 6
1,208,945 UART: [ldev] SUBJECT.KEYID = 5
1,209,372 UART: [ldev] AUTHORITY.KEYID = 7
1,209,835 UART: [ldev] FE.KEYID = 1
1,215,187 UART: [ldev] Erasing FE.KEYID = 1
1,241,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,411 UART: [ldev] --
1,280,753 UART: [fwproc] Wait for Commands...
1,281,572 UART: [fwproc] Recv command 0x46574c44
1,282,305 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,430 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,739 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,645 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,645 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,176,827 >>> mbox cmd response: failed
1,176,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,833 >>> mbox cmd response: failed
1,176,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,839 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,419 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,387 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,381 UART: [kat] SHA2-256
882,312 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,427 UART: [kat] ++
886,579 UART: [kat] sha1
890,741 UART: [kat] SHA2-256
892,679 UART: [kat] SHA2-384
895,338 UART: [kat] SHA2-512-ACC
897,239 UART: [kat] ECC-384
903,062 UART: [kat] HMAC-384Kdf
907,802 UART: [kat] LMS
1,475,998 UART: [kat] --
1,476,845 UART: [cold-reset] ++
1,477,193 UART: [fht] Storing FHT @ 0x50003400
1,479,858 UART: [idev] ++
1,480,026 UART: [idev] CDI.KEYID = 6
1,480,386 UART: [idev] SUBJECT.KEYID = 7
1,480,810 UART: [idev] UDS.KEYID = 0
1,481,155 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,474 UART: [idev] Erasing UDS.KEYID = 0
1,505,308 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,994 UART: [idev] --
1,514,919 UART: [ldev] ++
1,515,087 UART: [ldev] CDI.KEYID = 6
1,515,450 UART: [ldev] SUBJECT.KEYID = 5
1,515,876 UART: [ldev] AUTHORITY.KEYID = 7
1,516,339 UART: [ldev] FE.KEYID = 1
1,521,447 UART: [ldev] Erasing FE.KEYID = 1
1,546,388 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,404 UART: [ldev] --
1,585,845 UART: [fwproc] Waiting for Commands...
1,586,560 UART: [fwproc] Received command 0x46574c44
1,587,351 UART: [fwproc] Received Image of size 114332 bytes
1,628,853 UART: ROM Fatal Error: 0x000B000F
1,630,012 >>> mbox cmd response: failed
1,630,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,630,018 >>> mbox cmd response: failed
1,630,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,630,024 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,265 UART: [kat] SHA2-256
882,196 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,311 UART: [kat] ++
886,463 UART: [kat] sha1
890,657 UART: [kat] SHA2-256
892,595 UART: [kat] SHA2-384
895,240 UART: [kat] SHA2-512-ACC
897,141 UART: [kat] ECC-384
902,926 UART: [kat] HMAC-384Kdf
907,346 UART: [kat] LMS
1,475,542 UART: [kat] --
1,476,431 UART: [cold-reset] ++
1,476,965 UART: [fht] Storing FHT @ 0x50003400
1,479,792 UART: [idev] ++
1,479,960 UART: [idev] CDI.KEYID = 6
1,480,320 UART: [idev] SUBJECT.KEYID = 7
1,480,744 UART: [idev] UDS.KEYID = 0
1,481,089 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,106 UART: [idev] Erasing UDS.KEYID = 0
1,505,758 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,330 UART: [idev] --
1,515,205 UART: [ldev] ++
1,515,373 UART: [ldev] CDI.KEYID = 6
1,515,736 UART: [ldev] SUBJECT.KEYID = 5
1,516,162 UART: [ldev] AUTHORITY.KEYID = 7
1,516,625 UART: [ldev] FE.KEYID = 1
1,521,691 UART: [ldev] Erasing FE.KEYID = 1
1,547,130 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,292 UART: [ldev] --
1,586,681 UART: [fwproc] Waiting for Commands...
1,587,504 UART: [fwproc] Received command 0x46574c44
1,588,295 UART: [fwproc] Received Image of size 114332 bytes
2,885,496 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,590 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,942 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,917 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,553 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,482,599 >>> mbox cmd response: failed
1,482,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,605 >>> mbox cmd response: failed
1,482,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,611 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,305 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,603 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,706 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,416 UART: [kat] SHA2-256
882,347 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,462 UART: [kat] ++
886,614 UART: [kat] sha1
891,010 UART: [kat] SHA2-256
892,948 UART: [kat] SHA2-384
895,669 UART: [kat] SHA2-512-ACC
897,570 UART: [kat] ECC-384
903,159 UART: [kat] HMAC-384Kdf
907,727 UART: [kat] LMS
1,475,923 UART: [kat] --
1,476,772 UART: [cold-reset] ++
1,477,284 UART: [fht] Storing FHT @ 0x50003400
1,480,013 UART: [idev] ++
1,480,181 UART: [idev] CDI.KEYID = 6
1,480,541 UART: [idev] SUBJECT.KEYID = 7
1,480,965 UART: [idev] UDS.KEYID = 0
1,481,310 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,063 UART: [idev] Erasing UDS.KEYID = 0
1,506,157 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,931 UART: [idev] --
1,515,984 UART: [ldev] ++
1,516,152 UART: [ldev] CDI.KEYID = 6
1,516,515 UART: [ldev] SUBJECT.KEYID = 5
1,516,941 UART: [ldev] AUTHORITY.KEYID = 7
1,517,404 UART: [ldev] FE.KEYID = 1
1,522,402 UART: [ldev] Erasing FE.KEYID = 1
1,547,369 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,255 UART: [ldev] --
1,586,758 UART: [fwproc] Waiting for Commands...
1,587,619 UART: [fwproc] Received command 0x46574c44
1,588,410 UART: [fwproc] Received Image of size 114332 bytes
1,628,532 UART: ROM Fatal Error: 0x000B000F
1,629,691 >>> mbox cmd response: failed
1,629,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,697 >>> mbox cmd response: failed
1,629,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,703 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,795 UART: [state] LifecycleState = Unprovisioned
86,450 UART: [state] DebugLocked = No
87,070 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,564 UART: [kat] SHA2-256
882,495 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,610 UART: [kat] ++
886,762 UART: [kat] sha1
890,818 UART: [kat] SHA2-256
892,756 UART: [kat] SHA2-384
895,527 UART: [kat] SHA2-512-ACC
897,428 UART: [kat] ECC-384
903,035 UART: [kat] HMAC-384Kdf
907,785 UART: [kat] LMS
1,475,981 UART: [kat] --
1,476,902 UART: [cold-reset] ++
1,477,268 UART: [fht] Storing FHT @ 0x50003400
1,480,069 UART: [idev] ++
1,480,237 UART: [idev] CDI.KEYID = 6
1,480,597 UART: [idev] SUBJECT.KEYID = 7
1,481,021 UART: [idev] UDS.KEYID = 0
1,481,366 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,731 UART: [idev] Erasing UDS.KEYID = 0
1,505,439 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,059 UART: [idev] --
1,515,094 UART: [ldev] ++
1,515,262 UART: [ldev] CDI.KEYID = 6
1,515,625 UART: [ldev] SUBJECT.KEYID = 5
1,516,051 UART: [ldev] AUTHORITY.KEYID = 7
1,516,514 UART: [ldev] FE.KEYID = 1
1,521,562 UART: [ldev] Erasing FE.KEYID = 1
1,547,161 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,097 UART: [ldev] --
1,586,392 UART: [fwproc] Waiting for Commands...
1,587,209 UART: [fwproc] Received command 0x46574c44
1,588,000 UART: [fwproc] Received Image of size 114332 bytes
2,885,479 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,401 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,753 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,666 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,800 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,483,324 >>> mbox cmd response: failed
1,483,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,330 >>> mbox cmd response: failed
1,483,330 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,336 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,016 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,372 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
893,400 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,525 UART: [kat] ++
897,677 UART: [kat] sha1
901,947 UART: [kat] SHA2-256
903,887 UART: [kat] SHA2-384
906,640 UART: [kat] SHA2-512-ACC
908,541 UART: [kat] ECC-384
918,378 UART: [kat] HMAC-384Kdf
922,966 UART: [kat] LMS
1,171,294 UART: [kat] --
1,172,143 UART: [cold-reset] ++
1,172,573 UART: [fht] FHT @ 0x50003400
1,175,104 UART: [idev] ++
1,175,272 UART: [idev] CDI.KEYID = 6
1,175,632 UART: [idev] SUBJECT.KEYID = 7
1,176,056 UART: [idev] UDS.KEYID = 0
1,176,401 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,374 UART: [idev] Erasing UDS.KEYID = 0
1,200,947 UART: [idev] Sha1 KeyId Algorithm
1,209,403 UART: [idev] --
1,210,527 UART: [ldev] ++
1,210,695 UART: [ldev] CDI.KEYID = 6
1,211,058 UART: [ldev] SUBJECT.KEYID = 5
1,211,484 UART: [ldev] AUTHORITY.KEYID = 7
1,211,947 UART: [ldev] FE.KEYID = 1
1,216,699 UART: [ldev] Erasing FE.KEYID = 1
1,242,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,719 UART: [ldev] --
1,282,122 UART: [fwproc] Wait for Commands...
1,282,834 UART: [fwproc] Recv command 0x46574c44
1,283,562 UART: [fwproc] Recv'd Img size: 114332 bytes
1,325,519 UART: ROM Fatal Error: 0x000B000F
1,326,678 >>> mbox cmd response: failed
1,326,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,684 >>> mbox cmd response: failed
1,326,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,690 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
893,262 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,387 UART: [kat] ++
897,539 UART: [kat] sha1
901,835 UART: [kat] SHA2-256
903,775 UART: [kat] SHA2-384
906,500 UART: [kat] SHA2-512-ACC
908,401 UART: [kat] ECC-384
918,138 UART: [kat] HMAC-384Kdf
922,644 UART: [kat] LMS
1,170,972 UART: [kat] --
1,171,757 UART: [cold-reset] ++
1,172,267 UART: [fht] FHT @ 0x50003400
1,174,700 UART: [idev] ++
1,174,868 UART: [idev] CDI.KEYID = 6
1,175,228 UART: [idev] SUBJECT.KEYID = 7
1,175,652 UART: [idev] UDS.KEYID = 0
1,175,997 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,798 UART: [idev] Erasing UDS.KEYID = 0
1,200,277 UART: [idev] Sha1 KeyId Algorithm
1,208,779 UART: [idev] --
1,209,911 UART: [ldev] ++
1,210,079 UART: [ldev] CDI.KEYID = 6
1,210,442 UART: [ldev] SUBJECT.KEYID = 5
1,210,868 UART: [ldev] AUTHORITY.KEYID = 7
1,211,331 UART: [ldev] FE.KEYID = 1
1,216,449 UART: [ldev] Erasing FE.KEYID = 1
1,242,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,607 UART: [ldev] --
1,282,108 UART: [fwproc] Wait for Commands...
1,282,694 UART: [fwproc] Recv command 0x46574c44
1,283,422 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,975 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,279 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,006 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,723 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,232 >>> mbox cmd response: failed
1,180,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,238 >>> mbox cmd response: failed
1,180,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,244 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,025 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,087 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
893,427 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,552 UART: [kat] ++
897,704 UART: [kat] sha1
901,830 UART: [kat] SHA2-256
903,770 UART: [kat] SHA2-384
906,589 UART: [kat] SHA2-512-ACC
908,490 UART: [kat] ECC-384
918,401 UART: [kat] HMAC-384Kdf
922,971 UART: [kat] LMS
1,171,299 UART: [kat] --
1,172,372 UART: [cold-reset] ++
1,172,794 UART: [fht] FHT @ 0x50003400
1,175,295 UART: [idev] ++
1,175,463 UART: [idev] CDI.KEYID = 6
1,175,823 UART: [idev] SUBJECT.KEYID = 7
1,176,247 UART: [idev] UDS.KEYID = 0
1,176,592 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,275 UART: [idev] Erasing UDS.KEYID = 0
1,200,994 UART: [idev] Sha1 KeyId Algorithm
1,209,572 UART: [idev] --
1,210,448 UART: [ldev] ++
1,210,616 UART: [ldev] CDI.KEYID = 6
1,210,979 UART: [ldev] SUBJECT.KEYID = 5
1,211,405 UART: [ldev] AUTHORITY.KEYID = 7
1,211,868 UART: [ldev] FE.KEYID = 1
1,217,314 UART: [ldev] Erasing FE.KEYID = 1
1,243,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,900 UART: [ldev] --
1,282,203 UART: [fwproc] Wait for Commands...
1,282,929 UART: [fwproc] Recv command 0x46574c44
1,283,657 UART: [fwproc] Recv'd Img size: 114332 bytes
1,325,569 UART: ROM Fatal Error: 0x000B000F
1,326,728 >>> mbox cmd response: failed
1,326,728 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,734 >>> mbox cmd response: failed
1,326,734 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,740 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,994 UART: [state] WD Timer not started. Device not locked for debugging
88,335 UART: [kat] SHA2-256
893,985 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,110 UART: [kat] ++
898,262 UART: [kat] sha1
902,482 UART: [kat] SHA2-256
904,422 UART: [kat] SHA2-384
907,141 UART: [kat] SHA2-512-ACC
909,042 UART: [kat] ECC-384
918,801 UART: [kat] HMAC-384Kdf
923,391 UART: [kat] LMS
1,171,719 UART: [kat] --
1,172,470 UART: [cold-reset] ++
1,172,892 UART: [fht] FHT @ 0x50003400
1,175,483 UART: [idev] ++
1,175,651 UART: [idev] CDI.KEYID = 6
1,176,011 UART: [idev] SUBJECT.KEYID = 7
1,176,435 UART: [idev] UDS.KEYID = 0
1,176,780 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,615 UART: [idev] Erasing UDS.KEYID = 0
1,201,998 UART: [idev] Sha1 KeyId Algorithm
1,210,356 UART: [idev] --
1,211,482 UART: [ldev] ++
1,211,650 UART: [ldev] CDI.KEYID = 6
1,212,013 UART: [ldev] SUBJECT.KEYID = 5
1,212,439 UART: [ldev] AUTHORITY.KEYID = 7
1,212,902 UART: [ldev] FE.KEYID = 1
1,218,240 UART: [ldev] Erasing FE.KEYID = 1
1,244,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,404 UART: [ldev] --
1,283,801 UART: [fwproc] Wait for Commands...
1,284,443 UART: [fwproc] Recv command 0x46574c44
1,285,171 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,044 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,348 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,185 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,740 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,937 >>> mbox cmd response: failed
1,181,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,943 >>> mbox cmd response: failed
1,181,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,949 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,276 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,016 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,350 UART: [kat] SHA2-256
890,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,029 UART: [kat] ++
895,181 UART: [kat] sha1
899,657 UART: [kat] SHA2-256
901,597 UART: [kat] SHA2-384
904,358 UART: [kat] SHA2-512-ACC
906,259 UART: [kat] ECC-384
915,664 UART: [kat] HMAC-384Kdf
920,184 UART: [kat] LMS
1,168,496 UART: [kat] --
1,169,201 UART: [cold-reset] ++
1,169,781 UART: [fht] FHT @ 0x50003400
1,172,303 UART: [idev] ++
1,172,471 UART: [idev] CDI.KEYID = 6
1,172,832 UART: [idev] SUBJECT.KEYID = 7
1,173,257 UART: [idev] UDS.KEYID = 0
1,173,603 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,921 UART: [idev] Erasing UDS.KEYID = 0
1,197,797 UART: [idev] Sha1 KeyId Algorithm
1,206,635 UART: [idev] --
1,207,762 UART: [ldev] ++
1,207,930 UART: [ldev] CDI.KEYID = 6
1,208,294 UART: [ldev] SUBJECT.KEYID = 5
1,208,721 UART: [ldev] AUTHORITY.KEYID = 7
1,209,184 UART: [ldev] FE.KEYID = 1
1,214,500 UART: [ldev] Erasing FE.KEYID = 1
1,240,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,826 UART: [ldev] --
1,280,230 UART: [fwproc] Wait for Commands...
1,281,031 UART: [fwproc] Recv command 0x46574c44
1,281,764 UART: [fwproc] Recv'd Img size: 114332 bytes
1,323,892 UART: ROM Fatal Error: 0x000B000F
1,325,051 >>> mbox cmd response: failed
1,325,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,057 >>> mbox cmd response: failed
1,325,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,063 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
891,306 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,435 UART: [kat] ++
895,587 UART: [kat] sha1
900,055 UART: [kat] SHA2-256
901,995 UART: [kat] SHA2-384
904,846 UART: [kat] SHA2-512-ACC
906,747 UART: [kat] ECC-384
916,408 UART: [kat] HMAC-384Kdf
921,056 UART: [kat] LMS
1,169,368 UART: [kat] --
1,170,243 UART: [cold-reset] ++
1,170,719 UART: [fht] FHT @ 0x50003400
1,173,401 UART: [idev] ++
1,173,569 UART: [idev] CDI.KEYID = 6
1,173,930 UART: [idev] SUBJECT.KEYID = 7
1,174,355 UART: [idev] UDS.KEYID = 0
1,174,701 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,583 UART: [idev] Erasing UDS.KEYID = 0
1,199,731 UART: [idev] Sha1 KeyId Algorithm
1,208,531 UART: [idev] --
1,209,386 UART: [ldev] ++
1,209,554 UART: [ldev] CDI.KEYID = 6
1,209,918 UART: [ldev] SUBJECT.KEYID = 5
1,210,345 UART: [ldev] AUTHORITY.KEYID = 7
1,210,808 UART: [ldev] FE.KEYID = 1
1,216,174 UART: [ldev] Erasing FE.KEYID = 1
1,241,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,564 UART: [ldev] --
1,280,924 UART: [fwproc] Wait for Commands...
1,281,515 UART: [fwproc] Recv command 0x46574c44
1,282,248 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,545 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,854 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,746 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,030 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,176,702 >>> mbox cmd response: failed
1,176,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,708 >>> mbox cmd response: failed
1,176,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,714 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,460 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,634 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
891,265 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,764 UART: [kat] SHA2-256
901,704 UART: [kat] SHA2-384
904,515 UART: [kat] SHA2-512-ACC
906,416 UART: [kat] ECC-384
916,387 UART: [kat] HMAC-384Kdf
921,235 UART: [kat] LMS
1,169,547 UART: [kat] --
1,170,228 UART: [cold-reset] ++
1,170,804 UART: [fht] FHT @ 0x50003400
1,173,326 UART: [idev] ++
1,173,494 UART: [idev] CDI.KEYID = 6
1,173,855 UART: [idev] SUBJECT.KEYID = 7
1,174,280 UART: [idev] UDS.KEYID = 0
1,174,626 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,344 UART: [idev] Erasing UDS.KEYID = 0
1,199,426 UART: [idev] Sha1 KeyId Algorithm
1,208,262 UART: [idev] --
1,209,297 UART: [ldev] ++
1,209,465 UART: [ldev] CDI.KEYID = 6
1,209,829 UART: [ldev] SUBJECT.KEYID = 5
1,210,256 UART: [ldev] AUTHORITY.KEYID = 7
1,210,719 UART: [ldev] FE.KEYID = 1
1,216,041 UART: [ldev] Erasing FE.KEYID = 1
1,242,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,017 UART: [ldev] --
1,281,527 UART: [fwproc] Wait for Commands...
1,282,206 UART: [fwproc] Recv command 0x46574c44
1,282,939 UART: [fwproc] Recv'd Img size: 114332 bytes
1,323,375 UART: ROM Fatal Error: 0x000B000F
1,324,534 >>> mbox cmd response: failed
1,324,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,540 >>> mbox cmd response: failed
1,324,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,546 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,918 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
891,629 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,758 UART: [kat] ++
895,910 UART: [kat] sha1
900,140 UART: [kat] SHA2-256
902,080 UART: [kat] SHA2-384
904,955 UART: [kat] SHA2-512-ACC
906,856 UART: [kat] ECC-384
916,521 UART: [kat] HMAC-384Kdf
921,131 UART: [kat] LMS
1,169,443 UART: [kat] --
1,170,496 UART: [cold-reset] ++
1,171,062 UART: [fht] FHT @ 0x50003400
1,173,618 UART: [idev] ++
1,173,786 UART: [idev] CDI.KEYID = 6
1,174,147 UART: [idev] SUBJECT.KEYID = 7
1,174,572 UART: [idev] UDS.KEYID = 0
1,174,918 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,704 UART: [idev] Erasing UDS.KEYID = 0
1,200,322 UART: [idev] Sha1 KeyId Algorithm
1,209,274 UART: [idev] --
1,210,393 UART: [ldev] ++
1,210,561 UART: [ldev] CDI.KEYID = 6
1,210,925 UART: [ldev] SUBJECT.KEYID = 5
1,211,352 UART: [ldev] AUTHORITY.KEYID = 7
1,211,815 UART: [ldev] FE.KEYID = 1
1,217,235 UART: [ldev] Erasing FE.KEYID = 1
1,243,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,527 UART: [ldev] --
1,283,031 UART: [fwproc] Wait for Commands...
1,283,840 UART: [fwproc] Recv command 0x46574c44
1,284,573 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,110 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,419 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,267 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,671 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,509 >>> mbox cmd response: failed
1,179,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,515 >>> mbox cmd response: failed
1,179,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,521 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,713 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,755 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,267 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,789 UART: [kat] SHA2-256
881,720 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,835 UART: [kat] ++
885,987 UART: [kat] sha1
890,237 UART: [kat] SHA2-256
892,175 UART: [kat] SHA2-384
894,876 UART: [kat] SHA2-512-ACC
896,777 UART: [kat] ECC-384
902,452 UART: [kat] HMAC-384Kdf
907,072 UART: [kat] LMS
1,475,268 UART: [kat] --
1,476,523 UART: [cold-reset] ++
1,477,003 UART: [fht] Storing FHT @ 0x50003400
1,479,650 UART: [idev] ++
1,479,818 UART: [idev] CDI.KEYID = 6
1,480,178 UART: [idev] SUBJECT.KEYID = 7
1,480,602 UART: [idev] UDS.KEYID = 0
1,480,947 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,636 UART: [idev] Erasing UDS.KEYID = 0
1,505,150 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,714 UART: [idev] --
1,514,837 UART: [ldev] ++
1,515,005 UART: [ldev] CDI.KEYID = 6
1,515,368 UART: [ldev] SUBJECT.KEYID = 5
1,515,794 UART: [ldev] AUTHORITY.KEYID = 7
1,516,257 UART: [ldev] FE.KEYID = 1
1,521,323 UART: [ldev] Erasing FE.KEYID = 1
1,547,616 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,488 UART: [ldev] --
1,586,851 UART: [fwproc] Waiting for Commands...
1,587,606 UART: [fwproc] Received command 0x46574c44
1,588,397 UART: [fwproc] Received Image of size 114332 bytes
1,627,805 UART: ROM Fatal Error: 0x000B001A
1,628,964 >>> mbox cmd response: failed
1,628,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,970 >>> mbox cmd response: failed
1,628,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,976 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,631 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,201 UART: [kat] SHA2-256
882,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,247 UART: [kat] ++
886,399 UART: [kat] sha1
890,679 UART: [kat] SHA2-256
892,617 UART: [kat] SHA2-384
895,232 UART: [kat] SHA2-512-ACC
897,133 UART: [kat] ECC-384
902,528 UART: [kat] HMAC-384Kdf
907,062 UART: [kat] LMS
1,475,258 UART: [kat] --
1,476,297 UART: [cold-reset] ++
1,476,715 UART: [fht] Storing FHT @ 0x50003400
1,479,520 UART: [idev] ++
1,479,688 UART: [idev] CDI.KEYID = 6
1,480,048 UART: [idev] SUBJECT.KEYID = 7
1,480,472 UART: [idev] UDS.KEYID = 0
1,480,817 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,448 UART: [idev] Erasing UDS.KEYID = 0
1,505,030 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,748 UART: [idev] --
1,514,721 UART: [ldev] ++
1,514,889 UART: [ldev] CDI.KEYID = 6
1,515,252 UART: [ldev] SUBJECT.KEYID = 5
1,515,678 UART: [ldev] AUTHORITY.KEYID = 7
1,516,141 UART: [ldev] FE.KEYID = 1
1,521,387 UART: [ldev] Erasing FE.KEYID = 1
1,546,804 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,462 UART: [ldev] --
1,585,779 UART: [fwproc] Waiting for Commands...
1,586,618 UART: [fwproc] Received command 0x46574c44
1,587,409 UART: [fwproc] Received Image of size 114332 bytes
2,885,296 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,050 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,402 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,191 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,155 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,477,697 >>> mbox cmd response: failed
1,477,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,703 >>> mbox cmd response: failed
1,477,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,709 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,473 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,217 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,900 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,610 UART: [kat] SHA2-256
882,541 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,656 UART: [kat] ++
886,808 UART: [kat] sha1
891,038 UART: [kat] SHA2-256
892,976 UART: [kat] SHA2-384
895,733 UART: [kat] SHA2-512-ACC
897,634 UART: [kat] ECC-384
903,289 UART: [kat] HMAC-384Kdf
908,085 UART: [kat] LMS
1,476,281 UART: [kat] --
1,477,070 UART: [cold-reset] ++
1,477,524 UART: [fht] Storing FHT @ 0x50003400
1,480,069 UART: [idev] ++
1,480,237 UART: [idev] CDI.KEYID = 6
1,480,597 UART: [idev] SUBJECT.KEYID = 7
1,481,021 UART: [idev] UDS.KEYID = 0
1,481,366 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,741 UART: [idev] Erasing UDS.KEYID = 0
1,505,107 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,717 UART: [idev] --
1,514,802 UART: [ldev] ++
1,514,970 UART: [ldev] CDI.KEYID = 6
1,515,333 UART: [ldev] SUBJECT.KEYID = 5
1,515,759 UART: [ldev] AUTHORITY.KEYID = 7
1,516,222 UART: [ldev] FE.KEYID = 1
1,521,784 UART: [ldev] Erasing FE.KEYID = 1
1,547,423 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,311 UART: [ldev] --
1,586,648 UART: [fwproc] Waiting for Commands...
1,587,351 UART: [fwproc] Received command 0x46574c44
1,588,142 UART: [fwproc] Received Image of size 114332 bytes
1,627,152 UART: ROM Fatal Error: 0x000B001A
1,628,311 >>> mbox cmd response: failed
1,628,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,317 >>> mbox cmd response: failed
1,628,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,323 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
86,926 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,400 UART: [kat] SHA2-256
882,331 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,446 UART: [kat] ++
886,598 UART: [kat] sha1
890,980 UART: [kat] SHA2-256
892,918 UART: [kat] SHA2-384
895,525 UART: [kat] SHA2-512-ACC
897,426 UART: [kat] ECC-384
902,917 UART: [kat] HMAC-384Kdf
907,449 UART: [kat] LMS
1,475,645 UART: [kat] --
1,476,484 UART: [cold-reset] ++
1,476,832 UART: [fht] Storing FHT @ 0x50003400
1,479,711 UART: [idev] ++
1,479,879 UART: [idev] CDI.KEYID = 6
1,480,239 UART: [idev] SUBJECT.KEYID = 7
1,480,663 UART: [idev] UDS.KEYID = 0
1,481,008 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,779 UART: [idev] Erasing UDS.KEYID = 0
1,506,041 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,685 UART: [idev] --
1,515,690 UART: [ldev] ++
1,515,858 UART: [ldev] CDI.KEYID = 6
1,516,221 UART: [ldev] SUBJECT.KEYID = 5
1,516,647 UART: [ldev] AUTHORITY.KEYID = 7
1,517,110 UART: [ldev] FE.KEYID = 1
1,522,436 UART: [ldev] Erasing FE.KEYID = 1
1,548,137 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,089 UART: [ldev] --
1,587,566 UART: [fwproc] Waiting for Commands...
1,588,211 UART: [fwproc] Received command 0x46574c44
1,589,002 UART: [fwproc] Received Image of size 114332 bytes
2,887,357 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,591 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,943 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,908 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,522 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,481,860 >>> mbox cmd response: failed
1,481,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,866 >>> mbox cmd response: failed
1,481,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,872 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,218 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,676 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,440 UART: [kat] SHA2-256
893,090 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,215 UART: [kat] ++
897,367 UART: [kat] sha1
901,443 UART: [kat] SHA2-256
903,383 UART: [kat] SHA2-384
906,058 UART: [kat] SHA2-512-ACC
907,959 UART: [kat] ECC-384
917,600 UART: [kat] HMAC-384Kdf
922,276 UART: [kat] LMS
1,170,604 UART: [kat] --
1,171,481 UART: [cold-reset] ++
1,171,879 UART: [fht] FHT @ 0x50003400
1,174,556 UART: [idev] ++
1,174,724 UART: [idev] CDI.KEYID = 6
1,175,084 UART: [idev] SUBJECT.KEYID = 7
1,175,508 UART: [idev] UDS.KEYID = 0
1,175,853 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,336 UART: [idev] Erasing UDS.KEYID = 0
1,200,137 UART: [idev] Sha1 KeyId Algorithm
1,208,573 UART: [idev] --
1,209,833 UART: [ldev] ++
1,210,001 UART: [ldev] CDI.KEYID = 6
1,210,364 UART: [ldev] SUBJECT.KEYID = 5
1,210,790 UART: [ldev] AUTHORITY.KEYID = 7
1,211,253 UART: [ldev] FE.KEYID = 1
1,216,345 UART: [ldev] Erasing FE.KEYID = 1
1,242,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,149 UART: [ldev] --
1,282,510 UART: [fwproc] Wait for Commands...
1,283,270 UART: [fwproc] Recv command 0x46574c44
1,283,998 UART: [fwproc] Recv'd Img size: 114332 bytes
1,322,870 UART: ROM Fatal Error: 0x000B001A
1,324,029 >>> mbox cmd response: failed
1,324,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,035 >>> mbox cmd response: failed
1,324,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,041 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
893,460 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,585 UART: [kat] ++
897,737 UART: [kat] sha1
902,021 UART: [kat] SHA2-256
903,961 UART: [kat] SHA2-384
906,588 UART: [kat] SHA2-512-ACC
908,489 UART: [kat] ECC-384
917,984 UART: [kat] HMAC-384Kdf
922,590 UART: [kat] LMS
1,170,918 UART: [kat] --
1,171,809 UART: [cold-reset] ++
1,172,371 UART: [fht] FHT @ 0x50003400
1,175,206 UART: [idev] ++
1,175,374 UART: [idev] CDI.KEYID = 6
1,175,734 UART: [idev] SUBJECT.KEYID = 7
1,176,158 UART: [idev] UDS.KEYID = 0
1,176,503 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,928 UART: [idev] Erasing UDS.KEYID = 0
1,201,139 UART: [idev] Sha1 KeyId Algorithm
1,209,541 UART: [idev] --
1,210,457 UART: [ldev] ++
1,210,625 UART: [ldev] CDI.KEYID = 6
1,210,988 UART: [ldev] SUBJECT.KEYID = 5
1,211,414 UART: [ldev] AUTHORITY.KEYID = 7
1,211,877 UART: [ldev] FE.KEYID = 1
1,217,093 UART: [ldev] Erasing FE.KEYID = 1
1,243,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,933 UART: [ldev] --
1,283,280 UART: [fwproc] Wait for Commands...
1,284,086 UART: [fwproc] Recv command 0x46574c44
1,284,814 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,833 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,137 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,040 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,003 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,414 >>> mbox cmd response: failed
1,178,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,420 >>> mbox cmd response: failed
1,178,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,426 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,367 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,593 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Unprovisioned
86,356 UART: [state] DebugLocked = No
86,988 UART: [state] WD Timer not started. Device not locked for debugging
88,175 UART: [kat] SHA2-256
893,825 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,950 UART: [kat] ++
898,102 UART: [kat] sha1
902,560 UART: [kat] SHA2-256
904,500 UART: [kat] SHA2-384
907,143 UART: [kat] SHA2-512-ACC
909,044 UART: [kat] ECC-384
918,907 UART: [kat] HMAC-384Kdf
923,683 UART: [kat] LMS
1,172,011 UART: [kat] --
1,172,768 UART: [cold-reset] ++
1,173,310 UART: [fht] FHT @ 0x50003400
1,175,851 UART: [idev] ++
1,176,019 UART: [idev] CDI.KEYID = 6
1,176,379 UART: [idev] SUBJECT.KEYID = 7
1,176,803 UART: [idev] UDS.KEYID = 0
1,177,148 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,169 UART: [idev] Erasing UDS.KEYID = 0
1,202,714 UART: [idev] Sha1 KeyId Algorithm
1,211,158 UART: [idev] --
1,212,220 UART: [ldev] ++
1,212,388 UART: [ldev] CDI.KEYID = 6
1,212,751 UART: [ldev] SUBJECT.KEYID = 5
1,213,177 UART: [ldev] AUTHORITY.KEYID = 7
1,213,640 UART: [ldev] FE.KEYID = 1
1,218,892 UART: [ldev] Erasing FE.KEYID = 1
1,245,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,856 UART: [ldev] --
1,285,157 UART: [fwproc] Wait for Commands...
1,285,773 UART: [fwproc] Recv command 0x46574c44
1,286,501 UART: [fwproc] Recv'd Img size: 114332 bytes
1,325,797 UART: ROM Fatal Error: 0x000B001A
1,326,956 >>> mbox cmd response: failed
1,326,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,962 >>> mbox cmd response: failed
1,326,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,968 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,839 UART: [state] LifecycleState = Unprovisioned
86,494 UART: [state] DebugLocked = No
86,978 UART: [state] WD Timer not started. Device not locked for debugging
88,157 UART: [kat] SHA2-256
893,807 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,932 UART: [kat] ++
898,084 UART: [kat] sha1
902,228 UART: [kat] SHA2-256
904,168 UART: [kat] SHA2-384
906,975 UART: [kat] SHA2-512-ACC
908,876 UART: [kat] ECC-384
918,599 UART: [kat] HMAC-384Kdf
923,293 UART: [kat] LMS
1,171,621 UART: [kat] --
1,172,656 UART: [cold-reset] ++
1,173,048 UART: [fht] FHT @ 0x50003400
1,175,687 UART: [idev] ++
1,175,855 UART: [idev] CDI.KEYID = 6
1,176,215 UART: [idev] SUBJECT.KEYID = 7
1,176,639 UART: [idev] UDS.KEYID = 0
1,176,984 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,669 UART: [idev] Erasing UDS.KEYID = 0
1,201,986 UART: [idev] Sha1 KeyId Algorithm
1,210,504 UART: [idev] --
1,211,592 UART: [ldev] ++
1,211,760 UART: [ldev] CDI.KEYID = 6
1,212,123 UART: [ldev] SUBJECT.KEYID = 5
1,212,549 UART: [ldev] AUTHORITY.KEYID = 7
1,213,012 UART: [ldev] FE.KEYID = 1
1,218,246 UART: [ldev] Erasing FE.KEYID = 1
1,245,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,340 UART: [ldev] --
1,284,733 UART: [fwproc] Wait for Commands...
1,285,375 UART: [fwproc] Recv command 0x46574c44
1,286,103 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,681 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,434 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,738 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,521 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,942 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,606 >>> mbox cmd response: failed
1,179,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,612 >>> mbox cmd response: failed
1,179,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,618 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,218 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,958 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [kat] SHA2-256
891,418 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,547 UART: [kat] ++
895,699 UART: [kat] sha1
899,899 UART: [kat] SHA2-256
901,839 UART: [kat] SHA2-384
904,626 UART: [kat] SHA2-512-ACC
906,527 UART: [kat] ECC-384
915,812 UART: [kat] HMAC-384Kdf
920,518 UART: [kat] LMS
1,168,830 UART: [kat] --
1,169,629 UART: [cold-reset] ++
1,170,005 UART: [fht] FHT @ 0x50003400
1,172,535 UART: [idev] ++
1,172,703 UART: [idev] CDI.KEYID = 6
1,173,064 UART: [idev] SUBJECT.KEYID = 7
1,173,489 UART: [idev] UDS.KEYID = 0
1,173,835 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,137 UART: [idev] Erasing UDS.KEYID = 0
1,197,889 UART: [idev] Sha1 KeyId Algorithm
1,206,565 UART: [idev] --
1,207,686 UART: [ldev] ++
1,207,854 UART: [ldev] CDI.KEYID = 6
1,208,218 UART: [ldev] SUBJECT.KEYID = 5
1,208,645 UART: [ldev] AUTHORITY.KEYID = 7
1,209,108 UART: [ldev] FE.KEYID = 1
1,214,604 UART: [ldev] Erasing FE.KEYID = 1
1,241,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,888 UART: [ldev] --
1,280,168 UART: [fwproc] Wait for Commands...
1,280,785 UART: [fwproc] Recv command 0x46574c44
1,281,518 UART: [fwproc] Recv'd Img size: 114332 bytes
1,319,987 UART: ROM Fatal Error: 0x000B001A
1,321,146 >>> mbox cmd response: failed
1,321,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,152 >>> mbox cmd response: failed
1,321,152 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,158 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
891,096 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,225 UART: [kat] ++
895,377 UART: [kat] sha1
899,645 UART: [kat] SHA2-256
901,585 UART: [kat] SHA2-384
904,404 UART: [kat] SHA2-512-ACC
906,305 UART: [kat] ECC-384
916,042 UART: [kat] HMAC-384Kdf
920,648 UART: [kat] LMS
1,168,960 UART: [kat] --
1,170,047 UART: [cold-reset] ++
1,170,483 UART: [fht] FHT @ 0x50003400
1,173,311 UART: [idev] ++
1,173,479 UART: [idev] CDI.KEYID = 6
1,173,840 UART: [idev] SUBJECT.KEYID = 7
1,174,265 UART: [idev] UDS.KEYID = 0
1,174,611 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,371 UART: [idev] Erasing UDS.KEYID = 0
1,199,181 UART: [idev] Sha1 KeyId Algorithm
1,208,095 UART: [idev] --
1,209,218 UART: [ldev] ++
1,209,386 UART: [ldev] CDI.KEYID = 6
1,209,750 UART: [ldev] SUBJECT.KEYID = 5
1,210,177 UART: [ldev] AUTHORITY.KEYID = 7
1,210,640 UART: [ldev] FE.KEYID = 1
1,215,754 UART: [ldev] Erasing FE.KEYID = 1
1,242,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,500 UART: [ldev] --
1,281,840 UART: [fwproc] Wait for Commands...
1,282,435 UART: [fwproc] Recv command 0x46574c44
1,283,168 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,157 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,466 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,282 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,098 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,173,425 >>> mbox cmd response: failed
1,173,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,431 >>> mbox cmd response: failed
1,173,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,437 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,028 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,260 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,009 UART: [state] LifecycleState = Unprovisioned
85,664 UART: [state] DebugLocked = No
86,220 UART: [state] WD Timer not started. Device not locked for debugging
87,565 UART: [kat] SHA2-256
891,115 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,244 UART: [kat] ++
895,396 UART: [kat] sha1
899,640 UART: [kat] SHA2-256
901,580 UART: [kat] SHA2-384
904,333 UART: [kat] SHA2-512-ACC
906,234 UART: [kat] ECC-384
916,295 UART: [kat] HMAC-384Kdf
921,117 UART: [kat] LMS
1,169,429 UART: [kat] --
1,170,084 UART: [cold-reset] ++
1,170,536 UART: [fht] FHT @ 0x50003400
1,173,078 UART: [idev] ++
1,173,246 UART: [idev] CDI.KEYID = 6
1,173,607 UART: [idev] SUBJECT.KEYID = 7
1,174,032 UART: [idev] UDS.KEYID = 0
1,174,378 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,050 UART: [idev] Erasing UDS.KEYID = 0
1,198,902 UART: [idev] Sha1 KeyId Algorithm
1,207,776 UART: [idev] --
1,208,771 UART: [ldev] ++
1,208,939 UART: [ldev] CDI.KEYID = 6
1,209,303 UART: [ldev] SUBJECT.KEYID = 5
1,209,730 UART: [ldev] AUTHORITY.KEYID = 7
1,210,193 UART: [ldev] FE.KEYID = 1
1,215,413 UART: [ldev] Erasing FE.KEYID = 1
1,241,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,475 UART: [ldev] --
1,280,883 UART: [fwproc] Wait for Commands...
1,281,690 UART: [fwproc] Recv command 0x46574c44
1,282,423 UART: [fwproc] Recv'd Img size: 114332 bytes
1,322,284 UART: ROM Fatal Error: 0x000B001A
1,323,443 >>> mbox cmd response: failed
1,323,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,449 >>> mbox cmd response: failed
1,323,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,455 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Unprovisioned
85,776 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,719 UART: [kat] SHA2-256
891,269 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,398 UART: [kat] ++
895,550 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,609 UART: [kat] SHA2-512-ACC
906,510 UART: [kat] ECC-384
916,045 UART: [kat] HMAC-384Kdf
920,537 UART: [kat] LMS
1,168,849 UART: [kat] --
1,169,736 UART: [cold-reset] ++
1,170,128 UART: [fht] FHT @ 0x50003400
1,172,786 UART: [idev] ++
1,172,954 UART: [idev] CDI.KEYID = 6
1,173,315 UART: [idev] SUBJECT.KEYID = 7
1,173,740 UART: [idev] UDS.KEYID = 0
1,174,086 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,748 UART: [idev] Erasing UDS.KEYID = 0
1,198,880 UART: [idev] Sha1 KeyId Algorithm
1,207,962 UART: [idev] --
1,208,903 UART: [ldev] ++
1,209,071 UART: [ldev] CDI.KEYID = 6
1,209,435 UART: [ldev] SUBJECT.KEYID = 5
1,209,862 UART: [ldev] AUTHORITY.KEYID = 7
1,210,325 UART: [ldev] FE.KEYID = 1
1,215,695 UART: [ldev] Erasing FE.KEYID = 1
1,241,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,305 UART: [ldev] --
1,280,589 UART: [fwproc] Wait for Commands...
1,281,336 UART: [fwproc] Recv command 0x46574c44
1,282,069 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,214 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,378 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,687 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,539 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,363 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,176,048 >>> mbox cmd response: failed
1,176,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,054 >>> mbox cmd response: failed
1,176,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,060 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,189 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,245 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,967 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,200,187 >>> mbox cmd response: failed
1,200,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,193 >>> mbox cmd response: failed
1,200,193 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,199 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,423 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,937 UART: [kat] SHA2-256
881,868 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,983 UART: [kat] ++
886,135 UART: [kat] sha1
890,537 UART: [kat] SHA2-256
892,475 UART: [kat] SHA2-384
895,142 UART: [kat] SHA2-512-ACC
897,043 UART: [kat] ECC-384
902,454 UART: [kat] HMAC-384Kdf
906,844 UART: [kat] LMS
1,475,040 UART: [kat] --
1,475,585 UART: [cold-reset] ++
1,476,041 UART: [fht] Storing FHT @ 0x50003400
1,478,860 UART: [idev] ++
1,479,028 UART: [idev] CDI.KEYID = 6
1,479,388 UART: [idev] SUBJECT.KEYID = 7
1,479,812 UART: [idev] UDS.KEYID = 0
1,480,157 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,708 UART: [idev] Erasing UDS.KEYID = 0
1,504,096 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,768 UART: [idev] --
1,513,757 UART: [ldev] ++
1,513,925 UART: [ldev] CDI.KEYID = 6
1,514,288 UART: [ldev] SUBJECT.KEYID = 5
1,514,714 UART: [ldev] AUTHORITY.KEYID = 7
1,515,177 UART: [ldev] FE.KEYID = 1
1,520,517 UART: [ldev] Erasing FE.KEYID = 1
1,545,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,326 UART: [ldev] --
1,584,659 UART: [fwproc] Waiting for Commands...
1,585,414 UART: [fwproc] Received command 0x46574c44
1,586,205 UART: [fwproc] Received Image of size 114332 bytes
2,885,158 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,786 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,138 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,047 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,297 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,198,685 >>> mbox cmd response: failed
1,198,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,691 >>> mbox cmd response: failed
1,198,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,697 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,447 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,353 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,928 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,199,262 >>> mbox cmd response: failed
1,199,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,268 >>> mbox cmd response: failed
1,199,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,780 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,492 UART: [kat] SHA2-256
882,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,538 UART: [kat] ++
886,690 UART: [kat] sha1
890,926 UART: [kat] SHA2-256
892,864 UART: [kat] SHA2-384
895,693 UART: [kat] SHA2-512-ACC
897,594 UART: [kat] ECC-384
903,123 UART: [kat] HMAC-384Kdf
907,731 UART: [kat] LMS
1,475,927 UART: [kat] --
1,476,536 UART: [cold-reset] ++
1,476,920 UART: [fht] Storing FHT @ 0x50003400
1,479,543 UART: [idev] ++
1,479,711 UART: [idev] CDI.KEYID = 6
1,480,071 UART: [idev] SUBJECT.KEYID = 7
1,480,495 UART: [idev] UDS.KEYID = 0
1,480,840 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,681 UART: [idev] Erasing UDS.KEYID = 0
1,504,721 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,299 UART: [idev] --
1,514,532 UART: [ldev] ++
1,514,700 UART: [ldev] CDI.KEYID = 6
1,515,063 UART: [ldev] SUBJECT.KEYID = 5
1,515,489 UART: [ldev] AUTHORITY.KEYID = 7
1,515,952 UART: [ldev] FE.KEYID = 1
1,521,290 UART: [ldev] Erasing FE.KEYID = 1
1,547,381 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,727 UART: [ldev] --
1,587,040 UART: [fwproc] Waiting for Commands...
1,587,655 UART: [fwproc] Received command 0x46574c44
1,588,446 UART: [fwproc] Received Image of size 114332 bytes
2,886,237 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,873 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,225 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,970 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,818 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,199,564 >>> mbox cmd response: failed
1,199,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,570 >>> mbox cmd response: failed
1,199,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,660 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,812 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,571 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,198,519 >>> mbox cmd response: failed
1,198,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,525 >>> mbox cmd response: failed
1,198,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,531 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,492 UART: [kat] SHA2-256
893,142 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,267 UART: [kat] ++
897,419 UART: [kat] sha1
901,699 UART: [kat] SHA2-256
903,639 UART: [kat] SHA2-384
906,406 UART: [kat] SHA2-512-ACC
908,307 UART: [kat] ECC-384
917,834 UART: [kat] HMAC-384Kdf
922,394 UART: [kat] LMS
1,170,722 UART: [kat] --
1,171,865 UART: [cold-reset] ++
1,172,421 UART: [fht] FHT @ 0x50003400
1,175,052 UART: [idev] ++
1,175,220 UART: [idev] CDI.KEYID = 6
1,175,580 UART: [idev] SUBJECT.KEYID = 7
1,176,004 UART: [idev] UDS.KEYID = 0
1,176,349 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,992 UART: [idev] Erasing UDS.KEYID = 0
1,200,837 UART: [idev] Sha1 KeyId Algorithm
1,209,111 UART: [idev] --
1,210,107 UART: [ldev] ++
1,210,275 UART: [ldev] CDI.KEYID = 6
1,210,638 UART: [ldev] SUBJECT.KEYID = 5
1,211,064 UART: [ldev] AUTHORITY.KEYID = 7
1,211,527 UART: [ldev] FE.KEYID = 1
1,216,611 UART: [ldev] Erasing FE.KEYID = 1
1,242,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,703 UART: [ldev] --
1,282,058 UART: [fwproc] Wait for Commands...
1,282,850 UART: [fwproc] Recv command 0x46574c44
1,283,578 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,817 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,121 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,848 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,147 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,199,405 >>> mbox cmd response: failed
1,199,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,411 >>> mbox cmd response: failed
1,199,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,417 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,197 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,121 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,098 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,199,320 >>> mbox cmd response: failed
1,199,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,326 >>> mbox cmd response: failed
1,199,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,332 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
893,345 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,470 UART: [kat] ++
897,622 UART: [kat] sha1
901,946 UART: [kat] SHA2-256
903,886 UART: [kat] SHA2-384
906,661 UART: [kat] SHA2-512-ACC
908,562 UART: [kat] ECC-384
918,147 UART: [kat] HMAC-384Kdf
922,675 UART: [kat] LMS
1,171,003 UART: [kat] --
1,171,754 UART: [cold-reset] ++
1,172,158 UART: [fht] FHT @ 0x50003400
1,174,801 UART: [idev] ++
1,174,969 UART: [idev] CDI.KEYID = 6
1,175,329 UART: [idev] SUBJECT.KEYID = 7
1,175,753 UART: [idev] UDS.KEYID = 0
1,176,098 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,729 UART: [idev] Erasing UDS.KEYID = 0
1,201,204 UART: [idev] Sha1 KeyId Algorithm
1,209,748 UART: [idev] --
1,210,668 UART: [ldev] ++
1,210,836 UART: [ldev] CDI.KEYID = 6
1,211,199 UART: [ldev] SUBJECT.KEYID = 5
1,211,625 UART: [ldev] AUTHORITY.KEYID = 7
1,212,088 UART: [ldev] FE.KEYID = 1
1,217,250 UART: [ldev] Erasing FE.KEYID = 1
1,244,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,748 UART: [ldev] --
1,283,059 UART: [fwproc] Wait for Commands...
1,283,831 UART: [fwproc] Recv command 0x46574c44
1,284,559 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,996 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,300 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,099 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,698 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,200,810 >>> mbox cmd response: failed
1,200,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,816 >>> mbox cmd response: failed
1,200,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,822 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,692 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,812 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,763 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,199,375 >>> mbox cmd response: failed
1,199,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,381 >>> mbox cmd response: failed
1,199,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,387 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,932 UART: [kat] SHA2-256
891,482 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,611 UART: [kat] ++
895,763 UART: [kat] sha1
900,227 UART: [kat] SHA2-256
902,167 UART: [kat] SHA2-384
905,014 UART: [kat] SHA2-512-ACC
906,915 UART: [kat] ECC-384
916,800 UART: [kat] HMAC-384Kdf
921,410 UART: [kat] LMS
1,169,722 UART: [kat] --
1,170,619 UART: [cold-reset] ++
1,171,189 UART: [fht] FHT @ 0x50003400
1,173,851 UART: [idev] ++
1,174,019 UART: [idev] CDI.KEYID = 6
1,174,380 UART: [idev] SUBJECT.KEYID = 7
1,174,805 UART: [idev] UDS.KEYID = 0
1,175,151 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,625 UART: [idev] Erasing UDS.KEYID = 0
1,200,275 UART: [idev] Sha1 KeyId Algorithm
1,208,981 UART: [idev] --
1,210,146 UART: [ldev] ++
1,210,314 UART: [ldev] CDI.KEYID = 6
1,210,678 UART: [ldev] SUBJECT.KEYID = 5
1,211,105 UART: [ldev] AUTHORITY.KEYID = 7
1,211,568 UART: [ldev] FE.KEYID = 1
1,216,688 UART: [ldev] Erasing FE.KEYID = 1
1,243,055 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,806 UART: [ldev] --
1,282,142 UART: [fwproc] Wait for Commands...
1,282,785 UART: [fwproc] Recv command 0x46574c44
1,283,518 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,019 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,328 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,084 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,189 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,197,669 >>> mbox cmd response: failed
1,197,669 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,675 >>> mbox cmd response: failed
1,197,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,681 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,218 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,278 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,830 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,201,392 >>> mbox cmd response: failed
1,201,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,398 >>> mbox cmd response: failed
1,201,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,404 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
891,327 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,456 UART: [kat] ++
895,608 UART: [kat] sha1
899,968 UART: [kat] SHA2-256
901,908 UART: [kat] SHA2-384
904,831 UART: [kat] SHA2-512-ACC
906,732 UART: [kat] ECC-384
916,683 UART: [kat] HMAC-384Kdf
921,249 UART: [kat] LMS
1,169,561 UART: [kat] --
1,170,432 UART: [cold-reset] ++
1,170,942 UART: [fht] FHT @ 0x50003400
1,173,708 UART: [idev] ++
1,173,876 UART: [idev] CDI.KEYID = 6
1,174,237 UART: [idev] SUBJECT.KEYID = 7
1,174,662 UART: [idev] UDS.KEYID = 0
1,175,008 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,094 UART: [idev] Erasing UDS.KEYID = 0
1,199,976 UART: [idev] Sha1 KeyId Algorithm
1,209,026 UART: [idev] --
1,210,215 UART: [ldev] ++
1,210,383 UART: [ldev] CDI.KEYID = 6
1,210,747 UART: [ldev] SUBJECT.KEYID = 5
1,211,174 UART: [ldev] AUTHORITY.KEYID = 7
1,211,637 UART: [ldev] FE.KEYID = 1
1,217,013 UART: [ldev] Erasing FE.KEYID = 1
1,243,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,717 UART: [ldev] --
1,283,075 UART: [fwproc] Wait for Commands...
1,283,768 UART: [fwproc] Recv command 0x46574c44
1,284,501 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,024 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,333 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,093 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,066 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,202,668 >>> mbox cmd response: failed
1,202,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,674 >>> mbox cmd response: failed
1,202,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,680 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,717 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,535 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,415 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,061 UART: [kat] SHA2-256
881,992 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,107 UART: [kat] ++
886,259 UART: [kat] sha1
890,425 UART: [kat] SHA2-256
892,363 UART: [kat] SHA2-384
895,290 UART: [kat] SHA2-512-ACC
897,191 UART: [kat] ECC-384
902,968 UART: [kat] HMAC-384Kdf
907,382 UART: [kat] LMS
1,475,578 UART: [kat] --
1,476,303 UART: [cold-reset] ++
1,476,673 UART: [fht] Storing FHT @ 0x50003400
1,479,366 UART: [idev] ++
1,479,534 UART: [idev] CDI.KEYID = 6
1,479,894 UART: [idev] SUBJECT.KEYID = 7
1,480,318 UART: [idev] UDS.KEYID = 0
1,480,663 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,362 UART: [idev] Erasing UDS.KEYID = 0
1,505,018 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,550 UART: [idev] --
1,514,771 UART: [ldev] ++
1,514,939 UART: [ldev] CDI.KEYID = 6
1,515,302 UART: [ldev] SUBJECT.KEYID = 5
1,515,728 UART: [ldev] AUTHORITY.KEYID = 7
1,516,191 UART: [ldev] FE.KEYID = 1
1,521,115 UART: [ldev] Erasing FE.KEYID = 1
1,546,280 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,858 UART: [ldev] --
1,585,317 UART: [fwproc] Waiting for Commands...
1,585,982 UART: [fwproc] Received command 0x46574c44
1,586,773 UART: [fwproc] Received Image of size 114332 bytes
3,902,609 UART: ROM Fatal Error: 0x000B0038
3,903,766 >>> mbox cmd response: failed
3,903,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,903,772 >>> mbox cmd response: failed
3,903,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,903,778 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,942 UART: [state] LifecycleState = Unprovisioned
85,597 UART: [state] DebugLocked = No
86,231 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,831 UART: [kat] SHA2-256
881,762 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,877 UART: [kat] ++
886,029 UART: [kat] sha1
890,357 UART: [kat] SHA2-256
892,295 UART: [kat] SHA2-384
894,936 UART: [kat] SHA2-512-ACC
896,837 UART: [kat] ECC-384
902,046 UART: [kat] HMAC-384Kdf
906,472 UART: [kat] LMS
1,474,668 UART: [kat] --
1,475,637 UART: [cold-reset] ++
1,475,971 UART: [fht] Storing FHT @ 0x50003400
1,478,824 UART: [idev] ++
1,478,992 UART: [idev] CDI.KEYID = 6
1,479,352 UART: [idev] SUBJECT.KEYID = 7
1,479,776 UART: [idev] UDS.KEYID = 0
1,480,121 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,914 UART: [idev] Erasing UDS.KEYID = 0
1,503,988 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,640 UART: [idev] --
1,513,845 UART: [ldev] ++
1,514,013 UART: [ldev] CDI.KEYID = 6
1,514,376 UART: [ldev] SUBJECT.KEYID = 5
1,514,802 UART: [ldev] AUTHORITY.KEYID = 7
1,515,265 UART: [ldev] FE.KEYID = 1
1,520,509 UART: [ldev] Erasing FE.KEYID = 1
1,545,518 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,554 UART: [ldev] --
1,584,909 UART: [fwproc] Waiting for Commands...
1,585,602 UART: [fwproc] Received command 0x46574c44
1,586,393 UART: [fwproc] Received Image of size 114332 bytes
2,883,912 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,872 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,224 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,031 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,773 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,869,954 >>> mbox cmd response: failed
3,869,954 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,869,960 >>> mbox cmd response: failed
3,869,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,869,966 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,795 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,457 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,766 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,384 UART: [kat] SHA2-256
882,315 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,430 UART: [kat] ++
886,582 UART: [kat] sha1
891,008 UART: [kat] SHA2-256
892,946 UART: [kat] SHA2-384
895,865 UART: [kat] SHA2-512-ACC
897,766 UART: [kat] ECC-384
903,417 UART: [kat] HMAC-384Kdf
908,063 UART: [kat] LMS
1,476,259 UART: [kat] --
1,477,134 UART: [cold-reset] ++
1,477,628 UART: [fht] Storing FHT @ 0x50003400
1,480,301 UART: [idev] ++
1,480,469 UART: [idev] CDI.KEYID = 6
1,480,829 UART: [idev] SUBJECT.KEYID = 7
1,481,253 UART: [idev] UDS.KEYID = 0
1,481,598 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,599 UART: [idev] Erasing UDS.KEYID = 0
1,506,459 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,049 UART: [idev] --
1,516,084 UART: [ldev] ++
1,516,252 UART: [ldev] CDI.KEYID = 6
1,516,615 UART: [ldev] SUBJECT.KEYID = 5
1,517,041 UART: [ldev] AUTHORITY.KEYID = 7
1,517,504 UART: [ldev] FE.KEYID = 1
1,522,652 UART: [ldev] Erasing FE.KEYID = 1
1,547,793 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,417 UART: [ldev] --
1,586,678 UART: [fwproc] Waiting for Commands...
1,587,517 UART: [fwproc] Received command 0x46574c44
1,588,308 UART: [fwproc] Received Image of size 114332 bytes
3,903,990 UART: ROM Fatal Error: 0x000B0038
3,905,147 >>> mbox cmd response: failed
3,905,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,905,153 >>> mbox cmd response: failed
3,905,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,905,159 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,960 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,590 UART: [kat] SHA2-256
882,521 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,636 UART: [kat] ++
886,788 UART: [kat] sha1
891,000 UART: [kat] SHA2-256
892,938 UART: [kat] SHA2-384
895,563 UART: [kat] SHA2-512-ACC
897,464 UART: [kat] ECC-384
903,093 UART: [kat] HMAC-384Kdf
907,799 UART: [kat] LMS
1,475,995 UART: [kat] --
1,476,670 UART: [cold-reset] ++
1,477,196 UART: [fht] Storing FHT @ 0x50003400
1,479,817 UART: [idev] ++
1,479,985 UART: [idev] CDI.KEYID = 6
1,480,345 UART: [idev] SUBJECT.KEYID = 7
1,480,769 UART: [idev] UDS.KEYID = 0
1,481,114 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,785 UART: [idev] Erasing UDS.KEYID = 0
1,505,509 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,161 UART: [idev] --
1,515,046 UART: [ldev] ++
1,515,214 UART: [ldev] CDI.KEYID = 6
1,515,577 UART: [ldev] SUBJECT.KEYID = 5
1,516,003 UART: [ldev] AUTHORITY.KEYID = 7
1,516,466 UART: [ldev] FE.KEYID = 1
1,521,890 UART: [ldev] Erasing FE.KEYID = 1
1,547,507 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,603 UART: [ldev] --
1,586,904 UART: [fwproc] Waiting for Commands...
1,587,761 UART: [fwproc] Received command 0x46574c44
1,588,552 UART: [fwproc] Received Image of size 114332 bytes
2,887,179 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,755 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,107 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,854 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,528 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,756,994 >>> mbox cmd response: failed
3,756,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,757,000 >>> mbox cmd response: failed
3,757,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,757,006 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,558 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,656 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
893,260 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,385 UART: [kat] ++
897,537 UART: [kat] sha1
901,767 UART: [kat] SHA2-256
903,707 UART: [kat] SHA2-384
906,372 UART: [kat] SHA2-512-ACC
908,273 UART: [kat] ECC-384
918,548 UART: [kat] HMAC-384Kdf
923,114 UART: [kat] LMS
1,171,442 UART: [kat] --
1,172,199 UART: [cold-reset] ++
1,172,677 UART: [fht] FHT @ 0x50003400
1,175,160 UART: [idev] ++
1,175,328 UART: [idev] CDI.KEYID = 6
1,175,688 UART: [idev] SUBJECT.KEYID = 7
1,176,112 UART: [idev] UDS.KEYID = 0
1,176,457 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,034 UART: [idev] Erasing UDS.KEYID = 0
1,201,193 UART: [idev] Sha1 KeyId Algorithm
1,209,639 UART: [idev] --
1,210,853 UART: [ldev] ++
1,211,021 UART: [ldev] CDI.KEYID = 6
1,211,384 UART: [ldev] SUBJECT.KEYID = 5
1,211,810 UART: [ldev] AUTHORITY.KEYID = 7
1,212,273 UART: [ldev] FE.KEYID = 1
1,217,373 UART: [ldev] Erasing FE.KEYID = 1
1,243,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,293 UART: [ldev] --
1,282,708 UART: [fwproc] Wait for Commands...
1,283,330 UART: [fwproc] Recv command 0x46574c44
1,284,058 UART: [fwproc] Recv'd Img size: 114332 bytes
1,877,031 UART: ROM Fatal Error: 0x000B0038
1,878,188 >>> mbox cmd response: failed
1,878,188 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,878,194 >>> mbox cmd response: failed
1,878,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,878,200 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,440 UART: [state] LifecycleState = Unprovisioned
85,095 UART: [state] DebugLocked = No
85,767 UART: [state] WD Timer not started. Device not locked for debugging
87,030 UART: [kat] SHA2-256
892,680 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,805 UART: [kat] ++
896,957 UART: [kat] sha1
901,191 UART: [kat] SHA2-256
903,131 UART: [kat] SHA2-384
905,972 UART: [kat] SHA2-512-ACC
907,873 UART: [kat] ECC-384
917,386 UART: [kat] HMAC-384Kdf
922,100 UART: [kat] LMS
1,170,428 UART: [kat] --
1,171,057 UART: [cold-reset] ++
1,171,577 UART: [fht] FHT @ 0x50003400
1,174,078 UART: [idev] ++
1,174,246 UART: [idev] CDI.KEYID = 6
1,174,606 UART: [idev] SUBJECT.KEYID = 7
1,175,030 UART: [idev] UDS.KEYID = 0
1,175,375 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,622 UART: [idev] Erasing UDS.KEYID = 0
1,199,547 UART: [idev] Sha1 KeyId Algorithm
1,208,053 UART: [idev] --
1,209,107 UART: [ldev] ++
1,209,275 UART: [ldev] CDI.KEYID = 6
1,209,638 UART: [ldev] SUBJECT.KEYID = 5
1,210,064 UART: [ldev] AUTHORITY.KEYID = 7
1,210,527 UART: [ldev] FE.KEYID = 1
1,216,045 UART: [ldev] Erasing FE.KEYID = 1
1,242,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,059 UART: [ldev] --
1,281,444 UART: [fwproc] Wait for Commands...
1,282,258 UART: [fwproc] Recv command 0x46574c44
1,282,986 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,703 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,007 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,706 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,813 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,732,548 >>> mbox cmd response: failed
1,732,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,554 >>> mbox cmd response: failed
1,732,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,560 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,127 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,963 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,893 UART: [state] LifecycleState = Unprovisioned
85,548 UART: [state] DebugLocked = No
86,082 UART: [state] WD Timer not started. Device not locked for debugging
87,215 UART: [kat] SHA2-256
892,865 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,990 UART: [kat] ++
897,142 UART: [kat] sha1
901,200 UART: [kat] SHA2-256
903,140 UART: [kat] SHA2-384
906,021 UART: [kat] SHA2-512-ACC
907,922 UART: [kat] ECC-384
917,175 UART: [kat] HMAC-384Kdf
921,761 UART: [kat] LMS
1,170,089 UART: [kat] --
1,170,916 UART: [cold-reset] ++
1,171,442 UART: [fht] FHT @ 0x50003400
1,173,961 UART: [idev] ++
1,174,129 UART: [idev] CDI.KEYID = 6
1,174,489 UART: [idev] SUBJECT.KEYID = 7
1,174,913 UART: [idev] UDS.KEYID = 0
1,175,258 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,721 UART: [idev] Erasing UDS.KEYID = 0
1,199,330 UART: [idev] Sha1 KeyId Algorithm
1,207,828 UART: [idev] --
1,208,964 UART: [ldev] ++
1,209,132 UART: [ldev] CDI.KEYID = 6
1,209,495 UART: [ldev] SUBJECT.KEYID = 5
1,209,921 UART: [ldev] AUTHORITY.KEYID = 7
1,210,384 UART: [ldev] FE.KEYID = 1
1,215,520 UART: [ldev] Erasing FE.KEYID = 1
1,242,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,548 UART: [ldev] --
1,281,969 UART: [fwproc] Wait for Commands...
1,282,685 UART: [fwproc] Recv command 0x46574c44
1,283,413 UART: [fwproc] Recv'd Img size: 114332 bytes
1,869,599 UART: ROM Fatal Error: 0x000B0038
1,870,756 >>> mbox cmd response: failed
1,870,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,870,762 >>> mbox cmd response: failed
1,870,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,870,768 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
893,743 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,868 UART: [kat] ++
898,020 UART: [kat] sha1
902,382 UART: [kat] SHA2-256
904,322 UART: [kat] SHA2-384
906,933 UART: [kat] SHA2-512-ACC
908,834 UART: [kat] ECC-384
918,279 UART: [kat] HMAC-384Kdf
922,795 UART: [kat] LMS
1,171,123 UART: [kat] --
1,172,028 UART: [cold-reset] ++
1,172,420 UART: [fht] FHT @ 0x50003400
1,175,107 UART: [idev] ++
1,175,275 UART: [idev] CDI.KEYID = 6
1,175,635 UART: [idev] SUBJECT.KEYID = 7
1,176,059 UART: [idev] UDS.KEYID = 0
1,176,404 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,957 UART: [idev] Erasing UDS.KEYID = 0
1,200,686 UART: [idev] Sha1 KeyId Algorithm
1,209,338 UART: [idev] --
1,210,482 UART: [ldev] ++
1,210,650 UART: [ldev] CDI.KEYID = 6
1,211,013 UART: [ldev] SUBJECT.KEYID = 5
1,211,439 UART: [ldev] AUTHORITY.KEYID = 7
1,211,902 UART: [ldev] FE.KEYID = 1
1,217,256 UART: [ldev] Erasing FE.KEYID = 1
1,242,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,540 UART: [ldev] --
1,281,933 UART: [fwproc] Wait for Commands...
1,282,729 UART: [fwproc] Recv command 0x46574c44
1,283,457 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,658 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,962 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,749 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,806 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,721,787 >>> mbox cmd response: failed
1,721,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,793 >>> mbox cmd response: failed
1,721,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,799 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,686 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,562 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
891,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,303 UART: [kat] ++
895,455 UART: [kat] sha1
899,795 UART: [kat] SHA2-256
901,735 UART: [kat] SHA2-384
904,456 UART: [kat] SHA2-512-ACC
906,357 UART: [kat] ECC-384
915,744 UART: [kat] HMAC-384Kdf
920,458 UART: [kat] LMS
1,168,770 UART: [kat] --
1,169,561 UART: [cold-reset] ++
1,170,099 UART: [fht] FHT @ 0x50003400
1,172,781 UART: [idev] ++
1,172,949 UART: [idev] CDI.KEYID = 6
1,173,310 UART: [idev] SUBJECT.KEYID = 7
1,173,735 UART: [idev] UDS.KEYID = 0
1,174,081 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,861 UART: [idev] Erasing UDS.KEYID = 0
1,199,003 UART: [idev] Sha1 KeyId Algorithm
1,207,867 UART: [idev] --
1,209,086 UART: [ldev] ++
1,209,254 UART: [ldev] CDI.KEYID = 6
1,209,618 UART: [ldev] SUBJECT.KEYID = 5
1,210,045 UART: [ldev] AUTHORITY.KEYID = 7
1,210,508 UART: [ldev] FE.KEYID = 1
1,215,718 UART: [ldev] Erasing FE.KEYID = 1
1,241,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,432 UART: [ldev] --
1,280,822 UART: [fwproc] Wait for Commands...
1,281,485 UART: [fwproc] Recv command 0x46574c44
1,282,218 UART: [fwproc] Recv'd Img size: 114332 bytes
1,881,109 UART: ROM Fatal Error: 0x000B0038
1,882,266 >>> mbox cmd response: failed
1,882,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,882,272 >>> mbox cmd response: failed
1,882,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,882,278 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
891,082 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,211 UART: [kat] ++
895,363 UART: [kat] sha1
899,405 UART: [kat] SHA2-256
901,345 UART: [kat] SHA2-384
904,056 UART: [kat] SHA2-512-ACC
905,957 UART: [kat] ECC-384
915,262 UART: [kat] HMAC-384Kdf
919,974 UART: [kat] LMS
1,168,286 UART: [kat] --
1,169,125 UART: [cold-reset] ++
1,169,453 UART: [fht] FHT @ 0x50003400
1,172,217 UART: [idev] ++
1,172,385 UART: [idev] CDI.KEYID = 6
1,172,746 UART: [idev] SUBJECT.KEYID = 7
1,173,171 UART: [idev] UDS.KEYID = 0
1,173,517 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,047 UART: [idev] Erasing UDS.KEYID = 0
1,197,335 UART: [idev] Sha1 KeyId Algorithm
1,206,023 UART: [idev] --
1,207,218 UART: [ldev] ++
1,207,386 UART: [ldev] CDI.KEYID = 6
1,207,750 UART: [ldev] SUBJECT.KEYID = 5
1,208,177 UART: [ldev] AUTHORITY.KEYID = 7
1,208,640 UART: [ldev] FE.KEYID = 1
1,213,764 UART: [ldev] Erasing FE.KEYID = 1
1,240,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,168 UART: [ldev] --
1,279,542 UART: [fwproc] Wait for Commands...
1,280,163 UART: [fwproc] Recv command 0x46574c44
1,280,896 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,201 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,510 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,400 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,846 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,724,425 >>> mbox cmd response: failed
1,724,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,724,431 >>> mbox cmd response: failed
1,724,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,724,437 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,216 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,750 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
891,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
899,900 UART: [kat] SHA2-256
901,840 UART: [kat] SHA2-384
904,593 UART: [kat] SHA2-512-ACC
906,494 UART: [kat] ECC-384
916,097 UART: [kat] HMAC-384Kdf
920,785 UART: [kat] LMS
1,169,097 UART: [kat] --
1,170,018 UART: [cold-reset] ++
1,170,576 UART: [fht] FHT @ 0x50003400
1,173,208 UART: [idev] ++
1,173,376 UART: [idev] CDI.KEYID = 6
1,173,737 UART: [idev] SUBJECT.KEYID = 7
1,174,162 UART: [idev] UDS.KEYID = 0
1,174,508 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,114 UART: [idev] Erasing UDS.KEYID = 0
1,199,470 UART: [idev] Sha1 KeyId Algorithm
1,208,502 UART: [idev] --
1,209,323 UART: [ldev] ++
1,209,491 UART: [ldev] CDI.KEYID = 6
1,209,855 UART: [ldev] SUBJECT.KEYID = 5
1,210,282 UART: [ldev] AUTHORITY.KEYID = 7
1,210,745 UART: [ldev] FE.KEYID = 1
1,215,991 UART: [ldev] Erasing FE.KEYID = 1
1,242,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,855 UART: [ldev] --
1,281,249 UART: [fwproc] Wait for Commands...
1,281,938 UART: [fwproc] Recv command 0x46574c44
1,282,671 UART: [fwproc] Recv'd Img size: 114332 bytes
1,874,125 UART: ROM Fatal Error: 0x000B0038
1,875,282 >>> mbox cmd response: failed
1,875,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,875,288 >>> mbox cmd response: failed
1,875,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,875,294 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,103 UART: [state] LifecycleState = Unprovisioned
85,758 UART: [state] DebugLocked = No
86,368 UART: [state] WD Timer not started. Device not locked for debugging
87,535 UART: [kat] SHA2-256
891,085 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,214 UART: [kat] ++
895,366 UART: [kat] sha1
899,806 UART: [kat] SHA2-256
901,746 UART: [kat] SHA2-384
904,487 UART: [kat] SHA2-512-ACC
906,388 UART: [kat] ECC-384
916,019 UART: [kat] HMAC-384Kdf
920,691 UART: [kat] LMS
1,169,003 UART: [kat] --
1,170,096 UART: [cold-reset] ++
1,170,474 UART: [fht] FHT @ 0x50003400
1,173,062 UART: [idev] ++
1,173,230 UART: [idev] CDI.KEYID = 6
1,173,591 UART: [idev] SUBJECT.KEYID = 7
1,174,016 UART: [idev] UDS.KEYID = 0
1,174,362 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,026 UART: [idev] Erasing UDS.KEYID = 0
1,199,450 UART: [idev] Sha1 KeyId Algorithm
1,208,370 UART: [idev] --
1,209,461 UART: [ldev] ++
1,209,629 UART: [ldev] CDI.KEYID = 6
1,209,993 UART: [ldev] SUBJECT.KEYID = 5
1,210,420 UART: [ldev] AUTHORITY.KEYID = 7
1,210,883 UART: [ldev] FE.KEYID = 1
1,216,071 UART: [ldev] Erasing FE.KEYID = 1
1,243,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,703 UART: [ldev] --
1,282,003 UART: [fwproc] Wait for Commands...
1,282,634 UART: [fwproc] Recv command 0x46574c44
1,283,367 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,522 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,831 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,743 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,897 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,726,773 >>> mbox cmd response: failed
1,726,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,726,779 >>> mbox cmd response: failed
1,726,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,726,785 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,465 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,273 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,165 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,477,552 >>> mbox cmd response: failed
1,477,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,558 >>> mbox cmd response: failed
1,477,558 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,564 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,434 UART: [state] LifecycleState = Unprovisioned
85,089 UART: [state] DebugLocked = No
85,685 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,351 UART: [kat] SHA2-256
881,282 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,397 UART: [kat] ++
885,549 UART: [kat] sha1
889,707 UART: [kat] SHA2-256
891,645 UART: [kat] SHA2-384
894,384 UART: [kat] SHA2-512-ACC
896,285 UART: [kat] ECC-384
901,862 UART: [kat] HMAC-384Kdf
906,374 UART: [kat] LMS
1,474,570 UART: [kat] --
1,475,479 UART: [cold-reset] ++
1,475,893 UART: [fht] Storing FHT @ 0x50003400
1,478,700 UART: [idev] ++
1,478,868 UART: [idev] CDI.KEYID = 6
1,479,228 UART: [idev] SUBJECT.KEYID = 7
1,479,652 UART: [idev] UDS.KEYID = 0
1,479,997 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,422 UART: [idev] Erasing UDS.KEYID = 0
1,503,754 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,280 UART: [idev] --
1,513,383 UART: [ldev] ++
1,513,551 UART: [ldev] CDI.KEYID = 6
1,513,914 UART: [ldev] SUBJECT.KEYID = 5
1,514,340 UART: [ldev] AUTHORITY.KEYID = 7
1,514,803 UART: [ldev] FE.KEYID = 1
1,519,793 UART: [ldev] Erasing FE.KEYID = 1
1,545,860 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,582 UART: [ldev] --
1,584,891 UART: [fwproc] Waiting for Commands...
1,585,628 UART: [fwproc] Received command 0x46574c44
1,586,419 UART: [fwproc] Received Image of size 114332 bytes
2,883,362 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,956 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,308 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,209 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,491 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,475,563 >>> mbox cmd response: failed
1,475,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,569 >>> mbox cmd response: failed
1,475,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,575 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,067 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,061 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,112 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,477,414 >>> mbox cmd response: failed
1,477,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,420 >>> mbox cmd response: failed
1,477,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,426 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,958 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,564 UART: [kat] SHA2-256
882,495 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,610 UART: [kat] ++
886,762 UART: [kat] sha1
890,964 UART: [kat] SHA2-256
892,902 UART: [kat] SHA2-384
895,445 UART: [kat] SHA2-512-ACC
897,346 UART: [kat] ECC-384
902,733 UART: [kat] HMAC-384Kdf
907,409 UART: [kat] LMS
1,475,605 UART: [kat] --
1,476,522 UART: [cold-reset] ++
1,476,942 UART: [fht] Storing FHT @ 0x50003400
1,479,785 UART: [idev] ++
1,479,953 UART: [idev] CDI.KEYID = 6
1,480,313 UART: [idev] SUBJECT.KEYID = 7
1,480,737 UART: [idev] UDS.KEYID = 0
1,481,082 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,741 UART: [idev] Erasing UDS.KEYID = 0
1,505,423 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,129 UART: [idev] --
1,515,186 UART: [ldev] ++
1,515,354 UART: [ldev] CDI.KEYID = 6
1,515,717 UART: [ldev] SUBJECT.KEYID = 5
1,516,143 UART: [ldev] AUTHORITY.KEYID = 7
1,516,606 UART: [ldev] FE.KEYID = 1
1,521,914 UART: [ldev] Erasing FE.KEYID = 1
1,547,433 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,517 UART: [ldev] --
1,586,886 UART: [fwproc] Waiting for Commands...
1,587,607 UART: [fwproc] Received command 0x46574c44
1,588,398 UART: [fwproc] Received Image of size 114332 bytes
2,886,835 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,677 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,029 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,786 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,582 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,470,798 >>> mbox cmd response: failed
1,470,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,470,804 >>> mbox cmd response: failed
1,470,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,470,810 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,636 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,310 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,927 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,475,795 >>> mbox cmd response: failed
1,475,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,801 >>> mbox cmd response: failed
1,475,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,807 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,666 UART: [state] LifecycleState = Unprovisioned
85,321 UART: [state] DebugLocked = No
85,843 UART: [state] WD Timer not started. Device not locked for debugging
87,204 UART: [kat] SHA2-256
892,854 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,979 UART: [kat] ++
897,131 UART: [kat] sha1
901,359 UART: [kat] SHA2-256
903,299 UART: [kat] SHA2-384
906,058 UART: [kat] SHA2-512-ACC
907,959 UART: [kat] ECC-384
917,126 UART: [kat] HMAC-384Kdf
921,716 UART: [kat] LMS
1,170,044 UART: [kat] --
1,170,913 UART: [cold-reset] ++
1,171,487 UART: [fht] FHT @ 0x50003400
1,174,110 UART: [idev] ++
1,174,278 UART: [idev] CDI.KEYID = 6
1,174,638 UART: [idev] SUBJECT.KEYID = 7
1,175,062 UART: [idev] UDS.KEYID = 0
1,175,407 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,976 UART: [idev] Erasing UDS.KEYID = 0
1,200,707 UART: [idev] Sha1 KeyId Algorithm
1,209,197 UART: [idev] --
1,210,309 UART: [ldev] ++
1,210,477 UART: [ldev] CDI.KEYID = 6
1,210,840 UART: [ldev] SUBJECT.KEYID = 5
1,211,266 UART: [ldev] AUTHORITY.KEYID = 7
1,211,729 UART: [ldev] FE.KEYID = 1
1,216,969 UART: [ldev] Erasing FE.KEYID = 1
1,242,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,665 UART: [ldev] --
1,282,092 UART: [fwproc] Wait for Commands...
1,282,776 UART: [fwproc] Recv command 0x46574c44
1,283,504 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,165 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,469 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,292 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,145 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,476,531 >>> mbox cmd response: failed
1,476,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,537 >>> mbox cmd response: failed
1,476,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,543 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,931 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,845 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,786 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,475,141 >>> mbox cmd response: failed
1,475,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,147 >>> mbox cmd response: failed
1,475,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,153 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
893,659 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,784 UART: [kat] ++
897,936 UART: [kat] sha1
902,106 UART: [kat] SHA2-256
904,046 UART: [kat] SHA2-384
906,801 UART: [kat] SHA2-512-ACC
908,702 UART: [kat] ECC-384
918,427 UART: [kat] HMAC-384Kdf
923,237 UART: [kat] LMS
1,171,565 UART: [kat] --
1,172,312 UART: [cold-reset] ++
1,172,774 UART: [fht] FHT @ 0x50003400
1,175,625 UART: [idev] ++
1,175,793 UART: [idev] CDI.KEYID = 6
1,176,153 UART: [idev] SUBJECT.KEYID = 7
1,176,577 UART: [idev] UDS.KEYID = 0
1,176,922 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,709 UART: [idev] Erasing UDS.KEYID = 0
1,201,896 UART: [idev] Sha1 KeyId Algorithm
1,210,356 UART: [idev] --
1,211,316 UART: [ldev] ++
1,211,484 UART: [ldev] CDI.KEYID = 6
1,211,847 UART: [ldev] SUBJECT.KEYID = 5
1,212,273 UART: [ldev] AUTHORITY.KEYID = 7
1,212,736 UART: [ldev] FE.KEYID = 1
1,218,026 UART: [ldev] Erasing FE.KEYID = 1
1,244,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,436 UART: [ldev] --
1,283,759 UART: [fwproc] Wait for Commands...
1,284,367 UART: [fwproc] Recv command 0x46574c44
1,285,095 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,730 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,034 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,833 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,660 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,476,182 >>> mbox cmd response: failed
1,476,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,188 >>> mbox cmd response: failed
1,476,188 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,194 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,702 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,396 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,191 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,477,823 >>> mbox cmd response: failed
1,477,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,829 >>> mbox cmd response: failed
1,477,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,835 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,171 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
890,874 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,003 UART: [kat] ++
895,155 UART: [kat] sha1
899,405 UART: [kat] SHA2-256
901,345 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,874 UART: [kat] HMAC-384Kdf
920,398 UART: [kat] LMS
1,168,710 UART: [kat] --
1,169,597 UART: [cold-reset] ++
1,169,977 UART: [fht] FHT @ 0x50003400
1,172,667 UART: [idev] ++
1,172,835 UART: [idev] CDI.KEYID = 6
1,173,196 UART: [idev] SUBJECT.KEYID = 7
1,173,621 UART: [idev] UDS.KEYID = 0
1,173,967 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,597 UART: [idev] Erasing UDS.KEYID = 0
1,198,437 UART: [idev] Sha1 KeyId Algorithm
1,207,381 UART: [idev] --
1,208,438 UART: [ldev] ++
1,208,606 UART: [ldev] CDI.KEYID = 6
1,208,970 UART: [ldev] SUBJECT.KEYID = 5
1,209,397 UART: [ldev] AUTHORITY.KEYID = 7
1,209,860 UART: [ldev] FE.KEYID = 1
1,214,968 UART: [ldev] Erasing FE.KEYID = 1
1,240,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,912 UART: [ldev] --
1,280,316 UART: [fwproc] Wait for Commands...
1,281,139 UART: [fwproc] Recv command 0x46574c44
1,281,872 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,083 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,392 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,212 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,705 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,473,286 >>> mbox cmd response: failed
1,473,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,473,292 >>> mbox cmd response: failed
1,473,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,473,298 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,868 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,994 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,938 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,469,333 >>> mbox cmd response: failed
1,469,333 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,469,339 >>> mbox cmd response: failed
1,469,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,469,345 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,656 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
891,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,608 UART: [kat] ++
895,760 UART: [kat] sha1
900,044 UART: [kat] SHA2-256
901,984 UART: [kat] SHA2-384
904,649 UART: [kat] SHA2-512-ACC
906,550 UART: [kat] ECC-384
916,165 UART: [kat] HMAC-384Kdf
920,551 UART: [kat] LMS
1,168,863 UART: [kat] --
1,169,656 UART: [cold-reset] ++
1,170,136 UART: [fht] FHT @ 0x50003400
1,172,748 UART: [idev] ++
1,172,916 UART: [idev] CDI.KEYID = 6
1,173,277 UART: [idev] SUBJECT.KEYID = 7
1,173,702 UART: [idev] UDS.KEYID = 0
1,174,048 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,812 UART: [idev] Erasing UDS.KEYID = 0
1,199,680 UART: [idev] Sha1 KeyId Algorithm
1,208,730 UART: [idev] --
1,209,757 UART: [ldev] ++
1,209,925 UART: [ldev] CDI.KEYID = 6
1,210,289 UART: [ldev] SUBJECT.KEYID = 5
1,210,716 UART: [ldev] AUTHORITY.KEYID = 7
1,211,179 UART: [ldev] FE.KEYID = 1
1,216,481 UART: [ldev] Erasing FE.KEYID = 1
1,242,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,585 UART: [ldev] --
1,281,859 UART: [fwproc] Wait for Commands...
1,282,584 UART: [fwproc] Recv command 0x46574c44
1,283,317 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,002 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,311 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,017 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,016 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,474,929 >>> mbox cmd response: failed
1,474,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,935 >>> mbox cmd response: failed
1,474,935 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,941 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,947 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,339 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,739 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,216 >>> mbox cmd response: failed
1,181,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,222 >>> mbox cmd response: failed
1,181,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,228 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,596 UART: [state] LifecycleState = Unprovisioned
85,251 UART: [state] DebugLocked = No
85,815 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,339 UART: [kat] SHA2-256
881,270 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,385 UART: [kat] ++
885,537 UART: [kat] sha1
889,827 UART: [kat] SHA2-256
891,765 UART: [kat] SHA2-384
894,450 UART: [kat] SHA2-512-ACC
896,351 UART: [kat] ECC-384
901,952 UART: [kat] HMAC-384Kdf
906,346 UART: [kat] LMS
1,474,542 UART: [kat] --
1,475,657 UART: [cold-reset] ++
1,476,055 UART: [fht] Storing FHT @ 0x50003400
1,478,994 UART: [idev] ++
1,479,162 UART: [idev] CDI.KEYID = 6
1,479,522 UART: [idev] SUBJECT.KEYID = 7
1,479,946 UART: [idev] UDS.KEYID = 0
1,480,291 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,848 UART: [idev] Erasing UDS.KEYID = 0
1,504,552 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,350 UART: [idev] --
1,514,571 UART: [ldev] ++
1,514,739 UART: [ldev] CDI.KEYID = 6
1,515,102 UART: [ldev] SUBJECT.KEYID = 5
1,515,528 UART: [ldev] AUTHORITY.KEYID = 7
1,515,991 UART: [ldev] FE.KEYID = 1
1,521,255 UART: [ldev] Erasing FE.KEYID = 1
1,545,830 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,600 UART: [ldev] --
1,584,991 UART: [fwproc] Waiting for Commands...
1,585,818 UART: [fwproc] Received command 0x46574c44
1,586,609 UART: [fwproc] Received Image of size 114332 bytes
2,884,326 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,664 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,016 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,961 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,127 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,518 >>> mbox cmd response: failed
1,180,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,524 >>> mbox cmd response: failed
1,180,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,530 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,065 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,055 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,438 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,323 >>> mbox cmd response: failed
1,180,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,329 >>> mbox cmd response: failed
1,180,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,335 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
87,038 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,750 UART: [kat] SHA2-256
882,681 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,796 UART: [kat] ++
886,948 UART: [kat] sha1
891,200 UART: [kat] SHA2-256
893,138 UART: [kat] SHA2-384
895,739 UART: [kat] SHA2-512-ACC
897,640 UART: [kat] ECC-384
903,875 UART: [kat] HMAC-384Kdf
908,491 UART: [kat] LMS
1,476,687 UART: [kat] --
1,477,872 UART: [cold-reset] ++
1,478,322 UART: [fht] Storing FHT @ 0x50003400
1,480,951 UART: [idev] ++
1,481,119 UART: [idev] CDI.KEYID = 6
1,481,479 UART: [idev] SUBJECT.KEYID = 7
1,481,903 UART: [idev] UDS.KEYID = 0
1,482,248 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,975 UART: [idev] Erasing UDS.KEYID = 0
1,506,691 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,353 UART: [idev] --
1,516,590 UART: [ldev] ++
1,516,758 UART: [ldev] CDI.KEYID = 6
1,517,121 UART: [ldev] SUBJECT.KEYID = 5
1,517,547 UART: [ldev] AUTHORITY.KEYID = 7
1,518,010 UART: [ldev] FE.KEYID = 1
1,523,360 UART: [ldev] Erasing FE.KEYID = 1
1,548,963 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,667 UART: [ldev] --
1,588,068 UART: [fwproc] Waiting for Commands...
1,588,831 UART: [fwproc] Received command 0x46574c44
1,589,622 UART: [fwproc] Received Image of size 114332 bytes
2,886,885 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,803 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,155 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,042 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,560 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,495 >>> mbox cmd response: failed
1,178,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,501 >>> mbox cmd response: failed
1,178,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,507 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,796 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,756 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,825 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,060 >>> mbox cmd response: failed
1,180,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,066 >>> mbox cmd response: failed
1,180,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,072 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
893,352 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,477 UART: [kat] ++
897,629 UART: [kat] sha1
901,995 UART: [kat] SHA2-256
903,935 UART: [kat] SHA2-384
906,696 UART: [kat] SHA2-512-ACC
908,597 UART: [kat] ECC-384
918,420 UART: [kat] HMAC-384Kdf
923,052 UART: [kat] LMS
1,171,380 UART: [kat] --
1,172,365 UART: [cold-reset] ++
1,172,745 UART: [fht] FHT @ 0x50003400
1,175,584 UART: [idev] ++
1,175,752 UART: [idev] CDI.KEYID = 6
1,176,112 UART: [idev] SUBJECT.KEYID = 7
1,176,536 UART: [idev] UDS.KEYID = 0
1,176,881 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,290 UART: [idev] Erasing UDS.KEYID = 0
1,201,299 UART: [idev] Sha1 KeyId Algorithm
1,209,945 UART: [idev] --
1,210,987 UART: [ldev] ++
1,211,155 UART: [ldev] CDI.KEYID = 6
1,211,518 UART: [ldev] SUBJECT.KEYID = 5
1,211,944 UART: [ldev] AUTHORITY.KEYID = 7
1,212,407 UART: [ldev] FE.KEYID = 1
1,217,739 UART: [ldev] Erasing FE.KEYID = 1
1,244,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,141 UART: [ldev] --
1,283,414 UART: [fwproc] Wait for Commands...
1,284,120 UART: [fwproc] Recv command 0x46574c44
1,284,848 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,781 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,085 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,862 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,803 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,592 >>> mbox cmd response: failed
1,180,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,598 >>> mbox cmd response: failed
1,180,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,604 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,255 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,475 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,748 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,487 >>> mbox cmd response: failed
1,180,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,493 >>> mbox cmd response: failed
1,180,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,499 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,769 UART: [state] LifecycleState = Unprovisioned
85,424 UART: [state] DebugLocked = No
85,986 UART: [state] WD Timer not started. Device not locked for debugging
87,275 UART: [kat] SHA2-256
892,925 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,050 UART: [kat] ++
897,202 UART: [kat] sha1
901,270 UART: [kat] SHA2-256
903,210 UART: [kat] SHA2-384
905,919 UART: [kat] SHA2-512-ACC
907,820 UART: [kat] ECC-384
917,251 UART: [kat] HMAC-384Kdf
921,821 UART: [kat] LMS
1,170,149 UART: [kat] --
1,170,864 UART: [cold-reset] ++
1,171,342 UART: [fht] FHT @ 0x50003400
1,173,889 UART: [idev] ++
1,174,057 UART: [idev] CDI.KEYID = 6
1,174,417 UART: [idev] SUBJECT.KEYID = 7
1,174,841 UART: [idev] UDS.KEYID = 0
1,175,186 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,877 UART: [idev] Erasing UDS.KEYID = 0
1,199,826 UART: [idev] Sha1 KeyId Algorithm
1,208,358 UART: [idev] --
1,209,266 UART: [ldev] ++
1,209,434 UART: [ldev] CDI.KEYID = 6
1,209,797 UART: [ldev] SUBJECT.KEYID = 5
1,210,223 UART: [ldev] AUTHORITY.KEYID = 7
1,210,686 UART: [ldev] FE.KEYID = 1
1,215,948 UART: [ldev] Erasing FE.KEYID = 1
1,242,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,704 UART: [ldev] --
1,282,105 UART: [fwproc] Wait for Commands...
1,282,887 UART: [fwproc] Recv command 0x46574c44
1,283,615 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,478 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,782 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,533 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,562 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,931 >>> mbox cmd response: failed
1,179,931 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,937 >>> mbox cmd response: failed
1,179,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,943 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,816 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,534 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,361 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,842 >>> mbox cmd response: failed
1,178,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,848 >>> mbox cmd response: failed
1,178,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
891,188 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,317 UART: [kat] ++
895,469 UART: [kat] sha1
899,703 UART: [kat] SHA2-256
901,643 UART: [kat] SHA2-384
904,340 UART: [kat] SHA2-512-ACC
906,241 UART: [kat] ECC-384
916,188 UART: [kat] HMAC-384Kdf
920,864 UART: [kat] LMS
1,169,176 UART: [kat] --
1,170,081 UART: [cold-reset] ++
1,170,621 UART: [fht] FHT @ 0x50003400
1,173,209 UART: [idev] ++
1,173,377 UART: [idev] CDI.KEYID = 6
1,173,738 UART: [idev] SUBJECT.KEYID = 7
1,174,163 UART: [idev] UDS.KEYID = 0
1,174,509 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,147 UART: [idev] Erasing UDS.KEYID = 0
1,198,533 UART: [idev] Sha1 KeyId Algorithm
1,207,509 UART: [idev] --
1,208,570 UART: [ldev] ++
1,208,738 UART: [ldev] CDI.KEYID = 6
1,209,102 UART: [ldev] SUBJECT.KEYID = 5
1,209,529 UART: [ldev] AUTHORITY.KEYID = 7
1,209,992 UART: [ldev] FE.KEYID = 1
1,215,364 UART: [ldev] Erasing FE.KEYID = 1
1,241,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,054 UART: [ldev] --
1,281,476 UART: [fwproc] Wait for Commands...
1,282,057 UART: [fwproc] Recv command 0x46574c44
1,282,790 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,683 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,992 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,878 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,707 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,356 >>> mbox cmd response: failed
1,180,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,362 >>> mbox cmd response: failed
1,180,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,368 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,274 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,382 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,054 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,563 >>> mbox cmd response: failed
1,179,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,569 >>> mbox cmd response: failed
1,179,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,575 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,565 UART: [kat] SHA2-512-ACC
906,466 UART: [kat] ECC-384
916,403 UART: [kat] HMAC-384Kdf
920,919 UART: [kat] LMS
1,169,231 UART: [kat] --
1,170,112 UART: [cold-reset] ++
1,170,564 UART: [fht] FHT @ 0x50003400
1,173,436 UART: [idev] ++
1,173,604 UART: [idev] CDI.KEYID = 6
1,173,965 UART: [idev] SUBJECT.KEYID = 7
1,174,390 UART: [idev] UDS.KEYID = 0
1,174,736 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,574 UART: [idev] Erasing UDS.KEYID = 0
1,199,780 UART: [idev] Sha1 KeyId Algorithm
1,208,564 UART: [idev] --
1,209,567 UART: [ldev] ++
1,209,735 UART: [ldev] CDI.KEYID = 6
1,210,099 UART: [ldev] SUBJECT.KEYID = 5
1,210,526 UART: [ldev] AUTHORITY.KEYID = 7
1,210,989 UART: [ldev] FE.KEYID = 1
1,216,409 UART: [ldev] Erasing FE.KEYID = 1
1,243,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,129 UART: [ldev] --
1,282,425 UART: [fwproc] Wait for Commands...
1,283,084 UART: [fwproc] Recv command 0x46574c44
1,283,817 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,532 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,841 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,719 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,454 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,109 >>> mbox cmd response: failed
1,179,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,115 >>> mbox cmd response: failed
1,179,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,157 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,171 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,800 UART: [state] LifecycleState = Unprovisioned
85,455 UART: [state] DebugLocked = No
86,169 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,875 UART: [kat] SHA2-256
881,806 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,921 UART: [kat] ++
886,073 UART: [kat] sha1
890,169 UART: [kat] SHA2-256
892,107 UART: [kat] SHA2-384
895,002 UART: [kat] SHA2-512-ACC
896,903 UART: [kat] ECC-384
902,514 UART: [kat] HMAC-384Kdf
907,108 UART: [kat] LMS
1,475,304 UART: [kat] --
1,476,253 UART: [cold-reset] ++
1,476,727 UART: [fht] Storing FHT @ 0x50003400
1,479,458 UART: [idev] ++
1,479,626 UART: [idev] CDI.KEYID = 6
1,479,986 UART: [idev] SUBJECT.KEYID = 7
1,480,410 UART: [idev] UDS.KEYID = 0
1,480,755 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,630 UART: [idev] Erasing UDS.KEYID = 0
1,505,698 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,426 UART: [idev] --
1,515,307 UART: [ldev] ++
1,515,475 UART: [ldev] CDI.KEYID = 6
1,515,838 UART: [ldev] SUBJECT.KEYID = 5
1,516,264 UART: [ldev] AUTHORITY.KEYID = 7
1,516,727 UART: [ldev] FE.KEYID = 1
1,521,657 UART: [ldev] Erasing FE.KEYID = 1
1,547,468 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,470 UART: [ldev] --
1,586,869 UART: [fwproc] Waiting for Commands...
1,587,528 UART: [fwproc] Received command 0x46574c44
1,588,319 UART: [fwproc] Received Image of size 114332 bytes
1,611,908 UART: ROM Fatal Error: 0x000B0007
1,613,065 >>> mbox cmd response: failed
1,613,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,071 >>> mbox cmd response: failed
1,613,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,077 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,543 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,215 UART: [kat] SHA2-256
882,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,261 UART: [kat] ++
886,413 UART: [kat] sha1
890,627 UART: [kat] SHA2-256
892,565 UART: [kat] SHA2-384
895,280 UART: [kat] SHA2-512-ACC
897,181 UART: [kat] ECC-384
902,726 UART: [kat] HMAC-384Kdf
907,176 UART: [kat] LMS
1,475,372 UART: [kat] --
1,476,307 UART: [cold-reset] ++
1,476,781 UART: [fht] Storing FHT @ 0x50003400
1,479,756 UART: [idev] ++
1,479,924 UART: [idev] CDI.KEYID = 6
1,480,284 UART: [idev] SUBJECT.KEYID = 7
1,480,708 UART: [idev] UDS.KEYID = 0
1,481,053 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,706 UART: [idev] Erasing UDS.KEYID = 0
1,505,174 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,700 UART: [idev] --
1,514,559 UART: [ldev] ++
1,514,727 UART: [ldev] CDI.KEYID = 6
1,515,090 UART: [ldev] SUBJECT.KEYID = 5
1,515,516 UART: [ldev] AUTHORITY.KEYID = 7
1,515,979 UART: [ldev] FE.KEYID = 1
1,521,173 UART: [ldev] Erasing FE.KEYID = 1
1,546,290 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,410 UART: [ldev] --
1,585,761 UART: [fwproc] Waiting for Commands...
1,586,498 UART: [fwproc] Received command 0x46574c44
1,587,289 UART: [fwproc] Received Image of size 114332 bytes
2,885,378 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,318 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,670 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,549 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,697 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,465,034 >>> mbox cmd response: failed
1,465,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,040 >>> mbox cmd response: failed
1,465,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,046 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,469 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,525 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,131 UART: [state] LifecycleState = Unprovisioned
85,786 UART: [state] DebugLocked = No
86,356 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,882 UART: [kat] SHA2-256
881,813 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,928 UART: [kat] ++
886,080 UART: [kat] sha1
890,458 UART: [kat] SHA2-256
892,396 UART: [kat] SHA2-384
895,081 UART: [kat] SHA2-512-ACC
896,982 UART: [kat] ECC-384
902,813 UART: [kat] HMAC-384Kdf
907,471 UART: [kat] LMS
1,475,667 UART: [kat] --
1,476,830 UART: [cold-reset] ++
1,477,200 UART: [fht] Storing FHT @ 0x50003400
1,480,151 UART: [idev] ++
1,480,319 UART: [idev] CDI.KEYID = 6
1,480,679 UART: [idev] SUBJECT.KEYID = 7
1,481,103 UART: [idev] UDS.KEYID = 0
1,481,448 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,093 UART: [idev] Erasing UDS.KEYID = 0
1,505,833 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,459 UART: [idev] --
1,515,520 UART: [ldev] ++
1,515,688 UART: [ldev] CDI.KEYID = 6
1,516,051 UART: [ldev] SUBJECT.KEYID = 5
1,516,477 UART: [ldev] AUTHORITY.KEYID = 7
1,516,940 UART: [ldev] FE.KEYID = 1
1,522,046 UART: [ldev] Erasing FE.KEYID = 1
1,547,635 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,609 UART: [ldev] --
1,586,876 UART: [fwproc] Waiting for Commands...
1,587,511 UART: [fwproc] Received command 0x46574c44
1,588,302 UART: [fwproc] Received Image of size 114332 bytes
1,612,497 UART: ROM Fatal Error: 0x000B0007
1,613,654 >>> mbox cmd response: failed
1,613,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,660 >>> mbox cmd response: failed
1,613,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,666 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,672 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,256 UART: [kat] SHA2-256
882,187 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,302 UART: [kat] ++
886,454 UART: [kat] sha1
890,830 UART: [kat] SHA2-256
892,768 UART: [kat] SHA2-384
895,363 UART: [kat] SHA2-512-ACC
897,264 UART: [kat] ECC-384
902,829 UART: [kat] HMAC-384Kdf
907,535 UART: [kat] LMS
1,475,731 UART: [kat] --
1,476,592 UART: [cold-reset] ++
1,476,958 UART: [fht] Storing FHT @ 0x50003400
1,479,621 UART: [idev] ++
1,479,789 UART: [idev] CDI.KEYID = 6
1,480,149 UART: [idev] SUBJECT.KEYID = 7
1,480,573 UART: [idev] UDS.KEYID = 0
1,480,918 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,457 UART: [idev] Erasing UDS.KEYID = 0
1,505,179 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,661 UART: [idev] --
1,514,802 UART: [ldev] ++
1,514,970 UART: [ldev] CDI.KEYID = 6
1,515,333 UART: [ldev] SUBJECT.KEYID = 5
1,515,759 UART: [ldev] AUTHORITY.KEYID = 7
1,516,222 UART: [ldev] FE.KEYID = 1
1,521,570 UART: [ldev] Erasing FE.KEYID = 1
1,547,009 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,983 UART: [ldev] --
1,586,370 UART: [fwproc] Waiting for Commands...
1,587,229 UART: [fwproc] Received command 0x46574c44
1,588,020 UART: [fwproc] Received Image of size 114332 bytes
2,884,931 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,753 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,105 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,854 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,124 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,464,725 >>> mbox cmd response: failed
1,464,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,464,731 >>> mbox cmd response: failed
1,464,731 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,464,737 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,142 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,506 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
893,448 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,573 UART: [kat] ++
897,725 UART: [kat] sha1
902,031 UART: [kat] SHA2-256
903,971 UART: [kat] SHA2-384
906,798 UART: [kat] SHA2-512-ACC
908,699 UART: [kat] ECC-384
918,288 UART: [kat] HMAC-384Kdf
922,786 UART: [kat] LMS
1,171,114 UART: [kat] --
1,171,855 UART: [cold-reset] ++
1,172,319 UART: [fht] FHT @ 0x50003400
1,174,860 UART: [idev] ++
1,175,028 UART: [idev] CDI.KEYID = 6
1,175,388 UART: [idev] SUBJECT.KEYID = 7
1,175,812 UART: [idev] UDS.KEYID = 0
1,176,157 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,960 UART: [idev] Erasing UDS.KEYID = 0
1,201,143 UART: [idev] Sha1 KeyId Algorithm
1,209,671 UART: [idev] --
1,210,883 UART: [ldev] ++
1,211,051 UART: [ldev] CDI.KEYID = 6
1,211,414 UART: [ldev] SUBJECT.KEYID = 5
1,211,840 UART: [ldev] AUTHORITY.KEYID = 7
1,212,303 UART: [ldev] FE.KEYID = 1
1,217,671 UART: [ldev] Erasing FE.KEYID = 1
1,243,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,445 UART: [ldev] --
1,282,862 UART: [fwproc] Wait for Commands...
1,283,522 UART: [fwproc] Recv command 0x46574c44
1,284,250 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,109 UART: ROM Fatal Error: 0x000B0007
1,309,266 >>> mbox cmd response: failed
1,309,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,272 >>> mbox cmd response: failed
1,309,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,278 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,558 UART: [state] LifecycleState = Unprovisioned
86,213 UART: [state] DebugLocked = No
86,847 UART: [state] WD Timer not started. Device not locked for debugging
88,116 UART: [kat] SHA2-256
893,766 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,891 UART: [kat] ++
898,043 UART: [kat] sha1
902,405 UART: [kat] SHA2-256
904,345 UART: [kat] SHA2-384
906,918 UART: [kat] SHA2-512-ACC
908,819 UART: [kat] ECC-384
918,658 UART: [kat] HMAC-384Kdf
923,372 UART: [kat] LMS
1,171,700 UART: [kat] --
1,172,435 UART: [cold-reset] ++
1,172,955 UART: [fht] FHT @ 0x50003400
1,175,538 UART: [idev] ++
1,175,706 UART: [idev] CDI.KEYID = 6
1,176,066 UART: [idev] SUBJECT.KEYID = 7
1,176,490 UART: [idev] UDS.KEYID = 0
1,176,835 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,850 UART: [idev] Erasing UDS.KEYID = 0
1,201,687 UART: [idev] Sha1 KeyId Algorithm
1,210,277 UART: [idev] --
1,211,489 UART: [ldev] ++
1,211,657 UART: [ldev] CDI.KEYID = 6
1,212,020 UART: [ldev] SUBJECT.KEYID = 5
1,212,446 UART: [ldev] AUTHORITY.KEYID = 7
1,212,909 UART: [ldev] FE.KEYID = 1
1,217,873 UART: [ldev] Erasing FE.KEYID = 1
1,243,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,737 UART: [ldev] --
1,283,096 UART: [fwproc] Wait for Commands...
1,283,704 UART: [fwproc] Recv command 0x46574c44
1,284,432 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,452 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,199 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,503 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,362 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,443 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,164,569 >>> mbox cmd response: failed
1,164,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,575 >>> mbox cmd response: failed
1,164,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,581 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,249 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,222 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,736 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
893,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,714 UART: [kat] ++
897,866 UART: [kat] sha1
902,112 UART: [kat] SHA2-256
904,052 UART: [kat] SHA2-384
906,771 UART: [kat] SHA2-512-ACC
908,672 UART: [kat] ECC-384
918,301 UART: [kat] HMAC-384Kdf
922,995 UART: [kat] LMS
1,171,323 UART: [kat] --
1,172,138 UART: [cold-reset] ++
1,172,508 UART: [fht] FHT @ 0x50003400
1,175,131 UART: [idev] ++
1,175,299 UART: [idev] CDI.KEYID = 6
1,175,659 UART: [idev] SUBJECT.KEYID = 7
1,176,083 UART: [idev] UDS.KEYID = 0
1,176,428 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,947 UART: [idev] Erasing UDS.KEYID = 0
1,200,904 UART: [idev] Sha1 KeyId Algorithm
1,209,460 UART: [idev] --
1,210,384 UART: [ldev] ++
1,210,552 UART: [ldev] CDI.KEYID = 6
1,210,915 UART: [ldev] SUBJECT.KEYID = 5
1,211,341 UART: [ldev] AUTHORITY.KEYID = 7
1,211,804 UART: [ldev] FE.KEYID = 1
1,217,222 UART: [ldev] Erasing FE.KEYID = 1
1,243,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,684 UART: [ldev] --
1,283,061 UART: [fwproc] Wait for Commands...
1,283,809 UART: [fwproc] Recv command 0x46574c44
1,284,537 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,990 UART: ROM Fatal Error: 0x000B0007
1,309,147 >>> mbox cmd response: failed
1,309,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,153 >>> mbox cmd response: failed
1,309,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,159 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,276 UART: [state] WD Timer not started. Device not locked for debugging
87,559 UART: [kat] SHA2-256
893,209 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,334 UART: [kat] ++
897,486 UART: [kat] sha1
901,770 UART: [kat] SHA2-256
903,710 UART: [kat] SHA2-384
906,543 UART: [kat] SHA2-512-ACC
908,444 UART: [kat] ECC-384
918,299 UART: [kat] HMAC-384Kdf
922,777 UART: [kat] LMS
1,171,105 UART: [kat] --
1,172,112 UART: [cold-reset] ++
1,172,608 UART: [fht] FHT @ 0x50003400
1,175,347 UART: [idev] ++
1,175,515 UART: [idev] CDI.KEYID = 6
1,175,875 UART: [idev] SUBJECT.KEYID = 7
1,176,299 UART: [idev] UDS.KEYID = 0
1,176,644 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,613 UART: [idev] Erasing UDS.KEYID = 0
1,201,306 UART: [idev] Sha1 KeyId Algorithm
1,209,572 UART: [idev] --
1,210,564 UART: [ldev] ++
1,210,732 UART: [ldev] CDI.KEYID = 6
1,211,095 UART: [ldev] SUBJECT.KEYID = 5
1,211,521 UART: [ldev] AUTHORITY.KEYID = 7
1,211,984 UART: [ldev] FE.KEYID = 1
1,217,358 UART: [ldev] Erasing FE.KEYID = 1
1,243,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,646 UART: [ldev] --
1,283,029 UART: [fwproc] Wait for Commands...
1,283,755 UART: [fwproc] Recv command 0x46574c44
1,284,483 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,162 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,466 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,171 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,548 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,164,928 >>> mbox cmd response: failed
1,164,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,934 >>> mbox cmd response: failed
1,164,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,898 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,516 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,752 UART: [state] LifecycleState = Unprovisioned
86,407 UART: [state] DebugLocked = No
87,103 UART: [state] WD Timer not started. Device not locked for debugging
88,416 UART: [kat] SHA2-256
891,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,095 UART: [kat] ++
896,247 UART: [kat] sha1
900,537 UART: [kat] SHA2-256
902,477 UART: [kat] SHA2-384
905,238 UART: [kat] SHA2-512-ACC
907,139 UART: [kat] ECC-384
917,096 UART: [kat] HMAC-384Kdf
921,728 UART: [kat] LMS
1,170,040 UART: [kat] --
1,170,839 UART: [cold-reset] ++
1,171,207 UART: [fht] FHT @ 0x50003400
1,173,645 UART: [idev] ++
1,173,813 UART: [idev] CDI.KEYID = 6
1,174,174 UART: [idev] SUBJECT.KEYID = 7
1,174,599 UART: [idev] UDS.KEYID = 0
1,174,945 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,747 UART: [idev] Erasing UDS.KEYID = 0
1,200,197 UART: [idev] Sha1 KeyId Algorithm
1,209,115 UART: [idev] --
1,209,978 UART: [ldev] ++
1,210,146 UART: [ldev] CDI.KEYID = 6
1,210,510 UART: [ldev] SUBJECT.KEYID = 5
1,210,937 UART: [ldev] AUTHORITY.KEYID = 7
1,211,400 UART: [ldev] FE.KEYID = 1
1,216,296 UART: [ldev] Erasing FE.KEYID = 1
1,242,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,748 UART: [ldev] --
1,282,254 UART: [fwproc] Wait for Commands...
1,283,043 UART: [fwproc] Recv command 0x46574c44
1,283,776 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,037 UART: ROM Fatal Error: 0x000B0007
1,308,194 >>> mbox cmd response: failed
1,308,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,200 >>> mbox cmd response: failed
1,308,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,206 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
891,292 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,421 UART: [kat] ++
895,573 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,484 UART: [kat] SHA2-512-ACC
906,385 UART: [kat] ECC-384
916,060 UART: [kat] HMAC-384Kdf
920,690 UART: [kat] LMS
1,169,002 UART: [kat] --
1,169,963 UART: [cold-reset] ++
1,170,359 UART: [fht] FHT @ 0x50003400
1,173,049 UART: [idev] ++
1,173,217 UART: [idev] CDI.KEYID = 6
1,173,578 UART: [idev] SUBJECT.KEYID = 7
1,174,003 UART: [idev] UDS.KEYID = 0
1,174,349 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,033 UART: [idev] Erasing UDS.KEYID = 0
1,198,673 UART: [idev] Sha1 KeyId Algorithm
1,207,549 UART: [idev] --
1,208,468 UART: [ldev] ++
1,208,636 UART: [ldev] CDI.KEYID = 6
1,209,000 UART: [ldev] SUBJECT.KEYID = 5
1,209,427 UART: [ldev] AUTHORITY.KEYID = 7
1,209,890 UART: [ldev] FE.KEYID = 1
1,215,126 UART: [ldev] Erasing FE.KEYID = 1
1,241,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,072 UART: [ldev] --
1,280,340 UART: [fwproc] Wait for Commands...
1,281,129 UART: [fwproc] Recv command 0x46574c44
1,281,862 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,025 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,334 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,222 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,224 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,161 >>> mbox cmd response: failed
1,159,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,167 >>> mbox cmd response: failed
1,159,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,173 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,172 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,774 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
891,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,488 UART: [kat] ++
895,640 UART: [kat] sha1
900,038 UART: [kat] SHA2-256
901,978 UART: [kat] SHA2-384
904,703 UART: [kat] SHA2-512-ACC
906,604 UART: [kat] ECC-384
916,373 UART: [kat] HMAC-384Kdf
921,027 UART: [kat] LMS
1,169,339 UART: [kat] --
1,170,534 UART: [cold-reset] ++
1,170,942 UART: [fht] FHT @ 0x50003400
1,173,612 UART: [idev] ++
1,173,780 UART: [idev] CDI.KEYID = 6
1,174,141 UART: [idev] SUBJECT.KEYID = 7
1,174,566 UART: [idev] UDS.KEYID = 0
1,174,912 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,782 UART: [idev] Erasing UDS.KEYID = 0
1,200,164 UART: [idev] Sha1 KeyId Algorithm
1,209,152 UART: [idev] --
1,210,061 UART: [ldev] ++
1,210,229 UART: [ldev] CDI.KEYID = 6
1,210,593 UART: [ldev] SUBJECT.KEYID = 5
1,211,020 UART: [ldev] AUTHORITY.KEYID = 7
1,211,483 UART: [ldev] FE.KEYID = 1
1,216,539 UART: [ldev] Erasing FE.KEYID = 1
1,243,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,895 UART: [ldev] --
1,282,317 UART: [fwproc] Wait for Commands...
1,282,898 UART: [fwproc] Recv command 0x46574c44
1,283,631 UART: [fwproc] Recv'd Img size: 114332 bytes
1,306,758 UART: ROM Fatal Error: 0x000B0007
1,307,915 >>> mbox cmd response: failed
1,307,915 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,921 >>> mbox cmd response: failed
1,307,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,927 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
899,972 UART: [kat] SHA2-256
901,912 UART: [kat] SHA2-384
904,583 UART: [kat] SHA2-512-ACC
906,484 UART: [kat] ECC-384
915,823 UART: [kat] HMAC-384Kdf
920,469 UART: [kat] LMS
1,168,781 UART: [kat] --
1,169,886 UART: [cold-reset] ++
1,170,240 UART: [fht] FHT @ 0x50003400
1,172,790 UART: [idev] ++
1,172,958 UART: [idev] CDI.KEYID = 6
1,173,319 UART: [idev] SUBJECT.KEYID = 7
1,173,744 UART: [idev] UDS.KEYID = 0
1,174,090 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,012 UART: [idev] Erasing UDS.KEYID = 0
1,199,388 UART: [idev] Sha1 KeyId Algorithm
1,208,464 UART: [idev] --
1,209,505 UART: [ldev] ++
1,209,673 UART: [ldev] CDI.KEYID = 6
1,210,037 UART: [ldev] SUBJECT.KEYID = 5
1,210,464 UART: [ldev] AUTHORITY.KEYID = 7
1,210,927 UART: [ldev] FE.KEYID = 1
1,216,207 UART: [ldev] Erasing FE.KEYID = 1
1,242,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,981 UART: [ldev] --
1,281,451 UART: [fwproc] Wait for Commands...
1,282,070 UART: [fwproc] Recv command 0x46574c44
1,282,803 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,898 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,207 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,053 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,723 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,482 >>> mbox cmd response: failed
1,160,482 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,488 >>> mbox cmd response: failed
1,160,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,494 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,045 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,455 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,063 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,426,897 >>> mbox cmd response: failed
1,426,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,903 >>> mbox cmd response: failed
1,426,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,909 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,601 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,099 UART: [kat] SHA2-256
882,030 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,145 UART: [kat] ++
886,297 UART: [kat] sha1
890,631 UART: [kat] SHA2-256
892,569 UART: [kat] SHA2-384
895,392 UART: [kat] SHA2-512-ACC
897,293 UART: [kat] ECC-384
902,784 UART: [kat] HMAC-384Kdf
907,450 UART: [kat] LMS
1,475,646 UART: [kat] --
1,476,613 UART: [cold-reset] ++
1,477,161 UART: [fht] Storing FHT @ 0x50003400
1,479,854 UART: [idev] ++
1,480,022 UART: [idev] CDI.KEYID = 6
1,480,382 UART: [idev] SUBJECT.KEYID = 7
1,480,806 UART: [idev] UDS.KEYID = 0
1,481,151 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,484 UART: [idev] Erasing UDS.KEYID = 0
1,504,948 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,498 UART: [idev] --
1,514,513 UART: [ldev] ++
1,514,681 UART: [ldev] CDI.KEYID = 6
1,515,044 UART: [ldev] SUBJECT.KEYID = 5
1,515,470 UART: [ldev] AUTHORITY.KEYID = 7
1,515,933 UART: [ldev] FE.KEYID = 1
1,521,013 UART: [ldev] Erasing FE.KEYID = 1
1,545,844 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,912 UART: [ldev] --
1,585,371 UART: [fwproc] Waiting for Commands...
1,586,056 UART: [fwproc] Received command 0x46574c44
1,586,847 UART: [fwproc] Received Image of size 114332 bytes
2,884,980 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,594 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,946 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,919 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,687 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,427,923 >>> mbox cmd response: failed
1,427,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,929 >>> mbox cmd response: failed
1,427,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,935 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,103 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,129 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,836 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,428,412 >>> mbox cmd response: failed
1,428,412 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,418 >>> mbox cmd response: failed
1,428,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,424 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,516 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,114 UART: [kat] SHA2-256
882,045 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,160 UART: [kat] ++
886,312 UART: [kat] sha1
890,536 UART: [kat] SHA2-256
892,474 UART: [kat] SHA2-384
895,303 UART: [kat] SHA2-512-ACC
897,204 UART: [kat] ECC-384
903,035 UART: [kat] HMAC-384Kdf
907,695 UART: [kat] LMS
1,475,891 UART: [kat] --
1,477,062 UART: [cold-reset] ++
1,477,560 UART: [fht] Storing FHT @ 0x50003400
1,480,247 UART: [idev] ++
1,480,415 UART: [idev] CDI.KEYID = 6
1,480,775 UART: [idev] SUBJECT.KEYID = 7
1,481,199 UART: [idev] UDS.KEYID = 0
1,481,544 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,003 UART: [idev] Erasing UDS.KEYID = 0
1,505,883 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,395 UART: [idev] --
1,515,378 UART: [ldev] ++
1,515,546 UART: [ldev] CDI.KEYID = 6
1,515,909 UART: [ldev] SUBJECT.KEYID = 5
1,516,335 UART: [ldev] AUTHORITY.KEYID = 7
1,516,798 UART: [ldev] FE.KEYID = 1
1,522,130 UART: [ldev] Erasing FE.KEYID = 1
1,547,365 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,515 UART: [ldev] --
1,586,926 UART: [fwproc] Waiting for Commands...
1,587,785 UART: [fwproc] Received command 0x46574c44
1,588,576 UART: [fwproc] Received Image of size 114332 bytes
2,886,611 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,753 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,105 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,896 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,536 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,428,660 >>> mbox cmd response: failed
1,428,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,666 >>> mbox cmd response: failed
1,428,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,672 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,506 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,912 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,859 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,428,645 >>> mbox cmd response: failed
1,428,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,651 >>> mbox cmd response: failed
1,428,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,657 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,638 UART: [state] LifecycleState = Unprovisioned
86,293 UART: [state] DebugLocked = No
86,869 UART: [state] WD Timer not started. Device not locked for debugging
88,178 UART: [kat] SHA2-256
893,828 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,953 UART: [kat] ++
898,105 UART: [kat] sha1
902,227 UART: [kat] SHA2-256
904,167 UART: [kat] SHA2-384
906,968 UART: [kat] SHA2-512-ACC
908,869 UART: [kat] ECC-384
918,260 UART: [kat] HMAC-384Kdf
922,842 UART: [kat] LMS
1,171,170 UART: [kat] --
1,171,879 UART: [cold-reset] ++
1,172,329 UART: [fht] FHT @ 0x50003400
1,175,042 UART: [idev] ++
1,175,210 UART: [idev] CDI.KEYID = 6
1,175,570 UART: [idev] SUBJECT.KEYID = 7
1,175,994 UART: [idev] UDS.KEYID = 0
1,176,339 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,892 UART: [idev] Erasing UDS.KEYID = 0
1,200,835 UART: [idev] Sha1 KeyId Algorithm
1,209,525 UART: [idev] --
1,210,705 UART: [ldev] ++
1,210,873 UART: [ldev] CDI.KEYID = 6
1,211,236 UART: [ldev] SUBJECT.KEYID = 5
1,211,662 UART: [ldev] AUTHORITY.KEYID = 7
1,212,125 UART: [ldev] FE.KEYID = 1
1,217,293 UART: [ldev] Erasing FE.KEYID = 1
1,244,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,625 UART: [ldev] --
1,284,012 UART: [fwproc] Wait for Commands...
1,284,726 UART: [fwproc] Recv command 0x46574c44
1,285,454 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,381 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,685 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,424 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,933 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,427,985 >>> mbox cmd response: failed
1,427,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,991 >>> mbox cmd response: failed
1,427,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,997 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,701 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,359 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,676 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,429,372 >>> mbox cmd response: failed
1,429,372 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,378 >>> mbox cmd response: failed
1,429,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,384 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
893,561 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,686 UART: [kat] ++
897,838 UART: [kat] sha1
902,186 UART: [kat] SHA2-256
904,126 UART: [kat] SHA2-384
906,983 UART: [kat] SHA2-512-ACC
908,884 UART: [kat] ECC-384
918,733 UART: [kat] HMAC-384Kdf
923,397 UART: [kat] LMS
1,171,725 UART: [kat] --
1,172,542 UART: [cold-reset] ++
1,173,052 UART: [fht] FHT @ 0x50003400
1,175,819 UART: [idev] ++
1,175,987 UART: [idev] CDI.KEYID = 6
1,176,347 UART: [idev] SUBJECT.KEYID = 7
1,176,771 UART: [idev] UDS.KEYID = 0
1,177,116 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,677 UART: [idev] Erasing UDS.KEYID = 0
1,202,200 UART: [idev] Sha1 KeyId Algorithm
1,210,674 UART: [idev] --
1,211,700 UART: [ldev] ++
1,211,868 UART: [ldev] CDI.KEYID = 6
1,212,231 UART: [ldev] SUBJECT.KEYID = 5
1,212,657 UART: [ldev] AUTHORITY.KEYID = 7
1,213,120 UART: [ldev] FE.KEYID = 1
1,218,464 UART: [ldev] Erasing FE.KEYID = 1
1,244,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,152 UART: [ldev] --
1,284,497 UART: [fwproc] Wait for Commands...
1,285,289 UART: [fwproc] Recv command 0x46574c44
1,286,017 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,870 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,174 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,949 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,564 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,428,542 >>> mbox cmd response: failed
1,428,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,548 >>> mbox cmd response: failed
1,428,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,554 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,576 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,956 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,383 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,427,613 >>> mbox cmd response: failed
1,427,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,619 >>> mbox cmd response: failed
1,427,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,625 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
891,246 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,375 UART: [kat] ++
895,527 UART: [kat] sha1
899,993 UART: [kat] SHA2-256
901,933 UART: [kat] SHA2-384
904,822 UART: [kat] SHA2-512-ACC
906,723 UART: [kat] ECC-384
916,506 UART: [kat] HMAC-384Kdf
921,116 UART: [kat] LMS
1,169,428 UART: [kat] --
1,170,451 UART: [cold-reset] ++
1,170,935 UART: [fht] FHT @ 0x50003400
1,173,379 UART: [idev] ++
1,173,547 UART: [idev] CDI.KEYID = 6
1,173,908 UART: [idev] SUBJECT.KEYID = 7
1,174,333 UART: [idev] UDS.KEYID = 0
1,174,679 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,273 UART: [idev] Erasing UDS.KEYID = 0
1,199,603 UART: [idev] Sha1 KeyId Algorithm
1,208,639 UART: [idev] --
1,209,554 UART: [ldev] ++
1,209,722 UART: [ldev] CDI.KEYID = 6
1,210,086 UART: [ldev] SUBJECT.KEYID = 5
1,210,513 UART: [ldev] AUTHORITY.KEYID = 7
1,210,976 UART: [ldev] FE.KEYID = 1
1,216,040 UART: [ldev] Erasing FE.KEYID = 1
1,242,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,182 UART: [ldev] --
1,281,602 UART: [fwproc] Wait for Commands...
1,282,233 UART: [fwproc] Recv command 0x46574c44
1,282,966 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,913 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,222 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,126 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,507 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,428,411 >>> mbox cmd response: failed
1,428,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,417 >>> mbox cmd response: failed
1,428,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,423 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,372 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,992 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,718 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,430,744 >>> mbox cmd response: failed
1,430,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,430,750 >>> mbox cmd response: failed
1,430,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,430,756 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,943 UART: [state] LifecycleState = Unprovisioned
86,598 UART: [state] DebugLocked = No
87,268 UART: [state] WD Timer not started. Device not locked for debugging
88,457 UART: [kat] SHA2-256
892,007 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,136 UART: [kat] ++
896,288 UART: [kat] sha1
900,376 UART: [kat] SHA2-256
902,316 UART: [kat] SHA2-384
904,971 UART: [kat] SHA2-512-ACC
906,872 UART: [kat] ECC-384
916,733 UART: [kat] HMAC-384Kdf
921,269 UART: [kat] LMS
1,169,581 UART: [kat] --
1,170,326 UART: [cold-reset] ++
1,170,864 UART: [fht] FHT @ 0x50003400
1,173,496 UART: [idev] ++
1,173,664 UART: [idev] CDI.KEYID = 6
1,174,025 UART: [idev] SUBJECT.KEYID = 7
1,174,450 UART: [idev] UDS.KEYID = 0
1,174,796 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,856 UART: [idev] Erasing UDS.KEYID = 0
1,199,756 UART: [idev] Sha1 KeyId Algorithm
1,208,494 UART: [idev] --
1,209,547 UART: [ldev] ++
1,209,715 UART: [ldev] CDI.KEYID = 6
1,210,079 UART: [ldev] SUBJECT.KEYID = 5
1,210,506 UART: [ldev] AUTHORITY.KEYID = 7
1,210,969 UART: [ldev] FE.KEYID = 1
1,216,289 UART: [ldev] Erasing FE.KEYID = 1
1,242,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,453 UART: [ldev] --
1,281,933 UART: [fwproc] Wait for Commands...
1,282,664 UART: [fwproc] Recv command 0x46574c44
1,283,397 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,544 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,853 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,719 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,912 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,429,402 >>> mbox cmd response: failed
1,429,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,408 >>> mbox cmd response: failed
1,429,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,414 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,035 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,537 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,525 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,183 UART: [kat] SHA2-256
882,114 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,229 UART: [kat] ++
886,381 UART: [kat] sha1
890,653 UART: [kat] SHA2-256
892,591 UART: [kat] SHA2-384
895,184 UART: [kat] SHA2-512-ACC
897,085 UART: [kat] ECC-384
902,864 UART: [kat] HMAC-384Kdf
907,584 UART: [kat] LMS
1,475,780 UART: [kat] --
1,476,511 UART: [cold-reset] ++
1,476,837 UART: [fht] Storing FHT @ 0x50003400
1,479,630 UART: [idev] ++
1,479,798 UART: [idev] CDI.KEYID = 6
1,480,158 UART: [idev] SUBJECT.KEYID = 7
1,480,582 UART: [idev] UDS.KEYID = 0
1,480,927 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,330 UART: [idev] Erasing UDS.KEYID = 0
1,504,944 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,498 UART: [idev] --
1,514,457 UART: [ldev] ++
1,514,625 UART: [ldev] CDI.KEYID = 6
1,514,988 UART: [ldev] SUBJECT.KEYID = 5
1,515,414 UART: [ldev] AUTHORITY.KEYID = 7
1,515,877 UART: [ldev] FE.KEYID = 1
1,520,969 UART: [ldev] Erasing FE.KEYID = 1
1,545,740 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,666 UART: [ldev] --
1,584,941 UART: [fwproc] Waiting for Commands...
1,585,566 UART: [fwproc] Received command 0x46574c44
1,586,357 UART: [fwproc] Received Image of size 114332 bytes
2,883,261 UART: ROM Fatal Error: 0x000B0016
2,884,418 >>> mbox cmd response: failed
2,884,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,424 >>> mbox cmd response: failed
2,884,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,430 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,543 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,147 UART: [kat] SHA2-256
882,078 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,193 UART: [kat] ++
886,345 UART: [kat] sha1
890,595 UART: [kat] SHA2-256
892,533 UART: [kat] SHA2-384
895,410 UART: [kat] SHA2-512-ACC
897,311 UART: [kat] ECC-384
902,970 UART: [kat] HMAC-384Kdf
907,374 UART: [kat] LMS
1,475,570 UART: [kat] --
1,476,489 UART: [cold-reset] ++
1,476,859 UART: [fht] Storing FHT @ 0x50003400
1,479,656 UART: [idev] ++
1,479,824 UART: [idev] CDI.KEYID = 6
1,480,184 UART: [idev] SUBJECT.KEYID = 7
1,480,608 UART: [idev] UDS.KEYID = 0
1,480,953 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,344 UART: [idev] Erasing UDS.KEYID = 0
1,505,162 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,668 UART: [idev] --
1,514,577 UART: [ldev] ++
1,514,745 UART: [ldev] CDI.KEYID = 6
1,515,108 UART: [ldev] SUBJECT.KEYID = 5
1,515,534 UART: [ldev] AUTHORITY.KEYID = 7
1,515,997 UART: [ldev] FE.KEYID = 1
1,521,075 UART: [ldev] Erasing FE.KEYID = 1
1,545,390 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,690 UART: [ldev] --
1,585,147 UART: [fwproc] Waiting for Commands...
1,585,914 UART: [fwproc] Received command 0x46574c44
1,586,705 UART: [fwproc] Received Image of size 114332 bytes
2,883,656 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,206 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,558 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,501 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,899 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,737,655 >>> mbox cmd response: failed
2,737,655 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,661 >>> mbox cmd response: failed
2,737,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,667 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,307 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,195 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,794 UART: [state] DebugLocked = No
86,316 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,990 UART: [kat] SHA2-256
881,921 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,036 UART: [kat] ++
886,188 UART: [kat] sha1
890,536 UART: [kat] SHA2-256
892,474 UART: [kat] SHA2-384
895,091 UART: [kat] SHA2-512-ACC
896,992 UART: [kat] ECC-384
902,745 UART: [kat] HMAC-384Kdf
907,431 UART: [kat] LMS
1,475,627 UART: [kat] --
1,476,496 UART: [cold-reset] ++
1,476,922 UART: [fht] Storing FHT @ 0x50003400
1,479,753 UART: [idev] ++
1,479,921 UART: [idev] CDI.KEYID = 6
1,480,281 UART: [idev] SUBJECT.KEYID = 7
1,480,705 UART: [idev] UDS.KEYID = 0
1,481,050 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,683 UART: [idev] Erasing UDS.KEYID = 0
1,505,681 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,311 UART: [idev] --
1,515,314 UART: [ldev] ++
1,515,482 UART: [ldev] CDI.KEYID = 6
1,515,845 UART: [ldev] SUBJECT.KEYID = 5
1,516,271 UART: [ldev] AUTHORITY.KEYID = 7
1,516,734 UART: [ldev] FE.KEYID = 1
1,521,950 UART: [ldev] Erasing FE.KEYID = 1
1,547,735 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,755 UART: [ldev] --
1,587,082 UART: [fwproc] Waiting for Commands...
1,587,929 UART: [fwproc] Received command 0x46574c44
1,588,720 UART: [fwproc] Received Image of size 114332 bytes
2,885,160 UART: ROM Fatal Error: 0x000B0016
2,886,317 >>> mbox cmd response: failed
2,886,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,323 >>> mbox cmd response: failed
2,886,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,329 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
86,934 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,440 UART: [kat] SHA2-256
882,371 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,486 UART: [kat] ++
886,638 UART: [kat] sha1
890,764 UART: [kat] SHA2-256
892,702 UART: [kat] SHA2-384
895,333 UART: [kat] SHA2-512-ACC
897,234 UART: [kat] ECC-384
903,041 UART: [kat] HMAC-384Kdf
907,803 UART: [kat] LMS
1,475,999 UART: [kat] --
1,477,040 UART: [cold-reset] ++
1,477,394 UART: [fht] Storing FHT @ 0x50003400
1,480,377 UART: [idev] ++
1,480,545 UART: [idev] CDI.KEYID = 6
1,480,905 UART: [idev] SUBJECT.KEYID = 7
1,481,329 UART: [idev] UDS.KEYID = 0
1,481,674 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,527 UART: [idev] Erasing UDS.KEYID = 0
1,506,211 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,863 UART: [idev] --
1,515,788 UART: [ldev] ++
1,515,956 UART: [ldev] CDI.KEYID = 6
1,516,319 UART: [ldev] SUBJECT.KEYID = 5
1,516,745 UART: [ldev] AUTHORITY.KEYID = 7
1,517,208 UART: [ldev] FE.KEYID = 1
1,522,346 UART: [ldev] Erasing FE.KEYID = 1
1,547,963 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,299 UART: [ldev] --
1,587,690 UART: [fwproc] Waiting for Commands...
1,588,479 UART: [fwproc] Received command 0x46574c44
1,589,270 UART: [fwproc] Received Image of size 114332 bytes
2,884,481 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,477 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,829 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,686 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,056 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,737,682 >>> mbox cmd response: failed
2,737,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,688 >>> mbox cmd response: failed
2,737,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,694 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,672 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,510 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
893,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,309 UART: [kat] ++
897,461 UART: [kat] sha1
901,781 UART: [kat] SHA2-256
903,721 UART: [kat] SHA2-384
906,484 UART: [kat] SHA2-512-ACC
908,385 UART: [kat] ECC-384
918,166 UART: [kat] HMAC-384Kdf
922,706 UART: [kat] LMS
1,171,034 UART: [kat] --
1,171,899 UART: [cold-reset] ++
1,172,331 UART: [fht] FHT @ 0x50003400
1,175,192 UART: [idev] ++
1,175,360 UART: [idev] CDI.KEYID = 6
1,175,720 UART: [idev] SUBJECT.KEYID = 7
1,176,144 UART: [idev] UDS.KEYID = 0
1,176,489 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,858 UART: [idev] Erasing UDS.KEYID = 0
1,201,281 UART: [idev] Sha1 KeyId Algorithm
1,209,791 UART: [idev] --
1,210,877 UART: [ldev] ++
1,211,045 UART: [ldev] CDI.KEYID = 6
1,211,408 UART: [ldev] SUBJECT.KEYID = 5
1,211,834 UART: [ldev] AUTHORITY.KEYID = 7
1,212,297 UART: [ldev] FE.KEYID = 1
1,217,627 UART: [ldev] Erasing FE.KEYID = 1
1,243,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,767 UART: [ldev] --
1,283,040 UART: [fwproc] Wait for Commands...
1,283,624 UART: [fwproc] Recv command 0x46574c44
1,284,352 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,216 UART: ROM Fatal Error: 0x000B0016
2,582,373 >>> mbox cmd response: failed
2,582,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,379 >>> mbox cmd response: failed
2,582,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,508 UART: [state] LifecycleState = Unprovisioned
86,163 UART: [state] DebugLocked = No
86,721 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
893,558 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,683 UART: [kat] ++
897,835 UART: [kat] sha1
902,025 UART: [kat] SHA2-256
903,965 UART: [kat] SHA2-384
906,724 UART: [kat] SHA2-512-ACC
908,625 UART: [kat] ECC-384
918,250 UART: [kat] HMAC-384Kdf
922,772 UART: [kat] LMS
1,171,100 UART: [kat] --
1,171,923 UART: [cold-reset] ++
1,172,273 UART: [fht] FHT @ 0x50003400
1,174,840 UART: [idev] ++
1,175,008 UART: [idev] CDI.KEYID = 6
1,175,368 UART: [idev] SUBJECT.KEYID = 7
1,175,792 UART: [idev] UDS.KEYID = 0
1,176,137 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,932 UART: [idev] Erasing UDS.KEYID = 0
1,200,483 UART: [idev] Sha1 KeyId Algorithm
1,208,807 UART: [idev] --
1,209,759 UART: [ldev] ++
1,209,927 UART: [ldev] CDI.KEYID = 6
1,210,290 UART: [ldev] SUBJECT.KEYID = 5
1,210,716 UART: [ldev] AUTHORITY.KEYID = 7
1,211,179 UART: [ldev] FE.KEYID = 1
1,216,357 UART: [ldev] Erasing FE.KEYID = 1
1,242,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,507 UART: [ldev] --
1,282,010 UART: [fwproc] Wait for Commands...
1,282,780 UART: [fwproc] Recv command 0x46574c44
1,283,508 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,129 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,433 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,368 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,877 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,436,030 >>> mbox cmd response: failed
2,436,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,036 >>> mbox cmd response: failed
2,436,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,042 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,047 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,367 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Unprovisioned
86,376 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,015 UART: [kat] SHA2-256
893,665 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,790 UART: [kat] ++
897,942 UART: [kat] sha1
902,026 UART: [kat] SHA2-256
903,966 UART: [kat] SHA2-384
906,801 UART: [kat] SHA2-512-ACC
908,702 UART: [kat] ECC-384
918,245 UART: [kat] HMAC-384Kdf
922,923 UART: [kat] LMS
1,171,251 UART: [kat] --
1,172,158 UART: [cold-reset] ++
1,172,650 UART: [fht] FHT @ 0x50003400
1,175,463 UART: [idev] ++
1,175,631 UART: [idev] CDI.KEYID = 6
1,175,991 UART: [idev] SUBJECT.KEYID = 7
1,176,415 UART: [idev] UDS.KEYID = 0
1,176,760 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,417 UART: [idev] Erasing UDS.KEYID = 0
1,201,536 UART: [idev] Sha1 KeyId Algorithm
1,210,090 UART: [idev] --
1,211,048 UART: [ldev] ++
1,211,216 UART: [ldev] CDI.KEYID = 6
1,211,579 UART: [ldev] SUBJECT.KEYID = 5
1,212,005 UART: [ldev] AUTHORITY.KEYID = 7
1,212,468 UART: [ldev] FE.KEYID = 1
1,217,838 UART: [ldev] Erasing FE.KEYID = 1
1,243,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,392 UART: [ldev] --
1,282,659 UART: [fwproc] Wait for Commands...
1,283,311 UART: [fwproc] Recv command 0x46574c44
1,284,039 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,955 UART: ROM Fatal Error: 0x000B0016
2,581,112 >>> mbox cmd response: failed
2,581,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,118 >>> mbox cmd response: failed
2,581,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,124 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
893,525 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,650 UART: [kat] ++
897,802 UART: [kat] sha1
902,064 UART: [kat] SHA2-256
904,004 UART: [kat] SHA2-384
906,805 UART: [kat] SHA2-512-ACC
908,706 UART: [kat] ECC-384
918,171 UART: [kat] HMAC-384Kdf
922,855 UART: [kat] LMS
1,171,183 UART: [kat] --
1,172,246 UART: [cold-reset] ++
1,172,740 UART: [fht] FHT @ 0x50003400
1,175,201 UART: [idev] ++
1,175,369 UART: [idev] CDI.KEYID = 6
1,175,729 UART: [idev] SUBJECT.KEYID = 7
1,176,153 UART: [idev] UDS.KEYID = 0
1,176,498 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,147 UART: [idev] Erasing UDS.KEYID = 0
1,201,366 UART: [idev] Sha1 KeyId Algorithm
1,209,684 UART: [idev] --
1,210,868 UART: [ldev] ++
1,211,036 UART: [ldev] CDI.KEYID = 6
1,211,399 UART: [ldev] SUBJECT.KEYID = 5
1,211,825 UART: [ldev] AUTHORITY.KEYID = 7
1,212,288 UART: [ldev] FE.KEYID = 1
1,217,392 UART: [ldev] Erasing FE.KEYID = 1
1,243,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,602 UART: [ldev] --
1,282,889 UART: [fwproc] Wait for Commands...
1,283,475 UART: [fwproc] Recv command 0x46574c44
1,284,203 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,283 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,148 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,452 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,249 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,126 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,437,695 >>> mbox cmd response: failed
2,437,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,701 >>> mbox cmd response: failed
2,437,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,707 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,688 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,272 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,484 UART: [kat] SHA2-256
891,034 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,163 UART: [kat] ++
895,315 UART: [kat] sha1
899,425 UART: [kat] SHA2-256
901,365 UART: [kat] SHA2-384
904,244 UART: [kat] SHA2-512-ACC
906,145 UART: [kat] ECC-384
916,188 UART: [kat] HMAC-384Kdf
920,674 UART: [kat] LMS
1,168,986 UART: [kat] --
1,169,691 UART: [cold-reset] ++
1,170,119 UART: [fht] FHT @ 0x50003400
1,172,821 UART: [idev] ++
1,172,989 UART: [idev] CDI.KEYID = 6
1,173,350 UART: [idev] SUBJECT.KEYID = 7
1,173,775 UART: [idev] UDS.KEYID = 0
1,174,121 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,407 UART: [idev] Erasing UDS.KEYID = 0
1,199,253 UART: [idev] Sha1 KeyId Algorithm
1,208,067 UART: [idev] --
1,209,100 UART: [ldev] ++
1,209,268 UART: [ldev] CDI.KEYID = 6
1,209,632 UART: [ldev] SUBJECT.KEYID = 5
1,210,059 UART: [ldev] AUTHORITY.KEYID = 7
1,210,522 UART: [ldev] FE.KEYID = 1
1,215,416 UART: [ldev] Erasing FE.KEYID = 1
1,241,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,176 UART: [ldev] --
1,280,564 UART: [fwproc] Wait for Commands...
1,281,315 UART: [fwproc] Recv command 0x46574c44
1,282,048 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,512 UART: ROM Fatal Error: 0x000B0016
2,578,669 >>> mbox cmd response: failed
2,578,669 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,675 >>> mbox cmd response: failed
2,578,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,681 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,780 UART: [state] LifecycleState = Unprovisioned
85,435 UART: [state] DebugLocked = No
85,957 UART: [state] WD Timer not started. Device not locked for debugging
87,204 UART: [kat] SHA2-256
890,754 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,883 UART: [kat] ++
895,035 UART: [kat] sha1
899,185 UART: [kat] SHA2-256
901,125 UART: [kat] SHA2-384
903,908 UART: [kat] SHA2-512-ACC
905,809 UART: [kat] ECC-384
915,972 UART: [kat] HMAC-384Kdf
920,386 UART: [kat] LMS
1,168,698 UART: [kat] --
1,169,439 UART: [cold-reset] ++
1,169,907 UART: [fht] FHT @ 0x50003400
1,172,515 UART: [idev] ++
1,172,683 UART: [idev] CDI.KEYID = 6
1,173,044 UART: [idev] SUBJECT.KEYID = 7
1,173,469 UART: [idev] UDS.KEYID = 0
1,173,815 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,383 UART: [idev] Erasing UDS.KEYID = 0
1,198,677 UART: [idev] Sha1 KeyId Algorithm
1,207,615 UART: [idev] --
1,208,606 UART: [ldev] ++
1,208,774 UART: [ldev] CDI.KEYID = 6
1,209,138 UART: [ldev] SUBJECT.KEYID = 5
1,209,565 UART: [ldev] AUTHORITY.KEYID = 7
1,210,028 UART: [ldev] FE.KEYID = 1
1,215,344 UART: [ldev] Erasing FE.KEYID = 1
1,241,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,248 UART: [ldev] --
1,280,678 UART: [fwproc] Wait for Commands...
1,281,313 UART: [fwproc] Recv command 0x46574c44
1,282,046 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,631 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,917 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,226 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,172 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,156 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,640 >>> mbox cmd response: failed
2,432,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,646 >>> mbox cmd response: failed
2,432,646 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,652 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,992 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,412 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,550 UART: [kat] ++
895,702 UART: [kat] sha1
900,006 UART: [kat] SHA2-256
901,946 UART: [kat] SHA2-384
904,717 UART: [kat] SHA2-512-ACC
906,618 UART: [kat] ECC-384
916,671 UART: [kat] HMAC-384Kdf
921,221 UART: [kat] LMS
1,169,533 UART: [kat] --
1,170,456 UART: [cold-reset] ++
1,170,940 UART: [fht] FHT @ 0x50003400
1,173,746 UART: [idev] ++
1,173,914 UART: [idev] CDI.KEYID = 6
1,174,275 UART: [idev] SUBJECT.KEYID = 7
1,174,700 UART: [idev] UDS.KEYID = 0
1,175,046 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,758 UART: [idev] Erasing UDS.KEYID = 0
1,199,910 UART: [idev] Sha1 KeyId Algorithm
1,208,768 UART: [idev] --
1,209,867 UART: [ldev] ++
1,210,035 UART: [ldev] CDI.KEYID = 6
1,210,399 UART: [ldev] SUBJECT.KEYID = 5
1,210,826 UART: [ldev] AUTHORITY.KEYID = 7
1,211,289 UART: [ldev] FE.KEYID = 1
1,216,685 UART: [ldev] Erasing FE.KEYID = 1
1,243,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,977 UART: [ldev] --
1,282,467 UART: [fwproc] Wait for Commands...
1,283,040 UART: [fwproc] Recv command 0x46574c44
1,283,773 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,321 UART: ROM Fatal Error: 0x000B0016
2,581,478 >>> mbox cmd response: failed
2,581,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,484 >>> mbox cmd response: failed
2,581,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,490 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
891,477 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,606 UART: [kat] ++
895,758 UART: [kat] sha1
899,964 UART: [kat] SHA2-256
901,904 UART: [kat] SHA2-384
904,433 UART: [kat] SHA2-512-ACC
906,334 UART: [kat] ECC-384
916,283 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,170,034 UART: [cold-reset] ++
1,170,438 UART: [fht] FHT @ 0x50003400
1,173,006 UART: [idev] ++
1,173,174 UART: [idev] CDI.KEYID = 6
1,173,535 UART: [idev] SUBJECT.KEYID = 7
1,173,960 UART: [idev] UDS.KEYID = 0
1,174,306 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,050 UART: [idev] Erasing UDS.KEYID = 0
1,199,000 UART: [idev] Sha1 KeyId Algorithm
1,207,896 UART: [idev] --
1,208,971 UART: [ldev] ++
1,209,139 UART: [ldev] CDI.KEYID = 6
1,209,503 UART: [ldev] SUBJECT.KEYID = 5
1,209,930 UART: [ldev] AUTHORITY.KEYID = 7
1,210,393 UART: [ldev] FE.KEYID = 1
1,215,661 UART: [ldev] Erasing FE.KEYID = 1
1,241,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,133 UART: [ldev] --
1,281,619 UART: [fwproc] Wait for Commands...
1,282,326 UART: [fwproc] Recv command 0x46574c44
1,283,059 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,004 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,313 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,245 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,293 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,419 >>> mbox cmd response: failed
2,433,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,425 >>> mbox cmd response: failed
2,433,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,431 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,849 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,073 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,341 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,871 UART: [kat] SHA2-256
881,802 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,917 UART: [kat] ++
886,069 UART: [kat] sha1
890,357 UART: [kat] SHA2-256
892,295 UART: [kat] SHA2-384
895,136 UART: [kat] SHA2-512-ACC
897,037 UART: [kat] ECC-384
902,762 UART: [kat] HMAC-384Kdf
907,168 UART: [kat] LMS
1,475,364 UART: [kat] --
1,475,921 UART: [cold-reset] ++
1,476,423 UART: [fht] Storing FHT @ 0x50003400
1,479,166 UART: [idev] ++
1,479,334 UART: [idev] CDI.KEYID = 6
1,479,694 UART: [idev] SUBJECT.KEYID = 7
1,480,118 UART: [idev] UDS.KEYID = 0
1,480,463 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,012 UART: [idev] Erasing UDS.KEYID = 0
1,504,512 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,174 UART: [idev] --
1,514,253 UART: [ldev] ++
1,514,421 UART: [ldev] CDI.KEYID = 6
1,514,784 UART: [ldev] SUBJECT.KEYID = 5
1,515,210 UART: [ldev] AUTHORITY.KEYID = 7
1,515,673 UART: [ldev] FE.KEYID = 1
1,520,695 UART: [ldev] Erasing FE.KEYID = 1
1,546,156 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,588 UART: [ldev] --
1,584,909 UART: [fwproc] Waiting for Commands...
1,585,758 UART: [fwproc] Received command 0x46574c44
1,586,549 UART: [fwproc] Received Image of size 114332 bytes
2,883,006 UART: ROM Fatal Error: 0x000B002A
2,884,165 >>> mbox cmd response: failed
2,884,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,171 >>> mbox cmd response: failed
2,884,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,177 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,359 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,047 UART: [kat] SHA2-256
881,978 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,093 UART: [kat] ++
886,245 UART: [kat] sha1
890,387 UART: [kat] SHA2-256
892,325 UART: [kat] SHA2-384
895,054 UART: [kat] SHA2-512-ACC
896,955 UART: [kat] ECC-384
902,400 UART: [kat] HMAC-384Kdf
907,056 UART: [kat] LMS
1,475,252 UART: [kat] --
1,476,131 UART: [cold-reset] ++
1,476,469 UART: [fht] Storing FHT @ 0x50003400
1,479,100 UART: [idev] ++
1,479,268 UART: [idev] CDI.KEYID = 6
1,479,628 UART: [idev] SUBJECT.KEYID = 7
1,480,052 UART: [idev] UDS.KEYID = 0
1,480,397 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,078 UART: [idev] Erasing UDS.KEYID = 0
1,504,222 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,864 UART: [idev] --
1,513,939 UART: [ldev] ++
1,514,107 UART: [ldev] CDI.KEYID = 6
1,514,470 UART: [ldev] SUBJECT.KEYID = 5
1,514,896 UART: [ldev] AUTHORITY.KEYID = 7
1,515,359 UART: [ldev] FE.KEYID = 1
1,520,453 UART: [ldev] Erasing FE.KEYID = 1
1,546,028 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,926 UART: [ldev] --
1,585,417 UART: [fwproc] Waiting for Commands...
1,586,134 UART: [fwproc] Received command 0x46574c44
1,586,925 UART: [fwproc] Received Image of size 114332 bytes
2,885,090 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,960 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,312 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,231 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,777 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,736,770 >>> mbox cmd response: failed
2,736,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,776 >>> mbox cmd response: failed
2,736,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,782 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,301 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,541 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,680 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,302 UART: [kat] SHA2-256
882,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,348 UART: [kat] ++
886,500 UART: [kat] sha1
890,702 UART: [kat] SHA2-256
892,640 UART: [kat] SHA2-384
895,391 UART: [kat] SHA2-512-ACC
897,292 UART: [kat] ECC-384
902,713 UART: [kat] HMAC-384Kdf
907,263 UART: [kat] LMS
1,475,459 UART: [kat] --
1,476,134 UART: [cold-reset] ++
1,476,548 UART: [fht] Storing FHT @ 0x50003400
1,479,321 UART: [idev] ++
1,479,489 UART: [idev] CDI.KEYID = 6
1,479,849 UART: [idev] SUBJECT.KEYID = 7
1,480,273 UART: [idev] UDS.KEYID = 0
1,480,618 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,375 UART: [idev] Erasing UDS.KEYID = 0
1,505,733 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,331 UART: [idev] --
1,515,196 UART: [ldev] ++
1,515,364 UART: [ldev] CDI.KEYID = 6
1,515,727 UART: [ldev] SUBJECT.KEYID = 5
1,516,153 UART: [ldev] AUTHORITY.KEYID = 7
1,516,616 UART: [ldev] FE.KEYID = 1
1,522,010 UART: [ldev] Erasing FE.KEYID = 1
1,547,349 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,657 UART: [ldev] --
1,586,984 UART: [fwproc] Waiting for Commands...
1,587,745 UART: [fwproc] Received command 0x46574c44
1,588,536 UART: [fwproc] Received Image of size 114332 bytes
2,886,493 UART: ROM Fatal Error: 0x000B002A
2,887,652 >>> mbox cmd response: failed
2,887,652 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,887,658 >>> mbox cmd response: failed
2,887,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,887,664 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,494 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,034 UART: [kat] SHA2-256
881,965 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,080 UART: [kat] ++
886,232 UART: [kat] sha1
890,460 UART: [kat] SHA2-256
892,398 UART: [kat] SHA2-384
895,321 UART: [kat] SHA2-512-ACC
897,222 UART: [kat] ECC-384
902,785 UART: [kat] HMAC-384Kdf
907,479 UART: [kat] LMS
1,475,675 UART: [kat] --
1,476,456 UART: [cold-reset] ++
1,476,804 UART: [fht] Storing FHT @ 0x50003400
1,479,633 UART: [idev] ++
1,479,801 UART: [idev] CDI.KEYID = 6
1,480,161 UART: [idev] SUBJECT.KEYID = 7
1,480,585 UART: [idev] UDS.KEYID = 0
1,480,930 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,391 UART: [idev] Erasing UDS.KEYID = 0
1,504,859 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,357 UART: [idev] --
1,514,468 UART: [ldev] ++
1,514,636 UART: [ldev] CDI.KEYID = 6
1,514,999 UART: [ldev] SUBJECT.KEYID = 5
1,515,425 UART: [ldev] AUTHORITY.KEYID = 7
1,515,888 UART: [ldev] FE.KEYID = 1
1,521,256 UART: [ldev] Erasing FE.KEYID = 1
1,547,227 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,827 UART: [ldev] --
1,586,226 UART: [fwproc] Waiting for Commands...
1,587,069 UART: [fwproc] Received command 0x46574c44
1,587,860 UART: [fwproc] Received Image of size 114332 bytes
2,885,993 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,469 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,821 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,564 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,454 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,739,583 >>> mbox cmd response: failed
2,739,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,589 >>> mbox cmd response: failed
2,739,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,595 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,752 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,810 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,720 UART: [state] LifecycleState = Unprovisioned
86,375 UART: [state] DebugLocked = No
86,917 UART: [state] WD Timer not started. Device not locked for debugging
88,186 UART: [kat] SHA2-256
893,836 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,961 UART: [kat] ++
898,113 UART: [kat] sha1
902,547 UART: [kat] SHA2-256
904,487 UART: [kat] SHA2-384
907,136 UART: [kat] SHA2-512-ACC
909,037 UART: [kat] ECC-384
918,666 UART: [kat] HMAC-384Kdf
923,130 UART: [kat] LMS
1,171,458 UART: [kat] --
1,172,283 UART: [cold-reset] ++
1,172,773 UART: [fht] FHT @ 0x50003400
1,175,332 UART: [idev] ++
1,175,500 UART: [idev] CDI.KEYID = 6
1,175,860 UART: [idev] SUBJECT.KEYID = 7
1,176,284 UART: [idev] UDS.KEYID = 0
1,176,629 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,068 UART: [idev] Erasing UDS.KEYID = 0
1,200,693 UART: [idev] Sha1 KeyId Algorithm
1,209,221 UART: [idev] --
1,210,257 UART: [ldev] ++
1,210,425 UART: [ldev] CDI.KEYID = 6
1,210,788 UART: [ldev] SUBJECT.KEYID = 5
1,211,214 UART: [ldev] AUTHORITY.KEYID = 7
1,211,677 UART: [ldev] FE.KEYID = 1
1,216,757 UART: [ldev] Erasing FE.KEYID = 1
1,243,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,119 UART: [ldev] --
1,282,514 UART: [fwproc] Wait for Commands...
1,283,166 UART: [fwproc] Recv command 0x46574c44
1,283,894 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,405 UART: ROM Fatal Error: 0x000B002A
2,581,564 >>> mbox cmd response: failed
2,581,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,570 >>> mbox cmd response: failed
2,581,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
893,076 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,201 UART: [kat] ++
897,353 UART: [kat] sha1
901,429 UART: [kat] SHA2-256
903,369 UART: [kat] SHA2-384
906,312 UART: [kat] SHA2-512-ACC
908,213 UART: [kat] ECC-384
917,796 UART: [kat] HMAC-384Kdf
922,334 UART: [kat] LMS
1,170,662 UART: [kat] --
1,171,497 UART: [cold-reset] ++
1,171,897 UART: [fht] FHT @ 0x50003400
1,174,386 UART: [idev] ++
1,174,554 UART: [idev] CDI.KEYID = 6
1,174,914 UART: [idev] SUBJECT.KEYID = 7
1,175,338 UART: [idev] UDS.KEYID = 0
1,175,683 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,412 UART: [idev] Erasing UDS.KEYID = 0
1,200,255 UART: [idev] Sha1 KeyId Algorithm
1,208,859 UART: [idev] --
1,210,091 UART: [ldev] ++
1,210,259 UART: [ldev] CDI.KEYID = 6
1,210,622 UART: [ldev] SUBJECT.KEYID = 5
1,211,048 UART: [ldev] AUTHORITY.KEYID = 7
1,211,511 UART: [ldev] FE.KEYID = 1
1,216,579 UART: [ldev] Erasing FE.KEYID = 1
1,242,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,665 UART: [ldev] --
1,282,146 UART: [fwproc] Wait for Commands...
1,282,970 UART: [fwproc] Recv command 0x46574c44
1,283,698 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,966 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,599 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,903 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,672 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,979 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,434,877 >>> mbox cmd response: failed
2,434,877 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,883 >>> mbox cmd response: failed
2,434,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,889 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,559 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,573 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [kat] SHA2-256
893,309 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,434 UART: [kat] ++
897,586 UART: [kat] sha1
901,626 UART: [kat] SHA2-256
903,566 UART: [kat] SHA2-384
906,399 UART: [kat] SHA2-512-ACC
908,300 UART: [kat] ECC-384
917,615 UART: [kat] HMAC-384Kdf
922,151 UART: [kat] LMS
1,170,479 UART: [kat] --
1,171,408 UART: [cold-reset] ++
1,171,768 UART: [fht] FHT @ 0x50003400
1,174,357 UART: [idev] ++
1,174,525 UART: [idev] CDI.KEYID = 6
1,174,885 UART: [idev] SUBJECT.KEYID = 7
1,175,309 UART: [idev] UDS.KEYID = 0
1,175,654 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,409 UART: [idev] Erasing UDS.KEYID = 0
1,200,284 UART: [idev] Sha1 KeyId Algorithm
1,208,744 UART: [idev] --
1,209,620 UART: [ldev] ++
1,209,788 UART: [ldev] CDI.KEYID = 6
1,210,151 UART: [ldev] SUBJECT.KEYID = 5
1,210,577 UART: [ldev] AUTHORITY.KEYID = 7
1,211,040 UART: [ldev] FE.KEYID = 1
1,216,376 UART: [ldev] Erasing FE.KEYID = 1
1,243,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,878 UART: [ldev] --
1,282,169 UART: [fwproc] Wait for Commands...
1,282,803 UART: [fwproc] Recv command 0x46574c44
1,283,531 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,502 UART: ROM Fatal Error: 0x000B002A
2,580,661 >>> mbox cmd response: failed
2,580,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,667 >>> mbox cmd response: failed
2,580,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,673 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
893,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,564 UART: [kat] ++
897,716 UART: [kat] sha1
901,794 UART: [kat] SHA2-256
903,734 UART: [kat] SHA2-384
906,575 UART: [kat] SHA2-512-ACC
908,476 UART: [kat] ECC-384
918,173 UART: [kat] HMAC-384Kdf
922,869 UART: [kat] LMS
1,171,197 UART: [kat] --
1,171,974 UART: [cold-reset] ++
1,172,418 UART: [fht] FHT @ 0x50003400
1,175,011 UART: [idev] ++
1,175,179 UART: [idev] CDI.KEYID = 6
1,175,539 UART: [idev] SUBJECT.KEYID = 7
1,175,963 UART: [idev] UDS.KEYID = 0
1,176,308 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,731 UART: [idev] Erasing UDS.KEYID = 0
1,200,920 UART: [idev] Sha1 KeyId Algorithm
1,209,362 UART: [idev] --
1,210,524 UART: [ldev] ++
1,210,692 UART: [ldev] CDI.KEYID = 6
1,211,055 UART: [ldev] SUBJECT.KEYID = 5
1,211,481 UART: [ldev] AUTHORITY.KEYID = 7
1,211,944 UART: [ldev] FE.KEYID = 1
1,217,160 UART: [ldev] Erasing FE.KEYID = 1
1,243,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,898 UART: [ldev] --
1,282,199 UART: [fwproc] Wait for Commands...
1,282,881 UART: [fwproc] Recv command 0x46574c44
1,283,609 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,094 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,398 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,255 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,216 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,438,160 >>> mbox cmd response: failed
2,438,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,438,166 >>> mbox cmd response: failed
2,438,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,438,172 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,882 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,710 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
891,210 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,339 UART: [kat] ++
895,491 UART: [kat] sha1
899,707 UART: [kat] SHA2-256
901,647 UART: [kat] SHA2-384
904,430 UART: [kat] SHA2-512-ACC
906,331 UART: [kat] ECC-384
915,842 UART: [kat] HMAC-384Kdf
920,278 UART: [kat] LMS
1,168,590 UART: [kat] --
1,169,665 UART: [cold-reset] ++
1,170,021 UART: [fht] FHT @ 0x50003400
1,172,693 UART: [idev] ++
1,172,861 UART: [idev] CDI.KEYID = 6
1,173,222 UART: [idev] SUBJECT.KEYID = 7
1,173,647 UART: [idev] UDS.KEYID = 0
1,173,993 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,789 UART: [idev] Erasing UDS.KEYID = 0
1,198,777 UART: [idev] Sha1 KeyId Algorithm
1,207,675 UART: [idev] --
1,208,546 UART: [ldev] ++
1,208,714 UART: [ldev] CDI.KEYID = 6
1,209,078 UART: [ldev] SUBJECT.KEYID = 5
1,209,505 UART: [ldev] AUTHORITY.KEYID = 7
1,209,968 UART: [ldev] FE.KEYID = 1
1,215,112 UART: [ldev] Erasing FE.KEYID = 1
1,241,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,546 UART: [ldev] --
1,280,938 UART: [fwproc] Wait for Commands...
1,281,675 UART: [fwproc] Recv command 0x46574c44
1,282,408 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,355 UART: ROM Fatal Error: 0x000B002A
2,579,514 >>> mbox cmd response: failed
2,579,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,520 >>> mbox cmd response: failed
2,579,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,526 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,215 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
890,964 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,093 UART: [kat] ++
895,245 UART: [kat] sha1
899,339 UART: [kat] SHA2-256
901,279 UART: [kat] SHA2-384
903,966 UART: [kat] SHA2-512-ACC
905,867 UART: [kat] ECC-384
915,852 UART: [kat] HMAC-384Kdf
920,402 UART: [kat] LMS
1,168,714 UART: [kat] --
1,169,711 UART: [cold-reset] ++
1,170,043 UART: [fht] FHT @ 0x50003400
1,172,645 UART: [idev] ++
1,172,813 UART: [idev] CDI.KEYID = 6
1,173,174 UART: [idev] SUBJECT.KEYID = 7
1,173,599 UART: [idev] UDS.KEYID = 0
1,173,945 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,143 UART: [idev] Erasing UDS.KEYID = 0
1,199,075 UART: [idev] Sha1 KeyId Algorithm
1,208,031 UART: [idev] --
1,209,224 UART: [ldev] ++
1,209,392 UART: [ldev] CDI.KEYID = 6
1,209,756 UART: [ldev] SUBJECT.KEYID = 5
1,210,183 UART: [ldev] AUTHORITY.KEYID = 7
1,210,646 UART: [ldev] FE.KEYID = 1
1,215,774 UART: [ldev] Erasing FE.KEYID = 1
1,242,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,212 UART: [ldev] --
1,281,628 UART: [fwproc] Wait for Commands...
1,282,427 UART: [fwproc] Recv command 0x46574c44
1,283,160 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,663 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,972 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,890 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,728 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,669 >>> mbox cmd response: failed
2,431,669 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,675 >>> mbox cmd response: failed
2,431,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,681 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,842 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,402 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,671 UART: [kat] SHA2-256
891,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,350 UART: [kat] ++
895,502 UART: [kat] sha1
899,786 UART: [kat] SHA2-256
901,726 UART: [kat] SHA2-384
904,545 UART: [kat] SHA2-512-ACC
906,446 UART: [kat] ECC-384
916,149 UART: [kat] HMAC-384Kdf
920,583 UART: [kat] LMS
1,168,895 UART: [kat] --
1,169,742 UART: [cold-reset] ++
1,170,162 UART: [fht] FHT @ 0x50003400
1,172,784 UART: [idev] ++
1,172,952 UART: [idev] CDI.KEYID = 6
1,173,313 UART: [idev] SUBJECT.KEYID = 7
1,173,738 UART: [idev] UDS.KEYID = 0
1,174,084 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,632 UART: [idev] Erasing UDS.KEYID = 0
1,199,106 UART: [idev] Sha1 KeyId Algorithm
1,207,922 UART: [idev] --
1,209,093 UART: [ldev] ++
1,209,261 UART: [ldev] CDI.KEYID = 6
1,209,625 UART: [ldev] SUBJECT.KEYID = 5
1,210,052 UART: [ldev] AUTHORITY.KEYID = 7
1,210,515 UART: [ldev] FE.KEYID = 1
1,215,471 UART: [ldev] Erasing FE.KEYID = 1
1,242,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,837 UART: [ldev] --
1,282,147 UART: [fwproc] Wait for Commands...
1,282,718 UART: [fwproc] Recv command 0x46574c44
1,283,451 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,010 UART: ROM Fatal Error: 0x000B002A
2,581,169 >>> mbox cmd response: failed
2,581,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,175 >>> mbox cmd response: failed
2,581,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,181 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
891,357 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,486 UART: [kat] ++
895,638 UART: [kat] sha1
899,896 UART: [kat] SHA2-256
901,836 UART: [kat] SHA2-384
904,619 UART: [kat] SHA2-512-ACC
906,520 UART: [kat] ECC-384
916,713 UART: [kat] HMAC-384Kdf
921,151 UART: [kat] LMS
1,169,463 UART: [kat] --
1,170,402 UART: [cold-reset] ++
1,170,790 UART: [fht] FHT @ 0x50003400
1,173,406 UART: [idev] ++
1,173,574 UART: [idev] CDI.KEYID = 6
1,173,935 UART: [idev] SUBJECT.KEYID = 7
1,174,360 UART: [idev] UDS.KEYID = 0
1,174,706 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,188 UART: [idev] Erasing UDS.KEYID = 0
1,199,634 UART: [idev] Sha1 KeyId Algorithm
1,208,420 UART: [idev] --
1,209,499 UART: [ldev] ++
1,209,667 UART: [ldev] CDI.KEYID = 6
1,210,031 UART: [ldev] SUBJECT.KEYID = 5
1,210,458 UART: [ldev] AUTHORITY.KEYID = 7
1,210,921 UART: [ldev] FE.KEYID = 1
1,215,813 UART: [ldev] Erasing FE.KEYID = 1
1,242,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,019 UART: [ldev] --
1,281,349 UART: [fwproc] Wait for Commands...
1,281,936 UART: [fwproc] Recv command 0x46574c44
1,282,669 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,426 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,735 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,453 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,439 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,992 >>> mbox cmd response: failed
2,432,992 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,998 >>> mbox cmd response: failed
2,432,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,004 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,251 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,745 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,375 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,035 UART: [kat] SHA2-256
881,966 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,081 UART: [kat] ++
886,233 UART: [kat] sha1
890,379 UART: [kat] SHA2-256
892,317 UART: [kat] SHA2-384
895,002 UART: [kat] SHA2-512-ACC
896,903 UART: [kat] ECC-384
902,478 UART: [kat] HMAC-384Kdf
907,126 UART: [kat] LMS
1,475,322 UART: [kat] --
1,476,361 UART: [cold-reset] ++
1,476,783 UART: [fht] Storing FHT @ 0x50003400
1,479,706 UART: [idev] ++
1,479,874 UART: [idev] CDI.KEYID = 6
1,480,234 UART: [idev] SUBJECT.KEYID = 7
1,480,658 UART: [idev] UDS.KEYID = 0
1,481,003 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,166 UART: [idev] Erasing UDS.KEYID = 0
1,504,788 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,438 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,761 UART: [ldev] Erasing FE.KEYID = 1
1,546,250 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,160 UART: [ldev] --
1,585,549 UART: [fwproc] Waiting for Commands...
1,586,262 UART: [fwproc] Received command 0x46574c44
1,587,053 UART: [fwproc] Received Image of size 114332 bytes
2,883,270 UART: ROM Fatal Error: 0x000B002B
2,884,429 >>> mbox cmd response: failed
2,884,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,435 >>> mbox cmd response: failed
2,884,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,441 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,327 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,845 UART: [kat] SHA2-256
881,776 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,891 UART: [kat] ++
886,043 UART: [kat] sha1
890,139 UART: [kat] SHA2-256
892,077 UART: [kat] SHA2-384
895,022 UART: [kat] SHA2-512-ACC
896,923 UART: [kat] ECC-384
902,246 UART: [kat] HMAC-384Kdf
907,010 UART: [kat] LMS
1,475,206 UART: [kat] --
1,475,917 UART: [cold-reset] ++
1,476,365 UART: [fht] Storing FHT @ 0x50003400
1,479,330 UART: [idev] ++
1,479,498 UART: [idev] CDI.KEYID = 6
1,479,858 UART: [idev] SUBJECT.KEYID = 7
1,480,282 UART: [idev] UDS.KEYID = 0
1,480,627 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,478 UART: [idev] Erasing UDS.KEYID = 0
1,505,228 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,988 UART: [idev] --
1,515,229 UART: [ldev] ++
1,515,397 UART: [ldev] CDI.KEYID = 6
1,515,760 UART: [ldev] SUBJECT.KEYID = 5
1,516,186 UART: [ldev] AUTHORITY.KEYID = 7
1,516,649 UART: [ldev] FE.KEYID = 1
1,521,589 UART: [ldev] Erasing FE.KEYID = 1
1,546,502 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,152 UART: [ldev] --
1,585,519 UART: [fwproc] Waiting for Commands...
1,586,210 UART: [fwproc] Received command 0x46574c44
1,587,001 UART: [fwproc] Received Image of size 114332 bytes
2,885,375 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,875 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,227 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,186 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,011 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,738,122 >>> mbox cmd response: failed
2,738,122 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,128 >>> mbox cmd response: failed
2,738,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,134 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,995 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,063 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,726 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,206 UART: [kat] SHA2-256
882,137 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,252 UART: [kat] ++
886,404 UART: [kat] sha1
890,518 UART: [kat] SHA2-256
892,456 UART: [kat] SHA2-384
895,117 UART: [kat] SHA2-512-ACC
897,018 UART: [kat] ECC-384
902,677 UART: [kat] HMAC-384Kdf
907,279 UART: [kat] LMS
1,475,475 UART: [kat] --
1,476,614 UART: [cold-reset] ++
1,477,194 UART: [fht] Storing FHT @ 0x50003400
1,480,131 UART: [idev] ++
1,480,299 UART: [idev] CDI.KEYID = 6
1,480,659 UART: [idev] SUBJECT.KEYID = 7
1,481,083 UART: [idev] UDS.KEYID = 0
1,481,428 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,401 UART: [idev] Erasing UDS.KEYID = 0
1,505,779 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,431 UART: [idev] --
1,515,326 UART: [ldev] ++
1,515,494 UART: [ldev] CDI.KEYID = 6
1,515,857 UART: [ldev] SUBJECT.KEYID = 5
1,516,283 UART: [ldev] AUTHORITY.KEYID = 7
1,516,746 UART: [ldev] FE.KEYID = 1
1,522,022 UART: [ldev] Erasing FE.KEYID = 1
1,546,825 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,157 UART: [ldev] --
1,585,664 UART: [fwproc] Waiting for Commands...
1,586,301 UART: [fwproc] Received command 0x46574c44
1,587,092 UART: [fwproc] Received Image of size 114332 bytes
2,883,941 UART: ROM Fatal Error: 0x000B002B
2,885,100 >>> mbox cmd response: failed
2,885,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,106 >>> mbox cmd response: failed
2,885,106 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,112 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,846 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,386 UART: [kat] SHA2-256
882,317 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,432 UART: [kat] ++
886,584 UART: [kat] sha1
890,694 UART: [kat] SHA2-256
892,632 UART: [kat] SHA2-384
895,401 UART: [kat] SHA2-512-ACC
897,302 UART: [kat] ECC-384
902,985 UART: [kat] HMAC-384Kdf
907,841 UART: [kat] LMS
1,476,037 UART: [kat] --
1,477,224 UART: [cold-reset] ++
1,477,646 UART: [fht] Storing FHT @ 0x50003400
1,480,305 UART: [idev] ++
1,480,473 UART: [idev] CDI.KEYID = 6
1,480,833 UART: [idev] SUBJECT.KEYID = 7
1,481,257 UART: [idev] UDS.KEYID = 0
1,481,602 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,419 UART: [idev] Erasing UDS.KEYID = 0
1,506,305 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,855 UART: [idev] --
1,515,832 UART: [ldev] ++
1,516,000 UART: [ldev] CDI.KEYID = 6
1,516,363 UART: [ldev] SUBJECT.KEYID = 5
1,516,789 UART: [ldev] AUTHORITY.KEYID = 7
1,517,252 UART: [ldev] FE.KEYID = 1
1,522,608 UART: [ldev] Erasing FE.KEYID = 1
1,547,977 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,075 UART: [ldev] --
1,587,462 UART: [fwproc] Waiting for Commands...
1,588,161 UART: [fwproc] Received command 0x46574c44
1,588,952 UART: [fwproc] Received Image of size 114332 bytes
2,885,959 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,813 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,165 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,938 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,342 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,737,323 >>> mbox cmd response: failed
2,737,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,329 >>> mbox cmd response: failed
2,737,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,335 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,420 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,998 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,770 UART: [state] LifecycleState = Unprovisioned
85,425 UART: [state] DebugLocked = No
86,111 UART: [state] WD Timer not started. Device not locked for debugging
87,396 UART: [kat] SHA2-256
893,046 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,171 UART: [kat] ++
897,323 UART: [kat] sha1
901,505 UART: [kat] SHA2-256
903,445 UART: [kat] SHA2-384
906,348 UART: [kat] SHA2-512-ACC
908,249 UART: [kat] ECC-384
918,076 UART: [kat] HMAC-384Kdf
922,794 UART: [kat] LMS
1,171,122 UART: [kat] --
1,172,019 UART: [cold-reset] ++
1,172,419 UART: [fht] FHT @ 0x50003400
1,174,966 UART: [idev] ++
1,175,134 UART: [idev] CDI.KEYID = 6
1,175,494 UART: [idev] SUBJECT.KEYID = 7
1,175,918 UART: [idev] UDS.KEYID = 0
1,176,263 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,902 UART: [idev] Erasing UDS.KEYID = 0
1,200,765 UART: [idev] Sha1 KeyId Algorithm
1,209,253 UART: [idev] --
1,210,265 UART: [ldev] ++
1,210,433 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,222 UART: [ldev] AUTHORITY.KEYID = 7
1,211,685 UART: [ldev] FE.KEYID = 1
1,217,013 UART: [ldev] Erasing FE.KEYID = 1
1,243,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,439 UART: [ldev] --
1,282,700 UART: [fwproc] Wait for Commands...
1,283,324 UART: [fwproc] Recv command 0x46574c44
1,284,052 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,895 UART: ROM Fatal Error: 0x000B002B
2,582,054 >>> mbox cmd response: failed
2,582,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,060 >>> mbox cmd response: failed
2,582,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,066 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,814 UART: [kat] SHA2-256
893,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,589 UART: [kat] ++
897,741 UART: [kat] sha1
901,869 UART: [kat] SHA2-256
903,809 UART: [kat] SHA2-384
906,644 UART: [kat] SHA2-512-ACC
908,545 UART: [kat] ECC-384
918,048 UART: [kat] HMAC-384Kdf
922,728 UART: [kat] LMS
1,171,056 UART: [kat] --
1,171,935 UART: [cold-reset] ++
1,172,477 UART: [fht] FHT @ 0x50003400
1,175,106 UART: [idev] ++
1,175,274 UART: [idev] CDI.KEYID = 6
1,175,634 UART: [idev] SUBJECT.KEYID = 7
1,176,058 UART: [idev] UDS.KEYID = 0
1,176,403 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,952 UART: [idev] Erasing UDS.KEYID = 0
1,200,857 UART: [idev] Sha1 KeyId Algorithm
1,209,443 UART: [idev] --
1,210,541 UART: [ldev] ++
1,210,709 UART: [ldev] CDI.KEYID = 6
1,211,072 UART: [ldev] SUBJECT.KEYID = 5
1,211,498 UART: [ldev] AUTHORITY.KEYID = 7
1,211,961 UART: [ldev] FE.KEYID = 1
1,217,083 UART: [ldev] Erasing FE.KEYID = 1
1,243,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,261 UART: [ldev] --
1,282,530 UART: [fwproc] Wait for Commands...
1,283,256 UART: [fwproc] Recv command 0x46574c44
1,283,984 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,295 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,342 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,069 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,436,475 >>> mbox cmd response: failed
2,436,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,481 >>> mbox cmd response: failed
2,436,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,487 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,029 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,551 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
893,631 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,756 UART: [kat] ++
897,908 UART: [kat] sha1
902,248 UART: [kat] SHA2-256
904,188 UART: [kat] SHA2-384
907,117 UART: [kat] SHA2-512-ACC
909,018 UART: [kat] ECC-384
918,587 UART: [kat] HMAC-384Kdf
923,285 UART: [kat] LMS
1,171,613 UART: [kat] --
1,172,498 UART: [cold-reset] ++
1,172,860 UART: [fht] FHT @ 0x50003400
1,175,615 UART: [idev] ++
1,175,783 UART: [idev] CDI.KEYID = 6
1,176,143 UART: [idev] SUBJECT.KEYID = 7
1,176,567 UART: [idev] UDS.KEYID = 0
1,176,912 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,413 UART: [idev] Erasing UDS.KEYID = 0
1,201,502 UART: [idev] Sha1 KeyId Algorithm
1,210,100 UART: [idev] --
1,211,016 UART: [ldev] ++
1,211,184 UART: [ldev] CDI.KEYID = 6
1,211,547 UART: [ldev] SUBJECT.KEYID = 5
1,211,973 UART: [ldev] AUTHORITY.KEYID = 7
1,212,436 UART: [ldev] FE.KEYID = 1
1,217,696 UART: [ldev] Erasing FE.KEYID = 1
1,244,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,040 UART: [ldev] --
1,283,331 UART: [fwproc] Wait for Commands...
1,284,037 UART: [fwproc] Recv command 0x46574c44
1,284,765 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,760 UART: ROM Fatal Error: 0x000B002B
2,581,919 >>> mbox cmd response: failed
2,581,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,925 >>> mbox cmd response: failed
2,581,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,931 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
893,447 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,572 UART: [kat] ++
897,724 UART: [kat] sha1
901,910 UART: [kat] SHA2-256
903,850 UART: [kat] SHA2-384
906,565 UART: [kat] SHA2-512-ACC
908,466 UART: [kat] ECC-384
918,517 UART: [kat] HMAC-384Kdf
923,013 UART: [kat] LMS
1,171,341 UART: [kat] --
1,172,462 UART: [cold-reset] ++
1,173,036 UART: [fht] FHT @ 0x50003400
1,175,509 UART: [idev] ++
1,175,677 UART: [idev] CDI.KEYID = 6
1,176,037 UART: [idev] SUBJECT.KEYID = 7
1,176,461 UART: [idev] UDS.KEYID = 0
1,176,806 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,657 UART: [idev] Erasing UDS.KEYID = 0
1,201,666 UART: [idev] Sha1 KeyId Algorithm
1,210,090 UART: [idev] --
1,211,210 UART: [ldev] ++
1,211,378 UART: [ldev] CDI.KEYID = 6
1,211,741 UART: [ldev] SUBJECT.KEYID = 5
1,212,167 UART: [ldev] AUTHORITY.KEYID = 7
1,212,630 UART: [ldev] FE.KEYID = 1
1,217,942 UART: [ldev] Erasing FE.KEYID = 1
1,244,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,440 UART: [ldev] --
1,283,727 UART: [fwproc] Wait for Commands...
1,284,505 UART: [fwproc] Recv command 0x46574c44
1,285,233 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,059 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,788 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,092 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,979 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,478 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,435,776 >>> mbox cmd response: failed
2,435,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,782 >>> mbox cmd response: failed
2,435,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,788 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,656 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,482 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,273 UART: [kat] ++
895,425 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,480 UART: [kat] SHA2-512-ACC
906,381 UART: [kat] ECC-384
915,764 UART: [kat] HMAC-384Kdf
920,336 UART: [kat] LMS
1,168,648 UART: [kat] --
1,169,355 UART: [cold-reset] ++
1,169,711 UART: [fht] FHT @ 0x50003400
1,172,487 UART: [idev] ++
1,172,655 UART: [idev] CDI.KEYID = 6
1,173,016 UART: [idev] SUBJECT.KEYID = 7
1,173,441 UART: [idev] UDS.KEYID = 0
1,173,787 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,565 UART: [idev] Erasing UDS.KEYID = 0
1,198,605 UART: [idev] Sha1 KeyId Algorithm
1,207,649 UART: [idev] --
1,208,580 UART: [ldev] ++
1,208,748 UART: [ldev] CDI.KEYID = 6
1,209,112 UART: [ldev] SUBJECT.KEYID = 5
1,209,539 UART: [ldev] AUTHORITY.KEYID = 7
1,210,002 UART: [ldev] FE.KEYID = 1
1,214,834 UART: [ldev] Erasing FE.KEYID = 1
1,240,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,956 UART: [ldev] --
1,280,228 UART: [fwproc] Wait for Commands...
1,280,919 UART: [fwproc] Recv command 0x46574c44
1,281,652 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,363 UART: ROM Fatal Error: 0x000B002B
2,578,522 >>> mbox cmd response: failed
2,578,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,528 >>> mbox cmd response: failed
2,578,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,534 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
891,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,251 UART: [kat] ++
895,403 UART: [kat] sha1
899,765 UART: [kat] SHA2-256
901,705 UART: [kat] SHA2-384
904,566 UART: [kat] SHA2-512-ACC
906,467 UART: [kat] ECC-384
915,828 UART: [kat] HMAC-384Kdf
920,354 UART: [kat] LMS
1,168,666 UART: [kat] --
1,169,405 UART: [cold-reset] ++
1,169,921 UART: [fht] FHT @ 0x50003400
1,172,385 UART: [idev] ++
1,172,553 UART: [idev] CDI.KEYID = 6
1,172,914 UART: [idev] SUBJECT.KEYID = 7
1,173,339 UART: [idev] UDS.KEYID = 0
1,173,685 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,821 UART: [idev] Erasing UDS.KEYID = 0
1,197,867 UART: [idev] Sha1 KeyId Algorithm
1,206,729 UART: [idev] --
1,207,864 UART: [ldev] ++
1,208,032 UART: [ldev] CDI.KEYID = 6
1,208,396 UART: [ldev] SUBJECT.KEYID = 5
1,208,823 UART: [ldev] AUTHORITY.KEYID = 7
1,209,286 UART: [ldev] FE.KEYID = 1
1,214,304 UART: [ldev] Erasing FE.KEYID = 1
1,240,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,914 UART: [ldev] --
1,279,252 UART: [fwproc] Wait for Commands...
1,279,825 UART: [fwproc] Recv command 0x46574c44
1,280,558 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,793 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,559 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,868 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,750 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,852 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,113 >>> mbox cmd response: failed
2,431,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,119 >>> mbox cmd response: failed
2,431,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,125 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,908 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,972 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,719 UART: [kat] SHA2-256
891,269 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,398 UART: [kat] ++
895,550 UART: [kat] sha1
899,570 UART: [kat] SHA2-256
901,510 UART: [kat] SHA2-384
904,167 UART: [kat] SHA2-512-ACC
906,068 UART: [kat] ECC-384
915,741 UART: [kat] HMAC-384Kdf
920,231 UART: [kat] LMS
1,168,543 UART: [kat] --
1,169,396 UART: [cold-reset] ++
1,169,786 UART: [fht] FHT @ 0x50003400
1,172,418 UART: [idev] ++
1,172,586 UART: [idev] CDI.KEYID = 6
1,172,947 UART: [idev] SUBJECT.KEYID = 7
1,173,372 UART: [idev] UDS.KEYID = 0
1,173,718 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,612 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,364 UART: [idev] --
1,208,243 UART: [ldev] ++
1,208,411 UART: [ldev] CDI.KEYID = 6
1,208,775 UART: [ldev] SUBJECT.KEYID = 5
1,209,202 UART: [ldev] AUTHORITY.KEYID = 7
1,209,665 UART: [ldev] FE.KEYID = 1
1,214,979 UART: [ldev] Erasing FE.KEYID = 1
1,241,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,411 UART: [ldev] --
1,280,755 UART: [fwproc] Wait for Commands...
1,281,426 UART: [fwproc] Recv command 0x46574c44
1,282,159 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,514 UART: ROM Fatal Error: 0x000B002B
2,579,673 >>> mbox cmd response: failed
2,579,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,679 >>> mbox cmd response: failed
2,579,679 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,685 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,550 UART: [kat] ++
895,702 UART: [kat] sha1
899,848 UART: [kat] SHA2-256
901,788 UART: [kat] SHA2-384
904,357 UART: [kat] SHA2-512-ACC
906,258 UART: [kat] ECC-384
916,113 UART: [kat] HMAC-384Kdf
920,657 UART: [kat] LMS
1,168,969 UART: [kat] --
1,169,676 UART: [cold-reset] ++
1,170,116 UART: [fht] FHT @ 0x50003400
1,172,830 UART: [idev] ++
1,172,998 UART: [idev] CDI.KEYID = 6
1,173,359 UART: [idev] SUBJECT.KEYID = 7
1,173,784 UART: [idev] UDS.KEYID = 0
1,174,130 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,716 UART: [idev] Erasing UDS.KEYID = 0
1,199,080 UART: [idev] Sha1 KeyId Algorithm
1,207,918 UART: [idev] --
1,208,963 UART: [ldev] ++
1,209,131 UART: [ldev] CDI.KEYID = 6
1,209,495 UART: [ldev] SUBJECT.KEYID = 5
1,209,922 UART: [ldev] AUTHORITY.KEYID = 7
1,210,385 UART: [ldev] FE.KEYID = 1
1,215,683 UART: [ldev] Erasing FE.KEYID = 1
1,242,078 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,973 UART: [ldev] --
1,281,401 UART: [fwproc] Wait for Commands...
1,282,102 UART: [fwproc] Recv command 0x46574c44
1,282,835 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,360 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,669 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,395 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,433 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,434,008 >>> mbox cmd response: failed
2,434,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,014 >>> mbox cmd response: failed
2,434,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,020 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,943 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,679 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,406 UART: [state] LifecycleState = Unprovisioned
85,061 UART: [state] DebugLocked = No
85,691 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,179 UART: [kat] SHA2-256
881,110 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,225 UART: [kat] ++
885,377 UART: [kat] sha1
889,663 UART: [kat] SHA2-256
891,601 UART: [kat] SHA2-384
894,294 UART: [kat] SHA2-512-ACC
896,195 UART: [kat] ECC-384
901,726 UART: [kat] HMAC-384Kdf
906,378 UART: [kat] LMS
1,474,574 UART: [kat] --
1,475,713 UART: [cold-reset] ++
1,476,077 UART: [fht] Storing FHT @ 0x50003400
1,478,630 UART: [idev] ++
1,478,798 UART: [idev] CDI.KEYID = 6
1,479,158 UART: [idev] SUBJECT.KEYID = 7
1,479,582 UART: [idev] UDS.KEYID = 0
1,479,927 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,698 UART: [idev] Erasing UDS.KEYID = 0
1,504,650 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,366 UART: [idev] --
1,514,283 UART: [ldev] ++
1,514,451 UART: [ldev] CDI.KEYID = 6
1,514,814 UART: [ldev] SUBJECT.KEYID = 5
1,515,240 UART: [ldev] AUTHORITY.KEYID = 7
1,515,703 UART: [ldev] FE.KEYID = 1
1,520,753 UART: [ldev] Erasing FE.KEYID = 1
1,546,192 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,832 UART: [ldev] --
1,585,321 UART: [fwproc] Waiting for Commands...
1,586,164 UART: [fwproc] Received command 0x46574c44
1,586,955 UART: [fwproc] Received Image of size 114332 bytes
2,884,193 UART: ROM Fatal Error: 0x000B0028
2,885,350 >>> mbox cmd response: failed
2,885,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,356 >>> mbox cmd response: failed
2,885,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,362 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Unprovisioned
86,075 UART: [state] DebugLocked = No
86,571 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,161 UART: [kat] SHA2-256
882,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,207 UART: [kat] ++
886,359 UART: [kat] sha1
890,545 UART: [kat] SHA2-256
892,483 UART: [kat] SHA2-384
895,426 UART: [kat] SHA2-512-ACC
897,327 UART: [kat] ECC-384
902,910 UART: [kat] HMAC-384Kdf
907,422 UART: [kat] LMS
1,475,618 UART: [kat] --
1,476,347 UART: [cold-reset] ++
1,476,767 UART: [fht] Storing FHT @ 0x50003400
1,479,668 UART: [idev] ++
1,479,836 UART: [idev] CDI.KEYID = 6
1,480,196 UART: [idev] SUBJECT.KEYID = 7
1,480,620 UART: [idev] UDS.KEYID = 0
1,480,965 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,646 UART: [idev] Erasing UDS.KEYID = 0
1,505,634 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,342 UART: [idev] --
1,515,521 UART: [ldev] ++
1,515,689 UART: [ldev] CDI.KEYID = 6
1,516,052 UART: [ldev] SUBJECT.KEYID = 5
1,516,478 UART: [ldev] AUTHORITY.KEYID = 7
1,516,941 UART: [ldev] FE.KEYID = 1
1,522,093 UART: [ldev] Erasing FE.KEYID = 1
1,548,494 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,796 UART: [ldev] --
1,588,225 UART: [fwproc] Waiting for Commands...
1,589,030 UART: [fwproc] Received command 0x46574c44
1,589,821 UART: [fwproc] Received Image of size 114332 bytes
2,887,666 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,538 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,890 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,817 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,179 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,735,901 >>> mbox cmd response: failed
2,735,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,735,907 >>> mbox cmd response: failed
2,735,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,735,913 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,851 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,285 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,115 UART: [state] LifecycleState = Unprovisioned
85,770 UART: [state] DebugLocked = No
86,470 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,068 UART: [kat] SHA2-256
881,999 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,114 UART: [kat] ++
886,266 UART: [kat] sha1
890,534 UART: [kat] SHA2-256
892,472 UART: [kat] SHA2-384
895,195 UART: [kat] SHA2-512-ACC
897,096 UART: [kat] ECC-384
902,631 UART: [kat] HMAC-384Kdf
907,443 UART: [kat] LMS
1,475,639 UART: [kat] --
1,476,530 UART: [cold-reset] ++
1,476,996 UART: [fht] Storing FHT @ 0x50003400
1,479,723 UART: [idev] ++
1,479,891 UART: [idev] CDI.KEYID = 6
1,480,251 UART: [idev] SUBJECT.KEYID = 7
1,480,675 UART: [idev] UDS.KEYID = 0
1,481,020 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,721 UART: [idev] Erasing UDS.KEYID = 0
1,505,519 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,117 UART: [idev] --
1,515,020 UART: [ldev] ++
1,515,188 UART: [ldev] CDI.KEYID = 6
1,515,551 UART: [ldev] SUBJECT.KEYID = 5
1,515,977 UART: [ldev] AUTHORITY.KEYID = 7
1,516,440 UART: [ldev] FE.KEYID = 1
1,521,794 UART: [ldev] Erasing FE.KEYID = 1
1,547,325 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,655 UART: [ldev] --
1,586,960 UART: [fwproc] Waiting for Commands...
1,587,707 UART: [fwproc] Received command 0x46574c44
1,588,498 UART: [fwproc] Received Image of size 114332 bytes
2,885,618 UART: ROM Fatal Error: 0x000B0028
2,886,775 >>> mbox cmd response: failed
2,886,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,781 >>> mbox cmd response: failed
2,886,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,787 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,714 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,402 UART: [kat] SHA2-256
882,333 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,448 UART: [kat] ++
886,600 UART: [kat] sha1
891,024 UART: [kat] SHA2-256
892,962 UART: [kat] SHA2-384
895,609 UART: [kat] SHA2-512-ACC
897,510 UART: [kat] ECC-384
903,245 UART: [kat] HMAC-384Kdf
907,933 UART: [kat] LMS
1,476,129 UART: [kat] --
1,477,104 UART: [cold-reset] ++
1,477,430 UART: [fht] Storing FHT @ 0x50003400
1,480,207 UART: [idev] ++
1,480,375 UART: [idev] CDI.KEYID = 6
1,480,735 UART: [idev] SUBJECT.KEYID = 7
1,481,159 UART: [idev] UDS.KEYID = 0
1,481,504 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,977 UART: [idev] Erasing UDS.KEYID = 0
1,506,333 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,023 UART: [idev] --
1,516,034 UART: [ldev] ++
1,516,202 UART: [ldev] CDI.KEYID = 6
1,516,565 UART: [ldev] SUBJECT.KEYID = 5
1,516,991 UART: [ldev] AUTHORITY.KEYID = 7
1,517,454 UART: [ldev] FE.KEYID = 1
1,522,690 UART: [ldev] Erasing FE.KEYID = 1
1,548,925 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,089 UART: [ldev] --
1,588,592 UART: [fwproc] Waiting for Commands...
1,589,217 UART: [fwproc] Received command 0x46574c44
1,590,008 UART: [fwproc] Received Image of size 114332 bytes
2,887,159 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,483 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,835 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,648 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,352 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,738,579 >>> mbox cmd response: failed
2,738,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,585 >>> mbox cmd response: failed
2,738,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,591 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,354 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,924,582 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,488 UART: [kat] SHA2-256
893,138 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,263 UART: [kat] ++
897,415 UART: [kat] sha1
901,529 UART: [kat] SHA2-256
903,469 UART: [kat] SHA2-384
906,274 UART: [kat] SHA2-512-ACC
908,175 UART: [kat] ECC-384
918,050 UART: [kat] HMAC-384Kdf
922,692 UART: [kat] LMS
1,171,020 UART: [kat] --
1,171,689 UART: [cold-reset] ++
1,172,269 UART: [fht] FHT @ 0x50003400
1,174,966 UART: [idev] ++
1,175,134 UART: [idev] CDI.KEYID = 6
1,175,494 UART: [idev] SUBJECT.KEYID = 7
1,175,918 UART: [idev] UDS.KEYID = 0
1,176,263 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,116 UART: [idev] Erasing UDS.KEYID = 0
1,200,949 UART: [idev] Sha1 KeyId Algorithm
1,209,595 UART: [idev] --
1,210,763 UART: [ldev] ++
1,210,931 UART: [ldev] CDI.KEYID = 6
1,211,294 UART: [ldev] SUBJECT.KEYID = 5
1,211,720 UART: [ldev] AUTHORITY.KEYID = 7
1,212,183 UART: [ldev] FE.KEYID = 1
1,217,441 UART: [ldev] Erasing FE.KEYID = 1
1,243,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,825 UART: [ldev] --
1,282,316 UART: [fwproc] Wait for Commands...
1,283,052 UART: [fwproc] Recv command 0x46574c44
1,283,780 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,018 UART: ROM Fatal Error: 0x000B0028
2,581,175 >>> mbox cmd response: failed
2,581,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,181 >>> mbox cmd response: failed
2,581,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,187 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
893,258 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,383 UART: [kat] ++
897,535 UART: [kat] sha1
901,841 UART: [kat] SHA2-256
903,781 UART: [kat] SHA2-384
906,620 UART: [kat] SHA2-512-ACC
908,521 UART: [kat] ECC-384
918,364 UART: [kat] HMAC-384Kdf
922,894 UART: [kat] LMS
1,171,222 UART: [kat] --
1,172,085 UART: [cold-reset] ++
1,172,565 UART: [fht] FHT @ 0x50003400
1,175,026 UART: [idev] ++
1,175,194 UART: [idev] CDI.KEYID = 6
1,175,554 UART: [idev] SUBJECT.KEYID = 7
1,175,978 UART: [idev] UDS.KEYID = 0
1,176,323 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,954 UART: [idev] Erasing UDS.KEYID = 0
1,200,847 UART: [idev] Sha1 KeyId Algorithm
1,209,177 UART: [idev] --
1,210,093 UART: [ldev] ++
1,210,261 UART: [ldev] CDI.KEYID = 6
1,210,624 UART: [ldev] SUBJECT.KEYID = 5
1,211,050 UART: [ldev] AUTHORITY.KEYID = 7
1,211,513 UART: [ldev] FE.KEYID = 1
1,216,767 UART: [ldev] Erasing FE.KEYID = 1
1,242,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,487 UART: [ldev] --
1,281,974 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,231 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,535 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,452 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,207 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,436,166 >>> mbox cmd response: failed
2,436,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,172 >>> mbox cmd response: failed
2,436,172 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,178 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,041 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,629,061 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Unprovisioned
85,776 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
893,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,596 UART: [kat] ++
897,748 UART: [kat] sha1
902,068 UART: [kat] SHA2-256
904,008 UART: [kat] SHA2-384
906,771 UART: [kat] SHA2-512-ACC
908,672 UART: [kat] ECC-384
918,535 UART: [kat] HMAC-384Kdf
923,019 UART: [kat] LMS
1,171,347 UART: [kat] --
1,172,172 UART: [cold-reset] ++
1,172,670 UART: [fht] FHT @ 0x50003400
1,175,205 UART: [idev] ++
1,175,373 UART: [idev] CDI.KEYID = 6
1,175,733 UART: [idev] SUBJECT.KEYID = 7
1,176,157 UART: [idev] UDS.KEYID = 0
1,176,502 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,507 UART: [idev] Erasing UDS.KEYID = 0
1,201,112 UART: [idev] Sha1 KeyId Algorithm
1,209,762 UART: [idev] --
1,210,658 UART: [ldev] ++
1,210,826 UART: [ldev] CDI.KEYID = 6
1,211,189 UART: [ldev] SUBJECT.KEYID = 5
1,211,615 UART: [ldev] AUTHORITY.KEYID = 7
1,212,078 UART: [ldev] FE.KEYID = 1
1,217,298 UART: [ldev] Erasing FE.KEYID = 1
1,243,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,796 UART: [ldev] --
1,283,107 UART: [fwproc] Wait for Commands...
1,283,685 UART: [fwproc] Recv command 0x46574c44
1,284,413 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,701 UART: ROM Fatal Error: 0x000B0028
2,583,858 >>> mbox cmd response: failed
2,583,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,864 >>> mbox cmd response: failed
2,583,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,870 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,037 UART: [state] LifecycleState = Unprovisioned
85,692 UART: [state] DebugLocked = No
86,266 UART: [state] WD Timer not started. Device not locked for debugging
87,543 UART: [kat] SHA2-256
893,193 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,318 UART: [kat] ++
897,470 UART: [kat] sha1
901,796 UART: [kat] SHA2-256
903,736 UART: [kat] SHA2-384
906,601 UART: [kat] SHA2-512-ACC
908,502 UART: [kat] ECC-384
918,071 UART: [kat] HMAC-384Kdf
922,603 UART: [kat] LMS
1,170,931 UART: [kat] --
1,171,858 UART: [cold-reset] ++
1,172,188 UART: [fht] FHT @ 0x50003400
1,174,939 UART: [idev] ++
1,175,107 UART: [idev] CDI.KEYID = 6
1,175,467 UART: [idev] SUBJECT.KEYID = 7
1,175,891 UART: [idev] UDS.KEYID = 0
1,176,236 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,905 UART: [idev] Erasing UDS.KEYID = 0
1,201,186 UART: [idev] Sha1 KeyId Algorithm
1,209,668 UART: [idev] --
1,210,792 UART: [ldev] ++
1,210,960 UART: [ldev] CDI.KEYID = 6
1,211,323 UART: [ldev] SUBJECT.KEYID = 5
1,211,749 UART: [ldev] AUTHORITY.KEYID = 7
1,212,212 UART: [ldev] FE.KEYID = 1
1,217,592 UART: [ldev] Erasing FE.KEYID = 1
1,244,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,084 UART: [ldev] --
1,283,587 UART: [fwproc] Wait for Commands...
1,284,213 UART: [fwproc] Recv command 0x46574c44
1,284,941 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,657 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,496 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,800 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,497 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,428 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,436,181 >>> mbox cmd response: failed
2,436,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,187 >>> mbox cmd response: failed
2,436,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,193 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,670 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,758 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,255 UART: [kat] ++
895,407 UART: [kat] sha1
899,603 UART: [kat] SHA2-256
901,543 UART: [kat] SHA2-384
904,112 UART: [kat] SHA2-512-ACC
906,013 UART: [kat] ECC-384
915,342 UART: [kat] HMAC-384Kdf
919,890 UART: [kat] LMS
1,168,202 UART: [kat] --
1,168,939 UART: [cold-reset] ++
1,169,421 UART: [fht] FHT @ 0x50003400
1,172,123 UART: [idev] ++
1,172,291 UART: [idev] CDI.KEYID = 6
1,172,652 UART: [idev] SUBJECT.KEYID = 7
1,173,077 UART: [idev] UDS.KEYID = 0
1,173,423 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,667 UART: [idev] Erasing UDS.KEYID = 0
1,198,153 UART: [idev] Sha1 KeyId Algorithm
1,207,091 UART: [idev] --
1,208,210 UART: [ldev] ++
1,208,378 UART: [ldev] CDI.KEYID = 6
1,208,742 UART: [ldev] SUBJECT.KEYID = 5
1,209,169 UART: [ldev] AUTHORITY.KEYID = 7
1,209,632 UART: [ldev] FE.KEYID = 1
1,214,860 UART: [ldev] Erasing FE.KEYID = 1
1,240,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,512 UART: [ldev] --
1,279,820 UART: [fwproc] Wait for Commands...
1,280,441 UART: [fwproc] Recv command 0x46574c44
1,281,174 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,928 UART: ROM Fatal Error: 0x000B0028
2,580,085 >>> mbox cmd response: failed
2,580,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,091 >>> mbox cmd response: failed
2,580,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,097 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,387 UART: [kat] SHA2-256
901,327 UART: [kat] SHA2-384
904,032 UART: [kat] SHA2-512-ACC
905,933 UART: [kat] ECC-384
915,278 UART: [kat] HMAC-384Kdf
919,824 UART: [kat] LMS
1,168,136 UART: [kat] --
1,168,941 UART: [cold-reset] ++
1,169,441 UART: [fht] FHT @ 0x50003400
1,172,087 UART: [idev] ++
1,172,255 UART: [idev] CDI.KEYID = 6
1,172,616 UART: [idev] SUBJECT.KEYID = 7
1,173,041 UART: [idev] UDS.KEYID = 0
1,173,387 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,099 UART: [idev] Erasing UDS.KEYID = 0
1,198,143 UART: [idev] Sha1 KeyId Algorithm
1,207,185 UART: [idev] --
1,208,222 UART: [ldev] ++
1,208,390 UART: [ldev] CDI.KEYID = 6
1,208,754 UART: [ldev] SUBJECT.KEYID = 5
1,209,181 UART: [ldev] AUTHORITY.KEYID = 7
1,209,644 UART: [ldev] FE.KEYID = 1
1,214,986 UART: [ldev] Erasing FE.KEYID = 1
1,241,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,486 UART: [ldev] --
1,280,762 UART: [fwproc] Wait for Commands...
1,281,543 UART: [fwproc] Recv command 0x46574c44
1,282,276 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,695 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,004 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,924 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,972 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,432,274 >>> mbox cmd response: failed
2,432,274 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,280 >>> mbox cmd response: failed
2,432,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,286 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,964 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,786 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
891,629 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,758 UART: [kat] ++
895,910 UART: [kat] sha1
900,202 UART: [kat] SHA2-256
902,142 UART: [kat] SHA2-384
904,815 UART: [kat] SHA2-512-ACC
906,716 UART: [kat] ECC-384
916,073 UART: [kat] HMAC-384Kdf
920,705 UART: [kat] LMS
1,169,017 UART: [kat] --
1,170,016 UART: [cold-reset] ++
1,170,580 UART: [fht] FHT @ 0x50003400
1,173,126 UART: [idev] ++
1,173,294 UART: [idev] CDI.KEYID = 6
1,173,655 UART: [idev] SUBJECT.KEYID = 7
1,174,080 UART: [idev] UDS.KEYID = 0
1,174,426 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,016 UART: [idev] Erasing UDS.KEYID = 0
1,198,804 UART: [idev] Sha1 KeyId Algorithm
1,207,594 UART: [idev] --
1,208,729 UART: [ldev] ++
1,208,897 UART: [ldev] CDI.KEYID = 6
1,209,261 UART: [ldev] SUBJECT.KEYID = 5
1,209,688 UART: [ldev] AUTHORITY.KEYID = 7
1,210,151 UART: [ldev] FE.KEYID = 1
1,215,525 UART: [ldev] Erasing FE.KEYID = 1
1,241,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,709 UART: [ldev] --
1,281,205 UART: [fwproc] Wait for Commands...
1,281,814 UART: [fwproc] Recv command 0x46574c44
1,282,547 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,871 UART: ROM Fatal Error: 0x000B0028
2,581,028 >>> mbox cmd response: failed
2,581,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,034 >>> mbox cmd response: failed
2,581,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,040 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,131 UART: [state] LifecycleState = Unprovisioned
85,786 UART: [state] DebugLocked = No
86,508 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,970 UART: [kat] SHA2-256
901,910 UART: [kat] SHA2-384
904,737 UART: [kat] SHA2-512-ACC
906,638 UART: [kat] ECC-384
916,609 UART: [kat] HMAC-384Kdf
921,257 UART: [kat] LMS
1,169,569 UART: [kat] --
1,170,750 UART: [cold-reset] ++
1,171,164 UART: [fht] FHT @ 0x50003400
1,173,874 UART: [idev] ++
1,174,042 UART: [idev] CDI.KEYID = 6
1,174,403 UART: [idev] SUBJECT.KEYID = 7
1,174,828 UART: [idev] UDS.KEYID = 0
1,175,174 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,488 UART: [idev] Erasing UDS.KEYID = 0
1,199,048 UART: [idev] Sha1 KeyId Algorithm
1,207,992 UART: [idev] --
1,209,073 UART: [ldev] ++
1,209,241 UART: [ldev] CDI.KEYID = 6
1,209,605 UART: [ldev] SUBJECT.KEYID = 5
1,210,032 UART: [ldev] AUTHORITY.KEYID = 7
1,210,495 UART: [ldev] FE.KEYID = 1
1,215,593 UART: [ldev] Erasing FE.KEYID = 1
1,242,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,431 UART: [ldev] --
1,281,745 UART: [fwproc] Wait for Commands...
1,282,362 UART: [fwproc] Recv command 0x46574c44
1,283,095 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,234 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,543 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,471 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,865 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,431,447 >>> mbox cmd response: failed
2,431,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,453 >>> mbox cmd response: failed
2,431,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,459 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,365 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,771 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,523 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,073 UART: [kat] SHA2-256
882,004 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,119 UART: [kat] ++
886,271 UART: [kat] sha1
890,373 UART: [kat] SHA2-256
892,311 UART: [kat] SHA2-384
895,220 UART: [kat] SHA2-512-ACC
897,121 UART: [kat] ECC-384
902,756 UART: [kat] HMAC-384Kdf
907,262 UART: [kat] LMS
1,475,458 UART: [kat] --
1,476,231 UART: [cold-reset] ++
1,476,565 UART: [fht] Storing FHT @ 0x50003400
1,479,232 UART: [idev] ++
1,479,400 UART: [idev] CDI.KEYID = 6
1,479,760 UART: [idev] SUBJECT.KEYID = 7
1,480,184 UART: [idev] UDS.KEYID = 0
1,480,529 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,254 UART: [idev] Erasing UDS.KEYID = 0
1,504,844 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,532 UART: [idev] --
1,514,605 UART: [ldev] ++
1,514,773 UART: [ldev] CDI.KEYID = 6
1,515,136 UART: [ldev] SUBJECT.KEYID = 5
1,515,562 UART: [ldev] AUTHORITY.KEYID = 7
1,516,025 UART: [ldev] FE.KEYID = 1
1,521,301 UART: [ldev] Erasing FE.KEYID = 1
1,546,868 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,684 UART: [ldev] --
1,586,163 UART: [fwproc] Waiting for Commands...
1,586,914 UART: [fwproc] Received command 0x46574c44
1,587,705 UART: [fwproc] Received Image of size 114332 bytes
2,885,473 UART: ROM Fatal Error: 0x000B0029
2,886,630 >>> mbox cmd response: failed
2,886,630 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,636 >>> mbox cmd response: failed
2,886,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,642 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,221 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,875 UART: [kat] SHA2-256
881,806 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,921 UART: [kat] ++
886,073 UART: [kat] sha1
890,457 UART: [kat] SHA2-256
892,395 UART: [kat] SHA2-384
895,078 UART: [kat] SHA2-512-ACC
896,979 UART: [kat] ECC-384
902,260 UART: [kat] HMAC-384Kdf
907,034 UART: [kat] LMS
1,475,230 UART: [kat] --
1,476,015 UART: [cold-reset] ++
1,476,535 UART: [fht] Storing FHT @ 0x50003400
1,479,352 UART: [idev] ++
1,479,520 UART: [idev] CDI.KEYID = 6
1,479,880 UART: [idev] SUBJECT.KEYID = 7
1,480,304 UART: [idev] UDS.KEYID = 0
1,480,649 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,362 UART: [idev] Erasing UDS.KEYID = 0
1,504,962 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,504 UART: [idev] --
1,514,611 UART: [ldev] ++
1,514,779 UART: [ldev] CDI.KEYID = 6
1,515,142 UART: [ldev] SUBJECT.KEYID = 5
1,515,568 UART: [ldev] AUTHORITY.KEYID = 7
1,516,031 UART: [ldev] FE.KEYID = 1
1,521,157 UART: [ldev] Erasing FE.KEYID = 1
1,546,424 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,172 UART: [ldev] --
1,585,661 UART: [fwproc] Waiting for Commands...
1,586,506 UART: [fwproc] Received command 0x46574c44
1,587,297 UART: [fwproc] Received Image of size 114332 bytes
2,885,224 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,502 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,854 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,799 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,893 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,739,629 >>> mbox cmd response: failed
2,739,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,635 >>> mbox cmd response: failed
2,739,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,641 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,011 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,275 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,898 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,444 UART: [kat] SHA2-256
882,375 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,490 UART: [kat] ++
886,642 UART: [kat] sha1
890,728 UART: [kat] SHA2-256
892,666 UART: [kat] SHA2-384
895,407 UART: [kat] SHA2-512-ACC
897,308 UART: [kat] ECC-384
902,991 UART: [kat] HMAC-384Kdf
907,497 UART: [kat] LMS
1,475,693 UART: [kat] --
1,476,464 UART: [cold-reset] ++
1,476,924 UART: [fht] Storing FHT @ 0x50003400
1,479,697 UART: [idev] ++
1,479,865 UART: [idev] CDI.KEYID = 6
1,480,225 UART: [idev] SUBJECT.KEYID = 7
1,480,649 UART: [idev] UDS.KEYID = 0
1,480,994 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,061 UART: [idev] Erasing UDS.KEYID = 0
1,504,737 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,337 UART: [idev] --
1,514,580 UART: [ldev] ++
1,514,748 UART: [ldev] CDI.KEYID = 6
1,515,111 UART: [ldev] SUBJECT.KEYID = 5
1,515,537 UART: [ldev] AUTHORITY.KEYID = 7
1,516,000 UART: [ldev] FE.KEYID = 1
1,521,200 UART: [ldev] Erasing FE.KEYID = 1
1,546,019 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,035 UART: [ldev] --
1,585,440 UART: [fwproc] Waiting for Commands...
1,586,067 UART: [fwproc] Received command 0x46574c44
1,586,858 UART: [fwproc] Received Image of size 114332 bytes
2,883,922 UART: ROM Fatal Error: 0x000B0029
2,885,079 >>> mbox cmd response: failed
2,885,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,085 >>> mbox cmd response: failed
2,885,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,091 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,410 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,936 UART: [kat] SHA2-256
881,867 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,982 UART: [kat] ++
886,134 UART: [kat] sha1
890,268 UART: [kat] SHA2-256
892,206 UART: [kat] SHA2-384
894,997 UART: [kat] SHA2-512-ACC
896,898 UART: [kat] ECC-384
902,771 UART: [kat] HMAC-384Kdf
907,439 UART: [kat] LMS
1,475,635 UART: [kat] --
1,476,388 UART: [cold-reset] ++
1,476,806 UART: [fht] Storing FHT @ 0x50003400
1,479,701 UART: [idev] ++
1,479,869 UART: [idev] CDI.KEYID = 6
1,480,229 UART: [idev] SUBJECT.KEYID = 7
1,480,653 UART: [idev] UDS.KEYID = 0
1,480,998 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,949 UART: [idev] Erasing UDS.KEYID = 0
1,505,567 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,105 UART: [idev] --
1,515,286 UART: [ldev] ++
1,515,454 UART: [ldev] CDI.KEYID = 6
1,515,817 UART: [ldev] SUBJECT.KEYID = 5
1,516,243 UART: [ldev] AUTHORITY.KEYID = 7
1,516,706 UART: [ldev] FE.KEYID = 1
1,521,940 UART: [ldev] Erasing FE.KEYID = 1
1,547,281 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,083 UART: [ldev] --
1,586,578 UART: [fwproc] Waiting for Commands...
1,587,381 UART: [fwproc] Received command 0x46574c44
1,588,172 UART: [fwproc] Received Image of size 114332 bytes
2,885,445 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,279 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,631 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,444 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,932 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,740,628 >>> mbox cmd response: failed
2,740,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,634 >>> mbox cmd response: failed
2,740,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,640 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,886 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,402 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
893,334 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,459 UART: [kat] ++
897,611 UART: [kat] sha1
902,041 UART: [kat] SHA2-256
903,981 UART: [kat] SHA2-384
906,650 UART: [kat] SHA2-512-ACC
908,551 UART: [kat] ECC-384
918,306 UART: [kat] HMAC-384Kdf
922,882 UART: [kat] LMS
1,171,210 UART: [kat] --
1,172,173 UART: [cold-reset] ++
1,172,635 UART: [fht] FHT @ 0x50003400
1,175,272 UART: [idev] ++
1,175,440 UART: [idev] CDI.KEYID = 6
1,175,800 UART: [idev] SUBJECT.KEYID = 7
1,176,224 UART: [idev] UDS.KEYID = 0
1,176,569 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,856 UART: [idev] Erasing UDS.KEYID = 0
1,201,005 UART: [idev] Sha1 KeyId Algorithm
1,209,653 UART: [idev] --
1,210,691 UART: [ldev] ++
1,210,859 UART: [ldev] CDI.KEYID = 6
1,211,222 UART: [ldev] SUBJECT.KEYID = 5
1,211,648 UART: [ldev] AUTHORITY.KEYID = 7
1,212,111 UART: [ldev] FE.KEYID = 1
1,217,433 UART: [ldev] Erasing FE.KEYID = 1
1,244,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,929 UART: [ldev] --
1,283,322 UART: [fwproc] Wait for Commands...
1,284,046 UART: [fwproc] Recv command 0x46574c44
1,284,774 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,946 UART: ROM Fatal Error: 0x000B0029
2,582,103 >>> mbox cmd response: failed
2,582,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,109 >>> mbox cmd response: failed
2,582,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,115 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,483 UART: [kat] SHA2-256
903,423 UART: [kat] SHA2-384
906,262 UART: [kat] SHA2-512-ACC
908,163 UART: [kat] ECC-384
917,890 UART: [kat] HMAC-384Kdf
922,398 UART: [kat] LMS
1,170,726 UART: [kat] --
1,171,623 UART: [cold-reset] ++
1,172,143 UART: [fht] FHT @ 0x50003400
1,174,748 UART: [idev] ++
1,174,916 UART: [idev] CDI.KEYID = 6
1,175,276 UART: [idev] SUBJECT.KEYID = 7
1,175,700 UART: [idev] UDS.KEYID = 0
1,176,045 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,884 UART: [idev] Erasing UDS.KEYID = 0
1,200,425 UART: [idev] Sha1 KeyId Algorithm
1,208,997 UART: [idev] --
1,209,935 UART: [ldev] ++
1,210,103 UART: [ldev] CDI.KEYID = 6
1,210,466 UART: [ldev] SUBJECT.KEYID = 5
1,210,892 UART: [ldev] AUTHORITY.KEYID = 7
1,211,355 UART: [ldev] FE.KEYID = 1
1,216,411 UART: [ldev] Erasing FE.KEYID = 1
1,242,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,923 UART: [ldev] --
1,281,404 UART: [fwproc] Wait for Commands...
1,282,220 UART: [fwproc] Recv command 0x46574c44
1,282,948 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,711 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,015 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,850 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,899 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,436,288 >>> mbox cmd response: failed
2,436,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,294 >>> mbox cmd response: failed
2,436,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,300 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,973 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,771 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
893,637 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,762 UART: [kat] ++
897,914 UART: [kat] sha1
902,172 UART: [kat] SHA2-256
904,112 UART: [kat] SHA2-384
906,861 UART: [kat] SHA2-512-ACC
908,762 UART: [kat] ECC-384
918,555 UART: [kat] HMAC-384Kdf
923,275 UART: [kat] LMS
1,171,603 UART: [kat] --
1,172,332 UART: [cold-reset] ++
1,172,854 UART: [fht] FHT @ 0x50003400
1,175,543 UART: [idev] ++
1,175,711 UART: [idev] CDI.KEYID = 6
1,176,071 UART: [idev] SUBJECT.KEYID = 7
1,176,495 UART: [idev] UDS.KEYID = 0
1,176,840 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,673 UART: [idev] Erasing UDS.KEYID = 0
1,201,586 UART: [idev] Sha1 KeyId Algorithm
1,210,202 UART: [idev] --
1,211,158 UART: [ldev] ++
1,211,326 UART: [ldev] CDI.KEYID = 6
1,211,689 UART: [ldev] SUBJECT.KEYID = 5
1,212,115 UART: [ldev] AUTHORITY.KEYID = 7
1,212,578 UART: [ldev] FE.KEYID = 1
1,217,762 UART: [ldev] Erasing FE.KEYID = 1
1,243,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,828 UART: [ldev] --
1,283,091 UART: [fwproc] Wait for Commands...
1,283,891 UART: [fwproc] Recv command 0x46574c44
1,284,619 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,237 UART: ROM Fatal Error: 0x000B0029
2,582,394 >>> mbox cmd response: failed
2,582,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,400 >>> mbox cmd response: failed
2,582,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,406 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
893,481 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,606 UART: [kat] ++
897,758 UART: [kat] sha1
901,974 UART: [kat] SHA2-256
903,914 UART: [kat] SHA2-384
906,791 UART: [kat] SHA2-512-ACC
908,692 UART: [kat] ECC-384
918,429 UART: [kat] HMAC-384Kdf
923,015 UART: [kat] LMS
1,171,343 UART: [kat] --
1,172,246 UART: [cold-reset] ++
1,172,800 UART: [fht] FHT @ 0x50003400
1,175,375 UART: [idev] ++
1,175,543 UART: [idev] CDI.KEYID = 6
1,175,903 UART: [idev] SUBJECT.KEYID = 7
1,176,327 UART: [idev] UDS.KEYID = 0
1,176,672 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,337 UART: [idev] Erasing UDS.KEYID = 0
1,201,780 UART: [idev] Sha1 KeyId Algorithm
1,210,338 UART: [idev] --
1,211,360 UART: [ldev] ++
1,211,528 UART: [ldev] CDI.KEYID = 6
1,211,891 UART: [ldev] SUBJECT.KEYID = 5
1,212,317 UART: [ldev] AUTHORITY.KEYID = 7
1,212,780 UART: [ldev] FE.KEYID = 1
1,217,840 UART: [ldev] Erasing FE.KEYID = 1
1,243,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,756 UART: [ldev] --
1,283,247 UART: [fwproc] Wait for Commands...
1,283,945 UART: [fwproc] Recv command 0x46574c44
1,284,673 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,474 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,778 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,559 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,836 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,437,069 >>> mbox cmd response: failed
2,437,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,075 >>> mbox cmd response: failed
2,437,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,081 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,424 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,922 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
891,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,183 UART: [kat] ++
895,335 UART: [kat] sha1
899,599 UART: [kat] SHA2-256
901,539 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
915,534 UART: [kat] HMAC-384Kdf
920,128 UART: [kat] LMS
1,168,440 UART: [kat] --
1,169,039 UART: [cold-reset] ++
1,169,417 UART: [fht] FHT @ 0x50003400
1,172,187 UART: [idev] ++
1,172,355 UART: [idev] CDI.KEYID = 6
1,172,716 UART: [idev] SUBJECT.KEYID = 7
1,173,141 UART: [idev] UDS.KEYID = 0
1,173,487 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,819 UART: [idev] Erasing UDS.KEYID = 0
1,198,039 UART: [idev] Sha1 KeyId Algorithm
1,206,907 UART: [idev] --
1,208,092 UART: [ldev] ++
1,208,260 UART: [ldev] CDI.KEYID = 6
1,208,624 UART: [ldev] SUBJECT.KEYID = 5
1,209,051 UART: [ldev] AUTHORITY.KEYID = 7
1,209,514 UART: [ldev] FE.KEYID = 1
1,214,802 UART: [ldev] Erasing FE.KEYID = 1
1,241,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,036 UART: [ldev] --
1,280,536 UART: [fwproc] Wait for Commands...
1,281,219 UART: [fwproc] Recv command 0x46574c44
1,281,952 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,628 UART: ROM Fatal Error: 0x000B0029
2,580,785 >>> mbox cmd response: failed
2,580,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,791 >>> mbox cmd response: failed
2,580,791 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,797 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,738 UART: [state] LifecycleState = Unprovisioned
86,393 UART: [state] DebugLocked = No
87,097 UART: [state] WD Timer not started. Device not locked for debugging
88,356 UART: [kat] SHA2-256
891,906 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,035 UART: [kat] ++
896,187 UART: [kat] sha1
900,579 UART: [kat] SHA2-256
902,519 UART: [kat] SHA2-384
905,234 UART: [kat] SHA2-512-ACC
907,135 UART: [kat] ECC-384
917,132 UART: [kat] HMAC-384Kdf
921,588 UART: [kat] LMS
1,169,900 UART: [kat] --
1,170,869 UART: [cold-reset] ++
1,171,397 UART: [fht] FHT @ 0x50003400
1,173,913 UART: [idev] ++
1,174,081 UART: [idev] CDI.KEYID = 6
1,174,442 UART: [idev] SUBJECT.KEYID = 7
1,174,867 UART: [idev] UDS.KEYID = 0
1,175,213 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,209 UART: [idev] Erasing UDS.KEYID = 0
1,200,667 UART: [idev] Sha1 KeyId Algorithm
1,209,465 UART: [idev] --
1,210,462 UART: [ldev] ++
1,210,630 UART: [ldev] CDI.KEYID = 6
1,210,994 UART: [ldev] SUBJECT.KEYID = 5
1,211,421 UART: [ldev] AUTHORITY.KEYID = 7
1,211,884 UART: [ldev] FE.KEYID = 1
1,217,068 UART: [ldev] Erasing FE.KEYID = 1
1,243,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,016 UART: [ldev] --
1,282,330 UART: [fwproc] Wait for Commands...
1,282,959 UART: [fwproc] Recv command 0x46574c44
1,283,692 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,511 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,399 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,708 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,540 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,204 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,433,060 >>> mbox cmd response: failed
2,433,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,066 >>> mbox cmd response: failed
2,433,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,072 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,040 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,592 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Unprovisioned
85,730 UART: [state] DebugLocked = No
86,320 UART: [state] WD Timer not started. Device not locked for debugging
87,539 UART: [kat] SHA2-256
891,089 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,218 UART: [kat] ++
895,370 UART: [kat] sha1
899,676 UART: [kat] SHA2-256
901,616 UART: [kat] SHA2-384
904,405 UART: [kat] SHA2-512-ACC
906,306 UART: [kat] ECC-384
915,763 UART: [kat] HMAC-384Kdf
920,441 UART: [kat] LMS
1,168,753 UART: [kat] --
1,169,594 UART: [cold-reset] ++
1,170,022 UART: [fht] FHT @ 0x50003400
1,172,668 UART: [idev] ++
1,172,836 UART: [idev] CDI.KEYID = 6
1,173,197 UART: [idev] SUBJECT.KEYID = 7
1,173,622 UART: [idev] UDS.KEYID = 0
1,173,968 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,430 UART: [idev] Erasing UDS.KEYID = 0
1,198,590 UART: [idev] Sha1 KeyId Algorithm
1,207,598 UART: [idev] --
1,208,741 UART: [ldev] ++
1,208,909 UART: [ldev] CDI.KEYID = 6
1,209,273 UART: [ldev] SUBJECT.KEYID = 5
1,209,700 UART: [ldev] AUTHORITY.KEYID = 7
1,210,163 UART: [ldev] FE.KEYID = 1
1,215,259 UART: [ldev] Erasing FE.KEYID = 1
1,241,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,819 UART: [ldev] --
1,281,237 UART: [fwproc] Wait for Commands...
1,281,886 UART: [fwproc] Recv command 0x46574c44
1,282,619 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,615 UART: ROM Fatal Error: 0x000B0029
2,581,772 >>> mbox cmd response: failed
2,581,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,778 >>> mbox cmd response: failed
2,581,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,784 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
891,535 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,664 UART: [kat] ++
895,816 UART: [kat] sha1
900,074 UART: [kat] SHA2-256
902,014 UART: [kat] SHA2-384
904,973 UART: [kat] SHA2-512-ACC
906,874 UART: [kat] ECC-384
917,063 UART: [kat] HMAC-384Kdf
921,699 UART: [kat] LMS
1,170,011 UART: [kat] --
1,171,154 UART: [cold-reset] ++
1,171,618 UART: [fht] FHT @ 0x50003400
1,174,348 UART: [idev] ++
1,174,516 UART: [idev] CDI.KEYID = 6
1,174,877 UART: [idev] SUBJECT.KEYID = 7
1,175,302 UART: [idev] UDS.KEYID = 0
1,175,648 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,298 UART: [idev] Erasing UDS.KEYID = 0
1,199,996 UART: [idev] Sha1 KeyId Algorithm
1,208,686 UART: [idev] --
1,209,569 UART: [ldev] ++
1,209,737 UART: [ldev] CDI.KEYID = 6
1,210,101 UART: [ldev] SUBJECT.KEYID = 5
1,210,528 UART: [ldev] AUTHORITY.KEYID = 7
1,210,991 UART: [ldev] FE.KEYID = 1
1,216,225 UART: [ldev] Erasing FE.KEYID = 1
1,242,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,291 UART: [ldev] --
1,281,603 UART: [fwproc] Wait for Commands...
1,282,232 UART: [fwproc] Recv command 0x46574c44
1,282,965 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,318 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,298 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,607 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,361 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,051 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,434,035 >>> mbox cmd response: failed
2,434,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,041 >>> mbox cmd response: failed
2,434,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,047 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,583 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,437 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,637 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,119 UART: [kat] SHA2-256
882,050 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,165 UART: [kat] ++
886,317 UART: [kat] sha1
890,457 UART: [kat] SHA2-256
892,395 UART: [kat] SHA2-384
895,232 UART: [kat] SHA2-512-ACC
897,133 UART: [kat] ECC-384
902,612 UART: [kat] HMAC-384Kdf
907,232 UART: [kat] LMS
1,475,428 UART: [kat] --
1,476,595 UART: [cold-reset] ++
1,477,085 UART: [fht] Storing FHT @ 0x50003400
1,480,044 UART: [idev] ++
1,480,212 UART: [idev] CDI.KEYID = 6
1,480,572 UART: [idev] SUBJECT.KEYID = 7
1,480,996 UART: [idev] UDS.KEYID = 0
1,481,341 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,898 UART: [idev] Erasing UDS.KEYID = 0
1,505,452 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,028 UART: [idev] --
1,514,933 UART: [ldev] ++
1,515,101 UART: [ldev] CDI.KEYID = 6
1,515,464 UART: [ldev] SUBJECT.KEYID = 5
1,515,890 UART: [ldev] AUTHORITY.KEYID = 7
1,516,353 UART: [ldev] FE.KEYID = 1
1,521,709 UART: [ldev] Erasing FE.KEYID = 1
1,546,912 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,100 UART: [ldev] --
1,586,497 UART: [fwproc] Waiting for Commands...
1,587,362 UART: [fwproc] Received command 0x46574c44
1,588,153 UART: [fwproc] Received Image of size 114332 bytes
1,635,539 UART: ROM Fatal Error: 0x000B003F
1,636,698 >>> mbox cmd response: failed
1,636,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,704 >>> mbox cmd response: failed
1,636,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,710 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,059 UART: [kat] SHA2-256
881,990 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,105 UART: [kat] ++
886,257 UART: [kat] sha1
890,523 UART: [kat] SHA2-256
892,461 UART: [kat] SHA2-384
895,396 UART: [kat] SHA2-512-ACC
897,297 UART: [kat] ECC-384
902,824 UART: [kat] HMAC-384Kdf
907,480 UART: [kat] LMS
1,475,676 UART: [kat] --
1,476,591 UART: [cold-reset] ++
1,477,171 UART: [fht] Storing FHT @ 0x50003400
1,479,990 UART: [idev] ++
1,480,158 UART: [idev] CDI.KEYID = 6
1,480,518 UART: [idev] SUBJECT.KEYID = 7
1,480,942 UART: [idev] UDS.KEYID = 0
1,481,287 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,966 UART: [idev] Erasing UDS.KEYID = 0
1,505,730 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,518 UART: [idev] --
1,515,691 UART: [ldev] ++
1,515,859 UART: [ldev] CDI.KEYID = 6
1,516,222 UART: [ldev] SUBJECT.KEYID = 5
1,516,648 UART: [ldev] AUTHORITY.KEYID = 7
1,517,111 UART: [ldev] FE.KEYID = 1
1,522,081 UART: [ldev] Erasing FE.KEYID = 1
1,547,660 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,770 UART: [ldev] --
1,587,263 UART: [fwproc] Waiting for Commands...
1,588,132 UART: [fwproc] Received command 0x46574c44
1,588,923 UART: [fwproc] Received Image of size 114332 bytes
2,887,338 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,520 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,872 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,819 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,835 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,159 >>> mbox cmd response: failed
1,489,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,165 >>> mbox cmd response: failed
1,489,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,171 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,795 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,599 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,538 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,154 UART: [kat] SHA2-256
882,085 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,200 UART: [kat] ++
886,352 UART: [kat] sha1
890,454 UART: [kat] SHA2-256
892,392 UART: [kat] SHA2-384
895,123 UART: [kat] SHA2-512-ACC
897,024 UART: [kat] ECC-384
902,513 UART: [kat] HMAC-384Kdf
907,181 UART: [kat] LMS
1,475,377 UART: [kat] --
1,475,974 UART: [cold-reset] ++
1,476,422 UART: [fht] Storing FHT @ 0x50003400
1,479,397 UART: [idev] ++
1,479,565 UART: [idev] CDI.KEYID = 6
1,479,925 UART: [idev] SUBJECT.KEYID = 7
1,480,349 UART: [idev] UDS.KEYID = 0
1,480,694 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,601 UART: [idev] Erasing UDS.KEYID = 0
1,505,713 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,443 UART: [idev] --
1,515,540 UART: [ldev] ++
1,515,708 UART: [ldev] CDI.KEYID = 6
1,516,071 UART: [ldev] SUBJECT.KEYID = 5
1,516,497 UART: [ldev] AUTHORITY.KEYID = 7
1,516,960 UART: [ldev] FE.KEYID = 1
1,522,330 UART: [ldev] Erasing FE.KEYID = 1
1,548,177 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,885 UART: [ldev] --
1,587,290 UART: [fwproc] Waiting for Commands...
1,587,947 UART: [fwproc] Received command 0x46574c44
1,588,738 UART: [fwproc] Received Image of size 114332 bytes
1,636,966 UART: ROM Fatal Error: 0x000B003F
1,638,125 >>> mbox cmd response: failed
1,638,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,131 >>> mbox cmd response: failed
1,638,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,137 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,628 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,342 UART: [kat] SHA2-256
882,273 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,388 UART: [kat] ++
886,540 UART: [kat] sha1
890,936 UART: [kat] SHA2-256
892,874 UART: [kat] SHA2-384
895,741 UART: [kat] SHA2-512-ACC
897,642 UART: [kat] ECC-384
903,375 UART: [kat] HMAC-384Kdf
908,017 UART: [kat] LMS
1,476,213 UART: [kat] --
1,477,394 UART: [cold-reset] ++
1,477,926 UART: [fht] Storing FHT @ 0x50003400
1,480,669 UART: [idev] ++
1,480,837 UART: [idev] CDI.KEYID = 6
1,481,197 UART: [idev] SUBJECT.KEYID = 7
1,481,621 UART: [idev] UDS.KEYID = 0
1,481,966 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,929 UART: [idev] Erasing UDS.KEYID = 0
1,506,865 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,293 UART: [idev] --
1,516,478 UART: [ldev] ++
1,516,646 UART: [ldev] CDI.KEYID = 6
1,517,009 UART: [ldev] SUBJECT.KEYID = 5
1,517,435 UART: [ldev] AUTHORITY.KEYID = 7
1,517,898 UART: [ldev] FE.KEYID = 1
1,523,144 UART: [ldev] Erasing FE.KEYID = 1
1,548,939 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,261 UART: [ldev] --
1,588,756 UART: [fwproc] Waiting for Commands...
1,589,455 UART: [fwproc] Received command 0x46574c44
1,590,246 UART: [fwproc] Received Image of size 114332 bytes
2,888,385 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,553 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,905 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,746 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,780 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,316 >>> mbox cmd response: failed
1,488,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,322 >>> mbox cmd response: failed
1,488,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,328 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,540 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,816 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,796 UART: [state] LifecycleState = Unprovisioned
85,451 UART: [state] DebugLocked = No
86,011 UART: [state] WD Timer not started. Device not locked for debugging
87,326 UART: [kat] SHA2-256
892,976 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,101 UART: [kat] ++
897,253 UART: [kat] sha1
901,595 UART: [kat] SHA2-256
903,535 UART: [kat] SHA2-384
906,202 UART: [kat] SHA2-512-ACC
908,103 UART: [kat] ECC-384
918,096 UART: [kat] HMAC-384Kdf
922,502 UART: [kat] LMS
1,170,830 UART: [kat] --
1,171,937 UART: [cold-reset] ++
1,172,347 UART: [fht] FHT @ 0x50003400
1,174,814 UART: [idev] ++
1,174,982 UART: [idev] CDI.KEYID = 6
1,175,342 UART: [idev] SUBJECT.KEYID = 7
1,175,766 UART: [idev] UDS.KEYID = 0
1,176,111 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,976 UART: [idev] Erasing UDS.KEYID = 0
1,201,111 UART: [idev] Sha1 KeyId Algorithm
1,209,753 UART: [idev] --
1,210,691 UART: [ldev] ++
1,210,859 UART: [ldev] CDI.KEYID = 6
1,211,222 UART: [ldev] SUBJECT.KEYID = 5
1,211,648 UART: [ldev] AUTHORITY.KEYID = 7
1,212,111 UART: [ldev] FE.KEYID = 1
1,217,293 UART: [ldev] Erasing FE.KEYID = 1
1,242,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,579 UART: [ldev] --
1,282,000 UART: [fwproc] Wait for Commands...
1,282,582 UART: [fwproc] Recv command 0x46574c44
1,283,310 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,088 UART: ROM Fatal Error: 0x000B003F
1,331,247 >>> mbox cmd response: failed
1,331,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,253 >>> mbox cmd response: failed
1,331,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,259 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,682 UART: [state] LifecycleState = Unprovisioned
85,337 UART: [state] DebugLocked = No
85,983 UART: [state] WD Timer not started. Device not locked for debugging
87,336 UART: [kat] SHA2-256
892,986 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,111 UART: [kat] ++
897,263 UART: [kat] sha1
901,501 UART: [kat] SHA2-256
903,441 UART: [kat] SHA2-384
906,392 UART: [kat] SHA2-512-ACC
908,293 UART: [kat] ECC-384
918,506 UART: [kat] HMAC-384Kdf
923,270 UART: [kat] LMS
1,171,598 UART: [kat] --
1,172,545 UART: [cold-reset] ++
1,173,125 UART: [fht] FHT @ 0x50003400
1,175,862 UART: [idev] ++
1,176,030 UART: [idev] CDI.KEYID = 6
1,176,390 UART: [idev] SUBJECT.KEYID = 7
1,176,814 UART: [idev] UDS.KEYID = 0
1,177,159 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,776 UART: [idev] Erasing UDS.KEYID = 0
1,202,069 UART: [idev] Sha1 KeyId Algorithm
1,210,565 UART: [idev] --
1,211,695 UART: [ldev] ++
1,211,863 UART: [ldev] CDI.KEYID = 6
1,212,226 UART: [ldev] SUBJECT.KEYID = 5
1,212,652 UART: [ldev] AUTHORITY.KEYID = 7
1,213,115 UART: [ldev] FE.KEYID = 1
1,218,479 UART: [ldev] Erasing FE.KEYID = 1
1,245,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,843 UART: [ldev] --
1,284,202 UART: [fwproc] Wait for Commands...
1,284,950 UART: [fwproc] Recv command 0x46574c44
1,285,678 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,495 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,799 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,610 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,223 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,186,278 >>> mbox cmd response: failed
1,186,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,284 >>> mbox cmd response: failed
1,186,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,290 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,299 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,465 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,450 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
893,457 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,582 UART: [kat] ++
897,734 UART: [kat] sha1
901,928 UART: [kat] SHA2-256
903,868 UART: [kat] SHA2-384
906,711 UART: [kat] SHA2-512-ACC
908,612 UART: [kat] ECC-384
918,541 UART: [kat] HMAC-384Kdf
923,285 UART: [kat] LMS
1,171,613 UART: [kat] --
1,172,688 UART: [cold-reset] ++
1,173,082 UART: [fht] FHT @ 0x50003400
1,175,659 UART: [idev] ++
1,175,827 UART: [idev] CDI.KEYID = 6
1,176,187 UART: [idev] SUBJECT.KEYID = 7
1,176,611 UART: [idev] UDS.KEYID = 0
1,176,956 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,467 UART: [idev] Erasing UDS.KEYID = 0
1,202,076 UART: [idev] Sha1 KeyId Algorithm
1,210,626 UART: [idev] --
1,211,636 UART: [ldev] ++
1,211,804 UART: [ldev] CDI.KEYID = 6
1,212,167 UART: [ldev] SUBJECT.KEYID = 5
1,212,593 UART: [ldev] AUTHORITY.KEYID = 7
1,213,056 UART: [ldev] FE.KEYID = 1
1,218,346 UART: [ldev] Erasing FE.KEYID = 1
1,245,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,842 UART: [ldev] --
1,284,243 UART: [fwproc] Wait for Commands...
1,284,879 UART: [fwproc] Recv command 0x46574c44
1,285,607 UART: [fwproc] Recv'd Img size: 114332 bytes
1,333,217 UART: ROM Fatal Error: 0x000B003F
1,334,376 >>> mbox cmd response: failed
1,334,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,382 >>> mbox cmd response: failed
1,334,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,388 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
893,455 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,580 UART: [kat] ++
897,732 UART: [kat] sha1
901,972 UART: [kat] SHA2-256
903,912 UART: [kat] SHA2-384
906,809 UART: [kat] SHA2-512-ACC
908,710 UART: [kat] ECC-384
918,483 UART: [kat] HMAC-384Kdf
922,975 UART: [kat] LMS
1,171,303 UART: [kat] --
1,172,266 UART: [cold-reset] ++
1,172,608 UART: [fht] FHT @ 0x50003400
1,175,217 UART: [idev] ++
1,175,385 UART: [idev] CDI.KEYID = 6
1,175,745 UART: [idev] SUBJECT.KEYID = 7
1,176,169 UART: [idev] UDS.KEYID = 0
1,176,514 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,623 UART: [idev] Erasing UDS.KEYID = 0
1,201,464 UART: [idev] Sha1 KeyId Algorithm
1,209,918 UART: [idev] --
1,211,050 UART: [ldev] ++
1,211,218 UART: [ldev] CDI.KEYID = 6
1,211,581 UART: [ldev] SUBJECT.KEYID = 5
1,212,007 UART: [ldev] AUTHORITY.KEYID = 7
1,212,470 UART: [ldev] FE.KEYID = 1
1,217,558 UART: [ldev] Erasing FE.KEYID = 1
1,244,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,774 UART: [ldev] --
1,283,041 UART: [fwproc] Wait for Commands...
1,283,785 UART: [fwproc] Recv command 0x46574c44
1,284,513 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,694 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,998 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,713 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,274 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,187,701 >>> mbox cmd response: failed
1,187,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,707 >>> mbox cmd response: failed
1,187,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,713 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,186 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,200 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
891,360 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,489 UART: [kat] ++
895,641 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,418 UART: [kat] SHA2-512-ACC
906,319 UART: [kat] ECC-384
915,570 UART: [kat] HMAC-384Kdf
920,264 UART: [kat] LMS
1,168,576 UART: [kat] --
1,169,369 UART: [cold-reset] ++
1,169,735 UART: [fht] FHT @ 0x50003400
1,172,301 UART: [idev] ++
1,172,469 UART: [idev] CDI.KEYID = 6
1,172,830 UART: [idev] SUBJECT.KEYID = 7
1,173,255 UART: [idev] UDS.KEYID = 0
1,173,601 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,429 UART: [idev] Erasing UDS.KEYID = 0
1,198,089 UART: [idev] Sha1 KeyId Algorithm
1,206,915 UART: [idev] --
1,208,134 UART: [ldev] ++
1,208,302 UART: [ldev] CDI.KEYID = 6
1,208,666 UART: [ldev] SUBJECT.KEYID = 5
1,209,093 UART: [ldev] AUTHORITY.KEYID = 7
1,209,556 UART: [ldev] FE.KEYID = 1
1,214,626 UART: [ldev] Erasing FE.KEYID = 1
1,240,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,552 UART: [ldev] --
1,280,066 UART: [fwproc] Wait for Commands...
1,280,871 UART: [fwproc] Recv command 0x46574c44
1,281,604 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,437 UART: ROM Fatal Error: 0x000B003F
1,329,596 >>> mbox cmd response: failed
1,329,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,602 >>> mbox cmd response: failed
1,329,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,754 UART: [kat] SHA2-256
891,304 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,433 UART: [kat] ++
895,585 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,398 UART: [kat] SHA2-512-ACC
906,299 UART: [kat] ECC-384
916,260 UART: [kat] HMAC-384Kdf
920,984 UART: [kat] LMS
1,169,296 UART: [kat] --
1,170,259 UART: [cold-reset] ++
1,170,709 UART: [fht] FHT @ 0x50003400
1,173,363 UART: [idev] ++
1,173,531 UART: [idev] CDI.KEYID = 6
1,173,892 UART: [idev] SUBJECT.KEYID = 7
1,174,317 UART: [idev] UDS.KEYID = 0
1,174,663 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,461 UART: [idev] Erasing UDS.KEYID = 0
1,199,709 UART: [idev] Sha1 KeyId Algorithm
1,208,651 UART: [idev] --
1,209,574 UART: [ldev] ++
1,209,742 UART: [ldev] CDI.KEYID = 6
1,210,106 UART: [ldev] SUBJECT.KEYID = 5
1,210,533 UART: [ldev] AUTHORITY.KEYID = 7
1,210,996 UART: [ldev] FE.KEYID = 1
1,216,106 UART: [ldev] Erasing FE.KEYID = 1
1,242,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,542 UART: [ldev] --
1,282,028 UART: [fwproc] Wait for Commands...
1,282,613 UART: [fwproc] Recv command 0x46574c44
1,283,346 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,317 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,361 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,670 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,498 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,302 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,079 >>> mbox cmd response: failed
1,182,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,085 >>> mbox cmd response: failed
1,182,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,091 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,378 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,720 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
87,000 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
891,673 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,802 UART: [kat] ++
895,954 UART: [kat] sha1
900,334 UART: [kat] SHA2-256
902,274 UART: [kat] SHA2-384
905,067 UART: [kat] SHA2-512-ACC
906,968 UART: [kat] ECC-384
917,089 UART: [kat] HMAC-384Kdf
921,815 UART: [kat] LMS
1,170,127 UART: [kat] --
1,170,930 UART: [cold-reset] ++
1,171,420 UART: [fht] FHT @ 0x50003400
1,174,126 UART: [idev] ++
1,174,294 UART: [idev] CDI.KEYID = 6
1,174,655 UART: [idev] SUBJECT.KEYID = 7
1,175,080 UART: [idev] UDS.KEYID = 0
1,175,426 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,550 UART: [idev] Erasing UDS.KEYID = 0
1,200,792 UART: [idev] Sha1 KeyId Algorithm
1,209,768 UART: [idev] --
1,210,677 UART: [ldev] ++
1,210,845 UART: [ldev] CDI.KEYID = 6
1,211,209 UART: [ldev] SUBJECT.KEYID = 5
1,211,636 UART: [ldev] AUTHORITY.KEYID = 7
1,212,099 UART: [ldev] FE.KEYID = 1
1,217,497 UART: [ldev] Erasing FE.KEYID = 1
1,243,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,895 UART: [ldev] --
1,283,285 UART: [fwproc] Wait for Commands...
1,284,080 UART: [fwproc] Recv command 0x46574c44
1,284,813 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,934 UART: ROM Fatal Error: 0x000B003F
1,333,093 >>> mbox cmd response: failed
1,333,093 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,099 >>> mbox cmd response: failed
1,333,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,105 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
891,475 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,604 UART: [kat] ++
895,756 UART: [kat] sha1
900,132 UART: [kat] SHA2-256
902,072 UART: [kat] SHA2-384
905,015 UART: [kat] SHA2-512-ACC
906,916 UART: [kat] ECC-384
916,895 UART: [kat] HMAC-384Kdf
921,467 UART: [kat] LMS
1,169,779 UART: [kat] --
1,170,972 UART: [cold-reset] ++
1,171,476 UART: [fht] FHT @ 0x50003400
1,174,196 UART: [idev] ++
1,174,364 UART: [idev] CDI.KEYID = 6
1,174,725 UART: [idev] SUBJECT.KEYID = 7
1,175,150 UART: [idev] UDS.KEYID = 0
1,175,496 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,506 UART: [idev] Erasing UDS.KEYID = 0
1,201,304 UART: [idev] Sha1 KeyId Algorithm
1,210,156 UART: [idev] --
1,211,041 UART: [ldev] ++
1,211,209 UART: [ldev] CDI.KEYID = 6
1,211,573 UART: [ldev] SUBJECT.KEYID = 5
1,212,000 UART: [ldev] AUTHORITY.KEYID = 7
1,212,463 UART: [ldev] FE.KEYID = 1
1,217,731 UART: [ldev] Erasing FE.KEYID = 1
1,243,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,299 UART: [ldev] --
1,282,759 UART: [fwproc] Wait for Commands...
1,283,402 UART: [fwproc] Recv command 0x46574c44
1,284,135 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,884 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,193 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,109 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,021 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,588 >>> mbox cmd response: failed
1,183,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,594 >>> mbox cmd response: failed
1,183,594 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,600 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,887 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,161 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,383 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,103 UART: [kat] SHA2-256
882,034 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,149 UART: [kat] ++
886,301 UART: [kat] sha1
890,639 UART: [kat] SHA2-256
892,577 UART: [kat] SHA2-384
895,388 UART: [kat] SHA2-512-ACC
897,289 UART: [kat] ECC-384
902,984 UART: [kat] HMAC-384Kdf
907,634 UART: [kat] LMS
1,475,830 UART: [kat] --
1,476,901 UART: [cold-reset] ++
1,477,399 UART: [fht] Storing FHT @ 0x50003400
1,479,982 UART: [idev] ++
1,480,150 UART: [idev] CDI.KEYID = 6
1,480,510 UART: [idev] SUBJECT.KEYID = 7
1,480,934 UART: [idev] UDS.KEYID = 0
1,481,279 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,414 UART: [idev] Erasing UDS.KEYID = 0
1,506,040 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,692 UART: [idev] --
1,515,807 UART: [ldev] ++
1,515,975 UART: [ldev] CDI.KEYID = 6
1,516,338 UART: [ldev] SUBJECT.KEYID = 5
1,516,764 UART: [ldev] AUTHORITY.KEYID = 7
1,517,227 UART: [ldev] FE.KEYID = 1
1,522,347 UART: [ldev] Erasing FE.KEYID = 1
1,548,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,772 UART: [ldev] --
1,587,041 UART: [fwproc] Waiting for Commands...
1,587,668 UART: [fwproc] Received command 0x46574c44
1,588,459 UART: [fwproc] Received Image of size 114332 bytes
1,635,689 UART: ROM Fatal Error: 0x000B003C
1,636,848 >>> mbox cmd response: failed
1,636,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,854 >>> mbox cmd response: failed
1,636,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,860 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,303 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,891 UART: [kat] SHA2-256
881,822 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,937 UART: [kat] ++
886,089 UART: [kat] sha1
890,359 UART: [kat] SHA2-256
892,297 UART: [kat] SHA2-384
894,980 UART: [kat] SHA2-512-ACC
896,881 UART: [kat] ECC-384
902,378 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,476,047 UART: [cold-reset] ++
1,476,473 UART: [fht] Storing FHT @ 0x50003400
1,479,116 UART: [idev] ++
1,479,284 UART: [idev] CDI.KEYID = 6
1,479,644 UART: [idev] SUBJECT.KEYID = 7
1,480,068 UART: [idev] UDS.KEYID = 0
1,480,413 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,348 UART: [idev] Erasing UDS.KEYID = 0
1,505,468 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,054 UART: [idev] --
1,515,151 UART: [ldev] ++
1,515,319 UART: [ldev] CDI.KEYID = 6
1,515,682 UART: [ldev] SUBJECT.KEYID = 5
1,516,108 UART: [ldev] AUTHORITY.KEYID = 7
1,516,571 UART: [ldev] FE.KEYID = 1
1,521,529 UART: [ldev] Erasing FE.KEYID = 1
1,546,864 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,030 UART: [ldev] --
1,586,295 UART: [fwproc] Waiting for Commands...
1,587,024 UART: [fwproc] Received command 0x46574c44
1,587,815 UART: [fwproc] Received Image of size 114332 bytes
2,883,962 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,752 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,104 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,091 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,171 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,486,307 >>> mbox cmd response: failed
1,486,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,313 >>> mbox cmd response: failed
1,486,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,319 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,723 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,619 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,346 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,020 UART: [kat] SHA2-256
881,951 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,066 UART: [kat] ++
886,218 UART: [kat] sha1
890,314 UART: [kat] SHA2-256
892,252 UART: [kat] SHA2-384
894,855 UART: [kat] SHA2-512-ACC
896,756 UART: [kat] ECC-384
902,225 UART: [kat] HMAC-384Kdf
906,703 UART: [kat] LMS
1,474,899 UART: [kat] --
1,476,018 UART: [cold-reset] ++
1,476,478 UART: [fht] Storing FHT @ 0x50003400
1,479,135 UART: [idev] ++
1,479,303 UART: [idev] CDI.KEYID = 6
1,479,663 UART: [idev] SUBJECT.KEYID = 7
1,480,087 UART: [idev] UDS.KEYID = 0
1,480,432 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,881 UART: [idev] Erasing UDS.KEYID = 0
1,504,355 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,973 UART: [idev] --
1,514,206 UART: [ldev] ++
1,514,374 UART: [ldev] CDI.KEYID = 6
1,514,737 UART: [ldev] SUBJECT.KEYID = 5
1,515,163 UART: [ldev] AUTHORITY.KEYID = 7
1,515,626 UART: [ldev] FE.KEYID = 1
1,521,038 UART: [ldev] Erasing FE.KEYID = 1
1,547,085 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,295 UART: [ldev] --
1,586,786 UART: [fwproc] Waiting for Commands...
1,587,501 UART: [fwproc] Received command 0x46574c44
1,588,292 UART: [fwproc] Received Image of size 114332 bytes
1,636,476 UART: ROM Fatal Error: 0x000B003C
1,637,635 >>> mbox cmd response: failed
1,637,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,641 >>> mbox cmd response: failed
1,637,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,647 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,913 UART: [state] LifecycleState = Unprovisioned
86,568 UART: [state] DebugLocked = No
87,152 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,638 UART: [kat] SHA2-256
882,569 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,684 UART: [kat] ++
886,836 UART: [kat] sha1
891,070 UART: [kat] SHA2-256
893,008 UART: [kat] SHA2-384
895,607 UART: [kat] SHA2-512-ACC
897,508 UART: [kat] ECC-384
903,121 UART: [kat] HMAC-384Kdf
907,781 UART: [kat] LMS
1,475,977 UART: [kat] --
1,476,702 UART: [cold-reset] ++
1,477,178 UART: [fht] Storing FHT @ 0x50003400
1,479,965 UART: [idev] ++
1,480,133 UART: [idev] CDI.KEYID = 6
1,480,493 UART: [idev] SUBJECT.KEYID = 7
1,480,917 UART: [idev] UDS.KEYID = 0
1,481,262 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,127 UART: [idev] Erasing UDS.KEYID = 0
1,506,071 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,521 UART: [idev] --
1,515,578 UART: [ldev] ++
1,515,746 UART: [ldev] CDI.KEYID = 6
1,516,109 UART: [ldev] SUBJECT.KEYID = 5
1,516,535 UART: [ldev] AUTHORITY.KEYID = 7
1,516,998 UART: [ldev] FE.KEYID = 1
1,522,404 UART: [ldev] Erasing FE.KEYID = 1
1,547,569 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,521 UART: [ldev] --
1,586,952 UART: [fwproc] Waiting for Commands...
1,587,689 UART: [fwproc] Received command 0x46574c44
1,588,480 UART: [fwproc] Received Image of size 114332 bytes
2,886,205 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,583 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,935 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,730 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,706 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,208 >>> mbox cmd response: failed
1,489,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,214 >>> mbox cmd response: failed
1,489,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,844 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,774 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
893,214 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,339 UART: [kat] ++
897,491 UART: [kat] sha1
901,681 UART: [kat] SHA2-256
903,621 UART: [kat] SHA2-384
906,476 UART: [kat] SHA2-512-ACC
908,377 UART: [kat] ECC-384
917,916 UART: [kat] HMAC-384Kdf
922,576 UART: [kat] LMS
1,170,904 UART: [kat] --
1,171,667 UART: [cold-reset] ++
1,172,211 UART: [fht] FHT @ 0x50003400
1,174,950 UART: [idev] ++
1,175,118 UART: [idev] CDI.KEYID = 6
1,175,478 UART: [idev] SUBJECT.KEYID = 7
1,175,902 UART: [idev] UDS.KEYID = 0
1,176,247 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,816 UART: [idev] Erasing UDS.KEYID = 0
1,200,769 UART: [idev] Sha1 KeyId Algorithm
1,209,225 UART: [idev] --
1,210,147 UART: [ldev] ++
1,210,315 UART: [ldev] CDI.KEYID = 6
1,210,678 UART: [ldev] SUBJECT.KEYID = 5
1,211,104 UART: [ldev] AUTHORITY.KEYID = 7
1,211,567 UART: [ldev] FE.KEYID = 1
1,216,707 UART: [ldev] Erasing FE.KEYID = 1
1,243,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,559 UART: [ldev] --
1,282,880 UART: [fwproc] Wait for Commands...
1,283,492 UART: [fwproc] Recv command 0x46574c44
1,284,220 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,842 UART: ROM Fatal Error: 0x000B003C
1,333,001 >>> mbox cmd response: failed
1,333,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,007 >>> mbox cmd response: failed
1,333,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
893,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,291 UART: [kat] ++
897,443 UART: [kat] sha1
901,681 UART: [kat] SHA2-256
903,621 UART: [kat] SHA2-384
906,442 UART: [kat] SHA2-512-ACC
908,343 UART: [kat] ECC-384
918,286 UART: [kat] HMAC-384Kdf
922,902 UART: [kat] LMS
1,171,230 UART: [kat] --
1,172,219 UART: [cold-reset] ++
1,172,613 UART: [fht] FHT @ 0x50003400
1,175,374 UART: [idev] ++
1,175,542 UART: [idev] CDI.KEYID = 6
1,175,902 UART: [idev] SUBJECT.KEYID = 7
1,176,326 UART: [idev] UDS.KEYID = 0
1,176,671 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,284 UART: [idev] Erasing UDS.KEYID = 0
1,201,505 UART: [idev] Sha1 KeyId Algorithm
1,209,973 UART: [idev] --
1,211,027 UART: [ldev] ++
1,211,195 UART: [ldev] CDI.KEYID = 6
1,211,558 UART: [ldev] SUBJECT.KEYID = 5
1,211,984 UART: [ldev] AUTHORITY.KEYID = 7
1,212,447 UART: [ldev] FE.KEYID = 1
1,217,571 UART: [ldev] Erasing FE.KEYID = 1
1,243,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,685 UART: [ldev] --
1,282,144 UART: [fwproc] Wait for Commands...
1,282,868 UART: [fwproc] Recv command 0x46574c44
1,283,596 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,413 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,717 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,532 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,243 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,186,302 >>> mbox cmd response: failed
1,186,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,308 >>> mbox cmd response: failed
1,186,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,314 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,413 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,509 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,861 UART: [state] LifecycleState = Unprovisioned
86,516 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
893,765 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,890 UART: [kat] ++
898,042 UART: [kat] sha1
902,176 UART: [kat] SHA2-256
904,116 UART: [kat] SHA2-384
906,865 UART: [kat] SHA2-512-ACC
908,766 UART: [kat] ECC-384
918,339 UART: [kat] HMAC-384Kdf
922,925 UART: [kat] LMS
1,171,253 UART: [kat] --
1,172,318 UART: [cold-reset] ++
1,172,728 UART: [fht] FHT @ 0x50003400
1,175,305 UART: [idev] ++
1,175,473 UART: [idev] CDI.KEYID = 6
1,175,833 UART: [idev] SUBJECT.KEYID = 7
1,176,257 UART: [idev] UDS.KEYID = 0
1,176,602 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,169 UART: [idev] Erasing UDS.KEYID = 0
1,201,124 UART: [idev] Sha1 KeyId Algorithm
1,209,736 UART: [idev] --
1,210,852 UART: [ldev] ++
1,211,020 UART: [ldev] CDI.KEYID = 6
1,211,383 UART: [ldev] SUBJECT.KEYID = 5
1,211,809 UART: [ldev] AUTHORITY.KEYID = 7
1,212,272 UART: [ldev] FE.KEYID = 1
1,217,656 UART: [ldev] Erasing FE.KEYID = 1
1,243,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,120 UART: [ldev] --
1,283,505 UART: [fwproc] Wait for Commands...
1,284,129 UART: [fwproc] Recv command 0x46574c44
1,284,857 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,289 UART: ROM Fatal Error: 0x000B003C
1,332,448 >>> mbox cmd response: failed
1,332,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,454 >>> mbox cmd response: failed
1,332,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,460 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,322 UART: [state] WD Timer not started. Device not locked for debugging
87,485 UART: [kat] SHA2-256
893,135 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,260 UART: [kat] ++
897,412 UART: [kat] sha1
901,702 UART: [kat] SHA2-256
903,642 UART: [kat] SHA2-384
906,289 UART: [kat] SHA2-512-ACC
908,190 UART: [kat] ECC-384
917,935 UART: [kat] HMAC-384Kdf
922,425 UART: [kat] LMS
1,170,753 UART: [kat] --
1,171,718 UART: [cold-reset] ++
1,172,276 UART: [fht] FHT @ 0x50003400
1,175,075 UART: [idev] ++
1,175,243 UART: [idev] CDI.KEYID = 6
1,175,603 UART: [idev] SUBJECT.KEYID = 7
1,176,027 UART: [idev] UDS.KEYID = 0
1,176,372 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,373 UART: [idev] Erasing UDS.KEYID = 0
1,201,382 UART: [idev] Sha1 KeyId Algorithm
1,209,868 UART: [idev] --
1,211,058 UART: [ldev] ++
1,211,226 UART: [ldev] CDI.KEYID = 6
1,211,589 UART: [ldev] SUBJECT.KEYID = 5
1,212,015 UART: [ldev] AUTHORITY.KEYID = 7
1,212,478 UART: [ldev] FE.KEYID = 1
1,217,908 UART: [ldev] Erasing FE.KEYID = 1
1,244,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,412 UART: [ldev] --
1,283,739 UART: [fwproc] Wait for Commands...
1,284,471 UART: [fwproc] Recv command 0x46574c44
1,285,199 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,460 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,764 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,623 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,880 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,186,033 >>> mbox cmd response: failed
1,186,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,039 >>> mbox cmd response: failed
1,186,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,045 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,184 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,404 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,436 UART: [state] LifecycleState = Unprovisioned
86,091 UART: [state] DebugLocked = No
86,797 UART: [state] WD Timer not started. Device not locked for debugging
87,938 UART: [kat] SHA2-256
891,488 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,617 UART: [kat] ++
895,769 UART: [kat] sha1
899,999 UART: [kat] SHA2-256
901,939 UART: [kat] SHA2-384
904,458 UART: [kat] SHA2-512-ACC
906,359 UART: [kat] ECC-384
916,118 UART: [kat] HMAC-384Kdf
920,834 UART: [kat] LMS
1,169,146 UART: [kat] --
1,170,109 UART: [cold-reset] ++
1,170,599 UART: [fht] FHT @ 0x50003400
1,173,289 UART: [idev] ++
1,173,457 UART: [idev] CDI.KEYID = 6
1,173,818 UART: [idev] SUBJECT.KEYID = 7
1,174,243 UART: [idev] UDS.KEYID = 0
1,174,589 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,027 UART: [idev] Erasing UDS.KEYID = 0
1,198,575 UART: [idev] Sha1 KeyId Algorithm
1,207,441 UART: [idev] --
1,208,426 UART: [ldev] ++
1,208,594 UART: [ldev] CDI.KEYID = 6
1,208,958 UART: [ldev] SUBJECT.KEYID = 5
1,209,385 UART: [ldev] AUTHORITY.KEYID = 7
1,209,848 UART: [ldev] FE.KEYID = 1
1,215,050 UART: [ldev] Erasing FE.KEYID = 1
1,240,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,806 UART: [ldev] --
1,280,234 UART: [fwproc] Wait for Commands...
1,280,891 UART: [fwproc] Recv command 0x46574c44
1,281,624 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,871 UART: ROM Fatal Error: 0x000B003C
1,330,030 >>> mbox cmd response: failed
1,330,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,036 >>> mbox cmd response: failed
1,330,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,042 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,912 UART: [state] LifecycleState = Unprovisioned
85,567 UART: [state] DebugLocked = No
86,263 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
891,008 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,137 UART: [kat] ++
895,289 UART: [kat] sha1
899,603 UART: [kat] SHA2-256
901,543 UART: [kat] SHA2-384
904,200 UART: [kat] SHA2-512-ACC
906,101 UART: [kat] ECC-384
915,760 UART: [kat] HMAC-384Kdf
920,294 UART: [kat] LMS
1,168,606 UART: [kat] --
1,169,349 UART: [cold-reset] ++
1,169,833 UART: [fht] FHT @ 0x50003400
1,172,575 UART: [idev] ++
1,172,743 UART: [idev] CDI.KEYID = 6
1,173,104 UART: [idev] SUBJECT.KEYID = 7
1,173,529 UART: [idev] UDS.KEYID = 0
1,173,875 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,631 UART: [idev] Erasing UDS.KEYID = 0
1,198,695 UART: [idev] Sha1 KeyId Algorithm
1,207,385 UART: [idev] --
1,208,392 UART: [ldev] ++
1,208,560 UART: [ldev] CDI.KEYID = 6
1,208,924 UART: [ldev] SUBJECT.KEYID = 5
1,209,351 UART: [ldev] AUTHORITY.KEYID = 7
1,209,814 UART: [ldev] FE.KEYID = 1
1,215,392 UART: [ldev] Erasing FE.KEYID = 1
1,241,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,752 UART: [ldev] --
1,280,060 UART: [fwproc] Wait for Commands...
1,280,751 UART: [fwproc] Recv command 0x46574c44
1,281,484 UART: [fwproc] Recv'd Img size: 114332 bytes
2,577,483 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,409 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,718 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,769,454 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,634 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,259 >>> mbox cmd response: failed
1,184,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,265 >>> mbox cmd response: failed
1,184,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,271 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,280 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,394 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
891,383 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,512 UART: [kat] ++
895,664 UART: [kat] sha1
899,946 UART: [kat] SHA2-256
901,886 UART: [kat] SHA2-384
904,737 UART: [kat] SHA2-512-ACC
906,638 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
921,095 UART: [kat] LMS
1,169,407 UART: [kat] --
1,170,468 UART: [cold-reset] ++
1,171,022 UART: [fht] FHT @ 0x50003400
1,173,494 UART: [idev] ++
1,173,662 UART: [idev] CDI.KEYID = 6
1,174,023 UART: [idev] SUBJECT.KEYID = 7
1,174,448 UART: [idev] UDS.KEYID = 0
1,174,794 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,192 UART: [idev] Erasing UDS.KEYID = 0
1,199,298 UART: [idev] Sha1 KeyId Algorithm
1,208,104 UART: [idev] --
1,208,905 UART: [ldev] ++
1,209,073 UART: [ldev] CDI.KEYID = 6
1,209,437 UART: [ldev] SUBJECT.KEYID = 5
1,209,864 UART: [ldev] AUTHORITY.KEYID = 7
1,210,327 UART: [ldev] FE.KEYID = 1
1,215,453 UART: [ldev] Erasing FE.KEYID = 1
1,241,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,857 UART: [ldev] --
1,281,239 UART: [fwproc] Wait for Commands...
1,281,816 UART: [fwproc] Recv command 0x46574c44
1,282,549 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,324 UART: ROM Fatal Error: 0x000B003C
1,330,483 >>> mbox cmd response: failed
1,330,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,489 >>> mbox cmd response: failed
1,330,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,495 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
891,471 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,600 UART: [kat] ++
895,752 UART: [kat] sha1
899,976 UART: [kat] SHA2-256
901,916 UART: [kat] SHA2-384
904,621 UART: [kat] SHA2-512-ACC
906,522 UART: [kat] ECC-384
916,247 UART: [kat] HMAC-384Kdf
920,883 UART: [kat] LMS
1,169,195 UART: [kat] --
1,169,910 UART: [cold-reset] ++
1,170,302 UART: [fht] FHT @ 0x50003400
1,172,798 UART: [idev] ++
1,172,966 UART: [idev] CDI.KEYID = 6
1,173,327 UART: [idev] SUBJECT.KEYID = 7
1,173,752 UART: [idev] UDS.KEYID = 0
1,174,098 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,722 UART: [idev] Erasing UDS.KEYID = 0
1,199,104 UART: [idev] Sha1 KeyId Algorithm
1,208,094 UART: [idev] --
1,208,997 UART: [ldev] ++
1,209,165 UART: [ldev] CDI.KEYID = 6
1,209,529 UART: [ldev] SUBJECT.KEYID = 5
1,209,956 UART: [ldev] AUTHORITY.KEYID = 7
1,210,419 UART: [ldev] FE.KEYID = 1
1,216,041 UART: [ldev] Erasing FE.KEYID = 1
1,242,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,039 UART: [ldev] --
1,281,325 UART: [fwproc] Wait for Commands...
1,282,054 UART: [fwproc] Recv command 0x46574c44
1,282,787 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,470 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,779 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,581 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,527 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,046 >>> mbox cmd response: failed
1,184,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,052 >>> mbox cmd response: failed
1,184,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,058 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,115 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,999 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Manufacturing
86,185 UART: [state] DebugLocked = No
86,783 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,373 UART: [kat] SHA2-256
882,304 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,419 UART: [kat] ++
886,571 UART: [kat] sha1
890,679 UART: [kat] SHA2-256
892,617 UART: [kat] SHA2-384
895,498 UART: [kat] SHA2-512-ACC
897,399 UART: [kat] ECC-384
902,732 UART: [kat] HMAC-384Kdf
907,320 UART: [kat] LMS
1,475,516 UART: [kat] --
1,476,421 UART: [cold-reset] ++
1,476,931 UART: [fht] Storing FHT @ 0x50003400
1,479,526 UART: [idev] ++
1,479,694 UART: [idev] CDI.KEYID = 6
1,480,054 UART: [idev] SUBJECT.KEYID = 7
1,480,478 UART: [idev] UDS.KEYID = 0
1,480,823 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,540 UART: [idev] Erasing UDS.KEYID = 0
1,505,548 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,160 UART: [idev] --
1,515,285 UART: [ldev] ++
1,515,453 UART: [ldev] CDI.KEYID = 6
1,515,816 UART: [ldev] SUBJECT.KEYID = 5
1,516,242 UART: [ldev] AUTHORITY.KEYID = 7
1,516,705 UART: [ldev] FE.KEYID = 1
1,521,969 UART: [ldev] Erasing FE.KEYID = 1
1,547,372 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,614 UART: [ldev] --
1,587,129 UART: [fwproc] Waiting for Commands...
1,587,746 UART: [fwproc] Received command 0x46574c44
1,588,537 UART: [fwproc] Received Image of size 114332 bytes
2,910,715 UART: ROM Fatal Error: 0x000B002C
2,911,874 >>> mbox cmd response: failed
2,911,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,911,880 >>> mbox cmd response: failed
2,911,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,911,886 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,459 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,145 UART: [kat] SHA2-256
882,076 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,191 UART: [kat] ++
886,343 UART: [kat] sha1
890,437 UART: [kat] SHA2-256
892,375 UART: [kat] SHA2-384
895,086 UART: [kat] SHA2-512-ACC
896,987 UART: [kat] ECC-384
902,824 UART: [kat] HMAC-384Kdf
907,448 UART: [kat] LMS
1,475,644 UART: [kat] --
1,476,597 UART: [cold-reset] ++
1,476,933 UART: [fht] Storing FHT @ 0x50003400
1,479,574 UART: [idev] ++
1,479,742 UART: [idev] CDI.KEYID = 6
1,480,102 UART: [idev] SUBJECT.KEYID = 7
1,480,526 UART: [idev] UDS.KEYID = 0
1,480,871 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,602 UART: [idev] Erasing UDS.KEYID = 0
1,505,222 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,996 UART: [idev] --
1,515,057 UART: [ldev] ++
1,515,225 UART: [ldev] CDI.KEYID = 6
1,515,588 UART: [ldev] SUBJECT.KEYID = 5
1,516,014 UART: [ldev] AUTHORITY.KEYID = 7
1,516,477 UART: [ldev] FE.KEYID = 1
1,521,593 UART: [ldev] Erasing FE.KEYID = 1
1,547,404 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,534 UART: [ldev] --
1,586,909 UART: [fwproc] Waiting for Commands...
1,587,524 UART: [fwproc] Received command 0x46574c44
1,588,315 UART: [fwproc] Received Image of size 114332 bytes
2,885,988 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,944 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,296 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,211 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,721 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,761,805 >>> mbox cmd response: failed
2,761,805 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,761,811 >>> mbox cmd response: failed
2,761,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,761,817 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,557 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,271 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,687 UART: [state] LifecycleState = Manufacturing
86,342 UART: [state] DebugLocked = No
87,042 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,596 UART: [kat] SHA2-256
882,527 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,642 UART: [kat] ++
886,794 UART: [kat] sha1
891,118 UART: [kat] SHA2-256
893,056 UART: [kat] SHA2-384
895,915 UART: [kat] SHA2-512-ACC
897,816 UART: [kat] ECC-384
903,371 UART: [kat] HMAC-384Kdf
908,081 UART: [kat] LMS
1,476,277 UART: [kat] --
1,477,438 UART: [cold-reset] ++
1,477,852 UART: [fht] Storing FHT @ 0x50003400
1,480,651 UART: [idev] ++
1,480,819 UART: [idev] CDI.KEYID = 6
1,481,179 UART: [idev] SUBJECT.KEYID = 7
1,481,603 UART: [idev] UDS.KEYID = 0
1,481,948 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,489 UART: [idev] Erasing UDS.KEYID = 0
1,506,157 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,871 UART: [idev] --
1,515,918 UART: [ldev] ++
1,516,086 UART: [ldev] CDI.KEYID = 6
1,516,449 UART: [ldev] SUBJECT.KEYID = 5
1,516,875 UART: [ldev] AUTHORITY.KEYID = 7
1,517,338 UART: [ldev] FE.KEYID = 1
1,522,644 UART: [ldev] Erasing FE.KEYID = 1
1,548,173 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,027 UART: [ldev] --
1,587,372 UART: [fwproc] Waiting for Commands...
1,588,005 UART: [fwproc] Received command 0x46574c44
1,588,796 UART: [fwproc] Received Image of size 114332 bytes
2,911,530 UART: ROM Fatal Error: 0x000B002C
2,912,689 >>> mbox cmd response: failed
2,912,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,912,695 >>> mbox cmd response: failed
2,912,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,912,701 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,009 UART: [state] LifecycleState = Unprovisioned
85,664 UART: [state] DebugLocked = No
86,376 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,958 UART: [kat] SHA2-256
881,889 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,004 UART: [kat] ++
886,156 UART: [kat] sha1
890,478 UART: [kat] SHA2-256
892,416 UART: [kat] SHA2-384
895,053 UART: [kat] SHA2-512-ACC
896,954 UART: [kat] ECC-384
902,661 UART: [kat] HMAC-384Kdf
907,525 UART: [kat] LMS
1,475,721 UART: [kat] --
1,476,460 UART: [cold-reset] ++
1,476,928 UART: [fht] Storing FHT @ 0x50003400
1,479,731 UART: [idev] ++
1,479,899 UART: [idev] CDI.KEYID = 6
1,480,259 UART: [idev] SUBJECT.KEYID = 7
1,480,683 UART: [idev] UDS.KEYID = 0
1,481,028 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,901 UART: [idev] Erasing UDS.KEYID = 0
1,505,955 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,579 UART: [idev] --
1,515,644 UART: [ldev] ++
1,515,812 UART: [ldev] CDI.KEYID = 6
1,516,175 UART: [ldev] SUBJECT.KEYID = 5
1,516,601 UART: [ldev] AUTHORITY.KEYID = 7
1,517,064 UART: [ldev] FE.KEYID = 1
1,522,522 UART: [ldev] Erasing FE.KEYID = 1
1,547,547 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,419 UART: [ldev] --
1,586,920 UART: [fwproc] Waiting for Commands...
1,587,643 UART: [fwproc] Received command 0x46574c44
1,588,434 UART: [fwproc] Received Image of size 114332 bytes
2,885,811 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,651 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,003 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,940 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,588 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,762,700 >>> mbox cmd response: failed
2,762,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,762,706 >>> mbox cmd response: failed
2,762,706 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,762,712 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,002 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,730 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Manufacturing
85,581 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
893,030 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,155 UART: [kat] ++
897,307 UART: [kat] sha1
901,519 UART: [kat] SHA2-256
903,459 UART: [kat] SHA2-384
906,378 UART: [kat] SHA2-512-ACC
908,279 UART: [kat] ECC-384
918,266 UART: [kat] HMAC-384Kdf
922,832 UART: [kat] LMS
1,171,160 UART: [kat] --
1,171,935 UART: [cold-reset] ++
1,172,333 UART: [fht] FHT @ 0x50003400
1,174,926 UART: [idev] ++
1,175,094 UART: [idev] CDI.KEYID = 6
1,175,454 UART: [idev] SUBJECT.KEYID = 7
1,175,878 UART: [idev] UDS.KEYID = 0
1,176,223 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,028 UART: [idev] Erasing UDS.KEYID = 0
1,201,247 UART: [idev] Sha1 KeyId Algorithm
1,209,677 UART: [idev] --
1,210,767 UART: [ldev] ++
1,210,935 UART: [ldev] CDI.KEYID = 6
1,211,298 UART: [ldev] SUBJECT.KEYID = 5
1,211,724 UART: [ldev] AUTHORITY.KEYID = 7
1,212,187 UART: [ldev] FE.KEYID = 1
1,217,553 UART: [ldev] Erasing FE.KEYID = 1
1,243,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,375 UART: [ldev] --
1,282,836 UART: [fwproc] Wait for Commands...
1,283,638 UART: [fwproc] Recv command 0x46574c44
1,284,366 UART: [fwproc] Recv'd Img size: 114332 bytes
2,607,134 UART: ROM Fatal Error: 0x000B002C
2,608,293 >>> mbox cmd response: failed
2,608,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,608,299 >>> mbox cmd response: failed
2,608,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,608,305 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
893,262 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,387 UART: [kat] ++
897,539 UART: [kat] sha1
901,923 UART: [kat] SHA2-256
903,863 UART: [kat] SHA2-384
906,552 UART: [kat] SHA2-512-ACC
908,453 UART: [kat] ECC-384
918,494 UART: [kat] HMAC-384Kdf
922,962 UART: [kat] LMS
1,171,290 UART: [kat] --
1,172,181 UART: [cold-reset] ++
1,172,743 UART: [fht] FHT @ 0x50003400
1,175,314 UART: [idev] ++
1,175,482 UART: [idev] CDI.KEYID = 6
1,175,842 UART: [idev] SUBJECT.KEYID = 7
1,176,266 UART: [idev] UDS.KEYID = 0
1,176,611 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,408 UART: [idev] Erasing UDS.KEYID = 0
1,201,485 UART: [idev] Sha1 KeyId Algorithm
1,209,793 UART: [idev] --
1,210,887 UART: [ldev] ++
1,211,055 UART: [ldev] CDI.KEYID = 6
1,211,418 UART: [ldev] SUBJECT.KEYID = 5
1,211,844 UART: [ldev] AUTHORITY.KEYID = 7
1,212,307 UART: [ldev] FE.KEYID = 1
1,217,615 UART: [ldev] Erasing FE.KEYID = 1
1,243,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,815 UART: [ldev] --
1,283,206 UART: [fwproc] Wait for Commands...
1,283,892 UART: [fwproc] Recv command 0x46574c44
1,284,620 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,069 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,373 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,078 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,321 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,462,546 >>> mbox cmd response: failed
2,462,546 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,462,552 >>> mbox cmd response: failed
2,462,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,462,558 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,697 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,489 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,981 UART: [state] LifecycleState = Manufacturing
86,636 UART: [state] DebugLocked = No
87,240 UART: [state] WD Timer not started. Device not locked for debugging
88,405 UART: [kat] SHA2-256
894,055 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,180 UART: [kat] ++
898,332 UART: [kat] sha1
902,636 UART: [kat] SHA2-256
904,576 UART: [kat] SHA2-384
907,323 UART: [kat] SHA2-512-ACC
909,224 UART: [kat] ECC-384
918,783 UART: [kat] HMAC-384Kdf
923,413 UART: [kat] LMS
1,171,741 UART: [kat] --
1,172,870 UART: [cold-reset] ++
1,173,278 UART: [fht] FHT @ 0x50003400
1,175,949 UART: [idev] ++
1,176,117 UART: [idev] CDI.KEYID = 6
1,176,477 UART: [idev] SUBJECT.KEYID = 7
1,176,901 UART: [idev] UDS.KEYID = 0
1,177,246 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,201 UART: [idev] Erasing UDS.KEYID = 0
1,202,186 UART: [idev] Sha1 KeyId Algorithm
1,210,654 UART: [idev] --
1,211,664 UART: [ldev] ++
1,211,832 UART: [ldev] CDI.KEYID = 6
1,212,195 UART: [ldev] SUBJECT.KEYID = 5
1,212,621 UART: [ldev] AUTHORITY.KEYID = 7
1,213,084 UART: [ldev] FE.KEYID = 1
1,218,438 UART: [ldev] Erasing FE.KEYID = 1
1,245,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,902 UART: [ldev] --
1,284,285 UART: [fwproc] Wait for Commands...
1,285,083 UART: [fwproc] Recv command 0x46574c44
1,285,811 UART: [fwproc] Recv'd Img size: 114332 bytes
2,607,927 UART: ROM Fatal Error: 0x000B002C
2,609,086 >>> mbox cmd response: failed
2,609,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,609,092 >>> mbox cmd response: failed
2,609,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,609,098 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,993 UART: [state] LifecycleState = Unprovisioned
85,648 UART: [state] DebugLocked = No
86,332 UART: [state] WD Timer not started. Device not locked for debugging
87,551 UART: [kat] SHA2-256
893,201 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,326 UART: [kat] ++
897,478 UART: [kat] sha1
901,522 UART: [kat] SHA2-256
903,462 UART: [kat] SHA2-384
906,067 UART: [kat] SHA2-512-ACC
907,968 UART: [kat] ECC-384
917,577 UART: [kat] HMAC-384Kdf
922,215 UART: [kat] LMS
1,170,543 UART: [kat] --
1,171,380 UART: [cold-reset] ++
1,171,756 UART: [fht] FHT @ 0x50003400
1,174,359 UART: [idev] ++
1,174,527 UART: [idev] CDI.KEYID = 6
1,174,887 UART: [idev] SUBJECT.KEYID = 7
1,175,311 UART: [idev] UDS.KEYID = 0
1,175,656 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,585 UART: [idev] Erasing UDS.KEYID = 0
1,200,478 UART: [idev] Sha1 KeyId Algorithm
1,208,900 UART: [idev] --
1,209,968 UART: [ldev] ++
1,210,136 UART: [ldev] CDI.KEYID = 6
1,210,499 UART: [ldev] SUBJECT.KEYID = 5
1,210,925 UART: [ldev] AUTHORITY.KEYID = 7
1,211,388 UART: [ldev] FE.KEYID = 1
1,216,680 UART: [ldev] Erasing FE.KEYID = 1
1,243,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,898 UART: [ldev] --
1,282,221 UART: [fwproc] Wait for Commands...
1,283,013 UART: [fwproc] Recv command 0x46574c44
1,283,741 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,760 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,064 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,949 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,534 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,461,219 >>> mbox cmd response: failed
2,461,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,461,225 >>> mbox cmd response: failed
2,461,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,461,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,948 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,958 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Manufacturing
85,887 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,834 UART: [kat] SHA2-256
891,384 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,513 UART: [kat] ++
895,665 UART: [kat] sha1
899,731 UART: [kat] SHA2-256
901,671 UART: [kat] SHA2-384
904,214 UART: [kat] SHA2-512-ACC
906,115 UART: [kat] ECC-384
915,764 UART: [kat] HMAC-384Kdf
920,516 UART: [kat] LMS
1,168,828 UART: [kat] --
1,169,771 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,172,961 UART: [idev] ++
1,173,129 UART: [idev] CDI.KEYID = 6
1,173,490 UART: [idev] SUBJECT.KEYID = 7
1,173,915 UART: [idev] UDS.KEYID = 0
1,174,261 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,059 UART: [idev] Erasing UDS.KEYID = 0
1,198,679 UART: [idev] Sha1 KeyId Algorithm
1,207,527 UART: [idev] --
1,208,614 UART: [ldev] ++
1,208,782 UART: [ldev] CDI.KEYID = 6
1,209,146 UART: [ldev] SUBJECT.KEYID = 5
1,209,573 UART: [ldev] AUTHORITY.KEYID = 7
1,210,036 UART: [ldev] FE.KEYID = 1
1,215,328 UART: [ldev] Erasing FE.KEYID = 1
1,242,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,108 UART: [ldev] --
1,281,450 UART: [fwproc] Wait for Commands...
1,282,137 UART: [fwproc] Recv command 0x46574c44
1,282,870 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,689 UART: ROM Fatal Error: 0x000B002C
2,605,848 >>> mbox cmd response: failed
2,605,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,605,854 >>> mbox cmd response: failed
2,605,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,605,860 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,542 UART: [state] LifecycleState = Unprovisioned
86,197 UART: [state] DebugLocked = No
86,793 UART: [state] WD Timer not started. Device not locked for debugging
88,140 UART: [kat] SHA2-256
891,690 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,819 UART: [kat] ++
895,971 UART: [kat] sha1
900,195 UART: [kat] SHA2-256
902,135 UART: [kat] SHA2-384
905,016 UART: [kat] SHA2-512-ACC
906,917 UART: [kat] ECC-384
917,024 UART: [kat] HMAC-384Kdf
921,612 UART: [kat] LMS
1,169,924 UART: [kat] --
1,170,827 UART: [cold-reset] ++
1,171,403 UART: [fht] FHT @ 0x50003400
1,174,011 UART: [idev] ++
1,174,179 UART: [idev] CDI.KEYID = 6
1,174,540 UART: [idev] SUBJECT.KEYID = 7
1,174,965 UART: [idev] UDS.KEYID = 0
1,175,311 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,761 UART: [idev] Erasing UDS.KEYID = 0
1,200,133 UART: [idev] Sha1 KeyId Algorithm
1,209,075 UART: [idev] --
1,210,166 UART: [ldev] ++
1,210,334 UART: [ldev] CDI.KEYID = 6
1,210,698 UART: [ldev] SUBJECT.KEYID = 5
1,211,125 UART: [ldev] AUTHORITY.KEYID = 7
1,211,588 UART: [ldev] FE.KEYID = 1
1,216,866 UART: [ldev] Erasing FE.KEYID = 1
1,243,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,342 UART: [ldev] --
1,282,756 UART: [fwproc] Wait for Commands...
1,283,517 UART: [fwproc] Recv command 0x46574c44
1,284,250 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,879 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,188 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,090 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,454 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,458,579 >>> mbox cmd response: failed
2,458,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,585 >>> mbox cmd response: failed
2,458,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,591 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,224 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,606 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Manufacturing
86,328 UART: [state] DebugLocked = No
86,960 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
891,645 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,774 UART: [kat] ++
895,926 UART: [kat] sha1
900,356 UART: [kat] SHA2-256
902,296 UART: [kat] SHA2-384
905,241 UART: [kat] SHA2-512-ACC
907,142 UART: [kat] ECC-384
917,243 UART: [kat] HMAC-384Kdf
921,825 UART: [kat] LMS
1,170,137 UART: [kat] --
1,171,068 UART: [cold-reset] ++
1,171,634 UART: [fht] FHT @ 0x50003400
1,174,268 UART: [idev] ++
1,174,436 UART: [idev] CDI.KEYID = 6
1,174,797 UART: [idev] SUBJECT.KEYID = 7
1,175,222 UART: [idev] UDS.KEYID = 0
1,175,568 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,272 UART: [idev] Erasing UDS.KEYID = 0
1,200,384 UART: [idev] Sha1 KeyId Algorithm
1,209,070 UART: [idev] --
1,210,231 UART: [ldev] ++
1,210,399 UART: [ldev] CDI.KEYID = 6
1,210,763 UART: [ldev] SUBJECT.KEYID = 5
1,211,190 UART: [ldev] AUTHORITY.KEYID = 7
1,211,653 UART: [ldev] FE.KEYID = 1
1,216,709 UART: [ldev] Erasing FE.KEYID = 1
1,242,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,789 UART: [ldev] --
1,282,307 UART: [fwproc] Wait for Commands...
1,282,960 UART: [fwproc] Recv command 0x46574c44
1,283,693 UART: [fwproc] Recv'd Img size: 114332 bytes
2,604,892 UART: ROM Fatal Error: 0x000B002C
2,606,051 >>> mbox cmd response: failed
2,606,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,057 >>> mbox cmd response: failed
2,606,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,063 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,771 UART: [state] LifecycleState = Unprovisioned
86,426 UART: [state] DebugLocked = No
87,088 UART: [state] WD Timer not started. Device not locked for debugging
88,347 UART: [kat] SHA2-256
891,897 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,026 UART: [kat] ++
896,178 UART: [kat] sha1
900,300 UART: [kat] SHA2-256
902,240 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,987 UART: [kat] HMAC-384Kdf
921,807 UART: [kat] LMS
1,170,119 UART: [kat] --
1,171,222 UART: [cold-reset] ++
1,171,556 UART: [fht] FHT @ 0x50003400
1,174,268 UART: [idev] ++
1,174,436 UART: [idev] CDI.KEYID = 6
1,174,797 UART: [idev] SUBJECT.KEYID = 7
1,175,222 UART: [idev] UDS.KEYID = 0
1,175,568 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,144 UART: [idev] Erasing UDS.KEYID = 0
1,200,298 UART: [idev] Sha1 KeyId Algorithm
1,209,094 UART: [idev] --
1,210,063 UART: [ldev] ++
1,210,231 UART: [ldev] CDI.KEYID = 6
1,210,595 UART: [ldev] SUBJECT.KEYID = 5
1,211,022 UART: [ldev] AUTHORITY.KEYID = 7
1,211,485 UART: [ldev] FE.KEYID = 1
1,216,649 UART: [ldev] Erasing FE.KEYID = 1
1,243,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,949 UART: [ldev] --
1,282,453 UART: [fwproc] Wait for Commands...
1,283,126 UART: [fwproc] Recv command 0x46574c44
1,283,859 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,430 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,739 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,663 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,801 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,458,136 >>> mbox cmd response: failed
2,458,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,142 >>> mbox cmd response: failed
2,458,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,148 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,029 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,813 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Manufacturing
85,913 UART: [state] DebugLocked = No
86,525 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,157 UART: [kat] SHA2-256
882,088 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,203 UART: [kat] ++
886,355 UART: [kat] sha1
890,601 UART: [kat] SHA2-256
892,539 UART: [kat] SHA2-384
895,496 UART: [kat] SHA2-512-ACC
897,397 UART: [kat] ECC-384
903,056 UART: [kat] HMAC-384Kdf
907,772 UART: [kat] LMS
1,475,968 UART: [kat] --
1,477,037 UART: [cold-reset] ++
1,477,559 UART: [fht] Storing FHT @ 0x50003400
1,480,586 UART: [idev] ++
1,480,754 UART: [idev] CDI.KEYID = 6
1,481,114 UART: [idev] SUBJECT.KEYID = 7
1,481,538 UART: [idev] UDS.KEYID = 0
1,481,883 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,360 UART: [idev] Erasing UDS.KEYID = 0
1,506,022 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,660 UART: [idev] --
1,515,729 UART: [ldev] ++
1,515,897 UART: [ldev] CDI.KEYID = 6
1,516,260 UART: [ldev] SUBJECT.KEYID = 5
1,516,686 UART: [ldev] AUTHORITY.KEYID = 7
1,517,149 UART: [ldev] FE.KEYID = 1
1,522,429 UART: [ldev] Erasing FE.KEYID = 1
1,547,296 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,726 UART: [ldev] --
1,587,093 UART: [fwproc] Waiting for Commands...
1,587,836 UART: [fwproc] Received command 0x46574c44
1,588,627 UART: [fwproc] Received Image of size 114332 bytes
2,911,981 UART: ROM Fatal Error: 0x000B002E
2,913,140 >>> mbox cmd response: failed
2,913,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,913,146 >>> mbox cmd response: failed
2,913,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,913,152 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,217 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,931 UART: [kat] SHA2-256
881,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,977 UART: [kat] ++
886,129 UART: [kat] sha1
890,209 UART: [kat] SHA2-256
892,147 UART: [kat] SHA2-384
894,886 UART: [kat] SHA2-512-ACC
896,787 UART: [kat] ECC-384
902,044 UART: [kat] HMAC-384Kdf
906,652 UART: [kat] LMS
1,474,848 UART: [kat] --
1,475,491 UART: [cold-reset] ++
1,476,051 UART: [fht] Storing FHT @ 0x50003400
1,478,908 UART: [idev] ++
1,479,076 UART: [idev] CDI.KEYID = 6
1,479,436 UART: [idev] SUBJECT.KEYID = 7
1,479,860 UART: [idev] UDS.KEYID = 0
1,480,205 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,412 UART: [idev] Erasing UDS.KEYID = 0
1,503,904 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,616 UART: [idev] --
1,513,461 UART: [ldev] ++
1,513,629 UART: [ldev] CDI.KEYID = 6
1,513,992 UART: [ldev] SUBJECT.KEYID = 5
1,514,418 UART: [ldev] AUTHORITY.KEYID = 7
1,514,881 UART: [ldev] FE.KEYID = 1
1,519,949 UART: [ldev] Erasing FE.KEYID = 1
1,545,236 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,068 UART: [ldev] --
1,584,507 UART: [fwproc] Waiting for Commands...
1,585,272 UART: [fwproc] Received command 0x46574c44
1,586,063 UART: [fwproc] Received Image of size 114332 bytes
2,883,360 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,776 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,128 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,075,917 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,053 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,764,155 >>> mbox cmd response: failed
2,764,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,161 >>> mbox cmd response: failed
2,764,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,167 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,549 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,195 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,043 UART: [state] LifecycleState = Manufacturing
85,698 UART: [state] DebugLocked = No
86,280 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,996 UART: [kat] SHA2-256
881,927 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,042 UART: [kat] ++
886,194 UART: [kat] sha1
890,402 UART: [kat] SHA2-256
892,340 UART: [kat] SHA2-384
895,067 UART: [kat] SHA2-512-ACC
896,968 UART: [kat] ECC-384
902,743 UART: [kat] HMAC-384Kdf
907,435 UART: [kat] LMS
1,475,631 UART: [kat] --
1,476,724 UART: [cold-reset] ++
1,477,222 UART: [fht] Storing FHT @ 0x50003400
1,479,971 UART: [idev] ++
1,480,139 UART: [idev] CDI.KEYID = 6
1,480,499 UART: [idev] SUBJECT.KEYID = 7
1,480,923 UART: [idev] UDS.KEYID = 0
1,481,268 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,957 UART: [idev] Erasing UDS.KEYID = 0
1,505,373 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,925 UART: [idev] --
1,514,972 UART: [ldev] ++
1,515,140 UART: [ldev] CDI.KEYID = 6
1,515,503 UART: [ldev] SUBJECT.KEYID = 5
1,515,929 UART: [ldev] AUTHORITY.KEYID = 7
1,516,392 UART: [ldev] FE.KEYID = 1
1,521,860 UART: [ldev] Erasing FE.KEYID = 1
1,547,381 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,081 UART: [ldev] --
1,586,584 UART: [fwproc] Waiting for Commands...
1,587,387 UART: [fwproc] Received command 0x46574c44
1,588,178 UART: [fwproc] Received Image of size 114332 bytes
2,911,314 UART: ROM Fatal Error: 0x000B002E
2,912,473 >>> mbox cmd response: failed
2,912,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,912,479 >>> mbox cmd response: failed
2,912,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,912,485 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,716 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,370 UART: [kat] SHA2-256
882,301 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,416 UART: [kat] ++
886,568 UART: [kat] sha1
890,718 UART: [kat] SHA2-256
892,656 UART: [kat] SHA2-384
895,291 UART: [kat] SHA2-512-ACC
897,192 UART: [kat] ECC-384
902,567 UART: [kat] HMAC-384Kdf
907,253 UART: [kat] LMS
1,475,449 UART: [kat] --
1,476,312 UART: [cold-reset] ++
1,476,664 UART: [fht] Storing FHT @ 0x50003400
1,479,375 UART: [idev] ++
1,479,543 UART: [idev] CDI.KEYID = 6
1,479,903 UART: [idev] SUBJECT.KEYID = 7
1,480,327 UART: [idev] UDS.KEYID = 0
1,480,672 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,705 UART: [idev] Erasing UDS.KEYID = 0
1,505,347 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,983 UART: [idev] --
1,515,018 UART: [ldev] ++
1,515,186 UART: [ldev] CDI.KEYID = 6
1,515,549 UART: [ldev] SUBJECT.KEYID = 5
1,515,975 UART: [ldev] AUTHORITY.KEYID = 7
1,516,438 UART: [ldev] FE.KEYID = 1
1,521,454 UART: [ldev] Erasing FE.KEYID = 1
1,546,525 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,357 UART: [ldev] --
1,585,836 UART: [fwproc] Waiting for Commands...
1,586,489 UART: [fwproc] Received command 0x46574c44
1,587,280 UART: [fwproc] Received Image of size 114332 bytes
2,883,969 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,947 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,299 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,044 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,840 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,764,288 >>> mbox cmd response: failed
2,764,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,294 >>> mbox cmd response: failed
2,764,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,300 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,056 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,122 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Manufacturing
85,771 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
893,444 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,569 UART: [kat] ++
897,721 UART: [kat] sha1
902,071 UART: [kat] SHA2-256
904,011 UART: [kat] SHA2-384
906,700 UART: [kat] SHA2-512-ACC
908,601 UART: [kat] ECC-384
918,054 UART: [kat] HMAC-384Kdf
922,488 UART: [kat] LMS
1,170,816 UART: [kat] --
1,171,929 UART: [cold-reset] ++
1,172,415 UART: [fht] FHT @ 0x50003400
1,175,150 UART: [idev] ++
1,175,318 UART: [idev] CDI.KEYID = 6
1,175,678 UART: [idev] SUBJECT.KEYID = 7
1,176,102 UART: [idev] UDS.KEYID = 0
1,176,447 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,424 UART: [idev] Erasing UDS.KEYID = 0
1,201,557 UART: [idev] Sha1 KeyId Algorithm
1,210,201 UART: [idev] --
1,211,461 UART: [ldev] ++
1,211,629 UART: [ldev] CDI.KEYID = 6
1,211,992 UART: [ldev] SUBJECT.KEYID = 5
1,212,418 UART: [ldev] AUTHORITY.KEYID = 7
1,212,881 UART: [ldev] FE.KEYID = 1
1,217,895 UART: [ldev] Erasing FE.KEYID = 1
1,243,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,805 UART: [ldev] --
1,283,108 UART: [fwproc] Wait for Commands...
1,283,860 UART: [fwproc] Recv command 0x46574c44
1,284,588 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,468 UART: ROM Fatal Error: 0x000B002E
2,607,627 >>> mbox cmd response: failed
2,607,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,607,633 >>> mbox cmd response: failed
2,607,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,607,639 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
893,124 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,249 UART: [kat] ++
897,401 UART: [kat] sha1
901,651 UART: [kat] SHA2-256
903,591 UART: [kat] SHA2-384
906,296 UART: [kat] SHA2-512-ACC
908,197 UART: [kat] ECC-384
917,798 UART: [kat] HMAC-384Kdf
922,446 UART: [kat] LMS
1,170,774 UART: [kat] --
1,171,651 UART: [cold-reset] ++
1,172,137 UART: [fht] FHT @ 0x50003400
1,174,716 UART: [idev] ++
1,174,884 UART: [idev] CDI.KEYID = 6
1,175,244 UART: [idev] SUBJECT.KEYID = 7
1,175,668 UART: [idev] UDS.KEYID = 0
1,176,013 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,238 UART: [idev] Erasing UDS.KEYID = 0
1,200,349 UART: [idev] Sha1 KeyId Algorithm
1,208,705 UART: [idev] --
1,209,931 UART: [ldev] ++
1,210,099 UART: [ldev] CDI.KEYID = 6
1,210,462 UART: [ldev] SUBJECT.KEYID = 5
1,210,888 UART: [ldev] AUTHORITY.KEYID = 7
1,211,351 UART: [ldev] FE.KEYID = 1
1,216,661 UART: [ldev] Erasing FE.KEYID = 1
1,243,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,147 UART: [ldev] --
1,282,574 UART: [fwproc] Wait for Commands...
1,283,200 UART: [fwproc] Recv command 0x46574c44
1,283,928 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,546 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,125 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,429 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,326 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,423 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,460,234 >>> mbox cmd response: failed
2,460,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,460,240 >>> mbox cmd response: failed
2,460,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,460,246 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,207 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,813 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Manufacturing
85,730 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
893,351 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,476 UART: [kat] ++
897,628 UART: [kat] sha1
901,756 UART: [kat] SHA2-256
903,696 UART: [kat] SHA2-384
906,455 UART: [kat] SHA2-512-ACC
908,356 UART: [kat] ECC-384
918,339 UART: [kat] HMAC-384Kdf
922,845 UART: [kat] LMS
1,171,173 UART: [kat] --
1,171,966 UART: [cold-reset] ++
1,172,534 UART: [fht] FHT @ 0x50003400
1,175,167 UART: [idev] ++
1,175,335 UART: [idev] CDI.KEYID = 6
1,175,695 UART: [idev] SUBJECT.KEYID = 7
1,176,119 UART: [idev] UDS.KEYID = 0
1,176,464 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,381 UART: [idev] Erasing UDS.KEYID = 0
1,201,290 UART: [idev] Sha1 KeyId Algorithm
1,209,730 UART: [idev] --
1,210,796 UART: [ldev] ++
1,210,964 UART: [ldev] CDI.KEYID = 6
1,211,327 UART: [ldev] SUBJECT.KEYID = 5
1,211,753 UART: [ldev] AUTHORITY.KEYID = 7
1,212,216 UART: [ldev] FE.KEYID = 1
1,217,360 UART: [ldev] Erasing FE.KEYID = 1
1,243,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,146 UART: [ldev] --
1,282,469 UART: [fwproc] Wait for Commands...
1,283,221 UART: [fwproc] Recv command 0x46574c44
1,283,949 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,825 UART: ROM Fatal Error: 0x000B002E
2,606,984 >>> mbox cmd response: failed
2,606,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,990 >>> mbox cmd response: failed
2,606,990 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,996 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,438 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
893,377 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,502 UART: [kat] ++
897,654 UART: [kat] sha1
902,004 UART: [kat] SHA2-256
903,944 UART: [kat] SHA2-384
906,689 UART: [kat] SHA2-512-ACC
908,590 UART: [kat] ECC-384
918,487 UART: [kat] HMAC-384Kdf
923,083 UART: [kat] LMS
1,171,411 UART: [kat] --
1,172,354 UART: [cold-reset] ++
1,172,916 UART: [fht] FHT @ 0x50003400
1,175,677 UART: [idev] ++
1,175,845 UART: [idev] CDI.KEYID = 6
1,176,205 UART: [idev] SUBJECT.KEYID = 7
1,176,629 UART: [idev] UDS.KEYID = 0
1,176,974 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,677 UART: [idev] Erasing UDS.KEYID = 0
1,202,204 UART: [idev] Sha1 KeyId Algorithm
1,210,922 UART: [idev] --
1,211,944 UART: [ldev] ++
1,212,112 UART: [ldev] CDI.KEYID = 6
1,212,475 UART: [ldev] SUBJECT.KEYID = 5
1,212,901 UART: [ldev] AUTHORITY.KEYID = 7
1,213,364 UART: [ldev] FE.KEYID = 1
1,218,594 UART: [ldev] Erasing FE.KEYID = 1
1,244,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,536 UART: [ldev] --
1,283,839 UART: [fwproc] Wait for Commands...
1,284,549 UART: [fwproc] Recv command 0x46574c44
1,285,277 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,926 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,230 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,045 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,844 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,463,501 >>> mbox cmd response: failed
2,463,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,463,507 >>> mbox cmd response: failed
2,463,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,463,513 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,850 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,028 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,732 UART: [state] LifecycleState = Manufacturing
86,387 UART: [state] DebugLocked = No
87,009 UART: [state] WD Timer not started. Device not locked for debugging
88,160 UART: [kat] SHA2-256
891,710 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,839 UART: [kat] ++
895,991 UART: [kat] sha1
900,057 UART: [kat] SHA2-256
901,997 UART: [kat] SHA2-384
904,772 UART: [kat] SHA2-512-ACC
906,673 UART: [kat] ECC-384
916,240 UART: [kat] HMAC-384Kdf
920,844 UART: [kat] LMS
1,169,156 UART: [kat] --
1,170,173 UART: [cold-reset] ++
1,170,625 UART: [fht] FHT @ 0x50003400
1,173,523 UART: [idev] ++
1,173,691 UART: [idev] CDI.KEYID = 6
1,174,052 UART: [idev] SUBJECT.KEYID = 7
1,174,477 UART: [idev] UDS.KEYID = 0
1,174,823 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,255 UART: [idev] Erasing UDS.KEYID = 0
1,199,505 UART: [idev] Sha1 KeyId Algorithm
1,208,353 UART: [idev] --
1,209,512 UART: [ldev] ++
1,209,680 UART: [ldev] CDI.KEYID = 6
1,210,044 UART: [ldev] SUBJECT.KEYID = 5
1,210,471 UART: [ldev] AUTHORITY.KEYID = 7
1,210,934 UART: [ldev] FE.KEYID = 1
1,216,386 UART: [ldev] Erasing FE.KEYID = 1
1,242,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,412 UART: [ldev] --
1,281,906 UART: [fwproc] Wait for Commands...
1,282,589 UART: [fwproc] Recv command 0x46574c44
1,283,322 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,167 UART: ROM Fatal Error: 0x000B002E
2,606,326 >>> mbox cmd response: failed
2,606,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,332 >>> mbox cmd response: failed
2,606,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,338 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
891,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,469 UART: [kat] SHA2-256
901,409 UART: [kat] SHA2-384
904,198 UART: [kat] SHA2-512-ACC
906,099 UART: [kat] ECC-384
915,852 UART: [kat] HMAC-384Kdf
920,204 UART: [kat] LMS
1,168,516 UART: [kat] --
1,169,485 UART: [cold-reset] ++
1,169,867 UART: [fht] FHT @ 0x50003400
1,172,601 UART: [idev] ++
1,172,769 UART: [idev] CDI.KEYID = 6
1,173,130 UART: [idev] SUBJECT.KEYID = 7
1,173,555 UART: [idev] UDS.KEYID = 0
1,173,901 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,603 UART: [idev] Erasing UDS.KEYID = 0
1,198,481 UART: [idev] Sha1 KeyId Algorithm
1,207,319 UART: [idev] --
1,208,518 UART: [ldev] ++
1,208,686 UART: [ldev] CDI.KEYID = 6
1,209,050 UART: [ldev] SUBJECT.KEYID = 5
1,209,477 UART: [ldev] AUTHORITY.KEYID = 7
1,209,940 UART: [ldev] FE.KEYID = 1
1,215,066 UART: [ldev] Erasing FE.KEYID = 1
1,241,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,628 UART: [ldev] --
1,281,106 UART: [fwproc] Wait for Commands...
1,281,765 UART: [fwproc] Recv command 0x46574c44
1,282,498 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,953 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,947 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,256 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,150 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,754 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,456,807 >>> mbox cmd response: failed
2,456,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,456,813 >>> mbox cmd response: failed
2,456,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,456,819 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,120 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,380 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Manufacturing
85,998 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
891,355 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,484 UART: [kat] ++
895,636 UART: [kat] sha1
899,848 UART: [kat] SHA2-256
901,788 UART: [kat] SHA2-384
904,513 UART: [kat] SHA2-512-ACC
906,414 UART: [kat] ECC-384
916,259 UART: [kat] HMAC-384Kdf
920,877 UART: [kat] LMS
1,169,189 UART: [kat] --
1,170,162 UART: [cold-reset] ++
1,170,624 UART: [fht] FHT @ 0x50003400
1,173,352 UART: [idev] ++
1,173,520 UART: [idev] CDI.KEYID = 6
1,173,881 UART: [idev] SUBJECT.KEYID = 7
1,174,306 UART: [idev] UDS.KEYID = 0
1,174,652 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,646 UART: [idev] Erasing UDS.KEYID = 0
1,199,800 UART: [idev] Sha1 KeyId Algorithm
1,208,626 UART: [idev] --
1,209,763 UART: [ldev] ++
1,209,931 UART: [ldev] CDI.KEYID = 6
1,210,295 UART: [ldev] SUBJECT.KEYID = 5
1,210,722 UART: [ldev] AUTHORITY.KEYID = 7
1,211,185 UART: [ldev] FE.KEYID = 1
1,216,335 UART: [ldev] Erasing FE.KEYID = 1
1,242,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,475 UART: [ldev] --
1,281,819 UART: [fwproc] Wait for Commands...
1,282,602 UART: [fwproc] Recv command 0x46574c44
1,283,335 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,108 UART: ROM Fatal Error: 0x000B002E
2,606,267 >>> mbox cmd response: failed
2,606,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,273 >>> mbox cmd response: failed
2,606,273 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,279 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,856 UART: [kat] SHA2-256
901,796 UART: [kat] SHA2-384
904,367 UART: [kat] SHA2-512-ACC
906,268 UART: [kat] ECC-384
916,155 UART: [kat] HMAC-384Kdf
920,645 UART: [kat] LMS
1,168,957 UART: [kat] --
1,169,894 UART: [cold-reset] ++
1,170,308 UART: [fht] FHT @ 0x50003400
1,172,836 UART: [idev] ++
1,173,004 UART: [idev] CDI.KEYID = 6
1,173,365 UART: [idev] SUBJECT.KEYID = 7
1,173,790 UART: [idev] UDS.KEYID = 0
1,174,136 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,712 UART: [idev] Erasing UDS.KEYID = 0
1,198,028 UART: [idev] Sha1 KeyId Algorithm
1,207,092 UART: [idev] --
1,208,301 UART: [ldev] ++
1,208,469 UART: [ldev] CDI.KEYID = 6
1,208,833 UART: [ldev] SUBJECT.KEYID = 5
1,209,260 UART: [ldev] AUTHORITY.KEYID = 7
1,209,723 UART: [ldev] FE.KEYID = 1
1,215,241 UART: [ldev] Erasing FE.KEYID = 1
1,241,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,819 UART: [ldev] --
1,281,219 UART: [fwproc] Wait for Commands...
1,281,908 UART: [fwproc] Recv command 0x46574c44
1,282,641 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,906 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,215 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,959 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,575 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,458,656 >>> mbox cmd response: failed
2,458,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,662 >>> mbox cmd response: failed
2,458,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,668 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,143 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,691 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,359 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,201,525 >>> mbox cmd response: failed
1,201,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,531 >>> mbox cmd response: failed
1,201,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,537 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,231 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,945 UART: [kat] SHA2-256
881,876 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,991 UART: [kat] ++
886,143 UART: [kat] sha1
890,409 UART: [kat] SHA2-256
892,347 UART: [kat] SHA2-384
895,132 UART: [kat] SHA2-512-ACC
897,033 UART: [kat] ECC-384
902,472 UART: [kat] HMAC-384Kdf
907,174 UART: [kat] LMS
1,475,370 UART: [kat] --
1,476,161 UART: [cold-reset] ++
1,476,567 UART: [fht] Storing FHT @ 0x50003400
1,479,272 UART: [idev] ++
1,479,440 UART: [idev] CDI.KEYID = 6
1,479,800 UART: [idev] SUBJECT.KEYID = 7
1,480,224 UART: [idev] UDS.KEYID = 0
1,480,569 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,472 UART: [idev] Erasing UDS.KEYID = 0
1,505,452 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,172 UART: [idev] --
1,515,329 UART: [ldev] ++
1,515,497 UART: [ldev] CDI.KEYID = 6
1,515,860 UART: [ldev] SUBJECT.KEYID = 5
1,516,286 UART: [ldev] AUTHORITY.KEYID = 7
1,516,749 UART: [ldev] FE.KEYID = 1
1,522,061 UART: [ldev] Erasing FE.KEYID = 1
1,547,600 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,666 UART: [ldev] --
1,587,123 UART: [fwproc] Waiting for Commands...
1,587,832 UART: [fwproc] Received command 0x46574c44
1,588,623 UART: [fwproc] Received Image of size 114332 bytes
2,885,880 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,628 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,980 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,951 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,841 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,203,043 >>> mbox cmd response: failed
1,203,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,049 >>> mbox cmd response: failed
1,203,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,055 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,995 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,513 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,098 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,204,430 >>> mbox cmd response: failed
1,204,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,436 >>> mbox cmd response: failed
1,204,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,442 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,705 UART: [state] LifecycleState = Unprovisioned
86,360 UART: [state] DebugLocked = No
87,096 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,648 UART: [kat] SHA2-256
882,579 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,694 UART: [kat] ++
886,846 UART: [kat] sha1
891,068 UART: [kat] SHA2-256
893,006 UART: [kat] SHA2-384
895,943 UART: [kat] SHA2-512-ACC
897,844 UART: [kat] ECC-384
903,341 UART: [kat] HMAC-384Kdf
908,045 UART: [kat] LMS
1,476,241 UART: [kat] --
1,477,142 UART: [cold-reset] ++
1,477,600 UART: [fht] Storing FHT @ 0x50003400
1,480,553 UART: [idev] ++
1,480,721 UART: [idev] CDI.KEYID = 6
1,481,081 UART: [idev] SUBJECT.KEYID = 7
1,481,505 UART: [idev] UDS.KEYID = 0
1,481,850 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,633 UART: [idev] Erasing UDS.KEYID = 0
1,506,029 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,757 UART: [idev] --
1,515,778 UART: [ldev] ++
1,515,946 UART: [ldev] CDI.KEYID = 6
1,516,309 UART: [ldev] SUBJECT.KEYID = 5
1,516,735 UART: [ldev] AUTHORITY.KEYID = 7
1,517,198 UART: [ldev] FE.KEYID = 1
1,522,154 UART: [ldev] Erasing FE.KEYID = 1
1,547,233 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,121 UART: [ldev] --
1,586,512 UART: [fwproc] Waiting for Commands...
1,587,321 UART: [fwproc] Received command 0x46574c44
1,588,112 UART: [fwproc] Received Image of size 114332 bytes
2,885,307 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,051 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,403 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,356 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,130 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,203,708 >>> mbox cmd response: failed
1,203,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,714 >>> mbox cmd response: failed
1,203,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,882 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,934 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,321 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,201,715 >>> mbox cmd response: failed
1,201,715 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,721 >>> mbox cmd response: failed
1,201,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,727 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
893,168 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,293 UART: [kat] ++
897,445 UART: [kat] sha1
901,815 UART: [kat] SHA2-256
903,755 UART: [kat] SHA2-384
906,544 UART: [kat] SHA2-512-ACC
908,445 UART: [kat] ECC-384
917,938 UART: [kat] HMAC-384Kdf
922,580 UART: [kat] LMS
1,170,908 UART: [kat] --
1,171,811 UART: [cold-reset] ++
1,172,307 UART: [fht] FHT @ 0x50003400
1,174,984 UART: [idev] ++
1,175,152 UART: [idev] CDI.KEYID = 6
1,175,512 UART: [idev] SUBJECT.KEYID = 7
1,175,936 UART: [idev] UDS.KEYID = 0
1,176,281 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,852 UART: [idev] Erasing UDS.KEYID = 0
1,200,399 UART: [idev] Sha1 KeyId Algorithm
1,208,813 UART: [idev] --
1,209,971 UART: [ldev] ++
1,210,139 UART: [ldev] CDI.KEYID = 6
1,210,502 UART: [ldev] SUBJECT.KEYID = 5
1,210,928 UART: [ldev] AUTHORITY.KEYID = 7
1,211,391 UART: [ldev] FE.KEYID = 1
1,216,391 UART: [ldev] Erasing FE.KEYID = 1
1,242,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,313 UART: [ldev] --
1,281,824 UART: [fwproc] Wait for Commands...
1,282,424 UART: [fwproc] Recv command 0x46574c44
1,283,152 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,590 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,063 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,367 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,258 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,679 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,201,137 >>> mbox cmd response: failed
1,201,137 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,143 >>> mbox cmd response: failed
1,201,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,149 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,863 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,591 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,144 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,204,568 >>> mbox cmd response: failed
1,204,568 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,574 >>> mbox cmd response: failed
1,204,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,580 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
893,399 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,524 UART: [kat] ++
897,676 UART: [kat] sha1
901,876 UART: [kat] SHA2-256
903,816 UART: [kat] SHA2-384
906,591 UART: [kat] SHA2-512-ACC
908,492 UART: [kat] ECC-384
918,343 UART: [kat] HMAC-384Kdf
922,997 UART: [kat] LMS
1,171,325 UART: [kat] --
1,172,368 UART: [cold-reset] ++
1,172,812 UART: [fht] FHT @ 0x50003400
1,175,559 UART: [idev] ++
1,175,727 UART: [idev] CDI.KEYID = 6
1,176,087 UART: [idev] SUBJECT.KEYID = 7
1,176,511 UART: [idev] UDS.KEYID = 0
1,176,856 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,799 UART: [idev] Erasing UDS.KEYID = 0
1,202,634 UART: [idev] Sha1 KeyId Algorithm
1,211,012 UART: [idev] --
1,212,078 UART: [ldev] ++
1,212,246 UART: [ldev] CDI.KEYID = 6
1,212,609 UART: [ldev] SUBJECT.KEYID = 5
1,213,035 UART: [ldev] AUTHORITY.KEYID = 7
1,213,498 UART: [ldev] FE.KEYID = 1
1,218,906 UART: [ldev] Erasing FE.KEYID = 1
1,245,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,908 UART: [ldev] --
1,284,207 UART: [fwproc] Wait for Commands...
1,284,809 UART: [fwproc] Recv command 0x46574c44
1,285,537 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,625 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,280 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,584 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,413 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,122 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,203,456 >>> mbox cmd response: failed
1,203,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,462 >>> mbox cmd response: failed
1,203,462 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,468 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,028 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,436 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,001 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,201,381 >>> mbox cmd response: failed
1,201,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,387 >>> mbox cmd response: failed
1,201,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,393 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
891,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,365 UART: [kat] ++
895,517 UART: [kat] sha1
899,871 UART: [kat] SHA2-256
901,811 UART: [kat] SHA2-384
904,652 UART: [kat] SHA2-512-ACC
906,553 UART: [kat] ECC-384
915,904 UART: [kat] HMAC-384Kdf
920,434 UART: [kat] LMS
1,168,746 UART: [kat] --
1,169,923 UART: [cold-reset] ++
1,170,443 UART: [fht] FHT @ 0x50003400
1,173,121 UART: [idev] ++
1,173,289 UART: [idev] CDI.KEYID = 6
1,173,650 UART: [idev] SUBJECT.KEYID = 7
1,174,075 UART: [idev] UDS.KEYID = 0
1,174,421 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,915 UART: [idev] Erasing UDS.KEYID = 0
1,199,535 UART: [idev] Sha1 KeyId Algorithm
1,208,405 UART: [idev] --
1,209,568 UART: [ldev] ++
1,209,736 UART: [ldev] CDI.KEYID = 6
1,210,100 UART: [ldev] SUBJECT.KEYID = 5
1,210,527 UART: [ldev] AUTHORITY.KEYID = 7
1,210,990 UART: [ldev] FE.KEYID = 1
1,215,824 UART: [ldev] Erasing FE.KEYID = 1
1,242,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,656 UART: [ldev] --
1,282,140 UART: [fwproc] Wait for Commands...
1,282,791 UART: [fwproc] Recv command 0x46574c44
1,283,524 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,909 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,265 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,574 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,340 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,279 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,202,263 >>> mbox cmd response: failed
1,202,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,269 >>> mbox cmd response: failed
1,202,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,275 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,212 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,216 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,694 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,204,294 >>> mbox cmd response: failed
1,204,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,300 >>> mbox cmd response: failed
1,204,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,306 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,988 UART: [kat] SHA2-256
901,928 UART: [kat] SHA2-384
904,845 UART: [kat] SHA2-512-ACC
906,746 UART: [kat] ECC-384
916,585 UART: [kat] HMAC-384Kdf
921,097 UART: [kat] LMS
1,169,409 UART: [kat] --
1,170,496 UART: [cold-reset] ++
1,170,878 UART: [fht] FHT @ 0x50003400
1,173,732 UART: [idev] ++
1,173,900 UART: [idev] CDI.KEYID = 6
1,174,261 UART: [idev] SUBJECT.KEYID = 7
1,174,686 UART: [idev] UDS.KEYID = 0
1,175,032 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,852 UART: [idev] Erasing UDS.KEYID = 0
1,200,076 UART: [idev] Sha1 KeyId Algorithm
1,209,200 UART: [idev] --
1,210,217 UART: [ldev] ++
1,210,385 UART: [ldev] CDI.KEYID = 6
1,210,749 UART: [ldev] SUBJECT.KEYID = 5
1,211,176 UART: [ldev] AUTHORITY.KEYID = 7
1,211,639 UART: [ldev] FE.KEYID = 1
1,216,917 UART: [ldev] Erasing FE.KEYID = 1
1,243,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,433 UART: [ldev] --
1,282,931 UART: [fwproc] Wait for Commands...
1,283,616 UART: [fwproc] Recv command 0x46574c44
1,284,349 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,406 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,198 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,507 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,341 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,064 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,202,532 >>> mbox cmd response: failed
1,202,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,538 >>> mbox cmd response: failed
1,202,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,544 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,211 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,909 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,407 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,985 UART: [kat] SHA2-256
881,916 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,031 UART: [kat] ++
886,183 UART: [kat] sha1
890,535 UART: [kat] SHA2-256
892,473 UART: [kat] SHA2-384
895,196 UART: [kat] SHA2-512-ACC
897,097 UART: [kat] ECC-384
902,732 UART: [kat] HMAC-384Kdf
907,498 UART: [kat] LMS
1,475,694 UART: [kat] --
1,476,641 UART: [cold-reset] ++
1,477,081 UART: [fht] Storing FHT @ 0x50003400
1,479,876 UART: [idev] ++
1,480,044 UART: [idev] CDI.KEYID = 6
1,480,404 UART: [idev] SUBJECT.KEYID = 7
1,480,828 UART: [idev] UDS.KEYID = 0
1,481,173 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,574 UART: [idev] Erasing UDS.KEYID = 0
1,504,294 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,872 UART: [idev] --
1,513,999 UART: [ldev] ++
1,514,167 UART: [ldev] CDI.KEYID = 6
1,514,530 UART: [ldev] SUBJECT.KEYID = 5
1,514,956 UART: [ldev] AUTHORITY.KEYID = 7
1,515,419 UART: [ldev] FE.KEYID = 1
1,520,517 UART: [ldev] Erasing FE.KEYID = 1
1,545,834 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,714 UART: [ldev] --
1,585,131 UART: [fwproc] Waiting for Commands...
1,585,904 UART: [fwproc] Received command 0x46574c44
1,586,695 UART: [fwproc] Received Image of size 114332 bytes
1,634,920 UART: ROM Fatal Error: 0x000B0012
1,636,077 >>> mbox cmd response: failed
1,636,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,083 >>> mbox cmd response: failed
1,636,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,089 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,407 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,061 UART: [kat] SHA2-256
881,992 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,107 UART: [kat] ++
886,259 UART: [kat] sha1
890,467 UART: [kat] SHA2-256
892,405 UART: [kat] SHA2-384
895,224 UART: [kat] SHA2-512-ACC
897,125 UART: [kat] ECC-384
902,356 UART: [kat] HMAC-384Kdf
906,894 UART: [kat] LMS
1,475,090 UART: [kat] --
1,475,781 UART: [cold-reset] ++
1,476,139 UART: [fht] Storing FHT @ 0x50003400
1,478,844 UART: [idev] ++
1,479,012 UART: [idev] CDI.KEYID = 6
1,479,372 UART: [idev] SUBJECT.KEYID = 7
1,479,796 UART: [idev] UDS.KEYID = 0
1,480,141 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,592 UART: [idev] Erasing UDS.KEYID = 0
1,504,280 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,898 UART: [idev] --
1,513,901 UART: [ldev] ++
1,514,069 UART: [ldev] CDI.KEYID = 6
1,514,432 UART: [ldev] SUBJECT.KEYID = 5
1,514,858 UART: [ldev] AUTHORITY.KEYID = 7
1,515,321 UART: [ldev] FE.KEYID = 1
1,520,825 UART: [ldev] Erasing FE.KEYID = 1
1,546,434 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,022 UART: [ldev] --
1,585,427 UART: [fwproc] Waiting for Commands...
1,586,202 UART: [fwproc] Received command 0x46574c44
1,586,993 UART: [fwproc] Received Image of size 114332 bytes
2,884,802 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,868 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,220 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,199 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,877 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,130 >>> mbox cmd response: failed
1,488,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,136 >>> mbox cmd response: failed
1,488,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,142 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,409 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,745 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,612 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,326 UART: [kat] SHA2-256
882,257 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,372 UART: [kat] ++
886,524 UART: [kat] sha1
890,950 UART: [kat] SHA2-256
892,888 UART: [kat] SHA2-384
895,617 UART: [kat] SHA2-512-ACC
897,518 UART: [kat] ECC-384
903,511 UART: [kat] HMAC-384Kdf
908,185 UART: [kat] LMS
1,476,381 UART: [kat] --
1,477,550 UART: [cold-reset] ++
1,478,106 UART: [fht] Storing FHT @ 0x50003400
1,480,995 UART: [idev] ++
1,481,163 UART: [idev] CDI.KEYID = 6
1,481,523 UART: [idev] SUBJECT.KEYID = 7
1,481,947 UART: [idev] UDS.KEYID = 0
1,482,292 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,490,401 UART: [idev] Erasing UDS.KEYID = 0
1,506,989 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,589 UART: [idev] --
1,516,730 UART: [ldev] ++
1,516,898 UART: [ldev] CDI.KEYID = 6
1,517,261 UART: [ldev] SUBJECT.KEYID = 5
1,517,687 UART: [ldev] AUTHORITY.KEYID = 7
1,518,150 UART: [ldev] FE.KEYID = 1
1,523,288 UART: [ldev] Erasing FE.KEYID = 1
1,548,013 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,901 UART: [ldev] --
1,587,410 UART: [fwproc] Waiting for Commands...
1,588,093 UART: [fwproc] Received command 0x46574c44
1,588,884 UART: [fwproc] Received Image of size 114332 bytes
1,635,391 UART: ROM Fatal Error: 0x000B0012
1,636,548 >>> mbox cmd response: failed
1,636,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,554 >>> mbox cmd response: failed
1,636,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,560 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,386 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,964 UART: [kat] SHA2-256
881,895 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,010 UART: [kat] ++
886,162 UART: [kat] sha1
890,324 UART: [kat] SHA2-256
892,262 UART: [kat] SHA2-384
895,185 UART: [kat] SHA2-512-ACC
897,086 UART: [kat] ECC-384
902,731 UART: [kat] HMAC-384Kdf
907,547 UART: [kat] LMS
1,475,743 UART: [kat] --
1,476,868 UART: [cold-reset] ++
1,477,228 UART: [fht] Storing FHT @ 0x50003400
1,480,069 UART: [idev] ++
1,480,237 UART: [idev] CDI.KEYID = 6
1,480,597 UART: [idev] SUBJECT.KEYID = 7
1,481,021 UART: [idev] UDS.KEYID = 0
1,481,366 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,917 UART: [idev] Erasing UDS.KEYID = 0
1,505,649 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,319 UART: [idev] --
1,515,340 UART: [ldev] ++
1,515,508 UART: [ldev] CDI.KEYID = 6
1,515,871 UART: [ldev] SUBJECT.KEYID = 5
1,516,297 UART: [ldev] AUTHORITY.KEYID = 7
1,516,760 UART: [ldev] FE.KEYID = 1
1,522,040 UART: [ldev] Erasing FE.KEYID = 1
1,547,539 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,791 UART: [ldev] --
1,587,172 UART: [fwproc] Waiting for Commands...
1,587,909 UART: [fwproc] Received command 0x46574c44
1,588,700 UART: [fwproc] Received Image of size 114332 bytes
2,886,811 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,333 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,685 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,520 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,488 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,255 >>> mbox cmd response: failed
1,488,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,261 >>> mbox cmd response: failed
1,488,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,030 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,644 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,394 UART: [state] LifecycleState = Unprovisioned
86,049 UART: [state] DebugLocked = No
86,679 UART: [state] WD Timer not started. Device not locked for debugging
88,008 UART: [kat] SHA2-256
893,658 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,783 UART: [kat] ++
897,935 UART: [kat] sha1
902,367 UART: [kat] SHA2-256
904,307 UART: [kat] SHA2-384
907,028 UART: [kat] SHA2-512-ACC
908,929 UART: [kat] ECC-384
918,552 UART: [kat] HMAC-384Kdf
923,318 UART: [kat] LMS
1,171,646 UART: [kat] --
1,172,395 UART: [cold-reset] ++
1,172,751 UART: [fht] FHT @ 0x50003400
1,175,312 UART: [idev] ++
1,175,480 UART: [idev] CDI.KEYID = 6
1,175,840 UART: [idev] SUBJECT.KEYID = 7
1,176,264 UART: [idev] UDS.KEYID = 0
1,176,609 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,572 UART: [idev] Erasing UDS.KEYID = 0
1,201,401 UART: [idev] Sha1 KeyId Algorithm
1,209,973 UART: [idev] --
1,211,081 UART: [ldev] ++
1,211,249 UART: [ldev] CDI.KEYID = 6
1,211,612 UART: [ldev] SUBJECT.KEYID = 5
1,212,038 UART: [ldev] AUTHORITY.KEYID = 7
1,212,501 UART: [ldev] FE.KEYID = 1
1,217,575 UART: [ldev] Erasing FE.KEYID = 1
1,244,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,705 UART: [ldev] --
1,283,156 UART: [fwproc] Wait for Commands...
1,283,898 UART: [fwproc] Recv command 0x46574c44
1,284,626 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,247 UART: ROM Fatal Error: 0x000B0012
1,332,404 >>> mbox cmd response: failed
1,332,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,410 >>> mbox cmd response: failed
1,332,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,416 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Unprovisioned
85,541 UART: [state] DebugLocked = No
86,037 UART: [state] WD Timer not started. Device not locked for debugging
87,152 UART: [kat] SHA2-256
892,802 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,927 UART: [kat] ++
897,079 UART: [kat] sha1
901,175 UART: [kat] SHA2-256
903,115 UART: [kat] SHA2-384
905,984 UART: [kat] SHA2-512-ACC
907,885 UART: [kat] ECC-384
917,422 UART: [kat] HMAC-384Kdf
921,902 UART: [kat] LMS
1,170,230 UART: [kat] --
1,171,111 UART: [cold-reset] ++
1,171,679 UART: [fht] FHT @ 0x50003400
1,174,334 UART: [idev] ++
1,174,502 UART: [idev] CDI.KEYID = 6
1,174,862 UART: [idev] SUBJECT.KEYID = 7
1,175,286 UART: [idev] UDS.KEYID = 0
1,175,631 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,960 UART: [idev] Erasing UDS.KEYID = 0
1,200,625 UART: [idev] Sha1 KeyId Algorithm
1,209,061 UART: [idev] --
1,210,133 UART: [ldev] ++
1,210,301 UART: [ldev] CDI.KEYID = 6
1,210,664 UART: [ldev] SUBJECT.KEYID = 5
1,211,090 UART: [ldev] AUTHORITY.KEYID = 7
1,211,553 UART: [ldev] FE.KEYID = 1
1,216,679 UART: [ldev] Erasing FE.KEYID = 1
1,242,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,541 UART: [ldev] --
1,281,814 UART: [fwproc] Wait for Commands...
1,282,554 UART: [fwproc] Recv command 0x46574c44
1,283,282 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,467 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,662 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,707 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,623 >>> mbox cmd response: failed
1,185,623 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,629 >>> mbox cmd response: failed
1,185,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,635 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,433 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,005 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
893,649 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,774 UART: [kat] ++
897,926 UART: [kat] sha1
902,082 UART: [kat] SHA2-256
904,022 UART: [kat] SHA2-384
906,815 UART: [kat] SHA2-512-ACC
908,716 UART: [kat] ECC-384
918,039 UART: [kat] HMAC-384Kdf
922,681 UART: [kat] LMS
1,171,009 UART: [kat] --
1,171,768 UART: [cold-reset] ++
1,172,250 UART: [fht] FHT @ 0x50003400
1,174,901 UART: [idev] ++
1,175,069 UART: [idev] CDI.KEYID = 6
1,175,429 UART: [idev] SUBJECT.KEYID = 7
1,175,853 UART: [idev] UDS.KEYID = 0
1,176,198 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,937 UART: [idev] Erasing UDS.KEYID = 0
1,201,238 UART: [idev] Sha1 KeyId Algorithm
1,209,698 UART: [idev] --
1,210,836 UART: [ldev] ++
1,211,004 UART: [ldev] CDI.KEYID = 6
1,211,367 UART: [ldev] SUBJECT.KEYID = 5
1,211,793 UART: [ldev] AUTHORITY.KEYID = 7
1,212,256 UART: [ldev] FE.KEYID = 1
1,217,420 UART: [ldev] Erasing FE.KEYID = 1
1,244,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,900 UART: [ldev] --
1,283,401 UART: [fwproc] Wait for Commands...
1,284,181 UART: [fwproc] Recv command 0x46574c44
1,284,909 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,910 UART: ROM Fatal Error: 0x000B0012
1,332,067 >>> mbox cmd response: failed
1,332,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,073 >>> mbox cmd response: failed
1,332,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,079 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,163 UART: [state] LifecycleState = Unprovisioned
85,818 UART: [state] DebugLocked = No
86,350 UART: [state] WD Timer not started. Device not locked for debugging
87,605 UART: [kat] SHA2-256
893,255 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,380 UART: [kat] ++
897,532 UART: [kat] sha1
901,620 UART: [kat] SHA2-256
903,560 UART: [kat] SHA2-384
906,103 UART: [kat] SHA2-512-ACC
908,004 UART: [kat] ECC-384
917,563 UART: [kat] HMAC-384Kdf
922,159 UART: [kat] LMS
1,170,487 UART: [kat] --
1,171,438 UART: [cold-reset] ++
1,172,004 UART: [fht] FHT @ 0x50003400
1,174,695 UART: [idev] ++
1,174,863 UART: [idev] CDI.KEYID = 6
1,175,223 UART: [idev] SUBJECT.KEYID = 7
1,175,647 UART: [idev] UDS.KEYID = 0
1,175,992 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,241 UART: [idev] Erasing UDS.KEYID = 0
1,201,474 UART: [idev] Sha1 KeyId Algorithm
1,210,074 UART: [idev] --
1,211,070 UART: [ldev] ++
1,211,238 UART: [ldev] CDI.KEYID = 6
1,211,601 UART: [ldev] SUBJECT.KEYID = 5
1,212,027 UART: [ldev] AUTHORITY.KEYID = 7
1,212,490 UART: [ldev] FE.KEYID = 1
1,217,700 UART: [ldev] Erasing FE.KEYID = 1
1,243,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,494 UART: [ldev] --
1,282,985 UART: [fwproc] Wait for Commands...
1,283,605 UART: [fwproc] Recv command 0x46574c44
1,284,333 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,802 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,695 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,040 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,188,226 >>> mbox cmd response: failed
1,188,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,232 >>> mbox cmd response: failed
1,188,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,238 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,052 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,422 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,720 UART: [state] LifecycleState = Unprovisioned
85,375 UART: [state] DebugLocked = No
86,057 UART: [state] WD Timer not started. Device not locked for debugging
87,404 UART: [kat] SHA2-256
890,954 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,083 UART: [kat] ++
895,235 UART: [kat] sha1
899,455 UART: [kat] SHA2-256
901,395 UART: [kat] SHA2-384
904,118 UART: [kat] SHA2-512-ACC
906,019 UART: [kat] ECC-384
915,882 UART: [kat] HMAC-384Kdf
920,450 UART: [kat] LMS
1,168,762 UART: [kat] --
1,169,565 UART: [cold-reset] ++
1,169,951 UART: [fht] FHT @ 0x50003400
1,172,765 UART: [idev] ++
1,172,933 UART: [idev] CDI.KEYID = 6
1,173,294 UART: [idev] SUBJECT.KEYID = 7
1,173,719 UART: [idev] UDS.KEYID = 0
1,174,065 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,203 UART: [idev] Erasing UDS.KEYID = 0
1,199,503 UART: [idev] Sha1 KeyId Algorithm
1,208,631 UART: [idev] --
1,209,870 UART: [ldev] ++
1,210,038 UART: [ldev] CDI.KEYID = 6
1,210,402 UART: [ldev] SUBJECT.KEYID = 5
1,210,829 UART: [ldev] AUTHORITY.KEYID = 7
1,211,292 UART: [ldev] FE.KEYID = 1
1,216,698 UART: [ldev] Erasing FE.KEYID = 1
1,242,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,642 UART: [ldev] --
1,282,086 UART: [fwproc] Wait for Commands...
1,282,843 UART: [fwproc] Recv command 0x46574c44
1,283,576 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,145 UART: ROM Fatal Error: 0x000B0012
1,332,302 >>> mbox cmd response: failed
1,332,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,308 >>> mbox cmd response: failed
1,332,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,314 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,505 UART: [state] WD Timer not started. Device not locked for debugging
87,662 UART: [kat] SHA2-256
891,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,341 UART: [kat] ++
895,493 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,512 UART: [kat] SHA2-512-ACC
906,413 UART: [kat] ECC-384
916,144 UART: [kat] HMAC-384Kdf
920,772 UART: [kat] LMS
1,169,084 UART: [kat] --
1,169,999 UART: [cold-reset] ++
1,170,543 UART: [fht] FHT @ 0x50003400
1,173,109 UART: [idev] ++
1,173,277 UART: [idev] CDI.KEYID = 6
1,173,638 UART: [idev] SUBJECT.KEYID = 7
1,174,063 UART: [idev] UDS.KEYID = 0
1,174,409 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,955 UART: [idev] Erasing UDS.KEYID = 0
1,198,837 UART: [idev] Sha1 KeyId Algorithm
1,207,725 UART: [idev] --
1,208,606 UART: [ldev] ++
1,208,774 UART: [ldev] CDI.KEYID = 6
1,209,138 UART: [ldev] SUBJECT.KEYID = 5
1,209,565 UART: [ldev] AUTHORITY.KEYID = 7
1,210,028 UART: [ldev] FE.KEYID = 1
1,215,332 UART: [ldev] Erasing FE.KEYID = 1
1,241,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,052 UART: [ldev] --
1,280,374 UART: [fwproc] Wait for Commands...
1,281,101 UART: [fwproc] Recv command 0x46574c44
1,281,834 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,419 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,728 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,769,660 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,056 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,245 >>> mbox cmd response: failed
1,182,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,251 >>> mbox cmd response: failed
1,182,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,257 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,202 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,328 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,929 UART: [state] LifecycleState = Unprovisioned
86,584 UART: [state] DebugLocked = No
87,102 UART: [state] WD Timer not started. Device not locked for debugging
88,391 UART: [kat] SHA2-256
891,941 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,070 UART: [kat] ++
896,222 UART: [kat] sha1
900,386 UART: [kat] SHA2-256
902,326 UART: [kat] SHA2-384
905,035 UART: [kat] SHA2-512-ACC
906,936 UART: [kat] ECC-384
916,721 UART: [kat] HMAC-384Kdf
921,397 UART: [kat] LMS
1,169,709 UART: [kat] --
1,170,734 UART: [cold-reset] ++
1,171,222 UART: [fht] FHT @ 0x50003400
1,173,784 UART: [idev] ++
1,173,952 UART: [idev] CDI.KEYID = 6
1,174,313 UART: [idev] SUBJECT.KEYID = 7
1,174,738 UART: [idev] UDS.KEYID = 0
1,175,084 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,844 UART: [idev] Erasing UDS.KEYID = 0
1,200,164 UART: [idev] Sha1 KeyId Algorithm
1,209,120 UART: [idev] --
1,210,173 UART: [ldev] ++
1,210,341 UART: [ldev] CDI.KEYID = 6
1,210,705 UART: [ldev] SUBJECT.KEYID = 5
1,211,132 UART: [ldev] AUTHORITY.KEYID = 7
1,211,595 UART: [ldev] FE.KEYID = 1
1,216,863 UART: [ldev] Erasing FE.KEYID = 1
1,243,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,715 UART: [ldev] --
1,282,231 UART: [fwproc] Wait for Commands...
1,282,834 UART: [fwproc] Recv command 0x46574c44
1,283,567 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,202 UART: ROM Fatal Error: 0x000B0012
1,332,359 >>> mbox cmd response: failed
1,332,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,365 >>> mbox cmd response: failed
1,332,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,371 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [kat] SHA2-256
891,457 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,586 UART: [kat] ++
895,738 UART: [kat] sha1
900,064 UART: [kat] SHA2-256
902,004 UART: [kat] SHA2-384
904,665 UART: [kat] SHA2-512-ACC
906,566 UART: [kat] ECC-384
916,541 UART: [kat] HMAC-384Kdf
921,345 UART: [kat] LMS
1,169,657 UART: [kat] --
1,170,256 UART: [cold-reset] ++
1,170,696 UART: [fht] FHT @ 0x50003400
1,173,506 UART: [idev] ++
1,173,674 UART: [idev] CDI.KEYID = 6
1,174,035 UART: [idev] SUBJECT.KEYID = 7
1,174,460 UART: [idev] UDS.KEYID = 0
1,174,806 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,732 UART: [idev] Erasing UDS.KEYID = 0
1,200,290 UART: [idev] Sha1 KeyId Algorithm
1,209,288 UART: [idev] --
1,210,563 UART: [ldev] ++
1,210,731 UART: [ldev] CDI.KEYID = 6
1,211,095 UART: [ldev] SUBJECT.KEYID = 5
1,211,522 UART: [ldev] AUTHORITY.KEYID = 7
1,211,985 UART: [ldev] FE.KEYID = 1
1,217,101 UART: [ldev] Erasing FE.KEYID = 1
1,243,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,567 UART: [ldev] --
1,282,873 UART: [fwproc] Wait for Commands...
1,283,614 UART: [fwproc] Recv command 0x46574c44
1,284,347 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,014 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,323 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,161 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,045 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,334 >>> mbox cmd response: failed
1,182,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,340 >>> mbox cmd response: failed
1,182,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,346 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,699 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,599 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,619 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,309 UART: [kat] SHA2-256
882,240 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,355 UART: [kat] ++
886,507 UART: [kat] sha1
890,745 UART: [kat] SHA2-256
892,683 UART: [kat] SHA2-384
895,490 UART: [kat] SHA2-512-ACC
897,391 UART: [kat] ECC-384
903,256 UART: [kat] HMAC-384Kdf
908,060 UART: [kat] LMS
1,476,256 UART: [kat] --
1,477,307 UART: [cold-reset] ++
1,477,859 UART: [fht] Storing FHT @ 0x50003400
1,480,582 UART: [idev] ++
1,480,750 UART: [idev] CDI.KEYID = 6
1,481,110 UART: [idev] SUBJECT.KEYID = 7
1,481,534 UART: [idev] UDS.KEYID = 0
1,481,879 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,854 UART: [idev] Erasing UDS.KEYID = 0
1,506,006 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,646 UART: [idev] --
1,515,769 UART: [ldev] ++
1,515,937 UART: [ldev] CDI.KEYID = 6
1,516,300 UART: [ldev] SUBJECT.KEYID = 5
1,516,726 UART: [ldev] AUTHORITY.KEYID = 7
1,517,189 UART: [ldev] FE.KEYID = 1
1,522,147 UART: [ldev] Erasing FE.KEYID = 1
1,547,082 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,232 UART: [ldev] --
1,586,563 UART: [fwproc] Waiting for Commands...
1,587,260 UART: [fwproc] Received command 0x46574c44
1,588,051 UART: [fwproc] Received Image of size 114332 bytes
1,629,886 UART: ROM Fatal Error: 0x000B0010
1,631,043 >>> mbox cmd response: failed
1,631,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,049 >>> mbox cmd response: failed
1,631,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,055 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,043 UART: [state] DebugLocked = No
86,615 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,277 UART: [kat] SHA2-256
882,208 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,323 UART: [kat] ++
886,475 UART: [kat] sha1
890,751 UART: [kat] SHA2-256
892,689 UART: [kat] SHA2-384
895,230 UART: [kat] SHA2-512-ACC
897,131 UART: [kat] ECC-384
902,830 UART: [kat] HMAC-384Kdf
907,510 UART: [kat] LMS
1,475,706 UART: [kat] --
1,476,505 UART: [cold-reset] ++
1,476,957 UART: [fht] Storing FHT @ 0x50003400
1,479,878 UART: [idev] ++
1,480,046 UART: [idev] CDI.KEYID = 6
1,480,406 UART: [idev] SUBJECT.KEYID = 7
1,480,830 UART: [idev] UDS.KEYID = 0
1,481,175 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,170 UART: [idev] Erasing UDS.KEYID = 0
1,505,516 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,136 UART: [idev] --
1,515,241 UART: [ldev] ++
1,515,409 UART: [ldev] CDI.KEYID = 6
1,515,772 UART: [ldev] SUBJECT.KEYID = 5
1,516,198 UART: [ldev] AUTHORITY.KEYID = 7
1,516,661 UART: [ldev] FE.KEYID = 1
1,521,993 UART: [ldev] Erasing FE.KEYID = 1
1,547,226 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,824 UART: [ldev] --
1,586,183 UART: [fwproc] Waiting for Commands...
1,586,952 UART: [fwproc] Received command 0x46574c44
1,587,743 UART: [fwproc] Received Image of size 114332 bytes
2,885,460 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,428 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,780 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,571 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,521 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,482,010 >>> mbox cmd response: failed
1,482,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,016 >>> mbox cmd response: failed
1,482,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,022 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,653 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,313 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Unprovisioned
86,356 UART: [state] DebugLocked = No
86,846 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,362 UART: [kat] SHA2-256
882,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,408 UART: [kat] ++
886,560 UART: [kat] sha1
890,820 UART: [kat] SHA2-256
892,758 UART: [kat] SHA2-384
895,581 UART: [kat] SHA2-512-ACC
897,482 UART: [kat] ECC-384
903,261 UART: [kat] HMAC-384Kdf
907,917 UART: [kat] LMS
1,476,113 UART: [kat] --
1,477,120 UART: [cold-reset] ++
1,477,458 UART: [fht] Storing FHT @ 0x50003400
1,480,081 UART: [idev] ++
1,480,249 UART: [idev] CDI.KEYID = 6
1,480,609 UART: [idev] SUBJECT.KEYID = 7
1,481,033 UART: [idev] UDS.KEYID = 0
1,481,378 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,037 UART: [idev] Erasing UDS.KEYID = 0
1,505,289 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,819 UART: [idev] --
1,515,026 UART: [ldev] ++
1,515,194 UART: [ldev] CDI.KEYID = 6
1,515,557 UART: [ldev] SUBJECT.KEYID = 5
1,515,983 UART: [ldev] AUTHORITY.KEYID = 7
1,516,446 UART: [ldev] FE.KEYID = 1
1,522,006 UART: [ldev] Erasing FE.KEYID = 1
1,547,379 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,227 UART: [ldev] --
1,586,630 UART: [fwproc] Waiting for Commands...
1,587,255 UART: [fwproc] Received command 0x46574c44
1,588,046 UART: [fwproc] Received Image of size 114332 bytes
1,630,891 UART: ROM Fatal Error: 0x000B0010
1,632,048 >>> mbox cmd response: failed
1,632,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,054 >>> mbox cmd response: failed
1,632,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,060 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,705 UART: [state] LifecycleState = Unprovisioned
86,360 UART: [state] DebugLocked = No
86,914 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,610 UART: [kat] SHA2-256
882,541 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,656 UART: [kat] ++
886,808 UART: [kat] sha1
891,080 UART: [kat] SHA2-256
893,018 UART: [kat] SHA2-384
895,783 UART: [kat] SHA2-512-ACC
897,684 UART: [kat] ECC-384
903,409 UART: [kat] HMAC-384Kdf
908,127 UART: [kat] LMS
1,476,323 UART: [kat] --
1,477,260 UART: [cold-reset] ++
1,477,824 UART: [fht] Storing FHT @ 0x50003400
1,480,479 UART: [idev] ++
1,480,647 UART: [idev] CDI.KEYID = 6
1,481,007 UART: [idev] SUBJECT.KEYID = 7
1,481,431 UART: [idev] UDS.KEYID = 0
1,481,776 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,889 UART: [idev] Erasing UDS.KEYID = 0
1,506,745 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,465 UART: [idev] --
1,516,672 UART: [ldev] ++
1,516,840 UART: [ldev] CDI.KEYID = 6
1,517,203 UART: [ldev] SUBJECT.KEYID = 5
1,517,629 UART: [ldev] AUTHORITY.KEYID = 7
1,518,092 UART: [ldev] FE.KEYID = 1
1,523,432 UART: [ldev] Erasing FE.KEYID = 1
1,548,959 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,031 UART: [ldev] --
1,588,514 UART: [fwproc] Waiting for Commands...
1,589,241 UART: [fwproc] Received command 0x46574c44
1,590,032 UART: [fwproc] Received Image of size 114332 bytes
2,887,381 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,245 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,597 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,476 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,268 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,485,417 >>> mbox cmd response: failed
1,485,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,423 >>> mbox cmd response: failed
1,485,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,429 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,152 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,038 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,748 UART: [state] LifecycleState = Unprovisioned
85,403 UART: [state] DebugLocked = No
85,971 UART: [state] WD Timer not started. Device not locked for debugging
87,286 UART: [kat] SHA2-256
892,936 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,061 UART: [kat] ++
897,213 UART: [kat] sha1
901,593 UART: [kat] SHA2-256
903,533 UART: [kat] SHA2-384
906,204 UART: [kat] SHA2-512-ACC
908,105 UART: [kat] ECC-384
917,610 UART: [kat] HMAC-384Kdf
922,170 UART: [kat] LMS
1,170,498 UART: [kat] --
1,171,365 UART: [cold-reset] ++
1,171,923 UART: [fht] FHT @ 0x50003400
1,174,542 UART: [idev] ++
1,174,710 UART: [idev] CDI.KEYID = 6
1,175,070 UART: [idev] SUBJECT.KEYID = 7
1,175,494 UART: [idev] UDS.KEYID = 0
1,175,839 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,578 UART: [idev] Erasing UDS.KEYID = 0
1,200,145 UART: [idev] Sha1 KeyId Algorithm
1,208,793 UART: [idev] --
1,209,883 UART: [ldev] ++
1,210,051 UART: [ldev] CDI.KEYID = 6
1,210,414 UART: [ldev] SUBJECT.KEYID = 5
1,210,840 UART: [ldev] AUTHORITY.KEYID = 7
1,211,303 UART: [ldev] FE.KEYID = 1
1,216,585 UART: [ldev] Erasing FE.KEYID = 1
1,242,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,047 UART: [ldev] --
1,281,432 UART: [fwproc] Wait for Commands...
1,282,160 UART: [fwproc] Recv command 0x46574c44
1,282,888 UART: [fwproc] Recv'd Img size: 114332 bytes
1,325,067 UART: ROM Fatal Error: 0x000B0010
1,326,224 >>> mbox cmd response: failed
1,326,224 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,230 >>> mbox cmd response: failed
1,326,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,236 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
893,396 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,521 UART: [kat] ++
897,673 UART: [kat] sha1
901,953 UART: [kat] SHA2-256
903,893 UART: [kat] SHA2-384
906,708 UART: [kat] SHA2-512-ACC
908,609 UART: [kat] ECC-384
918,440 UART: [kat] HMAC-384Kdf
922,956 UART: [kat] LMS
1,171,284 UART: [kat] --
1,172,213 UART: [cold-reset] ++
1,172,729 UART: [fht] FHT @ 0x50003400
1,175,416 UART: [idev] ++
1,175,584 UART: [idev] CDI.KEYID = 6
1,175,944 UART: [idev] SUBJECT.KEYID = 7
1,176,368 UART: [idev] UDS.KEYID = 0
1,176,713 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,566 UART: [idev] Erasing UDS.KEYID = 0
1,201,787 UART: [idev] Sha1 KeyId Algorithm
1,210,203 UART: [idev] --
1,211,257 UART: [ldev] ++
1,211,425 UART: [ldev] CDI.KEYID = 6
1,211,788 UART: [ldev] SUBJECT.KEYID = 5
1,212,214 UART: [ldev] AUTHORITY.KEYID = 7
1,212,677 UART: [ldev] FE.KEYID = 1
1,218,109 UART: [ldev] Erasing FE.KEYID = 1
1,243,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,955 UART: [ldev] --
1,283,310 UART: [fwproc] Wait for Commands...
1,283,958 UART: [fwproc] Recv command 0x46574c44
1,284,686 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,639 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,943 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,814 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,403 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,559 >>> mbox cmd response: failed
1,182,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,565 >>> mbox cmd response: failed
1,182,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,571 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,205 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,545 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,782 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
893,551 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,676 UART: [kat] ++
897,828 UART: [kat] sha1
902,004 UART: [kat] SHA2-256
903,944 UART: [kat] SHA2-384
906,581 UART: [kat] SHA2-512-ACC
908,482 UART: [kat] ECC-384
918,159 UART: [kat] HMAC-384Kdf
922,703 UART: [kat] LMS
1,171,031 UART: [kat] --
1,171,648 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,709 UART: [idev] ++
1,174,877 UART: [idev] CDI.KEYID = 6
1,175,237 UART: [idev] SUBJECT.KEYID = 7
1,175,661 UART: [idev] UDS.KEYID = 0
1,176,006 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,649 UART: [idev] Erasing UDS.KEYID = 0
1,200,690 UART: [idev] Sha1 KeyId Algorithm
1,209,158 UART: [idev] --
1,210,308 UART: [ldev] ++
1,210,476 UART: [ldev] CDI.KEYID = 6
1,210,839 UART: [ldev] SUBJECT.KEYID = 5
1,211,265 UART: [ldev] AUTHORITY.KEYID = 7
1,211,728 UART: [ldev] FE.KEYID = 1
1,216,890 UART: [ldev] Erasing FE.KEYID = 1
1,242,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,692 UART: [ldev] --
1,281,963 UART: [fwproc] Wait for Commands...
1,282,737 UART: [fwproc] Recv command 0x46574c44
1,283,465 UART: [fwproc] Recv'd Img size: 114332 bytes
1,325,830 UART: ROM Fatal Error: 0x000B0010
1,326,987 >>> mbox cmd response: failed
1,326,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,993 >>> mbox cmd response: failed
1,326,993 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,999 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
893,617 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,742 UART: [kat] ++
897,894 UART: [kat] sha1
901,940 UART: [kat] SHA2-256
903,880 UART: [kat] SHA2-384
906,627 UART: [kat] SHA2-512-ACC
908,528 UART: [kat] ECC-384
918,475 UART: [kat] HMAC-384Kdf
922,987 UART: [kat] LMS
1,171,315 UART: [kat] --
1,172,278 UART: [cold-reset] ++
1,172,674 UART: [fht] FHT @ 0x50003400
1,175,177 UART: [idev] ++
1,175,345 UART: [idev] CDI.KEYID = 6
1,175,705 UART: [idev] SUBJECT.KEYID = 7
1,176,129 UART: [idev] UDS.KEYID = 0
1,176,474 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,153 UART: [idev] Erasing UDS.KEYID = 0
1,201,362 UART: [idev] Sha1 KeyId Algorithm
1,209,732 UART: [idev] --
1,210,772 UART: [ldev] ++
1,210,940 UART: [ldev] CDI.KEYID = 6
1,211,303 UART: [ldev] SUBJECT.KEYID = 5
1,211,729 UART: [ldev] AUTHORITY.KEYID = 7
1,212,192 UART: [ldev] FE.KEYID = 1
1,217,322 UART: [ldev] Erasing FE.KEYID = 1
1,244,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,402 UART: [ldev] --
1,283,665 UART: [fwproc] Wait for Commands...
1,284,311 UART: [fwproc] Recv command 0x46574c44
1,285,039 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,454 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,758 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,553 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,252 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,292 >>> mbox cmd response: failed
1,183,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,298 >>> mbox cmd response: failed
1,183,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,304 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,430 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,436 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,621 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
891,352 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,481 UART: [kat] ++
895,633 UART: [kat] sha1
899,887 UART: [kat] SHA2-256
901,827 UART: [kat] SHA2-384
904,594 UART: [kat] SHA2-512-ACC
906,495 UART: [kat] ECC-384
915,922 UART: [kat] HMAC-384Kdf
920,666 UART: [kat] LMS
1,168,978 UART: [kat] --
1,169,809 UART: [cold-reset] ++
1,170,327 UART: [fht] FHT @ 0x50003400
1,173,125 UART: [idev] ++
1,173,293 UART: [idev] CDI.KEYID = 6
1,173,654 UART: [idev] SUBJECT.KEYID = 7
1,174,079 UART: [idev] UDS.KEYID = 0
1,174,425 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,175 UART: [idev] Erasing UDS.KEYID = 0
1,199,213 UART: [idev] Sha1 KeyId Algorithm
1,208,067 UART: [idev] --
1,209,030 UART: [ldev] ++
1,209,198 UART: [ldev] CDI.KEYID = 6
1,209,562 UART: [ldev] SUBJECT.KEYID = 5
1,209,989 UART: [ldev] AUTHORITY.KEYID = 7
1,210,452 UART: [ldev] FE.KEYID = 1
1,215,778 UART: [ldev] Erasing FE.KEYID = 1
1,242,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,028 UART: [ldev] --
1,282,362 UART: [fwproc] Wait for Commands...
1,283,123 UART: [fwproc] Recv command 0x46574c44
1,283,856 UART: [fwproc] Recv'd Img size: 114332 bytes
1,326,269 UART: ROM Fatal Error: 0x000B0010
1,327,426 >>> mbox cmd response: failed
1,327,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,432 >>> mbox cmd response: failed
1,327,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,438 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
891,182 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,311 UART: [kat] ++
895,463 UART: [kat] sha1
899,607 UART: [kat] SHA2-256
901,547 UART: [kat] SHA2-384
904,332 UART: [kat] SHA2-512-ACC
906,233 UART: [kat] ECC-384
916,308 UART: [kat] HMAC-384Kdf
921,056 UART: [kat] LMS
1,169,368 UART: [kat] --
1,170,441 UART: [cold-reset] ++
1,170,813 UART: [fht] FHT @ 0x50003400
1,173,707 UART: [idev] ++
1,173,875 UART: [idev] CDI.KEYID = 6
1,174,236 UART: [idev] SUBJECT.KEYID = 7
1,174,661 UART: [idev] UDS.KEYID = 0
1,175,007 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,721 UART: [idev] Erasing UDS.KEYID = 0
1,199,181 UART: [idev] Sha1 KeyId Algorithm
1,208,143 UART: [idev] --
1,209,150 UART: [ldev] ++
1,209,318 UART: [ldev] CDI.KEYID = 6
1,209,682 UART: [ldev] SUBJECT.KEYID = 5
1,210,109 UART: [ldev] AUTHORITY.KEYID = 7
1,210,572 UART: [ldev] FE.KEYID = 1
1,215,630 UART: [ldev] Erasing FE.KEYID = 1
1,241,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,410 UART: [ldev] --
1,280,910 UART: [fwproc] Wait for Commands...
1,281,555 UART: [fwproc] Recv command 0x46574c44
1,282,288 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,757 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,035 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,344 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,094 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,320 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,699 >>> mbox cmd response: failed
1,178,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,705 >>> mbox cmd response: failed
1,178,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,711 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,664 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,162 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,854 UART: [state] WD Timer not started. Device not locked for debugging
88,145 UART: [kat] SHA2-256
891,695 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,824 UART: [kat] ++
895,976 UART: [kat] sha1
900,266 UART: [kat] SHA2-256
902,206 UART: [kat] SHA2-384
904,985 UART: [kat] SHA2-512-ACC
906,886 UART: [kat] ECC-384
916,731 UART: [kat] HMAC-384Kdf
921,525 UART: [kat] LMS
1,169,837 UART: [kat] --
1,170,406 UART: [cold-reset] ++
1,170,922 UART: [fht] FHT @ 0x50003400
1,173,546 UART: [idev] ++
1,173,714 UART: [idev] CDI.KEYID = 6
1,174,075 UART: [idev] SUBJECT.KEYID = 7
1,174,500 UART: [idev] UDS.KEYID = 0
1,174,846 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,586 UART: [idev] Erasing UDS.KEYID = 0
1,199,220 UART: [idev] Sha1 KeyId Algorithm
1,208,308 UART: [idev] --
1,209,243 UART: [ldev] ++
1,209,411 UART: [ldev] CDI.KEYID = 6
1,209,775 UART: [ldev] SUBJECT.KEYID = 5
1,210,202 UART: [ldev] AUTHORITY.KEYID = 7
1,210,665 UART: [ldev] FE.KEYID = 1
1,215,955 UART: [ldev] Erasing FE.KEYID = 1
1,242,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,767 UART: [ldev] --
1,282,073 UART: [fwproc] Wait for Commands...
1,282,816 UART: [fwproc] Recv command 0x46574c44
1,283,549 UART: [fwproc] Recv'd Img size: 114332 bytes
1,326,899 UART: ROM Fatal Error: 0x000B0010
1,328,056 >>> mbox cmd response: failed
1,328,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,062 >>> mbox cmd response: failed
1,328,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,068 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
86,930 UART: [state] WD Timer not started. Device not locked for debugging
88,197 UART: [kat] SHA2-256
891,747 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,876 UART: [kat] ++
896,028 UART: [kat] sha1
900,282 UART: [kat] SHA2-256
902,222 UART: [kat] SHA2-384
905,101 UART: [kat] SHA2-512-ACC
907,002 UART: [kat] ECC-384
917,173 UART: [kat] HMAC-384Kdf
921,773 UART: [kat] LMS
1,170,085 UART: [kat] --
1,170,870 UART: [cold-reset] ++
1,171,210 UART: [fht] FHT @ 0x50003400
1,173,756 UART: [idev] ++
1,173,924 UART: [idev] CDI.KEYID = 6
1,174,285 UART: [idev] SUBJECT.KEYID = 7
1,174,710 UART: [idev] UDS.KEYID = 0
1,175,056 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,596 UART: [idev] Erasing UDS.KEYID = 0
1,200,290 UART: [idev] Sha1 KeyId Algorithm
1,209,022 UART: [idev] --
1,210,171 UART: [ldev] ++
1,210,339 UART: [ldev] CDI.KEYID = 6
1,210,703 UART: [ldev] SUBJECT.KEYID = 5
1,211,130 UART: [ldev] AUTHORITY.KEYID = 7
1,211,593 UART: [ldev] FE.KEYID = 1
1,216,829 UART: [ldev] Erasing FE.KEYID = 1
1,242,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,301 UART: [ldev] --
1,282,805 UART: [fwproc] Wait for Commands...
1,283,554 UART: [fwproc] Recv command 0x46574c44
1,284,287 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,314 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,623 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,543 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,527 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,202 >>> mbox cmd response: failed
1,179,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,208 >>> mbox cmd response: failed
1,179,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,214 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,743 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,865 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,890 UART: [state] LifecycleState = Unprovisioned
85,545 UART: [state] DebugLocked = No
86,217 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,739 UART: [kat] SHA2-256
881,670 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,785 UART: [kat] ++
885,937 UART: [kat] sha1
889,993 UART: [kat] SHA2-256
891,931 UART: [kat] SHA2-384
894,762 UART: [kat] SHA2-512-ACC
896,663 UART: [kat] ECC-384
902,200 UART: [kat] HMAC-384Kdf
906,812 UART: [kat] LMS
1,475,008 UART: [kat] --
1,475,889 UART: [cold-reset] ++
1,476,249 UART: [fht] Storing FHT @ 0x50003400
1,478,860 UART: [idev] ++
1,479,028 UART: [idev] CDI.KEYID = 6
1,479,388 UART: [idev] SUBJECT.KEYID = 7
1,479,812 UART: [idev] UDS.KEYID = 0
1,480,157 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,028 UART: [idev] Erasing UDS.KEYID = 0
1,504,726 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,380 UART: [idev] --
1,514,625 UART: [ldev] ++
1,514,793 UART: [ldev] CDI.KEYID = 6
1,515,156 UART: [ldev] SUBJECT.KEYID = 5
1,515,582 UART: [ldev] AUTHORITY.KEYID = 7
1,516,045 UART: [ldev] FE.KEYID = 1
1,521,359 UART: [ldev] Erasing FE.KEYID = 1
1,546,670 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,938 UART: [ldev] --
1,586,417 UART: [fwproc] Waiting for Commands...
1,587,088 UART: [fwproc] Received command 0x46574c44
1,587,879 UART: [fwproc] Received Image of size 114332 bytes
1,634,662 UART: ROM Fatal Error: 0x000B0040
1,635,819 >>> mbox cmd response: failed
1,635,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,825 >>> mbox cmd response: failed
1,635,825 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,831 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,355 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,845 UART: [kat] SHA2-256
881,776 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,891 UART: [kat] ++
886,043 UART: [kat] sha1
890,309 UART: [kat] SHA2-256
892,247 UART: [kat] SHA2-384
895,102 UART: [kat] SHA2-512-ACC
897,003 UART: [kat] ECC-384
902,494 UART: [kat] HMAC-384Kdf
907,180 UART: [kat] LMS
1,475,376 UART: [kat] --
1,476,419 UART: [cold-reset] ++
1,476,779 UART: [fht] Storing FHT @ 0x50003400
1,479,520 UART: [idev] ++
1,479,688 UART: [idev] CDI.KEYID = 6
1,480,048 UART: [idev] SUBJECT.KEYID = 7
1,480,472 UART: [idev] UDS.KEYID = 0
1,480,817 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,456 UART: [idev] Erasing UDS.KEYID = 0
1,505,222 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,924 UART: [idev] --
1,514,937 UART: [ldev] ++
1,515,105 UART: [ldev] CDI.KEYID = 6
1,515,468 UART: [ldev] SUBJECT.KEYID = 5
1,515,894 UART: [ldev] AUTHORITY.KEYID = 7
1,516,357 UART: [ldev] FE.KEYID = 1
1,521,447 UART: [ldev] Erasing FE.KEYID = 1
1,547,376 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,748 UART: [ldev] --
1,587,087 UART: [fwproc] Waiting for Commands...
1,587,868 UART: [fwproc] Received command 0x46574c44
1,588,659 UART: [fwproc] Received Image of size 114332 bytes
2,886,564 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,252 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,604 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,591 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,573 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,684 >>> mbox cmd response: failed
1,487,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,690 >>> mbox cmd response: failed
1,487,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,696 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,405 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,025 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,946 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,448 UART: [kat] SHA2-256
882,379 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,494 UART: [kat] ++
886,646 UART: [kat] sha1
890,762 UART: [kat] SHA2-256
892,700 UART: [kat] SHA2-384
895,359 UART: [kat] SHA2-512-ACC
897,260 UART: [kat] ECC-384
902,919 UART: [kat] HMAC-384Kdf
907,617 UART: [kat] LMS
1,475,813 UART: [kat] --
1,476,820 UART: [cold-reset] ++
1,477,338 UART: [fht] Storing FHT @ 0x50003400
1,480,243 UART: [idev] ++
1,480,411 UART: [idev] CDI.KEYID = 6
1,480,771 UART: [idev] SUBJECT.KEYID = 7
1,481,195 UART: [idev] UDS.KEYID = 0
1,481,540 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,913 UART: [idev] Erasing UDS.KEYID = 0
1,506,159 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,987 UART: [idev] --
1,515,950 UART: [ldev] ++
1,516,118 UART: [ldev] CDI.KEYID = 6
1,516,481 UART: [ldev] SUBJECT.KEYID = 5
1,516,907 UART: [ldev] AUTHORITY.KEYID = 7
1,517,370 UART: [ldev] FE.KEYID = 1
1,522,580 UART: [ldev] Erasing FE.KEYID = 1
1,548,947 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,419 UART: [ldev] --
1,587,888 UART: [fwproc] Waiting for Commands...
1,588,551 UART: [fwproc] Received command 0x46574c44
1,589,342 UART: [fwproc] Received Image of size 114332 bytes
1,638,029 UART: ROM Fatal Error: 0x000B0040
1,639,186 >>> mbox cmd response: failed
1,639,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,639,192 >>> mbox cmd response: failed
1,639,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,639,198 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,760 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,332 UART: [kat] SHA2-256
882,263 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,378 UART: [kat] ++
886,530 UART: [kat] sha1
890,746 UART: [kat] SHA2-256
892,684 UART: [kat] SHA2-384
895,529 UART: [kat] SHA2-512-ACC
897,430 UART: [kat] ECC-384
902,861 UART: [kat] HMAC-384Kdf
907,509 UART: [kat] LMS
1,475,705 UART: [kat] --
1,476,616 UART: [cold-reset] ++
1,477,092 UART: [fht] Storing FHT @ 0x50003400
1,479,895 UART: [idev] ++
1,480,063 UART: [idev] CDI.KEYID = 6
1,480,423 UART: [idev] SUBJECT.KEYID = 7
1,480,847 UART: [idev] UDS.KEYID = 0
1,481,192 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,835 UART: [idev] Erasing UDS.KEYID = 0
1,505,611 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,409 UART: [idev] --
1,515,476 UART: [ldev] ++
1,515,644 UART: [ldev] CDI.KEYID = 6
1,516,007 UART: [ldev] SUBJECT.KEYID = 5
1,516,433 UART: [ldev] AUTHORITY.KEYID = 7
1,516,896 UART: [ldev] FE.KEYID = 1
1,522,510 UART: [ldev] Erasing FE.KEYID = 1
1,547,911 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,909 UART: [ldev] --
1,587,320 UART: [fwproc] Waiting for Commands...
1,587,967 UART: [fwproc] Received command 0x46574c44
1,588,758 UART: [fwproc] Received Image of size 114332 bytes
2,885,883 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,265 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,617 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,472 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,576 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,703 >>> mbox cmd response: failed
1,488,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,709 >>> mbox cmd response: failed
1,488,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,715 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,572 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,676 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,660 UART: [state] LifecycleState = Unprovisioned
86,315 UART: [state] DebugLocked = No
86,915 UART: [state] WD Timer not started. Device not locked for debugging
88,146 UART: [kat] SHA2-256
893,796 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,921 UART: [kat] ++
898,073 UART: [kat] sha1
902,487 UART: [kat] SHA2-256
904,427 UART: [kat] SHA2-384
907,228 UART: [kat] SHA2-512-ACC
909,129 UART: [kat] ECC-384
919,042 UART: [kat] HMAC-384Kdf
923,616 UART: [kat] LMS
1,171,944 UART: [kat] --
1,172,713 UART: [cold-reset] ++
1,173,175 UART: [fht] FHT @ 0x50003400
1,175,862 UART: [idev] ++
1,176,030 UART: [idev] CDI.KEYID = 6
1,176,390 UART: [idev] SUBJECT.KEYID = 7
1,176,814 UART: [idev] UDS.KEYID = 0
1,177,159 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,800 UART: [idev] Erasing UDS.KEYID = 0
1,201,383 UART: [idev] Sha1 KeyId Algorithm
1,209,785 UART: [idev] --
1,210,789 UART: [ldev] ++
1,210,957 UART: [ldev] CDI.KEYID = 6
1,211,320 UART: [ldev] SUBJECT.KEYID = 5
1,211,746 UART: [ldev] AUTHORITY.KEYID = 7
1,212,209 UART: [ldev] FE.KEYID = 1
1,217,289 UART: [ldev] Erasing FE.KEYID = 1
1,244,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,567 UART: [ldev] --
1,284,082 UART: [fwproc] Wait for Commands...
1,284,872 UART: [fwproc] Recv command 0x46574c44
1,285,600 UART: [fwproc] Recv'd Img size: 114332 bytes
1,331,931 UART: ROM Fatal Error: 0x000B0040
1,333,088 >>> mbox cmd response: failed
1,333,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,094 >>> mbox cmd response: failed
1,333,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,100 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,684 UART: [state] LifecycleState = Unprovisioned
86,339 UART: [state] DebugLocked = No
86,965 UART: [state] WD Timer not started. Device not locked for debugging
88,306 UART: [kat] SHA2-256
893,956 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,081 UART: [kat] ++
898,233 UART: [kat] sha1
902,647 UART: [kat] SHA2-256
904,587 UART: [kat] SHA2-384
907,308 UART: [kat] SHA2-512-ACC
909,209 UART: [kat] ECC-384
919,214 UART: [kat] HMAC-384Kdf
923,584 UART: [kat] LMS
1,171,912 UART: [kat] --
1,172,845 UART: [cold-reset] ++
1,173,305 UART: [fht] FHT @ 0x50003400
1,175,822 UART: [idev] ++
1,175,990 UART: [idev] CDI.KEYID = 6
1,176,350 UART: [idev] SUBJECT.KEYID = 7
1,176,774 UART: [idev] UDS.KEYID = 0
1,177,119 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,718 UART: [idev] Erasing UDS.KEYID = 0
1,201,655 UART: [idev] Sha1 KeyId Algorithm
1,210,075 UART: [idev] --
1,210,963 UART: [ldev] ++
1,211,131 UART: [ldev] CDI.KEYID = 6
1,211,494 UART: [ldev] SUBJECT.KEYID = 5
1,211,920 UART: [ldev] AUTHORITY.KEYID = 7
1,212,383 UART: [ldev] FE.KEYID = 1
1,217,509 UART: [ldev] Erasing FE.KEYID = 1
1,243,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,927 UART: [ldev] --
1,282,266 UART: [fwproc] Wait for Commands...
1,282,912 UART: [fwproc] Recv command 0x46574c44
1,283,640 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,923 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,227 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,118 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,557 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,657 >>> mbox cmd response: failed
1,185,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,663 >>> mbox cmd response: failed
1,185,663 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,669 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,311 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,115 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
893,677 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,802 UART: [kat] ++
897,954 UART: [kat] sha1
902,274 UART: [kat] SHA2-256
904,214 UART: [kat] SHA2-384
906,861 UART: [kat] SHA2-512-ACC
908,762 UART: [kat] ECC-384
918,263 UART: [kat] HMAC-384Kdf
922,827 UART: [kat] LMS
1,171,155 UART: [kat] --
1,172,040 UART: [cold-reset] ++
1,172,460 UART: [fht] FHT @ 0x50003400
1,175,087 UART: [idev] ++
1,175,255 UART: [idev] CDI.KEYID = 6
1,175,615 UART: [idev] SUBJECT.KEYID = 7
1,176,039 UART: [idev] UDS.KEYID = 0
1,176,384 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,887 UART: [idev] Erasing UDS.KEYID = 0
1,201,304 UART: [idev] Sha1 KeyId Algorithm
1,209,666 UART: [idev] --
1,210,766 UART: [ldev] ++
1,210,934 UART: [ldev] CDI.KEYID = 6
1,211,297 UART: [ldev] SUBJECT.KEYID = 5
1,211,723 UART: [ldev] AUTHORITY.KEYID = 7
1,212,186 UART: [ldev] FE.KEYID = 1
1,217,618 UART: [ldev] Erasing FE.KEYID = 1
1,243,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,828 UART: [ldev] --
1,283,145 UART: [fwproc] Wait for Commands...
1,283,733 UART: [fwproc] Recv command 0x46574c44
1,284,461 UART: [fwproc] Recv'd Img size: 114332 bytes
1,332,486 UART: ROM Fatal Error: 0x000B0040
1,333,643 >>> mbox cmd response: failed
1,333,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,649 >>> mbox cmd response: failed
1,333,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,655 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
893,407 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,532 UART: [kat] ++
897,684 UART: [kat] sha1
901,832 UART: [kat] SHA2-256
903,772 UART: [kat] SHA2-384
906,689 UART: [kat] SHA2-512-ACC
908,590 UART: [kat] ECC-384
918,023 UART: [kat] HMAC-384Kdf
922,883 UART: [kat] LMS
1,171,211 UART: [kat] --
1,172,026 UART: [cold-reset] ++
1,172,458 UART: [fht] FHT @ 0x50003400
1,175,241 UART: [idev] ++
1,175,409 UART: [idev] CDI.KEYID = 6
1,175,769 UART: [idev] SUBJECT.KEYID = 7
1,176,193 UART: [idev] UDS.KEYID = 0
1,176,538 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,191 UART: [idev] Erasing UDS.KEYID = 0
1,201,694 UART: [idev] Sha1 KeyId Algorithm
1,210,144 UART: [idev] --
1,211,152 UART: [ldev] ++
1,211,320 UART: [ldev] CDI.KEYID = 6
1,211,683 UART: [ldev] SUBJECT.KEYID = 5
1,212,109 UART: [ldev] AUTHORITY.KEYID = 7
1,212,572 UART: [ldev] FE.KEYID = 1
1,217,924 UART: [ldev] Erasing FE.KEYID = 1
1,244,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,450 UART: [ldev] --
1,283,773 UART: [fwproc] Wait for Commands...
1,284,419 UART: [fwproc] Recv command 0x46574c44
1,285,147 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,932 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,236 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,955 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,814 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,188,870 >>> mbox cmd response: failed
1,188,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,876 >>> mbox cmd response: failed
1,188,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,882 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,552 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,136 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,665 UART: [state] WD Timer not started. Device not locked for debugging
87,972 UART: [kat] SHA2-256
891,522 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,651 UART: [kat] ++
895,803 UART: [kat] sha1
899,993 UART: [kat] SHA2-256
901,933 UART: [kat] SHA2-384
904,810 UART: [kat] SHA2-512-ACC
906,711 UART: [kat] ECC-384
916,480 UART: [kat] HMAC-384Kdf
920,912 UART: [kat] LMS
1,169,224 UART: [kat] --
1,170,015 UART: [cold-reset] ++
1,170,397 UART: [fht] FHT @ 0x50003400
1,173,093 UART: [idev] ++
1,173,261 UART: [idev] CDI.KEYID = 6
1,173,622 UART: [idev] SUBJECT.KEYID = 7
1,174,047 UART: [idev] UDS.KEYID = 0
1,174,393 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,207 UART: [idev] Erasing UDS.KEYID = 0
1,198,973 UART: [idev] Sha1 KeyId Algorithm
1,207,773 UART: [idev] --
1,208,706 UART: [ldev] ++
1,208,874 UART: [ldev] CDI.KEYID = 6
1,209,238 UART: [ldev] SUBJECT.KEYID = 5
1,209,665 UART: [ldev] AUTHORITY.KEYID = 7
1,210,128 UART: [ldev] FE.KEYID = 1
1,215,208 UART: [ldev] Erasing FE.KEYID = 1
1,242,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,212 UART: [ldev] --
1,281,500 UART: [fwproc] Wait for Commands...
1,282,321 UART: [fwproc] Recv command 0x46574c44
1,283,054 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,880 UART: ROM Fatal Error: 0x000B0040
1,331,037 >>> mbox cmd response: failed
1,331,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,043 >>> mbox cmd response: failed
1,331,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,049 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,281 UART: [kat] ++
895,433 UART: [kat] sha1
899,837 UART: [kat] SHA2-256
901,777 UART: [kat] SHA2-384
904,328 UART: [kat] SHA2-512-ACC
906,229 UART: [kat] ECC-384
916,016 UART: [kat] HMAC-384Kdf
920,512 UART: [kat] LMS
1,168,824 UART: [kat] --
1,169,855 UART: [cold-reset] ++
1,170,209 UART: [fht] FHT @ 0x50003400
1,172,791 UART: [idev] ++
1,172,959 UART: [idev] CDI.KEYID = 6
1,173,320 UART: [idev] SUBJECT.KEYID = 7
1,173,745 UART: [idev] UDS.KEYID = 0
1,174,091 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,127 UART: [idev] Erasing UDS.KEYID = 0
1,199,029 UART: [idev] Sha1 KeyId Algorithm
1,208,029 UART: [idev] --
1,208,868 UART: [ldev] ++
1,209,036 UART: [ldev] CDI.KEYID = 6
1,209,400 UART: [ldev] SUBJECT.KEYID = 5
1,209,827 UART: [ldev] AUTHORITY.KEYID = 7
1,210,290 UART: [ldev] FE.KEYID = 1
1,215,684 UART: [ldev] Erasing FE.KEYID = 1
1,242,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,306 UART: [ldev] --
1,281,822 UART: [fwproc] Wait for Commands...
1,282,421 UART: [fwproc] Recv command 0x46574c44
1,283,154 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,525 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,301 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,610 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,404 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,964 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,170 >>> mbox cmd response: failed
1,184,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,176 >>> mbox cmd response: failed
1,184,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,182 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,892 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,010 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
899,896 UART: [kat] SHA2-256
901,836 UART: [kat] SHA2-384
904,577 UART: [kat] SHA2-512-ACC
906,478 UART: [kat] ECC-384
916,613 UART: [kat] HMAC-384Kdf
921,017 UART: [kat] LMS
1,169,329 UART: [kat] --
1,170,144 UART: [cold-reset] ++
1,170,472 UART: [fht] FHT @ 0x50003400
1,173,308 UART: [idev] ++
1,173,476 UART: [idev] CDI.KEYID = 6
1,173,837 UART: [idev] SUBJECT.KEYID = 7
1,174,262 UART: [idev] UDS.KEYID = 0
1,174,608 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,236 UART: [idev] Erasing UDS.KEYID = 0
1,199,554 UART: [idev] Sha1 KeyId Algorithm
1,208,486 UART: [idev] --
1,209,433 UART: [ldev] ++
1,209,601 UART: [ldev] CDI.KEYID = 6
1,209,965 UART: [ldev] SUBJECT.KEYID = 5
1,210,392 UART: [ldev] AUTHORITY.KEYID = 7
1,210,855 UART: [ldev] FE.KEYID = 1
1,216,019 UART: [ldev] Erasing FE.KEYID = 1
1,242,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,855 UART: [ldev] --
1,281,273 UART: [fwproc] Wait for Commands...
1,281,872 UART: [fwproc] Recv command 0x46574c44
1,282,605 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,829 UART: ROM Fatal Error: 0x000B0040
1,329,986 >>> mbox cmd response: failed
1,329,986 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,992 >>> mbox cmd response: failed
1,329,992 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,998 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
891,313 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,442 UART: [kat] ++
895,594 UART: [kat] sha1
899,704 UART: [kat] SHA2-256
901,644 UART: [kat] SHA2-384
904,471 UART: [kat] SHA2-512-ACC
906,372 UART: [kat] ECC-384
916,375 UART: [kat] HMAC-384Kdf
920,971 UART: [kat] LMS
1,169,283 UART: [kat] --
1,170,116 UART: [cold-reset] ++
1,170,454 UART: [fht] FHT @ 0x50003400
1,172,956 UART: [idev] ++
1,173,124 UART: [idev] CDI.KEYID = 6
1,173,485 UART: [idev] SUBJECT.KEYID = 7
1,173,910 UART: [idev] UDS.KEYID = 0
1,174,256 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,740 UART: [idev] Erasing UDS.KEYID = 0
1,199,172 UART: [idev] Sha1 KeyId Algorithm
1,207,982 UART: [idev] --
1,209,121 UART: [ldev] ++
1,209,289 UART: [ldev] CDI.KEYID = 6
1,209,653 UART: [ldev] SUBJECT.KEYID = 5
1,210,080 UART: [ldev] AUTHORITY.KEYID = 7
1,210,543 UART: [ldev] FE.KEYID = 1
1,215,363 UART: [ldev] Erasing FE.KEYID = 1
1,242,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,207 UART: [ldev] --
1,281,635 UART: [fwproc] Wait for Commands...
1,282,418 UART: [fwproc] Recv command 0x46574c44
1,283,151 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,694 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,003 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,737 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,087 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,059 >>> mbox cmd response: failed
1,183,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,065 >>> mbox cmd response: failed
1,183,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,071 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,135 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,127 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,273 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,245 UART: [kat] SHA2-256
892,183 UART: [kat] SHA2-384
894,856 UART: [kat] SHA2-512-ACC
896,757 UART: [kat] ECC-384
902,608 UART: [kat] HMAC-384Kdf
907,168 UART: [kat] LMS
1,475,364 UART: [kat] --
1,476,209 UART: [cold-reset] ++
1,476,767 UART: [fht] Storing FHT @ 0x50003400
1,479,552 UART: [idev] ++
1,479,720 UART: [idev] CDI.KEYID = 6
1,480,080 UART: [idev] SUBJECT.KEYID = 7
1,480,504 UART: [idev] UDS.KEYID = 0
1,480,849 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,688 UART: [idev] Erasing UDS.KEYID = 0
1,504,900 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,478 UART: [idev] --
1,514,551 UART: [ldev] ++
1,514,719 UART: [ldev] CDI.KEYID = 6
1,515,082 UART: [ldev] SUBJECT.KEYID = 5
1,515,508 UART: [ldev] AUTHORITY.KEYID = 7
1,515,971 UART: [ldev] FE.KEYID = 1
1,521,281 UART: [ldev] Erasing FE.KEYID = 1
1,546,944 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,072 UART: [ldev] --
1,586,585 UART: [fwproc] Waiting for Commands...
1,587,268 UART: [fwproc] Received command 0x46574c44
1,588,059 UART: [fwproc] Received Image of size 114332 bytes
2,885,725 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,637 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,989 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,728 >>> mbox cmd response: success
3,078,728 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
3,079,834 UART: [afmc] ++
3,080,002 UART: [afmc] CDI.KEYID = 6
3,080,364 UART: [afmc] SUBJECT.KEYID = 7
3,080,789 UART: [afmc] AUTHORITY.KEYID = 5
3,115,622 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,506 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,286 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,014 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,899 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,589 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,516 UART: [afmc] --
3,158,402 UART: [cold-reset] --
3,159,296 UART: [state] Locking Datavault
3,160,789 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,393 UART: [state] Locking ICCM
3,161,827 UART: [exit] Launching FMC @ 0x40000130
3,167,156 UART:
3,167,172 UART: Running Caliptra FMC ...
3,167,580 UART:
3,167,634 UART: [state] CFI Enabled
3,178,177 UART: [fht] FMC Alias Private Key: 7
3,286,616 UART: [art] Extend RT PCRs Done
3,287,044 UART: [art] Lock RT PCRs Done
3,288,416 UART: [art] Populate DV Done
3,296,601 UART: [fht] FMC Alias Private Key: 7
3,297,749 UART: [art] Derive CDI
3,298,029 UART: [art] Store in in slot 0x4
3,383,724 UART: [art] Derive Key Pair
3,384,084 UART: [art] Store priv key in slot 0x5
3,396,936 UART: [art] Derive Key Pair - Done
3,411,988 UART: [art] Signing Cert with AUTHO
3,412,468 UART: RITY.KEYID = 7
3,427,714 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,479 UART: [art] PUB.X = 7AEFAF7815857A3A9CD3C415743C1E453DD9FC99D703DEB2C31961F982375DAFB7C1FB28F89F321CE59243ADEA4CDBD0
3,435,266 UART: [art] PUB.Y = 59BA6C7749852B0A8F4ADB91EAB8FF49A819F27A606DF9FE7F40B0DB94A2455AB331E3FE12AEAC63CE540110A1C6C18E
3,442,230 UART: [art] SIG.R = 409041DD806C5658A3A5272CC6725FAB0D027C96C0C660587553B4F04115058C93E5901875E9AABC17221CF183593AC7
3,448,983 UART: [art] SIG.S = 865D7A8DAC723DC41DD2FD09C6AA46695E6CA6E96EB409308C48C618DB1B9DAEED1B2C86A6DE51C0E6F603FE8E551D41
3,472,943 UART: Caliptra RT
3,473,196 UART: [state] CFI Enabled
3,581,655 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,654 UART:
3,583,670 UART: Running Caliptra ROM ...
3,584,078 UART:
3,584,132 UART: [state] CFI Enabled
3,586,712 UART: [state] LifecycleState = Unprovisioned
3,587,367 UART: [state] DebugLocked = No
3,587,867 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,589,382 UART: [kat] SHA2-256
4,383,313 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,387,428 UART: [kat] ++
4,387,580 UART: [kat] sha1
4,391,658 UART: [kat] SHA2-256
4,393,596 UART: [kat] SHA2-384
4,396,413 UART: [kat] SHA2-512-ACC
4,398,313 UART: [kat] ECC-384
4,403,888 UART: [kat] HMAC-384Kdf
4,408,468 UART: [kat] LMS
4,976,664 UART: [kat] --
4,977,609 UART: [update-reset] ++
5,089,440 >>> mbox cmd response: failed
5,089,440 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,089,818 UART: ROM Non-Fatal Error: 0x000B001F
5,090,752 UART: [state] Locking Datavault
5,091,542 UART: [state] Locking PCR0, PCR1 and PCR31
5,092,146 UART: [state] Locking ICCM
5,092,780 UART: [exit] Launching FMC @ 0x40000130
5,098,109 UART:
5,098,125 UART: Running Caliptra FMC ...
5,098,533 UART:
5,098,587 UART: [state] CFI Enabled
5,187,584 UART: [art] Extend RT PCRs Done
5,188,012 UART: [art] Lock RT PCRs Done
5,189,263 UART: [art] Populate DV Done
5,197,544 UART: [fht] FMC Alias Private Key: 7
5,198,550 UART: [art] Derive CDI
5,198,830 UART: [art] Store in in slot 0x4
5,284,611 UART: [art] Derive Key Pair
5,284,971 UART: [art] Store priv key in slot 0x5
5,297,899 UART: [art] Derive Key Pair - Done
5,312,815 UART: [art] Signing Cert with AUTHO
5,313,295 UART: RITY.KEYID = 7
5,328,263 UART: [art] Erasing AUTHORITY.KEYID = 7
5,329,028 UART: [art] PUB.X = 7AEFAF7815857A3A9CD3C415743C1E453DD9FC99D703DEB2C31961F982375DAFB7C1FB28F89F321CE59243ADEA4CDBD0
5,335,815 UART: [art] PUB.Y = 59BA6C7749852B0A8F4ADB91EAB8FF49A819F27A606DF9FE7F40B0DB94A2455AB331E3FE12AEAC63CE540110A1C6C18E
5,342,779 UART: [art] SIG.R = 409041DD806C5658A3A5272CC6725FAB0D027C96C0C660587553B4F04115058C93E5901875E9AABC17221CF183593AC7
5,349,532 UART: [art] SIG.S = 865D7A8DAC723DC41DD2FD09C6AA46695E6CA6E96EB409308C48C618DB1B9DAEED1B2C86A6DE51C0E6F603FE8E551D41
5,373,266 UART: Caliptra RT
5,373,519 UART: [state] CFI Enabled
5,654,710 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,656,438 UART:
5,656,454 UART: Running Caliptra ROM ...
5,656,862 UART:
5,656,916 UART: [state] CFI Enabled
5,659,352 UART: [state] LifecycleState = Unprovisioned
5,660,007 UART: [state] DebugLocked = No
5,660,641 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,662,248 UART: [kat] SHA2-256
6,456,179 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,460,294 UART: [kat] ++
6,460,446 UART: [kat] sha1
6,464,672 UART: [kat] SHA2-256
6,466,610 UART: [kat] SHA2-384
6,469,411 UART: [kat] SHA2-512-ACC
6,471,311 UART: [kat] ECC-384
6,476,906 UART: [kat] HMAC-384Kdf
6,481,530 UART: [kat] LMS
7,049,726 UART: [kat] --
7,050,951 UART: [update-reset] ++
8,386,387 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,387,589 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
8,537,465 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,133 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,818 >>> mbox cmd response: success
2,928,818 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,989,926 UART:
2,989,942 UART: Running Caliptra FMC ...
2,990,350 UART:
2,990,404 UART: [state] CFI Enabled
3,000,689 UART: [fht] FMC Alias Private Key: 7
3,109,080 UART: [art] Extend RT PCRs Done
3,109,508 UART: [art] Lock RT PCRs Done
3,110,764 UART: [art] Populate DV Done
3,118,855 UART: [fht] FMC Alias Private Key: 7
3,120,035 UART: [art] Derive CDI
3,120,315 UART: [art] Store in in slot 0x4
3,205,774 UART: [art] Derive Key Pair
3,206,134 UART: [art] Store priv key in slot 0x5
3,219,664 UART: [art] Derive Key Pair - Done
3,234,195 UART: [art] Signing Cert with AUTHO
3,234,675 UART: RITY.KEYID = 7
3,249,927 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,692 UART: [art] PUB.X = 9FC8F3AEE9E5F00C02DDFEA0E24A1AC25DB3867C72C5E0F54C2E060FFDBE9F30B496E427E7880D5E735A70D82DE9D876
3,257,469 UART: [art] PUB.Y = 2E03BDEB8D842B49E2C8E076910FE9D783CF4E7654CC9C71EE0AAD370EFA79D1B3878E341FFFC39D6D3CA0A665446FB5
3,264,427 UART: [art] SIG.R = 18F85F297FE692A9C7B6C8D4681CA06C0D0C1351AA8DF99D95A8B672B57884A2C61E38E806E7FA665402B052BF548A12
3,271,189 UART: [art] SIG.S = D34759E8705B1151B7415D70773C405B0BBA4BE18824F3084C1894440B63C855AC3E631E2AFFCDA674FD96401CB15FB9
3,295,409 UART: Caliptra RT
3,295,662 UART: [state] CFI Enabled
3,404,297 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,795,457 >>> mbox cmd response: failed
4,795,457 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,801,058 UART:
4,801,074 UART: Running Caliptra FMC ...
4,801,482 UART:
4,801,536 UART: [state] CFI Enabled
4,890,623 UART: [art] Extend RT PCRs Done
4,891,051 UART: [art] Lock RT PCRs Done
4,892,344 UART: [art] Populate DV Done
4,900,547 UART: [fht] FMC Alias Private Key: 7
4,901,675 UART: [art] Derive CDI
4,901,955 UART: [art] Store in in slot 0x4
4,987,764 UART: [art] Derive Key Pair
4,988,124 UART: [art] Store priv key in slot 0x5
5,000,770 UART: [art] Derive Key Pair - Done
5,015,545 UART: [art] Signing Cert with AUTHO
5,016,025 UART: RITY.KEYID = 7
5,030,935 UART: [art] Erasing AUTHORITY.KEYID = 7
5,031,700 UART: [art] PUB.X = 9FC8F3AEE9E5F00C02DDFEA0E24A1AC25DB3867C72C5E0F54C2E060FFDBE9F30B496E427E7880D5E735A70D82DE9D876
5,038,477 UART: [art] PUB.Y = 2E03BDEB8D842B49E2C8E076910FE9D783CF4E7654CC9C71EE0AAD370EFA79D1B3878E341FFFC39D6D3CA0A665446FB5
5,045,435 UART: [art] SIG.R = 18F85F297FE692A9C7B6C8D4681CA06C0D0C1351AA8DF99D95A8B672B57884A2C61E38E806E7FA665402B052BF548A12
5,052,197 UART: [art] SIG.S = D34759E8705B1151B7415D70773C405B0BBA4BE18824F3084C1894440B63C855AC3E631E2AFFCDA674FD96401CB15FB9
5,075,915 UART: Caliptra RT
5,076,168 UART: [state] CFI Enabled
5,355,895 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,118,774 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,753 UART: [state] LifecycleState = Unprovisioned
86,408 UART: [state] DebugLocked = No
87,072 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,776 UART: [kat] SHA2-256
882,707 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,822 UART: [kat] ++
886,974 UART: [kat] sha1
891,422 UART: [kat] SHA2-256
893,360 UART: [kat] SHA2-384
896,015 UART: [kat] SHA2-512-ACC
897,916 UART: [kat] ECC-384
903,673 UART: [kat] HMAC-384Kdf
908,425 UART: [kat] LMS
1,476,621 UART: [kat] --
1,477,554 UART: [cold-reset] ++
1,478,114 UART: [fht] Storing FHT @ 0x50003400
1,481,053 UART: [idev] ++
1,481,221 UART: [idev] CDI.KEYID = 6
1,481,581 UART: [idev] SUBJECT.KEYID = 7
1,482,005 UART: [idev] UDS.KEYID = 0
1,482,350 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,490,071 UART: [idev] Erasing UDS.KEYID = 0
1,506,197 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,843 UART: [idev] --
1,515,784 UART: [ldev] ++
1,515,952 UART: [ldev] CDI.KEYID = 6
1,516,315 UART: [ldev] SUBJECT.KEYID = 5
1,516,741 UART: [ldev] AUTHORITY.KEYID = 7
1,517,204 UART: [ldev] FE.KEYID = 1
1,522,438 UART: [ldev] Erasing FE.KEYID = 1
1,547,483 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,539 UART: [ldev] --
1,586,860 UART: [fwproc] Waiting for Commands...
1,587,543 UART: [fwproc] Received command 0x46574c44
1,588,334 UART: [fwproc] Received Image of size 114332 bytes
2,887,342 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,128 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,480 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,343 >>> mbox cmd response: success
3,080,343 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
3,081,483 UART: [afmc] ++
3,081,651 UART: [afmc] CDI.KEYID = 6
3,082,013 UART: [afmc] SUBJECT.KEYID = 7
3,082,438 UART: [afmc] AUTHORITY.KEYID = 5
3,117,103 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,897 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,677 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,405 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,290 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,980 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,963 UART: [afmc] --
3,160,867 UART: [cold-reset] --
3,161,549 UART: [state] Locking Datavault
3,162,528 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,132 UART: [state] Locking ICCM
3,163,734 UART: [exit] Launching FMC @ 0x40000130
3,169,063 UART:
3,169,079 UART: Running Caliptra FMC ...
3,169,487 UART:
3,169,630 UART: [state] CFI Enabled
3,180,349 UART: [fht] FMC Alias Private Key: 7
3,288,274 UART: [art] Extend RT PCRs Done
3,288,702 UART: [art] Lock RT PCRs Done
3,289,956 UART: [art] Populate DV Done
3,298,317 UART: [fht] FMC Alias Private Key: 7
3,299,305 UART: [art] Derive CDI
3,299,585 UART: [art] Store in in slot 0x4
3,385,352 UART: [art] Derive Key Pair
3,385,712 UART: [art] Store priv key in slot 0x5
3,399,482 UART: [art] Derive Key Pair - Done
3,414,587 UART: [art] Signing Cert with AUTHO
3,415,067 UART: RITY.KEYID = 7
3,430,225 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,990 UART: [art] PUB.X = 31C0653B507CD11E55D9CC3F47341C3B8BAE4659FA8DD07124DA6E5E73798814CDE3A1071AACC95DE0EF372B36CEDAB3
3,437,775 UART: [art] PUB.Y = CBE240F38A6F87DA401D20936176772DCD3CADE3B23EDE2A7D85717F4F064516A5C0B7CD5C05D1E648F735D6DEC4583B
3,444,733 UART: [art] SIG.R = DF03BEBE425D195907AC4448E6829277A8CD914BE56B56A9485F53DC489A5B788A8978C47975F0DEA41E01B0780EB60A
3,451,492 UART: [art] SIG.S = F0DA1CD31F8C665BCA97493198A846C2F20A8E85E2AC23C5572B6242B4E149B7F14BCDAF556B929724A67A25DD521648
3,475,690 UART: Caliptra RT
3,476,035 UART: [state] CFI Enabled
3,583,593 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,486 UART:
3,585,502 UART: Running Caliptra ROM ...
3,585,910 UART:
3,586,051 UART: [state] CFI Enabled
3,588,753 UART: [state] LifecycleState = Unprovisioned
3,589,408 UART: [state] DebugLocked = No
3,589,904 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,591,531 UART: [kat] SHA2-256
4,385,462 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,389,577 UART: [kat] ++
4,389,729 UART: [kat] sha1
4,394,069 UART: [kat] SHA2-256
4,396,007 UART: [kat] SHA2-384
4,398,690 UART: [kat] SHA2-512-ACC
4,400,590 UART: [kat] ECC-384
4,406,045 UART: [kat] HMAC-384Kdf
4,410,517 UART: [kat] LMS
4,978,713 UART: [kat] --
4,979,738 UART: [update-reset] ++
5,091,261 >>> mbox cmd response: failed
5,091,261 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,091,773 UART: ROM Non-Fatal Error: 0x000B001F
5,092,647 UART: [state] Locking Datavault
5,093,665 UART: [state] Locking PCR0, PCR1 and PCR31
5,094,269 UART: [state] Locking ICCM
5,094,901 UART: [exit] Launching FMC @ 0x40000130
5,100,230 UART:
5,100,246 UART: Running Caliptra FMC ...
5,100,654 UART:
5,100,797 UART: [state] CFI Enabled
5,190,512 UART: [art] Extend RT PCRs Done
5,190,940 UART: [art] Lock RT PCRs Done
5,192,235 UART: [art] Populate DV Done
5,200,306 UART: [fht] FMC Alias Private Key: 7
5,201,272 UART: [art] Derive CDI
5,201,552 UART: [art] Store in in slot 0x4
5,287,301 UART: [art] Derive Key Pair
5,287,661 UART: [art] Store priv key in slot 0x5
5,301,249 UART: [art] Derive Key Pair - Done
5,316,036 UART: [art] Signing Cert with AUTHO
5,316,516 UART: RITY.KEYID = 7
5,331,412 UART: [art] Erasing AUTHORITY.KEYID = 7
5,332,177 UART: [art] PUB.X = 31C0653B507CD11E55D9CC3F47341C3B8BAE4659FA8DD07124DA6E5E73798814CDE3A1071AACC95DE0EF372B36CEDAB3
5,338,962 UART: [art] PUB.Y = CBE240F38A6F87DA401D20936176772DCD3CADE3B23EDE2A7D85717F4F064516A5C0B7CD5C05D1E648F735D6DEC4583B
5,345,920 UART: [art] SIG.R = DF03BEBE425D195907AC4448E6829277A8CD914BE56B56A9485F53DC489A5B788A8978C47975F0DEA41E01B0780EB60A
5,352,679 UART: [art] SIG.S = F0DA1CD31F8C665BCA97493198A846C2F20A8E85E2AC23C5572B6242B4E149B7F14BCDAF556B929724A67A25DD521648
5,375,873 UART: Caliptra RT
5,376,218 UART: [state] CFI Enabled
5,656,112 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,657,914 UART:
5,657,930 UART: Running Caliptra ROM ...
5,658,338 UART:
5,658,479 UART: [state] CFI Enabled
5,661,487 UART: [state] LifecycleState = Unprovisioned
5,662,142 UART: [state] DebugLocked = No
5,662,796 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,664,441 UART: [kat] SHA2-256
6,458,372 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,462,487 UART: [kat] ++
6,462,639 UART: [kat] sha1
6,466,953 UART: [kat] SHA2-256
6,468,891 UART: [kat] SHA2-384
6,471,600 UART: [kat] SHA2-512-ACC
6,473,500 UART: [kat] ECC-384
6,478,931 UART: [kat] HMAC-384Kdf
6,483,433 UART: [kat] LMS
7,051,629 UART: [kat] --
7,052,750 UART: [update-reset] ++
8,387,486 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,388,578 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
8,538,454 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,740 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,627 >>> mbox cmd response: success
2,929,627 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,991,149 UART:
2,991,165 UART: Running Caliptra FMC ...
2,991,573 UART:
2,991,716 UART: [state] CFI Enabled
3,002,151 UART: [fht] FMC Alias Private Key: 7
3,109,812 UART: [art] Extend RT PCRs Done
3,110,240 UART: [art] Lock RT PCRs Done
3,111,558 UART: [art] Populate DV Done
3,119,769 UART: [fht] FMC Alias Private Key: 7
3,120,921 UART: [art] Derive CDI
3,121,201 UART: [art] Store in in slot 0x4
3,206,796 UART: [art] Derive Key Pair
3,207,156 UART: [art] Store priv key in slot 0x5
3,220,330 UART: [art] Derive Key Pair - Done
3,235,180 UART: [art] Signing Cert with AUTHO
3,235,660 UART: RITY.KEYID = 7
3,250,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,179 UART: [art] PUB.X = D6788F6DF54F605FCE976D641E577300E1E7BC6305B1C82AE71EC7F5C7EFEDD77A1E7DCD14218DE26E0DEF076F6C8D35
3,257,938 UART: [art] PUB.Y = 1F77AAB0FDEBBAB056A9CB23AB035ABE8BC0D60DE6C01AADC622B12B60F267561D8E8FA0987320FD17E4E38F445882D3
3,264,904 UART: [art] SIG.R = E047530613490AE1A0AC9CA0AE800D4E78C75A3E027293D16CF7DCA0C6109F314C2B3B711C8A168868BDAA741CC02C87
3,271,670 UART: [art] SIG.S = 7736DF5064269F1267CFA55D23CD7010EDD04081E25C2A21E1B3EBF4A1F566518A2D922D269E60EEB81175A4698DA4A4
3,295,483 UART: Caliptra RT
3,295,828 UART: [state] CFI Enabled
3,403,355 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,795,640 >>> mbox cmd response: failed
4,795,640 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,801,499 UART:
4,801,515 UART: Running Caliptra FMC ...
4,801,923 UART:
4,802,066 UART: [state] CFI Enabled
4,891,191 UART: [art] Extend RT PCRs Done
4,891,619 UART: [art] Lock RT PCRs Done
4,892,690 UART: [art] Populate DV Done
4,900,917 UART: [fht] FMC Alias Private Key: 7
4,902,095 UART: [art] Derive CDI
4,902,375 UART: [art] Store in in slot 0x4
4,987,836 UART: [art] Derive Key Pair
4,988,196 UART: [art] Store priv key in slot 0x5
5,001,482 UART: [art] Derive Key Pair - Done
5,015,940 UART: [art] Signing Cert with AUTHO
5,016,420 UART: RITY.KEYID = 7
5,031,706 UART: [art] Erasing AUTHORITY.KEYID = 7
5,032,471 UART: [art] PUB.X = D6788F6DF54F605FCE976D641E577300E1E7BC6305B1C82AE71EC7F5C7EFEDD77A1E7DCD14218DE26E0DEF076F6C8D35
5,039,230 UART: [art] PUB.Y = 1F77AAB0FDEBBAB056A9CB23AB035ABE8BC0D60DE6C01AADC622B12B60F267561D8E8FA0987320FD17E4E38F445882D3
5,046,196 UART: [art] SIG.R = E047530613490AE1A0AC9CA0AE800D4E78C75A3E027293D16CF7DCA0C6109F314C2B3B711C8A168868BDAA741CC02C87
5,052,962 UART: [art] SIG.S = 7736DF5064269F1267CFA55D23CD7010EDD04081E25C2A21E1B3EBF4A1F566518A2D922D269E60EEB81175A4698DA4A4
5,076,521 UART: Caliptra RT
5,076,866 UART: [state] CFI Enabled
5,357,401 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,122,827 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,512 UART: [state] LifecycleState = Unprovisioned
86,167 UART: [state] DebugLocked = No
86,653 UART: [state] WD Timer not started. Device not locked for debugging
87,884 UART: [kat] SHA2-256
893,534 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,659 UART: [kat] ++
897,811 UART: [kat] sha1
902,053 UART: [kat] SHA2-256
903,993 UART: [kat] SHA2-384
906,718 UART: [kat] SHA2-512-ACC
908,619 UART: [kat] ECC-384
918,614 UART: [kat] HMAC-384Kdf
923,272 UART: [kat] LMS
1,171,600 UART: [kat] --
1,172,449 UART: [cold-reset] ++
1,172,909 UART: [fht] FHT @ 0x50003400
1,175,696 UART: [idev] ++
1,175,864 UART: [idev] CDI.KEYID = 6
1,176,224 UART: [idev] SUBJECT.KEYID = 7
1,176,648 UART: [idev] UDS.KEYID = 0
1,176,993 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,448 UART: [idev] Erasing UDS.KEYID = 0
1,201,369 UART: [idev] Sha1 KeyId Algorithm
1,209,977 UART: [idev] --
1,211,033 UART: [ldev] ++
1,211,201 UART: [ldev] CDI.KEYID = 6
1,211,564 UART: [ldev] SUBJECT.KEYID = 5
1,211,990 UART: [ldev] AUTHORITY.KEYID = 7
1,212,453 UART: [ldev] FE.KEYID = 1
1,217,789 UART: [ldev] Erasing FE.KEYID = 1
1,244,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,057 UART: [ldev] --
1,283,514 UART: [fwproc] Wait for Commands...
1,284,248 UART: [fwproc] Recv command 0x46574c44
1,284,976 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,603 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,907 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,834 >>> mbox cmd response: success
2,774,834 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,776,068 UART: [afmc] ++
2,776,236 UART: [afmc] CDI.KEYID = 6
2,776,598 UART: [afmc] SUBJECT.KEYID = 7
2,777,023 UART: [afmc] AUTHORITY.KEYID = 5
2,813,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,251 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,979 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,864 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,583 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,647 UART: [afmc] --
2,856,531 UART: [cold-reset] --
2,857,389 UART: [state] Locking Datavault
2,858,524 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,128 UART: [state] Locking ICCM
2,859,766 UART: [exit] Launching FMC @ 0x40000130
2,865,095 UART:
2,865,111 UART: Running Caliptra FMC ...
2,865,519 UART:
2,865,573 UART: [state] CFI Enabled
2,876,320 UART: [fht] FMC Alias Private Key: 7
2,984,021 UART: [art] Extend RT PCRs Done
2,984,449 UART: [art] Lock RT PCRs Done
2,985,945 UART: [art] Populate DV Done
2,994,152 UART: [fht] FMC Alias Private Key: 7
2,995,222 UART: [art] Derive CDI
2,995,502 UART: [art] Store in in slot 0x4
3,081,187 UART: [art] Derive Key Pair
3,081,547 UART: [art] Store priv key in slot 0x5
3,094,553 UART: [art] Derive Key Pair - Done
3,109,634 UART: [art] Signing Cert with AUTHO
3,110,114 UART: RITY.KEYID = 7
3,126,008 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,773 UART: [art] PUB.X = 5831D9721A68FAECA0212BDA46DF8CF175459A492352F5DDDCAFE713374DDB04D3666ED2E582106A94F4CA61D7032D9D
3,133,549 UART: [art] PUB.Y = 8BAA5A58651B256A9DF203A42905FB7850BFA09627FDCCCE82F548C368A001DED1C69D0F254A9982D50889AD8595C7BE
3,140,494 UART: [art] SIG.R = AF972C50117A104EC36F76DFBA23157124C1FFBAAE50F9D6596F3F1CBD5A99B55AA81BD6A1C5BAF0D89042633A092E3A
3,147,279 UART: [art] SIG.S = 6FDA2217BA03915F10CDCC58B4C4EC664250999DAE32A6E50B28A447071E25295F275D3ECCB681BC528A49BBAF28D31E
3,171,613 UART: Caliptra RT
3,171,866 UART: [state] CFI Enabled
3,279,267 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,281,373 UART:
3,281,389 UART: Running Caliptra ROM ...
3,281,797 UART:
3,281,852 UART: [state] CFI Enabled
3,284,530 UART: [state] LifecycleState = Unprovisioned
3,285,185 UART: [state] DebugLocked = No
3,285,813 UART: [state] WD Timer not started. Device not locked for debugging
3,287,097 UART: [kat] SHA2-256
4,092,747 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,096,872 UART: [kat] ++
4,097,024 UART: [kat] sha1
4,101,264 UART: [kat] SHA2-256
4,103,204 UART: [kat] SHA2-384
4,106,005 UART: [kat] SHA2-512-ACC
4,107,905 UART: [kat] ECC-384
4,117,596 UART: [kat] HMAC-384Kdf
4,122,220 UART: [kat] LMS
4,370,548 UART: [kat] --
4,371,394 UART: [update-reset] ++
4,460,713 >>> mbox cmd response: failed
4,460,713 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,461,171 UART: ROM Non-Fatal Error: 0x000B001F
4,461,993 UART: [state] Locking Datavault
4,462,647 UART: [state] Locking PCR0, PCR1 and PCR31
4,463,251 UART: [state] Locking ICCM
4,463,921 UART: [exit] Launching FMC @ 0x40000130
4,469,250 UART:
4,469,266 UART: Running Caliptra FMC ...
4,469,674 UART:
4,469,728 UART: [state] CFI Enabled
4,558,607 UART: [art] Extend RT PCRs Done
4,559,035 UART: [art] Lock RT PCRs Done
4,560,128 UART: [art] Populate DV Done
4,568,301 UART: [fht] FMC Alias Private Key: 7
4,569,231 UART: [art] Derive CDI
4,569,511 UART: [art] Store in in slot 0x4
4,655,464 UART: [art] Derive Key Pair
4,655,824 UART: [art] Store priv key in slot 0x5
4,668,664 UART: [art] Derive Key Pair - Done
4,683,203 UART: [art] Signing Cert with AUTHO
4,683,683 UART: RITY.KEYID = 7
4,698,887 UART: [art] Erasing AUTHORITY.KEYID = 7
4,699,652 UART: [art] PUB.X = 5831D9721A68FAECA0212BDA46DF8CF175459A492352F5DDDCAFE713374DDB04D3666ED2E582106A94F4CA61D7032D9D
4,706,428 UART: [art] PUB.Y = 8BAA5A58651B256A9DF203A42905FB7850BFA09627FDCCCE82F548C368A001DED1C69D0F254A9982D50889AD8595C7BE
4,713,373 UART: [art] SIG.R = AF972C50117A104EC36F76DFBA23157124C1FFBAAE50F9D6596F3F1CBD5A99B55AA81BD6A1C5BAF0D89042633A092E3A
4,720,158 UART: [art] SIG.S = 6FDA2217BA03915F10CDCC58B4C4EC664250999DAE32A6E50B28A447071E25295F275D3ECCB681BC528A49BBAF28D31E
4,744,292 UART: Caliptra RT
4,744,545 UART: [state] CFI Enabled
5,028,248 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,029,755 UART:
5,029,771 UART: Running Caliptra ROM ...
5,030,179 UART:
5,030,234 UART: [state] CFI Enabled
5,032,714 UART: [state] LifecycleState = Unprovisioned
5,033,369 UART: [state] DebugLocked = No
5,033,851 UART: [state] WD Timer not started. Device not locked for debugging
5,035,167 UART: [kat] SHA2-256
5,840,817 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,844,942 UART: [kat] ++
5,845,094 UART: [kat] sha1
5,849,256 UART: [kat] SHA2-256
5,851,196 UART: [kat] SHA2-384
5,853,997 UART: [kat] SHA2-512-ACC
5,855,897 UART: [kat] ECC-384
5,865,426 UART: [kat] HMAC-384Kdf
5,869,992 UART: [kat] LMS
6,118,320 UART: [kat] --
6,119,330 UART: [update-reset] ++
7,432,107 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,433,242 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,583,066 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,589 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,440 >>> mbox cmd response: success
2,624,440 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,686,412 UART:
2,686,428 UART: Running Caliptra FMC ...
2,686,836 UART:
2,686,890 UART: [state] CFI Enabled
2,697,523 UART: [fht] FMC Alias Private Key: 7
2,805,502 UART: [art] Extend RT PCRs Done
2,805,930 UART: [art] Lock RT PCRs Done
2,807,268 UART: [art] Populate DV Done
2,815,677 UART: [fht] FMC Alias Private Key: 7
2,816,769 UART: [art] Derive CDI
2,817,049 UART: [art] Store in in slot 0x4
2,902,508 UART: [art] Derive Key Pair
2,902,868 UART: [art] Store priv key in slot 0x5
2,915,920 UART: [art] Derive Key Pair - Done
2,930,863 UART: [art] Signing Cert with AUTHO
2,931,343 UART: RITY.KEYID = 7
2,946,527 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,292 UART: [art] PUB.X = 011D7A476914EACA23ED62634D7286AD4437351F5ECF07C8B74EF46F4FBA671D3D4F76601CAD2FB3988ABA5FD63684F8
2,954,068 UART: [art] PUB.Y = 79967D0841DD102D4D1449E25A93FBF538BF5B9469DA6506DFAA00917DF58C9F89E0928459C66A38CEEC9BF61088244D
2,960,994 UART: [art] SIG.R = FD12BC2668E999D6115A8D3267A20A4823B5562FF3EB8889706638AA472CBF34BF23391A5BF5762C34FBEB7562F90A2A
2,967,762 UART: [art] SIG.S = A3AA0F41F6F5D114FA9776D7D8DE6161311D39C4255295332AD9FD942C60ADCCE136CC18DC77568356273F1A1D9AD4DA
2,991,546 UART: Caliptra RT
2,991,799 UART: [state] CFI Enabled
3,098,659 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,164,299 >>> mbox cmd response: failed
4,164,299 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,169,780 UART:
4,169,796 UART: Running Caliptra FMC ...
4,170,204 UART:
4,170,258 UART: [state] CFI Enabled
4,259,597 UART: [art] Extend RT PCRs Done
4,260,025 UART: [art] Lock RT PCRs Done
4,261,534 UART: [art] Populate DV Done
4,269,605 UART: [fht] FMC Alias Private Key: 7
4,270,563 UART: [art] Derive CDI
4,270,843 UART: [art] Store in in slot 0x4
4,356,690 UART: [art] Derive Key Pair
4,357,050 UART: [art] Store priv key in slot 0x5
4,369,868 UART: [art] Derive Key Pair - Done
4,384,667 UART: [art] Signing Cert with AUTHO
4,385,147 UART: RITY.KEYID = 7
4,399,791 UART: [art] Erasing AUTHORITY.KEYID = 7
4,400,556 UART: [art] PUB.X = 011D7A476914EACA23ED62634D7286AD4437351F5ECF07C8B74EF46F4FBA671D3D4F76601CAD2FB3988ABA5FD63684F8
4,407,332 UART: [art] PUB.Y = 79967D0841DD102D4D1449E25A93FBF538BF5B9469DA6506DFAA00917DF58C9F89E0928459C66A38CEEC9BF61088244D
4,414,258 UART: [art] SIG.R = FD12BC2668E999D6115A8D3267A20A4823B5562FF3EB8889706638AA472CBF34BF23391A5BF5762C34FBEB7562F90A2A
4,421,026 UART: [art] SIG.S = A3AA0F41F6F5D114FA9776D7D8DE6161311D39C4255295332AD9FD942C60ADCCE136CC18DC77568356273F1A1D9AD4DA
4,445,272 UART: Caliptra RT
4,445,525 UART: [state] CFI Enabled
4,727,127 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,166,081 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
893,399 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,524 UART: [kat] ++
897,676 UART: [kat] sha1
901,792 UART: [kat] SHA2-256
903,732 UART: [kat] SHA2-384
906,445 UART: [kat] SHA2-512-ACC
908,346 UART: [kat] ECC-384
918,001 UART: [kat] HMAC-384Kdf
922,595 UART: [kat] LMS
1,170,923 UART: [kat] --
1,172,026 UART: [cold-reset] ++
1,172,384 UART: [fht] FHT @ 0x50003400
1,175,071 UART: [idev] ++
1,175,239 UART: [idev] CDI.KEYID = 6
1,175,599 UART: [idev] SUBJECT.KEYID = 7
1,176,023 UART: [idev] UDS.KEYID = 0
1,176,368 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,289 UART: [idev] Erasing UDS.KEYID = 0
1,201,122 UART: [idev] Sha1 KeyId Algorithm
1,209,742 UART: [idev] --
1,210,872 UART: [ldev] ++
1,211,040 UART: [ldev] CDI.KEYID = 6
1,211,403 UART: [ldev] SUBJECT.KEYID = 5
1,211,829 UART: [ldev] AUTHORITY.KEYID = 7
1,212,292 UART: [ldev] FE.KEYID = 1
1,217,380 UART: [ldev] Erasing FE.KEYID = 1
1,244,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,560 UART: [ldev] --
1,282,929 UART: [fwproc] Wait for Commands...
1,283,705 UART: [fwproc] Recv command 0x46574c44
1,284,433 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,855 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,159 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,038 >>> mbox cmd response: success
2,775,038 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,776,148 UART: [afmc] ++
2,776,316 UART: [afmc] CDI.KEYID = 6
2,776,678 UART: [afmc] SUBJECT.KEYID = 7
2,777,103 UART: [afmc] AUTHORITY.KEYID = 5
2,812,904 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,831 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,559 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,444 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,163 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,047 UART: [afmc] --
2,856,111 UART: [cold-reset] --
2,856,821 UART: [state] Locking Datavault
2,858,184 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,788 UART: [state] Locking ICCM
2,859,260 UART: [exit] Launching FMC @ 0x40000130
2,864,589 UART:
2,864,605 UART: Running Caliptra FMC ...
2,865,013 UART:
2,865,156 UART: [state] CFI Enabled
2,875,671 UART: [fht] FMC Alias Private Key: 7
2,983,512 UART: [art] Extend RT PCRs Done
2,983,940 UART: [art] Lock RT PCRs Done
2,985,452 UART: [art] Populate DV Done
2,993,945 UART: [fht] FMC Alias Private Key: 7
2,995,081 UART: [art] Derive CDI
2,995,361 UART: [art] Store in in slot 0x4
3,080,842 UART: [art] Derive Key Pair
3,081,202 UART: [art] Store priv key in slot 0x5
3,094,480 UART: [art] Derive Key Pair - Done
3,109,314 UART: [art] Signing Cert with AUTHO
3,109,794 UART: RITY.KEYID = 7
3,124,908 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,673 UART: [art] PUB.X = BD224FD79A108159DBD0770E32AEAFDB9677CEEFA5AD01DD589AABC9A9F572F5D1E820C2AFB4E69D28C244BFD61CE934
3,132,465 UART: [art] PUB.Y = 8090314032B9F9769209B04F8132DCE864143D31D7D69137CF0FE87800782D9006D722633B16AADF1B238D3B754F1859
3,139,372 UART: [art] SIG.R = 58F1A931785AAF1859B06A5413C3F7A8279EF36DCEE18F3EBCA16EA0C783F387518473BC9C57FF62DC53C8AEBB98FDCF
3,146,162 UART: [art] SIG.S = D6266A524674A0BFC7E12A370CB327DBBE50A4FB769719924570FADE4C05BEF8C4BDFD3F0B714EA4DA214548CCD5AB93
3,169,864 UART: Caliptra RT
3,170,209 UART: [state] CFI Enabled
3,278,106 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,268 UART:
3,280,284 UART: Running Caliptra ROM ...
3,280,692 UART:
3,280,834 UART: [state] CFI Enabled
3,283,524 UART: [state] LifecycleState = Unprovisioned
3,284,179 UART: [state] DebugLocked = No
3,284,855 UART: [state] WD Timer not started. Device not locked for debugging
3,286,019 UART: [kat] SHA2-256
4,091,669 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,095,794 UART: [kat] ++
4,095,946 UART: [kat] sha1
4,100,194 UART: [kat] SHA2-256
4,102,134 UART: [kat] SHA2-384
4,104,825 UART: [kat] SHA2-512-ACC
4,106,725 UART: [kat] ECC-384
4,116,672 UART: [kat] HMAC-384Kdf
4,121,150 UART: [kat] LMS
4,369,478 UART: [kat] --
4,370,426 UART: [update-reset] ++
4,459,609 >>> mbox cmd response: failed
4,459,609 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,459,877 UART: ROM Non-Fatal Error: 0x000B001F
4,460,809 UART: [state] Locking Datavault
4,461,425 UART: [state] Locking PCR0, PCR1 and PCR31
4,462,029 UART: [state] Locking ICCM
4,462,497 UART: [exit] Launching FMC @ 0x40000130
4,467,826 UART:
4,467,842 UART: Running Caliptra FMC ...
4,468,250 UART:
4,468,393 UART: [state] CFI Enabled
4,558,016 UART: [art] Extend RT PCRs Done
4,558,444 UART: [art] Lock RT PCRs Done
4,559,515 UART: [art] Populate DV Done
4,567,798 UART: [fht] FMC Alias Private Key: 7
4,568,966 UART: [art] Derive CDI
4,569,246 UART: [art] Store in in slot 0x4
4,655,355 UART: [art] Derive Key Pair
4,655,715 UART: [art] Store priv key in slot 0x5
4,668,393 UART: [art] Derive Key Pair - Done
4,683,081 UART: [art] Signing Cert with AUTHO
4,683,561 UART: RITY.KEYID = 7
4,698,817 UART: [art] Erasing AUTHORITY.KEYID = 7
4,699,582 UART: [art] PUB.X = BD224FD79A108159DBD0770E32AEAFDB9677CEEFA5AD01DD589AABC9A9F572F5D1E820C2AFB4E69D28C244BFD61CE934
4,706,374 UART: [art] PUB.Y = 8090314032B9F9769209B04F8132DCE864143D31D7D69137CF0FE87800782D9006D722633B16AADF1B238D3B754F1859
4,713,281 UART: [art] SIG.R = 58F1A931785AAF1859B06A5413C3F7A8279EF36DCEE18F3EBCA16EA0C783F387518473BC9C57FF62DC53C8AEBB98FDCF
4,720,071 UART: [art] SIG.S = D6266A524674A0BFC7E12A370CB327DBBE50A4FB769719924570FADE4C05BEF8C4BDFD3F0B714EA4DA214548CCD5AB93
4,743,893 UART: Caliptra RT
4,744,238 UART: [state] CFI Enabled
5,027,963 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,029,536 UART:
5,029,552 UART: Running Caliptra ROM ...
5,029,960 UART:
5,030,102 UART: [state] CFI Enabled
5,033,118 UART: [state] LifecycleState = Unprovisioned
5,033,773 UART: [state] DebugLocked = No
5,034,421 UART: [state] WD Timer not started. Device not locked for debugging
5,035,547 UART: [kat] SHA2-256
5,841,197 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,845,322 UART: [kat] ++
5,845,474 UART: [kat] sha1
5,849,690 UART: [kat] SHA2-256
5,851,630 UART: [kat] SHA2-384
5,854,197 UART: [kat] SHA2-512-ACC
5,856,097 UART: [kat] ECC-384
5,865,708 UART: [kat] HMAC-384Kdf
5,870,408 UART: [kat] LMS
6,118,736 UART: [kat] --
6,119,760 UART: [update-reset] ++
7,432,660 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,433,853 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,583,677 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,218 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,277 >>> mbox cmd response: success
2,627,277 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,688,297 UART:
2,688,313 UART: Running Caliptra FMC ...
2,688,721 UART:
2,688,864 UART: [state] CFI Enabled
2,699,567 UART: [fht] FMC Alias Private Key: 7
2,807,372 UART: [art] Extend RT PCRs Done
2,807,800 UART: [art] Lock RT PCRs Done
2,809,116 UART: [art] Populate DV Done
2,817,323 UART: [fht] FMC Alias Private Key: 7
2,818,471 UART: [art] Derive CDI
2,818,751 UART: [art] Store in in slot 0x4
2,904,826 UART: [art] Derive Key Pair
2,905,186 UART: [art] Store priv key in slot 0x5
2,918,458 UART: [art] Derive Key Pair - Done
2,933,291 UART: [art] Signing Cert with AUTHO
2,933,771 UART: RITY.KEYID = 7
2,949,057 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,822 UART: [art] PUB.X = 4112F1EC57B2DB900B68E7DA5AE24A707A52E34A0C11F0820CF68A3238FF906F0D9E1AEFEF130EE5BFD94050620DA131
2,956,588 UART: [art] PUB.Y = 8690EF0C83065F6361CB54CF0B7E8A0307C37603CFDC844D9FAED730F763B83001059F498671B9D924A2BAA63067C812
2,963,514 UART: [art] SIG.R = 1F1689678D989E88BAAA47A7FE9671E4F5E9FBF6482C320E2925F9BDE7D3F834003F01242FA721D859120E5BE30A2DA5
2,970,256 UART: [art] SIG.S = 55207210F54258D703D2B9F03DB32538EA6C2EAAFD3BF84763D218045955666C88EE937C733AE3230BDAD0A04FECEC26
2,993,592 UART: Caliptra RT
2,993,937 UART: [state] CFI Enabled
3,103,252 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,170,417 >>> mbox cmd response: failed
4,170,417 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,176,394 UART:
4,176,410 UART: Running Caliptra FMC ...
4,176,818 UART:
4,176,961 UART: [state] CFI Enabled
4,265,958 UART: [art] Extend RT PCRs Done
4,266,386 UART: [art] Lock RT PCRs Done
4,267,791 UART: [art] Populate DV Done
4,275,940 UART: [fht] FMC Alias Private Key: 7
4,277,100 UART: [art] Derive CDI
4,277,380 UART: [art] Store in in slot 0x4
4,363,079 UART: [art] Derive Key Pair
4,363,439 UART: [art] Store priv key in slot 0x5
4,376,253 UART: [art] Derive Key Pair - Done
4,391,238 UART: [art] Signing Cert with AUTHO
4,391,718 UART: RITY.KEYID = 7
4,407,396 UART: [art] Erasing AUTHORITY.KEYID = 7
4,408,161 UART: [art] PUB.X = 4112F1EC57B2DB900B68E7DA5AE24A707A52E34A0C11F0820CF68A3238FF906F0D9E1AEFEF130EE5BFD94050620DA131
4,414,927 UART: [art] PUB.Y = 8690EF0C83065F6361CB54CF0B7E8A0307C37603CFDC844D9FAED730F763B83001059F498671B9D924A2BAA63067C812
4,421,853 UART: [art] SIG.R = 1F1689678D989E88BAAA47A7FE9671E4F5E9FBF6482C320E2925F9BDE7D3F834003F01242FA721D859120E5BE30A2DA5
4,428,595 UART: [art] SIG.S = 55207210F54258D703D2B9F03DB32538EA6C2EAAFD3BF84763D218045955666C88EE937C733AE3230BDAD0A04FECEC26
4,451,959 UART: Caliptra RT
4,452,304 UART: [state] CFI Enabled
4,730,061 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,168,546 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,442 UART: [state] LifecycleState = Unprovisioned
86,097 UART: [state] DebugLocked = No
86,699 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
891,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,577 UART: [kat] ++
895,729 UART: [kat] sha1
900,061 UART: [kat] SHA2-256
902,001 UART: [kat] SHA2-384
904,776 UART: [kat] SHA2-512-ACC
906,677 UART: [kat] ECC-384
916,556 UART: [kat] HMAC-384Kdf
921,058 UART: [kat] LMS
1,169,370 UART: [kat] --
1,170,165 UART: [cold-reset] ++
1,170,581 UART: [fht] FHT @ 0x50003400
1,173,189 UART: [idev] ++
1,173,357 UART: [idev] CDI.KEYID = 6
1,173,718 UART: [idev] SUBJECT.KEYID = 7
1,174,143 UART: [idev] UDS.KEYID = 0
1,174,489 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,307 UART: [idev] Erasing UDS.KEYID = 0
1,199,005 UART: [idev] Sha1 KeyId Algorithm
1,207,783 UART: [idev] --
1,208,746 UART: [ldev] ++
1,208,914 UART: [ldev] CDI.KEYID = 6
1,209,278 UART: [ldev] SUBJECT.KEYID = 5
1,209,705 UART: [ldev] AUTHORITY.KEYID = 7
1,210,168 UART: [ldev] FE.KEYID = 1
1,215,388 UART: [ldev] Erasing FE.KEYID = 1
1,241,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,348 UART: [ldev] --
1,280,696 UART: [fwproc] Wait for Commands...
1,281,429 UART: [fwproc] Recv command 0x46574c44
1,282,162 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,944 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,253 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,987 >>> mbox cmd response: success
2,772,987 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,774,076 UART: [afmc] ++
2,774,244 UART: [afmc] CDI.KEYID = 6
2,774,607 UART: [afmc] SUBJECT.KEYID = 7
2,775,033 UART: [afmc] AUTHORITY.KEYID = 5
2,810,898 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,350 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,101 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,830 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,713 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,432 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,287 UART: [afmc] --
2,854,363 UART: [cold-reset] --
2,855,179 UART: [state] Locking Datavault
2,856,014 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,618 UART: [state] Locking ICCM
2,857,208 UART: [exit] Launching FMC @ 0x40000130
2,862,537 UART:
2,862,553 UART: Running Caliptra FMC ...
2,862,961 UART:
2,863,015 UART: [state] CFI Enabled
2,873,304 UART: [fht] FMC Alias Private Key: 7
2,981,633 UART: [art] Extend RT PCRs Done
2,982,061 UART: [art] Lock RT PCRs Done
2,983,715 UART: [art] Populate DV Done
2,992,066 UART: [fht] FMC Alias Private Key: 7
2,993,244 UART: [art] Derive CDI
2,993,524 UART: [art] Store in in slot 0x4
3,079,203 UART: [art] Derive Key Pair
3,079,563 UART: [art] Store priv key in slot 0x5
3,092,963 UART: [art] Derive Key Pair - Done
3,107,718 UART: [art] Signing Cert with AUTHO
3,108,198 UART: RITY.KEYID = 7
3,123,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,317 UART: [art] PUB.X = F19CC2B333237787FEB7004380103DCC2DB3C54F4B883E711E249E0FF6F5085E885CEE48EAF535E5AA52311886E1541D
3,131,063 UART: [art] PUB.Y = 3802DDC783E9BDF55E291053A4DDF786B547B2CA779107484041415B9A79B06E7B62E94001E37CE24F35DC2B9E6AD717
3,138,006 UART: [art] SIG.R = E578C3670C0DE6E6B079DF7AFD9E62E7B4264260DF8E650E874185C4C7FE543AABAE9CAFEB302AABCC4CF6A80B6357F3
3,144,788 UART: [art] SIG.S = 76109AD1B0DC4553ED415F7F3FA3A1A83E3BBB2CD5427D9AD3A4F8E15423322A203532A5CB11244E69EB55DEE775D380
3,168,495 UART: Caliptra RT
3,168,748 UART: [state] CFI Enabled
3,276,677 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,755 UART:
3,278,771 UART: Running Caliptra ROM ...
3,279,179 UART:
3,279,234 UART: [state] CFI Enabled
3,281,834 UART: [state] LifecycleState = Unprovisioned
3,282,489 UART: [state] DebugLocked = No
3,283,215 UART: [state] WD Timer not started. Device not locked for debugging
3,284,395 UART: [kat] SHA2-256
4,087,945 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,092,074 UART: [kat] ++
4,092,226 UART: [kat] sha1
4,096,496 UART: [kat] SHA2-256
4,098,436 UART: [kat] SHA2-384
4,101,279 UART: [kat] SHA2-512-ACC
4,103,179 UART: [kat] ECC-384
4,112,764 UART: [kat] HMAC-384Kdf
4,117,316 UART: [kat] LMS
4,365,628 UART: [kat] --
4,366,870 UART: [update-reset] ++
4,456,164 >>> mbox cmd response: failed
4,456,164 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,456,514 UART: ROM Non-Fatal Error: 0x000B001F
4,457,332 UART: [state] Locking Datavault
4,458,150 UART: [state] Locking PCR0, PCR1 and PCR31
4,458,754 UART: [state] Locking ICCM
4,459,200 UART: [exit] Launching FMC @ 0x40000130
4,464,529 UART:
4,464,545 UART: Running Caliptra FMC ...
4,464,953 UART:
4,465,007 UART: [state] CFI Enabled
4,554,636 UART: [art] Extend RT PCRs Done
4,555,064 UART: [art] Lock RT PCRs Done
4,556,437 UART: [art] Populate DV Done
4,564,660 UART: [fht] FMC Alias Private Key: 7
4,565,654 UART: [art] Derive CDI
4,565,934 UART: [art] Store in in slot 0x4
4,651,463 UART: [art] Derive Key Pair
4,651,823 UART: [art] Store priv key in slot 0x5
4,665,777 UART: [art] Derive Key Pair - Done
4,680,336 UART: [art] Signing Cert with AUTHO
4,680,816 UART: RITY.KEYID = 7
4,695,452 UART: [art] Erasing AUTHORITY.KEYID = 7
4,696,217 UART: [art] PUB.X = F19CC2B333237787FEB7004380103DCC2DB3C54F4B883E711E249E0FF6F5085E885CEE48EAF535E5AA52311886E1541D
4,702,963 UART: [art] PUB.Y = 3802DDC783E9BDF55E291053A4DDF786B547B2CA779107484041415B9A79B06E7B62E94001E37CE24F35DC2B9E6AD717
4,709,906 UART: [art] SIG.R = E578C3670C0DE6E6B079DF7AFD9E62E7B4264260DF8E650E874185C4C7FE543AABAE9CAFEB302AABCC4CF6A80B6357F3
4,716,688 UART: [art] SIG.S = 76109AD1B0DC4553ED415F7F3FA3A1A83E3BBB2CD5427D9AD3A4F8E15423322A203532A5CB11244E69EB55DEE775D380
4,740,483 UART: Caliptra RT
4,740,736 UART: [state] CFI Enabled
5,024,451 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,026,252 UART:
5,026,268 UART: Running Caliptra ROM ...
5,026,676 UART:
5,026,731 UART: [state] CFI Enabled
5,029,611 UART: [state] LifecycleState = Unprovisioned
5,030,266 UART: [state] DebugLocked = No
5,030,870 UART: [state] WD Timer not started. Device not locked for debugging
5,032,116 UART: [kat] SHA2-256
5,835,666 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,839,795 UART: [kat] ++
5,839,947 UART: [kat] sha1
5,844,035 UART: [kat] SHA2-256
5,845,975 UART: [kat] SHA2-384
5,848,788 UART: [kat] SHA2-512-ACC
5,850,688 UART: [kat] ECC-384
5,859,959 UART: [kat] HMAC-384Kdf
5,864,347 UART: [kat] LMS
6,112,659 UART: [kat] --
6,113,443 UART: [update-reset] ++
7,423,734 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,424,699 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,574,523 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,340 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,618,267 >>> mbox cmd response: success
2,618,267 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,680,007 UART:
2,680,023 UART: Running Caliptra FMC ...
2,680,431 UART:
2,680,485 UART: [state] CFI Enabled
2,690,876 UART: [fht] FMC Alias Private Key: 7
2,799,193 UART: [art] Extend RT PCRs Done
2,799,621 UART: [art] Lock RT PCRs Done
2,800,771 UART: [art] Populate DV Done
2,809,144 UART: [fht] FMC Alias Private Key: 7
2,810,148 UART: [art] Derive CDI
2,810,428 UART: [art] Store in in slot 0x4
2,895,969 UART: [art] Derive Key Pair
2,896,329 UART: [art] Store priv key in slot 0x5
2,909,981 UART: [art] Derive Key Pair - Done
2,924,937 UART: [art] Signing Cert with AUTHO
2,925,417 UART: RITY.KEYID = 7
2,940,849 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,614 UART: [art] PUB.X = D7374CB238D89FD4ADAD1B69EEA103520D739F5A75917314E099F0AD3BC823A0D986CFDFCF3EDA7A3A87C2F3C48B518C
2,948,398 UART: [art] PUB.Y = 82E55D72D5CAD2600B96F4E8AAAC563FEBCF71E3B305958CF1DCC6FBDF0D9F81E9B5FF4ABBD6BF57D159A244AA888D8E
2,955,371 UART: [art] SIG.R = 43389840D82D38C1B9BFD2847D9AD83910D5E9D780CC9244BF2E498F6D2F7B6D3C655D3A6BEAB5FAC27938ACE6AF3B3E
2,962,159 UART: [art] SIG.S = C5B012278FAA725E612B39C4870BC09F9A308F8CDBD8CA36A0060CE886C05428297747F9D6C58F8E79A043B66FFDD294
2,985,917 UART: Caliptra RT
2,986,170 UART: [state] CFI Enabled
3,093,645 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,154,624 >>> mbox cmd response: failed
4,154,624 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,160,577 UART:
4,160,593 UART: Running Caliptra FMC ...
4,161,001 UART:
4,161,055 UART: [state] CFI Enabled
4,249,686 UART: [art] Extend RT PCRs Done
4,250,114 UART: [art] Lock RT PCRs Done
4,251,435 UART: [art] Populate DV Done
4,259,514 UART: [fht] FMC Alias Private Key: 7
4,260,654 UART: [art] Derive CDI
4,260,934 UART: [art] Store in in slot 0x4
4,346,841 UART: [art] Derive Key Pair
4,347,201 UART: [art] Store priv key in slot 0x5
4,360,587 UART: [art] Derive Key Pair - Done
4,375,253 UART: [art] Signing Cert with AUTHO
4,375,733 UART: RITY.KEYID = 7
4,391,147 UART: [art] Erasing AUTHORITY.KEYID = 7
4,391,912 UART: [art] PUB.X = D7374CB238D89FD4ADAD1B69EEA103520D739F5A75917314E099F0AD3BC823A0D986CFDFCF3EDA7A3A87C2F3C48B518C
4,398,696 UART: [art] PUB.Y = 82E55D72D5CAD2600B96F4E8AAAC563FEBCF71E3B305958CF1DCC6FBDF0D9F81E9B5FF4ABBD6BF57D159A244AA888D8E
4,405,669 UART: [art] SIG.R = 43389840D82D38C1B9BFD2847D9AD83910D5E9D780CC9244BF2E498F6D2F7B6D3C655D3A6BEAB5FAC27938ACE6AF3B3E
4,412,457 UART: [art] SIG.S = C5B012278FAA725E612B39C4870BC09F9A308F8CDBD8CA36A0060CE886C05428297747F9D6C58F8E79A043B66FFDD294
4,436,347 UART: Caliptra RT
4,436,600 UART: [state] CFI Enabled
4,716,355 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,150,652 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,039 UART: [state] LifecycleState = Unprovisioned
85,694 UART: [state] DebugLocked = No
86,292 UART: [state] WD Timer not started. Device not locked for debugging
87,431 UART: [kat] SHA2-256
890,981 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,110 UART: [kat] ++
895,262 UART: [kat] sha1
899,660 UART: [kat] SHA2-256
901,600 UART: [kat] SHA2-384
904,363 UART: [kat] SHA2-512-ACC
906,264 UART: [kat] ECC-384
916,215 UART: [kat] HMAC-384Kdf
921,041 UART: [kat] LMS
1,169,353 UART: [kat] --
1,170,178 UART: [cold-reset] ++
1,170,672 UART: [fht] FHT @ 0x50003400
1,173,420 UART: [idev] ++
1,173,588 UART: [idev] CDI.KEYID = 6
1,173,949 UART: [idev] SUBJECT.KEYID = 7
1,174,374 UART: [idev] UDS.KEYID = 0
1,174,720 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,314 UART: [idev] Erasing UDS.KEYID = 0
1,198,970 UART: [idev] Sha1 KeyId Algorithm
1,207,988 UART: [idev] --
1,209,183 UART: [ldev] ++
1,209,351 UART: [ldev] CDI.KEYID = 6
1,209,715 UART: [ldev] SUBJECT.KEYID = 5
1,210,142 UART: [ldev] AUTHORITY.KEYID = 7
1,210,605 UART: [ldev] FE.KEYID = 1
1,216,267 UART: [ldev] Erasing FE.KEYID = 1
1,243,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,095 UART: [ldev] --
1,282,505 UART: [fwproc] Wait for Commands...
1,283,180 UART: [fwproc] Recv command 0x46574c44
1,283,913 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,981 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,290 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,106 >>> mbox cmd response: success
2,774,106 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,775,231 UART: [afmc] ++
2,775,399 UART: [afmc] CDI.KEYID = 6
2,775,762 UART: [afmc] SUBJECT.KEYID = 7
2,776,188 UART: [afmc] AUTHORITY.KEYID = 5
2,811,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,109 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,860 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,589 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,472 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,191 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,042 UART: [afmc] --
2,855,156 UART: [cold-reset] --
2,856,034 UART: [state] Locking Datavault
2,857,141 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,745 UART: [state] Locking ICCM
2,858,373 UART: [exit] Launching FMC @ 0x40000130
2,863,702 UART:
2,863,718 UART: Running Caliptra FMC ...
2,864,126 UART:
2,864,269 UART: [state] CFI Enabled
2,874,964 UART: [fht] FMC Alias Private Key: 7
2,983,069 UART: [art] Extend RT PCRs Done
2,983,497 UART: [art] Lock RT PCRs Done
2,984,961 UART: [art] Populate DV Done
2,992,896 UART: [fht] FMC Alias Private Key: 7
2,993,934 UART: [art] Derive CDI
2,994,214 UART: [art] Store in in slot 0x4
3,079,841 UART: [art] Derive Key Pair
3,080,201 UART: [art] Store priv key in slot 0x5
3,093,977 UART: [art] Derive Key Pair - Done
3,108,738 UART: [art] Signing Cert with AUTHO
3,109,218 UART: RITY.KEYID = 7
3,125,046 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,811 UART: [art] PUB.X = 49BBF171B8A3A7CEBAABE97397815D77213DD5C499879E12C653C184A5E106E9FE16EA9F0AEAA3C6FCF2696BC7F45AEF
3,132,597 UART: [art] PUB.Y = A469FE31C49B474946D0C7A3618A581B42F10FE1EBDDD5A9FE23AF8766F6DB47D423B48D87EFE60A97EF44D9450C89BE
3,139,554 UART: [art] SIG.R = F65FEA8E2F9A7B125A0AB482A98A8700DAD1CC3647F4C9E748615F212BA371429E4523F179C6B8A54E20AAC9CF52A413
3,146,309 UART: [art] SIG.S = BF7420F47644DD40F7196121CCA285753EB38E89C89B072A4A7B9001207BD2446A02A0568C04BD6C9EC703589A31EA21
3,169,525 UART: Caliptra RT
3,169,870 UART: [state] CFI Enabled
3,277,308 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,416 UART:
3,279,432 UART: Running Caliptra ROM ...
3,279,840 UART:
3,279,982 UART: [state] CFI Enabled
3,282,798 UART: [state] LifecycleState = Unprovisioned
3,283,453 UART: [state] DebugLocked = No
3,284,017 UART: [state] WD Timer not started. Device not locked for debugging
3,285,159 UART: [kat] SHA2-256
4,088,709 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,092,838 UART: [kat] ++
4,092,990 UART: [kat] sha1
4,097,170 UART: [kat] SHA2-256
4,099,110 UART: [kat] SHA2-384
4,101,947 UART: [kat] SHA2-512-ACC
4,103,847 UART: [kat] ECC-384
4,113,674 UART: [kat] HMAC-384Kdf
4,118,320 UART: [kat] LMS
4,366,632 UART: [kat] --
4,367,476 UART: [update-reset] ++
4,456,892 >>> mbox cmd response: failed
4,456,892 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,457,160 UART: ROM Non-Fatal Error: 0x000B001F
4,457,922 UART: [state] Locking Datavault
4,458,712 UART: [state] Locking PCR0, PCR1 and PCR31
4,459,316 UART: [state] Locking ICCM
4,459,900 UART: [exit] Launching FMC @ 0x40000130
4,465,229 UART:
4,465,245 UART: Running Caliptra FMC ...
4,465,653 UART:
4,465,796 UART: [state] CFI Enabled
4,554,601 UART: [art] Extend RT PCRs Done
4,555,029 UART: [art] Lock RT PCRs Done
4,556,262 UART: [art] Populate DV Done
4,564,567 UART: [fht] FMC Alias Private Key: 7
4,565,527 UART: [art] Derive CDI
4,565,807 UART: [art] Store in in slot 0x4
4,651,372 UART: [art] Derive Key Pair
4,651,732 UART: [art] Store priv key in slot 0x5
4,665,296 UART: [art] Derive Key Pair - Done
4,679,869 UART: [art] Signing Cert with AUTHO
4,680,349 UART: RITY.KEYID = 7
4,695,175 UART: [art] Erasing AUTHORITY.KEYID = 7
4,695,940 UART: [art] PUB.X = 49BBF171B8A3A7CEBAABE97397815D77213DD5C499879E12C653C184A5E106E9FE16EA9F0AEAA3C6FCF2696BC7F45AEF
4,702,726 UART: [art] PUB.Y = A469FE31C49B474946D0C7A3618A581B42F10FE1EBDDD5A9FE23AF8766F6DB47D423B48D87EFE60A97EF44D9450C89BE
4,709,683 UART: [art] SIG.R = F65FEA8E2F9A7B125A0AB482A98A8700DAD1CC3647F4C9E748615F212BA371429E4523F179C6B8A54E20AAC9CF52A413
4,716,438 UART: [art] SIG.S = BF7420F47644DD40F7196121CCA285753EB38E89C89B072A4A7B9001207BD2446A02A0568C04BD6C9EC703589A31EA21
4,740,456 UART: Caliptra RT
4,740,801 UART: [state] CFI Enabled
5,023,889 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,025,540 UART:
5,025,556 UART: Running Caliptra ROM ...
5,025,964 UART:
5,026,106 UART: [state] CFI Enabled
5,029,220 UART: [state] LifecycleState = Unprovisioned
5,029,875 UART: [state] DebugLocked = No
5,030,501 UART: [state] WD Timer not started. Device not locked for debugging
5,031,851 UART: [kat] SHA2-256
5,835,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,839,530 UART: [kat] ++
5,839,682 UART: [kat] sha1
5,843,792 UART: [kat] SHA2-256
5,845,732 UART: [kat] SHA2-384
5,848,499 UART: [kat] SHA2-512-ACC
5,850,399 UART: [kat] ECC-384
5,860,778 UART: [kat] HMAC-384Kdf
5,865,492 UART: [kat] LMS
6,113,804 UART: [kat] --
6,114,622 UART: [update-reset] ++
7,426,931 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,428,058 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,577,882 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,095 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,366 >>> mbox cmd response: success
2,622,366 <<< Executing mbox cmd 0x46574c44 (99632 bytes) from SoC
2,685,638 UART:
2,685,654 UART: Running Caliptra FMC ...
2,686,062 UART:
2,686,205 UART: [state] CFI Enabled
2,697,166 UART: [fht] FMC Alias Private Key: 7
2,805,529 UART: [art] Extend RT PCRs Done
2,805,957 UART: [art] Lock RT PCRs Done
2,807,639 UART: [art] Populate DV Done
2,815,846 UART: [fht] FMC Alias Private Key: 7
2,816,782 UART: [art] Derive CDI
2,817,062 UART: [art] Store in in slot 0x4
2,902,587 UART: [art] Derive Key Pair
2,902,947 UART: [art] Store priv key in slot 0x5
2,915,929 UART: [art] Derive Key Pair - Done
2,930,761 UART: [art] Signing Cert with AUTHO
2,931,241 UART: RITY.KEYID = 7
2,946,453 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,218 UART: [art] PUB.X = DB2FEB2738A7AAEBFC17F96627DC0BCD51392A35E1B49EEBEE8E8F7994553B3F0A1EDE5FFB32D4759C70347D207CEF3A
2,954,008 UART: [art] PUB.Y = DB45EEDDEE29120A1008847C23CCE141DF521B0B975608BFC5E6F238032FD989DCCC56D3551B064096A3EC1A91F210C1
2,960,950 UART: [art] SIG.R = A647BE8A8088864BC6B93498283A1CAE0E50585A01E312EAF506476AD3EA8468CA539A0FFFB3793AFBD4B5BC8A0EA2CF
2,967,723 UART: [art] SIG.S = 8F8B0B3406A61D28D6CCC967883F766829CFBCFA66C1FE91E29D22B1DF4B6E3E7BEE168ABF3EAADCC24418EDD2511BA2
2,991,344 UART: Caliptra RT
2,991,689 UART: [state] CFI Enabled
3,100,103 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,162,425 >>> mbox cmd response: failed
4,162,425 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,168,400 UART:
4,168,416 UART: Running Caliptra FMC ...
4,168,824 UART:
4,168,967 UART: [state] CFI Enabled
4,257,922 UART: [art] Extend RT PCRs Done
4,258,350 UART: [art] Lock RT PCRs Done
4,259,787 UART: [art] Populate DV Done
4,267,914 UART: [fht] FMC Alias Private Key: 7
4,268,918 UART: [art] Derive CDI
4,269,198 UART: [art] Store in in slot 0x4
4,355,175 UART: [art] Derive Key Pair
4,355,535 UART: [art] Store priv key in slot 0x5
4,368,891 UART: [art] Derive Key Pair - Done
4,383,461 UART: [art] Signing Cert with AUTHO
4,383,941 UART: RITY.KEYID = 7
4,398,979 UART: [art] Erasing AUTHORITY.KEYID = 7
4,399,744 UART: [art] PUB.X = DB2FEB2738A7AAEBFC17F96627DC0BCD51392A35E1B49EEBEE8E8F7994553B3F0A1EDE5FFB32D4759C70347D207CEF3A
4,406,534 UART: [art] PUB.Y = DB45EEDDEE29120A1008847C23CCE141DF521B0B975608BFC5E6F238032FD989DCCC56D3551B064096A3EC1A91F210C1
4,413,476 UART: [art] SIG.R = A647BE8A8088864BC6B93498283A1CAE0E50585A01E312EAF506476AD3EA8468CA539A0FFFB3793AFBD4B5BC8A0EA2CF
4,420,249 UART: [art] SIG.S = 8F8B0B3406A61D28D6CCC967883F766829CFBCFA66C1FE91E29D22B1DF4B6E3E7BEE168ABF3EAADCC24418EDD2511BA2
4,444,606 UART: Caliptra RT
4,444,951 UART: [state] CFI Enabled
4,725,739 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,159,715 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,253 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,761 UART: [kat] SHA2-256
881,692 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,807 UART: [kat] ++
885,959 UART: [kat] sha1
890,343 UART: [kat] SHA2-256
892,281 UART: [kat] SHA2-384
895,036 UART: [kat] SHA2-512-ACC
896,937 UART: [kat] ECC-384
902,766 UART: [kat] HMAC-384Kdf
907,300 UART: [kat] LMS
1,475,496 UART: [kat] --
1,476,391 UART: [cold-reset] ++
1,476,825 UART: [fht] Storing FHT @ 0x50003400
1,479,558 UART: [idev] ++
1,479,726 UART: [idev] CDI.KEYID = 6
1,480,086 UART: [idev] SUBJECT.KEYID = 7
1,480,510 UART: [idev] UDS.KEYID = 0
1,480,855 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,736 UART: [idev] Erasing UDS.KEYID = 0
1,505,560 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,102 UART: [idev] --
1,515,191 UART: [ldev] ++
1,515,359 UART: [ldev] CDI.KEYID = 6
1,515,722 UART: [ldev] SUBJECT.KEYID = 5
1,516,148 UART: [ldev] AUTHORITY.KEYID = 7
1,516,611 UART: [ldev] FE.KEYID = 1
1,521,633 UART: [ldev] Erasing FE.KEYID = 1
1,547,428 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,022 UART: [ldev] --
1,586,531 UART: [fwproc] Waiting for Commands...
1,587,300 UART: [fwproc] Received command 0x46574c44
1,588,091 UART: [fwproc] Received Image of size 114332 bytes
2,885,461 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,845 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,197 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,942 >>> mbox cmd response: success
3,076,942 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,078,064 UART: [afmc] ++
3,078,232 UART: [afmc] CDI.KEYID = 6
3,078,594 UART: [afmc] SUBJECT.KEYID = 7
3,079,019 UART: [afmc] AUTHORITY.KEYID = 5
3,113,800 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,782 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,562 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,290 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,175 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,865 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,974 UART: [afmc] --
3,156,872 UART: [cold-reset] --
3,157,662 UART: [state] Locking Datavault
3,158,839 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,443 UART: [state] Locking ICCM
3,160,021 UART: [exit] Launching FMC @ 0x40000130
3,165,350 UART:
3,165,366 UART: Running Caliptra FMC ...
3,165,774 UART:
3,165,828 UART: [state] CFI Enabled
3,176,355 UART: [fht] FMC Alias Private Key: 7
3,284,286 UART: [art] Extend RT PCRs Done
3,284,714 UART: [art] Lock RT PCRs Done
3,286,220 UART: [art] Populate DV Done
3,294,399 UART: [fht] FMC Alias Private Key: 7
3,295,537 UART: [art] Derive CDI
3,295,817 UART: [art] Store in in slot 0x4
3,381,640 UART: [art] Derive Key Pair
3,382,000 UART: [art] Store priv key in slot 0x5
3,394,620 UART: [art] Derive Key Pair - Done
3,408,940 UART: [art] Signing Cert with AUTHO
3,409,420 UART: RITY.KEYID = 7
3,424,508 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,273 UART: [art] PUB.X = 03A8E0E3C0C3794A371812CA23B00EC07717D4D329C04C4A17C473AB85379F88F3F13CF00C534F1E9FB5CCFAD1D24E80
3,432,044 UART: [art] PUB.Y = 0A86E36DAD5DBE7A900243C915243FF5F949866DEBEE207D026BC05271E0E6E5627EBD13FD61BDF95A1169410393ABF7
3,438,992 UART: [art] SIG.R = 061C1D3C73D34151C1DC2E2ACA0266DE846DBAD6CDFE0F4DBBD3643A82A5E3914B5304DAB8BCF2A98AA82909AFE591A6
3,445,771 UART: [art] SIG.S = 05DE985DABE902BC4175F92B97FAC77747CCF69D06228644B62F6A1017BAF840B909107F947D9ACAF51DC49391C171CA
3,470,024 UART: Caliptra RT
3,470,277 UART: [state] CFI Enabled
3,577,613 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,694 UART:
3,579,710 UART: Running Caliptra ROM ...
3,580,118 UART:
3,580,172 UART: [state] CFI Enabled
3,582,342 UART: [state] LifecycleState = Unprovisioned
3,582,997 UART: [state] DebugLocked = No
3,583,703 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,585,254 UART: [kat] SHA2-256
4,379,185 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,383,300 UART: [kat] ++
4,383,452 UART: [kat] sha1
4,387,574 UART: [kat] SHA2-256
4,389,512 UART: [kat] SHA2-384
4,392,295 UART: [kat] SHA2-512-ACC
4,394,195 UART: [kat] ECC-384
4,399,560 UART: [kat] HMAC-384Kdf
4,404,178 UART: [kat] LMS
4,972,374 UART: [kat] --
4,973,299 UART: [update-reset] ++
5,010,984 >>> mbox cmd response: failed
5,010,984 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,011,406 UART: ROM Non-Fatal Error: 0x000B001D
5,012,222 UART: [state] Locking Datavault
5,012,940 UART: [state] Locking PCR0, PCR1 and PCR31
5,013,544 UART: [state] Locking ICCM
5,014,064 UART: [exit] Launching FMC @ 0x40000130
5,019,393 UART:
5,019,409 UART: Running Caliptra FMC ...
5,019,817 UART:
5,019,871 UART: [state] CFI Enabled
5,109,042 UART: [art] Extend RT PCRs Done
5,109,470 UART: [art] Lock RT PCRs Done
5,110,557 UART: [art] Populate DV Done
5,118,574 UART: [fht] FMC Alias Private Key: 7
5,119,656 UART: [art] Derive CDI
5,119,936 UART: [art] Store in in slot 0x4
5,205,315 UART: [art] Derive Key Pair
5,205,675 UART: [art] Store priv key in slot 0x5
5,218,605 UART: [art] Derive Key Pair - Done
5,233,295 UART: [art] Signing Cert with AUTHO
5,233,775 UART: RITY.KEYID = 7
5,248,969 UART: [art] Erasing AUTHORITY.KEYID = 7
5,249,734 UART: [art] PUB.X = 03A8E0E3C0C3794A371812CA23B00EC07717D4D329C04C4A17C473AB85379F88F3F13CF00C534F1E9FB5CCFAD1D24E80
5,256,505 UART: [art] PUB.Y = 0A86E36DAD5DBE7A900243C915243FF5F949866DEBEE207D026BC05271E0E6E5627EBD13FD61BDF95A1169410393ABF7
5,263,453 UART: [art] SIG.R = 061C1D3C73D34151C1DC2E2ACA0266DE846DBAD6CDFE0F4DBBD3643A82A5E3914B5304DAB8BCF2A98AA82909AFE591A6
5,270,232 UART: [art] SIG.S = 05DE985DABE902BC4175F92B97FAC77747CCF69D06228644B62F6A1017BAF840B909107F947D9ACAF51DC49391C171CA
5,294,083 UART: Caliptra RT
5,294,336 UART: [state] CFI Enabled
5,578,628 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,580,182 UART:
5,580,198 UART: Running Caliptra ROM ...
5,580,606 UART:
5,580,660 UART: [state] CFI Enabled
5,583,214 UART: [state] LifecycleState = Unprovisioned
5,583,869 UART: [state] DebugLocked = No
5,584,549 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,586,256 UART: [kat] SHA2-256
6,380,187 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,384,302 UART: [kat] ++
6,384,454 UART: [kat] sha1
6,388,666 UART: [kat] SHA2-256
6,390,604 UART: [kat] SHA2-384
6,393,149 UART: [kat] SHA2-512-ACC
6,395,049 UART: [kat] ECC-384
6,400,690 UART: [kat] HMAC-384Kdf
6,405,274 UART: [kat] LMS
6,973,470 UART: [kat] --
6,974,455 UART: [update-reset] ++
8,309,201 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,310,423 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
8,460,299 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,621 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,806 >>> mbox cmd response: success
2,927,806 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,989,758 UART:
2,989,774 UART: Running Caliptra FMC ...
2,990,182 UART:
2,990,236 UART: [state] CFI Enabled
3,000,863 UART: [fht] FMC Alias Private Key: 7
3,108,306 UART: [art] Extend RT PCRs Done
3,108,734 UART: [art] Lock RT PCRs Done
3,110,092 UART: [art] Populate DV Done
3,118,105 UART: [fht] FMC Alias Private Key: 7
3,119,195 UART: [art] Derive CDI
3,119,475 UART: [art] Store in in slot 0x4
3,205,032 UART: [art] Derive Key Pair
3,205,392 UART: [art] Store priv key in slot 0x5
3,218,850 UART: [art] Derive Key Pair - Done
3,233,950 UART: [art] Signing Cert with AUTHO
3,234,430 UART: RITY.KEYID = 7
3,249,582 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,347 UART: [art] PUB.X = 2CBE2C6C2DD5125C07D3AD05E18E5E59109E82214A2A8A274B273617F726683407207001A6D1AF6BCC84602B109B1F12
3,257,103 UART: [art] PUB.Y = 06C8A91421DCF932CEB8964DC8578C3F1213057C154D54E931180C1A40451965919709F21F240D223F36FBA1B6F60862
3,264,025 UART: [art] SIG.R = EF447D4EBA693A3AF4795B355FF39EBA7AB83FCCA28514B02ACC4F59E88485C4AB1D0DE5EA031C240F92A87966B1B2BC
3,270,808 UART: [art] SIG.S = AA7F54ABD864C3FC4E45A2E3399C1787CE3484D3A6DE08FC5A7DE62209E2F93045AF2FC480287DCB58D68B0887373865
3,294,648 UART: Caliptra RT
3,294,901 UART: [state] CFI Enabled
3,403,697 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,721,137 >>> mbox cmd response: failed
4,721,137 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,726,474 UART:
4,726,490 UART: Running Caliptra FMC ...
4,726,898 UART:
4,726,952 UART: [state] CFI Enabled
4,816,819 UART: [art] Extend RT PCRs Done
4,817,247 UART: [art] Lock RT PCRs Done
4,818,512 UART: [art] Populate DV Done
4,826,815 UART: [fht] FMC Alias Private Key: 7
4,827,831 UART: [art] Derive CDI
4,828,111 UART: [art] Store in in slot 0x4
4,913,640 UART: [art] Derive Key Pair
4,914,000 UART: [art] Store priv key in slot 0x5
4,927,380 UART: [art] Derive Key Pair - Done
4,942,204 UART: [art] Signing Cert with AUTHO
4,942,684 UART: RITY.KEYID = 7
4,958,144 UART: [art] Erasing AUTHORITY.KEYID = 7
4,958,909 UART: [art] PUB.X = 2CBE2C6C2DD5125C07D3AD05E18E5E59109E82214A2A8A274B273617F726683407207001A6D1AF6BCC84602B109B1F12
4,965,665 UART: [art] PUB.Y = 06C8A91421DCF932CEB8964DC8578C3F1213057C154D54E931180C1A40451965919709F21F240D223F36FBA1B6F60862
4,972,587 UART: [art] SIG.R = EF447D4EBA693A3AF4795B355FF39EBA7AB83FCCA28514B02ACC4F59E88485C4AB1D0DE5EA031C240F92A87966B1B2BC
4,979,370 UART: [art] SIG.S = AA7F54ABD864C3FC4E45A2E3399C1787CE3484D3A6DE08FC5A7DE62209E2F93045AF2FC480287DCB58D68B0887373865
5,002,860 UART: Caliptra RT
5,003,113 UART: [state] CFI Enabled
5,283,113 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,045,096 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,682 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,316 UART: [kat] SHA2-256
882,247 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,362 UART: [kat] ++
886,514 UART: [kat] sha1
890,702 UART: [kat] SHA2-256
892,640 UART: [kat] SHA2-384
895,563 UART: [kat] SHA2-512-ACC
897,464 UART: [kat] ECC-384
903,361 UART: [kat] HMAC-384Kdf
907,943 UART: [kat] LMS
1,476,139 UART: [kat] --
1,476,938 UART: [cold-reset] ++
1,477,282 UART: [fht] Storing FHT @ 0x50003400
1,480,109 UART: [idev] ++
1,480,277 UART: [idev] CDI.KEYID = 6
1,480,637 UART: [idev] SUBJECT.KEYID = 7
1,481,061 UART: [idev] UDS.KEYID = 0
1,481,406 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,989 UART: [idev] Erasing UDS.KEYID = 0
1,505,477 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,051 UART: [idev] --
1,515,176 UART: [ldev] ++
1,515,344 UART: [ldev] CDI.KEYID = 6
1,515,707 UART: [ldev] SUBJECT.KEYID = 5
1,516,133 UART: [ldev] AUTHORITY.KEYID = 7
1,516,596 UART: [ldev] FE.KEYID = 1
1,521,894 UART: [ldev] Erasing FE.KEYID = 1
1,547,649 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,721 UART: [ldev] --
1,587,200 UART: [fwproc] Waiting for Commands...
1,588,025 UART: [fwproc] Received command 0x46574c44
1,588,816 UART: [fwproc] Received Image of size 114332 bytes
2,886,078 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,214 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,566 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,343 >>> mbox cmd response: success
3,078,343 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,079,551 UART: [afmc] ++
3,079,719 UART: [afmc] CDI.KEYID = 6
3,080,081 UART: [afmc] SUBJECT.KEYID = 7
3,080,506 UART: [afmc] AUTHORITY.KEYID = 5
3,115,765 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,455 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,235 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,963 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,848 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,538 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,365 UART: [afmc] --
3,159,259 UART: [cold-reset] --
3,160,061 UART: [state] Locking Datavault
3,161,216 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,820 UART: [state] Locking ICCM
3,162,464 UART: [exit] Launching FMC @ 0x40000130
3,167,793 UART:
3,167,809 UART: Running Caliptra FMC ...
3,168,217 UART:
3,168,360 UART: [state] CFI Enabled
3,179,051 UART: [fht] FMC Alias Private Key: 7
3,286,880 UART: [art] Extend RT PCRs Done
3,287,308 UART: [art] Lock RT PCRs Done
3,288,868 UART: [art] Populate DV Done
3,297,041 UART: [fht] FMC Alias Private Key: 7
3,298,211 UART: [art] Derive CDI
3,298,491 UART: [art] Store in in slot 0x4
3,384,048 UART: [art] Derive Key Pair
3,384,408 UART: [art] Store priv key in slot 0x5
3,398,084 UART: [art] Derive Key Pair - Done
3,412,785 UART: [art] Signing Cert with AUTHO
3,413,265 UART: RITY.KEYID = 7
3,428,835 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,600 UART: [art] PUB.X = FD3898CB32B2E9A7A8E2D614D9ADC10BA93EE298611F0F0C0F7383EBA8F6235E1CDE5E95F874A1613313CB5F240D4CDA
3,436,373 UART: [art] PUB.Y = 2EDF4B7BCF9F8E685D2C533436F50AD4A7DE4C9F728A439937B5A0395DB128ACD00694943F30ABD4CEF5A26C05689F1D
3,443,328 UART: [art] SIG.R = 56B02AC0E76F6D3526F72EDB041CAD7159358D867C3645E89F8F919699E6F2A9426B593B52BA9A51D8820F8B436D11B4
3,450,092 UART: [art] SIG.S = ABC192A253D955582DD3F06D1FA93E8237D5C3470FEC97C94F0BC7389334A6F1DAD2AAAA77975BCC962589B646103505
3,473,650 UART: Caliptra RT
3,473,995 UART: [state] CFI Enabled
3,582,176 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,193 UART:
3,584,209 UART: Running Caliptra ROM ...
3,584,617 UART:
3,584,758 UART: [state] CFI Enabled
3,587,902 UART: [state] LifecycleState = Unprovisioned
3,588,557 UART: [state] DebugLocked = No
3,589,119 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,590,696 UART: [kat] SHA2-256
4,384,627 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,388,742 UART: [kat] ++
4,388,894 UART: [kat] sha1
4,393,252 UART: [kat] SHA2-256
4,395,190 UART: [kat] SHA2-384
4,398,091 UART: [kat] SHA2-512-ACC
4,399,991 UART: [kat] ECC-384
4,405,622 UART: [kat] HMAC-384Kdf
4,410,220 UART: [kat] LMS
4,978,416 UART: [kat] --
4,979,569 UART: [update-reset] ++
5,017,474 >>> mbox cmd response: failed
5,017,474 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,017,922 UART: ROM Non-Fatal Error: 0x000B001D
5,018,714 UART: [state] Locking Datavault
5,019,448 UART: [state] Locking PCR0, PCR1 and PCR31
5,020,052 UART: [state] Locking ICCM
5,020,688 UART: [exit] Launching FMC @ 0x40000130
5,026,017 UART:
5,026,033 UART: Running Caliptra FMC ...
5,026,441 UART:
5,026,584 UART: [state] CFI Enabled
5,115,715 UART: [art] Extend RT PCRs Done
5,116,143 UART: [art] Lock RT PCRs Done
5,117,418 UART: [art] Populate DV Done
5,125,351 UART: [fht] FMC Alias Private Key: 7
5,126,351 UART: [art] Derive CDI
5,126,631 UART: [art] Store in in slot 0x4
5,212,292 UART: [art] Derive Key Pair
5,212,652 UART: [art] Store priv key in slot 0x5
5,226,210 UART: [art] Derive Key Pair - Done
5,240,427 UART: [art] Signing Cert with AUTHO
5,240,907 UART: RITY.KEYID = 7
5,256,031 UART: [art] Erasing AUTHORITY.KEYID = 7
5,256,796 UART: [art] PUB.X = FD3898CB32B2E9A7A8E2D614D9ADC10BA93EE298611F0F0C0F7383EBA8F6235E1CDE5E95F874A1613313CB5F240D4CDA
5,263,569 UART: [art] PUB.Y = 2EDF4B7BCF9F8E685D2C533436F50AD4A7DE4C9F728A439937B5A0395DB128ACD00694943F30ABD4CEF5A26C05689F1D
5,270,524 UART: [art] SIG.R = 56B02AC0E76F6D3526F72EDB041CAD7159358D867C3645E89F8F919699E6F2A9426B593B52BA9A51D8820F8B436D11B4
5,277,288 UART: [art] SIG.S = ABC192A253D955582DD3F06D1FA93E8237D5C3470FEC97C94F0BC7389334A6F1DAD2AAAA77975BCC962589B646103505
5,300,940 UART: Caliptra RT
5,301,285 UART: [state] CFI Enabled
5,584,822 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,586,624 UART:
5,586,640 UART: Running Caliptra ROM ...
5,587,048 UART:
5,587,189 UART: [state] CFI Enabled
5,589,393 UART: [state] LifecycleState = Unprovisioned
5,590,048 UART: [state] DebugLocked = No
5,590,576 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,592,143 UART: [kat] SHA2-256
6,386,074 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,390,189 UART: [kat] ++
6,390,341 UART: [kat] sha1
6,394,513 UART: [kat] SHA2-256
6,396,451 UART: [kat] SHA2-384
6,399,178 UART: [kat] SHA2-512-ACC
6,401,078 UART: [kat] ECC-384
6,406,683 UART: [kat] HMAC-384Kdf
6,411,239 UART: [kat] LMS
6,979,435 UART: [kat] --
6,980,284 UART: [update-reset] ++
8,314,648 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,315,796 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
8,465,672 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,288 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,797 >>> mbox cmd response: success
2,928,797 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,990,247 UART:
2,990,263 UART: Running Caliptra FMC ...
2,990,671 UART:
2,990,814 UART: [state] CFI Enabled
3,001,389 UART: [fht] FMC Alias Private Key: 7
3,109,464 UART: [art] Extend RT PCRs Done
3,109,892 UART: [art] Lock RT PCRs Done
3,111,148 UART: [art] Populate DV Done
3,119,339 UART: [fht] FMC Alias Private Key: 7
3,120,325 UART: [art] Derive CDI
3,120,605 UART: [art] Store in in slot 0x4
3,205,986 UART: [art] Derive Key Pair
3,206,346 UART: [art] Store priv key in slot 0x5
3,219,590 UART: [art] Derive Key Pair - Done
3,234,497 UART: [art] Signing Cert with AUTHO
3,234,977 UART: RITY.KEYID = 7
3,249,921 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,686 UART: [art] PUB.X = 93F8423CCD9B8C0881C0E53F09EC66F701D295EF1CFF202BF5303722148708D47760CC18F363DE1E201C7E9FD49A4695
3,257,446 UART: [art] PUB.Y = 7E5AE3C4A9A0E3F820A9540697624D1C49195C7EF2E06D747E82E7BB1271D4F409D39A338259E3C0D2C313EEF8A0C585
3,264,394 UART: [art] SIG.R = A7F37D26BB291952DA04AB783A2128D315FA5D87BF4ABF935FF254127B16833E29D13A4284929CD2B3B0F57AFCE2AEF1
3,271,173 UART: [art] SIG.S = 98B70E94B5923C1657930DA26BA8BCFB7AC8AC62AB083ABBD78B5D6042AA977DA704F40A021F0D558CB968D0FE4DD0CC
3,294,691 UART: Caliptra RT
3,295,036 UART: [state] CFI Enabled
3,403,624 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,720,667 >>> mbox cmd response: failed
4,720,667 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,726,802 UART:
4,726,818 UART: Running Caliptra FMC ...
4,727,226 UART:
4,727,369 UART: [state] CFI Enabled
4,816,664 UART: [art] Extend RT PCRs Done
4,817,092 UART: [art] Lock RT PCRs Done
4,818,319 UART: [art] Populate DV Done
4,826,746 UART: [fht] FMC Alias Private Key: 7
4,827,836 UART: [art] Derive CDI
4,828,116 UART: [art] Store in in slot 0x4
4,914,061 UART: [art] Derive Key Pair
4,914,421 UART: [art] Store priv key in slot 0x5
4,927,989 UART: [art] Derive Key Pair - Done
4,942,716 UART: [art] Signing Cert with AUTHO
4,943,196 UART: RITY.KEYID = 7
4,957,992 UART: [art] Erasing AUTHORITY.KEYID = 7
4,958,757 UART: [art] PUB.X = 93F8423CCD9B8C0881C0E53F09EC66F701D295EF1CFF202BF5303722148708D47760CC18F363DE1E201C7E9FD49A4695
4,965,517 UART: [art] PUB.Y = 7E5AE3C4A9A0E3F820A9540697624D1C49195C7EF2E06D747E82E7BB1271D4F409D39A338259E3C0D2C313EEF8A0C585
4,972,465 UART: [art] SIG.R = A7F37D26BB291952DA04AB783A2128D315FA5D87BF4ABF935FF254127B16833E29D13A4284929CD2B3B0F57AFCE2AEF1
4,979,244 UART: [art] SIG.S = 98B70E94B5923C1657930DA26BA8BCFB7AC8AC62AB083ABBD78B5D6042AA977DA704F40A021F0D558CB968D0FE4DD0CC
5,003,130 UART: Caliptra RT
5,003,475 UART: [state] CFI Enabled
5,287,957 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,050,861 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,778 UART: [kat] SHA2-256
893,428 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,553 UART: [kat] ++
897,705 UART: [kat] sha1
902,081 UART: [kat] SHA2-256
904,021 UART: [kat] SHA2-384
906,680 UART: [kat] SHA2-512-ACC
908,581 UART: [kat] ECC-384
918,120 UART: [kat] HMAC-384Kdf
922,616 UART: [kat] LMS
1,170,944 UART: [kat] --
1,171,855 UART: [cold-reset] ++
1,172,315 UART: [fht] FHT @ 0x50003400
1,174,962 UART: [idev] ++
1,175,130 UART: [idev] CDI.KEYID = 6
1,175,490 UART: [idev] SUBJECT.KEYID = 7
1,175,914 UART: [idev] UDS.KEYID = 0
1,176,259 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,858 UART: [idev] Erasing UDS.KEYID = 0
1,200,577 UART: [idev] Sha1 KeyId Algorithm
1,209,107 UART: [idev] --
1,210,319 UART: [ldev] ++
1,210,487 UART: [ldev] CDI.KEYID = 6
1,210,850 UART: [ldev] SUBJECT.KEYID = 5
1,211,276 UART: [ldev] AUTHORITY.KEYID = 7
1,211,739 UART: [ldev] FE.KEYID = 1
1,216,781 UART: [ldev] Erasing FE.KEYID = 1
1,243,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,787 UART: [ldev] --
1,282,100 UART: [fwproc] Wait for Commands...
1,282,910 UART: [fwproc] Recv command 0x46574c44
1,283,638 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,058 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,362 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,169 >>> mbox cmd response: success
2,773,169 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,774,191 UART: [afmc] ++
2,774,359 UART: [afmc] CDI.KEYID = 6
2,774,721 UART: [afmc] SUBJECT.KEYID = 7
2,775,146 UART: [afmc] AUTHORITY.KEYID = 5
2,810,701 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,104 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,852 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,580 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,465 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,184 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,940 UART: [afmc] --
2,853,850 UART: [cold-reset] --
2,854,762 UART: [state] Locking Datavault
2,855,931 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,535 UART: [state] Locking ICCM
2,857,051 UART: [exit] Launching FMC @ 0x40000130
2,862,380 UART:
2,862,396 UART: Running Caliptra FMC ...
2,862,804 UART:
2,862,858 UART: [state] CFI Enabled
2,873,643 UART: [fht] FMC Alias Private Key: 7
2,982,158 UART: [art] Extend RT PCRs Done
2,982,586 UART: [art] Lock RT PCRs Done
2,984,076 UART: [art] Populate DV Done
2,992,163 UART: [fht] FMC Alias Private Key: 7
2,993,309 UART: [art] Derive CDI
2,993,589 UART: [art] Store in in slot 0x4
3,079,180 UART: [art] Derive Key Pair
3,079,540 UART: [art] Store priv key in slot 0x5
3,092,824 UART: [art] Derive Key Pair - Done
3,107,547 UART: [art] Signing Cert with AUTHO
3,108,027 UART: RITY.KEYID = 7
3,123,229 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,994 UART: [art] PUB.X = 204E81F6178DC22132D498622AA891D5267F5D3E1FE5BB5008397AD9BD18155BE96C806D6DA455A7D5C80A94CE033155
3,130,755 UART: [art] PUB.Y = 287FC2C9E2900A995889AE1AC5372A7DC39B4FC3603B6DC761760AE4ECB9EFFB590BDB493AA96D6155AC77CFC0264A72
3,137,712 UART: [art] SIG.R = 892E4B44057727AE7BD6C5397DA1290A6454AF9E0D61F75A9A493762F9D76D02E2124DBF613B9D41912EBA1809C8E36B
3,144,469 UART: [art] SIG.S = 1FA11F836DD4C861EE41BB59FA1704938A201BE33DB4151FEA8E0EF1F2D90FF0B6306A59C72ED91488F30F39D7C326E8
3,168,310 UART: Caliptra RT
3,168,563 UART: [state] CFI Enabled
3,275,776 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,608 UART:
3,277,624 UART: Running Caliptra ROM ...
3,278,032 UART:
3,278,087 UART: [state] CFI Enabled
3,280,681 UART: [state] LifecycleState = Unprovisioned
3,281,336 UART: [state] DebugLocked = No
3,281,956 UART: [state] WD Timer not started. Device not locked for debugging
3,283,090 UART: [kat] SHA2-256
4,088,740 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,092,865 UART: [kat] ++
4,093,017 UART: [kat] sha1
4,097,025 UART: [kat] SHA2-256
4,098,965 UART: [kat] SHA2-384
4,101,726 UART: [kat] SHA2-512-ACC
4,103,626 UART: [kat] ECC-384
4,113,509 UART: [kat] HMAC-384Kdf
4,118,131 UART: [kat] LMS
4,366,459 UART: [kat] --
4,367,451 UART: [update-reset] ++
4,383,024 >>> mbox cmd response: failed
4,383,024 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,383,416 UART: ROM Non-Fatal Error: 0x000B001D
4,384,384 UART: [state] Locking Datavault
4,385,248 UART: [state] Locking PCR0, PCR1 and PCR31
4,385,852 UART: [state] Locking ICCM
4,386,488 UART: [exit] Launching FMC @ 0x40000130
4,391,817 UART:
4,391,833 UART: Running Caliptra FMC ...
4,392,241 UART:
4,392,295 UART: [state] CFI Enabled
4,481,074 UART: [art] Extend RT PCRs Done
4,481,502 UART: [art] Lock RT PCRs Done
4,482,835 UART: [art] Populate DV Done
4,490,856 UART: [fht] FMC Alias Private Key: 7
4,491,826 UART: [art] Derive CDI
4,492,106 UART: [art] Store in in slot 0x4
4,577,513 UART: [art] Derive Key Pair
4,577,873 UART: [art] Store priv key in slot 0x5
4,590,785 UART: [art] Derive Key Pair - Done
4,605,578 UART: [art] Signing Cert with AUTHO
4,606,058 UART: RITY.KEYID = 7
4,621,636 UART: [art] Erasing AUTHORITY.KEYID = 7
4,622,401 UART: [art] PUB.X = 204E81F6178DC22132D498622AA891D5267F5D3E1FE5BB5008397AD9BD18155BE96C806D6DA455A7D5C80A94CE033155
4,629,162 UART: [art] PUB.Y = 287FC2C9E2900A995889AE1AC5372A7DC39B4FC3603B6DC761760AE4ECB9EFFB590BDB493AA96D6155AC77CFC0264A72
4,636,119 UART: [art] SIG.R = 892E4B44057727AE7BD6C5397DA1290A6454AF9E0D61F75A9A493762F9D76D02E2124DBF613B9D41912EBA1809C8E36B
4,642,876 UART: [art] SIG.S = 1FA11F836DD4C861EE41BB59FA1704938A201BE33DB4151FEA8E0EF1F2D90FF0B6306A59C72ED91488F30F39D7C326E8
4,666,249 UART: Caliptra RT
4,666,502 UART: [state] CFI Enabled
4,949,405 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,951,140 UART:
4,951,156 UART: Running Caliptra ROM ...
4,951,564 UART:
4,951,619 UART: [state] CFI Enabled
4,953,847 UART: [state] LifecycleState = Unprovisioned
4,954,502 UART: [state] DebugLocked = No
4,955,152 UART: [state] WD Timer not started. Device not locked for debugging
4,956,454 UART: [kat] SHA2-256
5,762,104 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,766,229 UART: [kat] ++
5,766,381 UART: [kat] sha1
5,770,693 UART: [kat] SHA2-256
5,772,633 UART: [kat] SHA2-384
5,775,340 UART: [kat] SHA2-512-ACC
5,777,240 UART: [kat] ECC-384
5,786,967 UART: [kat] HMAC-384Kdf
5,791,657 UART: [kat] LMS
6,039,985 UART: [kat] --
6,040,869 UART: [update-reset] ++
7,352,997 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,354,126 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,503,950 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,383 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,034 >>> mbox cmd response: success
2,627,034 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,689,676 UART:
2,689,692 UART: Running Caliptra FMC ...
2,690,100 UART:
2,690,154 UART: [state] CFI Enabled
2,700,619 UART: [fht] FMC Alias Private Key: 7
2,808,542 UART: [art] Extend RT PCRs Done
2,808,970 UART: [art] Lock RT PCRs Done
2,810,470 UART: [art] Populate DV Done
2,818,709 UART: [fht] FMC Alias Private Key: 7
2,819,835 UART: [art] Derive CDI
2,820,115 UART: [art] Store in in slot 0x4
2,905,724 UART: [art] Derive Key Pair
2,906,084 UART: [art] Store priv key in slot 0x5
2,919,180 UART: [art] Derive Key Pair - Done
2,933,754 UART: [art] Signing Cert with AUTHO
2,934,234 UART: RITY.KEYID = 7
2,949,466 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,231 UART: [art] PUB.X = BC63293C5FE686DEC3750AF1B0C0D4637BA1A1C040D568E05D74E04469B742A994E3B7B13B43805B789D0F492D1F193D
2,956,999 UART: [art] PUB.Y = EA257DEA3D413BEA14898FF710B4CB6FEDA6BC55029DB396EFE3CA9794F4BD7E55D7F77AAEEF37B2239F806E8A894997
2,963,968 UART: [art] SIG.R = 0A93AF0A4F027A139AC2F19CFC47F5F28F449687C9B98D3DBB27844D4A5ECD5E12D962459F912ADD5ADB46C08AA94658
2,970,743 UART: [art] SIG.S = AC6FFA3208D5AEDD98580E3543502012F1A7933CD1CF45C9D426A3742EAE2F049505ED5587114D6C91040AE9616BF240
2,994,566 UART: Caliptra RT
2,994,819 UART: [state] CFI Enabled
3,102,620 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,095,952 >>> mbox cmd response: failed
4,095,952 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,101,567 UART:
4,101,583 UART: Running Caliptra FMC ...
4,101,991 UART:
4,102,045 UART: [state] CFI Enabled
4,190,934 UART: [art] Extend RT PCRs Done
4,191,362 UART: [art] Lock RT PCRs Done
4,192,709 UART: [art] Populate DV Done
4,200,890 UART: [fht] FMC Alias Private Key: 7
4,202,002 UART: [art] Derive CDI
4,202,282 UART: [art] Store in in slot 0x4
4,287,833 UART: [art] Derive Key Pair
4,288,193 UART: [art] Store priv key in slot 0x5
4,301,327 UART: [art] Derive Key Pair - Done
4,315,973 UART: [art] Signing Cert with AUTHO
4,316,453 UART: RITY.KEYID = 7
4,331,387 UART: [art] Erasing AUTHORITY.KEYID = 7
4,332,152 UART: [art] PUB.X = BC63293C5FE686DEC3750AF1B0C0D4637BA1A1C040D568E05D74E04469B742A994E3B7B13B43805B789D0F492D1F193D
4,338,920 UART: [art] PUB.Y = EA257DEA3D413BEA14898FF710B4CB6FEDA6BC55029DB396EFE3CA9794F4BD7E55D7F77AAEEF37B2239F806E8A894997
4,345,889 UART: [art] SIG.R = 0A93AF0A4F027A139AC2F19CFC47F5F28F449687C9B98D3DBB27844D4A5ECD5E12D962459F912ADD5ADB46C08AA94658
4,352,664 UART: [art] SIG.S = AC6FFA3208D5AEDD98580E3543502012F1A7933CD1CF45C9D426A3742EAE2F049505ED5587114D6C91040AE9616BF240
4,376,271 UART: Caliptra RT
4,376,524 UART: [state] CFI Enabled
4,661,639 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,100,261 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,769 UART: [state] LifecycleState = Unprovisioned
86,424 UART: [state] DebugLocked = No
87,044 UART: [state] WD Timer not started. Device not locked for debugging
88,305 UART: [kat] SHA2-256
893,955 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,080 UART: [kat] ++
898,232 UART: [kat] sha1
902,258 UART: [kat] SHA2-256
904,198 UART: [kat] SHA2-384
907,137 UART: [kat] SHA2-512-ACC
909,038 UART: [kat] ECC-384
918,817 UART: [kat] HMAC-384Kdf
923,605 UART: [kat] LMS
1,171,933 UART: [kat] --
1,172,762 UART: [cold-reset] ++
1,173,128 UART: [fht] FHT @ 0x50003400
1,175,737 UART: [idev] ++
1,175,905 UART: [idev] CDI.KEYID = 6
1,176,265 UART: [idev] SUBJECT.KEYID = 7
1,176,689 UART: [idev] UDS.KEYID = 0
1,177,034 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,813 UART: [idev] Erasing UDS.KEYID = 0
1,201,896 UART: [idev] Sha1 KeyId Algorithm
1,210,530 UART: [idev] --
1,211,646 UART: [ldev] ++
1,211,814 UART: [ldev] CDI.KEYID = 6
1,212,177 UART: [ldev] SUBJECT.KEYID = 5
1,212,603 UART: [ldev] AUTHORITY.KEYID = 7
1,213,066 UART: [ldev] FE.KEYID = 1
1,218,354 UART: [ldev] Erasing FE.KEYID = 1
1,244,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,254 UART: [ldev] --
1,283,583 UART: [fwproc] Wait for Commands...
1,284,223 UART: [fwproc] Recv command 0x46574c44
1,284,951 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,729 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,033 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,788 >>> mbox cmd response: success
2,772,788 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,773,906 UART: [afmc] ++
2,774,074 UART: [afmc] CDI.KEYID = 6
2,774,436 UART: [afmc] SUBJECT.KEYID = 7
2,774,861 UART: [afmc] AUTHORITY.KEYID = 5
2,810,150 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,497 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,245 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,973 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,858 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,577 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,335 UART: [afmc] --
2,853,229 UART: [cold-reset] --
2,854,269 UART: [state] Locking Datavault
2,855,350 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,954 UART: [state] Locking ICCM
2,856,572 UART: [exit] Launching FMC @ 0x40000130
2,861,901 UART:
2,861,917 UART: Running Caliptra FMC ...
2,862,325 UART:
2,862,468 UART: [state] CFI Enabled
2,873,113 UART: [fht] FMC Alias Private Key: 7
2,981,110 UART: [art] Extend RT PCRs Done
2,981,538 UART: [art] Lock RT PCRs Done
2,983,252 UART: [art] Populate DV Done
2,991,665 UART: [fht] FMC Alias Private Key: 7
2,992,711 UART: [art] Derive CDI
2,992,991 UART: [art] Store in in slot 0x4
3,078,788 UART: [art] Derive Key Pair
3,079,148 UART: [art] Store priv key in slot 0x5
3,092,594 UART: [art] Derive Key Pair - Done
3,107,403 UART: [art] Signing Cert with AUTHO
3,107,883 UART: RITY.KEYID = 7
3,123,141 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,906 UART: [art] PUB.X = 7AEAEC96526DE136AD77F2F7308DC30FB64A60925604ADEC742A6D52707DCADF82C647FC9A51AF71BA4146E968148445
3,130,680 UART: [art] PUB.Y = 79006F2B566E4BE17FDF4A589665AB10C3645A19EFDA4A2C552A8466A3BF8B2DF13206B74237F76ABB2E01BD4F9262F3
3,137,612 UART: [art] SIG.R = 56230DBD6DDC09057D4077154478C0624271F9B7013AB82E4071FBB30528902A1146BB507F56C41BF26381A9F3340021
3,144,333 UART: [art] SIG.S = 34D7E92810EEC5D08F2F274A2DB84679D309E2F475656CAF55584E3452282025B1311BBA66384390D355EF0627059876
3,168,235 UART: Caliptra RT
3,168,580 UART: [state] CFI Enabled
3,276,869 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,777 UART:
3,278,793 UART: Running Caliptra ROM ...
3,279,201 UART:
3,279,343 UART: [state] CFI Enabled
3,282,071 UART: [state] LifecycleState = Unprovisioned
3,282,726 UART: [state] DebugLocked = No
3,283,296 UART: [state] WD Timer not started. Device not locked for debugging
3,284,420 UART: [kat] SHA2-256
4,090,070 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,094,195 UART: [kat] ++
4,094,347 UART: [kat] sha1
4,098,523 UART: [kat] SHA2-256
4,100,463 UART: [kat] SHA2-384
4,103,256 UART: [kat] SHA2-512-ACC
4,105,156 UART: [kat] ECC-384
4,115,049 UART: [kat] HMAC-384Kdf
4,119,791 UART: [kat] LMS
4,368,119 UART: [kat] --
4,369,097 UART: [update-reset] ++
4,385,214 >>> mbox cmd response: failed
4,385,214 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,385,670 UART: ROM Non-Fatal Error: 0x000B001D
4,386,472 UART: [state] Locking Datavault
4,387,490 UART: [state] Locking PCR0, PCR1 and PCR31
4,388,094 UART: [state] Locking ICCM
4,388,754 UART: [exit] Launching FMC @ 0x40000130
4,394,083 UART:
4,394,099 UART: Running Caliptra FMC ...
4,394,507 UART:
4,394,650 UART: [state] CFI Enabled
4,483,709 UART: [art] Extend RT PCRs Done
4,484,137 UART: [art] Lock RT PCRs Done
4,485,446 UART: [art] Populate DV Done
4,493,615 UART: [fht] FMC Alias Private Key: 7
4,494,593 UART: [art] Derive CDI
4,494,873 UART: [art] Store in in slot 0x4
4,580,960 UART: [art] Derive Key Pair
4,581,320 UART: [art] Store priv key in slot 0x5
4,594,508 UART: [art] Derive Key Pair - Done
4,609,367 UART: [art] Signing Cert with AUTHO
4,609,847 UART: RITY.KEYID = 7
4,625,209 UART: [art] Erasing AUTHORITY.KEYID = 7
4,625,974 UART: [art] PUB.X = 7AEAEC96526DE136AD77F2F7308DC30FB64A60925604ADEC742A6D52707DCADF82C647FC9A51AF71BA4146E968148445
4,632,748 UART: [art] PUB.Y = 79006F2B566E4BE17FDF4A589665AB10C3645A19EFDA4A2C552A8466A3BF8B2DF13206B74237F76ABB2E01BD4F9262F3
4,639,680 UART: [art] SIG.R = 56230DBD6DDC09057D4077154478C0624271F9B7013AB82E4071FBB30528902A1146BB507F56C41BF26381A9F3340021
4,646,401 UART: [art] SIG.S = 34D7E92810EEC5D08F2F274A2DB84679D309E2F475656CAF55584E3452282025B1311BBA66384390D355EF0627059876
4,670,109 UART: Caliptra RT
4,670,454 UART: [state] CFI Enabled
4,953,633 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,955,204 UART:
4,955,220 UART: Running Caliptra ROM ...
4,955,628 UART:
4,955,770 UART: [state] CFI Enabled
4,958,824 UART: [state] LifecycleState = Unprovisioned
4,959,479 UART: [state] DebugLocked = No
4,960,149 UART: [state] WD Timer not started. Device not locked for debugging
4,961,465 UART: [kat] SHA2-256
5,767,115 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,771,240 UART: [kat] ++
5,771,392 UART: [kat] sha1
5,775,582 UART: [kat] SHA2-256
5,777,522 UART: [kat] SHA2-384
5,780,273 UART: [kat] SHA2-512-ACC
5,782,173 UART: [kat] ECC-384
5,791,694 UART: [kat] HMAC-384Kdf
5,796,222 UART: [kat] LMS
6,044,550 UART: [kat] --
6,045,230 UART: [update-reset] ++
7,358,378 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,359,415 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,509,239 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,570 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,749 >>> mbox cmd response: success
2,627,749 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,689,795 UART:
2,689,811 UART: Running Caliptra FMC ...
2,690,219 UART:
2,690,362 UART: [state] CFI Enabled
2,701,151 UART: [fht] FMC Alias Private Key: 7
2,809,046 UART: [art] Extend RT PCRs Done
2,809,474 UART: [art] Lock RT PCRs Done
2,811,104 UART: [art] Populate DV Done
2,819,459 UART: [fht] FMC Alias Private Key: 7
2,820,573 UART: [art] Derive CDI
2,820,853 UART: [art] Store in in slot 0x4
2,906,666 UART: [art] Derive Key Pair
2,907,026 UART: [art] Store priv key in slot 0x5
2,920,438 UART: [art] Derive Key Pair - Done
2,935,293 UART: [art] Signing Cert with AUTHO
2,935,773 UART: RITY.KEYID = 7
2,951,155 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,920 UART: [art] PUB.X = 9B27010C42F18598B3B8B793AD1E8C513F8F30AC8F12925DB6DB54204DDF038E77648050FA3B4F21BAA188ECF033B4DF
2,958,691 UART: [art] PUB.Y = 5CF8F1C0792C33B878E155BD76EF5708CF84162AEBBC418363417E18821A385477C34159BE6AD090CC8E0C5DDE1A3318
2,965,639 UART: [art] SIG.R = C7417C1F810D3D4F5ABE571A752F4B3FBB3AE4E35C44F2810D8BF327200A17B4AC5991531B97C8F7CB83DEFA83E23E09
2,972,411 UART: [art] SIG.S = FE3E398153454E0C45998E1C4B30A0B02BC9C098A0046B7A88D9D8707E91A35EEBF468BDEBC3A0CA2447F70E84CB6F91
2,996,487 UART: Caliptra RT
2,996,832 UART: [state] CFI Enabled
3,103,930 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,096,621 >>> mbox cmd response: failed
4,096,621 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,102,484 UART:
4,102,500 UART: Running Caliptra FMC ...
4,102,908 UART:
4,103,051 UART: [state] CFI Enabled
4,192,854 UART: [art] Extend RT PCRs Done
4,193,282 UART: [art] Lock RT PCRs Done
4,194,707 UART: [art] Populate DV Done
4,203,162 UART: [fht] FMC Alias Private Key: 7
4,204,122 UART: [art] Derive CDI
4,204,402 UART: [art] Store in in slot 0x4
4,290,233 UART: [art] Derive Key Pair
4,290,593 UART: [art] Store priv key in slot 0x5
4,304,177 UART: [art] Derive Key Pair - Done
4,318,898 UART: [art] Signing Cert with AUTHO
4,319,378 UART: RITY.KEYID = 7
4,334,470 UART: [art] Erasing AUTHORITY.KEYID = 7
4,335,235 UART: [art] PUB.X = 9B27010C42F18598B3B8B793AD1E8C513F8F30AC8F12925DB6DB54204DDF038E77648050FA3B4F21BAA188ECF033B4DF
4,342,006 UART: [art] PUB.Y = 5CF8F1C0792C33B878E155BD76EF5708CF84162AEBBC418363417E18821A385477C34159BE6AD090CC8E0C5DDE1A3318
4,348,954 UART: [art] SIG.R = C7417C1F810D3D4F5ABE571A752F4B3FBB3AE4E35C44F2810D8BF327200A17B4AC5991531B97C8F7CB83DEFA83E23E09
4,355,726 UART: [art] SIG.S = FE3E398153454E0C45998E1C4B30A0B02BC9C098A0046B7A88D9D8707E91A35EEBF468BDEBC3A0CA2447F70E84CB6F91
4,380,118 UART: Caliptra RT
4,380,463 UART: [state] CFI Enabled
4,660,381 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,098,676 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,838 UART: [state] LifecycleState = Unprovisioned
86,493 UART: [state] DebugLocked = No
87,041 UART: [state] WD Timer not started. Device not locked for debugging
88,290 UART: [kat] SHA2-256
891,840 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,969 UART: [kat] ++
896,121 UART: [kat] sha1
900,423 UART: [kat] SHA2-256
902,363 UART: [kat] SHA2-384
905,032 UART: [kat] SHA2-512-ACC
906,933 UART: [kat] ECC-384
916,484 UART: [kat] HMAC-384Kdf
920,866 UART: [kat] LMS
1,169,178 UART: [kat] --
1,170,203 UART: [cold-reset] ++
1,170,585 UART: [fht] FHT @ 0x50003400
1,173,417 UART: [idev] ++
1,173,585 UART: [idev] CDI.KEYID = 6
1,173,946 UART: [idev] SUBJECT.KEYID = 7
1,174,371 UART: [idev] UDS.KEYID = 0
1,174,717 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,407 UART: [idev] Erasing UDS.KEYID = 0
1,199,419 UART: [idev] Sha1 KeyId Algorithm
1,208,275 UART: [idev] --
1,209,290 UART: [ldev] ++
1,209,458 UART: [ldev] CDI.KEYID = 6
1,209,822 UART: [ldev] SUBJECT.KEYID = 5
1,210,249 UART: [ldev] AUTHORITY.KEYID = 7
1,210,712 UART: [ldev] FE.KEYID = 1
1,215,886 UART: [ldev] Erasing FE.KEYID = 1
1,242,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,206 UART: [ldev] --
1,281,482 UART: [fwproc] Wait for Commands...
1,282,223 UART: [fwproc] Recv command 0x46574c44
1,282,956 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,188 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,497 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,257 >>> mbox cmd response: success
2,772,257 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,773,300 UART: [afmc] ++
2,773,468 UART: [afmc] CDI.KEYID = 6
2,773,831 UART: [afmc] SUBJECT.KEYID = 7
2,774,257 UART: [afmc] AUTHORITY.KEYID = 5
2,809,996 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,544 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,295 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,024 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,907 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,626 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,493 UART: [afmc] --
2,853,529 UART: [cold-reset] --
2,854,493 UART: [state] Locking Datavault
2,855,990 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,594 UART: [state] Locking ICCM
2,857,228 UART: [exit] Launching FMC @ 0x40000130
2,862,557 UART:
2,862,573 UART: Running Caliptra FMC ...
2,862,981 UART:
2,863,035 UART: [state] CFI Enabled
2,873,366 UART: [fht] FMC Alias Private Key: 7
2,981,701 UART: [art] Extend RT PCRs Done
2,982,129 UART: [art] Lock RT PCRs Done
2,983,899 UART: [art] Populate DV Done
2,992,094 UART: [fht] FMC Alias Private Key: 7
2,993,058 UART: [art] Derive CDI
2,993,338 UART: [art] Store in in slot 0x4
3,079,091 UART: [art] Derive Key Pair
3,079,451 UART: [art] Store priv key in slot 0x5
3,092,507 UART: [art] Derive Key Pair - Done
3,107,552 UART: [art] Signing Cert with AUTHO
3,108,032 UART: RITY.KEYID = 7
3,123,502 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,267 UART: [art] PUB.X = DBA728DDEF2053E40711074D8216DB5EB07E93DE3700CF60EB086B2429C75E05B28F62EC303049D4FB7AA17AD8256B20
3,131,011 UART: [art] PUB.Y = EB680B773465C53861AF79F0421C3632F44D8F444F42EF5578A9D34E8C0510E9B870B72ABAB13198718F07A8F0F810D5
3,137,950 UART: [art] SIG.R = 107C57D5B88D034DC41A78A46F1993EB194B84018ABC114A180409767B9EFAB2C597EE4798EA8C7165B2C1DD88D822E9
3,144,712 UART: [art] SIG.S = 354C032DF53F957F8B2D0880E60B98120A051BFE26910237A718D64DBF344DC41D7921147BF070754530637B7D9C8658
3,168,427 UART: Caliptra RT
3,168,680 UART: [state] CFI Enabled
3,276,591 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,545 UART:
3,278,561 UART: Running Caliptra ROM ...
3,278,969 UART:
3,279,024 UART: [state] CFI Enabled
3,281,122 UART: [state] LifecycleState = Unprovisioned
3,281,777 UART: [state] DebugLocked = No
3,282,407 UART: [state] WD Timer not started. Device not locked for debugging
3,283,715 UART: [kat] SHA2-256
4,087,265 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,394 UART: [kat] ++
4,091,546 UART: [kat] sha1
4,095,752 UART: [kat] SHA2-256
4,097,692 UART: [kat] SHA2-384
4,100,375 UART: [kat] SHA2-512-ACC
4,102,275 UART: [kat] ECC-384
4,112,054 UART: [kat] HMAC-384Kdf
4,116,410 UART: [kat] LMS
4,364,722 UART: [kat] --
4,365,654 UART: [update-reset] ++
4,380,879 >>> mbox cmd response: failed
4,380,879 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,381,257 UART: ROM Non-Fatal Error: 0x000B001D
4,382,125 UART: [state] Locking Datavault
4,382,875 UART: [state] Locking PCR0, PCR1 and PCR31
4,383,479 UART: [state] Locking ICCM
4,384,147 UART: [exit] Launching FMC @ 0x40000130
4,389,476 UART:
4,389,492 UART: Running Caliptra FMC ...
4,389,900 UART:
4,389,954 UART: [state] CFI Enabled
4,478,591 UART: [art] Extend RT PCRs Done
4,479,019 UART: [art] Lock RT PCRs Done
4,480,212 UART: [art] Populate DV Done
4,488,311 UART: [fht] FMC Alias Private Key: 7
4,489,353 UART: [art] Derive CDI
4,489,633 UART: [art] Store in in slot 0x4
4,574,920 UART: [art] Derive Key Pair
4,575,280 UART: [art] Store priv key in slot 0x5
4,588,444 UART: [art] Derive Key Pair - Done
4,602,889 UART: [art] Signing Cert with AUTHO
4,603,369 UART: RITY.KEYID = 7
4,619,063 UART: [art] Erasing AUTHORITY.KEYID = 7
4,619,828 UART: [art] PUB.X = DBA728DDEF2053E40711074D8216DB5EB07E93DE3700CF60EB086B2429C75E05B28F62EC303049D4FB7AA17AD8256B20
4,626,572 UART: [art] PUB.Y = EB680B773465C53861AF79F0421C3632F44D8F444F42EF5578A9D34E8C0510E9B870B72ABAB13198718F07A8F0F810D5
4,633,511 UART: [art] SIG.R = 107C57D5B88D034DC41A78A46F1993EB194B84018ABC114A180409767B9EFAB2C597EE4798EA8C7165B2C1DD88D822E9
4,640,273 UART: [art] SIG.S = 354C032DF53F957F8B2D0880E60B98120A051BFE26910237A718D64DBF344DC41D7921147BF070754530637B7D9C8658
4,663,764 UART: Caliptra RT
4,664,017 UART: [state] CFI Enabled
4,948,320 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,949,827 UART:
4,949,843 UART: Running Caliptra ROM ...
4,950,251 UART:
4,950,306 UART: [state] CFI Enabled
4,952,594 UART: [state] LifecycleState = Unprovisioned
4,953,249 UART: [state] DebugLocked = No
4,953,747 UART: [state] WD Timer not started. Device not locked for debugging
4,954,993 UART: [kat] SHA2-256
5,758,543 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,762,672 UART: [kat] ++
5,762,824 UART: [kat] sha1
5,767,078 UART: [kat] SHA2-256
5,769,018 UART: [kat] SHA2-384
5,771,723 UART: [kat] SHA2-512-ACC
5,773,623 UART: [kat] ECC-384
5,783,236 UART: [kat] HMAC-384Kdf
5,787,734 UART: [kat] LMS
6,036,046 UART: [kat] --
6,036,980 UART: [update-reset] ++
7,349,779 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,350,842 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,500,666 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,872 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,231 >>> mbox cmd response: success
2,622,231 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,684,563 UART:
2,684,579 UART: Running Caliptra FMC ...
2,684,987 UART:
2,685,041 UART: [state] CFI Enabled
2,695,476 UART: [fht] FMC Alias Private Key: 7
2,803,485 UART: [art] Extend RT PCRs Done
2,803,913 UART: [art] Lock RT PCRs Done
2,805,133 UART: [art] Populate DV Done
2,813,440 UART: [fht] FMC Alias Private Key: 7
2,814,378 UART: [art] Derive CDI
2,814,658 UART: [art] Store in in slot 0x4
2,900,171 UART: [art] Derive Key Pair
2,900,531 UART: [art] Store priv key in slot 0x5
2,913,735 UART: [art] Derive Key Pair - Done
2,928,741 UART: [art] Signing Cert with AUTHO
2,929,221 UART: RITY.KEYID = 7
2,944,327 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,092 UART: [art] PUB.X = 76752AC8D35DCE8E0250F95A1EA044D26AB14094F8F683C73F163E0C81C39BA445181F0A0E6CE7A441A11F7DD6DCC8D5
2,951,862 UART: [art] PUB.Y = C8122F06D4249FCCBCAB2E7E3FA09A75A1AC1EF1B97F8D4E5ADC09EA3325E5D1B27E7E1F336E1FD0B327A2F1BF320257
2,958,827 UART: [art] SIG.R = 0D9799F3E4C3AC7C15CB46702BD3D1A4E16A0512657AEB180B80B1470514E0356B5632BD311B1B6A480BC5D71B67F86A
2,965,586 UART: [art] SIG.S = 23F1A2FEFB2CE9A6C1564310382B17D8E55E481A20A4B56C379F3465EDA40192885F41F5EF7F22B7EC94C152DF344E58
2,989,418 UART: Caliptra RT
2,989,671 UART: [state] CFI Enabled
3,097,370 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,085,868 >>> mbox cmd response: failed
4,085,868 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,091,943 UART:
4,091,959 UART: Running Caliptra FMC ...
4,092,367 UART:
4,092,421 UART: [state] CFI Enabled
4,181,824 UART: [art] Extend RT PCRs Done
4,182,252 UART: [art] Lock RT PCRs Done
4,183,489 UART: [art] Populate DV Done
4,191,834 UART: [fht] FMC Alias Private Key: 7
4,192,814 UART: [art] Derive CDI
4,193,094 UART: [art] Store in in slot 0x4
4,278,769 UART: [art] Derive Key Pair
4,279,129 UART: [art] Store priv key in slot 0x5
4,292,461 UART: [art] Derive Key Pair - Done
4,307,375 UART: [art] Signing Cert with AUTHO
4,307,855 UART: RITY.KEYID = 7
4,322,865 UART: [art] Erasing AUTHORITY.KEYID = 7
4,323,630 UART: [art] PUB.X = 76752AC8D35DCE8E0250F95A1EA044D26AB14094F8F683C73F163E0C81C39BA445181F0A0E6CE7A441A11F7DD6DCC8D5
4,330,400 UART: [art] PUB.Y = C8122F06D4249FCCBCAB2E7E3FA09A75A1AC1EF1B97F8D4E5ADC09EA3325E5D1B27E7E1F336E1FD0B327A2F1BF320257
4,337,365 UART: [art] SIG.R = 0D9799F3E4C3AC7C15CB46702BD3D1A4E16A0512657AEB180B80B1470514E0356B5632BD311B1B6A480BC5D71B67F86A
4,344,124 UART: [art] SIG.S = 23F1A2FEFB2CE9A6C1564310382B17D8E55E481A20A4B56C379F3465EDA40192885F41F5EF7F22B7EC94C152DF344E58
4,368,038 UART: Caliptra RT
4,368,291 UART: [state] CFI Enabled
4,646,478 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,081,041 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
891,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,846 UART: [kat] ++
895,998 UART: [kat] sha1
900,298 UART: [kat] SHA2-256
902,238 UART: [kat] SHA2-384
904,993 UART: [kat] SHA2-512-ACC
906,894 UART: [kat] ECC-384
916,191 UART: [kat] HMAC-384Kdf
920,801 UART: [kat] LMS
1,169,113 UART: [kat] --
1,169,858 UART: [cold-reset] ++
1,170,420 UART: [fht] FHT @ 0x50003400
1,173,262 UART: [idev] ++
1,173,430 UART: [idev] CDI.KEYID = 6
1,173,791 UART: [idev] SUBJECT.KEYID = 7
1,174,216 UART: [idev] UDS.KEYID = 0
1,174,562 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,378 UART: [idev] Erasing UDS.KEYID = 0
1,199,978 UART: [idev] Sha1 KeyId Algorithm
1,208,798 UART: [idev] --
1,210,007 UART: [ldev] ++
1,210,175 UART: [ldev] CDI.KEYID = 6
1,210,539 UART: [ldev] SUBJECT.KEYID = 5
1,210,966 UART: [ldev] AUTHORITY.KEYID = 7
1,211,429 UART: [ldev] FE.KEYID = 1
1,216,683 UART: [ldev] Erasing FE.KEYID = 1
1,242,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,337 UART: [ldev] --
1,281,811 UART: [fwproc] Wait for Commands...
1,282,404 UART: [fwproc] Recv command 0x46574c44
1,283,137 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,147 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,456 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,228 >>> mbox cmd response: success
2,772,228 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,773,459 UART: [afmc] ++
2,773,627 UART: [afmc] CDI.KEYID = 6
2,773,990 UART: [afmc] SUBJECT.KEYID = 7
2,774,416 UART: [afmc] AUTHORITY.KEYID = 5
2,809,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,800 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,529 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,412 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,131 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,996 UART: [afmc] --
2,853,010 UART: [cold-reset] --
2,853,888 UART: [state] Locking Datavault
2,855,193 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,797 UART: [state] Locking ICCM
2,856,277 UART: [exit] Launching FMC @ 0x40000130
2,861,606 UART:
2,861,622 UART: Running Caliptra FMC ...
2,862,030 UART:
2,862,173 UART: [state] CFI Enabled
2,873,072 UART: [fht] FMC Alias Private Key: 7
2,981,365 UART: [art] Extend RT PCRs Done
2,981,793 UART: [art] Lock RT PCRs Done
2,983,171 UART: [art] Populate DV Done
2,991,474 UART: [fht] FMC Alias Private Key: 7
2,992,622 UART: [art] Derive CDI
2,992,902 UART: [art] Store in in slot 0x4
3,078,467 UART: [art] Derive Key Pair
3,078,827 UART: [art] Store priv key in slot 0x5
3,091,733 UART: [art] Derive Key Pair - Done
3,106,812 UART: [art] Signing Cert with AUTHO
3,107,292 UART: RITY.KEYID = 7
3,122,786 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,551 UART: [art] PUB.X = AB20FC86D871759C60F35F2DDF8958BD85B9EC8057E2A2BA0F04FADABD642C7E441682C500EBE639AB652FB268A10FC4
3,130,308 UART: [art] PUB.Y = D9F8110B4EDB030C20C54D2AE3434EDE384993D3DC27D5A0BB2C94E5502CC2FA7CAF243408BE482C9BEA3E879C94328C
3,137,262 UART: [art] SIG.R = CD2DB0CED355CB041F60D1C9CEAD6AA81757B684F5F68651928E2B059362B4311C4224CE1691A0137FF3DB59BC20ADDD
3,144,040 UART: [art] SIG.S = E8D0C2A92F67FD496493A82BDD545437E96DC649972E6F8BB7C80E7FDEB5F3FF020C0FD1C4F2E77634E030803ECB99F2
3,168,013 UART: Caliptra RT
3,168,358 UART: [state] CFI Enabled
3,277,700 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,404 UART:
3,279,420 UART: Running Caliptra ROM ...
3,279,828 UART:
3,279,970 UART: [state] CFI Enabled
3,282,936 UART: [state] LifecycleState = Unprovisioned
3,283,591 UART: [state] DebugLocked = No
3,284,211 UART: [state] WD Timer not started. Device not locked for debugging
3,285,407 UART: [kat] SHA2-256
4,088,957 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,093,086 UART: [kat] ++
4,093,238 UART: [kat] sha1
4,097,606 UART: [kat] SHA2-256
4,099,546 UART: [kat] SHA2-384
4,102,091 UART: [kat] SHA2-512-ACC
4,103,991 UART: [kat] ECC-384
4,113,768 UART: [kat] HMAC-384Kdf
4,118,242 UART: [kat] LMS
4,366,554 UART: [kat] --
4,367,312 UART: [update-reset] ++
4,382,813 >>> mbox cmd response: failed
4,382,813 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,383,173 UART: ROM Non-Fatal Error: 0x000B001D
4,383,939 UART: [state] Locking Datavault
4,384,571 UART: [state] Locking PCR0, PCR1 and PCR31
4,385,175 UART: [state] Locking ICCM
4,385,745 UART: [exit] Launching FMC @ 0x40000130
4,391,074 UART:
4,391,090 UART: Running Caliptra FMC ...
4,391,498 UART:
4,391,641 UART: [state] CFI Enabled
4,480,912 UART: [art] Extend RT PCRs Done
4,481,340 UART: [art] Lock RT PCRs Done
4,482,501 UART: [art] Populate DV Done
4,490,582 UART: [fht] FMC Alias Private Key: 7
4,491,732 UART: [art] Derive CDI
4,492,012 UART: [art] Store in in slot 0x4
4,577,603 UART: [art] Derive Key Pair
4,577,963 UART: [art] Store priv key in slot 0x5
4,591,305 UART: [art] Derive Key Pair - Done
4,605,894 UART: [art] Signing Cert with AUTHO
4,606,374 UART: RITY.KEYID = 7
4,621,610 UART: [art] Erasing AUTHORITY.KEYID = 7
4,622,375 UART: [art] PUB.X = AB20FC86D871759C60F35F2DDF8958BD85B9EC8057E2A2BA0F04FADABD642C7E441682C500EBE639AB652FB268A10FC4
4,629,132 UART: [art] PUB.Y = D9F8110B4EDB030C20C54D2AE3434EDE384993D3DC27D5A0BB2C94E5502CC2FA7CAF243408BE482C9BEA3E879C94328C
4,636,086 UART: [art] SIG.R = CD2DB0CED355CB041F60D1C9CEAD6AA81757B684F5F68651928E2B059362B4311C4224CE1691A0137FF3DB59BC20ADDD
4,642,864 UART: [art] SIG.S = E8D0C2A92F67FD496493A82BDD545437E96DC649972E6F8BB7C80E7FDEB5F3FF020C0FD1C4F2E77634E030803ECB99F2
4,666,397 UART: Caliptra RT
4,666,742 UART: [state] CFI Enabled
4,947,116 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,948,723 UART:
4,948,739 UART: Running Caliptra ROM ...
4,949,147 UART:
4,949,289 UART: [state] CFI Enabled
4,951,619 UART: [state] LifecycleState = Unprovisioned
4,952,274 UART: [state] DebugLocked = No
4,952,762 UART: [state] WD Timer not started. Device not locked for debugging
4,954,004 UART: [kat] SHA2-256
5,757,554 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,761,683 UART: [kat] ++
5,761,835 UART: [kat] sha1
5,766,215 UART: [kat] SHA2-256
5,768,155 UART: [kat] SHA2-384
5,770,930 UART: [kat] SHA2-512-ACC
5,772,830 UART: [kat] ECC-384
5,782,601 UART: [kat] HMAC-384Kdf
5,787,161 UART: [kat] LMS
6,035,473 UART: [kat] --
6,036,129 UART: [update-reset] ++
7,348,642 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,349,731 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,499,555 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,949 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,502 >>> mbox cmd response: success
2,622,502 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,683,936 UART:
2,683,952 UART: Running Caliptra FMC ...
2,684,360 UART:
2,684,503 UART: [state] CFI Enabled
2,695,562 UART: [fht] FMC Alias Private Key: 7
2,803,461 UART: [art] Extend RT PCRs Done
2,803,889 UART: [art] Lock RT PCRs Done
2,805,397 UART: [art] Populate DV Done
2,813,346 UART: [fht] FMC Alias Private Key: 7
2,814,354 UART: [art] Derive CDI
2,814,634 UART: [art] Store in in slot 0x4
2,900,323 UART: [art] Derive Key Pair
2,900,683 UART: [art] Store priv key in slot 0x5
2,914,433 UART: [art] Derive Key Pair - Done
2,929,372 UART: [art] Signing Cert with AUTHO
2,929,852 UART: RITY.KEYID = 7
2,945,002 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,767 UART: [art] PUB.X = FFE7DC38CD031E1CD43F2FCEC0F859322FF54FCCAEE29B38914B2A2729D7F77D9903AB990646D26E2CBC3221C581DE3F
2,952,548 UART: [art] PUB.Y = 0EA920C7AEA0D09FBA0C041551457C1A7E87A9712C04003C8C03C7F012F50D71FB281AB56ECB37F1F7216611A5C79F78
2,959,464 UART: [art] SIG.R = 00152AB6087EBD8198DC864D65D2F0FEF6693B627B68F25957C3460BF28C1F763097BD899350B91FFE74380F97B129A2
2,966,201 UART: [art] SIG.S = 30E3880CC67F48EA54DEC86E4277BD168D3921CA99CF44161C701BF734171C324A9683CC8E8D246D5DC3B57ABFC13279
2,989,619 UART: Caliptra RT
2,989,964 UART: [state] CFI Enabled
3,098,317 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,358 >>> mbox cmd response: failed
4,087,358 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,093,521 UART:
4,093,537 UART: Running Caliptra FMC ...
4,093,945 UART:
4,094,088 UART: [state] CFI Enabled
4,183,593 UART: [art] Extend RT PCRs Done
4,184,021 UART: [art] Lock RT PCRs Done
4,185,294 UART: [art] Populate DV Done
4,193,489 UART: [fht] FMC Alias Private Key: 7
4,194,575 UART: [art] Derive CDI
4,194,855 UART: [art] Store in in slot 0x4
4,280,680 UART: [art] Derive Key Pair
4,281,040 UART: [art] Store priv key in slot 0x5
4,294,684 UART: [art] Derive Key Pair - Done
4,309,533 UART: [art] Signing Cert with AUTHO
4,310,013 UART: RITY.KEYID = 7
4,325,081 UART: [art] Erasing AUTHORITY.KEYID = 7
4,325,846 UART: [art] PUB.X = FFE7DC38CD031E1CD43F2FCEC0F859322FF54FCCAEE29B38914B2A2729D7F77D9903AB990646D26E2CBC3221C581DE3F
4,332,627 UART: [art] PUB.Y = 0EA920C7AEA0D09FBA0C041551457C1A7E87A9712C04003C8C03C7F012F50D71FB281AB56ECB37F1F7216611A5C79F78
4,339,543 UART: [art] SIG.R = 00152AB6087EBD8198DC864D65D2F0FEF6693B627B68F25957C3460BF28C1F763097BD899350B91FFE74380F97B129A2
4,346,280 UART: [art] SIG.S = 30E3880CC67F48EA54DEC86E4277BD168D3921CA99CF44161C701BF734171C324A9683CC8E8D246D5DC3B57ABFC13279
4,369,946 UART: Caliptra RT
4,370,291 UART: [state] CFI Enabled
4,653,796 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,088,886 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,495 UART: [state] DebugLocked = No
86,089 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,791 UART: [kat] SHA2-256
881,722 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,837 UART: [kat] ++
885,989 UART: [kat] sha1
890,129 UART: [kat] SHA2-256
892,067 UART: [kat] SHA2-384
894,862 UART: [kat] SHA2-512-ACC
896,763 UART: [kat] ECC-384
902,242 UART: [kat] HMAC-384Kdf
906,860 UART: [kat] LMS
1,475,056 UART: [kat] --
1,475,979 UART: [cold-reset] ++
1,476,527 UART: [fht] Storing FHT @ 0x50003400
1,479,142 UART: [idev] ++
1,479,310 UART: [idev] CDI.KEYID = 6
1,479,670 UART: [idev] SUBJECT.KEYID = 7
1,480,094 UART: [idev] UDS.KEYID = 0
1,480,439 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,278 UART: [idev] Erasing UDS.KEYID = 0
1,505,048 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,778 UART: [idev] --
1,514,771 UART: [ldev] ++
1,514,939 UART: [ldev] CDI.KEYID = 6
1,515,302 UART: [ldev] SUBJECT.KEYID = 5
1,515,728 UART: [ldev] AUTHORITY.KEYID = 7
1,516,191 UART: [ldev] FE.KEYID = 1
1,521,161 UART: [ldev] Erasing FE.KEYID = 1
1,546,330 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,204 UART: [ldev] --
1,585,545 UART: [fwproc] Waiting for Commands...
1,586,236 UART: [fwproc] Received command 0x46574c44
1,587,027 UART: [fwproc] Received Image of size 114332 bytes
2,884,281 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,911,231 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,583 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,354 >>> mbox cmd response: success
3,076,354 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,077,522 UART: [afmc] ++
3,077,690 UART: [afmc] CDI.KEYID = 6
3,078,052 UART: [afmc] SUBJECT.KEYID = 7
3,078,477 UART: [afmc] AUTHORITY.KEYID = 5
3,113,696 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,998 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,778 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
3,136,490 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
3,142,401 UART: [afmc] SIG.R = 07F89FD0ECDBB3D7EFD9B981890D812FB0D31B81A6A69BE8A1AD407305957DE0E81A195F920E881863C1BFA71DF8352D
3,148,108 UART: [afmc] SIG.S = 94426025B535D1C1519D3F89E71C308C34AF8C61C87E43837B52052637B77CEAB3BB567F72C12E0FC1093EDEA36ACC15
3,156,016 UART: [afmc] --
3,157,008 UART: [cold-reset] --
3,158,006 UART: [state] Locking Datavault
3,159,237 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,841 UART: [state] Locking ICCM
3,160,309 UART: [exit] Launching FMC @ 0x40000130
3,165,638 UART:
3,165,654 UART: Running Caliptra FMC ...
3,166,062 UART:
3,166,116 UART: [state] CFI Enabled
3,176,541 UART: [fht] FMC Alias Private Key: 7
3,284,633 UART: [art] Extend RT PCRs Done
3,285,061 UART: [art] Lock RT PCRs Done
3,286,597 UART: [art] Populate DV Done
3,294,912 UART: [fht] FMC Alias Private Key: 7
3,295,978 UART: [art] Derive CDI
3,296,258 UART: [art] Store in in slot 0x4
3,381,631 UART: [art] Derive Key Pair
3,381,991 UART: [art] Store priv key in slot 0x5
3,395,149 UART: [art] Derive Key Pair - Done
3,409,935 UART: [art] Signing Cert with AUTHO
3,410,415 UART: RITY.KEYID = 7
3,425,559 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,324 UART: [art] PUB.X = 9A244E67C47B5178C8BCAF144DE836AA8B9AFA1E9630F10A627B334B13330A9D1E23D6386138462CB94FBA0A997071B3
3,433,089 UART: [art] PUB.Y = 7993227208610DBE5C5461E88FDA93C4A1A300161237611E8CCEB421D290C37A08D9CF73E7C62E378898D33C8BF80CCC
3,440,007 UART: [art] SIG.R = 0551F7FB6208358C82A83C21F072E101A7D56DA441DAD88FA9C4F6ED64B9036928DF00812A980BEBDFF2AC510A82BA6D
3,446,749 UART: [art] SIG.S = A521FA908FBD71F3837A3F75EC824B8D4210F259385BB92BDB9D6FCAAE371E6BDEB58522CAEAAEA77A37D7EADCB800A7
3,470,912 UART: Caliptra RT
3,471,165 UART: [state] CFI Enabled
3,579,298 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,285 UART:
3,581,301 UART: Running Caliptra ROM ...
3,581,709 UART:
3,581,763 UART: [state] CFI Enabled
3,584,301 UART: [state] LifecycleState = Unprovisioned
3,584,956 UART: [state] DebugLocked = No
3,585,584 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,587,075 UART: [kat] SHA2-256
4,381,006 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,385,121 UART: [kat] ++
4,385,273 UART: [kat] sha1
4,389,443 UART: [kat] SHA2-256
4,391,381 UART: [kat] SHA2-384
4,394,024 UART: [kat] SHA2-512-ACC
4,395,924 UART: [kat] ECC-384
4,401,739 UART: [kat] HMAC-384Kdf
4,406,257 UART: [kat] LMS
4,974,453 UART: [kat] --
4,975,474 UART: [update-reset] ++
5,014,519 >>> mbox cmd response: failed
5,014,519 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,015,037 UART: ROM Non-Fatal Error: 0x000B001E
5,015,821 UART: [state] Locking Datavault
5,016,593 UART: [state] Locking PCR0, PCR1 and PCR31
5,017,197 UART: [state] Locking ICCM
5,017,633 UART: [exit] Launching FMC @ 0x40000130
5,022,962 UART:
5,022,978 UART: Running Caliptra FMC ...
5,023,386 UART:
5,023,440 UART: [state] CFI Enabled
5,112,475 UART: [art] Extend RT PCRs Done
5,112,903 UART: [art] Lock RT PCRs Done
5,114,178 UART: [art] Populate DV Done
5,122,357 UART: [fht] FMC Alias Private Key: 7
5,123,393 UART: [art] Derive CDI
5,123,673 UART: [art] Store in in slot 0x4
5,209,066 UART: [art] Derive Key Pair
5,209,426 UART: [art] Store priv key in slot 0x5
5,222,464 UART: [art] Derive Key Pair - Done
5,237,274 UART: [art] Signing Cert with AUTHO
5,237,754 UART: RITY.KEYID = 7
5,252,902 UART: [art] Erasing AUTHORITY.KEYID = 7
5,253,667 UART: [art] PUB.X = 9A244E67C47B5178C8BCAF144DE836AA8B9AFA1E9630F10A627B334B13330A9D1E23D6386138462CB94FBA0A997071B3
5,260,432 UART: [art] PUB.Y = 7993227208610DBE5C5461E88FDA93C4A1A300161237611E8CCEB421D290C37A08D9CF73E7C62E378898D33C8BF80CCC
5,267,350 UART: [art] SIG.R = 0551F7FB6208358C82A83C21F072E101A7D56DA441DAD88FA9C4F6ED64B9036928DF00812A980BEBDFF2AC510A82BA6D
5,274,092 UART: [art] SIG.S = A521FA908FBD71F3837A3F75EC824B8D4210F259385BB92BDB9D6FCAAE371E6BDEB58522CAEAAEA77A37D7EADCB800A7
5,297,939 UART: Caliptra RT
5,298,192 UART: [state] CFI Enabled
5,581,621 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,583,383 UART:
5,583,399 UART: Running Caliptra ROM ...
5,583,807 UART:
5,583,861 UART: [state] CFI Enabled
5,586,717 UART: [state] LifecycleState = Unprovisioned
5,587,372 UART: [state] DebugLocked = No
5,588,060 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,589,601 UART: [kat] SHA2-256
6,383,532 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,387,647 UART: [kat] ++
6,387,799 UART: [kat] sha1
6,392,037 UART: [kat] SHA2-256
6,393,975 UART: [kat] SHA2-384
6,396,776 UART: [kat] SHA2-512-ACC
6,398,676 UART: [kat] ECC-384
6,404,017 UART: [kat] HMAC-384Kdf
6,408,579 UART: [kat] LMS
6,976,775 UART: [kat] --
6,977,890 UART: [update-reset] ++
8,312,668 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,313,710 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
8,463,586 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,119 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,434 >>> mbox cmd response: success
2,928,434 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,989,570 UART:
2,989,586 UART: Running Caliptra FMC ...
2,989,994 UART:
2,990,048 UART: [state] CFI Enabled
3,000,667 UART: [fht] FMC Alias Private Key: 7
3,109,241 UART: [art] Extend RT PCRs Done
3,109,669 UART: [art] Lock RT PCRs Done
3,111,329 UART: [art] Populate DV Done
3,119,692 UART: [fht] FMC Alias Private Key: 7
3,120,820 UART: [art] Derive CDI
3,121,100 UART: [art] Store in in slot 0x4
3,207,147 UART: [art] Derive Key Pair
3,207,507 UART: [art] Store priv key in slot 0x5
3,220,331 UART: [art] Derive Key Pair - Done
3,234,863 UART: [art] Signing Cert with AUTHO
3,235,343 UART: RITY.KEYID = 7
3,250,519 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,284 UART: [art] PUB.X = 9ADE96577942A26EBE511004B3180B32FE96B1D0BDB1B57B3153DDCD06081F43D78585F70350409915D4FC7E67DDEA16
3,258,043 UART: [art] PUB.Y = 30B39E7A837BDFE2EC2098683F51FC9F37933EDB109B6CDDCE601999AA40474E05CD3F9154265376BBE8E36504BF11AB
3,264,997 UART: [art] SIG.R = 81BB626D11F439ACA131DCF781E5A1E5D4F017C670BFE2FCAB2D6DF8B679D47408919E43DA9EF668D93F34F20B2BC31B
3,271,779 UART: [art] SIG.S = F6C6C21B56850559487501F2930708D94A6FF956B1BB04609ED51464526E3554CB42DCCBFA619A16CDE57A4258937BB3
3,295,921 UART: Caliptra RT
3,296,174 UART: [state] CFI Enabled
3,405,138 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,725,306 >>> mbox cmd response: failed
4,725,306 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,730,917 UART:
4,730,933 UART: Running Caliptra FMC ...
4,731,341 UART:
4,731,395 UART: [state] CFI Enabled
4,820,054 UART: [art] Extend RT PCRs Done
4,820,482 UART: [art] Lock RT PCRs Done
4,821,761 UART: [art] Populate DV Done
4,830,222 UART: [fht] FMC Alias Private Key: 7
4,831,404 UART: [art] Derive CDI
4,831,684 UART: [art] Store in in slot 0x4
4,917,357 UART: [art] Derive Key Pair
4,917,717 UART: [art] Store priv key in slot 0x5
4,931,173 UART: [art] Derive Key Pair - Done
4,946,127 UART: [art] Signing Cert with AUTHO
4,946,607 UART: RITY.KEYID = 7
4,961,819 UART: [art] Erasing AUTHORITY.KEYID = 7
4,962,584 UART: [art] PUB.X = 9ADE96577942A26EBE511004B3180B32FE96B1D0BDB1B57B3153DDCD06081F43D78585F70350409915D4FC7E67DDEA16
4,969,343 UART: [art] PUB.Y = 30B39E7A837BDFE2EC2098683F51FC9F37933EDB109B6CDDCE601999AA40474E05CD3F9154265376BBE8E36504BF11AB
4,976,297 UART: [art] SIG.R = 81BB626D11F439ACA131DCF781E5A1E5D4F017C670BFE2FCAB2D6DF8B679D47408919E43DA9EF668D93F34F20B2BC31B
4,983,079 UART: [art] SIG.S = F6C6C21B56850559487501F2930708D94A6FF956B1BB04609ED51464526E3554CB42DCCBFA619A16CDE57A4258937BB3
5,007,081 UART: Caliptra RT
5,007,334 UART: [state] CFI Enabled
5,289,334 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,051,309 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,638 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,122 UART: [kat] SHA2-256
882,053 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,168 UART: [kat] ++
886,320 UART: [kat] sha1
890,536 UART: [kat] SHA2-256
892,474 UART: [kat] SHA2-384
895,387 UART: [kat] SHA2-512-ACC
897,288 UART: [kat] ECC-384
902,955 UART: [kat] HMAC-384Kdf
907,627 UART: [kat] LMS
1,475,823 UART: [kat] --
1,476,446 UART: [cold-reset] ++
1,476,912 UART: [fht] Storing FHT @ 0x50003400
1,479,583 UART: [idev] ++
1,479,751 UART: [idev] CDI.KEYID = 6
1,480,111 UART: [idev] SUBJECT.KEYID = 7
1,480,535 UART: [idev] UDS.KEYID = 0
1,480,880 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,517 UART: [idev] Erasing UDS.KEYID = 0
1,505,577 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,171 UART: [idev] --
1,515,150 UART: [ldev] ++
1,515,318 UART: [ldev] CDI.KEYID = 6
1,515,681 UART: [ldev] SUBJECT.KEYID = 5
1,516,107 UART: [ldev] AUTHORITY.KEYID = 7
1,516,570 UART: [ldev] FE.KEYID = 1
1,521,736 UART: [ldev] Erasing FE.KEYID = 1
1,547,165 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,113 UART: [ldev] --
1,586,594 UART: [fwproc] Waiting for Commands...
1,587,307 UART: [fwproc] Received command 0x46574c44
1,588,098 UART: [fwproc] Received Image of size 114332 bytes
2,884,644 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,912,718 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,070 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,977 >>> mbox cmd response: success
3,077,977 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,079,065 UART: [afmc] ++
3,079,233 UART: [afmc] CDI.KEYID = 6
3,079,595 UART: [afmc] SUBJECT.KEYID = 7
3,080,020 UART: [afmc] AUTHORITY.KEYID = 5
3,115,383 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,575 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,355 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
3,138,067 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
3,143,978 UART: [afmc] SIG.R = 07F89FD0ECDBB3D7EFD9B981890D812FB0D31B81A6A69BE8A1AD407305957DE0E81A195F920E881863C1BFA71DF8352D
3,149,685 UART: [afmc] SIG.S = 94426025B535D1C1519D3F89E71C308C34AF8C61C87E43837B52052637B77CEAB3BB567F72C12E0FC1093EDEA36ACC15
3,157,739 UART: [afmc] --
3,158,795 UART: [cold-reset] --
3,159,643 UART: [state] Locking Datavault
3,160,986 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,590 UART: [state] Locking ICCM
3,162,234 UART: [exit] Launching FMC @ 0x40000130
3,167,563 UART:
3,167,579 UART: Running Caliptra FMC ...
3,167,987 UART:
3,168,130 UART: [state] CFI Enabled
3,178,809 UART: [fht] FMC Alias Private Key: 7
3,286,733 UART: [art] Extend RT PCRs Done
3,287,161 UART: [art] Lock RT PCRs Done
3,288,507 UART: [art] Populate DV Done
3,296,604 UART: [fht] FMC Alias Private Key: 7
3,297,644 UART: [art] Derive CDI
3,297,924 UART: [art] Store in in slot 0x4
3,383,553 UART: [art] Derive Key Pair
3,383,913 UART: [art] Store priv key in slot 0x5
3,397,539 UART: [art] Derive Key Pair - Done
3,412,430 UART: [art] Signing Cert with AUTHO
3,412,910 UART: RITY.KEYID = 7
3,428,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,935 UART: [art] PUB.X = 3EE511C4FA5703990854487D58D59F65758EE05BF2EFE587E28BEE4977C51CCC1C79E1CD749955EDD466ECBF097EA28A
3,435,708 UART: [art] PUB.Y = 3E5FDFDFE35304A67292E7F0FC85E6971BBA23B09CC85EDE976B203CF103AEA017842105B0AC672A35BD535F52004448
3,442,635 UART: [art] SIG.R = B3D624C3EEE6F213E493E313FF2B1CB86B01DC3D3ED3B5920BC484C470D6295B0DD19C5E5612713F94E08B2E8DB51211
3,449,406 UART: [art] SIG.S = D7ED2F4182C3EEDE51A56478C4835510262E585D743E18DC4D25C8418E06C50D0669962D03538B01E699D3F6197CC1BA
3,473,018 UART: Caliptra RT
3,473,363 UART: [state] CFI Enabled
3,582,133 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,096 UART:
3,584,112 UART: Running Caliptra ROM ...
3,584,520 UART:
3,584,661 UART: [state] CFI Enabled
3,587,287 UART: [state] LifecycleState = Unprovisioned
3,587,942 UART: [state] DebugLocked = No
3,588,614 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,590,303 UART: [kat] SHA2-256
4,384,234 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,388,349 UART: [kat] ++
4,388,501 UART: [kat] sha1
4,392,613 UART: [kat] SHA2-256
4,394,551 UART: [kat] SHA2-384
4,397,254 UART: [kat] SHA2-512-ACC
4,399,154 UART: [kat] ECC-384
4,405,141 UART: [kat] HMAC-384Kdf
4,409,763 UART: [kat] LMS
4,977,959 UART: [kat] --
4,978,886 UART: [update-reset] ++
5,018,175 >>> mbox cmd response: failed
5,018,175 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,018,499 UART: ROM Non-Fatal Error: 0x000B001E
5,019,393 UART: [state] Locking Datavault
5,020,137 UART: [state] Locking PCR0, PCR1 and PCR31
5,020,741 UART: [state] Locking ICCM
5,021,363 UART: [exit] Launching FMC @ 0x40000130
5,026,692 UART:
5,026,708 UART: Running Caliptra FMC ...
5,027,116 UART:
5,027,259 UART: [state] CFI Enabled
5,116,700 UART: [art] Extend RT PCRs Done
5,117,128 UART: [art] Lock RT PCRs Done
5,118,165 UART: [art] Populate DV Done
5,126,470 UART: [fht] FMC Alias Private Key: 7
5,127,530 UART: [art] Derive CDI
5,127,810 UART: [art] Store in in slot 0x4
5,213,239 UART: [art] Derive Key Pair
5,213,599 UART: [art] Store priv key in slot 0x5
5,227,143 UART: [art] Derive Key Pair - Done
5,242,200 UART: [art] Signing Cert with AUTHO
5,242,680 UART: RITY.KEYID = 7
5,257,966 UART: [art] Erasing AUTHORITY.KEYID = 7
5,258,731 UART: [art] PUB.X = 3EE511C4FA5703990854487D58D59F65758EE05BF2EFE587E28BEE4977C51CCC1C79E1CD749955EDD466ECBF097EA28A
5,265,504 UART: [art] PUB.Y = 3E5FDFDFE35304A67292E7F0FC85E6971BBA23B09CC85EDE976B203CF103AEA017842105B0AC672A35BD535F52004448
5,272,431 UART: [art] SIG.R = B3D624C3EEE6F213E493E313FF2B1CB86B01DC3D3ED3B5920BC484C470D6295B0DD19C5E5612713F94E08B2E8DB51211
5,279,202 UART: [art] SIG.S = D7ED2F4182C3EEDE51A56478C4835510262E585D743E18DC4D25C8418E06C50D0669962D03538B01E699D3F6197CC1BA
5,303,294 UART: Caliptra RT
5,303,639 UART: [state] CFI Enabled
5,587,043 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,588,569 UART:
5,588,585 UART: Running Caliptra ROM ...
5,588,993 UART:
5,589,134 UART: [state] CFI Enabled
5,591,342 UART: [state] LifecycleState = Unprovisioned
5,591,997 UART: [state] DebugLocked = No
5,592,497 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,593,992 UART: [kat] SHA2-256
6,387,923 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,392,038 UART: [kat] ++
6,392,190 UART: [kat] sha1
6,396,518 UART: [kat] SHA2-256
6,398,456 UART: [kat] SHA2-384
6,401,135 UART: [kat] SHA2-512-ACC
6,403,035 UART: [kat] ECC-384
6,408,638 UART: [kat] HMAC-384Kdf
6,413,230 UART: [kat] LMS
6,981,426 UART: [kat] --
6,982,299 UART: [update-reset] ++
8,317,651 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,318,909 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
8,468,785 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,528 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,009 >>> mbox cmd response: success
2,927,009 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,987,789 UART:
2,987,805 UART: Running Caliptra FMC ...
2,988,213 UART:
2,988,356 UART: [state] CFI Enabled
2,998,961 UART: [fht] FMC Alias Private Key: 7
3,106,553 UART: [art] Extend RT PCRs Done
3,106,981 UART: [art] Lock RT PCRs Done
3,108,637 UART: [art] Populate DV Done
3,116,528 UART: [fht] FMC Alias Private Key: 7
3,117,562 UART: [art] Derive CDI
3,117,842 UART: [art] Store in in slot 0x4
3,203,717 UART: [art] Derive Key Pair
3,204,077 UART: [art] Store priv key in slot 0x5
3,217,337 UART: [art] Derive Key Pair - Done
3,231,899 UART: [art] Signing Cert with AUTHO
3,232,379 UART: RITY.KEYID = 7
3,247,201 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,966 UART: [art] PUB.X = 0025D4AEA32DF1FD8E7973C8F1DBCFF7ADB61113A0132AC32B2465506B0393EE5A2490C954C0FB630EE3AFFB2B38C5AF
3,254,728 UART: [art] PUB.Y = 19335BF6646BECEECB8F264DE350CFA48CAAD294A2DD6B9A80486DB746B5B9427C9C8194F6976A1B6E641937D714FCDB
3,261,694 UART: [art] SIG.R = C378B7FF4DC6B94D4ED115A669283CCE4DFCE1BC482D5292A31950D9D3C620FF3E53D2B81A08DFE41AE9C26DE909B042
3,268,476 UART: [art] SIG.S = 7059E13E6D79C253B81F8CE854D93F115E6496AD827967C1AD9C74424428C8C03DC636CD5074DC0B20FFEB7ADAA40CB4
3,292,725 UART: Caliptra RT
3,293,070 UART: [state] CFI Enabled
3,403,209 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,722,348 >>> mbox cmd response: failed
4,722,348 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,728,227 UART:
4,728,243 UART: Running Caliptra FMC ...
4,728,651 UART:
4,728,794 UART: [state] CFI Enabled
4,818,433 UART: [art] Extend RT PCRs Done
4,818,861 UART: [art] Lock RT PCRs Done
4,820,140 UART: [art] Populate DV Done
4,828,393 UART: [fht] FMC Alias Private Key: 7
4,829,379 UART: [art] Derive CDI
4,829,659 UART: [art] Store in in slot 0x4
4,915,472 UART: [art] Derive Key Pair
4,915,832 UART: [art] Store priv key in slot 0x5
4,929,412 UART: [art] Derive Key Pair - Done
4,944,268 UART: [art] Signing Cert with AUTHO
4,944,748 UART: RITY.KEYID = 7
4,959,694 UART: [art] Erasing AUTHORITY.KEYID = 7
4,960,459 UART: [art] PUB.X = 0025D4AEA32DF1FD8E7973C8F1DBCFF7ADB61113A0132AC32B2465506B0393EE5A2490C954C0FB630EE3AFFB2B38C5AF
4,967,221 UART: [art] PUB.Y = 19335BF6646BECEECB8F264DE350CFA48CAAD294A2DD6B9A80486DB746B5B9427C9C8194F6976A1B6E641937D714FCDB
4,974,187 UART: [art] SIG.R = C378B7FF4DC6B94D4ED115A669283CCE4DFCE1BC482D5292A31950D9D3C620FF3E53D2B81A08DFE41AE9C26DE909B042
4,980,969 UART: [art] SIG.S = 7059E13E6D79C253B81F8CE854D93F115E6496AD827967C1AD9C74424428C8C03DC636CD5074DC0B20FFEB7ADAA40CB4
5,004,460 UART: Caliptra RT
5,004,805 UART: [state] CFI Enabled
5,287,156 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,048,468 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,798 UART: [state] LifecycleState = Unprovisioned
85,453 UART: [state] DebugLocked = No
85,969 UART: [state] WD Timer not started. Device not locked for debugging
87,202 UART: [kat] SHA2-256
892,852 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,977 UART: [kat] ++
897,129 UART: [kat] sha1
901,393 UART: [kat] SHA2-256
903,333 UART: [kat] SHA2-384
906,042 UART: [kat] SHA2-512-ACC
907,943 UART: [kat] ECC-384
917,480 UART: [kat] HMAC-384Kdf
921,954 UART: [kat] LMS
1,170,282 UART: [kat] --
1,171,227 UART: [cold-reset] ++
1,171,697 UART: [fht] FHT @ 0x50003400
1,174,420 UART: [idev] ++
1,174,588 UART: [idev] CDI.KEYID = 6
1,174,948 UART: [idev] SUBJECT.KEYID = 7
1,175,372 UART: [idev] UDS.KEYID = 0
1,175,717 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,358 UART: [idev] Erasing UDS.KEYID = 0
1,200,229 UART: [idev] Sha1 KeyId Algorithm
1,208,537 UART: [idev] --
1,209,537 UART: [ldev] ++
1,209,705 UART: [ldev] CDI.KEYID = 6
1,210,068 UART: [ldev] SUBJECT.KEYID = 5
1,210,494 UART: [ldev] AUTHORITY.KEYID = 7
1,210,957 UART: [ldev] FE.KEYID = 1
1,216,047 UART: [ldev] Erasing FE.KEYID = 1
1,242,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,609 UART: [ldev] --
1,282,090 UART: [fwproc] Wait for Commands...
1,282,766 UART: [fwproc] Recv command 0x46574c44
1,283,494 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,421 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,884 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,188 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,103 >>> mbox cmd response: success
2,773,103 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,774,211 UART: [afmc] ++
2,774,379 UART: [afmc] CDI.KEYID = 6
2,774,741 UART: [afmc] SUBJECT.KEYID = 7
2,775,166 UART: [afmc] AUTHORITY.KEYID = 5
2,810,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,324 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,072 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,784 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,695 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,409 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,149 UART: [afmc] --
2,854,227 UART: [cold-reset] --
2,854,927 UART: [state] Locking Datavault
2,856,140 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,744 UART: [state] Locking ICCM
2,857,394 UART: [exit] Launching FMC @ 0x40000130
2,862,723 UART:
2,862,739 UART: Running Caliptra FMC ...
2,863,147 UART:
2,863,201 UART: [state] CFI Enabled
2,873,868 UART: [fht] FMC Alias Private Key: 7
2,981,138 UART: [art] Extend RT PCRs Done
2,981,566 UART: [art] Lock RT PCRs Done
2,983,428 UART: [art] Populate DV Done
2,991,471 UART: [fht] FMC Alias Private Key: 7
2,992,435 UART: [art] Derive CDI
2,992,715 UART: [art] Store in in slot 0x4
3,078,708 UART: [art] Derive Key Pair
3,079,068 UART: [art] Store priv key in slot 0x5
3,092,144 UART: [art] Derive Key Pair - Done
3,107,232 UART: [art] Signing Cert with AUTHO
3,107,712 UART: RITY.KEYID = 7
3,122,994 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,759 UART: [art] PUB.X = 0B5B96F1002696CD4D6E41859B64D68B7E133587A4F338277E2B8A1E1D5F3D11CC34C2FDAECB1D7CE6287693C56A57E7
3,130,512 UART: [art] PUB.Y = 04D83693885C4C1FE9EC8EF43DD5AA17ED9AAB4AA2EA79411F2818BDBF2BA75E3CF02463B927717AB1C8175742D8028F
3,137,470 UART: [art] SIG.R = A631C2AA70E21DD76BEA96B85B0A988F4F76BDD0448E4012F8977F17C0D69F61991A2AA363057691F33AC1E6D97ECD65
3,144,242 UART: [art] SIG.S = 98AD7AA90739FF9E9F706F35D4528C7E7C6F8696BD8604B1963F856DFE9B50A4647C7D0F3BE8FC2571184DDCF9BFB28D
3,167,460 UART: Caliptra RT
3,167,713 UART: [state] CFI Enabled
3,274,701 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,276,789 UART:
3,276,805 UART: Running Caliptra ROM ...
3,277,213 UART:
3,277,268 UART: [state] CFI Enabled
3,280,012 UART: [state] LifecycleState = Unprovisioned
3,280,667 UART: [state] DebugLocked = No
3,281,173 UART: [state] WD Timer not started. Device not locked for debugging
3,282,389 UART: [kat] SHA2-256
4,088,039 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,092,164 UART: [kat] ++
4,092,316 UART: [kat] sha1
4,096,372 UART: [kat] SHA2-256
4,098,312 UART: [kat] SHA2-384
4,100,999 UART: [kat] SHA2-512-ACC
4,102,899 UART: [kat] ECC-384
4,112,666 UART: [kat] HMAC-384Kdf
4,117,404 UART: [kat] LMS
4,365,732 UART: [kat] --
4,366,796 UART: [update-reset] ++
4,383,691 >>> mbox cmd response: failed
4,383,691 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,384,057 UART: ROM Non-Fatal Error: 0x000B001E
4,384,919 UART: [state] Locking Datavault
4,385,573 UART: [state] Locking PCR0, PCR1 and PCR31
4,386,177 UART: [state] Locking ICCM
4,386,613 UART: [exit] Launching FMC @ 0x40000130
4,391,942 UART:
4,391,958 UART: Running Caliptra FMC ...
4,392,366 UART:
4,392,420 UART: [state] CFI Enabled
4,481,501 UART: [art] Extend RT PCRs Done
4,481,929 UART: [art] Lock RT PCRs Done
4,482,992 UART: [art] Populate DV Done
4,490,895 UART: [fht] FMC Alias Private Key: 7
4,492,063 UART: [art] Derive CDI
4,492,343 UART: [art] Store in in slot 0x4
4,578,022 UART: [art] Derive Key Pair
4,578,382 UART: [art] Store priv key in slot 0x5
4,591,274 UART: [art] Derive Key Pair - Done
4,606,138 UART: [art] Signing Cert with AUTHO
4,606,618 UART: RITY.KEYID = 7
4,622,032 UART: [art] Erasing AUTHORITY.KEYID = 7
4,622,797 UART: [art] PUB.X = 0B5B96F1002696CD4D6E41859B64D68B7E133587A4F338277E2B8A1E1D5F3D11CC34C2FDAECB1D7CE6287693C56A57E7
4,629,550 UART: [art] PUB.Y = 04D83693885C4C1FE9EC8EF43DD5AA17ED9AAB4AA2EA79411F2818BDBF2BA75E3CF02463B927717AB1C8175742D8028F
4,636,508 UART: [art] SIG.R = A631C2AA70E21DD76BEA96B85B0A988F4F76BDD0448E4012F8977F17C0D69F61991A2AA363057691F33AC1E6D97ECD65
4,643,280 UART: [art] SIG.S = 98AD7AA90739FF9E9F706F35D4528C7E7C6F8696BD8604B1963F856DFE9B50A4647C7D0F3BE8FC2571184DDCF9BFB28D
4,666,860 UART: Caliptra RT
4,667,113 UART: [state] CFI Enabled
4,949,345 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,951,116 UART:
4,951,132 UART: Running Caliptra ROM ...
4,951,540 UART:
4,951,595 UART: [state] CFI Enabled
4,953,883 UART: [state] LifecycleState = Unprovisioned
4,954,538 UART: [state] DebugLocked = No
4,955,130 UART: [state] WD Timer not started. Device not locked for debugging
4,956,454 UART: [kat] SHA2-256
5,762,104 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,766,229 UART: [kat] ++
5,766,381 UART: [kat] sha1
5,770,513 UART: [kat] SHA2-256
5,772,453 UART: [kat] SHA2-384
5,775,316 UART: [kat] SHA2-512-ACC
5,777,216 UART: [kat] ECC-384
5,786,625 UART: [kat] HMAC-384Kdf
5,791,459 UART: [kat] LMS
6,039,787 UART: [kat] --
6,040,383 UART: [update-reset] ++
7,352,067 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,353,136 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,502,960 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,453 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,122 >>> mbox cmd response: success
2,626,122 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,688,962 UART:
2,688,978 UART: Running Caliptra FMC ...
2,689,386 UART:
2,689,440 UART: [state] CFI Enabled
2,700,281 UART: [fht] FMC Alias Private Key: 7
2,808,205 UART: [art] Extend RT PCRs Done
2,808,633 UART: [art] Lock RT PCRs Done
2,810,067 UART: [art] Populate DV Done
2,818,238 UART: [fht] FMC Alias Private Key: 7
2,819,244 UART: [art] Derive CDI
2,819,524 UART: [art] Store in in slot 0x4
2,905,177 UART: [art] Derive Key Pair
2,905,537 UART: [art] Store priv key in slot 0x5
2,919,101 UART: [art] Derive Key Pair - Done
2,933,454 UART: [art] Signing Cert with AUTHO
2,933,934 UART: RITY.KEYID = 7
2,948,646 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,411 UART: [art] PUB.X = 60BF6AD6ED5D4F2A209B69331E4C7BF0A27E0510440C81EEC5CE0BF8D770B56E29CD8A162180841BA31FF6F6D2647B85
2,956,184 UART: [art] PUB.Y = 55C3115F0DCC8FB2083959A4DAE484EEFD936EFA9DC9AC9DA356E51EDEF64AB093FD69A2EA1F759DDF0F9ABF2E4B90B3
2,963,157 UART: [art] SIG.R = 47341A5E12944FBA9288B50A58962FA1E748BD9E379AC1C9F2794BEE19829AF97F4D697BDAEDFE9178A6F2DF34C9979F
2,969,936 UART: [art] SIG.S = DAFC469D8D8EC89525F6A6CC0A35522E98750EC5C8C6D87DCA4ECDF5586452BBCE244C6B498F8A090773C35F0F7C1F6D
2,993,918 UART: Caliptra RT
2,994,171 UART: [state] CFI Enabled
3,102,476 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,096,882 >>> mbox cmd response: failed
4,096,882 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,102,613 UART:
4,102,629 UART: Running Caliptra FMC ...
4,103,037 UART:
4,103,091 UART: [state] CFI Enabled
4,192,204 UART: [art] Extend RT PCRs Done
4,192,632 UART: [art] Lock RT PCRs Done
4,193,997 UART: [art] Populate DV Done
4,202,420 UART: [fht] FMC Alias Private Key: 7
4,203,364 UART: [art] Derive CDI
4,203,644 UART: [art] Store in in slot 0x4
4,289,137 UART: [art] Derive Key Pair
4,289,497 UART: [art] Store priv key in slot 0x5
4,302,977 UART: [art] Derive Key Pair - Done
4,317,868 UART: [art] Signing Cert with AUTHO
4,318,348 UART: RITY.KEYID = 7
4,333,472 UART: [art] Erasing AUTHORITY.KEYID = 7
4,334,237 UART: [art] PUB.X = 60BF6AD6ED5D4F2A209B69331E4C7BF0A27E0510440C81EEC5CE0BF8D770B56E29CD8A162180841BA31FF6F6D2647B85
4,341,010 UART: [art] PUB.Y = 55C3115F0DCC8FB2083959A4DAE484EEFD936EFA9DC9AC9DA356E51EDEF64AB093FD69A2EA1F759DDF0F9ABF2E4B90B3
4,347,983 UART: [art] SIG.R = 47341A5E12944FBA9288B50A58962FA1E748BD9E379AC1C9F2794BEE19829AF97F4D697BDAEDFE9178A6F2DF34C9979F
4,354,762 UART: [art] SIG.S = DAFC469D8D8EC89525F6A6CC0A35522E98750EC5C8C6D87DCA4ECDF5586452BBCE244C6B498F8A090773C35F0F7C1F6D
4,379,094 UART: Caliptra RT
4,379,347 UART: [state] CFI Enabled
4,660,900 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,099,420 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,642 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
893,521 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,646 UART: [kat] ++
897,798 UART: [kat] sha1
902,212 UART: [kat] SHA2-256
904,152 UART: [kat] SHA2-384
906,949 UART: [kat] SHA2-512-ACC
908,850 UART: [kat] ECC-384
918,587 UART: [kat] HMAC-384Kdf
923,283 UART: [kat] LMS
1,171,611 UART: [kat] --
1,172,572 UART: [cold-reset] ++
1,172,998 UART: [fht] FHT @ 0x50003400
1,175,687 UART: [idev] ++
1,175,855 UART: [idev] CDI.KEYID = 6
1,176,215 UART: [idev] SUBJECT.KEYID = 7
1,176,639 UART: [idev] UDS.KEYID = 0
1,176,984 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,767 UART: [idev] Erasing UDS.KEYID = 0
1,201,860 UART: [idev] Sha1 KeyId Algorithm
1,210,372 UART: [idev] --
1,211,574 UART: [ldev] ++
1,211,742 UART: [ldev] CDI.KEYID = 6
1,212,105 UART: [ldev] SUBJECT.KEYID = 5
1,212,531 UART: [ldev] AUTHORITY.KEYID = 7
1,212,994 UART: [ldev] FE.KEYID = 1
1,218,160 UART: [ldev] Erasing FE.KEYID = 1
1,245,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,002 UART: [ldev] --
1,284,335 UART: [fwproc] Wait for Commands...
1,284,909 UART: [fwproc] Recv command 0x46574c44
1,285,637 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,633 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,937 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,828 >>> mbox cmd response: success
2,773,828 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,774,974 UART: [afmc] ++
2,775,142 UART: [afmc] CDI.KEYID = 6
2,775,504 UART: [afmc] SUBJECT.KEYID = 7
2,775,929 UART: [afmc] AUTHORITY.KEYID = 5
2,811,472 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,819 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,567 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,279 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,190 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,904 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,946 UART: [afmc] --
2,854,860 UART: [cold-reset] --
2,855,742 UART: [state] Locking Datavault
2,856,915 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,519 UART: [state] Locking ICCM
2,857,965 UART: [exit] Launching FMC @ 0x40000130
2,863,294 UART:
2,863,310 UART: Running Caliptra FMC ...
2,863,718 UART:
2,863,861 UART: [state] CFI Enabled
2,874,094 UART: [fht] FMC Alias Private Key: 7
2,981,688 UART: [art] Extend RT PCRs Done
2,982,116 UART: [art] Lock RT PCRs Done
2,983,682 UART: [art] Populate DV Done
2,991,885 UART: [fht] FMC Alias Private Key: 7
2,992,827 UART: [art] Derive CDI
2,993,107 UART: [art] Store in in slot 0x4
3,078,918 UART: [art] Derive Key Pair
3,079,278 UART: [art] Store priv key in slot 0x5
3,092,840 UART: [art] Derive Key Pair - Done
3,107,566 UART: [art] Signing Cert with AUTHO
3,108,046 UART: RITY.KEYID = 7
3,123,258 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,023 UART: [art] PUB.X = 7C24272991F7EC27406449D722C067614B3AAB44211AE56D4C07F6062F6BD6EDE5752F4C1E93C6ED21E66484879A3537
3,130,783 UART: [art] PUB.Y = 75C89D24FE34BB2D027239F45002FC3E02BB72E66CAE50BB9988A0B50294F3C32D936D3FA94232202BCEAF575F09962E
3,137,724 UART: [art] SIG.R = 3D8B108FC56AE3A63FB9C6A1A7669FFED849377ECBF6EB4C43D8F6B612E60BA39563263C5F56B15D55206FA264AAFB69
3,144,507 UART: [art] SIG.S = 5933FFDBCA7DCE1E63BBC748A8019FB14D01C447C752C8C77211AE46B383DFA4270B98C4BA8F14890A897FBE43A33904
3,168,555 UART: Caliptra RT
3,168,900 UART: [state] CFI Enabled
3,276,101 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,969 UART:
3,277,985 UART: Running Caliptra ROM ...
3,278,393 UART:
3,278,535 UART: [state] CFI Enabled
3,281,971 UART: [state] LifecycleState = Unprovisioned
3,282,626 UART: [state] DebugLocked = No
3,283,110 UART: [state] WD Timer not started. Device not locked for debugging
3,284,282 UART: [kat] SHA2-256
4,089,932 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,094,057 UART: [kat] ++
4,094,209 UART: [kat] sha1
4,098,385 UART: [kat] SHA2-256
4,100,325 UART: [kat] SHA2-384
4,103,154 UART: [kat] SHA2-512-ACC
4,105,054 UART: [kat] ECC-384
4,114,657 UART: [kat] HMAC-384Kdf
4,119,225 UART: [kat] LMS
4,367,553 UART: [kat] --
4,368,301 UART: [update-reset] ++
4,385,040 >>> mbox cmd response: failed
4,385,040 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,385,486 UART: ROM Non-Fatal Error: 0x000B001E
4,386,496 UART: [state] Locking Datavault
4,387,318 UART: [state] Locking PCR0, PCR1 and PCR31
4,387,922 UART: [state] Locking ICCM
4,388,578 UART: [exit] Launching FMC @ 0x40000130
4,393,907 UART:
4,393,923 UART: Running Caliptra FMC ...
4,394,331 UART:
4,394,474 UART: [state] CFI Enabled
4,483,673 UART: [art] Extend RT PCRs Done
4,484,101 UART: [art] Lock RT PCRs Done
4,485,412 UART: [art] Populate DV Done
4,493,849 UART: [fht] FMC Alias Private Key: 7
4,494,863 UART: [art] Derive CDI
4,495,143 UART: [art] Store in in slot 0x4
4,580,978 UART: [art] Derive Key Pair
4,581,338 UART: [art] Store priv key in slot 0x5
4,595,020 UART: [art] Derive Key Pair - Done
4,609,952 UART: [art] Signing Cert with AUTHO
4,610,432 UART: RITY.KEYID = 7
4,625,168 UART: [art] Erasing AUTHORITY.KEYID = 7
4,625,933 UART: [art] PUB.X = 7C24272991F7EC27406449D722C067614B3AAB44211AE56D4C07F6062F6BD6EDE5752F4C1E93C6ED21E66484879A3537
4,632,693 UART: [art] PUB.Y = 75C89D24FE34BB2D027239F45002FC3E02BB72E66CAE50BB9988A0B50294F3C32D936D3FA94232202BCEAF575F09962E
4,639,634 UART: [art] SIG.R = 3D8B108FC56AE3A63FB9C6A1A7669FFED849377ECBF6EB4C43D8F6B612E60BA39563263C5F56B15D55206FA264AAFB69
4,646,417 UART: [art] SIG.S = 5933FFDBCA7DCE1E63BBC748A8019FB14D01C447C752C8C77211AE46B383DFA4270B98C4BA8F14890A897FBE43A33904
4,670,195 UART: Caliptra RT
4,670,540 UART: [state] CFI Enabled
4,954,177 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,955,948 UART:
4,955,964 UART: Running Caliptra ROM ...
4,956,372 UART:
4,956,514 UART: [state] CFI Enabled
4,959,088 UART: [state] LifecycleState = Unprovisioned
4,959,743 UART: [state] DebugLocked = No
4,960,229 UART: [state] WD Timer not started. Device not locked for debugging
4,961,365 UART: [kat] SHA2-256
5,767,015 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,771,140 UART: [kat] ++
5,771,292 UART: [kat] sha1
5,775,616 UART: [kat] SHA2-256
5,777,556 UART: [kat] SHA2-384
5,780,237 UART: [kat] SHA2-512-ACC
5,782,137 UART: [kat] ECC-384
5,792,302 UART: [kat] HMAC-384Kdf
5,796,904 UART: [kat] LMS
6,045,232 UART: [kat] --
6,046,220 UART: [update-reset] ++
7,358,134 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,359,115 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,508,939 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,360 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,251 >>> mbox cmd response: success
2,627,251 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,689,317 UART:
2,689,333 UART: Running Caliptra FMC ...
2,689,741 UART:
2,689,884 UART: [state] CFI Enabled
2,700,179 UART: [fht] FMC Alias Private Key: 7
2,807,991 UART: [art] Extend RT PCRs Done
2,808,419 UART: [art] Lock RT PCRs Done
2,809,801 UART: [art] Populate DV Done
2,818,176 UART: [fht] FMC Alias Private Key: 7
2,819,136 UART: [art] Derive CDI
2,819,416 UART: [art] Store in in slot 0x4
2,905,125 UART: [art] Derive Key Pair
2,905,485 UART: [art] Store priv key in slot 0x5
2,918,335 UART: [art] Derive Key Pair - Done
2,932,967 UART: [art] Signing Cert with AUTHO
2,933,447 UART: RITY.KEYID = 7
2,949,217 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,982 UART: [art] PUB.X = 043EC7A5678D11983086C2BCFD8DA9C5E07CE7D15F999FC436C35CB0D085F14EE46EFE16DDD46BF8F6B15FC27B54C943
2,956,767 UART: [art] PUB.Y = DD2CB5EC037C38D24254E86F039689B761653E501F6F46F1721C84785EC9FF3D14F4837BAA6CBF7014AA367BE23907FA
2,963,714 UART: [art] SIG.R = 79F106248010B4DB75BE771F5D0E235FDCC503EF47357B4835E64866BABC1AF6EC80F8AD60E005236BA9A4B97E06F3B8
2,970,479 UART: [art] SIG.S = 08AF3B46406EAF1342229E025581AF7093102DBE1111A015E43227A111483DEE231B30445E3D77664461EDB9CF778C31
2,994,104 UART: Caliptra RT
2,994,449 UART: [state] CFI Enabled
3,102,600 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,097,349 >>> mbox cmd response: failed
4,097,349 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,103,126 UART:
4,103,142 UART: Running Caliptra FMC ...
4,103,550 UART:
4,103,693 UART: [state] CFI Enabled
4,193,420 UART: [art] Extend RT PCRs Done
4,193,848 UART: [art] Lock RT PCRs Done
4,194,935 UART: [art] Populate DV Done
4,203,348 UART: [fht] FMC Alias Private Key: 7
4,204,514 UART: [art] Derive CDI
4,204,794 UART: [art] Store in in slot 0x4
4,290,325 UART: [art] Derive Key Pair
4,290,685 UART: [art] Store priv key in slot 0x5
4,304,087 UART: [art] Derive Key Pair - Done
4,318,873 UART: [art] Signing Cert with AUTHO
4,319,353 UART: RITY.KEYID = 7
4,334,849 UART: [art] Erasing AUTHORITY.KEYID = 7
4,335,614 UART: [art] PUB.X = 043EC7A5678D11983086C2BCFD8DA9C5E07CE7D15F999FC436C35CB0D085F14EE46EFE16DDD46BF8F6B15FC27B54C943
4,342,399 UART: [art] PUB.Y = DD2CB5EC037C38D24254E86F039689B761653E501F6F46F1721C84785EC9FF3D14F4837BAA6CBF7014AA367BE23907FA
4,349,346 UART: [art] SIG.R = 79F106248010B4DB75BE771F5D0E235FDCC503EF47357B4835E64866BABC1AF6EC80F8AD60E005236BA9A4B97E06F3B8
4,356,111 UART: [art] SIG.S = 08AF3B46406EAF1342229E025581AF7093102DBE1111A015E43227A111483DEE231B30445E3D77664461EDB9CF778C31
4,380,566 UART: Caliptra RT
4,380,911 UART: [state] CFI Enabled
4,665,286 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,102,597 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,739 UART: [state] WD Timer not started. Device not locked for debugging
88,086 UART: [kat] SHA2-256
891,636 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,765 UART: [kat] ++
895,917 UART: [kat] sha1
900,175 UART: [kat] SHA2-256
902,115 UART: [kat] SHA2-384
904,904 UART: [kat] SHA2-512-ACC
906,805 UART: [kat] ECC-384
916,586 UART: [kat] HMAC-384Kdf
921,354 UART: [kat] LMS
1,169,666 UART: [kat] --
1,170,707 UART: [cold-reset] ++
1,171,265 UART: [fht] FHT @ 0x50003400
1,174,071 UART: [idev] ++
1,174,239 UART: [idev] CDI.KEYID = 6
1,174,600 UART: [idev] SUBJECT.KEYID = 7
1,175,025 UART: [idev] UDS.KEYID = 0
1,175,371 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,857 UART: [idev] Erasing UDS.KEYID = 0
1,199,965 UART: [idev] Sha1 KeyId Algorithm
1,208,983 UART: [idev] --
1,210,102 UART: [ldev] ++
1,210,270 UART: [ldev] CDI.KEYID = 6
1,210,634 UART: [ldev] SUBJECT.KEYID = 5
1,211,061 UART: [ldev] AUTHORITY.KEYID = 7
1,211,524 UART: [ldev] FE.KEYID = 1
1,216,684 UART: [ldev] Erasing FE.KEYID = 1
1,242,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,940 UART: [ldev] --
1,282,448 UART: [fwproc] Wait for Commands...
1,283,081 UART: [fwproc] Recv command 0x46574c44
1,283,814 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,610,425 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,734 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,500 >>> mbox cmd response: success
2,775,500 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,776,765 UART: [afmc] ++
2,776,933 UART: [afmc] CDI.KEYID = 6
2,777,296 UART: [afmc] SUBJECT.KEYID = 7
2,777,722 UART: [afmc] AUTHORITY.KEYID = 5
2,813,211 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,825 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,576 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,836,289 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,842,198 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,847,912 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,855,703 UART: [afmc] --
2,856,633 UART: [cold-reset] --
2,857,521 UART: [state] Locking Datavault
2,858,688 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,292 UART: [state] Locking ICCM
2,859,852 UART: [exit] Launching FMC @ 0x40000130
2,865,181 UART:
2,865,197 UART: Running Caliptra FMC ...
2,865,605 UART:
2,865,659 UART: [state] CFI Enabled
2,876,048 UART: [fht] FMC Alias Private Key: 7
2,983,956 UART: [art] Extend RT PCRs Done
2,984,384 UART: [art] Lock RT PCRs Done
2,985,604 UART: [art] Populate DV Done
2,993,743 UART: [fht] FMC Alias Private Key: 7
2,994,891 UART: [art] Derive CDI
2,995,171 UART: [art] Store in in slot 0x4
3,080,862 UART: [art] Derive Key Pair
3,081,222 UART: [art] Store priv key in slot 0x5
3,094,422 UART: [art] Derive Key Pair - Done
3,109,009 UART: [art] Signing Cert with AUTHO
3,109,489 UART: RITY.KEYID = 7
3,124,333 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,098 UART: [art] PUB.X = 89AE42EED491113E8A6CA4056E61D500BAC5991DEB07E697834423245366004AAE7025B9A90FCB4CB557C6E0BD092583
3,131,814 UART: [art] PUB.Y = 2D95436293DE73B655C4FD122EF0DBD1689BF3006526800652B0016EE2C4ED2E7A7B04AE2641D52CCBC08FAB48855078
3,138,737 UART: [art] SIG.R = 78FC204F82479A758327F15693E56BB3A46B84BDFDA618157E313469315BA91738150A81CC0B0069A0FDE6CCF889CF15
3,145,479 UART: [art] SIG.S = 3F7D91FE5685FDCE1D6A6DCCC6F18CEC31866FD64358DE23706D47B93E40721AFFE893244E0CFABE87524039DA28EC36
3,168,901 UART: Caliptra RT
3,169,154 UART: [state] CFI Enabled
3,277,705 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,307 UART:
3,279,323 UART: Running Caliptra ROM ...
3,279,731 UART:
3,279,786 UART: [state] CFI Enabled
3,282,280 UART: [state] LifecycleState = Unprovisioned
3,282,935 UART: [state] DebugLocked = No
3,283,627 UART: [state] WD Timer not started. Device not locked for debugging
3,284,763 UART: [kat] SHA2-256
4,088,313 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,092,442 UART: [kat] ++
4,092,594 UART: [kat] sha1
4,096,776 UART: [kat] SHA2-256
4,098,716 UART: [kat] SHA2-384
4,101,599 UART: [kat] SHA2-512-ACC
4,103,499 UART: [kat] ECC-384
4,113,110 UART: [kat] HMAC-384Kdf
4,117,704 UART: [kat] LMS
4,366,016 UART: [kat] --
4,366,856 UART: [update-reset] ++
4,384,214 >>> mbox cmd response: failed
4,384,214 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,384,690 UART: ROM Non-Fatal Error: 0x000B001E
4,385,602 UART: [state] Locking Datavault
4,386,402 UART: [state] Locking PCR0, PCR1 and PCR31
4,387,006 UART: [state] Locking ICCM
4,387,532 UART: [exit] Launching FMC @ 0x40000130
4,392,861 UART:
4,392,877 UART: Running Caliptra FMC ...
4,393,285 UART:
4,393,339 UART: [state] CFI Enabled
4,481,980 UART: [art] Extend RT PCRs Done
4,482,408 UART: [art] Lock RT PCRs Done
4,483,621 UART: [art] Populate DV Done
4,491,764 UART: [fht] FMC Alias Private Key: 7
4,492,880 UART: [art] Derive CDI
4,493,160 UART: [art] Store in in slot 0x4
4,579,127 UART: [art] Derive Key Pair
4,579,487 UART: [art] Store priv key in slot 0x5
4,592,665 UART: [art] Derive Key Pair - Done
4,607,490 UART: [art] Signing Cert with AUTHO
4,607,970 UART: RITY.KEYID = 7
4,623,332 UART: [art] Erasing AUTHORITY.KEYID = 7
4,624,097 UART: [art] PUB.X = 89AE42EED491113E8A6CA4056E61D500BAC5991DEB07E697834423245366004AAE7025B9A90FCB4CB557C6E0BD092583
4,630,813 UART: [art] PUB.Y = 2D95436293DE73B655C4FD122EF0DBD1689BF3006526800652B0016EE2C4ED2E7A7B04AE2641D52CCBC08FAB48855078
4,637,736 UART: [art] SIG.R = 78FC204F82479A758327F15693E56BB3A46B84BDFDA618157E313469315BA91738150A81CC0B0069A0FDE6CCF889CF15
4,644,478 UART: [art] SIG.S = 3F7D91FE5685FDCE1D6A6DCCC6F18CEC31866FD64358DE23706D47B93E40721AFFE893244E0CFABE87524039DA28EC36
4,668,368 UART: Caliptra RT
4,668,621 UART: [state] CFI Enabled
4,951,150 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,952,603 UART:
4,952,619 UART: Running Caliptra ROM ...
4,953,027 UART:
4,953,082 UART: [state] CFI Enabled
4,955,634 UART: [state] LifecycleState = Unprovisioned
4,956,289 UART: [state] DebugLocked = No
4,956,919 UART: [state] WD Timer not started. Device not locked for debugging
4,958,239 UART: [kat] SHA2-256
5,761,789 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,765,918 UART: [kat] ++
5,766,070 UART: [kat] sha1
5,770,294 UART: [kat] SHA2-256
5,772,234 UART: [kat] SHA2-384
5,775,013 UART: [kat] SHA2-512-ACC
5,776,913 UART: [kat] ECC-384
5,786,834 UART: [kat] HMAC-384Kdf
5,791,476 UART: [kat] LMS
6,039,788 UART: [kat] --
6,040,658 UART: [update-reset] ++
7,353,732 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,354,875 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,504,699 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,058 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,790 >>> mbox cmd response: success
2,621,790 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,684,470 UART:
2,684,486 UART: Running Caliptra FMC ...
2,684,894 UART:
2,684,948 UART: [state] CFI Enabled
2,695,575 UART: [fht] FMC Alias Private Key: 7
2,802,981 UART: [art] Extend RT PCRs Done
2,803,409 UART: [art] Lock RT PCRs Done
2,805,157 UART: [art] Populate DV Done
2,813,296 UART: [fht] FMC Alias Private Key: 7
2,814,302 UART: [art] Derive CDI
2,814,582 UART: [art] Store in in slot 0x4
2,900,075 UART: [art] Derive Key Pair
2,900,435 UART: [art] Store priv key in slot 0x5
2,913,035 UART: [art] Derive Key Pair - Done
2,927,505 UART: [art] Signing Cert with AUTHO
2,927,985 UART: RITY.KEYID = 7
2,943,189 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,954 UART: [art] PUB.X = 252E143907036D240275013E98B5AD56DEB90BC8EA793DA3CE31C14D86566629DB9CCD8571EBF0E101B8417AC534F874
2,950,708 UART: [art] PUB.Y = 5D70D4B0F6D6F7B1D87FDFC01BD23BA7E149406A7B0CD2CCE4769917F9B7562291AF46789D321046CFEA7B221E23A7C5
2,957,667 UART: [art] SIG.R = 4D85FEB6324F2EA6269F78EDCEABEA1CAAC00FC454850BBDA8ED96204589D1ECBC649C1DEF131621C4A917B84500AA0E
2,964,430 UART: [art] SIG.S = 0565F0560EF4E0FE8C909044C95600792C4A1554194F7A78054A2A297AF4D293F450E4E7909CE68F5656E50B015DABF3
2,988,292 UART: Caliptra RT
2,988,545 UART: [state] CFI Enabled
3,096,086 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,085,335 >>> mbox cmd response: failed
4,085,335 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,090,984 UART:
4,091,000 UART: Running Caliptra FMC ...
4,091,408 UART:
4,091,462 UART: [state] CFI Enabled
4,180,023 UART: [art] Extend RT PCRs Done
4,180,451 UART: [art] Lock RT PCRs Done
4,181,732 UART: [art] Populate DV Done
4,189,931 UART: [fht] FMC Alias Private Key: 7
4,190,887 UART: [art] Derive CDI
4,191,167 UART: [art] Store in in slot 0x4
4,276,686 UART: [art] Derive Key Pair
4,277,046 UART: [art] Store priv key in slot 0x5
4,289,872 UART: [art] Derive Key Pair - Done
4,304,728 UART: [art] Signing Cert with AUTHO
4,305,208 UART: RITY.KEYID = 7
4,319,984 UART: [art] Erasing AUTHORITY.KEYID = 7
4,320,749 UART: [art] PUB.X = 252E143907036D240275013E98B5AD56DEB90BC8EA793DA3CE31C14D86566629DB9CCD8571EBF0E101B8417AC534F874
4,327,503 UART: [art] PUB.Y = 5D70D4B0F6D6F7B1D87FDFC01BD23BA7E149406A7B0CD2CCE4769917F9B7562291AF46789D321046CFEA7B221E23A7C5
4,334,462 UART: [art] SIG.R = 4D85FEB6324F2EA6269F78EDCEABEA1CAAC00FC454850BBDA8ED96204589D1ECBC649C1DEF131621C4A917B84500AA0E
4,341,225 UART: [art] SIG.S = 0565F0560EF4E0FE8C909044C95600792C4A1554194F7A78054A2A297AF4D293F450E4E7909CE68F5656E50B015DABF3
4,364,703 UART: Caliptra RT
4,364,956 UART: [state] CFI Enabled
4,645,935 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,079,881 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,385 UART: [state] LifecycleState = Unprovisioned
86,040 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
891,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
900,038 UART: [kat] SHA2-256
901,978 UART: [kat] SHA2-384
904,737 UART: [kat] SHA2-512-ACC
906,638 UART: [kat] ECC-384
916,457 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,296 UART: [cold-reset] ++
1,170,860 UART: [fht] FHT @ 0x50003400
1,173,566 UART: [idev] ++
1,173,734 UART: [idev] CDI.KEYID = 6
1,174,095 UART: [idev] SUBJECT.KEYID = 7
1,174,520 UART: [idev] UDS.KEYID = 0
1,174,866 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,542 UART: [idev] Erasing UDS.KEYID = 0
1,198,856 UART: [idev] Sha1 KeyId Algorithm
1,207,710 UART: [idev] --
1,208,849 UART: [ldev] ++
1,209,017 UART: [ldev] CDI.KEYID = 6
1,209,381 UART: [ldev] SUBJECT.KEYID = 5
1,209,808 UART: [ldev] AUTHORITY.KEYID = 7
1,210,271 UART: [ldev] FE.KEYID = 1
1,215,303 UART: [ldev] Erasing FE.KEYID = 1
1,242,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,167 UART: [ldev] --
1,281,555 UART: [fwproc] Wait for Commands...
1,282,368 UART: [fwproc] Recv command 0x46574c44
1,283,101 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,132 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,441 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,319 >>> mbox cmd response: success
2,773,319 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,774,396 UART: [afmc] ++
2,774,564 UART: [afmc] CDI.KEYID = 6
2,774,927 UART: [afmc] SUBJECT.KEYID = 7
2,775,353 UART: [afmc] AUTHORITY.KEYID = 5
2,811,030 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,450 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,201 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,914 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,823 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,537 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,488 UART: [afmc] --
2,854,432 UART: [cold-reset] --
2,855,296 UART: [state] Locking Datavault
2,856,427 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,031 UART: [state] Locking ICCM
2,857,533 UART: [exit] Launching FMC @ 0x40000130
2,862,862 UART:
2,862,878 UART: Running Caliptra FMC ...
2,863,286 UART:
2,863,429 UART: [state] CFI Enabled
2,873,950 UART: [fht] FMC Alias Private Key: 7
2,981,952 UART: [art] Extend RT PCRs Done
2,982,380 UART: [art] Lock RT PCRs Done
2,983,730 UART: [art] Populate DV Done
2,992,043 UART: [fht] FMC Alias Private Key: 7
2,993,095 UART: [art] Derive CDI
2,993,375 UART: [art] Store in in slot 0x4
3,079,236 UART: [art] Derive Key Pair
3,079,596 UART: [art] Store priv key in slot 0x5
3,092,930 UART: [art] Derive Key Pair - Done
3,107,608 UART: [art] Signing Cert with AUTHO
3,108,088 UART: RITY.KEYID = 7
3,123,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,315 UART: [art] PUB.X = 107FAB96673A8B32FED787FC957C534030A93602246D169BB2EA553C935538D65F00D8C2D54ED013B8B0B57758214ABF
3,131,060 UART: [art] PUB.Y = 7F235B995ECA0324C58676E73FA4553281B8C23722F19EB5FB40FCD9F61A2E8A07B0CF473469EF9BCFE6A2453F006C23
3,137,990 UART: [art] SIG.R = FC6552230815050AFD11D9ABACE643E874E259B7627150813684AF0A111E56427E3DBD284F70D1807E3656FD1DF32B55
3,144,746 UART: [art] SIG.S = 70500F066B57F4953C54390F5A666F9321C1B98E4F4D28C4A5286C219ACF3353C561C216387095F12EAA5AA0A6EA37F2
3,168,252 UART: Caliptra RT
3,168,597 UART: [state] CFI Enabled
3,275,728 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,484 UART:
3,277,500 UART: Running Caliptra ROM ...
3,277,908 UART:
3,278,050 UART: [state] CFI Enabled
3,281,018 UART: [state] LifecycleState = Unprovisioned
3,281,673 UART: [state] DebugLocked = No
3,282,233 UART: [state] WD Timer not started. Device not locked for debugging
3,283,345 UART: [kat] SHA2-256
4,086,895 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,024 UART: [kat] ++
4,091,176 UART: [kat] sha1
4,095,304 UART: [kat] SHA2-256
4,097,244 UART: [kat] SHA2-384
4,100,155 UART: [kat] SHA2-512-ACC
4,102,055 UART: [kat] ECC-384
4,111,870 UART: [kat] HMAC-384Kdf
4,116,418 UART: [kat] LMS
4,364,730 UART: [kat] --
4,365,228 UART: [update-reset] ++
4,381,988 >>> mbox cmd response: failed
4,381,988 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,382,476 UART: ROM Non-Fatal Error: 0x000B001E
4,383,232 UART: [state] Locking Datavault
4,383,866 UART: [state] Locking PCR0, PCR1 and PCR31
4,384,470 UART: [state] Locking ICCM
4,385,096 UART: [exit] Launching FMC @ 0x40000130
4,390,425 UART:
4,390,441 UART: Running Caliptra FMC ...
4,390,849 UART:
4,390,992 UART: [state] CFI Enabled
4,480,183 UART: [art] Extend RT PCRs Done
4,480,611 UART: [art] Lock RT PCRs Done
4,481,716 UART: [art] Populate DV Done
4,489,813 UART: [fht] FMC Alias Private Key: 7
4,490,959 UART: [art] Derive CDI
4,491,239 UART: [art] Store in in slot 0x4
4,576,954 UART: [art] Derive Key Pair
4,577,314 UART: [art] Store priv key in slot 0x5
4,590,414 UART: [art] Derive Key Pair - Done
4,605,188 UART: [art] Signing Cert with AUTHO
4,605,668 UART: RITY.KEYID = 7
4,620,654 UART: [art] Erasing AUTHORITY.KEYID = 7
4,621,419 UART: [art] PUB.X = 107FAB96673A8B32FED787FC957C534030A93602246D169BB2EA553C935538D65F00D8C2D54ED013B8B0B57758214ABF
4,628,164 UART: [art] PUB.Y = 7F235B995ECA0324C58676E73FA4553281B8C23722F19EB5FB40FCD9F61A2E8A07B0CF473469EF9BCFE6A2453F006C23
4,635,094 UART: [art] SIG.R = FC6552230815050AFD11D9ABACE643E874E259B7627150813684AF0A111E56427E3DBD284F70D1807E3656FD1DF32B55
4,641,850 UART: [art] SIG.S = 70500F066B57F4953C54390F5A666F9321C1B98E4F4D28C4A5286C219ACF3353C561C216387095F12EAA5AA0A6EA37F2
4,665,436 UART: Caliptra RT
4,665,781 UART: [state] CFI Enabled
4,947,450 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,949,143 UART:
4,949,159 UART: Running Caliptra ROM ...
4,949,567 UART:
4,949,709 UART: [state] CFI Enabled
4,952,255 UART: [state] LifecycleState = Unprovisioned
4,952,910 UART: [state] DebugLocked = No
4,953,392 UART: [state] WD Timer not started. Device not locked for debugging
4,954,576 UART: [kat] SHA2-256
5,758,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,762,255 UART: [kat] ++
5,762,407 UART: [kat] sha1
5,766,541 UART: [kat] SHA2-256
5,768,481 UART: [kat] SHA2-384
5,771,428 UART: [kat] SHA2-512-ACC
5,773,328 UART: [kat] ECC-384
5,783,359 UART: [kat] HMAC-384Kdf
5,787,965 UART: [kat] LMS
6,036,277 UART: [kat] --
6,037,003 UART: [update-reset] ++
7,348,507 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,349,514 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
7,499,338 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,783 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,369 >>> mbox cmd response: success
2,620,369 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,683,245 UART:
2,683,261 UART: Running Caliptra FMC ...
2,683,669 UART:
2,683,812 UART: [state] CFI Enabled
2,694,607 UART: [fht] FMC Alias Private Key: 7
2,802,829 UART: [art] Extend RT PCRs Done
2,803,257 UART: [art] Lock RT PCRs Done
2,804,691 UART: [art] Populate DV Done
2,812,964 UART: [fht] FMC Alias Private Key: 7
2,813,900 UART: [art] Derive CDI
2,814,180 UART: [art] Store in in slot 0x4
2,900,039 UART: [art] Derive Key Pair
2,900,399 UART: [art] Store priv key in slot 0x5
2,913,717 UART: [art] Derive Key Pair - Done
2,928,464 UART: [art] Signing Cert with AUTHO
2,928,944 UART: RITY.KEYID = 7
2,944,036 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,801 UART: [art] PUB.X = B97FFCF7527A3BA726FC975F777587DBC08EB96169F00428C66A629FD251A5B09F5BAE9B99B5792EF97FE12B684E0D0E
2,951,574 UART: [art] PUB.Y = 7B109296DE9562945BA5120B22170C1277E738B6325FF63E7C3ADEB95B7683F76942EC98F7D50D06FA5917529B0CE7BE
2,958,509 UART: [art] SIG.R = 37BB86F8BA0A0DD9750C698C62A5C533064B3270CF467DB80DE31A7E718D4848EC4BEC60D4115EF9B3D29ED5AEC3C5CA
2,965,282 UART: [art] SIG.S = 0C0C6310B845CFBADF556BCAE8FDAA8615F0419B8F4E1A32300B4E43F75A96A4A54DC9506486005A433D741F86260228
2,989,003 UART: Caliptra RT
2,989,348 UART: [state] CFI Enabled
3,097,459 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,088,373 >>> mbox cmd response: failed
4,088,373 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,094,440 UART:
4,094,456 UART: Running Caliptra FMC ...
4,094,864 UART:
4,095,007 UART: [state] CFI Enabled
4,183,970 UART: [art] Extend RT PCRs Done
4,184,398 UART: [art] Lock RT PCRs Done
4,185,729 UART: [art] Populate DV Done
4,193,946 UART: [fht] FMC Alias Private Key: 7
4,195,120 UART: [art] Derive CDI
4,195,400 UART: [art] Store in in slot 0x4
4,281,037 UART: [art] Derive Key Pair
4,281,397 UART: [art] Store priv key in slot 0x5
4,295,135 UART: [art] Derive Key Pair - Done
4,310,016 UART: [art] Signing Cert with AUTHO
4,310,496 UART: RITY.KEYID = 7
4,325,814 UART: [art] Erasing AUTHORITY.KEYID = 7
4,326,579 UART: [art] PUB.X = B97FFCF7527A3BA726FC975F777587DBC08EB96169F00428C66A629FD251A5B09F5BAE9B99B5792EF97FE12B684E0D0E
4,333,352 UART: [art] PUB.Y = 7B109296DE9562945BA5120B22170C1277E738B6325FF63E7C3ADEB95B7683F76942EC98F7D50D06FA5917529B0CE7BE
4,340,287 UART: [art] SIG.R = 37BB86F8BA0A0DD9750C698C62A5C533064B3270CF467DB80DE31A7E718D4848EC4BEC60D4115EF9B3D29ED5AEC3C5CA
4,347,060 UART: [art] SIG.S = 0C0C6310B845CFBADF556BCAE8FDAA8615F0419B8F4E1A32300B4E43F75A96A4A54DC9506486005A433D741F86260228
4,370,367 UART: Caliptra RT
4,370,712 UART: [state] CFI Enabled
4,650,359 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,085,364 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,235 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,861 UART: [kat] SHA2-256
881,792 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,907 UART: [kat] ++
886,059 UART: [kat] sha1
890,305 UART: [kat] SHA2-256
892,243 UART: [kat] SHA2-384
894,992 UART: [kat] SHA2-512-ACC
896,893 UART: [kat] ECC-384
902,390 UART: [kat] HMAC-384Kdf
906,988 UART: [kat] LMS
1,475,184 UART: [kat] --
1,476,053 UART: [cold-reset] ++
1,476,477 UART: [fht] Storing FHT @ 0x50003400
1,479,232 UART: [idev] ++
1,479,400 UART: [idev] CDI.KEYID = 6
1,479,760 UART: [idev] SUBJECT.KEYID = 7
1,480,184 UART: [idev] UDS.KEYID = 0
1,480,529 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,074 UART: [idev] Erasing UDS.KEYID = 0
1,505,378 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,978 UART: [idev] --
1,514,949 UART: [ldev] ++
1,515,117 UART: [ldev] CDI.KEYID = 6
1,515,480 UART: [ldev] SUBJECT.KEYID = 5
1,515,906 UART: [ldev] AUTHORITY.KEYID = 7
1,516,369 UART: [ldev] FE.KEYID = 1
1,521,477 UART: [ldev] Erasing FE.KEYID = 1
1,546,942 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,052 UART: [ldev] --
1,586,475 UART: [fwproc] Waiting for Commands...
1,587,318 UART: [fwproc] Received command 0x46574c44
1,588,109 UART: [fwproc] Received Image of size 114332 bytes
5,273,302 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,302,056 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,331,408 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,467,355 >>> mbox cmd response: success
5,467,355 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,468,431 UART: [afmc] ++
5,468,599 UART: [afmc] CDI.KEYID = 6
5,468,961 UART: [afmc] SUBJECT.KEYID = 7
5,469,386 UART: [afmc] AUTHORITY.KEYID = 5
5,504,434 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,520,742 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,521,522 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,527,231 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,533,123 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,538,824 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,546,446 UART: [afmc] --
5,547,330 UART: [cold-reset] --
5,548,158 UART: [state] Locking Datavault
5,549,373 UART: [state] Locking PCR0, PCR1 and PCR31
5,549,977 UART: [state] Locking ICCM
5,550,495 UART: [exit] Launching FMC @ 0x40000130
5,555,824 UART:
5,555,840 UART: Running Caliptra FMC ...
5,556,248 UART:
5,556,302 UART: [state] CFI Enabled
5,566,978 UART: [fht] FMC Alias Private Key: 7
5,674,962 UART: [art] Extend RT PCRs Done
5,675,390 UART: [art] Lock RT PCRs Done
5,677,002 UART: [art] Populate DV Done
5,685,410 UART: [fht] FMC Alias Private Key: 7
5,686,442 UART: [art] Derive CDI
5,686,722 UART: [art] Store in in slot 0x4
5,772,357 UART: [art] Derive Key Pair
5,772,717 UART: [art] Store priv key in slot 0x5
5,785,343 UART: [art] Derive Key Pair - Done
5,800,061 UART: [art] Signing Cert with AUTHO
5,800,541 UART: RITY.KEYID = 7
5,815,405 UART: [art] Erasing AUTHORITY.KEYID = 7
5,816,170 UART: [art] PUB.X = 4471AE25A5001353CB4FCA67E2110A0901816C0136B8ACF2A33A651D0BC12F0CB250924F72C7C24FEB6EE14883938A50
5,822,902 UART: [art] PUB.Y = 3CCA8E9FA9D96C6F301C310EAAE8411FBA6EAB921DFD712D86CA2D6CCC02241CCFE542842E7956F77553810F18FB3BFB
5,829,865 UART: [art] SIG.R = BF36E57F16F0BD502EA35F386091848634ED9911CEE5C4862CA4BD38C01B7ADD053A6F482ABD0862D24C44F9E0A7DCF8
5,836,643 UART: [art] SIG.S = AF87126A5F65C61F6A5B05C6D6BAD089B49311BE9D77E2CE8DBC04DF9331558B7B713219352D59615AC98E0BB856EBB4
5,860,673 UART: Caliptra RT
5,860,926 UART: [state] CFI Enabled
5,968,988 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,970,795 UART:
5,970,811 UART: Running Caliptra ROM ...
5,971,219 UART:
5,971,273 UART: [state] CFI Enabled
5,973,855 UART: [state] LifecycleState = Unprovisioned
5,974,510 UART: [state] DebugLocked = No
5,975,100 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,976,807 UART: [kat] SHA2-256
6,770,738 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,774,853 UART: [kat] ++
6,775,005 UART: [kat] sha1
6,779,135 UART: [kat] SHA2-256
6,781,073 UART: [kat] SHA2-384
6,783,842 UART: [kat] SHA2-512-ACC
6,785,742 UART: [kat] ECC-384
6,791,589 UART: [kat] HMAC-384Kdf
6,796,161 UART: [kat] LMS
7,364,357 UART: [kat] --
7,365,196 UART: [update-reset] ++
7,404,613 >>> mbox cmd response: failed
7,404,613 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
7,405,169 UART: ROM Non-Fatal Error: 0x000B003D
7,406,155 UART: [state] Locking Datavault
7,406,753 UART: [state] Locking PCR0, PCR1 and PCR31
7,407,357 UART: [state] Locking ICCM
7,407,837 UART: [exit] Launching FMC @ 0x40000130
7,413,166 UART:
7,413,182 UART: Running Caliptra FMC ...
7,413,590 UART:
7,413,644 UART: [state] CFI Enabled
7,502,977 UART: [art] Extend RT PCRs Done
7,503,405 UART: [art] Lock RT PCRs Done
7,504,464 UART: [art] Populate DV Done
7,512,968 UART: [fht] FMC Alias Private Key: 7
7,513,986 UART: [art] Derive CDI
7,514,266 UART: [art] Store in in slot 0x4
7,600,007 UART: [art] Derive Key Pair
7,600,367 UART: [art] Store priv key in slot 0x5
7,613,371 UART: [art] Derive Key Pair - Done
7,628,181 UART: [art] Signing Cert with AUTHO
7,628,661 UART: RITY.KEYID = 7
7,644,131 UART: [art] Erasing AUTHORITY.KEYID = 7
7,644,896 UART: [art] PUB.X = 4471AE25A5001353CB4FCA67E2110A0901816C0136B8ACF2A33A651D0BC12F0CB250924F72C7C24FEB6EE14883938A50
7,651,628 UART: [art] PUB.Y = 3CCA8E9FA9D96C6F301C310EAAE8411FBA6EAB921DFD712D86CA2D6CCC02241CCFE542842E7956F77553810F18FB3BFB
7,658,591 UART: [art] SIG.R = BF36E57F16F0BD502EA35F386091848634ED9911CEE5C4862CA4BD38C01B7ADD053A6F482ABD0862D24C44F9E0A7DCF8
7,665,369 UART: [art] SIG.S = AF87126A5F65C61F6A5B05C6D6BAD089B49311BE9D77E2CE8DBC04DF9331558B7B713219352D59615AC98E0BB856EBB4
7,689,795 UART: Caliptra RT
7,690,048 UART: [state] CFI Enabled
7,977,910 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,979,548 UART:
7,979,564 UART: Running Caliptra ROM ...
7,979,972 UART:
7,980,026 UART: [state] CFI Enabled
7,982,774 UART: [state] LifecycleState = Unprovisioned
7,983,429 UART: [state] DebugLocked = No
7,983,935 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,985,434 UART: [kat] SHA2-256
8,779,365 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,783,480 UART: [kat] ++
8,783,632 UART: [kat] sha1
8,787,828 UART: [kat] SHA2-256
8,789,766 UART: [kat] SHA2-384
8,792,457 UART: [kat] SHA2-512-ACC
8,794,357 UART: [kat] ECC-384
8,799,564 UART: [kat] HMAC-384Kdf
8,804,234 UART: [kat] LMS
9,372,430 UART: [kat] --
9,373,401 UART: [update-reset] ++
13,094,682 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,095,942 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
13,245,818 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,739 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,277,290 >>> mbox cmd response: success
5,277,290 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,340,049 UART:
5,340,065 UART: Running Caliptra FMC ...
5,340,473 UART:
5,340,527 UART: [state] CFI Enabled
5,351,033 UART: [fht] FMC Alias Private Key: 7
5,459,095 UART: [art] Extend RT PCRs Done
5,459,523 UART: [art] Lock RT PCRs Done
5,460,885 UART: [art] Populate DV Done
5,468,971 UART: [fht] FMC Alias Private Key: 7
5,470,117 UART: [art] Derive CDI
5,470,397 UART: [art] Store in in slot 0x4
5,556,008 UART: [art] Derive Key Pair
5,556,368 UART: [art] Store priv key in slot 0x5
5,569,542 UART: [art] Derive Key Pair - Done
5,584,476 UART: [art] Signing Cert with AUTHO
5,584,956 UART: RITY.KEYID = 7
5,600,110 UART: [art] Erasing AUTHORITY.KEYID = 7
5,600,875 UART: [art] PUB.X = F7EE592C9D1F6F706D8979903329356D675B425AAD8F107ACC5F8640409D44173D024FD7C7F87ACB4A32C3B846F0D1ED
5,607,648 UART: [art] PUB.Y = AB0AA84D71AAF4806C393C14CCB8727D93A15FB53008716D95720E8BB682194B4E49303F599DD2698628ADF1F5B0E0CF
5,614,595 UART: [art] SIG.R = 5165A0389F7869F88A6A5292828696678B9BD9F99E08D968C210545B7FEBA299761E385DAC50478E23A216B8C50241A4
5,621,349 UART: [art] SIG.S = 22F1AD7F32956960338FEABB242087E97239A92D6B63108E3C69A02E31CCB997EDCAF651B4CE6307A12F1A7391810C70
5,645,108 UART: Caliptra RT
5,645,361 UART: [state] CFI Enabled
5,752,895 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,072,411 >>> mbox cmd response: failed
7,072,411 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
7,078,212 UART:
7,078,228 UART: Running Caliptra FMC ...
7,078,636 UART:
7,078,690 UART: [state] CFI Enabled
7,167,791 UART: [art] Extend RT PCRs Done
7,168,219 UART: [art] Lock RT PCRs Done
7,169,490 UART: [art] Populate DV Done
7,177,724 UART: [fht] FMC Alias Private Key: 7
7,178,666 UART: [art] Derive CDI
7,178,946 UART: [art] Store in in slot 0x4
7,264,949 UART: [art] Derive Key Pair
7,265,309 UART: [art] Store priv key in slot 0x5
7,278,949 UART: [art] Derive Key Pair - Done
7,293,949 UART: [art] Signing Cert with AUTHO
7,294,429 UART: RITY.KEYID = 7
7,309,633 UART: [art] Erasing AUTHORITY.KEYID = 7
7,310,398 UART: [art] PUB.X = F7EE592C9D1F6F706D8979903329356D675B425AAD8F107ACC5F8640409D44173D024FD7C7F87ACB4A32C3B846F0D1ED
7,317,171 UART: [art] PUB.Y = AB0AA84D71AAF4806C393C14CCB8727D93A15FB53008716D95720E8BB682194B4E49303F599DD2698628ADF1F5B0E0CF
7,324,118 UART: [art] SIG.R = 5165A0389F7869F88A6A5292828696678B9BD9F99E08D968C210545B7FEBA299761E385DAC50478E23A216B8C50241A4
7,330,872 UART: [art] SIG.S = 22F1AD7F32956960338FEABB242087E97239A92D6B63108E3C69A02E31CCB997EDCAF651B4CE6307A12F1A7391810C70
7,354,445 UART: Caliptra RT
7,354,698 UART: [state] CFI Enabled
7,634,816 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,746,323 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,474 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,992 UART: [kat] SHA2-256
881,923 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,038 UART: [kat] ++
886,190 UART: [kat] sha1
890,474 UART: [kat] SHA2-256
892,412 UART: [kat] SHA2-384
895,233 UART: [kat] SHA2-512-ACC
897,134 UART: [kat] ECC-384
902,873 UART: [kat] HMAC-384Kdf
907,511 UART: [kat] LMS
1,475,707 UART: [kat] --
1,476,540 UART: [cold-reset] ++
1,476,966 UART: [fht] Storing FHT @ 0x50003400
1,479,799 UART: [idev] ++
1,479,967 UART: [idev] CDI.KEYID = 6
1,480,327 UART: [idev] SUBJECT.KEYID = 7
1,480,751 UART: [idev] UDS.KEYID = 0
1,481,096 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,907 UART: [idev] Erasing UDS.KEYID = 0
1,505,175 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,971 UART: [idev] --
1,514,884 UART: [ldev] ++
1,515,052 UART: [ldev] CDI.KEYID = 6
1,515,415 UART: [ldev] SUBJECT.KEYID = 5
1,515,841 UART: [ldev] AUTHORITY.KEYID = 7
1,516,304 UART: [ldev] FE.KEYID = 1
1,521,540 UART: [ldev] Erasing FE.KEYID = 1
1,547,201 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,171 UART: [ldev] --
1,586,602 UART: [fwproc] Waiting for Commands...
1,587,377 UART: [fwproc] Received command 0x46574c44
1,588,168 UART: [fwproc] Received Image of size 114332 bytes
5,008,088 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,035,708 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,065,060 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
5,200,831 >>> mbox cmd response: success
5,200,831 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,201,927 UART: [afmc] ++
5,202,095 UART: [afmc] CDI.KEYID = 6
5,202,457 UART: [afmc] SUBJECT.KEYID = 7
5,202,882 UART: [afmc] AUTHORITY.KEYID = 5
5,237,670 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,254,340 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,255,120 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,260,829 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,266,721 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,272,422 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,280,282 UART: [afmc] --
5,281,322 UART: [cold-reset] --
5,282,260 UART: [state] Locking Datavault
5,283,401 UART: [state] Locking PCR0, PCR1 and PCR31
5,284,005 UART: [state] Locking ICCM
5,284,667 UART: [exit] Launching FMC @ 0x40000130
5,289,996 UART:
5,290,012 UART: Running Caliptra FMC ...
5,290,420 UART:
5,290,563 UART: [state] CFI Enabled
5,301,235 UART: [fht] FMC Alias Private Key: 7
5,408,633 UART: [art] Extend RT PCRs Done
5,409,061 UART: [art] Lock RT PCRs Done
5,410,653 UART: [art] Populate DV Done
5,419,025 UART: [fht] FMC Alias Private Key: 7
5,420,181 UART: [art] Derive CDI
5,420,461 UART: [art] Store in in slot 0x4
5,506,070 UART: [art] Derive Key Pair
5,506,430 UART: [art] Store priv key in slot 0x5
5,519,720 UART: [art] Derive Key Pair - Done
5,534,527 UART: [art] Signing Cert with AUTHO
5,535,007 UART: RITY.KEYID = 7
5,550,637 UART: [art] Erasing AUTHORITY.KEYID = 7
5,551,402 UART: [art] PUB.X = C85911C8488F159831838198D78C6F6175676249A5E642252535502BBADAD1C3CC7C5AEA5D27E682F3B64B2F7B1344F1
5,558,168 UART: [art] PUB.Y = 691C196BF1997764E13618AE88843D06A6F7E640B3F8E9429E77805701B45B0E2B7F14ADF460E713C3CBB862173E2F2A
5,565,107 UART: [art] SIG.R = 51997CC75AC539288368144EE7D7F75D200D469275153A2CF66BBC4E2721F34F83719562870BF74FB103B93984645406
5,571,851 UART: [art] SIG.S = 985ED70E4664408AC6D18C90DFCAA29219026296D214F24C90CC9CB30ADF64850725C218157924FF56A9E34CF0E1321D
5,595,444 UART: Caliptra RT
5,595,789 UART: [state] CFI Enabled
5,704,806 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,707,009 UART:
5,707,025 UART: Running Caliptra ROM ...
5,707,433 UART:
5,707,574 UART: [state] CFI Enabled
5,710,118 UART: [state] LifecycleState = Unprovisioned
5,710,773 UART: [state] DebugLocked = No
5,711,335 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,712,830 UART: [kat] SHA2-256
6,506,761 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,510,876 UART: [kat] ++
6,511,028 UART: [kat] sha1
6,515,142 UART: [kat] SHA2-256
6,517,080 UART: [kat] SHA2-384
6,519,709 UART: [kat] SHA2-512-ACC
6,521,609 UART: [kat] ECC-384
6,527,370 UART: [kat] HMAC-384Kdf
6,531,838 UART: [kat] LMS
7,100,034 UART: [kat] --
7,100,699 UART: [update-reset] ++
7,140,424 >>> mbox cmd response: failed
7,140,424 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
7,140,838 UART: ROM Non-Fatal Error: 0x000B003D
7,141,762 UART: [state] Locking Datavault
7,142,632 UART: [state] Locking PCR0, PCR1 and PCR31
7,143,236 UART: [state] Locking ICCM
7,143,730 UART: [exit] Launching FMC @ 0x40000130
7,149,059 UART:
7,149,075 UART: Running Caliptra FMC ...
7,149,483 UART:
7,149,626 UART: [state] CFI Enabled
7,238,883 UART: [art] Extend RT PCRs Done
7,239,311 UART: [art] Lock RT PCRs Done
7,240,518 UART: [art] Populate DV Done
7,248,572 UART: [fht] FMC Alias Private Key: 7
7,249,722 UART: [art] Derive CDI
7,250,002 UART: [art] Store in in slot 0x4
7,335,723 UART: [art] Derive Key Pair
7,336,083 UART: [art] Store priv key in slot 0x5
7,349,063 UART: [art] Derive Key Pair - Done
7,364,306 UART: [art] Signing Cert with AUTHO
7,364,786 UART: RITY.KEYID = 7
7,380,250 UART: [art] Erasing AUTHORITY.KEYID = 7
7,381,015 UART: [art] PUB.X = C85911C8488F159831838198D78C6F6175676249A5E642252535502BBADAD1C3CC7C5AEA5D27E682F3B64B2F7B1344F1
7,387,781 UART: [art] PUB.Y = 691C196BF1997764E13618AE88843D06A6F7E640B3F8E9429E77805701B45B0E2B7F14ADF460E713C3CBB862173E2F2A
7,394,720 UART: [art] SIG.R = 51997CC75AC539288368144EE7D7F75D200D469275153A2CF66BBC4E2721F34F83719562870BF74FB103B93984645406
7,401,464 UART: [art] SIG.S = 985ED70E4664408AC6D18C90DFCAA29219026296D214F24C90CC9CB30ADF64850725C218157924FF56A9E34CF0E1321D
7,425,631 UART: Caliptra RT
7,425,976 UART: [state] CFI Enabled
7,710,643 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,712,287 UART:
7,712,303 UART: Running Caliptra ROM ...
7,712,711 UART:
7,712,852 UART: [state] CFI Enabled
7,715,498 UART: [state] LifecycleState = Unprovisioned
7,716,153 UART: [state] DebugLocked = No
7,716,781 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,718,392 UART: [kat] SHA2-256
8,512,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,516,438 UART: [kat] ++
8,516,590 UART: [kat] sha1
8,520,830 UART: [kat] SHA2-256
8,522,768 UART: [kat] SHA2-384
8,525,581 UART: [kat] SHA2-512-ACC
8,527,481 UART: [kat] ECC-384
8,532,874 UART: [kat] HMAC-384Kdf
8,537,438 UART: [kat] LMS
9,105,634 UART: [kat] --
9,106,429 UART: [update-reset] ++
12,563,877 UART: [update-reset] Image verified using Vendor ECC Key Index 0
12,565,159 UART: [update-reset] Loading Runtime at address 0x40005000 len 89648
12,715,035 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,308 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,315,528 >>> mbox cmd response: success
5,315,528 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
5,377,911 UART:
5,377,927 UART: Running Caliptra FMC ...
5,378,335 UART:
5,378,478 UART: [state] CFI Enabled
5,388,750 UART: [fht] FMC Alias Private Key: 7
5,496,442 UART: [art] Extend RT PCRs Done
5,496,870 UART: [art] Lock RT PCRs Done
5,498,562 UART: [art] Populate DV Done
5,506,924 UART: [fht] FMC Alias Private Key: 7
5,507,978 UART: [art] Derive CDI
5,508,258 UART: [art] Store in in slot 0x4
5,593,607 UART: [art] Derive Key Pair
5,593,967 UART: [art] Store priv key in slot 0x5
5,606,859 UART: [art] Derive Key Pair - Done
5,621,625 UART: [art] Signing Cert with AUTHO
5,622,105 UART: RITY.KEYID = 7
5,637,429 UART: [art] Erasing AUTHORITY.KEYID = 7
5,638,194 UART: [art] PUB.X = 02E98806FB73CD810C935CAFD4BEC0F570D7EDEA343FAB6CDBFFD8F511ADC28DCFB703006A34C42B5A3AC60510017819
5,644,946 UART: [art] PUB.Y = 4191CA1ADC8E187C28F18122CF3065CEEC0C3A6F49BC428E9FDE3A144B6EC889A7DCF3B86C805A8DDEFD31AC81A9F4FF
5,651,921 UART: [art] SIG.R = 02C9CFA37CE52133E68379427460A37A2870F99F80D7B709A6B52A794EBD8D4517F77292643BAB22689B312807FD248C
5,658,676 UART: [art] SIG.S = 4A80310A440CA906CEC25D16004AE954C0AD121635005DB03FD61768C3A12BE969985A0D654EC2C178F816E352E15FAD
5,682,553 UART: Caliptra RT
5,682,898 UART: [state] CFI Enabled
5,790,330 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,110,653 >>> mbox cmd response: failed
7,110,653 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
7,116,214 UART:
7,116,230 UART: Running Caliptra FMC ...
7,116,638 UART:
7,116,781 UART: [state] CFI Enabled
7,205,964 UART: [art] Extend RT PCRs Done
7,206,392 UART: [art] Lock RT PCRs Done
7,207,751 UART: [art] Populate DV Done
7,215,835 UART: [fht] FMC Alias Private Key: 7
7,216,995 UART: [art] Derive CDI
7,217,275 UART: [art] Store in in slot 0x4
7,302,976 UART: [art] Derive Key Pair
7,303,336 UART: [art] Store priv key in slot 0x5
7,317,292 UART: [art] Derive Key Pair - Done
7,332,054 UART: [art] Signing Cert with AUTHO
7,332,534 UART: RITY.KEYID = 7
7,347,790 UART: [art] Erasing AUTHORITY.KEYID = 7
7,348,555 UART: [art] PUB.X = 02E98806FB73CD810C935CAFD4BEC0F570D7EDEA343FAB6CDBFFD8F511ADC28DCFB703006A34C42B5A3AC60510017819
7,355,307 UART: [art] PUB.Y = 4191CA1ADC8E187C28F18122CF3065CEEC0C3A6F49BC428E9FDE3A144B6EC889A7DCF3B86C805A8DDEFD31AC81A9F4FF
7,362,282 UART: [art] SIG.R = 02C9CFA37CE52133E68379427460A37A2870F99F80D7B709A6B52A794EBD8D4517F77292643BAB22689B312807FD248C
7,369,037 UART: [art] SIG.S = 4A80310A440CA906CEC25D16004AE954C0AD121635005DB03FD61768C3A12BE969985A0D654EC2C178F816E352E15FAD
7,392,554 UART: Caliptra RT
7,392,899 UART: [state] CFI Enabled
7,674,989 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,826,118 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,075 UART: [state] WD Timer not started. Device not locked for debugging
87,396 UART: [kat] SHA2-256
893,046 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,171 UART: [kat] ++
897,323 UART: [kat] sha1
901,687 UART: [kat] SHA2-256
903,627 UART: [kat] SHA2-384
906,328 UART: [kat] SHA2-512-ACC
908,229 UART: [kat] ECC-384
918,168 UART: [kat] HMAC-384Kdf
922,652 UART: [kat] LMS
1,170,980 UART: [kat] --
1,171,895 UART: [cold-reset] ++
1,172,471 UART: [fht] FHT @ 0x50003400
1,175,212 UART: [idev] ++
1,175,380 UART: [idev] CDI.KEYID = 6
1,175,740 UART: [idev] SUBJECT.KEYID = 7
1,176,164 UART: [idev] UDS.KEYID = 0
1,176,509 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,010 UART: [idev] Erasing UDS.KEYID = 0
1,201,265 UART: [idev] Sha1 KeyId Algorithm
1,209,797 UART: [idev] --
1,210,843 UART: [ldev] ++
1,211,011 UART: [ldev] CDI.KEYID = 6
1,211,374 UART: [ldev] SUBJECT.KEYID = 5
1,211,800 UART: [ldev] AUTHORITY.KEYID = 7
1,212,263 UART: [ldev] FE.KEYID = 1
1,217,553 UART: [ldev] Erasing FE.KEYID = 1
1,243,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,335 UART: [ldev] --
1,282,620 UART: [fwproc] Wait for Commands...
1,283,318 UART: [fwproc] Recv command 0x46574c44
1,284,046 UART: [fwproc] Recv'd Img size: 114332 bytes
3,134,118 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,162,057 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,191,361 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,327,136 >>> mbox cmd response: success
3,327,136 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,328,310 UART: [afmc] ++
3,328,478 UART: [afmc] CDI.KEYID = 6
3,328,840 UART: [afmc] SUBJECT.KEYID = 7
3,329,265 UART: [afmc] AUTHORITY.KEYID = 5
3,364,417 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,890 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,381,638 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,387,347 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,393,239 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,950 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,406,563 UART: [afmc] --
3,407,529 UART: [cold-reset] --
3,408,459 UART: [state] Locking Datavault
3,409,524 UART: [state] Locking PCR0, PCR1 and PCR31
3,410,128 UART: [state] Locking ICCM
3,410,694 UART: [exit] Launching FMC @ 0x40000130
3,416,023 UART:
3,416,039 UART: Running Caliptra FMC ...
3,416,447 UART:
3,416,501 UART: [state] CFI Enabled
3,426,867 UART: [fht] FMC Alias Private Key: 7
3,535,265 UART: [art] Extend RT PCRs Done
3,535,693 UART: [art] Lock RT PCRs Done
3,537,303 UART: [art] Populate DV Done
3,545,523 UART: [fht] FMC Alias Private Key: 7
3,546,651 UART: [art] Derive CDI
3,546,931 UART: [art] Store in in slot 0x4
3,632,386 UART: [art] Derive Key Pair
3,632,746 UART: [art] Store priv key in slot 0x5
3,645,924 UART: [art] Derive Key Pair - Done
3,660,534 UART: [art] Signing Cert with AUTHO
3,661,014 UART: RITY.KEYID = 7
3,676,392 UART: [art] Erasing AUTHORITY.KEYID = 7
3,677,157 UART: [art] PUB.X = 73832C2597BDF6FC484F4DD7DA144C4FD36351863E0B5D4140C77498576871836F8F0A3B2E9B7549B94B77287AD927CD
3,683,919 UART: [art] PUB.Y = 109549E9BD78133CEDE0A05EBB60058F8EB86A7ADDAB6AD4A67AE2C94F0A2D22EBA2A13D0AD10D29A044CF3AFDB0E2FD
3,690,889 UART: [art] SIG.R = EC282192A1976A8FB4DAD1F9CFD8BF31EC20D77CB91E1EDBE31F695771EAE7B726CAA6E4E85493202264E4486105E85C
3,697,670 UART: [art] SIG.S = 719404F935CB200F7F8E7C443FD57F187B764DD6ACEDA06A43165AC204B6130268CC0100322565EF82B1103637C7B60A
3,721,931 UART: Caliptra RT
3,722,184 UART: [state] CFI Enabled
3,829,816 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,831,682 UART:
3,831,698 UART: Running Caliptra ROM ...
3,832,106 UART:
3,832,161 UART: [state] CFI Enabled
3,835,239 UART: [state] LifecycleState = Unprovisioned
3,835,894 UART: [state] DebugLocked = No
3,836,452 UART: [state] WD Timer not started. Device not locked for debugging
3,837,618 UART: [kat] SHA2-256
4,643,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,647,393 UART: [kat] ++
4,647,545 UART: [kat] sha1
4,651,777 UART: [kat] SHA2-256
4,653,717 UART: [kat] SHA2-384
4,656,240 UART: [kat] SHA2-512-ACC
4,658,140 UART: [kat] ECC-384
4,667,565 UART: [kat] HMAC-384Kdf
4,672,149 UART: [kat] LMS
4,920,477 UART: [kat] --
4,921,403 UART: [update-reset] ++
4,939,046 >>> mbox cmd response: failed
4,939,046 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,939,654 UART: ROM Non-Fatal Error: 0x000B003D
4,940,520 UART: [state] Locking Datavault
4,941,344 UART: [state] Locking PCR0, PCR1 and PCR31
4,941,948 UART: [state] Locking ICCM
4,942,468 UART: [exit] Launching FMC @ 0x40000130
4,947,797 UART:
4,947,813 UART: Running Caliptra FMC ...
4,948,221 UART:
4,948,275 UART: [state] CFI Enabled
5,037,366 UART: [art] Extend RT PCRs Done
5,037,794 UART: [art] Lock RT PCRs Done
5,038,885 UART: [art] Populate DV Done
5,046,831 UART: [fht] FMC Alias Private Key: 7
5,047,961 UART: [art] Derive CDI
5,048,241 UART: [art] Store in in slot 0x4
5,134,116 UART: [art] Derive Key Pair
5,134,476 UART: [art] Store priv key in slot 0x5
5,147,178 UART: [art] Derive Key Pair - Done
5,161,756 UART: [art] Signing Cert with AUTHO
5,162,236 UART: RITY.KEYID = 7
5,177,614 UART: [art] Erasing AUTHORITY.KEYID = 7
5,178,379 UART: [art] PUB.X = 73832C2597BDF6FC484F4DD7DA144C4FD36351863E0B5D4140C77498576871836F8F0A3B2E9B7549B94B77287AD927CD
5,185,141 UART: [art] PUB.Y = 109549E9BD78133CEDE0A05EBB60058F8EB86A7ADDAB6AD4A67AE2C94F0A2D22EBA2A13D0AD10D29A044CF3AFDB0E2FD
5,192,111 UART: [art] SIG.R = EC282192A1976A8FB4DAD1F9CFD8BF31EC20D77CB91E1EDBE31F695771EAE7B726CAA6E4E85493202264E4486105E85C
5,198,892 UART: [art] SIG.S = 719404F935CB200F7F8E7C443FD57F187B764DD6ACEDA06A43165AC204B6130268CC0100322565EF82B1103637C7B60A
5,222,609 UART: Caliptra RT
5,222,862 UART: [state] CFI Enabled
5,498,574 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,499,929 UART:
5,499,945 UART: Running Caliptra ROM ...
5,500,353 UART:
5,500,408 UART: [state] CFI Enabled
5,502,962 UART: [state] LifecycleState = Unprovisioned
5,503,617 UART: [state] DebugLocked = No
5,504,145 UART: [state] WD Timer not started. Device not locked for debugging
5,505,483 UART: [kat] SHA2-256
6,311,133 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,315,258 UART: [kat] ++
6,315,410 UART: [kat] sha1
6,319,682 UART: [kat] SHA2-256
6,321,622 UART: [kat] SHA2-384
6,324,479 UART: [kat] SHA2-512-ACC
6,326,379 UART: [kat] ECC-384
6,336,358 UART: [kat] HMAC-384Kdf
6,341,082 UART: [kat] LMS
6,589,410 UART: [kat] --
6,590,092 UART: [update-reset] ++
8,454,317 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,455,410 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
8,605,234 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,501 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,169,960 >>> mbox cmd response: success
3,169,960 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,231,883 UART:
3,231,899 UART: Running Caliptra FMC ...
3,232,307 UART:
3,232,361 UART: [state] CFI Enabled
3,243,077 UART: [fht] FMC Alias Private Key: 7
3,350,561 UART: [art] Extend RT PCRs Done
3,350,989 UART: [art] Lock RT PCRs Done
3,352,613 UART: [art] Populate DV Done
3,360,971 UART: [fht] FMC Alias Private Key: 7
3,361,925 UART: [art] Derive CDI
3,362,205 UART: [art] Store in in slot 0x4
3,448,046 UART: [art] Derive Key Pair
3,448,406 UART: [art] Store priv key in slot 0x5
3,461,712 UART: [art] Derive Key Pair - Done
3,476,410 UART: [art] Signing Cert with AUTHO
3,476,890 UART: RITY.KEYID = 7
3,492,434 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,199 UART: [art] PUB.X = E900AC1E6B21F3C7FAF9BFEA375196A3052D4520F8BA7F17BD7DDDFE09A48035317CC2963341BCB7C8ED820556007299
3,499,926 UART: [art] PUB.Y = F656669053B192775E3A2E7A4BDF4AD2AB0DAA45CAA24DC3D70A9E6F4D32459F48E3BB8DA88E225EE2412AC61ADA1957
3,506,888 UART: [art] SIG.R = B1A4FC10D7FCB899F3A53574C1551670F0BC2ABDE5437C117A8FEFF70F2313CF0389DC54B4BE6F0AC78522841F08D47D
3,513,660 UART: [art] SIG.S = 4A15C11BA84BE02FAE72CE5166141AF1FC80090245C6D6302827D0F6C13B443B9C55B5582FF00E9F4A1C627A85810E3A
3,537,385 UART: Caliptra RT
3,537,638 UART: [state] CFI Enabled
3,645,232 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,640,236 >>> mbox cmd response: failed
4,640,236 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,646,219 UART:
4,646,235 UART: Running Caliptra FMC ...
4,646,643 UART:
4,646,697 UART: [state] CFI Enabled
4,735,354 UART: [art] Extend RT PCRs Done
4,735,782 UART: [art] Lock RT PCRs Done
4,737,071 UART: [art] Populate DV Done
4,745,123 UART: [fht] FMC Alias Private Key: 7
4,746,261 UART: [art] Derive CDI
4,746,541 UART: [art] Store in in slot 0x4
4,832,048 UART: [art] Derive Key Pair
4,832,408 UART: [art] Store priv key in slot 0x5
4,845,840 UART: [art] Derive Key Pair - Done
4,860,626 UART: [art] Signing Cert with AUTHO
4,861,106 UART: RITY.KEYID = 7
4,876,504 UART: [art] Erasing AUTHORITY.KEYID = 7
4,877,269 UART: [art] PUB.X = E900AC1E6B21F3C7FAF9BFEA375196A3052D4520F8BA7F17BD7DDDFE09A48035317CC2963341BCB7C8ED820556007299
4,883,996 UART: [art] PUB.Y = F656669053B192775E3A2E7A4BDF4AD2AB0DAA45CAA24DC3D70A9E6F4D32459F48E3BB8DA88E225EE2412AC61ADA1957
4,890,958 UART: [art] SIG.R = B1A4FC10D7FCB899F3A53574C1551670F0BC2ABDE5437C117A8FEFF70F2313CF0389DC54B4BE6F0AC78522841F08D47D
4,897,730 UART: [art] SIG.S = 4A15C11BA84BE02FAE72CE5166141AF1FC80090245C6D6302827D0F6C13B443B9C55B5582FF00E9F4A1C627A85810E3A
4,921,313 UART: Caliptra RT
4,921,566 UART: [state] CFI Enabled
5,204,366 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,186,560 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,839 UART: [kat] SHA2-256
893,489 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,614 UART: [kat] ++
897,766 UART: [kat] sha1
901,944 UART: [kat] SHA2-256
903,884 UART: [kat] SHA2-384
906,647 UART: [kat] SHA2-512-ACC
908,548 UART: [kat] ECC-384
918,321 UART: [kat] HMAC-384Kdf
922,963 UART: [kat] LMS
1,171,291 UART: [kat] --
1,172,058 UART: [cold-reset] ++
1,172,628 UART: [fht] FHT @ 0x50003400
1,175,401 UART: [idev] ++
1,175,569 UART: [idev] CDI.KEYID = 6
1,175,929 UART: [idev] SUBJECT.KEYID = 7
1,176,353 UART: [idev] UDS.KEYID = 0
1,176,698 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,413 UART: [idev] Erasing UDS.KEYID = 0
1,201,232 UART: [idev] Sha1 KeyId Algorithm
1,209,730 UART: [idev] --
1,210,640 UART: [ldev] ++
1,210,808 UART: [ldev] CDI.KEYID = 6
1,211,171 UART: [ldev] SUBJECT.KEYID = 5
1,211,597 UART: [ldev] AUTHORITY.KEYID = 7
1,212,060 UART: [ldev] FE.KEYID = 1
1,217,464 UART: [ldev] Erasing FE.KEYID = 1
1,243,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,122 UART: [ldev] --
1,282,579 UART: [fwproc] Wait for Commands...
1,283,265 UART: [fwproc] Recv command 0x46574c44
1,283,993 UART: [fwproc] Recv'd Img size: 114332 bytes
3,123,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,050 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,354 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,317,297 >>> mbox cmd response: success
3,317,297 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,318,475 UART: [afmc] ++
3,318,643 UART: [afmc] CDI.KEYID = 6
3,319,005 UART: [afmc] SUBJECT.KEYID = 7
3,319,430 UART: [afmc] AUTHORITY.KEYID = 5
3,355,506 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,129 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,877 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,586 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,478 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,189 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,924 UART: [afmc] --
3,398,996 UART: [cold-reset] --
3,399,824 UART: [state] Locking Datavault
3,400,759 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,363 UART: [state] Locking ICCM
3,401,857 UART: [exit] Launching FMC @ 0x40000130
3,407,186 UART:
3,407,202 UART: Running Caliptra FMC ...
3,407,610 UART:
3,407,753 UART: [state] CFI Enabled
3,418,341 UART: [fht] FMC Alias Private Key: 7
3,526,941 UART: [art] Extend RT PCRs Done
3,527,369 UART: [art] Lock RT PCRs Done
3,528,821 UART: [art] Populate DV Done
3,537,045 UART: [fht] FMC Alias Private Key: 7
3,538,091 UART: [art] Derive CDI
3,538,371 UART: [art] Store in in slot 0x4
3,624,462 UART: [art] Derive Key Pair
3,624,822 UART: [art] Store priv key in slot 0x5
3,637,920 UART: [art] Derive Key Pair - Done
3,652,481 UART: [art] Signing Cert with AUTHO
3,652,961 UART: RITY.KEYID = 7
3,667,671 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,436 UART: [art] PUB.X = AD5FCA28BE45E0DEFAE04ACA8F540A859FC4D26CB7004D88A7CBDA3BF30EAF6442DE37748AAB672B374337FC0340A422
3,675,199 UART: [art] PUB.Y = 1DAA8C8FA19217B093F46D27756790C7195B85DF71289D1285618D1AC9B3EED647A4FF48E3C6935B69E75817B17D7ACE
3,682,153 UART: [art] SIG.R = 6878165BE7D623A455313D83130ABBF2F608C52E93267BF87C4F417AFD066F29F8DF334E1A37D95302E562AB54715DE4
3,688,911 UART: [art] SIG.S = 4BAD07A0AF5405EA6CAB41A1589360C7066357DFEE3977E06BBA92295304D6952A53E9699DCE2F18A8D93FA554715FA6
3,712,680 UART: Caliptra RT
3,713,025 UART: [state] CFI Enabled
3,820,798 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,906 UART:
3,822,922 UART: Running Caliptra ROM ...
3,823,330 UART:
3,823,472 UART: [state] CFI Enabled
3,826,166 UART: [state] LifecycleState = Unprovisioned
3,826,821 UART: [state] DebugLocked = No
3,827,403 UART: [state] WD Timer not started. Device not locked for debugging
3,828,609 UART: [kat] SHA2-256
4,634,259 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,638,384 UART: [kat] ++
4,638,536 UART: [kat] sha1
4,642,832 UART: [kat] SHA2-256
4,644,772 UART: [kat] SHA2-384
4,647,723 UART: [kat] SHA2-512-ACC
4,649,623 UART: [kat] ECC-384
4,659,644 UART: [kat] HMAC-384Kdf
4,664,362 UART: [kat] LMS
4,912,690 UART: [kat] --
4,913,402 UART: [update-reset] ++
4,931,071 >>> mbox cmd response: failed
4,931,071 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,931,499 UART: ROM Non-Fatal Error: 0x000B003D
4,932,361 UART: [state] Locking Datavault
4,933,365 UART: [state] Locking PCR0, PCR1 and PCR31
4,933,969 UART: [state] Locking ICCM
4,934,595 UART: [exit] Launching FMC @ 0x40000130
4,939,924 UART:
4,939,940 UART: Running Caliptra FMC ...
4,940,348 UART:
4,940,491 UART: [state] CFI Enabled
5,029,852 UART: [art] Extend RT PCRs Done
5,030,280 UART: [art] Lock RT PCRs Done
5,031,567 UART: [art] Populate DV Done
5,039,745 UART: [fht] FMC Alias Private Key: 7
5,040,815 UART: [art] Derive CDI
5,041,095 UART: [art] Store in in slot 0x4
5,126,634 UART: [art] Derive Key Pair
5,126,994 UART: [art] Store priv key in slot 0x5
5,139,914 UART: [art] Derive Key Pair - Done
5,154,379 UART: [art] Signing Cert with AUTHO
5,154,859 UART: RITY.KEYID = 7
5,170,213 UART: [art] Erasing AUTHORITY.KEYID = 7
5,170,978 UART: [art] PUB.X = AD5FCA28BE45E0DEFAE04ACA8F540A859FC4D26CB7004D88A7CBDA3BF30EAF6442DE37748AAB672B374337FC0340A422
5,177,741 UART: [art] PUB.Y = 1DAA8C8FA19217B093F46D27756790C7195B85DF71289D1285618D1AC9B3EED647A4FF48E3C6935B69E75817B17D7ACE
5,184,695 UART: [art] SIG.R = 6878165BE7D623A455313D83130ABBF2F608C52E93267BF87C4F417AFD066F29F8DF334E1A37D95302E562AB54715DE4
5,191,453 UART: [art] SIG.S = 4BAD07A0AF5405EA6CAB41A1589360C7066357DFEE3977E06BBA92295304D6952A53E9699DCE2F18A8D93FA554715FA6
5,215,682 UART: Caliptra RT
5,216,027 UART: [state] CFI Enabled
5,498,726 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,500,289 UART:
5,500,305 UART: Running Caliptra ROM ...
5,500,713 UART:
5,500,855 UART: [state] CFI Enabled
5,503,651 UART: [state] LifecycleState = Unprovisioned
5,504,306 UART: [state] DebugLocked = No
5,505,034 UART: [state] WD Timer not started. Device not locked for debugging
5,506,298 UART: [kat] SHA2-256
6,311,948 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,316,073 UART: [kat] ++
6,316,225 UART: [kat] sha1
6,320,483 UART: [kat] SHA2-256
6,322,423 UART: [kat] SHA2-384
6,325,144 UART: [kat] SHA2-512-ACC
6,327,044 UART: [kat] ECC-384
6,337,211 UART: [kat] HMAC-384Kdf
6,341,653 UART: [kat] LMS
6,589,981 UART: [kat] --
6,590,875 UART: [update-reset] ++
8,445,582 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,446,737 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
8,596,561 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,588 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,176,459 >>> mbox cmd response: success
3,176,459 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,237,740 UART:
3,237,756 UART: Running Caliptra FMC ...
3,238,164 UART:
3,238,307 UART: [state] CFI Enabled
3,249,397 UART: [fht] FMC Alias Private Key: 7
3,357,703 UART: [art] Extend RT PCRs Done
3,358,131 UART: [art] Lock RT PCRs Done
3,359,589 UART: [art] Populate DV Done
3,368,049 UART: [fht] FMC Alias Private Key: 7
3,369,213 UART: [art] Derive CDI
3,369,493 UART: [art] Store in in slot 0x4
3,455,544 UART: [art] Derive Key Pair
3,455,904 UART: [art] Store priv key in slot 0x5
3,468,672 UART: [art] Derive Key Pair - Done
3,483,330 UART: [art] Signing Cert with AUTHO
3,483,810 UART: RITY.KEYID = 7
3,499,352 UART: [art] Erasing AUTHORITY.KEYID = 7
3,500,117 UART: [art] PUB.X = DF53B5B5EDA22CBBDEADE75301212DAAC93DEC6CC65AA488C2881670A6A129CF10D7C269C2ABD8FFFEEFA47C6DBD7F88
3,506,920 UART: [art] PUB.Y = D6C5F49EE7ED9E93F5BB00E9076E8EB6D1E15A96DA43412659D60C5D3AB560B4840581F9E5B906EA13C74308316686B1
3,513,837 UART: [art] SIG.R = 0101ED005803670EBE9F9369F27FFED2D25D9A43316833005FB6CAB0ED8D91997A8D7AB51EF923C839D36CC4212A7E53
3,520,557 UART: [art] SIG.S = E5130E63AF8BE077560D554C40E34A219A66B4D40DEF8987E51445E667455419936059E8D22461F5B4F4D44170CFB956
3,544,551 UART: Caliptra RT
3,544,896 UART: [state] CFI Enabled
3,652,750 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,648,621 >>> mbox cmd response: failed
4,648,621 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,654,526 UART:
4,654,542 UART: Running Caliptra FMC ...
4,654,950 UART:
4,655,093 UART: [state] CFI Enabled
4,743,924 UART: [art] Extend RT PCRs Done
4,744,352 UART: [art] Lock RT PCRs Done
4,745,661 UART: [art] Populate DV Done
4,753,699 UART: [fht] FMC Alias Private Key: 7
4,754,711 UART: [art] Derive CDI
4,754,991 UART: [art] Store in in slot 0x4
4,840,848 UART: [art] Derive Key Pair
4,841,208 UART: [art] Store priv key in slot 0x5
4,855,132 UART: [art] Derive Key Pair - Done
4,869,886 UART: [art] Signing Cert with AUTHO
4,870,366 UART: RITY.KEYID = 7
4,885,554 UART: [art] Erasing AUTHORITY.KEYID = 7
4,886,319 UART: [art] PUB.X = DF53B5B5EDA22CBBDEADE75301212DAAC93DEC6CC65AA488C2881670A6A129CF10D7C269C2ABD8FFFEEFA47C6DBD7F88
4,893,122 UART: [art] PUB.Y = D6C5F49EE7ED9E93F5BB00E9076E8EB6D1E15A96DA43412659D60C5D3AB560B4840581F9E5B906EA13C74308316686B1
4,900,039 UART: [art] SIG.R = 0101ED005803670EBE9F9369F27FFED2D25D9A43316833005FB6CAB0ED8D91997A8D7AB51EF923C839D36CC4212A7E53
4,906,759 UART: [art] SIG.S = E5130E63AF8BE077560D554C40E34A219A66B4D40DEF8987E51445E667455419936059E8D22461F5B4F4D44170CFB956
4,931,233 UART: Caliptra RT
4,931,578 UART: [state] CFI Enabled
5,213,638 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,199,533 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,263 UART: [kat] ++
895,415 UART: [kat] sha1
899,647 UART: [kat] SHA2-256
901,587 UART: [kat] SHA2-384
904,528 UART: [kat] SHA2-512-ACC
906,429 UART: [kat] ECC-384
916,064 UART: [kat] HMAC-384Kdf
920,764 UART: [kat] LMS
1,169,076 UART: [kat] --
1,170,021 UART: [cold-reset] ++
1,170,441 UART: [fht] FHT @ 0x50003400
1,173,101 UART: [idev] ++
1,173,269 UART: [idev] CDI.KEYID = 6
1,173,630 UART: [idev] SUBJECT.KEYID = 7
1,174,055 UART: [idev] UDS.KEYID = 0
1,174,401 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,213 UART: [idev] Erasing UDS.KEYID = 0
1,198,903 UART: [idev] Sha1 KeyId Algorithm
1,207,771 UART: [idev] --
1,208,836 UART: [ldev] ++
1,209,004 UART: [ldev] CDI.KEYID = 6
1,209,368 UART: [ldev] SUBJECT.KEYID = 5
1,209,795 UART: [ldev] AUTHORITY.KEYID = 7
1,210,258 UART: [ldev] FE.KEYID = 1
1,215,506 UART: [ldev] Erasing FE.KEYID = 1
1,241,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,316 UART: [ldev] --
1,280,702 UART: [fwproc] Wait for Commands...
1,281,331 UART: [fwproc] Recv command 0x46574c44
1,282,064 UART: [fwproc] Recv'd Img size: 114332 bytes
3,125,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,950 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,259 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,318,075 >>> mbox cmd response: success
3,318,075 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,319,284 UART: [afmc] ++
3,319,452 UART: [afmc] CDI.KEYID = 6
3,319,815 UART: [afmc] SUBJECT.KEYID = 7
3,320,241 UART: [afmc] AUTHORITY.KEYID = 5
3,355,537 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,801 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,552 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,262 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,152 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,863 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,679 UART: [afmc] --
3,398,611 UART: [cold-reset] --
3,399,565 UART: [state] Locking Datavault
3,400,656 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,260 UART: [state] Locking ICCM
3,401,860 UART: [exit] Launching FMC @ 0x40000130
3,407,189 UART:
3,407,205 UART: Running Caliptra FMC ...
3,407,613 UART:
3,407,667 UART: [state] CFI Enabled
3,418,179 UART: [fht] FMC Alias Private Key: 7
3,526,367 UART: [art] Extend RT PCRs Done
3,526,795 UART: [art] Lock RT PCRs Done
3,528,655 UART: [art] Populate DV Done
3,536,697 UART: [fht] FMC Alias Private Key: 7
3,537,809 UART: [art] Derive CDI
3,538,089 UART: [art] Store in in slot 0x4
3,624,014 UART: [art] Derive Key Pair
3,624,374 UART: [art] Store priv key in slot 0x5
3,636,662 UART: [art] Derive Key Pair - Done
3,651,530 UART: [art] Signing Cert with AUTHO
3,652,010 UART: RITY.KEYID = 7
3,667,608 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,373 UART: [art] PUB.X = D45D6820651C455AA61A9D7EFB6AFC4C50392187084B31B2DA1FB6EC0B37A2640EEA64F938EF7F4C19FFD5DF255835F1
3,675,148 UART: [art] PUB.Y = E3F3B8969243B687BF42F5922EBB1A85B8B334644DB2E880EB8783645F13226AD79B335A57C51623875FD6CA9DF70C82
3,682,095 UART: [art] SIG.R = 419937613F89BB8AA50535475DECE34CE51EDD75FF420B4497F1DE092B055B7ECA09EEB1BEA4E88B5E84D9DD6657CA16
3,688,866 UART: [art] SIG.S = 2E4BB2581D03B12164CF14769EB86804DF79E98A6AD3C55494051CCA143D1FF7E1D9EE6E4D37C9E409250425D33A7238
3,713,102 UART: Caliptra RT
3,713,355 UART: [state] CFI Enabled
3,820,916 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,000 UART:
3,823,016 UART: Running Caliptra ROM ...
3,823,424 UART:
3,823,479 UART: [state] CFI Enabled
3,825,549 UART: [state] LifecycleState = Unprovisioned
3,826,204 UART: [state] DebugLocked = No
3,826,842 UART: [state] WD Timer not started. Device not locked for debugging
3,828,162 UART: [kat] SHA2-256
4,631,712 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,635,841 UART: [kat] ++
4,635,993 UART: [kat] sha1
4,640,037 UART: [kat] SHA2-256
4,641,977 UART: [kat] SHA2-384
4,644,806 UART: [kat] SHA2-512-ACC
4,646,706 UART: [kat] ECC-384
4,656,499 UART: [kat] HMAC-384Kdf
4,661,037 UART: [kat] LMS
4,909,349 UART: [kat] --
4,910,251 UART: [update-reset] ++
4,927,671 >>> mbox cmd response: failed
4,927,671 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,927,923 UART: ROM Non-Fatal Error: 0x000B003D
4,928,705 UART: [state] Locking Datavault
4,929,521 UART: [state] Locking PCR0, PCR1 and PCR31
4,930,125 UART: [state] Locking ICCM
4,930,793 UART: [exit] Launching FMC @ 0x40000130
4,936,122 UART:
4,936,138 UART: Running Caliptra FMC ...
4,936,546 UART:
4,936,600 UART: [state] CFI Enabled
5,025,333 UART: [art] Extend RT PCRs Done
5,025,761 UART: [art] Lock RT PCRs Done
5,026,952 UART: [art] Populate DV Done
5,035,184 UART: [fht] FMC Alias Private Key: 7
5,036,234 UART: [art] Derive CDI
5,036,514 UART: [art] Store in in slot 0x4
5,122,233 UART: [art] Derive Key Pair
5,122,593 UART: [art] Store priv key in slot 0x5
5,135,563 UART: [art] Derive Key Pair - Done
5,150,081 UART: [art] Signing Cert with AUTHO
5,150,561 UART: RITY.KEYID = 7
5,165,929 UART: [art] Erasing AUTHORITY.KEYID = 7
5,166,694 UART: [art] PUB.X = D45D6820651C455AA61A9D7EFB6AFC4C50392187084B31B2DA1FB6EC0B37A2640EEA64F938EF7F4C19FFD5DF255835F1
5,173,469 UART: [art] PUB.Y = E3F3B8969243B687BF42F5922EBB1A85B8B334644DB2E880EB8783645F13226AD79B335A57C51623875FD6CA9DF70C82
5,180,416 UART: [art] SIG.R = 419937613F89BB8AA50535475DECE34CE51EDD75FF420B4497F1DE092B055B7ECA09EEB1BEA4E88B5E84D9DD6657CA16
5,187,187 UART: [art] SIG.S = 2E4BB2581D03B12164CF14769EB86804DF79E98A6AD3C55494051CCA143D1FF7E1D9EE6E4D37C9E409250425D33A7238
5,211,611 UART: Caliptra RT
5,211,864 UART: [state] CFI Enabled
5,491,681 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,493,436 UART:
5,493,452 UART: Running Caliptra ROM ...
5,493,860 UART:
5,493,915 UART: [state] CFI Enabled
5,496,399 UART: [state] LifecycleState = Unprovisioned
5,497,054 UART: [state] DebugLocked = No
5,497,716 UART: [state] WD Timer not started. Device not locked for debugging
5,498,830 UART: [kat] SHA2-256
6,302,380 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,306,509 UART: [kat] ++
6,306,661 UART: [kat] sha1
6,311,051 UART: [kat] SHA2-256
6,312,991 UART: [kat] SHA2-384
6,315,830 UART: [kat] SHA2-512-ACC
6,317,730 UART: [kat] ECC-384
6,327,835 UART: [kat] HMAC-384Kdf
6,332,255 UART: [kat] LMS
6,580,567 UART: [kat] --
6,581,421 UART: [update-reset] ++
8,439,723 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,440,772 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
8,590,596 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,156 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,164,817 >>> mbox cmd response: success
3,164,817 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,227,416 UART:
3,227,432 UART: Running Caliptra FMC ...
3,227,840 UART:
3,227,894 UART: [state] CFI Enabled
3,238,458 UART: [fht] FMC Alias Private Key: 7
3,346,436 UART: [art] Extend RT PCRs Done
3,346,864 UART: [art] Lock RT PCRs Done
3,348,350 UART: [art] Populate DV Done
3,356,414 UART: [fht] FMC Alias Private Key: 7
3,357,380 UART: [art] Derive CDI
3,357,660 UART: [art] Store in in slot 0x4
3,443,165 UART: [art] Derive Key Pair
3,443,525 UART: [art] Store priv key in slot 0x5
3,456,193 UART: [art] Derive Key Pair - Done
3,470,968 UART: [art] Signing Cert with AUTHO
3,471,448 UART: RITY.KEYID = 7
3,486,578 UART: [art] Erasing AUTHORITY.KEYID = 7
3,487,343 UART: [art] PUB.X = 8C83FF5120B3C9C2925DC3F0404DF1669C0B2A4ED27088AE2A238CC3E1E7B46AB72577C44884B07752FDD2C60FAFBE18
3,494,119 UART: [art] PUB.Y = 741AD229E112DDD38440070DC13541B9EFF6E100EFB41A87E3493400291D48D991A1C084265C945AB3B2EC25AAC7FD18
3,501,023 UART: [art] SIG.R = 252B81A5B9073B222C92C7FCA4BED6E4E933706F4A3C58D6F732F34A3300E381DEFE4480C84987A4BB4B7CDD75E82DE7
3,507,780 UART: [art] SIG.S = E16B12638BA8A525F5C021F43002D88B93200FAB63789B9CED806BEFE032EDF15ABCB5C895CAB834594B4ACAC3DB6B52
3,531,681 UART: Caliptra RT
3,531,934 UART: [state] CFI Enabled
3,639,770 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,632,139 >>> mbox cmd response: failed
4,632,139 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,637,862 UART:
4,637,878 UART: Running Caliptra FMC ...
4,638,286 UART:
4,638,340 UART: [state] CFI Enabled
4,727,321 UART: [art] Extend RT PCRs Done
4,727,749 UART: [art] Lock RT PCRs Done
4,728,914 UART: [art] Populate DV Done
4,736,980 UART: [fht] FMC Alias Private Key: 7
4,737,978 UART: [art] Derive CDI
4,738,258 UART: [art] Store in in slot 0x4
4,823,851 UART: [art] Derive Key Pair
4,824,211 UART: [art] Store priv key in slot 0x5
4,837,679 UART: [art] Derive Key Pair - Done
4,852,556 UART: [art] Signing Cert with AUTHO
4,853,036 UART: RITY.KEYID = 7
4,867,934 UART: [art] Erasing AUTHORITY.KEYID = 7
4,868,699 UART: [art] PUB.X = 8C83FF5120B3C9C2925DC3F0404DF1669C0B2A4ED27088AE2A238CC3E1E7B46AB72577C44884B07752FDD2C60FAFBE18
4,875,475 UART: [art] PUB.Y = 741AD229E112DDD38440070DC13541B9EFF6E100EFB41A87E3493400291D48D991A1C084265C945AB3B2EC25AAC7FD18
4,882,379 UART: [art] SIG.R = 252B81A5B9073B222C92C7FCA4BED6E4E933706F4A3C58D6F732F34A3300E381DEFE4480C84987A4BB4B7CDD75E82DE7
4,889,136 UART: [art] SIG.S = E16B12638BA8A525F5C021F43002D88B93200FAB63789B9CED806BEFE032EDF15ABCB5C895CAB834594B4ACAC3DB6B52
4,913,195 UART: Caliptra RT
4,913,448 UART: [state] CFI Enabled
5,189,918 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,164,388 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Unprovisioned
85,772 UART: [state] DebugLocked = No
86,268 UART: [state] WD Timer not started. Device not locked for debugging
87,485 UART: [kat] SHA2-256
891,035 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,164 UART: [kat] ++
895,316 UART: [kat] sha1
899,518 UART: [kat] SHA2-256
901,458 UART: [kat] SHA2-384
904,209 UART: [kat] SHA2-512-ACC
906,110 UART: [kat] ECC-384
916,131 UART: [kat] HMAC-384Kdf
920,613 UART: [kat] LMS
1,168,925 UART: [kat] --
1,169,514 UART: [cold-reset] ++
1,170,032 UART: [fht] FHT @ 0x50003400
1,172,706 UART: [idev] ++
1,172,874 UART: [idev] CDI.KEYID = 6
1,173,235 UART: [idev] SUBJECT.KEYID = 7
1,173,660 UART: [idev] UDS.KEYID = 0
1,174,006 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,464 UART: [idev] Erasing UDS.KEYID = 0
1,198,724 UART: [idev] Sha1 KeyId Algorithm
1,207,578 UART: [idev] --
1,208,587 UART: [ldev] ++
1,208,755 UART: [ldev] CDI.KEYID = 6
1,209,119 UART: [ldev] SUBJECT.KEYID = 5
1,209,546 UART: [ldev] AUTHORITY.KEYID = 7
1,210,009 UART: [ldev] FE.KEYID = 1
1,215,469 UART: [ldev] Erasing FE.KEYID = 1
1,241,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,377 UART: [ldev] --
1,280,703 UART: [fwproc] Wait for Commands...
1,281,336 UART: [fwproc] Recv command 0x46574c44
1,282,069 UART: [fwproc] Recv'd Img size: 114332 bytes
3,127,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,918 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,227 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
3,321,167 >>> mbox cmd response: success
3,321,167 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,322,330 UART: [afmc] ++
3,322,498 UART: [afmc] CDI.KEYID = 6
3,322,861 UART: [afmc] SUBJECT.KEYID = 7
3,323,287 UART: [afmc] AUTHORITY.KEYID = 5
3,359,159 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,184 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,894 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,784 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,495 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,385 UART: [afmc] --
3,402,465 UART: [cold-reset] --
3,403,199 UART: [state] Locking Datavault
3,404,546 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,150 UART: [state] Locking ICCM
3,405,660 UART: [exit] Launching FMC @ 0x40000130
3,410,989 UART:
3,411,005 UART: Running Caliptra FMC ...
3,411,413 UART:
3,411,556 UART: [state] CFI Enabled
3,422,054 UART: [fht] FMC Alias Private Key: 7
3,530,398 UART: [art] Extend RT PCRs Done
3,530,826 UART: [art] Lock RT PCRs Done
3,532,518 UART: [art] Populate DV Done
3,540,674 UART: [fht] FMC Alias Private Key: 7
3,541,810 UART: [art] Derive CDI
3,542,090 UART: [art] Store in in slot 0x4
3,627,819 UART: [art] Derive Key Pair
3,628,179 UART: [art] Store priv key in slot 0x5
3,641,819 UART: [art] Derive Key Pair - Done
3,656,607 UART: [art] Signing Cert with AUTHO
3,657,087 UART: RITY.KEYID = 7
3,672,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,870 UART: [art] PUB.X = 04B7B0FCB77611A099406DE1CFEF55E80DA97EB82253410F9FEC8F75223CB7B56BE514409B5E312D7707714F979F98DA
3,679,634 UART: [art] PUB.Y = A343D25AFB2FFB8EEB0AE5A8D4CCAB430D8086F4E49D99D4E8DC4EF08A11ABC631D3AFAEE09551E00294D25F914D30F8
3,686,601 UART: [art] SIG.R = 1EA6B4017A11AFD1E162B76C7FAB5C3F70ABA93E116A08CBA828BE5D9FFC66D1977D2B513E95C3E88C5B5B3E09DB3CDC
3,693,388 UART: [art] SIG.S = 6FFDBC303DEB3FCCBC1C640BBBCC7A4A516474F50FF4523F3776BFEB7A1960979F121C5379FAF0ABD56A182768FE8161
3,716,967 UART: Caliptra RT
3,717,312 UART: [state] CFI Enabled
3,825,401 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,827,605 UART:
3,827,621 UART: Running Caliptra ROM ...
3,828,029 UART:
3,828,171 UART: [state] CFI Enabled
3,830,899 UART: [state] LifecycleState = Unprovisioned
3,831,554 UART: [state] DebugLocked = No
3,832,088 UART: [state] WD Timer not started. Device not locked for debugging
3,833,398 UART: [kat] SHA2-256
4,636,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,641,077 UART: [kat] ++
4,641,229 UART: [kat] sha1
4,645,609 UART: [kat] SHA2-256
4,647,549 UART: [kat] SHA2-384
4,650,238 UART: [kat] SHA2-512-ACC
4,652,138 UART: [kat] ECC-384
4,662,043 UART: [kat] HMAC-384Kdf
4,666,695 UART: [kat] LMS
4,915,007 UART: [kat] --
4,915,889 UART: [update-reset] ++
4,933,245 >>> mbox cmd response: failed
4,933,245 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,933,537 UART: ROM Non-Fatal Error: 0x000B003D
4,934,431 UART: [state] Locking Datavault
4,935,289 UART: [state] Locking PCR0, PCR1 and PCR31
4,935,893 UART: [state] Locking ICCM
4,936,519 UART: [exit] Launching FMC @ 0x40000130
4,941,848 UART:
4,941,864 UART: Running Caliptra FMC ...
4,942,272 UART:
4,942,415 UART: [state] CFI Enabled
5,031,178 UART: [art] Extend RT PCRs Done
5,031,606 UART: [art] Lock RT PCRs Done
5,033,117 UART: [art] Populate DV Done
5,041,533 UART: [fht] FMC Alias Private Key: 7
5,042,571 UART: [art] Derive CDI
5,042,851 UART: [art] Store in in slot 0x4
5,128,678 UART: [art] Derive Key Pair
5,129,038 UART: [art] Store priv key in slot 0x5
5,142,140 UART: [art] Derive Key Pair - Done
5,156,956 UART: [art] Signing Cert with AUTHO
5,157,436 UART: RITY.KEYID = 7
5,172,426 UART: [art] Erasing AUTHORITY.KEYID = 7
5,173,191 UART: [art] PUB.X = 04B7B0FCB77611A099406DE1CFEF55E80DA97EB82253410F9FEC8F75223CB7B56BE514409B5E312D7707714F979F98DA
5,179,955 UART: [art] PUB.Y = A343D25AFB2FFB8EEB0AE5A8D4CCAB430D8086F4E49D99D4E8DC4EF08A11ABC631D3AFAEE09551E00294D25F914D30F8
5,186,922 UART: [art] SIG.R = 1EA6B4017A11AFD1E162B76C7FAB5C3F70ABA93E116A08CBA828BE5D9FFC66D1977D2B513E95C3E88C5B5B3E09DB3CDC
5,193,709 UART: [art] SIG.S = 6FFDBC303DEB3FCCBC1C640BBBCC7A4A516474F50FF4523F3776BFEB7A1960979F121C5379FAF0ABD56A182768FE8161
5,217,414 UART: Caliptra RT
5,217,759 UART: [state] CFI Enabled
5,498,184 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,499,805 UART:
5,499,821 UART: Running Caliptra ROM ...
5,500,229 UART:
5,500,371 UART: [state] CFI Enabled
5,503,247 UART: [state] LifecycleState = Unprovisioned
5,503,902 UART: [state] DebugLocked = No
5,504,618 UART: [state] WD Timer not started. Device not locked for debugging
5,505,858 UART: [kat] SHA2-256
6,309,408 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,313,537 UART: [kat] ++
6,313,689 UART: [kat] sha1
6,318,077 UART: [kat] SHA2-256
6,320,017 UART: [kat] SHA2-384
6,322,684 UART: [kat] SHA2-512-ACC
6,324,584 UART: [kat] ECC-384
6,334,479 UART: [kat] HMAC-384Kdf
6,339,099 UART: [kat] LMS
6,587,411 UART: [kat] --
6,588,221 UART: [update-reset] ++
8,450,404 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,451,389 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89648
8,601,213 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,947 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,165,306 >>> mbox cmd response: success
3,165,306 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
3,227,737 UART:
3,227,753 UART: Running Caliptra FMC ...
3,228,161 UART:
3,228,304 UART: [state] CFI Enabled
3,238,650 UART: [fht] FMC Alias Private Key: 7
3,346,836 UART: [art] Extend RT PCRs Done
3,347,264 UART: [art] Lock RT PCRs Done
3,348,758 UART: [art] Populate DV Done
3,357,112 UART: [fht] FMC Alias Private Key: 7
3,358,056 UART: [art] Derive CDI
3,358,336 UART: [art] Store in in slot 0x4
3,443,711 UART: [art] Derive Key Pair
3,444,071 UART: [art] Store priv key in slot 0x5
3,457,529 UART: [art] Derive Key Pair - Done
3,472,437 UART: [art] Signing Cert with AUTHO
3,472,917 UART: RITY.KEYID = 7
3,487,935 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,700 UART: [art] PUB.X = F102473BF5F5E52249933F683BB684E5440ED4955090C0C072E55F596535FC6A7ECC49134E3CC21F6B9F765A72ADA2D0
3,495,466 UART: [art] PUB.Y = 598E312EF021391A841BD62E31F10FD9AE3E20D02E043D8C7919AB0753518C1D8A996915C6AE719F49EB005298F06975
3,502,381 UART: [art] SIG.R = 07B1CA8477FCBA4B00721D887F7294FADE576D952EF9891C87322CA5D97E221C05A5122D50A5722D94355210306C2571
3,509,117 UART: [art] SIG.S = B20961D0EB34E55DCC4F6976DDF191368C1622295FB471C9C22A89357C22065B10773C46263A3D2A428473048074836D
3,533,289 UART: Caliptra RT
3,533,634 UART: [state] CFI Enabled
3,641,354 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,632,036 >>> mbox cmd response: failed
4,632,036 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
4,637,921 UART:
4,637,937 UART: Running Caliptra FMC ...
4,638,345 UART:
4,638,488 UART: [state] CFI Enabled
4,726,803 UART: [art] Extend RT PCRs Done
4,727,231 UART: [art] Lock RT PCRs Done
4,728,546 UART: [art] Populate DV Done
4,736,968 UART: [fht] FMC Alias Private Key: 7
4,738,078 UART: [art] Derive CDI
4,738,358 UART: [art] Store in in slot 0x4
4,824,421 UART: [art] Derive Key Pair
4,824,781 UART: [art] Store priv key in slot 0x5
4,837,925 UART: [art] Derive Key Pair - Done
4,852,543 UART: [art] Signing Cert with AUTHO
4,853,023 UART: RITY.KEYID = 7
4,868,097 UART: [art] Erasing AUTHORITY.KEYID = 7
4,868,862 UART: [art] PUB.X = F102473BF5F5E52249933F683BB684E5440ED4955090C0C072E55F596535FC6A7ECC49134E3CC21F6B9F765A72ADA2D0
4,875,628 UART: [art] PUB.Y = 598E312EF021391A841BD62E31F10FD9AE3E20D02E043D8C7919AB0753518C1D8A996915C6AE719F49EB005298F06975
4,882,543 UART: [art] SIG.R = 07B1CA8477FCBA4B00721D887F7294FADE576D952EF9891C87322CA5D97E221C05A5122D50A5722D94355210306C2571
4,889,279 UART: [art] SIG.S = B20961D0EB34E55DCC4F6976DDF191368C1622295FB471C9C22A89357C22065B10773C46263A3D2A428473048074836D
4,913,169 UART: Caliptra RT
4,913,514 UART: [state] CFI Enabled
5,189,844 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,167,037 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,599 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,231 UART: [kat] SHA2-256
882,162 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,277 UART: [kat] ++
886,429 UART: [kat] sha1
890,555 UART: [kat] SHA2-256
892,493 UART: [kat] SHA2-384
895,206 UART: [kat] SHA2-512-ACC
897,107 UART: [kat] ECC-384
902,646 UART: [kat] HMAC-384Kdf
907,294 UART: [kat] LMS
1,475,490 UART: [kat] --
1,476,217 UART: [cold-reset] ++
1,476,691 UART: [fht] Storing FHT @ 0x50003400
1,479,458 UART: [idev] ++
1,479,626 UART: [idev] CDI.KEYID = 6
1,479,986 UART: [idev] SUBJECT.KEYID = 7
1,480,410 UART: [idev] UDS.KEYID = 0
1,480,755 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,416 UART: [idev] Erasing UDS.KEYID = 0
1,505,006 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,834 UART: [idev] --
1,514,805 UART: [ldev] ++
1,514,973 UART: [ldev] CDI.KEYID = 6
1,515,336 UART: [ldev] SUBJECT.KEYID = 5
1,515,762 UART: [ldev] AUTHORITY.KEYID = 7
1,516,225 UART: [ldev] FE.KEYID = 1
1,521,377 UART: [ldev] Erasing FE.KEYID = 1
1,547,082 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,014 UART: [ldev] --
1,586,455 UART: [fwproc] Waiting for Commands...
1,587,160 UART: [fwproc] Received command 0x46574c44
1,587,951 UART: [fwproc] Received Image of size 114332 bytes
1,626,300 UART: ROM Fatal Error: 0x000B000D
1,627,459 >>> mbox cmd response: failed
1,627,459 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,465 >>> mbox cmd response: failed
1,627,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,471 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,912 UART: [state] LifecycleState = Unprovisioned
85,567 UART: [state] DebugLocked = No
86,159 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,865 UART: [kat] SHA2-256
881,796 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,911 UART: [kat] ++
886,063 UART: [kat] sha1
890,413 UART: [kat] SHA2-256
892,351 UART: [kat] SHA2-384
895,160 UART: [kat] SHA2-512-ACC
897,061 UART: [kat] ECC-384
902,906 UART: [kat] HMAC-384Kdf
907,548 UART: [kat] LMS
1,475,744 UART: [kat] --
1,476,641 UART: [cold-reset] ++
1,477,049 UART: [fht] Storing FHT @ 0x50003400
1,479,932 UART: [idev] ++
1,480,100 UART: [idev] CDI.KEYID = 6
1,480,460 UART: [idev] SUBJECT.KEYID = 7
1,480,884 UART: [idev] UDS.KEYID = 0
1,481,229 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,746 UART: [idev] Erasing UDS.KEYID = 0
1,505,154 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,916 UART: [idev] --
1,514,911 UART: [ldev] ++
1,515,079 UART: [ldev] CDI.KEYID = 6
1,515,442 UART: [ldev] SUBJECT.KEYID = 5
1,515,868 UART: [ldev] AUTHORITY.KEYID = 7
1,516,331 UART: [ldev] FE.KEYID = 1
1,521,515 UART: [ldev] Erasing FE.KEYID = 1
1,546,622 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,522 UART: [ldev] --
1,585,877 UART: [fwproc] Waiting for Commands...
1,586,538 UART: [fwproc] Received command 0x46574c44
1,587,329 UART: [fwproc] Received Image of size 114332 bytes
2,885,448 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,042 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,394 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,293 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,151 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,479,820 >>> mbox cmd response: failed
1,479,820 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,826 >>> mbox cmd response: failed
1,479,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,832 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,461 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,537 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,916 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,496 UART: [kat] SHA2-256
882,427 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,542 UART: [kat] ++
886,694 UART: [kat] sha1
890,994 UART: [kat] SHA2-256
892,932 UART: [kat] SHA2-384
895,437 UART: [kat] SHA2-512-ACC
897,338 UART: [kat] ECC-384
902,861 UART: [kat] HMAC-384Kdf
907,581 UART: [kat] LMS
1,475,777 UART: [kat] --
1,476,896 UART: [cold-reset] ++
1,477,316 UART: [fht] Storing FHT @ 0x50003400
1,480,123 UART: [idev] ++
1,480,291 UART: [idev] CDI.KEYID = 6
1,480,651 UART: [idev] SUBJECT.KEYID = 7
1,481,075 UART: [idev] UDS.KEYID = 0
1,481,420 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,783 UART: [idev] Erasing UDS.KEYID = 0
1,505,581 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,247 UART: [idev] --
1,515,190 UART: [ldev] ++
1,515,358 UART: [ldev] CDI.KEYID = 6
1,515,721 UART: [ldev] SUBJECT.KEYID = 5
1,516,147 UART: [ldev] AUTHORITY.KEYID = 7
1,516,610 UART: [ldev] FE.KEYID = 1
1,521,904 UART: [ldev] Erasing FE.KEYID = 1
1,547,141 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,057 UART: [ldev] --
1,586,440 UART: [fwproc] Waiting for Commands...
1,587,233 UART: [fwproc] Received command 0x46574c44
1,588,024 UART: [fwproc] Received Image of size 114332 bytes
1,625,895 UART: ROM Fatal Error: 0x000B000D
1,627,054 >>> mbox cmd response: failed
1,627,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,060 >>> mbox cmd response: failed
1,627,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,066 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,534 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,194 UART: [kat] SHA2-256
882,125 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,240 UART: [kat] ++
886,392 UART: [kat] sha1
890,828 UART: [kat] SHA2-256
892,766 UART: [kat] SHA2-384
895,479 UART: [kat] SHA2-512-ACC
897,380 UART: [kat] ECC-384
902,805 UART: [kat] HMAC-384Kdf
907,619 UART: [kat] LMS
1,475,815 UART: [kat] --
1,476,648 UART: [cold-reset] ++
1,477,154 UART: [fht] Storing FHT @ 0x50003400
1,480,085 UART: [idev] ++
1,480,253 UART: [idev] CDI.KEYID = 6
1,480,613 UART: [idev] SUBJECT.KEYID = 7
1,481,037 UART: [idev] UDS.KEYID = 0
1,481,382 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,203 UART: [idev] Erasing UDS.KEYID = 0
1,505,979 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,735 UART: [idev] --
1,515,864 UART: [ldev] ++
1,516,032 UART: [ldev] CDI.KEYID = 6
1,516,395 UART: [ldev] SUBJECT.KEYID = 5
1,516,821 UART: [ldev] AUTHORITY.KEYID = 7
1,517,284 UART: [ldev] FE.KEYID = 1
1,522,550 UART: [ldev] Erasing FE.KEYID = 1
1,547,873 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,715 UART: [ldev] --
1,587,178 UART: [fwproc] Waiting for Commands...
1,587,793 UART: [fwproc] Received command 0x46574c44
1,588,584 UART: [fwproc] Received Image of size 114332 bytes
2,886,067 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,859 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,211 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,072 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,888 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,481,143 >>> mbox cmd response: failed
1,481,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,149 >>> mbox cmd response: failed
1,481,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,155 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,792 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,670 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,476 UART: [state] LifecycleState = Unprovisioned
86,131 UART: [state] DebugLocked = No
86,867 UART: [state] WD Timer not started. Device not locked for debugging
88,186 UART: [kat] SHA2-256
893,836 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,961 UART: [kat] ++
898,113 UART: [kat] sha1
902,321 UART: [kat] SHA2-256
904,261 UART: [kat] SHA2-384
906,964 UART: [kat] SHA2-512-ACC
908,865 UART: [kat] ECC-384
918,596 UART: [kat] HMAC-384Kdf
923,142 UART: [kat] LMS
1,171,470 UART: [kat] --
1,172,397 UART: [cold-reset] ++
1,172,729 UART: [fht] FHT @ 0x50003400
1,175,394 UART: [idev] ++
1,175,562 UART: [idev] CDI.KEYID = 6
1,175,922 UART: [idev] SUBJECT.KEYID = 7
1,176,346 UART: [idev] UDS.KEYID = 0
1,176,691 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,222 UART: [idev] Erasing UDS.KEYID = 0
1,200,905 UART: [idev] Sha1 KeyId Algorithm
1,209,345 UART: [idev] --
1,210,393 UART: [ldev] ++
1,210,561 UART: [ldev] CDI.KEYID = 6
1,210,924 UART: [ldev] SUBJECT.KEYID = 5
1,211,350 UART: [ldev] AUTHORITY.KEYID = 7
1,211,813 UART: [ldev] FE.KEYID = 1
1,216,771 UART: [ldev] Erasing FE.KEYID = 1
1,243,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,741 UART: [ldev] --
1,282,150 UART: [fwproc] Wait for Commands...
1,282,946 UART: [fwproc] Recv command 0x46574c44
1,283,674 UART: [fwproc] Recv'd Img size: 114332 bytes
1,322,395 UART: ROM Fatal Error: 0x000B000D
1,323,554 >>> mbox cmd response: failed
1,323,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,560 >>> mbox cmd response: failed
1,323,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,566 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
893,244 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,369 UART: [kat] ++
897,521 UART: [kat] sha1
901,711 UART: [kat] SHA2-256
903,651 UART: [kat] SHA2-384
906,182 UART: [kat] SHA2-512-ACC
908,083 UART: [kat] ECC-384
917,840 UART: [kat] HMAC-384Kdf
922,468 UART: [kat] LMS
1,170,796 UART: [kat] --
1,171,881 UART: [cold-reset] ++
1,172,379 UART: [fht] FHT @ 0x50003400
1,175,086 UART: [idev] ++
1,175,254 UART: [idev] CDI.KEYID = 6
1,175,614 UART: [idev] SUBJECT.KEYID = 7
1,176,038 UART: [idev] UDS.KEYID = 0
1,176,383 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,862 UART: [idev] Erasing UDS.KEYID = 0
1,200,651 UART: [idev] Sha1 KeyId Algorithm
1,209,103 UART: [idev] --
1,210,207 UART: [ldev] ++
1,210,375 UART: [ldev] CDI.KEYID = 6
1,210,738 UART: [ldev] SUBJECT.KEYID = 5
1,211,164 UART: [ldev] AUTHORITY.KEYID = 7
1,211,627 UART: [ldev] FE.KEYID = 1
1,216,779 UART: [ldev] Erasing FE.KEYID = 1
1,243,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,769 UART: [ldev] --
1,282,096 UART: [fwproc] Wait for Commands...
1,282,788 UART: [fwproc] Recv command 0x46574c44
1,283,516 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,254 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,759 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,063 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,872 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,951 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,483 >>> mbox cmd response: failed
1,178,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,489 >>> mbox cmd response: failed
1,178,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,495 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,463 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,943 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
893,459 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,584 UART: [kat] ++
897,736 UART: [kat] sha1
902,092 UART: [kat] SHA2-256
904,032 UART: [kat] SHA2-384
906,805 UART: [kat] SHA2-512-ACC
908,706 UART: [kat] ECC-384
918,287 UART: [kat] HMAC-384Kdf
922,985 UART: [kat] LMS
1,171,313 UART: [kat] --
1,172,148 UART: [cold-reset] ++
1,172,528 UART: [fht] FHT @ 0x50003400
1,175,235 UART: [idev] ++
1,175,403 UART: [idev] CDI.KEYID = 6
1,175,763 UART: [idev] SUBJECT.KEYID = 7
1,176,187 UART: [idev] UDS.KEYID = 0
1,176,532 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,161 UART: [idev] Erasing UDS.KEYID = 0
1,201,370 UART: [idev] Sha1 KeyId Algorithm
1,209,864 UART: [idev] --
1,211,000 UART: [ldev] ++
1,211,168 UART: [ldev] CDI.KEYID = 6
1,211,531 UART: [ldev] SUBJECT.KEYID = 5
1,211,957 UART: [ldev] AUTHORITY.KEYID = 7
1,212,420 UART: [ldev] FE.KEYID = 1
1,217,592 UART: [ldev] Erasing FE.KEYID = 1
1,243,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,910 UART: [ldev] --
1,283,293 UART: [fwproc] Wait for Commands...
1,284,087 UART: [fwproc] Recv command 0x46574c44
1,284,815 UART: [fwproc] Recv'd Img size: 114332 bytes
1,323,434 UART: ROM Fatal Error: 0x000B000D
1,324,593 >>> mbox cmd response: failed
1,324,593 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,599 >>> mbox cmd response: failed
1,324,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,605 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,157 UART: [kat] SHA2-256
893,807 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,932 UART: [kat] ++
898,084 UART: [kat] sha1
902,362 UART: [kat] SHA2-256
904,302 UART: [kat] SHA2-384
907,095 UART: [kat] SHA2-512-ACC
908,996 UART: [kat] ECC-384
918,599 UART: [kat] HMAC-384Kdf
923,253 UART: [kat] LMS
1,171,581 UART: [kat] --
1,172,186 UART: [cold-reset] ++
1,172,628 UART: [fht] FHT @ 0x50003400
1,175,203 UART: [idev] ++
1,175,371 UART: [idev] CDI.KEYID = 6
1,175,731 UART: [idev] SUBJECT.KEYID = 7
1,176,155 UART: [idev] UDS.KEYID = 0
1,176,500 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,063 UART: [idev] Erasing UDS.KEYID = 0
1,200,828 UART: [idev] Sha1 KeyId Algorithm
1,209,464 UART: [idev] --
1,210,540 UART: [ldev] ++
1,210,708 UART: [ldev] CDI.KEYID = 6
1,211,071 UART: [ldev] SUBJECT.KEYID = 5
1,211,497 UART: [ldev] AUTHORITY.KEYID = 7
1,211,960 UART: [ldev] FE.KEYID = 1
1,217,490 UART: [ldev] Erasing FE.KEYID = 1
1,243,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,178 UART: [ldev] --
1,283,525 UART: [fwproc] Wait for Commands...
1,284,251 UART: [fwproc] Recv command 0x46574c44
1,284,979 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,384 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,688 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,565 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,192 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,842 >>> mbox cmd response: failed
1,178,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,848 >>> mbox cmd response: failed
1,178,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,884 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,472 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,439 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
891,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,835 UART: [kat] SHA2-256
901,775 UART: [kat] SHA2-384
904,558 UART: [kat] SHA2-512-ACC
906,459 UART: [kat] ECC-384
916,150 UART: [kat] HMAC-384Kdf
920,742 UART: [kat] LMS
1,169,054 UART: [kat] --
1,169,813 UART: [cold-reset] ++
1,170,143 UART: [fht] FHT @ 0x50003400
1,172,635 UART: [idev] ++
1,172,803 UART: [idev] CDI.KEYID = 6
1,173,164 UART: [idev] SUBJECT.KEYID = 7
1,173,589 UART: [idev] UDS.KEYID = 0
1,173,935 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,913 UART: [idev] Erasing UDS.KEYID = 0
1,198,229 UART: [idev] Sha1 KeyId Algorithm
1,207,247 UART: [idev] --
1,208,200 UART: [ldev] ++
1,208,368 UART: [ldev] CDI.KEYID = 6
1,208,732 UART: [ldev] SUBJECT.KEYID = 5
1,209,159 UART: [ldev] AUTHORITY.KEYID = 7
1,209,622 UART: [ldev] FE.KEYID = 1
1,214,788 UART: [ldev] Erasing FE.KEYID = 1
1,241,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,360 UART: [ldev] --
1,280,654 UART: [fwproc] Wait for Commands...
1,281,351 UART: [fwproc] Recv command 0x46574c44
1,282,084 UART: [fwproc] Recv'd Img size: 114332 bytes
1,321,151 UART: ROM Fatal Error: 0x000B000D
1,322,310 >>> mbox cmd response: failed
1,322,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,316 >>> mbox cmd response: failed
1,322,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,322 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
891,246 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,375 UART: [kat] ++
895,527 UART: [kat] sha1
899,625 UART: [kat] SHA2-256
901,565 UART: [kat] SHA2-384
904,232 UART: [kat] SHA2-512-ACC
906,133 UART: [kat] ECC-384
916,406 UART: [kat] HMAC-384Kdf
920,922 UART: [kat] LMS
1,169,234 UART: [kat] --
1,170,423 UART: [cold-reset] ++
1,170,911 UART: [fht] FHT @ 0x50003400
1,173,527 UART: [idev] ++
1,173,695 UART: [idev] CDI.KEYID = 6
1,174,056 UART: [idev] SUBJECT.KEYID = 7
1,174,481 UART: [idev] UDS.KEYID = 0
1,174,827 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,257 UART: [idev] Erasing UDS.KEYID = 0
1,199,167 UART: [idev] Sha1 KeyId Algorithm
1,207,887 UART: [idev] --
1,208,864 UART: [ldev] ++
1,209,032 UART: [ldev] CDI.KEYID = 6
1,209,396 UART: [ldev] SUBJECT.KEYID = 5
1,209,823 UART: [ldev] AUTHORITY.KEYID = 7
1,210,286 UART: [ldev] FE.KEYID = 1
1,215,218 UART: [ldev] Erasing FE.KEYID = 1
1,241,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,406 UART: [ldev] --
1,280,732 UART: [fwproc] Wait for Commands...
1,281,373 UART: [fwproc] Recv command 0x46574c44
1,282,106 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,953 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,262 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,028 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,548 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,173,395 >>> mbox cmd response: failed
1,173,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,401 >>> mbox cmd response: failed
1,173,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,407 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,996 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,688 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,225 UART: [kat] SHA2-256
891,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,904 UART: [kat] ++
896,056 UART: [kat] sha1
900,302 UART: [kat] SHA2-256
902,242 UART: [kat] SHA2-384
905,139 UART: [kat] SHA2-512-ACC
907,040 UART: [kat] ECC-384
916,739 UART: [kat] HMAC-384Kdf
921,351 UART: [kat] LMS
1,169,663 UART: [kat] --
1,170,450 UART: [cold-reset] ++
1,170,876 UART: [fht] FHT @ 0x50003400
1,173,564 UART: [idev] ++
1,173,732 UART: [idev] CDI.KEYID = 6
1,174,093 UART: [idev] SUBJECT.KEYID = 7
1,174,518 UART: [idev] UDS.KEYID = 0
1,174,864 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,220 UART: [idev] Erasing UDS.KEYID = 0
1,199,364 UART: [idev] Sha1 KeyId Algorithm
1,208,298 UART: [idev] --
1,209,425 UART: [ldev] ++
1,209,593 UART: [ldev] CDI.KEYID = 6
1,209,957 UART: [ldev] SUBJECT.KEYID = 5
1,210,384 UART: [ldev] AUTHORITY.KEYID = 7
1,210,847 UART: [ldev] FE.KEYID = 1
1,216,337 UART: [ldev] Erasing FE.KEYID = 1
1,242,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,583 UART: [ldev] --
1,281,965 UART: [fwproc] Wait for Commands...
1,282,724 UART: [fwproc] Recv command 0x46574c44
1,283,457 UART: [fwproc] Recv'd Img size: 114332 bytes
1,322,100 UART: ROM Fatal Error: 0x000B000D
1,323,259 >>> mbox cmd response: failed
1,323,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,265 >>> mbox cmd response: failed
1,323,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,271 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
891,351 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,480 UART: [kat] ++
895,632 UART: [kat] sha1
899,932 UART: [kat] SHA2-256
901,872 UART: [kat] SHA2-384
904,627 UART: [kat] SHA2-512-ACC
906,528 UART: [kat] ECC-384
916,273 UART: [kat] HMAC-384Kdf
920,945 UART: [kat] LMS
1,169,257 UART: [kat] --
1,170,104 UART: [cold-reset] ++
1,170,522 UART: [fht] FHT @ 0x50003400
1,173,178 UART: [idev] ++
1,173,346 UART: [idev] CDI.KEYID = 6
1,173,707 UART: [idev] SUBJECT.KEYID = 7
1,174,132 UART: [idev] UDS.KEYID = 0
1,174,478 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,492 UART: [idev] Erasing UDS.KEYID = 0
1,199,634 UART: [idev] Sha1 KeyId Algorithm
1,208,514 UART: [idev] --
1,209,489 UART: [ldev] ++
1,209,657 UART: [ldev] CDI.KEYID = 6
1,210,021 UART: [ldev] SUBJECT.KEYID = 5
1,210,448 UART: [ldev] AUTHORITY.KEYID = 7
1,210,911 UART: [ldev] FE.KEYID = 1
1,216,101 UART: [ldev] Erasing FE.KEYID = 1
1,242,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,045 UART: [ldev] --
1,281,513 UART: [fwproc] Wait for Commands...
1,282,104 UART: [fwproc] Recv command 0x46574c44
1,282,837 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,462 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,641 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,601 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,174,814 >>> mbox cmd response: failed
1,174,814 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,820 >>> mbox cmd response: failed
1,174,820 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,826 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,309 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,871 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,239 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,715 UART: [kat] SHA2-256
881,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,761 UART: [kat] ++
885,913 UART: [kat] sha1
890,207 UART: [kat] SHA2-256
892,145 UART: [kat] SHA2-384
894,702 UART: [kat] SHA2-512-ACC
896,603 UART: [kat] ECC-384
902,242 UART: [kat] HMAC-384Kdf
906,826 UART: [kat] LMS
1,475,022 UART: [kat] --
1,476,005 UART: [cold-reset] ++
1,476,333 UART: [fht] Storing FHT @ 0x50003400
1,479,316 UART: [idev] ++
1,479,484 UART: [idev] CDI.KEYID = 6
1,479,844 UART: [idev] SUBJECT.KEYID = 7
1,480,268 UART: [idev] UDS.KEYID = 0
1,480,613 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,602 UART: [idev] Erasing UDS.KEYID = 0
1,505,324 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,916 UART: [idev] --
1,514,979 UART: [ldev] ++
1,515,147 UART: [ldev] CDI.KEYID = 6
1,515,510 UART: [ldev] SUBJECT.KEYID = 5
1,515,936 UART: [ldev] AUTHORITY.KEYID = 7
1,516,399 UART: [ldev] FE.KEYID = 1
1,521,883 UART: [ldev] Erasing FE.KEYID = 1
1,547,462 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,286 UART: [ldev] --
1,586,623 UART: [fwproc] Waiting for Commands...
1,587,342 UART: [fwproc] Received command 0x46574c44
1,588,133 UART: [fwproc] Received Image of size 114332 bytes
1,613,682 UART: ROM Fatal Error: 0x000B0008
1,614,839 >>> mbox cmd response: failed
1,614,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,845 >>> mbox cmd response: failed
1,614,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,851 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,587 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,307 UART: [kat] SHA2-256
882,238 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,353 UART: [kat] ++
886,505 UART: [kat] sha1
890,803 UART: [kat] SHA2-256
892,741 UART: [kat] SHA2-384
895,646 UART: [kat] SHA2-512-ACC
897,547 UART: [kat] ECC-384
903,086 UART: [kat] HMAC-384Kdf
907,704 UART: [kat] LMS
1,475,900 UART: [kat] --
1,476,849 UART: [cold-reset] ++
1,477,273 UART: [fht] Storing FHT @ 0x50003400
1,480,104 UART: [idev] ++
1,480,272 UART: [idev] CDI.KEYID = 6
1,480,632 UART: [idev] SUBJECT.KEYID = 7
1,481,056 UART: [idev] UDS.KEYID = 0
1,481,401 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,086 UART: [idev] Erasing UDS.KEYID = 0
1,505,960 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,438 UART: [idev] --
1,515,487 UART: [ldev] ++
1,515,655 UART: [ldev] CDI.KEYID = 6
1,516,018 UART: [ldev] SUBJECT.KEYID = 5
1,516,444 UART: [ldev] AUTHORITY.KEYID = 7
1,516,907 UART: [ldev] FE.KEYID = 1
1,522,019 UART: [ldev] Erasing FE.KEYID = 1
1,547,154 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,186 UART: [ldev] --
1,586,505 UART: [fwproc] Waiting for Commands...
1,587,340 UART: [fwproc] Received command 0x46574c44
1,588,131 UART: [fwproc] Received Image of size 114332 bytes
2,885,798 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,776 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,128 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,913 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,517 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,466,092 >>> mbox cmd response: failed
1,466,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,098 >>> mbox cmd response: failed
1,466,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,104 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,299 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,799 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,794 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,512 UART: [kat] SHA2-256
882,443 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,558 UART: [kat] ++
886,710 UART: [kat] sha1
890,840 UART: [kat] SHA2-256
892,778 UART: [kat] SHA2-384
895,515 UART: [kat] SHA2-512-ACC
897,416 UART: [kat] ECC-384
902,875 UART: [kat] HMAC-384Kdf
907,735 UART: [kat] LMS
1,475,931 UART: [kat] --
1,476,860 UART: [cold-reset] ++
1,477,268 UART: [fht] Storing FHT @ 0x50003400
1,479,837 UART: [idev] ++
1,480,005 UART: [idev] CDI.KEYID = 6
1,480,365 UART: [idev] SUBJECT.KEYID = 7
1,480,789 UART: [idev] UDS.KEYID = 0
1,481,134 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,983 UART: [idev] Erasing UDS.KEYID = 0
1,505,745 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,381 UART: [idev] --
1,515,338 UART: [ldev] ++
1,515,506 UART: [ldev] CDI.KEYID = 6
1,515,869 UART: [ldev] SUBJECT.KEYID = 5
1,516,295 UART: [ldev] AUTHORITY.KEYID = 7
1,516,758 UART: [ldev] FE.KEYID = 1
1,522,242 UART: [ldev] Erasing FE.KEYID = 1
1,547,869 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,397 UART: [ldev] --
1,586,736 UART: [fwproc] Waiting for Commands...
1,587,581 UART: [fwproc] Received command 0x46574c44
1,588,372 UART: [fwproc] Received Image of size 114332 bytes
1,613,753 UART: ROM Fatal Error: 0x000B0008
1,614,910 >>> mbox cmd response: failed
1,614,910 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,916 >>> mbox cmd response: failed
1,614,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,922 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,678 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,308 UART: [kat] SHA2-256
882,239 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,354 UART: [kat] ++
886,506 UART: [kat] sha1
890,742 UART: [kat] SHA2-256
892,680 UART: [kat] SHA2-384
895,219 UART: [kat] SHA2-512-ACC
897,120 UART: [kat] ECC-384
902,659 UART: [kat] HMAC-384Kdf
907,291 UART: [kat] LMS
1,475,487 UART: [kat] --
1,476,506 UART: [cold-reset] ++
1,477,006 UART: [fht] Storing FHT @ 0x50003400
1,479,751 UART: [idev] ++
1,479,919 UART: [idev] CDI.KEYID = 6
1,480,279 UART: [idev] SUBJECT.KEYID = 7
1,480,703 UART: [idev] UDS.KEYID = 0
1,481,048 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,275 UART: [idev] Erasing UDS.KEYID = 0
1,505,079 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,789 UART: [idev] --
1,514,910 UART: [ldev] ++
1,515,078 UART: [ldev] CDI.KEYID = 6
1,515,441 UART: [ldev] SUBJECT.KEYID = 5
1,515,867 UART: [ldev] AUTHORITY.KEYID = 7
1,516,330 UART: [ldev] FE.KEYID = 1
1,521,554 UART: [ldev] Erasing FE.KEYID = 1
1,547,117 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,249 UART: [ldev] --
1,586,604 UART: [fwproc] Waiting for Commands...
1,587,425 UART: [fwproc] Received command 0x46574c44
1,588,216 UART: [fwproc] Received Image of size 114332 bytes
2,885,137 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,181 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,533 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,520 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,996 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,466,415 >>> mbox cmd response: failed
1,466,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,421 >>> mbox cmd response: failed
1,466,421 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,427 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,808 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,392 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
893,144 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,269 UART: [kat] ++
897,421 UART: [kat] sha1
901,509 UART: [kat] SHA2-256
903,449 UART: [kat] SHA2-384
906,286 UART: [kat] SHA2-512-ACC
908,187 UART: [kat] ECC-384
917,708 UART: [kat] HMAC-384Kdf
922,472 UART: [kat] LMS
1,170,800 UART: [kat] --
1,171,727 UART: [cold-reset] ++
1,172,297 UART: [fht] FHT @ 0x50003400
1,174,962 UART: [idev] ++
1,175,130 UART: [idev] CDI.KEYID = 6
1,175,490 UART: [idev] SUBJECT.KEYID = 7
1,175,914 UART: [idev] UDS.KEYID = 0
1,176,259 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,876 UART: [idev] Erasing UDS.KEYID = 0
1,200,875 UART: [idev] Sha1 KeyId Algorithm
1,209,459 UART: [idev] --
1,210,685 UART: [ldev] ++
1,210,853 UART: [ldev] CDI.KEYID = 6
1,211,216 UART: [ldev] SUBJECT.KEYID = 5
1,211,642 UART: [ldev] AUTHORITY.KEYID = 7
1,212,105 UART: [ldev] FE.KEYID = 1
1,217,125 UART: [ldev] Erasing FE.KEYID = 1
1,243,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,565 UART: [ldev] --
1,281,946 UART: [fwproc] Wait for Commands...
1,282,688 UART: [fwproc] Recv command 0x46574c44
1,283,416 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,687 UART: ROM Fatal Error: 0x000B0008
1,309,844 >>> mbox cmd response: failed
1,309,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,850 >>> mbox cmd response: failed
1,309,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,856 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,640 UART: [state] LifecycleState = Unprovisioned
85,295 UART: [state] DebugLocked = No
86,015 UART: [state] WD Timer not started. Device not locked for debugging
87,332 UART: [kat] SHA2-256
892,982 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,107 UART: [kat] ++
897,259 UART: [kat] sha1
901,365 UART: [kat] SHA2-256
903,305 UART: [kat] SHA2-384
906,074 UART: [kat] SHA2-512-ACC
907,975 UART: [kat] ECC-384
917,408 UART: [kat] HMAC-384Kdf
921,898 UART: [kat] LMS
1,170,226 UART: [kat] --
1,171,115 UART: [cold-reset] ++
1,171,659 UART: [fht] FHT @ 0x50003400
1,174,476 UART: [idev] ++
1,174,644 UART: [idev] CDI.KEYID = 6
1,175,004 UART: [idev] SUBJECT.KEYID = 7
1,175,428 UART: [idev] UDS.KEYID = 0
1,175,773 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,528 UART: [idev] Erasing UDS.KEYID = 0
1,200,529 UART: [idev] Sha1 KeyId Algorithm
1,208,989 UART: [idev] --
1,209,921 UART: [ldev] ++
1,210,089 UART: [ldev] CDI.KEYID = 6
1,210,452 UART: [ldev] SUBJECT.KEYID = 5
1,210,878 UART: [ldev] AUTHORITY.KEYID = 7
1,211,341 UART: [ldev] FE.KEYID = 1
1,216,699 UART: [ldev] Erasing FE.KEYID = 1
1,243,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,461 UART: [ldev] --
1,282,834 UART: [fwproc] Wait for Commands...
1,283,632 UART: [fwproc] Recv command 0x46574c44
1,284,360 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,788 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,639 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,943 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,816 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,753 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,164,581 >>> mbox cmd response: failed
1,164,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,587 >>> mbox cmd response: failed
1,164,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,593 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,615 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,973 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,789 UART: [state] LifecycleState = Unprovisioned
86,444 UART: [state] DebugLocked = No
87,144 UART: [state] WD Timer not started. Device not locked for debugging
88,479 UART: [kat] SHA2-256
894,129 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,254 UART: [kat] ++
898,406 UART: [kat] sha1
902,516 UART: [kat] SHA2-256
904,456 UART: [kat] SHA2-384
906,961 UART: [kat] SHA2-512-ACC
908,862 UART: [kat] ECC-384
918,253 UART: [kat] HMAC-384Kdf
922,867 UART: [kat] LMS
1,171,195 UART: [kat] --
1,172,240 UART: [cold-reset] ++
1,172,630 UART: [fht] FHT @ 0x50003400
1,175,399 UART: [idev] ++
1,175,567 UART: [idev] CDI.KEYID = 6
1,175,927 UART: [idev] SUBJECT.KEYID = 7
1,176,351 UART: [idev] UDS.KEYID = 0
1,176,696 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,207 UART: [idev] Erasing UDS.KEYID = 0
1,201,782 UART: [idev] Sha1 KeyId Algorithm
1,210,256 UART: [idev] --
1,211,364 UART: [ldev] ++
1,211,532 UART: [ldev] CDI.KEYID = 6
1,211,895 UART: [ldev] SUBJECT.KEYID = 5
1,212,321 UART: [ldev] AUTHORITY.KEYID = 7
1,212,784 UART: [ldev] FE.KEYID = 1
1,217,882 UART: [ldev] Erasing FE.KEYID = 1
1,243,407 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,916 UART: [ldev] --
1,282,337 UART: [fwproc] Wait for Commands...
1,283,111 UART: [fwproc] Recv command 0x46574c44
1,283,839 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,976 UART: ROM Fatal Error: 0x000B0008
1,310,133 >>> mbox cmd response: failed
1,310,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,139 >>> mbox cmd response: failed
1,310,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,145 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,089 UART: [kat] SHA2-256
893,739 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,864 UART: [kat] ++
898,016 UART: [kat] sha1
902,370 UART: [kat] SHA2-256
904,310 UART: [kat] SHA2-384
907,209 UART: [kat] SHA2-512-ACC
909,110 UART: [kat] ECC-384
918,885 UART: [kat] HMAC-384Kdf
923,319 UART: [kat] LMS
1,171,647 UART: [kat] --
1,172,306 UART: [cold-reset] ++
1,172,706 UART: [fht] FHT @ 0x50003400
1,175,441 UART: [idev] ++
1,175,609 UART: [idev] CDI.KEYID = 6
1,175,969 UART: [idev] SUBJECT.KEYID = 7
1,176,393 UART: [idev] UDS.KEYID = 0
1,176,738 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,425 UART: [idev] Erasing UDS.KEYID = 0
1,201,764 UART: [idev] Sha1 KeyId Algorithm
1,210,318 UART: [idev] --
1,211,348 UART: [ldev] ++
1,211,516 UART: [ldev] CDI.KEYID = 6
1,211,879 UART: [ldev] SUBJECT.KEYID = 5
1,212,305 UART: [ldev] AUTHORITY.KEYID = 7
1,212,768 UART: [ldev] FE.KEYID = 1
1,217,794 UART: [ldev] Erasing FE.KEYID = 1
1,244,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,094 UART: [ldev] --
1,283,595 UART: [fwproc] Wait for Commands...
1,284,173 UART: [fwproc] Recv command 0x46574c44
1,284,901 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,672 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,976 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,849 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,612 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,164,692 >>> mbox cmd response: failed
1,164,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,698 >>> mbox cmd response: failed
1,164,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,704 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,678 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,774 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
891,444 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,573 UART: [kat] ++
895,725 UART: [kat] sha1
899,975 UART: [kat] SHA2-256
901,915 UART: [kat] SHA2-384
904,432 UART: [kat] SHA2-512-ACC
906,333 UART: [kat] ECC-384
915,822 UART: [kat] HMAC-384Kdf
920,408 UART: [kat] LMS
1,168,720 UART: [kat] --
1,169,527 UART: [cold-reset] ++
1,169,997 UART: [fht] FHT @ 0x50003400
1,172,597 UART: [idev] ++
1,172,765 UART: [idev] CDI.KEYID = 6
1,173,126 UART: [idev] SUBJECT.KEYID = 7
1,173,551 UART: [idev] UDS.KEYID = 0
1,173,897 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,293 UART: [idev] Erasing UDS.KEYID = 0
1,198,349 UART: [idev] Sha1 KeyId Algorithm
1,207,165 UART: [idev] --
1,208,192 UART: [ldev] ++
1,208,360 UART: [ldev] CDI.KEYID = 6
1,208,724 UART: [ldev] SUBJECT.KEYID = 5
1,209,151 UART: [ldev] AUTHORITY.KEYID = 7
1,209,614 UART: [ldev] FE.KEYID = 1
1,214,588 UART: [ldev] Erasing FE.KEYID = 1
1,241,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,318 UART: [ldev] --
1,280,636 UART: [fwproc] Wait for Commands...
1,281,315 UART: [fwproc] Recv command 0x46574c44
1,282,048 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,588 UART: ROM Fatal Error: 0x000B0008
1,308,745 >>> mbox cmd response: failed
1,308,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,751 >>> mbox cmd response: failed
1,308,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,757 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
890,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,041 UART: [kat] ++
895,193 UART: [kat] sha1
899,531 UART: [kat] SHA2-256
901,471 UART: [kat] SHA2-384
904,070 UART: [kat] SHA2-512-ACC
905,971 UART: [kat] ECC-384
915,486 UART: [kat] HMAC-384Kdf
920,064 UART: [kat] LMS
1,168,376 UART: [kat] --
1,169,643 UART: [cold-reset] ++
1,170,193 UART: [fht] FHT @ 0x50003400
1,172,985 UART: [idev] ++
1,173,153 UART: [idev] CDI.KEYID = 6
1,173,514 UART: [idev] SUBJECT.KEYID = 7
1,173,939 UART: [idev] UDS.KEYID = 0
1,174,285 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,895 UART: [idev] Erasing UDS.KEYID = 0
1,199,025 UART: [idev] Sha1 KeyId Algorithm
1,207,813 UART: [idev] --
1,208,962 UART: [ldev] ++
1,209,130 UART: [ldev] CDI.KEYID = 6
1,209,494 UART: [ldev] SUBJECT.KEYID = 5
1,209,921 UART: [ldev] AUTHORITY.KEYID = 7
1,210,384 UART: [ldev] FE.KEYID = 1
1,215,400 UART: [ldev] Erasing FE.KEYID = 1
1,241,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,174 UART: [ldev] --
1,280,544 UART: [fwproc] Wait for Commands...
1,281,347 UART: [fwproc] Recv command 0x46574c44
1,282,080 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,451 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,760 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,546 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,382 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,184 >>> mbox cmd response: failed
1,160,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,190 >>> mbox cmd response: failed
1,160,190 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,196 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,200 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,694 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,215 UART: [kat] SHA2-256
891,765 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,894 UART: [kat] ++
896,046 UART: [kat] sha1
900,274 UART: [kat] SHA2-256
902,214 UART: [kat] SHA2-384
905,039 UART: [kat] SHA2-512-ACC
906,940 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
920,997 UART: [kat] LMS
1,169,309 UART: [kat] --
1,169,896 UART: [cold-reset] ++
1,170,410 UART: [fht] FHT @ 0x50003400
1,172,852 UART: [idev] ++
1,173,020 UART: [idev] CDI.KEYID = 6
1,173,381 UART: [idev] SUBJECT.KEYID = 7
1,173,806 UART: [idev] UDS.KEYID = 0
1,174,152 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,672 UART: [idev] Erasing UDS.KEYID = 0
1,198,648 UART: [idev] Sha1 KeyId Algorithm
1,207,314 UART: [idev] --
1,208,543 UART: [ldev] ++
1,208,711 UART: [ldev] CDI.KEYID = 6
1,209,075 UART: [ldev] SUBJECT.KEYID = 5
1,209,502 UART: [ldev] AUTHORITY.KEYID = 7
1,209,965 UART: [ldev] FE.KEYID = 1
1,215,135 UART: [ldev] Erasing FE.KEYID = 1
1,242,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,105 UART: [ldev] --
1,281,599 UART: [fwproc] Wait for Commands...
1,282,216 UART: [fwproc] Recv command 0x46574c44
1,282,949 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,509 UART: ROM Fatal Error: 0x000B0008
1,308,666 >>> mbox cmd response: failed
1,308,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,672 >>> mbox cmd response: failed
1,308,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,678 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,390 UART: [state] WD Timer not started. Device not locked for debugging
87,731 UART: [kat] SHA2-256
891,281 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,410 UART: [kat] ++
895,562 UART: [kat] sha1
899,836 UART: [kat] SHA2-256
901,776 UART: [kat] SHA2-384
904,459 UART: [kat] SHA2-512-ACC
906,360 UART: [kat] ECC-384
916,177 UART: [kat] HMAC-384Kdf
920,995 UART: [kat] LMS
1,169,307 UART: [kat] --
1,170,316 UART: [cold-reset] ++
1,170,750 UART: [fht] FHT @ 0x50003400
1,173,624 UART: [idev] ++
1,173,792 UART: [idev] CDI.KEYID = 6
1,174,153 UART: [idev] SUBJECT.KEYID = 7
1,174,578 UART: [idev] UDS.KEYID = 0
1,174,924 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,660 UART: [idev] Erasing UDS.KEYID = 0
1,199,502 UART: [idev] Sha1 KeyId Algorithm
1,208,392 UART: [idev] --
1,209,553 UART: [ldev] ++
1,209,721 UART: [ldev] CDI.KEYID = 6
1,210,085 UART: [ldev] SUBJECT.KEYID = 5
1,210,512 UART: [ldev] AUTHORITY.KEYID = 7
1,210,975 UART: [ldev] FE.KEYID = 1
1,216,319 UART: [ldev] Erasing FE.KEYID = 1
1,242,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,989 UART: [ldev] --
1,281,481 UART: [fwproc] Wait for Commands...
1,282,250 UART: [fwproc] Recv command 0x46574c44
1,282,983 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,826 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,135 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,989 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,465 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,031 >>> mbox cmd response: failed
1,162,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,037 >>> mbox cmd response: failed
1,162,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,043 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,541 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,623 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,766 UART: [state] LifecycleState = Unprovisioned
85,421 UART: [state] DebugLocked = No
86,155 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,837 UART: [kat] SHA2-256
881,768 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,883 UART: [kat] ++
886,035 UART: [kat] sha1
890,075 UART: [kat] SHA2-256
892,013 UART: [kat] SHA2-384
894,846 UART: [kat] SHA2-512-ACC
896,747 UART: [kat] ECC-384
902,416 UART: [kat] HMAC-384Kdf
907,084 UART: [kat] LMS
1,475,280 UART: [kat] --
1,476,157 UART: [cold-reset] ++
1,476,677 UART: [fht] Storing FHT @ 0x50003400
1,479,366 UART: [idev] ++
1,479,534 UART: [idev] CDI.KEYID = 6
1,479,894 UART: [idev] SUBJECT.KEYID = 7
1,480,318 UART: [idev] UDS.KEYID = 0
1,480,663 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,586 UART: [idev] Erasing UDS.KEYID = 0
1,505,392 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,962 UART: [idev] --
1,514,825 UART: [ldev] ++
1,514,993 UART: [ldev] CDI.KEYID = 6
1,515,356 UART: [ldev] SUBJECT.KEYID = 5
1,515,782 UART: [ldev] AUTHORITY.KEYID = 7
1,516,245 UART: [ldev] FE.KEYID = 1
1,521,581 UART: [ldev] Erasing FE.KEYID = 1
1,546,728 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,262 UART: [ldev] --
1,585,595 UART: [fwproc] Waiting for Commands...
1,586,216 UART: [fwproc] Received command 0x46574c44
1,587,007 UART: [fwproc] Received Image of size 114332 bytes
1,612,027 UART: ROM Fatal Error: 0x000B0009
1,613,184 >>> mbox cmd response: failed
1,613,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,190 >>> mbox cmd response: failed
1,613,190 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,196 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,291 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,815 UART: [kat] SHA2-256
881,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,861 UART: [kat] ++
886,013 UART: [kat] sha1
890,215 UART: [kat] SHA2-256
892,153 UART: [kat] SHA2-384
894,938 UART: [kat] SHA2-512-ACC
896,839 UART: [kat] ECC-384
902,432 UART: [kat] HMAC-384Kdf
907,232 UART: [kat] LMS
1,475,428 UART: [kat] --
1,476,223 UART: [cold-reset] ++
1,476,581 UART: [fht] Storing FHT @ 0x50003400
1,479,406 UART: [idev] ++
1,479,574 UART: [idev] CDI.KEYID = 6
1,479,934 UART: [idev] SUBJECT.KEYID = 7
1,480,358 UART: [idev] UDS.KEYID = 0
1,480,703 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,252 UART: [idev] Erasing UDS.KEYID = 0
1,504,900 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,648 UART: [idev] --
1,514,617 UART: [ldev] ++
1,514,785 UART: [ldev] CDI.KEYID = 6
1,515,148 UART: [ldev] SUBJECT.KEYID = 5
1,515,574 UART: [ldev] AUTHORITY.KEYID = 7
1,516,037 UART: [ldev] FE.KEYID = 1
1,521,361 UART: [ldev] Erasing FE.KEYID = 1
1,546,462 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,538 UART: [ldev] --
1,586,013 UART: [fwproc] Waiting for Commands...
1,586,700 UART: [fwproc] Received command 0x46574c44
1,587,491 UART: [fwproc] Received Image of size 114332 bytes
2,886,206 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,094 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,446 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,325 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,291 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,465,423 >>> mbox cmd response: failed
1,465,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,429 >>> mbox cmd response: failed
1,465,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,435 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,209 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,191 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,679 UART: [state] LifecycleState = Unprovisioned
85,334 UART: [state] DebugLocked = No
85,942 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,584 UART: [kat] SHA2-256
881,515 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,630 UART: [kat] ++
885,782 UART: [kat] sha1
890,078 UART: [kat] SHA2-256
892,016 UART: [kat] SHA2-384
894,697 UART: [kat] SHA2-512-ACC
896,598 UART: [kat] ECC-384
902,431 UART: [kat] HMAC-384Kdf
907,235 UART: [kat] LMS
1,475,431 UART: [kat] --
1,476,236 UART: [cold-reset] ++
1,476,620 UART: [fht] Storing FHT @ 0x50003400
1,479,315 UART: [idev] ++
1,479,483 UART: [idev] CDI.KEYID = 6
1,479,843 UART: [idev] SUBJECT.KEYID = 7
1,480,267 UART: [idev] UDS.KEYID = 0
1,480,612 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,703 UART: [idev] Erasing UDS.KEYID = 0
1,505,995 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,425 UART: [idev] --
1,515,442 UART: [ldev] ++
1,515,610 UART: [ldev] CDI.KEYID = 6
1,515,973 UART: [ldev] SUBJECT.KEYID = 5
1,516,399 UART: [ldev] AUTHORITY.KEYID = 7
1,516,862 UART: [ldev] FE.KEYID = 1
1,522,210 UART: [ldev] Erasing FE.KEYID = 1
1,547,841 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,797 UART: [ldev] --
1,587,224 UART: [fwproc] Waiting for Commands...
1,587,875 UART: [fwproc] Received command 0x46574c44
1,588,666 UART: [fwproc] Received Image of size 114332 bytes
1,613,854 UART: ROM Fatal Error: 0x000B0009
1,615,011 >>> mbox cmd response: failed
1,615,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,017 >>> mbox cmd response: failed
1,615,017 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,023 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,780 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,374 UART: [kat] SHA2-256
882,305 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,420 UART: [kat] ++
886,572 UART: [kat] sha1
890,842 UART: [kat] SHA2-256
892,780 UART: [kat] SHA2-384
895,619 UART: [kat] SHA2-512-ACC
897,520 UART: [kat] ECC-384
903,369 UART: [kat] HMAC-384Kdf
908,049 UART: [kat] LMS
1,476,245 UART: [kat] --
1,477,096 UART: [cold-reset] ++
1,477,626 UART: [fht] Storing FHT @ 0x50003400
1,480,487 UART: [idev] ++
1,480,655 UART: [idev] CDI.KEYID = 6
1,481,015 UART: [idev] SUBJECT.KEYID = 7
1,481,439 UART: [idev] UDS.KEYID = 0
1,481,784 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,171 UART: [idev] Erasing UDS.KEYID = 0
1,505,563 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,073 UART: [idev] --
1,514,900 UART: [ldev] ++
1,515,068 UART: [ldev] CDI.KEYID = 6
1,515,431 UART: [ldev] SUBJECT.KEYID = 5
1,515,857 UART: [ldev] AUTHORITY.KEYID = 7
1,516,320 UART: [ldev] FE.KEYID = 1
1,521,794 UART: [ldev] Erasing FE.KEYID = 1
1,547,611 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,525 UART: [ldev] --
1,586,964 UART: [fwproc] Waiting for Commands...
1,587,825 UART: [fwproc] Received command 0x46574c44
1,588,616 UART: [fwproc] Received Image of size 114332 bytes
2,885,713 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,327 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,679 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,444 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,418 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,465,800 >>> mbox cmd response: failed
1,465,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,806 >>> mbox cmd response: failed
1,465,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,812 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,240 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,740 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,912 UART: [state] LifecycleState = Unprovisioned
85,567 UART: [state] DebugLocked = No
86,065 UART: [state] WD Timer not started. Device not locked for debugging
87,216 UART: [kat] SHA2-256
892,866 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,991 UART: [kat] ++
897,143 UART: [kat] sha1
901,287 UART: [kat] SHA2-256
903,227 UART: [kat] SHA2-384
906,004 UART: [kat] SHA2-512-ACC
907,905 UART: [kat] ECC-384
917,558 UART: [kat] HMAC-384Kdf
922,150 UART: [kat] LMS
1,170,478 UART: [kat] --
1,171,279 UART: [cold-reset] ++
1,171,843 UART: [fht] FHT @ 0x50003400
1,174,610 UART: [idev] ++
1,174,778 UART: [idev] CDI.KEYID = 6
1,175,138 UART: [idev] SUBJECT.KEYID = 7
1,175,562 UART: [idev] UDS.KEYID = 0
1,175,907 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,148 UART: [idev] Erasing UDS.KEYID = 0
1,200,125 UART: [idev] Sha1 KeyId Algorithm
1,208,545 UART: [idev] --
1,209,821 UART: [ldev] ++
1,209,989 UART: [ldev] CDI.KEYID = 6
1,210,352 UART: [ldev] SUBJECT.KEYID = 5
1,210,778 UART: [ldev] AUTHORITY.KEYID = 7
1,211,241 UART: [ldev] FE.KEYID = 1
1,216,567 UART: [ldev] Erasing FE.KEYID = 1
1,242,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,725 UART: [ldev] --
1,282,086 UART: [fwproc] Wait for Commands...
1,282,656 UART: [fwproc] Recv command 0x46574c44
1,283,384 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,688 UART: ROM Fatal Error: 0x000B0009
1,309,845 >>> mbox cmd response: failed
1,309,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,851 >>> mbox cmd response: failed
1,309,851 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,857 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,412 UART: [kat] SHA2-256
893,062 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,187 UART: [kat] ++
897,339 UART: [kat] sha1
901,421 UART: [kat] SHA2-256
903,361 UART: [kat] SHA2-384
906,030 UART: [kat] SHA2-512-ACC
907,931 UART: [kat] ECC-384
917,712 UART: [kat] HMAC-384Kdf
922,462 UART: [kat] LMS
1,170,790 UART: [kat] --
1,171,599 UART: [cold-reset] ++
1,172,173 UART: [fht] FHT @ 0x50003400
1,174,868 UART: [idev] ++
1,175,036 UART: [idev] CDI.KEYID = 6
1,175,396 UART: [idev] SUBJECT.KEYID = 7
1,175,820 UART: [idev] UDS.KEYID = 0
1,176,165 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,950 UART: [idev] Erasing UDS.KEYID = 0
1,200,635 UART: [idev] Sha1 KeyId Algorithm
1,209,073 UART: [idev] --
1,210,009 UART: [ldev] ++
1,210,177 UART: [ldev] CDI.KEYID = 6
1,210,540 UART: [ldev] SUBJECT.KEYID = 5
1,210,966 UART: [ldev] AUTHORITY.KEYID = 7
1,211,429 UART: [ldev] FE.KEYID = 1
1,216,607 UART: [ldev] Erasing FE.KEYID = 1
1,242,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,361 UART: [ldev] --
1,281,816 UART: [fwproc] Wait for Commands...
1,282,490 UART: [fwproc] Recv command 0x46574c44
1,283,218 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,017 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,321 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,066 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,469 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,165,282 >>> mbox cmd response: failed
1,165,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,288 >>> mbox cmd response: failed
1,165,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,294 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,211 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,457 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
893,615 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,740 UART: [kat] ++
897,892 UART: [kat] sha1
902,202 UART: [kat] SHA2-256
904,142 UART: [kat] SHA2-384
906,855 UART: [kat] SHA2-512-ACC
908,756 UART: [kat] ECC-384
918,987 UART: [kat] HMAC-384Kdf
923,621 UART: [kat] LMS
1,171,949 UART: [kat] --
1,172,800 UART: [cold-reset] ++
1,173,320 UART: [fht] FHT @ 0x50003400
1,175,757 UART: [idev] ++
1,175,925 UART: [idev] CDI.KEYID = 6
1,176,285 UART: [idev] SUBJECT.KEYID = 7
1,176,709 UART: [idev] UDS.KEYID = 0
1,177,054 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,439 UART: [idev] Erasing UDS.KEYID = 0
1,201,836 UART: [idev] Sha1 KeyId Algorithm
1,210,368 UART: [idev] --
1,211,374 UART: [ldev] ++
1,211,542 UART: [ldev] CDI.KEYID = 6
1,211,905 UART: [ldev] SUBJECT.KEYID = 5
1,212,331 UART: [ldev] AUTHORITY.KEYID = 7
1,212,794 UART: [ldev] FE.KEYID = 1
1,217,918 UART: [ldev] Erasing FE.KEYID = 1
1,243,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,848 UART: [ldev] --
1,283,129 UART: [fwproc] Wait for Commands...
1,283,937 UART: [fwproc] Recv command 0x46574c44
1,284,665 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,801 UART: ROM Fatal Error: 0x000B0009
1,310,958 >>> mbox cmd response: failed
1,310,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,964 >>> mbox cmd response: failed
1,310,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,970 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
893,549 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,674 UART: [kat] ++
897,826 UART: [kat] sha1
902,164 UART: [kat] SHA2-256
904,104 UART: [kat] SHA2-384
906,995 UART: [kat] SHA2-512-ACC
908,896 UART: [kat] ECC-384
918,573 UART: [kat] HMAC-384Kdf
923,113 UART: [kat] LMS
1,171,441 UART: [kat] --
1,172,400 UART: [cold-reset] ++
1,172,792 UART: [fht] FHT @ 0x50003400
1,175,343 UART: [idev] ++
1,175,511 UART: [idev] CDI.KEYID = 6
1,175,871 UART: [idev] SUBJECT.KEYID = 7
1,176,295 UART: [idev] UDS.KEYID = 0
1,176,640 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,329 UART: [idev] Erasing UDS.KEYID = 0
1,201,024 UART: [idev] Sha1 KeyId Algorithm
1,209,402 UART: [idev] --
1,210,454 UART: [ldev] ++
1,210,622 UART: [ldev] CDI.KEYID = 6
1,210,985 UART: [ldev] SUBJECT.KEYID = 5
1,211,411 UART: [ldev] AUTHORITY.KEYID = 7
1,211,874 UART: [ldev] FE.KEYID = 1
1,217,160 UART: [ldev] Erasing FE.KEYID = 1
1,244,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,322 UART: [ldev] --
1,283,721 UART: [fwproc] Wait for Commands...
1,284,401 UART: [fwproc] Recv command 0x46574c44
1,285,129 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,341 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,766 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,070 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,987 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,840 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,166,987 >>> mbox cmd response: failed
1,166,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,993 >>> mbox cmd response: failed
1,166,993 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,999 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,190 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,128 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,685 UART: [state] WD Timer not started. Device not locked for debugging
87,916 UART: [kat] SHA2-256
891,466 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,595 UART: [kat] ++
895,747 UART: [kat] sha1
899,823 UART: [kat] SHA2-256
901,763 UART: [kat] SHA2-384
904,518 UART: [kat] SHA2-512-ACC
906,419 UART: [kat] ECC-384
916,130 UART: [kat] HMAC-384Kdf
920,644 UART: [kat] LMS
1,168,956 UART: [kat] --
1,169,937 UART: [cold-reset] ++
1,170,363 UART: [fht] FHT @ 0x50003400
1,173,137 UART: [idev] ++
1,173,305 UART: [idev] CDI.KEYID = 6
1,173,666 UART: [idev] SUBJECT.KEYID = 7
1,174,091 UART: [idev] UDS.KEYID = 0
1,174,437 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,295 UART: [idev] Erasing UDS.KEYID = 0
1,198,993 UART: [idev] Sha1 KeyId Algorithm
1,207,901 UART: [idev] --
1,209,094 UART: [ldev] ++
1,209,262 UART: [ldev] CDI.KEYID = 6
1,209,626 UART: [ldev] SUBJECT.KEYID = 5
1,210,053 UART: [ldev] AUTHORITY.KEYID = 7
1,210,516 UART: [ldev] FE.KEYID = 1
1,215,890 UART: [ldev] Erasing FE.KEYID = 1
1,242,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,778 UART: [ldev] --
1,282,206 UART: [fwproc] Wait for Commands...
1,282,913 UART: [fwproc] Recv command 0x46574c44
1,283,646 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,080 UART: ROM Fatal Error: 0x000B0009
1,310,237 >>> mbox cmd response: failed
1,310,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,243 >>> mbox cmd response: failed
1,310,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,249 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,746 UART: [state] LifecycleState = Unprovisioned
85,401 UART: [state] DebugLocked = No
86,091 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [kat] SHA2-256
890,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,001 UART: [kat] ++
895,153 UART: [kat] sha1
899,493 UART: [kat] SHA2-256
901,433 UART: [kat] SHA2-384
904,280 UART: [kat] SHA2-512-ACC
906,181 UART: [kat] ECC-384
915,822 UART: [kat] HMAC-384Kdf
920,262 UART: [kat] LMS
1,168,574 UART: [kat] --
1,169,301 UART: [cold-reset] ++
1,169,809 UART: [fht] FHT @ 0x50003400
1,172,409 UART: [idev] ++
1,172,577 UART: [idev] CDI.KEYID = 6
1,172,938 UART: [idev] SUBJECT.KEYID = 7
1,173,363 UART: [idev] UDS.KEYID = 0
1,173,709 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,355 UART: [idev] Erasing UDS.KEYID = 0
1,198,479 UART: [idev] Sha1 KeyId Algorithm
1,207,367 UART: [idev] --
1,208,370 UART: [ldev] ++
1,208,538 UART: [ldev] CDI.KEYID = 6
1,208,902 UART: [ldev] SUBJECT.KEYID = 5
1,209,329 UART: [ldev] AUTHORITY.KEYID = 7
1,209,792 UART: [ldev] FE.KEYID = 1
1,214,696 UART: [ldev] Erasing FE.KEYID = 1
1,241,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,318 UART: [ldev] --
1,280,750 UART: [fwproc] Wait for Commands...
1,281,415 UART: [fwproc] Recv command 0x46574c44
1,282,148 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,897 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,279 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,588 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,368 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,536 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,064 >>> mbox cmd response: failed
1,161,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,070 >>> mbox cmd response: failed
1,161,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,076 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,978 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,836 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,924 UART: [state] WD Timer not started. Device not locked for debugging
88,255 UART: [kat] SHA2-256
891,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,934 UART: [kat] ++
896,086 UART: [kat] sha1
900,456 UART: [kat] SHA2-256
902,396 UART: [kat] SHA2-384
905,181 UART: [kat] SHA2-512-ACC
907,082 UART: [kat] ECC-384
916,821 UART: [kat] HMAC-384Kdf
921,417 UART: [kat] LMS
1,169,729 UART: [kat] --
1,170,684 UART: [cold-reset] ++
1,171,120 UART: [fht] FHT @ 0x50003400
1,173,832 UART: [idev] ++
1,174,000 UART: [idev] CDI.KEYID = 6
1,174,361 UART: [idev] SUBJECT.KEYID = 7
1,174,786 UART: [idev] UDS.KEYID = 0
1,175,132 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,550 UART: [idev] Erasing UDS.KEYID = 0
1,199,762 UART: [idev] Sha1 KeyId Algorithm
1,208,554 UART: [idev] --
1,209,671 UART: [ldev] ++
1,209,839 UART: [ldev] CDI.KEYID = 6
1,210,203 UART: [ldev] SUBJECT.KEYID = 5
1,210,630 UART: [ldev] AUTHORITY.KEYID = 7
1,211,093 UART: [ldev] FE.KEYID = 1
1,216,505 UART: [ldev] Erasing FE.KEYID = 1
1,243,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,017 UART: [ldev] --
1,282,305 UART: [fwproc] Wait for Commands...
1,283,086 UART: [fwproc] Recv command 0x46574c44
1,283,819 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,945 UART: ROM Fatal Error: 0x000B0009
1,311,102 >>> mbox cmd response: failed
1,311,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,108 >>> mbox cmd response: failed
1,311,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,114 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,898 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
891,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,702 UART: [kat] ++
895,854 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,591 UART: [kat] SHA2-512-ACC
906,492 UART: [kat] ECC-384
916,533 UART: [kat] HMAC-384Kdf
921,405 UART: [kat] LMS
1,169,717 UART: [kat] --
1,170,434 UART: [cold-reset] ++
1,170,828 UART: [fht] FHT @ 0x50003400
1,173,538 UART: [idev] ++
1,173,706 UART: [idev] CDI.KEYID = 6
1,174,067 UART: [idev] SUBJECT.KEYID = 7
1,174,492 UART: [idev] UDS.KEYID = 0
1,174,838 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,518 UART: [idev] Erasing UDS.KEYID = 0
1,199,720 UART: [idev] Sha1 KeyId Algorithm
1,208,586 UART: [idev] --
1,209,695 UART: [ldev] ++
1,209,863 UART: [ldev] CDI.KEYID = 6
1,210,227 UART: [ldev] SUBJECT.KEYID = 5
1,210,654 UART: [ldev] AUTHORITY.KEYID = 7
1,211,117 UART: [ldev] FE.KEYID = 1
1,216,737 UART: [ldev] Erasing FE.KEYID = 1
1,243,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,511 UART: [ldev] --
1,282,867 UART: [fwproc] Wait for Commands...
1,283,590 UART: [fwproc] Recv command 0x46574c44
1,284,323 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,260 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,569 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,313 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,397 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,853 >>> mbox cmd response: failed
1,161,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,859 >>> mbox cmd response: failed
1,161,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,865 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,243 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,783 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,189 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,907 UART: [kat] SHA2-256
881,838 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,953 UART: [kat] ++
886,105 UART: [kat] sha1
890,333 UART: [kat] SHA2-256
892,271 UART: [kat] SHA2-384
894,942 UART: [kat] SHA2-512-ACC
896,843 UART: [kat] ECC-384
902,260 UART: [kat] HMAC-384Kdf
906,872 UART: [kat] LMS
1,475,068 UART: [kat] --
1,475,977 UART: [cold-reset] ++
1,476,429 UART: [fht] Storing FHT @ 0x50003400
1,479,232 UART: [idev] ++
1,479,400 UART: [idev] CDI.KEYID = 6
1,479,760 UART: [idev] SUBJECT.KEYID = 7
1,480,184 UART: [idev] UDS.KEYID = 0
1,480,529 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,518 UART: [idev] Erasing UDS.KEYID = 0
1,505,022 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,588 UART: [idev] --
1,514,655 UART: [ldev] ++
1,514,823 UART: [ldev] CDI.KEYID = 6
1,515,186 UART: [ldev] SUBJECT.KEYID = 5
1,515,612 UART: [ldev] AUTHORITY.KEYID = 7
1,516,075 UART: [ldev] FE.KEYID = 1
1,521,075 UART: [ldev] Erasing FE.KEYID = 1
1,546,840 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,778 UART: [ldev] --
1,586,087 UART: [fwproc] Waiting for Commands...
1,586,818 UART: [fwproc] Received command 0x46574c44
1,587,609 UART: [fwproc] Received Image of size 114332 bytes
1,625,151 UART: ROM Fatal Error: 0x000B000C
1,626,310 >>> mbox cmd response: failed
1,626,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,316 >>> mbox cmd response: failed
1,626,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,322 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,183 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,809 UART: [kat] SHA2-256
881,740 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,855 UART: [kat] ++
886,007 UART: [kat] sha1
890,217 UART: [kat] SHA2-256
892,155 UART: [kat] SHA2-384
894,846 UART: [kat] SHA2-512-ACC
896,747 UART: [kat] ECC-384
902,444 UART: [kat] HMAC-384Kdf
906,894 UART: [kat] LMS
1,475,090 UART: [kat] --
1,475,915 UART: [cold-reset] ++
1,476,319 UART: [fht] Storing FHT @ 0x50003400
1,479,002 UART: [idev] ++
1,479,170 UART: [idev] CDI.KEYID = 6
1,479,530 UART: [idev] SUBJECT.KEYID = 7
1,479,954 UART: [idev] UDS.KEYID = 0
1,480,299 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,872 UART: [idev] Erasing UDS.KEYID = 0
1,504,532 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,114 UART: [idev] --
1,514,249 UART: [ldev] ++
1,514,417 UART: [ldev] CDI.KEYID = 6
1,514,780 UART: [ldev] SUBJECT.KEYID = 5
1,515,206 UART: [ldev] AUTHORITY.KEYID = 7
1,515,669 UART: [ldev] FE.KEYID = 1
1,521,085 UART: [ldev] Erasing FE.KEYID = 1
1,546,006 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,716 UART: [ldev] --
1,585,185 UART: [fwproc] Waiting for Commands...
1,585,998 UART: [fwproc] Received command 0x46574c44
1,586,789 UART: [fwproc] Received Image of size 114332 bytes
2,884,432 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,176 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,528 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,513 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,067 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,478,837 >>> mbox cmd response: failed
1,478,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,843 >>> mbox cmd response: failed
1,478,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,849 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,349 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,407 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,872 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,416 UART: [kat] SHA2-256
882,347 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,462 UART: [kat] ++
886,614 UART: [kat] sha1
890,816 UART: [kat] SHA2-256
892,754 UART: [kat] SHA2-384
895,489 UART: [kat] SHA2-512-ACC
897,390 UART: [kat] ECC-384
903,469 UART: [kat] HMAC-384Kdf
908,155 UART: [kat] LMS
1,476,351 UART: [kat] --
1,477,292 UART: [cold-reset] ++
1,477,752 UART: [fht] Storing FHT @ 0x50003400
1,480,739 UART: [idev] ++
1,480,907 UART: [idev] CDI.KEYID = 6
1,481,267 UART: [idev] SUBJECT.KEYID = 7
1,481,691 UART: [idev] UDS.KEYID = 0
1,482,036 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,667 UART: [idev] Erasing UDS.KEYID = 0
1,506,355 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,067 UART: [idev] --
1,516,110 UART: [ldev] ++
1,516,278 UART: [ldev] CDI.KEYID = 6
1,516,641 UART: [ldev] SUBJECT.KEYID = 5
1,517,067 UART: [ldev] AUTHORITY.KEYID = 7
1,517,530 UART: [ldev] FE.KEYID = 1
1,522,622 UART: [ldev] Erasing FE.KEYID = 1
1,548,417 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,149 UART: [ldev] --
1,587,520 UART: [fwproc] Waiting for Commands...
1,588,181 UART: [fwproc] Received command 0x46574c44
1,588,972 UART: [fwproc] Received Image of size 114332 bytes
1,626,032 UART: ROM Fatal Error: 0x000B000C
1,627,191 >>> mbox cmd response: failed
1,627,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,197 >>> mbox cmd response: failed
1,627,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,203 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,087 UART: [state] LifecycleState = Unprovisioned
85,742 UART: [state] DebugLocked = No
86,278 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,758 UART: [kat] SHA2-256
881,689 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,804 UART: [kat] ++
885,956 UART: [kat] sha1
890,178 UART: [kat] SHA2-256
892,116 UART: [kat] SHA2-384
894,645 UART: [kat] SHA2-512-ACC
896,546 UART: [kat] ECC-384
902,117 UART: [kat] HMAC-384Kdf
906,639 UART: [kat] LMS
1,474,835 UART: [kat] --
1,475,398 UART: [cold-reset] ++
1,475,772 UART: [fht] Storing FHT @ 0x50003400
1,478,463 UART: [idev] ++
1,478,631 UART: [idev] CDI.KEYID = 6
1,478,991 UART: [idev] SUBJECT.KEYID = 7
1,479,415 UART: [idev] UDS.KEYID = 0
1,479,760 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,341 UART: [idev] Erasing UDS.KEYID = 0
1,503,553 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,149 UART: [idev] --
1,513,302 UART: [ldev] ++
1,513,470 UART: [ldev] CDI.KEYID = 6
1,513,833 UART: [ldev] SUBJECT.KEYID = 5
1,514,259 UART: [ldev] AUTHORITY.KEYID = 7
1,514,722 UART: [ldev] FE.KEYID = 1
1,520,018 UART: [ldev] Erasing FE.KEYID = 1
1,544,935 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,729 UART: [ldev] --
1,584,222 UART: [fwproc] Waiting for Commands...
1,585,071 UART: [fwproc] Received command 0x46574c44
1,585,862 UART: [fwproc] Received Image of size 114332 bytes
2,883,681 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,933 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,285 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,024 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,780 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,478,316 >>> mbox cmd response: failed
1,478,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,322 >>> mbox cmd response: failed
1,478,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,328 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,790 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,568 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,578 UART: [state] LifecycleState = Unprovisioned
86,233 UART: [state] DebugLocked = No
86,875 UART: [state] WD Timer not started. Device not locked for debugging
87,994 UART: [kat] SHA2-256
893,644 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,769 UART: [kat] ++
897,921 UART: [kat] sha1
902,221 UART: [kat] SHA2-256
904,161 UART: [kat] SHA2-384
906,980 UART: [kat] SHA2-512-ACC
908,881 UART: [kat] ECC-384
918,738 UART: [kat] HMAC-384Kdf
923,434 UART: [kat] LMS
1,171,762 UART: [kat] --
1,172,773 UART: [cold-reset] ++
1,173,125 UART: [fht] FHT @ 0x50003400
1,175,702 UART: [idev] ++
1,175,870 UART: [idev] CDI.KEYID = 6
1,176,230 UART: [idev] SUBJECT.KEYID = 7
1,176,654 UART: [idev] UDS.KEYID = 0
1,176,999 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,798 UART: [idev] Erasing UDS.KEYID = 0
1,201,769 UART: [idev] Sha1 KeyId Algorithm
1,210,069 UART: [idev] --
1,211,257 UART: [ldev] ++
1,211,425 UART: [ldev] CDI.KEYID = 6
1,211,788 UART: [ldev] SUBJECT.KEYID = 5
1,212,214 UART: [ldev] AUTHORITY.KEYID = 7
1,212,677 UART: [ldev] FE.KEYID = 1
1,217,525 UART: [ldev] Erasing FE.KEYID = 1
1,244,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,467 UART: [ldev] --
1,283,976 UART: [fwproc] Wait for Commands...
1,284,564 UART: [fwproc] Recv command 0x46574c44
1,285,292 UART: [fwproc] Recv'd Img size: 114332 bytes
1,322,934 UART: ROM Fatal Error: 0x000B000C
1,324,093 >>> mbox cmd response: failed
1,324,093 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,099 >>> mbox cmd response: failed
1,324,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,105 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,812 UART: [state] LifecycleState = Unprovisioned
85,467 UART: [state] DebugLocked = No
86,115 UART: [state] WD Timer not started. Device not locked for debugging
87,470 UART: [kat] SHA2-256
893,120 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,245 UART: [kat] ++
897,397 UART: [kat] sha1
901,617 UART: [kat] SHA2-256
903,557 UART: [kat] SHA2-384
906,452 UART: [kat] SHA2-512-ACC
908,353 UART: [kat] ECC-384
918,248 UART: [kat] HMAC-384Kdf
922,656 UART: [kat] LMS
1,170,984 UART: [kat] --
1,171,925 UART: [cold-reset] ++
1,172,323 UART: [fht] FHT @ 0x50003400
1,175,008 UART: [idev] ++
1,175,176 UART: [idev] CDI.KEYID = 6
1,175,536 UART: [idev] SUBJECT.KEYID = 7
1,175,960 UART: [idev] UDS.KEYID = 0
1,176,305 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,126 UART: [idev] Erasing UDS.KEYID = 0
1,200,947 UART: [idev] Sha1 KeyId Algorithm
1,209,519 UART: [idev] --
1,210,805 UART: [ldev] ++
1,210,973 UART: [ldev] CDI.KEYID = 6
1,211,336 UART: [ldev] SUBJECT.KEYID = 5
1,211,762 UART: [ldev] AUTHORITY.KEYID = 7
1,212,225 UART: [ldev] FE.KEYID = 1
1,217,173 UART: [ldev] Erasing FE.KEYID = 1
1,244,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,095 UART: [ldev] --
1,283,604 UART: [fwproc] Wait for Commands...
1,284,368 UART: [fwproc] Recv command 0x46574c44
1,285,096 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,410 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,659 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,963 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,854 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,835 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,176,684 >>> mbox cmd response: failed
1,176,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,690 >>> mbox cmd response: failed
1,176,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,696 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,067 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,379 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
893,585 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,710 UART: [kat] ++
897,862 UART: [kat] sha1
902,094 UART: [kat] SHA2-256
904,034 UART: [kat] SHA2-384
906,737 UART: [kat] SHA2-512-ACC
908,638 UART: [kat] ECC-384
918,769 UART: [kat] HMAC-384Kdf
923,487 UART: [kat] LMS
1,171,815 UART: [kat] --
1,172,538 UART: [cold-reset] ++
1,172,982 UART: [fht] FHT @ 0x50003400
1,175,511 UART: [idev] ++
1,175,679 UART: [idev] CDI.KEYID = 6
1,176,039 UART: [idev] SUBJECT.KEYID = 7
1,176,463 UART: [idev] UDS.KEYID = 0
1,176,808 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,679 UART: [idev] Erasing UDS.KEYID = 0
1,202,150 UART: [idev] Sha1 KeyId Algorithm
1,210,698 UART: [idev] --
1,211,524 UART: [ldev] ++
1,211,692 UART: [ldev] CDI.KEYID = 6
1,212,055 UART: [ldev] SUBJECT.KEYID = 5
1,212,481 UART: [ldev] AUTHORITY.KEYID = 7
1,212,944 UART: [ldev] FE.KEYID = 1
1,218,394 UART: [ldev] Erasing FE.KEYID = 1
1,244,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,574 UART: [ldev] --
1,283,867 UART: [fwproc] Wait for Commands...
1,284,689 UART: [fwproc] Recv command 0x46574c44
1,285,417 UART: [fwproc] Recv'd Img size: 114332 bytes
1,322,337 UART: ROM Fatal Error: 0x000B000C
1,323,496 >>> mbox cmd response: failed
1,323,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,502 >>> mbox cmd response: failed
1,323,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,508 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,918 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
893,813 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,938 UART: [kat] ++
898,090 UART: [kat] sha1
902,348 UART: [kat] SHA2-256
904,288 UART: [kat] SHA2-384
906,931 UART: [kat] SHA2-512-ACC
908,832 UART: [kat] ECC-384
918,609 UART: [kat] HMAC-384Kdf
923,107 UART: [kat] LMS
1,171,435 UART: [kat] --
1,172,024 UART: [cold-reset] ++
1,172,458 UART: [fht] FHT @ 0x50003400
1,175,213 UART: [idev] ++
1,175,381 UART: [idev] CDI.KEYID = 6
1,175,741 UART: [idev] SUBJECT.KEYID = 7
1,176,165 UART: [idev] UDS.KEYID = 0
1,176,510 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,057 UART: [idev] Erasing UDS.KEYID = 0
1,201,096 UART: [idev] Sha1 KeyId Algorithm
1,209,656 UART: [idev] --
1,210,538 UART: [ldev] ++
1,210,706 UART: [ldev] CDI.KEYID = 6
1,211,069 UART: [ldev] SUBJECT.KEYID = 5
1,211,495 UART: [ldev] AUTHORITY.KEYID = 7
1,211,958 UART: [ldev] FE.KEYID = 1
1,217,324 UART: [ldev] Erasing FE.KEYID = 1
1,244,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,428 UART: [ldev] --
1,282,751 UART: [fwproc] Wait for Commands...
1,283,533 UART: [fwproc] Recv command 0x46574c44
1,284,261 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,214 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,518 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,377 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,222 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,177,411 >>> mbox cmd response: failed
1,177,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,417 >>> mbox cmd response: failed
1,177,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,423 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,166 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,522 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,756 UART: [state] LifecycleState = Unprovisioned
86,411 UART: [state] DebugLocked = No
87,051 UART: [state] WD Timer not started. Device not locked for debugging
88,240 UART: [kat] SHA2-256
891,790 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,919 UART: [kat] ++
896,071 UART: [kat] sha1
900,535 UART: [kat] SHA2-256
902,475 UART: [kat] SHA2-384
905,340 UART: [kat] SHA2-512-ACC
907,241 UART: [kat] ECC-384
917,084 UART: [kat] HMAC-384Kdf
921,546 UART: [kat] LMS
1,169,858 UART: [kat] --
1,170,653 UART: [cold-reset] ++
1,171,007 UART: [fht] FHT @ 0x50003400
1,173,751 UART: [idev] ++
1,173,919 UART: [idev] CDI.KEYID = 6
1,174,280 UART: [idev] SUBJECT.KEYID = 7
1,174,705 UART: [idev] UDS.KEYID = 0
1,175,051 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,725 UART: [idev] Erasing UDS.KEYID = 0
1,199,473 UART: [idev] Sha1 KeyId Algorithm
1,208,547 UART: [idev] --
1,209,702 UART: [ldev] ++
1,209,870 UART: [ldev] CDI.KEYID = 6
1,210,234 UART: [ldev] SUBJECT.KEYID = 5
1,210,661 UART: [ldev] AUTHORITY.KEYID = 7
1,211,124 UART: [ldev] FE.KEYID = 1
1,216,600 UART: [ldev] Erasing FE.KEYID = 1
1,242,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,423 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,810 UART: [ldev] --
1,282,182 UART: [fwproc] Wait for Commands...
1,282,963 UART: [fwproc] Recv command 0x46574c44
1,283,696 UART: [fwproc] Recv'd Img size: 114332 bytes
1,321,850 UART: ROM Fatal Error: 0x000B000C
1,323,009 >>> mbox cmd response: failed
1,323,009 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,015 >>> mbox cmd response: failed
1,323,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,021 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,448 UART: [state] LifecycleState = Unprovisioned
86,103 UART: [state] DebugLocked = No
86,795 UART: [state] WD Timer not started. Device not locked for debugging
88,116 UART: [kat] SHA2-256
891,666 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,795 UART: [kat] ++
895,947 UART: [kat] sha1
900,149 UART: [kat] SHA2-256
902,089 UART: [kat] SHA2-384
904,746 UART: [kat] SHA2-512-ACC
906,647 UART: [kat] ECC-384
916,022 UART: [kat] HMAC-384Kdf
920,458 UART: [kat] LMS
1,168,770 UART: [kat] --
1,169,907 UART: [cold-reset] ++
1,170,441 UART: [fht] FHT @ 0x50003400
1,173,145 UART: [idev] ++
1,173,313 UART: [idev] CDI.KEYID = 6
1,173,674 UART: [idev] SUBJECT.KEYID = 7
1,174,099 UART: [idev] UDS.KEYID = 0
1,174,445 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,279 UART: [idev] Erasing UDS.KEYID = 0
1,199,109 UART: [idev] Sha1 KeyId Algorithm
1,208,007 UART: [idev] --
1,208,954 UART: [ldev] ++
1,209,122 UART: [ldev] CDI.KEYID = 6
1,209,486 UART: [ldev] SUBJECT.KEYID = 5
1,209,913 UART: [ldev] AUTHORITY.KEYID = 7
1,210,376 UART: [ldev] FE.KEYID = 1
1,215,582 UART: [ldev] Erasing FE.KEYID = 1
1,242,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,234 UART: [ldev] --
1,281,710 UART: [fwproc] Wait for Commands...
1,282,333 UART: [fwproc] Recv command 0x46574c44
1,283,066 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,407 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,917 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,226 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,978 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,932 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,172,038 >>> mbox cmd response: failed
1,172,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,044 >>> mbox cmd response: failed
1,172,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,050 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,696 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,476 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,792 UART: [state] DebugLocked = No
86,304 UART: [state] WD Timer not started. Device not locked for debugging
87,415 UART: [kat] SHA2-256
890,965 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,094 UART: [kat] ++
895,246 UART: [kat] sha1
899,414 UART: [kat] SHA2-256
901,354 UART: [kat] SHA2-384
904,157 UART: [kat] SHA2-512-ACC
906,058 UART: [kat] ECC-384
915,817 UART: [kat] HMAC-384Kdf
920,413 UART: [kat] LMS
1,168,725 UART: [kat] --
1,169,512 UART: [cold-reset] ++
1,170,010 UART: [fht] FHT @ 0x50003400
1,172,624 UART: [idev] ++
1,172,792 UART: [idev] CDI.KEYID = 6
1,173,153 UART: [idev] SUBJECT.KEYID = 7
1,173,578 UART: [idev] UDS.KEYID = 0
1,173,924 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,714 UART: [idev] Erasing UDS.KEYID = 0
1,199,406 UART: [idev] Sha1 KeyId Algorithm
1,208,100 UART: [idev] --
1,209,209 UART: [ldev] ++
1,209,377 UART: [ldev] CDI.KEYID = 6
1,209,741 UART: [ldev] SUBJECT.KEYID = 5
1,210,168 UART: [ldev] AUTHORITY.KEYID = 7
1,210,631 UART: [ldev] FE.KEYID = 1
1,216,105 UART: [ldev] Erasing FE.KEYID = 1
1,242,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,203 UART: [ldev] --
1,281,709 UART: [fwproc] Wait for Commands...
1,282,340 UART: [fwproc] Recv command 0x46574c44
1,283,073 UART: [fwproc] Recv'd Img size: 114332 bytes
1,320,301 UART: ROM Fatal Error: 0x000B000C
1,321,460 >>> mbox cmd response: failed
1,321,460 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,466 >>> mbox cmd response: failed
1,321,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,472 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
899,792 UART: [kat] SHA2-256
901,732 UART: [kat] SHA2-384
904,563 UART: [kat] SHA2-512-ACC
906,464 UART: [kat] ECC-384
916,271 UART: [kat] HMAC-384Kdf
920,957 UART: [kat] LMS
1,169,269 UART: [kat] --
1,169,814 UART: [cold-reset] ++
1,170,368 UART: [fht] FHT @ 0x50003400
1,173,018 UART: [idev] ++
1,173,186 UART: [idev] CDI.KEYID = 6
1,173,547 UART: [idev] SUBJECT.KEYID = 7
1,173,972 UART: [idev] UDS.KEYID = 0
1,174,318 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,574 UART: [idev] Erasing UDS.KEYID = 0
1,198,488 UART: [idev] Sha1 KeyId Algorithm
1,207,504 UART: [idev] --
1,208,581 UART: [ldev] ++
1,208,749 UART: [ldev] CDI.KEYID = 6
1,209,113 UART: [ldev] SUBJECT.KEYID = 5
1,209,540 UART: [ldev] AUTHORITY.KEYID = 7
1,210,003 UART: [ldev] FE.KEYID = 1
1,215,537 UART: [ldev] Erasing FE.KEYID = 1
1,241,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,745 UART: [ldev] --
1,281,161 UART: [fwproc] Wait for Commands...
1,281,864 UART: [fwproc] Recv command 0x46574c44
1,282,597 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,506 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,815 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,561 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,347 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,173,861 >>> mbox cmd response: failed
1,173,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,867 >>> mbox cmd response: failed
1,173,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,873 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,347 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,401 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,157 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,869 UART: [kat] SHA2-256
881,800 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,915 UART: [kat] ++
886,067 UART: [kat] sha1
890,109 UART: [kat] SHA2-256
892,047 UART: [kat] SHA2-384
894,704 UART: [kat] SHA2-512-ACC
896,605 UART: [kat] ECC-384
902,332 UART: [kat] HMAC-384Kdf
906,822 UART: [kat] LMS
1,475,018 UART: [kat] --
1,475,825 UART: [cold-reset] ++
1,476,255 UART: [fht] Storing FHT @ 0x50003400
1,479,128 UART: [idev] ++
1,479,296 UART: [idev] CDI.KEYID = 6
1,479,656 UART: [idev] SUBJECT.KEYID = 7
1,480,080 UART: [idev] UDS.KEYID = 0
1,480,425 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,084 UART: [idev] Erasing UDS.KEYID = 0
1,504,520 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,952 UART: [idev] --
1,514,027 UART: [ldev] ++
1,514,195 UART: [ldev] CDI.KEYID = 6
1,514,558 UART: [ldev] SUBJECT.KEYID = 5
1,514,984 UART: [ldev] AUTHORITY.KEYID = 7
1,515,447 UART: [ldev] FE.KEYID = 1
1,520,591 UART: [ldev] Erasing FE.KEYID = 1
1,545,638 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,070 UART: [ldev] --
1,584,503 UART: [fwproc] Waiting for Commands...
1,585,196 UART: [fwproc] Received command 0x46574c44
1,585,987 UART: [fwproc] Received Image of size 114332 bytes
1,620,695 UART: ROM Fatal Error: 0x000B001C
1,621,854 >>> mbox cmd response: failed
1,621,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,621,860 >>> mbox cmd response: failed
1,621,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,621,866 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,931 UART: [kat] SHA2-256
881,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,977 UART: [kat] ++
886,129 UART: [kat] sha1
890,301 UART: [kat] SHA2-256
892,239 UART: [kat] SHA2-384
894,836 UART: [kat] SHA2-512-ACC
896,737 UART: [kat] ECC-384
902,492 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,476,219 UART: [cold-reset] ++
1,476,681 UART: [fht] Storing FHT @ 0x50003400
1,479,590 UART: [idev] ++
1,479,758 UART: [idev] CDI.KEYID = 6
1,480,118 UART: [idev] SUBJECT.KEYID = 7
1,480,542 UART: [idev] UDS.KEYID = 0
1,480,887 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,926 UART: [idev] Erasing UDS.KEYID = 0
1,504,406 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,154 UART: [idev] --
1,514,339 UART: [ldev] ++
1,514,507 UART: [ldev] CDI.KEYID = 6
1,514,870 UART: [ldev] SUBJECT.KEYID = 5
1,515,296 UART: [ldev] AUTHORITY.KEYID = 7
1,515,759 UART: [ldev] FE.KEYID = 1
1,520,913 UART: [ldev] Erasing FE.KEYID = 1
1,546,270 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,860 UART: [ldev] --
1,585,123 UART: [fwproc] Waiting for Commands...
1,585,776 UART: [fwproc] Received command 0x46574c44
1,586,567 UART: [fwproc] Received Image of size 114332 bytes
2,883,586 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,436 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,788 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,075,641 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,259 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,476,091 >>> mbox cmd response: failed
1,476,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,097 >>> mbox cmd response: failed
1,476,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,103 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,263 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,145 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
86,992 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,520 UART: [kat] SHA2-256
882,451 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,566 UART: [kat] ++
886,718 UART: [kat] sha1
890,914 UART: [kat] SHA2-256
892,852 UART: [kat] SHA2-384
895,461 UART: [kat] SHA2-512-ACC
897,362 UART: [kat] ECC-384
902,911 UART: [kat] HMAC-384Kdf
907,511 UART: [kat] LMS
1,475,707 UART: [kat] --
1,476,496 UART: [cold-reset] ++
1,476,886 UART: [fht] Storing FHT @ 0x50003400
1,479,563 UART: [idev] ++
1,479,731 UART: [idev] CDI.KEYID = 6
1,480,091 UART: [idev] SUBJECT.KEYID = 7
1,480,515 UART: [idev] UDS.KEYID = 0
1,480,860 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,287 UART: [idev] Erasing UDS.KEYID = 0
1,505,059 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,693 UART: [idev] --
1,514,730 UART: [ldev] ++
1,514,898 UART: [ldev] CDI.KEYID = 6
1,515,261 UART: [ldev] SUBJECT.KEYID = 5
1,515,687 UART: [ldev] AUTHORITY.KEYID = 7
1,516,150 UART: [ldev] FE.KEYID = 1
1,521,164 UART: [ldev] Erasing FE.KEYID = 1
1,547,191 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,363 UART: [ldev] --
1,586,748 UART: [fwproc] Waiting for Commands...
1,587,363 UART: [fwproc] Received command 0x46574c44
1,588,154 UART: [fwproc] Received Image of size 114332 bytes
1,623,398 UART: ROM Fatal Error: 0x000B001C
1,624,557 >>> mbox cmd response: failed
1,624,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,563 >>> mbox cmd response: failed
1,624,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,569 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,520 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,134 UART: [kat] SHA2-256
882,065 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,180 UART: [kat] ++
886,332 UART: [kat] sha1
890,504 UART: [kat] SHA2-256
892,442 UART: [kat] SHA2-384
895,275 UART: [kat] SHA2-512-ACC
897,176 UART: [kat] ECC-384
902,703 UART: [kat] HMAC-384Kdf
907,399 UART: [kat] LMS
1,475,595 UART: [kat] --
1,476,572 UART: [cold-reset] ++
1,477,146 UART: [fht] Storing FHT @ 0x50003400
1,479,969 UART: [idev] ++
1,480,137 UART: [idev] CDI.KEYID = 6
1,480,497 UART: [idev] SUBJECT.KEYID = 7
1,480,921 UART: [idev] UDS.KEYID = 0
1,481,266 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,055 UART: [idev] Erasing UDS.KEYID = 0
1,505,803 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,395 UART: [idev] --
1,515,320 UART: [ldev] ++
1,515,488 UART: [ldev] CDI.KEYID = 6
1,515,851 UART: [ldev] SUBJECT.KEYID = 5
1,516,277 UART: [ldev] AUTHORITY.KEYID = 7
1,516,740 UART: [ldev] FE.KEYID = 1
1,521,962 UART: [ldev] Erasing FE.KEYID = 1
1,547,779 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,915 UART: [ldev] --
1,587,402 UART: [fwproc] Waiting for Commands...
1,588,163 UART: [fwproc] Received command 0x46574c44
1,588,954 UART: [fwproc] Received Image of size 114332 bytes
2,886,323 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,821 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,173 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,094 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,722 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,477,324 >>> mbox cmd response: failed
1,477,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,330 >>> mbox cmd response: failed
1,477,330 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,336 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,506 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,102 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,607 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
893,558 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,683 UART: [kat] ++
897,835 UART: [kat] sha1
902,157 UART: [kat] SHA2-256
904,097 UART: [kat] SHA2-384
906,754 UART: [kat] SHA2-512-ACC
908,655 UART: [kat] ECC-384
918,710 UART: [kat] HMAC-384Kdf
923,324 UART: [kat] LMS
1,171,652 UART: [kat] --
1,172,551 UART: [cold-reset] ++
1,172,965 UART: [fht] FHT @ 0x50003400
1,175,608 UART: [idev] ++
1,175,776 UART: [idev] CDI.KEYID = 6
1,176,136 UART: [idev] SUBJECT.KEYID = 7
1,176,560 UART: [idev] UDS.KEYID = 0
1,176,905 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,114 UART: [idev] Erasing UDS.KEYID = 0
1,201,209 UART: [idev] Sha1 KeyId Algorithm
1,209,695 UART: [idev] --
1,210,653 UART: [ldev] ++
1,210,821 UART: [ldev] CDI.KEYID = 6
1,211,184 UART: [ldev] SUBJECT.KEYID = 5
1,211,610 UART: [ldev] AUTHORITY.KEYID = 7
1,212,073 UART: [ldev] FE.KEYID = 1
1,216,987 UART: [ldev] Erasing FE.KEYID = 1
1,243,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,257 UART: [ldev] --
1,282,604 UART: [fwproc] Wait for Commands...
1,283,400 UART: [fwproc] Recv command 0x46574c44
1,284,128 UART: [fwproc] Recv'd Img size: 114332 bytes
1,319,086 UART: ROM Fatal Error: 0x000B001C
1,320,245 >>> mbox cmd response: failed
1,320,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,251 >>> mbox cmd response: failed
1,320,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,257 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
893,236 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,361 UART: [kat] ++
897,513 UART: [kat] sha1
901,909 UART: [kat] SHA2-256
903,849 UART: [kat] SHA2-384
906,716 UART: [kat] SHA2-512-ACC
908,617 UART: [kat] ECC-384
918,404 UART: [kat] HMAC-384Kdf
922,888 UART: [kat] LMS
1,171,216 UART: [kat] --
1,172,167 UART: [cold-reset] ++
1,172,555 UART: [fht] FHT @ 0x50003400
1,175,216 UART: [idev] ++
1,175,384 UART: [idev] CDI.KEYID = 6
1,175,744 UART: [idev] SUBJECT.KEYID = 7
1,176,168 UART: [idev] UDS.KEYID = 0
1,176,513 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,454 UART: [idev] Erasing UDS.KEYID = 0
1,202,071 UART: [idev] Sha1 KeyId Algorithm
1,210,647 UART: [idev] --
1,211,863 UART: [ldev] ++
1,212,031 UART: [ldev] CDI.KEYID = 6
1,212,394 UART: [ldev] SUBJECT.KEYID = 5
1,212,820 UART: [ldev] AUTHORITY.KEYID = 7
1,213,283 UART: [ldev] FE.KEYID = 1
1,218,903 UART: [ldev] Erasing FE.KEYID = 1
1,245,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,381 UART: [ldev] --
1,284,760 UART: [fwproc] Wait for Commands...
1,285,462 UART: [fwproc] Recv command 0x46574c44
1,286,190 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,901 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,205 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,960 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,889 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,174,370 >>> mbox cmd response: failed
1,174,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,376 >>> mbox cmd response: failed
1,174,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,382 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,475 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,413 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
893,549 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,674 UART: [kat] ++
897,826 UART: [kat] sha1
902,018 UART: [kat] SHA2-256
903,958 UART: [kat] SHA2-384
906,729 UART: [kat] SHA2-512-ACC
908,630 UART: [kat] ECC-384
918,677 UART: [kat] HMAC-384Kdf
923,371 UART: [kat] LMS
1,171,699 UART: [kat] --
1,172,548 UART: [cold-reset] ++
1,173,018 UART: [fht] FHT @ 0x50003400
1,175,523 UART: [idev] ++
1,175,691 UART: [idev] CDI.KEYID = 6
1,176,051 UART: [idev] SUBJECT.KEYID = 7
1,176,475 UART: [idev] UDS.KEYID = 0
1,176,820 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,547 UART: [idev] Erasing UDS.KEYID = 0
1,201,254 UART: [idev] Sha1 KeyId Algorithm
1,209,786 UART: [idev] --
1,210,902 UART: [ldev] ++
1,211,070 UART: [ldev] CDI.KEYID = 6
1,211,433 UART: [ldev] SUBJECT.KEYID = 5
1,211,859 UART: [ldev] AUTHORITY.KEYID = 7
1,212,322 UART: [ldev] FE.KEYID = 1
1,217,616 UART: [ldev] Erasing FE.KEYID = 1
1,243,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,676 UART: [ldev] --
1,282,983 UART: [fwproc] Wait for Commands...
1,283,729 UART: [fwproc] Recv command 0x46574c44
1,284,457 UART: [fwproc] Recv'd Img size: 114332 bytes
1,319,593 UART: ROM Fatal Error: 0x000B001C
1,320,752 >>> mbox cmd response: failed
1,320,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,758 >>> mbox cmd response: failed
1,320,758 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,764 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,225 UART: [kat] SHA2-256
893,875 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,000 UART: [kat] ++
898,152 UART: [kat] sha1
902,556 UART: [kat] SHA2-256
904,496 UART: [kat] SHA2-384
907,029 UART: [kat] SHA2-512-ACC
908,930 UART: [kat] ECC-384
918,493 UART: [kat] HMAC-384Kdf
923,245 UART: [kat] LMS
1,171,573 UART: [kat] --
1,172,484 UART: [cold-reset] ++
1,172,934 UART: [fht] FHT @ 0x50003400
1,175,431 UART: [idev] ++
1,175,599 UART: [idev] CDI.KEYID = 6
1,175,959 UART: [idev] SUBJECT.KEYID = 7
1,176,383 UART: [idev] UDS.KEYID = 0
1,176,728 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,573 UART: [idev] Erasing UDS.KEYID = 0
1,201,204 UART: [idev] Sha1 KeyId Algorithm
1,209,878 UART: [idev] --
1,210,860 UART: [ldev] ++
1,211,028 UART: [ldev] CDI.KEYID = 6
1,211,391 UART: [ldev] SUBJECT.KEYID = 5
1,211,817 UART: [ldev] AUTHORITY.KEYID = 7
1,212,280 UART: [ldev] FE.KEYID = 1
1,217,696 UART: [ldev] Erasing FE.KEYID = 1
1,244,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,946 UART: [ldev] --
1,283,269 UART: [fwproc] Wait for Commands...
1,284,063 UART: [fwproc] Recv command 0x46574c44
1,284,791 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,071 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,822 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,057 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,180 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,175,723 >>> mbox cmd response: failed
1,175,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,729 >>> mbox cmd response: failed
1,175,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,735 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,396 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,592 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,510 UART: [state] LifecycleState = Unprovisioned
86,165 UART: [state] DebugLocked = No
86,841 UART: [state] WD Timer not started. Device not locked for debugging
88,052 UART: [kat] SHA2-256
891,602 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,731 UART: [kat] ++
895,883 UART: [kat] sha1
900,255 UART: [kat] SHA2-256
902,195 UART: [kat] SHA2-384
904,960 UART: [kat] SHA2-512-ACC
906,861 UART: [kat] ECC-384
916,420 UART: [kat] HMAC-384Kdf
920,874 UART: [kat] LMS
1,169,186 UART: [kat] --
1,169,949 UART: [cold-reset] ++
1,170,307 UART: [fht] FHT @ 0x50003400
1,173,057 UART: [idev] ++
1,173,225 UART: [idev] CDI.KEYID = 6
1,173,586 UART: [idev] SUBJECT.KEYID = 7
1,174,011 UART: [idev] UDS.KEYID = 0
1,174,357 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,711 UART: [idev] Erasing UDS.KEYID = 0
1,198,687 UART: [idev] Sha1 KeyId Algorithm
1,207,553 UART: [idev] --
1,208,680 UART: [ldev] ++
1,208,848 UART: [ldev] CDI.KEYID = 6
1,209,212 UART: [ldev] SUBJECT.KEYID = 5
1,209,639 UART: [ldev] AUTHORITY.KEYID = 7
1,210,102 UART: [ldev] FE.KEYID = 1
1,215,462 UART: [ldev] Erasing FE.KEYID = 1
1,241,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,806 UART: [ldev] --
1,281,192 UART: [fwproc] Wait for Commands...
1,281,849 UART: [fwproc] Recv command 0x46574c44
1,282,582 UART: [fwproc] Recv'd Img size: 114332 bytes
1,317,786 UART: ROM Fatal Error: 0x000B001C
1,318,945 >>> mbox cmd response: failed
1,318,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,951 >>> mbox cmd response: failed
1,318,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,957 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,852 UART: [kat] SHA2-256
891,402 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,531 UART: [kat] ++
895,683 UART: [kat] sha1
900,005 UART: [kat] SHA2-256
901,945 UART: [kat] SHA2-384
904,708 UART: [kat] SHA2-512-ACC
906,609 UART: [kat] ECC-384
916,342 UART: [kat] HMAC-384Kdf
921,088 UART: [kat] LMS
1,169,400 UART: [kat] --
1,170,107 UART: [cold-reset] ++
1,170,521 UART: [fht] FHT @ 0x50003400
1,173,283 UART: [idev] ++
1,173,451 UART: [idev] CDI.KEYID = 6
1,173,812 UART: [idev] SUBJECT.KEYID = 7
1,174,237 UART: [idev] UDS.KEYID = 0
1,174,583 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,233 UART: [idev] Erasing UDS.KEYID = 0
1,199,593 UART: [idev] Sha1 KeyId Algorithm
1,208,561 UART: [idev] --
1,209,560 UART: [ldev] ++
1,209,728 UART: [ldev] CDI.KEYID = 6
1,210,092 UART: [ldev] SUBJECT.KEYID = 5
1,210,519 UART: [ldev] AUTHORITY.KEYID = 7
1,210,982 UART: [ldev] FE.KEYID = 1
1,216,318 UART: [ldev] Erasing FE.KEYID = 1
1,242,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,096 UART: [ldev] --
1,281,394 UART: [fwproc] Wait for Commands...
1,282,163 UART: [fwproc] Recv command 0x46574c44
1,282,896 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,601 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,910 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,798 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,288 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,170,860 >>> mbox cmd response: failed
1,170,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,866 >>> mbox cmd response: failed
1,170,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,872 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,736 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,660 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,709 UART: [state] LifecycleState = Unprovisioned
86,364 UART: [state] DebugLocked = No
87,088 UART: [state] WD Timer not started. Device not locked for debugging
88,313 UART: [kat] SHA2-256
891,863 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,992 UART: [kat] ++
896,144 UART: [kat] sha1
900,418 UART: [kat] SHA2-256
902,358 UART: [kat] SHA2-384
905,185 UART: [kat] SHA2-512-ACC
907,086 UART: [kat] ECC-384
916,885 UART: [kat] HMAC-384Kdf
921,343 UART: [kat] LMS
1,169,655 UART: [kat] --
1,170,806 UART: [cold-reset] ++
1,171,208 UART: [fht] FHT @ 0x50003400
1,173,796 UART: [idev] ++
1,173,964 UART: [idev] CDI.KEYID = 6
1,174,325 UART: [idev] SUBJECT.KEYID = 7
1,174,750 UART: [idev] UDS.KEYID = 0
1,175,096 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,058 UART: [idev] Erasing UDS.KEYID = 0
1,200,588 UART: [idev] Sha1 KeyId Algorithm
1,209,320 UART: [idev] --
1,210,371 UART: [ldev] ++
1,210,539 UART: [ldev] CDI.KEYID = 6
1,210,903 UART: [ldev] SUBJECT.KEYID = 5
1,211,330 UART: [ldev] AUTHORITY.KEYID = 7
1,211,793 UART: [ldev] FE.KEYID = 1
1,217,303 UART: [ldev] Erasing FE.KEYID = 1
1,243,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,333 UART: [ldev] --
1,282,605 UART: [fwproc] Wait for Commands...
1,283,378 UART: [fwproc] Recv command 0x46574c44
1,284,111 UART: [fwproc] Recv'd Img size: 114332 bytes
1,319,055 UART: ROM Fatal Error: 0x000B001C
1,320,214 >>> mbox cmd response: failed
1,320,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,220 >>> mbox cmd response: failed
1,320,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,226 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
891,383 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,512 UART: [kat] ++
895,664 UART: [kat] sha1
899,800 UART: [kat] SHA2-256
901,740 UART: [kat] SHA2-384
904,409 UART: [kat] SHA2-512-ACC
906,310 UART: [kat] ECC-384
916,449 UART: [kat] HMAC-384Kdf
921,189 UART: [kat] LMS
1,169,501 UART: [kat] --
1,170,510 UART: [cold-reset] ++
1,171,012 UART: [fht] FHT @ 0x50003400
1,173,622 UART: [idev] ++
1,173,790 UART: [idev] CDI.KEYID = 6
1,174,151 UART: [idev] SUBJECT.KEYID = 7
1,174,576 UART: [idev] UDS.KEYID = 0
1,174,922 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,674 UART: [idev] Erasing UDS.KEYID = 0
1,200,038 UART: [idev] Sha1 KeyId Algorithm
1,208,782 UART: [idev] --
1,209,659 UART: [ldev] ++
1,209,827 UART: [ldev] CDI.KEYID = 6
1,210,191 UART: [ldev] SUBJECT.KEYID = 5
1,210,618 UART: [ldev] AUTHORITY.KEYID = 7
1,211,081 UART: [ldev] FE.KEYID = 1
1,216,539 UART: [ldev] Erasing FE.KEYID = 1
1,243,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,939 UART: [ldev] --
1,283,317 UART: [fwproc] Wait for Commands...
1,284,088 UART: [fwproc] Recv command 0x46574c44
1,284,821 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,104 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,818 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,127 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,887 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,359 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,171,155 >>> mbox cmd response: failed
1,171,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,161 >>> mbox cmd response: failed
1,171,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,167 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,245 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,491 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,643 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,194,155 >>> mbox cmd response: failed
1,194,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,161 >>> mbox cmd response: failed
1,194,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,167 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,101 UART: [kat] SHA2-256
882,032 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,147 UART: [kat] ++
886,299 UART: [kat] sha1
890,565 UART: [kat] SHA2-256
892,503 UART: [kat] SHA2-384
895,304 UART: [kat] SHA2-512-ACC
897,205 UART: [kat] ECC-384
902,912 UART: [kat] HMAC-384Kdf
907,600 UART: [kat] LMS
1,475,796 UART: [kat] --
1,476,801 UART: [cold-reset] ++
1,477,271 UART: [fht] Storing FHT @ 0x50003400
1,480,004 UART: [idev] ++
1,480,172 UART: [idev] CDI.KEYID = 6
1,480,532 UART: [idev] SUBJECT.KEYID = 7
1,480,956 UART: [idev] UDS.KEYID = 0
1,481,301 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,690 UART: [idev] Erasing UDS.KEYID = 0
1,505,018 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,660 UART: [idev] --
1,514,793 UART: [ldev] ++
1,514,961 UART: [ldev] CDI.KEYID = 6
1,515,324 UART: [ldev] SUBJECT.KEYID = 5
1,515,750 UART: [ldev] AUTHORITY.KEYID = 7
1,516,213 UART: [ldev] FE.KEYID = 1
1,521,475 UART: [ldev] Erasing FE.KEYID = 1
1,546,906 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,542 UART: [ldev] --
1,585,993 UART: [fwproc] Waiting for Commands...
1,586,624 UART: [fwproc] Received command 0x46574c44
1,587,415 UART: [fwproc] Received Image of size 114332 bytes
2,885,468 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,002 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,354 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,225 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,697 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,194,655 >>> mbox cmd response: failed
1,194,655 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,661 >>> mbox cmd response: failed
1,194,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,667 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,549 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,127 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,280 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,194,822 >>> mbox cmd response: failed
1,194,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,828 >>> mbox cmd response: failed
1,194,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,834 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
87,110 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,600 UART: [kat] SHA2-256
882,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,646 UART: [kat] ++
886,798 UART: [kat] sha1
890,934 UART: [kat] SHA2-256
892,872 UART: [kat] SHA2-384
895,613 UART: [kat] SHA2-512-ACC
897,514 UART: [kat] ECC-384
903,117 UART: [kat] HMAC-384Kdf
907,859 UART: [kat] LMS
1,476,055 UART: [kat] --
1,476,780 UART: [cold-reset] ++
1,477,290 UART: [fht] Storing FHT @ 0x50003400
1,480,219 UART: [idev] ++
1,480,387 UART: [idev] CDI.KEYID = 6
1,480,747 UART: [idev] SUBJECT.KEYID = 7
1,481,171 UART: [idev] UDS.KEYID = 0
1,481,516 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,465 UART: [idev] Erasing UDS.KEYID = 0
1,506,629 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,173 UART: [idev] --
1,516,314 UART: [ldev] ++
1,516,482 UART: [ldev] CDI.KEYID = 6
1,516,845 UART: [ldev] SUBJECT.KEYID = 5
1,517,271 UART: [ldev] AUTHORITY.KEYID = 7
1,517,734 UART: [ldev] FE.KEYID = 1
1,522,886 UART: [ldev] Erasing FE.KEYID = 1
1,548,221 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,545 UART: [ldev] --
1,587,988 UART: [fwproc] Waiting for Commands...
1,588,743 UART: [fwproc] Received command 0x46574c44
1,589,534 UART: [fwproc] Received Image of size 114332 bytes
2,887,939 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,701 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,053 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,894 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,242 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,196,038 >>> mbox cmd response: failed
1,196,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,044 >>> mbox cmd response: failed
1,196,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,050 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,718 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,004 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,477 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,195,429 >>> mbox cmd response: failed
1,195,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,435 >>> mbox cmd response: failed
1,195,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,441 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,874 UART: [state] LifecycleState = Unprovisioned
85,529 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,382 UART: [kat] SHA2-256
893,032 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,157 UART: [kat] ++
897,309 UART: [kat] sha1
901,691 UART: [kat] SHA2-256
903,631 UART: [kat] SHA2-384
906,424 UART: [kat] SHA2-512-ACC
908,325 UART: [kat] ECC-384
918,090 UART: [kat] HMAC-384Kdf
922,690 UART: [kat] LMS
1,171,018 UART: [kat] --
1,171,927 UART: [cold-reset] ++
1,172,465 UART: [fht] FHT @ 0x50003400
1,175,082 UART: [idev] ++
1,175,250 UART: [idev] CDI.KEYID = 6
1,175,610 UART: [idev] SUBJECT.KEYID = 7
1,176,034 UART: [idev] UDS.KEYID = 0
1,176,379 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,754 UART: [idev] Erasing UDS.KEYID = 0
1,200,601 UART: [idev] Sha1 KeyId Algorithm
1,209,043 UART: [idev] --
1,210,141 UART: [ldev] ++
1,210,309 UART: [ldev] CDI.KEYID = 6
1,210,672 UART: [ldev] SUBJECT.KEYID = 5
1,211,098 UART: [ldev] AUTHORITY.KEYID = 7
1,211,561 UART: [ldev] FE.KEYID = 1
1,216,345 UART: [ldev] Erasing FE.KEYID = 1
1,241,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,941 UART: [ldev] --
1,281,364 UART: [fwproc] Wait for Commands...
1,281,940 UART: [fwproc] Recv command 0x46574c44
1,282,668 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,651 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,955 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,874 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,837 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,194,755 >>> mbox cmd response: failed
1,194,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,761 >>> mbox cmd response: failed
1,194,761 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,767 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,735 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,639 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,990 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,195,120 >>> mbox cmd response: failed
1,195,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,126 >>> mbox cmd response: failed
1,195,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,132 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
893,541 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,666 UART: [kat] ++
897,818 UART: [kat] sha1
902,038 UART: [kat] SHA2-256
903,978 UART: [kat] SHA2-384
906,641 UART: [kat] SHA2-512-ACC
908,542 UART: [kat] ECC-384
918,147 UART: [kat] HMAC-384Kdf
922,891 UART: [kat] LMS
1,171,219 UART: [kat] --
1,172,086 UART: [cold-reset] ++
1,172,548 UART: [fht] FHT @ 0x50003400
1,175,159 UART: [idev] ++
1,175,327 UART: [idev] CDI.KEYID = 6
1,175,687 UART: [idev] SUBJECT.KEYID = 7
1,176,111 UART: [idev] UDS.KEYID = 0
1,176,456 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,047 UART: [idev] Erasing UDS.KEYID = 0
1,201,566 UART: [idev] Sha1 KeyId Algorithm
1,210,026 UART: [idev] --
1,211,160 UART: [ldev] ++
1,211,328 UART: [ldev] CDI.KEYID = 6
1,211,691 UART: [ldev] SUBJECT.KEYID = 5
1,212,117 UART: [ldev] AUTHORITY.KEYID = 7
1,212,580 UART: [ldev] FE.KEYID = 1
1,218,000 UART: [ldev] Erasing FE.KEYID = 1
1,244,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,282 UART: [ldev] --
1,283,629 UART: [fwproc] Wait for Commands...
1,284,241 UART: [fwproc] Recv command 0x46574c44
1,284,969 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,404 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,708 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,461 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,650 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,195,310 >>> mbox cmd response: failed
1,195,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,316 >>> mbox cmd response: failed
1,195,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,322 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,306 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,430 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,419 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,194,749 >>> mbox cmd response: failed
1,194,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,755 >>> mbox cmd response: failed
1,194,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,761 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,379 UART: [kat] ++
895,531 UART: [kat] sha1
899,729 UART: [kat] SHA2-256
901,669 UART: [kat] SHA2-384
904,614 UART: [kat] SHA2-512-ACC
906,515 UART: [kat] ECC-384
916,718 UART: [kat] HMAC-384Kdf
921,248 UART: [kat] LMS
1,169,560 UART: [kat] --
1,170,655 UART: [cold-reset] ++
1,171,083 UART: [fht] FHT @ 0x50003400
1,173,847 UART: [idev] ++
1,174,015 UART: [idev] CDI.KEYID = 6
1,174,376 UART: [idev] SUBJECT.KEYID = 7
1,174,801 UART: [idev] UDS.KEYID = 0
1,175,147 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,599 UART: [idev] Erasing UDS.KEYID = 0
1,199,199 UART: [idev] Sha1 KeyId Algorithm
1,207,849 UART: [idev] --
1,208,876 UART: [ldev] ++
1,209,044 UART: [ldev] CDI.KEYID = 6
1,209,408 UART: [ldev] SUBJECT.KEYID = 5
1,209,835 UART: [ldev] AUTHORITY.KEYID = 7
1,210,298 UART: [ldev] FE.KEYID = 1
1,215,254 UART: [ldev] Erasing FE.KEYID = 1
1,241,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,556 UART: [ldev] --
1,281,042 UART: [fwproc] Wait for Commands...
1,281,777 UART: [fwproc] Recv command 0x46574c44
1,282,510 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,013 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,024 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,405 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,195,721 >>> mbox cmd response: failed
1,195,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,727 >>> mbox cmd response: failed
1,195,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,733 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,472 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,054 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,622 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,195,310 >>> mbox cmd response: failed
1,195,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,316 >>> mbox cmd response: failed
1,195,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,322 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
891,413 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,542 UART: [kat] ++
895,694 UART: [kat] sha1
899,774 UART: [kat] SHA2-256
901,714 UART: [kat] SHA2-384
904,505 UART: [kat] SHA2-512-ACC
906,406 UART: [kat] ECC-384
916,119 UART: [kat] HMAC-384Kdf
920,615 UART: [kat] LMS
1,168,927 UART: [kat] --
1,170,024 UART: [cold-reset] ++
1,170,550 UART: [fht] FHT @ 0x50003400
1,173,328 UART: [idev] ++
1,173,496 UART: [idev] CDI.KEYID = 6
1,173,857 UART: [idev] SUBJECT.KEYID = 7
1,174,282 UART: [idev] UDS.KEYID = 0
1,174,628 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,360 UART: [idev] Erasing UDS.KEYID = 0
1,200,418 UART: [idev] Sha1 KeyId Algorithm
1,209,286 UART: [idev] --
1,210,431 UART: [ldev] ++
1,210,599 UART: [ldev] CDI.KEYID = 6
1,210,963 UART: [ldev] SUBJECT.KEYID = 5
1,211,390 UART: [ldev] AUTHORITY.KEYID = 7
1,211,853 UART: [ldev] FE.KEYID = 1
1,217,121 UART: [ldev] Erasing FE.KEYID = 1
1,243,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,941 UART: [ldev] --
1,283,231 UART: [fwproc] Wait for Commands...
1,283,938 UART: [fwproc] Recv command 0x46574c44
1,284,671 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,664 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,853 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,864 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,196,568 >>> mbox cmd response: failed
1,196,568 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,574 >>> mbox cmd response: failed
1,196,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,580 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,315 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,825 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,662 UART: [state] LifecycleState = Unprovisioned
86,317 UART: [state] DebugLocked = No
86,977 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,633 UART: [kat] SHA2-256
882,564 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,679 UART: [kat] ++
886,831 UART: [kat] sha1
891,113 UART: [kat] SHA2-256
893,051 UART: [kat] SHA2-384
895,768 UART: [kat] SHA2-512-ACC
897,669 UART: [kat] ECC-384
903,448 UART: [kat] HMAC-384Kdf
908,102 UART: [kat] LMS
1,476,298 UART: [kat] --
1,477,519 UART: [cold-reset] ++
1,477,929 UART: [fht] Storing FHT @ 0x50003400
1,480,646 UART: [idev] ++
1,480,814 UART: [idev] CDI.KEYID = 6
1,481,174 UART: [idev] SUBJECT.KEYID = 7
1,481,598 UART: [idev] UDS.KEYID = 0
1,481,943 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,150 UART: [idev] Erasing UDS.KEYID = 0
1,506,130 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,906 UART: [idev] --
1,516,003 UART: [ldev] ++
1,516,171 UART: [ldev] CDI.KEYID = 6
1,516,534 UART: [ldev] SUBJECT.KEYID = 5
1,516,960 UART: [ldev] AUTHORITY.KEYID = 7
1,517,423 UART: [ldev] FE.KEYID = 1
1,522,699 UART: [ldev] Erasing FE.KEYID = 1
1,548,350 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,218 UART: [ldev] --
1,587,535 UART: [fwproc] Waiting for Commands...
1,588,164 UART: [fwproc] Received command 0x46574c44
1,588,955 UART: [fwproc] Received Image of size 114332 bytes
2,727,022 UART: ROM Fatal Error: 0x000B0030
2,728,179 >>> mbox cmd response: failed
2,728,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,728,185 >>> mbox cmd response: failed
2,728,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,728,191 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,824 UART: [state] LifecycleState = Unprovisioned
85,479 UART: [state] DebugLocked = No
86,129 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,635 UART: [kat] SHA2-256
881,566 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,681 UART: [kat] ++
885,833 UART: [kat] sha1
889,933 UART: [kat] SHA2-256
891,871 UART: [kat] SHA2-384
894,498 UART: [kat] SHA2-512-ACC
896,399 UART: [kat] ECC-384
901,998 UART: [kat] HMAC-384Kdf
906,674 UART: [kat] LMS
1,474,870 UART: [kat] --
1,475,667 UART: [cold-reset] ++
1,476,045 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,480,253 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,876 UART: [idev] Erasing UDS.KEYID = 0
1,504,846 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,390 UART: [idev] --
1,514,483 UART: [ldev] ++
1,514,651 UART: [ldev] CDI.KEYID = 6
1,515,014 UART: [ldev] SUBJECT.KEYID = 5
1,515,440 UART: [ldev] AUTHORITY.KEYID = 7
1,515,903 UART: [ldev] FE.KEYID = 1
1,520,975 UART: [ldev] Erasing FE.KEYID = 1
1,546,166 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,096 UART: [ldev] --
1,585,547 UART: [fwproc] Waiting for Commands...
1,586,164 UART: [fwproc] Received command 0x46574c44
1,586,955 UART: [fwproc] Received Image of size 114332 bytes
2,885,562 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,914 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,266 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,219 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,377 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,653,884 >>> mbox cmd response: failed
2,653,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,653,890 >>> mbox cmd response: failed
2,653,890 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,653,896 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,469 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,709 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,678 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,156 UART: [kat] SHA2-256
882,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,202 UART: [kat] ++
886,354 UART: [kat] sha1
890,548 UART: [kat] SHA2-256
892,486 UART: [kat] SHA2-384
895,309 UART: [kat] SHA2-512-ACC
897,210 UART: [kat] ECC-384
902,751 UART: [kat] HMAC-384Kdf
907,411 UART: [kat] LMS
1,475,607 UART: [kat] --
1,476,458 UART: [cold-reset] ++
1,476,954 UART: [fht] Storing FHT @ 0x50003400
1,479,937 UART: [idev] ++
1,480,105 UART: [idev] CDI.KEYID = 6
1,480,465 UART: [idev] SUBJECT.KEYID = 7
1,480,889 UART: [idev] UDS.KEYID = 0
1,481,234 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,413 UART: [idev] Erasing UDS.KEYID = 0
1,505,035 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,621 UART: [idev] --
1,514,750 UART: [ldev] ++
1,514,918 UART: [ldev] CDI.KEYID = 6
1,515,281 UART: [ldev] SUBJECT.KEYID = 5
1,515,707 UART: [ldev] AUTHORITY.KEYID = 7
1,516,170 UART: [ldev] FE.KEYID = 1
1,521,630 UART: [ldev] Erasing FE.KEYID = 1
1,547,551 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,155 UART: [ldev] --
1,586,476 UART: [fwproc] Waiting for Commands...
1,587,339 UART: [fwproc] Received command 0x46574c44
1,588,130 UART: [fwproc] Received Image of size 114332 bytes
2,650,497 UART: ROM Fatal Error: 0x000B0030
2,651,654 >>> mbox cmd response: failed
2,651,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,651,660 >>> mbox cmd response: failed
2,651,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,651,666 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,039 UART: [state] LifecycleState = Unprovisioned
85,694 UART: [state] DebugLocked = No
86,190 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,742 UART: [kat] SHA2-256
881,673 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,788 UART: [kat] ++
885,940 UART: [kat] sha1
890,114 UART: [kat] SHA2-256
892,052 UART: [kat] SHA2-384
894,749 UART: [kat] SHA2-512-ACC
896,650 UART: [kat] ECC-384
902,597 UART: [kat] HMAC-384Kdf
907,259 UART: [kat] LMS
1,475,455 UART: [kat] --
1,475,960 UART: [cold-reset] ++
1,476,530 UART: [fht] Storing FHT @ 0x50003400
1,479,463 UART: [idev] ++
1,479,631 UART: [idev] CDI.KEYID = 6
1,479,991 UART: [idev] SUBJECT.KEYID = 7
1,480,415 UART: [idev] UDS.KEYID = 0
1,480,760 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,605 UART: [idev] Erasing UDS.KEYID = 0
1,505,163 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,711 UART: [idev] --
1,514,710 UART: [ldev] ++
1,514,878 UART: [ldev] CDI.KEYID = 6
1,515,241 UART: [ldev] SUBJECT.KEYID = 5
1,515,667 UART: [ldev] AUTHORITY.KEYID = 7
1,516,130 UART: [ldev] FE.KEYID = 1
1,521,330 UART: [ldev] Erasing FE.KEYID = 1
1,547,579 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,279 UART: [ldev] --
1,586,692 UART: [fwproc] Waiting for Commands...
1,587,383 UART: [fwproc] Received command 0x46574c44
1,588,174 UART: [fwproc] Received Image of size 114332 bytes
2,886,083 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,945 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,297 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,122 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,112 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,540,680 >>> mbox cmd response: failed
2,540,680 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,540,686 >>> mbox cmd response: failed
2,540,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,540,692 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,530 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,118 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,874 UART: [state] LifecycleState = Unprovisioned
85,529 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
893,108 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,233 UART: [kat] ++
897,385 UART: [kat] sha1
901,679 UART: [kat] SHA2-256
903,619 UART: [kat] SHA2-384
906,300 UART: [kat] SHA2-512-ACC
908,201 UART: [kat] ECC-384
917,550 UART: [kat] HMAC-384Kdf
921,968 UART: [kat] LMS
1,170,296 UART: [kat] --
1,171,195 UART: [cold-reset] ++
1,171,539 UART: [fht] FHT @ 0x50003400
1,174,204 UART: [idev] ++
1,174,372 UART: [idev] CDI.KEYID = 6
1,174,732 UART: [idev] SUBJECT.KEYID = 7
1,175,156 UART: [idev] UDS.KEYID = 0
1,175,501 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,332 UART: [idev] Erasing UDS.KEYID = 0
1,200,327 UART: [idev] Sha1 KeyId Algorithm
1,208,963 UART: [idev] --
1,210,089 UART: [ldev] ++
1,210,257 UART: [ldev] CDI.KEYID = 6
1,210,620 UART: [ldev] SUBJECT.KEYID = 5
1,211,046 UART: [ldev] AUTHORITY.KEYID = 7
1,211,509 UART: [ldev] FE.KEYID = 1
1,216,699 UART: [ldev] Erasing FE.KEYID = 1
1,242,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,653 UART: [ldev] --
1,281,988 UART: [fwproc] Wait for Commands...
1,282,606 UART: [fwproc] Recv command 0x46574c44
1,283,334 UART: [fwproc] Recv'd Img size: 114332 bytes
1,594,355 UART: ROM Fatal Error: 0x000B0030
1,595,512 >>> mbox cmd response: failed
1,595,512 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,595,518 >>> mbox cmd response: failed
1,595,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,595,524 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,495 UART: [state] DebugLocked = No
86,103 UART: [state] WD Timer not started. Device not locked for debugging
87,338 UART: [kat] SHA2-256
892,988 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,113 UART: [kat] ++
897,265 UART: [kat] sha1
901,505 UART: [kat] SHA2-256
903,445 UART: [kat] SHA2-384
906,192 UART: [kat] SHA2-512-ACC
908,093 UART: [kat] ECC-384
917,938 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,695 UART: [cold-reset] ++
1,172,077 UART: [fht] FHT @ 0x50003400
1,174,598 UART: [idev] ++
1,174,766 UART: [idev] CDI.KEYID = 6
1,175,126 UART: [idev] SUBJECT.KEYID = 7
1,175,550 UART: [idev] UDS.KEYID = 0
1,175,895 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,610 UART: [idev] Erasing UDS.KEYID = 0
1,199,957 UART: [idev] Sha1 KeyId Algorithm
1,208,623 UART: [idev] --
1,209,759 UART: [ldev] ++
1,209,927 UART: [ldev] CDI.KEYID = 6
1,210,290 UART: [ldev] SUBJECT.KEYID = 5
1,210,716 UART: [ldev] AUTHORITY.KEYID = 7
1,211,179 UART: [ldev] FE.KEYID = 1
1,216,627 UART: [ldev] Erasing FE.KEYID = 1
1,242,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,913 UART: [ldev] --
1,282,216 UART: [fwproc] Wait for Commands...
1,282,982 UART: [fwproc] Recv command 0x46574c44
1,283,710 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,885 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,189 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,028 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,075 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,449,787 >>> mbox cmd response: failed
1,449,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,449,793 >>> mbox cmd response: failed
1,449,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,449,799 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,553 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,449 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
893,671 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,796 UART: [kat] ++
897,948 UART: [kat] sha1
902,194 UART: [kat] SHA2-256
904,134 UART: [kat] SHA2-384
906,995 UART: [kat] SHA2-512-ACC
908,896 UART: [kat] ECC-384
918,673 UART: [kat] HMAC-384Kdf
923,311 UART: [kat] LMS
1,171,639 UART: [kat] --
1,172,502 UART: [cold-reset] ++
1,172,946 UART: [fht] FHT @ 0x50003400
1,175,625 UART: [idev] ++
1,175,793 UART: [idev] CDI.KEYID = 6
1,176,153 UART: [idev] SUBJECT.KEYID = 7
1,176,577 UART: [idev] UDS.KEYID = 0
1,176,922 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,735 UART: [idev] Erasing UDS.KEYID = 0
1,201,978 UART: [idev] Sha1 KeyId Algorithm
1,210,370 UART: [idev] --
1,211,412 UART: [ldev] ++
1,211,580 UART: [ldev] CDI.KEYID = 6
1,211,943 UART: [ldev] SUBJECT.KEYID = 5
1,212,369 UART: [ldev] AUTHORITY.KEYID = 7
1,212,832 UART: [ldev] FE.KEYID = 1
1,218,252 UART: [ldev] Erasing FE.KEYID = 1
1,244,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,416 UART: [ldev] --
1,283,867 UART: [fwproc] Wait for Commands...
1,284,497 UART: [fwproc] Recv command 0x46574c44
1,285,225 UART: [fwproc] Recv'd Img size: 114332 bytes
1,598,363 UART: ROM Fatal Error: 0x000B0030
1,599,520 >>> mbox cmd response: failed
1,599,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,599,526 >>> mbox cmd response: failed
1,599,526 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,599,532 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,246 UART: [state] WD Timer not started. Device not locked for debugging
87,403 UART: [kat] SHA2-256
893,053 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,178 UART: [kat] ++
897,330 UART: [kat] sha1
901,570 UART: [kat] SHA2-256
903,510 UART: [kat] SHA2-384
906,149 UART: [kat] SHA2-512-ACC
908,050 UART: [kat] ECC-384
917,989 UART: [kat] HMAC-384Kdf
922,751 UART: [kat] LMS
1,171,079 UART: [kat] --
1,172,214 UART: [cold-reset] ++
1,172,582 UART: [fht] FHT @ 0x50003400
1,175,185 UART: [idev] ++
1,175,353 UART: [idev] CDI.KEYID = 6
1,175,713 UART: [idev] SUBJECT.KEYID = 7
1,176,137 UART: [idev] UDS.KEYID = 0
1,176,482 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,393 UART: [idev] Erasing UDS.KEYID = 0
1,201,518 UART: [idev] Sha1 KeyId Algorithm
1,210,058 UART: [idev] --
1,211,272 UART: [ldev] ++
1,211,440 UART: [ldev] CDI.KEYID = 6
1,211,803 UART: [ldev] SUBJECT.KEYID = 5
1,212,229 UART: [ldev] AUTHORITY.KEYID = 7
1,212,692 UART: [ldev] FE.KEYID = 1
1,217,928 UART: [ldev] Erasing FE.KEYID = 1
1,245,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,108 UART: [ldev] --
1,284,615 UART: [fwproc] Wait for Commands...
1,285,233 UART: [fwproc] Recv command 0x46574c44
1,285,961 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,670 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,974 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,767 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,466 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,456,404 >>> mbox cmd response: failed
1,456,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,456,410 >>> mbox cmd response: failed
1,456,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,456,416 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,420 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,376 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,633 UART: [kat] SHA2-256
901,573 UART: [kat] SHA2-384
904,538 UART: [kat] SHA2-512-ACC
906,439 UART: [kat] ECC-384
916,116 UART: [kat] HMAC-384Kdf
920,744 UART: [kat] LMS
1,169,056 UART: [kat] --
1,169,815 UART: [cold-reset] ++
1,170,357 UART: [fht] FHT @ 0x50003400
1,173,021 UART: [idev] ++
1,173,189 UART: [idev] CDI.KEYID = 6
1,173,550 UART: [idev] SUBJECT.KEYID = 7
1,173,975 UART: [idev] UDS.KEYID = 0
1,174,321 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,453 UART: [idev] Erasing UDS.KEYID = 0
1,197,675 UART: [idev] Sha1 KeyId Algorithm
1,206,751 UART: [idev] --
1,207,658 UART: [ldev] ++
1,207,826 UART: [ldev] CDI.KEYID = 6
1,208,190 UART: [ldev] SUBJECT.KEYID = 5
1,208,617 UART: [ldev] AUTHORITY.KEYID = 7
1,209,080 UART: [ldev] FE.KEYID = 1
1,214,044 UART: [ldev] Erasing FE.KEYID = 1
1,240,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,772 UART: [ldev] --
1,279,106 UART: [fwproc] Wait for Commands...
1,279,765 UART: [fwproc] Recv command 0x46574c44
1,280,498 UART: [fwproc] Recv'd Img size: 114332 bytes
1,593,560 UART: ROM Fatal Error: 0x000B0030
1,594,717 >>> mbox cmd response: failed
1,594,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,594,723 >>> mbox cmd response: failed
1,594,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,594,729 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,691 UART: [state] WD Timer not started. Device not locked for debugging
88,016 UART: [kat] SHA2-256
891,566 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,695 UART: [kat] ++
895,847 UART: [kat] sha1
900,065 UART: [kat] SHA2-256
902,005 UART: [kat] SHA2-384
904,776 UART: [kat] SHA2-512-ACC
906,677 UART: [kat] ECC-384
916,358 UART: [kat] HMAC-384Kdf
921,158 UART: [kat] LMS
1,169,470 UART: [kat] --
1,170,275 UART: [cold-reset] ++
1,170,771 UART: [fht] FHT @ 0x50003400
1,173,307 UART: [idev] ++
1,173,475 UART: [idev] CDI.KEYID = 6
1,173,836 UART: [idev] SUBJECT.KEYID = 7
1,174,261 UART: [idev] UDS.KEYID = 0
1,174,607 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,203 UART: [idev] Erasing UDS.KEYID = 0
1,199,205 UART: [idev] Sha1 KeyId Algorithm
1,208,143 UART: [idev] --
1,209,286 UART: [ldev] ++
1,209,454 UART: [ldev] CDI.KEYID = 6
1,209,818 UART: [ldev] SUBJECT.KEYID = 5
1,210,245 UART: [ldev] AUTHORITY.KEYID = 7
1,210,708 UART: [ldev] FE.KEYID = 1
1,216,008 UART: [ldev] Erasing FE.KEYID = 1
1,242,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,640 UART: [ldev] --
1,282,130 UART: [fwproc] Wait for Commands...
1,282,867 UART: [fwproc] Recv command 0x46574c44
1,283,600 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,685 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,994 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,904 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,796 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,453,308 >>> mbox cmd response: failed
1,453,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,453,314 >>> mbox cmd response: failed
1,453,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,453,320 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,638 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,906 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,755 UART: [state] LifecycleState = Unprovisioned
85,410 UART: [state] DebugLocked = No
86,066 UART: [state] WD Timer not started. Device not locked for debugging
87,289 UART: [kat] SHA2-256
890,839 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,968 UART: [kat] ++
895,120 UART: [kat] sha1
899,418 UART: [kat] SHA2-256
901,358 UART: [kat] SHA2-384
904,117 UART: [kat] SHA2-512-ACC
906,018 UART: [kat] ECC-384
915,387 UART: [kat] HMAC-384Kdf
920,119 UART: [kat] LMS
1,168,431 UART: [kat] --
1,169,434 UART: [cold-reset] ++
1,169,892 UART: [fht] FHT @ 0x50003400
1,172,620 UART: [idev] ++
1,172,788 UART: [idev] CDI.KEYID = 6
1,173,149 UART: [idev] SUBJECT.KEYID = 7
1,173,574 UART: [idev] UDS.KEYID = 0
1,173,920 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,702 UART: [idev] Erasing UDS.KEYID = 0
1,198,880 UART: [idev] Sha1 KeyId Algorithm
1,207,854 UART: [idev] --
1,208,801 UART: [ldev] ++
1,208,969 UART: [ldev] CDI.KEYID = 6
1,209,333 UART: [ldev] SUBJECT.KEYID = 5
1,209,760 UART: [ldev] AUTHORITY.KEYID = 7
1,210,223 UART: [ldev] FE.KEYID = 1
1,215,475 UART: [ldev] Erasing FE.KEYID = 1
1,242,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,237 UART: [ldev] --
1,281,569 UART: [fwproc] Wait for Commands...
1,282,290 UART: [fwproc] Recv command 0x46574c44
1,283,023 UART: [fwproc] Recv'd Img size: 114332 bytes
1,598,128 UART: ROM Fatal Error: 0x000B0030
1,599,285 >>> mbox cmd response: failed
1,599,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,599,291 >>> mbox cmd response: failed
1,599,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,599,297 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,998 UART: [state] WD Timer not started. Device not locked for debugging
88,337 UART: [kat] SHA2-256
891,887 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,016 UART: [kat] ++
896,168 UART: [kat] sha1
900,244 UART: [kat] SHA2-256
902,184 UART: [kat] SHA2-384
904,921 UART: [kat] SHA2-512-ACC
906,822 UART: [kat] ECC-384
916,467 UART: [kat] HMAC-384Kdf
921,215 UART: [kat] LMS
1,169,527 UART: [kat] --
1,170,350 UART: [cold-reset] ++
1,170,854 UART: [fht] FHT @ 0x50003400
1,173,428 UART: [idev] ++
1,173,596 UART: [idev] CDI.KEYID = 6
1,173,957 UART: [idev] SUBJECT.KEYID = 7
1,174,382 UART: [idev] UDS.KEYID = 0
1,174,728 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,550 UART: [idev] Erasing UDS.KEYID = 0
1,200,088 UART: [idev] Sha1 KeyId Algorithm
1,209,106 UART: [idev] --
1,210,247 UART: [ldev] ++
1,210,415 UART: [ldev] CDI.KEYID = 6
1,210,779 UART: [ldev] SUBJECT.KEYID = 5
1,211,206 UART: [ldev] AUTHORITY.KEYID = 7
1,211,669 UART: [ldev] FE.KEYID = 1
1,217,081 UART: [ldev] Erasing FE.KEYID = 1
1,243,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,597 UART: [ldev] --
1,282,959 UART: [fwproc] Wait for Commands...
1,283,740 UART: [fwproc] Recv command 0x46574c44
1,284,473 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,984 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,836 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,145 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,879 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,791 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,450,497 >>> mbox cmd response: failed
1,450,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,503 >>> mbox cmd response: failed
1,450,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,509 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,029 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,663 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,623 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,151 UART: [kat] SHA2-256
882,082 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,197 UART: [kat] ++
886,349 UART: [kat] sha1
890,651 UART: [kat] SHA2-256
892,589 UART: [kat] SHA2-384
895,310 UART: [kat] SHA2-512-ACC
897,211 UART: [kat] ECC-384
903,012 UART: [kat] HMAC-384Kdf
907,536 UART: [kat] LMS
1,475,732 UART: [kat] --
1,477,037 UART: [cold-reset] ++
1,477,491 UART: [fht] Storing FHT @ 0x50003400
1,480,278 UART: [idev] ++
1,480,446 UART: [idev] CDI.KEYID = 6
1,480,806 UART: [idev] SUBJECT.KEYID = 7
1,481,230 UART: [idev] UDS.KEYID = 0
1,481,575 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,392 UART: [idev] Erasing UDS.KEYID = 0
1,505,826 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,330 UART: [idev] --
1,515,399 UART: [ldev] ++
1,515,567 UART: [ldev] CDI.KEYID = 6
1,515,930 UART: [ldev] SUBJECT.KEYID = 5
1,516,356 UART: [ldev] AUTHORITY.KEYID = 7
1,516,819 UART: [ldev] FE.KEYID = 1
1,522,147 UART: [ldev] Erasing FE.KEYID = 1
1,547,792 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,418 UART: [ldev] --
1,586,731 UART: [fwproc] Waiting for Commands...
1,587,418 UART: [fwproc] Received command 0x46574c44
1,588,209 UART: [fwproc] Received Image of size 114332 bytes
1,614,265 UART: ROM Fatal Error: 0x000B0032
1,615,422 >>> mbox cmd response: failed
1,615,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,428 >>> mbox cmd response: failed
1,615,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,434 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,457 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,011 UART: [kat] SHA2-256
881,942 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,057 UART: [kat] ++
886,209 UART: [kat] sha1
890,491 UART: [kat] SHA2-256
892,429 UART: [kat] SHA2-384
895,132 UART: [kat] SHA2-512-ACC
897,033 UART: [kat] ECC-384
902,730 UART: [kat] HMAC-384Kdf
907,268 UART: [kat] LMS
1,475,464 UART: [kat] --
1,476,431 UART: [cold-reset] ++
1,476,841 UART: [fht] Storing FHT @ 0x50003400
1,479,672 UART: [idev] ++
1,479,840 UART: [idev] CDI.KEYID = 6
1,480,200 UART: [idev] SUBJECT.KEYID = 7
1,480,624 UART: [idev] UDS.KEYID = 0
1,480,969 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,008 UART: [idev] Erasing UDS.KEYID = 0
1,505,534 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,238 UART: [idev] --
1,515,131 UART: [ldev] ++
1,515,299 UART: [ldev] CDI.KEYID = 6
1,515,662 UART: [ldev] SUBJECT.KEYID = 5
1,516,088 UART: [ldev] AUTHORITY.KEYID = 7
1,516,551 UART: [ldev] FE.KEYID = 1
1,521,463 UART: [ldev] Erasing FE.KEYID = 1
1,546,568 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,100 UART: [ldev] --
1,585,545 UART: [fwproc] Waiting for Commands...
1,586,260 UART: [fwproc] Received command 0x46574c44
1,587,051 UART: [fwproc] Received Image of size 114332 bytes
2,884,112 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,890 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,242 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,075,999 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,459 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,468,563 >>> mbox cmd response: failed
1,468,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,569 >>> mbox cmd response: failed
1,468,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,575 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,897 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,319 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,780 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,350 UART: [kat] SHA2-256
882,281 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,396 UART: [kat] ++
886,548 UART: [kat] sha1
890,798 UART: [kat] SHA2-256
892,736 UART: [kat] SHA2-384
895,449 UART: [kat] SHA2-512-ACC
897,350 UART: [kat] ECC-384
902,783 UART: [kat] HMAC-384Kdf
907,365 UART: [kat] LMS
1,475,561 UART: [kat] --
1,476,382 UART: [cold-reset] ++
1,476,708 UART: [fht] Storing FHT @ 0x50003400
1,479,595 UART: [idev] ++
1,479,763 UART: [idev] CDI.KEYID = 6
1,480,123 UART: [idev] SUBJECT.KEYID = 7
1,480,547 UART: [idev] UDS.KEYID = 0
1,480,892 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,851 UART: [idev] Erasing UDS.KEYID = 0
1,505,573 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,053 UART: [idev] --
1,515,072 UART: [ldev] ++
1,515,240 UART: [ldev] CDI.KEYID = 6
1,515,603 UART: [ldev] SUBJECT.KEYID = 5
1,516,029 UART: [ldev] AUTHORITY.KEYID = 7
1,516,492 UART: [ldev] FE.KEYID = 1
1,521,824 UART: [ldev] Erasing FE.KEYID = 1
1,547,381 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,179 UART: [ldev] --
1,586,652 UART: [fwproc] Waiting for Commands...
1,587,481 UART: [fwproc] Received command 0x46574c44
1,588,272 UART: [fwproc] Received Image of size 114332 bytes
1,613,922 UART: ROM Fatal Error: 0x000B0032
1,615,079 >>> mbox cmd response: failed
1,615,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,085 >>> mbox cmd response: failed
1,615,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,091 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,606 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,112 UART: [kat] SHA2-256
882,043 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,158 UART: [kat] ++
886,310 UART: [kat] sha1
890,520 UART: [kat] SHA2-256
892,458 UART: [kat] SHA2-384
895,129 UART: [kat] SHA2-512-ACC
897,030 UART: [kat] ECC-384
902,641 UART: [kat] HMAC-384Kdf
907,177 UART: [kat] LMS
1,475,373 UART: [kat] --
1,476,344 UART: [cold-reset] ++
1,476,766 UART: [fht] Storing FHT @ 0x50003400
1,479,569 UART: [idev] ++
1,479,737 UART: [idev] CDI.KEYID = 6
1,480,097 UART: [idev] SUBJECT.KEYID = 7
1,480,521 UART: [idev] UDS.KEYID = 0
1,480,866 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,383 UART: [idev] Erasing UDS.KEYID = 0
1,504,865 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,587 UART: [idev] --
1,514,492 UART: [ldev] ++
1,514,660 UART: [ldev] CDI.KEYID = 6
1,515,023 UART: [ldev] SUBJECT.KEYID = 5
1,515,449 UART: [ldev] AUTHORITY.KEYID = 7
1,515,912 UART: [ldev] FE.KEYID = 1
1,521,466 UART: [ldev] Erasing FE.KEYID = 1
1,546,619 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,181 UART: [ldev] --
1,586,508 UART: [fwproc] Waiting for Commands...
1,587,167 UART: [fwproc] Received command 0x46574c44
1,587,958 UART: [fwproc] Received Image of size 114332 bytes
2,885,381 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,183 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,535 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,368 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,122 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,467,328 >>> mbox cmd response: failed
1,467,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,334 >>> mbox cmd response: failed
1,467,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,340 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,488 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,068 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
893,210 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,335 UART: [kat] ++
897,487 UART: [kat] sha1
901,763 UART: [kat] SHA2-256
903,703 UART: [kat] SHA2-384
906,516 UART: [kat] SHA2-512-ACC
908,417 UART: [kat] ECC-384
917,566 UART: [kat] HMAC-384Kdf
922,118 UART: [kat] LMS
1,170,446 UART: [kat] --
1,171,217 UART: [cold-reset] ++
1,171,771 UART: [fht] FHT @ 0x50003400
1,174,548 UART: [idev] ++
1,174,716 UART: [idev] CDI.KEYID = 6
1,175,076 UART: [idev] SUBJECT.KEYID = 7
1,175,500 UART: [idev] UDS.KEYID = 0
1,175,845 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,844 UART: [idev] Erasing UDS.KEYID = 0
1,201,027 UART: [idev] Sha1 KeyId Algorithm
1,209,531 UART: [idev] --
1,210,611 UART: [ldev] ++
1,210,779 UART: [ldev] CDI.KEYID = 6
1,211,142 UART: [ldev] SUBJECT.KEYID = 5
1,211,568 UART: [ldev] AUTHORITY.KEYID = 7
1,212,031 UART: [ldev] FE.KEYID = 1
1,217,319 UART: [ldev] Erasing FE.KEYID = 1
1,243,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,453 UART: [ldev] --
1,282,874 UART: [fwproc] Wait for Commands...
1,283,638 UART: [fwproc] Recv command 0x46574c44
1,284,366 UART: [fwproc] Recv'd Img size: 114332 bytes
1,309,976 UART: ROM Fatal Error: 0x000B0032
1,311,133 >>> mbox cmd response: failed
1,311,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,139 >>> mbox cmd response: failed
1,311,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,145 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,625 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
893,454 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,579 UART: [kat] ++
897,731 UART: [kat] sha1
901,813 UART: [kat] SHA2-256
903,753 UART: [kat] SHA2-384
906,510 UART: [kat] SHA2-512-ACC
908,411 UART: [kat] ECC-384
918,140 UART: [kat] HMAC-384Kdf
922,788 UART: [kat] LMS
1,171,116 UART: [kat] --
1,172,177 UART: [cold-reset] ++
1,172,725 UART: [fht] FHT @ 0x50003400
1,175,246 UART: [idev] ++
1,175,414 UART: [idev] CDI.KEYID = 6
1,175,774 UART: [idev] SUBJECT.KEYID = 7
1,176,198 UART: [idev] UDS.KEYID = 0
1,176,543 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,754 UART: [idev] Erasing UDS.KEYID = 0
1,200,587 UART: [idev] Sha1 KeyId Algorithm
1,209,099 UART: [idev] --
1,210,205 UART: [ldev] ++
1,210,373 UART: [ldev] CDI.KEYID = 6
1,210,736 UART: [ldev] SUBJECT.KEYID = 5
1,211,162 UART: [ldev] AUTHORITY.KEYID = 7
1,211,625 UART: [ldev] FE.KEYID = 1
1,216,839 UART: [ldev] Erasing FE.KEYID = 1
1,242,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,465 UART: [ldev] --
1,281,784 UART: [fwproc] Wait for Commands...
1,282,590 UART: [fwproc] Recv command 0x46574c44
1,283,318 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,837 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,141 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,842 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,889 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,164,250 >>> mbox cmd response: failed
1,164,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,256 >>> mbox cmd response: failed
1,164,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,262 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,821 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,017 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
893,477 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,602 UART: [kat] ++
897,754 UART: [kat] sha1
902,004 UART: [kat] SHA2-256
903,944 UART: [kat] SHA2-384
906,745 UART: [kat] SHA2-512-ACC
908,646 UART: [kat] ECC-384
918,787 UART: [kat] HMAC-384Kdf
923,389 UART: [kat] LMS
1,171,717 UART: [kat] --
1,172,732 UART: [cold-reset] ++
1,173,198 UART: [fht] FHT @ 0x50003400
1,175,889 UART: [idev] ++
1,176,057 UART: [idev] CDI.KEYID = 6
1,176,417 UART: [idev] SUBJECT.KEYID = 7
1,176,841 UART: [idev] UDS.KEYID = 0
1,177,186 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,159 UART: [idev] Erasing UDS.KEYID = 0
1,202,190 UART: [idev] Sha1 KeyId Algorithm
1,210,742 UART: [idev] --
1,211,856 UART: [ldev] ++
1,212,024 UART: [ldev] CDI.KEYID = 6
1,212,387 UART: [ldev] SUBJECT.KEYID = 5
1,212,813 UART: [ldev] AUTHORITY.KEYID = 7
1,213,276 UART: [ldev] FE.KEYID = 1
1,218,504 UART: [ldev] Erasing FE.KEYID = 1
1,245,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,844 UART: [ldev] --
1,284,347 UART: [fwproc] Wait for Commands...
1,285,135 UART: [fwproc] Recv command 0x46574c44
1,285,863 UART: [fwproc] Recv'd Img size: 114332 bytes
1,312,059 UART: ROM Fatal Error: 0x000B0032
1,313,216 >>> mbox cmd response: failed
1,313,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,313,222 >>> mbox cmd response: failed
1,313,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,313,228 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
893,515 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,640 UART: [kat] ++
897,792 UART: [kat] sha1
902,196 UART: [kat] SHA2-256
904,136 UART: [kat] SHA2-384
906,831 UART: [kat] SHA2-512-ACC
908,732 UART: [kat] ECC-384
918,395 UART: [kat] HMAC-384Kdf
922,977 UART: [kat] LMS
1,171,305 UART: [kat] --
1,172,290 UART: [cold-reset] ++
1,172,804 UART: [fht] FHT @ 0x50003400
1,175,601 UART: [idev] ++
1,175,769 UART: [idev] CDI.KEYID = 6
1,176,129 UART: [idev] SUBJECT.KEYID = 7
1,176,553 UART: [idev] UDS.KEYID = 0
1,176,898 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,957 UART: [idev] Erasing UDS.KEYID = 0
1,202,682 UART: [idev] Sha1 KeyId Algorithm
1,211,190 UART: [idev] --
1,212,224 UART: [ldev] ++
1,212,392 UART: [ldev] CDI.KEYID = 6
1,212,755 UART: [ldev] SUBJECT.KEYID = 5
1,213,181 UART: [ldev] AUTHORITY.KEYID = 7
1,213,644 UART: [ldev] FE.KEYID = 1
1,219,120 UART: [ldev] Erasing FE.KEYID = 1
1,246,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,260,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,277,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,476 UART: [ldev] --
1,285,981 UART: [fwproc] Wait for Commands...
1,286,719 UART: [fwproc] Recv command 0x46574c44
1,287,447 UART: [fwproc] Recv'd Img size: 114332 bytes
2,585,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,798 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,102 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,779,001 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,460 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,164,807 >>> mbox cmd response: failed
1,164,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,813 >>> mbox cmd response: failed
1,164,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,819 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,262 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,306 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,850 UART: [state] LifecycleState = Unprovisioned
85,505 UART: [state] DebugLocked = No
85,997 UART: [state] WD Timer not started. Device not locked for debugging
87,166 UART: [kat] SHA2-256
890,716 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,845 UART: [kat] ++
894,997 UART: [kat] sha1
899,115 UART: [kat] SHA2-256
901,055 UART: [kat] SHA2-384
903,796 UART: [kat] SHA2-512-ACC
905,697 UART: [kat] ECC-384
915,152 UART: [kat] HMAC-384Kdf
919,622 UART: [kat] LMS
1,167,934 UART: [kat] --
1,168,491 UART: [cold-reset] ++
1,168,921 UART: [fht] FHT @ 0x50003400
1,171,667 UART: [idev] ++
1,171,835 UART: [idev] CDI.KEYID = 6
1,172,196 UART: [idev] SUBJECT.KEYID = 7
1,172,621 UART: [idev] UDS.KEYID = 0
1,172,967 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,991 UART: [idev] Erasing UDS.KEYID = 0
1,197,645 UART: [idev] Sha1 KeyId Algorithm
1,206,367 UART: [idev] --
1,207,416 UART: [ldev] ++
1,207,584 UART: [ldev] CDI.KEYID = 6
1,207,948 UART: [ldev] SUBJECT.KEYID = 5
1,208,375 UART: [ldev] AUTHORITY.KEYID = 7
1,208,838 UART: [ldev] FE.KEYID = 1
1,214,074 UART: [ldev] Erasing FE.KEYID = 1
1,240,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,098 UART: [ldev] --
1,279,424 UART: [fwproc] Wait for Commands...
1,280,209 UART: [fwproc] Recv command 0x46574c44
1,280,942 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,392 UART: ROM Fatal Error: 0x000B0032
1,308,549 >>> mbox cmd response: failed
1,308,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,555 >>> mbox cmd response: failed
1,308,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,561 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
87,972 UART: [kat] SHA2-256
891,522 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,651 UART: [kat] ++
895,803 UART: [kat] sha1
900,005 UART: [kat] SHA2-256
901,945 UART: [kat] SHA2-384
904,810 UART: [kat] SHA2-512-ACC
906,711 UART: [kat] ECC-384
916,234 UART: [kat] HMAC-384Kdf
920,868 UART: [kat] LMS
1,169,180 UART: [kat] --
1,170,043 UART: [cold-reset] ++
1,170,499 UART: [fht] FHT @ 0x50003400
1,173,261 UART: [idev] ++
1,173,429 UART: [idev] CDI.KEYID = 6
1,173,790 UART: [idev] SUBJECT.KEYID = 7
1,174,215 UART: [idev] UDS.KEYID = 0
1,174,561 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,001 UART: [idev] Erasing UDS.KEYID = 0
1,199,165 UART: [idev] Sha1 KeyId Algorithm
1,208,105 UART: [idev] --
1,208,950 UART: [ldev] ++
1,209,118 UART: [ldev] CDI.KEYID = 6
1,209,482 UART: [ldev] SUBJECT.KEYID = 5
1,209,909 UART: [ldev] AUTHORITY.KEYID = 7
1,210,372 UART: [ldev] FE.KEYID = 1
1,215,926 UART: [ldev] Erasing FE.KEYID = 1
1,242,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,230 UART: [ldev] --
1,281,662 UART: [fwproc] Wait for Commands...
1,282,271 UART: [fwproc] Recv command 0x46574c44
1,283,004 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,633 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,961 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,270 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,178 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,232 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,062 >>> mbox cmd response: failed
1,161,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,068 >>> mbox cmd response: failed
1,161,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,074 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,158 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,186 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
891,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,488 UART: [kat] ++
895,640 UART: [kat] sha1
899,866 UART: [kat] SHA2-256
901,806 UART: [kat] SHA2-384
904,457 UART: [kat] SHA2-512-ACC
906,358 UART: [kat] ECC-384
916,367 UART: [kat] HMAC-384Kdf
921,123 UART: [kat] LMS
1,169,435 UART: [kat] --
1,170,258 UART: [cold-reset] ++
1,170,834 UART: [fht] FHT @ 0x50003400
1,173,474 UART: [idev] ++
1,173,642 UART: [idev] CDI.KEYID = 6
1,174,003 UART: [idev] SUBJECT.KEYID = 7
1,174,428 UART: [idev] UDS.KEYID = 0
1,174,774 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,266 UART: [idev] Erasing UDS.KEYID = 0
1,199,138 UART: [idev] Sha1 KeyId Algorithm
1,207,948 UART: [idev] --
1,208,865 UART: [ldev] ++
1,209,033 UART: [ldev] CDI.KEYID = 6
1,209,397 UART: [ldev] SUBJECT.KEYID = 5
1,209,824 UART: [ldev] AUTHORITY.KEYID = 7
1,210,287 UART: [ldev] FE.KEYID = 1
1,215,387 UART: [ldev] Erasing FE.KEYID = 1
1,241,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,223 UART: [ldev] --
1,280,691 UART: [fwproc] Wait for Commands...
1,281,312 UART: [fwproc] Recv command 0x46574c44
1,282,045 UART: [fwproc] Recv'd Img size: 114332 bytes
1,307,943 UART: ROM Fatal Error: 0x000B0032
1,309,100 >>> mbox cmd response: failed
1,309,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,106 >>> mbox cmd response: failed
1,309,106 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,112 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
891,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,744 UART: [kat] ++
895,896 UART: [kat] sha1
900,320 UART: [kat] SHA2-256
902,260 UART: [kat] SHA2-384
905,017 UART: [kat] SHA2-512-ACC
906,918 UART: [kat] ECC-384
916,745 UART: [kat] HMAC-384Kdf
921,447 UART: [kat] LMS
1,169,759 UART: [kat] --
1,170,542 UART: [cold-reset] ++
1,171,092 UART: [fht] FHT @ 0x50003400
1,173,642 UART: [idev] ++
1,173,810 UART: [idev] CDI.KEYID = 6
1,174,171 UART: [idev] SUBJECT.KEYID = 7
1,174,596 UART: [idev] UDS.KEYID = 0
1,174,942 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,596 UART: [idev] Erasing UDS.KEYID = 0
1,199,742 UART: [idev] Sha1 KeyId Algorithm
1,208,670 UART: [idev] --
1,209,683 UART: [ldev] ++
1,209,851 UART: [ldev] CDI.KEYID = 6
1,210,215 UART: [ldev] SUBJECT.KEYID = 5
1,210,642 UART: [ldev] AUTHORITY.KEYID = 7
1,211,105 UART: [ldev] FE.KEYID = 1
1,216,021 UART: [ldev] Erasing FE.KEYID = 1
1,242,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,547 UART: [ldev] --
1,281,857 UART: [fwproc] Wait for Commands...
1,282,680 UART: [fwproc] Recv command 0x46574c44
1,283,413 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,934 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,684 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,993 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,899 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,901 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,161,769 >>> mbox cmd response: failed
1,161,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,775 >>> mbox cmd response: failed
1,161,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,781 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,417 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,787 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,095 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,739 UART: [kat] SHA2-256
881,670 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,785 UART: [kat] ++
885,937 UART: [kat] sha1
890,353 UART: [kat] SHA2-256
892,291 UART: [kat] SHA2-384
894,964 UART: [kat] SHA2-512-ACC
896,865 UART: [kat] ECC-384
902,460 UART: [kat] HMAC-384Kdf
906,872 UART: [kat] LMS
1,475,068 UART: [kat] --
1,476,067 UART: [cold-reset] ++
1,476,485 UART: [fht] Storing FHT @ 0x50003400
1,479,184 UART: [idev] ++
1,479,352 UART: [idev] CDI.KEYID = 6
1,479,712 UART: [idev] SUBJECT.KEYID = 7
1,480,136 UART: [idev] UDS.KEYID = 0
1,480,481 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,042 UART: [idev] Erasing UDS.KEYID = 0
1,504,332 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,890 UART: [idev] --
1,514,057 UART: [ldev] ++
1,514,225 UART: [ldev] CDI.KEYID = 6
1,514,588 UART: [ldev] SUBJECT.KEYID = 5
1,515,014 UART: [ldev] AUTHORITY.KEYID = 7
1,515,477 UART: [ldev] FE.KEYID = 1
1,520,689 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,194 UART: [ldev] --
1,585,637 UART: [fwproc] Waiting for Commands...
1,586,398 UART: [fwproc] Received command 0x46574c44
1,587,189 UART: [fwproc] Received Image of size 114332 bytes
1,613,440 UART: ROM Fatal Error: 0x00B0003A
1,614,601 >>> mbox cmd response: failed
1,614,601 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,607 >>> mbox cmd response: failed
1,614,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,613 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,209 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,717 UART: [kat] SHA2-256
881,648 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,763 UART: [kat] ++
885,915 UART: [kat] sha1
890,123 UART: [kat] SHA2-256
892,061 UART: [kat] SHA2-384
894,824 UART: [kat] SHA2-512-ACC
896,725 UART: [kat] ECC-384
902,440 UART: [kat] HMAC-384Kdf
906,840 UART: [kat] LMS
1,475,036 UART: [kat] --
1,475,909 UART: [cold-reset] ++
1,476,431 UART: [fht] Storing FHT @ 0x50003400
1,479,270 UART: [idev] ++
1,479,438 UART: [idev] CDI.KEYID = 6
1,479,798 UART: [idev] SUBJECT.KEYID = 7
1,480,222 UART: [idev] UDS.KEYID = 0
1,480,567 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,394 UART: [idev] Erasing UDS.KEYID = 0
1,504,350 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,878 UART: [idev] --
1,514,053 UART: [ldev] ++
1,514,221 UART: [ldev] CDI.KEYID = 6
1,514,584 UART: [ldev] SUBJECT.KEYID = 5
1,515,010 UART: [ldev] AUTHORITY.KEYID = 7
1,515,473 UART: [ldev] FE.KEYID = 1
1,520,799 UART: [ldev] Erasing FE.KEYID = 1
1,546,396 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,076 UART: [ldev] --
1,585,419 UART: [fwproc] Waiting for Commands...
1,586,140 UART: [fwproc] Received command 0x46574c44
1,586,931 UART: [fwproc] Received Image of size 114332 bytes
2,885,428 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,180 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,532 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,521 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,535 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,468,048 >>> mbox cmd response: failed
1,468,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,054 >>> mbox cmd response: failed
1,468,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,060 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,077 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,693 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Unprovisioned
86,418 UART: [state] DebugLocked = No
87,062 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,700 UART: [kat] SHA2-256
882,631 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,746 UART: [kat] ++
886,898 UART: [kat] sha1
891,066 UART: [kat] SHA2-256
893,004 UART: [kat] SHA2-384
895,965 UART: [kat] SHA2-512-ACC
897,866 UART: [kat] ECC-384
903,381 UART: [kat] HMAC-384Kdf
907,905 UART: [kat] LMS
1,476,101 UART: [kat] --
1,476,866 UART: [cold-reset] ++
1,477,328 UART: [fht] Storing FHT @ 0x50003400
1,480,235 UART: [idev] ++
1,480,403 UART: [idev] CDI.KEYID = 6
1,480,763 UART: [idev] SUBJECT.KEYID = 7
1,481,187 UART: [idev] UDS.KEYID = 0
1,481,532 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,081 UART: [idev] Erasing UDS.KEYID = 0
1,505,203 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,611 UART: [idev] --
1,514,582 UART: [ldev] ++
1,514,750 UART: [ldev] CDI.KEYID = 6
1,515,113 UART: [ldev] SUBJECT.KEYID = 5
1,515,539 UART: [ldev] AUTHORITY.KEYID = 7
1,516,002 UART: [ldev] FE.KEYID = 1
1,521,430 UART: [ldev] Erasing FE.KEYID = 1
1,546,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,415 UART: [ldev] --
1,585,890 UART: [fwproc] Waiting for Commands...
1,586,533 UART: [fwproc] Received command 0x46574c44
1,587,324 UART: [fwproc] Received Image of size 114332 bytes
1,613,645 UART: ROM Fatal Error: 0x00B0003A
1,614,806 >>> mbox cmd response: failed
1,614,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,812 >>> mbox cmd response: failed
1,614,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,818 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,690 UART: [state] DebugLocked = No
86,262 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,962 UART: [kat] SHA2-256
881,893 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,008 UART: [kat] ++
886,160 UART: [kat] sha1
890,368 UART: [kat] SHA2-256
892,306 UART: [kat] SHA2-384
895,119 UART: [kat] SHA2-512-ACC
897,020 UART: [kat] ECC-384
902,503 UART: [kat] HMAC-384Kdf
907,251 UART: [kat] LMS
1,475,447 UART: [kat] --
1,476,322 UART: [cold-reset] ++
1,476,854 UART: [fht] Storing FHT @ 0x50003400
1,479,685 UART: [idev] ++
1,479,853 UART: [idev] CDI.KEYID = 6
1,480,213 UART: [idev] SUBJECT.KEYID = 7
1,480,637 UART: [idev] UDS.KEYID = 0
1,480,982 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,937 UART: [idev] Erasing UDS.KEYID = 0
1,505,953 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,749 UART: [idev] --
1,515,790 UART: [ldev] ++
1,515,958 UART: [ldev] CDI.KEYID = 6
1,516,321 UART: [ldev] SUBJECT.KEYID = 5
1,516,747 UART: [ldev] AUTHORITY.KEYID = 7
1,517,210 UART: [ldev] FE.KEYID = 1
1,522,410 UART: [ldev] Erasing FE.KEYID = 1
1,547,595 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,389 UART: [ldev] --
1,586,750 UART: [fwproc] Waiting for Commands...
1,587,473 UART: [fwproc] Received command 0x46574c44
1,588,264 UART: [fwproc] Received Image of size 114332 bytes
2,885,347 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,155 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,507 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,304 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,076 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,468,503 >>> mbox cmd response: failed
1,468,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,509 >>> mbox cmd response: failed
1,468,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,515 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,002 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,602 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
893,244 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,369 UART: [kat] ++
897,521 UART: [kat] sha1
901,887 UART: [kat] SHA2-256
903,827 UART: [kat] SHA2-384
906,508 UART: [kat] SHA2-512-ACC
908,409 UART: [kat] ECC-384
918,150 UART: [kat] HMAC-384Kdf
922,552 UART: [kat] LMS
1,170,880 UART: [kat] --
1,171,541 UART: [cold-reset] ++
1,171,929 UART: [fht] FHT @ 0x50003400
1,174,376 UART: [idev] ++
1,174,544 UART: [idev] CDI.KEYID = 6
1,174,904 UART: [idev] SUBJECT.KEYID = 7
1,175,328 UART: [idev] UDS.KEYID = 0
1,175,673 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,224 UART: [idev] Erasing UDS.KEYID = 0
1,200,499 UART: [idev] Sha1 KeyId Algorithm
1,208,919 UART: [idev] --
1,209,953 UART: [ldev] ++
1,210,121 UART: [ldev] CDI.KEYID = 6
1,210,484 UART: [ldev] SUBJECT.KEYID = 5
1,210,910 UART: [ldev] AUTHORITY.KEYID = 7
1,211,373 UART: [ldev] FE.KEYID = 1
1,216,581 UART: [ldev] Erasing FE.KEYID = 1
1,243,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,049 UART: [ldev] --
1,282,512 UART: [fwproc] Wait for Commands...
1,283,210 UART: [fwproc] Recv command 0x46574c44
1,283,938 UART: [fwproc] Recv'd Img size: 114332 bytes
1,310,103 UART: ROM Fatal Error: 0x00B0003A
1,311,264 >>> mbox cmd response: failed
1,311,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,270 >>> mbox cmd response: failed
1,311,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,276 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,750 UART: [state] LifecycleState = Unprovisioned
85,405 UART: [state] DebugLocked = No
85,947 UART: [state] WD Timer not started. Device not locked for debugging
87,160 UART: [kat] SHA2-256
892,810 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,935 UART: [kat] ++
897,087 UART: [kat] sha1
901,363 UART: [kat] SHA2-256
903,303 UART: [kat] SHA2-384
905,938 UART: [kat] SHA2-512-ACC
907,839 UART: [kat] ECC-384
917,852 UART: [kat] HMAC-384Kdf
922,194 UART: [kat] LMS
1,170,522 UART: [kat] --
1,171,509 UART: [cold-reset] ++
1,171,935 UART: [fht] FHT @ 0x50003400
1,174,538 UART: [idev] ++
1,174,706 UART: [idev] CDI.KEYID = 6
1,175,066 UART: [idev] SUBJECT.KEYID = 7
1,175,490 UART: [idev] UDS.KEYID = 0
1,175,835 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,488 UART: [idev] Erasing UDS.KEYID = 0
1,200,365 UART: [idev] Sha1 KeyId Algorithm
1,208,607 UART: [idev] --
1,209,753 UART: [ldev] ++
1,209,921 UART: [ldev] CDI.KEYID = 6
1,210,284 UART: [ldev] SUBJECT.KEYID = 5
1,210,710 UART: [ldev] AUTHORITY.KEYID = 7
1,211,173 UART: [ldev] FE.KEYID = 1
1,216,459 UART: [ldev] Erasing FE.KEYID = 1
1,242,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,691 UART: [ldev] --
1,282,092 UART: [fwproc] Wait for Commands...
1,282,884 UART: [fwproc] Recv command 0x46574c44
1,283,612 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,013 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,317 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,008 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,145 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,163,843 >>> mbox cmd response: failed
1,163,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,849 >>> mbox cmd response: failed
1,163,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,855 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,259 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,437 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,320 UART: [state] WD Timer not started. Device not locked for debugging
87,547 UART: [kat] SHA2-256
893,197 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,322 UART: [kat] ++
897,474 UART: [kat] sha1
901,544 UART: [kat] SHA2-256
903,484 UART: [kat] SHA2-384
906,307 UART: [kat] SHA2-512-ACC
908,208 UART: [kat] ECC-384
917,919 UART: [kat] HMAC-384Kdf
922,599 UART: [kat] LMS
1,170,927 UART: [kat] --
1,171,684 UART: [cold-reset] ++
1,172,010 UART: [fht] FHT @ 0x50003400
1,174,775 UART: [idev] ++
1,174,943 UART: [idev] CDI.KEYID = 6
1,175,303 UART: [idev] SUBJECT.KEYID = 7
1,175,727 UART: [idev] UDS.KEYID = 0
1,176,072 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,739 UART: [idev] Erasing UDS.KEYID = 0
1,200,780 UART: [idev] Sha1 KeyId Algorithm
1,209,260 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,795 UART: [ldev] SUBJECT.KEYID = 5
1,211,221 UART: [ldev] AUTHORITY.KEYID = 7
1,211,684 UART: [ldev] FE.KEYID = 1
1,216,708 UART: [ldev] Erasing FE.KEYID = 1
1,243,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,998 UART: [ldev] --
1,282,497 UART: [fwproc] Wait for Commands...
1,283,127 UART: [fwproc] Recv command 0x46574c44
1,283,855 UART: [fwproc] Recv'd Img size: 114332 bytes
1,310,068 UART: ROM Fatal Error: 0x00B0003A
1,311,229 >>> mbox cmd response: failed
1,311,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,235 >>> mbox cmd response: failed
1,311,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,241 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,755 UART: [kat] SHA2-256
893,405 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,530 UART: [kat] ++
897,682 UART: [kat] sha1
902,084 UART: [kat] SHA2-256
904,024 UART: [kat] SHA2-384
906,777 UART: [kat] SHA2-512-ACC
908,678 UART: [kat] ECC-384
918,423 UART: [kat] HMAC-384Kdf
923,027 UART: [kat] LMS
1,171,355 UART: [kat] --
1,172,040 UART: [cold-reset] ++
1,172,450 UART: [fht] FHT @ 0x50003400
1,175,165 UART: [idev] ++
1,175,333 UART: [idev] CDI.KEYID = 6
1,175,693 UART: [idev] SUBJECT.KEYID = 7
1,176,117 UART: [idev] UDS.KEYID = 0
1,176,462 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,313 UART: [idev] Erasing UDS.KEYID = 0
1,201,300 UART: [idev] Sha1 KeyId Algorithm
1,209,880 UART: [idev] --
1,210,934 UART: [ldev] ++
1,211,102 UART: [ldev] CDI.KEYID = 6
1,211,465 UART: [ldev] SUBJECT.KEYID = 5
1,211,891 UART: [ldev] AUTHORITY.KEYID = 7
1,212,354 UART: [ldev] FE.KEYID = 1
1,217,792 UART: [ldev] Erasing FE.KEYID = 1
1,244,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,608 UART: [ldev] --
1,283,895 UART: [fwproc] Wait for Commands...
1,284,531 UART: [fwproc] Recv command 0x46574c44
1,285,259 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,006 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,310 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,021 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,188 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,166,204 >>> mbox cmd response: failed
1,166,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,210 >>> mbox cmd response: failed
1,166,210 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,216 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,862 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,526 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,703 UART: [state] WD Timer not started. Device not locked for debugging
87,946 UART: [kat] SHA2-256
891,496 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
899,953 UART: [kat] SHA2-256
901,893 UART: [kat] SHA2-384
904,684 UART: [kat] SHA2-512-ACC
906,585 UART: [kat] ECC-384
916,004 UART: [kat] HMAC-384Kdf
920,570 UART: [kat] LMS
1,168,882 UART: [kat] --
1,169,951 UART: [cold-reset] ++
1,170,511 UART: [fht] FHT @ 0x50003400
1,172,981 UART: [idev] ++
1,173,149 UART: [idev] CDI.KEYID = 6
1,173,510 UART: [idev] SUBJECT.KEYID = 7
1,173,935 UART: [idev] UDS.KEYID = 0
1,174,281 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,743 UART: [idev] Erasing UDS.KEYID = 0
1,198,517 UART: [idev] Sha1 KeyId Algorithm
1,207,375 UART: [idev] --
1,208,524 UART: [ldev] ++
1,208,692 UART: [ldev] CDI.KEYID = 6
1,209,056 UART: [ldev] SUBJECT.KEYID = 5
1,209,483 UART: [ldev] AUTHORITY.KEYID = 7
1,209,946 UART: [ldev] FE.KEYID = 1
1,215,238 UART: [ldev] Erasing FE.KEYID = 1
1,241,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,462 UART: [ldev] --
1,280,938 UART: [fwproc] Wait for Commands...
1,281,647 UART: [fwproc] Recv command 0x46574c44
1,282,380 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,471 UART: ROM Fatal Error: 0x00B0003A
1,309,632 >>> mbox cmd response: failed
1,309,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,638 >>> mbox cmd response: failed
1,309,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,644 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
891,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,385 UART: [kat] ++
895,537 UART: [kat] sha1
899,993 UART: [kat] SHA2-256
901,933 UART: [kat] SHA2-384
904,518 UART: [kat] SHA2-512-ACC
906,419 UART: [kat] ECC-384
916,242 UART: [kat] HMAC-384Kdf
920,858 UART: [kat] LMS
1,169,170 UART: [kat] --
1,170,009 UART: [cold-reset] ++
1,170,343 UART: [fht] FHT @ 0x50003400
1,173,019 UART: [idev] ++
1,173,187 UART: [idev] CDI.KEYID = 6
1,173,548 UART: [idev] SUBJECT.KEYID = 7
1,173,973 UART: [idev] UDS.KEYID = 0
1,174,319 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,993 UART: [idev] Erasing UDS.KEYID = 0
1,198,879 UART: [idev] Sha1 KeyId Algorithm
1,207,829 UART: [idev] --
1,208,792 UART: [ldev] ++
1,208,960 UART: [ldev] CDI.KEYID = 6
1,209,324 UART: [ldev] SUBJECT.KEYID = 5
1,209,751 UART: [ldev] AUTHORITY.KEYID = 7
1,210,214 UART: [ldev] FE.KEYID = 1
1,215,358 UART: [ldev] Erasing FE.KEYID = 1
1,242,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,044 UART: [ldev] --
1,281,374 UART: [fwproc] Wait for Commands...
1,281,949 UART: [fwproc] Recv command 0x46574c44
1,282,682 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,367 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,676 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,600 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,980 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,277 >>> mbox cmd response: failed
1,162,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,283 >>> mbox cmd response: failed
1,162,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,289 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,072 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,088 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,510 UART: [state] WD Timer not started. Device not locked for debugging
87,619 UART: [kat] SHA2-256
891,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,298 UART: [kat] ++
895,450 UART: [kat] sha1
899,610 UART: [kat] SHA2-256
901,550 UART: [kat] SHA2-384
904,119 UART: [kat] SHA2-512-ACC
906,020 UART: [kat] ECC-384
916,179 UART: [kat] HMAC-384Kdf
920,865 UART: [kat] LMS
1,169,177 UART: [kat] --
1,170,128 UART: [cold-reset] ++
1,170,492 UART: [fht] FHT @ 0x50003400
1,173,092 UART: [idev] ++
1,173,260 UART: [idev] CDI.KEYID = 6
1,173,621 UART: [idev] SUBJECT.KEYID = 7
1,174,046 UART: [idev] UDS.KEYID = 0
1,174,392 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,086 UART: [idev] Erasing UDS.KEYID = 0
1,199,364 UART: [idev] Sha1 KeyId Algorithm
1,208,298 UART: [idev] --
1,209,149 UART: [ldev] ++
1,209,317 UART: [ldev] CDI.KEYID = 6
1,209,681 UART: [ldev] SUBJECT.KEYID = 5
1,210,108 UART: [ldev] AUTHORITY.KEYID = 7
1,210,571 UART: [ldev] FE.KEYID = 1
1,215,527 UART: [ldev] Erasing FE.KEYID = 1
1,241,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,863 UART: [ldev] --
1,281,239 UART: [fwproc] Wait for Commands...
1,281,848 UART: [fwproc] Recv command 0x46574c44
1,282,581 UART: [fwproc] Recv'd Img size: 114332 bytes
1,308,282 UART: ROM Fatal Error: 0x00B0003A
1,309,443 >>> mbox cmd response: failed
1,309,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,449 >>> mbox cmd response: failed
1,309,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,455 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
891,549 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,678 UART: [kat] ++
895,830 UART: [kat] sha1
900,274 UART: [kat] SHA2-256
902,214 UART: [kat] SHA2-384
905,045 UART: [kat] SHA2-512-ACC
906,946 UART: [kat] ECC-384
916,701 UART: [kat] HMAC-384Kdf
921,239 UART: [kat] LMS
1,169,551 UART: [kat] --
1,170,390 UART: [cold-reset] ++
1,170,964 UART: [fht] FHT @ 0x50003400
1,173,672 UART: [idev] ++
1,173,840 UART: [idev] CDI.KEYID = 6
1,174,201 UART: [idev] SUBJECT.KEYID = 7
1,174,626 UART: [idev] UDS.KEYID = 0
1,174,972 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,902 UART: [idev] Erasing UDS.KEYID = 0
1,200,202 UART: [idev] Sha1 KeyId Algorithm
1,209,176 UART: [idev] --
1,210,389 UART: [ldev] ++
1,210,557 UART: [ldev] CDI.KEYID = 6
1,210,921 UART: [ldev] SUBJECT.KEYID = 5
1,211,348 UART: [ldev] AUTHORITY.KEYID = 7
1,211,811 UART: [ldev] FE.KEYID = 1
1,217,101 UART: [ldev] Erasing FE.KEYID = 1
1,243,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,439 UART: [ldev] --
1,282,949 UART: [fwproc] Wait for Commands...
1,283,698 UART: [fwproc] Recv command 0x46574c44
1,284,431 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,764 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,073 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,997 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,133 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,162,516 >>> mbox cmd response: failed
1,162,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,522 >>> mbox cmd response: failed
1,162,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,528 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,549 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,425 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,069 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,685 UART: [kat] SHA2-256
881,616 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,731 UART: [kat] ++
885,883 UART: [kat] sha1
890,025 UART: [kat] SHA2-256
891,963 UART: [kat] SHA2-384
894,698 UART: [kat] SHA2-512-ACC
896,599 UART: [kat] ECC-384
902,146 UART: [kat] HMAC-384Kdf
906,852 UART: [kat] LMS
1,475,048 UART: [kat] --
1,475,895 UART: [cold-reset] ++
1,476,391 UART: [fht] Storing FHT @ 0x50003400
1,479,270 UART: [idev] ++
1,479,438 UART: [idev] CDI.KEYID = 6
1,479,798 UART: [idev] SUBJECT.KEYID = 7
1,480,222 UART: [idev] UDS.KEYID = 0
1,480,567 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,656 UART: [idev] Erasing UDS.KEYID = 0
1,505,744 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,476 UART: [idev] --
1,515,395 UART: [ldev] ++
1,515,563 UART: [ldev] CDI.KEYID = 6
1,515,926 UART: [ldev] SUBJECT.KEYID = 5
1,516,352 UART: [ldev] AUTHORITY.KEYID = 7
1,516,815 UART: [ldev] FE.KEYID = 1
1,522,175 UART: [ldev] Erasing FE.KEYID = 1
1,547,696 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,734 UART: [ldev] --
1,586,997 UART: [fwproc] Waiting for Commands...
1,587,740 UART: [fwproc] Received command 0x46574c44
1,588,531 UART: [fwproc] Received Image of size 114332 bytes
2,763,812 UART: ROM Fatal Error: 0x000B0033
2,764,969 >>> mbox cmd response: failed
2,764,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,975 >>> mbox cmd response: failed
2,764,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,981 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,889 UART: [kat] SHA2-256
881,820 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,935 UART: [kat] ++
886,087 UART: [kat] sha1
890,261 UART: [kat] SHA2-256
892,199 UART: [kat] SHA2-384
894,930 UART: [kat] SHA2-512-ACC
896,831 UART: [kat] ECC-384
902,354 UART: [kat] HMAC-384Kdf
906,722 UART: [kat] LMS
1,474,918 UART: [kat] --
1,475,597 UART: [cold-reset] ++
1,476,037 UART: [fht] Storing FHT @ 0x50003400
1,478,820 UART: [idev] ++
1,478,988 UART: [idev] CDI.KEYID = 6
1,479,348 UART: [idev] SUBJECT.KEYID = 7
1,479,772 UART: [idev] UDS.KEYID = 0
1,480,117 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,142 UART: [idev] Erasing UDS.KEYID = 0
1,504,622 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,046 UART: [idev] --
1,513,883 UART: [ldev] ++
1,514,051 UART: [ldev] CDI.KEYID = 6
1,514,414 UART: [ldev] SUBJECT.KEYID = 5
1,514,840 UART: [ldev] AUTHORITY.KEYID = 7
1,515,303 UART: [ldev] FE.KEYID = 1
1,520,575 UART: [ldev] Erasing FE.KEYID = 1
1,545,556 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,394 UART: [ldev] --
1,584,779 UART: [fwproc] Waiting for Commands...
1,585,538 UART: [fwproc] Received command 0x46574c44
1,586,329 UART: [fwproc] Received Image of size 114332 bytes
2,883,330 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,522 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,874 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,075,763 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,311 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,615,212 >>> mbox cmd response: failed
2,615,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,615,218 >>> mbox cmd response: failed
2,615,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,615,224 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,425 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,191 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,676 UART: [state] DebugLocked = No
86,296 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,842 UART: [kat] SHA2-256
881,773 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,888 UART: [kat] ++
886,040 UART: [kat] sha1
890,306 UART: [kat] SHA2-256
892,244 UART: [kat] SHA2-384
894,899 UART: [kat] SHA2-512-ACC
896,800 UART: [kat] ECC-384
902,829 UART: [kat] HMAC-384Kdf
907,509 UART: [kat] LMS
1,475,705 UART: [kat] --
1,476,650 UART: [cold-reset] ++
1,477,170 UART: [fht] Storing FHT @ 0x50003400
1,479,889 UART: [idev] ++
1,480,057 UART: [idev] CDI.KEYID = 6
1,480,417 UART: [idev] SUBJECT.KEYID = 7
1,480,841 UART: [idev] UDS.KEYID = 0
1,481,186 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,607 UART: [idev] Erasing UDS.KEYID = 0
1,505,123 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,705 UART: [idev] --
1,514,682 UART: [ldev] ++
1,514,850 UART: [ldev] CDI.KEYID = 6
1,515,213 UART: [ldev] SUBJECT.KEYID = 5
1,515,639 UART: [ldev] AUTHORITY.KEYID = 7
1,516,102 UART: [ldev] FE.KEYID = 1
1,521,656 UART: [ldev] Erasing FE.KEYID = 1
1,546,941 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,551 UART: [ldev] --
1,586,046 UART: [fwproc] Waiting for Commands...
1,586,677 UART: [fwproc] Received command 0x46574c44
1,587,468 UART: [fwproc] Received Image of size 114332 bytes
2,988,901 UART: ROM Fatal Error: 0x000B0033
2,990,058 >>> mbox cmd response: failed
2,990,058 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,990,064 >>> mbox cmd response: failed
2,990,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,990,070 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
87,004 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,680 UART: [kat] SHA2-256
882,611 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,726 UART: [kat] ++
886,878 UART: [kat] sha1
891,024 UART: [kat] SHA2-256
892,962 UART: [kat] SHA2-384
895,755 UART: [kat] SHA2-512-ACC
897,656 UART: [kat] ECC-384
903,499 UART: [kat] HMAC-384Kdf
908,051 UART: [kat] LMS
1,476,247 UART: [kat] --
1,477,190 UART: [cold-reset] ++
1,477,706 UART: [fht] Storing FHT @ 0x50003400
1,480,287 UART: [idev] ++
1,480,455 UART: [idev] CDI.KEYID = 6
1,480,815 UART: [idev] SUBJECT.KEYID = 7
1,481,239 UART: [idev] UDS.KEYID = 0
1,481,584 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,355 UART: [idev] Erasing UDS.KEYID = 0
1,506,685 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,353 UART: [idev] --
1,516,432 UART: [ldev] ++
1,516,600 UART: [ldev] CDI.KEYID = 6
1,516,963 UART: [ldev] SUBJECT.KEYID = 5
1,517,389 UART: [ldev] AUTHORITY.KEYID = 7
1,517,852 UART: [ldev] FE.KEYID = 1
1,523,112 UART: [ldev] Erasing FE.KEYID = 1
1,548,681 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,407 UART: [ldev] --
1,587,760 UART: [fwproc] Waiting for Commands...
1,588,429 UART: [fwproc] Received command 0x46574c44
1,589,220 UART: [fwproc] Received Image of size 114332 bytes
2,887,073 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,953 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,305 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,122 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,062 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,615,839 >>> mbox cmd response: failed
2,615,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,615,845 >>> mbox cmd response: failed
2,615,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,615,851 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,640 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,929,654 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
893,196 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,321 UART: [kat] ++
897,473 UART: [kat] sha1
901,881 UART: [kat] SHA2-256
903,821 UART: [kat] SHA2-384
906,664 UART: [kat] SHA2-512-ACC
908,565 UART: [kat] ECC-384
918,588 UART: [kat] HMAC-384Kdf
923,062 UART: [kat] LMS
1,171,390 UART: [kat] --
1,172,237 UART: [cold-reset] ++
1,172,727 UART: [fht] FHT @ 0x50003400
1,175,634 UART: [idev] ++
1,175,802 UART: [idev] CDI.KEYID = 6
1,176,162 UART: [idev] SUBJECT.KEYID = 7
1,176,586 UART: [idev] UDS.KEYID = 0
1,176,931 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,564 UART: [idev] Erasing UDS.KEYID = 0
1,201,479 UART: [idev] Sha1 KeyId Algorithm
1,209,945 UART: [idev] --
1,211,011 UART: [ldev] ++
1,211,179 UART: [ldev] CDI.KEYID = 6
1,211,542 UART: [ldev] SUBJECT.KEYID = 5
1,211,968 UART: [ldev] AUTHORITY.KEYID = 7
1,212,431 UART: [ldev] FE.KEYID = 1
1,217,433 UART: [ldev] Erasing FE.KEYID = 1
1,244,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,181 UART: [ldev] --
1,283,510 UART: [fwproc] Wait for Commands...
1,284,320 UART: [fwproc] Recv command 0x46574c44
1,285,048 UART: [fwproc] Recv'd Img size: 114332 bytes
1,595,796 UART: ROM Fatal Error: 0x000B0033
1,596,953 >>> mbox cmd response: failed
1,596,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,959 >>> mbox cmd response: failed
1,596,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,965 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,658 UART: [state] LifecycleState = Unprovisioned
86,313 UART: [state] DebugLocked = No
86,893 UART: [state] WD Timer not started. Device not locked for debugging
88,040 UART: [kat] SHA2-256
893,690 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,815 UART: [kat] ++
897,967 UART: [kat] sha1
902,057 UART: [kat] SHA2-256
903,997 UART: [kat] SHA2-384
906,780 UART: [kat] SHA2-512-ACC
908,681 UART: [kat] ECC-384
918,352 UART: [kat] HMAC-384Kdf
922,870 UART: [kat] LMS
1,171,198 UART: [kat] --
1,172,209 UART: [cold-reset] ++
1,172,681 UART: [fht] FHT @ 0x50003400
1,175,344 UART: [idev] ++
1,175,512 UART: [idev] CDI.KEYID = 6
1,175,872 UART: [idev] SUBJECT.KEYID = 7
1,176,296 UART: [idev] UDS.KEYID = 0
1,176,641 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,096 UART: [idev] Erasing UDS.KEYID = 0
1,201,483 UART: [idev] Sha1 KeyId Algorithm
1,209,903 UART: [idev] --
1,210,923 UART: [ldev] ++
1,211,091 UART: [ldev] CDI.KEYID = 6
1,211,454 UART: [ldev] SUBJECT.KEYID = 5
1,211,880 UART: [ldev] AUTHORITY.KEYID = 7
1,212,343 UART: [ldev] FE.KEYID = 1
1,217,441 UART: [ldev] Erasing FE.KEYID = 1
1,243,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,523 UART: [ldev] --
1,283,026 UART: [fwproc] Wait for Commands...
1,283,668 UART: [fwproc] Recv command 0x46574c44
1,284,396 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,269 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,573 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,286 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,107 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,454,618 >>> mbox cmd response: failed
1,454,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,454,624 >>> mbox cmd response: failed
1,454,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,454,630 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,639 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,181 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [kat] SHA2-256
893,599 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,724 UART: [kat] ++
897,876 UART: [kat] sha1
902,202 UART: [kat] SHA2-256
904,142 UART: [kat] SHA2-384
906,703 UART: [kat] SHA2-512-ACC
908,604 UART: [kat] ECC-384
918,457 UART: [kat] HMAC-384Kdf
923,235 UART: [kat] LMS
1,171,563 UART: [kat] --
1,172,314 UART: [cold-reset] ++
1,172,808 UART: [fht] FHT @ 0x50003400
1,175,365 UART: [idev] ++
1,175,533 UART: [idev] CDI.KEYID = 6
1,175,893 UART: [idev] SUBJECT.KEYID = 7
1,176,317 UART: [idev] UDS.KEYID = 0
1,176,662 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,359 UART: [idev] Erasing UDS.KEYID = 0
1,201,548 UART: [idev] Sha1 KeyId Algorithm
1,209,930 UART: [idev] --
1,210,782 UART: [ldev] ++
1,210,950 UART: [ldev] CDI.KEYID = 6
1,211,313 UART: [ldev] SUBJECT.KEYID = 5
1,211,739 UART: [ldev] AUTHORITY.KEYID = 7
1,212,202 UART: [ldev] FE.KEYID = 1
1,217,450 UART: [ldev] Erasing FE.KEYID = 1
1,243,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,280 UART: [ldev] --
1,282,547 UART: [fwproc] Wait for Commands...
1,283,143 UART: [fwproc] Recv command 0x46574c44
1,283,871 UART: [fwproc] Recv'd Img size: 114332 bytes
1,589,957 UART: ROM Fatal Error: 0x000B0033
1,591,114 >>> mbox cmd response: failed
1,591,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,591,120 >>> mbox cmd response: failed
1,591,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,591,126 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,829 UART: [state] LifecycleState = Unprovisioned
86,484 UART: [state] DebugLocked = No
87,174 UART: [state] WD Timer not started. Device not locked for debugging
88,519 UART: [kat] SHA2-256
894,169 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,294 UART: [kat] ++
898,446 UART: [kat] sha1
902,636 UART: [kat] SHA2-256
904,576 UART: [kat] SHA2-384
907,389 UART: [kat] SHA2-512-ACC
909,290 UART: [kat] ECC-384
918,977 UART: [kat] HMAC-384Kdf
923,435 UART: [kat] LMS
1,171,763 UART: [kat] --
1,172,682 UART: [cold-reset] ++
1,173,162 UART: [fht] FHT @ 0x50003400
1,175,723 UART: [idev] ++
1,175,891 UART: [idev] CDI.KEYID = 6
1,176,251 UART: [idev] SUBJECT.KEYID = 7
1,176,675 UART: [idev] UDS.KEYID = 0
1,177,020 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,735 UART: [idev] Erasing UDS.KEYID = 0
1,201,766 UART: [idev] Sha1 KeyId Algorithm
1,210,176 UART: [idev] --
1,211,118 UART: [ldev] ++
1,211,286 UART: [ldev] CDI.KEYID = 6
1,211,649 UART: [ldev] SUBJECT.KEYID = 5
1,212,075 UART: [ldev] AUTHORITY.KEYID = 7
1,212,538 UART: [ldev] FE.KEYID = 1
1,217,594 UART: [ldev] Erasing FE.KEYID = 1
1,243,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,586 UART: [ldev] --
1,282,977 UART: [fwproc] Wait for Commands...
1,283,723 UART: [fwproc] Recv command 0x46574c44
1,284,451 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,316 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,620 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,529 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,208 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,452,382 >>> mbox cmd response: failed
1,452,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,452,388 >>> mbox cmd response: failed
1,452,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,452,394 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,682 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,358 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,612 UART: [state] LifecycleState = Unprovisioned
86,267 UART: [state] DebugLocked = No
86,893 UART: [state] WD Timer not started. Device not locked for debugging
88,152 UART: [kat] SHA2-256
891,702 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,831 UART: [kat] ++
895,983 UART: [kat] sha1
900,247 UART: [kat] SHA2-256
902,187 UART: [kat] SHA2-384
904,768 UART: [kat] SHA2-512-ACC
906,669 UART: [kat] ECC-384
916,098 UART: [kat] HMAC-384Kdf
920,760 UART: [kat] LMS
1,169,072 UART: [kat] --
1,169,969 UART: [cold-reset] ++
1,170,371 UART: [fht] FHT @ 0x50003400
1,172,859 UART: [idev] ++
1,173,027 UART: [idev] CDI.KEYID = 6
1,173,388 UART: [idev] SUBJECT.KEYID = 7
1,173,813 UART: [idev] UDS.KEYID = 0
1,174,159 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,889 UART: [idev] Erasing UDS.KEYID = 0
1,199,365 UART: [idev] Sha1 KeyId Algorithm
1,208,235 UART: [idev] --
1,209,328 UART: [ldev] ++
1,209,496 UART: [ldev] CDI.KEYID = 6
1,209,860 UART: [ldev] SUBJECT.KEYID = 5
1,210,287 UART: [ldev] AUTHORITY.KEYID = 7
1,210,750 UART: [ldev] FE.KEYID = 1
1,216,158 UART: [ldev] Erasing FE.KEYID = 1
1,242,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,262 UART: [ldev] --
1,281,530 UART: [fwproc] Wait for Commands...
1,282,335 UART: [fwproc] Recv command 0x46574c44
1,283,068 UART: [fwproc] Recv'd Img size: 114332 bytes
1,595,293 UART: ROM Fatal Error: 0x000B0033
1,596,450 >>> mbox cmd response: failed
1,596,450 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,456 >>> mbox cmd response: failed
1,596,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,462 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,329 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,287 UART: [kat] ++
895,439 UART: [kat] sha1
899,607 UART: [kat] SHA2-256
901,547 UART: [kat] SHA2-384
904,256 UART: [kat] SHA2-512-ACC
906,157 UART: [kat] ECC-384
916,018 UART: [kat] HMAC-384Kdf
920,728 UART: [kat] LMS
1,169,040 UART: [kat] --
1,169,781 UART: [cold-reset] ++
1,170,191 UART: [fht] FHT @ 0x50003400
1,172,813 UART: [idev] ++
1,172,981 UART: [idev] CDI.KEYID = 6
1,173,342 UART: [idev] SUBJECT.KEYID = 7
1,173,767 UART: [idev] UDS.KEYID = 0
1,174,113 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,789 UART: [idev] Erasing UDS.KEYID = 0
1,198,501 UART: [idev] Sha1 KeyId Algorithm
1,207,519 UART: [idev] --
1,208,514 UART: [ldev] ++
1,208,682 UART: [ldev] CDI.KEYID = 6
1,209,046 UART: [ldev] SUBJECT.KEYID = 5
1,209,473 UART: [ldev] AUTHORITY.KEYID = 7
1,209,936 UART: [ldev] FE.KEYID = 1
1,215,478 UART: [ldev] Erasing FE.KEYID = 1
1,240,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,880 UART: [ldev] --
1,280,258 UART: [fwproc] Wait for Commands...
1,281,009 UART: [fwproc] Recv command 0x46574c44
1,281,742 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,545 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,854 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,769,680 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,756 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,439,853 >>> mbox cmd response: failed
1,439,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,439,859 >>> mbox cmd response: failed
1,439,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,439,865 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,108 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,254 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
891,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,464 UART: [kat] ++
895,616 UART: [kat] sha1
899,802 UART: [kat] SHA2-256
901,742 UART: [kat] SHA2-384
904,521 UART: [kat] SHA2-512-ACC
906,422 UART: [kat] ECC-384
916,019 UART: [kat] HMAC-384Kdf
920,573 UART: [kat] LMS
1,168,885 UART: [kat] --
1,170,112 UART: [cold-reset] ++
1,170,492 UART: [fht] FHT @ 0x50003400
1,173,334 UART: [idev] ++
1,173,502 UART: [idev] CDI.KEYID = 6
1,173,863 UART: [idev] SUBJECT.KEYID = 7
1,174,288 UART: [idev] UDS.KEYID = 0
1,174,634 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,050 UART: [idev] Erasing UDS.KEYID = 0
1,198,562 UART: [idev] Sha1 KeyId Algorithm
1,207,538 UART: [idev] --
1,208,643 UART: [ldev] ++
1,208,811 UART: [ldev] CDI.KEYID = 6
1,209,175 UART: [ldev] SUBJECT.KEYID = 5
1,209,602 UART: [ldev] AUTHORITY.KEYID = 7
1,210,065 UART: [ldev] FE.KEYID = 1
1,215,567 UART: [ldev] Erasing FE.KEYID = 1
1,241,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,661 UART: [ldev] --
1,281,121 UART: [fwproc] Wait for Commands...
1,281,914 UART: [fwproc] Recv command 0x46574c44
1,282,647 UART: [fwproc] Recv'd Img size: 114332 bytes
1,595,162 UART: ROM Fatal Error: 0x000B0033
1,596,319 >>> mbox cmd response: failed
1,596,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,325 >>> mbox cmd response: failed
1,596,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,374 UART: [state] WD Timer not started. Device not locked for debugging
87,535 UART: [kat] SHA2-256
891,085 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,214 UART: [kat] ++
895,366 UART: [kat] sha1
899,562 UART: [kat] SHA2-256
901,502 UART: [kat] SHA2-384
904,291 UART: [kat] SHA2-512-ACC
906,192 UART: [kat] ECC-384
916,005 UART: [kat] HMAC-384Kdf
920,691 UART: [kat] LMS
1,169,003 UART: [kat] --
1,169,866 UART: [cold-reset] ++
1,170,328 UART: [fht] FHT @ 0x50003400
1,173,122 UART: [idev] ++
1,173,290 UART: [idev] CDI.KEYID = 6
1,173,651 UART: [idev] SUBJECT.KEYID = 7
1,174,076 UART: [idev] UDS.KEYID = 0
1,174,422 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,242 UART: [idev] Erasing UDS.KEYID = 0
1,199,054 UART: [idev] Sha1 KeyId Algorithm
1,208,094 UART: [idev] --
1,209,121 UART: [ldev] ++
1,209,289 UART: [ldev] CDI.KEYID = 6
1,209,653 UART: [ldev] SUBJECT.KEYID = 5
1,210,080 UART: [ldev] AUTHORITY.KEYID = 7
1,210,543 UART: [ldev] FE.KEYID = 1
1,215,853 UART: [ldev] Erasing FE.KEYID = 1
1,242,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,895 UART: [ldev] --
1,281,405 UART: [fwproc] Wait for Commands...
1,282,102 UART: [fwproc] Recv command 0x46574c44
1,282,835 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,514 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,823 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,663 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,559 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,448,350 >>> mbox cmd response: failed
1,448,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,448,356 >>> mbox cmd response: failed
1,448,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,448,362 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,981 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,641 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,679 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,198,995 >>> mbox cmd response: failed
1,198,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,001 >>> mbox cmd response: failed
1,199,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,007 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,433 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,109 UART: [kat] SHA2-256
882,040 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,155 UART: [kat] ++
886,307 UART: [kat] sha1
890,547 UART: [kat] SHA2-256
892,485 UART: [kat] SHA2-384
895,098 UART: [kat] SHA2-512-ACC
896,999 UART: [kat] ECC-384
902,608 UART: [kat] HMAC-384Kdf
907,078 UART: [kat] LMS
1,475,274 UART: [kat] --
1,476,513 UART: [cold-reset] ++
1,476,991 UART: [fht] Storing FHT @ 0x50003400
1,479,726 UART: [idev] ++
1,479,894 UART: [idev] CDI.KEYID = 6
1,480,254 UART: [idev] SUBJECT.KEYID = 7
1,480,678 UART: [idev] UDS.KEYID = 0
1,481,023 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,680 UART: [idev] Erasing UDS.KEYID = 0
1,505,508 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,106 UART: [idev] --
1,515,175 UART: [ldev] ++
1,515,343 UART: [ldev] CDI.KEYID = 6
1,515,706 UART: [ldev] SUBJECT.KEYID = 5
1,516,132 UART: [ldev] AUTHORITY.KEYID = 7
1,516,595 UART: [ldev] FE.KEYID = 1
1,521,903 UART: [ldev] Erasing FE.KEYID = 1
1,547,910 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,060 UART: [ldev] --
1,587,491 UART: [fwproc] Waiting for Commands...
1,588,174 UART: [fwproc] Received command 0x46574c44
1,588,965 UART: [fwproc] Received Image of size 114332 bytes
2,886,592 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,136 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,488 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,419 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,017 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,197,965 >>> mbox cmd response: failed
1,197,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,971 >>> mbox cmd response: failed
1,197,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,977 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,857 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,033 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,120 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,198,538 >>> mbox cmd response: failed
1,198,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,544 >>> mbox cmd response: failed
1,198,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,550 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,540 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,234 UART: [kat] SHA2-256
882,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,280 UART: [kat] ++
886,432 UART: [kat] sha1
890,534 UART: [kat] SHA2-256
892,472 UART: [kat] SHA2-384
895,289 UART: [kat] SHA2-512-ACC
897,190 UART: [kat] ECC-384
902,855 UART: [kat] HMAC-384Kdf
907,585 UART: [kat] LMS
1,475,781 UART: [kat] --
1,476,528 UART: [cold-reset] ++
1,476,976 UART: [fht] Storing FHT @ 0x50003400
1,479,573 UART: [idev] ++
1,479,741 UART: [idev] CDI.KEYID = 6
1,480,101 UART: [idev] SUBJECT.KEYID = 7
1,480,525 UART: [idev] UDS.KEYID = 0
1,480,870 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,545 UART: [idev] Erasing UDS.KEYID = 0
1,505,511 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,123 UART: [idev] --
1,515,082 UART: [ldev] ++
1,515,250 UART: [ldev] CDI.KEYID = 6
1,515,613 UART: [ldev] SUBJECT.KEYID = 5
1,516,039 UART: [ldev] AUTHORITY.KEYID = 7
1,516,502 UART: [ldev] FE.KEYID = 1
1,521,784 UART: [ldev] Erasing FE.KEYID = 1
1,547,805 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,663 UART: [ldev] --
1,587,010 UART: [fwproc] Waiting for Commands...
1,587,637 UART: [fwproc] Received command 0x46574c44
1,588,428 UART: [fwproc] Received Image of size 114332 bytes
2,886,581 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,975 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,327 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,218 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,710 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,200,016 >>> mbox cmd response: failed
1,200,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,022 >>> mbox cmd response: failed
1,200,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,028 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,616 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,834 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,061 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,197,659 >>> mbox cmd response: failed
1,197,659 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,665 >>> mbox cmd response: failed
1,197,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,671 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,784 UART: [kat] SHA2-256
893,434 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,559 UART: [kat] ++
897,711 UART: [kat] sha1
902,015 UART: [kat] SHA2-256
903,955 UART: [kat] SHA2-384
906,832 UART: [kat] SHA2-512-ACC
908,733 UART: [kat] ECC-384
918,660 UART: [kat] HMAC-384Kdf
923,372 UART: [kat] LMS
1,171,700 UART: [kat] --
1,172,613 UART: [cold-reset] ++
1,173,123 UART: [fht] FHT @ 0x50003400
1,175,656 UART: [idev] ++
1,175,824 UART: [idev] CDI.KEYID = 6
1,176,184 UART: [idev] SUBJECT.KEYID = 7
1,176,608 UART: [idev] UDS.KEYID = 0
1,176,953 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,664 UART: [idev] Erasing UDS.KEYID = 0
1,201,389 UART: [idev] Sha1 KeyId Algorithm
1,209,971 UART: [idev] --
1,210,995 UART: [ldev] ++
1,211,163 UART: [ldev] CDI.KEYID = 6
1,211,526 UART: [ldev] SUBJECT.KEYID = 5
1,211,952 UART: [ldev] AUTHORITY.KEYID = 7
1,212,415 UART: [ldev] FE.KEYID = 1
1,217,447 UART: [ldev] Erasing FE.KEYID = 1
1,243,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,151 UART: [ldev] --
1,283,628 UART: [fwproc] Wait for Commands...
1,284,418 UART: [fwproc] Recv command 0x46574c44
1,285,146 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,441 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,745 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,458 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,635 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,197,967 >>> mbox cmd response: failed
1,197,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,973 >>> mbox cmd response: failed
1,197,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,979 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,447 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,147 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,088 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,198,382 >>> mbox cmd response: failed
1,198,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,388 >>> mbox cmd response: failed
1,198,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,394 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
893,437 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,562 UART: [kat] ++
897,714 UART: [kat] sha1
901,878 UART: [kat] SHA2-256
903,818 UART: [kat] SHA2-384
906,619 UART: [kat] SHA2-512-ACC
908,520 UART: [kat] ECC-384
918,107 UART: [kat] HMAC-384Kdf
922,743 UART: [kat] LMS
1,171,071 UART: [kat] --
1,171,668 UART: [cold-reset] ++
1,172,170 UART: [fht] FHT @ 0x50003400
1,174,879 UART: [idev] ++
1,175,047 UART: [idev] CDI.KEYID = 6
1,175,407 UART: [idev] SUBJECT.KEYID = 7
1,175,831 UART: [idev] UDS.KEYID = 0
1,176,176 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,695 UART: [idev] Erasing UDS.KEYID = 0
1,201,268 UART: [idev] Sha1 KeyId Algorithm
1,209,706 UART: [idev] --
1,210,904 UART: [ldev] ++
1,211,072 UART: [ldev] CDI.KEYID = 6
1,211,435 UART: [ldev] SUBJECT.KEYID = 5
1,211,861 UART: [ldev] AUTHORITY.KEYID = 7
1,212,324 UART: [ldev] FE.KEYID = 1
1,217,794 UART: [ldev] Erasing FE.KEYID = 1
1,244,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,504 UART: [ldev] --
1,283,997 UART: [fwproc] Wait for Commands...
1,284,817 UART: [fwproc] Recv command 0x46574c44
1,285,545 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,017 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,320 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,624 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,545 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,250 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,199,084 >>> mbox cmd response: failed
1,199,084 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,090 >>> mbox cmd response: failed
1,199,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,096 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,634 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,228 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,887 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,197,861 >>> mbox cmd response: failed
1,197,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,867 >>> mbox cmd response: failed
1,197,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,873 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,440 UART: [kat] SHA2-256
890,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,119 UART: [kat] ++
895,271 UART: [kat] sha1
899,471 UART: [kat] SHA2-256
901,411 UART: [kat] SHA2-384
904,120 UART: [kat] SHA2-512-ACC
906,021 UART: [kat] ECC-384
915,694 UART: [kat] HMAC-384Kdf
920,302 UART: [kat] LMS
1,168,614 UART: [kat] --
1,169,553 UART: [cold-reset] ++
1,170,033 UART: [fht] FHT @ 0x50003400
1,172,559 UART: [idev] ++
1,172,727 UART: [idev] CDI.KEYID = 6
1,173,088 UART: [idev] SUBJECT.KEYID = 7
1,173,513 UART: [idev] UDS.KEYID = 0
1,173,859 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,213 UART: [idev] Erasing UDS.KEYID = 0
1,198,147 UART: [idev] Sha1 KeyId Algorithm
1,207,163 UART: [idev] --
1,208,336 UART: [ldev] ++
1,208,504 UART: [ldev] CDI.KEYID = 6
1,208,868 UART: [ldev] SUBJECT.KEYID = 5
1,209,295 UART: [ldev] AUTHORITY.KEYID = 7
1,209,758 UART: [ldev] FE.KEYID = 1
1,214,930 UART: [ldev] Erasing FE.KEYID = 1
1,241,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,182 UART: [ldev] --
1,280,634 UART: [fwproc] Wait for Commands...
1,281,287 UART: [fwproc] Recv command 0x46574c44
1,282,020 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,831 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,140 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,962 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,043 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,198,923 >>> mbox cmd response: failed
1,198,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,929 >>> mbox cmd response: failed
1,198,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,935 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,416 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,366 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,898 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,198,582 >>> mbox cmd response: failed
1,198,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,588 >>> mbox cmd response: failed
1,198,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,594 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,599 UART: [kat] SHA2-256
891,149 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,278 UART: [kat] ++
895,430 UART: [kat] sha1
899,792 UART: [kat] SHA2-256
901,732 UART: [kat] SHA2-384
904,689 UART: [kat] SHA2-512-ACC
906,590 UART: [kat] ECC-384
916,207 UART: [kat] HMAC-384Kdf
920,819 UART: [kat] LMS
1,169,131 UART: [kat] --
1,170,062 UART: [cold-reset] ++
1,170,554 UART: [fht] FHT @ 0x50003400
1,173,222 UART: [idev] ++
1,173,390 UART: [idev] CDI.KEYID = 6
1,173,751 UART: [idev] SUBJECT.KEYID = 7
1,174,176 UART: [idev] UDS.KEYID = 0
1,174,522 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,726 UART: [idev] Erasing UDS.KEYID = 0
1,199,436 UART: [idev] Sha1 KeyId Algorithm
1,208,158 UART: [idev] --
1,209,153 UART: [ldev] ++
1,209,321 UART: [ldev] CDI.KEYID = 6
1,209,685 UART: [ldev] SUBJECT.KEYID = 5
1,210,112 UART: [ldev] AUTHORITY.KEYID = 7
1,210,575 UART: [ldev] FE.KEYID = 1
1,215,913 UART: [ldev] Erasing FE.KEYID = 1
1,242,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,365 UART: [ldev] --
1,281,693 UART: [fwproc] Wait for Commands...
1,282,412 UART: [fwproc] Recv command 0x46574c44
1,283,145 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,736 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,566 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,875 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,817 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,706 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,199,312 >>> mbox cmd response: failed
1,199,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,318 >>> mbox cmd response: failed
1,199,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,324 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,817 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,311 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,679 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,961 >>> mbox cmd response: failed
1,178,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,967 >>> mbox cmd response: failed
1,178,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,973 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,515 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,061 UART: [kat] SHA2-256
881,992 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,107 UART: [kat] ++
886,259 UART: [kat] sha1
890,479 UART: [kat] SHA2-256
892,417 UART: [kat] SHA2-384
895,330 UART: [kat] SHA2-512-ACC
897,231 UART: [kat] ECC-384
902,808 UART: [kat] HMAC-384Kdf
907,426 UART: [kat] LMS
1,475,622 UART: [kat] --
1,476,529 UART: [cold-reset] ++
1,477,035 UART: [fht] Storing FHT @ 0x50003400
1,480,006 UART: [idev] ++
1,480,174 UART: [idev] CDI.KEYID = 6
1,480,534 UART: [idev] SUBJECT.KEYID = 7
1,480,958 UART: [idev] UDS.KEYID = 0
1,481,303 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,970 UART: [idev] Erasing UDS.KEYID = 0
1,505,572 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,090 UART: [idev] --
1,515,053 UART: [ldev] ++
1,515,221 UART: [ldev] CDI.KEYID = 6
1,515,584 UART: [ldev] SUBJECT.KEYID = 5
1,516,010 UART: [ldev] AUTHORITY.KEYID = 7
1,516,473 UART: [ldev] FE.KEYID = 1
1,521,465 UART: [ldev] Erasing FE.KEYID = 1
1,546,600 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,666 UART: [ldev] --
1,586,145 UART: [fwproc] Waiting for Commands...
1,587,010 UART: [fwproc] Received command 0x46574c44
1,587,801 UART: [fwproc] Received Image of size 114332 bytes
2,884,174 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,460 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,812 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,076,753 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,129 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,301 >>> mbox cmd response: failed
1,179,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,307 >>> mbox cmd response: failed
1,179,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,313 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,587 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,925,529 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,122 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,058 >>> mbox cmd response: failed
1,181,058 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,064 >>> mbox cmd response: failed
1,181,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,070 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,814 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,388 UART: [kat] SHA2-256
882,319 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,434 UART: [kat] ++
886,586 UART: [kat] sha1
890,944 UART: [kat] SHA2-256
892,882 UART: [kat] SHA2-384
895,573 UART: [kat] SHA2-512-ACC
897,474 UART: [kat] ECC-384
903,217 UART: [kat] HMAC-384Kdf
907,817 UART: [kat] LMS
1,476,013 UART: [kat] --
1,476,904 UART: [cold-reset] ++
1,477,410 UART: [fht] Storing FHT @ 0x50003400
1,480,301 UART: [idev] ++
1,480,469 UART: [idev] CDI.KEYID = 6
1,480,829 UART: [idev] SUBJECT.KEYID = 7
1,481,253 UART: [idev] UDS.KEYID = 0
1,481,598 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,019 UART: [idev] Erasing UDS.KEYID = 0
1,505,337 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,881 UART: [idev] --
1,515,022 UART: [ldev] ++
1,515,190 UART: [ldev] CDI.KEYID = 6
1,515,553 UART: [ldev] SUBJECT.KEYID = 5
1,515,979 UART: [ldev] AUTHORITY.KEYID = 7
1,516,442 UART: [ldev] FE.KEYID = 1
1,521,882 UART: [ldev] Erasing FE.KEYID = 1
1,546,795 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,799 UART: [ldev] --
1,586,168 UART: [fwproc] Waiting for Commands...
1,586,797 UART: [fwproc] Received command 0x46574c44
1,587,588 UART: [fwproc] Received Image of size 114332 bytes
2,885,301 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,303 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,655 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,582 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,550 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,124 >>> mbox cmd response: failed
1,181,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,130 >>> mbox cmd response: failed
1,181,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,470 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,454 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,011 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,939 >>> mbox cmd response: failed
1,179,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,945 >>> mbox cmd response: failed
1,179,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,951 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,574 UART: [state] LifecycleState = Unprovisioned
86,229 UART: [state] DebugLocked = No
86,739 UART: [state] WD Timer not started. Device not locked for debugging
87,884 UART: [kat] SHA2-256
893,534 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,659 UART: [kat] ++
897,811 UART: [kat] sha1
902,163 UART: [kat] SHA2-256
904,103 UART: [kat] SHA2-384
906,920 UART: [kat] SHA2-512-ACC
908,821 UART: [kat] ECC-384
918,184 UART: [kat] HMAC-384Kdf
922,854 UART: [kat] LMS
1,171,182 UART: [kat] --
1,171,987 UART: [cold-reset] ++
1,172,429 UART: [fht] FHT @ 0x50003400
1,175,122 UART: [idev] ++
1,175,290 UART: [idev] CDI.KEYID = 6
1,175,650 UART: [idev] SUBJECT.KEYID = 7
1,176,074 UART: [idev] UDS.KEYID = 0
1,176,419 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,742 UART: [idev] Erasing UDS.KEYID = 0
1,201,191 UART: [idev] Sha1 KeyId Algorithm
1,209,741 UART: [idev] --
1,210,923 UART: [ldev] ++
1,211,091 UART: [ldev] CDI.KEYID = 6
1,211,454 UART: [ldev] SUBJECT.KEYID = 5
1,211,880 UART: [ldev] AUTHORITY.KEYID = 7
1,212,343 UART: [ldev] FE.KEYID = 1
1,217,839 UART: [ldev] Erasing FE.KEYID = 1
1,243,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,975 UART: [ldev] --
1,283,430 UART: [fwproc] Wait for Commands...
1,284,166 UART: [fwproc] Recv command 0x46574c44
1,284,894 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,587 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,891 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,702 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,573 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,641 >>> mbox cmd response: failed
1,178,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,647 >>> mbox cmd response: failed
1,178,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,653 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,277 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,385 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,860 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,272 >>> mbox cmd response: failed
1,180,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,278 >>> mbox cmd response: failed
1,180,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,284 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,796 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
893,641 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,766 UART: [kat] ++
897,918 UART: [kat] sha1
902,176 UART: [kat] SHA2-256
904,116 UART: [kat] SHA2-384
906,887 UART: [kat] SHA2-512-ACC
908,788 UART: [kat] ECC-384
918,551 UART: [kat] HMAC-384Kdf
922,979 UART: [kat] LMS
1,171,307 UART: [kat] --
1,172,044 UART: [cold-reset] ++
1,172,392 UART: [fht] FHT @ 0x50003400
1,175,131 UART: [idev] ++
1,175,299 UART: [idev] CDI.KEYID = 6
1,175,659 UART: [idev] SUBJECT.KEYID = 7
1,176,083 UART: [idev] UDS.KEYID = 0
1,176,428 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,143 UART: [idev] Erasing UDS.KEYID = 0
1,200,936 UART: [idev] Sha1 KeyId Algorithm
1,209,212 UART: [idev] --
1,210,312 UART: [ldev] ++
1,210,480 UART: [ldev] CDI.KEYID = 6
1,210,843 UART: [ldev] SUBJECT.KEYID = 5
1,211,269 UART: [ldev] AUTHORITY.KEYID = 7
1,211,732 UART: [ldev] FE.KEYID = 1
1,217,036 UART: [ldev] Erasing FE.KEYID = 1
1,244,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,972 UART: [ldev] --
1,283,279 UART: [fwproc] Wait for Commands...
1,284,075 UART: [fwproc] Recv command 0x46574c44
1,284,803 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,604 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,908 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,679 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,480 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,982 >>> mbox cmd response: failed
1,178,982 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,988 >>> mbox cmd response: failed
1,178,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,994 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,940 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,596 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,681 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,951 >>> mbox cmd response: failed
1,178,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,957 >>> mbox cmd response: failed
1,178,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,963 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
891,188 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,317 UART: [kat] ++
895,469 UART: [kat] sha1
899,547 UART: [kat] SHA2-256
901,487 UART: [kat] SHA2-384
904,304 UART: [kat] SHA2-512-ACC
906,205 UART: [kat] ECC-384
916,074 UART: [kat] HMAC-384Kdf
920,562 UART: [kat] LMS
1,168,874 UART: [kat] --
1,169,917 UART: [cold-reset] ++
1,170,419 UART: [fht] FHT @ 0x50003400
1,173,007 UART: [idev] ++
1,173,175 UART: [idev] CDI.KEYID = 6
1,173,536 UART: [idev] SUBJECT.KEYID = 7
1,173,961 UART: [idev] UDS.KEYID = 0
1,174,307 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,863 UART: [idev] Erasing UDS.KEYID = 0
1,198,917 UART: [idev] Sha1 KeyId Algorithm
1,207,681 UART: [idev] --
1,208,622 UART: [ldev] ++
1,208,790 UART: [ldev] CDI.KEYID = 6
1,209,154 UART: [ldev] SUBJECT.KEYID = 5
1,209,581 UART: [ldev] AUTHORITY.KEYID = 7
1,210,044 UART: [ldev] FE.KEYID = 1
1,215,078 UART: [ldev] Erasing FE.KEYID = 1
1,241,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,512 UART: [ldev] --
1,280,906 UART: [fwproc] Wait for Commands...
1,281,671 UART: [fwproc] Recv command 0x46574c44
1,282,404 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,857 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,166 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,930 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,129 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,923 >>> mbox cmd response: failed
1,178,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,929 >>> mbox cmd response: failed
1,178,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,935 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,800 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,072 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,556 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,642 >>> mbox cmd response: failed
1,180,642 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,648 >>> mbox cmd response: failed
1,180,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,654 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
891,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,686 UART: [kat] ++
895,838 UART: [kat] sha1
900,044 UART: [kat] SHA2-256
901,984 UART: [kat] SHA2-384
904,741 UART: [kat] SHA2-512-ACC
906,642 UART: [kat] ECC-384
916,879 UART: [kat] HMAC-384Kdf
921,505 UART: [kat] LMS
1,169,817 UART: [kat] --
1,170,850 UART: [cold-reset] ++
1,171,282 UART: [fht] FHT @ 0x50003400
1,173,930 UART: [idev] ++
1,174,098 UART: [idev] CDI.KEYID = 6
1,174,459 UART: [idev] SUBJECT.KEYID = 7
1,174,884 UART: [idev] UDS.KEYID = 0
1,175,230 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,046 UART: [idev] Erasing UDS.KEYID = 0
1,200,258 UART: [idev] Sha1 KeyId Algorithm
1,209,300 UART: [idev] --
1,210,441 UART: [ldev] ++
1,210,609 UART: [ldev] CDI.KEYID = 6
1,210,973 UART: [ldev] SUBJECT.KEYID = 5
1,211,400 UART: [ldev] AUTHORITY.KEYID = 7
1,211,863 UART: [ldev] FE.KEYID = 1
1,217,085 UART: [ldev] Erasing FE.KEYID = 1
1,243,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,681 UART: [ldev] --
1,283,175 UART: [fwproc] Wait for Commands...
1,283,756 UART: [fwproc] Recv command 0x46574c44
1,284,489 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,226 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,448 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,757 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,529 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,504 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,179,140 >>> mbox cmd response: failed
1,179,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,146 >>> mbox cmd response: failed
1,179,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,152 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,655 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,741 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Manufacturing
86,117 UART: [state] DebugLocked = No
86,747 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,291 UART: [kat] SHA2-256
882,222 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,337 UART: [kat] ++
886,489 UART: [kat] sha1
890,671 UART: [kat] SHA2-256
892,609 UART: [kat] SHA2-384
895,388 UART: [kat] SHA2-512-ACC
897,289 UART: [kat] ECC-384
902,598 UART: [kat] HMAC-384Kdf
907,018 UART: [kat] LMS
1,475,214 UART: [kat] --
1,476,107 UART: [cold-reset] ++
1,476,639 UART: [fht] Storing FHT @ 0x50003400
1,479,354 UART: [idev] ++
1,479,522 UART: [idev] CDI.KEYID = 6
1,479,882 UART: [idev] SUBJECT.KEYID = 7
1,480,306 UART: [idev] UDS.KEYID = 0
1,480,651 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,340 UART: [idev] Erasing UDS.KEYID = 0
1,504,612 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,200 UART: [idev] --
1,514,361 UART: [ldev] ++
1,514,529 UART: [ldev] CDI.KEYID = 6
1,514,892 UART: [ldev] SUBJECT.KEYID = 5
1,515,318 UART: [ldev] AUTHORITY.KEYID = 7
1,515,781 UART: [ldev] FE.KEYID = 1
1,520,679 UART: [ldev] Erasing FE.KEYID = 1
1,546,434 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,276 UART: [ldev] --
1,585,543 UART: [fwproc] Waiting for Commands...
1,586,282 UART: [fwproc] Received command 0x46574c44
1,587,073 UART: [fwproc] Received Image of size 114332 bytes
1,607,849 UART: ROM Fatal Error: 0x000B0003
1,609,006 >>> mbox cmd response: failed
1,609,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,012 >>> mbox cmd response: failed
1,609,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,281 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,911 UART: [kat] SHA2-256
881,842 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,957 UART: [kat] ++
886,109 UART: [kat] sha1
890,263 UART: [kat] SHA2-256
892,201 UART: [kat] SHA2-384
895,020 UART: [kat] SHA2-512-ACC
896,921 UART: [kat] ECC-384
902,410 UART: [kat] HMAC-384Kdf
907,210 UART: [kat] LMS
1,475,406 UART: [kat] --
1,476,155 UART: [cold-reset] ++
1,476,711 UART: [fht] Storing FHT @ 0x50003400
1,479,656 UART: [idev] ++
1,479,824 UART: [idev] CDI.KEYID = 6
1,480,184 UART: [idev] SUBJECT.KEYID = 7
1,480,608 UART: [idev] UDS.KEYID = 0
1,480,953 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,114 UART: [idev] Erasing UDS.KEYID = 0
1,505,088 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,620 UART: [idev] --
1,514,663 UART: [ldev] ++
1,514,831 UART: [ldev] CDI.KEYID = 6
1,515,194 UART: [ldev] SUBJECT.KEYID = 5
1,515,620 UART: [ldev] AUTHORITY.KEYID = 7
1,516,083 UART: [ldev] FE.KEYID = 1
1,521,203 UART: [ldev] Erasing FE.KEYID = 1
1,546,516 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,438 UART: [ldev] --
1,585,797 UART: [fwproc] Waiting for Commands...
1,586,608 UART: [fwproc] Received command 0x46574c44
1,587,399 UART: [fwproc] Received Image of size 114332 bytes
2,886,048 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,460 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,812 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,575 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,445 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,460,999 >>> mbox cmd response: failed
1,460,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,005 >>> mbox cmd response: failed
1,461,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,011 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,081 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,926,537 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Manufacturing
85,790 UART: [state] DebugLocked = No
86,284 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,910 UART: [kat] SHA2-256
881,841 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,956 UART: [kat] ++
886,108 UART: [kat] sha1
890,338 UART: [kat] SHA2-256
892,276 UART: [kat] SHA2-384
895,073 UART: [kat] SHA2-512-ACC
896,974 UART: [kat] ECC-384
902,699 UART: [kat] HMAC-384Kdf
907,509 UART: [kat] LMS
1,475,705 UART: [kat] --
1,476,496 UART: [cold-reset] ++
1,476,990 UART: [fht] Storing FHT @ 0x50003400
1,479,641 UART: [idev] ++
1,479,809 UART: [idev] CDI.KEYID = 6
1,480,169 UART: [idev] SUBJECT.KEYID = 7
1,480,593 UART: [idev] UDS.KEYID = 0
1,480,938 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,791 UART: [idev] Erasing UDS.KEYID = 0
1,505,725 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,233 UART: [idev] --
1,515,238 UART: [ldev] ++
1,515,406 UART: [ldev] CDI.KEYID = 6
1,515,769 UART: [ldev] SUBJECT.KEYID = 5
1,516,195 UART: [ldev] AUTHORITY.KEYID = 7
1,516,658 UART: [ldev] FE.KEYID = 1
1,522,192 UART: [ldev] Erasing FE.KEYID = 1
1,546,999 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,805 UART: [ldev] --
1,586,120 UART: [fwproc] Waiting for Commands...
1,586,961 UART: [fwproc] Received command 0x46574c44
1,587,752 UART: [fwproc] Received Image of size 114332 bytes
1,607,720 UART: ROM Fatal Error: 0x000B0003
1,608,877 >>> mbox cmd response: failed
1,608,877 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,883 >>> mbox cmd response: failed
1,608,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,889 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,588 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,166 UART: [kat] SHA2-256
882,097 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,212 UART: [kat] ++
886,364 UART: [kat] sha1
890,458 UART: [kat] SHA2-256
892,396 UART: [kat] SHA2-384
894,997 UART: [kat] SHA2-512-ACC
896,898 UART: [kat] ECC-384
902,623 UART: [kat] HMAC-384Kdf
907,269 UART: [kat] LMS
1,475,465 UART: [kat] --
1,476,224 UART: [cold-reset] ++
1,476,610 UART: [fht] Storing FHT @ 0x50003400
1,479,353 UART: [idev] ++
1,479,521 UART: [idev] CDI.KEYID = 6
1,479,881 UART: [idev] SUBJECT.KEYID = 7
1,480,305 UART: [idev] UDS.KEYID = 0
1,480,650 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,329 UART: [idev] Erasing UDS.KEYID = 0
1,505,281 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,861 UART: [idev] --
1,515,074 UART: [ldev] ++
1,515,242 UART: [ldev] CDI.KEYID = 6
1,515,605 UART: [ldev] SUBJECT.KEYID = 5
1,516,031 UART: [ldev] AUTHORITY.KEYID = 7
1,516,494 UART: [ldev] FE.KEYID = 1
1,521,704 UART: [ldev] Erasing FE.KEYID = 1
1,547,257 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,085 UART: [ldev] --
1,586,404 UART: [fwproc] Waiting for Commands...
1,587,027 UART: [fwproc] Received command 0x46574c44
1,587,818 UART: [fwproc] Received Image of size 114332 bytes
2,885,159 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,019 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,371 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,136 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,068 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,463,532 >>> mbox cmd response: failed
1,463,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,463,538 >>> mbox cmd response: failed
1,463,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,463,544 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,092 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,438 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Manufacturing
85,921 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
893,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,491 UART: [kat] ++
897,643 UART: [kat] sha1
901,923 UART: [kat] SHA2-256
903,863 UART: [kat] SHA2-384
906,620 UART: [kat] SHA2-512-ACC
908,521 UART: [kat] ECC-384
918,372 UART: [kat] HMAC-384Kdf
922,896 UART: [kat] LMS
1,171,224 UART: [kat] --
1,172,349 UART: [cold-reset] ++
1,172,855 UART: [fht] FHT @ 0x50003400
1,175,674 UART: [idev] ++
1,175,842 UART: [idev] CDI.KEYID = 6
1,176,202 UART: [idev] SUBJECT.KEYID = 7
1,176,626 UART: [idev] UDS.KEYID = 0
1,176,971 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,286 UART: [idev] Erasing UDS.KEYID = 0
1,201,749 UART: [idev] Sha1 KeyId Algorithm
1,210,115 UART: [idev] --
1,211,285 UART: [ldev] ++
1,211,453 UART: [ldev] CDI.KEYID = 6
1,211,816 UART: [ldev] SUBJECT.KEYID = 5
1,212,242 UART: [ldev] AUTHORITY.KEYID = 7
1,212,705 UART: [ldev] FE.KEYID = 1
1,217,643 UART: [ldev] Erasing FE.KEYID = 1
1,243,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,483 UART: [ldev] --
1,282,774 UART: [fwproc] Wait for Commands...
1,283,512 UART: [fwproc] Recv command 0x46574c44
1,284,240 UART: [fwproc] Recv'd Img size: 114332 bytes
1,304,272 UART: ROM Fatal Error: 0x000B0003
1,305,429 >>> mbox cmd response: failed
1,305,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,435 >>> mbox cmd response: failed
1,305,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,441 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,558 UART: [state] LifecycleState = Unprovisioned
86,213 UART: [state] DebugLocked = No
86,807 UART: [state] WD Timer not started. Device not locked for debugging
87,926 UART: [kat] SHA2-256
893,576 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,701 UART: [kat] ++
897,853 UART: [kat] sha1
902,157 UART: [kat] SHA2-256
904,097 UART: [kat] SHA2-384
906,814 UART: [kat] SHA2-512-ACC
908,715 UART: [kat] ECC-384
918,808 UART: [kat] HMAC-384Kdf
923,510 UART: [kat] LMS
1,171,838 UART: [kat] --
1,172,661 UART: [cold-reset] ++
1,173,157 UART: [fht] FHT @ 0x50003400
1,175,816 UART: [idev] ++
1,175,984 UART: [idev] CDI.KEYID = 6
1,176,344 UART: [idev] SUBJECT.KEYID = 7
1,176,768 UART: [idev] UDS.KEYID = 0
1,177,113 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,756 UART: [idev] Erasing UDS.KEYID = 0
1,201,779 UART: [idev] Sha1 KeyId Algorithm
1,210,239 UART: [idev] --
1,211,149 UART: [ldev] ++
1,211,317 UART: [ldev] CDI.KEYID = 6
1,211,680 UART: [ldev] SUBJECT.KEYID = 5
1,212,106 UART: [ldev] AUTHORITY.KEYID = 7
1,212,569 UART: [ldev] FE.KEYID = 1
1,217,519 UART: [ldev] Erasing FE.KEYID = 1
1,244,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,803 UART: [ldev] --
1,283,124 UART: [fwproc] Wait for Commands...
1,283,766 UART: [fwproc] Recv command 0x46574c44
1,284,494 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,107 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,411 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,320 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,431 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,159,580 >>> mbox cmd response: failed
1,159,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,586 >>> mbox cmd response: failed
1,159,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,592 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,481 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,841 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Manufacturing
86,192 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
893,731 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,856 UART: [kat] ++
898,008 UART: [kat] sha1
902,262 UART: [kat] SHA2-256
904,202 UART: [kat] SHA2-384
906,949 UART: [kat] SHA2-512-ACC
908,850 UART: [kat] ECC-384
918,859 UART: [kat] HMAC-384Kdf
923,409 UART: [kat] LMS
1,171,737 UART: [kat] --
1,172,470 UART: [cold-reset] ++
1,172,826 UART: [fht] FHT @ 0x50003400
1,175,477 UART: [idev] ++
1,175,645 UART: [idev] CDI.KEYID = 6
1,176,005 UART: [idev] SUBJECT.KEYID = 7
1,176,429 UART: [idev] UDS.KEYID = 0
1,176,774 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,409 UART: [idev] Erasing UDS.KEYID = 0
1,201,120 UART: [idev] Sha1 KeyId Algorithm
1,209,536 UART: [idev] --
1,210,582 UART: [ldev] ++
1,210,750 UART: [ldev] CDI.KEYID = 6
1,211,113 UART: [ldev] SUBJECT.KEYID = 5
1,211,539 UART: [ldev] AUTHORITY.KEYID = 7
1,212,002 UART: [ldev] FE.KEYID = 1
1,217,350 UART: [ldev] Erasing FE.KEYID = 1
1,243,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,426 UART: [ldev] --
1,282,729 UART: [fwproc] Wait for Commands...
1,283,501 UART: [fwproc] Recv command 0x46574c44
1,284,229 UART: [fwproc] Recv'd Img size: 114332 bytes
1,304,513 UART: ROM Fatal Error: 0x000B0003
1,305,670 >>> mbox cmd response: failed
1,305,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,676 >>> mbox cmd response: failed
1,305,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,682 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,675 UART: [state] LifecycleState = Unprovisioned
86,330 UART: [state] DebugLocked = No
86,898 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
893,817 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,942 UART: [kat] ++
898,094 UART: [kat] sha1
902,354 UART: [kat] SHA2-256
904,294 UART: [kat] SHA2-384
907,117 UART: [kat] SHA2-512-ACC
909,018 UART: [kat] ECC-384
918,693 UART: [kat] HMAC-384Kdf
923,335 UART: [kat] LMS
1,171,663 UART: [kat] --
1,172,506 UART: [cold-reset] ++
1,172,986 UART: [fht] FHT @ 0x50003400
1,175,717 UART: [idev] ++
1,175,885 UART: [idev] CDI.KEYID = 6
1,176,245 UART: [idev] SUBJECT.KEYID = 7
1,176,669 UART: [idev] UDS.KEYID = 0
1,177,014 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,579 UART: [idev] Erasing UDS.KEYID = 0
1,201,490 UART: [idev] Sha1 KeyId Algorithm
1,209,900 UART: [idev] --
1,211,128 UART: [ldev] ++
1,211,296 UART: [ldev] CDI.KEYID = 6
1,211,659 UART: [ldev] SUBJECT.KEYID = 5
1,212,085 UART: [ldev] AUTHORITY.KEYID = 7
1,212,548 UART: [ldev] FE.KEYID = 1
1,217,672 UART: [ldev] Erasing FE.KEYID = 1
1,244,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,014 UART: [ldev] --
1,284,489 UART: [fwproc] Wait for Commands...
1,285,157 UART: [fwproc] Recv command 0x46574c44
1,285,885 UART: [fwproc] Recv'd Img size: 114332 bytes
2,584,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,216 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,520 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,333 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,740 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,160,315 >>> mbox cmd response: failed
1,160,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,321 >>> mbox cmd response: failed
1,160,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,327 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,594 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,914 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Manufacturing
85,707 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
891,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,715 UART: [kat] SHA2-256
901,655 UART: [kat] SHA2-384
904,502 UART: [kat] SHA2-512-ACC
906,403 UART: [kat] ECC-384
916,428 UART: [kat] HMAC-384Kdf
920,962 UART: [kat] LMS
1,169,274 UART: [kat] --
1,170,059 UART: [cold-reset] ++
1,170,607 UART: [fht] FHT @ 0x50003400
1,173,373 UART: [idev] ++
1,173,541 UART: [idev] CDI.KEYID = 6
1,173,902 UART: [idev] SUBJECT.KEYID = 7
1,174,327 UART: [idev] UDS.KEYID = 0
1,174,673 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,153 UART: [idev] Erasing UDS.KEYID = 0
1,198,789 UART: [idev] Sha1 KeyId Algorithm
1,207,717 UART: [idev] --
1,208,806 UART: [ldev] ++
1,208,974 UART: [ldev] CDI.KEYID = 6
1,209,338 UART: [ldev] SUBJECT.KEYID = 5
1,209,765 UART: [ldev] AUTHORITY.KEYID = 7
1,210,228 UART: [ldev] FE.KEYID = 1
1,215,616 UART: [ldev] Erasing FE.KEYID = 1
1,241,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,792 UART: [ldev] --
1,281,284 UART: [fwproc] Wait for Commands...
1,282,081 UART: [fwproc] Recv command 0x46574c44
1,282,814 UART: [fwproc] Recv'd Img size: 114332 bytes
1,302,505 UART: ROM Fatal Error: 0x000B0003
1,303,662 >>> mbox cmd response: failed
1,303,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,668 >>> mbox cmd response: failed
1,303,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,674 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,767 UART: [kat] SHA2-256
901,707 UART: [kat] SHA2-384
904,342 UART: [kat] SHA2-512-ACC
906,243 UART: [kat] ECC-384
916,236 UART: [kat] HMAC-384Kdf
920,866 UART: [kat] LMS
1,169,178 UART: [kat] --
1,170,161 UART: [cold-reset] ++
1,170,671 UART: [fht] FHT @ 0x50003400
1,173,537 UART: [idev] ++
1,173,705 UART: [idev] CDI.KEYID = 6
1,174,066 UART: [idev] SUBJECT.KEYID = 7
1,174,491 UART: [idev] UDS.KEYID = 0
1,174,837 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,271 UART: [idev] Erasing UDS.KEYID = 0
1,199,457 UART: [idev] Sha1 KeyId Algorithm
1,208,289 UART: [idev] --
1,209,388 UART: [ldev] ++
1,209,556 UART: [ldev] CDI.KEYID = 6
1,209,920 UART: [ldev] SUBJECT.KEYID = 5
1,210,347 UART: [ldev] AUTHORITY.KEYID = 7
1,210,810 UART: [ldev] FE.KEYID = 1
1,216,022 UART: [ldev] Erasing FE.KEYID = 1
1,242,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,710 UART: [ldev] --
1,282,152 UART: [fwproc] Wait for Commands...
1,282,827 UART: [fwproc] Recv command 0x46574c44
1,283,560 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,093 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,402 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,350 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,242 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,155,705 >>> mbox cmd response: failed
1,155,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,711 >>> mbox cmd response: failed
1,155,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,717 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,058 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,122 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Manufacturing
86,156 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
891,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,702 UART: [kat] ++
895,854 UART: [kat] sha1
899,952 UART: [kat] SHA2-256
901,892 UART: [kat] SHA2-384
904,765 UART: [kat] SHA2-512-ACC
906,666 UART: [kat] ECC-384
916,305 UART: [kat] HMAC-384Kdf
920,883 UART: [kat] LMS
1,169,195 UART: [kat] --
1,170,176 UART: [cold-reset] ++
1,170,504 UART: [fht] FHT @ 0x50003400
1,173,014 UART: [idev] ++
1,173,182 UART: [idev] CDI.KEYID = 6
1,173,543 UART: [idev] SUBJECT.KEYID = 7
1,173,968 UART: [idev] UDS.KEYID = 0
1,174,314 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,842 UART: [idev] Erasing UDS.KEYID = 0
1,198,896 UART: [idev] Sha1 KeyId Algorithm
1,207,912 UART: [idev] --
1,208,925 UART: [ldev] ++
1,209,093 UART: [ldev] CDI.KEYID = 6
1,209,457 UART: [ldev] SUBJECT.KEYID = 5
1,209,884 UART: [ldev] AUTHORITY.KEYID = 7
1,210,347 UART: [ldev] FE.KEYID = 1
1,215,623 UART: [ldev] Erasing FE.KEYID = 1
1,242,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,519 UART: [ldev] --
1,281,895 UART: [fwproc] Wait for Commands...
1,282,542 UART: [fwproc] Recv command 0x46574c44
1,283,275 UART: [fwproc] Recv'd Img size: 114332 bytes
1,303,800 UART: ROM Fatal Error: 0x000B0003
1,304,957 >>> mbox cmd response: failed
1,304,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,963 >>> mbox cmd response: failed
1,304,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,969 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,826 UART: [state] WD Timer not started. Device not locked for debugging
88,039 UART: [kat] SHA2-256
891,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,718 UART: [kat] ++
895,870 UART: [kat] sha1
900,106 UART: [kat] SHA2-256
902,046 UART: [kat] SHA2-384
904,725 UART: [kat] SHA2-512-ACC
906,626 UART: [kat] ECC-384
916,431 UART: [kat] HMAC-384Kdf
921,111 UART: [kat] LMS
1,169,423 UART: [kat] --
1,170,160 UART: [cold-reset] ++
1,170,560 UART: [fht] FHT @ 0x50003400
1,173,114 UART: [idev] ++
1,173,282 UART: [idev] CDI.KEYID = 6
1,173,643 UART: [idev] SUBJECT.KEYID = 7
1,174,068 UART: [idev] UDS.KEYID = 0
1,174,414 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,074 UART: [idev] Erasing UDS.KEYID = 0
1,199,482 UART: [idev] Sha1 KeyId Algorithm
1,208,344 UART: [idev] --
1,209,285 UART: [ldev] ++
1,209,453 UART: [ldev] CDI.KEYID = 6
1,209,817 UART: [ldev] SUBJECT.KEYID = 5
1,210,244 UART: [ldev] AUTHORITY.KEYID = 7
1,210,707 UART: [ldev] FE.KEYID = 1
1,215,835 UART: [ldev] Erasing FE.KEYID = 1
1,242,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,487 UART: [ldev] --
1,281,959 UART: [fwproc] Wait for Commands...
1,282,592 UART: [fwproc] Recv command 0x46574c44
1,283,325 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,698 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,438 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,747 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,503 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,755 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,156,028 >>> mbox cmd response: failed
1,156,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,034 >>> mbox cmd response: failed
1,156,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,040 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,615 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,437 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,261 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,875 UART: [kat] SHA2-256
881,806 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,921 UART: [kat] ++
886,073 UART: [kat] sha1
890,333 UART: [kat] SHA2-256
892,271 UART: [kat] SHA2-384
895,046 UART: [kat] SHA2-512-ACC
896,947 UART: [kat] ECC-384
902,296 UART: [kat] HMAC-384Kdf
906,944 UART: [kat] LMS
1,475,140 UART: [kat] --
1,475,989 UART: [cold-reset] ++
1,476,517 UART: [fht] Storing FHT @ 0x50003400
1,479,248 UART: [idev] ++
1,479,416 UART: [idev] CDI.KEYID = 6
1,479,776 UART: [idev] SUBJECT.KEYID = 7
1,480,200 UART: [idev] UDS.KEYID = 0
1,480,545 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,124 UART: [idev] Erasing UDS.KEYID = 0
1,504,722 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,186 UART: [idev] --
1,514,083 UART: [ldev] ++
1,514,251 UART: [ldev] CDI.KEYID = 6
1,514,614 UART: [ldev] SUBJECT.KEYID = 5
1,515,040 UART: [ldev] AUTHORITY.KEYID = 7
1,515,503 UART: [ldev] FE.KEYID = 1
1,520,481 UART: [ldev] Erasing FE.KEYID = 1
1,546,130 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,904 UART: [ldev] --
1,585,405 UART: [fwproc] Waiting for Commands...
1,586,270 UART: [fwproc] Received command 0x46574c44
1,587,061 UART: [fwproc] Received Image of size 114332 bytes
1,622,468 UART: ROM Fatal Error: 0x000B001B
1,623,627 >>> mbox cmd response: failed
1,623,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,623,633 >>> mbox cmd response: failed
1,623,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,623,639 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,277 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,911 UART: [kat] SHA2-256
881,842 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,957 UART: [kat] ++
886,109 UART: [kat] sha1
890,203 UART: [kat] SHA2-256
892,141 UART: [kat] SHA2-384
894,746 UART: [kat] SHA2-512-ACC
896,647 UART: [kat] ECC-384
902,342 UART: [kat] HMAC-384Kdf
907,124 UART: [kat] LMS
1,475,320 UART: [kat] --
1,476,233 UART: [cold-reset] ++
1,476,777 UART: [fht] Storing FHT @ 0x50003400
1,479,620 UART: [idev] ++
1,479,788 UART: [idev] CDI.KEYID = 6
1,480,148 UART: [idev] SUBJECT.KEYID = 7
1,480,572 UART: [idev] UDS.KEYID = 0
1,480,917 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,606 UART: [idev] Erasing UDS.KEYID = 0
1,505,326 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,962 UART: [idev] --
1,515,077 UART: [ldev] ++
1,515,245 UART: [ldev] CDI.KEYID = 6
1,515,608 UART: [ldev] SUBJECT.KEYID = 5
1,516,034 UART: [ldev] AUTHORITY.KEYID = 7
1,516,497 UART: [ldev] FE.KEYID = 1
1,521,763 UART: [ldev] Erasing FE.KEYID = 1
1,547,526 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,350 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,156 UART: [ldev] --
1,586,477 UART: [fwproc] Waiting for Commands...
1,587,342 UART: [fwproc] Received command 0x46574c44
1,588,133 UART: [fwproc] Received Image of size 114332 bytes
2,886,934 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,114 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,466 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,317 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,949 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,475,928 >>> mbox cmd response: failed
1,475,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,934 >>> mbox cmd response: failed
1,475,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,207 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,717 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,801 UART: [state] LifecycleState = Unprovisioned
86,456 UART: [state] DebugLocked = No
87,026 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,542 UART: [kat] SHA2-256
882,473 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,588 UART: [kat] ++
886,740 UART: [kat] sha1
891,016 UART: [kat] SHA2-256
892,954 UART: [kat] SHA2-384
895,569 UART: [kat] SHA2-512-ACC
897,470 UART: [kat] ECC-384
902,989 UART: [kat] HMAC-384Kdf
907,697 UART: [kat] LMS
1,475,893 UART: [kat] --
1,476,762 UART: [cold-reset] ++
1,477,244 UART: [fht] Storing FHT @ 0x50003400
1,479,963 UART: [idev] ++
1,480,131 UART: [idev] CDI.KEYID = 6
1,480,491 UART: [idev] SUBJECT.KEYID = 7
1,480,915 UART: [idev] UDS.KEYID = 0
1,481,260 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,941 UART: [idev] Erasing UDS.KEYID = 0
1,505,591 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,021 UART: [idev] --
1,515,146 UART: [ldev] ++
1,515,314 UART: [ldev] CDI.KEYID = 6
1,515,677 UART: [ldev] SUBJECT.KEYID = 5
1,516,103 UART: [ldev] AUTHORITY.KEYID = 7
1,516,566 UART: [ldev] FE.KEYID = 1
1,522,082 UART: [ldev] Erasing FE.KEYID = 1
1,547,445 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,979 UART: [ldev] --
1,586,354 UART: [fwproc] Waiting for Commands...
1,587,177 UART: [fwproc] Received command 0x46574c44
1,587,968 UART: [fwproc] Received Image of size 114332 bytes
1,623,123 UART: ROM Fatal Error: 0x000B001B
1,624,282 >>> mbox cmd response: failed
1,624,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,288 >>> mbox cmd response: failed
1,624,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,294 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,872 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,584 UART: [kat] SHA2-256
882,515 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,630 UART: [kat] ++
886,782 UART: [kat] sha1
891,088 UART: [kat] SHA2-256
893,026 UART: [kat] SHA2-384
895,653 UART: [kat] SHA2-512-ACC
897,554 UART: [kat] ECC-384
903,173 UART: [kat] HMAC-384Kdf
907,913 UART: [kat] LMS
1,476,109 UART: [kat] --
1,477,128 UART: [cold-reset] ++
1,477,620 UART: [fht] Storing FHT @ 0x50003400
1,480,399 UART: [idev] ++
1,480,567 UART: [idev] CDI.KEYID = 6
1,480,927 UART: [idev] SUBJECT.KEYID = 7
1,481,351 UART: [idev] UDS.KEYID = 0
1,481,696 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,121 UART: [idev] Erasing UDS.KEYID = 0
1,506,153 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,917 UART: [idev] --
1,515,818 UART: [ldev] ++
1,515,986 UART: [ldev] CDI.KEYID = 6
1,516,349 UART: [ldev] SUBJECT.KEYID = 5
1,516,775 UART: [ldev] AUTHORITY.KEYID = 7
1,517,238 UART: [ldev] FE.KEYID = 1
1,522,442 UART: [ldev] Erasing FE.KEYID = 1
1,548,023 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,123 UART: [ldev] --
1,587,470 UART: [fwproc] Waiting for Commands...
1,588,163 UART: [fwproc] Received command 0x46574c44
1,588,954 UART: [fwproc] Received Image of size 114332 bytes
2,886,905 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,053 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,405 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,280 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,922 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,477,781 >>> mbox cmd response: failed
1,477,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,787 >>> mbox cmd response: failed
1,477,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,793 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,124 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,686 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
893,202 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,327 UART: [kat] ++
897,479 UART: [kat] sha1
901,589 UART: [kat] SHA2-256
903,529 UART: [kat] SHA2-384
906,390 UART: [kat] SHA2-512-ACC
908,291 UART: [kat] ECC-384
918,090 UART: [kat] HMAC-384Kdf
922,744 UART: [kat] LMS
1,171,072 UART: [kat] --
1,171,851 UART: [cold-reset] ++
1,172,327 UART: [fht] FHT @ 0x50003400
1,175,034 UART: [idev] ++
1,175,202 UART: [idev] CDI.KEYID = 6
1,175,562 UART: [idev] SUBJECT.KEYID = 7
1,175,986 UART: [idev] UDS.KEYID = 0
1,176,331 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,866 UART: [idev] Erasing UDS.KEYID = 0
1,200,909 UART: [idev] Sha1 KeyId Algorithm
1,209,303 UART: [idev] --
1,210,325 UART: [ldev] ++
1,210,493 UART: [ldev] CDI.KEYID = 6
1,210,856 UART: [ldev] SUBJECT.KEYID = 5
1,211,282 UART: [ldev] AUTHORITY.KEYID = 7
1,211,745 UART: [ldev] FE.KEYID = 1
1,216,911 UART: [ldev] Erasing FE.KEYID = 1
1,243,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,669 UART: [ldev] --
1,283,008 UART: [fwproc] Wait for Commands...
1,283,722 UART: [fwproc] Recv command 0x46574c44
1,284,450 UART: [fwproc] Recv'd Img size: 114332 bytes
1,319,717 UART: ROM Fatal Error: 0x000B001B
1,320,876 >>> mbox cmd response: failed
1,320,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,882 >>> mbox cmd response: failed
1,320,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,888 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,500 UART: [state] LifecycleState = Unprovisioned
86,155 UART: [state] DebugLocked = No
86,781 UART: [state] WD Timer not started. Device not locked for debugging
88,102 UART: [kat] SHA2-256
893,752 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,877 UART: [kat] ++
898,029 UART: [kat] sha1
902,207 UART: [kat] SHA2-256
904,147 UART: [kat] SHA2-384
906,918 UART: [kat] SHA2-512-ACC
908,819 UART: [kat] ECC-384
918,568 UART: [kat] HMAC-384Kdf
923,298 UART: [kat] LMS
1,171,626 UART: [kat] --
1,172,783 UART: [cold-reset] ++
1,173,353 UART: [fht] FHT @ 0x50003400
1,175,980 UART: [idev] ++
1,176,148 UART: [idev] CDI.KEYID = 6
1,176,508 UART: [idev] SUBJECT.KEYID = 7
1,176,932 UART: [idev] UDS.KEYID = 0
1,177,277 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,782 UART: [idev] Erasing UDS.KEYID = 0
1,201,735 UART: [idev] Sha1 KeyId Algorithm
1,210,197 UART: [idev] --
1,211,263 UART: [ldev] ++
1,211,431 UART: [ldev] CDI.KEYID = 6
1,211,794 UART: [ldev] SUBJECT.KEYID = 5
1,212,220 UART: [ldev] AUTHORITY.KEYID = 7
1,212,683 UART: [ldev] FE.KEYID = 1
1,218,043 UART: [ldev] Erasing FE.KEYID = 1
1,244,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,147 UART: [ldev] --
1,283,612 UART: [fwproc] Wait for Commands...
1,284,390 UART: [fwproc] Recv command 0x46574c44
1,285,118 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,185 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,489 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,390 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,477 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,172,531 >>> mbox cmd response: failed
1,172,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,537 >>> mbox cmd response: failed
1,172,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,543 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,639 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,053 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
893,671 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,796 UART: [kat] ++
897,948 UART: [kat] sha1
902,200 UART: [kat] SHA2-256
904,140 UART: [kat] SHA2-384
906,877 UART: [kat] SHA2-512-ACC
908,778 UART: [kat] ECC-384
918,651 UART: [kat] HMAC-384Kdf
923,175 UART: [kat] LMS
1,171,503 UART: [kat] --
1,172,382 UART: [cold-reset] ++
1,172,714 UART: [fht] FHT @ 0x50003400
1,175,255 UART: [idev] ++
1,175,423 UART: [idev] CDI.KEYID = 6
1,175,783 UART: [idev] SUBJECT.KEYID = 7
1,176,207 UART: [idev] UDS.KEYID = 0
1,176,552 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,097 UART: [idev] Erasing UDS.KEYID = 0
1,201,370 UART: [idev] Sha1 KeyId Algorithm
1,209,798 UART: [idev] --
1,210,970 UART: [ldev] ++
1,211,138 UART: [ldev] CDI.KEYID = 6
1,211,501 UART: [ldev] SUBJECT.KEYID = 5
1,211,927 UART: [ldev] AUTHORITY.KEYID = 7
1,212,390 UART: [ldev] FE.KEYID = 1
1,217,526 UART: [ldev] Erasing FE.KEYID = 1
1,243,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,736 UART: [ldev] --
1,283,133 UART: [fwproc] Wait for Commands...
1,283,861 UART: [fwproc] Recv command 0x46574c44
1,284,589 UART: [fwproc] Recv'd Img size: 114332 bytes
1,319,800 UART: ROM Fatal Error: 0x000B001B
1,320,959 >>> mbox cmd response: failed
1,320,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,965 >>> mbox cmd response: failed
1,320,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,971 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
893,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,596 UART: [kat] ++
897,748 UART: [kat] sha1
901,962 UART: [kat] SHA2-256
903,902 UART: [kat] SHA2-384
906,439 UART: [kat] SHA2-512-ACC
908,340 UART: [kat] ECC-384
917,979 UART: [kat] HMAC-384Kdf
922,685 UART: [kat] LMS
1,171,013 UART: [kat] --
1,171,830 UART: [cold-reset] ++
1,172,384 UART: [fht] FHT @ 0x50003400
1,175,159 UART: [idev] ++
1,175,327 UART: [idev] CDI.KEYID = 6
1,175,687 UART: [idev] SUBJECT.KEYID = 7
1,176,111 UART: [idev] UDS.KEYID = 0
1,176,456 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,773 UART: [idev] Erasing UDS.KEYID = 0
1,200,798 UART: [idev] Sha1 KeyId Algorithm
1,209,430 UART: [idev] --
1,210,432 UART: [ldev] ++
1,210,600 UART: [ldev] CDI.KEYID = 6
1,210,963 UART: [ldev] SUBJECT.KEYID = 5
1,211,389 UART: [ldev] AUTHORITY.KEYID = 7
1,211,852 UART: [ldev] FE.KEYID = 1
1,217,184 UART: [ldev] Erasing FE.KEYID = 1
1,243,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,462 UART: [ldev] --
1,282,749 UART: [fwproc] Wait for Commands...
1,283,345 UART: [fwproc] Recv command 0x46574c44
1,284,073 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,422 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,726 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,533 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,972 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,176,240 >>> mbox cmd response: failed
1,176,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,246 >>> mbox cmd response: failed
1,176,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,252 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,976 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,442 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
890,968 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,097 UART: [kat] ++
895,249 UART: [kat] sha1
899,425 UART: [kat] SHA2-256
901,365 UART: [kat] SHA2-384
904,164 UART: [kat] SHA2-512-ACC
906,065 UART: [kat] ECC-384
915,576 UART: [kat] HMAC-384Kdf
920,056 UART: [kat] LMS
1,168,368 UART: [kat] --
1,169,489 UART: [cold-reset] ++
1,169,877 UART: [fht] FHT @ 0x50003400
1,172,683 UART: [idev] ++
1,172,851 UART: [idev] CDI.KEYID = 6
1,173,212 UART: [idev] SUBJECT.KEYID = 7
1,173,637 UART: [idev] UDS.KEYID = 0
1,173,983 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,799 UART: [idev] Erasing UDS.KEYID = 0
1,198,805 UART: [idev] Sha1 KeyId Algorithm
1,207,721 UART: [idev] --
1,208,768 UART: [ldev] ++
1,208,936 UART: [ldev] CDI.KEYID = 6
1,209,300 UART: [ldev] SUBJECT.KEYID = 5
1,209,727 UART: [ldev] AUTHORITY.KEYID = 7
1,210,190 UART: [ldev] FE.KEYID = 1
1,215,424 UART: [ldev] Erasing FE.KEYID = 1
1,241,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,776 UART: [ldev] --
1,281,236 UART: [fwproc] Wait for Commands...
1,281,809 UART: [fwproc] Recv command 0x46574c44
1,282,542 UART: [fwproc] Recv'd Img size: 114332 bytes
1,317,651 UART: ROM Fatal Error: 0x000B001B
1,318,810 >>> mbox cmd response: failed
1,318,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,816 >>> mbox cmd response: failed
1,318,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,822 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,668 UART: [kat] SHA2-256
891,218 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,347 UART: [kat] ++
895,499 UART: [kat] sha1
899,741 UART: [kat] SHA2-256
901,681 UART: [kat] SHA2-384
904,284 UART: [kat] SHA2-512-ACC
906,185 UART: [kat] ECC-384
916,168 UART: [kat] HMAC-384Kdf
920,906 UART: [kat] LMS
1,169,218 UART: [kat] --
1,170,115 UART: [cold-reset] ++
1,170,563 UART: [fht] FHT @ 0x50003400
1,173,291 UART: [idev] ++
1,173,459 UART: [idev] CDI.KEYID = 6
1,173,820 UART: [idev] SUBJECT.KEYID = 7
1,174,245 UART: [idev] UDS.KEYID = 0
1,174,591 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,205 UART: [idev] Erasing UDS.KEYID = 0
1,198,959 UART: [idev] Sha1 KeyId Algorithm
1,207,957 UART: [idev] --
1,208,856 UART: [ldev] ++
1,209,024 UART: [ldev] CDI.KEYID = 6
1,209,388 UART: [ldev] SUBJECT.KEYID = 5
1,209,815 UART: [ldev] AUTHORITY.KEYID = 7
1,210,278 UART: [ldev] FE.KEYID = 1
1,215,380 UART: [ldev] Erasing FE.KEYID = 1
1,242,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,836 UART: [ldev] --
1,281,216 UART: [fwproc] Wait for Commands...
1,281,805 UART: [fwproc] Recv command 0x46574c44
1,282,538 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,419 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,728 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,486 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,660 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,170,605 >>> mbox cmd response: failed
1,170,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,611 >>> mbox cmd response: failed
1,170,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,617 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,114 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,620,724 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
899,774 UART: [kat] SHA2-256
901,714 UART: [kat] SHA2-384
904,469 UART: [kat] SHA2-512-ACC
906,370 UART: [kat] ECC-384
916,191 UART: [kat] HMAC-384Kdf
920,815 UART: [kat] LMS
1,169,127 UART: [kat] --
1,169,936 UART: [cold-reset] ++
1,170,434 UART: [fht] FHT @ 0x50003400
1,173,116 UART: [idev] ++
1,173,284 UART: [idev] CDI.KEYID = 6
1,173,645 UART: [idev] SUBJECT.KEYID = 7
1,174,070 UART: [idev] UDS.KEYID = 0
1,174,416 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,338 UART: [idev] Erasing UDS.KEYID = 0
1,199,384 UART: [idev] Sha1 KeyId Algorithm
1,208,466 UART: [idev] --
1,209,377 UART: [ldev] ++
1,209,545 UART: [ldev] CDI.KEYID = 6
1,209,909 UART: [ldev] SUBJECT.KEYID = 5
1,210,336 UART: [ldev] AUTHORITY.KEYID = 7
1,210,799 UART: [ldev] FE.KEYID = 1
1,216,097 UART: [ldev] Erasing FE.KEYID = 1
1,242,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,311 UART: [ldev] --
1,281,625 UART: [fwproc] Wait for Commands...
1,282,448 UART: [fwproc] Recv command 0x46574c44
1,283,181 UART: [fwproc] Recv'd Img size: 114332 bytes
1,318,198 UART: ROM Fatal Error: 0x000B001B
1,319,357 >>> mbox cmd response: failed
1,319,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,363 >>> mbox cmd response: failed
1,319,363 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,369 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,362 UART: [state] WD Timer not started. Device not locked for debugging
87,635 UART: [kat] SHA2-256
891,185 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,314 UART: [kat] ++
895,466 UART: [kat] sha1
899,808 UART: [kat] SHA2-256
901,748 UART: [kat] SHA2-384
904,501 UART: [kat] SHA2-512-ACC
906,402 UART: [kat] ECC-384
916,223 UART: [kat] HMAC-384Kdf
920,945 UART: [kat] LMS
1,169,257 UART: [kat] --
1,169,932 UART: [cold-reset] ++
1,170,440 UART: [fht] FHT @ 0x50003400
1,173,232 UART: [idev] ++
1,173,400 UART: [idev] CDI.KEYID = 6
1,173,761 UART: [idev] SUBJECT.KEYID = 7
1,174,186 UART: [idev] UDS.KEYID = 0
1,174,532 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,306 UART: [idev] Erasing UDS.KEYID = 0
1,199,342 UART: [idev] Sha1 KeyId Algorithm
1,208,156 UART: [idev] --
1,209,201 UART: [ldev] ++
1,209,369 UART: [ldev] CDI.KEYID = 6
1,209,733 UART: [ldev] SUBJECT.KEYID = 5
1,210,160 UART: [ldev] AUTHORITY.KEYID = 7
1,210,623 UART: [ldev] FE.KEYID = 1
1,216,097 UART: [ldev] Erasing FE.KEYID = 1
1,242,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,421 UART: [ldev] --
1,281,707 UART: [fwproc] Wait for Commands...
1,282,416 UART: [fwproc] Recv command 0x46574c44
1,283,149 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,418 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,727 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,623 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,649 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,170,258 >>> mbox cmd response: failed
1,170,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,264 >>> mbox cmd response: failed
1,170,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,270 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,859 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,923 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Manufacturing
85,779 UART: [state] DebugLocked = No
86,401 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,005 UART: [kat] SHA2-256
881,936 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,051 UART: [kat] ++
886,203 UART: [kat] sha1
890,395 UART: [kat] SHA2-256
892,333 UART: [kat] SHA2-384
894,974 UART: [kat] SHA2-512-ACC
896,875 UART: [kat] ECC-384
902,830 UART: [kat] HMAC-384Kdf
907,300 UART: [kat] LMS
1,475,496 UART: [kat] --
1,476,589 UART: [cold-reset] ++
1,477,115 UART: [fht] Storing FHT @ 0x50003400
1,480,044 UART: [idev] ++
1,480,212 UART: [idev] CDI.KEYID = 6
1,480,572 UART: [idev] SUBJECT.KEYID = 7
1,480,996 UART: [idev] UDS.KEYID = 0
1,481,341 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,022 UART: [idev] Erasing UDS.KEYID = 0
1,505,218 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,946 UART: [idev] --
1,515,025 UART: [ldev] ++
1,515,193 UART: [ldev] CDI.KEYID = 6
1,515,556 UART: [ldev] SUBJECT.KEYID = 5
1,515,982 UART: [ldev] AUTHORITY.KEYID = 7
1,516,445 UART: [ldev] FE.KEYID = 1
1,522,169 UART: [ldev] Erasing FE.KEYID = 1
1,547,464 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,656 UART: [ldev] --
1,586,919 UART: [fwproc] Waiting for Commands...
1,587,536 UART: [fwproc] Received command 0x46574c44
1,588,327 UART: [fwproc] Received Image of size 114332 bytes
1,634,018 UART: ROM Fatal Error: 0x000B0005
1,635,175 >>> mbox cmd response: failed
1,635,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,181 >>> mbox cmd response: failed
1,635,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,187 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,551 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,221 UART: [kat] SHA2-256
882,152 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,267 UART: [kat] ++
886,419 UART: [kat] sha1
890,643 UART: [kat] SHA2-256
892,581 UART: [kat] SHA2-384
895,448 UART: [kat] SHA2-512-ACC
897,349 UART: [kat] ECC-384
903,228 UART: [kat] HMAC-384Kdf
908,010 UART: [kat] LMS
1,476,206 UART: [kat] --
1,476,951 UART: [cold-reset] ++
1,477,391 UART: [fht] Storing FHT @ 0x50003400
1,480,180 UART: [idev] ++
1,480,348 UART: [idev] CDI.KEYID = 6
1,480,708 UART: [idev] SUBJECT.KEYID = 7
1,481,132 UART: [idev] UDS.KEYID = 0
1,481,477 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,940 UART: [idev] Erasing UDS.KEYID = 0
1,505,528 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,288 UART: [idev] --
1,515,193 UART: [ldev] ++
1,515,361 UART: [ldev] CDI.KEYID = 6
1,515,724 UART: [ldev] SUBJECT.KEYID = 5
1,516,150 UART: [ldev] AUTHORITY.KEYID = 7
1,516,613 UART: [ldev] FE.KEYID = 1
1,521,603 UART: [ldev] Erasing FE.KEYID = 1
1,546,886 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,864 UART: [ldev] --
1,586,137 UART: [fwproc] Waiting for Commands...
1,586,880 UART: [fwproc] Received command 0x46574c44
1,587,671 UART: [fwproc] Received Image of size 114332 bytes
2,885,138 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,280 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,632 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,537 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,261 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,485,732 >>> mbox cmd response: failed
1,485,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,738 >>> mbox cmd response: failed
1,485,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,744 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,805 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,915 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Manufacturing
86,008 UART: [state] DebugLocked = No
86,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,342 UART: [kat] SHA2-256
882,273 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,388 UART: [kat] ++
886,540 UART: [kat] sha1
890,808 UART: [kat] SHA2-256
892,746 UART: [kat] SHA2-384
895,393 UART: [kat] SHA2-512-ACC
897,294 UART: [kat] ECC-384
902,805 UART: [kat] HMAC-384Kdf
907,449 UART: [kat] LMS
1,475,645 UART: [kat] --
1,476,546 UART: [cold-reset] ++
1,476,908 UART: [fht] Storing FHT @ 0x50003400
1,479,509 UART: [idev] ++
1,479,677 UART: [idev] CDI.KEYID = 6
1,480,037 UART: [idev] SUBJECT.KEYID = 7
1,480,461 UART: [idev] UDS.KEYID = 0
1,480,806 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,685 UART: [idev] Erasing UDS.KEYID = 0
1,505,067 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,825 UART: [idev] --
1,515,032 UART: [ldev] ++
1,515,200 UART: [ldev] CDI.KEYID = 6
1,515,563 UART: [ldev] SUBJECT.KEYID = 5
1,515,989 UART: [ldev] AUTHORITY.KEYID = 7
1,516,452 UART: [ldev] FE.KEYID = 1
1,521,862 UART: [ldev] Erasing FE.KEYID = 1
1,547,357 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,103 UART: [ldev] --
1,586,586 UART: [fwproc] Waiting for Commands...
1,587,237 UART: [fwproc] Received command 0x46574c44
1,588,028 UART: [fwproc] Received Image of size 114332 bytes
1,633,281 UART: ROM Fatal Error: 0x000B0005
1,634,438 >>> mbox cmd response: failed
1,634,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,444 >>> mbox cmd response: failed
1,634,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,450 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,164 UART: [kat] SHA2-256
882,095 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,210 UART: [kat] ++
886,362 UART: [kat] sha1
890,850 UART: [kat] SHA2-256
892,788 UART: [kat] SHA2-384
895,469 UART: [kat] SHA2-512-ACC
897,370 UART: [kat] ECC-384
903,543 UART: [kat] HMAC-384Kdf
908,203 UART: [kat] LMS
1,476,399 UART: [kat] --
1,477,392 UART: [cold-reset] ++
1,477,950 UART: [fht] Storing FHT @ 0x50003400
1,480,725 UART: [idev] ++
1,480,893 UART: [idev] CDI.KEYID = 6
1,481,253 UART: [idev] SUBJECT.KEYID = 7
1,481,677 UART: [idev] UDS.KEYID = 0
1,482,022 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,709 UART: [idev] Erasing UDS.KEYID = 0
1,506,611 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,073 UART: [idev] --
1,515,946 UART: [ldev] ++
1,516,114 UART: [ldev] CDI.KEYID = 6
1,516,477 UART: [ldev] SUBJECT.KEYID = 5
1,516,903 UART: [ldev] AUTHORITY.KEYID = 7
1,517,366 UART: [ldev] FE.KEYID = 1
1,522,476 UART: [ldev] Erasing FE.KEYID = 1
1,547,687 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,835 UART: [ldev] --
1,587,204 UART: [fwproc] Waiting for Commands...
1,588,003 UART: [fwproc] Received command 0x46574c44
1,588,794 UART: [fwproc] Received Image of size 114332 bytes
2,886,099 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,239 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,591 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,078,400 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,920 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,486,521 >>> mbox cmd response: failed
1,486,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,527 >>> mbox cmd response: failed
1,486,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,533 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,828 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,994 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,588 UART: [state] LifecycleState = Manufacturing
85,243 UART: [state] DebugLocked = No
85,771 UART: [state] WD Timer not started. Device not locked for debugging
86,910 UART: [kat] SHA2-256
892,560 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,685 UART: [kat] ++
896,837 UART: [kat] sha1
901,089 UART: [kat] SHA2-256
903,029 UART: [kat] SHA2-384
905,880 UART: [kat] SHA2-512-ACC
907,781 UART: [kat] ECC-384
917,330 UART: [kat] HMAC-384Kdf
921,944 UART: [kat] LMS
1,170,272 UART: [kat] --
1,171,225 UART: [cold-reset] ++
1,171,681 UART: [fht] FHT @ 0x50003400
1,174,430 UART: [idev] ++
1,174,598 UART: [idev] CDI.KEYID = 6
1,174,958 UART: [idev] SUBJECT.KEYID = 7
1,175,382 UART: [idev] UDS.KEYID = 0
1,175,727 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,480 UART: [idev] Erasing UDS.KEYID = 0
1,200,571 UART: [idev] Sha1 KeyId Algorithm
1,208,885 UART: [idev] --
1,209,911 UART: [ldev] ++
1,210,079 UART: [ldev] CDI.KEYID = 6
1,210,442 UART: [ldev] SUBJECT.KEYID = 5
1,210,868 UART: [ldev] AUTHORITY.KEYID = 7
1,211,331 UART: [ldev] FE.KEYID = 1
1,216,469 UART: [ldev] Erasing FE.KEYID = 1
1,243,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,941 UART: [ldev] --
1,282,316 UART: [fwproc] Wait for Commands...
1,282,956 UART: [fwproc] Recv command 0x46574c44
1,283,684 UART: [fwproc] Recv'd Img size: 114332 bytes
1,328,609 UART: ROM Fatal Error: 0x000B0005
1,329,766 >>> mbox cmd response: failed
1,329,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,772 >>> mbox cmd response: failed
1,329,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,778 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,792 UART: [state] LifecycleState = Unprovisioned
85,447 UART: [state] DebugLocked = No
86,055 UART: [state] WD Timer not started. Device not locked for debugging
87,264 UART: [kat] SHA2-256
892,914 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,039 UART: [kat] ++
897,191 UART: [kat] sha1
901,359 UART: [kat] SHA2-256
903,299 UART: [kat] SHA2-384
906,010 UART: [kat] SHA2-512-ACC
907,911 UART: [kat] ECC-384
917,590 UART: [kat] HMAC-384Kdf
922,030 UART: [kat] LMS
1,170,358 UART: [kat] --
1,171,069 UART: [cold-reset] ++
1,171,513 UART: [fht] FHT @ 0x50003400
1,174,176 UART: [idev] ++
1,174,344 UART: [idev] CDI.KEYID = 6
1,174,704 UART: [idev] SUBJECT.KEYID = 7
1,175,128 UART: [idev] UDS.KEYID = 0
1,175,473 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,022 UART: [idev] Erasing UDS.KEYID = 0
1,200,267 UART: [idev] Sha1 KeyId Algorithm
1,208,899 UART: [idev] --
1,209,903 UART: [ldev] ++
1,210,071 UART: [ldev] CDI.KEYID = 6
1,210,434 UART: [ldev] SUBJECT.KEYID = 5
1,210,860 UART: [ldev] AUTHORITY.KEYID = 7
1,211,323 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,243,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,049 UART: [ldev] --
1,282,438 UART: [fwproc] Wait for Commands...
1,283,086 UART: [fwproc] Recv command 0x46574c44
1,283,814 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,873 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,177 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,775,106 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,071 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,463 >>> mbox cmd response: failed
1,184,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,469 >>> mbox cmd response: failed
1,184,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,475 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,973 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,141 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Manufacturing
86,132 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
893,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,596 UART: [kat] ++
897,748 UART: [kat] sha1
902,016 UART: [kat] SHA2-256
903,956 UART: [kat] SHA2-384
906,553 UART: [kat] SHA2-512-ACC
908,454 UART: [kat] ECC-384
918,711 UART: [kat] HMAC-384Kdf
923,355 UART: [kat] LMS
1,171,683 UART: [kat] --
1,172,578 UART: [cold-reset] ++
1,172,928 UART: [fht] FHT @ 0x50003400
1,175,553 UART: [idev] ++
1,175,721 UART: [idev] CDI.KEYID = 6
1,176,081 UART: [idev] SUBJECT.KEYID = 7
1,176,505 UART: [idev] UDS.KEYID = 0
1,176,850 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,453 UART: [idev] Erasing UDS.KEYID = 0
1,201,552 UART: [idev] Sha1 KeyId Algorithm
1,209,896 UART: [idev] --
1,210,916 UART: [ldev] ++
1,211,084 UART: [ldev] CDI.KEYID = 6
1,211,447 UART: [ldev] SUBJECT.KEYID = 5
1,211,873 UART: [ldev] AUTHORITY.KEYID = 7
1,212,336 UART: [ldev] FE.KEYID = 1
1,217,508 UART: [ldev] Erasing FE.KEYID = 1
1,244,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,826 UART: [ldev] --
1,283,117 UART: [fwproc] Wait for Commands...
1,283,857 UART: [fwproc] Recv command 0x46574c44
1,284,585 UART: [fwproc] Recv'd Img size: 114332 bytes
1,330,268 UART: ROM Fatal Error: 0x000B0005
1,331,425 >>> mbox cmd response: failed
1,331,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,431 >>> mbox cmd response: failed
1,331,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,437 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
893,399 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,524 UART: [kat] ++
897,676 UART: [kat] sha1
902,110 UART: [kat] SHA2-256
904,050 UART: [kat] SHA2-384
906,827 UART: [kat] SHA2-512-ACC
908,728 UART: [kat] ECC-384
918,203 UART: [kat] HMAC-384Kdf
922,809 UART: [kat] LMS
1,171,137 UART: [kat] --
1,171,876 UART: [cold-reset] ++
1,172,340 UART: [fht] FHT @ 0x50003400
1,175,125 UART: [idev] ++
1,175,293 UART: [idev] CDI.KEYID = 6
1,175,653 UART: [idev] SUBJECT.KEYID = 7
1,176,077 UART: [idev] UDS.KEYID = 0
1,176,422 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,183,863 UART: [idev] Erasing UDS.KEYID = 0
1,201,050 UART: [idev] Sha1 KeyId Algorithm
1,209,690 UART: [idev] --
1,210,800 UART: [ldev] ++
1,210,968 UART: [ldev] CDI.KEYID = 6
1,211,331 UART: [ldev] SUBJECT.KEYID = 5
1,211,757 UART: [ldev] AUTHORITY.KEYID = 7
1,212,220 UART: [ldev] FE.KEYID = 1
1,217,422 UART: [ldev] Erasing FE.KEYID = 1
1,243,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,834 UART: [ldev] --
1,283,139 UART: [fwproc] Wait for Commands...
1,283,787 UART: [fwproc] Recv command 0x46574c44
1,284,515 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,537 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,224 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,528 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,313 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,970 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,185,558 >>> mbox cmd response: failed
1,185,558 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,564 >>> mbox cmd response: failed
1,185,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,570 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,916 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,935 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,818 UART: [state] LifecycleState = Manufacturing
85,473 UART: [state] DebugLocked = No
86,037 UART: [state] WD Timer not started. Device not locked for debugging
87,240 UART: [kat] SHA2-256
890,790 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,919 UART: [kat] ++
895,071 UART: [kat] sha1
899,265 UART: [kat] SHA2-256
901,205 UART: [kat] SHA2-384
903,948 UART: [kat] SHA2-512-ACC
905,849 UART: [kat] ECC-384
915,574 UART: [kat] HMAC-384Kdf
920,140 UART: [kat] LMS
1,168,452 UART: [kat] --
1,169,481 UART: [cold-reset] ++
1,169,985 UART: [fht] FHT @ 0x50003400
1,172,727 UART: [idev] ++
1,172,895 UART: [idev] CDI.KEYID = 6
1,173,256 UART: [idev] SUBJECT.KEYID = 7
1,173,681 UART: [idev] UDS.KEYID = 0
1,174,027 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,737 UART: [idev] Erasing UDS.KEYID = 0
1,198,557 UART: [idev] Sha1 KeyId Algorithm
1,207,483 UART: [idev] --
1,208,412 UART: [ldev] ++
1,208,580 UART: [ldev] CDI.KEYID = 6
1,208,944 UART: [ldev] SUBJECT.KEYID = 5
1,209,371 UART: [ldev] AUTHORITY.KEYID = 7
1,209,834 UART: [ldev] FE.KEYID = 1
1,214,810 UART: [ldev] Erasing FE.KEYID = 1
1,241,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,752 UART: [ldev] --
1,281,098 UART: [fwproc] Wait for Commands...
1,281,753 UART: [fwproc] Recv command 0x46574c44
1,282,486 UART: [fwproc] Recv'd Img size: 114332 bytes
1,326,749 UART: ROM Fatal Error: 0x000B0005
1,327,906 >>> mbox cmd response: failed
1,327,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,912 >>> mbox cmd response: failed
1,327,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,918 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
891,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,431 UART: [kat] ++
895,583 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,420 UART: [kat] SHA2-512-ACC
906,321 UART: [kat] ECC-384
916,260 UART: [kat] HMAC-384Kdf
920,828 UART: [kat] LMS
1,169,140 UART: [kat] --
1,170,139 UART: [cold-reset] ++
1,170,465 UART: [fht] FHT @ 0x50003400
1,173,263 UART: [idev] ++
1,173,431 UART: [idev] CDI.KEYID = 6
1,173,792 UART: [idev] SUBJECT.KEYID = 7
1,174,217 UART: [idev] UDS.KEYID = 0
1,174,563 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,293 UART: [idev] Erasing UDS.KEYID = 0
1,199,269 UART: [idev] Sha1 KeyId Algorithm
1,208,249 UART: [idev] --
1,209,274 UART: [ldev] ++
1,209,442 UART: [ldev] CDI.KEYID = 6
1,209,806 UART: [ldev] SUBJECT.KEYID = 5
1,210,233 UART: [ldev] AUTHORITY.KEYID = 7
1,210,696 UART: [ldev] FE.KEYID = 1
1,215,884 UART: [ldev] Erasing FE.KEYID = 1
1,242,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,474 UART: [ldev] --
1,281,832 UART: [fwproc] Wait for Commands...
1,282,445 UART: [fwproc] Recv command 0x46574c44
1,283,178 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,367 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,969 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,278 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,996 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,516 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,178,497 >>> mbox cmd response: failed
1,178,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,503 >>> mbox cmd response: failed
1,178,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,509 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,178 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,666 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Manufacturing
86,252 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
891,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,708 UART: [kat] ++
895,860 UART: [kat] sha1
899,982 UART: [kat] SHA2-256
901,922 UART: [kat] SHA2-384
904,491 UART: [kat] SHA2-512-ACC
906,392 UART: [kat] ECC-384
916,119 UART: [kat] HMAC-384Kdf
920,581 UART: [kat] LMS
1,168,893 UART: [kat] --
1,169,842 UART: [cold-reset] ++
1,170,314 UART: [fht] FHT @ 0x50003400
1,173,020 UART: [idev] ++
1,173,188 UART: [idev] CDI.KEYID = 6
1,173,549 UART: [idev] SUBJECT.KEYID = 7
1,173,974 UART: [idev] UDS.KEYID = 0
1,174,320 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,470 UART: [idev] Erasing UDS.KEYID = 0
1,200,092 UART: [idev] Sha1 KeyId Algorithm
1,208,884 UART: [idev] --
1,210,065 UART: [ldev] ++
1,210,233 UART: [ldev] CDI.KEYID = 6
1,210,597 UART: [ldev] SUBJECT.KEYID = 5
1,211,024 UART: [ldev] AUTHORITY.KEYID = 7
1,211,487 UART: [ldev] FE.KEYID = 1
1,216,559 UART: [ldev] Erasing FE.KEYID = 1
1,242,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,715 UART: [ldev] --
1,282,111 UART: [fwproc] Wait for Commands...
1,282,916 UART: [fwproc] Recv command 0x46574c44
1,283,649 UART: [fwproc] Recv'd Img size: 114332 bytes
1,329,012 UART: ROM Fatal Error: 0x000B0005
1,330,169 >>> mbox cmd response: failed
1,330,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,175 >>> mbox cmd response: failed
1,330,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,181 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,930 UART: [state] WD Timer not started. Device not locked for debugging
88,249 UART: [kat] SHA2-256
891,799 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,928 UART: [kat] ++
896,080 UART: [kat] sha1
900,310 UART: [kat] SHA2-256
902,250 UART: [kat] SHA2-384
905,007 UART: [kat] SHA2-512-ACC
906,908 UART: [kat] ECC-384
916,665 UART: [kat] HMAC-384Kdf
921,319 UART: [kat] LMS
1,169,631 UART: [kat] --
1,170,488 UART: [cold-reset] ++
1,170,892 UART: [fht] FHT @ 0x50003400
1,173,712 UART: [idev] ++
1,173,880 UART: [idev] CDI.KEYID = 6
1,174,241 UART: [idev] SUBJECT.KEYID = 7
1,174,666 UART: [idev] UDS.KEYID = 0
1,175,012 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,326 UART: [idev] Erasing UDS.KEYID = 0
1,199,842 UART: [idev] Sha1 KeyId Algorithm
1,208,626 UART: [idev] --
1,209,915 UART: [ldev] ++
1,210,083 UART: [ldev] CDI.KEYID = 6
1,210,447 UART: [ldev] SUBJECT.KEYID = 5
1,210,874 UART: [ldev] AUTHORITY.KEYID = 7
1,211,337 UART: [ldev] FE.KEYID = 1
1,216,443 UART: [ldev] Erasing FE.KEYID = 1
1,242,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,005 UART: [ldev] --
1,281,431 UART: [fwproc] Wait for Commands...
1,282,054 UART: [fwproc] Recv command 0x46574c44
1,282,787 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,870 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,179 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,973 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,375 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,842 >>> mbox cmd response: failed
1,180,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,848 >>> mbox cmd response: failed
1,180,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,481 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,167 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,722 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,671,444 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,406 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,671,752 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,811 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,673,682 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,625 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,672,732 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,596 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,670,738 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,138 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,672,619 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,439 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,671,756 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,331 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,671,819 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,550 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,672,947 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,002 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,672,789 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,301 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,672,208 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,471 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,672,753 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,007 UART: [state] LifecycleState = Production
85,615 UART: [state] DebugLocked = Yes
86,237 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,899 UART: [kat] SHA2-256
881,830 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,945 UART: [kat] ++
886,097 UART: [kat] sha1
890,361 UART: [kat] SHA2-256
892,299 UART: [kat] SHA2-384
895,184 UART: [kat] SHA2-512-ACC
897,085 UART: [kat] ECC-384
902,808 UART: [kat] HMAC-384Kdf
907,338 UART: [kat] LMS
1,475,534 UART: [kat] --
1,476,501 UART: [cold-reset] ++
1,476,974 UART: [fht] Storing FHT @ 0x50003400
1,479,571 UART: [idev] ++
1,479,739 UART: [idev] CDI.KEYID = 6
1,480,099 UART: [idev] SUBJECT.KEYID = 7
1,480,523 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,804 UART: [state] LifecycleState = Production
86,412 UART: [state] DebugLocked = Yes
86,990 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,576 UART: [kat] SHA2-256
882,507 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,622 UART: [kat] ++
886,774 UART: [kat] sha1
891,186 UART: [kat] SHA2-256
893,124 UART: [kat] SHA2-384
895,961 UART: [kat] SHA2-512-ACC
897,862 UART: [kat] ECC-384
903,335 UART: [kat] HMAC-384Kdf
907,933 UART: [kat] LMS
1,476,129 UART: [kat] --
1,476,856 UART: [cold-reset] ++
1,477,227 UART: [fht] Storing FHT @ 0x50003400
1,480,154 UART: [idev] ++
1,480,322 UART: [idev] CDI.KEYID = 6
1,480,682 UART: [idev] SUBJECT.KEYID = 7
1,481,106 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,039 UART: [state] LifecycleState = Production
85,647 UART: [state] DebugLocked = Yes
86,339 UART: [state] Starting the WD Timer 40000000 cycles
87,838 UART: [kat] SHA2-256
893,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,613 UART: [kat] ++
897,765 UART: [kat] sha1
901,835 UART: [kat] SHA2-256
903,775 UART: [kat] SHA2-384
906,414 UART: [kat] SHA2-512-ACC
908,315 UART: [kat] ECC-384
918,202 UART: [kat] HMAC-384Kdf
922,598 UART: [kat] LMS
1,170,926 UART: [kat] --
1,171,699 UART: [cold-reset] ++
1,172,264 UART: [fht] FHT @ 0x50003400
1,174,777 UART: [idev] ++
1,174,945 UART: [idev] CDI.KEYID = 6
1,175,305 UART: [idev] SUBJECT.KEYID = 7
1,175,729 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,574 UART: [state] LifecycleState = Production
86,182 UART: [state] DebugLocked = Yes
86,890 UART: [state] Starting the WD Timer 40000000 cycles
88,359 UART: [kat] SHA2-256
894,009 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,134 UART: [kat] ++
898,286 UART: [kat] sha1
902,466 UART: [kat] SHA2-256
904,406 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
918,845 UART: [kat] HMAC-384Kdf
923,451 UART: [kat] LMS
1,171,779 UART: [kat] --
1,172,678 UART: [cold-reset] ++
1,173,055 UART: [fht] FHT @ 0x50003400
1,175,884 UART: [idev] ++
1,176,052 UART: [idev] CDI.KEYID = 6
1,176,412 UART: [idev] SUBJECT.KEYID = 7
1,176,836 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Production
85,903 UART: [state] DebugLocked = Yes
86,485 UART: [state] Starting the WD Timer 40000000 cycles
88,076 UART: [kat] SHA2-256
891,626 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,755 UART: [kat] ++
895,907 UART: [kat] sha1
900,345 UART: [kat] SHA2-256
902,285 UART: [kat] SHA2-384
905,124 UART: [kat] SHA2-512-ACC
907,025 UART: [kat] ECC-384
916,428 UART: [kat] HMAC-384Kdf
921,022 UART: [kat] LMS
1,169,334 UART: [kat] --
1,170,339 UART: [cold-reset] ++
1,170,700 UART: [fht] FHT @ 0x50003400
1,173,440 UART: [idev] ++
1,173,608 UART: [idev] CDI.KEYID = 6
1,173,969 UART: [idev] SUBJECT.KEYID = 7
1,174,394 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Production
85,878 UART: [state] DebugLocked = Yes
86,600 UART: [state] Starting the WD Timer 40000000 cycles
88,283 UART: [kat] SHA2-256
891,833 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,962 UART: [kat] ++
896,114 UART: [kat] sha1
900,234 UART: [kat] SHA2-256
902,174 UART: [kat] SHA2-384
904,879 UART: [kat] SHA2-512-ACC
906,780 UART: [kat] ECC-384
917,073 UART: [kat] HMAC-384Kdf
921,691 UART: [kat] LMS
1,170,003 UART: [kat] --
1,170,866 UART: [cold-reset] ++
1,171,317 UART: [fht] FHT @ 0x50003400
1,174,077 UART: [idev] ++
1,174,245 UART: [idev] CDI.KEYID = 6
1,174,606 UART: [idev] SUBJECT.KEYID = 7
1,175,031 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,933 UART: [state] LifecycleState = Production
85,541 UART: [state] DebugLocked = Yes
86,091 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,699 UART: [kat] SHA2-256
881,630 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,745 UART: [kat] ++
885,897 UART: [kat] sha1
889,895 UART: [kat] SHA2-256
891,833 UART: [kat] SHA2-384
894,548 UART: [kat] SHA2-512-ACC
896,449 UART: [kat] ECC-384
902,118 UART: [kat] HMAC-384Kdf
906,596 UART: [kat] LMS
1,474,792 UART: [kat] --
1,475,687 UART: [cold-reset] ++
1,476,254 UART: [fht] Storing FHT @ 0x50003400
1,479,235 UART: [idev] ++
1,479,403 UART: [idev] CDI.KEYID = 6
1,479,763 UART: [idev] SUBJECT.KEYID = 7
1,480,187 UART: [idev] UDS.KEYID = 0
1,480,532 ready_for_fw is high
1,480,532 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,208 UART: [idev] Erasing UDS.KEYID = 0
1,504,765 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,218 UART: [idev] --
1,514,407 UART: [ldev] ++
1,514,575 UART: [ldev] CDI.KEYID = 6
1,514,938 UART: [ldev] SUBJECT.KEYID = 5
1,515,364 UART: [ldev] AUTHORITY.KEYID = 7
1,515,827 UART: [ldev] FE.KEYID = 1
1,520,853 UART: [ldev] Erasing FE.KEYID = 1
1,546,168 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,439 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,133 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,005 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,711 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,675 UART: [ldev] --
1,585,054 UART: [fwproc] Waiting for Commands...
1,585,721 UART: [fwproc] Received command 0x46574c44
1,586,512 UART: [fwproc] Received Image of size 114332 bytes
2,910,019 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,937,528 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,966,880 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,102,654 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,046 ready_for_fw is high
1,363,046 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,952,120 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Production
85,792 UART: [state] DebugLocked = Yes
86,436 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,036 UART: [kat] SHA2-256
881,967 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,082 UART: [kat] ++
886,234 UART: [kat] sha1
890,468 UART: [kat] SHA2-256
892,406 UART: [kat] SHA2-384
895,211 UART: [kat] SHA2-512-ACC
897,112 UART: [kat] ECC-384
902,661 UART: [kat] HMAC-384Kdf
907,271 UART: [kat] LMS
1,475,467 UART: [kat] --
1,476,196 UART: [cold-reset] ++
1,476,573 UART: [fht] Storing FHT @ 0x50003400
1,479,288 UART: [idev] ++
1,479,456 UART: [idev] CDI.KEYID = 6
1,479,816 UART: [idev] SUBJECT.KEYID = 7
1,480,240 UART: [idev] UDS.KEYID = 0
1,480,585 ready_for_fw is high
1,480,585 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,893 UART: [idev] Erasing UDS.KEYID = 0
1,504,524 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,087 UART: [idev] --
1,514,114 UART: [ldev] ++
1,514,282 UART: [ldev] CDI.KEYID = 6
1,514,645 UART: [ldev] SUBJECT.KEYID = 5
1,515,071 UART: [ldev] AUTHORITY.KEYID = 7
1,515,534 UART: [ldev] FE.KEYID = 1
1,520,952 UART: [ldev] Erasing FE.KEYID = 1
1,546,637 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,508 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,202 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,074 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,780 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,776 UART: [ldev] --
1,586,139 UART: [fwproc] Waiting for Commands...
1,586,972 UART: [fwproc] Received command 0x46574c44
1,587,763 UART: [fwproc] Received Image of size 114332 bytes
2,911,456 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,938,615 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,967,967 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,103,759 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,341 ready_for_fw is high
1,363,341 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,955,953 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Production
85,951 UART: [state] DebugLocked = Yes
86,571 UART: [state] Starting the WD Timer 40000000 cycles
88,054 UART: [kat] SHA2-256
893,704 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,829 UART: [kat] ++
897,981 UART: [kat] sha1
902,389 UART: [kat] SHA2-256
904,329 UART: [kat] SHA2-384
907,168 UART: [kat] SHA2-512-ACC
909,069 UART: [kat] ECC-384
918,322 UART: [kat] HMAC-384Kdf
922,858 UART: [kat] LMS
1,171,186 UART: [kat] --
1,172,183 UART: [cold-reset] ++
1,172,744 UART: [fht] FHT @ 0x50003400
1,175,339 UART: [idev] ++
1,175,507 UART: [idev] CDI.KEYID = 6
1,175,867 UART: [idev] SUBJECT.KEYID = 7
1,176,291 UART: [idev] UDS.KEYID = 0
1,176,636 ready_for_fw is high
1,176,636 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,390 UART: [idev] Erasing UDS.KEYID = 0
1,201,316 UART: [idev] Sha1 KeyId Algorithm
1,209,657 UART: [idev] --
1,210,723 UART: [ldev] ++
1,210,891 UART: [ldev] CDI.KEYID = 6
1,211,254 UART: [ldev] SUBJECT.KEYID = 5
1,211,680 UART: [ldev] AUTHORITY.KEYID = 7
1,212,143 UART: [ldev] FE.KEYID = 1
1,217,225 UART: [ldev] Erasing FE.KEYID = 1
1,243,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,815 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,509 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,381 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,087 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,166 UART: [ldev] --
1,282,549 UART: [fwproc] Wait for Commands...
1,283,125 UART: [fwproc] Recv command 0x46574c44
1,283,853 UART: [fwproc] Recv'd Img size: 114332 bytes
2,607,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,791 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,095 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,879 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,594 ready_for_fw is high
1,060,594 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,651,450 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Production
85,854 UART: [state] DebugLocked = Yes
86,494 UART: [state] Starting the WD Timer 40000000 cycles
87,981 UART: [kat] SHA2-256
893,631 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,756 UART: [kat] ++
897,908 UART: [kat] sha1
901,952 UART: [kat] SHA2-256
903,892 UART: [kat] SHA2-384
906,729 UART: [kat] SHA2-512-ACC
908,630 UART: [kat] ECC-384
918,077 UART: [kat] HMAC-384Kdf
922,713 UART: [kat] LMS
1,171,041 UART: [kat] --
1,171,952 UART: [cold-reset] ++
1,172,387 UART: [fht] FHT @ 0x50003400
1,174,970 UART: [idev] ++
1,175,138 UART: [idev] CDI.KEYID = 6
1,175,498 UART: [idev] SUBJECT.KEYID = 7
1,175,922 UART: [idev] UDS.KEYID = 0
1,176,267 ready_for_fw is high
1,176,267 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,207 UART: [idev] Erasing UDS.KEYID = 0
1,201,067 UART: [idev] Sha1 KeyId Algorithm
1,209,418 UART: [idev] --
1,210,376 UART: [ldev] ++
1,210,544 UART: [ldev] CDI.KEYID = 6
1,210,907 UART: [ldev] SUBJECT.KEYID = 5
1,211,333 UART: [ldev] AUTHORITY.KEYID = 7
1,211,796 UART: [ldev] FE.KEYID = 1
1,217,116 UART: [ldev] Erasing FE.KEYID = 1
1,243,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,986 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,680 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,552 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,258 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,129 UART: [ldev] --
1,282,634 UART: [fwproc] Wait for Commands...
1,283,230 UART: [fwproc] Recv command 0x46574c44
1,283,958 UART: [fwproc] Recv'd Img size: 114332 bytes
2,606,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,772 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,076 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,798,772 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,345 ready_for_fw is high
1,061,345 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,653,223 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Production
85,761 UART: [state] DebugLocked = Yes
86,393 UART: [state] Starting the WD Timer 40000000 cycles
88,018 UART: [kat] SHA2-256
891,568 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,697 UART: [kat] ++
895,849 UART: [kat] sha1
900,077 UART: [kat] SHA2-256
902,017 UART: [kat] SHA2-384
904,668 UART: [kat] SHA2-512-ACC
906,569 UART: [kat] ECC-384
916,094 UART: [kat] HMAC-384Kdf
920,540 UART: [kat] LMS
1,168,852 UART: [kat] --
1,169,587 UART: [cold-reset] ++
1,170,054 UART: [fht] FHT @ 0x50003400
1,172,702 UART: [idev] ++
1,172,870 UART: [idev] CDI.KEYID = 6
1,173,231 UART: [idev] SUBJECT.KEYID = 7
1,173,656 UART: [idev] UDS.KEYID = 0
1,174,002 ready_for_fw is high
1,174,002 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,661 UART: [idev] Erasing UDS.KEYID = 0
1,198,478 UART: [idev] Sha1 KeyId Algorithm
1,207,349 UART: [idev] --
1,208,478 UART: [ldev] ++
1,208,646 UART: [ldev] CDI.KEYID = 6
1,209,010 UART: [ldev] SUBJECT.KEYID = 5
1,209,437 UART: [ldev] AUTHORITY.KEYID = 7
1,209,900 UART: [ldev] FE.KEYID = 1
1,214,920 UART: [ldev] Erasing FE.KEYID = 1
1,241,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,627 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,321 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,191 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,897 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,041 UART: [ldev] --
1,280,521 UART: [fwproc] Wait for Commands...
1,281,338 UART: [fwproc] Recv command 0x46574c44
1,282,071 UART: [fwproc] Recv'd Img size: 114332 bytes
2,603,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,117 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,426 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,796,347 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,875 ready_for_fw is high
1,055,875 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,457 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Production
85,944 UART: [state] DebugLocked = Yes
86,632 UART: [state] Starting the WD Timer 40000000 cycles
88,137 UART: [kat] SHA2-256
891,687 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,816 UART: [kat] ++
895,968 UART: [kat] sha1
900,104 UART: [kat] SHA2-256
902,044 UART: [kat] SHA2-384
904,783 UART: [kat] SHA2-512-ACC
906,684 UART: [kat] ECC-384
916,105 UART: [kat] HMAC-384Kdf
920,739 UART: [kat] LMS
1,169,051 UART: [kat] --
1,170,190 UART: [cold-reset] ++
1,170,657 UART: [fht] FHT @ 0x50003400
1,173,229 UART: [idev] ++
1,173,397 UART: [idev] CDI.KEYID = 6
1,173,758 UART: [idev] SUBJECT.KEYID = 7
1,174,183 UART: [idev] UDS.KEYID = 0
1,174,529 ready_for_fw is high
1,174,529 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,036 UART: [idev] Erasing UDS.KEYID = 0
1,199,373 UART: [idev] Sha1 KeyId Algorithm
1,208,050 UART: [idev] --
1,209,095 UART: [ldev] ++
1,209,263 UART: [ldev] CDI.KEYID = 6
1,209,627 UART: [ldev] SUBJECT.KEYID = 5
1,210,054 UART: [ldev] AUTHORITY.KEYID = 7
1,210,517 UART: [ldev] FE.KEYID = 1
1,215,747 UART: [ldev] Erasing FE.KEYID = 1
1,242,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,174 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,868 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,738 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,444 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,294 UART: [ldev] --
1,281,672 UART: [fwproc] Wait for Commands...
1,282,423 UART: [fwproc] Recv command 0x46574c44
1,283,156 UART: [fwproc] Recv'd Img size: 114332 bytes
2,605,188 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,367 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,676 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,797,533 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,428 ready_for_fw is high
1,056,428 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,276 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,895 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,357 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,478 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,954 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,509 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,529 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,310 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,642 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,149 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,263 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,846 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,060 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,630 UART: [state] LifecycleState = Unprovisioned
86,285 UART: [state] DebugLocked = No
86,899 UART: [state] WD Timer not started. Device not locked for debugging
88,212 UART: [kat] SHA2-256
891,762 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,733 UART: ROM integrity test failed
896,180 UART: ROM Fatal Error: 0x90080001
897,795 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,801 >>> mbox cmd response: failed
897,801 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,807 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,173 UART: ROM integrity test failed
895,620 UART: ROM Fatal Error: 0x90080001
897,235 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,241 >>> mbox cmd response: failed
897,241 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,247 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
891,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,386 UART: ROM integrity test failed
895,833 UART: ROM Fatal Error: 0x90080001
897,448 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,454 >>> mbox cmd response: failed
897,454 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,460 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
891,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,376 UART: ROM integrity test failed
895,823 UART: ROM Fatal Error: 0x90080001
897,438 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,444 >>> mbox cmd response: failed
897,444 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,450 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,610 UART: [state] LifecycleState = Unprovisioned
85,265 UART: [state] DebugLocked = No
85,789 UART: [state] WD Timer not started. Device not locked for debugging
87,088 UART: [kat] SHA2-256
890,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,609 UART: ROM integrity test failed
895,056 UART: ROM Fatal Error: 0x90080001
896,671 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
896,677 >>> mbox cmd response: failed
896,677 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
896,683 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,566 UART: [kat] SHA2-256
891,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,087 UART: ROM integrity test failed
895,534 UART: ROM Fatal Error: 0x90080001
897,149 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,155 >>> mbox cmd response: failed
897,155 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,161 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
891,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,268 UART: ROM integrity test failed
895,715 UART: ROM Fatal Error: 0x90080001
897,330 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,336 >>> mbox cmd response: failed
897,336 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,342 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,983 UART: [state] LifecycleState = Unprovisioned
85,638 UART: [state] DebugLocked = No
86,322 UART: [state] WD Timer not started. Device not locked for debugging
87,513 UART: [kat] SHA2-256
891,063 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,034 UART: ROM integrity test failed
895,481 UART: ROM Fatal Error: 0x90080001
897,096 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,102 >>> mbox cmd response: failed
897,102 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,108 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
891,044 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,015 UART: ROM integrity test failed
895,462 UART: ROM Fatal Error: 0x90080001
897,077 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,083 >>> mbox cmd response: failed
897,083 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,089 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
891,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,055 UART: ROM integrity test failed
895,502 UART: ROM Fatal Error: 0x90080001
897,117 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,123 >>> mbox cmd response: failed
897,123 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,129 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,037 UART: [state] LifecycleState = Unprovisioned
85,692 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,661 UART: [kat] SHA2-256
891,211 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,182 UART: ROM integrity test failed
895,629 UART: ROM Fatal Error: 0x90080001
897,244 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,250 >>> mbox cmd response: failed
897,250 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,256 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ff571761918c5eb0bdbd059c1958dd86e789d5d0faa336deb1e27dab55f1ad1a51d58876f8b2769ef2651b4ae9bc76fb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,815 UART: [state] LifecycleState = Unprovisioned
86,470 UART: [state] DebugLocked = No
87,100 UART: [state] WD Timer not started. Device not locked for debugging
88,327 UART: [kat] SHA2-256
891,877 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,848 UART: ROM integrity test failed
896,295 UART: ROM Fatal Error: 0x90080001
897,910 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,916 >>> mbox cmd response: failed
897,916 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
897,922 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,154 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,162 >>> mbox cmd response: failed
815,162 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,168 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,793 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,545 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,416 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,424 >>> mbox cmd response: failed
814,424 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,430 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,021 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,649,133 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,109 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,117 >>> mbox cmd response: failed
815,117 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,123 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,902 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,458 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,687 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,695 >>> mbox cmd response: failed
814,695 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,701 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,988 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,506 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,654 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,662 >>> mbox cmd response: failed
814,662 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,668 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,101 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,981 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,236 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,244 >>> mbox cmd response: failed
815,244 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,250 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,349 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,171 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,335 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,343 >>> mbox cmd response: failed
815,343 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,842 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,610 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,393 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,401 >>> mbox cmd response: failed
815,401 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,407 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,080 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,718 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,230 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,238 >>> mbox cmd response: failed
814,238 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,244 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,625 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,471 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,024 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,032 >>> mbox cmd response: failed
815,032 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,038 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,715 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,723 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,613 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,621 >>> mbox cmd response: failed
814,621 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
814,627 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,772 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,982 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,197 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,205 >>> mbox cmd response: failed
815,205 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
815,211 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,820 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,942 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,401 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,099 UART: [kat] SHA2-256
882,030 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,145 UART: [kat] ++
886,297 UART: [kat] sha1
890,573 UART: [kat] SHA2-256
892,511 UART: [kat] SHA2-384
895,254 UART: [kat] SHA2-512-ACC
897,155 UART: [kat] ECC-384
903,048 UART: [kat] HMAC-384Kdf
907,566 UART: [kat] LMS
1,475,762 UART: [kat] --
1,476,611 UART: [cold-reset] ++
1,477,075 UART: [fht] Storing FHT @ 0x50003400
1,479,774 UART: [idev] ++
1,479,942 UART: [idev] CDI.KEYID = 6
1,480,302 UART: [idev] SUBJECT.KEYID = 7
1,480,726 UART: [idev] UDS.KEYID = 0
1,481,071 ready_for_fw is high
1,481,071 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,884 UART: [idev] Erasing UDS.KEYID = 0
1,506,028 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,564 UART: [idev] --
1,515,591 UART: [ldev] ++
1,515,759 UART: [ldev] CDI.KEYID = 6
1,516,122 UART: [ldev] SUBJECT.KEYID = 5
1,516,548 UART: [ldev] AUTHORITY.KEYID = 7
1,517,011 UART: [ldev] FE.KEYID = 1
1,522,299 UART: [ldev] Erasing FE.KEYID = 1
1,547,602 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,928 UART: [ldev] --
1,586,243 UART: [fwproc] Waiting for Commands...
1,587,108 UART: [fwproc] Received command 0x46574c44
1,587,899 UART: [fwproc] Received Image of size 115196 bytes
2,895,817 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,775 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,127 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,170 >>> mbox cmd response: success
3,090,240 UART: [afmc] ++
3,090,408 UART: [afmc] CDI.KEYID = 6
3,090,770 UART: [afmc] SUBJECT.KEYID = 7
3,091,195 UART: [afmc] AUTHORITY.KEYID = 5
3,125,860 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,232 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,012 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,740 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,625 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,315 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,316 UART: [afmc] --
3,169,234 UART: [cold-reset] --
3,169,974 UART: [state] Locking Datavault
3,171,155 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,759 UART: [state] Locking ICCM
3,172,261 UART: [exit] Launching FMC @ 0x40000130
3,177,590 UART:
3,177,606 UART: Running Caliptra FMC ...
3,178,014 UART:
3,178,068 UART: [state] CFI Enabled
3,188,361 UART: [fht] FMC Alias Private Key: 7
3,296,544 UART: [art] Extend RT PCRs Done
3,296,972 UART: [art] Lock RT PCRs Done
3,298,472 UART: [art] Populate DV Done
3,306,603 UART: [fht] FMC Alias Private Key: 7
3,307,739 UART: [art] Derive CDI
3,308,019 UART: [art] Store in in slot 0x4
3,393,820 UART: [art] Derive Key Pair
3,394,180 UART: [art] Store priv key in slot 0x5
3,407,210 UART: [art] Derive Key Pair - Done
3,422,218 UART: [art] Signing Cert with AUTHO
3,422,698 UART: RITY.KEYID = 7
3,437,926 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,691 UART: [art] PUB.X = EF2A681966F5B4B77972EE3580B1F42C8AA8CBBC6600574AA493ACC986712AE9959A17E52CC1DA1F841D93EC6BFBCADA
3,445,459 UART: [art] PUB.Y = 935BD5C86E55557318579A075BEAD76BEC8756B9D22D7EE02E37F58FF5BCC13D86141EED9259A49E93608381CFAA5E24
3,452,414 UART: [art] SIG.R = CEC68C35D20910B41C5B5409993DE2216DE534689DA43675416EC903B406801C530C1B476A2190B35390A8CB533C54E5
3,459,161 UART: [art] SIG.S = C0AC5FE5FB89C10B5AB663231D2060373184A7235D9071E3F5F82D72BBA8280B389C15C115254E0BCC9A9FFC20D1193C
3,483,227 UART: Caliptra RT
3,483,480 UART: [state] CFI Enabled
3,590,884 UART: [rt] RT listening for mailbox commands...
3,591,547 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,324 UART: [rt]cmd =0x46504c54, len=4
3,622,484 >>> mbox cmd response data (8 bytes)
3,622,751 UART: [rt] FIPS self test
3,623,079 UART: [kat] ++
3,623,231 UART: [kat] sha1
3,627,525 UART: [kat] SHA2-256
3,629,547 UART: [kat] SHA2-384
3,632,290 UART: [kat] SHA2-512-ACC
3,634,217 UART: [kat] ECC-384
3,635,872 UART: Fatal Error: 0x90040004
3,637,411 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,637,416 >>> mbox cmd response: failed
3,637,416 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,637,421 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,861 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,587 UART: [kat] SHA2-256
882,518 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,633 UART: [kat] ++
886,785 UART: [kat] sha1
891,267 UART: [kat] SHA2-256
893,205 UART: [kat] SHA2-384
895,830 UART: [kat] SHA2-512-ACC
897,731 UART: [kat] ECC-384
903,602 UART: [kat] HMAC-384Kdf
908,252 UART: [kat] LMS
1,476,448 UART: [kat] --
1,477,123 UART: [cold-reset] ++
1,477,621 UART: [fht] Storing FHT @ 0x50003400
1,480,348 UART: [idev] ++
1,480,516 UART: [idev] CDI.KEYID = 6
1,480,876 UART: [idev] SUBJECT.KEYID = 7
1,481,300 UART: [idev] UDS.KEYID = 0
1,481,645 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,714 UART: [idev] Erasing UDS.KEYID = 0
1,506,256 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,002 UART: [idev] --
1,516,007 UART: [ldev] ++
1,516,175 UART: [ldev] CDI.KEYID = 6
1,516,538 UART: [ldev] SUBJECT.KEYID = 5
1,516,964 UART: [ldev] AUTHORITY.KEYID = 7
1,517,427 UART: [ldev] FE.KEYID = 1
1,522,315 UART: [ldev] Erasing FE.KEYID = 1
1,547,370 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,448 UART: [ldev] --
1,586,785 UART: [fwproc] Waiting for Commands...
1,587,528 UART: [fwproc] Received command 0x46574c44
1,588,319 UART: [fwproc] Received Image of size 115196 bytes
2,897,437 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,417 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,769 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,091,038 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,825 ready_for_fw is high
1,361,825 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,976 >>> mbox cmd response: success
3,000,606 UART:
3,000,622 UART: Running Caliptra FMC ...
3,001,030 UART:
3,001,084 UART: [state] CFI Enabled
3,011,747 UART: [fht] FMC Alias Private Key: 7
3,120,210 UART: [art] Extend RT PCRs Done
3,120,638 UART: [art] Lock RT PCRs Done
3,121,974 UART: [art] Populate DV Done
3,130,185 UART: [fht] FMC Alias Private Key: 7
3,131,335 UART: [art] Derive CDI
3,131,615 UART: [art] Store in in slot 0x4
3,217,544 UART: [art] Derive Key Pair
3,217,904 UART: [art] Store priv key in slot 0x5
3,230,622 UART: [art] Derive Key Pair - Done
3,245,361 UART: [art] Signing Cert with AUTHO
3,245,841 UART: RITY.KEYID = 7
3,260,907 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,672 UART: [art] PUB.X = D6E0F702F3C58A6F7B214212319313A00BD171C4CB9CD11CBF4E8D4F59B4A925539741EEDFDFBBD54FE9AF00DDA57F27
3,268,434 UART: [art] PUB.Y = 2F2085DB74C840032CEFBD7AF5641D916A3ADDD8481DBA00FCBC7FF0D184FC65FA3387A7430162D5BC607BB1F025139A
3,275,372 UART: [art] SIG.R = E84FA8292AE0D4F307426A1C6C45504BB36EE560BA11F8B5AE6CCCC5994ABFF2CB7657F79569FFC2E7B8403F942E5D82
3,282,155 UART: [art] SIG.S = CEB8C0C77B8C8DCAB03212D51175E5B1A0CFBDBC868E0BAD1A4399FA5EC316DD527BAAA34DFC32E4C3917CA168B5F40F
3,305,732 UART: Caliptra RT
3,305,985 UART: [state] CFI Enabled
3,414,879 UART: [rt] RT listening for mailbox commands...
3,415,542 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,259 UART: [rt]cmd =0x46504c54, len=4
3,446,519 >>> mbox cmd response data (8 bytes)
3,446,646 UART: [rt] FIPS self test
3,446,974 UART: [kat] ++
3,447,126 UART: [kat] sha1
3,451,242 UART: [kat] SHA2-256
3,453,264 UART: [kat] SHA2-384
3,456,191 UART: [kat] SHA2-512-ACC
3,458,118 UART: [kat] ECC-384
3,459,787 UART: Fatal Error: 0x90040004
3,461,326 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,461,331 >>> mbox cmd response: failed
3,461,331 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,461,336 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,361 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,036 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,826 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,504 UART: [kat] SHA2-256
882,435 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,550 UART: [kat] ++
886,702 UART: [kat] sha1
890,962 UART: [kat] SHA2-256
892,900 UART: [kat] SHA2-384
895,473 UART: [kat] SHA2-512-ACC
897,374 UART: [kat] ECC-384
903,257 UART: [kat] HMAC-384Kdf
907,863 UART: [kat] LMS
1,476,059 UART: [kat] --
1,477,278 UART: [cold-reset] ++
1,477,660 UART: [fht] Storing FHT @ 0x50003400
1,480,249 UART: [idev] ++
1,480,417 UART: [idev] CDI.KEYID = 6
1,480,777 UART: [idev] SUBJECT.KEYID = 7
1,481,201 UART: [idev] UDS.KEYID = 0
1,481,546 ready_for_fw is high
1,481,546 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,187 UART: [idev] Erasing UDS.KEYID = 0
1,506,041 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,653 UART: [idev] --
1,515,544 UART: [ldev] ++
1,515,712 UART: [ldev] CDI.KEYID = 6
1,516,075 UART: [ldev] SUBJECT.KEYID = 5
1,516,501 UART: [ldev] AUTHORITY.KEYID = 7
1,516,964 UART: [ldev] FE.KEYID = 1
1,522,308 UART: [ldev] Erasing FE.KEYID = 1
1,548,295 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,991 UART: [ldev] --
1,587,352 UART: [fwproc] Waiting for Commands...
1,588,185 UART: [fwproc] Received command 0x46574c44
1,588,976 UART: [fwproc] Received Image of size 115196 bytes
2,896,306 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,004 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,356 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,641 >>> mbox cmd response: success
3,091,847 UART: [afmc] ++
3,092,015 UART: [afmc] CDI.KEYID = 6
3,092,377 UART: [afmc] SUBJECT.KEYID = 7
3,092,802 UART: [afmc] AUTHORITY.KEYID = 5
3,128,103 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,683 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,463 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,191 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,076 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,766 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,731 UART: [afmc] --
3,171,855 UART: [cold-reset] --
3,172,643 UART: [state] Locking Datavault
3,173,982 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,586 UART: [state] Locking ICCM
3,175,256 UART: [exit] Launching FMC @ 0x40000130
3,180,585 UART:
3,180,601 UART: Running Caliptra FMC ...
3,181,009 UART:
3,181,152 UART: [state] CFI Enabled
3,191,777 UART: [fht] FMC Alias Private Key: 7
3,299,544 UART: [art] Extend RT PCRs Done
3,299,972 UART: [art] Lock RT PCRs Done
3,301,306 UART: [art] Populate DV Done
3,309,441 UART: [fht] FMC Alias Private Key: 7
3,310,495 UART: [art] Derive CDI
3,310,775 UART: [art] Store in in slot 0x4
3,396,446 UART: [art] Derive Key Pair
3,396,806 UART: [art] Store priv key in slot 0x5
3,410,314 UART: [art] Derive Key Pair - Done
3,424,991 UART: [art] Signing Cert with AUTHO
3,425,471 UART: RITY.KEYID = 7
3,441,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,818 UART: [art] PUB.X = B5E84B971A5BA39692212043906C7A00E3C16F872A2AFA99AD8538CD67A30F149FCF3EEC9DAE997590A1FDA20894C460
3,448,568 UART: [art] PUB.Y = A1F93EE440B3F36F456C2BF2867930701A0B944BC87424288365A34702276C6023E7FFA9C9B00C0754C750404BDA0892
3,455,495 UART: [art] SIG.R = F158039352A0411BE3CD110B8AC14A124671A882D67A61CE2CA57C24789A9D2DD75189EA241E9F2F94ECE46DF35411B2
3,462,263 UART: [art] SIG.S = 4E487FB8C064AA7D4A58FB054E2B946B18CEADBDC819CAC0C238A01643C0220644632CB1FA67341C22FB5A63C67CB403
3,486,425 UART: Caliptra RT
3,486,770 UART: [state] CFI Enabled
3,594,873 UART: [rt] RT listening for mailbox commands...
3,595,536 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,343 UART: [rt]cmd =0x46504c54, len=4
3,626,661 >>> mbox cmd response data (8 bytes)
3,626,812 UART: [rt] FIPS self test
3,627,140 UART: [kat] ++
3,627,292 UART: [kat] sha1
3,631,690 UART: [kat] SHA2-256
3,633,712 UART: [kat] SHA2-384
3,636,577 UART: [kat] SHA2-512-ACC
3,638,504 UART: [kat] ECC-384
3,640,341 UART: Fatal Error: 0x90040004
3,641,880 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,641,885 >>> mbox cmd response: failed
3,641,885 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,641,890 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,113 UART: [state] LifecycleState = Unprovisioned
85,768 UART: [state] DebugLocked = No
86,406 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,046 UART: [kat] SHA2-256
881,977 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,092 UART: [kat] ++
886,244 UART: [kat] sha1
890,624 UART: [kat] SHA2-256
892,562 UART: [kat] SHA2-384
895,257 UART: [kat] SHA2-512-ACC
897,158 UART: [kat] ECC-384
902,719 UART: [kat] HMAC-384Kdf
907,249 UART: [kat] LMS
1,475,445 UART: [kat] --
1,476,336 UART: [cold-reset] ++
1,476,784 UART: [fht] Storing FHT @ 0x50003400
1,479,565 UART: [idev] ++
1,479,733 UART: [idev] CDI.KEYID = 6
1,480,093 UART: [idev] SUBJECT.KEYID = 7
1,480,517 UART: [idev] UDS.KEYID = 0
1,480,862 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,775 UART: [idev] Erasing UDS.KEYID = 0
1,505,257 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,933 UART: [idev] --
1,514,882 UART: [ldev] ++
1,515,050 UART: [ldev] CDI.KEYID = 6
1,515,413 UART: [ldev] SUBJECT.KEYID = 5
1,515,839 UART: [ldev] AUTHORITY.KEYID = 7
1,516,302 UART: [ldev] FE.KEYID = 1
1,521,712 UART: [ldev] Erasing FE.KEYID = 1
1,547,277 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,581 UART: [ldev] --
1,587,046 UART: [fwproc] Waiting for Commands...
1,587,829 UART: [fwproc] Received command 0x46574c44
1,588,620 UART: [fwproc] Received Image of size 115196 bytes
2,896,610 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,288 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,640 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,849 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,446 ready_for_fw is high
1,363,446 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,941,037 >>> mbox cmd response: success
3,001,593 UART:
3,001,609 UART: Running Caliptra FMC ...
3,002,017 UART:
3,002,160 UART: [state] CFI Enabled
3,012,757 UART: [fht] FMC Alias Private Key: 7
3,120,812 UART: [art] Extend RT PCRs Done
3,121,240 UART: [art] Lock RT PCRs Done
3,122,678 UART: [art] Populate DV Done
3,130,811 UART: [fht] FMC Alias Private Key: 7
3,131,879 UART: [art] Derive CDI
3,132,159 UART: [art] Store in in slot 0x4
3,217,930 UART: [art] Derive Key Pair
3,218,290 UART: [art] Store priv key in slot 0x5
3,231,618 UART: [art] Derive Key Pair - Done
3,246,266 UART: [art] Signing Cert with AUTHO
3,246,746 UART: RITY.KEYID = 7
3,262,318 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,083 UART: [art] PUB.X = 25DA32E3FD8F9EB9E3DE19EC690C89334522389B20062635E57A7CCC27D03970F5B1EA18AF188632EC91C744020867F6
3,269,841 UART: [art] PUB.Y = 37C4BAF00C689783E3A0046FC77CE44A468E59005FD18620371A0AB5E9AE6347F7660D9372E3E9111B14957AFD0A2A2A
3,276,756 UART: [art] SIG.R = 3021A3A46B02FE2F6652BCBB783ACF64D2718C1C33D8371171E442859D682F527E7E45B881F417128EFD07F57F77EBCE
3,283,524 UART: [art] SIG.S = 5C999F2659E9F4EBD2BC4F99BDF83BA3F8BE75289A803086A729F7011F8995678FE96D0B902823E547EE3358521DE15C
3,307,403 UART: Caliptra RT
3,307,748 UART: [state] CFI Enabled
3,415,768 UART: [rt] RT listening for mailbox commands...
3,416,431 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,900 UART: [rt]cmd =0x46504c54, len=4
3,446,898 >>> mbox cmd response data (8 bytes)
3,447,239 UART: [rt] FIPS self test
3,447,567 UART: [kat] ++
3,447,719 UART: [kat] sha1
3,451,773 UART: [kat] SHA2-256
3,453,795 UART: [kat] SHA2-384
3,456,744 UART: [kat] SHA2-512-ACC
3,458,671 UART: [kat] ECC-384
3,460,006 UART: Fatal Error: 0x90040004
3,461,545 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,461,550 >>> mbox cmd response: failed
3,461,550 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,461,555 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,312 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,519 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,784 UART: [kat] SHA2-256
893,434 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,559 UART: [kat] ++
897,711 UART: [kat] sha1
902,015 UART: [kat] SHA2-256
903,955 UART: [kat] SHA2-384
906,914 UART: [kat] SHA2-512-ACC
908,815 UART: [kat] ECC-384
918,310 UART: [kat] HMAC-384Kdf
923,056 UART: [kat] LMS
1,171,384 UART: [kat] --
1,172,289 UART: [cold-reset] ++
1,172,709 UART: [fht] FHT @ 0x50003400
1,175,306 UART: [idev] ++
1,175,474 UART: [idev] CDI.KEYID = 6
1,175,834 UART: [idev] SUBJECT.KEYID = 7
1,176,258 UART: [idev] UDS.KEYID = 0
1,176,603 ready_for_fw is high
1,176,603 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,008 UART: [idev] Erasing UDS.KEYID = 0
1,200,793 UART: [idev] Sha1 KeyId Algorithm
1,209,277 UART: [idev] --
1,210,235 UART: [ldev] ++
1,210,403 UART: [ldev] CDI.KEYID = 6
1,210,766 UART: [ldev] SUBJECT.KEYID = 5
1,211,192 UART: [ldev] AUTHORITY.KEYID = 7
1,211,655 UART: [ldev] FE.KEYID = 1
1,216,693 UART: [ldev] Erasing FE.KEYID = 1
1,242,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,379 UART: [ldev] --
1,281,748 UART: [fwproc] Wait for Commands...
1,282,394 UART: [fwproc] Recv command 0x46574c44
1,283,122 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,038 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,342 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,351 >>> mbox cmd response: success
2,787,499 UART: [afmc] ++
2,787,667 UART: [afmc] CDI.KEYID = 6
2,788,029 UART: [afmc] SUBJECT.KEYID = 7
2,788,454 UART: [afmc] AUTHORITY.KEYID = 5
2,824,059 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,954 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,702 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,430 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,315 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,034 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,846 UART: [afmc] --
2,867,732 UART: [cold-reset] --
2,868,632 UART: [state] Locking Datavault
2,870,169 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,773 UART: [state] Locking ICCM
2,871,257 UART: [exit] Launching FMC @ 0x40000130
2,876,586 UART:
2,876,602 UART: Running Caliptra FMC ...
2,877,010 UART:
2,877,064 UART: [state] CFI Enabled
2,887,681 UART: [fht] FMC Alias Private Key: 7
2,996,026 UART: [art] Extend RT PCRs Done
2,996,454 UART: [art] Lock RT PCRs Done
2,998,006 UART: [art] Populate DV Done
3,006,223 UART: [fht] FMC Alias Private Key: 7
3,007,247 UART: [art] Derive CDI
3,007,527 UART: [art] Store in in slot 0x4
3,093,022 UART: [art] Derive Key Pair
3,093,382 UART: [art] Store priv key in slot 0x5
3,106,792 UART: [art] Derive Key Pair - Done
3,121,237 UART: [art] Signing Cert with AUTHO
3,121,717 UART: RITY.KEYID = 7
3,136,849 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,614 UART: [art] PUB.X = C845ADCF66A265FEA0EE13193665682F40AA702943413FF4D610E3DC7E43F9321894D3E7E9D75906B13333BDBEA805A1
3,144,382 UART: [art] PUB.Y = F47942CEB6D693DB972151C52DEAEA51FA53B48AFF7F0AAC6A15EE523DEF72C5ADBDEAA3FAEFD1D88C7AF7C5B161C007
3,151,362 UART: [art] SIG.R = 0D19F70AA4CDBD7160706987A55DF5C7A7227D8543F7F614182988CBBC68BF042B6E5FFED915799F5E8120D3CA107A0E
3,158,128 UART: [art] SIG.S = 438A5B43B17D44ACC22BF1E84ED69472C71FA0ABA7DC9085C7B02B157498E0CB645FC28320788B4EA2FC5CA16467478F
3,181,639 UART: Caliptra RT
3,181,892 UART: [state] CFI Enabled
3,289,253 UART: [rt] RT listening for mailbox commands...
3,289,916 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,915 UART: [rt]cmd =0x46504c54, len=4
3,321,213 >>> mbox cmd response data (8 bytes)
3,321,496 UART: [rt] FIPS self test
3,321,824 UART: [kat] ++
3,321,976 UART: [kat] sha1
3,326,318 UART: [kat] SHA2-256
3,328,340 UART: [kat] SHA2-384
3,331,357 UART: [kat] SHA2-512-ACC
3,333,284 UART: [kat] ECC-384
3,334,603 UART: Fatal Error: 0x90040004
3,336,142 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,336,147 >>> mbox cmd response: failed
3,336,147 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,336,152 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
893,384 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,509 UART: [kat] ++
897,661 UART: [kat] sha1
902,033 UART: [kat] SHA2-256
903,973 UART: [kat] SHA2-384
906,646 UART: [kat] SHA2-512-ACC
908,547 UART: [kat] ECC-384
918,234 UART: [kat] HMAC-384Kdf
922,868 UART: [kat] LMS
1,171,196 UART: [kat] --
1,171,925 UART: [cold-reset] ++
1,172,281 UART: [fht] FHT @ 0x50003400
1,174,950 UART: [idev] ++
1,175,118 UART: [idev] CDI.KEYID = 6
1,175,478 UART: [idev] SUBJECT.KEYID = 7
1,175,902 UART: [idev] UDS.KEYID = 0
1,176,247 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,798 UART: [idev] Erasing UDS.KEYID = 0
1,200,649 UART: [idev] Sha1 KeyId Algorithm
1,209,143 UART: [idev] --
1,210,183 UART: [ldev] ++
1,210,351 UART: [ldev] CDI.KEYID = 6
1,210,714 UART: [ldev] SUBJECT.KEYID = 5
1,211,140 UART: [ldev] AUTHORITY.KEYID = 7
1,211,603 UART: [ldev] FE.KEYID = 1
1,216,561 UART: [ldev] Erasing FE.KEYID = 1
1,242,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,219 UART: [ldev] --
1,281,672 UART: [fwproc] Wait for Commands...
1,282,296 UART: [fwproc] Recv command 0x46574c44
1,283,024 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,270 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,574 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,745 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,571 ready_for_fw is high
1,060,571 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,913 >>> mbox cmd response: success
2,700,633 UART:
2,700,649 UART: Running Caliptra FMC ...
2,701,057 UART:
2,701,111 UART: [state] CFI Enabled
2,711,618 UART: [fht] FMC Alias Private Key: 7
2,820,037 UART: [art] Extend RT PCRs Done
2,820,465 UART: [art] Lock RT PCRs Done
2,821,953 UART: [art] Populate DV Done
2,830,142 UART: [fht] FMC Alias Private Key: 7
2,831,240 UART: [art] Derive CDI
2,831,520 UART: [art] Store in in slot 0x4
2,916,873 UART: [art] Derive Key Pair
2,917,233 UART: [art] Store priv key in slot 0x5
2,931,041 UART: [art] Derive Key Pair - Done
2,945,710 UART: [art] Signing Cert with AUTHO
2,946,190 UART: RITY.KEYID = 7
2,961,512 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,277 UART: [art] PUB.X = F857E477EDA1137DB884EA9BFA586233F8C72B94833A999F8D8ADBC833E3648977BB1F2B638E7C3309B5C75E716C8243
2,969,048 UART: [art] PUB.Y = 6DA417D4673115CBC311B9DA44E81386456A8FCAA38738B71B4628372B3B091084EAFB5F2BEF10804569C87141B346C1
2,975,993 UART: [art] SIG.R = 717518ECBDB61276CD6AF9F72B8759453994D22BB3C4FFB8CC6A3385AFEE17BA071D15E43F8D52DE61EB50093FFF6E50
2,982,773 UART: [art] SIG.S = D4AF2193DA7E7CCEEF13930E375009352CCC2615D6947652746CFC2A65EA585DF670E73398DEB662A874DC3C250FB29C
3,006,597 UART: Caliptra RT
3,006,850 UART: [state] CFI Enabled
3,114,805 UART: [rt] RT listening for mailbox commands...
3,115,468 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,465 UART: [rt]cmd =0x46504c54, len=4
3,146,529 >>> mbox cmd response data (8 bytes)
3,146,644 UART: [rt] FIPS self test
3,146,972 UART: [kat] ++
3,147,124 UART: [kat] sha1
3,151,426 UART: [kat] SHA2-256
3,153,448 UART: [kat] SHA2-384
3,156,377 UART: [kat] SHA2-512-ACC
3,158,304 UART: [kat] ECC-384
3,159,779 UART: Fatal Error: 0x90040004
3,161,318 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,161,323 >>> mbox cmd response: failed
3,161,323 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,161,328 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,227 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,677 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,707 UART: [state] LifecycleState = Unprovisioned
85,362 UART: [state] DebugLocked = No
86,046 UART: [state] WD Timer not started. Device not locked for debugging
87,377 UART: [kat] SHA2-256
893,027 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,152 UART: [kat] ++
897,304 UART: [kat] sha1
901,504 UART: [kat] SHA2-256
903,444 UART: [kat] SHA2-384
906,073 UART: [kat] SHA2-512-ACC
907,974 UART: [kat] ECC-384
917,831 UART: [kat] HMAC-384Kdf
922,619 UART: [kat] LMS
1,170,947 UART: [kat] --
1,172,000 UART: [cold-reset] ++
1,172,348 UART: [fht] FHT @ 0x50003400
1,175,145 UART: [idev] ++
1,175,313 UART: [idev] CDI.KEYID = 6
1,175,673 UART: [idev] SUBJECT.KEYID = 7
1,176,097 UART: [idev] UDS.KEYID = 0
1,176,442 ready_for_fw is high
1,176,442 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,343 UART: [idev] Erasing UDS.KEYID = 0
1,201,540 UART: [idev] Sha1 KeyId Algorithm
1,210,050 UART: [idev] --
1,210,906 UART: [ldev] ++
1,211,074 UART: [ldev] CDI.KEYID = 6
1,211,437 UART: [ldev] SUBJECT.KEYID = 5
1,211,863 UART: [ldev] AUTHORITY.KEYID = 7
1,212,326 UART: [ldev] FE.KEYID = 1
1,217,692 UART: [ldev] Erasing FE.KEYID = 1
1,244,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,520 UART: [ldev] --
1,282,809 UART: [fwproc] Wait for Commands...
1,283,613 UART: [fwproc] Recv command 0x46574c44
1,284,341 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,153 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,457 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,518 >>> mbox cmd response: success
2,787,704 UART: [afmc] ++
2,787,872 UART: [afmc] CDI.KEYID = 6
2,788,234 UART: [afmc] SUBJECT.KEYID = 7
2,788,659 UART: [afmc] AUTHORITY.KEYID = 5
2,824,808 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,053 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,801 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,529 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,414 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,133 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,021 UART: [afmc] --
2,868,035 UART: [cold-reset] --
2,868,963 UART: [state] Locking Datavault
2,869,814 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,418 UART: [state] Locking ICCM
2,870,980 UART: [exit] Launching FMC @ 0x40000130
2,876,309 UART:
2,876,325 UART: Running Caliptra FMC ...
2,876,733 UART:
2,876,876 UART: [state] CFI Enabled
2,887,621 UART: [fht] FMC Alias Private Key: 7
2,996,640 UART: [art] Extend RT PCRs Done
2,997,068 UART: [art] Lock RT PCRs Done
2,998,660 UART: [art] Populate DV Done
3,007,057 UART: [fht] FMC Alias Private Key: 7
3,008,111 UART: [art] Derive CDI
3,008,391 UART: [art] Store in in slot 0x4
3,094,136 UART: [art] Derive Key Pair
3,094,496 UART: [art] Store priv key in slot 0x5
3,107,982 UART: [art] Derive Key Pair - Done
3,122,507 UART: [art] Signing Cert with AUTHO
3,122,987 UART: RITY.KEYID = 7
3,138,215 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,980 UART: [art] PUB.X = F43AF471145CEC6F004A5307383859DE49D61EF488C008FC9E68F1CD5475B625944C9D58B553A0224BB51A319496E27E
3,145,720 UART: [art] PUB.Y = 080599842731D14EDC61942544D17274B1ECA34D213AD8008F2EE3BC561F0937BB8E9D4B13B4135723A2A354EA96DF15
3,152,637 UART: [art] SIG.R = BACB7776136739DCDE1AF677DB0FBFB4166A6F45111EA9101B1CEEEA92AFDBBE1B2C3E6483A25F41BD3BA0FA6253E3A3
3,159,432 UART: [art] SIG.S = 95DA1138D8608933B35774125FDD098811BC29146099393266309596172C6F9E681307EC227EBDC06C5390BC04F17B03
3,183,041 UART: Caliptra RT
3,183,386 UART: [state] CFI Enabled
3,292,122 UART: [rt] RT listening for mailbox commands...
3,292,785 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,760 UART: [rt]cmd =0x46504c54, len=4
3,324,064 >>> mbox cmd response data (8 bytes)
3,324,225 UART: [rt] FIPS self test
3,324,553 UART: [kat] ++
3,324,705 UART: [kat] sha1
3,328,887 UART: [kat] SHA2-256
3,330,909 UART: [kat] SHA2-384
3,333,966 UART: [kat] SHA2-512-ACC
3,335,893 UART: [kat] ECC-384
3,337,500 UART: Fatal Error: 0x90040004
3,339,039 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,339,044 >>> mbox cmd response: failed
3,339,044 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,339,049 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,791 UART: [state] LifecycleState = Unprovisioned
86,446 UART: [state] DebugLocked = No
87,026 UART: [state] WD Timer not started. Device not locked for debugging
88,215 UART: [kat] SHA2-256
893,865 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,990 UART: [kat] ++
898,142 UART: [kat] sha1
902,446 UART: [kat] SHA2-256
904,386 UART: [kat] SHA2-384
907,073 UART: [kat] SHA2-512-ACC
908,974 UART: [kat] ECC-384
918,599 UART: [kat] HMAC-384Kdf
923,407 UART: [kat] LMS
1,171,735 UART: [kat] --
1,172,750 UART: [cold-reset] ++
1,173,270 UART: [fht] FHT @ 0x50003400
1,176,077 UART: [idev] ++
1,176,245 UART: [idev] CDI.KEYID = 6
1,176,605 UART: [idev] SUBJECT.KEYID = 7
1,177,029 UART: [idev] UDS.KEYID = 0
1,177,374 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,185,291 UART: [idev] Erasing UDS.KEYID = 0
1,202,482 UART: [idev] Sha1 KeyId Algorithm
1,211,036 UART: [idev] --
1,212,078 UART: [ldev] ++
1,212,246 UART: [ldev] CDI.KEYID = 6
1,212,609 UART: [ldev] SUBJECT.KEYID = 5
1,213,035 UART: [ldev] AUTHORITY.KEYID = 7
1,213,498 UART: [ldev] FE.KEYID = 1
1,218,764 UART: [ldev] Erasing FE.KEYID = 1
1,245,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,794 UART: [ldev] --
1,284,149 UART: [fwproc] Wait for Commands...
1,284,857 UART: [fwproc] Recv command 0x46574c44
1,285,585 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,430 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,413 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,717 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,902 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,544 ready_for_fw is high
1,060,544 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,252 >>> mbox cmd response: success
2,702,078 UART:
2,702,094 UART: Running Caliptra FMC ...
2,702,502 UART:
2,702,645 UART: [state] CFI Enabled
2,713,358 UART: [fht] FMC Alias Private Key: 7
2,820,871 UART: [art] Extend RT PCRs Done
2,821,299 UART: [art] Lock RT PCRs Done
2,822,795 UART: [art] Populate DV Done
2,830,978 UART: [fht] FMC Alias Private Key: 7
2,832,152 UART: [art] Derive CDI
2,832,432 UART: [art] Store in in slot 0x4
2,918,247 UART: [art] Derive Key Pair
2,918,607 UART: [art] Store priv key in slot 0x5
2,931,885 UART: [art] Derive Key Pair - Done
2,946,425 UART: [art] Signing Cert with AUTHO
2,946,905 UART: RITY.KEYID = 7
2,962,297 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,062 UART: [art] PUB.X = 5EBEBC00AC453BD1C95A3327DA2AD265360A737CEE425E2948AEDC58DEDF7B86D9EC2CD979F1E85F4A4A69E090862038
2,969,825 UART: [art] PUB.Y = 113E2903D613AC5127631890B1BA0143E5B92E4D1D3B7406DC8A60EFE00C30FCE4DA907CBEA0D3F3F86FB9478B269C1A
2,976,775 UART: [art] SIG.R = CF4409D3DD3DD719F664598992857F5244086AF5758AE397CDD67288C60E3AB2B4DDCB233C12F5C618EC7627E016E140
2,983,538 UART: [art] SIG.S = 6443DDBBA3196D5DEE76D638221A6E06E9F16FC27CBD0AC96C5B0BD9473C369151BD27092DCF00B42E2F00305BD5FEBA
3,008,605 UART: Caliptra RT
3,008,950 UART: [state] CFI Enabled
3,116,439 UART: [rt] RT listening for mailbox commands...
3,117,102 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,057 UART: [rt]cmd =0x46504c54, len=4
3,148,257 >>> mbox cmd response data (8 bytes)
3,148,442 UART: [rt] FIPS self test
3,148,770 UART: [kat] ++
3,148,922 UART: [kat] sha1
3,153,312 UART: [kat] SHA2-256
3,155,334 UART: [kat] SHA2-384
3,158,121 UART: [kat] SHA2-512-ACC
3,160,048 UART: [kat] ECC-384
3,161,591 UART: Fatal Error: 0x90040004
3,163,130 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,163,135 >>> mbox cmd response: failed
3,163,135 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,163,140 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,868 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,574 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,562 UART: [state] LifecycleState = Unprovisioned
86,217 UART: [state] DebugLocked = No
86,885 UART: [state] WD Timer not started. Device not locked for debugging
88,060 UART: [kat] SHA2-256
891,610 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,739 UART: [kat] ++
895,891 UART: [kat] sha1
900,109 UART: [kat] SHA2-256
902,049 UART: [kat] SHA2-384
904,826 UART: [kat] SHA2-512-ACC
906,727 UART: [kat] ECC-384
916,368 UART: [kat] HMAC-384Kdf
920,856 UART: [kat] LMS
1,169,168 UART: [kat] --
1,170,063 UART: [cold-reset] ++
1,170,547 UART: [fht] FHT @ 0x50003400
1,173,213 UART: [idev] ++
1,173,381 UART: [idev] CDI.KEYID = 6
1,173,742 UART: [idev] SUBJECT.KEYID = 7
1,174,167 UART: [idev] UDS.KEYID = 0
1,174,513 ready_for_fw is high
1,174,513 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,885 UART: [idev] Erasing UDS.KEYID = 0
1,198,751 UART: [idev] Sha1 KeyId Algorithm
1,207,535 UART: [idev] --
1,208,376 UART: [ldev] ++
1,208,544 UART: [ldev] CDI.KEYID = 6
1,208,908 UART: [ldev] SUBJECT.KEYID = 5
1,209,335 UART: [ldev] AUTHORITY.KEYID = 7
1,209,798 UART: [ldev] FE.KEYID = 1
1,214,852 UART: [ldev] Erasing FE.KEYID = 1
1,241,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,206 UART: [ldev] --
1,280,616 UART: [fwproc] Wait for Commands...
1,281,383 UART: [fwproc] Recv command 0x46574c44
1,282,116 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,380 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,689 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,877 >>> mbox cmd response: success
2,786,084 UART: [afmc] ++
2,786,252 UART: [afmc] CDI.KEYID = 6
2,786,615 UART: [afmc] SUBJECT.KEYID = 7
2,787,041 UART: [afmc] AUTHORITY.KEYID = 5
2,822,832 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,352 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,103 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,832 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,715 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,434 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,495 UART: [afmc] --
2,866,599 UART: [cold-reset] --
2,867,641 UART: [state] Locking Datavault
2,868,812 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,416 UART: [state] Locking ICCM
2,870,002 UART: [exit] Launching FMC @ 0x40000130
2,875,331 UART:
2,875,347 UART: Running Caliptra FMC ...
2,875,755 UART:
2,875,809 UART: [state] CFI Enabled
2,886,330 UART: [fht] FMC Alias Private Key: 7
2,994,329 UART: [art] Extend RT PCRs Done
2,994,757 UART: [art] Lock RT PCRs Done
2,996,625 UART: [art] Populate DV Done
3,005,098 UART: [fht] FMC Alias Private Key: 7
3,006,270 UART: [art] Derive CDI
3,006,550 UART: [art] Store in in slot 0x4
3,092,191 UART: [art] Derive Key Pair
3,092,551 UART: [art] Store priv key in slot 0x5
3,105,243 UART: [art] Derive Key Pair - Done
3,119,916 UART: [art] Signing Cert with AUTHO
3,120,396 UART: RITY.KEYID = 7
3,135,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,311 UART: [art] PUB.X = FF9657BE7EA990A70F260105C2F739438D6F05A803D5A046672BE20AC1704B87C435D795741450BD9F11DCF4B74FBAA9
3,143,067 UART: [art] PUB.Y = E5BFABC197F345533C29DC9B2C6ABD441FC7E456FD43E807A90E41CA27FE488E7647F8E5DABEA85B935A627B7935C94A
3,150,029 UART: [art] SIG.R = A686E22FD9B3BF7C3AA7D5C0BE357BE0D801E41505626718719C10F9B28937188F1C47B05466231AB05EDD2EBF9A0E81
3,156,796 UART: [art] SIG.S = 5EE25DB1B5E0A0CFD0FAB74F83A33217768FD4A796C2A5249A237CC7012880CFDFEA74E427FE520A24FA9D1DF2295AC8
3,180,349 UART: Caliptra RT
3,180,602 UART: [state] CFI Enabled
3,288,359 UART: [rt] RT listening for mailbox commands...
3,289,022 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,881 UART: [rt]cmd =0x46504c54, len=4
3,319,957 >>> mbox cmd response data (8 bytes)
3,320,128 UART: [rt] FIPS self test
3,320,456 UART: [kat] ++
3,320,608 UART: [kat] sha1
3,324,878 UART: [kat] SHA2-256
3,326,900 UART: [kat] SHA2-384
3,329,925 UART: [kat] SHA2-512-ACC
3,331,852 UART: [kat] ECC-384
3,333,295 UART: Fatal Error: 0x90040004
3,334,834 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,334,839 >>> mbox cmd response: failed
3,334,839 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,334,844 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,522 UART: [state] LifecycleState = Unprovisioned
86,177 UART: [state] DebugLocked = No
86,815 UART: [state] WD Timer not started. Device not locked for debugging
88,068 UART: [kat] SHA2-256
891,618 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,747 UART: [kat] ++
895,899 UART: [kat] sha1
900,073 UART: [kat] SHA2-256
902,013 UART: [kat] SHA2-384
904,792 UART: [kat] SHA2-512-ACC
906,693 UART: [kat] ECC-384
916,110 UART: [kat] HMAC-384Kdf
920,726 UART: [kat] LMS
1,169,038 UART: [kat] --
1,169,971 UART: [cold-reset] ++
1,170,401 UART: [fht] FHT @ 0x50003400
1,173,089 UART: [idev] ++
1,173,257 UART: [idev] CDI.KEYID = 6
1,173,618 UART: [idev] SUBJECT.KEYID = 7
1,174,043 UART: [idev] UDS.KEYID = 0
1,174,389 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,183 UART: [idev] Erasing UDS.KEYID = 0
1,199,237 UART: [idev] Sha1 KeyId Algorithm
1,208,005 UART: [idev] --
1,208,826 UART: [ldev] ++
1,208,994 UART: [ldev] CDI.KEYID = 6
1,209,358 UART: [ldev] SUBJECT.KEYID = 5
1,209,785 UART: [ldev] AUTHORITY.KEYID = 7
1,210,248 UART: [ldev] FE.KEYID = 1
1,215,282 UART: [ldev] Erasing FE.KEYID = 1
1,241,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,222 UART: [ldev] --
1,280,532 UART: [fwproc] Wait for Commands...
1,281,195 UART: [fwproc] Recv command 0x46574c44
1,281,928 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,240 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,549 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,709 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,902 ready_for_fw is high
1,055,902 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,631,653 >>> mbox cmd response: success
2,693,055 UART:
2,693,071 UART: Running Caliptra FMC ...
2,693,479 UART:
2,693,533 UART: [state] CFI Enabled
2,704,252 UART: [fht] FMC Alias Private Key: 7
2,812,889 UART: [art] Extend RT PCRs Done
2,813,317 UART: [art] Lock RT PCRs Done
2,814,775 UART: [art] Populate DV Done
2,822,798 UART: [fht] FMC Alias Private Key: 7
2,823,952 UART: [art] Derive CDI
2,824,232 UART: [art] Store in in slot 0x4
2,910,065 UART: [art] Derive Key Pair
2,910,425 UART: [art] Store priv key in slot 0x5
2,923,609 UART: [art] Derive Key Pair - Done
2,938,493 UART: [art] Signing Cert with AUTHO
2,938,973 UART: RITY.KEYID = 7
2,953,911 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,676 UART: [art] PUB.X = 668D2F4DA1B61D3D3950DB95CC4F87F786C2567EDC06D979E3472975E5CCD4D936192ABB25FA47C20B44FCC453B12B3E
2,961,452 UART: [art] PUB.Y = 186E2A1B450B3620B60874E2B02C5F1C7C20A237777DA8279BD0ADA673141B9E9FEE0B8E1BC4E78A81001B0136C7B495
2,968,372 UART: [art] SIG.R = E12A1FF6D412FE86EAB7FC4546C465C0437AE0D58DD4D09BBCAA329B247D151444585B6A3B267FC261A40C99765EA61A
2,975,151 UART: [art] SIG.S = 05EA39D81CA5380AEB4C33810C412D71A560973F6E51625C527427A413AD84B178B679CDDD168C68B7057AE3A39A4B77
2,998,910 UART: Caliptra RT
2,999,163 UART: [state] CFI Enabled
3,107,008 UART: [rt] RT listening for mailbox commands...
3,107,671 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,510 UART: [rt]cmd =0x46504c54, len=4
3,138,524 >>> mbox cmd response data (8 bytes)
3,138,817 UART: [rt] FIPS self test
3,139,145 UART: [kat] ++
3,139,297 UART: [kat] sha1
3,143,583 UART: [kat] SHA2-256
3,145,605 UART: [kat] SHA2-384
3,148,490 UART: [kat] SHA2-512-ACC
3,150,417 UART: [kat] ECC-384
3,151,906 UART: Fatal Error: 0x90040004
3,153,445 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,153,450 >>> mbox cmd response: failed
3,153,450 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,153,455 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,308 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,101 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
891,569 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,698 UART: [kat] ++
895,850 UART: [kat] sha1
900,088 UART: [kat] SHA2-256
902,028 UART: [kat] SHA2-384
904,641 UART: [kat] SHA2-512-ACC
906,542 UART: [kat] ECC-384
916,251 UART: [kat] HMAC-384Kdf
920,669 UART: [kat] LMS
1,168,981 UART: [kat] --
1,170,082 UART: [cold-reset] ++
1,170,554 UART: [fht] FHT @ 0x50003400
1,173,160 UART: [idev] ++
1,173,328 UART: [idev] CDI.KEYID = 6
1,173,689 UART: [idev] SUBJECT.KEYID = 7
1,174,114 UART: [idev] UDS.KEYID = 0
1,174,460 ready_for_fw is high
1,174,460 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,048 UART: [idev] Erasing UDS.KEYID = 0
1,199,474 UART: [idev] Sha1 KeyId Algorithm
1,208,346 UART: [idev] --
1,209,347 UART: [ldev] ++
1,209,515 UART: [ldev] CDI.KEYID = 6
1,209,879 UART: [ldev] SUBJECT.KEYID = 5
1,210,306 UART: [ldev] AUTHORITY.KEYID = 7
1,210,769 UART: [ldev] FE.KEYID = 1
1,215,833 UART: [ldev] Erasing FE.KEYID = 1
1,242,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,587 UART: [ldev] --
1,281,907 UART: [fwproc] Wait for Commands...
1,282,668 UART: [fwproc] Recv command 0x46574c44
1,283,401 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,269 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,216 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,362 >>> mbox cmd response: success
2,786,499 UART: [afmc] ++
2,786,667 UART: [afmc] CDI.KEYID = 6
2,787,030 UART: [afmc] SUBJECT.KEYID = 7
2,787,456 UART: [afmc] AUTHORITY.KEYID = 5
2,822,549 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,807 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,558 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,287 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,170 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,889 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,734 UART: [afmc] --
2,865,760 UART: [cold-reset] --
2,866,566 UART: [state] Locking Datavault
2,867,665 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,269 UART: [state] Locking ICCM
2,868,853 UART: [exit] Launching FMC @ 0x40000130
2,874,182 UART:
2,874,198 UART: Running Caliptra FMC ...
2,874,606 UART:
2,874,749 UART: [state] CFI Enabled
2,885,668 UART: [fht] FMC Alias Private Key: 7
2,994,001 UART: [art] Extend RT PCRs Done
2,994,429 UART: [art] Lock RT PCRs Done
2,995,859 UART: [art] Populate DV Done
3,004,284 UART: [fht] FMC Alias Private Key: 7
3,005,298 UART: [art] Derive CDI
3,005,578 UART: [art] Store in in slot 0x4
3,091,119 UART: [art] Derive Key Pair
3,091,479 UART: [art] Store priv key in slot 0x5
3,104,445 UART: [art] Derive Key Pair - Done
3,119,202 UART: [art] Signing Cert with AUTHO
3,119,682 UART: RITY.KEYID = 7
3,134,698 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,463 UART: [art] PUB.X = 2ECA504D741D7CDE1569BBC5166FCFD0558A762023EC449E7F8FB4C07006CBEDF1AE35E7DB04EE2B50BD5F673B23C3CF
3,142,251 UART: [art] PUB.Y = F217343B397C0E7F56D9DDAC8C95FF3AEAA1F7451030F53628D7F27C7DC954469E935C08727FD8355E1DC14D74AA55FC
3,149,205 UART: [art] SIG.R = 8393A3D0CB59155832346B98BC3492CC1D4F912523D8A530036D155BA212FE699E268B6D3E8BB70C2EB8FC8679DBE3C3
3,155,973 UART: [art] SIG.S = CDE8B8BEAA5C4AB5575198D9486D4E06696CFF2889FE4E9A219A97372EF30F835BE3318BA2854794E001A3DAA5773A0E
3,179,716 UART: Caliptra RT
3,180,061 UART: [state] CFI Enabled
3,288,349 UART: [rt] RT listening for mailbox commands...
3,289,012 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,895 UART: [rt]cmd =0x46504c54, len=4
3,319,827 >>> mbox cmd response data (8 bytes)
3,320,034 UART: [rt] FIPS self test
3,320,362 UART: [kat] ++
3,320,514 UART: [kat] sha1
3,324,700 UART: [kat] SHA2-256
3,326,722 UART: [kat] SHA2-384
3,329,613 UART: [kat] SHA2-512-ACC
3,331,540 UART: [kat] ECC-384
3,332,939 UART: Fatal Error: 0x90040004
3,334,478 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,334,483 >>> mbox cmd response: failed
3,334,483 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,334,488 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,861 UART: [state] LifecycleState = Unprovisioned
85,516 UART: [state] DebugLocked = No
86,184 UART: [state] WD Timer not started. Device not locked for debugging
87,315 UART: [kat] SHA2-256
890,865 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,994 UART: [kat] ++
895,146 UART: [kat] sha1
899,502 UART: [kat] SHA2-256
901,442 UART: [kat] SHA2-384
904,075 UART: [kat] SHA2-512-ACC
905,976 UART: [kat] ECC-384
916,293 UART: [kat] HMAC-384Kdf
920,849 UART: [kat] LMS
1,169,161 UART: [kat] --
1,170,232 UART: [cold-reset] ++
1,170,638 UART: [fht] FHT @ 0x50003400
1,173,206 UART: [idev] ++
1,173,374 UART: [idev] CDI.KEYID = 6
1,173,735 UART: [idev] SUBJECT.KEYID = 7
1,174,160 UART: [idev] UDS.KEYID = 0
1,174,506 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,296 UART: [idev] Erasing UDS.KEYID = 0
1,199,672 UART: [idev] Sha1 KeyId Algorithm
1,208,686 UART: [idev] --
1,209,771 UART: [ldev] ++
1,209,939 UART: [ldev] CDI.KEYID = 6
1,210,303 UART: [ldev] SUBJECT.KEYID = 5
1,210,730 UART: [ldev] AUTHORITY.KEYID = 7
1,211,193 UART: [ldev] FE.KEYID = 1
1,216,763 UART: [ldev] Erasing FE.KEYID = 1
1,243,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,009 UART: [ldev] --
1,282,469 UART: [fwproc] Wait for Commands...
1,283,260 UART: [fwproc] Recv command 0x46574c44
1,283,993 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,295 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,604 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,654 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,723 ready_for_fw is high
1,056,723 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,770 >>> mbox cmd response: success
2,696,792 UART:
2,696,808 UART: Running Caliptra FMC ...
2,697,216 UART:
2,697,359 UART: [state] CFI Enabled
2,707,894 UART: [fht] FMC Alias Private Key: 7
2,816,127 UART: [art] Extend RT PCRs Done
2,816,555 UART: [art] Lock RT PCRs Done
2,818,219 UART: [art] Populate DV Done
2,826,518 UART: [fht] FMC Alias Private Key: 7
2,827,644 UART: [art] Derive CDI
2,827,924 UART: [art] Store in in slot 0x4
2,913,283 UART: [art] Derive Key Pair
2,913,643 UART: [art] Store priv key in slot 0x5
2,926,975 UART: [art] Derive Key Pair - Done
2,941,743 UART: [art] Signing Cert with AUTHO
2,942,223 UART: RITY.KEYID = 7
2,956,961 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,726 UART: [art] PUB.X = FCDF873B84ACC82D87E1AD83976114BF983E7F789BDCB545DA29DAF0F0C43DFE04548789DDCAF81AE97583E57B14CD15
2,964,513 UART: [art] PUB.Y = 2094379E5169E5C2A8887F2AE14998BA6575087CDDB37C373CC7E2E3724A49CF3076DA88CAF14DB1B09C66CEFBAE5A99
2,971,472 UART: [art] SIG.R = 84CFBEDF62BF17728A8E6ED1C304C9E7988CE521FBED0E5DA2B79280497166BE6F718F27634049B428B063E5545F29D7
2,978,242 UART: [art] SIG.S = C80CC78386AE661BEE94A4C730C213E8E0A2ADDF5C43D27BA2DBBDC48C11EC78989B50D14C6FCB75A29CA9DC77A7BDC8
3,002,242 UART: Caliptra RT
3,002,587 UART: [state] CFI Enabled
3,110,535 UART: [rt] RT listening for mailbox commands...
3,111,198 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,049 UART: [rt]cmd =0x46504c54, len=4
3,142,149 >>> mbox cmd response data (8 bytes)
3,142,448 UART: [rt] FIPS self test
3,142,776 UART: [kat] ++
3,142,928 UART: [kat] sha1
3,147,340 UART: [kat] SHA2-256
3,149,362 UART: [kat] SHA2-384
3,152,215 UART: [kat] SHA2-512-ACC
3,154,142 UART: [kat] ECC-384
3,155,511 UART: Fatal Error: 0x90040004
3,157,050 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,157,055 >>> mbox cmd response: failed
3,157,055 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,157,060 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,591 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,902 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,316 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,324 >>> mbox cmd response: failed
822,324 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,330 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,361 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,967 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,644 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
821,652 >>> mbox cmd response: failed
821,652 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
821,658 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,589 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,281 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,397 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,405 >>> mbox cmd response: failed
822,405 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,411 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,486 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,126 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,605 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,613 >>> mbox cmd response: failed
822,613 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,619 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,546 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,358 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,880 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
821,888 >>> mbox cmd response: failed
821,888 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
821,894 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,187 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,817 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,606 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
821,614 >>> mbox cmd response: failed
821,614 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
821,620 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,259 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,341 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,153 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,161 >>> mbox cmd response: failed
822,161 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,167 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,674 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,578 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,483 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,491 >>> mbox cmd response: failed
822,491 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,497 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,708 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,554 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,576 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,584 >>> mbox cmd response: failed
822,584 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,590 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,221 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,357 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,960 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
821,968 >>> mbox cmd response: failed
821,968 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
821,974 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,323 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,887 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,627 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,635 >>> mbox cmd response: failed
822,635 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,641 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,108 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,562 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,155 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,163 >>> mbox cmd response: failed
822,163 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,169 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,142 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,366 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,383 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,921 UART: [kat] SHA2-256
881,852 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,967 UART: [kat] ++
886,119 UART: [kat] sha1
890,397 UART: [kat] SHA2-256
892,335 UART: [kat] SHA2-384
895,180 UART: [kat] SHA2-512-ACC
897,081 UART: [kat] ECC-384
902,708 UART: [kat] HMAC-384Kdf
907,308 UART: [kat] LMS
1,475,504 UART: [kat] --
1,476,335 UART: [cold-reset] ++
1,476,803 UART: [fht] Storing FHT @ 0x50003400
1,479,468 UART: [idev] ++
1,479,636 UART: [idev] CDI.KEYID = 6
1,479,996 UART: [idev] SUBJECT.KEYID = 7
1,480,420 UART: [idev] UDS.KEYID = 0
1,480,765 ready_for_fw is high
1,480,765 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,750 UART: [idev] Erasing UDS.KEYID = 0
1,504,980 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,816 UART: [idev] --
1,514,999 UART: [ldev] ++
1,515,167 UART: [ldev] CDI.KEYID = 6
1,515,530 UART: [ldev] SUBJECT.KEYID = 5
1,515,956 UART: [ldev] AUTHORITY.KEYID = 7
1,516,419 UART: [ldev] FE.KEYID = 1
1,521,871 UART: [ldev] Erasing FE.KEYID = 1
1,547,902 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,858 UART: [ldev] --
1,587,333 UART: [fwproc] Waiting for Commands...
1,588,184 UART: [fwproc] Received command 0x46574c44
1,588,975 UART: [fwproc] Received Image of size 115196 bytes
2,895,671 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,249 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,601 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,676 >>> mbox cmd response: success
3,089,722 UART: [afmc] ++
3,089,890 UART: [afmc] CDI.KEYID = 6
3,090,252 UART: [afmc] SUBJECT.KEYID = 7
3,090,677 UART: [afmc] AUTHORITY.KEYID = 5
3,125,358 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,232 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,012 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,740 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,625 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,315 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,290 UART: [afmc] --
3,169,222 UART: [cold-reset] --
3,170,054 UART: [state] Locking Datavault
3,171,027 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,631 UART: [state] Locking ICCM
3,172,081 UART: [exit] Launching FMC @ 0x40000130
3,177,410 UART:
3,177,426 UART: Running Caliptra FMC ...
3,177,834 UART:
3,177,888 UART: [state] CFI Enabled
3,188,143 UART: [fht] FMC Alias Private Key: 7
3,296,600 UART: [art] Extend RT PCRs Done
3,297,028 UART: [art] Lock RT PCRs Done
3,298,792 UART: [art] Populate DV Done
3,307,181 UART: [fht] FMC Alias Private Key: 7
3,308,333 UART: [art] Derive CDI
3,308,613 UART: [art] Store in in slot 0x4
3,394,240 UART: [art] Derive Key Pair
3,394,600 UART: [art] Store priv key in slot 0x5
3,407,348 UART: [art] Derive Key Pair - Done
3,422,406 UART: [art] Signing Cert with AUTHO
3,422,886 UART: RITY.KEYID = 7
3,437,626 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,391 UART: [art] PUB.X = 131BB44755B3F0D3B4086E665BA4A8D382A4EC4EA16D8E1D9F9EAA31FEC121C9201932F89FA15492EC6F76C0496AAF32
3,445,170 UART: [art] PUB.Y = 0897970AB229E858943453C7FB932F85E26ED642A2B0873BA6500B7C17F22A8D9D615BB56AE4B4129290F490087B966C
3,452,102 UART: [art] SIG.R = F610EF8EAD63CD5A036E78C3C2B85A841F805F74A9CC8F378816E560B40234296FB8CDCED792721FC6AFFB3194BB360A
3,458,877 UART: [art] SIG.S = 081019A26B45D95C3A18154FBC22371AAA7E42F5D3877F2646E00E45489B5A27237A429E0EC03231DC535B0C72CFFC70
3,483,448 UART: Caliptra RT
3,483,701 UART: [state] CFI Enabled
3,590,640 UART: [rt] RT listening for mailbox commands...
3,591,303 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,094 UART: [rt]cmd =0x46504c54, len=4
3,622,282 >>> mbox cmd response data (8 bytes)
3,622,569 UART: [rt] FIPS self test
3,622,897 UART: [kat] ++
3,623,049 UART: [kat] sha1
3,627,183 UART: [kat] SHA2-256
3,629,205 UART: [kat] SHA2-384
3,632,182 UART: [kat] SHA2-512-ACC
3,634,109 UART: [kat] ECC-384
3,643,316 UART: Fatal Error: 0x90040005
3,644,855 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,644,860 >>> mbox cmd response: failed
3,644,860 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,644,865 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,446 UART: [state] LifecycleState = Unprovisioned
86,101 UART: [state] DebugLocked = No
86,815 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,493 UART: [kat] SHA2-256
882,424 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,539 UART: [kat] ++
886,691 UART: [kat] sha1
890,749 UART: [kat] SHA2-256
892,687 UART: [kat] SHA2-384
895,494 UART: [kat] SHA2-512-ACC
897,395 UART: [kat] ECC-384
903,128 UART: [kat] HMAC-384Kdf
907,664 UART: [kat] LMS
1,475,860 UART: [kat] --
1,476,745 UART: [cold-reset] ++
1,477,189 UART: [fht] Storing FHT @ 0x50003400
1,479,954 UART: [idev] ++
1,480,122 UART: [idev] CDI.KEYID = 6
1,480,482 UART: [idev] SUBJECT.KEYID = 7
1,480,906 UART: [idev] UDS.KEYID = 0
1,481,251 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,146 UART: [idev] Erasing UDS.KEYID = 0
1,505,616 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,030 UART: [idev] --
1,515,019 UART: [ldev] ++
1,515,187 UART: [ldev] CDI.KEYID = 6
1,515,550 UART: [ldev] SUBJECT.KEYID = 5
1,515,976 UART: [ldev] AUTHORITY.KEYID = 7
1,516,439 UART: [ldev] FE.KEYID = 1
1,521,523 UART: [ldev] Erasing FE.KEYID = 1
1,547,224 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,618 UART: [ldev] --
1,586,067 UART: [fwproc] Waiting for Commands...
1,586,688 UART: [fwproc] Received command 0x46574c44
1,587,479 UART: [fwproc] Received Image of size 115196 bytes
2,895,385 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,043 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,395 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,650 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,421 ready_for_fw is high
1,362,421 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,937,506 >>> mbox cmd response: success
2,999,442 UART:
2,999,458 UART: Running Caliptra FMC ...
2,999,866 UART:
2,999,920 UART: [state] CFI Enabled
3,010,175 UART: [fht] FMC Alias Private Key: 7
3,117,538 UART: [art] Extend RT PCRs Done
3,117,966 UART: [art] Lock RT PCRs Done
3,119,714 UART: [art] Populate DV Done
3,127,857 UART: [fht] FMC Alias Private Key: 7
3,128,961 UART: [art] Derive CDI
3,129,241 UART: [art] Store in in slot 0x4
3,214,964 UART: [art] Derive Key Pair
3,215,324 UART: [art] Store priv key in slot 0x5
3,228,338 UART: [art] Derive Key Pair - Done
3,243,086 UART: [art] Signing Cert with AUTHO
3,243,566 UART: RITY.KEYID = 7
3,258,854 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,619 UART: [art] PUB.X = 47BA50AC4C520ABCC186699E8E033226AFBCC8B8211C177A5E011F2C39755202F25FC03C7E52C4489F05A5FBA403F5DC
3,266,381 UART: [art] PUB.Y = B7759720183AC43ACB32F4C1AEB2FC93297403E2CAEDBF560C3824C3CE6C3E2E9F7FB5AD1FE1BFC8490EF7F60ECD5F6F
3,273,347 UART: [art] SIG.R = A36226D69C24E017CBE3AF0EAD2E57D4CDDDC3F913518E9850ACD1480DAC211DAE83E933855607B155D2E53033A52901
3,280,113 UART: [art] SIG.S = 500117B45618740C3D9F934BD2856F0932489AE8FE963979DF6AA6C227D8B282BF74F0850417388246AA57C2A39EF40D
3,303,983 UART: Caliptra RT
3,304,236 UART: [state] CFI Enabled
3,411,735 UART: [rt] RT listening for mailbox commands...
3,412,398 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,377 UART: [rt]cmd =0x46504c54, len=4
3,443,749 >>> mbox cmd response data (8 bytes)
3,444,036 UART: [rt] FIPS self test
3,444,364 UART: [kat] ++
3,444,516 UART: [kat] sha1
3,448,906 UART: [kat] SHA2-256
3,450,928 UART: [kat] SHA2-384
3,453,593 UART: [kat] SHA2-512-ACC
3,455,520 UART: [kat] ECC-384
3,464,463 UART: Fatal Error: 0x90040005
3,466,002 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,466,007 >>> mbox cmd response: failed
3,466,007 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,466,012 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,481 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,506 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,750 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,340 UART: [kat] SHA2-256
882,271 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,386 UART: [kat] ++
886,538 UART: [kat] sha1
890,642 UART: [kat] SHA2-256
892,580 UART: [kat] SHA2-384
895,475 UART: [kat] SHA2-512-ACC
897,376 UART: [kat] ECC-384
903,239 UART: [kat] HMAC-384Kdf
907,737 UART: [kat] LMS
1,475,933 UART: [kat] --
1,477,034 UART: [cold-reset] ++
1,477,574 UART: [fht] Storing FHT @ 0x50003400
1,480,447 UART: [idev] ++
1,480,615 UART: [idev] CDI.KEYID = 6
1,480,975 UART: [idev] SUBJECT.KEYID = 7
1,481,399 UART: [idev] UDS.KEYID = 0
1,481,744 ready_for_fw is high
1,481,744 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,419 UART: [idev] Erasing UDS.KEYID = 0
1,505,853 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,447 UART: [idev] --
1,515,488 UART: [ldev] ++
1,515,656 UART: [ldev] CDI.KEYID = 6
1,516,019 UART: [ldev] SUBJECT.KEYID = 5
1,516,445 UART: [ldev] AUTHORITY.KEYID = 7
1,516,908 UART: [ldev] FE.KEYID = 1
1,522,130 UART: [ldev] Erasing FE.KEYID = 1
1,547,317 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,185 UART: [ldev] --
1,586,644 UART: [fwproc] Waiting for Commands...
1,587,405 UART: [fwproc] Received command 0x46574c44
1,588,196 UART: [fwproc] Received Image of size 115196 bytes
2,895,148 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,618 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,970 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,061 >>> mbox cmd response: success
3,090,203 UART: [afmc] ++
3,090,371 UART: [afmc] CDI.KEYID = 6
3,090,733 UART: [afmc] SUBJECT.KEYID = 7
3,091,158 UART: [afmc] AUTHORITY.KEYID = 5
3,126,795 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,213 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,993 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,721 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,606 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,296 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,051 UART: [afmc] --
3,169,963 UART: [cold-reset] --
3,170,937 UART: [state] Locking Datavault
3,172,126 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,730 UART: [state] Locking ICCM
3,173,160 UART: [exit] Launching FMC @ 0x40000130
3,178,489 UART:
3,178,505 UART: Running Caliptra FMC ...
3,178,913 UART:
3,179,056 UART: [state] CFI Enabled
3,189,683 UART: [fht] FMC Alias Private Key: 7
3,297,304 UART: [art] Extend RT PCRs Done
3,297,732 UART: [art] Lock RT PCRs Done
3,299,652 UART: [art] Populate DV Done
3,307,649 UART: [fht] FMC Alias Private Key: 7
3,308,731 UART: [art] Derive CDI
3,309,011 UART: [art] Store in in slot 0x4
3,394,946 UART: [art] Derive Key Pair
3,395,306 UART: [art] Store priv key in slot 0x5
3,408,522 UART: [art] Derive Key Pair - Done
3,423,122 UART: [art] Signing Cert with AUTHO
3,423,602 UART: RITY.KEYID = 7
3,438,912 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,677 UART: [art] PUB.X = C0282EDC303CDF6EF42DD893D552610664D28A9BECEBBC15C52EF6703022B9B2D28DB61661F4A9E7089941BE0C99C49C
3,446,450 UART: [art] PUB.Y = 6E26014B66A743153C9921666D4E2C39AFD3402954C2AF2093C4BE0C501B02E1C55E0D246C1561FA9EE7D2DD5A780E66
3,453,387 UART: [art] SIG.R = 0036FF42219070DDC4F9C3E1F5F8254F9241EC018B60AD2F9AE8BE9BE62FB765EF7B1D0ED1487E217E42EAF55EE4809B
3,460,145 UART: [art] SIG.S = 59F36FD6F89C860FBC28FB81BFBC9B2D2FE6991316F5A1FCBAADEF595E7650757BB6505400E0A2939B9FD78960475F02
3,484,280 UART: Caliptra RT
3,484,625 UART: [state] CFI Enabled
3,591,790 UART: [rt] RT listening for mailbox commands...
3,592,453 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,490 UART: [rt]cmd =0x46504c54, len=4
3,623,560 >>> mbox cmd response data (8 bytes)
3,623,785 UART: [rt] FIPS self test
3,624,113 UART: [kat] ++
3,624,265 UART: [kat] sha1
3,628,577 UART: [kat] SHA2-256
3,630,599 UART: [kat] SHA2-384
3,633,410 UART: [kat] SHA2-512-ACC
3,635,337 UART: [kat] ECC-384
3,644,462 UART: Fatal Error: 0x90040005
3,646,001 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,646,006 >>> mbox cmd response: failed
3,646,006 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,646,011 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,566 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,218 UART: [kat] SHA2-256
882,149 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,264 UART: [kat] ++
886,416 UART: [kat] sha1
890,504 UART: [kat] SHA2-256
892,442 UART: [kat] SHA2-384
895,309 UART: [kat] SHA2-512-ACC
897,210 UART: [kat] ECC-384
902,703 UART: [kat] HMAC-384Kdf
907,309 UART: [kat] LMS
1,475,505 UART: [kat] --
1,476,644 UART: [cold-reset] ++
1,477,078 UART: [fht] Storing FHT @ 0x50003400
1,480,037 UART: [idev] ++
1,480,205 UART: [idev] CDI.KEYID = 6
1,480,565 UART: [idev] SUBJECT.KEYID = 7
1,480,989 UART: [idev] UDS.KEYID = 0
1,481,334 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,667 UART: [idev] Erasing UDS.KEYID = 0
1,505,589 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,107 UART: [idev] --
1,515,166 UART: [ldev] ++
1,515,334 UART: [ldev] CDI.KEYID = 6
1,515,697 UART: [ldev] SUBJECT.KEYID = 5
1,516,123 UART: [ldev] AUTHORITY.KEYID = 7
1,516,586 UART: [ldev] FE.KEYID = 1
1,522,170 UART: [ldev] Erasing FE.KEYID = 1
1,547,699 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,401 UART: [ldev] --
1,586,916 UART: [fwproc] Waiting for Commands...
1,587,733 UART: [fwproc] Received command 0x46574c44
1,588,524 UART: [fwproc] Received Image of size 115196 bytes
2,897,014 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,860 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,212 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,487 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,794 ready_for_fw is high
1,363,794 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,753 >>> mbox cmd response: success
3,002,673 UART:
3,002,689 UART: Running Caliptra FMC ...
3,003,097 UART:
3,003,240 UART: [state] CFI Enabled
3,013,729 UART: [fht] FMC Alias Private Key: 7
3,122,190 UART: [art] Extend RT PCRs Done
3,122,618 UART: [art] Lock RT PCRs Done
3,124,188 UART: [art] Populate DV Done
3,132,255 UART: [fht] FMC Alias Private Key: 7
3,133,245 UART: [art] Derive CDI
3,133,525 UART: [art] Store in in slot 0x4
3,219,212 UART: [art] Derive Key Pair
3,219,572 UART: [art] Store priv key in slot 0x5
3,232,916 UART: [art] Derive Key Pair - Done
3,247,922 UART: [art] Signing Cert with AUTHO
3,248,402 UART: RITY.KEYID = 7
3,264,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,949 UART: [art] PUB.X = 2EC72E56CD42DC6226CC65B394BFFC1607D63E8A79BA1B0515D0263B45C47626859F01CF28DF2DD86CBF83B928A79BC9
3,271,722 UART: [art] PUB.Y = 3607FBF67C1C0DDE1AADEF64E0355BA1A0B195A4EB9462F419AF865954631116B0151C42B426C0E19E0CD31D8BB8D7CE
3,278,677 UART: [art] SIG.R = BE35F139537D4CA6442E1A776A8293D9139B59A1DA826265356685D6BF83E17070B61414927D347BF07246DEC4894167
3,285,435 UART: [art] SIG.S = DEA38FC320601B343B039E854857BE350AD9B5AA5754A39151C1313C8DC65741BB3A2FDBAE4EC10E08BCAC50DE2C8918
3,309,132 UART: Caliptra RT
3,309,477 UART: [state] CFI Enabled
3,417,361 UART: [rt] RT listening for mailbox commands...
3,418,024 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,961 UART: [rt]cmd =0x46504c54, len=4
3,449,315 >>> mbox cmd response data (8 bytes)
3,449,508 UART: [rt] FIPS self test
3,449,836 UART: [kat] ++
3,449,988 UART: [kat] sha1
3,454,122 UART: [kat] SHA2-256
3,456,144 UART: [kat] SHA2-384
3,459,197 UART: [kat] SHA2-512-ACC
3,461,124 UART: [kat] ECC-384
3,469,901 UART: Fatal Error: 0x90040005
3,471,440 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,471,445 >>> mbox cmd response: failed
3,471,445 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,471,450 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,938 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,105 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,494 UART: [state] LifecycleState = Unprovisioned
86,149 UART: [state] DebugLocked = No
86,761 UART: [state] WD Timer not started. Device not locked for debugging
87,992 UART: [kat] SHA2-256
893,642 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,767 UART: [kat] ++
897,919 UART: [kat] sha1
902,093 UART: [kat] SHA2-256
904,033 UART: [kat] SHA2-384
906,798 UART: [kat] SHA2-512-ACC
908,699 UART: [kat] ECC-384
918,642 UART: [kat] HMAC-384Kdf
923,046 UART: [kat] LMS
1,171,374 UART: [kat] --
1,172,415 UART: [cold-reset] ++
1,172,797 UART: [fht] FHT @ 0x50003400
1,175,560 UART: [idev] ++
1,175,728 UART: [idev] CDI.KEYID = 6
1,176,088 UART: [idev] SUBJECT.KEYID = 7
1,176,512 UART: [idev] UDS.KEYID = 0
1,176,857 ready_for_fw is high
1,176,857 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,414 UART: [idev] Erasing UDS.KEYID = 0
1,201,469 UART: [idev] Sha1 KeyId Algorithm
1,209,721 UART: [idev] --
1,210,961 UART: [ldev] ++
1,211,129 UART: [ldev] CDI.KEYID = 6
1,211,492 UART: [ldev] SUBJECT.KEYID = 5
1,211,918 UART: [ldev] AUTHORITY.KEYID = 7
1,212,381 UART: [ldev] FE.KEYID = 1
1,217,651 UART: [ldev] Erasing FE.KEYID = 1
1,243,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,377 UART: [ldev] --
1,282,730 UART: [fwproc] Wait for Commands...
1,283,542 UART: [fwproc] Recv command 0x46574c44
1,284,270 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,318 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,622 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,759 >>> mbox cmd response: success
2,787,987 UART: [afmc] ++
2,788,155 UART: [afmc] CDI.KEYID = 6
2,788,517 UART: [afmc] SUBJECT.KEYID = 7
2,788,942 UART: [afmc] AUTHORITY.KEYID = 5
2,823,903 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,226 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,974 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,702 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,587 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,306 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,064 UART: [afmc] --
2,866,952 UART: [cold-reset] --
2,867,870 UART: [state] Locking Datavault
2,869,177 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,781 UART: [state] Locking ICCM
2,870,319 UART: [exit] Launching FMC @ 0x40000130
2,875,648 UART:
2,875,664 UART: Running Caliptra FMC ...
2,876,072 UART:
2,876,126 UART: [state] CFI Enabled
2,886,675 UART: [fht] FMC Alias Private Key: 7
2,994,550 UART: [art] Extend RT PCRs Done
2,994,978 UART: [art] Lock RT PCRs Done
2,996,310 UART: [art] Populate DV Done
3,004,441 UART: [fht] FMC Alias Private Key: 7
3,005,431 UART: [art] Derive CDI
3,005,711 UART: [art] Store in in slot 0x4
3,091,286 UART: [art] Derive Key Pair
3,091,646 UART: [art] Store priv key in slot 0x5
3,104,416 UART: [art] Derive Key Pair - Done
3,119,249 UART: [art] Signing Cert with AUTHO
3,119,729 UART: RITY.KEYID = 7
3,134,915 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,680 UART: [art] PUB.X = 9871B5FD841347EC912F5D21F238D27B3204E51EF6B5CBAF060150930245E28328496C42C4BD16AFD265DFB00602148F
3,142,430 UART: [art] PUB.Y = 0C6F8EBE29E63E5A654B4DCF32D82261B3D22FCB3721FA2A7B0F3D576926E7D6B6D6D47E9BE8676DE5E1F9AECC0EE4E9
3,149,395 UART: [art] SIG.R = 7E0892E37636233CAC6A0E77EEA0B7E112C64F3F44E341FF9E1876533E2EF49AF88E6D4B1C019199E61B2BED42B65A5D
3,156,166 UART: [art] SIG.S = 5253EFD2A5BF95FA889711F8B2DD8D60EDDE1644926354D7C068673AD6FE3E1AD24BAEAABEBE0AA4F2FB9552A14BC867
3,180,072 UART: Caliptra RT
3,180,325 UART: [state] CFI Enabled
3,288,280 UART: [rt] RT listening for mailbox commands...
3,288,943 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,090 UART: [rt]cmd =0x46504c54, len=4
3,320,178 >>> mbox cmd response data (8 bytes)
3,320,363 UART: [rt] FIPS self test
3,320,691 UART: [kat] ++
3,320,843 UART: [kat] sha1
3,325,033 UART: [kat] SHA2-256
3,327,055 UART: [kat] SHA2-384
3,329,820 UART: [kat] SHA2-512-ACC
3,331,747 UART: [kat] ECC-384
3,340,882 UART: Fatal Error: 0x90040005
3,342,421 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,342,426 >>> mbox cmd response: failed
3,342,426 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,342,431 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,598 UART: [state] LifecycleState = Unprovisioned
86,253 UART: [state] DebugLocked = No
86,985 UART: [state] WD Timer not started. Device not locked for debugging
88,136 UART: [kat] SHA2-256
893,786 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,911 UART: [kat] ++
898,063 UART: [kat] sha1
902,277 UART: [kat] SHA2-256
904,217 UART: [kat] SHA2-384
906,924 UART: [kat] SHA2-512-ACC
908,825 UART: [kat] ECC-384
918,480 UART: [kat] HMAC-384Kdf
923,250 UART: [kat] LMS
1,171,578 UART: [kat] --
1,172,537 UART: [cold-reset] ++
1,172,983 UART: [fht] FHT @ 0x50003400
1,175,568 UART: [idev] ++
1,175,736 UART: [idev] CDI.KEYID = 6
1,176,096 UART: [idev] SUBJECT.KEYID = 7
1,176,520 UART: [idev] UDS.KEYID = 0
1,176,865 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,456 UART: [idev] Erasing UDS.KEYID = 0
1,202,057 UART: [idev] Sha1 KeyId Algorithm
1,210,319 UART: [idev] --
1,211,449 UART: [ldev] ++
1,211,617 UART: [ldev] CDI.KEYID = 6
1,211,980 UART: [ldev] SUBJECT.KEYID = 5
1,212,406 UART: [ldev] AUTHORITY.KEYID = 7
1,212,869 UART: [ldev] FE.KEYID = 1
1,218,263 UART: [ldev] Erasing FE.KEYID = 1
1,244,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,557 UART: [ldev] --
1,283,886 UART: [fwproc] Wait for Commands...
1,284,596 UART: [fwproc] Recv command 0x46574c44
1,285,324 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,272 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,576 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,635 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,321 ready_for_fw is high
1,060,321 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,830 >>> mbox cmd response: success
2,700,686 UART:
2,700,702 UART: Running Caliptra FMC ...
2,701,110 UART:
2,701,164 UART: [state] CFI Enabled
2,711,567 UART: [fht] FMC Alias Private Key: 7
2,819,606 UART: [art] Extend RT PCRs Done
2,820,034 UART: [art] Lock RT PCRs Done
2,821,720 UART: [art] Populate DV Done
2,829,829 UART: [fht] FMC Alias Private Key: 7
2,830,827 UART: [art] Derive CDI
2,831,107 UART: [art] Store in in slot 0x4
2,916,582 UART: [art] Derive Key Pair
2,916,942 UART: [art] Store priv key in slot 0x5
2,930,044 UART: [art] Derive Key Pair - Done
2,945,007 UART: [art] Signing Cert with AUTHO
2,945,487 UART: RITY.KEYID = 7
2,960,459 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,224 UART: [art] PUB.X = 6DD2347A81BE3BC7BF622EF50D551A2EA3E1A5138487E882F32B6F3D24912DB543B94BACC17B6826896E92343383EF5F
2,967,997 UART: [art] PUB.Y = F56345BA7D751E9E59E70F212633A7CEF748952FCD46B8C2C75E28981CCB9080D7F808CE3F7CCE9B0F735318B4F17C34
2,974,946 UART: [art] SIG.R = 6332F0CA54B044D8F3781A8296C6A2EC7D918AF18E85AF3AAF58697040DA7CA9060F6B8CC2C1D248AC0E85C03646A5DB
2,981,719 UART: [art] SIG.S = 7361C915EBA1FD1487CE936470624FD828206FC017D05D253608C6A3E82145998249D90D59A104C9EBF0FE03D66B495F
3,005,730 UART: Caliptra RT
3,005,983 UART: [state] CFI Enabled
3,113,846 UART: [rt] RT listening for mailbox commands...
3,114,509 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,164 UART: [rt]cmd =0x46504c54, len=4
3,145,354 >>> mbox cmd response data (8 bytes)
3,145,551 UART: [rt] FIPS self test
3,145,879 UART: [kat] ++
3,146,031 UART: [kat] sha1
3,150,295 UART: [kat] SHA2-256
3,152,317 UART: [kat] SHA2-384
3,155,088 UART: [kat] SHA2-512-ACC
3,157,015 UART: [kat] ECC-384
3,166,140 UART: Fatal Error: 0x90040005
3,167,679 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,167,684 >>> mbox cmd response: failed
3,167,684 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,167,689 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,589 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,214 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
893,527 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,652 UART: [kat] ++
897,804 UART: [kat] sha1
902,036 UART: [kat] SHA2-256
903,976 UART: [kat] SHA2-384
906,887 UART: [kat] SHA2-512-ACC
908,788 UART: [kat] ECC-384
918,551 UART: [kat] HMAC-384Kdf
923,189 UART: [kat] LMS
1,171,517 UART: [kat] --
1,172,430 UART: [cold-reset] ++
1,172,922 UART: [fht] FHT @ 0x50003400
1,175,675 UART: [idev] ++
1,175,843 UART: [idev] CDI.KEYID = 6
1,176,203 UART: [idev] SUBJECT.KEYID = 7
1,176,627 UART: [idev] UDS.KEYID = 0
1,176,972 ready_for_fw is high
1,176,972 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,427 UART: [idev] Erasing UDS.KEYID = 0
1,201,750 UART: [idev] Sha1 KeyId Algorithm
1,210,286 UART: [idev] --
1,211,312 UART: [ldev] ++
1,211,480 UART: [ldev] CDI.KEYID = 6
1,211,843 UART: [ldev] SUBJECT.KEYID = 5
1,212,269 UART: [ldev] AUTHORITY.KEYID = 7
1,212,732 UART: [ldev] FE.KEYID = 1
1,218,102 UART: [ldev] Erasing FE.KEYID = 1
1,244,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,752 UART: [ldev] --
1,284,145 UART: [fwproc] Wait for Commands...
1,284,891 UART: [fwproc] Recv command 0x46574c44
1,285,619 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,325 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,629 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,696 >>> mbox cmd response: success
2,787,898 UART: [afmc] ++
2,788,066 UART: [afmc] CDI.KEYID = 6
2,788,428 UART: [afmc] SUBJECT.KEYID = 7
2,788,853 UART: [afmc] AUTHORITY.KEYID = 5
2,824,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,593 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,321 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,206 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,925 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,639 UART: [afmc] --
2,867,621 UART: [cold-reset] --
2,868,565 UART: [state] Locking Datavault
2,869,826 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,430 UART: [state] Locking ICCM
2,871,066 UART: [exit] Launching FMC @ 0x40000130
2,876,395 UART:
2,876,411 UART: Running Caliptra FMC ...
2,876,819 UART:
2,876,962 UART: [state] CFI Enabled
2,887,657 UART: [fht] FMC Alias Private Key: 7
2,995,694 UART: [art] Extend RT PCRs Done
2,996,122 UART: [art] Lock RT PCRs Done
2,997,808 UART: [art] Populate DV Done
3,005,921 UART: [fht] FMC Alias Private Key: 7
3,006,909 UART: [art] Derive CDI
3,007,189 UART: [art] Store in in slot 0x4
3,093,056 UART: [art] Derive Key Pair
3,093,416 UART: [art] Store priv key in slot 0x5
3,106,788 UART: [art] Derive Key Pair - Done
3,121,328 UART: [art] Signing Cert with AUTHO
3,121,808 UART: RITY.KEYID = 7
3,136,896 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,661 UART: [art] PUB.X = 94366A9F0178D4418E6FDB0947137A30A724377F1F0CF5B9F94DBD59244D7657CC1AADC83C437E070E17D2AA80C87523
3,144,418 UART: [art] PUB.Y = E295332096385110932EC5FB8F0AA160F81AAF1994E06BD2C2EF0EB5E2E654EDDFBC3C8BEBCFE83F9742936DB60AB00C
3,151,376 UART: [art] SIG.R = A805099413004D7A136F2522713FFDE13827DBA5B00F5486CDD58670CDFE9562E1098AC8F16A4B9640DC6EBA92D1A6FB
3,158,120 UART: [art] SIG.S = 2A79FB17F4105C0598C7343530E4B5D7DC8C7835F762DB3E103D687F7A8F159B214BA62ADBC0BFB27D677B9E98CDBF48
3,182,262 UART: Caliptra RT
3,182,607 UART: [state] CFI Enabled
3,290,688 UART: [rt] RT listening for mailbox commands...
3,291,351 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,316 UART: [rt]cmd =0x46504c54, len=4
3,322,582 >>> mbox cmd response data (8 bytes)
3,322,707 UART: [rt] FIPS self test
3,323,035 UART: [kat] ++
3,323,187 UART: [kat] sha1
3,327,531 UART: [kat] SHA2-256
3,329,553 UART: [kat] SHA2-384
3,332,250 UART: [kat] SHA2-512-ACC
3,334,177 UART: [kat] ECC-384
3,342,944 UART: Fatal Error: 0x90040005
3,344,483 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,344,488 >>> mbox cmd response: failed
3,344,488 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,344,493 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,843 UART: [state] LifecycleState = Unprovisioned
86,498 UART: [state] DebugLocked = No
87,150 UART: [state] WD Timer not started. Device not locked for debugging
88,261 UART: [kat] SHA2-256
893,911 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,036 UART: [kat] ++
898,188 UART: [kat] sha1
902,584 UART: [kat] SHA2-256
904,524 UART: [kat] SHA2-384
907,275 UART: [kat] SHA2-512-ACC
909,176 UART: [kat] ECC-384
918,557 UART: [kat] HMAC-384Kdf
923,041 UART: [kat] LMS
1,171,369 UART: [kat] --
1,172,204 UART: [cold-reset] ++
1,172,544 UART: [fht] FHT @ 0x50003400
1,175,231 UART: [idev] ++
1,175,399 UART: [idev] CDI.KEYID = 6
1,175,759 UART: [idev] SUBJECT.KEYID = 7
1,176,183 UART: [idev] UDS.KEYID = 0
1,176,528 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,239 UART: [idev] Erasing UDS.KEYID = 0
1,202,000 UART: [idev] Sha1 KeyId Algorithm
1,210,338 UART: [idev] --
1,211,202 UART: [ldev] ++
1,211,370 UART: [ldev] CDI.KEYID = 6
1,211,733 UART: [ldev] SUBJECT.KEYID = 5
1,212,159 UART: [ldev] AUTHORITY.KEYID = 7
1,212,622 UART: [ldev] FE.KEYID = 1
1,218,138 UART: [ldev] Erasing FE.KEYID = 1
1,245,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,032 UART: [ldev] --
1,284,491 UART: [fwproc] Wait for Commands...
1,285,257 UART: [fwproc] Recv command 0x46574c44
1,285,985 UART: [fwproc] Recv'd Img size: 115196 bytes
2,594,386 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,197 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,501 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,788,542 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,106 ready_for_fw is high
1,061,106 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,761 >>> mbox cmd response: success
2,702,045 UART:
2,702,061 UART: Running Caliptra FMC ...
2,702,469 UART:
2,702,612 UART: [state] CFI Enabled
2,713,477 UART: [fht] FMC Alias Private Key: 7
2,821,754 UART: [art] Extend RT PCRs Done
2,822,182 UART: [art] Lock RT PCRs Done
2,823,910 UART: [art] Populate DV Done
2,832,209 UART: [fht] FMC Alias Private Key: 7
2,833,271 UART: [art] Derive CDI
2,833,551 UART: [art] Store in in slot 0x4
2,919,340 UART: [art] Derive Key Pair
2,919,700 UART: [art] Store priv key in slot 0x5
2,932,996 UART: [art] Derive Key Pair - Done
2,947,721 UART: [art] Signing Cert with AUTHO
2,948,201 UART: RITY.KEYID = 7
2,963,403 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,168 UART: [art] PUB.X = 4E58163AC65A9B4F4B50016E607871FC5203586FCC4CC45E249A5F6081E0377458712EAEBB549C752F1CB0A089955465
2,970,928 UART: [art] PUB.Y = 14F9F0775DCB043F3717A5768D99551765F45E45285A1734F5A77E35C2FDE596DD453D7017C75C57EF9C5BD45960A656
2,977,871 UART: [art] SIG.R = D6D48F5239BAE4B7F1E8A39CE136C35DCB8538F9CF45D4391FE38664D1824553ABA2AC3E1336E6971114DBC44AD7B20A
2,984,650 UART: [art] SIG.S = F718AB40FBE59DF9B16B036A106864F8B295F42D181B8868F6DE71AC262870669CB65D70ACDA8361F201AA45DDB4860C
3,007,980 UART: Caliptra RT
3,008,325 UART: [state] CFI Enabled
3,116,285 UART: [rt] RT listening for mailbox commands...
3,116,948 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,811 UART: [rt]cmd =0x46504c54, len=4
3,148,165 >>> mbox cmd response data (8 bytes)
3,148,316 UART: [rt] FIPS self test
3,148,644 UART: [kat] ++
3,148,796 UART: [kat] sha1
3,153,162 UART: [kat] SHA2-256
3,155,184 UART: [kat] SHA2-384
3,157,903 UART: [kat] SHA2-512-ACC
3,159,830 UART: [kat] ECC-384
3,168,477 UART: Fatal Error: 0x90040005
3,170,016 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,170,021 >>> mbox cmd response: failed
3,170,021 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,170,026 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,854 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,253 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
891,060 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,189 UART: [kat] ++
895,341 UART: [kat] sha1
899,547 UART: [kat] SHA2-256
901,487 UART: [kat] SHA2-384
904,166 UART: [kat] SHA2-512-ACC
906,067 UART: [kat] ECC-384
915,236 UART: [kat] HMAC-384Kdf
919,706 UART: [kat] LMS
1,168,018 UART: [kat] --
1,168,865 UART: [cold-reset] ++
1,169,441 UART: [fht] FHT @ 0x50003400
1,172,249 UART: [idev] ++
1,172,417 UART: [idev] CDI.KEYID = 6
1,172,778 UART: [idev] SUBJECT.KEYID = 7
1,173,203 UART: [idev] UDS.KEYID = 0
1,173,549 ready_for_fw is high
1,173,549 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,353 UART: [idev] Erasing UDS.KEYID = 0
1,197,823 UART: [idev] Sha1 KeyId Algorithm
1,206,725 UART: [idev] --
1,207,592 UART: [ldev] ++
1,207,760 UART: [ldev] CDI.KEYID = 6
1,208,124 UART: [ldev] SUBJECT.KEYID = 5
1,208,551 UART: [ldev] AUTHORITY.KEYID = 7
1,209,014 UART: [ldev] FE.KEYID = 1
1,214,432 UART: [ldev] Erasing FE.KEYID = 1
1,240,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,164 UART: [ldev] --
1,279,668 UART: [fwproc] Wait for Commands...
1,280,305 UART: [fwproc] Recv command 0x46574c44
1,281,038 UART: [fwproc] Recv'd Img size: 115196 bytes
2,587,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,520 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,829 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,781,961 >>> mbox cmd response: success
2,783,204 UART: [afmc] ++
2,783,372 UART: [afmc] CDI.KEYID = 6
2,783,735 UART: [afmc] SUBJECT.KEYID = 7
2,784,161 UART: [afmc] AUTHORITY.KEYID = 5
2,819,864 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,048 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,799 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,528 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,411 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,130 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,019 UART: [afmc] --
2,863,033 UART: [cold-reset] --
2,863,931 UART: [state] Locking Datavault
2,865,356 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,960 UART: [state] Locking ICCM
2,866,554 UART: [exit] Launching FMC @ 0x40000130
2,871,883 UART:
2,871,899 UART: Running Caliptra FMC ...
2,872,307 UART:
2,872,361 UART: [state] CFI Enabled
2,882,872 UART: [fht] FMC Alias Private Key: 7
2,990,735 UART: [art] Extend RT PCRs Done
2,991,163 UART: [art] Lock RT PCRs Done
2,992,525 UART: [art] Populate DV Done
3,000,792 UART: [fht] FMC Alias Private Key: 7
3,001,750 UART: [art] Derive CDI
3,002,030 UART: [art] Store in in slot 0x4
3,087,705 UART: [art] Derive Key Pair
3,088,065 UART: [art] Store priv key in slot 0x5
3,101,255 UART: [art] Derive Key Pair - Done
3,116,255 UART: [art] Signing Cert with AUTHO
3,116,735 UART: RITY.KEYID = 7
3,132,283 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,048 UART: [art] PUB.X = B1C3DA6BF06A0752A547AD030AFB4A9EAD3A35F0F5F89AF27CF75D052BF598C3C35A46BCE4E5414CD1CA233584403A1C
3,139,826 UART: [art] PUB.Y = DC5F80164183524E994957F2772DDB1E655DF597FE7C609BC05E0FDD4EB9BD99E2B6228A4C00BBB4B54869CD947C8E9B
3,146,763 UART: [art] SIG.R = 69B991ACBE1C0524CEC8101D7F5F6760FD98A6B9F577E5C7E7B3FBB609E7E7993B972B6B4900EE2DAF7CD6C28C4EEC65
3,153,525 UART: [art] SIG.S = F31DF4473699730F491817601AFDB8814D62146C1D70FDBFAAC23B3490BC21C369592B588689E845B2375F056C11751F
3,177,084 UART: Caliptra RT
3,177,337 UART: [state] CFI Enabled
3,285,044 UART: [rt] RT listening for mailbox commands...
3,285,707 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,544 UART: [rt]cmd =0x46504c54, len=4
3,316,642 >>> mbox cmd response data (8 bytes)
3,316,979 UART: [rt] FIPS self test
3,317,307 UART: [kat] ++
3,317,459 UART: [kat] sha1
3,321,617 UART: [kat] SHA2-256
3,323,639 UART: [kat] SHA2-384
3,326,370 UART: [kat] SHA2-512-ACC
3,328,297 UART: [kat] ECC-384
3,337,100 UART: Fatal Error: 0x90040005
3,338,639 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,338,644 >>> mbox cmd response: failed
3,338,644 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,338,649 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,295 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
891,018 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,147 UART: [kat] ++
895,299 UART: [kat] sha1
899,369 UART: [kat] SHA2-256
901,309 UART: [kat] SHA2-384
903,998 UART: [kat] SHA2-512-ACC
905,899 UART: [kat] ECC-384
915,164 UART: [kat] HMAC-384Kdf
919,804 UART: [kat] LMS
1,168,116 UART: [kat] --
1,168,893 UART: [cold-reset] ++
1,169,263 UART: [fht] FHT @ 0x50003400
1,171,915 UART: [idev] ++
1,172,083 UART: [idev] CDI.KEYID = 6
1,172,444 UART: [idev] SUBJECT.KEYID = 7
1,172,869 UART: [idev] UDS.KEYID = 0
1,173,215 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,180,751 UART: [idev] Erasing UDS.KEYID = 0
1,198,181 UART: [idev] Sha1 KeyId Algorithm
1,207,263 UART: [idev] --
1,208,444 UART: [ldev] ++
1,208,612 UART: [ldev] CDI.KEYID = 6
1,208,976 UART: [ldev] SUBJECT.KEYID = 5
1,209,403 UART: [ldev] AUTHORITY.KEYID = 7
1,209,866 UART: [ldev] FE.KEYID = 1
1,214,754 UART: [ldev] Erasing FE.KEYID = 1
1,240,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,788 UART: [ldev] --
1,280,228 UART: [fwproc] Wait for Commands...
1,281,041 UART: [fwproc] Recv command 0x46574c44
1,281,774 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,044 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,353 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,533 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,954 ready_for_fw is high
1,055,954 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,431 >>> mbox cmd response: success
2,695,227 UART:
2,695,243 UART: Running Caliptra FMC ...
2,695,651 UART:
2,695,705 UART: [state] CFI Enabled
2,706,296 UART: [fht] FMC Alias Private Key: 7
2,814,255 UART: [art] Extend RT PCRs Done
2,814,683 UART: [art] Lock RT PCRs Done
2,816,179 UART: [art] Populate DV Done
2,824,342 UART: [fht] FMC Alias Private Key: 7
2,825,420 UART: [art] Derive CDI
2,825,700 UART: [art] Store in in slot 0x4
2,911,561 UART: [art] Derive Key Pair
2,911,921 UART: [art] Store priv key in slot 0x5
2,925,449 UART: [art] Derive Key Pair - Done
2,940,074 UART: [art] Signing Cert with AUTHO
2,940,554 UART: RITY.KEYID = 7
2,955,448 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,213 UART: [art] PUB.X = 9BE3C71B38AA632E412F56DCA4FD26B3C3331701EB93C45E674D412AF6402293F0BD56F1701625ACC140455BD633F960
2,962,982 UART: [art] PUB.Y = E960D60AD928A7D4227D09E489754AF28BF9AE09554FB8BAE9E471A079E348282B36565D56FC95ECA6D0B07BF321C7A1
2,969,931 UART: [art] SIG.R = 260A7DD5A5F8DDE791C99D3B00C5E76E2724246480E2F64DA4691243EAC2F7710E290C5BA95F22F66369021F4471B980
2,976,665 UART: [art] SIG.S = 2DD49AC3BB5B866291EA5D7AE977445E974A99B63A06CD8EC38C7CD8C4E9DAFBB408CECE6DA701EEE63ED9A3E14B2196
3,000,811 UART: Caliptra RT
3,001,064 UART: [state] CFI Enabled
3,107,881 UART: [rt] RT listening for mailbox commands...
3,108,544 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,973 UART: [rt]cmd =0x46504c54, len=4
3,139,171 >>> mbox cmd response data (8 bytes)
3,139,416 UART: [rt] FIPS self test
3,139,744 UART: [kat] ++
3,139,896 UART: [kat] sha1
3,144,108 UART: [kat] SHA2-256
3,146,130 UART: [kat] SHA2-384
3,149,153 UART: [kat] SHA2-512-ACC
3,151,080 UART: [kat] ECC-384
3,159,591 UART: Fatal Error: 0x90040005
3,161,130 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,161,135 >>> mbox cmd response: failed
3,161,135 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,161,140 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,818 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,389 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,450 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,566 UART: [kat] SHA2-256
901,506 UART: [kat] SHA2-384
904,375 UART: [kat] SHA2-512-ACC
906,276 UART: [kat] ECC-384
916,277 UART: [kat] HMAC-384Kdf
920,771 UART: [kat] LMS
1,169,083 UART: [kat] --
1,170,102 UART: [cold-reset] ++
1,170,566 UART: [fht] FHT @ 0x50003400
1,173,138 UART: [idev] ++
1,173,306 UART: [idev] CDI.KEYID = 6
1,173,667 UART: [idev] SUBJECT.KEYID = 7
1,174,092 UART: [idev] UDS.KEYID = 0
1,174,438 ready_for_fw is high
1,174,438 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,522 UART: [idev] Erasing UDS.KEYID = 0
1,199,778 UART: [idev] Sha1 KeyId Algorithm
1,208,668 UART: [idev] --
1,209,689 UART: [ldev] ++
1,209,857 UART: [ldev] CDI.KEYID = 6
1,210,221 UART: [ldev] SUBJECT.KEYID = 5
1,210,648 UART: [ldev] AUTHORITY.KEYID = 7
1,211,111 UART: [ldev] FE.KEYID = 1
1,216,411 UART: [ldev] Erasing FE.KEYID = 1
1,242,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,395 UART: [ldev] --
1,281,787 UART: [fwproc] Wait for Commands...
1,282,478 UART: [fwproc] Recv command 0x46574c44
1,283,211 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,503 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,812 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,936 >>> mbox cmd response: success
2,787,103 UART: [afmc] ++
2,787,271 UART: [afmc] CDI.KEYID = 6
2,787,634 UART: [afmc] SUBJECT.KEYID = 7
2,788,060 UART: [afmc] AUTHORITY.KEYID = 5
2,823,849 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,378 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,107 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,990 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,709 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,402 UART: [afmc] --
2,867,420 UART: [cold-reset] --
2,868,394 UART: [state] Locking Datavault
2,869,569 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,173 UART: [state] Locking ICCM
2,870,595 UART: [exit] Launching FMC @ 0x40000130
2,875,924 UART:
2,875,940 UART: Running Caliptra FMC ...
2,876,348 UART:
2,876,491 UART: [state] CFI Enabled
2,886,542 UART: [fht] FMC Alias Private Key: 7
2,994,493 UART: [art] Extend RT PCRs Done
2,994,921 UART: [art] Lock RT PCRs Done
2,996,411 UART: [art] Populate DV Done
3,004,470 UART: [fht] FMC Alias Private Key: 7
3,005,540 UART: [art] Derive CDI
3,005,820 UART: [art] Store in in slot 0x4
3,091,621 UART: [art] Derive Key Pair
3,091,981 UART: [art] Store priv key in slot 0x5
3,105,523 UART: [art] Derive Key Pair - Done
3,119,955 UART: [art] Signing Cert with AUTHO
3,120,435 UART: RITY.KEYID = 7
3,135,779 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,544 UART: [art] PUB.X = 945433B630DE8103461E261981AF11C52E2A78C3CEB5E6334EB5C6AB474DB5051D723A1A6B63159729D5A9D544E005E6
3,143,303 UART: [art] PUB.Y = E57158F34FED6AFDAD5C3A26A2ADA20F16B97D54590C7D42C8F6CBFD9FC5740BF62CDD518E0577C9FBAD25155F94CE24
3,150,265 UART: [art] SIG.R = 5D0C5F14B1B77A8DC95140FEC815C7001777D32DBE118FE300E1B031C5147EF13896E607FDDCD6EB06BB13A164C93612
3,156,990 UART: [art] SIG.S = 2D4BF73C23D02219D6C302667373D56FBF00956FA2DD2C25F682B8AD7BC80115C7A46378BC5256BAA45CD5D9FB247362
3,181,177 UART: Caliptra RT
3,181,522 UART: [state] CFI Enabled
3,290,475 UART: [rt] RT listening for mailbox commands...
3,291,138 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,309 UART: [rt]cmd =0x46504c54, len=4
3,322,559 >>> mbox cmd response data (8 bytes)
3,322,744 UART: [rt] FIPS self test
3,323,072 UART: [kat] ++
3,323,224 UART: [kat] sha1
3,327,326 UART: [kat] SHA2-256
3,329,348 UART: [kat] SHA2-384
3,332,237 UART: [kat] SHA2-512-ACC
3,334,164 UART: [kat] ECC-384
3,343,089 UART: Fatal Error: 0x90040005
3,344,628 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,344,633 >>> mbox cmd response: failed
3,344,633 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,344,638 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,063 UART: [state] LifecycleState = Unprovisioned
85,718 UART: [state] DebugLocked = No
86,258 UART: [state] WD Timer not started. Device not locked for debugging
87,587 UART: [kat] SHA2-256
891,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,266 UART: [kat] ++
895,418 UART: [kat] sha1
899,842 UART: [kat] SHA2-256
901,782 UART: [kat] SHA2-384
904,575 UART: [kat] SHA2-512-ACC
906,476 UART: [kat] ECC-384
916,189 UART: [kat] HMAC-384Kdf
920,941 UART: [kat] LMS
1,169,253 UART: [kat] --
1,170,264 UART: [cold-reset] ++
1,170,688 UART: [fht] FHT @ 0x50003400
1,173,176 UART: [idev] ++
1,173,344 UART: [idev] CDI.KEYID = 6
1,173,705 UART: [idev] SUBJECT.KEYID = 7
1,174,130 UART: [idev] UDS.KEYID = 0
1,174,476 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,088 UART: [idev] Erasing UDS.KEYID = 0
1,199,438 UART: [idev] Sha1 KeyId Algorithm
1,208,120 UART: [idev] --
1,209,187 UART: [ldev] ++
1,209,355 UART: [ldev] CDI.KEYID = 6
1,209,719 UART: [ldev] SUBJECT.KEYID = 5
1,210,146 UART: [ldev] AUTHORITY.KEYID = 7
1,210,609 UART: [ldev] FE.KEYID = 1
1,215,977 UART: [ldev] Erasing FE.KEYID = 1
1,241,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,139 UART: [ldev] --
1,281,491 UART: [fwproc] Wait for Commands...
1,282,224 UART: [fwproc] Recv command 0x46574c44
1,282,957 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,651 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,719 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,028 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,106 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,281 ready_for_fw is high
1,057,281 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,380 >>> mbox cmd response: success
2,697,836 UART:
2,697,852 UART: Running Caliptra FMC ...
2,698,260 UART:
2,698,403 UART: [state] CFI Enabled
2,708,854 UART: [fht] FMC Alias Private Key: 7
2,817,681 UART: [art] Extend RT PCRs Done
2,818,109 UART: [art] Lock RT PCRs Done
2,819,801 UART: [art] Populate DV Done
2,827,928 UART: [fht] FMC Alias Private Key: 7
2,828,952 UART: [art] Derive CDI
2,829,232 UART: [art] Store in in slot 0x4
2,914,687 UART: [art] Derive Key Pair
2,915,047 UART: [art] Store priv key in slot 0x5
2,928,031 UART: [art] Derive Key Pair - Done
2,943,110 UART: [art] Signing Cert with AUTHO
2,943,590 UART: RITY.KEYID = 7
2,958,782 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,547 UART: [art] PUB.X = 4ECD53193A7F8F6A3F80780F11015BD604A9F6D8F61EAA15C7F4830C515FE6FB90C513A0893EFFAA4218C85C5FD88E4E
2,966,319 UART: [art] PUB.Y = 73630440292BB92097D1CEE3517F8AFBF41E3D6F9B20BF21622F341C84C957351653C5AE593FC839212F13EADCA016D5
2,973,268 UART: [art] SIG.R = 68D05E0DA069C8AEA2E9A45814AC9EF0D4A530C27885AA070B246A8AA401497F5905FCCE9114F08EFCA7C816374E64B9
2,980,033 UART: [art] SIG.S = 0DA2121146FC6405479541F723D8BFFD6A3ECD0F68691BC40200920FF032DCAE35509AF5BCD7EA4A5C3C0640DC388E7C
3,003,742 UART: Caliptra RT
3,004,087 UART: [state] CFI Enabled
3,111,880 UART: [rt] RT listening for mailbox commands...
3,112,543 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,320 UART: [rt]cmd =0x46504c54, len=4
3,143,522 >>> mbox cmd response data (8 bytes)
3,143,823 UART: [rt] FIPS self test
3,144,151 UART: [kat] ++
3,144,303 UART: [kat] sha1
3,148,675 UART: [kat] SHA2-256
3,150,697 UART: [kat] SHA2-384
3,153,538 UART: [kat] SHA2-512-ACC
3,155,465 UART: [kat] ECC-384
3,164,468 UART: Fatal Error: 0x90040005
3,166,007 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,166,012 >>> mbox cmd response: failed
3,166,012 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,166,017 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,473 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,738 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,627 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,635 >>> mbox cmd response: failed
817,635 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,641 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,891 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,535 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,555 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,563 >>> mbox cmd response: failed
817,563 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,569 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,255 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,923 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,394 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,402 >>> mbox cmd response: failed
817,402 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,408 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,012 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,414 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,630 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,638 >>> mbox cmd response: failed
817,638 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,644 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,870 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,080 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,967 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
816,975 >>> mbox cmd response: failed
816,975 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
816,981 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,389 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,813 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,183 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
816,191 >>> mbox cmd response: failed
816,191 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
816,197 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,095 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,575 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,750 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
816,758 >>> mbox cmd response: failed
816,758 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
816,764 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,036 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,504 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,530 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,538 >>> mbox cmd response: failed
817,538 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,544 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,166 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,340 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,681 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
816,689 >>> mbox cmd response: failed
816,689 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
816,695 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,763 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,013 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,269 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,277 >>> mbox cmd response: failed
817,277 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,283 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,413 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,201 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,388 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,396 >>> mbox cmd response: failed
817,396 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,402 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,702 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,340 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,474 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,482 >>> mbox cmd response: failed
817,482 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
817,488 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,544 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,996 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,923 UART: [kat] SHA2-256
881,854 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,969 UART: [kat] ++
886,121 UART: [kat] sha1
890,259 UART: [kat] SHA2-256
892,197 UART: [kat] SHA2-384
894,890 UART: [kat] SHA2-512-ACC
896,791 UART: [kat] ECC-384
902,538 UART: [kat] HMAC-384Kdf
906,938 UART: [kat] LMS
1,475,134 UART: [kat] --
1,476,063 UART: [cold-reset] ++
1,476,391 UART: [fht] Storing FHT @ 0x50003400
1,479,140 UART: [idev] ++
1,479,308 UART: [idev] CDI.KEYID = 6
1,479,668 UART: [idev] SUBJECT.KEYID = 7
1,480,092 UART: [idev] UDS.KEYID = 0
1,480,437 ready_for_fw is high
1,480,437 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,214 UART: [idev] Erasing UDS.KEYID = 0
1,504,678 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,352 UART: [idev] --
1,514,315 UART: [ldev] ++
1,514,483 UART: [ldev] CDI.KEYID = 6
1,514,846 UART: [ldev] SUBJECT.KEYID = 5
1,515,272 UART: [ldev] AUTHORITY.KEYID = 7
1,515,735 UART: [ldev] FE.KEYID = 1
1,521,113 UART: [ldev] Erasing FE.KEYID = 1
1,546,222 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,054 UART: [ldev] --
1,585,339 UART: [fwproc] Waiting for Commands...
1,586,186 UART: [fwproc] Received command 0x46574c44
1,586,977 UART: [fwproc] Received Image of size 115196 bytes
2,895,013 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,307 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,659 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,862 >>> mbox cmd response: success
3,090,104 UART: [afmc] ++
3,090,272 UART: [afmc] CDI.KEYID = 6
3,090,634 UART: [afmc] SUBJECT.KEYID = 7
3,091,059 UART: [afmc] AUTHORITY.KEYID = 5
3,126,078 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,426 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,206 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,934 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,819 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,509 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,488 UART: [afmc] --
3,169,572 UART: [cold-reset] --
3,170,524 UART: [state] Locking Datavault
3,171,757 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,361 UART: [state] Locking ICCM
3,172,877 UART: [exit] Launching FMC @ 0x40000130
3,178,206 UART:
3,178,222 UART: Running Caliptra FMC ...
3,178,630 UART:
3,178,684 UART: [state] CFI Enabled
3,189,369 UART: [fht] FMC Alias Private Key: 7
3,296,830 UART: [art] Extend RT PCRs Done
3,297,258 UART: [art] Lock RT PCRs Done
3,298,794 UART: [art] Populate DV Done
3,306,877 UART: [fht] FMC Alias Private Key: 7
3,307,883 UART: [art] Derive CDI
3,308,163 UART: [art] Store in in slot 0x4
3,393,680 UART: [art] Derive Key Pair
3,394,040 UART: [art] Store priv key in slot 0x5
3,407,268 UART: [art] Derive Key Pair - Done
3,422,021 UART: [art] Signing Cert with AUTHO
3,422,501 UART: RITY.KEYID = 7
3,437,853 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,618 UART: [art] PUB.X = B1DAC233DB9377D2131447C913CA9BE101C4275238B226D559FB6E5C47DAA77A636F3EEF10AB67EE6BC39DD567561A73
3,445,395 UART: [art] PUB.Y = 3A5F9DE00F27C8FA4F871F649A466CD3AFB3F759FA0A4A90C474BC2B9B6BEC3EC5607870B838D5463C534D9C39F5384A
3,452,353 UART: [art] SIG.R = 05B47E53EC21618E68ABE8C5BDB0A6BA14F0C8C1EE342938BBE6C9D3CB82CFF62D8A3C4C83538021B0C3D4A9C4ADDB1A
3,459,146 UART: [art] SIG.S = 4DAE99EC0368DF35746E53EB383A24F1CA9AEA1B73BD180259627B68A3F4CCEF7F9C6DAF0063EBF5128A9AB14FB40BE9
3,483,172 UART: Caliptra RT
3,483,425 UART: [state] CFI Enabled
3,591,627 UART: [rt] RT listening for mailbox commands...
3,592,290 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,011 UART: [rt]cmd =0x46504c54, len=4
3,623,135 >>> mbox cmd response data (8 bytes)
3,623,374 UART: [rt] FIPS self test
3,623,702 UART: [kat] ++
3,623,854 UART: [kat] sha1
3,628,102 UART: [kat] SHA2-256
3,630,124 UART: [kat] SHA2-384
3,632,967 UART: [kat] SHA2-512-ACC
3,634,894 UART: [kat] ECC-384
3,638,994 UART: Fatal Error: 0x90040004
3,640,533 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,640,538 >>> mbox cmd response: failed
3,640,538 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,640,543 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,421 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,141 UART: [kat] SHA2-256
882,072 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,187 UART: [kat] ++
886,339 UART: [kat] sha1
890,511 UART: [kat] SHA2-256
892,449 UART: [kat] SHA2-384
895,020 UART: [kat] SHA2-512-ACC
896,921 UART: [kat] ECC-384
902,492 UART: [kat] HMAC-384Kdf
907,142 UART: [kat] LMS
1,475,338 UART: [kat] --
1,475,941 UART: [cold-reset] ++
1,476,427 UART: [fht] Storing FHT @ 0x50003400
1,479,154 UART: [idev] ++
1,479,322 UART: [idev] CDI.KEYID = 6
1,479,682 UART: [idev] SUBJECT.KEYID = 7
1,480,106 UART: [idev] UDS.KEYID = 0
1,480,451 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,036 UART: [idev] Erasing UDS.KEYID = 0
1,504,840 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,604 UART: [idev] --
1,514,583 UART: [ldev] ++
1,514,751 UART: [ldev] CDI.KEYID = 6
1,515,114 UART: [ldev] SUBJECT.KEYID = 5
1,515,540 UART: [ldev] AUTHORITY.KEYID = 7
1,516,003 UART: [ldev] FE.KEYID = 1
1,521,115 UART: [ldev] Erasing FE.KEYID = 1
1,546,448 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,710 UART: [ldev] --
1,586,221 UART: [fwproc] Waiting for Commands...
1,587,032 UART: [fwproc] Received command 0x46574c44
1,587,823 UART: [fwproc] Received Image of size 115196 bytes
2,896,761 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,481 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,833 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,030 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,059 ready_for_fw is high
1,363,059 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,618 >>> mbox cmd response: success
3,000,612 UART:
3,000,628 UART: Running Caliptra FMC ...
3,001,036 UART:
3,001,090 UART: [state] CFI Enabled
3,011,677 UART: [fht] FMC Alias Private Key: 7
3,119,394 UART: [art] Extend RT PCRs Done
3,119,822 UART: [art] Lock RT PCRs Done
3,121,290 UART: [art] Populate DV Done
3,129,765 UART: [fht] FMC Alias Private Key: 7
3,130,921 UART: [art] Derive CDI
3,131,201 UART: [art] Store in in slot 0x4
3,216,654 UART: [art] Derive Key Pair
3,217,014 UART: [art] Store priv key in slot 0x5
3,230,046 UART: [art] Derive Key Pair - Done
3,244,658 UART: [art] Signing Cert with AUTHO
3,245,138 UART: RITY.KEYID = 7
3,260,150 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,915 UART: [art] PUB.X = 3CFE4F517E89E8B296169982BAB41166BE288099C273B5DE321BA0959F5219250A36839365311AFBFFB3E758803D6436
3,267,676 UART: [art] PUB.Y = 61FDA4D0263E9BEFA59249C6D380A5BE60269998BC345D59B77087879A4694953C9E3F23CB1081FAE3E3D162EE794E4F
3,274,630 UART: [art] SIG.R = 093E7C06EAE663B7996039F1E837FC363A1E7447BC68BECDBB0911F857BD96D0DC0E880206AEF13748A75DB4F4D2C7C0
3,281,394 UART: [art] SIG.S = 6139CB70E3F40A9C49CD94F62620F666F956C1D1C252AE16AAAD2E9CBFB0C8B0AB1B534F62C3967C16F0FD3580460FC5
3,304,909 UART: Caliptra RT
3,305,162 UART: [state] CFI Enabled
3,413,796 UART: [rt] RT listening for mailbox commands...
3,414,459 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,304 UART: [rt]cmd =0x46504c54, len=4
3,445,424 >>> mbox cmd response data (8 bytes)
3,445,581 UART: [rt] FIPS self test
3,445,909 UART: [kat] ++
3,446,061 UART: [kat] sha1
3,450,235 UART: [kat] SHA2-256
3,452,257 UART: [kat] SHA2-384
3,455,002 UART: [kat] SHA2-512-ACC
3,456,929 UART: [kat] ECC-384
3,461,051 UART: Fatal Error: 0x90040004
3,462,590 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,462,595 >>> mbox cmd response: failed
3,462,595 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,462,600 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,661 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,550 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,747 UART: [state] LifecycleState = Unprovisioned
86,402 UART: [state] DebugLocked = No
87,010 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,572 UART: [kat] SHA2-256
882,503 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,618 UART: [kat] ++
886,770 UART: [kat] sha1
891,078 UART: [kat] SHA2-256
893,016 UART: [kat] SHA2-384
895,715 UART: [kat] SHA2-512-ACC
897,616 UART: [kat] ECC-384
903,541 UART: [kat] HMAC-384Kdf
908,127 UART: [kat] LMS
1,476,323 UART: [kat] --
1,477,102 UART: [cold-reset] ++
1,477,456 UART: [fht] Storing FHT @ 0x50003400
1,480,313 UART: [idev] ++
1,480,481 UART: [idev] CDI.KEYID = 6
1,480,841 UART: [idev] SUBJECT.KEYID = 7
1,481,265 UART: [idev] UDS.KEYID = 0
1,481,610 ready_for_fw is high
1,481,610 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,733 UART: [idev] Erasing UDS.KEYID = 0
1,506,937 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,333 UART: [idev] --
1,516,272 UART: [ldev] ++
1,516,440 UART: [ldev] CDI.KEYID = 6
1,516,803 UART: [ldev] SUBJECT.KEYID = 5
1,517,229 UART: [ldev] AUTHORITY.KEYID = 7
1,517,692 UART: [ldev] FE.KEYID = 1
1,523,336 UART: [ldev] Erasing FE.KEYID = 1
1,549,229 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,051 UART: [ldev] --
1,588,424 UART: [fwproc] Waiting for Commands...
1,589,205 UART: [fwproc] Received command 0x46574c44
1,589,996 UART: [fwproc] Received Image of size 115196 bytes
2,897,658 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,254 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,606 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,091,779 >>> mbox cmd response: success
3,092,995 UART: [afmc] ++
3,093,163 UART: [afmc] CDI.KEYID = 6
3,093,525 UART: [afmc] SUBJECT.KEYID = 7
3,093,950 UART: [afmc] AUTHORITY.KEYID = 5
3,128,935 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,225 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,005 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,733 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,618 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,308 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,253 UART: [afmc] --
3,172,133 UART: [cold-reset] --
3,172,959 UART: [state] Locking Datavault
3,174,156 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,760 UART: [state] Locking ICCM
3,175,400 UART: [exit] Launching FMC @ 0x40000130
3,180,729 UART:
3,180,745 UART: Running Caliptra FMC ...
3,181,153 UART:
3,181,296 UART: [state] CFI Enabled
3,191,855 UART: [fht] FMC Alias Private Key: 7
3,299,670 UART: [art] Extend RT PCRs Done
3,300,098 UART: [art] Lock RT PCRs Done
3,301,450 UART: [art] Populate DV Done
3,309,573 UART: [fht] FMC Alias Private Key: 7
3,310,625 UART: [art] Derive CDI
3,310,905 UART: [art] Store in in slot 0x4
3,396,754 UART: [art] Derive Key Pair
3,397,114 UART: [art] Store priv key in slot 0x5
3,410,870 UART: [art] Derive Key Pair - Done
3,425,699 UART: [art] Signing Cert with AUTHO
3,426,179 UART: RITY.KEYID = 7
3,441,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,844 UART: [art] PUB.X = 33BC39B3880038AE23548E63867C97BECEB76921A24DCAE37D596685B13FC952C22EED2490F64A6B5087360F4C3F8B8D
3,448,593 UART: [art] PUB.Y = CF44CBC702A78CFC9BE76BABC60746E153D2E4887CAE41D6E6C67AEADF524A39847370169223563FD4F0A1642F74F9AD
3,455,551 UART: [art] SIG.R = 567E289178550D5B9FE6D57CB014EA923E43230DE038FCDEFA6CFC7046A6B727624DF0AACDFEB8B4350BF7A0F21ECAF6
3,462,334 UART: [art] SIG.S = 27BA956E81D646B1EC874DFA9AC04728AEE8E858CA1A58988EAAAB41AF2F78CE50D1799A59D099127C41E247C5203370
3,486,081 UART: Caliptra RT
3,486,426 UART: [state] CFI Enabled
3,595,594 UART: [rt] RT listening for mailbox commands...
3,596,257 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,034 UART: [rt]cmd =0x46504c54, len=4
3,627,156 >>> mbox cmd response data (8 bytes)
3,627,503 UART: [rt] FIPS self test
3,627,831 UART: [kat] ++
3,627,983 UART: [kat] sha1
3,632,027 UART: [kat] SHA2-256
3,634,049 UART: [kat] SHA2-384
3,636,976 UART: [kat] SHA2-512-ACC
3,638,903 UART: [kat] ECC-384
3,642,689 UART: Fatal Error: 0x90040004
3,644,228 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,644,233 >>> mbox cmd response: failed
3,644,233 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,644,238 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,538 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,086 UART: [kat] SHA2-256
882,017 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,132 UART: [kat] ++
886,284 UART: [kat] sha1
890,570 UART: [kat] SHA2-256
892,508 UART: [kat] SHA2-384
895,229 UART: [kat] SHA2-512-ACC
897,130 UART: [kat] ECC-384
902,645 UART: [kat] HMAC-384Kdf
907,293 UART: [kat] LMS
1,475,489 UART: [kat] --
1,476,330 UART: [cold-reset] ++
1,476,826 UART: [fht] Storing FHT @ 0x50003400
1,479,647 UART: [idev] ++
1,479,815 UART: [idev] CDI.KEYID = 6
1,480,175 UART: [idev] SUBJECT.KEYID = 7
1,480,599 UART: [idev] UDS.KEYID = 0
1,480,944 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,511 UART: [idev] Erasing UDS.KEYID = 0
1,505,447 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,151 UART: [idev] --
1,515,254 UART: [ldev] ++
1,515,422 UART: [ldev] CDI.KEYID = 6
1,515,785 UART: [ldev] SUBJECT.KEYID = 5
1,516,211 UART: [ldev] AUTHORITY.KEYID = 7
1,516,674 UART: [ldev] FE.KEYID = 1
1,521,868 UART: [ldev] Erasing FE.KEYID = 1
1,547,411 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,189 UART: [ldev] --
1,586,622 UART: [fwproc] Waiting for Commands...
1,587,411 UART: [fwproc] Received command 0x46574c44
1,588,202 UART: [fwproc] Received Image of size 115196 bytes
2,896,132 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,308 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,660 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,831 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,236 ready_for_fw is high
1,362,236 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,083 >>> mbox cmd response: success
3,000,443 UART:
3,000,459 UART: Running Caliptra FMC ...
3,000,867 UART:
3,001,010 UART: [state] CFI Enabled
3,011,755 UART: [fht] FMC Alias Private Key: 7
3,120,080 UART: [art] Extend RT PCRs Done
3,120,508 UART: [art] Lock RT PCRs Done
3,122,238 UART: [art] Populate DV Done
3,130,489 UART: [fht] FMC Alias Private Key: 7
3,131,651 UART: [art] Derive CDI
3,131,931 UART: [art] Store in in slot 0x4
3,218,000 UART: [art] Derive Key Pair
3,218,360 UART: [art] Store priv key in slot 0x5
3,231,884 UART: [art] Derive Key Pair - Done
3,246,557 UART: [art] Signing Cert with AUTHO
3,247,037 UART: RITY.KEYID = 7
3,262,325 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,090 UART: [art] PUB.X = FE311CDB62B0F5CD0D345D8F198756A15FA4A4DFCCED7B4AFB83FB6784224C276BA4B31FDCB34EE536F4D0283C3BDC76
3,269,883 UART: [art] PUB.Y = 574CF5ED68DE9E9FDF6552D46FAE774876D25398007B972F806B7EFBF1C242734A5AC6C71F393D83235C946707D3B243
3,276,810 UART: [art] SIG.R = 3B54CCF163F222990189E766C385AA4F955F34B86077EDE4779C1774908126991C772468AB2C6C1C79AE0C67764BEB60
3,283,568 UART: [art] SIG.S = B945C09D32016988D0A3ACC4697C01EDA4F806DBC7AE30E70713344EDC52E05ECC7E51F98ACCC9C9EB4B449F58AD3CA6
3,306,799 UART: Caliptra RT
3,307,144 UART: [state] CFI Enabled
3,415,125 UART: [rt] RT listening for mailbox commands...
3,415,788 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,771 UART: [rt]cmd =0x46504c54, len=4
3,446,791 >>> mbox cmd response data (8 bytes)
3,447,154 UART: [rt] FIPS self test
3,447,482 UART: [kat] ++
3,447,634 UART: [kat] sha1
3,451,724 UART: [kat] SHA2-256
3,453,746 UART: [kat] SHA2-384
3,456,565 UART: [kat] SHA2-512-ACC
3,458,492 UART: [kat] ECC-384
3,462,692 UART: Fatal Error: 0x90040004
3,464,231 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,464,236 >>> mbox cmd response: failed
3,464,236 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,464,241 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,412 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,561 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,396 UART: [kat] SHA2-256
893,046 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,171 UART: [kat] ++
897,323 UART: [kat] sha1
901,317 UART: [kat] SHA2-256
903,257 UART: [kat] SHA2-384
906,006 UART: [kat] SHA2-512-ACC
907,907 UART: [kat] ECC-384
917,748 UART: [kat] HMAC-384Kdf
922,360 UART: [kat] LMS
1,170,688 UART: [kat] --
1,171,265 UART: [cold-reset] ++
1,171,731 UART: [fht] FHT @ 0x50003400
1,174,362 UART: [idev] ++
1,174,530 UART: [idev] CDI.KEYID = 6
1,174,890 UART: [idev] SUBJECT.KEYID = 7
1,175,314 UART: [idev] UDS.KEYID = 0
1,175,659 ready_for_fw is high
1,175,659 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,410 UART: [idev] Erasing UDS.KEYID = 0
1,199,983 UART: [idev] Sha1 KeyId Algorithm
1,208,373 UART: [idev] --
1,209,461 UART: [ldev] ++
1,209,629 UART: [ldev] CDI.KEYID = 6
1,209,992 UART: [ldev] SUBJECT.KEYID = 5
1,210,418 UART: [ldev] AUTHORITY.KEYID = 7
1,210,881 UART: [ldev] FE.KEYID = 1
1,215,865 UART: [ldev] Erasing FE.KEYID = 1
1,241,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,551 UART: [ldev] --
1,281,000 UART: [fwproc] Wait for Commands...
1,281,666 UART: [fwproc] Recv command 0x46574c44
1,282,394 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,146 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,450 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,782,641 >>> mbox cmd response: success
2,783,683 UART: [afmc] ++
2,783,851 UART: [afmc] CDI.KEYID = 6
2,784,213 UART: [afmc] SUBJECT.KEYID = 7
2,784,638 UART: [afmc] AUTHORITY.KEYID = 5
2,819,997 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,644 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,392 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,120 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,005 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,724 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,588 UART: [afmc] --
2,863,704 UART: [cold-reset] --
2,864,648 UART: [state] Locking Datavault
2,865,923 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,527 UART: [state] Locking ICCM
2,867,155 UART: [exit] Launching FMC @ 0x40000130
2,872,484 UART:
2,872,500 UART: Running Caliptra FMC ...
2,872,908 UART:
2,872,962 UART: [state] CFI Enabled
2,883,689 UART: [fht] FMC Alias Private Key: 7
2,992,024 UART: [art] Extend RT PCRs Done
2,992,452 UART: [art] Lock RT PCRs Done
2,993,752 UART: [art] Populate DV Done
3,002,031 UART: [fht] FMC Alias Private Key: 7
3,003,047 UART: [art] Derive CDI
3,003,327 UART: [art] Store in in slot 0x4
3,088,606 UART: [art] Derive Key Pair
3,088,966 UART: [art] Store priv key in slot 0x5
3,102,132 UART: [art] Derive Key Pair - Done
3,116,643 UART: [art] Signing Cert with AUTHO
3,117,123 UART: RITY.KEYID = 7
3,132,219 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,984 UART: [art] PUB.X = B0DA5C4A990A63BFA61E9A5BE8A49230281703C18B7F057E8A9A98EB0DCEFE6AD65884874B9ADEF66F2E23134FD3944E
3,139,758 UART: [art] PUB.Y = 82067A9B9392A51BDEE3BFA3E307EFA84E9FD316558FD427FDB995BBC87458FEA6D82595E0E316AC7A606B0B8413441F
3,146,711 UART: [art] SIG.R = B305088901E4BE9E65E84F27F487BD91CCD3BAA6A602ED18FD0A30617FC1A081A590D0E0B04FA76B5AC8F190B9650182
3,153,473 UART: [art] SIG.S = 9A141BE354E431AAAF34A7DCD23BC831026337E9F0F2BC5FEBF4C066335B90C7655F067A817227BBAC7762191B06E5BF
3,176,593 UART: Caliptra RT
3,176,846 UART: [state] CFI Enabled
3,284,550 UART: [rt] RT listening for mailbox commands...
3,285,213 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,958 UART: [rt]cmd =0x46504c54, len=4
3,316,208 >>> mbox cmd response data (8 bytes)
3,316,499 UART: [rt] FIPS self test
3,316,827 UART: [kat] ++
3,316,979 UART: [kat] sha1
3,321,299 UART: [kat] SHA2-256
3,323,321 UART: [kat] SHA2-384
3,326,212 UART: [kat] SHA2-512-ACC
3,328,139 UART: [kat] ECC-384
3,332,245 UART: Fatal Error: 0x90040004
3,333,784 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,333,789 >>> mbox cmd response: failed
3,333,789 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,333,794 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
893,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,613 UART: [kat] ++
897,765 UART: [kat] sha1
902,001 UART: [kat] SHA2-256
903,941 UART: [kat] SHA2-384
906,626 UART: [kat] SHA2-512-ACC
908,527 UART: [kat] ECC-384
918,190 UART: [kat] HMAC-384Kdf
922,776 UART: [kat] LMS
1,171,104 UART: [kat] --
1,171,843 UART: [cold-reset] ++
1,172,231 UART: [fht] FHT @ 0x50003400
1,174,892 UART: [idev] ++
1,175,060 UART: [idev] CDI.KEYID = 6
1,175,420 UART: [idev] SUBJECT.KEYID = 7
1,175,844 UART: [idev] UDS.KEYID = 0
1,176,189 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,770 UART: [idev] Erasing UDS.KEYID = 0
1,200,583 UART: [idev] Sha1 KeyId Algorithm
1,208,955 UART: [idev] --
1,210,161 UART: [ldev] ++
1,210,329 UART: [ldev] CDI.KEYID = 6
1,210,692 UART: [ldev] SUBJECT.KEYID = 5
1,211,118 UART: [ldev] AUTHORITY.KEYID = 7
1,211,581 UART: [ldev] FE.KEYID = 1
1,216,773 UART: [ldev] Erasing FE.KEYID = 1
1,243,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,555 UART: [ldev] --
1,283,032 UART: [fwproc] Wait for Commands...
1,283,606 UART: [fwproc] Recv command 0x46574c44
1,284,334 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,598 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,902 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,037 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,045 ready_for_fw is high
1,060,045 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,790 >>> mbox cmd response: success
2,700,550 UART:
2,700,566 UART: Running Caliptra FMC ...
2,700,974 UART:
2,701,028 UART: [state] CFI Enabled
2,711,637 UART: [fht] FMC Alias Private Key: 7
2,820,170 UART: [art] Extend RT PCRs Done
2,820,598 UART: [art] Lock RT PCRs Done
2,822,126 UART: [art] Populate DV Done
2,830,155 UART: [fht] FMC Alias Private Key: 7
2,831,221 UART: [art] Derive CDI
2,831,501 UART: [art] Store in in slot 0x4
2,916,944 UART: [art] Derive Key Pair
2,917,304 UART: [art] Store priv key in slot 0x5
2,930,776 UART: [art] Derive Key Pair - Done
2,945,529 UART: [art] Signing Cert with AUTHO
2,946,009 UART: RITY.KEYID = 7
2,961,103 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,868 UART: [art] PUB.X = EDCF3A25CCC61FE306D8F5D490A2CEC3B6BD542D5CC402F5FA32A530CC7735E781E5C2F008CBB2AAC6233863B4080D22
2,968,643 UART: [art] PUB.Y = 41DEEC9D7D5364C42A08B9CF2A82A8E2DC56D963C0BF70FD052FD1D5E4FCD9325282B1BAF08A2D9E8930E7467BD881B9
2,975,605 UART: [art] SIG.R = 8AC557A13336E32226C0AEEBE4020EB0491F7364FFA640296764D71F3F4EE1F63F9AE9953C0CA8C42F407181A4F20A1E
2,982,369 UART: [art] SIG.S = 9C6C92FB765769BE0CA16B5221DB456C7FA7792826983F00AF56CE0A4D57BE7DD38EDFEAA5EE117D4058B1ABC2A25C41
3,006,262 UART: Caliptra RT
3,006,515 UART: [state] CFI Enabled
3,114,431 UART: [rt] RT listening for mailbox commands...
3,115,094 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,799 UART: [rt]cmd =0x46504c54, len=4
3,145,877 >>> mbox cmd response data (8 bytes)
3,146,028 UART: [rt] FIPS self test
3,146,356 UART: [kat] ++
3,146,508 UART: [kat] sha1
3,150,744 UART: [kat] SHA2-256
3,152,766 UART: [kat] SHA2-384
3,155,667 UART: [kat] SHA2-512-ACC
3,157,594 UART: [kat] ECC-384
3,161,118 UART: Fatal Error: 0x90040004
3,162,657 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,162,662 >>> mbox cmd response: failed
3,162,662 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,162,667 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,175 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,302 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,551 UART: [kat] SHA2-256
893,201 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,326 UART: [kat] ++
897,478 UART: [kat] sha1
901,714 UART: [kat] SHA2-256
903,654 UART: [kat] SHA2-384
906,465 UART: [kat] SHA2-512-ACC
908,366 UART: [kat] ECC-384
917,663 UART: [kat] HMAC-384Kdf
922,217 UART: [kat] LMS
1,170,545 UART: [kat] --
1,171,474 UART: [cold-reset] ++
1,171,902 UART: [fht] FHT @ 0x50003400
1,174,595 UART: [idev] ++
1,174,763 UART: [idev] CDI.KEYID = 6
1,175,123 UART: [idev] SUBJECT.KEYID = 7
1,175,547 UART: [idev] UDS.KEYID = 0
1,175,892 ready_for_fw is high
1,175,892 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,667 UART: [idev] Erasing UDS.KEYID = 0
1,200,484 UART: [idev] Sha1 KeyId Algorithm
1,209,124 UART: [idev] --
1,210,160 UART: [ldev] ++
1,210,328 UART: [ldev] CDI.KEYID = 6
1,210,691 UART: [ldev] SUBJECT.KEYID = 5
1,211,117 UART: [ldev] AUTHORITY.KEYID = 7
1,211,580 UART: [ldev] FE.KEYID = 1
1,216,666 UART: [ldev] Erasing FE.KEYID = 1
1,242,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,116 UART: [ldev] --
1,282,381 UART: [fwproc] Wait for Commands...
1,283,067 UART: [fwproc] Recv command 0x46574c44
1,283,795 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,177 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,481 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,692 >>> mbox cmd response: success
2,785,742 UART: [afmc] ++
2,785,910 UART: [afmc] CDI.KEYID = 6
2,786,272 UART: [afmc] SUBJECT.KEYID = 7
2,786,697 UART: [afmc] AUTHORITY.KEYID = 5
2,821,556 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,061 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,789 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,674 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,393 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,177 UART: [afmc] --
2,865,307 UART: [cold-reset] --
2,866,107 UART: [state] Locking Datavault
2,867,588 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,192 UART: [state] Locking ICCM
2,868,708 UART: [exit] Launching FMC @ 0x40000130
2,874,037 UART:
2,874,053 UART: Running Caliptra FMC ...
2,874,461 UART:
2,874,604 UART: [state] CFI Enabled
2,885,365 UART: [fht] FMC Alias Private Key: 7
2,993,882 UART: [art] Extend RT PCRs Done
2,994,310 UART: [art] Lock RT PCRs Done
2,996,184 UART: [art] Populate DV Done
3,004,483 UART: [fht] FMC Alias Private Key: 7
3,005,411 UART: [art] Derive CDI
3,005,691 UART: [art] Store in in slot 0x4
3,091,452 UART: [art] Derive Key Pair
3,091,812 UART: [art] Store priv key in slot 0x5
3,105,206 UART: [art] Derive Key Pair - Done
3,120,122 UART: [art] Signing Cert with AUTHO
3,120,602 UART: RITY.KEYID = 7
3,135,762 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,527 UART: [art] PUB.X = BD99CDE9EA3C81348C3F96166FC16E3F1038DEB4E354D4BC2F54C9C15A8B0C5E05AB37F0A11E8DB139F15932CAAD59BF
3,143,313 UART: [art] PUB.Y = 003DF287FFEDC3C60A980419CA217DB11288B96016949B460990FCA6A4B881F3C0D2AD452164C3DA998D62C0DCF3BF99
3,150,240 UART: [art] SIG.R = D45B62C2DC7D21DB801E2264DE8FBA14D01B57CF80579468E649038C4A3D75021E7149023EFCD205BD6FB3DB664A52B7
3,157,006 UART: [art] SIG.S = 8CB015C4A2DEE65E2A120478EA529DB01542A8475C2664F100CF278D9C70AF2409CFC0DBEE71A2F2D416A282A9587A07
3,181,064 UART: Caliptra RT
3,181,409 UART: [state] CFI Enabled
3,289,673 UART: [rt] RT listening for mailbox commands...
3,290,336 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,871 UART: [rt]cmd =0x46504c54, len=4
3,321,239 >>> mbox cmd response data (8 bytes)
3,321,498 UART: [rt] FIPS self test
3,321,826 UART: [kat] ++
3,321,978 UART: [kat] sha1
3,326,100 UART: [kat] SHA2-256
3,328,122 UART: [kat] SHA2-384
3,331,043 UART: [kat] SHA2-512-ACC
3,332,970 UART: [kat] ECC-384
3,336,556 UART: Fatal Error: 0x90040004
3,338,095 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,338,100 >>> mbox cmd response: failed
3,338,100 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,338,105 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,099 UART: [state] LifecycleState = Unprovisioned
85,754 UART: [state] DebugLocked = No
86,326 UART: [state] WD Timer not started. Device not locked for debugging
87,485 UART: [kat] SHA2-256
893,135 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,260 UART: [kat] ++
897,412 UART: [kat] sha1
901,864 UART: [kat] SHA2-256
903,804 UART: [kat] SHA2-384
906,535 UART: [kat] SHA2-512-ACC
908,436 UART: [kat] ECC-384
918,713 UART: [kat] HMAC-384Kdf
923,163 UART: [kat] LMS
1,171,491 UART: [kat] --
1,172,428 UART: [cold-reset] ++
1,172,884 UART: [fht] FHT @ 0x50003400
1,175,727 UART: [idev] ++
1,175,895 UART: [idev] CDI.KEYID = 6
1,176,255 UART: [idev] SUBJECT.KEYID = 7
1,176,679 UART: [idev] UDS.KEYID = 0
1,177,024 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,679 UART: [idev] Erasing UDS.KEYID = 0
1,201,750 UART: [idev] Sha1 KeyId Algorithm
1,210,240 UART: [idev] --
1,211,292 UART: [ldev] ++
1,211,460 UART: [ldev] CDI.KEYID = 6
1,211,823 UART: [ldev] SUBJECT.KEYID = 5
1,212,249 UART: [ldev] AUTHORITY.KEYID = 7
1,212,712 UART: [ldev] FE.KEYID = 1
1,217,732 UART: [ldev] Erasing FE.KEYID = 1
1,243,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,230 UART: [ldev] --
1,282,527 UART: [fwproc] Wait for Commands...
1,283,273 UART: [fwproc] Recv command 0x46574c44
1,284,001 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,145 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,449 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,630 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,296 ready_for_fw is high
1,061,296 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,991 >>> mbox cmd response: success
2,700,785 UART:
2,700,801 UART: Running Caliptra FMC ...
2,701,209 UART:
2,701,352 UART: [state] CFI Enabled
2,712,035 UART: [fht] FMC Alias Private Key: 7
2,820,742 UART: [art] Extend RT PCRs Done
2,821,170 UART: [art] Lock RT PCRs Done
2,822,456 UART: [art] Populate DV Done
2,830,785 UART: [fht] FMC Alias Private Key: 7
2,831,783 UART: [art] Derive CDI
2,832,063 UART: [art] Store in in slot 0x4
2,917,350 UART: [art] Derive Key Pair
2,917,710 UART: [art] Store priv key in slot 0x5
2,931,206 UART: [art] Derive Key Pair - Done
2,945,985 UART: [art] Signing Cert with AUTHO
2,946,465 UART: RITY.KEYID = 7
2,961,597 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,362 UART: [art] PUB.X = B605C08C1EE70CDDADDBDFFD80312ADDEF87AA8FAD7405F955A01AE5416E45AEE717AA56E0E6127870B1C7300F8781B1
2,969,142 UART: [art] PUB.Y = 2784B50C90983D21D53F6E7B23EFB3A1B43D6923288FDC4336C95505DEDD8C240D937AD0A4EAF27B434CEDA1CFC9AAC0
2,976,101 UART: [art] SIG.R = CA14217C9F45CFE171BA8B94E3FF27CAD2BDF9E2F9BA131A8BDB84F45A795F555C0FC89A18875AC2124D1AE1F1A12D30
2,982,890 UART: [art] SIG.S = F38BD041A986AB37F81411A276BCC18AB711866D3287EDEA896BA96DB2EC876489D81C5808FFF8809A527871BDA9A7C9
3,007,058 UART: Caliptra RT
3,007,403 UART: [state] CFI Enabled
3,115,481 UART: [rt] RT listening for mailbox commands...
3,116,144 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,011 UART: [rt]cmd =0x46504c54, len=4
3,147,155 >>> mbox cmd response data (8 bytes)
3,147,486 UART: [rt] FIPS self test
3,147,814 UART: [kat] ++
3,147,966 UART: [kat] sha1
3,152,230 UART: [kat] SHA2-256
3,154,252 UART: [kat] SHA2-384
3,157,259 UART: [kat] SHA2-512-ACC
3,159,186 UART: [kat] ECC-384
3,163,070 UART: Fatal Error: 0x90040004
3,164,609 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,164,614 >>> mbox cmd response: failed
3,164,614 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,164,619 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,370 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,109 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,079 UART: [state] WD Timer not started. Device not locked for debugging
87,250 UART: [kat] SHA2-256
890,800 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,929 UART: [kat] ++
895,081 UART: [kat] sha1
899,201 UART: [kat] SHA2-256
901,141 UART: [kat] SHA2-384
903,788 UART: [kat] SHA2-512-ACC
905,689 UART: [kat] ECC-384
915,070 UART: [kat] HMAC-384Kdf
919,664 UART: [kat] LMS
1,167,976 UART: [kat] --
1,168,971 UART: [cold-reset] ++
1,169,403 UART: [fht] FHT @ 0x50003400
1,171,985 UART: [idev] ++
1,172,153 UART: [idev] CDI.KEYID = 6
1,172,514 UART: [idev] SUBJECT.KEYID = 7
1,172,939 UART: [idev] UDS.KEYID = 0
1,173,285 ready_for_fw is high
1,173,285 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,047 UART: [idev] Erasing UDS.KEYID = 0
1,197,103 UART: [idev] Sha1 KeyId Algorithm
1,205,981 UART: [idev] --
1,207,074 UART: [ldev] ++
1,207,242 UART: [ldev] CDI.KEYID = 6
1,207,606 UART: [ldev] SUBJECT.KEYID = 5
1,208,033 UART: [ldev] AUTHORITY.KEYID = 7
1,208,496 UART: [ldev] FE.KEYID = 1
1,213,784 UART: [ldev] Erasing FE.KEYID = 1
1,240,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,376 UART: [ldev] --
1,279,750 UART: [fwproc] Wait for Commands...
1,280,403 UART: [fwproc] Recv command 0x46574c44
1,281,136 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,610 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,919 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,782,049 >>> mbox cmd response: success
2,783,236 UART: [afmc] ++
2,783,404 UART: [afmc] CDI.KEYID = 6
2,783,767 UART: [afmc] SUBJECT.KEYID = 7
2,784,193 UART: [afmc] AUTHORITY.KEYID = 5
2,819,760 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,358 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,109 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,838 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,721 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,440 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,183 UART: [afmc] --
2,863,235 UART: [cold-reset] --
2,863,981 UART: [state] Locking Datavault
2,865,290 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,894 UART: [state] Locking ICCM
2,866,514 UART: [exit] Launching FMC @ 0x40000130
2,871,843 UART:
2,871,859 UART: Running Caliptra FMC ...
2,872,267 UART:
2,872,321 UART: [state] CFI Enabled
2,882,570 UART: [fht] FMC Alias Private Key: 7
2,990,627 UART: [art] Extend RT PCRs Done
2,991,055 UART: [art] Lock RT PCRs Done
2,992,411 UART: [art] Populate DV Done
3,000,798 UART: [fht] FMC Alias Private Key: 7
3,001,818 UART: [art] Derive CDI
3,002,098 UART: [art] Store in in slot 0x4
3,087,709 UART: [art] Derive Key Pair
3,088,069 UART: [art] Store priv key in slot 0x5
3,101,279 UART: [art] Derive Key Pair - Done
3,115,737 UART: [art] Signing Cert with AUTHO
3,116,217 UART: RITY.KEYID = 7
3,131,501 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,266 UART: [art] PUB.X = 90B29988B4E644FB915B97471C38F7BFA367C2BA84EC20B7BCD2BD1F26A6C6BA9A04BB137A52B1822C1978D657CB2A35
3,139,045 UART: [art] PUB.Y = 93D06AC5BD843EA2ED06F4E684635C59F26FE6FBE5FE7D0D144CFF98E3CA1A5F5FBB94E43AEF39D39D47984CB70FA503
3,146,007 UART: [art] SIG.R = 41CB1EEE915AA2EB898F3D7FF4CF81D3CE98C387F24646B492CE266AB1D35D3E03514B3A81D8A15AF70BF96923A87EF7
3,152,787 UART: [art] SIG.S = 11893A9235B0DB9B07BBAA4E6A85515B3DEB9E01FD17EFF2A9C4E9D9268A9AA6DC21D1B0BCF8925D79BC3DFCABC4311B
3,176,990 UART: Caliptra RT
3,177,243 UART: [state] CFI Enabled
3,285,620 UART: [rt] RT listening for mailbox commands...
3,286,283 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,200 UART: [rt]cmd =0x46504c54, len=4
3,317,422 >>> mbox cmd response data (8 bytes)
3,317,541 UART: [rt] FIPS self test
3,317,869 UART: [kat] ++
3,318,021 UART: [kat] sha1
3,322,259 UART: [kat] SHA2-256
3,324,281 UART: [kat] SHA2-384
3,327,018 UART: [kat] SHA2-512-ACC
3,328,945 UART: [kat] ECC-384
3,332,739 UART: Fatal Error: 0x90040004
3,334,278 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,334,283 >>> mbox cmd response: failed
3,334,283 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,334,288 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,922 UART: [kat] SHA2-256
891,472 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,601 UART: [kat] ++
895,753 UART: [kat] sha1
900,057 UART: [kat] SHA2-256
901,997 UART: [kat] SHA2-384
904,664 UART: [kat] SHA2-512-ACC
906,565 UART: [kat] ECC-384
916,184 UART: [kat] HMAC-384Kdf
920,882 UART: [kat] LMS
1,169,194 UART: [kat] --
1,170,113 UART: [cold-reset] ++
1,170,503 UART: [fht] FHT @ 0x50003400
1,173,231 UART: [idev] ++
1,173,399 UART: [idev] CDI.KEYID = 6
1,173,760 UART: [idev] SUBJECT.KEYID = 7
1,174,185 UART: [idev] UDS.KEYID = 0
1,174,531 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,101 UART: [idev] Erasing UDS.KEYID = 0
1,198,807 UART: [idev] Sha1 KeyId Algorithm
1,207,743 UART: [idev] --
1,208,794 UART: [ldev] ++
1,208,962 UART: [ldev] CDI.KEYID = 6
1,209,326 UART: [ldev] SUBJECT.KEYID = 5
1,209,753 UART: [ldev] AUTHORITY.KEYID = 7
1,210,216 UART: [ldev] FE.KEYID = 1
1,215,464 UART: [ldev] Erasing FE.KEYID = 1
1,241,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,696 UART: [ldev] --
1,280,986 UART: [fwproc] Wait for Commands...
1,281,615 UART: [fwproc] Recv command 0x46574c44
1,282,348 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,832 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,141 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,221 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,140 ready_for_fw is high
1,056,140 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,875 >>> mbox cmd response: success
2,695,699 UART:
2,695,715 UART: Running Caliptra FMC ...
2,696,123 UART:
2,696,177 UART: [state] CFI Enabled
2,706,978 UART: [fht] FMC Alias Private Key: 7
2,814,859 UART: [art] Extend RT PCRs Done
2,815,287 UART: [art] Lock RT PCRs Done
2,816,741 UART: [art] Populate DV Done
2,825,020 UART: [fht] FMC Alias Private Key: 7
2,826,050 UART: [art] Derive CDI
2,826,330 UART: [art] Store in in slot 0x4
2,912,109 UART: [art] Derive Key Pair
2,912,469 UART: [art] Store priv key in slot 0x5
2,925,629 UART: [art] Derive Key Pair - Done
2,940,332 UART: [art] Signing Cert with AUTHO
2,940,812 UART: RITY.KEYID = 7
2,955,784 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,549 UART: [art] PUB.X = 87E0FBE3741CC582A5AEACDD7EAAA876146182266EF6569291512A3EE39E75633D13086CB307A16DEF8A3EEBE90C4E8E
2,963,324 UART: [art] PUB.Y = B01A38454FD673FE6B693193E485722C8A3CAAB57A61FB2C9BE56432E192E67EB7A925AD4C94AC0C772085227FA4987B
2,970,277 UART: [art] SIG.R = 589527781A79E9A3A64327622FCE087818FD70D932B6786BEC9ECCAA557FA60E7AB9C95D86ADD55442BE40233392D15D
2,977,045 UART: [art] SIG.S = 813B4CB188A279FCAFEA229CAF3B726F72677EE96A7920F6F2B19B8A95508B23EBCEE6E35674F230CC7275F5E33B2C4F
3,000,592 UART: Caliptra RT
3,000,845 UART: [state] CFI Enabled
3,107,950 UART: [rt] RT listening for mailbox commands...
3,108,613 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,370 UART: [rt]cmd =0x46504c54, len=4
3,139,476 >>> mbox cmd response data (8 bytes)
3,139,617 UART: [rt] FIPS self test
3,139,945 UART: [kat] ++
3,140,097 UART: [kat] sha1
3,144,313 UART: [kat] SHA2-256
3,146,335 UART: [kat] SHA2-384
3,149,188 UART: [kat] SHA2-512-ACC
3,151,115 UART: [kat] ECC-384
3,154,895 UART: Fatal Error: 0x90040004
3,156,434 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,156,439 >>> mbox cmd response: failed
3,156,439 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,156,444 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,900 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,155 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
88,113 UART: [kat] SHA2-256
891,663 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,792 UART: [kat] ++
895,944 UART: [kat] sha1
900,184 UART: [kat] SHA2-256
902,124 UART: [kat] SHA2-384
905,011 UART: [kat] SHA2-512-ACC
906,912 UART: [kat] ECC-384
917,063 UART: [kat] HMAC-384Kdf
921,721 UART: [kat] LMS
1,170,033 UART: [kat] --
1,171,060 UART: [cold-reset] ++
1,171,498 UART: [fht] FHT @ 0x50003400
1,174,294 UART: [idev] ++
1,174,462 UART: [idev] CDI.KEYID = 6
1,174,823 UART: [idev] SUBJECT.KEYID = 7
1,175,248 UART: [idev] UDS.KEYID = 0
1,175,594 ready_for_fw is high
1,175,594 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,146 UART: [idev] Erasing UDS.KEYID = 0
1,200,140 UART: [idev] Sha1 KeyId Algorithm
1,209,100 UART: [idev] --
1,210,179 UART: [ldev] ++
1,210,347 UART: [ldev] CDI.KEYID = 6
1,210,711 UART: [ldev] SUBJECT.KEYID = 5
1,211,138 UART: [ldev] AUTHORITY.KEYID = 7
1,211,601 UART: [ldev] FE.KEYID = 1
1,217,085 UART: [ldev] Erasing FE.KEYID = 1
1,244,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,121 UART: [ldev] --
1,283,629 UART: [fwproc] Wait for Commands...
1,284,270 UART: [fwproc] Recv command 0x46574c44
1,285,003 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,561 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,781 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,090 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,330 >>> mbox cmd response: success
2,787,511 UART: [afmc] ++
2,787,679 UART: [afmc] CDI.KEYID = 6
2,788,042 UART: [afmc] SUBJECT.KEYID = 7
2,788,468 UART: [afmc] AUTHORITY.KEYID = 5
2,824,163 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,119 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,870 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,599 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,482 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,201 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,098 UART: [afmc] --
2,868,188 UART: [cold-reset] --
2,869,202 UART: [state] Locking Datavault
2,870,537 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,141 UART: [state] Locking ICCM
2,871,813 UART: [exit] Launching FMC @ 0x40000130
2,877,142 UART:
2,877,158 UART: Running Caliptra FMC ...
2,877,566 UART:
2,877,709 UART: [state] CFI Enabled
2,888,282 UART: [fht] FMC Alias Private Key: 7
2,996,075 UART: [art] Extend RT PCRs Done
2,996,503 UART: [art] Lock RT PCRs Done
2,998,211 UART: [art] Populate DV Done
3,006,512 UART: [fht] FMC Alias Private Key: 7
3,007,656 UART: [art] Derive CDI
3,007,936 UART: [art] Store in in slot 0x4
3,093,919 UART: [art] Derive Key Pair
3,094,279 UART: [art] Store priv key in slot 0x5
3,107,385 UART: [art] Derive Key Pair - Done
3,122,242 UART: [art] Signing Cert with AUTHO
3,122,722 UART: RITY.KEYID = 7
3,137,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,735 UART: [art] PUB.X = 80DD193A2097CB01769472234441C1DCA8DB5811F76DC36F25FB321130CA801C10E0A77B96AF45DADC63C663F167C219
3,145,504 UART: [art] PUB.Y = 4EC20F3E2D543B5F96124E73BF0E117F439ED06A71418ECA4F460CCC17C10180149E88CB19668B17E79479533777DB13
3,152,440 UART: [art] SIG.R = 244D8C5BE98EBCE65EB491C5747524C39BD8D7275794F77382F43A96FC487F8AFEC4A9A0334E5C7134A2D0389675AE46
3,159,214 UART: [art] SIG.S = 3A9572F20923E23CF885545A4605F8CD78C6FF43F34931ABBD4C535F7A9162DF4C497DA73C1F4D8CFDE9F33927D9CF80
3,182,843 UART: Caliptra RT
3,183,188 UART: [state] CFI Enabled
3,291,059 UART: [rt] RT listening for mailbox commands...
3,291,722 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,289 UART: [rt]cmd =0x46504c54, len=4
3,322,329 >>> mbox cmd response data (8 bytes)
3,322,606 UART: [rt] FIPS self test
3,322,934 UART: [kat] ++
3,323,086 UART: [kat] sha1
3,327,152 UART: [kat] SHA2-256
3,329,174 UART: [kat] SHA2-384
3,332,097 UART: [kat] SHA2-512-ACC
3,334,024 UART: [kat] ECC-384
3,337,804 UART: Fatal Error: 0x90040004
3,339,343 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,339,348 >>> mbox cmd response: failed
3,339,348 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,339,353 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,994 UART: [state] WD Timer not started. Device not locked for debugging
88,229 UART: [kat] SHA2-256
891,779 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,908 UART: [kat] ++
896,060 UART: [kat] sha1
900,320 UART: [kat] SHA2-256
902,260 UART: [kat] SHA2-384
905,171 UART: [kat] SHA2-512-ACC
907,072 UART: [kat] ECC-384
916,757 UART: [kat] HMAC-384Kdf
921,535 UART: [kat] LMS
1,169,847 UART: [kat] --
1,170,534 UART: [cold-reset] ++
1,171,040 UART: [fht] FHT @ 0x50003400
1,173,736 UART: [idev] ++
1,173,904 UART: [idev] CDI.KEYID = 6
1,174,265 UART: [idev] SUBJECT.KEYID = 7
1,174,690 UART: [idev] UDS.KEYID = 0
1,175,036 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,858 UART: [idev] Erasing UDS.KEYID = 0
1,200,004 UART: [idev] Sha1 KeyId Algorithm
1,209,006 UART: [idev] --
1,210,087 UART: [ldev] ++
1,210,255 UART: [ldev] CDI.KEYID = 6
1,210,619 UART: [ldev] SUBJECT.KEYID = 5
1,211,046 UART: [ldev] AUTHORITY.KEYID = 7
1,211,509 UART: [ldev] FE.KEYID = 1
1,216,521 UART: [ldev] Erasing FE.KEYID = 1
1,243,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,979 UART: [ldev] --
1,282,387 UART: [fwproc] Wait for Commands...
1,283,174 UART: [fwproc] Recv command 0x46574c44
1,283,907 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,807 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,189 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,498 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,500 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,259 ready_for_fw is high
1,056,259 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,540 >>> mbox cmd response: success
2,697,902 UART:
2,697,918 UART: Running Caliptra FMC ...
2,698,326 UART:
2,698,469 UART: [state] CFI Enabled
2,709,140 UART: [fht] FMC Alias Private Key: 7
2,817,261 UART: [art] Extend RT PCRs Done
2,817,689 UART: [art] Lock RT PCRs Done
2,819,437 UART: [art] Populate DV Done
2,827,524 UART: [fht] FMC Alias Private Key: 7
2,828,498 UART: [art] Derive CDI
2,828,778 UART: [art] Store in in slot 0x4
2,914,513 UART: [art] Derive Key Pair
2,914,873 UART: [art] Store priv key in slot 0x5
2,928,549 UART: [art] Derive Key Pair - Done
2,943,127 UART: [art] Signing Cert with AUTHO
2,943,607 UART: RITY.KEYID = 7
2,958,719 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,484 UART: [art] PUB.X = 9274397865F8E8A65FB74734A8B25D02484B2A8570CAF35C37661BDDEAC56D49F8C47076E99D6E004BFBB98EF102C3A7
2,966,232 UART: [art] PUB.Y = 7CCEB894E48CE222AA5AEE3D0D778E5F6DAD42C2C38FCBC5CDE6908E056C0D12D8DE3CABBD1965586BF55567C090CFBD
2,973,203 UART: [art] SIG.R = 796311C3E5E657182AB196036CE29F2256EDBE8152D2519A7FB95219AD23B9B16CE94E04DBAD31BCA58F09E238161B7E
2,979,970 UART: [art] SIG.S = AA1EAD1574644D3EBF5BF282C0507763B71626FC9626EBFB70B49BBEC8ACA4E8F454FB3420BE677705A359A3F79C54F5
3,003,804 UART: Caliptra RT
3,004,149 UART: [state] CFI Enabled
3,111,684 UART: [rt] RT listening for mailbox commands...
3,112,347 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,124 UART: [rt]cmd =0x46504c54, len=4
3,143,282 >>> mbox cmd response data (8 bytes)
3,143,409 UART: [rt] FIPS self test
3,143,737 UART: [kat] ++
3,143,889 UART: [kat] sha1
3,148,221 UART: [kat] SHA2-256
3,150,243 UART: [kat] SHA2-384
3,153,042 UART: [kat] SHA2-512-ACC
3,154,969 UART: [kat] ECC-384
3,158,781 UART: Fatal Error: 0x90040004
3,160,320 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,160,325 >>> mbox cmd response: failed
3,160,325 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,160,330 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,281 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,362 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,907 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,915 >>> mbox cmd response: failed
822,915 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,921 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,017 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,795 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,809 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,817 >>> mbox cmd response: failed
822,817 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,823 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,683 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,541 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,090 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,098 >>> mbox cmd response: failed
823,098 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,104 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,942 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,146 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,520 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,528 >>> mbox cmd response: failed
823,528 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,534 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,366 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,275 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,755 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,763 >>> mbox cmd response: failed
822,763 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,769 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,591 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,995 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,701 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,709 >>> mbox cmd response: failed
822,709 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,715 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,555 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,420 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,740 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,748 >>> mbox cmd response: failed
822,748 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,754 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,596 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,582 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,608 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,616 >>> mbox cmd response: failed
822,616 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,622 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,768 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,516 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,591 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
821,599 >>> mbox cmd response: failed
821,599 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
821,605 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,949 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,947 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,693 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,701 >>> mbox cmd response: failed
822,701 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,707 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,589 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,545 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,064 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,072 >>> mbox cmd response: failed
823,072 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,078 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,560 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,486 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,950 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,958 >>> mbox cmd response: failed
822,958 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
822,964 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,214 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,322 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,141 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,747 UART: [kat] SHA2-256
881,678 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,793 UART: [kat] ++
885,945 UART: [kat] sha1
890,163 UART: [kat] SHA2-256
892,101 UART: [kat] SHA2-384
894,834 UART: [kat] SHA2-512-ACC
896,735 UART: [kat] ECC-384
902,338 UART: [kat] HMAC-384Kdf
907,004 UART: [kat] LMS
1,475,200 UART: [kat] --
1,476,031 UART: [cold-reset] ++
1,476,561 UART: [fht] Storing FHT @ 0x50003400
1,479,348 UART: [idev] ++
1,479,516 UART: [idev] CDI.KEYID = 6
1,479,876 UART: [idev] SUBJECT.KEYID = 7
1,480,300 UART: [idev] UDS.KEYID = 0
1,480,645 ready_for_fw is high
1,480,645 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,428 UART: [idev] Erasing UDS.KEYID = 0
1,505,452 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,180 UART: [idev] --
1,515,217 UART: [ldev] ++
1,515,385 UART: [ldev] CDI.KEYID = 6
1,515,748 UART: [ldev] SUBJECT.KEYID = 5
1,516,174 UART: [ldev] AUTHORITY.KEYID = 7
1,516,637 UART: [ldev] FE.KEYID = 1
1,522,033 UART: [ldev] Erasing FE.KEYID = 1
1,546,860 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,790 UART: [ldev] --
1,586,207 UART: [fwproc] Waiting for Commands...
1,586,910 UART: [fwproc] Received command 0x46574c44
1,587,701 UART: [fwproc] Received Image of size 115196 bytes
2,895,469 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,721 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,073 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,224 >>> mbox cmd response: success
3,090,290 UART: [afmc] ++
3,090,458 UART: [afmc] CDI.KEYID = 6
3,090,820 UART: [afmc] SUBJECT.KEYID = 7
3,091,245 UART: [afmc] AUTHORITY.KEYID = 5
3,126,692 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,184 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,964 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,692 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,577 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,267 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,282 UART: [afmc] --
3,170,376 UART: [cold-reset] --
3,171,032 UART: [state] Locking Datavault
3,172,157 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,761 UART: [state] Locking ICCM
3,173,195 UART: [exit] Launching FMC @ 0x40000130
3,178,524 UART:
3,178,540 UART: Running Caliptra FMC ...
3,178,948 UART:
3,179,002 UART: [state] CFI Enabled
3,189,527 UART: [fht] FMC Alias Private Key: 7
3,297,648 UART: [art] Extend RT PCRs Done
3,298,076 UART: [art] Lock RT PCRs Done
3,299,606 UART: [art] Populate DV Done
3,307,707 UART: [fht] FMC Alias Private Key: 7
3,308,671 UART: [art] Derive CDI
3,308,951 UART: [art] Store in in slot 0x4
3,394,274 UART: [art] Derive Key Pair
3,394,634 UART: [art] Store priv key in slot 0x5
3,407,686 UART: [art] Derive Key Pair - Done
3,422,523 UART: [art] Signing Cert with AUTHO
3,423,003 UART: RITY.KEYID = 7
3,438,339 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,104 UART: [art] PUB.X = B6DECC8DF23325145F11E195A9D7D3F99B4B047E5FE41401A194C78FB03BE807D7DA1B5E1855D9F2D76B08234F1B54C3
3,445,872 UART: [art] PUB.Y = C1BAC449459B7C86920610F869430943B9F662C1B1E4F3F6D46F66F697F649FFFBCA670C1DDF07A213B0412FE27FD590
3,452,816 UART: [art] SIG.R = 3942B1AED4321CAD71E230ABA20F776E8AB024DDB2F9FA053558C73BED48C721D14B98E8FF48A81CA2C980E15056ABF3
3,459,596 UART: [art] SIG.S = 6A7CED1136F17BEDD2E33EE382EEE661D94627B0E2CFCC3441D7BF2FE4B2C490B530216435DA80F50ACB8F65D2E74B7E
3,483,186 UART: Caliptra RT
3,483,439 UART: [state] CFI Enabled
3,592,115 UART: [rt] RT listening for mailbox commands...
3,592,778 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,637 UART: [rt]cmd =0x46504c54, len=4
3,623,865 >>> mbox cmd response data (8 bytes)
3,624,094 UART: [rt] FIPS self test
3,624,422 UART: [kat] ++
3,624,574 UART: [kat] sha1
3,628,694 UART: [kat] SHA2-256
3,630,716 UART: [kat] SHA2-384
3,633,605 UART: [kat] SHA2-512-ACC
3,635,532 UART: [kat] ECC-384
3,644,804 UART: Fatal Error: 0x90040003
3,646,343 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,646,348 >>> mbox cmd response: failed
3,646,348 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,646,353 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,888 UART: [state] LifecycleState = Unprovisioned
85,543 UART: [state] DebugLocked = No
86,093 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,637 UART: [kat] SHA2-256
881,568 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,683 UART: [kat] ++
885,835 UART: [kat] sha1
890,181 UART: [kat] SHA2-256
892,119 UART: [kat] SHA2-384
894,776 UART: [kat] SHA2-512-ACC
896,677 UART: [kat] ECC-384
902,356 UART: [kat] HMAC-384Kdf
906,954 UART: [kat] LMS
1,475,150 UART: [kat] --
1,476,031 UART: [cold-reset] ++
1,476,433 UART: [fht] Storing FHT @ 0x50003400
1,479,140 UART: [idev] ++
1,479,308 UART: [idev] CDI.KEYID = 6
1,479,668 UART: [idev] SUBJECT.KEYID = 7
1,480,092 UART: [idev] UDS.KEYID = 0
1,480,437 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,154 UART: [idev] Erasing UDS.KEYID = 0
1,505,114 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,704 UART: [idev] --
1,514,733 UART: [ldev] ++
1,514,901 UART: [ldev] CDI.KEYID = 6
1,515,264 UART: [ldev] SUBJECT.KEYID = 5
1,515,690 UART: [ldev] AUTHORITY.KEYID = 7
1,516,153 UART: [ldev] FE.KEYID = 1
1,521,293 UART: [ldev] Erasing FE.KEYID = 1
1,547,028 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,504 UART: [ldev] --
1,585,945 UART: [fwproc] Waiting for Commands...
1,586,688 UART: [fwproc] Received command 0x46574c44
1,587,479 UART: [fwproc] Received Image of size 115196 bytes
2,895,923 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,377 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,729 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,888 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,809 ready_for_fw is high
1,362,809 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,937,942 >>> mbox cmd response: success
2,999,366 UART:
2,999,382 UART: Running Caliptra FMC ...
2,999,790 UART:
2,999,844 UART: [state] CFI Enabled
3,010,345 UART: [fht] FMC Alias Private Key: 7
3,118,444 UART: [art] Extend RT PCRs Done
3,118,872 UART: [art] Lock RT PCRs Done
3,120,664 UART: [art] Populate DV Done
3,128,795 UART: [fht] FMC Alias Private Key: 7
3,129,975 UART: [art] Derive CDI
3,130,255 UART: [art] Store in in slot 0x4
3,215,732 UART: [art] Derive Key Pair
3,216,092 UART: [art] Store priv key in slot 0x5
3,228,642 UART: [art] Derive Key Pair - Done
3,243,307 UART: [art] Signing Cert with AUTHO
3,243,787 UART: RITY.KEYID = 7
3,258,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,556 UART: [art] PUB.X = FF4E248941E74EA51C0DB3A9E2DC06BB957BEB9FA51314998FA9E04E2AA6071651DF01AF7EE42A1C1F2680F8F1CD5858
3,266,330 UART: [art] PUB.Y = B398B88F4DC373A8E3DBF873D83936D232ED79AF936AB0536DE936320201F4346842EA40295A93A0E15F4BCCB4B59AB6
3,273,280 UART: [art] SIG.R = AFFE0BD8B506100B0B8E237C163D4BE90D9281669C0ADB479F4AE2DB5965BD6F7ECC87E6AAC5CC350332FF539C33295E
3,280,047 UART: [art] SIG.S = 6FFD95F253CA1027FEBF386A2106C8524ABB1DE2AE7FA1C22BA952CB6AE344B03AE0F13A5A98FCBF484F6E1671D4ED92
3,304,119 UART: Caliptra RT
3,304,372 UART: [state] CFI Enabled
3,412,839 UART: [rt] RT listening for mailbox commands...
3,413,502 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,355 UART: [rt]cmd =0x46504c54, len=4
3,444,577 >>> mbox cmd response data (8 bytes)
3,444,724 UART: [rt] FIPS self test
3,445,052 UART: [kat] ++
3,445,204 UART: [kat] sha1
3,449,622 UART: [kat] SHA2-256
3,451,644 UART: [kat] SHA2-384
3,454,361 UART: [kat] SHA2-512-ACC
3,456,288 UART: [kat] ECC-384
3,466,440 UART: Fatal Error: 0x90040003
3,467,979 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,467,984 >>> mbox cmd response: failed
3,467,984 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,467,989 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,253 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,992 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,702 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,238 UART: [kat] SHA2-256
882,169 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,284 UART: [kat] ++
886,436 UART: [kat] sha1
890,556 UART: [kat] SHA2-256
892,494 UART: [kat] SHA2-384
895,235 UART: [kat] SHA2-512-ACC
897,136 UART: [kat] ECC-384
902,855 UART: [kat] HMAC-384Kdf
907,279 UART: [kat] LMS
1,475,475 UART: [kat] --
1,476,280 UART: [cold-reset] ++
1,476,780 UART: [fht] Storing FHT @ 0x50003400
1,479,541 UART: [idev] ++
1,479,709 UART: [idev] CDI.KEYID = 6
1,480,069 UART: [idev] SUBJECT.KEYID = 7
1,480,493 UART: [idev] UDS.KEYID = 0
1,480,838 ready_for_fw is high
1,480,838 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,591 UART: [idev] Erasing UDS.KEYID = 0
1,505,183 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,635 UART: [idev] --
1,514,762 UART: [ldev] ++
1,514,930 UART: [ldev] CDI.KEYID = 6
1,515,293 UART: [ldev] SUBJECT.KEYID = 5
1,515,719 UART: [ldev] AUTHORITY.KEYID = 7
1,516,182 UART: [ldev] FE.KEYID = 1
1,521,566 UART: [ldev] Erasing FE.KEYID = 1
1,547,627 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,635 UART: [ldev] --
1,587,042 UART: [fwproc] Waiting for Commands...
1,587,821 UART: [fwproc] Received command 0x46574c44
1,588,612 UART: [fwproc] Received Image of size 115196 bytes
2,895,918 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,976 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,328 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,411 >>> mbox cmd response: success
3,090,439 UART: [afmc] ++
3,090,607 UART: [afmc] CDI.KEYID = 6
3,090,969 UART: [afmc] SUBJECT.KEYID = 7
3,091,394 UART: [afmc] AUTHORITY.KEYID = 5
3,126,411 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,795 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,575 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,303 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,188 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,878 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,703 UART: [afmc] --
3,169,583 UART: [cold-reset] --
3,170,629 UART: [state] Locking Datavault
3,172,048 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,652 UART: [state] Locking ICCM
3,173,292 UART: [exit] Launching FMC @ 0x40000130
3,178,621 UART:
3,178,637 UART: Running Caliptra FMC ...
3,179,045 UART:
3,179,188 UART: [state] CFI Enabled
3,189,889 UART: [fht] FMC Alias Private Key: 7
3,297,320 UART: [art] Extend RT PCRs Done
3,297,748 UART: [art] Lock RT PCRs Done
3,298,906 UART: [art] Populate DV Done
3,307,113 UART: [fht] FMC Alias Private Key: 7
3,308,269 UART: [art] Derive CDI
3,308,549 UART: [art] Store in in slot 0x4
3,394,346 UART: [art] Derive Key Pair
3,394,706 UART: [art] Store priv key in slot 0x5
3,408,030 UART: [art] Derive Key Pair - Done
3,422,771 UART: [art] Signing Cert with AUTHO
3,423,251 UART: RITY.KEYID = 7
3,438,581 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,346 UART: [art] PUB.X = DBC6C30B704FDE6819EC46B2DCEEA5D2123657FC20310131AE18E693D4A7919A3667BF0EE51D763665A4F75832D4DEC8
3,446,117 UART: [art] PUB.Y = 8FFC1519CDE247D6F8E8B731767F6BDDCDC366BC72842EA5FEFA744107BB0EBBAE4A953F74FDED6598FB2D0268A87C69
3,453,082 UART: [art] SIG.R = CBEE616FE24CF2D1DA87865B8227F8F4801F34A8A7DCA2B869BB2E4ED7BE83042D99B463FBA1DD781761AB8B22CB594F
3,459,869 UART: [art] SIG.S = 3DD7AD41A5BE5817F5B34B02526BAB874ACD5C8728668DC0FA80AAEE175EE9B7A0C8D26B81B21898D871B6FEFB0B85F3
3,483,636 UART: Caliptra RT
3,483,981 UART: [state] CFI Enabled
3,590,896 UART: [rt] RT listening for mailbox commands...
3,591,559 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,506 UART: [rt]cmd =0x46504c54, len=4
3,622,866 >>> mbox cmd response data (8 bytes)
3,623,197 UART: [rt] FIPS self test
3,623,525 UART: [kat] ++
3,623,677 UART: [kat] sha1
3,628,073 UART: [kat] SHA2-256
3,630,095 UART: [kat] SHA2-384
3,633,050 UART: [kat] SHA2-512-ACC
3,634,977 UART: [kat] ECC-384
3,644,641 UART: Fatal Error: 0x90040003
3,646,180 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,646,185 >>> mbox cmd response: failed
3,646,185 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,646,190 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,872 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,546 UART: [kat] SHA2-256
882,477 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,592 UART: [kat] ++
886,744 UART: [kat] sha1
890,938 UART: [kat] SHA2-256
892,876 UART: [kat] SHA2-384
895,647 UART: [kat] SHA2-512-ACC
897,548 UART: [kat] ECC-384
903,171 UART: [kat] HMAC-384Kdf
907,873 UART: [kat] LMS
1,476,069 UART: [kat] --
1,476,994 UART: [cold-reset] ++
1,477,322 UART: [fht] Storing FHT @ 0x50003400
1,480,065 UART: [idev] ++
1,480,233 UART: [idev] CDI.KEYID = 6
1,480,593 UART: [idev] SUBJECT.KEYID = 7
1,481,017 UART: [idev] UDS.KEYID = 0
1,481,362 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,047 UART: [idev] Erasing UDS.KEYID = 0
1,506,191 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,795 UART: [idev] --
1,515,866 UART: [ldev] ++
1,516,034 UART: [ldev] CDI.KEYID = 6
1,516,397 UART: [ldev] SUBJECT.KEYID = 5
1,516,823 UART: [ldev] AUTHORITY.KEYID = 7
1,517,286 UART: [ldev] FE.KEYID = 1
1,522,424 UART: [ldev] Erasing FE.KEYID = 1
1,548,371 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,559 UART: [ldev] --
1,587,858 UART: [fwproc] Waiting for Commands...
1,588,681 UART: [fwproc] Received command 0x46574c44
1,589,472 UART: [fwproc] Received Image of size 115196 bytes
2,898,134 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,458 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,810 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,091,979 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,756 ready_for_fw is high
1,362,756 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,011 >>> mbox cmd response: success
2,999,769 UART:
2,999,785 UART: Running Caliptra FMC ...
3,000,193 UART:
3,000,336 UART: [state] CFI Enabled
3,010,925 UART: [fht] FMC Alias Private Key: 7
3,119,236 UART: [art] Extend RT PCRs Done
3,119,664 UART: [art] Lock RT PCRs Done
3,121,444 UART: [art] Populate DV Done
3,129,529 UART: [fht] FMC Alias Private Key: 7
3,130,469 UART: [art] Derive CDI
3,130,749 UART: [art] Store in in slot 0x4
3,216,316 UART: [art] Derive Key Pair
3,216,676 UART: [art] Store priv key in slot 0x5
3,230,494 UART: [art] Derive Key Pair - Done
3,245,678 UART: [art] Signing Cert with AUTHO
3,246,158 UART: RITY.KEYID = 7
3,261,744 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,509 UART: [art] PUB.X = 846B7BF2E350C6246CB535E065877025273EDD74434723876A8D0EE3B2FAA48F8E05D4CFAA0A248E3242A6C38ABF1A43
3,269,276 UART: [art] PUB.Y = 249505D251A4A9A6666B4A62B0E1AED9BCE603ED04E45B1864B08F5E20C463FB18D7A1C022B3E28B81391DC3A38E8D88
3,276,225 UART: [art] SIG.R = B1B714776865B729A674107987801BE4F130640DCD5872054FFD2F4DE71E58BAE94B9504F58B1CF0F6944BF729AEC39A
3,282,988 UART: [art] SIG.S = C499ABF0E480324AFA0E8EA906F7A5A50F63C19AECB8EC62C1D1D60D7396758E1E21E68CF72C7361CA70C7AFAFCD6EDF
3,306,685 UART: Caliptra RT
3,307,030 UART: [state] CFI Enabled
3,415,652 UART: [rt] RT listening for mailbox commands...
3,416,315 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,052 UART: [rt]cmd =0x46504c54, len=4
3,447,108 >>> mbox cmd response data (8 bytes)
3,447,223 UART: [rt] FIPS self test
3,447,551 UART: [kat] ++
3,447,703 UART: [kat] sha1
3,451,815 UART: [kat] SHA2-256
3,453,837 UART: [kat] SHA2-384
3,456,482 UART: [kat] SHA2-512-ACC
3,458,409 UART: [kat] ECC-384
3,467,835 UART: Fatal Error: 0x90040003
3,469,374 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,469,379 >>> mbox cmd response: failed
3,469,379 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,469,384 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,420 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,745 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [kat] SHA2-256
893,176 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,301 UART: [kat] ++
897,453 UART: [kat] sha1
901,661 UART: [kat] SHA2-256
903,601 UART: [kat] SHA2-384
906,470 UART: [kat] SHA2-512-ACC
908,371 UART: [kat] ECC-384
918,270 UART: [kat] HMAC-384Kdf
922,808 UART: [kat] LMS
1,171,136 UART: [kat] --
1,171,921 UART: [cold-reset] ++
1,172,295 UART: [fht] FHT @ 0x50003400
1,174,936 UART: [idev] ++
1,175,104 UART: [idev] CDI.KEYID = 6
1,175,464 UART: [idev] SUBJECT.KEYID = 7
1,175,888 UART: [idev] UDS.KEYID = 0
1,176,233 ready_for_fw is high
1,176,233 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,658 UART: [idev] Erasing UDS.KEYID = 0
1,200,299 UART: [idev] Sha1 KeyId Algorithm
1,209,013 UART: [idev] --
1,209,971 UART: [ldev] ++
1,210,139 UART: [ldev] CDI.KEYID = 6
1,210,502 UART: [ldev] SUBJECT.KEYID = 5
1,210,928 UART: [ldev] AUTHORITY.KEYID = 7
1,211,391 UART: [ldev] FE.KEYID = 1
1,216,871 UART: [ldev] Erasing FE.KEYID = 1
1,243,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,059 UART: [ldev] --
1,282,446 UART: [fwproc] Wait for Commands...
1,283,040 UART: [fwproc] Recv command 0x46574c44
1,283,768 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,654 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,958 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,037 >>> mbox cmd response: success
2,787,271 UART: [afmc] ++
2,787,439 UART: [afmc] CDI.KEYID = 6
2,787,801 UART: [afmc] SUBJECT.KEYID = 7
2,788,226 UART: [afmc] AUTHORITY.KEYID = 5
2,823,683 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,904 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,652 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,380 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,265 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,984 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,792 UART: [afmc] --
2,866,904 UART: [cold-reset] --
2,867,622 UART: [state] Locking Datavault
2,868,685 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,289 UART: [state] Locking ICCM
2,869,845 UART: [exit] Launching FMC @ 0x40000130
2,875,174 UART:
2,875,190 UART: Running Caliptra FMC ...
2,875,598 UART:
2,875,652 UART: [state] CFI Enabled
2,886,175 UART: [fht] FMC Alias Private Key: 7
2,994,874 UART: [art] Extend RT PCRs Done
2,995,302 UART: [art] Lock RT PCRs Done
2,997,268 UART: [art] Populate DV Done
3,005,755 UART: [fht] FMC Alias Private Key: 7
3,006,819 UART: [art] Derive CDI
3,007,099 UART: [art] Store in in slot 0x4
3,092,658 UART: [art] Derive Key Pair
3,093,018 UART: [art] Store priv key in slot 0x5
3,105,990 UART: [art] Derive Key Pair - Done
3,120,819 UART: [art] Signing Cert with AUTHO
3,121,299 UART: RITY.KEYID = 7
3,137,013 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,778 UART: [art] PUB.X = 16074782083D910B1C6FC4B755E4F99E7AE7A3A07B400861FAE695033C9752FAFBA4FEC0DEC75BE1F70A5D83A54E82C8
3,144,542 UART: [art] PUB.Y = 2B13FB4D092D72753054C39AF32EA826956CF3790D9F77CD5E67D66F99697A4219E8BF19FCB3C55871545F4FAC6F3467
3,151,488 UART: [art] SIG.R = E6F4ACA7E2A648E1D764230F22841E036011A60742D6D504E7BD5CC627E69AAF5C90BDC41BB4370B768BC6129823C882
3,158,247 UART: [art] SIG.S = 2F4B52D6765BFDC484849E2FAEBED73045685A4CAD2CB6C1198B3A956CCCC0694766ABD20A1F235D8116612FAF9D9B9C
3,181,681 UART: Caliptra RT
3,181,934 UART: [state] CFI Enabled
3,289,727 UART: [rt] RT listening for mailbox commands...
3,290,390 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,457 UART: [rt]cmd =0x46504c54, len=4
3,321,597 >>> mbox cmd response data (8 bytes)
3,321,788 UART: [rt] FIPS self test
3,322,116 UART: [kat] ++
3,322,268 UART: [kat] sha1
3,326,656 UART: [kat] SHA2-256
3,328,678 UART: [kat] SHA2-384
3,331,685 UART: [kat] SHA2-512-ACC
3,333,612 UART: [kat] ECC-384
3,343,130 UART: Fatal Error: 0x90040003
3,344,669 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,344,674 >>> mbox cmd response: failed
3,344,674 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,344,679 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
893,124 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,249 UART: [kat] ++
897,401 UART: [kat] sha1
901,583 UART: [kat] SHA2-256
903,523 UART: [kat] SHA2-384
906,366 UART: [kat] SHA2-512-ACC
908,267 UART: [kat] ECC-384
918,218 UART: [kat] HMAC-384Kdf
922,842 UART: [kat] LMS
1,171,170 UART: [kat] --
1,171,915 UART: [cold-reset] ++
1,172,369 UART: [fht] FHT @ 0x50003400
1,175,000 UART: [idev] ++
1,175,168 UART: [idev] CDI.KEYID = 6
1,175,528 UART: [idev] SUBJECT.KEYID = 7
1,175,952 UART: [idev] UDS.KEYID = 0
1,176,297 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,788 UART: [idev] Erasing UDS.KEYID = 0
1,200,565 UART: [idev] Sha1 KeyId Algorithm
1,208,993 UART: [idev] --
1,209,821 UART: [ldev] ++
1,209,989 UART: [ldev] CDI.KEYID = 6
1,210,352 UART: [ldev] SUBJECT.KEYID = 5
1,210,778 UART: [ldev] AUTHORITY.KEYID = 7
1,211,241 UART: [ldev] FE.KEYID = 1
1,216,247 UART: [ldev] Erasing FE.KEYID = 1
1,242,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,959 UART: [ldev] --
1,282,258 UART: [fwproc] Wait for Commands...
1,283,010 UART: [fwproc] Recv command 0x46574c44
1,283,738 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,373 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,056 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,360 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,365 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,003 ready_for_fw is high
1,060,003 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,902 >>> mbox cmd response: success
2,700,340 UART:
2,700,356 UART: Running Caliptra FMC ...
2,700,764 UART:
2,700,818 UART: [state] CFI Enabled
2,711,395 UART: [fht] FMC Alias Private Key: 7
2,819,030 UART: [art] Extend RT PCRs Done
2,819,458 UART: [art] Lock RT PCRs Done
2,821,110 UART: [art] Populate DV Done
2,829,125 UART: [fht] FMC Alias Private Key: 7
2,830,119 UART: [art] Derive CDI
2,830,399 UART: [art] Store in in slot 0x4
2,916,088 UART: [art] Derive Key Pair
2,916,448 UART: [art] Store priv key in slot 0x5
2,929,512 UART: [art] Derive Key Pair - Done
2,944,379 UART: [art] Signing Cert with AUTHO
2,944,859 UART: RITY.KEYID = 7
2,960,387 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,152 UART: [art] PUB.X = EB06930A4957F68C421886BBBDC3BD5A8144495C3D20AC92CC435C8F6A54CA6028273893139E216F36F4B4B7262D423B
2,967,916 UART: [art] PUB.Y = 4A8FBC98CCFFABC80697359C5394932700D9599D01219B912468CF363191F36719F7124540E0A7253BDE46C34D24439F
2,974,830 UART: [art] SIG.R = B2FE9589B055592DFF3C1E923534D093B2597E634A3E6995A5447324D3A6381AFC9400196B9D3383B643F4E77F659C0A
2,981,569 UART: [art] SIG.S = E31B34E9B1A14F543B9611285FCE7BE12E8273D1E93B93675E3559D9CD2A38146C93307A31F3AE5BD29824064D4141B8
3,005,251 UART: Caliptra RT
3,005,504 UART: [state] CFI Enabled
3,113,066 UART: [rt] RT listening for mailbox commands...
3,113,729 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,436 UART: [rt]cmd =0x46504c54, len=4
3,144,746 >>> mbox cmd response data (8 bytes)
3,145,045 UART: [rt] FIPS self test
3,145,373 UART: [kat] ++
3,145,525 UART: [kat] sha1
3,149,625 UART: [kat] SHA2-256
3,151,647 UART: [kat] SHA2-384
3,154,446 UART: [kat] SHA2-512-ACC
3,156,373 UART: [kat] ECC-384
3,166,309 UART: Fatal Error: 0x90040003
3,167,848 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,167,853 >>> mbox cmd response: failed
3,167,853 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,167,858 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,541 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,596 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
893,729 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,854 UART: [kat] ++
898,006 UART: [kat] sha1
902,372 UART: [kat] SHA2-256
904,312 UART: [kat] SHA2-384
907,103 UART: [kat] SHA2-512-ACC
909,004 UART: [kat] ECC-384
919,181 UART: [kat] HMAC-384Kdf
923,945 UART: [kat] LMS
1,172,273 UART: [kat] --
1,172,896 UART: [cold-reset] ++
1,173,424 UART: [fht] FHT @ 0x50003400
1,176,067 UART: [idev] ++
1,176,235 UART: [idev] CDI.KEYID = 6
1,176,595 UART: [idev] SUBJECT.KEYID = 7
1,177,019 UART: [idev] UDS.KEYID = 0
1,177,364 ready_for_fw is high
1,177,364 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,185,011 UART: [idev] Erasing UDS.KEYID = 0
1,202,352 UART: [idev] Sha1 KeyId Algorithm
1,210,806 UART: [idev] --
1,211,824 UART: [ldev] ++
1,211,992 UART: [ldev] CDI.KEYID = 6
1,212,355 UART: [ldev] SUBJECT.KEYID = 5
1,212,781 UART: [ldev] AUTHORITY.KEYID = 7
1,213,244 UART: [ldev] FE.KEYID = 1
1,218,286 UART: [ldev] Erasing FE.KEYID = 1
1,244,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,488 UART: [ldev] --
1,283,993 UART: [fwproc] Wait for Commands...
1,284,627 UART: [fwproc] Recv command 0x46574c44
1,285,355 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,884 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,559 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,863 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,000 >>> mbox cmd response: success
2,787,196 UART: [afmc] ++
2,787,364 UART: [afmc] CDI.KEYID = 6
2,787,726 UART: [afmc] SUBJECT.KEYID = 7
2,788,151 UART: [afmc] AUTHORITY.KEYID = 5
2,823,922 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,765 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,513 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,241 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,126 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,845 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,699 UART: [afmc] --
2,867,809 UART: [cold-reset] --
2,868,715 UART: [state] Locking Datavault
2,869,892 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,496 UART: [state] Locking ICCM
2,871,128 UART: [exit] Launching FMC @ 0x40000130
2,876,457 UART:
2,876,473 UART: Running Caliptra FMC ...
2,876,881 UART:
2,877,024 UART: [state] CFI Enabled
2,887,717 UART: [fht] FMC Alias Private Key: 7
2,995,818 UART: [art] Extend RT PCRs Done
2,996,246 UART: [art] Lock RT PCRs Done
2,997,744 UART: [art] Populate DV Done
3,005,963 UART: [fht] FMC Alias Private Key: 7
3,006,991 UART: [art] Derive CDI
3,007,271 UART: [art] Store in in slot 0x4
3,092,740 UART: [art] Derive Key Pair
3,093,100 UART: [art] Store priv key in slot 0x5
3,106,204 UART: [art] Derive Key Pair - Done
3,120,767 UART: [art] Signing Cert with AUTHO
3,121,247 UART: RITY.KEYID = 7
3,136,435 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,200 UART: [art] PUB.X = 962DDC4F12EC02CC5B3DEF8813BBA644E372850A48A8E0B0B706684B9980C80B98F671BD18F3D0B57C5283494051896B
3,143,960 UART: [art] PUB.Y = C5E30E0EDEF415166C3817555B41DC50388B1E87A36270C117B145DB8636B67E90E8078EBA7E21C0D91DE6E41700AEF0
3,150,883 UART: [art] SIG.R = 0F5B6354F177DCE38B8FBCD0143EA3830C0E589A70C2A79794D72771D3349175ABB9891185F4636324DF7D08E0BB17B8
3,157,641 UART: [art] SIG.S = F1D29E9227F8DAE5E8E02787AEE6260D85CECA3ED3BE991DC0371EA34BBE7A763E005B84B145D2593F460E3FAC7432AB
3,181,612 UART: Caliptra RT
3,181,957 UART: [state] CFI Enabled
3,289,860 UART: [rt] RT listening for mailbox commands...
3,290,523 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,546 UART: [rt]cmd =0x46504c54, len=4
3,321,644 >>> mbox cmd response data (8 bytes)
3,322,011 UART: [rt] FIPS self test
3,322,339 UART: [kat] ++
3,322,491 UART: [kat] sha1
3,326,885 UART: [kat] SHA2-256
3,328,907 UART: [kat] SHA2-384
3,331,632 UART: [kat] SHA2-512-ACC
3,333,559 UART: [kat] ECC-384
3,343,027 UART: Fatal Error: 0x90040003
3,344,566 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,344,571 >>> mbox cmd response: failed
3,344,571 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,344,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,999 UART: [state] LifecycleState = Unprovisioned
85,654 UART: [state] DebugLocked = No
86,322 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [kat] SHA2-256
893,309 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,434 UART: [kat] ++
897,586 UART: [kat] sha1
901,914 UART: [kat] SHA2-256
903,854 UART: [kat] SHA2-384
906,687 UART: [kat] SHA2-512-ACC
908,588 UART: [kat] ECC-384
918,429 UART: [kat] HMAC-384Kdf
923,171 UART: [kat] LMS
1,171,499 UART: [kat] --
1,172,170 UART: [cold-reset] ++
1,172,610 UART: [fht] FHT @ 0x50003400
1,175,243 UART: [idev] ++
1,175,411 UART: [idev] CDI.KEYID = 6
1,175,771 UART: [idev] SUBJECT.KEYID = 7
1,176,195 UART: [idev] UDS.KEYID = 0
1,176,540 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,227 UART: [idev] Erasing UDS.KEYID = 0
1,201,588 UART: [idev] Sha1 KeyId Algorithm
1,210,082 UART: [idev] --
1,211,224 UART: [ldev] ++
1,211,392 UART: [ldev] CDI.KEYID = 6
1,211,755 UART: [ldev] SUBJECT.KEYID = 5
1,212,181 UART: [ldev] AUTHORITY.KEYID = 7
1,212,644 UART: [ldev] FE.KEYID = 1
1,217,942 UART: [ldev] Erasing FE.KEYID = 1
1,244,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,434 UART: [ldev] --
1,283,899 UART: [fwproc] Wait for Commands...
1,284,559 UART: [fwproc] Recv command 0x46574c44
1,285,287 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,000 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,971 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,275 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,292 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,036 ready_for_fw is high
1,061,036 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,215 >>> mbox cmd response: success
2,699,891 UART:
2,699,907 UART: Running Caliptra FMC ...
2,700,315 UART:
2,700,458 UART: [state] CFI Enabled
2,710,995 UART: [fht] FMC Alias Private Key: 7
2,819,202 UART: [art] Extend RT PCRs Done
2,819,630 UART: [art] Lock RT PCRs Done
2,821,054 UART: [art] Populate DV Done
2,829,215 UART: [fht] FMC Alias Private Key: 7
2,830,333 UART: [art] Derive CDI
2,830,613 UART: [art] Store in in slot 0x4
2,916,714 UART: [art] Derive Key Pair
2,917,074 UART: [art] Store priv key in slot 0x5
2,930,054 UART: [art] Derive Key Pair - Done
2,945,109 UART: [art] Signing Cert with AUTHO
2,945,589 UART: RITY.KEYID = 7
2,960,871 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,636 UART: [art] PUB.X = E41AEDE7015909D80D2303D73BFA50A790FA69D616AC3B2C0B642813C21F3A9390C9497183DC68A224CA569918B4410A
2,968,388 UART: [art] PUB.Y = 0C4F6FF5637CF601DBE665F019A529FD21D16B1FD9DD27D614CFC0495DD50017F5B640A8953B396958892CEB65B81E76
2,975,316 UART: [art] SIG.R = 4BA772BAB7371875185F1A4B18832A75B6CEF00D7EBD9E00F50C1E521BA9EE72302B19AC82F34AFF641E35BE1B4255A8
2,982,070 UART: [art] SIG.S = 0F812DB981A40432D13B945909C2F8E79870C606F2D4B747AE4124724BD0ADE312A57A17901306F974A1CDB46E777930
3,005,774 UART: Caliptra RT
3,006,119 UART: [state] CFI Enabled
3,113,572 UART: [rt] RT listening for mailbox commands...
3,114,235 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,820 UART: [rt]cmd =0x46504c54, len=4
3,145,024 >>> mbox cmd response data (8 bytes)
3,145,177 UART: [rt] FIPS self test
3,145,505 UART: [kat] ++
3,145,657 UART: [kat] sha1
3,150,003 UART: [kat] SHA2-256
3,152,025 UART: [kat] SHA2-384
3,154,842 UART: [kat] SHA2-512-ACC
3,156,769 UART: [kat] ECC-384
3,166,393 UART: Fatal Error: 0x90040003
3,167,932 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,167,937 >>> mbox cmd response: failed
3,167,937 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,167,942 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,410 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,687 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,137 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
890,994 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,123 UART: [kat] ++
895,275 UART: [kat] sha1
899,619 UART: [kat] SHA2-256
901,559 UART: [kat] SHA2-384
904,248 UART: [kat] SHA2-512-ACC
906,149 UART: [kat] ECC-384
915,574 UART: [kat] HMAC-384Kdf
920,112 UART: [kat] LMS
1,168,424 UART: [kat] --
1,169,361 UART: [cold-reset] ++
1,169,805 UART: [fht] FHT @ 0x50003400
1,172,399 UART: [idev] ++
1,172,567 UART: [idev] CDI.KEYID = 6
1,172,928 UART: [idev] SUBJECT.KEYID = 7
1,173,353 UART: [idev] UDS.KEYID = 0
1,173,699 ready_for_fw is high
1,173,699 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,441 UART: [idev] Erasing UDS.KEYID = 0
1,198,095 UART: [idev] Sha1 KeyId Algorithm
1,207,115 UART: [idev] --
1,208,034 UART: [ldev] ++
1,208,202 UART: [ldev] CDI.KEYID = 6
1,208,566 UART: [ldev] SUBJECT.KEYID = 5
1,208,993 UART: [ldev] AUTHORITY.KEYID = 7
1,209,456 UART: [ldev] FE.KEYID = 1
1,214,634 UART: [ldev] Erasing FE.KEYID = 1
1,241,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,792 UART: [ldev] --
1,280,092 UART: [fwproc] Wait for Commands...
1,280,883 UART: [fwproc] Recv command 0x46574c44
1,281,616 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,100 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,409 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,782,605 >>> mbox cmd response: success
2,783,724 UART: [afmc] ++
2,783,892 UART: [afmc] CDI.KEYID = 6
2,784,255 UART: [afmc] SUBJECT.KEYID = 7
2,784,681 UART: [afmc] AUTHORITY.KEYID = 5
2,820,386 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,950 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,701 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,430 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,313 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,032 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,901 UART: [afmc] --
2,863,841 UART: [cold-reset] --
2,864,563 UART: [state] Locking Datavault
2,865,822 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,426 UART: [state] Locking ICCM
2,867,098 UART: [exit] Launching FMC @ 0x40000130
2,872,427 UART:
2,872,443 UART: Running Caliptra FMC ...
2,872,851 UART:
2,872,905 UART: [state] CFI Enabled
2,883,486 UART: [fht] FMC Alias Private Key: 7
2,991,643 UART: [art] Extend RT PCRs Done
2,992,071 UART: [art] Lock RT PCRs Done
2,993,709 UART: [art] Populate DV Done
3,001,856 UART: [fht] FMC Alias Private Key: 7
3,002,856 UART: [art] Derive CDI
3,003,136 UART: [art] Store in in slot 0x4
3,088,937 UART: [art] Derive Key Pair
3,089,297 UART: [art] Store priv key in slot 0x5
3,102,439 UART: [art] Derive Key Pair - Done
3,117,343 UART: [art] Signing Cert with AUTHO
3,117,823 UART: RITY.KEYID = 7
3,132,871 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,636 UART: [art] PUB.X = 8BDFC05010197D01CEFC96549342E89D069BC51D795736378498ADDADCB2766406B697592DA18C006957BFA8C3A7583D
3,140,375 UART: [art] PUB.Y = 50AE0AFC553FF7A3E95235F1B66FC756236AB50EA2058EE9356C5BCC403591667B3CB362B4DC784CCD5FCF17162CD241
3,147,328 UART: [art] SIG.R = 1461E4ACB86C790A8612432E03F4FF57C60443C421982F749FEE07FD9198F475811261395A44D97AB5B460E182DC6486
3,154,078 UART: [art] SIG.S = 43FB028F6BDC0392B3C8859BBE7BCA262D94EEB0A1AB4DCECF2C7EC2C7D95C50B9D504B3F953A5F634259D9A8ACE37B9
3,177,544 UART: Caliptra RT
3,177,797 UART: [state] CFI Enabled
3,285,478 UART: [rt] RT listening for mailbox commands...
3,286,141 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,756 UART: [rt]cmd =0x46504c54, len=4
3,316,986 >>> mbox cmd response data (8 bytes)
3,317,125 UART: [rt] FIPS self test
3,317,453 UART: [kat] ++
3,317,605 UART: [kat] sha1
3,321,911 UART: [kat] SHA2-256
3,323,933 UART: [kat] SHA2-384
3,326,846 UART: [kat] SHA2-512-ACC
3,328,773 UART: [kat] ECC-384
3,338,331 UART: Fatal Error: 0x90040003
3,339,870 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,339,875 >>> mbox cmd response: failed
3,339,875 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,339,880 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,740 UART: [state] LifecycleState = Unprovisioned
85,395 UART: [state] DebugLocked = No
86,009 UART: [state] WD Timer not started. Device not locked for debugging
87,194 UART: [kat] SHA2-256
890,744 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,873 UART: [kat] ++
895,025 UART: [kat] sha1
899,271 UART: [kat] SHA2-256
901,211 UART: [kat] SHA2-384
904,034 UART: [kat] SHA2-512-ACC
905,935 UART: [kat] ECC-384
915,236 UART: [kat] HMAC-384Kdf
919,868 UART: [kat] LMS
1,168,180 UART: [kat] --
1,168,767 UART: [cold-reset] ++
1,169,339 UART: [fht] FHT @ 0x50003400
1,172,047 UART: [idev] ++
1,172,215 UART: [idev] CDI.KEYID = 6
1,172,576 UART: [idev] SUBJECT.KEYID = 7
1,173,001 UART: [idev] UDS.KEYID = 0
1,173,347 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,180,711 UART: [idev] Erasing UDS.KEYID = 0
1,197,565 UART: [idev] Sha1 KeyId Algorithm
1,206,581 UART: [idev] --
1,207,632 UART: [ldev] ++
1,207,800 UART: [ldev] CDI.KEYID = 6
1,208,164 UART: [ldev] SUBJECT.KEYID = 5
1,208,591 UART: [ldev] AUTHORITY.KEYID = 7
1,209,054 UART: [ldev] FE.KEYID = 1
1,214,490 UART: [ldev] Erasing FE.KEYID = 1
1,240,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,202 UART: [ldev] --
1,279,684 UART: [fwproc] Wait for Commands...
1,280,263 UART: [fwproc] Recv command 0x46574c44
1,280,996 UART: [fwproc] Recv'd Img size: 115196 bytes
2,588,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,912 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,221 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,781,355 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,230 ready_for_fw is high
1,055,230 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,535 >>> mbox cmd response: success
2,695,877 UART:
2,695,893 UART: Running Caliptra FMC ...
2,696,301 UART:
2,696,355 UART: [state] CFI Enabled
2,707,218 UART: [fht] FMC Alias Private Key: 7
2,814,679 UART: [art] Extend RT PCRs Done
2,815,107 UART: [art] Lock RT PCRs Done
2,816,381 UART: [art] Populate DV Done
2,824,716 UART: [fht] FMC Alias Private Key: 7
2,825,754 UART: [art] Derive CDI
2,826,034 UART: [art] Store in in slot 0x4
2,911,883 UART: [art] Derive Key Pair
2,912,243 UART: [art] Store priv key in slot 0x5
2,925,177 UART: [art] Derive Key Pair - Done
2,939,897 UART: [art] Signing Cert with AUTHO
2,940,377 UART: RITY.KEYID = 7
2,955,363 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,128 UART: [art] PUB.X = 1EE18D288A06E70252CCA5DF54F9CBCA913CCF18B828C0CFAE1D0F616A4D4DE2EE726E2DED0762F88C5D856915CFD4AF
2,962,912 UART: [art] PUB.Y = 93626B2C30FF8178B2BD8456F4353290F929BF32BED33AC47DE47E039E95A351265B2A89AA64EBAD05C7242DA275C416
2,969,860 UART: [art] SIG.R = 14AF872B76A03C62B3EFEFC0A7A7408FD10A24828B2D09A28F60A9590A765B0B518961C4AD0D6C08EFFE035B6340C628
2,976,617 UART: [art] SIG.S = 69ADA058ABBC36371819830324CFB22C7C85B6A5A35FA1A2F40674193769663A550F9CEE293BE8E99254B79F3FB7D345
3,000,285 UART: Caliptra RT
3,000,538 UART: [state] CFI Enabled
3,107,931 UART: [rt] RT listening for mailbox commands...
3,108,594 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,409 UART: [rt]cmd =0x46504c54, len=4
3,139,345 >>> mbox cmd response data (8 bytes)
3,139,476 UART: [rt] FIPS self test
3,139,804 UART: [kat] ++
3,139,956 UART: [kat] sha1
3,144,124 UART: [kat] SHA2-256
3,146,146 UART: [kat] SHA2-384
3,149,231 UART: [kat] SHA2-512-ACC
3,151,158 UART: [kat] ECC-384
3,160,556 UART: Fatal Error: 0x90040003
3,162,095 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,162,100 >>> mbox cmd response: failed
3,162,100 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,162,105 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,596 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,773 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
891,753 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,882 UART: [kat] ++
896,034 UART: [kat] sha1
900,306 UART: [kat] SHA2-256
902,246 UART: [kat] SHA2-384
905,025 UART: [kat] SHA2-512-ACC
906,926 UART: [kat] ECC-384
916,593 UART: [kat] HMAC-384Kdf
921,113 UART: [kat] LMS
1,169,425 UART: [kat] --
1,170,056 UART: [cold-reset] ++
1,170,582 UART: [fht] FHT @ 0x50003400
1,173,276 UART: [idev] ++
1,173,444 UART: [idev] CDI.KEYID = 6
1,173,805 UART: [idev] SUBJECT.KEYID = 7
1,174,230 UART: [idev] UDS.KEYID = 0
1,174,576 ready_for_fw is high
1,174,576 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,060 UART: [idev] Erasing UDS.KEYID = 0
1,198,822 UART: [idev] Sha1 KeyId Algorithm
1,207,722 UART: [idev] --
1,208,867 UART: [ldev] ++
1,209,035 UART: [ldev] CDI.KEYID = 6
1,209,399 UART: [ldev] SUBJECT.KEYID = 5
1,209,826 UART: [ldev] AUTHORITY.KEYID = 7
1,210,289 UART: [ldev] FE.KEYID = 1
1,215,695 UART: [ldev] Erasing FE.KEYID = 1
1,241,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,509 UART: [ldev] --
1,280,971 UART: [fwproc] Wait for Commands...
1,281,696 UART: [fwproc] Recv command 0x46574c44
1,282,429 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,565 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,874 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,006 >>> mbox cmd response: success
2,785,257 UART: [afmc] ++
2,785,425 UART: [afmc] CDI.KEYID = 6
2,785,788 UART: [afmc] SUBJECT.KEYID = 7
2,786,214 UART: [afmc] AUTHORITY.KEYID = 5
2,821,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,791 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,542 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,271 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,154 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,873 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,504 UART: [afmc] --
2,864,616 UART: [cold-reset] --
2,865,410 UART: [state] Locking Datavault
2,866,471 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,075 UART: [state] Locking ICCM
2,867,701 UART: [exit] Launching FMC @ 0x40000130
2,873,030 UART:
2,873,046 UART: Running Caliptra FMC ...
2,873,454 UART:
2,873,597 UART: [state] CFI Enabled
2,884,252 UART: [fht] FMC Alias Private Key: 7
2,992,925 UART: [art] Extend RT PCRs Done
2,993,353 UART: [art] Lock RT PCRs Done
2,995,121 UART: [art] Populate DV Done
3,003,398 UART: [fht] FMC Alias Private Key: 7
3,004,340 UART: [art] Derive CDI
3,004,620 UART: [art] Store in in slot 0x4
3,090,203 UART: [art] Derive Key Pair
3,090,563 UART: [art] Store priv key in slot 0x5
3,103,965 UART: [art] Derive Key Pair - Done
3,118,659 UART: [art] Signing Cert with AUTHO
3,119,139 UART: RITY.KEYID = 7
3,133,895 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,660 UART: [art] PUB.X = 48ACD18EB0CA98249805113F217923BFF96A5E09FF0A8C5D380C0E1B25D31F0DC0A0C7686A52271EF77A7E5F92CBE822
3,141,422 UART: [art] PUB.Y = EB0A22FA458B6813CB3681986FA06FFB37C072262F7443EC16BCB0DC19C56D13721100D2FF1FC42507C291B25A66A21D
3,148,350 UART: [art] SIG.R = 4957A089AB5215A1B85C80B365CF443D3523D03B9CACEEBB4541230D4D3BDB0E6DE44EBED0254CA3DE12F07D0080EEE2
3,155,110 UART: [art] SIG.S = 4BB5810536DD312BC580D8DB06F04EA8E176709D0ED4736D28E712A8C35A3F3B7A3078B8941FF0DEBE8ABE5059C9F26D
3,178,748 UART: Caliptra RT
3,179,093 UART: [state] CFI Enabled
3,286,448 UART: [rt] RT listening for mailbox commands...
3,287,111 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,210 UART: [rt]cmd =0x46504c54, len=4
3,318,324 >>> mbox cmd response data (8 bytes)
3,318,667 UART: [rt] FIPS self test
3,318,995 UART: [kat] ++
3,319,147 UART: [kat] sha1
3,323,261 UART: [kat] SHA2-256
3,325,283 UART: [kat] SHA2-384
3,328,274 UART: [kat] SHA2-512-ACC
3,330,201 UART: [kat] ECC-384
3,339,829 UART: Fatal Error: 0x90040003
3,341,368 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,341,373 >>> mbox cmd response: failed
3,341,373 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,341,378 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,454 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
891,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,464 UART: [kat] ++
895,616 UART: [kat] sha1
899,884 UART: [kat] SHA2-256
901,824 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
916,601 UART: [kat] HMAC-384Kdf
921,305 UART: [kat] LMS
1,169,617 UART: [kat] --
1,170,304 UART: [cold-reset] ++
1,170,658 UART: [fht] FHT @ 0x50003400
1,173,506 UART: [idev] ++
1,173,674 UART: [idev] CDI.KEYID = 6
1,174,035 UART: [idev] SUBJECT.KEYID = 7
1,174,460 UART: [idev] UDS.KEYID = 0
1,174,806 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,222 UART: [idev] Erasing UDS.KEYID = 0
1,199,628 UART: [idev] Sha1 KeyId Algorithm
1,208,476 UART: [idev] --
1,209,619 UART: [ldev] ++
1,209,787 UART: [ldev] CDI.KEYID = 6
1,210,151 UART: [ldev] SUBJECT.KEYID = 5
1,210,578 UART: [ldev] AUTHORITY.KEYID = 7
1,211,041 UART: [ldev] FE.KEYID = 1
1,216,439 UART: [ldev] Erasing FE.KEYID = 1
1,242,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,677 UART: [ldev] --
1,282,021 UART: [fwproc] Wait for Commands...
1,282,804 UART: [fwproc] Recv command 0x46574c44
1,283,537 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,583 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,892 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,046 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,767 ready_for_fw is high
1,056,767 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,250 >>> mbox cmd response: success
2,696,542 UART:
2,696,558 UART: Running Caliptra FMC ...
2,696,966 UART:
2,697,109 UART: [state] CFI Enabled
2,707,912 UART: [fht] FMC Alias Private Key: 7
2,815,549 UART: [art] Extend RT PCRs Done
2,815,977 UART: [art] Lock RT PCRs Done
2,817,619 UART: [art] Populate DV Done
2,825,982 UART: [fht] FMC Alias Private Key: 7
2,827,080 UART: [art] Derive CDI
2,827,360 UART: [art] Store in in slot 0x4
2,913,357 UART: [art] Derive Key Pair
2,913,717 UART: [art] Store priv key in slot 0x5
2,926,613 UART: [art] Derive Key Pair - Done
2,941,539 UART: [art] Signing Cert with AUTHO
2,942,019 UART: RITY.KEYID = 7
2,957,285 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,050 UART: [art] PUB.X = 81C50B0792FDD73219C32E16447F65DCCA7BDA4BAC9A04391AE3DAB5907DBEDEDBA7CDB6A4EA98038868755A8B4A9F8A
2,964,832 UART: [art] PUB.Y = B98FC14306D9E61A8D6E49071314E1BF68F86104B0D4CC971D54A6E5420E8843DF0B833C819FF45C53D2985CF247F621
2,971,767 UART: [art] SIG.R = 96E1FA242940FEDCC9245B4E806FBEC255F480101AC831F1F2A78985D279BCD31F678697982E55BBB71793EB56C0C766
2,978,541 UART: [art] SIG.S = CC6E3926B73FDCEF85C796B5FB2AA0E1D2F3220D99320B5488921E5A8872CB35A7D0BB39B02394C6C8BEFFB2C27BBA6F
3,002,688 UART: Caliptra RT
3,003,033 UART: [state] CFI Enabled
3,110,783 UART: [rt] RT listening for mailbox commands...
3,111,446 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,217 UART: [rt]cmd =0x46504c54, len=4
3,142,437 >>> mbox cmd response data (8 bytes)
3,142,594 UART: [rt] FIPS self test
3,142,922 UART: [kat] ++
3,143,074 UART: [kat] sha1
3,147,318 UART: [kat] SHA2-256
3,149,340 UART: [kat] SHA2-384
3,152,081 UART: [kat] SHA2-512-ACC
3,154,008 UART: [kat] ECC-384
3,163,524 UART: Fatal Error: 0x90040003
3,165,063 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,165,068 >>> mbox cmd response: failed
3,165,068 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,165,073 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,645 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,970 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 10.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,083 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,091 >>> mbox cmd response: failed
824,091 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,097 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,269 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,355 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,201 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,209 >>> mbox cmd response: failed
823,209 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,215 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,119 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,727 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,606 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,614 >>> mbox cmd response: failed
823,614 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,620 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,098 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,490 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,736 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,744 >>> mbox cmd response: failed
824,744 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,750 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,118 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,208 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,943 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,951 >>> mbox cmd response: failed
823,951 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,957 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,609 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,341 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,167 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,175 >>> mbox cmd response: failed
824,175 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,181 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,325 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,773 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,498 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,506 >>> mbox cmd response: failed
824,506 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,512 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,304 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,690 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,948 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,956 >>> mbox cmd response: failed
823,956 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,962 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,096 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,850 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,569 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,577 >>> mbox cmd response: failed
823,577 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,583 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,547 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,499 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,229 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,237 >>> mbox cmd response: failed
824,237 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,243 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,045 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,969 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,422 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,430 >>> mbox cmd response: failed
823,430 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
823,436 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,916 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,728 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,712 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,720 >>> mbox cmd response: failed
824,720 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
824,726 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,432 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,540 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,309 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,803 UART: [kat] SHA2-256
881,734 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,849 UART: [kat] ++
886,001 UART: [kat] sha1
890,387 UART: [kat] SHA2-256
892,325 UART: [kat] SHA2-384
894,938 UART: [kat] SHA2-512-ACC
896,839 UART: [kat] ECC-384
902,152 UART: [kat] HMAC-384Kdf
906,684 UART: [kat] LMS
1,474,880 UART: [kat] --
1,475,857 UART: [cold-reset] ++
1,476,293 UART: [fht] Storing FHT @ 0x50003400
1,478,958 UART: [idev] ++
1,479,126 UART: [idev] CDI.KEYID = 6
1,479,486 UART: [idev] SUBJECT.KEYID = 7
1,479,910 UART: [idev] UDS.KEYID = 0
1,480,255 ready_for_fw is high
1,480,255 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,487,634 UART: [idev] Erasing UDS.KEYID = 0
1,504,072 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,878 UART: [idev] --
1,513,741 UART: [ldev] ++
1,513,909 UART: [ldev] CDI.KEYID = 6
1,514,272 UART: [ldev] SUBJECT.KEYID = 5
1,514,698 UART: [ldev] AUTHORITY.KEYID = 7
1,515,161 UART: [ldev] FE.KEYID = 1
1,520,347 UART: [ldev] Erasing FE.KEYID = 1
1,546,136 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,148 UART: [ldev] --
1,585,479 UART: [fwproc] Waiting for Commands...
1,586,204 UART: [fwproc] Received command 0x46574c44
1,586,995 UART: [fwproc] Received Image of size 115196 bytes
2,894,859 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,911 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,263 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,458 >>> mbox cmd response: success
3,090,482 UART: [afmc] ++
3,090,650 UART: [afmc] CDI.KEYID = 6
3,091,012 UART: [afmc] SUBJECT.KEYID = 7
3,091,437 UART: [afmc] AUTHORITY.KEYID = 5
3,126,452 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,662 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,442 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,170 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,055 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,745 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,554 UART: [afmc] --
3,169,536 UART: [cold-reset] --
3,170,462 UART: [state] Locking Datavault
3,171,641 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,245 UART: [state] Locking ICCM
3,172,915 UART: [exit] Launching FMC @ 0x40000130
3,178,244 UART:
3,178,260 UART: Running Caliptra FMC ...
3,178,668 UART:
3,178,722 UART: [state] CFI Enabled
3,189,425 UART: [fht] FMC Alias Private Key: 7
3,297,442 UART: [art] Extend RT PCRs Done
3,297,870 UART: [art] Lock RT PCRs Done
3,299,528 UART: [art] Populate DV Done
3,307,713 UART: [fht] FMC Alias Private Key: 7
3,308,757 UART: [art] Derive CDI
3,309,037 UART: [art] Store in in slot 0x4
3,394,664 UART: [art] Derive Key Pair
3,395,024 UART: [art] Store priv key in slot 0x5
3,408,404 UART: [art] Derive Key Pair - Done
3,423,233 UART: [art] Signing Cert with AUTHO
3,423,713 UART: RITY.KEYID = 7
3,438,815 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,580 UART: [art] PUB.X = 9DBADA5469ACF0D3CDBA0B954FE3054BE0D13E3804779334C6BBCEBB9B4E2C48ABD6D004F9B55236CCCF4E4F0080F7E9
3,446,342 UART: [art] PUB.Y = 679FCE0440D4E2429CD81D16A856903CF42FE1D8A54E349DAEB71BF0F28EAF0218B10EE5B56C378B83A498A7F7F87BC9
3,453,297 UART: [art] SIG.R = A086A489C3958F5F7A08F1B5D1EE360EBD44BA5F300B613507762DF81A2A530677C911FC607ABE0F28CB1CE9590B4FD7
3,460,056 UART: [art] SIG.S = 7B9F53AE0B6C3C6EFF8E337333B091FB3DD391BDDBB3F109C45D1399DF3D924FF494859EC79D57851DC7380E4C24EF32
3,483,702 UART: Caliptra RT
3,483,955 UART: [state] CFI Enabled
3,592,896 UART: [rt] RT listening for mailbox commands...
3,593,559 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,512 UART: [rt]cmd =0x46504c54, len=4
3,624,772 >>> mbox cmd response data (8 bytes)
3,625,067 UART: [rt] FIPS self test
3,625,395 UART: [kat] ++
3,625,547 UART: [kat] sha1
3,629,657 UART: [kat] SHA2-256
3,631,679 UART: [kat] SHA2-384
3,634,448 UART: [kat] SHA2-512-ACC
3,636,375 UART: [kat] ECC-384
3,646,147 UART: [kat] HMAC-384Kdf
3,647,117 UART: Fatal Error: 0x90030001
3,648,656 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,648,661 >>> mbox cmd response: failed
3,648,661 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,648,666 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,433 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,079 UART: [kat] SHA2-256
882,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,125 UART: [kat] ++
886,277 UART: [kat] sha1
890,447 UART: [kat] SHA2-256
892,385 UART: [kat] SHA2-384
895,126 UART: [kat] SHA2-512-ACC
897,027 UART: [kat] ECC-384
902,772 UART: [kat] HMAC-384Kdf
907,160 UART: [kat] LMS
1,475,356 UART: [kat] --
1,476,359 UART: [cold-reset] ++
1,476,735 UART: [fht] Storing FHT @ 0x50003400
1,479,614 UART: [idev] ++
1,479,782 UART: [idev] CDI.KEYID = 6
1,480,142 UART: [idev] SUBJECT.KEYID = 7
1,480,566 UART: [idev] UDS.KEYID = 0
1,480,911 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,406 UART: [idev] Erasing UDS.KEYID = 0
1,504,980 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,430 UART: [idev] --
1,514,539 UART: [ldev] ++
1,514,707 UART: [ldev] CDI.KEYID = 6
1,515,070 UART: [ldev] SUBJECT.KEYID = 5
1,515,496 UART: [ldev] AUTHORITY.KEYID = 7
1,515,959 UART: [ldev] FE.KEYID = 1
1,521,261 UART: [ldev] Erasing FE.KEYID = 1
1,547,266 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,956 UART: [ldev] --
1,586,423 UART: [fwproc] Waiting for Commands...
1,587,050 UART: [fwproc] Received command 0x46574c44
1,587,841 UART: [fwproc] Received Image of size 115196 bytes
2,895,163 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,471 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,823 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,084 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,107 ready_for_fw is high
1,362,107 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,936,592 >>> mbox cmd response: success
2,996,986 UART:
2,997,002 UART: Running Caliptra FMC ...
2,997,410 UART:
2,997,464 UART: [state] CFI Enabled
3,007,857 UART: [fht] FMC Alias Private Key: 7
3,116,452 UART: [art] Extend RT PCRs Done
3,116,880 UART: [art] Lock RT PCRs Done
3,118,618 UART: [art] Populate DV Done
3,127,137 UART: [fht] FMC Alias Private Key: 7
3,128,221 UART: [art] Derive CDI
3,128,501 UART: [art] Store in in slot 0x4
3,213,946 UART: [art] Derive Key Pair
3,214,306 UART: [art] Store priv key in slot 0x5
3,227,298 UART: [art] Derive Key Pair - Done
3,242,272 UART: [art] Signing Cert with AUTHO
3,242,752 UART: RITY.KEYID = 7
3,257,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,258,593 UART: [art] PUB.X = 82319796ED5869C9774987616D2FC78A1C12F222272BE926D639ED0BAD57A669373C1A790F250B53F483ED6349E5B2EC
3,265,350 UART: [art] PUB.Y = 11F3BA745CFE8808A5339DE29929F0CAFDF40D957E137570E1697157DD3F7E25B7749A79D790124C6387D4763D751C93
3,272,290 UART: [art] SIG.R = C24A899D2D926FC489F2B3908DAE4EFBE8749CB4041D1603395E6C04F59912379F6CEEDEF1E6043525F97F56D314C68E
3,279,054 UART: [art] SIG.S = 02D24FA79BB9817805A99E25F69417D0D1FF1AB66A4E892FA2B67809458A0EE67EE803FC592D68969DD49971E1D7A5BA
3,302,782 UART: Caliptra RT
3,303,035 UART: [state] CFI Enabled
3,411,532 UART: [rt] RT listening for mailbox commands...
3,412,195 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,968 UART: [rt]cmd =0x46504c54, len=4
3,443,048 >>> mbox cmd response data (8 bytes)
3,443,335 UART: [rt] FIPS self test
3,443,663 UART: [kat] ++
3,443,815 UART: [kat] sha1
3,448,075 UART: [kat] SHA2-256
3,450,097 UART: [kat] SHA2-384
3,452,970 UART: [kat] SHA2-512-ACC
3,454,897 UART: [kat] ECC-384
3,464,817 UART: [kat] HMAC-384Kdf
3,465,997 UART: Fatal Error: 0x90030001
3,467,536 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,467,541 >>> mbox cmd response: failed
3,467,541 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,467,546 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,001 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,174 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,675 UART: [state] LifecycleState = Unprovisioned
86,330 UART: [state] DebugLocked = No
87,020 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,498 UART: [kat] SHA2-256
882,429 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,544 UART: [kat] ++
886,696 UART: [kat] sha1
890,970 UART: [kat] SHA2-256
892,908 UART: [kat] SHA2-384
895,829 UART: [kat] SHA2-512-ACC
897,730 UART: [kat] ECC-384
903,545 UART: [kat] HMAC-384Kdf
908,231 UART: [kat] LMS
1,476,427 UART: [kat] --
1,477,238 UART: [cold-reset] ++
1,477,682 UART: [fht] Storing FHT @ 0x50003400
1,480,415 UART: [idev] ++
1,480,583 UART: [idev] CDI.KEYID = 6
1,480,943 UART: [idev] SUBJECT.KEYID = 7
1,481,367 UART: [idev] UDS.KEYID = 0
1,481,712 ready_for_fw is high
1,481,712 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,521 UART: [idev] Erasing UDS.KEYID = 0
1,506,387 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,931 UART: [idev] --
1,515,910 UART: [ldev] ++
1,516,078 UART: [ldev] CDI.KEYID = 6
1,516,441 UART: [ldev] SUBJECT.KEYID = 5
1,516,867 UART: [ldev] AUTHORITY.KEYID = 7
1,517,330 UART: [ldev] FE.KEYID = 1
1,522,358 UART: [ldev] Erasing FE.KEYID = 1
1,547,997 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,225 UART: [ldev] --
1,587,730 UART: [fwproc] Waiting for Commands...
1,588,355 UART: [fwproc] Received command 0x46574c44
1,589,146 UART: [fwproc] Received Image of size 115196 bytes
2,897,508 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,028 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,380 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,091,499 >>> mbox cmd response: success
3,092,757 UART: [afmc] ++
3,092,925 UART: [afmc] CDI.KEYID = 6
3,093,287 UART: [afmc] SUBJECT.KEYID = 7
3,093,712 UART: [afmc] AUTHORITY.KEYID = 5
3,128,877 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,899 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,679 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,407 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,292 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,982 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,701 UART: [afmc] --
3,171,761 UART: [cold-reset] --
3,172,623 UART: [state] Locking Datavault
3,174,110 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,714 UART: [state] Locking ICCM
3,175,384 UART: [exit] Launching FMC @ 0x40000130
3,180,713 UART:
3,180,729 UART: Running Caliptra FMC ...
3,181,137 UART:
3,181,280 UART: [state] CFI Enabled
3,191,965 UART: [fht] FMC Alias Private Key: 7
3,300,228 UART: [art] Extend RT PCRs Done
3,300,656 UART: [art] Lock RT PCRs Done
3,302,232 UART: [art] Populate DV Done
3,310,349 UART: [fht] FMC Alias Private Key: 7
3,311,277 UART: [art] Derive CDI
3,311,557 UART: [art] Store in in slot 0x4
3,397,332 UART: [art] Derive Key Pair
3,397,692 UART: [art] Store priv key in slot 0x5
3,411,548 UART: [art] Derive Key Pair - Done
3,426,375 UART: [art] Signing Cert with AUTHO
3,426,855 UART: RITY.KEYID = 7
3,442,187 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,952 UART: [art] PUB.X = 39E0853F84833CD822502A41F93CA5DE15CD61C92E12F430AD5B8E226340AB42390FCE6A02270F18D772168E7F4F2DDF
3,449,717 UART: [art] PUB.Y = 9EDD988FBFAED9B17B6A62F7F7BFDFB94B23824F3BC3763387BF002EC93A15626500738C7B7F0F18F3784C4389A9BAAC
3,456,636 UART: [art] SIG.R = 67D80D359CD3A92677B9CBA24B35F0453C1AEC941ED1ABBD7A6CF110E0882CCDE4F37DEA8D238B075110794DFBE0621E
3,463,418 UART: [art] SIG.S = 91449E9ACFAFDB8F218D534C4955F6F87CE7E326F95666A03E45A19E6B1D07AF94E57467546B37D0644D70BB7BAE8506
3,487,467 UART: Caliptra RT
3,487,812 UART: [state] CFI Enabled
3,595,687 UART: [rt] RT listening for mailbox commands...
3,596,350 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,887 UART: [rt]cmd =0x46504c54, len=4
3,627,233 >>> mbox cmd response data (8 bytes)
3,627,368 UART: [rt] FIPS self test
3,627,696 UART: [kat] ++
3,627,848 UART: [kat] sha1
3,632,054 UART: [kat] SHA2-256
3,634,076 UART: [kat] SHA2-384
3,636,959 UART: [kat] SHA2-512-ACC
3,638,886 UART: [kat] ECC-384
3,648,776 UART: [kat] HMAC-384Kdf
3,649,784 UART: Fatal Error: 0x90030001
3,651,323 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,651,328 >>> mbox cmd response: failed
3,651,328 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,651,333 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,650 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,202 UART: [kat] SHA2-256
882,133 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,248 UART: [kat] ++
886,400 UART: [kat] sha1
890,488 UART: [kat] SHA2-256
892,426 UART: [kat] SHA2-384
895,191 UART: [kat] SHA2-512-ACC
897,092 UART: [kat] ECC-384
902,785 UART: [kat] HMAC-384Kdf
907,237 UART: [kat] LMS
1,475,433 UART: [kat] --
1,476,030 UART: [cold-reset] ++
1,476,414 UART: [fht] Storing FHT @ 0x50003400
1,479,209 UART: [idev] ++
1,479,377 UART: [idev] CDI.KEYID = 6
1,479,737 UART: [idev] SUBJECT.KEYID = 7
1,480,161 UART: [idev] UDS.KEYID = 0
1,480,506 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,723 UART: [idev] Erasing UDS.KEYID = 0
1,505,193 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,837 UART: [idev] --
1,514,970 UART: [ldev] ++
1,515,138 UART: [ldev] CDI.KEYID = 6
1,515,501 UART: [ldev] SUBJECT.KEYID = 5
1,515,927 UART: [ldev] AUTHORITY.KEYID = 7
1,516,390 UART: [ldev] FE.KEYID = 1
1,521,582 UART: [ldev] Erasing FE.KEYID = 1
1,546,863 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,015 UART: [ldev] --
1,586,476 UART: [fwproc] Waiting for Commands...
1,587,281 UART: [fwproc] Received command 0x46574c44
1,588,072 UART: [fwproc] Received Image of size 115196 bytes
2,895,906 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,428 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,780 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,823 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,478 ready_for_fw is high
1,362,478 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,607 >>> mbox cmd response: success
3,000,121 UART:
3,000,137 UART: Running Caliptra FMC ...
3,000,545 UART:
3,000,688 UART: [state] CFI Enabled
3,011,213 UART: [fht] FMC Alias Private Key: 7
3,118,804 UART: [art] Extend RT PCRs Done
3,119,232 UART: [art] Lock RT PCRs Done
3,120,830 UART: [art] Populate DV Done
3,128,791 UART: [fht] FMC Alias Private Key: 7
3,129,867 UART: [art] Derive CDI
3,130,147 UART: [art] Store in in slot 0x4
3,216,054 UART: [art] Derive Key Pair
3,216,414 UART: [art] Store priv key in slot 0x5
3,229,704 UART: [art] Derive Key Pair - Done
3,244,435 UART: [art] Signing Cert with AUTHO
3,244,915 UART: RITY.KEYID = 7
3,259,885 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,650 UART: [art] PUB.X = 6EAE1A24C979FDD1A57A09254808977794D55A59AE30AA0580EF4E8AD28E11340526D0242BB0399EE6E999F00F7B540D
3,267,404 UART: [art] PUB.Y = FBB1213B1134F0B1751C74765284DA9A32D9DE116EFFE71C9BAC71D95FE650949C7EB68C51F5AF3B8C50684D6A0FBEC0
3,274,367 UART: [art] SIG.R = 6AA58DE85158060808A2F4E79AE26C1F7A60D0F5233A4DB7492034142EBA8A037A52EB02E7269CCC2CE5810B8AC7DF06
3,281,124 UART: [art] SIG.S = 29AEC73B61D5E19079546F8BA1810ED891AE67B59AF3070DFF0AA9987165899C6DB1CB37A58C9F3B373327D09FBBB77D
3,304,987 UART: Caliptra RT
3,305,332 UART: [state] CFI Enabled
3,414,630 UART: [rt] RT listening for mailbox commands...
3,415,293 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,132 UART: [rt]cmd =0x46504c54, len=4
3,446,308 >>> mbox cmd response data (8 bytes)
3,446,609 UART: [rt] FIPS self test
3,446,937 UART: [kat] ++
3,447,089 UART: [kat] sha1
3,451,153 UART: [kat] SHA2-256
3,453,175 UART: [kat] SHA2-384
3,456,048 UART: [kat] SHA2-512-ACC
3,457,975 UART: [kat] ECC-384
3,468,213 UART: [kat] HMAC-384Kdf
3,469,259 UART: Fatal Error: 0x90030001
3,470,798 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,470,803 >>> mbox cmd response: failed
3,470,803 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,470,808 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,618 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,677 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,109 UART: [state] WD Timer not started. Device not locked for debugging
87,340 UART: [kat] SHA2-256
892,990 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,115 UART: [kat] ++
897,267 UART: [kat] sha1
901,539 UART: [kat] SHA2-256
903,479 UART: [kat] SHA2-384
906,264 UART: [kat] SHA2-512-ACC
908,165 UART: [kat] ECC-384
917,230 UART: [kat] HMAC-384Kdf
921,876 UART: [kat] LMS
1,170,204 UART: [kat] --
1,171,287 UART: [cold-reset] ++
1,171,841 UART: [fht] FHT @ 0x50003400
1,174,412 UART: [idev] ++
1,174,580 UART: [idev] CDI.KEYID = 6
1,174,940 UART: [idev] SUBJECT.KEYID = 7
1,175,364 UART: [idev] UDS.KEYID = 0
1,175,709 ready_for_fw is high
1,175,709 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,480 UART: [idev] Erasing UDS.KEYID = 0
1,200,703 UART: [idev] Sha1 KeyId Algorithm
1,209,217 UART: [idev] --
1,210,271 UART: [ldev] ++
1,210,439 UART: [ldev] CDI.KEYID = 6
1,210,802 UART: [ldev] SUBJECT.KEYID = 5
1,211,228 UART: [ldev] AUTHORITY.KEYID = 7
1,211,691 UART: [ldev] FE.KEYID = 1
1,216,623 UART: [ldev] Erasing FE.KEYID = 1
1,242,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,959 UART: [ldev] --
1,282,300 UART: [fwproc] Wait for Commands...
1,282,994 UART: [fwproc] Recv command 0x46574c44
1,283,722 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,129 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,026 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,330 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,339 >>> mbox cmd response: success
2,785,351 UART: [afmc] ++
2,785,519 UART: [afmc] CDI.KEYID = 6
2,785,881 UART: [afmc] SUBJECT.KEYID = 7
2,786,306 UART: [afmc] AUTHORITY.KEYID = 5
2,821,911 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,906 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,654 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,382 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,267 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,986 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,874 UART: [afmc] --
2,864,908 UART: [cold-reset] --
2,865,678 UART: [state] Locking Datavault
2,866,729 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,333 UART: [state] Locking ICCM
2,867,879 UART: [exit] Launching FMC @ 0x40000130
2,873,208 UART:
2,873,224 UART: Running Caliptra FMC ...
2,873,632 UART:
2,873,686 UART: [state] CFI Enabled
2,884,063 UART: [fht] FMC Alias Private Key: 7
2,992,050 UART: [art] Extend RT PCRs Done
2,992,478 UART: [art] Lock RT PCRs Done
2,994,168 UART: [art] Populate DV Done
3,002,283 UART: [fht] FMC Alias Private Key: 7
3,003,455 UART: [art] Derive CDI
3,003,735 UART: [art] Store in in slot 0x4
3,089,526 UART: [art] Derive Key Pair
3,089,886 UART: [art] Store priv key in slot 0x5
3,103,388 UART: [art] Derive Key Pair - Done
3,117,994 UART: [art] Signing Cert with AUTHO
3,118,474 UART: RITY.KEYID = 7
3,133,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,497 UART: [art] PUB.X = BB0C342BD24C703D849EF641400CA7BD0E5FB2E44B0C5DDD56BEAED6F89FEA2613A2B146609180D109F224D50216BCE9
3,141,265 UART: [art] PUB.Y = 85C528209107E545078CCF48D24319222F2EE1565C35494D9F1071FB9CDDC30D6F08EEE9E56FABCC7E520F96C2112271
3,148,202 UART: [art] SIG.R = BAF571AA2C2588A0EB3A637F37F8FD69A0822B5259EE6061E97B5AABD4DA04160208EA01900FE44A9BE0238FD5E8DF5D
3,154,973 UART: [art] SIG.S = 1DFDBA12A4FAB01190A5E1FDC361D2FFAB69E273A7EFD1A36995DCEC860AF0BC6AF37950E70C3F3C537CCE815351B41B
3,178,940 UART: Caliptra RT
3,179,193 UART: [state] CFI Enabled
3,287,526 UART: [rt] RT listening for mailbox commands...
3,288,189 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,836 UART: [rt]cmd =0x46504c54, len=4
3,318,810 >>> mbox cmd response data (8 bytes)
3,319,027 UART: [rt] FIPS self test
3,319,355 UART: [kat] ++
3,319,507 UART: [kat] sha1
3,323,853 UART: [kat] SHA2-256
3,325,875 UART: [kat] SHA2-384
3,328,676 UART: [kat] SHA2-512-ACC
3,330,603 UART: [kat] ECC-384
3,340,539 UART: [kat] HMAC-384Kdf
3,341,327 UART: Fatal Error: 0x90030001
3,342,866 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,342,871 >>> mbox cmd response: failed
3,342,871 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,342,876 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
893,272 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,397 UART: [kat] ++
897,549 UART: [kat] sha1
901,925 UART: [kat] SHA2-256
903,865 UART: [kat] SHA2-384
906,498 UART: [kat] SHA2-512-ACC
908,399 UART: [kat] ECC-384
917,770 UART: [kat] HMAC-384Kdf
922,362 UART: [kat] LMS
1,170,690 UART: [kat] --
1,171,405 UART: [cold-reset] ++
1,171,911 UART: [fht] FHT @ 0x50003400
1,174,520 UART: [idev] ++
1,174,688 UART: [idev] CDI.KEYID = 6
1,175,048 UART: [idev] SUBJECT.KEYID = 7
1,175,472 UART: [idev] UDS.KEYID = 0
1,175,817 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,672 UART: [idev] Erasing UDS.KEYID = 0
1,200,605 UART: [idev] Sha1 KeyId Algorithm
1,209,129 UART: [idev] --
1,210,265 UART: [ldev] ++
1,210,433 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,222 UART: [ldev] AUTHORITY.KEYID = 7
1,211,685 UART: [ldev] FE.KEYID = 1
1,216,813 UART: [ldev] Erasing FE.KEYID = 1
1,242,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,617 UART: [ldev] --
1,281,994 UART: [fwproc] Wait for Commands...
1,282,708 UART: [fwproc] Recv command 0x46574c44
1,283,436 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,534 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,838 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,013 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,585 ready_for_fw is high
1,060,585 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,142 >>> mbox cmd response: success
2,699,724 UART:
2,699,740 UART: Running Caliptra FMC ...
2,700,148 UART:
2,700,202 UART: [state] CFI Enabled
2,710,579 UART: [fht] FMC Alias Private Key: 7
2,818,300 UART: [art] Extend RT PCRs Done
2,818,728 UART: [art] Lock RT PCRs Done
2,820,162 UART: [art] Populate DV Done
2,828,173 UART: [fht] FMC Alias Private Key: 7
2,829,333 UART: [art] Derive CDI
2,829,613 UART: [art] Store in in slot 0x4
2,915,076 UART: [art] Derive Key Pair
2,915,436 UART: [art] Store priv key in slot 0x5
2,928,134 UART: [art] Derive Key Pair - Done
2,943,003 UART: [art] Signing Cert with AUTHO
2,943,483 UART: RITY.KEYID = 7
2,958,787 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,552 UART: [art] PUB.X = C5B3395B54C62CCCC5BF6F1B5CCECF6194C466017D124A7CC8D9F53CB904150CAC829CC3E27FF29DB2FAE08D987B5426
2,966,333 UART: [art] PUB.Y = 417948A91E1D975214ED7B4D47AF22DA096C52CDE38FF3F6998FB0BAE05FFF9849C39ACBB3CFE8016E53E3B9CB9373FA
2,973,297 UART: [art] SIG.R = 3F3B00E9ABC2BC368FDC55E1C604CE761E7C0BD564DBF15B312BBED2F814E19CF2FCDF051CEB9AF42FB04B230B6CC909
2,980,060 UART: [art] SIG.S = 7F3A7017E3F011FD5E5768E0759D5B1A74CE9BBA7911E98A3BAFED2A00D65FEDD510B76BDF41BB1076D35A446E738A6D
3,003,901 UART: Caliptra RT
3,004,154 UART: [state] CFI Enabled
3,112,391 UART: [rt] RT listening for mailbox commands...
3,113,054 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,907 UART: [rt]cmd =0x46504c54, len=4
3,144,167 >>> mbox cmd response data (8 bytes)
3,144,284 UART: [rt] FIPS self test
3,144,612 UART: [kat] ++
3,144,764 UART: [kat] sha1
3,148,922 UART: [kat] SHA2-256
3,150,944 UART: [kat] SHA2-384
3,153,935 UART: [kat] SHA2-512-ACC
3,155,862 UART: [kat] ECC-384
3,166,050 UART: [kat] HMAC-384Kdf
3,167,094 UART: Fatal Error: 0x90030001
3,168,633 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,168,638 >>> mbox cmd response: failed
3,168,638 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,168,643 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,119 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,322 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
893,347 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,472 UART: [kat] ++
897,624 UART: [kat] sha1
901,788 UART: [kat] SHA2-256
903,728 UART: [kat] SHA2-384
906,489 UART: [kat] SHA2-512-ACC
908,390 UART: [kat] ECC-384
917,935 UART: [kat] HMAC-384Kdf
922,691 UART: [kat] LMS
1,171,019 UART: [kat] --
1,172,034 UART: [cold-reset] ++
1,172,366 UART: [fht] FHT @ 0x50003400
1,174,883 UART: [idev] ++
1,175,051 UART: [idev] CDI.KEYID = 6
1,175,411 UART: [idev] SUBJECT.KEYID = 7
1,175,835 UART: [idev] UDS.KEYID = 0
1,176,180 ready_for_fw is high
1,176,180 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,519 UART: [idev] Erasing UDS.KEYID = 0
1,201,006 UART: [idev] Sha1 KeyId Algorithm
1,209,470 UART: [idev] --
1,210,474 UART: [ldev] ++
1,210,642 UART: [ldev] CDI.KEYID = 6
1,211,005 UART: [ldev] SUBJECT.KEYID = 5
1,211,431 UART: [ldev] AUTHORITY.KEYID = 7
1,211,894 UART: [ldev] FE.KEYID = 1
1,217,002 UART: [ldev] Erasing FE.KEYID = 1
1,243,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,986 UART: [ldev] --
1,282,251 UART: [fwproc] Wait for Commands...
1,282,913 UART: [fwproc] Recv command 0x46574c44
1,283,641 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,057 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,361 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,350 >>> mbox cmd response: success
2,785,480 UART: [afmc] ++
2,785,648 UART: [afmc] CDI.KEYID = 6
2,786,010 UART: [afmc] SUBJECT.KEYID = 7
2,786,435 UART: [afmc] AUTHORITY.KEYID = 5
2,821,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,071 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,819 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,547 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,432 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,151 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,949 UART: [afmc] --
2,865,043 UART: [cold-reset] --
2,865,821 UART: [state] Locking Datavault
2,867,082 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,686 UART: [state] Locking ICCM
2,868,316 UART: [exit] Launching FMC @ 0x40000130
2,873,645 UART:
2,873,661 UART: Running Caliptra FMC ...
2,874,069 UART:
2,874,212 UART: [state] CFI Enabled
2,884,463 UART: [fht] FMC Alias Private Key: 7
2,992,906 UART: [art] Extend RT PCRs Done
2,993,334 UART: [art] Lock RT PCRs Done
2,994,960 UART: [art] Populate DV Done
3,002,903 UART: [fht] FMC Alias Private Key: 7
3,003,975 UART: [art] Derive CDI
3,004,255 UART: [art] Store in in slot 0x4
3,090,148 UART: [art] Derive Key Pair
3,090,508 UART: [art] Store priv key in slot 0x5
3,103,812 UART: [art] Derive Key Pair - Done
3,118,725 UART: [art] Signing Cert with AUTHO
3,119,205 UART: RITY.KEYID = 7
3,134,679 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,444 UART: [art] PUB.X = 7794593255EDD9F5553B57F4E9019E9ED79F6AB31C5B159FFEED557DAB7E08EBF6855A54CF5ED2932C00A87ACF2D0D69
3,142,199 UART: [art] PUB.Y = C8A74DA84F645DC069757E351FDF81075483BA7814F23024AAB571B9197DC57B8C550A6AC44090F606191B1AE15A2AB6
3,149,142 UART: [art] SIG.R = 0AECF54BC96F5EC7E81BD35FB7CF8BEDAA4535D582E54E2A5E6093508771B1AF81510A3FDF88EA12DDC3148D66EA1D03
3,155,925 UART: [art] SIG.S = 5C6299E727C469A37C100E9C91CEE62458A10F27EBB5E7EAFA7D729A55366DF3609255C44DA5550582BA57D49A020ED3
3,179,707 UART: Caliptra RT
3,180,052 UART: [state] CFI Enabled
3,288,473 UART: [rt] RT listening for mailbox commands...
3,289,136 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,775 UART: [rt]cmd =0x46504c54, len=4
3,319,887 >>> mbox cmd response data (8 bytes)
3,320,076 UART: [rt] FIPS self test
3,320,404 UART: [kat] ++
3,320,556 UART: [kat] sha1
3,324,762 UART: [kat] SHA2-256
3,326,784 UART: [kat] SHA2-384
3,329,643 UART: [kat] SHA2-512-ACC
3,331,570 UART: [kat] ECC-384
3,342,016 UART: [kat] HMAC-384Kdf
3,342,890 UART: Fatal Error: 0x90030001
3,344,429 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,344,434 >>> mbox cmd response: failed
3,344,434 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,344,439 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
893,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,626 UART: [kat] ++
897,778 UART: [kat] sha1
901,992 UART: [kat] SHA2-256
903,932 UART: [kat] SHA2-384
906,685 UART: [kat] SHA2-512-ACC
908,586 UART: [kat] ECC-384
918,717 UART: [kat] HMAC-384Kdf
923,403 UART: [kat] LMS
1,171,731 UART: [kat] --
1,172,604 UART: [cold-reset] ++
1,172,952 UART: [fht] FHT @ 0x50003400
1,175,617 UART: [idev] ++
1,175,785 UART: [idev] CDI.KEYID = 6
1,176,145 UART: [idev] SUBJECT.KEYID = 7
1,176,569 UART: [idev] UDS.KEYID = 0
1,176,914 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,331 UART: [idev] Erasing UDS.KEYID = 0
1,201,344 UART: [idev] Sha1 KeyId Algorithm
1,209,782 UART: [idev] --
1,210,982 UART: [ldev] ++
1,211,150 UART: [ldev] CDI.KEYID = 6
1,211,513 UART: [ldev] SUBJECT.KEYID = 5
1,211,939 UART: [ldev] AUTHORITY.KEYID = 7
1,212,402 UART: [ldev] FE.KEYID = 1
1,217,332 UART: [ldev] Erasing FE.KEYID = 1
1,243,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,020 UART: [ldev] --
1,282,305 UART: [fwproc] Wait for Commands...
1,282,945 UART: [fwproc] Recv command 0x46574c44
1,283,673 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,250 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,435 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,739 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,726 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,554 ready_for_fw is high
1,061,554 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,691 >>> mbox cmd response: success
2,699,723 UART:
2,699,739 UART: Running Caliptra FMC ...
2,700,147 UART:
2,700,290 UART: [state] CFI Enabled
2,710,985 UART: [fht] FMC Alias Private Key: 7
2,819,290 UART: [art] Extend RT PCRs Done
2,819,718 UART: [art] Lock RT PCRs Done
2,821,106 UART: [art] Populate DV Done
2,829,385 UART: [fht] FMC Alias Private Key: 7
2,830,511 UART: [art] Derive CDI
2,830,791 UART: [art] Store in in slot 0x4
2,916,980 UART: [art] Derive Key Pair
2,917,340 UART: [art] Store priv key in slot 0x5
2,931,142 UART: [art] Derive Key Pair - Done
2,945,892 UART: [art] Signing Cert with AUTHO
2,946,372 UART: RITY.KEYID = 7
2,961,236 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,001 UART: [art] PUB.X = 4CB8AEBC70169C0E1B138DF8496FEEF167C2A1EBC2602B30928AC7B378F23961DFF492F604CAA159FF19FEAF92C501D0
2,968,780 UART: [art] PUB.Y = 4298279DC31EBDAFC22FBB70CD9E73A8D5DD4F733B32F608EF63C2FD9059DA71B146055F52874914B3699EEC704D1610
2,975,732 UART: [art] SIG.R = 0087CBEB71AD614DE8041CB3E3B331382F9F359E3C3F1BD293A05E11749F02CD1713322408A716B2ABCB1EE3203AF2F3
2,982,479 UART: [art] SIG.S = EF91953DD1FF26F34845BB1F98CA3898E0F813D2B0001C539AEE9B964B28FE47BE10421A0F60A62D5D70F0C8E1B6AD1C
3,006,467 UART: Caliptra RT
3,006,812 UART: [state] CFI Enabled
3,114,838 UART: [rt] RT listening for mailbox commands...
3,115,501 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,126 UART: [rt]cmd =0x46504c54, len=4
3,146,160 >>> mbox cmd response data (8 bytes)
3,146,495 UART: [rt] FIPS self test
3,146,823 UART: [kat] ++
3,146,975 UART: [kat] sha1
3,151,237 UART: [kat] SHA2-256
3,153,259 UART: [kat] SHA2-384
3,156,038 UART: [kat] SHA2-512-ACC
3,157,965 UART: [kat] ECC-384
3,167,589 UART: [kat] HMAC-384Kdf
3,168,617 UART: Fatal Error: 0x90030001
3,170,156 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,170,161 >>> mbox cmd response: failed
3,170,161 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,170,166 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,452 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,455 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,910 UART: [kat] SHA2-256
891,460 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,589 UART: [kat] ++
895,741 UART: [kat] sha1
899,947 UART: [kat] SHA2-256
901,887 UART: [kat] SHA2-384
904,578 UART: [kat] SHA2-512-ACC
906,479 UART: [kat] ECC-384
916,044 UART: [kat] HMAC-384Kdf
920,690 UART: [kat] LMS
1,169,002 UART: [kat] --
1,170,069 UART: [cold-reset] ++
1,170,405 UART: [fht] FHT @ 0x50003400
1,173,123 UART: [idev] ++
1,173,291 UART: [idev] CDI.KEYID = 6
1,173,652 UART: [idev] SUBJECT.KEYID = 7
1,174,077 UART: [idev] UDS.KEYID = 0
1,174,423 ready_for_fw is high
1,174,423 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,325 UART: [idev] Erasing UDS.KEYID = 0
1,199,555 UART: [idev] Sha1 KeyId Algorithm
1,208,379 UART: [idev] --
1,209,482 UART: [ldev] ++
1,209,650 UART: [ldev] CDI.KEYID = 6
1,210,014 UART: [ldev] SUBJECT.KEYID = 5
1,210,441 UART: [ldev] AUTHORITY.KEYID = 7
1,210,904 UART: [ldev] FE.KEYID = 1
1,215,972 UART: [ldev] Erasing FE.KEYID = 1
1,241,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,126 UART: [ldev] --
1,281,488 UART: [fwproc] Wait for Commands...
1,282,253 UART: [fwproc] Recv command 0x46574c44
1,282,986 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,104 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,413 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,451 >>> mbox cmd response: success
2,785,608 UART: [afmc] ++
2,785,776 UART: [afmc] CDI.KEYID = 6
2,786,139 UART: [afmc] SUBJECT.KEYID = 7
2,786,565 UART: [afmc] AUTHORITY.KEYID = 5
2,821,902 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,861 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,590 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,473 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,192 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,071 UART: [afmc] --
2,865,081 UART: [cold-reset] --
2,865,749 UART: [state] Locking Datavault
2,866,782 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,386 UART: [state] Locking ICCM
2,868,018 UART: [exit] Launching FMC @ 0x40000130
2,873,347 UART:
2,873,363 UART: Running Caliptra FMC ...
2,873,771 UART:
2,873,825 UART: [state] CFI Enabled
2,884,192 UART: [fht] FMC Alias Private Key: 7
2,992,535 UART: [art] Extend RT PCRs Done
2,992,963 UART: [art] Lock RT PCRs Done
2,994,507 UART: [art] Populate DV Done
3,002,590 UART: [fht] FMC Alias Private Key: 7
3,003,632 UART: [art] Derive CDI
3,003,912 UART: [art] Store in in slot 0x4
3,089,489 UART: [art] Derive Key Pair
3,089,849 UART: [art] Store priv key in slot 0x5
3,103,049 UART: [art] Derive Key Pair - Done
3,117,827 UART: [art] Signing Cert with AUTHO
3,118,307 UART: RITY.KEYID = 7
3,133,367 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,132 UART: [art] PUB.X = 6623EE286C9111E4DF5F148270B5413E0D78C6E8F9F36E1023508740C320360E92EBC43D3764627AE31FF52BA1514E98
3,140,890 UART: [art] PUB.Y = 64E9A8E9B97217DE953CC1C24C3C8952C892A163E4326F13543CA584366F37EEFD23399A4522C133A90B398CC0F8ADDC
3,147,841 UART: [art] SIG.R = B2B050DA282245226EDE3FDF64A6BD40366A813B46436B5ED1A5D7C9CD561BDBD67621AAC963686AB2C2C5BA9248C4AB
3,154,627 UART: [art] SIG.S = ACB1ACD296D8E6A6341AAD463C8C04DF846A6EE081D4CAACD0E223DDB3B379A50C1F00B7E6DBAB9D91FA52AE6ACD6316
3,177,678 UART: Caliptra RT
3,177,931 UART: [state] CFI Enabled
3,285,225 UART: [rt] RT listening for mailbox commands...
3,285,888 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,673 UART: [rt]cmd =0x46504c54, len=4
3,316,985 >>> mbox cmd response data (8 bytes)
3,317,266 UART: [rt] FIPS self test
3,317,594 UART: [kat] ++
3,317,746 UART: [kat] sha1
3,321,834 UART: [kat] SHA2-256
3,323,856 UART: [kat] SHA2-384
3,326,779 UART: [kat] SHA2-512-ACC
3,328,706 UART: [kat] ECC-384
3,338,920 UART: [kat] HMAC-384Kdf
3,339,906 UART: Fatal Error: 0x90030001
3,341,445 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,341,450 >>> mbox cmd response: failed
3,341,450 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,341,455 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
891,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,491 UART: [kat] ++
895,643 UART: [kat] sha1
899,727 UART: [kat] SHA2-256
901,667 UART: [kat] SHA2-384
904,550 UART: [kat] SHA2-512-ACC
906,451 UART: [kat] ECC-384
916,114 UART: [kat] HMAC-384Kdf
920,782 UART: [kat] LMS
1,169,094 UART: [kat] --
1,170,119 UART: [cold-reset] ++
1,170,469 UART: [fht] FHT @ 0x50003400
1,173,123 UART: [idev] ++
1,173,291 UART: [idev] CDI.KEYID = 6
1,173,652 UART: [idev] SUBJECT.KEYID = 7
1,174,077 UART: [idev] UDS.KEYID = 0
1,174,423 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,877 UART: [idev] Erasing UDS.KEYID = 0
1,198,241 UART: [idev] Sha1 KeyId Algorithm
1,207,055 UART: [idev] --
1,208,082 UART: [ldev] ++
1,208,250 UART: [ldev] CDI.KEYID = 6
1,208,614 UART: [ldev] SUBJECT.KEYID = 5
1,209,041 UART: [ldev] AUTHORITY.KEYID = 7
1,209,504 UART: [ldev] FE.KEYID = 1
1,214,932 UART: [ldev] Erasing FE.KEYID = 1
1,240,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,502 UART: [ldev] --
1,279,946 UART: [fwproc] Wait for Commands...
1,280,585 UART: [fwproc] Recv command 0x46574c44
1,281,318 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,246 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,555 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,685 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,772 ready_for_fw is high
1,056,772 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,343 >>> mbox cmd response: success
2,695,725 UART:
2,695,741 UART: Running Caliptra FMC ...
2,696,149 UART:
2,696,203 UART: [state] CFI Enabled
2,706,372 UART: [fht] FMC Alias Private Key: 7
2,814,093 UART: [art] Extend RT PCRs Done
2,814,521 UART: [art] Lock RT PCRs Done
2,816,163 UART: [art] Populate DV Done
2,824,384 UART: [fht] FMC Alias Private Key: 7
2,825,536 UART: [art] Derive CDI
2,825,816 UART: [art] Store in in slot 0x4
2,911,463 UART: [art] Derive Key Pair
2,911,823 UART: [art] Store priv key in slot 0x5
2,925,599 UART: [art] Derive Key Pair - Done
2,940,618 UART: [art] Signing Cert with AUTHO
2,941,098 UART: RITY.KEYID = 7
2,956,276 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,041 UART: [art] PUB.X = 696726842C8D76B259EC5C08AB749E7F64ED9C25F0D03CA35F12FB2A721BDB36977403C6AF1414122F6FB68C88288EE0
2,963,809 UART: [art] PUB.Y = 5113FEC86661C86CAB5877A683BBE4B27A355E9540A44B3B360DF641F00418C7F081229E0C03A6D72CF6CFB81CC63A3F
2,970,755 UART: [art] SIG.R = 95940F54A06902DFE6CFC469F13AE924F38B11A61A221A13589125E418D9F10ED05924792F1A2237682A584894914133
2,977,502 UART: [art] SIG.S = E5F4728FD2A14497247E33E7F87FF93FBF1537168394C762361714E8AFC603211CC3312AA6F1AD87AB81D8732D0FC985
3,001,043 UART: Caliptra RT
3,001,296 UART: [state] CFI Enabled
3,108,780 UART: [rt] RT listening for mailbox commands...
3,109,443 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,444 UART: [rt]cmd =0x46504c54, len=4
3,140,676 >>> mbox cmd response data (8 bytes)
3,140,955 UART: [rt] FIPS self test
3,141,283 UART: [kat] ++
3,141,435 UART: [kat] sha1
3,145,649 UART: [kat] SHA2-256
3,147,671 UART: [kat] SHA2-384
3,150,406 UART: [kat] SHA2-512-ACC
3,152,333 UART: [kat] ECC-384
3,162,001 UART: [kat] HMAC-384Kdf
3,162,811 UART: Fatal Error: 0x90030001
3,164,350 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,164,355 >>> mbox cmd response: failed
3,164,355 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,164,360 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,684 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,631,319 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
900,210 UART: [kat] SHA2-256
902,150 UART: [kat] SHA2-384
904,947 UART: [kat] SHA2-512-ACC
906,848 UART: [kat] ECC-384
916,643 UART: [kat] HMAC-384Kdf
921,099 UART: [kat] LMS
1,169,411 UART: [kat] --
1,170,758 UART: [cold-reset] ++
1,171,256 UART: [fht] FHT @ 0x50003400
1,174,036 UART: [idev] ++
1,174,204 UART: [idev] CDI.KEYID = 6
1,174,565 UART: [idev] SUBJECT.KEYID = 7
1,174,990 UART: [idev] UDS.KEYID = 0
1,175,336 ready_for_fw is high
1,175,336 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,394 UART: [idev] Erasing UDS.KEYID = 0
1,199,636 UART: [idev] Sha1 KeyId Algorithm
1,208,588 UART: [idev] --
1,209,807 UART: [ldev] ++
1,209,975 UART: [ldev] CDI.KEYID = 6
1,210,339 UART: [ldev] SUBJECT.KEYID = 5
1,210,766 UART: [ldev] AUTHORITY.KEYID = 7
1,211,229 UART: [ldev] FE.KEYID = 1
1,216,395 UART: [ldev] Erasing FE.KEYID = 1
1,242,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,745 UART: [ldev] --
1,282,171 UART: [fwproc] Wait for Commands...
1,282,812 UART: [fwproc] Recv command 0x46574c44
1,283,545 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,249 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,303 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,612 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,764 >>> mbox cmd response: success
2,786,979 UART: [afmc] ++
2,787,147 UART: [afmc] CDI.KEYID = 6
2,787,510 UART: [afmc] SUBJECT.KEYID = 7
2,787,936 UART: [afmc] AUTHORITY.KEYID = 5
2,823,851 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,159 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,910 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,639 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,522 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,241 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,102 UART: [afmc] --
2,867,060 UART: [cold-reset] --
2,867,864 UART: [state] Locking Datavault
2,869,113 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,717 UART: [state] Locking ICCM
2,870,291 UART: [exit] Launching FMC @ 0x40000130
2,875,620 UART:
2,875,636 UART: Running Caliptra FMC ...
2,876,044 UART:
2,876,187 UART: [state] CFI Enabled
2,886,648 UART: [fht] FMC Alias Private Key: 7
2,994,153 UART: [art] Extend RT PCRs Done
2,994,581 UART: [art] Lock RT PCRs Done
2,995,987 UART: [art] Populate DV Done
3,004,098 UART: [fht] FMC Alias Private Key: 7
3,005,108 UART: [art] Derive CDI
3,005,388 UART: [art] Store in in slot 0x4
3,091,295 UART: [art] Derive Key Pair
3,091,655 UART: [art] Store priv key in slot 0x5
3,104,455 UART: [art] Derive Key Pair - Done
3,119,515 UART: [art] Signing Cert with AUTHO
3,119,995 UART: RITY.KEYID = 7
3,135,393 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,158 UART: [art] PUB.X = F6524FFBDC27167F7C26C8F399EB153CF4608F7487744EA45EAE640AE9C6FCE285389DB4BAA964C55B781450E907882E
3,142,930 UART: [art] PUB.Y = 49062837578CBB1571B1561B744709BBA3F608C77CC2CAE278C16CEB0618E793F6DF5754E0D3F1A8D359D2B1449CC414
3,149,870 UART: [art] SIG.R = 37658D9C422CB4C0C3F5E2D3FDBFA6A7723D38830E6EB93BC48E98D49A22987C32C3511B61AE1F91EF048E339CBF59C7
3,156,646 UART: [art] SIG.S = 6038B89DA18A65D3A10A188282F700F0C79222E5827292445F46921F2333F11EE36EDFB7D2BE4F522206F51CA864CC38
3,180,473 UART: Caliptra RT
3,180,818 UART: [state] CFI Enabled
3,288,255 UART: [rt] RT listening for mailbox commands...
3,288,918 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,723 UART: [rt]cmd =0x46504c54, len=4
3,319,785 >>> mbox cmd response data (8 bytes)
3,320,018 UART: [rt] FIPS self test
3,320,346 UART: [kat] ++
3,320,498 UART: [kat] sha1
3,324,738 UART: [kat] SHA2-256
3,326,760 UART: [kat] SHA2-384
3,329,597 UART: [kat] SHA2-512-ACC
3,331,524 UART: [kat] ECC-384
3,341,380 UART: [kat] HMAC-384Kdf
3,342,282 UART: Fatal Error: 0x90030001
3,343,821 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,343,826 >>> mbox cmd response: failed
3,343,826 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,343,831 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,061 UART: [kat] SHA2-256
891,611 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,740 UART: [kat] ++
895,892 UART: [kat] sha1
899,938 UART: [kat] SHA2-256
901,878 UART: [kat] SHA2-384
904,701 UART: [kat] SHA2-512-ACC
906,602 UART: [kat] ECC-384
916,839 UART: [kat] HMAC-384Kdf
921,475 UART: [kat] LMS
1,169,787 UART: [kat] --
1,170,562 UART: [cold-reset] ++
1,170,896 UART: [fht] FHT @ 0x50003400
1,173,432 UART: [idev] ++
1,173,600 UART: [idev] CDI.KEYID = 6
1,173,961 UART: [idev] SUBJECT.KEYID = 7
1,174,386 UART: [idev] UDS.KEYID = 0
1,174,732 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,248 UART: [idev] Erasing UDS.KEYID = 0
1,199,192 UART: [idev] Sha1 KeyId Algorithm
1,207,896 UART: [idev] --
1,209,039 UART: [ldev] ++
1,209,207 UART: [ldev] CDI.KEYID = 6
1,209,571 UART: [ldev] SUBJECT.KEYID = 5
1,209,998 UART: [ldev] AUTHORITY.KEYID = 7
1,210,461 UART: [ldev] FE.KEYID = 1
1,215,711 UART: [ldev] Erasing FE.KEYID = 1
1,242,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,181 UART: [ldev] --
1,281,625 UART: [fwproc] Wait for Commands...
1,282,262 UART: [fwproc] Recv command 0x46574c44
1,282,995 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,945 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,254 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,358 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,671 ready_for_fw is high
1,055,671 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,686 >>> mbox cmd response: success
2,696,104 UART:
2,696,120 UART: Running Caliptra FMC ...
2,696,528 UART:
2,696,671 UART: [state] CFI Enabled
2,706,954 UART: [fht] FMC Alias Private Key: 7
2,815,199 UART: [art] Extend RT PCRs Done
2,815,627 UART: [art] Lock RT PCRs Done
2,817,263 UART: [art] Populate DV Done
2,825,486 UART: [fht] FMC Alias Private Key: 7
2,826,426 UART: [art] Derive CDI
2,826,706 UART: [art] Store in in slot 0x4
2,912,955 UART: [art] Derive Key Pair
2,913,315 UART: [art] Store priv key in slot 0x5
2,926,101 UART: [art] Derive Key Pair - Done
2,940,982 UART: [art] Signing Cert with AUTHO
2,941,462 UART: RITY.KEYID = 7
2,956,468 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,233 UART: [art] PUB.X = 35FEA97CFAEC01B83E510586D18FE14EA71A66AF7F372BA3DFD10F12C01BA21974B3A4233437293B3B638D1920489E61
2,964,000 UART: [art] PUB.Y = AA038A80BABD7841CC62EC9C0D07469D7A0E6FA6E81755529A5995477533BAC85FBF31C1913A06C529E6A84E27D7C5D3
2,970,943 UART: [art] SIG.R = EC7C3AE1DC10346BB37EC6AF66B92986994206BCA6762ECE45645925506A564F33410650757FFA2349B8D5EB56022C5C
2,977,704 UART: [art] SIG.S = 1D9656977A6A5874C2B9DB34CDE2BAE86015A2BA86127DE0205B6692C52AF22B52A8A6E47175F182354C8624BCAC297E
3,000,801 UART: Caliptra RT
3,001,146 UART: [state] CFI Enabled
3,109,157 UART: [rt] RT listening for mailbox commands...
3,109,820 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,595 UART: [rt]cmd =0x46504c54, len=4
3,140,869 >>> mbox cmd response data (8 bytes)
3,141,102 UART: [rt] FIPS self test
3,141,430 UART: [kat] ++
3,141,582 UART: [kat] sha1
3,145,598 UART: [kat] SHA2-256
3,147,620 UART: [kat] SHA2-384
3,150,473 UART: [kat] SHA2-512-ACC
3,152,400 UART: [kat] ECC-384
3,162,646 UART: [kat] HMAC-384Kdf
3,163,558 UART: Fatal Error: 0x90030001
3,165,097 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,165,102 >>> mbox cmd response: failed
3,165,102 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,165,107 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,297 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,970 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,158 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,166 >>> mbox cmd response: failed
827,166 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,172 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,539 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,201 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
828,114 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
828,122 >>> mbox cmd response: failed
828,122 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
828,128 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,785 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,239 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
828,333 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
828,341 >>> mbox cmd response: failed
828,341 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
828,347 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,762 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,080 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
828,357 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
828,365 >>> mbox cmd response: failed
828,365 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
828,371 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,964 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,672 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,156 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,164 >>> mbox cmd response: failed
827,164 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,170 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,231 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,765 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,438 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,446 >>> mbox cmd response: failed
827,446 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,452 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,207 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,028 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,955 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,963 >>> mbox cmd response: failed
827,963 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,969 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,200 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,396 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,267 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,275 >>> mbox cmd response: failed
827,275 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,281 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,208 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,172 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,514 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,522 >>> mbox cmd response: failed
827,522 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,528 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,625 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,233 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,130 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,138 >>> mbox cmd response: failed
827,138 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,144 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,223 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,101 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
828,727 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
828,735 >>> mbox cmd response: failed
828,735 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
828,741 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,416 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,628 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,337 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,345 >>> mbox cmd response: failed
827,345 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
827,351 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,150 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,886 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,031 UART: [kat] SHA2-256
881,962 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,077 UART: [kat] ++
886,229 UART: [kat] sha1
890,501 UART: [kat] SHA2-256
892,439 UART: [kat] SHA2-384
895,240 UART: [kat] SHA2-512-ACC
897,141 UART: [kat] ECC-384
902,312 UART: [kat] HMAC-384Kdf
907,116 UART: [kat] LMS
1,475,312 UART: [kat] --
1,476,287 UART: [cold-reset] ++
1,476,713 UART: [fht] Storing FHT @ 0x50003400
1,479,400 UART: [idev] ++
1,479,568 UART: [idev] CDI.KEYID = 6
1,479,928 UART: [idev] SUBJECT.KEYID = 7
1,480,352 UART: [idev] UDS.KEYID = 0
1,480,697 ready_for_fw is high
1,480,697 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,338 UART: [idev] Erasing UDS.KEYID = 0
1,504,798 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,488 UART: [idev] --
1,514,631 UART: [ldev] ++
1,514,799 UART: [ldev] CDI.KEYID = 6
1,515,162 UART: [ldev] SUBJECT.KEYID = 5
1,515,588 UART: [ldev] AUTHORITY.KEYID = 7
1,516,051 UART: [ldev] FE.KEYID = 1
1,521,179 UART: [ldev] Erasing FE.KEYID = 1
1,545,896 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,962 UART: [ldev] --
1,585,273 UART: [fwproc] Waiting for Commands...
1,586,046 UART: [fwproc] Received command 0x46574c44
1,586,837 UART: [fwproc] Received Image of size 115196 bytes
2,895,807 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,425 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,777 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,940 >>> mbox cmd response: success
3,091,084 UART: [afmc] ++
3,091,252 UART: [afmc] CDI.KEYID = 6
3,091,614 UART: [afmc] SUBJECT.KEYID = 7
3,092,039 UART: [afmc] AUTHORITY.KEYID = 5
3,126,676 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,824 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,604 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,332 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,217 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,907 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,968 UART: [afmc] --
3,169,964 UART: [cold-reset] --
3,170,944 UART: [state] Locking Datavault
3,172,161 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,765 UART: [state] Locking ICCM
3,173,223 UART: [exit] Launching FMC @ 0x40000130
3,178,552 UART:
3,178,568 UART: Running Caliptra FMC ...
3,178,976 UART:
3,179,030 UART: [state] CFI Enabled
3,189,673 UART: [fht] FMC Alias Private Key: 7
3,298,150 UART: [art] Extend RT PCRs Done
3,298,578 UART: [art] Lock RT PCRs Done
3,300,052 UART: [art] Populate DV Done
3,308,309 UART: [fht] FMC Alias Private Key: 7
3,309,359 UART: [art] Derive CDI
3,309,639 UART: [art] Store in in slot 0x4
3,395,132 UART: [art] Derive Key Pair
3,395,492 UART: [art] Store priv key in slot 0x5
3,408,330 UART: [art] Derive Key Pair - Done
3,422,783 UART: [art] Signing Cert with AUTHO
3,423,263 UART: RITY.KEYID = 7
3,438,735 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,500 UART: [art] PUB.X = 6100ECA6C353A0262E6E8BFCEEE0A548488197A58F2E4EFD9A0DE33603BFE64F7DCF62609430B7DAD99035161BA2D196
3,446,254 UART: [art] PUB.Y = AF3C04803357127E62A8833C70D5749EADCC665D885A2192420B947548DF673DEDF49240A85E84AB84471F252B097F4D
3,453,191 UART: [art] SIG.R = CEF79A48FC4E02CE30434360F78EFBF60252AD881ADD3E5B11F59CDA3A87F4801B83C03EA5FF06124E1312C3486B623D
3,459,964 UART: [art] SIG.S = 4A34C20704C16340633AFCBD58BD058FDD07396ABD3AEA61B2287EB41C3E7AC309B53B07554217DF62864A03C9192BCD
3,484,654 UART: Caliptra RT
3,484,907 UART: [state] CFI Enabled
3,592,032 UART: [rt] RT listening for mailbox commands...
3,592,695 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,514 UART: [rt]cmd =0x46504c54, len=4
3,623,510 >>> mbox cmd response data (8 bytes)
3,623,693 UART: [rt] FIPS self test
3,624,021 UART: [kat] ++
3,624,173 UART: [kat] sha1
3,628,355 UART: [kat] SHA2-256
3,630,377 UART: [kat] SHA2-384
3,633,254 UART: [kat] SHA2-512-ACC
3,635,181 UART: [kat] ECC-384
3,645,269 UART: [kat] HMAC-384Kdf
3,649,983 UART: Fatal Error: 0x90030002
3,651,522 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,651,527 >>> mbox cmd response: failed
3,651,527 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,651,532 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,033 UART: [kat] SHA2-256
881,964 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,079 UART: [kat] ++
886,231 UART: [kat] sha1
890,491 UART: [kat] SHA2-256
892,429 UART: [kat] SHA2-384
895,282 UART: [kat] SHA2-512-ACC
897,183 UART: [kat] ECC-384
902,358 UART: [kat] HMAC-384Kdf
906,996 UART: [kat] LMS
1,475,192 UART: [kat] --
1,476,233 UART: [cold-reset] ++
1,476,809 UART: [fht] Storing FHT @ 0x50003400
1,479,680 UART: [idev] ++
1,479,848 UART: [idev] CDI.KEYID = 6
1,480,208 UART: [idev] SUBJECT.KEYID = 7
1,480,632 UART: [idev] UDS.KEYID = 0
1,480,977 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,984 UART: [idev] Erasing UDS.KEYID = 0
1,505,412 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,056 UART: [idev] --
1,515,065 UART: [ldev] ++
1,515,233 UART: [ldev] CDI.KEYID = 6
1,515,596 UART: [ldev] SUBJECT.KEYID = 5
1,516,022 UART: [ldev] AUTHORITY.KEYID = 7
1,516,485 UART: [ldev] FE.KEYID = 1
1,521,447 UART: [ldev] Erasing FE.KEYID = 1
1,546,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,340 UART: [ldev] --
1,585,815 UART: [fwproc] Waiting for Commands...
1,586,554 UART: [fwproc] Received command 0x46574c44
1,587,345 UART: [fwproc] Received Image of size 115196 bytes
2,894,587 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,031 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,383 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,556 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,741 ready_for_fw is high
1,362,741 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,788 >>> mbox cmd response: success
2,999,610 UART:
2,999,626 UART: Running Caliptra FMC ...
3,000,034 UART:
3,000,088 UART: [state] CFI Enabled
3,010,441 UART: [fht] FMC Alias Private Key: 7
3,117,638 UART: [art] Extend RT PCRs Done
3,118,066 UART: [art] Lock RT PCRs Done
3,119,492 UART: [art] Populate DV Done
3,127,699 UART: [fht] FMC Alias Private Key: 7
3,128,759 UART: [art] Derive CDI
3,129,039 UART: [art] Store in in slot 0x4
3,214,640 UART: [art] Derive Key Pair
3,215,000 UART: [art] Store priv key in slot 0x5
3,228,166 UART: [art] Derive Key Pair - Done
3,242,981 UART: [art] Signing Cert with AUTHO
3,243,461 UART: RITY.KEYID = 7
3,258,733 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,498 UART: [art] PUB.X = 0B4C9D6D186D094B432E6C3FF0839FC4A4AC21CD4ECFF9EF692C58F5D5CAA889B3A8262F050F6B76A9728823D9ACFCFD
3,266,278 UART: [art] PUB.Y = 7FAD1EB60229CF2C6217565E9AA9D1CFB7AFFFE486F4C9737211B9438C2A6EFA59CDFA94764FCBA178B52E3094D2A56A
3,273,245 UART: [art] SIG.R = A0DA48579AF9421D6E297E510605AD9B7B335AEB4A222B097B26E3727BC9E1E24FB277991DE8A5BB3CCBDF90F9C4C972
3,280,020 UART: [art] SIG.S = 014A07C75DFD6C2094C3F82B8C32CB2B2FBCC531CFA5D0FFD350FE9325D54081817468937801F7AB740AF59288A414B9
3,303,387 UART: Caliptra RT
3,303,640 UART: [state] CFI Enabled
3,411,431 UART: [rt] RT listening for mailbox commands...
3,412,094 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,921 UART: [rt]cmd =0x46504c54, len=4
3,443,029 >>> mbox cmd response data (8 bytes)
3,443,144 UART: [rt] FIPS self test
3,443,472 UART: [kat] ++
3,443,624 UART: [kat] sha1
3,447,860 UART: [kat] SHA2-256
3,449,882 UART: [kat] SHA2-384
3,452,691 UART: [kat] SHA2-512-ACC
3,454,618 UART: [kat] ECC-384
3,464,620 UART: [kat] HMAC-384Kdf
3,469,404 UART: Fatal Error: 0x90030002
3,470,943 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,470,948 >>> mbox cmd response: failed
3,470,948 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,470,953 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,061 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,936,818 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,508 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,232 UART: [kat] SHA2-256
882,163 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,278 UART: [kat] ++
886,430 UART: [kat] sha1
890,722 UART: [kat] SHA2-256
892,660 UART: [kat] SHA2-384
895,285 UART: [kat] SHA2-512-ACC
897,186 UART: [kat] ECC-384
902,985 UART: [kat] HMAC-384Kdf
907,569 UART: [kat] LMS
1,475,765 UART: [kat] --
1,476,474 UART: [cold-reset] ++
1,477,010 UART: [fht] Storing FHT @ 0x50003400
1,479,873 UART: [idev] ++
1,480,041 UART: [idev] CDI.KEYID = 6
1,480,401 UART: [idev] SUBJECT.KEYID = 7
1,480,825 UART: [idev] UDS.KEYID = 0
1,481,170 ready_for_fw is high
1,481,170 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,045 UART: [idev] Erasing UDS.KEYID = 0
1,505,417 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,881 UART: [idev] --
1,514,912 UART: [ldev] ++
1,515,080 UART: [ldev] CDI.KEYID = 6
1,515,443 UART: [ldev] SUBJECT.KEYID = 5
1,515,869 UART: [ldev] AUTHORITY.KEYID = 7
1,516,332 UART: [ldev] FE.KEYID = 1
1,521,574 UART: [ldev] Erasing FE.KEYID = 1
1,546,885 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,771 UART: [ldev] --
1,586,074 UART: [fwproc] Waiting for Commands...
1,586,757 UART: [fwproc] Received command 0x46574c44
1,587,548 UART: [fwproc] Received Image of size 115196 bytes
2,895,398 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,712 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,064 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,147 >>> mbox cmd response: success
3,090,167 UART: [afmc] ++
3,090,335 UART: [afmc] CDI.KEYID = 6
3,090,697 UART: [afmc] SUBJECT.KEYID = 7
3,091,122 UART: [afmc] AUTHORITY.KEYID = 5
3,126,153 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,149 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,929 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,657 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,542 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,232 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,233 UART: [afmc] --
3,169,171 UART: [cold-reset] --
3,170,145 UART: [state] Locking Datavault
3,171,112 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,716 UART: [state] Locking ICCM
3,172,190 UART: [exit] Launching FMC @ 0x40000130
3,177,519 UART:
3,177,535 UART: Running Caliptra FMC ...
3,177,943 UART:
3,178,086 UART: [state] CFI Enabled
3,188,693 UART: [fht] FMC Alias Private Key: 7
3,296,718 UART: [art] Extend RT PCRs Done
3,297,146 UART: [art] Lock RT PCRs Done
3,298,784 UART: [art] Populate DV Done
3,306,933 UART: [fht] FMC Alias Private Key: 7
3,308,073 UART: [art] Derive CDI
3,308,353 UART: [art] Store in in slot 0x4
3,394,162 UART: [art] Derive Key Pair
3,394,522 UART: [art] Store priv key in slot 0x5
3,407,934 UART: [art] Derive Key Pair - Done
3,422,905 UART: [art] Signing Cert with AUTHO
3,423,385 UART: RITY.KEYID = 7
3,438,649 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,414 UART: [art] PUB.X = E8E392C0B5C926490327A599273D3E784DA9F3681C2A3762EE729DDAD4D4AD4C86E54ED8FFB270836F1926A20B160DC0
3,446,181 UART: [art] PUB.Y = 23A7A054ACA883C077C3930DC47A048922DD9E16DEF0A23E34AD33C05862581DA3CC1FD9A2D162F8FA77AACE84D52002
3,453,134 UART: [art] SIG.R = 1AEF3B1F98D2E0A8CBB05AA27BAEC3012855C18939351A30956159D1EF31A5C7C9BB2ABCF966CAC20D66AEF7551BC2DA
3,459,920 UART: [art] SIG.S = FBDCC7B098F3E2A765433B975F9983C0DE6F8A138712B4833941F99B96E7DDE844EFE817615F9ADF87879D9E54584B9D
3,484,179 UART: Caliptra RT
3,484,524 UART: [state] CFI Enabled
3,592,129 UART: [rt] RT listening for mailbox commands...
3,592,792 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,723 UART: [rt]cmd =0x46504c54, len=4
3,623,907 >>> mbox cmd response data (8 bytes)
3,624,026 UART: [rt] FIPS self test
3,624,354 UART: [kat] ++
3,624,506 UART: [kat] sha1
3,628,624 UART: [kat] SHA2-256
3,630,646 UART: [kat] SHA2-384
3,633,449 UART: [kat] SHA2-512-ACC
3,635,376 UART: [kat] ECC-384
3,645,590 UART: [kat] HMAC-384Kdf
3,650,440 UART: Fatal Error: 0x90030002
3,651,979 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,651,984 >>> mbox cmd response: failed
3,651,984 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,651,989 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,510 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,986 UART: [kat] SHA2-256
881,917 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,032 UART: [kat] ++
886,184 UART: [kat] sha1
890,414 UART: [kat] SHA2-256
892,352 UART: [kat] SHA2-384
895,121 UART: [kat] SHA2-512-ACC
897,022 UART: [kat] ECC-384
902,647 UART: [kat] HMAC-384Kdf
907,409 UART: [kat] LMS
1,475,605 UART: [kat] --
1,476,310 UART: [cold-reset] ++
1,476,852 UART: [fht] Storing FHT @ 0x50003400
1,479,579 UART: [idev] ++
1,479,747 UART: [idev] CDI.KEYID = 6
1,480,107 UART: [idev] SUBJECT.KEYID = 7
1,480,531 UART: [idev] UDS.KEYID = 0
1,480,876 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,347 UART: [idev] Erasing UDS.KEYID = 0
1,504,967 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,491 UART: [idev] --
1,514,550 UART: [ldev] ++
1,514,718 UART: [ldev] CDI.KEYID = 6
1,515,081 UART: [ldev] SUBJECT.KEYID = 5
1,515,507 UART: [ldev] AUTHORITY.KEYID = 7
1,515,970 UART: [ldev] FE.KEYID = 1
1,521,366 UART: [ldev] Erasing FE.KEYID = 1
1,546,719 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,885 UART: [ldev] --
1,586,350 UART: [fwproc] Waiting for Commands...
1,587,173 UART: [fwproc] Received command 0x46574c44
1,587,964 UART: [fwproc] Received Image of size 115196 bytes
2,895,432 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,896 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,248 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,433 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,404 ready_for_fw is high
1,363,404 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,921 >>> mbox cmd response: success
3,000,607 UART:
3,000,623 UART: Running Caliptra FMC ...
3,001,031 UART:
3,001,174 UART: [state] CFI Enabled
3,011,413 UART: [fht] FMC Alias Private Key: 7
3,119,198 UART: [art] Extend RT PCRs Done
3,119,626 UART: [art] Lock RT PCRs Done
3,121,218 UART: [art] Populate DV Done
3,129,549 UART: [fht] FMC Alias Private Key: 7
3,130,673 UART: [art] Derive CDI
3,130,953 UART: [art] Store in in slot 0x4
3,216,758 UART: [art] Derive Key Pair
3,217,118 UART: [art] Store priv key in slot 0x5
3,230,444 UART: [art] Derive Key Pair - Done
3,245,466 UART: [art] Signing Cert with AUTHO
3,245,946 UART: RITY.KEYID = 7
3,260,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,735 UART: [art] PUB.X = 50300BB618F3D7E6EF198C00E13AB9E5711CD457C4BF7F0E3DA0D0B63B8C9152A4F573E44CD1356929326BA108EC2158
3,268,480 UART: [art] PUB.Y = 1079B50E96D093C61C2ECAC4A23458145AF7E923C0F55D70AD9B6BC129FD05F853A982380C1F9E2C807A31FE0186690C
3,275,419 UART: [art] SIG.R = EDB7028CA232C7CD9D0026148160EE4C1865B35B0CF9D0A30A616B3BFFC7DCFE32D1BBF65B2CC0974588CCA176022029
3,282,169 UART: [art] SIG.S = A2AE09DC3A1B07210F43237CBECB37505E74F3CD0FE1892BDCCCD439F8452DB3BC9BAF44FCBD5B2321BA7EBF172B4CBF
3,305,774 UART: Caliptra RT
3,306,119 UART: [state] CFI Enabled
3,414,979 UART: [rt] RT listening for mailbox commands...
3,415,642 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,107 UART: [rt]cmd =0x46504c54, len=4
3,446,063 >>> mbox cmd response data (8 bytes)
3,446,190 UART: [rt] FIPS self test
3,446,518 UART: [kat] ++
3,446,670 UART: [kat] sha1
3,451,042 UART: [kat] SHA2-256
3,453,064 UART: [kat] SHA2-384
3,455,869 UART: [kat] SHA2-512-ACC
3,457,796 UART: [kat] ECC-384
3,467,322 UART: [kat] HMAC-384Kdf
3,471,944 UART: Fatal Error: 0x90030002
3,473,483 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,473,488 >>> mbox cmd response: failed
3,473,488 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,473,493 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,592 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,257 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
893,078 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,203 UART: [kat] ++
897,355 UART: [kat] sha1
901,721 UART: [kat] SHA2-256
903,661 UART: [kat] SHA2-384
906,486 UART: [kat] SHA2-512-ACC
908,387 UART: [kat] ECC-384
918,308 UART: [kat] HMAC-384Kdf
922,820 UART: [kat] LMS
1,171,148 UART: [kat] --
1,172,057 UART: [cold-reset] ++
1,172,635 UART: [fht] FHT @ 0x50003400
1,175,472 UART: [idev] ++
1,175,640 UART: [idev] CDI.KEYID = 6
1,176,000 UART: [idev] SUBJECT.KEYID = 7
1,176,424 UART: [idev] UDS.KEYID = 0
1,176,769 ready_for_fw is high
1,176,769 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,226 UART: [idev] Erasing UDS.KEYID = 0
1,201,037 UART: [idev] Sha1 KeyId Algorithm
1,209,433 UART: [idev] --
1,210,571 UART: [ldev] ++
1,210,739 UART: [ldev] CDI.KEYID = 6
1,211,102 UART: [ldev] SUBJECT.KEYID = 5
1,211,528 UART: [ldev] AUTHORITY.KEYID = 7
1,211,991 UART: [ldev] FE.KEYID = 1
1,217,121 UART: [ldev] Erasing FE.KEYID = 1
1,243,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,237 UART: [ldev] --
1,282,608 UART: [fwproc] Wait for Commands...
1,283,400 UART: [fwproc] Recv command 0x46574c44
1,284,128 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,757 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,938 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,242 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,475 >>> mbox cmd response: success
2,786,657 UART: [afmc] ++
2,786,825 UART: [afmc] CDI.KEYID = 6
2,787,187 UART: [afmc] SUBJECT.KEYID = 7
2,787,612 UART: [afmc] AUTHORITY.KEYID = 5
2,823,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,762 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,510 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,238 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,123 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,842 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,490 UART: [afmc] --
2,866,480 UART: [cold-reset] --
2,867,352 UART: [state] Locking Datavault
2,868,387 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,991 UART: [state] Locking ICCM
2,869,527 UART: [exit] Launching FMC @ 0x40000130
2,874,856 UART:
2,874,872 UART: Running Caliptra FMC ...
2,875,280 UART:
2,875,334 UART: [state] CFI Enabled
2,885,437 UART: [fht] FMC Alias Private Key: 7
2,993,652 UART: [art] Extend RT PCRs Done
2,994,080 UART: [art] Lock RT PCRs Done
2,995,316 UART: [art] Populate DV Done
3,003,627 UART: [fht] FMC Alias Private Key: 7
3,004,767 UART: [art] Derive CDI
3,005,047 UART: [art] Store in in slot 0x4
3,090,950 UART: [art] Derive Key Pair
3,091,310 UART: [art] Store priv key in slot 0x5
3,104,738 UART: [art] Derive Key Pair - Done
3,119,596 UART: [art] Signing Cert with AUTHO
3,120,076 UART: RITY.KEYID = 7
3,135,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,947 UART: [art] PUB.X = A6334C23616BCBB1448470F0032925E4F989807C2BD6EBFCAD4E5C52697988C4CE4FCF56841CB9DB7252AD0A81BAAB94
3,142,723 UART: [art] PUB.Y = 78A11CC536A9A8E39725B04E65CAA55F138342482C1BF2685D71CEDEC88BF5931844383FD5A04742F3C052ED0CEDED7F
3,149,680 UART: [art] SIG.R = 6E062F0B9224778C1B5169858B72A715D0F272E5C6FEB2944C24FA1D51173694D09978ECFD6A3F1ED40F9E6809FFC25C
3,156,442 UART: [art] SIG.S = 682A957DA2DF9646227BD08884478D8B4F95ADBC28645E581F5F40208B69D4F4F4F47013E989CACBCA4986EAD948D276
3,180,549 UART: Caliptra RT
3,180,802 UART: [state] CFI Enabled
3,288,045 UART: [rt] RT listening for mailbox commands...
3,288,708 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,955 UART: [rt]cmd =0x46504c54, len=4
3,320,209 >>> mbox cmd response data (8 bytes)
3,320,324 UART: [rt] FIPS self test
3,320,652 UART: [kat] ++
3,320,804 UART: [kat] sha1
3,324,996 UART: [kat] SHA2-256
3,327,018 UART: [kat] SHA2-384
3,329,883 UART: [kat] SHA2-512-ACC
3,331,810 UART: [kat] ECC-384
3,341,686 UART: [kat] HMAC-384Kdf
3,346,318 UART: Fatal Error: 0x90030002
3,347,857 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,347,862 >>> mbox cmd response: failed
3,347,862 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,347,867 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
893,266 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,391 UART: [kat] ++
897,543 UART: [kat] sha1
901,593 UART: [kat] SHA2-256
903,533 UART: [kat] SHA2-384
906,378 UART: [kat] SHA2-512-ACC
908,279 UART: [kat] ECC-384
918,126 UART: [kat] HMAC-384Kdf
922,692 UART: [kat] LMS
1,171,020 UART: [kat] --
1,171,753 UART: [cold-reset] ++
1,172,239 UART: [fht] FHT @ 0x50003400
1,174,826 UART: [idev] ++
1,174,994 UART: [idev] CDI.KEYID = 6
1,175,354 UART: [idev] SUBJECT.KEYID = 7
1,175,778 UART: [idev] UDS.KEYID = 0
1,176,123 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,710 UART: [idev] Erasing UDS.KEYID = 0
1,200,495 UART: [idev] Sha1 KeyId Algorithm
1,209,003 UART: [idev] --
1,210,137 UART: [ldev] ++
1,210,305 UART: [ldev] CDI.KEYID = 6
1,210,668 UART: [ldev] SUBJECT.KEYID = 5
1,211,094 UART: [ldev] AUTHORITY.KEYID = 7
1,211,557 UART: [ldev] FE.KEYID = 1
1,216,557 UART: [ldev] Erasing FE.KEYID = 1
1,243,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,515 UART: [ldev] --
1,282,836 UART: [fwproc] Wait for Commands...
1,283,432 UART: [fwproc] Recv command 0x46574c44
1,284,160 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,424 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,728 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,867 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,021 ready_for_fw is high
1,061,021 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,636,806 >>> mbox cmd response: success
2,698,842 UART:
2,698,858 UART: Running Caliptra FMC ...
2,699,266 UART:
2,699,320 UART: [state] CFI Enabled
2,709,853 UART: [fht] FMC Alias Private Key: 7
2,817,660 UART: [art] Extend RT PCRs Done
2,818,088 UART: [art] Lock RT PCRs Done
2,819,598 UART: [art] Populate DV Done
2,827,635 UART: [fht] FMC Alias Private Key: 7
2,828,765 UART: [art] Derive CDI
2,829,045 UART: [art] Store in in slot 0x4
2,914,866 UART: [art] Derive Key Pair
2,915,226 UART: [art] Store priv key in slot 0x5
2,927,942 UART: [art] Derive Key Pair - Done
2,942,703 UART: [art] Signing Cert with AUTHO
2,943,183 UART: RITY.KEYID = 7
2,958,291 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,056 UART: [art] PUB.X = 5230C9534ACE89C86DA9D1A2981DB6E493C82731C734DD092AC6AB076BF826F0EDB52CB0D3EF52A7C0C00E9CA1D7326B
2,965,833 UART: [art] PUB.Y = 62AF409C1E1AE1E2490AC8C19A246182E65A9E1959E59A1451318DE1243A2F9830E4B7D056139B129D3299DBE455E616
2,972,776 UART: [art] SIG.R = 9C2810F759FA9429352548E356A91C9DF7657D5EB4CB468C34CA8B7538F0309547C981A66189C2C8D46C87D93B191359
2,979,538 UART: [art] SIG.S = 5F0F6B33A088C271D56F51908EFCF2997232D77529DF2B09C98EA36C057EE487FF8B0F94660A03B7C96302D8524F9E9B
3,003,452 UART: Caliptra RT
3,003,705 UART: [state] CFI Enabled
3,111,396 UART: [rt] RT listening for mailbox commands...
3,112,059 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,894 UART: [rt]cmd =0x46504c54, len=4
3,143,048 >>> mbox cmd response data (8 bytes)
3,143,161 UART: [rt] FIPS self test
3,143,489 UART: [kat] ++
3,143,641 UART: [kat] sha1
3,147,795 UART: [kat] SHA2-256
3,149,817 UART: [kat] SHA2-384
3,152,566 UART: [kat] SHA2-512-ACC
3,154,493 UART: [kat] ECC-384
3,164,937 UART: [kat] HMAC-384Kdf
3,169,515 UART: Fatal Error: 0x90030002
3,171,054 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,171,059 >>> mbox cmd response: failed
3,171,059 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,171,064 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,353 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,992 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,978 UART: [state] WD Timer not started. Device not locked for debugging
88,133 UART: [kat] SHA2-256
893,783 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,908 UART: [kat] ++
898,060 UART: [kat] sha1
902,080 UART: [kat] SHA2-256
904,020 UART: [kat] SHA2-384
906,779 UART: [kat] SHA2-512-ACC
908,680 UART: [kat] ECC-384
918,891 UART: [kat] HMAC-384Kdf
923,475 UART: [kat] LMS
1,171,803 UART: [kat] --
1,172,838 UART: [cold-reset] ++
1,173,226 UART: [fht] FHT @ 0x50003400
1,175,767 UART: [idev] ++
1,175,935 UART: [idev] CDI.KEYID = 6
1,176,295 UART: [idev] SUBJECT.KEYID = 7
1,176,719 UART: [idev] UDS.KEYID = 0
1,177,064 ready_for_fw is high
1,177,064 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,185,089 UART: [idev] Erasing UDS.KEYID = 0
1,202,274 UART: [idev] Sha1 KeyId Algorithm
1,210,684 UART: [idev] --
1,211,842 UART: [ldev] ++
1,212,010 UART: [ldev] CDI.KEYID = 6
1,212,373 UART: [ldev] SUBJECT.KEYID = 5
1,212,799 UART: [ldev] AUTHORITY.KEYID = 7
1,213,262 UART: [ldev] FE.KEYID = 1
1,218,424 UART: [ldev] Erasing FE.KEYID = 1
1,244,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,446 UART: [ldev] --
1,283,959 UART: [fwproc] Wait for Commands...
1,284,617 UART: [fwproc] Recv command 0x46574c44
1,285,345 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,021 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,325 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,498 >>> mbox cmd response: success
2,788,526 UART: [afmc] ++
2,788,694 UART: [afmc] CDI.KEYID = 6
2,789,056 UART: [afmc] SUBJECT.KEYID = 7
2,789,481 UART: [afmc] AUTHORITY.KEYID = 5
2,825,282 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,711 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,439 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,324 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,043 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,761 UART: [afmc] --
2,868,703 UART: [cold-reset] --
2,869,619 UART: [state] Locking Datavault
2,870,906 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,510 UART: [state] Locking ICCM
2,872,122 UART: [exit] Launching FMC @ 0x40000130
2,877,451 UART:
2,877,467 UART: Running Caliptra FMC ...
2,877,875 UART:
2,878,018 UART: [state] CFI Enabled
2,888,929 UART: [fht] FMC Alias Private Key: 7
2,996,478 UART: [art] Extend RT PCRs Done
2,996,906 UART: [art] Lock RT PCRs Done
2,998,334 UART: [art] Populate DV Done
3,006,697 UART: [fht] FMC Alias Private Key: 7
3,007,649 UART: [art] Derive CDI
3,007,929 UART: [art] Store in in slot 0x4
3,093,554 UART: [art] Derive Key Pair
3,093,914 UART: [art] Store priv key in slot 0x5
3,107,206 UART: [art] Derive Key Pair - Done
3,122,187 UART: [art] Signing Cert with AUTHO
3,122,667 UART: RITY.KEYID = 7
3,138,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,988 UART: [art] PUB.X = 422CA16312DFFF2E1493D3AD6562EFFF8980875DA3C6E4968DDF7095D421E415FE5705487FD7E3A99AA09C8FBDBB1896
3,145,767 UART: [art] PUB.Y = 28A8D6A7AD24A036DE3DAB5BC346C7DB53A54B7943C60778357CF1948904EB8CE771A06DEF910D9F60838AD2CA1162A7
3,152,718 UART: [art] SIG.R = 0B53B4DD1FA234C107926C767086DF5E6E1DF0B648B389DCD91BB67BAB05B69081E5D2B28EEF966DB3D8CDCFD6D08446
3,159,497 UART: [art] SIG.S = 66FB9D75D1E7F42B1B21B635691D31D8049A9D2424E6FC33613CFC29140751F9DB6916D0436E0825A86CA76674554739
3,183,333 UART: Caliptra RT
3,183,678 UART: [state] CFI Enabled
3,291,863 UART: [rt] RT listening for mailbox commands...
3,292,526 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,273 UART: [rt]cmd =0x46504c54, len=4
3,323,597 >>> mbox cmd response data (8 bytes)
3,323,728 UART: [rt] FIPS self test
3,324,056 UART: [kat] ++
3,324,208 UART: [kat] sha1
3,328,574 UART: [kat] SHA2-256
3,330,596 UART: [kat] SHA2-384
3,333,441 UART: [kat] SHA2-512-ACC
3,335,368 UART: [kat] ECC-384
3,345,254 UART: [kat] HMAC-384Kdf
3,349,998 UART: Fatal Error: 0x90030002
3,351,537 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,351,542 >>> mbox cmd response: failed
3,351,542 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,351,547 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,420 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
893,281 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,406 UART: [kat] ++
897,558 UART: [kat] sha1
901,784 UART: [kat] SHA2-256
903,724 UART: [kat] SHA2-384
906,543 UART: [kat] SHA2-512-ACC
908,444 UART: [kat] ECC-384
918,257 UART: [kat] HMAC-384Kdf
922,889 UART: [kat] LMS
1,171,217 UART: [kat] --
1,172,094 UART: [cold-reset] ++
1,172,630 UART: [fht] FHT @ 0x50003400
1,175,129 UART: [idev] ++
1,175,297 UART: [idev] CDI.KEYID = 6
1,175,657 UART: [idev] SUBJECT.KEYID = 7
1,176,081 UART: [idev] UDS.KEYID = 0
1,176,426 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,107 UART: [idev] Erasing UDS.KEYID = 0
1,201,182 UART: [idev] Sha1 KeyId Algorithm
1,209,590 UART: [idev] --
1,210,710 UART: [ldev] ++
1,210,878 UART: [ldev] CDI.KEYID = 6
1,211,241 UART: [ldev] SUBJECT.KEYID = 5
1,211,667 UART: [ldev] AUTHORITY.KEYID = 7
1,212,130 UART: [ldev] FE.KEYID = 1
1,217,350 UART: [ldev] Erasing FE.KEYID = 1
1,243,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,420 UART: [ldev] --
1,282,697 UART: [fwproc] Wait for Commands...
1,283,403 UART: [fwproc] Recv command 0x46574c44
1,284,131 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,883 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,187 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,310 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,690 ready_for_fw is high
1,060,690 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,927 >>> mbox cmd response: success
2,700,809 UART:
2,700,825 UART: Running Caliptra FMC ...
2,701,233 UART:
2,701,376 UART: [state] CFI Enabled
2,711,963 UART: [fht] FMC Alias Private Key: 7
2,819,550 UART: [art] Extend RT PCRs Done
2,819,978 UART: [art] Lock RT PCRs Done
2,821,518 UART: [art] Populate DV Done
2,829,591 UART: [fht] FMC Alias Private Key: 7
2,830,703 UART: [art] Derive CDI
2,830,983 UART: [art] Store in in slot 0x4
2,916,120 UART: [art] Derive Key Pair
2,916,480 UART: [art] Store priv key in slot 0x5
2,929,462 UART: [art] Derive Key Pair - Done
2,944,189 UART: [art] Signing Cert with AUTHO
2,944,669 UART: RITY.KEYID = 7
2,960,205 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,970 UART: [art] PUB.X = 4BD6FD6FAA8635B2F58B1095FAB97EE366CE15ED13A3532E4CD167840563C061BDF7E82E80F12F70B4F0267015DA18DC
2,967,749 UART: [art] PUB.Y = C0BE6B3E0418E4DB0B3711969421BF8B7BDA3091C646B6748BCF1853EE2CF666C3D3A4EE38245B38498FCA0B85EC34E7
2,974,702 UART: [art] SIG.R = 685BAF3CE9B61CB4094B80DEF08EDE6534B6621FF85283EA82EDEA15D9393A4372309E17CFF605CEE9261CBD55C60F6E
2,981,479 UART: [art] SIG.S = EAEBA4ED9A115FF121352455325310A2FE9D6613BBFC48321942C9AE6527CD60529341EF96235E71544724EE2F71736D
3,005,238 UART: Caliptra RT
3,005,583 UART: [state] CFI Enabled
3,113,478 UART: [rt] RT listening for mailbox commands...
3,114,141 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,080 UART: [rt]cmd =0x46504c54, len=4
3,145,166 >>> mbox cmd response data (8 bytes)
3,145,459 UART: [rt] FIPS self test
3,145,787 UART: [kat] ++
3,145,939 UART: [kat] sha1
3,149,945 UART: [kat] SHA2-256
3,151,967 UART: [kat] SHA2-384
3,154,940 UART: [kat] SHA2-512-ACC
3,156,867 UART: [kat] ECC-384
3,166,691 UART: [kat] HMAC-384Kdf
3,171,309 UART: Fatal Error: 0x90030002
3,172,848 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,172,853 >>> mbox cmd response: failed
3,172,853 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,172,858 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,624 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,703 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,817 UART: [kat] SHA2-256
901,757 UART: [kat] SHA2-384
904,476 UART: [kat] SHA2-512-ACC
906,377 UART: [kat] ECC-384
916,376 UART: [kat] HMAC-384Kdf
920,840 UART: [kat] LMS
1,169,152 UART: [kat] --
1,169,795 UART: [cold-reset] ++
1,170,253 UART: [fht] FHT @ 0x50003400
1,172,957 UART: [idev] ++
1,173,125 UART: [idev] CDI.KEYID = 6
1,173,486 UART: [idev] SUBJECT.KEYID = 7
1,173,911 UART: [idev] UDS.KEYID = 0
1,174,257 ready_for_fw is high
1,174,257 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,501 UART: [idev] Erasing UDS.KEYID = 0
1,198,749 UART: [idev] Sha1 KeyId Algorithm
1,207,665 UART: [idev] --
1,208,688 UART: [ldev] ++
1,208,856 UART: [ldev] CDI.KEYID = 6
1,209,220 UART: [ldev] SUBJECT.KEYID = 5
1,209,647 UART: [ldev] AUTHORITY.KEYID = 7
1,210,110 UART: [ldev] FE.KEYID = 1
1,215,222 UART: [ldev] Erasing FE.KEYID = 1
1,241,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,616 UART: [ldev] --
1,281,004 UART: [fwproc] Wait for Commands...
1,281,609 UART: [fwproc] Recv command 0x46574c44
1,282,342 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,419 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,728 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,782,856 >>> mbox cmd response: success
2,783,893 UART: [afmc] ++
2,784,061 UART: [afmc] CDI.KEYID = 6
2,784,424 UART: [afmc] SUBJECT.KEYID = 7
2,784,850 UART: [afmc] AUTHORITY.KEYID = 5
2,820,221 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,687 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,438 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,167 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,050 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,769 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,618 UART: [afmc] --
2,863,666 UART: [cold-reset] --
2,864,594 UART: [state] Locking Datavault
2,865,731 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,335 UART: [state] Locking ICCM
2,866,757 UART: [exit] Launching FMC @ 0x40000130
2,872,086 UART:
2,872,102 UART: Running Caliptra FMC ...
2,872,510 UART:
2,872,564 UART: [state] CFI Enabled
2,882,637 UART: [fht] FMC Alias Private Key: 7
2,990,612 UART: [art] Extend RT PCRs Done
2,991,040 UART: [art] Lock RT PCRs Done
2,992,844 UART: [art] Populate DV Done
3,001,061 UART: [fht] FMC Alias Private Key: 7
3,002,061 UART: [art] Derive CDI
3,002,341 UART: [art] Store in in slot 0x4
3,087,718 UART: [art] Derive Key Pair
3,088,078 UART: [art] Store priv key in slot 0x5
3,100,778 UART: [art] Derive Key Pair - Done
3,115,627 UART: [art] Signing Cert with AUTHO
3,116,107 UART: RITY.KEYID = 7
3,131,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,844 UART: [art] PUB.X = 12BAE7B6F4B54371859C9D5746D1AA7FC8831CD2DC5B5F65052FC82CEDD66EF3FFEB0DCC013E1101621CAE5FB5E80570
3,138,619 UART: [art] PUB.Y = B5B3781EDB1D2B5D674352469CEA4F5C02F15C1E8A3918FF6AE7C35F0E753F0A157E948EA408BDEE8B66A8FD5D1A71AA
3,145,577 UART: [art] SIG.R = 196A95B0D826FA2D8560107935A828A9BD87C6B1F7E7A4BDF5C9E78AF92BC8532C7CEFA982F2D933854DFA7D33FAE764
3,152,361 UART: [art] SIG.S = FFEB87140B9143F601D9A63FFF184E05DA55819A67EC8F78C458E585B782B12D77B385B79191990E49849A024EF386FC
3,176,271 UART: Caliptra RT
3,176,524 UART: [state] CFI Enabled
3,284,509 UART: [rt] RT listening for mailbox commands...
3,285,172 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,949 UART: [rt]cmd =0x46504c54, len=4
3,316,157 >>> mbox cmd response data (8 bytes)
3,316,372 UART: [rt] FIPS self test
3,316,700 UART: [kat] ++
3,316,852 UART: [kat] sha1
3,320,946 UART: [kat] SHA2-256
3,322,968 UART: [kat] SHA2-384
3,325,939 UART: [kat] SHA2-512-ACC
3,327,866 UART: [kat] ECC-384
3,337,826 UART: [kat] HMAC-384Kdf
3,342,290 UART: Fatal Error: 0x90030002
3,343,829 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,343,834 >>> mbox cmd response: failed
3,343,834 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,343,839 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,666 UART: [kat] SHA2-256
891,216 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,345 UART: [kat] ++
895,497 UART: [kat] sha1
899,807 UART: [kat] SHA2-256
901,747 UART: [kat] SHA2-384
904,364 UART: [kat] SHA2-512-ACC
906,265 UART: [kat] ECC-384
916,396 UART: [kat] HMAC-384Kdf
920,844 UART: [kat] LMS
1,169,156 UART: [kat] --
1,170,075 UART: [cold-reset] ++
1,170,503 UART: [fht] FHT @ 0x50003400
1,173,169 UART: [idev] ++
1,173,337 UART: [idev] CDI.KEYID = 6
1,173,698 UART: [idev] SUBJECT.KEYID = 7
1,174,123 UART: [idev] UDS.KEYID = 0
1,174,469 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,305 UART: [idev] Erasing UDS.KEYID = 0
1,199,855 UART: [idev] Sha1 KeyId Algorithm
1,208,803 UART: [idev] --
1,209,930 UART: [ldev] ++
1,210,098 UART: [ldev] CDI.KEYID = 6
1,210,462 UART: [ldev] SUBJECT.KEYID = 5
1,210,889 UART: [ldev] AUTHORITY.KEYID = 7
1,211,352 UART: [ldev] FE.KEYID = 1
1,216,742 UART: [ldev] Erasing FE.KEYID = 1
1,242,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,890 UART: [ldev] --
1,282,380 UART: [fwproc] Wait for Commands...
1,282,965 UART: [fwproc] Recv command 0x46574c44
1,283,698 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,779 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,477 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,786 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,832 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,404 ready_for_fw is high
1,056,404 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,361 >>> mbox cmd response: success
2,694,273 UART:
2,694,289 UART: Running Caliptra FMC ...
2,694,697 UART:
2,694,751 UART: [state] CFI Enabled
2,705,378 UART: [fht] FMC Alias Private Key: 7
2,814,083 UART: [art] Extend RT PCRs Done
2,814,511 UART: [art] Lock RT PCRs Done
2,816,277 UART: [art] Populate DV Done
2,824,588 UART: [fht] FMC Alias Private Key: 7
2,825,638 UART: [art] Derive CDI
2,825,918 UART: [art] Store in in slot 0x4
2,911,697 UART: [art] Derive Key Pair
2,912,057 UART: [art] Store priv key in slot 0x5
2,925,439 UART: [art] Derive Key Pair - Done
2,940,843 UART: [art] Signing Cert with AUTHO
2,941,323 UART: RITY.KEYID = 7
2,956,435 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,200 UART: [art] PUB.X = C940B2912DD095399211C5C28F1383C28A6383EEA31E6480D8C5456B60B499B07FCC59F465096420EED7B7A326089FE5
2,963,960 UART: [art] PUB.Y = 24541BD5C687CF3E617B927D3D93F0825D2799C7F5C67139890F13C8ED80450037ABCE5F1092ADA96C112F3F6F176E21
2,970,885 UART: [art] SIG.R = B624AE711E2E5B2D4B950B7C4C8557D2E32C9C6E484F76330FD3AF77959125AB842E92B865B39FD5A4FABAB4FE458898
2,977,659 UART: [art] SIG.S = F98079C4D6785C5FD3E068A502842ADD6033960F6B2831F8EA15938749BB01CC15CDE763205AEDDE0F7CB87796CD1B52
3,000,988 UART: Caliptra RT
3,001,241 UART: [state] CFI Enabled
3,108,735 UART: [rt] RT listening for mailbox commands...
3,109,398 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,327 UART: [rt]cmd =0x46504c54, len=4
3,140,401 >>> mbox cmd response data (8 bytes)
3,140,598 UART: [rt] FIPS self test
3,140,926 UART: [kat] ++
3,141,078 UART: [kat] sha1
3,145,328 UART: [kat] SHA2-256
3,147,350 UART: [kat] SHA2-384
3,150,209 UART: [kat] SHA2-512-ACC
3,152,136 UART: [kat] ECC-384
3,162,098 UART: [kat] HMAC-384Kdf
3,166,576 UART: Fatal Error: 0x90030002
3,168,115 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,168,120 >>> mbox cmd response: failed
3,168,120 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,168,125 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,506 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,103 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,964 UART: [state] WD Timer not started. Device not locked for debugging
88,321 UART: [kat] SHA2-256
891,871 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,000 UART: [kat] ++
896,152 UART: [kat] sha1
900,620 UART: [kat] SHA2-256
902,560 UART: [kat] SHA2-384
905,215 UART: [kat] SHA2-512-ACC
907,116 UART: [kat] ECC-384
917,147 UART: [kat] HMAC-384Kdf
921,859 UART: [kat] LMS
1,170,171 UART: [kat] --
1,171,256 UART: [cold-reset] ++
1,171,654 UART: [fht] FHT @ 0x50003400
1,174,276 UART: [idev] ++
1,174,444 UART: [idev] CDI.KEYID = 6
1,174,805 UART: [idev] SUBJECT.KEYID = 7
1,175,230 UART: [idev] UDS.KEYID = 0
1,175,576 ready_for_fw is high
1,175,576 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,278 UART: [idev] Erasing UDS.KEYID = 0
1,200,716 UART: [idev] Sha1 KeyId Algorithm
1,209,552 UART: [idev] --
1,210,469 UART: [ldev] ++
1,210,637 UART: [ldev] CDI.KEYID = 6
1,211,001 UART: [ldev] SUBJECT.KEYID = 5
1,211,428 UART: [ldev] AUTHORITY.KEYID = 7
1,211,891 UART: [ldev] FE.KEYID = 1
1,216,935 UART: [ldev] Erasing FE.KEYID = 1
1,242,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,639 UART: [ldev] --
1,281,963 UART: [fwproc] Wait for Commands...
1,282,564 UART: [fwproc] Recv command 0x46574c44
1,283,297 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,897 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,158 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,240 >>> mbox cmd response: success
2,786,273 UART: [afmc] ++
2,786,441 UART: [afmc] CDI.KEYID = 6
2,786,804 UART: [afmc] SUBJECT.KEYID = 7
2,787,230 UART: [afmc] AUTHORITY.KEYID = 5
2,823,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,152 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,881 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,764 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,483 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,380 UART: [afmc] --
2,866,408 UART: [cold-reset] --
2,867,408 UART: [state] Locking Datavault
2,868,451 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,055 UART: [state] Locking ICCM
2,869,557 UART: [exit] Launching FMC @ 0x40000130
2,874,886 UART:
2,874,902 UART: Running Caliptra FMC ...
2,875,310 UART:
2,875,453 UART: [state] CFI Enabled
2,886,182 UART: [fht] FMC Alias Private Key: 7
2,994,031 UART: [art] Extend RT PCRs Done
2,994,459 UART: [art] Lock RT PCRs Done
2,995,867 UART: [art] Populate DV Done
3,003,988 UART: [fht] FMC Alias Private Key: 7
3,005,086 UART: [art] Derive CDI
3,005,366 UART: [art] Store in in slot 0x4
3,090,783 UART: [art] Derive Key Pair
3,091,143 UART: [art] Store priv key in slot 0x5
3,104,649 UART: [art] Derive Key Pair - Done
3,119,740 UART: [art] Signing Cert with AUTHO
3,120,220 UART: RITY.KEYID = 7
3,135,314 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,079 UART: [art] PUB.X = E2FF8E42BCFA091295D4263533DEC9E61ACBE6642E74E8268E369B87DD51DCFE99EA0287459BE27FA8E367C5C8191878
3,142,853 UART: [art] PUB.Y = E30DCE88020165947FAA61E70B600171DE2DC0816C789C4FD3944C1A4E7BB0D20882A6036971FC19491B0B62CEF27948
3,149,779 UART: [art] SIG.R = 676888D10AEE7DA5FC13F6BB18092A2C13C42C3D523BF252A199EA2F684B9F5044E6F21668ADE0EB946BB65B0BD53730
3,156,550 UART: [art] SIG.S = 2D27E43483911B21FD9D583C55323CC31D27CF82622F09D33E03C611B876673221CDDF0A9D64FE64DB3BE872736BFFE5
3,180,644 UART: Caliptra RT
3,180,989 UART: [state] CFI Enabled
3,288,826 UART: [rt] RT listening for mailbox commands...
3,289,489 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,412 UART: [rt]cmd =0x46504c54, len=4
3,320,634 >>> mbox cmd response data (8 bytes)
3,320,901 UART: [rt] FIPS self test
3,321,229 UART: [kat] ++
3,321,381 UART: [kat] sha1
3,325,547 UART: [kat] SHA2-256
3,327,569 UART: [kat] SHA2-384
3,330,514 UART: [kat] SHA2-512-ACC
3,332,441 UART: [kat] ECC-384
3,342,253 UART: [kat] HMAC-384Kdf
3,346,795 UART: Fatal Error: 0x90030002
3,348,334 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,348,339 >>> mbox cmd response: failed
3,348,339 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,348,344 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,747 UART: [state] LifecycleState = Unprovisioned
85,402 UART: [state] DebugLocked = No
86,062 UART: [state] WD Timer not started. Device not locked for debugging
87,337 UART: [kat] SHA2-256
890,887 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,016 UART: [kat] ++
895,168 UART: [kat] sha1
899,440 UART: [kat] SHA2-256
901,380 UART: [kat] SHA2-384
904,161 UART: [kat] SHA2-512-ACC
906,062 UART: [kat] ECC-384
915,599 UART: [kat] HMAC-384Kdf
920,295 UART: [kat] LMS
1,168,607 UART: [kat] --
1,169,534 UART: [cold-reset] ++
1,170,016 UART: [fht] FHT @ 0x50003400
1,172,532 UART: [idev] ++
1,172,700 UART: [idev] CDI.KEYID = 6
1,173,061 UART: [idev] SUBJECT.KEYID = 7
1,173,486 UART: [idev] UDS.KEYID = 0
1,173,832 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,666 UART: [idev] Erasing UDS.KEYID = 0
1,198,450 UART: [idev] Sha1 KeyId Algorithm
1,207,412 UART: [idev] --
1,208,329 UART: [ldev] ++
1,208,497 UART: [ldev] CDI.KEYID = 6
1,208,861 UART: [ldev] SUBJECT.KEYID = 5
1,209,288 UART: [ldev] AUTHORITY.KEYID = 7
1,209,751 UART: [ldev] FE.KEYID = 1
1,214,959 UART: [ldev] Erasing FE.KEYID = 1
1,241,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,225 UART: [ldev] --
1,280,529 UART: [fwproc] Wait for Commands...
1,281,324 UART: [fwproc] Recv command 0x46574c44
1,282,057 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,737 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,348 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,432 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,281 ready_for_fw is high
1,056,281 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,320 >>> mbox cmd response: success
2,696,696 UART:
2,696,712 UART: Running Caliptra FMC ...
2,697,120 UART:
2,697,263 UART: [state] CFI Enabled
2,707,702 UART: [fht] FMC Alias Private Key: 7
2,815,355 UART: [art] Extend RT PCRs Done
2,815,783 UART: [art] Lock RT PCRs Done
2,817,437 UART: [art] Populate DV Done
2,825,718 UART: [fht] FMC Alias Private Key: 7
2,826,892 UART: [art] Derive CDI
2,827,172 UART: [art] Store in in slot 0x4
2,912,923 UART: [art] Derive Key Pair
2,913,283 UART: [art] Store priv key in slot 0x5
2,926,793 UART: [art] Derive Key Pair - Done
2,941,701 UART: [art] Signing Cert with AUTHO
2,942,181 UART: RITY.KEYID = 7
2,957,095 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,860 UART: [art] PUB.X = 88A7CE686DC641E834A81FE3B6C731A9FDDFB783B2D5EDBAD3A77289DBE0FDF908AAA4B71F3A1F2F73EFF037E6EE918C
2,964,657 UART: [art] PUB.Y = 9428FF3E5E4FAF55FDD6FC0D2EC944138BCF24149A3B4F02D4E83FDA17CFB27C2BF342335DD82A857261C31E6A5612EC
2,971,619 UART: [art] SIG.R = 7415329662F7498C5072193BC69471C252D93F5AD739D67280163CBE047A74E2359D7948ACE3B48539E1775A77A0145E
2,978,372 UART: [art] SIG.S = 0B7FD90EA1428EB1F0700D560274665A78231B2DCBA89D2BE1C09EABCE08DCA6EC8A25F6635D4D530B7701A0D4D972AB
3,002,020 UART: Caliptra RT
3,002,365 UART: [state] CFI Enabled
3,111,472 UART: [rt] RT listening for mailbox commands...
3,112,135 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,126 UART: [rt]cmd =0x46504c54, len=4
3,143,398 >>> mbox cmd response data (8 bytes)
3,143,605 UART: [rt] FIPS self test
3,143,933 UART: [kat] ++
3,144,085 UART: [kat] sha1
3,148,407 UART: [kat] SHA2-256
3,150,429 UART: [kat] SHA2-384
3,153,174 UART: [kat] SHA2-512-ACC
3,155,101 UART: [kat] ECC-384
3,165,031 UART: [kat] HMAC-384Kdf
3,169,545 UART: Fatal Error: 0x90030002
3,171,084 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,171,089 >>> mbox cmd response: failed
3,171,089 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,171,094 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,385 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,666 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,530 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,538 >>> mbox cmd response: failed
1,097,538 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,544 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,297 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,779 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,510 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,518 >>> mbox cmd response: failed
1,097,518 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,524 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,611 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,001 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,659 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,667 >>> mbox cmd response: failed
1,097,667 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,673 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,790 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,594 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,405 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,413 >>> mbox cmd response: failed
1,098,413 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,419 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,604 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,952 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,590 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,598 >>> mbox cmd response: failed
1,097,598 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,604 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,589 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,045 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,280 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,288 >>> mbox cmd response: failed
1,098,288 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,294 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,655 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,889 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,635 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,643 >>> mbox cmd response: failed
1,098,643 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,649 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,966 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,470 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,127 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,135 >>> mbox cmd response: failed
1,098,135 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,141 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,210 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,649,084 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,350 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,358 >>> mbox cmd response: failed
1,097,358 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,364 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,995 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,159 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,418 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,426 >>> mbox cmd response: failed
1,097,426 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,432 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,109 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,251 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,787 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,795 >>> mbox cmd response: failed
1,097,795 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,097,801 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,326 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,790 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,077 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,085 >>> mbox cmd response: failed
1,098,085 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,098,091 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,760 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,164 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,063 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,747 UART: [kat] SHA2-256
881,678 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,793 UART: [kat] ++
885,945 UART: [kat] sha1
890,167 UART: [kat] SHA2-256
892,105 UART: [kat] SHA2-384
894,782 UART: [kat] SHA2-512-ACC
896,683 UART: [kat] ECC-384
902,062 UART: [kat] HMAC-384Kdf
906,612 UART: [kat] LMS
1,474,808 UART: [kat] --
1,475,691 UART: [cold-reset] ++
1,476,209 UART: [fht] Storing FHT @ 0x50003400
1,479,016 UART: [idev] ++
1,479,184 UART: [idev] CDI.KEYID = 6
1,479,544 UART: [idev] SUBJECT.KEYID = 7
1,479,968 UART: [idev] UDS.KEYID = 0
1,480,313 ready_for_fw is high
1,480,313 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,036 UART: [idev] Erasing UDS.KEYID = 0
1,504,406 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,044 UART: [idev] --
1,514,079 UART: [ldev] ++
1,514,247 UART: [ldev] CDI.KEYID = 6
1,514,610 UART: [ldev] SUBJECT.KEYID = 5
1,515,036 UART: [ldev] AUTHORITY.KEYID = 7
1,515,499 UART: [ldev] FE.KEYID = 1
1,520,819 UART: [ldev] Erasing FE.KEYID = 1
1,545,788 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,798 UART: [ldev] --
1,585,283 UART: [fwproc] Waiting for Commands...
1,585,976 UART: [fwproc] Received command 0x46574c44
1,586,767 UART: [fwproc] Received Image of size 115196 bytes
2,894,383 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,073 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,425 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,696 >>> mbox cmd response: success
3,089,830 UART: [afmc] ++
3,089,998 UART: [afmc] CDI.KEYID = 6
3,090,360 UART: [afmc] SUBJECT.KEYID = 7
3,090,785 UART: [afmc] AUTHORITY.KEYID = 5
3,125,242 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,538 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,318 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,046 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,931 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,621 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,456 UART: [afmc] --
3,168,470 UART: [cold-reset] --
3,169,252 UART: [state] Locking Datavault
3,170,321 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,925 UART: [state] Locking ICCM
3,171,461 UART: [exit] Launching FMC @ 0x40000130
3,176,790 UART:
3,176,806 UART: Running Caliptra FMC ...
3,177,214 UART:
3,177,268 UART: [state] CFI Enabled
3,187,871 UART: [fht] FMC Alias Private Key: 7
3,295,608 UART: [art] Extend RT PCRs Done
3,296,036 UART: [art] Lock RT PCRs Done
3,297,432 UART: [art] Populate DV Done
3,305,823 UART: [fht] FMC Alias Private Key: 7
3,306,973 UART: [art] Derive CDI
3,307,253 UART: [art] Store in in slot 0x4
3,393,136 UART: [art] Derive Key Pair
3,393,496 UART: [art] Store priv key in slot 0x5
3,406,962 UART: [art] Derive Key Pair - Done
3,421,863 UART: [art] Signing Cert with AUTHO
3,422,343 UART: RITY.KEYID = 7
3,437,295 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,060 UART: [art] PUB.X = C341F13322E22A543A09509E13334EDBC66544C6CA7633AD89FE8A2EC8D91E041B1DEE6FBA9AE27D2809709A43D3255A
3,444,829 UART: [art] PUB.Y = A6BBA495FBD6A36ED4402E06D14679621994BA16C37B25531CAC1F10988EBA8DD957780AB7DA533E05D79B0E65165EEA
3,451,777 UART: [art] SIG.R = 4C7A6C3DD56B30B73B70E427185051ABAB2A5DDF5CBC3CB5525E3C0A81CD67E761A3E50C9C7C18A3BCFAEBC67AD0C327
3,458,567 UART: [art] SIG.S = 03086C8B216408C299C051C905A35111167FF15AF982691ACFF03F6B5BD29A16F5A7E7C693BA8957EBC49FAEC4425D4D
3,482,636 UART: Caliptra RT
3,482,889 UART: [state] CFI Enabled
3,591,153 UART: [rt] RT listening for mailbox commands...
3,591,816 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,975 UART: [rt]cmd =0x46504c54, len=4
3,622,959 >>> mbox cmd response data (8 bytes)
3,623,180 UART: [rt] FIPS self test
3,623,508 UART: [kat] ++
3,623,660 UART: [kat] sha1
3,627,764 UART: [kat] SHA2-256
3,629,786 UART: [kat] SHA2-384
3,632,701 UART: [kat] SHA2-512-ACC
3,634,628 UART: [kat] ECC-384
3,644,932 UART: [kat] HMAC-384Kdf
3,649,540 UART: [kat] LMS
3,915,581 UART: Fatal Error: 0x90070002
3,917,120 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,917,125 >>> mbox cmd response: failed
3,917,125 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,917,130 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,743 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,313 UART: [kat] SHA2-256
882,244 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,359 UART: [kat] ++
886,511 UART: [kat] sha1
890,949 UART: [kat] SHA2-256
892,887 UART: [kat] SHA2-384
895,762 UART: [kat] SHA2-512-ACC
897,663 UART: [kat] ECC-384
903,066 UART: [kat] HMAC-384Kdf
907,712 UART: [kat] LMS
1,475,908 UART: [kat] --
1,476,671 UART: [cold-reset] ++
1,477,111 UART: [fht] Storing FHT @ 0x50003400
1,479,750 UART: [idev] ++
1,479,918 UART: [idev] CDI.KEYID = 6
1,480,278 UART: [idev] SUBJECT.KEYID = 7
1,480,702 UART: [idev] UDS.KEYID = 0
1,481,047 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,634 UART: [idev] Erasing UDS.KEYID = 0
1,505,048 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,750 UART: [idev] --
1,514,733 UART: [ldev] ++
1,514,901 UART: [ldev] CDI.KEYID = 6
1,515,264 UART: [ldev] SUBJECT.KEYID = 5
1,515,690 UART: [ldev] AUTHORITY.KEYID = 7
1,516,153 UART: [ldev] FE.KEYID = 1
1,521,633 UART: [ldev] Erasing FE.KEYID = 1
1,547,466 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,120 UART: [ldev] --
1,586,465 UART: [fwproc] Waiting for Commands...
1,587,168 UART: [fwproc] Received command 0x46574c44
1,587,959 UART: [fwproc] Received Image of size 115196 bytes
2,896,819 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,911 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,263 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,426 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,159 ready_for_fw is high
1,363,159 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,942,920 >>> mbox cmd response: success
3,004,330 UART:
3,004,346 UART: Running Caliptra FMC ...
3,004,754 UART:
3,004,808 UART: [state] CFI Enabled
3,015,235 UART: [fht] FMC Alias Private Key: 7
3,122,996 UART: [art] Extend RT PCRs Done
3,123,424 UART: [art] Lock RT PCRs Done
3,125,136 UART: [art] Populate DV Done
3,133,255 UART: [fht] FMC Alias Private Key: 7
3,134,379 UART: [art] Derive CDI
3,134,659 UART: [art] Store in in slot 0x4
3,220,336 UART: [art] Derive Key Pair
3,220,696 UART: [art] Store priv key in slot 0x5
3,234,632 UART: [art] Derive Key Pair - Done
3,249,189 UART: [art] Signing Cert with AUTHO
3,249,669 UART: RITY.KEYID = 7
3,264,709 UART: [art] Erasing AUTHORITY.KEYID = 7
3,265,474 UART: [art] PUB.X = BA8386B04B6EF97212747079085295D6446D7305A44386C9563D086E57F5D1837F09B8537CD104B3195A1E0AF5204402
3,272,207 UART: [art] PUB.Y = C10C387420012D4CFF04E67EE4DB68C3183899BA811C6FF50C50A2B52AEDCE58729B028D7C1878A2074D1162F9B67F28
3,279,143 UART: [art] SIG.R = 9D571D7C4CA869283BBB2AEFDFC1AAB4131BBDB5BAF61C792CAE881F041FC5BE2EAE6979CF5678FA58657A3796C32871
3,285,932 UART: [art] SIG.S = 5F3290205A141ED65F36659BF4C683E790EE9BD45C6685609581275A63B6520EF4049B39392F6FE9A3B151F1A054A534
3,309,709 UART: Caliptra RT
3,309,962 UART: [state] CFI Enabled
3,417,767 UART: [rt] RT listening for mailbox commands...
3,418,430 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,445 UART: [rt]cmd =0x46504c54, len=4
3,449,619 >>> mbox cmd response data (8 bytes)
3,449,978 UART: [rt] FIPS self test
3,450,306 UART: [kat] ++
3,450,458 UART: [kat] sha1
3,454,722 UART: [kat] SHA2-256
3,456,744 UART: [kat] SHA2-384
3,459,449 UART: [kat] SHA2-512-ACC
3,461,376 UART: [kat] ECC-384
3,471,524 UART: [kat] HMAC-384Kdf
3,476,008 UART: [kat] LMS
3,742,235 UART: Fatal Error: 0x90070002
3,743,774 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,743,779 >>> mbox cmd response: failed
3,743,779 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,743,784 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,455 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,024 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,766 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,304 UART: [kat] SHA2-256
882,235 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,350 UART: [kat] ++
886,502 UART: [kat] sha1
890,698 UART: [kat] SHA2-256
892,636 UART: [kat] SHA2-384
895,521 UART: [kat] SHA2-512-ACC
897,422 UART: [kat] ECC-384
902,985 UART: [kat] HMAC-384Kdf
907,553 UART: [kat] LMS
1,475,749 UART: [kat] --
1,476,652 UART: [cold-reset] ++
1,477,132 UART: [fht] Storing FHT @ 0x50003400
1,480,019 UART: [idev] ++
1,480,187 UART: [idev] CDI.KEYID = 6
1,480,547 UART: [idev] SUBJECT.KEYID = 7
1,480,971 UART: [idev] UDS.KEYID = 0
1,481,316 ready_for_fw is high
1,481,316 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,955 UART: [idev] Erasing UDS.KEYID = 0
1,505,487 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,207 UART: [idev] --
1,515,300 UART: [ldev] ++
1,515,468 UART: [ldev] CDI.KEYID = 6
1,515,831 UART: [ldev] SUBJECT.KEYID = 5
1,516,257 UART: [ldev] AUTHORITY.KEYID = 7
1,516,720 UART: [ldev] FE.KEYID = 1
1,522,136 UART: [ldev] Erasing FE.KEYID = 1
1,547,895 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,005 UART: [ldev] --
1,587,494 UART: [fwproc] Waiting for Commands...
1,588,327 UART: [fwproc] Received command 0x46574c44
1,589,118 UART: [fwproc] Received Image of size 115196 bytes
2,897,060 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,122 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,474 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,091,535 >>> mbox cmd response: success
3,092,655 UART: [afmc] ++
3,092,823 UART: [afmc] CDI.KEYID = 6
3,093,185 UART: [afmc] SUBJECT.KEYID = 7
3,093,610 UART: [afmc] AUTHORITY.KEYID = 5
3,129,421 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,415 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,195 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,923 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,808 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,498 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,469 UART: [afmc] --
3,172,577 UART: [cold-reset] --
3,173,177 UART: [state] Locking Datavault
3,174,102 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,706 UART: [state] Locking ICCM
3,175,214 UART: [exit] Launching FMC @ 0x40000130
3,180,543 UART:
3,180,559 UART: Running Caliptra FMC ...
3,180,967 UART:
3,181,110 UART: [state] CFI Enabled
3,191,705 UART: [fht] FMC Alias Private Key: 7
3,299,292 UART: [art] Extend RT PCRs Done
3,299,720 UART: [art] Lock RT PCRs Done
3,301,012 UART: [art] Populate DV Done
3,309,177 UART: [fht] FMC Alias Private Key: 7
3,310,339 UART: [art] Derive CDI
3,310,619 UART: [art] Store in in slot 0x4
3,396,248 UART: [art] Derive Key Pair
3,396,608 UART: [art] Store priv key in slot 0x5
3,409,630 UART: [art] Derive Key Pair - Done
3,424,409 UART: [art] Signing Cert with AUTHO
3,424,889 UART: RITY.KEYID = 7
3,440,895 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,660 UART: [art] PUB.X = C001219455E4B5CF0863E8D95D40E113F0A9E4CBFF7746D277A953148CD2F36F199A1C5392B743BF545AA14B0AF0E51D
3,448,427 UART: [art] PUB.Y = 582F28DFE17151988C3EC4A7BD5EBC4C55A311212D1D63E7A799DF054956CAAD24329B5A53B968F079726FE71A65E11D
3,455,380 UART: [art] SIG.R = 809A9C9B087D01CF133FD27C6BDB91C1D5CB4AF722AD8FFD23FB57795D1DBED0389984984CD812B188FCFF7B854BFB3C
3,462,166 UART: [art] SIG.S = E9AC311E2065C2276101BAF969F96AC63EECE146F92230C4F4F4CF6D38DFF2BBF409747C148EAF3EBFC055AE0F4B4F2B
3,485,620 UART: Caliptra RT
3,485,965 UART: [state] CFI Enabled
3,593,985 UART: [rt] RT listening for mailbox commands...
3,594,648 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,719 UART: [rt]cmd =0x46504c54, len=4
3,625,745 >>> mbox cmd response data (8 bytes)
3,626,000 UART: [rt] FIPS self test
3,626,328 UART: [kat] ++
3,626,480 UART: [kat] sha1
3,630,664 UART: [kat] SHA2-256
3,632,686 UART: [kat] SHA2-384
3,635,585 UART: [kat] SHA2-512-ACC
3,637,512 UART: [kat] ECC-384
3,647,330 UART: [kat] HMAC-384Kdf
3,652,044 UART: [kat] LMS
3,918,111 UART: Fatal Error: 0x90070002
3,919,650 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,919,655 >>> mbox cmd response: failed
3,919,655 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,919,660 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,724 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,336 UART: [kat] SHA2-256
882,267 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,382 UART: [kat] ++
886,534 UART: [kat] sha1
890,696 UART: [kat] SHA2-256
892,634 UART: [kat] SHA2-384
895,415 UART: [kat] SHA2-512-ACC
897,316 UART: [kat] ECC-384
903,031 UART: [kat] HMAC-384Kdf
907,565 UART: [kat] LMS
1,475,761 UART: [kat] --
1,476,942 UART: [cold-reset] ++
1,477,494 UART: [fht] Storing FHT @ 0x50003400
1,480,231 UART: [idev] ++
1,480,399 UART: [idev] CDI.KEYID = 6
1,480,759 UART: [idev] SUBJECT.KEYID = 7
1,481,183 UART: [idev] UDS.KEYID = 0
1,481,528 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,175 UART: [idev] Erasing UDS.KEYID = 0
1,505,609 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,039 UART: [idev] --
1,514,960 UART: [ldev] ++
1,515,128 UART: [ldev] CDI.KEYID = 6
1,515,491 UART: [ldev] SUBJECT.KEYID = 5
1,515,917 UART: [ldev] AUTHORITY.KEYID = 7
1,516,380 UART: [ldev] FE.KEYID = 1
1,521,238 UART: [ldev] Erasing FE.KEYID = 1
1,546,863 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,677 UART: [ldev] --
1,586,178 UART: [fwproc] Waiting for Commands...
1,586,809 UART: [fwproc] Received command 0x46574c44
1,587,600 UART: [fwproc] Received Image of size 115196 bytes
2,895,544 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,910 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,262 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,365 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,420 ready_for_fw is high
1,362,420 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,093 >>> mbox cmd response: success
3,000,237 UART:
3,000,253 UART: Running Caliptra FMC ...
3,000,661 UART:
3,000,804 UART: [state] CFI Enabled
3,011,011 UART: [fht] FMC Alias Private Key: 7
3,119,048 UART: [art] Extend RT PCRs Done
3,119,476 UART: [art] Lock RT PCRs Done
3,120,800 UART: [art] Populate DV Done
3,129,283 UART: [fht] FMC Alias Private Key: 7
3,130,275 UART: [art] Derive CDI
3,130,555 UART: [art] Store in in slot 0x4
3,216,386 UART: [art] Derive Key Pair
3,216,746 UART: [art] Store priv key in slot 0x5
3,230,436 UART: [art] Derive Key Pair - Done
3,245,109 UART: [art] Signing Cert with AUTHO
3,245,589 UART: RITY.KEYID = 7
3,260,845 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,610 UART: [art] PUB.X = EFBDDC3D9656691E0872A627B00D35D750CFDAB36E121B580CF31B634599A3A4A9B3523C9C51975116999AC679247CD5
3,268,373 UART: [art] PUB.Y = EA31BF824A5424149C9FAFEA979D67E440ED8A7CE9838C0E6B3E1914FF369BE2B27E4F30826FBD8B6FF201FDDB9A139B
3,275,337 UART: [art] SIG.R = 7B2D7CF630465FBBEDC4FDD5A2C15E5FBC58A23CDD20AA4E088C3FF447D08105A34F16AC3677400BEDB5246DE80E2C7B
3,282,119 UART: [art] SIG.S = BF495F7AA66BBCFEDB358E471627B2D704ED23E5ABA2375481FDEF8FAD56C944E4D34F19FD58C90B9BEAB25F4310B95F
3,305,672 UART: Caliptra RT
3,306,017 UART: [state] CFI Enabled
3,413,784 UART: [rt] RT listening for mailbox commands...
3,414,447 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,002 UART: [rt]cmd =0x46504c54, len=4
3,445,084 >>> mbox cmd response data (8 bytes)
3,445,391 UART: [rt] FIPS self test
3,445,719 UART: [kat] ++
3,445,871 UART: [kat] sha1
3,450,295 UART: [kat] SHA2-256
3,452,317 UART: [kat] SHA2-384
3,455,086 UART: [kat] SHA2-512-ACC
3,457,013 UART: [kat] ECC-384
3,467,183 UART: [kat] HMAC-384Kdf
3,471,859 UART: [kat] LMS
3,738,084 UART: Fatal Error: 0x90070002
3,739,623 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,739,628 >>> mbox cmd response: failed
3,739,628 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,739,633 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,750 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,461 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,691 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
893,580 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,705 UART: [kat] ++
897,857 UART: [kat] sha1
902,071 UART: [kat] SHA2-256
904,011 UART: [kat] SHA2-384
906,686 UART: [kat] SHA2-512-ACC
908,587 UART: [kat] ECC-384
917,824 UART: [kat] HMAC-384Kdf
922,400 UART: [kat] LMS
1,170,728 UART: [kat] --
1,171,757 UART: [cold-reset] ++
1,172,323 UART: [fht] FHT @ 0x50003400
1,175,102 UART: [idev] ++
1,175,270 UART: [idev] CDI.KEYID = 6
1,175,630 UART: [idev] SUBJECT.KEYID = 7
1,176,054 UART: [idev] UDS.KEYID = 0
1,176,399 ready_for_fw is high
1,176,399 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,226 UART: [idev] Erasing UDS.KEYID = 0
1,201,069 UART: [idev] Sha1 KeyId Algorithm
1,209,553 UART: [idev] --
1,210,671 UART: [ldev] ++
1,210,839 UART: [ldev] CDI.KEYID = 6
1,211,202 UART: [ldev] SUBJECT.KEYID = 5
1,211,628 UART: [ldev] AUTHORITY.KEYID = 7
1,212,091 UART: [ldev] FE.KEYID = 1
1,217,417 UART: [ldev] Erasing FE.KEYID = 1
1,243,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,295 UART: [ldev] --
1,282,692 UART: [fwproc] Wait for Commands...
1,283,372 UART: [fwproc] Recv command 0x46574c44
1,284,100 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,004 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,308 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,479 >>> mbox cmd response: success
2,786,649 UART: [afmc] ++
2,786,817 UART: [afmc] CDI.KEYID = 6
2,787,179 UART: [afmc] SUBJECT.KEYID = 7
2,787,604 UART: [afmc] AUTHORITY.KEYID = 5
2,822,623 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,088 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,836 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,564 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,449 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,168 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,136 UART: [afmc] --
2,866,152 UART: [cold-reset] --
2,867,076 UART: [state] Locking Datavault
2,868,329 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,933 UART: [state] Locking ICCM
2,869,393 UART: [exit] Launching FMC @ 0x40000130
2,874,722 UART:
2,874,738 UART: Running Caliptra FMC ...
2,875,146 UART:
2,875,200 UART: [state] CFI Enabled
2,885,491 UART: [fht] FMC Alias Private Key: 7
2,993,424 UART: [art] Extend RT PCRs Done
2,993,852 UART: [art] Lock RT PCRs Done
2,995,598 UART: [art] Populate DV Done
3,003,851 UART: [fht] FMC Alias Private Key: 7
3,004,973 UART: [art] Derive CDI
3,005,253 UART: [art] Store in in slot 0x4
3,090,842 UART: [art] Derive Key Pair
3,091,202 UART: [art] Store priv key in slot 0x5
3,104,618 UART: [art] Derive Key Pair - Done
3,119,225 UART: [art] Signing Cert with AUTHO
3,119,705 UART: RITY.KEYID = 7
3,134,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,222 UART: [art] PUB.X = 470AA1B8609DEE8F4BE0F3246C6A0A18B784A9467DD06F76C1A3DCBACCBD7F67ECE0B66AED408543164DA1093C1DDD94
3,142,005 UART: [art] PUB.Y = 9F903E0FA148A0494DC62142A7914E3809FC23A732EDE75CA8AC50D084B344916253BA722EADB428262F8C53E4F80BCA
3,148,952 UART: [art] SIG.R = 886EEB7849609F43B971C8C5B8F944B1861BBEE4C9BD459353A481F6952407ED4FEE532C0DA8AEE45741323D2DABF5E9
3,155,726 UART: [art] SIG.S = BDA74EA6E3BC402518B6D896C067BA277C26B403234C14899AC35DB34B7E2EADE86D4647DE5D545D97EBA863B38283F2
3,178,934 UART: Caliptra RT
3,179,187 UART: [state] CFI Enabled
3,286,509 UART: [rt] RT listening for mailbox commands...
3,287,172 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,909 UART: [rt]cmd =0x46504c54, len=4
3,318,047 >>> mbox cmd response data (8 bytes)
3,318,196 UART: [rt] FIPS self test
3,318,524 UART: [kat] ++
3,318,676 UART: [kat] sha1
3,322,828 UART: [kat] SHA2-256
3,324,850 UART: [kat] SHA2-384
3,327,673 UART: [kat] SHA2-512-ACC
3,329,600 UART: [kat] ECC-384
3,338,938 UART: [kat] HMAC-384Kdf
3,343,480 UART: [kat] LMS
3,609,687 UART: Fatal Error: 0x90070002
3,611,226 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,611,231 >>> mbox cmd response: failed
3,611,231 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,611,236 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,460 UART: [state] LifecycleState = Unprovisioned
86,115 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
893,468 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,593 UART: [kat] ++
897,745 UART: [kat] sha1
901,897 UART: [kat] SHA2-256
903,837 UART: [kat] SHA2-384
906,544 UART: [kat] SHA2-512-ACC
908,445 UART: [kat] ECC-384
917,946 UART: [kat] HMAC-384Kdf
922,416 UART: [kat] LMS
1,170,744 UART: [kat] --
1,171,417 UART: [cold-reset] ++
1,171,905 UART: [fht] FHT @ 0x50003400
1,174,346 UART: [idev] ++
1,174,514 UART: [idev] CDI.KEYID = 6
1,174,874 UART: [idev] SUBJECT.KEYID = 7
1,175,298 UART: [idev] UDS.KEYID = 0
1,175,643 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,956 UART: [idev] Erasing UDS.KEYID = 0
1,200,207 UART: [idev] Sha1 KeyId Algorithm
1,208,693 UART: [idev] --
1,209,831 UART: [ldev] ++
1,209,999 UART: [ldev] CDI.KEYID = 6
1,210,362 UART: [ldev] SUBJECT.KEYID = 5
1,210,788 UART: [ldev] AUTHORITY.KEYID = 7
1,211,251 UART: [ldev] FE.KEYID = 1
1,216,427 UART: [ldev] Erasing FE.KEYID = 1
1,242,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,731 UART: [ldev] --
1,282,244 UART: [fwproc] Wait for Commands...
1,282,954 UART: [fwproc] Recv command 0x46574c44
1,283,682 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,258 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,562 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,683 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,349 ready_for_fw is high
1,060,349 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,286 >>> mbox cmd response: success
2,698,758 UART:
2,698,774 UART: Running Caliptra FMC ...
2,699,182 UART:
2,699,236 UART: [state] CFI Enabled
2,709,637 UART: [fht] FMC Alias Private Key: 7
2,817,884 UART: [art] Extend RT PCRs Done
2,818,312 UART: [art] Lock RT PCRs Done
2,819,824 UART: [art] Populate DV Done
2,828,135 UART: [fht] FMC Alias Private Key: 7
2,829,223 UART: [art] Derive CDI
2,829,503 UART: [art] Store in in slot 0x4
2,915,054 UART: [art] Derive Key Pair
2,915,414 UART: [art] Store priv key in slot 0x5
2,928,738 UART: [art] Derive Key Pair - Done
2,943,640 UART: [art] Signing Cert with AUTHO
2,944,120 UART: RITY.KEYID = 7
2,958,982 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,747 UART: [art] PUB.X = 6C1D86E6A43E87F8218011F1B00325BDF62F3000F6D687400BA83AD5B0CDFE0F2B6D16BC34F354A4CD2BA5BA6B51C136
2,966,500 UART: [art] PUB.Y = CC86DA598D91311D8DAF3451F85A493833A76E9E3D838CBC7FE988E3003E34005C1A09319A093C7617BC7528EB6D2F49
2,973,402 UART: [art] SIG.R = 9525B1D3AA9FE094906F43CD7525A17042ED962B9FB8FE273D262010245F83B146D12BC6346BE41149EE2BA4D8AF2953
2,980,174 UART: [art] SIG.S = 634E348024651E00383F830F88D5B2439DF6A3D47C48E47CF31F8AE3B4076981E1685A997CCA6D04121F79FFC4DF82D1
3,004,776 UART: Caliptra RT
3,005,029 UART: [state] CFI Enabled
3,112,618 UART: [rt] RT listening for mailbox commands...
3,113,281 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,072 UART: [rt]cmd =0x46504c54, len=4
3,144,346 >>> mbox cmd response data (8 bytes)
3,144,515 UART: [rt] FIPS self test
3,144,843 UART: [kat] ++
3,144,995 UART: [kat] sha1
3,149,309 UART: [kat] SHA2-256
3,151,331 UART: [kat] SHA2-384
3,154,284 UART: [kat] SHA2-512-ACC
3,156,211 UART: [kat] ECC-384
3,166,397 UART: [kat] HMAC-384Kdf
3,170,921 UART: [kat] LMS
3,437,052 UART: Fatal Error: 0x90070002
3,438,591 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,438,596 >>> mbox cmd response: failed
3,438,596 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,438,601 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,699 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,770 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
893,457 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,582 UART: [kat] ++
897,734 UART: [kat] sha1
902,176 UART: [kat] SHA2-256
904,116 UART: [kat] SHA2-384
906,967 UART: [kat] SHA2-512-ACC
908,868 UART: [kat] ECC-384
918,939 UART: [kat] HMAC-384Kdf
923,437 UART: [kat] LMS
1,171,765 UART: [kat] --
1,172,736 UART: [cold-reset] ++
1,173,118 UART: [fht] FHT @ 0x50003400
1,175,751 UART: [idev] ++
1,175,919 UART: [idev] CDI.KEYID = 6
1,176,279 UART: [idev] SUBJECT.KEYID = 7
1,176,703 UART: [idev] UDS.KEYID = 0
1,177,048 ready_for_fw is high
1,177,048 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,955 UART: [idev] Erasing UDS.KEYID = 0
1,202,394 UART: [idev] Sha1 KeyId Algorithm
1,210,972 UART: [idev] --
1,212,122 UART: [ldev] ++
1,212,290 UART: [ldev] CDI.KEYID = 6
1,212,653 UART: [ldev] SUBJECT.KEYID = 5
1,213,079 UART: [ldev] AUTHORITY.KEYID = 7
1,213,542 UART: [ldev] FE.KEYID = 1
1,218,740 UART: [ldev] Erasing FE.KEYID = 1
1,245,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,880 UART: [ldev] --
1,285,153 UART: [fwproc] Wait for Commands...
1,285,811 UART: [fwproc] Recv command 0x46574c44
1,286,539 UART: [fwproc] Recv'd Img size: 115196 bytes
2,594,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,477 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,781 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,788,860 >>> mbox cmd response: success
2,790,086 UART: [afmc] ++
2,790,254 UART: [afmc] CDI.KEYID = 6
2,790,616 UART: [afmc] SUBJECT.KEYID = 7
2,791,041 UART: [afmc] AUTHORITY.KEYID = 5
2,826,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,905 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,653 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,381 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,266 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,985 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,833 UART: [afmc] --
2,869,909 UART: [cold-reset] --
2,870,567 UART: [state] Locking Datavault
2,871,700 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,304 UART: [state] Locking ICCM
2,872,918 UART: [exit] Launching FMC @ 0x40000130
2,878,247 UART:
2,878,263 UART: Running Caliptra FMC ...
2,878,671 UART:
2,878,814 UART: [state] CFI Enabled
2,889,153 UART: [fht] FMC Alias Private Key: 7
2,997,538 UART: [art] Extend RT PCRs Done
2,997,966 UART: [art] Lock RT PCRs Done
2,999,374 UART: [art] Populate DV Done
3,007,735 UART: [fht] FMC Alias Private Key: 7
3,008,745 UART: [art] Derive CDI
3,009,025 UART: [art] Store in in slot 0x4
3,094,758 UART: [art] Derive Key Pair
3,095,118 UART: [art] Store priv key in slot 0x5
3,109,046 UART: [art] Derive Key Pair - Done
3,123,931 UART: [art] Signing Cert with AUTHO
3,124,411 UART: RITY.KEYID = 7
3,139,439 UART: [art] Erasing AUTHORITY.KEYID = 7
3,140,204 UART: [art] PUB.X = A82859F6C81C9444078A0B1BC05767AF3DD10C779C2A7C33CF99E77FEE33C6E4AD14B9F52544C2F81D60368AAC029F70
3,146,970 UART: [art] PUB.Y = 8C2DB18A23D50F85692FA041FD4385F1752386AF93B1D917799B3042EA9C7F58E1097814E0225BA22E3289027391D169
3,153,901 UART: [art] SIG.R = 690C8B77DF8C75D7DF9F7CA46A028683B470D7908F3B725470FCB1C25669B2C1A66F37E4008FFBFA9574E0D370ACC8DD
3,160,655 UART: [art] SIG.S = 2EA4DB2209BFFAF8BE398201F32337F72F9CC7560BC57D7DA9BB0A7B18ED22F7D318966395A24F09644D54E0B829D7D8
3,184,549 UART: Caliptra RT
3,184,894 UART: [state] CFI Enabled
3,292,819 UART: [rt] RT listening for mailbox commands...
3,293,482 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,145 UART: [rt]cmd =0x46504c54, len=4
3,324,435 >>> mbox cmd response data (8 bytes)
3,324,712 UART: [rt] FIPS self test
3,325,040 UART: [kat] ++
3,325,192 UART: [kat] sha1
3,329,346 UART: [kat] SHA2-256
3,331,368 UART: [kat] SHA2-384
3,334,237 UART: [kat] SHA2-512-ACC
3,336,164 UART: [kat] ECC-384
3,346,140 UART: [kat] HMAC-384Kdf
3,350,772 UART: [kat] LMS
3,616,963 UART: Fatal Error: 0x90070002
3,618,502 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,618,507 >>> mbox cmd response: failed
3,618,507 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,618,512 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [kat] SHA2-256
893,557 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,682 UART: [kat] ++
897,834 UART: [kat] sha1
902,102 UART: [kat] SHA2-256
904,042 UART: [kat] SHA2-384
906,757 UART: [kat] SHA2-512-ACC
908,658 UART: [kat] ECC-384
918,265 UART: [kat] HMAC-384Kdf
922,975 UART: [kat] LMS
1,171,303 UART: [kat] --
1,172,400 UART: [cold-reset] ++
1,172,918 UART: [fht] FHT @ 0x50003400
1,175,617 UART: [idev] ++
1,175,785 UART: [idev] CDI.KEYID = 6
1,176,145 UART: [idev] SUBJECT.KEYID = 7
1,176,569 UART: [idev] UDS.KEYID = 0
1,176,914 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,551 UART: [idev] Erasing UDS.KEYID = 0
1,201,584 UART: [idev] Sha1 KeyId Algorithm
1,210,208 UART: [idev] --
1,211,320 UART: [ldev] ++
1,211,488 UART: [ldev] CDI.KEYID = 6
1,211,851 UART: [ldev] SUBJECT.KEYID = 5
1,212,277 UART: [ldev] AUTHORITY.KEYID = 7
1,212,740 UART: [ldev] FE.KEYID = 1
1,218,204 UART: [ldev] Erasing FE.KEYID = 1
1,244,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,990 UART: [ldev] --
1,283,465 UART: [fwproc] Wait for Commands...
1,284,213 UART: [fwproc] Recv command 0x46574c44
1,284,941 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,953 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,257 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,284 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,436 ready_for_fw is high
1,060,436 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,731 >>> mbox cmd response: success
2,700,619 UART:
2,700,635 UART: Running Caliptra FMC ...
2,701,043 UART:
2,701,186 UART: [state] CFI Enabled
2,712,003 UART: [fht] FMC Alias Private Key: 7
2,819,438 UART: [art] Extend RT PCRs Done
2,819,866 UART: [art] Lock RT PCRs Done
2,821,362 UART: [art] Populate DV Done
2,829,775 UART: [fht] FMC Alias Private Key: 7
2,830,705 UART: [art] Derive CDI
2,830,985 UART: [art] Store in in slot 0x4
2,916,680 UART: [art] Derive Key Pair
2,917,040 UART: [art] Store priv key in slot 0x5
2,931,054 UART: [art] Derive Key Pair - Done
2,946,000 UART: [art] Signing Cert with AUTHO
2,946,480 UART: RITY.KEYID = 7
2,961,474 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,239 UART: [art] PUB.X = 191C3FAC16977301156861A73AFDECE925D96CE212341FB98FEB1E280A1D0CA7A1653681881026D001B3CE9F5CA02C57
2,969,001 UART: [art] PUB.Y = 6E762A85283781D49E1E226FCDC42B20A0E6A9EAF4C44E443A12111595D15A139FCDB614F8A2F128604D6D87D747B02D
2,975,955 UART: [art] SIG.R = 0D5B33E1C241608F012F5D32330715A2AB1AC40E5696EECA80EA3257303BD9D53BE1D95E48D3D84FD9A28B14B0D87748
2,982,719 UART: [art] SIG.S = 0A0B3F8385C354BDF0633717ECF992240A22AAAC39B2C50B8149593288FBF14B5FBAAF23CDCA8AB58975E394BA916C2A
3,006,284 UART: Caliptra RT
3,006,629 UART: [state] CFI Enabled
3,114,508 UART: [rt] RT listening for mailbox commands...
3,115,171 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,892 UART: [rt]cmd =0x46504c54, len=4
3,146,008 >>> mbox cmd response data (8 bytes)
3,146,199 UART: [rt] FIPS self test
3,146,527 UART: [kat] ++
3,146,679 UART: [kat] sha1
3,151,003 UART: [kat] SHA2-256
3,153,025 UART: [kat] SHA2-384
3,155,878 UART: [kat] SHA2-512-ACC
3,157,805 UART: [kat] ECC-384
3,167,669 UART: [kat] HMAC-384Kdf
3,172,389 UART: [kat] LMS
3,438,416 UART: Fatal Error: 0x90070002
3,439,955 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,439,960 >>> mbox cmd response: failed
3,439,960 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,439,965 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,350 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,405 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,255 UART: [kat] ++
895,407 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,412 UART: [kat] SHA2-512-ACC
906,313 UART: [kat] ECC-384
916,034 UART: [kat] HMAC-384Kdf
920,496 UART: [kat] LMS
1,168,808 UART: [kat] --
1,169,833 UART: [cold-reset] ++
1,170,213 UART: [fht] FHT @ 0x50003400
1,172,897 UART: [idev] ++
1,173,065 UART: [idev] CDI.KEYID = 6
1,173,426 UART: [idev] SUBJECT.KEYID = 7
1,173,851 UART: [idev] UDS.KEYID = 0
1,174,197 ready_for_fw is high
1,174,197 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,939 UART: [idev] Erasing UDS.KEYID = 0
1,198,121 UART: [idev] Sha1 KeyId Algorithm
1,206,917 UART: [idev] --
1,207,948 UART: [ldev] ++
1,208,116 UART: [ldev] CDI.KEYID = 6
1,208,480 UART: [ldev] SUBJECT.KEYID = 5
1,208,907 UART: [ldev] AUTHORITY.KEYID = 7
1,209,370 UART: [ldev] FE.KEYID = 1
1,214,428 UART: [ldev] Erasing FE.KEYID = 1
1,240,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,528 UART: [ldev] --
1,279,856 UART: [fwproc] Wait for Commands...
1,280,471 UART: [fwproc] Recv command 0x46574c44
1,281,204 UART: [fwproc] Recv'd Img size: 115196 bytes
2,588,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,164 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,473 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,782,647 >>> mbox cmd response: success
2,783,848 UART: [afmc] ++
2,784,016 UART: [afmc] CDI.KEYID = 6
2,784,379 UART: [afmc] SUBJECT.KEYID = 7
2,784,805 UART: [afmc] AUTHORITY.KEYID = 5
2,820,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,280 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,163 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,882 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,609 UART: [afmc] --
2,863,635 UART: [cold-reset] --
2,864,573 UART: [state] Locking Datavault
2,865,576 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,180 UART: [state] Locking ICCM
2,866,618 UART: [exit] Launching FMC @ 0x40000130
2,871,947 UART:
2,871,963 UART: Running Caliptra FMC ...
2,872,371 UART:
2,872,425 UART: [state] CFI Enabled
2,882,696 UART: [fht] FMC Alias Private Key: 7
2,991,641 UART: [art] Extend RT PCRs Done
2,992,069 UART: [art] Lock RT PCRs Done
2,993,695 UART: [art] Populate DV Done
3,001,876 UART: [fht] FMC Alias Private Key: 7
3,002,830 UART: [art] Derive CDI
3,003,110 UART: [art] Store in in slot 0x4
3,089,095 UART: [art] Derive Key Pair
3,089,455 UART: [art] Store priv key in slot 0x5
3,102,473 UART: [art] Derive Key Pair - Done
3,117,097 UART: [art] Signing Cert with AUTHO
3,117,577 UART: RITY.KEYID = 7
3,132,447 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,212 UART: [art] PUB.X = AEE2D9F4EB7F6220F6723737B6C8387CFA106BBCE212175BB0CF3E31075966F34B32EE8C0D87B5BDFBCC0AA59F5C83BF
3,139,995 UART: [art] PUB.Y = 6C65D229B00EDC7C4561B4A310468C7A8E1B8E1E41A452BA199BA6AD1BC73C5509D78ED58DC76CD628E13B4099495F14
3,146,947 UART: [art] SIG.R = EEA5BFBF093CE6D06E22B448751224312B06E671363C72ED3A00F0104E7A238718F092DB6493C3D7459ABA118422542E
3,153,687 UART: [art] SIG.S = 4463C2184F0CDA76339910DF204E608A611A4E6F690262B0C3393F15BA16976CD5E814E89C8150EE55A30F99165F54D1
3,177,457 UART: Caliptra RT
3,177,710 UART: [state] CFI Enabled
3,286,377 UART: [rt] RT listening for mailbox commands...
3,287,040 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,569 UART: [rt]cmd =0x46504c54, len=4
3,317,783 >>> mbox cmd response data (8 bytes)
3,318,122 UART: [rt] FIPS self test
3,318,450 UART: [kat] ++
3,318,602 UART: [kat] sha1
3,322,834 UART: [kat] SHA2-256
3,324,856 UART: [kat] SHA2-384
3,327,701 UART: [kat] SHA2-512-ACC
3,329,628 UART: [kat] ECC-384
3,339,550 UART: [kat] HMAC-384Kdf
3,344,044 UART: [kat] LMS
3,610,193 UART: Fatal Error: 0x90070002
3,611,732 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,611,737 >>> mbox cmd response: failed
3,611,737 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,611,742 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
891,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,303 UART: [kat] ++
895,455 UART: [kat] sha1
899,743 UART: [kat] SHA2-256
901,683 UART: [kat] SHA2-384
904,480 UART: [kat] SHA2-512-ACC
906,381 UART: [kat] ECC-384
915,880 UART: [kat] HMAC-384Kdf
920,440 UART: [kat] LMS
1,168,752 UART: [kat] --
1,169,621 UART: [cold-reset] ++
1,170,003 UART: [fht] FHT @ 0x50003400
1,172,505 UART: [idev] ++
1,172,673 UART: [idev] CDI.KEYID = 6
1,173,034 UART: [idev] SUBJECT.KEYID = 7
1,173,459 UART: [idev] UDS.KEYID = 0
1,173,805 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,425 UART: [idev] Erasing UDS.KEYID = 0
1,198,761 UART: [idev] Sha1 KeyId Algorithm
1,207,563 UART: [idev] --
1,208,558 UART: [ldev] ++
1,208,726 UART: [ldev] CDI.KEYID = 6
1,209,090 UART: [ldev] SUBJECT.KEYID = 5
1,209,517 UART: [ldev] AUTHORITY.KEYID = 7
1,209,980 UART: [ldev] FE.KEYID = 1
1,215,110 UART: [ldev] Erasing FE.KEYID = 1
1,240,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,820 UART: [ldev] --
1,280,218 UART: [fwproc] Wait for Commands...
1,280,911 UART: [fwproc] Recv command 0x46574c44
1,281,644 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,206 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,515 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,625 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,976 ready_for_fw is high
1,055,976 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,817 >>> mbox cmd response: success
2,696,415 UART:
2,696,431 UART: Running Caliptra FMC ...
2,696,839 UART:
2,696,893 UART: [state] CFI Enabled
2,707,132 UART: [fht] FMC Alias Private Key: 7
2,815,413 UART: [art] Extend RT PCRs Done
2,815,841 UART: [art] Lock RT PCRs Done
2,817,351 UART: [art] Populate DV Done
2,825,650 UART: [fht] FMC Alias Private Key: 7
2,826,690 UART: [art] Derive CDI
2,826,970 UART: [art] Store in in slot 0x4
2,912,741 UART: [art] Derive Key Pair
2,913,101 UART: [art] Store priv key in slot 0x5
2,925,847 UART: [art] Derive Key Pair - Done
2,940,255 UART: [art] Signing Cert with AUTHO
2,940,735 UART: RITY.KEYID = 7
2,955,427 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,192 UART: [art] PUB.X = E3AD6887C5A65C0E810636CDB47778381D5FC17774E28864B78B6734D7CCAADFFBAF515EFDDB52065B206B06B2254DFF
2,962,964 UART: [art] PUB.Y = A4B9A2417B8F3E2D071E06FDE09DD932CA15A26CC29B006EC0046B855A7C6656933CCD00CA7790CBF49E223C482B5390
2,969,869 UART: [art] SIG.R = AD0673C5008D5D59C44017E5A7CD8A30DB27B56F4C275F097101621F9EF5EE194E7B8E9774818F6C57FEC7ADF13603A2
2,976,611 UART: [art] SIG.S = C647F7821F32D87DE2ACB754F8B81F144A60207E4E105C15F83A35A607897778C0DB8BBF210E96CA455F7B1AFC3DF800
3,000,430 UART: Caliptra RT
3,000,683 UART: [state] CFI Enabled
3,108,237 UART: [rt] RT listening for mailbox commands...
3,108,900 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,863 UART: [rt]cmd =0x46504c54, len=4
3,139,975 >>> mbox cmd response data (8 bytes)
3,140,118 UART: [rt] FIPS self test
3,140,446 UART: [kat] ++
3,140,598 UART: [kat] sha1
3,144,726 UART: [kat] SHA2-256
3,146,748 UART: [kat] SHA2-384
3,149,591 UART: [kat] SHA2-512-ACC
3,151,518 UART: [kat] ECC-384
3,161,788 UART: [kat] HMAC-384Kdf
3,166,454 UART: [kat] LMS
3,432,601 UART: Fatal Error: 0x90070002
3,434,140 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,434,145 >>> mbox cmd response: failed
3,434,145 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,434,150 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,354 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,261 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,896 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
891,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,708 UART: [kat] ++
895,860 UART: [kat] sha1
900,122 UART: [kat] SHA2-256
902,062 UART: [kat] SHA2-384
904,765 UART: [kat] SHA2-512-ACC
906,666 UART: [kat] ECC-384
916,627 UART: [kat] HMAC-384Kdf
921,261 UART: [kat] LMS
1,169,573 UART: [kat] --
1,170,388 UART: [cold-reset] ++
1,170,812 UART: [fht] FHT @ 0x50003400
1,173,620 UART: [idev] ++
1,173,788 UART: [idev] CDI.KEYID = 6
1,174,149 UART: [idev] SUBJECT.KEYID = 7
1,174,574 UART: [idev] UDS.KEYID = 0
1,174,920 ready_for_fw is high
1,174,920 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,842 UART: [idev] Erasing UDS.KEYID = 0
1,200,096 UART: [idev] Sha1 KeyId Algorithm
1,208,918 UART: [idev] --
1,209,841 UART: [ldev] ++
1,210,009 UART: [ldev] CDI.KEYID = 6
1,210,373 UART: [ldev] SUBJECT.KEYID = 5
1,210,800 UART: [ldev] AUTHORITY.KEYID = 7
1,211,263 UART: [ldev] FE.KEYID = 1
1,216,319 UART: [ldev] Erasing FE.KEYID = 1
1,242,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,805 UART: [ldev] --
1,282,315 UART: [fwproc] Wait for Commands...
1,283,064 UART: [fwproc] Recv command 0x46574c44
1,283,797 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,617 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,926 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,102 >>> mbox cmd response: success
2,787,327 UART: [afmc] ++
2,787,495 UART: [afmc] CDI.KEYID = 6
2,787,858 UART: [afmc] SUBJECT.KEYID = 7
2,788,284 UART: [afmc] AUTHORITY.KEYID = 5
2,824,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,856 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,585 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,468 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,187 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,248 UART: [afmc] --
2,868,140 UART: [cold-reset] --
2,868,828 UART: [state] Locking Datavault
2,869,887 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,491 UART: [state] Locking ICCM
2,871,165 UART: [exit] Launching FMC @ 0x40000130
2,876,494 UART:
2,876,510 UART: Running Caliptra FMC ...
2,876,918 UART:
2,877,061 UART: [state] CFI Enabled
2,887,852 UART: [fht] FMC Alias Private Key: 7
2,995,867 UART: [art] Extend RT PCRs Done
2,996,295 UART: [art] Lock RT PCRs Done
2,997,949 UART: [art] Populate DV Done
3,006,196 UART: [fht] FMC Alias Private Key: 7
3,007,134 UART: [art] Derive CDI
3,007,414 UART: [art] Store in in slot 0x4
3,093,259 UART: [art] Derive Key Pair
3,093,619 UART: [art] Store priv key in slot 0x5
3,106,991 UART: [art] Derive Key Pair - Done
3,121,698 UART: [art] Signing Cert with AUTHO
3,122,178 UART: RITY.KEYID = 7
3,137,510 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,275 UART: [art] PUB.X = 251C6C9B2A6A64C714BC18373728D4998C1FF1A347E4D5874A9A790CF57939D241E6B30BF353287B0C2E7DBA0DED1338
3,145,037 UART: [art] PUB.Y = 48359029C57B5B2852536FEE828559B6650DF8930F693ECD34CCFCA9FCE5DE8F1A4B54BFB0BA4830C58F43170B25299F
3,151,986 UART: [art] SIG.R = DC18BD479A9727A4574C4A0252F54D76849011E71AD6935810EA3F9426D4EC6C3CB8B55B5621CC0AB2EE76A7E7421E69
3,158,754 UART: [art] SIG.S = 25BC0F024DA0C928E7AAF00E48D93E3CAE090A752583B6B0EEB3DFA7C512681DC818C95E9647FB37DAE256E2FBD273FC
3,182,654 UART: Caliptra RT
3,182,999 UART: [state] CFI Enabled
3,290,880 UART: [rt] RT listening for mailbox commands...
3,291,543 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,610 UART: [rt]cmd =0x46504c54, len=4
3,322,628 >>> mbox cmd response data (8 bytes)
3,322,825 UART: [rt] FIPS self test
3,323,153 UART: [kat] ++
3,323,305 UART: [kat] sha1
3,327,423 UART: [kat] SHA2-256
3,329,445 UART: [kat] SHA2-384
3,332,300 UART: [kat] SHA2-512-ACC
3,334,227 UART: [kat] ECC-384
3,344,769 UART: [kat] HMAC-384Kdf
3,349,407 UART: [kat] LMS
3,615,640 UART: Fatal Error: 0x90070002
3,617,179 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,617,184 >>> mbox cmd response: failed
3,617,184 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,617,189 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
891,497 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,626 UART: [kat] ++
895,778 UART: [kat] sha1
900,042 UART: [kat] SHA2-256
901,982 UART: [kat] SHA2-384
904,689 UART: [kat] SHA2-512-ACC
906,590 UART: [kat] ECC-384
915,913 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,170,114 UART: [cold-reset] ++
1,170,500 UART: [fht] FHT @ 0x50003400
1,173,202 UART: [idev] ++
1,173,370 UART: [idev] CDI.KEYID = 6
1,173,731 UART: [idev] SUBJECT.KEYID = 7
1,174,156 UART: [idev] UDS.KEYID = 0
1,174,502 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,372 UART: [idev] Erasing UDS.KEYID = 0
1,198,930 UART: [idev] Sha1 KeyId Algorithm
1,207,810 UART: [idev] --
1,208,831 UART: [ldev] ++
1,208,999 UART: [ldev] CDI.KEYID = 6
1,209,363 UART: [ldev] SUBJECT.KEYID = 5
1,209,790 UART: [ldev] AUTHORITY.KEYID = 7
1,210,253 UART: [ldev] FE.KEYID = 1
1,215,627 UART: [ldev] Erasing FE.KEYID = 1
1,241,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,595 UART: [ldev] --
1,280,869 UART: [fwproc] Wait for Commands...
1,281,514 UART: [fwproc] Recv command 0x46574c44
1,282,247 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,441 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,750 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,802 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,697 ready_for_fw is high
1,057,697 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,636,492 >>> mbox cmd response: success
2,698,924 UART:
2,698,940 UART: Running Caliptra FMC ...
2,699,348 UART:
2,699,491 UART: [state] CFI Enabled
2,709,838 UART: [fht] FMC Alias Private Key: 7
2,817,999 UART: [art] Extend RT PCRs Done
2,818,427 UART: [art] Lock RT PCRs Done
2,820,311 UART: [art] Populate DV Done
2,828,420 UART: [fht] FMC Alias Private Key: 7
2,829,368 UART: [art] Derive CDI
2,829,648 UART: [art] Store in in slot 0x4
2,915,569 UART: [art] Derive Key Pair
2,915,929 UART: [art] Store priv key in slot 0x5
2,929,677 UART: [art] Derive Key Pair - Done
2,944,460 UART: [art] Signing Cert with AUTHO
2,944,940 UART: RITY.KEYID = 7
2,959,902 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,667 UART: [art] PUB.X = 00A1F86E9A07005F65407E863BA141DEC5D6C724C4EC1AA7C17E6E0A53A8099BECA223A2D516FDFB83FB8F2216F4AD12
2,967,400 UART: [art] PUB.Y = 6992D1AD196AB40B3DD00BC77C392FBE9CCB745031F4BBDC80E977C8DF23AD99E57D7F8EE97602F8891E0DF20FA364B8
2,974,353 UART: [art] SIG.R = 8F23963B632893B1F47C3A24B64A209ED65F750875D9C5EC79A7A60D8FF8297AED8DA0F79DF69BC8987D9169DAD17A3F
2,981,127 UART: [art] SIG.S = 8EDDADCF10B6025E511E2EAA7BDA52AE515904AA08181A4F21F2D37457CAE4BE4FB95A7993BB805A480BEFF2F066E4D5
3,004,550 UART: Caliptra RT
3,004,895 UART: [state] CFI Enabled
3,112,699 UART: [rt] RT listening for mailbox commands...
3,113,362 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,153 UART: [rt]cmd =0x46504c54, len=4
3,144,131 >>> mbox cmd response data (8 bytes)
3,144,382 UART: [rt] FIPS self test
3,144,710 UART: [kat] ++
3,144,862 UART: [kat] sha1
3,149,060 UART: [kat] SHA2-256
3,151,082 UART: [kat] SHA2-384
3,154,173 UART: [kat] SHA2-512-ACC
3,156,100 UART: [kat] ECC-384
3,166,450 UART: [kat] HMAC-384Kdf
3,171,066 UART: [kat] LMS
3,437,131 UART: Fatal Error: 0x90070002
3,438,670 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,438,675 >>> mbox cmd response: failed
3,438,675 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,438,680 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,201 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,368 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,338 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,346 >>> mbox cmd response: failed
803,346 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,352 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,675 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,642,995 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,362 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,370 >>> mbox cmd response: failed
803,370 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,376 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,017 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,831 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,897 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,905 >>> mbox cmd response: failed
803,905 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,911 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,180 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,650 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,997 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
804,005 >>> mbox cmd response: failed
804,005 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
804,011 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,030 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,688 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,390 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,398 >>> mbox cmd response: failed
803,398 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,404 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,161 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,635 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,044 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
804,052 >>> mbox cmd response: failed
804,052 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
804,058 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,903 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,623 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,039 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
804,047 >>> mbox cmd response: failed
804,047 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
804,053 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,312 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,608 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,173 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
804,181 >>> mbox cmd response: failed
804,181 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
804,187 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,218 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,926 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,504 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,512 >>> mbox cmd response: failed
803,512 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,518 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,091 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,821 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,524 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,532 >>> mbox cmd response: failed
803,532 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,538 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,239 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,875 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,263 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
804,271 >>> mbox cmd response: failed
804,271 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
804,277 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,562 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,248 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,679 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,687 >>> mbox cmd response: failed
803,687 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
803,693 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,588 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,788 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,349 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,027 UART: [kat] SHA2-256
881,958 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,073 UART: [kat] ++
886,225 UART: [kat] sha1
890,505 UART: [kat] SHA2-256
892,443 UART: [kat] SHA2-384
894,952 UART: [kat] SHA2-512-ACC
896,853 UART: [kat] ECC-384
902,490 UART: [kat] HMAC-384Kdf
907,014 UART: [kat] LMS
1,475,210 UART: [kat] --
1,476,097 UART: [cold-reset] ++
1,476,531 UART: [fht] Storing FHT @ 0x50003400
1,479,230 UART: [idev] ++
1,479,398 UART: [idev] CDI.KEYID = 6
1,479,758 UART: [idev] SUBJECT.KEYID = 7
1,480,182 UART: [idev] UDS.KEYID = 0
1,480,527 ready_for_fw is high
1,480,527 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,487,908 UART: [idev] Erasing UDS.KEYID = 0
1,504,558 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,240 UART: [idev] --
1,514,173 UART: [ldev] ++
1,514,341 UART: [ldev] CDI.KEYID = 6
1,514,704 UART: [ldev] SUBJECT.KEYID = 5
1,515,130 UART: [ldev] AUTHORITY.KEYID = 7
1,515,593 UART: [ldev] FE.KEYID = 1
1,520,811 UART: [ldev] Erasing FE.KEYID = 1
1,545,774 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,636 UART: [ldev] --
1,585,087 UART: [fwproc] Waiting for Commands...
1,585,722 UART: [fwproc] Received command 0x46574c44
1,586,513 UART: [fwproc] Received Image of size 115196 bytes
2,893,573 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,995 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,347 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,087,422 >>> mbox cmd response: success
3,088,660 UART: [afmc] ++
3,088,828 UART: [afmc] CDI.KEYID = 6
3,089,190 UART: [afmc] SUBJECT.KEYID = 7
3,089,615 UART: [afmc] AUTHORITY.KEYID = 5
3,124,690 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,784 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,564 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,292 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,177 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,867 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,856 UART: [afmc] --
3,167,804 UART: [cold-reset] --
3,168,364 UART: [state] Locking Datavault
3,169,477 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,081 UART: [state] Locking ICCM
3,170,521 UART: [exit] Launching FMC @ 0x40000130
3,175,850 UART:
3,175,866 UART: Running Caliptra FMC ...
3,176,274 UART:
3,176,328 UART: [state] CFI Enabled
3,186,813 UART: [fht] FMC Alias Private Key: 7
3,294,682 UART: [art] Extend RT PCRs Done
3,295,110 UART: [art] Lock RT PCRs Done
3,296,992 UART: [art] Populate DV Done
3,305,243 UART: [fht] FMC Alias Private Key: 7
3,306,375 UART: [art] Derive CDI
3,306,655 UART: [art] Store in in slot 0x4
3,392,358 UART: [art] Derive Key Pair
3,392,718 UART: [art] Store priv key in slot 0x5
3,406,008 UART: [art] Derive Key Pair - Done
3,420,768 UART: [art] Signing Cert with AUTHO
3,421,248 UART: RITY.KEYID = 7
3,436,630 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,395 UART: [art] PUB.X = C78EC2AA7CF740E4B2419FA9BC9C9BA6D6EEF36BDF9D570ACD34D9BE1D44F27EF50CE2E3C125A0DB744A3F6F7C4D8465
3,444,189 UART: [art] PUB.Y = 6ECFA5523C0A15A287CE6D314D8707B6A2405994C18A5CE18B080B27EDC33F5C0E5952EB5AAD6E398D39F57796CB62F4
3,451,134 UART: [art] SIG.R = D3A2EADAFF263E307619B092D5D94E55E8EDFE5CE21A1A98395B07AA7063EDE896CA573B07C6112B1C675A8844DC7BF7
3,457,914 UART: [art] SIG.S = B62C3B36EC6EA42C2A5A36953101FE0C5375E5A91E84BC350DE0F01F3A821312BC478FBA265573ABFB617113BAE6B07D
3,482,534 UART: Caliptra RT
3,482,787 UART: [state] CFI Enabled
3,591,329 UART: [rt] RT listening for mailbox commands...
3,591,992 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,887 UART: [rt]cmd =0x46504c54, len=4
3,623,025 >>> mbox cmd response data (8 bytes)
3,623,202 UART: [rt] FIPS self test
3,623,530 UART: [kat] ++
3,623,682 UART: [kat] sha1
3,624,426 UART: Fatal Error: 0x90060001
3,625,965 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,625,970 >>> mbox cmd response: failed
3,625,970 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,625,975 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,221 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,921 UART: [kat] SHA2-256
881,852 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,967 UART: [kat] ++
886,119 UART: [kat] sha1
890,355 UART: [kat] SHA2-256
892,293 UART: [kat] SHA2-384
895,244 UART: [kat] SHA2-512-ACC
897,145 UART: [kat] ECC-384
902,540 UART: [kat] HMAC-384Kdf
907,162 UART: [kat] LMS
1,475,358 UART: [kat] --
1,476,243 UART: [cold-reset] ++
1,476,803 UART: [fht] Storing FHT @ 0x50003400
1,479,606 UART: [idev] ++
1,479,774 UART: [idev] CDI.KEYID = 6
1,480,134 UART: [idev] SUBJECT.KEYID = 7
1,480,558 UART: [idev] UDS.KEYID = 0
1,480,903 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,904 UART: [idev] Erasing UDS.KEYID = 0
1,505,440 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,168 UART: [idev] --
1,515,169 UART: [ldev] ++
1,515,337 UART: [ldev] CDI.KEYID = 6
1,515,700 UART: [ldev] SUBJECT.KEYID = 5
1,516,126 UART: [ldev] AUTHORITY.KEYID = 7
1,516,589 UART: [ldev] FE.KEYID = 1
1,521,789 UART: [ldev] Erasing FE.KEYID = 1
1,547,048 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,028 UART: [ldev] --
1,586,429 UART: [fwproc] Waiting for Commands...
1,587,088 UART: [fwproc] Received command 0x46574c44
1,587,879 UART: [fwproc] Received Image of size 115196 bytes
2,895,881 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,931 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,283 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,452 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,703 ready_for_fw is high
1,361,703 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,470 >>> mbox cmd response: success
3,000,186 UART:
3,000,202 UART: Running Caliptra FMC ...
3,000,610 UART:
3,000,664 UART: [state] CFI Enabled
3,010,961 UART: [fht] FMC Alias Private Key: 7
3,118,902 UART: [art] Extend RT PCRs Done
3,119,330 UART: [art] Lock RT PCRs Done
3,120,980 UART: [art] Populate DV Done
3,129,203 UART: [fht] FMC Alias Private Key: 7
3,130,305 UART: [art] Derive CDI
3,130,585 UART: [art] Store in in slot 0x4
3,216,820 UART: [art] Derive Key Pair
3,217,180 UART: [art] Store priv key in slot 0x5
3,230,284 UART: [art] Derive Key Pair - Done
3,244,986 UART: [art] Signing Cert with AUTHO
3,245,466 UART: RITY.KEYID = 7
3,260,776 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,541 UART: [art] PUB.X = B0C86F392D80066849D872FBCE0867045D469D21AB11834479943A8414BC1912F0521018F6AE8F211591304A75C92120
3,268,286 UART: [art] PUB.Y = 79C7A5941D96D94FF634CCA04953AB6B1301813E21AA7D5EDD09B868E8150E9D601E9DC1380494CF1361DA1C806ADD6E
3,275,232 UART: [art] SIG.R = 91D1FCA5360526C63E850F03B52C78CC56D1E63322AF0A31132F568AAB8922AF6E20F4D23327A05B22E749DB9ED8D635
3,281,994 UART: [art] SIG.S = CEB25E4F5750D33604965D2D2D8140EE35BE271E2D3FC8FE5D9265CB5D2346A2964E03978DA97BE8693B50715A6AD095
3,306,043 UART: Caliptra RT
3,306,296 UART: [state] CFI Enabled
3,414,764 UART: [rt] RT listening for mailbox commands...
3,415,427 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,016 UART: [rt]cmd =0x46504c54, len=4
3,446,122 >>> mbox cmd response data (8 bytes)
3,446,347 UART: [rt] FIPS self test
3,446,675 UART: [kat] ++
3,446,827 UART: [kat] sha1
3,447,647 UART: Fatal Error: 0x90060001
3,449,186 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,449,191 >>> mbox cmd response: failed
3,449,191 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,449,196 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,593 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,912 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,740 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,266 UART: [kat] SHA2-256
882,197 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,312 UART: [kat] ++
886,464 UART: [kat] sha1
890,714 UART: [kat] SHA2-256
892,652 UART: [kat] SHA2-384
895,279 UART: [kat] SHA2-512-ACC
897,180 UART: [kat] ECC-384
902,735 UART: [kat] HMAC-384Kdf
907,449 UART: [kat] LMS
1,475,645 UART: [kat] --
1,476,336 UART: [cold-reset] ++
1,476,708 UART: [fht] Storing FHT @ 0x50003400
1,479,641 UART: [idev] ++
1,479,809 UART: [idev] CDI.KEYID = 6
1,480,169 UART: [idev] SUBJECT.KEYID = 7
1,480,593 UART: [idev] UDS.KEYID = 0
1,480,938 ready_for_fw is high
1,480,938 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,539 UART: [idev] Erasing UDS.KEYID = 0
1,505,851 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,469 UART: [idev] --
1,515,594 UART: [ldev] ++
1,515,762 UART: [ldev] CDI.KEYID = 6
1,516,125 UART: [ldev] SUBJECT.KEYID = 5
1,516,551 UART: [ldev] AUTHORITY.KEYID = 7
1,517,014 UART: [ldev] FE.KEYID = 1
1,522,424 UART: [ldev] Erasing FE.KEYID = 1
1,548,293 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,317 UART: [ldev] --
1,587,608 UART: [fwproc] Waiting for Commands...
1,588,395 UART: [fwproc] Received command 0x46574c44
1,589,186 UART: [fwproc] Received Image of size 115196 bytes
2,896,924 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,010 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,362 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,519 >>> mbox cmd response: success
3,091,641 UART: [afmc] ++
3,091,809 UART: [afmc] CDI.KEYID = 6
3,092,171 UART: [afmc] SUBJECT.KEYID = 7
3,092,596 UART: [afmc] AUTHORITY.KEYID = 5
3,127,653 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,915 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,695 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,423 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,308 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,998 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,069 UART: [afmc] --
3,170,991 UART: [cold-reset] --
3,171,789 UART: [state] Locking Datavault
3,173,042 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,646 UART: [state] Locking ICCM
3,174,114 UART: [exit] Launching FMC @ 0x40000130
3,179,443 UART:
3,179,459 UART: Running Caliptra FMC ...
3,179,867 UART:
3,180,010 UART: [state] CFI Enabled
3,190,347 UART: [fht] FMC Alias Private Key: 7
3,297,982 UART: [art] Extend RT PCRs Done
3,298,410 UART: [art] Lock RT PCRs Done
3,300,306 UART: [art] Populate DV Done
3,308,367 UART: [fht] FMC Alias Private Key: 7
3,309,361 UART: [art] Derive CDI
3,309,641 UART: [art] Store in in slot 0x4
3,394,998 UART: [art] Derive Key Pair
3,395,358 UART: [art] Store priv key in slot 0x5
3,408,282 UART: [art] Derive Key Pair - Done
3,423,122 UART: [art] Signing Cert with AUTHO
3,423,602 UART: RITY.KEYID = 7
3,438,832 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,597 UART: [art] PUB.X = 0919A77648B8F8DF2FB450500A5050FF38DE06BA547C6F8A4AE768F47B1265C19D64C32B24A3D4269706712B84A493ED
3,446,355 UART: [art] PUB.Y = B2BD4B32B2AD254077ACE98ADFCB0AEB28B9F64DB0F4016376A16FBAEFDFA36FE144B35DB292BBE64E3EC9FF8BF5B62C
3,453,335 UART: [art] SIG.R = D011139CAB62B40D6724A966F6DFA0D68562BC74CF7ACAE1BD6D1B6242DDDE8FC3CFD22B56EBCD5AC3C036A567F520AD
3,460,130 UART: [art] SIG.S = 1BDCCD3F8746A6C7A63A4BF7C42D691FACBD5DC62B6A994285AA1751564F20C0C47A6ECCF7B76D6B7660305FF7E107E2
3,483,454 UART: Caliptra RT
3,483,799 UART: [state] CFI Enabled
3,592,082 UART: [rt] RT listening for mailbox commands...
3,592,745 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,694 UART: [rt]cmd =0x46504c54, len=4
3,623,994 >>> mbox cmd response data (8 bytes)
3,624,157 UART: [rt] FIPS self test
3,624,485 UART: [kat] ++
3,624,637 UART: [kat] sha1
3,625,537 UART: Fatal Error: 0x90060001
3,627,076 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,627,081 >>> mbox cmd response: failed
3,627,081 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,627,086 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,406 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,112 UART: [kat] SHA2-256
882,043 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,158 UART: [kat] ++
886,310 UART: [kat] sha1
890,646 UART: [kat] SHA2-256
892,584 UART: [kat] SHA2-384
895,389 UART: [kat] SHA2-512-ACC
897,290 UART: [kat] ECC-384
902,895 UART: [kat] HMAC-384Kdf
907,609 UART: [kat] LMS
1,475,805 UART: [kat] --
1,476,498 UART: [cold-reset] ++
1,476,994 UART: [fht] Storing FHT @ 0x50003400
1,479,657 UART: [idev] ++
1,479,825 UART: [idev] CDI.KEYID = 6
1,480,185 UART: [idev] SUBJECT.KEYID = 7
1,480,609 UART: [idev] UDS.KEYID = 0
1,480,954 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,255 UART: [idev] Erasing UDS.KEYID = 0
1,504,659 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,181 UART: [idev] --
1,514,248 UART: [ldev] ++
1,514,416 UART: [ldev] CDI.KEYID = 6
1,514,779 UART: [ldev] SUBJECT.KEYID = 5
1,515,205 UART: [ldev] AUTHORITY.KEYID = 7
1,515,668 UART: [ldev] FE.KEYID = 1
1,521,224 UART: [ldev] Erasing FE.KEYID = 1
1,546,633 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,351 UART: [ldev] --
1,585,616 UART: [fwproc] Waiting for Commands...
1,586,411 UART: [fwproc] Received command 0x46574c44
1,587,202 UART: [fwproc] Received Image of size 115196 bytes
2,896,754 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,128 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,480 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,735 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,298 ready_for_fw is high
1,363,298 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,308 >>> mbox cmd response: success
3,002,048 UART:
3,002,064 UART: Running Caliptra FMC ...
3,002,472 UART:
3,002,615 UART: [state] CFI Enabled
3,013,322 UART: [fht] FMC Alias Private Key: 7
3,121,695 UART: [art] Extend RT PCRs Done
3,122,123 UART: [art] Lock RT PCRs Done
3,123,917 UART: [art] Populate DV Done
3,132,152 UART: [fht] FMC Alias Private Key: 7
3,133,308 UART: [art] Derive CDI
3,133,588 UART: [art] Store in in slot 0x4
3,219,213 UART: [art] Derive Key Pair
3,219,573 UART: [art] Store priv key in slot 0x5
3,233,151 UART: [art] Derive Key Pair - Done
3,247,884 UART: [art] Signing Cert with AUTHO
3,248,364 UART: RITY.KEYID = 7
3,263,556 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,321 UART: [art] PUB.X = C406CB39DB20AFD323A97FD421C7DD4689CF223639397955F03FCCE3D58CDB90B3720184ABD487EF99CC1F74D42A2CC3
3,271,099 UART: [art] PUB.Y = C37A2BDD937F2D0359DCB4B5EE4279D03991F30305D457A0E5A558D9CA54213DDBD41BE631A4F9C402960D33DE9CCAFA
3,278,050 UART: [art] SIG.R = C81BF63BB6EAB5BE1BA1A8042BE38BC29B577336EDF45C81B5BF94DC9E37EB115C106566670B4918B6989FF5EB8FD65F
3,284,832 UART: [art] SIG.S = 5B674656B333268C207D6326848C738CBF4EB899FECD99DD1BCB48E29266300A01994ED70785A9CA88C1202584C861DF
3,308,948 UART: Caliptra RT
3,309,293 UART: [state] CFI Enabled
3,418,528 UART: [rt] RT listening for mailbox commands...
3,419,191 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,072 UART: [rt]cmd =0x46504c54, len=4
3,450,128 >>> mbox cmd response data (8 bytes)
3,450,399 UART: [rt] FIPS self test
3,450,727 UART: [kat] ++
3,450,879 UART: [kat] sha1
3,451,701 UART: Fatal Error: 0x90060001
3,453,240 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,453,245 >>> mbox cmd response: failed
3,453,245 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,453,250 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,200 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,326 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,748 UART: [state] LifecycleState = Unprovisioned
86,403 UART: [state] DebugLocked = No
86,949 UART: [state] WD Timer not started. Device not locked for debugging
88,194 UART: [kat] SHA2-256
893,844 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,969 UART: [kat] ++
898,121 UART: [kat] sha1
902,523 UART: [kat] SHA2-256
904,463 UART: [kat] SHA2-384
907,010 UART: [kat] SHA2-512-ACC
908,911 UART: [kat] ECC-384
918,444 UART: [kat] HMAC-384Kdf
922,956 UART: [kat] LMS
1,171,284 UART: [kat] --
1,172,253 UART: [cold-reset] ++
1,172,833 UART: [fht] FHT @ 0x50003400
1,175,400 UART: [idev] ++
1,175,568 UART: [idev] CDI.KEYID = 6
1,175,928 UART: [idev] SUBJECT.KEYID = 7
1,176,352 UART: [idev] UDS.KEYID = 0
1,176,697 ready_for_fw is high
1,176,697 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,360 UART: [idev] Erasing UDS.KEYID = 0
1,201,553 UART: [idev] Sha1 KeyId Algorithm
1,210,039 UART: [idev] --
1,211,159 UART: [ldev] ++
1,211,327 UART: [ldev] CDI.KEYID = 6
1,211,690 UART: [ldev] SUBJECT.KEYID = 5
1,212,116 UART: [ldev] AUTHORITY.KEYID = 7
1,212,579 UART: [ldev] FE.KEYID = 1
1,217,571 UART: [ldev] Erasing FE.KEYID = 1
1,243,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,457 UART: [ldev] --
1,282,864 UART: [fwproc] Wait for Commands...
1,283,670 UART: [fwproc] Recv command 0x46574c44
1,284,398 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,302 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,606 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,801 >>> mbox cmd response: success
2,787,999 UART: [afmc] ++
2,788,167 UART: [afmc] CDI.KEYID = 6
2,788,529 UART: [afmc] SUBJECT.KEYID = 7
2,788,954 UART: [afmc] AUTHORITY.KEYID = 5
2,824,351 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,446 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,174 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,059 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,778 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,542 UART: [afmc] --
2,867,512 UART: [cold-reset] --
2,868,524 UART: [state] Locking Datavault
2,869,879 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,483 UART: [state] Locking ICCM
2,871,123 UART: [exit] Launching FMC @ 0x40000130
2,876,452 UART:
2,876,468 UART: Running Caliptra FMC ...
2,876,876 UART:
2,876,930 UART: [state] CFI Enabled
2,887,515 UART: [fht] FMC Alias Private Key: 7
2,995,668 UART: [art] Extend RT PCRs Done
2,996,096 UART: [art] Lock RT PCRs Done
2,997,968 UART: [art] Populate DV Done
3,006,053 UART: [fht] FMC Alias Private Key: 7
3,007,215 UART: [art] Derive CDI
3,007,495 UART: [art] Store in in slot 0x4
3,092,972 UART: [art] Derive Key Pair
3,093,332 UART: [art] Store priv key in slot 0x5
3,106,124 UART: [art] Derive Key Pair - Done
3,120,849 UART: [art] Signing Cert with AUTHO
3,121,329 UART: RITY.KEYID = 7
3,135,841 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,606 UART: [art] PUB.X = B07927703D155FEB07641C4BA0C26DD2418DDBA6D268641756B98B2E0429FB40A0C148EB368D5741AC53668EA99BCEAF
3,143,378 UART: [art] PUB.Y = 00792B883926D0579066831B6C180A646BB10F74BBC16D1AC4ABFD60664D1CAE905C786BD131B559C478305D526307EA
3,150,295 UART: [art] SIG.R = 6539B8075815128E1708B37D61B1CFED6C98647D58D4592492A9D06725F1D03FEB5A69EC6373DE44FD56FC4412F55CE4
3,157,059 UART: [art] SIG.S = 087945CF6F44CCD11D28EC2CFD57498602E2020415F761C1C624C0F16238FA0C5B00AC47C2F75AFC7D0F43E8C24ADB14
3,180,650 UART: Caliptra RT
3,180,903 UART: [state] CFI Enabled
3,288,330 UART: [rt] RT listening for mailbox commands...
3,288,993 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,056 UART: [rt]cmd =0x46504c54, len=4
3,320,148 >>> mbox cmd response data (8 bytes)
3,320,369 UART: [rt] FIPS self test
3,320,697 UART: [kat] ++
3,320,849 UART: [kat] sha1
3,321,547 UART: Fatal Error: 0x90060001
3,323,086 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,323,091 >>> mbox cmd response: failed
3,323,091 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,323,096 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
893,220 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,345 UART: [kat] ++
897,497 UART: [kat] sha1
901,561 UART: [kat] SHA2-256
903,501 UART: [kat] SHA2-384
906,192 UART: [kat] SHA2-512-ACC
908,093 UART: [kat] ECC-384
917,788 UART: [kat] HMAC-384Kdf
922,352 UART: [kat] LMS
1,170,680 UART: [kat] --
1,171,519 UART: [cold-reset] ++
1,171,913 UART: [fht] FHT @ 0x50003400
1,174,664 UART: [idev] ++
1,174,832 UART: [idev] CDI.KEYID = 6
1,175,192 UART: [idev] SUBJECT.KEYID = 7
1,175,616 UART: [idev] UDS.KEYID = 0
1,175,961 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,600 UART: [idev] Erasing UDS.KEYID = 0
1,201,001 UART: [idev] Sha1 KeyId Algorithm
1,209,379 UART: [idev] --
1,210,611 UART: [ldev] ++
1,210,779 UART: [ldev] CDI.KEYID = 6
1,211,142 UART: [ldev] SUBJECT.KEYID = 5
1,211,568 UART: [ldev] AUTHORITY.KEYID = 7
1,212,031 UART: [ldev] FE.KEYID = 1
1,216,947 UART: [ldev] Erasing FE.KEYID = 1
1,243,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,557 UART: [ldev] --
1,282,054 UART: [fwproc] Wait for Commands...
1,282,752 UART: [fwproc] Recv command 0x46574c44
1,283,480 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,676 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,980 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,167 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,933 ready_for_fw is high
1,059,933 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,174 >>> mbox cmd response: success
2,700,690 UART:
2,700,706 UART: Running Caliptra FMC ...
2,701,114 UART:
2,701,168 UART: [state] CFI Enabled
2,711,571 UART: [fht] FMC Alias Private Key: 7
2,819,618 UART: [art] Extend RT PCRs Done
2,820,046 UART: [art] Lock RT PCRs Done
2,821,674 UART: [art] Populate DV Done
2,829,861 UART: [fht] FMC Alias Private Key: 7
2,830,819 UART: [art] Derive CDI
2,831,099 UART: [art] Store in in slot 0x4
2,916,600 UART: [art] Derive Key Pair
2,916,960 UART: [art] Store priv key in slot 0x5
2,930,292 UART: [art] Derive Key Pair - Done
2,944,886 UART: [art] Signing Cert with AUTHO
2,945,366 UART: RITY.KEYID = 7
2,960,528 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,293 UART: [art] PUB.X = 64EB2A20D34526726BB4E8AA3495B8F55829C723EF93AA9F5BC37BE4F7E1F2F4579542CCDA8E7B585ECA53D9EF5CFA0C
2,968,080 UART: [art] PUB.Y = 81BBDC0068C258C34D4A4CC0779C063A52C1CD3DA94B91D7D7F47BDDDE97E6EFDE6DA8F463F933FE7C1F6940846E31C1
2,975,025 UART: [art] SIG.R = A7478CDAA266997B64AF7F28ACC94D3A7C6E58688116BE7524C0564DFC3ABCBD52C4D1DBC87E62D963FB833A535151A9
2,981,809 UART: [art] SIG.S = 1E9433AD3E3B0F695D6AE82EDB751D2D200E38454FF43D46009B87B7EFDB3C9BAECE4CE95D36B73308278A6479482E45
3,005,701 UART: Caliptra RT
3,005,954 UART: [state] CFI Enabled
3,113,003 UART: [rt] RT listening for mailbox commands...
3,113,666 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,585 UART: [rt]cmd =0x46504c54, len=4
3,144,717 >>> mbox cmd response data (8 bytes)
3,144,964 UART: [rt] FIPS self test
3,145,292 UART: [kat] ++
3,145,444 UART: [kat] sha1
3,146,374 UART: Fatal Error: 0x90060001
3,147,913 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,147,918 >>> mbox cmd response: failed
3,147,918 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,147,923 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,427 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,760 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
893,597 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,722 UART: [kat] ++
897,874 UART: [kat] sha1
902,178 UART: [kat] SHA2-256
904,118 UART: [kat] SHA2-384
906,905 UART: [kat] SHA2-512-ACC
908,806 UART: [kat] ECC-384
918,563 UART: [kat] HMAC-384Kdf
923,081 UART: [kat] LMS
1,171,409 UART: [kat] --
1,172,200 UART: [cold-reset] ++
1,172,764 UART: [fht] FHT @ 0x50003400
1,175,415 UART: [idev] ++
1,175,583 UART: [idev] CDI.KEYID = 6
1,175,943 UART: [idev] SUBJECT.KEYID = 7
1,176,367 UART: [idev] UDS.KEYID = 0
1,176,712 ready_for_fw is high
1,176,712 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,163 UART: [idev] Erasing UDS.KEYID = 0
1,200,964 UART: [idev] Sha1 KeyId Algorithm
1,209,490 UART: [idev] --
1,210,404 UART: [ldev] ++
1,210,572 UART: [ldev] CDI.KEYID = 6
1,210,935 UART: [ldev] SUBJECT.KEYID = 5
1,211,361 UART: [ldev] AUTHORITY.KEYID = 7
1,211,824 UART: [ldev] FE.KEYID = 1
1,216,862 UART: [ldev] Erasing FE.KEYID = 1
1,242,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,494 UART: [ldev] --
1,281,867 UART: [fwproc] Wait for Commands...
1,282,563 UART: [fwproc] Recv command 0x46574c44
1,283,291 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,569 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,873 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,966 >>> mbox cmd response: success
2,785,192 UART: [afmc] ++
2,785,360 UART: [afmc] CDI.KEYID = 6
2,785,722 UART: [afmc] SUBJECT.KEYID = 7
2,786,147 UART: [afmc] AUTHORITY.KEYID = 5
2,822,298 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,561 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,289 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,174 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,893 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,729 UART: [afmc] --
2,865,661 UART: [cold-reset] --
2,866,315 UART: [state] Locking Datavault
2,867,472 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,076 UART: [state] Locking ICCM
2,868,728 UART: [exit] Launching FMC @ 0x40000130
2,874,057 UART:
2,874,073 UART: Running Caliptra FMC ...
2,874,481 UART:
2,874,624 UART: [state] CFI Enabled
2,884,929 UART: [fht] FMC Alias Private Key: 7
2,992,688 UART: [art] Extend RT PCRs Done
2,993,116 UART: [art] Lock RT PCRs Done
2,994,954 UART: [art] Populate DV Done
3,003,197 UART: [fht] FMC Alias Private Key: 7
3,004,283 UART: [art] Derive CDI
3,004,563 UART: [art] Store in in slot 0x4
3,090,356 UART: [art] Derive Key Pair
3,090,716 UART: [art] Store priv key in slot 0x5
3,104,220 UART: [art] Derive Key Pair - Done
3,119,039 UART: [art] Signing Cert with AUTHO
3,119,519 UART: RITY.KEYID = 7
3,134,611 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,376 UART: [art] PUB.X = ADC244F2FFD050D79F7211B3DBE48BE75A2863AEB99ADBB25EB876B0134DC616DEC8C391AF17E19357CF03843F3398CC
3,142,161 UART: [art] PUB.Y = 56E966846B75974A4B4234748F725DE17E927B481A73C860FD07A6A5B82A7C47D512466AF2A45F092507DCE269E3C638
3,149,096 UART: [art] SIG.R = FEB574C345D828B9B32A1A005F8331557582552CCFCA8B9A63D77EA23E90A3321D92451330A983B5F498C589A0B6A27D
3,155,844 UART: [art] SIG.S = 2B97FB5C4987758337845E75558BA386F91D108AFA854D99F3FC571F7C9A52BC780EEDBDA76CD0100C1577702429A6B7
3,179,829 UART: Caliptra RT
3,180,174 UART: [state] CFI Enabled
3,288,329 UART: [rt] RT listening for mailbox commands...
3,288,992 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,861 UART: [rt]cmd =0x46504c54, len=4
3,320,053 >>> mbox cmd response data (8 bytes)
3,320,184 UART: [rt] FIPS self test
3,320,512 UART: [kat] ++
3,320,664 UART: [kat] sha1
3,321,616 UART: Fatal Error: 0x90060001
3,323,155 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,323,160 >>> mbox cmd response: failed
3,323,160 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,323,165 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,235 UART: [kat] SHA2-256
893,885 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,010 UART: [kat] ++
898,162 UART: [kat] sha1
902,448 UART: [kat] SHA2-256
904,388 UART: [kat] SHA2-384
907,205 UART: [kat] SHA2-512-ACC
909,106 UART: [kat] ECC-384
918,777 UART: [kat] HMAC-384Kdf
923,475 UART: [kat] LMS
1,171,803 UART: [kat] --
1,172,904 UART: [cold-reset] ++
1,173,448 UART: [fht] FHT @ 0x50003400
1,176,237 UART: [idev] ++
1,176,405 UART: [idev] CDI.KEYID = 6
1,176,765 UART: [idev] SUBJECT.KEYID = 7
1,177,189 UART: [idev] UDS.KEYID = 0
1,177,534 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,185,025 UART: [idev] Erasing UDS.KEYID = 0
1,202,242 UART: [idev] Sha1 KeyId Algorithm
1,210,700 UART: [idev] --
1,211,704 UART: [ldev] ++
1,211,872 UART: [ldev] CDI.KEYID = 6
1,212,235 UART: [ldev] SUBJECT.KEYID = 5
1,212,661 UART: [ldev] AUTHORITY.KEYID = 7
1,213,124 UART: [ldev] FE.KEYID = 1
1,218,242 UART: [ldev] Erasing FE.KEYID = 1
1,244,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,846 UART: [ldev] --
1,284,187 UART: [fwproc] Wait for Commands...
1,284,927 UART: [fwproc] Recv command 0x46574c44
1,285,655 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,962 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,003 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,307 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,426 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,090 ready_for_fw is high
1,061,090 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,587 >>> mbox cmd response: success
2,701,969 UART:
2,701,985 UART: Running Caliptra FMC ...
2,702,393 UART:
2,702,536 UART: [state] CFI Enabled
2,713,077 UART: [fht] FMC Alias Private Key: 7
2,821,466 UART: [art] Extend RT PCRs Done
2,821,894 UART: [art] Lock RT PCRs Done
2,823,142 UART: [art] Populate DV Done
2,831,423 UART: [fht] FMC Alias Private Key: 7
2,832,595 UART: [art] Derive CDI
2,832,875 UART: [art] Store in in slot 0x4
2,918,448 UART: [art] Derive Key Pair
2,918,808 UART: [art] Store priv key in slot 0x5
2,932,566 UART: [art] Derive Key Pair - Done
2,947,131 UART: [art] Signing Cert with AUTHO
2,947,611 UART: RITY.KEYID = 7
2,963,075 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,840 UART: [art] PUB.X = 9A9FABD1756E0D050050FB5417C93BDC945ADD3C8410A7077592E28F407B869096AE985C171D3F16C9749F7FFB28B5A1
2,970,583 UART: [art] PUB.Y = 4D0395E33EEF3799781A0B4ED6F1A127ECD590B95FAE68E0969C51E229F0F9FFCEEE52B2CA85DB90EC4108A4774ED43F
2,977,542 UART: [art] SIG.R = F89F54D933F3E82AE217C9E75492C928986E275D2B937F71FC84290CA9EEDB6A90CB5DC1ADD46DF1E7A671B86965555D
2,984,319 UART: [art] SIG.S = 4B3C1E02867479E59B8A020A8B84EE1BEFE9CEB3AD15C364616DC72F5D35D89B4821CC3C639D054625AE44C82BD6E630
3,008,022 UART: Caliptra RT
3,008,367 UART: [state] CFI Enabled
3,116,526 UART: [rt] RT listening for mailbox commands...
3,117,189 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,978 UART: [rt]cmd =0x46504c54, len=4
3,147,978 >>> mbox cmd response data (8 bytes)
3,148,149 UART: [rt] FIPS self test
3,148,477 UART: [kat] ++
3,148,629 UART: [kat] sha1
3,149,549 UART: Fatal Error: 0x90060001
3,151,088 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,151,093 >>> mbox cmd response: failed
3,151,093 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,151,098 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,018 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,757 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,742 UART: [state] LifecycleState = Unprovisioned
85,397 UART: [state] DebugLocked = No
86,069 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
890,914 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,043 UART: [kat] ++
895,195 UART: [kat] sha1
899,533 UART: [kat] SHA2-256
901,473 UART: [kat] SHA2-384
904,250 UART: [kat] SHA2-512-ACC
906,151 UART: [kat] ECC-384
916,198 UART: [kat] HMAC-384Kdf
920,892 UART: [kat] LMS
1,169,204 UART: [kat] --
1,170,259 UART: [cold-reset] ++
1,170,611 UART: [fht] FHT @ 0x50003400
1,173,481 UART: [idev] ++
1,173,649 UART: [idev] CDI.KEYID = 6
1,174,010 UART: [idev] SUBJECT.KEYID = 7
1,174,435 UART: [idev] UDS.KEYID = 0
1,174,781 ready_for_fw is high
1,174,781 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,187 UART: [idev] Erasing UDS.KEYID = 0
1,198,273 UART: [idev] Sha1 KeyId Algorithm
1,207,113 UART: [idev] --
1,208,236 UART: [ldev] ++
1,208,404 UART: [ldev] CDI.KEYID = 6
1,208,768 UART: [ldev] SUBJECT.KEYID = 5
1,209,195 UART: [ldev] AUTHORITY.KEYID = 7
1,209,658 UART: [ldev] FE.KEYID = 1
1,214,904 UART: [ldev] Erasing FE.KEYID = 1
1,241,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,180 UART: [ldev] --
1,280,526 UART: [fwproc] Wait for Commands...
1,281,283 UART: [fwproc] Recv command 0x46574c44
1,282,016 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,234 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,543 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,655 >>> mbox cmd response: success
2,784,826 UART: [afmc] ++
2,784,994 UART: [afmc] CDI.KEYID = 6
2,785,357 UART: [afmc] SUBJECT.KEYID = 7
2,785,783 UART: [afmc] AUTHORITY.KEYID = 5
2,821,386 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,512 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,263 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,992 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,875 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,594 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,575 UART: [afmc] --
2,864,663 UART: [cold-reset] --
2,865,513 UART: [state] Locking Datavault
2,866,870 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,474 UART: [state] Locking ICCM
2,867,922 UART: [exit] Launching FMC @ 0x40000130
2,873,251 UART:
2,873,267 UART: Running Caliptra FMC ...
2,873,675 UART:
2,873,729 UART: [state] CFI Enabled
2,884,502 UART: [fht] FMC Alias Private Key: 7
2,992,515 UART: [art] Extend RT PCRs Done
2,992,943 UART: [art] Lock RT PCRs Done
2,994,789 UART: [art] Populate DV Done
3,002,924 UART: [fht] FMC Alias Private Key: 7
3,003,868 UART: [art] Derive CDI
3,004,148 UART: [art] Store in in slot 0x4
3,089,771 UART: [art] Derive Key Pair
3,090,131 UART: [art] Store priv key in slot 0x5
3,103,651 UART: [art] Derive Key Pair - Done
3,118,555 UART: [art] Signing Cert with AUTHO
3,119,035 UART: RITY.KEYID = 7
3,134,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,322 UART: [art] PUB.X = 4874BAA0FF0E99BA8F6C613DF2D66ADC2F4B00A1247267159784EA1DB92B7003F3D67D8BA30FD831FA04C9E1C634312C
3,142,070 UART: [art] PUB.Y = 5E5D4BC6388B37EF7EFFE949DC955BFCAD1FA1F01C805DB7556B86F23D66561A000E70AB27224F63D348E5E7DC98DA8C
3,149,013 UART: [art] SIG.R = 77E4AE9EA3636E7361B9993217A69FF826797EB2B32E3069B34FB49FB961BD9F17E537228B385D0952849186D5C0862D
3,155,774 UART: [art] SIG.S = E19FEB831296904872AC4D6620056F5427304F72BAF65F25FDD573A1B5FF3766206B43AF4AA3F92F8A9DC65625C18C29
3,180,046 UART: Caliptra RT
3,180,299 UART: [state] CFI Enabled
3,288,114 UART: [rt] RT listening for mailbox commands...
3,288,777 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,644 UART: [rt]cmd =0x46504c54, len=4
3,319,858 >>> mbox cmd response data (8 bytes)
3,319,985 UART: [rt] FIPS self test
3,320,313 UART: [kat] ++
3,320,465 UART: [kat] sha1
3,321,225 UART: Fatal Error: 0x90060001
3,322,764 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,322,769 >>> mbox cmd response: failed
3,322,769 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,322,774 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,442 UART: [state] LifecycleState = Unprovisioned
85,097 UART: [state] DebugLocked = No
85,817 UART: [state] WD Timer not started. Device not locked for debugging
87,146 UART: [kat] SHA2-256
890,696 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,825 UART: [kat] ++
894,977 UART: [kat] sha1
899,085 UART: [kat] SHA2-256
901,025 UART: [kat] SHA2-384
903,784 UART: [kat] SHA2-512-ACC
905,685 UART: [kat] ECC-384
915,212 UART: [kat] HMAC-384Kdf
919,760 UART: [kat] LMS
1,168,072 UART: [kat] --
1,168,907 UART: [cold-reset] ++
1,169,465 UART: [fht] FHT @ 0x50003400
1,172,263 UART: [idev] ++
1,172,431 UART: [idev] CDI.KEYID = 6
1,172,792 UART: [idev] SUBJECT.KEYID = 7
1,173,217 UART: [idev] UDS.KEYID = 0
1,173,563 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,483 UART: [idev] Erasing UDS.KEYID = 0
1,198,313 UART: [idev] Sha1 KeyId Algorithm
1,207,115 UART: [idev] --
1,208,064 UART: [ldev] ++
1,208,232 UART: [ldev] CDI.KEYID = 6
1,208,596 UART: [ldev] SUBJECT.KEYID = 5
1,209,023 UART: [ldev] AUTHORITY.KEYID = 7
1,209,486 UART: [ldev] FE.KEYID = 1
1,214,676 UART: [ldev] Erasing FE.KEYID = 1
1,241,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,358 UART: [ldev] --
1,280,698 UART: [fwproc] Wait for Commands...
1,281,363 UART: [fwproc] Recv command 0x46574c44
1,282,096 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,374 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,656 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,965 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,029 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,434 ready_for_fw is high
1,055,434 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,630,987 >>> mbox cmd response: success
2,692,759 UART:
2,692,775 UART: Running Caliptra FMC ...
2,693,183 UART:
2,693,237 UART: [state] CFI Enabled
2,703,846 UART: [fht] FMC Alias Private Key: 7
2,811,429 UART: [art] Extend RT PCRs Done
2,811,857 UART: [art] Lock RT PCRs Done
2,813,255 UART: [art] Populate DV Done
2,821,434 UART: [fht] FMC Alias Private Key: 7
2,822,566 UART: [art] Derive CDI
2,822,846 UART: [art] Store in in slot 0x4
2,908,551 UART: [art] Derive Key Pair
2,908,911 UART: [art] Store priv key in slot 0x5
2,922,347 UART: [art] Derive Key Pair - Done
2,937,203 UART: [art] Signing Cert with AUTHO
2,937,683 UART: RITY.KEYID = 7
2,953,045 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,810 UART: [art] PUB.X = 88FB1649196CE23CEB915A3F229747B051144185BD84F0C0B3E0308E8E728514B0DBCF8EA61ACC13F4ADAC6EA41D1072
2,960,590 UART: [art] PUB.Y = 29E6D6E26FD36C5728A1A8F479BE1D8FB5F64F0C14EB46C592A9657F2FAA48DB4E0DB1DEEE62D6E60B00129EFED97468
2,967,529 UART: [art] SIG.R = 339C07469B46F6D716A1B7BF68973DE38B64DE5BBB6E63DE4B0FA932D26485B71181D9D28E9234A41A49FDD7424D0D7F
2,974,298 UART: [art] SIG.S = 57101B99ADAB5D9F7861E0DD11746DF7A61817FDBCD757688CEBD7654332CE30AD52857F57DE913D1296B87612AB4205
2,998,218 UART: Caliptra RT
2,998,471 UART: [state] CFI Enabled
3,105,240 UART: [rt] RT listening for mailbox commands...
3,105,903 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,790 UART: [rt]cmd =0x46504c54, len=4
3,136,898 >>> mbox cmd response data (8 bytes)
3,137,231 UART: [rt] FIPS self test
3,137,559 UART: [kat] ++
3,137,711 UART: [kat] sha1
3,138,445 UART: Fatal Error: 0x90060001
3,139,984 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,139,989 >>> mbox cmd response: failed
3,139,989 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,139,994 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,526 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,205 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
891,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,464 UART: [kat] ++
895,616 UART: [kat] sha1
899,850 UART: [kat] SHA2-256
901,790 UART: [kat] SHA2-384
904,677 UART: [kat] SHA2-512-ACC
906,578 UART: [kat] ECC-384
916,297 UART: [kat] HMAC-384Kdf
920,907 UART: [kat] LMS
1,169,219 UART: [kat] --
1,170,024 UART: [cold-reset] ++
1,170,432 UART: [fht] FHT @ 0x50003400
1,173,084 UART: [idev] ++
1,173,252 UART: [idev] CDI.KEYID = 6
1,173,613 UART: [idev] SUBJECT.KEYID = 7
1,174,038 UART: [idev] UDS.KEYID = 0
1,174,384 ready_for_fw is high
1,174,384 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,950 UART: [idev] Erasing UDS.KEYID = 0
1,198,210 UART: [idev] Sha1 KeyId Algorithm
1,206,976 UART: [idev] --
1,208,039 UART: [ldev] ++
1,208,207 UART: [ldev] CDI.KEYID = 6
1,208,571 UART: [ldev] SUBJECT.KEYID = 5
1,208,998 UART: [ldev] AUTHORITY.KEYID = 7
1,209,461 UART: [ldev] FE.KEYID = 1
1,214,497 UART: [ldev] Erasing FE.KEYID = 1
1,240,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,889 UART: [ldev] --
1,280,379 UART: [fwproc] Wait for Commands...
1,281,068 UART: [fwproc] Recv command 0x46574c44
1,281,801 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,541 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,850 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,032 >>> mbox cmd response: success
2,784,133 UART: [afmc] ++
2,784,301 UART: [afmc] CDI.KEYID = 6
2,784,664 UART: [afmc] SUBJECT.KEYID = 7
2,785,090 UART: [afmc] AUTHORITY.KEYID = 5
2,820,691 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,405 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,156 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,885 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,768 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,487 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,274 UART: [afmc] --
2,864,292 UART: [cold-reset] --
2,865,318 UART: [state] Locking Datavault
2,866,463 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,067 UART: [state] Locking ICCM
2,867,557 UART: [exit] Launching FMC @ 0x40000130
2,872,886 UART:
2,872,902 UART: Running Caliptra FMC ...
2,873,310 UART:
2,873,453 UART: [state] CFI Enabled
2,884,024 UART: [fht] FMC Alias Private Key: 7
2,991,955 UART: [art] Extend RT PCRs Done
2,992,383 UART: [art] Lock RT PCRs Done
2,993,839 UART: [art] Populate DV Done
3,001,900 UART: [fht] FMC Alias Private Key: 7
3,002,870 UART: [art] Derive CDI
3,003,150 UART: [art] Store in in slot 0x4
3,088,739 UART: [art] Derive Key Pair
3,089,099 UART: [art] Store priv key in slot 0x5
3,102,597 UART: [art] Derive Key Pair - Done
3,117,275 UART: [art] Signing Cert with AUTHO
3,117,755 UART: RITY.KEYID = 7
3,132,951 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,716 UART: [art] PUB.X = 8FA97151A0B07B69AAB12D166A857393D464961C5BDA19186EF46FCF6965FA188A5F0ABC7DBCEBD6C29D8947F990AFFA
3,140,501 UART: [art] PUB.Y = D4BF421D5B3B7EBCA698ACC8B82CD86F047233E520911ABBA5F505010E319416704F7382B5E6BBBCC63C6F874611E376
3,147,447 UART: [art] SIG.R = C76DA8A1D4D55DE6F1B0E40D5566A6D5FF4D31C6236E320F3521E16C5EE85C724162BB60705317E944454211F12E1931
3,154,209 UART: [art] SIG.S = 167D808C1513854165322BFD354A349840E06EC42269A2DF21D09142B61AB4583909CA0A508159DA417A70F4D15BC191
3,177,906 UART: Caliptra RT
3,178,251 UART: [state] CFI Enabled
3,286,080 UART: [rt] RT listening for mailbox commands...
3,286,743 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,690 UART: [rt]cmd =0x46504c54, len=4
3,317,852 >>> mbox cmd response data (8 bytes)
3,318,201 UART: [rt] FIPS self test
3,318,529 UART: [kat] ++
3,318,681 UART: [kat] sha1
3,319,529 UART: Fatal Error: 0x90060001
3,321,068 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,321,073 >>> mbox cmd response: failed
3,321,073 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,321,078 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,699 UART: [kat] SHA2-256
891,249 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,378 UART: [kat] ++
895,530 UART: [kat] sha1
899,854 UART: [kat] SHA2-256
901,794 UART: [kat] SHA2-384
904,627 UART: [kat] SHA2-512-ACC
906,528 UART: [kat] ECC-384
916,323 UART: [kat] HMAC-384Kdf
920,913 UART: [kat] LMS
1,169,225 UART: [kat] --
1,170,014 UART: [cold-reset] ++
1,170,366 UART: [fht] FHT @ 0x50003400
1,173,116 UART: [idev] ++
1,173,284 UART: [idev] CDI.KEYID = 6
1,173,645 UART: [idev] SUBJECT.KEYID = 7
1,174,070 UART: [idev] UDS.KEYID = 0
1,174,416 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,666 UART: [idev] Erasing UDS.KEYID = 0
1,198,928 UART: [idev] Sha1 KeyId Algorithm
1,207,624 UART: [idev] --
1,208,615 UART: [ldev] ++
1,208,783 UART: [ldev] CDI.KEYID = 6
1,209,147 UART: [ldev] SUBJECT.KEYID = 5
1,209,574 UART: [ldev] AUTHORITY.KEYID = 7
1,210,037 UART: [ldev] FE.KEYID = 1
1,215,127 UART: [ldev] Erasing FE.KEYID = 1
1,241,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,127 UART: [ldev] --
1,280,601 UART: [fwproc] Wait for Commands...
1,281,318 UART: [fwproc] Recv command 0x46574c44
1,282,051 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,951 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,260 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,486 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,317 ready_for_fw is high
1,057,317 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,958 >>> mbox cmd response: success
2,697,834 UART:
2,697,850 UART: Running Caliptra FMC ...
2,698,258 UART:
2,698,401 UART: [state] CFI Enabled
2,709,000 UART: [fht] FMC Alias Private Key: 7
2,817,351 UART: [art] Extend RT PCRs Done
2,817,779 UART: [art] Lock RT PCRs Done
2,819,327 UART: [art] Populate DV Done
2,827,514 UART: [fht] FMC Alias Private Key: 7
2,828,452 UART: [art] Derive CDI
2,828,732 UART: [art] Store in in slot 0x4
2,914,295 UART: [art] Derive Key Pair
2,914,655 UART: [art] Store priv key in slot 0x5
2,928,275 UART: [art] Derive Key Pair - Done
2,942,764 UART: [art] Signing Cert with AUTHO
2,943,244 UART: RITY.KEYID = 7
2,958,470 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,235 UART: [art] PUB.X = 814F56A48F07DDD8BFE9AE82A40A1E5A436A85FA19E5C36601689E690750D91589A4D6D46F75E7B0F445DD9066E6670F
2,965,994 UART: [art] PUB.Y = 48734003FDD9D95924C102084C4CCD1708D6811462811EB2AC920AEE82FBF3CD40E54345814FF33A34A352361A71A514
2,972,925 UART: [art] SIG.R = 8D23E6B5AB504620CE010F783C435864A11704D3B566810816F3C7D5E7EE3DA3215BF0889E342969801D551F45F7C9A3
2,979,677 UART: [art] SIG.S = FC5551D376484FD882A6EED67E058AB6926919C0056E9132071D17219B344094BB6BB0784C27566769A8E06F458A947C
3,003,521 UART: Caliptra RT
3,003,866 UART: [state] CFI Enabled
3,112,340 UART: [rt] RT listening for mailbox commands...
3,113,003 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,954 UART: [rt]cmd =0x46504c54, len=4
3,144,242 >>> mbox cmd response data (8 bytes)
3,144,527 UART: [rt] FIPS self test
3,144,855 UART: [kat] ++
3,145,007 UART: [kat] sha1
3,145,663 UART: Fatal Error: 0x90060001
3,147,202 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,147,207 >>> mbox cmd response: failed
3,147,207 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,147,212 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,407 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,734 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,585 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,593 >>> mbox cmd response: failed
807,593 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,599 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,259 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,259 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,835 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,843 >>> mbox cmd response: failed
807,843 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,849 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,699 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,791 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,794 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,802 >>> mbox cmd response: failed
807,802 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,808 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,414 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,684 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,414 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,422 >>> mbox cmd response: failed
807,422 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,428 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,494 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,602 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,019 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,027 >>> mbox cmd response: failed
807,027 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,033 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,195 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,237 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,211 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,219 >>> mbox cmd response: failed
807,219 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,225 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,587 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,061 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,464 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,472 >>> mbox cmd response: failed
807,472 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,478 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,128 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,938 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,282 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,290 >>> mbox cmd response: failed
807,290 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,296 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,098 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,690 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,671 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,679 >>> mbox cmd response: failed
807,679 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,685 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,095 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,461 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
808,347 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
808,355 >>> mbox cmd response: failed
808,355 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
808,361 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,653 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,371 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,278 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,286 >>> mbox cmd response: failed
807,286 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,292 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,284 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,680 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,288 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,296 >>> mbox cmd response: failed
807,296 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
807,302 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,292 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,914 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,779 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,415 UART: [kat] SHA2-256
882,346 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,461 UART: [kat] ++
886,613 UART: [kat] sha1
890,697 UART: [kat] SHA2-256
892,635 UART: [kat] SHA2-384
895,246 UART: [kat] SHA2-512-ACC
897,147 UART: [kat] ECC-384
902,462 UART: [kat] HMAC-384Kdf
906,912 UART: [kat] LMS
1,475,108 UART: [kat] --
1,475,923 UART: [cold-reset] ++
1,476,475 UART: [fht] Storing FHT @ 0x50003400
1,479,158 UART: [idev] ++
1,479,326 UART: [idev] CDI.KEYID = 6
1,479,686 UART: [idev] SUBJECT.KEYID = 7
1,480,110 UART: [idev] UDS.KEYID = 0
1,480,455 ready_for_fw is high
1,480,455 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,487,952 UART: [idev] Erasing UDS.KEYID = 0
1,504,898 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,418 UART: [idev] --
1,514,411 UART: [ldev] ++
1,514,579 UART: [ldev] CDI.KEYID = 6
1,514,942 UART: [ldev] SUBJECT.KEYID = 5
1,515,368 UART: [ldev] AUTHORITY.KEYID = 7
1,515,831 UART: [ldev] FE.KEYID = 1
1,521,033 UART: [ldev] Erasing FE.KEYID = 1
1,546,558 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,628 UART: [ldev] --
1,585,989 UART: [fwproc] Waiting for Commands...
1,586,836 UART: [fwproc] Received command 0x46574c44
1,587,627 UART: [fwproc] Received Image of size 115196 bytes
2,894,313 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,657 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,009 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,260 >>> mbox cmd response: success
3,089,346 UART: [afmc] ++
3,089,514 UART: [afmc] CDI.KEYID = 6
3,089,876 UART: [afmc] SUBJECT.KEYID = 7
3,090,301 UART: [afmc] AUTHORITY.KEYID = 5
3,124,902 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,750 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,530 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,258 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,143 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,833 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,774 UART: [afmc] --
3,167,848 UART: [cold-reset] --
3,168,822 UART: [state] Locking Datavault
3,170,121 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,725 UART: [state] Locking ICCM
3,171,243 UART: [exit] Launching FMC @ 0x40000130
3,176,572 UART:
3,176,588 UART: Running Caliptra FMC ...
3,176,996 UART:
3,177,050 UART: [state] CFI Enabled
3,187,693 UART: [fht] FMC Alias Private Key: 7
3,295,248 UART: [art] Extend RT PCRs Done
3,295,676 UART: [art] Lock RT PCRs Done
3,297,184 UART: [art] Populate DV Done
3,305,357 UART: [fht] FMC Alias Private Key: 7
3,306,455 UART: [art] Derive CDI
3,306,735 UART: [art] Store in in slot 0x4
3,392,764 UART: [art] Derive Key Pair
3,393,124 UART: [art] Store priv key in slot 0x5
3,405,964 UART: [art] Derive Key Pair - Done
3,420,761 UART: [art] Signing Cert with AUTHO
3,421,241 UART: RITY.KEYID = 7
3,436,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,818 UART: [art] PUB.X = DEA62A4A5655E27800B6365EDB86FB818F0052A7E3F00E9B08511250FB871EE6AAF828523A253D23D01542F579C3200B
3,443,535 UART: [art] PUB.Y = 961563DA9392E2B1A0AE1B83BD1B8BA078BB0E3A00765EF5421298FDDCB50B8101B06E96E820CCE140423A7C1149916F
3,450,460 UART: [art] SIG.R = 5EFAB7C9900F5FD94B1484346CEDE51339FB6990C600326DD9309670B9263B078EAAD6FBE1EAA6E6A21C46E79C995FC4
3,457,214 UART: [art] SIG.S = 0B6E1CA0D97212B8811FB163F0CF8B75B4927DAB248C240289EC4B0C166922678D913369FFC112B068FFCFBA1EA8F1BD
3,481,460 UART: Caliptra RT
3,481,713 UART: [state] CFI Enabled
3,590,335 UART: [rt] RT listening for mailbox commands...
3,590,998 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,633 UART: [rt]cmd =0x46504c54, len=4
3,621,745 >>> mbox cmd response data (8 bytes)
3,621,986 UART: [rt] FIPS self test
3,622,314 UART: [kat] ++
3,622,466 UART: [kat] sha1
3,626,671 UART: Fatal Error: 0x90060002
3,628,210 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,628,215 >>> mbox cmd response: failed
3,628,215 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,628,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,429 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,967 UART: [kat] SHA2-256
881,898 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,013 UART: [kat] ++
886,165 UART: [kat] sha1
890,453 UART: [kat] SHA2-256
892,391 UART: [kat] SHA2-384
895,162 UART: [kat] SHA2-512-ACC
897,063 UART: [kat] ECC-384
902,382 UART: [kat] HMAC-384Kdf
907,122 UART: [kat] LMS
1,475,318 UART: [kat] --
1,476,263 UART: [cold-reset] ++
1,476,829 UART: [fht] Storing FHT @ 0x50003400
1,479,590 UART: [idev] ++
1,479,758 UART: [idev] CDI.KEYID = 6
1,480,118 UART: [idev] SUBJECT.KEYID = 7
1,480,542 UART: [idev] UDS.KEYID = 0
1,480,887 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,668 UART: [idev] Erasing UDS.KEYID = 0
1,505,272 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,878 UART: [idev] --
1,514,817 UART: [ldev] ++
1,514,985 UART: [ldev] CDI.KEYID = 6
1,515,348 UART: [ldev] SUBJECT.KEYID = 5
1,515,774 UART: [ldev] AUTHORITY.KEYID = 7
1,516,237 UART: [ldev] FE.KEYID = 1
1,521,735 UART: [ldev] Erasing FE.KEYID = 1
1,546,954 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,854 UART: [ldev] --
1,586,117 UART: [fwproc] Waiting for Commands...
1,586,752 UART: [fwproc] Received command 0x46574c44
1,587,543 UART: [fwproc] Received Image of size 115196 bytes
2,894,781 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,505 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,857 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,132 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,747 ready_for_fw is high
1,361,747 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,072 >>> mbox cmd response: success
2,999,662 UART:
2,999,678 UART: Running Caliptra FMC ...
3,000,086 UART:
3,000,140 UART: [state] CFI Enabled
3,011,007 UART: [fht] FMC Alias Private Key: 7
3,118,580 UART: [art] Extend RT PCRs Done
3,119,008 UART: [art] Lock RT PCRs Done
3,120,558 UART: [art] Populate DV Done
3,128,677 UART: [fht] FMC Alias Private Key: 7
3,129,799 UART: [art] Derive CDI
3,130,079 UART: [art] Store in in slot 0x4
3,215,922 UART: [art] Derive Key Pair
3,216,282 UART: [art] Store priv key in slot 0x5
3,229,214 UART: [art] Derive Key Pair - Done
3,243,768 UART: [art] Signing Cert with AUTHO
3,244,248 UART: RITY.KEYID = 7
3,259,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,949 UART: [art] PUB.X = 8558980003FCD3E1DFED30A1FD4B1503DF348F331FDBFE61C895BADF1DF6761D51207165F732828E1DDA1EE298D49E9B
3,266,705 UART: [art] PUB.Y = 103610844083D4F711F5011F88253D816EEDC476639A81F40BA3D62FFC5E534F67A12745409289FDEC90BD33168B0E3C
3,273,642 UART: [art] SIG.R = 80FD45482ADBD17E7E1FFB04041A0BFFEFD9D9BD6ABB01E1A93BD01AF140850CCF2FD50B11EAD21F191925853D29A5F5
3,280,418 UART: [art] SIG.S = 8658CEE7DDEAA7DDDF1635EEEBEAEAD8F971A32ABDC914AFF73F68DCA679A388C8AE8F6B7CDCA47FE45540D85CF89AA5
3,304,501 UART: Caliptra RT
3,304,754 UART: [state] CFI Enabled
3,413,486 UART: [rt] RT listening for mailbox commands...
3,414,149 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,896 UART: [rt]cmd =0x46504c54, len=4
3,445,158 >>> mbox cmd response data (8 bytes)
3,445,313 UART: [rt] FIPS self test
3,445,641 UART: [kat] ++
3,445,793 UART: [kat] sha1
3,450,346 UART: Fatal Error: 0x90060002
3,451,885 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,451,890 >>> mbox cmd response: failed
3,451,890 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,451,895 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,109 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,937,654 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,554 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,032 UART: [kat] SHA2-256
881,963 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,078 UART: [kat] ++
886,230 UART: [kat] sha1
890,380 UART: [kat] SHA2-256
892,318 UART: [kat] SHA2-384
894,969 UART: [kat] SHA2-512-ACC
896,870 UART: [kat] ECC-384
902,615 UART: [kat] HMAC-384Kdf
907,337 UART: [kat] LMS
1,475,533 UART: [kat] --
1,476,426 UART: [cold-reset] ++
1,476,796 UART: [fht] Storing FHT @ 0x50003400
1,479,605 UART: [idev] ++
1,479,773 UART: [idev] CDI.KEYID = 6
1,480,133 UART: [idev] SUBJECT.KEYID = 7
1,480,557 UART: [idev] UDS.KEYID = 0
1,480,902 ready_for_fw is high
1,480,902 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,993 UART: [idev] Erasing UDS.KEYID = 0
1,505,993 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,535 UART: [idev] --
1,515,734 UART: [ldev] ++
1,515,902 UART: [ldev] CDI.KEYID = 6
1,516,265 UART: [ldev] SUBJECT.KEYID = 5
1,516,691 UART: [ldev] AUTHORITY.KEYID = 7
1,517,154 UART: [ldev] FE.KEYID = 1
1,522,464 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,849 UART: [ldev] --
1,587,354 UART: [fwproc] Waiting for Commands...
1,588,067 UART: [fwproc] Received command 0x46574c44
1,588,858 UART: [fwproc] Received Image of size 115196 bytes
2,896,666 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,956 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,308 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,355 >>> mbox cmd response: success
3,091,487 UART: [afmc] ++
3,091,655 UART: [afmc] CDI.KEYID = 6
3,092,017 UART: [afmc] SUBJECT.KEYID = 7
3,092,442 UART: [afmc] AUTHORITY.KEYID = 5
3,128,279 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,167 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,947 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,675 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,560 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,250 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,255 UART: [afmc] --
3,171,175 UART: [cold-reset] --
3,171,961 UART: [state] Locking Datavault
3,172,998 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,602 UART: [state] Locking ICCM
3,174,236 UART: [exit] Launching FMC @ 0x40000130
3,179,565 UART:
3,179,581 UART: Running Caliptra FMC ...
3,179,989 UART:
3,180,132 UART: [state] CFI Enabled
3,190,809 UART: [fht] FMC Alias Private Key: 7
3,298,952 UART: [art] Extend RT PCRs Done
3,299,380 UART: [art] Lock RT PCRs Done
3,300,920 UART: [art] Populate DV Done
3,309,199 UART: [fht] FMC Alias Private Key: 7
3,310,277 UART: [art] Derive CDI
3,310,557 UART: [art] Store in in slot 0x4
3,396,186 UART: [art] Derive Key Pair
3,396,546 UART: [art] Store priv key in slot 0x5
3,409,784 UART: [art] Derive Key Pair - Done
3,424,643 UART: [art] Signing Cert with AUTHO
3,425,123 UART: RITY.KEYID = 7
3,440,601 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,366 UART: [art] PUB.X = 90E2A5379C6CFBCF557A06B11F5292A6CE0885AE7F43EA55C68B0A57C57CD9899D5B072A0EC10154ED3F1FE017FAED46
3,448,134 UART: [art] PUB.Y = C9038DC91115B346FA5B2E4F051B51900CA8E11ECEDD3B15DD3A5264C40057D3F0FDD14E73CCD03166B82893D83D0543
3,455,058 UART: [art] SIG.R = 529A403FB9EB00ACBFBCC11DB65A21417647678A11F41354EF236E480B53846B1F020F1A53137D6DADCF400C53EA9FAB
3,461,806 UART: [art] SIG.S = 33EBBD8B9A10AA9E18C09CC23C440626CAF00799B50E787640DA23C43DB58B3B4E9BDD8336E4A5014C0D50B9BBAEBA0F
3,485,653 UART: Caliptra RT
3,485,998 UART: [state] CFI Enabled
3,594,398 UART: [rt] RT listening for mailbox commands...
3,595,061 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,986 UART: [rt]cmd =0x46504c54, len=4
3,626,072 >>> mbox cmd response data (8 bytes)
3,626,425 UART: [rt] FIPS self test
3,626,753 UART: [kat] ++
3,626,905 UART: [kat] sha1
3,631,286 UART: Fatal Error: 0x90060002
3,632,825 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,632,830 >>> mbox cmd response: failed
3,632,830 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,632,835 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,706 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,312 UART: [kat] SHA2-256
882,243 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,358 UART: [kat] ++
886,510 UART: [kat] sha1
890,614 UART: [kat] SHA2-256
892,552 UART: [kat] SHA2-384
895,199 UART: [kat] SHA2-512-ACC
897,100 UART: [kat] ECC-384
902,873 UART: [kat] HMAC-384Kdf
907,423 UART: [kat] LMS
1,475,619 UART: [kat] --
1,476,228 UART: [cold-reset] ++
1,476,794 UART: [fht] Storing FHT @ 0x50003400
1,479,693 UART: [idev] ++
1,479,861 UART: [idev] CDI.KEYID = 6
1,480,221 UART: [idev] SUBJECT.KEYID = 7
1,480,645 UART: [idev] UDS.KEYID = 0
1,480,990 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,731 UART: [idev] Erasing UDS.KEYID = 0
1,505,495 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,061 UART: [idev] --
1,515,158 UART: [ldev] ++
1,515,326 UART: [ldev] CDI.KEYID = 6
1,515,689 UART: [ldev] SUBJECT.KEYID = 5
1,516,115 UART: [ldev] AUTHORITY.KEYID = 7
1,516,578 UART: [ldev] FE.KEYID = 1
1,521,920 UART: [ldev] Erasing FE.KEYID = 1
1,547,863 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,003 UART: [ldev] --
1,587,464 UART: [fwproc] Waiting for Commands...
1,588,179 UART: [fwproc] Received command 0x46574c44
1,588,970 UART: [fwproc] Received Image of size 115196 bytes
2,897,498 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,424 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,776 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,091,023 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,404 ready_for_fw is high
1,363,404 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,497 >>> mbox cmd response: success
3,002,483 UART:
3,002,499 UART: Running Caliptra FMC ...
3,002,907 UART:
3,003,050 UART: [state] CFI Enabled
3,013,625 UART: [fht] FMC Alias Private Key: 7
3,122,058 UART: [art] Extend RT PCRs Done
3,122,486 UART: [art] Lock RT PCRs Done
3,124,046 UART: [art] Populate DV Done
3,132,143 UART: [fht] FMC Alias Private Key: 7
3,133,075 UART: [art] Derive CDI
3,133,355 UART: [art] Store in in slot 0x4
3,219,112 UART: [art] Derive Key Pair
3,219,472 UART: [art] Store priv key in slot 0x5
3,232,802 UART: [art] Derive Key Pair - Done
3,247,243 UART: [art] Signing Cert with AUTHO
3,247,723 UART: RITY.KEYID = 7
3,262,979 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,744 UART: [art] PUB.X = 8F6628DD1C4D54D92FFD8335019BE24F0BF05F3D8CDECF28B5699E9BFD0688DB52CBB0A82B22980A16390AD618EDA5CB
3,270,519 UART: [art] PUB.Y = 3C9057B55284AFDAE7E0FA948FE6E9D5B903F898F9B499158AE82BF74855335BC995C735108F6014A371CC262412E501
3,277,461 UART: [art] SIG.R = 7C84E949A06A2149C4D6AE584224C9DE96B34802C32780D3EBC41CA5A2BB17805326F431122FDFA59920284BF553E24C
3,284,228 UART: [art] SIG.S = 5040BD189AC7373CDDAD27BDE6A196D3B387D47132F41D90B72FA48FDB9AF60FFFB8622F5AE93AFD9339A2F2EE89DCCE
3,307,752 UART: Caliptra RT
3,308,097 UART: [state] CFI Enabled
3,415,555 UART: [rt] RT listening for mailbox commands...
3,416,218 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,851 UART: [rt]cmd =0x46504c54, len=4
3,447,077 >>> mbox cmd response data (8 bytes)
3,447,434 UART: [rt] FIPS self test
3,447,762 UART: [kat] ++
3,447,914 UART: [kat] sha1
3,452,089 UART: Fatal Error: 0x90060002
3,453,628 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,453,633 >>> mbox cmd response: failed
3,453,633 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,453,638 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,906 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,007 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
893,208 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,333 UART: [kat] ++
897,485 UART: [kat] sha1
901,671 UART: [kat] SHA2-256
903,611 UART: [kat] SHA2-384
906,510 UART: [kat] SHA2-512-ACC
908,411 UART: [kat] ECC-384
918,250 UART: [kat] HMAC-384Kdf
922,868 UART: [kat] LMS
1,171,196 UART: [kat] --
1,172,219 UART: [cold-reset] ++
1,172,651 UART: [fht] FHT @ 0x50003400
1,175,232 UART: [idev] ++
1,175,400 UART: [idev] CDI.KEYID = 6
1,175,760 UART: [idev] SUBJECT.KEYID = 7
1,176,184 UART: [idev] UDS.KEYID = 0
1,176,529 ready_for_fw is high
1,176,529 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,320 UART: [idev] Erasing UDS.KEYID = 0
1,200,867 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,239 UART: [ldev] ++
1,210,407 UART: [ldev] CDI.KEYID = 6
1,210,770 UART: [ldev] SUBJECT.KEYID = 5
1,211,196 UART: [ldev] AUTHORITY.KEYID = 7
1,211,659 UART: [ldev] FE.KEYID = 1
1,216,561 UART: [ldev] Erasing FE.KEYID = 1
1,242,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,465 UART: [ldev] --
1,281,926 UART: [fwproc] Wait for Commands...
1,282,694 UART: [fwproc] Recv command 0x46574c44
1,283,422 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,348 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,652 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,731 >>> mbox cmd response: success
2,786,759 UART: [afmc] ++
2,786,927 UART: [afmc] CDI.KEYID = 6
2,787,289 UART: [afmc] SUBJECT.KEYID = 7
2,787,714 UART: [afmc] AUTHORITY.KEYID = 5
2,822,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,448 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,176 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,061 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,780 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,584 UART: [afmc] --
2,866,516 UART: [cold-reset] --
2,867,326 UART: [state] Locking Datavault
2,868,863 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,467 UART: [state] Locking ICCM
2,870,137 UART: [exit] Launching FMC @ 0x40000130
2,875,466 UART:
2,875,482 UART: Running Caliptra FMC ...
2,875,890 UART:
2,875,944 UART: [state] CFI Enabled
2,886,297 UART: [fht] FMC Alias Private Key: 7
2,993,946 UART: [art] Extend RT PCRs Done
2,994,374 UART: [art] Lock RT PCRs Done
2,995,726 UART: [art] Populate DV Done
3,004,223 UART: [fht] FMC Alias Private Key: 7
3,005,221 UART: [art] Derive CDI
3,005,501 UART: [art] Store in in slot 0x4
3,090,788 UART: [art] Derive Key Pair
3,091,148 UART: [art] Store priv key in slot 0x5
3,103,910 UART: [art] Derive Key Pair - Done
3,118,725 UART: [art] Signing Cert with AUTHO
3,119,205 UART: RITY.KEYID = 7
3,134,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,292 UART: [art] PUB.X = 68C42BA2B0F49BB467891E43FD00199B9B9D2CEC80350BB15FC3491286C315DF9ACBF34A8F3B6820B6CD7D323DA4C6AB
3,142,053 UART: [art] PUB.Y = EFC7EE2EED13D223F0B4575165F5DFC2D3C641726BDA570ADCBDB725EFDE062CE161D9B4B8E6439BC2AF12039E34FF13
3,149,018 UART: [art] SIG.R = 413CA8B958221C38D9892E45CDA9808CAC6F4BD4D53BB444123B5378537F2651FC4F69115521EFEF9D5A6D123138B40A
3,155,787 UART: [art] SIG.S = CAE5A98E95456CBBBED7D9725F7B0EA08F7AF8194DDF8A0DF671B633A3730A2F6679DCF34DC0985847DDA7C2B3809419
3,179,563 UART: Caliptra RT
3,179,816 UART: [state] CFI Enabled
3,287,693 UART: [rt] RT listening for mailbox commands...
3,288,356 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,121 UART: [rt]cmd =0x46504c54, len=4
3,319,167 >>> mbox cmd response data (8 bytes)
3,319,320 UART: [rt] FIPS self test
3,319,648 UART: [kat] ++
3,319,800 UART: [kat] sha1
3,324,117 UART: Fatal Error: 0x90060002
3,325,656 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,325,661 >>> mbox cmd response: failed
3,325,661 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,325,666 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,704 UART: [state] LifecycleState = Unprovisioned
85,359 UART: [state] DebugLocked = No
85,847 UART: [state] WD Timer not started. Device not locked for debugging
87,154 UART: [kat] SHA2-256
892,804 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,929 UART: [kat] ++
897,081 UART: [kat] sha1
901,239 UART: [kat] SHA2-256
903,179 UART: [kat] SHA2-384
905,746 UART: [kat] SHA2-512-ACC
907,647 UART: [kat] ECC-384
917,320 UART: [kat] HMAC-384Kdf
922,014 UART: [kat] LMS
1,170,342 UART: [kat] --
1,171,219 UART: [cold-reset] ++
1,171,631 UART: [fht] FHT @ 0x50003400
1,174,240 UART: [idev] ++
1,174,408 UART: [idev] CDI.KEYID = 6
1,174,768 UART: [idev] SUBJECT.KEYID = 7
1,175,192 UART: [idev] UDS.KEYID = 0
1,175,537 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,252 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,208,679 UART: [idev] --
1,209,909 UART: [ldev] ++
1,210,077 UART: [ldev] CDI.KEYID = 6
1,210,440 UART: [ldev] SUBJECT.KEYID = 5
1,210,866 UART: [ldev] AUTHORITY.KEYID = 7
1,211,329 UART: [ldev] FE.KEYID = 1
1,216,771 UART: [ldev] Erasing FE.KEYID = 1
1,243,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,353 UART: [ldev] --
1,282,772 UART: [fwproc] Wait for Commands...
1,283,444 UART: [fwproc] Recv command 0x46574c44
1,284,172 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,802 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,921 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,351 ready_for_fw is high
1,060,351 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,640,580 >>> mbox cmd response: success
2,702,522 UART:
2,702,538 UART: Running Caliptra FMC ...
2,702,946 UART:
2,703,000 UART: [state] CFI Enabled
2,713,605 UART: [fht] FMC Alias Private Key: 7
2,820,684 UART: [art] Extend RT PCRs Done
2,821,112 UART: [art] Lock RT PCRs Done
2,822,354 UART: [art] Populate DV Done
2,830,663 UART: [fht] FMC Alias Private Key: 7
2,831,699 UART: [art] Derive CDI
2,831,979 UART: [art] Store in in slot 0x4
2,917,894 UART: [art] Derive Key Pair
2,918,254 UART: [art] Store priv key in slot 0x5
2,931,256 UART: [art] Derive Key Pair - Done
2,946,022 UART: [art] Signing Cert with AUTHO
2,946,502 UART: RITY.KEYID = 7
2,962,020 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,785 UART: [art] PUB.X = C0F6EB2AE992AE6FE5192A9049FF48D8EB0E341A2E0C21612BF99AD87E96785AEE1BD358D93BAD9062C558BAF6EF46F2
2,969,569 UART: [art] PUB.Y = 40DB004C129213652986382C7B3081D125F6D70B0B44E3DB28D64A7DD1F6408709D5B6F90B158802D18DCBCA3A4802F5
2,976,477 UART: [art] SIG.R = C00649BC34ED103D710C7E343ACA19BE2163189C42CA201F34FD21F6F6329A6734E1CF27B53E969273CAD321E95996FA
2,983,245 UART: [art] SIG.S = 38FF00C18F1262A3F978E6B502F1D5098A4A5A0A9E017B3065655058D36E6EDA55A5A84980F40027A6F1BD02F81408C5
3,007,212 UART: Caliptra RT
3,007,465 UART: [state] CFI Enabled
3,115,520 UART: [rt] RT listening for mailbox commands...
3,116,183 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,958 UART: [rt]cmd =0x46504c54, len=4
3,147,206 >>> mbox cmd response data (8 bytes)
3,147,483 UART: [rt] FIPS self test
3,147,811 UART: [kat] ++
3,147,963 UART: [kat] sha1
3,152,124 UART: Fatal Error: 0x90060002
3,153,663 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,153,668 >>> mbox cmd response: failed
3,153,668 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,153,673 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,169 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,766 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
893,497 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,622 UART: [kat] ++
897,774 UART: [kat] sha1
902,120 UART: [kat] SHA2-256
904,060 UART: [kat] SHA2-384
906,719 UART: [kat] SHA2-512-ACC
908,620 UART: [kat] ECC-384
918,161 UART: [kat] HMAC-384Kdf
922,745 UART: [kat] LMS
1,171,073 UART: [kat] --
1,172,142 UART: [cold-reset] ++
1,172,534 UART: [fht] FHT @ 0x50003400
1,175,161 UART: [idev] ++
1,175,329 UART: [idev] CDI.KEYID = 6
1,175,689 UART: [idev] SUBJECT.KEYID = 7
1,176,113 UART: [idev] UDS.KEYID = 0
1,176,458 ready_for_fw is high
1,176,458 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,119 UART: [idev] Erasing UDS.KEYID = 0
1,201,304 UART: [idev] Sha1 KeyId Algorithm
1,209,874 UART: [idev] --
1,210,976 UART: [ldev] ++
1,211,144 UART: [ldev] CDI.KEYID = 6
1,211,507 UART: [ldev] SUBJECT.KEYID = 5
1,211,933 UART: [ldev] AUTHORITY.KEYID = 7
1,212,396 UART: [ldev] FE.KEYID = 1
1,217,824 UART: [ldev] Erasing FE.KEYID = 1
1,244,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,948 UART: [ldev] --
1,284,417 UART: [fwproc] Wait for Commands...
1,285,181 UART: [fwproc] Recv command 0x46574c44
1,285,909 UART: [fwproc] Recv'd Img size: 115196 bytes
2,594,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,503 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,807 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,788,040 >>> mbox cmd response: success
2,789,258 UART: [afmc] ++
2,789,426 UART: [afmc] CDI.KEYID = 6
2,789,788 UART: [afmc] SUBJECT.KEYID = 7
2,790,213 UART: [afmc] AUTHORITY.KEYID = 5
2,825,280 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,867 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,615 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,343 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,228 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,947 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,865 UART: [afmc] --
2,868,847 UART: [cold-reset] --
2,870,029 UART: [state] Locking Datavault
2,871,382 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,986 UART: [state] Locking ICCM
2,872,656 UART: [exit] Launching FMC @ 0x40000130
2,877,985 UART:
2,878,001 UART: Running Caliptra FMC ...
2,878,409 UART:
2,878,552 UART: [state] CFI Enabled
2,889,213 UART: [fht] FMC Alias Private Key: 7
2,997,850 UART: [art] Extend RT PCRs Done
2,998,278 UART: [art] Lock RT PCRs Done
2,999,866 UART: [art] Populate DV Done
3,008,379 UART: [fht] FMC Alias Private Key: 7
3,009,397 UART: [art] Derive CDI
3,009,677 UART: [art] Store in in slot 0x4
3,095,208 UART: [art] Derive Key Pair
3,095,568 UART: [art] Store priv key in slot 0x5
3,108,978 UART: [art] Derive Key Pair - Done
3,123,472 UART: [art] Signing Cert with AUTHO
3,123,952 UART: RITY.KEYID = 7
3,139,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,140,009 UART: [art] PUB.X = 869BB2C3359EC8997532A623D2CF5975CDD9A14A123250FA58B8A5163636AE20AB90AF714F2B9C467843EE4D449335FA
3,146,781 UART: [art] PUB.Y = 36A601C2088B9B7B9A35D384B405BCCE561C15D3AED9B7193BC5C8250AA8C3204B8A90C841C3EAE3A79E04F3E8EE42C6
3,153,730 UART: [art] SIG.R = 7C2F0A3FE5DCD837CE816F13E783C8288A52A5BDF1B3EB9E2870AA4BC14CC4955125D84E647CC7E2E3107F4AFCA5708C
3,160,515 UART: [art] SIG.S = D10B5CBB1E30A1AAB43E36D2C8A6000B91256C9B56722F90EBAF195BCDE5C1AE9FAD4147E4366EFCCF14B406238AA3D1
3,184,481 UART: Caliptra RT
3,184,826 UART: [state] CFI Enabled
3,292,383 UART: [rt] RT listening for mailbox commands...
3,293,046 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,833 UART: [rt]cmd =0x46504c54, len=4
3,324,097 >>> mbox cmd response data (8 bytes)
3,324,220 UART: [rt] FIPS self test
3,324,548 UART: [kat] ++
3,324,700 UART: [kat] sha1
3,328,863 UART: Fatal Error: 0x90060002
3,330,402 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,330,407 >>> mbox cmd response: failed
3,330,407 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,330,412 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,955 UART: [state] LifecycleState = Unprovisioned
86,610 UART: [state] DebugLocked = No
87,336 UART: [state] WD Timer not started. Device not locked for debugging
88,495 UART: [kat] SHA2-256
894,145 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,270 UART: [kat] ++
898,422 UART: [kat] sha1
902,512 UART: [kat] SHA2-256
904,452 UART: [kat] SHA2-384
907,425 UART: [kat] SHA2-512-ACC
909,326 UART: [kat] ECC-384
918,799 UART: [kat] HMAC-384Kdf
923,351 UART: [kat] LMS
1,171,679 UART: [kat] --
1,172,566 UART: [cold-reset] ++
1,173,042 UART: [fht] FHT @ 0x50003400
1,175,815 UART: [idev] ++
1,175,983 UART: [idev] CDI.KEYID = 6
1,176,343 UART: [idev] SUBJECT.KEYID = 7
1,176,767 UART: [idev] UDS.KEYID = 0
1,177,112 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,915 UART: [idev] Erasing UDS.KEYID = 0
1,201,558 UART: [idev] Sha1 KeyId Algorithm
1,210,004 UART: [idev] --
1,211,004 UART: [ldev] ++
1,211,172 UART: [ldev] CDI.KEYID = 6
1,211,535 UART: [ldev] SUBJECT.KEYID = 5
1,211,961 UART: [ldev] AUTHORITY.KEYID = 7
1,212,424 UART: [ldev] FE.KEYID = 1
1,217,566 UART: [ldev] Erasing FE.KEYID = 1
1,243,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,498 UART: [ldev] --
1,282,973 UART: [fwproc] Wait for Commands...
1,283,557 UART: [fwproc] Recv command 0x46574c44
1,284,285 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,219 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,523 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,634 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,888 ready_for_fw is high
1,060,888 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,147 >>> mbox cmd response: success
2,700,513 UART:
2,700,529 UART: Running Caliptra FMC ...
2,700,937 UART:
2,701,080 UART: [state] CFI Enabled
2,711,825 UART: [fht] FMC Alias Private Key: 7
2,819,180 UART: [art] Extend RT PCRs Done
2,819,608 UART: [art] Lock RT PCRs Done
2,821,022 UART: [art] Populate DV Done
2,829,101 UART: [fht] FMC Alias Private Key: 7
2,830,041 UART: [art] Derive CDI
2,830,321 UART: [art] Store in in slot 0x4
2,916,194 UART: [art] Derive Key Pair
2,916,554 UART: [art] Store priv key in slot 0x5
2,929,612 UART: [art] Derive Key Pair - Done
2,944,492 UART: [art] Signing Cert with AUTHO
2,944,972 UART: RITY.KEYID = 7
2,960,060 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,825 UART: [art] PUB.X = 0DB4539A4CAF1F25330FE61F43586D713E1EE2AEAD91AFB70F2577AE4FB95F9E1C1E9CBB39C105F9DD2B27A3BA9F2E40
2,967,607 UART: [art] PUB.Y = 9441F2E530B263169E05D9CC0F337B8412A3A02CADB2C9CC608A36779E40A49BC449915E5FA29BD1DB7D1E1FD6646FE1
2,974,561 UART: [art] SIG.R = 1ABAAE74E16768E5F35625FCEDC0E0B7786598564588AB93F65A49B925B501ECC575DAEAC438F4435CB1EA92180BA93F
2,981,337 UART: [art] SIG.S = FA8D343AB280B0234EF5F70D278AE4BB146249A81CE89E88FBA6595E8968CA9A1CEC9A0FB3511C426D81F3BFACCC3B87
3,005,006 UART: Caliptra RT
3,005,351 UART: [state] CFI Enabled
3,113,518 UART: [rt] RT listening for mailbox commands...
3,114,181 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,040 UART: [rt]cmd =0x46504c54, len=4
3,145,278 >>> mbox cmd response data (8 bytes)
3,145,549 UART: [rt] FIPS self test
3,145,877 UART: [kat] ++
3,146,029 UART: [kat] sha1
3,150,294 UART: Fatal Error: 0x90060002
3,151,833 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,151,838 >>> mbox cmd response: failed
3,151,838 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,151,843 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,836 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,361 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,081 UART: [state] WD Timer not started. Device not locked for debugging
87,208 UART: [kat] SHA2-256
890,758 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,887 UART: [kat] ++
895,039 UART: [kat] sha1
899,325 UART: [kat] SHA2-256
901,265 UART: [kat] SHA2-384
904,060 UART: [kat] SHA2-512-ACC
905,961 UART: [kat] ECC-384
915,088 UART: [kat] HMAC-384Kdf
919,652 UART: [kat] LMS
1,167,964 UART: [kat] --
1,168,955 UART: [cold-reset] ++
1,169,355 UART: [fht] FHT @ 0x50003400
1,172,027 UART: [idev] ++
1,172,195 UART: [idev] CDI.KEYID = 6
1,172,556 UART: [idev] SUBJECT.KEYID = 7
1,172,981 UART: [idev] UDS.KEYID = 0
1,173,327 ready_for_fw is high
1,173,327 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,001 UART: [idev] Erasing UDS.KEYID = 0
1,198,315 UART: [idev] Sha1 KeyId Algorithm
1,207,323 UART: [idev] --
1,208,318 UART: [ldev] ++
1,208,486 UART: [ldev] CDI.KEYID = 6
1,208,850 UART: [ldev] SUBJECT.KEYID = 5
1,209,277 UART: [ldev] AUTHORITY.KEYID = 7
1,209,740 UART: [ldev] FE.KEYID = 1
1,215,020 UART: [ldev] Erasing FE.KEYID = 1
1,241,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,158 UART: [ldev] --
1,280,510 UART: [fwproc] Wait for Commands...
1,281,109 UART: [fwproc] Recv command 0x46574c44
1,281,842 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,354 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,686 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,995 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,231 >>> mbox cmd response: success
2,784,372 UART: [afmc] ++
2,784,540 UART: [afmc] CDI.KEYID = 6
2,784,903 UART: [afmc] SUBJECT.KEYID = 7
2,785,329 UART: [afmc] AUTHORITY.KEYID = 5
2,820,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,138 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,889 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,618 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,501 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,220 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,043 UART: [afmc] --
2,864,079 UART: [cold-reset] --
2,865,029 UART: [state] Locking Datavault
2,866,262 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,866 UART: [state] Locking ICCM
2,867,310 UART: [exit] Launching FMC @ 0x40000130
2,872,639 UART:
2,872,655 UART: Running Caliptra FMC ...
2,873,063 UART:
2,873,117 UART: [state] CFI Enabled
2,883,364 UART: [fht] FMC Alias Private Key: 7
2,990,815 UART: [art] Extend RT PCRs Done
2,991,243 UART: [art] Lock RT PCRs Done
2,993,113 UART: [art] Populate DV Done
3,001,142 UART: [fht] FMC Alias Private Key: 7
3,002,280 UART: [art] Derive CDI
3,002,560 UART: [art] Store in in slot 0x4
3,087,713 UART: [art] Derive Key Pair
3,088,073 UART: [art] Store priv key in slot 0x5
3,100,895 UART: [art] Derive Key Pair - Done
3,115,580 UART: [art] Signing Cert with AUTHO
3,116,060 UART: RITY.KEYID = 7
3,131,526 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,291 UART: [art] PUB.X = 6A88D9AF133C53AE77CF107F5460B46CF00894026D37A61EC64664814DE818840C6CE7F06124F6177051081B2AD0FC97
3,139,045 UART: [art] PUB.Y = E5911498ACE3F5BDCC6A32659C5D7A7078BA5AAE7F018E8C2EB3458A336CB662D7FF379D838507FB0A2F7A5FB562DEFC
3,146,006 UART: [art] SIG.R = D733D1A5E73EE1BFFD0D3F3EE2B8D84F7B75E3B57417C830886EB728AEEB58462F3D1D65C0A89CBB8CA7541AA8D5B00D
3,152,792 UART: [art] SIG.S = 98A604A6435C4EE1E5B30DB942041539C54D9CB635CE0AC2AF7BA8B1BE060BA3C772889C8384F5FEF81F94FA1A675C30
3,176,535 UART: Caliptra RT
3,176,788 UART: [state] CFI Enabled
3,284,310 UART: [rt] RT listening for mailbox commands...
3,284,973 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,644 UART: [rt]cmd =0x46504c54, len=4
3,315,830 >>> mbox cmd response data (8 bytes)
3,316,083 UART: [rt] FIPS self test
3,316,411 UART: [kat] ++
3,316,563 UART: [kat] sha1
3,320,860 UART: Fatal Error: 0x90060002
3,322,399 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,322,404 >>> mbox cmd response: failed
3,322,404 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,322,409 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,906 UART: [kat] SHA2-256
891,456 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,585 UART: [kat] ++
895,737 UART: [kat] sha1
900,049 UART: [kat] SHA2-256
901,989 UART: [kat] SHA2-384
904,704 UART: [kat] SHA2-512-ACC
906,605 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
921,038 UART: [kat] LMS
1,169,350 UART: [kat] --
1,170,387 UART: [cold-reset] ++
1,170,819 UART: [fht] FHT @ 0x50003400
1,173,423 UART: [idev] ++
1,173,591 UART: [idev] CDI.KEYID = 6
1,173,952 UART: [idev] SUBJECT.KEYID = 7
1,174,377 UART: [idev] UDS.KEYID = 0
1,174,723 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,605 UART: [idev] Erasing UDS.KEYID = 0
1,199,731 UART: [idev] Sha1 KeyId Algorithm
1,208,687 UART: [idev] --
1,209,710 UART: [ldev] ++
1,209,878 UART: [ldev] CDI.KEYID = 6
1,210,242 UART: [ldev] SUBJECT.KEYID = 5
1,210,669 UART: [ldev] AUTHORITY.KEYID = 7
1,211,132 UART: [ldev] FE.KEYID = 1
1,216,000 UART: [ldev] Erasing FE.KEYID = 1
1,242,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,920 UART: [ldev] --
1,281,246 UART: [fwproc] Wait for Commands...
1,282,055 UART: [fwproc] Recv command 0x46574c44
1,282,788 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,038 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,347 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,561 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,834 ready_for_fw is high
1,055,834 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,791 >>> mbox cmd response: success
2,695,911 UART:
2,695,927 UART: Running Caliptra FMC ...
2,696,335 UART:
2,696,389 UART: [state] CFI Enabled
2,706,894 UART: [fht] FMC Alias Private Key: 7
2,814,807 UART: [art] Extend RT PCRs Done
2,815,235 UART: [art] Lock RT PCRs Done
2,816,671 UART: [art] Populate DV Done
2,824,974 UART: [fht] FMC Alias Private Key: 7
2,826,122 UART: [art] Derive CDI
2,826,402 UART: [art] Store in in slot 0x4
2,911,883 UART: [art] Derive Key Pair
2,912,243 UART: [art] Store priv key in slot 0x5
2,925,141 UART: [art] Derive Key Pair - Done
2,939,708 UART: [art] Signing Cert with AUTHO
2,940,188 UART: RITY.KEYID = 7
2,955,454 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,219 UART: [art] PUB.X = 7EB2D3452AC15C35251C8C3F90FD2039A8D305D9461DA9E529A265C9BB4E1C023F121D3FE2CD13A49A6FD22C3AB3622E
2,962,995 UART: [art] PUB.Y = 2A912205F0CE0BD456FD8337D943D88E432873FFE4354FAC4CFF9870FAFBDE2BB66D0B63C15D1526A6D30C856A0FA85B
2,969,946 UART: [art] SIG.R = 66BE28DF406D1BCA72FE32FAFB379603226025B34EFCE29EB12528C68D73BDF02AF176E2FB16F98B735FD58F327CF3DA
2,976,731 UART: [art] SIG.S = 0B6E4AE5067B2BC8CC0E986E638F5FEEB40A619D98312C06DFF0CA593CC6AC6766D43633C37529B743921F1E3467FE03
3,000,340 UART: Caliptra RT
3,000,593 UART: [state] CFI Enabled
3,109,178 UART: [rt] RT listening for mailbox commands...
3,109,841 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,506 UART: [rt]cmd =0x46504c54, len=4
3,140,718 >>> mbox cmd response data (8 bytes)
3,140,929 UART: [rt] FIPS self test
3,141,257 UART: [kat] ++
3,141,409 UART: [kat] sha1
3,145,678 UART: Fatal Error: 0x90060002
3,147,217 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,147,222 >>> mbox cmd response: failed
3,147,222 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,147,227 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,330 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,933 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,416 UART: [state] WD Timer not started. Device not locked for debugging
87,661 UART: [kat] SHA2-256
891,211 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,340 UART: [kat] ++
895,492 UART: [kat] sha1
899,790 UART: [kat] SHA2-256
901,730 UART: [kat] SHA2-384
904,659 UART: [kat] SHA2-512-ACC
906,560 UART: [kat] ECC-384
915,829 UART: [kat] HMAC-384Kdf
920,455 UART: [kat] LMS
1,168,767 UART: [kat] --
1,169,690 UART: [cold-reset] ++
1,170,182 UART: [fht] FHT @ 0x50003400
1,172,850 UART: [idev] ++
1,173,018 UART: [idev] CDI.KEYID = 6
1,173,379 UART: [idev] SUBJECT.KEYID = 7
1,173,804 UART: [idev] UDS.KEYID = 0
1,174,150 ready_for_fw is high
1,174,150 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,740 UART: [idev] Erasing UDS.KEYID = 0
1,198,958 UART: [idev] Sha1 KeyId Algorithm
1,207,796 UART: [idev] --
1,208,947 UART: [ldev] ++
1,209,115 UART: [ldev] CDI.KEYID = 6
1,209,479 UART: [ldev] SUBJECT.KEYID = 5
1,209,906 UART: [ldev] AUTHORITY.KEYID = 7
1,210,369 UART: [ldev] FE.KEYID = 1
1,215,537 UART: [ldev] Erasing FE.KEYID = 1
1,241,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,039 UART: [ldev] --
1,281,535 UART: [fwproc] Wait for Commands...
1,282,206 UART: [fwproc] Recv command 0x46574c44
1,282,939 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,089 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,398 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,450 >>> mbox cmd response: success
2,785,677 UART: [afmc] ++
2,785,845 UART: [afmc] CDI.KEYID = 6
2,786,208 UART: [afmc] SUBJECT.KEYID = 7
2,786,634 UART: [afmc] AUTHORITY.KEYID = 5
2,822,425 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,376 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,105 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,988 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,707 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,670 UART: [afmc] --
2,865,608 UART: [cold-reset] --
2,866,352 UART: [state] Locking Datavault
2,867,413 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,017 UART: [state] Locking ICCM
2,868,657 UART: [exit] Launching FMC @ 0x40000130
2,873,986 UART:
2,874,002 UART: Running Caliptra FMC ...
2,874,410 UART:
2,874,553 UART: [state] CFI Enabled
2,885,374 UART: [fht] FMC Alias Private Key: 7
2,993,889 UART: [art] Extend RT PCRs Done
2,994,317 UART: [art] Lock RT PCRs Done
2,995,837 UART: [art] Populate DV Done
3,004,238 UART: [fht] FMC Alias Private Key: 7
3,005,176 UART: [art] Derive CDI
3,005,456 UART: [art] Store in in slot 0x4
3,091,057 UART: [art] Derive Key Pair
3,091,417 UART: [art] Store priv key in slot 0x5
3,104,885 UART: [art] Derive Key Pair - Done
3,119,949 UART: [art] Signing Cert with AUTHO
3,120,429 UART: RITY.KEYID = 7
3,135,973 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,738 UART: [art] PUB.X = E02733208B4522A0CF3519DE0F069E9C3DF5EFF99C143767E5FC37E00D375D29C9F5FBCA82B1E3BF89483703453D1111
3,143,500 UART: [art] PUB.Y = 0022D72A051281D7930C17AF01DDC8502A3104A022E8B837C2386A61C1702004B85242B5448342192009EF003A746B91
3,150,370 UART: [art] SIG.R = EB893AF3CA4B4F62728EDC1C1677E4873D6F55B8E39643127DB37A56071160CB76FD2EBC346A6DF2F3EC21F8C5CDDA0B
3,157,152 UART: [art] SIG.S = 74DAA9C890910318C8107A8D7483189B04E3F031DDC231159E84D2260FC4245BE50E9962CEB457D83B14DD1C18F85047
3,181,077 UART: Caliptra RT
3,181,422 UART: [state] CFI Enabled
3,289,307 UART: [rt] RT listening for mailbox commands...
3,289,970 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,931 UART: [rt]cmd =0x46504c54, len=4
3,321,247 >>> mbox cmd response data (8 bytes)
3,321,448 UART: [rt] FIPS self test
3,321,776 UART: [kat] ++
3,321,928 UART: [kat] sha1
3,325,977 UART: Fatal Error: 0x90060002
3,327,516 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,327,521 >>> mbox cmd response: failed
3,327,521 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,327,526 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
891,667 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,796 UART: [kat] ++
895,948 UART: [kat] sha1
900,324 UART: [kat] SHA2-256
902,264 UART: [kat] SHA2-384
904,907 UART: [kat] SHA2-512-ACC
906,808 UART: [kat] ECC-384
916,237 UART: [kat] HMAC-384Kdf
920,817 UART: [kat] LMS
1,169,129 UART: [kat] --
1,169,956 UART: [cold-reset] ++
1,170,346 UART: [fht] FHT @ 0x50003400
1,172,920 UART: [idev] ++
1,173,088 UART: [idev] CDI.KEYID = 6
1,173,449 UART: [idev] SUBJECT.KEYID = 7
1,173,874 UART: [idev] UDS.KEYID = 0
1,174,220 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,508 UART: [idev] Erasing UDS.KEYID = 0
1,198,262 UART: [idev] Sha1 KeyId Algorithm
1,207,004 UART: [idev] --
1,208,001 UART: [ldev] ++
1,208,169 UART: [ldev] CDI.KEYID = 6
1,208,533 UART: [ldev] SUBJECT.KEYID = 5
1,208,960 UART: [ldev] AUTHORITY.KEYID = 7
1,209,423 UART: [ldev] FE.KEYID = 1
1,214,361 UART: [ldev] Erasing FE.KEYID = 1
1,241,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,361 UART: [ldev] --
1,280,873 UART: [fwproc] Wait for Commands...
1,281,672 UART: [fwproc] Recv command 0x46574c44
1,282,405 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,475 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,784 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,832 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,397 ready_for_fw is high
1,056,397 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,612 >>> mbox cmd response: success
2,696,788 UART:
2,696,804 UART: Running Caliptra FMC ...
2,697,212 UART:
2,697,355 UART: [state] CFI Enabled
2,707,972 UART: [fht] FMC Alias Private Key: 7
2,815,623 UART: [art] Extend RT PCRs Done
2,816,051 UART: [art] Lock RT PCRs Done
2,817,423 UART: [art] Populate DV Done
2,825,392 UART: [fht] FMC Alias Private Key: 7
2,826,472 UART: [art] Derive CDI
2,826,752 UART: [art] Store in in slot 0x4
2,912,581 UART: [art] Derive Key Pair
2,912,941 UART: [art] Store priv key in slot 0x5
2,925,965 UART: [art] Derive Key Pair - Done
2,940,498 UART: [art] Signing Cert with AUTHO
2,940,978 UART: RITY.KEYID = 7
2,956,544 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,309 UART: [art] PUB.X = BCE1AF09488E9D37D53E84CDCC817DAC5CA927ACF01A089941DFBBA674E710C568C76F7AB50A65149D0F2236C74FCECA
2,964,089 UART: [art] PUB.Y = 89345693FF4E2121AB9918122A87FE83AA20A044F20C34B31E7F32DEDCB67243169A551397B64B1FE59573FD70937297
2,971,030 UART: [art] SIG.R = 036442B90A29E57F8CFD1BEB2F1F7F21323273A3792D4A106A0642229EC0B5031778F9C28366822FB51D5EE2820B3144
2,977,779 UART: [art] SIG.S = 3D801D29C39FADFEC27236DEA719EC815E35C5E2C397ECB8B50ED17C6F8CFCACBDCCF89724EAF22989BD9FEFC4C3E6A2
3,001,427 UART: Caliptra RT
3,001,772 UART: [state] CFI Enabled
3,109,327 UART: [rt] RT listening for mailbox commands...
3,109,990 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,955 UART: [rt]cmd =0x46504c54, len=4
3,141,157 >>> mbox cmd response data (8 bytes)
3,141,358 UART: [rt] FIPS self test
3,141,686 UART: [kat] ++
3,141,838 UART: [kat] sha1
3,146,393 UART: Fatal Error: 0x90060002
3,147,932 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,147,937 >>> mbox cmd response: failed
3,147,937 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,147,942 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,015 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,950 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,810 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,818 >>> mbox cmd response: failed
85,818 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,824 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,413 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,919 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,056 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,064 >>> mbox cmd response: failed
86,064 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,070 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,681 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,329 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,125 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,133 >>> mbox cmd response: failed
86,133 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,139 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,072 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,524 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,251 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,259 >>> mbox cmd response: failed
86,259 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,628 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,130 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,692 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,700 >>> mbox cmd response: failed
85,700 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,706 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,927 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,509 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,516 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,524 >>> mbox cmd response: failed
85,524 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,530 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,641 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,437 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,251 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,259 >>> mbox cmd response: failed
86,259 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,418 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,872 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,857 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,865 >>> mbox cmd response: failed
85,865 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,871 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,564 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,248 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,076 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,084 >>> mbox cmd response: failed
86,084 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,090 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,441 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,661 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,694 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,702 >>> mbox cmd response: failed
85,702 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,708 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,247 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,677 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,889 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,897 >>> mbox cmd response: failed
85,897 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,903 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,908 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,308 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,937 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,945 >>> mbox cmd response: failed
85,945 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
85,951 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,156 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,646 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,537 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,033 UART: [kat] SHA2-256
881,964 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,079 UART: [kat] ++
886,231 UART: [kat] sha1
890,303 UART: [kat] SHA2-256
892,241 UART: [kat] SHA2-384
894,944 UART: [kat] SHA2-512-ACC
896,845 UART: [kat] ECC-384
902,396 UART: [kat] HMAC-384Kdf
906,962 UART: [kat] LMS
1,475,158 UART: [kat] --
1,475,749 UART: [cold-reset] ++
1,476,171 UART: [fht] Storing FHT @ 0x50003400
1,478,862 UART: [idev] ++
1,479,030 UART: [idev] CDI.KEYID = 6
1,479,390 UART: [idev] SUBJECT.KEYID = 7
1,479,814 UART: [idev] UDS.KEYID = 0
1,480,159 ready_for_fw is high
1,480,159 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,487,414 UART: [idev] Erasing UDS.KEYID = 0
1,503,184 UART: [idev] Using Sha1 for KeyId Algorithm
1,511,868 UART: [idev] --
1,513,047 UART: [ldev] ++
1,513,215 UART: [ldev] CDI.KEYID = 6
1,513,578 UART: [ldev] SUBJECT.KEYID = 5
1,514,004 UART: [ldev] AUTHORITY.KEYID = 7
1,514,467 UART: [ldev] FE.KEYID = 1
1,519,731 UART: [ldev] Erasing FE.KEYID = 1
1,545,200 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,058 UART: [ldev] --
1,584,535 UART: [fwproc] Waiting for Commands...
1,585,310 UART: [fwproc] Received command 0x46574c44
1,586,101 UART: [fwproc] Received Image of size 115196 bytes
2,893,235 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,841 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,193 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,087,354 >>> mbox cmd response: success
3,088,560 UART: [afmc] ++
3,088,728 UART: [afmc] CDI.KEYID = 6
3,089,090 UART: [afmc] SUBJECT.KEYID = 7
3,089,515 UART: [afmc] AUTHORITY.KEYID = 5
3,124,640 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,090 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,870 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,598 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,483 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,173 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,038 UART: [afmc] --
3,168,112 UART: [cold-reset] --
3,168,872 UART: [state] Locking Datavault
3,169,775 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,379 UART: [state] Locking ICCM
3,171,035 UART: [exit] Launching FMC @ 0x40000130
3,176,364 UART:
3,176,380 UART: Running Caliptra FMC ...
3,176,788 UART:
3,176,842 UART: [state] CFI Enabled
3,187,461 UART: [fht] FMC Alias Private Key: 7
3,295,150 UART: [art] Extend RT PCRs Done
3,295,578 UART: [art] Lock RT PCRs Done
3,297,022 UART: [art] Populate DV Done
3,305,489 UART: [fht] FMC Alias Private Key: 7
3,306,609 UART: [art] Derive CDI
3,306,889 UART: [art] Store in in slot 0x4
3,392,334 UART: [art] Derive Key Pair
3,392,694 UART: [art] Store priv key in slot 0x5
3,406,238 UART: [art] Derive Key Pair - Done
3,421,179 UART: [art] Signing Cert with AUTHO
3,421,659 UART: RITY.KEYID = 7
3,436,759 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,524 UART: [art] PUB.X = F6BDAE6FF74E5C45B784BDB2ED6E8844AF6226C487C4DEA8A8CCEAB98445CF9381E9B527A7E0B64C589CFCB56F06E9FB
3,444,319 UART: [art] PUB.Y = 99DB54473FD8DD1A85A966B3B831059C43C41988AE9E36E9F3A94373778DED213D87504414C15543470EA75938513446
3,451,251 UART: [art] SIG.R = F47C1B026819A715A32462037014BCD3944EB65C0B8D488DFE150E045FF665CEE972873EBE019AD8AE0741512A595DD2
3,458,002 UART: [art] SIG.S = 590B78A63508F038640A3A08331EC2CD01A12BFDA88D99857606059FB33991075678AEDC9E5083ED23FD01E66340BE44
3,481,476 UART: Caliptra RT
3,481,729 UART: [state] CFI Enabled
3,589,400 UART: [rt] RT listening for mailbox commands...
3,590,063 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,710 UART: [rt]cmd =0x46504c54, len=4
3,620,884 >>> mbox cmd response data (8 bytes)
3,621,223 UART: [rt] FIPS self test
3,621,551 UART: [kat] ++
3,621,703 UART: [kat] sha1
3,625,841 UART: [kat] SHA2-256
3,626,427 UART: Fatal Error: 0x90010001
3,627,966 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,627,971 >>> mbox cmd response: failed
3,627,971 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,627,976 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,219 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,797 UART: [kat] SHA2-256
881,728 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,843 UART: [kat] ++
885,995 UART: [kat] sha1
890,175 UART: [kat] SHA2-256
892,113 UART: [kat] SHA2-384
894,870 UART: [kat] SHA2-512-ACC
896,771 UART: [kat] ECC-384
902,414 UART: [kat] HMAC-384Kdf
907,028 UART: [kat] LMS
1,475,224 UART: [kat] --
1,476,167 UART: [cold-reset] ++
1,476,565 UART: [fht] Storing FHT @ 0x50003400
1,479,318 UART: [idev] ++
1,479,486 UART: [idev] CDI.KEYID = 6
1,479,846 UART: [idev] SUBJECT.KEYID = 7
1,480,270 UART: [idev] UDS.KEYID = 0
1,480,615 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,382 UART: [idev] Erasing UDS.KEYID = 0
1,504,816 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,486 UART: [idev] --
1,514,507 UART: [ldev] ++
1,514,675 UART: [ldev] CDI.KEYID = 6
1,515,038 UART: [ldev] SUBJECT.KEYID = 5
1,515,464 UART: [ldev] AUTHORITY.KEYID = 7
1,515,927 UART: [ldev] FE.KEYID = 1
1,520,995 UART: [ldev] Erasing FE.KEYID = 1
1,546,218 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,064 UART: [ldev] --
1,585,445 UART: [fwproc] Waiting for Commands...
1,586,220 UART: [fwproc] Received command 0x46574c44
1,587,011 UART: [fwproc] Received Image of size 115196 bytes
2,894,943 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,451 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,803 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,898 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,853 ready_for_fw is high
1,362,853 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,704 >>> mbox cmd response: success
3,001,730 UART:
3,001,746 UART: Running Caliptra FMC ...
3,002,154 UART:
3,002,208 UART: [state] CFI Enabled
3,012,837 UART: [fht] FMC Alias Private Key: 7
3,121,300 UART: [art] Extend RT PCRs Done
3,121,728 UART: [art] Lock RT PCRs Done
3,123,370 UART: [art] Populate DV Done
3,131,453 UART: [fht] FMC Alias Private Key: 7
3,132,391 UART: [art] Derive CDI
3,132,671 UART: [art] Store in in slot 0x4
3,218,488 UART: [art] Derive Key Pair
3,218,848 UART: [art] Store priv key in slot 0x5
3,232,392 UART: [art] Derive Key Pair - Done
3,247,218 UART: [art] Signing Cert with AUTHO
3,247,698 UART: RITY.KEYID = 7
3,263,000 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,765 UART: [art] PUB.X = 997AA6B43CE40B81D2B83392BB4859DF01B36FBDF959FF626749473BE06C4469BECF3446AB1D2651E7EB101487E4C029
3,270,535 UART: [art] PUB.Y = AC2C32B2C434D8BDF8CB152E61D6C3FCD7C836F310DE780AD64CB6FF87920F1A66CC4BF2C35D97AEDCE1FEE4BF706B98
3,277,509 UART: [art] SIG.R = 968E8DFF5F5204870A5715B04439468521353E4AFD286F8297882C7DFA06AB17C9EC43DD0833F1F9976F375707DF67B1
3,284,260 UART: [art] SIG.S = DDCDB17725516D5D9AE91698BE7709523F79E3E4EBF32DA6DADC048FE4E06B7F8BED37F9F94207DAE30032981B75EA2B
3,308,298 UART: Caliptra RT
3,308,551 UART: [state] CFI Enabled
3,416,993 UART: [rt] RT listening for mailbox commands...
3,417,656 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,667 UART: [rt]cmd =0x46504c54, len=4
3,448,859 >>> mbox cmd response data (8 bytes)
3,449,198 UART: [rt] FIPS self test
3,449,526 UART: [kat] ++
3,449,678 UART: [kat] sha1
3,453,944 UART: [kat] SHA2-256
3,454,562 UART: Fatal Error: 0x90010001
3,456,101 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,456,106 >>> mbox cmd response: failed
3,456,106 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,456,111 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,243 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,062 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,891 UART: [state] LifecycleState = Unprovisioned
85,546 UART: [state] DebugLocked = No
86,090 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,800 UART: [kat] SHA2-256
881,731 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,846 UART: [kat] ++
885,998 UART: [kat] sha1
890,110 UART: [kat] SHA2-256
892,048 UART: [kat] SHA2-384
894,847 UART: [kat] SHA2-512-ACC
896,748 UART: [kat] ECC-384
902,103 UART: [kat] HMAC-384Kdf
906,677 UART: [kat] LMS
1,474,873 UART: [kat] --
1,475,554 UART: [cold-reset] ++
1,475,968 UART: [fht] Storing FHT @ 0x50003400
1,478,629 UART: [idev] ++
1,478,797 UART: [idev] CDI.KEYID = 6
1,479,157 UART: [idev] SUBJECT.KEYID = 7
1,479,581 UART: [idev] UDS.KEYID = 0
1,479,926 ready_for_fw is high
1,479,926 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,487,801 UART: [idev] Erasing UDS.KEYID = 0
1,504,907 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,455 UART: [idev] --
1,514,410 UART: [ldev] ++
1,514,578 UART: [ldev] CDI.KEYID = 6
1,514,941 UART: [ldev] SUBJECT.KEYID = 5
1,515,367 UART: [ldev] AUTHORITY.KEYID = 7
1,515,830 UART: [ldev] FE.KEYID = 1
1,521,164 UART: [ldev] Erasing FE.KEYID = 1
1,546,131 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,951 UART: [ldev] --
1,585,382 UART: [fwproc] Waiting for Commands...
1,586,163 UART: [fwproc] Received command 0x46574c44
1,586,954 UART: [fwproc] Received Image of size 115196 bytes
2,895,514 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,994 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,346 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,627 >>> mbox cmd response: success
3,090,635 UART: [afmc] ++
3,090,803 UART: [afmc] CDI.KEYID = 6
3,091,165 UART: [afmc] SUBJECT.KEYID = 7
3,091,590 UART: [afmc] AUTHORITY.KEYID = 5
3,127,009 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,103 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,883 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,611 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,496 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,186 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,295 UART: [afmc] --
3,170,373 UART: [cold-reset] --
3,171,155 UART: [state] Locking Datavault
3,172,316 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,920 UART: [state] Locking ICCM
3,173,564 UART: [exit] Launching FMC @ 0x40000130
3,178,893 UART:
3,178,909 UART: Running Caliptra FMC ...
3,179,317 UART:
3,179,460 UART: [state] CFI Enabled
3,190,099 UART: [fht] FMC Alias Private Key: 7
3,298,746 UART: [art] Extend RT PCRs Done
3,299,174 UART: [art] Lock RT PCRs Done
3,300,664 UART: [art] Populate DV Done
3,308,921 UART: [fht] FMC Alias Private Key: 7
3,310,055 UART: [art] Derive CDI
3,310,335 UART: [art] Store in in slot 0x4
3,395,454 UART: [art] Derive Key Pair
3,395,814 UART: [art] Store priv key in slot 0x5
3,409,640 UART: [art] Derive Key Pair - Done
3,424,630 UART: [art] Signing Cert with AUTHO
3,425,110 UART: RITY.KEYID = 7
3,439,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,737 UART: [art] PUB.X = 4F507D21EE66296DB0ADE516CBB404F61396042A28256AEF99AE75A213F4EEC46BA1DF66F368ABBAD1B548890730B1F5
3,447,510 UART: [art] PUB.Y = C0A2A52D3A045EA0A17D2159B35EE2A319420A3E0E6C4D1B516A2F31CB424C2D2065B13C7907D72031D0F5295AABB5BC
3,454,458 UART: [art] SIG.R = 430A931197D6930C9127D1673FA92B900C4F934059A2FE5BEFD7B88B39A06BA7A81D0E8C6E1CE4BB17253441DB5905AB
3,461,219 UART: [art] SIG.S = 0A479D6D372941409628A8A79D1BB3299C8345BCF02E768211FDC41F44D019D2190EF712DC6DE82F86F3607A768A4F0B
3,484,517 UART: Caliptra RT
3,484,862 UART: [state] CFI Enabled
3,594,134 UART: [rt] RT listening for mailbox commands...
3,594,797 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,762 UART: [rt]cmd =0x46504c54, len=4
3,625,840 >>> mbox cmd response data (8 bytes)
3,626,161 UART: [rt] FIPS self test
3,626,489 UART: [kat] ++
3,626,641 UART: [kat] sha1
3,630,987 UART: [kat] SHA2-256
3,631,393 UART: Fatal Error: 0x90010001
3,632,932 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,632,937 >>> mbox cmd response: failed
3,632,937 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,632,942 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,532 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,240 UART: [kat] SHA2-256
882,171 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,286 UART: [kat] ++
886,438 UART: [kat] sha1
890,572 UART: [kat] SHA2-256
892,510 UART: [kat] SHA2-384
895,287 UART: [kat] SHA2-512-ACC
897,188 UART: [kat] ECC-384
903,187 UART: [kat] HMAC-384Kdf
907,921 UART: [kat] LMS
1,476,117 UART: [kat] --
1,477,024 UART: [cold-reset] ++
1,477,512 UART: [fht] Storing FHT @ 0x50003400
1,480,171 UART: [idev] ++
1,480,339 UART: [idev] CDI.KEYID = 6
1,480,699 UART: [idev] SUBJECT.KEYID = 7
1,481,123 UART: [idev] UDS.KEYID = 0
1,481,468 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,943 UART: [idev] Erasing UDS.KEYID = 0
1,505,979 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,539 UART: [idev] --
1,515,550 UART: [ldev] ++
1,515,718 UART: [ldev] CDI.KEYID = 6
1,516,081 UART: [ldev] SUBJECT.KEYID = 5
1,516,507 UART: [ldev] AUTHORITY.KEYID = 7
1,516,970 UART: [ldev] FE.KEYID = 1
1,522,398 UART: [ldev] Erasing FE.KEYID = 1
1,547,245 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,267 UART: [ldev] --
1,586,766 UART: [fwproc] Waiting for Commands...
1,587,521 UART: [fwproc] Received command 0x46574c44
1,588,312 UART: [fwproc] Received Image of size 115196 bytes
2,896,918 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,570 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,922 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,091,185 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,130 ready_for_fw is high
1,363,130 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,195 >>> mbox cmd response: success
3,002,319 UART:
3,002,335 UART: Running Caliptra FMC ...
3,002,743 UART:
3,002,886 UART: [state] CFI Enabled
3,013,403 UART: [fht] FMC Alias Private Key: 7
3,121,410 UART: [art] Extend RT PCRs Done
3,121,838 UART: [art] Lock RT PCRs Done
3,123,290 UART: [art] Populate DV Done
3,131,509 UART: [fht] FMC Alias Private Key: 7
3,132,621 UART: [art] Derive CDI
3,132,901 UART: [art] Store in in slot 0x4
3,218,252 UART: [art] Derive Key Pair
3,218,612 UART: [art] Store priv key in slot 0x5
3,231,730 UART: [art] Derive Key Pair - Done
3,246,222 UART: [art] Signing Cert with AUTHO
3,246,702 UART: RITY.KEYID = 7
3,261,586 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,351 UART: [art] PUB.X = 6C84D7E745F5B9823704FA7CD4FF7A366C7D654B8997965AC03D12FEC91204C8C014F89ADFFD9979AC200932FB9F5FB1
3,269,122 UART: [art] PUB.Y = 08F67A55C544AA1C0D284A9CFCF3E60C872A9D11B652E06C6DAA8B87F4CDD11D3BEA04B812C05BF24F25D6461046F66C
3,276,076 UART: [art] SIG.R = 77FD0E2D03AB9DAEB406E9816CCA4F2BEBEBFDE3E3DD76D336F305DB03265C958C3D44A1CD9AB47D0CE4AA9F687A6234
3,282,856 UART: [art] SIG.S = 03747DA13002B094A974C9E13B032C51AB34EC77C54F66E8F50587EC96CF714950E3442E8C527AD594C3ECB018922BEC
3,306,467 UART: Caliptra RT
3,306,812 UART: [state] CFI Enabled
3,415,154 UART: [rt] RT listening for mailbox commands...
3,415,817 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,600 UART: [rt]cmd =0x46504c54, len=4
3,446,762 >>> mbox cmd response data (8 bytes)
3,447,067 UART: [rt] FIPS self test
3,447,395 UART: [kat] ++
3,447,547 UART: [kat] sha1
3,451,775 UART: [kat] SHA2-256
3,452,229 UART: Fatal Error: 0x90010001
3,453,768 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,453,773 >>> mbox cmd response: failed
3,453,773 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,453,778 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,088 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,633 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,354 UART: [kat] SHA2-256
893,004 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,129 UART: [kat] ++
897,281 UART: [kat] sha1
901,521 UART: [kat] SHA2-256
903,461 UART: [kat] SHA2-384
906,156 UART: [kat] SHA2-512-ACC
908,057 UART: [kat] ECC-384
918,304 UART: [kat] HMAC-384Kdf
922,860 UART: [kat] LMS
1,171,188 UART: [kat] --
1,172,283 UART: [cold-reset] ++
1,172,807 UART: [fht] FHT @ 0x50003400
1,175,310 UART: [idev] ++
1,175,478 UART: [idev] CDI.KEYID = 6
1,175,838 UART: [idev] SUBJECT.KEYID = 7
1,176,262 UART: [idev] UDS.KEYID = 0
1,176,607 ready_for_fw is high
1,176,607 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,278 UART: [idev] Erasing UDS.KEYID = 0
1,201,731 UART: [idev] Sha1 KeyId Algorithm
1,210,235 UART: [idev] --
1,211,109 UART: [ldev] ++
1,211,277 UART: [ldev] CDI.KEYID = 6
1,211,640 UART: [ldev] SUBJECT.KEYID = 5
1,212,066 UART: [ldev] AUTHORITY.KEYID = 7
1,212,529 UART: [ldev] FE.KEYID = 1
1,217,595 UART: [ldev] Erasing FE.KEYID = 1
1,243,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,289 UART: [ldev] --
1,282,740 UART: [fwproc] Wait for Commands...
1,283,372 UART: [fwproc] Recv command 0x46574c44
1,284,100 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,312 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,616 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,853 >>> mbox cmd response: success
2,788,987 UART: [afmc] ++
2,789,155 UART: [afmc] CDI.KEYID = 6
2,789,517 UART: [afmc] SUBJECT.KEYID = 7
2,789,942 UART: [afmc] AUTHORITY.KEYID = 5
2,825,633 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,804 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,552 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,280 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,165 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,884 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,722 UART: [afmc] --
2,868,796 UART: [cold-reset] --
2,869,764 UART: [state] Locking Datavault
2,870,755 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,359 UART: [state] Locking ICCM
2,872,011 UART: [exit] Launching FMC @ 0x40000130
2,877,340 UART:
2,877,356 UART: Running Caliptra FMC ...
2,877,764 UART:
2,877,818 UART: [state] CFI Enabled
2,888,303 UART: [fht] FMC Alias Private Key: 7
2,996,460 UART: [art] Extend RT PCRs Done
2,996,888 UART: [art] Lock RT PCRs Done
2,998,400 UART: [art] Populate DV Done
3,006,749 UART: [fht] FMC Alias Private Key: 7
3,007,849 UART: [art] Derive CDI
3,008,129 UART: [art] Store in in slot 0x4
3,094,104 UART: [art] Derive Key Pair
3,094,464 UART: [art] Store priv key in slot 0x5
3,107,778 UART: [art] Derive Key Pair - Done
3,122,784 UART: [art] Signing Cert with AUTHO
3,123,264 UART: RITY.KEYID = 7
3,138,708 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,473 UART: [art] PUB.X = 01C7E2CAFD53BBBFAB946314FAEDE3A05A1D297FA7F96CEE0693A1B00A0B49ECC39FA047C383DC00B9EA07F7324A056B
3,146,229 UART: [art] PUB.Y = 3E84120DBD42489467D8770D12CE004377FB86E9ECDA7DE45F0B0FAC46A99EB070A8242306871956B3B75BD73996CF32
3,153,144 UART: [art] SIG.R = 16EBC9DB832475DB795F3F55182995DC0B53B5E7D66F90A3849EA262F370D19FC953325DC90562A8CC2606FA8D59E85F
3,159,909 UART: [art] SIG.S = 9A445F251179674DB561486CC864E5131F58C75EB7C27FB6C5AF6F93225A0CCB8DBC782894E6A5676BF1F256E9F694AF
3,183,781 UART: Caliptra RT
3,184,034 UART: [state] CFI Enabled
3,292,389 UART: [rt] RT listening for mailbox commands...
3,293,052 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,039 UART: [rt]cmd =0x46504c54, len=4
3,324,205 >>> mbox cmd response data (8 bytes)
3,324,390 UART: [rt] FIPS self test
3,324,718 UART: [kat] ++
3,324,870 UART: [kat] sha1
3,329,020 UART: [kat] SHA2-256
3,329,406 UART: Fatal Error: 0x90010001
3,330,945 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,330,950 >>> mbox cmd response: failed
3,330,950 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,330,955 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,873 UART: [state] WD Timer not started. Device not locked for debugging
88,184 UART: [kat] SHA2-256
893,834 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,959 UART: [kat] ++
898,111 UART: [kat] sha1
902,139 UART: [kat] SHA2-256
904,079 UART: [kat] SHA2-384
907,044 UART: [kat] SHA2-512-ACC
908,945 UART: [kat] ECC-384
918,164 UART: [kat] HMAC-384Kdf
922,614 UART: [kat] LMS
1,170,942 UART: [kat] --
1,171,969 UART: [cold-reset] ++
1,172,455 UART: [fht] FHT @ 0x50003400
1,175,030 UART: [idev] ++
1,175,198 UART: [idev] CDI.KEYID = 6
1,175,558 UART: [idev] SUBJECT.KEYID = 7
1,175,982 UART: [idev] UDS.KEYID = 0
1,176,327 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,822 UART: [idev] Erasing UDS.KEYID = 0
1,201,413 UART: [idev] Sha1 KeyId Algorithm
1,209,731 UART: [idev] --
1,210,801 UART: [ldev] ++
1,210,969 UART: [ldev] CDI.KEYID = 6
1,211,332 UART: [ldev] SUBJECT.KEYID = 5
1,211,758 UART: [ldev] AUTHORITY.KEYID = 7
1,212,221 UART: [ldev] FE.KEYID = 1
1,217,511 UART: [ldev] Erasing FE.KEYID = 1
1,243,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,107 UART: [ldev] --
1,283,608 UART: [fwproc] Wait for Commands...
1,284,182 UART: [fwproc] Recv command 0x46574c44
1,284,910 UART: [fwproc] Recv'd Img size: 115196 bytes
2,594,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,896 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,200 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,321 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,181 ready_for_fw is high
1,060,181 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,398 >>> mbox cmd response: success
2,699,564 UART:
2,699,580 UART: Running Caliptra FMC ...
2,699,988 UART:
2,700,042 UART: [state] CFI Enabled
2,710,203 UART: [fht] FMC Alias Private Key: 7
2,817,574 UART: [art] Extend RT PCRs Done
2,818,002 UART: [art] Lock RT PCRs Done
2,819,466 UART: [art] Populate DV Done
2,827,481 UART: [fht] FMC Alias Private Key: 7
2,828,493 UART: [art] Derive CDI
2,828,773 UART: [art] Store in in slot 0x4
2,914,580 UART: [art] Derive Key Pair
2,914,940 UART: [art] Store priv key in slot 0x5
2,927,646 UART: [art] Derive Key Pair - Done
2,942,396 UART: [art] Signing Cert with AUTHO
2,942,876 UART: RITY.KEYID = 7
2,958,588 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,353 UART: [art] PUB.X = 8AEF1A65593CE340DCA4D0F4A19B9E9A454D738AF717174F01A1FE46DB2C6C891C2EB87066CD76636FE856FC2F79595F
2,966,132 UART: [art] PUB.Y = 228BD65B8A71DE2AABD33DF6660F3A68AA5842E0EDAC4C10A12069B778AF4F08FE93BB56A2F8D3E88B0112112B5C664A
2,973,089 UART: [art] SIG.R = 7FAE61C8427F151557A4D0B89A727CFFFA0A104CB83470CDDC25A6AF7287506B0B55087FFDFF35BA53433C8AAE7ACCCC
2,979,872 UART: [art] SIG.S = 48709C442F9EB74C862E8467063B1EECE53A17A54B1361850399F43EB99F7DEF60411BE3122E0B59E746F4F21D78E0D0
3,003,588 UART: Caliptra RT
3,003,841 UART: [state] CFI Enabled
3,111,910 UART: [rt] RT listening for mailbox commands...
3,112,573 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,302 UART: [rt]cmd =0x46504c54, len=4
3,143,620 >>> mbox cmd response data (8 bytes)
3,143,879 UART: [rt] FIPS self test
3,144,207 UART: [kat] ++
3,144,359 UART: [kat] sha1
3,148,445 UART: [kat] SHA2-256
3,148,823 UART: Fatal Error: 0x90010001
3,150,362 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,150,367 >>> mbox cmd response: failed
3,150,367 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,150,372 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,131 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,362 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,608 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
893,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,564 UART: [kat] ++
897,716 UART: [kat] sha1
901,802 UART: [kat] SHA2-256
903,742 UART: [kat] SHA2-384
906,461 UART: [kat] SHA2-512-ACC
908,362 UART: [kat] ECC-384
918,235 UART: [kat] HMAC-384Kdf
922,813 UART: [kat] LMS
1,171,141 UART: [kat] --
1,172,186 UART: [cold-reset] ++
1,172,684 UART: [fht] FHT @ 0x50003400
1,175,289 UART: [idev] ++
1,175,457 UART: [idev] CDI.KEYID = 6
1,175,817 UART: [idev] SUBJECT.KEYID = 7
1,176,241 UART: [idev] UDS.KEYID = 0
1,176,586 ready_for_fw is high
1,176,586 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,171 UART: [idev] Erasing UDS.KEYID = 0
1,201,166 UART: [idev] Sha1 KeyId Algorithm
1,209,648 UART: [idev] --
1,210,622 UART: [ldev] ++
1,210,790 UART: [ldev] CDI.KEYID = 6
1,211,153 UART: [ldev] SUBJECT.KEYID = 5
1,211,579 UART: [ldev] AUTHORITY.KEYID = 7
1,212,042 UART: [ldev] FE.KEYID = 1
1,217,330 UART: [ldev] Erasing FE.KEYID = 1
1,243,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,240 UART: [ldev] --
1,282,653 UART: [fwproc] Wait for Commands...
1,283,363 UART: [fwproc] Recv command 0x46574c44
1,284,091 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,557 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,861 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,006 >>> mbox cmd response: success
2,786,084 UART: [afmc] ++
2,786,252 UART: [afmc] CDI.KEYID = 6
2,786,614 UART: [afmc] SUBJECT.KEYID = 7
2,787,039 UART: [afmc] AUTHORITY.KEYID = 5
2,822,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,459 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,207 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,935 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,820 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,539 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,567 UART: [afmc] --
2,866,687 UART: [cold-reset] --
2,867,679 UART: [state] Locking Datavault
2,868,812 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,416 UART: [state] Locking ICCM
2,869,988 UART: [exit] Launching FMC @ 0x40000130
2,875,317 UART:
2,875,333 UART: Running Caliptra FMC ...
2,875,741 UART:
2,875,884 UART: [state] CFI Enabled
2,886,741 UART: [fht] FMC Alias Private Key: 7
2,994,604 UART: [art] Extend RT PCRs Done
2,995,032 UART: [art] Lock RT PCRs Done
2,996,294 UART: [art] Populate DV Done
3,004,331 UART: [fht] FMC Alias Private Key: 7
3,005,495 UART: [art] Derive CDI
3,005,775 UART: [art] Store in in slot 0x4
3,091,378 UART: [art] Derive Key Pair
3,091,738 UART: [art] Store priv key in slot 0x5
3,104,618 UART: [art] Derive Key Pair - Done
3,119,550 UART: [art] Signing Cert with AUTHO
3,120,030 UART: RITY.KEYID = 7
3,135,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,935 UART: [art] PUB.X = 7873F40604951688AD0D37C1280566259EF154C75D3EBC3879897982EF4424F66C145A24571422BC7E8564E6E8A1A7AA
3,142,683 UART: [art] PUB.Y = 94FDB4E26F918F33893A2DBF1F00C3602FAD5266E0D0564EE575A8260FA4652D82779D86DBEB8F8BE0E49601FB51A809
3,149,610 UART: [art] SIG.R = 3E12490B841DD984FD0B36BE27BC38C9411E6625EF1B53CF84DD5D2D93EE4959790B573FF1A507F55E178C5D40A6F636
3,156,374 UART: [art] SIG.S = 8E516B1DA29BC6D483CF2A0FCBA194AC439498DC5914DC3BBD8192633A48EAACF492B557DCEA6A88EDEC393ADD60FBA4
3,180,222 UART: Caliptra RT
3,180,567 UART: [state] CFI Enabled
3,288,552 UART: [rt] RT listening for mailbox commands...
3,289,215 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,858 UART: [rt]cmd =0x46504c54, len=4
3,319,958 >>> mbox cmd response data (8 bytes)
3,320,297 UART: [rt] FIPS self test
3,320,625 UART: [kat] ++
3,320,777 UART: [kat] sha1
3,324,979 UART: [kat] SHA2-256
3,325,461 UART: Fatal Error: 0x90010001
3,327,000 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,327,005 >>> mbox cmd response: failed
3,327,005 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,327,010 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,910 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
893,845 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,970 UART: [kat] ++
898,122 UART: [kat] sha1
902,198 UART: [kat] SHA2-256
904,138 UART: [kat] SHA2-384
906,855 UART: [kat] SHA2-512-ACC
908,756 UART: [kat] ECC-384
918,629 UART: [kat] HMAC-384Kdf
923,277 UART: [kat] LMS
1,171,605 UART: [kat] --
1,172,422 UART: [cold-reset] ++
1,172,868 UART: [fht] FHT @ 0x50003400
1,175,361 UART: [idev] ++
1,175,529 UART: [idev] CDI.KEYID = 6
1,175,889 UART: [idev] SUBJECT.KEYID = 7
1,176,313 UART: [idev] UDS.KEYID = 0
1,176,658 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,119 UART: [idev] Erasing UDS.KEYID = 0
1,201,234 UART: [idev] Sha1 KeyId Algorithm
1,209,678 UART: [idev] --
1,210,704 UART: [ldev] ++
1,210,872 UART: [ldev] CDI.KEYID = 6
1,211,235 UART: [ldev] SUBJECT.KEYID = 5
1,211,661 UART: [ldev] AUTHORITY.KEYID = 7
1,212,124 UART: [ldev] FE.KEYID = 1
1,217,508 UART: [ldev] Erasing FE.KEYID = 1
1,244,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,918 UART: [ldev] --
1,283,327 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,861 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,840 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,233 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,537 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,548 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,212 ready_for_fw is high
1,060,212 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,636,793 >>> mbox cmd response: success
2,699,817 UART:
2,699,833 UART: Running Caliptra FMC ...
2,700,241 UART:
2,700,384 UART: [state] CFI Enabled
2,710,909 UART: [fht] FMC Alias Private Key: 7
2,818,794 UART: [art] Extend RT PCRs Done
2,819,222 UART: [art] Lock RT PCRs Done
2,820,624 UART: [art] Populate DV Done
2,828,935 UART: [fht] FMC Alias Private Key: 7
2,829,879 UART: [art] Derive CDI
2,830,159 UART: [art] Store in in slot 0x4
2,915,490 UART: [art] Derive Key Pair
2,915,850 UART: [art] Store priv key in slot 0x5
2,929,122 UART: [art] Derive Key Pair - Done
2,944,225 UART: [art] Signing Cert with AUTHO
2,944,705 UART: RITY.KEYID = 7
2,959,715 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,480 UART: [art] PUB.X = FFA9DBCE895341B06B504AF841F04D3D77592D06E3CFB9C4FB0BD4277F668D89DE98DDF78CF7D6CAB89F94382CDAC80C
2,967,265 UART: [art] PUB.Y = 56ABE9737A56BA7E533A542939E7C5BC3D75EC68FD0EE27A91BAA23C7D275E60A3A3ECD7102E6927F9FEE7780E4F0531
2,974,220 UART: [art] SIG.R = 3D04B8202624CC3BEB93B5E43FEAB968612D635026643C65CD01C39EDC9314A49D979C55D7BFBE881471E9C2C511F2D2
2,980,990 UART: [art] SIG.S = 581B39678F90BCA9417521C3A68D377A23E64C3038C99CA6762CEBB05E4768B93D37514EE51331F323CE2C42764763A4
3,004,113 UART: Caliptra RT
3,004,458 UART: [state] CFI Enabled
3,113,063 UART: [rt] RT listening for mailbox commands...
3,113,726 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,533 UART: [rt]cmd =0x46504c54, len=4
3,144,489 >>> mbox cmd response data (8 bytes)
3,144,830 UART: [rt] FIPS self test
3,145,158 UART: [kat] ++
3,145,310 UART: [kat] sha1
3,149,354 UART: [kat] SHA2-256
3,149,782 UART: Fatal Error: 0x90010001
3,151,321 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,151,326 >>> mbox cmd response: failed
3,151,326 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,151,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,460 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,636,557 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
88,016 UART: [kat] SHA2-256
891,566 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,695 UART: [kat] ++
895,847 UART: [kat] sha1
900,071 UART: [kat] SHA2-256
902,011 UART: [kat] SHA2-384
904,600 UART: [kat] SHA2-512-ACC
906,501 UART: [kat] ECC-384
916,116 UART: [kat] HMAC-384Kdf
920,628 UART: [kat] LMS
1,168,940 UART: [kat] --
1,170,065 UART: [cold-reset] ++
1,170,583 UART: [fht] FHT @ 0x50003400
1,173,207 UART: [idev] ++
1,173,375 UART: [idev] CDI.KEYID = 6
1,173,736 UART: [idev] SUBJECT.KEYID = 7
1,174,161 UART: [idev] UDS.KEYID = 0
1,174,507 ready_for_fw is high
1,174,507 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,065 UART: [idev] Erasing UDS.KEYID = 0
1,199,331 UART: [idev] Sha1 KeyId Algorithm
1,208,255 UART: [idev] --
1,209,422 UART: [ldev] ++
1,209,590 UART: [ldev] CDI.KEYID = 6
1,209,954 UART: [ldev] SUBJECT.KEYID = 5
1,210,381 UART: [ldev] AUTHORITY.KEYID = 7
1,210,844 UART: [ldev] FE.KEYID = 1
1,216,242 UART: [ldev] Erasing FE.KEYID = 1
1,242,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,038 UART: [ldev] --
1,281,376 UART: [fwproc] Wait for Commands...
1,282,197 UART: [fwproc] Recv command 0x46574c44
1,282,930 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,342 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,651 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,747 >>> mbox cmd response: success
2,784,878 UART: [afmc] ++
2,785,046 UART: [afmc] CDI.KEYID = 6
2,785,409 UART: [afmc] SUBJECT.KEYID = 7
2,785,835 UART: [afmc] AUTHORITY.KEYID = 5
2,821,226 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,706 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,457 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,186 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,069 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,788 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,669 UART: [afmc] --
2,864,761 UART: [cold-reset] --
2,865,597 UART: [state] Locking Datavault
2,866,658 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,262 UART: [state] Locking ICCM
2,867,838 UART: [exit] Launching FMC @ 0x40000130
2,873,167 UART:
2,873,183 UART: Running Caliptra FMC ...
2,873,591 UART:
2,873,645 UART: [state] CFI Enabled
2,884,140 UART: [fht] FMC Alias Private Key: 7
2,992,155 UART: [art] Extend RT PCRs Done
2,992,583 UART: [art] Lock RT PCRs Done
2,993,981 UART: [art] Populate DV Done
3,002,196 UART: [fht] FMC Alias Private Key: 7
3,003,168 UART: [art] Derive CDI
3,003,448 UART: [art] Store in in slot 0x4
3,089,097 UART: [art] Derive Key Pair
3,089,457 UART: [art] Store priv key in slot 0x5
3,102,793 UART: [art] Derive Key Pair - Done
3,117,494 UART: [art] Signing Cert with AUTHO
3,117,974 UART: RITY.KEYID = 7
3,132,662 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,427 UART: [art] PUB.X = 203AA2D75D7DC85CF1A14B831D0B59256252F75C0E708DD3EBDC07D5C647F9373191C87FE04E3038F2621AA5A3B08061
3,140,192 UART: [art] PUB.Y = 74E9B9A3FA3AD581C209A8627EC1390C705EC8B35AA7A2712D60D2EF4F307C4EFDB0B1D3841F91F562896C2720C9535D
3,147,144 UART: [art] SIG.R = C6BB348030D12DF322CA3A6780807C8DB435381C170DE932316C6670AFC52CAC655A7D22842ACC22F6A0DAAA20657ACD
3,153,921 UART: [art] SIG.S = 4D8BEF0321FCDA9821C2BC93586E4EDBF5B4FB32A1A445F150B292B46FE94C7C40C418ADF04A28272555D1338454D867
3,176,943 UART: Caliptra RT
3,177,196 UART: [state] CFI Enabled
3,284,587 UART: [rt] RT listening for mailbox commands...
3,285,250 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,859 UART: [rt]cmd =0x46504c54, len=4
3,315,887 >>> mbox cmd response data (8 bytes)
3,316,070 UART: [rt] FIPS self test
3,316,398 UART: [kat] ++
3,316,550 UART: [kat] sha1
3,320,958 UART: [kat] SHA2-256
3,321,574 UART: Fatal Error: 0x90010001
3,323,113 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,323,118 >>> mbox cmd response: failed
3,323,118 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,323,123 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,795 UART: [state] WD Timer not started. Device not locked for debugging
88,026 UART: [kat] SHA2-256
891,576 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,705 UART: [kat] ++
895,857 UART: [kat] sha1
900,015 UART: [kat] SHA2-256
901,955 UART: [kat] SHA2-384
904,686 UART: [kat] SHA2-512-ACC
906,587 UART: [kat] ECC-384
916,210 UART: [kat] HMAC-384Kdf
920,982 UART: [kat] LMS
1,169,294 UART: [kat] --
1,170,375 UART: [cold-reset] ++
1,170,741 UART: [fht] FHT @ 0x50003400
1,173,441 UART: [idev] ++
1,173,609 UART: [idev] CDI.KEYID = 6
1,173,970 UART: [idev] SUBJECT.KEYID = 7
1,174,395 UART: [idev] UDS.KEYID = 0
1,174,741 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,071 UART: [idev] Erasing UDS.KEYID = 0
1,199,487 UART: [idev] Sha1 KeyId Algorithm
1,208,423 UART: [idev] --
1,209,366 UART: [ldev] ++
1,209,534 UART: [ldev] CDI.KEYID = 6
1,209,898 UART: [ldev] SUBJECT.KEYID = 5
1,210,325 UART: [ldev] AUTHORITY.KEYID = 7
1,210,788 UART: [ldev] FE.KEYID = 1
1,215,904 UART: [ldev] Erasing FE.KEYID = 1
1,242,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,280 UART: [ldev] --
1,281,626 UART: [fwproc] Wait for Commands...
1,282,403 UART: [fwproc] Recv command 0x46574c44
1,283,136 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,173 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,381 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,998 ready_for_fw is high
1,055,998 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,425 >>> mbox cmd response: success
2,695,947 UART:
2,695,963 UART: Running Caliptra FMC ...
2,696,371 UART:
2,696,425 UART: [state] CFI Enabled
2,707,210 UART: [fht] FMC Alias Private Key: 7
2,815,483 UART: [art] Extend RT PCRs Done
2,815,911 UART: [art] Lock RT PCRs Done
2,817,691 UART: [art] Populate DV Done
2,825,966 UART: [fht] FMC Alias Private Key: 7
2,827,038 UART: [art] Derive CDI
2,827,318 UART: [art] Store in in slot 0x4
2,913,269 UART: [art] Derive Key Pair
2,913,629 UART: [art] Store priv key in slot 0x5
2,926,823 UART: [art] Derive Key Pair - Done
2,941,573 UART: [art] Signing Cert with AUTHO
2,942,053 UART: RITY.KEYID = 7
2,957,357 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,122 UART: [art] PUB.X = BA1A44D043A26E6BDB53AA2B15E686A5571AF3CA357DAD000A94D2FDDF866941669DB2BA251C4F7697ADD4B353E048AB
2,964,885 UART: [art] PUB.Y = 7386EBC562D64D9F848374BE11BBE1C8B2623784BDE2CB60794AB03DD32DB978A7A96FA365BD7A2CE85BF2812D7CDEB3
2,971,853 UART: [art] SIG.R = D7167C2E989D1173238FB615590E2F8D9E92C43DC478366FF5589552C91C002AACD1E215DB9F874989E9A1219557DF08
2,978,591 UART: [art] SIG.S = 661AFA00784545B112AA8C594B7D75AA80F57A7FF626F45773994A9125BB5A976984EA371B88E5A46782D244F04044F5
3,002,868 UART: Caliptra RT
3,003,121 UART: [state] CFI Enabled
3,110,730 UART: [rt] RT listening for mailbox commands...
3,111,393 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,424 UART: [rt]cmd =0x46504c54, len=4
3,142,734 >>> mbox cmd response data (8 bytes)
3,143,049 UART: [rt] FIPS self test
3,143,377 UART: [kat] ++
3,143,529 UART: [kat] sha1
3,147,787 UART: [kat] SHA2-256
3,148,275 UART: Fatal Error: 0x90010001
3,149,814 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,149,819 >>> mbox cmd response: failed
3,149,819 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,149,824 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,950 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,631 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
900,144 UART: [kat] SHA2-256
902,084 UART: [kat] SHA2-384
904,805 UART: [kat] SHA2-512-ACC
906,706 UART: [kat] ECC-384
916,553 UART: [kat] HMAC-384Kdf
921,225 UART: [kat] LMS
1,169,537 UART: [kat] --
1,170,650 UART: [cold-reset] ++
1,170,980 UART: [fht] FHT @ 0x50003400
1,173,712 UART: [idev] ++
1,173,880 UART: [idev] CDI.KEYID = 6
1,174,241 UART: [idev] SUBJECT.KEYID = 7
1,174,666 UART: [idev] UDS.KEYID = 0
1,175,012 ready_for_fw is high
1,175,012 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,492 UART: [idev] Erasing UDS.KEYID = 0
1,199,624 UART: [idev] Sha1 KeyId Algorithm
1,208,562 UART: [idev] --
1,209,829 UART: [ldev] ++
1,209,997 UART: [ldev] CDI.KEYID = 6
1,210,361 UART: [ldev] SUBJECT.KEYID = 5
1,210,788 UART: [ldev] AUTHORITY.KEYID = 7
1,211,251 UART: [ldev] FE.KEYID = 1
1,216,395 UART: [ldev] Erasing FE.KEYID = 1
1,242,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,555 UART: [ldev] --
1,281,945 UART: [fwproc] Wait for Commands...
1,282,680 UART: [fwproc] Recv command 0x46574c44
1,283,413 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,289 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,981 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,290 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,456 >>> mbox cmd response: success
2,784,639 UART: [afmc] ++
2,784,807 UART: [afmc] CDI.KEYID = 6
2,785,170 UART: [afmc] SUBJECT.KEYID = 7
2,785,596 UART: [afmc] AUTHORITY.KEYID = 5
2,821,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,853 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,604 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,333 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,216 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,935 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,906 UART: [afmc] --
2,865,010 UART: [cold-reset] --
2,866,060 UART: [state] Locking Datavault
2,867,339 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,943 UART: [state] Locking ICCM
2,868,373 UART: [exit] Launching FMC @ 0x40000130
2,873,702 UART:
2,873,718 UART: Running Caliptra FMC ...
2,874,126 UART:
2,874,269 UART: [state] CFI Enabled
2,884,752 UART: [fht] FMC Alias Private Key: 7
2,993,233 UART: [art] Extend RT PCRs Done
2,993,661 UART: [art] Lock RT PCRs Done
2,995,151 UART: [art] Populate DV Done
3,003,272 UART: [fht] FMC Alias Private Key: 7
3,004,252 UART: [art] Derive CDI
3,004,532 UART: [art] Store in in slot 0x4
3,089,911 UART: [art] Derive Key Pair
3,090,271 UART: [art] Store priv key in slot 0x5
3,103,093 UART: [art] Derive Key Pair - Done
3,118,030 UART: [art] Signing Cert with AUTHO
3,118,510 UART: RITY.KEYID = 7
3,133,928 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,693 UART: [art] PUB.X = 769C0FF24F565E8E47D4C77DA0EF10EB1671BD35AE13B2024DF457666301AAE873D16E414B8387F73A1E298113AEB92A
3,141,460 UART: [art] PUB.Y = F943722C243B24B1498BCEA4E3B49F843AA0B0F1AB8F042AEBB92D2E86EFA3D4CD867517432C5F2A6DA211912D0AF78D
3,148,420 UART: [art] SIG.R = 3C5B4B7DF960D3C4C9C6C1D3DC9456EE8B773804BE2B450F88DB0465BF2A8D91D922D4B0465E8D863C7AEAE17B0F1B79
3,155,194 UART: [art] SIG.S = 53F5DC046F09AF06AFA9612FF9547B1A9C56B86B5F504D541F50E3F2E40A179C905867A328509F4BB3E51673D8519683
3,178,775 UART: Caliptra RT
3,179,120 UART: [state] CFI Enabled
3,287,293 UART: [rt] RT listening for mailbox commands...
3,287,956 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,845 UART: [rt]cmd =0x46504c54, len=4
3,319,003 >>> mbox cmd response data (8 bytes)
3,319,124 UART: [rt] FIPS self test
3,319,452 UART: [kat] ++
3,319,604 UART: [kat] sha1
3,323,626 UART: [kat] SHA2-256
3,324,038 UART: Fatal Error: 0x90010001
3,325,577 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,325,582 >>> mbox cmd response: failed
3,325,582 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,325,587 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,822 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
899,968 UART: [kat] SHA2-256
901,908 UART: [kat] SHA2-384
904,745 UART: [kat] SHA2-512-ACC
906,646 UART: [kat] ECC-384
916,051 UART: [kat] HMAC-384Kdf
920,663 UART: [kat] LMS
1,168,975 UART: [kat] --
1,169,688 UART: [cold-reset] ++
1,170,194 UART: [fht] FHT @ 0x50003400
1,172,792 UART: [idev] ++
1,172,960 UART: [idev] CDI.KEYID = 6
1,173,321 UART: [idev] SUBJECT.KEYID = 7
1,173,746 UART: [idev] UDS.KEYID = 0
1,174,092 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,766 UART: [idev] Erasing UDS.KEYID = 0
1,198,894 UART: [idev] Sha1 KeyId Algorithm
1,207,778 UART: [idev] --
1,208,881 UART: [ldev] ++
1,209,049 UART: [ldev] CDI.KEYID = 6
1,209,413 UART: [ldev] SUBJECT.KEYID = 5
1,209,840 UART: [ldev] AUTHORITY.KEYID = 7
1,210,303 UART: [ldev] FE.KEYID = 1
1,215,673 UART: [ldev] Erasing FE.KEYID = 1
1,242,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,049 UART: [ldev] --
1,281,349 UART: [fwproc] Wait for Commands...
1,282,162 UART: [fwproc] Recv command 0x46574c44
1,282,895 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,589 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,898 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,900 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,513 ready_for_fw is high
1,056,513 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,554 >>> mbox cmd response: success
2,697,718 UART:
2,697,734 UART: Running Caliptra FMC ...
2,698,142 UART:
2,698,285 UART: [state] CFI Enabled
2,708,974 UART: [fht] FMC Alias Private Key: 7
2,817,433 UART: [art] Extend RT PCRs Done
2,817,861 UART: [art] Lock RT PCRs Done
2,819,663 UART: [art] Populate DV Done
2,828,054 UART: [fht] FMC Alias Private Key: 7
2,829,236 UART: [art] Derive CDI
2,829,516 UART: [art] Store in in slot 0x4
2,915,319 UART: [art] Derive Key Pair
2,915,679 UART: [art] Store priv key in slot 0x5
2,929,309 UART: [art] Derive Key Pair - Done
2,944,086 UART: [art] Signing Cert with AUTHO
2,944,566 UART: RITY.KEYID = 7
2,959,848 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,613 UART: [art] PUB.X = 96C9FE14ABE926D10677D5FB3EE2890A11CBD8E37780AE3BE56B5F46517D3FB56DC798058B4B2B647983FCBE4A38A8C2
2,967,388 UART: [art] PUB.Y = F87CE2F3BEEADEC4671838B603AABD535DFF9FEB2319B6F9BE7C01AFB57374984F0E0511197FA6D8CA1E9B3378F660A2
2,974,346 UART: [art] SIG.R = FD9104874B8A49F85368FE929517D875D29DE9548C7F5C5906AC2F23915FB33F067C316E7BA65F7AC68A8943C53A01A7
2,981,104 UART: [art] SIG.S = A3F3D9F23FD6841DAEE3F26E5B2E73840B04925376A7AB7CABDF95949DCD962F240F5F0BCE98DE148F3C3BFAEC328185
3,005,089 UART: Caliptra RT
3,005,434 UART: [state] CFI Enabled
3,113,250 UART: [rt] RT listening for mailbox commands...
3,113,913 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,836 UART: [rt]cmd =0x46504c54, len=4
3,145,016 >>> mbox cmd response data (8 bytes)
3,145,279 UART: [rt] FIPS self test
3,145,607 UART: [kat] ++
3,145,759 UART: [kat] sha1
3,149,989 UART: [kat] SHA2-256
3,150,413 UART: Fatal Error: 0x90010001
3,151,952 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,151,957 >>> mbox cmd response: failed
3,151,957 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,151,962 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,405 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,232 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,210 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,218 >>> mbox cmd response: failed
87,218 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,224 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,841 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,731 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,982 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,990 >>> mbox cmd response: failed
86,990 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
86,996 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,121 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,727 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
88,111 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
88,119 >>> mbox cmd response: failed
88,119 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
88,125 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,158 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,672 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,473 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,481 >>> mbox cmd response: failed
87,481 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,487 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,910 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,936 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,638 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,646 >>> mbox cmd response: failed
87,646 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,652 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,863 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,053 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,024 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,032 >>> mbox cmd response: failed
87,032 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,038 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,915 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,069 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,625 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,633 >>> mbox cmd response: failed
87,633 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,639 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,642 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,772 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,483 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,491 >>> mbox cmd response: failed
87,491 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,497 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,928 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,466 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,816 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,824 >>> mbox cmd response: failed
87,824 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,830 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,109 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,477 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,356 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,364 >>> mbox cmd response: failed
87,364 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,370 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,275 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,499 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,793 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,801 >>> mbox cmd response: failed
87,801 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,807 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,968 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,310 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,847 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,855 >>> mbox cmd response: failed
87,855 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
87,861 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,958 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,076 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,580 UART: [state] LifecycleState = Unprovisioned
86,235 UART: [state] DebugLocked = No
86,783 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,471 UART: [kat] SHA2-256
882,402 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,517 UART: [kat] ++
886,669 UART: [kat] sha1
890,955 UART: [kat] SHA2-256
892,893 UART: [kat] SHA2-384
895,552 UART: [kat] SHA2-512-ACC
897,453 UART: [kat] ECC-384
903,182 UART: [kat] HMAC-384Kdf
907,936 UART: [kat] LMS
1,476,132 UART: [kat] --
1,477,031 UART: [cold-reset] ++
1,477,561 UART: [fht] Storing FHT @ 0x50003400
1,480,292 UART: [idev] ++
1,480,460 UART: [idev] CDI.KEYID = 6
1,480,820 UART: [idev] SUBJECT.KEYID = 7
1,481,244 UART: [idev] UDS.KEYID = 0
1,481,589 ready_for_fw is high
1,481,589 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,122 UART: [idev] Erasing UDS.KEYID = 0
1,505,610 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,218 UART: [idev] --
1,515,239 UART: [ldev] ++
1,515,407 UART: [ldev] CDI.KEYID = 6
1,515,770 UART: [ldev] SUBJECT.KEYID = 5
1,516,196 UART: [ldev] AUTHORITY.KEYID = 7
1,516,659 UART: [ldev] FE.KEYID = 1
1,521,931 UART: [ldev] Erasing FE.KEYID = 1
1,547,538 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,542 UART: [ldev] --
1,586,943 UART: [fwproc] Waiting for Commands...
1,587,764 UART: [fwproc] Received command 0x46574c44
1,588,555 UART: [fwproc] Received Image of size 115196 bytes
2,895,999 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,149 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,501 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,680 >>> mbox cmd response: success
3,091,788 UART: [afmc] ++
3,091,956 UART: [afmc] CDI.KEYID = 6
3,092,318 UART: [afmc] SUBJECT.KEYID = 7
3,092,743 UART: [afmc] AUTHORITY.KEYID = 5
3,128,464 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,878 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,658 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,386 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,271 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,961 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,648 UART: [afmc] --
3,171,598 UART: [cold-reset] --
3,172,424 UART: [state] Locking Datavault
3,173,641 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,245 UART: [state] Locking ICCM
3,174,731 UART: [exit] Launching FMC @ 0x40000130
3,180,060 UART:
3,180,076 UART: Running Caliptra FMC ...
3,180,484 UART:
3,180,538 UART: [state] CFI Enabled
3,191,143 UART: [fht] FMC Alias Private Key: 7
3,299,656 UART: [art] Extend RT PCRs Done
3,300,084 UART: [art] Lock RT PCRs Done
3,301,790 UART: [art] Populate DV Done
3,310,149 UART: [fht] FMC Alias Private Key: 7
3,311,297 UART: [art] Derive CDI
3,311,577 UART: [art] Store in in slot 0x4
3,397,570 UART: [art] Derive Key Pair
3,397,930 UART: [art] Store priv key in slot 0x5
3,411,166 UART: [art] Derive Key Pair - Done
3,426,015 UART: [art] Signing Cert with AUTHO
3,426,495 UART: RITY.KEYID = 7
3,441,689 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,454 UART: [art] PUB.X = 832BBF9C34416881766425A187F65E65F4798FFA4AE1BA4572F57F59BEDB60EBB88C68E9B7C62D31C24DA19934C9F46E
3,449,232 UART: [art] PUB.Y = 4DD163AD97B541BB5F2841A551193C02FA8F184C84FB50B08E4A3722ACB0D81BFB41B74A9D7BF56F5C713715AE6B0667
3,456,186 UART: [art] SIG.R = 5D03EC95163883908E4B35C8B3D7F3746B4031AAB03584761A19539F57461F11419F737BE600325B7E936E6FA0B0AC52
3,462,923 UART: [art] SIG.S = BC91D54F09EEA9042EE08A86A886D759E905B632C45DE7E2D712EB99EB2DED5268E2A9A79BB7868D32B06EB88F3E77A1
3,487,019 UART: Caliptra RT
3,487,272 UART: [state] CFI Enabled
3,595,233 UART: [rt] RT listening for mailbox commands...
3,595,896 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,833 UART: [rt]cmd =0x46504c54, len=4
3,627,005 >>> mbox cmd response data (8 bytes)
3,627,126 UART: [rt] FIPS self test
3,627,454 UART: [kat] ++
3,627,606 UART: [kat] sha1
3,631,914 UART: [kat] SHA2-256
3,633,990 UART: Fatal Error: 0x90010002
3,635,529 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,635,534 >>> mbox cmd response: failed
3,635,534 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,635,539 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,553 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,161 UART: [kat] SHA2-256
882,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,207 UART: [kat] ++
886,359 UART: [kat] sha1
890,607 UART: [kat] SHA2-256
892,545 UART: [kat] SHA2-384
895,154 UART: [kat] SHA2-512-ACC
897,055 UART: [kat] ECC-384
902,392 UART: [kat] HMAC-384Kdf
907,054 UART: [kat] LMS
1,475,250 UART: [kat] --
1,476,117 UART: [cold-reset] ++
1,476,619 UART: [fht] Storing FHT @ 0x50003400
1,479,310 UART: [idev] ++
1,479,478 UART: [idev] CDI.KEYID = 6
1,479,838 UART: [idev] SUBJECT.KEYID = 7
1,480,262 UART: [idev] UDS.KEYID = 0
1,480,607 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,348 UART: [idev] Erasing UDS.KEYID = 0
1,504,680 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,464 UART: [idev] --
1,514,739 UART: [ldev] ++
1,514,907 UART: [ldev] CDI.KEYID = 6
1,515,270 UART: [ldev] SUBJECT.KEYID = 5
1,515,696 UART: [ldev] AUTHORITY.KEYID = 7
1,516,159 UART: [ldev] FE.KEYID = 1
1,521,207 UART: [ldev] Erasing FE.KEYID = 1
1,546,980 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,628 UART: [ldev] --
1,586,023 UART: [fwproc] Waiting for Commands...
1,586,786 UART: [fwproc] Received command 0x46574c44
1,587,577 UART: [fwproc] Received Image of size 115196 bytes
2,896,207 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,471 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,823 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,010 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,295 ready_for_fw is high
1,362,295 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,844 >>> mbox cmd response: success
2,999,804 UART:
2,999,820 UART: Running Caliptra FMC ...
3,000,228 UART:
3,000,282 UART: [state] CFI Enabled
3,010,583 UART: [fht] FMC Alias Private Key: 7
3,118,106 UART: [art] Extend RT PCRs Done
3,118,534 UART: [art] Lock RT PCRs Done
3,120,278 UART: [art] Populate DV Done
3,128,545 UART: [fht] FMC Alias Private Key: 7
3,129,633 UART: [art] Derive CDI
3,129,913 UART: [art] Store in in slot 0x4
3,215,796 UART: [art] Derive Key Pair
3,216,156 UART: [art] Store priv key in slot 0x5
3,228,802 UART: [art] Derive Key Pair - Done
3,243,492 UART: [art] Signing Cert with AUTHO
3,243,972 UART: RITY.KEYID = 7
3,259,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,127 UART: [art] PUB.X = C471790DD4D4C7C53544F932F619CD70CD6CA54353CD8CC1CB7C08F6EE3E078F8633BD7A4B6CA371E69CF5B5075C38D0
3,266,899 UART: [art] PUB.Y = 32C4B0E54C927D52E87AAFF6A88F5100A7BCD511E14110E951119335F7E4B225BFCEE4849770CDA4447DDD131C10A506
3,273,830 UART: [art] SIG.R = 51BDC3E212BE98B1F16AA836E6C1E69B542AB11E790FDBDE239F3BB26DC9591639465F2BCE0C845EB5360542197F9CD9
3,280,603 UART: [art] SIG.S = 12AADA58BD60E6DEAB5D55DF73E084AC332FFE5BEC18A46015C827198F7C44A0562A7864CF19655F2D3614B6DF4A1EB0
3,304,118 UART: Caliptra RT
3,304,371 UART: [state] CFI Enabled
3,412,723 UART: [rt] RT listening for mailbox commands...
3,413,386 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,291 UART: [rt]cmd =0x46504c54, len=4
3,444,603 >>> mbox cmd response data (8 bytes)
3,444,920 UART: [rt] FIPS self test
3,445,248 UART: [kat] ++
3,445,400 UART: [kat] sha1
3,449,576 UART: [kat] SHA2-256
3,451,604 UART: Fatal Error: 0x90010002
3,453,143 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,453,148 >>> mbox cmd response: failed
3,453,148 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,453,153 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,811 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,246 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,438 UART: [kat] SHA2-256
882,369 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,484 UART: [kat] ++
886,636 UART: [kat] sha1
890,986 UART: [kat] SHA2-256
892,924 UART: [kat] SHA2-384
895,611 UART: [kat] SHA2-512-ACC
897,512 UART: [kat] ECC-384
903,211 UART: [kat] HMAC-384Kdf
907,831 UART: [kat] LMS
1,476,027 UART: [kat] --
1,477,212 UART: [cold-reset] ++
1,477,656 UART: [fht] Storing FHT @ 0x50003400
1,480,585 UART: [idev] ++
1,480,753 UART: [idev] CDI.KEYID = 6
1,481,113 UART: [idev] SUBJECT.KEYID = 7
1,481,537 UART: [idev] UDS.KEYID = 0
1,481,882 ready_for_fw is high
1,481,882 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,545 UART: [idev] Erasing UDS.KEYID = 0
1,506,187 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,991 UART: [idev] --
1,516,030 UART: [ldev] ++
1,516,198 UART: [ldev] CDI.KEYID = 6
1,516,561 UART: [ldev] SUBJECT.KEYID = 5
1,516,987 UART: [ldev] AUTHORITY.KEYID = 7
1,517,450 UART: [ldev] FE.KEYID = 1
1,522,772 UART: [ldev] Erasing FE.KEYID = 1
1,547,985 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,919 UART: [ldev] --
1,587,424 UART: [fwproc] Waiting for Commands...
1,588,151 UART: [fwproc] Received command 0x46574c44
1,588,942 UART: [fwproc] Received Image of size 115196 bytes
2,897,360 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,550 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,902 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,091,095 >>> mbox cmd response: success
3,092,237 UART: [afmc] ++
3,092,405 UART: [afmc] CDI.KEYID = 6
3,092,767 UART: [afmc] SUBJECT.KEYID = 7
3,093,192 UART: [afmc] AUTHORITY.KEYID = 5
3,127,911 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,253 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,033 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,761 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,646 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,336 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,237 UART: [afmc] --
3,171,259 UART: [cold-reset] --
3,172,463 UART: [state] Locking Datavault
3,173,578 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,182 UART: [state] Locking ICCM
3,174,828 UART: [exit] Launching FMC @ 0x40000130
3,180,157 UART:
3,180,173 UART: Running Caliptra FMC ...
3,180,581 UART:
3,180,724 UART: [state] CFI Enabled
3,191,261 UART: [fht] FMC Alias Private Key: 7
3,299,686 UART: [art] Extend RT PCRs Done
3,300,114 UART: [art] Lock RT PCRs Done
3,301,810 UART: [art] Populate DV Done
3,309,899 UART: [fht] FMC Alias Private Key: 7
3,310,841 UART: [art] Derive CDI
3,311,121 UART: [art] Store in in slot 0x4
3,396,614 UART: [art] Derive Key Pair
3,396,974 UART: [art] Store priv key in slot 0x5
3,410,678 UART: [art] Derive Key Pair - Done
3,425,615 UART: [art] Signing Cert with AUTHO
3,426,095 UART: RITY.KEYID = 7
3,441,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,992 UART: [art] PUB.X = A643680613A9F563E26B7B0C4A9596F92A633A9DCB77207B84326BB09F3D4C0D1155C99F9448084DCAB8C09FEBFA5D2E
3,448,758 UART: [art] PUB.Y = 4FB74EDC7ADBAFAB881914DC1900631047CD38E3ABE1887FA2C9CF29B77DA67D2A5DD43BBC120DC4749F0DEE0C2C6B96
3,455,703 UART: [art] SIG.R = DAA78335B4AEB6A56646CC95FB8FC34837DA2F61E928C52FEA6C31DF6DE236F6659338362BD9A3A30957EC5ADB57F5BC
3,462,488 UART: [art] SIG.S = 334ECA62C3CD780B494F4D1E2B67F8FA99C7A4B0F80C4D7DDA7AFFAC3CA5F797E089908D351F3934C4CA8EC499352886
3,486,697 UART: Caliptra RT
3,487,042 UART: [state] CFI Enabled
3,595,717 UART: [rt] RT listening for mailbox commands...
3,596,380 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,443 UART: [rt]cmd =0x46504c54, len=4
3,627,555 >>> mbox cmd response data (8 bytes)
3,627,668 UART: [rt] FIPS self test
3,627,996 UART: [kat] ++
3,628,148 UART: [kat] sha1
3,632,366 UART: [kat] SHA2-256
3,634,392 UART: Fatal Error: 0x90010002
3,635,931 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,635,936 >>> mbox cmd response: failed
3,635,936 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,635,941 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,596 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,214 UART: [kat] SHA2-256
882,145 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,260 UART: [kat] ++
886,412 UART: [kat] sha1
890,536 UART: [kat] SHA2-256
892,474 UART: [kat] SHA2-384
895,195 UART: [kat] SHA2-512-ACC
897,096 UART: [kat] ECC-384
902,809 UART: [kat] HMAC-384Kdf
907,349 UART: [kat] LMS
1,475,545 UART: [kat] --
1,476,602 UART: [cold-reset] ++
1,477,130 UART: [fht] Storing FHT @ 0x50003400
1,480,091 UART: [idev] ++
1,480,259 UART: [idev] CDI.KEYID = 6
1,480,619 UART: [idev] SUBJECT.KEYID = 7
1,481,043 UART: [idev] UDS.KEYID = 0
1,481,388 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,643 UART: [idev] Erasing UDS.KEYID = 0
1,505,535 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,085 UART: [idev] --
1,515,172 UART: [ldev] ++
1,515,340 UART: [ldev] CDI.KEYID = 6
1,515,703 UART: [ldev] SUBJECT.KEYID = 5
1,516,129 UART: [ldev] AUTHORITY.KEYID = 7
1,516,592 UART: [ldev] FE.KEYID = 1
1,522,060 UART: [ldev] Erasing FE.KEYID = 1
1,546,915 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,491 UART: [ldev] --
1,585,814 UART: [fwproc] Waiting for Commands...
1,586,649 UART: [fwproc] Received command 0x46574c44
1,587,440 UART: [fwproc] Received Image of size 115196 bytes
2,896,308 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,536 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,888 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,125 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,330 ready_for_fw is high
1,362,330 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,207 >>> mbox cmd response: success
3,001,797 UART:
3,001,813 UART: Running Caliptra FMC ...
3,002,221 UART:
3,002,364 UART: [state] CFI Enabled
3,013,473 UART: [fht] FMC Alias Private Key: 7
3,121,564 UART: [art] Extend RT PCRs Done
3,121,992 UART: [art] Lock RT PCRs Done
3,123,602 UART: [art] Populate DV Done
3,131,707 UART: [fht] FMC Alias Private Key: 7
3,132,689 UART: [art] Derive CDI
3,132,969 UART: [art] Store in in slot 0x4
3,218,608 UART: [art] Derive Key Pair
3,218,968 UART: [art] Store priv key in slot 0x5
3,231,704 UART: [art] Derive Key Pair - Done
3,246,886 UART: [art] Signing Cert with AUTHO
3,247,366 UART: RITY.KEYID = 7
3,262,586 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,351 UART: [art] PUB.X = D877CB357F5C93A8F4E55CB88B3F012302798DD31FACA2DC8C0972749AE35F6B5F37C42834FE4CD3D7F871346D1439B5
3,270,120 UART: [art] PUB.Y = 8160266E732A71BC1FF71B79084831B8733617ADE10B5FC264F87F2B5BEC258BCFFC3ED2E34152C81ABC68E8A5BCF5F2
3,277,078 UART: [art] SIG.R = B66439A7019259EAD410556FD710DDB833C557CE28F0E2563CF82D68A4B84DB9C14F0E47490AD68B8BF82ECF169D9D57
3,283,847 UART: [art] SIG.S = 64641D3A2660D48937DE6C50AB3FAACABF3B0AB67B8422DA7D6902CCD744E9C9EEB79E12605B9AF0A55BC8D07133A1D6
3,307,806 UART: Caliptra RT
3,308,151 UART: [state] CFI Enabled
3,415,674 UART: [rt] RT listening for mailbox commands...
3,416,337 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,050 UART: [rt]cmd =0x46504c54, len=4
3,447,152 >>> mbox cmd response data (8 bytes)
3,447,427 UART: [rt] FIPS self test
3,447,755 UART: [kat] ++
3,447,907 UART: [kat] sha1
3,452,019 UART: [kat] SHA2-256
3,454,027 UART: Fatal Error: 0x90010002
3,455,566 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,455,571 >>> mbox cmd response: failed
3,455,571 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,455,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,800 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,841 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,045 UART: [state] WD Timer not started. Device not locked for debugging
87,336 UART: [kat] SHA2-256
892,986 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,111 UART: [kat] ++
897,263 UART: [kat] sha1
901,611 UART: [kat] SHA2-256
903,551 UART: [kat] SHA2-384
906,234 UART: [kat] SHA2-512-ACC
908,135 UART: [kat] ECC-384
917,744 UART: [kat] HMAC-384Kdf
922,432 UART: [kat] LMS
1,170,760 UART: [kat] --
1,171,785 UART: [cold-reset] ++
1,172,241 UART: [fht] FHT @ 0x50003400
1,175,000 UART: [idev] ++
1,175,168 UART: [idev] CDI.KEYID = 6
1,175,528 UART: [idev] SUBJECT.KEYID = 7
1,175,952 UART: [idev] UDS.KEYID = 0
1,176,297 ready_for_fw is high
1,176,297 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,546 UART: [idev] Erasing UDS.KEYID = 0
1,200,437 UART: [idev] Sha1 KeyId Algorithm
1,208,871 UART: [idev] --
1,209,839 UART: [ldev] ++
1,210,007 UART: [ldev] CDI.KEYID = 6
1,210,370 UART: [ldev] SUBJECT.KEYID = 5
1,210,796 UART: [ldev] AUTHORITY.KEYID = 7
1,211,259 UART: [ldev] FE.KEYID = 1
1,216,589 UART: [ldev] Erasing FE.KEYID = 1
1,242,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,803 UART: [ldev] --
1,282,314 UART: [fwproc] Wait for Commands...
1,283,030 UART: [fwproc] Recv command 0x46574c44
1,283,758 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,341 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,182 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,486 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,553 >>> mbox cmd response: success
2,787,679 UART: [afmc] ++
2,787,847 UART: [afmc] CDI.KEYID = 6
2,788,209 UART: [afmc] SUBJECT.KEYID = 7
2,788,634 UART: [afmc] AUTHORITY.KEYID = 5
2,823,883 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,972 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,700 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,585 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,304 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,310 UART: [afmc] --
2,867,366 UART: [cold-reset] --
2,868,000 UART: [state] Locking Datavault
2,868,887 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,491 UART: [state] Locking ICCM
2,870,139 UART: [exit] Launching FMC @ 0x40000130
2,875,468 UART:
2,875,484 UART: Running Caliptra FMC ...
2,875,892 UART:
2,875,946 UART: [state] CFI Enabled
2,886,289 UART: [fht] FMC Alias Private Key: 7
2,994,160 UART: [art] Extend RT PCRs Done
2,994,588 UART: [art] Lock RT PCRs Done
2,996,224 UART: [art] Populate DV Done
3,004,375 UART: [fht] FMC Alias Private Key: 7
3,005,553 UART: [art] Derive CDI
3,005,833 UART: [art] Store in in slot 0x4
3,091,274 UART: [art] Derive Key Pair
3,091,634 UART: [art] Store priv key in slot 0x5
3,105,276 UART: [art] Derive Key Pair - Done
3,119,976 UART: [art] Signing Cert with AUTHO
3,120,456 UART: RITY.KEYID = 7
3,135,240 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,005 UART: [art] PUB.X = 3107CAFA495A0F6D0C9AB76FB7E44787DCC6B8C89D431D8538D4D853E8DBF56719D50A6BCC7FFEE6F94E6CA9D5F788DF
3,142,787 UART: [art] PUB.Y = DE93E8DF9AF8343925C648A0BF199541EB189CB1CAAA61620BE0C963CE207557DF0703EB565070516FE9256A0B408F97
3,149,729 UART: [art] SIG.R = E5CED22D7848A1FAECE6A5752F21142DD4F2FBDF2CDA5CB8A96E7C01FA5BCC11F169256A25B95D8C865B1B8D8493EF28
3,156,520 UART: [art] SIG.S = 4B912A1F684CD785D1B29AC1CC25A385AEE14651E52D620100AC8008D9CD143D0D3BCB598024C71ED1F45C5DDFB0514C
3,180,080 UART: Caliptra RT
3,180,333 UART: [state] CFI Enabled
3,288,426 UART: [rt] RT listening for mailbox commands...
3,289,089 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,740 UART: [rt]cmd =0x46504c54, len=4
3,320,012 >>> mbox cmd response data (8 bytes)
3,320,135 UART: [rt] FIPS self test
3,320,463 UART: [kat] ++
3,320,615 UART: [kat] sha1
3,324,627 UART: [kat] SHA2-256
3,326,571 UART: Fatal Error: 0x90010002
3,328,110 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,328,115 >>> mbox cmd response: failed
3,328,115 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,328,120 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,057 UART: [state] WD Timer not started. Device not locked for debugging
87,294 UART: [kat] SHA2-256
892,944 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,069 UART: [kat] ++
897,221 UART: [kat] sha1
901,519 UART: [kat] SHA2-256
903,459 UART: [kat] SHA2-384
906,180 UART: [kat] SHA2-512-ACC
908,081 UART: [kat] ECC-384
917,698 UART: [kat] HMAC-384Kdf
922,080 UART: [kat] LMS
1,170,408 UART: [kat] --
1,171,233 UART: [cold-reset] ++
1,171,637 UART: [fht] FHT @ 0x50003400
1,174,178 UART: [idev] ++
1,174,346 UART: [idev] CDI.KEYID = 6
1,174,706 UART: [idev] SUBJECT.KEYID = 7
1,175,130 UART: [idev] UDS.KEYID = 0
1,175,475 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,856 UART: [idev] Erasing UDS.KEYID = 0
1,199,575 UART: [idev] Sha1 KeyId Algorithm
1,208,179 UART: [idev] --
1,209,299 UART: [ldev] ++
1,209,467 UART: [ldev] CDI.KEYID = 6
1,209,830 UART: [ldev] SUBJECT.KEYID = 5
1,210,256 UART: [ldev] AUTHORITY.KEYID = 7
1,210,719 UART: [ldev] FE.KEYID = 1
1,215,999 UART: [ldev] Erasing FE.KEYID = 1
1,242,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,649 UART: [ldev] --
1,282,102 UART: [fwproc] Wait for Commands...
1,282,862 UART: [fwproc] Recv command 0x46574c44
1,283,590 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,420 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,724 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,957 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,343 ready_for_fw is high
1,060,343 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,446 >>> mbox cmd response: success
2,701,624 UART:
2,701,640 UART: Running Caliptra FMC ...
2,702,048 UART:
2,702,102 UART: [state] CFI Enabled
2,712,643 UART: [fht] FMC Alias Private Key: 7
2,820,566 UART: [art] Extend RT PCRs Done
2,820,994 UART: [art] Lock RT PCRs Done
2,822,518 UART: [art] Populate DV Done
2,830,889 UART: [fht] FMC Alias Private Key: 7
2,832,059 UART: [art] Derive CDI
2,832,339 UART: [art] Store in in slot 0x4
2,917,858 UART: [art] Derive Key Pair
2,918,218 UART: [art] Store priv key in slot 0x5
2,931,552 UART: [art] Derive Key Pair - Done
2,946,464 UART: [art] Signing Cert with AUTHO
2,946,944 UART: RITY.KEYID = 7
2,962,018 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,783 UART: [art] PUB.X = 3FADA8CE3F39D0E3EA35BF3DCB7F26AD04E74CE819A424148502351D2A109AE66CB4D6B795E41DA3E379F4331831C711
2,969,559 UART: [art] PUB.Y = A3770A43C55C3D9DDE657D2119FA0BEBDE87C0A94014081AC47579B8EA078DA70CE5F25F700942B71F79DB057D09CC85
2,976,495 UART: [art] SIG.R = 0D7FAF5367D48694E45C56ABB4A903757D427F5064B283EFF1A273D2853FEB213887FBB2EB7370918EAC4E664D7B2E6C
2,983,267 UART: [art] SIG.S = C8B8A2BE1D67D493F7B96A607970100EE284FDFAD0C5F3EE4C6D33417CC42314CCB548EA2A29A8B0E413091B943E3F26
3,007,352 UART: Caliptra RT
3,007,605 UART: [state] CFI Enabled
3,116,560 UART: [rt] RT listening for mailbox commands...
3,117,223 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,864 UART: [rt]cmd =0x46504c54, len=4
3,147,982 >>> mbox cmd response data (8 bytes)
3,148,203 UART: [rt] FIPS self test
3,148,531 UART: [kat] ++
3,148,683 UART: [kat] sha1
3,152,873 UART: [kat] SHA2-256
3,154,859 UART: Fatal Error: 0x90010002
3,156,398 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,156,403 >>> mbox cmd response: failed
3,156,403 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,156,408 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,571 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,562 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,827 UART: [state] LifecycleState = Unprovisioned
86,482 UART: [state] DebugLocked = No
87,136 UART: [state] WD Timer not started. Device not locked for debugging
88,407 UART: [kat] SHA2-256
894,057 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,182 UART: [kat] ++
898,334 UART: [kat] sha1
902,706 UART: [kat] SHA2-256
904,646 UART: [kat] SHA2-384
907,341 UART: [kat] SHA2-512-ACC
909,242 UART: [kat] ECC-384
919,029 UART: [kat] HMAC-384Kdf
923,879 UART: [kat] LMS
1,172,207 UART: [kat] --
1,173,074 UART: [cold-reset] ++
1,173,414 UART: [fht] FHT @ 0x50003400
1,176,027 UART: [idev] ++
1,176,195 UART: [idev] CDI.KEYID = 6
1,176,555 UART: [idev] SUBJECT.KEYID = 7
1,176,979 UART: [idev] UDS.KEYID = 0
1,177,324 ready_for_fw is high
1,177,324 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,631 UART: [idev] Erasing UDS.KEYID = 0
1,201,744 UART: [idev] Sha1 KeyId Algorithm
1,210,454 UART: [idev] --
1,211,284 UART: [ldev] ++
1,211,452 UART: [ldev] CDI.KEYID = 6
1,211,815 UART: [ldev] SUBJECT.KEYID = 5
1,212,241 UART: [ldev] AUTHORITY.KEYID = 7
1,212,704 UART: [ldev] FE.KEYID = 1
1,217,896 UART: [ldev] Erasing FE.KEYID = 1
1,243,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,686 UART: [ldev] --
1,283,113 UART: [fwproc] Wait for Commands...
1,283,923 UART: [fwproc] Recv command 0x46574c44
1,284,651 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,967 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,271 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,316 >>> mbox cmd response: success
2,786,402 UART: [afmc] ++
2,786,570 UART: [afmc] CDI.KEYID = 6
2,786,932 UART: [afmc] SUBJECT.KEYID = 7
2,787,357 UART: [afmc] AUTHORITY.KEYID = 5
2,823,130 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,239 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,987 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,715 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,600 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,319 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,199 UART: [afmc] --
2,866,297 UART: [cold-reset] --
2,867,053 UART: [state] Locking Datavault
2,868,338 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,942 UART: [state] Locking ICCM
2,869,468 UART: [exit] Launching FMC @ 0x40000130
2,874,797 UART:
2,874,813 UART: Running Caliptra FMC ...
2,875,221 UART:
2,875,364 UART: [state] CFI Enabled
2,886,163 UART: [fht] FMC Alias Private Key: 7
2,995,148 UART: [art] Extend RT PCRs Done
2,995,576 UART: [art] Lock RT PCRs Done
2,997,204 UART: [art] Populate DV Done
3,005,499 UART: [fht] FMC Alias Private Key: 7
3,006,653 UART: [art] Derive CDI
3,006,933 UART: [art] Store in in slot 0x4
3,092,418 UART: [art] Derive Key Pair
3,092,778 UART: [art] Store priv key in slot 0x5
3,106,076 UART: [art] Derive Key Pair - Done
3,120,653 UART: [art] Signing Cert with AUTHO
3,121,133 UART: RITY.KEYID = 7
3,136,037 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,802 UART: [art] PUB.X = 934A8BC41338B889FB8CEBDD603871BE37228C522B7CBFE9E09E7A6BDA2ED4219DD427CEA6F97640DC601B73F7067EDE
3,143,587 UART: [art] PUB.Y = CA91B2BE99086132C7833C6CA7924900EF323CF0B6F6AA991372DDBACA573FDA2D2EB3243C80FCD4AED5DB9FC1E98940
3,150,532 UART: [art] SIG.R = 09B0A5F00AC03EF6FFDBE56F81699F83885F5F48EB5484BE4338A9FFC65C096C0CC6A5DD3DA6D3062D8CDC8DF5C2ACA7
3,157,313 UART: [art] SIG.S = 7A8E4E4C3F06E7F6C33E26F648E3AFCD461BF8E127D66C01CC8A35E9D22AB03D0B08B0834508F2B7C7436D786BFB300A
3,181,286 UART: Caliptra RT
3,181,631 UART: [state] CFI Enabled
3,289,712 UART: [rt] RT listening for mailbox commands...
3,290,375 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,992 UART: [rt]cmd =0x46504c54, len=4
3,321,108 >>> mbox cmd response data (8 bytes)
3,321,439 UART: [rt] FIPS self test
3,321,767 UART: [kat] ++
3,321,919 UART: [kat] sha1
3,326,153 UART: [kat] SHA2-256
3,328,261 UART: Fatal Error: 0x90010002
3,329,800 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,805 >>> mbox cmd response: failed
3,329,805 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,810 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Unprovisioned
85,850 UART: [state] DebugLocked = No
86,496 UART: [state] WD Timer not started. Device not locked for debugging
87,645 UART: [kat] SHA2-256
893,295 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,420 UART: [kat] ++
897,572 UART: [kat] sha1
901,796 UART: [kat] SHA2-256
903,736 UART: [kat] SHA2-384
906,397 UART: [kat] SHA2-512-ACC
908,298 UART: [kat] ECC-384
917,907 UART: [kat] HMAC-384Kdf
922,749 UART: [kat] LMS
1,171,077 UART: [kat] --
1,171,694 UART: [cold-reset] ++
1,172,088 UART: [fht] FHT @ 0x50003400
1,174,801 UART: [idev] ++
1,174,969 UART: [idev] CDI.KEYID = 6
1,175,329 UART: [idev] SUBJECT.KEYID = 7
1,175,753 UART: [idev] UDS.KEYID = 0
1,176,098 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,375 UART: [idev] Erasing UDS.KEYID = 0
1,200,290 UART: [idev] Sha1 KeyId Algorithm
1,208,674 UART: [idev] --
1,209,778 UART: [ldev] ++
1,209,946 UART: [ldev] CDI.KEYID = 6
1,210,309 UART: [ldev] SUBJECT.KEYID = 5
1,210,735 UART: [ldev] AUTHORITY.KEYID = 7
1,211,198 UART: [ldev] FE.KEYID = 1
1,216,478 UART: [ldev] Erasing FE.KEYID = 1
1,242,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,310 UART: [ldev] --
1,281,575 UART: [fwproc] Wait for Commands...
1,282,191 UART: [fwproc] Recv command 0x46574c44
1,282,919 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,431 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,735 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,956 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,528 ready_for_fw is high
1,060,528 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,636,861 >>> mbox cmd response: success
2,699,793 UART:
2,699,809 UART: Running Caliptra FMC ...
2,700,217 UART:
2,700,360 UART: [state] CFI Enabled
2,710,953 UART: [fht] FMC Alias Private Key: 7
2,818,662 UART: [art] Extend RT PCRs Done
2,819,090 UART: [art] Lock RT PCRs Done
2,820,664 UART: [art] Populate DV Done
2,828,769 UART: [fht] FMC Alias Private Key: 7
2,829,921 UART: [art] Derive CDI
2,830,201 UART: [art] Store in in slot 0x4
2,916,240 UART: [art] Derive Key Pair
2,916,600 UART: [art] Store priv key in slot 0x5
2,930,114 UART: [art] Derive Key Pair - Done
2,944,944 UART: [art] Signing Cert with AUTHO
2,945,424 UART: RITY.KEYID = 7
2,960,576 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,341 UART: [art] PUB.X = B3637DB682F1F71DC5525CB4AE08EDC1EA934EBDB9151E9594E1FE70178E94C54B6E806504D9869DC1C001959A4FA113
2,968,110 UART: [art] PUB.Y = EEDB13B518177397CA690F14D27809C51B192610524C3873BB795B3D4B9EF44742932055D3DF61550B13FAA48A4123AF
2,975,047 UART: [art] SIG.R = CA94BFCC72839CF76EA17BD936D9FCBC3C259B1C8908346BD6FA4151A56F2C0FB6701C936111CDC782C925088C063B8C
2,981,817 UART: [art] SIG.S = 7E5842D6105537284B439C33CFE6229ACBEB034933587F0FE9ADB6EC145B1453C5492A92A7DA43D3AB54A7F3F2E850F5
3,006,412 UART: Caliptra RT
3,006,757 UART: [state] CFI Enabled
3,115,934 UART: [rt] RT listening for mailbox commands...
3,116,597 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,396 UART: [rt]cmd =0x46504c54, len=4
3,147,518 >>> mbox cmd response data (8 bytes)
3,147,727 UART: [rt] FIPS self test
3,148,055 UART: [kat] ++
3,148,207 UART: [kat] sha1
3,152,317 UART: [kat] SHA2-256
3,154,379 UART: Fatal Error: 0x90010002
3,155,918 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,155,923 >>> mbox cmd response: failed
3,155,923 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,155,928 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,046 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,640,623 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,486 UART: [kat] SHA2-256
891,036 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,165 UART: [kat] ++
895,317 UART: [kat] sha1
899,567 UART: [kat] SHA2-256
901,507 UART: [kat] SHA2-384
904,298 UART: [kat] SHA2-512-ACC
906,199 UART: [kat] ECC-384
915,770 UART: [kat] HMAC-384Kdf
920,286 UART: [kat] LMS
1,168,598 UART: [kat] --
1,169,547 UART: [cold-reset] ++
1,169,939 UART: [fht] FHT @ 0x50003400
1,172,503 UART: [idev] ++
1,172,671 UART: [idev] CDI.KEYID = 6
1,173,032 UART: [idev] SUBJECT.KEYID = 7
1,173,457 UART: [idev] UDS.KEYID = 0
1,173,803 ready_for_fw is high
1,173,803 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,375 UART: [idev] Erasing UDS.KEYID = 0
1,197,521 UART: [idev] Sha1 KeyId Algorithm
1,206,223 UART: [idev] --
1,207,392 UART: [ldev] ++
1,207,560 UART: [ldev] CDI.KEYID = 6
1,207,924 UART: [ldev] SUBJECT.KEYID = 5
1,208,351 UART: [ldev] AUTHORITY.KEYID = 7
1,208,814 UART: [ldev] FE.KEYID = 1
1,214,222 UART: [ldev] Erasing FE.KEYID = 1
1,240,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,202 UART: [ldev] --
1,279,580 UART: [fwproc] Wait for Commands...
1,280,233 UART: [fwproc] Recv command 0x46574c44
1,280,966 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,808 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,117 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,313 >>> mbox cmd response: success
2,784,460 UART: [afmc] ++
2,784,628 UART: [afmc] CDI.KEYID = 6
2,784,991 UART: [afmc] SUBJECT.KEYID = 7
2,785,417 UART: [afmc] AUTHORITY.KEYID = 5
2,820,582 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,132 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,883 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,612 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,495 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,214 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,035 UART: [afmc] --
2,864,067 UART: [cold-reset] --
2,864,661 UART: [state] Locking Datavault
2,865,948 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,552 UART: [state] Locking ICCM
2,867,158 UART: [exit] Launching FMC @ 0x40000130
2,872,487 UART:
2,872,503 UART: Running Caliptra FMC ...
2,872,911 UART:
2,872,965 UART: [state] CFI Enabled
2,883,392 UART: [fht] FMC Alias Private Key: 7
2,991,695 UART: [art] Extend RT PCRs Done
2,992,123 UART: [art] Lock RT PCRs Done
2,993,517 UART: [art] Populate DV Done
3,001,412 UART: [fht] FMC Alias Private Key: 7
3,002,564 UART: [art] Derive CDI
3,002,844 UART: [art] Store in in slot 0x4
3,088,707 UART: [art] Derive Key Pair
3,089,067 UART: [art] Store priv key in slot 0x5
3,102,045 UART: [art] Derive Key Pair - Done
3,116,734 UART: [art] Signing Cert with AUTHO
3,117,214 UART: RITY.KEYID = 7
3,132,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,127 UART: [art] PUB.X = 4528F580C40D86F6291C4AA0B0456961D6B0DA0221F9C7916EDC2FDD26D986AC5A33C408815094F711FE5363433AAA0F
3,139,887 UART: [art] PUB.Y = 800FFCB5E2C35E6972FDA40219854B417A4F5C7AAA197B8F30740581FC89C046C667DDF3553087D8342CB9CE1D40E30B
3,146,831 UART: [art] SIG.R = FFA8FE1560543E7D2D4CA3E0EA31CBA73D5CF4119DFAB14FE3252CB2DE44EE18ACE17243A7F8BEC769633C390A4EF987
3,153,622 UART: [art] SIG.S = 44255D8D5EBCBA04F932EED6089424ABAFC3A29CD8CE94D64D9353CA32242956F8F93037E378F00E9365B9E64898FC27
3,177,126 UART: Caliptra RT
3,177,379 UART: [state] CFI Enabled
3,286,264 UART: [rt] RT listening for mailbox commands...
3,286,927 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,872 UART: [rt]cmd =0x46504c54, len=4
3,318,070 >>> mbox cmd response data (8 bytes)
3,318,335 UART: [rt] FIPS self test
3,318,663 UART: [kat] ++
3,318,815 UART: [kat] sha1
3,323,069 UART: [kat] SHA2-256
3,324,967 UART: Fatal Error: 0x90010002
3,326,506 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,326,511 >>> mbox cmd response: failed
3,326,511 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,326,516 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,809 UART: [kat] SHA2-256
901,749 UART: [kat] SHA2-384
904,456 UART: [kat] SHA2-512-ACC
906,357 UART: [kat] ECC-384
915,808 UART: [kat] HMAC-384Kdf
920,210 UART: [kat] LMS
1,168,522 UART: [kat] --
1,169,729 UART: [cold-reset] ++
1,170,253 UART: [fht] FHT @ 0x50003400
1,172,749 UART: [idev] ++
1,172,917 UART: [idev] CDI.KEYID = 6
1,173,278 UART: [idev] SUBJECT.KEYID = 7
1,173,703 UART: [idev] UDS.KEYID = 0
1,174,049 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,599 UART: [idev] Erasing UDS.KEYID = 0
1,198,193 UART: [idev] Sha1 KeyId Algorithm
1,206,979 UART: [idev] --
1,208,118 UART: [ldev] ++
1,208,286 UART: [ldev] CDI.KEYID = 6
1,208,650 UART: [ldev] SUBJECT.KEYID = 5
1,209,077 UART: [ldev] AUTHORITY.KEYID = 7
1,209,540 UART: [ldev] FE.KEYID = 1
1,214,708 UART: [ldev] Erasing FE.KEYID = 1
1,240,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,782 UART: [ldev] --
1,280,058 UART: [fwproc] Wait for Commands...
1,280,685 UART: [fwproc] Recv command 0x46574c44
1,281,418 UART: [fwproc] Recv'd Img size: 115196 bytes
2,588,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,384 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,693 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,782,753 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,530 ready_for_fw is high
1,055,530 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,067 >>> mbox cmd response: success
2,693,529 UART:
2,693,545 UART: Running Caliptra FMC ...
2,693,953 UART:
2,694,007 UART: [state] CFI Enabled
2,704,352 UART: [fht] FMC Alias Private Key: 7
2,811,679 UART: [art] Extend RT PCRs Done
2,812,107 UART: [art] Lock RT PCRs Done
2,813,725 UART: [art] Populate DV Done
2,821,786 UART: [fht] FMC Alias Private Key: 7
2,822,886 UART: [art] Derive CDI
2,823,166 UART: [art] Store in in slot 0x4
2,908,721 UART: [art] Derive Key Pair
2,909,081 UART: [art] Store priv key in slot 0x5
2,922,117 UART: [art] Derive Key Pair - Done
2,936,968 UART: [art] Signing Cert with AUTHO
2,937,448 UART: RITY.KEYID = 7
2,952,514 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,279 UART: [art] PUB.X = 56BFA1DB78ED889D77318873AF2AB6A801D97258D54A2BDC37CDF630EC442D9821D76F53DFDC50BE92FBB51F00D4043E
2,960,037 UART: [art] PUB.Y = 9279FDE1843F42FFEAF9F49294A48ECA06596D72A41FD8244F2BBF5772733D041F48916F291243F40EEED3F001D3119E
2,966,979 UART: [art] SIG.R = A7C6DE0393A7523FFF3E4BF521957051186E36E0001B609E82B7A7927B470A7A0F3AEDFC3B93E4ACC9D10E1292698DAA
2,973,725 UART: [art] SIG.S = DE229A18C74F89B5BFFFA3CEDA1E85E6AD5BB8C89E430CA12F55395A8842CBB4CBE182A2C8CF4BD55DF5D31521161439
2,997,853 UART: Caliptra RT
2,998,106 UART: [state] CFI Enabled
3,105,962 UART: [rt] RT listening for mailbox commands...
3,106,625 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,422 UART: [rt]cmd =0x46504c54, len=4
3,137,446 >>> mbox cmd response data (8 bytes)
3,137,805 UART: [rt] FIPS self test
3,138,133 UART: [kat] ++
3,138,285 UART: [kat] sha1
3,142,579 UART: [kat] SHA2-256
3,144,607 UART: Fatal Error: 0x90010002
3,146,146 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,146,151 >>> mbox cmd response: failed
3,146,151 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,146,156 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,696 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,457 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [kat] SHA2-256
891,621 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,750 UART: [kat] ++
895,902 UART: [kat] sha1
900,282 UART: [kat] SHA2-256
902,222 UART: [kat] SHA2-384
904,849 UART: [kat] SHA2-512-ACC
906,750 UART: [kat] ECC-384
916,501 UART: [kat] HMAC-384Kdf
920,949 UART: [kat] LMS
1,169,261 UART: [kat] --
1,170,000 UART: [cold-reset] ++
1,170,442 UART: [fht] FHT @ 0x50003400
1,173,264 UART: [idev] ++
1,173,432 UART: [idev] CDI.KEYID = 6
1,173,793 UART: [idev] SUBJECT.KEYID = 7
1,174,218 UART: [idev] UDS.KEYID = 0
1,174,564 ready_for_fw is high
1,174,564 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,466 UART: [idev] Erasing UDS.KEYID = 0
1,199,998 UART: [idev] Sha1 KeyId Algorithm
1,208,820 UART: [idev] --
1,209,721 UART: [ldev] ++
1,209,889 UART: [ldev] CDI.KEYID = 6
1,210,253 UART: [ldev] SUBJECT.KEYID = 5
1,210,680 UART: [ldev] AUTHORITY.KEYID = 7
1,211,143 UART: [ldev] FE.KEYID = 1
1,216,385 UART: [ldev] Erasing FE.KEYID = 1
1,243,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,139 UART: [ldev] --
1,282,451 UART: [fwproc] Wait for Commands...
1,283,216 UART: [fwproc] Recv command 0x46574c44
1,283,949 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,751 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,415 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,724 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,806 >>> mbox cmd response: success
2,785,957 UART: [afmc] ++
2,786,125 UART: [afmc] CDI.KEYID = 6
2,786,488 UART: [afmc] SUBJECT.KEYID = 7
2,786,914 UART: [afmc] AUTHORITY.KEYID = 5
2,822,599 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,800 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,529 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,412 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,131 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,776 UART: [afmc] --
2,865,862 UART: [cold-reset] --
2,866,842 UART: [state] Locking Datavault
2,867,951 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,555 UART: [state] Locking ICCM
2,869,169 UART: [exit] Launching FMC @ 0x40000130
2,874,498 UART:
2,874,514 UART: Running Caliptra FMC ...
2,874,922 UART:
2,875,065 UART: [state] CFI Enabled
2,885,956 UART: [fht] FMC Alias Private Key: 7
2,993,903 UART: [art] Extend RT PCRs Done
2,994,331 UART: [art] Lock RT PCRs Done
2,995,709 UART: [art] Populate DV Done
3,003,962 UART: [fht] FMC Alias Private Key: 7
3,005,008 UART: [art] Derive CDI
3,005,288 UART: [art] Store in in slot 0x4
3,090,841 UART: [art] Derive Key Pair
3,091,201 UART: [art] Store priv key in slot 0x5
3,104,713 UART: [art] Derive Key Pair - Done
3,119,142 UART: [art] Signing Cert with AUTHO
3,119,622 UART: RITY.KEYID = 7
3,135,098 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,863 UART: [art] PUB.X = E7582F73A25AA01A336C7377F1885D9B90265B38C15499715FEE2A82200FA4E56DCB75E8AD9EA4B878E891D067D41F4D
3,142,634 UART: [art] PUB.Y = 495AE75801D21FE147F23D0656BCE9111F51CA30EEF79D3C12C30FBD9AADAEBFE3FE3D771422800F6B48F549F07A354F
3,149,588 UART: [art] SIG.R = D79BE9FB1AA08CFEA805422DFB820CB0943263A0B7C20AA65CC75472477F852A875F25F6FBEA7069D25F0946139BFD91
3,156,356 UART: [art] SIG.S = 76B56DB6D5F8857FE238A1548B64348DD872025C8F7F41A3C6D36366E489D64209096DDB10CF1EEDF9B7121BF717DC8B
3,179,708 UART: Caliptra RT
3,180,053 UART: [state] CFI Enabled
3,288,978 UART: [rt] RT listening for mailbox commands...
3,289,641 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,512 UART: [rt]cmd =0x46504c54, len=4
3,320,714 >>> mbox cmd response data (8 bytes)
3,320,967 UART: [rt] FIPS self test
3,321,295 UART: [kat] ++
3,321,447 UART: [kat] sha1
3,325,609 UART: [kat] SHA2-256
3,327,639 UART: Fatal Error: 0x90010002
3,329,178 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,183 >>> mbox cmd response: failed
3,329,183 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,188 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,865 UART: [state] LifecycleState = Unprovisioned
86,520 UART: [state] DebugLocked = No
87,018 UART: [state] WD Timer not started. Device not locked for debugging
88,279 UART: [kat] SHA2-256
891,829 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,958 UART: [kat] ++
896,110 UART: [kat] sha1
900,412 UART: [kat] SHA2-256
902,352 UART: [kat] SHA2-384
905,037 UART: [kat] SHA2-512-ACC
906,938 UART: [kat] ECC-384
916,515 UART: [kat] HMAC-384Kdf
921,165 UART: [kat] LMS
1,169,477 UART: [kat] --
1,170,618 UART: [cold-reset] ++
1,170,964 UART: [fht] FHT @ 0x50003400
1,173,644 UART: [idev] ++
1,173,812 UART: [idev] CDI.KEYID = 6
1,174,173 UART: [idev] SUBJECT.KEYID = 7
1,174,598 UART: [idev] UDS.KEYID = 0
1,174,944 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,522 UART: [idev] Erasing UDS.KEYID = 0
1,199,660 UART: [idev] Sha1 KeyId Algorithm
1,208,620 UART: [idev] --
1,209,717 UART: [ldev] ++
1,209,885 UART: [ldev] CDI.KEYID = 6
1,210,249 UART: [ldev] SUBJECT.KEYID = 5
1,210,676 UART: [ldev] AUTHORITY.KEYID = 7
1,211,139 UART: [ldev] FE.KEYID = 1
1,216,413 UART: [ldev] Erasing FE.KEYID = 1
1,242,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,849 UART: [ldev] --
1,282,165 UART: [fwproc] Wait for Commands...
1,282,950 UART: [fwproc] Recv command 0x46574c44
1,283,683 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,623 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,932 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,100 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,613 ready_for_fw is high
1,056,613 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,622 >>> mbox cmd response: success
2,698,682 UART:
2,698,698 UART: Running Caliptra FMC ...
2,699,106 UART:
2,699,249 UART: [state] CFI Enabled
2,709,682 UART: [fht] FMC Alias Private Key: 7
2,817,477 UART: [art] Extend RT PCRs Done
2,817,905 UART: [art] Lock RT PCRs Done
2,819,289 UART: [art] Populate DV Done
2,827,400 UART: [fht] FMC Alias Private Key: 7
2,828,358 UART: [art] Derive CDI
2,828,638 UART: [art] Store in in slot 0x4
2,914,415 UART: [art] Derive Key Pair
2,914,775 UART: [art] Store priv key in slot 0x5
2,928,159 UART: [art] Derive Key Pair - Done
2,942,833 UART: [art] Signing Cert with AUTHO
2,943,313 UART: RITY.KEYID = 7
2,957,963 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,728 UART: [art] PUB.X = 9E1829669A4B0763AABB3860FAB3C8AE809425E830ED6B0B2540BA560F1F6C634920A512757836E304854876A3A112F0
2,965,480 UART: [art] PUB.Y = 9F02E6D600FD5278C0A05B5629AE06402B2B3DB5FFAE26144FA157328970FC7F5894FCCAC585F8E2CB47EE34C24639A8
2,972,412 UART: [art] SIG.R = F56E763FEB3D8AEC522AB83B1FCF67B1BB0173455C4FE08B2605DDC7B7772B1394FF4348F1585A53167B06F5CC5B80AE
2,979,187 UART: [art] SIG.S = CF1F2F4D62D5848F85C77CA30A8CD91359AA05966E25AC910C9B7B80DB46E388DF466EB1589DC1E4BA47B49481B88D0E
3,002,558 UART: Caliptra RT
3,002,903 UART: [state] CFI Enabled
3,110,705 UART: [rt] RT listening for mailbox commands...
3,111,368 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,333 UART: [rt]cmd =0x46504c54, len=4
3,142,631 >>> mbox cmd response data (8 bytes)
3,142,836 UART: [rt] FIPS self test
3,143,164 UART: [kat] ++
3,143,316 UART: [kat] sha1
3,147,532 UART: [kat] SHA2-256
3,149,430 UART: Fatal Error: 0x90010002
3,150,969 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,150,974 >>> mbox cmd response: failed
3,150,974 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,150,979 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,043 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,402 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,246 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,254 >>> mbox cmd response: failed
812,254 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,260 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,657 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,951 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,044 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,052 >>> mbox cmd response: failed
812,052 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,058 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,911 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,279 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,177 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,185 >>> mbox cmd response: failed
812,185 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,191 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,460 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,658 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,283 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,291 >>> mbox cmd response: failed
812,291 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,297 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,358 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,274 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,376 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,384 >>> mbox cmd response: failed
811,384 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,390 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,859 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,743 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,036 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,044 >>> mbox cmd response: failed
812,044 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,050 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,967 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,405 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,947 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,955 >>> mbox cmd response: failed
811,955 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,961 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,188 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,042 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,975 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,983 >>> mbox cmd response: failed
812,983 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,989 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,624 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,026 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,224 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,232 >>> mbox cmd response: failed
812,232 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,238 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,687 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,133 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,024 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,032 >>> mbox cmd response: failed
812,032 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,038 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,573 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,561 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,403 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,411 >>> mbox cmd response: failed
812,411 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,417 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,248 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,270 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,973 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,981 >>> mbox cmd response: failed
811,981 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,987 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,256 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,892 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,716 UART: [state] LifecycleState = Unprovisioned
85,371 UART: [state] DebugLocked = No
86,105 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,697 UART: [kat] SHA2-256
881,628 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,743 UART: [kat] ++
885,895 UART: [kat] sha1
890,123 UART: [kat] SHA2-256
892,061 UART: [kat] SHA2-384
894,828 UART: [kat] SHA2-512-ACC
896,729 UART: [kat] ECC-384
902,322 UART: [kat] HMAC-384Kdf
906,966 UART: [kat] LMS
1,475,162 UART: [kat] --
1,476,043 UART: [cold-reset] ++
1,476,617 UART: [fht] Storing FHT @ 0x50003400
1,479,362 UART: [idev] ++
1,479,530 UART: [idev] CDI.KEYID = 6
1,479,890 UART: [idev] SUBJECT.KEYID = 7
1,480,314 UART: [idev] UDS.KEYID = 0
1,480,659 ready_for_fw is high
1,480,659 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,487,994 UART: [idev] Erasing UDS.KEYID = 0
1,504,238 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,820 UART: [idev] --
1,514,019 UART: [ldev] ++
1,514,187 UART: [ldev] CDI.KEYID = 6
1,514,550 UART: [ldev] SUBJECT.KEYID = 5
1,514,976 UART: [ldev] AUTHORITY.KEYID = 7
1,515,439 UART: [ldev] FE.KEYID = 1
1,520,401 UART: [ldev] Erasing FE.KEYID = 1
1,545,994 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,958 UART: [ldev] --
1,585,385 UART: [fwproc] Waiting for Commands...
1,586,148 UART: [fwproc] Received command 0x46574c44
1,586,939 UART: [fwproc] Received Image of size 115196 bytes
2,893,997 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,019 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,371 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,087,434 >>> mbox cmd response: success
3,088,658 UART: [afmc] ++
3,088,826 UART: [afmc] CDI.KEYID = 6
3,089,188 UART: [afmc] SUBJECT.KEYID = 7
3,089,613 UART: [afmc] AUTHORITY.KEYID = 5
3,124,716 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,332 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,112 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,840 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,725 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,415 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,272 UART: [afmc] --
3,168,384 UART: [cold-reset] --
3,169,310 UART: [state] Locking Datavault
3,170,277 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,881 UART: [state] Locking ICCM
3,171,381 UART: [exit] Launching FMC @ 0x40000130
3,176,710 UART:
3,176,726 UART: Running Caliptra FMC ...
3,177,134 UART:
3,177,188 UART: [state] CFI Enabled
3,187,365 UART: [fht] FMC Alias Private Key: 7
3,295,552 UART: [art] Extend RT PCRs Done
3,295,980 UART: [art] Lock RT PCRs Done
3,297,560 UART: [art] Populate DV Done
3,305,987 UART: [fht] FMC Alias Private Key: 7
3,306,923 UART: [art] Derive CDI
3,307,203 UART: [art] Store in in slot 0x4
3,392,862 UART: [art] Derive Key Pair
3,393,222 UART: [art] Store priv key in slot 0x5
3,406,820 UART: [art] Derive Key Pair - Done
3,421,581 UART: [art] Signing Cert with AUTHO
3,422,061 UART: RITY.KEYID = 7
3,437,303 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,068 UART: [art] PUB.X = D9419DD852E8BC6C336C514167ADF322B658FF6175E7D0E569AAB3D1DD1A2BDFD555AFD574CCD82FCEBE36F56B39B3F8
3,444,862 UART: [art] PUB.Y = CDD28FB2C768AC38D0D63736E5BCA623892ABECB8F9A2F1520E79B0537F4780EB803BB543F9E2E04428D14D044E60698
3,451,805 UART: [art] SIG.R = 4325125D39C856B423D8A774BF46BB0BE00112001E22F86DCDFCBCD9E37EF9761B914953405AE4269F548ECA56AF577B
3,458,553 UART: [art] SIG.S = 4AF38FEF934C4AA96FB19FA568B9C1CDAB412E8FB0262CACFBE9FBD57367B936FA548DBD0ABE14D0AA76A900A6D5A55E
3,482,985 UART: Caliptra RT
3,483,238 UART: [state] CFI Enabled
3,590,842 UART: [rt] RT listening for mailbox commands...
3,591,505 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,148 UART: [rt]cmd =0x46504c54, len=4
3,622,532 >>> mbox cmd response data (8 bytes)
3,622,717 UART: [rt] FIPS self test
3,623,045 UART: [kat] ++
3,623,197 UART: [kat] sha1
3,627,379 UART: [kat] SHA2-256
3,629,401 UART: [kat] SHA2-384
3,632,252 UART: [kat] SHA2-512-ACC
3,632,657 UART: Droping operation
3,633,104 UART: Fatal Error: 0x90050002
3,634,643 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,634,648 >>> mbox cmd response: failed
3,634,648 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,634,653 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,535 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,009 UART: [kat] SHA2-256
881,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,055 UART: [kat] ++
886,207 UART: [kat] sha1
890,461 UART: [kat] SHA2-256
892,399 UART: [kat] SHA2-384
895,122 UART: [kat] SHA2-512-ACC
897,023 UART: [kat] ECC-384
902,250 UART: [kat] HMAC-384Kdf
906,962 UART: [kat] LMS
1,475,158 UART: [kat] --
1,476,131 UART: [cold-reset] ++
1,476,661 UART: [fht] Storing FHT @ 0x50003400
1,479,444 UART: [idev] ++
1,479,612 UART: [idev] CDI.KEYID = 6
1,479,972 UART: [idev] SUBJECT.KEYID = 7
1,480,396 UART: [idev] UDS.KEYID = 0
1,480,741 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,368 UART: [idev] Erasing UDS.KEYID = 0
1,505,024 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,564 UART: [idev] --
1,514,655 UART: [ldev] ++
1,514,823 UART: [ldev] CDI.KEYID = 6
1,515,186 UART: [ldev] SUBJECT.KEYID = 5
1,515,612 UART: [ldev] AUTHORITY.KEYID = 7
1,516,075 UART: [ldev] FE.KEYID = 1
1,521,451 UART: [ldev] Erasing FE.KEYID = 1
1,546,536 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,614 UART: [ldev] --
1,585,885 UART: [fwproc] Waiting for Commands...
1,586,554 UART: [fwproc] Received command 0x46574c44
1,587,345 UART: [fwproc] Received Image of size 115196 bytes
2,894,439 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,791 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,143 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,348 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,115 ready_for_fw is high
1,363,115 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,941,274 >>> mbox cmd response: success
3,002,716 UART:
3,002,732 UART: Running Caliptra FMC ...
3,003,140 UART:
3,003,194 UART: [state] CFI Enabled
3,013,579 UART: [fht] FMC Alias Private Key: 7
3,121,444 UART: [art] Extend RT PCRs Done
3,121,872 UART: [art] Lock RT PCRs Done
3,123,510 UART: [art] Populate DV Done
3,131,709 UART: [fht] FMC Alias Private Key: 7
3,132,663 UART: [art] Derive CDI
3,132,943 UART: [art] Store in in slot 0x4
3,218,664 UART: [art] Derive Key Pair
3,219,024 UART: [art] Store priv key in slot 0x5
3,232,072 UART: [art] Derive Key Pair - Done
3,246,593 UART: [art] Signing Cert with AUTHO
3,247,073 UART: RITY.KEYID = 7
3,262,455 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,220 UART: [art] PUB.X = 88E1EC0641FC8821C1B0D8C15741D3C3B9A8B83B24FD8FB324E99B3B04F6D5D0F283C942531D65617E73EA4E09FF1763
3,269,987 UART: [art] PUB.Y = 3E17D1FFF5D3B1213A5F8970B80A4B215B206461DC21A4886CE959E2039179199093CE36BA98AA8F052E9DAEC4EBF57D
3,276,936 UART: [art] SIG.R = 00C5467039B75A58DC203D5774B7A0047122946DB3B37BCE036D5828E04E0DA5361ED8EA8772885763C17BFC7A3674E8
3,283,671 UART: [art] SIG.S = 6A6FA151CB3C9B030130CCEA0D253972122FB8C91252314D7577C845551C3D76A3680DE4CEF3197895DAB2B89660D858
3,307,526 UART: Caliptra RT
3,307,779 UART: [state] CFI Enabled
3,416,984 UART: [rt] RT listening for mailbox commands...
3,417,647 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,746 UART: [rt]cmd =0x46504c54, len=4
3,448,878 >>> mbox cmd response data (8 bytes)
3,449,065 UART: [rt] FIPS self test
3,449,393 UART: [kat] ++
3,449,545 UART: [kat] sha1
3,453,801 UART: [kat] SHA2-256
3,455,823 UART: [kat] SHA2-384
3,458,866 UART: [kat] SHA2-512-ACC
3,459,271 UART: Droping operation
3,459,878 UART: Fatal Error: 0x90050002
3,461,417 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,461,422 >>> mbox cmd response: failed
3,461,422 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,461,427 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,479 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,937,248 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,574 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,288 UART: [kat] SHA2-256
882,219 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,334 UART: [kat] ++
886,486 UART: [kat] sha1
890,668 UART: [kat] SHA2-256
892,606 UART: [kat] SHA2-384
895,335 UART: [kat] SHA2-512-ACC
897,236 UART: [kat] ECC-384
902,663 UART: [kat] HMAC-384Kdf
907,507 UART: [kat] LMS
1,475,703 UART: [kat] --
1,476,876 UART: [cold-reset] ++
1,477,452 UART: [fht] Storing FHT @ 0x50003400
1,480,297 UART: [idev] ++
1,480,465 UART: [idev] CDI.KEYID = 6
1,480,825 UART: [idev] SUBJECT.KEYID = 7
1,481,249 UART: [idev] UDS.KEYID = 0
1,481,594 ready_for_fw is high
1,481,594 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,219 UART: [idev] Erasing UDS.KEYID = 0
1,506,553 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,123 UART: [idev] --
1,516,246 UART: [ldev] ++
1,516,414 UART: [ldev] CDI.KEYID = 6
1,516,777 UART: [ldev] SUBJECT.KEYID = 5
1,517,203 UART: [ldev] AUTHORITY.KEYID = 7
1,517,666 UART: [ldev] FE.KEYID = 1
1,522,894 UART: [ldev] Erasing FE.KEYID = 1
1,548,753 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,761 UART: [ldev] --
1,588,274 UART: [fwproc] Waiting for Commands...
1,589,135 UART: [fwproc] Received command 0x46574c44
1,589,926 UART: [fwproc] Received Image of size 115196 bytes
2,898,472 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,950 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,302 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,092,461 >>> mbox cmd response: success
3,093,677 UART: [afmc] ++
3,093,845 UART: [afmc] CDI.KEYID = 6
3,094,207 UART: [afmc] SUBJECT.KEYID = 7
3,094,632 UART: [afmc] AUTHORITY.KEYID = 5
3,129,981 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,146,443 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,147,223 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,951 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,836 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,164,526 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,172,415 UART: [afmc] --
3,173,495 UART: [cold-reset] --
3,174,463 UART: [state] Locking Datavault
3,175,722 UART: [state] Locking PCR0, PCR1 and PCR31
3,176,326 UART: [state] Locking ICCM
3,176,792 UART: [exit] Launching FMC @ 0x40000130
3,182,121 UART:
3,182,137 UART: Running Caliptra FMC ...
3,182,545 UART:
3,182,688 UART: [state] CFI Enabled
3,193,093 UART: [fht] FMC Alias Private Key: 7
3,300,984 UART: [art] Extend RT PCRs Done
3,301,412 UART: [art] Lock RT PCRs Done
3,303,174 UART: [art] Populate DV Done
3,311,507 UART: [fht] FMC Alias Private Key: 7
3,312,569 UART: [art] Derive CDI
3,312,849 UART: [art] Store in in slot 0x4
3,398,600 UART: [art] Derive Key Pair
3,398,960 UART: [art] Store priv key in slot 0x5
3,411,944 UART: [art] Derive Key Pair - Done
3,426,830 UART: [art] Signing Cert with AUTHO
3,427,310 UART: RITY.KEYID = 7
3,442,774 UART: [art] Erasing AUTHORITY.KEYID = 7
3,443,539 UART: [art] PUB.X = 2B1E2910700DD8E7BC80A34AD3CF3FA9CAA9AF091C6B47170F4CA7EF0F52512C193CEA2ABB3781AB1AB89D2404C5C181
3,450,314 UART: [art] PUB.Y = C5AD0C9B1FA461862198B532EBE97D9437697067F938451A00203EE3255DE110A3325808D280E5631291D2AD0D774A56
3,457,223 UART: [art] SIG.R = B02D2720DA65DA1F1CD063E7985EAF32BEFC34D1A82128E6FFA829E8BBA713892DE7001CFAD4036C6F1E37DAAC2C814E
3,463,990 UART: [art] SIG.S = DDA6B6B07ACBAF713E64E32857550505051B67159EFFEE6DC533FB2E166632BCAF18FB078E9B64BD8EA2A9BAA095161A
3,487,273 UART: Caliptra RT
3,487,618 UART: [state] CFI Enabled
3,596,318 UART: [rt] RT listening for mailbox commands...
3,596,981 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,410 UART: [rt]cmd =0x46504c54, len=4
3,627,478 >>> mbox cmd response data (8 bytes)
3,627,713 UART: [rt] FIPS self test
3,628,041 UART: [kat] ++
3,628,193 UART: [kat] sha1
3,632,587 UART: [kat] SHA2-256
3,634,609 UART: [kat] SHA2-384
3,637,258 UART: [kat] SHA2-512-ACC
3,637,663 UART: Droping operation
3,638,186 UART: Fatal Error: 0x90050002
3,639,725 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,639,730 >>> mbox cmd response: failed
3,639,730 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,639,735 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,829 UART: [state] LifecycleState = Unprovisioned
86,484 UART: [state] DebugLocked = No
86,986 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,528 UART: [kat] SHA2-256
882,459 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,574 UART: [kat] ++
886,726 UART: [kat] sha1
890,988 UART: [kat] SHA2-256
892,926 UART: [kat] SHA2-384
895,803 UART: [kat] SHA2-512-ACC
897,704 UART: [kat] ECC-384
903,133 UART: [kat] HMAC-384Kdf
907,947 UART: [kat] LMS
1,476,143 UART: [kat] --
1,477,046 UART: [cold-reset] ++
1,477,570 UART: [fht] Storing FHT @ 0x50003400
1,480,359 UART: [idev] ++
1,480,527 UART: [idev] CDI.KEYID = 6
1,480,887 UART: [idev] SUBJECT.KEYID = 7
1,481,311 UART: [idev] UDS.KEYID = 0
1,481,656 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,481 UART: [idev] Erasing UDS.KEYID = 0
1,506,173 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,751 UART: [idev] --
1,515,726 UART: [ldev] ++
1,515,894 UART: [ldev] CDI.KEYID = 6
1,516,257 UART: [ldev] SUBJECT.KEYID = 5
1,516,683 UART: [ldev] AUTHORITY.KEYID = 7
1,517,146 UART: [ldev] FE.KEYID = 1
1,522,346 UART: [ldev] Erasing FE.KEYID = 1
1,547,537 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,257 UART: [ldev] --
1,586,640 UART: [fwproc] Waiting for Commands...
1,587,439 UART: [fwproc] Received command 0x46574c44
1,588,230 UART: [fwproc] Received Image of size 115196 bytes
2,896,178 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,980 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,332 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,367 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,720 ready_for_fw is high
1,362,720 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,593 >>> mbox cmd response: success
3,000,417 UART:
3,000,433 UART: Running Caliptra FMC ...
3,000,841 UART:
3,000,984 UART: [state] CFI Enabled
3,011,441 UART: [fht] FMC Alias Private Key: 7
3,118,922 UART: [art] Extend RT PCRs Done
3,119,350 UART: [art] Lock RT PCRs Done
3,121,002 UART: [art] Populate DV Done
3,129,103 UART: [fht] FMC Alias Private Key: 7
3,130,223 UART: [art] Derive CDI
3,130,503 UART: [art] Store in in slot 0x4
3,216,270 UART: [art] Derive Key Pair
3,216,630 UART: [art] Store priv key in slot 0x5
3,230,684 UART: [art] Derive Key Pair - Done
3,245,744 UART: [art] Signing Cert with AUTHO
3,246,224 UART: RITY.KEYID = 7
3,261,676 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,441 UART: [art] PUB.X = 4BC2258029771952D5A48C7CD5627E129D71D79058387A8EC54354BE8FAFBDCA37B32EE6EF7FD909F19CF6998A5ECDB1
3,269,220 UART: [art] PUB.Y = 2135282A8022E5F70543BEA6114CCA9F6A836AC2083E6562C50D0CE9C63FA8B46FFE2166EC305993A25FA2E2EAF848E0
3,276,166 UART: [art] SIG.R = A10DCF790A2AEF46CD60D04FEECC56D2964BEC94DBF861BC22A54ED1E0ED52BD4877B9C6974E439CD7B83C257922594E
3,282,950 UART: [art] SIG.S = A69A68D438F0BEF7126FAA5C1C55D36DB67463A1C01E77D572C745049232A28FE244414DB8549FA20E7BE43478F8FC07
3,306,990 UART: Caliptra RT
3,307,335 UART: [state] CFI Enabled
3,415,811 UART: [rt] RT listening for mailbox commands...
3,416,474 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,595 UART: [rt]cmd =0x46504c54, len=4
3,447,543 >>> mbox cmd response data (8 bytes)
3,447,718 UART: [rt] FIPS self test
3,448,046 UART: [kat] ++
3,448,198 UART: [kat] sha1
3,452,586 UART: [kat] SHA2-256
3,454,608 UART: [kat] SHA2-384
3,457,481 UART: [kat] SHA2-512-ACC
3,457,886 UART: Droping operation
3,458,479 UART: Fatal Error: 0x90050002
3,460,018 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,460,023 >>> mbox cmd response: failed
3,460,023 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,460,028 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,906 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,647 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,325 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
893,204 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,329 UART: [kat] ++
897,481 UART: [kat] sha1
901,565 UART: [kat] SHA2-256
903,505 UART: [kat] SHA2-384
906,270 UART: [kat] SHA2-512-ACC
908,171 UART: [kat] ECC-384
917,692 UART: [kat] HMAC-384Kdf
922,118 UART: [kat] LMS
1,170,446 UART: [kat] --
1,171,351 UART: [cold-reset] ++
1,171,871 UART: [fht] FHT @ 0x50003400
1,174,610 UART: [idev] ++
1,174,778 UART: [idev] CDI.KEYID = 6
1,175,138 UART: [idev] SUBJECT.KEYID = 7
1,175,562 UART: [idev] UDS.KEYID = 0
1,175,907 ready_for_fw is high
1,175,907 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,124 UART: [idev] Erasing UDS.KEYID = 0
1,199,891 UART: [idev] Sha1 KeyId Algorithm
1,208,483 UART: [idev] --
1,209,625 UART: [ldev] ++
1,209,793 UART: [ldev] CDI.KEYID = 6
1,210,156 UART: [ldev] SUBJECT.KEYID = 5
1,210,582 UART: [ldev] AUTHORITY.KEYID = 7
1,211,045 UART: [ldev] FE.KEYID = 1
1,216,257 UART: [ldev] Erasing FE.KEYID = 1
1,242,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,165 UART: [ldev] --
1,281,636 UART: [fwproc] Wait for Commands...
1,282,244 UART: [fwproc] Recv command 0x46574c44
1,282,972 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,062 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,366 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,431 >>> mbox cmd response: success
2,785,663 UART: [afmc] ++
2,785,831 UART: [afmc] CDI.KEYID = 6
2,786,193 UART: [afmc] SUBJECT.KEYID = 7
2,786,618 UART: [afmc] AUTHORITY.KEYID = 5
2,821,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,186 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,934 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,662 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,547 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,266 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,170 UART: [afmc] --
2,865,282 UART: [cold-reset] --
2,866,050 UART: [state] Locking Datavault
2,867,213 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,817 UART: [state] Locking ICCM
2,868,449 UART: [exit] Launching FMC @ 0x40000130
2,873,778 UART:
2,873,794 UART: Running Caliptra FMC ...
2,874,202 UART:
2,874,256 UART: [state] CFI Enabled
2,884,553 UART: [fht] FMC Alias Private Key: 7
2,992,848 UART: [art] Extend RT PCRs Done
2,993,276 UART: [art] Lock RT PCRs Done
2,994,704 UART: [art] Populate DV Done
3,003,049 UART: [fht] FMC Alias Private Key: 7
3,004,029 UART: [art] Derive CDI
3,004,309 UART: [art] Store in in slot 0x4
3,090,042 UART: [art] Derive Key Pair
3,090,402 UART: [art] Store priv key in slot 0x5
3,103,830 UART: [art] Derive Key Pair - Done
3,118,547 UART: [art] Signing Cert with AUTHO
3,119,027 UART: RITY.KEYID = 7
3,133,735 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,500 UART: [art] PUB.X = 4ACC9F4C17DF2AB4E1B0C6584E7CD0FD43127D63AF3686AD9C7C86A86393C0AFDB2B0113973FBDB2AA71956EB77BCC1C
3,141,291 UART: [art] PUB.Y = 38D26BBC3183DD05BB8E099111396F96AE7B2130B209CB0A15DF735506B71B94AD2C5718BD8A01601520C0EA6F5EF226
3,148,227 UART: [art] SIG.R = 599EEBE76CBAE6BD6D6AD8113ADFFB0EF900C14FA356F76F374CDA87540122FB598057CB50B9E968315725B297E8CAFD
3,154,987 UART: [art] SIG.S = 070BD8379BA91821B4639CB35E3A76101AA32E03AF22F097EC3E8C18B9619C1300629562ED8B85724562E2022D6B0793
3,178,497 UART: Caliptra RT
3,178,750 UART: [state] CFI Enabled
3,285,889 UART: [rt] RT listening for mailbox commands...
3,286,552 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,153 UART: [rt]cmd =0x46504c54, len=4
3,317,229 >>> mbox cmd response data (8 bytes)
3,317,596 UART: [rt] FIPS self test
3,317,924 UART: [kat] ++
3,318,076 UART: [kat] sha1
3,322,446 UART: [kat] SHA2-256
3,324,468 UART: [kat] SHA2-384
3,327,127 UART: [kat] SHA2-512-ACC
3,327,532 UART: Droping operation
3,327,931 UART: Fatal Error: 0x90050002
3,329,470 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,475 >>> mbox cmd response: failed
3,329,475 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,480 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
893,154 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,279 UART: [kat] ++
897,431 UART: [kat] sha1
901,883 UART: [kat] SHA2-256
903,823 UART: [kat] SHA2-384
906,646 UART: [kat] SHA2-512-ACC
908,547 UART: [kat] ECC-384
918,860 UART: [kat] HMAC-384Kdf
923,324 UART: [kat] LMS
1,171,652 UART: [kat] --
1,172,649 UART: [cold-reset] ++
1,173,181 UART: [fht] FHT @ 0x50003400
1,175,674 UART: [idev] ++
1,175,842 UART: [idev] CDI.KEYID = 6
1,176,202 UART: [idev] SUBJECT.KEYID = 7
1,176,626 UART: [idev] UDS.KEYID = 0
1,176,971 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,548 UART: [idev] Erasing UDS.KEYID = 0
1,201,383 UART: [idev] Sha1 KeyId Algorithm
1,209,811 UART: [idev] --
1,210,711 UART: [ldev] ++
1,210,879 UART: [ldev] CDI.KEYID = 6
1,211,242 UART: [ldev] SUBJECT.KEYID = 5
1,211,668 UART: [ldev] AUTHORITY.KEYID = 7
1,212,131 UART: [ldev] FE.KEYID = 1
1,217,005 UART: [ldev] Erasing FE.KEYID = 1
1,243,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,179 UART: [ldev] --
1,282,672 UART: [fwproc] Wait for Commands...
1,283,242 UART: [fwproc] Recv command 0x46574c44
1,283,970 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,874 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,178 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,259 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,515 ready_for_fw is high
1,059,515 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,636,559 >>> mbox cmd response: success
2,698,769 UART:
2,698,785 UART: Running Caliptra FMC ...
2,699,193 UART:
2,699,247 UART: [state] CFI Enabled
2,710,096 UART: [fht] FMC Alias Private Key: 7
2,818,031 UART: [art] Extend RT PCRs Done
2,818,459 UART: [art] Lock RT PCRs Done
2,819,837 UART: [art] Populate DV Done
2,828,234 UART: [fht] FMC Alias Private Key: 7
2,829,318 UART: [art] Derive CDI
2,829,598 UART: [art] Store in in slot 0x4
2,915,469 UART: [art] Derive Key Pair
2,915,829 UART: [art] Store priv key in slot 0x5
2,929,013 UART: [art] Derive Key Pair - Done
2,943,909 UART: [art] Signing Cert with AUTHO
2,944,389 UART: RITY.KEYID = 7
2,959,891 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,656 UART: [art] PUB.X = DA05FA9DEBDEBA1ECB4058DC8C0DE90AC6226246BEF2A1661ED18ED20812ECFB356652E534388B6804DD2688626EAB75
2,967,429 UART: [art] PUB.Y = 0B8991E604620D621CAEF8B5EBE77E72B67183652980D0A0620C4C347AED815A0061B6EFEAD1147A113BA1DBCC9BF8F9
2,974,357 UART: [art] SIG.R = AF5BFDFF457D30C079F4DB9DF5CE59BB2ED354F4149420D7617105AACDCAFE1ACD08F590A4CDEB5B3FDA2A847B915041
2,981,149 UART: [art] SIG.S = 92277CDC2776C2963974F359D76231EC08D49D009B25FDB0F48076DB5E50A89425ABC8511CBCD6C2C2BD9084056C9B58
3,004,950 UART: Caliptra RT
3,005,203 UART: [state] CFI Enabled
3,113,719 UART: [rt] RT listening for mailbox commands...
3,114,382 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,433 UART: [rt]cmd =0x46504c54, len=4
3,145,609 >>> mbox cmd response data (8 bytes)
3,145,850 UART: [rt] FIPS self test
3,146,178 UART: [kat] ++
3,146,330 UART: [kat] sha1
3,150,586 UART: [kat] SHA2-256
3,152,608 UART: [kat] SHA2-384
3,155,673 UART: [kat] SHA2-512-ACC
3,156,078 UART: Droping operation
3,156,465 UART: Fatal Error: 0x90050002
3,158,004 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,158,009 >>> mbox cmd response: failed
3,158,009 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,158,014 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,757 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,671 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
893,357 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,482 UART: [kat] ++
897,634 UART: [kat] sha1
901,912 UART: [kat] SHA2-256
903,852 UART: [kat] SHA2-384
906,507 UART: [kat] SHA2-512-ACC
908,408 UART: [kat] ECC-384
918,091 UART: [kat] HMAC-384Kdf
922,769 UART: [kat] LMS
1,171,097 UART: [kat] --
1,172,072 UART: [cold-reset] ++
1,172,428 UART: [fht] FHT @ 0x50003400
1,175,187 UART: [idev] ++
1,175,355 UART: [idev] CDI.KEYID = 6
1,175,715 UART: [idev] SUBJECT.KEYID = 7
1,176,139 UART: [idev] UDS.KEYID = 0
1,176,484 ready_for_fw is high
1,176,484 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,953 UART: [idev] Erasing UDS.KEYID = 0
1,201,802 UART: [idev] Sha1 KeyId Algorithm
1,210,264 UART: [idev] --
1,211,212 UART: [ldev] ++
1,211,380 UART: [ldev] CDI.KEYID = 6
1,211,743 UART: [ldev] SUBJECT.KEYID = 5
1,212,169 UART: [ldev] AUTHORITY.KEYID = 7
1,212,632 UART: [ldev] FE.KEYID = 1
1,217,538 UART: [ldev] Erasing FE.KEYID = 1
1,244,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,030 UART: [ldev] --
1,283,369 UART: [fwproc] Wait for Commands...
1,284,175 UART: [fwproc] Recv command 0x46574c44
1,284,903 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,161 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,465 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,566 >>> mbox cmd response: success
2,787,772 UART: [afmc] ++
2,787,940 UART: [afmc] CDI.KEYID = 6
2,788,302 UART: [afmc] SUBJECT.KEYID = 7
2,788,727 UART: [afmc] AUTHORITY.KEYID = 5
2,824,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,597 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,345 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,073 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,958 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,677 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,419 UART: [afmc] --
2,867,521 UART: [cold-reset] --
2,868,405 UART: [state] Locking Datavault
2,869,684 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,288 UART: [state] Locking ICCM
2,870,940 UART: [exit] Launching FMC @ 0x40000130
2,876,269 UART:
2,876,285 UART: Running Caliptra FMC ...
2,876,693 UART:
2,876,836 UART: [state] CFI Enabled
2,887,339 UART: [fht] FMC Alias Private Key: 7
2,995,840 UART: [art] Extend RT PCRs Done
2,996,268 UART: [art] Lock RT PCRs Done
2,998,078 UART: [art] Populate DV Done
3,006,365 UART: [fht] FMC Alias Private Key: 7
3,007,299 UART: [art] Derive CDI
3,007,579 UART: [art] Store in in slot 0x4
3,093,570 UART: [art] Derive Key Pair
3,093,930 UART: [art] Store priv key in slot 0x5
3,107,392 UART: [art] Derive Key Pair - Done
3,122,159 UART: [art] Signing Cert with AUTHO
3,122,639 UART: RITY.KEYID = 7
3,137,649 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,414 UART: [art] PUB.X = 4098DFFB5E546BF262747A7E2B46ADC3838B1E65066F790E925BA7394A6E75A75B770792A18D13B70897BB3A762D1187
3,145,170 UART: [art] PUB.Y = 1E0F6728959593E081267028C29B6CFD8F918D13AB8B7D50F3C6C7563854D51A01BE0F1A4DD0CDFCFF9792091EF0CC2E
3,152,118 UART: [art] SIG.R = 88943F68F4134CDFA46686A4BC15F921A1FF714685DAE67C941E2E9328F4DF3B50EC20B1A08440751916F0F83152CF0A
3,158,887 UART: [art] SIG.S = 14A5DA4C4B68D1160B5D854AC70E513D38DF1E67697479B1EB9F4D34E13DF524E3E76213A1677EBFD7786A42B87D9531
3,183,012 UART: Caliptra RT
3,183,357 UART: [state] CFI Enabled
3,291,316 UART: [rt] RT listening for mailbox commands...
3,291,979 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,896 UART: [rt]cmd =0x46504c54, len=4
3,322,998 >>> mbox cmd response data (8 bytes)
3,323,135 UART: [rt] FIPS self test
3,323,463 UART: [kat] ++
3,323,615 UART: [kat] sha1
3,327,687 UART: [kat] SHA2-256
3,329,709 UART: [kat] SHA2-384
3,332,618 UART: [kat] SHA2-512-ACC
3,333,023 UART: Droping operation
3,333,570 UART: Fatal Error: 0x90050002
3,335,109 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,335,114 >>> mbox cmd response: failed
3,335,114 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,335,119 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,873 UART: [state] LifecycleState = Unprovisioned
86,528 UART: [state] DebugLocked = No
87,152 UART: [state] WD Timer not started. Device not locked for debugging
88,411 UART: [kat] SHA2-256
894,061 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,186 UART: [kat] ++
898,338 UART: [kat] sha1
902,532 UART: [kat] SHA2-256
904,472 UART: [kat] SHA2-384
907,461 UART: [kat] SHA2-512-ACC
909,362 UART: [kat] ECC-384
918,751 UART: [kat] HMAC-384Kdf
923,279 UART: [kat] LMS
1,171,607 UART: [kat] --
1,172,480 UART: [cold-reset] ++
1,173,046 UART: [fht] FHT @ 0x50003400
1,175,603 UART: [idev] ++
1,175,771 UART: [idev] CDI.KEYID = 6
1,176,131 UART: [idev] SUBJECT.KEYID = 7
1,176,555 UART: [idev] UDS.KEYID = 0
1,176,900 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,611 UART: [idev] Erasing UDS.KEYID = 0
1,201,902 UART: [idev] Sha1 KeyId Algorithm
1,210,558 UART: [idev] --
1,211,768 UART: [ldev] ++
1,211,936 UART: [ldev] CDI.KEYID = 6
1,212,299 UART: [ldev] SUBJECT.KEYID = 5
1,212,725 UART: [ldev] AUTHORITY.KEYID = 7
1,213,188 UART: [ldev] FE.KEYID = 1
1,218,432 UART: [ldev] Erasing FE.KEYID = 1
1,244,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,654 UART: [ldev] --
1,284,019 UART: [fwproc] Wait for Commands...
1,284,741 UART: [fwproc] Recv command 0x46574c44
1,285,469 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,737 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,041 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,106 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,086 ready_for_fw is high
1,061,086 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,113 >>> mbox cmd response: success
2,701,747 UART:
2,701,763 UART: Running Caliptra FMC ...
2,702,171 UART:
2,702,314 UART: [state] CFI Enabled
2,712,843 UART: [fht] FMC Alias Private Key: 7
2,820,312 UART: [art] Extend RT PCRs Done
2,820,740 UART: [art] Lock RT PCRs Done
2,822,100 UART: [art] Populate DV Done
2,830,523 UART: [fht] FMC Alias Private Key: 7
2,831,631 UART: [art] Derive CDI
2,831,911 UART: [art] Store in in slot 0x4
2,917,534 UART: [art] Derive Key Pair
2,917,894 UART: [art] Store priv key in slot 0x5
2,931,276 UART: [art] Derive Key Pair - Done
2,945,967 UART: [art] Signing Cert with AUTHO
2,946,447 UART: RITY.KEYID = 7
2,961,673 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,438 UART: [art] PUB.X = 7E8E6CCE776284351A96EEA38B07CA8D6257376EA8460FEB3C125CDA7FECB547F25E92217A6D1008173457CDAA6E39A2
2,969,209 UART: [art] PUB.Y = 57F59BDFEC27379F1CEC7F61C07D2BAEF9B2638C3BDF1B73CF60B1B415AF720DC17A8855B830988425F91E11EBA40867
2,976,167 UART: [art] SIG.R = BC8A72407FB26395A25F183AAF0076FB706D8534D2EED878B63C4C2C2B0BBE911E19E25E3178DB77AC87C48B87ED6046
2,982,922 UART: [art] SIG.S = 942D1849F9ED00A28B7B6D182D83110ED185E2137A04C379D660E6EA62B17FF2509830B4454DFC2867B765F5621A495E
3,007,325 UART: Caliptra RT
3,007,670 UART: [state] CFI Enabled
3,115,646 UART: [rt] RT listening for mailbox commands...
3,116,309 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,956 UART: [rt]cmd =0x46504c54, len=4
3,147,298 >>> mbox cmd response data (8 bytes)
3,147,545 UART: [rt] FIPS self test
3,147,873 UART: [kat] ++
3,148,025 UART: [kat] sha1
3,152,243 UART: [kat] SHA2-256
3,154,265 UART: [kat] SHA2-384
3,157,126 UART: [kat] SHA2-512-ACC
3,157,531 UART: Droping operation
3,158,022 UART: Fatal Error: 0x90050002
3,159,561 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,159,566 >>> mbox cmd response: failed
3,159,566 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,159,571 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,628 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,361 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,668 UART: [state] LifecycleState = Unprovisioned
86,323 UART: [state] DebugLocked = No
87,019 UART: [state] WD Timer not started. Device not locked for debugging
88,310 UART: [kat] SHA2-256
891,860 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,989 UART: [kat] ++
896,141 UART: [kat] sha1
900,419 UART: [kat] SHA2-256
902,359 UART: [kat] SHA2-384
905,332 UART: [kat] SHA2-512-ACC
907,233 UART: [kat] ECC-384
917,318 UART: [kat] HMAC-384Kdf
922,016 UART: [kat] LMS
1,170,328 UART: [kat] --
1,171,145 UART: [cold-reset] ++
1,171,615 UART: [fht] FHT @ 0x50003400
1,174,275 UART: [idev] ++
1,174,443 UART: [idev] CDI.KEYID = 6
1,174,804 UART: [idev] SUBJECT.KEYID = 7
1,175,229 UART: [idev] UDS.KEYID = 0
1,175,575 ready_for_fw is high
1,175,575 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,057 UART: [idev] Erasing UDS.KEYID = 0
1,200,519 UART: [idev] Sha1 KeyId Algorithm
1,209,569 UART: [idev] --
1,210,740 UART: [ldev] ++
1,210,908 UART: [ldev] CDI.KEYID = 6
1,211,272 UART: [ldev] SUBJECT.KEYID = 5
1,211,699 UART: [ldev] AUTHORITY.KEYID = 7
1,212,162 UART: [ldev] FE.KEYID = 1
1,217,354 UART: [ldev] Erasing FE.KEYID = 1
1,243,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,064 UART: [ldev] --
1,282,374 UART: [fwproc] Wait for Commands...
1,283,047 UART: [fwproc] Recv command 0x46574c44
1,283,780 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,136 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,445 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,579 >>> mbox cmd response: success
2,786,738 UART: [afmc] ++
2,786,906 UART: [afmc] CDI.KEYID = 6
2,787,269 UART: [afmc] SUBJECT.KEYID = 7
2,787,695 UART: [afmc] AUTHORITY.KEYID = 5
2,823,022 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,947 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,676 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,559 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,278 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,061 UART: [afmc] --
2,865,957 UART: [cold-reset] --
2,866,655 UART: [state] Locking Datavault
2,867,872 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,476 UART: [state] Locking ICCM
2,868,918 UART: [exit] Launching FMC @ 0x40000130
2,874,247 UART:
2,874,263 UART: Running Caliptra FMC ...
2,874,671 UART:
2,874,725 UART: [state] CFI Enabled
2,885,336 UART: [fht] FMC Alias Private Key: 7
2,992,883 UART: [art] Extend RT PCRs Done
2,993,311 UART: [art] Lock RT PCRs Done
2,994,829 UART: [art] Populate DV Done
3,003,070 UART: [fht] FMC Alias Private Key: 7
3,004,186 UART: [art] Derive CDI
3,004,466 UART: [art] Store in in slot 0x4
3,090,131 UART: [art] Derive Key Pair
3,090,491 UART: [art] Store priv key in slot 0x5
3,104,097 UART: [art] Derive Key Pair - Done
3,118,684 UART: [art] Signing Cert with AUTHO
3,119,164 UART: RITY.KEYID = 7
3,134,696 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,461 UART: [art] PUB.X = 716A04C9E73D6B1C9B433E020563F4648270406C213B06FD01856DF205C99368BAA88C691972C29CFA1A81983D1CFFE8
3,142,211 UART: [art] PUB.Y = 81EB1ACDB14E8FA2B3B778AB9E5A4C908CFF4BFDDA919762AD9B0F3B6711D652DC33B7F6508FD93BD52079A3A99460DC
3,149,180 UART: [art] SIG.R = 10BDA276782CD5B8CE8D1DF57D5DDB11D26751C8B8CE72864D38F0A5899D9F52B99AA2458FA7EA2D5CCD0BC95CD77959
3,155,965 UART: [art] SIG.S = F06CB1886D7A69EBCFA1B6163BEBF1BDDBF3008994236C71CD9FC9D42FB801390EF51E9D06CFF726A394F0D62F815B8D
3,179,853 UART: Caliptra RT
3,180,106 UART: [state] CFI Enabled
3,289,113 UART: [rt] RT listening for mailbox commands...
3,289,776 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,677 UART: [rt]cmd =0x46504c54, len=4
3,320,995 >>> mbox cmd response data (8 bytes)
3,321,286 UART: [rt] FIPS self test
3,321,614 UART: [kat] ++
3,321,766 UART: [kat] sha1
3,325,868 UART: [kat] SHA2-256
3,327,890 UART: [kat] SHA2-384
3,330,679 UART: [kat] SHA2-512-ACC
3,331,084 UART: Droping operation
3,331,617 UART: Fatal Error: 0x90050002
3,333,156 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,333,161 >>> mbox cmd response: failed
3,333,161 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,333,166 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,077 UART: [state] WD Timer not started. Device not locked for debugging
87,410 UART: [kat] SHA2-256
890,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,089 UART: [kat] ++
895,241 UART: [kat] sha1
899,309 UART: [kat] SHA2-256
901,249 UART: [kat] SHA2-384
904,102 UART: [kat] SHA2-512-ACC
906,003 UART: [kat] ECC-384
915,218 UART: [kat] HMAC-384Kdf
919,952 UART: [kat] LMS
1,168,264 UART: [kat] --
1,169,095 UART: [cold-reset] ++
1,169,623 UART: [fht] FHT @ 0x50003400
1,172,373 UART: [idev] ++
1,172,541 UART: [idev] CDI.KEYID = 6
1,172,902 UART: [idev] SUBJECT.KEYID = 7
1,173,327 UART: [idev] UDS.KEYID = 0
1,173,673 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,577 UART: [idev] Erasing UDS.KEYID = 0
1,198,581 UART: [idev] Sha1 KeyId Algorithm
1,207,585 UART: [idev] --
1,208,578 UART: [ldev] ++
1,208,746 UART: [ldev] CDI.KEYID = 6
1,209,110 UART: [ldev] SUBJECT.KEYID = 5
1,209,537 UART: [ldev] AUTHORITY.KEYID = 7
1,210,000 UART: [ldev] FE.KEYID = 1
1,215,322 UART: [ldev] Erasing FE.KEYID = 1
1,241,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,302 UART: [ldev] --
1,280,732 UART: [fwproc] Wait for Commands...
1,281,513 UART: [fwproc] Recv command 0x46574c44
1,282,246 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,300 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,609 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,783 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,378 ready_for_fw is high
1,055,378 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,003 >>> mbox cmd response: success
2,695,825 UART:
2,695,841 UART: Running Caliptra FMC ...
2,696,249 UART:
2,696,303 UART: [state] CFI Enabled
2,706,960 UART: [fht] FMC Alias Private Key: 7
2,814,287 UART: [art] Extend RT PCRs Done
2,814,715 UART: [art] Lock RT PCRs Done
2,816,247 UART: [art] Populate DV Done
2,824,376 UART: [fht] FMC Alias Private Key: 7
2,825,396 UART: [art] Derive CDI
2,825,676 UART: [art] Store in in slot 0x4
2,911,731 UART: [art] Derive Key Pair
2,912,091 UART: [art] Store priv key in slot 0x5
2,925,085 UART: [art] Derive Key Pair - Done
2,939,688 UART: [art] Signing Cert with AUTHO
2,940,168 UART: RITY.KEYID = 7
2,955,252 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,017 UART: [art] PUB.X = 5A0BDF4056DF86E32107D1D7F7DE891CC21CAE6FABD466F0B3DC57A12D5CF2F4CBAFC1CAD5ED5DF165668FEFCA47EAC6
2,962,819 UART: [art] PUB.Y = 50357EC7FE5BEECA0BFB67B57266E913668F539D75242EB61760DC1054890011D9B11416CFF0F46F8DBD40E1C123AC83
2,969,750 UART: [art] SIG.R = A3942A41A4B4D62632F08E93803C5C15B4355CB0B8D731445FBC01C32F4198BFA31C115C7DBBD915FA710377F038FC80
2,976,518 UART: [art] SIG.S = 0A8B8317BB7AD13F04F94E5D12470CC57CF11D012BD17CFFE7F9A9A4BA6F0ED0E572C911E12AD33CAF869AB4CF94870B
2,999,945 UART: Caliptra RT
3,000,198 UART: [state] CFI Enabled
3,107,791 UART: [rt] RT listening for mailbox commands...
3,108,454 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,231 UART: [rt]cmd =0x46504c54, len=4
3,139,513 >>> mbox cmd response data (8 bytes)
3,139,718 UART: [rt] FIPS self test
3,140,046 UART: [kat] ++
3,140,198 UART: [kat] sha1
3,144,634 UART: [kat] SHA2-256
3,146,656 UART: [kat] SHA2-384
3,149,579 UART: [kat] SHA2-512-ACC
3,149,984 UART: Droping operation
3,150,397 UART: Fatal Error: 0x90050002
3,151,936 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,151,941 >>> mbox cmd response: failed
3,151,941 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,151,946 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,086 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,087 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
891,315 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,444 UART: [kat] ++
895,596 UART: [kat] sha1
899,786 UART: [kat] SHA2-256
901,726 UART: [kat] SHA2-384
904,579 UART: [kat] SHA2-512-ACC
906,480 UART: [kat] ECC-384
916,095 UART: [kat] HMAC-384Kdf
920,755 UART: [kat] LMS
1,169,067 UART: [kat] --
1,170,082 UART: [cold-reset] ++
1,170,544 UART: [fht] FHT @ 0x50003400
1,173,260 UART: [idev] ++
1,173,428 UART: [idev] CDI.KEYID = 6
1,173,789 UART: [idev] SUBJECT.KEYID = 7
1,174,214 UART: [idev] UDS.KEYID = 0
1,174,560 ready_for_fw is high
1,174,560 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,126 UART: [idev] Erasing UDS.KEYID = 0
1,199,260 UART: [idev] Sha1 KeyId Algorithm
1,208,252 UART: [idev] --
1,209,381 UART: [ldev] ++
1,209,549 UART: [ldev] CDI.KEYID = 6
1,209,913 UART: [ldev] SUBJECT.KEYID = 5
1,210,340 UART: [ldev] AUTHORITY.KEYID = 7
1,210,803 UART: [ldev] FE.KEYID = 1
1,216,085 UART: [ldev] Erasing FE.KEYID = 1
1,242,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,735 UART: [ldev] --
1,281,079 UART: [fwproc] Wait for Commands...
1,281,808 UART: [fwproc] Recv command 0x46574c44
1,282,541 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,171 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,480 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,782,612 >>> mbox cmd response: success
2,783,875 UART: [afmc] ++
2,784,043 UART: [afmc] CDI.KEYID = 6
2,784,406 UART: [afmc] SUBJECT.KEYID = 7
2,784,832 UART: [afmc] AUTHORITY.KEYID = 5
2,820,811 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,846 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,575 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,458 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,177 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,138 UART: [afmc] --
2,864,162 UART: [cold-reset] --
2,865,146 UART: [state] Locking Datavault
2,866,389 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,993 UART: [state] Locking ICCM
2,867,625 UART: [exit] Launching FMC @ 0x40000130
2,872,954 UART:
2,872,970 UART: Running Caliptra FMC ...
2,873,378 UART:
2,873,521 UART: [state] CFI Enabled
2,884,510 UART: [fht] FMC Alias Private Key: 7
2,992,703 UART: [art] Extend RT PCRs Done
2,993,131 UART: [art] Lock RT PCRs Done
2,994,755 UART: [art] Populate DV Done
3,002,852 UART: [fht] FMC Alias Private Key: 7
3,003,970 UART: [art] Derive CDI
3,004,250 UART: [art] Store in in slot 0x4
3,089,777 UART: [art] Derive Key Pair
3,090,137 UART: [art] Store priv key in slot 0x5
3,103,573 UART: [art] Derive Key Pair - Done
3,118,169 UART: [art] Signing Cert with AUTHO
3,118,649 UART: RITY.KEYID = 7
3,133,493 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,258 UART: [art] PUB.X = 6B1F1412ADFE0CEE801EB07CB07EAC65DEE8878ECF0AAF9ECE410A20391E31BCE880F3D0663DDEE5E821F7E4EBD5EBAB
3,141,055 UART: [art] PUB.Y = 22F29693634E35E611E6A1AF942BF42229E88B6DA7C84317D72524EBCAE6FD76C21E418A7040C657FC02E13E6BE77A1C
3,148,008 UART: [art] SIG.R = E93F36734A34703F1263A92F0ED1B9FA8407C003F7EF272DD3EF5AB541290EE737B0FCD42CA6468D46F918F872BA9F09
3,154,771 UART: [art] SIG.S = 979902BD228807FD2C48E43195B5DB8F75B11650732A5BE5C6000969AB499AFF03B4ABF34DB26E04773E06D60D25362C
3,178,093 UART: Caliptra RT
3,178,438 UART: [state] CFI Enabled
3,286,182 UART: [rt] RT listening for mailbox commands...
3,286,845 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,330 UART: [rt]cmd =0x46504c54, len=4
3,317,484 >>> mbox cmd response data (8 bytes)
3,317,821 UART: [rt] FIPS self test
3,318,149 UART: [kat] ++
3,318,301 UART: [kat] sha1
3,322,511 UART: [kat] SHA2-256
3,324,533 UART: [kat] SHA2-384
3,327,292 UART: [kat] SHA2-512-ACC
3,327,697 UART: Droping operation
3,328,190 UART: Fatal Error: 0x90050002
3,329,729 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,734 >>> mbox cmd response: failed
3,329,734 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,739 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,627 UART: [kat] SHA2-256
891,177 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,306 UART: [kat] ++
895,458 UART: [kat] sha1
899,786 UART: [kat] SHA2-256
901,726 UART: [kat] SHA2-384
904,351 UART: [kat] SHA2-512-ACC
906,252 UART: [kat] ECC-384
916,265 UART: [kat] HMAC-384Kdf
920,827 UART: [kat] LMS
1,169,139 UART: [kat] --
1,170,178 UART: [cold-reset] ++
1,170,734 UART: [fht] FHT @ 0x50003400
1,173,412 UART: [idev] ++
1,173,580 UART: [idev] CDI.KEYID = 6
1,173,941 UART: [idev] SUBJECT.KEYID = 7
1,174,366 UART: [idev] UDS.KEYID = 0
1,174,712 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,490 UART: [idev] Erasing UDS.KEYID = 0
1,199,940 UART: [idev] Sha1 KeyId Algorithm
1,208,816 UART: [idev] --
1,209,883 UART: [ldev] ++
1,210,051 UART: [ldev] CDI.KEYID = 6
1,210,415 UART: [ldev] SUBJECT.KEYID = 5
1,210,842 UART: [ldev] AUTHORITY.KEYID = 7
1,211,305 UART: [ldev] FE.KEYID = 1
1,216,503 UART: [ldev] Erasing FE.KEYID = 1
1,242,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,289 UART: [ldev] --
1,281,573 UART: [fwproc] Wait for Commands...
1,282,272 UART: [fwproc] Recv command 0x46574c44
1,283,005 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,519 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,828 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,010 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,727 ready_for_fw is high
1,055,727 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,858 >>> mbox cmd response: success
2,697,982 UART:
2,697,998 UART: Running Caliptra FMC ...
2,698,406 UART:
2,698,549 UART: [state] CFI Enabled
2,709,368 UART: [fht] FMC Alias Private Key: 7
2,816,973 UART: [art] Extend RT PCRs Done
2,817,401 UART: [art] Lock RT PCRs Done
2,818,711 UART: [art] Populate DV Done
2,827,006 UART: [fht] FMC Alias Private Key: 7
2,828,072 UART: [art] Derive CDI
2,828,352 UART: [art] Store in in slot 0x4
2,914,087 UART: [art] Derive Key Pair
2,914,447 UART: [art] Store priv key in slot 0x5
2,927,883 UART: [art] Derive Key Pair - Done
2,942,498 UART: [art] Signing Cert with AUTHO
2,942,978 UART: RITY.KEYID = 7
2,958,226 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,991 UART: [art] PUB.X = 1454EDBE61741460F087823E2C582B1254EF4325EEABD296C5680683C7426BAC80E4B5EBF09005D17BB62D4E3858D013
2,965,755 UART: [art] PUB.Y = 4E779A6870E789AA04A7BDA2951A07AC6E09CDA9470907F3A8000AB217421AD27428BCD57D39DF821A41992484F90752
2,972,660 UART: [art] SIG.R = F083FB9CBED9B0692412753F87524D230E7788A26242177882B4149451BDE5666BF329B5A5A7B8586D2A477CDEBFBF6B
2,979,429 UART: [art] SIG.S = 6D4F60ACBFBD3995635BA78EE5CAB670C114E67253BA20F085006D61B0641AFA023CF6D5F9D92A975F9E16886F210387
3,003,254 UART: Caliptra RT
3,003,599 UART: [state] CFI Enabled
3,112,070 UART: [rt] RT listening for mailbox commands...
3,112,733 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,494 UART: [rt]cmd =0x46504c54, len=4
3,143,708 >>> mbox cmd response data (8 bytes)
3,143,851 UART: [rt] FIPS self test
3,144,179 UART: [kat] ++
3,144,331 UART: [kat] sha1
3,148,685 UART: [kat] SHA2-256
3,150,707 UART: [kat] SHA2-384
3,153,662 UART: [kat] SHA2-512-ACC
3,154,067 UART: Droping operation
3,154,490 UART: Fatal Error: 0x90050002
3,156,029 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,156,034 >>> mbox cmd response: failed
3,156,034 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,156,039 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,795 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,786 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,172 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,180 >>> mbox cmd response: failed
813,180 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,186 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,995 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,759 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,652 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,660 >>> mbox cmd response: failed
812,660 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,666 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,305 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,341 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,415 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,423 >>> mbox cmd response: failed
813,423 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,429 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,960 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,892 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,027 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,035 >>> mbox cmd response: failed
813,035 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,041 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,568 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,858 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,240 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,248 >>> mbox cmd response: failed
813,248 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,254 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,789 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,483 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,596 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,604 >>> mbox cmd response: failed
812,604 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,610 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,507 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,221 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,941 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,949 >>> mbox cmd response: failed
812,949 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,955 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,030 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,598 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,917 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,925 >>> mbox cmd response: failed
812,925 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,931 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,970 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,038 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,984 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,992 >>> mbox cmd response: failed
812,992 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,998 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,853 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,451 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,218 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,226 >>> mbox cmd response: failed
813,226 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,232 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,291 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,955 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,755 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,763 >>> mbox cmd response: failed
812,763 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,769 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,866 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,596 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,743 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,751 >>> mbox cmd response: failed
813,751 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
813,757 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,618 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,666 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,619 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,177 UART: [kat] SHA2-256
882,108 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,223 UART: [kat] ++
886,375 UART: [kat] sha1
890,649 UART: [kat] SHA2-256
892,587 UART: [kat] SHA2-384
895,356 UART: [kat] SHA2-512-ACC
897,257 UART: [kat] ECC-384
902,452 UART: [kat] HMAC-384Kdf
907,074 UART: [kat] LMS
1,475,270 UART: [kat] --
1,476,211 UART: [cold-reset] ++
1,476,709 UART: [fht] Storing FHT @ 0x50003400
1,479,668 UART: [idev] ++
1,479,836 UART: [idev] CDI.KEYID = 6
1,480,196 UART: [idev] SUBJECT.KEYID = 7
1,480,620 UART: [idev] UDS.KEYID = 0
1,480,965 ready_for_fw is high
1,480,965 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,314 UART: [idev] Erasing UDS.KEYID = 0
1,504,928 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,706 UART: [idev] --
1,514,887 UART: [ldev] ++
1,515,055 UART: [ldev] CDI.KEYID = 6
1,515,418 UART: [ldev] SUBJECT.KEYID = 5
1,515,844 UART: [ldev] AUTHORITY.KEYID = 7
1,516,307 UART: [ldev] FE.KEYID = 1
1,521,203 UART: [ldev] Erasing FE.KEYID = 1
1,546,720 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,548 UART: [ldev] --
1,585,957 UART: [fwproc] Waiting for Commands...
1,586,750 UART: [fwproc] Received command 0x46574c44
1,587,541 UART: [fwproc] Received Image of size 115196 bytes
2,895,535 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,535 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,887 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,142 >>> mbox cmd response: success
3,090,346 UART: [afmc] ++
3,090,514 UART: [afmc] CDI.KEYID = 6
3,090,876 UART: [afmc] SUBJECT.KEYID = 7
3,091,301 UART: [afmc] AUTHORITY.KEYID = 5
3,125,766 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,310 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,090 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,818 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,703 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,393 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,220 UART: [afmc] --
3,169,340 UART: [cold-reset] --
3,170,130 UART: [state] Locking Datavault
3,171,425 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,029 UART: [state] Locking ICCM
3,172,501 UART: [exit] Launching FMC @ 0x40000130
3,177,830 UART:
3,177,846 UART: Running Caliptra FMC ...
3,178,254 UART:
3,178,308 UART: [state] CFI Enabled
3,188,849 UART: [fht] FMC Alias Private Key: 7
3,297,208 UART: [art] Extend RT PCRs Done
3,297,636 UART: [art] Lock RT PCRs Done
3,299,276 UART: [art] Populate DV Done
3,307,601 UART: [fht] FMC Alias Private Key: 7
3,308,715 UART: [art] Derive CDI
3,308,995 UART: [art] Store in in slot 0x4
3,394,374 UART: [art] Derive Key Pair
3,394,734 UART: [art] Store priv key in slot 0x5
3,408,094 UART: [art] Derive Key Pair - Done
3,422,859 UART: [art] Signing Cert with AUTHO
3,423,339 UART: RITY.KEYID = 7
3,438,619 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,384 UART: [art] PUB.X = 10CD82DAAD1B4E8E12211B0A90A9023D9FC183CFCC04D614EF6286C85130204E26204409430F43CCEC601F2CFD6039D4
3,446,145 UART: [art] PUB.Y = CF145539F1110091B5FC8D9B28F1C2724FABED236BB0979C4C7888601E3C8E59BFAC179792C58D03F05070863BDEDEBB
3,453,080 UART: [art] SIG.R = 28FDB900CE901696D393D629D674917AEA0582CE966B118B86C8AFFD32BF9F6486F7D11A32B363ADAE4A0A1D1E7A77BB
3,459,836 UART: [art] SIG.S = AF9F403F36A9743038AF45F8F0575572FED052F5BF9227C7CDEDBC6486F73E1E48841960C37C83841DA89D9AA05CEECF
3,484,121 UART: Caliptra RT
3,484,374 UART: [state] CFI Enabled
3,592,497 UART: [rt] RT listening for mailbox commands...
3,593,160 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,109 UART: [rt]cmd =0x46504c54, len=4
3,624,043 >>> mbox cmd response data (8 bytes)
3,624,176 UART: [rt] FIPS self test
3,624,504 UART: [kat] ++
3,624,656 UART: [kat] sha1
3,628,944 UART: [kat] SHA2-256
3,630,966 UART: [kat] SHA2-384
3,633,919 UART: [kat] SHA2-512-ACC
3,635,402 UART: Droping operation
3,636,017 UART: Fatal Error: 0x90050003
3,637,556 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,637,561 >>> mbox cmd response: failed
3,637,561 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,637,566 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,550 UART: [state] LifecycleState = Unprovisioned
86,205 UART: [state] DebugLocked = No
86,933 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,661 UART: [kat] SHA2-256
882,592 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,707 UART: [kat] ++
886,859 UART: [kat] sha1
891,119 UART: [kat] SHA2-256
893,057 UART: [kat] SHA2-384
896,022 UART: [kat] SHA2-512-ACC
897,923 UART: [kat] ECC-384
903,244 UART: [kat] HMAC-384Kdf
907,948 UART: [kat] LMS
1,476,144 UART: [kat] --
1,476,865 UART: [cold-reset] ++
1,477,237 UART: [fht] Storing FHT @ 0x50003400
1,480,158 UART: [idev] ++
1,480,326 UART: [idev] CDI.KEYID = 6
1,480,686 UART: [idev] SUBJECT.KEYID = 7
1,481,110 UART: [idev] UDS.KEYID = 0
1,481,455 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,210 UART: [idev] Erasing UDS.KEYID = 0
1,505,630 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,338 UART: [idev] --
1,515,555 UART: [ldev] ++
1,515,723 UART: [ldev] CDI.KEYID = 6
1,516,086 UART: [ldev] SUBJECT.KEYID = 5
1,516,512 UART: [ldev] AUTHORITY.KEYID = 7
1,516,975 UART: [ldev] FE.KEYID = 1
1,522,179 UART: [ldev] Erasing FE.KEYID = 1
1,547,542 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,074 UART: [ldev] --
1,586,399 UART: [fwproc] Waiting for Commands...
1,587,202 UART: [fwproc] Received command 0x46574c44
1,587,993 UART: [fwproc] Received Image of size 115196 bytes
2,896,017 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,709 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,061 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,310 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,323 ready_for_fw is high
1,362,323 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,074 >>> mbox cmd response: success
3,001,586 UART:
3,001,602 UART: Running Caliptra FMC ...
3,002,010 UART:
3,002,064 UART: [state] CFI Enabled
3,012,179 UART: [fht] FMC Alias Private Key: 7
3,120,258 UART: [art] Extend RT PCRs Done
3,120,686 UART: [art] Lock RT PCRs Done
3,122,384 UART: [art] Populate DV Done
3,130,587 UART: [fht] FMC Alias Private Key: 7
3,131,601 UART: [art] Derive CDI
3,131,881 UART: [art] Store in in slot 0x4
3,217,484 UART: [art] Derive Key Pair
3,217,844 UART: [art] Store priv key in slot 0x5
3,230,964 UART: [art] Derive Key Pair - Done
3,245,851 UART: [art] Signing Cert with AUTHO
3,246,331 UART: RITY.KEYID = 7
3,261,611 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,376 UART: [art] PUB.X = 4262E86EC4DB5667B806AFE9ABA30D88A66EDF0FA5F2FA3780808D462E7CEE273B8E8EC83E897BA723E9D271AF717DD8
3,269,155 UART: [art] PUB.Y = 6734BDE960587FDC845C3309914B81945B09FD4ADA08252C79E276B56185045AE1C5483F8CED577679B7B0048D0A6B40
3,276,083 UART: [art] SIG.R = B40C9D61DDADCD27EFFA519B5C27761590038413CD8B65F5F6F91EAA2D2DC8AAA67ED93F9529C1889AC28B3DC9AC87CB
3,282,871 UART: [art] SIG.S = 9C3802334D7D68D19177F5EB0E7C8B7FEFD6F1023632052FB6A541CE95E7A9CAA08FA78E9E469B711C56BAB1EBA6707C
3,306,460 UART: Caliptra RT
3,306,713 UART: [state] CFI Enabled
3,414,893 UART: [rt] RT listening for mailbox commands...
3,415,556 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,391 UART: [rt]cmd =0x46504c54, len=4
3,446,699 >>> mbox cmd response data (8 bytes)
3,446,900 UART: [rt] FIPS self test
3,447,228 UART: [kat] ++
3,447,380 UART: [kat] sha1
3,451,706 UART: [kat] SHA2-256
3,453,728 UART: [kat] SHA2-384
3,456,567 UART: [kat] SHA2-512-ACC
3,458,050 UART: Droping operation
3,458,659 UART: Fatal Error: 0x90050003
3,460,198 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,460,203 >>> mbox cmd response: failed
3,460,203 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,460,208 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,717 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,138 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,197 UART: [state] LifecycleState = Unprovisioned
86,852 UART: [state] DebugLocked = No
87,446 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,978 UART: [kat] SHA2-256
882,909 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,024 UART: [kat] ++
887,176 UART: [kat] sha1
891,518 UART: [kat] SHA2-256
893,456 UART: [kat] SHA2-384
896,355 UART: [kat] SHA2-512-ACC
898,256 UART: [kat] ECC-384
903,789 UART: [kat] HMAC-384Kdf
908,211 UART: [kat] LMS
1,476,407 UART: [kat] --
1,477,354 UART: [cold-reset] ++
1,477,768 UART: [fht] Storing FHT @ 0x50003400
1,480,613 UART: [idev] ++
1,480,781 UART: [idev] CDI.KEYID = 6
1,481,141 UART: [idev] SUBJECT.KEYID = 7
1,481,565 UART: [idev] UDS.KEYID = 0
1,481,910 ready_for_fw is high
1,481,910 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,481 UART: [idev] Erasing UDS.KEYID = 0
1,506,101 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,773 UART: [idev] --
1,515,722 UART: [ldev] ++
1,515,890 UART: [ldev] CDI.KEYID = 6
1,516,253 UART: [ldev] SUBJECT.KEYID = 5
1,516,679 UART: [ldev] AUTHORITY.KEYID = 7
1,517,142 UART: [ldev] FE.KEYID = 1
1,522,422 UART: [ldev] Erasing FE.KEYID = 1
1,547,763 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,611 UART: [ldev] --
1,587,018 UART: [fwproc] Waiting for Commands...
1,587,725 UART: [fwproc] Received command 0x46574c44
1,588,516 UART: [fwproc] Received Image of size 115196 bytes
2,895,256 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,294 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,646 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,873 >>> mbox cmd response: success
3,089,979 UART: [afmc] ++
3,090,147 UART: [afmc] CDI.KEYID = 6
3,090,509 UART: [afmc] SUBJECT.KEYID = 7
3,090,934 UART: [afmc] AUTHORITY.KEYID = 5
3,125,931 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,393 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,173 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,901 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,786 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,476 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,465 UART: [afmc] --
3,169,387 UART: [cold-reset] --
3,170,013 UART: [state] Locking Datavault
3,171,244 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,848 UART: [state] Locking ICCM
3,172,370 UART: [exit] Launching FMC @ 0x40000130
3,177,699 UART:
3,177,715 UART: Running Caliptra FMC ...
3,178,123 UART:
3,178,266 UART: [state] CFI Enabled
3,188,877 UART: [fht] FMC Alias Private Key: 7
3,297,024 UART: [art] Extend RT PCRs Done
3,297,452 UART: [art] Lock RT PCRs Done
3,299,222 UART: [art] Populate DV Done
3,307,335 UART: [fht] FMC Alias Private Key: 7
3,308,469 UART: [art] Derive CDI
3,308,749 UART: [art] Store in in slot 0x4
3,394,738 UART: [art] Derive Key Pair
3,395,098 UART: [art] Store priv key in slot 0x5
3,408,544 UART: [art] Derive Key Pair - Done
3,423,051 UART: [art] Signing Cert with AUTHO
3,423,531 UART: RITY.KEYID = 7
3,438,687 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,452 UART: [art] PUB.X = E8FB40F8E53FE5CD2A814E7E9E5201570E97C1B14B0C21879F86DBD18443ACAB82351207DF2EF1FE40C20033CFBF70CA
3,446,204 UART: [art] PUB.Y = 78459B9B8581ABC678DCAE134677B901632669FFD8A88BB8C97B9C259BF3B81EE0CB54EE12F0240AFED6E3F4E4F97D66
3,453,162 UART: [art] SIG.R = 4FFE7E7B5AFBD6D782CD158515EF64B2B19AB196D57620756B76B79B71F4120A2C62DAFDEAB26D5212EAE8BF1187FEA7
3,459,949 UART: [art] SIG.S = 353B2C85931F6205EA150F5F0AA5C21902282478DF86D8EF7940ED15FB641015200A867BB673743849814985ACE352B6
3,483,711 UART: Caliptra RT
3,484,056 UART: [state] CFI Enabled
3,592,684 UART: [rt] RT listening for mailbox commands...
3,593,347 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,406 UART: [rt]cmd =0x46504c54, len=4
3,624,698 >>> mbox cmd response data (8 bytes)
3,625,009 UART: [rt] FIPS self test
3,625,337 UART: [kat] ++
3,625,489 UART: [kat] sha1
3,629,917 UART: [kat] SHA2-256
3,631,939 UART: [kat] SHA2-384
3,634,624 UART: [kat] SHA2-512-ACC
3,636,107 UART: Droping operation
3,636,498 UART: Fatal Error: 0x90050003
3,638,037 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,638,042 >>> mbox cmd response: failed
3,638,042 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,638,047 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,768 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,268 UART: [kat] SHA2-256
882,199 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,314 UART: [kat] ++
886,466 UART: [kat] sha1
890,820 UART: [kat] SHA2-256
892,758 UART: [kat] SHA2-384
895,409 UART: [kat] SHA2-512-ACC
897,310 UART: [kat] ECC-384
903,089 UART: [kat] HMAC-384Kdf
907,617 UART: [kat] LMS
1,475,813 UART: [kat] --
1,476,564 UART: [cold-reset] ++
1,476,924 UART: [fht] Storing FHT @ 0x50003400
1,479,591 UART: [idev] ++
1,479,759 UART: [idev] CDI.KEYID = 6
1,480,119 UART: [idev] SUBJECT.KEYID = 7
1,480,543 UART: [idev] UDS.KEYID = 0
1,480,888 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,295 UART: [idev] Erasing UDS.KEYID = 0
1,504,797 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,443 UART: [idev] --
1,514,348 UART: [ldev] ++
1,514,516 UART: [ldev] CDI.KEYID = 6
1,514,879 UART: [ldev] SUBJECT.KEYID = 5
1,515,305 UART: [ldev] AUTHORITY.KEYID = 7
1,515,768 UART: [ldev] FE.KEYID = 1
1,521,026 UART: [ldev] Erasing FE.KEYID = 1
1,546,955 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,615 UART: [ldev] --
1,585,952 UART: [fwproc] Waiting for Commands...
1,586,595 UART: [fwproc] Received command 0x46574c44
1,587,386 UART: [fwproc] Received Image of size 115196 bytes
2,895,078 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,296 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,648 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,767 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,644 ready_for_fw is high
1,362,644 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,293 >>> mbox cmd response: success
3,001,181 UART:
3,001,197 UART: Running Caliptra FMC ...
3,001,605 UART:
3,001,748 UART: [state] CFI Enabled
3,012,409 UART: [fht] FMC Alias Private Key: 7
3,120,200 UART: [art] Extend RT PCRs Done
3,120,628 UART: [art] Lock RT PCRs Done
3,122,066 UART: [art] Populate DV Done
3,130,293 UART: [fht] FMC Alias Private Key: 7
3,131,225 UART: [art] Derive CDI
3,131,505 UART: [art] Store in in slot 0x4
3,217,610 UART: [art] Derive Key Pair
3,217,970 UART: [art] Store priv key in slot 0x5
3,231,528 UART: [art] Derive Key Pair - Done
3,246,479 UART: [art] Signing Cert with AUTHO
3,246,959 UART: RITY.KEYID = 7
3,261,951 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,716 UART: [art] PUB.X = C0F4618A99BA96B20759A07FA4649034FA2790EF7BD0BA855CB080B5A6ECF7BD38F4C2ABC163A7F9786A1693F4633766
3,269,491 UART: [art] PUB.Y = 682981FA3C58EE7E9A3C879D0235CE0AF913C8B7F72553D737F2022416F10A6E916EC6BDD0D501FD8B7B745290E1BD7D
3,276,434 UART: [art] SIG.R = D4E0AC19B217F24744DD8F365AA1EF99DC5037918934661F9D950218027FB515ACE355C6B94B29ED09241B8CEA439F3D
3,283,199 UART: [art] SIG.S = 8A1B0142B72CE20CB8910A7E8750B8DC2198A1BC0B775E4372F5F71784E7FBA08F000FA8781801649BC104C8C8C0D090
3,307,205 UART: Caliptra RT
3,307,550 UART: [state] CFI Enabled
3,415,570 UART: [rt] RT listening for mailbox commands...
3,416,233 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,928 UART: [rt]cmd =0x46504c54, len=4
3,447,102 >>> mbox cmd response data (8 bytes)
3,447,373 UART: [rt] FIPS self test
3,447,701 UART: [kat] ++
3,447,853 UART: [kat] sha1
3,452,113 UART: [kat] SHA2-256
3,454,135 UART: [kat] SHA2-384
3,456,876 UART: [kat] SHA2-512-ACC
3,458,359 UART: Droping operation
3,458,956 UART: Fatal Error: 0x90050003
3,460,495 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,460,500 >>> mbox cmd response: failed
3,460,500 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,460,505 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,914 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,797 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
893,196 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,321 UART: [kat] ++
897,473 UART: [kat] sha1
901,599 UART: [kat] SHA2-256
903,539 UART: [kat] SHA2-384
906,376 UART: [kat] SHA2-512-ACC
908,277 UART: [kat] ECC-384
918,188 UART: [kat] HMAC-384Kdf
922,836 UART: [kat] LMS
1,171,164 UART: [kat] --
1,171,707 UART: [cold-reset] ++
1,172,115 UART: [fht] FHT @ 0x50003400
1,174,868 UART: [idev] ++
1,175,036 UART: [idev] CDI.KEYID = 6
1,175,396 UART: [idev] SUBJECT.KEYID = 7
1,175,820 UART: [idev] UDS.KEYID = 0
1,176,165 ready_for_fw is high
1,176,165 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,570 UART: [idev] Erasing UDS.KEYID = 0
1,200,205 UART: [idev] Sha1 KeyId Algorithm
1,208,531 UART: [idev] --
1,209,559 UART: [ldev] ++
1,209,727 UART: [ldev] CDI.KEYID = 6
1,210,090 UART: [ldev] SUBJECT.KEYID = 5
1,210,516 UART: [ldev] AUTHORITY.KEYID = 7
1,210,979 UART: [ldev] FE.KEYID = 1
1,216,035 UART: [ldev] Erasing FE.KEYID = 1
1,242,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,223 UART: [ldev] --
1,281,568 UART: [fwproc] Wait for Commands...
1,282,276 UART: [fwproc] Recv command 0x46574c44
1,283,004 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,946 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,250 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,277 >>> mbox cmd response: success
2,784,445 UART: [afmc] ++
2,784,613 UART: [afmc] CDI.KEYID = 6
2,784,975 UART: [afmc] SUBJECT.KEYID = 7
2,785,400 UART: [afmc] AUTHORITY.KEYID = 5
2,820,539 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,736 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,484 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,212 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,097 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,816 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,630 UART: [afmc] --
2,863,532 UART: [cold-reset] --
2,864,088 UART: [state] Locking Datavault
2,865,297 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,901 UART: [state] Locking ICCM
2,866,339 UART: [exit] Launching FMC @ 0x40000130
2,871,668 UART:
2,871,684 UART: Running Caliptra FMC ...
2,872,092 UART:
2,872,146 UART: [state] CFI Enabled
2,882,521 UART: [fht] FMC Alias Private Key: 7
2,989,856 UART: [art] Extend RT PCRs Done
2,990,284 UART: [art] Lock RT PCRs Done
2,991,532 UART: [art] Populate DV Done
2,999,871 UART: [fht] FMC Alias Private Key: 7
3,000,959 UART: [art] Derive CDI
3,001,239 UART: [art] Store in in slot 0x4
3,086,634 UART: [art] Derive Key Pair
3,086,994 UART: [art] Store priv key in slot 0x5
3,099,772 UART: [art] Derive Key Pair - Done
3,114,631 UART: [art] Signing Cert with AUTHO
3,115,111 UART: RITY.KEYID = 7
3,130,319 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,084 UART: [art] PUB.X = A58A0C6AFF26B84E10EC8C8CD9510D09E6162DF7BA2038110F879FEB38AC5656144CAB644DC9BF7B98EC5FD50D168D4A
3,137,857 UART: [art] PUB.Y = 46C3523F23A8CDB29C4779F1FD6F240CEFF00240A90E759418AE92C621411833CE44D2A29C94F065BD08E8CF13C52CBD
3,144,803 UART: [art] SIG.R = 72E0D4FBD7D5714DDD74AF7FD727102D77829979E16EC56E711135C3A1CC0B37CD7ACCFEBBE96AED241566C2466F5B93
3,151,586 UART: [art] SIG.S = F5F4ADB2D9E53303CD651F232C62CF9BC6957F70BEF4A9B61B6D7E54792436A9CBEF853A95EBC2783AB20E4768BA7B49
3,175,399 UART: Caliptra RT
3,175,652 UART: [state] CFI Enabled
3,283,671 UART: [rt] RT listening for mailbox commands...
3,284,334 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,813 UART: [rt]cmd =0x46504c54, len=4
3,314,997 >>> mbox cmd response data (8 bytes)
3,315,238 UART: [rt] FIPS self test
3,315,566 UART: [kat] ++
3,315,718 UART: [kat] sha1
3,320,180 UART: [kat] SHA2-256
3,322,202 UART: [kat] SHA2-384
3,325,137 UART: [kat] SHA2-512-ACC
3,326,620 UART: Droping operation
3,327,181 UART: Fatal Error: 0x90050003
3,328,720 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,328,725 >>> mbox cmd response: failed
3,328,725 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,328,730 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,560 UART: [state] LifecycleState = Unprovisioned
86,215 UART: [state] DebugLocked = No
86,783 UART: [state] WD Timer not started. Device not locked for debugging
87,910 UART: [kat] SHA2-256
893,560 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,685 UART: [kat] ++
897,837 UART: [kat] sha1
901,969 UART: [kat] SHA2-256
903,909 UART: [kat] SHA2-384
906,528 UART: [kat] SHA2-512-ACC
908,429 UART: [kat] ECC-384
917,958 UART: [kat] HMAC-384Kdf
922,428 UART: [kat] LMS
1,170,756 UART: [kat] --
1,171,877 UART: [cold-reset] ++
1,172,243 UART: [fht] FHT @ 0x50003400
1,174,882 UART: [idev] ++
1,175,050 UART: [idev] CDI.KEYID = 6
1,175,410 UART: [idev] SUBJECT.KEYID = 7
1,175,834 UART: [idev] UDS.KEYID = 0
1,176,179 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,854 UART: [idev] Erasing UDS.KEYID = 0
1,200,367 UART: [idev] Sha1 KeyId Algorithm
1,208,931 UART: [idev] --
1,210,073 UART: [ldev] ++
1,210,241 UART: [ldev] CDI.KEYID = 6
1,210,604 UART: [ldev] SUBJECT.KEYID = 5
1,211,030 UART: [ldev] AUTHORITY.KEYID = 7
1,211,493 UART: [ldev] FE.KEYID = 1
1,216,603 UART: [ldev] Erasing FE.KEYID = 1
1,242,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,765 UART: [ldev] --
1,282,272 UART: [fwproc] Wait for Commands...
1,283,056 UART: [fwproc] Recv command 0x46574c44
1,283,784 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,396 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,700 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,903 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,019 ready_for_fw is high
1,060,019 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,106 >>> mbox cmd response: success
2,698,798 UART:
2,698,814 UART: Running Caliptra FMC ...
2,699,222 UART:
2,699,276 UART: [state] CFI Enabled
2,709,533 UART: [fht] FMC Alias Private Key: 7
2,817,566 UART: [art] Extend RT PCRs Done
2,817,994 UART: [art] Lock RT PCRs Done
2,819,116 UART: [art] Populate DV Done
2,827,247 UART: [fht] FMC Alias Private Key: 7
2,828,343 UART: [art] Derive CDI
2,828,623 UART: [art] Store in in slot 0x4
2,914,004 UART: [art] Derive Key Pair
2,914,364 UART: [art] Store priv key in slot 0x5
2,927,770 UART: [art] Derive Key Pair - Done
2,942,594 UART: [art] Signing Cert with AUTHO
2,943,074 UART: RITY.KEYID = 7
2,958,404 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,169 UART: [art] PUB.X = 689B2CFC9219B95A844CF6BBE980D4732402628CEAFED6157123718FD5BE40FBA09FB02F6F85FB68E5B967E2F891FBC0
2,965,950 UART: [art] PUB.Y = C2842CA901A304498CFB85469E2E1FA0FDEA2B598A5DE2FE5627C43A3151C4C73BAE3226E8F030030555BDD8C886A990
2,972,896 UART: [art] SIG.R = E66AB36992167CF7FF8EC703729FC9ACAC5C14FB72B69B85795C5D91FB7D07712E7F02BE22BA22D8254F6DE50B08718D
2,979,663 UART: [art] SIG.S = F7629B983FD6B4C18D4E58802EC680A176498E0DED05FCC5CE76841415BCB7B1DB589AE90D4FB6C104213A7695F14BE5
3,003,288 UART: Caliptra RT
3,003,541 UART: [state] CFI Enabled
3,110,597 UART: [rt] RT listening for mailbox commands...
3,111,260 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,199 UART: [rt]cmd =0x46504c54, len=4
3,142,327 >>> mbox cmd response data (8 bytes)
3,142,666 UART: [rt] FIPS self test
3,142,994 UART: [kat] ++
3,143,146 UART: [kat] sha1
3,147,234 UART: [kat] SHA2-256
3,149,256 UART: [kat] SHA2-384
3,152,101 UART: [kat] SHA2-512-ACC
3,153,584 UART: Droping operation
3,154,159 UART: Fatal Error: 0x90050003
3,155,698 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,155,703 >>> mbox cmd response: failed
3,155,703 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,155,708 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,693 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,530 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
893,641 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,766 UART: [kat] ++
897,918 UART: [kat] sha1
902,186 UART: [kat] SHA2-256
904,126 UART: [kat] SHA2-384
907,021 UART: [kat] SHA2-512-ACC
908,922 UART: [kat] ECC-384
918,741 UART: [kat] HMAC-384Kdf
923,275 UART: [kat] LMS
1,171,603 UART: [kat] --
1,172,636 UART: [cold-reset] ++
1,173,162 UART: [fht] FHT @ 0x50003400
1,175,845 UART: [idev] ++
1,176,013 UART: [idev] CDI.KEYID = 6
1,176,373 UART: [idev] SUBJECT.KEYID = 7
1,176,797 UART: [idev] UDS.KEYID = 0
1,177,142 ready_for_fw is high
1,177,142 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,582 UART: [idev] Sha1 KeyId Algorithm
1,211,076 UART: [idev] --
1,212,202 UART: [ldev] ++
1,212,370 UART: [ldev] CDI.KEYID = 6
1,212,733 UART: [ldev] SUBJECT.KEYID = 5
1,213,159 UART: [ldev] AUTHORITY.KEYID = 7
1,213,622 UART: [ldev] FE.KEYID = 1
1,218,888 UART: [ldev] Erasing FE.KEYID = 1
1,245,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,066 UART: [ldev] --
1,284,373 UART: [fwproc] Wait for Commands...
1,284,965 UART: [fwproc] Recv command 0x46574c44
1,285,693 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,211 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,242 >>> mbox cmd response: success
2,788,370 UART: [afmc] ++
2,788,538 UART: [afmc] CDI.KEYID = 6
2,788,900 UART: [afmc] SUBJECT.KEYID = 7
2,789,325 UART: [afmc] AUTHORITY.KEYID = 5
2,825,232 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,471 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,219 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,947 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,832 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,551 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,247 UART: [afmc] --
2,868,233 UART: [cold-reset] --
2,868,931 UART: [state] Locking Datavault
2,870,344 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,948 UART: [state] Locking ICCM
2,871,496 UART: [exit] Launching FMC @ 0x40000130
2,876,825 UART:
2,876,841 UART: Running Caliptra FMC ...
2,877,249 UART:
2,877,392 UART: [state] CFI Enabled
2,887,927 UART: [fht] FMC Alias Private Key: 7
2,995,714 UART: [art] Extend RT PCRs Done
2,996,142 UART: [art] Lock RT PCRs Done
2,997,724 UART: [art] Populate DV Done
3,005,967 UART: [fht] FMC Alias Private Key: 7
3,006,951 UART: [art] Derive CDI
3,007,231 UART: [art] Store in in slot 0x4
3,092,796 UART: [art] Derive Key Pair
3,093,156 UART: [art] Store priv key in slot 0x5
3,106,678 UART: [art] Derive Key Pair - Done
3,121,333 UART: [art] Signing Cert with AUTHO
3,121,813 UART: RITY.KEYID = 7
3,137,379 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,144 UART: [art] PUB.X = 97266618D135EA7E47EBA4AA2199ED978A229746D49FE86942D26D9E9B34CF23F0AD0DBAC36730A407C4881548C8F454
3,144,910 UART: [art] PUB.Y = 35D41267CE9516BEB6859B5C289D5C969CEC45D8DAC487A998A045020BEDD6848950E3114DA2EF91926B2F97C9CB41B8
3,151,860 UART: [art] SIG.R = A8A4DFCBACE00FFB90E3EF2916FAA90E347EB69E9191229EF898EAA53540D98C3C99A9E9698DBC267B8DE8FAD013E0F4
3,158,648 UART: [art] SIG.S = 7E5261190B26047777D6405DD0ACA2AE282ECE20AD0B695E551C68CE3E199775B5380DD0DE1673E3254CB86016C251CF
3,182,371 UART: Caliptra RT
3,182,716 UART: [state] CFI Enabled
3,290,633 UART: [rt] RT listening for mailbox commands...
3,291,296 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,237 UART: [rt]cmd =0x46504c54, len=4
3,322,353 >>> mbox cmd response data (8 bytes)
3,322,624 UART: [rt] FIPS self test
3,322,952 UART: [kat] ++
3,323,104 UART: [kat] sha1
3,327,328 UART: [kat] SHA2-256
3,329,350 UART: [kat] SHA2-384
3,332,075 UART: [kat] SHA2-512-ACC
3,333,558 UART: Droping operation
3,333,961 UART: Fatal Error: 0x90050003
3,335,500 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,335,505 >>> mbox cmd response: failed
3,335,505 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,335,510 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,996 UART: [state] WD Timer not started. Device not locked for debugging
88,351 UART: [kat] SHA2-256
894,001 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,126 UART: [kat] ++
898,278 UART: [kat] sha1
902,468 UART: [kat] SHA2-256
904,408 UART: [kat] SHA2-384
907,037 UART: [kat] SHA2-512-ACC
908,938 UART: [kat] ECC-384
918,661 UART: [kat] HMAC-384Kdf
923,503 UART: [kat] LMS
1,171,831 UART: [kat] --
1,172,718 UART: [cold-reset] ++
1,173,232 UART: [fht] FHT @ 0x50003400
1,175,881 UART: [idev] ++
1,176,049 UART: [idev] CDI.KEYID = 6
1,176,409 UART: [idev] SUBJECT.KEYID = 7
1,176,833 UART: [idev] UDS.KEYID = 0
1,177,178 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,809 UART: [idev] Erasing UDS.KEYID = 0
1,201,330 UART: [idev] Sha1 KeyId Algorithm
1,209,774 UART: [idev] --
1,210,994 UART: [ldev] ++
1,211,162 UART: [ldev] CDI.KEYID = 6
1,211,525 UART: [ldev] SUBJECT.KEYID = 5
1,211,951 UART: [ldev] AUTHORITY.KEYID = 7
1,212,414 UART: [ldev] FE.KEYID = 1
1,217,430 UART: [ldev] Erasing FE.KEYID = 1
1,244,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,822 UART: [ldev] --
1,284,317 UART: [fwproc] Wait for Commands...
1,284,945 UART: [fwproc] Recv command 0x46574c44
1,285,673 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,681 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,985 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,168 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,910 ready_for_fw is high
1,060,910 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,979 >>> mbox cmd response: success
2,699,791 UART:
2,699,807 UART: Running Caliptra FMC ...
2,700,215 UART:
2,700,358 UART: [state] CFI Enabled
2,710,965 UART: [fht] FMC Alias Private Key: 7
2,819,152 UART: [art] Extend RT PCRs Done
2,819,580 UART: [art] Lock RT PCRs Done
2,821,196 UART: [art] Populate DV Done
2,829,521 UART: [fht] FMC Alias Private Key: 7
2,830,687 UART: [art] Derive CDI
2,830,967 UART: [art] Store in in slot 0x4
2,916,878 UART: [art] Derive Key Pair
2,917,238 UART: [art] Store priv key in slot 0x5
2,930,888 UART: [art] Derive Key Pair - Done
2,945,944 UART: [art] Signing Cert with AUTHO
2,946,424 UART: RITY.KEYID = 7
2,961,754 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,519 UART: [art] PUB.X = 79519CE7F7C0184BCA2E00E0B847A41ECAABB8BD909D2DC64E23F7261637BE3974C8189688E6F1A54E7665233A25567F
2,969,271 UART: [art] PUB.Y = A3C1AD6926357136F1BE138BCA591F7EDB67707FCF4FA9F1ECDC24809821A9B8DEEA0D359A29F0FD3618112BABB8DCA5
2,976,240 UART: [art] SIG.R = 9A4603AC792E4C92C526502411F9F03B00D03DC1670D9548B4BBA8278796C1CB03EB1968387A7542F01321D89A6E7CF7
2,982,975 UART: [art] SIG.S = 393383E00F2F9A7BE42C68E8EF25A1BC3C81753426227C08CD90514E5115B48C6D6389EFDF4AEF1DC755FB4A965A1A16
3,007,090 UART: Caliptra RT
3,007,435 UART: [state] CFI Enabled
3,114,614 UART: [rt] RT listening for mailbox commands...
3,115,277 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,970 UART: [rt]cmd =0x46504c54, len=4
3,146,110 >>> mbox cmd response data (8 bytes)
3,146,443 UART: [rt] FIPS self test
3,146,771 UART: [kat] ++
3,146,923 UART: [kat] sha1
3,151,003 UART: [kat] SHA2-256
3,153,025 UART: [kat] SHA2-384
3,155,828 UART: [kat] SHA2-512-ACC
3,157,311 UART: Droping operation
3,157,744 UART: Fatal Error: 0x90050003
3,159,283 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,159,288 >>> mbox cmd response: failed
3,159,288 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,159,293 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,732 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,640,451 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,436 UART: [state] LifecycleState = Unprovisioned
86,091 UART: [state] DebugLocked = No
86,585 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
891,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,451 UART: [kat] ++
895,603 UART: [kat] sha1
899,893 UART: [kat] SHA2-256
901,833 UART: [kat] SHA2-384
904,396 UART: [kat] SHA2-512-ACC
906,297 UART: [kat] ECC-384
916,278 UART: [kat] HMAC-384Kdf
920,692 UART: [kat] LMS
1,169,004 UART: [kat] --
1,169,845 UART: [cold-reset] ++
1,170,337 UART: [fht] FHT @ 0x50003400
1,173,151 UART: [idev] ++
1,173,319 UART: [idev] CDI.KEYID = 6
1,173,680 UART: [idev] SUBJECT.KEYID = 7
1,174,105 UART: [idev] UDS.KEYID = 0
1,174,451 ready_for_fw is high
1,174,451 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,365 UART: [idev] Erasing UDS.KEYID = 0
1,199,185 UART: [idev] Sha1 KeyId Algorithm
1,207,897 UART: [idev] --
1,209,188 UART: [ldev] ++
1,209,356 UART: [ldev] CDI.KEYID = 6
1,209,720 UART: [ldev] SUBJECT.KEYID = 5
1,210,147 UART: [ldev] AUTHORITY.KEYID = 7
1,210,610 UART: [ldev] FE.KEYID = 1
1,215,832 UART: [ldev] Erasing FE.KEYID = 1
1,242,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,986 UART: [ldev] --
1,281,270 UART: [fwproc] Wait for Commands...
1,281,853 UART: [fwproc] Recv command 0x46574c44
1,282,586 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,738 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,047 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,127 >>> mbox cmd response: success
2,784,346 UART: [afmc] ++
2,784,514 UART: [afmc] CDI.KEYID = 6
2,784,877 UART: [afmc] SUBJECT.KEYID = 7
2,785,303 UART: [afmc] AUTHORITY.KEYID = 5
2,820,808 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,120 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,871 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,600 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,483 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,202 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,043 UART: [afmc] --
2,864,141 UART: [cold-reset] --
2,864,765 UART: [state] Locking Datavault
2,865,776 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,380 UART: [state] Locking ICCM
2,866,964 UART: [exit] Launching FMC @ 0x40000130
2,872,293 UART:
2,872,309 UART: Running Caliptra FMC ...
2,872,717 UART:
2,872,771 UART: [state] CFI Enabled
2,883,460 UART: [fht] FMC Alias Private Key: 7
2,991,181 UART: [art] Extend RT PCRs Done
2,991,609 UART: [art] Lock RT PCRs Done
2,992,959 UART: [art] Populate DV Done
3,001,054 UART: [fht] FMC Alias Private Key: 7
3,002,112 UART: [art] Derive CDI
3,002,392 UART: [art] Store in in slot 0x4
3,087,839 UART: [art] Derive Key Pair
3,088,199 UART: [art] Store priv key in slot 0x5
3,101,179 UART: [art] Derive Key Pair - Done
3,115,970 UART: [art] Signing Cert with AUTHO
3,116,450 UART: RITY.KEYID = 7
3,131,840 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,605 UART: [art] PUB.X = F34191035B87B4D277747CF13EDB417773E907B9BF1ADE33FD736B103058CE79A7F02D7C0E69B4F8D10620FD265D5F2D
3,139,369 UART: [art] PUB.Y = E2D6C1E8BDE3957DB9951EA6D6D783248425F8F60E361CF360AC6E5BFCDC10D93777FD7D49423510CB4CBA9D8A16A5FB
3,146,334 UART: [art] SIG.R = 76B2D1490063CA55EB96DD4C7F14C28EC8409EFF15A015F70947D1F7934C6369F11017D49C677A404E554C07195C8C4E
3,153,074 UART: [art] SIG.S = 3208EC9060FC80C828708E42C21597EBEAAE563C4BDDAAE254B78A0D0F0BABFC434EB2265DCCCAD2EACA8A9638FF0511
3,176,544 UART: Caliptra RT
3,176,797 UART: [state] CFI Enabled
3,284,744 UART: [rt] RT listening for mailbox commands...
3,285,407 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,998 UART: [rt]cmd =0x46504c54, len=4
3,316,326 >>> mbox cmd response data (8 bytes)
3,316,667 UART: [rt] FIPS self test
3,316,995 UART: [kat] ++
3,317,147 UART: [kat] sha1
3,321,265 UART: [kat] SHA2-256
3,323,287 UART: [kat] SHA2-384
3,326,130 UART: [kat] SHA2-512-ACC
3,327,613 UART: Droping operation
3,328,226 UART: Fatal Error: 0x90050003
3,329,765 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,770 >>> mbox cmd response: failed
3,329,770 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,775 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
891,024 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,153 UART: [kat] ++
895,305 UART: [kat] sha1
899,535 UART: [kat] SHA2-256
901,475 UART: [kat] SHA2-384
904,190 UART: [kat] SHA2-512-ACC
906,091 UART: [kat] ECC-384
915,960 UART: [kat] HMAC-384Kdf
920,552 UART: [kat] LMS
1,168,864 UART: [kat] --
1,169,915 UART: [cold-reset] ++
1,170,459 UART: [fht] FHT @ 0x50003400
1,173,007 UART: [idev] ++
1,173,175 UART: [idev] CDI.KEYID = 6
1,173,536 UART: [idev] SUBJECT.KEYID = 7
1,173,961 UART: [idev] UDS.KEYID = 0
1,174,307 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,925 UART: [idev] Erasing UDS.KEYID = 0
1,199,275 UART: [idev] Sha1 KeyId Algorithm
1,208,119 UART: [idev] --
1,209,326 UART: [ldev] ++
1,209,494 UART: [ldev] CDI.KEYID = 6
1,209,858 UART: [ldev] SUBJECT.KEYID = 5
1,210,285 UART: [ldev] AUTHORITY.KEYID = 7
1,210,748 UART: [ldev] FE.KEYID = 1
1,215,896 UART: [ldev] Erasing FE.KEYID = 1
1,242,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,466 UART: [ldev] --
1,281,860 UART: [fwproc] Wait for Commands...
1,282,631 UART: [fwproc] Recv command 0x46574c44
1,283,364 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,742 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,051 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,095 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,320 ready_for_fw is high
1,056,320 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,631,781 >>> mbox cmd response: success
2,694,301 UART:
2,694,317 UART: Running Caliptra FMC ...
2,694,725 UART:
2,694,779 UART: [state] CFI Enabled
2,705,048 UART: [fht] FMC Alias Private Key: 7
2,814,223 UART: [art] Extend RT PCRs Done
2,814,651 UART: [art] Lock RT PCRs Done
2,816,487 UART: [art] Populate DV Done
2,824,858 UART: [fht] FMC Alias Private Key: 7
2,825,914 UART: [art] Derive CDI
2,826,194 UART: [art] Store in in slot 0x4
2,911,859 UART: [art] Derive Key Pair
2,912,219 UART: [art] Store priv key in slot 0x5
2,925,109 UART: [art] Derive Key Pair - Done
2,940,104 UART: [art] Signing Cert with AUTHO
2,940,584 UART: RITY.KEYID = 7
2,955,548 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,313 UART: [art] PUB.X = 445E5A2C7F5693914B8357A2A3149050294BCFEA83C825E6A474BDCB8A66F27A65928D0EC6AAD0CBC2A28128679A8956
2,963,084 UART: [art] PUB.Y = 2215E948B2BC8E2BE1050005823551F096D0AE4158E18474A1EFEC2FA60DB8A0BE3E1E9B36FF58EC48D5AD23D9C32A59
2,970,015 UART: [art] SIG.R = 8365122981BE612DF5ADB9B9DBE5368529ABCB16D02C27D78B1351188686F4DC5C9FB89ACE548919B27A8EEB3CA32AAE
2,976,799 UART: [art] SIG.S = EFB50CF840FCA167AF4ACF1493E2612BBA2874097B6636C31BE6382F0A2B59E3105CCE87889B4A0C02F2F8849CD3DB1D
3,000,249 UART: Caliptra RT
3,000,502 UART: [state] CFI Enabled
3,107,926 UART: [rt] RT listening for mailbox commands...
3,108,589 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,516 UART: [rt]cmd =0x46504c54, len=4
3,139,628 >>> mbox cmd response data (8 bytes)
3,139,833 UART: [rt] FIPS self test
3,140,161 UART: [kat] ++
3,140,313 UART: [kat] sha1
3,144,595 UART: [kat] SHA2-256
3,146,617 UART: [kat] SHA2-384
3,149,354 UART: [kat] SHA2-512-ACC
3,150,837 UART: Droping operation
3,151,472 UART: Fatal Error: 0x90050003
3,153,011 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,153,016 >>> mbox cmd response: failed
3,153,016 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,153,021 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,420 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,631,699 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,741 UART: [state] LifecycleState = Unprovisioned
86,396 UART: [state] DebugLocked = No
87,080 UART: [state] WD Timer not started. Device not locked for debugging
88,347 UART: [kat] SHA2-256
891,897 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,026 UART: [kat] ++
896,178 UART: [kat] sha1
900,408 UART: [kat] SHA2-256
902,348 UART: [kat] SHA2-384
905,107 UART: [kat] SHA2-512-ACC
907,008 UART: [kat] ECC-384
916,841 UART: [kat] HMAC-384Kdf
921,399 UART: [kat] LMS
1,169,711 UART: [kat] --
1,170,548 UART: [cold-reset] ++
1,171,026 UART: [fht] FHT @ 0x50003400
1,173,856 UART: [idev] ++
1,174,024 UART: [idev] CDI.KEYID = 6
1,174,385 UART: [idev] SUBJECT.KEYID = 7
1,174,810 UART: [idev] UDS.KEYID = 0
1,175,156 ready_for_fw is high
1,175,156 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,018 UART: [idev] Erasing UDS.KEYID = 0
1,199,572 UART: [idev] Sha1 KeyId Algorithm
1,208,338 UART: [idev] --
1,209,399 UART: [ldev] ++
1,209,567 UART: [ldev] CDI.KEYID = 6
1,209,931 UART: [ldev] SUBJECT.KEYID = 5
1,210,358 UART: [ldev] AUTHORITY.KEYID = 7
1,210,821 UART: [ldev] FE.KEYID = 1
1,216,085 UART: [ldev] Erasing FE.KEYID = 1
1,242,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,821 UART: [ldev] --
1,282,281 UART: [fwproc] Wait for Commands...
1,282,854 UART: [fwproc] Recv command 0x46574c44
1,283,587 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,573 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,882 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,126 >>> mbox cmd response: success
2,786,315 UART: [afmc] ++
2,786,483 UART: [afmc] CDI.KEYID = 6
2,786,846 UART: [afmc] SUBJECT.KEYID = 7
2,787,272 UART: [afmc] AUTHORITY.KEYID = 5
2,823,289 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,448 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,177 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,060 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,779 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,664 UART: [afmc] --
2,866,600 UART: [cold-reset] --
2,867,628 UART: [state] Locking Datavault
2,869,003 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,607 UART: [state] Locking ICCM
2,870,117 UART: [exit] Launching FMC @ 0x40000130
2,875,446 UART:
2,875,462 UART: Running Caliptra FMC ...
2,875,870 UART:
2,876,013 UART: [state] CFI Enabled
2,886,916 UART: [fht] FMC Alias Private Key: 7
2,995,641 UART: [art] Extend RT PCRs Done
2,996,069 UART: [art] Lock RT PCRs Done
2,997,479 UART: [art] Populate DV Done
3,005,882 UART: [fht] FMC Alias Private Key: 7
3,006,828 UART: [art] Derive CDI
3,007,108 UART: [art] Store in in slot 0x4
3,092,799 UART: [art] Derive Key Pair
3,093,159 UART: [art] Store priv key in slot 0x5
3,106,241 UART: [art] Derive Key Pair - Done
3,120,946 UART: [art] Signing Cert with AUTHO
3,121,426 UART: RITY.KEYID = 7
3,136,420 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,185 UART: [art] PUB.X = 8A45BA3ED65F810E1A38937DA116F4B897C32B1CC908AD1BE406B4F624469604F9EE588BD2DC6FE0F8980E07CFAA37F1
3,143,951 UART: [art] PUB.Y = 54C9095E43ADF7FF8DAA7CCB50BFE4C362C7B610C0238B2204A1D0E964F21C7808C2D6CF19588B01DB1870717DF8AD11
3,150,901 UART: [art] SIG.R = EA1738B115021C785952CD959850D5797EA8563FB5A682AA0E31499CD4D687B2B34F0343739CB780162106C19BA07F4F
3,157,653 UART: [art] SIG.S = 49CE763BDE31AEF8E92C6EB18BDEE725C0CCC8FA60D3F7717461E9B6338C9D8C92A79E81AD85E99D871B14F054944797
3,181,230 UART: Caliptra RT
3,181,575 UART: [state] CFI Enabled
3,289,374 UART: [rt] RT listening for mailbox commands...
3,290,037 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,694 UART: [rt]cmd =0x46504c54, len=4
3,320,940 >>> mbox cmd response data (8 bytes)
3,321,235 UART: [rt] FIPS self test
3,321,563 UART: [kat] ++
3,321,715 UART: [kat] sha1
3,325,851 UART: [kat] SHA2-256
3,327,873 UART: [kat] SHA2-384
3,330,554 UART: [kat] SHA2-512-ACC
3,332,037 UART: Droping operation
3,332,464 UART: Fatal Error: 0x90050003
3,334,003 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,334,008 >>> mbox cmd response: failed
3,334,008 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,334,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,444 UART: [state] WD Timer not started. Device not locked for debugging
87,675 UART: [kat] SHA2-256
891,225 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,354 UART: [kat] ++
895,506 UART: [kat] sha1
899,686 UART: [kat] SHA2-256
901,626 UART: [kat] SHA2-384
904,573 UART: [kat] SHA2-512-ACC
906,474 UART: [kat] ECC-384
916,433 UART: [kat] HMAC-384Kdf
920,849 UART: [kat] LMS
1,169,161 UART: [kat] --
1,170,076 UART: [cold-reset] ++
1,170,402 UART: [fht] FHT @ 0x50003400
1,172,824 UART: [idev] ++
1,172,992 UART: [idev] CDI.KEYID = 6
1,173,353 UART: [idev] SUBJECT.KEYID = 7
1,173,778 UART: [idev] UDS.KEYID = 0
1,174,124 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,946 UART: [idev] Erasing UDS.KEYID = 0
1,199,088 UART: [idev] Sha1 KeyId Algorithm
1,208,038 UART: [idev] --
1,208,991 UART: [ldev] ++
1,209,159 UART: [ldev] CDI.KEYID = 6
1,209,523 UART: [ldev] SUBJECT.KEYID = 5
1,209,950 UART: [ldev] AUTHORITY.KEYID = 7
1,210,413 UART: [ldev] FE.KEYID = 1
1,215,687 UART: [ldev] Erasing FE.KEYID = 1
1,242,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,237 UART: [ldev] --
1,281,609 UART: [fwproc] Wait for Commands...
1,282,196 UART: [fwproc] Recv command 0x46574c44
1,282,929 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,041 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,350 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,488 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,939 ready_for_fw is high
1,055,939 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,190 >>> mbox cmd response: success
2,694,328 UART:
2,694,344 UART: Running Caliptra FMC ...
2,694,752 UART:
2,694,895 UART: [state] CFI Enabled
2,705,662 UART: [fht] FMC Alias Private Key: 7
2,814,227 UART: [art] Extend RT PCRs Done
2,814,655 UART: [art] Lock RT PCRs Done
2,816,489 UART: [art] Populate DV Done
2,824,678 UART: [fht] FMC Alias Private Key: 7
2,825,634 UART: [art] Derive CDI
2,825,914 UART: [art] Store in in slot 0x4
2,911,209 UART: [art] Derive Key Pair
2,911,569 UART: [art] Store priv key in slot 0x5
2,925,015 UART: [art] Derive Key Pair - Done
2,939,449 UART: [art] Signing Cert with AUTHO
2,939,929 UART: RITY.KEYID = 7
2,954,857 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,622 UART: [art] PUB.X = 5685DA6D481CFAC5049FC5166E302CD38E8AEC0CE463D55E00829B87E4C91D94A6F7FD2DFEC45CA2723FDA0A048A13E3
2,962,376 UART: [art] PUB.Y = 510A26ABA3EBFEFC25D4BBEA73BF2C38A7DF1AA995900D9FA5B7482D603C6FD113507C4782561BB0B6A4DC9B7CB3EAB3
2,969,346 UART: [art] SIG.R = 6D354891AACAF3B52D2FFD2846A96660D6C3AD36B98BF522860C56B57B3EAF21492DEC7045C51D08C4C92A6237BA9991
2,976,118 UART: [art] SIG.S = AA26DAC790C56A644E7C8A49405255D4C4FC95A571B6D9405869E101AC68639C796A7E9647AFB017E9F0EC6CBFA99FF7
3,000,104 UART: Caliptra RT
3,000,449 UART: [state] CFI Enabled
3,108,072 UART: [rt] RT listening for mailbox commands...
3,108,735 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,318 UART: [rt]cmd =0x46504c54, len=4
3,139,334 >>> mbox cmd response data (8 bytes)
3,139,617 UART: [rt] FIPS self test
3,139,945 UART: [kat] ++
3,140,097 UART: [kat] sha1
3,144,493 UART: [kat] SHA2-256
3,146,515 UART: [kat] SHA2-384
3,149,340 UART: [kat] SHA2-512-ACC
3,150,823 UART: Droping operation
3,151,236 UART: Fatal Error: 0x90050003
3,152,775 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,152,780 >>> mbox cmd response: failed
3,152,780 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,152,785 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,043 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,970 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,880 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,888 >>> mbox cmd response: failed
811,888 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,894 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,211 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,077 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,932 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,940 >>> mbox cmd response: failed
811,940 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,946 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,723 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,083 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,133 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,141 >>> mbox cmd response: failed
812,141 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,147 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,090 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,088 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,491 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,499 >>> mbox cmd response: failed
812,499 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,505 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,546 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,792 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,910 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,918 >>> mbox cmd response: failed
811,918 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,924 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,949 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,215 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,996 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,004 >>> mbox cmd response: failed
812,004 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,010 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,875 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,039 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,181 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,189 >>> mbox cmd response: failed
812,189 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,195 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,472 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,674 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,923 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,931 >>> mbox cmd response: failed
811,931 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,937 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,262 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,742 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,700 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,708 >>> mbox cmd response: failed
811,708 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,714 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,715 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,327 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,070 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,078 >>> mbox cmd response: failed
812,078 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,084 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,401 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,371 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,787 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,795 >>> mbox cmd response: failed
811,795 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,801 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,182 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,764 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,977 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,985 >>> mbox cmd response: failed
811,985 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,991 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,458 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,250 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,229 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,879 UART: [kat] SHA2-256
881,810 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,925 UART: [kat] ++
886,077 UART: [kat] sha1
890,387 UART: [kat] SHA2-256
892,325 UART: [kat] SHA2-384
895,126 UART: [kat] SHA2-512-ACC
897,027 UART: [kat] ECC-384
903,006 UART: [kat] HMAC-384Kdf
907,658 UART: [kat] LMS
1,475,854 UART: [kat] --
1,476,527 UART: [cold-reset] ++
1,477,091 UART: [fht] Storing FHT @ 0x50003400
1,479,908 UART: [idev] ++
1,480,076 UART: [idev] CDI.KEYID = 6
1,480,436 UART: [idev] SUBJECT.KEYID = 7
1,480,860 UART: [idev] UDS.KEYID = 0
1,481,205 ready_for_fw is high
1,481,205 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,984 UART: [idev] Erasing UDS.KEYID = 0
1,505,086 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,764 UART: [idev] --
1,514,779 UART: [ldev] ++
1,514,947 UART: [ldev] CDI.KEYID = 6
1,515,310 UART: [ldev] SUBJECT.KEYID = 5
1,515,736 UART: [ldev] AUTHORITY.KEYID = 7
1,516,199 UART: [ldev] FE.KEYID = 1
1,521,623 UART: [ldev] Erasing FE.KEYID = 1
1,547,086 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,484 UART: [ldev] --
1,586,869 UART: [fwproc] Waiting for Commands...
1,587,578 UART: [fwproc] Received command 0x46574c44
1,588,369 UART: [fwproc] Received Image of size 115196 bytes
2,896,147 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,035 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,387 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,604 >>> mbox cmd response: success
3,090,638 UART: [afmc] ++
3,090,806 UART: [afmc] CDI.KEYID = 6
3,091,168 UART: [afmc] SUBJECT.KEYID = 7
3,091,593 UART: [afmc] AUTHORITY.KEYID = 5
3,126,316 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,786 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,566 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,294 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,179 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,869 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,798 UART: [afmc] --
3,169,838 UART: [cold-reset] --
3,170,610 UART: [state] Locking Datavault
3,172,103 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,707 UART: [state] Locking ICCM
3,173,365 UART: [exit] Launching FMC @ 0x40000130
3,178,694 UART:
3,178,710 UART: Running Caliptra FMC ...
3,179,118 UART:
3,179,172 UART: [state] CFI Enabled
3,190,123 UART: [fht] FMC Alias Private Key: 7
3,297,452 UART: [art] Extend RT PCRs Done
3,297,880 UART: [art] Lock RT PCRs Done
3,299,558 UART: [art] Populate DV Done
3,307,785 UART: [fht] FMC Alias Private Key: 7
3,308,879 UART: [art] Derive CDI
3,309,159 UART: [art] Store in in slot 0x4
3,394,890 UART: [art] Derive Key Pair
3,395,250 UART: [art] Store priv key in slot 0x5
3,407,870 UART: [art] Derive Key Pair - Done
3,422,577 UART: [art] Signing Cert with AUTHO
3,423,057 UART: RITY.KEYID = 7
3,438,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,918 UART: [art] PUB.X = 4A4B0AA476A44A43A3C1CAD6B49D4C6E644819647A6519865EAD3B9DBC53D80832FDD9C821D09FEC439A3889FDB7760B
3,445,691 UART: [art] PUB.Y = E29B4ED8A9DD06C8EE31EDA8A2B73A52ACEDAD7BC765328226D4BB873E0994571CF25E6143D2C1F4C16FFDFCEA7FC6D6
3,452,663 UART: [art] SIG.R = 81C6E21C2B02AF79EAE77B0792C2C28E72D41DEACEA282D937BB830FB59D59C1AC1CD1A7C2F97E84609959736FAF026D
3,459,437 UART: [art] SIG.S = 06A71BCA4379CEEFEFFE7C236837F4E6A9F6756531327FFC73A820DB5E5479EB67FC6F8F0F585FACE1F3FDFFCDA71CA1
3,483,152 UART: Caliptra RT
3,483,405 UART: [state] CFI Enabled
3,592,270 UART: [rt] RT listening for mailbox commands...
3,592,933 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,204 UART: [rt]cmd =0x46504c54, len=4
3,624,392 >>> mbox cmd response data (8 bytes)
3,624,641 UART: [rt] FIPS self test
3,624,969 UART: [kat] ++
3,625,121 UART: [kat] sha1
3,629,429 UART: [kat] SHA2-256
3,631,451 UART: [kat] SHA2-384
3,634,408 UART: [kat] SHA2-512-ACC
3,635,132 UART: Fatal Error: 0x90050001
3,636,671 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,636,676 >>> mbox cmd response: failed
3,636,676 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,636,681 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,676 UART: [state] LifecycleState = Unprovisioned
85,331 UART: [state] DebugLocked = No
85,905 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,593 UART: [kat] SHA2-256
881,524 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,639 UART: [kat] ++
885,791 UART: [kat] sha1
890,033 UART: [kat] SHA2-256
891,971 UART: [kat] SHA2-384
894,754 UART: [kat] SHA2-512-ACC
896,655 UART: [kat] ECC-384
901,834 UART: [kat] HMAC-384Kdf
906,476 UART: [kat] LMS
1,474,672 UART: [kat] --
1,475,639 UART: [cold-reset] ++
1,476,141 UART: [fht] Storing FHT @ 0x50003400
1,478,814 UART: [idev] ++
1,478,982 UART: [idev] CDI.KEYID = 6
1,479,342 UART: [idev] SUBJECT.KEYID = 7
1,479,766 UART: [idev] UDS.KEYID = 0
1,480,111 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,487,584 UART: [idev] Erasing UDS.KEYID = 0
1,504,296 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,010 UART: [idev] --
1,514,185 UART: [ldev] ++
1,514,353 UART: [ldev] CDI.KEYID = 6
1,514,716 UART: [ldev] SUBJECT.KEYID = 5
1,515,142 UART: [ldev] AUTHORITY.KEYID = 7
1,515,605 UART: [ldev] FE.KEYID = 1
1,520,633 UART: [ldev] Erasing FE.KEYID = 1
1,545,596 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,864 UART: [ldev] --
1,584,205 UART: [fwproc] Waiting for Commands...
1,584,990 UART: [fwproc] Received command 0x46574c44
1,585,781 UART: [fwproc] Received Image of size 115196 bytes
2,893,341 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,859 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,211 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,087,384 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,327 ready_for_fw is high
1,363,327 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,046 >>> mbox cmd response: success
3,001,804 UART:
3,001,820 UART: Running Caliptra FMC ...
3,002,228 UART:
3,002,282 UART: [state] CFI Enabled
3,012,523 UART: [fht] FMC Alias Private Key: 7
3,120,074 UART: [art] Extend RT PCRs Done
3,120,502 UART: [art] Lock RT PCRs Done
3,121,982 UART: [art] Populate DV Done
3,130,137 UART: [fht] FMC Alias Private Key: 7
3,131,233 UART: [art] Derive CDI
3,131,513 UART: [art] Store in in slot 0x4
3,217,488 UART: [art] Derive Key Pair
3,217,848 UART: [art] Store priv key in slot 0x5
3,230,946 UART: [art] Derive Key Pair - Done
3,245,535 UART: [art] Signing Cert with AUTHO
3,246,015 UART: RITY.KEYID = 7
3,261,539 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,304 UART: [art] PUB.X = 4299FA42FE0E2EE90AD3C7C85B0A614F5B6D61DC71488870BADE131ACB451110592EF77D750EE246669C4FE30903AFDB
3,269,068 UART: [art] PUB.Y = E59730D340836A6A01D42D05EEEA6F2328988FD510A80CBECA8C6E6B7FD2002C85EFF514F85A4B9F203F817CA48641AB
3,275,999 UART: [art] SIG.R = DCA767D24BFE14E5283CA7AE550290EEF2296FCD36EF298FC30E81C7C7CD588F3ADA40DE29A35F2757CCD43FA5DB731A
3,282,787 UART: [art] SIG.S = 20DC7D1C51D8C5AB8630D3959F6EE369425221C17A4348DB2B14B893F957050341B6304252240CA799D7315B2E08283C
3,306,578 UART: Caliptra RT
3,306,831 UART: [state] CFI Enabled
3,414,272 UART: [rt] RT listening for mailbox commands...
3,414,935 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,950 UART: [rt]cmd =0x46504c54, len=4
3,446,292 >>> mbox cmd response data (8 bytes)
3,446,573 UART: [rt] FIPS self test
3,446,901 UART: [kat] ++
3,447,053 UART: [kat] sha1
3,451,257 UART: [kat] SHA2-256
3,453,279 UART: [kat] SHA2-384
3,456,356 UART: [kat] SHA2-512-ACC
3,456,934 UART: Fatal Error: 0x90050001
3,458,473 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,458,478 >>> mbox cmd response: failed
3,458,478 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,458,483 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,019 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,774 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,848 UART: [state] DebugLocked = No
86,398 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,080 UART: [kat] SHA2-256
882,011 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,126 UART: [kat] ++
886,278 UART: [kat] sha1
890,484 UART: [kat] SHA2-256
892,422 UART: [kat] SHA2-384
895,053 UART: [kat] SHA2-512-ACC
896,954 UART: [kat] ECC-384
902,247 UART: [kat] HMAC-384Kdf
906,997 UART: [kat] LMS
1,475,193 UART: [kat] --
1,475,984 UART: [cold-reset] ++
1,476,504 UART: [fht] Storing FHT @ 0x50003400
1,479,257 UART: [idev] ++
1,479,425 UART: [idev] CDI.KEYID = 6
1,479,785 UART: [idev] SUBJECT.KEYID = 7
1,480,209 UART: [idev] UDS.KEYID = 0
1,480,554 ready_for_fw is high
1,480,554 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,049 UART: [idev] Erasing UDS.KEYID = 0
1,504,469 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,961 UART: [idev] --
1,514,170 UART: [ldev] ++
1,514,338 UART: [ldev] CDI.KEYID = 6
1,514,701 UART: [ldev] SUBJECT.KEYID = 5
1,515,127 UART: [ldev] AUTHORITY.KEYID = 7
1,515,590 UART: [ldev] FE.KEYID = 1
1,520,726 UART: [ldev] Erasing FE.KEYID = 1
1,546,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,887 UART: [ldev] --
1,585,224 UART: [fwproc] Waiting for Commands...
1,585,903 UART: [fwproc] Received command 0x46574c44
1,586,694 UART: [fwproc] Received Image of size 115196 bytes
2,895,076 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,850 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,202 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,235 >>> mbox cmd response: success
3,090,289 UART: [afmc] ++
3,090,457 UART: [afmc] CDI.KEYID = 6
3,090,819 UART: [afmc] SUBJECT.KEYID = 7
3,091,244 UART: [afmc] AUTHORITY.KEYID = 5
3,126,905 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,043 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,823 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,551 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,436 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,126 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,959 UART: [afmc] --
3,170,069 UART: [cold-reset] --
3,170,859 UART: [state] Locking Datavault
3,172,210 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,814 UART: [state] Locking ICCM
3,173,392 UART: [exit] Launching FMC @ 0x40000130
3,178,721 UART:
3,178,737 UART: Running Caliptra FMC ...
3,179,145 UART:
3,179,288 UART: [state] CFI Enabled
3,190,087 UART: [fht] FMC Alias Private Key: 7
3,298,046 UART: [art] Extend RT PCRs Done
3,298,474 UART: [art] Lock RT PCRs Done
3,299,936 UART: [art] Populate DV Done
3,308,339 UART: [fht] FMC Alias Private Key: 7
3,309,301 UART: [art] Derive CDI
3,309,581 UART: [art] Store in in slot 0x4
3,395,348 UART: [art] Derive Key Pair
3,395,708 UART: [art] Store priv key in slot 0x5
3,409,128 UART: [art] Derive Key Pair - Done
3,423,768 UART: [art] Signing Cert with AUTHO
3,424,248 UART: RITY.KEYID = 7
3,440,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,781 UART: [art] PUB.X = 3DF6291824ECAAD052520A9D942B48515232DD5501DD92CF047F8D2F64777D0AF8CBF6D65894B332DA5288FED290E959
3,447,543 UART: [art] PUB.Y = DB1CFB8FBB1C90DDDE97770932F4775FB6A50945EC0EF9D1564008024038F8DA5B0DD9A6D12181998DFBEDF86F2D277B
3,454,491 UART: [art] SIG.R = FD18B542A7AD61B8722BB208A04613848B53DDEEAA86EFD3042B23DD98F7A7D27CFF0DC5764EB7CC1653C4CD32A33430
3,461,268 UART: [art] SIG.S = 20A3F54D9A2E9E89EFA0846CFCE34DB793CB7E3C0C1B64D2C1F6BD922D02ABA830D1178B15AF84E75D1D6D63A00BF461
3,484,926 UART: Caliptra RT
3,485,271 UART: [state] CFI Enabled
3,594,318 UART: [rt] RT listening for mailbox commands...
3,594,981 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,810 UART: [rt]cmd =0x46504c54, len=4
3,625,776 >>> mbox cmd response data (8 bytes)
3,625,939 UART: [rt] FIPS self test
3,626,267 UART: [kat] ++
3,626,419 UART: [kat] sha1
3,630,557 UART: [kat] SHA2-256
3,632,579 UART: [kat] SHA2-384
3,635,354 UART: [kat] SHA2-512-ACC
3,635,882 UART: Fatal Error: 0x90050001
3,637,421 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,637,426 >>> mbox cmd response: failed
3,637,426 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,637,431 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,818 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,350 UART: [kat] SHA2-256
882,281 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,396 UART: [kat] ++
886,548 UART: [kat] sha1
890,664 UART: [kat] SHA2-256
892,602 UART: [kat] SHA2-384
895,443 UART: [kat] SHA2-512-ACC
897,344 UART: [kat] ECC-384
903,129 UART: [kat] HMAC-384Kdf
907,953 UART: [kat] LMS
1,476,149 UART: [kat] --
1,477,098 UART: [cold-reset] ++
1,477,530 UART: [fht] Storing FHT @ 0x50003400
1,480,279 UART: [idev] ++
1,480,447 UART: [idev] CDI.KEYID = 6
1,480,807 UART: [idev] SUBJECT.KEYID = 7
1,481,231 UART: [idev] UDS.KEYID = 0
1,481,576 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,499 UART: [idev] Erasing UDS.KEYID = 0
1,506,337 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,827 UART: [idev] --
1,515,850 UART: [ldev] ++
1,516,018 UART: [ldev] CDI.KEYID = 6
1,516,381 UART: [ldev] SUBJECT.KEYID = 5
1,516,807 UART: [ldev] AUTHORITY.KEYID = 7
1,517,270 UART: [ldev] FE.KEYID = 1
1,522,540 UART: [ldev] Erasing FE.KEYID = 1
1,548,007 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,071 UART: [ldev] --
1,587,482 UART: [fwproc] Waiting for Commands...
1,588,139 UART: [fwproc] Received command 0x46574c44
1,588,930 UART: [fwproc] Received Image of size 115196 bytes
2,898,090 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,926,262 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,614 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,092,779 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,546 ready_for_fw is high
1,362,546 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,999 >>> mbox cmd response: success
3,001,745 UART:
3,001,761 UART: Running Caliptra FMC ...
3,002,169 UART:
3,002,312 UART: [state] CFI Enabled
3,013,065 UART: [fht] FMC Alias Private Key: 7
3,120,448 UART: [art] Extend RT PCRs Done
3,120,876 UART: [art] Lock RT PCRs Done
3,122,496 UART: [art] Populate DV Done
3,130,817 UART: [fht] FMC Alias Private Key: 7
3,131,763 UART: [art] Derive CDI
3,132,043 UART: [art] Store in in slot 0x4
3,217,652 UART: [art] Derive Key Pair
3,218,012 UART: [art] Store priv key in slot 0x5
3,231,212 UART: [art] Derive Key Pair - Done
3,246,205 UART: [art] Signing Cert with AUTHO
3,246,685 UART: RITY.KEYID = 7
3,261,723 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,488 UART: [art] PUB.X = AE3A7426CE3FDD80C6078079CEAFAF79262EF8AE953FD4930B0556BC717B8092E4D2E137C1282CF9CF581AC0C98CF3BA
3,269,267 UART: [art] PUB.Y = 0BAF0D9A50BA3E23807794E76E424567D8F60E3C703F14737C01B53476ADD5F96642DD853900A819FEDC65E54AC1D071
3,276,185 UART: [art] SIG.R = 5A11C12D536855525F5C335A894DCE055C582659D88D0C90BAFBAA7E4E13E241CA11D180B1EAFB33CAFF710BA93D5AA7
3,282,962 UART: [art] SIG.S = 009509CD6A0C9C43F26FDB885DFD58F1FCDBDEDC4E2E800AF9E68CABE32F4D2A4618A0AF3E6D2C3988B753158293CDEC
3,306,042 UART: Caliptra RT
3,306,387 UART: [state] CFI Enabled
3,415,312 UART: [rt] RT listening for mailbox commands...
3,415,975 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,566 UART: [rt]cmd =0x46504c54, len=4
3,446,684 >>> mbox cmd response data (8 bytes)
3,446,969 UART: [rt] FIPS self test
3,447,297 UART: [kat] ++
3,447,449 UART: [kat] sha1
3,451,687 UART: [kat] SHA2-256
3,453,709 UART: [kat] SHA2-384
3,456,592 UART: [kat] SHA2-512-ACC
3,457,218 UART: Fatal Error: 0x90050001
3,458,757 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,458,762 >>> mbox cmd response: failed
3,458,762 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,458,767 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,944 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,397 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
893,230 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,355 UART: [kat] ++
897,507 UART: [kat] sha1
901,781 UART: [kat] SHA2-256
903,721 UART: [kat] SHA2-384
906,458 UART: [kat] SHA2-512-ACC
908,359 UART: [kat] ECC-384
917,968 UART: [kat] HMAC-384Kdf
922,504 UART: [kat] LMS
1,170,832 UART: [kat] --
1,171,633 UART: [cold-reset] ++
1,172,203 UART: [fht] FHT @ 0x50003400
1,174,816 UART: [idev] ++
1,174,984 UART: [idev] CDI.KEYID = 6
1,175,344 UART: [idev] SUBJECT.KEYID = 7
1,175,768 UART: [idev] UDS.KEYID = 0
1,176,113 ready_for_fw is high
1,176,113 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,960 UART: [idev] Erasing UDS.KEYID = 0
1,201,919 UART: [idev] Sha1 KeyId Algorithm
1,210,611 UART: [idev] --
1,211,629 UART: [ldev] ++
1,211,797 UART: [ldev] CDI.KEYID = 6
1,212,160 UART: [ldev] SUBJECT.KEYID = 5
1,212,586 UART: [ldev] AUTHORITY.KEYID = 7
1,213,049 UART: [ldev] FE.KEYID = 1
1,218,297 UART: [ldev] Erasing FE.KEYID = 1
1,244,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,787 UART: [ldev] --
1,284,188 UART: [fwproc] Wait for Commands...
1,284,850 UART: [fwproc] Recv command 0x46574c44
1,285,578 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,941 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,876 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,180 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,187 >>> mbox cmd response: success
2,788,443 UART: [afmc] ++
2,788,611 UART: [afmc] CDI.KEYID = 6
2,788,973 UART: [afmc] SUBJECT.KEYID = 7
2,789,398 UART: [afmc] AUTHORITY.KEYID = 5
2,824,853 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,866 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,614 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,342 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,227 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,946 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,826 UART: [afmc] --
2,867,812 UART: [cold-reset] --
2,868,582 UART: [state] Locking Datavault
2,869,597 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,201 UART: [state] Locking ICCM
2,870,725 UART: [exit] Launching FMC @ 0x40000130
2,876,054 UART:
2,876,070 UART: Running Caliptra FMC ...
2,876,478 UART:
2,876,532 UART: [state] CFI Enabled
2,887,081 UART: [fht] FMC Alias Private Key: 7
2,994,568 UART: [art] Extend RT PCRs Done
2,994,996 UART: [art] Lock RT PCRs Done
2,996,628 UART: [art] Populate DV Done
3,004,751 UART: [fht] FMC Alias Private Key: 7
3,005,933 UART: [art] Derive CDI
3,006,213 UART: [art] Store in in slot 0x4
3,091,958 UART: [art] Derive Key Pair
3,092,318 UART: [art] Store priv key in slot 0x5
3,105,640 UART: [art] Derive Key Pair - Done
3,120,382 UART: [art] Signing Cert with AUTHO
3,120,862 UART: RITY.KEYID = 7
3,135,274 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,039 UART: [art] PUB.X = EB7614DD87EAB8F3FE22DFA49EF442EA2E8422BFC7992657F1DF26222E4553137233A1C93B34DF17C8CAB37B1A8FFAA9
3,142,827 UART: [art] PUB.Y = B3C4478ECF3C10D9DA2AB48F482B577E530109D10A498C3C4FADBE7E69FBDEB07341A09A8BCD0E2D456FE820078A063A
3,149,777 UART: [art] SIG.R = 5DAA6DFAD140FC06C8D348390E97A1CCC8B1091977BC656252C251D8FEC29FE0140C3BF7955C09554B870B63F7B60645
3,156,532 UART: [art] SIG.S = 3F5993D8C1DC4D59CD316F0761FB847045C578005DBF5D0C250F323C03E94DD00A6CA351D9FF2EE999FB97E34133CA10
3,180,342 UART: Caliptra RT
3,180,595 UART: [state] CFI Enabled
3,289,268 UART: [rt] RT listening for mailbox commands...
3,289,931 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,678 UART: [rt]cmd =0x46504c54, len=4
3,320,750 >>> mbox cmd response data (8 bytes)
3,321,093 UART: [rt] FIPS self test
3,321,421 UART: [kat] ++
3,321,573 UART: [kat] sha1
3,325,683 UART: [kat] SHA2-256
3,327,705 UART: [kat] SHA2-384
3,330,554 UART: [kat] SHA2-512-ACC
3,331,076 UART: Fatal Error: 0x90050001
3,332,615 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,332,620 >>> mbox cmd response: failed
3,332,620 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,332,625 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,554 UART: [state] LifecycleState = Unprovisioned
86,209 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
87,890 UART: [kat] SHA2-256
893,540 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,665 UART: [kat] ++
897,817 UART: [kat] sha1
901,953 UART: [kat] SHA2-256
903,893 UART: [kat] SHA2-384
906,814 UART: [kat] SHA2-512-ACC
908,715 UART: [kat] ECC-384
918,292 UART: [kat] HMAC-384Kdf
922,762 UART: [kat] LMS
1,171,090 UART: [kat] --
1,171,753 UART: [cold-reset] ++
1,172,305 UART: [fht] FHT @ 0x50003400
1,174,912 UART: [idev] ++
1,175,080 UART: [idev] CDI.KEYID = 6
1,175,440 UART: [idev] SUBJECT.KEYID = 7
1,175,864 UART: [idev] UDS.KEYID = 0
1,176,209 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,858 UART: [idev] Erasing UDS.KEYID = 0
1,200,723 UART: [idev] Sha1 KeyId Algorithm
1,209,191 UART: [idev] --
1,210,219 UART: [ldev] ++
1,210,387 UART: [ldev] CDI.KEYID = 6
1,210,750 UART: [ldev] SUBJECT.KEYID = 5
1,211,176 UART: [ldev] AUTHORITY.KEYID = 7
1,211,639 UART: [ldev] FE.KEYID = 1
1,216,789 UART: [ldev] Erasing FE.KEYID = 1
1,242,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,903 UART: [ldev] --
1,282,336 UART: [fwproc] Wait for Commands...
1,282,970 UART: [fwproc] Recv command 0x46574c44
1,283,698 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,439 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,456 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,760 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,803 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,415 ready_for_fw is high
1,059,415 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,766 >>> mbox cmd response: success
2,696,238 UART:
2,696,254 UART: Running Caliptra FMC ...
2,696,662 UART:
2,696,716 UART: [state] CFI Enabled
2,706,953 UART: [fht] FMC Alias Private Key: 7
2,815,006 UART: [art] Extend RT PCRs Done
2,815,434 UART: [art] Lock RT PCRs Done
2,816,834 UART: [art] Populate DV Done
2,824,811 UART: [fht] FMC Alias Private Key: 7
2,825,975 UART: [art] Derive CDI
2,826,255 UART: [art] Store in in slot 0x4
2,911,968 UART: [art] Derive Key Pair
2,912,328 UART: [art] Store priv key in slot 0x5
2,925,456 UART: [art] Derive Key Pair - Done
2,940,023 UART: [art] Signing Cert with AUTHO
2,940,503 UART: RITY.KEYID = 7
2,955,789 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,554 UART: [art] PUB.X = 8A48505BAD71B5A8EFA3CCE779E01E67C18CD6B688960AD3116AA0427C6512F2A51EEC54246EFD2B58308220A017C8A2
2,963,329 UART: [art] PUB.Y = C9F3EE8505A27885EDFEF14045CC40BD8E61C01C898AB38032A1D8C3C13E9AE560A5585B7E4050364B066386D70B5BAD
2,970,278 UART: [art] SIG.R = A01803A8334D837BAA278C2DCE7D1097E0B0CF421FF9EC5FC8646F458765ED466896FBC6C1A80F6BD5A2E5623FF3FBD4
2,977,058 UART: [art] SIG.S = FBF17F494500E3D6E95546EC57F62A7A1CC26B945FBFA3B35B45956AB1985E69534A1A01E64533DA070BC0DCA2DACABB
3,000,952 UART: Caliptra RT
3,001,205 UART: [state] CFI Enabled
3,109,021 UART: [rt] RT listening for mailbox commands...
3,109,684 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,379 UART: [rt]cmd =0x46504c54, len=4
3,140,495 >>> mbox cmd response data (8 bytes)
3,140,746 UART: [rt] FIPS self test
3,141,074 UART: [kat] ++
3,141,226 UART: [kat] sha1
3,145,318 UART: [kat] SHA2-256
3,147,340 UART: [kat] SHA2-384
3,150,243 UART: [kat] SHA2-512-ACC
3,150,823 UART: Fatal Error: 0x90050001
3,152,362 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,152,367 >>> mbox cmd response: failed
3,152,367 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,152,372 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,109 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,860 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,642 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
893,601 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,726 UART: [kat] ++
897,878 UART: [kat] sha1
901,980 UART: [kat] SHA2-256
903,920 UART: [kat] SHA2-384
906,793 UART: [kat] SHA2-512-ACC
908,694 UART: [kat] ECC-384
918,367 UART: [kat] HMAC-384Kdf
922,907 UART: [kat] LMS
1,171,235 UART: [kat] --
1,172,432 UART: [cold-reset] ++
1,172,868 UART: [fht] FHT @ 0x50003400
1,175,563 UART: [idev] ++
1,175,731 UART: [idev] CDI.KEYID = 6
1,176,091 UART: [idev] SUBJECT.KEYID = 7
1,176,515 UART: [idev] UDS.KEYID = 0
1,176,860 ready_for_fw is high
1,176,860 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,561 UART: [idev] Erasing UDS.KEYID = 0
1,201,740 UART: [idev] Sha1 KeyId Algorithm
1,210,162 UART: [idev] --
1,211,100 UART: [ldev] ++
1,211,268 UART: [ldev] CDI.KEYID = 6
1,211,631 UART: [ldev] SUBJECT.KEYID = 5
1,212,057 UART: [ldev] AUTHORITY.KEYID = 7
1,212,520 UART: [ldev] FE.KEYID = 1
1,217,558 UART: [ldev] Erasing FE.KEYID = 1
1,243,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,110 UART: [ldev] --
1,283,565 UART: [fwproc] Wait for Commands...
1,284,257 UART: [fwproc] Recv command 0x46574c44
1,284,985 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,293 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,597 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,786 >>> mbox cmd response: success
2,788,006 UART: [afmc] ++
2,788,174 UART: [afmc] CDI.KEYID = 6
2,788,536 UART: [afmc] SUBJECT.KEYID = 7
2,788,961 UART: [afmc] AUTHORITY.KEYID = 5
2,824,526 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,877 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,625 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,353 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,238 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,957 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,739 UART: [afmc] --
2,867,827 UART: [cold-reset] --
2,868,409 UART: [state] Locking Datavault
2,869,456 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,060 UART: [state] Locking ICCM
2,870,512 UART: [exit] Launching FMC @ 0x40000130
2,875,841 UART:
2,875,857 UART: Running Caliptra FMC ...
2,876,265 UART:
2,876,408 UART: [state] CFI Enabled
2,886,919 UART: [fht] FMC Alias Private Key: 7
2,994,568 UART: [art] Extend RT PCRs Done
2,994,996 UART: [art] Lock RT PCRs Done
2,996,544 UART: [art] Populate DV Done
3,005,005 UART: [fht] FMC Alias Private Key: 7
3,006,167 UART: [art] Derive CDI
3,006,447 UART: [art] Store in in slot 0x4
3,092,030 UART: [art] Derive Key Pair
3,092,390 UART: [art] Store priv key in slot 0x5
3,105,198 UART: [art] Derive Key Pair - Done
3,119,958 UART: [art] Signing Cert with AUTHO
3,120,438 UART: RITY.KEYID = 7
3,135,416 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,181 UART: [art] PUB.X = EABFDCA9CA9CA069DCC96AD2260CE7F7CF1593CFD1C859F78A76A1B1CDBB39A477983288C6DF0986AD44AA054C1DC1D2
3,142,970 UART: [art] PUB.Y = 36B6C217E8D26E8D38B4FD3A92C0B184E8B4FA66188102C08BC70E7F6B09E339457483A22C77C52DEB6AAA80168D2CAC
3,149,921 UART: [art] SIG.R = EE0B1AD61B49DE4650DC87F975143F29C0F7512B15A7B262D79E895974AE9DA208E5EE51019D7B23C89B73E9FC94EE9B
3,156,692 UART: [art] SIG.S = A2A165456F86A0901CC824B576EA35D7C4F7D997C2EB61AE556941BCFC8C8AB50975B18AAE179ED60644CC087C6236ED
3,180,312 UART: Caliptra RT
3,180,657 UART: [state] CFI Enabled
3,287,753 UART: [rt] RT listening for mailbox commands...
3,288,416 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,495 UART: [rt]cmd =0x46504c54, len=4
3,319,729 >>> mbox cmd response data (8 bytes)
3,319,990 UART: [rt] FIPS self test
3,320,318 UART: [kat] ++
3,320,470 UART: [kat] sha1
3,324,652 UART: [kat] SHA2-256
3,326,674 UART: [kat] SHA2-384
3,329,549 UART: [kat] SHA2-512-ACC
3,330,207 UART: Fatal Error: 0x90050001
3,331,746 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,331,751 >>> mbox cmd response: failed
3,331,751 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,331,756 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
87,048 UART: [state] WD Timer not started. Device not locked for debugging
88,265 UART: [kat] SHA2-256
893,915 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,040 UART: [kat] ++
898,192 UART: [kat] sha1
902,612 UART: [kat] SHA2-256
904,552 UART: [kat] SHA2-384
907,427 UART: [kat] SHA2-512-ACC
909,328 UART: [kat] ECC-384
919,185 UART: [kat] HMAC-384Kdf
923,939 UART: [kat] LMS
1,172,267 UART: [kat] --
1,173,290 UART: [cold-reset] ++
1,173,690 UART: [fht] FHT @ 0x50003400
1,176,281 UART: [idev] ++
1,176,449 UART: [idev] CDI.KEYID = 6
1,176,809 UART: [idev] SUBJECT.KEYID = 7
1,177,233 UART: [idev] UDS.KEYID = 0
1,177,578 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,185,435 UART: [idev] Erasing UDS.KEYID = 0
1,202,102 UART: [idev] Sha1 KeyId Algorithm
1,210,340 UART: [idev] --
1,211,158 UART: [ldev] ++
1,211,326 UART: [ldev] CDI.KEYID = 6
1,211,689 UART: [ldev] SUBJECT.KEYID = 5
1,212,115 UART: [ldev] AUTHORITY.KEYID = 7
1,212,578 UART: [ldev] FE.KEYID = 1
1,217,676 UART: [ldev] Erasing FE.KEYID = 1
1,243,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,968 UART: [ldev] --
1,283,417 UART: [fwproc] Wait for Commands...
1,284,237 UART: [fwproc] Recv command 0x46574c44
1,284,965 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,955 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,259 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,252 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,328 ready_for_fw is high
1,060,328 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,835 >>> mbox cmd response: success
2,700,551 UART:
2,700,567 UART: Running Caliptra FMC ...
2,700,975 UART:
2,701,118 UART: [state] CFI Enabled
2,712,067 UART: [fht] FMC Alias Private Key: 7
2,819,642 UART: [art] Extend RT PCRs Done
2,820,070 UART: [art] Lock RT PCRs Done
2,821,686 UART: [art] Populate DV Done
2,829,867 UART: [fht] FMC Alias Private Key: 7
2,830,999 UART: [art] Derive CDI
2,831,279 UART: [art] Store in in slot 0x4
2,916,872 UART: [art] Derive Key Pair
2,917,232 UART: [art] Store priv key in slot 0x5
2,930,544 UART: [art] Derive Key Pair - Done
2,945,599 UART: [art] Signing Cert with AUTHO
2,946,079 UART: RITY.KEYID = 7
2,961,509 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,274 UART: [art] PUB.X = D42505D9492CAF260284EF88047B59FBFAB7412A8FC69B2122E27FD56F436F1EA4AC07A0ED1CAC0C5E367A164B4C24B6
2,969,043 UART: [art] PUB.Y = 9962B5EFF8E0E4F23484994CF23735A4C10CC746C95D2F91D4EDFD83D6078023DB04536F20F6D1318A9878EBFF53AD58
2,975,990 UART: [art] SIG.R = EE20234D4B4D1C6971511C3796563AE93F9F1BB6E4BB0A8FBA11DFB1CD6A324A1011D14A92B11F44944BEF1FC5DCAB5C
2,982,777 UART: [art] SIG.S = 8C9A6D1008EF15598B8D42E65CA7C24F0F80279102B100E114B44101678D645B46855EE260CF85010D70570C48300503
3,006,189 UART: Caliptra RT
3,006,534 UART: [state] CFI Enabled
3,114,980 UART: [rt] RT listening for mailbox commands...
3,115,643 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,658 UART: [rt]cmd =0x46504c54, len=4
3,146,890 >>> mbox cmd response data (8 bytes)
3,147,039 UART: [rt] FIPS self test
3,147,367 UART: [kat] ++
3,147,519 UART: [kat] sha1
3,151,777 UART: [kat] SHA2-256
3,153,799 UART: [kat] SHA2-384
3,156,562 UART: [kat] SHA2-512-ACC
3,157,114 UART: Fatal Error: 0x90050001
3,158,653 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,158,658 >>> mbox cmd response: failed
3,158,658 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,158,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,084 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,097 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
87,882 UART: [kat] SHA2-256
891,432 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,561 UART: [kat] ++
895,713 UART: [kat] sha1
900,007 UART: [kat] SHA2-256
901,947 UART: [kat] SHA2-384
904,608 UART: [kat] SHA2-512-ACC
906,509 UART: [kat] ECC-384
916,286 UART: [kat] HMAC-384Kdf
920,848 UART: [kat] LMS
1,169,160 UART: [kat] --
1,170,091 UART: [cold-reset] ++
1,170,513 UART: [fht] FHT @ 0x50003400
1,173,345 UART: [idev] ++
1,173,513 UART: [idev] CDI.KEYID = 6
1,173,874 UART: [idev] SUBJECT.KEYID = 7
1,174,299 UART: [idev] UDS.KEYID = 0
1,174,645 ready_for_fw is high
1,174,645 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,417 UART: [idev] Erasing UDS.KEYID = 0
1,198,891 UART: [idev] Sha1 KeyId Algorithm
1,207,695 UART: [idev] --
1,208,614 UART: [ldev] ++
1,208,782 UART: [ldev] CDI.KEYID = 6
1,209,146 UART: [ldev] SUBJECT.KEYID = 5
1,209,573 UART: [ldev] AUTHORITY.KEYID = 7
1,210,036 UART: [ldev] FE.KEYID = 1
1,215,292 UART: [ldev] Erasing FE.KEYID = 1
1,241,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,714 UART: [ldev] --
1,281,042 UART: [fwproc] Wait for Commands...
1,281,627 UART: [fwproc] Recv command 0x46574c44
1,282,360 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,932 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,241 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,481 >>> mbox cmd response: success
2,784,718 UART: [afmc] ++
2,784,886 UART: [afmc] CDI.KEYID = 6
2,785,249 UART: [afmc] SUBJECT.KEYID = 7
2,785,675 UART: [afmc] AUTHORITY.KEYID = 5
2,821,110 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,550 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,301 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,030 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,913 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,632 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,371 UART: [afmc] --
2,864,423 UART: [cold-reset] --
2,865,201 UART: [state] Locking Datavault
2,866,260 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,864 UART: [state] Locking ICCM
2,867,522 UART: [exit] Launching FMC @ 0x40000130
2,872,851 UART:
2,872,867 UART: Running Caliptra FMC ...
2,873,275 UART:
2,873,329 UART: [state] CFI Enabled
2,883,908 UART: [fht] FMC Alias Private Key: 7
2,991,561 UART: [art] Extend RT PCRs Done
2,991,989 UART: [art] Lock RT PCRs Done
2,994,029 UART: [art] Populate DV Done
3,001,886 UART: [fht] FMC Alias Private Key: 7
3,003,022 UART: [art] Derive CDI
3,003,302 UART: [art] Store in in slot 0x4
3,088,813 UART: [art] Derive Key Pair
3,089,173 UART: [art] Store priv key in slot 0x5
3,102,291 UART: [art] Derive Key Pair - Done
3,116,897 UART: [art] Signing Cert with AUTHO
3,117,377 UART: RITY.KEYID = 7
3,132,715 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,480 UART: [art] PUB.X = 9A13D3B48ABA124B1F45AA09E81C6C120F196B639A7B8CB4AAA1955766C1DCC6FE2715B6BBC27B83E7D971D6DA54BD47
3,140,262 UART: [art] PUB.Y = 738860B740E866656112A7233CBD3CDA0EA0A25AAE18ACEFF9E92F0F3A40FD5BF819F8646EB58BA92BEAEB4FFC408215
3,147,226 UART: [art] SIG.R = 1F90DF8C5F800F90818BC978F99823CEC6F6FA5E1F8B3514B9DCD5615850FD5E6EC2E2C0493EEBFADEA0AB28EBB0967A
3,154,017 UART: [art] SIG.S = 652A5834F8B02830DD7D1C9244AA5493DA5093083DB4745E7D91BF4018F4B45276813A2B004ABAFF65B2002FD863C96F
3,177,367 UART: Caliptra RT
3,177,620 UART: [state] CFI Enabled
3,285,813 UART: [rt] RT listening for mailbox commands...
3,286,476 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,203 UART: [rt]cmd =0x46504c54, len=4
3,317,359 >>> mbox cmd response data (8 bytes)
3,317,566 UART: [rt] FIPS self test
3,317,894 UART: [kat] ++
3,318,046 UART: [kat] sha1
3,322,250 UART: [kat] SHA2-256
3,324,272 UART: [kat] SHA2-384
3,327,303 UART: [kat] SHA2-512-ACC
3,327,955 UART: Fatal Error: 0x90050001
3,329,494 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,499 >>> mbox cmd response: failed
3,329,499 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,504 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
86,021 UART: [state] WD Timer not started. Device not locked for debugging
87,128 UART: [kat] SHA2-256
890,678 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,807 UART: [kat] ++
894,959 UART: [kat] sha1
899,219 UART: [kat] SHA2-256
901,159 UART: [kat] SHA2-384
903,856 UART: [kat] SHA2-512-ACC
905,757 UART: [kat] ECC-384
915,716 UART: [kat] HMAC-384Kdf
920,282 UART: [kat] LMS
1,168,594 UART: [kat] --
1,169,493 UART: [cold-reset] ++
1,170,065 UART: [fht] FHT @ 0x50003400
1,172,597 UART: [idev] ++
1,172,765 UART: [idev] CDI.KEYID = 6
1,173,126 UART: [idev] SUBJECT.KEYID = 7
1,173,551 UART: [idev] UDS.KEYID = 0
1,173,897 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,625 UART: [idev] Erasing UDS.KEYID = 0
1,198,791 UART: [idev] Sha1 KeyId Algorithm
1,207,689 UART: [idev] --
1,208,568 UART: [ldev] ++
1,208,736 UART: [ldev] CDI.KEYID = 6
1,209,100 UART: [ldev] SUBJECT.KEYID = 5
1,209,527 UART: [ldev] AUTHORITY.KEYID = 7
1,209,990 UART: [ldev] FE.KEYID = 1
1,215,328 UART: [ldev] Erasing FE.KEYID = 1
1,241,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,532 UART: [ldev] --
1,280,982 UART: [fwproc] Wait for Commands...
1,281,725 UART: [fwproc] Recv command 0x46574c44
1,282,458 UART: [fwproc] Recv'd Img size: 115196 bytes
2,589,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,868 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,177 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,183 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,732 ready_for_fw is high
1,055,732 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,565 >>> mbox cmd response: success
2,694,283 UART:
2,694,299 UART: Running Caliptra FMC ...
2,694,707 UART:
2,694,761 UART: [state] CFI Enabled
2,705,342 UART: [fht] FMC Alias Private Key: 7
2,812,629 UART: [art] Extend RT PCRs Done
2,813,057 UART: [art] Lock RT PCRs Done
2,814,585 UART: [art] Populate DV Done
2,822,940 UART: [fht] FMC Alias Private Key: 7
2,823,916 UART: [art] Derive CDI
2,824,196 UART: [art] Store in in slot 0x4
2,909,879 UART: [art] Derive Key Pair
2,910,239 UART: [art] Store priv key in slot 0x5
2,923,889 UART: [art] Derive Key Pair - Done
2,938,651 UART: [art] Signing Cert with AUTHO
2,939,131 UART: RITY.KEYID = 7
2,954,643 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,408 UART: [art] PUB.X = D17D6EF1D0CFC2F60363615AFE4D93AD742CE3FAA014BEFD3865D8A8D7D0B006BC63FDA4ADB4C9783CDA3B860DA5331A
2,962,197 UART: [art] PUB.Y = 66EF07693BBA0676E744E7130ACBF04E98A3517DEBD8F69D35F096FE39B0A98614589BB6A005B6064A7E21B73CC16F67
2,969,138 UART: [art] SIG.R = D885EE2675CC770A910185241BC33246D86E36A25DC4F81EDF55FEF57D7218D1E0ACFA5DB30D2FAB67D8FB425F0194BA
2,975,912 UART: [art] SIG.S = 93A5A79590D0C50BBA3704C9600E82D28FF641AFF64DFE723EE558119B586DE5F4F4B8FC34EC62B359CC210E6B30E6DB
3,000,073 UART: Caliptra RT
3,000,326 UART: [state] CFI Enabled
3,108,650 UART: [rt] RT listening for mailbox commands...
3,109,313 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,126 UART: [rt]cmd =0x46504c54, len=4
3,140,406 >>> mbox cmd response data (8 bytes)
3,140,735 UART: [rt] FIPS self test
3,141,063 UART: [kat] ++
3,141,215 UART: [kat] sha1
3,145,593 UART: [kat] SHA2-256
3,147,615 UART: [kat] SHA2-384
3,150,546 UART: [kat] SHA2-512-ACC
3,151,026 UART: Fatal Error: 0x90050001
3,152,565 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,152,570 >>> mbox cmd response: failed
3,152,570 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,152,575 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,706 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,631,143 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,845 UART: [state] LifecycleState = Unprovisioned
86,500 UART: [state] DebugLocked = No
86,994 UART: [state] WD Timer not started. Device not locked for debugging
88,315 UART: [kat] SHA2-256
891,865 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,994 UART: [kat] ++
896,146 UART: [kat] sha1
900,462 UART: [kat] SHA2-256
902,402 UART: [kat] SHA2-384
905,061 UART: [kat] SHA2-512-ACC
906,962 UART: [kat] ECC-384
916,371 UART: [kat] HMAC-384Kdf
920,875 UART: [kat] LMS
1,169,187 UART: [kat] --
1,170,030 UART: [cold-reset] ++
1,170,606 UART: [fht] FHT @ 0x50003400
1,173,292 UART: [idev] ++
1,173,460 UART: [idev] CDI.KEYID = 6
1,173,821 UART: [idev] SUBJECT.KEYID = 7
1,174,246 UART: [idev] UDS.KEYID = 0
1,174,592 ready_for_fw is high
1,174,592 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,414 UART: [idev] Erasing UDS.KEYID = 0
1,199,762 UART: [idev] Sha1 KeyId Algorithm
1,208,650 UART: [idev] --
1,209,875 UART: [ldev] ++
1,210,043 UART: [ldev] CDI.KEYID = 6
1,210,407 UART: [ldev] SUBJECT.KEYID = 5
1,210,834 UART: [ldev] AUTHORITY.KEYID = 7
1,211,297 UART: [ldev] FE.KEYID = 1
1,216,851 UART: [ldev] Erasing FE.KEYID = 1
1,243,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,397 UART: [ldev] --
1,282,863 UART: [fwproc] Wait for Commands...
1,283,450 UART: [fwproc] Recv command 0x46574c44
1,284,183 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,635 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,944 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,950 >>> mbox cmd response: success
2,786,207 UART: [afmc] ++
2,786,375 UART: [afmc] CDI.KEYID = 6
2,786,738 UART: [afmc] SUBJECT.KEYID = 7
2,787,164 UART: [afmc] AUTHORITY.KEYID = 5
2,822,463 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,806 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,535 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,418 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,137 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,786 UART: [afmc] --
2,865,782 UART: [cold-reset] --
2,866,496 UART: [state] Locking Datavault
2,867,999 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,603 UART: [state] Locking ICCM
2,869,041 UART: [exit] Launching FMC @ 0x40000130
2,874,370 UART:
2,874,386 UART: Running Caliptra FMC ...
2,874,794 UART:
2,874,937 UART: [state] CFI Enabled
2,885,598 UART: [fht] FMC Alias Private Key: 7
2,993,749 UART: [art] Extend RT PCRs Done
2,994,177 UART: [art] Lock RT PCRs Done
2,995,577 UART: [art] Populate DV Done
3,003,886 UART: [fht] FMC Alias Private Key: 7
3,004,950 UART: [art] Derive CDI
3,005,230 UART: [art] Store in in slot 0x4
3,091,011 UART: [art] Derive Key Pair
3,091,371 UART: [art] Store priv key in slot 0x5
3,104,797 UART: [art] Derive Key Pair - Done
3,119,593 UART: [art] Signing Cert with AUTHO
3,120,073 UART: RITY.KEYID = 7
3,135,311 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,076 UART: [art] PUB.X = 4456EF01F449E2EDA7A87958A80E5890BB213C240064700382C0C265F39D5D3E0B8AB4C284D400FCF3D675AB220553EB
3,142,789 UART: [art] PUB.Y = 0D5D848C2C6EECD0E11993DA8B4B51E8E681DDF3D46D89ECF100EEB3E000847F01E22161CD76CA551386E996364A456F
3,149,699 UART: [art] SIG.R = BE817AFBB5AB828747D1B197541831B8AADF8E3A0A31966B6FEACC292763DFBB11245DE8498D7826A31EAC71E66105E9
3,156,475 UART: [art] SIG.S = 85A9BCD6072EC103AA26B947BA682C985E83293AFD4DB7F0C605DD2F425B9EEFC7E5C5C4CC80A9CC41D5411961BF8FD7
3,180,255 UART: Caliptra RT
3,180,600 UART: [state] CFI Enabled
3,288,824 UART: [rt] RT listening for mailbox commands...
3,289,487 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,110 UART: [rt]cmd =0x46504c54, len=4
3,320,352 >>> mbox cmd response data (8 bytes)
3,320,465 UART: [rt] FIPS self test
3,320,793 UART: [kat] ++
3,320,945 UART: [kat] sha1
3,325,057 UART: [kat] SHA2-256
3,327,079 UART: [kat] SHA2-384
3,330,166 UART: [kat] SHA2-512-ACC
3,330,750 UART: Fatal Error: 0x90050001
3,332,289 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,332,294 >>> mbox cmd response: failed
3,332,294 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,332,299 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,382 UART: [state] WD Timer not started. Device not locked for debugging
87,531 UART: [kat] SHA2-256
891,081 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,210 UART: [kat] ++
895,362 UART: [kat] sha1
899,566 UART: [kat] SHA2-256
901,506 UART: [kat] SHA2-384
904,319 UART: [kat] SHA2-512-ACC
906,220 UART: [kat] ECC-384
915,973 UART: [kat] HMAC-384Kdf
920,749 UART: [kat] LMS
1,169,061 UART: [kat] --
1,170,088 UART: [cold-reset] ++
1,170,568 UART: [fht] FHT @ 0x50003400
1,173,160 UART: [idev] ++
1,173,328 UART: [idev] CDI.KEYID = 6
1,173,689 UART: [idev] SUBJECT.KEYID = 7
1,174,114 UART: [idev] UDS.KEYID = 0
1,174,460 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,186 UART: [idev] Erasing UDS.KEYID = 0
1,199,574 UART: [idev] Sha1 KeyId Algorithm
1,208,430 UART: [idev] --
1,209,535 UART: [ldev] ++
1,209,703 UART: [ldev] CDI.KEYID = 6
1,210,067 UART: [ldev] SUBJECT.KEYID = 5
1,210,494 UART: [ldev] AUTHORITY.KEYID = 7
1,210,957 UART: [ldev] FE.KEYID = 1
1,216,353 UART: [ldev] Erasing FE.KEYID = 1
1,242,544 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,727 UART: [ldev] --
1,282,173 UART: [fwproc] Wait for Commands...
1,282,982 UART: [fwproc] Recv command 0x46574c44
1,283,715 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,607 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,916 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,094 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,757 ready_for_fw is high
1,056,757 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,636,926 >>> mbox cmd response: success
2,699,048 UART:
2,699,064 UART: Running Caliptra FMC ...
2,699,472 UART:
2,699,615 UART: [state] CFI Enabled
2,710,182 UART: [fht] FMC Alias Private Key: 7
2,817,809 UART: [art] Extend RT PCRs Done
2,818,237 UART: [art] Lock RT PCRs Done
2,819,713 UART: [art] Populate DV Done
2,828,012 UART: [fht] FMC Alias Private Key: 7
2,829,066 UART: [art] Derive CDI
2,829,346 UART: [art] Store in in slot 0x4
2,914,589 UART: [art] Derive Key Pair
2,914,949 UART: [art] Store priv key in slot 0x5
2,928,143 UART: [art] Derive Key Pair - Done
2,943,198 UART: [art] Signing Cert with AUTHO
2,943,678 UART: RITY.KEYID = 7
2,959,080 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,845 UART: [art] PUB.X = 58582052E7EB35746AB5FAFA05560C1535C659EBAFCCF1411E193AD3A3915937E867ABD80B0B2B2017938A5DC0E3B55A
2,966,611 UART: [art] PUB.Y = EBF21667D60C80371267C1108406C4EB55A54B617D023E112EBD7526D86DE35053815B452F200C9AB7116C12DA6231D1
2,973,543 UART: [art] SIG.R = 14F7315BCEB311E9210814D477AF4D39BB935104004231C941F66EAB290F755BEB4FD94CCB9DFB1BAE28B5687E5036FA
2,980,292 UART: [art] SIG.S = 070388C8900C8A2A48D419A05B3A424BA562B0F476AD57C60C8FCD6899365BDFDFB30C9C07E824F49ECB50FF02C02712
3,004,308 UART: Caliptra RT
3,004,653 UART: [state] CFI Enabled
3,112,382 UART: [rt] RT listening for mailbox commands...
3,113,045 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,694 UART: [rt]cmd =0x46504c54, len=4
3,143,942 >>> mbox cmd response data (8 bytes)
3,144,303 UART: [rt] FIPS self test
3,144,631 UART: [kat] ++
3,144,783 UART: [kat] sha1
3,149,147 UART: [kat] SHA2-256
3,151,169 UART: [kat] SHA2-384
3,154,214 UART: [kat] SHA2-512-ACC
3,154,928 UART: Fatal Error: 0x90050001
3,156,467 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,156,472 >>> mbox cmd response: failed
3,156,472 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,156,477 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,973 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,084 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,828 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,836 >>> mbox cmd response: failed
809,836 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,842 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,729 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,091 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,536 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,544 >>> mbox cmd response: failed
809,544 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,550 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,153 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,105 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,815 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,823 >>> mbox cmd response: failed
809,823 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,829 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,856 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,458 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,111 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,119 >>> mbox cmd response: failed
810,119 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,125 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,746 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,649,134 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,928 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,936 >>> mbox cmd response: failed
809,936 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,942 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,825 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,683 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,364 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,372 >>> mbox cmd response: failed
809,372 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,378 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,939 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,647,511 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,175 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,183 >>> mbox cmd response: failed
810,183 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,189 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,124 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,564 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,999 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,007 >>> mbox cmd response: failed
810,007 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,450 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,082 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,854 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,862 >>> mbox cmd response: failed
809,862 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
809,868 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,461 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,644,925 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,032 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,040 >>> mbox cmd response: failed
810,040 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,046 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,173 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,353 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,231 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,239 >>> mbox cmd response: failed
810,239 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,245 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,756 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,846 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,429 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,437 >>> mbox cmd response: failed
810,437 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
810,443 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,146 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,160 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,537 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,207 UART: [kat] SHA2-256
882,138 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,253 UART: [kat] ++
886,405 UART: [kat] sha1
890,453 UART: [kat] SHA2-256
892,391 UART: [kat] SHA2-384
895,214 UART: [kat] SHA2-512-ACC
897,115 UART: [kat] ECC-384
902,766 UART: [kat] HMAC-384Kdf
907,242 UART: [kat] LMS
1,475,438 UART: [kat] --
1,476,195 UART: [cold-reset] ++
1,476,639 UART: [fht] Storing FHT @ 0x50003400
1,479,370 UART: [idev] ++
1,479,538 UART: [idev] CDI.KEYID = 6
1,479,898 UART: [idev] SUBJECT.KEYID = 7
1,480,322 UART: [idev] UDS.KEYID = 0
1,480,667 ready_for_fw is high
1,480,667 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,210 UART: [idev] Erasing UDS.KEYID = 0
1,505,038 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,604 UART: [idev] --
1,514,699 UART: [ldev] ++
1,514,867 UART: [ldev] CDI.KEYID = 6
1,515,230 UART: [ldev] SUBJECT.KEYID = 5
1,515,656 UART: [ldev] AUTHORITY.KEYID = 7
1,516,119 UART: [ldev] FE.KEYID = 1
1,521,037 UART: [ldev] Erasing FE.KEYID = 1
1,545,970 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,304 UART: [ldev] --
1,585,611 UART: [fwproc] Waiting for Commands...
1,586,478 UART: [fwproc] Received command 0x46574c44
1,587,269 UART: [fwproc] Received Image of size 115196 bytes
2,895,617 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,139 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,491 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,728 >>> mbox cmd response: success
3,090,938 UART: [afmc] ++
3,091,106 UART: [afmc] CDI.KEYID = 6
3,091,468 UART: [afmc] SUBJECT.KEYID = 7
3,091,893 UART: [afmc] AUTHORITY.KEYID = 5
3,126,962 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,268 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,048 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,776 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,661 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,351 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,006 UART: [afmc] --
3,170,102 UART: [cold-reset] --
3,170,864 UART: [state] Locking Datavault
3,172,137 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,741 UART: [state] Locking ICCM
3,173,321 UART: [exit] Launching FMC @ 0x40000130
3,178,650 UART:
3,178,666 UART: Running Caliptra FMC ...
3,179,074 UART:
3,179,128 UART: [state] CFI Enabled
3,189,665 UART: [fht] FMC Alias Private Key: 7
3,297,682 UART: [art] Extend RT PCRs Done
3,298,110 UART: [art] Lock RT PCRs Done
3,299,794 UART: [art] Populate DV Done
3,308,125 UART: [fht] FMC Alias Private Key: 7
3,309,291 UART: [art] Derive CDI
3,309,571 UART: [art] Store in in slot 0x4
3,395,040 UART: [art] Derive Key Pair
3,395,400 UART: [art] Store priv key in slot 0x5
3,408,668 UART: [art] Derive Key Pair - Done
3,423,327 UART: [art] Signing Cert with AUTHO
3,423,807 UART: RITY.KEYID = 7
3,439,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,814 UART: [art] PUB.X = 1B7545B12AEDA33679A4D9007004090D890016E855CC4EED4F2B3D3686BF784AB6191584C6A913F7225826EB9968E882
3,446,525 UART: [art] PUB.Y = EBCB6111C3585B2CA5DB36D8B8283B87A7157E0444F33DC88341B11E9AE734BE5B22F505DA195FDEECD615DEF2209827
3,453,481 UART: [art] SIG.R = 7011740C889993216FEDD6AC49EBF53FA4AF9A2D2388031092047605D87D5C2DE4EA022A517EDB2C2736C226CED89D62
3,460,240 UART: [art] SIG.S = CC3EB650B712E1D39CA85B2D3EC6813850A74B791FA35B12710459D22472BFF11B6AED05A8C3C19F7886E5AB16D62447
3,484,321 UART: Caliptra RT
3,484,574 UART: [state] CFI Enabled
3,592,585 UART: [rt] RT listening for mailbox commands...
3,593,248 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,037 UART: [rt]cmd =0x46504c54, len=4
3,624,225 >>> mbox cmd response data (8 bytes)
3,624,396 UART: [rt] FIPS self test
3,624,724 UART: [kat] ++
3,624,876 UART: [kat] sha1
3,629,350 UART: [kat] SHA2-256
3,631,372 UART: [kat] SHA2-384
3,632,362 UART: Fatal Error: 0x90020001
3,633,901 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,633,906 >>> mbox cmd response: failed
3,633,906 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,633,911 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,461 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,165 UART: [kat] SHA2-256
882,096 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,211 UART: [kat] ++
886,363 UART: [kat] sha1
890,637 UART: [kat] SHA2-256
892,575 UART: [kat] SHA2-384
895,092 UART: [kat] SHA2-512-ACC
896,993 UART: [kat] ECC-384
902,686 UART: [kat] HMAC-384Kdf
907,362 UART: [kat] LMS
1,475,558 UART: [kat] --
1,476,495 UART: [cold-reset] ++
1,477,071 UART: [fht] Storing FHT @ 0x50003400
1,479,786 UART: [idev] ++
1,479,954 UART: [idev] CDI.KEYID = 6
1,480,314 UART: [idev] SUBJECT.KEYID = 7
1,480,738 UART: [idev] UDS.KEYID = 0
1,481,083 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,518 UART: [idev] Erasing UDS.KEYID = 0
1,505,142 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,710 UART: [idev] --
1,514,665 UART: [ldev] ++
1,514,833 UART: [ldev] CDI.KEYID = 6
1,515,196 UART: [ldev] SUBJECT.KEYID = 5
1,515,622 UART: [ldev] AUTHORITY.KEYID = 7
1,516,085 UART: [ldev] FE.KEYID = 1
1,521,273 UART: [ldev] Erasing FE.KEYID = 1
1,546,518 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,334 UART: [ldev] --
1,585,777 UART: [fwproc] Waiting for Commands...
1,586,488 UART: [fwproc] Received command 0x46574c44
1,587,279 UART: [fwproc] Received Image of size 115196 bytes
2,895,585 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,409 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,761 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,806 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,381 ready_for_fw is high
1,363,381 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,282 >>> mbox cmd response: success
3,000,796 UART:
3,000,812 UART: Running Caliptra FMC ...
3,001,220 UART:
3,001,274 UART: [state] CFI Enabled
3,011,433 UART: [fht] FMC Alias Private Key: 7
3,119,192 UART: [art] Extend RT PCRs Done
3,119,620 UART: [art] Lock RT PCRs Done
3,121,288 UART: [art] Populate DV Done
3,129,773 UART: [fht] FMC Alias Private Key: 7
3,130,801 UART: [art] Derive CDI
3,131,081 UART: [art] Store in in slot 0x4
3,216,600 UART: [art] Derive Key Pair
3,216,960 UART: [art] Store priv key in slot 0x5
3,230,536 UART: [art] Derive Key Pair - Done
3,244,766 UART: [art] Signing Cert with AUTHO
3,245,246 UART: RITY.KEYID = 7
3,260,856 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,621 UART: [art] PUB.X = 49F77C23687C276104D4CDE76225AFB2B5285881D6CDDB50E0C3581E84F895404D17FB7057E026731857BA30D677CADF
3,268,388 UART: [art] PUB.Y = 869C6F30D17EE93420DE0C495226ECB6840706496F455E231220FC27942AA798893CCE862C7A0F4288D95C52F6762123
3,275,316 UART: [art] SIG.R = 64885B0F61164807DE9799E0E3E2E6F2A1FECD990C981834DA9A57B8123304EDCB14930E6E3E203F1260686853BEB877
3,282,069 UART: [art] SIG.S = 09E6CD776AEEA4E745A6D6E73B94B31A3B02FFD4A5BBD4338E35547D571FC06C542437AEC4F9DC550380B65235A27BA1
3,306,375 UART: Caliptra RT
3,306,628 UART: [state] CFI Enabled
3,414,922 UART: [rt] RT listening for mailbox commands...
3,415,585 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,706 UART: [rt]cmd =0x46504c54, len=4
3,447,062 >>> mbox cmd response data (8 bytes)
3,447,215 UART: [rt] FIPS self test
3,447,543 UART: [kat] ++
3,447,695 UART: [kat] sha1
3,451,907 UART: [kat] SHA2-256
3,453,929 UART: [kat] SHA2-384
3,454,887 UART: Fatal Error: 0x90020001
3,456,426 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,456,431 >>> mbox cmd response: failed
3,456,431 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,456,436 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,821 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,808 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,562 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,216 UART: [kat] SHA2-256
882,147 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,262 UART: [kat] ++
886,414 UART: [kat] sha1
890,492 UART: [kat] SHA2-256
892,430 UART: [kat] SHA2-384
895,131 UART: [kat] SHA2-512-ACC
897,032 UART: [kat] ECC-384
902,649 UART: [kat] HMAC-384Kdf
907,413 UART: [kat] LMS
1,475,609 UART: [kat] --
1,476,320 UART: [cold-reset] ++
1,476,824 UART: [fht] Storing FHT @ 0x50003400
1,479,561 UART: [idev] ++
1,479,729 UART: [idev] CDI.KEYID = 6
1,480,089 UART: [idev] SUBJECT.KEYID = 7
1,480,513 UART: [idev] UDS.KEYID = 0
1,480,858 ready_for_fw is high
1,480,858 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,615 UART: [idev] Erasing UDS.KEYID = 0
1,505,729 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,267 UART: [idev] --
1,515,188 UART: [ldev] ++
1,515,356 UART: [ldev] CDI.KEYID = 6
1,515,719 UART: [ldev] SUBJECT.KEYID = 5
1,516,145 UART: [ldev] AUTHORITY.KEYID = 7
1,516,608 UART: [ldev] FE.KEYID = 1
1,521,770 UART: [ldev] Erasing FE.KEYID = 1
1,547,093 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,487 UART: [ldev] --
1,585,796 UART: [fwproc] Waiting for Commands...
1,586,491 UART: [fwproc] Received command 0x46574c44
1,587,282 UART: [fwproc] Received Image of size 115196 bytes
2,895,684 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,306 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,658 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,713 >>> mbox cmd response: success
3,090,793 UART: [afmc] ++
3,090,961 UART: [afmc] CDI.KEYID = 6
3,091,323 UART: [afmc] SUBJECT.KEYID = 7
3,091,748 UART: [afmc] AUTHORITY.KEYID = 5
3,127,267 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,631 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,411 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,139 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,024 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,714 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,759 UART: [afmc] --
3,170,739 UART: [cold-reset] --
3,171,629 UART: [state] Locking Datavault
3,172,788 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,392 UART: [state] Locking ICCM
3,173,968 UART: [exit] Launching FMC @ 0x40000130
3,179,297 UART:
3,179,313 UART: Running Caliptra FMC ...
3,179,721 UART:
3,179,864 UART: [state] CFI Enabled
3,190,513 UART: [fht] FMC Alias Private Key: 7
3,298,186 UART: [art] Extend RT PCRs Done
3,298,614 UART: [art] Lock RT PCRs Done
3,299,936 UART: [art] Populate DV Done
3,308,281 UART: [fht] FMC Alias Private Key: 7
3,309,391 UART: [art] Derive CDI
3,309,671 UART: [art] Store in in slot 0x4
3,395,702 UART: [art] Derive Key Pair
3,396,062 UART: [art] Store priv key in slot 0x5
3,409,774 UART: [art] Derive Key Pair - Done
3,424,500 UART: [art] Signing Cert with AUTHO
3,424,980 UART: RITY.KEYID = 7
3,440,092 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,857 UART: [art] PUB.X = 58119718932D1A92F7A2A7D59E4F32D4B65387E558073BED36FEB853EB9F933C0311BC12A5354AE1CD6BC468E119CDD7
3,447,627 UART: [art] PUB.Y = 55383E1B3635239933501E81E2A6D1633DD31424C0D80E23A58EDF287AC84B59F91201FAF913A93F78048B8E9CC8B709
3,454,561 UART: [art] SIG.R = CF2BA52A159A23DE742B7AFE19A7A64DD107107888C88D5686A8FD06CE0A9B47F0BCC71451BCEE66D53811DFF220AD9E
3,461,340 UART: [art] SIG.S = D8A7688DEEDABB95CACD08422952DBC9E6DB6B77BC4C59B056D84A778B0ACE187115E0B0EA3C58C02442FD4E32CB1B47
3,485,329 UART: Caliptra RT
3,485,674 UART: [state] CFI Enabled
3,592,864 UART: [rt] RT listening for mailbox commands...
3,593,527 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,004 UART: [rt]cmd =0x46504c54, len=4
3,624,038 >>> mbox cmd response data (8 bytes)
3,624,375 UART: [rt] FIPS self test
3,624,703 UART: [kat] ++
3,624,855 UART: [kat] sha1
3,629,153 UART: [kat] SHA2-256
3,631,175 UART: [kat] SHA2-384
3,632,167 UART: Fatal Error: 0x90020001
3,633,706 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,633,711 >>> mbox cmd response: failed
3,633,711 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,633,716 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,786 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,494 UART: [kat] SHA2-256
882,425 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,540 UART: [kat] ++
886,692 UART: [kat] sha1
890,982 UART: [kat] SHA2-256
892,920 UART: [kat] SHA2-384
895,521 UART: [kat] SHA2-512-ACC
897,422 UART: [kat] ECC-384
903,167 UART: [kat] HMAC-384Kdf
907,757 UART: [kat] LMS
1,475,953 UART: [kat] --
1,476,696 UART: [cold-reset] ++
1,477,250 UART: [fht] Storing FHT @ 0x50003400
1,479,913 UART: [idev] ++
1,480,081 UART: [idev] CDI.KEYID = 6
1,480,441 UART: [idev] SUBJECT.KEYID = 7
1,480,865 UART: [idev] UDS.KEYID = 0
1,481,210 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,953 UART: [idev] Erasing UDS.KEYID = 0
1,505,541 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,049 UART: [idev] --
1,515,190 UART: [ldev] ++
1,515,358 UART: [ldev] CDI.KEYID = 6
1,515,721 UART: [ldev] SUBJECT.KEYID = 5
1,516,147 UART: [ldev] AUTHORITY.KEYID = 7
1,516,610 UART: [ldev] FE.KEYID = 1
1,522,016 UART: [ldev] Erasing FE.KEYID = 1
1,547,749 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,779 UART: [ldev] --
1,587,054 UART: [fwproc] Waiting for Commands...
1,587,861 UART: [fwproc] Received command 0x46574c44
1,588,652 UART: [fwproc] Received Image of size 115196 bytes
2,896,786 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,342 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,694 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,090,851 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,810 ready_for_fw is high
1,362,810 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,721 >>> mbox cmd response: success
3,003,027 UART:
3,003,043 UART: Running Caliptra FMC ...
3,003,451 UART:
3,003,594 UART: [state] CFI Enabled
3,014,331 UART: [fht] FMC Alias Private Key: 7
3,121,862 UART: [art] Extend RT PCRs Done
3,122,290 UART: [art] Lock RT PCRs Done
3,123,798 UART: [art] Populate DV Done
3,131,903 UART: [fht] FMC Alias Private Key: 7
3,132,951 UART: [art] Derive CDI
3,133,231 UART: [art] Store in in slot 0x4
3,219,254 UART: [art] Derive Key Pair
3,219,614 UART: [art] Store priv key in slot 0x5
3,232,976 UART: [art] Derive Key Pair - Done
3,247,809 UART: [art] Signing Cert with AUTHO
3,248,289 UART: RITY.KEYID = 7
3,263,435 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,200 UART: [art] PUB.X = 38C165364F9BCC17637E04955D8DE3E1D8404525322DCDD2B174584AA4A17480C65626D094BE48543F86F546C54A7822
3,270,959 UART: [art] PUB.Y = 0D30C3861B3628322AFD278C1C4FBB987CC7947579FECDA6C06F7806FD64E0C150FDB5ED450A06DDC40B4C60B1D1EBDD
3,277,914 UART: [art] SIG.R = 98908A3FD189BC326845C6AB5675C33B439F4796B9FA06A0E8878D7AE81D8F6E7C191102258C117B11AE74A1D8BA63AB
3,284,682 UART: [art] SIG.S = C12B4F298186B374BCF76BD78D44635277427E22102CD27E6E425CF29B1143C62CE751BFB3F6C28C41F37752559F5455
3,308,587 UART: Caliptra RT
3,308,932 UART: [state] CFI Enabled
3,417,418 UART: [rt] RT listening for mailbox commands...
3,418,081 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,646 UART: [rt]cmd =0x46504c54, len=4
3,448,782 >>> mbox cmd response data (8 bytes)
3,448,969 UART: [rt] FIPS self test
3,449,297 UART: [kat] ++
3,449,449 UART: [kat] sha1
3,453,621 UART: [kat] SHA2-256
3,455,643 UART: [kat] SHA2-384
3,456,407 UART: Fatal Error: 0x90020001
3,457,946 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,457,951 >>> mbox cmd response: failed
3,457,951 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,457,956 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,140 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,941,107 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,043 UART: [state] DebugLocked = No
86,657 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
893,580 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,705 UART: [kat] ++
897,857 UART: [kat] sha1
902,109 UART: [kat] SHA2-256
904,049 UART: [kat] SHA2-384
906,934 UART: [kat] SHA2-512-ACC
908,835 UART: [kat] ECC-384
918,366 UART: [kat] HMAC-384Kdf
923,116 UART: [kat] LMS
1,171,444 UART: [kat] --
1,172,453 UART: [cold-reset] ++
1,172,929 UART: [fht] FHT @ 0x50003400
1,175,440 UART: [idev] ++
1,175,608 UART: [idev] CDI.KEYID = 6
1,175,968 UART: [idev] SUBJECT.KEYID = 7
1,176,392 UART: [idev] UDS.KEYID = 0
1,176,737 ready_for_fw is high
1,176,737 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,072 UART: [idev] Erasing UDS.KEYID = 0
1,201,609 UART: [idev] Sha1 KeyId Algorithm
1,210,105 UART: [idev] --
1,211,301 UART: [ldev] ++
1,211,469 UART: [ldev] CDI.KEYID = 6
1,211,832 UART: [ldev] SUBJECT.KEYID = 5
1,212,258 UART: [ldev] AUTHORITY.KEYID = 7
1,212,721 UART: [ldev] FE.KEYID = 1
1,217,759 UART: [ldev] Erasing FE.KEYID = 1
1,243,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,541 UART: [ldev] --
1,283,000 UART: [fwproc] Wait for Commands...
1,283,570 UART: [fwproc] Recv command 0x46574c44
1,284,298 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,314 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,618 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,761 >>> mbox cmd response: success
2,786,845 UART: [afmc] ++
2,787,013 UART: [afmc] CDI.KEYID = 6
2,787,375 UART: [afmc] SUBJECT.KEYID = 7
2,787,800 UART: [afmc] AUTHORITY.KEYID = 5
2,823,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,856 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,604 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,332 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,217 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,936 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,614 UART: [afmc] --
2,866,668 UART: [cold-reset] --
2,867,372 UART: [state] Locking Datavault
2,868,595 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,199 UART: [state] Locking ICCM
2,869,669 UART: [exit] Launching FMC @ 0x40000130
2,874,998 UART:
2,875,014 UART: Running Caliptra FMC ...
2,875,422 UART:
2,875,476 UART: [state] CFI Enabled
2,885,883 UART: [fht] FMC Alias Private Key: 7
2,993,578 UART: [art] Extend RT PCRs Done
2,994,006 UART: [art] Lock RT PCRs Done
2,995,576 UART: [art] Populate DV Done
3,003,727 UART: [fht] FMC Alias Private Key: 7
3,004,871 UART: [art] Derive CDI
3,005,151 UART: [art] Store in in slot 0x4
3,090,512 UART: [art] Derive Key Pair
3,090,872 UART: [art] Store priv key in slot 0x5
3,103,506 UART: [art] Derive Key Pair - Done
3,118,321 UART: [art] Signing Cert with AUTHO
3,118,801 UART: RITY.KEYID = 7
3,133,607 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,372 UART: [art] PUB.X = 3F90D5D7A0E5358ED1389F06E40811B1A25681DE98C78DF7D8336790D7CB27F4E0C61882FB592D8205E411FC9191AEF6
3,141,135 UART: [art] PUB.Y = 9E34E3347460FB730EEB1BDC79D910EF058E0EF006CD368D320FFDE85584E35AA86164FE4FA4854246868B53822BCC36
3,148,076 UART: [art] SIG.R = 0CD0AF02FA77D9810F7DBD3E4BC42D54A88927BF0D15EC203D36BE11C57A030A9F517BE0657B986F8874DC4AE8B525B6
3,154,842 UART: [art] SIG.S = 2981B15ADFCE4B665F99FC5821A23617F96678E8503F32B38015071ED22BB2CC8A6993D568F95FB4669C53A8B515009A
3,178,950 UART: Caliptra RT
3,179,203 UART: [state] CFI Enabled
3,286,570 UART: [rt] RT listening for mailbox commands...
3,287,233 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,342 UART: [rt]cmd =0x46504c54, len=4
3,318,392 >>> mbox cmd response data (8 bytes)
3,318,549 UART: [rt] FIPS self test
3,318,877 UART: [kat] ++
3,319,029 UART: [kat] sha1
3,323,127 UART: [kat] SHA2-256
3,325,149 UART: [kat] SHA2-384
3,326,023 UART: Fatal Error: 0x90020001
3,327,562 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,327,567 >>> mbox cmd response: failed
3,327,567 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,327,572 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
893,422 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,547 UART: [kat] ++
897,699 UART: [kat] sha1
901,777 UART: [kat] SHA2-256
903,717 UART: [kat] SHA2-384
906,268 UART: [kat] SHA2-512-ACC
908,169 UART: [kat] ECC-384
918,066 UART: [kat] HMAC-384Kdf
922,658 UART: [kat] LMS
1,170,986 UART: [kat] --
1,171,739 UART: [cold-reset] ++
1,172,305 UART: [fht] FHT @ 0x50003400
1,174,880 UART: [idev] ++
1,175,048 UART: [idev] CDI.KEYID = 6
1,175,408 UART: [idev] SUBJECT.KEYID = 7
1,175,832 UART: [idev] UDS.KEYID = 0
1,176,177 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,886 UART: [idev] Erasing UDS.KEYID = 0
1,200,859 UART: [idev] Sha1 KeyId Algorithm
1,209,231 UART: [idev] --
1,210,185 UART: [ldev] ++
1,210,353 UART: [ldev] CDI.KEYID = 6
1,210,716 UART: [ldev] SUBJECT.KEYID = 5
1,211,142 UART: [ldev] AUTHORITY.KEYID = 7
1,211,605 UART: [ldev] FE.KEYID = 1
1,217,137 UART: [ldev] Erasing FE.KEYID = 1
1,242,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,777 UART: [ldev] --
1,282,256 UART: [fwproc] Wait for Commands...
1,282,964 UART: [fwproc] Recv command 0x46574c44
1,283,692 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,364 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,668 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,745 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,089 ready_for_fw is high
1,060,089 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,806 >>> mbox cmd response: success
2,699,772 UART:
2,699,788 UART: Running Caliptra FMC ...
2,700,196 UART:
2,700,250 UART: [state] CFI Enabled
2,710,681 UART: [fht] FMC Alias Private Key: 7
2,818,408 UART: [art] Extend RT PCRs Done
2,818,836 UART: [art] Lock RT PCRs Done
2,820,368 UART: [art] Populate DV Done
2,828,529 UART: [fht] FMC Alias Private Key: 7
2,829,509 UART: [art] Derive CDI
2,829,789 UART: [art] Store in in slot 0x4
2,915,298 UART: [art] Derive Key Pair
2,915,658 UART: [art] Store priv key in slot 0x5
2,928,462 UART: [art] Derive Key Pair - Done
2,943,622 UART: [art] Signing Cert with AUTHO
2,944,102 UART: RITY.KEYID = 7
2,959,172 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,937 UART: [art] PUB.X = 6C3081A40F625636D3B7E282A7E106B66FACF4555E0AFA56FDCCCDB43F12888354015E3027E954694E17200D8576FBC4
2,966,694 UART: [art] PUB.Y = B883E688A70736990DCF6604F524DDA008F83543E1B0A7006DEFFA9CDE3EE4D7F91285E97A9C705E2CFB53D8A1CDD4F1
2,973,626 UART: [art] SIG.R = CAB539F916BB0A9F731DFDE4D88A4C91FF0981FEEE5D75C3D6087A384D27819D0B51E9616C0E7FAB7E127CDA99EECEF2
2,980,405 UART: [art] SIG.S = 80F2C895B88A5309082FAA18C55F29E860A8B4FA63580DBE3CCDB547AAE3FEA681CD0FDCC9B839CC9EBFCA2794B204CC
3,004,447 UART: Caliptra RT
3,004,700 UART: [state] CFI Enabled
3,111,820 UART: [rt] RT listening for mailbox commands...
3,112,483 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,124 UART: [rt]cmd =0x46504c54, len=4
3,143,460 >>> mbox cmd response data (8 bytes)
3,143,735 UART: [rt] FIPS self test
3,144,063 UART: [kat] ++
3,144,215 UART: [kat] sha1
3,148,521 UART: [kat] SHA2-256
3,150,543 UART: [kat] SHA2-384
3,151,439 UART: Fatal Error: 0x90020001
3,152,978 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,152,983 >>> mbox cmd response: failed
3,152,983 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,152,988 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,663 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,636,224 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
893,467 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,592 UART: [kat] ++
897,744 UART: [kat] sha1
902,002 UART: [kat] SHA2-256
903,942 UART: [kat] SHA2-384
906,855 UART: [kat] SHA2-512-ACC
908,756 UART: [kat] ECC-384
918,879 UART: [kat] HMAC-384Kdf
923,401 UART: [kat] LMS
1,171,729 UART: [kat] --
1,172,622 UART: [cold-reset] ++
1,172,952 UART: [fht] FHT @ 0x50003400
1,175,609 UART: [idev] ++
1,175,777 UART: [idev] CDI.KEYID = 6
1,176,137 UART: [idev] SUBJECT.KEYID = 7
1,176,561 UART: [idev] UDS.KEYID = 0
1,176,906 ready_for_fw is high
1,176,906 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,677 UART: [idev] Erasing UDS.KEYID = 0
1,201,546 UART: [idev] Sha1 KeyId Algorithm
1,209,864 UART: [idev] --
1,210,874 UART: [ldev] ++
1,211,042 UART: [ldev] CDI.KEYID = 6
1,211,405 UART: [ldev] SUBJECT.KEYID = 5
1,211,831 UART: [ldev] AUTHORITY.KEYID = 7
1,212,294 UART: [ldev] FE.KEYID = 1
1,217,738 UART: [ldev] Erasing FE.KEYID = 1
1,243,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,290 UART: [ldev] --
1,282,583 UART: [fwproc] Wait for Commands...
1,283,283 UART: [fwproc] Recv command 0x46574c44
1,284,011 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,081 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,385 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,458 >>> mbox cmd response: success
2,787,574 UART: [afmc] ++
2,787,742 UART: [afmc] CDI.KEYID = 6
2,788,104 UART: [afmc] SUBJECT.KEYID = 7
2,788,529 UART: [afmc] AUTHORITY.KEYID = 5
2,824,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,387 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,115 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,000 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,719 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,473 UART: [afmc] --
2,867,603 UART: [cold-reset] --
2,868,269 UART: [state] Locking Datavault
2,869,582 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,186 UART: [state] Locking ICCM
2,870,762 UART: [exit] Launching FMC @ 0x40000130
2,876,091 UART:
2,876,107 UART: Running Caliptra FMC ...
2,876,515 UART:
2,876,658 UART: [state] CFI Enabled
2,887,253 UART: [fht] FMC Alias Private Key: 7
2,995,198 UART: [art] Extend RT PCRs Done
2,995,626 UART: [art] Lock RT PCRs Done
2,997,224 UART: [art] Populate DV Done
3,005,677 UART: [fht] FMC Alias Private Key: 7
3,006,799 UART: [art] Derive CDI
3,007,079 UART: [art] Store in in slot 0x4
3,092,574 UART: [art] Derive Key Pair
3,092,934 UART: [art] Store priv key in slot 0x5
3,106,384 UART: [art] Derive Key Pair - Done
3,120,972 UART: [art] Signing Cert with AUTHO
3,121,452 UART: RITY.KEYID = 7
3,137,400 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,165 UART: [art] PUB.X = E95C744F84D740CD4A206FF84FA97D5EE6A53E9F686D4009E70050B7C2F1784A8A5DC691ADB921CBF5B26205CE4E2DDA
3,144,923 UART: [art] PUB.Y = 1AA5E2F7C9475EBAD24818D3BAE087FF7E620BD122677F1279644C74CDF7AD9433A4566E00FD7A17EF990F95A2763FFC
3,151,857 UART: [art] SIG.R = 8D32BE8004BEFD6FDE0C41AA595129FF8368103D718EACE6F7623161B4727E77D9A27AABA40C36711C7AB56FDFA257B3
3,158,632 UART: [art] SIG.S = F9A85B33364993C78103CFFB6570C2D4FBB2F6BCAD40D31D6D0AC27EE197F1DA990E1E609EF44FB6CCEC64556B9734F2
3,182,756 UART: Caliptra RT
3,183,101 UART: [state] CFI Enabled
3,290,727 UART: [rt] RT listening for mailbox commands...
3,291,390 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,287 UART: [rt]cmd =0x46504c54, len=4
3,322,445 >>> mbox cmd response data (8 bytes)
3,322,580 UART: [rt] FIPS self test
3,322,908 UART: [kat] ++
3,323,060 UART: [kat] sha1
3,327,288 UART: [kat] SHA2-256
3,329,310 UART: [kat] SHA2-384
3,330,308 UART: Fatal Error: 0x90020001
3,331,847 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,331,852 >>> mbox cmd response: failed
3,331,852 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,331,857 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [kat] SHA2-256
893,619 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,744 UART: [kat] ++
897,896 UART: [kat] sha1
902,030 UART: [kat] SHA2-256
903,970 UART: [kat] SHA2-384
906,673 UART: [kat] SHA2-512-ACC
908,574 UART: [kat] ECC-384
918,237 UART: [kat] HMAC-384Kdf
923,001 UART: [kat] LMS
1,171,329 UART: [kat] --
1,172,092 UART: [cold-reset] ++
1,172,458 UART: [fht] FHT @ 0x50003400
1,175,005 UART: [idev] ++
1,175,173 UART: [idev] CDI.KEYID = 6
1,175,533 UART: [idev] SUBJECT.KEYID = 7
1,175,957 UART: [idev] UDS.KEYID = 0
1,176,302 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,971 UART: [idev] Erasing UDS.KEYID = 0
1,200,930 UART: [idev] Sha1 KeyId Algorithm
1,209,468 UART: [idev] --
1,210,644 UART: [ldev] ++
1,210,812 UART: [ldev] CDI.KEYID = 6
1,211,175 UART: [ldev] SUBJECT.KEYID = 5
1,211,601 UART: [ldev] AUTHORITY.KEYID = 7
1,212,064 UART: [ldev] FE.KEYID = 1
1,217,618 UART: [ldev] Erasing FE.KEYID = 1
1,244,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,934 UART: [ldev] --
1,283,355 UART: [fwproc] Wait for Commands...
1,284,059 UART: [fwproc] Recv command 0x46574c44
1,284,787 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,884 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,053 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,357 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,376 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,206 ready_for_fw is high
1,061,206 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,125 >>> mbox cmd response: success
2,699,323 UART:
2,699,339 UART: Running Caliptra FMC ...
2,699,747 UART:
2,699,890 UART: [state] CFI Enabled
2,710,229 UART: [fht] FMC Alias Private Key: 7
2,817,970 UART: [art] Extend RT PCRs Done
2,818,398 UART: [art] Lock RT PCRs Done
2,819,736 UART: [art] Populate DV Done
2,828,155 UART: [fht] FMC Alias Private Key: 7
2,829,175 UART: [art] Derive CDI
2,829,455 UART: [art] Store in in slot 0x4
2,914,840 UART: [art] Derive Key Pair
2,915,200 UART: [art] Store priv key in slot 0x5
2,928,000 UART: [art] Derive Key Pair - Done
2,942,840 UART: [art] Signing Cert with AUTHO
2,943,320 UART: RITY.KEYID = 7
2,958,506 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,271 UART: [art] PUB.X = A7D5C501E691352693F552FF155C1FF3724554052B4449A34FAF1F31FA8D6DC9E9BA282827582C10F343DB203EC0D08A
2,966,037 UART: [art] PUB.Y = 38356596EC0E5FD6B65B6F5783D2CC16325FB70D4C3FB459BFA575677914E1F4843ED9B241B40C776EC0ABD5BCAB2403
2,972,985 UART: [art] SIG.R = 4CE57BDC1662E50F3407E54ABE1C2960FD7676D5416F0970093F6B8178DC4F55453CDBC1043318FE6CDC071561B5E8C7
2,979,741 UART: [art] SIG.S = F249365CA687465B418835983AB9181FF628905CC8121F317898683A038D34E6C650640C126F3B0EA94D5F76EDA190E0
3,003,577 UART: Caliptra RT
3,003,922 UART: [state] CFI Enabled
3,112,743 UART: [rt] RT listening for mailbox commands...
3,113,406 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,459 UART: [rt]cmd =0x46504c54, len=4
3,144,465 >>> mbox cmd response data (8 bytes)
3,144,802 UART: [rt] FIPS self test
3,145,130 UART: [kat] ++
3,145,282 UART: [kat] sha1
3,149,386 UART: [kat] SHA2-256
3,151,408 UART: [kat] SHA2-384
3,152,352 UART: Fatal Error: 0x90020001
3,153,891 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,153,896 >>> mbox cmd response: failed
3,153,896 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,153,901 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,240 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,613 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,097 UART: [state] WD Timer not started. Device not locked for debugging
87,348 UART: [kat] SHA2-256
890,898 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,027 UART: [kat] ++
895,179 UART: [kat] sha1
899,387 UART: [kat] SHA2-256
901,327 UART: [kat] SHA2-384
904,126 UART: [kat] SHA2-512-ACC
906,027 UART: [kat] ECC-384
915,524 UART: [kat] HMAC-384Kdf
920,240 UART: [kat] LMS
1,168,552 UART: [kat] --
1,169,473 UART: [cold-reset] ++
1,169,853 UART: [fht] FHT @ 0x50003400
1,172,385 UART: [idev] ++
1,172,553 UART: [idev] CDI.KEYID = 6
1,172,914 UART: [idev] SUBJECT.KEYID = 7
1,173,339 UART: [idev] UDS.KEYID = 0
1,173,685 ready_for_fw is high
1,173,685 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,463 UART: [idev] Erasing UDS.KEYID = 0
1,198,029 UART: [idev] Sha1 KeyId Algorithm
1,206,781 UART: [idev] --
1,207,848 UART: [ldev] ++
1,208,016 UART: [ldev] CDI.KEYID = 6
1,208,380 UART: [ldev] SUBJECT.KEYID = 5
1,208,807 UART: [ldev] AUTHORITY.KEYID = 7
1,209,270 UART: [ldev] FE.KEYID = 1
1,214,574 UART: [ldev] Erasing FE.KEYID = 1
1,240,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,716 UART: [ldev] --
1,279,046 UART: [fwproc] Wait for Commands...
1,279,623 UART: [fwproc] Recv command 0x46574c44
1,280,356 UART: [fwproc] Recv'd Img size: 115196 bytes
2,588,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,196 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,505 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,781,659 >>> mbox cmd response: success
2,782,696 UART: [afmc] ++
2,782,864 UART: [afmc] CDI.KEYID = 6
2,783,227 UART: [afmc] SUBJECT.KEYID = 7
2,783,653 UART: [afmc] AUTHORITY.KEYID = 5
2,819,308 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,880 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,631 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,360 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,243 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,962 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,715 UART: [afmc] --
2,862,717 UART: [cold-reset] --
2,863,525 UART: [state] Locking Datavault
2,864,610 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,214 UART: [state] Locking ICCM
2,865,646 UART: [exit] Launching FMC @ 0x40000130
2,870,975 UART:
2,870,991 UART: Running Caliptra FMC ...
2,871,399 UART:
2,871,453 UART: [state] CFI Enabled
2,881,854 UART: [fht] FMC Alias Private Key: 7
2,990,389 UART: [art] Extend RT PCRs Done
2,990,817 UART: [art] Lock RT PCRs Done
2,992,533 UART: [art] Populate DV Done
3,000,676 UART: [fht] FMC Alias Private Key: 7
3,001,716 UART: [art] Derive CDI
3,001,996 UART: [art] Store in in slot 0x4
3,087,237 UART: [art] Derive Key Pair
3,087,597 UART: [art] Store priv key in slot 0x5
3,100,541 UART: [art] Derive Key Pair - Done
3,115,599 UART: [art] Signing Cert with AUTHO
3,116,079 UART: RITY.KEYID = 7
3,131,483 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,248 UART: [art] PUB.X = F1B52A181428D974DC4B9E58F76200C4C25C5DD1C8D7A9D6F7D50E1654BA4537934D5D1783721D7791BF49C846CC310A
3,138,992 UART: [art] PUB.Y = 31F39896A5C1FFE47DD9FF8D077C22B631612C2C80B04F1F49C80E26D023CCA09BEC9350AFEC2321CCF05FEB90363C15
3,145,950 UART: [art] SIG.R = 15C302F058B7190E9F465073D5948785EE1288042365395023B1EC9855ECDA27E6AAEB9467AFD9E7F8EACD1DDB8E49F8
3,152,717 UART: [art] SIG.S = B5165CE056BE766C7206F22EB3F124B4D6ABDF98C8E23200B8F127640B085E1D74B96A722D37FE43505D074FA213B0E8
3,176,740 UART: Caliptra RT
3,176,993 UART: [state] CFI Enabled
3,284,590 UART: [rt] RT listening for mailbox commands...
3,285,253 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,022 UART: [rt]cmd =0x46504c54, len=4
3,316,012 >>> mbox cmd response data (8 bytes)
3,316,329 UART: [rt] FIPS self test
3,316,657 UART: [kat] ++
3,316,809 UART: [kat] sha1
3,321,097 UART: [kat] SHA2-256
3,323,119 UART: [kat] SHA2-384
3,324,023 UART: Fatal Error: 0x90020001
3,325,562 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,325,567 >>> mbox cmd response: failed
3,325,567 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,325,572 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,412 UART: [kat] SHA2-256
890,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,091 UART: [kat] ++
895,243 UART: [kat] sha1
899,439 UART: [kat] SHA2-256
901,379 UART: [kat] SHA2-384
904,108 UART: [kat] SHA2-512-ACC
906,009 UART: [kat] ECC-384
915,910 UART: [kat] HMAC-384Kdf
920,424 UART: [kat] LMS
1,168,736 UART: [kat] --
1,169,915 UART: [cold-reset] ++
1,170,253 UART: [fht] FHT @ 0x50003400
1,172,817 UART: [idev] ++
1,172,985 UART: [idev] CDI.KEYID = 6
1,173,346 UART: [idev] SUBJECT.KEYID = 7
1,173,771 UART: [idev] UDS.KEYID = 0
1,174,117 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,751 UART: [idev] Erasing UDS.KEYID = 0
1,198,239 UART: [idev] Sha1 KeyId Algorithm
1,206,933 UART: [idev] --
1,207,984 UART: [ldev] ++
1,208,152 UART: [ldev] CDI.KEYID = 6
1,208,516 UART: [ldev] SUBJECT.KEYID = 5
1,208,943 UART: [ldev] AUTHORITY.KEYID = 7
1,209,406 UART: [ldev] FE.KEYID = 1
1,214,750 UART: [ldev] Erasing FE.KEYID = 1
1,241,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,392 UART: [ldev] --
1,280,708 UART: [fwproc] Wait for Commands...
1,281,381 UART: [fwproc] Recv command 0x46574c44
1,282,114 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,844 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,153 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,281 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,244 ready_for_fw is high
1,056,244 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,683 >>> mbox cmd response: success
2,694,449 UART:
2,694,465 UART: Running Caliptra FMC ...
2,694,873 UART:
2,694,927 UART: [state] CFI Enabled
2,705,294 UART: [fht] FMC Alias Private Key: 7
2,813,805 UART: [art] Extend RT PCRs Done
2,814,233 UART: [art] Lock RT PCRs Done
2,815,609 UART: [art] Populate DV Done
2,823,640 UART: [fht] FMC Alias Private Key: 7
2,824,646 UART: [art] Derive CDI
2,824,926 UART: [art] Store in in slot 0x4
2,910,763 UART: [art] Derive Key Pair
2,911,123 UART: [art] Store priv key in slot 0x5
2,924,199 UART: [art] Derive Key Pair - Done
2,938,780 UART: [art] Signing Cert with AUTHO
2,939,260 UART: RITY.KEYID = 7
2,954,430 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,195 UART: [art] PUB.X = 480FFDE84D056BA8A3D20D2853A8802B4F0B61CF953F8481DE88C6FC90DED59A3351D765EA29C6F146601AE0D3A916B4
2,961,963 UART: [art] PUB.Y = 43B2218694465FDB11DE989332E5F8CDF231667984E10254F2BED282D5771C7BB4B8FA6441C27E3BC17014E825A1FE50
2,968,910 UART: [art] SIG.R = 208AED92B9FE4A788517FEA493A76B6AC06390F6DFEEDDFFFF9C69F3E7A9F62D186D6C31BA50CAB8A52EAE4B4C19676A
2,975,708 UART: [art] SIG.S = A62A3728C8A3224E2317AFDD8A0F61D2FC6F1F4DD761EB894574619BFAF47F6E6AC718E2F8C2EC9AA9B8F21A6836CD9F
2,999,304 UART: Caliptra RT
2,999,557 UART: [state] CFI Enabled
3,107,392 UART: [rt] RT listening for mailbox commands...
3,108,055 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,940 UART: [rt]cmd =0x46504c54, len=4
3,139,180 >>> mbox cmd response data (8 bytes)
3,139,431 UART: [rt] FIPS self test
3,139,759 UART: [kat] ++
3,139,911 UART: [kat] sha1
3,144,031 UART: [kat] SHA2-256
3,146,053 UART: [kat] SHA2-384
3,146,875 UART: Fatal Error: 0x90020001
3,148,414 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,148,419 >>> mbox cmd response: failed
3,148,419 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,148,424 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,778 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,634,489 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,984 UART: [state] WD Timer not started. Device not locked for debugging
88,231 UART: [kat] SHA2-256
891,781 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,910 UART: [kat] ++
896,062 UART: [kat] sha1
900,276 UART: [kat] SHA2-256
902,216 UART: [kat] SHA2-384
904,941 UART: [kat] SHA2-512-ACC
906,842 UART: [kat] ECC-384
916,819 UART: [kat] HMAC-384Kdf
921,571 UART: [kat] LMS
1,169,883 UART: [kat] --
1,170,606 UART: [cold-reset] ++
1,171,152 UART: [fht] FHT @ 0x50003400
1,173,856 UART: [idev] ++
1,174,024 UART: [idev] CDI.KEYID = 6
1,174,385 UART: [idev] SUBJECT.KEYID = 7
1,174,810 UART: [idev] UDS.KEYID = 0
1,175,156 ready_for_fw is high
1,175,156 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,702 UART: [idev] Erasing UDS.KEYID = 0
1,199,450 UART: [idev] Sha1 KeyId Algorithm
1,208,384 UART: [idev] --
1,209,529 UART: [ldev] ++
1,209,697 UART: [ldev] CDI.KEYID = 6
1,210,061 UART: [ldev] SUBJECT.KEYID = 5
1,210,488 UART: [ldev] AUTHORITY.KEYID = 7
1,210,951 UART: [ldev] FE.KEYID = 1
1,216,253 UART: [ldev] Erasing FE.KEYID = 1
1,242,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,469 UART: [ldev] --
1,281,923 UART: [fwproc] Wait for Commands...
1,282,496 UART: [fwproc] Recv command 0x46574c44
1,283,229 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,489 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,798 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,796 >>> mbox cmd response: success
2,784,909 UART: [afmc] ++
2,785,077 UART: [afmc] CDI.KEYID = 6
2,785,440 UART: [afmc] SUBJECT.KEYID = 7
2,785,866 UART: [afmc] AUTHORITY.KEYID = 5
2,821,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,131 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,882 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,611 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,494 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,213 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,942 UART: [afmc] --
2,864,940 UART: [cold-reset] --
2,865,852 UART: [state] Locking Datavault
2,867,373 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,977 UART: [state] Locking ICCM
2,868,505 UART: [exit] Launching FMC @ 0x40000130
2,873,834 UART:
2,873,850 UART: Running Caliptra FMC ...
2,874,258 UART:
2,874,401 UART: [state] CFI Enabled
2,885,332 UART: [fht] FMC Alias Private Key: 7
2,993,355 UART: [art] Extend RT PCRs Done
2,993,783 UART: [art] Lock RT PCRs Done
2,995,437 UART: [art] Populate DV Done
3,003,478 UART: [fht] FMC Alias Private Key: 7
3,004,468 UART: [art] Derive CDI
3,004,748 UART: [art] Store in in slot 0x4
3,090,663 UART: [art] Derive Key Pair
3,091,023 UART: [art] Store priv key in slot 0x5
3,104,339 UART: [art] Derive Key Pair - Done
3,118,939 UART: [art] Signing Cert with AUTHO
3,119,419 UART: RITY.KEYID = 7
3,134,703 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,468 UART: [art] PUB.X = 46C91F864783C3E5E3ACE7EF517360874910055CA97CA6528FBA651056ECA61DC3A7BB1954F754F57348C99D59F3E8BC
3,142,239 UART: [art] PUB.Y = 1273E23299139356833E852391E70E908140B356EB453D702345C17AB0F67F2017F05705FEC74716C405C2064D581378
3,149,155 UART: [art] SIG.R = E2B3FC5468001E69D4861AAF136DCC6B8035EC366DE8798F3BCDFF58A7B8FC3BF19B078267EC705651C413A257111EF4
3,155,910 UART: [art] SIG.S = 01DEF927130430016DBE464C9156E89FCF723349ECEA910F780B99D46AB0B35B999F23F789BD2386AFA919E0C67CDC18
3,179,648 UART: Caliptra RT
3,179,993 UART: [state] CFI Enabled
3,287,762 UART: [rt] RT listening for mailbox commands...
3,288,425 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,226 UART: [rt]cmd =0x46504c54, len=4
3,319,270 >>> mbox cmd response data (8 bytes)
3,319,609 UART: [rt] FIPS self test
3,319,937 UART: [kat] ++
3,320,089 UART: [kat] sha1
3,324,261 UART: [kat] SHA2-256
3,326,283 UART: [kat] SHA2-384
3,327,177 UART: Fatal Error: 0x90020001
3,328,716 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,328,721 >>> mbox cmd response: failed
3,328,721 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,328,726 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,852 UART: [kat] SHA2-256
901,792 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
915,755 UART: [kat] HMAC-384Kdf
920,287 UART: [kat] LMS
1,168,599 UART: [kat] --
1,169,550 UART: [cold-reset] ++
1,170,054 UART: [fht] FHT @ 0x50003400
1,172,770 UART: [idev] ++
1,172,938 UART: [idev] CDI.KEYID = 6
1,173,299 UART: [idev] SUBJECT.KEYID = 7
1,173,724 UART: [idev] UDS.KEYID = 0
1,174,070 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,862 UART: [idev] Erasing UDS.KEYID = 0
1,198,924 UART: [idev] Sha1 KeyId Algorithm
1,207,792 UART: [idev] --
1,208,711 UART: [ldev] ++
1,208,879 UART: [ldev] CDI.KEYID = 6
1,209,243 UART: [ldev] SUBJECT.KEYID = 5
1,209,670 UART: [ldev] AUTHORITY.KEYID = 7
1,210,133 UART: [ldev] FE.KEYID = 1
1,215,517 UART: [ldev] Erasing FE.KEYID = 1
1,241,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,895 UART: [ldev] --
1,281,227 UART: [fwproc] Wait for Commands...
1,281,942 UART: [fwproc] Recv command 0x46574c44
1,282,675 UART: [fwproc] Recv'd Img size: 115196 bytes
2,590,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,273 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,582 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,783,682 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,841 ready_for_fw is high
1,055,841 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,832 >>> mbox cmd response: success
2,695,738 UART:
2,695,754 UART: Running Caliptra FMC ...
2,696,162 UART:
2,696,305 UART: [state] CFI Enabled
2,706,812 UART: [fht] FMC Alias Private Key: 7
2,814,347 UART: [art] Extend RT PCRs Done
2,814,775 UART: [art] Lock RT PCRs Done
2,816,429 UART: [art] Populate DV Done
2,824,944 UART: [fht] FMC Alias Private Key: 7
2,826,094 UART: [art] Derive CDI
2,826,374 UART: [art] Store in in slot 0x4
2,911,681 UART: [art] Derive Key Pair
2,912,041 UART: [art] Store priv key in slot 0x5
2,925,419 UART: [art] Derive Key Pair - Done
2,940,571 UART: [art] Signing Cert with AUTHO
2,941,051 UART: RITY.KEYID = 7
2,956,739 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,504 UART: [art] PUB.X = 25ABDBC6714F59763B357C248ED579AA22FDA4AD2B02B8B0A21304C6D5C4C3E646026244E2CF534C25B3778BD3A483A0
2,964,273 UART: [art] PUB.Y = D93EBACCFC67CDB02F83DAD48C4CDF33DB74FB44A57E65FD8262D5348EE1475DBB5E932AE7E0C4E8F6B1BC44D94A58EA
2,971,255 UART: [art] SIG.R = 0221DE054ABFA3B981B8DD6A607D698B619B78EA44CC7174BE4805E98E5F6D25258D527B9D7B8EB013CB01D5D8F483D4
2,978,023 UART: [art] SIG.S = 7E285E2D98B172DEB18B5EDC8C3D3DD96CA2A53075010DB90FD43B8EA8C406E345CE45F768739B572A1631F0B919104C
3,002,338 UART: Caliptra RT
3,002,683 UART: [state] CFI Enabled
3,109,694 UART: [rt] RT listening for mailbox commands...
3,110,357 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,500 UART: [rt]cmd =0x46504c54, len=4
3,141,796 >>> mbox cmd response data (8 bytes)
3,142,115 UART: [rt] FIPS self test
3,142,443 UART: [kat] ++
3,142,595 UART: [kat] sha1
3,146,851 UART: [kat] SHA2-256
3,148,873 UART: [kat] SHA2-384
3,149,701 UART: Fatal Error: 0x90020001
3,151,240 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,151,245 >>> mbox cmd response: failed
3,151,245 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,151,250 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,059 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,636,102 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,645 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,653 >>> mbox cmd response: failed
811,653 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,659 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,659 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,835 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,657 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,665 >>> mbox cmd response: failed
811,665 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,671 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,945 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,886 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,444 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,452 >>> mbox cmd response: failed
811,452 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,458 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,860 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,930 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,612 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,620 >>> mbox cmd response: failed
811,620 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,626 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,136 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,648,000 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,927 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,935 >>> mbox cmd response: failed
811,935 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,941 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,061 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,011 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,559 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,567 >>> mbox cmd response: failed
811,567 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,573 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,583 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,642,837 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,840 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,848 >>> mbox cmd response: failed
811,848 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,284 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,658 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,538 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,546 >>> mbox cmd response: failed
811,546 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,552 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,336 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,684 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,091 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,099 >>> mbox cmd response: failed
812,099 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
812,105 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,985 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,397 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,419 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,427 >>> mbox cmd response: failed
811,427 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,433 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,453 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,645,135 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,648 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,656 >>> mbox cmd response: failed
811,656 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,662 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,034 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,646,214 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,506 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,514 >>> mbox cmd response: failed
811,514 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
811,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a46a02386900616d3bccc4c5e871c42e7cff550c1c892839a0acd345c02633f8e606f88b3a8ee4d85a1122f2320054e5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,718 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,650,070 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,283 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,981 UART: [kat] SHA2-256
881,912 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,027 UART: [kat] ++
886,179 UART: [kat] sha1
890,289 UART: [kat] SHA2-256
892,227 UART: [kat] SHA2-384
894,852 UART: [kat] SHA2-512-ACC
896,753 UART: [kat] ECC-384
902,226 UART: [kat] HMAC-384Kdf
906,846 UART: [kat] LMS
1,475,042 UART: [kat] --
1,475,999 UART: [cold-reset] ++
1,476,549 UART: [fht] Storing FHT @ 0x50003400
1,479,142 UART: [idev] ++
1,479,310 UART: [idev] CDI.KEYID = 6
1,479,670 UART: [idev] SUBJECT.KEYID = 7
1,480,094 UART: [idev] UDS.KEYID = 0
1,480,439 ready_for_fw is high
1,480,439 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,487,928 UART: [idev] Erasing UDS.KEYID = 0
1,504,368 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,096 UART: [idev] --
1,514,177 UART: [ldev] ++
1,514,345 UART: [ldev] CDI.KEYID = 6
1,514,708 UART: [ldev] SUBJECT.KEYID = 5
1,515,134 UART: [ldev] AUTHORITY.KEYID = 7
1,515,597 UART: [ldev] FE.KEYID = 1
1,520,941 UART: [ldev] Erasing FE.KEYID = 1
1,546,116 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,694 UART: [ldev] --
1,585,203 UART: [fwproc] Waiting for Commands...
1,586,058 UART: [fwproc] Received command 0x46574c44
1,586,849 UART: [fwproc] Received Image of size 115196 bytes
2,894,663 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,383 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,735 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,087,926 >>> mbox cmd response: success
3,088,944 UART: [afmc] ++
3,089,112 UART: [afmc] CDI.KEYID = 6
3,089,474 UART: [afmc] SUBJECT.KEYID = 7
3,089,899 UART: [afmc] AUTHORITY.KEYID = 5
3,125,270 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,468 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,248 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,976 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,861 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,551 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,394 UART: [afmc] --
3,168,462 UART: [cold-reset] --
3,169,196 UART: [state] Locking Datavault
3,170,447 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,051 UART: [state] Locking ICCM
3,171,617 UART: [exit] Launching FMC @ 0x40000130
3,176,946 UART:
3,176,962 UART: Running Caliptra FMC ...
3,177,370 UART:
3,177,424 UART: [state] CFI Enabled
3,187,991 UART: [fht] FMC Alias Private Key: 7
3,296,096 UART: [art] Extend RT PCRs Done
3,296,524 UART: [art] Lock RT PCRs Done
3,297,860 UART: [art] Populate DV Done
3,305,949 UART: [fht] FMC Alias Private Key: 7
3,306,915 UART: [art] Derive CDI
3,307,195 UART: [art] Store in in slot 0x4
3,392,972 UART: [art] Derive Key Pair
3,393,332 UART: [art] Store priv key in slot 0x5
3,406,326 UART: [art] Derive Key Pair - Done
3,421,113 UART: [art] Signing Cert with AUTHO
3,421,593 UART: RITY.KEYID = 7
3,436,337 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,102 UART: [art] PUB.X = 119D382249678293308217EBF43FE4C4BEB07A9D22559938495A844F0D8D74AB6B46B6FA445E112AD1B95DDBB27891F8
3,443,869 UART: [art] PUB.Y = 9815F4450B3624FE5CE5AEC88B1E4B1D7EFECF8572C695D207AE0DA69A156B0E7A0E5E1D825BEF7D7FB6290B1D3F8E5C
3,450,823 UART: [art] SIG.R = A37F11249135DA3DC66C1381AC5214365592D1A83674CBB0EDFAFA400D78F0FDB975ED725D5C39DFAEF1708F4B70E2D4
3,457,604 UART: [art] SIG.S = 75269CF737E6BC08BABC6F6869E8AB5F72FC3C7B246699028227DB4FFDCE4B5CB7E5D58260D47514660CA472A5A62C91
3,481,242 UART: Caliptra RT
3,481,495 UART: [state] CFI Enabled
3,589,714 UART: [rt] RT listening for mailbox commands...
3,590,377 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,336 UART: [rt]cmd =0x46504c54, len=4
3,621,622 >>> mbox cmd response data (8 bytes)
3,621,919 UART: [rt] FIPS self test
3,622,247 UART: [kat] ++
3,622,399 UART: [kat] sha1
3,626,573 UART: [kat] SHA2-256
3,628,595 UART: [kat] SHA2-384
3,631,302 UART: Fatal Error: 0x90020002
3,632,841 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,632,846 >>> mbox cmd response: failed
3,632,846 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,632,851 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,806 UART: [state] LifecycleState = Unprovisioned
85,461 UART: [state] DebugLocked = No
86,149 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,785 UART: [kat] SHA2-256
881,716 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,831 UART: [kat] ++
885,983 UART: [kat] sha1
890,363 UART: [kat] SHA2-256
892,301 UART: [kat] SHA2-384
894,932 UART: [kat] SHA2-512-ACC
896,833 UART: [kat] ECC-384
902,676 UART: [kat] HMAC-384Kdf
907,330 UART: [kat] LMS
1,475,526 UART: [kat] --
1,476,217 UART: [cold-reset] ++
1,476,647 UART: [fht] Storing FHT @ 0x50003400
1,479,338 UART: [idev] ++
1,479,506 UART: [idev] CDI.KEYID = 6
1,479,866 UART: [idev] SUBJECT.KEYID = 7
1,480,290 UART: [idev] UDS.KEYID = 0
1,480,635 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,487,992 UART: [idev] Erasing UDS.KEYID = 0
1,504,822 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,213 UART: [ldev] ++
1,514,381 UART: [ldev] CDI.KEYID = 6
1,514,744 UART: [ldev] SUBJECT.KEYID = 5
1,515,170 UART: [ldev] AUTHORITY.KEYID = 7
1,515,633 UART: [ldev] FE.KEYID = 1
1,520,817 UART: [ldev] Erasing FE.KEYID = 1
1,545,510 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,672 UART: [ldev] --
1,584,971 UART: [fwproc] Waiting for Commands...
1,585,606 UART: [fwproc] Received command 0x46574c44
1,586,397 UART: [fwproc] Received Image of size 115196 bytes
2,894,763 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,677 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,029 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,122 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,843 ready_for_fw is high
1,362,843 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,244 >>> mbox cmd response: success
2,999,486 UART:
2,999,502 UART: Running Caliptra FMC ...
2,999,910 UART:
2,999,964 UART: [state] CFI Enabled
3,010,275 UART: [fht] FMC Alias Private Key: 7
3,118,042 UART: [art] Extend RT PCRs Done
3,118,470 UART: [art] Lock RT PCRs Done
3,120,168 UART: [art] Populate DV Done
3,128,331 UART: [fht] FMC Alias Private Key: 7
3,129,329 UART: [art] Derive CDI
3,129,609 UART: [art] Store in in slot 0x4
3,215,356 UART: [art] Derive Key Pair
3,215,716 UART: [art] Store priv key in slot 0x5
3,229,202 UART: [art] Derive Key Pair - Done
3,244,231 UART: [art] Signing Cert with AUTHO
3,244,711 UART: RITY.KEYID = 7
3,260,055 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,820 UART: [art] PUB.X = 7C2C04C5AE363AE322FD73E786B4D0B4FF0C1B818F8D853CB2930F6E718DB0DC316BAD3FB12E4D5AD2BE44517994FFA2
3,267,601 UART: [art] PUB.Y = 2CEC72738D19551875F8E85B9FD9091F3F2A0FEACE7D7A85C2F4C1FAC37DC2A93602AC7E1E8049DFA9A027FA79DBEC82
3,274,564 UART: [art] SIG.R = 2FC1F2A6F1A02E6184AC39482C2685AA66D807E83427C4E0592DFB26A0F7F2D8729753FBBEF6C59B1980C2F60D2FEC5F
3,281,340 UART: [art] SIG.S = A1694489DBB889AC3CF5BD368F3AE3942D41099D5CE822FF770C91E606CDBEB0A068912F3942EE51577E1D6275296377
3,304,810 UART: Caliptra RT
3,305,063 UART: [state] CFI Enabled
3,413,058 UART: [rt] RT listening for mailbox commands...
3,413,721 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,578 UART: [rt]cmd =0x46504c54, len=4
3,444,638 >>> mbox cmd response data (8 bytes)
3,444,843 UART: [rt] FIPS self test
3,445,171 UART: [kat] ++
3,445,323 UART: [kat] sha1
3,449,483 UART: [kat] SHA2-256
3,451,505 UART: [kat] SHA2-384
3,454,244 UART: Fatal Error: 0x90020002
3,455,783 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,455,788 >>> mbox cmd response: failed
3,455,788 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,455,793 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,517 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,939,884 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,502 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,112 UART: [kat] SHA2-256
882,043 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,158 UART: [kat] ++
886,310 UART: [kat] sha1
890,718 UART: [kat] SHA2-256
892,656 UART: [kat] SHA2-384
895,453 UART: [kat] SHA2-512-ACC
897,354 UART: [kat] ECC-384
903,121 UART: [kat] HMAC-384Kdf
907,839 UART: [kat] LMS
1,476,035 UART: [kat] --
1,477,020 UART: [cold-reset] ++
1,477,538 UART: [fht] Storing FHT @ 0x50003400
1,480,373 UART: [idev] ++
1,480,541 UART: [idev] CDI.KEYID = 6
1,480,901 UART: [idev] SUBJECT.KEYID = 7
1,481,325 UART: [idev] UDS.KEYID = 0
1,481,670 ready_for_fw is high
1,481,670 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,571 UART: [idev] Erasing UDS.KEYID = 0
1,506,515 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,125 UART: [idev] --
1,516,188 UART: [ldev] ++
1,516,356 UART: [ldev] CDI.KEYID = 6
1,516,719 UART: [ldev] SUBJECT.KEYID = 5
1,517,145 UART: [ldev] AUTHORITY.KEYID = 7
1,517,608 UART: [ldev] FE.KEYID = 1
1,522,966 UART: [ldev] Erasing FE.KEYID = 1
1,548,831 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,869 UART: [ldev] --
1,588,168 UART: [fwproc] Waiting for Commands...
1,589,037 UART: [fwproc] Received command 0x46574c44
1,589,828 UART: [fwproc] Received Image of size 115196 bytes
2,897,642 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,306 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,658 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,091,867 >>> mbox cmd response: success
3,092,981 UART: [afmc] ++
3,093,149 UART: [afmc] CDI.KEYID = 6
3,093,511 UART: [afmc] SUBJECT.KEYID = 7
3,093,936 UART: [afmc] AUTHORITY.KEYID = 5
3,129,805 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,146,345 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,147,125 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,853 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,738 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,164,428 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,172,441 UART: [afmc] --
3,173,475 UART: [cold-reset] --
3,174,215 UART: [state] Locking Datavault
3,175,232 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,836 UART: [state] Locking ICCM
3,176,374 UART: [exit] Launching FMC @ 0x40000130
3,181,703 UART:
3,181,719 UART: Running Caliptra FMC ...
3,182,127 UART:
3,182,270 UART: [state] CFI Enabled
3,192,755 UART: [fht] FMC Alias Private Key: 7
3,300,660 UART: [art] Extend RT PCRs Done
3,301,088 UART: [art] Lock RT PCRs Done
3,302,298 UART: [art] Populate DV Done
3,310,609 UART: [fht] FMC Alias Private Key: 7
3,311,645 UART: [art] Derive CDI
3,311,925 UART: [art] Store in in slot 0x4
3,397,748 UART: [art] Derive Key Pair
3,398,108 UART: [art] Store priv key in slot 0x5
3,411,158 UART: [art] Derive Key Pair - Done
3,426,056 UART: [art] Signing Cert with AUTHO
3,426,536 UART: RITY.KEYID = 7
3,442,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,827 UART: [art] PUB.X = 8BD03CD298B74457144A7F60B57C97C5607996F9BF5522EA9030B78208538A3C8A34FF390CEFC20B2497B91A700D0F22
3,449,580 UART: [art] PUB.Y = EB62EACD2CF99E32FF7CACDBEF6ED8006D381390935BC2F7EE9C85700EE7A1ECA110158812463C57C644F1AA84BE140C
3,456,522 UART: [art] SIG.R = 2D135C34CFE5C27838F62BA50B50BB2AAB2235F9E0C1E0A8EB1CD95E9A72A086BE0AA9538AF2FF47EFC1B05250A092CF
3,463,308 UART: [art] SIG.S = DC246A82B164201705E6A70DB4BF3E808EEF86644A12D3CA9A05D7B92A16A464F63E9BCD169CEF8C03524874890ABDBC
3,486,970 UART: Caliptra RT
3,487,315 UART: [state] CFI Enabled
3,595,298 UART: [rt] RT listening for mailbox commands...
3,595,961 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,816 UART: [rt]cmd =0x46504c54, len=4
3,627,008 >>> mbox cmd response data (8 bytes)
3,627,329 UART: [rt] FIPS self test
3,627,657 UART: [kat] ++
3,627,809 UART: [kat] sha1
3,631,915 UART: [kat] SHA2-256
3,633,937 UART: [kat] SHA2-384
3,636,526 UART: Fatal Error: 0x90020002
3,638,065 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,638,070 >>> mbox cmd response: failed
3,638,070 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,638,075 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,813 UART: [state] LifecycleState = Unprovisioned
86,468 UART: [state] DebugLocked = No
87,134 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,812 UART: [kat] SHA2-256
882,743 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,858 UART: [kat] ++
887,010 UART: [kat] sha1
891,226 UART: [kat] SHA2-256
893,164 UART: [kat] SHA2-384
896,079 UART: [kat] SHA2-512-ACC
897,980 UART: [kat] ECC-384
903,559 UART: [kat] HMAC-384Kdf
908,231 UART: [kat] LMS
1,476,427 UART: [kat] --
1,477,236 UART: [cold-reset] ++
1,477,594 UART: [fht] Storing FHT @ 0x50003400
1,480,225 UART: [idev] ++
1,480,393 UART: [idev] CDI.KEYID = 6
1,480,753 UART: [idev] SUBJECT.KEYID = 7
1,481,177 UART: [idev] UDS.KEYID = 0
1,481,522 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,489,261 UART: [idev] Erasing UDS.KEYID = 0
1,506,383 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,881 UART: [idev] --
1,515,970 UART: [ldev] ++
1,516,138 UART: [ldev] CDI.KEYID = 6
1,516,501 UART: [ldev] SUBJECT.KEYID = 5
1,516,927 UART: [ldev] AUTHORITY.KEYID = 7
1,517,390 UART: [ldev] FE.KEYID = 1
1,522,910 UART: [ldev] Erasing FE.KEYID = 1
1,548,027 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,985 UART: [ldev] --
1,587,364 UART: [fwproc] Waiting for Commands...
1,588,079 UART: [fwproc] Received command 0x46574c44
1,588,870 UART: [fwproc] Received Image of size 115196 bytes
2,896,268 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,334 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,686 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,827 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,592 ready_for_fw is high
1,362,592 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,941,353 >>> mbox cmd response: success
3,003,049 UART:
3,003,065 UART: Running Caliptra FMC ...
3,003,473 UART:
3,003,616 UART: [state] CFI Enabled
3,014,519 UART: [fht] FMC Alias Private Key: 7
3,122,044 UART: [art] Extend RT PCRs Done
3,122,472 UART: [art] Lock RT PCRs Done
3,124,102 UART: [art] Populate DV Done
3,132,111 UART: [fht] FMC Alias Private Key: 7
3,133,057 UART: [art] Derive CDI
3,133,337 UART: [art] Store in in slot 0x4
3,218,824 UART: [art] Derive Key Pair
3,219,184 UART: [art] Store priv key in slot 0x5
3,231,926 UART: [art] Derive Key Pair - Done
3,246,544 UART: [art] Signing Cert with AUTHO
3,247,024 UART: RITY.KEYID = 7
3,262,676 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,441 UART: [art] PUB.X = FA05F9C5CC8DE559165FA90949B38AC85A9CB4E89EA34D017F8F86A93AA5D61D345C83476B4C1B148DAADF1DC750FB87
3,270,220 UART: [art] PUB.Y = D1B7E5B74706889A0D47DC9B751AB0386325565217898A082575F98973B8157281D0DB034DF2B594D9BB8837B8991C54
3,277,146 UART: [art] SIG.R = A98A11106EE24C23F80F2654F39F61253BA4FA77FFB2C79D80C98FF259361DACFBEBBF1316EBCB22018022A95C6537EC
3,283,924 UART: [art] SIG.S = E9501A66FEAAFC134B526471904C745FFBC807A68B3A6FE6D0A4D44FCE62695DE434767B485A7007C1FF0207758268CF
3,307,403 UART: Caliptra RT
3,307,748 UART: [state] CFI Enabled
3,415,956 UART: [rt] RT listening for mailbox commands...
3,416,619 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,432 UART: [rt]cmd =0x46504c54, len=4
3,447,612 >>> mbox cmd response data (8 bytes)
3,447,971 UART: [rt] FIPS self test
3,448,299 UART: [kat] ++
3,448,451 UART: [kat] sha1
3,452,593 UART: [kat] SHA2-256
3,454,615 UART: [kat] SHA2-384
3,457,228 UART: Fatal Error: 0x90020002
3,458,767 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,458,772 >>> mbox cmd response: failed
3,458,772 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,458,777 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,078 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,847 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,522 UART: [kat] SHA2-256
893,172 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,297 UART: [kat] ++
897,449 UART: [kat] sha1
901,505 UART: [kat] SHA2-256
903,445 UART: [kat] SHA2-384
906,028 UART: [kat] SHA2-512-ACC
907,929 UART: [kat] ECC-384
917,568 UART: [kat] HMAC-384Kdf
922,138 UART: [kat] LMS
1,170,466 UART: [kat] --
1,171,537 UART: [cold-reset] ++
1,171,927 UART: [fht] FHT @ 0x50003400
1,174,792 UART: [idev] ++
1,174,960 UART: [idev] CDI.KEYID = 6
1,175,320 UART: [idev] SUBJECT.KEYID = 7
1,175,744 UART: [idev] UDS.KEYID = 0
1,176,089 ready_for_fw is high
1,176,089 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,578 UART: [idev] Erasing UDS.KEYID = 0
1,201,177 UART: [idev] Sha1 KeyId Algorithm
1,209,667 UART: [idev] --
1,210,687 UART: [ldev] ++
1,210,855 UART: [ldev] CDI.KEYID = 6
1,211,218 UART: [ldev] SUBJECT.KEYID = 5
1,211,644 UART: [ldev] AUTHORITY.KEYID = 7
1,212,107 UART: [ldev] FE.KEYID = 1
1,217,389 UART: [ldev] Erasing FE.KEYID = 1
1,244,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,789 UART: [ldev] --
1,283,210 UART: [fwproc] Wait for Commands...
1,283,810 UART: [fwproc] Recv command 0x46574c44
1,284,538 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,037 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,040 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,344 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,567 >>> mbox cmd response: success
2,786,803 UART: [afmc] ++
2,786,971 UART: [afmc] CDI.KEYID = 6
2,787,333 UART: [afmc] SUBJECT.KEYID = 7
2,787,758 UART: [afmc] AUTHORITY.KEYID = 5
2,822,981 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,292 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,040 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,768 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,653 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,372 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,026 UART: [afmc] --
2,866,140 UART: [cold-reset] --
2,866,774 UART: [state] Locking Datavault
2,868,071 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,675 UART: [state] Locking ICCM
2,869,261 UART: [exit] Launching FMC @ 0x40000130
2,874,590 UART:
2,874,606 UART: Running Caliptra FMC ...
2,875,014 UART:
2,875,068 UART: [state] CFI Enabled
2,885,213 UART: [fht] FMC Alias Private Key: 7
2,992,786 UART: [art] Extend RT PCRs Done
2,993,214 UART: [art] Lock RT PCRs Done
2,994,748 UART: [art] Populate DV Done
3,003,031 UART: [fht] FMC Alias Private Key: 7
3,004,099 UART: [art] Derive CDI
3,004,379 UART: [art] Store in in slot 0x4
3,089,872 UART: [art] Derive Key Pair
3,090,232 UART: [art] Store priv key in slot 0x5
3,103,250 UART: [art] Derive Key Pair - Done
3,118,219 UART: [art] Signing Cert with AUTHO
3,118,699 UART: RITY.KEYID = 7
3,133,445 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,210 UART: [art] PUB.X = 7EE3DED80F2038931E13FEA11D08C07BE9103D5159C2A80B188ADBBB193ECAC79E0C88152415F754CEB0552862458105
3,140,969 UART: [art] PUB.Y = CBE8F7017883D0EDCA31CB90BE6E8965CDB810B7463EEF6DC3DBF2AFE795E9D9EC890246FFAC88F47CEA1E6C4718225D
3,147,939 UART: [art] SIG.R = A0D594970C42BC39A286802E0173CCA60BD8790A17EC9674BE82A8C685EFDB9B6C959E55AD84D0DCB09FD5023AAB290C
3,154,705 UART: [art] SIG.S = DD60F344C17B0FCE8959C33A0918CB5016C480B50356E468BEFD5B250500ADC51ECA30F50B5D47C9700C6653B66302B9
3,178,641 UART: Caliptra RT
3,178,894 UART: [state] CFI Enabled
3,287,188 UART: [rt] RT listening for mailbox commands...
3,287,851 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,580 UART: [rt]cmd =0x46504c54, len=4
3,318,872 >>> mbox cmd response data (8 bytes)
3,319,063 UART: [rt] FIPS self test
3,319,391 UART: [kat] ++
3,319,543 UART: [kat] sha1
3,323,607 UART: [kat] SHA2-256
3,325,629 UART: [kat] SHA2-384
3,328,186 UART: Fatal Error: 0x90020002
3,329,725 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,730 >>> mbox cmd response: failed
3,329,730 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,735 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [kat] SHA2-256
893,176 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,301 UART: [kat] ++
897,453 UART: [kat] sha1
901,701 UART: [kat] SHA2-256
903,641 UART: [kat] SHA2-384
906,546 UART: [kat] SHA2-512-ACC
908,447 UART: [kat] ECC-384
917,982 UART: [kat] HMAC-384Kdf
922,586 UART: [kat] LMS
1,170,914 UART: [kat] --
1,171,713 UART: [cold-reset] ++
1,172,277 UART: [fht] FHT @ 0x50003400
1,175,150 UART: [idev] ++
1,175,318 UART: [idev] CDI.KEYID = 6
1,175,678 UART: [idev] SUBJECT.KEYID = 7
1,176,102 UART: [idev] UDS.KEYID = 0
1,176,447 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,186 UART: [idev] Erasing UDS.KEYID = 0
1,201,343 UART: [idev] Sha1 KeyId Algorithm
1,209,905 UART: [idev] --
1,210,843 UART: [ldev] ++
1,211,011 UART: [ldev] CDI.KEYID = 6
1,211,374 UART: [ldev] SUBJECT.KEYID = 5
1,211,800 UART: [ldev] AUTHORITY.KEYID = 7
1,212,263 UART: [ldev] FE.KEYID = 1
1,217,643 UART: [ldev] Erasing FE.KEYID = 1
1,243,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,497 UART: [ldev] --
1,282,934 UART: [fwproc] Wait for Commands...
1,283,742 UART: [fwproc] Recv command 0x46574c44
1,284,470 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,692 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,996 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,005 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,939 ready_for_fw is high
1,060,939 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,602 >>> mbox cmd response: success
2,700,922 UART:
2,700,938 UART: Running Caliptra FMC ...
2,701,346 UART:
2,701,400 UART: [state] CFI Enabled
2,711,687 UART: [fht] FMC Alias Private Key: 7
2,819,392 UART: [art] Extend RT PCRs Done
2,819,820 UART: [art] Lock RT PCRs Done
2,821,484 UART: [art] Populate DV Done
2,829,813 UART: [fht] FMC Alias Private Key: 7
2,830,881 UART: [art] Derive CDI
2,831,161 UART: [art] Store in in slot 0x4
2,916,714 UART: [art] Derive Key Pair
2,917,074 UART: [art] Store priv key in slot 0x5
2,930,220 UART: [art] Derive Key Pair - Done
2,945,013 UART: [art] Signing Cert with AUTHO
2,945,493 UART: RITY.KEYID = 7
2,960,751 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,516 UART: [art] PUB.X = 7C71ACFEA4FDBFE7DC8B3C069C272D3F4A2ABC494731C32D9257967D4F2025B27BFBA3EED41B0D159A5E0AEBA3202896
2,968,299 UART: [art] PUB.Y = B247E82842333B407EB39BE26B94C401F763F31F7E5778F5A43B122E8352B35A5188BBBC1054BDFBB82C378933AB091E
2,975,245 UART: [art] SIG.R = 5044D66E14A3117A9E08BA44931701C90FA917FDC0E0DD6B08DCE5426B7CAD4077530366EBB8416B1E9F3D4761A030E6
2,982,004 UART: [art] SIG.S = C987C4390D74460356AFE482E6EF48DC6E548EB7060CBA9F5CF539EC1F438E010A47202D633FC76EF8093C309C6289BE
3,005,590 UART: Caliptra RT
3,005,843 UART: [state] CFI Enabled
3,114,496 UART: [rt] RT listening for mailbox commands...
3,115,159 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,830 UART: [rt]cmd =0x46504c54, len=4
3,145,882 >>> mbox cmd response data (8 bytes)
3,146,119 UART: [rt] FIPS self test
3,146,447 UART: [kat] ++
3,146,599 UART: [kat] sha1
3,151,019 UART: [kat] SHA2-256
3,153,041 UART: [kat] SHA2-384
3,155,990 UART: Fatal Error: 0x90020002
3,157,529 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,157,534 >>> mbox cmd response: failed
3,157,534 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,157,539 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,571 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,954 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
88,091 UART: [kat] SHA2-256
893,741 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,866 UART: [kat] ++
898,018 UART: [kat] sha1
902,266 UART: [kat] SHA2-256
904,206 UART: [kat] SHA2-384
906,961 UART: [kat] SHA2-512-ACC
908,862 UART: [kat] ECC-384
918,301 UART: [kat] HMAC-384Kdf
922,961 UART: [kat] LMS
1,171,289 UART: [kat] --
1,172,552 UART: [cold-reset] ++
1,172,914 UART: [fht] FHT @ 0x50003400
1,175,393 UART: [idev] ++
1,175,561 UART: [idev] CDI.KEYID = 6
1,175,921 UART: [idev] SUBJECT.KEYID = 7
1,176,345 UART: [idev] UDS.KEYID = 0
1,176,690 ready_for_fw is high
1,176,690 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,184,605 UART: [idev] Erasing UDS.KEYID = 0
1,201,976 UART: [idev] Sha1 KeyId Algorithm
1,210,440 UART: [idev] --
1,211,516 UART: [ldev] ++
1,211,684 UART: [ldev] CDI.KEYID = 6
1,212,047 UART: [ldev] SUBJECT.KEYID = 5
1,212,473 UART: [ldev] AUTHORITY.KEYID = 7
1,212,936 UART: [ldev] FE.KEYID = 1
1,218,322 UART: [ldev] Erasing FE.KEYID = 1
1,244,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,274 UART: [ldev] --
1,283,661 UART: [fwproc] Wait for Commands...
1,284,299 UART: [fwproc] Recv command 0x46574c44
1,285,027 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,578 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,507 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,811 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,834 >>> mbox cmd response: success
2,787,042 UART: [afmc] ++
2,787,210 UART: [afmc] CDI.KEYID = 6
2,787,572 UART: [afmc] SUBJECT.KEYID = 7
2,787,997 UART: [afmc] AUTHORITY.KEYID = 5
2,824,380 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,789 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,517 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,402 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,121 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,959 UART: [afmc] --
2,867,939 UART: [cold-reset] --
2,868,827 UART: [state] Locking Datavault
2,869,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,566 UART: [state] Locking ICCM
2,871,126 UART: [exit] Launching FMC @ 0x40000130
2,876,455 UART:
2,876,471 UART: Running Caliptra FMC ...
2,876,879 UART:
2,877,022 UART: [state] CFI Enabled
2,887,459 UART: [fht] FMC Alias Private Key: 7
2,995,244 UART: [art] Extend RT PCRs Done
2,995,672 UART: [art] Lock RT PCRs Done
2,997,170 UART: [art] Populate DV Done
3,005,363 UART: [fht] FMC Alias Private Key: 7
3,006,489 UART: [art] Derive CDI
3,006,769 UART: [art] Store in in slot 0x4
3,092,202 UART: [art] Derive Key Pair
3,092,562 UART: [art] Store priv key in slot 0x5
3,105,706 UART: [art] Derive Key Pair - Done
3,120,688 UART: [art] Signing Cert with AUTHO
3,121,168 UART: RITY.KEYID = 7
3,135,920 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,685 UART: [art] PUB.X = 5FC936DFF6E34BA142DA2305AF5B755F03184E3E486DF3080F691224F96A21EDB437EBC4ED213360D04F00AB76B89AB2
3,143,431 UART: [art] PUB.Y = 288D78106BA42F5553C8F3DFD732A6AD2348E1EDA8A0FE148DC4CBBC87A0897AEDE4A2779C88C7885F7447AE5E44EA83
3,150,397 UART: [art] SIG.R = 99D9EE4312157E6739B274CCF8C1973E48A23C11A5E9A0162F81EBD1FBE1CAC89ED9B9CBB1FC2520C21955B794A587A2
3,157,179 UART: [art] SIG.S = E709B905A56F442793A459B23845C8B860064677D833AAFB4C90E2405A4BDA47E1BCC6F2B5C40C898C2870E4B5B70DE0
3,181,107 UART: Caliptra RT
3,181,452 UART: [state] CFI Enabled
3,289,266 UART: [rt] RT listening for mailbox commands...
3,289,929 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,638 UART: [rt]cmd =0x46504c54, len=4
3,320,602 >>> mbox cmd response data (8 bytes)
3,320,901 UART: [rt] FIPS self test
3,321,229 UART: [kat] ++
3,321,381 UART: [kat] sha1
3,325,799 UART: [kat] SHA2-256
3,327,821 UART: [kat] SHA2-384
3,330,592 UART: Fatal Error: 0x90020002
3,332,131 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,332,136 >>> mbox cmd response: failed
3,332,136 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,332,141 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
86,936 UART: [state] WD Timer not started. Device not locked for debugging
88,069 UART: [kat] SHA2-256
893,719 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,844 UART: [kat] ++
897,996 UART: [kat] sha1
902,186 UART: [kat] SHA2-256
904,126 UART: [kat] SHA2-384
906,995 UART: [kat] SHA2-512-ACC
908,896 UART: [kat] ECC-384
919,005 UART: [kat] HMAC-384Kdf
923,621 UART: [kat] LMS
1,171,949 UART: [kat] --
1,172,856 UART: [cold-reset] ++
1,173,260 UART: [fht] FHT @ 0x50003400
1,175,925 UART: [idev] ++
1,176,093 UART: [idev] CDI.KEYID = 6
1,176,453 UART: [idev] SUBJECT.KEYID = 7
1,176,877 UART: [idev] UDS.KEYID = 0
1,177,222 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,185,013 UART: [idev] Erasing UDS.KEYID = 0
1,201,826 UART: [idev] Sha1 KeyId Algorithm
1,210,226 UART: [idev] --
1,211,182 UART: [ldev] ++
1,211,350 UART: [ldev] CDI.KEYID = 6
1,211,713 UART: [ldev] SUBJECT.KEYID = 5
1,212,139 UART: [ldev] AUTHORITY.KEYID = 7
1,212,602 UART: [ldev] FE.KEYID = 1
1,218,000 UART: [ldev] Erasing FE.KEYID = 1
1,244,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,132 UART: [ldev] --
1,283,409 UART: [fwproc] Wait for Commands...
1,284,011 UART: [fwproc] Recv command 0x46574c44
1,284,739 UART: [fwproc] Recv'd Img size: 115196 bytes
2,593,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,987 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,291 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,787,410 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,794 ready_for_fw is high
1,060,794 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,638,729 >>> mbox cmd response: success
2,701,209 UART:
2,701,225 UART: Running Caliptra FMC ...
2,701,633 UART:
2,701,776 UART: [state] CFI Enabled
2,712,571 UART: [fht] FMC Alias Private Key: 7
2,820,326 UART: [art] Extend RT PCRs Done
2,820,754 UART: [art] Lock RT PCRs Done
2,822,176 UART: [art] Populate DV Done
2,830,463 UART: [fht] FMC Alias Private Key: 7
2,831,391 UART: [art] Derive CDI
2,831,671 UART: [art] Store in in slot 0x4
2,917,362 UART: [art] Derive Key Pair
2,917,722 UART: [art] Store priv key in slot 0x5
2,931,348 UART: [art] Derive Key Pair - Done
2,945,826 UART: [art] Signing Cert with AUTHO
2,946,306 UART: RITY.KEYID = 7
2,961,778 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,543 UART: [art] PUB.X = 219E4B73479A79A3F29FB295FA48068F7FC2CC76F0D1BB45545733FF6C559A233302FAB50F9612A56FBC9BE23DE8F8E2
2,969,314 UART: [art] PUB.Y = A922F2BAA875EE012F6C58A975E96531F5120A11CD02C546DB262C7E9F5C541EA9D534624CBED20D241857A1C0A29D56
2,976,258 UART: [art] SIG.R = DE4946EAED446BDD3E04C7CE887B94097A5FE5B0A6258EF4A88733868665DF21952354219FBA0051C42AFE7EA2C903AC
2,983,007 UART: [art] SIG.S = BC163AD29A6B1C837C2B6CF1E2F82122DC96B4A67B4231EBEFF66EFEFE45ACF55BA54D45D5E1F22D686A2CC75045AB34
3,006,774 UART: Caliptra RT
3,007,119 UART: [state] CFI Enabled
3,115,929 UART: [rt] RT listening for mailbox commands...
3,116,592 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,697 UART: [rt]cmd =0x46504c54, len=4
3,147,843 >>> mbox cmd response data (8 bytes)
3,148,070 UART: [rt] FIPS self test
3,148,398 UART: [kat] ++
3,148,550 UART: [kat] sha1
3,152,682 UART: [kat] SHA2-256
3,154,704 UART: [kat] SHA2-384
3,157,547 UART: Fatal Error: 0x90020002
3,159,086 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,159,091 >>> mbox cmd response: failed
3,159,091 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,159,096 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,588 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,467 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,670 UART: [state] LifecycleState = Unprovisioned
85,325 UART: [state] DebugLocked = No
86,009 UART: [state] WD Timer not started. Device not locked for debugging
87,156 UART: [kat] SHA2-256
890,706 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,835 UART: [kat] ++
894,987 UART: [kat] sha1
899,267 UART: [kat] SHA2-256
901,207 UART: [kat] SHA2-384
904,010 UART: [kat] SHA2-512-ACC
905,911 UART: [kat] ECC-384
915,806 UART: [kat] HMAC-384Kdf
920,400 UART: [kat] LMS
1,168,712 UART: [kat] --
1,169,429 UART: [cold-reset] ++
1,169,973 UART: [fht] FHT @ 0x50003400
1,172,661 UART: [idev] ++
1,172,829 UART: [idev] CDI.KEYID = 6
1,173,190 UART: [idev] SUBJECT.KEYID = 7
1,173,615 UART: [idev] UDS.KEYID = 0
1,173,961 ready_for_fw is high
1,173,961 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,181,609 UART: [idev] Erasing UDS.KEYID = 0
1,198,235 UART: [idev] Sha1 KeyId Algorithm
1,207,201 UART: [idev] --
1,208,180 UART: [ldev] ++
1,208,348 UART: [ldev] CDI.KEYID = 6
1,208,712 UART: [ldev] SUBJECT.KEYID = 5
1,209,139 UART: [ldev] AUTHORITY.KEYID = 7
1,209,602 UART: [ldev] FE.KEYID = 1
1,214,648 UART: [ldev] Erasing FE.KEYID = 1
1,241,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,234 UART: [ldev] --
1,280,710 UART: [fwproc] Wait for Commands...
1,281,461 UART: [fwproc] Recv command 0x46574c44
1,282,194 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,104 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,413 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,525 >>> mbox cmd response: success
2,785,664 UART: [afmc] ++
2,785,832 UART: [afmc] CDI.KEYID = 6
2,786,195 UART: [afmc] SUBJECT.KEYID = 7
2,786,621 UART: [afmc] AUTHORITY.KEYID = 5
2,822,320 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,433 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,162 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,045 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,764 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,571 UART: [afmc] --
2,865,583 UART: [cold-reset] --
2,866,567 UART: [state] Locking Datavault
2,868,002 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,606 UART: [state] Locking ICCM
2,869,030 UART: [exit] Launching FMC @ 0x40000130
2,874,359 UART:
2,874,375 UART: Running Caliptra FMC ...
2,874,783 UART:
2,874,837 UART: [state] CFI Enabled
2,885,042 UART: [fht] FMC Alias Private Key: 7
2,992,919 UART: [art] Extend RT PCRs Done
2,993,347 UART: [art] Lock RT PCRs Done
2,995,003 UART: [art] Populate DV Done
3,003,090 UART: [fht] FMC Alias Private Key: 7
3,004,070 UART: [art] Derive CDI
3,004,350 UART: [art] Store in in slot 0x4
3,090,175 UART: [art] Derive Key Pair
3,090,535 UART: [art] Store priv key in slot 0x5
3,103,571 UART: [art] Derive Key Pair - Done
3,118,163 UART: [art] Signing Cert with AUTHO
3,118,643 UART: RITY.KEYID = 7
3,134,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,806 UART: [art] PUB.X = F5E0A4E75CAC9187F5E8FAEEB76E9FBB21D8D57B98DD96A3EE2740B82216B193066BF308017720552B1F7E090CE24748
3,141,569 UART: [art] PUB.Y = 028C98268CEAE606A5DAE465F0D0B6F377027F7104658DA077CA978237A61AE52DF0B3132FFA30EDD0F9455B299104E7
3,148,508 UART: [art] SIG.R = 2EE928B01F795524013F0C7E7593AA118F6A7B9D4EF8441AD9EE97D423DF121D6104C1CD01C99C1B50F879DAE7E03A23
3,155,274 UART: [art] SIG.S = 2E313AEF4D10EB9F84DC7BB1DE5F6A8A7AFE4B4D253FDF987CE0304EC9D67D3335B16F5F62689E5FEEC02CC188347AD9
3,179,079 UART: Caliptra RT
3,179,332 UART: [state] CFI Enabled
3,286,681 UART: [rt] RT listening for mailbox commands...
3,287,344 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,041 UART: [rt]cmd =0x46504c54, len=4
3,318,297 >>> mbox cmd response data (8 bytes)
3,318,490 UART: [rt] FIPS self test
3,318,818 UART: [kat] ++
3,318,970 UART: [kat] sha1
3,323,298 UART: [kat] SHA2-256
3,325,320 UART: [kat] SHA2-384
3,327,829 UART: Fatal Error: 0x90020002
3,329,368 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,373 >>> mbox cmd response: failed
3,329,373 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,329,378 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,662 UART: [kat] SHA2-256
891,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,341 UART: [kat] ++
895,493 UART: [kat] sha1
899,677 UART: [kat] SHA2-256
901,617 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
916,102 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,169,963 UART: [cold-reset] ++
1,170,507 UART: [fht] FHT @ 0x50003400
1,172,949 UART: [idev] ++
1,173,117 UART: [idev] CDI.KEYID = 6
1,173,478 UART: [idev] SUBJECT.KEYID = 7
1,173,903 UART: [idev] UDS.KEYID = 0
1,174,249 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,003 UART: [idev] Erasing UDS.KEYID = 0
1,198,915 UART: [idev] Sha1 KeyId Algorithm
1,207,999 UART: [idev] --
1,209,178 UART: [ldev] ++
1,209,346 UART: [ldev] CDI.KEYID = 6
1,209,710 UART: [ldev] SUBJECT.KEYID = 5
1,210,137 UART: [ldev] AUTHORITY.KEYID = 7
1,210,600 UART: [ldev] FE.KEYID = 1
1,215,986 UART: [ldev] Erasing FE.KEYID = 1
1,243,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,148 UART: [ldev] --
1,282,418 UART: [fwproc] Wait for Commands...
1,283,063 UART: [fwproc] Recv command 0x46574c44
1,283,796 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,564 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,873 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,937 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,426 ready_for_fw is high
1,055,426 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,632,351 >>> mbox cmd response: success
2,693,263 UART:
2,693,279 UART: Running Caliptra FMC ...
2,693,687 UART:
2,693,741 UART: [state] CFI Enabled
2,704,180 UART: [fht] FMC Alias Private Key: 7
2,811,853 UART: [art] Extend RT PCRs Done
2,812,281 UART: [art] Lock RT PCRs Done
2,813,789 UART: [art] Populate DV Done
2,821,812 UART: [fht] FMC Alias Private Key: 7
2,822,782 UART: [art] Derive CDI
2,823,062 UART: [art] Store in in slot 0x4
2,908,813 UART: [art] Derive Key Pair
2,909,173 UART: [art] Store priv key in slot 0x5
2,922,635 UART: [art] Derive Key Pair - Done
2,937,258 UART: [art] Signing Cert with AUTHO
2,937,738 UART: RITY.KEYID = 7
2,952,752 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,517 UART: [art] PUB.X = 9A637A7D310116E44980A390A48E5B098FD4C348486F254DBFFB85112236129DDC5F427DF6DEA8757B31453A56E8733D
2,960,279 UART: [art] PUB.Y = D36B6A488C278196A1EEAD3410C83DAB96A3EFA724F8F2AACDB3C67755CB0CFA13B7E0B4DCBC3356C0B1A5D1EFE13036
2,967,252 UART: [art] SIG.R = C0683234186ED543985CB4A5353CCE73856EF7BAEFE18638ADC224881023F1276DCFE08CAE5C4C1BC6742715531B589A
2,974,026 UART: [art] SIG.S = FCE98DBB99B949BE24BE67A44B3FED31527252FBC7E24AE4E760F8A683EC6A83A5CBADD15B47001C408F3810C9947B3A
2,997,545 UART: Caliptra RT
2,997,798 UART: [state] CFI Enabled
3,105,966 UART: [rt] RT listening for mailbox commands...
3,106,629 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,578 UART: [rt]cmd =0x46504c54, len=4
3,137,850 >>> mbox cmd response data (8 bytes)
3,138,011 UART: [rt] FIPS self test
3,138,339 UART: [kat] ++
3,138,491 UART: [kat] sha1
3,142,693 UART: [kat] SHA2-256
3,144,715 UART: [kat] SHA2-384
3,147,222 UART: Fatal Error: 0x90020002
3,148,761 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,148,766 >>> mbox cmd response: failed
3,148,766 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,148,771 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,280 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,883 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,849 UART: [state] LifecycleState = Unprovisioned
86,504 UART: [state] DebugLocked = No
87,180 UART: [state] WD Timer not started. Device not locked for debugging
88,391 UART: [kat] SHA2-256
891,941 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,070 UART: [kat] ++
896,222 UART: [kat] sha1
900,428 UART: [kat] SHA2-256
902,368 UART: [kat] SHA2-384
905,041 UART: [kat] SHA2-512-ACC
906,942 UART: [kat] ECC-384
916,461 UART: [kat] HMAC-384Kdf
920,963 UART: [kat] LMS
1,169,275 UART: [kat] --
1,170,080 UART: [cold-reset] ++
1,170,660 UART: [fht] FHT @ 0x50003400
1,173,214 UART: [idev] ++
1,173,382 UART: [idev] CDI.KEYID = 6
1,173,743 UART: [idev] SUBJECT.KEYID = 7
1,174,168 UART: [idev] UDS.KEYID = 0
1,174,514 ready_for_fw is high
1,174,514 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,316 UART: [idev] Erasing UDS.KEYID = 0
1,199,184 UART: [idev] Sha1 KeyId Algorithm
1,208,080 UART: [idev] --
1,209,115 UART: [ldev] ++
1,209,283 UART: [ldev] CDI.KEYID = 6
1,209,647 UART: [ldev] SUBJECT.KEYID = 5
1,210,074 UART: [ldev] AUTHORITY.KEYID = 7
1,210,537 UART: [ldev] FE.KEYID = 1
1,215,983 UART: [ldev] Erasing FE.KEYID = 1
1,242,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,015 UART: [ldev] --
1,282,371 UART: [fwproc] Wait for Commands...
1,283,114 UART: [fwproc] Recv command 0x46574c44
1,283,847 UART: [fwproc] Recv'd Img size: 115196 bytes
2,592,049 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,259 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,568 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,778 >>> mbox cmd response: success
2,785,923 UART: [afmc] ++
2,786,091 UART: [afmc] CDI.KEYID = 6
2,786,454 UART: [afmc] SUBJECT.KEYID = 7
2,786,880 UART: [afmc] AUTHORITY.KEYID = 5
2,822,777 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,231 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,982 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,711 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,594 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,313 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,188 UART: [afmc] --
2,866,164 UART: [cold-reset] --
2,867,176 UART: [state] Locking Datavault
2,868,221 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,825 UART: [state] Locking ICCM
2,869,433 UART: [exit] Launching FMC @ 0x40000130
2,874,762 UART:
2,874,778 UART: Running Caliptra FMC ...
2,875,186 UART:
2,875,329 UART: [state] CFI Enabled
2,886,012 UART: [fht] FMC Alias Private Key: 7
2,993,735 UART: [art] Extend RT PCRs Done
2,994,163 UART: [art] Lock RT PCRs Done
2,995,321 UART: [art] Populate DV Done
3,003,628 UART: [fht] FMC Alias Private Key: 7
3,004,742 UART: [art] Derive CDI
3,005,022 UART: [art] Store in in slot 0x4
3,090,341 UART: [art] Derive Key Pair
3,090,701 UART: [art] Store priv key in slot 0x5
3,104,019 UART: [art] Derive Key Pair - Done
3,118,621 UART: [art] Signing Cert with AUTHO
3,119,101 UART: RITY.KEYID = 7
3,134,407 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,172 UART: [art] PUB.X = 2B4C6896F3CCBC9B72199973B00341E36B8AECBAC1C7D3E138FB02071DFE89EF9B204916EF341403BAFC97202A77C6A5
3,141,942 UART: [art] PUB.Y = 036815ED5598C1326252D17F440C25220EC14A036BA3E2C63B7540194906673CE4D41683125CBEBD32FD4D24B6F8C3A0
3,148,873 UART: [art] SIG.R = E273B5D052231BCF3A2D5C849271F6FE7C2DBA97D5D9716D0FCFA2D9F22E1B944A14518110056A18D339CEFFE34FAE5B
3,155,653 UART: [art] SIG.S = 4047EA97245914E95BB4676C7F9844563C418D4013C3255CA604F530951F95FDD48DB62863C31CC42962E07F9056D926
3,179,623 UART: Caliptra RT
3,179,968 UART: [state] CFI Enabled
3,288,535 UART: [rt] RT listening for mailbox commands...
3,289,198 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,175 UART: [rt]cmd =0x46504c54, len=4
3,320,191 >>> mbox cmd response data (8 bytes)
3,320,490 UART: [rt] FIPS self test
3,320,818 UART: [kat] ++
3,320,970 UART: [kat] sha1
3,325,134 UART: [kat] SHA2-256
3,327,156 UART: [kat] SHA2-384
3,329,957 UART: Fatal Error: 0x90020002
3,331,496 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,331,501 >>> mbox cmd response: failed
3,331,501 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,331,506 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Unprovisioned
85,772 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,531 UART: [kat] SHA2-256
891,081 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,210 UART: [kat] ++
895,362 UART: [kat] sha1
899,570 UART: [kat] SHA2-256
901,510 UART: [kat] SHA2-384
904,277 UART: [kat] SHA2-512-ACC
906,178 UART: [kat] ECC-384
915,889 UART: [kat] HMAC-384Kdf
920,461 UART: [kat] LMS
1,168,773 UART: [kat] --
1,169,784 UART: [cold-reset] ++
1,170,206 UART: [fht] FHT @ 0x50003400
1,172,908 UART: [idev] ++
1,173,076 UART: [idev] CDI.KEYID = 6
1,173,437 UART: [idev] SUBJECT.KEYID = 7
1,173,862 UART: [idev] UDS.KEYID = 0
1,174,208 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,296 UART: [idev] Erasing UDS.KEYID = 0
1,199,114 UART: [idev] Sha1 KeyId Algorithm
1,208,120 UART: [idev] --
1,209,247 UART: [ldev] ++
1,209,415 UART: [ldev] CDI.KEYID = 6
1,209,779 UART: [ldev] SUBJECT.KEYID = 5
1,210,206 UART: [ldev] AUTHORITY.KEYID = 7
1,210,669 UART: [ldev] FE.KEYID = 1
1,215,889 UART: [ldev] Erasing FE.KEYID = 1
1,242,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,929 UART: [ldev] --
1,281,439 UART: [fwproc] Wait for Commands...
1,282,016 UART: [fwproc] Recv command 0x46574c44
1,282,749 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,259 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,568 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,784,576 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,877 ready_for_fw is high
1,056,877 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,637,374 >>> mbox cmd response: success
2,700,032 UART:
2,700,048 UART: Running Caliptra FMC ...
2,700,456 UART:
2,700,599 UART: [state] CFI Enabled
2,711,130 UART: [fht] FMC Alias Private Key: 7
2,818,997 UART: [art] Extend RT PCRs Done
2,819,425 UART: [art] Lock RT PCRs Done
2,820,917 UART: [art] Populate DV Done
2,829,084 UART: [fht] FMC Alias Private Key: 7
2,830,206 UART: [art] Derive CDI
2,830,486 UART: [art] Store in in slot 0x4
2,916,419 UART: [art] Derive Key Pair
2,916,779 UART: [art] Store priv key in slot 0x5
2,930,383 UART: [art] Derive Key Pair - Done
2,945,287 UART: [art] Signing Cert with AUTHO
2,945,767 UART: RITY.KEYID = 7
2,961,293 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,058 UART: [art] PUB.X = 31B20200C630714D4F91B4BDDEB2F74E61D73288DAAAC0A9DCA23F9B9D9DE98EFEE7BDCDBFB1BA6359BA38D0DAB1891B
2,968,835 UART: [art] PUB.Y = 0FE5FD6F0265BA3425DA107904CE86EF7FB57691B472988237BE5DB6C34533CEA663490AF6EE3758773795834BCB9E90
2,975,775 UART: [art] SIG.R = 698739003D16C34CDA769CF669D8F1C0650721DE817A8700B645CE0B6B18447685033A081830CA68968A1F4AB5F7B93A
2,982,483 UART: [art] SIG.S = 92DFD01479E16455C784A311B69AEF4B4A5AA7023C32A2BDA1AB70B112F6D35D35E4794FF84AD49B9F1D7EF8A7C387AC
3,005,731 UART: Caliptra RT
3,006,076 UART: [state] CFI Enabled
3,114,019 UART: [rt] RT listening for mailbox commands...
3,114,682 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,291 UART: [rt]cmd =0x46504c54, len=4
3,145,359 >>> mbox cmd response data (8 bytes)
3,145,544 UART: [rt] FIPS self test
3,145,872 UART: [kat] ++
3,146,024 UART: [kat] sha1
3,150,362 UART: [kat] SHA2-256
3,152,384 UART: [kat] SHA2-384
3,155,077 UART: Fatal Error: 0x90020002
3,156,616 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,156,621 >>> mbox cmd response: failed
3,156,621 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
3,156,626 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,705 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,633,566 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,317 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,833 UART: [kat] SHA2-256
881,764 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,879 UART: [kat] ++
886,031 UART: [kat] sha1
890,317 UART: [kat] SHA2-256
892,255 UART: [kat] SHA2-384
894,894 UART: [kat] SHA2-512-ACC
896,795 UART: [kat] ECC-384
902,480 UART: [kat] HMAC-384Kdf
906,906 UART: [kat] LMS
1,475,102 UART: [kat] --
1,476,227 UART: [cold-reset] ++
1,476,633 UART: [fht] Storing FHT @ 0x50003400
1,479,288 UART: [idev] ++
1,479,456 UART: [idev] CDI.KEYID = 6
1,479,816 UART: [idev] SUBJECT.KEYID = 7
1,480,240 UART: [idev] UDS.KEYID = 0
1,480,585 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,164 UART: [idev] Erasing UDS.KEYID = 0
1,504,580 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,358 UART: [idev] --
1,514,247 UART: [ldev] ++
1,514,415 UART: [ldev] CDI.KEYID = 6
1,514,778 UART: [ldev] SUBJECT.KEYID = 5
1,515,204 UART: [ldev] AUTHORITY.KEYID = 7
1,515,667 UART: [ldev] FE.KEYID = 1
1,521,115 UART: [ldev] Erasing FE.KEYID = 1
1,546,516 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,046 UART: [ldev] --
1,585,375 UART: [fwproc] Waiting for Commands...
1,586,168 UART: [fwproc] Received command 0x46505652
1,587,050 UART: [rt] FIPS Version
1,587,603 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,367 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,778 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,670 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,326 UART: [kat] SHA2-256
882,257 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,372 UART: [kat] ++
886,524 UART: [kat] sha1
890,764 UART: [kat] SHA2-256
892,702 UART: [kat] SHA2-384
895,393 UART: [kat] SHA2-512-ACC
897,294 UART: [kat] ECC-384
902,661 UART: [kat] HMAC-384Kdf
907,187 UART: [kat] LMS
1,475,383 UART: [kat] --
1,476,022 UART: [cold-reset] ++
1,476,402 UART: [fht] Storing FHT @ 0x50003400
1,479,383 UART: [idev] ++
1,479,551 UART: [idev] CDI.KEYID = 6
1,479,911 UART: [idev] SUBJECT.KEYID = 7
1,480,335 UART: [idev] UDS.KEYID = 0
1,480,680 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,175 UART: [idev] Erasing UDS.KEYID = 0
1,504,723 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,263 UART: [idev] --
1,514,354 UART: [ldev] ++
1,514,522 UART: [ldev] CDI.KEYID = 6
1,514,885 UART: [ldev] SUBJECT.KEYID = 5
1,515,311 UART: [ldev] AUTHORITY.KEYID = 7
1,515,774 UART: [ldev] FE.KEYID = 1
1,521,330 UART: [ldev] Erasing FE.KEYID = 1
1,546,513 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,179 UART: [ldev] --
1,585,518 UART: [fwproc] Waiting for Commands...
1,586,207 UART: [fwproc] Received command 0x46505652
1,587,089 UART: [rt] FIPS Version
1,587,642 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,204 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,671 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Unprovisioned
85,633 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
893,078 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,203 UART: [kat] ++
897,355 UART: [kat] sha1
901,635 UART: [kat] SHA2-256
903,575 UART: [kat] SHA2-384
906,144 UART: [kat] SHA2-512-ACC
908,045 UART: [kat] ECC-384
917,800 UART: [kat] HMAC-384Kdf
922,270 UART: [kat] LMS
1,170,598 UART: [kat] --
1,171,493 UART: [cold-reset] ++
1,172,051 UART: [fht] FHT @ 0x50003400
1,174,854 UART: [idev] ++
1,175,022 UART: [idev] CDI.KEYID = 6
1,175,382 UART: [idev] SUBJECT.KEYID = 7
1,175,806 UART: [idev] UDS.KEYID = 0
1,176,151 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,506 UART: [idev] Erasing UDS.KEYID = 0
1,200,987 UART: [idev] Sha1 KeyId Algorithm
1,209,335 UART: [idev] --
1,210,377 UART: [ldev] ++
1,210,545 UART: [ldev] CDI.KEYID = 6
1,210,908 UART: [ldev] SUBJECT.KEYID = 5
1,211,334 UART: [ldev] AUTHORITY.KEYID = 7
1,211,797 UART: [ldev] FE.KEYID = 1
1,217,185 UART: [ldev] Erasing FE.KEYID = 1
1,243,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,265 UART: [ldev] --
1,282,686 UART: [fwproc] Wait for Commands...
1,283,272 UART: [fwproc] Recv command 0x46505652
1,284,093 UART: [rt] FIPS Version
1,284,647 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,653 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,141,457 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,711 UART: [state] LifecycleState = Unprovisioned
86,366 UART: [state] DebugLocked = No
87,006 UART: [state] WD Timer not started. Device not locked for debugging
88,239 UART: [kat] SHA2-256
893,889 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,014 UART: [kat] ++
898,166 UART: [kat] sha1
902,414 UART: [kat] SHA2-256
904,354 UART: [kat] SHA2-384
907,035 UART: [kat] SHA2-512-ACC
908,936 UART: [kat] ECC-384
918,327 UART: [kat] HMAC-384Kdf
923,073 UART: [kat] LMS
1,171,401 UART: [kat] --
1,172,354 UART: [cold-reset] ++
1,172,842 UART: [fht] FHT @ 0x50003400
1,175,451 UART: [idev] ++
1,175,619 UART: [idev] CDI.KEYID = 6
1,175,979 UART: [idev] SUBJECT.KEYID = 7
1,176,403 UART: [idev] UDS.KEYID = 0
1,176,748 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,659 UART: [idev] Erasing UDS.KEYID = 0
1,202,278 UART: [idev] Sha1 KeyId Algorithm
1,210,862 UART: [idev] --
1,211,968 UART: [ldev] ++
1,212,136 UART: [ldev] CDI.KEYID = 6
1,212,499 UART: [ldev] SUBJECT.KEYID = 5
1,212,925 UART: [ldev] AUTHORITY.KEYID = 7
1,213,388 UART: [ldev] FE.KEYID = 1
1,218,792 UART: [ldev] Erasing FE.KEYID = 1
1,244,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,784 UART: [ldev] --
1,284,209 UART: [fwproc] Wait for Commands...
1,284,899 UART: [fwproc] Recv command 0x46505652
1,285,720 UART: [rt] FIPS Version
1,286,274 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,902 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,178 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,566 UART: [state] LifecycleState = Unprovisioned
86,221 UART: [state] DebugLocked = No
86,843 UART: [state] WD Timer not started. Device not locked for debugging
88,140 UART: [kat] SHA2-256
891,690 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,819 UART: [kat] ++
895,971 UART: [kat] sha1
900,197 UART: [kat] SHA2-256
902,137 UART: [kat] SHA2-384
904,862 UART: [kat] SHA2-512-ACC
906,763 UART: [kat] ECC-384
916,526 UART: [kat] HMAC-384Kdf
921,094 UART: [kat] LMS
1,169,406 UART: [kat] --
1,170,549 UART: [cold-reset] ++
1,170,887 UART: [fht] FHT @ 0x50003400
1,173,567 UART: [idev] ++
1,173,735 UART: [idev] CDI.KEYID = 6
1,174,096 UART: [idev] SUBJECT.KEYID = 7
1,174,521 UART: [idev] UDS.KEYID = 0
1,174,867 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,529 UART: [idev] Erasing UDS.KEYID = 0
1,199,619 UART: [idev] Sha1 KeyId Algorithm
1,208,431 UART: [idev] --
1,209,316 UART: [ldev] ++
1,209,484 UART: [ldev] CDI.KEYID = 6
1,209,848 UART: [ldev] SUBJECT.KEYID = 5
1,210,275 UART: [ldev] AUTHORITY.KEYID = 7
1,210,738 UART: [ldev] FE.KEYID = 1
1,215,800 UART: [ldev] Erasing FE.KEYID = 1
1,242,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,046 UART: [ldev] --
1,281,460 UART: [fwproc] Wait for Commands...
1,282,127 UART: [fwproc] Recv command 0x46505652
1,282,954 UART: [rt] FIPS Version
1,283,515 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,308 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,448 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
891,729 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,858 UART: [kat] ++
896,010 UART: [kat] sha1
900,106 UART: [kat] SHA2-256
902,046 UART: [kat] SHA2-384
904,905 UART: [kat] SHA2-512-ACC
906,806 UART: [kat] ECC-384
916,723 UART: [kat] HMAC-384Kdf
921,145 UART: [kat] LMS
1,169,457 UART: [kat] --
1,170,350 UART: [cold-reset] ++
1,170,678 UART: [fht] FHT @ 0x50003400
1,173,374 UART: [idev] ++
1,173,542 UART: [idev] CDI.KEYID = 6
1,173,903 UART: [idev] SUBJECT.KEYID = 7
1,174,328 UART: [idev] UDS.KEYID = 0
1,174,674 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,236 UART: [idev] Erasing UDS.KEYID = 0
1,199,002 UART: [idev] Sha1 KeyId Algorithm
1,207,944 UART: [idev] --
1,208,983 UART: [ldev] ++
1,209,151 UART: [ldev] CDI.KEYID = 6
1,209,515 UART: [ldev] SUBJECT.KEYID = 5
1,209,942 UART: [ldev] AUTHORITY.KEYID = 7
1,210,405 UART: [ldev] FE.KEYID = 1
1,215,643 UART: [ldev] Erasing FE.KEYID = 1
1,241,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,595 UART: [ldev] --
1,280,983 UART: [fwproc] Wait for Commands...
1,281,662 UART: [fwproc] Recv command 0x46505652
1,282,489 UART: [rt] FIPS Version
1,283,050 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,259 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,138,201 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,505 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,105 UART: [kat] SHA2-256
882,036 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,151 UART: [kat] ++
886,303 UART: [kat] sha1
890,749 UART: [kat] SHA2-256
892,687 UART: [kat] SHA2-384
895,422 UART: [kat] SHA2-512-ACC
897,323 UART: [kat] ECC-384
902,780 UART: [kat] HMAC-384Kdf
907,490 UART: [kat] LMS
1,475,686 UART: [kat] --
1,476,483 UART: [cold-reset] ++
1,476,905 UART: [fht] Storing FHT @ 0x50003400
1,479,598 UART: [idev] ++
1,479,766 UART: [idev] CDI.KEYID = 6
1,480,126 UART: [idev] SUBJECT.KEYID = 7
1,480,550 UART: [idev] UDS.KEYID = 0
1,480,895 ready_for_fw is high
1,480,895 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,488,192 UART: [idev] Erasing UDS.KEYID = 0
1,504,752 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,432 UART: [idev] --
1,514,585 UART: [ldev] ++
1,514,753 UART: [ldev] CDI.KEYID = 6
1,515,116 UART: [ldev] SUBJECT.KEYID = 5
1,515,542 UART: [ldev] AUTHORITY.KEYID = 7
1,516,005 UART: [ldev] FE.KEYID = 1
1,521,047 UART: [ldev] Erasing FE.KEYID = 1
1,546,356 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,986 UART: [ldev] --
1,585,333 UART: [fwproc] Waiting for Commands...
1,585,980 UART: [fwproc] Received command 0x46574c44
1,586,771 UART: [fwproc] Received Image of size 114332 bytes
2,883,415 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,643 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,995 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,075,946 >>> mbox cmd response: success
3,075,946 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,077,052 UART: [afmc] ++
3,077,220 UART: [afmc] CDI.KEYID = 6
3,077,582 UART: [afmc] SUBJECT.KEYID = 7
3,078,007 UART: [afmc] AUTHORITY.KEYID = 5
3,112,568 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,900 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,680 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,408 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,293 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,983 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,106 UART: [afmc] --
3,156,106 UART: [cold-reset] --
3,156,918 UART: [state] Locking Datavault
3,158,213 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,817 UART: [state] Locking ICCM
3,159,271 UART: [exit] Launching FMC @ 0x40000130
3,164,600 UART:
3,164,616 UART: Running Caliptra FMC ...
3,165,024 UART:
3,165,078 UART: [state] CFI Enabled
3,175,757 UART: [fht] FMC Alias Private Key: 7
3,284,036 UART: [art] Extend RT PCRs Done
3,284,464 UART: [art] Lock RT PCRs Done
3,286,334 UART: [art] Populate DV Done
3,294,387 UART: [fht] FMC Alias Private Key: 7
3,295,393 UART: [art] Derive CDI
3,295,673 UART: [art] Store in in slot 0x4
3,381,610 UART: [art] Derive Key Pair
3,381,970 UART: [art] Store priv key in slot 0x5
3,394,966 UART: [art] Derive Key Pair - Done
3,409,498 UART: [art] Signing Cert with AUTHO
3,409,978 UART: RITY.KEYID = 7
3,424,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,497 UART: [art] PUB.X = B732D2CA2DF727CD068BD8C945DBBB344ED33A66999E95380E1C91A371B7BA597D7B0E72B20AE255216D35857888B2F2
3,432,261 UART: [art] PUB.Y = 65A2DAA9C157332C43A21A89D7E973D1058BC5A03ED58C9FF47B0A4F6C7C3310E24BF068DA19D3BCE3A97E43E6799B45
3,439,217 UART: [art] SIG.R = 0A0152601892148D3E96D50BF2FD539C83C6F0F4C0901AF8EDFD93C8DD61592046DAD4B4AF8988249D7EB3B7EF80693D
3,445,986 UART: [art] SIG.S = 9EA653EE15950130C63F1D3471AB6FCBB45E608EDC22F3820520299B933D6D0694FD8118EAEFD5262776C051C2A37938
3,469,428 UART: Caliptra RT
3,469,681 UART: [state] CFI Enabled
3,577,556 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,148 UART: [rt]cmd =0x46505652, len=4
3,608,808 UART: [rt] FIPS Version
3,609,723 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,361 ready_for_fw is high
1,362,361 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,680 >>> mbox cmd response: success
2,927,680 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,989,764 UART:
2,989,780 UART: Running Caliptra FMC ...
2,990,188 UART:
2,990,242 UART: [state] CFI Enabled
3,000,993 UART: [fht] FMC Alias Private Key: 7
3,108,818 UART: [art] Extend RT PCRs Done
3,109,246 UART: [art] Lock RT PCRs Done
3,110,792 UART: [art] Populate DV Done
3,119,079 UART: [fht] FMC Alias Private Key: 7
3,120,047 UART: [art] Derive CDI
3,120,327 UART: [art] Store in in slot 0x4
3,205,470 UART: [art] Derive Key Pair
3,205,830 UART: [art] Store priv key in slot 0x5
3,218,602 UART: [art] Derive Key Pair - Done
3,233,374 UART: [art] Signing Cert with AUTHO
3,233,854 UART: RITY.KEYID = 7
3,249,324 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,089 UART: [art] PUB.X = 0CCA85267DAE038E9CEE97BCFD1E663B1CD7D868EEF9BAA6EC437AAAE770D68BB18033B8522A04CA1138513F51865A17
3,256,868 UART: [art] PUB.Y = 44D9719B4FE374C8BA115DCC5F00932FEF8AA50C484D6517D79FB3A7F8A4C9B584762612EBD4F62AF6D667B1FCEF8261
3,263,807 UART: [art] SIG.R = 94D89069C2DCFC0478019802F0A7A7AC10CF7E6FDA798C5A0E84882A6C011C33CB3813CB4480E24188886C5974C4AE21
3,270,564 UART: [art] SIG.S = FC959111649217A4F380FF6F1741D73C1CCAF775A72025E2D9DA18A649095F81C273384BC9C1712EEE20E054FC78907A
3,294,956 UART: Caliptra RT
3,295,209 UART: [state] CFI Enabled
3,403,257 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,707 UART: [rt]cmd =0x46505652, len=4
3,434,367 UART: [rt] FIPS Version
3,435,566 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,320 UART: [kat] SHA2-256
882,251 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,366 UART: [kat] ++
886,518 UART: [kat] sha1
890,690 UART: [kat] SHA2-256
892,628 UART: [kat] SHA2-384
895,433 UART: [kat] SHA2-512-ACC
897,334 UART: [kat] ECC-384
903,263 UART: [kat] HMAC-384Kdf
907,817 UART: [kat] LMS
1,476,013 UART: [kat] --
1,476,918 UART: [cold-reset] ++
1,477,382 UART: [fht] Storing FHT @ 0x50003400
1,480,163 UART: [idev] ++
1,480,331 UART: [idev] CDI.KEYID = 6
1,480,691 UART: [idev] SUBJECT.KEYID = 7
1,481,115 UART: [idev] UDS.KEYID = 0
1,481,460 ready_for_fw is high
1,481,460 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,199 UART: [idev] Erasing UDS.KEYID = 0
1,505,911 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,563 UART: [idev] --
1,515,626 UART: [ldev] ++
1,515,794 UART: [ldev] CDI.KEYID = 6
1,516,157 UART: [ldev] SUBJECT.KEYID = 5
1,516,583 UART: [ldev] AUTHORITY.KEYID = 7
1,517,046 UART: [ldev] FE.KEYID = 1
1,522,470 UART: [ldev] Erasing FE.KEYID = 1
1,547,677 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,307 UART: [ldev] --
1,586,624 UART: [fwproc] Waiting for Commands...
1,587,353 UART: [fwproc] Received command 0x46574c44
1,588,144 UART: [fwproc] Received Image of size 114332 bytes
2,885,644 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,856 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,208 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,113 >>> mbox cmd response: success
3,079,113 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,080,237 UART: [afmc] ++
3,080,405 UART: [afmc] CDI.KEYID = 6
3,080,767 UART: [afmc] SUBJECT.KEYID = 7
3,081,192 UART: [afmc] AUTHORITY.KEYID = 5
3,116,159 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,265 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,045 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,773 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,658 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,348 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,313 UART: [afmc] --
3,159,443 UART: [cold-reset] --
3,160,261 UART: [state] Locking Datavault
3,161,580 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,184 UART: [state] Locking ICCM
3,162,758 UART: [exit] Launching FMC @ 0x40000130
3,168,087 UART:
3,168,103 UART: Running Caliptra FMC ...
3,168,511 UART:
3,168,654 UART: [state] CFI Enabled
3,179,265 UART: [fht] FMC Alias Private Key: 7
3,287,202 UART: [art] Extend RT PCRs Done
3,287,630 UART: [art] Lock RT PCRs Done
3,289,112 UART: [art] Populate DV Done
3,297,401 UART: [fht] FMC Alias Private Key: 7
3,298,407 UART: [art] Derive CDI
3,298,687 UART: [art] Store in in slot 0x4
3,384,474 UART: [art] Derive Key Pair
3,384,834 UART: [art] Store priv key in slot 0x5
3,397,638 UART: [art] Derive Key Pair - Done
3,412,270 UART: [art] Signing Cert with AUTHO
3,412,750 UART: RITY.KEYID = 7
3,428,090 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,855 UART: [art] PUB.X = 881C74D682C0EA766330FF7D801E0DF3738BC055D0877B26E61F2DCF223C72D2D83A9B129348E865E984088232806CB6
3,435,615 UART: [art] PUB.Y = 32DAA255F5110EEEC2618D3A2D9F202943B507C73A0C08901DB9E9D39CAB5B7C1E9C9AD17690068ADE238F9A722E956D
3,442,560 UART: [art] SIG.R = D83909E368D6208EB4AFFA6AA8E61AF758A8012D8080EEE97F4F949FFE63032B8091978A8A670191C64581BB861FC99C
3,449,322 UART: [art] SIG.S = 6AD1BCCD4EDCA597F11B18282C3779FE89266C9C121E98CF34B40424AFA6C5A22882E2629412AB156CE351B8510832C7
3,473,149 UART: Caliptra RT
3,473,494 UART: [state] CFI Enabled
3,582,555 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,893 UART: [rt]cmd =0x46505652, len=4
3,613,553 UART: [rt] FIPS Version
3,614,534 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,422 ready_for_fw is high
1,363,422 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,627 >>> mbox cmd response: success
2,927,627 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,989,745 UART:
2,989,761 UART: Running Caliptra FMC ...
2,990,169 UART:
2,990,312 UART: [state] CFI Enabled
3,000,929 UART: [fht] FMC Alias Private Key: 7
3,108,898 UART: [art] Extend RT PCRs Done
3,109,326 UART: [art] Lock RT PCRs Done
3,110,916 UART: [art] Populate DV Done
3,119,399 UART: [fht] FMC Alias Private Key: 7
3,120,497 UART: [art] Derive CDI
3,120,777 UART: [art] Store in in slot 0x4
3,206,762 UART: [art] Derive Key Pair
3,207,122 UART: [art] Store priv key in slot 0x5
3,220,238 UART: [art] Derive Key Pair - Done
3,234,759 UART: [art] Signing Cert with AUTHO
3,235,239 UART: RITY.KEYID = 7
3,250,449 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,214 UART: [art] PUB.X = 087A10CBAED1BAA43F8E22809FD7E1ED6099B9CA004BA3D6E157515C3FFB85052CCA1A68B4ADFCABB491C08C1CADC552
3,257,984 UART: [art] PUB.Y = 37A99BB2B1BA613FE0C08DD22434B02D19B685DA487FC5C9265F7FBF5B516BEB4F7B4E7709FBA27AAC29C8389F0A9DEB
3,264,950 UART: [art] SIG.R = 2CB61AB5B2A9DF28E9A2EC3BC1150E5D6286C3E99FD121723C431F34548E73915E223F8F32E1F9E564AE2FD98BBE1315
3,271,727 UART: [art] SIG.S = 9251906370F037F77488EC61DAD0524E6259D42F779A2AF1C5CC74D70BC9A2E581001DDC5D265D9C98CF26EB9988CC10
3,295,201 UART: Caliptra RT
3,295,546 UART: [state] CFI Enabled
3,405,211 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,621 UART: [rt]cmd =0x46505652, len=4
3,436,281 UART: [rt] FIPS Version
3,437,356 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,408 UART: [kat] SHA2-256
893,058 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,183 UART: [kat] ++
897,335 UART: [kat] sha1
901,617 UART: [kat] SHA2-256
903,557 UART: [kat] SHA2-384
906,172 UART: [kat] SHA2-512-ACC
908,073 UART: [kat] ECC-384
917,618 UART: [kat] HMAC-384Kdf
922,012 UART: [kat] LMS
1,170,340 UART: [kat] --
1,171,019 UART: [cold-reset] ++
1,171,367 UART: [fht] FHT @ 0x50003400
1,173,984 UART: [idev] ++
1,174,152 UART: [idev] CDI.KEYID = 6
1,174,512 UART: [idev] SUBJECT.KEYID = 7
1,174,936 UART: [idev] UDS.KEYID = 0
1,175,281 ready_for_fw is high
1,175,281 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,846 UART: [idev] Erasing UDS.KEYID = 0
1,200,093 UART: [idev] Sha1 KeyId Algorithm
1,208,497 UART: [idev] --
1,209,317 UART: [ldev] ++
1,209,485 UART: [ldev] CDI.KEYID = 6
1,209,848 UART: [ldev] SUBJECT.KEYID = 5
1,210,274 UART: [ldev] AUTHORITY.KEYID = 7
1,210,737 UART: [ldev] FE.KEYID = 1
1,215,685 UART: [ldev] Erasing FE.KEYID = 1
1,241,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,803 UART: [ldev] --
1,281,280 UART: [fwproc] Wait for Commands...
1,282,062 UART: [fwproc] Recv command 0x46574c44
1,282,790 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,909 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,582 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,886 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,591 >>> mbox cmd response: success
2,773,591 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,774,671 UART: [afmc] ++
2,774,839 UART: [afmc] CDI.KEYID = 6
2,775,201 UART: [afmc] SUBJECT.KEYID = 7
2,775,626 UART: [afmc] AUTHORITY.KEYID = 5
2,810,843 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,694 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,422 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,307 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,026 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,788 UART: [afmc] --
2,853,718 UART: [cold-reset] --
2,854,614 UART: [state] Locking Datavault
2,855,825 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,429 UART: [state] Locking ICCM
2,856,981 UART: [exit] Launching FMC @ 0x40000130
2,862,310 UART:
2,862,326 UART: Running Caliptra FMC ...
2,862,734 UART:
2,862,788 UART: [state] CFI Enabled
2,873,447 UART: [fht] FMC Alias Private Key: 7
2,981,228 UART: [art] Extend RT PCRs Done
2,981,656 UART: [art] Lock RT PCRs Done
2,983,242 UART: [art] Populate DV Done
2,991,193 UART: [fht] FMC Alias Private Key: 7
2,992,245 UART: [art] Derive CDI
2,992,525 UART: [art] Store in in slot 0x4
3,077,828 UART: [art] Derive Key Pair
3,078,188 UART: [art] Store priv key in slot 0x5
3,091,994 UART: [art] Derive Key Pair - Done
3,106,855 UART: [art] Signing Cert with AUTHO
3,107,335 UART: RITY.KEYID = 7
3,122,971 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,736 UART: [art] PUB.X = 17891258472A3174667F4E5A6B7432DEFD99CEE5FE6166BC624554A56B4E96D7A00D85AF70C5EBC63A95102ACAD05824
3,130,507 UART: [art] PUB.Y = 756656430F02BD77003082561E0D951D210B98650607557DC40FDFD85509A94F06406246021009B01233B842E50609E9
3,137,372 UART: [art] SIG.R = 6CD29D7B9DC87D255A669C7C6A403AADCCD934A9418967AE420082DA627802470AF6C6DC2A8D4662714E720F3DA7B9C8
3,144,119 UART: [art] SIG.S = ACC61C3A494218DA7D75CFACF38F8E7F7C839717F570B3F5322AFA8DA731FF386EF4B1D8B4F96155CDF138234A713DC4
3,168,148 UART: Caliptra RT
3,168,401 UART: [state] CFI Enabled
3,275,398 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,718 UART: [rt]cmd =0x46505652, len=4
3,306,378 UART: [rt] FIPS Version
3,307,509 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,521 ready_for_fw is high
1,060,521 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,820 >>> mbox cmd response: success
2,627,820 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,520 UART:
2,689,536 UART: Running Caliptra FMC ...
2,689,944 UART:
2,689,998 UART: [state] CFI Enabled
2,700,617 UART: [fht] FMC Alias Private Key: 7
2,808,682 UART: [art] Extend RT PCRs Done
2,809,110 UART: [art] Lock RT PCRs Done
2,810,626 UART: [art] Populate DV Done
2,818,977 UART: [fht] FMC Alias Private Key: 7
2,819,977 UART: [art] Derive CDI
2,820,257 UART: [art] Store in in slot 0x4
2,906,008 UART: [art] Derive Key Pair
2,906,368 UART: [art] Store priv key in slot 0x5
2,919,100 UART: [art] Derive Key Pair - Done
2,933,954 UART: [art] Signing Cert with AUTHO
2,934,434 UART: RITY.KEYID = 7
2,949,724 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,489 UART: [art] PUB.X = AE6651CBE11F67397A86BFA160D6D83761EDF34634E46EC483A81A473B1918EAD164DA9585A8BC97D5BFD2AD1BF26BC6
2,957,275 UART: [art] PUB.Y = C2AB33517D28F315C0E8322A03EDE863C0B16AEF655FDE22987409B3FC4BBD23F949AC3A799E7E81EA04D16A5CFEC356
2,964,232 UART: [art] SIG.R = 4109B6953245E095E87DF8D79718DF57C4C2CA557CDCB6C8346D16CD3BC06E9E25614DC9819F47D57D6E0C6372DB65D3
2,971,002 UART: [art] SIG.S = 6703A437EB06E39CDCFE674B8A973457DF5D0F953926AF2FBFB93B4BF739FD67E8B91E314EBAD0A3064B2AA87BF50B63
2,994,860 UART: Caliptra RT
2,995,113 UART: [state] CFI Enabled
3,102,810 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,374 UART: [rt]cmd =0x46505652, len=4
3,134,034 UART: [rt] FIPS Version
3,135,083 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,926 UART: [state] WD Timer not started. Device not locked for debugging
88,233 UART: [kat] SHA2-256
893,883 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,008 UART: [kat] ++
898,160 UART: [kat] sha1
902,164 UART: [kat] SHA2-256
904,104 UART: [kat] SHA2-384
906,935 UART: [kat] SHA2-512-ACC
908,836 UART: [kat] ECC-384
918,501 UART: [kat] HMAC-384Kdf
923,335 UART: [kat] LMS
1,171,663 UART: [kat] --
1,172,436 UART: [cold-reset] ++
1,172,956 UART: [fht] FHT @ 0x50003400
1,175,629 UART: [idev] ++
1,175,797 UART: [idev] CDI.KEYID = 6
1,176,157 UART: [idev] SUBJECT.KEYID = 7
1,176,581 UART: [idev] UDS.KEYID = 0
1,176,926 ready_for_fw is high
1,176,926 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,495 UART: [idev] Erasing UDS.KEYID = 0
1,201,256 UART: [idev] Sha1 KeyId Algorithm
1,209,730 UART: [idev] --
1,210,828 UART: [ldev] ++
1,210,996 UART: [ldev] CDI.KEYID = 6
1,211,359 UART: [ldev] SUBJECT.KEYID = 5
1,211,785 UART: [ldev] AUTHORITY.KEYID = 7
1,212,248 UART: [ldev] FE.KEYID = 1
1,217,662 UART: [ldev] Erasing FE.KEYID = 1
1,243,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,744 UART: [ldev] --
1,282,255 UART: [fwproc] Wait for Commands...
1,282,991 UART: [fwproc] Recv command 0x46574c44
1,283,719 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,968 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,497 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,801 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,690 >>> mbox cmd response: success
2,773,690 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,774,878 UART: [afmc] ++
2,775,046 UART: [afmc] CDI.KEYID = 6
2,775,408 UART: [afmc] SUBJECT.KEYID = 7
2,775,833 UART: [afmc] AUTHORITY.KEYID = 5
2,811,066 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,387 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,135 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,863 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,748 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,467 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,093 UART: [afmc] --
2,853,999 UART: [cold-reset] --
2,854,997 UART: [state] Locking Datavault
2,856,016 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,620 UART: [state] Locking ICCM
2,857,192 UART: [exit] Launching FMC @ 0x40000130
2,862,521 UART:
2,862,537 UART: Running Caliptra FMC ...
2,862,945 UART:
2,863,088 UART: [state] CFI Enabled
2,873,447 UART: [fht] FMC Alias Private Key: 7
2,981,150 UART: [art] Extend RT PCRs Done
2,981,578 UART: [art] Lock RT PCRs Done
2,983,472 UART: [art] Populate DV Done
2,991,475 UART: [fht] FMC Alias Private Key: 7
2,992,473 UART: [art] Derive CDI
2,992,753 UART: [art] Store in in slot 0x4
3,078,460 UART: [art] Derive Key Pair
3,078,820 UART: [art] Store priv key in slot 0x5
3,092,022 UART: [art] Derive Key Pair - Done
3,106,731 UART: [art] Signing Cert with AUTHO
3,107,211 UART: RITY.KEYID = 7
3,122,745 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,510 UART: [art] PUB.X = D67BBB303078E5AB7137F70FBA4FFFC3FF58298865C252FB7A32317450998712868824F43A4934DADB55F433B7CDFBD4
3,130,283 UART: [art] PUB.Y = FF67F5D9E221DFACEC8A562B8E533419C501174D67CCB8269881C90FC784414E606E0FA05791E6660BE5D842DDDCBF84
3,137,231 UART: [art] SIG.R = E9E0E96702412804886375B6D2BC7B877D5EB45317CF953FD896E418213B0A487BF2E6AE737B408E16AF58597E489EA7
3,143,990 UART: [art] SIG.S = 0C9C0BCB88676A8EC0658C918C269D50CC9E55BF50CD3793E4E181E56F77A22E19842D6F3C5C696BF62F0AE7C36F6A80
3,167,312 UART: Caliptra RT
3,167,657 UART: [state] CFI Enabled
3,274,864 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,482 UART: [rt]cmd =0x46505652, len=4
3,306,142 UART: [rt] FIPS Version
3,307,309 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,430 ready_for_fw is high
1,060,430 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,626,709 >>> mbox cmd response: success
2,626,709 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,688,187 UART:
2,688,203 UART: Running Caliptra FMC ...
2,688,611 UART:
2,688,754 UART: [state] CFI Enabled
2,699,077 UART: [fht] FMC Alias Private Key: 7
2,806,958 UART: [art] Extend RT PCRs Done
2,807,386 UART: [art] Lock RT PCRs Done
2,809,204 UART: [art] Populate DV Done
2,817,303 UART: [fht] FMC Alias Private Key: 7
2,818,251 UART: [art] Derive CDI
2,818,531 UART: [art] Store in in slot 0x4
2,904,446 UART: [art] Derive Key Pair
2,904,806 UART: [art] Store priv key in slot 0x5
2,918,420 UART: [art] Derive Key Pair - Done
2,933,357 UART: [art] Signing Cert with AUTHO
2,933,837 UART: RITY.KEYID = 7
2,949,063 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,828 UART: [art] PUB.X = 107983AD1A6E7824EF59DA5B73EB81BC24D38A76486F4CD6C02399C458F5425ADB00F61EE822C9C893E0B20136B5D3D5
2,956,579 UART: [art] PUB.Y = C1B4D315EAEF800E6BA865BA08C6B21DE4668409B7F95B36982B555EB7F72F6951283E9969B0B513FE543CF28397A83E
2,963,524 UART: [art] SIG.R = E843567A41964F67B47ECF7A6042DD2974D166825F692F7FF78DA273E65B4A832977A4DA54CD50D32A4DCB97DEF4C5E8
2,970,302 UART: [art] SIG.S = AA99CF47189A3673657C38E07D16331F1A18D6008C6D3800FD30B37652BE6AB7868916584D3F2103605991CAF18D26FF
2,993,534 UART: Caliptra RT
2,993,879 UART: [state] CFI Enabled
3,102,207 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,651 UART: [rt]cmd =0x46505652, len=4
3,133,311 UART: [rt] FIPS Version
3,134,402 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
891,260 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,389 UART: [kat] ++
895,541 UART: [kat] sha1
899,637 UART: [kat] SHA2-256
901,577 UART: [kat] SHA2-384
904,182 UART: [kat] SHA2-512-ACC
906,083 UART: [kat] ECC-384
915,752 UART: [kat] HMAC-384Kdf
920,322 UART: [kat] LMS
1,168,634 UART: [kat] --
1,169,633 UART: [cold-reset] ++
1,170,029 UART: [fht] FHT @ 0x50003400
1,172,637 UART: [idev] ++
1,172,805 UART: [idev] CDI.KEYID = 6
1,173,166 UART: [idev] SUBJECT.KEYID = 7
1,173,591 UART: [idev] UDS.KEYID = 0
1,173,937 ready_for_fw is high
1,173,937 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,727 UART: [idev] Erasing UDS.KEYID = 0
1,198,345 UART: [idev] Sha1 KeyId Algorithm
1,207,133 UART: [idev] --
1,208,182 UART: [ldev] ++
1,208,350 UART: [ldev] CDI.KEYID = 6
1,208,714 UART: [ldev] SUBJECT.KEYID = 5
1,209,141 UART: [ldev] AUTHORITY.KEYID = 7
1,209,604 UART: [ldev] FE.KEYID = 1
1,214,774 UART: [ldev] Erasing FE.KEYID = 1
1,240,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,084 UART: [ldev] --
1,279,592 UART: [fwproc] Wait for Commands...
1,280,339 UART: [fwproc] Recv command 0x46574c44
1,281,072 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,088 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,397 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,165 >>> mbox cmd response: success
2,770,165 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,771,220 UART: [afmc] ++
2,771,388 UART: [afmc] CDI.KEYID = 6
2,771,751 UART: [afmc] SUBJECT.KEYID = 7
2,772,177 UART: [afmc] AUTHORITY.KEYID = 5
2,808,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,129 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,858 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,741 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,460 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,269 UART: [afmc] --
2,851,177 UART: [cold-reset] --
2,852,147 UART: [state] Locking Datavault
2,853,216 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,820 UART: [state] Locking ICCM
2,854,444 UART: [exit] Launching FMC @ 0x40000130
2,859,773 UART:
2,859,789 UART: Running Caliptra FMC ...
2,860,197 UART:
2,860,251 UART: [state] CFI Enabled
2,870,704 UART: [fht] FMC Alias Private Key: 7
2,978,803 UART: [art] Extend RT PCRs Done
2,979,231 UART: [art] Lock RT PCRs Done
2,980,629 UART: [art] Populate DV Done
2,988,988 UART: [fht] FMC Alias Private Key: 7
2,989,922 UART: [art] Derive CDI
2,990,202 UART: [art] Store in in slot 0x4
3,075,875 UART: [art] Derive Key Pair
3,076,235 UART: [art] Store priv key in slot 0x5
3,089,073 UART: [art] Derive Key Pair - Done
3,103,901 UART: [art] Signing Cert with AUTHO
3,104,381 UART: RITY.KEYID = 7
3,119,837 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,602 UART: [art] PUB.X = 969BE70878D6B17EE1A9A1B7014B9DCE04992AEFC6408ECD4EF074C845874C45D3669420B1057E0D30A248E03D723E42
3,127,359 UART: [art] PUB.Y = 123134E0861C873508ED17F3B82BDC905EAFEC7E964275900AA8B67A8A440DFFEC238CEE6BB0C7109937EACAAA0BE992
3,134,313 UART: [art] SIG.R = EDF691D424C50C3DDB4A4A806D78A850D0EF614D618D9E8B5F3A961F3BB801D3CE2FE6A5DF24BC34B63B834E673DA0F5
3,141,097 UART: [art] SIG.S = FFC86777E23EAA58BA3258C373C9D9E77FF96CEF32E780338D8A02F49BAB98B33F8EEA87C636E3861B136D0205BF8A58
3,164,091 UART: Caliptra RT
3,164,344 UART: [state] CFI Enabled
3,272,432 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,620 UART: [rt]cmd =0x46505652, len=4
3,303,280 UART: [rt] FIPS Version
3,304,333 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,478 ready_for_fw is high
1,056,478 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,385 >>> mbox cmd response: success
2,623,385 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,686,617 UART:
2,686,633 UART: Running Caliptra FMC ...
2,687,041 UART:
2,687,095 UART: [state] CFI Enabled
2,697,582 UART: [fht] FMC Alias Private Key: 7
2,805,341 UART: [art] Extend RT PCRs Done
2,805,769 UART: [art] Lock RT PCRs Done
2,807,027 UART: [art] Populate DV Done
2,815,362 UART: [fht] FMC Alias Private Key: 7
2,816,538 UART: [art] Derive CDI
2,816,818 UART: [art] Store in in slot 0x4
2,902,103 UART: [art] Derive Key Pair
2,902,463 UART: [art] Store priv key in slot 0x5
2,915,209 UART: [art] Derive Key Pair - Done
2,929,962 UART: [art] Signing Cert with AUTHO
2,930,442 UART: RITY.KEYID = 7
2,945,648 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,413 UART: [art] PUB.X = 159CD63D708BA1DF55CE23572FEDD64C84AC636F20D7924E5B391AFD155C31B28069EBF0396EBDC99FF57FAD8903A36B
2,953,196 UART: [art] PUB.Y = BFF3C6CA5C60E0094694208798DFDC3CC95E490348E5D3D7902F34E2FCD81F7EF0FE64163F1087E97F11221A95556C0C
2,960,143 UART: [art] SIG.R = 9F55CA1BECD9B0474B8FB9E44756415BD59BCE2414D6D2ECE47DD24EAD96706B8C859D67FD039A78684F36B2C7D6C91B
2,966,926 UART: [art] SIG.S = 4A3324BA6B44A039AE48ADE0520E105FE92F363C0865621F12CA6A34E71656DC9405B291D6B562DFE6DD8C217E6D44B4
2,991,398 UART: Caliptra RT
2,991,651 UART: [state] CFI Enabled
3,098,980 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,270 UART: [rt]cmd =0x46505652, len=4
3,129,930 UART: [rt] FIPS Version
3,131,083 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,893 UART: [state] LifecycleState = Unprovisioned
86,548 UART: [state] DebugLocked = No
87,174 UART: [state] WD Timer not started. Device not locked for debugging
88,413 UART: [kat] SHA2-256
891,963 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,092 UART: [kat] ++
896,244 UART: [kat] sha1
900,686 UART: [kat] SHA2-256
902,626 UART: [kat] SHA2-384
905,307 UART: [kat] SHA2-512-ACC
907,208 UART: [kat] ECC-384
917,161 UART: [kat] HMAC-384Kdf
921,743 UART: [kat] LMS
1,170,055 UART: [kat] --
1,170,882 UART: [cold-reset] ++
1,171,234 UART: [fht] FHT @ 0x50003400
1,173,928 UART: [idev] ++
1,174,096 UART: [idev] CDI.KEYID = 6
1,174,457 UART: [idev] SUBJECT.KEYID = 7
1,174,882 UART: [idev] UDS.KEYID = 0
1,175,228 ready_for_fw is high
1,175,228 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,786 UART: [idev] Erasing UDS.KEYID = 0
1,200,086 UART: [idev] Sha1 KeyId Algorithm
1,208,938 UART: [idev] --
1,209,925 UART: [ldev] ++
1,210,093 UART: [ldev] CDI.KEYID = 6
1,210,457 UART: [ldev] SUBJECT.KEYID = 5
1,210,884 UART: [ldev] AUTHORITY.KEYID = 7
1,211,347 UART: [ldev] FE.KEYID = 1
1,216,687 UART: [ldev] Erasing FE.KEYID = 1
1,243,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,059 UART: [ldev] --
1,282,507 UART: [fwproc] Wait for Commands...
1,283,282 UART: [fwproc] Recv command 0x46574c44
1,284,015 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,707 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,016 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,824 >>> mbox cmd response: success
2,772,824 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,773,987 UART: [afmc] ++
2,774,155 UART: [afmc] CDI.KEYID = 6
2,774,518 UART: [afmc] SUBJECT.KEYID = 7
2,774,944 UART: [afmc] AUTHORITY.KEYID = 5
2,810,797 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,429 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,180 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,909 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,792 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,511 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,332 UART: [afmc] --
2,854,448 UART: [cold-reset] --
2,855,426 UART: [state] Locking Datavault
2,856,529 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,133 UART: [state] Locking ICCM
2,857,729 UART: [exit] Launching FMC @ 0x40000130
2,863,058 UART:
2,863,074 UART: Running Caliptra FMC ...
2,863,482 UART:
2,863,625 UART: [state] CFI Enabled
2,874,262 UART: [fht] FMC Alias Private Key: 7
2,982,865 UART: [art] Extend RT PCRs Done
2,983,293 UART: [art] Lock RT PCRs Done
2,984,663 UART: [art] Populate DV Done
2,993,142 UART: [fht] FMC Alias Private Key: 7
2,994,280 UART: [art] Derive CDI
2,994,560 UART: [art] Store in in slot 0x4
3,080,153 UART: [art] Derive Key Pair
3,080,513 UART: [art] Store priv key in slot 0x5
3,093,931 UART: [art] Derive Key Pair - Done
3,108,894 UART: [art] Signing Cert with AUTHO
3,109,374 UART: RITY.KEYID = 7
3,124,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,299 UART: [art] PUB.X = 638B740F32C3A440A273EA3F3447A9D1B669B413827A2196C328532E92C2CD2595CAE6B75D3EF2DE1BE3DFF8EFAC0F1A
3,132,077 UART: [art] PUB.Y = 44ADE579F9D9E27C423A660F109A25CA090D3BCB0052E6B290B71BCB228E1DCE5A3F178439FFF9050B35843CDF1113A5
3,139,000 UART: [art] SIG.R = D7BEAE6E600F5822E3F5BF4846E7383ADDA5DCC574E76A986943B1D2D01B83A0D001DBDEEC7CBF492C8D1E9004401A5F
3,145,781 UART: [art] SIG.S = FB8F0DD81A1642218E631AFB08305F9A9D13FA3B1E2B3539135366298BE9647530128E804AFE59FA213912905181D134
3,169,864 UART: Caliptra RT
3,170,209 UART: [state] CFI Enabled
3,278,491 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,701 UART: [rt]cmd =0x46505652, len=4
3,309,361 UART: [rt] FIPS Version
3,310,504 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,651 ready_for_fw is high
1,056,651 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,796 >>> mbox cmd response: success
2,625,796 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,688,004 UART:
2,688,020 UART: Running Caliptra FMC ...
2,688,428 UART:
2,688,571 UART: [state] CFI Enabled
2,699,420 UART: [fht] FMC Alias Private Key: 7
2,807,969 UART: [art] Extend RT PCRs Done
2,808,397 UART: [art] Lock RT PCRs Done
2,809,797 UART: [art] Populate DV Done
2,818,114 UART: [fht] FMC Alias Private Key: 7
2,819,078 UART: [art] Derive CDI
2,819,358 UART: [art] Store in in slot 0x4
2,904,889 UART: [art] Derive Key Pair
2,905,249 UART: [art] Store priv key in slot 0x5
2,918,281 UART: [art] Derive Key Pair - Done
2,932,771 UART: [art] Signing Cert with AUTHO
2,933,251 UART: RITY.KEYID = 7
2,948,255 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,020 UART: [art] PUB.X = 845DA5C632A454FF4AE224F86B06BABABF11D38221FBAA4033A2317B9C1352F73F7344E847C97DB6813CF0901EA0024E
2,955,792 UART: [art] PUB.Y = 7AE5ABBDE8249FDBC15707CA931D33200FE471884C42E043AB2E6AB9AA09452ADB05FD47915345ADD3FC7BA8CE0B5BBA
2,962,751 UART: [art] SIG.R = 3C8E0E694A848F93354628B4F5BF158B5D758D8772D5E818D8531275E57C63770246ACDA253C5D5D0AC4BA8F2C3D74A2
2,969,514 UART: [art] SIG.S = 8D0BDD4DFB87B385C16539EA2EACF1B3DB818430805D27365D0C5E22CB1F9B9796C44F8CA86B50AE997F87916DB82465
2,992,921 UART: Caliptra RT
2,993,266 UART: [state] CFI Enabled
3,101,395 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,679 UART: [rt]cmd =0x46505652, len=4
3,132,339 UART: [rt] FIPS Version
3,133,342 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,297 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,985 UART: [kat] SHA2-256
881,916 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,031 UART: [kat] ++
886,183 UART: [kat] sha1
890,539 UART: [kat] SHA2-256
892,477 UART: [kat] SHA2-384
895,332 UART: [kat] SHA2-512-ACC
897,233 UART: [kat] ECC-384
902,668 UART: [kat] HMAC-384Kdf
907,160 UART: [kat] LMS
1,475,356 UART: [kat] --
1,476,435 UART: [cold-reset] ++
1,476,789 UART: [fht] Storing FHT @ 0x50003400
1,479,604 UART: [idev] ++
1,479,772 UART: [idev] CDI.KEYID = 6
1,480,132 UART: [idev] SUBJECT.KEYID = 7
1,480,556 UART: [idev] UDS.KEYID = 0
1,480,901 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,936 UART: [idev] Erasing UDS.KEYID = 0
1,505,240 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,896 UART: [idev] --
1,514,913 UART: [ldev] ++
1,515,081 UART: [ldev] CDI.KEYID = 6
1,515,444 UART: [ldev] SUBJECT.KEYID = 5
1,515,870 UART: [ldev] AUTHORITY.KEYID = 7
1,516,333 UART: [ldev] FE.KEYID = 1
1,521,515 UART: [ldev] Erasing FE.KEYID = 1
1,547,028 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,970 UART: [ldev] --
1,586,279 UART: [fwproc] Waiting for Commands...
1,587,116 UART: [fwproc] Received command 0x46505652
1,587,998 UART: [rt] FIPS Version
1,588,551 >>> mbox cmd response data (36 bytes)
1,588,552 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,588,728 UART: [fwproc] Received command 0x46504c54
1,589,635 UART: [kat] SHA2-256
2,383,566 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,387,681 UART: [kat] ++
2,387,833 UART: [kat] sha1
2,391,943 UART: [kat] SHA2-256
2,393,881 UART: [kat] SHA2-384
2,396,462 UART: [kat] SHA2-512-ACC
2,398,362 UART: [kat] ECC-384
2,403,943 UART: [kat] HMAC-384Kdf
2,408,697 UART: [kat] LMS
2,976,893 UART: [kat] --
2,977,131 >>> mbox cmd response data (8 bytes)
2,977,132 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,977,364 UART: [fwproc] Received command 0x46504c67
2,978,318 >>> mbox cmd response data (8 bytes)
2,978,319 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,978,627 UART: [fwproc] Received command 0x43415053
2,979,675 >>> mbox cmd response data (24 bytes)
2,979,676 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,979,784 UART: [fwproc] Received command 0x4d454153
2,983,848 >>> mbox cmd response data (12 bytes)
2,983,849 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,984,063 UART: [fwproc] Received command 0x46505344
2,985,011 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,127 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,152 >>> mbox cmd response data (36 bytes)
1,442,153 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,717,562 >>> mbox cmd response data (8 bytes)
2,717,563 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,718,001 >>> mbox cmd response data (8 bytes)
2,718,002 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,718,368 >>> mbox cmd response data (24 bytes)
2,718,369 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,721,865 >>> mbox cmd response data (12 bytes)
2,721,866 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,722,327 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,999 UART: [state] LifecycleState = Unprovisioned
85,654 UART: [state] DebugLocked = No
86,346 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,028 UART: [kat] SHA2-256
881,959 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,074 UART: [kat] ++
886,226 UART: [kat] sha1
890,476 UART: [kat] SHA2-256
892,414 UART: [kat] SHA2-384
895,211 UART: [kat] SHA2-512-ACC
897,112 UART: [kat] ECC-384
902,551 UART: [kat] HMAC-384Kdf
907,355 UART: [kat] LMS
1,475,551 UART: [kat] --
1,476,382 UART: [cold-reset] ++
1,476,712 UART: [fht] Storing FHT @ 0x50003400
1,479,557 UART: [idev] ++
1,479,725 UART: [idev] CDI.KEYID = 6
1,480,085 UART: [idev] SUBJECT.KEYID = 7
1,480,509 UART: [idev] UDS.KEYID = 0
1,480,854 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,527 UART: [idev] Erasing UDS.KEYID = 0
1,505,439 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,171 UART: [idev] --
1,515,256 UART: [ldev] ++
1,515,424 UART: [ldev] CDI.KEYID = 6
1,515,787 UART: [ldev] SUBJECT.KEYID = 5
1,516,213 UART: [ldev] AUTHORITY.KEYID = 7
1,516,676 UART: [ldev] FE.KEYID = 1
1,521,818 UART: [ldev] Erasing FE.KEYID = 1
1,547,759 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,189 UART: [ldev] --
1,586,660 UART: [fwproc] Waiting for Commands...
1,587,445 UART: [fwproc] Received command 0x46505652
1,588,327 UART: [rt] FIPS Version
1,588,880 >>> mbox cmd response data (36 bytes)
1,588,881 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,589,069 UART: [fwproc] Received command 0x46504c54
1,589,976 UART: [kat] SHA2-256
2,383,907 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,388,022 UART: [kat] ++
2,388,174 UART: [kat] sha1
2,392,422 UART: [kat] SHA2-256
2,394,360 UART: [kat] SHA2-384
2,397,005 UART: [kat] SHA2-512-ACC
2,398,905 UART: [kat] ECC-384
2,404,616 UART: [kat] HMAC-384Kdf
2,409,310 UART: [kat] LMS
2,977,506 UART: [kat] --
2,977,744 >>> mbox cmd response data (8 bytes)
2,977,745 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,977,961 UART: [fwproc] Received command 0x46504c67
2,978,915 >>> mbox cmd response data (8 bytes)
2,978,916 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,978,982 UART: [fwproc] Received command 0x43415053
2,980,030 >>> mbox cmd response data (24 bytes)
2,980,031 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,980,247 UART: [fwproc] Received command 0x4d454153
2,984,311 >>> mbox cmd response data (12 bytes)
2,984,312 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,984,430 UART: [fwproc] Received command 0x46505344
2,985,378 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,036 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,725 >>> mbox cmd response data (36 bytes)
1,442,726 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,718,053 >>> mbox cmd response data (8 bytes)
2,718,054 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,718,352 >>> mbox cmd response data (8 bytes)
2,718,353 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,718,767 >>> mbox cmd response data (24 bytes)
2,718,768 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,722,194 >>> mbox cmd response data (12 bytes)
2,722,195 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,722,534 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
893,470 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,595 UART: [kat] ++
897,747 UART: [kat] sha1
902,081 UART: [kat] SHA2-256
904,021 UART: [kat] SHA2-384
906,778 UART: [kat] SHA2-512-ACC
908,679 UART: [kat] ECC-384
918,236 UART: [kat] HMAC-384Kdf
922,844 UART: [kat] LMS
1,171,172 UART: [kat] --
1,172,283 UART: [cold-reset] ++
1,172,721 UART: [fht] FHT @ 0x50003400
1,175,354 UART: [idev] ++
1,175,522 UART: [idev] CDI.KEYID = 6
1,175,882 UART: [idev] SUBJECT.KEYID = 7
1,176,306 UART: [idev] UDS.KEYID = 0
1,176,651 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,848 UART: [idev] Erasing UDS.KEYID = 0
1,200,737 UART: [idev] Sha1 KeyId Algorithm
1,209,009 UART: [idev] --
1,210,029 UART: [ldev] ++
1,210,197 UART: [ldev] CDI.KEYID = 6
1,210,560 UART: [ldev] SUBJECT.KEYID = 5
1,210,986 UART: [ldev] AUTHORITY.KEYID = 7
1,211,449 UART: [ldev] FE.KEYID = 1
1,216,591 UART: [ldev] Erasing FE.KEYID = 1
1,242,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,445 UART: [ldev] --
1,281,752 UART: [fwproc] Wait for Commands...
1,282,464 UART: [fwproc] Recv command 0x46505652
1,283,285 UART: [rt] FIPS Version
1,283,839 >>> mbox cmd response data (36 bytes)
1,283,840 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,283,970 UART: [fwproc] Recv command 0x46504c54
1,284,816 UART: [kat] SHA2-256
2,090,466 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,094,591 UART: [kat] ++
2,094,743 UART: [kat] sha1
2,098,919 UART: [kat] SHA2-256
2,100,859 UART: [kat] SHA2-384
2,103,654 UART: [kat] SHA2-512-ACC
2,105,554 UART: [kat] ECC-384
2,115,131 UART: [kat] HMAC-384Kdf
2,119,805 UART: [kat] LMS
2,368,133 UART: [kat] --
2,368,371 >>> mbox cmd response data (8 bytes)
2,368,372 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,368,465 UART: [fwproc] Recv command 0x46504c67
2,369,358 >>> mbox cmd response data (8 bytes)
2,369,359 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,369,440 UART: [fwproc] Recv command 0x43415053
2,370,423 >>> mbox cmd response data (24 bytes)
2,370,424 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,370,617 UART: [fwproc] Recv command 0x4d454153
2,374,626 >>> mbox cmd response data (12 bytes)
2,374,627 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,374,864 UART: [fwproc] Recv command 0x46505344
2,375,751 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,247 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,138,927 >>> mbox cmd response data (36 bytes)
1,138,928 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,112,258 >>> mbox cmd response data (8 bytes)
2,112,259 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,112,539 >>> mbox cmd response data (8 bytes)
2,112,540 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,112,932 >>> mbox cmd response data (24 bytes)
2,112,933 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,116,391 >>> mbox cmd response data (12 bytes)
2,116,392 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,116,766 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
893,775 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,900 UART: [kat] ++
898,052 UART: [kat] sha1
902,514 UART: [kat] SHA2-256
904,454 UART: [kat] SHA2-384
907,169 UART: [kat] SHA2-512-ACC
909,070 UART: [kat] ECC-384
918,739 UART: [kat] HMAC-384Kdf
923,191 UART: [kat] LMS
1,171,519 UART: [kat] --
1,172,634 UART: [cold-reset] ++
1,172,980 UART: [fht] FHT @ 0x50003400
1,175,603 UART: [idev] ++
1,175,771 UART: [idev] CDI.KEYID = 6
1,176,131 UART: [idev] SUBJECT.KEYID = 7
1,176,555 UART: [idev] UDS.KEYID = 0
1,176,900 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,871 UART: [idev] Erasing UDS.KEYID = 0
1,202,164 UART: [idev] Sha1 KeyId Algorithm
1,210,590 UART: [idev] --
1,211,496 UART: [ldev] ++
1,211,664 UART: [ldev] CDI.KEYID = 6
1,212,027 UART: [ldev] SUBJECT.KEYID = 5
1,212,453 UART: [ldev] AUTHORITY.KEYID = 7
1,212,916 UART: [ldev] FE.KEYID = 1
1,218,254 UART: [ldev] Erasing FE.KEYID = 1
1,244,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,356 UART: [ldev] --
1,283,827 UART: [fwproc] Wait for Commands...
1,284,561 UART: [fwproc] Recv command 0x46505652
1,285,382 UART: [rt] FIPS Version
1,285,936 >>> mbox cmd response data (36 bytes)
1,285,937 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,286,033 UART: [fwproc] Recv command 0x46504c54
1,286,879 UART: [kat] SHA2-256
2,092,529 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,096,654 UART: [kat] ++
2,096,806 UART: [kat] sha1
2,100,904 UART: [kat] SHA2-256
2,102,844 UART: [kat] SHA2-384
2,105,721 UART: [kat] SHA2-512-ACC
2,107,621 UART: [kat] ECC-384
2,117,612 UART: [kat] HMAC-384Kdf
2,122,338 UART: [kat] LMS
2,370,666 UART: [kat] --
2,370,904 >>> mbox cmd response data (8 bytes)
2,370,905 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,371,020 UART: [fwproc] Recv command 0x46504c67
2,371,913 >>> mbox cmd response data (8 bytes)
2,371,914 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,372,191 UART: [fwproc] Recv command 0x43415053
2,373,174 >>> mbox cmd response data (24 bytes)
2,373,175 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,373,246 UART: [fwproc] Recv command 0x4d454153
2,377,255 >>> mbox cmd response data (12 bytes)
2,377,256 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,377,563 UART: [fwproc] Recv command 0x46505344
2,378,450 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,394 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,141,470 >>> mbox cmd response data (36 bytes)
1,141,471 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,114,489 >>> mbox cmd response data (8 bytes)
2,114,490 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,114,982 >>> mbox cmd response data (8 bytes)
2,114,983 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,115,435 >>> mbox cmd response data (24 bytes)
2,115,436 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,118,996 >>> mbox cmd response data (12 bytes)
2,118,997 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,119,389 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
891,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,431 UART: [kat] ++
895,583 UART: [kat] sha1
899,673 UART: [kat] SHA2-256
901,613 UART: [kat] SHA2-384
904,454 UART: [kat] SHA2-512-ACC
906,355 UART: [kat] ECC-384
916,234 UART: [kat] HMAC-384Kdf
920,638 UART: [kat] LMS
1,168,950 UART: [kat] --
1,169,677 UART: [cold-reset] ++
1,170,161 UART: [fht] FHT @ 0x50003400
1,172,731 UART: [idev] ++
1,172,899 UART: [idev] CDI.KEYID = 6
1,173,260 UART: [idev] SUBJECT.KEYID = 7
1,173,685 UART: [idev] UDS.KEYID = 0
1,174,031 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,851 UART: [idev] Erasing UDS.KEYID = 0
1,199,035 UART: [idev] Sha1 KeyId Algorithm
1,207,853 UART: [idev] --
1,208,792 UART: [ldev] ++
1,208,960 UART: [ldev] CDI.KEYID = 6
1,209,324 UART: [ldev] SUBJECT.KEYID = 5
1,209,751 UART: [ldev] AUTHORITY.KEYID = 7
1,210,214 UART: [ldev] FE.KEYID = 1
1,215,590 UART: [ldev] Erasing FE.KEYID = 1
1,241,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,640 UART: [ldev] --
1,281,152 UART: [fwproc] Wait for Commands...
1,281,971 UART: [fwproc] Recv command 0x46505652
1,282,798 UART: [rt] FIPS Version
1,283,359 >>> mbox cmd response data (36 bytes)
1,283,360 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,283,515 UART: [fwproc] Recv command 0x46504c54
1,284,369 UART: [kat] SHA2-256
2,087,919 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,092,048 UART: [kat] ++
2,092,200 UART: [kat] sha1
2,096,380 UART: [kat] SHA2-256
2,098,320 UART: [kat] SHA2-384
2,101,129 UART: [kat] SHA2-512-ACC
2,103,029 UART: [kat] ECC-384
2,112,410 UART: [kat] HMAC-384Kdf
2,116,836 UART: [kat] LMS
2,365,148 UART: [kat] --
2,365,389 >>> mbox cmd response data (8 bytes)
2,365,390 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,365,496 UART: [fwproc] Recv command 0x46504c67
2,366,400 >>> mbox cmd response data (8 bytes)
2,366,401 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,366,661 UART: [fwproc] Recv command 0x43415053
2,367,656 >>> mbox cmd response data (24 bytes)
2,367,657 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,367,948 UART: [fwproc] Recv command 0x4d454153
2,371,975 >>> mbox cmd response data (12 bytes)
2,371,976 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,372,205 UART: [fwproc] Recv command 0x46505344
2,373,108 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,482 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,606 >>> mbox cmd response data (36 bytes)
1,136,607 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,105,119 >>> mbox cmd response data (8 bytes)
2,105,120 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,105,584 >>> mbox cmd response data (8 bytes)
2,105,585 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,106,106 >>> mbox cmd response data (24 bytes)
2,106,107 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,109,529 >>> mbox cmd response data (12 bytes)
2,109,530 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,109,964 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,550 UART: [kat] ++
895,702 UART: [kat] sha1
899,916 UART: [kat] SHA2-256
901,856 UART: [kat] SHA2-384
904,709 UART: [kat] SHA2-512-ACC
906,610 UART: [kat] ECC-384
916,623 UART: [kat] HMAC-384Kdf
921,329 UART: [kat] LMS
1,169,641 UART: [kat] --
1,170,626 UART: [cold-reset] ++
1,171,130 UART: [fht] FHT @ 0x50003400
1,173,802 UART: [idev] ++
1,173,970 UART: [idev] CDI.KEYID = 6
1,174,331 UART: [idev] SUBJECT.KEYID = 7
1,174,756 UART: [idev] UDS.KEYID = 0
1,175,102 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,714 UART: [idev] Erasing UDS.KEYID = 0
1,199,736 UART: [idev] Sha1 KeyId Algorithm
1,208,664 UART: [idev] --
1,209,841 UART: [ldev] ++
1,210,009 UART: [ldev] CDI.KEYID = 6
1,210,373 UART: [ldev] SUBJECT.KEYID = 5
1,210,800 UART: [ldev] AUTHORITY.KEYID = 7
1,211,263 UART: [ldev] FE.KEYID = 1
1,216,679 UART: [ldev] Erasing FE.KEYID = 1
1,243,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,729 UART: [ldev] --
1,282,017 UART: [fwproc] Wait for Commands...
1,282,754 UART: [fwproc] Recv command 0x46505652
1,283,581 UART: [rt] FIPS Version
1,284,142 >>> mbox cmd response data (36 bytes)
1,284,143 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,284,386 UART: [fwproc] Recv command 0x46504c54
1,285,240 UART: [kat] SHA2-256
2,088,790 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,092,919 UART: [kat] ++
2,093,071 UART: [kat] sha1
2,097,325 UART: [kat] SHA2-256
2,099,265 UART: [kat] SHA2-384
2,101,876 UART: [kat] SHA2-512-ACC
2,103,776 UART: [kat] ECC-384
2,113,547 UART: [kat] HMAC-384Kdf
2,118,395 UART: [kat] LMS
2,366,707 UART: [kat] --
2,366,948 >>> mbox cmd response data (8 bytes)
2,366,949 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,367,099 UART: [fwproc] Recv command 0x46504c67
2,368,003 >>> mbox cmd response data (8 bytes)
2,368,004 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,368,104 UART: [fwproc] Recv command 0x43415053
2,369,099 >>> mbox cmd response data (24 bytes)
2,369,100 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,369,345 UART: [fwproc] Recv command 0x4d454153
2,373,372 >>> mbox cmd response data (12 bytes)
2,373,373 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,373,520 UART: [fwproc] Recv command 0x46505344
2,374,423 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,745 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,653 >>> mbox cmd response data (36 bytes)
1,137,654 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,106,062 >>> mbox cmd response data (8 bytes)
2,106,063 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,106,559 >>> mbox cmd response data (8 bytes)
2,106,560 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,106,913 >>> mbox cmd response data (24 bytes)
2,106,914 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,110,470 >>> mbox cmd response data (12 bytes)
2,110,471 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,110,837 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,460 UART: [state] LifecycleState = Unprovisioned
86,115 UART: [state] DebugLocked = No
86,803 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,343 UART: [kat] SHA2-256
882,274 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,389 UART: [kat] ++
886,541 UART: [kat] sha1
890,777 UART: [kat] SHA2-256
892,715 UART: [kat] SHA2-384
895,568 UART: [kat] SHA2-512-ACC
897,469 UART: [kat] ECC-384
903,046 UART: [kat] HMAC-384Kdf
907,632 UART: [kat] LMS
1,475,828 UART: [kat] --
1,476,859 UART: [cold-reset] ++
1,477,359 UART: [fht] Storing FHT @ 0x50003400
1,480,092 UART: [idev] ++
1,480,260 UART: [idev] CDI.KEYID = 6
1,480,620 UART: [idev] SUBJECT.KEYID = 7
1,481,044 UART: [idev] UDS.KEYID = 0
1,481,389 ready_for_fw is high
1,481,389 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,124 UART: [idev] Erasing UDS.KEYID = 0
1,505,928 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,672 UART: [idev] --
1,515,745 UART: [ldev] ++
1,515,913 UART: [ldev] CDI.KEYID = 6
1,516,276 UART: [ldev] SUBJECT.KEYID = 5
1,516,702 UART: [ldev] AUTHORITY.KEYID = 7
1,517,165 UART: [ldev] FE.KEYID = 1
1,522,129 UART: [ldev] Erasing FE.KEYID = 1
1,547,830 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,578 UART: [ldev] --
1,586,941 UART: [fwproc] Waiting for Commands...
1,587,710 UART: [fwproc] Received command 0x46574c44
1,588,501 UART: [fwproc] Received Image of size 114332 bytes
2,887,199 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,953 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,305 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,079,058 >>> mbox cmd response: success
3,079,058 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,080,296 UART: [afmc] ++
3,080,464 UART: [afmc] CDI.KEYID = 6
3,080,826 UART: [afmc] SUBJECT.KEYID = 7
3,081,251 UART: [afmc] AUTHORITY.KEYID = 5
3,116,538 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,934 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,714 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,442 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,327 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,017 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,006 UART: [afmc] --
3,160,044 UART: [cold-reset] --
3,160,756 UART: [state] Locking Datavault
3,161,847 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,451 UART: [state] Locking ICCM
3,163,091 UART: [exit] Launching FMC @ 0x40000130
3,168,420 UART:
3,168,436 UART: Running Caliptra FMC ...
3,168,844 UART:
3,168,898 UART: [state] CFI Enabled
3,179,275 UART: [fht] FMC Alias Private Key: 7
3,287,846 UART: [art] Extend RT PCRs Done
3,288,274 UART: [art] Lock RT PCRs Done
3,289,702 UART: [art] Populate DV Done
3,298,029 UART: [fht] FMC Alias Private Key: 7
3,299,021 UART: [art] Derive CDI
3,299,301 UART: [art] Store in in slot 0x4
3,384,800 UART: [art] Derive Key Pair
3,385,160 UART: [art] Store priv key in slot 0x5
3,398,346 UART: [art] Derive Key Pair - Done
3,413,204 UART: [art] Signing Cert with AUTHO
3,413,684 UART: RITY.KEYID = 7
3,429,240 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,005 UART: [art] PUB.X = 79844739CE84EB5D91BD4484ABB9D0360460B113A31C1A782388A6D6B33D3BD99D8CA9CBD04E82A120247A3D0DB46E65
3,436,775 UART: [art] PUB.Y = 236FCBE23A357FDEB5E93E6D7D9313A0403AC51ED2D1FD4D0929E19B1DE7E297531A1CC154E8D32CEBCFBA24B23EBA31
3,443,746 UART: [art] SIG.R = 3310463F2AE7CF786873D9F369EA4A7ABF5C7AEC9002A02389D12D020A0AE3D391E8C251F4A2D3938276C8078639EA9A
3,450,505 UART: [art] SIG.S = B9E8C12D2FB0F258747F65D0FF4673915F5E4BFDA3A50BDE8FC59065B5CB2CE6435CD42534BDE74AA95DD232231CFAB1
3,474,459 UART: Caliptra RT
3,474,712 UART: [state] CFI Enabled
3,582,867 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,223 UART: [rt]cmd =0x46505652, len=4
3,613,883 UART: [rt] FIPS Version
3,614,890 >>> mbox cmd response data (36 bytes)
3,614,891 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,998 UART: [rt]cmd =0x46504c54, len=4
3,645,026 >>> mbox cmd response data (8 bytes)
3,645,027 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,674,730 UART: [rt]cmd =0x46504c67, len=4
3,675,640 >>> mbox cmd response: failed
3,675,940 UART: [rt] FIPS self test
3,676,271 UART: [kat] ++
3,676,423 UART: [kat] sha1
3,680,618 UART: [kat] SHA2-256
3,682,548 UART: [kat] SHA2-384
3,685,093 UART: [kat] SHA2-512-ACC
3,686,988 UART: [kat] ECC-384
3,697,003 UART: [kat] HMAC-384Kdf
3,701,534 UART: [kat] LMS
3,950,425 UART: [kat] --
6,169,215 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,175,390 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,204,496 UART: [rt]cmd =0x46504c67, len=4
6,205,775 >>> mbox cmd response data (8 bytes)
6,205,776 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,235,165 UART: [rt]cmd =0x49444543, len=4
6,241,835 >>> mbox cmd response data (37 bytes)
6,241,836 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,271,303 UART: [rt]cmd =0x49444549, len=4
6,273,508 >>> mbox cmd response data (104 bytes)
6,273,509 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,303,020 UART: [rt]cmd =0x49444550, len=4
6,313,205 >>> mbox cmd response data (8 bytes)
6,313,206 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,342,493 UART: [rt]cmd =0x4c444556, len=4
6,352,732 >>> mbox cmd response data (687 bytes)
6,352,733 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,382,020 UART: [rt]cmd =0x43455246, len=4
6,394,365 >>> mbox cmd response data (920 bytes)
6,394,366 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,423,855 UART: [rt]cmd =0x43455252, len=4
6,434,885 >>> mbox cmd response data (783 bytes)
6,434,886 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,465,403 UART: [rt]cmd =0x53494756, len=196
6,471,023 >>> mbox cmd response data (8 bytes)
6,471,024 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,501,311 UART: [rt]cmd =0x4d454153, len=108
6,521,568 >>> mbox cmd response data (12 bytes)
6,521,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,550,892 UART: [rt]cmd =0x494e464f, len=4
6,554,479 >>> mbox cmd response data (312 bytes)
6,554,480 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,583,963 UART: [rt]cmd =0x54514754, len=24
6,586,179 >>> mbox cmd response data (8 bytes)
6,586,180 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,615,487 UART: [rt]cmd =0x47544744, len=8
6,618,009 >>> mbox cmd response data (104 bytes)
6,618,010 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,647,389 UART: [rt]cmd =0x50435252, len=8
6,649,075 >>> mbox cmd response data (8 bytes)
6,649,076 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,678,525 UART: [rt]cmd =0x50435251, len=36
6,846,188 >>> mbox cmd response data (1848 bytes)
6,846,189 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,875,948 UART: [rt]cmd =0x50435245, len=56
6,879,386 >>> mbox cmd response data (8 bytes)
6,879,387 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,908,844 UART: [rt]cmd =0x44504543, len=20
6,929,589 >>> mbox cmd response data (44 bytes)
6,929,590 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,958,927 UART: [rt]cmd =0x44504543, len=24
6,985,057 >>> mbox cmd response data (40 bytes)
6,985,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,015,051 UART: [rt]cmd =0x44504543, len=96
7,051,513 >>> mbox cmd response data (56 bytes)
7,051,514 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,081,457 UART: [rt]cmd =0x44504543, len=92
7,310,207 >>> mbox cmd response data (6284 bytes)
7,310,208 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,340,325 UART: [rt]cmd =0x44504543, len=136
7,406,886 >>> mbox cmd response data (136 bytes)
7,406,887 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,436,368 UART: [rt]cmd =0x44504543, len=40
7,462,375 >>> mbox cmd response data (40 bytes)
7,462,376 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,491,811 UART: [rt]cmd =0x44504543, len=28
7,535,342 >>> mbox cmd response data (2076 bytes)
7,535,343 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,565,016 UART: [rt]cmd =0x44504543, len=36
7,595,533 >>> mbox cmd response data (24 bytes)
7,595,534 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,625,071 UART: [rt]cmd =0x4453424c, len=4
7,638,282 >>> mbox cmd response data (8 bytes)
7,638,283 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,667,574 UART: [rt]cmd =0x46505344, len=4
7,775,948 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,437 ready_for_fw is high
1,362,437 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,246 >>> mbox cmd response: success
2,927,246 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,988,400 UART:
2,988,416 UART: Running Caliptra FMC ...
2,988,824 UART:
2,988,878 UART: [state] CFI Enabled
2,999,093 UART: [fht] FMC Alias Private Key: 7
3,107,030 UART: [art] Extend RT PCRs Done
3,107,458 UART: [art] Lock RT PCRs Done
3,108,826 UART: [art] Populate DV Done
3,116,959 UART: [fht] FMC Alias Private Key: 7
3,118,043 UART: [art] Derive CDI
3,118,323 UART: [art] Store in in slot 0x4
3,203,860 UART: [art] Derive Key Pair
3,204,220 UART: [art] Store priv key in slot 0x5
3,217,130 UART: [art] Derive Key Pair - Done
3,232,010 UART: [art] Signing Cert with AUTHO
3,232,490 UART: RITY.KEYID = 7
3,247,806 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,571 UART: [art] PUB.X = 84FFDE6035232E5936CD109198AF946031C81CD53FB8A8D466A287C423F589C350911B2566ECAE58EE739EF420196C29
3,255,339 UART: [art] PUB.Y = 535DCFDB30348BF8195A160A9921B9E9709DE0B9F61D5608B555CF00AE8C87EE21696378FDDD1D8BA0F56F5D0E696631
3,262,266 UART: [art] SIG.R = A7D6D706ABA92291E2612E676770716E2BD0B7327BD52A1B11DBBEA2A676E51CF1E6395E7E650433E260D2319F2C835B
3,269,034 UART: [art] SIG.S = 0E30181A655DBEF9B7A870B82293FCFDE90B3DE0395B1289BB8FE4574F0D68D302455DFD363F338E28EBA0C030D8AC7C
3,293,139 UART: Caliptra RT
3,293,392 UART: [state] CFI Enabled
3,402,477 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,019 UART: [rt]cmd =0x46505652, len=4
3,433,679 UART: [rt] FIPS Version
3,434,592 >>> mbox cmd response data (36 bytes)
3,434,593 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,012 UART: [rt]cmd =0x46504c54, len=4
3,465,222 >>> mbox cmd response data (8 bytes)
3,465,223 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,494,910 UART: [rt]cmd =0x46504c67, len=4
3,495,760 >>> mbox cmd response: failed
3,495,950 UART: [rt] FIPS self test
3,496,281 UART: [kat] ++
3,496,433 UART: [kat] sha1
3,500,658 UART: [kat] SHA2-256
3,502,588 UART: [kat] SHA2-384
3,505,291 UART: [kat] SHA2-512-ACC
3,507,186 UART: [kat] ECC-384
3,516,981 UART: [kat] HMAC-384Kdf
3,521,490 UART: [kat] LMS
3,770,381 UART: [kat] --
5,882,533 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,885,521 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,914,855 UART: [rt]cmd =0x46504c67, len=4
5,916,070 >>> mbox cmd response data (8 bytes)
5,916,071 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,945,334 UART: [rt]cmd =0x49444543, len=4
5,951,628 >>> mbox cmd response data (37 bytes)
5,951,629 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,981,250 UART: [rt]cmd =0x49444549, len=4
5,983,583 >>> mbox cmd response data (104 bytes)
5,983,584 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,012,631 UART: [rt]cmd =0x49444550, len=4
6,022,734 >>> mbox cmd response data (8 bytes)
6,022,735 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,052,156 UART: [rt]cmd =0x4c444556, len=4
6,062,631 >>> mbox cmd response data (687 bytes)
6,062,632 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,092,087 UART: [rt]cmd =0x43455246, len=4
6,104,408 >>> mbox cmd response data (920 bytes)
6,104,409 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,133,778 UART: [rt]cmd =0x43455252, len=4
6,144,768 >>> mbox cmd response data (783 bytes)
6,144,769 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,175,286 UART: [rt]cmd =0x53494756, len=196
6,180,990 >>> mbox cmd response data (8 bytes)
6,180,991 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,210,930 UART: [rt]cmd =0x4d454153, len=108
6,231,363 >>> mbox cmd response data (12 bytes)
6,231,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,260,541 UART: [rt]cmd =0x494e464f, len=4
6,264,338 >>> mbox cmd response data (312 bytes)
6,264,339 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,293,738 UART: [rt]cmd =0x54514754, len=24
6,295,940 >>> mbox cmd response data (8 bytes)
6,295,941 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,325,660 UART: [rt]cmd =0x47544744, len=8
6,328,092 >>> mbox cmd response data (104 bytes)
6,328,093 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,357,378 UART: [rt]cmd =0x50435252, len=8
6,358,688 >>> mbox cmd response data (8 bytes)
6,358,689 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,387,968 UART: [rt]cmd =0x50435251, len=36
6,555,479 >>> mbox cmd response data (1848 bytes)
6,555,480 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,585,061 UART: [rt]cmd =0x50435245, len=56
6,588,821 >>> mbox cmd response data (8 bytes)
6,588,822 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,618,359 UART: [rt]cmd =0x44504543, len=20
6,639,044 >>> mbox cmd response data (44 bytes)
6,639,045 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,668,298 UART: [rt]cmd =0x44504543, len=24
6,694,450 >>> mbox cmd response data (40 bytes)
6,694,451 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,724,302 UART: [rt]cmd =0x44504543, len=96
6,761,060 >>> mbox cmd response data (56 bytes)
6,761,061 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,790,998 UART: [rt]cmd =0x44504543, len=92
7,018,822 >>> mbox cmd response data (6284 bytes)
7,018,823 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,049,090 UART: [rt]cmd =0x44504543, len=136
7,115,413 >>> mbox cmd response data (136 bytes)
7,115,414 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,145,103 UART: [rt]cmd =0x44504543, len=40
7,171,272 >>> mbox cmd response data (40 bytes)
7,171,273 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,200,584 UART: [rt]cmd =0x44504543, len=28
7,243,727 >>> mbox cmd response data (2076 bytes)
7,243,728 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,273,187 UART: [rt]cmd =0x44504543, len=36
7,303,304 >>> mbox cmd response data (24 bytes)
7,303,305 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,332,626 UART: [rt]cmd =0x4453424c, len=4
7,346,275 >>> mbox cmd response data (8 bytes)
7,346,276 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,375,411 UART: [rt]cmd =0x46505344, len=4
7,483,891 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,620 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,324 UART: [kat] SHA2-256
882,255 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,370 UART: [kat] ++
886,522 UART: [kat] sha1
890,746 UART: [kat] SHA2-256
892,684 UART: [kat] SHA2-384
895,611 UART: [kat] SHA2-512-ACC
897,512 UART: [kat] ECC-384
903,189 UART: [kat] HMAC-384Kdf
907,829 UART: [kat] LMS
1,476,025 UART: [kat] --
1,477,072 UART: [cold-reset] ++
1,477,480 UART: [fht] Storing FHT @ 0x50003400
1,480,233 UART: [idev] ++
1,480,401 UART: [idev] CDI.KEYID = 6
1,480,761 UART: [idev] SUBJECT.KEYID = 7
1,481,185 UART: [idev] UDS.KEYID = 0
1,481,530 ready_for_fw is high
1,481,530 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,021 UART: [idev] Erasing UDS.KEYID = 0
1,505,755 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,327 UART: [idev] --
1,515,316 UART: [ldev] ++
1,515,484 UART: [ldev] CDI.KEYID = 6
1,515,847 UART: [ldev] SUBJECT.KEYID = 5
1,516,273 UART: [ldev] AUTHORITY.KEYID = 7
1,516,736 UART: [ldev] FE.KEYID = 1
1,521,936 UART: [ldev] Erasing FE.KEYID = 1
1,547,701 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,767 UART: [ldev] --
1,587,108 UART: [fwproc] Waiting for Commands...
1,587,915 UART: [fwproc] Received command 0x46574c44
1,588,706 UART: [fwproc] Received Image of size 114332 bytes
2,887,562 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,860 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,212 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,109 >>> mbox cmd response: success
3,080,109 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,081,327 UART: [afmc] ++
3,081,495 UART: [afmc] CDI.KEYID = 6
3,081,857 UART: [afmc] SUBJECT.KEYID = 7
3,082,282 UART: [afmc] AUTHORITY.KEYID = 5
3,116,897 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,061 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,841 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,569 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,454 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,144 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,169 UART: [afmc] --
3,160,081 UART: [cold-reset] --
3,160,777 UART: [state] Locking Datavault
3,162,144 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,748 UART: [state] Locking ICCM
3,163,314 UART: [exit] Launching FMC @ 0x40000130
3,168,643 UART:
3,168,659 UART: Running Caliptra FMC ...
3,169,067 UART:
3,169,210 UART: [state] CFI Enabled
3,179,875 UART: [fht] FMC Alias Private Key: 7
3,288,016 UART: [art] Extend RT PCRs Done
3,288,444 UART: [art] Lock RT PCRs Done
3,289,924 UART: [art] Populate DV Done
3,298,237 UART: [fht] FMC Alias Private Key: 7
3,299,373 UART: [art] Derive CDI
3,299,653 UART: [art] Store in in slot 0x4
3,385,258 UART: [art] Derive Key Pair
3,385,618 UART: [art] Store priv key in slot 0x5
3,398,588 UART: [art] Derive Key Pair - Done
3,413,497 UART: [art] Signing Cert with AUTHO
3,413,977 UART: RITY.KEYID = 7
3,429,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,998 UART: [art] PUB.X = DBE78A777036A0F17CF00BA964A2094F107223833ECADC820CCA0E3CE0CD38385DF00433D3F1AFF234ABE18F1A5B7556
3,436,767 UART: [art] PUB.Y = 25D7A6F829660C0AEC68F996D05C542A5E4C68AA6F605D34FE1C873B052B5D890F429C69F5A47FA29C0DF07BF989531D
3,443,710 UART: [art] SIG.R = AE5495115ED006C50C16C5AA33E8E2A41510844E072F2340E7DF776BD558B1A479AE84B11DC4E1ECF70030ECA2BD29D6
3,450,459 UART: [art] SIG.S = 8E7AF142C6F59AA26079C3C240C482371B8E826608BEC3C1156E3E6D83F97609CC18D98B03598CDED61CCAE6DD194E59
3,474,657 UART: Caliptra RT
3,475,002 UART: [state] CFI Enabled
3,583,004 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,194 UART: [rt]cmd =0x46505652, len=4
3,613,854 UART: [rt] FIPS Version
3,614,987 >>> mbox cmd response data (36 bytes)
3,614,988 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,555 UART: [rt]cmd =0x46504c54, len=4
3,645,653 >>> mbox cmd response data (8 bytes)
3,645,654 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,675,361 UART: [rt]cmd =0x46504c67, len=4
3,676,273 >>> mbox cmd response: failed
3,676,549 UART: [rt] FIPS self test
3,676,880 UART: [kat] ++
3,677,032 UART: [kat] sha1
3,681,197 UART: [kat] SHA2-256
3,683,127 UART: [kat] SHA2-384
3,685,816 UART: [kat] SHA2-512-ACC
3,687,711 UART: [kat] ECC-384
3,697,204 UART: [kat] HMAC-384Kdf
3,701,719 UART: [kat] LMS
3,950,610 UART: [kat] --
6,167,666 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,176,023 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,205,523 UART: [rt]cmd =0x46504c67, len=4
6,206,728 >>> mbox cmd response data (8 bytes)
6,206,729 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,236,172 UART: [rt]cmd =0x49444543, len=4
6,242,622 >>> mbox cmd response data (37 bytes)
6,242,623 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,272,010 UART: [rt]cmd =0x49444549, len=4
6,274,269 >>> mbox cmd response data (104 bytes)
6,274,270 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,303,489 UART: [rt]cmd =0x49444550, len=4
6,313,451 >>> mbox cmd response data (8 bytes)
6,313,452 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,342,645 UART: [rt]cmd =0x4c444556, len=4
6,353,024 >>> mbox cmd response data (687 bytes)
6,353,025 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,382,460 UART: [rt]cmd =0x43455246, len=4
6,394,707 >>> mbox cmd response data (920 bytes)
6,394,708 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,423,861 UART: [rt]cmd =0x43455252, len=4
6,434,518 >>> mbox cmd response data (784 bytes)
6,434,519 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,465,046 UART: [rt]cmd =0x53494756, len=196
6,470,458 >>> mbox cmd response data (8 bytes)
6,470,459 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,500,268 UART: [rt]cmd =0x4d454153, len=108
6,520,629 >>> mbox cmd response data (12 bytes)
6,520,630 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,549,889 UART: [rt]cmd =0x494e464f, len=4
6,553,644 >>> mbox cmd response data (312 bytes)
6,553,645 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,583,174 UART: [rt]cmd =0x54514754, len=24
6,585,480 >>> mbox cmd response data (8 bytes)
6,585,481 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,614,960 UART: [rt]cmd =0x47544744, len=8
6,617,662 >>> mbox cmd response data (104 bytes)
6,617,663 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,647,222 UART: [rt]cmd =0x50435252, len=8
6,649,032 >>> mbox cmd response data (8 bytes)
6,649,033 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,678,474 UART: [rt]cmd =0x50435251, len=36
6,845,993 >>> mbox cmd response data (1848 bytes)
6,845,994 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,875,573 UART: [rt]cmd =0x50435245, len=56
6,879,183 >>> mbox cmd response data (8 bytes)
6,879,184 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,908,715 UART: [rt]cmd =0x44504543, len=20
6,929,530 >>> mbox cmd response data (44 bytes)
6,929,531 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,959,006 UART: [rt]cmd =0x44504543, len=24
6,985,824 >>> mbox cmd response data (40 bytes)
6,985,825 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,015,670 UART: [rt]cmd =0x44504543, len=96
7,052,220 >>> mbox cmd response data (56 bytes)
7,052,221 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,082,222 UART: [rt]cmd =0x44504543, len=92
7,310,659 >>> mbox cmd response data (6284 bytes)
7,310,660 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,340,763 UART: [rt]cmd =0x44504543, len=136
7,407,344 >>> mbox cmd response data (136 bytes)
7,407,345 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,437,030 UART: [rt]cmd =0x44504543, len=40
7,462,991 >>> mbox cmd response data (40 bytes)
7,462,992 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,492,357 UART: [rt]cmd =0x44504543, len=28
7,535,608 >>> mbox cmd response data (2076 bytes)
7,535,609 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,565,118 UART: [rt]cmd =0x44504543, len=36
7,595,193 >>> mbox cmd response data (24 bytes)
7,595,194 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,624,637 UART: [rt]cmd =0x4453424c, len=4
7,638,620 >>> mbox cmd response data (8 bytes)
7,638,621 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,667,716 UART: [rt]cmd =0x46505344, len=4
7,776,078 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,660 ready_for_fw is high
1,362,660 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,045 >>> mbox cmd response: success
2,928,045 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,989,227 UART:
2,989,243 UART: Running Caliptra FMC ...
2,989,651 UART:
2,989,794 UART: [state] CFI Enabled
3,000,517 UART: [fht] FMC Alias Private Key: 7
3,108,098 UART: [art] Extend RT PCRs Done
3,108,526 UART: [art] Lock RT PCRs Done
3,110,594 UART: [art] Populate DV Done
3,118,667 UART: [fht] FMC Alias Private Key: 7
3,119,675 UART: [art] Derive CDI
3,119,955 UART: [art] Store in in slot 0x4
3,205,694 UART: [art] Derive Key Pair
3,206,054 UART: [art] Store priv key in slot 0x5
3,220,020 UART: [art] Derive Key Pair - Done
3,234,696 UART: [art] Signing Cert with AUTHO
3,235,176 UART: RITY.KEYID = 7
3,250,420 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,185 UART: [art] PUB.X = 13FA03C6BD72FB26C6A0F1FB82EFE13E8BCC1808EAAC05C499727C03ACD5C98F997BEB6956533962034B8DDE22D91C5D
3,257,958 UART: [art] PUB.Y = BE2A5E8DDC5204BE588A92EC2AF965B07BB27984DD333E93D040355115E7A005104844D3AA69D1732EE6024E1FEBB261
3,264,905 UART: [art] SIG.R = 0CAB15EB97EA90F40327AEA6EDF3E4E503CC60804C4D9DD79DBB0EFA202671A7C8A3F73B93F27BE424A293DD82CF15B6
3,271,685 UART: [art] SIG.S = DEC7E56BC3DF48C36268ED4C133C7BC7033475E23CE88BB723AD4225D41368086D4DAB2DE94A69C9DE00561C9E27569C
3,295,704 UART: Caliptra RT
3,296,049 UART: [state] CFI Enabled
3,404,284 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,748 UART: [rt]cmd =0x46505652, len=4
3,435,408 UART: [rt] FIPS Version
3,436,399 >>> mbox cmd response data (36 bytes)
3,436,400 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,683 UART: [rt]cmd =0x46504c54, len=4
3,466,965 >>> mbox cmd response data (8 bytes)
3,466,966 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,496,779 UART: [rt]cmd =0x46504c67, len=4
3,497,855 >>> mbox cmd response: failed
3,498,197 UART: [rt] FIPS self test
3,498,528 UART: [kat] ++
3,498,680 UART: [kat] sha1
3,502,829 UART: [kat] SHA2-256
3,504,759 UART: [kat] SHA2-384
3,507,486 UART: [kat] SHA2-512-ACC
3,509,381 UART: [kat] ECC-384
3,519,604 UART: [kat] HMAC-384Kdf
3,524,153 UART: [kat] LMS
3,773,044 UART: [kat] --
5,885,314 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,887,616 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,916,990 UART: [rt]cmd =0x46504c67, len=4
5,917,997 >>> mbox cmd response data (8 bytes)
5,917,998 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,947,055 UART: [rt]cmd =0x49444543, len=4
5,953,509 >>> mbox cmd response data (37 bytes)
5,953,510 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,982,849 UART: [rt]cmd =0x49444549, len=4
5,984,950 >>> mbox cmd response data (104 bytes)
5,984,951 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,014,620 UART: [rt]cmd =0x49444550, len=4
6,024,839 >>> mbox cmd response data (8 bytes)
6,024,840 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,054,015 UART: [rt]cmd =0x4c444556, len=4
6,064,386 >>> mbox cmd response data (687 bytes)
6,064,387 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,093,628 UART: [rt]cmd =0x43455246, len=4
6,106,037 >>> mbox cmd response data (920 bytes)
6,106,038 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,135,413 UART: [rt]cmd =0x43455252, len=4
6,146,211 >>> mbox cmd response data (783 bytes)
6,146,212 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,176,653 UART: [rt]cmd =0x53494756, len=196
6,182,217 >>> mbox cmd response data (8 bytes)
6,182,218 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,212,191 UART: [rt]cmd =0x4d454153, len=108
6,232,018 >>> mbox cmd response data (12 bytes)
6,232,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,261,220 UART: [rt]cmd =0x494e464f, len=4
6,265,019 >>> mbox cmd response data (312 bytes)
6,265,020 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,294,465 UART: [rt]cmd =0x54514754, len=24
6,296,469 >>> mbox cmd response data (8 bytes)
6,296,470 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,325,691 UART: [rt]cmd =0x47544744, len=8
6,328,017 >>> mbox cmd response data (104 bytes)
6,328,018 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,357,421 UART: [rt]cmd =0x50435252, len=8
6,359,029 >>> mbox cmd response data (8 bytes)
6,359,030 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,388,465 UART: [rt]cmd =0x50435251, len=36
6,556,070 >>> mbox cmd response data (1848 bytes)
6,556,071 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,585,642 UART: [rt]cmd =0x50435245, len=56
6,589,316 >>> mbox cmd response data (8 bytes)
6,589,317 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,618,808 UART: [rt]cmd =0x44504543, len=20
6,639,435 >>> mbox cmd response data (44 bytes)
6,639,436 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,668,967 UART: [rt]cmd =0x44504543, len=24
6,694,829 >>> mbox cmd response data (40 bytes)
6,694,830 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,724,849 UART: [rt]cmd =0x44504543, len=96
6,761,679 >>> mbox cmd response data (56 bytes)
6,761,680 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,791,747 UART: [rt]cmd =0x44504543, len=92
7,019,245 >>> mbox cmd response data (6284 bytes)
7,019,246 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,049,593 UART: [rt]cmd =0x44504543, len=136
7,117,190 >>> mbox cmd response data (136 bytes)
7,117,191 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,146,602 UART: [rt]cmd =0x44504543, len=40
7,172,801 >>> mbox cmd response data (40 bytes)
7,172,802 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,202,141 UART: [rt]cmd =0x44504543, len=28
7,245,350 >>> mbox cmd response data (2076 bytes)
7,245,351 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,274,774 UART: [rt]cmd =0x44504543, len=36
7,304,409 >>> mbox cmd response data (24 bytes)
7,304,410 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,334,041 UART: [rt]cmd =0x4453424c, len=4
7,348,334 >>> mbox cmd response data (8 bytes)
7,348,335 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,377,840 UART: [rt]cmd =0x46505344, len=4
7,485,850 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,382 UART: [kat] SHA2-256
893,032 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,157 UART: [kat] ++
897,309 UART: [kat] sha1
901,691 UART: [kat] SHA2-256
903,631 UART: [kat] SHA2-384
906,386 UART: [kat] SHA2-512-ACC
908,287 UART: [kat] ECC-384
918,174 UART: [kat] HMAC-384Kdf
922,902 UART: [kat] LMS
1,171,230 UART: [kat] --
1,172,261 UART: [cold-reset] ++
1,172,829 UART: [fht] FHT @ 0x50003400
1,175,492 UART: [idev] ++
1,175,660 UART: [idev] CDI.KEYID = 6
1,176,020 UART: [idev] SUBJECT.KEYID = 7
1,176,444 UART: [idev] UDS.KEYID = 0
1,176,789 ready_for_fw is high
1,176,789 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,692 UART: [idev] Erasing UDS.KEYID = 0
1,202,111 UART: [idev] Sha1 KeyId Algorithm
1,210,481 UART: [idev] --
1,211,373 UART: [ldev] ++
1,211,541 UART: [ldev] CDI.KEYID = 6
1,211,904 UART: [ldev] SUBJECT.KEYID = 5
1,212,330 UART: [ldev] AUTHORITY.KEYID = 7
1,212,793 UART: [ldev] FE.KEYID = 1
1,218,043 UART: [ldev] Erasing FE.KEYID = 1
1,244,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,033 UART: [ldev] --
1,283,348 UART: [fwproc] Wait for Commands...
1,283,964 UART: [fwproc] Recv command 0x46574c44
1,284,692 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,788 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,092 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,863 >>> mbox cmd response: success
2,774,863 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,776,053 UART: [afmc] ++
2,776,221 UART: [afmc] CDI.KEYID = 6
2,776,583 UART: [afmc] SUBJECT.KEYID = 7
2,777,008 UART: [afmc] AUTHORITY.KEYID = 5
2,812,511 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,784 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,532 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,260 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,145 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,864 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,754 UART: [afmc] --
2,855,658 UART: [cold-reset] --
2,856,700 UART: [state] Locking Datavault
2,857,877 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,481 UART: [state] Locking ICCM
2,859,011 UART: [exit] Launching FMC @ 0x40000130
2,864,340 UART:
2,864,356 UART: Running Caliptra FMC ...
2,864,764 UART:
2,864,818 UART: [state] CFI Enabled
2,874,783 UART: [fht] FMC Alias Private Key: 7
2,982,956 UART: [art] Extend RT PCRs Done
2,983,384 UART: [art] Lock RT PCRs Done
2,984,948 UART: [art] Populate DV Done
2,993,281 UART: [fht] FMC Alias Private Key: 7
2,994,323 UART: [art] Derive CDI
2,994,603 UART: [art] Store in in slot 0x4
3,080,692 UART: [art] Derive Key Pair
3,081,052 UART: [art] Store priv key in slot 0x5
3,094,572 UART: [art] Derive Key Pair - Done
3,109,322 UART: [art] Signing Cert with AUTHO
3,109,802 UART: RITY.KEYID = 7
3,124,874 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,639 UART: [art] PUB.X = 1DB199CC9B2FA993F3ADC7EB2755A67AB20D226A4BEFB980F8843BB32E37FE974A61A963782AD3CC31EF7D9ADF689676
3,132,424 UART: [art] PUB.Y = 2D78635CAB5BF9A7AF8DF86623DAD25DD04A428921D292AAAF56C3F2A145D2FFC34128B3192D6D17B9C826152693C155
3,139,382 UART: [art] SIG.R = 1E7FE24D213E313142A1D5B66F227B6531A3AEA81E65CE08D65D7DEB47218138EB894D8DF7630C62E36AEFDE0504D500
3,146,126 UART: [art] SIG.S = 25DC229B9B1A388B89CBDC122BB6AFBE2CDC9B27A9D84A1D43D976FF2BDBB9F12A6BCC3A61B8A146031E82CC6410E82E
3,169,976 UART: Caliptra RT
3,170,229 UART: [state] CFI Enabled
3,277,406 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,878 UART: [rt]cmd =0x46505652, len=4
3,308,538 UART: [rt] FIPS Version
3,309,495 >>> mbox cmd response data (36 bytes)
3,309,496 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,829 UART: [rt]cmd =0x46504c54, len=4
3,340,089 >>> mbox cmd response data (8 bytes)
3,340,090 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,369,885 UART: [rt]cmd =0x46504c67, len=4
3,370,999 >>> mbox cmd response: failed
3,371,145 UART: [rt] FIPS self test
3,371,476 UART: [kat] ++
3,371,628 UART: [kat] sha1
3,375,927 UART: [kat] SHA2-256
3,377,857 UART: [kat] SHA2-384
3,380,564 UART: [kat] SHA2-512-ACC
3,382,459 UART: [kat] ECC-384
3,391,978 UART: [kat] HMAC-384Kdf
3,396,471 UART: [kat] LMS
3,645,362 UART: [kat] --
5,873,814 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,880,748 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,909,976 UART: [rt]cmd =0x46504c67, len=4
5,911,191 >>> mbox cmd response data (8 bytes)
5,911,192 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,940,517 UART: [rt]cmd =0x49444543, len=4
5,947,091 >>> mbox cmd response data (37 bytes)
5,947,092 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,976,477 UART: [rt]cmd =0x49444549, len=4
5,978,772 >>> mbox cmd response data (104 bytes)
5,978,773 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,008,016 UART: [rt]cmd =0x49444550, len=4
6,018,020 >>> mbox cmd response data (8 bytes)
6,018,021 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,047,526 UART: [rt]cmd =0x4c444556, len=4
6,058,069 >>> mbox cmd response data (687 bytes)
6,058,070 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,087,483 UART: [rt]cmd =0x43455246, len=4
6,099,520 >>> mbox cmd response data (887 bytes)
6,099,521 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,128,912 UART: [rt]cmd =0x43455252, len=4
6,139,786 >>> mbox cmd response data (782 bytes)
6,139,787 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,170,496 UART: [rt]cmd =0x53494756, len=196
6,175,960 >>> mbox cmd response data (8 bytes)
6,175,961 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,206,090 UART: [rt]cmd =0x4d454153, len=108
6,226,675 >>> mbox cmd response data (12 bytes)
6,226,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,256,045 UART: [rt]cmd =0x494e464f, len=4
6,259,872 >>> mbox cmd response data (312 bytes)
6,259,873 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,289,176 UART: [rt]cmd =0x54514754, len=24
6,291,670 >>> mbox cmd response data (8 bytes)
6,291,671 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,321,152 UART: [rt]cmd =0x47544744, len=8
6,323,498 >>> mbox cmd response data (104 bytes)
6,323,499 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,352,746 UART: [rt]cmd =0x50435252, len=8
6,354,048 >>> mbox cmd response data (8 bytes)
6,354,049 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,383,684 UART: [rt]cmd =0x50435251, len=36
6,551,237 >>> mbox cmd response data (1848 bytes)
6,551,238 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,580,981 UART: [rt]cmd =0x50435245, len=56
6,584,559 >>> mbox cmd response data (8 bytes)
6,584,560 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,614,057 UART: [rt]cmd =0x44504543, len=20
6,635,124 >>> mbox cmd response data (44 bytes)
6,635,125 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,664,766 UART: [rt]cmd =0x44504543, len=24
6,690,926 >>> mbox cmd response data (40 bytes)
6,690,927 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,720,900 UART: [rt]cmd =0x44504543, len=96
6,757,596 >>> mbox cmd response data (56 bytes)
6,757,597 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,787,354 UART: [rt]cmd =0x44504543, len=92
7,013,297 >>> mbox cmd response data (6284 bytes)
7,013,298 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,043,781 UART: [rt]cmd =0x44504543, len=136
7,110,116 >>> mbox cmd response data (136 bytes)
7,110,117 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,139,638 UART: [rt]cmd =0x44504543, len=40
7,165,779 >>> mbox cmd response data (40 bytes)
7,165,780 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,195,461 UART: [rt]cmd =0x44504543, len=28
7,238,268 >>> mbox cmd response data (2076 bytes)
7,238,269 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,267,886 UART: [rt]cmd =0x44504543, len=36
7,297,457 >>> mbox cmd response data (24 bytes)
7,297,458 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,326,651 UART: [rt]cmd =0x4453424c, len=4
7,339,816 >>> mbox cmd response data (8 bytes)
7,339,817 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,369,276 UART: [rt]cmd =0x46505344, len=4
7,477,460 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,269 ready_for_fw is high
1,060,269 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,625,740 >>> mbox cmd response: success
2,625,740 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,687,874 UART:
2,687,890 UART: Running Caliptra FMC ...
2,688,298 UART:
2,688,352 UART: [state] CFI Enabled
2,698,911 UART: [fht] FMC Alias Private Key: 7
2,806,220 UART: [art] Extend RT PCRs Done
2,806,648 UART: [art] Lock RT PCRs Done
2,808,418 UART: [art] Populate DV Done
2,816,513 UART: [fht] FMC Alias Private Key: 7
2,817,625 UART: [art] Derive CDI
2,817,905 UART: [art] Store in in slot 0x4
2,903,758 UART: [art] Derive Key Pair
2,904,118 UART: [art] Store priv key in slot 0x5
2,917,710 UART: [art] Derive Key Pair - Done
2,932,940 UART: [art] Signing Cert with AUTHO
2,933,420 UART: RITY.KEYID = 7
2,949,078 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,843 UART: [art] PUB.X = 9FF96541F74DD7A22F8A26BD8B99C49911A9181275140B1DE24F83876D158462D822DD871CD3D3E1F31214376A6B078D
2,956,603 UART: [art] PUB.Y = 5511292CBC2647842CE9CF9FC8205098B085BF112DBF05F841B2A0AFA4AF18E4096181EA0F432A018AC944AF3C49F762
2,963,547 UART: [art] SIG.R = C33ACFE48FC63BAACE12F125A82E06913EC896499F3599AE45CC31E5985D1718CCDE35263C02AAFA88814782ABB6B01E
2,970,325 UART: [art] SIG.S = 869C87F5AA4B7F5DAACE5705AE1C5D1FE5DE4AF554B2A8195C64219EE63139EEF797D864F28C5C26E37E6D6948BE91DB
2,994,093 UART: Caliptra RT
2,994,346 UART: [state] CFI Enabled
3,102,518 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,008 UART: [rt]cmd =0x46505652, len=4
3,133,668 UART: [rt] FIPS Version
3,134,677 >>> mbox cmd response data (36 bytes)
3,134,678 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,985 UART: [rt]cmd =0x46504c54, len=4
3,165,127 >>> mbox cmd response data (8 bytes)
3,165,128 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,194,825 UART: [rt]cmd =0x46504c67, len=4
3,195,735 >>> mbox cmd response: failed
3,195,871 UART: [rt] FIPS self test
3,196,202 UART: [kat] ++
3,196,354 UART: [kat] sha1
3,200,583 UART: [kat] SHA2-256
3,202,513 UART: [kat] SHA2-384
3,205,310 UART: [kat] SHA2-512-ACC
3,207,205 UART: [kat] ECC-384
3,217,140 UART: [kat] HMAC-384Kdf
3,221,633 UART: [kat] LMS
3,470,524 UART: [kat] --
5,593,102 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,595,495 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,624,575 UART: [rt]cmd =0x46504c67, len=4
5,625,728 >>> mbox cmd response data (8 bytes)
5,625,729 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,655,056 UART: [rt]cmd =0x49444543, len=4
5,661,320 >>> mbox cmd response data (37 bytes)
5,661,321 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,690,658 UART: [rt]cmd =0x49444549, len=4
5,692,855 >>> mbox cmd response data (104 bytes)
5,692,856 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,722,185 UART: [rt]cmd =0x49444550, len=4
5,732,218 >>> mbox cmd response data (8 bytes)
5,732,219 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,761,710 UART: [rt]cmd =0x4c444556, len=4
5,772,179 >>> mbox cmd response data (687 bytes)
5,772,180 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,801,609 UART: [rt]cmd =0x43455246, len=4
5,813,618 >>> mbox cmd response data (887 bytes)
5,813,619 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,842,736 UART: [rt]cmd =0x43455252, len=4
5,853,529 >>> mbox cmd response data (784 bytes)
5,853,530 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,883,953 UART: [rt]cmd =0x53494756, len=196
5,889,209 >>> mbox cmd response data (8 bytes)
5,889,210 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,919,195 UART: [rt]cmd =0x4d454153, len=108
5,939,998 >>> mbox cmd response data (12 bytes)
5,939,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,969,114 UART: [rt]cmd =0x494e464f, len=4
5,972,823 >>> mbox cmd response data (312 bytes)
5,972,824 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,002,593 UART: [rt]cmd =0x54514754, len=24
6,004,617 >>> mbox cmd response data (8 bytes)
6,004,618 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,033,717 UART: [rt]cmd =0x47544744, len=8
6,036,347 >>> mbox cmd response data (104 bytes)
6,036,348 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,065,927 UART: [rt]cmd =0x50435252, len=8
6,067,531 >>> mbox cmd response data (8 bytes)
6,067,532 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,097,217 UART: [rt]cmd =0x50435251, len=36
6,264,616 >>> mbox cmd response data (1848 bytes)
6,264,617 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,294,270 UART: [rt]cmd =0x50435245, len=56
6,297,830 >>> mbox cmd response data (8 bytes)
6,297,831 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,327,630 UART: [rt]cmd =0x44504543, len=20
6,348,655 >>> mbox cmd response data (44 bytes)
6,348,656 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,378,039 UART: [rt]cmd =0x44504543, len=24
6,404,447 >>> mbox cmd response data (40 bytes)
6,404,448 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,434,339 UART: [rt]cmd =0x44504543, len=96
6,470,903 >>> mbox cmd response data (56 bytes)
6,470,904 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,500,945 UART: [rt]cmd =0x44504543, len=92
6,728,423 >>> mbox cmd response data (6284 bytes)
6,728,424 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,758,725 UART: [rt]cmd =0x44504543, len=136
6,824,508 >>> mbox cmd response data (136 bytes)
6,824,509 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,854,352 UART: [rt]cmd =0x44504543, len=40
6,880,879 >>> mbox cmd response data (40 bytes)
6,880,880 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,910,397 UART: [rt]cmd =0x44504543, len=28
6,953,610 >>> mbox cmd response data (2076 bytes)
6,953,611 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,983,090 UART: [rt]cmd =0x44504543, len=36
7,013,245 >>> mbox cmd response data (24 bytes)
7,013,246 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,042,329 UART: [rt]cmd =0x4453424c, len=4
7,055,432 >>> mbox cmd response data (8 bytes)
7,055,433 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,084,758 UART: [rt]cmd =0x46505344, len=4
7,193,210 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
893,695 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,820 UART: [kat] ++
897,972 UART: [kat] sha1
902,158 UART: [kat] SHA2-256
904,098 UART: [kat] SHA2-384
906,683 UART: [kat] SHA2-512-ACC
908,584 UART: [kat] ECC-384
918,295 UART: [kat] HMAC-384Kdf
923,073 UART: [kat] LMS
1,171,401 UART: [kat] --
1,172,390 UART: [cold-reset] ++
1,172,970 UART: [fht] FHT @ 0x50003400
1,175,717 UART: [idev] ++
1,175,885 UART: [idev] CDI.KEYID = 6
1,176,245 UART: [idev] SUBJECT.KEYID = 7
1,176,669 UART: [idev] UDS.KEYID = 0
1,177,014 ready_for_fw is high
1,177,014 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,833 UART: [idev] Erasing UDS.KEYID = 0
1,201,942 UART: [idev] Sha1 KeyId Algorithm
1,210,430 UART: [idev] --
1,211,490 UART: [ldev] ++
1,211,658 UART: [ldev] CDI.KEYID = 6
1,212,021 UART: [ldev] SUBJECT.KEYID = 5
1,212,447 UART: [ldev] AUTHORITY.KEYID = 7
1,212,910 UART: [ldev] FE.KEYID = 1
1,218,118 UART: [ldev] Erasing FE.KEYID = 1
1,244,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,472 UART: [ldev] --
1,283,957 UART: [fwproc] Wait for Commands...
1,284,725 UART: [fwproc] Recv command 0x46574c44
1,285,453 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,391 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,695 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,518 >>> mbox cmd response: success
2,774,518 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,638 UART: [afmc] ++
2,775,806 UART: [afmc] CDI.KEYID = 6
2,776,168 UART: [afmc] SUBJECT.KEYID = 7
2,776,593 UART: [afmc] AUTHORITY.KEYID = 5
2,811,978 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,359 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,107 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,835 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,720 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,439 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,365 UART: [afmc] --
2,855,357 UART: [cold-reset] --
2,856,311 UART: [state] Locking Datavault
2,857,534 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,138 UART: [state] Locking ICCM
2,858,772 UART: [exit] Launching FMC @ 0x40000130
2,864,101 UART:
2,864,117 UART: Running Caliptra FMC ...
2,864,525 UART:
2,864,668 UART: [state] CFI Enabled
2,875,339 UART: [fht] FMC Alias Private Key: 7
2,983,888 UART: [art] Extend RT PCRs Done
2,984,316 UART: [art] Lock RT PCRs Done
2,985,778 UART: [art] Populate DV Done
2,993,835 UART: [fht] FMC Alias Private Key: 7
2,994,861 UART: [art] Derive CDI
2,995,141 UART: [art] Store in in slot 0x4
3,080,792 UART: [art] Derive Key Pair
3,081,152 UART: [art] Store priv key in slot 0x5
3,094,472 UART: [art] Derive Key Pair - Done
3,109,297 UART: [art] Signing Cert with AUTHO
3,109,777 UART: RITY.KEYID = 7
3,125,611 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,376 UART: [art] PUB.X = CB92BD10B3CFBD607F825B04393DC0DE0042A21CF5A6CFBC23D39307B89964E1A20C434FBBD24C839A12B43FD80DB7F6
3,133,130 UART: [art] PUB.Y = F62FBE1ACA9B79E41D14E8677214AE036C10C8B5362F66353A42B66836DD6709AAB76A06EA55A3EE7C7751885C748DA7
3,140,077 UART: [art] SIG.R = E526B984ECDC2CA144E1730F41451E2E1180C21A50D3BA9C00FDE30D0C084229A0B411361FC74B0204A21331790CE899
3,146,804 UART: [art] SIG.S = 10F910EC3617B163B71EC1F184D72D0754A199A296293B45929333F5B417927C4439F98DF4489F99DCBBADAFA833DC20
3,170,052 UART: Caliptra RT
3,170,397 UART: [state] CFI Enabled
3,277,642 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,142 UART: [rt]cmd =0x46505652, len=4
3,308,802 UART: [rt] FIPS Version
3,309,885 >>> mbox cmd response data (36 bytes)
3,309,886 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,095 UART: [rt]cmd =0x46504c54, len=4
3,340,083 >>> mbox cmd response data (8 bytes)
3,340,084 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,369,775 UART: [rt]cmd =0x46504c67, len=4
3,370,699 >>> mbox cmd response: failed
3,370,847 UART: [rt] FIPS self test
3,371,178 UART: [kat] ++
3,371,330 UART: [kat] sha1
3,375,639 UART: [kat] SHA2-256
3,377,569 UART: [kat] SHA2-384
3,380,288 UART: [kat] SHA2-512-ACC
3,382,183 UART: [kat] ECC-384
3,392,044 UART: [kat] HMAC-384Kdf
3,396,495 UART: [kat] LMS
3,645,386 UART: [kat] --
5,873,024 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,880,448 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,909,582 UART: [rt]cmd =0x46504c67, len=4
5,910,817 >>> mbox cmd response data (8 bytes)
5,910,818 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,940,105 UART: [rt]cmd =0x49444543, len=4
5,946,413 >>> mbox cmd response data (37 bytes)
5,946,414 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,975,897 UART: [rt]cmd =0x49444549, len=4
5,978,216 >>> mbox cmd response data (104 bytes)
5,978,217 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,007,532 UART: [rt]cmd =0x49444550, len=4
6,017,420 >>> mbox cmd response data (8 bytes)
6,017,421 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,046,840 UART: [rt]cmd =0x4c444556, len=4
6,057,175 >>> mbox cmd response data (687 bytes)
6,057,176 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,086,445 UART: [rt]cmd =0x43455246, len=4
6,098,516 >>> mbox cmd response data (887 bytes)
6,098,517 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,127,960 UART: [rt]cmd =0x43455252, len=4
6,138,682 >>> mbox cmd response data (783 bytes)
6,138,683 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,169,482 UART: [rt]cmd =0x53494756, len=196
6,174,994 >>> mbox cmd response data (8 bytes)
6,174,995 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,205,024 UART: [rt]cmd =0x4d454153, len=108
6,225,475 >>> mbox cmd response data (12 bytes)
6,225,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,254,861 UART: [rt]cmd =0x494e464f, len=4
6,258,428 >>> mbox cmd response data (312 bytes)
6,258,429 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,288,052 UART: [rt]cmd =0x54514754, len=24
6,290,342 >>> mbox cmd response data (8 bytes)
6,290,343 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,319,514 UART: [rt]cmd =0x47544744, len=8
6,322,178 >>> mbox cmd response data (104 bytes)
6,322,179 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,351,566 UART: [rt]cmd =0x50435252, len=8
6,353,130 >>> mbox cmd response data (8 bytes)
6,353,131 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,382,654 UART: [rt]cmd =0x50435251, len=36
6,550,283 >>> mbox cmd response data (1848 bytes)
6,550,284 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,580,009 UART: [rt]cmd =0x50435245, len=56
6,583,719 >>> mbox cmd response data (8 bytes)
6,583,720 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,613,313 UART: [rt]cmd =0x44504543, len=20
6,634,578 >>> mbox cmd response data (44 bytes)
6,634,579 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,664,092 UART: [rt]cmd =0x44504543, len=24
6,690,626 >>> mbox cmd response data (40 bytes)
6,690,627 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,720,722 UART: [rt]cmd =0x44504543, len=96
6,758,012 >>> mbox cmd response data (56 bytes)
6,758,013 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,788,058 UART: [rt]cmd =0x44504543, len=92
7,015,592 >>> mbox cmd response data (6284 bytes)
7,015,593 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,045,738 UART: [rt]cmd =0x44504543, len=136
7,112,489 >>> mbox cmd response data (136 bytes)
7,112,490 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,141,913 UART: [rt]cmd =0x44504543, len=40
7,167,858 >>> mbox cmd response data (40 bytes)
7,167,859 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,197,156 UART: [rt]cmd =0x44504543, len=28
7,240,605 >>> mbox cmd response data (2076 bytes)
7,240,606 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,270,137 UART: [rt]cmd =0x44504543, len=36
7,299,940 >>> mbox cmd response data (24 bytes)
7,299,941 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,329,424 UART: [rt]cmd =0x4453424c, len=4
7,343,291 >>> mbox cmd response data (8 bytes)
7,343,292 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,372,549 UART: [rt]cmd =0x46505344, len=4
7,480,881 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,780 ready_for_fw is high
1,060,780 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,177 >>> mbox cmd response: success
2,627,177 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,565 UART:
2,689,581 UART: Running Caliptra FMC ...
2,689,989 UART:
2,690,132 UART: [state] CFI Enabled
2,701,039 UART: [fht] FMC Alias Private Key: 7
2,809,396 UART: [art] Extend RT PCRs Done
2,809,824 UART: [art] Lock RT PCRs Done
2,811,062 UART: [art] Populate DV Done
2,818,825 UART: [fht] FMC Alias Private Key: 7
2,819,939 UART: [art] Derive CDI
2,820,219 UART: [art] Store in in slot 0x4
2,905,834 UART: [art] Derive Key Pair
2,906,194 UART: [art] Store priv key in slot 0x5
2,919,904 UART: [art] Derive Key Pair - Done
2,934,511 UART: [art] Signing Cert with AUTHO
2,934,991 UART: RITY.KEYID = 7
2,949,759 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,524 UART: [art] PUB.X = A89AD6AF87650F3C60E32477B5208FB0A5895FD1914AB850DB7421562CC1CBAEA6A06151187E147AB0558455C58FDC02
2,957,292 UART: [art] PUB.Y = 479611388026849FDE65F6DBD522E47C71CD627F59500E4E8DE4D4D25C1D3D0AFD23207E97F53D03E3164BB71E489375
2,964,233 UART: [art] SIG.R = DC0A0358980A04563C7C739E5F24780E5C96BA8991C7AE9E6D32B055A65985AA481D1ACCE0EBDE3216E4A116F6DC65C5
2,970,998 UART: [art] SIG.S = 74640C3ED5D41D9DD3CD7121AF7F207F3F79B2C28447D8A625F50F32F4F0E98AD4F83B23B15B1446C90F949627CAA415
2,994,560 UART: Caliptra RT
2,994,905 UART: [state] CFI Enabled
3,102,776 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,362 UART: [rt]cmd =0x46505652, len=4
3,134,022 UART: [rt] FIPS Version
3,135,131 >>> mbox cmd response data (36 bytes)
3,135,132 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,429 UART: [rt]cmd =0x46504c54, len=4
3,165,727 >>> mbox cmd response data (8 bytes)
3,165,728 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,195,625 UART: [rt]cmd =0x46504c67, len=4
3,196,803 >>> mbox cmd response: failed
3,197,007 UART: [rt] FIPS self test
3,197,338 UART: [kat] ++
3,197,490 UART: [kat] sha1
3,201,817 UART: [kat] SHA2-256
3,203,747 UART: [kat] SHA2-384
3,206,524 UART: [kat] SHA2-512-ACC
3,208,419 UART: [kat] ECC-384
3,218,160 UART: [kat] HMAC-384Kdf
3,222,635 UART: [kat] LMS
3,471,526 UART: [kat] --
5,595,360 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,596,563 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,625,767 UART: [rt]cmd =0x46504c67, len=4
5,627,002 >>> mbox cmd response data (8 bytes)
5,627,003 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,656,456 UART: [rt]cmd =0x49444543, len=4
5,663,060 >>> mbox cmd response data (37 bytes)
5,663,061 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,692,518 UART: [rt]cmd =0x49444549, len=4
5,694,849 >>> mbox cmd response data (104 bytes)
5,694,850 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,724,339 UART: [rt]cmd =0x49444550, len=4
5,734,389 >>> mbox cmd response data (8 bytes)
5,734,390 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,763,851 UART: [rt]cmd =0x4c444556, len=4
5,774,268 >>> mbox cmd response data (687 bytes)
5,774,269 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,803,578 UART: [rt]cmd =0x43455246, len=4
5,815,537 >>> mbox cmd response data (887 bytes)
5,815,538 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,844,797 UART: [rt]cmd =0x43455252, len=4
5,855,615 >>> mbox cmd response data (783 bytes)
5,855,616 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,886,061 UART: [rt]cmd =0x53494756, len=196
5,891,317 >>> mbox cmd response data (8 bytes)
5,891,318 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,921,523 UART: [rt]cmd =0x4d454153, len=108
5,941,694 >>> mbox cmd response data (12 bytes)
5,941,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,971,110 UART: [rt]cmd =0x494e464f, len=4
5,974,799 >>> mbox cmd response data (312 bytes)
5,974,800 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,004,257 UART: [rt]cmd =0x54514754, len=24
6,006,485 >>> mbox cmd response data (8 bytes)
6,006,486 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,035,797 UART: [rt]cmd =0x47544744, len=8
6,038,677 >>> mbox cmd response data (104 bytes)
6,038,678 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,067,977 UART: [rt]cmd =0x50435252, len=8
6,069,511 >>> mbox cmd response data (8 bytes)
6,069,512 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,098,811 UART: [rt]cmd =0x50435251, len=36
6,266,038 >>> mbox cmd response data (1848 bytes)
6,266,039 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,295,664 UART: [rt]cmd =0x50435245, len=56
6,299,302 >>> mbox cmd response data (8 bytes)
6,299,303 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,328,816 UART: [rt]cmd =0x44504543, len=20
6,349,499 >>> mbox cmd response data (44 bytes)
6,349,500 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,378,941 UART: [rt]cmd =0x44504543, len=24
6,404,747 >>> mbox cmd response data (40 bytes)
6,404,748 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,434,795 UART: [rt]cmd =0x44504543, len=96
6,471,313 >>> mbox cmd response data (56 bytes)
6,471,314 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,501,111 UART: [rt]cmd =0x44504543, len=92
6,729,232 >>> mbox cmd response data (6284 bytes)
6,729,233 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,759,256 UART: [rt]cmd =0x44504543, len=136
6,826,579 >>> mbox cmd response data (136 bytes)
6,826,580 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,856,309 UART: [rt]cmd =0x44504543, len=40
6,882,444 >>> mbox cmd response data (40 bytes)
6,882,445 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,911,834 UART: [rt]cmd =0x44504543, len=28
6,955,065 >>> mbox cmd response data (2076 bytes)
6,955,066 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,984,463 UART: [rt]cmd =0x44504543, len=36
7,014,090 >>> mbox cmd response data (24 bytes)
7,014,091 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,043,454 UART: [rt]cmd =0x4453424c, len=4
7,056,895 >>> mbox cmd response data (8 bytes)
7,056,896 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,086,269 UART: [rt]cmd =0x46505344, len=4
7,194,291 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,458 UART: [state] LifecycleState = Unprovisioned
85,113 UART: [state] DebugLocked = No
85,653 UART: [state] WD Timer not started. Device not locked for debugging
86,848 UART: [kat] SHA2-256
890,398 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,527 UART: [kat] ++
894,679 UART: [kat] sha1
898,911 UART: [kat] SHA2-256
900,851 UART: [kat] SHA2-384
903,582 UART: [kat] SHA2-512-ACC
905,483 UART: [kat] ECC-384
914,938 UART: [kat] HMAC-384Kdf
919,580 UART: [kat] LMS
1,167,892 UART: [kat] --
1,168,967 UART: [cold-reset] ++
1,169,505 UART: [fht] FHT @ 0x50003400
1,172,193 UART: [idev] ++
1,172,361 UART: [idev] CDI.KEYID = 6
1,172,722 UART: [idev] SUBJECT.KEYID = 7
1,173,147 UART: [idev] UDS.KEYID = 0
1,173,493 ready_for_fw is high
1,173,493 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,180,839 UART: [idev] Erasing UDS.KEYID = 0
1,198,183 UART: [idev] Sha1 KeyId Algorithm
1,207,175 UART: [idev] --
1,208,206 UART: [ldev] ++
1,208,374 UART: [ldev] CDI.KEYID = 6
1,208,738 UART: [ldev] SUBJECT.KEYID = 5
1,209,165 UART: [ldev] AUTHORITY.KEYID = 7
1,209,628 UART: [ldev] FE.KEYID = 1
1,214,852 UART: [ldev] Erasing FE.KEYID = 1
1,240,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,616 UART: [ldev] --
1,280,004 UART: [fwproc] Wait for Commands...
1,280,631 UART: [fwproc] Recv command 0x46574c44
1,281,364 UART: [fwproc] Recv'd Img size: 114332 bytes
2,578,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,628 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,937 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,770,739 >>> mbox cmd response: success
2,770,739 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,771,852 UART: [afmc] ++
2,772,020 UART: [afmc] CDI.KEYID = 6
2,772,383 UART: [afmc] SUBJECT.KEYID = 7
2,772,809 UART: [afmc] AUTHORITY.KEYID = 5
2,808,426 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,730 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,481 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,210 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,093 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,812 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,595 UART: [afmc] --
2,851,485 UART: [cold-reset] --
2,852,335 UART: [state] Locking Datavault
2,853,574 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,178 UART: [state] Locking ICCM
2,854,814 UART: [exit] Launching FMC @ 0x40000130
2,860,143 UART:
2,860,159 UART: Running Caliptra FMC ...
2,860,567 UART:
2,860,621 UART: [state] CFI Enabled
2,871,192 UART: [fht] FMC Alias Private Key: 7
2,979,027 UART: [art] Extend RT PCRs Done
2,979,455 UART: [art] Lock RT PCRs Done
2,980,959 UART: [art] Populate DV Done
2,989,048 UART: [fht] FMC Alias Private Key: 7
2,990,126 UART: [art] Derive CDI
2,990,406 UART: [art] Store in in slot 0x4
3,076,167 UART: [art] Derive Key Pair
3,076,527 UART: [art] Store priv key in slot 0x5
3,089,943 UART: [art] Derive Key Pair - Done
3,104,736 UART: [art] Signing Cert with AUTHO
3,105,216 UART: RITY.KEYID = 7
3,120,248 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,013 UART: [art] PUB.X = 1D4C8F979F88A57E826651E435FB49F03917ED92FBF4B7151690E0FEBA2B71F1BA77FAE302B1C489ED946AD2E7149889
3,127,788 UART: [art] PUB.Y = 6BE5A9CD0568DFA8994CA7D594A7E68FAACAB416C9175833791E99211588DC668143A6D8B3A9E526A9955D17988FA3A2
3,134,739 UART: [art] SIG.R = AB88A59ED6D5CCAB50870AD58E04B80DE3913E7CB5D5BB17728174F210657906E4BB83E554B8CC6AD788E9D07ADA7838
3,141,509 UART: [art] SIG.S = 4D012DE2A47440970A849D90958989DE1BA5EE67FBE1060E97B19CB7E3D1FA15C3833A37E122597C3E1EE622B3B93A68
3,164,780 UART: Caliptra RT
3,165,033 UART: [state] CFI Enabled
3,272,554 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,998 UART: [rt]cmd =0x46505652, len=4
3,303,658 UART: [rt] FIPS Version
3,304,661 >>> mbox cmd response data (36 bytes)
3,304,662 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,049 UART: [rt]cmd =0x46504c54, len=4
3,335,051 >>> mbox cmd response data (8 bytes)
3,335,052 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,364,617 UART: [rt]cmd =0x46504c67, len=4
3,365,605 >>> mbox cmd response: failed
3,365,835 UART: [rt] FIPS self test
3,366,166 UART: [kat] ++
3,366,318 UART: [kat] sha1
3,370,557 UART: [kat] SHA2-256
3,372,487 UART: [kat] SHA2-384
3,375,202 UART: [kat] SHA2-512-ACC
3,377,097 UART: [kat] ECC-384
3,386,754 UART: [kat] HMAC-384Kdf
3,391,297 UART: [kat] LMS
3,640,188 UART: [kat] --
5,865,200 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,875,354 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,904,812 UART: [rt]cmd =0x46504c67, len=4
5,906,107 >>> mbox cmd response data (8 bytes)
5,906,108 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,935,525 UART: [rt]cmd =0x49444543, len=4
5,941,951 >>> mbox cmd response data (37 bytes)
5,941,952 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,971,457 UART: [rt]cmd =0x49444549, len=4
5,973,688 >>> mbox cmd response data (104 bytes)
5,973,689 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,003,030 UART: [rt]cmd =0x49444550, len=4
6,013,268 >>> mbox cmd response data (8 bytes)
6,013,269 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,042,844 UART: [rt]cmd =0x4c444556, len=4
6,053,093 >>> mbox cmd response data (687 bytes)
6,053,094 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,082,385 UART: [rt]cmd =0x43455246, len=4
6,094,630 >>> mbox cmd response data (887 bytes)
6,094,631 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,123,764 UART: [rt]cmd =0x43455252, len=4
6,134,378 >>> mbox cmd response data (783 bytes)
6,134,379 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,165,046 UART: [rt]cmd =0x53494756, len=196
6,170,418 >>> mbox cmd response data (8 bytes)
6,170,419 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,200,432 UART: [rt]cmd =0x4d454153, len=108
6,221,251 >>> mbox cmd response data (12 bytes)
6,221,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,250,659 UART: [rt]cmd =0x494e464f, len=4
6,254,326 >>> mbox cmd response data (312 bytes)
6,254,327 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,283,834 UART: [rt]cmd =0x54514754, len=24
6,285,768 >>> mbox cmd response data (8 bytes)
6,285,769 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,315,228 UART: [rt]cmd =0x47544744, len=8
6,317,910 >>> mbox cmd response data (104 bytes)
6,317,911 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,347,108 UART: [rt]cmd =0x50435252, len=8
6,348,830 >>> mbox cmd response data (8 bytes)
6,348,831 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,378,228 UART: [rt]cmd =0x50435251, len=36
6,545,669 >>> mbox cmd response data (1848 bytes)
6,545,670 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,575,441 UART: [rt]cmd =0x50435245, len=56
6,578,807 >>> mbox cmd response data (8 bytes)
6,578,808 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,608,351 UART: [rt]cmd =0x44504543, len=20
6,629,316 >>> mbox cmd response data (44 bytes)
6,629,317 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,658,808 UART: [rt]cmd =0x44504543, len=24
6,685,150 >>> mbox cmd response data (40 bytes)
6,685,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,715,086 UART: [rt]cmd =0x44504543, len=96
6,751,950 >>> mbox cmd response data (56 bytes)
6,751,951 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,781,894 UART: [rt]cmd =0x44504543, len=92
7,009,171 >>> mbox cmd response data (6284 bytes)
7,009,172 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,039,543 UART: [rt]cmd =0x44504543, len=136
7,106,572 >>> mbox cmd response data (136 bytes)
7,106,573 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,136,448 UART: [rt]cmd =0x44504543, len=40
7,162,715 >>> mbox cmd response data (40 bytes)
7,162,716 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,192,307 UART: [rt]cmd =0x44504543, len=28
7,235,502 >>> mbox cmd response data (2076 bytes)
7,235,503 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,265,178 UART: [rt]cmd =0x44504543, len=36
7,295,191 >>> mbox cmd response data (24 bytes)
7,295,192 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,324,839 UART: [rt]cmd =0x4453424c, len=4
7,338,742 >>> mbox cmd response data (8 bytes)
7,338,743 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,367,950 UART: [rt]cmd =0x46505344, len=4
7,476,126 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,878 ready_for_fw is high
1,055,878 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,391 >>> mbox cmd response: success
2,622,391 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,684,331 UART:
2,684,347 UART: Running Caliptra FMC ...
2,684,755 UART:
2,684,809 UART: [state] CFI Enabled
2,694,992 UART: [fht] FMC Alias Private Key: 7
2,803,435 UART: [art] Extend RT PCRs Done
2,803,863 UART: [art] Lock RT PCRs Done
2,805,323 UART: [art] Populate DV Done
2,813,546 UART: [fht] FMC Alias Private Key: 7
2,814,576 UART: [art] Derive CDI
2,814,856 UART: [art] Store in in slot 0x4
2,900,851 UART: [art] Derive Key Pair
2,901,211 UART: [art] Store priv key in slot 0x5
2,914,069 UART: [art] Derive Key Pair - Done
2,928,947 UART: [art] Signing Cert with AUTHO
2,929,427 UART: RITY.KEYID = 7
2,944,325 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,090 UART: [art] PUB.X = BCA7C4C9AE86404B8D404024869C872FF05E225F132FC704E103CCCEAD2D5991E801D1A7E2C900AE8F74BBC7B9781B5F
2,951,843 UART: [art] PUB.Y = 3AEA0E364AC1B969874E03BE9A12A5AD9F5EE1863B61E923854F111057F7CD0D9BEB2F593645369C339C292B8227679C
2,958,786 UART: [art] SIG.R = 277BCED6259C0C090C9FCAFEDDAF2D0557A15FB65E8D3B44E49A19BEAD2AFECE2B031E79FC033661308307F9B80878A0
2,965,552 UART: [art] SIG.S = F2E7CBB4EDD2FF3AA8289FCC32B9C52CE97E21ADF606FF269A7957D71EDFC4A445262D5B581B886B205EC118521D14EE
2,989,222 UART: Caliptra RT
2,989,475 UART: [state] CFI Enabled
3,097,372 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,788 UART: [rt]cmd =0x46505652, len=4
3,128,448 UART: [rt] FIPS Version
3,129,541 >>> mbox cmd response data (36 bytes)
3,129,542 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,961 UART: [rt]cmd =0x46504c54, len=4
3,160,205 >>> mbox cmd response data (8 bytes)
3,160,206 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,189,875 UART: [rt]cmd =0x46504c67, len=4
3,190,975 >>> mbox cmd response: failed
3,191,149 UART: [rt] FIPS self test
3,191,480 UART: [kat] ++
3,191,632 UART: [kat] sha1
3,195,783 UART: [kat] SHA2-256
3,197,713 UART: [kat] SHA2-384
3,200,604 UART: [kat] SHA2-512-ACC
3,202,499 UART: [kat] ECC-384
3,212,402 UART: [kat] HMAC-384Kdf
3,217,101 UART: [kat] LMS
3,465,992 UART: [kat] --
5,585,820 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,590,735 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,620,213 UART: [rt]cmd =0x46504c67, len=4
5,621,340 >>> mbox cmd response data (8 bytes)
5,621,341 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,650,814 UART: [rt]cmd =0x49444543, len=4
5,657,306 >>> mbox cmd response data (37 bytes)
5,657,307 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,686,538 UART: [rt]cmd =0x49444549, len=4
5,688,887 >>> mbox cmd response data (104 bytes)
5,688,888 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,718,251 UART: [rt]cmd =0x49444550, len=4
5,728,257 >>> mbox cmd response data (8 bytes)
5,728,258 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,757,681 UART: [rt]cmd =0x4c444556, len=4
5,768,138 >>> mbox cmd response data (687 bytes)
5,768,139 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,797,502 UART: [rt]cmd =0x43455246, len=4
5,809,649 >>> mbox cmd response data (887 bytes)
5,809,650 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,839,193 UART: [rt]cmd =0x43455252, len=4
5,850,017 >>> mbox cmd response data (783 bytes)
5,850,018 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,880,571 UART: [rt]cmd =0x53494756, len=196
5,885,955 >>> mbox cmd response data (8 bytes)
5,885,956 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,916,197 UART: [rt]cmd =0x4d454153, len=108
5,937,146 >>> mbox cmd response data (12 bytes)
5,937,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,966,264 UART: [rt]cmd =0x494e464f, len=4
5,970,031 >>> mbox cmd response data (312 bytes)
5,970,032 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,999,459 UART: [rt]cmd =0x54514754, len=24
6,001,501 >>> mbox cmd response data (8 bytes)
6,001,502 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,030,883 UART: [rt]cmd =0x47544744, len=8
6,033,199 >>> mbox cmd response data (104 bytes)
6,033,200 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,062,551 UART: [rt]cmd =0x50435252, len=8
6,063,883 >>> mbox cmd response data (8 bytes)
6,063,884 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,093,405 UART: [rt]cmd =0x50435251, len=36
6,260,516 >>> mbox cmd response data (1848 bytes)
6,260,517 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,290,284 UART: [rt]cmd =0x50435245, len=56
6,293,972 >>> mbox cmd response data (8 bytes)
6,293,973 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,323,532 UART: [rt]cmd =0x44504543, len=20
6,344,501 >>> mbox cmd response data (44 bytes)
6,344,502 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,373,887 UART: [rt]cmd =0x44504543, len=24
6,399,881 >>> mbox cmd response data (40 bytes)
6,399,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,429,907 UART: [rt]cmd =0x44504543, len=96
6,466,463 >>> mbox cmd response data (56 bytes)
6,466,464 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,496,603 UART: [rt]cmd =0x44504543, len=92
6,725,104 >>> mbox cmd response data (6284 bytes)
6,725,105 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,755,438 UART: [rt]cmd =0x44504543, len=136
6,822,199 >>> mbox cmd response data (136 bytes)
6,822,200 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,851,849 UART: [rt]cmd =0x44504543, len=40
6,877,950 >>> mbox cmd response data (40 bytes)
6,877,951 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,907,556 UART: [rt]cmd =0x44504543, len=28
6,950,589 >>> mbox cmd response data (2076 bytes)
6,950,590 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,979,985 UART: [rt]cmd =0x44504543, len=36
7,010,284 >>> mbox cmd response data (24 bytes)
7,010,285 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,039,618 UART: [rt]cmd =0x4453424c, len=4
7,052,683 >>> mbox cmd response data (8 bytes)
7,052,684 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,081,949 UART: [rt]cmd =0x46505344, len=4
7,190,315 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,654 UART: [kat] ++
895,806 UART: [kat] sha1
899,948 UART: [kat] SHA2-256
901,888 UART: [kat] SHA2-384
904,655 UART: [kat] SHA2-512-ACC
906,556 UART: [kat] ECC-384
916,359 UART: [kat] HMAC-384Kdf
920,929 UART: [kat] LMS
1,169,241 UART: [kat] --
1,170,026 UART: [cold-reset] ++
1,170,494 UART: [fht] FHT @ 0x50003400
1,172,912 UART: [idev] ++
1,173,080 UART: [idev] CDI.KEYID = 6
1,173,441 UART: [idev] SUBJECT.KEYID = 7
1,173,866 UART: [idev] UDS.KEYID = 0
1,174,212 ready_for_fw is high
1,174,212 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,140 UART: [idev] Erasing UDS.KEYID = 0
1,199,144 UART: [idev] Sha1 KeyId Algorithm
1,207,846 UART: [idev] --
1,208,855 UART: [ldev] ++
1,209,023 UART: [ldev] CDI.KEYID = 6
1,209,387 UART: [ldev] SUBJECT.KEYID = 5
1,209,814 UART: [ldev] AUTHORITY.KEYID = 7
1,210,277 UART: [ldev] FE.KEYID = 1
1,215,385 UART: [ldev] Erasing FE.KEYID = 1
1,242,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,851 UART: [ldev] --
1,281,279 UART: [fwproc] Wait for Commands...
1,281,922 UART: [fwproc] Recv command 0x46574c44
1,282,655 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,317 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,626 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,496 >>> mbox cmd response: success
2,774,496 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,627 UART: [afmc] ++
2,775,795 UART: [afmc] CDI.KEYID = 6
2,776,158 UART: [afmc] SUBJECT.KEYID = 7
2,776,584 UART: [afmc] AUTHORITY.KEYID = 5
2,812,131 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,479 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,230 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,959 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,842 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,561 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,336 UART: [afmc] --
2,855,290 UART: [cold-reset] --
2,856,114 UART: [state] Locking Datavault
2,857,053 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,657 UART: [state] Locking ICCM
2,858,187 UART: [exit] Launching FMC @ 0x40000130
2,863,516 UART:
2,863,532 UART: Running Caliptra FMC ...
2,863,940 UART:
2,864,083 UART: [state] CFI Enabled
2,874,450 UART: [fht] FMC Alias Private Key: 7
2,983,113 UART: [art] Extend RT PCRs Done
2,983,541 UART: [art] Lock RT PCRs Done
2,985,149 UART: [art] Populate DV Done
2,993,012 UART: [fht] FMC Alias Private Key: 7
2,994,020 UART: [art] Derive CDI
2,994,300 UART: [art] Store in in slot 0x4
3,079,809 UART: [art] Derive Key Pair
3,080,169 UART: [art] Store priv key in slot 0x5
3,093,873 UART: [art] Derive Key Pair - Done
3,108,407 UART: [art] Signing Cert with AUTHO
3,108,887 UART: RITY.KEYID = 7
3,123,959 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,724 UART: [art] PUB.X = 86A25166D3A97038AAFA118620CAEF65F74A9D7D148C0D007D7EB59CA2001574320E7F6B6B69C8CF6C96E155F7091830
3,131,443 UART: [art] PUB.Y = 7C2E29DC3AE61E3D65C9E16A9A67A7169DF9966C946D38482A6A778DA19B36857AAC76AA45F3C9B1F6616CD22BE5B30E
3,138,402 UART: [art] SIG.R = E1E181A2CE346EE61F50883128E6EC9930D1EF58277D967A3427CAAD8997C273262207C753118C99779F328FC2C8F3F3
3,145,165 UART: [art] SIG.S = 821C917164F08004E92C861AD44276C91A41F270D5924C12440392B224D399DC14808E8B3D87F1E14D55B780EB6ED89D
3,168,282 UART: Caliptra RT
3,168,627 UART: [state] CFI Enabled
3,276,159 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,375 UART: [rt]cmd =0x46505652, len=4
3,307,035 UART: [rt] FIPS Version
3,308,090 >>> mbox cmd response data (36 bytes)
3,308,091 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,506 UART: [rt]cmd =0x46504c54, len=4
3,338,710 >>> mbox cmd response data (8 bytes)
3,338,711 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,368,536 UART: [rt]cmd =0x46504c67, len=4
3,369,516 >>> mbox cmd response: failed
3,369,814 UART: [rt] FIPS self test
3,370,145 UART: [kat] ++
3,370,297 UART: [kat] sha1
3,374,400 UART: [kat] SHA2-256
3,376,330 UART: [kat] SHA2-384
3,378,947 UART: [kat] SHA2-512-ACC
3,380,842 UART: [kat] ECC-384
3,390,405 UART: [kat] HMAC-384Kdf
3,395,016 UART: [kat] LMS
3,643,907 UART: [kat] --
5,870,423 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,879,265 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,908,611 UART: [rt]cmd =0x46504c67, len=4
5,909,854 >>> mbox cmd response data (8 bytes)
5,909,855 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,939,324 UART: [rt]cmd =0x49444543, len=4
5,945,794 >>> mbox cmd response data (37 bytes)
5,945,795 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,975,164 UART: [rt]cmd =0x49444549, len=4
5,977,455 >>> mbox cmd response data (104 bytes)
5,977,456 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,006,999 UART: [rt]cmd =0x49444550, len=4
6,017,252 >>> mbox cmd response data (8 bytes)
6,017,253 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,046,500 UART: [rt]cmd =0x4c444556, len=4
6,056,993 >>> mbox cmd response data (687 bytes)
6,056,994 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,086,239 UART: [rt]cmd =0x43455246, len=4
6,098,256 >>> mbox cmd response data (887 bytes)
6,098,257 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,127,628 UART: [rt]cmd =0x43455252, len=4
6,138,291 >>> mbox cmd response data (784 bytes)
6,138,292 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,168,997 UART: [rt]cmd =0x53494756, len=196
6,174,155 >>> mbox cmd response data (8 bytes)
6,174,156 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,203,919 UART: [rt]cmd =0x4d454153, len=108
6,224,280 >>> mbox cmd response data (12 bytes)
6,224,281 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,253,564 UART: [rt]cmd =0x494e464f, len=4
6,257,115 >>> mbox cmd response data (312 bytes)
6,257,116 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,286,673 UART: [rt]cmd =0x54514754, len=24
6,288,937 >>> mbox cmd response data (8 bytes)
6,288,938 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,318,331 UART: [rt]cmd =0x47544744, len=8
6,321,063 >>> mbox cmd response data (104 bytes)
6,321,064 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,350,541 UART: [rt]cmd =0x50435252, len=8
6,352,017 >>> mbox cmd response data (8 bytes)
6,352,018 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,381,529 UART: [rt]cmd =0x50435251, len=36
6,549,074 >>> mbox cmd response data (1848 bytes)
6,549,075 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,578,606 UART: [rt]cmd =0x50435245, len=56
6,582,162 >>> mbox cmd response data (8 bytes)
6,582,163 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,611,518 UART: [rt]cmd =0x44504543, len=20
6,631,963 >>> mbox cmd response data (44 bytes)
6,631,964 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,661,627 UART: [rt]cmd =0x44504543, len=24
6,688,141 >>> mbox cmd response data (40 bytes)
6,688,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,717,915 UART: [rt]cmd =0x44504543, len=96
6,755,497 >>> mbox cmd response data (56 bytes)
6,755,498 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,785,431 UART: [rt]cmd =0x44504543, len=92
7,014,036 >>> mbox cmd response data (6284 bytes)
7,014,037 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,043,982 UART: [rt]cmd =0x44504543, len=136
7,110,843 >>> mbox cmd response data (136 bytes)
7,110,844 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,140,567 UART: [rt]cmd =0x44504543, len=40
7,167,140 >>> mbox cmd response data (40 bytes)
7,167,141 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,196,656 UART: [rt]cmd =0x44504543, len=28
7,239,609 >>> mbox cmd response data (2076 bytes)
7,239,610 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,269,433 UART: [rt]cmd =0x44504543, len=36
7,299,620 >>> mbox cmd response data (24 bytes)
7,299,621 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,328,880 UART: [rt]cmd =0x4453424c, len=4
7,342,839 >>> mbox cmd response data (8 bytes)
7,342,840 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,372,261 UART: [rt]cmd =0x46505344, len=4
7,480,541 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,813 ready_for_fw is high
1,056,813 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,624,038 >>> mbox cmd response: success
2,624,038 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,685,716 UART:
2,685,732 UART: Running Caliptra FMC ...
2,686,140 UART:
2,686,283 UART: [state] CFI Enabled
2,697,026 UART: [fht] FMC Alias Private Key: 7
2,804,627 UART: [art] Extend RT PCRs Done
2,805,055 UART: [art] Lock RT PCRs Done
2,806,509 UART: [art] Populate DV Done
2,814,752 UART: [fht] FMC Alias Private Key: 7
2,815,776 UART: [art] Derive CDI
2,816,056 UART: [art] Store in in slot 0x4
2,902,145 UART: [art] Derive Key Pair
2,902,505 UART: [art] Store priv key in slot 0x5
2,916,199 UART: [art] Derive Key Pair - Done
2,931,023 UART: [art] Signing Cert with AUTHO
2,931,503 UART: RITY.KEYID = 7
2,946,451 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,216 UART: [art] PUB.X = 6DE543CB451BE7C507618618DC259FB3E5378CF09BB0E3DEC26E8E02A6082E7AA5D2941E599D609D795C3B67D8A05C2E
2,953,987 UART: [art] PUB.Y = F6B137A44EBF8C267C78C0F6755FE4B853543ED60A47FD74ABE6AD40548BD963205619E7E33AC83F600F31B7D5E6B9C2
2,960,941 UART: [art] SIG.R = 590C9E2737090221DE437130DB8F7C3594E41C4A8E594C4188F0BC8D065E932EA8B4108E51268777549C6850BE335C23
2,967,689 UART: [art] SIG.S = EFF97835FED972AD86DEAB56C5CC0DC25D05CE6E4D16A701F4274BB814F165BCD33C24E2215A533DDF99236AABF769EB
2,991,407 UART: Caliptra RT
2,991,752 UART: [state] CFI Enabled
3,099,393 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,025 UART: [rt]cmd =0x46505652, len=4
3,130,685 UART: [rt] FIPS Version
3,131,670 >>> mbox cmd response data (36 bytes)
3,131,671 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,062 UART: [rt]cmd =0x46504c54, len=4
3,162,154 >>> mbox cmd response data (8 bytes)
3,162,155 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,192,010 UART: [rt]cmd =0x46504c67, len=4
3,193,058 >>> mbox cmd response: failed
3,193,254 UART: [rt] FIPS self test
3,193,585 UART: [kat] ++
3,193,737 UART: [kat] sha1
3,197,854 UART: [kat] SHA2-256
3,199,784 UART: [kat] SHA2-384
3,202,491 UART: [kat] SHA2-512-ACC
3,204,386 UART: [kat] ECC-384
3,214,353 UART: [kat] HMAC-384Kdf
3,219,070 UART: [kat] LMS
3,467,961 UART: [kat] --
5,587,771 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,592,818 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,622,026 UART: [rt]cmd =0x46504c67, len=4
5,623,211 >>> mbox cmd response data (8 bytes)
5,623,212 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,652,527 UART: [rt]cmd =0x49444543, len=4
5,658,985 >>> mbox cmd response data (37 bytes)
5,658,986 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,688,307 UART: [rt]cmd =0x49444549, len=4
5,690,656 >>> mbox cmd response data (104 bytes)
5,690,657 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,720,110 UART: [rt]cmd =0x49444550, len=4
5,730,276 >>> mbox cmd response data (8 bytes)
5,730,277 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,759,478 UART: [rt]cmd =0x4c444556, len=4
5,769,905 >>> mbox cmd response data (687 bytes)
5,769,906 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,799,353 UART: [rt]cmd =0x43455246, len=4
5,811,192 >>> mbox cmd response data (887 bytes)
5,811,193 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,840,562 UART: [rt]cmd =0x43455252, len=4
5,851,272 >>> mbox cmd response data (783 bytes)
5,851,273 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,881,790 UART: [rt]cmd =0x53494756, len=196
5,887,364 >>> mbox cmd response data (8 bytes)
5,887,365 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,917,490 UART: [rt]cmd =0x4d454153, len=108
5,938,345 >>> mbox cmd response data (12 bytes)
5,938,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,967,729 UART: [rt]cmd =0x494e464f, len=4
5,971,512 >>> mbox cmd response data (312 bytes)
5,971,513 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,000,982 UART: [rt]cmd =0x54514754, len=24
6,003,258 >>> mbox cmd response data (8 bytes)
6,003,259 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,032,858 UART: [rt]cmd =0x47544744, len=8
6,035,484 >>> mbox cmd response data (104 bytes)
6,035,485 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,065,004 UART: [rt]cmd =0x50435252, len=8
6,066,494 >>> mbox cmd response data (8 bytes)
6,066,495 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,096,190 UART: [rt]cmd =0x50435251, len=36
6,263,751 >>> mbox cmd response data (1848 bytes)
6,263,752 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,293,399 UART: [rt]cmd =0x50435245, len=56
6,296,913 >>> mbox cmd response data (8 bytes)
6,296,914 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,326,317 UART: [rt]cmd =0x44504543, len=20
6,347,148 >>> mbox cmd response data (44 bytes)
6,347,149 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,376,642 UART: [rt]cmd =0x44504543, len=24
6,403,460 >>> mbox cmd response data (40 bytes)
6,403,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,433,268 UART: [rt]cmd =0x44504543, len=96
6,471,136 >>> mbox cmd response data (56 bytes)
6,471,137 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,501,292 UART: [rt]cmd =0x44504543, len=92
6,729,254 >>> mbox cmd response data (6284 bytes)
6,729,255 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,759,332 UART: [rt]cmd =0x44504543, len=136
6,825,635 >>> mbox cmd response data (136 bytes)
6,825,636 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,855,387 UART: [rt]cmd =0x44504543, len=40
6,881,384 >>> mbox cmd response data (40 bytes)
6,881,385 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,911,076 UART: [rt]cmd =0x44504543, len=28
6,954,231 >>> mbox cmd response data (2076 bytes)
6,954,232 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,983,933 UART: [rt]cmd =0x44504543, len=36
7,013,742 >>> mbox cmd response data (24 bytes)
7,013,743 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,042,830 UART: [rt]cmd =0x4453424c, len=4
7,057,115 >>> mbox cmd response data (8 bytes)
7,057,116 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,086,419 UART: [rt]cmd =0x46505344, len=4
7,194,513 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,734 UART: [state] LifecycleState = Unprovisioned
86,389 UART: [state] DebugLocked = No
86,907 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,385 UART: [kat] SHA2-256
882,316 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,431 UART: [kat] ++
886,583 UART: [kat] sha1
890,721 UART: [kat] SHA2-256
892,659 UART: [kat] SHA2-384
895,436 UART: [kat] SHA2-512-ACC
897,337 UART: [kat] ECC-384
902,712 UART: [kat] HMAC-384Kdf
907,314 UART: [kat] LMS
1,475,510 UART: [kat] --
1,476,461 UART: [cold-reset] ++
1,476,789 UART: [fht] Storing FHT @ 0x50003400
1,479,492 UART: [idev] ++
1,479,660 UART: [idev] CDI.KEYID = 6
1,480,020 UART: [idev] SUBJECT.KEYID = 7
1,480,444 UART: [idev] UDS.KEYID = 0
1,480,789 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,488,684 UART: [idev] Erasing UDS.KEYID = 0
1,505,358 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,078 UART: [idev] --
1,515,031 UART: [ldev] ++
1,515,199 UART: [ldev] CDI.KEYID = 6
1,515,562 UART: [ldev] SUBJECT.KEYID = 5
1,515,988 UART: [ldev] AUTHORITY.KEYID = 7
1,516,451 UART: [ldev] FE.KEYID = 1
1,521,499 UART: [ldev] Erasing FE.KEYID = 1
1,546,828 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,858 UART: [ldev] --
1,586,159 UART: [fwproc] Waiting for Commands...
1,586,950 UART: [fwproc] Received command 0x46504c54
1,587,857 UART: [kat] SHA2-256
2,381,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,385,903 UART: [kat] ++
2,386,055 UART: [kat] sha1
2,390,209 UART: [kat] SHA2-256
2,392,147 UART: [kat] SHA2-384
2,394,908 UART: [kat] SHA2-512-ACC
2,396,808 UART: [kat] ECC-384
2,402,505 UART: [kat] HMAC-384Kdf
2,406,965 UART: [kat] LMS
2,975,161 UART: [kat] --
2,975,399 >>> mbox cmd response data (8 bytes)
2,975,400 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,975,682 UART: [fwproc] Received command 0x46504c67
2,976,636 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,429 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,716,315 >>> mbox cmd response data (8 bytes)
2,716,316 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,716,650 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Unprovisioned
85,730 UART: [state] DebugLocked = No
86,328 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,018 UART: [kat] SHA2-256
881,949 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,064 UART: [kat] ++
886,216 UART: [kat] sha1
890,340 UART: [kat] SHA2-256
892,278 UART: [kat] SHA2-384
894,965 UART: [kat] SHA2-512-ACC
896,866 UART: [kat] ECC-384
902,429 UART: [kat] HMAC-384Kdf
906,925 UART: [kat] LMS
1,475,121 UART: [kat] --
1,475,902 UART: [cold-reset] ++
1,476,440 UART: [fht] Storing FHT @ 0x50003400
1,479,125 UART: [idev] ++
1,479,293 UART: [idev] CDI.KEYID = 6
1,479,653 UART: [idev] SUBJECT.KEYID = 7
1,480,077 UART: [idev] UDS.KEYID = 0
1,480,422 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,488,155 UART: [idev] Erasing UDS.KEYID = 0
1,504,983 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,419 UART: [idev] --
1,514,462 UART: [ldev] ++
1,514,630 UART: [ldev] CDI.KEYID = 6
1,514,993 UART: [ldev] SUBJECT.KEYID = 5
1,515,419 UART: [ldev] AUTHORITY.KEYID = 7
1,515,882 UART: [ldev] FE.KEYID = 1
1,520,984 UART: [ldev] Erasing FE.KEYID = 1
1,546,811 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,417 UART: [ldev] --
1,585,930 UART: [fwproc] Waiting for Commands...
1,586,605 UART: [fwproc] Received command 0x46504c54
1,587,512 UART: [kat] SHA2-256
2,381,443 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,385,558 UART: [kat] ++
2,385,710 UART: [kat] sha1
2,389,768 UART: [kat] SHA2-256
2,391,706 UART: [kat] SHA2-384
2,394,549 UART: [kat] SHA2-512-ACC
2,396,449 UART: [kat] ECC-384
2,402,074 UART: [kat] HMAC-384Kdf
2,406,768 UART: [kat] LMS
2,974,964 UART: [kat] --
2,975,202 >>> mbox cmd response data (8 bytes)
2,975,203 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,975,507 UART: [fwproc] Received command 0x46504c67
2,976,461 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,528 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,717,198 >>> mbox cmd response data (8 bytes)
2,717,199 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,717,565 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,523 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
893,492 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,617 UART: [kat] ++
897,769 UART: [kat] sha1
901,901 UART: [kat] SHA2-256
903,841 UART: [kat] SHA2-384
906,650 UART: [kat] SHA2-512-ACC
908,551 UART: [kat] ECC-384
918,266 UART: [kat] HMAC-384Kdf
923,034 UART: [kat] LMS
1,171,362 UART: [kat] --
1,172,285 UART: [cold-reset] ++
1,172,713 UART: [fht] FHT @ 0x50003400
1,175,234 UART: [idev] ++
1,175,402 UART: [idev] CDI.KEYID = 6
1,175,762 UART: [idev] SUBJECT.KEYID = 7
1,176,186 UART: [idev] UDS.KEYID = 0
1,176,531 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,184,190 UART: [idev] Erasing UDS.KEYID = 0
1,201,163 UART: [idev] Sha1 KeyId Algorithm
1,209,685 UART: [idev] --
1,210,705 UART: [ldev] ++
1,210,873 UART: [ldev] CDI.KEYID = 6
1,211,236 UART: [ldev] SUBJECT.KEYID = 5
1,211,662 UART: [ldev] AUTHORITY.KEYID = 7
1,212,125 UART: [ldev] FE.KEYID = 1
1,217,383 UART: [ldev] Erasing FE.KEYID = 1
1,243,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,681 UART: [ldev] --
1,283,096 UART: [fwproc] Wait for Commands...
1,283,698 UART: [fwproc] Recv command 0x46504c54
1,284,544 UART: [kat] SHA2-256
2,090,194 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,094,319 UART: [kat] ++
2,094,471 UART: [kat] sha1
2,098,749 UART: [kat] SHA2-256
2,100,689 UART: [kat] SHA2-384
2,103,434 UART: [kat] SHA2-512-ACC
2,105,334 UART: [kat] ECC-384
2,115,453 UART: [kat] HMAC-384Kdf
2,119,973 UART: [kat] LMS
2,368,301 UART: [kat] --
2,368,539 >>> mbox cmd response data (8 bytes)
2,368,540 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,368,717 UART: [fwproc] Recv command 0x46504c67
2,369,610 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,007 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,110,796 >>> mbox cmd response data (8 bytes)
2,110,797 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,111,181 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,826 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
893,605 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,730 UART: [kat] ++
897,882 UART: [kat] sha1
902,208 UART: [kat] SHA2-256
904,148 UART: [kat] SHA2-384
907,005 UART: [kat] SHA2-512-ACC
908,906 UART: [kat] ECC-384
918,653 UART: [kat] HMAC-384Kdf
923,291 UART: [kat] LMS
1,171,619 UART: [kat] --
1,172,494 UART: [cold-reset] ++
1,172,834 UART: [fht] FHT @ 0x50003400
1,175,503 UART: [idev] ++
1,175,671 UART: [idev] CDI.KEYID = 6
1,176,031 UART: [idev] SUBJECT.KEYID = 7
1,176,455 UART: [idev] UDS.KEYID = 0
1,176,800 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,184,389 UART: [idev] Erasing UDS.KEYID = 0
1,201,324 UART: [idev] Sha1 KeyId Algorithm
1,209,704 UART: [idev] --
1,210,698 UART: [ldev] ++
1,210,866 UART: [ldev] CDI.KEYID = 6
1,211,229 UART: [ldev] SUBJECT.KEYID = 5
1,211,655 UART: [ldev] AUTHORITY.KEYID = 7
1,212,118 UART: [ldev] FE.KEYID = 1
1,217,356 UART: [ldev] Erasing FE.KEYID = 1
1,242,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,872 UART: [ldev] --
1,282,263 UART: [fwproc] Wait for Commands...
1,283,051 UART: [fwproc] Recv command 0x46504c54
1,283,897 UART: [kat] SHA2-256
2,089,547 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,093,672 UART: [kat] ++
2,093,824 UART: [kat] sha1
2,098,176 UART: [kat] SHA2-256
2,100,116 UART: [kat] SHA2-384
2,102,887 UART: [kat] SHA2-512-ACC
2,104,787 UART: [kat] ECC-384
2,114,558 UART: [kat] HMAC-384Kdf
2,119,218 UART: [kat] LMS
2,367,546 UART: [kat] --
2,367,784 >>> mbox cmd response data (8 bytes)
2,367,785 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,367,986 UART: [fwproc] Recv command 0x46504c67
2,368,879 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,552 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,112,439 >>> mbox cmd response data (8 bytes)
2,112,440 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,112,886 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
891,074 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,203 UART: [kat] ++
895,355 UART: [kat] sha1
899,497 UART: [kat] SHA2-256
901,437 UART: [kat] SHA2-384
904,054 UART: [kat] SHA2-512-ACC
905,955 UART: [kat] ECC-384
915,830 UART: [kat] HMAC-384Kdf
920,322 UART: [kat] LMS
1,168,634 UART: [kat] --
1,169,493 UART: [cold-reset] ++
1,169,873 UART: [fht] FHT @ 0x50003400
1,172,529 UART: [idev] ++
1,172,697 UART: [idev] CDI.KEYID = 6
1,173,058 UART: [idev] SUBJECT.KEYID = 7
1,173,483 UART: [idev] UDS.KEYID = 0
1,173,829 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,181,723 UART: [idev] Erasing UDS.KEYID = 0
1,198,769 UART: [idev] Sha1 KeyId Algorithm
1,207,633 UART: [idev] --
1,208,606 UART: [ldev] ++
1,208,774 UART: [ldev] CDI.KEYID = 6
1,209,138 UART: [ldev] SUBJECT.KEYID = 5
1,209,565 UART: [ldev] AUTHORITY.KEYID = 7
1,210,028 UART: [ldev] FE.KEYID = 1
1,215,258 UART: [ldev] Erasing FE.KEYID = 1
1,240,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,370 UART: [ldev] --
1,279,726 UART: [fwproc] Wait for Commands...
1,280,459 UART: [fwproc] Recv command 0x46504c54
1,281,313 UART: [kat] SHA2-256
2,084,863 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,088,992 UART: [kat] ++
2,089,144 UART: [kat] sha1
2,093,194 UART: [kat] SHA2-256
2,095,134 UART: [kat] SHA2-384
2,097,917 UART: [kat] SHA2-512-ACC
2,099,817 UART: [kat] ECC-384
2,109,310 UART: [kat] HMAC-384Kdf
2,113,852 UART: [kat] LMS
2,362,164 UART: [kat] --
2,362,405 >>> mbox cmd response data (8 bytes)
2,362,406 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,362,676 UART: [fwproc] Recv command 0x46504c67
2,363,580 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,818 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,104,307 >>> mbox cmd response data (8 bytes)
2,104,308 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,104,706 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,454 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
891,287 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
899,996 UART: [kat] SHA2-256
901,936 UART: [kat] SHA2-384
904,891 UART: [kat] SHA2-512-ACC
906,792 UART: [kat] ECC-384
916,319 UART: [kat] HMAC-384Kdf
921,005 UART: [kat] LMS
1,169,317 UART: [kat] --
1,170,238 UART: [cold-reset] ++
1,170,678 UART: [fht] FHT @ 0x50003400
1,173,354 UART: [idev] ++
1,173,522 UART: [idev] CDI.KEYID = 6
1,173,883 UART: [idev] SUBJECT.KEYID = 7
1,174,308 UART: [idev] UDS.KEYID = 0
1,174,654 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,182,206 UART: [idev] Erasing UDS.KEYID = 0
1,199,246 UART: [idev] Sha1 KeyId Algorithm
1,208,304 UART: [idev] --
1,209,417 UART: [ldev] ++
1,209,585 UART: [ldev] CDI.KEYID = 6
1,209,949 UART: [ldev] SUBJECT.KEYID = 5
1,210,376 UART: [ldev] AUTHORITY.KEYID = 7
1,210,839 UART: [ldev] FE.KEYID = 1
1,216,197 UART: [ldev] Erasing FE.KEYID = 1
1,242,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,377 UART: [ldev] --
1,281,703 UART: [fwproc] Wait for Commands...
1,282,400 UART: [fwproc] Recv command 0x46504c54
1,283,254 UART: [kat] SHA2-256
2,086,804 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,090,933 UART: [kat] ++
2,091,085 UART: [kat] sha1
2,095,275 UART: [kat] SHA2-256
2,097,215 UART: [kat] SHA2-384
2,099,982 UART: [kat] SHA2-512-ACC
2,101,882 UART: [kat] ECC-384
2,111,299 UART: [kat] HMAC-384Kdf
2,115,867 UART: [kat] LMS
2,364,179 UART: [kat] --
2,364,420 >>> mbox cmd response data (8 bytes)
2,364,421 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,364,657 UART: [fwproc] Recv command 0x46504c67
2,365,561 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,985 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,105,818 >>> mbox cmd response data (8 bytes)
2,105,819 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,106,157 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,848 UART: [state] LifecycleState = Unprovisioned
85,503 UART: [state] DebugLocked = No
86,191 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,667 UART: [kat] SHA2-256
881,598 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,713 UART: [kat] ++
885,865 UART: [kat] sha1
889,999 UART: [kat] SHA2-256
891,937 UART: [kat] SHA2-384
894,752 UART: [kat] SHA2-512-ACC
896,653 UART: [kat] ECC-384
902,052 UART: [kat] HMAC-384Kdf
906,554 UART: [kat] LMS
1,474,750 UART: [kat] --
1,475,543 UART: [cold-reset] ++
1,475,901 UART: [fht] Storing FHT @ 0x50003400
1,478,910 UART: [idev] ++
1,479,078 UART: [idev] CDI.KEYID = 6
1,479,438 UART: [idev] SUBJECT.KEYID = 7
1,479,862 UART: [idev] UDS.KEYID = 0
1,480,207 ready_for_fw is high
1,480,207 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,487,792 UART: [idev] Erasing UDS.KEYID = 0
1,504,646 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,451 UART: [ldev] ++
1,514,619 UART: [ldev] CDI.KEYID = 6
1,514,982 UART: [ldev] SUBJECT.KEYID = 5
1,515,408 UART: [ldev] AUTHORITY.KEYID = 7
1,515,871 UART: [ldev] FE.KEYID = 1
1,521,053 UART: [ldev] Erasing FE.KEYID = 1
1,546,462 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,262 UART: [ldev] --
1,585,585 UART: [fwproc] Waiting for Commands...
1,586,370 UART: [fwproc] Received command 0x46574c44
1,587,161 UART: [fwproc] Received Image of size 114332 bytes
2,885,213 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,519 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,871 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,077,846 >>> mbox cmd response: success
3,077,846 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,079,016 UART: [afmc] ++
3,079,184 UART: [afmc] CDI.KEYID = 6
3,079,546 UART: [afmc] SUBJECT.KEYID = 7
3,079,971 UART: [afmc] AUTHORITY.KEYID = 5
3,115,540 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,944 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,724 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,452 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,337 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,027 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,990 UART: [afmc] --
3,158,892 UART: [cold-reset] --
3,159,822 UART: [state] Locking Datavault
3,160,783 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,387 UART: [state] Locking ICCM
3,162,043 UART: [exit] Launching FMC @ 0x40000130
3,167,372 UART:
3,167,388 UART: Running Caliptra FMC ...
3,167,796 UART:
3,167,850 UART: [state] CFI Enabled
3,178,507 UART: [fht] FMC Alias Private Key: 7
3,286,012 UART: [art] Extend RT PCRs Done
3,286,440 UART: [art] Lock RT PCRs Done
3,288,220 UART: [art] Populate DV Done
3,296,275 UART: [fht] FMC Alias Private Key: 7
3,297,383 UART: [art] Derive CDI
3,297,663 UART: [art] Store in in slot 0x4
3,383,292 UART: [art] Derive Key Pair
3,383,652 UART: [art] Store priv key in slot 0x5
3,396,468 UART: [art] Derive Key Pair - Done
3,411,276 UART: [art] Signing Cert with AUTHO
3,411,756 UART: RITY.KEYID = 7
3,426,754 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,519 UART: [art] PUB.X = 3A2E6C91ABAA658AA03D5013328127114142E99FFB1E2E8941B408E9CA5483618CA8832AA152698D1E3F472545A10D36
3,434,279 UART: [art] PUB.Y = 813D09855BEE57EC28BBD2D3F5E5FCF8033EE10BCACB8C165700D44C2F586B019F3BD2E8660FEBAE56457C320E0CC21B
3,441,206 UART: [art] SIG.R = 4C85AC822B350E0BAFD0127A7C6FB61C1018AB4F908E900003655E4060FA6EE62BE64C9FEDCFD339FCBBF55EFFC1B5BC
3,447,971 UART: [art] SIG.S = 29847198B08708457138DD60388D289FC91E7B33C6AF6461FD881BA48C1A36F35CABE0295136962022E23C79AD9A6DA0
3,471,557 UART: Caliptra RT
3,471,810 UART: [state] CFI Enabled
3,580,066 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,718 UART: [rt]cmd =0x46504c54, len=4
3,611,812 >>> mbox cmd response data (8 bytes)
3,611,813 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,641,462 UART: [rt]cmd =0x46504c67, len=4
3,642,412 >>> mbox cmd response: failed
3,642,580 UART: [rt] FIPS self test
3,642,911 UART: [kat] ++
3,643,063 UART: [kat] sha1
3,647,414 UART: [kat] SHA2-256
3,649,344 UART: [kat] SHA2-384
3,652,045 UART: [kat] SHA2-512-ACC
3,653,940 UART: [kat] ECC-384
3,663,339 UART: [kat] HMAC-384Kdf
3,667,712 UART: [kat] LMS
3,916,603 UART: [kat] --
6,134,733 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,142,162 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,171,462 UART: [rt]cmd =0x46504c67, len=4
6,172,633 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,909 ready_for_fw is high
1,362,909 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,796 >>> mbox cmd response: success
2,927,796 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,989,212 UART:
2,989,228 UART: Running Caliptra FMC ...
2,989,636 UART:
2,989,690 UART: [state] CFI Enabled
2,999,945 UART: [fht] FMC Alias Private Key: 7
3,107,824 UART: [art] Extend RT PCRs Done
3,108,252 UART: [art] Lock RT PCRs Done
3,110,052 UART: [art] Populate DV Done
3,118,487 UART: [fht] FMC Alias Private Key: 7
3,119,589 UART: [art] Derive CDI
3,119,869 UART: [art] Store in in slot 0x4
3,206,092 UART: [art] Derive Key Pair
3,206,452 UART: [art] Store priv key in slot 0x5
3,219,788 UART: [art] Derive Key Pair - Done
3,234,832 UART: [art] Signing Cert with AUTHO
3,235,312 UART: RITY.KEYID = 7
3,250,742 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,507 UART: [art] PUB.X = 5D4E1ED2A3468D37176DFEE541CBB1C1057885F1A76E36B2B7CD7A0803F3FE8A4362AE22A8B4EDF0B775BC048C3ACCF5
3,258,285 UART: [art] PUB.Y = B1A34ACC14DE35C108ED011E4BB3785B34D171584B8FA40B520F4956A625FFEA8E7DEBCFCB2CBFE07DF169DC214DA6C7
3,265,249 UART: [art] SIG.R = 7259BD5BF2EA9B2EAD4AA369DA80CB02AA1D1115D79CABBE6755705E5904BCCED5587DD4FF17A7266CC65D80C476AC85
3,272,035 UART: [art] SIG.S = 6BD647986598F6FE2CA46DE23FE13707368C9A3348F6020E972E9233544BA2DE8CE6452AB659B76AB4EDD613BA6B665D
3,295,749 UART: Caliptra RT
3,296,002 UART: [state] CFI Enabled
3,403,952 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,428 UART: [rt]cmd =0x46504c54, len=4
3,435,548 >>> mbox cmd response data (8 bytes)
3,435,549 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,465,234 UART: [rt]cmd =0x46504c67, len=4
3,466,036 >>> mbox cmd response: failed
3,466,260 UART: [rt] FIPS self test
3,466,591 UART: [kat] ++
3,466,743 UART: [kat] sha1
3,470,796 UART: [kat] SHA2-256
3,472,726 UART: [kat] SHA2-384
3,475,613 UART: [kat] SHA2-512-ACC
3,477,508 UART: [kat] ECC-384
3,487,567 UART: [kat] HMAC-384Kdf
3,492,042 UART: [kat] LMS
3,740,933 UART: [kat] --
5,851,855 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,855,797 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,885,133 UART: [rt]cmd =0x46504c67, len=4
5,886,200 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,707 UART: [state] LifecycleState = Unprovisioned
86,362 UART: [state] DebugLocked = No
87,020 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,656 UART: [kat] SHA2-256
882,587 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,702 UART: [kat] ++
886,854 UART: [kat] sha1
891,184 UART: [kat] SHA2-256
893,122 UART: [kat] SHA2-384
895,985 UART: [kat] SHA2-512-ACC
897,886 UART: [kat] ECC-384
903,309 UART: [kat] HMAC-384Kdf
908,079 UART: [kat] LMS
1,476,275 UART: [kat] --
1,477,174 UART: [cold-reset] ++
1,477,714 UART: [fht] Storing FHT @ 0x50003400
1,480,551 UART: [idev] ++
1,480,719 UART: [idev] CDI.KEYID = 6
1,481,079 UART: [idev] SUBJECT.KEYID = 7
1,481,503 UART: [idev] UDS.KEYID = 0
1,481,848 ready_for_fw is high
1,481,848 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,489,657 UART: [idev] Erasing UDS.KEYID = 0
1,506,593 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,231 UART: [idev] --
1,516,226 UART: [ldev] ++
1,516,394 UART: [ldev] CDI.KEYID = 6
1,516,757 UART: [ldev] SUBJECT.KEYID = 5
1,517,183 UART: [ldev] AUTHORITY.KEYID = 7
1,517,646 UART: [ldev] FE.KEYID = 1
1,522,676 UART: [ldev] Erasing FE.KEYID = 1
1,548,351 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,579 UART: [ldev] --
1,587,882 UART: [fwproc] Waiting for Commands...
1,588,563 UART: [fwproc] Received command 0x46574c44
1,589,354 UART: [fwproc] Received Image of size 114332 bytes
2,887,726 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,204 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,556 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,347 >>> mbox cmd response: success
3,080,347 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,081,375 UART: [afmc] ++
3,081,543 UART: [afmc] CDI.KEYID = 6
3,081,905 UART: [afmc] SUBJECT.KEYID = 7
3,082,330 UART: [afmc] AUTHORITY.KEYID = 5
3,116,827 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,811 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,591 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,319 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,204 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,894 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,799 UART: [afmc] --
3,159,911 UART: [cold-reset] --
3,161,059 UART: [state] Locking Datavault
3,162,340 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,944 UART: [state] Locking ICCM
3,163,418 UART: [exit] Launching FMC @ 0x40000130
3,168,747 UART:
3,168,763 UART: Running Caliptra FMC ...
3,169,171 UART:
3,169,314 UART: [state] CFI Enabled
3,179,623 UART: [fht] FMC Alias Private Key: 7
3,288,202 UART: [art] Extend RT PCRs Done
3,288,630 UART: [art] Lock RT PCRs Done
3,290,126 UART: [art] Populate DV Done
3,298,249 UART: [fht] FMC Alias Private Key: 7
3,299,313 UART: [art] Derive CDI
3,299,593 UART: [art] Store in in slot 0x4
3,385,470 UART: [art] Derive Key Pair
3,385,830 UART: [art] Store priv key in slot 0x5
3,398,728 UART: [art] Derive Key Pair - Done
3,413,494 UART: [art] Signing Cert with AUTHO
3,413,974 UART: RITY.KEYID = 7
3,429,480 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,245 UART: [art] PUB.X = 7FDC9039B7753E303891965F64BF34AE0F4C7012BFFB28F38794F556206AC23D592EEE0D6E17ACA531F64AE1CB1F3258
3,437,017 UART: [art] PUB.Y = 859700A0C97DE34C1A0F450B15350768197FD14B50035BFE654A96F9E60850FC554FF2D1C232527243B0FC58687B496A
3,443,924 UART: [art] SIG.R = 02B40B7500AB894CECACF71D8395B6B051439F68169F18998936CE7257F49218315871F2053734FEE6D46E6058EC2A0D
3,450,654 UART: [art] SIG.S = 36376F47152B294D295E09AFC7A5AD3C71EE9CD338FE5BFE31BAE12A6888231F4B8B7CB516EF476FC0C572AEF95F2783
3,474,970 UART: Caliptra RT
3,475,315 UART: [state] CFI Enabled
3,584,535 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,917 UART: [rt]cmd =0x46504c54, len=4
3,615,983 >>> mbox cmd response data (8 bytes)
3,615,984 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,645,673 UART: [rt]cmd =0x46504c67, len=4
3,646,769 >>> mbox cmd response: failed
3,646,983 UART: [rt] FIPS self test
3,647,314 UART: [kat] ++
3,647,466 UART: [kat] sha1
3,651,699 UART: [kat] SHA2-256
3,653,629 UART: [kat] SHA2-384
3,656,392 UART: [kat] SHA2-512-ACC
3,658,287 UART: [kat] ECC-384
3,667,680 UART: [kat] HMAC-384Kdf
3,672,097 UART: [kat] LMS
3,920,988 UART: [kat] --
6,140,730 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,146,519 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,175,727 UART: [rt]cmd =0x46504c67, len=4
6,177,098 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,940 ready_for_fw is high
1,362,940 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,901 >>> mbox cmd response: success
2,927,901 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,989,517 UART:
2,989,533 UART: Running Caliptra FMC ...
2,989,941 UART:
2,990,084 UART: [state] CFI Enabled
3,001,067 UART: [fht] FMC Alias Private Key: 7
3,108,472 UART: [art] Extend RT PCRs Done
3,108,900 UART: [art] Lock RT PCRs Done
3,110,330 UART: [art] Populate DV Done
3,118,693 UART: [fht] FMC Alias Private Key: 7
3,119,727 UART: [art] Derive CDI
3,120,007 UART: [art] Store in in slot 0x4
3,205,510 UART: [art] Derive Key Pair
3,205,870 UART: [art] Store priv key in slot 0x5
3,218,860 UART: [art] Derive Key Pair - Done
3,233,376 UART: [art] Signing Cert with AUTHO
3,233,856 UART: RITY.KEYID = 7
3,249,176 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,941 UART: [art] PUB.X = CDC28DFAC989C256DFB01517982A602810C363CDEA6FD9F3628DF3E017C75034E7A0EA716CFE1DF4E71F035D2D016A0E
3,256,718 UART: [art] PUB.Y = 22EE058900AAACA26146AD1BC38F0E80D2F10989184B1234BD86E9181B88BC801194EB64BFCA2773698B7C8BEDFF664A
3,263,647 UART: [art] SIG.R = C54485650CEC85758DAE2C0F1FBAD755B6797D657771E3C915D1E66A127D2EE9048BF29E349430A1D41849F598C347E9
3,270,408 UART: [art] SIG.S = E2A6AF891D06ED67DD6DFDC0B8F9CA247FFB6F026F5D94BA68DE1C6DDDCEAB9F90EDD456ECB7AE4713CA5322AC27F1F2
3,294,119 UART: Caliptra RT
3,294,464 UART: [state] CFI Enabled
3,402,114 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,494 UART: [rt]cmd =0x46504c54, len=4
3,433,606 >>> mbox cmd response data (8 bytes)
3,433,607 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,463,440 UART: [rt]cmd =0x46504c67, len=4
3,464,420 >>> mbox cmd response: failed
3,464,658 UART: [rt] FIPS self test
3,464,989 UART: [kat] ++
3,465,141 UART: [kat] sha1
3,469,274 UART: [kat] SHA2-256
3,471,204 UART: [kat] SHA2-384
3,473,855 UART: [kat] SHA2-512-ACC
3,475,750 UART: [kat] ECC-384
3,485,545 UART: [kat] HMAC-384Kdf
3,490,182 UART: [kat] LMS
3,739,073 UART: [kat] --
5,850,249 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,854,181 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,883,625 UART: [rt]cmd =0x46504c67, len=4
5,884,710 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
893,360 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,485 UART: [kat] ++
897,637 UART: [kat] sha1
901,955 UART: [kat] SHA2-256
903,895 UART: [kat] SHA2-384
906,694 UART: [kat] SHA2-512-ACC
908,595 UART: [kat] ECC-384
918,698 UART: [kat] HMAC-384Kdf
923,282 UART: [kat] LMS
1,171,610 UART: [kat] --
1,172,433 UART: [cold-reset] ++
1,172,895 UART: [fht] FHT @ 0x50003400
1,175,592 UART: [idev] ++
1,175,760 UART: [idev] CDI.KEYID = 6
1,176,120 UART: [idev] SUBJECT.KEYID = 7
1,176,544 UART: [idev] UDS.KEYID = 0
1,176,889 ready_for_fw is high
1,176,889 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,184,426 UART: [idev] Erasing UDS.KEYID = 0
1,200,755 UART: [idev] Sha1 KeyId Algorithm
1,209,207 UART: [idev] --
1,210,293 UART: [ldev] ++
1,210,461 UART: [ldev] CDI.KEYID = 6
1,210,824 UART: [ldev] SUBJECT.KEYID = 5
1,211,250 UART: [ldev] AUTHORITY.KEYID = 7
1,211,713 UART: [ldev] FE.KEYID = 1
1,217,037 UART: [ldev] Erasing FE.KEYID = 1
1,243,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,293 UART: [ldev] --
1,282,668 UART: [fwproc] Wait for Commands...
1,283,474 UART: [fwproc] Recv command 0x46574c44
1,284,202 UART: [fwproc] Recv'd Img size: 114332 bytes
2,582,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,974 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,278 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,774,105 >>> mbox cmd response: success
2,774,105 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,775,113 UART: [afmc] ++
2,775,281 UART: [afmc] CDI.KEYID = 6
2,775,643 UART: [afmc] SUBJECT.KEYID = 7
2,776,068 UART: [afmc] AUTHORITY.KEYID = 5
2,811,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,318 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,066 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,794 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,679 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,398 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,136 UART: [afmc] --
2,855,184 UART: [cold-reset] --
2,856,004 UART: [state] Locking Datavault
2,857,355 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,959 UART: [state] Locking ICCM
2,858,421 UART: [exit] Launching FMC @ 0x40000130
2,863,750 UART:
2,863,766 UART: Running Caliptra FMC ...
2,864,174 UART:
2,864,228 UART: [state] CFI Enabled
2,874,427 UART: [fht] FMC Alias Private Key: 7
2,982,436 UART: [art] Extend RT PCRs Done
2,982,864 UART: [art] Lock RT PCRs Done
2,984,678 UART: [art] Populate DV Done
2,993,129 UART: [fht] FMC Alias Private Key: 7
2,994,161 UART: [art] Derive CDI
2,994,441 UART: [art] Store in in slot 0x4
3,080,150 UART: [art] Derive Key Pair
3,080,510 UART: [art] Store priv key in slot 0x5
3,093,210 UART: [art] Derive Key Pair - Done
3,108,331 UART: [art] Signing Cert with AUTHO
3,108,811 UART: RITY.KEYID = 7
3,123,743 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,508 UART: [art] PUB.X = 67E097DAF0C9AE83F15BE1C76923ED1F4E3CA847CAFD7228C051DC09191AB848729975332252AB2FEB3FF8E025F4EF0F
3,131,286 UART: [art] PUB.Y = ECD64674FF55886A490D86FCEAB650D49AF11986A0C428BE300A6A81393FB9A0EE39BD76E89C9DDF18327E3A32A07BEE
3,138,246 UART: [art] SIG.R = 043B2B5DACF91A614CA0E373A264405404FDE55F5E6D0033C357038AA48D4CB298C1065996E33428CDB9E36026FB68F2
3,144,984 UART: [art] SIG.S = CE4DCA7C669D0B15140BBDC6A13B9A4F1602668BDAFE311CCC8E12A9F7086481830CBA5AAE207BBD2A1961A36EB0B17A
3,169,060 UART: Caliptra RT
3,169,313 UART: [state] CFI Enabled
3,277,166 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,830 UART: [rt]cmd =0x46504c54, len=4
3,308,806 >>> mbox cmd response data (8 bytes)
3,308,807 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,338,368 UART: [rt]cmd =0x46504c67, len=4
3,339,324 >>> mbox cmd response: failed
3,339,472 UART: [rt] FIPS self test
3,339,803 UART: [kat] ++
3,339,955 UART: [kat] sha1
3,344,110 UART: [kat] SHA2-256
3,346,040 UART: [kat] SHA2-384
3,348,765 UART: [kat] SHA2-512-ACC
3,350,660 UART: [kat] ECC-384
3,360,245 UART: [kat] HMAC-384Kdf
3,364,876 UART: [kat] LMS
3,613,767 UART: [kat] --
5,841,005 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,849,073 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,153 UART: [rt]cmd =0x46504c67, len=4
5,879,354 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,255 ready_for_fw is high
1,060,255 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,672 >>> mbox cmd response: success
2,627,672 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,690,446 UART:
2,690,462 UART: Running Caliptra FMC ...
2,690,870 UART:
2,690,924 UART: [state] CFI Enabled
2,701,393 UART: [fht] FMC Alias Private Key: 7
2,809,214 UART: [art] Extend RT PCRs Done
2,809,642 UART: [art] Lock RT PCRs Done
2,811,324 UART: [art] Populate DV Done
2,819,613 UART: [fht] FMC Alias Private Key: 7
2,820,773 UART: [art] Derive CDI
2,821,053 UART: [art] Store in in slot 0x4
2,906,664 UART: [art] Derive Key Pair
2,907,024 UART: [art] Store priv key in slot 0x5
2,920,732 UART: [art] Derive Key Pair - Done
2,935,800 UART: [art] Signing Cert with AUTHO
2,936,280 UART: RITY.KEYID = 7
2,951,802 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,567 UART: [art] PUB.X = 769B2796667C974625261564FE44B755FA19904F06A73CDA1BBA7FBDF1CCDFA21AE6BB574BB1BC98EDBBB54A089F9807
2,959,344 UART: [art] PUB.Y = 699FDB15F04503030CD833097A817E4AE6800AF1413019687D98110048EA59117C2B2A6FBA12297CD862F53C80F6BD8E
2,966,253 UART: [art] SIG.R = E584D03CF0CBADC53BAECF8C40B21E3AE3358635A9159E16536180FB8930068C479A96C018440271767F9584D5AB3D46
2,973,017 UART: [art] SIG.S = 8EFE2A4D77BFC497498D2DBA7282E8F276C97E24DE15C928E69E0C79A0B67CE4B10D988485FB25499D8654B5A5D188FB
2,997,346 UART: Caliptra RT
2,997,599 UART: [state] CFI Enabled
3,106,801 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,265 UART: [rt]cmd =0x46504c54, len=4
3,138,525 >>> mbox cmd response data (8 bytes)
3,138,526 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,168,319 UART: [rt]cmd =0x46504c67, len=4
3,169,265 >>> mbox cmd response: failed
3,169,417 UART: [rt] FIPS self test
3,169,748 UART: [kat] ++
3,169,900 UART: [kat] sha1
3,174,179 UART: [kat] SHA2-256
3,176,109 UART: [kat] SHA2-384
3,178,890 UART: [kat] SHA2-512-ACC
3,180,785 UART: [kat] ECC-384
3,190,862 UART: [kat] HMAC-384Kdf
3,195,431 UART: [kat] LMS
3,444,322 UART: [kat] --
5,568,062 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,569,025 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,598,285 UART: [rt]cmd =0x46504c67, len=4
5,599,294 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,771 UART: [state] LifecycleState = Unprovisioned
85,426 UART: [state] DebugLocked = No
85,922 UART: [state] WD Timer not started. Device not locked for debugging
87,115 UART: [kat] SHA2-256
892,765 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,890 UART: [kat] ++
897,042 UART: [kat] sha1
901,260 UART: [kat] SHA2-256
903,200 UART: [kat] SHA2-384
905,851 UART: [kat] SHA2-512-ACC
907,752 UART: [kat] ECC-384
917,405 UART: [kat] HMAC-384Kdf
922,007 UART: [kat] LMS
1,170,335 UART: [kat] --
1,171,316 UART: [cold-reset] ++
1,171,734 UART: [fht] FHT @ 0x50003400
1,174,347 UART: [idev] ++
1,174,515 UART: [idev] CDI.KEYID = 6
1,174,875 UART: [idev] SUBJECT.KEYID = 7
1,175,299 UART: [idev] UDS.KEYID = 0
1,175,644 ready_for_fw is high
1,175,644 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,893 UART: [idev] Erasing UDS.KEYID = 0
1,200,214 UART: [idev] Sha1 KeyId Algorithm
1,208,716 UART: [idev] --
1,209,976 UART: [ldev] ++
1,210,144 UART: [ldev] CDI.KEYID = 6
1,210,507 UART: [ldev] SUBJECT.KEYID = 5
1,210,933 UART: [ldev] AUTHORITY.KEYID = 7
1,211,396 UART: [ldev] FE.KEYID = 1
1,216,962 UART: [ldev] Erasing FE.KEYID = 1
1,243,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,168 UART: [ldev] --
1,282,441 UART: [fwproc] Wait for Commands...
1,283,081 UART: [fwproc] Recv command 0x46574c44
1,283,809 UART: [fwproc] Recv'd Img size: 114332 bytes
2,581,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,345 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,649 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,773,542 >>> mbox cmd response: success
2,773,542 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,774,610 UART: [afmc] ++
2,774,778 UART: [afmc] CDI.KEYID = 6
2,775,140 UART: [afmc] SUBJECT.KEYID = 7
2,775,565 UART: [afmc] AUTHORITY.KEYID = 5
2,811,196 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,557 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,305 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,033 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,918 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,637 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,493 UART: [afmc] --
2,854,483 UART: [cold-reset] --
2,855,219 UART: [state] Locking Datavault
2,856,328 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,932 UART: [state] Locking ICCM
2,857,386 UART: [exit] Launching FMC @ 0x40000130
2,862,715 UART:
2,862,731 UART: Running Caliptra FMC ...
2,863,139 UART:
2,863,282 UART: [state] CFI Enabled
2,874,185 UART: [fht] FMC Alias Private Key: 7
2,982,336 UART: [art] Extend RT PCRs Done
2,982,764 UART: [art] Lock RT PCRs Done
2,984,186 UART: [art] Populate DV Done
2,992,335 UART: [fht] FMC Alias Private Key: 7
2,993,515 UART: [art] Derive CDI
2,993,795 UART: [art] Store in in slot 0x4
3,079,276 UART: [art] Derive Key Pair
3,079,636 UART: [art] Store priv key in slot 0x5
3,092,790 UART: [art] Derive Key Pair - Done
3,107,620 UART: [art] Signing Cert with AUTHO
3,108,100 UART: RITY.KEYID = 7
3,123,452 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,217 UART: [art] PUB.X = B0FA31E5D2D8601D50DA5CCFF9F5E802DB8A2A9502EC6EC82105D1AD22AB0E32D0913597E6D3395077AD7DFAB241EE17
3,130,993 UART: [art] PUB.Y = DD7F3B1B7016DB31B8D4A03D1063193C51B27088441BDCF4341442F69685654D4362FFCD770ECE4484F1AF3B482AE068
3,137,942 UART: [art] SIG.R = 781789A1AF1D5253B1382B241452B1623F3A142D45D4E27F81EDCF1625E0ACFEC187BEA49B44EB9F5313B2466FB25F70
3,144,718 UART: [art] SIG.S = E82F001C10D74D9433D55E9DCA5659B954C5E8317D4CC42D48A203A4A895970F72821D19D1E74E9D8368D984571437BE
3,168,727 UART: Caliptra RT
3,169,072 UART: [state] CFI Enabled
3,277,315 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,863 UART: [rt]cmd =0x46504c54, len=4
3,308,843 >>> mbox cmd response data (8 bytes)
3,308,844 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,338,455 UART: [rt]cmd =0x46504c67, len=4
3,339,469 >>> mbox cmd response: failed
3,339,835 UART: [rt] FIPS self test
3,340,166 UART: [kat] ++
3,340,318 UART: [kat] sha1
3,344,509 UART: [kat] SHA2-256
3,346,439 UART: [kat] SHA2-384
3,349,036 UART: [kat] SHA2-512-ACC
3,350,931 UART: [kat] ECC-384
3,361,142 UART: [kat] HMAC-384Kdf
3,365,725 UART: [kat] LMS
3,614,616 UART: [kat] --
5,842,590 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,849,218 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,526 UART: [rt]cmd =0x46504c67, len=4
5,879,511 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,470 ready_for_fw is high
1,060,470 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,427 >>> mbox cmd response: success
2,628,427 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,691,451 UART:
2,691,467 UART: Running Caliptra FMC ...
2,691,875 UART:
2,692,018 UART: [state] CFI Enabled
2,702,747 UART: [fht] FMC Alias Private Key: 7
2,810,658 UART: [art] Extend RT PCRs Done
2,811,086 UART: [art] Lock RT PCRs Done
2,812,390 UART: [art] Populate DV Done
2,820,673 UART: [fht] FMC Alias Private Key: 7
2,821,609 UART: [art] Derive CDI
2,821,889 UART: [art] Store in in slot 0x4
2,907,420 UART: [art] Derive Key Pair
2,907,780 UART: [art] Store priv key in slot 0x5
2,921,566 UART: [art] Derive Key Pair - Done
2,936,499 UART: [art] Signing Cert with AUTHO
2,936,979 UART: RITY.KEYID = 7
2,951,767 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,532 UART: [art] PUB.X = 6D70CF3134A8C58B07ED378F728277E0B1E652AFB04F018DE0A7E9189BFD3A74A2303517010D92469A7B0C982A32AB51
2,959,289 UART: [art] PUB.Y = EB08871A0E8D5D821396EFC560AC084AD84FBCE1A62C6A5E1FC093DEAF745557AB2C31CD05215537A3508E66C6A3C9EC
2,966,243 UART: [art] SIG.R = 34DC119425A3AAF4CF348C7581E888B1B078709316D01802D6039F79DA4E5EEA9A3878A38861BB042DE9EB4A23A263DE
2,973,008 UART: [art] SIG.S = EEF3F36ECB1166E93C94414A6BEEB2ED7A936B74D7273F374D76426847ED6D51E97DF2F770B96A98446C9DFB948F7685
2,996,899 UART: Caliptra RT
2,997,244 UART: [state] CFI Enabled
3,104,849 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,441 UART: [rt]cmd =0x46504c54, len=4
3,136,685 >>> mbox cmd response data (8 bytes)
3,136,686 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,166,199 UART: [rt]cmd =0x46504c67, len=4
3,167,187 >>> mbox cmd response: failed
3,167,351 UART: [rt] FIPS self test
3,167,682 UART: [kat] ++
3,167,834 UART: [kat] sha1
3,172,161 UART: [kat] SHA2-256
3,174,091 UART: [kat] SHA2-384
3,176,948 UART: [kat] SHA2-512-ACC
3,178,843 UART: [kat] ECC-384
3,188,454 UART: [kat] HMAC-384Kdf
3,192,899 UART: [kat] LMS
3,441,790 UART: [kat] --
5,565,432 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,566,947 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,596,165 UART: [rt]cmd =0x46504c67, len=4
5,597,354 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
891,428 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,557 UART: [kat] ++
895,709 UART: [kat] sha1
899,953 UART: [kat] SHA2-256
901,893 UART: [kat] SHA2-384
904,660 UART: [kat] SHA2-512-ACC
906,561 UART: [kat] ECC-384
916,128 UART: [kat] HMAC-384Kdf
920,616 UART: [kat] LMS
1,168,928 UART: [kat] --
1,170,051 UART: [cold-reset] ++
1,170,471 UART: [fht] FHT @ 0x50003400
1,173,013 UART: [idev] ++
1,173,181 UART: [idev] CDI.KEYID = 6
1,173,542 UART: [idev] SUBJECT.KEYID = 7
1,173,967 UART: [idev] UDS.KEYID = 0
1,174,313 ready_for_fw is high
1,174,313 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,181,591 UART: [idev] Erasing UDS.KEYID = 0
1,198,197 UART: [idev] Sha1 KeyId Algorithm
1,206,919 UART: [idev] --
1,208,100 UART: [ldev] ++
1,208,268 UART: [ldev] CDI.KEYID = 6
1,208,632 UART: [ldev] SUBJECT.KEYID = 5
1,209,059 UART: [ldev] AUTHORITY.KEYID = 7
1,209,522 UART: [ldev] FE.KEYID = 1
1,214,850 UART: [ldev] Erasing FE.KEYID = 1
1,240,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,924 UART: [ldev] --
1,280,386 UART: [fwproc] Wait for Commands...
1,281,009 UART: [fwproc] Recv command 0x46574c44
1,281,742 UART: [fwproc] Recv'd Img size: 114332 bytes
2,579,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,262 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,571 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,771,503 >>> mbox cmd response: success
2,771,503 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,772,652 UART: [afmc] ++
2,772,820 UART: [afmc] CDI.KEYID = 6
2,773,183 UART: [afmc] SUBJECT.KEYID = 7
2,773,609 UART: [afmc] AUTHORITY.KEYID = 5
2,809,210 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,190 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,941 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,670 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,553 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,272 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,089 UART: [afmc] --
2,851,983 UART: [cold-reset] --
2,852,907 UART: [state] Locking Datavault
2,854,100 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,704 UART: [state] Locking ICCM
2,855,152 UART: [exit] Launching FMC @ 0x40000130
2,860,481 UART:
2,860,497 UART: Running Caliptra FMC ...
2,860,905 UART:
2,860,959 UART: [state] CFI Enabled
2,871,766 UART: [fht] FMC Alias Private Key: 7
2,979,967 UART: [art] Extend RT PCRs Done
2,980,395 UART: [art] Lock RT PCRs Done
2,982,309 UART: [art] Populate DV Done
2,990,650 UART: [fht] FMC Alias Private Key: 7
2,991,606 UART: [art] Derive CDI
2,991,886 UART: [art] Store in in slot 0x4
3,077,613 UART: [art] Derive Key Pair
3,077,973 UART: [art] Store priv key in slot 0x5
3,091,393 UART: [art] Derive Key Pair - Done
3,106,424 UART: [art] Signing Cert with AUTHO
3,106,904 UART: RITY.KEYID = 7
3,122,032 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,797 UART: [art] PUB.X = CCDB0F433B5E71880802DEADF57BD3B0E2C81840181DC9534BFBE8BD65ABB4DC651E9DDF46565A48A940D81EAA0ABBA0
3,129,581 UART: [art] PUB.Y = 7A546B93AD3F414D44C6FE62EE644995739DDC8C178AB0FFC55149366E75CE14033CEBAA0E8B889EDBF183F18CF76729
3,136,537 UART: [art] SIG.R = 41DDFD693E7F4BCC06310E089E48809AFC46932E1EFC289FC4DFBB1E64F054C3FE5BBC48B5CDBA4F6A8A8F040C6615B6
3,143,316 UART: [art] SIG.S = 7360B39F12555DA6493336D919CBB6CDA4DFADD9E28BB9BE49626F295D6EEA10754811289EEC4F0840B241236C3D00B0
3,166,478 UART: Caliptra RT
3,166,731 UART: [state] CFI Enabled
3,274,868 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,226 UART: [rt]cmd =0x46504c54, len=4
3,306,238 >>> mbox cmd response data (8 bytes)
3,306,239 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,335,848 UART: [rt]cmd =0x46504c67, len=4
3,336,668 >>> mbox cmd response: failed
3,337,022 UART: [rt] FIPS self test
3,337,353 UART: [kat] ++
3,337,505 UART: [kat] sha1
3,341,596 UART: [kat] SHA2-256
3,343,526 UART: [kat] SHA2-384
3,346,427 UART: [kat] SHA2-512-ACC
3,348,322 UART: [kat] ECC-384
3,358,363 UART: [kat] HMAC-384Kdf
3,362,708 UART: [kat] LMS
3,611,599 UART: [kat] --
5,837,995 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,846,417 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,875,691 UART: [rt]cmd =0x46504c67, len=4
5,876,848 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,982 ready_for_fw is high
1,055,982 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,883 >>> mbox cmd response: success
2,621,883 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,683,711 UART:
2,683,727 UART: Running Caliptra FMC ...
2,684,135 UART:
2,684,189 UART: [state] CFI Enabled
2,694,834 UART: [fht] FMC Alias Private Key: 7
2,802,945 UART: [art] Extend RT PCRs Done
2,803,373 UART: [art] Lock RT PCRs Done
2,805,017 UART: [art] Populate DV Done
2,813,486 UART: [fht] FMC Alias Private Key: 7
2,814,456 UART: [art] Derive CDI
2,814,736 UART: [art] Store in in slot 0x4
2,900,445 UART: [art] Derive Key Pair
2,900,805 UART: [art] Store priv key in slot 0x5
2,913,935 UART: [art] Derive Key Pair - Done
2,928,794 UART: [art] Signing Cert with AUTHO
2,929,274 UART: RITY.KEYID = 7
2,944,052 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,817 UART: [art] PUB.X = 9C446260C5CF7AD0C7C71E3336E76890813ACEFCDB6A7590E8CE43A1688EF84AEEADC6B9149D0CCA53D8C5CC950CFA61
2,951,603 UART: [art] PUB.Y = C63E6CAFC4879ADA1D140EE16407CF163BF2259FF97887FB2914E29ECA89F6556AA2AFBD8DE045AD6529375AAAABB47A
2,958,569 UART: [art] SIG.R = AD431F5B3AD67DD5398890439E4305CF91CBFF62962815DFD2ECE4EFE800706944EAD782F52BB55B1E487E4513B3D259
2,965,322 UART: [art] SIG.S = C4CEB18102FB29139E73CD9D1563B0B9710FF012F0E033BF000FDC90403954AE18F03CCCADDB9A630D60AF22F1A8E1C8
2,988,853 UART: Caliptra RT
2,989,106 UART: [state] CFI Enabled
3,096,718 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,088 UART: [rt]cmd =0x46504c54, len=4
3,128,100 >>> mbox cmd response data (8 bytes)
3,128,101 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,157,900 UART: [rt]cmd =0x46504c67, len=4
3,158,814 >>> mbox cmd response: failed
3,159,112 UART: [rt] FIPS self test
3,159,443 UART: [kat] ++
3,159,595 UART: [kat] sha1
3,163,776 UART: [kat] SHA2-256
3,165,706 UART: [kat] SHA2-384
3,168,465 UART: [kat] SHA2-512-ACC
3,170,360 UART: [kat] ECC-384
3,180,465 UART: [kat] HMAC-384Kdf
3,185,154 UART: [kat] LMS
3,434,045 UART: [kat] --
5,553,811 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,558,574 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,588,026 UART: [rt]cmd =0x46504c67, len=4
5,589,173 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,155 UART: [state] LifecycleState = Unprovisioned
85,810 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,585 UART: [kat] SHA2-256
891,135 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,264 UART: [kat] ++
895,416 UART: [kat] sha1
899,800 UART: [kat] SHA2-256
901,740 UART: [kat] SHA2-384
904,705 UART: [kat] SHA2-512-ACC
906,606 UART: [kat] ECC-384
916,661 UART: [kat] HMAC-384Kdf
921,473 UART: [kat] LMS
1,169,785 UART: [kat] --
1,170,442 UART: [cold-reset] ++
1,170,888 UART: [fht] FHT @ 0x50003400
1,173,576 UART: [idev] ++
1,173,744 UART: [idev] CDI.KEYID = 6
1,174,105 UART: [idev] SUBJECT.KEYID = 7
1,174,530 UART: [idev] UDS.KEYID = 0
1,174,876 ready_for_fw is high
1,174,876 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,182,590 UART: [idev] Erasing UDS.KEYID = 0
1,199,224 UART: [idev] Sha1 KeyId Algorithm
1,208,080 UART: [idev] --
1,209,143 UART: [ldev] ++
1,209,311 UART: [ldev] CDI.KEYID = 6
1,209,675 UART: [ldev] SUBJECT.KEYID = 5
1,210,102 UART: [ldev] AUTHORITY.KEYID = 7
1,210,565 UART: [ldev] FE.KEYID = 1
1,215,975 UART: [ldev] Erasing FE.KEYID = 1
1,242,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,301 UART: [fwproc] Wait for Commands...
1,283,048 UART: [fwproc] Recv command 0x46574c44
1,283,781 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,465 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,774 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,518 >>> mbox cmd response: success
2,772,518 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,773,747 UART: [afmc] ++
2,773,915 UART: [afmc] CDI.KEYID = 6
2,774,278 UART: [afmc] SUBJECT.KEYID = 7
2,774,704 UART: [afmc] AUTHORITY.KEYID = 5
2,810,529 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,165 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,916 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,645 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,528 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,247 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,048 UART: [afmc] --
2,854,044 UART: [cold-reset] --
2,855,040 UART: [state] Locking Datavault
2,856,423 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,027 UART: [state] Locking ICCM
2,857,507 UART: [exit] Launching FMC @ 0x40000130
2,862,836 UART:
2,862,852 UART: Running Caliptra FMC ...
2,863,260 UART:
2,863,403 UART: [state] CFI Enabled
2,873,932 UART: [fht] FMC Alias Private Key: 7
2,982,219 UART: [art] Extend RT PCRs Done
2,982,647 UART: [art] Lock RT PCRs Done
2,984,551 UART: [art] Populate DV Done
2,992,532 UART: [fht] FMC Alias Private Key: 7
2,993,680 UART: [art] Derive CDI
2,993,960 UART: [art] Store in in slot 0x4
3,079,997 UART: [art] Derive Key Pair
3,080,357 UART: [art] Store priv key in slot 0x5
3,093,513 UART: [art] Derive Key Pair - Done
3,108,123 UART: [art] Signing Cert with AUTHO
3,108,603 UART: RITY.KEYID = 7
3,123,625 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,390 UART: [art] PUB.X = D9767DA830A2D61D1CF69CB1D6623FDF74D5E0405304BC3531FBB81866E144B9285C11872CF6E1A5EE1E6D9266A070DC
3,131,165 UART: [art] PUB.Y = DC81A57A07EA27DBD3EB800CE074DC7DE75A7380C855DC1EF0DC1D532D9661DCD9DDAE32EEC2512DE3FD1164BD4A4180
3,138,135 UART: [art] SIG.R = F19546E3BD402AC8A322C0EB274E7946FD9433FAC4AE22858D905CE1479E6CDAE68876B5590CA10AC79871C895A39ED4
3,144,907 UART: [art] SIG.S = AA7B31B8FF3E58FA6CB983DEB9EE61DDB031C9344BF5434C4A386971476903431132075F4723175EB227904EC53455EF
3,168,606 UART: Caliptra RT
3,168,951 UART: [state] CFI Enabled
3,277,519 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,897 UART: [rt]cmd =0x46504c54, len=4
3,309,031 >>> mbox cmd response data (8 bytes)
3,309,032 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,338,621 UART: [rt]cmd =0x46504c67, len=4
3,339,613 >>> mbox cmd response: failed
3,339,745 UART: [rt] FIPS self test
3,340,076 UART: [kat] ++
3,340,228 UART: [kat] sha1
3,344,619 UART: [kat] SHA2-256
3,346,549 UART: [kat] SHA2-384
3,349,292 UART: [kat] SHA2-512-ACC
3,351,187 UART: [kat] ECC-384
3,361,132 UART: [kat] HMAC-384Kdf
3,365,757 UART: [kat] LMS
3,614,648 UART: [kat] --
5,840,418 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,849,362 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,788 UART: [rt]cmd =0x46504c67, len=4
5,879,931 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,255 ready_for_fw is high
1,056,255 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,623,072 >>> mbox cmd response: success
2,623,072 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,685,318 UART:
2,685,334 UART: Running Caliptra FMC ...
2,685,742 UART:
2,685,885 UART: [state] CFI Enabled
2,696,276 UART: [fht] FMC Alias Private Key: 7
2,804,075 UART: [art] Extend RT PCRs Done
2,804,503 UART: [art] Lock RT PCRs Done
2,806,065 UART: [art] Populate DV Done
2,814,190 UART: [fht] FMC Alias Private Key: 7
2,815,220 UART: [art] Derive CDI
2,815,500 UART: [art] Store in in slot 0x4
2,901,243 UART: [art] Derive Key Pair
2,901,603 UART: [art] Store priv key in slot 0x5
2,914,639 UART: [art] Derive Key Pair - Done
2,929,459 UART: [art] Signing Cert with AUTHO
2,929,939 UART: RITY.KEYID = 7
2,945,127 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,892 UART: [art] PUB.X = 38DC2AB9C52A3AB3DE7E78283443C41FB267242B5AB09C57C0584B13D88FFB921722A96C3240EC981E6176C111E137CD
2,952,666 UART: [art] PUB.Y = BF6D19FA1996466C817003266BF9091C38ECE50D4EB3B08AC986BEC3440C1F49107CF678944D514E6DF16BDE43BAB127
2,959,612 UART: [art] SIG.R = F3D357A1AF394FCF48D447F7187F02ABB7BBD649754D92E046DC13278EE3399A25390502D6C755177206FA41618EA11A
2,966,370 UART: [art] SIG.S = E007294998D26C99E01A853436D863340764E2D7C55838187BC4DC629A3D5F8872CF2BC3DBF2EEE6B4DEDC2B403FC0C7
2,989,931 UART: Caliptra RT
2,990,276 UART: [state] CFI Enabled
3,098,830 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,368 UART: [rt]cmd =0x46504c54, len=4
3,130,324 >>> mbox cmd response data (8 bytes)
3,130,325 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,160,374 UART: [rt]cmd =0x46504c67, len=4
3,161,460 >>> mbox cmd response: failed
3,161,654 UART: [rt] FIPS self test
3,161,985 UART: [kat] ++
3,162,137 UART: [kat] sha1
3,166,352 UART: [kat] SHA2-256
3,168,282 UART: [kat] SHA2-384
3,171,023 UART: [kat] SHA2-512-ACC
3,172,918 UART: [kat] ECC-384
3,182,299 UART: [kat] HMAC-384Kdf
3,186,948 UART: [kat] LMS
3,435,839 UART: [kat] --
5,554,869 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,561,220 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,590,478 UART: [rt]cmd =0x46504c67, len=4
5,591,709 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,585 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,099 UART: [kat] SHA2-256
882,030 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,145 UART: [kat] ++
886,297 UART: [kat] sha1
890,633 UART: [kat] SHA2-256
892,571 UART: [kat] SHA2-384
895,268 UART: [kat] SHA2-512-ACC
897,169 UART: [kat] ECC-384
902,966 UART: [kat] HMAC-384Kdf
907,548 UART: [kat] LMS
1,475,744 UART: [kat] --
1,476,485 UART: [cold-reset] ++
1,476,955 UART: [fht] Storing FHT @ 0x50003400
1,479,694 UART: [idev] ++
1,479,862 UART: [idev] CDI.KEYID = 6
1,480,222 UART: [idev] SUBJECT.KEYID = 7
1,480,646 UART: [idev] UDS.KEYID = 0
1,480,991 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,282 UART: [idev] Erasing UDS.KEYID = 0
1,505,232 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,796 UART: [idev] --
1,514,669 UART: [ldev] ++
1,514,837 UART: [ldev] CDI.KEYID = 6
1,515,200 UART: [ldev] SUBJECT.KEYID = 5
1,515,626 UART: [ldev] AUTHORITY.KEYID = 7
1,516,089 UART: [ldev] FE.KEYID = 1
1,521,081 UART: [ldev] Erasing FE.KEYID = 1
1,546,596 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,470 UART: [ldev] --
1,585,851 UART: [fwproc] Waiting for Commands...
1,586,696 UART: [fwproc] Received command 0x46505652
1,587,578 UART: [rt] FIPS Version
1,588,131 >>> mbox cmd response data (36 bytes)
1,588,132 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,588,354 UART: [fwproc] Received command 0x46574c44
1,589,145 UART: [fwproc] Received Image of size 114332 bytes
2,888,065 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,929 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,281 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,080,174 >>> mbox cmd response: success
3,080,174 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,081,414 UART: [afmc] ++
3,081,582 UART: [afmc] CDI.KEYID = 6
3,081,944 UART: [afmc] SUBJECT.KEYID = 7
3,082,369 UART: [afmc] AUTHORITY.KEYID = 5
3,117,800 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,748 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,528 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,141 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,831 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,624 UART: [afmc] --
3,160,706 UART: [cold-reset] --
3,161,258 UART: [state] Locking Datavault
3,162,519 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,123 UART: [state] Locking ICCM
3,163,651 UART: [exit] Launching FMC @ 0x40000130
3,168,980 UART:
3,168,996 UART: Running Caliptra FMC ...
3,169,404 UART:
3,169,458 UART: [state] CFI Enabled
3,180,181 UART: [fht] FMC Alias Private Key: 7
3,288,436 UART: [art] Extend RT PCRs Done
3,288,864 UART: [art] Lock RT PCRs Done
3,290,286 UART: [art] Populate DV Done
3,298,439 UART: [fht] FMC Alias Private Key: 7
3,299,469 UART: [art] Derive CDI
3,299,749 UART: [art] Store in in slot 0x4
3,385,400 UART: [art] Derive Key Pair
3,385,760 UART: [art] Store priv key in slot 0x5
3,398,730 UART: [art] Derive Key Pair - Done
3,413,399 UART: [art] Signing Cert with AUTHO
3,413,879 UART: RITY.KEYID = 7
3,428,633 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,398 UART: [art] PUB.X = 55F444FE7E05D911B444D35A68E9C904C6083A69C9A773C40576A1B94CDB1C14AAB91EDE0B32EBC6D638CBD3113C0803
3,436,157 UART: [art] PUB.Y = 8AFE7C645DCD263F84B977F30061262F04B2DF654AE1773C3EADDE548BE4BB242BD0D70D5CFDC1278F00CF64EE8FEBDA
3,443,083 UART: [art] SIG.R = 14CF2F8D59805B955F9A670C37BE8FE4BBD4B35AAC649FEF226DC53AA5932082D600147BE6154495E53FEEFA14327938
3,449,836 UART: [art] SIG.S = DBEDFF8283C1EBA147AD1C21259F9BC321150A4D928D89E2942D45FE8B42DF7334BF98131F7B5E22EFA5B155BE31DB0E
3,473,847 UART: Caliptra RT
3,474,100 UART: [state] CFI Enabled
3,581,661 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,867 UART: [rt]cmd =0x46505652, len=4
3,612,527 UART: [rt] FIPS Version
3,613,618 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,349 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,904 >>> mbox cmd response data (36 bytes)
1,441,905 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,928,441 >>> mbox cmd response: success
2,928,441 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,990,007 UART:
2,990,023 UART: Running Caliptra FMC ...
2,990,431 UART:
2,990,485 UART: [state] CFI Enabled
3,000,604 UART: [fht] FMC Alias Private Key: 7
3,109,169 UART: [art] Extend RT PCRs Done
3,109,597 UART: [art] Lock RT PCRs Done
3,110,885 UART: [art] Populate DV Done
3,118,994 UART: [fht] FMC Alias Private Key: 7
3,120,066 UART: [art] Derive CDI
3,120,346 UART: [art] Store in in slot 0x4
3,205,799 UART: [art] Derive Key Pair
3,206,159 UART: [art] Store priv key in slot 0x5
3,219,501 UART: [art] Derive Key Pair - Done
3,233,866 UART: [art] Signing Cert with AUTHO
3,234,346 UART: RITY.KEYID = 7
3,249,736 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,501 UART: [art] PUB.X = F7B2FD81F9E8ADFFAAD5E4A45795960BF3D9FE1EB1CE56E83200F65CFE4705F9CDB2037AB6C1743BB67AE35F3C2E6B34
3,257,266 UART: [art] PUB.Y = 8ECB83A27B7B674CB7570AE84A14940E8012E5C5DD2E302A55BD6A475D7979087A9D5C02D6F85B523AC936072A3F38F4
3,264,205 UART: [art] SIG.R = BE83298E0CB283EEB72BC7B7D77852DA0D9A88487D0F24BF16125501D4358AAFD0992BDF07AFF47CE1A83650A7A648F0
3,270,972 UART: [art] SIG.S = A9294B0544C30F04A463143440C16C49B79AAA2D929B8AE6CA2137A8AF12CAF24CA05B6B33636B3F1A61555B4C3C633C
3,295,230 UART: Caliptra RT
3,295,483 UART: [state] CFI Enabled
3,404,325 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,743 UART: [rt]cmd =0x46505652, len=4
3,435,403 UART: [rt] FIPS Version
3,436,510 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,558 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,212 UART: [kat] SHA2-256
882,143 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,258 UART: [kat] ++
886,410 UART: [kat] sha1
890,702 UART: [kat] SHA2-256
892,640 UART: [kat] SHA2-384
895,459 UART: [kat] SHA2-512-ACC
897,360 UART: [kat] ECC-384
902,983 UART: [kat] HMAC-384Kdf
907,665 UART: [kat] LMS
1,475,861 UART: [kat] --
1,476,512 UART: [cold-reset] ++
1,476,998 UART: [fht] Storing FHT @ 0x50003400
1,479,847 UART: [idev] ++
1,480,015 UART: [idev] CDI.KEYID = 6
1,480,375 UART: [idev] SUBJECT.KEYID = 7
1,480,799 UART: [idev] UDS.KEYID = 0
1,481,144 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,961 UART: [idev] Erasing UDS.KEYID = 0
1,505,317 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,017 UART: [idev] --
1,514,980 UART: [ldev] ++
1,515,148 UART: [ldev] CDI.KEYID = 6
1,515,511 UART: [ldev] SUBJECT.KEYID = 5
1,515,937 UART: [ldev] AUTHORITY.KEYID = 7
1,516,400 UART: [ldev] FE.KEYID = 1
1,521,420 UART: [ldev] Erasing FE.KEYID = 1
1,547,151 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,107 UART: [ldev] --
1,586,594 UART: [fwproc] Waiting for Commands...
1,587,441 UART: [fwproc] Received command 0x46505652
1,588,323 UART: [rt] FIPS Version
1,588,876 >>> mbox cmd response data (36 bytes)
1,588,877 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,589,079 UART: [fwproc] Received command 0x46574c44
1,589,870 UART: [fwproc] Received Image of size 114332 bytes
2,888,570 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,002 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,354 UART: [fwproc] Loading Runtime at address 0x40005000 len 89648
3,081,329 >>> mbox cmd response: success
3,081,329 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,082,507 UART: [afmc] ++
3,082,675 UART: [afmc] CDI.KEYID = 6
3,083,037 UART: [afmc] SUBJECT.KEYID = 7
3,083,462 UART: [afmc] AUTHORITY.KEYID = 5
3,118,765 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,381 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,161 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,889 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,774 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,464 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,247 UART: [afmc] --
3,162,281 UART: [cold-reset] --
3,163,241 UART: [state] Locking Datavault
3,164,088 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,692 UART: [state] Locking ICCM
3,165,356 UART: [exit] Launching FMC @ 0x40000130
3,170,685 UART:
3,170,701 UART: Running Caliptra FMC ...
3,171,109 UART:
3,171,252 UART: [state] CFI Enabled
3,181,785 UART: [fht] FMC Alias Private Key: 7
3,289,966 UART: [art] Extend RT PCRs Done
3,290,394 UART: [art] Lock RT PCRs Done
3,291,974 UART: [art] Populate DV Done
3,300,061 UART: [fht] FMC Alias Private Key: 7
3,301,061 UART: [art] Derive CDI
3,301,341 UART: [art] Store in in slot 0x4
3,387,350 UART: [art] Derive Key Pair
3,387,710 UART: [art] Store priv key in slot 0x5
3,400,824 UART: [art] Derive Key Pair - Done
3,415,549 UART: [art] Signing Cert with AUTHO
3,416,029 UART: RITY.KEYID = 7
3,431,157 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,922 UART: [art] PUB.X = 0ABFBD4D8301449E4C10E8F0509761CB71E3D66A5B9F349D6BA3A99C38CFD137B5034C96FB3F7E620AC2CEC558BC2BA5
3,438,698 UART: [art] PUB.Y = D3225094E6C205998650B4653B2BFFF5933D6AEB0D426B91FA3ABBF5F08B9F05859F4C1D08BD3429DB81B2172DFF112B
3,445,646 UART: [art] SIG.R = 95BBF35BD43E06B0E14E28A54EAC6B4E64ADF2F62784BBF193461FC1B68ED70AD217005BCA7D509B18EF19EFA25EC518
3,452,408 UART: [art] SIG.S = 62BF2DA03A130AD95A8CEB251C08C6BD9992B634218E38B9C244589EC9F629736E42FD647AA0A8638723DA60D36F86A5
3,476,351 UART: Caliptra RT
3,476,696 UART: [state] CFI Enabled
3,585,949 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,327 UART: [rt]cmd =0x46505652, len=4
3,616,987 UART: [rt] FIPS Version
3,618,200 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,420 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,249 >>> mbox cmd response data (36 bytes)
1,441,250 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,927,222 >>> mbox cmd response: success
2,927,222 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,988,594 UART:
2,988,610 UART: Running Caliptra FMC ...
2,989,018 UART:
2,989,161 UART: [state] CFI Enabled
2,999,932 UART: [fht] FMC Alias Private Key: 7
3,108,187 UART: [art] Extend RT PCRs Done
3,108,615 UART: [art] Lock RT PCRs Done
3,110,027 UART: [art] Populate DV Done
3,118,242 UART: [fht] FMC Alias Private Key: 7
3,119,224 UART: [art] Derive CDI
3,119,504 UART: [art] Store in in slot 0x4
3,205,403 UART: [art] Derive Key Pair
3,205,763 UART: [art] Store priv key in slot 0x5
3,219,035 UART: [art] Derive Key Pair - Done
3,233,784 UART: [art] Signing Cert with AUTHO
3,234,264 UART: RITY.KEYID = 7
3,249,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,483 UART: [art] PUB.X = 9779B69441BD54F7216A911F4D43342BD942E158ED266CB488F25B9FFC4A74EAB9DD96811504667D278E29C2C333CDF6
3,257,252 UART: [art] PUB.Y = BBAFCF8B03440281570184094C9B28BA9ECBFA76B0CAFD0FBB99B9A4BD3A68F76D578CEAB083362CD60B7792B6F34453
3,264,202 UART: [art] SIG.R = 348D51E724A92B55123DF13A67496DB96D061B0DC44BCAAF0EB54A277778794C6C3B688392A5C4C39D4A69089B625BA7
3,270,962 UART: [art] SIG.S = 693E31AA58B2906A0FD6164153BE39973189DABADB083CF791A77AFA005A15D52FB3D144B862EDF6919F764C675E27F7
3,294,777 UART: Caliptra RT
3,295,122 UART: [state] CFI Enabled
3,403,560 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,346 UART: [rt]cmd =0x46505652, len=4
3,435,006 UART: [rt] FIPS Version
3,436,181 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
893,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,315 UART: [kat] ++
897,467 UART: [kat] sha1
901,629 UART: [kat] SHA2-256
903,569 UART: [kat] SHA2-384
906,450 UART: [kat] SHA2-512-ACC
908,351 UART: [kat] ECC-384
917,812 UART: [kat] HMAC-384Kdf
922,578 UART: [kat] LMS
1,170,906 UART: [kat] --
1,172,117 UART: [cold-reset] ++
1,172,617 UART: [fht] FHT @ 0x50003400
1,175,342 UART: [idev] ++
1,175,510 UART: [idev] CDI.KEYID = 6
1,175,870 UART: [idev] SUBJECT.KEYID = 7
1,176,294 UART: [idev] UDS.KEYID = 0
1,176,639 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,574 UART: [idev] Erasing UDS.KEYID = 0
1,201,207 UART: [idev] Sha1 KeyId Algorithm
1,209,871 UART: [idev] --
1,211,037 UART: [ldev] ++
1,211,205 UART: [ldev] CDI.KEYID = 6
1,211,568 UART: [ldev] SUBJECT.KEYID = 5
1,211,994 UART: [ldev] AUTHORITY.KEYID = 7
1,212,457 UART: [ldev] FE.KEYID = 1
1,217,453 UART: [ldev] Erasing FE.KEYID = 1
1,243,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,135 UART: [ldev] --
1,282,538 UART: [fwproc] Wait for Commands...
1,283,324 UART: [fwproc] Recv command 0x46505652
1,284,145 UART: [rt] FIPS Version
1,284,699 >>> mbox cmd response data (36 bytes)
1,284,700 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,284,820 UART: [fwproc] Recv command 0x46574c44
1,285,548 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,657 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,030 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,334 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,165 >>> mbox cmd response: success
2,776,165 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,777,181 UART: [afmc] ++
2,777,349 UART: [afmc] CDI.KEYID = 6
2,777,711 UART: [afmc] SUBJECT.KEYID = 7
2,778,136 UART: [afmc] AUTHORITY.KEYID = 5
2,812,853 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,214 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,942 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,827 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,546 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,220 UART: [afmc] --
2,856,298 UART: [cold-reset] --
2,857,150 UART: [state] Locking Datavault
2,858,209 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,813 UART: [state] Locking ICCM
2,859,387 UART: [exit] Launching FMC @ 0x40000130
2,864,716 UART:
2,864,732 UART: Running Caliptra FMC ...
2,865,140 UART:
2,865,194 UART: [state] CFI Enabled
2,875,461 UART: [fht] FMC Alias Private Key: 7
2,983,132 UART: [art] Extend RT PCRs Done
2,983,560 UART: [art] Lock RT PCRs Done
2,985,282 UART: [art] Populate DV Done
2,993,591 UART: [fht] FMC Alias Private Key: 7
2,994,743 UART: [art] Derive CDI
2,995,023 UART: [art] Store in in slot 0x4
3,080,916 UART: [art] Derive Key Pair
3,081,276 UART: [art] Store priv key in slot 0x5
3,093,762 UART: [art] Derive Key Pair - Done
3,108,652 UART: [art] Signing Cert with AUTHO
3,109,132 UART: RITY.KEYID = 7
3,124,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,935 UART: [art] PUB.X = 2F5912D76FD39A2E5A5E2DDCEF623146F8D800485697A20752EE9BE87744197C3C736ACD812A003BA2E976959FFF42D3
3,131,662 UART: [art] PUB.Y = E856F16BF97B0108E54A322EF93B0E3649F32F0AA75200F6931B1716746DB98C67A30FAE1B2BB698557B11C3EBE59772
3,138,577 UART: [art] SIG.R = 2C9EE4B1C72BA90EFCAA613D6816FA6A70C5EFB97A39A2601B0A3DC0DA7899D6DEB971F56B2A9CB76CC2AFBD830270B6
3,145,364 UART: [art] SIG.S = 104B146D4299E6ECB959ACB347D88060C3DC77731CC2E25FCCDB074FDAFC2BF8872C2185CC14606F4DCA0FDB1F1FF8A2
3,169,467 UART: Caliptra RT
3,169,720 UART: [state] CFI Enabled
3,277,175 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,821 UART: [rt]cmd =0x46505652, len=4
3,308,481 UART: [rt] FIPS Version
3,309,574 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,363 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,867 >>> mbox cmd response data (36 bytes)
1,139,868 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,627,298 >>> mbox cmd response: success
2,627,298 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,260 UART:
2,689,276 UART: Running Caliptra FMC ...
2,689,684 UART:
2,689,738 UART: [state] CFI Enabled
2,699,905 UART: [fht] FMC Alias Private Key: 7
2,808,154 UART: [art] Extend RT PCRs Done
2,808,582 UART: [art] Lock RT PCRs Done
2,810,146 UART: [art] Populate DV Done
2,818,755 UART: [fht] FMC Alias Private Key: 7
2,819,717 UART: [art] Derive CDI
2,819,997 UART: [art] Store in in slot 0x4
2,905,404 UART: [art] Derive Key Pair
2,905,764 UART: [art] Store priv key in slot 0x5
2,918,862 UART: [art] Derive Key Pair - Done
2,933,489 UART: [art] Signing Cert with AUTHO
2,933,969 UART: RITY.KEYID = 7
2,949,469 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,234 UART: [art] PUB.X = 836CB4751DDA2D9D037EC34DC85C04886054794AA38088212503F86C348AB8317B9FEE8CC6F81A030BE7F71C4DB21C32
2,956,993 UART: [art] PUB.Y = C61CF54495F0F86EAC14F214BDE928C7CC631A5B9D2B33881906E014CEF937F25AE8091B2965810B9FB348026F450173
2,963,928 UART: [art] SIG.R = C6D090697A1770AAE93B94750956EFB80BCB75E2905CA4030A589899ED71F8A6A130F93FBF205219C952A879044F1130
2,970,679 UART: [art] SIG.S = 78063C7E13846995FBAE67E52D477C6FBDFC18F9D259245DE8145AD4D161B0EFC2D56D6EFD275158DAE40AC1F38B634B
2,994,564 UART: Caliptra RT
2,994,817 UART: [state] CFI Enabled
3,102,308 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,916 UART: [rt]cmd =0x46505652, len=4
3,133,576 UART: [rt] FIPS Version
3,134,671 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Unprovisioned
85,814 UART: [state] DebugLocked = No
86,354 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
893,363 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,488 UART: [kat] ++
897,640 UART: [kat] sha1
901,830 UART: [kat] SHA2-256
903,770 UART: [kat] SHA2-384
906,619 UART: [kat] SHA2-512-ACC
908,520 UART: [kat] ECC-384
918,493 UART: [kat] HMAC-384Kdf
923,193 UART: [kat] LMS
1,171,521 UART: [kat] --
1,172,432 UART: [cold-reset] ++
1,172,892 UART: [fht] FHT @ 0x50003400
1,175,661 UART: [idev] ++
1,175,829 UART: [idev] CDI.KEYID = 6
1,176,189 UART: [idev] SUBJECT.KEYID = 7
1,176,613 UART: [idev] UDS.KEYID = 0
1,176,958 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,731 UART: [idev] Erasing UDS.KEYID = 0
1,202,148 UART: [idev] Sha1 KeyId Algorithm
1,210,506 UART: [idev] --
1,211,708 UART: [ldev] ++
1,211,876 UART: [ldev] CDI.KEYID = 6
1,212,239 UART: [ldev] SUBJECT.KEYID = 5
1,212,665 UART: [ldev] AUTHORITY.KEYID = 7
1,213,128 UART: [ldev] FE.KEYID = 1
1,218,466 UART: [ldev] Erasing FE.KEYID = 1
1,244,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,462 UART: [ldev] --
1,283,891 UART: [fwproc] Wait for Commands...
1,284,663 UART: [fwproc] Recv command 0x46505652
1,285,484 UART: [rt] FIPS Version
1,286,038 >>> mbox cmd response data (36 bytes)
1,286,039 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,286,187 UART: [fwproc] Recv command 0x46574c44
1,286,915 UART: [fwproc] Recv'd Img size: 114332 bytes
2,585,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,709 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,013 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,777,860 >>> mbox cmd response: success
2,777,860 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,779,100 UART: [afmc] ++
2,779,268 UART: [afmc] CDI.KEYID = 6
2,779,630 UART: [afmc] SUBJECT.KEYID = 7
2,780,055 UART: [afmc] AUTHORITY.KEYID = 5
2,815,622 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,427 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,175 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,903 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,788 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,507 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,397 UART: [afmc] --
2,859,277 UART: [cold-reset] --
2,860,183 UART: [state] Locking Datavault
2,861,616 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,220 UART: [state] Locking ICCM
2,862,796 UART: [exit] Launching FMC @ 0x40000130
2,868,125 UART:
2,868,141 UART: Running Caliptra FMC ...
2,868,549 UART:
2,868,692 UART: [state] CFI Enabled
2,879,073 UART: [fht] FMC Alias Private Key: 7
2,986,694 UART: [art] Extend RT PCRs Done
2,987,122 UART: [art] Lock RT PCRs Done
2,988,370 UART: [art] Populate DV Done
2,996,481 UART: [fht] FMC Alias Private Key: 7
2,997,539 UART: [art] Derive CDI
2,997,819 UART: [art] Store in in slot 0x4
3,083,004 UART: [art] Derive Key Pair
3,083,364 UART: [art] Store priv key in slot 0x5
3,096,538 UART: [art] Derive Key Pair - Done
3,111,362 UART: [art] Signing Cert with AUTHO
3,111,842 UART: RITY.KEYID = 7
3,127,180 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,945 UART: [art] PUB.X = 0423A71AB1CB418762FACBA01C66282CF528F9A3822BB614DAB446BA576463D9BE30F52F4BB73507CEC72358FE859D79
3,134,717 UART: [art] PUB.Y = DEFD6AB0AE8DBEB2F15993264BEEF1BF26AB60B7B129FC3DD961805FF23BB976E532BD7959DD93E556EDE48972754243
3,141,685 UART: [art] SIG.R = 2C19A9AF36EE1D28030D110A620F6E1759B29C6E7934517109171D312DC42519A6529D404B8850311FAD0447D4E2731B
3,148,427 UART: [art] SIG.S = 2E1A6F5C958D2964D072368A31E6C09CB3BB95AD4FFB05797DFACED166178355EEF60C11F0B9343C68870F9A3B33D40A
3,172,674 UART: Caliptra RT
3,173,019 UART: [state] CFI Enabled
3,280,402 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,934 UART: [rt]cmd =0x46505652, len=4
3,311,594 UART: [rt] FIPS Version
3,312,663 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,886 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,600 >>> mbox cmd response data (36 bytes)
1,140,601 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,628,323 >>> mbox cmd response: success
2,628,323 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,690,689 UART:
2,690,705 UART: Running Caliptra FMC ...
2,691,113 UART:
2,691,256 UART: [state] CFI Enabled
2,701,735 UART: [fht] FMC Alias Private Key: 7
2,809,798 UART: [art] Extend RT PCRs Done
2,810,226 UART: [art] Lock RT PCRs Done
2,811,432 UART: [art] Populate DV Done
2,819,885 UART: [fht] FMC Alias Private Key: 7
2,820,953 UART: [art] Derive CDI
2,821,233 UART: [art] Store in in slot 0x4
2,907,342 UART: [art] Derive Key Pair
2,907,702 UART: [art] Store priv key in slot 0x5
2,920,892 UART: [art] Derive Key Pair - Done
2,935,804 UART: [art] Signing Cert with AUTHO
2,936,284 UART: RITY.KEYID = 7
2,951,636 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,401 UART: [art] PUB.X = 5E735058F963DE87CD890F54D041C4A4993AC0CD97827CE8D09F7C81140C180627D21351B7315189A23322D3378FF180
2,959,152 UART: [art] PUB.Y = 2EBB639547B768D5F8D6D583F59F05BBF9606E4C071F3218D7960FCDFFB3A5D0A8FA2F881164F2E6039B736F1405DB88
2,966,095 UART: [art] SIG.R = 469B7792EF9FFAF408E3D6191BB57E326C2D3CCC96361F6891A55C3EB9CF74433AED829D03011114C50F3CE75DD5387E
2,972,861 UART: [art] SIG.S = 4177CE534CF1FA060A1ED7059AAF9718971C81E9C31CAC29F4E0397451C2547242F35E536080302CA26AA99EF64D30D5
2,996,203 UART: Caliptra RT
2,996,548 UART: [state] CFI Enabled
3,104,009 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,319 UART: [rt]cmd =0x46505652, len=4
3,134,979 UART: [rt] FIPS Version
3,135,986 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,127 UART: [state] WD Timer not started. Device not locked for debugging
87,360 UART: [kat] SHA2-256
890,910 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,039 UART: [kat] ++
895,191 UART: [kat] sha1
899,393 UART: [kat] SHA2-256
901,333 UART: [kat] SHA2-384
903,960 UART: [kat] SHA2-512-ACC
905,861 UART: [kat] ECC-384
915,640 UART: [kat] HMAC-384Kdf
920,098 UART: [kat] LMS
1,168,410 UART: [kat] --
1,169,177 UART: [cold-reset] ++
1,169,631 UART: [fht] FHT @ 0x50003400
1,172,221 UART: [idev] ++
1,172,389 UART: [idev] CDI.KEYID = 6
1,172,750 UART: [idev] SUBJECT.KEYID = 7
1,173,175 UART: [idev] UDS.KEYID = 0
1,173,521 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,421 UART: [idev] Erasing UDS.KEYID = 0
1,198,229 UART: [idev] Sha1 KeyId Algorithm
1,207,281 UART: [idev] --
1,208,264 UART: [ldev] ++
1,208,432 UART: [ldev] CDI.KEYID = 6
1,208,796 UART: [ldev] SUBJECT.KEYID = 5
1,209,223 UART: [ldev] AUTHORITY.KEYID = 7
1,209,686 UART: [ldev] FE.KEYID = 1
1,214,688 UART: [ldev] Erasing FE.KEYID = 1
1,240,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,960 UART: [ldev] --
1,280,420 UART: [fwproc] Wait for Commands...
1,281,093 UART: [fwproc] Recv command 0x46505652
1,281,920 UART: [rt] FIPS Version
1,282,481 >>> mbox cmd response data (36 bytes)
1,282,482 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,282,713 UART: [fwproc] Recv command 0x46574c44
1,283,446 UART: [fwproc] Recv'd Img size: 114332 bytes
2,580,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,770 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,079 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,772,849 >>> mbox cmd response: success
2,772,849 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,774,116 UART: [afmc] ++
2,774,284 UART: [afmc] CDI.KEYID = 6
2,774,647 UART: [afmc] SUBJECT.KEYID = 7
2,775,073 UART: [afmc] AUTHORITY.KEYID = 5
2,811,074 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,554 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,305 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,034 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,917 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,636 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,317 UART: [afmc] --
2,854,265 UART: [cold-reset] --
2,854,921 UART: [state] Locking Datavault
2,856,142 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,746 UART: [state] Locking ICCM
2,857,320 UART: [exit] Launching FMC @ 0x40000130
2,862,649 UART:
2,862,665 UART: Running Caliptra FMC ...
2,863,073 UART:
2,863,127 UART: [state] CFI Enabled
2,873,842 UART: [fht] FMC Alias Private Key: 7
2,981,575 UART: [art] Extend RT PCRs Done
2,982,003 UART: [art] Lock RT PCRs Done
2,983,817 UART: [art] Populate DV Done
2,992,198 UART: [fht] FMC Alias Private Key: 7
2,993,128 UART: [art] Derive CDI
2,993,408 UART: [art] Store in in slot 0x4
3,079,119 UART: [art] Derive Key Pair
3,079,479 UART: [art] Store priv key in slot 0x5
3,092,551 UART: [art] Derive Key Pair - Done
3,107,152 UART: [art] Signing Cert with AUTHO
3,107,632 UART: RITY.KEYID = 7
3,123,038 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,803 UART: [art] PUB.X = B51EE3E3D0C30E3D0415AFBE712520475A4F14E5971A4B8D9E4AEDD67FDBEC8506833D2956703463C4F18D94E748A014
3,130,570 UART: [art] PUB.Y = 43500D9EE8B9D1268F2FC6FFF0A7083246376A81BF67FA9DB1CD1F323395B8B5EAD901D49ACB83D01C48A2BE4D53BA7D
3,137,529 UART: [art] SIG.R = DC81ED7860F66384CCF87577FC4868F360314B98E3F2C762A88CE5ED6CA3FB2C5AFBF74CE051D341A896FD800895A1EE
3,144,310 UART: [art] SIG.S = 6A6B492C3639A0D6179FE4DDA6706F09670A4F8B19DCD7C130EEF9BB9C018AFF3D750831BB6A4AD28091C7A94D5DFE44
3,168,055 UART: Caliptra RT
3,168,308 UART: [state] CFI Enabled
3,275,725 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,255 UART: [rt]cmd =0x46505652, len=4
3,306,915 UART: [rt] FIPS Version
3,307,774 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,016 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,116 >>> mbox cmd response data (36 bytes)
1,136,117 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,622,609 >>> mbox cmd response: success
2,622,609 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,685,271 UART:
2,685,287 UART: Running Caliptra FMC ...
2,685,695 UART:
2,685,749 UART: [state] CFI Enabled
2,695,940 UART: [fht] FMC Alias Private Key: 7
2,803,451 UART: [art] Extend RT PCRs Done
2,803,879 UART: [art] Lock RT PCRs Done
2,805,593 UART: [art] Populate DV Done
2,813,788 UART: [fht] FMC Alias Private Key: 7
2,814,950 UART: [art] Derive CDI
2,815,230 UART: [art] Store in in slot 0x4
2,900,651 UART: [art] Derive Key Pair
2,901,011 UART: [art] Store priv key in slot 0x5
2,914,385 UART: [art] Derive Key Pair - Done
2,928,866 UART: [art] Signing Cert with AUTHO
2,929,346 UART: RITY.KEYID = 7
2,944,186 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,951 UART: [art] PUB.X = 12575E15AB7C207FADCB32E0E372350C324A3E80926B12F573064B5D6834B6383890132F1669CD2DBEDCA7612BA09F5E
2,951,717 UART: [art] PUB.Y = BE14C9A41B75C06BBEBC220E75DD37755F7EDD392080E576AFCD24AE13214FC52611A44284D2E9B487E5BF9911886F1D
2,958,674 UART: [art] SIG.R = 11D3B3B08CD60EF7761CCD138861A7A29C7B34EB7FFF06462264A97AA714F6EB656A213C6CF39448089C1C6BAAB45721
2,965,443 UART: [art] SIG.S = 04F2E442E8468331667F3D7031FBF9D197966E0AC6B18FE07EA2C93D5C5DC4C18FFE2DB2E62E666CD5960EE3C7489DC8
2,989,507 UART: Caliptra RT
2,989,760 UART: [state] CFI Enabled
3,098,369 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,691 UART: [rt]cmd =0x46505652, len=4
3,129,351 UART: [rt] FIPS Version
3,130,368 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
891,487 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,616 UART: [kat] ++
895,768 UART: [kat] sha1
900,104 UART: [kat] SHA2-256
902,044 UART: [kat] SHA2-384
904,685 UART: [kat] SHA2-512-ACC
906,586 UART: [kat] ECC-384
916,503 UART: [kat] HMAC-384Kdf
921,283 UART: [kat] LMS
1,169,595 UART: [kat] --
1,170,454 UART: [cold-reset] ++
1,170,922 UART: [fht] FHT @ 0x50003400
1,173,564 UART: [idev] ++
1,173,732 UART: [idev] CDI.KEYID = 6
1,174,093 UART: [idev] SUBJECT.KEYID = 7
1,174,518 UART: [idev] UDS.KEYID = 0
1,174,864 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,392 UART: [idev] Erasing UDS.KEYID = 0
1,199,470 UART: [idev] Sha1 KeyId Algorithm
1,208,320 UART: [idev] --
1,209,405 UART: [ldev] ++
1,209,573 UART: [ldev] CDI.KEYID = 6
1,209,937 UART: [ldev] SUBJECT.KEYID = 5
1,210,364 UART: [ldev] AUTHORITY.KEYID = 7
1,210,827 UART: [ldev] FE.KEYID = 1
1,216,125 UART: [ldev] Erasing FE.KEYID = 1
1,243,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,911 UART: [ldev] --
1,282,429 UART: [fwproc] Wait for Commands...
1,283,134 UART: [fwproc] Recv command 0x46505652
1,283,961 UART: [rt] FIPS Version
1,284,522 >>> mbox cmd response data (36 bytes)
1,284,523 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
1,284,722 UART: [fwproc] Recv command 0x46574c44
1,285,455 UART: [fwproc] Recv'd Img size: 114332 bytes
2,583,941 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,075 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,384 UART: [fwproc] Load Runtime at address 0x40005000 len 89648
2,776,312 >>> mbox cmd response: success
2,776,312 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,777,565 UART: [afmc] ++
2,777,733 UART: [afmc] CDI.KEYID = 6
2,778,096 UART: [afmc] SUBJECT.KEYID = 7
2,778,522 UART: [afmc] AUTHORITY.KEYID = 5
2,813,369 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,378 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,107 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,990 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,709 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,724 UART: [afmc] --
2,856,784 UART: [cold-reset] --
2,857,594 UART: [state] Locking Datavault
2,859,075 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,679 UART: [state] Locking ICCM
2,860,237 UART: [exit] Launching FMC @ 0x40000130
2,865,566 UART:
2,865,582 UART: Running Caliptra FMC ...
2,865,990 UART:
2,866,133 UART: [state] CFI Enabled
2,876,758 UART: [fht] FMC Alias Private Key: 7
2,984,875 UART: [art] Extend RT PCRs Done
2,985,303 UART: [art] Lock RT PCRs Done
2,986,919 UART: [art] Populate DV Done
2,995,402 UART: [fht] FMC Alias Private Key: 7
2,996,416 UART: [art] Derive CDI
2,996,696 UART: [art] Store in in slot 0x4
3,082,317 UART: [art] Derive Key Pair
3,082,677 UART: [art] Store priv key in slot 0x5
3,096,285 UART: [art] Derive Key Pair - Done
3,111,052 UART: [art] Signing Cert with AUTHO
3,111,532 UART: RITY.KEYID = 7
3,126,542 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,307 UART: [art] PUB.X = 944A0C3A3618B5F0A3B97ED067814A06CAB3FE12DB5F4DA163166FE5107A0DA2368A4818B6B3FC73AD29B0C0E29DCB66
3,134,082 UART: [art] PUB.Y = B3F5DE1B29971E57FD2F8925372CF40B0F88F9436A2073960157244298D8D5CF24CD874DB5F98ED26822C9D32612D730
3,141,019 UART: [art] SIG.R = 52352FF9D629C3FB221791632DC022C6B1A00F91E836EFD846BC0244F5F301203B32123E5413610EE133CAA1D2012756
3,147,768 UART: [art] SIG.S = 524DB708489F873D9131CAF24C4B0B751DDD45C3C83133C1318D28184B9334339D762311224CB743BD4B1002EA6C3A26
3,171,670 UART: Caliptra RT
3,172,015 UART: [state] CFI Enabled
3,279,720 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,380 UART: [rt]cmd =0x46505652, len=4
3,311,040 UART: [rt] FIPS Version
3,312,063 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,813 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,135,337 >>> mbox cmd response data (36 bytes)
1,135,338 <<< Executing mbox cmd 0x46574c44 (114332 bytes) from SoC
2,621,620 >>> mbox cmd response: success
2,621,620 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,684,070 UART:
2,684,086 UART: Running Caliptra FMC ...
2,684,494 UART:
2,684,637 UART: [state] CFI Enabled
2,695,264 UART: [fht] FMC Alias Private Key: 7
2,803,393 UART: [art] Extend RT PCRs Done
2,803,821 UART: [art] Lock RT PCRs Done
2,805,035 UART: [art] Populate DV Done
2,813,430 UART: [fht] FMC Alias Private Key: 7
2,814,442 UART: [art] Derive CDI
2,814,722 UART: [art] Store in in slot 0x4
2,900,201 UART: [art] Derive Key Pair
2,900,561 UART: [art] Store priv key in slot 0x5
2,914,041 UART: [art] Derive Key Pair - Done
2,928,720 UART: [art] Signing Cert with AUTHO
2,929,200 UART: RITY.KEYID = 7
2,944,488 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,253 UART: [art] PUB.X = B35794538C0AD653AA71B2567F9CD235EB6BDE370EA910109DE2B79B84C219690DB2E662EAC801A7755D8BDBE3FEA26E
2,952,025 UART: [art] PUB.Y = 174D6578CEC551CAACF40455ACAE50F9CEEAE91EC0C1838068EBBFB5804E238F93AAB6EAB58674487B1EE4B3FAAF2615
2,958,996 UART: [art] SIG.R = B66CC991CD5A1D83751048D0AB9BD8BE7424C56E0C5E433E1B1689902145D3C0328FA2C0718C6A5EF80AAB4490CE91C1
2,965,768 UART: [art] SIG.S = 74AFE0833AED991A26E911E313DA051231AAC29EFA633FE015AFAAC795D001E4F68186FAE1B87507FB2873BD46BE1011
2,989,156 UART: Caliptra RT
2,989,501 UART: [state] CFI Enabled
3,097,286 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,240 UART: [rt]cmd =0x46505652, len=4
3,128,900 UART: [rt] FIPS Version
3,130,015 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,658 UART: [state] LifecycleState = Unprovisioned
85,313 UART: [state] DebugLocked = No
85,909 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,615 UART: [kat] SHA2-256
881,546 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,661 UART: [kat] ++
885,813 UART: [kat] sha1
890,087 UART: [kat] SHA2-256
892,025 UART: [kat] SHA2-384
894,754 UART: [kat] SHA2-512-ACC
896,655 UART: [kat] ECC-384
902,230 UART: [kat] HMAC-384Kdf
906,764 UART: [kat] LMS
1,474,960 UART: [kat] --
1,475,745 UART: [cold-reset] ++
1,476,171 UART: [fht] Storing FHT @ 0x50003400
1,478,968 UART: [idev] ++
1,479,136 UART: [idev] CDI.KEYID = 6
1,479,496 UART: [idev] SUBJECT.KEYID = 7
1,479,920 UART: [idev] UDS.KEYID = 0
1,480,265 ready_for_fw is high
1,480,265 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,487,498 UART: [idev] Erasing UDS.KEYID = 0
1,504,182 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,812 UART: [idev] --
1,513,931 UART: [ldev] ++
1,514,099 UART: [ldev] CDI.KEYID = 6
1,514,462 UART: [ldev] SUBJECT.KEYID = 5
1,514,888 UART: [ldev] AUTHORITY.KEYID = 7
1,515,351 UART: [ldev] FE.KEYID = 1
1,520,663 UART: [ldev] Erasing FE.KEYID = 1
1,545,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,936 UART: [ldev] --
1,585,347 UART: [fwproc] Waiting for Commands...
1,586,028 UART: [fwproc] Received command 0x46574c44
1,586,819 UART: [fwproc] Received Image of size 115196 bytes
2,895,063 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,333 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,685 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,088,758 >>> mbox cmd response: success
3,088,758 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,089,834 UART: [afmc] ++
3,090,002 UART: [afmc] CDI.KEYID = 6
3,090,364 UART: [afmc] SUBJECT.KEYID = 7
3,090,789 UART: [afmc] AUTHORITY.KEYID = 5
3,125,636 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,626 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,406 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,134 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,019 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,709 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,634 UART: [afmc] --
3,168,676 UART: [cold-reset] --
3,169,472 UART: [state] Locking Datavault
3,170,433 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,037 UART: [state] Locking ICCM
3,171,477 UART: [exit] Launching FMC @ 0x40000130
3,176,806 UART:
3,176,822 UART: Running Caliptra FMC ...
3,177,230 UART:
3,177,284 UART: [state] CFI Enabled
3,187,823 UART: [fht] FMC Alias Private Key: 7
3,295,792 UART: [art] Extend RT PCRs Done
3,296,220 UART: [art] Lock RT PCRs Done
3,297,594 UART: [art] Populate DV Done
3,305,885 UART: [fht] FMC Alias Private Key: 7
3,306,863 UART: [art] Derive CDI
3,307,143 UART: [art] Store in in slot 0x4
3,392,782 UART: [art] Derive Key Pair
3,393,142 UART: [art] Store priv key in slot 0x5
3,406,758 UART: [art] Derive Key Pair - Done
3,421,475 UART: [art] Signing Cert with AUTHO
3,421,955 UART: RITY.KEYID = 7
3,437,259 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,024 UART: [art] PUB.X = CCFCAA00D52E0579784FA38D84A7DF3125319AC7407BC7A7D772A807F729A7C6D3C3E0CEEDC027DE199FCF41C19642B2
3,444,782 UART: [art] PUB.Y = D0887A45F5BF008971FC2E4D33204E1205B5E0B9D62677BC4C756C809DB7285CA47A001429E74A22A9C1CDFC3A328D5C
3,451,691 UART: [art] SIG.R = 0197AB57F1341E6C5118B59EA52E6B44C2CBDAB0F35365DC448BE404780D16043CCA03114CE8E92AC747DA49B6DC2F16
3,458,456 UART: [art] SIG.S = 42FF54D448BC5817BE3FC919F00696089A200F4A47906867F3DAF86250CEAAA964B2F3DF81731384DC48EE3AE4A18F26
3,482,588 UART: Caliptra RT
3,482,841 UART: [state] CFI Enabled
3,591,093 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,609 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,805 ready_for_fw is high
1,362,805 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,940,346 >>> mbox cmd response: success
2,940,346 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,001,974 UART:
3,001,990 UART: Running Caliptra FMC ...
3,002,398 UART:
3,002,452 UART: [state] CFI Enabled
3,012,901 UART: [fht] FMC Alias Private Key: 7
3,121,574 UART: [art] Extend RT PCRs Done
3,122,002 UART: [art] Lock RT PCRs Done
3,123,492 UART: [art] Populate DV Done
3,131,607 UART: [fht] FMC Alias Private Key: 7
3,132,689 UART: [art] Derive CDI
3,132,969 UART: [art] Store in in slot 0x4
3,218,406 UART: [art] Derive Key Pair
3,218,766 UART: [art] Store priv key in slot 0x5
3,231,802 UART: [art] Derive Key Pair - Done
3,246,113 UART: [art] Signing Cert with AUTHO
3,246,593 UART: RITY.KEYID = 7
3,261,997 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,762 UART: [art] PUB.X = 2E2CD64EF741C6104D20BF6467E305A59907A77B090A59E2FB5626018E107640CBDE616BF85248CADAAF05A4F2651202
3,269,513 UART: [art] PUB.Y = 04A1679A923475854666B70EA4D4DFAD2EBDD9F81B18141A3C657159679ADCB4358841AC08435EBDEB874CFD66ADF4AA
3,276,466 UART: [art] SIG.R = B3C427BFAED22269B70793401F9BA1BFCDF2E2EE3B97C1A537A392315221022C60D62A34A79B636FE65ADCA903881CC3
3,283,237 UART: [art] SIG.S = D92CEBDEEF0178715F1F8BD9520D3BA8CC00E21BEB0CFF555C63F50D61200ADE73F1197143D1537BFE05FCFC8F2DB621
3,307,438 UART: Caliptra RT
3,307,691 UART: [state] CFI Enabled
3,415,529 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,823 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,402 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,048 UART: [kat] SHA2-256
881,979 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,094 UART: [kat] ++
886,246 UART: [kat] sha1
890,502 UART: [kat] SHA2-256
892,440 UART: [kat] SHA2-384
895,143 UART: [kat] SHA2-512-ACC
897,044 UART: [kat] ECC-384
902,831 UART: [kat] HMAC-384Kdf
907,507 UART: [kat] LMS
1,475,703 UART: [kat] --
1,476,638 UART: [cold-reset] ++
1,477,158 UART: [fht] Storing FHT @ 0x50003400
1,479,975 UART: [idev] ++
1,480,143 UART: [idev] CDI.KEYID = 6
1,480,503 UART: [idev] SUBJECT.KEYID = 7
1,480,927 UART: [idev] UDS.KEYID = 0
1,481,272 ready_for_fw is high
1,481,272 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,488,857 UART: [idev] Erasing UDS.KEYID = 0
1,505,627 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,215 UART: [idev] --
1,515,408 UART: [ldev] ++
1,515,576 UART: [ldev] CDI.KEYID = 6
1,515,939 UART: [ldev] SUBJECT.KEYID = 5
1,516,365 UART: [ldev] AUTHORITY.KEYID = 7
1,516,828 UART: [ldev] FE.KEYID = 1
1,521,990 UART: [ldev] Erasing FE.KEYID = 1
1,547,267 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,909 UART: [ldev] --
1,586,416 UART: [fwproc] Waiting for Commands...
1,587,091 UART: [fwproc] Received command 0x46574c44
1,587,882 UART: [fwproc] Received Image of size 115196 bytes
2,895,776 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,154 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,506 UART: [fwproc] Loading Runtime at address 0x40005000 len 90512
3,089,587 >>> mbox cmd response: success
3,089,587 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,090,743 UART: [afmc] ++
3,090,911 UART: [afmc] CDI.KEYID = 6
3,091,273 UART: [afmc] SUBJECT.KEYID = 7
3,091,698 UART: [afmc] AUTHORITY.KEYID = 5
3,126,187 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,505 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,285 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,013 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,898 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,588 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,331 UART: [afmc] --
3,169,209 UART: [cold-reset] --
3,170,119 UART: [state] Locking Datavault
3,171,200 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,804 UART: [state] Locking ICCM
3,172,342 UART: [exit] Launching FMC @ 0x40000130
3,177,671 UART:
3,177,687 UART: Running Caliptra FMC ...
3,178,095 UART:
3,178,238 UART: [state] CFI Enabled
3,188,945 UART: [fht] FMC Alias Private Key: 7
3,297,056 UART: [art] Extend RT PCRs Done
3,297,484 UART: [art] Lock RT PCRs Done
3,298,964 UART: [art] Populate DV Done
3,307,161 UART: [fht] FMC Alias Private Key: 7
3,308,173 UART: [art] Derive CDI
3,308,453 UART: [art] Store in in slot 0x4
3,394,274 UART: [art] Derive Key Pair
3,394,634 UART: [art] Store priv key in slot 0x5
3,407,810 UART: [art] Derive Key Pair - Done
3,422,583 UART: [art] Signing Cert with AUTHO
3,423,063 UART: RITY.KEYID = 7
3,437,943 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,708 UART: [art] PUB.X = A818CD276F063150AB08E229BB243AF2E7EA0102A7E0FF5669A3C4CA2B1D5E2F52933970F06C39EF2C45529E69381F0E
3,445,469 UART: [art] PUB.Y = A46205493A8F9B6D3D2AF873EEB252AD8B8F920E3A1ACC7801A2B54B812976A045516734EF717CA72B1C1126AB23D4F9
3,452,416 UART: [art] SIG.R = 5B4214839E3F36A3F662ABD78EA106B54EC12CB3702ED02A97893B97D81A3F039229BD570B6272A3E0DCA2D0AB617442
3,459,181 UART: [art] SIG.S = E8502EDA3673476549259A02CA3792BD609843134E817B78FCA9772009FD09AB1A07FC928786D1B8579A3B00A637CE1C
3,482,688 UART: Caliptra RT
3,483,033 UART: [state] CFI Enabled
3,591,292 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,558 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,838 ready_for_fw is high
1,362,838 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,938,803 >>> mbox cmd response: success
2,938,803 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,999,867 UART:
2,999,883 UART: Running Caliptra FMC ...
3,000,291 UART:
3,000,434 UART: [state] CFI Enabled
3,011,395 UART: [fht] FMC Alias Private Key: 7
3,119,638 UART: [art] Extend RT PCRs Done
3,120,066 UART: [art] Lock RT PCRs Done
3,121,608 UART: [art] Populate DV Done
3,129,499 UART: [fht] FMC Alias Private Key: 7
3,130,573 UART: [art] Derive CDI
3,130,853 UART: [art] Store in in slot 0x4
3,216,774 UART: [art] Derive Key Pair
3,217,134 UART: [art] Store priv key in slot 0x5
3,230,266 UART: [art] Derive Key Pair - Done
3,244,741 UART: [art] Signing Cert with AUTHO
3,245,221 UART: RITY.KEYID = 7
3,260,475 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,240 UART: [art] PUB.X = A224005D9A071126172F19A7959AAB1CFEF02FB5606A0BF397894A0624D7B0A44050049D827A704BFC23573DED642607
3,267,969 UART: [art] PUB.Y = A64E0472BC366E65B2F32986A904947F61DE3A24C189E20E26AEFE660F7C250E625FB4B6E4039D7DD544E1130EB9F7C3
3,274,904 UART: [art] SIG.R = 6B70E08F1271536CCD06909CCF50845874C20AB0F24114F5A2102EAD578A978CA60BA89590D6631522DA4C865618937B
3,281,659 UART: [art] SIG.S = F194A3E258A763373EA875C002BB779655AF2E8D02AE208AAEA8477BAD558D855ECC4EF5C2A154C49F9B73EB7875FEFF
3,305,240 UART: Caliptra RT
3,305,585 UART: [state] CFI Enabled
3,415,244 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,608 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,764 UART: [state] LifecycleState = Unprovisioned
85,419 UART: [state] DebugLocked = No
86,053 UART: [state] WD Timer not started. Device not locked for debugging
87,232 UART: [kat] SHA2-256
892,882 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,007 UART: [kat] ++
897,159 UART: [kat] sha1
901,337 UART: [kat] SHA2-256
903,277 UART: [kat] SHA2-384
906,114 UART: [kat] SHA2-512-ACC
908,015 UART: [kat] ECC-384
917,574 UART: [kat] HMAC-384Kdf
922,216 UART: [kat] LMS
1,170,544 UART: [kat] --
1,171,679 UART: [cold-reset] ++
1,172,119 UART: [fht] FHT @ 0x50003400
1,174,776 UART: [idev] ++
1,174,944 UART: [idev] CDI.KEYID = 6
1,175,304 UART: [idev] SUBJECT.KEYID = 7
1,175,728 UART: [idev] UDS.KEYID = 0
1,176,073 ready_for_fw is high
1,176,073 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,183,674 UART: [idev] Erasing UDS.KEYID = 0
1,200,787 UART: [idev] Sha1 KeyId Algorithm
1,209,279 UART: [idev] --
1,210,305 UART: [ldev] ++
1,210,473 UART: [ldev] CDI.KEYID = 6
1,210,836 UART: [ldev] SUBJECT.KEYID = 5
1,211,262 UART: [ldev] AUTHORITY.KEYID = 7
1,211,725 UART: [ldev] FE.KEYID = 1
1,216,989 UART: [ldev] Erasing FE.KEYID = 1
1,242,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,935 UART: [ldev] --
1,282,398 UART: [fwproc] Wait for Commands...
1,283,024 UART: [fwproc] Recv command 0x46574c44
1,283,752 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,971 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,320 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,624 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,641 >>> mbox cmd response: success
2,785,641 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,786,829 UART: [afmc] ++
2,786,997 UART: [afmc] CDI.KEYID = 6
2,787,359 UART: [afmc] SUBJECT.KEYID = 7
2,787,784 UART: [afmc] AUTHORITY.KEYID = 5
2,823,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,288 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,036 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,764 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,649 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,368 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,370 UART: [afmc] --
2,866,350 UART: [cold-reset] --
2,867,126 UART: [state] Locking Datavault
2,868,321 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,925 UART: [state] Locking ICCM
2,869,413 UART: [exit] Launching FMC @ 0x40000130
2,874,742 UART:
2,874,758 UART: Running Caliptra FMC ...
2,875,166 UART:
2,875,220 UART: [state] CFI Enabled
2,885,759 UART: [fht] FMC Alias Private Key: 7
2,994,048 UART: [art] Extend RT PCRs Done
2,994,476 UART: [art] Lock RT PCRs Done
2,995,616 UART: [art] Populate DV Done
3,003,801 UART: [fht] FMC Alias Private Key: 7
3,004,871 UART: [art] Derive CDI
3,005,151 UART: [art] Store in in slot 0x4
3,090,674 UART: [art] Derive Key Pair
3,091,034 UART: [art] Store priv key in slot 0x5
3,103,894 UART: [art] Derive Key Pair - Done
3,118,546 UART: [art] Signing Cert with AUTHO
3,119,026 UART: RITY.KEYID = 7
3,133,978 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,743 UART: [art] PUB.X = 1E66F35CF21880D674EA5A3C499F47A28E7A3594E42581A92EA83B29A8997E2DA6D9299C5646606DC8AE0DD682867A3C
3,141,512 UART: [art] PUB.Y = E99A256FFB6FEFB4819C80395AE0948DB1563E076337FD957890F69235F1F8E37EE93A4656ED9E533EE4FC8E6BD73338
3,148,465 UART: [art] SIG.R = A4731F97C4113339AF00C318EE4F88FB8561B361DA4DD5E2359901B18F3CA907CF72DE6985438680FC64A05F38D509F8
3,155,204 UART: [art] SIG.S = 7E99F86CF346D55DEE4C6CCA80C75A3BE3AD79EBBF35A53BB820E91C39018735BD37EACCBB969F544DE78B86F2FE53BF
3,179,202 UART: Caliptra RT
3,179,455 UART: [state] CFI Enabled
3,287,706 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,342 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,247 ready_for_fw is high
1,059,247 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,636,758 >>> mbox cmd response: success
2,636,758 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,698,134 UART:
2,698,150 UART: Running Caliptra FMC ...
2,698,558 UART:
2,698,612 UART: [state] CFI Enabled
2,708,971 UART: [fht] FMC Alias Private Key: 7
2,817,158 UART: [art] Extend RT PCRs Done
2,817,586 UART: [art] Lock RT PCRs Done
2,818,796 UART: [art] Populate DV Done
2,827,321 UART: [fht] FMC Alias Private Key: 7
2,828,353 UART: [art] Derive CDI
2,828,633 UART: [art] Store in in slot 0x4
2,913,704 UART: [art] Derive Key Pair
2,914,064 UART: [art] Store priv key in slot 0x5
2,927,256 UART: [art] Derive Key Pair - Done
2,942,070 UART: [art] Signing Cert with AUTHO
2,942,550 UART: RITY.KEYID = 7
2,958,088 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,853 UART: [art] PUB.X = 3238F831EC4B5F11E6C7D7C314F36FFAB4B0E54FC73C499100B79224A68FE032842DB73611CBFA22789242E8703F8A7C
2,965,605 UART: [art] PUB.Y = E4EB0451FC8C0FDBB3BED3844AD432C3F79FA83A265EF13BC34B3070CA696E6EF6DE7DFA754F11A13FA89B176F52474B
2,972,571 UART: [art] SIG.R = 5186FE7D97F824784EC8C350F8F1BF3C52E2656E29DE92929A9ECDA49D7338CB10FEC5E9FBA786EA692683EACBBB2397
2,979,357 UART: [art] SIG.S = AE6D0535A12375EAB33ABE868B96AEB96386AB77D045C99EDE93734A2D1BA9B6BB9C116B2E00B226CF3A908A5EE2F10A
3,003,648 UART: Caliptra RT
3,003,901 UART: [state] CFI Enabled
3,111,566 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,040 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,833 UART: [state] LifecycleState = Unprovisioned
86,488 UART: [state] DebugLocked = No
87,154 UART: [state] WD Timer not started. Device not locked for debugging
88,491 UART: [kat] SHA2-256
894,141 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,266 UART: [kat] ++
898,418 UART: [kat] sha1
902,718 UART: [kat] SHA2-256
904,658 UART: [kat] SHA2-384
907,335 UART: [kat] SHA2-512-ACC
909,236 UART: [kat] ECC-384
919,145 UART: [kat] HMAC-384Kdf
923,969 UART: [kat] LMS
1,172,297 UART: [kat] --
1,173,318 UART: [cold-reset] ++
1,173,660 UART: [fht] FHT @ 0x50003400
1,176,213 UART: [idev] ++
1,176,381 UART: [idev] CDI.KEYID = 6
1,176,741 UART: [idev] SUBJECT.KEYID = 7
1,177,165 UART: [idev] UDS.KEYID = 0
1,177,510 ready_for_fw is high
1,177,510 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,185,073 UART: [idev] Erasing UDS.KEYID = 0
1,201,632 UART: [idev] Sha1 KeyId Algorithm
1,210,088 UART: [idev] --
1,211,158 UART: [ldev] ++
1,211,326 UART: [ldev] CDI.KEYID = 6
1,211,689 UART: [ldev] SUBJECT.KEYID = 5
1,212,115 UART: [ldev] AUTHORITY.KEYID = 7
1,212,578 UART: [ldev] FE.KEYID = 1
1,217,654 UART: [ldev] Erasing FE.KEYID = 1
1,243,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,218 UART: [ldev] --
1,283,703 UART: [fwproc] Wait for Commands...
1,284,423 UART: [fwproc] Recv command 0x46574c44
1,285,151 UART: [fwproc] Recv'd Img size: 115196 bytes
2,594,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,409 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,713 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,786,922 >>> mbox cmd response: success
2,786,922 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,787,982 UART: [afmc] ++
2,788,150 UART: [afmc] CDI.KEYID = 6
2,788,512 UART: [afmc] SUBJECT.KEYID = 7
2,788,937 UART: [afmc] AUTHORITY.KEYID = 5
2,825,068 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,305 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,053 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,781 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,666 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,385 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,187 UART: [afmc] --
2,868,125 UART: [cold-reset] --
2,868,963 UART: [state] Locking Datavault
2,870,190 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,794 UART: [state] Locking ICCM
2,871,462 UART: [exit] Launching FMC @ 0x40000130
2,876,791 UART:
2,876,807 UART: Running Caliptra FMC ...
2,877,215 UART:
2,877,358 UART: [state] CFI Enabled
2,887,845 UART: [fht] FMC Alias Private Key: 7
2,995,540 UART: [art] Extend RT PCRs Done
2,995,968 UART: [art] Lock RT PCRs Done
2,997,720 UART: [art] Populate DV Done
3,005,887 UART: [fht] FMC Alias Private Key: 7
3,007,065 UART: [art] Derive CDI
3,007,345 UART: [art] Store in in slot 0x4
3,093,368 UART: [art] Derive Key Pair
3,093,728 UART: [art] Store priv key in slot 0x5
3,106,990 UART: [art] Derive Key Pair - Done
3,122,045 UART: [art] Signing Cert with AUTHO
3,122,525 UART: RITY.KEYID = 7
3,137,675 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,440 UART: [art] PUB.X = B56B66025095681975F00347EC06BB91A952C72D3727191A6F3E42E623619FD09F34110BF1FA05387C5D8FB5DC409C4B
3,145,191 UART: [art] PUB.Y = 94570E43BD545FDF0692D444EDF4866E02F6E2FAA49FDB30ADD6781305DF11F0AE39B020D83FD7BB7D2DC5E54625721A
3,152,143 UART: [art] SIG.R = 5D0A6E35A9794F80BF8FE268F09B850AA73FE9599B2575E3159FCF2E5F4BD30F8E8F082F6FBA0A3A5FE3DA7BDD699DE6
3,158,920 UART: [art] SIG.S = E91A0AC4A20F7D9C2BF1622E8665E3E078AE4C4D6693DD9F056CCF5F0CEBECEA85943E75B10632BB20FE35C19404E599
3,182,469 UART: Caliptra RT
3,182,814 UART: [state] CFI Enabled
3,290,613 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,935 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,728 ready_for_fw is high
1,060,728 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,639,215 >>> mbox cmd response: success
2,639,215 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,701,417 UART:
2,701,433 UART: Running Caliptra FMC ...
2,701,841 UART:
2,701,984 UART: [state] CFI Enabled
2,712,723 UART: [fht] FMC Alias Private Key: 7
2,820,360 UART: [art] Extend RT PCRs Done
2,820,788 UART: [art] Lock RT PCRs Done
2,822,386 UART: [art] Populate DV Done
2,831,001 UART: [fht] FMC Alias Private Key: 7
2,832,093 UART: [art] Derive CDI
2,832,373 UART: [art] Store in in slot 0x4
2,918,232 UART: [art] Derive Key Pair
2,918,592 UART: [art] Store priv key in slot 0x5
2,931,774 UART: [art] Derive Key Pair - Done
2,946,283 UART: [art] Signing Cert with AUTHO
2,946,763 UART: RITY.KEYID = 7
2,961,675 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,440 UART: [art] PUB.X = 94DAE80C526B4D90061351675F6B57682648B11EF685827F088FE785D021B201777E163E786B6C25190BFE5BAA2A0A5C
2,969,188 UART: [art] PUB.Y = 5F0F0BD77790ECB4374C3D871F14333ECE0D4F533BC3D0B82B7464428D7CDB98CEC2D2A7AECCC7BE30B1C0D206726F42
2,976,144 UART: [art] SIG.R = 94DF2B05AAE0D5C91DCDF18744E7F2B5D976DA187BBCB57851FD33E1E40992E3948B35FE5D3B3F598E4157428B2D0EE5
2,982,919 UART: [art] SIG.S = D507563EC18D1A5A7FCAA3C616EC1F77C7CF7FAAFC4BD3C426BEF32F850253480DADEEEA5FBDFBDB008F913D37C04C56
3,006,903 UART: Caliptra RT
3,007,248 UART: [state] CFI Enabled
3,115,308 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,662 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,822 UART: [kat] SHA2-256
891,372 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,501 UART: [kat] ++
895,653 UART: [kat] sha1
899,977 UART: [kat] SHA2-256
901,917 UART: [kat] SHA2-384
904,618 UART: [kat] SHA2-512-ACC
906,519 UART: [kat] ECC-384
916,470 UART: [kat] HMAC-384Kdf
920,938 UART: [kat] LMS
1,169,250 UART: [kat] --
1,169,989 UART: [cold-reset] ++
1,170,533 UART: [fht] FHT @ 0x50003400
1,173,163 UART: [idev] ++
1,173,331 UART: [idev] CDI.KEYID = 6
1,173,692 UART: [idev] SUBJECT.KEYID = 7
1,174,117 UART: [idev] UDS.KEYID = 0
1,174,463 ready_for_fw is high
1,174,463 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,025 UART: [idev] Erasing UDS.KEYID = 0
1,199,731 UART: [idev] Sha1 KeyId Algorithm
1,208,747 UART: [idev] --
1,209,776 UART: [ldev] ++
1,209,944 UART: [ldev] CDI.KEYID = 6
1,210,308 UART: [ldev] SUBJECT.KEYID = 5
1,210,735 UART: [ldev] AUTHORITY.KEYID = 7
1,211,198 UART: [ldev] FE.KEYID = 1
1,216,240 UART: [ldev] Erasing FE.KEYID = 1
1,242,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,480 UART: [ldev] --
1,281,796 UART: [fwproc] Wait for Commands...
1,282,569 UART: [fwproc] Recv command 0x46574c44
1,283,302 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,068 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,820 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,129 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,341 >>> mbox cmd response: success
2,785,341 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,786,448 UART: [afmc] ++
2,786,616 UART: [afmc] CDI.KEYID = 6
2,786,979 UART: [afmc] SUBJECT.KEYID = 7
2,787,405 UART: [afmc] AUTHORITY.KEYID = 5
2,823,028 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,604 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,355 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,084 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,967 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,686 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,401 UART: [afmc] --
2,866,303 UART: [cold-reset] --
2,867,351 UART: [state] Locking Datavault
2,868,414 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,018 UART: [state] Locking ICCM
2,869,580 UART: [exit] Launching FMC @ 0x40000130
2,874,909 UART:
2,874,925 UART: Running Caliptra FMC ...
2,875,333 UART:
2,875,387 UART: [state] CFI Enabled
2,885,940 UART: [fht] FMC Alias Private Key: 7
2,994,547 UART: [art] Extend RT PCRs Done
2,994,975 UART: [art] Lock RT PCRs Done
2,996,767 UART: [art] Populate DV Done
3,004,986 UART: [fht] FMC Alias Private Key: 7
3,006,044 UART: [art] Derive CDI
3,006,324 UART: [art] Store in in slot 0x4
3,091,941 UART: [art] Derive Key Pair
3,092,301 UART: [art] Store priv key in slot 0x5
3,105,237 UART: [art] Derive Key Pair - Done
3,120,474 UART: [art] Signing Cert with AUTHO
3,120,954 UART: RITY.KEYID = 7
3,136,190 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,955 UART: [art] PUB.X = 33C8EAFCF0E186E46A69BB1C9B28696F08BAF7425104024D6513A359F008F4C0F7226473B02F6A0A7E7F11E9694A8C96
3,143,712 UART: [art] PUB.Y = 2C7914EAE9D47AC5F7071452EE02C4B364CE081AA44FEE03995F95967AF4DE5A5DF73F26AAA83E2ACBC8F56810B527C3
3,150,666 UART: [art] SIG.R = 40589794880F39E0B87B8FE61B0516AE75C416D266A816C627EF27A66032CE0390AA313B6D97EB7C21EEC2DFC5A721EC
3,157,433 UART: [art] SIG.S = 23DFD9F403464AA42C192B2B51533C15BF65C54EE8D98A36412034FF2667E7BA9FE80BD8087CD179845FA89B4C9308B0
3,181,122 UART: Caliptra RT
3,181,375 UART: [state] CFI Enabled
3,289,382 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,822 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,884 ready_for_fw is high
1,055,884 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,631,927 >>> mbox cmd response: success
2,631,927 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,694,491 UART:
2,694,507 UART: Running Caliptra FMC ...
2,694,915 UART:
2,694,969 UART: [state] CFI Enabled
2,705,750 UART: [fht] FMC Alias Private Key: 7
2,813,649 UART: [art] Extend RT PCRs Done
2,814,077 UART: [art] Lock RT PCRs Done
2,815,421 UART: [art] Populate DV Done
2,823,654 UART: [fht] FMC Alias Private Key: 7
2,824,726 UART: [art] Derive CDI
2,825,006 UART: [art] Store in in slot 0x4
2,910,701 UART: [art] Derive Key Pair
2,911,061 UART: [art] Store priv key in slot 0x5
2,924,485 UART: [art] Derive Key Pair - Done
2,939,505 UART: [art] Signing Cert with AUTHO
2,939,985 UART: RITY.KEYID = 7
2,955,531 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,296 UART: [art] PUB.X = 481B3B541C7E405EB6834FF079971B72FB2D8AD015D218CC8D3A6DBB861E9B8B2484AAE9985ECA0C53331B5B833D00FF
2,963,053 UART: [art] PUB.Y = 8B0A1FC19FF691FA7CA5116F7257067ACB874AFF5D5D56EF34254EACDA53E74D4A27AE5F133B5064111A2E7082B5D936
2,970,009 UART: [art] SIG.R = 90DB755E25CC81FC5AB332F717F9E162A5320253BA7704434F73B009566A65A8382023679D84937CF18F6B6FB56033BD
2,976,764 UART: [art] SIG.S = EE908939D4CE1A8A1F0CAB155016E5F3F00C1E5528E623A83523CCDD9F3094DF5C09451370499206C1FCE7E96C9E0719
3,000,930 UART: Caliptra RT
3,001,183 UART: [state] CFI Enabled
3,108,553 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,099 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
891,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,590 UART: [kat] ++
895,742 UART: [kat] sha1
899,984 UART: [kat] SHA2-256
901,924 UART: [kat] SHA2-384
904,471 UART: [kat] SHA2-512-ACC
906,372 UART: [kat] ECC-384
916,289 UART: [kat] HMAC-384Kdf
920,985 UART: [kat] LMS
1,169,297 UART: [kat] --
1,170,144 UART: [cold-reset] ++
1,170,700 UART: [fht] FHT @ 0x50003400
1,173,362 UART: [idev] ++
1,173,530 UART: [idev] CDI.KEYID = 6
1,173,891 UART: [idev] SUBJECT.KEYID = 7
1,174,316 UART: [idev] UDS.KEYID = 0
1,174,662 ready_for_fw is high
1,174,662 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
1,182,122 UART: [idev] Erasing UDS.KEYID = 0
1,199,458 UART: [idev] Sha1 KeyId Algorithm
1,208,402 UART: [idev] --
1,209,501 UART: [ldev] ++
1,209,669 UART: [ldev] CDI.KEYID = 6
1,210,033 UART: [ldev] SUBJECT.KEYID = 5
1,210,460 UART: [ldev] AUTHORITY.KEYID = 7
1,210,923 UART: [ldev] FE.KEYID = 1
1,216,247 UART: [ldev] Erasing FE.KEYID = 1
1,242,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,551 UART: [ldev] --
1,281,949 UART: [fwproc] Wait for Commands...
1,282,662 UART: [fwproc] Recv command 0x46574c44
1,283,395 UART: [fwproc] Recv'd Img size: 115196 bytes
2,591,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,835 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,144 UART: [fwproc] Load Runtime at address 0x40005000 len 90512
2,785,272 >>> mbox cmd response: success
2,785,272 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,786,437 UART: [afmc] ++
2,786,605 UART: [afmc] CDI.KEYID = 6
2,786,968 UART: [afmc] SUBJECT.KEYID = 7
2,787,394 UART: [afmc] AUTHORITY.KEYID = 5
2,823,011 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,577 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,328 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,057 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,940 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,659 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,518 UART: [afmc] --
2,866,578 UART: [cold-reset] --
2,867,408 UART: [state] Locking Datavault
2,868,547 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,151 UART: [state] Locking ICCM
2,869,605 UART: [exit] Launching FMC @ 0x40000130
2,874,934 UART:
2,874,950 UART: Running Caliptra FMC ...
2,875,358 UART:
2,875,501 UART: [state] CFI Enabled
2,885,630 UART: [fht] FMC Alias Private Key: 7
2,993,591 UART: [art] Extend RT PCRs Done
2,994,019 UART: [art] Lock RT PCRs Done
2,995,585 UART: [art] Populate DV Done
3,003,778 UART: [fht] FMC Alias Private Key: 7
3,004,914 UART: [art] Derive CDI
3,005,194 UART: [art] Store in in slot 0x4
3,090,911 UART: [art] Derive Key Pair
3,091,271 UART: [art] Store priv key in slot 0x5
3,104,477 UART: [art] Derive Key Pair - Done
3,119,411 UART: [art] Signing Cert with AUTHO
3,119,891 UART: RITY.KEYID = 7
3,135,185 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,950 UART: [art] PUB.X = 62B9D187C94B531A76058DAEC24FF86A74AC9CBD3F37439B547FA1B56326B9813419215A77A7650BD7A5C523CAC8AE57
3,142,720 UART: [art] PUB.Y = BB15F9034122C2C2034A760CAD60CDCE5354DE971AE51F58F5F2E3FE9725CE6A45EABB37AE33B2041D70ACF326A964FA
3,149,676 UART: [art] SIG.R = 14FDC2A6C4CE40509ADC082E27F16D1C10B22B05460574A5231EE81D012D873D5DB7C4B04884F10832F57ADD9A9BB44D
3,156,439 UART: [art] SIG.S = 12B5B85DCA1914FC5DB8ABAE4137B9982C08B7BBEE960BB91D9FF5AB31A407630002A5C36B7D9ADB91BC50368472DF28
3,180,068 UART: Caliptra RT
3,180,413 UART: [state] CFI Enabled
3,287,776 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,266 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,475 ready_for_fw is high
1,056,475 <<< Executing mbox cmd 0x46574c44 (115196 bytes) from SoC
2,635,694 >>> mbox cmd response: success
2,635,694 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,698,086 UART:
2,698,102 UART: Running Caliptra FMC ...
2,698,510 UART:
2,698,653 UART: [state] CFI Enabled
2,709,622 UART: [fht] FMC Alias Private Key: 7
2,818,281 UART: [art] Extend RT PCRs Done
2,818,709 UART: [art] Lock RT PCRs Done
2,820,147 UART: [art] Populate DV Done
2,828,320 UART: [fht] FMC Alias Private Key: 7
2,829,464 UART: [art] Derive CDI
2,829,744 UART: [art] Store in in slot 0x4
2,915,517 UART: [art] Derive Key Pair
2,915,877 UART: [art] Store priv key in slot 0x5
2,929,567 UART: [art] Derive Key Pair - Done
2,944,058 UART: [art] Signing Cert with AUTHO
2,944,538 UART: RITY.KEYID = 7
2,959,552 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,317 UART: [art] PUB.X = A1F62CC8FFBF7FD80921F4AE8C579B33C362A82439CAA57F181AC6D62DC39C8DAE071AC52A028B40E762C2EC55E241D3
2,967,096 UART: [art] PUB.Y = 413E5BBA7B22F764ACB32AC61CD28B4E527AF588D05E81387290A6C7BEB582D327A1C522580E44A0FFBBAB2F470C37B4
2,974,054 UART: [art] SIG.R = 02DC31541DD1FB00DB0708CBA1D66F80CE4588EC0FECF6A80912DB0D4FEDC1C8602BF52B197DEFCB803DD4A967DF943F
2,980,810 UART: [art] SIG.S = 98713204AC77F776E91E4F2A138E585FF71D0F7DCE4999510D8DF36B24D00706B0DEB4254E71098D257B0C8E3940C4C7
3,004,612 UART: Caliptra RT
3,004,957 UART: [state] CFI Enabled
3,112,758 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,278 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,600 UART: [state] LifecycleState = Unprovisioned
86,255 UART: [state] DebugLocked = No
86,977 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,483 UART: [kat] SHA2-256
882,414 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,529 UART: [kat] ++
886,681 UART: [kat] sha1
891,137 UART: [kat] SHA2-256
893,075 UART: [kat] SHA2-384
895,622 UART: [kat] SHA2-512-ACC
897,523 UART: [kat] ECC-384
903,296 UART: [kat] HMAC-384Kdf
907,788 UART: [kat] LMS
1,475,984 UART: [kat] --
1,476,663 UART: [cold-reset] ++
1,476,997 UART: [fht] Storing FHT @ 0x50003400
1,479,812 UART: [idev] ++
1,479,980 UART: [idev] CDI.KEYID = 6
1,480,340 UART: [idev] SUBJECT.KEYID = 7
1,480,764 UART: [idev] UDS.KEYID = 0
1,481,109 ready_for_fw is high
1,481,109 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,488,974 UART: [idev] Erasing UDS.KEYID = 0
1,505,484 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,882 UART: [idev] --
1,514,923 UART: [ldev] ++
1,515,091 UART: [ldev] CDI.KEYID = 6
1,515,454 UART: [ldev] SUBJECT.KEYID = 5
1,515,880 UART: [ldev] AUTHORITY.KEYID = 7
1,516,343 UART: [ldev] FE.KEYID = 1
1,521,667 UART: [ldev] Erasing FE.KEYID = 1
1,547,038 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,206 UART: [ldev] --
1,586,503 UART: [fwproc] Waiting for Commands...
1,587,256 UART: [fwproc] Received command 0x46574c44
1,588,047 UART: [fwproc] Received Image of size 7036 bytes
1,655,664 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,683,576 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,684,740 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
1,687,793 >>> mbox cmd response: success
1,688,981 UART: [afmc] ++
1,689,149 UART: [afmc] CDI.KEYID = 6
1,689,511 UART: [afmc] SUBJECT.KEYID = 7
1,689,936 UART: [afmc] AUTHORITY.KEYID = 5
1,725,092 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,741,126 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,741,906 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,747,627 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,753,522 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,759,234 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,767,171 UART: [afmc] --
1,768,145 UART: [cold-reset] --
1,769,125 UART: [state] Locking Datavault
1,770,212 UART: [state] Locking PCR0, PCR1 and PCR31
1,770,816 UART: [state] Locking ICCM
1,771,370 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,776,665 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,778,548 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,467 ready_for_fw is high
1,362,467 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,534,697 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,791 UART: [state] LifecycleState = Unprovisioned
86,446 UART: [state] DebugLocked = No
87,038 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,548 UART: [kat] SHA2-256
882,479 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,594 UART: [kat] ++
886,746 UART: [kat] sha1
890,854 UART: [kat] SHA2-256
892,792 UART: [kat] SHA2-384
895,451 UART: [kat] SHA2-512-ACC
897,352 UART: [kat] ECC-384
903,055 UART: [kat] HMAC-384Kdf
907,857 UART: [kat] LMS
1,476,053 UART: [kat] --
1,476,744 UART: [cold-reset] ++
1,477,210 UART: [fht] Storing FHT @ 0x50003400
1,479,909 UART: [idev] ++
1,480,077 UART: [idev] CDI.KEYID = 6
1,480,437 UART: [idev] SUBJECT.KEYID = 7
1,480,861 UART: [idev] UDS.KEYID = 0
1,481,206 ready_for_fw is high
1,481,206 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,489,235 UART: [idev] Erasing UDS.KEYID = 0
1,506,097 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,709 UART: [idev] --
1,515,978 UART: [ldev] ++
1,516,146 UART: [ldev] CDI.KEYID = 6
1,516,509 UART: [ldev] SUBJECT.KEYID = 5
1,516,935 UART: [ldev] AUTHORITY.KEYID = 7
1,517,398 UART: [ldev] FE.KEYID = 1
1,522,586 UART: [ldev] Erasing FE.KEYID = 1
1,548,081 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,603 UART: [ldev] --
1,587,100 UART: [fwproc] Waiting for Commands...
1,587,893 UART: [fwproc] Received command 0x46574c44
1,588,684 UART: [fwproc] Received Image of size 7036 bytes
1,656,621 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,683,777 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,684,941 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
1,687,882 >>> mbox cmd response: success
1,688,990 UART: [afmc] ++
1,689,158 UART: [afmc] CDI.KEYID = 6
1,689,520 UART: [afmc] SUBJECT.KEYID = 7
1,689,945 UART: [afmc] AUTHORITY.KEYID = 5
1,724,751 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,740,873 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,741,653 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,747,374 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,753,269 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,758,981 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,767,062 UART: [afmc] --
1,767,962 UART: [cold-reset] --
1,768,754 UART: [state] Locking Datavault
1,769,831 UART: [state] Locking PCR0, PCR1 and PCR31
1,770,435 UART: [state] Locking ICCM
1,771,035 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,776,330 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,778,213 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,342 ready_for_fw is high
1,362,342 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,535,690 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,876 UART: [state] LifecycleState = Unprovisioned
85,531 UART: [state] DebugLocked = No
86,079 UART: [state] WD Timer not started. Device not locked for debugging
87,234 UART: [kat] SHA2-256
892,884 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,009 UART: [kat] ++
897,161 UART: [kat] sha1
901,307 UART: [kat] SHA2-256
903,247 UART: [kat] SHA2-384
906,034 UART: [kat] SHA2-512-ACC
907,935 UART: [kat] ECC-384
917,440 UART: [kat] HMAC-384Kdf
921,952 UART: [kat] LMS
1,170,280 UART: [kat] --
1,170,951 UART: [cold-reset] ++
1,171,327 UART: [fht] FHT @ 0x50003400
1,174,040 UART: [idev] ++
1,174,208 UART: [idev] CDI.KEYID = 6
1,174,568 UART: [idev] SUBJECT.KEYID = 7
1,174,992 UART: [idev] UDS.KEYID = 0
1,175,337 ready_for_fw is high
1,175,337 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,183,304 UART: [idev] Erasing UDS.KEYID = 0
1,200,587 UART: [idev] Sha1 KeyId Algorithm
1,209,003 UART: [idev] --
1,210,145 UART: [ldev] ++
1,210,313 UART: [ldev] CDI.KEYID = 6
1,210,676 UART: [ldev] SUBJECT.KEYID = 5
1,211,102 UART: [ldev] AUTHORITY.KEYID = 7
1,211,565 UART: [ldev] FE.KEYID = 1
1,216,731 UART: [ldev] Erasing FE.KEYID = 1
1,243,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,637 UART: [ldev] --
1,282,998 UART: [fwproc] Wait for Commands...
1,283,780 UART: [fwproc] Recv command 0x46574c44
1,284,508 UART: [fwproc] Recv'd Img size: 7036 bytes
1,352,174 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,379,909 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,381,025 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,384,058 >>> mbox cmd response: success
1,385,318 UART: [afmc] ++
1,385,486 UART: [afmc] CDI.KEYID = 6
1,385,848 UART: [afmc] SUBJECT.KEYID = 7
1,386,273 UART: [afmc] AUTHORITY.KEYID = 5
1,421,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,438,102 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,438,850 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,444,571 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,450,466 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,456,158 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,463,926 UART: [afmc] --
1,464,904 UART: [cold-reset] --
1,465,644 UART: [state] Locking Datavault
1,466,703 UART: [state] Locking PCR0, PCR1 and PCR31
1,467,307 UART: [state] Locking ICCM
1,467,775 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,473,070 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,474,953 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,951 ready_for_fw is high
1,060,951 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,234,763 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,782 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
893,779 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,904 UART: [kat] ++
898,056 UART: [kat] sha1
902,256 UART: [kat] SHA2-256
904,196 UART: [kat] SHA2-384
906,971 UART: [kat] SHA2-512-ACC
908,872 UART: [kat] ECC-384
918,943 UART: [kat] HMAC-384Kdf
923,657 UART: [kat] LMS
1,171,985 UART: [kat] --
1,173,052 UART: [cold-reset] ++
1,173,520 UART: [fht] FHT @ 0x50003400
1,175,983 UART: [idev] ++
1,176,151 UART: [idev] CDI.KEYID = 6
1,176,511 UART: [idev] SUBJECT.KEYID = 7
1,176,935 UART: [idev] UDS.KEYID = 0
1,177,280 ready_for_fw is high
1,177,280 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,184,981 UART: [idev] Erasing UDS.KEYID = 0
1,201,744 UART: [idev] Sha1 KeyId Algorithm
1,210,200 UART: [idev] --
1,211,252 UART: [ldev] ++
1,211,420 UART: [ldev] CDI.KEYID = 6
1,211,783 UART: [ldev] SUBJECT.KEYID = 5
1,212,209 UART: [ldev] AUTHORITY.KEYID = 7
1,212,672 UART: [ldev] FE.KEYID = 1
1,218,076 UART: [ldev] Erasing FE.KEYID = 1
1,244,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,896 UART: [ldev] --
1,284,397 UART: [fwproc] Wait for Commands...
1,285,035 UART: [fwproc] Recv command 0x46574c44
1,285,763 UART: [fwproc] Recv'd Img size: 7036 bytes
1,353,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,381,238 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,382,354 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,385,299 >>> mbox cmd response: success
1,386,349 UART: [afmc] ++
1,386,517 UART: [afmc] CDI.KEYID = 6
1,386,879 UART: [afmc] SUBJECT.KEYID = 7
1,387,304 UART: [afmc] AUTHORITY.KEYID = 5
1,423,324 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,439,607 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,440,355 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,446,076 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,451,971 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,457,663 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,465,541 UART: [afmc] --
1,466,543 UART: [cold-reset] --
1,467,447 UART: [state] Locking Datavault
1,468,388 UART: [state] Locking PCR0, PCR1 and PCR31
1,468,992 UART: [state] Locking ICCM
1,469,606 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,474,901 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,476,784 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,536 ready_for_fw is high
1,060,536 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,236,440 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,440 UART: [state] LifecycleState = Unprovisioned
86,095 UART: [state] DebugLocked = No
86,763 UART: [state] WD Timer not started. Device not locked for debugging
88,030 UART: [kat] SHA2-256
891,580 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,709 UART: [kat] ++
895,861 UART: [kat] sha1
900,113 UART: [kat] SHA2-256
902,053 UART: [kat] SHA2-384
904,780 UART: [kat] SHA2-512-ACC
906,681 UART: [kat] ECC-384
916,256 UART: [kat] HMAC-384Kdf
920,866 UART: [kat] LMS
1,169,178 UART: [kat] --
1,169,993 UART: [cold-reset] ++
1,170,427 UART: [fht] FHT @ 0x50003400
1,173,043 UART: [idev] ++
1,173,211 UART: [idev] CDI.KEYID = 6
1,173,572 UART: [idev] SUBJECT.KEYID = 7
1,173,997 UART: [idev] UDS.KEYID = 0
1,174,343 ready_for_fw is high
1,174,343 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,181,859 UART: [idev] Erasing UDS.KEYID = 0
1,198,413 UART: [idev] Sha1 KeyId Algorithm
1,207,171 UART: [idev] --
1,208,252 UART: [ldev] ++
1,208,420 UART: [ldev] CDI.KEYID = 6
1,208,784 UART: [ldev] SUBJECT.KEYID = 5
1,209,211 UART: [ldev] AUTHORITY.KEYID = 7
1,209,674 UART: [ldev] FE.KEYID = 1
1,214,966 UART: [ldev] Erasing FE.KEYID = 1
1,241,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,180 UART: [ldev] --
1,280,654 UART: [fwproc] Wait for Commands...
1,281,235 UART: [fwproc] Recv command 0x46574c44
1,281,968 UART: [fwproc] Recv'd Img size: 7036 bytes
1,348,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,375,787 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,376,908 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,379,760 >>> mbox cmd response: success
1,381,013 UART: [afmc] ++
1,381,181 UART: [afmc] CDI.KEYID = 6
1,381,544 UART: [afmc] SUBJECT.KEYID = 7
1,381,970 UART: [afmc] AUTHORITY.KEYID = 5
1,417,388 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,433,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,434,449 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,440,171 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,446,064 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,451,756 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,459,717 UART: [afmc] --
1,460,691 UART: [cold-reset] --
1,461,721 UART: [state] Locking Datavault
1,463,080 UART: [state] Locking PCR0, PCR1 and PCR31
1,463,684 UART: [state] Locking ICCM
1,464,358 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,469,653 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,471,536 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,156 ready_for_fw is high
1,056,156 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,230,410 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2a43fca286cb42e38efbff2d7b41f41509a46ef7fa0b8a13309b9963b6660067aa864a17770613899a7fd40b9afd83f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [kat] SHA2-256
891,621 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,750 UART: [kat] ++
895,902 UART: [kat] sha1
900,092 UART: [kat] SHA2-256
902,032 UART: [kat] SHA2-384
904,805 UART: [kat] SHA2-512-ACC
906,706 UART: [kat] ECC-384
916,313 UART: [kat] HMAC-384Kdf
921,061 UART: [kat] LMS
1,169,373 UART: [kat] --
1,169,962 UART: [cold-reset] ++
1,170,304 UART: [fht] FHT @ 0x50003400
1,173,076 UART: [idev] ++
1,173,244 UART: [idev] CDI.KEYID = 6
1,173,605 UART: [idev] SUBJECT.KEYID = 7
1,174,030 UART: [idev] UDS.KEYID = 0
1,174,376 ready_for_fw is high
1,174,376 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,182,198 UART: [idev] Erasing UDS.KEYID = 0
1,198,958 UART: [idev] Sha1 KeyId Algorithm
1,207,806 UART: [idev] --
1,208,653 UART: [ldev] ++
1,208,821 UART: [ldev] CDI.KEYID = 6
1,209,185 UART: [ldev] SUBJECT.KEYID = 5
1,209,612 UART: [ldev] AUTHORITY.KEYID = 7
1,210,075 UART: [ldev] FE.KEYID = 1
1,215,427 UART: [ldev] Erasing FE.KEYID = 1
1,241,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,663 UART: [ldev] --
1,281,015 UART: [fwproc] Wait for Commands...
1,281,642 UART: [fwproc] Recv command 0x46574c44
1,282,375 UART: [fwproc] Recv'd Img size: 7036 bytes
1,349,994 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,376,912 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,378,033 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,380,955 >>> mbox cmd response: success
1,382,068 UART: [afmc] ++
1,382,236 UART: [afmc] CDI.KEYID = 6
1,382,599 UART: [afmc] SUBJECT.KEYID = 7
1,383,025 UART: [afmc] AUTHORITY.KEYID = 5
1,419,041 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,435,235 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,435,986 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,441,708 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,447,601 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,453,293 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,461,254 UART: [afmc] --
1,462,178 UART: [cold-reset] --
1,463,106 UART: [state] Locking Datavault
1,464,267 UART: [state] Locking PCR0, PCR1 and PCR31
1,464,871 UART: [state] Locking ICCM
1,465,487 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,470,782 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,472,665 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a640cf0e443d5c49e60ffa0fb54fb470b060a8412abeb5618893d2942b4347844fa9cc1bd0b575aba20749a814abc2f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,923 ready_for_fw is high
1,056,923 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,232,527 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.51s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.01s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.01s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.01s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s